caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
104.0s |
104.6s |
111.5s |
114.1s |
58.6s |
59.4s |
59.5s |
57.7s |
59.8s |
61.5s |
58.9s |
59.4s |
test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.6s |
0.5s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
4.5s |
4.5s |
4.5s |
4.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.3s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.5s |
2.4s |
2.4s |
2.5s |
2.8s |
2.7s |
3.3s |
3.4s |
2.8s |
2.9s |
2.9s |
2.9s |
test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
4.5s |
4.5s |
4.2s |
4.1s |
4.4s |
4.5s |
4.5s |
4.5s |
4.6s |
4.5s |
4.5s |
4.4s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.4s |
3.5s |
3.4s |
3.5s |
3.9s |
3.7s |
3.8s |
3.7s |
3.7s |
3.6s |
3.6s |
3.5s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.5s |
0.6s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.1s |
0.3s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.3s |
1.3s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
0.9s |
0.9s |
0.9s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.5s |
1.3s |
1.8s |
1.4s |
0.9s |
0.9s |
0.9s |
0.8s |
1.1s |
0.9s |
1.1s |
0.8s |
test_rtalias::test_fht_info |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.5s |
1.8s |
1.7s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.6s |
2.6s |
1.7s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.7s |
1.0s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
0.9s |
0.8s |
1.1s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
test_dice_derivations::test_cold_reset_status_reporting |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.8s |
1.1s |
1.4s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
test_fake_rom::test_fake_rom_fw_load |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.7s |
0.6s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
test_fake_rom::test_fake_rom_production_enabled |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
test_fake_rom::test_fake_rom_production_error |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
test_fake_rom::test_fake_rom_update_reset |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
1.3s |
1.1s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
test_fips_hooks::test_fips_hook_exit |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.6s |
1.3s |
1.3s |
1.5s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.4s |
1.0s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_fht_info |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.5s |
1.5s |
1.4s |
1.1s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.8s |
0.9s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.5s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.4s |
1.5s |
1.4s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.6s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.4s |
1.6s |
1.6s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
2.1s |
2.2s |
1.9s |
1.9s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.5s |
1.2s |
1.1s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.5s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.5s |
1.6s |
1.5s |
1.4s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.2s |
1.3s |
1.7s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.7s |
0.6s |
0.7s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.3s |
1.1s |
1.5s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_upload_single_measurement |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.2s |
1.1s |
1.6s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_idevid_derivation::test_generate_csr |
2.0s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.9s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
1965.0s |
1940.0s |
1961.1s |
1936.9s |
1536.0s |
1511.5s |
1536.1s |
1511.2s |
1536.0s |
1511.6s |
1536.1s |
1511.2s |
927.8s |
891.0s |
919.7s |
883.0s |
891.2s |
855.8s |
889.1s |
870.2s |
892.9s |
858.9s |
889.0s |
871.7s |
test_idevid_derivation::test_idev_subj_key_id_algo |
7.2s |
7.2s |
7.2s |
7.2s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.7s |
5.2s |
5.8s |
5.8s |
5.3s |
4.7s |
4.9s |
4.8s |
5.2s |
4.7s |
5.1s |
4.7s |
test_image_validation::cert_test |
1.9s |
1.6s |
2.5s |
2.1s |
1.6s |
1.7s |
1.5s |
1.9s |
2.0s |
1.5s |
2.1s |
2.7s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_image_validation::cert_test_with_custom_dates |
2.1s |
2.2s |
2.0s |
1.7s |
1.4s |
2.2s |
1.7s |
2.1s |
1.7s |
1.5s |
1.6s |
1.6s |
1.2s |
1.5s |
1.4s |
1.3s |
1.4s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
1.2s |
1.1s |
test_image_validation::cert_test_with_ueid |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.2s |
1.2s |
1.3s |
1.0s |
1.1s |
1.0s |
1.3s |
1.0s |
1.3s |
1.0s |
test_image_validation::test_fmc_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.9s |
0.7s |
test_image_validation::test_fmc_entry_point_unaligned |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.9s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.6s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.3s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.0s |
0.8s |
0.9s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
test_image_validation::test_fmc_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
1.0s |
0.7s |
1.0s |
test_image_validation::test_fmc_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
2.0s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.5s |
1.3s |
1.3s |
test_image_validation::test_fmc_svn_greater_than_32 |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.6s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
1.0s |
0.8s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.8s |
0.7s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.8s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.5s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
1.9s |
2.5s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
2.3s |
2.3s |
2.3s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
2.0s |
1.5s |
1.4s |
1.3s |
1.5s |
1.4s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.1s |
1.1s |
1.1s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.7s |
0.8s |
0.6s |
0.6s |
0.7s |
0.8s |
0.7s |
0.6s |
0.5s |
0.6s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.4s |
1.3s |
1.2s |
1.1s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.3s |
1.4s |
1.1s |
1.0s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.3s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.2s |
1.3s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
3.4s |
3.3s |
3.4s |
3.4s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.7s |
2.7s |
3.0s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.4s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
39.0s |
38.5s |
39.2s |
38.8s |
29.9s |
29.4s |
30.2s |
29.7s |
29.9s |
29.4s |
30.2s |
29.7s |
33.0s |
31.8s |
32.9s |
32.0s |
30.9s |
29.5s |
30.9s |
29.9s |
30.7s |
29.7s |
30.9s |
29.8s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
23.4s |
23.1s |
23.7s |
23.4s |
17.4s |
17.0s |
17.7s |
17.3s |
17.4s |
17.0s |
17.7s |
17.3s |
19.1s |
18.1s |
18.9s |
18.1s |
17.4s |
16.4s |
17.6s |
16.6s |
17.4s |
16.5s |
17.8s |
16.6s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.5s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.1s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.1s |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.9s |
2.8s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
test_image_validation::test_toc_fmc_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_reserved_pauser |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox_errors::test_unknown_command_is_fatal |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
test_rom_integrity::test_rom_integrity_failure |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
test_update_reset::test_update_reset_max_fw_image |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_success |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_update_reset::test_update_reset_verify_image_failure |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_version::test_version |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.6s |
1.6s |
2.4s |
2.4s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.6s |
0.6s |
1.4s |
1.4s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
1.1s |
1.1s |
1.4s |
1.4s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
2.3s |
2.3s |
1.9s |
1.9s |
2.3s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
tests_get_idev_csr::test_get_csr |
1.0s |
0.9s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.6s |
2.7s |
2.3s |
2.2s |
2.6s |
2.3s |
2.1s |
2.2s |
2.2s |
2.1s |
2.2s |
2.5s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.7s |
2.3s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.6s |
2.2s |
2.3s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.6s |
3.7s |
3.6s |
3.6s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.0s |
3.0s |
2.6s |
2.5s |
3.2s |
2.5s |
2.5s |
2.4s |
2.6s |
2.5s |
2.5s |
3.0s |
2.5s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.8s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.6s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.1s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.7s |
2.2s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.6s |
2.2s |
2.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.6s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.1s |
1.9s |
1.8s |
1.7s |
1.8s |
1.9s |
1.9s |
2.3s |
1.8s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.4s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
2.6s |
2.6s |
2.6s |
2.9s |
2.6s |
2.5s |
2.6s |
2.5s |
2.8s |
2.5s |
2.9s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.6s |
2.6s |
2.6s |
2.2s |
2.2s |
2.2s |
2.7s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.7s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.6s |
1.4s |
1.2s |
1.3s |
1.3s |
1.6s |
1.3s |
1.5s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.4s |
1.5s |
1.2s |
1.3s |
1.5s |
1.3s |
1.3s |
1.7s |
1.3s |
test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.9s |
1.0s |
0.8s |
1.1s |
0.8s |
test_boot::test_boot_tci_data |
1.7s |
1.7s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.2s |
1.0s |
1.0s |
1.1s |
0.9s |
0.9s |
1.1s |
1.2s |
0.9s |
1.2s |
0.9s |
test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.2s |
1.0s |
1.0s |
1.4s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.3s |
1.0s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.5s |
1.2s |
1.2s |
1.4s |
1.1s |
1.1s |
1.4s |
1.5s |
1.1s |
1.3s |
1.1s |
test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
0.8s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
1.0s |
0.8s |
test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.4s |
1.0s |
1.2s |
1.0s |
test_boot::test_stress_update |
400.2s |
406.6s |
394.5s |
403.2s |
326.8s |
323.0s |
336.0s |
336.0s |
333.7s |
340.2s |
336.0s |
336.0s |
340.8s |
328.7s |
341.2s |
330.8s |
317.4s |
307.4s |
327.0s |
314.8s |
316.4s |
311.1s |
328.2s |
317.3s |
test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.0s |
1.9s |
2.2s |
2.2s |
1.9s |
2.4s |
2.1s |
1.8s |
2.3s |
1.9s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.2s |
1.7s |
1.6s |
1.3s |
1.6s |
1.6s |
1.2s |
1.3s |
1.2s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.1s |
1.1s |
1.1s |
1.2s |
1.4s |
1.3s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.3s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.7s |
4.7s |
5.7s |
5.7s |
5.4s |
3.8s |
4.1s |
3.9s |
3.8s |
4.0s |
4.2s |
3.8s |
3.9s |
3.7s |
3.9s |
3.8s |
test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.2s |
1.2s |
1.2s |
1.1s |
1.4s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.0s |
1.0s |
1.0s |
1.2s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.3s |
3.3s |
3.3s |
2.7s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.3s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.5s |
2.2s |
2.1s |
2.1s |
2.2s |
2.4s |
test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.6s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.5s |
4.4s |
4.6s |
4.5s |
4.4s |
4.4s |
4.6s |
4.5s |
4.5s |
4.5s |
4.5s |
5.1s |
test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
test_ecdsa::test_ecdsa_verify_cmd |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.3s |
test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.5s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.4s |
4.4s |
4.3s |
4.4s |
3.6s |
3.6s |
3.6s |
3.5s |
3.6s |
3.7s |
3.6s |
3.7s |
4.1s |
3.8s |
3.9s |
3.8s |
3.6s |
3.5s |
3.7s |
3.6s |
3.6s |
3.5s |
3.8s |
3.6s |
test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
test_lms::test_lms_verify_failure |
1.8s |
1.9s |
1.8s |
1.9s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.8s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.7s |
1.9s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
2.6s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.6s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.6s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.5s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.6s |
1.7s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.2s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.2s |
4.3s |
3.5s |
3.4s |
3.5s |
3.4s |
3.5s |
3.6s |
3.5s |
3.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.5s |
3.4s |
3.5s |
3.6s |
3.4s |
3.5s |
3.6s |
3.5s |
test_stash_measurement::test_stash_measurement |
2.6s |
2.7s |
2.6s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.0s |
1.9s |
1.8s |
1.7s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
2.6s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_context_tags_validation |
2.6s |
2.7s |
2.6s |
2.6s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
2.0s |
1.8s |
test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.8s |
2.8s |
2.8s |
2.8s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.8s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.6s |
2.7s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
2.1s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
test_update_reset::test_tags_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.8s |
2.8s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.6s |
2.6s |
2.5s |
2.8s |
2.6s |
test_warm_reset::test_mbox_busy_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.8s |
1.8s |
2.6s |
2.6s |
1.8s |
1.8s |
2.6s |
2.6s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.4s |
0.4s |
jtag_test::gdb_test |
6.5s |
6.5s |
6.4s |
6.4s |
6.3s |
5.9s |
6.0s |
5.9s |
5.9s |
6.0s |
6.0s |
6.0s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
3.2s |
3.2s |
3.3s |
3.2s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.4s |
2.4s |
2.4s |
2.8s |
2.9s |
2.9s |
2.9s |
2.1s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.4s |
2.2s |
smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.2s |
1.9s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.4s |
2.3s |
2.4s |
2.3s |
2.2s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.6s |
2.2s |
test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.2s |
6.7s |
8.3s |
6.7s |
8.2s |
6.7s |
7.5s |
7.4s |
7.5s |
6.8s |
7.9s |
7.0s |
warm_reset::warm_reset_basic |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
2.0s |
1.5s |
1.8s |
1.5s |
1.8s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.7s |
1.5s |
warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.8s |
0.6s |
0.8s |
0.6s |
0.8s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.1s |
0.9s |
1.0s |
0.9s |
1.0s |
0.8s |
0.9s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
1.0s |
0.6s |
0.6s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
1.0s |
0.7s |
0.6s |
0.7s |
0.7s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.8s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.9s |
0.7s |
0.8s |
fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.7s |
fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.8s |
0.7s |
0.7s |
fw_load::fw_load_error_fmc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
2.0s |
1.5s |
1.6s |
fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.6s |
1.8s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
2.0s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.9s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
2.0s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
2.0s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.9s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.9s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
2.2s |
1.6s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.6s |
2.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
1.6s |
1.9s |
1.7s |
1.9s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.7s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.7s |
1.8s |
1.8s |
2.0s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.6s |
1.8s |
1.9s |
1.7s |
1.8s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_header_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
1.4s |
1.4s |
1.5s |
2.0s |
1.4s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.8s |
2.1s |
1.6s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.9s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.9s |
fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.5s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.7s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.7s |
1.6s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.7s |
1.7s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
2.2s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.9s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.4s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.7s |
1.4s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.6s |
1.7s |
1.6s |
1.8s |
1.7s |
1.8s |
1.6s |
fw_load::fw_load_error_owner_lms_verify_failure |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.9s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.4s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.8s |
1.5s |
1.5s |
1.6s |
1.8s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.8s |
2.3s |
2.0s |
1.8s |
1.8s |
1.8s |
1.7s |
1.9s |
1.9s |
2.0s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.0s |
1.8s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
2.6s |
2.0s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.2s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
1.9s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
1.8s |
2.0s |
1.9s |
2.0s |
1.9s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.8s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.7s |
1.9s |
1.8s |
1.9s |
1.8s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.9s |
1.8s |
1.8s |
1.9s |
1.7s |
1.9s |
1.9s |
1.9s |
1.8s |
fw_load::fw_load_error_toc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.9s |
1.5s |
1.7s |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.8s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
2.7s |
2.8s |
3.1s |
2.9s |
2.6s |
2.6s |
2.7s |
2.5s |
2.6s |
2.6s |
2.8s |
2.6s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
2.9s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
2.6s |
2.6s |
2.8s |
2.7s |
2.7s |
2.4s |
2.6s |
2.4s |
2.5s |
2.4s |
2.6s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.0s |
3.1s |
2.5s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.9s |
2.8s |
2.9s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.7s |
2.6s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.4s |
2.6s |
2.5s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.8s |
3.5s |
3.5s |
3.8s |
3.6s |
2.8s |
2.6s |
2.8s |
2.6s |
2.7s |
2.6s |
2.9s |
2.8s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.0s |
1.7s |
1.7s |
2.1s |
2.1s |
1.6s |
1.6s |
1.8s |
1.7s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.8s |
1.4s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.4s |
1.7s |
1.4s |
1.8s |
1.4s |
1.6s |
1.7s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.5s |
1.4s |
1.9s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.4s |
1.5s |
1.4s |
1.7s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
1.9s |
2.0s |
1.7s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.8s |
1.7s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.5s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.8s |
1.6s |
1.9s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.6s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.3s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.7s |
1.6s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.6s |
1.6s |
1.5s |
1.3s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.7s |
2.6s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
security_parameters::attempt_ssp_access_fw_load |
1.1s |
1.1s |
1.1s |
1.1s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.7s |
0.5s |
0.6s |
self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
1.9s |
2.0s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
2.1s |
2.0s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.5s |
1.1s |
1.2s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.8s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.0s |
2.1s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.2s |
2.1s |
2.0s |
2.1s |
self_tests::kat_halt_check_no_output |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
9.4s |
9.3s |
9.6s |
10.0s |
9.4s |
9.5s |
9.3s |
9.6s |
9.5s |
9.6s |
9.3s |
9.4s |
self_tests::kat_hmac384_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
self_tests::kat_hmac384_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.2s |
2.1s |
2.0s |
2.1s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
self_tests::kat_lms_digest_mismatch_rom |
1.4s |
1.4s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.1s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.1s |
2.3s |
2.2s |
2.2s |
2.2s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.3s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.2s |
2.1s |
self_tests::kat_sha256_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.2s |
2.1s |
2.0s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.2s |
2.4s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.04s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.39s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 103.99s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 104.63s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 111.51s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 114.11s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.62s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.37s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.46s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.73s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.81s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 61.50s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.88s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.37s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
19,862 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,018 UART: csrng::test_entropy_src_seed...[ok]
439,232 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
19,949 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,756 UART: csrng::test_entropy_src_seed...[ok]
438,980 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
19,967 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,034 UART: csrng::test_entropy_src_seed...[ok]
439,320 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
19,750 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,826 UART: csrng::test_entropy_src_seed...[ok]
438,970 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
19,964 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,716 UART: csrng::test_entropy_src_seed...[ok]
438,949 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
19,967 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,039 UART: csrng::test_entropy_src_seed...[ok]
439,282 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
16,663 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
16,907 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
16,924 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
16,678 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
16,618 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
16,738 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
16,129 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
15,827 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
16,184 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
16,182 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
16,298 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
15,807 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
15,906 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,808 writing to cptra_bootfsm_go
17,729 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
16,077 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
15,835 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
15,961 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
15,990 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
15,995 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
15,880 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
15,947 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
16,045 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
12,035 writing to cptra_bootfsm_go
24,666 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
15,820 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
15,934 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
15,927 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,723 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
16,822 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
15,937 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
16,062 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
15,807 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
15,778 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
16,117 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
16,106 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
15,855 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
15,819 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
16,094 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
16,020 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
16,053 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
15,781 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
15,897 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
15,996 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
15,588 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
15,874 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
15,829 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
15,830 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
15,868 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
15,743 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
16,009 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
16,082 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
15,955 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
15,708 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
16,026 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
15,912 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
15,867 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
16,013 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
15,977 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
16,098 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
16,067 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
15,880 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
16,067 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
16,010 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
16,212 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
15,926 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
16,162 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
16,235 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
15,747 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
16,046 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
15,755 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
16,258 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
16,227 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
15,877 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
15,762 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
15,738 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
15,808 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,968 writing to cptra_bootfsm_go
16,658 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
15,977 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
15,893 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
16,008 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
16,008 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
15,851 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
15,909 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,127 writing to cptra_bootfsm_go
16,803 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
15,957 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
16,150 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
16,082 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
16,012 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
15,750 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
15,824 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
15,924 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
15,952 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
15,999 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
15,855 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
16,141 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
15,732 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
16,489 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
21,837 UART: doe::test_decrypt...[ok]
13,245,310 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
21,694 UART: doe::test_decrypt...[ok]
13,266,724 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
21,895 UART: doe::test_decrypt...[ok]
13,460,223 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
21,987 UART: doe::test_decrypt...[ok]
13,465,776 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,046 writing to cptra_bootfsm_go
21,752 UART: doe::test_decrypt...[ok]
9,957,495 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
21,686 UART: doe::test_decrypt...[ok]
9,943,504 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
21,907 UART: doe::test_decrypt...[ok]
10,196,379 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
22,063 UART: doe::test_decrypt...[ok]
10,195,694 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
21,735 UART: doe::test_decrypt...[ok]
9,942,650 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
21,970 UART: doe::test_decrypt...[ok]
9,938,502 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
22,072 UART: doe::test_decrypt...[ok]
10,195,364 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
21,945 UART: doe::test_decrypt...[ok]
10,194,616 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,803 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,887 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,011 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,995 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,269 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,445 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,577 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,795 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,169 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,683 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,437 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,049 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
22,083 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
22,169 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
22,524 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
22,553 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
22,049 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
22,314 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
22,641 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
22,639 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
22,623 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
22,240 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
22,262 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
22,464 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
29,514 UART: ecc384::test_kat...[ok]
3,328,043 UART: ecc384::test_gen_key_pair...[ok]
6,616,047 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,895,126 UART: ecc384::test_sign...[ok]
12,193,523 UART: ecc384::test_verify...[ok]
15,792,658 UART: ecc384::test_verify_r...[ok]
19,370,051 UART: ecc384::test_verify_failure...[ok]
22,956,817 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,823,434 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,975,019 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
29,675 UART: ecc384::test_kat...[ok]
3,327,817 UART: ecc384::test_gen_key_pair...[ok]
6,605,192 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,889,387 UART: ecc384::test_sign...[ok]
12,186,988 UART: ecc384::test_verify...[ok]
15,784,387 UART: ecc384::test_verify_r...[ok]
19,364,747 UART: ecc384::test_verify_failure...[ok]
22,951,657 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,822,888 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,977,349 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
30,039 UART: ecc384::test_kat...[ok]
3,697,658 UART: ecc384::test_gen_key_pair...[ok]
6,955,291 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,212,364 UART: ecc384::test_sign...[ok]
12,500,825 UART: ecc384::test_verify...[ok]
16,082,839 UART: ecc384::test_verify_r...[ok]
23,829,693 UART: ecc384::test_verify_failure...[ok]
27,412,524 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,246,963 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,334,427 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
29,737 UART: ecc384::test_kat...[ok]
3,696,118 UART: ecc384::test_gen_key_pair...[ok]
6,955,646 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,212,398 UART: ecc384::test_sign...[ok]
12,500,065 UART: ecc384::test_verify...[ok]
16,079,525 UART: ecc384::test_verify_r...[ok]
23,839,189 UART: ecc384::test_verify_failure...[ok]
27,421,357 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,251,270 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,332,808 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
29,966 UART: ecc384::test_kat...[ok]
2,499,224 UART: ecc384::test_gen_key_pair...[ok]
4,952,450 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,031 UART: ecc384::test_sign...[ok]
9,126,955 UART: ecc384::test_verify...[ok]
11,820,005 UART: ecc384::test_verify_r...[ok]
14,502,879 UART: ecc384::test_verify_failure...[ok]
17,193,483 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,339,355 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,924,691 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
29,804 UART: ecc384::test_kat...[ok]
2,496,615 UART: ecc384::test_gen_key_pair...[ok]
4,951,070 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,247 UART: ecc384::test_sign...[ok]
9,123,762 UART: ecc384::test_verify...[ok]
11,818,910 UART: ecc384::test_verify_r...[ok]
14,501,120 UART: ecc384::test_verify_failure...[ok]
17,193,301 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,335,253 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,931,882 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
29,883 UART: ecc384::test_kat...[ok]
2,882,304 UART: ecc384::test_gen_key_pair...[ok]
5,324,758 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,762,261 UART: ecc384::test_sign...[ok]
9,474,605 UART: ecc384::test_verify...[ok]
12,155,835 UART: ecc384::test_verify_r...[ok]
14,833,106 UART: ecc384::test_verify_failure...[ok]
22,938,869 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,060,260 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,609,755 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
29,876 UART: ecc384::test_kat...[ok]
2,881,929 UART: ecc384::test_gen_key_pair...[ok]
5,325,151 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,766,685 UART: ecc384::test_sign...[ok]
9,480,397 UART: ecc384::test_verify...[ok]
12,159,941 UART: ecc384::test_verify_r...[ok]
14,837,052 UART: ecc384::test_verify_failure...[ok]
22,940,738 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,058,634 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,612,096 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
29,535 UART: ecc384::test_kat...[ok]
2,498,797 UART: ecc384::test_gen_key_pair...[ok]
4,952,467 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,272 UART: ecc384::test_sign...[ok]
9,125,356 UART: ecc384::test_verify...[ok]
11,819,934 UART: ecc384::test_verify_r...[ok]
14,504,699 UART: ecc384::test_verify_failure...[ok]
17,193,165 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,334,985 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,927,426 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
29,513 UART: ecc384::test_kat...[ok]
2,500,115 UART: ecc384::test_gen_key_pair...[ok]
4,952,554 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,509 UART: ecc384::test_sign...[ok]
9,126,233 UART: ecc384::test_verify...[ok]
11,820,265 UART: ecc384::test_verify_r...[ok]
14,506,476 UART: ecc384::test_verify_failure...[ok]
17,195,667 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,336,415 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,932,478 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
29,921 UART: ecc384::test_kat...[ok]
2,883,358 UART: ecc384::test_gen_key_pair...[ok]
5,328,137 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,768,938 UART: ecc384::test_sign...[ok]
9,483,321 UART: ecc384::test_verify...[ok]
12,162,944 UART: ecc384::test_verify_r...[ok]
14,840,586 UART: ecc384::test_verify_failure...[ok]
22,934,181 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,049,803 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,606,775 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
29,804 UART: ecc384::test_kat...[ok]
2,881,224 UART: ecc384::test_gen_key_pair...[ok]
5,321,259 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,759,443 UART: ecc384::test_sign...[ok]
9,473,828 UART: ecc384::test_verify...[ok]
12,153,362 UART: ecc384::test_verify_r...[ok]
14,830,208 UART: ecc384::test_verify_failure...[ok]
22,936,795 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,053,257 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,603,221 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,629 UART: ecc384::test_gen_key_pair...[ok]
26,031 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,411 UART: ecc384::test_sign...[ok]
42,745 UART: ecc384::test_verify...[ok]
51,317 UART: ecc384::test_verify_r...[ok]
59,628 UART: ecc384::test_verify_failure...[ok]
68,614 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,152 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,625 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,507 UART: ecc384::test_gen_key_pair...[ok]
25,121 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,301 UART: ecc384::test_sign...[ok]
42,095 UART: ecc384::test_verify...[ok]
51,213 UART: ecc384::test_verify_r...[ok]
59,992 UART: ecc384::test_verify_failure...[ok]
69,016 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,518 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,599 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,067 UART: ecc384::test_gen_key_pair...[ok]
26,533 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,171 UART: ecc384::test_sign...[ok]
43,977 UART: ecc384::test_verify...[ok]
52,885 UART: ecc384::test_verify_r...[ok]
61,368 UART: ecc384::test_verify_failure...[ok]
70,320 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,938 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,503 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,867 UART: ecc384::test_gen_key_pair...[ok]
26,389 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,577 UART: ecc384::test_sign...[ok]
43,571 UART: ecc384::test_verify...[ok]
52,551 UART: ecc384::test_verify_r...[ok]
61,120 UART: ecc384::test_verify_failure...[ok]
70,066 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,806 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,777 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,431 UART: ecc384::test_gen_key_pair...[ok]
25,189 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,513 UART: ecc384::test_sign...[ok]
42,301 UART: ecc384::test_verify...[ok]
51,587 UART: ecc384::test_verify_r...[ok]
60,020 UART: ecc384::test_verify_failure...[ok]
68,824 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,290 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,401 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,389 UART: ecc384::test_gen_key_pair...[ok]
25,461 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,741 UART: ecc384::test_sign...[ok]
42,729 UART: ecc384::test_verify...[ok]
51,989 UART: ecc384::test_verify_r...[ok]
60,678 UART: ecc384::test_verify_failure...[ok]
69,156 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,262 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,319 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,675 UART: ecc384::test_gen_key_pair...[ok]
25,583 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,813 UART: ecc384::test_sign...[ok]
42,435 UART: ecc384::test_verify...[ok]
51,669 UART: ecc384::test_verify_r...[ok]
60,340 UART: ecc384::test_verify_failure...[ok]
69,632 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,578 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,319 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,739 UART: ecc384::test_gen_key_pair...[ok]
26,371 UART: ecc384::test_gen_key_pair_with_iv...[ok]
37,069 UART: ecc384::test_sign...[ok]
44,121 UART: ecc384::test_verify...[ok]
53,177 UART: ecc384::test_verify_r...[ok]
62,066 UART: ecc384::test_verify_failure...[ok]
71,112 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,690 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,697 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,297 UART: ecc384::test_gen_key_pair...[ok]
25,557 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,985 UART: ecc384::test_sign...[ok]
43,227 UART: ecc384::test_verify...[ok]
52,365 UART: ecc384::test_verify_r...[ok]
60,570 UART: ecc384::test_verify_failure...[ok]
69,518 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,720 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,755 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,407 UART: ecc384::test_gen_key_pair...[ok]
25,351 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,277 UART: ecc384::test_sign...[ok]
42,559 UART: ecc384::test_verify...[ok]
51,725 UART: ecc384::test_verify_r...[ok]
60,082 UART: ecc384::test_verify_failure...[ok]
69,006 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,722 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,583 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,497 UART: ecc384::test_gen_key_pair...[ok]
25,793 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,399 UART: ecc384::test_sign...[ok]
43,459 UART: ecc384::test_verify...[ok]
52,735 UART: ecc384::test_verify_r...[ok]
61,400 UART: ecc384::test_verify_failure...[ok]
70,114 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,540 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,285 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,589 UART: ecc384::test_gen_key_pair...[ok]
25,815 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,377 UART: ecc384::test_sign...[ok]
43,371 UART: ecc384::test_verify...[ok]
52,523 UART: ecc384::test_verify_r...[ok]
61,358 UART: ecc384::test_verify_failure...[ok]
70,154 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,890 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,117 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
19,355 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
19,222 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
19,573 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
19,555 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
19,194 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
19,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
19,724 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
19,730 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
19,441 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
19,359 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
19,643 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
19,654 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
13,559 UART: error_reporter::test_report_fw_error...[ok]
16,547 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
13,570 UART: error_reporter::test_report_fw_error...[ok]
17,451 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
14,051 UART: error_reporter::test_report_fw_error...[ok]
17,047 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
13,948 UART: error_reporter::test_report_fw_error...[ok]
16,925 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
13,639 UART: error_reporter::test_report_fw_error...[ok]
16,626 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
13,723 UART: error_reporter::test_report_fw_error...[ok]
16,737 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
13,793 UART: error_reporter::test_report_fw_error...[ok]
16,757 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
13,999 UART: error_reporter::test_report_fw_error...[ok]
16,932 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
13,716 UART: error_reporter::test_report_fw_error...[ok]
16,720 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
13,600 UART: error_reporter::test_report_fw_error...[ok]
16,593 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
13,785 UART: error_reporter::test_report_fw_error...[ok]
16,767 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
13,912 UART: error_reporter::test_report_fw_error...[ok]
16,865 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
30,959 UART: hmac384::test_kat...[ok]
70,231 UART: hmac384::test_hmac0...[ok]
87,655 UART: hmac384::test_hmac1...[ok]
109,682 UART: hmac384::test_hmac2...[ok]
6,673,792 UART: hmac384::test_hmac3...[ok]
13,264,779 UART: hmac384::test_hmac4...[ok]
19,857,122 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,448,673 UART: hmac384::test_hmac5...[ok]
29,817,151 UART: hmac384::test_kdf0...[ok]
33,144,319 UART: hmac384::test_kdf1...[ok]
36,472,750 UART: hmac384::test_kdf2...[ok]
36,501,710 UART: hmac384::test_hmac_multi_block...[ok]
36,519,595 UART: hmac384::test_hmac_exact_single_block...[ok]
36,540,767 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
30,867 UART: hmac384::test_kat...[ok]
65,478 UART: hmac384::test_hmac0...[ok]
82,605 UART: hmac384::test_hmac1...[ok]
104,443 UART: hmac384::test_hmac2...[ok]
6,686,056 UART: hmac384::test_hmac3...[ok]
13,274,840 UART: hmac384::test_hmac4...[ok]
19,862,515 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,432,306 UART: hmac384::test_hmac5...[ok]
29,802,775 UART: hmac384::test_kdf0...[ok]
33,129,681 UART: hmac384::test_kdf1...[ok]
36,456,267 UART: hmac384::test_kdf2...[ok]
36,482,801 UART: hmac384::test_hmac_multi_block...[ok]
36,501,536 UART: hmac384::test_hmac_exact_single_block...[ok]
36,522,904 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
31,079 UART: hmac384::test_kat...[ok]
455,776 UART: hmac384::test_hmac0...[ok]
653,194 UART: hmac384::test_hmac1...[ok]
858,663 UART: hmac384::test_hmac2...[ok]
7,562,093 UART: hmac384::test_hmac3...[ok]
14,073,259 UART: hmac384::test_hmac4...[ok]
20,583,422 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,094,948 UART: hmac384::test_hmac5...[ok]
30,374,965 UART: hmac384::test_kdf0...[ok]
33,647,321 UART: hmac384::test_kdf1...[ok]
36,915,432 UART: hmac384::test_kdf2...[ok]
36,930,316 UART: hmac384::test_hmac_multi_block...[ok]
40,333,080 UART: hmac384::test_hmac_exact_single_block...[ok]
40,537,684 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
31,177 UART: hmac384::test_kat...[ok]
455,664 UART: hmac384::test_hmac0...[ok]
654,460 UART: hmac384::test_hmac1...[ok]
858,992 UART: hmac384::test_hmac2...[ok]
7,557,876 UART: hmac384::test_hmac3...[ok]
14,067,699 UART: hmac384::test_hmac4...[ok]
20,582,754 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,092,167 UART: hmac384::test_hmac5...[ok]
30,368,989 UART: hmac384::test_kdf0...[ok]
33,641,654 UART: hmac384::test_kdf1...[ok]
36,912,596 UART: hmac384::test_kdf2...[ok]
36,928,313 UART: hmac384::test_hmac_multi_block...[ok]
40,327,849 UART: hmac384::test_hmac_exact_single_block...[ok]
40,531,882 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
30,674 UART: hmac384::test_kat...[ok]
70,807 UART: hmac384::test_hmac0...[ok]
87,303 UART: hmac384::test_hmac1...[ok]
108,550 UART: hmac384::test_hmac2...[ok]
5,034,561 UART: hmac384::test_hmac3...[ok]
9,964,386 UART: hmac384::test_hmac4...[ok]
14,889,167 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,239 UART: hmac384::test_hmac5...[ok]
22,355,964 UART: hmac384::test_kdf0...[ok]
24,852,860 UART: hmac384::test_kdf1...[ok]
27,347,315 UART: hmac384::test_kdf2...[ok]
27,374,932 UART: hmac384::test_hmac_multi_block...[ok]
27,393,589 UART: hmac384::test_hmac_exact_single_block...[ok]
27,413,816 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
30,683 UART: hmac384::test_kat...[ok]
77,896 UART: hmac384::test_hmac0...[ok]
95,142 UART: hmac384::test_hmac1...[ok]
115,883 UART: hmac384::test_hmac2...[ok]
5,041,670 UART: hmac384::test_hmac3...[ok]
9,960,991 UART: hmac384::test_hmac4...[ok]
14,890,459 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,939 UART: hmac384::test_hmac5...[ok]
22,355,285 UART: hmac384::test_kdf0...[ok]
24,851,762 UART: hmac384::test_kdf1...[ok]
27,345,968 UART: hmac384::test_kdf2...[ok]
27,374,412 UART: hmac384::test_hmac_multi_block...[ok]
27,393,164 UART: hmac384::test_hmac_exact_single_block...[ok]
27,414,418 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
30,795 UART: hmac384::test_kat...[ok]
453,300 UART: hmac384::test_hmac0...[ok]
652,137 UART: hmac384::test_hmac1...[ok]
856,843 UART: hmac384::test_hmac2...[ok]
5,928,784 UART: hmac384::test_hmac3...[ok]
10,807,621 UART: hmac384::test_hmac4...[ok]
15,687,602 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,567,396 UART: hmac384::test_hmac5...[ok]
23,032,100 UART: hmac384::test_kdf0...[ok]
25,485,874 UART: hmac384::test_kdf1...[ok]
27,934,662 UART: hmac384::test_kdf2...[ok]
27,949,601 UART: hmac384::test_hmac_multi_block...[ok]
27,961,736 UART: hmac384::test_hmac_exact_single_block...[ok]
27,972,863 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
30,962 UART: hmac384::test_kat...[ok]
453,903 UART: hmac384::test_hmac0...[ok]
653,520 UART: hmac384::test_hmac1...[ok]
857,437 UART: hmac384::test_hmac2...[ok]
5,928,093 UART: hmac384::test_hmac3...[ok]
10,803,361 UART: hmac384::test_hmac4...[ok]
15,680,016 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,563,646 UART: hmac384::test_hmac5...[ok]
23,025,267 UART: hmac384::test_kdf0...[ok]
25,475,751 UART: hmac384::test_kdf1...[ok]
27,923,684 UART: hmac384::test_kdf2...[ok]
27,939,250 UART: hmac384::test_hmac_multi_block...[ok]
27,949,855 UART: hmac384::test_hmac_exact_single_block...[ok]
27,961,748 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
30,734 UART: hmac384::test_kat...[ok]
71,173 UART: hmac384::test_hmac0...[ok]
86,617 UART: hmac384::test_hmac1...[ok]
108,081 UART: hmac384::test_hmac2...[ok]
5,032,842 UART: hmac384::test_hmac3...[ok]
9,959,651 UART: hmac384::test_hmac4...[ok]
14,887,376 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,803,389 UART: hmac384::test_hmac5...[ok]
22,338,861 UART: hmac384::test_kdf0...[ok]
24,834,982 UART: hmac384::test_kdf1...[ok]
27,332,260 UART: hmac384::test_kdf2...[ok]
27,357,075 UART: hmac384::test_hmac_multi_block...[ok]
27,376,258 UART: hmac384::test_hmac_exact_single_block...[ok]
27,396,399 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
30,600 UART: hmac384::test_kat...[ok]
70,223 UART: hmac384::test_hmac0...[ok]
87,182 UART: hmac384::test_hmac1...[ok]
107,294 UART: hmac384::test_hmac2...[ok]
5,032,542 UART: hmac384::test_hmac3...[ok]
9,961,740 UART: hmac384::test_hmac4...[ok]
14,887,535 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,817,065 UART: hmac384::test_hmac5...[ok]
22,352,675 UART: hmac384::test_kdf0...[ok]
24,848,252 UART: hmac384::test_kdf1...[ok]
27,344,464 UART: hmac384::test_kdf2...[ok]
27,370,568 UART: hmac384::test_hmac_multi_block...[ok]
27,389,608 UART: hmac384::test_hmac_exact_single_block...[ok]
27,410,059 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
30,877 UART: hmac384::test_kat...[ok]
454,531 UART: hmac384::test_hmac0...[ok]
652,425 UART: hmac384::test_hmac1...[ok]
858,273 UART: hmac384::test_hmac2...[ok]
5,929,999 UART: hmac384::test_hmac3...[ok]
10,808,791 UART: hmac384::test_hmac4...[ok]
15,686,069 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,571,274 UART: hmac384::test_hmac5...[ok]
23,030,926 UART: hmac384::test_kdf0...[ok]
25,485,263 UART: hmac384::test_kdf1...[ok]
27,935,280 UART: hmac384::test_kdf2...[ok]
27,950,290 UART: hmac384::test_hmac_multi_block...[ok]
27,961,453 UART: hmac384::test_hmac_exact_single_block...[ok]
27,975,028 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
30,976 UART: hmac384::test_kat...[ok]
453,330 UART: hmac384::test_hmac0...[ok]
652,331 UART: hmac384::test_hmac1...[ok]
856,958 UART: hmac384::test_hmac2...[ok]
5,927,112 UART: hmac384::test_hmac3...[ok]
10,808,878 UART: hmac384::test_hmac4...[ok]
15,685,181 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,564,623 UART: hmac384::test_hmac5...[ok]
23,025,162 UART: hmac384::test_kdf0...[ok]
25,480,814 UART: hmac384::test_kdf1...[ok]
27,933,664 UART: hmac384::test_kdf2...[ok]
27,947,004 UART: hmac384::test_hmac_multi_block...[ok]
27,959,441 UART: hmac384::test_hmac_exact_single_block...[ok]
27,970,622 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,712 UART: hmac384::test_hmac0...[ok]
13,685 UART: hmac384::test_hmac1...[ok]
17,778 UART: hmac384::test_hmac2...[ok]
37,571 UART: hmac384::test_hmac3...[ok]
57,995 UART: hmac384::test_hmac4...[ok]
78,782 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,985 UART: hmac384::test_hmac5...[ok]
122,205 UART: hmac384::test_kdf0...[ok]
138,859 UART: hmac384::test_kdf1...[ok]
154,395 UART: hmac384::test_kdf2...[ok]
159,824 UART: hmac384::test_hmac_multi_block...[ok]
165,817 UART: hmac384::test_hmac_exact_single_block...[ok]
171,769 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,744 UART: hmac384::test_hmac0...[ok]
13,715 UART: hmac384::test_hmac1...[ok]
17,810 UART: hmac384::test_hmac2...[ok]
38,121 UART: hmac384::test_hmac3...[ok]
57,803 UART: hmac384::test_hmac4...[ok]
77,394 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,003 UART: hmac384::test_hmac5...[ok]
120,693 UART: hmac384::test_kdf0...[ok]
136,843 UART: hmac384::test_kdf1...[ok]
152,343 UART: hmac384::test_kdf2...[ok]
157,956 UART: hmac384::test_hmac_multi_block...[ok]
163,695 UART: hmac384::test_hmac_exact_single_block...[ok]
169,735 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,954 UART: hmac384::test_hmac0...[ok]
14,159 UART: hmac384::test_hmac1...[ok]
18,382 UART: hmac384::test_hmac2...[ok]
38,383 UART: hmac384::test_hmac3...[ok]
58,115 UART: hmac384::test_hmac4...[ok]
78,304 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,515 UART: hmac384::test_hmac5...[ok]
122,457 UART: hmac384::test_kdf0...[ok]
138,979 UART: hmac384::test_kdf1...[ok]
155,489 UART: hmac384::test_kdf2...[ok]
161,266 UART: hmac384::test_hmac_multi_block...[ok]
167,457 UART: hmac384::test_hmac_exact_single_block...[ok]
173,673 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,814 UART: hmac384::test_hmac0...[ok]
14,085 UART: hmac384::test_hmac1...[ok]
18,140 UART: hmac384::test_hmac2...[ok]
38,269 UART: hmac384::test_hmac3...[ok]
58,735 UART: hmac384::test_hmac4...[ok]
79,002 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,083 UART: hmac384::test_hmac5...[ok]
122,827 UART: hmac384::test_kdf0...[ok]
139,393 UART: hmac384::test_kdf1...[ok]
155,555 UART: hmac384::test_kdf2...[ok]
161,452 UART: hmac384::test_hmac_multi_block...[ok]
167,489 UART: hmac384::test_hmac_exact_single_block...[ok]
173,559 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,896 UART: hmac384::test_hmac0...[ok]
13,987 UART: hmac384::test_hmac1...[ok]
18,264 UART: hmac384::test_hmac2...[ok]
38,251 UART: hmac384::test_hmac3...[ok]
57,585 UART: hmac384::test_hmac4...[ok]
77,654 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,627 UART: hmac384::test_hmac5...[ok]
121,551 UART: hmac384::test_kdf0...[ok]
137,719 UART: hmac384::test_kdf1...[ok]
153,117 UART: hmac384::test_kdf2...[ok]
158,754 UART: hmac384::test_hmac_multi_block...[ok]
164,707 UART: hmac384::test_hmac_exact_single_block...[ok]
170,729 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,498 UART: hmac384::test_hmac0...[ok]
13,421 UART: hmac384::test_hmac1...[ok]
17,604 UART: hmac384::test_hmac2...[ok]
37,443 UART: hmac384::test_hmac3...[ok]
57,141 UART: hmac384::test_hmac4...[ok]
77,218 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,697 UART: hmac384::test_hmac5...[ok]
120,339 UART: hmac384::test_kdf0...[ok]
136,767 UART: hmac384::test_kdf1...[ok]
152,047 UART: hmac384::test_kdf2...[ok]
157,700 UART: hmac384::test_hmac_multi_block...[ok]
163,497 UART: hmac384::test_hmac_exact_single_block...[ok]
169,547 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,892 UART: hmac384::test_hmac0...[ok]
14,199 UART: hmac384::test_hmac1...[ok]
18,528 UART: hmac384::test_hmac2...[ok]
38,679 UART: hmac384::test_hmac3...[ok]
58,955 UART: hmac384::test_hmac4...[ok]
79,370 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,769 UART: hmac384::test_hmac5...[ok]
124,235 UART: hmac384::test_kdf0...[ok]
141,075 UART: hmac384::test_kdf1...[ok]
156,453 UART: hmac384::test_kdf2...[ok]
162,388 UART: hmac384::test_hmac_multi_block...[ok]
168,481 UART: hmac384::test_hmac_exact_single_block...[ok]
174,411 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,800 UART: hmac384::test_hmac0...[ok]
14,189 UART: hmac384::test_hmac1...[ok]
18,408 UART: hmac384::test_hmac2...[ok]
38,837 UART: hmac384::test_hmac3...[ok]
58,481 UART: hmac384::test_hmac4...[ok]
78,758 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,157 UART: hmac384::test_hmac5...[ok]
122,911 UART: hmac384::test_kdf0...[ok]
139,611 UART: hmac384::test_kdf1...[ok]
155,721 UART: hmac384::test_kdf2...[ok]
161,216 UART: hmac384::test_hmac_multi_block...[ok]
167,061 UART: hmac384::test_hmac_exact_single_block...[ok]
173,215 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,598 UART: hmac384::test_hmac0...[ok]
13,747 UART: hmac384::test_hmac1...[ok]
18,018 UART: hmac384::test_hmac2...[ok]
38,073 UART: hmac384::test_hmac3...[ok]
57,563 UART: hmac384::test_hmac4...[ok]
77,506 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,073 UART: hmac384::test_hmac5...[ok]
121,243 UART: hmac384::test_kdf0...[ok]
137,715 UART: hmac384::test_kdf1...[ok]
153,621 UART: hmac384::test_kdf2...[ok]
159,178 UART: hmac384::test_hmac_multi_block...[ok]
165,133 UART: hmac384::test_hmac_exact_single_block...[ok]
170,961 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,540 UART: hmac384::test_hmac0...[ok]
13,569 UART: hmac384::test_hmac1...[ok]
17,520 UART: hmac384::test_hmac2...[ok]
36,761 UART: hmac384::test_hmac3...[ok]
56,661 UART: hmac384::test_hmac4...[ok]
77,164 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,479 UART: hmac384::test_hmac5...[ok]
120,269 UART: hmac384::test_kdf0...[ok]
136,839 UART: hmac384::test_kdf1...[ok]
152,271 UART: hmac384::test_kdf2...[ok]
157,770 UART: hmac384::test_hmac_multi_block...[ok]
163,689 UART: hmac384::test_hmac_exact_single_block...[ok]
169,515 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,928 UART: hmac384::test_hmac0...[ok]
14,159 UART: hmac384::test_hmac1...[ok]
18,512 UART: hmac384::test_hmac2...[ok]
38,973 UART: hmac384::test_hmac3...[ok]
58,563 UART: hmac384::test_hmac4...[ok]
78,546 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,587 UART: hmac384::test_hmac5...[ok]
122,701 UART: hmac384::test_kdf0...[ok]
139,719 UART: hmac384::test_kdf1...[ok]
155,505 UART: hmac384::test_kdf2...[ok]
161,274 UART: hmac384::test_hmac_multi_block...[ok]
167,327 UART: hmac384::test_hmac_exact_single_block...[ok]
173,273 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,740 UART: hmac384::test_hmac0...[ok]
14,121 UART: hmac384::test_hmac1...[ok]
18,230 UART: hmac384::test_hmac2...[ok]
38,605 UART: hmac384::test_hmac3...[ok]
58,597 UART: hmac384::test_hmac4...[ok]
78,706 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,765 UART: hmac384::test_hmac5...[ok]
122,491 UART: hmac384::test_kdf0...[ok]
139,113 UART: hmac384::test_kdf1...[ok]
154,735 UART: hmac384::test_kdf2...[ok]
160,516 UART: hmac384::test_hmac_multi_block...[ok]
166,695 UART: hmac384::test_hmac_exact_single_block...[ok]
172,873 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
23,685 UART: test_lms_24::test_coefficient...[ok]
26,420 UART: test_lms_24::test_get_lms_parameters...[ok]
29,389 UART: test_lms_24::test_hash_message_24...[ok]
42,190 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
23,477 UART: test_lms_24::test_coefficient...[ok]
26,264 UART: test_lms_24::test_get_lms_parameters...[ok]
29,232 UART: test_lms_24::test_hash_message_24...[ok]
41,940 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
23,808 UART: test_lms_24::test_coefficient...[ok]
26,516 UART: test_lms_24::test_get_lms_parameters...[ok]
29,549 UART: test_lms_24::test_hash_message_24...[ok]
42,302 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
23,666 UART: test_lms_24::test_coefficient...[ok]
26,404 UART: test_lms_24::test_get_lms_parameters...[ok]
29,405 UART: test_lms_24::test_hash_message_24...[ok]
42,146 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
24,596 UART: test_lms_24::test_coefficient...[ok]
27,743 UART: test_lms_24::test_get_lms_parameters...[ok]
31,210 UART: test_lms_24::test_hash_message_24...[ok]
44,641 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
23,645 UART: test_lms_24::test_coefficient...[ok]
26,841 UART: test_lms_24::test_get_lms_parameters...[ok]
30,854 UART: test_lms_24::test_hash_message_24...[ok]
43,662 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
24,151 UART: test_lms_24::test_coefficient...[ok]
27,274 UART: test_lms_24::test_get_lms_parameters...[ok]
30,766 UART: test_lms_24::test_hash_message_24...[ok]
44,140 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
23,932 UART: test_lms_24::test_coefficient...[ok]
27,038 UART: test_lms_24::test_get_lms_parameters...[ok]
30,518 UART: test_lms_24::test_hash_message_24...[ok]
43,930 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
23,762 UART: test_lms_24::test_coefficient...[ok]
26,907 UART: test_lms_24::test_get_lms_parameters...[ok]
31,354 UART: test_lms_24::test_hash_message_24...[ok]
43,759 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
23,684 UART: test_lms_24::test_coefficient...[ok]
26,804 UART: test_lms_24::test_get_lms_parameters...[ok]
30,313 UART: test_lms_24::test_hash_message_24...[ok]
43,679 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
24,190 UART: test_lms_24::test_coefficient...[ok]
27,321 UART: test_lms_24::test_get_lms_parameters...[ok]
30,824 UART: test_lms_24::test_hash_message_24...[ok]
44,222 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
24,045 UART: test_lms_24::test_coefficient...[ok]
27,232 UART: test_lms_24::test_get_lms_parameters...[ok]
30,682 UART: test_lms_24::test_hash_message_24...[ok]
44,047 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
22,889 UART: test_lms_32::test_hash_message_32...[ok]
42,088 UART: test_lms_32::test_ots_32...[ok]
21,831,150 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,314 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
22,702 UART: test_lms_32::test_hash_message_32...[ok]
41,905 UART: test_lms_32::test_ots_32...[ok]
21,830,960 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,006 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
23,104 UART: test_lms_32::test_hash_message_32...[ok]
42,345 UART: test_lms_32::test_ots_32...[ok]
21,831,396 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,511 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
23,751 UART: test_lms_32::test_hash_message_32...[ok]
42,107 UART: test_lms_32::test_ots_32...[ok]
21,831,237 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,346 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
23,203 UART: test_lms_32::test_hash_message_32...[ok]
42,497 UART: test_lms_32::test_ots_32...[ok]
653,513 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,408 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
22,871 UART: test_lms_32::test_hash_message_32...[ok]
42,109 UART: test_lms_32::test_ots_32...[ok]
653,156 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,030 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
23,273 UART: test_lms_32::test_hash_message_32...[ok]
42,558 UART: test_lms_32::test_ots_32...[ok]
653,628 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,446 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,778 writing to cptra_bootfsm_go
23,842 UART: test_lms_32::test_hash_message_32...[ok]
43,067 UART: test_lms_32::test_ots_32...[ok]
654,145 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,998 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
22,935 UART: test_lms_32::test_hash_message_32...[ok]
42,192 UART: test_lms_32::test_ots_32...[ok]
653,261 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,081 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
22,831 UART: test_lms_32::test_hash_message_32...[ok]
42,119 UART: test_lms_32::test_ots_32...[ok]
653,142 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,030 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
23,271 UART: test_lms_32::test_hash_message_32...[ok]
42,557 UART: test_lms_32::test_ots_32...[ok]
653,628 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,474 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
23,291 UART: test_lms_32::test_hash_message_32...[ok]
42,503 UART: test_lms_32::test_ots_32...[ok]
653,603 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,470 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,314 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,482 UART: cmd: 0x50000000
19,283 UART: dlen: 8
20,345 >>> mbox cmd response: success
20,782 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,659 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,355 UART: cmd: 0x50000000
29,234 UART: dlen: 7
30,288 >>> mbox cmd response: success
30,779 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,872 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,576 UART: cmd: 0x50000000
39,471 UART: dlen: 0
40,475 >>> mbox cmd response: success
40,896 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,173 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,868 UART: cmd: 0x50000001
49,747 UART: dlen: 5
50,797 >>> mbox cmd response: success
51,271 UART: buf: [01, 23, 45, 67, 89]
55,920 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,612 UART: cmd: 0x50000001
58,490 UART: dlen: 6
59,533 >>> mbox cmd response: success
60,053 UART: buf: [01, 23, 45, 67, 89]
64,656 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,356 UART: cmd: 0x50000001
67,234 UART: dlen: 9
68,278 >>> mbox cmd response: success
68,746 UART: buf: [01, 23, 45, 67, 89]
73,378 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,081 UART: cmd: 0x60000000
75,971 UART: dlen: 16
77,453 UART: buf: [67452301, efcdab89]
81,001 UART: buf: [33221100, 77665544]
84,158 >>> mbox cmd response: success
84,416 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,104 UART: cmd: 0x60000000
87,035 UART: dlen: 13
88,505 UART: buf: [67452301, efcdab89]
91,990 UART: buf: [33221100, 00000044]
95,389 >>> mbox cmd response: success
95,647 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,337 UART: cmd: 0x60000000
98,213 UART: dlen: 12
99,737 UART: buf: [67452301, efcdab89]
103,228 UART: buf: [33221100, 00000000]
106,598 >>> mbox cmd response: success
106,850 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,519 UART: cmd: 0x60000000
109,391 UART: dlen: 0
110,432 >>> mbox cmd response: success
110,686 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,361 UART: cmd: 0x70000000
113,147 >>> mbox cmd response: success
113,420 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,107 UART: cmd: 0x60000000
115,964 UART: dlen: 5
117,512 UART: buf: [04050607, 00000003]
120,999 >>> mbox cmd response: success
121,253 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,926 UART: cmd: 0x80000000
123,511 >>> mbox cmd response: failed
123,815 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,496 UART: cmd: 0x60000000
126,372 UART: dlen: 5
127,858 UART: buf: [04050607, 00000003]
131,340 >>> mbox cmd response: success
131,590 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,266 UART: cmd: 0x90000000
134,193 UART: dlen: 8
135,626 UART: buf: [08070605]
137,653 >>> mbox cmd response: success
137,927 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,595 UART: cmd: 0xa0000000
140,148 >>> mbox cmd response data (4 bytes)
140,536 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,224 UART: cmd: 0xb0000000
143,102 UART: dlen: 6
144,582 UART: buf: [0c0d0e0f, 00000a0b]
148,193 >>> mbox cmd response data (2 bytes)
148,553 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,226 UART: cmd: 0xc0000000
150,889 >>> mbox cmd response data (9 bytes)
151,272 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,944 UART: cmd: 0xd0000000
153,500 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,713 writing to cptra_bootfsm_go
4,267 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
18,437 UART: cmd: 0x50000000
20,233 UART: dlen: 8
21,287 >>> mbox cmd response: success
21,741 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,612 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
28,314 UART: cmd: 0x50000000
30,195 UART: dlen: 7
31,243 >>> mbox cmd response: success
31,712 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,741 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,430 UART: cmd: 0x50000000
40,309 UART: dlen: 0
41,299 >>> mbox cmd response: success
41,768 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,037 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,735 UART: cmd: 0x50000001
50,615 UART: dlen: 5
51,716 >>> mbox cmd response: success
52,184 UART: buf: [01, 23, 45, 67, 89]
56,773 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,467 UART: cmd: 0x50000001
59,354 UART: dlen: 6
60,397 >>> mbox cmd response: success
60,860 UART: buf: [01, 23, 45, 67, 89]
65,497 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,193 UART: cmd: 0x50000001
68,123 UART: dlen: 9
69,164 >>> mbox cmd response: success
69,632 UART: buf: [01, 23, 45, 67, 89]
74,200 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,903 UART: cmd: 0x60000000
76,780 UART: dlen: 16
78,311 UART: buf: [67452301, efcdab89]
81,861 UART: buf: [33221100, 77665544]
85,020 >>> mbox cmd response: success
85,315 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,011 UART: cmd: 0x60000000
87,899 UART: dlen: 13
89,376 UART: buf: [67452301, efcdab89]
92,919 UART: buf: [33221100, 00000044]
96,292 >>> mbox cmd response: success
96,550 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,237 UART: cmd: 0x60000000
99,117 UART: dlen: 12
100,588 UART: buf: [67452301, efcdab89]
104,126 UART: buf: [33221100, 00000000]
107,489 >>> mbox cmd response: success
107,744 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,413 UART: cmd: 0x60000000
110,282 UART: dlen: 0
111,323 >>> mbox cmd response: success
111,599 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,274 UART: cmd: 0x70000000
113,862 >>> mbox cmd response: success
114,113 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,792 UART: cmd: 0x60000000
116,666 UART: dlen: 5
118,200 UART: buf: [04050607, 00000003]
121,686 >>> mbox cmd response: success
121,945 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,621 UART: cmd: 0x80000000
124,212 >>> mbox cmd response: failed
124,509 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,185 UART: cmd: 0x60000000
127,058 UART: dlen: 5
128,547 UART: buf: [04050607, 00000003]
132,024 >>> mbox cmd response: success
132,300 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,983 UART: cmd: 0x90000000
134,855 UART: dlen: 8
136,289 UART: buf: [08070605]
138,369 >>> mbox cmd response: success
138,627 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,298 UART: cmd: 0xa0000000
140,852 >>> mbox cmd response data (4 bytes)
141,256 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,945 UART: cmd: 0xb0000000
143,829 UART: dlen: 6
145,312 UART: buf: [0c0d0e0f, 00000a0b]
148,857 >>> mbox cmd response data (2 bytes)
149,223 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,898 UART: cmd: 0xc0000000
151,565 >>> mbox cmd response data (9 bytes)
151,968 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,645 UART: cmd: 0xd0000000
154,200 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,660 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,814 UART: cmd: 0x50000000
19,623 UART: dlen: 8
20,698 >>> mbox cmd response: success
21,147 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,194 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,945 UART: cmd: 0x50000000
29,800 UART: dlen: 7
30,885 >>> mbox cmd response: success
31,376 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,365 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,101 UART: cmd: 0x50000000
39,996 UART: dlen: 0
40,956 >>> mbox cmd response: success
41,454 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,794 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,509 UART: cmd: 0x50000001
50,396 UART: dlen: 5
51,444 >>> mbox cmd response: success
51,919 UART: buf: [01, 23, 45, 67, 89]
56,559 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,263 UART: cmd: 0x50000001
59,143 UART: dlen: 6
60,190 >>> mbox cmd response: success
60,665 UART: buf: [01, 23, 45, 67, 89]
65,255 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,963 UART: cmd: 0x50000001
67,865 UART: dlen: 9
68,910 >>> mbox cmd response: success
69,387 UART: buf: [01, 23, 45, 67, 89]
73,979 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,693 UART: cmd: 0x60000000
76,625 UART: dlen: 16
78,100 UART: buf: [67452301, efcdab89]
81,640 UART: buf: [33221100, 77665544]
84,788 >>> mbox cmd response: success
85,054 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,760 UART: cmd: 0x60000000
87,647 UART: dlen: 13
89,126 UART: buf: [67452301, efcdab89]
92,672 UART: buf: [33221100, 00000044]
96,042 >>> mbox cmd response: success
96,313 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,051 UART: cmd: 0x60000000
98,938 UART: dlen: 12
100,412 UART: buf: [67452301, efcdab89]
103,904 UART: buf: [33221100, 00000000]
107,349 >>> mbox cmd response: success
107,631 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,318 UART: cmd: 0x60000000
110,203 UART: dlen: 0
111,249 >>> mbox cmd response: success
111,513 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,198 UART: cmd: 0x70000000
113,787 >>> mbox cmd response: success
114,047 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,738 UART: cmd: 0x60000000
116,615 UART: dlen: 5
118,101 UART: buf: [04050607, 00000003]
121,659 >>> mbox cmd response: success
121,923 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,610 UART: cmd: 0x80000000
124,200 >>> mbox cmd response: failed
124,509 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,201 UART: cmd: 0x60000000
127,079 UART: dlen: 5
128,524 UART: buf: [04050607, 00000003]
132,052 >>> mbox cmd response: success
132,314 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,003 UART: cmd: 0x90000000
134,889 UART: dlen: 8
136,327 UART: buf: [08070605]
138,407 >>> mbox cmd response: success
138,666 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,358 UART: cmd: 0xa0000000
140,936 >>> mbox cmd response data (4 bytes)
141,350 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,046 UART: cmd: 0xb0000000
143,932 UART: dlen: 6
145,418 UART: buf: [0c0d0e0f, 00000a0b]
148,973 >>> mbox cmd response data (2 bytes)
149,347 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,037 UART: cmd: 0xc0000000
151,710 >>> mbox cmd response data (9 bytes)
152,104 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,792 UART: cmd: 0xd0000000
154,351 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
13,941 writing to cptra_bootfsm_go
14,649 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
28,761 UART: cmd: 0x50000000
30,586 UART: dlen: 8
31,654 >>> mbox cmd response: success
32,075 UART: buf: [67452301, efcdab89, 00000000, 00000000]
38,060 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
38,821 UART: cmd: 0x50000000
40,695 UART: dlen: 7
41,797 >>> mbox cmd response: success
42,228 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
48,243 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
48,945 UART: cmd: 0x50000000
50,832 UART: dlen: 0
51,827 >>> mbox cmd response: success
52,251 UART: buf: [00000000, 00000000, 00000000, 00000000]
58,536 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
59,242 UART: cmd: 0x50000001
61,126 UART: dlen: 5
62,177 >>> mbox cmd response: success
62,654 UART: buf: [01, 23, 45, 67, 89]
67,319 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
68,026 UART: cmd: 0x50000001
69,925 UART: dlen: 6
70,973 >>> mbox cmd response: success
71,449 UART: buf: [01, 23, 45, 67, 89]
76,046 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
76,758 UART: cmd: 0x50000001
78,643 UART: dlen: 9
79,690 >>> mbox cmd response: success
80,164 UART: buf: [01, 23, 45, 67, 89]
84,866 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
85,593 UART: cmd: 0x60000000
87,488 UART: dlen: 16
88,971 UART: buf: [67452301, efcdab89]
92,533 UART: buf: [33221100, 77665544]
95,688 >>> mbox cmd response: success
95,976 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
96,683 UART: cmd: 0x60000000
98,618 UART: dlen: 13
100,094 UART: buf: [67452301, efcdab89]
103,588 UART: buf: [33221100, 00000044]
106,960 >>> mbox cmd response: success
107,221 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
107,912 UART: cmd: 0x60000000
109,789 UART: dlen: 12
111,266 UART: buf: [67452301, efcdab89]
114,758 UART: buf: [33221100, 00000000]
118,136 >>> mbox cmd response: success
118,402 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
119,085 UART: cmd: 0x60000000
120,970 UART: dlen: 0
122,018 >>> mbox cmd response: success
122,303 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
122,990 UART: cmd: 0x70000000
124,582 >>> mbox cmd response: success
124,842 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,532 UART: cmd: 0x60000000
127,412 UART: dlen: 5
128,898 UART: buf: [04050607, 00000003]
132,396 >>> mbox cmd response: success
132,658 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
133,344 UART: cmd: 0x80000000
134,881 >>> mbox cmd response: failed
135,185 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
135,874 UART: cmd: 0x60000000
137,753 UART: dlen: 5
139,244 UART: buf: [04050607, 00000003]
142,726 >>> mbox cmd response: success
143,006 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
143,707 UART: cmd: 0x90000000
145,597 UART: dlen: 8
147,041 UART: buf: [08070605]
149,139 >>> mbox cmd response: success
149,403 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
150,085 UART: cmd: 0xa0000000
151,650 >>> mbox cmd response data (4 bytes)
152,063 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
152,767 UART: cmd: 0xb0000000
154,661 UART: dlen: 6
156,145 UART: buf: [0c0d0e0f, 00000a0b]
159,706 >>> mbox cmd response data (2 bytes)
160,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
160,781 UART: cmd: 0xc0000000
162,454 >>> mbox cmd response data (9 bytes)
163,058 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
163,785 UART: cmd: 0xd0000000
165,368 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,397 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,540 UART: cmd: 0x50000000
19,344 UART: dlen: 8
20,407 >>> mbox cmd response: success
20,847 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,741 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,441 UART: cmd: 0x50000000
29,290 UART: dlen: 7
30,407 >>> mbox cmd response: success
30,879 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,843 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,529 UART: cmd: 0x50000000
39,411 UART: dlen: 0
40,403 >>> mbox cmd response: success
40,877 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,847 UART: cmd: 0x50000001
49,725 UART: dlen: 5
50,823 >>> mbox cmd response: success
51,298 UART: buf: [01, 23, 45, 67, 89]
55,881 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,580 UART: cmd: 0x50000001
58,458 UART: dlen: 6
59,523 >>> mbox cmd response: success
59,992 UART: buf: [01, 23, 45, 67, 89]
64,583 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,288 UART: cmd: 0x50000001
67,163 UART: dlen: 9
68,208 >>> mbox cmd response: success
68,682 UART: buf: [01, 23, 45, 67, 89]
73,318 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,506 UART: cmd: 0x60000000
76,429 UART: dlen: 16
77,911 UART: buf: [67452301, efcdab89]
81,461 UART: buf: [33221100, 77665544]
84,554 >>> mbox cmd response: success
84,827 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,526 UART: cmd: 0x60000000
87,457 UART: dlen: 13
88,898 UART: buf: [67452301, efcdab89]
92,391 UART: buf: [33221100, 00000044]
95,816 >>> mbox cmd response: success
96,078 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,773 UART: cmd: 0x60000000
98,647 UART: dlen: 12
100,126 UART: buf: [67452301, efcdab89]
103,668 UART: buf: [33221100, 00000000]
107,039 >>> mbox cmd response: success
107,300 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,972 UART: cmd: 0x60000000
109,845 UART: dlen: 0
110,888 >>> mbox cmd response: success
111,148 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,835 UART: cmd: 0x70000000
113,424 >>> mbox cmd response: success
113,698 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,379 UART: cmd: 0x60000000
116,251 UART: dlen: 5
117,734 UART: buf: [04050607, 00000003]
121,272 >>> mbox cmd response: success
121,529 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,205 UART: cmd: 0x80000000
123,790 >>> mbox cmd response: failed
124,088 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,772 UART: cmd: 0x60000000
126,643 UART: dlen: 5
128,135 UART: buf: [04050607, 00000003]
131,615 >>> mbox cmd response: success
131,865 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,544 UART: cmd: 0x90000000
134,424 UART: dlen: 8
135,880 UART: buf: [08070605]
137,914 >>> mbox cmd response: success
138,171 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,841 UART: cmd: 0xa0000000
140,396 >>> mbox cmd response data (4 bytes)
140,790 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,483 UART: cmd: 0xb0000000
143,363 UART: dlen: 6
144,843 UART: buf: [0c0d0e0f, 00000a0b]
148,445 >>> mbox cmd response data (2 bytes)
148,814 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,486 UART: cmd: 0xc0000000
151,153 >>> mbox cmd response data (9 bytes)
151,538 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,215 UART: cmd: 0xd0000000
153,957 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,168 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,346 UART: cmd: 0x50000000
19,140 UART: dlen: 8
20,200 >>> mbox cmd response: success
20,638 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,818 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,543 UART: cmd: 0x50000000
29,442 UART: dlen: 7
30,504 >>> mbox cmd response: success
30,979 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,956 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,647 UART: cmd: 0x50000000
39,532 UART: dlen: 0
40,526 >>> mbox cmd response: success
41,000 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,307 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,009 UART: cmd: 0x50000001
49,899 UART: dlen: 5
50,949 >>> mbox cmd response: success
51,420 UART: buf: [01, 23, 45, 67, 89]
56,061 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,758 UART: cmd: 0x50000001
58,638 UART: dlen: 6
59,683 >>> mbox cmd response: success
60,202 UART: buf: [01, 23, 45, 67, 89]
64,782 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,479 UART: cmd: 0x50000001
67,367 UART: dlen: 9
68,409 >>> mbox cmd response: success
68,881 UART: buf: [01, 23, 45, 67, 89]
73,469 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,193 UART: cmd: 0x60000000
76,068 UART: dlen: 16
77,594 UART: buf: [67452301, efcdab89]
81,135 UART: buf: [33221100, 77665544]
84,284 >>> mbox cmd response: success
84,548 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,241 UART: cmd: 0x60000000
87,173 UART: dlen: 13
88,643 UART: buf: [67452301, efcdab89]
92,130 UART: buf: [33221100, 00000044]
95,505 >>> mbox cmd response: success
95,764 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,455 UART: cmd: 0x60000000
98,329 UART: dlen: 12
99,859 UART: buf: [67452301, efcdab89]
103,348 UART: buf: [33221100, 00000000]
106,748 >>> mbox cmd response: success
107,024 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,701 UART: cmd: 0x60000000
109,586 UART: dlen: 0
110,636 >>> mbox cmd response: success
110,897 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,576 UART: cmd: 0x70000000
113,167 >>> mbox cmd response: success
113,432 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,115 UART: cmd: 0x60000000
115,985 UART: dlen: 5
117,525 UART: buf: [04050607, 00000003]
121,007 >>> mbox cmd response: success
121,271 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,947 UART: cmd: 0x80000000
123,534 >>> mbox cmd response: failed
123,860 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,542 UART: cmd: 0x60000000
126,417 UART: dlen: 5
127,901 UART: buf: [04050607, 00000003]
131,395 >>> mbox cmd response: success
131,653 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,336 UART: cmd: 0x90000000
134,212 UART: dlen: 8
135,698 UART: buf: [08070605]
137,726 >>> mbox cmd response: success
137,978 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,647 UART: cmd: 0xa0000000
140,199 >>> mbox cmd response data (4 bytes)
140,595 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,287 UART: cmd: 0xb0000000
143,166 UART: dlen: 6
144,660 UART: buf: [0c0d0e0f, 00000a0b]
148,216 >>> mbox cmd response data (2 bytes)
148,583 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,263 UART: cmd: 0xc0000000
150,941 >>> mbox cmd response data (9 bytes)
151,325 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,999 UART: cmd: 0xd0000000
153,554 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,741 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,904 UART: cmd: 0x50000000
19,698 UART: dlen: 8
20,793 >>> mbox cmd response: success
21,245 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,176 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,904 UART: cmd: 0x50000000
29,781 UART: dlen: 7
30,868 >>> mbox cmd response: success
31,343 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,388 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,099 UART: cmd: 0x50000000
40,018 UART: dlen: 0
41,112 >>> mbox cmd response: success
41,446 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,713 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,412 UART: cmd: 0x50000001
50,291 UART: dlen: 5
51,387 >>> mbox cmd response: success
51,855 UART: buf: [01, 23, 45, 67, 89]
56,434 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,134 UART: cmd: 0x50000001
59,007 UART: dlen: 6
60,056 >>> mbox cmd response: success
60,527 UART: buf: [01, 23, 45, 67, 89]
65,164 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,860 UART: cmd: 0x50000001
67,758 UART: dlen: 9
68,805 >>> mbox cmd response: success
69,275 UART: buf: [01, 23, 45, 67, 89]
73,864 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,569 UART: cmd: 0x60000000
76,499 UART: dlen: 16
77,972 UART: buf: [67452301, efcdab89]
81,509 UART: buf: [33221100, 77665544]
84,656 >>> mbox cmd response: success
84,913 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,605 UART: cmd: 0x60000000
87,534 UART: dlen: 13
89,008 UART: buf: [67452301, efcdab89]
92,496 UART: buf: [33221100, 00000044]
96,241 >>> mbox cmd response: success
96,525 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,240 UART: cmd: 0x60000000
99,131 UART: dlen: 12
100,611 UART: buf: [67452301, efcdab89]
104,098 UART: buf: [33221100, 00000000]
107,461 >>> mbox cmd response: success
107,722 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,390 UART: cmd: 0x60000000
110,261 UART: dlen: 0
111,296 >>> mbox cmd response: success
111,552 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,226 UART: cmd: 0x70000000
113,809 >>> mbox cmd response: success
114,060 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,769 UART: cmd: 0x60000000
116,643 UART: dlen: 5
118,128 UART: buf: [04050607, 00000003]
121,675 >>> mbox cmd response: success
121,940 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,614 UART: cmd: 0x80000000
124,199 >>> mbox cmd response: failed
124,498 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,177 UART: cmd: 0x60000000
127,053 UART: dlen: 5
128,541 UART: buf: [04050607, 00000003]
132,020 >>> mbox cmd response: success
132,278 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,956 UART: cmd: 0x90000000
134,881 UART: dlen: 8
136,310 UART: buf: [08070605]
138,345 >>> mbox cmd response: success
138,604 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,274 UART: cmd: 0xa0000000
140,848 >>> mbox cmd response data (4 bytes)
141,246 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,937 UART: cmd: 0xb0000000
143,808 UART: dlen: 6
145,287 UART: buf: [0c0d0e0f, 00000a0b]
148,889 >>> mbox cmd response data (2 bytes)
149,256 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,935 UART: cmd: 0xc0000000
151,595 >>> mbox cmd response data (9 bytes)
151,978 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,655 UART: cmd: 0xd0000000
154,211 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
5,430 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
19,585 UART: cmd: 0x50000000
21,393 UART: dlen: 8
22,449 >>> mbox cmd response: success
22,899 UART: buf: [67452301, efcdab89, 00000000, 00000000]
28,849 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
29,569 UART: cmd: 0x50000000
31,435 UART: dlen: 7
32,538 >>> mbox cmd response: success
32,996 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
39,037 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
39,742 UART: cmd: 0x50000000
41,655 UART: dlen: 0
42,687 >>> mbox cmd response: success
43,070 UART: buf: [00000000, 00000000, 00000000, 00000000]
49,333 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
50,027 UART: cmd: 0x50000001
51,908 UART: dlen: 5
52,957 >>> mbox cmd response: success
53,428 UART: buf: [01, 23, 45, 67, 89]
58,105 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
58,812 UART: cmd: 0x50000001
60,698 UART: dlen: 6
61,751 >>> mbox cmd response: success
62,223 UART: buf: [01, 23, 45, 67, 89]
66,827 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
67,527 UART: cmd: 0x50000001
69,406 UART: dlen: 9
70,450 >>> mbox cmd response: success
70,919 UART: buf: [01, 23, 45, 67, 89]
75,546 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
76,248 UART: cmd: 0x60000000
78,133 UART: dlen: 16
79,661 UART: buf: [67452301, efcdab89]
83,197 UART: buf: [33221100, 77665544]
86,341 >>> mbox cmd response: success
86,599 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
87,291 UART: cmd: 0x60000000
89,220 UART: dlen: 13
90,691 UART: buf: [67452301, efcdab89]
94,182 UART: buf: [33221100, 00000044]
97,572 >>> mbox cmd response: success
97,836 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
98,524 UART: cmd: 0x60000000
100,403 UART: dlen: 12
101,874 UART: buf: [67452301, efcdab89]
105,413 UART: buf: [33221100, 00000000]
108,780 >>> mbox cmd response: success
109,043 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
109,737 UART: cmd: 0x60000000
111,609 UART: dlen: 0
112,658 >>> mbox cmd response: success
112,914 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
113,589 UART: cmd: 0x70000000
115,175 >>> mbox cmd response: success
115,428 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
116,106 UART: cmd: 0x60000000
117,997 UART: dlen: 5
119,477 UART: buf: [04050607, 00000003]
122,952 >>> mbox cmd response: success
123,212 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,884 UART: cmd: 0x80000000
125,470 >>> mbox cmd response: failed
125,768 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
126,451 UART: cmd: 0x60000000
128,322 UART: dlen: 5
129,807 UART: buf: [04050607, 00000003]
133,282 >>> mbox cmd response: success
133,535 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
134,219 UART: cmd: 0x90000000
136,091 UART: dlen: 8
137,545 UART: buf: [08070605]
139,632 >>> mbox cmd response: success
139,916 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
140,611 UART: cmd: 0xa0000000
142,169 >>> mbox cmd response data (4 bytes)
142,559 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
143,249 UART: cmd: 0xb0000000
145,128 UART: dlen: 6
146,609 UART: buf: [0c0d0e0f, 00000a0b]
150,218 >>> mbox cmd response data (2 bytes)
150,585 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
151,261 UART: cmd: 0xc0000000
152,930 >>> mbox cmd response data (9 bytes)
153,312 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,993 UART: cmd: 0xd0000000
155,547 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,215 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,398 UART: cmd: 0x50000000
19,200 UART: dlen: 8
20,267 >>> mbox cmd response: success
20,712 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,686 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,430 UART: cmd: 0x50000000
29,331 UART: dlen: 7
30,403 >>> mbox cmd response: success
30,881 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,846 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,537 UART: cmd: 0x50000000
39,423 UART: dlen: 0
40,417 >>> mbox cmd response: success
40,888 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,176 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,878 UART: cmd: 0x50000001
49,762 UART: dlen: 5
50,866 >>> mbox cmd response: success
51,288 UART: buf: [01, 23, 45, 67, 89]
55,928 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,643 UART: cmd: 0x50000001
58,530 UART: dlen: 6
59,577 >>> mbox cmd response: success
60,048 UART: buf: [01, 23, 45, 67, 89]
64,641 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,344 UART: cmd: 0x50000001
67,226 UART: dlen: 9
68,275 >>> mbox cmd response: success
68,744 UART: buf: [01, 23, 45, 67, 89]
73,383 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,087 UART: cmd: 0x60000000
75,970 UART: dlen: 16
77,449 UART: buf: [67452301, efcdab89]
81,001 UART: buf: [33221100, 77665544]
84,162 >>> mbox cmd response: success
84,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,147 UART: cmd: 0x60000000
87,041 UART: dlen: 13
88,526 UART: buf: [67452301, efcdab89]
92,028 UART: buf: [33221100, 00000044]
95,413 >>> mbox cmd response: success
95,676 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,365 UART: cmd: 0x60000000
98,243 UART: dlen: 12
99,724 UART: buf: [67452301, efcdab89]
103,247 UART: buf: [33221100, 00000000]
106,605 >>> mbox cmd response: success
106,873 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,547 UART: cmd: 0x60000000
109,429 UART: dlen: 0
110,477 >>> mbox cmd response: success
110,736 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,468 UART: cmd: 0x70000000
113,061 >>> mbox cmd response: success
113,322 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,006 UART: cmd: 0x60000000
115,888 UART: dlen: 5
117,375 UART: buf: [04050607, 00000003]
120,869 >>> mbox cmd response: success
121,126 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,805 UART: cmd: 0x80000000
123,394 >>> mbox cmd response: failed
123,699 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,378 UART: cmd: 0x60000000
126,264 UART: dlen: 5
127,700 UART: buf: [04050607, 00000003]
131,188 >>> mbox cmd response: success
131,443 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,145 UART: cmd: 0x90000000
134,029 UART: dlen: 8
135,469 UART: buf: [08070605]
137,556 >>> mbox cmd response: success
137,813 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,486 UART: cmd: 0xa0000000
140,042 >>> mbox cmd response data (4 bytes)
140,451 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,144 UART: cmd: 0xb0000000
143,030 UART: dlen: 6
144,514 UART: buf: [0c0d0e0f, 00000a0b]
148,075 >>> mbox cmd response data (2 bytes)
148,447 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,126 UART: cmd: 0xc0000000
150,796 >>> mbox cmd response data (9 bytes)
151,185 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,884 UART: cmd: 0xd0000000
153,446 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
3,229 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
18,942 UART: cmd: 0x50000000
19,981 UART: dlen: 8
20,479 >>> mbox cmd response: success
20,708 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,608 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,316 UART: cmd: 0x50000000
29,204 UART: dlen: 7
30,263 >>> mbox cmd response: success
30,739 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,700 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,413 UART: cmd: 0x50000000
39,297 UART: dlen: 0
40,292 >>> mbox cmd response: success
40,764 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,046 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,749 UART: cmd: 0x50000001
49,634 UART: dlen: 5
50,684 >>> mbox cmd response: success
51,158 UART: buf: [01, 23, 45, 67, 89]
55,799 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,497 UART: cmd: 0x50000001
58,381 UART: dlen: 6
59,431 >>> mbox cmd response: success
59,904 UART: buf: [01, 23, 45, 67, 89]
64,546 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,246 UART: cmd: 0x50000001
67,147 UART: dlen: 9
68,194 >>> mbox cmd response: success
68,671 UART: buf: [01, 23, 45, 67, 89]
73,259 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,964 UART: cmd: 0x60000000
75,896 UART: dlen: 16
77,368 UART: buf: [67452301, efcdab89]
80,911 UART: buf: [33221100, 77665544]
84,059 >>> mbox cmd response: success
84,326 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,021 UART: cmd: 0x60000000
86,903 UART: dlen: 13
88,382 UART: buf: [67452301, efcdab89]
91,925 UART: buf: [33221100, 00000044]
95,303 >>> mbox cmd response: success
95,560 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,298 UART: cmd: 0x60000000
98,211 UART: dlen: 12
99,647 UART: buf: [67452301, efcdab89]
103,150 UART: buf: [33221100, 00000000]
106,527 >>> mbox cmd response: success
106,792 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,468 UART: cmd: 0x60000000
109,342 UART: dlen: 0
110,389 >>> mbox cmd response: success
110,650 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,325 UART: cmd: 0x70000000
112,907 >>> mbox cmd response: success
113,159 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,843 UART: cmd: 0x60000000
115,716 UART: dlen: 5
117,197 UART: buf: [04050607, 00000003]
120,751 >>> mbox cmd response: success
121,009 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,692 UART: cmd: 0x80000000
123,287 >>> mbox cmd response: failed
123,593 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,277 UART: cmd: 0x60000000
126,154 UART: dlen: 5
127,598 UART: buf: [04050607, 00000003]
131,140 >>> mbox cmd response: success
131,395 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,077 UART: cmd: 0x90000000
133,958 UART: dlen: 8
135,395 UART: buf: [08070605]
137,475 >>> mbox cmd response: success
137,729 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,418 UART: cmd: 0xa0000000
139,991 >>> mbox cmd response data (4 bytes)
140,389 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,082 UART: cmd: 0xb0000000
142,965 UART: dlen: 6
144,444 UART: buf: [0c0d0e0f, 00000a0b]
148,057 >>> mbox cmd response data (2 bytes)
148,433 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,110 UART: cmd: 0xc0000000
150,775 >>> mbox cmd response data (9 bytes)
151,167 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,840 UART: cmd: 0xd0000000
153,397 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,483 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,658 UART: cmd: 0x50000000
19,453 UART: dlen: 8
20,685 >>> mbox cmd response: success
20,985 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,979 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,737 UART: cmd: 0x50000000
29,604 UART: dlen: 7
30,689 >>> mbox cmd response: success
31,185 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,198 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,894 UART: cmd: 0x50000000
39,791 UART: dlen: 0
40,811 >>> mbox cmd response: success
41,201 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,562 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,258 UART: cmd: 0x50000001
50,142 UART: dlen: 5
51,239 >>> mbox cmd response: success
51,708 UART: buf: [01, 23, 45, 67, 89]
56,276 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,971 UART: cmd: 0x50000001
58,864 UART: dlen: 6
59,908 >>> mbox cmd response: success
60,377 UART: buf: [01, 23, 45, 67, 89]
65,011 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,714 UART: cmd: 0x50000001
67,591 UART: dlen: 9
68,637 >>> mbox cmd response: success
69,108 UART: buf: [01, 23, 45, 67, 89]
73,746 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,453 UART: cmd: 0x60000000
76,332 UART: dlen: 16
77,860 UART: buf: [67452301, efcdab89]
81,401 UART: buf: [33221100, 77665544]
84,550 >>> mbox cmd response: success
84,809 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,503 UART: cmd: 0x60000000
87,399 UART: dlen: 13
88,879 UART: buf: [67452301, efcdab89]
92,372 UART: buf: [33221100, 00000044]
95,801 >>> mbox cmd response: success
96,061 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,752 UART: cmd: 0x60000000
98,625 UART: dlen: 12
100,102 UART: buf: [67452301, efcdab89]
103,656 UART: buf: [33221100, 00000000]
107,002 >>> mbox cmd response: success
107,276 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,950 UART: cmd: 0x60000000
109,828 UART: dlen: 0
110,875 >>> mbox cmd response: success
111,131 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,804 UART: cmd: 0x70000000
113,423 >>> mbox cmd response: success
113,682 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,363 UART: cmd: 0x60000000
116,233 UART: dlen: 5
117,772 UART: buf: [04050607, 00000003]
121,251 >>> mbox cmd response: success
121,508 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,205 UART: cmd: 0x80000000
123,790 >>> mbox cmd response: failed
124,094 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,782 UART: cmd: 0x60000000
126,653 UART: dlen: 5
128,139 UART: buf: [04050607, 00000003]
131,615 >>> mbox cmd response: success
131,870 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,551 UART: cmd: 0x90000000
134,448 UART: dlen: 8
135,883 UART: buf: [08070605]
137,963 >>> mbox cmd response: success
138,216 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,887 UART: cmd: 0xa0000000
140,435 >>> mbox cmd response data (4 bytes)
140,843 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,535 UART: cmd: 0xb0000000
143,411 UART: dlen: 6
144,893 UART: buf: [0c0d0e0f, 00000a0b]
148,492 >>> mbox cmd response data (2 bytes)
148,858 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,534 UART: cmd: 0xc0000000
151,199 >>> mbox cmd response data (9 bytes)
151,585 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,259 UART: cmd: 0xd0000000
153,833 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,739 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,886 UART: cmd: 0x50000000
19,687 UART: dlen: 8
20,734 >>> mbox cmd response: success
21,227 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,134 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,860 UART: cmd: 0x50000000
29,701 UART: dlen: 7
30,832 >>> mbox cmd response: success
31,259 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,330 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,037 UART: cmd: 0x50000000
39,935 UART: dlen: 0
40,907 >>> mbox cmd response: success
41,336 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,688 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,387 UART: cmd: 0x50000001
50,281 UART: dlen: 5
51,330 >>> mbox cmd response: success
51,803 UART: buf: [01, 23, 45, 67, 89]
56,439 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,217 UART: cmd: 0x50000001
59,035 UART: dlen: 6
60,038 >>> mbox cmd response: success
60,563 UART: buf: [01, 23, 45, 67, 89]
65,163 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,860 UART: cmd: 0x50000001
67,739 UART: dlen: 9
68,788 >>> mbox cmd response: success
69,255 UART: buf: [01, 23, 45, 67, 89]
73,892 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,617 UART: cmd: 0x60000000
76,500 UART: dlen: 16
77,976 UART: buf: [67452301, efcdab89]
81,522 UART: buf: [33221100, 77665544]
84,694 >>> mbox cmd response: success
84,953 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,646 UART: cmd: 0x60000000
87,581 UART: dlen: 13
89,049 UART: buf: [67452301, efcdab89]
92,534 UART: buf: [33221100, 00000044]
95,912 >>> mbox cmd response: success
96,169 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,852 UART: cmd: 0x60000000
98,732 UART: dlen: 12
100,205 UART: buf: [67452301, efcdab89]
103,744 UART: buf: [33221100, 00000000]
107,151 >>> mbox cmd response: success
107,413 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,081 UART: cmd: 0x60000000
109,968 UART: dlen: 0
111,011 >>> mbox cmd response: success
111,270 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,945 UART: cmd: 0x70000000
113,537 >>> mbox cmd response: success
113,788 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,467 UART: cmd: 0x60000000
116,344 UART: dlen: 5
117,830 UART: buf: [04050607, 00000003]
121,316 >>> mbox cmd response: success
121,572 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,245 UART: cmd: 0x80000000
123,831 >>> mbox cmd response: failed
124,148 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,830 UART: cmd: 0x60000000
126,717 UART: dlen: 5
128,201 UART: buf: [04050607, 00000003]
131,684 >>> mbox cmd response: success
131,937 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,613 UART: cmd: 0x90000000
134,489 UART: dlen: 8
135,980 UART: buf: [08070605]
138,073 >>> mbox cmd response: success
138,346 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,019 UART: cmd: 0xa0000000
140,579 >>> mbox cmd response data (4 bytes)
140,972 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,663 UART: cmd: 0xb0000000
143,553 UART: dlen: 6
145,056 UART: buf: [0c0d0e0f, 00000a0b]
148,627 >>> mbox cmd response data (2 bytes)
148,994 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,674 UART: cmd: 0xc0000000
151,344 >>> mbox cmd response data (9 bytes)
151,727 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,407 UART: cmd: 0xd0000000
153,963 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,844 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,804 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,822 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
22,078 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,860 writing to cptra_bootfsm_go
23,127 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
22,516 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
22,409 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
22,615 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,807 writing to cptra_bootfsm_go
22,347 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
22,792 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
22,766 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
22,318 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
22,638 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
22,768 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
22,666 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
11,606 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,949 UART: pcrbank::test_erase_all_pcrs...[ok]
21,093 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,803 writing to cptra_bootfsm_go
11,580 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,925 UART: pcrbank::test_erase_all_pcrs...[ok]
21,069 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
12,005 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,353 UART: pcrbank::test_erase_all_pcrs...[ok]
21,492 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
11,954 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,278 UART: pcrbank::test_erase_all_pcrs...[ok]
21,421 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,800 writing to cptra_bootfsm_go
11,557 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,895 UART: pcrbank::test_erase_all_pcrs...[ok]
21,054 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
11,670 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,015 UART: pcrbank::test_erase_all_pcrs...[ok]
21,169 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
11,919 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,211 UART: pcrbank::test_erase_all_pcrs...[ok]
21,350 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
12,570 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,206 UART: pcrbank::test_erase_all_pcrs...[ok]
21,360 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,782 writing to cptra_bootfsm_go
11,560 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,894 UART: pcrbank::test_erase_all_pcrs...[ok]
21,064 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,808 writing to cptra_bootfsm_go
11,592 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,920 UART: pcrbank::test_erase_all_pcrs...[ok]
21,054 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
12,076 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,409 UART: pcrbank::test_erase_all_pcrs...[ok]
21,525 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
12,035 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,358 UART: pcrbank::test_erase_all_pcrs...[ok]
21,500 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
11,318 UART: persistent::test_persistent_data_layout...[ok]
14,968 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,808 writing to cptra_bootfsm_go
11,411 UART: persistent::test_persistent_data_layout...[ok]
14,959 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
11,971 UART: persistent::test_persistent_data_layout...[ok]
15,578 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,833 writing to cptra_bootfsm_go
12,489 UART: persistent::test_persistent_data_layout...[ok]
16,105 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
11,510 UART: persistent::test_persistent_data_layout...[ok]
15,091 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
11,803 UART: persistent::test_persistent_data_layout...[ok]
15,447 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
11,754 UART: persistent::test_persistent_data_layout...[ok]
15,335 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
11,813 UART: persistent::test_persistent_data_layout...[ok]
15,410 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
11,361 UART: persistent::test_persistent_data_layout...[ok]
14,955 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
11,357 UART: persistent::test_persistent_data_layout...[ok]
14,949 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
11,701 UART: persistent::test_persistent_data_layout...[ok]
15,255 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
11,735 UART: persistent::test_persistent_data_layout...[ok]
15,307 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
22,391 UART: sha1::test_kat...[ok]
35,139 UART: sha1::test_digest0...[ok]
49,513 UART: sha1::test_digest1...[ok]
62,407 UART: sha1::test_digest2...[ok]
84,285 UART: sha1::test_digest3...[ok]
106,343 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
22,253 UART: sha1::test_kat...[ok]
37,193 UART: sha1::test_digest0...[ok]
50,110 UART: sha1::test_digest1...[ok]
62,942 UART: sha1::test_digest2...[ok]
85,909 UART: sha1::test_digest3...[ok]
108,271 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
22,715 UART: sha1::test_kat...[ok]
37,605 UART: sha1::test_digest0...[ok]
52,732 UART: sha1::test_digest1...[ok]
67,341 UART: sha1::test_digest2...[ok]
89,699 UART: sha1::test_digest3...[ok]
112,958 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
22,733 UART: sha1::test_kat...[ok]
37,021 UART: sha1::test_digest0...[ok]
51,498 UART: sha1::test_digest1...[ok]
65,485 UART: sha1::test_digest2...[ok]
88,258 UART: sha1::test_digest3...[ok]
110,692 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
22,487 UART: sha1::test_kat...[ok]
35,088 UART: sha1::test_digest0...[ok]
47,799 UART: sha1::test_digest1...[ok]
60,085 UART: sha1::test_digest2...[ok]
82,424 UART: sha1::test_digest3...[ok]
104,524 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
22,329 UART: sha1::test_kat...[ok]
35,798 UART: sha1::test_digest0...[ok]
48,227 UART: sha1::test_digest1...[ok]
62,470 UART: sha1::test_digest2...[ok]
84,326 UART: sha1::test_digest3...[ok]
105,546 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
22,559 UART: sha1::test_kat...[ok]
36,067 UART: sha1::test_digest0...[ok]
49,962 UART: sha1::test_digest1...[ok]
64,407 UART: sha1::test_digest2...[ok]
87,670 UART: sha1::test_digest3...[ok]
109,684 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
22,775 UART: sha1::test_kat...[ok]
36,081 UART: sha1::test_digest0...[ok]
50,484 UART: sha1::test_digest1...[ok]
65,485 UART: sha1::test_digest2...[ok]
86,582 UART: sha1::test_digest3...[ok]
108,797 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
22,258 UART: sha1::test_kat...[ok]
36,269 UART: sha1::test_digest0...[ok]
50,824 UART: sha1::test_digest1...[ok]
65,878 UART: sha1::test_digest2...[ok]
88,304 UART: sha1::test_digest3...[ok]
109,085 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
23,265 UART: sha1::test_kat...[ok]
34,407 UART: sha1::test_digest0...[ok]
47,314 UART: sha1::test_digest1...[ok]
60,846 UART: sha1::test_digest2...[ok]
81,984 UART: sha1::test_digest3...[ok]
103,685 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
22,715 UART: sha1::test_kat...[ok]
35,751 UART: sha1::test_digest0...[ok]
48,408 UART: sha1::test_digest1...[ok]
61,390 UART: sha1::test_digest2...[ok]
82,165 UART: sha1::test_digest3...[ok]
103,736 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
22,957 UART: sha1::test_kat...[ok]
36,898 UART: sha1::test_digest0...[ok]
50,726 UART: sha1::test_digest1...[ok]
65,136 UART: sha1::test_digest2...[ok]
86,798 UART: sha1::test_digest3...[ok]
108,912 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
22,184 UART: sha256::test_kat...[ok]
26,670 UART: sha256::test_digest0...[ok]
31,147 UART: sha256::test_digest1...[ok]
35,711 UART: sha256::test_digest2...[ok]
41,250 UART: sha256::test_digest3...[ok]
46,721 UART: sha256::test_op0...[ok]
51,348 UART: sha256::test_op1...[ok]
55,944 UART: sha256::test_op2...[ok]
61,180 UART: sha256::test_op3...[ok]
70,054 UART: sha256::test_op4...[ok]
81,936 UART: sha256::test_op5...[ok]
65,235,421 UART: sha256::test_op6...[ok]
65,257,905 UART: sha256::test_op7...[ok]
65,274,025 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
21,938 UART: sha256::test_kat...[ok]
26,431 UART: sha256::test_digest0...[ok]
30,940 UART: sha256::test_digest1...[ok]
35,436 UART: sha256::test_digest2...[ok]
40,970 UART: sha256::test_digest3...[ok]
46,497 UART: sha256::test_op0...[ok]
51,096 UART: sha256::test_op1...[ok]
55,694 UART: sha256::test_op2...[ok]
60,977 UART: sha256::test_op3...[ok]
69,847 UART: sha256::test_op4...[ok]
81,718 UART: sha256::test_op5...[ok]
65,235,051 UART: sha256::test_op6...[ok]
65,257,670 UART: sha256::test_op7...[ok]
65,273,855 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
22,428 UART: sha256::test_kat...[ok]
26,885 UART: sha256::test_digest0...[ok]
31,426 UART: sha256::test_digest1...[ok]
35,895 UART: sha256::test_digest2...[ok]
41,493 UART: sha256::test_digest3...[ok]
46,925 UART: sha256::test_op0...[ok]
51,550 UART: sha256::test_op1...[ok]
56,168 UART: sha256::test_op2...[ok]
61,433 UART: sha256::test_op3...[ok]
70,324 UART: sha256::test_op4...[ok]
82,202 UART: sha256::test_op5...[ok]
65,235,477 UART: sha256::test_op6...[ok]
65,258,203 UART: sha256::test_op7...[ok]
65,274,299 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
22,170 UART: sha256::test_kat...[ok]
26,656 UART: sha256::test_digest0...[ok]
31,882 UART: sha256::test_digest1...[ok]
35,664 UART: sha256::test_digest2...[ok]
41,244 UART: sha256::test_digest3...[ok]
46,735 UART: sha256::test_op0...[ok]
51,340 UART: sha256::test_op1...[ok]
55,965 UART: sha256::test_op2...[ok]
61,196 UART: sha256::test_op3...[ok]
70,076 UART: sha256::test_op4...[ok]
81,981 UART: sha256::test_op5...[ok]
65,235,222 UART: sha256::test_op6...[ok]
65,257,929 UART: sha256::test_op7...[ok]
65,274,026 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
21,929 UART: sha256::test_kat...[ok]
26,409 UART: sha256::test_digest0...[ok]
30,819 UART: sha256::test_digest1...[ok]
35,244 UART: sha256::test_digest2...[ok]
40,722 UART: sha256::test_digest3...[ok]
46,150 UART: sha256::test_op0...[ok]
50,701 UART: sha256::test_op1...[ok]
55,254 UART: sha256::test_op2...[ok]
60,425 UART: sha256::test_op3...[ok]
69,278 UART: sha256::test_op4...[ok]
81,072 UART: sha256::test_op5...[ok]
64,968,670 UART: sha256::test_op6...[ok]
64,991,190 UART: sha256::test_op7...[ok]
65,007,234 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
21,959 UART: sha256::test_kat...[ok]
26,361 UART: sha256::test_digest0...[ok]
30,824 UART: sha256::test_digest1...[ok]
35,246 UART: sha256::test_digest2...[ok]
40,731 UART: sha256::test_digest3...[ok]
46,144 UART: sha256::test_op0...[ok]
50,704 UART: sha256::test_op1...[ok]
55,257 UART: sha256::test_op2...[ok]
60,426 UART: sha256::test_op3...[ok]
69,259 UART: sha256::test_op4...[ok]
81,075 UART: sha256::test_op5...[ok]
64,968,668 UART: sha256::test_op6...[ok]
64,991,245 UART: sha256::test_op7...[ok]
65,007,222 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
22,261 UART: sha256::test_kat...[ok]
26,683 UART: sha256::test_digest0...[ok]
31,189 UART: sha256::test_digest1...[ok]
35,609 UART: sha256::test_digest2...[ok]
41,095 UART: sha256::test_digest3...[ok]
46,508 UART: sha256::test_op0...[ok]
51,049 UART: sha256::test_op1...[ok]
55,597 UART: sha256::test_op2...[ok]
60,761 UART: sha256::test_op3...[ok]
69,594 UART: sha256::test_op4...[ok]
81,402 UART: sha256::test_op5...[ok]
64,969,008 UART: sha256::test_op6...[ok]
64,991,515 UART: sha256::test_op7...[ok]
65,007,556 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
22,221 UART: sha256::test_kat...[ok]
26,675 UART: sha256::test_digest0...[ok]
31,062 UART: sha256::test_digest1...[ok]
35,553 UART: sha256::test_digest2...[ok]
41,033 UART: sha256::test_digest3...[ok]
46,406 UART: sha256::test_op0...[ok]
50,952 UART: sha256::test_op1...[ok]
55,490 UART: sha256::test_op2...[ok]
60,674 UART: sha256::test_op3...[ok]
69,562 UART: sha256::test_op4...[ok]
81,330 UART: sha256::test_op5...[ok]
64,968,933 UART: sha256::test_op6...[ok]
64,991,507 UART: sha256::test_op7...[ok]
65,007,479 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
22,140 UART: sha256::test_kat...[ok]
26,578 UART: sha256::test_digest0...[ok]
31,005 UART: sha256::test_digest1...[ok]
35,447 UART: sha256::test_digest2...[ok]
40,904 UART: sha256::test_digest3...[ok]
46,323 UART: sha256::test_op0...[ok]
50,876 UART: sha256::test_op1...[ok]
55,437 UART: sha256::test_op2...[ok]
60,611 UART: sha256::test_op3...[ok]
69,446 UART: sha256::test_op4...[ok]
81,236 UART: sha256::test_op5...[ok]
64,968,885 UART: sha256::test_op6...[ok]
64,991,397 UART: sha256::test_op7...[ok]
65,007,356 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
22,096 UART: sha256::test_kat...[ok]
26,516 UART: sha256::test_digest0...[ok]
30,914 UART: sha256::test_digest1...[ok]
35,365 UART: sha256::test_digest2...[ok]
40,859 UART: sha256::test_digest3...[ok]
46,274 UART: sha256::test_op0...[ok]
50,835 UART: sha256::test_op1...[ok]
55,384 UART: sha256::test_op2...[ok]
60,556 UART: sha256::test_op3...[ok]
69,385 UART: sha256::test_op4...[ok]
81,205 UART: sha256::test_op5...[ok]
64,968,831 UART: sha256::test_op6...[ok]
64,991,306 UART: sha256::test_op7...[ok]
65,007,347 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
22,394 UART: sha256::test_kat...[ok]
26,830 UART: sha256::test_digest0...[ok]
31,261 UART: sha256::test_digest1...[ok]
35,744 UART: sha256::test_digest2...[ok]
41,190 UART: sha256::test_digest3...[ok]
46,607 UART: sha256::test_op0...[ok]
51,153 UART: sha256::test_op1...[ok]
55,722 UART: sha256::test_op2...[ok]
60,901 UART: sha256::test_op3...[ok]
69,755 UART: sha256::test_op4...[ok]
81,565 UART: sha256::test_op5...[ok]
64,969,286 UART: sha256::test_op6...[ok]
64,991,646 UART: sha256::test_op7...[ok]
65,007,687 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
22,103 UART: sha256::test_kat...[ok]
26,526 UART: sha256::test_digest0...[ok]
30,966 UART: sha256::test_digest1...[ok]
35,428 UART: sha256::test_digest2...[ok]
40,896 UART: sha256::test_digest3...[ok]
46,328 UART: sha256::test_op0...[ok]
50,823 UART: sha256::test_op1...[ok]
55,377 UART: sha256::test_op2...[ok]
60,555 UART: sha256::test_op3...[ok]
69,416 UART: sha256::test_op4...[ok]
81,214 UART: sha256::test_op5...[ok]
64,968,777 UART: sha256::test_op6...[ok]
64,991,351 UART: sha256::test_op7...[ok]
65,007,379 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,812 writing to cptra_bootfsm_go
22,269 UART: sha2_512_384acc::test_kat...[ok]
26,956 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,057,291 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,905 UART: sha2_512_384acc::test_digest0...[ok]
1,072,198 UART: sha2_512_384acc::test_digest1...[ok]
1,080,153 UART: sha2_512_384acc::test_digest2...[ok]
1,088,170 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
21,373 UART: sha2_512_384acc::test_kat...[ok]
26,118 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,234 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,085 UART: sha2_512_384acc::test_digest0...[ok]
1,071,358 UART: sha2_512_384acc::test_digest1...[ok]
1,079,366 UART: sha2_512_384acc::test_digest2...[ok]
1,087,295 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
21,800 UART: sha2_512_384acc::test_kat...[ok]
26,539 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,677 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,445 UART: sha2_512_384acc::test_digest0...[ok]
1,071,739 UART: sha2_512_384acc::test_digest1...[ok]
1,079,726 UART: sha2_512_384acc::test_digest2...[ok]
1,087,749 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
21,824 UART: sha2_512_384acc::test_kat...[ok]
26,570 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,689 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,465 UART: sha2_512_384acc::test_digest0...[ok]
1,071,777 UART: sha2_512_384acc::test_digest1...[ok]
1,079,702 UART: sha2_512_384acc::test_digest2...[ok]
1,087,755 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
21,378 UART: sha2_512_384acc::test_kat...[ok]
26,118 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,264 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,028 UART: sha2_512_384acc::test_digest0...[ok]
1,071,374 UART: sha2_512_384acc::test_digest1...[ok]
1,079,283 UART: sha2_512_384acc::test_digest2...[ok]
1,087,323 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
21,356 UART: sha2_512_384acc::test_kat...[ok]
26,097 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,212 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,027 UART: sha2_512_384acc::test_digest0...[ok]
1,071,355 UART: sha2_512_384acc::test_digest1...[ok]
1,079,272 UART: sha2_512_384acc::test_digest2...[ok]
1,087,326 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
21,725 UART: sha2_512_384acc::test_kat...[ok]
26,489 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,653 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,427 UART: sha2_512_384acc::test_digest0...[ok]
1,071,708 UART: sha2_512_384acc::test_digest1...[ok]
1,079,635 UART: sha2_512_384acc::test_digest2...[ok]
1,087,703 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
21,742 UART: sha2_512_384acc::test_kat...[ok]
26,483 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,629 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,403 UART: sha2_512_384acc::test_digest0...[ok]
1,071,705 UART: sha2_512_384acc::test_digest1...[ok]
1,079,678 UART: sha2_512_384acc::test_digest2...[ok]
1,087,698 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
21,369 UART: sha2_512_384acc::test_kat...[ok]
26,119 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,263 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,044 UART: sha2_512_384acc::test_digest0...[ok]
1,071,336 UART: sha2_512_384acc::test_digest1...[ok]
1,079,302 UART: sha2_512_384acc::test_digest2...[ok]
1,087,298 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
21,644 UART: sha2_512_384acc::test_kat...[ok]
26,378 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,525 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,298 UART: sha2_512_384acc::test_digest0...[ok]
1,071,593 UART: sha2_512_384acc::test_digest1...[ok]
1,079,555 UART: sha2_512_384acc::test_digest2...[ok]
1,087,574 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
21,557 UART: sha2_512_384acc::test_kat...[ok]
26,297 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,461 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,281 UART: sha2_512_384acc::test_digest0...[ok]
1,071,543 UART: sha2_512_384acc::test_digest1...[ok]
1,079,513 UART: sha2_512_384acc::test_digest2...[ok]
1,087,538 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
21,733 UART: sha2_512_384acc::test_kat...[ok]
26,513 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,666 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,456 UART: sha2_512_384acc::test_digest0...[ok]
1,071,740 UART: sha2_512_384acc::test_digest1...[ok]
1,079,674 UART: sha2_512_384acc::test_digest2...[ok]
1,087,718 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
24,286 UART: sha384::test_kat...[ok]
31,880 UART: sha384::test_digest0...[ok]
38,936 UART: sha384::test_digest1...[ok]
47,916 UART: sha384::test_digest2...[ok]
56,288 UART: sha384::test_digest3...[ok]
67,237 UART: sha384::test_op0...[ok]
74,126 UART: sha384::test_op1...[ok]
81,012 UART: sha384::test_op2...[ok]
88,806 UART: sha384::test_op3...[ok]
99,645 UART: sha384::test_op4...[ok]
115,670 UART: sha384::test_op5...[ok]
69,343,230 UART: sha384::test_op6...[ok]
69,374,159 UART: sha384::test_op7...[ok]
69,404,809 UART: sha384::test_op8...[ok]
69,434,220 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,452,603 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,253 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,483,865 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
24,524 UART: sha384::test_kat...[ok]
31,722 UART: sha384::test_digest0...[ok]
40,311 UART: sha384::test_digest1...[ok]
49,925 UART: sha384::test_digest2...[ok]
59,034 UART: sha384::test_digest3...[ok]
71,184 UART: sha384::test_op0...[ok]
78,080 UART: sha384::test_op1...[ok]
84,969 UART: sha384::test_op2...[ok]
92,746 UART: sha384::test_op3...[ok]
103,564 UART: sha384::test_op4...[ok]
119,606 UART: sha384::test_op5...[ok]
69,347,280 UART: sha384::test_op6...[ok]
69,378,125 UART: sha384::test_op7...[ok]
69,408,759 UART: sha384::test_op8...[ok]
69,438,218 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,492 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,152 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,826 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
24,891 UART: sha384::test_kat...[ok]
32,763 UART: sha384::test_digest0...[ok]
42,178 UART: sha384::test_digest1...[ok]
50,854 UART: sha384::test_digest2...[ok]
59,161 UART: sha384::test_digest3...[ok]
69,451 UART: sha384::test_op0...[ok]
76,442 UART: sha384::test_op1...[ok]
83,239 UART: sha384::test_op2...[ok]
90,984 UART: sha384::test_op3...[ok]
101,814 UART: sha384::test_op4...[ok]
117,865 UART: sha384::test_op5...[ok]
69,345,556 UART: sha384::test_op6...[ok]
69,376,331 UART: sha384::test_op7...[ok]
69,407,002 UART: sha384::test_op8...[ok]
69,436,462 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,740 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,385 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,073 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
24,809 UART: sha384::test_kat...[ok]
34,579 UART: sha384::test_digest0...[ok]
43,067 UART: sha384::test_digest1...[ok]
51,427 UART: sha384::test_digest2...[ok]
61,384 UART: sha384::test_digest3...[ok]
71,053 UART: sha384::test_op0...[ok]
77,927 UART: sha384::test_op1...[ok]
84,806 UART: sha384::test_op2...[ok]
92,624 UART: sha384::test_op3...[ok]
103,441 UART: sha384::test_op4...[ok]
119,444 UART: sha384::test_op5...[ok]
69,347,166 UART: sha384::test_op6...[ok]
69,377,979 UART: sha384::test_op7...[ok]
69,408,628 UART: sha384::test_op8...[ok]
69,438,025 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,376 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,998 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,671 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
24,477 UART: sha384::test_kat...[ok]
31,426 UART: sha384::test_digest0...[ok]
41,169 UART: sha384::test_digest1...[ok]
49,589 UART: sha384::test_digest2...[ok]
59,210 UART: sha384::test_digest3...[ok]
70,315 UART: sha384::test_op0...[ok]
77,212 UART: sha384::test_op1...[ok]
84,172 UART: sha384::test_op2...[ok]
91,911 UART: sha384::test_op3...[ok]
102,729 UART: sha384::test_op4...[ok]
118,792 UART: sha384::test_op5...[ok]
69,346,411 UART: sha384::test_op6...[ok]
69,377,249 UART: sha384::test_op7...[ok]
69,407,935 UART: sha384::test_op8...[ok]
69,437,310 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,668 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,306 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,969 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
24,824 UART: sha384::test_kat...[ok]
32,891 UART: sha384::test_digest0...[ok]
41,651 UART: sha384::test_digest1...[ok]
50,254 UART: sha384::test_digest2...[ok]
60,673 UART: sha384::test_digest3...[ok]
71,612 UART: sha384::test_op0...[ok]
78,503 UART: sha384::test_op1...[ok]
85,394 UART: sha384::test_op2...[ok]
93,178 UART: sha384::test_op3...[ok]
104,007 UART: sha384::test_op4...[ok]
120,075 UART: sha384::test_op5...[ok]
69,347,739 UART: sha384::test_op6...[ok]
69,378,554 UART: sha384::test_op7...[ok]
69,409,193 UART: sha384::test_op8...[ok]
69,438,625 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,950 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,609 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,241 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
24,841 UART: sha384::test_kat...[ok]
33,247 UART: sha384::test_digest0...[ok]
42,271 UART: sha384::test_digest1...[ok]
50,650 UART: sha384::test_digest2...[ok]
59,587 UART: sha384::test_digest3...[ok]
69,680 UART: sha384::test_op0...[ok]
76,616 UART: sha384::test_op1...[ok]
83,512 UART: sha384::test_op2...[ok]
91,295 UART: sha384::test_op3...[ok]
102,116 UART: sha384::test_op4...[ok]
118,176 UART: sha384::test_op5...[ok]
69,345,669 UART: sha384::test_op6...[ok]
69,376,649 UART: sha384::test_op7...[ok]
69,407,278 UART: sha384::test_op8...[ok]
69,436,748 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,091 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,727 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,339 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
24,927 UART: sha384::test_kat...[ok]
31,377 UART: sha384::test_digest0...[ok]
39,566 UART: sha384::test_digest1...[ok]
48,401 UART: sha384::test_digest2...[ok]
57,155 UART: sha384::test_digest3...[ok]
68,484 UART: sha384::test_op0...[ok]
75,371 UART: sha384::test_op1...[ok]
82,247 UART: sha384::test_op2...[ok]
90,055 UART: sha384::test_op3...[ok]
100,869 UART: sha384::test_op4...[ok]
116,930 UART: sha384::test_op5...[ok]
69,344,596 UART: sha384::test_op6...[ok]
69,375,426 UART: sha384::test_op7...[ok]
69,406,025 UART: sha384::test_op8...[ok]
69,435,517 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,789 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,438 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,096 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
24,509 UART: sha384::test_kat...[ok]
32,877 UART: sha384::test_digest0...[ok]
41,087 UART: sha384::test_digest1...[ok]
49,723 UART: sha384::test_digest2...[ok]
59,901 UART: sha384::test_digest3...[ok]
71,127 UART: sha384::test_op0...[ok]
78,012 UART: sha384::test_op1...[ok]
84,906 UART: sha384::test_op2...[ok]
92,673 UART: sha384::test_op3...[ok]
103,502 UART: sha384::test_op4...[ok]
119,500 UART: sha384::test_op5...[ok]
69,347,119 UART: sha384::test_op6...[ok]
69,378,017 UART: sha384::test_op7...[ok]
69,408,673 UART: sha384::test_op8...[ok]
69,438,077 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,447 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,073 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,745 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
24,446 UART: sha384::test_kat...[ok]
32,630 UART: sha384::test_digest0...[ok]
42,683 UART: sha384::test_digest1...[ok]
50,412 UART: sha384::test_digest2...[ok]
59,877 UART: sha384::test_digest3...[ok]
70,872 UART: sha384::test_op0...[ok]
77,742 UART: sha384::test_op1...[ok]
84,638 UART: sha384::test_op2...[ok]
92,425 UART: sha384::test_op3...[ok]
103,247 UART: sha384::test_op4...[ok]
119,257 UART: sha384::test_op5...[ok]
69,346,884 UART: sha384::test_op6...[ok]
69,377,791 UART: sha384::test_op7...[ok]
69,408,451 UART: sha384::test_op8...[ok]
69,437,849 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,204 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,845 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,499 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
24,800 UART: sha384::test_kat...[ok]
34,013 UART: sha384::test_digest0...[ok]
42,767 UART: sha384::test_digest1...[ok]
52,432 UART: sha384::test_digest2...[ok]
61,184 UART: sha384::test_digest3...[ok]
73,480 UART: sha384::test_op0...[ok]
80,371 UART: sha384::test_op1...[ok]
87,331 UART: sha384::test_op2...[ok]
95,074 UART: sha384::test_op3...[ok]
105,896 UART: sha384::test_op4...[ok]
121,947 UART: sha384::test_op5...[ok]
69,349,600 UART: sha384::test_op6...[ok]
69,380,446 UART: sha384::test_op7...[ok]
69,411,067 UART: sha384::test_op8...[ok]
69,440,503 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,458,836 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,474,490 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,490,139 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
24,801 UART: sha384::test_kat...[ok]
34,169 UART: sha384::test_digest0...[ok]
42,488 UART: sha384::test_digest1...[ok]
50,921 UART: sha384::test_digest2...[ok]
60,091 UART: sha384::test_digest3...[ok]
71,576 UART: sha384::test_op0...[ok]
78,497 UART: sha384::test_op1...[ok]
85,391 UART: sha384::test_op2...[ok]
93,182 UART: sha384::test_op3...[ok]
104,000 UART: sha384::test_op4...[ok]
120,011 UART: sha384::test_op5...[ok]
69,347,568 UART: sha384::test_op6...[ok]
69,378,554 UART: sha384::test_op7...[ok]
69,409,164 UART: sha384::test_op8...[ok]
69,438,643 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,918 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,562 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,230 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
13,840 UART: status_reporter::test_report_boot_status...[ok]
17,616 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,732 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
13,722 UART: status_reporter::test_report_boot_status...[ok]
17,604 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,636 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
14,184 UART: status_reporter::test_report_boot_status...[ok]
18,022 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,095 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
14,038 UART: status_reporter::test_report_boot_status...[ok]
17,867 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,903 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
13,737 UART: status_reporter::test_report_boot_status...[ok]
17,593 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,633 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
13,792 UART: status_reporter::test_report_boot_status...[ok]
17,598 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,638 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
14,125 UART: status_reporter::test_report_boot_status...[ok]
17,968 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,002 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
14,112 UART: status_reporter::test_report_boot_status...[ok]
17,860 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,959 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
13,862 UART: status_reporter::test_report_boot_status...[ok]
17,740 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,750 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
13,871 UART: status_reporter::test_report_boot_status...[ok]
17,708 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,819 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
14,266 UART: status_reporter::test_report_boot_status...[ok]
18,104 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,161 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
14,205 UART: status_reporter::test_report_boot_status...[ok]
18,002 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,058 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
3,229 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,867 >>> mbox cmd response data (48 bytes)
18,519 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,283 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
3,248 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,567 >>> mbox cmd response data (48 bytes)
18,224 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,971 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,206 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,866 >>> mbox cmd response data (48 bytes)
18,586 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,256 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
3,160 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,698 >>> mbox cmd response data (48 bytes)
18,382 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,105 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,165 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,908 >>> mbox cmd response data (48 bytes)
18,567 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,306 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,489 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
16,888 >>> mbox cmd response data (48 bytes)
17,535 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,246 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,526 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,870 >>> mbox cmd response data (48 bytes)
424,649 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,843 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,833 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,370 >>> mbox cmd response data (48 bytes)
425,122 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,294 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,901 writing to cptra_bootfsm_go
5,217 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,397 >>> mbox cmd response data (48 bytes)
426,149 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
427,326 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,606 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,927 >>> mbox cmd response data (48 bytes)
424,691 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,865 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,502 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,027 >>> mbox cmd response data (48 bytes)
424,771 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,965 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,635 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,092 >>> mbox cmd response data (48 bytes)
424,865 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,036 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
3,297 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,806 writing to cptra_bootfsm_go
3,398 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,625 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,969 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,460 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,466 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,589 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,590 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,801 writing to cptra_bootfsm_go
3,268 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,805 writing to cptra_bootfsm_go
3,388 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,744 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,643 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4550000ed0`,
right: `0x7f4550000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9758000ed0`,
right: `0x7f9758000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fa9f0000ed0`,
right: `0x7fa9f0000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1c70000ed0`,
right: `0x7f1c70000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f84c0000ed0`,
right: `0x7f84c0000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb588000ed0`,
right: `0x7fb588000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7ad4000ed0`,
right: `0x7f7ad4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7f18000ed0`,
right: `0x7f7f18000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f1984000ed0`,
right: `0x7f1984000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4c2c000ed0`,
right: `0x7f4c2c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f9b70000ed0`,
right: `0x7f9b70000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fa624000ed0`,
right: `0x7fa624000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.38s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.45s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.62s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.51s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.52s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.44s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.41s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.34s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.32s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.15s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,021 UART:
192,402 UART: Running Caliptra ROM ...
193,586 UART:
193,732 UART: [state] CFI Enabled
264,562 UART: [state] LifecycleState = Unprovisioned
266,571 UART: [state] DebugLocked = No
268,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,113 UART: [kat] SHA2-256
442,821 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,332 UART: [kat] ++
453,775 UART: [kat] sha1
466,487 UART: [kat] SHA2-256
469,131 UART: [kat] SHA2-384
475,676 UART: [kat] SHA2-512-ACC
478,045 UART: [kat] ECC-384
2,770,619 UART: [kat] HMAC-384Kdf
2,803,165 UART: [kat] LMS
3,993,475 UART: [kat] --
3,998,407 UART: [cold-reset] ++
4,000,904 UART: [fht] Storing FHT @ 0x50003400
4,011,885 UART: [idev] ++
4,012,533 UART: [idev] CDI.KEYID = 6
4,013,408 UART: [idev] SUBJECT.KEYID = 7
4,014,647 UART: [idev] UDS.KEYID = 0
4,015,598 ready_for_fw is high
4,015,790 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,056,057 UART: [idev] Erasing UDS.KEYID = 0
7,351,553 UART: [idev] Using Sha1 for KeyId Algorithm
7,374,032 UART: [idev] --
7,377,706 UART: [ldev] ++
7,378,273 UART: [ldev] CDI.KEYID = 6
7,379,204 UART: [ldev] SUBJECT.KEYID = 5
7,380,464 UART: [ldev] AUTHORITY.KEYID = 7
7,381,690 UART: [ldev] FE.KEYID = 1
7,424,881 UART: [ldev] Erasing FE.KEYID = 1
10,757,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,129 UART: [ldev] --
13,120,117 UART: [fwproc] Waiting for Commands...
13,122,049 UART: [fwproc] Received command 0x46574c44
13,124,230 UART: [fwproc] Received Image of size 31676 bytes
16,172,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,244,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,313,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,341,409 >>> mbox cmd response: success
16,346,414 UART: [afmc] ++
16,347,026 UART: [afmc] CDI.KEYID = 6
16,347,937 UART: [afmc] SUBJECT.KEYID = 7
16,349,202 UART: [afmc] AUTHORITY.KEYID = 5
19,710,121 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,010,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,012,281 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,026,687 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,041,563 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,056,010 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,076,817 UART: [afmc] --
22,080,535 UART: [cold-reset] --
22,086,491 UART: [state] Locking Datavault
22,092,551 UART: [state] Locking PCR0, PCR1 and PCR31
22,094,312 UART: [state] Locking ICCM
22,095,891 UART: [exit] Launching FMC @ 0x40000130
22,104,268 UART:
22,104,510 UART: Running Caliptra FMC ...
22,105,638 UART:
22,105,793 UART: [state] CFI Enabled
22,168,743 UART: [fht] FMC Alias Private Key: 7
24,506,282 UART: [art] Extend RT PCRs Done
24,507,549 UART: [art] Lock RT PCRs Done
24,509,085 UART: [art] Populate DV Done
24,514,526 UART: [fht] FMC Alias Private Key: 7
24,516,182 UART: [art] Derive CDI
24,517,025 UART: [art] Store in in slot 0x4
24,576,866 UART: [art] Derive Key Pair
24,577,982 UART: [art] Store priv key in slot 0x5
27,871,527 UART: [art] Derive Key Pair - Done
27,884,518 UART: [art] Signing Cert with AUTHO
27,885,860 UART: RITY.KEYID = 7
30,172,710 UART: [art] Erasing AUTHORITY.KEYID = 7
30,174,259 UART: [art] PUB.X = E39BB4B2DB92EF2863DDA3BEAD0AB42DF20184DE277E9A6CE67A0EF65B6EF193254D7C09941F40D3970F0B9D6279F747
30,181,568 UART: [art] PUB.Y = 2F751E5D4DEE63ED9DAAA089889DAA5D1D28B24F801508C0470AA43E87F8D0FAFE751F8B24C17774D573076DF0C81C49
30,188,785 UART: [art] SIG.R = C7700B97A6FC01A8C9C2B80EF3C212C5951FF16BB8BBB098DAC1FC887D73E751AC489237C829A869F53CC4EA6C79E5FF
30,196,189 UART: [art] SIG.S = 8CFF725B8D318ADA0EDC09A91E2AC12C30EC99D90E73427BDA3C572E1A02BF0B41F306B250718E2DEA8028B5E8FB15F4
31,500,888 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,803,718 ready_for_fw is high
3,804,127 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,196,164 >>> mbox cmd response: success
21,882,558 UART:
21,882,960 UART: Running Caliptra FMC ...
21,884,070 UART:
21,884,220 UART: [state] CFI Enabled
21,950,249 UART: [fht] FMC Alias Private Key: 7
24,287,732 UART: [art] Extend RT PCRs Done
24,288,995 UART: [art] Lock RT PCRs Done
24,290,629 UART: [art] Populate DV Done
24,296,215 UART: [fht] FMC Alias Private Key: 7
24,297,936 UART: [art] Derive CDI
24,298,784 UART: [art] Store in in slot 0x4
24,358,573 UART: [art] Derive Key Pair
24,359,670 UART: [art] Store priv key in slot 0x5
27,652,386 UART: [art] Derive Key Pair - Done
27,665,381 UART: [art] Signing Cert with AUTHO
27,666,722 UART: RITY.KEYID = 7
29,953,331 UART: [art] Erasing AUTHORITY.KEYID = 7
29,954,887 UART: [art] PUB.X = FB70AE9F5936E5A2563E5532FD2F804A202D4131D0C338B91AEB8D4CAA1EB1AA8975275C006F70A3E5F1C67DD46D8F8E
29,962,070 UART: [art] PUB.Y = 6B349AEEF63ABD0D64ED168A46FCD22F8727F1CBDC405FDDF9270EE5811DBD56BF1F33385E17D43B4B95A6ECCD4CCFB7
29,969,388 UART: [art] SIG.R = C9E4B09296D7FF76AEDB824BEF725C72E67DA84C350B2A856516B9FFB3AAEF3876A0792BB7E42A718C7A6FE2022F0231
29,976,791 UART: [art] SIG.S = 90A020A19228634388B36C7616B7341800D642C69DE99297B46C8A3584E90B1146C03BEEC72D6D3CEB598EE637FE3E60
31,281,679 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,521 UART:
192,904 UART: Running Caliptra ROM ...
193,991 UART:
603,760 UART: [state] CFI Enabled
615,373 UART: [state] LifecycleState = Unprovisioned
617,298 UART: [state] DebugLocked = No
619,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,605 UART: [kat] SHA2-256
794,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,870 UART: [kat] ++
805,315 UART: [kat] sha1
816,825 UART: [kat] SHA2-256
819,540 UART: [kat] SHA2-384
825,325 UART: [kat] SHA2-512-ACC
827,689 UART: [kat] ECC-384
3,110,925 UART: [kat] HMAC-384Kdf
3,123,450 UART: [kat] LMS
4,313,599 UART: [kat] --
4,317,405 UART: [cold-reset] ++
4,319,841 UART: [fht] Storing FHT @ 0x50003400
4,330,180 UART: [idev] ++
4,330,744 UART: [idev] CDI.KEYID = 6
4,331,721 UART: [idev] SUBJECT.KEYID = 7
4,332,961 UART: [idev] UDS.KEYID = 0
4,334,006 ready_for_fw is high
4,334,232 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,374,348 UART: [idev] Erasing UDS.KEYID = 0
7,618,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,036 UART: [idev] --
7,644,029 UART: [ldev] ++
7,644,600 UART: [ldev] CDI.KEYID = 6
7,645,533 UART: [ldev] SUBJECT.KEYID = 5
7,646,744 UART: [ldev] AUTHORITY.KEYID = 7
7,648,027 UART: [ldev] FE.KEYID = 1
7,660,374 UART: [ldev] Erasing FE.KEYID = 1
10,949,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,481 UART: [ldev] --
13,309,042 UART: [fwproc] Waiting for Commands...
13,312,272 UART: [fwproc] Received command 0x46574c44
13,314,459 UART: [fwproc] Received Image of size 31676 bytes
16,365,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,444,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,513,618 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,543,137 >>> mbox cmd response: success
16,547,606 UART: [afmc] ++
16,548,209 UART: [afmc] CDI.KEYID = 6
16,549,116 UART: [afmc] SUBJECT.KEYID = 7
16,550,379 UART: [afmc] AUTHORITY.KEYID = 5
19,866,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,162,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,164,575 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,178,983 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,193,789 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,208,252 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,229,866 UART: [afmc] --
22,233,376 UART: [cold-reset] --
22,238,843 UART: [state] Locking Datavault
22,243,368 UART: [state] Locking PCR0, PCR1 and PCR31
22,245,111 UART: [state] Locking ICCM
22,247,865 UART: [exit] Launching FMC @ 0x40000130
22,256,227 UART:
22,256,469 UART: Running Caliptra FMC ...
22,257,817 UART:
22,257,982 UART: [state] CFI Enabled
22,265,439 UART: [fht] FMC Alias Private Key: 7
24,596,081 UART: [art] Extend RT PCRs Done
24,597,344 UART: [art] Lock RT PCRs Done
24,599,155 UART: [art] Populate DV Done
24,604,736 UART: [fht] FMC Alias Private Key: 7
24,606,336 UART: [art] Derive CDI
24,607,101 UART: [art] Store in in slot 0x4
24,649,722 UART: [art] Derive Key Pair
24,650,754 UART: [art] Store priv key in slot 0x5
27,893,065 UART: [art] Derive Key Pair - Done
27,906,128 UART: [art] Signing Cert with AUTHO
27,907,468 UART: RITY.KEYID = 7
30,187,026 UART: [art] Erasing AUTHORITY.KEYID = 7
30,189,154 UART: [art] PUB.X = B7FAFE13F1B6D424FC4261C14427444B2F7E6C226C06CEDBCD7B01073055CEB2D61A3C4AC50D3123F848F7695FFA8C7B
30,195,821 UART: [art] PUB.Y = 9F2D8445CDF0E17FC4857FBCC01420C0A130D012921F724463D2035EA05B1429470265AD8A38266B759F0C89DE0C1631
30,203,050 UART: [art] SIG.R = DC4CB3239132EBAC0B1747592AFC2D435F5E4E2F2A9CC98B66A381CDF3034A60250B2349C839B794DE74B95383464BCB
30,210,456 UART: [art] SIG.S = E6AC7996428F5ECCACCE199060B536035B165930B283D2147E6BC8B472BD9EA456F6268FDCEBEC4D78C94C947B2C58C3
31,514,883 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,127,340 ready_for_fw is high
4,127,730 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,393,776 >>> mbox cmd response: success
22,038,304 UART:
22,038,752 UART: Running Caliptra FMC ...
22,039,868 UART:
22,040,020 UART: [state] CFI Enabled
22,047,854 UART: [fht] FMC Alias Private Key: 7
24,379,075 UART: [art] Extend RT PCRs Done
24,380,349 UART: [art] Lock RT PCRs Done
24,381,588 UART: [art] Populate DV Done
24,386,908 UART: [fht] FMC Alias Private Key: 7
24,388,572 UART: [art] Derive CDI
24,389,338 UART: [art] Store in in slot 0x4
24,431,854 UART: [art] Derive Key Pair
24,432,895 UART: [art] Store priv key in slot 0x5
27,674,635 UART: [art] Derive Key Pair - Done
27,687,972 UART: [art] Signing Cert with AUTHO
27,689,330 UART: RITY.KEYID = 7
29,968,647 UART: [art] Erasing AUTHORITY.KEYID = 7
29,970,208 UART: [art] PUB.X = 6DF6E5506F99A7A2F2524760C85EF44E7B27545DBA799DD2F9DEEC4308960914AB150515C3203ADE801B2A61ADD7DDE2
29,977,400 UART: [art] PUB.Y = 606F93EA984293B43515A70C3C0A8037A490D9AD2E210EEC1FDA3E5A2F90196BCA1EDB7627ACB24E9B9583952AC67F31
29,984,653 UART: [art] SIG.R = 575A070761891419E3F47B4088CA64AAEC82376138AB8316FC0691B56FBF96265E47DEA73D12AE35E5B0D55CC83D8A8E
29,992,072 UART: [art] SIG.S = 188811AF76B751BBCFD780A0F345A1A4E6B735CD8A23B131FE827428B0FC0796E29C085A2B36EAAE9BF1A3A8A6C258AD
31,296,231 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,152 UART:
192,510 UART: Running Caliptra ROM ...
193,651 UART:
193,796 UART: [state] CFI Enabled
262,672 UART: [state] LifecycleState = Unprovisioned
264,559 UART: [state] DebugLocked = No
267,012 UART: [state] WD Timer not started. Device not locked for debugging
271,563 UART: [kat] SHA2-256
450,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,280 UART: [kat] ++
462,723 UART: [kat] sha1
474,439 UART: [kat] SHA2-256
477,458 UART: [kat] SHA2-384
484,801 UART: [kat] SHA2-512-ACC
487,736 UART: [kat] ECC-384
2,949,641 UART: [kat] HMAC-384Kdf
2,971,049 UART: [kat] LMS
3,500,450 UART: [kat] --
3,505,084 UART: [cold-reset] ++
3,506,446 UART: [fht] FHT @ 0x50003400
3,517,914 UART: [idev] ++
3,518,472 UART: [idev] CDI.KEYID = 6
3,519,419 UART: [idev] SUBJECT.KEYID = 7
3,520,587 UART: [idev] UDS.KEYID = 0
3,521,582 ready_for_fw is high
3,521,766 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,561,997 UART: [idev] Erasing UDS.KEYID = 0
6,023,968 UART: [idev] Sha1 KeyId Algorithm
6,046,949 UART: [idev] --
6,052,539 UART: [ldev] ++
6,053,121 UART: [ldev] CDI.KEYID = 6
6,054,003 UART: [ldev] SUBJECT.KEYID = 5
6,055,220 UART: [ldev] AUTHORITY.KEYID = 7
6,056,457 UART: [ldev] FE.KEYID = 1
6,098,836 UART: [ldev] Erasing FE.KEYID = 1
8,601,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,240 UART: [ldev] --
10,413,018 UART: [fwproc] Wait for Commands...
10,414,732 UART: [fwproc] Recv command 0x46574c44
10,416,822 UART: [fwproc] Recv'd Img size: 31656 bytes
12,812,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,888,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,957,066 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,984,728 >>> mbox cmd response: success
12,988,422 UART: [afmc] ++
12,989,038 UART: [afmc] CDI.KEYID = 6
12,989,950 UART: [afmc] SUBJECT.KEYID = 7
12,991,220 UART: [afmc] AUTHORITY.KEYID = 5
15,525,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,248,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,250,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,265,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,281,872 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,297,737 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,321,298 UART: [afmc] --
17,324,301 UART: [cold-reset] --
17,328,052 UART: [state] Locking Datavault
17,332,994 UART: [state] Locking PCR0, PCR1 and PCR31
17,334,667 UART: [state] Locking ICCM
17,336,851 UART: [exit] Launching FMC @ 0x40000130
17,345,314 UART:
17,345,560 UART: Running Caliptra FMC ...
17,346,608 UART:
17,346,750 UART: [state] CFI Enabled
17,406,832 UART: [fht] FMC Alias Private Key: 7
19,171,163 UART: [art] Extend RT PCRs Done
19,172,395 UART: [art] Lock RT PCRs Done
19,174,061 UART: [art] Populate DV Done
19,179,366 UART: [fht] FMC Alias Private Key: 7
19,181,018 UART: [art] Derive CDI
19,181,780 UART: [art] Store in in slot 0x4
19,239,101 UART: [art] Derive Key Pair
19,240,363 UART: [art] Store priv key in slot 0x5
21,702,978 UART: [art] Derive Key Pair - Done
21,715,693 UART: [art] Signing Cert with AUTHO
21,717,034 UART: RITY.KEYID = 7
23,428,774 UART: [art] Erasing AUTHORITY.KEYID = 7
23,430,320 UART: [art] PUB.X = 056D725F7718D26CEE4FE3FA7274D1E6EB368F85B829AC6A8B762A9E9CF011C9077A62D1571E93DEE82F0C689929789A
23,437,539 UART: [art] PUB.Y = 7A9F1846A6F17C88ABF3AC543AD4B3E5CAD7BA32D7C2F31AD8EF56A867F125F00072462C46DD572C6E5E4B4AED23C5DF
23,444,863 UART: [art] SIG.R = 7B9D34911A6954F89A4E77AFB891D1C450D7BF7243154B844D49BEE1469417AE2C81A18610F390E3E83184DF1CB1F99F
23,452,197 UART: [art] SIG.S = 1FDB6A622DFF1FDA4768108D63992F2ED7D9719C19805541FE8299A7FE3CB592FFA58FA63A11A71B78C709FFD4DE0FF0
24,431,368 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,381,093 ready_for_fw is high
3,381,518 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,745,123 >>> mbox cmd response: success
17,049,170 UART:
17,049,986 UART: Running Caliptra FMC ...
17,051,124 UART:
17,051,278 UART: [state] CFI Enabled
17,114,731 UART: [fht] FMC Alias Private Key: 7
18,877,876 UART: [art] Extend RT PCRs Done
18,879,136 UART: [art] Lock RT PCRs Done
18,880,671 UART: [art] Populate DV Done
18,886,062 UART: [fht] FMC Alias Private Key: 7
18,887,586 UART: [art] Derive CDI
18,888,373 UART: [art] Store in in slot 0x4
18,947,697 UART: [art] Derive Key Pair
18,948,785 UART: [art] Store priv key in slot 0x5
21,411,828 UART: [art] Derive Key Pair - Done
21,424,687 UART: [art] Signing Cert with AUTHO
21,426,026 UART: RITY.KEYID = 7
23,137,901 UART: [art] Erasing AUTHORITY.KEYID = 7
23,139,451 UART: [art] PUB.X = 3B3081A9037F3B1B84AEBBC6AE202B0C94308B7A1DAC341D7B868A888842FDF67009720731FF2B86BDBED99BA003719B
23,146,726 UART: [art] PUB.Y = 5F54A0F8758C38DB2B89B1E5184F1988D90A38A1FE90F9C187E8659949AF8C20F34A5DC6D1ACBAB25787535AE54A76FC
23,153,955 UART: [art] SIG.R = 60E05033D4278640B62C2B281EE9AA0C8845CA2BFBEC305FFF9209ECEC9192F7456127845FC0FF3D0150A86727A36196
23,161,366 UART: [art] SIG.S = F7B1BE2833E708FE659A1CEF5AED472E2A1364DC12FE718C7762CB1C3AF417EBA3F359865C0AD0B9497C5F502476F022
24,139,413 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,463 UART:
192,815 UART: Running Caliptra ROM ...
193,988 UART:
603,472 UART: [state] CFI Enabled
617,470 UART: [state] LifecycleState = Unprovisioned
619,380 UART: [state] DebugLocked = No
620,987 UART: [state] WD Timer not started. Device not locked for debugging
624,949 UART: [kat] SHA2-256
804,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,668 UART: [kat] ++
816,110 UART: [kat] sha1
827,257 UART: [kat] SHA2-256
830,256 UART: [kat] SHA2-384
834,899 UART: [kat] SHA2-512-ACC
837,832 UART: [kat] ECC-384
3,279,819 UART: [kat] HMAC-384Kdf
3,290,698 UART: [kat] LMS
3,820,170 UART: [kat] --
3,823,246 UART: [cold-reset] ++
3,825,631 UART: [fht] FHT @ 0x50003400
3,836,102 UART: [idev] ++
3,836,691 UART: [idev] CDI.KEYID = 6
3,837,627 UART: [idev] SUBJECT.KEYID = 7
3,838,802 UART: [idev] UDS.KEYID = 0
3,839,727 ready_for_fw is high
3,839,960 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,879,902 UART: [idev] Erasing UDS.KEYID = 0
6,310,443 UART: [idev] Sha1 KeyId Algorithm
6,332,537 UART: [idev] --
6,336,050 UART: [ldev] ++
6,336,625 UART: [ldev] CDI.KEYID = 6
6,337,537 UART: [ldev] SUBJECT.KEYID = 5
6,338,746 UART: [ldev] AUTHORITY.KEYID = 7
6,339,974 UART: [ldev] FE.KEYID = 1
6,349,479 UART: [ldev] Erasing FE.KEYID = 1
8,825,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,152 UART: [ldev] --
10,614,480 UART: [fwproc] Wait for Commands...
10,616,742 UART: [fwproc] Recv command 0x46574c44
10,618,827 UART: [fwproc] Recv'd Img size: 31656 bytes
13,010,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,075,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,144,740 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,172,686 >>> mbox cmd response: success
13,176,813 UART: [afmc] ++
13,177,423 UART: [afmc] CDI.KEYID = 6
13,178,335 UART: [afmc] SUBJECT.KEYID = 7
13,179,423 UART: [afmc] AUTHORITY.KEYID = 5
15,681,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,400,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,402,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,418,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,434,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,450,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,471,986 UART: [afmc] --
17,476,596 UART: [cold-reset] --
17,480,269 UART: [state] Locking Datavault
17,487,065 UART: [state] Locking PCR0, PCR1 and PCR31
17,488,760 UART: [state] Locking ICCM
17,489,973 UART: [exit] Launching FMC @ 0x40000130
17,498,317 UART:
17,498,572 UART: Running Caliptra FMC ...
17,499,632 UART:
17,499,778 UART: [state] CFI Enabled
17,507,876 UART: [fht] FMC Alias Private Key: 7
19,264,057 UART: [art] Extend RT PCRs Done
19,265,314 UART: [art] Lock RT PCRs Done
19,266,841 UART: [art] Populate DV Done
19,272,343 UART: [fht] FMC Alias Private Key: 7
19,273,923 UART: [art] Derive CDI
19,274,679 UART: [art] Store in in slot 0x4
19,316,811 UART: [art] Derive Key Pair
19,317,841 UART: [art] Store priv key in slot 0x5
21,744,793 UART: [art] Derive Key Pair - Done
21,757,986 UART: [art] Signing Cert with AUTHO
21,759,317 UART: RITY.KEYID = 7
23,464,743 UART: [art] Erasing AUTHORITY.KEYID = 7
23,466,294 UART: [art] PUB.X = 5B8E5089A5E226D513547C3ECE3C47D2B5BCD6C9DC6A8BB2CEF1C54E5AAA9189CD804095FE8394A7592E8FA67BA0B4FC
23,473,605 UART: [art] PUB.Y = 2D23F0FED46052886629249B9A75D11534AB1B0C1DCBF17040AC563C65C84C6D8F912750D922C4591EF53A218064EEF2
23,480,832 UART: [art] SIG.R = 9B1DEAEA58CE7DB8740BB46E61BFD1E10FD2634607324F80BD0E73344783EB4AE1F4A873CB070E70AFD2E56C6F175D76
23,488,254 UART: [art] SIG.S = 8D95D3F68CD816E2CE8BC5D69CF6F18118615B830E1B24AF1D21A8F649FA412CC97F49A52CBD66FD610B86E5B8621D36
24,466,888 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,698,666 ready_for_fw is high
3,699,092 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,957,032 >>> mbox cmd response: success
17,210,250 UART:
17,210,625 UART: Running Caliptra FMC ...
17,211,734 UART:
17,211,883 UART: [state] CFI Enabled
17,219,445 UART: [fht] FMC Alias Private Key: 7
18,976,413 UART: [art] Extend RT PCRs Done
18,977,670 UART: [art] Lock RT PCRs Done
18,979,247 UART: [art] Populate DV Done
18,984,624 UART: [fht] FMC Alias Private Key: 7
18,986,145 UART: [art] Derive CDI
18,986,906 UART: [art] Store in in slot 0x4
19,029,872 UART: [art] Derive Key Pair
19,030,952 UART: [art] Store priv key in slot 0x5
21,457,497 UART: [art] Derive Key Pair - Done
21,470,146 UART: [art] Signing Cert with AUTHO
21,471,682 UART: RITY.KEYID = 7
23,176,568 UART: [art] Erasing AUTHORITY.KEYID = 7
23,178,128 UART: [art] PUB.X = 4DF265EC0F19E8B9304D6F1A956CDF8F733B516F088089AFAF3F4FA1251DD5291E6232A03D390FD850C027B4B5FF222F
23,185,303 UART: [art] PUB.Y = F8D62E3640D0F8760FA633CF983AEC274B476A09ED10D76BBB98BE2D204BAA312D475D42668156767CEB4A308261D161
23,192,623 UART: [art] SIG.R = 6363164A30D95E4814BC8B882A617C42275B3E9F6A201A01C690F4E5ECB7FE398F73EAE941CCCEB555DD470461893DBD
23,200,022 UART: [art] SIG.S = 0242B420CEC081221F3E4047EC606534315478086BBBCF4F95EF62AC60A26CCF5D9B1A1B87A4F4F35AEA9A5C74256685
24,178,675 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,044 UART:
192,421 UART: Running Caliptra ROM ...
193,613 UART:
193,769 UART: [state] CFI Enabled
267,134 UART: [state] LifecycleState = Unprovisioned
269,508 UART: [state] DebugLocked = No
272,117 UART: [state] WD Timer not started. Device not locked for debugging
277,362 UART: [kat] SHA2-256
467,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,049 UART: [kat] ++
478,498 UART: [kat] sha1
489,764 UART: [kat] SHA2-256
492,777 UART: [kat] SHA2-384
498,690 UART: [kat] SHA2-512-ACC
501,270 UART: [kat] ECC-384
2,948,707 UART: [kat] HMAC-384Kdf
2,973,374 UART: [kat] LMS
3,505,162 UART: [kat] --
3,510,649 UART: [cold-reset] ++
3,512,934 UART: [fht] FHT @ 0x50003400
3,522,986 UART: [idev] ++
3,523,695 UART: [idev] CDI.KEYID = 6
3,524,678 UART: [idev] SUBJECT.KEYID = 7
3,525,847 UART: [idev] UDS.KEYID = 0
3,526,764 ready_for_fw is high
3,526,967 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,567,319 UART: [idev] Erasing UDS.KEYID = 0
6,030,788 UART: [idev] Sha1 KeyId Algorithm
6,052,727 UART: [idev] --
6,056,782 UART: [ldev] ++
6,057,464 UART: [ldev] CDI.KEYID = 6
6,058,369 UART: [ldev] SUBJECT.KEYID = 5
6,059,591 UART: [ldev] AUTHORITY.KEYID = 7
6,060,790 UART: [ldev] FE.KEYID = 1
6,100,604 UART: [ldev] Erasing FE.KEYID = 1
8,608,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,707 UART: [ldev] --
10,414,646 UART: [fwproc] Wait for Commands...
10,417,492 UART: [fwproc] Recv command 0x46574c44
10,419,796 UART: [fwproc] Recv'd Img size: 31656 bytes
12,848,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,922,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,038,730 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,084,774 >>> mbox cmd response: success
13,088,151 UART: [afmc] ++
13,088,794 UART: [afmc] CDI.KEYID = 6
13,090,021 UART: [afmc] SUBJECT.KEYID = 7
13,091,436 UART: [afmc] AUTHORITY.KEYID = 5
15,631,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,359,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,360,923 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,376,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,391,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,406,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,430,117 UART: [afmc] --
17,433,418 UART: [cold-reset] --
17,438,793 UART: [state] Locking Datavault
17,443,953 UART: [state] Locking PCR0, PCR1 and PCR31
17,446,153 UART: [state] Locking ICCM
17,448,103 UART: [exit] Launching FMC @ 0x40000130
17,456,771 UART:
17,457,031 UART: Running Caliptra FMC ...
17,458,175 UART:
17,458,331 UART: [state] CFI Enabled
17,515,737 UART: [fht] FMC Alias Private Key: 7
19,279,862 UART: [art] Extend RT PCRs Done
19,281,124 UART: [art] Lock RT PCRs Done
19,282,758 UART: [art] Populate DV Done
19,288,340 UART: [fht] FMC Alias Private Key: 7
19,289,786 UART: [art] Derive CDI
19,290,574 UART: [art] Store in in slot 0x4
19,348,627 UART: [art] Derive Key Pair
19,349,704 UART: [art] Store priv key in slot 0x5
21,812,978 UART: [art] Derive Key Pair - Done
21,826,171 UART: [art] Signing Cert with AUTHO
21,827,508 UART: RITY.KEYID = 7
23,538,674 UART: [art] Erasing AUTHORITY.KEYID = 7
23,540,252 UART: [art] PUB.X = 9597FDDB9FBF44CAB8348BA0D5D0BBDC248583E86D21476F602E5255ED7095DE9B1BCC44379E081B6CB7EC197282F124
23,547,483 UART: [art] PUB.Y = FDA59DC6D2C89249CE16AFA420112189F81FD9751EA04C54196004710598BC7E2F2AABC5141EB6FCA25F6F3C3593050F
23,554,734 UART: [art] SIG.R = C17BC6C148CDECAB72E2A97A07EE3ED947D9C48F1F9FE6A6505358CD9A557536EADBA522E6950D45002F8FDB7CB094F4
23,562,207 UART: [art] SIG.S = 1BFAD822F5563163BE4B691038C507D1AC6AA65A81C41299047D385E94BC22A4AD4DCC9CB9AEFDBBF24551CB51DD7788
24,540,346 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,437,645 ready_for_fw is high
3,438,019 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,962,275 >>> mbox cmd response: success
17,243,148 UART:
17,243,530 UART: Running Caliptra FMC ...
17,244,639 UART:
17,244,810 UART: [state] CFI Enabled
17,310,331 UART: [fht] FMC Alias Private Key: 7
19,074,078 UART: [art] Extend RT PCRs Done
19,075,353 UART: [art] Lock RT PCRs Done
19,077,205 UART: [art] Populate DV Done
19,082,591 UART: [fht] FMC Alias Private Key: 7
19,084,196 UART: [art] Derive CDI
19,084,961 UART: [art] Store in in slot 0x4
19,141,875 UART: [art] Derive Key Pair
19,142,955 UART: [art] Store priv key in slot 0x5
21,606,054 UART: [art] Derive Key Pair - Done
21,619,048 UART: [art] Signing Cert with AUTHO
21,620,397 UART: RITY.KEYID = 7
23,331,946 UART: [art] Erasing AUTHORITY.KEYID = 7
23,333,496 UART: [art] PUB.X = B46437F9D21655041AA203B6F6B2DBF2D6408FC7C715539919726016624B090FF8E83362E5581BB0160FB30161AC7BAE
23,340,774 UART: [art] PUB.Y = 5CF00E546DAB1F5980939A61EB3AEA56E99051AA22B2D839A5041B0F7914AF73CA6AD1D11F3C4DA611CDEBF1F1E69DE3
23,348,078 UART: [art] SIG.R = FDC3E99F9950C803AD64E08E407A374A1D6947A527434D5736264C577E606A9C4EFBB97F083C37FBD96BDE05D7C47FD4
23,355,417 UART: [art] SIG.S = 13F6977A4818C4A9FCDD9DA481EB3B6D80124CB973A2058B4D9E0711372C3FAA988F854C3FAF334D07558B138CCFA2C0
24,334,363 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,407 UART:
192,762 UART: Running Caliptra ROM ...
193,848 UART:
603,465 UART: [state] CFI Enabled
616,512 UART: [state] LifecycleState = Unprovisioned
618,858 UART: [state] DebugLocked = No
621,505 UART: [state] WD Timer not started. Device not locked for debugging
626,815 UART: [kat] SHA2-256
816,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,494 UART: [kat] ++
828,006 UART: [kat] sha1
839,326 UART: [kat] SHA2-256
842,369 UART: [kat] SHA2-384
848,999 UART: [kat] SHA2-512-ACC
851,578 UART: [kat] ECC-384
3,292,173 UART: [kat] HMAC-384Kdf
3,305,609 UART: [kat] LMS
3,837,473 UART: [kat] --
3,843,309 UART: [cold-reset] ++
3,844,527 UART: [fht] FHT @ 0x50003400
3,855,926 UART: [idev] ++
3,856,566 UART: [idev] CDI.KEYID = 6
3,857,595 UART: [idev] SUBJECT.KEYID = 7
3,858,768 UART: [idev] UDS.KEYID = 0
3,859,711 ready_for_fw is high
3,859,898 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,899,998 UART: [idev] Erasing UDS.KEYID = 0
6,337,122 UART: [idev] Sha1 KeyId Algorithm
6,359,630 UART: [idev] --
6,364,510 UART: [ldev] ++
6,365,192 UART: [ldev] CDI.KEYID = 6
6,366,097 UART: [ldev] SUBJECT.KEYID = 5
6,367,261 UART: [ldev] AUTHORITY.KEYID = 7
6,368,494 UART: [ldev] FE.KEYID = 1
6,380,594 UART: [ldev] Erasing FE.KEYID = 1
8,858,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,460 UART: [ldev] --
10,646,400 UART: [fwproc] Wait for Commands...
10,648,442 UART: [fwproc] Recv command 0x46574c44
10,650,742 UART: [fwproc] Recv'd Img size: 31656 bytes
13,083,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,161,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,277,708 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,324,550 >>> mbox cmd response: success
13,329,243 UART: [afmc] ++
13,329,863 UART: [afmc] CDI.KEYID = 6
13,331,081 UART: [afmc] SUBJECT.KEYID = 7
13,332,590 UART: [afmc] AUTHORITY.KEYID = 5
15,834,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,556,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,558,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,573,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,589,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,604,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,628,736 UART: [afmc] --
17,631,824 UART: [cold-reset] --
17,636,334 UART: [state] Locking Datavault
17,642,439 UART: [state] Locking PCR0, PCR1 and PCR31
17,644,645 UART: [state] Locking ICCM
17,647,284 UART: [exit] Launching FMC @ 0x40000130
17,655,927 UART:
17,656,179 UART: Running Caliptra FMC ...
17,657,314 UART:
17,657,472 UART: [state] CFI Enabled
17,665,583 UART: [fht] FMC Alias Private Key: 7
19,422,668 UART: [art] Extend RT PCRs Done
19,423,927 UART: [art] Lock RT PCRs Done
19,425,616 UART: [art] Populate DV Done
19,431,287 UART: [fht] FMC Alias Private Key: 7
19,433,014 UART: [art] Derive CDI
19,433,859 UART: [art] Store in in slot 0x4
19,476,606 UART: [art] Derive Key Pair
19,477,694 UART: [art] Store priv key in slot 0x5
21,904,184 UART: [art] Derive Key Pair - Done
21,917,303 UART: [art] Signing Cert with AUTHO
21,918,645 UART: RITY.KEYID = 7
23,624,307 UART: [art] Erasing AUTHORITY.KEYID = 7
23,625,862 UART: [art] PUB.X = 0833E668385CB0BE177E3D122F8D6EF7F390604C96697B1E5E18FE8BE3F1434565CED63BE89438CB571615AFD695EDC2
23,633,079 UART: [art] PUB.Y = 6B17E8FD0EFDE828AA7BEE92EC1441CA0B070355180BEDD7DE8E139D79C6CA26BFCA222D7AF2BB4E754D6B893B5B1A55
23,640,426 UART: [art] SIG.R = 035F829326F29D178F344356A3EDAFDEEF058F234F3CBF20D9E7C062B16FBE05944B8CE18C570FB6FBECCDEAFA74F5B4
23,647,767 UART: [art] SIG.S = 947FD6C1199325D90C82C4588C00E23178500E8C1F9DD3785CD9319C9C651D232361096B25177C744D0BDB77EA4FE080
24,625,938 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,761,113 ready_for_fw is high
3,761,594 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,184,993 >>> mbox cmd response: success
17,440,939 UART:
17,441,320 UART: Running Caliptra FMC ...
17,442,524 UART:
17,442,687 UART: [state] CFI Enabled
17,450,473 UART: [fht] FMC Alias Private Key: 7
19,207,298 UART: [art] Extend RT PCRs Done
19,208,571 UART: [art] Lock RT PCRs Done
19,210,310 UART: [art] Populate DV Done
19,215,757 UART: [fht] FMC Alias Private Key: 7
19,217,423 UART: [art] Derive CDI
19,218,289 UART: [art] Store in in slot 0x4
19,260,753 UART: [art] Derive Key Pair
19,261,789 UART: [art] Store priv key in slot 0x5
21,688,955 UART: [art] Derive Key Pair - Done
21,702,155 UART: [art] Signing Cert with AUTHO
21,703,498 UART: RITY.KEYID = 7
23,409,065 UART: [art] Erasing AUTHORITY.KEYID = 7
23,410,739 UART: [art] PUB.X = 739A81222985C8BE66C0125C9EB23BA38A38F5500DFCCCA640C6861C600FEFD1E8D6D2D9E74D84962EA632B8F3AB7AF9
23,417,875 UART: [art] PUB.Y = 48FC47919FB79B7EEF1F58CB58DF2C3EF67446AF51D7C0DA8ACF2DCF4A2F6F0C4E03E5F4036DE96F2F1800936021D3E8
23,425,413 UART: [art] SIG.R = 52DC1EBADD54CD7607C8A1A2B31DB112DA58935ED63A768029A36405199F266680CF3F3D304EFDA341C2917BF2105CA3
23,432,578 UART: [art] SIG.S = 51CAFF6E7B676C2C4880854AEBF6C4FC45C32F9C9319604951DE1C3E0A5AFACFD043DE8753E7A968BA8F416F47C75C41
24,411,215 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
906,878 UART: [kat] LMS
1,475,074 UART: [kat] --
1,475,501 UART: [cold-reset] ++
1,475,937 UART: [fht] Storing FHT @ 0x50003400
1,478,784 UART: [idev] ++
1,478,952 UART: [idev] CDI.KEYID = 6
1,479,312 UART: [idev] SUBJECT.KEYID = 7
1,479,736 UART: [idev] UDS.KEYID = 0
1,480,081 ready_for_fw is high
1,480,081 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,094 UART: [idev] Erasing UDS.KEYID = 0
1,504,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,172 UART: [idev] --
1,514,159 UART: [ldev] ++
1,514,327 UART: [ldev] CDI.KEYID = 6
1,514,690 UART: [ldev] SUBJECT.KEYID = 5
1,515,116 UART: [ldev] AUTHORITY.KEYID = 7
1,515,579 UART: [ldev] FE.KEYID = 1
1,520,529 UART: [ldev] Erasing FE.KEYID = 1
1,545,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,846 UART: [ldev] --
1,584,321 UART: [fwproc] Waiting for Commands...
1,585,080 UART: [fwproc] Received command 0x46574c44
1,585,871 UART: [fwproc] Received Image of size 31656 bytes
1,937,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,150 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,439 >>> mbox cmd response: success
2,007,559 UART: [afmc] ++
2,007,727 UART: [afmc] CDI.KEYID = 6
2,008,089 UART: [afmc] SUBJECT.KEYID = 7
2,008,514 UART: [afmc] AUTHORITY.KEYID = 5
2,043,901 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,368 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,058 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,051 UART: [afmc] --
2,087,137 UART: [cold-reset] --
2,088,145 UART: [state] Locking Datavault
2,089,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,146 UART: [state] Locking ICCM
2,090,572 UART: [exit] Launching FMC @ 0x40000130
2,095,901 UART:
2,095,917 UART: Running Caliptra FMC ...
2,096,325 UART:
2,096,379 UART: [state] CFI Enabled
2,107,000 UART: [fht] FMC Alias Private Key: 7
2,214,163 UART: [art] Extend RT PCRs Done
2,214,591 UART: [art] Lock RT PCRs Done
2,216,331 UART: [art] Populate DV Done
2,224,566 UART: [fht] FMC Alias Private Key: 7
2,225,726 UART: [art] Derive CDI
2,226,006 UART: [art] Store in in slot 0x4
2,311,769 UART: [art] Derive Key Pair
2,312,129 UART: [art] Store priv key in slot 0x5
2,325,053 UART: [art] Derive Key Pair - Done
2,339,805 UART: [art] Signing Cert with AUTHO
2,340,285 UART: RITY.KEYID = 7
2,355,157 UART: [art] Erasing AUTHORITY.KEYID = 7
2,355,922 UART: [art] PUB.X = 0CA897F554A5F3E2CAA878EC812EA18F461AF9665B44D333575EC0FF5497165260F95340D506E960F8C298D787943392
2,362,680 UART: [art] PUB.Y = C5F8A20C46749282516B9A9FCB3BE5BCEBD3A83E52E1CD081E236601D4154B395D0F77579D93520BAD9E13C89221010A
2,369,613 UART: [art] SIG.R = 4DB9771821EE0C8716FE3B44B2B995F22DEA1ADC3EA0172D0FCD6EC4BD12607A60243EF62BDE112FBF94FA603D01B1C2
2,376,394 UART: [art] SIG.S = C13BBA0833C65462A5A4B702E6917A820055790B7D419432C852A8967BFCE3027F5AED266F1732CB9528343DE90A79AC
2,400,137 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,365 ready_for_fw is high
1,362,365 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,447 >>> mbox cmd response: success
1,918,337 UART:
1,918,353 UART: Running Caliptra FMC ...
1,918,761 UART:
1,918,815 UART: [state] CFI Enabled
1,929,332 UART: [fht] FMC Alias Private Key: 7
2,037,463 UART: [art] Extend RT PCRs Done
2,037,891 UART: [art] Lock RT PCRs Done
2,039,179 UART: [art] Populate DV Done
2,047,380 UART: [fht] FMC Alias Private Key: 7
2,048,366 UART: [art] Derive CDI
2,048,646 UART: [art] Store in in slot 0x4
2,134,163 UART: [art] Derive Key Pair
2,134,523 UART: [art] Store priv key in slot 0x5
2,147,385 UART: [art] Derive Key Pair - Done
2,162,149 UART: [art] Signing Cert with AUTHO
2,162,629 UART: RITY.KEYID = 7
2,177,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,236 UART: [art] PUB.X = D7DDEEA0324CAF8982974136413DAED728F64B5D6854CD65BAC9BA652D196C164D758E3263239100725DA0D3AB798C2E
2,184,990 UART: [art] PUB.Y = 3FEAE40C80443C25A5A6CB80767C3670ADA7D4D435DF8FED0F34A727EC5957F2731837218C8564F8EC387565FDFAF937
2,191,942 UART: [art] SIG.R = 762486595CCD074ECC4CF64CC69BCD38C0D1589860F31D65A3FD3BFABEBACDFB2798AFE5B53B63B7684337EF1603743E
2,198,724 UART: [art] SIG.S = 331B4DF46E8ACEEA30645FAE0B6C1E78C0DA64F42C32D608F8A08D5A0C75CEA387BCBBE2A8B1E27BE00E7EDFB7043747
2,222,137 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,776 UART: [kat] SHA2-256
882,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,822 UART: [kat] ++
886,974 UART: [kat] sha1
891,132 UART: [kat] SHA2-256
893,070 UART: [kat] SHA2-384
895,993 UART: [kat] SHA2-512-ACC
897,894 UART: [kat] ECC-384
903,559 UART: [kat] HMAC-384Kdf
908,169 UART: [kat] LMS
1,476,365 UART: [kat] --
1,477,528 UART: [cold-reset] ++
1,477,928 UART: [fht] Storing FHT @ 0x50003400
1,480,891 UART: [idev] ++
1,481,059 UART: [idev] CDI.KEYID = 6
1,481,419 UART: [idev] SUBJECT.KEYID = 7
1,481,843 UART: [idev] UDS.KEYID = 0
1,482,188 ready_for_fw is high
1,482,188 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,717 UART: [idev] Erasing UDS.KEYID = 0
1,506,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,003 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,514 UART: [ldev] Erasing FE.KEYID = 1
1,548,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,057 UART: [ldev] --
1,587,362 UART: [fwproc] Waiting for Commands...
1,588,081 UART: [fwproc] Received command 0x46574c44
1,588,872 UART: [fwproc] Received Image of size 31656 bytes
1,939,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,979 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,331 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,100 >>> mbox cmd response: success
2,009,290 UART: [afmc] ++
2,009,458 UART: [afmc] CDI.KEYID = 6
2,009,820 UART: [afmc] SUBJECT.KEYID = 7
2,010,245 UART: [afmc] AUTHORITY.KEYID = 5
2,045,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,183 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,873 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,692 UART: [afmc] --
2,088,792 UART: [cold-reset] --
2,089,626 UART: [state] Locking Datavault
2,090,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,375 UART: [state] Locking ICCM
2,091,899 UART: [exit] Launching FMC @ 0x40000130
2,097,228 UART:
2,097,244 UART: Running Caliptra FMC ...
2,097,652 UART:
2,097,795 UART: [state] CFI Enabled
2,108,708 UART: [fht] FMC Alias Private Key: 7
2,216,817 UART: [art] Extend RT PCRs Done
2,217,245 UART: [art] Lock RT PCRs Done
2,218,795 UART: [art] Populate DV Done
2,226,954 UART: [fht] FMC Alias Private Key: 7
2,228,014 UART: [art] Derive CDI
2,228,294 UART: [art] Store in in slot 0x4
2,314,335 UART: [art] Derive Key Pair
2,314,695 UART: [art] Store priv key in slot 0x5
2,328,145 UART: [art] Derive Key Pair - Done
2,342,974 UART: [art] Signing Cert with AUTHO
2,343,454 UART: RITY.KEYID = 7
2,358,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,149 UART: [art] PUB.X = FB2D1E6FB70E1AC68D598ACAC5BE8ACF999BE36363EC8BC237E141D0957407FB4595BE85D75A7B72AD7329E18CE726A8
2,365,931 UART: [art] PUB.Y = 4E7EBCAF44AA42881423ECDD29DC91CA4FC5739FD168991F35518DFD387D04A4D2342C3296BE5598833373211F2E32CA
2,372,884 UART: [art] SIG.R = 4298B1930EA6D9DEBCFD8BE7E0E7FB40358B58D7ED7C4C4D9C9EC141FBC52C5B9FFFBDA811929B33BD93C1615FD846F2
2,379,677 UART: [art] SIG.S = BD972FFD2337A6C83383E7F75F6DD26F16F4BB7B50D7E935C9ED73B85A0B698145B149063FD38AD54197C2CD75C7A2E3
2,403,259 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 ready_for_fw is high
1,362,768 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,858,310 >>> mbox cmd response: success
1,919,246 UART:
1,919,262 UART: Running Caliptra FMC ...
1,919,670 UART:
1,919,813 UART: [state] CFI Enabled
1,930,510 UART: [fht] FMC Alias Private Key: 7
2,038,781 UART: [art] Extend RT PCRs Done
2,039,209 UART: [art] Lock RT PCRs Done
2,040,877 UART: [art] Populate DV Done
2,049,116 UART: [fht] FMC Alias Private Key: 7
2,050,276 UART: [art] Derive CDI
2,050,556 UART: [art] Store in in slot 0x4
2,136,329 UART: [art] Derive Key Pair
2,136,689 UART: [art] Store priv key in slot 0x5
2,150,149 UART: [art] Derive Key Pair - Done
2,165,095 UART: [art] Signing Cert with AUTHO
2,165,575 UART: RITY.KEYID = 7
2,180,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,384 UART: [art] PUB.X = CE234DF140718DAFD0ABB84364553ABDCDA70AE94F3A265E08B62FC905F6733FFB8C9DF3344BBC4696D84D95567A1E8B
2,188,163 UART: [art] PUB.Y = 8CDD21A473B0D56861D2DBCD51EF73870AE8F45748B01491431704C47474EF7EA6853E9F31082EEC2696CEE3904D71F8
2,195,106 UART: [art] SIG.R = BB416D4674DA25572A0395B0E3558D788FA55C703AA0B33AFEE65A2AD78EC3D9D5F69E52A0586EEE3B6AE7C509097CE9
2,201,881 UART: [art] SIG.S = 412AF7C3014498D2E4341222E5BA667F5425B8579B6AF2E05E11748E820B546ADC299956FC25708CE54ADCCCD987DA20
2,225,405 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
893,074 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,199 UART: [kat] ++
897,351 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,839 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 ready_for_fw is high
1,176,945 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,304 UART: [idev] Erasing UDS.KEYID = 0
1,201,363 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,210,793 UART: [ldev] ++
1,210,961 UART: [ldev] CDI.KEYID = 6
1,211,324 UART: [ldev] SUBJECT.KEYID = 5
1,211,750 UART: [ldev] AUTHORITY.KEYID = 7
1,212,213 UART: [ldev] FE.KEYID = 1
1,217,521 UART: [ldev] Erasing FE.KEYID = 1
1,243,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,977 UART: [ldev] --
1,283,314 UART: [fwproc] Wait for Commands...
1,284,114 UART: [fwproc] Recv command 0x46574c44
1,284,842 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,063 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,794 >>> mbox cmd response: success
1,705,050 UART: [afmc] ++
1,705,218 UART: [afmc] CDI.KEYID = 6
1,705,580 UART: [afmc] SUBJECT.KEYID = 7
1,706,005 UART: [afmc] AUTHORITY.KEYID = 5
1,741,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,577 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,207 UART: [afmc] --
1,784,221 UART: [cold-reset] --
1,785,117 UART: [state] Locking Datavault
1,786,228 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,832 UART: [state] Locking ICCM
1,787,264 UART: [exit] Launching FMC @ 0x40000130
1,792,593 UART:
1,792,609 UART: Running Caliptra FMC ...
1,793,017 UART:
1,793,071 UART: [state] CFI Enabled
1,803,846 UART: [fht] FMC Alias Private Key: 7
1,911,585 UART: [art] Extend RT PCRs Done
1,912,013 UART: [art] Lock RT PCRs Done
1,913,511 UART: [art] Populate DV Done
1,921,714 UART: [fht] FMC Alias Private Key: 7
1,922,758 UART: [art] Derive CDI
1,923,038 UART: [art] Store in in slot 0x4
2,008,471 UART: [art] Derive Key Pair
2,008,831 UART: [art] Store priv key in slot 0x5
2,021,711 UART: [art] Derive Key Pair - Done
2,036,441 UART: [art] Signing Cert with AUTHO
2,036,921 UART: RITY.KEYID = 7
2,051,905 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,670 UART: [art] PUB.X = 0C7AC6DED75F6A66701D645C9B1460B56087E713DA56603DB254209671EB7459A96BF6FB7ED036A1EDFC8ECE45F89EF6
2,059,449 UART: [art] PUB.Y = BCEF6B84652C09E1945A6870EC6431CCE3F251FDC4E7E31996B8CCA703B924A2E5D55F0B2F416C4FCC2F3D4688263DD9
2,066,404 UART: [art] SIG.R = DE1AD31F1EDB8744582F33EFA104532CED62146E49B149C6C19995B8A16ACA2E39B1D7CFC35819E193AA0AE5D343145F
2,073,180 UART: [art] SIG.S = BA14F29C0BDC642A7C3C5F0D3ACA403C3715A7FEB3CCE71D317D68D356D3474695F200BA0EB3BAB4F905E6D46E310431
2,097,109 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,691 ready_for_fw is high
1,060,691 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,147 >>> mbox cmd response: success
1,617,821 UART:
1,617,837 UART: Running Caliptra FMC ...
1,618,245 UART:
1,618,299 UART: [state] CFI Enabled
1,628,774 UART: [fht] FMC Alias Private Key: 7
1,736,723 UART: [art] Extend RT PCRs Done
1,737,151 UART: [art] Lock RT PCRs Done
1,738,707 UART: [art] Populate DV Done
1,746,922 UART: [fht] FMC Alias Private Key: 7
1,748,036 UART: [art] Derive CDI
1,748,316 UART: [art] Store in in slot 0x4
1,833,821 UART: [art] Derive Key Pair
1,834,181 UART: [art] Store priv key in slot 0x5
1,847,309 UART: [art] Derive Key Pair - Done
1,861,657 UART: [art] Signing Cert with AUTHO
1,862,137 UART: RITY.KEYID = 7
1,876,957 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,722 UART: [art] PUB.X = 9F0F5B06AF25DA943605AB15042EBCC3998F3F40732523CB1113F2C7699EE243297B6263EBB39A9B357C63A6340842D8
1,884,475 UART: [art] PUB.Y = 5BC34F229720E8007F14CD5F6D2995C6AFDE9D480760AC60307E2E17CD8371852664B0680CCF00FE1FC4D3CEF95CB074
1,891,383 UART: [art] SIG.R = 096815B6F6CEA98E887BDBFE7FD44EA18E79283A1C2D7C062D5BF4DF427F69F4B2E022F64609DF89F7C57D864C8699F5
1,898,156 UART: [art] SIG.S = A0CC1522176D4090BA1A669CC0D005A1CD4D6D7F85C2118FCE8F0C89AE7F6C6B6B347CB30F5CDED229A7E865A03F00EE
1,921,915 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
893,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,668 UART: [kat] ++
897,820 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,425 UART: [kat] LMS
1,171,753 UART: [kat] --
1,172,600 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 ready_for_fw is high
1,176,724 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,267 UART: [idev] Erasing UDS.KEYID = 0
1,201,314 UART: [idev] Sha1 KeyId Algorithm
1,209,804 UART: [idev] --
1,210,872 UART: [ldev] ++
1,211,040 UART: [ldev] CDI.KEYID = 6
1,211,403 UART: [ldev] SUBJECT.KEYID = 5
1,211,829 UART: [ldev] AUTHORITY.KEYID = 7
1,212,292 UART: [ldev] FE.KEYID = 1
1,217,602 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,464 UART: [ldev] --
1,283,863 UART: [fwproc] Wait for Commands...
1,284,561 UART: [fwproc] Recv command 0x46574c44
1,285,289 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,693,480 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,705,217 >>> mbox cmd response: success
1,706,265 UART: [afmc] ++
1,706,433 UART: [afmc] CDI.KEYID = 6
1,706,795 UART: [afmc] SUBJECT.KEYID = 7
1,707,220 UART: [afmc] AUTHORITY.KEYID = 5
1,743,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,759,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,760,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,785,896 UART: [afmc] --
1,786,838 UART: [cold-reset] --
1,787,802 UART: [state] Locking Datavault
1,789,243 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,847 UART: [state] Locking ICCM
1,790,393 UART: [exit] Launching FMC @ 0x40000130
1,795,722 UART:
1,795,738 UART: Running Caliptra FMC ...
1,796,146 UART:
1,796,289 UART: [state] CFI Enabled
1,806,774 UART: [fht] FMC Alias Private Key: 7
1,914,855 UART: [art] Extend RT PCRs Done
1,915,283 UART: [art] Lock RT PCRs Done
1,916,843 UART: [art] Populate DV Done
1,925,084 UART: [fht] FMC Alias Private Key: 7
1,926,090 UART: [art] Derive CDI
1,926,370 UART: [art] Store in in slot 0x4
2,011,671 UART: [art] Derive Key Pair
2,012,031 UART: [art] Store priv key in slot 0x5
2,025,081 UART: [art] Derive Key Pair - Done
2,039,848 UART: [art] Signing Cert with AUTHO
2,040,328 UART: RITY.KEYID = 7
2,056,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,863 UART: [art] PUB.X = 4D343DA792DFB029E085B24414DEB4F61030A040FA91FB1BA9CB675D0A5B2C3B327BC43EF60165CAC2A0BF32E48E5FFB
2,063,647 UART: [art] PUB.Y = 6D43D68BB09005EA7866E728660A2F43A94ED182929A181FD5D9BB630FF10370D458C6EB10E8CA274C68206D6E22BA30
2,070,587 UART: [art] SIG.R = 530DD0FB4F31D96EB9A9DAEA30965DE2C642BB3647C06EF468DCD51F42F6D5A9CA66F47C9F9A79C316AD6CE61A4D35CB
2,077,378 UART: [art] SIG.S = CEA18019457F28CAF76BAE3EBABBD44CDDFD893CD581D39C5B0FC02078AC041CC2885E099D06681D0483A317557DC63B
2,101,317 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 ready_for_fw is high
1,060,276 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,912 >>> mbox cmd response: success
1,616,016 UART:
1,616,032 UART: Running Caliptra FMC ...
1,616,440 UART:
1,616,583 UART: [state] CFI Enabled
1,627,516 UART: [fht] FMC Alias Private Key: 7
1,735,773 UART: [art] Extend RT PCRs Done
1,736,201 UART: [art] Lock RT PCRs Done
1,737,923 UART: [art] Populate DV Done
1,746,190 UART: [fht] FMC Alias Private Key: 7
1,747,156 UART: [art] Derive CDI
1,747,436 UART: [art] Store in in slot 0x4
1,833,303 UART: [art] Derive Key Pair
1,833,663 UART: [art] Store priv key in slot 0x5
1,846,933 UART: [art] Derive Key Pair - Done
1,861,672 UART: [art] Signing Cert with AUTHO
1,862,152 UART: RITY.KEYID = 7
1,877,714 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,479 UART: [art] PUB.X = 823173F8B3CAD7AE0DC20B47EBC8760B7F695C57FE8607D74CB6D05C4E513004243FD54063B526CDB46348284D36CC00
1,885,216 UART: [art] PUB.Y = 64B01150733D01D2889299D1FDF01DB12A071469C4D221E049DE1607AC68FABE9D840CAA2C5B2561AED425498660E244
1,892,154 UART: [art] SIG.R = 0FE83FF2CDCADE526544F8854B145061E7B3A72A9096C4604B7814F80FA724043DF75228A7C235D2072425F6EAEF81A1
1,898,914 UART: [art] SIG.S = 10AFA67D3AF10A0D2D4E16B0B9ED55D32D958E959EC9B1CEEA983FC3EF3D727C9F74BE68E6E4EF4252EA41DB3B34E25C
1,922,840 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 ready_for_fw is high
1,174,335 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,789 UART: [idev] Sha1 KeyId Algorithm
1,208,633 UART: [idev] --
1,209,682 UART: [ldev] ++
1,209,850 UART: [ldev] CDI.KEYID = 6
1,210,214 UART: [ldev] SUBJECT.KEYID = 5
1,210,641 UART: [ldev] AUTHORITY.KEYID = 7
1,211,104 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,243,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,384 UART: [ldev] --
1,282,652 UART: [fwproc] Wait for Commands...
1,283,427 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,272 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,160 >>> mbox cmd response: success
1,704,265 UART: [afmc] ++
1,704,433 UART: [afmc] CDI.KEYID = 6
1,704,796 UART: [afmc] SUBJECT.KEYID = 7
1,705,222 UART: [afmc] AUTHORITY.KEYID = 5
1,740,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,366 UART: [afmc] --
1,784,264 UART: [cold-reset] --
1,785,080 UART: [state] Locking Datavault
1,786,385 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,989 UART: [state] Locking ICCM
1,787,563 UART: [exit] Launching FMC @ 0x40000130
1,792,892 UART:
1,792,908 UART: Running Caliptra FMC ...
1,793,316 UART:
1,793,370 UART: [state] CFI Enabled
1,803,713 UART: [fht] FMC Alias Private Key: 7
1,911,330 UART: [art] Extend RT PCRs Done
1,911,758 UART: [art] Lock RT PCRs Done
1,913,242 UART: [art] Populate DV Done
1,921,483 UART: [fht] FMC Alias Private Key: 7
1,922,647 UART: [art] Derive CDI
1,922,927 UART: [art] Store in in slot 0x4
2,008,648 UART: [art] Derive Key Pair
2,009,008 UART: [art] Store priv key in slot 0x5
2,022,462 UART: [art] Derive Key Pair - Done
2,037,243 UART: [art] Signing Cert with AUTHO
2,037,723 UART: RITY.KEYID = 7
2,052,805 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,570 UART: [art] PUB.X = AE549F3D4B69117C8756836D639ED7C3E03BFF3269F063F18732CFDA57E936192EA9A3A8AED4740DB97AF9F1DB66E561
2,060,347 UART: [art] PUB.Y = B383C465FBE56D6ADF255596E96B0864632FC91BE5A38CD89C58290E577C4314C180CC1662AC94D541195A9190B61C9E
2,067,291 UART: [art] SIG.R = 300F7D86357D5CA7E4C2E8DAD0E00C3D5672AE9870D824F7FCF2C7DC0803752A075459D936C235A57FC8B86584431AFE
2,074,052 UART: [art] SIG.S = 41E85EE21C4960585922310E7B41B2356B6DB1632F98F8FE77D86B594738847D99070E71D82ACC667CFEBB5E5DB5873E
2,097,473 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,432 ready_for_fw is high
1,055,432 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,590 >>> mbox cmd response: success
1,611,132 UART:
1,611,148 UART: Running Caliptra FMC ...
1,611,556 UART:
1,611,610 UART: [state] CFI Enabled
1,622,221 UART: [fht] FMC Alias Private Key: 7
1,729,872 UART: [art] Extend RT PCRs Done
1,730,300 UART: [art] Lock RT PCRs Done
1,731,898 UART: [art] Populate DV Done
1,740,161 UART: [fht] FMC Alias Private Key: 7
1,741,243 UART: [art] Derive CDI
1,741,523 UART: [art] Store in in slot 0x4
1,827,420 UART: [art] Derive Key Pair
1,827,780 UART: [art] Store priv key in slot 0x5
1,841,388 UART: [art] Derive Key Pair - Done
1,856,357 UART: [art] Signing Cert with AUTHO
1,856,837 UART: RITY.KEYID = 7
1,871,967 UART: [art] Erasing AUTHORITY.KEYID = 7
1,872,732 UART: [art] PUB.X = 5EFD0283831647ED4001B5236BB8EF7407747F9BA29778BD2E84DBFAB0907F9A2705D89DA9625A84E976D30D0F448B67
1,879,486 UART: [art] PUB.Y = 1A1E841E0ED7C1F49B86E80E1359097C13090C8A5E6A539049A34E716784843B131D302CF8274D16A999B00159FAE6C3
1,886,412 UART: [art] SIG.R = AADBEBF614C0680FBA77D851DA6E60589A865B8CEEB5CCCA6297AD90043A3EAB926C69A89D8FA89E3676B5E1F99655C0
1,893,196 UART: [art] SIG.S = 13089B25DACF1EDED1628056966E624A88C3C457DAF8A500F2F830BE7CB6404E091DDD5E18457743FD287267E8EB93B2
1,916,748 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,384 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,173,806 ready_for_fw is high
1,173,806 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,686 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x46574c44
1,283,089 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,955 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,635 >>> mbox cmd response: success
1,702,756 UART: [afmc] ++
1,702,924 UART: [afmc] CDI.KEYID = 6
1,703,287 UART: [afmc] SUBJECT.KEYID = 7
1,703,713 UART: [afmc] AUTHORITY.KEYID = 5
1,739,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,511 UART: [afmc] --
1,782,623 UART: [cold-reset] --
1,783,445 UART: [state] Locking Datavault
1,784,650 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,254 UART: [state] Locking ICCM
1,785,912 UART: [exit] Launching FMC @ 0x40000130
1,791,241 UART:
1,791,257 UART: Running Caliptra FMC ...
1,791,665 UART:
1,791,808 UART: [state] CFI Enabled
1,802,169 UART: [fht] FMC Alias Private Key: 7
1,910,200 UART: [art] Extend RT PCRs Done
1,910,628 UART: [art] Lock RT PCRs Done
1,912,006 UART: [art] Populate DV Done
1,920,399 UART: [fht] FMC Alias Private Key: 7
1,921,457 UART: [art] Derive CDI
1,921,737 UART: [art] Store in in slot 0x4
2,007,280 UART: [art] Derive Key Pair
2,007,640 UART: [art] Store priv key in slot 0x5
2,020,598 UART: [art] Derive Key Pair - Done
2,035,309 UART: [art] Signing Cert with AUTHO
2,035,789 UART: RITY.KEYID = 7
2,050,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,506 UART: [art] PUB.X = 57298A18C0CDC5DE6B17ABD7A915C761854B84A2D0C1C65CCD3B18C44E42B9483F27B40B12FD3CE57D28BF93C1E29CBC
2,058,291 UART: [art] PUB.Y = 00948E1BD428AF503ABAF5159510EDF63211C779F1EDED58638D9FE0CF23344E6333E3E29CE65343A010E6F1051E0D3F
2,065,219 UART: [art] SIG.R = D138414C6EC64AFA6C59E8D2A62ED62F4260704CEBE8B2483A683C6DA60500B8E8BBC599C4D5278B077E7047D6B01FB8
2,071,971 UART: [art] SIG.S = 9769EB469A6468A4BE111202E1BB48B1D6B3124A294C74BC7736F3B90657AF858D3EAB1143A84672B9D9FBB514B01E25
2,096,095 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 ready_for_fw is high
1,056,363 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,167 >>> mbox cmd response: success
1,614,451 UART:
1,614,467 UART: Running Caliptra FMC ...
1,614,875 UART:
1,615,018 UART: [state] CFI Enabled
1,625,147 UART: [fht] FMC Alias Private Key: 7
1,733,010 UART: [art] Extend RT PCRs Done
1,733,438 UART: [art] Lock RT PCRs Done
1,734,784 UART: [art] Populate DV Done
1,742,719 UART: [fht] FMC Alias Private Key: 7
1,743,735 UART: [art] Derive CDI
1,744,015 UART: [art] Store in in slot 0x4
1,829,798 UART: [art] Derive Key Pair
1,830,158 UART: [art] Store priv key in slot 0x5
1,843,116 UART: [art] Derive Key Pair - Done
1,857,812 UART: [art] Signing Cert with AUTHO
1,858,292 UART: RITY.KEYID = 7
1,873,186 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,951 UART: [art] PUB.X = 84EB11CA6C6CEAC21514CF1A7C06798A49B2C58854907E7A3A27616C7E1D9B02944D88F73E52DFC3248F1A08B8BE69A6
1,880,720 UART: [art] PUB.Y = EB9EFC1E3F79D4C2A30DDA4FB2D3481A8F6D93F9FB5D6C046445FD66C81825E8A588DCDBE4E1E08BC272E83EDDD40927
1,887,685 UART: [art] SIG.R = 363F60B535EBBFB584463B25A3260FD380157477799D4A7321A355A2AD96EFE414A0D794DD3F23396C0E23B6C6CC1BEE
1,894,455 UART: [art] SIG.S = D51C1237A42AFB0ABB02AB6FF8DD6CEA4B95A10894B6312DED06FA67184A722E0A23228144EEEB1999ECDF97585D6E1C
1,918,614 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,187 UART:
192,585 UART: Running Caliptra ROM ...
193,682 UART:
193,826 UART: [state] CFI Enabled
263,155 UART: [state] LifecycleState = Unprovisioned
265,135 UART: [state] DebugLocked = No
267,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,598 UART: [kat] SHA2-256
441,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,819 UART: [kat] ++
452,306 UART: [kat] sha1
465,016 UART: [kat] SHA2-256
467,747 UART: [kat] SHA2-384
474,722 UART: [kat] SHA2-512-ACC
477,092 UART: [kat] ECC-384
2,766,435 UART: [kat] HMAC-384Kdf
2,778,413 UART: [kat] LMS
3,968,722 UART: [kat] --
3,973,296 UART: [cold-reset] ++
3,974,515 UART: [fht] Storing FHT @ 0x50003400
3,985,565 UART: [idev] ++
3,986,195 UART: [idev] CDI.KEYID = 6
3,987,107 UART: [idev] SUBJECT.KEYID = 7
3,988,347 UART: [idev] UDS.KEYID = 0
3,989,472 ready_for_fw is high
3,989,708 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,030,091 UART: [idev] Erasing UDS.KEYID = 0
7,326,969 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,547 UART: [idev] --
7,355,047 UART: [ldev] ++
7,355,621 UART: [ldev] CDI.KEYID = 6
7,356,585 UART: [ldev] SUBJECT.KEYID = 5
7,357,790 UART: [ldev] AUTHORITY.KEYID = 7
7,359,175 UART: [ldev] FE.KEYID = 1
7,402,881 UART: [ldev] Erasing FE.KEYID = 1
10,734,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,584 UART: [ldev] --
13,097,045 UART: [fwproc] Waiting for Commands...
13,099,245 UART: [fwproc] Received command 0x46574c44
13,101,423 UART: [fwproc] Received Image of size 31676 bytes
16,144,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,221,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,290,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,318,412 >>> mbox cmd response: success
16,323,253 UART: [afmc] ++
16,323,861 UART: [afmc] CDI.KEYID = 6
16,324,740 UART: [afmc] SUBJECT.KEYID = 7
16,326,007 UART: [afmc] AUTHORITY.KEYID = 5
19,683,080 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,985,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,988,194 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,002,652 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,017,461 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,031,915 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,054,369 UART: [afmc] --
22,057,972 UART: [cold-reset] --
22,062,537 UART: [state] Locking Datavault
22,068,703 UART: [state] Locking PCR0, PCR1 and PCR31
22,070,453 UART: [state] Locking ICCM
22,072,221 UART: [exit] Launching FMC @ 0x40000130
22,080,620 UART:
22,080,896 UART: Running Caliptra FMC ...
22,082,007 UART:
22,082,167 UART: [state] CFI Enabled
22,146,754 UART: [fht] FMC Alias Private Key: 7
24,485,106 UART: [art] Extend RT PCRs Done
24,486,837 UART: [art] Lock RT PCRs Done
24,488,065 UART: [art] Populate DV Done
24,493,619 UART: [fht] FMC Alias Private Key: 7
24,495,323 UART: [art] Derive CDI
24,496,053 UART: [art] Store in in slot 0x4
24,557,509 UART: [art] Derive Key Pair
24,558,504 UART: [art] Store priv key in slot 0x5
27,851,425 UART: [art] Derive Key Pair - Done
27,864,646 UART: [art] Signing Cert with AUTHO
27,865,957 UART: RITY.KEYID = 7
30,152,996 UART: [art] Erasing AUTHORITY.KEYID = 7
30,154,501 UART: [art] PUB.X = 99CE9F8D37D0C7B021836D547E7B81482313D92F4261915F3BD6C96C26602DD02363CDA1AF6F54A55D185AB0FA049618
30,161,752 UART: [art] PUB.Y = 8A111BCF430A3C127A0FF1382F79362BF83B04B89AF49EAC6AB8B8BDF8B7F517316560D79960BCD78894F590AC423658
30,168,974 UART: [art] SIG.R = 6B7B9EFFB7F4F2F59F11C27905941C7C2A444587ECF8E34A59ED992A57E256B81DBA55FDEB2CF5C993081AD9F922EF87
30,176,391 UART: [art] SIG.S = 4A4F988300E1F9654EAF1F96F300EEC5A0FFFD97D4706310CECC99506ED5B8EB5BC35B845D382F10949312E4D97B07B9
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,782,900 ready_for_fw is high
3,783,309 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,192,570 >>> mbox cmd response: success
21,883,210 UART:
21,883,591 UART: Running Caliptra FMC ...
21,884,739 UART:
21,884,895 UART: [state] CFI Enabled
21,952,134 UART: [fht] FMC Alias Private Key: 7
24,289,692 UART: [art] Extend RT PCRs Done
24,290,914 UART: [art] Lock RT PCRs Done
24,292,780 UART: [art] Populate DV Done
24,298,288 UART: [fht] FMC Alias Private Key: 7
24,300,050 UART: [art] Derive CDI
24,300,873 UART: [art] Store in in slot 0x4
24,361,040 UART: [art] Derive Key Pair
24,362,080 UART: [art] Store priv key in slot 0x5
27,655,000 UART: [art] Derive Key Pair - Done
27,668,053 UART: [art] Signing Cert with AUTHO
27,669,354 UART: RITY.KEYID = 7
29,957,263 UART: [art] Erasing AUTHORITY.KEYID = 7
29,958,767 UART: [art] PUB.X = 467F7B1F921725DD5CC9C29E9BB834A899187B582701709523C594151322E01905F6AE6B822B7869BFBBB9F314AABC35
29,965,969 UART: [art] PUB.Y = C546CE83839B2BE22AA75770846D4AE6CF0F4C59B1DA1CD6105BB465267BADB57A5BAF34B27E3C6BE5AC957F8FE0DE86
29,973,250 UART: [art] SIG.R = 629AAB7B4B9BDAEB3BF018FAD543BBDB733061906452989C2D050D2D6AACEF647813DAC4F80E80A8A53858FBB653331F
29,980,654 UART: [art] SIG.S = BED600C0B3E5BA891E616817608F8AD6960C114BFBF277C343FA0DA78881DF235093FBE2C0213CAE3BF327247565A00F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,393 UART:
192,770 UART: Running Caliptra ROM ...
193,851 UART:
603,412 UART: [state] CFI Enabled
616,935 UART: [state] LifecycleState = Unprovisioned
618,861 UART: [state] DebugLocked = No
621,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,385 UART: [kat] SHA2-256
796,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,684 UART: [kat] ++
807,159 UART: [kat] sha1
818,663 UART: [kat] SHA2-256
821,425 UART: [kat] SHA2-384
827,065 UART: [kat] SHA2-512-ACC
829,436 UART: [kat] ECC-384
3,111,461 UART: [kat] HMAC-384Kdf
3,122,342 UART: [kat] LMS
4,312,437 UART: [kat] --
4,317,062 UART: [cold-reset] ++
4,319,072 UART: [fht] Storing FHT @ 0x50003400
4,331,846 UART: [idev] ++
4,332,530 UART: [idev] CDI.KEYID = 6
4,333,442 UART: [idev] SUBJECT.KEYID = 7
4,334,619 UART: [idev] UDS.KEYID = 0
4,335,682 ready_for_fw is high
4,335,893 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,375,905 UART: [idev] Erasing UDS.KEYID = 0
7,617,549 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,812 UART: [idev] --
7,642,894 UART: [ldev] ++
7,643,462 UART: [ldev] CDI.KEYID = 6
7,644,425 UART: [ldev] SUBJECT.KEYID = 5
7,645,637 UART: [ldev] AUTHORITY.KEYID = 7
7,646,860 UART: [ldev] FE.KEYID = 1
7,657,877 UART: [ldev] Erasing FE.KEYID = 1
10,945,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,267 UART: [ldev] --
13,303,678 UART: [fwproc] Waiting for Commands...
13,306,907 UART: [fwproc] Received command 0x46574c44
13,309,158 UART: [fwproc] Received Image of size 31676 bytes
16,350,212 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,429,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,497,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,526,748 >>> mbox cmd response: success
16,530,655 UART: [afmc] ++
16,531,232 UART: [afmc] CDI.KEYID = 6
16,532,190 UART: [afmc] SUBJECT.KEYID = 7
16,533,403 UART: [afmc] AUTHORITY.KEYID = 5
19,847,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,141,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,144,195 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,158,580 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,173,419 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,187,840 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,209,635 UART: [afmc] --
22,213,359 UART: [cold-reset] --
22,217,651 UART: [state] Locking Datavault
22,223,220 UART: [state] Locking PCR0, PCR1 and PCR31
22,224,971 UART: [state] Locking ICCM
22,227,113 UART: [exit] Launching FMC @ 0x40000130
22,235,509 UART:
22,235,748 UART: Running Caliptra FMC ...
22,236,851 UART:
22,237,006 UART: [state] CFI Enabled
22,245,174 UART: [fht] FMC Alias Private Key: 7
24,575,445 UART: [art] Extend RT PCRs Done
24,576,668 UART: [art] Lock RT PCRs Done
24,578,642 UART: [art] Populate DV Done
24,584,094 UART: [fht] FMC Alias Private Key: 7
24,585,701 UART: [art] Derive CDI
24,586,516 UART: [art] Store in in slot 0x4
24,629,061 UART: [art] Derive Key Pair
24,630,070 UART: [art] Store priv key in slot 0x5
27,872,303 UART: [art] Derive Key Pair - Done
27,885,472 UART: [art] Signing Cert with AUTHO
27,886,775 UART: RITY.KEYID = 7
30,165,931 UART: [art] Erasing AUTHORITY.KEYID = 7
30,167,438 UART: [art] PUB.X = AC77FA2959E88105D15410333CA042A49C2BF39631B90643EF26C7B6BC1B27FAC3731DCDA3689386B0DD6BC1BF79236E
30,174,685 UART: [art] PUB.Y = 5F9B051A3BF0D16D2AA5AFD2C005AA0A0C543C68806310C03BF5E1668B70379618D13B17E785CC8AD8E465827CB40027
30,181,932 UART: [art] SIG.R = 63929936ABDFF7048027766C0C83E080DEB155466B95DE2E111E2A84397C185C124E381EDF6146BD412BC9848FF396B9
30,189,326 UART: [art] SIG.S = C4EA8AA4AD36E4627D1053E52C0033A7E857C9EE09CCACE2ED17F9497FBACCC0E058E65185995563C3C09DFD66DB454A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,131,335 ready_for_fw is high
4,131,980 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,378,357 >>> mbox cmd response: success
22,023,128 UART:
22,023,535 UART: Running Caliptra FMC ...
22,024,652 UART:
22,024,808 UART: [state] CFI Enabled
22,033,027 UART: [fht] FMC Alias Private Key: 7
24,363,962 UART: [art] Extend RT PCRs Done
24,365,195 UART: [art] Lock RT PCRs Done
24,366,795 UART: [art] Populate DV Done
24,372,152 UART: [fht] FMC Alias Private Key: 7
24,373,649 UART: [art] Derive CDI
24,374,382 UART: [art] Store in in slot 0x4
24,417,020 UART: [art] Derive Key Pair
24,418,062 UART: [art] Store priv key in slot 0x5
27,659,592 UART: [art] Derive Key Pair - Done
27,672,543 UART: [art] Signing Cert with AUTHO
27,673,848 UART: RITY.KEYID = 7
29,953,535 UART: [art] Erasing AUTHORITY.KEYID = 7
29,955,062 UART: [art] PUB.X = FCA9DCDE4E0CDE8759244F32AB9E9F2AC1702D0BFC639B8337B6605E29EBC51E55AE7D1DAF76D587ACB7FA8BD214613A
29,962,372 UART: [art] PUB.Y = BB63C602C512D7E9AC03BDDC42639A37C124A81C757CE57E3AAE63CA6B122DB4398B9AC0E02ED73BFCCC9CA19D9BF0E3
29,969,639 UART: [art] SIG.R = 3688280DDEBA89A3193D7141AE2F0FB760FFD76FCAD7B45A71CD639C3D3EBDA907E2E1342064A368F9ADD07272840F94
29,977,036 UART: [art] SIG.S = DBF18C5F712B0D4AACEEF4B23979A065489D5BA0511C29A1B6CD0BF158AE9C47636DA6C4894EACFFFFA1E2B6D2039C7A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,035 UART:
192,406 UART: Running Caliptra ROM ...
193,576 UART:
193,730 UART: [state] CFI Enabled
266,789 UART: [state] LifecycleState = Unprovisioned
268,707 UART: [state] DebugLocked = No
269,891 UART: [state] WD Timer not started. Device not locked for debugging
273,859 UART: [kat] SHA2-256
452,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,575 UART: [kat] ++
465,109 UART: [kat] sha1
476,054 UART: [kat] SHA2-256
479,136 UART: [kat] SHA2-384
484,909 UART: [kat] SHA2-512-ACC
487,837 UART: [kat] ECC-384
2,948,012 UART: [kat] HMAC-384Kdf
2,971,524 UART: [kat] LMS
3,500,928 UART: [kat] --
3,506,622 UART: [cold-reset] ++
3,508,405 UART: [fht] FHT @ 0x50003400
3,519,734 UART: [idev] ++
3,520,290 UART: [idev] CDI.KEYID = 6
3,521,263 UART: [idev] SUBJECT.KEYID = 7
3,522,435 UART: [idev] UDS.KEYID = 0
3,523,355 ready_for_fw is high
3,523,570 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,563,674 UART: [idev] Erasing UDS.KEYID = 0
6,025,406 UART: [idev] Sha1 KeyId Algorithm
6,047,773 UART: [idev] --
6,051,709 UART: [ldev] ++
6,052,324 UART: [ldev] CDI.KEYID = 6
6,053,236 UART: [ldev] SUBJECT.KEYID = 5
6,054,343 UART: [ldev] AUTHORITY.KEYID = 7
6,055,635 UART: [ldev] FE.KEYID = 1
6,100,244 UART: [ldev] Erasing FE.KEYID = 1
8,607,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,539 UART: [ldev] --
10,413,955 UART: [fwproc] Wait for Commands...
10,415,676 UART: [fwproc] Recv command 0x46574c44
10,417,766 UART: [fwproc] Recv'd Img size: 31656 bytes
12,813,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,883,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,952,326 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,981,032 >>> mbox cmd response: success
12,984,592 UART: [afmc] ++
12,985,172 UART: [afmc] CDI.KEYID = 6
12,986,075 UART: [afmc] SUBJECT.KEYID = 7
12,987,291 UART: [afmc] AUTHORITY.KEYID = 5
15,530,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,271,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,273,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,289,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,305,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,321,300 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,342,661 UART: [afmc] --
17,346,204 UART: [cold-reset] --
17,349,693 UART: [state] Locking Datavault
17,354,827 UART: [state] Locking PCR0, PCR1 and PCR31
17,356,479 UART: [state] Locking ICCM
17,357,765 UART: [exit] Launching FMC @ 0x40000130
17,366,218 UART:
17,366,451 UART: Running Caliptra FMC ...
17,367,548 UART:
17,367,707 UART: [state] CFI Enabled
17,430,974 UART: [fht] FMC Alias Private Key: 7
19,195,116 UART: [art] Extend RT PCRs Done
19,196,334 UART: [art] Lock RT PCRs Done
19,197,928 UART: [art] Populate DV Done
19,203,337 UART: [fht] FMC Alias Private Key: 7
19,205,011 UART: [art] Derive CDI
19,205,834 UART: [art] Store in in slot 0x4
19,263,569 UART: [art] Derive Key Pair
19,264,611 UART: [art] Store priv key in slot 0x5
21,727,822 UART: [art] Derive Key Pair - Done
21,740,681 UART: [art] Signing Cert with AUTHO
21,741,992 UART: RITY.KEYID = 7
23,453,359 UART: [art] Erasing AUTHORITY.KEYID = 7
23,454,865 UART: [art] PUB.X = 4159AF5018B1FB0E3EDA32BCE967BAFCF6E24E4075F038F72F3469E949D4B2E604628DAD456A3550B3F3BB7C811AAAC4
23,462,200 UART: [art] PUB.Y = A34350858DCE0017A4A957F1128E7F83ABCE5335C7C1A109319F001721C5223280760DBDCFD8D1A904067D17D39F8C59
23,469,419 UART: [art] SIG.R = C89AB01386CF98044BB65E15E24CC7B2B54ECAB2A257B0B6B13C9E191AE5AF500328B6EF7D20C0E31B3E1DAAFE3FCACD
23,476,786 UART: [art] SIG.S = 942AE2EDD5367752B6E99E43E0EA9ACB609699F5BA3EFC8EF77A34679A2C01B3D4C6F0C43EB99E21301C64EE43E0389E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
3,382,651 ready_for_fw is high
3,383,581 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,774,856 >>> mbox cmd response: success
17,059,881 UART:
17,060,290 UART: Running Caliptra FMC ...
17,061,450 UART:
17,061,615 UART: [state] CFI Enabled
17,129,542 UART: [fht] FMC Alias Private Key: 7
18,893,741 UART: [art] Extend RT PCRs Done
18,894,971 UART: [art] Lock RT PCRs Done
18,896,865 UART: [art] Populate DV Done
18,902,225 UART: [fht] FMC Alias Private Key: 7
18,903,818 UART: [art] Derive CDI
18,904,635 UART: [art] Store in in slot 0x4
18,962,751 UART: [art] Derive Key Pair
18,963,792 UART: [art] Store priv key in slot 0x5
21,426,453 UART: [art] Derive Key Pair - Done
21,439,078 UART: [art] Signing Cert with AUTHO
21,440,387 UART: RITY.KEYID = 7
23,152,280 UART: [art] Erasing AUTHORITY.KEYID = 7
23,153,791 UART: [art] PUB.X = C8D8F91D5DCBF0A0B8119AE999FF2D43485227C01B03F63B87B226D55646AD3D349D10915227426E65CB27472CCBEF57
23,161,069 UART: [art] PUB.Y = E68DEB25751A5C4621B73157E1BF99B321171528BFF6F417DC8C480948E064E2D1C8B4B1BE8A0B0D1BA12A001A16F281
23,168,282 UART: [art] SIG.R = EACC6C7DE37D89C3234D814EACB49D5F39CA3BC9C95C2E3B1DB31860089DF2F72691B6CA870BCB2D70940140B5A024A6
23,175,734 UART: [art] SIG.S = E2534730851F73380C566EA83F44E8F360C54CA4F881BD99646520C73350CE088862484312205F495BF777DD96BFFC2E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,477 UART:
192,841 UART: Running Caliptra ROM ...
194,018 UART:
603,501 UART: [state] CFI Enabled
613,250 UART: [state] LifecycleState = Unprovisioned
615,096 UART: [state] DebugLocked = No
616,359 UART: [state] WD Timer not started. Device not locked for debugging
620,251 UART: [kat] SHA2-256
799,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,981 UART: [kat] ++
811,512 UART: [kat] sha1
821,054 UART: [kat] SHA2-256
824,031 UART: [kat] SHA2-384
829,175 UART: [kat] SHA2-512-ACC
832,114 UART: [kat] ECC-384
3,272,020 UART: [kat] HMAC-384Kdf
3,284,177 UART: [kat] LMS
3,813,660 UART: [kat] --
3,818,880 UART: [cold-reset] ++
3,819,955 UART: [fht] FHT @ 0x50003400
3,830,006 UART: [idev] ++
3,830,577 UART: [idev] CDI.KEYID = 6
3,831,498 UART: [idev] SUBJECT.KEYID = 7
3,832,672 UART: [idev] UDS.KEYID = 0
3,833,719 ready_for_fw is high
3,833,912 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,874,006 UART: [idev] Erasing UDS.KEYID = 0
6,307,837 UART: [idev] Sha1 KeyId Algorithm
6,331,163 UART: [idev] --
6,335,480 UART: [ldev] ++
6,336,050 UART: [ldev] CDI.KEYID = 6
6,336,966 UART: [ldev] SUBJECT.KEYID = 5
6,338,194 UART: [ldev] AUTHORITY.KEYID = 7
6,339,296 UART: [ldev] FE.KEYID = 1
6,349,962 UART: [ldev] Erasing FE.KEYID = 1
8,820,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,535,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,551,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,567,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,582,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,640 UART: [ldev] --
10,608,199 UART: [fwproc] Wait for Commands...
10,609,755 UART: [fwproc] Recv command 0x46574c44
10,611,845 UART: [fwproc] Recv'd Img size: 31656 bytes
13,002,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,080,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,149,440 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,178,374 >>> mbox cmd response: success
13,183,128 UART: [afmc] ++
13,183,702 UART: [afmc] CDI.KEYID = 6
13,184,608 UART: [afmc] SUBJECT.KEYID = 7
13,185,815 UART: [afmc] AUTHORITY.KEYID = 5
15,685,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,405,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,407,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,423,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,439,359 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,455,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,478,468 UART: [afmc] --
17,481,746 UART: [cold-reset] --
17,486,525 UART: [state] Locking Datavault
17,490,854 UART: [state] Locking PCR0, PCR1 and PCR31
17,492,490 UART: [state] Locking ICCM
17,493,874 UART: [exit] Launching FMC @ 0x40000130
17,502,267 UART:
17,502,508 UART: Running Caliptra FMC ...
17,503,608 UART:
17,503,764 UART: [state] CFI Enabled
17,512,017 UART: [fht] FMC Alias Private Key: 7
19,268,829 UART: [art] Extend RT PCRs Done
19,270,069 UART: [art] Lock RT PCRs Done
19,271,541 UART: [art] Populate DV Done
19,277,041 UART: [fht] FMC Alias Private Key: 7
19,278,684 UART: [art] Derive CDI
19,279,491 UART: [art] Store in in slot 0x4
19,321,686 UART: [art] Derive Key Pair
19,322,726 UART: [art] Store priv key in slot 0x5
21,749,341 UART: [art] Derive Key Pair - Done
21,762,515 UART: [art] Signing Cert with AUTHO
21,763,825 UART: RITY.KEYID = 7
23,469,499 UART: [art] Erasing AUTHORITY.KEYID = 7
23,471,000 UART: [art] PUB.X = EA29E1CF1A0CE98245499A6AC08CFD2D94DDD5A9940C4A17DD21E309FD6BE7D60F941018D793528B85F2F103736BE639
23,478,272 UART: [art] PUB.Y = 4D20CAF968B57B2B19246239626893A8B06B26577BD672C8C545E401E8D9957122FCD4EDC4A0EBD9BA5A84B6A59D58A3
23,485,512 UART: [art] SIG.R = DFA8F0FF873368BBEA786B9C5A38C33156326A9936448A2A1B11D4CD74F5B9F1CD2D1065EB951CD860E4503E1F18EDCA
23,492,908 UART: [art] SIG.S = F1E8F059B72724C279887F7AA82867A340CB53CBD622C1A8BB46B5A8CAC63F0640E0324ADEB2020B7451B1662D6B4177
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,699,244 ready_for_fw is high
3,699,869 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,979,620 >>> mbox cmd response: success
17,228,917 UART:
17,229,304 UART: Running Caliptra FMC ...
17,230,507 UART:
17,230,665 UART: [state] CFI Enabled
17,238,659 UART: [fht] FMC Alias Private Key: 7
18,995,938 UART: [art] Extend RT PCRs Done
18,997,173 UART: [art] Lock RT PCRs Done
18,998,808 UART: [art] Populate DV Done
19,004,380 UART: [fht] FMC Alias Private Key: 7
19,006,031 UART: [art] Derive CDI
19,006,989 UART: [art] Store in in slot 0x4
19,049,305 UART: [art] Derive Key Pair
19,050,310 UART: [art] Store priv key in slot 0x5
21,476,770 UART: [art] Derive Key Pair - Done
21,489,770 UART: [art] Signing Cert with AUTHO
21,491,115 UART: RITY.KEYID = 7
23,196,233 UART: [art] Erasing AUTHORITY.KEYID = 7
23,197,740 UART: [art] PUB.X = 4C5381EBE7CFB134A0BE2AFCDFB5E13AF8E89B0D919CA6A4D25BECDA4F1EE0B59DB60882B29F69392DDD7BF1C3A6E60B
23,205,063 UART: [art] PUB.Y = 539082A09E600130DED6F8B63F83DF44D687DB3676CF61FAFC02EAEB37CE12E163DBEBDAAA67E50AB2FF7057E35AF514
23,212,335 UART: [art] SIG.R = E7ECA491BC88B7C89D0FE12B6B51245D9FA439DCBF4063A9E1BE336C91CC9E674DBF66DFE67EEA932C51C8474DD5DAB8
23,219,785 UART: [art] SIG.S = 0BE54624244035BC927946898A76809ADD7C3F71A7E14D085ABB5BE42D50664D2BA7835896EAE51E81AB9AC02B3E211A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,347 UART:
192,705 UART: Running Caliptra ROM ...
193,874 UART:
194,025 UART: [state] CFI Enabled
263,525 UART: [state] LifecycleState = Unprovisioned
265,919 UART: [state] DebugLocked = No
268,872 UART: [state] WD Timer not started. Device not locked for debugging
272,618 UART: [kat] SHA2-256
462,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,311 UART: [kat] ++
473,845 UART: [kat] sha1
484,362 UART: [kat] SHA2-256
487,442 UART: [kat] SHA2-384
492,722 UART: [kat] SHA2-512-ACC
495,300 UART: [kat] ECC-384
2,947,095 UART: [kat] HMAC-384Kdf
2,971,221 UART: [kat] LMS
3,502,974 UART: [kat] --
3,508,105 UART: [cold-reset] ++
3,509,041 UART: [fht] FHT @ 0x50003400
3,520,076 UART: [idev] ++
3,520,776 UART: [idev] CDI.KEYID = 6
3,521,654 UART: [idev] SUBJECT.KEYID = 7
3,522,893 UART: [idev] UDS.KEYID = 0
3,523,824 ready_for_fw is high
3,524,016 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,564,119 UART: [idev] Erasing UDS.KEYID = 0
6,028,362 UART: [idev] Sha1 KeyId Algorithm
6,051,635 UART: [idev] --
6,056,355 UART: [ldev] ++
6,057,012 UART: [ldev] CDI.KEYID = 6
6,057,941 UART: [ldev] SUBJECT.KEYID = 5
6,059,101 UART: [ldev] AUTHORITY.KEYID = 7
6,060,330 UART: [ldev] FE.KEYID = 1
6,089,155 UART: [ldev] Erasing FE.KEYID = 1
8,596,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,662 UART: [ldev] --
10,400,688 UART: [fwproc] Wait for Commands...
10,402,946 UART: [fwproc] Recv command 0x46574c44
10,405,207 UART: [fwproc] Recv'd Img size: 31656 bytes
12,830,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,907,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,023,418 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,070,557 >>> mbox cmd response: success
13,074,509 UART: [afmc] ++
13,075,149 UART: [afmc] CDI.KEYID = 6
13,076,334 UART: [afmc] SUBJECT.KEYID = 7
13,077,767 UART: [afmc] AUTHORITY.KEYID = 5
15,603,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,325,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,327,497 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,342,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,357,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,372,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,395,266 UART: [afmc] --
17,399,395 UART: [cold-reset] --
17,402,230 UART: [state] Locking Datavault
17,407,585 UART: [state] Locking PCR0, PCR1 and PCR31
17,409,786 UART: [state] Locking ICCM
17,412,259 UART: [exit] Launching FMC @ 0x40000130
17,420,878 UART:
17,421,152 UART: Running Caliptra FMC ...
17,422,259 UART:
17,422,416 UART: [state] CFI Enabled
17,482,881 UART: [fht] FMC Alias Private Key: 7
19,247,850 UART: [art] Extend RT PCRs Done
19,249,078 UART: [art] Lock RT PCRs Done
19,250,672 UART: [art] Populate DV Done
19,256,038 UART: [fht] FMC Alias Private Key: 7
19,257,684 UART: [art] Derive CDI
19,258,619 UART: [art] Store in in slot 0x4
19,314,787 UART: [art] Derive Key Pair
19,315,776 UART: [art] Store priv key in slot 0x5
21,778,865 UART: [art] Derive Key Pair - Done
21,791,764 UART: [art] Signing Cert with AUTHO
21,793,069 UART: RITY.KEYID = 7
23,503,925 UART: [art] Erasing AUTHORITY.KEYID = 7
23,505,440 UART: [art] PUB.X = 1A82D46A799BAB8A8E78207C878B67AF7847321D93921EC19FBC3DB8963B0EACC5B26CA79F9A3B5744B0F5F6DCE73E1F
23,512,697 UART: [art] PUB.Y = 31DC5274702B4D79B0F45213D5C8940DAA6E5A08346C067A5A4DD0B750B0F037826291A86154A8BE9FCD19E2AD7B437D
23,519,979 UART: [art] SIG.R = 03F6C605111C58D601909860E8CD23993B51B7A124281592C32A14A5EC35B71BE40CFE2254E175223260F0348678C870
23,527,314 UART: [art] SIG.S = 5372BCA73D3BEBBB561495FE9D2B491B68CE307DF733F9DC1DADD0CE652DFECB33025E018F0CA00EB38BA6DA5DC381EF
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,438,899 ready_for_fw is high
3,439,304 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,963,821 >>> mbox cmd response: success
17,259,850 UART:
17,260,248 UART: Running Caliptra FMC ...
17,261,388 UART:
17,261,549 UART: [state] CFI Enabled
17,324,467 UART: [fht] FMC Alias Private Key: 7
19,088,174 UART: [art] Extend RT PCRs Done
19,089,408 UART: [art] Lock RT PCRs Done
19,090,926 UART: [art] Populate DV Done
19,096,512 UART: [fht] FMC Alias Private Key: 7
19,097,997 UART: [art] Derive CDI
19,098,774 UART: [art] Store in in slot 0x4
19,157,598 UART: [art] Derive Key Pair
19,158,606 UART: [art] Store priv key in slot 0x5
21,621,361 UART: [art] Derive Key Pair - Done
21,634,281 UART: [art] Signing Cert with AUTHO
21,635,595 UART: RITY.KEYID = 7
23,347,246 UART: [art] Erasing AUTHORITY.KEYID = 7
23,348,751 UART: [art] PUB.X = F9F3ACE4C727D8B6691ED6B889538CE6776BC2A4E4C1AFE4905808E5F4E083F846AEAF725D77F2D3D3DC556CBF533875
23,356,036 UART: [art] PUB.Y = CC83195C825516ECED07D2A9BB1347C297376D919A680D0B149794D7E15C7D8A9CF69A4F04FDB6F8068B74C47618862E
23,363,278 UART: [art] SIG.R = 55308BDA6B1FED77DE997EC6C6DBDCDA3D387C3FAAFDC60B224A0376DE3BC51539CF9C42F6BA623D48E82EDA9E442147
23,370,708 UART: [art] SIG.S = D8E61061D50786B80BC0544C76EA9599BA9473C747E246BE5AB6A9AD0E8A0E3DE25DE825240D0FF6A98725DE5AA46360
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,475 UART:
192,818 UART: Running Caliptra ROM ...
193,988 UART:
603,490 UART: [state] CFI Enabled
618,544 UART: [state] LifecycleState = Unprovisioned
620,930 UART: [state] DebugLocked = No
623,528 UART: [state] WD Timer not started. Device not locked for debugging
628,699 UART: [kat] SHA2-256
818,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,358 UART: [kat] ++
829,959 UART: [kat] sha1
841,425 UART: [kat] SHA2-256
844,493 UART: [kat] SHA2-384
849,480 UART: [kat] SHA2-512-ACC
852,060 UART: [kat] ECC-384
3,292,630 UART: [kat] HMAC-384Kdf
3,306,650 UART: [kat] LMS
3,838,457 UART: [kat] --
3,841,531 UART: [cold-reset] ++
3,843,031 UART: [fht] FHT @ 0x50003400
3,854,789 UART: [idev] ++
3,855,429 UART: [idev] CDI.KEYID = 6
3,856,459 UART: [idev] SUBJECT.KEYID = 7
3,857,626 UART: [idev] UDS.KEYID = 0
3,858,556 ready_for_fw is high
3,858,745 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,898,805 UART: [idev] Erasing UDS.KEYID = 0
6,335,477 UART: [idev] Sha1 KeyId Algorithm
6,356,973 UART: [idev] --
6,361,341 UART: [ldev] ++
6,362,014 UART: [ldev] CDI.KEYID = 6
6,362,920 UART: [ldev] SUBJECT.KEYID = 5
6,364,131 UART: [ldev] AUTHORITY.KEYID = 7
6,365,302 UART: [ldev] FE.KEYID = 1
6,375,509 UART: [ldev] Erasing FE.KEYID = 1
8,855,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,879 UART: [ldev] --
10,644,306 UART: [fwproc] Wait for Commands...
10,646,676 UART: [fwproc] Recv command 0x46574c44
10,649,000 UART: [fwproc] Recv'd Img size: 31656 bytes
13,075,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,151,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,267,943 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,313,668 >>> mbox cmd response: success
13,317,512 UART: [afmc] ++
13,318,086 UART: [afmc] CDI.KEYID = 6
13,319,330 UART: [afmc] SUBJECT.KEYID = 7
13,320,703 UART: [afmc] AUTHORITY.KEYID = 5
15,821,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,540,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,542,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,558,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,573,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,588,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,611,795 UART: [afmc] --
17,615,091 UART: [cold-reset] --
17,617,664 UART: [state] Locking Datavault
17,624,043 UART: [state] Locking PCR0, PCR1 and PCR31
17,626,226 UART: [state] Locking ICCM
17,627,887 UART: [exit] Launching FMC @ 0x40000130
17,636,553 UART:
17,636,790 UART: Running Caliptra FMC ...
17,637,887 UART:
17,638,045 UART: [state] CFI Enabled
17,646,306 UART: [fht] FMC Alias Private Key: 7
19,403,048 UART: [art] Extend RT PCRs Done
19,404,246 UART: [art] Lock RT PCRs Done
19,405,617 UART: [art] Populate DV Done
19,410,900 UART: [fht] FMC Alias Private Key: 7
19,412,382 UART: [art] Derive CDI
19,413,113 UART: [art] Store in in slot 0x4
19,455,381 UART: [art] Derive Key Pair
19,456,424 UART: [art] Store priv key in slot 0x5
21,883,284 UART: [art] Derive Key Pair - Done
21,895,763 UART: [art] Signing Cert with AUTHO
21,897,069 UART: RITY.KEYID = 7
23,602,325 UART: [art] Erasing AUTHORITY.KEYID = 7
23,603,861 UART: [art] PUB.X = 5304C78282543269EBAF8256F79F9F7494456FBDE4B61F3DF4CB9ED3C954786ED808D58B257B96306DE2E8176C07EDE8
23,611,128 UART: [art] PUB.Y = 35D346ACD59946716C12A79873ABA14BEBA75A1DA3F75E7098C3780D0CCB9BDE5E167A727A7FB594334CE54F71290D3A
23,618,367 UART: [art] SIG.R = 9B2AF6116A3AFCF8EBB745690FC06B200D2CBCBC88F556C618EEF716F6EE5D1F7AACC230435DECA850B4227D03AF244C
23,625,768 UART: [art] SIG.S = BC5A9D085D632BBA0DD5F343E587249319540414BC022132BA9B457E7212A4A209F5E08B3E7280E6D7D35C8512A64FB0
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,762,926 ready_for_fw is high
3,763,321 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,192,436 >>> mbox cmd response: success
17,445,692 UART:
17,446,072 UART: Running Caliptra FMC ...
17,447,192 UART:
17,447,340 UART: [state] CFI Enabled
17,455,615 UART: [fht] FMC Alias Private Key: 7
19,212,204 UART: [art] Extend RT PCRs Done
19,213,426 UART: [art] Lock RT PCRs Done
19,215,190 UART: [art] Populate DV Done
19,220,583 UART: [fht] FMC Alias Private Key: 7
19,222,065 UART: [art] Derive CDI
19,222,795 UART: [art] Store in in slot 0x4
19,265,375 UART: [art] Derive Key Pair
19,266,415 UART: [art] Store priv key in slot 0x5
21,692,576 UART: [art] Derive Key Pair - Done
21,705,796 UART: [art] Signing Cert with AUTHO
21,707,100 UART: RITY.KEYID = 7
23,412,595 UART: [art] Erasing AUTHORITY.KEYID = 7
23,414,103 UART: [art] PUB.X = 9503A5B9028BA0D9C54A339A187CE9786C66F02CBCF2BADF6974C378CF124E3FB246F019456BA3930D0E0BC166FC2BCF
23,421,399 UART: [art] PUB.Y = DBF76CAED88F4E0A054B682459452C7195589056E6F96AFFBEC89A41531716E2417B035917963861C65DB241CD4EA4B5
23,428,649 UART: [art] SIG.R = 929CC44157EAC429E68021736F2223A2D6E0BB39869EDA6D575CC0D94889092880474C7946E03C4A9652C4706A6A9C3D
23,435,986 UART: [art] SIG.S = DD1A34BE6D961D12EBE3819B3E4BC24FCAE5D8B7D5A7004726AAB276FB06A6E7BD13E24DC2C96F287B5068CD0D539E25
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,321 UART: [kat] SHA2-256
882,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,367 UART: [kat] ++
886,519 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,248 UART: [kat] SHA2-512-ACC
897,149 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,366 UART: [kat] LMS
1,475,562 UART: [kat] --
1,476,567 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 ready_for_fw is high
1,480,995 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,918 UART: [idev] Erasing UDS.KEYID = 0
1,505,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,711 UART: [ldev] ++
1,514,879 UART: [ldev] CDI.KEYID = 6
1,515,242 UART: [ldev] SUBJECT.KEYID = 5
1,515,668 UART: [ldev] AUTHORITY.KEYID = 7
1,516,131 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,546,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,382 UART: [ldev] --
1,585,673 UART: [fwproc] Waiting for Commands...
1,586,510 UART: [fwproc] Received command 0x46574c44
1,587,301 UART: [fwproc] Received Image of size 31656 bytes
1,938,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,885 >>> mbox cmd response: success
2,009,001 UART: [afmc] ++
2,009,169 UART: [afmc] CDI.KEYID = 6
2,009,531 UART: [afmc] SUBJECT.KEYID = 7
2,009,956 UART: [afmc] AUTHORITY.KEYID = 5
2,045,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,245 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,638 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,328 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,223 UART: [afmc] --
2,088,307 UART: [cold-reset] --
2,088,933 UART: [state] Locking Datavault
2,090,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,692 UART: [state] Locking ICCM
2,091,194 UART: [exit] Launching FMC @ 0x40000130
2,096,523 UART:
2,096,539 UART: Running Caliptra FMC ...
2,096,947 UART:
2,097,001 UART: [state] CFI Enabled
2,107,672 UART: [fht] FMC Alias Private Key: 7
2,215,755 UART: [art] Extend RT PCRs Done
2,216,183 UART: [art] Lock RT PCRs Done
2,217,809 UART: [art] Populate DV Done
2,226,164 UART: [fht] FMC Alias Private Key: 7
2,227,288 UART: [art] Derive CDI
2,227,568 UART: [art] Store in in slot 0x4
2,313,245 UART: [art] Derive Key Pair
2,313,605 UART: [art] Store priv key in slot 0x5
2,327,607 UART: [art] Derive Key Pair - Done
2,342,770 UART: [art] Signing Cert with AUTHO
2,343,250 UART: RITY.KEYID = 7
2,358,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,157 UART: [art] PUB.X = E3A4B923238CA5C78D707D011F173B37137C164D0FA24A99FD046DBEBD5C4DFD0B3A1DCE61C6222B836AAF4D266BDE47
2,365,933 UART: [art] PUB.Y = E3F37045C914A7F6025F654EA5AB82757F18F849F8B4F5A0CEC9B287F939EE951792F4CA28D3F29B4541076DFA0037F5
2,372,859 UART: [art] SIG.R = 0A545164A5A7B2878A9F18B492F1A356966057E04793867C284F68757AA8778D646FDA4D6E91B9695BC166552B2BAC8D
2,379,620 UART: [art] SIG.S = A4A69F67AB74C14DFBDD55F44478A62854B02F30B09A679AE86847EC7D7C373007616C038509363DAA8E626290141898
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,317 ready_for_fw is high
1,363,317 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,977 >>> mbox cmd response: success
1,920,229 UART:
1,920,245 UART: Running Caliptra FMC ...
1,920,653 UART:
1,920,707 UART: [state] CFI Enabled
1,931,458 UART: [fht] FMC Alias Private Key: 7
2,038,833 UART: [art] Extend RT PCRs Done
2,039,261 UART: [art] Lock RT PCRs Done
2,040,789 UART: [art] Populate DV Done
2,048,948 UART: [fht] FMC Alias Private Key: 7
2,049,962 UART: [art] Derive CDI
2,050,242 UART: [art] Store in in slot 0x4
2,135,711 UART: [art] Derive Key Pair
2,136,071 UART: [art] Store priv key in slot 0x5
2,149,445 UART: [art] Derive Key Pair - Done
2,164,265 UART: [art] Signing Cert with AUTHO
2,164,745 UART: RITY.KEYID = 7
2,180,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,782 UART: [art] PUB.X = 4266BA04A3FEE41923B70463B4D2641B8082E94D5F88E53D0BC0E6D36984C127BED0C80B628A4DD29E18FDA33EFC8160
2,187,548 UART: [art] PUB.Y = E15040138FC045B46E0D33EB66A3BEA73EF9DD63D68965F2F56D6907EDD806B1576A650E7955B59719E055E83BB1B1F4
2,194,490 UART: [art] SIG.R = B314A741305DA912D3AE55789E388532F1920A764F41B48715E720F8FB10CC2871BBDAD09792CA4A8CBFEBB4B29145E0
2,201,263 UART: [art] SIG.S = 211D3FA01320544931E14BF8B8BD49CFC39417ADC8E5AF38A4A2B85872BC81CEFE3833E9826194F3553CA9EE02EAF7E0
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,477,092 UART: [cold-reset] ++
1,477,622 UART: [fht] Storing FHT @ 0x50003400
1,480,467 UART: [idev] ++
1,480,635 UART: [idev] CDI.KEYID = 6
1,480,995 UART: [idev] SUBJECT.KEYID = 7
1,481,419 UART: [idev] UDS.KEYID = 0
1,481,764 ready_for_fw is high
1,481,764 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,817 UART: [idev] Erasing UDS.KEYID = 0
1,506,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,923 UART: [idev] --
1,515,850 UART: [ldev] ++
1,516,018 UART: [ldev] CDI.KEYID = 6
1,516,381 UART: [ldev] SUBJECT.KEYID = 5
1,516,807 UART: [ldev] AUTHORITY.KEYID = 7
1,517,270 UART: [ldev] FE.KEYID = 1
1,522,888 UART: [ldev] Erasing FE.KEYID = 1
1,547,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,127 UART: [ldev] --
1,587,494 UART: [fwproc] Waiting for Commands...
1,588,267 UART: [fwproc] Received command 0x46574c44
1,589,058 UART: [fwproc] Received Image of size 31656 bytes
1,940,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,007 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,274 >>> mbox cmd response: success
2,009,464 UART: [afmc] ++
2,009,632 UART: [afmc] CDI.KEYID = 6
2,009,994 UART: [afmc] SUBJECT.KEYID = 7
2,010,419 UART: [afmc] AUTHORITY.KEYID = 5
2,045,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,113 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,803 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,798 UART: [afmc] --
2,088,728 UART: [cold-reset] --
2,089,420 UART: [state] Locking Datavault
2,090,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,419 UART: [state] Locking ICCM
2,091,883 UART: [exit] Launching FMC @ 0x40000130
2,097,212 UART:
2,097,228 UART: Running Caliptra FMC ...
2,097,636 UART:
2,097,779 UART: [state] CFI Enabled
2,108,744 UART: [fht] FMC Alias Private Key: 7
2,216,821 UART: [art] Extend RT PCRs Done
2,217,249 UART: [art] Lock RT PCRs Done
2,218,807 UART: [art] Populate DV Done
2,227,120 UART: [fht] FMC Alias Private Key: 7
2,228,136 UART: [art] Derive CDI
2,228,416 UART: [art] Store in in slot 0x4
2,313,969 UART: [art] Derive Key Pair
2,314,329 UART: [art] Store priv key in slot 0x5
2,327,907 UART: [art] Derive Key Pair - Done
2,342,581 UART: [art] Signing Cert with AUTHO
2,343,061 UART: RITY.KEYID = 7
2,358,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,386 UART: [art] PUB.X = 1C2011AC05677D70C3FD335018D88E43E4E1E2636622AD7DD49AB70251C0A45BD393955DFD8A4006DE6F39B2C665F703
2,366,146 UART: [art] PUB.Y = 659136E84E264DA8E1C128842205CE0731CEF5FAFEC70922D1B48E0B8600E8C16AA58B036A719F95F9118B18F2D85D34
2,373,061 UART: [art] SIG.R = 735D284966AD2415A00A0F3C1C32F830F4D2DC2388E0F3EEBFF1E89D71C6E2FC2A56EB99754B4CE4BBA0E908D7B63E48
2,379,838 UART: [art] SIG.S = 4420D8CFAEDE25E53952BCFF081AB04710AB7CEBF6232FB7DF1E84095DD6E669CA3FEF17347BE8D7F64056F0B83B0FEE
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 ready_for_fw is high
1,362,424 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,855,574 >>> mbox cmd response: success
1,917,650 UART:
1,917,666 UART: Running Caliptra FMC ...
1,918,074 UART:
1,918,217 UART: [state] CFI Enabled
1,928,572 UART: [fht] FMC Alias Private Key: 7
2,036,689 UART: [art] Extend RT PCRs Done
2,037,117 UART: [art] Lock RT PCRs Done
2,038,647 UART: [art] Populate DV Done
2,046,752 UART: [fht] FMC Alias Private Key: 7
2,047,732 UART: [art] Derive CDI
2,048,012 UART: [art] Store in in slot 0x4
2,133,499 UART: [art] Derive Key Pair
2,133,859 UART: [art] Store priv key in slot 0x5
2,147,423 UART: [art] Derive Key Pair - Done
2,162,382 UART: [art] Signing Cert with AUTHO
2,162,862 UART: RITY.KEYID = 7
2,178,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,178,895 UART: [art] PUB.X = 06DEBE0808C65D1F7732C57A670F4E4E53B55CCD973762F4801264D5C75C005848DE5B85E506540771654430F2B7DECB
2,185,623 UART: [art] PUB.Y = 30DAAE1C5F7DB4F5F0B5DC7D06F411907F62DFB2BA1293E98BEFA05033039ABD56434B267D3BE00163F811F744DF7749
2,192,576 UART: [art] SIG.R = A7CACC7025CF14FB96DBBC806588F068CE9F07CB1B89F42B9FEAA5E7D7CCEFB088359AC9F21CC90F2D351FC6446E123A
2,199,366 UART: [art] SIG.S = 1D614455B6B7B29CD06ED45E11406276B7A7F2A42F7F85B880CBE102EADD9EB1525FCD619AF5C417D18E09E198558AEF
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,172 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,171,933 UART: [cold-reset] ++
1,172,419 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 ready_for_fw is high
1,176,399 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,933 UART: [idev] --
1,209,849 UART: [ldev] ++
1,210,017 UART: [ldev] CDI.KEYID = 6
1,210,380 UART: [ldev] SUBJECT.KEYID = 5
1,210,806 UART: [ldev] AUTHORITY.KEYID = 7
1,211,269 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,918 UART: [fwproc] Wait for Commands...
1,283,706 UART: [fwproc] Recv command 0x46574c44
1,284,434 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,201 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,952 >>> mbox cmd response: success
1,705,148 UART: [afmc] ++
1,705,316 UART: [afmc] CDI.KEYID = 6
1,705,678 UART: [afmc] SUBJECT.KEYID = 7
1,706,103 UART: [afmc] AUTHORITY.KEYID = 5
1,741,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,127 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,975 UART: [afmc] --
1,785,067 UART: [cold-reset] --
1,786,209 UART: [state] Locking Datavault
1,787,334 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,938 UART: [state] Locking ICCM
1,788,550 UART: [exit] Launching FMC @ 0x40000130
1,793,879 UART:
1,793,895 UART: Running Caliptra FMC ...
1,794,303 UART:
1,794,357 UART: [state] CFI Enabled
1,805,012 UART: [fht] FMC Alias Private Key: 7
1,913,029 UART: [art] Extend RT PCRs Done
1,913,457 UART: [art] Lock RT PCRs Done
1,915,127 UART: [art] Populate DV Done
1,923,552 UART: [fht] FMC Alias Private Key: 7
1,924,644 UART: [art] Derive CDI
1,924,924 UART: [art] Store in in slot 0x4
2,010,803 UART: [art] Derive Key Pair
2,011,163 UART: [art] Store priv key in slot 0x5
2,024,451 UART: [art] Derive Key Pair - Done
2,038,967 UART: [art] Signing Cert with AUTHO
2,039,447 UART: RITY.KEYID = 7
2,054,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,472 UART: [art] PUB.X = FCCC24247162F2F067CD897BBA085D6527A6F50D136F4739FC21A731417AF9BC18FDAE213CA53C17E2F76BB11AFCB8F2
2,062,252 UART: [art] PUB.Y = F7F394EA5B978755DE227574336621D2FADE8D9259AB9D36CBD5D16095CD07ADFD2657B182BF5AB6EB080DEFA867A225
2,069,207 UART: [art] SIG.R = 6A11D97D450385433AF987C23B9B5C829D52E59137F7093BC8B97D5CE0D485AA4CD088C98ED8A1B59DD69CC886C0A278
2,075,977 UART: [art] SIG.S = D35DBB417EF30909254F3E0CDB3AF23A3355DA2531649A2711D6A254D30D7FA0030DDED3EB8B67759529752735B2126B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 ready_for_fw is high
1,060,113 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,795 >>> mbox cmd response: success
1,616,335 UART:
1,616,351 UART: Running Caliptra FMC ...
1,616,759 UART:
1,616,813 UART: [state] CFI Enabled
1,627,320 UART: [fht] FMC Alias Private Key: 7
1,735,355 UART: [art] Extend RT PCRs Done
1,735,783 UART: [art] Lock RT PCRs Done
1,737,495 UART: [art] Populate DV Done
1,745,504 UART: [fht] FMC Alias Private Key: 7
1,746,510 UART: [art] Derive CDI
1,746,790 UART: [art] Store in in slot 0x4
1,832,153 UART: [art] Derive Key Pair
1,832,513 UART: [art] Store priv key in slot 0x5
1,845,751 UART: [art] Derive Key Pair - Done
1,860,095 UART: [art] Signing Cert with AUTHO
1,860,575 UART: RITY.KEYID = 7
1,875,533 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,298 UART: [art] PUB.X = 3AB93C3A544EF536556580BA586D8BA0E3EBB991FAC25CEB28FC3CF67421DD214DF60B6EA97815F32E7EF34953522909
1,883,072 UART: [art] PUB.Y = 36D2BEBA5EBA602DECF334626192FF2E71CD3926F621CFAC2274FAB3C2773DBABCC3015635E644275E8B1FA2015D86FF
1,890,034 UART: [art] SIG.R = 157F692B39440731DCF90F11A92EC79ABD68DCE1270620C563CA1D501722E14A161787D1E6FE74A1CEA725D4DED33847
1,896,799 UART: [art] SIG.S = 14CA0F3E1310EDD889790110F6C82F44CF99A92ED450D3E01564510DF382D8C68F28D911CDCED305D30CF148708E13F3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,313 UART: [kat] HMAC-384Kdf
922,869 UART: [kat] LMS
1,171,197 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,682 UART: [fht] FHT @ 0x50003400
1,175,223 UART: [idev] ++
1,175,391 UART: [idev] CDI.KEYID = 6
1,175,751 UART: [idev] SUBJECT.KEYID = 7
1,176,175 UART: [idev] UDS.KEYID = 0
1,176,520 ready_for_fw is high
1,176,520 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,201,344 UART: [idev] Sha1 KeyId Algorithm
1,209,810 UART: [idev] --
1,210,856 UART: [ldev] ++
1,211,024 UART: [ldev] CDI.KEYID = 6
1,211,387 UART: [ldev] SUBJECT.KEYID = 5
1,211,813 UART: [ldev] AUTHORITY.KEYID = 7
1,212,276 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,244,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,514 UART: [ldev] --
1,282,775 UART: [fwproc] Wait for Commands...
1,283,523 UART: [fwproc] Recv command 0x46574c44
1,284,251 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,520 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,409 >>> mbox cmd response: success
1,705,621 UART: [afmc] ++
1,705,789 UART: [afmc] CDI.KEYID = 6
1,706,151 UART: [afmc] SUBJECT.KEYID = 7
1,706,576 UART: [afmc] AUTHORITY.KEYID = 5
1,742,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,750 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,606 UART: [afmc] --
1,785,734 UART: [cold-reset] --
1,786,510 UART: [state] Locking Datavault
1,787,765 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,369 UART: [state] Locking ICCM
1,789,005 UART: [exit] Launching FMC @ 0x40000130
1,794,334 UART:
1,794,350 UART: Running Caliptra FMC ...
1,794,758 UART:
1,794,901 UART: [state] CFI Enabled
1,805,630 UART: [fht] FMC Alias Private Key: 7
1,914,019 UART: [art] Extend RT PCRs Done
1,914,447 UART: [art] Lock RT PCRs Done
1,916,337 UART: [art] Populate DV Done
1,924,606 UART: [fht] FMC Alias Private Key: 7
1,925,536 UART: [art] Derive CDI
1,925,816 UART: [art] Store in in slot 0x4
2,011,517 UART: [art] Derive Key Pair
2,011,877 UART: [art] Store priv key in slot 0x5
2,025,749 UART: [art] Derive Key Pair - Done
2,040,507 UART: [art] Signing Cert with AUTHO
2,040,987 UART: RITY.KEYID = 7
2,056,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,906 UART: [art] PUB.X = 811875AEE30666F9289A7059B2CBA002699CBBE3485382331FB7A13E45A8531DF4284E528441EBEDFC151E51E8046DEE
2,063,669 UART: [art] PUB.Y = 5E209D2EC150DE11FB5C502123C8AC532611E71C4BDB761790A4F9A6DD0C28DAA3D37F6FEDA986E67AA7C328D43DCF35
2,070,634 UART: [art] SIG.R = 6F99D248DFDA57C03AAA2867B6AA7D2DFD252ADDE566B23794458EE7ADF95CD0230F583B9E9EEB8B9DC04701F00DC21F
2,077,417 UART: [art] SIG.S = BA9F00EC5F76A680829AA6F7B6AC0226DD33B051FAED2C9CE0BA394937566DCA634C514E81600051B21EB2AB51E1CC51
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 ready_for_fw is high
1,060,940 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,556,486 >>> mbox cmd response: success
1,619,562 UART:
1,619,578 UART: Running Caliptra FMC ...
1,619,986 UART:
1,620,129 UART: [state] CFI Enabled
1,630,874 UART: [fht] FMC Alias Private Key: 7
1,738,959 UART: [art] Extend RT PCRs Done
1,739,387 UART: [art] Lock RT PCRs Done
1,741,073 UART: [art] Populate DV Done
1,749,458 UART: [fht] FMC Alias Private Key: 7
1,750,588 UART: [art] Derive CDI
1,750,868 UART: [art] Store in in slot 0x4
1,836,387 UART: [art] Derive Key Pair
1,836,747 UART: [art] Store priv key in slot 0x5
1,850,115 UART: [art] Derive Key Pair - Done
1,864,575 UART: [art] Signing Cert with AUTHO
1,865,055 UART: RITY.KEYID = 7
1,879,925 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,690 UART: [art] PUB.X = D9611B37BC5DA25573E2470445C737CBD66E032ADD5F6408CB2E8403E4039B52CB921D0AF9B9909ABC2755E7B62E9D07
1,887,445 UART: [art] PUB.Y = F1934773019655046D38DDC60F69A15138120AFE595F36539B9C01F3677E325CF4FB96531D31180E022F6A5D8F94F6AB
1,894,368 UART: [art] SIG.R = 53B6A2D7A26B545443965BA8CAA4616BB25AFB5C6943CBD4172325D0ECA26C09943D5F04AB653F9E8F4640B6007EC9A7
1,901,118 UART: [art] SIG.S = FF88A86BFD3D6842F746ED0BBCF425FE26F458F34DFDEB6F7CBDDF21B0AF37201C0DBC51CF95AB7E1E476D87C0A05C08
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
891,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,170,989 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,174,941 ready_for_fw is high
1,174,941 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,749 UART: [idev] Erasing UDS.KEYID = 0
1,200,015 UART: [idev] Sha1 KeyId Algorithm
1,208,897 UART: [idev] --
1,209,960 UART: [ldev] ++
1,210,128 UART: [ldev] CDI.KEYID = 6
1,210,492 UART: [ldev] SUBJECT.KEYID = 5
1,210,919 UART: [ldev] AUTHORITY.KEYID = 7
1,211,382 UART: [ldev] FE.KEYID = 1
1,216,446 UART: [ldev] Erasing FE.KEYID = 1
1,242,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,644 UART: [ldev] --
1,282,116 UART: [fwproc] Wait for Commands...
1,282,829 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,904 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,742 >>> mbox cmd response: success
1,703,821 UART: [afmc] ++
1,703,989 UART: [afmc] CDI.KEYID = 6
1,704,352 UART: [afmc] SUBJECT.KEYID = 7
1,704,778 UART: [afmc] AUTHORITY.KEYID = 5
1,740,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,638 UART: [afmc] --
1,783,660 UART: [cold-reset] --
1,784,642 UART: [state] Locking Datavault
1,786,057 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,661 UART: [state] Locking ICCM
1,787,203 UART: [exit] Launching FMC @ 0x40000130
1,792,532 UART:
1,792,548 UART: Running Caliptra FMC ...
1,792,956 UART:
1,793,010 UART: [state] CFI Enabled
1,803,589 UART: [fht] FMC Alias Private Key: 7
1,911,342 UART: [art] Extend RT PCRs Done
1,911,770 UART: [art] Lock RT PCRs Done
1,913,048 UART: [art] Populate DV Done
1,921,493 UART: [fht] FMC Alias Private Key: 7
1,922,675 UART: [art] Derive CDI
1,922,955 UART: [art] Store in in slot 0x4
2,008,760 UART: [art] Derive Key Pair
2,009,120 UART: [art] Store priv key in slot 0x5
2,022,700 UART: [art] Derive Key Pair - Done
2,037,847 UART: [art] Signing Cert with AUTHO
2,038,327 UART: RITY.KEYID = 7
2,053,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,842 UART: [art] PUB.X = 3809128EB710FC4F118E2AC2F9D1CA31EB2D0C62B4FB87744B3C62DCEC13370FABF79F88AC4C0C821F415CFAF6165E5C
2,060,620 UART: [art] PUB.Y = C57FCBEE226B89F742FD3C35973D36CEF986DE653EB839FEEED288350275CF6847F697E4518D9371825117A27D074563
2,067,564 UART: [art] SIG.R = F7622CD117A88C7ECC7AC5CF00958213ACCB9F7D5BB0C20D386FD56C413B91E27F2363B1DE0424DD1DEC35A6C1EB5504
2,074,321 UART: [art] SIG.S = CC7E599A7E2FDB43D717940C5D23C1C1A7140606EC8F54E7AA587BA7C04B98B4565485C4805972394E9E5926B689B31F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,638 ready_for_fw is high
1,055,638 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,549,804 >>> mbox cmd response: success
1,612,672 UART:
1,612,688 UART: Running Caliptra FMC ...
1,613,096 UART:
1,613,150 UART: [state] CFI Enabled
1,623,505 UART: [fht] FMC Alias Private Key: 7
1,731,704 UART: [art] Extend RT PCRs Done
1,732,132 UART: [art] Lock RT PCRs Done
1,733,640 UART: [art] Populate DV Done
1,741,833 UART: [fht] FMC Alias Private Key: 7
1,742,999 UART: [art] Derive CDI
1,743,279 UART: [art] Store in in slot 0x4
1,828,870 UART: [art] Derive Key Pair
1,829,230 UART: [art] Store priv key in slot 0x5
1,842,492 UART: [art] Derive Key Pair - Done
1,857,044 UART: [art] Signing Cert with AUTHO
1,857,524 UART: RITY.KEYID = 7
1,872,170 UART: [art] Erasing AUTHORITY.KEYID = 7
1,872,935 UART: [art] PUB.X = CD30A3C71A31A279062D5915A2EA2622CD3502BBCB3EDCDE769A3E15897C3C8D87156534D9FF6A2785A308C01B94E1FC
1,879,706 UART: [art] PUB.Y = 594A0A98AC8A8E9B95E9F42855D27920B31C2D927E2DED84AC9F0DCE66F09CF8CA5C7D9595E7AD86400DBAEA100A1352
1,886,660 UART: [art] SIG.R = 85889E5FBAF364D78495CF8852268040DD674B1D87089098D3DFD498239697F14BFB9CEF2C7B09D6771EA54BCEFA2766
1,893,428 UART: [art] SIG.S = 28B856A299CE46ED76A9E647559FFA6B98A8807E51991F131AE6C0F14451F8E6AA46989D6C3A7A2CDDC33C3350327C4C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,570 UART: [cold-reset] ++
1,171,032 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 ready_for_fw is high
1,174,920 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,241 UART: [ldev] ++
1,209,409 UART: [ldev] CDI.KEYID = 6
1,209,773 UART: [ldev] SUBJECT.KEYID = 5
1,210,200 UART: [ldev] AUTHORITY.KEYID = 7
1,210,663 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,239 UART: [ldev] --
1,281,519 UART: [fwproc] Wait for Commands...
1,282,306 UART: [fwproc] Recv command 0x46574c44
1,283,039 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,506 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,815 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,493 >>> mbox cmd response: success
1,701,520 UART: [afmc] ++
1,701,688 UART: [afmc] CDI.KEYID = 6
1,702,051 UART: [afmc] SUBJECT.KEYID = 7
1,702,477 UART: [afmc] AUTHORITY.KEYID = 5
1,738,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,747 UART: [afmc] --
1,781,859 UART: [cold-reset] --
1,782,681 UART: [state] Locking Datavault
1,783,820 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,424 UART: [state] Locking ICCM
1,784,850 UART: [exit] Launching FMC @ 0x40000130
1,790,179 UART:
1,790,195 UART: Running Caliptra FMC ...
1,790,603 UART:
1,790,746 UART: [state] CFI Enabled
1,801,891 UART: [fht] FMC Alias Private Key: 7
1,909,900 UART: [art] Extend RT PCRs Done
1,910,328 UART: [art] Lock RT PCRs Done
1,912,002 UART: [art] Populate DV Done
1,920,313 UART: [fht] FMC Alias Private Key: 7
1,921,359 UART: [art] Derive CDI
1,921,639 UART: [art] Store in in slot 0x4
2,007,504 UART: [art] Derive Key Pair
2,007,864 UART: [art] Store priv key in slot 0x5
2,020,822 UART: [art] Derive Key Pair - Done
2,035,615 UART: [art] Signing Cert with AUTHO
2,036,095 UART: RITY.KEYID = 7
2,051,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,830 UART: [art] PUB.X = 7C87B5494274C6858E5C24680F6B54437BF1BED02D14DEBB41EE663206F73AD53A5EB8304B0B96E331EB1F4E6F73E286
2,058,597 UART: [art] PUB.Y = 71F03188E28E788C91136D0D0FE981ABF121EBD0B9DE71667AA009A09DDD2CBC5E8FEC1B4AF1FF3ACC4C3520264932F1
2,065,556 UART: [art] SIG.R = 969473E5733660465A17D4C41B99F60ADFD8B3B7FC600713DE72BE28D9170887C2E8B6CD407CBD55A4E4EC59E2A7562B
2,072,323 UART: [art] SIG.S = BED01242AB034D2BC0F57C45D7D38160ABDB648EC4CE3A9826D680842350CBE6BDFFE0009EE20A3901CD4FFB182FEABD
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,981 ready_for_fw is high
1,055,981 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,691 >>> mbox cmd response: success
1,613,787 UART:
1,613,803 UART: Running Caliptra FMC ...
1,614,211 UART:
1,614,354 UART: [state] CFI Enabled
1,625,089 UART: [fht] FMC Alias Private Key: 7
1,732,328 UART: [art] Extend RT PCRs Done
1,732,756 UART: [art] Lock RT PCRs Done
1,734,408 UART: [art] Populate DV Done
1,742,701 UART: [fht] FMC Alias Private Key: 7
1,743,833 UART: [art] Derive CDI
1,744,113 UART: [art] Store in in slot 0x4
1,829,762 UART: [art] Derive Key Pair
1,830,122 UART: [art] Store priv key in slot 0x5
1,843,584 UART: [art] Derive Key Pair - Done
1,858,052 UART: [art] Signing Cert with AUTHO
1,858,532 UART: RITY.KEYID = 7
1,874,464 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,229 UART: [art] PUB.X = 4FFAD14FC80E374A5CA97381EC3E92CC0E4FED03C6B62FBAE8331F76115445F8BA43AC3C24AB60FC3A337A894F8567A9
1,882,008 UART: [art] PUB.Y = 7EE2879DEDD84ECC588201C2359DD0D1AE3B717551FB7A4903BAE435C9351E0E91DC61DF8A2C8202598E7EB9F79F9AAA
1,888,962 UART: [art] SIG.R = D7CB18D0D7022F1F15DEB2A036E9AEB994DDAD60A9B410285719D423B2ABACF7427F7F8BEDA2B958F3CB392D0630CF56
1,895,746 UART: [art] SIG.S = A3EF194E5E7CC6C6B2643B17DE195B61B41A698C5AE7B1AD39AC02B8AE974E2F8DDDE0D77B0CB7D674928C4AC9F5BD0A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
191,947 UART:
192,318 UART: Running Caliptra ROM ...
193,457 UART:
193,598 UART: [state] CFI Enabled
264,538 UART: [state] LifecycleState = Unprovisioned
266,475 UART: [state] DebugLocked = No
268,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,246 UART: [kat] SHA2-256
441,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,417 UART: [kat] ++
452,854 UART: [kat] sha1
463,008 UART: [kat] SHA2-256
465,653 UART: [kat] SHA2-384
470,782 UART: [kat] SHA2-512-ACC
473,147 UART: [kat] ECC-384
2,768,075 UART: [kat] HMAC-384Kdf
2,800,141 UART: [kat] LMS
3,990,430 UART: [kat] --
3,995,510 UART: [cold-reset] ++
3,998,088 UART: [fht] Storing FHT @ 0x50003400
4,009,708 UART: [idev] ++
4,010,291 UART: [idev] CDI.KEYID = 6
4,011,198 UART: [idev] SUBJECT.KEYID = 7
4,012,435 UART: [idev] UDS.KEYID = 0
4,013,507 ready_for_fw is high
4,013,696 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
4,108,523 UART: [idev] Erasing UDS.KEYID = 0
7,344,419 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,774 UART: [idev] --
7,371,110 UART: [ldev] ++
7,371,730 UART: [ldev] CDI.KEYID = 6
7,372,608 UART: [ldev] SUBJECT.KEYID = 5
7,373,864 UART: [ldev] AUTHORITY.KEYID = 7
7,375,142 UART: [ldev] FE.KEYID = 1
7,400,880 UART: [ldev] Erasing FE.KEYID = 1
10,735,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,389 UART: [ldev] --
13,111,400 UART: [fwproc] Waiting for Commands...
13,113,214 UART: [fwproc] Received command 0x46574c44
13,115,387 UART: [fwproc] Received Image of size 75172 bytes
16,681,600 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,760,715 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,829,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 50468
17,010,264 >>> mbox cmd response: success
17,010,675 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,015,102 UART: [afmc] ++
17,015,735 UART: [afmc] CDI.KEYID = 6
17,016,615 UART: [afmc] SUBJECT.KEYID = 7
17,017,884 UART: [afmc] AUTHORITY.KEYID = 5
20,386,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,687,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,689,602 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,703,993 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,718,831 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,733,238 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,753,536 UART: [afmc] --
22,756,859 UART: [cold-reset] --
22,759,518 UART: [state] Locking Datavault
22,764,429 UART: [state] Locking PCR0, PCR1 and PCR31
22,766,125 UART: [state] Locking ICCM
22,767,645 UART: [exit] Launching FMC @ 0x40000130
22,776,029 UART:
22,776,256 UART: Running Caliptra FMC ...
22,777,272 UART:
22,777,412 UART: [state] CFI Enabled
22,848,668 UART: [fht] FMC Alias Private Key: 7
25,186,984 UART: [art] Extend RT PCRs Done
25,188,197 UART: [art] Lock RT PCRs Done
25,189,995 UART: [art] Populate DV Done
25,195,294 UART: [fht] FMC Alias Private Key: 7
25,196,939 UART: [art] Derive CDI
25,197,665 UART: [art] Store in in slot 0x4
25,257,266 UART: [art] Derive Key Pair
25,258,296 UART: [art] Store priv key in slot 0x5
28,551,499 UART: [art] Derive Key Pair - Done
28,564,646 UART: [art] Signing Cert with AUTHO
28,565,943 UART: RITY.KEYID = 7
30,854,349 UART: [art] Erasing AUTHORITY.KEYID = 7
30,855,854 UART: [art] PUB.X = FE14CC1225265AB346727D9112FAEECD052AEE12C0491426F5F8B1B2DE6FD9B26DFE869FAB1641B12FB7C68AE082F275
30,863,156 UART: [art] PUB.Y = 30227B6CF4BE3103609825EF35F8EBC25CE206EE4B0B9B8B11C6CCE4C96DAFDDE60BDD7B4D2289733A2330EC75BD4E3E
30,870,436 UART: [art] SIG.R = 84F1A0A33EFDAF34AC304CF70789E85874785500E8B6FA46EC15B9D4EA4E3F7409714F26A4CD8703896E6E52173F832D
30,877,781 UART: [art] SIG.S = 6FD9C851CE53E710611666A49730D611A4F526861197D402DA607E393BD9183F62FBD3C81995DE01E4805EAE77F45704
32,182,466 UART: mock_rt_interact::rt_entry...FMC Tester
32,299,544 UART: [rt] Runtime listening for mailbox commands...
32,303,835 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,783,354 ready_for_fw is high
3,783,949 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
17,087,598 >>> mbox cmd response: success
17,088,102 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,777,959 UART:
22,778,348 UART: Running Caliptra FMC ...
22,779,628 UART:
22,779,787 UART: [state] CFI Enabled
22,846,604 UART: [fht] FMC Alias Private Key: 7
25,184,301 UART: [art] Extend RT PCRs Done
25,185,528 UART: [art] Lock RT PCRs Done
25,187,285 UART: [art] Populate DV Done
25,192,871 UART: [fht] FMC Alias Private Key: 7
25,194,500 UART: [art] Derive CDI
25,195,258 UART: [art] Store in in slot 0x4
25,254,428 UART: [art] Derive Key Pair
25,255,445 UART: [art] Store priv key in slot 0x5
28,549,159 UART: [art] Derive Key Pair - Done
28,561,821 UART: [art] Signing Cert with AUTHO
28,563,138 UART: RITY.KEYID = 7
30,851,097 UART: [art] Erasing AUTHORITY.KEYID = 7
30,852,604 UART: [art] PUB.X = D47FCD48CBB6E865E7710AC69516C852EF23AFA64A49FB442AD91218D1AAD6B6C36FE8CF8B6E95C9610CD3913C4A2853
30,859,845 UART: [art] PUB.Y = 27131778663A3B19239151CE8AF78F14B3E2F02B0527A7DDF1BAABEE23F0DDF6A9A2AB013A6202401CCEDE0269211177
30,867,068 UART: [art] SIG.R = 2CD4925CCE5F83A25509F07D2D33143ACCB597671538EAC610453C7D65F8CDE1E82AA8E872CC43680532A456AB480CDC
30,874,472 UART: [art] SIG.S = 8620325195101276313D51065E408B65B5D52782AF342E39652FFD80F45C62582221236A3D051E5C34062D5B7B98B8E8
32,179,932 UART: mock_rt_interact::rt_entry...FMC Tester
32,297,400 UART: [rt] Runtime listening for mailbox commands...
32,301,681 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,603 UART:
192,952 UART: Running Caliptra ROM ...
194,034 UART:
603,614 UART: [state] CFI Enabled
617,783 UART: [state] LifecycleState = Unprovisioned
619,747 UART: [state] DebugLocked = No
621,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,141 UART: [kat] SHA2-256
795,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,433 UART: [kat] ++
806,874 UART: [kat] sha1
819,589 UART: [kat] SHA2-256
822,242 UART: [kat] SHA2-384
828,116 UART: [kat] SHA2-512-ACC
830,488 UART: [kat] ECC-384
3,116,751 UART: [kat] HMAC-384Kdf
3,128,772 UART: [kat] LMS
4,318,845 UART: [kat] --
4,323,543 UART: [cold-reset] ++
4,326,114 UART: [fht] Storing FHT @ 0x50003400
4,336,031 UART: [idev] ++
4,336,598 UART: [idev] CDI.KEYID = 6
4,337,626 UART: [idev] SUBJECT.KEYID = 7
4,338,799 UART: [idev] UDS.KEYID = 0
4,339,866 ready_for_fw is high
4,340,053 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
4,434,876 UART: [idev] Erasing UDS.KEYID = 0
7,624,499 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,208 UART: [idev] --
7,651,468 UART: [ldev] ++
7,652,043 UART: [ldev] CDI.KEYID = 6
7,653,062 UART: [ldev] SUBJECT.KEYID = 5
7,654,220 UART: [ldev] AUTHORITY.KEYID = 7
7,655,502 UART: [ldev] FE.KEYID = 1
7,665,932 UART: [ldev] Erasing FE.KEYID = 1
10,955,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,924 UART: [ldev] --
13,319,644 UART: [fwproc] Waiting for Commands...
13,321,743 UART: [fwproc] Received command 0x46574c44
13,323,925 UART: [fwproc] Received Image of size 75172 bytes
16,901,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,982,348 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,051,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 50468
17,232,143 >>> mbox cmd response: success
17,232,521 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,236,835 UART: [afmc] ++
17,237,470 UART: [afmc] CDI.KEYID = 6
17,238,378 UART: [afmc] SUBJECT.KEYID = 7
17,239,593 UART: [afmc] AUTHORITY.KEYID = 5
20,559,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,856,204 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,858,517 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,872,872 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,887,733 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,902,188 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,923,643 UART: [afmc] --
22,927,450 UART: [cold-reset] --
22,930,690 UART: [state] Locking Datavault
22,936,966 UART: [state] Locking PCR0, PCR1 and PCR31
22,938,716 UART: [state] Locking ICCM
22,941,295 UART: [exit] Launching FMC @ 0x40000130
22,949,684 UART:
22,949,925 UART: Running Caliptra FMC ...
22,951,192 UART:
22,951,361 UART: [state] CFI Enabled
22,959,583 UART: [fht] FMC Alias Private Key: 7
25,290,216 UART: [art] Extend RT PCRs Done
25,291,528 UART: [art] Lock RT PCRs Done
25,293,400 UART: [art] Populate DV Done
25,298,540 UART: [fht] FMC Alias Private Key: 7
25,300,073 UART: [art] Derive CDI
25,300,887 UART: [art] Store in in slot 0x4
25,343,686 UART: [art] Derive Key Pair
25,344,703 UART: [art] Store priv key in slot 0x5
28,587,203 UART: [art] Derive Key Pair - Done
28,600,039 UART: [art] Signing Cert with AUTHO
28,601,342 UART: RITY.KEYID = 7
30,880,672 UART: [art] Erasing AUTHORITY.KEYID = 7
30,882,184 UART: [art] PUB.X = 340550F9D9AE890860C67D7B1A4FA9E197232859FCC589BF2EAB0ACA273FF839E9B46B532D7E4F33DE29B7C0348C9222
30,889,421 UART: [art] PUB.Y = CE39CF588E6D40A463251851695C798A6ED888963EFF466BF239C90F8388A524B4CDEAAF355165ED09F9AA5B582CD5FB
30,896,651 UART: [art] SIG.R = 7419121CB74BF096B321A7819949B9616E8A262C1B13325820AD3E9F5C8A100B2BCD465F30C3520251419DFDDC6147CC
30,904,041 UART: [art] SIG.S = 4EAF0D1F173F4568A039F2E430C5B2F25A9C10A160F45440AE5AB01FD3BE10E83AE6DDA45EF481590AEACBEA88CD1572
32,209,281 UART: mock_rt_interact::rt_entry...FMC Tester
32,326,501 UART: [rt] Runtime listening for mailbox commands...
32,330,732 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
4,125,922 ready_for_fw is high
4,126,333 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
17,277,616 >>> mbox cmd response: success
17,278,074 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,918,866 UART:
22,919,241 UART: Running Caliptra FMC ...
22,920,434 UART:
22,920,589 UART: [state] CFI Enabled
22,928,360 UART: [fht] FMC Alias Private Key: 7
25,259,022 UART: [art] Extend RT PCRs Done
25,260,256 UART: [art] Lock RT PCRs Done
25,261,616 UART: [art] Populate DV Done
25,266,760 UART: [fht] FMC Alias Private Key: 7
25,268,461 UART: [art] Derive CDI
25,269,273 UART: [art] Store in in slot 0x4
25,312,047 UART: [art] Derive Key Pair
25,313,048 UART: [art] Store priv key in slot 0x5
28,555,654 UART: [art] Derive Key Pair - Done
28,568,295 UART: [art] Signing Cert with AUTHO
28,569,610 UART: RITY.KEYID = 7
30,848,771 UART: [art] Erasing AUTHORITY.KEYID = 7
30,850,285 UART: [art] PUB.X = 68B19AAEEF96744B9CCA80535FE4292F4329EF831EB30D02E8073C5D7B2C6A423AAFD15CD2437B064902512707C94D63
30,857,485 UART: [art] PUB.Y = 86031D73201AFA9D0A26BCB245DAA5B434593192B3566BDF71314304516FBFA79F8D7CF059D433153074C178A11F8BB8
30,864,741 UART: [art] SIG.R = 68C2A8EB45929713954B47CF25BD231545D703108F9DA12CBE03F1632CD2BBF2966F34BD353032094C3BD852BEC16513
30,872,085 UART: [art] SIG.S = D355E95AD0E3394785A0E938EA4C97272E66791BB296A61F937B26E2D71E34ED18A470C6C2FA58248749D6AD124B2393
32,177,240 UART: mock_rt_interact::rt_entry...FMC Tester
32,295,093 UART: [rt] Runtime listening for mailbox commands...
32,299,337 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,934 UART:
192,303 UART: Running Caliptra ROM ...
193,426 UART:
193,569 UART: [state] CFI Enabled
263,880 UART: [state] LifecycleState = Unprovisioned
265,789 UART: [state] DebugLocked = No
267,184 UART: [state] WD Timer not started. Device not locked for debugging
270,861 UART: [kat] SHA2-256
449,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,562 UART: [kat] ++
462,115 UART: [kat] sha1
472,637 UART: [kat] SHA2-256
475,641 UART: [kat] SHA2-384
480,492 UART: [kat] SHA2-512-ACC
483,496 UART: [kat] ECC-384
2,947,709 UART: [kat] HMAC-384Kdf
2,970,000 UART: [kat] LMS
3,499,468 UART: [kat] --
3,503,105 UART: [cold-reset] ++
3,504,467 UART: [fht] FHT @ 0x50003400
3,515,581 UART: [idev] ++
3,516,147 UART: [idev] CDI.KEYID = 6
3,517,053 UART: [idev] SUBJECT.KEYID = 7
3,518,299 UART: [idev] UDS.KEYID = 0
3,519,216 ready_for_fw is high
3,519,401 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,614,269 UART: [idev] Erasing UDS.KEYID = 0
6,023,015 UART: [idev] Sha1 KeyId Algorithm
6,045,759 UART: [idev] --
6,048,890 UART: [ldev] ++
6,049,459 UART: [ldev] CDI.KEYID = 6
6,050,365 UART: [ldev] SUBJECT.KEYID = 5
6,051,575 UART: [ldev] AUTHORITY.KEYID = 7
6,052,808 UART: [ldev] FE.KEYID = 1
6,097,868 UART: [ldev] Erasing FE.KEYID = 1
8,600,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,396 UART: [ldev] --
10,391,817 UART: [fwproc] Wait for Commands...
10,393,333 UART: [fwproc] Recv command 0x46574c44
10,395,426 UART: [fwproc] Recv'd Img size: 75136 bytes
13,321,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,397,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,465,820 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,645,842 >>> mbox cmd response: success
13,646,243 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,650,614 UART: [afmc] ++
13,651,196 UART: [afmc] CDI.KEYID = 6
13,652,104 UART: [afmc] SUBJECT.KEYID = 7
13,653,317 UART: [afmc] AUTHORITY.KEYID = 5
16,186,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,909,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,911,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,927,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,943,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,958,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,982,106 UART: [afmc] --
17,986,620 UART: [cold-reset] --
17,990,913 UART: [state] Locking Datavault
17,997,614 UART: [state] Locking PCR0, PCR1 and PCR31
17,999,307 UART: [state] Locking ICCM
18,000,802 UART: [exit] Launching FMC @ 0x40000130
18,009,222 UART:
18,009,501 UART: Running Caliptra FMC ...
18,010,613 UART:
18,010,773 UART: [state] CFI Enabled
18,067,869 UART: [fht] FMC Alias Private Key: 7
19,832,079 UART: [art] Extend RT PCRs Done
19,833,299 UART: [art] Lock RT PCRs Done
19,834,866 UART: [art] Populate DV Done
19,840,116 UART: [fht] FMC Alias Private Key: 7
19,841,780 UART: [art] Derive CDI
19,842,602 UART: [art] Store in in slot 0x4
19,901,456 UART: [art] Derive Key Pair
19,902,492 UART: [art] Store priv key in slot 0x5
22,365,295 UART: [art] Derive Key Pair - Done
22,378,287 UART: [art] Signing Cert with AUTHO
22,379,579 UART: RITY.KEYID = 7
24,091,558 UART: [art] Erasing AUTHORITY.KEYID = 7
24,093,069 UART: [art] PUB.X = D28ED4400AE9460853AAD427017FEC529605E2D930E2854971B4710D54352DA79AB480C65B1472774804F46F00394EAC
24,100,320 UART: [art] PUB.Y = 02B76CF9A1F704D4D2308F1BDD7F4770EE7C2E6CAE099CFD4691356297DD0F79C10D071CB8C4AC2E0BA125CCDFD02B76
24,107,553 UART: [art] SIG.R = 3E3F7D3C3BF92122D9008E28BA39BD9218F6B0E824F2007DEF9E290FCD576BDA426E81DB2C2B693422C9B4B93212A202
24,114,937 UART: [art] SIG.S = 5F7A55F116AA94C7503AC30BB0D79CAC2064087FD2139DC6CF6E147CCEA9A09DA608B658993881AF72D377DABD8CF177
25,093,741 UART: mock_rt_interact::rt_entry...FMC Tester
25,210,094 UART: [rt] Runtime listening for mailbox commands...
25,214,375 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,358,029 ready_for_fw is high
3,358,432 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,423,169 >>> mbox cmd response: success
13,423,880 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,703,208 UART:
17,703,638 UART: Running Caliptra FMC ...
17,704,937 UART:
17,705,104 UART: [state] CFI Enabled
17,770,673 UART: [fht] FMC Alias Private Key: 7
19,534,014 UART: [art] Extend RT PCRs Done
19,535,236 UART: [art] Lock RT PCRs Done
19,536,831 UART: [art] Populate DV Done
19,542,078 UART: [fht] FMC Alias Private Key: 7
19,543,624 UART: [art] Derive CDI
19,544,389 UART: [art] Store in in slot 0x4
19,603,089 UART: [art] Derive Key Pair
19,604,130 UART: [art] Store priv key in slot 0x5
22,066,931 UART: [art] Derive Key Pair - Done
22,079,820 UART: [art] Signing Cert with AUTHO
22,081,179 UART: RITY.KEYID = 7
23,793,585 UART: [art] Erasing AUTHORITY.KEYID = 7
23,795,105 UART: [art] PUB.X = 4B3CA3D2B849C453AFFB71636EACDA6666B3874D365A7C1E5044BDA0E1FEEA0BF068D68AB5B6131AFEC64540FF09F094
23,802,371 UART: [art] PUB.Y = 64468F7D25815B03EEA289C82C4CEC5DD4E9F7BBB967E55E25E86E3162C3A4A0289617274517DE384210AB05F5524937
23,809,623 UART: [art] SIG.R = 841A3999B48124FB35C2556F367C6124DB59892169B7AFD21630E092F4DDD52B14B1318EB44F9CADB154949C7C33DECF
23,816,977 UART: [art] SIG.S = 3A4525A232D260614E4078EE52225D621B8BADAA89B1B62B44FFFED1D075EECFAC9B21E7C0743E572FEA85ABE0BE682F
24,795,500 UART: mock_rt_interact::rt_entry...FMC Tester
24,911,950 UART: [rt] Runtime listening for mailbox commands...
24,916,232 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,399 UART:
192,755 UART: Running Caliptra ROM ...
193,870 UART:
603,557 UART: [state] CFI Enabled
619,638 UART: [state] LifecycleState = Unprovisioned
621,510 UART: [state] DebugLocked = No
622,809 UART: [state] WD Timer not started. Device not locked for debugging
625,907 UART: [kat] SHA2-256
805,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,621 UART: [kat] ++
817,065 UART: [kat] sha1
829,063 UART: [kat] SHA2-256
832,074 UART: [kat] SHA2-384
838,148 UART: [kat] SHA2-512-ACC
841,081 UART: [kat] ECC-384
3,280,982 UART: [kat] HMAC-384Kdf
3,292,211 UART: [kat] LMS
3,821,656 UART: [kat] --
3,827,214 UART: [cold-reset] ++
3,828,502 UART: [fht] FHT @ 0x50003400
3,839,836 UART: [idev] ++
3,840,395 UART: [idev] CDI.KEYID = 6
3,841,275 UART: [idev] SUBJECT.KEYID = 7
3,842,515 UART: [idev] UDS.KEYID = 0
3,843,434 ready_for_fw is high
3,843,628 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,938,085 UART: [idev] Erasing UDS.KEYID = 0
6,317,595 UART: [idev] Sha1 KeyId Algorithm
6,340,061 UART: [idev] --
6,343,188 UART: [ldev] ++
6,343,752 UART: [ldev] CDI.KEYID = 6
6,344,654 UART: [ldev] SUBJECT.KEYID = 5
6,345,879 UART: [ldev] AUTHORITY.KEYID = 7
6,347,030 UART: [ldev] FE.KEYID = 1
6,360,217 UART: [ldev] Erasing FE.KEYID = 1
8,832,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,841 UART: [ldev] --
10,623,459 UART: [fwproc] Wait for Commands...
10,626,469 UART: [fwproc] Recv command 0x46574c44
10,628,574 UART: [fwproc] Recv'd Img size: 75136 bytes
13,549,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,624,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,692,965 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,873,989 >>> mbox cmd response: success
13,874,458 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,878,145 UART: [afmc] ++
13,878,722 UART: [afmc] CDI.KEYID = 6
13,879,597 UART: [afmc] SUBJECT.KEYID = 7
13,880,861 UART: [afmc] AUTHORITY.KEYID = 5
16,381,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,103,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,105,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,121,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,137,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,153,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,176,006 UART: [afmc] --
18,178,967 UART: [cold-reset] --
18,184,068 UART: [state] Locking Datavault
18,189,350 UART: [state] Locking PCR0, PCR1 and PCR31
18,191,083 UART: [state] Locking ICCM
18,193,510 UART: [exit] Launching FMC @ 0x40000130
18,201,970 UART:
18,202,208 UART: Running Caliptra FMC ...
18,203,309 UART:
18,203,468 UART: [state] CFI Enabled
18,211,385 UART: [fht] FMC Alias Private Key: 7
19,968,789 UART: [art] Extend RT PCRs Done
19,970,012 UART: [art] Lock RT PCRs Done
19,971,901 UART: [art] Populate DV Done
19,977,582 UART: [fht] FMC Alias Private Key: 7
19,979,124 UART: [art] Derive CDI
19,979,897 UART: [art] Store in in slot 0x4
20,022,703 UART: [art] Derive Key Pair
20,023,691 UART: [art] Store priv key in slot 0x5
22,450,068 UART: [art] Derive Key Pair - Done
22,462,951 UART: [art] Signing Cert with AUTHO
22,464,247 UART: RITY.KEYID = 7
24,169,338 UART: [art] Erasing AUTHORITY.KEYID = 7
24,170,847 UART: [art] PUB.X = B8F4C4C4F59E9A90AA70077AEFEEDF19D084E9DD117C1625A5A73D88C8E07B74380E67E252E61C43CED68364392568E1
24,178,086 UART: [art] PUB.Y = 46D19AB34CBC1C21665768ED202F7AF57FA1EBF4BF208843AD2CAC5CB51E31A81AEE2D5711B11E76D332EF4F0CCCE26D
24,185,562 UART: [art] SIG.R = D6A4BF98EE34AF551C22A1AE02CD49F5D82BDF3FE82DBC0FCA6D2B7CDF09AB1E5D4F630AC1C281885BC1F1ACD8DC7F76
24,192,866 UART: [art] SIG.S = 26A0A4BE22CC07C7C553BBFDDE18FC3BC454AB99B7E01DBCF9317CD31CAD98AAB2ED88DBAFAE209F3629971726171AF8
25,171,400 UART: mock_rt_interact::rt_entry...FMC Tester
25,288,255 UART: [rt] Runtime listening for mailbox commands...
25,292,476 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,696,944 ready_for_fw is high
3,697,466 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,653,782 >>> mbox cmd response: success
13,654,576 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,904,779 UART:
17,905,156 UART: Running Caliptra FMC ...
17,906,334 UART:
17,906,484 UART: [state] CFI Enabled
17,914,421 UART: [fht] FMC Alias Private Key: 7
19,671,103 UART: [art] Extend RT PCRs Done
19,672,307 UART: [art] Lock RT PCRs Done
19,673,847 UART: [art] Populate DV Done
19,679,113 UART: [fht] FMC Alias Private Key: 7
19,680,812 UART: [art] Derive CDI
19,681,543 UART: [art] Store in in slot 0x4
19,724,029 UART: [art] Derive Key Pair
19,725,070 UART: [art] Store priv key in slot 0x5
22,152,064 UART: [art] Derive Key Pair - Done
22,165,224 UART: [art] Signing Cert with AUTHO
22,166,522 UART: RITY.KEYID = 7
23,872,202 UART: [art] Erasing AUTHORITY.KEYID = 7
23,873,695 UART: [art] PUB.X = A00348E7B8D3724A76F085D6F30F359D530F30FF1CAFEFEDB5C4AE9FE27E33AB37703ACFCB80F2C759DBAA40797CFFC0
23,881,053 UART: [art] PUB.Y = D3E777D5C4551F17D5C67FA2C016A8B699D18D04210573321703CEFC505DDFEA662B519706A26C1B37791895A2E70281
23,888,296 UART: [art] SIG.R = 8FF8A58BBE3E2338E8AD19871F8602055DCB217549AD2839CEC216B36A9E81124E4A07E0A05C1557A8983BEFEC5FF143
23,895,672 UART: [art] SIG.S = 83DB20CEEB3F6EC36DEAE8E1313F7CDE411DC29629E89599576D1E04B9C21A399EEF3406DB0F54A2B220BCCE3B883145
24,874,789 UART: mock_rt_interact::rt_entry...FMC Tester
24,992,171 UART: [rt] Runtime listening for mailbox commands...
24,996,412 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,939 UART:
192,315 UART: Running Caliptra ROM ...
193,414 UART:
193,552 UART: [state] CFI Enabled
261,601 UART: [state] LifecycleState = Unprovisioned
264,014 UART: [state] DebugLocked = No
265,625 UART: [state] WD Timer not started. Device not locked for debugging
269,303 UART: [kat] SHA2-256
458,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,769 UART: [kat] ++
470,210 UART: [kat] sha1
480,583 UART: [kat] SHA2-256
483,588 UART: [kat] SHA2-384
489,321 UART: [kat] SHA2-512-ACC
491,874 UART: [kat] ECC-384
2,948,263 UART: [kat] HMAC-384Kdf
2,972,436 UART: [kat] LMS
3,504,222 UART: [kat] --
3,507,720 UART: [cold-reset] ++
3,509,643 UART: [fht] FHT @ 0x50003400
3,520,544 UART: [idev] ++
3,521,175 UART: [idev] CDI.KEYID = 6
3,522,143 UART: [idev] SUBJECT.KEYID = 7
3,523,390 UART: [idev] UDS.KEYID = 0
3,524,282 ready_for_fw is high
3,524,467 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,619,278 UART: [idev] Erasing UDS.KEYID = 0
6,029,067 UART: [idev] Sha1 KeyId Algorithm
6,051,497 UART: [idev] --
6,056,894 UART: [ldev] ++
6,057,572 UART: [ldev] CDI.KEYID = 6
6,058,451 UART: [ldev] SUBJECT.KEYID = 5
6,059,662 UART: [ldev] AUTHORITY.KEYID = 7
6,060,893 UART: [ldev] FE.KEYID = 1
6,100,508 UART: [ldev] Erasing FE.KEYID = 1
8,607,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,088 UART: [ldev] --
10,418,040 UART: [fwproc] Wait for Commands...
10,420,513 UART: [fwproc] Recv command 0x46574c44
10,422,765 UART: [fwproc] Recv'd Img size: 75136 bytes
13,388,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,468,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,584,851 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,892,298 >>> mbox cmd response: success
13,892,728 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,896,512 UART: [afmc] ++
13,897,200 UART: [afmc] CDI.KEYID = 6
13,898,359 UART: [afmc] SUBJECT.KEYID = 7
13,899,905 UART: [afmc] AUTHORITY.KEYID = 5
16,423,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,147,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,149,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,164,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,180,113 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,195,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,220,112 UART: [afmc] --
18,224,298 UART: [cold-reset] --
18,229,778 UART: [state] Locking Datavault
18,236,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,238,900 UART: [state] Locking ICCM
18,240,778 UART: [exit] Launching FMC @ 0x40000130
18,249,448 UART:
18,249,690 UART: Running Caliptra FMC ...
18,250,789 UART:
18,250,942 UART: [state] CFI Enabled
18,305,948 UART: [fht] FMC Alias Private Key: 7
20,069,703 UART: [art] Extend RT PCRs Done
20,070,936 UART: [art] Lock RT PCRs Done
20,072,425 UART: [art] Populate DV Done
20,077,942 UART: [fht] FMC Alias Private Key: 7
20,079,531 UART: [art] Derive CDI
20,080,264 UART: [art] Store in in slot 0x4
20,138,689 UART: [art] Derive Key Pair
20,139,726 UART: [art] Store priv key in slot 0x5
22,602,598 UART: [art] Derive Key Pair - Done
22,615,592 UART: [art] Signing Cert with AUTHO
22,616,895 UART: RITY.KEYID = 7
24,328,267 UART: [art] Erasing AUTHORITY.KEYID = 7
24,329,761 UART: [art] PUB.X = 745C51B738A9CDE7ED0A01B098F16DE22409A91FE888A0384BCF194646875FA0382FC03CB5A10067D8794EE17B66AE4F
24,337,033 UART: [art] PUB.Y = 00CE60CA1BE68B219EF4E8AAC6AC99F2FFD550A1011980C2048538D1C38AA302538FA46B62D00834DFC0AFECA5A4561D
24,344,275 UART: [art] SIG.R = 7E2156DA0290D24ED985B62273E5F5788CA0B559383C8D7B6B70DFDAA9A6642D46D8DC0BD9C7D4E19BF7CC4441932EE9
24,351,664 UART: [art] SIG.S = 97055B67063FA8FB20E333F37C80A11AF89F0F1B888BBE355BBE52C423E8554169396B6704DC01969AFAE242D018E4BB
25,329,885 UART: mock_rt_interact::rt_entry...FMC Tester
25,446,489 UART: [rt] Runtime listening for mailbox commands...
25,450,766 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,437,640 ready_for_fw is high
3,438,132 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,894,354 >>> mbox cmd response: success
13,894,868 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,192,008 UART:
18,192,395 UART: Running Caliptra FMC ...
18,193,673 UART:
18,193,837 UART: [state] CFI Enabled
18,259,776 UART: [fht] FMC Alias Private Key: 7
20,023,931 UART: [art] Extend RT PCRs Done
20,025,157 UART: [art] Lock RT PCRs Done
20,026,894 UART: [art] Populate DV Done
20,032,248 UART: [fht] FMC Alias Private Key: 7
20,033,739 UART: [art] Derive CDI
20,034,519 UART: [art] Store in in slot 0x4
20,092,198 UART: [art] Derive Key Pair
20,093,244 UART: [art] Store priv key in slot 0x5
22,556,750 UART: [art] Derive Key Pair - Done
22,569,478 UART: [art] Signing Cert with AUTHO
22,570,781 UART: RITY.KEYID = 7
24,281,651 UART: [art] Erasing AUTHORITY.KEYID = 7
24,283,162 UART: [art] PUB.X = C6ABE019DE76E137B016CED975B98D7AE86E2FD097D265660C559D8E3AA572F03DE7D7DA7F09CE2503415702BA4548E8
24,290,415 UART: [art] PUB.Y = FD8038C974C01C4D813FFD281BF6D742EC1CFAEED84C82B3E0B34751B2085789A0DAA32D92088E1F1DD80D2373674E8D
24,297,714 UART: [art] SIG.R = C9CC0F7B582E8C6E441D3EEBC8AE6515A832238E19C1D9EDADB9EF397B4E8899C261375A70CCA08D05C82123ABEBC9EF
24,305,115 UART: [art] SIG.S = 1A218E3C30ACFD038F5196C54A9679BEDA560E43490427E78ED38BE8998118ED2D944677657D196F7D6051A7374A4275
25,283,366 UART: mock_rt_interact::rt_entry...FMC Tester
25,400,641 UART: [rt] Runtime listening for mailbox commands...
25,404,872 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,302 UART:
192,662 UART: Running Caliptra ROM ...
193,842 UART:
603,553 UART: [state] CFI Enabled
617,793 UART: [state] LifecycleState = Unprovisioned
620,158 UART: [state] DebugLocked = No
622,919 UART: [state] WD Timer not started. Device not locked for debugging
627,135 UART: [kat] SHA2-256
817,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,818 UART: [kat] ++
828,333 UART: [kat] sha1
838,277 UART: [kat] SHA2-256
841,282 UART: [kat] SHA2-384
847,635 UART: [kat] SHA2-512-ACC
850,213 UART: [kat] ECC-384
3,293,272 UART: [kat] HMAC-384Kdf
3,306,918 UART: [kat] LMS
3,838,786 UART: [kat] --
3,841,782 UART: [cold-reset] ++
3,842,710 UART: [fht] FHT @ 0x50003400
3,854,027 UART: [idev] ++
3,854,655 UART: [idev] CDI.KEYID = 6
3,855,600 UART: [idev] SUBJECT.KEYID = 7
3,856,838 UART: [idev] UDS.KEYID = 0
3,857,731 ready_for_fw is high
3,857,933 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,952,442 UART: [idev] Erasing UDS.KEYID = 0
6,336,417 UART: [idev] Sha1 KeyId Algorithm
6,359,643 UART: [idev] --
6,363,756 UART: [ldev] ++
6,364,432 UART: [ldev] CDI.KEYID = 6
6,365,305 UART: [ldev] SUBJECT.KEYID = 5
6,366,510 UART: [ldev] AUTHORITY.KEYID = 7
6,367,737 UART: [ldev] FE.KEYID = 1
6,378,187 UART: [ldev] Erasing FE.KEYID = 1
8,860,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,335 UART: [ldev] --
10,650,329 UART: [fwproc] Wait for Commands...
10,652,740 UART: [fwproc] Recv command 0x46574c44
10,655,046 UART: [fwproc] Recv'd Img size: 75136 bytes
13,619,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,696,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,813,034 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
14,120,564 >>> mbox cmd response: success
14,120,973 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,125,289 UART: [afmc] ++
14,125,978 UART: [afmc] CDI.KEYID = 6
14,127,213 UART: [afmc] SUBJECT.KEYID = 7
14,128,643 UART: [afmc] AUTHORITY.KEYID = 5
16,628,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,349,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,351,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,366,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,381,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,396,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,421,914 UART: [afmc] --
18,425,990 UART: [cold-reset] --
18,429,656 UART: [state] Locking Datavault
18,433,929 UART: [state] Locking PCR0, PCR1 and PCR31
18,436,111 UART: [state] Locking ICCM
18,437,611 UART: [exit] Launching FMC @ 0x40000130
18,446,275 UART:
18,446,508 UART: Running Caliptra FMC ...
18,447,606 UART:
18,447,758 UART: [state] CFI Enabled
18,455,881 UART: [fht] FMC Alias Private Key: 7
20,213,250 UART: [art] Extend RT PCRs Done
20,214,471 UART: [art] Lock RT PCRs Done
20,216,204 UART: [art] Populate DV Done
20,221,780 UART: [fht] FMC Alias Private Key: 7
20,223,515 UART: [art] Derive CDI
20,224,337 UART: [art] Store in in slot 0x4
20,266,502 UART: [art] Derive Key Pair
20,267,518 UART: [art] Store priv key in slot 0x5
22,694,261 UART: [art] Derive Key Pair - Done
22,707,419 UART: [art] Signing Cert with AUTHO
22,708,758 UART: RITY.KEYID = 7
24,414,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,156 UART: [art] PUB.X = 434CA181980F7BF8D317068C6D3B99AE4FBEE2BDABC053E364FD77F0C1A2D2725D9236F544965CE5A3241DF4887724BD
24,423,436 UART: [art] PUB.Y = 561022F2546D2511F40226BA3FB326A97254F0CBAFA7494C9DD861C70C7FDC4009C87B8A0ECE369B682B746A9BC657EC
24,430,666 UART: [art] SIG.R = 57345D7438B93853BE7D4845849426BFD93E4591EBB80DBFF918586E541F458CCF434B06B54C30381DF04CE0CB901E8E
24,438,055 UART: [art] SIG.S = 90BCAD6A16A4B1AADB7CEB8BB7F214BB23379C5198F7CC9CCE968F14B09DF4E9AA343F82734E319FEE493B902C67DC2D
25,416,720 UART: mock_rt_interact::rt_entry...FMC Tester
25,533,779 UART: [rt] Runtime listening for mailbox commands...
25,538,068 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,751,920 ready_for_fw is high
3,752,323 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
14,109,002 >>> mbox cmd response: success
14,109,488 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,363,845 UART:
18,364,634 UART: Running Caliptra FMC ...
18,365,815 UART:
18,366,087 UART: [state] CFI Enabled
18,373,545 UART: [fht] FMC Alias Private Key: 7
20,130,109 UART: [art] Extend RT PCRs Done
20,131,334 UART: [art] Lock RT PCRs Done
20,132,954 UART: [art] Populate DV Done
20,138,312 UART: [fht] FMC Alias Private Key: 7
20,139,914 UART: [art] Derive CDI
20,140,731 UART: [art] Store in in slot 0x4
20,183,022 UART: [art] Derive Key Pair
20,184,064 UART: [art] Store priv key in slot 0x5
22,611,266 UART: [art] Derive Key Pair - Done
22,624,696 UART: [art] Signing Cert with AUTHO
22,625,996 UART: RITY.KEYID = 7
24,331,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,333,250 UART: [art] PUB.X = 3404CAD687F43E22F2109F96742E330A9E3EAD72F07A87249E9EA44F1286506866E8E3C6353974ED95DDD944E9AC7DFA
24,340,514 UART: [art] PUB.Y = BC013733D45910E9076394985E09615347AC7D3E748DE55A5BA0F0EA880651CE4D16B0BF30776C7E065579E62A862A84
24,347,769 UART: [art] SIG.R = F2C231FA15B44C5A4C820D441CD71757523C7D8B8C58B1261BA9521AEFD9B93C4FD17F2F6D6A33298A38A3BB351789D1
24,355,120 UART: [art] SIG.S = C50C6EF69FAD60BDEDB97335983A962C8829EF4C614CA1C517DB1AF920FE72A4926283D40AAA7E07238592A52171D09A
25,333,945 UART: mock_rt_interact::rt_entry...FMC Tester
25,450,521 UART: [rt] Runtime listening for mailbox commands...
25,454,812 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,105 UART: [kat] SHA2-256
882,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,151 UART: [kat] ++
886,303 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
907,054 UART: [kat] LMS
1,475,250 UART: [kat] --
1,475,983 UART: [cold-reset] ++
1,476,451 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 ready_for_fw is high
1,480,567 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,580 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,112 UART: [idev] --
1,514,049 UART: [ldev] ++
1,514,217 UART: [ldev] CDI.KEYID = 6
1,514,580 UART: [ldev] SUBJECT.KEYID = 5
1,515,006 UART: [ldev] AUTHORITY.KEYID = 7
1,515,469 UART: [ldev] FE.KEYID = 1
1,520,983 UART: [ldev] Erasing FE.KEYID = 1
1,546,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,988 UART: [ldev] --
1,585,499 UART: [fwproc] Waiting for Commands...
1,586,262 UART: [fwproc] Received command 0x46574c44
1,587,053 UART: [fwproc] Received Image of size 75136 bytes
2,435,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,462,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,491,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 50452
2,568,823 >>> mbox cmd response: success
2,568,823 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,569,959 UART: [afmc] ++
2,570,127 UART: [afmc] CDI.KEYID = 6
2,570,489 UART: [afmc] SUBJECT.KEYID = 7
2,570,914 UART: [afmc] AUTHORITY.KEYID = 5
2,606,227 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,622,641 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,623,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,629,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,635,034 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,640,724 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,648,513 UART: [afmc] --
2,649,453 UART: [cold-reset] --
2,650,399 UART: [state] Locking Datavault
2,651,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,652,208 UART: [state] Locking ICCM
2,652,666 UART: [exit] Launching FMC @ 0x40000130
2,657,995 UART:
2,658,011 UART: Running Caliptra FMC ...
2,658,419 UART:
2,658,473 UART: [state] CFI Enabled
2,668,752 UART: [fht] FMC Alias Private Key: 7
2,776,555 UART: [art] Extend RT PCRs Done
2,776,983 UART: [art] Lock RT PCRs Done
2,778,353 UART: [art] Populate DV Done
2,786,702 UART: [fht] FMC Alias Private Key: 7
2,787,696 UART: [art] Derive CDI
2,787,976 UART: [art] Store in in slot 0x4
2,873,701 UART: [art] Derive Key Pair
2,874,061 UART: [art] Store priv key in slot 0x5
2,887,155 UART: [art] Derive Key Pair - Done
2,901,845 UART: [art] Signing Cert with AUTHO
2,902,325 UART: RITY.KEYID = 7
2,917,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,918,352 UART: [art] PUB.X = DCD04E22EE10374C43B50D82898FA10210FF89E51D5FF1956015B353DB53980582C122107D71D2FCE26C0B625B01EDFB
2,925,111 UART: [art] PUB.Y = 73AED52FFB1A46510B94296F92F0A86B874CCFCBB6C0D6EB0ED397D1EE4F129FF48B32979FBD7A52F4197C7780EC32AC
2,932,075 UART: [art] SIG.R = 4AACA1FA846A47DD72D0F42F03969196EBB67155834BBCC6D5A035CD79A34181F765993653D98D68C402AA7C8C213A5E
2,938,845 UART: [art] SIG.S = A461D7FC50B6719065A6161449D8024A2D9C28A9B914046B0CBD72C0F67FCA5652B5220AFD1046B017AE6973654BB53B
2,962,944 UART: mock_rt_interact::rt_entry...FMC Tester
3,070,670 UART: [rt] Runtime listening for mailbox commands...
3,074,060 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,275 ready_for_fw is high
1,362,275 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,419,613 >>> mbox cmd response: success
2,419,613 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,481,111 UART:
2,481,127 UART: Running Caliptra FMC ...
2,481,535 UART:
2,481,589 UART: [state] CFI Enabled
2,492,162 UART: [fht] FMC Alias Private Key: 7
2,600,529 UART: [art] Extend RT PCRs Done
2,600,957 UART: [art] Lock RT PCRs Done
2,602,303 UART: [art] Populate DV Done
2,610,192 UART: [fht] FMC Alias Private Key: 7
2,611,138 UART: [art] Derive CDI
2,611,418 UART: [art] Store in in slot 0x4
2,697,401 UART: [art] Derive Key Pair
2,697,761 UART: [art] Store priv key in slot 0x5
2,710,867 UART: [art] Derive Key Pair - Done
2,725,642 UART: [art] Signing Cert with AUTHO
2,726,122 UART: RITY.KEYID = 7
2,741,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,742,097 UART: [art] PUB.X = 29B8704F3C6873DD78F1A370BE42A08B61C2C48292DB0AEE6E747772FDEE8A20EAD072F9E62B53E9E95BF103D4FF976E
2,748,875 UART: [art] PUB.Y = 4BC77D470E063EEA1813F4ECF2F0197913542AECD21CA82F9A834130C5993847073066DA80BAB1F9717CF7BD47C0A86D
2,755,822 UART: [art] SIG.R = 3C7D8171094F0F8EC0DED15C1D26F6928B8B9717388BF7CB1524BCBECB759D67A56728C1E10711E34F017BF856793273
2,762,582 UART: [art] SIG.S = 766DE164B5946AAE4853CDFD636F68C3513B2603388898B14AA79F1977B7C4D0A847D83F322D6FC1D47B81C9F31B1D31
2,786,096 UART: mock_rt_interact::rt_entry...FMC Tester
2,893,311 UART: [rt] Runtime listening for mailbox commands...
2,896,701 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,388 UART: [kat] SHA2-256
892,326 UART: [kat] SHA2-384
895,019 UART: [kat] SHA2-512-ACC
896,920 UART: [kat] ECC-384
902,737 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,654 UART: [cold-reset] ++
1,477,232 UART: [fht] Storing FHT @ 0x50003400
1,479,917 UART: [idev] ++
1,480,085 UART: [idev] CDI.KEYID = 6
1,480,445 UART: [idev] SUBJECT.KEYID = 7
1,480,869 UART: [idev] UDS.KEYID = 0
1,481,214 ready_for_fw is high
1,481,214 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,489,095 UART: [idev] Erasing UDS.KEYID = 0
1,505,781 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,426 UART: [ldev] ++
1,515,594 UART: [ldev] CDI.KEYID = 6
1,515,957 UART: [ldev] SUBJECT.KEYID = 5
1,516,383 UART: [ldev] AUTHORITY.KEYID = 7
1,516,846 UART: [ldev] FE.KEYID = 1
1,521,918 UART: [ldev] Erasing FE.KEYID = 1
1,546,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,157 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,385 UART: [fwproc] Received command 0x46574c44
1,588,176 UART: [fwproc] Received Image of size 75136 bytes
2,437,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,464,841 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,494,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 50452
2,571,182 >>> mbox cmd response: success
2,571,182 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,572,412 UART: [afmc] ++
2,572,580 UART: [afmc] CDI.KEYID = 6
2,572,942 UART: [afmc] SUBJECT.KEYID = 7
2,573,367 UART: [afmc] AUTHORITY.KEYID = 5
2,608,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,624,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,625,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,631,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,637,127 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,642,817 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,650,826 UART: [afmc] --
2,651,916 UART: [cold-reset] --
2,652,628 UART: [state] Locking Datavault
2,653,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,654,343 UART: [state] Locking ICCM
2,654,909 UART: [exit] Launching FMC @ 0x40000130
2,660,238 UART:
2,660,254 UART: Running Caliptra FMC ...
2,660,662 UART:
2,660,805 UART: [state] CFI Enabled
2,671,500 UART: [fht] FMC Alias Private Key: 7
2,779,833 UART: [art] Extend RT PCRs Done
2,780,261 UART: [art] Lock RT PCRs Done
2,781,929 UART: [art] Populate DV Done
2,790,196 UART: [fht] FMC Alias Private Key: 7
2,791,136 UART: [art] Derive CDI
2,791,416 UART: [art] Store in in slot 0x4
2,877,053 UART: [art] Derive Key Pair
2,877,413 UART: [art] Store priv key in slot 0x5
2,890,517 UART: [art] Derive Key Pair - Done
2,905,122 UART: [art] Signing Cert with AUTHO
2,905,602 UART: RITY.KEYID = 7
2,920,692 UART: [art] Erasing AUTHORITY.KEYID = 7
2,921,457 UART: [art] PUB.X = 8ED55356008D21392A6CC4242C95A75DD72D5C3B0C15579BAA689AE0092F8B2F38A6388107CF360F61BBD6BF2B8320BA
2,928,199 UART: [art] PUB.Y = 1879DAE802AA7BF107144E641692065CC07F4A5A356E5802B2EC996263157A842A06744EDF23F1628DD2EEAE4FBF2D1A
2,935,140 UART: [art] SIG.R = FADDA462025CABCA8278693191E81772018FD615EC5B644F686B61945D1FE6195F59492B81993859FD0AB3601DAD991E
2,941,901 UART: [art] SIG.S = 1CF4301CA0F7523CB8DEDD5FADE5584192E02E7E70CB1B4E0B9CEC668AAB9BA23BB26C2D1F2C7C5059EE9DE6CFC0BE56
2,965,779 UART: mock_rt_interact::rt_entry...FMC Tester
3,074,137 UART: [rt] Runtime listening for mailbox commands...
3,077,527 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,174 ready_for_fw is high
1,363,174 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,421,408 >>> mbox cmd response: success
2,421,408 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,482,474 UART:
2,482,490 UART: Running Caliptra FMC ...
2,482,898 UART:
2,483,041 UART: [state] CFI Enabled
2,493,524 UART: [fht] FMC Alias Private Key: 7
2,601,627 UART: [art] Extend RT PCRs Done
2,602,055 UART: [art] Lock RT PCRs Done
2,603,583 UART: [art] Populate DV Done
2,611,824 UART: [fht] FMC Alias Private Key: 7
2,612,826 UART: [art] Derive CDI
2,613,106 UART: [art] Store in in slot 0x4
2,698,703 UART: [art] Derive Key Pair
2,699,063 UART: [art] Store priv key in slot 0x5
2,712,485 UART: [art] Derive Key Pair - Done
2,727,136 UART: [art] Signing Cert with AUTHO
2,727,616 UART: RITY.KEYID = 7
2,742,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,743,733 UART: [art] PUB.X = 79A9C4C59492EF48970E225B74DF7CBC2430C874C46C5E6AB18D9282717102A17872883DA351A7A921651AC194CD942E
2,750,493 UART: [art] PUB.Y = 4AEA40881D4019F8D90B6C175157EDF14C6180BF12A80E6B3425B6DE00413A27575141F76EA4FDB16B1607E016388082
2,757,408 UART: [art] SIG.R = 4781A2C9BED61D06AE2E4380410848764BB370F45284040075991630D1CEFA414117BAB73F25E94B21F31B9B32E0667D
2,764,141 UART: [art] SIG.S = FDC020575A7653536F49A0D6B7C1AB5D0A341EADC20775E2D32F3F60F8D8ABA4CD31F0C4501A8BD4EBD89CDD416E1AA3
2,788,042 UART: mock_rt_interact::rt_entry...FMC Tester
2,896,240 UART: [rt] Runtime listening for mailbox commands...
2,899,630 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
893,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,711 UART: [kat] ++
897,863 UART: [kat] sha1
902,311 UART: [kat] SHA2-256
904,251 UART: [kat] SHA2-384
906,886 UART: [kat] SHA2-512-ACC
908,787 UART: [kat] ECC-384
918,576 UART: [kat] HMAC-384Kdf
923,348 UART: [kat] LMS
1,171,676 UART: [kat] --
1,172,491 UART: [cold-reset] ++
1,173,005 UART: [fht] FHT @ 0x50003400
1,175,802 UART: [idev] ++
1,175,970 UART: [idev] CDI.KEYID = 6
1,176,330 UART: [idev] SUBJECT.KEYID = 7
1,176,754 UART: [idev] UDS.KEYID = 0
1,177,099 ready_for_fw is high
1,177,099 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,184,800 UART: [idev] Erasing UDS.KEYID = 0
1,201,359 UART: [idev] Sha1 KeyId Algorithm
1,209,691 UART: [idev] --
1,210,721 UART: [ldev] ++
1,210,889 UART: [ldev] CDI.KEYID = 6
1,211,252 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,899 UART: [ldev] --
1,283,286 UART: [fwproc] Wait for Commands...
1,283,992 UART: [fwproc] Recv command 0x46574c44
1,284,720 UART: [fwproc] Recv'd Img size: 75136 bytes
2,133,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,190,651 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,267,558 >>> mbox cmd response: success
2,267,558 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,268,694 UART: [afmc] ++
2,268,862 UART: [afmc] CDI.KEYID = 6
2,269,224 UART: [afmc] SUBJECT.KEYID = 7
2,269,649 UART: [afmc] AUTHORITY.KEYID = 5
2,304,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,881 UART: [afmc] --
2,347,967 UART: [cold-reset] --
2,348,965 UART: [state] Locking Datavault
2,350,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,958 UART: [state] Locking ICCM
2,351,620 UART: [exit] Launching FMC @ 0x40000130
2,356,949 UART:
2,356,965 UART: Running Caliptra FMC ...
2,357,373 UART:
2,357,427 UART: [state] CFI Enabled
2,367,524 UART: [fht] FMC Alias Private Key: 7
2,475,019 UART: [art] Extend RT PCRs Done
2,475,447 UART: [art] Lock RT PCRs Done
2,477,035 UART: [art] Populate DV Done
2,485,184 UART: [fht] FMC Alias Private Key: 7
2,486,158 UART: [art] Derive CDI
2,486,438 UART: [art] Store in in slot 0x4
2,571,985 UART: [art] Derive Key Pair
2,572,345 UART: [art] Store priv key in slot 0x5
2,584,867 UART: [art] Derive Key Pair - Done
2,599,800 UART: [art] Signing Cert with AUTHO
2,600,280 UART: RITY.KEYID = 7
2,615,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,616,353 UART: [art] PUB.X = A3CA1606A04591C844EB5801611503FC652F45A55B93FB9542CB7CEEC7F6F3839469BEFDF2294388D9CB406E6348281C
2,623,116 UART: [art] PUB.Y = FB0059D78367B38910FF4B72935C642AA149E1C1362DA210335E0FF5AD56446B57AB1A99272F4FCE6F852631D63E8109
2,630,036 UART: [art] SIG.R = CD39C6D95AC77938D17C0E1E6D259E590F1D8B251FE23C0289ECEDBE2D5577EA6B3CC82EAE9DF69A39516446B9FEF2C5
2,636,817 UART: [art] SIG.S = CBEF808D3486C889881B0E59F74CFA712ACF8D6C26F9AFB5B46BFEA7DC9544758DF305A3AE1C3AAE402BFBCBA9306784
2,660,736 UART: mock_rt_interact::rt_entry...FMC Tester
2,768,193 UART: [rt] Runtime listening for mailbox commands...
2,771,583 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,943 ready_for_fw is high
1,060,943 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,120,855 >>> mbox cmd response: success
2,120,855 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,182,701 UART:
2,182,717 UART: Running Caliptra FMC ...
2,183,125 UART:
2,183,179 UART: [state] CFI Enabled
2,193,424 UART: [fht] FMC Alias Private Key: 7
2,301,489 UART: [art] Extend RT PCRs Done
2,301,917 UART: [art] Lock RT PCRs Done
2,303,499 UART: [art] Populate DV Done
2,311,928 UART: [fht] FMC Alias Private Key: 7
2,312,880 UART: [art] Derive CDI
2,313,160 UART: [art] Store in in slot 0x4
2,399,037 UART: [art] Derive Key Pair
2,399,397 UART: [art] Store priv key in slot 0x5
2,412,309 UART: [art] Derive Key Pair - Done
2,427,043 UART: [art] Signing Cert with AUTHO
2,427,523 UART: RITY.KEYID = 7
2,442,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,608 UART: [art] PUB.X = 5806513EBA2D3D67F93759B6CFEA6C2BDAD93037930ED109637D24EB7183EB4281A9D78200D1C3183AEF87900393377A
2,450,344 UART: [art] PUB.Y = 5FEB44BB7BD9FA897582C4F77EA49DF49DB00965F6530A9C562FDF7F93A94F1C5CDD254EB9CF535D1FA574A997A5BD8B
2,457,310 UART: [art] SIG.R = 6FC9B75931197B6E4032C04449BBF25C1C1BD4AC0E9CB3F2360DD33917C9C0F00603706EE853D719B46165603DBC2A29
2,464,070 UART: [art] SIG.S = 6B8DE626DD76DC22C8D9BA8D381D8CEA5D24604E75B5D4DB5D1AB35AB771F0272803DC7FA6316EFFD2D2510040D00618
2,487,575 UART: mock_rt_interact::rt_entry...FMC Tester
2,595,151 UART: [rt] Runtime listening for mailbox commands...
2,598,541 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
893,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,792 UART: [kat] ++
897,944 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,119 UART: [kat] SHA2-512-ACC
909,020 UART: [kat] ECC-384
919,095 UART: [kat] HMAC-384Kdf
923,645 UART: [kat] LMS
1,171,973 UART: [kat] --
1,172,968 UART: [cold-reset] ++
1,173,546 UART: [fht] FHT @ 0x50003400
1,176,281 UART: [idev] ++
1,176,449 UART: [idev] CDI.KEYID = 6
1,176,809 UART: [idev] SUBJECT.KEYID = 7
1,177,233 UART: [idev] UDS.KEYID = 0
1,177,578 ready_for_fw is high
1,177,578 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,184,967 UART: [idev] Erasing UDS.KEYID = 0
1,201,712 UART: [idev] Sha1 KeyId Algorithm
1,210,326 UART: [idev] --
1,211,306 UART: [ldev] ++
1,211,474 UART: [ldev] CDI.KEYID = 6
1,211,837 UART: [ldev] SUBJECT.KEYID = 5
1,212,263 UART: [ldev] AUTHORITY.KEYID = 7
1,212,726 UART: [ldev] FE.KEYID = 1
1,217,966 UART: [ldev] Erasing FE.KEYID = 1
1,244,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,662 UART: [ldev] --
1,284,147 UART: [fwproc] Wait for Commands...
1,284,933 UART: [fwproc] Recv command 0x46574c44
1,285,661 UART: [fwproc] Recv'd Img size: 75136 bytes
2,134,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,162,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,688 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,268,783 >>> mbox cmd response: success
2,268,783 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,923 UART: [afmc] ++
2,270,091 UART: [afmc] CDI.KEYID = 6
2,270,453 UART: [afmc] SUBJECT.KEYID = 7
2,270,878 UART: [afmc] AUTHORITY.KEYID = 5
2,306,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,844 UART: [afmc] --
2,349,796 UART: [cold-reset] --
2,350,540 UART: [state] Locking Datavault
2,351,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,267 UART: [state] Locking ICCM
2,352,799 UART: [exit] Launching FMC @ 0x40000130
2,358,128 UART:
2,358,144 UART: Running Caliptra FMC ...
2,358,552 UART:
2,358,695 UART: [state] CFI Enabled
2,368,994 UART: [fht] FMC Alias Private Key: 7
2,477,011 UART: [art] Extend RT PCRs Done
2,477,439 UART: [art] Lock RT PCRs Done
2,479,231 UART: [art] Populate DV Done
2,487,322 UART: [fht] FMC Alias Private Key: 7
2,488,394 UART: [art] Derive CDI
2,488,674 UART: [art] Store in in slot 0x4
2,574,005 UART: [art] Derive Key Pair
2,574,365 UART: [art] Store priv key in slot 0x5
2,587,827 UART: [art] Derive Key Pair - Done
2,602,350 UART: [art] Signing Cert with AUTHO
2,602,830 UART: RITY.KEYID = 7
2,617,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,618,283 UART: [art] PUB.X = 161FB89D5AF8DAE2F78F9F97DF42879BC14B3CBE003B568B5C6A7387AAD85B3677012FDCFE4434DDDD612346335FB70E
2,625,041 UART: [art] PUB.Y = 70ADF4926F95AE89C761D58B0D00A98C666B49203C9737675D7B0A708095C401B2D2F3993FBA4B610BC713F8A910BFB9
2,631,959 UART: [art] SIG.R = BD2F4E57D546CAFF936E54E91212BA97A9F4360FAF833D191ECB81223AE425259F0C0CB7DCDF5DE62FFE49BDDCEC9A47
2,638,746 UART: [art] SIG.S = EFD5BCC681D3EEA1179191DD2B05AA8FD765020052392526A87667C4442CA70E4B6CF26CDA42E62B143807EB9D3AF261
2,662,219 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,642 UART: [rt] Runtime listening for mailbox commands...
2,773,032 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,119,078 >>> mbox cmd response: success
2,119,078 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,860 UART:
2,181,876 UART: Running Caliptra FMC ...
2,182,284 UART:
2,182,427 UART: [state] CFI Enabled
2,193,278 UART: [fht] FMC Alias Private Key: 7
2,301,539 UART: [art] Extend RT PCRs Done
2,301,967 UART: [art] Lock RT PCRs Done
2,303,633 UART: [art] Populate DV Done
2,311,710 UART: [fht] FMC Alias Private Key: 7
2,312,878 UART: [art] Derive CDI
2,313,158 UART: [art] Store in in slot 0x4
2,398,913 UART: [art] Derive Key Pair
2,399,273 UART: [art] Store priv key in slot 0x5
2,412,361 UART: [art] Derive Key Pair - Done
2,427,120 UART: [art] Signing Cert with AUTHO
2,427,600 UART: RITY.KEYID = 7
2,442,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,755 UART: [art] PUB.X = 6027883EF81C5BCE52284FAB36F72EAD3C87F4AA829B3EB98957A00784CE1668E7640ED1CBAC46776168EFE15596AC14
2,450,527 UART: [art] PUB.Y = 587FA4F5D5E9A875E761B57BB0CA9405C8A5E35AF0F65D77C30AC8A441DF0DBBBD62115824B4FC4303AA80D80F1189A8
2,457,476 UART: [art] SIG.R = 08EE8BC0CFA2980F16448CB52F5F23A66C637D1E687DC52983FC657B898FC687D15535824673FE19A03C32D741D3D588
2,464,240 UART: [art] SIG.S = D675B1B98F33DFDAC7C42CC1FA8F9B6499E927867ACA05A8D186D8F221ED938716D695A6ACB1C95581CF8BAA0C3698EB
2,488,039 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,901 UART: [rt] Runtime listening for mailbox commands...
2,598,291 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,174,043 ready_for_fw is high
1,174,043 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,465 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,194 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,327 UART: [fwproc] Recv command 0x46574c44
1,282,060 UART: [fwproc] Recv'd Img size: 75136 bytes
2,130,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,157,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,187,276 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,264,348 >>> mbox cmd response: success
2,264,348 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,265,473 UART: [afmc] ++
2,265,641 UART: [afmc] CDI.KEYID = 6
2,266,004 UART: [afmc] SUBJECT.KEYID = 7
2,266,430 UART: [afmc] AUTHORITY.KEYID = 5
2,302,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,318,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,319,720 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,325,449 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,331,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,344,858 UART: [afmc] --
2,345,838 UART: [cold-reset] --
2,346,612 UART: [state] Locking Datavault
2,347,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,348,329 UART: [state] Locking ICCM
2,348,963 UART: [exit] Launching FMC @ 0x40000130
2,354,292 UART:
2,354,308 UART: Running Caliptra FMC ...
2,354,716 UART:
2,354,770 UART: [state] CFI Enabled
2,365,309 UART: [fht] FMC Alias Private Key: 7
2,473,774 UART: [art] Extend RT PCRs Done
2,474,202 UART: [art] Lock RT PCRs Done
2,475,712 UART: [art] Populate DV Done
2,483,849 UART: [fht] FMC Alias Private Key: 7
2,484,867 UART: [art] Derive CDI
2,485,147 UART: [art] Store in in slot 0x4
2,571,350 UART: [art] Derive Key Pair
2,571,710 UART: [art] Store priv key in slot 0x5
2,584,844 UART: [art] Derive Key Pair - Done
2,599,614 UART: [art] Signing Cert with AUTHO
2,600,094 UART: RITY.KEYID = 7
2,615,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,616,019 UART: [art] PUB.X = 189557B6311DB45A384341BF8A49C1496E0DE2A5DBAFEB612CCCB9290DF236045716B162E02A3B12E2F8671C3CD9B1EF
2,622,790 UART: [art] PUB.Y = 6BA3E1CCB39324FA91911A002F802A81BBAFF71B147DE55E3EDA695396ABED9DCDE0B204F976993D3AC4FD4EAA55E81B
2,629,739 UART: [art] SIG.R = 7C581B4B49A178E05855EED203C6720AB4D2CF5F78FA0D335AD4320CB2B8E9B54D525F692F85DD488602D37E369628B4
2,636,498 UART: [art] SIG.S = F80A43F41FEF2FE595D8B2480F2FDEDF6C3D82F03ED422A4CDF5CCD387A4587977FE4826188543212489CCB7318E5DD0
2,660,399 UART: mock_rt_interact::rt_entry...FMC Tester
2,768,237 UART: [rt] Runtime listening for mailbox commands...
2,771,627 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,198 ready_for_fw is high
1,056,198 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,114,708 >>> mbox cmd response: success
2,114,708 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,177,052 UART:
2,177,068 UART: Running Caliptra FMC ...
2,177,476 UART:
2,177,530 UART: [state] CFI Enabled
2,188,111 UART: [fht] FMC Alias Private Key: 7
2,295,452 UART: [art] Extend RT PCRs Done
2,295,880 UART: [art] Lock RT PCRs Done
2,297,358 UART: [art] Populate DV Done
2,305,515 UART: [fht] FMC Alias Private Key: 7
2,306,477 UART: [art] Derive CDI
2,306,757 UART: [art] Store in in slot 0x4
2,392,258 UART: [art] Derive Key Pair
2,392,618 UART: [art] Store priv key in slot 0x5
2,406,006 UART: [art] Derive Key Pair - Done
2,420,763 UART: [art] Signing Cert with AUTHO
2,421,243 UART: RITY.KEYID = 7
2,436,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,437,084 UART: [art] PUB.X = AFF892D14806E7FBCE0022DBFC88ADF6D1DD3C5E155923E2C668E84A9F4FD079D8EBA47EFFA4C7CDA0550CD369DE93DA
2,443,856 UART: [art] PUB.Y = E7BF6391450EB5A941CD8B67EE57EC57471AECFA4F8C546319E3CB3FA8D87C93BF94F6E8F714DF2BBF2CCB619FEFF000
2,450,807 UART: [art] SIG.R = 7EB3231E86E197E001EA040B2F22D4FF7813C0044CDAB01FFEA18022C5C3DD5B4A0FF51BB788D1E71F4E6548DBE52706
2,457,573 UART: [art] SIG.S = 79A3DF86310E0061B302F2B0D098A74B76539D7CC74650E51181E5485799EB8FD39C54C6BE31999196A0B50D31787180
2,481,147 UART: mock_rt_interact::rt_entry...FMC Tester
2,587,583 UART: [rt] Runtime listening for mailbox commands...
2,590,973 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 ready_for_fw is high
1,174,508 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,216,035 UART: [ldev] Erasing FE.KEYID = 1
1,242,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,317 UART: [fwproc] Wait for Commands...
1,283,056 UART: [fwproc] Recv command 0x46574c44
1,283,789 UART: [fwproc] Recv'd Img size: 75136 bytes
2,132,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,188,989 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,266,141 >>> mbox cmd response: success
2,266,141 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,176 UART: [afmc] ++
2,267,344 UART: [afmc] CDI.KEYID = 6
2,267,707 UART: [afmc] SUBJECT.KEYID = 7
2,268,133 UART: [afmc] AUTHORITY.KEYID = 5
2,303,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,319,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,320,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,326,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,332,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,345,867 UART: [afmc] --
2,346,939 UART: [cold-reset] --
2,347,919 UART: [state] Locking Datavault
2,349,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,349,834 UART: [state] Locking ICCM
2,350,290 UART: [exit] Launching FMC @ 0x40000130
2,355,619 UART:
2,355,635 UART: Running Caliptra FMC ...
2,356,043 UART:
2,356,186 UART: [state] CFI Enabled
2,366,707 UART: [fht] FMC Alias Private Key: 7
2,474,188 UART: [art] Extend RT PCRs Done
2,474,616 UART: [art] Lock RT PCRs Done
2,476,264 UART: [art] Populate DV Done
2,484,417 UART: [fht] FMC Alias Private Key: 7
2,485,409 UART: [art] Derive CDI
2,485,689 UART: [art] Store in in slot 0x4
2,570,906 UART: [art] Derive Key Pair
2,571,266 UART: [art] Store priv key in slot 0x5
2,584,212 UART: [art] Derive Key Pair - Done
2,598,918 UART: [art] Signing Cert with AUTHO
2,599,398 UART: RITY.KEYID = 7
2,614,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,615,717 UART: [art] PUB.X = 6B44DDC45FEBCE244E57DAAB712F07E067975DB43C9E66B70F9289F292F98207F43F94AAFA7DA3DB60BA3471595C8229
2,622,490 UART: [art] PUB.Y = 6547F953602C34C0966B4B71E8D08F196525E99D6CD5E6D71BD09EC2031DDA3053C17048BCE44B2F74939ADBC886AD14
2,629,441 UART: [art] SIG.R = 8000154011FB1785CC461FCD5F5313B250660DC93EA4F55E6BCFB89FAEB9C67E0E9E67EB41D55AB6817FEA6B93090B35
2,636,189 UART: [art] SIG.S = 96BEFFC8B5698D90FB7B729ACF5C817ABD9CFE0765CD1C9366BCE314EDF2960003BDC3AFF81B2282827008EB7E1225C6
2,660,051 UART: mock_rt_interact::rt_entry...FMC Tester
2,768,314 UART: [rt] Runtime listening for mailbox commands...
2,771,704 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,903 ready_for_fw is high
1,055,903 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,114,915 >>> mbox cmd response: success
2,114,915 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,177,841 UART:
2,177,857 UART: Running Caliptra FMC ...
2,178,265 UART:
2,178,408 UART: [state] CFI Enabled
2,188,801 UART: [fht] FMC Alias Private Key: 7
2,296,444 UART: [art] Extend RT PCRs Done
2,296,872 UART: [art] Lock RT PCRs Done
2,298,706 UART: [art] Populate DV Done
2,306,771 UART: [fht] FMC Alias Private Key: 7
2,307,883 UART: [art] Derive CDI
2,308,163 UART: [art] Store in in slot 0x4
2,393,562 UART: [art] Derive Key Pair
2,393,922 UART: [art] Store priv key in slot 0x5
2,407,442 UART: [art] Derive Key Pair - Done
2,422,125 UART: [art] Signing Cert with AUTHO
2,422,605 UART: RITY.KEYID = 7
2,437,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,438,586 UART: [art] PUB.X = 007BB5A9794B7492B505838E6693C9E57B0050B1096C718411F266A76F29753283B3944179A8CF21EAFDC75E11911036
2,445,292 UART: [art] PUB.Y = 3FC26792508AF58C3DAD0BD910412F236768F3B9C956D87021152D0F1E412DD1AD7CBC940477A345AA26DDC9894A74F1
2,452,237 UART: [art] SIG.R = 82EFF692C0227A8A1C6C858F0B7CC86A64BA019711905E2E0629E28FAF4BEDA5B3ED2CF9D8368E9F4E57F6064B629FD7
2,459,009 UART: [art] SIG.S = 0550BECF951F8C9ED6F5A0192408A968BB8EF560B409F5A5A477395E9C2307C13035B555372FA1E11CA5B75AED2BFCE0
2,482,566 UART: mock_rt_interact::rt_entry...FMC Tester
2,589,524 UART: [rt] Runtime listening for mailbox commands...
2,592,914 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,046 UART:
192,415 UART: Running Caliptra ROM ...
193,590 UART:
193,738 UART: [state] CFI Enabled
259,983 UART: [state] LifecycleState = Unprovisioned
261,897 UART: [state] DebugLocked = No
264,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,929 UART: [kat] SHA2-256
438,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,131 UART: [kat] ++
449,604 UART: [kat] sha1
460,115 UART: [kat] SHA2-256
462,785 UART: [kat] SHA2-384
468,840 UART: [kat] SHA2-512-ACC
471,316 UART: [kat] ECC-384
2,768,048 UART: [kat] HMAC-384Kdf
2,799,536 UART: [kat] LMS
3,989,811 UART: [kat] --
3,992,622 UART: [cold-reset] ++
3,995,149 UART: [fht] Storing FHT @ 0x50003400
4,005,916 UART: [idev] ++
4,006,485 UART: [idev] CDI.KEYID = 6
4,007,441 UART: [idev] SUBJECT.KEYID = 7
4,008,685 UART: [idev] UDS.KEYID = 0
4,009,641 ready_for_fw is high
4,009,854 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
4,104,666 UART: [idev] Erasing UDS.KEYID = 0
7,343,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,086 UART: [idev] --
7,370,085 UART: [ldev] ++
7,370,719 UART: [ldev] CDI.KEYID = 6
7,371,627 UART: [ldev] SUBJECT.KEYID = 5
7,372,835 UART: [ldev] AUTHORITY.KEYID = 7
7,374,112 UART: [ldev] FE.KEYID = 1
7,420,507 UART: [ldev] Erasing FE.KEYID = 1
10,756,453 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,573 UART: [ldev] --
13,135,012 UART: [fwproc] Waiting for Commands...
13,137,483 UART: [fwproc] Received command 0x46574c44
13,139,712 UART: [fwproc] Received Image of size 75172 bytes
16,724,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,805,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,874,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 50468
17,055,129 >>> mbox cmd response: success
17,055,580 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,059,209 UART: [afmc] ++
17,059,794 UART: [afmc] CDI.KEYID = 6
17,060,701 UART: [afmc] SUBJECT.KEYID = 7
17,061,968 UART: [afmc] AUTHORITY.KEYID = 5
20,427,102 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,729,071 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,731,382 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,745,730 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,760,570 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,775,030 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,796,313 UART: [afmc] --
22,800,399 UART: [cold-reset] --
22,805,185 UART: [state] Locking Datavault
22,811,399 UART: [state] Locking PCR0, PCR1 and PCR31
22,813,148 UART: [state] Locking ICCM
22,814,263 UART: [exit] Launching FMC @ 0x40000130
22,822,656 UART:
22,822,886 UART: Running Caliptra FMC ...
22,823,982 UART:
22,824,132 UART: [state] CFI Enabled
22,886,449 UART: [fht] FMC Alias Private Key: 7
25,225,044 UART: [art] Extend RT PCRs Done
25,226,266 UART: [art] Lock RT PCRs Done
25,227,786 UART: [art] Populate DV Done
25,233,195 UART: [fht] FMC Alias Private Key: 7
25,234,832 UART: [art] Derive CDI
25,235,641 UART: [art] Store in in slot 0x4
25,294,613 UART: [art] Derive Key Pair
25,295,653 UART: [art] Store priv key in slot 0x5
28,588,536 UART: [art] Derive Key Pair - Done
28,601,531 UART: [art] Signing Cert with AUTHO
28,602,838 UART: RITY.KEYID = 7
30,890,377 UART: [art] Erasing AUTHORITY.KEYID = 7
30,891,879 UART: [art] PUB.X = 48CF4438798CF272B02F0CADF3FE89C2EA190A8DD1B52DCDF800789C2A9B982BB35555F4CD4C96F4B550BFD61B15DC37
30,899,184 UART: [art] PUB.Y = 12063362F5C5A469D7781FD8946958315A419A5325A5848883F11BF36D6B14C7DB96CBB30BAE4C3EEB119952F752A8B3
30,906,424 UART: [art] SIG.R = D09AC10EFCB6C6646734C1779E62D8EA11DCFABA14AD1C849525336E4A7F3DE6E93EEA6AE2D8AD69C5DC6BF1CFC41CB7
30,913,822 UART: [art] SIG.S = A03741DC5557A8CEBDF0F1AC999CA192A131A0F9BAA7648D8F5BDF01C3EB578F818E59DA9B5611BB5119CDA0ED6B3368
32,219,012 UART: mock_rt_interact::rt_entry...FMC Tester
32,336,986 UART: [rt] Runtime listening for mailbox commands...
32,341,268 >>> mbox cmd response data (2048 bytes)
32,350,995 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,352,651 >>> mbox cmd response data (336 bytes)
32,356,527 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,372,409 >>> mbox cmd response data (1536 bytes)
34,428,501 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
34,523,979 UART:
34,524,337 UART: Running Caliptra ROM ...
34,525,469 UART:
34,525,634 UART: [state] CFI Enabled
34,600,404 UART: [state] LifecycleState = Unprovisioned
34,602,336 UART: [state] DebugLocked = No
34,603,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,608,061 UART: [kat] SHA2-256
34,777,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,788,210 UART: [kat] ++
34,788,727 UART: [kat] sha1
34,800,200 UART: [kat] SHA2-256
34,802,907 UART: [kat] SHA2-384
34,808,472 UART: [kat] SHA2-512-ACC
34,810,881 UART: [kat] ECC-384
37,101,291 UART: [kat] HMAC-384Kdf
37,113,554 UART: [kat] LMS
38,303,859 UART: [kat] --
38,309,048 UART: [update-reset] ++
41,971,390 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,975,971 UART: [update-reset] Loading Runtime at address 0x40005000 len 50468
42,221,909 >>> mbox cmd response: success
42,222,698 UART: [update-reset] Copying MAN_2 To MAN_1
42,245,156 UART: [update-reset Success] --
42,248,290 UART: [state] Locking Datavault
42,251,004 UART: [state] Locking PCR0, PCR1 and PCR31
42,252,779 UART: [state] Locking ICCM
42,255,223 UART: [exit] Launching FMC @ 0x40000130
42,263,664 UART:
42,263,893 UART: Running Caliptra FMC ...
42,264,911 UART:
42,265,049 UART: [state] CFI Enabled
42,351,577 UART: [art] Extend RT PCRs Done
42,352,767 UART: [art] Lock RT PCRs Done
42,354,296 UART: [art] Populate DV Done
42,359,963 UART: [fht] FMC Alias Private Key: 7
42,361,610 UART: [art] Derive CDI
42,362,815 UART: [art] Store in in slot 0x4
42,420,425 UART: [art] Derive Key Pair
42,421,458 UART: [art] Store priv key in slot 0x5
45,714,180 UART: [art] Derive Key Pair - Done
45,727,664 UART: [art] Signing Cert with AUTHO
45,728,976 UART: RITY.KEYID = 7
48,015,498 UART: [art] Erasing AUTHORITY.KEYID = 7
48,017,008 UART: [art] PUB.X = C5A5DC83966D19C3D85E7D709A95E9F809F6E5D53C6864031DA65E3437E9C0AE0228A7B0F8DA06209F2376CE61793AE8
48,024,300 UART: [art] PUB.Y = F4136DB4B9BD8550705A3DC6754873916F6F710FFE217ACA156D09DC00A2E87F98359A401834CC025293795C5ADD664F
48,031,500 UART: [art] SIG.R = 349CEE100B06723E6E98884A98CDBC35E521D5629C0EF5D941C5010DF04734D7B4302098F48739BD10E14FCF2A874D92
48,038,863 UART: [art] SIG.S = 3C794B1954916CFB6D1D1009ED49090C8D2F93FA0B80515E9FC9E4B2FF6EB4AF58966B59E51E7E2BB6FA7A3791BBAD25
49,342,851 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,344,097 UART: mock_rt_interact::rt_entry...FMC Tester
49,629,064 UART: [rt] Runtime listening for mailbox commands...
49,632,047 >>> mbox cmd response data (336 bytes)
49,635,761 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,651,570 >>> mbox cmd response data (1536 bytes)
49,658,867 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,659,262 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,807,454 ready_for_fw is high
3,807,906 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
17,082,193 >>> mbox cmd response: success
17,082,853 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,780,141 UART:
22,780,563 UART: Running Caliptra FMC ...
22,781,760 UART:
22,781,913 UART: [state] CFI Enabled
22,850,464 UART: [fht] FMC Alias Private Key: 7
25,188,227 UART: [art] Extend RT PCRs Done
25,189,453 UART: [art] Lock RT PCRs Done
25,191,263 UART: [art] Populate DV Done
25,196,842 UART: [fht] FMC Alias Private Key: 7
25,198,486 UART: [art] Derive CDI
25,199,297 UART: [art] Store in in slot 0x4
25,259,785 UART: [art] Derive Key Pair
25,260,828 UART: [art] Store priv key in slot 0x5
28,553,414 UART: [art] Derive Key Pair - Done
28,566,664 UART: [art] Signing Cert with AUTHO
28,567,981 UART: RITY.KEYID = 7
30,855,512 UART: [art] Erasing AUTHORITY.KEYID = 7
30,857,026 UART: [art] PUB.X = 6A57CDA54FDAC8DB6A094449BB72E3979D385D1E514A16234A7C066BD17087724D4AF5CF58D055C56F64ABCD14320E61
30,864,259 UART: [art] PUB.Y = 7A2D776916E82E7E459DF608BDA5D5614652AF2914AFD275C4252785802B08C5459A83144D4C4B116C81E2BA41EDF329
30,871,487 UART: [art] SIG.R = AB28DA0057F354FE160557494F19D6DC2FD5034B54314F5F031B2A5298F98D8F110EC44F75199BF1E23D0AEAABF1CA63
30,878,887 UART: [art] SIG.S = BE01F6A3A7F65422D42DB4F094FE91A2A7EE4AB80DCB935CB6A2A13FC4B114760470903354F35C379AB512E67B5C70B1
32,183,548 UART: mock_rt_interact::rt_entry...FMC Tester
32,300,907 UART: [rt] Runtime listening for mailbox commands...
32,305,139 >>> mbox cmd response data (2048 bytes)
32,314,841 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,316,501 >>> mbox cmd response data (336 bytes)
32,320,283 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,336,140 >>> mbox cmd response data (1536 bytes)
34,393,019 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
42,303,845 >>> mbox cmd response: success
42,339,088 UART:
42,339,393 UART: Running Caliptra FMC ...
42,340,516 UART:
42,340,681 UART: [state] CFI Enabled
42,443,381 UART: [art] Extend RT PCRs Done
42,444,592 UART: [art] Lock RT PCRs Done
42,445,896 UART: [art] Populate DV Done
42,451,481 UART: [fht] FMC Alias Private Key: 7
42,453,019 UART: [art] Derive CDI
42,453,782 UART: [art] Store in in slot 0x4
42,512,710 UART: [art] Derive Key Pair
42,513,708 UART: [art] Store priv key in slot 0x5
45,806,615 UART: [art] Derive Key Pair - Done
45,819,631 UART: [art] Signing Cert with AUTHO
45,820,933 UART: RITY.KEYID = 7
48,109,127 UART: [art] Erasing AUTHORITY.KEYID = 7
48,110,638 UART: [art] PUB.X = 3BEBB2D23D39857017F2B08FADC73D4EF543719B65B62C7B4C05BEEA0C019B86C362C682C40C109A4C4276A1CBC2A981
48,117,897 UART: [art] PUB.Y = AF2630D4BFE73DB6923564E58B3C6CEA83F34D311B626EBD976329B04A37C2F0980FD27914CB23337C89DCFF425D82B2
48,125,125 UART: [art] SIG.R = E49A1B49C0C9CC27328B3BA4FAD17D74DB7D9A20D49193278B5D678F1EFDE2A8ECFBB4C7B7EB52946CB8636CC587502A
48,132,540 UART: [art] SIG.S = 879E32D109C77F7612B0A1D3D877905627F2995F8D76C1D31FF6EF664BF9B4DCC9210306A7F97FB74B7E188BEA963C1F
49,436,141 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,437,273 UART: mock_rt_interact::rt_entry...FMC Tester
49,725,269 UART: [rt] Runtime listening for mailbox commands...
49,728,257 >>> mbox cmd response data (336 bytes)
49,732,098 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,747,910 >>> mbox cmd response data (1536 bytes)
49,755,220 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,755,622 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,425 UART:
192,799 UART: Running Caliptra ROM ...
193,918 UART:
603,703 UART: [state] CFI Enabled
616,001 UART: [state] LifecycleState = Unprovisioned
617,954 UART: [state] DebugLocked = No
619,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,541 UART: [kat] SHA2-256
794,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,873 UART: [kat] ++
805,319 UART: [kat] sha1
817,766 UART: [kat] SHA2-256
820,500 UART: [kat] SHA2-384
827,095 UART: [kat] SHA2-512-ACC
829,434 UART: [kat] ECC-384
3,114,522 UART: [kat] HMAC-384Kdf
3,127,602 UART: [kat] LMS
4,317,692 UART: [kat] --
4,321,401 UART: [cold-reset] ++
4,323,189 UART: [fht] Storing FHT @ 0x50003400
4,334,594 UART: [idev] ++
4,335,165 UART: [idev] CDI.KEYID = 6
4,336,079 UART: [idev] SUBJECT.KEYID = 7
4,337,328 UART: [idev] UDS.KEYID = 0
4,338,296 ready_for_fw is high
4,338,501 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
4,433,181 UART: [idev] Erasing UDS.KEYID = 0
7,622,174 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,917 UART: [idev] --
7,648,419 UART: [ldev] ++
7,648,986 UART: [ldev] CDI.KEYID = 6
7,649,927 UART: [ldev] SUBJECT.KEYID = 5
7,651,193 UART: [ldev] AUTHORITY.KEYID = 7
7,652,425 UART: [ldev] FE.KEYID = 1
7,664,065 UART: [ldev] Erasing FE.KEYID = 1
10,953,893 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,571 UART: [ldev] --
13,315,960 UART: [fwproc] Waiting for Commands...
13,319,295 UART: [fwproc] Received command 0x46574c44
13,321,476 UART: [fwproc] Received Image of size 75172 bytes
16,903,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,970,705 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,039,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 50468
17,220,560 >>> mbox cmd response: success
17,220,973 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,225,404 UART: [afmc] ++
17,226,016 UART: [afmc] CDI.KEYID = 6
17,226,900 UART: [afmc] SUBJECT.KEYID = 7
17,228,168 UART: [afmc] AUTHORITY.KEYID = 5
20,536,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,829,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,831,933 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,846,318 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,861,107 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,875,567 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,898,136 UART: [afmc] --
22,901,893 UART: [cold-reset] --
22,906,774 UART: [state] Locking Datavault
22,911,382 UART: [state] Locking PCR0, PCR1 and PCR31
22,913,128 UART: [state] Locking ICCM
22,914,897 UART: [exit] Launching FMC @ 0x40000130
22,923,288 UART:
22,923,519 UART: Running Caliptra FMC ...
22,924,619 UART:
22,924,774 UART: [state] CFI Enabled
22,932,926 UART: [fht] FMC Alias Private Key: 7
25,263,676 UART: [art] Extend RT PCRs Done
25,264,902 UART: [art] Lock RT PCRs Done
25,266,625 UART: [art] Populate DV Done
25,271,878 UART: [fht] FMC Alias Private Key: 7
25,273,575 UART: [art] Derive CDI
25,274,386 UART: [art] Store in in slot 0x4
25,317,142 UART: [art] Derive Key Pair
25,318,178 UART: [art] Store priv key in slot 0x5
28,560,334 UART: [art] Derive Key Pair - Done
28,573,331 UART: [art] Signing Cert with AUTHO
28,574,632 UART: RITY.KEYID = 7
30,854,557 UART: [art] Erasing AUTHORITY.KEYID = 7
30,856,074 UART: [art] PUB.X = 26F5C0C9F24E2343E201740F67D2E9E77E57E201CD719D69D8D6BE632CA1F65584F0475B1640E93A81C3C053B531DEAE
30,863,312 UART: [art] PUB.Y = 500EEFDEB8F5A8978A0181DC714220E72E986DF38321317050215EF963D61A013A5B90FB2D5B3EF7033F83D834F11A58
30,870,572 UART: [art] SIG.R = 494101BAA39F8D8E548E3E57679D7F74AE459E563D14ED408696F20B214D541982855173B620D039EE4F9941EA4AB2F1
30,877,899 UART: [art] SIG.S = 7A6FBF09839264CD25EC0297A9DE33FD23CBC7FF56FE401E4D91445E5FF02C1684DEFDB636E8B220F8A10386B6A43C43
32,182,517 UART: mock_rt_interact::rt_entry...FMC Tester
32,300,267 UART: [rt] Runtime listening for mailbox commands...
32,304,518 >>> mbox cmd response data (2048 bytes)
32,314,296 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,315,996 >>> mbox cmd response data (336 bytes)
32,319,897 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,335,756 >>> mbox cmd response data (1536 bytes)
34,393,342 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
34,488,812 UART:
34,489,168 UART: Running Caliptra ROM ...
34,490,301 UART:
34,490,465 UART: [state] CFI Enabled
34,504,080 UART: [state] LifecycleState = Unprovisioned
34,506,004 UART: [state] DebugLocked = No
34,508,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,513,352 UART: [kat] SHA2-256
34,683,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,693,619 UART: [kat] ++
34,694,075 UART: [kat] sha1
34,704,362 UART: [kat] SHA2-256
34,707,060 UART: [kat] SHA2-384
34,713,269 UART: [kat] SHA2-512-ACC
34,715,616 UART: [kat] ECC-384
37,000,109 UART: [kat] HMAC-384Kdf
37,012,937 UART: [kat] LMS
38,203,005 UART: [kat] --
38,209,009 UART: [update-reset] ++
41,867,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,871,787 UART: [update-reset] Loading Runtime at address 0x40005000 len 50468
42,117,686 >>> mbox cmd response: success
42,118,907 UART: [update-reset] Copying MAN_2 To MAN_1
42,141,350 UART: [update-reset Success] --
42,144,452 UART: [state] Locking Datavault
42,148,086 UART: [state] Locking PCR0, PCR1 and PCR31
42,149,844 UART: [state] Locking ICCM
42,151,454 UART: [exit] Launching FMC @ 0x40000130
42,159,899 UART:
42,160,133 UART: Running Caliptra FMC ...
42,161,228 UART:
42,161,383 UART: [state] CFI Enabled
42,205,455 UART: [art] Extend RT PCRs Done
42,206,632 UART: [art] Lock RT PCRs Done
42,207,974 UART: [art] Populate DV Done
42,213,433 UART: [fht] FMC Alias Private Key: 7
42,214,968 UART: [art] Derive CDI
42,216,163 UART: [art] Store in in slot 0x4
42,258,197 UART: [art] Derive Key Pair
42,259,201 UART: [art] Store priv key in slot 0x5
45,501,163 UART: [art] Derive Key Pair - Done
45,514,494 UART: [art] Signing Cert with AUTHO
45,515,791 UART: RITY.KEYID = 7
47,795,181 UART: [art] Erasing AUTHORITY.KEYID = 7
47,796,691 UART: [art] PUB.X = 1FFD30CAD365CD0F2B611B2FA3FC96E92DFE25CD4F581617DD91E48C3BE7A1F5E5915FFE97C6C5D77E9C44D5FBBC62EB
47,803,941 UART: [art] PUB.Y = 249C89BD3702A780E4C0D43B8F9D2714F17BD0F217A8819377F58D9B206EB17185754461F03449CBBDC307DF1B8DFF76
47,811,198 UART: [art] SIG.R = 273E163CD4B3F42DB9360468E68FF4D353D39AC17F1C8A711BDF48DA2E8EBDD29C0078B9519BABB0A43E698A7ABD7DCE
47,818,602 UART: [art] SIG.S = EFC7A44A060CBD26D1396C5C365EEBCF52CC7F106F8A30334B518FA067C88F72135BDC8D6F87A92F4B1DFAB398BC3177
49,121,877 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,123,063 UART: mock_rt_interact::rt_entry...FMC Tester
49,413,754 UART: [rt] Runtime listening for mailbox commands...
49,416,686 >>> mbox cmd response data (336 bytes)
49,420,441 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,436,245 >>> mbox cmd response data (1536 bytes)
49,443,567 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,443,975 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,116,420 ready_for_fw is high
4,117,017 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
17,260,441 >>> mbox cmd response: success
17,260,962 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,907,502 UART:
22,907,910 UART: Running Caliptra FMC ...
22,909,063 UART:
22,909,225 UART: [state] CFI Enabled
22,917,058 UART: [fht] FMC Alias Private Key: 7
25,248,692 UART: [art] Extend RT PCRs Done
25,249,917 UART: [art] Lock RT PCRs Done
25,251,436 UART: [art] Populate DV Done
25,256,755 UART: [fht] FMC Alias Private Key: 7
25,258,345 UART: [art] Derive CDI
25,259,160 UART: [art] Store in in slot 0x4
25,301,278 UART: [art] Derive Key Pair
25,302,315 UART: [art] Store priv key in slot 0x5
28,544,611 UART: [art] Derive Key Pair - Done
28,557,563 UART: [art] Signing Cert with AUTHO
28,558,871 UART: RITY.KEYID = 7
30,838,422 UART: [art] Erasing AUTHORITY.KEYID = 7
30,839,937 UART: [art] PUB.X = A8D7401766A1AD4F07DA091744BB94A46CDCB29F481A958E6AEC14954FF9F1FB5FA792843AEA2D2A80CD3FFAA946CD31
30,847,216 UART: [art] PUB.Y = 32375C3EFA2201AF46911D375894D7C8E0AB9F9CE19D5434451C0DFED1C5AEA0D905C5CF335423AC0FC3474F12032795
30,854,474 UART: [art] SIG.R = F02BB3CD32665D6F5D2FF86E5B116F542829D268AE9D6367C89CFFF418277457E0F731C86F842E78BFE9B9B17B460BC6
30,861,812 UART: [art] SIG.S = 793E2B8CFC497565AC0CBE02DD619E3A3E3E7583102D7E269D7273FCEDD95060480B24E04FBD1FA4FA058249840A2819
32,166,629 UART: mock_rt_interact::rt_entry...FMC Tester
32,284,502 UART: [rt] Runtime listening for mailbox commands...
32,288,736 >>> mbox cmd response data (2048 bytes)
32,298,436 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,300,110 >>> mbox cmd response data (336 bytes)
32,303,952 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,319,808 >>> mbox cmd response data (1536 bytes)
34,376,729 <<< Executing mbox cmd 0x46574c44 (75172 bytes) from SoC
42,189,200 >>> mbox cmd response: success
42,223,408 UART:
42,223,698 UART: Running Caliptra FMC ...
42,224,739 UART:
42,224,888 UART: [state] CFI Enabled
42,268,796 UART: [art] Extend RT PCRs Done
42,269,994 UART: [art] Lock RT PCRs Done
42,271,398 UART: [art] Populate DV Done
42,276,992 UART: [fht] FMC Alias Private Key: 7
42,278,589 UART: [art] Derive CDI
42,279,331 UART: [art] Store in in slot 0x4
42,321,978 UART: [art] Derive Key Pair
42,323,013 UART: [art] Store priv key in slot 0x5
45,564,914 UART: [art] Derive Key Pair - Done
45,577,495 UART: [art] Signing Cert with AUTHO
45,578,800 UART: RITY.KEYID = 7
47,858,053 UART: [art] Erasing AUTHORITY.KEYID = 7
47,859,574 UART: [art] PUB.X = 7D6D412961D8FA84A35D7B7E589022967775AB44614DEE3AB1F1DA44E2D59ADD1F8D84466B80B045CFF0C86DAAA8EB20
47,866,836 UART: [art] PUB.Y = 618C96850E0D78753FD2C7532E82D8D3A207071BB64D0ACD040BFD4601741D3371063486574B15CD0373D9CCECFBEB10
47,874,076 UART: [art] SIG.R = 1A5F9BC8875EA4EF42A0724F56E82E845896BFEC9A8A1A6464A8336FE463384F583350B64331D4A782982018371F80BC
47,881,416 UART: [art] SIG.S = A3199D871618AAF57F24B5DEBB9341CD5FCDF6B906E525E5CDAE9B3354E0F990ECC5EAB9577495838A9950A1AAA58B4D
49,185,535 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,186,654 UART: mock_rt_interact::rt_entry...FMC Tester
49,477,322 UART: [rt] Runtime listening for mailbox commands...
49,480,250 >>> mbox cmd response data (336 bytes)
49,483,980 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,499,796 >>> mbox cmd response data (1536 bytes)
49,507,111 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,507,534 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,027 UART:
192,420 UART: Running Caliptra ROM ...
193,553 UART:
193,706 UART: [state] CFI Enabled
263,593 UART: [state] LifecycleState = Unprovisioned
265,490 UART: [state] DebugLocked = No
266,948 UART: [state] WD Timer not started. Device not locked for debugging
271,046 UART: [kat] SHA2-256
450,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,748 UART: [kat] ++
462,282 UART: [kat] sha1
473,446 UART: [kat] SHA2-256
476,445 UART: [kat] SHA2-384
483,003 UART: [kat] SHA2-512-ACC
485,896 UART: [kat] ECC-384
2,950,250 UART: [kat] HMAC-384Kdf
2,971,426 UART: [kat] LMS
3,500,871 UART: [kat] --
3,503,941 UART: [cold-reset] ++
3,506,078 UART: [fht] FHT @ 0x50003400
3,517,625 UART: [idev] ++
3,518,191 UART: [idev] CDI.KEYID = 6
3,519,103 UART: [idev] SUBJECT.KEYID = 7
3,520,268 UART: [idev] UDS.KEYID = 0
3,521,310 ready_for_fw is high
3,521,524 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,616,371 UART: [idev] Erasing UDS.KEYID = 0
6,022,960 UART: [idev] Sha1 KeyId Algorithm
6,046,354 UART: [idev] --
6,049,972 UART: [ldev] ++
6,050,563 UART: [ldev] CDI.KEYID = 6
6,051,445 UART: [ldev] SUBJECT.KEYID = 5
6,052,660 UART: [ldev] AUTHORITY.KEYID = 7
6,053,895 UART: [ldev] FE.KEYID = 1
6,100,216 UART: [ldev] Erasing FE.KEYID = 1
8,606,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,345 UART: [ldev] --
10,414,162 UART: [fwproc] Wait for Commands...
10,415,991 UART: [fwproc] Recv command 0x46574c44
10,418,036 UART: [fwproc] Recv'd Img size: 75136 bytes
13,351,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,430,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,499,084 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,679,490 >>> mbox cmd response: success
13,679,943 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,683,681 UART: [afmc] ++
13,684,260 UART: [afmc] CDI.KEYID = 6
13,685,141 UART: [afmc] SUBJECT.KEYID = 7
13,686,557 UART: [afmc] AUTHORITY.KEYID = 5
16,208,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,935,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,936,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,952,745 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,968,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,984,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,006,344 UART: [afmc] --
18,011,001 UART: [cold-reset] --
18,013,577 UART: [state] Locking Datavault
18,019,223 UART: [state] Locking PCR0, PCR1 and PCR31
18,020,925 UART: [state] Locking ICCM
18,023,018 UART: [exit] Launching FMC @ 0x40000130
18,031,417 UART:
18,031,662 UART: Running Caliptra FMC ...
18,032,766 UART:
18,032,922 UART: [state] CFI Enabled
18,093,182 UART: [fht] FMC Alias Private Key: 7
19,857,404 UART: [art] Extend RT PCRs Done
19,858,628 UART: [art] Lock RT PCRs Done
19,860,492 UART: [art] Populate DV Done
19,865,953 UART: [fht] FMC Alias Private Key: 7
19,867,486 UART: [art] Derive CDI
19,868,215 UART: [art] Store in in slot 0x4
19,926,411 UART: [art] Derive Key Pair
19,927,452 UART: [art] Store priv key in slot 0x5
22,390,706 UART: [art] Derive Key Pair - Done
22,403,860 UART: [art] Signing Cert with AUTHO
22,405,161 UART: RITY.KEYID = 7
24,117,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,118,646 UART: [art] PUB.X = DCBFB5A72FE0441680BCC0388C74E238F26115F5250705553AF822EC503C8EAD227208A05E95AAD9F291E51805E11ADA
24,125,905 UART: [art] PUB.Y = 03C57EDDF21FAD9617F4DA7327DBC2103605E3F3DDE6411AE628BE97F92508B452721AF9AAEF349A22869765A69B4689
24,133,146 UART: [art] SIG.R = 3AA1D36D12DB3A9BE0D73102E0BC21CF556EF29DFD186AA3F30311C4B9154194A5D632BA6F92C57CBE10CDD26B5C853E
24,140,597 UART: [art] SIG.S = 8330CB8D21C095B6E3B0CA3AF88C1E45B241F25041F92284D3152F3697493B780AFA7C7EF3E98CB3F97C85A52B71E4AB
25,118,310 UART: mock_rt_interact::rt_entry...FMC Tester
25,235,304 UART: [rt] Runtime listening for mailbox commands...
25,239,534 >>> mbox cmd response data (2048 bytes)
25,249,270 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,250,939 >>> mbox cmd response data (336 bytes)
25,254,769 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,270,575 >>> mbox cmd response data (1536 bytes)
27,331,586 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
27,427,021 UART:
27,427,382 UART: Running Caliptra ROM ...
27,428,510 UART:
27,428,677 UART: [state] CFI Enabled
27,486,227 UART: [state] LifecycleState = Unprovisioned
27,488,128 UART: [state] DebugLocked = No
27,490,012 UART: [state] WD Timer not started. Device not locked for debugging
27,493,528 UART: [kat] SHA2-256
27,672,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,684,207 UART: [kat] ++
27,684,659 UART: [kat] sha1
27,695,859 UART: [kat] SHA2-256
27,698,876 UART: [kat] SHA2-384
27,703,959 UART: [kat] SHA2-512-ACC
27,706,902 UART: [kat] ECC-384
30,171,868 UART: [kat] HMAC-384Kdf
30,195,005 UART: [kat] LMS
30,724,465 UART: [kat] --
30,731,533 UART: [update-reset] ++
33,679,920 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,683,204 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
33,928,926 >>> mbox cmd response: success
33,930,202 UART: [update-reset] Copying MAN_2 To MAN_1
33,952,475 UART: [update-reset Success] --
33,957,955 UART: [state] Locking Datavault
33,960,791 UART: [state] Locking PCR0, PCR1 and PCR31
33,962,445 UART: [state] Locking ICCM
33,963,794 UART: [exit] Launching FMC @ 0x40000130
33,972,213 UART:
33,972,463 UART: Running Caliptra FMC ...
33,973,569 UART:
33,973,751 UART: [state] CFI Enabled
34,076,116 UART: [art] Extend RT PCRs Done
34,077,843 UART: [art] Lock RT PCRs Done
34,078,857 UART: [art] Populate DV Done
34,084,081 UART: [fht] FMC Alias Private Key: 7
34,085,621 UART: [art] Derive CDI
34,086,738 UART: [art] Store in in slot 0x4
34,144,948 UART: [art] Derive Key Pair
34,146,089 UART: [art] Store priv key in slot 0x5
36,612,717 UART: [art] Derive Key Pair - Done
36,625,736 UART: [art] Signing Cert with AUTHO
36,627,046 UART: RITY.KEYID = 7
38,340,785 UART: [art] Erasing AUTHORITY.KEYID = 7
38,342,329 UART: [art] PUB.X = 1F811797FD59F20C6600122C14D23ACBC49C24A2C163305C01F43701546D79EDB29703AD4D0741B46DA3FC1BC515AA94
38,349,520 UART: [art] PUB.Y = 52918DA8939ECEE1FDAAA61470FE29E2FE8FB4DF883C9060E693E4A4201BEBBA216D41C527F9799F365B45FCA97A572B
38,356,848 UART: [art] SIG.R = 35207E69342E982E2D06E86C955562A2442D428AC9E5F0F11C7AA2A189738FA85B37C2BB3AFF2F6A08633CBD634CE990
38,364,211 UART: [art] SIG.S = 4BE2FE6E9E3A59A457C3147D723A36434011BD29C8405F14AF1A49B3492B493C76EA1098B1200841EB826D55A81DB840
39,342,263 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,343,594 UART: mock_rt_interact::rt_entry...FMC Tester
39,631,524 UART: [rt] Runtime listening for mailbox commands...
39,634,459 >>> mbox cmd response data (336 bytes)
39,638,531 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,654,339 >>> mbox cmd response data (1536 bytes)
39,661,661 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,662,063 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
3,379,597 ready_for_fw is high
3,380,008 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,486,508 >>> mbox cmd response: success
13,487,165 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,782,221 UART:
17,782,606 UART: Running Caliptra FMC ...
17,783,887 UART:
17,784,051 UART: [state] CFI Enabled
17,846,979 UART: [fht] FMC Alias Private Key: 7
19,610,562 UART: [art] Extend RT PCRs Done
19,612,074 UART: [art] Lock RT PCRs Done
19,613,575 UART: [art] Populate DV Done
19,619,068 UART: [fht] FMC Alias Private Key: 7
19,620,778 UART: [art] Derive CDI
19,621,593 UART: [art] Store in in slot 0x4
19,679,271 UART: [art] Derive Key Pair
19,680,338 UART: [art] Store priv key in slot 0x5
22,144,336 UART: [art] Derive Key Pair - Done
22,157,470 UART: [art] Signing Cert with AUTHO
22,158,776 UART: RITY.KEYID = 7
23,869,973 UART: [art] Erasing AUTHORITY.KEYID = 7
23,871,498 UART: [art] PUB.X = E487A918D03B7172D8C1F91887DBE1233F51FEEBDC83DD9366EFD404F6BF6E75DFF39907DD93CEAD413991C450883AF5
23,878,761 UART: [art] PUB.Y = C6CFD49B89A72F160A8EBD56DCC037C25C365ABCDB323900699F0A65AD46B47B8CED60C42D861F7C27AB164BD8A2F481
23,886,018 UART: [art] SIG.R = 5EAE8CC4F0965A5434F68DE96FF875AF5FB24171C15D9725E65C163E6C902C361FF76CFCF18AE328134756B72B353B43
23,893,463 UART: [art] SIG.S = 87155395E1093ABC2DAF7420B7359D7E485C6BFBC422FCF96F977F9064E2868B57E19116D326B5F8899BB3DE24F5EDB0
24,871,673 UART: mock_rt_interact::rt_entry...FMC Tester
24,988,543 UART: [rt] Runtime listening for mailbox commands...
24,992,792 >>> mbox cmd response data (2048 bytes)
25,002,537 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,004,224 >>> mbox cmd response data (336 bytes)
25,008,123 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,023,932 >>> mbox cmd response data (1536 bytes)
27,079,891 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
33,543,827 >>> mbox cmd response: success
33,576,355 UART:
33,576,683 UART: Running Caliptra FMC ...
33,577,814 UART:
33,577,977 UART: [state] CFI Enabled
33,668,713 UART: [art] Extend RT PCRs Done
33,669,908 UART: [art] Lock RT PCRs Done
33,671,369 UART: [art] Populate DV Done
33,676,738 UART: [fht] FMC Alias Private Key: 7
33,678,331 UART: [art] Derive CDI
33,679,147 UART: [art] Store in in slot 0x4
33,737,469 UART: [art] Derive Key Pair
33,738,512 UART: [art] Store priv key in slot 0x5
36,201,723 UART: [art] Derive Key Pair - Done
36,215,147 UART: [art] Signing Cert with AUTHO
36,216,490 UART: RITY.KEYID = 7
37,926,862 UART: [art] Erasing AUTHORITY.KEYID = 7
37,928,373 UART: [art] PUB.X = E63FDE5AE2C5F3CFA4D8DB17A79FB3564E8C63614B6A9618993010DC96CAC6D2C81738ADA1B9CCCCBCAFE86CB697FFE0
37,935,650 UART: [art] PUB.Y = 9E1324B2E57993DD207C546B7D96C408B65249A4D6E84CD6D379EC2DDCB46E3F628FBF692111C2688C804D621D13FB2D
37,942,914 UART: [art] SIG.R = 2C04472C03B048BB64549089D5CC198D75AE14C9A3F00B4A95F929C25447877644D2A00E6459DAC7A6CA9A8191632401
37,950,296 UART: [art] SIG.S = 4C9EF9595A448B1C713131A98DB07D0A76326FF29C8C18E1069089C4E25A1B0F7944B5572F141200AF5941DE2EDBA753
38,927,976 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,928,929 UART: mock_rt_interact::rt_entry...FMC Tester
39,214,934 UART: [rt] Runtime listening for mailbox commands...
39,217,891 >>> mbox cmd response data (336 bytes)
39,221,712 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,237,519 >>> mbox cmd response data (1536 bytes)
39,244,854 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,245,254 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,343 UART:
192,704 UART: Running Caliptra ROM ...
193,782 UART:
603,629 UART: [state] CFI Enabled
617,286 UART: [state] LifecycleState = Unprovisioned
619,156 UART: [state] DebugLocked = No
621,178 UART: [state] WD Timer not started. Device not locked for debugging
624,566 UART: [kat] SHA2-256
803,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,281 UART: [kat] ++
815,812 UART: [kat] sha1
828,199 UART: [kat] SHA2-256
831,248 UART: [kat] SHA2-384
838,092 UART: [kat] SHA2-512-ACC
841,115 UART: [kat] ECC-384
3,280,925 UART: [kat] HMAC-384Kdf
3,293,752 UART: [kat] LMS
3,823,276 UART: [kat] --
3,827,156 UART: [cold-reset] ++
3,828,329 UART: [fht] FHT @ 0x50003400
3,839,523 UART: [idev] ++
3,840,091 UART: [idev] CDI.KEYID = 6
3,841,002 UART: [idev] SUBJECT.KEYID = 7
3,842,178 UART: [idev] UDS.KEYID = 0
3,843,097 ready_for_fw is high
3,843,314 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,937,843 UART: [idev] Erasing UDS.KEYID = 0
6,321,354 UART: [idev] Sha1 KeyId Algorithm
6,344,072 UART: [idev] --
6,347,557 UART: [ldev] ++
6,348,141 UART: [ldev] CDI.KEYID = 6
6,349,018 UART: [ldev] SUBJECT.KEYID = 5
6,350,148 UART: [ldev] AUTHORITY.KEYID = 7
6,351,480 UART: [ldev] FE.KEYID = 1
6,362,035 UART: [ldev] Erasing FE.KEYID = 1
8,835,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,320 UART: [ldev] --
10,627,718 UART: [fwproc] Wait for Commands...
10,630,668 UART: [fwproc] Recv command 0x46574c44
10,632,761 UART: [fwproc] Recv'd Img size: 75136 bytes
13,563,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,641,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,710,669 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,892,293 >>> mbox cmd response: success
13,892,761 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,896,130 UART: [afmc] ++
13,896,707 UART: [afmc] CDI.KEYID = 6
13,897,608 UART: [afmc] SUBJECT.KEYID = 7
13,898,825 UART: [afmc] AUTHORITY.KEYID = 5
16,396,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,116,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,118,012 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,133,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,149,821 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,165,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,187,428 UART: [afmc] --
18,190,700 UART: [cold-reset] --
18,193,745 UART: [state] Locking Datavault
18,200,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,202,467 UART: [state] Locking ICCM
18,203,771 UART: [exit] Launching FMC @ 0x40000130
18,212,211 UART:
18,212,441 UART: Running Caliptra FMC ...
18,213,480 UART:
18,213,627 UART: [state] CFI Enabled
18,221,805 UART: [fht] FMC Alias Private Key: 7
19,978,481 UART: [art] Extend RT PCRs Done
19,979,681 UART: [art] Lock RT PCRs Done
19,981,269 UART: [art] Populate DV Done
19,986,890 UART: [fht] FMC Alias Private Key: 7
19,988,587 UART: [art] Derive CDI
19,989,318 UART: [art] Store in in slot 0x4
20,031,979 UART: [art] Derive Key Pair
20,033,047 UART: [art] Store priv key in slot 0x5
22,459,757 UART: [art] Derive Key Pair - Done
22,472,706 UART: [art] Signing Cert with AUTHO
22,474,008 UART: RITY.KEYID = 7
24,179,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,180,862 UART: [art] PUB.X = 7D42C3CF29BDC210818CAFFDC6802CB7CEAB974557E52E47430136EAB49F26B7CD381B1696507CFEC5CB632E696EE67A
24,188,063 UART: [art] PUB.Y = B69086850AC88096EE823D978BCA2CB23572DA1CCC9D0575F9464A697C23298BD3921631BE5DDF6AD609D1F7390265CE
24,195,290 UART: [art] SIG.R = 02892AC02E0F44A507EFA6F48FF495701A6D848CAE9F2CCD7929FFE9B411D3E386ABBDE93DCCBCB2C86B24FB944D01B6
24,202,719 UART: [art] SIG.S = ED920A9D741AF1757D36A643735E7FA18F563F35D622B07EA801C8AC89B7C4079C36E228C0F1DADA7B581DA8815178E9
25,181,104 UART: mock_rt_interact::rt_entry...FMC Tester
25,297,237 UART: [rt] Runtime listening for mailbox commands...
25,301,504 >>> mbox cmd response data (2048 bytes)
25,311,239 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,312,898 >>> mbox cmd response data (336 bytes)
25,316,791 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,332,593 >>> mbox cmd response data (1536 bytes)
27,388,304 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
27,483,710 UART:
27,484,097 UART: Running Caliptra ROM ...
27,485,235 UART:
27,485,400 UART: [state] CFI Enabled
27,497,556 UART: [state] LifecycleState = Unprovisioned
27,499,393 UART: [state] DebugLocked = No
27,500,780 UART: [state] WD Timer not started. Device not locked for debugging
27,503,802 UART: [kat] SHA2-256
27,682,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,694,564 UART: [kat] ++
27,695,102 UART: [kat] sha1
27,706,362 UART: [kat] SHA2-256
27,709,360 UART: [kat] SHA2-384
27,715,090 UART: [kat] SHA2-512-ACC
27,718,036 UART: [kat] ECC-384
30,159,684 UART: [kat] HMAC-384Kdf
30,171,214 UART: [kat] LMS
30,700,750 UART: [kat] --
30,705,662 UART: [update-reset] ++
33,661,118 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,664,596 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
33,910,272 >>> mbox cmd response: success
33,911,576 UART: [update-reset] Copying MAN_2 To MAN_1
33,933,908 UART: [update-reset Success] --
33,937,976 UART: [state] Locking Datavault
33,941,520 UART: [state] Locking PCR0, PCR1 and PCR31
33,943,184 UART: [state] Locking ICCM
33,945,091 UART: [exit] Launching FMC @ 0x40000130
33,953,481 UART:
33,953,717 UART: Running Caliptra FMC ...
33,954,737 UART:
33,954,877 UART: [state] CFI Enabled
33,999,665 UART: [art] Extend RT PCRs Done
34,000,831 UART: [art] Lock RT PCRs Done
34,002,555 UART: [art] Populate DV Done
34,008,231 UART: [fht] FMC Alias Private Key: 7
34,009,879 UART: [art] Derive CDI
34,010,692 UART: [art] Store in in slot 0x4
34,053,186 UART: [art] Derive Key Pair
34,054,225 UART: [art] Store priv key in slot 0x5
36,480,992 UART: [art] Derive Key Pair - Done
36,493,865 UART: [art] Signing Cert with AUTHO
36,495,179 UART: RITY.KEYID = 7
38,200,938 UART: [art] Erasing AUTHORITY.KEYID = 7
38,202,442 UART: [art] PUB.X = 32104A16A8BDB453FB059E27F1170C19CE3A4F6E310E4C1CA35323731D57C3A8EFEA27C6B0F49EC462F9DAD37E0D1B21
38,209,710 UART: [art] PUB.Y = 757CA11D5A55C1C85F968201010EE911CA174F16A91AFDD789D009257FBC87241B085F870E5AFA6A2626DD1412A61052
38,216,951 UART: [art] SIG.R = 5FDC41C33A4A641F3A4C928D980E3CC51567267BE6009C3F4B1EFD7EF7CBC4863BD3B7872ED86E1D48B6E0C5607A0842
38,224,344 UART: [art] SIG.S = 155EDA976F51E60778BC1C36C6BA16E5D1D8DEE55F1277ACB99962929E616DDD7D25B782D3B691614608D7038F1F89D2
39,201,487 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,202,744 UART: mock_rt_interact::rt_entry...FMC Tester
39,491,218 UART: [rt] Runtime listening for mailbox commands...
39,494,149 >>> mbox cmd response data (336 bytes)
39,497,923 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,513,719 >>> mbox cmd response data (1536 bytes)
39,521,031 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,521,434 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,696,263 ready_for_fw is high
3,696,684 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,645,121 >>> mbox cmd response: success
13,645,607 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,892,433 UART:
17,892,799 UART: Running Caliptra FMC ...
17,894,049 UART:
17,894,218 UART: [state] CFI Enabled
17,901,878 UART: [fht] FMC Alias Private Key: 7
19,658,781 UART: [art] Extend RT PCRs Done
19,659,995 UART: [art] Lock RT PCRs Done
19,661,674 UART: [art] Populate DV Done
19,667,242 UART: [fht] FMC Alias Private Key: 7
19,668,723 UART: [art] Derive CDI
19,669,475 UART: [art] Store in in slot 0x4
19,712,020 UART: [art] Derive Key Pair
19,713,055 UART: [art] Store priv key in slot 0x5
22,139,612 UART: [art] Derive Key Pair - Done
22,152,878 UART: [art] Signing Cert with AUTHO
22,154,181 UART: RITY.KEYID = 7
23,859,752 UART: [art] Erasing AUTHORITY.KEYID = 7
23,861,290 UART: [art] PUB.X = 1082E4A9B4D7A7F48F04B714EF11BC0BDB3EE1A5E3D79BEF69229F8EDC5FA16A4AC40B7C949D9C3C138DF5A6030E3129
23,868,561 UART: [art] PUB.Y = BBA94FE5E3C8162C1FBE30486DED865AD75985DD6D5AC603698CC3EDE0FF1835B97276A9074385875CA79414DBC182AD
23,875,819 UART: [art] SIG.R = 17EFB65D5A0656FBC20583297373645965CDA18142D20787CCCF6CAB10DF83F0682E666721D1FBA520351A3B1EC79034
23,883,190 UART: [art] SIG.S = 1F455E1D1191FB9FE1E38961FD3ED57A19B3803CA5581674172CDA13508C9F37BBBFA3121FA4FDB827DA183A34DA86C3
24,861,530 UART: mock_rt_interact::rt_entry...FMC Tester
24,978,682 UART: [rt] Runtime listening for mailbox commands...
24,982,897 >>> mbox cmd response data (2048 bytes)
24,992,637 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,994,302 >>> mbox cmd response data (336 bytes)
24,998,153 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,013,958 >>> mbox cmd response data (1536 bytes)
27,071,945 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
33,449,347 >>> mbox cmd response: success
33,484,626 UART:
33,484,956 UART: Running Caliptra FMC ...
33,486,000 UART:
33,486,154 UART: [state] CFI Enabled
33,529,690 UART: [art] Extend RT PCRs Done
33,530,840 UART: [art] Lock RT PCRs Done
33,532,344 UART: [art] Populate DV Done
33,537,808 UART: [fht] FMC Alias Private Key: 7
33,539,408 UART: [art] Derive CDI
33,540,223 UART: [art] Store in in slot 0x4
33,582,995 UART: [art] Derive Key Pair
33,584,045 UART: [art] Store priv key in slot 0x5
36,010,063 UART: [art] Derive Key Pair - Done
36,022,856 UART: [art] Signing Cert with AUTHO
36,024,212 UART: RITY.KEYID = 7
37,729,367 UART: [art] Erasing AUTHORITY.KEYID = 7
37,730,875 UART: [art] PUB.X = 0FE183DF805D8DA417107BFE781B6DB31BABE142A4415E49BE6E5EE5C34167905170854A779D76CF2BC01E56EAB9BAE4
37,738,197 UART: [art] PUB.Y = 44E1B455CB223CDA4866B079349542209FC95CBC193C8E4279C13D754124A1AE76C840E315D265EE5B7883CCC64AFB81
37,745,438 UART: [art] SIG.R = 49D2DA60CC4E14170A5B010BB4801F1C76C0F6F3048DCA7EF8A0388FAECE04A68F722075D84D7B36CDF6D6835686F2AD
37,752,834 UART: [art] SIG.S = 3BA7A798C0DEC99A305DA6806631E48DA443730100F926EDA76280B9966D50D43F55077B538298B84F8362695DE44536
38,729,773 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,730,890 UART: mock_rt_interact::rt_entry...FMC Tester
39,019,975 UART: [rt] Runtime listening for mailbox commands...
39,022,926 >>> mbox cmd response data (336 bytes)
39,026,555 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,042,353 >>> mbox cmd response data (1536 bytes)
39,049,666 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,050,058 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,249 UART:
192,599 UART: Running Caliptra ROM ...
193,711 UART:
193,850 UART: [state] CFI Enabled
265,066 UART: [state] LifecycleState = Unprovisioned
267,485 UART: [state] DebugLocked = No
269,496 UART: [state] WD Timer not started. Device not locked for debugging
274,175 UART: [kat] SHA2-256
463,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,782 UART: [kat] ++
475,223 UART: [kat] sha1
487,297 UART: [kat] SHA2-256
490,303 UART: [kat] SHA2-384
496,644 UART: [kat] SHA2-512-ACC
499,223 UART: [kat] ECC-384
2,947,780 UART: [kat] HMAC-384Kdf
2,971,886 UART: [kat] LMS
3,503,663 UART: [kat] --
3,508,553 UART: [cold-reset] ++
3,509,639 UART: [fht] FHT @ 0x50003400
3,520,260 UART: [idev] ++
3,520,892 UART: [idev] CDI.KEYID = 6
3,521,922 UART: [idev] SUBJECT.KEYID = 7
3,523,101 UART: [idev] UDS.KEYID = 0
3,524,024 ready_for_fw is high
3,524,216 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,618,873 UART: [idev] Erasing UDS.KEYID = 0
6,027,319 UART: [idev] Sha1 KeyId Algorithm
6,050,222 UART: [idev] --
6,054,866 UART: [ldev] ++
6,055,591 UART: [ldev] CDI.KEYID = 6
6,056,477 UART: [ldev] SUBJECT.KEYID = 5
6,057,690 UART: [ldev] AUTHORITY.KEYID = 7
6,058,864 UART: [ldev] FE.KEYID = 1
6,100,047 UART: [ldev] Erasing FE.KEYID = 1
8,609,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,151 UART: [ldev] --
10,414,044 UART: [fwproc] Wait for Commands...
10,415,976 UART: [fwproc] Recv command 0x46574c44
10,418,285 UART: [fwproc] Recv'd Img size: 75136 bytes
13,379,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,462,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,579,075 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
13,885,987 >>> mbox cmd response: success
13,886,414 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,890,677 UART: [afmc] ++
13,891,388 UART: [afmc] CDI.KEYID = 6
13,892,545 UART: [afmc] SUBJECT.KEYID = 7
13,894,029 UART: [afmc] AUTHORITY.KEYID = 5
16,424,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,146,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,148,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,163,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,178,609 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,193,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,218,188 UART: [afmc] --
18,221,825 UART: [cold-reset] --
18,225,483 UART: [state] Locking Datavault
18,232,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,234,385 UART: [state] Locking ICCM
18,237,128 UART: [exit] Launching FMC @ 0x40000130
18,245,802 UART:
18,246,067 UART: Running Caliptra FMC ...
18,247,175 UART:
18,247,329 UART: [state] CFI Enabled
18,305,174 UART: [fht] FMC Alias Private Key: 7
20,068,546 UART: [art] Extend RT PCRs Done
20,069,771 UART: [art] Lock RT PCRs Done
20,071,471 UART: [art] Populate DV Done
20,077,044 UART: [fht] FMC Alias Private Key: 7
20,078,585 UART: [art] Derive CDI
20,079,316 UART: [art] Store in in slot 0x4
20,137,082 UART: [art] Derive Key Pair
20,138,083 UART: [art] Store priv key in slot 0x5
22,601,054 UART: [art] Derive Key Pair - Done
22,614,103 UART: [art] Signing Cert with AUTHO
22,615,412 UART: RITY.KEYID = 7
24,325,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,327,439 UART: [art] PUB.X = ABEA24E0E5550EDECB0FF56C491BFC35EB271F4A0DAFB90191D66889BE2CA9BC5C079AB0269D2C89F82D8A0189B89DC8
24,334,684 UART: [art] PUB.Y = B42B07A9BCE76955686CD10E0CEB9CD5801A3E48F6C3B43316416501E216CD3A23EDC2B31039395B24B391C1F5B80FD9
24,341,969 UART: [art] SIG.R = 6AFCC56D79BFC567D155451CD672D5479B1309B29D1B01A607A54A8EA21BAB9E9BAD1C7CC1297B256BA9F5C6D3610080
24,349,315 UART: [art] SIG.S = 2569FA10491DD2BC76B8F77936F9D338097C4C5EC29ED53A5F3214FA38CD220C05F8C8999D585A7A4D56E72B7B95D2B9
25,327,527 UART: mock_rt_interact::rt_entry...FMC Tester
25,444,042 UART: [rt] Runtime listening for mailbox commands...
25,448,277 >>> mbox cmd response data (2048 bytes)
25,457,982 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,459,643 >>> mbox cmd response data (336 bytes)
25,463,437 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,479,239 >>> mbox cmd response data (1536 bytes)
27,544,453 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
27,639,909 UART:
27,640,259 UART: Running Caliptra ROM ...
27,641,301 UART:
27,641,450 UART: [state] CFI Enabled
27,713,641 UART: [state] LifecycleState = Unprovisioned
27,715,689 UART: [state] DebugLocked = No
27,717,105 UART: [state] WD Timer not started. Device not locked for debugging
27,721,500 UART: [kat] SHA2-256
27,911,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,922,160 UART: [kat] ++
27,922,614 UART: [kat] sha1
27,933,393 UART: [kat] SHA2-256
27,936,414 UART: [kat] SHA2-384
27,942,732 UART: [kat] SHA2-512-ACC
27,945,354 UART: [kat] ECC-384
30,394,982 UART: [kat] HMAC-384Kdf
30,419,789 UART: [kat] LMS
30,951,360 UART: [kat] --
30,955,031 UART: [update-reset] ++
33,934,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,937,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
34,310,273 >>> mbox cmd response: success
34,310,672 UART: [update-reset] Copying MAN_2 To MAN_1
34,348,185 UART: [update-reset Success] --
34,352,526 UART: [state] Locking Datavault
34,357,301 UART: [state] Locking PCR0, PCR1 and PCR31
34,359,500 UART: [state] Locking ICCM
34,362,412 UART: [exit] Launching FMC @ 0x40000130
34,371,086 UART:
34,371,323 UART: Running Caliptra FMC ...
34,372,424 UART:
34,372,575 UART: [state] CFI Enabled
34,461,396 UART: [art] Extend RT PCRs Done
34,462,584 UART: [art] Lock RT PCRs Done
34,464,579 UART: [art] Populate DV Done
34,469,725 UART: [fht] FMC Alias Private Key: 7
34,471,324 UART: [art] Derive CDI
34,472,140 UART: [art] Store in in slot 0x4
34,530,039 UART: [art] Derive Key Pair
34,531,043 UART: [art] Store priv key in slot 0x5
36,998,450 UART: [art] Derive Key Pair - Done
37,011,540 UART: [art] Signing Cert with AUTHO
37,012,856 UART: RITY.KEYID = 7
38,724,296 UART: [art] Erasing AUTHORITY.KEYID = 7
38,725,809 UART: [art] PUB.X = 42DA09E113DD46E0CDBE8FBC10655F708BF0B3A7CA0F06822D34C5CBE18D9C4421B280FBF55271B2232B0CDE97318013
38,733,061 UART: [art] PUB.Y = A70C5166A860061CA49DA21F2B2527D7383CAAD76D81C55E05FFA0E0AB2A5C9433AE2D8AE7997744886E22173669E89F
38,740,349 UART: [art] SIG.R = F12588B5D4F9C2D8E10718D1DE0F49E78B7F7BCD35D04AE79C99B90CD09D2455B2197E9FB6396AFB817B26B2AE2BE595
38,747,742 UART: [art] SIG.S = 34B5981FACE3FB17A5CFB6CE6494D3E2B06FBD5C7292F17150D088D880A6FB71D7A11F56F0E9188CD007036C28467EAF
39,725,044 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,726,121 UART: mock_rt_interact::rt_entry...FMC Tester
40,010,098 UART: [rt] Runtime listening for mailbox commands...
40,013,051 >>> mbox cmd response data (336 bytes)
40,017,085 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,032,893 >>> mbox cmd response data (1536 bytes)
40,040,210 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,040,615 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,488 writing to cptra_bootfsm_go
3,439,589 ready_for_fw is high
3,440,132 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
13,889,339 >>> mbox cmd response: success
13,890,020 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,190,887 UART:
18,191,297 UART: Running Caliptra FMC ...
18,192,485 UART:
18,192,640 UART: [state] CFI Enabled
18,261,370 UART: [fht] FMC Alias Private Key: 7
20,025,666 UART: [art] Extend RT PCRs Done
20,026,888 UART: [art] Lock RT PCRs Done
20,028,482 UART: [art] Populate DV Done
20,033,935 UART: [fht] FMC Alias Private Key: 7
20,035,526 UART: [art] Derive CDI
20,036,257 UART: [art] Store in in slot 0x4
20,093,977 UART: [art] Derive Key Pair
20,095,018 UART: [art] Store priv key in slot 0x5
22,558,047 UART: [art] Derive Key Pair - Done
22,570,795 UART: [art] Signing Cert with AUTHO
22,572,130 UART: RITY.KEYID = 7
24,284,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,285,544 UART: [art] PUB.X = F48E52472E4F6E3B35B646B34E8289235469CE0D789F829A5884C4ECCFC332661510B6A476F79AA971AE10AC668A9CD7
24,292,792 UART: [art] PUB.Y = 1318D6EE319A2C9AAAE8241318B68E4382D5D602D3792E10770A6313C93CFE9250C4A25072259E73F7C2ADEE584A711D
24,300,050 UART: [art] SIG.R = 3CB42CF50F7B1281D66147EFD55687BE89740CFE4BA226A98A8EC1AC12FD0FBED460FD681AE2470600A082C7AD0D822F
24,307,454 UART: [art] SIG.S = 766CE28E92D87F0DF81323FAF5C2B62CC48007D7F7A0B7701726B2374A3C53EBCF09DDE57FAF399BAB9B355CE897E389
25,286,033 UART: mock_rt_interact::rt_entry...FMC Tester
25,402,706 UART: [rt] Runtime listening for mailbox commands...
25,406,990 >>> mbox cmd response data (2048 bytes)
25,416,687 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,418,350 >>> mbox cmd response data (336 bytes)
25,422,239 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,438,043 >>> mbox cmd response data (1536 bytes)
27,494,346 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
34,420,585 >>> mbox cmd response: success
34,453,019 UART:
34,453,310 UART: Running Caliptra FMC ...
34,454,429 UART:
34,454,590 UART: [state] CFI Enabled
34,551,795 UART: [art] Extend RT PCRs Done
34,552,988 UART: [art] Lock RT PCRs Done
34,554,647 UART: [art] Populate DV Done
34,560,113 UART: [fht] FMC Alias Private Key: 7
34,561,704 UART: [art] Derive CDI
34,562,449 UART: [art] Store in in slot 0x4
34,621,113 UART: [art] Derive Key Pair
34,622,126 UART: [art] Store priv key in slot 0x5
37,085,542 UART: [art] Derive Key Pair - Done
37,098,085 UART: [art] Signing Cert with AUTHO
37,099,398 UART: RITY.KEYID = 7
38,811,192 UART: [art] Erasing AUTHORITY.KEYID = 7
38,812,691 UART: [art] PUB.X = 15F17B31D284E1E9CF398881A399F135378E6CEA42C10F13D2B2DB4F9E62D1311878EDF696B120BB18A26B1F34D29BF6
38,819,974 UART: [art] PUB.Y = 31C33A8F9DC8F9DED5E458934ACEADBF95DE7F332FAD36FD2AFC4377DF30AB597F05811453D1FC97762BB4D1530B5F3C
38,827,245 UART: [art] SIG.R = 5EAD3E8CE77A182CAA327F070A1E3A1976FB4458440EA86081E21119A4D5F2A7781B420F7F67350ECADD0B65E222085F
38,834,666 UART: [art] SIG.S = 86A6035FA6AA8379A4A7F6EB7EC3F0697D86A8B329BD1E5BD44A43192A465315CB33F925D98BDB83B947D63FFEBA9A2B
39,811,753 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,812,681 UART: mock_rt_interact::rt_entry...FMC Tester
40,101,974 UART: [rt] Runtime listening for mailbox commands...
40,104,920 >>> mbox cmd response data (336 bytes)
40,108,796 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,124,590 >>> mbox cmd response data (1536 bytes)
40,132,268 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,132,721 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,625 writing to cptra_bootfsm_go
192,733 UART:
193,093 UART: Running Caliptra ROM ...
194,276 UART:
604,084 UART: [state] CFI Enabled
617,453 UART: [state] LifecycleState = Unprovisioned
619,817 UART: [state] DebugLocked = No
620,975 UART: [state] WD Timer not started. Device not locked for debugging
624,165 UART: [kat] SHA2-256
813,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,801 UART: [kat] ++
825,247 UART: [kat] sha1
836,967 UART: [kat] SHA2-256
839,971 UART: [kat] SHA2-384
847,090 UART: [kat] SHA2-512-ACC
849,682 UART: [kat] ECC-384
3,291,138 UART: [kat] HMAC-384Kdf
3,303,642 UART: [kat] LMS
3,835,446 UART: [kat] --
3,839,173 UART: [cold-reset] ++
3,841,385 UART: [fht] FHT @ 0x50003400
3,853,997 UART: [idev] ++
3,854,700 UART: [idev] CDI.KEYID = 6
3,855,681 UART: [idev] SUBJECT.KEYID = 7
3,856,873 UART: [idev] UDS.KEYID = 0
3,857,792 ready_for_fw is high
3,857,992 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,952,471 UART: [idev] Erasing UDS.KEYID = 0
6,335,997 UART: [idev] Sha1 KeyId Algorithm
6,358,691 UART: [idev] --
6,364,030 UART: [ldev] ++
6,364,764 UART: [ldev] CDI.KEYID = 6
6,365,668 UART: [ldev] SUBJECT.KEYID = 5
6,366,820 UART: [ldev] AUTHORITY.KEYID = 7
6,368,044 UART: [ldev] FE.KEYID = 1
6,378,146 UART: [ldev] Erasing FE.KEYID = 1
8,864,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,656 UART: [ldev] --
10,658,237 UART: [fwproc] Wait for Commands...
10,660,977 UART: [fwproc] Recv command 0x46574c44
10,663,279 UART: [fwproc] Recv'd Img size: 75136 bytes
13,624,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,702,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,818,561 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
14,126,221 >>> mbox cmd response: success
14,126,635 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,129,765 UART: [afmc] ++
14,130,507 UART: [afmc] CDI.KEYID = 6
14,131,686 UART: [afmc] SUBJECT.KEYID = 7
14,133,166 UART: [afmc] AUTHORITY.KEYID = 5
16,635,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,356,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,358,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,373,557 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,388,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,403,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,427,520 UART: [afmc] --
18,431,110 UART: [cold-reset] --
18,434,697 UART: [state] Locking Datavault
18,440,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,442,562 UART: [state] Locking ICCM
18,443,957 UART: [exit] Launching FMC @ 0x40000130
18,452,673 UART:
18,452,907 UART: Running Caliptra FMC ...
18,454,005 UART:
18,454,164 UART: [state] CFI Enabled
18,462,285 UART: [fht] FMC Alias Private Key: 7
20,219,162 UART: [art] Extend RT PCRs Done
20,220,877 UART: [art] Lock RT PCRs Done
20,221,886 UART: [art] Populate DV Done
20,227,259 UART: [fht] FMC Alias Private Key: 7
20,228,797 UART: [art] Derive CDI
20,229,537 UART: [art] Store in in slot 0x4
20,271,972 UART: [art] Derive Key Pair
20,272,968 UART: [art] Store priv key in slot 0x5
22,700,022 UART: [art] Derive Key Pair - Done
22,713,071 UART: [art] Signing Cert with AUTHO
22,714,401 UART: RITY.KEYID = 7
24,419,835 UART: [art] Erasing AUTHORITY.KEYID = 7
24,421,333 UART: [art] PUB.X = 3DBC45C579F8E1CF6A2BBB025041FB66A92F197B3BBE7CB2A9E3F43D159E9E7620F3FD02D6D065AE96F1BFB68F223CDE
24,428,674 UART: [art] PUB.Y = D751C689BE1980424331288519EB04EA868713A91CF42D882C71792A9EA6F5F88E357B6005C521E57484BE75590E4F03
24,435,879 UART: [art] SIG.R = FD00E82D157155D22FE76085F6476FD415F3CF4041A8EA33EE7D9A14919028452CDD0976CC50FCF0711608A5401851F5
24,443,247 UART: [art] SIG.S = C904C890430E7BC70300625050F93F2286A82BD3A42D1C93C88C3B49E627C49A1011D7CEB686664461E87D7CA1B84AAC
25,421,743 UART: mock_rt_interact::rt_entry...FMC Tester
25,538,720 UART: [rt] Runtime listening for mailbox commands...
25,542,963 >>> mbox cmd response data (2048 bytes)
25,552,741 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,554,431 >>> mbox cmd response data (336 bytes)
25,558,378 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,574,186 >>> mbox cmd response data (1536 bytes)
27,633,902 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
27,729,736 UART:
27,730,114 UART: Running Caliptra ROM ...
27,731,161 UART:
27,731,365 UART: [state] CFI Enabled
27,745,754 UART: [state] LifecycleState = Unprovisioned
27,747,656 UART: [state] DebugLocked = No
27,749,128 UART: [state] WD Timer not started. Device not locked for debugging
27,753,807 UART: [kat] SHA2-256
27,943,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,954,444 UART: [kat] ++
27,955,040 UART: [kat] sha1
27,966,577 UART: [kat] SHA2-256
27,969,600 UART: [kat] SHA2-384
27,975,264 UART: [kat] SHA2-512-ACC
27,977,880 UART: [kat] ECC-384
30,418,500 UART: [kat] HMAC-384Kdf
30,430,786 UART: [kat] LMS
30,962,442 UART: [kat] --
30,966,850 UART: [update-reset] ++
33,947,409 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,950,880 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
34,323,290 >>> mbox cmd response: success
34,323,786 UART: [update-reset] Copying MAN_2 To MAN_1
34,361,396 UART: [update-reset Success] --
34,367,030 UART: [state] Locking Datavault
34,369,685 UART: [state] Locking PCR0, PCR1 and PCR31
34,371,866 UART: [state] Locking ICCM
34,373,314 UART: [exit] Launching FMC @ 0x40000130
34,381,978 UART:
34,382,215 UART: Running Caliptra FMC ...
34,383,312 UART:
34,383,466 UART: [state] CFI Enabled
34,427,914 UART: [art] Extend RT PCRs Done
34,429,130 UART: [art] Lock RT PCRs Done
34,430,611 UART: [art] Populate DV Done
34,436,181 UART: [fht] FMC Alias Private Key: 7
34,437,772 UART: [art] Derive CDI
34,438,599 UART: [art] Store in in slot 0x4
34,480,768 UART: [art] Derive Key Pair
34,481,804 UART: [art] Store priv key in slot 0x5
36,908,332 UART: [art] Derive Key Pair - Done
36,920,982 UART: [art] Signing Cert with AUTHO
36,922,295 UART: RITY.KEYID = 7
38,627,562 UART: [art] Erasing AUTHORITY.KEYID = 7
38,629,183 UART: [art] PUB.X = 68FF7623B09774D780C2DF7327F4D27DDB1E045407ABF1825245C990F6460F976B942585BC0EB61F056CEE0B7EFC8665
38,636,345 UART: [art] PUB.Y = EFA0E42E904E16FFA1647ACA7194E006211D13A8417D1F295528C0DBF927D77629FD660E39500A973A441FD615B1EF70
38,643,586 UART: [art] SIG.R = 9350660E5821D2ECDD5BC1040FC2E9DB9EC020991514B5D95FB56126C66896E71DEE459ADBD8BDB38BCD3A284A03049B
38,650,986 UART: [art] SIG.S = 47B41202B9AE091B670446D4B0F9958BFC2DF015697ADFF2982317F33366A4A7A5B763E8BE38EE8FD1688A51DE697EA2
39,628,016 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,629,129 UART: mock_rt_interact::rt_entry...FMC Tester
39,917,230 UART: [rt] Runtime listening for mailbox commands...
39,920,167 >>> mbox cmd response data (336 bytes)
39,923,934 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,939,761 >>> mbox cmd response data (1536 bytes)
39,947,076 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,947,473 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,755,682 ready_for_fw is high
3,756,219 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
14,121,813 >>> mbox cmd response: success
14,122,729 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,373,790 UART:
18,374,214 UART: Running Caliptra FMC ...
18,375,411 UART:
18,375,566 UART: [state] CFI Enabled
18,383,275 UART: [fht] FMC Alias Private Key: 7
20,140,551 UART: [art] Extend RT PCRs Done
20,141,796 UART: [art] Lock RT PCRs Done
20,143,526 UART: [art] Populate DV Done
20,148,934 UART: [fht] FMC Alias Private Key: 7
20,150,578 UART: [art] Derive CDI
20,151,391 UART: [art] Store in in slot 0x4
20,193,825 UART: [art] Derive Key Pair
20,194,862 UART: [art] Store priv key in slot 0x5
22,621,563 UART: [art] Derive Key Pair - Done
22,634,617 UART: [art] Signing Cert with AUTHO
22,635,915 UART: RITY.KEYID = 7
24,341,348 UART: [art] Erasing AUTHORITY.KEYID = 7
24,342,846 UART: [art] PUB.X = BE09AE50BEF266AD38F97373A0A8B3401444F489C42BA53FC9D27B9771E1993AD87CCFA2FEDC340D23DE111A13C667CF
24,350,182 UART: [art] PUB.Y = 0E4A410146BE8C4C0716C005929089609F0B41D9F500DCC93B40B50A0113BDDA236AA00772C39E0A8179607D165FDE8A
24,357,385 UART: [art] SIG.R = 3DF408A17F122AC66306EB62E844086ED15F41B3D7A1CAC348E0F3DD1D9B824510D5563204D0FBF74429487A5FD30710
24,364,734 UART: [art] SIG.S = 93E8C31483CFE4380EBBDB26180CDFEF2A780E5351DDBF6E4BA1A69F3C7DA13E840C003786820802E22D488D467606EB
25,343,827 UART: mock_rt_interact::rt_entry...FMC Tester
25,460,401 UART: [rt] Runtime listening for mailbox commands...
25,464,648 >>> mbox cmd response data (2048 bytes)
25,474,542 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,476,251 >>> mbox cmd response data (336 bytes)
25,480,101 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,495,905 >>> mbox cmd response data (1536 bytes)
27,552,980 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
34,394,368 >>> mbox cmd response: success
34,428,589 UART:
34,428,895 UART: Running Caliptra FMC ...
34,430,014 UART:
34,430,348 UART: [state] CFI Enabled
34,474,431 UART: [art] Extend RT PCRs Done
34,475,592 UART: [art] Lock RT PCRs Done
34,477,112 UART: [art] Populate DV Done
34,482,417 UART: [fht] FMC Alias Private Key: 7
34,483,899 UART: [art] Derive CDI
34,484,634 UART: [art] Store in in slot 0x4
34,527,440 UART: [art] Derive Key Pair
34,528,482 UART: [art] Store priv key in slot 0x5
36,955,227 UART: [art] Derive Key Pair - Done
36,968,022 UART: [art] Signing Cert with AUTHO
36,969,330 UART: RITY.KEYID = 7
38,675,129 UART: [art] Erasing AUTHORITY.KEYID = 7
38,676,640 UART: [art] PUB.X = E5EB2864A80EC11F06DF616AF387D352E59039ECB8C3F5C0CE5EF7EF8DBC1337C99D679C5D0CB8511CB61766BCF74459
38,683,894 UART: [art] PUB.Y = 77F789C822A91A2DB30D413776027140AA40CC7386D60630227E299C5750694E5BE36A3B5C26EBF2BA28191D53096C3A
38,691,125 UART: [art] SIG.R = AC14D486B9316171962191D04CC88F9B2EE4CB03F79ACA0B70C93AF94F537BD582BC41F11BE09454EB3CCCC349CAA201
38,698,516 UART: [art] SIG.S = 1B1A9819EAB0FF914E3ABBC42EAB13CCDB9B96178E65CE1FC58CB128D0653A49F0E84DB152BB633D4EBA54F760EAA206
39,675,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,676,913 UART: mock_rt_interact::rt_entry...FMC Tester
39,965,598 UART: [rt] Runtime listening for mailbox commands...
39,968,547 >>> mbox cmd response data (336 bytes)
39,972,605 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,988,409 >>> mbox cmd response data (1536 bytes)
39,996,300 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,996,715 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,411 UART: [kat] SHA2-256
892,349 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,770 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 ready_for_fw is high
1,480,831 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,488,460 UART: [idev] Erasing UDS.KEYID = 0
1,505,404 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,122 UART: [idev] --
1,515,323 UART: [ldev] ++
1,515,491 UART: [ldev] CDI.KEYID = 6
1,515,854 UART: [ldev] SUBJECT.KEYID = 5
1,516,280 UART: [ldev] AUTHORITY.KEYID = 7
1,516,743 UART: [ldev] FE.KEYID = 1
1,522,117 UART: [ldev] Erasing FE.KEYID = 1
1,547,824 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,760 UART: [ldev] --
1,587,097 UART: [fwproc] Waiting for Commands...
1,587,782 UART: [fwproc] Received command 0x46574c44
1,588,573 UART: [fwproc] Received Image of size 75136 bytes
2,436,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,464,290 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,493,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 50452
2,570,797 >>> mbox cmd response: success
2,570,797 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,571,963 UART: [afmc] ++
2,572,131 UART: [afmc] CDI.KEYID = 6
2,572,493 UART: [afmc] SUBJECT.KEYID = 7
2,572,918 UART: [afmc] AUTHORITY.KEYID = 5
2,608,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,624,301 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,625,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,630,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,636,694 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,642,384 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,650,487 UART: [afmc] --
2,651,575 UART: [cold-reset] --
2,652,305 UART: [state] Locking Datavault
2,653,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,654,248 UART: [state] Locking ICCM
2,654,844 UART: [exit] Launching FMC @ 0x40000130
2,660,173 UART:
2,660,189 UART: Running Caliptra FMC ...
2,660,597 UART:
2,660,651 UART: [state] CFI Enabled
2,671,168 UART: [fht] FMC Alias Private Key: 7
2,778,801 UART: [art] Extend RT PCRs Done
2,779,229 UART: [art] Lock RT PCRs Done
2,780,709 UART: [art] Populate DV Done
2,788,856 UART: [fht] FMC Alias Private Key: 7
2,789,792 UART: [art] Derive CDI
2,790,072 UART: [art] Store in in slot 0x4
2,875,879 UART: [art] Derive Key Pair
2,876,239 UART: [art] Store priv key in slot 0x5
2,889,909 UART: [art] Derive Key Pair - Done
2,904,960 UART: [art] Signing Cert with AUTHO
2,905,440 UART: RITY.KEYID = 7
2,921,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,921,999 UART: [art] PUB.X = 2FEF87FA6D5D93126AAA0E01FCAC4D715D23005ACC2FF9223D7B704560E535EA7F0AA3B24F3007A12A721645B60941A0
2,928,742 UART: [art] PUB.Y = E77BF4B18B80762F3CAD774C31B9FC36CD5F726EBE6317BC1F9C8450903B654486D2C9403689AFB36C3D75E51576C43A
2,935,698 UART: [art] SIG.R = B6999337658AC8637616F79AE65DD604B5CAB149FB23D8D3EF91F31299C67B203AAEE2B5EE80B727A2C7C9ABA3DDD83B
2,942,481 UART: [art] SIG.S = BEF0CFFD83AE6E08D2E25379D14E6891FCCF01E94AA42B33CE83789C865D73B0C4F8AD242F375382F177F99C825FE6B5
2,965,746 UART: mock_rt_interact::rt_entry...FMC Tester
3,074,109 UART: [rt] Runtime listening for mailbox commands...
3,077,499 >>> mbox cmd response data (2048 bytes)
3,077,500 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,078,732 >>> mbox cmd response data (336 bytes)
3,078,733 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,091,324 >>> mbox cmd response data (1536 bytes)
3,091,325 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,091,431 UART:
3,091,447 UART: Running Caliptra ROM ...
3,091,855 UART:
3,091,909 UART: [state] CFI Enabled
3,094,069 UART: [state] LifecycleState = Unprovisioned
3,094,724 UART: [state] DebugLocked = No
3,095,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,096,945 UART: [kat] SHA2-256
3,890,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,894,991 UART: [kat] ++
3,895,143 UART: [kat] sha1
3,899,189 UART: [kat] SHA2-256
3,901,127 UART: [kat] SHA2-384
3,903,886 UART: [kat] SHA2-512-ACC
3,905,786 UART: [kat] ECC-384
3,911,549 UART: [kat] HMAC-384Kdf
3,916,301 UART: [kat] LMS
4,484,497 UART: [kat] --
4,485,364 UART: [update-reset] ++
5,370,939 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,372,193 UART: [update-reset] Loading Runtime at address 0x40005000 len 50452
5,463,275 >>> mbox cmd response: success
5,463,548 UART: [update-reset] Copying MAN_2 To MAN_1
5,471,562 UART: [update-reset Success] --
5,472,431 UART: [state] Locking Datavault
5,473,291 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,895 UART: [state] Locking ICCM
5,474,373 UART: [exit] Launching FMC @ 0x40000130
5,479,702 UART:
5,479,718 UART: Running Caliptra FMC ...
5,480,126 UART:
5,480,180 UART: [state] CFI Enabled
5,569,395 UART: [art] Extend RT PCRs Done
5,569,823 UART: [art] Lock RT PCRs Done
5,571,280 UART: [art] Populate DV Done
5,579,495 UART: [fht] FMC Alias Private Key: 7
5,580,423 UART: [art] Derive CDI
5,580,703 UART: [art] Store in in slot 0x4
5,666,434 UART: [art] Derive Key Pair
5,666,794 UART: [art] Store priv key in slot 0x5
5,680,292 UART: [art] Derive Key Pair - Done
5,695,144 UART: [art] Signing Cert with AUTHO
5,695,624 UART: RITY.KEYID = 7
5,711,160 UART: [art] Erasing AUTHORITY.KEYID = 7
5,711,925 UART: [art] PUB.X = 2FF2F002296270BE6757530A727791DFEB67484787B39975E2222E3B0DDEE2CAC3D62E4F34EA511121A18637B814BCB5
5,718,686 UART: [art] PUB.Y = C86D802434D2676000DC64729DE45EAD4AAD34446678E8E6FABA75790E9C7B962EA4EC19046532D742700CF1D89F75D9
5,725,607 UART: [art] SIG.R = 5E4510FF43E79A53D29683047A0F263B9F4C4303983AEB265ED8AF7A96D215E7D29619E1EEFE57DDCABD571CEE26D3BE
5,732,384 UART: [art] SIG.S = D95D519E6EF542EB5A053E139B6E765B7EB3537ED50CF97B96B15C410D8C4548A32EEEC718426C68675E7C6C71EF0B71
5,754,960 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,756,069 UART: mock_rt_interact::rt_entry...FMC Tester
6,040,379 UART: [rt] Runtime listening for mailbox commands...
6,042,414 >>> mbox cmd response data (336 bytes)
6,042,415 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,055,006 >>> mbox cmd response data (1536 bytes)
6,055,007 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,055,024 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 ready_for_fw is high
1,362,957 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,419,859 >>> mbox cmd response: success
2,419,859 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,481,501 UART:
2,481,517 UART: Running Caliptra FMC ...
2,481,925 UART:
2,481,979 UART: [state] CFI Enabled
2,492,534 UART: [fht] FMC Alias Private Key: 7
2,600,131 UART: [art] Extend RT PCRs Done
2,600,559 UART: [art] Lock RT PCRs Done
2,602,071 UART: [art] Populate DV Done
2,610,556 UART: [fht] FMC Alias Private Key: 7
2,611,586 UART: [art] Derive CDI
2,611,866 UART: [art] Store in in slot 0x4
2,697,747 UART: [art] Derive Key Pair
2,698,107 UART: [art] Store priv key in slot 0x5
2,711,041 UART: [art] Derive Key Pair - Done
2,726,120 UART: [art] Signing Cert with AUTHO
2,726,600 UART: RITY.KEYID = 7
2,741,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,742,315 UART: [art] PUB.X = 009BCCEED3280AA7784B9C161E5BA72270935CB0C6E3C75927AFFB2334FB48416EFE43577ABCC446161C02E2959269CB
2,749,065 UART: [art] PUB.Y = 8DD790F2BB2F74C4AE365BB3D67E9E4364F52F0E0CBAC0A8F4F228AB9C6E3CE8E02F79A25464E7C8462FDA1DC86B7CD1
2,756,033 UART: [art] SIG.R = 7B2DC534A05FF4848E9C6F43DD925901B40E2158B2D48A264EC8C551DE7FAE8C9E0274B1559849E646259399D2F491E8
2,762,794 UART: [art] SIG.S = 4858E6F111415F111FF7CD11162D67A604A43078D4B1F065D2BDF03B291806F264F7F15DA938479B252F4C1F1FB370B2
2,786,451 UART: mock_rt_interact::rt_entry...FMC Tester
2,893,436 UART: [rt] Runtime listening for mailbox commands...
2,896,826 >>> mbox cmd response data (2048 bytes)
2,896,827 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,898,059 >>> mbox cmd response data (336 bytes)
2,898,060 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,910,651 >>> mbox cmd response data (1536 bytes)
2,910,652 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
5,164,056 >>> mbox cmd response: success
5,177,375 UART:
5,177,391 UART: Running Caliptra FMC ...
5,177,799 UART:
5,177,853 UART: [state] CFI Enabled
5,266,458 UART: [art] Extend RT PCRs Done
5,266,886 UART: [art] Lock RT PCRs Done
5,268,187 UART: [art] Populate DV Done
5,276,342 UART: [fht] FMC Alias Private Key: 7
5,277,492 UART: [art] Derive CDI
5,277,772 UART: [art] Store in in slot 0x4
5,363,111 UART: [art] Derive Key Pair
5,363,471 UART: [art] Store priv key in slot 0x5
5,376,651 UART: [art] Derive Key Pair - Done
5,391,707 UART: [art] Signing Cert with AUTHO
5,392,187 UART: RITY.KEYID = 7
5,407,431 UART: [art] Erasing AUTHORITY.KEYID = 7
5,408,196 UART: [art] PUB.X = 244EDAAD39CF7CDF8CB3AB91151C03943B4FEF94CD4225863E26248E5EBC7CA2BB5FDC26EC1ED46D5EB1D7037DB7EE61
5,414,988 UART: [art] PUB.Y = E8347D91E815CC153AFBAC61EA6DD593899056F900DF1C58C58583912E64C30D4D534615D2873EEDC244017F2E712E77
5,421,910 UART: [art] SIG.R = EDAF702BB5D0BADB1730BC9A61C8EDB8C64AFB03E8BCF41797F6BA5D7BEC414282AA6CB52E76CC1C08EF72E509C1CB01
5,428,700 UART: [art] SIG.S = E20A502D5E7146D9712B0DBA14E6DD406A207921D51F7A0C0E4D2D63FF681F5709110403AF6B0701F18AA3B6B7373980
5,451,515 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,452,540 UART: mock_rt_interact::rt_entry...FMC Tester
5,734,059 UART: [rt] Runtime listening for mailbox commands...
5,736,094 >>> mbox cmd response data (336 bytes)
5,736,095 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,748,686 >>> mbox cmd response data (1536 bytes)
5,748,687 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,748,704 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,404 UART: [kat] SHA2-256
892,342 UART: [kat] SHA2-384
894,871 UART: [kat] SHA2-512-ACC
896,772 UART: [kat] ECC-384
902,715 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,476,248 UART: [cold-reset] ++
1,476,586 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,488,663 UART: [idev] Erasing UDS.KEYID = 0
1,505,437 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,929 UART: [idev] --
1,515,052 UART: [ldev] ++
1,515,220 UART: [ldev] CDI.KEYID = 6
1,515,583 UART: [ldev] SUBJECT.KEYID = 5
1,516,009 UART: [ldev] AUTHORITY.KEYID = 7
1,516,472 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,547,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,637 UART: [ldev] --
1,586,902 UART: [fwproc] Waiting for Commands...
1,587,727 UART: [fwproc] Received command 0x46574c44
1,588,518 UART: [fwproc] Received Image of size 75136 bytes
2,438,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,464,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,493,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 50452
2,571,132 >>> mbox cmd response: success
2,571,132 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,572,226 UART: [afmc] ++
2,572,394 UART: [afmc] CDI.KEYID = 6
2,572,756 UART: [afmc] SUBJECT.KEYID = 7
2,573,181 UART: [afmc] AUTHORITY.KEYID = 5
2,609,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,625,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,626,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,632,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,638,017 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,643,707 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,651,666 UART: [afmc] --
2,652,746 UART: [cold-reset] --
2,653,836 UART: [state] Locking Datavault
2,655,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,655,619 UART: [state] Locking ICCM
2,656,235 UART: [exit] Launching FMC @ 0x40000130
2,661,564 UART:
2,661,580 UART: Running Caliptra FMC ...
2,661,988 UART:
2,662,131 UART: [state] CFI Enabled
2,672,652 UART: [fht] FMC Alias Private Key: 7
2,781,253 UART: [art] Extend RT PCRs Done
2,781,681 UART: [art] Lock RT PCRs Done
2,783,145 UART: [art] Populate DV Done
2,791,508 UART: [fht] FMC Alias Private Key: 7
2,792,690 UART: [art] Derive CDI
2,792,970 UART: [art] Store in in slot 0x4
2,878,861 UART: [art] Derive Key Pair
2,879,221 UART: [art] Store priv key in slot 0x5
2,892,719 UART: [art] Derive Key Pair - Done
2,907,638 UART: [art] Signing Cert with AUTHO
2,908,118 UART: RITY.KEYID = 7
2,923,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,924,065 UART: [art] PUB.X = A69448DAF177230F01550556B99C85B89208B4E522C0C7704903DE82068DAB26B8191580BCB1C685718A99CC5057F17A
2,930,809 UART: [art] PUB.Y = 19896D12D0685F32B2D7E60EB077E5E97F25545864D3EE729A6CE974298BC3B37B504E6104374FD229EA505FA81577ED
2,937,751 UART: [art] SIG.R = FDA8FDD2E7388EB4439894532B92E235B98ABD93A97980725F4C19C9D73FA03E3F15F967F83471FC8067CB6B2FC0A233
2,944,527 UART: [art] SIG.S = 7A9D08B61CEF94A1E1A7B25952B78CE19274BFFA29B537283EB176693E7F7971318FBC0C9E4689536BE9F978B8F85EBD
2,968,150 UART: mock_rt_interact::rt_entry...FMC Tester
3,075,118 UART: [rt] Runtime listening for mailbox commands...
3,078,508 >>> mbox cmd response data (2048 bytes)
3,078,509 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,079,741 >>> mbox cmd response data (336 bytes)
3,079,742 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,092,333 >>> mbox cmd response data (1536 bytes)
3,092,334 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
3,092,440 UART:
3,092,456 UART: Running Caliptra ROM ...
3,092,864 UART:
3,093,005 UART: [state] CFI Enabled
3,095,407 UART: [state] LifecycleState = Unprovisioned
3,096,062 UART: [state] DebugLocked = No
3,096,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,098,345 UART: [kat] SHA2-256
3,892,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,896,391 UART: [kat] ++
3,896,543 UART: [kat] sha1
3,900,887 UART: [kat] SHA2-256
3,902,825 UART: [kat] SHA2-384
3,905,652 UART: [kat] SHA2-512-ACC
3,907,552 UART: [kat] ECC-384
3,913,291 UART: [kat] HMAC-384Kdf
3,918,013 UART: [kat] LMS
4,486,209 UART: [kat] --
4,486,900 UART: [update-reset] ++
5,372,849 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,373,995 UART: [update-reset] Loading Runtime at address 0x40005000 len 50452
5,465,077 >>> mbox cmd response: success
5,465,388 UART: [update-reset] Copying MAN_2 To MAN_1
5,473,402 UART: [update-reset Success] --
5,474,493 UART: [state] Locking Datavault
5,475,461 UART: [state] Locking PCR0, PCR1 and PCR31
5,476,065 UART: [state] Locking ICCM
5,476,533 UART: [exit] Launching FMC @ 0x40000130
5,481,862 UART:
5,481,878 UART: Running Caliptra FMC ...
5,482,286 UART:
5,482,429 UART: [state] CFI Enabled
5,571,090 UART: [art] Extend RT PCRs Done
5,571,518 UART: [art] Lock RT PCRs Done
5,572,877 UART: [art] Populate DV Done
5,581,166 UART: [fht] FMC Alias Private Key: 7
5,582,120 UART: [art] Derive CDI
5,582,400 UART: [art] Store in in slot 0x4
5,668,035 UART: [art] Derive Key Pair
5,668,395 UART: [art] Store priv key in slot 0x5
5,681,609 UART: [art] Derive Key Pair - Done
5,696,487 UART: [art] Signing Cert with AUTHO
5,696,967 UART: RITY.KEYID = 7
5,712,107 UART: [art] Erasing AUTHORITY.KEYID = 7
5,712,872 UART: [art] PUB.X = C01FD3F17502395159B39D9F3BB222888EC6322B4B9FA9B290F19AA7D6883FD2D1249FFB3816AC808AFEA217FAF1D9EB
5,719,653 UART: [art] PUB.Y = 9EEC89D14C2A286071A558C4B90FA00AE15820B74C147CFB57DE1AC8C37D9C1E1B25D9D4A8F40909A42D227AD0C70516
5,726,598 UART: [art] SIG.R = 512ED76F662870E2697E7B63C6965F4EB4BDBA63EC861FC5C16A864AF10601CA6508E0CC845011235AA3906556C03CDE
5,733,363 UART: [art] SIG.S = 63D73D723E02F7679E2A8E133077E1D7156E8E79858EE77430A7B0C0165F5A8DEFFED92250F12868D0EB2B2F4CF5D374
5,756,512 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,757,517 UART: mock_rt_interact::rt_entry...FMC Tester
6,041,372 UART: [rt] Runtime listening for mailbox commands...
6,043,407 >>> mbox cmd response data (336 bytes)
6,043,408 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,055,999 >>> mbox cmd response data (1536 bytes)
6,056,000 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,056,017 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,288 ready_for_fw is high
1,363,288 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,420,778 >>> mbox cmd response: success
2,420,778 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,482,050 UART:
2,482,066 UART: Running Caliptra FMC ...
2,482,474 UART:
2,482,617 UART: [state] CFI Enabled
2,492,960 UART: [fht] FMC Alias Private Key: 7
2,601,379 UART: [art] Extend RT PCRs Done
2,601,807 UART: [art] Lock RT PCRs Done
2,603,491 UART: [art] Populate DV Done
2,611,466 UART: [fht] FMC Alias Private Key: 7
2,612,462 UART: [art] Derive CDI
2,612,742 UART: [art] Store in in slot 0x4
2,698,641 UART: [art] Derive Key Pair
2,699,001 UART: [art] Store priv key in slot 0x5
2,712,551 UART: [art] Derive Key Pair - Done
2,727,507 UART: [art] Signing Cert with AUTHO
2,727,987 UART: RITY.KEYID = 7
2,743,487 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,252 UART: [art] PUB.X = 402A638EFE0D79763F89B76833E8C2C2423129EAB557A413E054334DBE73A65512259C8D27C5217CC2B53D1E6B2416A3
2,751,015 UART: [art] PUB.Y = DCFC9E949CC43EB776ACB3C88DFD8C349F0AA818303CC8B87EAEF4F42B503C2DD84DD9323EDA4FBB8D1440697CA4C2AA
2,757,992 UART: [art] SIG.R = 02D113B7697510B3E383E46AEDF9F5D2ED5E9FBCDE727A37539BB3F1F96FFAA8C3CD3E651943DD90370D66852AF1913C
2,764,770 UART: [art] SIG.S = E81C4F6F7C20A0C21AF6094F9B116340739A4E1646305B2D68A8076990A3266F4C7BFC131E0BEFA7F08F7C0696F77F95
2,788,581 UART: mock_rt_interact::rt_entry...FMC Tester
2,895,951 UART: [rt] Runtime listening for mailbox commands...
2,899,341 >>> mbox cmd response data (2048 bytes)
2,899,342 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,900,574 >>> mbox cmd response data (336 bytes)
2,900,575 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,913,166 >>> mbox cmd response data (1536 bytes)
2,913,167 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
5,166,248 >>> mbox cmd response: success
5,179,729 UART:
5,179,745 UART: Running Caliptra FMC ...
5,180,153 UART:
5,180,296 UART: [state] CFI Enabled
5,269,351 UART: [art] Extend RT PCRs Done
5,269,779 UART: [art] Lock RT PCRs Done
5,270,990 UART: [art] Populate DV Done
5,279,547 UART: [fht] FMC Alias Private Key: 7
5,280,677 UART: [art] Derive CDI
5,280,957 UART: [art] Store in in slot 0x4
5,366,644 UART: [art] Derive Key Pair
5,367,004 UART: [art] Store priv key in slot 0x5
5,380,258 UART: [art] Derive Key Pair - Done
5,394,981 UART: [art] Signing Cert with AUTHO
5,395,461 UART: RITY.KEYID = 7
5,410,363 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,128 UART: [art] PUB.X = DA28BE089827140AEE29717B1CE9F63F62C01A9BA89ED592CADABE327AC24E1D0461C05190D5B702FF0F3BAB4E775CB7
5,417,901 UART: [art] PUB.Y = 95CB5E9819AB2D056DBCEB17B297ECBB1EA7E56CF251CB611484B2CC0B439F973E57AD50F099DBC9F65196234C948224
5,424,857 UART: [art] SIG.R = DD5DE484EF1B9E0CBF2D48AC9E5413E3D8E866CB15DEBFDDA658361495394C4E17238ED101386DD5C54D00C7D31A8C59
5,431,615 UART: [art] SIG.S = BF8B21B3A084D86AF85EFE5C84DA6221BD7D586876AFBD150CFFBEF3D7B90E33A7BC2AAF133E06A4B8A5B86EA9960EAD
5,454,731 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,455,776 UART: mock_rt_interact::rt_entry...FMC Tester
5,736,779 UART: [rt] Runtime listening for mailbox commands...
5,738,814 >>> mbox cmd response data (336 bytes)
5,738,815 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,751,406 >>> mbox cmd response data (1536 bytes)
5,751,407 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,751,424 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 ready_for_fw is high
1,176,383 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,184,104 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,323 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,356 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 75136 bytes
2,132,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,160,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,419 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,266,354 >>> mbox cmd response: success
2,266,354 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,460 UART: [afmc] ++
2,267,628 UART: [afmc] CDI.KEYID = 6
2,267,990 UART: [afmc] SUBJECT.KEYID = 7
2,268,415 UART: [afmc] AUTHORITY.KEYID = 5
2,304,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,320,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,332,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,338,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,439 UART: [afmc] --
2,347,547 UART: [cold-reset] --
2,348,283 UART: [state] Locking Datavault
2,349,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,410 UART: [state] Locking ICCM
2,350,920 UART: [exit] Launching FMC @ 0x40000130
2,356,249 UART:
2,356,265 UART: Running Caliptra FMC ...
2,356,673 UART:
2,356,727 UART: [state] CFI Enabled
2,367,384 UART: [fht] FMC Alias Private Key: 7
2,474,535 UART: [art] Extend RT PCRs Done
2,474,963 UART: [art] Lock RT PCRs Done
2,476,451 UART: [art] Populate DV Done
2,484,680 UART: [fht] FMC Alias Private Key: 7
2,485,850 UART: [art] Derive CDI
2,486,130 UART: [art] Store in in slot 0x4
2,571,815 UART: [art] Derive Key Pair
2,572,175 UART: [art] Store priv key in slot 0x5
2,585,261 UART: [art] Derive Key Pair - Done
2,599,937 UART: [art] Signing Cert with AUTHO
2,600,417 UART: RITY.KEYID = 7
2,615,839 UART: [art] Erasing AUTHORITY.KEYID = 7
2,616,604 UART: [art] PUB.X = 9E850F38324F133BB5A5A5FD69AB7A77E7C0FD4D67423C3EEEDA1EA3D7760FC5B1244429CAE37ADF905B17C2AF3D75AA
2,623,390 UART: [art] PUB.Y = 89C00F28127ACECD22D4E398D06B5952E5BF92D42D44562EC01BE85F80C692D579A560A8C61C183BA55B3D438D93841D
2,630,341 UART: [art] SIG.R = 979E56959DCC13EEA5B6D011F3437301DFAF949557954F5EEDEECCB08B562FD3C0F82D8F0224E12D1D4A652C49841DCD
2,637,119 UART: [art] SIG.S = 0E508402E06F72C34AA30834B07CD7AF6C9095A4BA7E2E95AC7E9A787DD5B746633C4E885A60E8CA3C1B32B2779694B8
2,660,635 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,859 UART: [rt] Runtime listening for mailbox commands...
2,771,249 >>> mbox cmd response data (2048 bytes)
2,771,250 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,772,482 >>> mbox cmd response data (336 bytes)
2,772,483 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,785,074 >>> mbox cmd response data (1536 bytes)
2,785,075 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,785,178 UART:
2,785,194 UART: Running Caliptra ROM ...
2,785,602 UART:
2,785,657 UART: [state] CFI Enabled
2,788,341 UART: [state] LifecycleState = Unprovisioned
2,788,996 UART: [state] DebugLocked = No
2,789,574 UART: [state] WD Timer not started. Device not locked for debugging
2,790,696 UART: [kat] SHA2-256
3,596,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,600,471 UART: [kat] ++
3,600,623 UART: [kat] sha1
3,604,877 UART: [kat] SHA2-256
3,606,817 UART: [kat] SHA2-384
3,609,574 UART: [kat] SHA2-512-ACC
3,611,474 UART: [kat] ECC-384
3,620,941 UART: [kat] HMAC-384Kdf
3,625,581 UART: [kat] LMS
3,873,909 UART: [kat] --
3,874,663 UART: [update-reset] ++
4,737,706 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,738,693 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
4,829,723 >>> mbox cmd response: success
4,829,952 UART: [update-reset] Copying MAN_2 To MAN_1
4,837,966 UART: [update-reset Success] --
4,838,847 UART: [state] Locking Datavault
4,839,601 UART: [state] Locking PCR0, PCR1 and PCR31
4,840,205 UART: [state] Locking ICCM
4,840,659 UART: [exit] Launching FMC @ 0x40000130
4,845,988 UART:
4,846,004 UART: Running Caliptra FMC ...
4,846,412 UART:
4,846,466 UART: [state] CFI Enabled
4,935,529 UART: [art] Extend RT PCRs Done
4,935,957 UART: [art] Lock RT PCRs Done
4,937,250 UART: [art] Populate DV Done
4,945,571 UART: [fht] FMC Alias Private Key: 7
4,946,719 UART: [art] Derive CDI
4,946,999 UART: [art] Store in in slot 0x4
5,032,348 UART: [art] Derive Key Pair
5,032,708 UART: [art] Store priv key in slot 0x5
5,046,042 UART: [art] Derive Key Pair - Done
5,060,685 UART: [art] Signing Cert with AUTHO
5,061,165 UART: RITY.KEYID = 7
5,076,219 UART: [art] Erasing AUTHORITY.KEYID = 7
5,076,984 UART: [art] PUB.X = BA2DEB4E0FFDE2D2B59146408FBE67EA68929292ED6E8BAB762D419329B32EA5CD494CD71A4230C186021D23E38D7898
5,083,758 UART: [art] PUB.Y = 5F39E687BCA1F60D235258AE85BA62F03323ECBA1DF65724A3B4852F1438D0B275FECD7AE3FBCA754DEAC1FA4470561F
5,090,723 UART: [art] SIG.R = F05B4A2CBC9B2D7AACD99F6E0B74E45FE10E50BC4014FDFADD93C93F1FD4F3D8DEE2B66CBB63F0E3AC4708E5FC63653B
5,097,518 UART: [art] SIG.S = B2E3ED3CB20D4507EB42208CD553EE4B817F099F210C9CB49A815E2BCA1FFE20ECDEC5E4DB0DF23E50F2EEEAE07E11C1
5,120,071 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,121,172 UART: mock_rt_interact::rt_entry...FMC Tester
5,406,665 UART: [rt] Runtime listening for mailbox commands...
5,408,700 >>> mbox cmd response data (336 bytes)
5,408,701 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,421,292 >>> mbox cmd response data (1536 bytes)
5,421,293 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,421,310 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,085 ready_for_fw is high
1,059,085 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,117,723 >>> mbox cmd response: success
2,117,723 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,180,611 UART:
2,180,627 UART: Running Caliptra FMC ...
2,181,035 UART:
2,181,089 UART: [state] CFI Enabled
2,191,522 UART: [fht] FMC Alias Private Key: 7
2,299,915 UART: [art] Extend RT PCRs Done
2,300,343 UART: [art] Lock RT PCRs Done
2,301,687 UART: [art] Populate DV Done
2,309,980 UART: [fht] FMC Alias Private Key: 7
2,311,128 UART: [art] Derive CDI
2,311,408 UART: [art] Store in in slot 0x4
2,397,249 UART: [art] Derive Key Pair
2,397,609 UART: [art] Store priv key in slot 0x5
2,410,907 UART: [art] Derive Key Pair - Done
2,425,394 UART: [art] Signing Cert with AUTHO
2,425,874 UART: RITY.KEYID = 7
2,441,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,781 UART: [art] PUB.X = 5BDFBA20019FA428BCB20A2EE76E645FCBEC9BE84D438708A5DE4A9F0DFA92DBB44AAAE64DE5AB719735AF290C977B84
2,448,564 UART: [art] PUB.Y = DE01A28098C594B6BEC80B0B22DB2A500DC393B9236A9F63AE63E00C805BB9BC23B4631B54DCB7B70C811E29B396CADB
2,455,512 UART: [art] SIG.R = CF9A9103857F88C310B5273734752064FA9E9E044EBCC91EBBB1E59859F852325707688132605A0D538D5CCACF3DAB44
2,462,270 UART: [art] SIG.S = 90068BBF313B5F7FB95AD84FF10FCB342F33F56CAF2E49B2F8E45968761EB89CC300EC5C77ABFB8361148AC17BCAAD51
2,485,663 UART: mock_rt_interact::rt_entry...FMC Tester
2,592,726 UART: [rt] Runtime listening for mailbox commands...
2,596,116 >>> mbox cmd response data (2048 bytes)
2,596,117 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,597,349 >>> mbox cmd response data (336 bytes)
2,597,350 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,609,941 >>> mbox cmd response data (1536 bytes)
2,609,942 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
4,541,771 >>> mbox cmd response: success
4,554,779 UART:
4,554,795 UART: Running Caliptra FMC ...
4,555,203 UART:
4,555,257 UART: [state] CFI Enabled
4,644,544 UART: [art] Extend RT PCRs Done
4,644,972 UART: [art] Lock RT PCRs Done
4,646,293 UART: [art] Populate DV Done
4,654,630 UART: [fht] FMC Alias Private Key: 7
4,655,786 UART: [art] Derive CDI
4,656,066 UART: [art] Store in in slot 0x4
4,742,093 UART: [art] Derive Key Pair
4,742,453 UART: [art] Store priv key in slot 0x5
4,755,115 UART: [art] Derive Key Pair - Done
4,769,658 UART: [art] Signing Cert with AUTHO
4,770,138 UART: RITY.KEYID = 7
4,785,744 UART: [art] Erasing AUTHORITY.KEYID = 7
4,786,509 UART: [art] PUB.X = E284E4AB96CFB0A00F6B17A560ED39412B3F40341A34036E8B6707877574835DBB60B320870FFA61977C65CAEC4563A6
4,793,267 UART: [art] PUB.Y = 27BA163EDA4BC6F73371F786C163CD0C1791ED1A85E39FE63B8F279CBC19B55FC33FD5C466FBB32A98026A1E59B18D1C
4,800,227 UART: [art] SIG.R = 21102065BFB14E2797886472AF686C10C6F5AA3F708295310657B971A62C0E831C42EA350F98D3C8452326CC9E914CCB
4,806,982 UART: [art] SIG.S = 88B7D2FB8349633C4FB0F9DE5040648FC46D8AAEA64D8E9FB0E4096316F7556FC73134E2DE6232AC14446A34F94C6F3C
4,829,393 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,830,514 UART: mock_rt_interact::rt_entry...FMC Tester
5,113,294 UART: [rt] Runtime listening for mailbox commands...
5,115,329 >>> mbox cmd response data (336 bytes)
5,115,330 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,127,921 >>> mbox cmd response data (1536 bytes)
5,127,922 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,127,939 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
893,349 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,474 UART: [kat] ++
897,626 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,440 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 ready_for_fw is high
1,176,690 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,184,207 UART: [idev] Erasing UDS.KEYID = 0
1,201,128 UART: [idev] Sha1 KeyId Algorithm
1,209,634 UART: [idev] --
1,210,654 UART: [ldev] ++
1,210,822 UART: [ldev] CDI.KEYID = 6
1,211,185 UART: [ldev] SUBJECT.KEYID = 5
1,211,611 UART: [ldev] AUTHORITY.KEYID = 7
1,212,074 UART: [ldev] FE.KEYID = 1
1,217,262 UART: [ldev] Erasing FE.KEYID = 1
1,243,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,158 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,183 UART: [fwproc] Recv command 0x46574c44
1,283,911 UART: [fwproc] Recv'd Img size: 75136 bytes
2,132,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,048 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,266,153 >>> mbox cmd response: success
2,266,153 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,269 UART: [afmc] ++
2,267,437 UART: [afmc] CDI.KEYID = 6
2,267,799 UART: [afmc] SUBJECT.KEYID = 7
2,268,224 UART: [afmc] AUTHORITY.KEYID = 5
2,304,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,321,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,339,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,347,134 UART: [afmc] --
2,348,234 UART: [cold-reset] --
2,348,922 UART: [state] Locking Datavault
2,350,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,351,013 UART: [state] Locking ICCM
2,351,545 UART: [exit] Launching FMC @ 0x40000130
2,356,874 UART:
2,356,890 UART: Running Caliptra FMC ...
2,357,298 UART:
2,357,441 UART: [state] CFI Enabled
2,367,830 UART: [fht] FMC Alias Private Key: 7
2,475,255 UART: [art] Extend RT PCRs Done
2,475,683 UART: [art] Lock RT PCRs Done
2,477,227 UART: [art] Populate DV Done
2,485,556 UART: [fht] FMC Alias Private Key: 7
2,486,562 UART: [art] Derive CDI
2,486,842 UART: [art] Store in in slot 0x4
2,572,831 UART: [art] Derive Key Pair
2,573,191 UART: [art] Store priv key in slot 0x5
2,586,467 UART: [art] Derive Key Pair - Done
2,601,305 UART: [art] Signing Cert with AUTHO
2,601,785 UART: RITY.KEYID = 7
2,617,233 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,998 UART: [art] PUB.X = 138848111143FF4C4DA5CDE1E0517CD0825744594210B97C961853AF6A39DDADBEE4D1AAF5E1A4C1E3BA0C9EDA3F9144
2,624,779 UART: [art] PUB.Y = F8EEA83A585AC1858B069CE7DE30CA57CD25CD84DEEAB6D053432D3C2D66453B52965A14C7461A298DB6AC7B30FCBFEF
2,631,748 UART: [art] SIG.R = D1838E7A2DC9985B3BE478607B91A936D7012AD7AEA1F373AE8032EEFB58FB069D3C952D9354198F716084EA8DEFA198
2,638,520 UART: [art] SIG.S = ED9FD51E000B4B936A6D0C11B50DA3599E5694B808800A0EAEBB2C6D5AFBE2C094004964EB19A57975C889959F6CCE6B
2,662,213 UART: mock_rt_interact::rt_entry...FMC Tester
2,770,276 UART: [rt] Runtime listening for mailbox commands...
2,773,666 >>> mbox cmd response data (2048 bytes)
2,773,667 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,774,899 >>> mbox cmd response data (336 bytes)
2,774,900 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,787,491 >>> mbox cmd response data (1536 bytes)
2,787,492 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,787,595 UART:
2,787,611 UART: Running Caliptra ROM ...
2,788,019 UART:
2,788,161 UART: [state] CFI Enabled
2,790,995 UART: [state] LifecycleState = Unprovisioned
2,791,650 UART: [state] DebugLocked = No
2,792,260 UART: [state] WD Timer not started. Device not locked for debugging
2,793,602 UART: [kat] SHA2-256
3,599,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,603,377 UART: [kat] ++
3,603,529 UART: [kat] sha1
3,607,623 UART: [kat] SHA2-256
3,609,563 UART: [kat] SHA2-384
3,612,314 UART: [kat] SHA2-512-ACC
3,614,214 UART: [kat] ECC-384
3,624,063 UART: [kat] HMAC-384Kdf
3,628,799 UART: [kat] LMS
3,877,127 UART: [kat] --
3,878,217 UART: [update-reset] ++
4,742,590 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,743,595 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
4,834,625 >>> mbox cmd response: success
4,834,742 UART: [update-reset] Copying MAN_2 To MAN_1
4,842,756 UART: [update-reset Success] --
4,843,715 UART: [state] Locking Datavault
4,844,551 UART: [state] Locking PCR0, PCR1 and PCR31
4,845,155 UART: [state] Locking ICCM
4,845,819 UART: [exit] Launching FMC @ 0x40000130
4,851,148 UART:
4,851,164 UART: Running Caliptra FMC ...
4,851,572 UART:
4,851,715 UART: [state] CFI Enabled
4,941,128 UART: [art] Extend RT PCRs Done
4,941,556 UART: [art] Lock RT PCRs Done
4,942,873 UART: [art] Populate DV Done
4,950,826 UART: [fht] FMC Alias Private Key: 7
4,951,878 UART: [art] Derive CDI
4,952,158 UART: [art] Store in in slot 0x4
5,037,803 UART: [art] Derive Key Pair
5,038,163 UART: [art] Store priv key in slot 0x5
5,052,083 UART: [art] Derive Key Pair - Done
5,066,364 UART: [art] Signing Cert with AUTHO
5,066,844 UART: RITY.KEYID = 7
5,081,918 UART: [art] Erasing AUTHORITY.KEYID = 7
5,082,683 UART: [art] PUB.X = 264D3F988C9E67F7DFF3800E81A8AA402E071869531AF4DD86D5A433C41460C22832EC884F07313E86FA60F21F2CBCB8
5,089,448 UART: [art] PUB.Y = 3DD5CA87C696B73D6E1D7C137ADAEE05E1323D174A8145CA1056B092F7C0BB85266408FDE90FE469267471173DD685A9
5,096,393 UART: [art] SIG.R = 95F9F31D7F4074212FF2AC7BB97CC690421726DA378365032E24A8E7BCEFACAFE421196B0E005C40E0E27691D8CF9A24
5,103,143 UART: [art] SIG.S = 9E70527AB5EA62E494099435FEA5C2799BD0F63A8AF5DA4FA241F7E21AEA7E4505ACBBA77B3171515ACCABEB3A185141
5,125,993 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,127,162 UART: mock_rt_interact::rt_entry...FMC Tester
5,407,721 UART: [rt] Runtime listening for mailbox commands...
5,409,756 >>> mbox cmd response data (336 bytes)
5,409,757 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,422,348 >>> mbox cmd response data (1536 bytes)
5,422,349 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,422,366 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,032 ready_for_fw is high
1,061,032 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,119,536 >>> mbox cmd response: success
2,119,536 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,182,132 UART:
2,182,148 UART: Running Caliptra FMC ...
2,182,556 UART:
2,182,699 UART: [state] CFI Enabled
2,193,524 UART: [fht] FMC Alias Private Key: 7
2,301,297 UART: [art] Extend RT PCRs Done
2,301,725 UART: [art] Lock RT PCRs Done
2,303,177 UART: [art] Populate DV Done
2,311,496 UART: [fht] FMC Alias Private Key: 7
2,312,580 UART: [art] Derive CDI
2,312,860 UART: [art] Store in in slot 0x4
2,398,995 UART: [art] Derive Key Pair
2,399,355 UART: [art] Store priv key in slot 0x5
2,413,053 UART: [art] Derive Key Pair - Done
2,427,470 UART: [art] Signing Cert with AUTHO
2,427,950 UART: RITY.KEYID = 7
2,443,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,444,543 UART: [art] PUB.X = 69B83C8C1913B512927AC6688BB1082FB1DE3898D16C2708C3FBEDECE63D6897EA856688E5CB948F7A0E238809638C47
2,451,303 UART: [art] PUB.Y = FD2B36A1714E70D24A574E859CF78EE4E8CB81077E24029BDB44E90C4EBFDDF83F2F01A7F54632A377B7977E9E62D116
2,458,251 UART: [art] SIG.R = 34A663902C336CB3ECC05157B295299F3D9655613118C4D8D82FEFD8014EF3744E8A1ACFAF17B5F417E0BFAB9985D29C
2,465,026 UART: [art] SIG.S = F00C6A5E4213E391BE126B3D2EEC09C98BA47412C0C0406D2BD4A8D8E5FA078725B11542C6006D92F7B7D5FB081BBF39
2,488,903 UART: mock_rt_interact::rt_entry...FMC Tester
2,596,347 UART: [rt] Runtime listening for mailbox commands...
2,599,737 >>> mbox cmd response data (2048 bytes)
2,599,738 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,600,970 >>> mbox cmd response data (336 bytes)
2,600,971 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,613,562 >>> mbox cmd response data (1536 bytes)
2,613,563 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
4,544,487 >>> mbox cmd response: success
4,557,617 UART:
4,557,633 UART: Running Caliptra FMC ...
4,558,041 UART:
4,558,184 UART: [state] CFI Enabled
4,647,507 UART: [art] Extend RT PCRs Done
4,647,935 UART: [art] Lock RT PCRs Done
4,648,964 UART: [art] Populate DV Done
4,657,437 UART: [fht] FMC Alias Private Key: 7
4,658,375 UART: [art] Derive CDI
4,658,655 UART: [art] Store in in slot 0x4
4,744,492 UART: [art] Derive Key Pair
4,744,852 UART: [art] Store priv key in slot 0x5
4,757,924 UART: [art] Derive Key Pair - Done
4,772,499 UART: [art] Signing Cert with AUTHO
4,772,979 UART: RITY.KEYID = 7
4,788,167 UART: [art] Erasing AUTHORITY.KEYID = 7
4,788,932 UART: [art] PUB.X = 5EC3882A8B4B05A997A6C9ACF315B417C02C6EDB1648987C459477236FD9A108D919FBB542B35A5FB8A7E4827519DBCF
4,795,704 UART: [art] PUB.Y = 541FBAEA569C60343EDCC6057695F9BDC97361DAEB57B7177DAF7FA16EE009DAE81A6A1C771857BA076E87CBDDC136C2
4,802,665 UART: [art] SIG.R = 00E3A02A7CE352AD28F760611C12E49BE8BB80B1737E962A2710CD87020BD4FA1D160D4B8F508ACA64F935CCA8EED54A
4,809,418 UART: [art] SIG.S = 3B14AA5BC5D89C0BC807DDAB4F577E49E4EF98AC81FA91B880AA343EA4A36752973D280E0C99F0E82E915607A376CB0E
4,832,402 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,833,543 UART: mock_rt_interact::rt_entry...FMC Tester
5,116,546 UART: [rt] Runtime listening for mailbox commands...
5,118,581 >>> mbox cmd response data (336 bytes)
5,118,582 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,131,173 >>> mbox cmd response data (1536 bytes)
5,131,174 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,131,191 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,174,555 ready_for_fw is high
1,174,555 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,182,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,506 UART: [ldev] ++
1,209,674 UART: [ldev] CDI.KEYID = 6
1,210,038 UART: [ldev] SUBJECT.KEYID = 5
1,210,465 UART: [ldev] AUTHORITY.KEYID = 7
1,210,928 UART: [ldev] FE.KEYID = 1
1,215,926 UART: [ldev] Erasing FE.KEYID = 1
1,242,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,446 UART: [fwproc] Wait for Commands...
1,282,095 UART: [fwproc] Recv command 0x46574c44
1,282,828 UART: [fwproc] Recv'd Img size: 75136 bytes
2,131,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,188,604 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,265,730 >>> mbox cmd response: success
2,265,730 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,266,947 UART: [afmc] ++
2,267,115 UART: [afmc] CDI.KEYID = 6
2,267,478 UART: [afmc] SUBJECT.KEYID = 7
2,267,904 UART: [afmc] AUTHORITY.KEYID = 5
2,303,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,320,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,320,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,326,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,332,580 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,338,299 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,076 UART: [afmc] --
2,347,156 UART: [cold-reset] --
2,347,800 UART: [state] Locking Datavault
2,348,849 UART: [state] Locking PCR0, PCR1 and PCR31
2,349,453 UART: [state] Locking ICCM
2,349,943 UART: [exit] Launching FMC @ 0x40000130
2,355,272 UART:
2,355,288 UART: Running Caliptra FMC ...
2,355,696 UART:
2,355,750 UART: [state] CFI Enabled
2,366,561 UART: [fht] FMC Alias Private Key: 7
2,474,140 UART: [art] Extend RT PCRs Done
2,474,568 UART: [art] Lock RT PCRs Done
2,476,082 UART: [art] Populate DV Done
2,484,145 UART: [fht] FMC Alias Private Key: 7
2,485,217 UART: [art] Derive CDI
2,485,497 UART: [art] Store in in slot 0x4
2,571,310 UART: [art] Derive Key Pair
2,571,670 UART: [art] Store priv key in slot 0x5
2,584,510 UART: [art] Derive Key Pair - Done
2,599,228 UART: [art] Signing Cert with AUTHO
2,599,708 UART: RITY.KEYID = 7
2,614,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,615,403 UART: [art] PUB.X = 660F6E39532F372F1B345AE577CFDB600A3572EE970794D87B1B18BBD527F0694D6A89039362171872266FC0EC3C041A
2,622,154 UART: [art] PUB.Y = 687C1D5FEDBB16C56ADE99A83D6A6F1E5D448C523A42D3334F5A393C5D7F80DF9A18DB94C357CEE48ED5E74A9BA640A1
2,629,124 UART: [art] SIG.R = D591ECA67C05DC8C49EE55B662E56837A391C181268E0547315210A53A5153C6809C64770A54238D17F43B6B29C109EA
2,635,874 UART: [art] SIG.S = FB9114E628BD38FA298499A9B23FB180EA1119D2EAFB8999A146D85292607221155B511B6BBC8F5A99C41363FCB09B37
2,659,753 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,054 UART: [rt] Runtime listening for mailbox commands...
2,770,444 >>> mbox cmd response data (2048 bytes)
2,770,445 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,771,677 >>> mbox cmd response data (336 bytes)
2,771,678 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,784,269 >>> mbox cmd response data (1536 bytes)
2,784,270 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,784,373 UART:
2,784,389 UART: Running Caliptra ROM ...
2,784,797 UART:
2,784,852 UART: [state] CFI Enabled
2,787,778 UART: [state] LifecycleState = Unprovisioned
2,788,433 UART: [state] DebugLocked = No
2,789,111 UART: [state] WD Timer not started. Device not locked for debugging
2,790,423 UART: [kat] SHA2-256
3,593,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,598,102 UART: [kat] ++
3,598,254 UART: [kat] sha1
3,602,460 UART: [kat] SHA2-256
3,604,400 UART: [kat] SHA2-384
3,606,981 UART: [kat] SHA2-512-ACC
3,608,881 UART: [kat] ECC-384
3,618,482 UART: [kat] HMAC-384Kdf
3,623,158 UART: [kat] LMS
3,871,470 UART: [kat] --
3,872,316 UART: [update-reset] ++
4,736,220 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,737,347 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
4,828,377 >>> mbox cmd response: success
4,828,618 UART: [update-reset] Copying MAN_2 To MAN_1
4,836,632 UART: [update-reset Success] --
4,837,517 UART: [state] Locking Datavault
4,838,281 UART: [state] Locking PCR0, PCR1 and PCR31
4,838,885 UART: [state] Locking ICCM
4,839,365 UART: [exit] Launching FMC @ 0x40000130
4,844,694 UART:
4,844,710 UART: Running Caliptra FMC ...
4,845,118 UART:
4,845,172 UART: [state] CFI Enabled
4,934,243 UART: [art] Extend RT PCRs Done
4,934,671 UART: [art] Lock RT PCRs Done
4,935,950 UART: [art] Populate DV Done
4,944,173 UART: [fht] FMC Alias Private Key: 7
4,945,283 UART: [art] Derive CDI
4,945,563 UART: [art] Store in in slot 0x4
5,031,098 UART: [art] Derive Key Pair
5,031,458 UART: [art] Store priv key in slot 0x5
5,044,786 UART: [art] Derive Key Pair - Done
5,059,578 UART: [art] Signing Cert with AUTHO
5,060,058 UART: RITY.KEYID = 7
5,075,406 UART: [art] Erasing AUTHORITY.KEYID = 7
5,076,171 UART: [art] PUB.X = A43E794E288EED1492494A8CBFA2625A9EB9E42D68E66AE3A1DF7C2281297969A7860A1A4A787470AB2DD16B0EE85792
5,082,941 UART: [art] PUB.Y = DD55EF30AC37B6852D65D86EEC77E205D1581905864708453E0D88ED4A232F45CB9128E00F09D4A5C420C79BDE051FA6
5,089,874 UART: [art] SIG.R = 43455A393A9BDF306422624CC24889A1FC2373098FE15421A59C8CB790842DBE909D25561BB064A4F8461AE5C233B4DC
5,096,639 UART: [art] SIG.S = C76ACB91C30FF0807BE85A0AEDB37D7434126F483165DC02CFEBCDFA6BBE236CF831E78B9733C0449F110D8E476B927B
5,119,887 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,120,972 UART: mock_rt_interact::rt_entry...FMC Tester
5,404,868 UART: [rt] Runtime listening for mailbox commands...
5,406,903 >>> mbox cmd response data (336 bytes)
5,406,904 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,419,495 >>> mbox cmd response data (1536 bytes)
5,419,496 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,419,513 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,608 ready_for_fw is high
1,055,608 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,113,162 >>> mbox cmd response: success
2,113,162 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,175,336 UART:
2,175,352 UART: Running Caliptra FMC ...
2,175,760 UART:
2,175,814 UART: [state] CFI Enabled
2,186,075 UART: [fht] FMC Alias Private Key: 7
2,293,658 UART: [art] Extend RT PCRs Done
2,294,086 UART: [art] Lock RT PCRs Done
2,295,616 UART: [art] Populate DV Done
2,303,889 UART: [fht] FMC Alias Private Key: 7
2,304,889 UART: [art] Derive CDI
2,305,169 UART: [art] Store in in slot 0x4
2,390,798 UART: [art] Derive Key Pair
2,391,158 UART: [art] Store priv key in slot 0x5
2,404,308 UART: [art] Derive Key Pair - Done
2,419,261 UART: [art] Signing Cert with AUTHO
2,419,741 UART: RITY.KEYID = 7
2,435,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,435,898 UART: [art] PUB.X = 8B67B374F86DE77E95343AD6E94AF8005EE7B3BFEFA629E3DB28AB19175B6AEDC22A09072C7FA9431F23A7A586B60A5F
2,442,653 UART: [art] PUB.Y = 44DD5228562088764218DBFE776533CD5F71F4AACE82C5884A4EB14E0745C58E140B28B9801873C2C775CBD9B0145F32
2,449,595 UART: [art] SIG.R = 2421C236AF4E2F42DD2A86870DC7AAB04B48E7FB5229FBAC9F01229518350B48DDEBF4CE18E5E9343EC57A9E4B9CE288
2,456,372 UART: [art] SIG.S = DA98999DA08C4448804C6D99FC128170C5E37D9B23FAB0BC0A3D6A3991A9F651199CCB5A271CB68D95A79DF86788147C
2,480,496 UART: mock_rt_interact::rt_entry...FMC Tester
2,587,832 UART: [rt] Runtime listening for mailbox commands...
2,591,222 >>> mbox cmd response data (2048 bytes)
2,591,223 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,592,455 >>> mbox cmd response data (336 bytes)
2,592,456 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,605,047 >>> mbox cmd response data (1536 bytes)
2,605,048 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
4,530,170 >>> mbox cmd response: success
4,543,702 UART:
4,543,718 UART: Running Caliptra FMC ...
4,544,126 UART:
4,544,180 UART: [state] CFI Enabled
4,633,327 UART: [art] Extend RT PCRs Done
4,633,755 UART: [art] Lock RT PCRs Done
4,635,130 UART: [art] Populate DV Done
4,643,517 UART: [fht] FMC Alias Private Key: 7
4,644,663 UART: [art] Derive CDI
4,644,943 UART: [art] Store in in slot 0x4
4,730,582 UART: [art] Derive Key Pair
4,730,942 UART: [art] Store priv key in slot 0x5
4,744,172 UART: [art] Derive Key Pair - Done
4,759,001 UART: [art] Signing Cert with AUTHO
4,759,481 UART: RITY.KEYID = 7
4,774,657 UART: [art] Erasing AUTHORITY.KEYID = 7
4,775,422 UART: [art] PUB.X = AC73FADC321FA960DB50A315075E76DEB1FC9D40F481FDF238F524AE3BD501D7AEDA7ADB867BDD3014076F9585399E31
4,782,201 UART: [art] PUB.Y = C241897F4C6DBF1B1CDD525A3CD70AD0C1CB88C013FD6A0E06C9BEE2C9FE2AAE86A5171FB9B56328D06C28F1B853059E
4,789,161 UART: [art] SIG.R = 93A3960BE4109BE122A60DF5487D158EEE9C5041A364B33335173B17FD72FAE309451A434E275CEFA164B99817D12C98
4,795,920 UART: [art] SIG.S = D6AA64D6674A6EE8E49B6BB7601B581B7FDAC003548F56C8452EB4CA0696D07BE755480041CE87421A93969036AD35EF
4,818,522 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,819,595 UART: mock_rt_interact::rt_entry...FMC Tester
5,100,912 UART: [rt] Runtime listening for mailbox commands...
5,102,947 >>> mbox cmd response data (336 bytes)
5,102,948 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,115,539 >>> mbox cmd response data (1536 bytes)
5,115,540 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,115,557 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,640 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 ready_for_fw is high
1,174,628 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,200,134 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 75136 bytes
2,132,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,057 UART: [fwproc] Load Runtime at address 0x40005000 len 50452
2,266,011 >>> mbox cmd response: success
2,266,011 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,032 UART: [afmc] ++
2,267,200 UART: [afmc] CDI.KEYID = 6
2,267,563 UART: [afmc] SUBJECT.KEYID = 7
2,267,989 UART: [afmc] AUTHORITY.KEYID = 5
2,304,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,320,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,338,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,443 UART: [afmc] --
2,347,403 UART: [cold-reset] --
2,348,431 UART: [state] Locking Datavault
2,349,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,148 UART: [state] Locking ICCM
2,350,758 UART: [exit] Launching FMC @ 0x40000130
2,356,087 UART:
2,356,103 UART: Running Caliptra FMC ...
2,356,511 UART:
2,356,654 UART: [state] CFI Enabled
2,367,285 UART: [fht] FMC Alias Private Key: 7
2,475,330 UART: [art] Extend RT PCRs Done
2,475,758 UART: [art] Lock RT PCRs Done
2,477,310 UART: [art] Populate DV Done
2,485,483 UART: [fht] FMC Alias Private Key: 7
2,486,575 UART: [art] Derive CDI
2,486,855 UART: [art] Store in in slot 0x4
2,572,258 UART: [art] Derive Key Pair
2,572,618 UART: [art] Store priv key in slot 0x5
2,586,428 UART: [art] Derive Key Pair - Done
2,601,053 UART: [art] Signing Cert with AUTHO
2,601,533 UART: RITY.KEYID = 7
2,616,931 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,696 UART: [art] PUB.X = FE5378A070C743545C1B300E0EC485FE4AF4509CAD2B6F61684AF51F6752A51FC7D6DFFEDA7281B79DAD0C95D1DF1410
2,624,473 UART: [art] PUB.Y = 3F28CE2E6840344D77DB64201345824EF9FF5C55F329D07755E36378EB469CA93F0026F3C5E702F27F276DA267C38608
2,631,389 UART: [art] SIG.R = DE508988C8A8292CBAFAC03F294E5A5D0B1076F3A32439B299DB9E484489342137B2EC740C481562A62B13BB39DC84EF
2,638,157 UART: [art] SIG.S = E5550223386BB14347D6E138E7EDD9E2F231C24C6D5D930415968581589BA89492FD85AEEA9F830657BBAC150BDFD139
2,662,248 UART: mock_rt_interact::rt_entry...FMC Tester
2,768,723 UART: [rt] Runtime listening for mailbox commands...
2,772,113 >>> mbox cmd response data (2048 bytes)
2,772,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,773,346 >>> mbox cmd response data (336 bytes)
2,773,347 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,785,938 >>> mbox cmd response data (1536 bytes)
2,785,939 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,786,042 UART:
2,786,058 UART: Running Caliptra ROM ...
2,786,466 UART:
2,786,608 UART: [state] CFI Enabled
2,789,582 UART: [state] LifecycleState = Unprovisioned
2,790,237 UART: [state] DebugLocked = No
2,790,755 UART: [state] WD Timer not started. Device not locked for debugging
2,791,883 UART: [kat] SHA2-256
3,595,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,599,562 UART: [kat] ++
3,599,714 UART: [kat] sha1
3,603,978 UART: [kat] SHA2-256
3,605,918 UART: [kat] SHA2-384
3,608,841 UART: [kat] SHA2-512-ACC
3,610,741 UART: [kat] ECC-384
3,620,726 UART: [kat] HMAC-384Kdf
3,625,412 UART: [kat] LMS
3,873,724 UART: [kat] --
3,874,528 UART: [update-reset] ++
4,738,370 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,739,341 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50452
4,830,371 >>> mbox cmd response: success
4,830,654 UART: [update-reset] Copying MAN_2 To MAN_1
4,838,668 UART: [update-reset Success] --
4,839,675 UART: [state] Locking Datavault
4,840,413 UART: [state] Locking PCR0, PCR1 and PCR31
4,841,017 UART: [state] Locking ICCM
4,841,667 UART: [exit] Launching FMC @ 0x40000130
4,846,996 UART:
4,847,012 UART: Running Caliptra FMC ...
4,847,420 UART:
4,847,563 UART: [state] CFI Enabled
4,936,752 UART: [art] Extend RT PCRs Done
4,937,180 UART: [art] Lock RT PCRs Done
4,938,569 UART: [art] Populate DV Done
4,946,904 UART: [fht] FMC Alias Private Key: 7
4,947,922 UART: [art] Derive CDI
4,948,202 UART: [art] Store in in slot 0x4
5,034,055 UART: [art] Derive Key Pair
5,034,415 UART: [art] Store priv key in slot 0x5
5,047,769 UART: [art] Derive Key Pair - Done
5,062,421 UART: [art] Signing Cert with AUTHO
5,062,901 UART: RITY.KEYID = 7
5,078,241 UART: [art] Erasing AUTHORITY.KEYID = 7
5,079,006 UART: [art] PUB.X = 0D242803C47A529C34DC7FCA465A393E7698BB13C017CB51A3FB65ED58BA57809F9DF6B849EA413387F87D9D4DF28AE1
5,085,780 UART: [art] PUB.Y = 4FAB26D46D2AEEFB24FAD54E260BED863E352FCE9916D7019BC1F03D1BBD9E13813D5269D839FCF0E703F551549412DE
5,092,737 UART: [art] SIG.R = 3D6265793F54D2F38534C626529F5A4FD22836A8671BC292C8EB9E861CC91253B2951089A2D4C68C942E03776F17955D
5,099,494 UART: [art] SIG.S = 151766CC65AE4C9AEB7E2CD6CCA6A78225B97B35FAD716BF2813AFBF6971F56CCAEE89F3CDDE77EEABD1F1708E5E2D0D
5,121,683 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,122,940 UART: mock_rt_interact::rt_entry...FMC Tester
5,404,148 UART: [rt] Runtime listening for mailbox commands...
5,406,183 >>> mbox cmd response data (336 bytes)
5,406,184 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,418,775 >>> mbox cmd response data (1536 bytes)
5,418,776 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,418,793 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 ready_for_fw is high
1,056,585 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
2,116,289 >>> mbox cmd response: success
2,116,289 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,179,361 UART:
2,179,377 UART: Running Caliptra FMC ...
2,179,785 UART:
2,179,928 UART: [state] CFI Enabled
2,190,165 UART: [fht] FMC Alias Private Key: 7
2,297,912 UART: [art] Extend RT PCRs Done
2,298,340 UART: [art] Lock RT PCRs Done
2,300,058 UART: [art] Populate DV Done
2,308,229 UART: [fht] FMC Alias Private Key: 7
2,309,291 UART: [art] Derive CDI
2,309,571 UART: [art] Store in in slot 0x4
2,395,120 UART: [art] Derive Key Pair
2,395,480 UART: [art] Store priv key in slot 0x5
2,408,634 UART: [art] Derive Key Pair - Done
2,423,194 UART: [art] Signing Cert with AUTHO
2,423,674 UART: RITY.KEYID = 7
2,438,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,667 UART: [art] PUB.X = E4A0B45C74563483B9724B5173A2853BB8DA2B3F61668B115C4209A4C8B703404EFC35960672AAB6FBF3EA4F9320CA42
2,446,430 UART: [art] PUB.Y = 7B7172FF080457E2BC174A6312940EDF43487767A999FFDBF40C3CEFD2C6288E2334EA2F85D549013CBC4ECA11E824AB
2,453,375 UART: [art] SIG.R = D3AA0AF61B4BAEF8F47863892C9545431A22D1406B275D422390B9E70ECD6B5E348E7EF246F029921A5B58FFBD2201B1
2,460,142 UART: [art] SIG.S = 284E0C040CAB6A77AB1B0AD0B5BC9DF4DBC8989B523C1BEDA9E9E3D55CB28279B0063CC3394BC2CD5FF8F51A1A6AD997
2,483,592 UART: mock_rt_interact::rt_entry...FMC Tester
2,590,854 UART: [rt] Runtime listening for mailbox commands...
2,594,244 >>> mbox cmd response data (2048 bytes)
2,594,245 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,595,477 >>> mbox cmd response data (336 bytes)
2,595,478 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,608,069 >>> mbox cmd response data (1536 bytes)
2,608,070 <<< Executing mbox cmd 0x46574c44 (75136 bytes) from SoC
4,532,429 >>> mbox cmd response: success
4,545,791 UART:
4,545,807 UART: Running Caliptra FMC ...
4,546,215 UART:
4,546,358 UART: [state] CFI Enabled
4,636,017 UART: [art] Extend RT PCRs Done
4,636,445 UART: [art] Lock RT PCRs Done
4,637,732 UART: [art] Populate DV Done
4,645,905 UART: [fht] FMC Alias Private Key: 7
4,647,033 UART: [art] Derive CDI
4,647,313 UART: [art] Store in in slot 0x4
4,732,962 UART: [art] Derive Key Pair
4,733,322 UART: [art] Store priv key in slot 0x5
4,746,702 UART: [art] Derive Key Pair - Done
4,761,441 UART: [art] Signing Cert with AUTHO
4,761,921 UART: RITY.KEYID = 7
4,777,169 UART: [art] Erasing AUTHORITY.KEYID = 7
4,777,934 UART: [art] PUB.X = 43D28E7161761CC9F4CA48DB6D0602CDE93323E04668B001E826644560C23AFEC02F65182A7859084FC2F4D24912CA03
4,784,685 UART: [art] PUB.Y = E9112EEB3352256C8370AE6870D211FC369C6C20999F368F67CFF1557CE3ECA13D2F3167122E24C94BC1F60DEE53059D
4,791,633 UART: [art] SIG.R = 2D46D1305D59A5B542D0576E70F74AC399FA4FB6E82835B2671DADB13FCEA6C9B90DEE85E05131F10CB7D72C05A79879
4,798,404 UART: [art] SIG.S = DDAC351D0B27799A264AB1EF577330EC306A3D97E14708CCA73F8918B1CF722B94AF3558487F401EAA40D88C66CBD1B7
4,821,048 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,822,323 UART: mock_rt_interact::rt_entry...FMC Tester
5,102,405 UART: [rt] Runtime listening for mailbox commands...
5,104,440 >>> mbox cmd response data (336 bytes)
5,104,441 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,117,032 >>> mbox cmd response data (1536 bytes)
5,117,033 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,117,050 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
3,133 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,200 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,170 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
3,186 UART: hii* TESTCASE PASSED
Initializing fuses
1,086 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,210 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,218 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,327 writing to cptra_bootfsm_go
6,744 UART: hii* TESTCASE PASSED
Initializing fuses
870 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,114 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,297 writing to cptra_bootfsm_go
4,764 UART: hii* TESTCASE PASSED
Initializing fuses
878 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,813 writing to cptra_bootfsm_go
3,214 UART: hii* TESTCASE PASSED
Initializing fuses
869 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,174 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
3,122 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,182 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,289 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,806 writing to cptra_bootfsm_go
3,221 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,794 writing to cptra_bootfsm_go
3,101 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
3,241 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
3,173 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,142 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,261 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,148 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,565 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,816 writing to cptra_bootfsm_go
3,115 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,203 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,057 >>> mbox cmd response data (14 bytes)
35,557 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,534 >>> mbox cmd response data (12 bytes)
36,895 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,259 >>> mbox cmd response data (7 bytes)
37,547 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,840 >>> mbox cmd response data (7 bytes)
38,121 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,467 >>> mbox cmd response data (0 bytes)
38,703 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,968 >>> mbox cmd response: success
39,155 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,435 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,429 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,293 >>> mbox cmd response data (14 bytes)
35,791 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,437 >>> mbox cmd response data (12 bytes)
36,848 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,207 >>> mbox cmd response data (7 bytes)
37,493 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,864 >>> mbox cmd response data (7 bytes)
38,151 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,493 >>> mbox cmd response data (0 bytes)
38,728 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,989 >>> mbox cmd response: success
39,167 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,499 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,664 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,497 >>> mbox cmd response data (14 bytes)
36,058 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,723 >>> mbox cmd response data (12 bytes)
37,040 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,413 >>> mbox cmd response data (7 bytes)
37,709 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,079 >>> mbox cmd response data (7 bytes)
38,379 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,737 >>> mbox cmd response data (0 bytes)
39,000 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,288 >>> mbox cmd response: success
39,489 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,828 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,624 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,482 >>> mbox cmd response data (14 bytes)
36,057 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
42,264 >>> mbox cmd response data (12 bytes)
42,924 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
43,327 >>> mbox cmd response data (7 bytes)
43,699 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
44,016 >>> mbox cmd response data (7 bytes)
44,318 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
44,679 >>> mbox cmd response data (0 bytes)
44,947 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
45,226 >>> mbox cmd response: success
45,428 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
45,716 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,178 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,036 >>> mbox cmd response data (14 bytes)
35,537 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,288 >>> mbox cmd response data (12 bytes)
36,600 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,948 >>> mbox cmd response data (7 bytes)
37,230 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,581 >>> mbox cmd response data (7 bytes)
37,861 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,209 >>> mbox cmd response data (0 bytes)
38,439 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,721 >>> mbox cmd response: success
38,903 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,233 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,369 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,227 >>> mbox cmd response data (14 bytes)
35,729 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,375 >>> mbox cmd response data (12 bytes)
36,678 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,026 >>> mbox cmd response data (7 bytes)
37,326 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,674 >>> mbox cmd response data (7 bytes)
37,957 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,295 >>> mbox cmd response data (0 bytes)
38,529 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,792 >>> mbox cmd response: success
38,972 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,323 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,798 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,650 >>> mbox cmd response data (14 bytes)
36,239 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,896 >>> mbox cmd response data (12 bytes)
37,225 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,583 >>> mbox cmd response data (7 bytes)
37,883 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,188 >>> mbox cmd response data (7 bytes)
38,478 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,784 >>> mbox cmd response data (0 bytes)
39,109 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,392 >>> mbox cmd response: success
39,589 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,939 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,604 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,442 >>> mbox cmd response data (14 bytes)
37,463 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
38,195 >>> mbox cmd response data (12 bytes)
38,541 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
38,918 >>> mbox cmd response data (7 bytes)
39,215 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
39,574 >>> mbox cmd response data (7 bytes)
39,879 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
40,231 >>> mbox cmd response data (0 bytes)
40,472 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,752 >>> mbox cmd response: success
40,949 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
41,318 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
3,127 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
38,310 >>> mbox cmd response data (14 bytes)
38,895 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
39,578 >>> mbox cmd response data (12 bytes)
39,895 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
40,244 >>> mbox cmd response data (7 bytes)
40,527 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
40,819 >>> mbox cmd response data (7 bytes)
41,101 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
41,442 >>> mbox cmd response data (0 bytes)
41,675 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,937 >>> mbox cmd response: success
42,117 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
42,449 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,340 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,167 >>> mbox cmd response data (14 bytes)
35,673 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,320 >>> mbox cmd response data (12 bytes)
36,624 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,913 >>> mbox cmd response data (7 bytes)
37,198 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,493 >>> mbox cmd response data (7 bytes)
37,777 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,118 >>> mbox cmd response data (0 bytes)
38,350 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,672 >>> mbox cmd response: success
38,852 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,184 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,648 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,468 >>> mbox cmd response data (14 bytes)
36,047 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,703 >>> mbox cmd response data (12 bytes)
37,263 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,640 >>> mbox cmd response data (7 bytes)
37,945 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,245 >>> mbox cmd response data (7 bytes)
38,562 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,923 >>> mbox cmd response data (0 bytes)
39,164 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,442 >>> mbox cmd response: success
39,633 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,924 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,611 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,473 >>> mbox cmd response data (14 bytes)
36,065 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,732 >>> mbox cmd response data (12 bytes)
37,064 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,431 >>> mbox cmd response data (7 bytes)
37,729 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,033 >>> mbox cmd response data (7 bytes)
38,333 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,688 >>> mbox cmd response data (0 bytes)
38,958 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,236 >>> mbox cmd response: success
39,428 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,719 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,391 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,899 >>> mbox cmd response: success
35,427 UART: |dcfeffff48692121| 37,308 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,813 >>> mbox cmd response: success
|dcfeffff48692121| 40,003 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,455 >>> mbox cmd response: success
|dcfeffff48692121| 42,681 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,120 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,206 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,736 >>> mbox cmd response: success
35,279 UART: |dcfeffff48692121| 37,212 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,732 >>> mbox cmd response: success
|dcfeffff48692121| 39,924 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,373 >>> mbox cmd response: success
|dcfeffff48692121| 42,604 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,041 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,875 writing to cptra_bootfsm_go
4,212 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,752 >>> mbox cmd response: success
36,363 UART: |dcfeffff48692121| 38,332 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,865 >>> mbox cmd response: success
|dcfeffff48692121| 41,135 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,647 >>> mbox cmd response: success
|dcfeffff48692121| 43,948 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,537 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
4,341 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,836 >>> mbox cmd response: success
36,396 UART: |dcfeffff48692121| 38,421 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,002 >>> mbox cmd response: success
|dcfeffff48692121| 41,271 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,846 >>> mbox cmd response: success
|dcfeffff48692121| 44,070 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,567 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,227 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,747 >>> mbox cmd response: success
35,261 UART: |dcfeffff48692121| 37,187 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,698 >>> mbox cmd response: success
|dcfeffff48692121| 39,884 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,378 >>> mbox cmd response: success
|dcfeffff48692121| 43,486 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,005 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,353 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,888 >>> mbox cmd response: success
35,424 UART: |dcfeffff48692121| 37,360 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,879 >>> mbox cmd response: success
|dcfeffff48692121| 40,072 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,576 >>> mbox cmd response: success
|dcfeffff48692121| 42,798 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,239 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,550 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,093 >>> mbox cmd response: success
35,721 UART: |dcfeffff48692121| 37,715 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,319 >>> mbox cmd response: success
|dcfeffff48692121| 40,518 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,032 >>> mbox cmd response: success
|dcfeffff48692121| 43,319 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,887 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,574 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,075 >>> mbox cmd response: success
35,696 UART: |dcfeffff48692121| 37,665 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,258 >>> mbox cmd response: success
|dcfeffff48692121| 40,549 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,068 >>> mbox cmd response: success
|dcfeffff48692121| 43,344 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,849 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,180 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,687 >>> mbox cmd response: success
35,162 UART: |dcfeffff48692121| 37,091 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,605 >>> mbox cmd response: success
|dcfeffff48692121| 39,797 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,240 >>> mbox cmd response: success
|dcfeffff48692121| 42,466 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,962 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,521 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,040 >>> mbox cmd response: success
35,506 UART: |dcfeffff48692121| 37,450 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,962 >>> mbox cmd response: success
|dcfeffff48692121| 40,160 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,602 >>> mbox cmd response: success
|dcfeffff48692121| 42,830 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,322 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,618 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,121 >>> mbox cmd response: success
35,760 UART: |dcfeffff48692121| 37,757 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,356 >>> mbox cmd response: success
|dcfeffff48692121| 40,622 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,176 >>> mbox cmd response: success
|dcfeffff48692121| 43,426 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,961 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,663 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,151 >>> mbox cmd response: success
35,743 UART: |dcfeffff48692121| 37,724 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,306 >>> mbox cmd response: success
|dcfeffff48692121| 40,534 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,049 >>> mbox cmd response: success
|dcfeffff48692121| 43,360 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,883 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,778 writing to cptra_bootfsm_go
4,198 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
3,132 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,159 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
3,240 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,225 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
3,136 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,174 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,167 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,177 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,792 writing to cptra_bootfsm_go
3,097 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,798 writing to cptra_bootfsm_go
3,206 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,220 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,597 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,565 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,906 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,701 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,078 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,948 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,284 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,483 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,873 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
4,677 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,743 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,727 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,098 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,535 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,892 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,236 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,617 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,267 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,651 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,654 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
39,729 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,631 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,002 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,257 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,763 >>> mbox cmd response: success
35,242 UART: |dcfeffff48692121| 37,172 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,684 >>> mbox cmd response: success
|dcfeffff48692121| 39,899 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,348 >>> mbox cmd response: success
|dcfeffff48692121| 42,573 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,008 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,166 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,662 >>> mbox cmd response: success
35,372 UART: |dcfeffff48692121| 37,313 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,855 >>> mbox cmd response: success
|dcfeffff48692121| 40,055 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,505 >>> mbox cmd response: success
|dcfeffff48692121| 42,744 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,187 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,409 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,934 >>> mbox cmd response: success
35,505 UART: |dcfeffff48692121| 37,527 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,121 >>> mbox cmd response: success
|dcfeffff48692121| 40,350 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,923 >>> mbox cmd response: success
|dcfeffff48692121| 44,252 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,906 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,088 >>> mbox cmd response: success
35,733 UART: |dcfeffff48692121| 37,771 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,376 >>> mbox cmd response: success
|dcfeffff48692121| 40,602 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,200 >>> mbox cmd response: success
|dcfeffff48692121| 43,426 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,989 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,164 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,657 >>> mbox cmd response: success
35,282 UART: |dcfeffff48692121| 37,178 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,702 >>> mbox cmd response: success
|dcfeffff48692121| 39,896 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,343 >>> mbox cmd response: success
|dcfeffff48692121| 42,573 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,007 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,280 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,798 >>> mbox cmd response: success
35,315 UART: |dcfeffff48692121| 37,706 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,336 >>> mbox cmd response: success
|dcfeffff48692121| 40,540 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,057 >>> mbox cmd response: success
|dcfeffff48692121| 43,290 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,757 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,521 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,043 >>> mbox cmd response: success
35,595 UART: |dcfeffff48692121| 37,607 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,227 >>> mbox cmd response: success
|dcfeffff48692121| 40,452 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,061 >>> mbox cmd response: success
|dcfeffff48692121| 43,320 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,830 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,394 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,888 >>> mbox cmd response: success
35,575 UART: |dcfeffff48692121| 37,516 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,167 >>> mbox cmd response: success
|dcfeffff48692121| 40,414 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,934 >>> mbox cmd response: success
|dcfeffff48692121| 43,191 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,749 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,190 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,699 >>> mbox cmd response: success
35,233 UART: |dcfeffff48692121| 37,153 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,148 >>> mbox cmd response: success
|dcfeffff48692121| 41,363 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,820 >>> mbox cmd response: success
|dcfeffff48692121| 43,995 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,508 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,513 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,031 >>> mbox cmd response: success
35,503 UART: |dcfeffff48692121| 37,434 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,946 >>> mbox cmd response: success
|dcfeffff48692121| 40,159 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,627 >>> mbox cmd response: success
|dcfeffff48692121| 42,801 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,291 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,425 writing to cptra_bootfsm_go
4,947 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,471 >>> mbox cmd response: success
37,038 UART: |dcfeffff48692121| 39,035 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,638 >>> mbox cmd response: success
|dcfeffff48692121| 41,904 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,436 >>> mbox cmd response: success
|dcfeffff48692121| 44,662 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,178 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,630 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,127 >>> mbox cmd response: success
35,758 UART: |dcfeffff48692121| 37,789 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,391 >>> mbox cmd response: success
|dcfeffff48692121| 40,616 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,148 >>> mbox cmd response: success
|dcfeffff48692121| 43,451 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,960 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,535 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
13,998 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,222 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,133 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.09s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.10s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
1,302,016 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
1,302,073 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
1,302,584 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
1,302,462 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
1,302,051 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
1,302,051 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
1,302,634 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
1,302,436 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
1,302,186 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
1,302,156 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
1,302,435 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
1,302,575 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4952c974b98bf2d47877a5b8763213a692fc912122ee9f71169b2de38e7b4946c20b39aa990cb628b44aec42913625d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,899 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,160 UART:
192,547 UART: Running Caliptra ROM ...
193,740 UART:
193,892 UART: [state] CFI Enabled
262,796 UART: [state] LifecycleState = Unprovisioned
265,169 UART: [state] DebugLocked = No
267,951 UART: [state] WD Timer not started. Device not locked for debugging
272,025 UART: [kat] SHA2-256
453,988 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,498 UART: [kat] ++
466,006 UART: [kat] sha1
476,298 UART: [kat] SHA2-256
479,359 UART: [kat] SHA2-384
484,786 UART: [kat] SHA2-512-ACC
487,404 UART: [kat] ECC-384
3,776,934 UART: [kat] HMAC-384Kdf
3,803,278 UART: [kat] LMS
4,876,475 UART: [kat] --
4,880,925 UART: [cold-reset] ++
4,882,052 UART: [fht] FHT @ 0x50003400
4,892,982 UART: [idev] ++
4,893,658 UART: [idev] CDI.KEYID = 6
4,894,892 UART: [idev] SUBJECT.KEYID = 7
4,896,053 UART: [idev] UDS.KEYID = 0
4,930,908 UART: [idev] Erasing UDS.KEYID = 0
8,246,424 UART: [idev] Sha1 KeyId Algorithm
8,268,177 UART: [idev] --
8,272,596 UART: [ldev] ++
8,273,213 UART: [ldev] CDI.KEYID = 6
8,274,318 UART: [ldev] SUBJECT.KEYID = 5
8,275,586 UART: [ldev] AUTHORITY.KEYID = 7
8,276,737 UART: [ldev] FE.KEYID = 1
8,319,347 UART: [ldev] Erasing FE.KEYID = 1
11,653,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,357 UART: [ldev] --
14,039,871 UART: [fwproc] Wait for Commands...
14,041,431 UART: [fwproc] Recv command 0x43415053
14,044,511 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,833 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,815,749 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
4,225 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,465 UART:
192,838 UART: Running Caliptra ROM ...
193,994 UART:
603,784 UART: [state] CFI Enabled
620,363 UART: [state] LifecycleState = Unprovisioned
622,758 UART: [state] DebugLocked = No
625,051 UART: [state] WD Timer not started. Device not locked for debugging
629,719 UART: [kat] SHA2-256
811,724 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,228 UART: [kat] ++
823,814 UART: [kat] sha1
835,865 UART: [kat] SHA2-256
838,915 UART: [kat] SHA2-384
844,951 UART: [kat] SHA2-512-ACC
847,558 UART: [kat] ECC-384
4,100,637 UART: [kat] HMAC-384Kdf
4,112,286 UART: [kat] LMS
5,185,475 UART: [kat] --
5,189,511 UART: [cold-reset] ++
5,190,962 UART: [fht] FHT @ 0x50003400
5,203,235 UART: [idev] ++
5,203,909 UART: [idev] CDI.KEYID = 6
5,205,067 UART: [idev] SUBJECT.KEYID = 7
5,206,541 UART: [idev] UDS.KEYID = 0
5,224,266 UART: [idev] Erasing UDS.KEYID = 0
8,497,417 UART: [idev] Sha1 KeyId Algorithm
8,518,700 UART: [idev] --
8,522,240 UART: [ldev] ++
8,522,868 UART: [ldev] CDI.KEYID = 6
8,523,972 UART: [ldev] SUBJECT.KEYID = 5
8,525,503 UART: [ldev] AUTHORITY.KEYID = 7
8,527,057 UART: [ldev] FE.KEYID = 1
8,538,509 UART: [ldev] Erasing FE.KEYID = 1
11,826,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,552 UART: [ldev] --
14,191,466 UART: [fwproc] Wait for Commands...
14,193,663 UART: [fwproc] Recv command 0x43415053
14,196,741 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,270 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,009,093 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,906 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,207 UART:
192,574 UART: Running Caliptra ROM ...
193,779 UART:
193,926 UART: [state] CFI Enabled
263,600 UART: [state] LifecycleState = Unprovisioned
265,520 UART: [state] DebugLocked = No
267,664 UART: [state] WD Timer not started. Device not locked for debugging
271,330 UART: [kat] SHA2-256
450,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,033 UART: [kat] ++
462,582 UART: [kat] sha1
474,172 UART: [kat] SHA2-256
477,176 UART: [kat] SHA2-384
481,969 UART: [kat] SHA2-512-ACC
484,911 UART: [kat] ECC-384
2,950,264 UART: [kat] HMAC-384Kdf
2,972,118 UART: [kat] LMS
3,501,586 UART: [kat] --
3,503,419 UART: [cold-reset] ++
3,505,028 UART: [fht] FHT @ 0x50003400
3,516,931 UART: [idev] ++
3,517,498 UART: [idev] CDI.KEYID = 6
3,518,421 UART: [idev] SUBJECT.KEYID = 7
3,519,640 UART: [idev] UDS.KEYID = 0
3,545,357 UART: [idev] Erasing UDS.KEYID = 0
6,029,778 UART: [idev] Sha1 KeyId Algorithm
6,053,281 UART: [idev] --
6,058,115 UART: [ldev] ++
6,058,698 UART: [ldev] CDI.KEYID = 6
6,059,613 UART: [ldev] SUBJECT.KEYID = 5
6,060,775 UART: [ldev] AUTHORITY.KEYID = 7
6,062,013 UART: [ldev] FE.KEYID = 1
6,100,215 UART: [ldev] Erasing FE.KEYID = 1
8,607,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,459 UART: [ldev] --
10,415,809 UART: [fwproc] Wait for Commands...
10,418,844 UART: [fwproc] Recv command 0x43415053
10,421,602 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,767 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,201,443 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,233 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,457 UART:
192,826 UART: Running Caliptra ROM ...
194,034 UART:
603,437 UART: [state] CFI Enabled
619,094 UART: [state] LifecycleState = Unprovisioned
620,960 UART: [state] DebugLocked = No
623,474 UART: [state] WD Timer not started. Device not locked for debugging
626,485 UART: [kat] SHA2-256
805,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,153 UART: [kat] ++
817,749 UART: [kat] sha1
829,711 UART: [kat] SHA2-256
832,720 UART: [kat] SHA2-384
838,102 UART: [kat] SHA2-512-ACC
841,083 UART: [kat] ECC-384
3,282,967 UART: [kat] HMAC-384Kdf
3,295,151 UART: [kat] LMS
3,824,678 UART: [kat] --
3,827,499 UART: [cold-reset] ++
3,828,789 UART: [fht] FHT @ 0x50003400
3,838,521 UART: [idev] ++
3,839,078 UART: [idev] CDI.KEYID = 6
3,840,047 UART: [idev] SUBJECT.KEYID = 7
3,841,148 UART: [idev] UDS.KEYID = 0
3,857,550 UART: [idev] Erasing UDS.KEYID = 0
6,312,835 UART: [idev] Sha1 KeyId Algorithm
6,335,893 UART: [idev] --
6,340,099 UART: [ldev] ++
6,340,662 UART: [ldev] CDI.KEYID = 6
6,341,565 UART: [ldev] SUBJECT.KEYID = 5
6,342,773 UART: [ldev] AUTHORITY.KEYID = 7
6,344,001 UART: [ldev] FE.KEYID = 1
6,353,998 UART: [ldev] Erasing FE.KEYID = 1
8,824,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,425 UART: [ldev] --
10,614,510 UART: [fwproc] Wait for Commands...
10,617,657 UART: [fwproc] Recv command 0x43415053
10,620,440 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,751 writing to cptra_bootfsm_go
5,775 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,410,100 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,868 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,157 UART:
192,523 UART: Running Caliptra ROM ...
193,717 UART:
193,866 UART: [state] CFI Enabled
268,540 UART: [state] LifecycleState = Unprovisioned
270,408 UART: [state] DebugLocked = No
272,279 UART: [state] WD Timer not started. Device not locked for debugging
275,889 UART: [kat] SHA2-256
455,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,593 UART: [kat] ++
467,150 UART: [kat] sha1
479,172 UART: [kat] SHA2-256
482,185 UART: [kat] SHA2-384
488,919 UART: [kat] SHA2-512-ACC
491,854 UART: [kat] ECC-384
2,951,764 UART: [kat] HMAC-384Kdf
2,972,110 UART: [kat] LMS
3,501,546 UART: [kat] --
3,507,325 UART: [cold-reset] ++
3,508,500 UART: [fht] FHT @ 0x50003400
3,519,373 UART: [idev] ++
3,519,952 UART: [idev] CDI.KEYID = 6
3,520,879 UART: [idev] SUBJECT.KEYID = 7
3,522,042 UART: [idev] UDS.KEYID = 0
3,544,234 UART: [idev] Erasing UDS.KEYID = 0
6,024,201 UART: [idev] Sha1 KeyId Algorithm
6,047,803 UART: [idev] --
6,052,351 UART: [ldev] ++
6,052,966 UART: [ldev] CDI.KEYID = 6
6,053,859 UART: [ldev] SUBJECT.KEYID = 5
6,055,026 UART: [ldev] AUTHORITY.KEYID = 7
6,056,267 UART: [ldev] FE.KEYID = 1
6,099,543 UART: [ldev] Erasing FE.KEYID = 1
8,602,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,181 UART: [ldev] --
10,411,801 UART: [fwproc] Wait for Commands...
10,414,926 UART: [fwproc] Recv command 0x43415053
10,417,688 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,832 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,180,686 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,371 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,569 UART:
192,954 UART: Running Caliptra ROM ...
194,177 UART:
603,549 UART: [state] CFI Enabled
617,691 UART: [state] LifecycleState = Unprovisioned
619,569 UART: [state] DebugLocked = No
622,186 UART: [state] WD Timer not started. Device not locked for debugging
625,300 UART: [kat] SHA2-256
804,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,986 UART: [kat] ++
816,431 UART: [kat] sha1
825,847 UART: [kat] SHA2-256
828,901 UART: [kat] SHA2-384
834,761 UART: [kat] SHA2-512-ACC
837,688 UART: [kat] ECC-384
3,281,635 UART: [kat] HMAC-384Kdf
3,293,273 UART: [kat] LMS
3,822,793 UART: [kat] --
3,827,452 UART: [cold-reset] ++
3,829,006 UART: [fht] FHT @ 0x50003400
3,839,932 UART: [idev] ++
3,840,548 UART: [idev] CDI.KEYID = 6
3,841,434 UART: [idev] SUBJECT.KEYID = 7
3,842,646 UART: [idev] UDS.KEYID = 0
3,857,843 UART: [idev] Erasing UDS.KEYID = 0
6,317,623 UART: [idev] Sha1 KeyId Algorithm
6,340,357 UART: [idev] --
6,345,430 UART: [ldev] ++
6,345,994 UART: [ldev] CDI.KEYID = 6
6,346,917 UART: [ldev] SUBJECT.KEYID = 5
6,348,074 UART: [ldev] AUTHORITY.KEYID = 7
6,349,359 UART: [ldev] FE.KEYID = 1
6,360,005 UART: [ldev] Erasing FE.KEYID = 1
8,829,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,284 UART: [ldev] --
10,617,785 UART: [fwproc] Wait for Commands...
10,620,739 UART: [fwproc] Recv command 0x43415053
10,623,489 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
4,338 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,394,051 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,582 UART: [kat] LMS
1,168,894 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,367 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,214,708 UART: [ldev] Erasing FE.KEYID = 1
1,240,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,976 UART: [ldev] --
1,279,412 UART: [fwproc] Wait for Commands...
1,280,161 UART: [fwproc] Recv command 0x43415053
1,281,156 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,134,123 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
891,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,537 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x43415053
1,283,215 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,238 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,559 UART: [kat] SHA2-256
901,499 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,743 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,587 UART: [idev] Sha1 KeyId Algorithm
1,208,589 UART: [idev] --
1,209,740 UART: [ldev] ++
1,209,908 UART: [ldev] CDI.KEYID = 6
1,210,272 UART: [ldev] SUBJECT.KEYID = 5
1,210,699 UART: [ldev] AUTHORITY.KEYID = 7
1,211,162 UART: [ldev] FE.KEYID = 1
1,216,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,672 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,883 UART: [fwproc] Recv command 0x43415053
1,283,878 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,103 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,267 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,182,212 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,443 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x43415053
1,283,213 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,658 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,158 UART: [ldev] --
1,281,458 UART: [fwproc] Wait for Commands...
1,282,173 UART: [fwproc] Recv command 0x43415053
1,283,168 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,447 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,785 UART: [kat] HMAC-384Kdf
921,469 UART: [kat] LMS
1,169,781 UART: [kat] --
1,170,848 UART: [cold-reset] ++
1,171,368 UART: [fht] FHT @ 0x50003400
1,174,070 UART: [idev] ++
1,174,238 UART: [idev] CDI.KEYID = 6
1,174,599 UART: [idev] SUBJECT.KEYID = 7
1,175,024 UART: [idev] UDS.KEYID = 0
1,183,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,640 UART: [idev] Sha1 KeyId Algorithm
1,209,694 UART: [idev] --
1,210,737 UART: [ldev] ++
1,210,905 UART: [ldev] CDI.KEYID = 6
1,211,269 UART: [ldev] SUBJECT.KEYID = 5
1,211,696 UART: [ldev] AUTHORITY.KEYID = 7
1,212,159 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,943 UART: [ldev] --
1,283,249 UART: [fwproc] Wait for Commands...
1,283,970 UART: [fwproc] Recv command 0x43415053
1,284,965 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,082 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.23s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
191,977 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,721 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,447 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,131 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,044 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,545 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,709 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
193,229 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,696 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,074 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,576 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,491 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,962 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,709 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "401121e03206c9a7449caf906d2eb9d69609372375290c60710c464b8c1a472acd959417daa34aa8a56240e011700585",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a6aa6e2173c083fa2aeae24f51f3ab02e50770b602ad4fc66944e30727939a901856bdc2520b0fc71005c37d9b99dfb2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,099 UART:
192,470 UART: Running Caliptra ROM ...
193,655 UART:
193,802 UART: [state] CFI Enabled
208,794 UART: [state] LifecycleState = Unprovisioned
211,149 UART: [state] DebugLocked = No
213,165 UART: [state] WD Timer not started. Device not locked for debugging
218,603 UART: [kat] SHA2-256
400,612 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,139 UART: [kat] ++
412,677 UART: [kat] sha1
423,077 UART: [kat] SHA2-256
426,084 UART: [kat] SHA2-384
432,711 UART: [kat] SHA2-512-ACC
435,355 UART: [kat] ECC-384
3,690,452 UART: [kat] HMAC-384Kdf
3,702,040 UART: [kat] LMS
4,775,198 UART: [kat] --
4,781,055 UART: [cold-reset] ++
4,782,779 UART: [fht] FHT @ 0x50003400
4,793,683 UART: [idev] ++
4,794,387 UART: [idev] CDI.KEYID = 6
4,795,699 UART: [idev] SUBJECT.KEYID = 7
4,797,029 UART: [idev] UDS.KEYID = 0
4,798,226 ready_for_fw is high
4,798,425 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
4,931,779 UART: [idev] Erasing UDS.KEYID = 0
8,088,199 UART: [idev] Sha1 KeyId Algorithm
8,110,182 UART: [idev] --
8,113,848 UART: [ldev] ++
8,114,412 UART: [ldev] CDI.KEYID = 6
8,115,570 UART: [ldev] SUBJECT.KEYID = 5
8,116,778 UART: [ldev] AUTHORITY.KEYID = 7
8,117,929 UART: [ldev] FE.KEYID = 1
8,130,544 UART: [ldev] Erasing FE.KEYID = 1
11,422,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,784,988 UART: [ldev] --
13,789,602 UART: [fwproc] Wait for Commands...
13,792,340 UART: [fwproc] Recv command 0x46574c44
13,794,668 UART: [fwproc] Recv'd Img size: 106256 bytes
17,769,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,849,625 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,892,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,208,200 >>> mbox cmd response: success
18,211,453 UART: [afmc] ++
18,212,069 UART: [afmc] CDI.KEYID = 6
18,213,274 UART: [afmc] SUBJECT.KEYID = 7
18,214,379 UART: [afmc] AUTHORITY.KEYID = 5
21,531,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,827,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,829,801 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,845,859 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,861,879 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,877,948 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,900,424 UART: [afmc] --
23,903,366 UART: [cold-reset] --
23,908,043 UART: [state] Locking Datavault
23,914,182 UART: [state] Locking PCR0, PCR1 and PCR31
23,915,825 UART: [state] Locking ICCM
23,917,961 UART: [exit] Launching FMC @ 0x40000000
23,926,547 UART:
23,926,796 UART: Running Caliptra FMC ...
23,927,948 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
4,693,782 ready_for_fw is high
4,694,303 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,012,676 >>> mbox cmd response: success
23,651,410 UART:
23,651,828 UART: Running Caliptra FMC ...
23,653,014 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,401 UART:
192,758 UART: Running Caliptra ROM ...
193,936 UART:
194,080 UART: [state] CFI Enabled
209,007 UART: [state] LifecycleState = Unprovisioned
211,363 UART: [state] DebugLocked = No
213,450 UART: [state] WD Timer not started. Device not locked for debugging
218,887 UART: [kat] SHA2-256
400,847 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,388 UART: [kat] ++
412,857 UART: [kat] sha1
423,299 UART: [kat] SHA2-256
426,377 UART: [kat] SHA2-384
432,998 UART: [kat] SHA2-512-ACC
435,642 UART: [kat] ECC-384
3,690,732 UART: [kat] HMAC-384Kdf
3,702,330 UART: [kat] LMS
4,775,454 UART: [kat] --
4,781,317 UART: [cold-reset] ++
4,783,033 UART: [fht] FHT @ 0x50003400
4,793,934 UART: [idev] ++
4,794,796 UART: [idev] CDI.KEYID = 6
4,795,850 UART: [idev] SUBJECT.KEYID = 7
4,797,237 UART: [idev] UDS.KEYID = 0
4,798,494 ready_for_fw is high
4,798,706 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
4,932,139 UART: [idev] Erasing UDS.KEYID = 0
8,088,473 UART: [idev] Sha1 KeyId Algorithm
8,110,457 UART: [idev] --
8,114,118 UART: [ldev] ++
8,114,685 UART: [ldev] CDI.KEYID = 6
8,115,912 UART: [ldev] SUBJECT.KEYID = 5
8,117,017 UART: [ldev] AUTHORITY.KEYID = 7
8,118,196 UART: [ldev] FE.KEYID = 1
8,130,804 UART: [ldev] Erasing FE.KEYID = 1
11,422,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,274 UART: [ldev] --
13,789,833 UART: [fwproc] Wait for Commands...
13,792,590 UART: [fwproc] Recv command 0x46574c44
13,794,897 UART: [fwproc] Recv'd Img size: 106256 bytes
17,769,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,849,873 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,892,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,208,461 >>> mbox cmd response: success
18,211,755 UART: [afmc] ++
18,212,370 UART: [afmc] CDI.KEYID = 6
18,213,556 UART: [afmc] SUBJECT.KEYID = 7
18,214,657 UART: [afmc] AUTHORITY.KEYID = 5
21,531,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,827,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,830,055 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,846,102 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,862,163 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,878,235 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,900,698 UART: [afmc] --
23,903,645 UART: [cold-reset] --
23,908,339 UART: [state] Locking Datavault
23,914,464 UART: [state] Locking PCR0, PCR1 and PCR31
23,916,307 UART: [state] Locking ICCM
23,918,223 UART: [exit] Launching FMC @ 0x40000000
23,926,866 UART:
23,927,106 UART: Running Caliptra FMC ...
23,928,249 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,693,973 ready_for_fw is high
4,694,347 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,012,865 >>> mbox cmd response: success
23,651,646 UART:
23,652,049 UART: Running Caliptra FMC ...
23,653,220 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,125 UART:
192,498 UART: Running Caliptra ROM ...
193,636 UART:
193,799 UART: [state] CFI Enabled
208,596 UART: [state] LifecycleState = Unprovisioned
210,479 UART: [state] DebugLocked = No
212,570 UART: [state] WD Timer not started. Device not locked for debugging
217,098 UART: [kat] SHA2-256
396,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,787 UART: [kat] ++
408,319 UART: [kat] sha1
419,340 UART: [kat] SHA2-256
422,365 UART: [kat] SHA2-384
429,315 UART: [kat] SHA2-512-ACC
432,263 UART: [kat] ECC-384
2,873,747 UART: [kat] HMAC-384Kdf
2,885,885 UART: [kat] LMS
3,415,325 UART: [kat] --
3,421,048 UART: [cold-reset] ++
3,422,518 UART: [fht] FHT @ 0x50003400
3,433,084 UART: [idev] ++
3,433,662 UART: [idev] CDI.KEYID = 6
3,434,575 UART: [idev] SUBJECT.KEYID = 7
3,435,749 UART: [idev] UDS.KEYID = 0
3,436,675 ready_for_fw is high
3,436,876 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,570,892 UART: [idev] Erasing UDS.KEYID = 0
5,910,026 UART: [idev] Sha1 KeyId Algorithm
5,933,006 UART: [idev] --
5,936,580 UART: [ldev] ++
5,937,154 UART: [ldev] CDI.KEYID = 6
5,938,067 UART: [ldev] SUBJECT.KEYID = 5
5,939,233 UART: [ldev] AUTHORITY.KEYID = 7
5,940,464 UART: [ldev] FE.KEYID = 1
5,952,715 UART: [ldev] Erasing FE.KEYID = 1
8,426,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,485 UART: [ldev] --
10,219,101 UART: [fwproc] Wait for Commands...
10,221,843 UART: [fwproc] Recv command 0x46574c44
10,223,938 UART: [fwproc] Recv'd Img size: 106600 bytes
13,530,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,608,955 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,651,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
13,968,941 >>> mbox cmd response: success
13,972,320 UART: [afmc] ++
13,972,938 UART: [afmc] CDI.KEYID = 6
13,973,827 UART: [afmc] SUBJECT.KEYID = 7
13,975,063 UART: [afmc] AUTHORITY.KEYID = 5
16,474,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,196,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,198,446 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,214,440 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,230,360 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,246,282 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,268,742 UART: [afmc] --
18,271,942 UART: [cold-reset] --
18,276,321 UART: [state] Locking Datavault
18,282,016 UART: [state] Locking PCR0, PCR1 and PCR31
18,283,711 UART: [state] Locking ICCM
18,285,514 UART: [exit] Launching FMC @ 0x40000000
18,293,901 UART:
18,294,152 UART: Running Caliptra FMC ...
18,295,214 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,288,654 ready_for_fw is high
3,289,070 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,749,294 >>> mbox cmd response: success
17,999,275 UART:
17,999,703 UART: Running Caliptra FMC ...
18,000,877 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,361 UART:
192,737 UART: Running Caliptra ROM ...
193,825 UART:
193,988 UART: [state] CFI Enabled
208,923 UART: [state] LifecycleState = Unprovisioned
210,764 UART: [state] DebugLocked = No
212,779 UART: [state] WD Timer not started. Device not locked for debugging
217,373 UART: [kat] SHA2-256
396,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,093 UART: [kat] ++
408,570 UART: [kat] sha1
419,578 UART: [kat] SHA2-256
422,650 UART: [kat] SHA2-384
429,559 UART: [kat] SHA2-512-ACC
432,492 UART: [kat] ECC-384
2,874,011 UART: [kat] HMAC-384Kdf
2,886,177 UART: [kat] LMS
3,415,571 UART: [kat] --
3,421,262 UART: [cold-reset] ++
3,422,781 UART: [fht] FHT @ 0x50003400
3,433,333 UART: [idev] ++
3,433,890 UART: [idev] CDI.KEYID = 6
3,434,841 UART: [idev] SUBJECT.KEYID = 7
3,436,007 UART: [idev] UDS.KEYID = 0
3,436,982 ready_for_fw is high
3,437,194 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,571,253 UART: [idev] Erasing UDS.KEYID = 0
5,910,321 UART: [idev] Sha1 KeyId Algorithm
5,933,281 UART: [idev] --
5,936,842 UART: [ldev] ++
5,937,410 UART: [ldev] CDI.KEYID = 6
5,938,479 UART: [ldev] SUBJECT.KEYID = 5
5,939,581 UART: [ldev] AUTHORITY.KEYID = 7
5,940,752 UART: [ldev] FE.KEYID = 1
5,952,990 UART: [ldev] Erasing FE.KEYID = 1
8,427,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,763 UART: [ldev] --
10,219,390 UART: [fwproc] Wait for Commands...
10,222,128 UART: [fwproc] Recv command 0x46574c44
10,224,215 UART: [fwproc] Recv'd Img size: 106600 bytes
13,530,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,609,202 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,651,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
13,969,162 >>> mbox cmd response: success
13,972,624 UART: [afmc] ++
13,973,232 UART: [afmc] CDI.KEYID = 6
13,974,161 UART: [afmc] SUBJECT.KEYID = 7
13,975,285 UART: [afmc] AUTHORITY.KEYID = 5
16,475,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,196,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,198,704 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,214,685 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,230,617 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,246,541 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,269,009 UART: [afmc] --
18,272,148 UART: [cold-reset] --
18,276,584 UART: [state] Locking Datavault
18,282,310 UART: [state] Locking PCR0, PCR1 and PCR31
18,283,989 UART: [state] Locking ICCM
18,285,814 UART: [exit] Launching FMC @ 0x40000000
18,294,178 UART:
18,294,432 UART: Running Caliptra FMC ...
18,295,572 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,288,779 ready_for_fw is high
3,289,147 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,749,437 >>> mbox cmd response: success
17,999,454 UART:
17,999,836 UART: Running Caliptra FMC ...
18,001,106 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,133 UART:
192,517 UART: Running Caliptra ROM ...
193,711 UART:
193,864 UART: [state] CFI Enabled
208,648 UART: [state] LifecycleState = Unprovisioned
210,507 UART: [state] DebugLocked = No
212,527 UART: [state] WD Timer not started. Device not locked for debugging
217,118 UART: [kat] SHA2-256
396,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,824 UART: [kat] ++
408,358 UART: [kat] sha1
419,338 UART: [kat] SHA2-256
422,388 UART: [kat] SHA2-384
429,319 UART: [kat] SHA2-512-ACC
432,288 UART: [kat] ECC-384
2,873,749 UART: [kat] HMAC-384Kdf
2,885,930 UART: [kat] LMS
3,415,360 UART: [kat] --
3,421,062 UART: [cold-reset] ++
3,422,572 UART: [fht] FHT @ 0x50003400
3,433,059 UART: [idev] ++
3,433,623 UART: [idev] CDI.KEYID = 6
3,434,657 UART: [idev] SUBJECT.KEYID = 7
3,435,763 UART: [idev] UDS.KEYID = 0
3,436,701 ready_for_fw is high
3,436,886 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,570,843 UART: [idev] Erasing UDS.KEYID = 0
5,910,018 UART: [idev] Sha1 KeyId Algorithm
5,932,976 UART: [idev] --
5,936,589 UART: [ldev] ++
5,937,173 UART: [ldev] CDI.KEYID = 6
5,938,082 UART: [ldev] SUBJECT.KEYID = 5
5,939,246 UART: [ldev] AUTHORITY.KEYID = 7
5,940,478 UART: [ldev] FE.KEYID = 1
5,952,771 UART: [ldev] Erasing FE.KEYID = 1
8,426,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,518 UART: [ldev] --
10,219,137 UART: [fwproc] Wait for Commands...
10,221,888 UART: [fwproc] Recv command 0x46574c44
10,223,929 UART: [fwproc] Recv'd Img size: 106600 bytes
13,530,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,608,962 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,651,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
13,968,928 >>> mbox cmd response: success
13,972,381 UART: [afmc] ++
13,973,003 UART: [afmc] CDI.KEYID = 6
13,973,932 UART: [afmc] SUBJECT.KEYID = 7
13,975,044 UART: [afmc] AUTHORITY.KEYID = 5
16,474,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,196,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,198,488 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,214,423 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,230,394 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,246,309 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,268,758 UART: [afmc] --
18,271,923 UART: [cold-reset] --
18,276,376 UART: [state] Locking Datavault
18,282,077 UART: [state] Locking PCR0, PCR1 and PCR31
18,283,775 UART: [state] Locking ICCM
18,285,550 UART: [exit] Launching FMC @ 0x40000000
18,293,938 UART:
18,294,194 UART: Running Caliptra FMC ...
18,295,338 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,288,470 ready_for_fw is high
3,289,036 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,749,100 >>> mbox cmd response: success
17,999,064 UART:
17,999,459 UART: Running Caliptra FMC ...
18,000,722 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,490 UART:
192,842 UART: Running Caliptra ROM ...
194,029 UART:
194,182 UART: [state] CFI Enabled
208,965 UART: [state] LifecycleState = Unprovisioned
210,837 UART: [state] DebugLocked = No
212,926 UART: [state] WD Timer not started. Device not locked for debugging
217,465 UART: [kat] SHA2-256
396,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,141 UART: [kat] ++
408,590 UART: [kat] sha1
419,673 UART: [kat] SHA2-256
422,684 UART: [kat] SHA2-384
429,672 UART: [kat] SHA2-512-ACC
432,605 UART: [kat] ECC-384
2,874,110 UART: [kat] HMAC-384Kdf
2,886,217 UART: [kat] LMS
3,415,690 UART: [kat] --
3,421,420 UART: [cold-reset] ++
3,422,856 UART: [fht] FHT @ 0x50003400
3,433,432 UART: [idev] ++
3,434,042 UART: [idev] CDI.KEYID = 6
3,434,938 UART: [idev] SUBJECT.KEYID = 7
3,436,131 UART: [idev] UDS.KEYID = 0
3,437,213 ready_for_fw is high
3,437,419 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,571,249 UART: [idev] Erasing UDS.KEYID = 0
5,910,383 UART: [idev] Sha1 KeyId Algorithm
5,933,355 UART: [idev] --
5,936,912 UART: [ldev] ++
5,937,476 UART: [ldev] CDI.KEYID = 6
5,938,409 UART: [ldev] SUBJECT.KEYID = 5
5,939,613 UART: [ldev] AUTHORITY.KEYID = 7
5,940,838 UART: [ldev] FE.KEYID = 1
5,953,077 UART: [ldev] Erasing FE.KEYID = 1
8,427,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,163,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,896 UART: [ldev] --
10,219,458 UART: [fwproc] Wait for Commands...
10,222,200 UART: [fwproc] Recv command 0x46574c44
10,224,291 UART: [fwproc] Recv'd Img size: 106600 bytes
13,530,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,609,276 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,651,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
13,969,238 >>> mbox cmd response: success
13,972,701 UART: [afmc] ++
13,973,309 UART: [afmc] CDI.KEYID = 6
13,974,239 UART: [afmc] SUBJECT.KEYID = 7
13,975,344 UART: [afmc] AUTHORITY.KEYID = 5
16,475,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,196,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,198,772 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,214,778 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,230,698 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,246,647 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,269,056 UART: [afmc] --
18,272,253 UART: [cold-reset] --
18,276,682 UART: [state] Locking Datavault
18,282,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,284,036 UART: [state] Locking ICCM
18,285,905 UART: [exit] Launching FMC @ 0x40000000
18,294,283 UART:
18,294,527 UART: Running Caliptra FMC ...
18,295,665 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,288,873 ready_for_fw is high
3,289,245 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,749,485 >>> mbox cmd response: success
17,999,465 UART:
17,999,858 UART: Running Caliptra FMC ...
18,001,107 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,739 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,674,314 >>> mbox cmd response: success
2,675,335 UART: [afmc] ++
2,675,503 UART: [afmc] CDI.KEYID = 6
2,675,866 UART: [afmc] SUBJECT.KEYID = 7
2,676,292 UART: [afmc] AUTHORITY.KEYID = 5
2,712,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,474 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,194 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,087 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,780 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,583 UART: [afmc] --
2,755,495 UART: [cold-reset] --
2,756,433 UART: [state] Locking Datavault
2,757,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,278 UART: [state] Locking ICCM
2,758,818 UART: [exit] Launching FMC @ 0x40000000
2,764,115 UART:
2,764,131 UART: Running Caliptra FMC ...
2,764,539 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,180 >>> mbox cmd response: success
2,586,648 UART:
2,586,664 UART: Running Caliptra FMC ...
2,587,072 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,063 UART:
192,448 UART: Running Caliptra ROM ...
193,558 UART:
193,700 UART: [state] CFI Enabled
265,728 UART: [state] LifecycleState = Unprovisioned
268,115 UART: [state] DebugLocked = No
271,031 UART: [state] WD Timer not started. Device not locked for debugging
275,231 UART: [kat] SHA2-256
457,194 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,720 UART: [kat] ++
469,171 UART: [kat] sha1
479,891 UART: [kat] SHA2-256
482,927 UART: [kat] SHA2-384
488,252 UART: [kat] SHA2-512-ACC
490,879 UART: [kat] ECC-384
3,779,792 UART: [kat] HMAC-384Kdf
3,803,599 UART: [kat] LMS
4,876,770 UART: [kat] --
4,881,743 UART: [cold-reset] ++
4,883,675 UART: [fht] FHT @ 0x50003400
4,895,957 UART: [idev] ++
4,896,640 UART: [idev] CDI.KEYID = 6
4,897,877 UART: [idev] SUBJECT.KEYID = 7
4,898,978 UART: [idev] UDS.KEYID = 0
4,932,179 UART: [idev] Erasing UDS.KEYID = 0
8,245,900 UART: [idev] Sha1 KeyId Algorithm
8,267,026 UART: [idev] --
8,272,569 UART: [ldev] ++
8,273,153 UART: [ldev] CDI.KEYID = 6
8,274,325 UART: [ldev] SUBJECT.KEYID = 5
8,275,539 UART: [ldev] AUTHORITY.KEYID = 7
8,276,690 UART: [ldev] FE.KEYID = 1
8,319,072 UART: [ldev] Erasing FE.KEYID = 1
11,654,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,946,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,962,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,978,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,994,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,660 UART: [ldev] --
14,160,414 UART: [fwproc] Wait for Commands...
14,161,819 UART: [fwproc] Recv command 0x46574c44
14,163,257 UART: [fwproc] Recv'd Img size: 113760 bytes
18,236,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,309,456 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,378,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,697,949 UART: [afmc] ++
18,698,566 UART: [afmc] CDI.KEYID = 6
18,699,626 UART: [afmc] SUBJECT.KEYID = 7
18,700,846 UART: [afmc] AUTHORITY.KEYID = 5
22,054,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,352,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,354,404 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,370,636 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,386,614 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,402,583 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,426,659 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,412 UART:
192,801 UART: Running Caliptra ROM ...
193,985 UART:
603,553 UART: [state] CFI Enabled
618,677 UART: [state] LifecycleState = Unprovisioned
621,020 UART: [state] DebugLocked = No
622,452 UART: [state] WD Timer not started. Device not locked for debugging
626,624 UART: [kat] SHA2-256
808,596 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,107 UART: [kat] ++
820,686 UART: [kat] sha1
831,780 UART: [kat] SHA2-256
834,842 UART: [kat] SHA2-384
841,510 UART: [kat] SHA2-512-ACC
844,118 UART: [kat] ECC-384
4,096,856 UART: [kat] HMAC-384Kdf
4,108,197 UART: [kat] LMS
5,181,361 UART: [kat] --
5,187,371 UART: [cold-reset] ++
5,189,496 UART: [fht] FHT @ 0x50003400
5,201,319 UART: [idev] ++
5,202,049 UART: [idev] CDI.KEYID = 6
5,203,230 UART: [idev] SUBJECT.KEYID = 7
5,204,660 UART: [idev] UDS.KEYID = 0
5,222,694 UART: [idev] Erasing UDS.KEYID = 0
8,496,297 UART: [idev] Sha1 KeyId Algorithm
8,518,216 UART: [idev] --
8,522,359 UART: [ldev] ++
8,522,923 UART: [ldev] CDI.KEYID = 6
8,524,157 UART: [ldev] SUBJECT.KEYID = 5
8,525,595 UART: [ldev] AUTHORITY.KEYID = 7
8,527,156 UART: [ldev] FE.KEYID = 1
8,537,800 UART: [ldev] Erasing FE.KEYID = 1
11,831,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,459 UART: [ldev] --
14,340,150 UART: [fwproc] Wait for Commands...
14,341,549 UART: [fwproc] Recv command 0x46574c44
14,342,949 UART: [fwproc] Recv'd Img size: 113760 bytes
18,415,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,490,568 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,559,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,879,401 UART: [afmc] ++
18,880,008 UART: [afmc] CDI.KEYID = 6
18,881,204 UART: [afmc] SUBJECT.KEYID = 7
18,882,304 UART: [afmc] AUTHORITY.KEYID = 5
22,202,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,496,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,498,831 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,514,991 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,531,056 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,547,050 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,569,878 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,013 UART:
192,405 UART: Running Caliptra ROM ...
193,617 UART:
193,768 UART: [state] CFI Enabled
263,452 UART: [state] LifecycleState = Unprovisioned
265,349 UART: [state] DebugLocked = No
267,867 UART: [state] WD Timer not started. Device not locked for debugging
271,427 UART: [kat] SHA2-256
450,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,120 UART: [kat] ++
462,651 UART: [kat] sha1
473,207 UART: [kat] SHA2-256
476,223 UART: [kat] SHA2-384
482,580 UART: [kat] SHA2-512-ACC
485,566 UART: [kat] ECC-384
2,955,170 UART: [kat] HMAC-384Kdf
2,974,155 UART: [kat] LMS
3,503,577 UART: [kat] --
3,508,381 UART: [cold-reset] ++
3,510,783 UART: [fht] FHT @ 0x50003400
3,522,304 UART: [idev] ++
3,522,890 UART: [idev] CDI.KEYID = 6
3,523,802 UART: [idev] SUBJECT.KEYID = 7
3,524,965 UART: [idev] UDS.KEYID = 0
3,545,753 UART: [idev] Erasing UDS.KEYID = 0
6,028,421 UART: [idev] Sha1 KeyId Algorithm
6,051,746 UART: [idev] --
6,054,789 UART: [ldev] ++
6,055,368 UART: [ldev] CDI.KEYID = 6
6,056,280 UART: [ldev] SUBJECT.KEYID = 5
6,057,443 UART: [ldev] AUTHORITY.KEYID = 7
6,058,742 UART: [ldev] FE.KEYID = 1
6,103,232 UART: [ldev] Erasing FE.KEYID = 1
8,605,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,829 UART: [ldev] --
10,558,194 UART: [fwproc] Wait for Commands...
10,559,598 UART: [fwproc] Recv command 0x46574c44
10,561,345 UART: [fwproc] Recv'd Img size: 114084 bytes
13,958,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,028,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,097,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,419,458 UART: [afmc] ++
14,420,071 UART: [afmc] CDI.KEYID = 6
14,420,965 UART: [afmc] SUBJECT.KEYID = 7
14,422,067 UART: [afmc] AUTHORITY.KEYID = 5
16,963,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,688,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,690,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,705,959 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,722,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,737,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,759,301 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,581 UART:
192,956 UART: Running Caliptra ROM ...
194,079 UART:
603,522 UART: [state] CFI Enabled
618,520 UART: [state] LifecycleState = Unprovisioned
620,411 UART: [state] DebugLocked = No
622,219 UART: [state] WD Timer not started. Device not locked for debugging
625,597 UART: [kat] SHA2-256
804,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,321 UART: [kat] ++
816,765 UART: [kat] sha1
828,232 UART: [kat] SHA2-256
831,235 UART: [kat] SHA2-384
838,575 UART: [kat] SHA2-512-ACC
841,501 UART: [kat] ECC-384
3,281,378 UART: [kat] HMAC-384Kdf
3,293,181 UART: [kat] LMS
3,822,679 UART: [kat] --
3,827,567 UART: [cold-reset] ++
3,829,207 UART: [fht] FHT @ 0x50003400
3,840,002 UART: [idev] ++
3,840,633 UART: [idev] CDI.KEYID = 6
3,841,554 UART: [idev] SUBJECT.KEYID = 7
3,842,716 UART: [idev] UDS.KEYID = 0
3,856,749 UART: [idev] Erasing UDS.KEYID = 0
6,310,240 UART: [idev] Sha1 KeyId Algorithm
6,333,097 UART: [idev] --
6,337,938 UART: [ldev] ++
6,338,512 UART: [ldev] CDI.KEYID = 6
6,339,437 UART: [ldev] SUBJECT.KEYID = 5
6,340,596 UART: [ldev] AUTHORITY.KEYID = 7
6,341,881 UART: [ldev] FE.KEYID = 1
6,353,386 UART: [ldev] Erasing FE.KEYID = 1
8,831,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,781 UART: [ldev] --
10,762,634 UART: [fwproc] Wait for Commands...
10,764,026 UART: [fwproc] Recv command 0x46574c44
10,765,494 UART: [fwproc] Recv'd Img size: 114084 bytes
14,167,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,634,188 UART: [afmc] ++
14,634,803 UART: [afmc] CDI.KEYID = 6
14,635,720 UART: [afmc] SUBJECT.KEYID = 7
14,636,827 UART: [afmc] AUTHORITY.KEYID = 5
17,138,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,857,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,859,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,875,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,891,208 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,907,055 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,929,297 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,940 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,102 UART:
192,476 UART: Running Caliptra ROM ...
193,691 UART:
194,264 UART: [state] CFI Enabled
265,152 UART: [state] LifecycleState = Unprovisioned
267,038 UART: [state] DebugLocked = No
269,452 UART: [state] WD Timer not started. Device not locked for debugging
272,357 UART: [kat] SHA2-256
451,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,057 UART: [kat] ++
463,511 UART: [kat] sha1
475,090 UART: [kat] SHA2-256
478,157 UART: [kat] SHA2-384
485,380 UART: [kat] SHA2-512-ACC
488,318 UART: [kat] ECC-384
2,947,388 UART: [kat] HMAC-384Kdf
2,972,120 UART: [kat] LMS
3,501,622 UART: [kat] --
3,505,012 UART: [cold-reset] ++
3,507,608 UART: [fht] FHT @ 0x50003400
3,518,327 UART: [idev] ++
3,518,890 UART: [idev] CDI.KEYID = 6
3,519,797 UART: [idev] SUBJECT.KEYID = 7
3,521,015 UART: [idev] UDS.KEYID = 0
3,543,918 UART: [idev] Erasing UDS.KEYID = 0
6,039,298 UART: [idev] Sha1 KeyId Algorithm
6,061,430 UART: [idev] --
6,064,988 UART: [ldev] ++
6,065,566 UART: [ldev] CDI.KEYID = 6
6,066,479 UART: [ldev] SUBJECT.KEYID = 5
6,067,701 UART: [ldev] AUTHORITY.KEYID = 7
6,068,936 UART: [ldev] FE.KEYID = 1
6,108,704 UART: [ldev] Erasing FE.KEYID = 1
8,609,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,443 UART: [ldev] --
10,563,212 UART: [fwproc] Wait for Commands...
10,564,623 UART: [fwproc] Recv command 0x46574c44
10,565,985 UART: [fwproc] Recv'd Img size: 114084 bytes
13,975,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,047,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,116,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,436,803 UART: [afmc] ++
14,437,422 UART: [afmc] CDI.KEYID = 6
14,438,316 UART: [afmc] SUBJECT.KEYID = 7
14,439,483 UART: [afmc] AUTHORITY.KEYID = 5
16,959,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,689,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,691,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,707,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,723,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,739,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,762,557 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,482 UART:
192,872 UART: Running Caliptra ROM ...
193,996 UART:
603,419 UART: [state] CFI Enabled
618,844 UART: [state] LifecycleState = Unprovisioned
620,719 UART: [state] DebugLocked = No
622,202 UART: [state] WD Timer not started. Device not locked for debugging
626,609 UART: [kat] SHA2-256
805,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,315 UART: [kat] ++
817,991 UART: [kat] sha1
829,183 UART: [kat] SHA2-256
832,189 UART: [kat] SHA2-384
839,357 UART: [kat] SHA2-512-ACC
842,341 UART: [kat] ECC-384
3,286,391 UART: [kat] HMAC-384Kdf
3,298,879 UART: [kat] LMS
3,828,351 UART: [kat] --
3,834,598 UART: [cold-reset] ++
3,836,569 UART: [fht] FHT @ 0x50003400
3,847,331 UART: [idev] ++
3,847,891 UART: [idev] CDI.KEYID = 6
3,848,905 UART: [idev] SUBJECT.KEYID = 7
3,850,062 UART: [idev] UDS.KEYID = 0
3,867,158 UART: [idev] Erasing UDS.KEYID = 0
6,322,899 UART: [idev] Sha1 KeyId Algorithm
6,346,429 UART: [idev] --
6,350,435 UART: [ldev] ++
6,351,014 UART: [ldev] CDI.KEYID = 6
6,351,901 UART: [ldev] SUBJECT.KEYID = 5
6,353,110 UART: [ldev] AUTHORITY.KEYID = 7
6,354,336 UART: [ldev] FE.KEYID = 1
6,365,249 UART: [ldev] Erasing FE.KEYID = 1
8,840,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,107 UART: [ldev] --
10,774,174 UART: [fwproc] Wait for Commands...
10,775,638 UART: [fwproc] Recv command 0x46574c44
10,776,965 UART: [fwproc] Recv'd Img size: 114084 bytes
14,172,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,248,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,317,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,638,142 UART: [afmc] ++
14,638,752 UART: [afmc] CDI.KEYID = 6
14,639,667 UART: [afmc] SUBJECT.KEYID = 7
14,640,822 UART: [afmc] AUTHORITY.KEYID = 5
17,142,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,863,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,865,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,913,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,376 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,319 UART: [idev] ++
1,173,487 UART: [idev] CDI.KEYID = 6
1,173,848 UART: [idev] SUBJECT.KEYID = 7
1,174,273 UART: [idev] UDS.KEYID = 0
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,215,830 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,271 UART: [fwproc] Recv command 0x46574c44
1,283,004 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,104 UART: [afmc] ++
2,771,272 UART: [afmc] CDI.KEYID = 6
2,771,635 UART: [afmc] SUBJECT.KEYID = 7
2,772,061 UART: [afmc] AUTHORITY.KEYID = 5
2,807,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,693 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,935 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,551 UART: [afmc] ++
2,771,719 UART: [afmc] CDI.KEYID = 6
2,772,082 UART: [afmc] SUBJECT.KEYID = 7
2,772,508 UART: [afmc] AUTHORITY.KEYID = 5
2,807,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,020 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,351 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,244 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,049 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,244 UART: [fwproc] Wait for Commands...
1,280,923 UART: [fwproc] Recv command 0x46574c44
1,281,656 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,528 UART: [afmc] ++
2,769,696 UART: [afmc] CDI.KEYID = 6
2,770,059 UART: [afmc] SUBJECT.KEYID = 7
2,770,485 UART: [afmc] AUTHORITY.KEYID = 5
2,805,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,253 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,245 UART: [afmc] ++
2,770,413 UART: [afmc] CDI.KEYID = 6
2,770,776 UART: [afmc] SUBJECT.KEYID = 7
2,771,202 UART: [afmc] AUTHORITY.KEYID = 5
2,805,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,046 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,377 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,250 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,181,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,425 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,214,924 UART: [ldev] Erasing FE.KEYID = 1
1,241,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,956 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,135 UART: [fwproc] Recv command 0x46574c44
1,281,868 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,424 UART: [afmc] ++
2,770,592 UART: [afmc] CDI.KEYID = 6
2,770,955 UART: [afmc] SUBJECT.KEYID = 7
2,771,381 UART: [afmc] AUTHORITY.KEYID = 5
2,806,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,010 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,919 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,593 UART: [kat] HMAC-384Kdf
921,263 UART: [kat] LMS
1,169,575 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,786 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,234 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,107 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,473 UART: [afmc] ++
2,770,641 UART: [afmc] CDI.KEYID = 6
2,771,004 UART: [afmc] SUBJECT.KEYID = 7
2,771,430 UART: [afmc] AUTHORITY.KEYID = 5
2,807,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,716 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
192,178 UART:
192,540 UART: Running Caliptra ROM ...
193,715 UART:
193,868 UART: [state] CFI Enabled
261,292 UART: [state] LifecycleState = Unprovisioned
263,707 UART: [state] DebugLocked = No
265,687 UART: [state] WD Timer not started. Device not locked for debugging
270,778 UART: [kat] SHA2-256
452,744 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,218 UART: [kat] ++
464,739 UART: [kat] sha1
475,967 UART: [kat] SHA2-256
478,978 UART: [kat] SHA2-384
483,693 UART: [kat] SHA2-512-ACC
486,285 UART: [kat] ECC-384
3,773,044 UART: [kat] HMAC-384Kdf
3,799,839 UART: [kat] LMS
4,873,003 UART: [kat] --
4,876,387 UART: [cold-reset] ++
4,877,900 UART: [fht] FHT @ 0x50003400
4,889,585 UART: [idev] ++
4,890,231 UART: [idev] CDI.KEYID = 6
4,891,480 UART: [idev] SUBJECT.KEYID = 7
4,892,584 UART: [idev] UDS.KEYID = 0
4,893,514 ready_for_fw is high
4,893,748 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,027,450 UART: [idev] Erasing UDS.KEYID = 0
8,242,227 UART: [idev] Sha1 KeyId Algorithm
8,263,403 UART: [idev] --
8,267,235 UART: [ldev] ++
8,267,801 UART: [ldev] CDI.KEYID = 6
8,269,037 UART: [ldev] SUBJECT.KEYID = 5
8,270,211 UART: [ldev] AUTHORITY.KEYID = 7
8,271,306 UART: [ldev] FE.KEYID = 1
8,316,810 UART: [ldev] Erasing FE.KEYID = 1
11,651,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,844 UART: [ldev] --
14,036,429 UART: [fwproc] Wait for Commands...
14,039,228 UART: [fwproc] Recv command 0x46574c44
14,041,541 UART: [fwproc] Recv'd Img size: 106256 bytes
18,024,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,097,071 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,139,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,454,706 >>> mbox cmd response: success
18,458,387 UART: [afmc] ++
18,458,997 UART: [afmc] CDI.KEYID = 6
18,460,184 UART: [afmc] SUBJECT.KEYID = 7
18,461,283 UART: [afmc] AUTHORITY.KEYID = 5
21,824,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,140,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,143,048 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,159,040 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,175,115 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,191,221 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,215,212 UART: [afmc] --
24,219,326 UART: [cold-reset] --
24,222,012 UART: [state] Locking Datavault
24,227,221 UART: [state] Locking PCR0, PCR1 and PCR31
24,228,938 UART: [state] Locking ICCM
24,230,640 UART: [exit] Launching FMC @ 0x40000000
24,239,313 UART:
24,239,556 UART: Running Caliptra FMC ...
24,240,822 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
4,781,527 ready_for_fw is high
4,782,037 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,210,576 >>> mbox cmd response: success
23,907,500 UART:
23,907,929 UART: Running Caliptra FMC ...
23,909,209 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,422 UART:
192,784 UART: Running Caliptra ROM ...
193,954 UART:
603,792 UART: [state] CFI Enabled
620,990 UART: [state] LifecycleState = Unprovisioned
623,364 UART: [state] DebugLocked = No
626,096 UART: [state] WD Timer not started. Device not locked for debugging
629,996 UART: [kat] SHA2-256
812,014 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,524 UART: [kat] ++
824,122 UART: [kat] sha1
834,568 UART: [kat] SHA2-256
837,638 UART: [kat] SHA2-384
843,536 UART: [kat] SHA2-512-ACC
846,199 UART: [kat] ECC-384
4,102,740 UART: [kat] HMAC-384Kdf
4,114,057 UART: [kat] LMS
5,187,197 UART: [kat] --
5,191,007 UART: [cold-reset] ++
5,192,305 UART: [fht] FHT @ 0x50003400
5,204,339 UART: [idev] ++
5,205,043 UART: [idev] CDI.KEYID = 6
5,206,217 UART: [idev] SUBJECT.KEYID = 7
5,207,689 UART: [idev] UDS.KEYID = 0
5,208,874 ready_for_fw is high
5,209,066 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,342,621 UART: [idev] Erasing UDS.KEYID = 0
8,498,506 UART: [idev] Sha1 KeyId Algorithm
8,521,205 UART: [idev] --
8,526,315 UART: [ldev] ++
8,526,889 UART: [ldev] CDI.KEYID = 6
8,528,121 UART: [ldev] SUBJECT.KEYID = 5
8,529,597 UART: [ldev] AUTHORITY.KEYID = 7
8,531,069 UART: [ldev] FE.KEYID = 1
8,542,467 UART: [ldev] Erasing FE.KEYID = 1
11,837,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,146,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,162,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,178,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,305 UART: [ldev] --
14,203,036 UART: [fwproc] Wait for Commands...
14,205,468 UART: [fwproc] Recv command 0x46574c44
14,207,771 UART: [fwproc] Recv'd Img size: 106256 bytes
18,175,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,245,196 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,287,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,603,433 >>> mbox cmd response: success
18,608,203 UART: [afmc] ++
18,608,821 UART: [afmc] CDI.KEYID = 6
18,610,004 UART: [afmc] SUBJECT.KEYID = 7
18,611,163 UART: [afmc] AUTHORITY.KEYID = 5
21,930,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,228,912 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,244,936 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,260,979 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,277,073 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,782 UART: [afmc] --
24,304,093 UART: [cold-reset] --
24,308,712 UART: [state] Locking Datavault
24,314,916 UART: [state] Locking PCR0, PCR1 and PCR31
24,316,640 UART: [state] Locking ICCM
24,319,570 UART: [exit] Launching FMC @ 0x40000000
24,328,139 UART:
24,328,379 UART: Running Caliptra FMC ...
24,329,437 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
5,102,233 ready_for_fw is high
5,102,651 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,398,462 >>> mbox cmd response: success
24,030,117 UART:
24,030,606 UART: Running Caliptra FMC ...
24,031,845 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,258 UART:
192,628 UART: Running Caliptra ROM ...
193,803 UART:
193,956 UART: [state] CFI Enabled
259,719 UART: [state] LifecycleState = Unprovisioned
261,569 UART: [state] DebugLocked = No
264,139 UART: [state] WD Timer not started. Device not locked for debugging
266,972 UART: [kat] SHA2-256
446,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,679 UART: [kat] ++
458,213 UART: [kat] sha1
468,116 UART: [kat] SHA2-256
471,162 UART: [kat] SHA2-384
476,166 UART: [kat] SHA2-512-ACC
479,111 UART: [kat] ECC-384
2,924,058 UART: [kat] HMAC-384Kdf
2,946,886 UART: [kat] LMS
3,476,295 UART: [kat] --
3,480,507 UART: [cold-reset] ++
3,482,300 UART: [fht] FHT @ 0x50003400
3,492,715 UART: [idev] ++
3,493,278 UART: [idev] CDI.KEYID = 6
3,494,195 UART: [idev] SUBJECT.KEYID = 7
3,495,371 UART: [idev] UDS.KEYID = 0
3,496,370 ready_for_fw is high
3,496,563 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,630,688 UART: [idev] Erasing UDS.KEYID = 0
6,000,556 UART: [idev] Sha1 KeyId Algorithm
6,024,171 UART: [idev] --
6,026,873 UART: [ldev] ++
6,027,449 UART: [ldev] CDI.KEYID = 6
6,028,339 UART: [ldev] SUBJECT.KEYID = 5
6,029,474 UART: [ldev] AUTHORITY.KEYID = 7
6,030,816 UART: [ldev] FE.KEYID = 1
6,076,067 UART: [ldev] Erasing FE.KEYID = 1
8,576,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,665 UART: [ldev] --
10,389,232 UART: [fwproc] Wait for Commands...
10,390,884 UART: [fwproc] Recv command 0x46574c44
10,392,988 UART: [fwproc] Recv'd Img size: 106600 bytes
13,700,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,771,277 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,813,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,131,499 >>> mbox cmd response: success
14,136,579 UART: [afmc] ++
14,137,196 UART: [afmc] CDI.KEYID = 6
14,138,111 UART: [afmc] SUBJECT.KEYID = 7
14,139,219 UART: [afmc] AUTHORITY.KEYID = 5
16,675,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,402,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,404,550 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,420,535 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,436,464 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,452,370 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,473,582 UART: [afmc] --
18,478,151 UART: [cold-reset] --
18,482,738 UART: [state] Locking Datavault
18,485,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,487,053 UART: [state] Locking ICCM
18,488,155 UART: [exit] Launching FMC @ 0x40000000
18,496,568 UART:
18,496,822 UART: Running Caliptra FMC ...
18,497,964 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,379,566 ready_for_fw is high
3,379,994 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,963,882 >>> mbox cmd response: success
18,259,323 UART:
18,259,729 UART: Running Caliptra FMC ...
18,260,907 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,521 UART:
192,883 UART: Running Caliptra ROM ...
194,061 UART:
603,718 UART: [state] CFI Enabled
618,297 UART: [state] LifecycleState = Unprovisioned
620,165 UART: [state] DebugLocked = No
622,704 UART: [state] WD Timer not started. Device not locked for debugging
626,228 UART: [kat] SHA2-256
805,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,963 UART: [kat] ++
817,495 UART: [kat] sha1
828,797 UART: [kat] SHA2-256
831,793 UART: [kat] SHA2-384
837,777 UART: [kat] SHA2-512-ACC
840,707 UART: [kat] ECC-384
3,282,569 UART: [kat] HMAC-384Kdf
3,293,733 UART: [kat] LMS
3,823,215 UART: [kat] --
3,827,563 UART: [cold-reset] ++
3,829,983 UART: [fht] FHT @ 0x50003400
3,841,403 UART: [idev] ++
3,842,008 UART: [idev] CDI.KEYID = 6
3,842,953 UART: [idev] SUBJECT.KEYID = 7
3,844,057 UART: [idev] UDS.KEYID = 0
3,844,981 ready_for_fw is high
3,845,169 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,978,944 UART: [idev] Erasing UDS.KEYID = 0
6,312,081 UART: [idev] Sha1 KeyId Algorithm
6,334,169 UART: [idev] --
6,339,376 UART: [ldev] ++
6,339,952 UART: [ldev] CDI.KEYID = 6
6,340,862 UART: [ldev] SUBJECT.KEYID = 5
6,342,071 UART: [ldev] AUTHORITY.KEYID = 7
6,343,299 UART: [ldev] FE.KEYID = 1
6,354,268 UART: [ldev] Erasing FE.KEYID = 1
8,829,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,107 UART: [ldev] --
10,622,447 UART: [fwproc] Wait for Commands...
10,625,520 UART: [fwproc] Recv command 0x46574c44
10,627,608 UART: [fwproc] Recv'd Img size: 106600 bytes
13,932,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,736 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,357,963 >>> mbox cmd response: success
14,362,343 UART: [afmc] ++
14,362,949 UART: [afmc] CDI.KEYID = 6
14,363,834 UART: [afmc] SUBJECT.KEYID = 7
14,365,048 UART: [afmc] AUTHORITY.KEYID = 5
16,866,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,587,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,589,502 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,605,454 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,621,425 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,637,351 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,659,264 UART: [afmc] --
18,663,462 UART: [cold-reset] --
18,667,611 UART: [state] Locking Datavault
18,673,177 UART: [state] Locking PCR0, PCR1 and PCR31
18,674,888 UART: [state] Locking ICCM
18,677,033 UART: [exit] Launching FMC @ 0x40000000
18,685,427 UART:
18,685,673 UART: Running Caliptra FMC ...
18,686,814 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,700,361 ready_for_fw is high
3,701,282 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,143,394 >>> mbox cmd response: success
18,391,431 UART:
18,391,837 UART: Running Caliptra FMC ...
18,393,005 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,691 writing to cptra_bootfsm_go
192,950 UART:
193,820 UART: Running Caliptra ROM ...
194,991 UART:
195,239 UART: [state] CFI Enabled
261,969 UART: [state] LifecycleState = Unprovisioned
263,899 UART: [state] DebugLocked = No
265,082 UART: [state] WD Timer not started. Device not locked for debugging
268,065 UART: [kat] SHA2-256
447,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,778 UART: [kat] ++
459,308 UART: [kat] sha1
470,974 UART: [kat] SHA2-256
474,048 UART: [kat] SHA2-384
478,833 UART: [kat] SHA2-512-ACC
481,824 UART: [kat] ECC-384
2,948,863 UART: [kat] HMAC-384Kdf
2,970,274 UART: [kat] LMS
3,499,780 UART: [kat] --
3,505,055 UART: [cold-reset] ++
3,507,134 UART: [fht] FHT @ 0x50003400
3,518,146 UART: [idev] ++
3,518,753 UART: [idev] CDI.KEYID = 6
3,519,669 UART: [idev] SUBJECT.KEYID = 7
3,520,848 UART: [idev] UDS.KEYID = 0
3,521,771 ready_for_fw is high
3,521,983 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,656,008 UART: [idev] Erasing UDS.KEYID = 0
6,024,650 UART: [idev] Sha1 KeyId Algorithm
6,047,561 UART: [idev] --
6,049,993 UART: [ldev] ++
6,050,568 UART: [ldev] CDI.KEYID = 6
6,051,478 UART: [ldev] SUBJECT.KEYID = 5
6,052,640 UART: [ldev] AUTHORITY.KEYID = 7
6,053,926 UART: [ldev] FE.KEYID = 1
6,097,731 UART: [ldev] Erasing FE.KEYID = 1
8,600,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,616 UART: [ldev] --
10,409,015 UART: [fwproc] Wait for Commands...
10,411,434 UART: [fwproc] Recv command 0x46574c44
10,413,525 UART: [fwproc] Recv'd Img size: 106600 bytes
13,720,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,795,220 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,837,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,154,791 >>> mbox cmd response: success
14,158,971 UART: [afmc] ++
14,159,597 UART: [afmc] CDI.KEYID = 6
14,160,515 UART: [afmc] SUBJECT.KEYID = 7
14,161,619 UART: [afmc] AUTHORITY.KEYID = 5
16,693,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,418,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,419,965 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,435,936 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,451,828 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,467,794 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,490,237 UART: [afmc] --
18,494,358 UART: [cold-reset] --
18,497,971 UART: [state] Locking Datavault
18,503,799 UART: [state] Locking PCR0, PCR1 and PCR31
18,505,485 UART: [state] Locking ICCM
18,506,933 UART: [exit] Launching FMC @ 0x40000000
18,515,360 UART:
18,515,620 UART: Running Caliptra FMC ...
18,516,769 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,381,039 ready_for_fw is high
3,381,430 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,949,577 >>> mbox cmd response: success
18,233,611 UART:
18,234,014 UART: Running Caliptra FMC ...
18,235,261 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,502 UART:
192,863 UART: Running Caliptra ROM ...
193,987 UART:
603,632 UART: [state] CFI Enabled
616,995 UART: [state] LifecycleState = Unprovisioned
618,875 UART: [state] DebugLocked = No
620,746 UART: [state] WD Timer not started. Device not locked for debugging
624,626 UART: [kat] SHA2-256
803,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,297 UART: [kat] ++
815,741 UART: [kat] sha1
827,107 UART: [kat] SHA2-256
830,189 UART: [kat] SHA2-384
837,820 UART: [kat] SHA2-512-ACC
840,754 UART: [kat] ECC-384
3,281,871 UART: [kat] HMAC-384Kdf
3,294,598 UART: [kat] LMS
3,824,063 UART: [kat] --
3,827,425 UART: [cold-reset] ++
3,829,425 UART: [fht] FHT @ 0x50003400
3,840,754 UART: [idev] ++
3,841,314 UART: [idev] CDI.KEYID = 6
3,842,222 UART: [idev] SUBJECT.KEYID = 7
3,843,392 UART: [idev] UDS.KEYID = 0
3,844,437 ready_for_fw is high
3,844,627 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,978,593 UART: [idev] Erasing UDS.KEYID = 0
6,316,362 UART: [idev] Sha1 KeyId Algorithm
6,339,388 UART: [idev] --
6,344,568 UART: [ldev] ++
6,345,131 UART: [ldev] CDI.KEYID = 6
6,346,037 UART: [ldev] SUBJECT.KEYID = 5
6,347,252 UART: [ldev] AUTHORITY.KEYID = 7
6,348,662 UART: [ldev] FE.KEYID = 1
6,360,128 UART: [ldev] Erasing FE.KEYID = 1
8,836,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,764 UART: [ldev] --
10,627,862 UART: [fwproc] Wait for Commands...
10,630,276 UART: [fwproc] Recv command 0x46574c44
10,632,306 UART: [fwproc] Recv'd Img size: 106600 bytes
13,936,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,000 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,054,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,372,039 >>> mbox cmd response: success
14,376,491 UART: [afmc] ++
14,377,104 UART: [afmc] CDI.KEYID = 6
14,378,019 UART: [afmc] SUBJECT.KEYID = 7
14,379,182 UART: [afmc] AUTHORITY.KEYID = 5
16,877,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,999 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,615,952 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,631,889 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,647,816 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,671,615 UART: [afmc] --
18,675,336 UART: [cold-reset] --
18,678,901 UART: [state] Locking Datavault
18,684,607 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,301 UART: [state] Locking ICCM
18,688,077 UART: [exit] Launching FMC @ 0x40000000
18,696,393 UART:
18,696,637 UART: Running Caliptra FMC ...
18,697,775 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,695,664 ready_for_fw is high
3,696,066 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,151,559 >>> mbox cmd response: success
18,402,487 UART:
18,402,897 UART: Running Caliptra FMC ...
18,404,173 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,776 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,925 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 ready_for_fw is high
1,173,943 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,013 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,700 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,280 UART: [ldev] --
1,279,684 UART: [fwproc] Wait for Commands...
1,280,381 UART: [fwproc] Recv command 0x46574c44
1,281,114 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,516,633 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,056 >>> mbox cmd response: success
2,671,135 UART: [afmc] ++
2,671,303 UART: [afmc] CDI.KEYID = 6
2,671,666 UART: [afmc] SUBJECT.KEYID = 7
2,672,092 UART: [afmc] AUTHORITY.KEYID = 5
2,707,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,724,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,925 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,645 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,538 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,742,231 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,916 UART: [afmc] --
2,751,018 UART: [cold-reset] --
2,751,996 UART: [state] Locking Datavault
2,752,999 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,603 UART: [state] Locking ICCM
2,754,217 UART: [exit] Launching FMC @ 0x40000000
2,759,514 UART:
2,759,530 UART: Running Caliptra FMC ...
2,759,938 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,144 ready_for_fw is high
1,056,144 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,022 >>> mbox cmd response: success
2,584,111 UART:
2,584,127 UART: Running Caliptra FMC ...
2,584,535 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,456 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 ready_for_fw is high
1,173,976 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,200 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,467 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,520 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,043 >>> mbox cmd response: success
2,672,166 UART: [afmc] ++
2,672,334 UART: [afmc] CDI.KEYID = 6
2,672,697 UART: [afmc] SUBJECT.KEYID = 7
2,673,123 UART: [afmc] AUTHORITY.KEYID = 5
2,708,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,256 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,976 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,869 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,562 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,369 UART: [afmc] --
2,752,319 UART: [cold-reset] --
2,753,217 UART: [state] Locking Datavault
2,754,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,128 UART: [state] Locking ICCM
2,755,586 UART: [exit] Launching FMC @ 0x40000000
2,760,883 UART:
2,760,899 UART: Running Caliptra FMC ...
2,761,307 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,629 ready_for_fw is high
1,055,629 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,705 >>> mbox cmd response: success
2,583,558 UART:
2,583,574 UART: Running Caliptra FMC ...
2,583,982 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,486 UART: [kat] HMAC-384Kdf
919,880 UART: [kat] LMS
1,168,192 UART: [kat] --
1,169,235 UART: [cold-reset] ++
1,169,637 UART: [fht] FHT @ 0x50003400
1,172,287 UART: [idev] ++
1,172,455 UART: [idev] CDI.KEYID = 6
1,172,816 UART: [idev] SUBJECT.KEYID = 7
1,173,241 UART: [idev] UDS.KEYID = 0
1,173,587 ready_for_fw is high
1,173,587 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,369 UART: [idev] Sha1 KeyId Algorithm
1,207,221 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,680 UART: [ldev] Erasing FE.KEYID = 1
1,240,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,326 UART: [ldev] --
1,279,702 UART: [fwproc] Wait for Commands...
1,280,467 UART: [fwproc] Recv command 0x46574c44
1,281,200 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,516,029 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,669,582 >>> mbox cmd response: success
2,670,771 UART: [afmc] ++
2,670,939 UART: [afmc] CDI.KEYID = 6
2,671,302 UART: [afmc] SUBJECT.KEYID = 7
2,671,728 UART: [afmc] AUTHORITY.KEYID = 5
2,707,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,359 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,079 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,972 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,665 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,584 UART: [afmc] --
2,750,538 UART: [cold-reset] --
2,751,574 UART: [state] Locking Datavault
2,752,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,383 UART: [state] Locking ICCM
2,753,823 UART: [exit] Launching FMC @ 0x40000000
2,759,120 UART:
2,759,136 UART: Running Caliptra FMC ...
2,759,544 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,692 ready_for_fw is high
1,055,692 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,828 >>> mbox cmd response: success
2,582,443 UART:
2,582,459 UART: Running Caliptra FMC ...
2,582,867 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,174,942 ready_for_fw is high
1,174,942 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,817 UART: [ldev] ++
1,209,985 UART: [ldev] CDI.KEYID = 6
1,210,349 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,242,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,207 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,533 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,970 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,581 >>> mbox cmd response: success
2,672,696 UART: [afmc] ++
2,672,864 UART: [afmc] CDI.KEYID = 6
2,673,227 UART: [afmc] SUBJECT.KEYID = 7
2,673,653 UART: [afmc] AUTHORITY.KEYID = 5
2,709,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,642 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,362 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,255 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,948 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,729 UART: [afmc] --
2,752,653 UART: [cold-reset] --
2,753,429 UART: [state] Locking Datavault
2,754,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,000 UART: [state] Locking ICCM
2,755,642 UART: [exit] Launching FMC @ 0x40000000
2,760,939 UART:
2,760,955 UART: Running Caliptra FMC ...
2,761,363 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,829 ready_for_fw is high
1,055,829 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,339 >>> mbox cmd response: success
2,583,320 UART:
2,583,336 UART: Running Caliptra FMC ...
2,583,744 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,488 UART: [ldev] ++
1,208,656 UART: [ldev] CDI.KEYID = 6
1,209,020 UART: [ldev] SUBJECT.KEYID = 5
1,209,447 UART: [ldev] AUTHORITY.KEYID = 7
1,209,910 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,296 UART: [ldev] --
1,280,592 UART: [fwproc] Wait for Commands...
1,281,185 UART: [fwproc] Recv command 0x46574c44
1,281,918 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,213 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,688 >>> mbox cmd response: success
2,671,927 UART: [afmc] ++
2,672,095 UART: [afmc] CDI.KEYID = 6
2,672,458 UART: [afmc] SUBJECT.KEYID = 7
2,672,884 UART: [afmc] AUTHORITY.KEYID = 5
2,708,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,787 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,507 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,400 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,093 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,134 UART: [afmc] --
2,752,160 UART: [cold-reset] --
2,752,982 UART: [state] Locking Datavault
2,754,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,623 UART: [state] Locking ICCM
2,755,107 UART: [exit] Launching FMC @ 0x40000000
2,760,404 UART:
2,760,420 UART: Running Caliptra FMC ...
2,760,828 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,796 ready_for_fw is high
1,056,796 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,400 >>> mbox cmd response: success
2,584,133 UART:
2,584,149 UART: Running Caliptra FMC ...
2,584,557 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,837 UART: [state] LifecycleState = Unprovisioned
85,492 UART: [state] DebugLocked = No
86,046 UART: [state] WD Timer not started. Device not locked for debugging
87,263 UART: [kat] SHA2-256
890,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,280 UART: [kat] SHA2-256
901,220 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,032 UART: [idev] ++
1,173,200 UART: [idev] CDI.KEYID = 6
1,173,561 UART: [idev] SUBJECT.KEYID = 7
1,173,986 UART: [idev] UDS.KEYID = 0
1,174,332 ready_for_fw is high
1,174,332 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,012 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,431 UART: [ldev] ++
1,208,599 UART: [ldev] CDI.KEYID = 6
1,208,963 UART: [ldev] SUBJECT.KEYID = 5
1,209,390 UART: [ldev] AUTHORITY.KEYID = 7
1,209,853 UART: [ldev] FE.KEYID = 1
1,215,357 UART: [ldev] Erasing FE.KEYID = 1
1,241,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,627 UART: [ldev] --
1,281,085 UART: [fwproc] Wait for Commands...
1,281,760 UART: [fwproc] Recv command 0x46574c44
1,282,493 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,204 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,863 >>> mbox cmd response: success
2,673,126 UART: [afmc] ++
2,673,294 UART: [afmc] CDI.KEYID = 6
2,673,657 UART: [afmc] SUBJECT.KEYID = 7
2,674,083 UART: [afmc] AUTHORITY.KEYID = 5
2,709,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,308 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,028 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,921 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,614 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,233 UART: [afmc] --
2,753,213 UART: [cold-reset] --
2,754,027 UART: [state] Locking Datavault
2,755,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,836 UART: [state] Locking ICCM
2,756,278 UART: [exit] Launching FMC @ 0x40000000
2,761,575 UART:
2,761,591 UART: Running Caliptra FMC ...
2,761,999 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,555 ready_for_fw is high
1,056,555 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,137 >>> mbox cmd response: success
2,584,312 UART:
2,584,328 UART: Running Caliptra FMC ...
2,584,736 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,216,409 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,357,032 UART:
2,357,437 UART: Running Caliptra ROM ...
2,358,601 UART:
2,358,768 UART: [state] CFI Enabled
2,359,742 UART: [state] LifecycleState = Unprovisioned
2,361,743 UART: [state] DebugLocked = No
2,362,862 UART: [state] WD Timer not started. Device not locked for debugging
2,365,344 UART: [fake-rom-cold-reset] ++
2,366,446 UART: [fht] FHT @ 0x50003400
2,367,474 UART: [fwproc] Wait for Commands...
2,368,754 UART: [fwproc] Recv command 0x46574c44
2,370,192 UART: [fwproc] Recv'd Img size: 111324 bytes
3,774,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,851,443 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,961,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,545,447 >>> mbox cmd response: success
4,551,519 UART: [fake-rom-cold-reset] --
4,554,483 UART: [state] Locking Datavault
4,559,976 UART: [state] Locking PCR0, PCR1 and PCR31
4,562,159 UART: [state] Locking ICCM
4,564,986 UART: [exit] Launching FMC @ 0x40000000
4,573,760 UART:
4,574,013 UART: Running Caliptra FMC ...
4,575,067 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,216,948 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,357,701 UART:
2,358,135 UART: Running Caliptra ROM ...
2,359,303 UART:
2,359,473 UART: [state] CFI Enabled
2,360,426 UART: [state] LifecycleState = Unprovisioned
2,362,107 UART: [state] DebugLocked = No
2,363,136 UART: [state] WD Timer not started. Device not locked for debugging
2,365,607 UART: [fake-rom-cold-reset] ++
2,366,632 UART: [fht] FHT @ 0x50003400
2,367,787 UART: [fwproc] Wait for Commands...
2,369,073 UART: [fwproc] Recv command 0x46574c44
2,370,423 UART: [fwproc] Recv'd Img size: 111324 bytes
3,780,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,854,613 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,964,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,547,998 >>> mbox cmd response: success
4,554,030 UART: [fake-rom-cold-reset] --
4,558,261 UART: [state] Locking Datavault
4,564,040 UART: [state] Locking PCR0, PCR1 and PCR31
4,566,273 UART: [state] Locking ICCM
4,568,533 UART: [exit] Launching FMC @ 0x40000000
4,577,259 UART:
4,577,510 UART: Running Caliptra FMC ...
4,578,563 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
2,221,345 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,362,165 UART:
2,362,584 UART: Running Caliptra ROM ...
2,363,763 UART:
2,363,935 UART: [state] CFI Enabled
2,364,900 UART: [state] LifecycleState = Unprovisioned
2,366,552 UART: [state] DebugLocked = No
2,367,649 UART: [state] WD Timer not started. Device not locked for debugging
2,370,121 UART: [fake-rom-cold-reset] ++
2,371,241 UART: [fht] FHT @ 0x50003400
2,372,269 UART: [fwproc] Wait for Commands...
2,373,545 UART: [fwproc] Recv command 0x46574c44
2,374,970 UART: [fwproc] Recv'd Img size: 111324 bytes
3,782,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,859,160 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,969,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,552,563 >>> mbox cmd response: success
4,558,648 UART: [fake-rom-cold-reset] --
4,563,702 UART: [state] Locking Datavault
4,569,569 UART: [state] Locking PCR0, PCR1 and PCR31
4,571,774 UART: [state] Locking ICCM
4,574,401 UART: [exit] Launching FMC @ 0x40000000
4,583,138 UART:
4,583,382 UART: Running Caliptra FMC ...
4,584,514 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,225,168 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,365,952 UART:
2,366,362 UART: Running Caliptra ROM ...
2,367,540 UART:
2,367,704 UART: [state] CFI Enabled
2,368,659 UART: [state] LifecycleState = Unprovisioned
2,370,316 UART: [state] DebugLocked = No
2,371,419 UART: [state] WD Timer not started. Device not locked for debugging
2,373,891 UART: [fake-rom-cold-reset] ++
2,374,996 UART: [fht] FHT @ 0x50003400
2,376,019 UART: [fwproc] Wait for Commands...
2,377,300 UART: [fwproc] Recv command 0x46574c44
2,378,723 UART: [fwproc] Recv'd Img size: 111324 bytes
3,789,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,864,124 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,974,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,557,334 >>> mbox cmd response: success
4,563,382 UART: [fake-rom-cold-reset] --
4,567,189 UART: [state] Locking Datavault
4,572,845 UART: [state] Locking PCR0, PCR1 and PCR31
4,575,048 UART: [state] Locking ICCM
4,577,180 UART: [exit] Launching FMC @ 0x40000000
4,585,970 UART:
4,586,217 UART: Running Caliptra FMC ...
4,587,350 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,223,528 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,364,842 UART:
2,365,256 UART: Running Caliptra ROM ...
2,366,420 UART:
2,366,590 UART: [state] CFI Enabled
2,367,573 UART: [state] LifecycleState = Unprovisioned
2,369,220 UART: [state] DebugLocked = No
2,370,329 UART: [state] WD Timer not started. Device not locked for debugging
2,372,805 UART: [fake-rom-cold-reset] ++
2,373,913 UART: [fht] FHT @ 0x50003400
2,374,944 UART: [fwproc] Wait for Commands...
2,376,249 UART: [fwproc] Recv command 0x46574c44
2,377,686 UART: [fwproc] Recv'd Img size: 111668 bytes
3,821,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,893,867 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,953,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,271,264 >>> mbox cmd response: success
4,277,148 UART: [fake-rom-cold-reset] --
4,281,409 UART: [state] Locking Datavault
4,287,725 UART: [state] Locking PCR0, PCR1 and PCR31
4,289,328 UART: [state] Locking ICCM
4,291,883 UART: [exit] Launching FMC @ 0x40000000
4,300,099 UART:
4,300,352 UART: Running Caliptra FMC ...
4,301,489 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,217,720 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,359,005 UART:
2,359,435 UART: Running Caliptra ROM ...
2,360,624 UART:
2,360,798 UART: [state] CFI Enabled
2,361,776 UART: [state] LifecycleState = Unprovisioned
2,363,419 UART: [state] DebugLocked = No
2,364,530 UART: [state] WD Timer not started. Device not locked for debugging
2,367,017 UART: [fake-rom-cold-reset] ++
2,368,129 UART: [fht] FHT @ 0x50003400
2,369,162 UART: [fwproc] Wait for Commands...
2,370,453 UART: [fwproc] Recv command 0x46574c44
2,371,881 UART: [fwproc] Recv'd Img size: 111668 bytes
3,823,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,894,280 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,271,486 >>> mbox cmd response: success
4,277,313 UART: [fake-rom-cold-reset] --
4,280,787 UART: [state] Locking Datavault
4,286,594 UART: [state] Locking PCR0, PCR1 and PCR31
4,288,196 UART: [state] Locking ICCM
4,290,253 UART: [exit] Launching FMC @ 0x40000000
4,298,468 UART:
4,298,732 UART: Running Caliptra FMC ...
4,299,875 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,486 writing to cptra_bootfsm_go
2,221,822 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,363,028 UART:
2,363,442 UART: Running Caliptra ROM ...
2,364,611 UART:
2,364,782 UART: [state] CFI Enabled
2,365,761 UART: [state] LifecycleState = Unprovisioned
2,367,414 UART: [state] DebugLocked = No
2,368,519 UART: [state] WD Timer not started. Device not locked for debugging
2,370,990 UART: [fake-rom-cold-reset] ++
2,372,096 UART: [fht] FHT @ 0x50003400
2,373,130 UART: [fwproc] Wait for Commands...
2,374,431 UART: [fwproc] Recv command 0x46574c44
2,375,856 UART: [fwproc] Recv'd Img size: 111668 bytes
3,810,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,878,147 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,938,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,255,114 >>> mbox cmd response: success
4,260,965 UART: [fake-rom-cold-reset] --
4,262,930 UART: [state] Locking Datavault
4,267,945 UART: [state] Locking PCR0, PCR1 and PCR31
4,269,540 UART: [state] Locking ICCM
4,271,828 UART: [exit] Launching FMC @ 0x40000000
4,280,045 UART:
4,280,305 UART: Running Caliptra FMC ...
4,281,449 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,223,648 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,364,662 UART:
2,365,076 UART: Running Caliptra ROM ...
2,366,167 UART:
2,366,320 UART: [state] CFI Enabled
2,367,271 UART: [state] LifecycleState = Unprovisioned
2,368,921 UART: [state] DebugLocked = No
2,369,950 UART: [state] WD Timer not started. Device not locked for debugging
2,372,413 UART: [fake-rom-cold-reset] ++
2,373,449 UART: [fht] FHT @ 0x50003400
2,374,422 UART: [fwproc] Wait for Commands...
2,375,702 UART: [fwproc] Recv command 0x46574c44
2,377,054 UART: [fwproc] Recv'd Img size: 111668 bytes
3,811,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,939 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,265,354 >>> mbox cmd response: success
4,271,177 UART: [fake-rom-cold-reset] --
4,274,331 UART: [state] Locking Datavault
4,279,137 UART: [state] Locking PCR0, PCR1 and PCR31
4,280,739 UART: [state] Locking ICCM
4,282,348 UART: [exit] Launching FMC @ 0x40000000
4,290,555 UART:
4,290,801 UART: Running Caliptra FMC ...
4,291,858 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,225,475 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,366,753 UART:
2,367,179 UART: Running Caliptra ROM ...
2,368,350 UART:
2,368,520 UART: [state] CFI Enabled
2,369,492 UART: [state] LifecycleState = Unprovisioned
2,371,137 UART: [state] DebugLocked = No
2,372,248 UART: [state] WD Timer not started. Device not locked for debugging
2,374,720 UART: [fake-rom-cold-reset] ++
2,375,847 UART: [fht] FHT @ 0x50003400
2,376,886 UART: [fwproc] Wait for Commands...
2,378,174 UART: [fwproc] Recv command 0x46574c44
2,379,603 UART: [fwproc] Recv'd Img size: 111668 bytes
3,812,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,881,410 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,941,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,258,348 >>> mbox cmd response: success
4,264,200 UART: [fake-rom-cold-reset] --
4,267,499 UART: [state] Locking Datavault
4,270,808 UART: [state] Locking PCR0, PCR1 and PCR31
4,272,411 UART: [state] Locking ICCM
4,274,603 UART: [exit] Launching FMC @ 0x40000000
4,282,828 UART:
4,283,091 UART: Running Caliptra FMC ...
4,284,240 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,224,480 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,365,851 UART:
2,366,275 UART: Running Caliptra ROM ...
2,367,353 UART:
2,367,511 UART: [state] CFI Enabled
2,368,440 UART: [state] LifecycleState = Unprovisioned
2,370,088 UART: [state] DebugLocked = No
2,371,114 UART: [state] WD Timer not started. Device not locked for debugging
2,373,585 UART: [fake-rom-cold-reset] ++
2,374,610 UART: [fht] FHT @ 0x50003400
2,375,580 UART: [fwproc] Wait for Commands...
2,376,863 UART: [fwproc] Recv command 0x46574c44
2,378,314 UART: [fwproc] Recv'd Img size: 111668 bytes
3,809,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,885,305 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,945,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,261,541 >>> mbox cmd response: success
4,267,352 UART: [fake-rom-cold-reset] --
4,271,971 UART: [state] Locking Datavault
4,276,668 UART: [state] Locking PCR0, PCR1 and PCR31
4,278,269 UART: [state] Locking ICCM
4,279,577 UART: [exit] Launching FMC @ 0x40000000
4,287,794 UART:
4,288,060 UART: Running Caliptra FMC ...
4,289,210 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,225,423 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,366,855 UART:
2,367,264 UART: Running Caliptra ROM ...
2,368,439 UART:
2,368,609 UART: [state] CFI Enabled
2,369,586 UART: [state] LifecycleState = Unprovisioned
2,371,235 UART: [state] DebugLocked = No
2,372,281 UART: [state] WD Timer not started. Device not locked for debugging
2,374,746 UART: [fake-rom-cold-reset] ++
2,375,772 UART: [fht] FHT @ 0x50003400
2,376,716 UART: [fwproc] Wait for Commands...
2,377,989 UART: [fwproc] Recv command 0x46574c44
2,379,335 UART: [fwproc] Recv'd Img size: 111668 bytes
3,818,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,685 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,268,161 >>> mbox cmd response: success
4,273,976 UART: [fake-rom-cold-reset] --
4,277,677 UART: [state] Locking Datavault
4,281,431 UART: [state] Locking PCR0, PCR1 and PCR31
4,283,026 UART: [state] Locking ICCM
4,285,189 UART: [exit] Launching FMC @ 0x40000000
4,293,398 UART:
4,293,670 UART: Running Caliptra FMC ...
4,294,725 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,584 writing to cptra_bootfsm_go
2,235,151 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,376,899 UART:
2,377,332 UART: Running Caliptra ROM ...
2,378,414 UART:
2,378,568 UART: [state] CFI Enabled
2,379,549 UART: [state] LifecycleState = Unprovisioned
2,381,195 UART: [state] DebugLocked = No
2,382,222 UART: [state] WD Timer not started. Device not locked for debugging
2,384,691 UART: [fake-rom-cold-reset] ++
2,385,723 UART: [fht] FHT @ 0x50003400
2,386,702 UART: [fwproc] Wait for Commands...
2,387,990 UART: [fwproc] Recv command 0x46574c44
2,389,334 UART: [fwproc] Recv'd Img size: 111668 bytes
3,833,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,902,315 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,962,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,279,067 >>> mbox cmd response: success
4,284,887 UART: [fake-rom-cold-reset] --
4,288,108 UART: [state] Locking Datavault
4,294,264 UART: [state] Locking PCR0, PCR1 and PCR31
4,295,867 UART: [state] Locking ICCM
4,298,076 UART: [exit] Launching FMC @ 0x40000000
4,306,286 UART:
4,306,546 UART: Running Caliptra FMC ...
4,307,688 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,238 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [fake-rom-cold-reset] ++
88,460 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,686 UART: [fht] FHT @ 0x50003400
92,007 UART: [fwproc] Wait for Commands...
92,748 UART: [fwproc] Recv command 0x46574c44
93,476 UART: [fwproc] Recv'd Img size: 111668 bytes
1,354,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,954 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,106 >>> mbox cmd response: success
1,544,264 UART: [fake-rom-cold-reset] --
1,545,050 UART: [state] Locking Datavault
1,546,199 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,803 UART: [state] Locking ICCM
1,547,433 UART: [exit] Launching FMC @ 0x40000000
1,552,730 UART:
1,552,746 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [fake-rom-cold-reset] ++
88,666 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,982 UART: [fht] FHT @ 0x50003400
92,427 UART: [fwproc] Wait for Commands...
93,066 UART: [fwproc] Recv command 0x46574c44
93,794 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,468 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,682 >>> mbox cmd response: success
1,544,840 UART: [fake-rom-cold-reset] --
1,545,618 UART: [state] Locking Datavault
1,546,809 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,413 UART: [state] Locking ICCM
1,548,057 UART: [exit] Launching FMC @ 0x40000000
1,553,354 UART:
1,553,370 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [fake-rom-cold-reset] ++
88,751 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,943 UART: [fht] FHT @ 0x50003400
92,178 UART: [fwproc] Wait for Commands...
92,915 UART: [fwproc] Recv command 0x46574c44
93,643 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,883 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,059 >>> mbox cmd response: success
1,544,217 UART: [fake-rom-cold-reset] --
1,544,975 UART: [state] Locking Datavault
1,546,102 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,706 UART: [state] Locking ICCM
1,547,232 UART: [exit] Launching FMC @ 0x40000000
1,552,529 UART:
1,552,545 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [fake-rom-cold-reset] ++
89,225 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,337 UART: [fht] FHT @ 0x50003400
92,798 UART: [fwproc] Wait for Commands...
93,547 UART: [fwproc] Recv command 0x46574c44
94,275 UART: [fwproc] Recv'd Img size: 111668 bytes
1,354,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,097 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,406,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,217 >>> mbox cmd response: success
1,543,375 UART: [fake-rom-cold-reset] --
1,544,311 UART: [state] Locking Datavault
1,545,108 UART: [state] Locking PCR0, PCR1 and PCR31
1,545,712 UART: [state] Locking ICCM
1,546,206 UART: [exit] Launching FMC @ 0x40000000
1,551,503 UART:
1,551,519 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [fake-rom-cold-reset] ++
88,568 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,692 UART: [fht] FHT @ 0x50003400
91,979 UART: [fwproc] Wait for Commands...
92,744 UART: [fwproc] Recv command 0x46574c44
93,472 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,000 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,140 >>> mbox cmd response: success
1,544,298 UART: [fake-rom-cold-reset] --
1,545,212 UART: [state] Locking Datavault
1,546,247 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,851 UART: [state] Locking ICCM
1,547,427 UART: [exit] Launching FMC @ 0x40000000
1,552,724 UART:
1,552,740 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,256 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [fake-rom-cold-reset] ++
88,702 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,998 UART: [fht] FHT @ 0x50003400
92,333 UART: [fwproc] Wait for Commands...
93,010 UART: [fwproc] Recv command 0x46574c44
93,738 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,666 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,718 >>> mbox cmd response: success
1,543,876 UART: [fake-rom-cold-reset] --
1,544,514 UART: [state] Locking Datavault
1,545,579 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,183 UART: [state] Locking ICCM
1,546,853 UART: [exit] Launching FMC @ 0x40000000
1,552,150 UART:
1,552,166 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,982 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [fake-rom-cold-reset] ++
89,085 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,227 UART: [fht] FHT @ 0x50003400
92,476 UART: [fwproc] Wait for Commands...
93,275 UART: [fwproc] Recv command 0x46574c44
94,003 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,961 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,997 >>> mbox cmd response: success
1,544,155 UART: [fake-rom-cold-reset] --
1,544,805 UART: [state] Locking Datavault
1,545,828 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,432 UART: [state] Locking ICCM
1,546,924 UART: [exit] Launching FMC @ 0x40000000
1,552,221 UART:
1,552,237 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,891 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [fake-rom-cold-reset] ++
89,113 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,327 UART: [fht] FHT @ 0x50003400
92,734 UART: [fwproc] Wait for Commands...
93,435 UART: [fwproc] Recv command 0x46574c44
94,163 UART: [fwproc] Recv'd Img size: 111668 bytes
1,357,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,159 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,545,353 >>> mbox cmd response: success
1,546,511 UART: [fake-rom-cold-reset] --
1,547,325 UART: [state] Locking Datavault
1,548,228 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,832 UART: [state] Locking ICCM
1,549,256 UART: [exit] Launching FMC @ 0x40000000
1,554,553 UART:
1,554,569 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,982 UART: [fake-rom-cold-reset] ++
88,910 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,982 UART: [fht] FHT @ 0x50003400
92,437 UART: [fwproc] Wait for Commands...
93,258 UART: [fwproc] Recv command 0x46574c44
93,986 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,228 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,284 >>> mbox cmd response: success
1,545,442 UART: [fake-rom-cold-reset] --
1,546,384 UART: [state] Locking Datavault
1,547,423 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,027 UART: [state] Locking ICCM
1,548,635 UART: [exit] Launching FMC @ 0x40000000
1,553,932 UART:
1,553,948 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,384 UART: [fake-rom-cold-reset] ++
89,312 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,478 UART: [fht] FHT @ 0x50003400
92,885 UART: [fwproc] Wait for Commands...
93,660 UART: [fwproc] Recv command 0x46574c44
94,388 UART: [fwproc] Recv'd Img size: 111668 bytes
1,357,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,242 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,414 >>> mbox cmd response: success
1,545,572 UART: [fake-rom-cold-reset] --
1,546,208 UART: [state] Locking Datavault
1,547,403 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,007 UART: [state] Locking ICCM
1,548,645 UART: [exit] Launching FMC @ 0x40000000
1,553,942 UART:
1,553,958 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [fake-rom-cold-reset] ++
88,761 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,867 UART: [fht] FHT @ 0x50003400
92,268 UART: [fwproc] Wait for Commands...
93,041 UART: [fwproc] Recv command 0x46574c44
93,769 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,237 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,357 >>> mbox cmd response: success
1,544,515 UART: [fake-rom-cold-reset] --
1,545,269 UART: [state] Locking Datavault
1,546,470 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,074 UART: [state] Locking ICCM
1,547,572 UART: [exit] Launching FMC @ 0x40000000
1,552,869 UART:
1,552,885 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,845 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [fake-rom-cold-reset] ++
88,971 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,223 UART: [fht] FHT @ 0x50003400
92,462 UART: [fwproc] Wait for Commands...
93,237 UART: [fwproc] Recv command 0x46574c44
93,965 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,103 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,237 >>> mbox cmd response: success
1,545,395 UART: [fake-rom-cold-reset] --
1,546,253 UART: [state] Locking Datavault
1,547,114 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,718 UART: [state] Locking ICCM
1,548,204 UART: [exit] Launching FMC @ 0x40000000
1,553,501 UART:
1,553,517 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,223 UART:
192,581 UART: Running Caliptra ROM ...
193,815 UART:
193,966 UART: [state] CFI Enabled
261,013 UART: [state] LifecycleState = Production
263,263 UART: [state] DebugLocked = No
265,842 UART: [state] WD Timer not started. Device not locked for debugging
271,232 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,980 UART:
192,366 UART: Running Caliptra ROM ...
193,560 UART:
193,708 UART: [state] CFI Enabled
264,764 UART: [state] LifecycleState = Production
266,968 UART: [state] DebugLocked = No
269,204 UART: [state] WD Timer not started. Device not locked for debugging
275,286 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,513 UART:
192,904 UART: Running Caliptra ROM ...
194,150 UART:
604,200 UART: [state] CFI Enabled
622,228 UART: [state] LifecycleState = Production
624,467 UART: [state] DebugLocked = No
627,355 UART: [state] WD Timer not started. Device not locked for debugging
633,100 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,552 writing to cptra_bootfsm_go
192,682 UART:
193,059 UART: Running Caliptra ROM ...
194,250 UART:
604,296 UART: [state] CFI Enabled
621,638 UART: [state] LifecycleState = Production
623,852 UART: [state] DebugLocked = No
625,561 UART: [state] WD Timer not started. Device not locked for debugging
630,717 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,212 UART:
192,571 UART: Running Caliptra ROM ...
193,763 UART:
193,917 UART: [state] CFI Enabled
263,126 UART: [state] LifecycleState = Production
264,757 UART: [state] DebugLocked = No
267,006 UART: [state] WD Timer not started. Device not locked for debugging
270,759 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,119 UART:
192,494 UART: Running Caliptra ROM ...
193,686 UART:
193,838 UART: [state] CFI Enabled
262,326 UART: [state] LifecycleState = Production
263,950 UART: [state] DebugLocked = No
266,198 UART: [state] WD Timer not started. Device not locked for debugging
271,454 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,354 UART:
192,723 UART: Running Caliptra ROM ...
193,854 UART:
603,516 UART: [state] CFI Enabled
616,667 UART: [state] LifecycleState = Production
618,305 UART: [state] DebugLocked = No
620,132 UART: [state] WD Timer not started. Device not locked for debugging
623,709 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,515 UART:
192,889 UART: Running Caliptra ROM ...
194,021 UART:
603,601 UART: [state] CFI Enabled
617,759 UART: [state] LifecycleState = Production
619,354 UART: [state] DebugLocked = No
620,994 UART: [state] WD Timer not started. Device not locked for debugging
626,950 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,043 UART:
192,463 UART: Running Caliptra ROM ...
193,651 UART:
193,803 UART: [state] CFI Enabled
263,426 UART: [state] LifecycleState = Production
265,037 UART: [state] DebugLocked = No
266,203 UART: [state] WD Timer not started. Device not locked for debugging
271,300 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,319 UART:
192,717 UART: Running Caliptra ROM ...
193,924 UART:
194,076 UART: [state] CFI Enabled
262,049 UART: [state] LifecycleState = Production
263,677 UART: [state] DebugLocked = No
265,865 UART: [state] WD Timer not started. Device not locked for debugging
271,934 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,408 UART:
192,786 UART: Running Caliptra ROM ...
193,989 UART:
603,466 UART: [state] CFI Enabled
616,577 UART: [state] LifecycleState = Production
618,212 UART: [state] DebugLocked = No
619,470 UART: [state] WD Timer not started. Device not locked for debugging
623,967 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,492 UART:
192,862 UART: Running Caliptra ROM ...
194,053 UART:
603,532 UART: [state] CFI Enabled
619,954 UART: [state] LifecycleState = Production
621,536 UART: [state] DebugLocked = No
622,690 UART: [state] WD Timer not started. Device not locked for debugging
626,299 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Production
85,549 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Production
85,599 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Production
85,860 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Production
86,052 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,312 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Production
85,781 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Production
85,697 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Production
85,866 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Production
86,176 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
88,220 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Production
85,873 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Production
85,313 UART: [state] DebugLocked = No
85,804 UART: [state] WD Timer not started. Device not locked for debugging
87,259 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Production
85,966 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
88,206 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Production
86,360 UART: [state] DebugLocked = No
86,951 UART: [state] WD Timer not started. Device not locked for debugging
88,322 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
191,994 UART:
192,401 UART: Running Caliptra ROM ...
193,610 UART:
193,768 UART: [state] CFI Enabled
265,895 UART: [state] LifecycleState = Production
268,124 UART: Fake ROM in Prod lifecycle disabled
270,171 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,050 UART:
192,422 UART: Running Caliptra ROM ...
193,596 UART:
193,748 UART: [state] CFI Enabled
264,244 UART: [state] LifecycleState = Production
266,509 UART: Fake ROM in Prod lifecycle disabled
268,502 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,483 UART:
192,851 UART: Running Caliptra ROM ...
194,025 UART:
603,978 UART: [state] CFI Enabled
621,042 UART: [state] LifecycleState = Production
623,325 UART: Fake ROM in Prod lifecycle disabled
625,319 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
192,841 UART:
193,223 UART: Running Caliptra ROM ...
194,417 UART:
604,386 UART: [state] CFI Enabled
620,228 UART: [state] LifecycleState = Production
622,459 UART: Fake ROM in Prod lifecycle disabled
624,464 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,056 UART:
192,486 UART: Running Caliptra ROM ...
193,636 UART:
193,784 UART: [state] CFI Enabled
261,174 UART: [state] LifecycleState = Production
262,824 UART: Fake ROM in Prod lifecycle disabled
264,333 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,021 UART:
192,417 UART: Running Caliptra ROM ...
193,619 UART:
193,772 UART: [state] CFI Enabled
261,686 UART: [state] LifecycleState = Production
263,292 UART: Fake ROM in Prod lifecycle disabled
264,794 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,490 UART:
192,872 UART: Running Caliptra ROM ...
193,979 UART:
603,706 UART: [state] CFI Enabled
616,007 UART: [state] LifecycleState = Production
617,596 UART: Fake ROM in Prod lifecycle disabled
619,087 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,395 UART:
192,785 UART: Running Caliptra ROM ...
193,984 UART:
603,454 UART: [state] CFI Enabled
619,485 UART: [state] LifecycleState = Production
621,118 UART: Fake ROM in Prod lifecycle disabled
622,608 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,041 UART:
192,421 UART: Running Caliptra ROM ...
193,559 UART:
193,700 UART: [state] CFI Enabled
264,169 UART: [state] LifecycleState = Production
265,858 UART: Fake ROM in Prod lifecycle disabled
267,365 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,999 UART:
192,379 UART: Running Caliptra ROM ...
193,555 UART:
193,709 UART: [state] CFI Enabled
263,869 UART: [state] LifecycleState = Production
265,543 UART: Fake ROM in Prod lifecycle disabled
267,042 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
192,519 UART:
192,878 UART: Running Caliptra ROM ...
194,064 UART:
603,788 UART: [state] CFI Enabled
615,425 UART: [state] LifecycleState = Production
617,003 UART: Fake ROM in Prod lifecycle disabled
618,510 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,825 UART:
193,252 UART: Running Caliptra ROM ...
194,461 UART:
603,604 UART: [state] CFI Enabled
617,257 UART: [state] LifecycleState = Production
618,839 UART: Fake ROM in Prod lifecycle disabled
620,330 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Production
85,930 UART: Fake ROM in Prod lifecycle disabled
86,524 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Production
85,400 UART: Fake ROM in Prod lifecycle disabled
85,994 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Production
86,027 UART: Fake ROM in Prod lifecycle disabled
86,621 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Production
85,973 UART: Fake ROM in Prod lifecycle disabled
86,567 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Production
85,930 UART: Fake ROM in Prod lifecycle disabled
86,524 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,680 UART: [state] LifecycleState = Production
85,288 UART: Fake ROM in Prod lifecycle disabled
85,882 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Production
85,783 UART: Fake ROM in Prod lifecycle disabled
86,377 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,979 UART: Fake ROM in Prod lifecycle disabled
86,573 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Production
85,902 UART: Fake ROM in Prod lifecycle disabled
86,496 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Production
85,314 UART: Fake ROM in Prod lifecycle disabled
85,908 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Production
86,127 UART: Fake ROM in Prod lifecycle disabled
86,721 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Production
85,803 UART: Fake ROM in Prod lifecycle disabled
86,397 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,213,826 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,354,848 UART:
2,355,441 UART: Running Caliptra ROM ...
2,356,543 UART:
2,356,708 UART: [state] CFI Enabled
2,358,067 UART: [state] LifecycleState = Unprovisioned
2,359,684 UART: [state] DebugLocked = No
2,360,705 UART: [state] WD Timer not started. Device not locked for debugging
2,363,203 UART: [fake-rom-cold-reset] ++
2,364,318 UART: [fht] FHT @ 0x50003400
2,365,348 UART: [fwproc] Wait for Commands...
2,366,633 UART: [fwproc] Recv command 0x46574c44
2,368,072 UART: [fwproc] Recv'd Img size: 111324 bytes
3,769,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,840,288 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,534,113 >>> mbox cmd response: success
4,540,147 UART: [fake-rom-cold-reset] --
4,542,969 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
4,682,905 UART: [state] Locking Datavault
4,684,185 UART: [state] Locking PCR0, PCR1 and PCR31
4,685,656 UART: [state] Locking ICCM
4,686,530 UART: [exit] Launching FMC @ 0x40000000
4,687,955 UART:
4,688,113 UART: Running Caliptra FMC ...
4,689,213 UART:
4,689,370 UART: [fmc] Received command: 0x46574C44
4,690,830 UART:
4,690,988 UART: Running Caliptra ROM ...
4,692,086 UART:
4,692,269 UART: [state] CFI Enabled
4,743,417 UART: [state] LifecycleState = Unprovisioned
4,745,801 UART: [state] DebugLocked = No
4,748,271 UART: [state] WD Timer not started. Device not locked for debugging
4,754,397 UART: [update-reset] ++
6,200,619 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,204,927 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
6,846,670 UART: [update-reset] Copying MAN_2 To MAN_1
6,869,542 UART: [update-reset Success] --
6,871,235 >>> mbox cmd response: success
6,871,449 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,874,417 UART: [state] Locking Datavault
6,876,920 UART: [state] Locking PCR0, PCR1 and PCR31
6,879,058 UART: [state] Locking ICCM
6,882,024 UART: [exit] Launching FMC @ 0x40000000
6,890,810 UART:
6,891,068 UART: Running Caliptra FMC ...
6,892,178 UART:
6,892,334 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,893,963 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,332 writing to cptra_bootfsm_go
2,215,630 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,356,347 UART:
2,356,752 UART: Running Caliptra ROM ...
2,357,914 UART:
2,358,088 UART: [state] CFI Enabled
2,359,067 UART: [state] LifecycleState = Unprovisioned
2,360,728 UART: [state] DebugLocked = No
2,361,755 UART: [state] WD Timer not started. Device not locked for debugging
2,364,230 UART: [fake-rom-cold-reset] ++
2,365,255 UART: [fht] FHT @ 0x50003400
2,366,235 UART: [fwproc] Wait for Commands...
2,367,517 UART: [fwproc] Recv command 0x46574c44
2,368,968 UART: [fwproc] Recv'd Img size: 111324 bytes
3,776,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,853,800 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,963,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,547,586 >>> mbox cmd response: success
4,553,675 UART: [fake-rom-cold-reset] --
4,556,168 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
4,696,106 UART: [state] Locking Datavault
4,697,372 UART: [state] Locking PCR0, PCR1 and PCR31
4,698,836 UART: [state] Locking ICCM
4,699,711 UART: [exit] Launching FMC @ 0x40000000
4,701,138 UART:
4,701,297 UART: Running Caliptra FMC ...
4,702,313 UART:
4,702,458 UART: [fmc] Received command: 0x46574C44
4,703,921 UART:
4,704,099 UART: Running Caliptra ROM ...
4,705,204 UART:
4,705,357 UART: [state] CFI Enabled
4,764,946 UART: [state] LifecycleState = Unprovisioned
4,767,332 UART: [state] DebugLocked = No
4,769,132 UART: [state] WD Timer not started. Device not locked for debugging
4,776,721 UART: [update-reset] ++
6,215,471 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,220,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
6,861,364 UART: [update-reset] Copying MAN_2 To MAN_1
6,884,256 UART: [update-reset Success] --
6,885,977 >>> mbox cmd response: success
6,886,199 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,887,652 UART: [state] Locking Datavault
6,892,912 UART: [state] Locking PCR0, PCR1 and PCR31
6,895,060 UART: [state] Locking ICCM
6,896,534 UART: [exit] Launching FMC @ 0x40000000
6,905,367 UART:
6,905,600 UART: Running Caliptra FMC ...
6,906,699 UART:
6,906,853 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,908,486 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,222,321 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,362,999 UART:
2,363,442 UART: Running Caliptra ROM ...
2,364,613 UART:
2,364,784 UART: [state] CFI Enabled
2,365,738 UART: [state] LifecycleState = Unprovisioned
2,367,388 UART: [state] DebugLocked = No
2,368,412 UART: [state] WD Timer not started. Device not locked for debugging
2,370,878 UART: [fake-rom-cold-reset] ++
2,371,977 UART: [fht] FHT @ 0x50003400
2,373,000 UART: [fwproc] Wait for Commands...
2,374,281 UART: [fwproc] Recv command 0x46574c44
2,375,710 UART: [fwproc] Recv'd Img size: 111324 bytes
3,789,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,868,630 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,978,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,562,524 >>> mbox cmd response: success
4,568,600 UART: [fake-rom-cold-reset] --
4,571,079 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
4,711,811 UART: [state] Locking Datavault
4,713,226 UART: [state] Locking PCR0, PCR1 and PCR31
4,714,696 UART: [state] Locking ICCM
4,715,564 UART: [exit] Launching FMC @ 0x40000000
4,716,992 UART:
4,717,148 UART: Running Caliptra FMC ...
4,718,153 UART:
4,718,288 UART: [fmc] Received command: 0x46574C44
4,719,737 UART:
4,719,891 UART: Running Caliptra ROM ...
4,720,984 UART:
4,721,133 UART: [state] CFI Enabled
4,730,635 UART: [state] LifecycleState = Unprovisioned
4,732,998 UART: [state] DebugLocked = No
4,735,879 UART: [state] WD Timer not started. Device not locked for debugging
4,744,063 UART: [update-reset] ++
6,185,971 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,190,872 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
6,833,023 UART: [update-reset] Copying MAN_2 To MAN_1
6,855,914 UART: [update-reset Success] --
6,857,564 >>> mbox cmd response: success
6,857,788 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,862,072 UART: [state] Locking Datavault
6,866,132 UART: [state] Locking PCR0, PCR1 and PCR31
6,868,268 UART: [state] Locking ICCM
6,870,229 UART: [exit] Launching FMC @ 0x40000000
6,878,999 UART:
6,879,312 UART: Running Caliptra FMC ...
6,880,341 UART:
6,880,485 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,882,171 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,225,017 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,365,754 UART:
2,366,162 UART: Running Caliptra ROM ...
2,367,247 UART:
2,367,400 UART: [state] CFI Enabled
2,368,295 UART: [state] LifecycleState = Unprovisioned
2,369,951 UART: [state] DebugLocked = No
2,370,967 UART: [state] WD Timer not started. Device not locked for debugging
2,373,459 UART: [fake-rom-cold-reset] ++
2,374,480 UART: [fht] FHT @ 0x50003400
2,375,449 UART: [fwproc] Wait for Commands...
2,376,725 UART: [fwproc] Recv command 0x46574c44
2,378,152 UART: [fwproc] Recv'd Img size: 111324 bytes
3,785,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,861,085 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,971,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
4,555,021 >>> mbox cmd response: success
4,561,085 UART: [fake-rom-cold-reset] --
4,563,836 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
4,703,796 UART: [state] Locking Datavault
4,705,077 UART: [state] Locking PCR0, PCR1 and PCR31
4,706,553 UART: [state] Locking ICCM
4,707,423 UART: [exit] Launching FMC @ 0x40000000
4,708,862 UART:
4,709,053 UART: Running Caliptra FMC ...
4,710,158 UART:
4,710,307 UART: [fmc] Received command: 0x46574C44
4,711,758 UART:
4,711,904 UART: Running Caliptra ROM ...
4,712,996 UART:
4,713,144 UART: [state] CFI Enabled
4,722,600 UART: [state] LifecycleState = Unprovisioned
4,724,930 UART: [state] DebugLocked = No
4,726,778 UART: [state] WD Timer not started. Device not locked for debugging
4,731,182 UART: [update-reset] ++
6,173,847 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,177,956 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
6,819,327 UART: [update-reset] Copying MAN_2 To MAN_1
6,842,253 UART: [update-reset Success] --
6,843,932 >>> mbox cmd response: success
6,844,168 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,845,620 UART: [state] Locking Datavault
6,849,915 UART: [state] Locking PCR0, PCR1 and PCR31
6,852,116 UART: [state] Locking ICCM
6,854,805 UART: [exit] Launching FMC @ 0x40000000
6,863,586 UART:
6,863,822 UART: Running Caliptra FMC ...
6,864,919 UART:
6,865,070 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,866,699 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,219,236 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,360,421 UART:
2,360,876 UART: Running Caliptra ROM ...
2,361,950 UART:
2,362,116 UART: [state] CFI Enabled
2,363,022 UART: [state] LifecycleState = Unprovisioned
2,365,786 UART: [state] DebugLocked = No
2,366,925 UART: [state] WD Timer not started. Device not locked for debugging
2,369,409 UART: [fake-rom-cold-reset] ++
2,370,526 UART: [fht] FHT @ 0x50003400
2,371,557 UART: [fwproc] Wait for Commands...
2,372,838 UART: [fwproc] Recv command 0x46574c44
2,374,268 UART: [fwproc] Recv'd Img size: 111668 bytes
3,813,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,881,197 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,941,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,258,365 >>> mbox cmd response: success
4,264,222 UART: [fake-rom-cold-reset] --
4,266,601 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,406,961 UART: [state] Locking Datavault
4,408,247 UART: [state] Locking PCR0, PCR1 and PCR31
4,409,804 UART: [state] Locking ICCM
4,410,723 UART: [exit] Launching FMC @ 0x40000000
4,412,153 UART:
4,412,318 UART: Running Caliptra FMC ...
4,413,421 UART:
4,413,578 UART: [fmc] Received command: 0x46574C44
4,415,048 UART:
4,415,207 UART: Running Caliptra ROM ...
4,416,311 UART:
4,416,467 UART: [state] CFI Enabled
4,467,361 UART: [state] LifecycleState = Unprovisioned
4,469,126 UART: [state] DebugLocked = No
4,470,914 UART: [state] WD Timer not started. Device not locked for debugging
4,476,817 UART: [update-reset] ++
5,949,392 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,952,740 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,326,469 UART: [update-reset] Copying MAN_2 To MAN_1
6,348,697 UART: [update-reset Success] --
6,349,995 >>> mbox cmd response: success
6,350,216 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,352,747 UART: [state] Locking Datavault
6,357,090 UART: [state] Locking PCR0, PCR1 and PCR31
6,358,690 UART: [state] Locking ICCM
6,360,842 UART: [exit] Launching FMC @ 0x40000000
6,369,101 UART:
6,369,392 UART: Running Caliptra FMC ...
6,370,513 UART:
6,370,673 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,372,330 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,217,187 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,358,410 UART:
2,358,830 UART: Running Caliptra ROM ...
2,359,920 UART:
2,360,095 UART: [state] CFI Enabled
2,361,074 UART: [state] LifecycleState = Unprovisioned
2,362,738 UART: [state] DebugLocked = No
2,363,765 UART: [state] WD Timer not started. Device not locked for debugging
2,366,228 UART: [fake-rom-cold-reset] ++
2,367,257 UART: [fht] FHT @ 0x50003400
2,368,231 UART: [fwproc] Wait for Commands...
2,369,515 UART: [fwproc] Recv command 0x46574c44
2,370,863 UART: [fwproc] Recv'd Img size: 111668 bytes
3,818,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,141 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,266,359 >>> mbox cmd response: success
4,272,175 UART: [fake-rom-cold-reset] --
4,274,237 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,414,466 UART: [state] Locking Datavault
4,415,743 UART: [state] Locking PCR0, PCR1 and PCR31
4,417,217 UART: [state] Locking ICCM
4,418,092 UART: [exit] Launching FMC @ 0x40000000
4,419,532 UART:
4,419,692 UART: Running Caliptra FMC ...
4,420,793 UART:
4,420,950 UART: [fmc] Received command: 0x46574C44
4,422,407 UART:
4,422,564 UART: Running Caliptra ROM ...
4,423,585 UART:
4,423,729 UART: [state] CFI Enabled
4,489,280 UART: [state] LifecycleState = Unprovisioned
4,491,050 UART: [state] DebugLocked = No
4,492,763 UART: [state] WD Timer not started. Device not locked for debugging
4,496,613 UART: [update-reset] ++
5,982,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,986,638 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,360,447 UART: [update-reset] Copying MAN_2 To MAN_1
6,382,669 UART: [update-reset Success] --
6,383,958 >>> mbox cmd response: success
6,384,172 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,386,917 UART: [state] Locking Datavault
6,389,730 UART: [state] Locking PCR0, PCR1 and PCR31
6,391,308 UART: [state] Locking ICCM
6,393,304 UART: [exit] Launching FMC @ 0x40000000
6,401,549 UART:
6,401,797 UART: Running Caliptra FMC ...
6,402,903 UART:
6,403,062 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,404,698 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,223,358 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,364,468 UART:
2,364,859 UART: Running Caliptra ROM ...
2,366,039 UART:
2,366,218 UART: [state] CFI Enabled
2,367,191 UART: [state] LifecycleState = Unprovisioned
2,368,853 UART: [state] DebugLocked = No
2,370,069 UART: [state] WD Timer not started. Device not locked for debugging
2,372,547 UART: [fake-rom-cold-reset] ++
2,373,570 UART: [fht] FHT @ 0x50003400
2,374,553 UART: [fwproc] Wait for Commands...
2,375,839 UART: [fwproc] Recv command 0x46574c44
2,377,189 UART: [fwproc] Recv'd Img size: 111668 bytes
3,821,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,897,705 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,957,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,273,731 >>> mbox cmd response: success
4,279,572 UART: [fake-rom-cold-reset] --
4,281,751 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,422,077 UART: [state] Locking Datavault
4,423,341 UART: [state] Locking PCR0, PCR1 and PCR31
4,424,809 UART: [state] Locking ICCM
4,425,784 UART: [exit] Launching FMC @ 0x40000000
4,427,124 UART:
4,427,270 UART: Running Caliptra FMC ...
4,428,375 UART:
4,428,526 UART: [fmc] Received command: 0x46574C44
4,429,900 UART:
4,430,046 UART: Running Caliptra ROM ...
4,431,169 UART:
4,431,325 UART: [state] CFI Enabled
4,441,753 UART: [state] LifecycleState = Unprovisioned
4,443,465 UART: [state] DebugLocked = No
4,445,309 UART: [state] WD Timer not started. Device not locked for debugging
4,450,767 UART: [update-reset] ++
5,914,296 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,917,259 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,291,148 UART: [update-reset] Copying MAN_2 To MAN_1
6,313,406 UART: [update-reset Success] --
6,314,863 >>> mbox cmd response: success
6,315,083 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,316,541 UART: [state] Locking Datavault
6,319,147 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,689 UART: [state] Locking ICCM
6,322,731 UART: [exit] Launching FMC @ 0x40000000
6,330,926 UART:
6,331,163 UART: Running Caliptra FMC ...
6,332,262 UART:
6,332,415 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,334,058 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,225,318 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,366,562 UART:
2,366,981 UART: Running Caliptra ROM ...
2,368,098 UART:
2,368,286 UART: [state] CFI Enabled
2,369,256 UART: [state] LifecycleState = Unprovisioned
2,370,909 UART: [state] DebugLocked = No
2,372,014 UART: [state] WD Timer not started. Device not locked for debugging
2,374,485 UART: [fake-rom-cold-reset] ++
2,375,585 UART: [fht] FHT @ 0x50003400
2,376,614 UART: [fwproc] Wait for Commands...
2,377,901 UART: [fwproc] Recv command 0x46574c44
2,379,333 UART: [fwproc] Recv'd Img size: 111668 bytes
3,820,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,893,125 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,953,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,270,370 >>> mbox cmd response: success
4,276,217 UART: [fake-rom-cold-reset] --
4,278,288 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,418,639 UART: [state] Locking Datavault
4,419,934 UART: [state] Locking PCR0, PCR1 and PCR31
4,421,490 UART: [state] Locking ICCM
4,422,403 UART: [exit] Launching FMC @ 0x40000000
4,423,827 UART:
4,423,982 UART: Running Caliptra FMC ...
4,425,077 UART:
4,425,234 UART: [fmc] Received command: 0x46574C44
4,426,686 UART:
4,426,838 UART: Running Caliptra ROM ...
4,427,932 UART:
4,428,086 UART: [state] CFI Enabled
4,432,731 UART: [state] LifecycleState = Unprovisioned
4,434,452 UART: [state] DebugLocked = No
4,436,521 UART: [state] WD Timer not started. Device not locked for debugging
4,442,089 UART: [update-reset] ++
5,912,771 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,916,061 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,289,736 UART: [update-reset] Copying MAN_2 To MAN_1
6,311,944 UART: [update-reset Success] --
6,313,222 >>> mbox cmd response: success
6,313,440 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,316,779 UART: [state] Locking Datavault
6,320,253 UART: [state] Locking PCR0, PCR1 and PCR31
6,321,798 UART: [state] Locking ICCM
6,323,269 UART: [exit] Launching FMC @ 0x40000000
6,331,458 UART:
6,331,734 UART: Running Caliptra FMC ...
6,332,765 UART:
6,332,912 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,334,544 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,219,226 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,360,621 UART:
2,361,036 UART: Running Caliptra ROM ...
2,362,245 UART:
2,362,415 UART: [state] CFI Enabled
2,363,383 UART: [state] LifecycleState = Unprovisioned
2,365,044 UART: [state] DebugLocked = No
2,366,155 UART: [state] WD Timer not started. Device not locked for debugging
2,368,631 UART: [fake-rom-cold-reset] ++
2,369,737 UART: [fht] FHT @ 0x50003400
2,370,768 UART: [fwproc] Wait for Commands...
2,372,051 UART: [fwproc] Recv command 0x46574c44
2,373,483 UART: [fwproc] Recv'd Img size: 111668 bytes
3,810,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,883,081 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,943,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,260,400 >>> mbox cmd response: success
4,266,244 UART: [fake-rom-cold-reset] --
4,268,271 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,408,634 UART: [state] Locking Datavault
4,409,903 UART: [state] Locking PCR0, PCR1 and PCR31
4,411,453 UART: [state] Locking ICCM
4,412,386 UART: [exit] Launching FMC @ 0x40000000
4,413,813 UART:
4,413,970 UART: Running Caliptra FMC ...
4,415,068 UART:
4,415,228 UART: [fmc] Received command: 0x46574C44
4,416,684 UART:
4,416,839 UART: Running Caliptra ROM ...
4,417,935 UART:
4,418,090 UART: [state] CFI Enabled
4,478,709 UART: [state] LifecycleState = Unprovisioned
4,480,481 UART: [state] DebugLocked = No
4,482,625 UART: [state] WD Timer not started. Device not locked for debugging
4,488,638 UART: [update-reset] ++
5,962,756 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,965,249 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,339,453 UART: [update-reset] Copying MAN_2 To MAN_1
6,361,680 UART: [update-reset Success] --
6,362,992 >>> mbox cmd response: success
6,363,213 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,366,552 UART: [state] Locking Datavault
6,368,025 UART: [state] Locking PCR0, PCR1 and PCR31
6,369,567 UART: [state] Locking ICCM
6,371,174 UART: [exit] Launching FMC @ 0x40000000
6,379,407 UART:
6,379,648 UART: Running Caliptra FMC ...
6,380,750 UART:
6,380,905 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,382,553 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,216,568 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,357,580 UART:
2,357,995 UART: Running Caliptra ROM ...
2,359,072 UART:
2,359,228 UART: [state] CFI Enabled
2,360,131 UART: [state] LifecycleState = Unprovisioned
2,361,787 UART: [state] DebugLocked = No
2,362,899 UART: [state] WD Timer not started. Device not locked for debugging
2,365,738 UART: [fake-rom-cold-reset] ++
2,366,863 UART: [fht] FHT @ 0x50003400
2,367,895 UART: [fwproc] Wait for Commands...
2,369,203 UART: [fwproc] Recv command 0x46574c44
2,370,649 UART: [fwproc] Recv'd Img size: 111668 bytes
3,811,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,881,055 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,941,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,257,195 >>> mbox cmd response: success
4,263,010 UART: [fake-rom-cold-reset] --
4,265,121 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,405,472 UART: [state] Locking Datavault
4,406,732 UART: [state] Locking PCR0, PCR1 and PCR31
4,408,288 UART: [state] Locking ICCM
4,409,196 UART: [exit] Launching FMC @ 0x40000000
4,410,619 UART:
4,410,776 UART: Running Caliptra FMC ...
4,411,881 UART:
4,412,036 UART: [fmc] Received command: 0x46574C44
4,413,521 UART:
4,413,680 UART: Running Caliptra ROM ...
4,414,782 UART:
4,414,936 UART: [state] CFI Enabled
4,465,119 UART: [state] LifecycleState = Unprovisioned
4,466,833 UART: [state] DebugLocked = No
4,469,568 UART: [state] WD Timer not started. Device not locked for debugging
4,474,332 UART: [update-reset] ++
5,939,481 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,942,950 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,316,845 UART: [update-reset] Copying MAN_2 To MAN_1
6,339,056 UART: [update-reset Success] --
6,340,366 >>> mbox cmd response: success
6,340,584 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,341,011 UART: [state] Locking Datavault
6,344,697 UART: [state] Locking PCR0, PCR1 and PCR31
6,346,256 UART: [state] Locking ICCM
6,347,330 UART: [exit] Launching FMC @ 0x40000000
6,355,564 UART:
6,355,800 UART: Running Caliptra FMC ...
6,356,902 UART:
6,357,059 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,358,689 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,219,769 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,361,712 UART:
2,362,134 UART: Running Caliptra ROM ...
2,363,219 UART:
2,363,370 UART: [state] CFI Enabled
2,364,334 UART: [state] LifecycleState = Unprovisioned
2,365,986 UART: [state] DebugLocked = No
2,367,011 UART: [state] WD Timer not started. Device not locked for debugging
2,369,484 UART: [fake-rom-cold-reset] ++
2,370,525 UART: [fht] FHT @ 0x50003400
2,371,503 UART: [fwproc] Wait for Commands...
2,372,792 UART: [fwproc] Recv command 0x46574c44
2,374,137 UART: [fwproc] Recv'd Img size: 111668 bytes
3,808,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,881,066 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,941,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,257,091 >>> mbox cmd response: success
4,262,893 UART: [fake-rom-cold-reset] --
4,265,355 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,406,100 UART: [state] Locking Datavault
4,407,399 UART: [state] Locking PCR0, PCR1 and PCR31
4,408,866 UART: [state] Locking ICCM
4,409,739 UART: [exit] Launching FMC @ 0x40000000
4,411,171 UART:
4,411,332 UART: Running Caliptra FMC ...
4,412,430 UART:
4,412,586 UART: [fmc] Received command: 0x46574C44
4,414,042 UART:
4,414,196 UART: Running Caliptra ROM ...
4,415,210 UART:
4,415,377 UART: [state] CFI Enabled
4,423,753 UART: [state] LifecycleState = Unprovisioned
4,425,535 UART: [state] DebugLocked = No
4,427,965 UART: [state] WD Timer not started. Device not locked for debugging
4,433,638 UART: [update-reset] ++
5,906,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,909,665 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,284,673 UART: [update-reset] Copying MAN_2 To MAN_1
6,306,922 UART: [update-reset Success] --
6,308,227 >>> mbox cmd response: success
6,308,444 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,310,541 UART: [state] Locking Datavault
6,313,636 UART: [state] Locking PCR0, PCR1 and PCR31
6,315,176 UART: [state] Locking ICCM
6,317,292 UART: [exit] Launching FMC @ 0x40000000
6,325,523 UART:
6,325,779 UART: Running Caliptra FMC ...
6,326,882 UART:
6,327,040 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,328,684 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,220,932 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,362,950 UART:
2,363,354 UART: Running Caliptra ROM ...
2,364,535 UART:
2,364,709 UART: [state] CFI Enabled
2,365,681 UART: [state] LifecycleState = Unprovisioned
2,367,354 UART: [state] DebugLocked = No
2,368,458 UART: [state] WD Timer not started. Device not locked for debugging
2,370,935 UART: [fake-rom-cold-reset] ++
2,371,990 UART: [fht] FHT @ 0x50003400
2,372,961 UART: [fwproc] Wait for Commands...
2,374,287 UART: [fwproc] Recv command 0x46574c44
2,375,727 UART: [fwproc] Recv'd Img size: 111668 bytes
3,804,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,876,976 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,937,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
4,253,729 >>> mbox cmd response: success
4,259,606 UART: [fake-rom-cold-reset] --
4,261,761 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
4,401,948 UART: [state] Locking Datavault
4,403,198 UART: [state] Locking PCR0, PCR1 and PCR31
4,404,746 UART: [state] Locking ICCM
4,405,653 UART: [exit] Launching FMC @ 0x40000000
4,407,076 UART:
4,407,234 UART: Running Caliptra FMC ...
4,408,330 UART:
4,408,482 UART: [fmc] Received command: 0x46574C44
4,409,937 UART:
4,410,088 UART: Running Caliptra ROM ...
4,411,187 UART:
4,411,335 UART: [state] CFI Enabled
4,418,941 UART: [state] LifecycleState = Unprovisioned
4,420,729 UART: [state] DebugLocked = No
4,423,323 UART: [state] WD Timer not started. Device not locked for debugging
4,429,167 UART: [update-reset] ++
5,895,664 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,899,562 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,274,150 UART: [update-reset] Copying MAN_2 To MAN_1
6,296,396 UART: [update-reset Success] --
6,297,659 >>> mbox cmd response: success
6,297,877 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,300,562 UART: [state] Locking Datavault
6,303,163 UART: [state] Locking PCR0, PCR1 and PCR31
6,304,751 UART: [state] Locking ICCM
6,306,414 UART: [exit] Launching FMC @ 0x40000000
6,314,644 UART:
6,314,877 UART: Running Caliptra FMC ...
6,315,977 UART:
6,316,130 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,317,780 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [fake-rom-cold-reset] ++
88,564 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,648 UART: [fht] FHT @ 0x50003400
92,097 UART: [fwproc] Wait for Commands...
92,748 UART: [fwproc] Recv command 0x46574c44
93,476 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,930 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,988 >>> mbox cmd response: success
1,545,146 UART: [fake-rom-cold-reset] --
1,545,541 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,545,860 UART: [state] Locking Datavault
1,547,101 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,705 UART: [state] Locking ICCM
1,548,189 UART: [exit] Launching FMC @ 0x40000000
1,553,486 UART:
1,553,502 UART: Running Caliptra FMC ...
1,553,910 UART:
1,554,051 UART: [fmc] Received command: 0x46574C44
1,554,875 UART:
1,554,891 UART: Running Caliptra ROM ...
1,555,299 UART:
1,555,354 UART: [state] CFI Enabled
1,558,072 UART: [state] LifecycleState = Unprovisioned
1,558,731 UART: [state] DebugLocked = No
1,559,272 UART: [state] WD Timer not started. Device not locked for debugging
1,560,940 UART: [update-reset] ++
2,837,573 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,838,649 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,986,550 UART: [update-reset] Copying MAN_2 To MAN_1
2,994,564 UART: [update-reset Success] --
2,994,973 >>> mbox cmd response: success
2,994,973 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,995,444 UART: [state] Locking Datavault
2,996,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,996,746 UART: [state] Locking ICCM
2,997,318 UART: [exit] Launching FMC @ 0x40000000
3,002,615 UART:
3,002,631 UART: Running Caliptra FMC ...
3,003,039 UART:
3,003,180 UART: [fmc] Received command: 0x1000000C
3,003,915 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [fake-rom-cold-reset] ++
89,100 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,246 UART: [fht] FHT @ 0x50003400
92,619 UART: [fwproc] Wait for Commands...
93,362 UART: [fwproc] Recv command 0x46574c44
94,090 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,144 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,406,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,312 >>> mbox cmd response: success
1,543,470 UART: [fake-rom-cold-reset] --
1,543,865 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,544,418 UART: [state] Locking Datavault
1,545,679 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,283 UART: [state] Locking ICCM
1,546,839 UART: [exit] Launching FMC @ 0x40000000
1,552,136 UART:
1,552,152 UART: Running Caliptra FMC ...
1,552,560 UART:
1,552,701 UART: [fmc] Received command: 0x46574C44
1,553,525 UART:
1,553,541 UART: Running Caliptra ROM ...
1,553,949 UART:
1,554,004 UART: [state] CFI Enabled
1,556,708 UART: [state] LifecycleState = Unprovisioned
1,557,367 UART: [state] DebugLocked = No
1,557,866 UART: [state] WD Timer not started. Device not locked for debugging
1,559,466 UART: [update-reset] ++
2,834,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,835,611 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,983,390 UART: [update-reset] Copying MAN_2 To MAN_1
2,991,404 UART: [update-reset Success] --
2,991,813 >>> mbox cmd response: success
2,991,813 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,992,372 UART: [state] Locking Datavault
2,993,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,993,824 UART: [state] Locking ICCM
2,994,460 UART: [exit] Launching FMC @ 0x40000000
2,999,757 UART:
2,999,773 UART: Running Caliptra FMC ...
3,000,181 UART:
3,000,322 UART: [fmc] Received command: 0x1000000C
3,001,057 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [fake-rom-cold-reset] ++
88,835 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,947 UART: [fht] FHT @ 0x50003400
92,250 UART: [fwproc] Wait for Commands...
92,921 UART: [fwproc] Recv command 0x46574c44
93,649 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,081 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,103 >>> mbox cmd response: success
1,545,261 UART: [fake-rom-cold-reset] --
1,545,656 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,546,169 UART: [state] Locking Datavault
1,547,566 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,170 UART: [state] Locking ICCM
1,548,788 UART: [exit] Launching FMC @ 0x40000000
1,554,085 UART:
1,554,101 UART: Running Caliptra FMC ...
1,554,509 UART:
1,554,650 UART: [fmc] Received command: 0x46574C44
1,555,474 UART:
1,555,490 UART: Running Caliptra ROM ...
1,555,898 UART:
1,556,040 UART: [state] CFI Enabled
1,558,978 UART: [state] LifecycleState = Unprovisioned
1,559,637 UART: [state] DebugLocked = No
1,560,208 UART: [state] WD Timer not started. Device not locked for debugging
1,561,820 UART: [update-reset] ++
2,838,239 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,839,229 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,987,116 UART: [update-reset] Copying MAN_2 To MAN_1
2,995,130 UART: [update-reset Success] --
2,995,539 >>> mbox cmd response: success
2,995,539 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,996,062 UART: [state] Locking Datavault
2,996,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,997,542 UART: [state] Locking ICCM
2,998,198 UART: [exit] Launching FMC @ 0x40000000
3,003,495 UART:
3,003,511 UART: Running Caliptra FMC ...
3,003,919 UART:
3,004,060 UART: [fmc] Received command: 0x1000000C
3,004,795 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,767 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,407 UART: [fake-rom-cold-reset] ++
88,335 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,597 UART: [fht] FHT @ 0x50003400
92,062 UART: [fwproc] Wait for Commands...
92,739 UART: [fwproc] Recv command 0x46574c44
93,467 UART: [fwproc] Recv'd Img size: 111668 bytes
1,357,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,845 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,545,875 >>> mbox cmd response: success
1,547,033 UART: [fake-rom-cold-reset] --
1,547,428 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,547,915 UART: [state] Locking Datavault
1,549,224 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,828 UART: [state] Locking ICCM
1,550,438 UART: [exit] Launching FMC @ 0x40000000
1,555,735 UART:
1,555,751 UART: Running Caliptra FMC ...
1,556,159 UART:
1,556,300 UART: [fmc] Received command: 0x46574C44
1,557,124 UART:
1,557,140 UART: Running Caliptra ROM ...
1,557,548 UART:
1,557,690 UART: [state] CFI Enabled
1,560,848 UART: [state] LifecycleState = Unprovisioned
1,561,507 UART: [state] DebugLocked = No
1,562,036 UART: [state] WD Timer not started. Device not locked for debugging
1,563,500 UART: [update-reset] ++
2,839,315 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,840,409 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,988,208 UART: [update-reset] Copying MAN_2 To MAN_1
2,996,222 UART: [update-reset Success] --
2,996,631 >>> mbox cmd response: success
2,996,631 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,997,110 UART: [state] Locking Datavault
2,998,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,676 UART: [state] Locking ICCM
2,999,194 UART: [exit] Launching FMC @ 0x40000000
3,004,491 UART:
3,004,507 UART: Running Caliptra FMC ...
3,004,915 UART:
3,005,056 UART: [fmc] Received command: 0x1000000C
3,005,791 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,312 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [fake-rom-cold-reset] ++
88,722 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,030 UART: [fht] FHT @ 0x50003400
92,251 UART: [fwproc] Wait for Commands...
92,866 UART: [fwproc] Recv command 0x46574c44
93,594 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,376 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,564 >>> mbox cmd response: success
1,543,722 UART: [fake-rom-cold-reset] --
1,544,117 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,544,434 UART: [state] Locking Datavault
1,545,661 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,265 UART: [state] Locking ICCM
1,546,801 UART: [exit] Launching FMC @ 0x40000000
1,552,098 UART:
1,552,114 UART: Running Caliptra FMC ...
1,552,522 UART:
1,552,663 UART: [fmc] Received command: 0x46574C44
1,553,487 UART:
1,553,503 UART: Running Caliptra ROM ...
1,553,911 UART:
1,553,966 UART: [state] CFI Enabled
1,556,748 UART: [state] LifecycleState = Unprovisioned
1,557,407 UART: [state] DebugLocked = No
1,558,136 UART: [state] WD Timer not started. Device not locked for debugging
1,559,574 UART: [update-reset] ++
2,837,367 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,838,333 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,986,186 UART: [update-reset] Copying MAN_2 To MAN_1
2,994,200 UART: [update-reset Success] --
2,994,609 >>> mbox cmd response: success
2,994,609 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,995,166 UART: [state] Locking Datavault
2,995,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,996,424 UART: [state] Locking ICCM
2,997,006 UART: [exit] Launching FMC @ 0x40000000
3,002,303 UART:
3,002,319 UART: Running Caliptra FMC ...
3,002,727 UART:
3,002,868 UART: [fmc] Received command: 0x1000000C
3,003,603 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [fake-rom-cold-reset] ++
88,848 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,002 UART: [fht] FHT @ 0x50003400
92,457 UART: [fwproc] Wait for Commands...
93,200 UART: [fwproc] Recv command 0x46574c44
93,928 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,996 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,052 >>> mbox cmd response: success
1,545,210 UART: [fake-rom-cold-reset] --
1,545,605 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,545,954 UART: [state] Locking Datavault
1,547,025 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,629 UART: [state] Locking ICCM
1,548,217 UART: [exit] Launching FMC @ 0x40000000
1,553,514 UART:
1,553,530 UART: Running Caliptra FMC ...
1,553,938 UART:
1,554,079 UART: [fmc] Received command: 0x46574C44
1,554,903 UART:
1,554,919 UART: Running Caliptra ROM ...
1,555,327 UART:
1,555,382 UART: [state] CFI Enabled
1,557,950 UART: [state] LifecycleState = Unprovisioned
1,558,609 UART: [state] DebugLocked = No
1,559,170 UART: [state] WD Timer not started. Device not locked for debugging
1,560,862 UART: [update-reset] ++
2,836,259 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,837,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,985,148 UART: [update-reset] Copying MAN_2 To MAN_1
2,993,162 UART: [update-reset Success] --
2,993,571 >>> mbox cmd response: success
2,993,571 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,993,952 UART: [state] Locking Datavault
2,994,768 UART: [state] Locking PCR0, PCR1 and PCR31
2,995,372 UART: [state] Locking ICCM
2,995,864 UART: [exit] Launching FMC @ 0x40000000
3,001,161 UART:
3,001,177 UART: Running Caliptra FMC ...
3,001,585 UART:
3,001,726 UART: [fmc] Received command: 0x1000000C
3,002,461 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [fake-rom-cold-reset] ++
88,861 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,167 UART: [fht] FHT @ 0x50003400
92,512 UART: [fwproc] Wait for Commands...
93,233 UART: [fwproc] Recv command 0x46574c44
93,961 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,321 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,499 >>> mbox cmd response: success
1,544,657 UART: [fake-rom-cold-reset] --
1,545,052 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,545,423 UART: [state] Locking Datavault
1,546,604 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,208 UART: [state] Locking ICCM
1,547,670 UART: [exit] Launching FMC @ 0x40000000
1,552,967 UART:
1,552,983 UART: Running Caliptra FMC ...
1,553,391 UART:
1,553,532 UART: [fmc] Received command: 0x46574C44
1,554,356 UART:
1,554,372 UART: Running Caliptra ROM ...
1,554,780 UART:
1,554,922 UART: [state] CFI Enabled
1,557,498 UART: [state] LifecycleState = Unprovisioned
1,558,157 UART: [state] DebugLocked = No
1,558,874 UART: [state] WD Timer not started. Device not locked for debugging
1,560,338 UART: [update-reset] ++
2,836,091 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,837,163 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,984,974 UART: [update-reset] Copying MAN_2 To MAN_1
2,992,988 UART: [update-reset Success] --
2,993,397 >>> mbox cmd response: success
2,993,397 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,994,082 UART: [state] Locking Datavault
2,994,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,995,418 UART: [state] Locking ICCM
2,995,870 UART: [exit] Launching FMC @ 0x40000000
3,001,167 UART:
3,001,183 UART: Running Caliptra FMC ...
3,001,591 UART:
3,001,732 UART: [fmc] Received command: 0x1000000C
3,002,467 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [fake-rom-cold-reset] ++
88,501 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,701 UART: [fht] FHT @ 0x50003400
91,934 UART: [fwproc] Wait for Commands...
92,669 UART: [fwproc] Recv command 0x46574c44
93,397 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,447 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,471 >>> mbox cmd response: success
1,545,629 UART: [fake-rom-cold-reset] --
1,546,024 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,546,309 UART: [state] Locking Datavault
1,547,524 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,128 UART: [state] Locking ICCM
1,548,658 UART: [exit] Launching FMC @ 0x40000000
1,553,955 UART:
1,553,971 UART: Running Caliptra FMC ...
1,554,379 UART:
1,554,520 UART: [fmc] Received command: 0x46574C44
1,555,344 UART:
1,555,360 UART: Running Caliptra ROM ...
1,555,768 UART:
1,555,910 UART: [state] CFI Enabled
1,558,820 UART: [state] LifecycleState = Unprovisioned
1,559,479 UART: [state] DebugLocked = No
1,560,000 UART: [state] WD Timer not started. Device not locked for debugging
1,561,538 UART: [update-reset] ++
2,837,513 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,838,497 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,986,400 UART: [update-reset] Copying MAN_2 To MAN_1
2,994,414 UART: [update-reset Success] --
2,994,823 >>> mbox cmd response: success
2,994,823 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,995,380 UART: [state] Locking Datavault
2,996,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,996,746 UART: [state] Locking ICCM
2,997,286 UART: [exit] Launching FMC @ 0x40000000
3,002,583 UART:
3,002,599 UART: Running Caliptra FMC ...
3,003,007 UART:
3,003,148 UART: [fmc] Received command: 0x1000000C
3,003,883 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [fake-rom-cold-reset] ++
88,680 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
88,826 UART: [fht] FHT @ 0x50003400
92,119 UART: [fwproc] Wait for Commands...
92,864 UART: [fwproc] Recv command 0x46574c44
93,592 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,421 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,623 >>> mbox cmd response: success
1,544,781 UART: [fake-rom-cold-reset] --
1,545,176 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,545,683 UART: [state] Locking Datavault
1,546,866 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,470 UART: [state] Locking ICCM
1,548,024 UART: [exit] Launching FMC @ 0x40000000
1,553,321 UART:
1,553,337 UART: Running Caliptra FMC ...
1,553,745 UART:
1,553,886 UART: [fmc] Received command: 0x46574C44
1,554,710 UART:
1,554,726 UART: Running Caliptra ROM ...
1,555,134 UART:
1,555,189 UART: [state] CFI Enabled
1,557,905 UART: [state] LifecycleState = Unprovisioned
1,558,564 UART: [state] DebugLocked = No
1,559,141 UART: [state] WD Timer not started. Device not locked for debugging
1,560,753 UART: [update-reset] ++
2,835,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,837,019 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,984,836 UART: [update-reset] Copying MAN_2 To MAN_1
2,992,850 UART: [update-reset Success] --
2,993,259 >>> mbox cmd response: success
2,993,259 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,993,504 UART: [state] Locking Datavault
2,994,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,994,892 UART: [state] Locking ICCM
2,995,410 UART: [exit] Launching FMC @ 0x40000000
3,000,707 UART:
3,000,723 UART: Running Caliptra FMC ...
3,001,131 UART:
3,001,272 UART: [fmc] Received command: 0x1000000C
3,002,007 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [fake-rom-cold-reset] ++
89,076 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,362 UART: [fht] FHT @ 0x50003400
92,597 UART: [fwproc] Wait for Commands...
93,428 UART: [fwproc] Recv command 0x46574c44
94,156 UART: [fwproc] Recv'd Img size: 111668 bytes
1,356,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,142 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,544,356 >>> mbox cmd response: success
1,545,514 UART: [fake-rom-cold-reset] --
1,545,909 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,546,350 UART: [state] Locking Datavault
1,547,293 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,897 UART: [state] Locking ICCM
1,548,549 UART: [exit] Launching FMC @ 0x40000000
1,553,846 UART:
1,553,862 UART: Running Caliptra FMC ...
1,554,270 UART:
1,554,411 UART: [fmc] Received command: 0x46574C44
1,555,235 UART:
1,555,251 UART: Running Caliptra ROM ...
1,555,659 UART:
1,555,714 UART: [state] CFI Enabled
1,558,064 UART: [state] LifecycleState = Unprovisioned
1,558,723 UART: [state] DebugLocked = No
1,559,342 UART: [state] WD Timer not started. Device not locked for debugging
1,560,852 UART: [update-reset] ++
2,837,787 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,838,987 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,986,850 UART: [update-reset] Copying MAN_2 To MAN_1
2,994,864 UART: [update-reset Success] --
2,995,273 >>> mbox cmd response: success
2,995,273 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,995,960 UART: [state] Locking Datavault
2,996,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,997,312 UART: [state] Locking ICCM
2,997,806 UART: [exit] Launching FMC @ 0x40000000
3,003,103 UART:
3,003,119 UART: Running Caliptra FMC ...
3,003,527 UART:
3,003,668 UART: [fmc] Received command: 0x1000000C
3,004,403 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [fake-rom-cold-reset] ++
88,937 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,131 UART: [fht] FHT @ 0x50003400
92,490 UART: [fwproc] Wait for Commands...
93,135 UART: [fwproc] Recv command 0x46574c44
93,863 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,503 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,542,637 >>> mbox cmd response: success
1,543,795 UART: [fake-rom-cold-reset] --
1,544,190 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,544,563 UART: [state] Locking Datavault
1,545,464 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,068 UART: [state] Locking ICCM
1,546,594 UART: [exit] Launching FMC @ 0x40000000
1,551,891 UART:
1,551,907 UART: Running Caliptra FMC ...
1,552,315 UART:
1,552,456 UART: [fmc] Received command: 0x46574C44
1,553,280 UART:
1,553,296 UART: Running Caliptra ROM ...
1,553,704 UART:
1,553,846 UART: [state] CFI Enabled
1,556,434 UART: [state] LifecycleState = Unprovisioned
1,557,093 UART: [state] DebugLocked = No
1,557,702 UART: [state] WD Timer not started. Device not locked for debugging
1,559,350 UART: [update-reset] ++
2,835,217 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,836,243 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,984,002 UART: [update-reset] Copying MAN_2 To MAN_1
2,992,016 UART: [update-reset Success] --
2,992,425 >>> mbox cmd response: success
2,992,425 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,992,966 UART: [state] Locking Datavault
2,993,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,994,360 UART: [state] Locking ICCM
2,994,854 UART: [exit] Launching FMC @ 0x40000000
3,000,151 UART:
3,000,167 UART: Running Caliptra FMC ...
3,000,575 UART:
3,000,716 UART: [fmc] Received command: 0x1000000C
3,001,451 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,833 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [fake-rom-cold-reset] ++
89,345 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
89,539 UART: [fht] FHT @ 0x50003400
92,948 UART: [fwproc] Wait for Commands...
93,711 UART: [fwproc] Recv command 0x46574c44
94,439 UART: [fwproc] Recv'd Img size: 111668 bytes
1,355,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,381,833 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,407,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,543,019 >>> mbox cmd response: success
1,544,177 UART: [fake-rom-cold-reset] --
1,544,572 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,544,793 UART: [state] Locking Datavault
1,545,764 UART: [state] Locking PCR0, PCR1 and PCR31
1,546,368 UART: [state] Locking ICCM
1,546,858 UART: [exit] Launching FMC @ 0x40000000
1,552,155 UART:
1,552,171 UART: Running Caliptra FMC ...
1,552,579 UART:
1,552,720 UART: [fmc] Received command: 0x46574C44
1,553,544 UART:
1,553,560 UART: Running Caliptra ROM ...
1,553,968 UART:
1,554,110 UART: [state] CFI Enabled
1,556,640 UART: [state] LifecycleState = Unprovisioned
1,557,299 UART: [state] DebugLocked = No
1,558,024 UART: [state] WD Timer not started. Device not locked for debugging
1,559,426 UART: [update-reset] ++
2,835,661 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,836,789 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,984,562 UART: [update-reset] Copying MAN_2 To MAN_1
2,992,576 UART: [update-reset Success] --
2,992,985 >>> mbox cmd response: success
2,992,985 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,993,526 UART: [state] Locking Datavault
2,994,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,995,064 UART: [state] Locking ICCM
2,995,568 UART: [exit] Launching FMC @ 0x40000000
3,000,865 UART:
3,000,881 UART: Running Caliptra FMC ...
3,001,289 UART:
3,001,430 UART: [fmc] Received command: 0x1000000C
3,002,165 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,267 UART:
192,627 UART: Running Caliptra ROM ...
193,857 UART:
194,013 UART: [state] CFI Enabled
264,578 UART: [state] LifecycleState = Unprovisioned
266,970 UART: [state] DebugLocked = No
270,033 UART: [state] WD Timer not started. Device not locked for debugging
276,396 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,021 UART:
192,415 UART: Running Caliptra ROM ...
193,654 UART:
193,807 UART: [state] CFI Enabled
260,995 UART: [state] LifecycleState = Unprovisioned
263,399 UART: [state] DebugLocked = No
265,150 UART: [state] WD Timer not started. Device not locked for debugging
270,361 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,522 UART:
192,920 UART: Running Caliptra ROM ...
194,070 UART:
603,892 UART: [state] CFI Enabled
619,175 UART: [state] LifecycleState = Unprovisioned
621,521 UART: [state] DebugLocked = No
624,626 UART: [state] WD Timer not started. Device not locked for debugging
629,777 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
192,757 UART:
193,141 UART: Running Caliptra ROM ...
194,332 UART:
604,361 UART: [state] CFI Enabled
618,952 UART: [state] LifecycleState = Unprovisioned
621,334 UART: [state] DebugLocked = No
623,200 UART: [state] WD Timer not started. Device not locked for debugging
629,885 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,097 UART:
192,486 UART: Running Caliptra ROM ...
193,669 UART:
193,829 UART: [state] CFI Enabled
263,316 UART: [state] LifecycleState = Unprovisioned
265,099 UART: [state] DebugLocked = No
266,590 UART: [state] WD Timer not started. Device not locked for debugging
271,597 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,038 UART:
192,489 UART: Running Caliptra ROM ...
193,604 UART:
193,751 UART: [state] CFI Enabled
264,269 UART: [state] LifecycleState = Unprovisioned
265,999 UART: [state] DebugLocked = No
268,189 UART: [state] WD Timer not started. Device not locked for debugging
271,874 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,450 UART:
192,828 UART: Running Caliptra ROM ...
194,009 UART:
603,447 UART: [state] CFI Enabled
616,305 UART: [state] LifecycleState = Unprovisioned
618,054 UART: [state] DebugLocked = No
619,971 UART: [state] WD Timer not started. Device not locked for debugging
624,958 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,453 UART:
192,834 UART: Running Caliptra ROM ...
194,019 UART:
603,631 UART: [state] CFI Enabled
617,586 UART: [state] LifecycleState = Unprovisioned
619,328 UART: [state] DebugLocked = No
620,890 UART: [state] WD Timer not started. Device not locked for debugging
626,040 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,053 UART:
192,438 UART: Running Caliptra ROM ...
193,640 UART:
193,792 UART: [state] CFI Enabled
264,172 UART: [state] LifecycleState = Unprovisioned
265,902 UART: [state] DebugLocked = No
268,530 UART: [state] WD Timer not started. Device not locked for debugging
272,713 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,078 UART:
192,490 UART: Running Caliptra ROM ...
193,684 UART:
193,857 UART: [state] CFI Enabled
265,463 UART: [state] LifecycleState = Unprovisioned
267,247 UART: [state] DebugLocked = No
269,271 UART: [state] WD Timer not started. Device not locked for debugging
272,637 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,360 UART:
192,760 UART: Running Caliptra ROM ...
193,867 UART:
603,591 UART: [state] CFI Enabled
620,534 UART: [state] LifecycleState = Unprovisioned
622,226 UART: [state] DebugLocked = No
624,890 UART: [state] WD Timer not started. Device not locked for debugging
630,251 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,455 UART:
192,824 UART: Running Caliptra ROM ...
194,028 UART:
603,598 UART: [state] CFI Enabled
614,487 UART: [state] LifecycleState = Unprovisioned
616,493 UART: [state] DebugLocked = No
618,744 UART: [state] WD Timer not started. Device not locked for debugging
622,685 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,256 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,106 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,781 UART: [state] LifecycleState = Unprovisioned
85,440 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,212,153 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,353,178 UART:
2,353,590 UART: Running Caliptra ROM ...
2,354,769 UART:
2,354,942 UART: [state] CFI Enabled
2,355,903 UART: [state] LifecycleState = Unprovisioned
2,357,569 UART: [state] DebugLocked = No
2,358,676 UART: [state] WD Timer not started. Device not locked for debugging
2,361,154 UART: [fake-rom-cold-reset] ++
2,362,280 UART: [fht] FHT @ 0x50003400
2,363,309 UART: [fwproc] Wait for Commands...
2,364,589 UART: [fwproc] Recv command 0x46574c44
2,366,023 UART: [fwproc] Recv'd Img size: 111324 bytes
3,758,218 UART: ROM Fatal Error: 0x000B000C
3,762,066 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,212,339 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,353,146 UART:
2,353,576 UART: Running Caliptra ROM ...
2,354,765 UART:
2,354,938 UART: [state] CFI Enabled
2,355,901 UART: [state] LifecycleState = Unprovisioned
2,357,556 UART: [state] DebugLocked = No
2,358,663 UART: [state] WD Timer not started. Device not locked for debugging
2,361,139 UART: [fake-rom-cold-reset] ++
2,362,243 UART: [fht] FHT @ 0x50003400
2,363,226 UART: [fwproc] Wait for Commands...
2,364,509 UART: [fwproc] Recv command 0x46574c44
2,365,941 UART: [fwproc] Recv'd Img size: 111324 bytes
3,767,228 UART: ROM Fatal Error: 0x000B000C
3,771,067 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
2,217,936 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,358,778 UART:
2,359,199 UART: Running Caliptra ROM ...
2,360,399 UART:
2,360,559 UART: [state] CFI Enabled
2,361,622 UART: [state] LifecycleState = Unprovisioned
2,363,269 UART: [state] DebugLocked = No
2,364,292 UART: [state] WD Timer not started. Device not locked for debugging
2,366,753 UART: [fake-rom-cold-reset] ++
2,367,772 UART: [fht] FHT @ 0x50003400
2,368,746 UART: [fwproc] Wait for Commands...
2,370,020 UART: [fwproc] Recv command 0x46574c44
2,371,362 UART: [fwproc] Recv'd Img size: 111324 bytes
3,768,258 UART: ROM Fatal Error: 0x000B000C
3,772,091 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,217,393 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,358,252 UART:
2,358,685 UART: Running Caliptra ROM ...
2,359,775 UART:
2,359,921 UART: [state] CFI Enabled
2,360,889 UART: [state] LifecycleState = Unprovisioned
2,362,549 UART: [state] DebugLocked = No
2,363,577 UART: [state] WD Timer not started. Device not locked for debugging
2,366,049 UART: [fake-rom-cold-reset] ++
2,367,072 UART: [fht] FHT @ 0x50003400
2,368,047 UART: [fwproc] Wait for Commands...
2,369,329 UART: [fwproc] Recv command 0x46574c44
2,370,670 UART: [fwproc] Recv'd Img size: 111324 bytes
3,764,748 UART: ROM Fatal Error: 0x000B000C
3,768,571 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,219,101 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,360,108 UART:
2,360,530 UART: Running Caliptra ROM ...
2,361,608 UART:
2,361,759 UART: [state] CFI Enabled
2,362,675 UART: [state] LifecycleState = Unprovisioned
2,364,328 UART: [state] DebugLocked = No
2,365,356 UART: [state] WD Timer not started. Device not locked for debugging
2,367,825 UART: [fake-rom-cold-reset] ++
2,368,850 UART: [fht] FHT @ 0x50003400
2,369,824 UART: [fwproc] Wait for Commands...
2,371,108 UART: [fwproc] Recv command 0x46574c44
2,372,541 UART: [fwproc] Recv'd Img size: 111668 bytes
3,427,285 UART: ROM Fatal Error: 0x000B000C
3,430,310 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,213,504 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,354,496 UART:
2,354,910 UART: Running Caliptra ROM ...
2,356,075 UART:
2,356,253 UART: [state] CFI Enabled
2,357,237 UART: [state] LifecycleState = Unprovisioned
2,358,884 UART: [state] DebugLocked = No
2,359,992 UART: [state] WD Timer not started. Device not locked for debugging
2,362,695 UART: [fake-rom-cold-reset] ++
2,363,820 UART: [fht] FHT @ 0x50003400
2,364,878 UART: [fwproc] Wait for Commands...
2,366,165 UART: [fwproc] Recv command 0x46574c44
2,367,596 UART: [fwproc] Recv'd Img size: 111668 bytes
3,420,442 UART: ROM Fatal Error: 0x000B000C
3,423,468 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,970 writing to cptra_bootfsm_go
2,217,605 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,358,866 UART:
2,359,284 UART: Running Caliptra ROM ...
2,360,461 UART:
2,360,636 UART: [state] CFI Enabled
2,361,613 UART: [state] LifecycleState = Unprovisioned
2,363,260 UART: [state] DebugLocked = No
2,364,362 UART: [state] WD Timer not started. Device not locked for debugging
2,366,830 UART: [fake-rom-cold-reset] ++
2,367,934 UART: [fht] FHT @ 0x50003400
2,368,965 UART: [fwproc] Wait for Commands...
2,370,246 UART: [fwproc] Recv command 0x46574c44
2,371,669 UART: [fwproc] Recv'd Img size: 111668 bytes
3,423,077 UART: ROM Fatal Error: 0x000B000C
3,426,046 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,219,667 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,360,947 UART:
2,361,373 UART: Running Caliptra ROM ...
2,362,465 UART:
2,362,643 UART: [state] CFI Enabled
2,363,633 UART: [state] LifecycleState = Unprovisioned
2,365,282 UART: [state] DebugLocked = No
2,366,309 UART: [state] WD Timer not started. Device not locked for debugging
2,368,785 UART: [fake-rom-cold-reset] ++
2,369,809 UART: [fht] FHT @ 0x50003400
2,370,787 UART: [fwproc] Wait for Commands...
2,372,065 UART: [fwproc] Recv command 0x46574c44
2,373,411 UART: [fwproc] Recv'd Img size: 111668 bytes
3,429,813 UART: ROM Fatal Error: 0x000B000C
3,432,823 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,217,658 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,358,900 UART:
2,359,316 UART: Running Caliptra ROM ...
2,360,429 UART:
2,360,588 UART: [state] CFI Enabled
2,361,575 UART: [state] LifecycleState = Unprovisioned
2,363,225 UART: [state] DebugLocked = No
2,364,253 UART: [state] WD Timer not started. Device not locked for debugging
2,366,724 UART: [fake-rom-cold-reset] ++
2,367,827 UART: [fht] FHT @ 0x50003400
2,368,859 UART: [fwproc] Wait for Commands...
2,370,141 UART: [fwproc] Recv command 0x46574c44
2,371,576 UART: [fwproc] Recv'd Img size: 111668 bytes
3,418,850 UART: ROM Fatal Error: 0x000B000C
3,421,825 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,214,238 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,355,379 UART:
2,355,797 UART: Running Caliptra ROM ...
2,356,903 UART:
2,357,064 UART: [state] CFI Enabled
2,357,977 UART: [state] LifecycleState = Unprovisioned
2,359,630 UART: [state] DebugLocked = No
2,360,745 UART: [state] WD Timer not started. Device not locked for debugging
2,363,224 UART: [fake-rom-cold-reset] ++
2,364,331 UART: [fht] FHT @ 0x50003400
2,365,367 UART: [fwproc] Wait for Commands...
2,366,652 UART: [fwproc] Recv command 0x46574c44
2,368,079 UART: [fwproc] Recv'd Img size: 111668 bytes
3,418,794 UART: ROM Fatal Error: 0x000B000C
3,421,761 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,243 writing to cptra_bootfsm_go
2,218,811 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,360,051 UART:
2,360,462 UART: Running Caliptra ROM ...
2,361,630 UART:
2,361,797 UART: [state] CFI Enabled
2,362,778 UART: [state] LifecycleState = Unprovisioned
2,364,420 UART: [state] DebugLocked = No
2,365,522 UART: [state] WD Timer not started. Device not locked for debugging
2,367,991 UART: [fake-rom-cold-reset] ++
2,369,115 UART: [fht] FHT @ 0x50003400
2,370,141 UART: [fwproc] Wait for Commands...
2,371,418 UART: [fwproc] Recv command 0x46574c44
2,372,841 UART: [fwproc] Recv'd Img size: 111668 bytes
3,424,960 UART: ROM Fatal Error: 0x000B000C
3,427,987 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,220,309 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,361,645 UART:
2,362,060 UART: Running Caliptra ROM ...
2,363,235 UART:
2,363,405 UART: [state] CFI Enabled
2,364,386 UART: [state] LifecycleState = Unprovisioned
2,366,032 UART: [state] DebugLocked = No
2,367,142 UART: [state] WD Timer not started. Device not locked for debugging
2,369,614 UART: [fake-rom-cold-reset] ++
2,370,715 UART: [fht] FHT @ 0x50003400
2,371,745 UART: [fwproc] Wait for Commands...
2,373,032 UART: [fwproc] Recv command 0x46574c44
2,374,459 UART: [fwproc] Recv'd Img size: 111668 bytes
3,423,328 UART: ROM Fatal Error: 0x000B000C
3,426,304 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [fake-rom-cold-reset] ++
88,690 UART: [fht] FHT @ 0x50003400
91,949 UART: [fwproc] Wait for Commands...
92,562 UART: [fwproc] Recv command 0x46574c44
93,290 UART: [fwproc] Recv'd Img size: 111668 bytes
129,991 UART: ROM Fatal Error: 0x000B000C
131,160 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
85,858 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [fake-rom-cold-reset] ++
88,204 UART: [fht] FHT @ 0x50003400
91,487 UART: [fwproc] Wait for Commands...
92,312 UART: [fwproc] Recv command 0x46574c44
93,040 UART: [fwproc] Recv'd Img size: 111668 bytes
131,079 UART: ROM Fatal Error: 0x000B000C
132,248 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [fake-rom-cold-reset] ++
89,053 UART: [fht] FHT @ 0x50003400
92,482 UART: [fwproc] Wait for Commands...
93,289 UART: [fwproc] Recv command 0x46574c44
94,017 UART: [fwproc] Recv'd Img size: 111668 bytes
131,298 UART: ROM Fatal Error: 0x000B000C
132,467 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,119 UART: [state] WD Timer not started. Device not locked for debugging
88,527 UART: [fake-rom-cold-reset] ++
89,619 UART: [fht] FHT @ 0x50003400
92,958 UART: [fwproc] Wait for Commands...
93,585 UART: [fwproc] Recv command 0x46574c44
94,313 UART: [fwproc] Recv'd Img size: 111668 bytes
131,340 UART: ROM Fatal Error: 0x000B000C
132,509 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [fake-rom-cold-reset] ++
89,074 UART: [fht] FHT @ 0x50003400
92,305 UART: [fwproc] Wait for Commands...
93,020 UART: [fwproc] Recv command 0x46574c44
93,748 UART: [fwproc] Recv'd Img size: 111668 bytes
131,135 UART: ROM Fatal Error: 0x000B000C
132,304 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [fake-rom-cold-reset] ++
88,764 UART: [fht] FHT @ 0x50003400
92,009 UART: [fwproc] Wait for Commands...
92,858 UART: [fwproc] Recv command 0x46574c44
93,586 UART: [fwproc] Recv'd Img size: 111668 bytes
131,715 UART: ROM Fatal Error: 0x000B000C
132,884 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [fake-rom-cold-reset] ++
89,017 UART: [fht] FHT @ 0x50003400
92,378 UART: [fwproc] Wait for Commands...
93,171 UART: [fwproc] Recv command 0x46574c44
93,899 UART: [fwproc] Recv'd Img size: 111668 bytes
130,486 UART: ROM Fatal Error: 0x000B000C
131,655 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,989 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [fake-rom-cold-reset] ++
88,947 UART: [fht] FHT @ 0x50003400
92,160 UART: [fwproc] Wait for Commands...
92,955 UART: [fwproc] Recv command 0x46574c44
93,683 UART: [fwproc] Recv'd Img size: 111668 bytes
131,526 UART: ROM Fatal Error: 0x000B000C
132,695 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
85,964 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [fake-rom-cold-reset] ++
88,622 UART: [fht] FHT @ 0x50003400
92,033 UART: [fwproc] Wait for Commands...
92,750 UART: [fwproc] Recv command 0x46574c44
93,478 UART: [fwproc] Recv'd Img size: 111668 bytes
131,131 UART: ROM Fatal Error: 0x000B000C
132,300 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,072 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [fake-rom-cold-reset] ++
88,860 UART: [fht] FHT @ 0x50003400
92,287 UART: [fwproc] Wait for Commands...
92,978 UART: [fwproc] Recv command 0x46574c44
93,706 UART: [fwproc] Recv'd Img size: 111668 bytes
130,355 UART: ROM Fatal Error: 0x000B000C
131,524 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [fake-rom-cold-reset] ++
89,295 UART: [fht] FHT @ 0x50003400
92,706 UART: [fwproc] Wait for Commands...
93,461 UART: [fwproc] Recv command 0x46574c44
94,189 UART: [fwproc] Recv'd Img size: 111668 bytes
131,382 UART: ROM Fatal Error: 0x000B000C
132,551 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [fake-rom-cold-reset] ++
89,365 UART: [fht] FHT @ 0x50003400
92,628 UART: [fwproc] Wait for Commands...
93,425 UART: [fwproc] Recv command 0x46574c44
94,153 UART: [fwproc] Recv'd Img size: 111668 bytes
131,040 UART: ROM Fatal Error: 0x000B000C
132,209 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,033 UART:
192,557 UART: Running Caliptra ROM ...
193,703 UART:
193,854 UART: [state] CFI Enabled
263,614 UART: [state] LifecycleState = Unprovisioned
266,056 UART: [state] DebugLocked = No
268,530 UART: [state] WD Timer not started. Device not locked for debugging
274,317 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,018 UART:
192,411 UART: Running Caliptra ROM ...
193,517 UART:
193,676 UART: [state] CFI Enabled
261,290 UART: [state] LifecycleState = Unprovisioned
263,731 UART: [state] DebugLocked = No
265,529 UART: [state] WD Timer not started. Device not locked for debugging
270,733 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,485 UART:
192,866 UART: Running Caliptra ROM ...
194,107 UART:
603,906 UART: [state] CFI Enabled
614,473 UART: [state] LifecycleState = Unprovisioned
616,868 UART: [state] DebugLocked = No
619,102 UART: [state] WD Timer not started. Device not locked for debugging
625,441 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,490 UART:
192,895 UART: Running Caliptra ROM ...
194,030 UART:
604,158 UART: [state] CFI Enabled
617,819 UART: [state] LifecycleState = Unprovisioned
620,228 UART: [state] DebugLocked = No
623,332 UART: [state] WD Timer not started. Device not locked for debugging
629,532 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,121 UART:
192,509 UART: Running Caliptra ROM ...
193,645 UART:
193,795 UART: [state] CFI Enabled
262,991 UART: [state] LifecycleState = Unprovisioned
264,723 UART: [state] DebugLocked = No
267,076 UART: [state] WD Timer not started. Device not locked for debugging
272,180 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
191,951 UART:
192,349 UART: Running Caliptra ROM ...
193,451 UART:
193,593 UART: [state] CFI Enabled
269,978 UART: [state] LifecycleState = Unprovisioned
271,754 UART: [state] DebugLocked = No
273,610 UART: [state] WD Timer not started. Device not locked for debugging
277,365 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,413 UART:
192,877 UART: Running Caliptra ROM ...
194,032 UART:
603,365 UART: [state] CFI Enabled
617,739 UART: [state] LifecycleState = Unprovisioned
619,477 UART: [state] DebugLocked = No
621,204 UART: [state] WD Timer not started. Device not locked for debugging
625,690 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,418 UART:
192,798 UART: Running Caliptra ROM ...
193,932 UART:
603,538 UART: [state] CFI Enabled
617,034 UART: [state] LifecycleState = Unprovisioned
618,739 UART: [state] DebugLocked = No
620,002 UART: [state] WD Timer not started. Device not locked for debugging
624,997 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,099 UART:
192,479 UART: Running Caliptra ROM ...
193,686 UART:
193,854 UART: [state] CFI Enabled
263,569 UART: [state] LifecycleState = Unprovisioned
265,354 UART: [state] DebugLocked = No
266,519 UART: [state] WD Timer not started. Device not locked for debugging
271,239 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
191,987 UART:
192,373 UART: Running Caliptra ROM ...
193,501 UART:
193,649 UART: [state] CFI Enabled
266,109 UART: [state] LifecycleState = Unprovisioned
267,874 UART: [state] DebugLocked = No
269,640 UART: [state] WD Timer not started. Device not locked for debugging
273,502 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
192,568 UART:
192,943 UART: Running Caliptra ROM ...
194,124 UART:
603,680 UART: [state] CFI Enabled
614,248 UART: [state] LifecycleState = Unprovisioned
615,998 UART: [state] DebugLocked = No
618,284 UART: [state] WD Timer not started. Device not locked for debugging
622,244 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,341 UART:
192,733 UART: Running Caliptra ROM ...
193,931 UART:
603,287 UART: [state] CFI Enabled
617,148 UART: [state] LifecycleState = Unprovisioned
618,894 UART: [state] DebugLocked = No
621,241 UART: [state] WD Timer not started. Device not locked for debugging
627,575 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,923 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,233 UART: [state] WD Timer not started. Device not locked for debugging
88,561 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,721 UART: [state] LifecycleState = Unprovisioned
85,380 UART: [state] DebugLocked = No
85,949 UART: [state] WD Timer not started. Device not locked for debugging
87,221 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
88,150 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
4,875,692 ready_for_fw is high
4,876,114 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,449,769 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
4,876,452 ready_for_fw is high
4,877,064 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,458,624 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,184,671 ready_for_fw is high
5,185,078 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,618,227 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
5,180,528 ready_for_fw is high
5,180,924 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,611,458 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,461,456 ready_for_fw is high
3,461,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,296,175 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,165 writing to cptra_bootfsm_go
3,462,188 ready_for_fw is high
3,462,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,309,360 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,784,195 ready_for_fw is high
3,784,623 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,519,094 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,778,400 ready_for_fw is high
3,778,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,500,620 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,462,279 ready_for_fw is high
3,462,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,292,539 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,461,831 ready_for_fw is high
3,462,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,249,672 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,769,112 ready_for_fw is high
3,769,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,478,596 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,774,539 ready_for_fw is high
3,774,944 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,477,171 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,313 ready_for_fw is high
1,077,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,681 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,151 ready_for_fw is high
1,077,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,863 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,314 ready_for_fw is high
1,078,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,936 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,578 ready_for_fw is high
1,078,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,204 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 ready_for_fw is high
1,078,095 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,321 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,519 ready_for_fw is high
1,077,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,371 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,372 ready_for_fw is high
1,077,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,820 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,598 ready_for_fw is high
1,078,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,486 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,299 ready_for_fw is high
1,077,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,601 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,747 ready_for_fw is high
1,078,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,021 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,890 ready_for_fw is high
1,077,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,534 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,568 ready_for_fw is high
1,078,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,238 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,214,745 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,349,530 UART:
2,349,952 UART: Running Caliptra ROM ...
2,351,028 UART:
2,351,187 UART: [state] CFI Enabled
2,352,099 UART: [state] LifecycleState = Unprovisioned
2,353,750 UART: [state] DebugLocked = No
2,354,864 UART: [state] WD Timer not started. Device not locked for debugging
2,357,338 UART: [kat] SHA2-256
2,358,000 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,361,007 UART: [kat] ++
2,361,456 UART: [kat] sha1
2,361,964 UART: [kat] SHA2-256
2,362,623 UART: [kat] SHA2-384
2,363,275 UART: [kat] SHA2-512-ACC
2,364,267 UART: [kat] ECC-384
3,780,150 UART: [kat] HMAC-384Kdf
3,803,434 UART: [kat] LMS
4,876,561 UART: [kat] --
4,881,877 UART: [cold-reset] ++
4,883,648 UART: [fht] FHT @ 0x50003400
4,895,097 UART: [idev] ++
4,895,820 UART: [idev] CDI.KEYID = 6
4,896,931 UART: [idev] SUBJECT.KEYID = 7
4,898,149 UART: [idev] UDS.KEYID = 0
4,931,333 UART: [idev] Erasing UDS.KEYID = 0
8,245,305 UART: [idev] Sha1 KeyId Algorithm
8,266,864 UART: [idev] --
8,272,346 UART: [ldev] ++
8,272,981 UART: [ldev] CDI.KEYID = 6
8,274,092 UART: [ldev] SUBJECT.KEYID = 5
8,275,310 UART: [ldev] AUTHORITY.KEYID = 7
8,276,458 UART: [ldev] FE.KEYID = 1
8,320,028 UART: [ldev] Erasing FE.KEYID = 1
11,658,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,372 UART: [ldev] --
14,037,881 UART: [fwproc] Wait for Commands...
14,040,413 UART: [fwproc] Recv command 0x46574c44
14,042,677 UART: [fwproc] Recv'd Img size: 106256 bytes
18,020,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,096,464 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,138,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,455,633 >>> mbox cmd response: success
18,459,699 UART: [afmc] ++
18,460,290 UART: [afmc] CDI.KEYID = 6
18,461,472 UART: [afmc] SUBJECT.KEYID = 7
18,462,628 UART: [afmc] AUTHORITY.KEYID = 5
21,819,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,121,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,123,821 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,139,856 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,155,872 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,172,195 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,195,023 UART: [afmc] --
24,198,740 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,199,127 UART: [cold-reset] --
24,203,208 UART: [state] Locking Datavault
24,209,486 UART: [state] Locking PCR0, PCR1 and PCR31
24,211,230 UART: [state] Locking ICCM
24,213,717 UART: [exit] Launching FMC @ 0x40000000
24,222,337 UART:
24,222,578 UART: Running Caliptra FMC ...
24,223,681 UART:
24,223,838 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,225,512 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,214,070 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,240,619 >>> mbox cmd response: success
23,914,694 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,931,158 UART:
23,931,494 UART: Running Caliptra FMC ...
23,932,687 UART:
23,932,855 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,934,621 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,222,646 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,357,172 UART:
2,357,597 UART: Running Caliptra ROM ...
2,358,771 UART:
2,358,936 UART: [state] CFI Enabled
2,359,916 UART: [state] LifecycleState = Unprovisioned
2,361,553 UART: [state] DebugLocked = No
2,362,651 UART: [state] WD Timer not started. Device not locked for debugging
2,365,118 UART: [kat] SHA2-256
2,365,802 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,368,822 UART: [kat] ++
2,369,269 UART: [kat] sha1
2,369,778 UART: [kat] SHA2-256
2,370,511 UART: [kat] SHA2-384
2,371,171 UART: [kat] SHA2-512-ACC
2,371,997 UART: [kat] ECC-384
4,098,056 UART: [kat] HMAC-384Kdf
4,110,215 UART: [kat] LMS
5,183,371 UART: [kat] --
5,189,361 UART: [cold-reset] ++
5,191,736 UART: [fht] FHT @ 0x50003400
5,202,331 UART: [idev] ++
5,203,004 UART: [idev] CDI.KEYID = 6
5,204,241 UART: [idev] SUBJECT.KEYID = 7
5,205,674 UART: [idev] UDS.KEYID = 0
5,223,282 UART: [idev] Erasing UDS.KEYID = 0
8,500,004 UART: [idev] Sha1 KeyId Algorithm
8,521,749 UART: [idev] --
8,526,131 UART: [ldev] ++
8,526,698 UART: [ldev] CDI.KEYID = 6
8,527,930 UART: [ldev] SUBJECT.KEYID = 5
8,529,405 UART: [ldev] AUTHORITY.KEYID = 7
8,530,955 UART: [ldev] FE.KEYID = 1
8,542,948 UART: [ldev] Erasing FE.KEYID = 1
11,828,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,499 UART: [ldev] --
14,196,451 UART: [fwproc] Wait for Commands...
14,199,428 UART: [fwproc] Recv command 0x46574c44
14,201,740 UART: [fwproc] Recv'd Img size: 106256 bytes
18,179,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,252,784 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,295,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,610,974 >>> mbox cmd response: success
18,614,226 UART: [afmc] ++
18,614,804 UART: [afmc] CDI.KEYID = 6
18,616,036 UART: [afmc] SUBJECT.KEYID = 7
18,617,191 UART: [afmc] AUTHORITY.KEYID = 5
21,931,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,225,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,228,190 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,244,201 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,260,473 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,276,404 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,186 UART: [afmc] --
24,303,896 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,304,286 UART: [cold-reset] --
24,306,607 UART: [state] Locking Datavault
24,313,790 UART: [state] Locking PCR0, PCR1 and PCR31
24,315,430 UART: [state] Locking ICCM
24,317,516 UART: [exit] Launching FMC @ 0x40000000
24,326,117 UART:
24,326,349 UART: Running Caliptra FMC ...
24,327,442 UART:
24,327,590 UART: [fmc] Received command: 0x10000005
24,329,020 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,216,492 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,415,483 >>> mbox cmd response: success
24,040,502 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,056,056 UART:
24,056,410 UART: Running Caliptra FMC ...
24,057,582 UART:
24,057,744 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,059,487 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,225,716 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,360,984 UART:
2,361,445 UART: Running Caliptra ROM ...
2,362,633 UART:
2,362,811 UART: [state] CFI Enabled
2,363,793 UART: [state] LifecycleState = Unprovisioned
2,365,440 UART: [state] DebugLocked = No
2,366,547 UART: [state] WD Timer not started. Device not locked for debugging
2,369,023 UART: [kat] SHA2-256
2,369,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,372,715 UART: [kat] ++
2,373,166 UART: [kat] sha1
2,373,680 UART: [kat] SHA2-256
2,374,422 UART: [kat] SHA2-384
2,375,086 UART: [kat] SHA2-512-ACC
2,375,890 UART: [kat] ECC-384
2,948,344 UART: [kat] HMAC-384Kdf
2,969,476 UART: [kat] LMS
3,498,965 UART: [kat] --
3,503,227 UART: [cold-reset] ++
3,504,193 UART: [fht] FHT @ 0x50003400
3,516,122 UART: [idev] ++
3,516,682 UART: [idev] CDI.KEYID = 6
3,517,563 UART: [idev] SUBJECT.KEYID = 7
3,518,829 UART: [idev] UDS.KEYID = 0
3,541,030 UART: [idev] Erasing UDS.KEYID = 0
6,026,065 UART: [idev] Sha1 KeyId Algorithm
6,049,140 UART: [idev] --
6,054,061 UART: [ldev] ++
6,054,641 UART: [ldev] CDI.KEYID = 6
6,055,556 UART: [ldev] SUBJECT.KEYID = 5
6,056,721 UART: [ldev] AUTHORITY.KEYID = 7
6,057,957 UART: [ldev] FE.KEYID = 1
6,097,570 UART: [ldev] Erasing FE.KEYID = 1
8,598,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,370 UART: [ldev] --
10,411,346 UART: [fwproc] Wait for Commands...
10,414,202 UART: [fwproc] Recv command 0x46574c44
10,416,342 UART: [fwproc] Recv'd Img size: 106600 bytes
13,720,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,790,318 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,832,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,150,184 >>> mbox cmd response: success
14,153,888 UART: [afmc] ++
14,154,478 UART: [afmc] CDI.KEYID = 6
14,155,387 UART: [afmc] SUBJECT.KEYID = 7
14,156,627 UART: [afmc] AUTHORITY.KEYID = 5
16,693,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,418,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,420,002 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,436,001 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,451,925 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,467,844 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,490,172 UART: [afmc] --
18,493,496 UART: [cold-reset] --
18,494,384 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,498,178 UART: [state] Locking Datavault
18,504,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,505,794 UART: [state] Locking ICCM
18,507,298 UART: [exit] Launching FMC @ 0x40000000
18,515,702 UART:
18,515,939 UART: Running Caliptra FMC ...
18,517,058 UART:
18,517,222 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,518,895 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
2,214,554 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,924,623 >>> mbox cmd response: success
18,199,381 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,214,547 UART:
18,214,884 UART: Running Caliptra FMC ...
18,215,979 UART:
18,216,127 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,217,891 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,219,460 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,354,569 UART:
2,355,000 UART: Running Caliptra ROM ...
2,356,170 UART:
2,356,340 UART: [state] CFI Enabled
2,357,328 UART: [state] LifecycleState = Unprovisioned
2,358,972 UART: [state] DebugLocked = No
2,360,098 UART: [state] WD Timer not started. Device not locked for debugging
2,362,574 UART: [kat] SHA2-256
2,363,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,250 UART: [kat] ++
2,366,698 UART: [kat] sha1
2,367,209 UART: [kat] SHA2-256
2,367,947 UART: [kat] SHA2-384
2,368,609 UART: [kat] SHA2-512-ACC
2,369,440 UART: [kat] ECC-384
3,287,179 UART: [kat] HMAC-384Kdf
3,299,996 UART: [kat] LMS
3,829,484 UART: [kat] --
3,833,665 UART: [cold-reset] ++
3,835,435 UART: [fht] FHT @ 0x50003400
3,847,166 UART: [idev] ++
3,847,725 UART: [idev] CDI.KEYID = 6
3,848,679 UART: [idev] SUBJECT.KEYID = 7
3,849,889 UART: [idev] UDS.KEYID = 0
3,865,270 UART: [idev] Erasing UDS.KEYID = 0
6,324,421 UART: [idev] Sha1 KeyId Algorithm
6,346,185 UART: [idev] --
6,351,415 UART: [ldev] ++
6,351,988 UART: [ldev] CDI.KEYID = 6
6,352,898 UART: [ldev] SUBJECT.KEYID = 5
6,354,058 UART: [ldev] AUTHORITY.KEYID = 7
6,355,343 UART: [ldev] FE.KEYID = 1
6,367,119 UART: [ldev] Erasing FE.KEYID = 1
8,840,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,222 UART: [ldev] --
10,632,440 UART: [fwproc] Wait for Commands...
10,634,494 UART: [fwproc] Recv command 0x46574c44
10,636,589 UART: [fwproc] Recv'd Img size: 106600 bytes
13,937,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,848 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,054,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,371,526 >>> mbox cmd response: success
14,375,473 UART: [afmc] ++
14,376,059 UART: [afmc] CDI.KEYID = 6
14,376,971 UART: [afmc] SUBJECT.KEYID = 7
14,378,182 UART: [afmc] AUTHORITY.KEYID = 5
16,881,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,032 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,618,028 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,633,972 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,649,916 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,105 UART: [afmc] --
18,675,161 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,675,527 UART: [cold-reset] --
18,679,634 UART: [state] Locking Datavault
18,684,616 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,263 UART: [state] Locking ICCM
18,688,191 UART: [exit] Launching FMC @ 0x40000000
18,696,585 UART:
18,696,813 UART: Running Caliptra FMC ...
18,697,914 UART:
18,698,073 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,699,644 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,218,474 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,139,322 >>> mbox cmd response: success
18,374,899 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,390,163 UART:
18,390,500 UART: Running Caliptra FMC ...
18,391,702 UART:
18,391,873 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,393,639 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,218,777 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,353,354 UART:
2,353,758 UART: Running Caliptra ROM ...
2,354,917 UART:
2,355,083 UART: [state] CFI Enabled
2,356,072 UART: [state] LifecycleState = Unprovisioned
2,357,720 UART: [state] DebugLocked = No
2,358,850 UART: [state] WD Timer not started. Device not locked for debugging
2,361,339 UART: [kat] SHA2-256
2,362,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,040 UART: [kat] ++
2,365,552 UART: [kat] sha1
2,366,069 UART: [kat] SHA2-256
2,366,761 UART: [kat] SHA2-384
2,367,421 UART: [kat] SHA2-512-ACC
2,368,241 UART: [kat] ECC-384
2,945,778 UART: [kat] HMAC-384Kdf
2,972,258 UART: [kat] LMS
3,501,671 UART: [kat] --
3,506,175 UART: [cold-reset] ++
3,507,461 UART: [fht] FHT @ 0x50003400
3,519,035 UART: [idev] ++
3,519,612 UART: [idev] CDI.KEYID = 6
3,520,537 UART: [idev] SUBJECT.KEYID = 7
3,521,698 UART: [idev] UDS.KEYID = 0
3,544,000 UART: [idev] Erasing UDS.KEYID = 0
6,025,297 UART: [idev] Sha1 KeyId Algorithm
6,047,766 UART: [idev] --
6,052,760 UART: [ldev] ++
6,053,347 UART: [ldev] CDI.KEYID = 6
6,054,260 UART: [ldev] SUBJECT.KEYID = 5
6,055,363 UART: [ldev] AUTHORITY.KEYID = 7
6,056,708 UART: [ldev] FE.KEYID = 1
6,100,136 UART: [ldev] Erasing FE.KEYID = 1
8,602,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,897 UART: [ldev] --
10,392,247 UART: [fwproc] Wait for Commands...
10,393,754 UART: [fwproc] Recv command 0x46574c44
10,395,847 UART: [fwproc] Recv'd Img size: 106600 bytes
13,698,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,769,961 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,812,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,129,358 >>> mbox cmd response: success
14,132,933 UART: [afmc] ++
14,133,519 UART: [afmc] CDI.KEYID = 6
14,134,435 UART: [afmc] SUBJECT.KEYID = 7
14,135,652 UART: [afmc] AUTHORITY.KEYID = 5
16,679,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,232 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,422,239 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,438,142 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,454,118 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,476,276 UART: [afmc] --
18,480,088 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,480,445 UART: [cold-reset] --
18,483,631 UART: [state] Locking Datavault
18,488,872 UART: [state] Locking PCR0, PCR1 and PCR31
18,490,578 UART: [state] Locking ICCM
18,493,266 UART: [exit] Launching FMC @ 0x40000000
18,501,656 UART:
18,501,959 UART: Running Caliptra FMC ...
18,503,075 UART:
18,503,246 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,504,921 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,217,279 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,927,052 >>> mbox cmd response: success
18,204,560 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,221,269 UART:
18,221,636 UART: Running Caliptra FMC ...
18,222,809 UART:
18,222,981 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,224,725 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,219,519 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,354,673 UART:
2,355,086 UART: Running Caliptra ROM ...
2,356,211 UART:
2,356,374 UART: [state] CFI Enabled
2,357,366 UART: [state] LifecycleState = Unprovisioned
2,359,031 UART: [state] DebugLocked = No
2,360,069 UART: [state] WD Timer not started. Device not locked for debugging
2,362,542 UART: [kat] SHA2-256
2,363,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,213 UART: [kat] ++
2,366,710 UART: [kat] sha1
2,367,224 UART: [kat] SHA2-256
2,367,905 UART: [kat] SHA2-384
2,368,560 UART: [kat] SHA2-512-ACC
2,369,402 UART: [kat] ECC-384
3,283,448 UART: [kat] HMAC-384Kdf
3,295,908 UART: [kat] LMS
3,825,403 UART: [kat] --
3,831,072 UART: [cold-reset] ++
3,832,949 UART: [fht] FHT @ 0x50003400
3,845,056 UART: [idev] ++
3,845,622 UART: [idev] CDI.KEYID = 6
3,846,496 UART: [idev] SUBJECT.KEYID = 7
3,847,760 UART: [idev] UDS.KEYID = 0
3,863,437 UART: [idev] Erasing UDS.KEYID = 0
6,319,652 UART: [idev] Sha1 KeyId Algorithm
6,343,148 UART: [idev] --
6,347,952 UART: [ldev] ++
6,348,556 UART: [ldev] CDI.KEYID = 6
6,349,438 UART: [ldev] SUBJECT.KEYID = 5
6,350,505 UART: [ldev] AUTHORITY.KEYID = 7
6,351,681 UART: [ldev] FE.KEYID = 1
6,362,300 UART: [ldev] Erasing FE.KEYID = 1
8,835,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,354 UART: [ldev] --
10,626,477 UART: [fwproc] Wait for Commands...
10,628,891 UART: [fwproc] Recv command 0x46574c44
10,630,976 UART: [fwproc] Recv'd Img size: 106600 bytes
13,945,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,021,417 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,063,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,381,680 >>> mbox cmd response: success
14,386,260 UART: [afmc] ++
14,386,843 UART: [afmc] CDI.KEYID = 6
14,387,753 UART: [afmc] SUBJECT.KEYID = 7
14,388,964 UART: [afmc] AUTHORITY.KEYID = 5
16,891,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,424 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,630,417 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,646,342 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,662,281 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,683,866 UART: [afmc] --
18,686,723 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,687,096 UART: [cold-reset] --
18,690,828 UART: [state] Locking Datavault
18,695,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,697,177 UART: [state] Locking ICCM
18,699,534 UART: [exit] Launching FMC @ 0x40000000
18,707,928 UART:
18,708,159 UART: Running Caliptra FMC ...
18,709,257 UART:
18,709,416 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,711,064 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,221,013 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,145,455 >>> mbox cmd response: success
18,379,178 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,392,776 UART:
18,393,116 UART: Running Caliptra FMC ...
18,394,300 UART:
18,394,473 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,396,250 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,517 UART: [kat] ++
895,669 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,562 UART: [kat] LMS
1,168,874 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,469 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,848 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,590 UART: [fwproc] Wait for Commands...
1,281,403 UART: [fwproc] Recv command 0x46574c44
1,282,136 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,516,721 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,234 >>> mbox cmd response: success
2,671,267 UART: [afmc] ++
2,671,435 UART: [afmc] CDI.KEYID = 6
2,671,798 UART: [afmc] SUBJECT.KEYID = 7
2,672,224 UART: [afmc] AUTHORITY.KEYID = 5
2,707,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,541 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,261 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,154 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,847 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,572 UART: [afmc] --
2,750,434 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,750,456 UART: [cold-reset] --
2,751,092 UART: [state] Locking Datavault
2,752,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,729 UART: [state] Locking ICCM
2,753,327 UART: [exit] Launching FMC @ 0x40000000
2,758,624 UART:
2,758,640 UART: Running Caliptra FMC ...
2,759,048 UART:
2,759,186 UART: [fmc] Received command: 0x10000005
2,760,287 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,346 >>> mbox cmd response: success
2,575,846 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,581,941 UART:
2,581,957 UART: Running Caliptra FMC ...
2,582,365 UART:
2,582,503 UART: [fmc] Received command: 0x10000005
2,583,604 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,949 UART: [kat] HMAC-384Kdf
921,497 UART: [kat] LMS
1,169,809 UART: [kat] --
1,171,048 UART: [cold-reset] ++
1,171,448 UART: [fht] FHT @ 0x50003400
1,174,022 UART: [idev] ++
1,174,190 UART: [idev] CDI.KEYID = 6
1,174,551 UART: [idev] SUBJECT.KEYID = 7
1,174,976 UART: [idev] UDS.KEYID = 0
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,200,466 UART: [idev] Sha1 KeyId Algorithm
1,209,282 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,417 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,728 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,133 >>> mbox cmd response: success
2,674,394 UART: [afmc] ++
2,674,562 UART: [afmc] CDI.KEYID = 6
2,674,925 UART: [afmc] SUBJECT.KEYID = 7
2,675,351 UART: [afmc] AUTHORITY.KEYID = 5
2,710,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,618 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,338 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,231 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,924 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,979 UART: [afmc] --
2,754,041 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,063 UART: [cold-reset] --
2,754,895 UART: [state] Locking Datavault
2,755,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,550 UART: [state] Locking ICCM
2,757,050 UART: [exit] Launching FMC @ 0x40000000
2,762,347 UART:
2,762,363 UART: Running Caliptra FMC ...
2,762,771 UART:
2,762,909 UART: [fmc] Received command: 0x10000005
2,764,010 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,655 >>> mbox cmd response: success
2,576,833 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,582,818 UART:
2,582,834 UART: Running Caliptra FMC ...
2,583,242 UART:
2,583,380 UART: [fmc] Received command: 0x10000005
2,584,481 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
903,904 UART: [kat] SHA2-512-ACC
905,805 UART: [kat] ECC-384
915,740 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,779 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,242,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,155 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,175 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,588 >>> mbox cmd response: success
2,672,831 UART: [afmc] ++
2,672,999 UART: [afmc] CDI.KEYID = 6
2,673,362 UART: [afmc] SUBJECT.KEYID = 7
2,673,788 UART: [afmc] AUTHORITY.KEYID = 5
2,709,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,911 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,631 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,524 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,217 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,850 UART: [afmc] --
2,752,900 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,752,922 UART: [cold-reset] --
2,753,744 UART: [state] Locking Datavault
2,755,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,633 UART: [state] Locking ICCM
2,756,219 UART: [exit] Launching FMC @ 0x40000000
2,761,516 UART:
2,761,532 UART: Running Caliptra FMC ...
2,761,940 UART:
2,762,078 UART: [fmc] Received command: 0x10000005
2,763,179 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,120 >>> mbox cmd response: success
2,577,736 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,051 UART:
2,584,067 UART: Running Caliptra FMC ...
2,584,475 UART:
2,584,613 UART: [fmc] Received command: 0x10000005
2,585,714 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,862 UART: [kat] ++
896,014 UART: [kat] sha1
900,238 UART: [kat] SHA2-256
902,178 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
921,151 UART: [kat] LMS
1,169,463 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,208,965 UART: [ldev] ++
1,209,133 UART: [ldev] CDI.KEYID = 6
1,209,497 UART: [ldev] SUBJECT.KEYID = 5
1,209,924 UART: [ldev] AUTHORITY.KEYID = 7
1,210,387 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,616 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,215 >>> mbox cmd response: success
2,673,302 UART: [afmc] ++
2,673,470 UART: [afmc] CDI.KEYID = 6
2,673,833 UART: [afmc] SUBJECT.KEYID = 7
2,674,259 UART: [afmc] AUTHORITY.KEYID = 5
2,709,935 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,894 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,614 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,507 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,200 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,167 UART: [afmc] --
2,753,121 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,143 UART: [cold-reset] --
2,754,081 UART: [state] Locking Datavault
2,755,398 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,002 UART: [state] Locking ICCM
2,756,672 UART: [exit] Launching FMC @ 0x40000000
2,761,969 UART:
2,761,985 UART: Running Caliptra FMC ...
2,762,393 UART:
2,762,531 UART: [fmc] Received command: 0x10000005
2,763,632 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,063 >>> mbox cmd response: success
2,577,451 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,583,618 UART:
2,583,634 UART: Running Caliptra FMC ...
2,584,042 UART:
2,584,180 UART: [fmc] Received command: 0x10000005
2,585,281 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,854 UART: [state] LifecycleState = Unprovisioned
86,509 UART: [state] DebugLocked = No
87,065 UART: [state] WD Timer not started. Device not locked for debugging
88,274 UART: [kat] SHA2-256
891,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,953 UART: [kat] ++
896,105 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
905,006 UART: [kat] SHA2-512-ACC
906,907 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,417 UART: [idev] ++
1,173,585 UART: [idev] CDI.KEYID = 6
1,173,946 UART: [idev] SUBJECT.KEYID = 7
1,174,371 UART: [idev] UDS.KEYID = 0
1,182,137 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,208,001 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,144 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,011 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,620 >>> mbox cmd response: success
2,672,673 UART: [afmc] ++
2,672,841 UART: [afmc] CDI.KEYID = 6
2,673,204 UART: [afmc] SUBJECT.KEYID = 7
2,673,630 UART: [afmc] AUTHORITY.KEYID = 5
2,709,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,733 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,453 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,346 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,039 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,908 UART: [afmc] --
2,752,944 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,752,966 UART: [cold-reset] --
2,753,864 UART: [state] Locking Datavault
2,755,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,629 UART: [state] Locking ICCM
2,756,155 UART: [exit] Launching FMC @ 0x40000000
2,761,452 UART:
2,761,468 UART: Running Caliptra FMC ...
2,761,876 UART:
2,762,014 UART: [fmc] Received command: 0x10000005
2,763,115 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,812 >>> mbox cmd response: success
2,575,846 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,581,477 UART:
2,581,493 UART: Running Caliptra FMC ...
2,581,901 UART:
2,582,039 UART: [fmc] Received command: 0x10000005
2,583,140 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,159 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,422 UART: [fwproc] Recv command 0x46574c44
1,283,155 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,300 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,923 >>> mbox cmd response: success
2,674,084 UART: [afmc] ++
2,674,252 UART: [afmc] CDI.KEYID = 6
2,674,615 UART: [afmc] SUBJECT.KEYID = 7
2,675,041 UART: [afmc] AUTHORITY.KEYID = 5
2,711,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,444 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,164 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,057 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,750 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,603 UART: [afmc] --
2,754,471 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,493 UART: [cold-reset] --
2,755,255 UART: [state] Locking Datavault
2,756,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,892 UART: [state] Locking ICCM
2,757,474 UART: [exit] Launching FMC @ 0x40000000
2,762,771 UART:
2,762,787 UART: Running Caliptra FMC ...
2,763,195 UART:
2,763,333 UART: [fmc] Received command: 0x10000005
2,764,434 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,793 >>> mbox cmd response: success
2,578,081 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,254 UART:
2,584,270 UART: Running Caliptra FMC ...
2,584,678 UART:
2,584,816 UART: [fmc] Received command: 0x10000005
2,585,917 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,029 writing to cptra_bootfsm_go
2,213,921 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,348,502 UART:
2,348,926 UART: Running Caliptra ROM ...
2,350,123 UART:
2,350,297 UART: [state] CFI Enabled
2,351,282 UART: [state] LifecycleState = Unprovisioned
2,352,930 UART: [state] DebugLocked = No
2,354,034 UART: [state] WD Timer not started. Device not locked for debugging
2,356,508 UART: [kat] SHA2-256
2,357,176 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,183 UART: [kat] ++
2,360,634 UART: [kat] sha1
2,361,149 UART: [kat] SHA2-256
2,361,885 UART: [kat] SHA2-384
2,362,550 UART: [kat] SHA2-512-ACC
2,363,390 UART: [kat] ECC-384
3,776,789 UART: [kat] HMAC-384Kdf
3,801,508 UART: [kat] LMS
4,874,654 UART: [kat] --
4,879,592 UART: [cold-reset] ++
4,882,243 UART: [fht] FHT @ 0x50003400
4,893,752 UART: [idev] ++
4,894,431 UART: [idev] CDI.KEYID = 6
4,895,616 UART: [idev] SUBJECT.KEYID = 7
4,896,773 UART: [idev] UDS.KEYID = 0
4,929,221 UART: [idev] Erasing UDS.KEYID = 0
8,242,968 UART: [idev] Sha1 KeyId Algorithm
8,263,448 UART: [idev] --
8,267,658 UART: [ldev] ++
8,268,282 UART: [ldev] CDI.KEYID = 6
8,269,465 UART: [ldev] SUBJECT.KEYID = 5
8,270,631 UART: [ldev] AUTHORITY.KEYID = 7
8,271,789 UART: [ldev] FE.KEYID = 1
8,316,213 UART: [ldev] Erasing FE.KEYID = 1
11,649,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,832 UART: [ldev] --
14,017,892 UART: [fwproc] Wait for Commands...
14,021,067 UART: [fwproc] Recv command 0x46574c44
14,023,339 UART: [fwproc] Recv'd Img size: 106256 bytes
17,997,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,078,198 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,120,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,436,442 >>> mbox cmd response: success
18,439,982 UART: [afmc] ++
18,440,569 UART: [afmc] CDI.KEYID = 6
18,441,806 UART: [afmc] SUBJECT.KEYID = 7
18,442,906 UART: [afmc] AUTHORITY.KEYID = 5
21,818,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,115,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,118,302 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,134,335 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,150,417 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,166,533 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,189,215 UART: [afmc] --
24,193,302 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,193,694 UART: [cold-reset] --
24,198,595 UART: [state] Locking Datavault
24,205,143 UART: [state] Locking PCR0, PCR1 and PCR31
24,206,788 UART: [state] Locking ICCM
24,208,562 UART: [exit] Launching FMC @ 0x40000000
24,217,176 UART:
24,217,416 UART: Running Caliptra FMC ...
24,218,516 UART:
24,218,691 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,220,265 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,211,198 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,219,724 >>> mbox cmd response: success
23,899,194 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,913,846 UART:
23,914,188 UART: Running Caliptra FMC ...
23,915,628 UART:
23,915,803 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,917,587 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
2,219,422 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,353,679 UART:
2,354,086 UART: Running Caliptra ROM ...
2,355,209 UART:
2,355,390 UART: [state] CFI Enabled
2,356,376 UART: [state] LifecycleState = Unprovisioned
2,358,027 UART: [state] DebugLocked = No
2,359,053 UART: [state] WD Timer not started. Device not locked for debugging
2,361,524 UART: [kat] SHA2-256
2,362,181 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,184 UART: [kat] ++
2,365,630 UART: [kat] sha1
2,366,127 UART: [kat] SHA2-256
2,366,774 UART: [kat] SHA2-384
2,367,422 UART: [kat] SHA2-512-ACC
2,368,214 UART: [kat] ECC-384
4,092,442 UART: [kat] HMAC-384Kdf
4,105,094 UART: [kat] LMS
5,178,254 UART: [kat] --
5,183,201 UART: [cold-reset] ++
5,185,535 UART: [fht] FHT @ 0x50003400
5,196,459 UART: [idev] ++
5,197,128 UART: [idev] CDI.KEYID = 6
5,198,359 UART: [idev] SUBJECT.KEYID = 7
5,199,796 UART: [idev] UDS.KEYID = 0
5,213,280 UART: [idev] Erasing UDS.KEYID = 0
8,487,842 UART: [idev] Sha1 KeyId Algorithm
8,510,897 UART: [idev] --
8,513,854 UART: [ldev] ++
8,514,418 UART: [ldev] CDI.KEYID = 6
8,515,569 UART: [ldev] SUBJECT.KEYID = 5
8,517,102 UART: [ldev] AUTHORITY.KEYID = 7
8,518,573 UART: [ldev] FE.KEYID = 1
8,530,947 UART: [ldev] Erasing FE.KEYID = 1
11,824,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,698 UART: [ldev] --
14,188,553 UART: [fwproc] Wait for Commands...
14,190,913 UART: [fwproc] Recv command 0x46574c44
14,193,217 UART: [fwproc] Recv'd Img size: 106256 bytes
18,172,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,249,438 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,291,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,607,143 >>> mbox cmd response: success
18,611,921 UART: [afmc] ++
18,612,504 UART: [afmc] CDI.KEYID = 6
18,613,678 UART: [afmc] SUBJECT.KEYID = 7
18,614,844 UART: [afmc] AUTHORITY.KEYID = 5
21,928,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,222,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,224,507 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,240,503 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,256,585 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,272,674 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,294,337 UART: [afmc] --
24,298,679 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,299,056 UART: [cold-reset] --
24,303,592 UART: [state] Locking Datavault
24,309,650 UART: [state] Locking PCR0, PCR1 and PCR31
24,311,346 UART: [state] Locking ICCM
24,313,111 UART: [exit] Launching FMC @ 0x40000000
24,321,716 UART:
24,321,942 UART: Running Caliptra FMC ...
24,323,031 UART:
24,323,187 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,324,867 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,220,995 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,407,854 >>> mbox cmd response: success
24,028,510 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,041,395 UART:
24,041,750 UART: Running Caliptra FMC ...
24,042,926 UART:
24,043,089 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,044,885 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,217,136 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,352,015 UART:
2,352,434 UART: Running Caliptra ROM ...
2,353,532 UART:
2,353,687 UART: [state] CFI Enabled
2,354,683 UART: [state] LifecycleState = Unprovisioned
2,356,330 UART: [state] DebugLocked = No
2,357,356 UART: [state] WD Timer not started. Device not locked for debugging
2,359,825 UART: [kat] SHA2-256
2,360,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,363,516 UART: [kat] ++
2,363,967 UART: [kat] sha1
2,364,479 UART: [kat] SHA2-256
2,365,133 UART: [kat] SHA2-384
2,365,787 UART: [kat] SHA2-512-ACC
2,366,585 UART: [kat] ECC-384
2,946,970 UART: [kat] HMAC-384Kdf
2,970,279 UART: [kat] LMS
3,499,753 UART: [kat] --
3,506,143 UART: [cold-reset] ++
3,507,592 UART: [fht] FHT @ 0x50003400
3,518,839 UART: [idev] ++
3,519,411 UART: [idev] CDI.KEYID = 6
3,520,329 UART: [idev] SUBJECT.KEYID = 7
3,521,547 UART: [idev] UDS.KEYID = 0
3,543,573 UART: [idev] Erasing UDS.KEYID = 0
6,021,672 UART: [idev] Sha1 KeyId Algorithm
6,043,437 UART: [idev] --
6,047,793 UART: [ldev] ++
6,048,369 UART: [ldev] CDI.KEYID = 6
6,049,281 UART: [ldev] SUBJECT.KEYID = 5
6,050,443 UART: [ldev] AUTHORITY.KEYID = 7
6,051,729 UART: [ldev] FE.KEYID = 1
6,078,100 UART: [ldev] Erasing FE.KEYID = 1
8,579,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,471 UART: [ldev] --
10,370,801 UART: [fwproc] Wait for Commands...
10,372,794 UART: [fwproc] Recv command 0x46574c44
10,374,898 UART: [fwproc] Recv'd Img size: 106600 bytes
13,676,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,751,867 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,794,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,110,917 >>> mbox cmd response: success
14,115,545 UART: [afmc] ++
14,116,128 UART: [afmc] CDI.KEYID = 6
14,117,039 UART: [afmc] SUBJECT.KEYID = 7
14,118,206 UART: [afmc] AUTHORITY.KEYID = 5
16,656,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,380,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,382,042 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,397,985 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,413,910 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,429,918 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,451,885 UART: [afmc] --
18,454,792 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,455,155 UART: [cold-reset] --
18,458,829 UART: [state] Locking Datavault
18,464,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,465,985 UART: [state] Locking ICCM
18,467,650 UART: [exit] Launching FMC @ 0x40000000
18,476,056 UART:
18,476,296 UART: Running Caliptra FMC ...
18,477,398 UART:
18,477,569 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,479,136 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,220,816 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,942,726 >>> mbox cmd response: success
18,222,117 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,239,452 UART:
18,239,823 UART: Running Caliptra FMC ...
18,240,967 UART:
18,241,130 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,242,901 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,221,359 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,356,628 UART:
2,357,041 UART: Running Caliptra ROM ...
2,358,125 UART:
2,358,280 UART: [state] CFI Enabled
2,359,512 UART: [state] LifecycleState = Unprovisioned
2,361,172 UART: [state] DebugLocked = No
2,362,199 UART: [state] WD Timer not started. Device not locked for debugging
2,364,661 UART: [kat] SHA2-256
2,365,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,329 UART: [kat] ++
2,368,775 UART: [kat] sha1
2,369,306 UART: [kat] SHA2-256
2,369,965 UART: [kat] SHA2-384
2,370,618 UART: [kat] SHA2-512-ACC
2,371,414 UART: [kat] ECC-384
3,279,701 UART: [kat] HMAC-384Kdf
3,291,318 UART: [kat] LMS
3,820,813 UART: [kat] --
3,826,314 UART: [cold-reset] ++
3,828,505 UART: [fht] FHT @ 0x50003400
3,840,122 UART: [idev] ++
3,840,693 UART: [idev] CDI.KEYID = 6
3,841,602 UART: [idev] SUBJECT.KEYID = 7
3,842,815 UART: [idev] UDS.KEYID = 0
3,862,299 UART: [idev] Erasing UDS.KEYID = 0
6,319,179 UART: [idev] Sha1 KeyId Algorithm
6,342,731 UART: [idev] --
6,348,089 UART: [ldev] ++
6,348,664 UART: [ldev] CDI.KEYID = 6
6,349,568 UART: [ldev] SUBJECT.KEYID = 5
6,350,728 UART: [ldev] AUTHORITY.KEYID = 7
6,352,012 UART: [ldev] FE.KEYID = 1
6,364,335 UART: [ldev] Erasing FE.KEYID = 1
8,837,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,193 UART: [ldev] --
10,628,166 UART: [fwproc] Wait for Commands...
10,630,047 UART: [fwproc] Recv command 0x46574c44
10,632,090 UART: [fwproc] Recv'd Img size: 106600 bytes
13,939,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,086 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,663 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,368,314 >>> mbox cmd response: success
14,372,508 UART: [afmc] ++
14,373,088 UART: [afmc] CDI.KEYID = 6
14,373,979 UART: [afmc] SUBJECT.KEYID = 7
14,375,188 UART: [afmc] AUTHORITY.KEYID = 5
16,875,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,487 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,612,511 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,628,355 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,644,322 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,667,163 UART: [afmc] --
18,671,220 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,671,596 UART: [cold-reset] --
18,674,457 UART: [state] Locking Datavault
18,677,439 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,294 UART: [state] Locking ICCM
18,681,692 UART: [exit] Launching FMC @ 0x40000000
18,690,095 UART:
18,690,342 UART: Running Caliptra FMC ...
18,691,444 UART:
18,691,596 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,693,161 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,327 writing to cptra_bootfsm_go
2,218,975 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,158,445 >>> mbox cmd response: success
18,395,559 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,412,739 UART:
18,413,109 UART: Running Caliptra FMC ...
18,414,211 UART:
18,414,363 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,416,105 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,228,957 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,363,942 UART:
2,364,363 UART: Running Caliptra ROM ...
2,365,447 UART:
2,365,607 UART: [state] CFI Enabled
2,366,597 UART: [state] LifecycleState = Unprovisioned
2,368,184 UART: [state] DebugLocked = No
2,369,207 UART: [state] WD Timer not started. Device not locked for debugging
2,371,675 UART: [kat] SHA2-256
2,372,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,375,348 UART: [kat] ++
2,375,795 UART: [kat] sha1
2,376,309 UART: [kat] SHA2-256
2,376,968 UART: [kat] SHA2-384
2,377,621 UART: [kat] SHA2-512-ACC
2,378,463 UART: [kat] ECC-384
2,950,589 UART: [kat] HMAC-384Kdf
2,971,277 UART: [kat] LMS
3,500,764 UART: [kat] --
3,503,138 UART: [cold-reset] ++
3,505,711 UART: [fht] FHT @ 0x50003400
3,517,392 UART: [idev] ++
3,517,976 UART: [idev] CDI.KEYID = 6
3,518,859 UART: [idev] SUBJECT.KEYID = 7
3,520,072 UART: [idev] UDS.KEYID = 0
3,544,477 UART: [idev] Erasing UDS.KEYID = 0
6,027,410 UART: [idev] Sha1 KeyId Algorithm
6,051,834 UART: [idev] --
6,055,994 UART: [ldev] ++
6,056,571 UART: [ldev] CDI.KEYID = 6
6,057,454 UART: [ldev] SUBJECT.KEYID = 5
6,058,669 UART: [ldev] AUTHORITY.KEYID = 7
6,059,905 UART: [ldev] FE.KEYID = 1
6,098,936 UART: [ldev] Erasing FE.KEYID = 1
8,600,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,333 UART: [ldev] --
10,394,492 UART: [fwproc] Wait for Commands...
10,396,697 UART: [fwproc] Recv command 0x46574c44
10,398,797 UART: [fwproc] Recv'd Img size: 106600 bytes
13,710,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,788,461 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,831,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,148,892 >>> mbox cmd response: success
14,153,777 UART: [afmc] ++
14,154,374 UART: [afmc] CDI.KEYID = 6
14,155,284 UART: [afmc] SUBJECT.KEYID = 7
14,156,451 UART: [afmc] AUTHORITY.KEYID = 5
16,702,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,422,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,424,842 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,440,862 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,456,738 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,472,715 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,178 UART: [afmc] --
18,500,077 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,500,447 UART: [cold-reset] --
18,504,286 UART: [state] Locking Datavault
18,511,150 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,849 UART: [state] Locking ICCM
18,514,890 UART: [exit] Launching FMC @ 0x40000000
18,523,234 UART:
18,523,470 UART: Running Caliptra FMC ...
18,524,574 UART:
18,524,735 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,526,405 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,217,325 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,948,012 >>> mbox cmd response: success
18,217,550 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,232,343 UART:
18,232,678 UART: Running Caliptra FMC ...
18,233,848 UART:
18,234,010 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,235,794 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,220,942 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,355,835 UART:
2,356,257 UART: Running Caliptra ROM ...
2,357,427 UART:
2,357,601 UART: [state] CFI Enabled
2,358,585 UART: [state] LifecycleState = Unprovisioned
2,360,229 UART: [state] DebugLocked = No
2,361,332 UART: [state] WD Timer not started. Device not locked for debugging
2,363,801 UART: [kat] SHA2-256
2,364,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,468 UART: [kat] ++
2,367,918 UART: [kat] sha1
2,368,431 UART: [kat] SHA2-256
2,369,087 UART: [kat] SHA2-384
2,369,746 UART: [kat] SHA2-512-ACC
2,370,622 UART: [kat] ECC-384
3,282,406 UART: [kat] HMAC-384Kdf
3,294,745 UART: [kat] LMS
3,824,191 UART: [kat] --
3,828,179 UART: [cold-reset] ++
3,830,428 UART: [fht] FHT @ 0x50003400
3,840,590 UART: [idev] ++
3,841,158 UART: [idev] CDI.KEYID = 6
3,842,069 UART: [idev] SUBJECT.KEYID = 7
3,843,279 UART: [idev] UDS.KEYID = 0
3,858,120 UART: [idev] Erasing UDS.KEYID = 0
6,309,876 UART: [idev] Sha1 KeyId Algorithm
6,332,667 UART: [idev] --
6,336,223 UART: [ldev] ++
6,336,828 UART: [ldev] CDI.KEYID = 6
6,337,739 UART: [ldev] SUBJECT.KEYID = 5
6,338,895 UART: [ldev] AUTHORITY.KEYID = 7
6,340,122 UART: [ldev] FE.KEYID = 1
6,352,222 UART: [ldev] Erasing FE.KEYID = 1
8,820,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,604,234 UART: [ldev] --
10,608,686 UART: [fwproc] Wait for Commands...
10,610,399 UART: [fwproc] Recv command 0x46574c44
10,612,490 UART: [fwproc] Recv'd Img size: 106600 bytes
13,911,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,983,995 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,026,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,344,462 >>> mbox cmd response: success
14,348,870 UART: [afmc] ++
14,349,455 UART: [afmc] CDI.KEYID = 6
14,350,334 UART: [afmc] SUBJECT.KEYID = 7
14,351,562 UART: [afmc] AUTHORITY.KEYID = 5
16,851,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,218 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,589,104 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,605,001 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,620,983 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,643,403 UART: [afmc] --
18,647,499 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,647,902 UART: [cold-reset] --
18,652,007 UART: [state] Locking Datavault
18,657,368 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,104 UART: [state] Locking ICCM
18,660,371 UART: [exit] Launching FMC @ 0x40000000
18,668,765 UART:
18,669,005 UART: Running Caliptra FMC ...
18,670,129 UART:
18,670,291 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,671,866 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,220,517 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,145,028 >>> mbox cmd response: success
18,385,023 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,396,690 UART:
18,397,038 UART: Running Caliptra FMC ...
18,398,224 UART:
18,398,387 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,400,160 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,874 UART: [kat] LMS
1,169,186 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,776 UART: [ldev] ++
1,208,944 UART: [ldev] CDI.KEYID = 6
1,209,308 UART: [ldev] SUBJECT.KEYID = 5
1,209,735 UART: [ldev] AUTHORITY.KEYID = 7
1,210,198 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,346 UART: [fwproc] Wait for Commands...
1,280,953 UART: [fwproc] Recv command 0x46574c44
1,281,686 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,013 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,508 >>> mbox cmd response: success
2,671,685 UART: [afmc] ++
2,671,853 UART: [afmc] CDI.KEYID = 6
2,672,216 UART: [afmc] SUBJECT.KEYID = 7
2,672,642 UART: [afmc] AUTHORITY.KEYID = 5
2,707,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,724,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,065 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,785 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,678 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,742,371 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,750,332 UART: [afmc] --
2,751,410 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,751,432 UART: [cold-reset] --
2,752,382 UART: [state] Locking Datavault
2,753,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,341 UART: [state] Locking ICCM
2,754,927 UART: [exit] Launching FMC @ 0x40000000
2,760,224 UART:
2,760,240 UART: Running Caliptra FMC ...
2,760,648 UART:
2,760,786 UART: [fmc] Received command: 0x10000005
2,761,887 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,984 >>> mbox cmd response: success
2,576,504 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,582,471 UART:
2,582,487 UART: Running Caliptra FMC ...
2,582,895 UART:
2,583,033 UART: [fmc] Received command: 0x10000005
2,584,134 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,670 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,174,032 UART: [idev] ++
1,174,200 UART: [idev] CDI.KEYID = 6
1,174,561 UART: [idev] SUBJECT.KEYID = 7
1,174,986 UART: [idev] UDS.KEYID = 0
1,183,120 UART: [idev] Erasing UDS.KEYID = 0
1,200,414 UART: [idev] Sha1 KeyId Algorithm
1,209,342 UART: [idev] --
1,210,243 UART: [ldev] ++
1,210,411 UART: [ldev] CDI.KEYID = 6
1,210,775 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,244,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,249 UART: [ldev] --
1,283,537 UART: [fwproc] Wait for Commands...
1,284,150 UART: [fwproc] Recv command 0x46574c44
1,284,883 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,864 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,291 >>> mbox cmd response: success
2,674,542 UART: [afmc] ++
2,674,710 UART: [afmc] CDI.KEYID = 6
2,675,073 UART: [afmc] SUBJECT.KEYID = 7
2,675,499 UART: [afmc] AUTHORITY.KEYID = 5
2,710,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,312 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,032 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,925 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,618 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,535 UART: [afmc] --
2,754,461 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,483 UART: [cold-reset] --
2,755,409 UART: [state] Locking Datavault
2,756,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,992 UART: [state] Locking ICCM
2,757,654 UART: [exit] Launching FMC @ 0x40000000
2,762,951 UART:
2,762,967 UART: Running Caliptra FMC ...
2,763,375 UART:
2,763,513 UART: [fmc] Received command: 0x10000005
2,764,614 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,953 >>> mbox cmd response: success
2,577,763 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,583,762 UART:
2,583,778 UART: Running Caliptra FMC ...
2,584,186 UART:
2,584,324 UART: [fmc] Received command: 0x10000005
2,585,425 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,353 UART: [state] DebugLocked = No
85,841 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
890,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,853 UART: [kat] ++
895,005 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,066 UART: [kat] SHA2-512-ACC
905,967 UART: [kat] ECC-384
915,276 UART: [kat] HMAC-384Kdf
919,964 UART: [kat] LMS
1,168,276 UART: [kat] --
1,169,081 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,210 UART: [ldev] --
1,280,592 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,189 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,660 >>> mbox cmd response: success
2,671,761 UART: [afmc] ++
2,671,929 UART: [afmc] CDI.KEYID = 6
2,672,292 UART: [afmc] SUBJECT.KEYID = 7
2,672,718 UART: [afmc] AUTHORITY.KEYID = 5
2,708,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,724,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,691 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,411 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,304 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,742,997 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,750,972 UART: [afmc] --
2,752,038 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,752,060 UART: [cold-reset] --
2,753,112 UART: [state] Locking Datavault
2,754,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,841 UART: [state] Locking ICCM
2,755,427 UART: [exit] Launching FMC @ 0x40000000
2,760,724 UART:
2,760,740 UART: Running Caliptra FMC ...
2,761,148 UART:
2,761,286 UART: [fmc] Received command: 0x10000005
2,762,387 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,980 >>> mbox cmd response: success
2,576,428 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,582,619 UART:
2,582,635 UART: Running Caliptra FMC ...
2,583,043 UART:
2,583,181 UART: [fmc] Received command: 0x10000005
2,584,282 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,182,734 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,621 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,037 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,624 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,039 >>> mbox cmd response: success
2,673,262 UART: [afmc] ++
2,673,430 UART: [afmc] CDI.KEYID = 6
2,673,793 UART: [afmc] SUBJECT.KEYID = 7
2,674,219 UART: [afmc] AUTHORITY.KEYID = 5
2,709,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,080 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,800 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,693 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,386 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,067 UART: [afmc] --
2,752,991 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,013 UART: [cold-reset] --
2,753,691 UART: [state] Locking Datavault
2,754,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,178 UART: [state] Locking ICCM
2,755,694 UART: [exit] Launching FMC @ 0x40000000
2,760,991 UART:
2,761,007 UART: Running Caliptra FMC ...
2,761,415 UART:
2,761,553 UART: [fmc] Received command: 0x10000005
2,762,654 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,053 >>> mbox cmd response: success
2,577,593 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,583,604 UART:
2,583,620 UART: Running Caliptra FMC ...
2,584,028 UART:
2,584,166 UART: [fmc] Received command: 0x10000005
2,585,267 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,730 UART: [ldev] ++
1,208,898 UART: [ldev] CDI.KEYID = 6
1,209,262 UART: [ldev] SUBJECT.KEYID = 5
1,209,689 UART: [ldev] AUTHORITY.KEYID = 7
1,210,152 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,242,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,685 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,194 >>> mbox cmd response: success
2,674,389 UART: [afmc] ++
2,674,557 UART: [afmc] CDI.KEYID = 6
2,674,920 UART: [afmc] SUBJECT.KEYID = 7
2,675,346 UART: [afmc] AUTHORITY.KEYID = 5
2,711,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,417 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,137 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,030 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,723 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,546 UART: [afmc] --
2,754,444 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,466 UART: [cold-reset] --
2,755,216 UART: [state] Locking Datavault
2,756,385 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,989 UART: [state] Locking ICCM
2,757,475 UART: [exit] Launching FMC @ 0x40000000
2,762,772 UART:
2,762,788 UART: Running Caliptra FMC ...
2,763,196 UART:
2,763,334 UART: [fmc] Received command: 0x10000005
2,764,435 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,130 >>> mbox cmd response: success
2,575,814 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,582,279 UART:
2,582,295 UART: Running Caliptra FMC ...
2,582,703 UART:
2,582,841 UART: [fmc] Received command: 0x10000005
2,583,942 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
905,021 UART: [kat] SHA2-512-ACC
906,922 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,710 UART: [idev] ++
1,173,878 UART: [idev] CDI.KEYID = 6
1,174,239 UART: [idev] SUBJECT.KEYID = 7
1,174,664 UART: [idev] UDS.KEYID = 0
1,182,740 UART: [idev] Erasing UDS.KEYID = 0
1,200,370 UART: [idev] Sha1 KeyId Algorithm
1,209,118 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,281,979 UART: [fwproc] Wait for Commands...
1,282,764 UART: [fwproc] Recv command 0x46574c44
1,283,497 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,682 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,329 >>> mbox cmd response: success
2,673,566 UART: [afmc] ++
2,673,734 UART: [afmc] CDI.KEYID = 6
2,674,097 UART: [afmc] SUBJECT.KEYID = 7
2,674,523 UART: [afmc] AUTHORITY.KEYID = 5
2,711,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,526 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,246 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,139 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,832 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,787 UART: [afmc] --
2,754,653 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,675 UART: [cold-reset] --
2,755,547 UART: [state] Locking Datavault
2,756,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,478 UART: [state] Locking ICCM
2,758,030 UART: [exit] Launching FMC @ 0x40000000
2,763,327 UART:
2,763,343 UART: Running Caliptra FMC ...
2,763,751 UART:
2,763,889 UART: [fmc] Received command: 0x10000005
2,764,990 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,587 >>> mbox cmd response: success
2,578,517 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,762 UART:
2,584,778 UART: Running Caliptra FMC ...
2,585,186 UART:
2,585,324 UART: [fmc] Received command: 0x10000005
2,586,425 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,214,141 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,348,710 UART:
2,349,123 UART: Running Caliptra ROM ...
2,350,296 UART:
2,350,471 UART: [state] CFI Enabled
2,351,458 UART: [state] LifecycleState = Unprovisioned
2,353,104 UART: [state] DebugLocked = No
2,354,208 UART: [state] WD Timer not started. Device not locked for debugging
2,356,700 UART: [kat] SHA2-256
2,357,371 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,381 UART: [kat] ++
2,360,830 UART: [kat] sha1
2,361,429 UART: [kat] SHA2-256
2,362,094 UART: [kat] SHA2-384
2,362,755 UART: [kat] SHA2-512-ACC
2,363,646 UART: [kat] ECC-384
3,772,387 UART: [kat] HMAC-384Kdf
3,801,844 UART: [kat] LMS
4,875,003 UART: [kat] --
4,879,804 UART: [cold-reset] ++
4,881,315 UART: [fht] FHT @ 0x50003400
4,891,267 UART: [idev] ++
4,891,935 UART: [idev] CDI.KEYID = 6
4,893,170 UART: [idev] SUBJECT.KEYID = 7
4,894,290 UART: [idev] UDS.KEYID = 0
4,930,463 UART: [idev] Erasing UDS.KEYID = 0
8,243,792 UART: [idev] Sha1 KeyId Algorithm
8,265,239 UART: [idev] --
8,269,610 UART: [ldev] ++
8,270,237 UART: [ldev] CDI.KEYID = 6
8,271,420 UART: [ldev] SUBJECT.KEYID = 5
8,272,583 UART: [ldev] AUTHORITY.KEYID = 7
8,273,812 UART: [ldev] FE.KEYID = 1
8,318,057 UART: [ldev] Erasing FE.KEYID = 1
11,653,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,712 UART: [ldev] --
14,040,898 UART: [fwproc] Wait for Commands...
14,043,647 UART: [fwproc] Recv command 0x46574c44
14,045,912 UART: [fwproc] Recv'd Img size: 106256 bytes
18,017,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,089,340 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,131,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,447,414 >>> mbox cmd response: success
18,451,083 UART: [afmc] ++
18,451,678 UART: [afmc] CDI.KEYID = 6
18,452,866 UART: [afmc] SUBJECT.KEYID = 7
18,454,032 UART: [afmc] AUTHORITY.KEYID = 5
21,818,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,119,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,122,043 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,137,931 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,154,011 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,170,192 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,194,404 UART: [afmc] --
24,198,390 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,198,802 UART: [cold-reset] --
24,201,293 UART: [state] Locking Datavault
24,208,433 UART: [state] Locking PCR0, PCR1 and PCR31
24,210,083 UART: [state] Locking ICCM
24,212,835 UART: [exit] Launching FMC @ 0x40000000
24,221,455 UART:
24,221,690 UART: Running Caliptra FMC ...
24,222,752 UART:
24,222,906 UART: [fmc] Received command: 0x10000003
24,232,530 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,216,126 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,222,015 >>> mbox cmd response: success
23,899,238 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,914,498 UART:
23,914,857 UART: Running Caliptra FMC ...
23,916,043 UART:
23,916,216 UART: [fmc] Received command: 0x10000003
23,925,564 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,219,830 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,354,335 UART:
2,354,758 UART: Running Caliptra ROM ...
2,355,835 UART:
2,355,991 UART: [state] CFI Enabled
2,356,984 UART: [state] LifecycleState = Unprovisioned
2,358,625 UART: [state] DebugLocked = No
2,359,675 UART: [state] WD Timer not started. Device not locked for debugging
2,362,203 UART: [kat] SHA2-256
2,362,872 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,875 UART: [kat] ++
2,366,320 UART: [kat] sha1
2,366,873 UART: [kat] SHA2-256
2,367,526 UART: [kat] SHA2-384
2,368,272 UART: [kat] SHA2-512-ACC
2,369,101 UART: [kat] ECC-384
4,095,705 UART: [kat] HMAC-384Kdf
4,107,315 UART: [kat] LMS
5,180,427 UART: [kat] --
5,185,723 UART: [cold-reset] ++
5,187,007 UART: [fht] FHT @ 0x50003400
5,197,125 UART: [idev] ++
5,197,802 UART: [idev] CDI.KEYID = 6
5,198,979 UART: [idev] SUBJECT.KEYID = 7
5,200,456 UART: [idev] UDS.KEYID = 0
5,220,151 UART: [idev] Erasing UDS.KEYID = 0
8,493,906 UART: [idev] Sha1 KeyId Algorithm
8,516,223 UART: [idev] --
8,518,968 UART: [ldev] ++
8,519,539 UART: [ldev] CDI.KEYID = 6
8,520,775 UART: [ldev] SUBJECT.KEYID = 5
8,522,195 UART: [ldev] AUTHORITY.KEYID = 7
8,523,791 UART: [ldev] FE.KEYID = 1
8,537,344 UART: [ldev] Erasing FE.KEYID = 1
11,830,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,617 UART: [ldev] --
14,198,240 UART: [fwproc] Wait for Commands...
14,199,841 UART: [fwproc] Recv command 0x46574c44
14,202,147 UART: [fwproc] Recv'd Img size: 106256 bytes
18,169,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,248,878 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,291,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,606,970 >>> mbox cmd response: success
18,611,804 UART: [afmc] ++
18,612,388 UART: [afmc] CDI.KEYID = 6
18,613,571 UART: [afmc] SUBJECT.KEYID = 7
18,614,725 UART: [afmc] AUTHORITY.KEYID = 5
21,932,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,228,843 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,244,859 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,260,956 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,277,013 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,299,866 UART: [afmc] --
24,304,232 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,304,636 UART: [cold-reset] --
24,308,652 UART: [state] Locking Datavault
24,314,376 UART: [state] Locking PCR0, PCR1 and PCR31
24,316,013 UART: [state] Locking ICCM
24,318,701 UART: [exit] Launching FMC @ 0x40000000
24,327,361 UART:
24,327,588 UART: Running Caliptra FMC ...
24,328,678 UART:
24,328,830 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,338,678 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,219,305 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,408,576 >>> mbox cmd response: success
24,030,964 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,044,334 UART:
24,045,082 UART: Running Caliptra FMC ...
24,046,297 UART:
24,046,463 UART: [fmc] Received command: 0x10000003
24,055,446 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,214,816 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,350,246 UART:
2,350,686 UART: Running Caliptra ROM ...
2,351,863 UART:
2,352,036 UART: [state] CFI Enabled
2,353,032 UART: [state] LifecycleState = Unprovisioned
2,354,686 UART: [state] DebugLocked = No
2,355,797 UART: [state] WD Timer not started. Device not locked for debugging
2,358,269 UART: [kat] SHA2-256
2,358,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,947 UART: [kat] ++
2,362,399 UART: [kat] sha1
2,362,914 UART: [kat] SHA2-256
2,363,760 UART: [kat] SHA2-384
2,364,434 UART: [kat] SHA2-512-ACC
2,365,232 UART: [kat] ECC-384
2,950,018 UART: [kat] HMAC-384Kdf
2,971,311 UART: [kat] LMS
3,500,791 UART: [kat] --
3,504,351 UART: [cold-reset] ++
3,505,421 UART: [fht] FHT @ 0x50003400
3,517,640 UART: [idev] ++
3,518,205 UART: [idev] CDI.KEYID = 6
3,519,369 UART: [idev] SUBJECT.KEYID = 7
3,520,403 UART: [idev] UDS.KEYID = 0
3,543,781 UART: [idev] Erasing UDS.KEYID = 0
6,026,341 UART: [idev] Sha1 KeyId Algorithm
6,049,485 UART: [idev] --
6,053,380 UART: [ldev] ++
6,053,953 UART: [ldev] CDI.KEYID = 6
6,054,841 UART: [ldev] SUBJECT.KEYID = 5
6,055,947 UART: [ldev] AUTHORITY.KEYID = 7
6,057,321 UART: [ldev] FE.KEYID = 1
6,100,199 UART: [ldev] Erasing FE.KEYID = 1
8,600,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,659 UART: [ldev] --
10,392,276 UART: [fwproc] Wait for Commands...
10,394,104 UART: [fwproc] Recv command 0x46574c44
10,396,203 UART: [fwproc] Recv'd Img size: 106600 bytes
13,704,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,783,258 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,825,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,142,913 >>> mbox cmd response: success
14,147,519 UART: [afmc] ++
14,148,130 UART: [afmc] CDI.KEYID = 6
14,149,042 UART: [afmc] SUBJECT.KEYID = 7
14,150,207 UART: [afmc] AUTHORITY.KEYID = 5
16,679,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,403,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,405,186 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,421,183 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,437,103 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,453,012 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,475,667 UART: [afmc] --
18,479,498 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,480,076 UART: [cold-reset] --
18,482,631 UART: [state] Locking Datavault
18,485,349 UART: [state] Locking PCR0, PCR1 and PCR31
18,486,997 UART: [state] Locking ICCM
18,489,687 UART: [exit] Launching FMC @ 0x40000000
18,498,052 UART:
18,498,307 UART: Running Caliptra FMC ...
18,499,414 UART:
18,499,571 UART: [fmc] Received command: 0x10000003
18,509,138 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,221,964 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,953,213 >>> mbox cmd response: success
18,222,303 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,234,064 UART:
18,234,394 UART: Running Caliptra FMC ...
18,235,562 UART:
18,235,729 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,245,530 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,219,782 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,354,464 UART:
2,354,868 UART: Running Caliptra ROM ...
2,355,973 UART:
2,356,140 UART: [state] CFI Enabled
2,357,125 UART: [state] LifecycleState = Unprovisioned
2,358,768 UART: [state] DebugLocked = No
2,359,876 UART: [state] WD Timer not started. Device not locked for debugging
2,362,344 UART: [kat] SHA2-256
2,363,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,024 UART: [kat] ++
2,366,476 UART: [kat] sha1
2,367,468 UART: [kat] SHA2-256
2,368,145 UART: [kat] SHA2-384
2,368,807 UART: [kat] SHA2-512-ACC
2,369,605 UART: [kat] ECC-384
3,282,876 UART: [kat] HMAC-384Kdf
3,295,133 UART: [kat] LMS
3,824,647 UART: [kat] --
3,830,310 UART: [cold-reset] ++
3,831,910 UART: [fht] FHT @ 0x50003400
3,841,430 UART: [idev] ++
3,841,990 UART: [idev] CDI.KEYID = 6
3,843,003 UART: [idev] SUBJECT.KEYID = 7
3,844,108 UART: [idev] UDS.KEYID = 0
3,860,511 UART: [idev] Erasing UDS.KEYID = 0
6,318,393 UART: [idev] Sha1 KeyId Algorithm
6,341,728 UART: [idev] --
6,345,905 UART: [ldev] ++
6,346,475 UART: [ldev] CDI.KEYID = 6
6,347,383 UART: [ldev] SUBJECT.KEYID = 5
6,348,596 UART: [ldev] AUTHORITY.KEYID = 7
6,349,824 UART: [ldev] FE.KEYID = 1
6,362,949 UART: [ldev] Erasing FE.KEYID = 1
8,833,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,494 UART: [ldev] --
10,624,332 UART: [fwproc] Wait for Commands...
10,626,427 UART: [fwproc] Recv command 0x46574c44
10,628,516 UART: [fwproc] Recv'd Img size: 106600 bytes
13,931,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,649 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,212 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,367,898 >>> mbox cmd response: success
14,372,994 UART: [afmc] ++
14,373,595 UART: [afmc] CDI.KEYID = 6
14,374,664 UART: [afmc] SUBJECT.KEYID = 7
14,375,767 UART: [afmc] AUTHORITY.KEYID = 5
16,875,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,249 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,616,235 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,632,164 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,648,092 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,670,786 UART: [afmc] --
18,675,354 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,675,729 UART: [cold-reset] --
18,677,856 UART: [state] Locking Datavault
18,683,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,183 UART: [state] Locking ICCM
18,686,566 UART: [exit] Launching FMC @ 0x40000000
18,694,967 UART:
18,695,215 UART: Running Caliptra FMC ...
18,696,317 UART:
18,696,477 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,706,293 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,217,432 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,145,607 >>> mbox cmd response: success
18,387,884 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,403,554 UART:
18,403,911 UART: Running Caliptra FMC ...
18,405,097 UART:
18,405,267 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,414,997 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,220,240 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,355,222 UART:
2,355,620 UART: Running Caliptra ROM ...
2,356,726 UART:
2,356,882 UART: [state] CFI Enabled
2,357,881 UART: [state] LifecycleState = Unprovisioned
2,359,530 UART: [state] DebugLocked = No
2,360,556 UART: [state] WD Timer not started. Device not locked for debugging
2,363,026 UART: [kat] SHA2-256
2,363,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,699 UART: [kat] ++
2,367,149 UART: [kat] sha1
2,367,657 UART: [kat] SHA2-256
2,368,312 UART: [kat] SHA2-384
2,368,968 UART: [kat] SHA2-512-ACC
2,369,815 UART: [kat] ECC-384
2,949,040 UART: [kat] HMAC-384Kdf
2,970,598 UART: [kat] LMS
3,500,060 UART: [kat] --
3,503,183 UART: [cold-reset] ++
3,505,185 UART: [fht] FHT @ 0x50003400
3,515,479 UART: [idev] ++
3,516,086 UART: [idev] CDI.KEYID = 6
3,517,015 UART: [idev] SUBJECT.KEYID = 7
3,518,180 UART: [idev] UDS.KEYID = 0
3,542,428 UART: [idev] Erasing UDS.KEYID = 0
6,026,873 UART: [idev] Sha1 KeyId Algorithm
6,049,475 UART: [idev] --
6,053,040 UART: [ldev] ++
6,053,621 UART: [ldev] CDI.KEYID = 6
6,054,532 UART: [ldev] SUBJECT.KEYID = 5
6,055,809 UART: [ldev] AUTHORITY.KEYID = 7
6,056,997 UART: [ldev] FE.KEYID = 1
6,100,421 UART: [ldev] Erasing FE.KEYID = 1
8,603,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,744 UART: [ldev] --
10,412,032 UART: [fwproc] Wait for Commands...
10,413,648 UART: [fwproc] Recv command 0x46574c44
10,415,696 UART: [fwproc] Recv'd Img size: 106600 bytes
13,726,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,797,993 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,840,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,157,092 >>> mbox cmd response: success
14,160,698 UART: [afmc] ++
14,161,282 UART: [afmc] CDI.KEYID = 6
14,162,193 UART: [afmc] SUBJECT.KEYID = 7
14,163,350 UART: [afmc] AUTHORITY.KEYID = 5
16,701,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,443,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,445,569 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,461,547 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,477,498 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,493,427 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,516,429 UART: [afmc] --
18,520,568 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,520,943 UART: [cold-reset] --
18,525,307 UART: [state] Locking Datavault
18,529,820 UART: [state] Locking PCR0, PCR1 and PCR31
18,531,469 UART: [state] Locking ICCM
18,532,671 UART: [exit] Launching FMC @ 0x40000000
18,541,063 UART:
18,541,310 UART: Running Caliptra FMC ...
18,542,335 UART:
18,542,499 UART: [fmc] Received command: 0x10000003
18,552,126 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,228,741 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,940,429 >>> mbox cmd response: success
18,216,911 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,233,538 UART:
18,233,867 UART: Running Caliptra FMC ...
18,235,072 UART:
18,235,253 UART: [fmc] Received command: 0x10000003
18,244,721 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
2,220,222 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,354,959 UART:
2,355,367 UART: Running Caliptra ROM ...
2,356,447 UART:
2,356,597 UART: [state] CFI Enabled
2,357,593 UART: [state] LifecycleState = Unprovisioned
2,359,472 UART: [state] DebugLocked = No
2,360,593 UART: [state] WD Timer not started. Device not locked for debugging
2,363,069 UART: [kat] SHA2-256
2,363,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,755 UART: [kat] ++
2,367,207 UART: [kat] sha1
2,367,718 UART: [kat] SHA2-256
2,368,454 UART: [kat] SHA2-384
2,369,116 UART: [kat] SHA2-512-ACC
2,369,920 UART: [kat] ECC-384
3,285,153 UART: [kat] HMAC-384Kdf
3,297,564 UART: [kat] LMS
3,827,016 UART: [kat] --
3,831,141 UART: [cold-reset] ++
3,833,293 UART: [fht] FHT @ 0x50003400
3,844,378 UART: [idev] ++
3,844,940 UART: [idev] CDI.KEYID = 6
3,845,851 UART: [idev] SUBJECT.KEYID = 7
3,847,061 UART: [idev] UDS.KEYID = 0
3,862,816 UART: [idev] Erasing UDS.KEYID = 0
6,317,292 UART: [idev] Sha1 KeyId Algorithm
6,339,660 UART: [idev] --
6,343,858 UART: [ldev] ++
6,344,418 UART: [ldev] CDI.KEYID = 6
6,345,348 UART: [ldev] SUBJECT.KEYID = 5
6,346,576 UART: [ldev] AUTHORITY.KEYID = 7
6,347,804 UART: [ldev] FE.KEYID = 1
6,358,533 UART: [ldev] Erasing FE.KEYID = 1
8,831,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,036 UART: [ldev] --
10,622,284 UART: [fwproc] Wait for Commands...
10,625,020 UART: [fwproc] Recv command 0x46574c44
10,627,062 UART: [fwproc] Recv'd Img size: 106600 bytes
13,934,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,634 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,047,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,364,903 >>> mbox cmd response: success
14,368,521 UART: [afmc] ++
14,369,107 UART: [afmc] CDI.KEYID = 6
14,369,990 UART: [afmc] SUBJECT.KEYID = 7
14,371,206 UART: [afmc] AUTHORITY.KEYID = 5
16,873,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,593,734 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,609,717 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,625,665 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,641,595 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,509 UART: [afmc] --
18,668,564 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,668,924 UART: [cold-reset] --
18,673,249 UART: [state] Locking Datavault
18,677,095 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,742 UART: [state] Locking ICCM
18,680,569 UART: [exit] Launching FMC @ 0x40000000
18,688,931 UART:
18,689,166 UART: Running Caliptra FMC ...
18,690,187 UART:
18,690,332 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,700,252 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,219,964 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,151,130 >>> mbox cmd response: success
18,378,856 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,393,205 UART:
18,393,552 UART: Running Caliptra FMC ...
18,394,732 UART:
18,394,897 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,404,647 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,535 UART: [idev] ++
1,172,703 UART: [idev] CDI.KEYID = 6
1,173,064 UART: [idev] SUBJECT.KEYID = 7
1,173,489 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,637 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,303 UART: [fwproc] Recv command 0x46574c44
1,283,036 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,883 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,348 >>> mbox cmd response: success
2,673,529 UART: [afmc] ++
2,673,697 UART: [afmc] CDI.KEYID = 6
2,674,060 UART: [afmc] SUBJECT.KEYID = 7
2,674,486 UART: [afmc] AUTHORITY.KEYID = 5
2,710,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,803 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,523 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,416 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,109 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,054 UART: [afmc] --
2,753,930 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,753,952 UART: [cold-reset] --
2,754,720 UART: [state] Locking Datavault
2,756,023 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,627 UART: [state] Locking ICCM
2,757,117 UART: [exit] Launching FMC @ 0x40000000
2,762,414 UART:
2,762,430 UART: Running Caliptra FMC ...
2,762,838 UART:
2,762,976 UART: [fmc] Received command: 0x10000003
2,772,452 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,294 >>> mbox cmd response: success
2,574,706 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,581,081 UART:
2,581,097 UART: Running Caliptra FMC ...
2,581,505 UART:
2,581,643 UART: [fmc] Received command: 0x10000003
2,591,119 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,249 UART: [kat] LMS
1,169,561 UART: [kat] --
1,170,358 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,084 UART: [idev] --
1,209,045 UART: [ldev] ++
1,209,213 UART: [ldev] CDI.KEYID = 6
1,209,577 UART: [ldev] SUBJECT.KEYID = 5
1,210,004 UART: [ldev] AUTHORITY.KEYID = 7
1,210,467 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,045 UART: [ldev] --
1,281,433 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,991 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,968 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,457 >>> mbox cmd response: success
2,672,634 UART: [afmc] ++
2,672,802 UART: [afmc] CDI.KEYID = 6
2,673,165 UART: [afmc] SUBJECT.KEYID = 7
2,673,591 UART: [afmc] AUTHORITY.KEYID = 5
2,708,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,946 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,666 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,559 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,252 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,750,953 UART: [afmc] --
2,751,993 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,752,015 UART: [cold-reset] --
2,752,857 UART: [state] Locking Datavault
2,754,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,604 UART: [state] Locking ICCM
2,755,156 UART: [exit] Launching FMC @ 0x40000000
2,760,453 UART:
2,760,469 UART: Running Caliptra FMC ...
2,760,877 UART:
2,761,015 UART: [fmc] Received command: 0x10000003
2,770,491 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,743 >>> mbox cmd response: success
2,576,777 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,583,046 UART:
2,583,062 UART: Running Caliptra FMC ...
2,583,470 UART:
2,583,608 UART: [fmc] Received command: 0x10000003
2,593,084 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,077 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,496 >>> mbox cmd response: success
2,672,663 UART: [afmc] ++
2,672,831 UART: [afmc] CDI.KEYID = 6
2,673,194 UART: [afmc] SUBJECT.KEYID = 7
2,673,620 UART: [afmc] AUTHORITY.KEYID = 5
2,709,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,131 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,851 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,744 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,437 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,252 UART: [afmc] --
2,752,318 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,752,340 UART: [cold-reset] --
2,753,242 UART: [state] Locking Datavault
2,754,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,893 UART: [state] Locking ICCM
2,755,471 UART: [exit] Launching FMC @ 0x40000000
2,760,768 UART:
2,760,784 UART: Running Caliptra FMC ...
2,761,192 UART:
2,761,330 UART: [fmc] Received command: 0x10000003
2,770,806 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,902 >>> mbox cmd response: success
2,577,452 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,583,713 UART:
2,583,729 UART: Running Caliptra FMC ...
2,584,137 UART:
2,584,275 UART: [fmc] Received command: 0x10000003
2,593,751 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,856 UART: [kat] ++
896,008 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,919 UART: [kat] SHA2-512-ACC
906,820 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,479 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,835 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,242 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,825 >>> mbox cmd response: success
2,674,994 UART: [afmc] ++
2,675,162 UART: [afmc] CDI.KEYID = 6
2,675,525 UART: [afmc] SUBJECT.KEYID = 7
2,675,951 UART: [afmc] AUTHORITY.KEYID = 5
2,711,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,298 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,018 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,911 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,604 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,343 UART: [afmc] --
2,754,399 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,421 UART: [cold-reset] --
2,755,441 UART: [state] Locking Datavault
2,756,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,302 UART: [state] Locking ICCM
2,757,796 UART: [exit] Launching FMC @ 0x40000000
2,763,093 UART:
2,763,109 UART: Running Caliptra FMC ...
2,763,517 UART:
2,763,655 UART: [fmc] Received command: 0x10000003
2,773,131 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,607 >>> mbox cmd response: success
2,577,475 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,583,408 UART:
2,583,424 UART: Running Caliptra FMC ...
2,583,832 UART:
2,583,970 UART: [fmc] Received command: 0x10000003
2,593,446 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,181,383 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,208,060 UART: [ldev] ++
1,208,228 UART: [ldev] CDI.KEYID = 6
1,208,592 UART: [ldev] SUBJECT.KEYID = 5
1,209,019 UART: [ldev] AUTHORITY.KEYID = 7
1,209,482 UART: [ldev] FE.KEYID = 1
1,214,862 UART: [ldev] Erasing FE.KEYID = 1
1,240,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,466 UART: [ldev] --
1,279,744 UART: [fwproc] Wait for Commands...
1,280,457 UART: [fwproc] Recv command 0x46574c44
1,281,190 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,515,073 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,533,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,668,504 >>> mbox cmd response: success
2,669,557 UART: [afmc] ++
2,669,725 UART: [afmc] CDI.KEYID = 6
2,670,088 UART: [afmc] SUBJECT.KEYID = 7
2,670,514 UART: [afmc] AUTHORITY.KEYID = 5
2,705,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,722,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,723,189 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,728,909 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,802 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,740,495 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,748,260 UART: [afmc] --
2,749,364 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,749,386 UART: [cold-reset] --
2,750,154 UART: [state] Locking Datavault
2,751,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,881 UART: [state] Locking ICCM
2,752,375 UART: [exit] Launching FMC @ 0x40000000
2,757,672 UART:
2,757,688 UART: Running Caliptra FMC ...
2,758,096 UART:
2,758,234 UART: [fmc] Received command: 0x10000003
2,767,710 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,490 >>> mbox cmd response: success
2,576,026 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,581,761 UART:
2,581,777 UART: Running Caliptra FMC ...
2,582,185 UART:
2,582,323 UART: [fmc] Received command: 0x10000003
2,591,799 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,677 UART: [kat] SHA2-512-ACC
906,578 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,479 UART: [ldev] ++
1,208,647 UART: [ldev] CDI.KEYID = 6
1,209,011 UART: [ldev] SUBJECT.KEYID = 5
1,209,438 UART: [ldev] AUTHORITY.KEYID = 7
1,209,901 UART: [ldev] FE.KEYID = 1
1,215,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,472 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,091 >>> mbox cmd response: success
2,672,260 UART: [afmc] ++
2,672,428 UART: [afmc] CDI.KEYID = 6
2,672,791 UART: [afmc] SUBJECT.KEYID = 7
2,673,217 UART: [afmc] AUTHORITY.KEYID = 5
2,708,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,964 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,684 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,577 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,270 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,013 UART: [afmc] --
2,751,959 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,751,981 UART: [cold-reset] --
2,752,729 UART: [state] Locking Datavault
2,753,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,528 UART: [state] Locking ICCM
2,755,148 UART: [exit] Launching FMC @ 0x40000000
2,760,445 UART:
2,760,461 UART: Running Caliptra FMC ...
2,760,869 UART:
2,761,007 UART: [fmc] Received command: 0x10000003
2,770,483 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,935 >>> mbox cmd response: success
2,577,793 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,583,924 UART:
2,583,940 UART: Running Caliptra FMC ...
2,584,348 UART:
2,584,486 UART: [fmc] Received command: 0x10000003
2,593,962 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,448 UART:
192,831 UART: Running Caliptra ROM ...
193,972 UART:
194,124 UART: [state] CFI Enabled
263,630 UART: [state] LifecycleState = Unprovisioned
266,073 UART: [state] DebugLocked = No
267,860 UART: [state] WD Timer not started. Device not locked for debugging
271,746 UART: [kat] SHA2-256
453,668 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,193 UART: [kat] ++
465,696 UART: [kat] sha1
476,139 UART: [kat] SHA2-256
479,153 UART: [kat] SHA2-384
485,948 UART: [kat] SHA2-512-ACC
488,562 UART: [kat] ECC-384
3,780,442 UART: [kat] HMAC-384Kdf
3,802,893 UART: [kat] LMS
4,876,064 UART: [kat] --
4,878,889 UART: [cold-reset] ++
4,880,292 UART: [fht] FHT @ 0x50003400
4,890,427 UART: [idev] ++
4,891,101 UART: [idev] CDI.KEYID = 6
4,892,264 UART: [idev] SUBJECT.KEYID = 7
4,893,479 UART: [idev] UDS.KEYID = 0
4,909,375 UART: [idev] Erasing UDS.KEYID = 0
8,225,253 UART: [idev] Sha1 KeyId Algorithm
8,246,428 UART: [idev] --
8,249,364 UART: [ldev] ++
8,249,943 UART: [ldev] CDI.KEYID = 6
8,251,122 UART: [ldev] SUBJECT.KEYID = 5
8,252,277 UART: [ldev] AUTHORITY.KEYID = 7
8,253,506 UART: [ldev] FE.KEYID = 1
8,296,243 UART: [ldev] Erasing FE.KEYID = 1
11,630,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,091 UART: [ldev] --
14,016,862 UART: [fwproc] Wait for Commands...
14,019,179 UART: [fwproc] Recv command 0x46574c44
14,021,545 UART: Invalid Img size: 131073 bytes
14,025,417 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,434 UART:
192,803 UART: Running Caliptra ROM ...
194,011 UART:
603,443 UART: [state] CFI Enabled
619,493 UART: [state] LifecycleState = Unprovisioned
621,860 UART: [state] DebugLocked = No
624,630 UART: [state] WD Timer not started. Device not locked for debugging
629,903 UART: [kat] SHA2-256
811,849 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,391 UART: [kat] ++
823,888 UART: [kat] sha1
834,595 UART: [kat] SHA2-256
837,650 UART: [kat] SHA2-384
843,126 UART: [kat] SHA2-512-ACC
845,744 UART: [kat] ECC-384
4,097,429 UART: [kat] HMAC-384Kdf
4,108,313 UART: [kat] LMS
5,181,440 UART: [kat] --
5,184,596 UART: [cold-reset] ++
5,185,706 UART: [fht] FHT @ 0x50003400
5,197,380 UART: [idev] ++
5,198,068 UART: [idev] CDI.KEYID = 6
5,199,175 UART: [idev] SUBJECT.KEYID = 7
5,200,719 UART: [idev] UDS.KEYID = 0
5,216,830 UART: [idev] Erasing UDS.KEYID = 0
8,493,050 UART: [idev] Sha1 KeyId Algorithm
8,515,205 UART: [idev] --
8,518,607 UART: [ldev] ++
8,519,183 UART: [ldev] CDI.KEYID = 6
8,520,426 UART: [ldev] SUBJECT.KEYID = 5
8,521,871 UART: [ldev] AUTHORITY.KEYID = 7
8,523,444 UART: [ldev] FE.KEYID = 1
8,533,026 UART: [ldev] Erasing FE.KEYID = 1
11,825,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,844 UART: [ldev] --
14,193,319 UART: [fwproc] Wait for Commands...
14,194,816 UART: [fwproc] Recv command 0x46574c44
14,196,798 UART: Invalid Img size: 131073 bytes
14,200,985 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,199 UART:
192,615 UART: Running Caliptra ROM ...
193,815 UART:
193,965 UART: [state] CFI Enabled
263,031 UART: [state] LifecycleState = Unprovisioned
264,892 UART: [state] DebugLocked = No
267,305 UART: [state] WD Timer not started. Device not locked for debugging
271,896 UART: [kat] SHA2-256
451,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,586 UART: [kat] ++
463,121 UART: [kat] sha1
474,436 UART: [kat] SHA2-256
477,432 UART: [kat] SHA2-384
482,649 UART: [kat] SHA2-512-ACC
485,587 UART: [kat] ECC-384
2,950,039 UART: [kat] HMAC-384Kdf
2,972,438 UART: [kat] LMS
3,501,890 UART: [kat] --
3,505,553 UART: [cold-reset] ++
3,508,029 UART: [fht] FHT @ 0x50003400
3,518,254 UART: [idev] ++
3,518,815 UART: [idev] CDI.KEYID = 6
3,519,727 UART: [idev] SUBJECT.KEYID = 7
3,520,947 UART: [idev] UDS.KEYID = 0
3,543,943 UART: [idev] Erasing UDS.KEYID = 0
6,025,237 UART: [idev] Sha1 KeyId Algorithm
6,048,180 UART: [idev] --
6,052,147 UART: [ldev] ++
6,052,725 UART: [ldev] CDI.KEYID = 6
6,053,634 UART: [ldev] SUBJECT.KEYID = 5
6,054,797 UART: [ldev] AUTHORITY.KEYID = 7
6,056,038 UART: [ldev] FE.KEYID = 1
6,100,123 UART: [ldev] Erasing FE.KEYID = 1
8,607,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,274 UART: [ldev] --
10,413,675 UART: [fwproc] Wait for Commands...
10,415,611 UART: [fwproc] Recv command 0x46574c44
10,417,657 UART: Invalid Img size: 131073 bytes
10,421,254 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,465 UART:
192,838 UART: Running Caliptra ROM ...
194,014 UART:
603,418 UART: [state] CFI Enabled
615,286 UART: [state] LifecycleState = Unprovisioned
617,186 UART: [state] DebugLocked = No
619,268 UART: [state] WD Timer not started. Device not locked for debugging
622,502 UART: [kat] SHA2-256
801,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,178 UART: [kat] ++
813,628 UART: [kat] sha1
823,963 UART: [kat] SHA2-256
826,977 UART: [kat] SHA2-384
834,519 UART: [kat] SHA2-512-ACC
837,498 UART: [kat] ECC-384
3,280,282 UART: [kat] HMAC-384Kdf
3,292,139 UART: [kat] LMS
3,821,641 UART: [kat] --
3,827,489 UART: [cold-reset] ++
3,830,069 UART: [fht] FHT @ 0x50003400
3,840,510 UART: [idev] ++
3,841,080 UART: [idev] CDI.KEYID = 6
3,841,987 UART: [idev] SUBJECT.KEYID = 7
3,843,203 UART: [idev] UDS.KEYID = 0
3,859,389 UART: [idev] Erasing UDS.KEYID = 0
6,317,699 UART: [idev] Sha1 KeyId Algorithm
6,340,817 UART: [idev] --
6,346,211 UART: [ldev] ++
6,346,775 UART: [ldev] CDI.KEYID = 6
6,347,679 UART: [ldev] SUBJECT.KEYID = 5
6,348,835 UART: [ldev] AUTHORITY.KEYID = 7
6,350,119 UART: [ldev] FE.KEYID = 1
6,362,110 UART: [ldev] Erasing FE.KEYID = 1
8,836,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,239 UART: [ldev] --
10,628,860 UART: [fwproc] Wait for Commands...
10,632,037 UART: [fwproc] Recv command 0x46574c44
10,634,086 UART: Invalid Img size: 131073 bytes
10,637,820 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,214 UART:
192,599 UART: Running Caliptra ROM ...
193,825 UART:
193,978 UART: [state] CFI Enabled
265,458 UART: [state] LifecycleState = Unprovisioned
267,473 UART: [state] DebugLocked = No
269,178 UART: [state] WD Timer not started. Device not locked for debugging
272,410 UART: [kat] SHA2-256
451,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,152 UART: [kat] ++
463,685 UART: [kat] sha1
474,188 UART: [kat] SHA2-256
477,190 UART: [kat] SHA2-384
483,605 UART: [kat] SHA2-512-ACC
486,590 UART: [kat] ECC-384
2,951,144 UART: [kat] HMAC-384Kdf
2,973,400 UART: [kat] LMS
3,502,854 UART: [kat] --
3,508,326 UART: [cold-reset] ++
3,510,746 UART: [fht] FHT @ 0x50003400
3,521,841 UART: [idev] ++
3,522,412 UART: [idev] CDI.KEYID = 6
3,523,375 UART: [idev] SUBJECT.KEYID = 7
3,524,533 UART: [idev] UDS.KEYID = 0
3,545,008 UART: [idev] Erasing UDS.KEYID = 0
6,026,776 UART: [idev] Sha1 KeyId Algorithm
6,049,954 UART: [idev] --
6,054,594 UART: [ldev] ++
6,055,162 UART: [ldev] CDI.KEYID = 6
6,056,050 UART: [ldev] SUBJECT.KEYID = 5
6,057,270 UART: [ldev] AUTHORITY.KEYID = 7
6,058,502 UART: [ldev] FE.KEYID = 1
6,101,570 UART: [ldev] Erasing FE.KEYID = 1
8,608,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,750 UART: [ldev] --
10,413,514 UART: [fwproc] Wait for Commands...
10,416,537 UART: [fwproc] Recv command 0x46574c44
10,418,601 UART: Invalid Img size: 131073 bytes
10,423,173 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,526 UART:
192,974 UART: Running Caliptra ROM ...
194,139 UART:
603,813 UART: [state] CFI Enabled
618,299 UART: [state] LifecycleState = Unprovisioned
620,191 UART: [state] DebugLocked = No
622,941 UART: [state] WD Timer not started. Device not locked for debugging
626,098 UART: [kat] SHA2-256
805,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,779 UART: [kat] ++
817,229 UART: [kat] sha1
828,427 UART: [kat] SHA2-256
831,485 UART: [kat] SHA2-384
836,751 UART: [kat] SHA2-512-ACC
839,729 UART: [kat] ECC-384
3,283,629 UART: [kat] HMAC-384Kdf
3,297,436 UART: [kat] LMS
3,826,970 UART: [kat] --
3,831,448 UART: [cold-reset] ++
3,833,375 UART: [fht] FHT @ 0x50003400
3,844,242 UART: [idev] ++
3,844,810 UART: [idev] CDI.KEYID = 6
3,845,720 UART: [idev] SUBJECT.KEYID = 7
3,846,951 UART: [idev] UDS.KEYID = 0
3,861,844 UART: [idev] Erasing UDS.KEYID = 0
6,320,193 UART: [idev] Sha1 KeyId Algorithm
6,343,204 UART: [idev] --
6,345,952 UART: [ldev] ++
6,346,516 UART: [ldev] CDI.KEYID = 6
6,347,424 UART: [ldev] SUBJECT.KEYID = 5
6,348,580 UART: [ldev] AUTHORITY.KEYID = 7
6,349,865 UART: [ldev] FE.KEYID = 1
6,361,802 UART: [ldev] Erasing FE.KEYID = 1
8,834,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,692 UART: [ldev] --
10,627,584 UART: [fwproc] Wait for Commands...
10,629,232 UART: [fwproc] Recv command 0x46574c44
10,631,344 UART: Invalid Img size: 131073 bytes
10,635,105 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,162 UART: [kat] HMAC-384Kdf
919,644 UART: [kat] LMS
1,167,956 UART: [kat] --
1,168,875 UART: [cold-reset] ++
1,169,367 UART: [fht] FHT @ 0x50003400
1,171,961 UART: [idev] ++
1,172,129 UART: [idev] CDI.KEYID = 6
1,172,490 UART: [idev] SUBJECT.KEYID = 7
1,172,915 UART: [idev] UDS.KEYID = 0
1,180,483 UART: [idev] Erasing UDS.KEYID = 0
1,196,907 UART: [idev] Sha1 KeyId Algorithm
1,205,929 UART: [idev] --
1,207,012 UART: [ldev] ++
1,207,180 UART: [ldev] CDI.KEYID = 6
1,207,544 UART: [ldev] SUBJECT.KEYID = 5
1,207,971 UART: [ldev] AUTHORITY.KEYID = 7
1,208,434 UART: [ldev] FE.KEYID = 1
1,213,662 UART: [ldev] Erasing FE.KEYID = 1
1,240,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,970 UART: [ldev] --
1,279,266 UART: [fwproc] Wait for Commands...
1,279,899 UART: [fwproc] Recv command 0x46574c44
1,280,633 UART: Invalid Img size: 131073 bytes
1,281,691 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,771 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
86,072 UART: [state] WD Timer not started. Device not locked for debugging
87,195 UART: [kat] SHA2-256
890,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,874 UART: [kat] ++
895,026 UART: [kat] sha1
899,280 UART: [kat] SHA2-256
901,220 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,320 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,192 UART: [idev] ++
1,172,360 UART: [idev] CDI.KEYID = 6
1,172,721 UART: [idev] SUBJECT.KEYID = 7
1,173,146 UART: [idev] UDS.KEYID = 0
1,180,976 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,377 UART: [ldev] ++
1,208,545 UART: [ldev] CDI.KEYID = 6
1,208,909 UART: [ldev] SUBJECT.KEYID = 5
1,209,336 UART: [ldev] AUTHORITY.KEYID = 7
1,209,799 UART: [ldev] FE.KEYID = 1
1,215,317 UART: [ldev] Erasing FE.KEYID = 1
1,241,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,763 UART: [ldev] --
1,281,073 UART: [fwproc] Wait for Commands...
1,281,824 UART: [fwproc] Recv command 0x46574c44
1,282,558 UART: Invalid Img size: 131073 bytes
1,283,526 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,499 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,775 UART: [idev] --
1,208,718 UART: [ldev] ++
1,208,886 UART: [ldev] CDI.KEYID = 6
1,209,250 UART: [ldev] SUBJECT.KEYID = 5
1,209,677 UART: [ldev] AUTHORITY.KEYID = 7
1,210,140 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,316 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,733 UART: Invalid Img size: 131073 bytes
1,282,681 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
891,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,830 UART: [kat] ++
895,982 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,764 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,821 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,439 UART: [ldev] --
1,281,839 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,298 UART: Invalid Img size: 131073 bytes
1,284,506 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,581 UART: [kat] SHA2-256
901,521 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,262 UART: [kat] HMAC-384Kdf
919,948 UART: [kat] LMS
1,168,260 UART: [kat] --
1,169,011 UART: [cold-reset] ++
1,169,555 UART: [fht] FHT @ 0x50003400
1,172,047 UART: [idev] ++
1,172,215 UART: [idev] CDI.KEYID = 6
1,172,576 UART: [idev] SUBJECT.KEYID = 7
1,173,001 UART: [idev] UDS.KEYID = 0
1,181,039 UART: [idev] Erasing UDS.KEYID = 0
1,198,023 UART: [idev] Sha1 KeyId Algorithm
1,206,859 UART: [idev] --
1,207,966 UART: [ldev] ++
1,208,134 UART: [ldev] CDI.KEYID = 6
1,208,498 UART: [ldev] SUBJECT.KEYID = 5
1,208,925 UART: [ldev] AUTHORITY.KEYID = 7
1,209,388 UART: [ldev] FE.KEYID = 1
1,214,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,684 UART: [ldev] --
1,280,014 UART: [fwproc] Wait for Commands...
1,280,757 UART: [fwproc] Recv command 0x46574c44
1,281,491 UART: Invalid Img size: 131073 bytes
1,282,585 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
891,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,280 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,256 UART: [idev] ++
1,173,424 UART: [idev] CDI.KEYID = 6
1,173,785 UART: [idev] SUBJECT.KEYID = 7
1,174,210 UART: [idev] UDS.KEYID = 0
1,182,024 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,331 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,646 UART: Invalid Img size: 131073 bytes
1,283,686 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,214,208 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,349,006 UART:
2,349,419 UART: Running Caliptra ROM ...
2,350,584 UART:
2,350,777 UART: [state] CFI Enabled
2,351,771 UART: [state] LifecycleState = Unprovisioned
2,353,423 UART: [state] DebugLocked = No
2,354,528 UART: [state] WD Timer not started. Device not locked for debugging
2,356,998 UART: [kat] SHA2-256
2,357,666 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,360,688 UART: [kat] ++
2,361,138 UART: [kat] sha1
2,361,649 UART: [kat] SHA2-256
2,362,387 UART: [kat] SHA2-384
2,363,052 UART: [kat] SHA2-512-ACC
2,363,859 UART: [kat] ECC-384
3,775,031 UART: [kat] HMAC-384Kdf
3,801,711 UART: [kat] LMS
4,874,868 UART: [kat] --
4,880,573 UART: [cold-reset] ++
4,882,211 UART: [fht] FHT @ 0x50003400
4,893,958 UART: [idev] ++
4,894,631 UART: [idev] CDI.KEYID = 6
4,895,785 UART: [idev] SUBJECT.KEYID = 7
4,897,005 UART: [idev] UDS.KEYID = 0
4,928,517 UART: [idev] Erasing UDS.KEYID = 0
8,243,474 UART: [idev] Sha1 KeyId Algorithm
8,266,436 UART: [idev] --
8,270,298 UART: [ldev] ++
8,270,936 UART: [ldev] CDI.KEYID = 6
8,272,124 UART: [ldev] SUBJECT.KEYID = 5
8,273,291 UART: [ldev] AUTHORITY.KEYID = 7
8,274,442 UART: [ldev] FE.KEYID = 1
8,317,299 UART: [ldev] Erasing FE.KEYID = 1
11,650,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,171 UART: [ldev] --
14,035,215 UART: [fwproc] Wait for Commands...
14,037,747 UART: [fwproc] Recv command 0x46574c44
14,040,064 UART: [fwproc] Recv'd Img size: 106256 bytes
22,504,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,577,112 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,619,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,936,623 >>> mbox cmd response: success
22,940,534 UART: [afmc] ++
22,941,238 UART: [afmc] CDI.KEYID = 6
22,942,423 UART: [afmc] SUBJECT.KEYID = 7
22,943,578 UART: [afmc] AUTHORITY.KEYID = 5
26,317,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,616,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,617,985 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,633,965 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,650,046 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,666,070 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,687,376 UART: [afmc] --
28,691,094 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,691,460 UART: [cold-reset] --
28,694,596 UART: [state] Locking Datavault
28,700,761 UART: [state] Locking PCR0, PCR1 and PCR31
28,702,411 UART: [state] Locking ICCM
28,703,594 UART: [exit] Launching FMC @ 0x40000000
28,712,213 UART:
28,712,447 UART: Running Caliptra FMC ...
28,713,543 UART:
28,713,703 UART: [fmc] Received command: 0x10000002
28,715,612 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,211,054 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
22,454,986 >>> mbox cmd response: success
28,134,803 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,149,736 UART:
28,150,072 UART: Running Caliptra FMC ...
28,151,253 UART:
28,151,425 UART: [fmc] Received command: 0x10000002
28,153,104 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,220,056 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
2,354,846 UART:
2,355,268 UART: Running Caliptra ROM ...
2,356,426 UART:
2,356,592 UART: [state] CFI Enabled
2,357,563 UART: [state] LifecycleState = Unprovisioned
2,359,200 UART: [state] DebugLocked = No
2,360,300 UART: [state] WD Timer not started. Device not locked for debugging
2,362,764 UART: [kat] SHA2-256
2,363,445 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,366,450 UART: [kat] ++
2,366,893 UART: [kat] sha1
2,367,401 UART: [kat] SHA2-256
2,368,046 UART: [kat] SHA2-384
2,368,694 UART: [kat] SHA2-512-ACC
2,369,573 UART: [kat] ECC-384
4,099,705 UART: [kat] HMAC-384Kdf
4,111,019 UART: [kat] LMS
5,184,184 UART: [kat] --
5,187,665 UART: [cold-reset] ++
5,189,057 UART: [fht] FHT @ 0x50003400
5,199,126 UART: [idev] ++
5,199,835 UART: [idev] CDI.KEYID = 6
5,200,937 UART: [idev] SUBJECT.KEYID = 7
5,202,466 UART: [idev] UDS.KEYID = 0
5,219,728 UART: [idev] Erasing UDS.KEYID = 0
8,490,978 UART: [idev] Sha1 KeyId Algorithm
8,512,310 UART: [idev] --
8,517,003 UART: [ldev] ++
8,517,575 UART: [ldev] CDI.KEYID = 6
8,518,805 UART: [ldev] SUBJECT.KEYID = 5
8,520,224 UART: [ldev] AUTHORITY.KEYID = 7
8,521,829 UART: [ldev] FE.KEYID = 1
8,530,901 UART: [ldev] Erasing FE.KEYID = 1
11,823,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,290 UART: [ldev] --
14,188,526 UART: [fwproc] Wait for Commands...
14,191,235 UART: [fwproc] Recv command 0x46574c44
14,193,496 UART: [fwproc] Recv'd Img size: 106256 bytes
22,228,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,307,786 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,350,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,667,067 >>> mbox cmd response: success
22,670,887 UART: [afmc] ++
22,671,582 UART: [afmc] CDI.KEYID = 6
22,672,820 UART: [afmc] SUBJECT.KEYID = 7
22,673,893 UART: [afmc] AUTHORITY.KEYID = 5
25,994,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,290,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,292,027 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,308,042 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,324,079 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,340,075 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,362,945 UART: [afmc] --
28,366,490 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,366,861 UART: [cold-reset] --
28,370,639 UART: [state] Locking Datavault
28,373,822 UART: [state] Locking PCR0, PCR1 and PCR31
28,375,459 UART: [state] Locking ICCM
28,377,920 UART: [exit] Launching FMC @ 0x40000000
28,386,578 UART:
28,386,812 UART: Running Caliptra FMC ...
28,387,904 UART:
28,388,054 UART: [fmc] Received command: 0x10000002
28,389,944 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,218,420 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
22,915,556 >>> mbox cmd response: success
28,542,854 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,558,501 UART:
28,558,822 UART: Running Caliptra FMC ...
28,559,985 UART:
28,560,149 UART: [fmc] Received command: 0x10000002
28,561,927 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,217,853 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,353,036 UART:
2,353,471 UART: Running Caliptra ROM ...
2,354,638 UART:
2,354,810 UART: [state] CFI Enabled
2,355,787 UART: [state] LifecycleState = Unprovisioned
2,357,440 UART: [state] DebugLocked = No
2,358,550 UART: [state] WD Timer not started. Device not locked for debugging
2,361,035 UART: [kat] SHA2-256
2,361,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,723 UART: [kat] ++
2,365,175 UART: [kat] sha1
2,365,689 UART: [kat] SHA2-256
2,366,347 UART: [kat] SHA2-384
2,367,062 UART: [kat] SHA2-512-ACC
2,367,886 UART: [kat] ECC-384
2,949,428 UART: [kat] HMAC-384Kdf
2,971,690 UART: [kat] LMS
3,501,149 UART: [kat] --
3,504,545 UART: [cold-reset] ++
3,505,669 UART: [fht] FHT @ 0x50003400
3,516,454 UART: [idev] ++
3,517,106 UART: [idev] CDI.KEYID = 6
3,518,000 UART: [idev] SUBJECT.KEYID = 7
3,519,170 UART: [idev] UDS.KEYID = 0
3,542,877 UART: [idev] Erasing UDS.KEYID = 0
6,026,252 UART: [idev] Sha1 KeyId Algorithm
6,048,031 UART: [idev] --
6,052,794 UART: [ldev] ++
6,053,377 UART: [ldev] CDI.KEYID = 6
6,054,307 UART: [ldev] SUBJECT.KEYID = 5
6,055,474 UART: [ldev] AUTHORITY.KEYID = 7
6,056,708 UART: [ldev] FE.KEYID = 1
6,100,303 UART: [ldev] Erasing FE.KEYID = 1
8,603,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,544 UART: [ldev] --
10,413,229 UART: [fwproc] Wait for Commands...
10,416,040 UART: [fwproc] Recv command 0x46574c44
10,418,085 UART: [fwproc] Recv'd Img size: 106600 bytes
14,910,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,984,459 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,027,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,343,450 >>> mbox cmd response: success
15,347,661 UART: [afmc] ++
15,348,428 UART: [afmc] CDI.KEYID = 6
15,349,317 UART: [afmc] SUBJECT.KEYID = 7
15,350,359 UART: [afmc] AUTHORITY.KEYID = 5
17,893,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,617,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,619,686 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,635,675 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,651,648 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,667,512 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,689,612 UART: [afmc] --
19,694,090 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,694,454 UART: [cold-reset] --
19,698,450 UART: [state] Locking Datavault
19,704,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,706,183 UART: [state] Locking ICCM
19,708,335 UART: [exit] Launching FMC @ 0x40000000
19,716,731 UART:
19,716,968 UART: Running Caliptra FMC ...
19,718,071 UART:
19,718,230 UART: [fmc] Received command: 0x10000002
19,720,133 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,215,132 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,925,573 >>> mbox cmd response: success
19,194,967 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,208,086 UART:
19,208,421 UART: Running Caliptra FMC ...
19,209,599 UART:
19,209,769 UART: [fmc] Received command: 0x10000002
19,211,571 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,220,331 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,355,764 UART:
2,356,205 UART: Running Caliptra ROM ...
2,357,294 UART:
2,357,450 UART: [state] CFI Enabled
2,358,438 UART: [state] LifecycleState = Unprovisioned
2,360,088 UART: [state] DebugLocked = No
2,361,116 UART: [state] WD Timer not started. Device not locked for debugging
2,363,578 UART: [kat] SHA2-256
2,364,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,264 UART: [kat] ++
2,367,712 UART: [kat] sha1
2,368,220 UART: [kat] SHA2-256
2,368,875 UART: [kat] SHA2-384
2,369,603 UART: [kat] SHA2-512-ACC
2,370,403 UART: [kat] ECC-384
3,284,170 UART: [kat] HMAC-384Kdf
3,295,960 UART: [kat] LMS
3,825,484 UART: [kat] --
3,829,213 UART: [cold-reset] ++
3,831,412 UART: [fht] FHT @ 0x50003400
3,843,520 UART: [idev] ++
3,844,090 UART: [idev] CDI.KEYID = 6
3,844,974 UART: [idev] SUBJECT.KEYID = 7
3,846,184 UART: [idev] UDS.KEYID = 0
3,864,220 UART: [idev] Erasing UDS.KEYID = 0
6,317,300 UART: [idev] Sha1 KeyId Algorithm
6,340,323 UART: [idev] --
6,342,890 UART: [ldev] ++
6,343,463 UART: [ldev] CDI.KEYID = 6
6,344,343 UART: [ldev] SUBJECT.KEYID = 5
6,345,475 UART: [ldev] AUTHORITY.KEYID = 7
6,346,810 UART: [ldev] FE.KEYID = 1
6,358,395 UART: [ldev] Erasing FE.KEYID = 1
8,830,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,407 UART: [ldev] --
10,622,432 UART: [fwproc] Wait for Commands...
10,624,146 UART: [fwproc] Recv command 0x46574c44
10,626,257 UART: [fwproc] Recv'd Img size: 106600 bytes
15,097,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,172,966 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,215,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,532,056 >>> mbox cmd response: success
15,535,863 UART: [afmc] ++
15,536,482 UART: [afmc] CDI.KEYID = 6
15,537,365 UART: [afmc] SUBJECT.KEYID = 7
15,538,468 UART: [afmc] AUTHORITY.KEYID = 5
18,036,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,755,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,757,329 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,773,276 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,789,260 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,805,094 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,826,308 UART: [afmc] --
19,830,902 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,831,278 UART: [cold-reset] --
19,834,901 UART: [state] Locking Datavault
19,841,169 UART: [state] Locking PCR0, PCR1 and PCR31
19,842,864 UART: [state] Locking ICCM
19,844,470 UART: [exit] Launching FMC @ 0x40000000
19,852,867 UART:
19,853,101 UART: Running Caliptra FMC ...
19,854,199 UART:
19,854,352 UART: [fmc] Received command: 0x10000002
19,856,241 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,223,682 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,133,703 >>> mbox cmd response: success
19,373,044 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,389,659 UART:
19,389,985 UART: Running Caliptra FMC ...
19,391,161 UART:
19,391,328 UART: [fmc] Received command: 0x10000002
19,393,111 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,215,531 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,350,835 UART:
2,351,277 UART: Running Caliptra ROM ...
2,352,449 UART:
2,352,627 UART: [state] CFI Enabled
2,353,610 UART: [state] LifecycleState = Unprovisioned
2,355,259 UART: [state] DebugLocked = No
2,356,373 UART: [state] WD Timer not started. Device not locked for debugging
2,358,848 UART: [kat] SHA2-256
2,359,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,524 UART: [kat] ++
2,362,978 UART: [kat] sha1
2,363,491 UART: [kat] SHA2-256
2,364,151 UART: [kat] SHA2-384
2,364,805 UART: [kat] SHA2-512-ACC
2,365,687 UART: [kat] ECC-384
2,948,038 UART: [kat] HMAC-384Kdf
2,970,728 UART: [kat] LMS
3,500,218 UART: [kat] --
3,504,834 UART: [cold-reset] ++
3,507,097 UART: [fht] FHT @ 0x50003400
3,517,812 UART: [idev] ++
3,518,377 UART: [idev] CDI.KEYID = 6
3,519,282 UART: [idev] SUBJECT.KEYID = 7
3,520,498 UART: [idev] UDS.KEYID = 0
3,543,419 UART: [idev] Erasing UDS.KEYID = 0
6,025,310 UART: [idev] Sha1 KeyId Algorithm
6,048,320 UART: [idev] --
6,052,101 UART: [ldev] ++
6,052,672 UART: [ldev] CDI.KEYID = 6
6,053,610 UART: [ldev] SUBJECT.KEYID = 5
6,054,793 UART: [ldev] AUTHORITY.KEYID = 7
6,056,033 UART: [ldev] FE.KEYID = 1
6,099,391 UART: [ldev] Erasing FE.KEYID = 1
8,605,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,774 UART: [ldev] --
10,410,561 UART: [fwproc] Wait for Commands...
10,413,145 UART: [fwproc] Recv command 0x46574c44
10,415,243 UART: [fwproc] Recv'd Img size: 106600 bytes
14,890,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,969,146 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,011,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,327,963 >>> mbox cmd response: success
15,332,773 UART: [afmc] ++
15,333,366 UART: [afmc] CDI.KEYID = 6
15,334,271 UART: [afmc] SUBJECT.KEYID = 7
15,335,488 UART: [afmc] AUTHORITY.KEYID = 5
17,868,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,596,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,597,923 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,613,918 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,629,892 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,645,753 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,668,192 UART: [afmc] --
19,671,588 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,671,968 UART: [cold-reset] --
19,675,758 UART: [state] Locking Datavault
19,680,298 UART: [state] Locking PCR0, PCR1 and PCR31
19,681,944 UART: [state] Locking ICCM
19,683,412 UART: [exit] Launching FMC @ 0x40000000
19,691,814 UART:
19,692,058 UART: Running Caliptra FMC ...
19,693,163 UART:
19,693,320 UART: [fmc] Received command: 0x10000002
19,695,166 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,224,462 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,840,757 >>> mbox cmd response: success
19,102,907 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,117,872 UART:
19,118,222 UART: Running Caliptra FMC ...
19,119,425 UART:
19,119,588 UART: [fmc] Received command: 0x10000002
19,121,323 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,221,342 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,356,344 UART:
2,356,773 UART: Running Caliptra ROM ...
2,357,950 UART:
2,358,122 UART: [state] CFI Enabled
2,359,099 UART: [state] LifecycleState = Unprovisioned
2,360,744 UART: [state] DebugLocked = No
2,361,851 UART: [state] WD Timer not started. Device not locked for debugging
2,364,668 UART: [kat] SHA2-256
2,365,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,362 UART: [kat] ++
2,368,813 UART: [kat] sha1
2,369,326 UART: [kat] SHA2-256
2,370,060 UART: [kat] SHA2-384
2,370,727 UART: [kat] SHA2-512-ACC
2,371,548 UART: [kat] ECC-384
3,282,513 UART: [kat] HMAC-384Kdf
3,296,587 UART: [kat] LMS
3,826,107 UART: [kat] --
3,831,333 UART: [cold-reset] ++
3,832,784 UART: [fht] FHT @ 0x50003400
3,843,811 UART: [idev] ++
3,844,370 UART: [idev] CDI.KEYID = 6
3,845,341 UART: [idev] SUBJECT.KEYID = 7
3,846,550 UART: [idev] UDS.KEYID = 0
3,862,413 UART: [idev] Erasing UDS.KEYID = 0
6,316,846 UART: [idev] Sha1 KeyId Algorithm
6,340,564 UART: [idev] --
6,344,774 UART: [ldev] ++
6,345,338 UART: [ldev] CDI.KEYID = 6
6,346,243 UART: [ldev] SUBJECT.KEYID = 5
6,347,474 UART: [ldev] AUTHORITY.KEYID = 7
6,348,700 UART: [ldev] FE.KEYID = 1
6,359,556 UART: [ldev] Erasing FE.KEYID = 1
8,833,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,351 UART: [ldev] --
10,626,216 UART: [fwproc] Wait for Commands...
10,628,967 UART: [fwproc] Recv command 0x46574c44
10,631,063 UART: [fwproc] Recv'd Img size: 106600 bytes
15,118,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,197,784 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,240,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,557,915 >>> mbox cmd response: success
15,562,896 UART: [afmc] ++
15,563,485 UART: [afmc] CDI.KEYID = 6
15,564,571 UART: [afmc] SUBJECT.KEYID = 7
15,565,690 UART: [afmc] AUTHORITY.KEYID = 5
18,066,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,785,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,787,808 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,803,957 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,819,755 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,835,593 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,858,398 UART: [afmc] --
19,862,259 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,862,628 UART: [cold-reset] --
19,867,324 UART: [state] Locking Datavault
19,872,510 UART: [state] Locking PCR0, PCR1 and PCR31
19,874,156 UART: [state] Locking ICCM
19,876,619 UART: [exit] Launching FMC @ 0x40000000
19,885,013 UART:
19,885,289 UART: Running Caliptra FMC ...
19,886,318 UART:
19,886,461 UART: [fmc] Received command: 0x10000002
* TESTCASE PASSED
19,888,544 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,219,640 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,099,815 >>> mbox cmd response: success
19,335,615 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,352,521 UART:
19,352,889 UART: Running Caliptra FMC ...
19,354,001 UART:
19,354,158 UART: [fmc] Received command: 0x10000002
19,355,980 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,208,694 UART: [ldev] ++
1,208,862 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,653 UART: [ldev] AUTHORITY.KEYID = 7
1,210,116 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,758 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 106600 bytes
3,034,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,974 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,080,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,215,435 >>> mbox cmd response: success
3,216,702 UART: [afmc] ++
3,216,870 UART: [afmc] CDI.KEYID = 6
3,217,233 UART: [afmc] SUBJECT.KEYID = 7
3,217,659 UART: [afmc] AUTHORITY.KEYID = 5
3,252,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,269,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,269,990 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,275,667 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,560 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,287,270 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,294,888 UART: [afmc] --
3,295,964 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,295,986 UART: [cold-reset] --
3,296,790 UART: [state] Locking Datavault
3,298,101 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,705 UART: [state] Locking ICCM
3,299,339 UART: [exit] Launching FMC @ 0x40000000
3,304,636 UART:
3,304,652 UART: Running Caliptra FMC ...
3,305,060 UART:
3,305,198 UART: [fmc] Received command: 0x10000002
3,306,942 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,060,873 >>> mbox cmd response: success
3,116,587 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,122,518 UART:
3,122,534 UART: Running Caliptra FMC ...
3,122,942 UART:
3,123,080 UART: [fmc] Received command: 0x10000002
3,124,824 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,244 UART: [fht] FHT @ 0x50003400
1,172,888 UART: [idev] ++
1,173,056 UART: [idev] CDI.KEYID = 6
1,173,417 UART: [idev] SUBJECT.KEYID = 7
1,173,842 UART: [idev] UDS.KEYID = 0
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,588 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,149 UART: [ldev] Erasing FE.KEYID = 1
1,242,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 106600 bytes
3,033,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,216 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,079,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,214,871 >>> mbox cmd response: success
3,215,966 UART: [afmc] ++
3,216,134 UART: [afmc] CDI.KEYID = 6
3,216,497 UART: [afmc] SUBJECT.KEYID = 7
3,216,923 UART: [afmc] AUTHORITY.KEYID = 5
3,252,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,269,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,270,362 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,276,039 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,932 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,287,642 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,295,416 UART: [afmc] --
3,296,320 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,296,342 UART: [cold-reset] --
3,297,054 UART: [state] Locking Datavault
3,298,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,807 UART: [state] Locking ICCM
3,299,345 UART: [exit] Launching FMC @ 0x40000000
3,304,642 UART:
3,304,658 UART: Running Caliptra FMC ...
3,305,066 UART:
3,305,204 UART: [fmc] Received command: 0x10000002
3,306,948 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,067,278 >>> mbox cmd response: success
3,123,648 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,129,677 UART:
3,129,693 UART: Running Caliptra FMC ...
3,130,101 UART:
3,130,239 UART: [fmc] Received command: 0x10000002
3,131,983 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,182,589 UART: [idev] Erasing UDS.KEYID = 0
1,199,793 UART: [idev] Sha1 KeyId Algorithm
1,208,733 UART: [idev] --
1,209,780 UART: [ldev] ++
1,209,948 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,739 UART: [ldev] AUTHORITY.KEYID = 7
1,211,202 UART: [ldev] FE.KEYID = 1
1,216,334 UART: [ldev] Erasing FE.KEYID = 1
1,242,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,630 UART: [ldev] --
1,281,908 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 106600 bytes
3,039,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,068,208 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,086,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,221,757 >>> mbox cmd response: success
3,223,020 UART: [afmc] ++
3,223,188 UART: [afmc] CDI.KEYID = 6
3,223,551 UART: [afmc] SUBJECT.KEYID = 7
3,223,977 UART: [afmc] AUTHORITY.KEYID = 5
3,258,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,275,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,275,780 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,281,457 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,287,350 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,293,060 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,300,708 UART: [afmc] --
3,301,812 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,301,834 UART: [cold-reset] --
3,302,450 UART: [state] Locking Datavault
3,303,631 UART: [state] Locking PCR0, PCR1 and PCR31
3,304,235 UART: [state] Locking ICCM
3,304,867 UART: [exit] Launching FMC @ 0x40000000
3,310,164 UART:
3,310,180 UART: Running Caliptra FMC ...
3,310,588 UART:
3,310,726 UART: [fmc] Received command: 0x10000002
3,312,470 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,065,629 >>> mbox cmd response: success
3,121,071 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,127,012 UART:
3,127,028 UART: Running Caliptra FMC ...
3,127,436 UART:
3,127,574 UART: [fmc] Received command: 0x10000002
3,129,318 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,673 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,508 UART: [idev] Sha1 KeyId Algorithm
1,208,244 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,023 UART: [ldev] --
1,282,477 UART: [fwproc] Wait for Commands...
1,283,292 UART: [fwproc] Recv command 0x46574c44
1,284,025 UART: [fwproc] Recv'd Img size: 106600 bytes
3,048,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,075,872 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,093,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,229,299 >>> mbox cmd response: success
3,230,448 UART: [afmc] ++
3,230,616 UART: [afmc] CDI.KEYID = 6
3,230,979 UART: [afmc] SUBJECT.KEYID = 7
3,231,405 UART: [afmc] AUTHORITY.KEYID = 5
3,266,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,283,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,284,034 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,289,711 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,295,604 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,301,314 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,308,998 UART: [afmc] --
3,309,962 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,309,984 UART: [cold-reset] --
3,310,942 UART: [state] Locking Datavault
3,312,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,312,877 UART: [state] Locking ICCM
3,313,411 UART: [exit] Launching FMC @ 0x40000000
3,318,708 UART:
3,318,724 UART: Running Caliptra FMC ...
3,319,132 UART:
3,319,270 UART: [fmc] Received command: 0x10000002
3,321,014 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,060,174 >>> mbox cmd response: success
3,116,198 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,122,789 UART:
3,122,805 UART: Running Caliptra FMC ...
3,123,213 UART:
3,123,351 UART: [fmc] Received command: 0x10000002
3,125,095 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
917,124 UART: [kat] HMAC-384Kdf
921,526 UART: [kat] LMS
1,169,838 UART: [kat] --
1,170,813 UART: [cold-reset] ++
1,171,155 UART: [fht] FHT @ 0x50003400
1,173,899 UART: [idev] ++
1,174,067 UART: [idev] CDI.KEYID = 6
1,174,428 UART: [idev] SUBJECT.KEYID = 7
1,174,853 UART: [idev] UDS.KEYID = 0
1,183,221 UART: [idev] Erasing UDS.KEYID = 0
1,200,313 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,186 UART: [ldev] ++
1,210,354 UART: [ldev] CDI.KEYID = 6
1,210,718 UART: [ldev] SUBJECT.KEYID = 5
1,211,145 UART: [ldev] AUTHORITY.KEYID = 7
1,211,608 UART: [ldev] FE.KEYID = 1
1,216,846 UART: [ldev] Erasing FE.KEYID = 1
1,243,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,076 UART: [ldev] --
1,282,540 UART: [fwproc] Wait for Commands...
1,283,185 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 106600 bytes
3,033,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,243 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,079,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,214,882 >>> mbox cmd response: success
3,216,129 UART: [afmc] ++
3,216,297 UART: [afmc] CDI.KEYID = 6
3,216,660 UART: [afmc] SUBJECT.KEYID = 7
3,217,086 UART: [afmc] AUTHORITY.KEYID = 5
3,252,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,269,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,269,767 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,275,444 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,337 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,287,047 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,295,001 UART: [afmc] --
3,295,959 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,295,981 UART: [cold-reset] --
3,296,891 UART: [state] Locking Datavault
3,298,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,746 UART: [state] Locking ICCM
3,299,252 UART: [exit] Launching FMC @ 0x40000000
3,304,549 UART:
3,304,565 UART: Running Caliptra FMC ...
3,304,973 UART:
3,305,111 UART: [fmc] Received command: 0x10000002
3,306,855 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,075,658 >>> mbox cmd response: success
3,130,850 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,137,079 UART:
3,137,095 UART: Running Caliptra FMC ...
3,137,503 UART:
3,137,641 UART: [fmc] Received command: 0x10000002
3,139,385 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,639 UART: [ldev] --
1,282,027 UART: [fwproc] Wait for Commands...
1,282,678 UART: [fwproc] Recv command 0x46574c44
1,283,411 UART: [fwproc] Recv'd Img size: 106600 bytes
3,032,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,518 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,079,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,214,955 >>> mbox cmd response: success
3,216,048 UART: [afmc] ++
3,216,216 UART: [afmc] CDI.KEYID = 6
3,216,579 UART: [afmc] SUBJECT.KEYID = 7
3,217,005 UART: [afmc] AUTHORITY.KEYID = 5
3,252,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,268,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,269,674 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,275,351 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,244 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,286,954 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,294,806 UART: [afmc] --
3,295,890 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,295,912 UART: [cold-reset] --
3,296,770 UART: [state] Locking Datavault
3,297,871 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,475 UART: [state] Locking ICCM
3,299,033 UART: [exit] Launching FMC @ 0x40000000
3,304,330 UART:
3,304,346 UART: Running Caliptra FMC ...
3,304,754 UART:
3,304,892 UART: [fmc] Received command: 0x10000002
3,306,636 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,064,057 >>> mbox cmd response: success
3,121,113 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,126,858 UART:
3,126,874 UART: Running Caliptra FMC ...
3,127,282 UART:
3,127,420 UART: [fmc] Received command: 0x10000002
3,129,164 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,060,759 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,201,740 UART:
2,202,164 UART: Running Caliptra ROM ...
2,203,337 UART:
2,203,513 UART: [state] CFI Enabled
2,204,478 UART: [state] LifecycleState = Unprovisioned
2,206,153 UART: [state] DebugLocked = No
2,207,264 UART: [state] WD Timer not started. Device not locked for debugging
2,209,731 UART: [kat] SHA2-256
2,210,402 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,413 UART: [kat] ++
2,213,865 UART: [kat] sha1
2,214,386 UART: [kat] SHA2-256
2,215,045 UART: [kat] SHA2-384
2,215,705 UART: [kat] SHA2-512-ACC
2,216,510 UART: [kat] ECC-384
3,775,819 UART: [kat] HMAC-384Kdf
3,804,550 UART: [kat] LMS
4,877,710 UART: [kat] --
4,882,656 UART: [cold-reset] ++
4,883,787 UART: [fht] FHT @ 0x50003400
4,896,179 UART: [idev] ++
4,896,879 UART: [idev] CDI.KEYID = 6
4,898,068 UART: [idev] SUBJECT.KEYID = 7
4,899,236 UART: [idev] UDS.KEYID = 0
4,931,234 UART: [idev] Erasing UDS.KEYID = 0
8,245,409 UART: [idev] Sha1 KeyId Algorithm
8,268,586 UART: [idev] --
8,272,373 UART: [ldev] ++
8,273,521 UART: [ldev] CDI.KEYID = 6
8,274,421 UART: [ldev] SUBJECT.KEYID = 5
8,275,530 UART: [ldev] AUTHORITY.KEYID = 7
8,276,706 UART: [ldev] FE.KEYID = 1
8,320,240 UART: [ldev] Erasing FE.KEYID = 1
11,653,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,920 UART: [ldev] --
14,040,687 UART: [fwproc] Wait for Commands...
14,043,887 UART: [fwproc] Recv command 0x46574c44
14,046,208 UART: [fwproc] Recv'd Img size: 111324 bytes
22,634,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,714,585 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,774,812 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
23,090,294 >>> mbox cmd response: success
23,094,839 UART: [afmc] ++
23,095,541 UART: [afmc] CDI.KEYID = 6
23,096,682 UART: [afmc] SUBJECT.KEYID = 7
23,097,908 UART: [afmc] AUTHORITY.KEYID = 5
26,467,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,765,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,767,663 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,783,877 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,799,838 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,815,738 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,838,428 UART: [afmc] --
28,841,903 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,842,291 UART: [cold-reset] --
28,845,484 UART: [state] Locking Datavault
28,852,743 UART: [state] Locking PCR0, PCR1 and PCR31
28,854,487 UART: [state] Locking ICCM
28,857,004 UART: [exit] Launching FMC @ 0x40000000
28,865,630 UART:
28,865,874 UART: Running Caliptra FMC ...
28,866,909 UART:
28,867,055 UART: [fmc] Received command: 0x10000000
28,869,570 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,062,489 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,205,009 >>> mbox cmd response: success
27,885,661 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
27,900,162 UART:
27,900,505 UART: Running Caliptra FMC ...
27,901,674 UART:
27,901,841 UART: [fmc] Received command: 0x10000000
27,904,112 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
2,072,685 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,213,715 UART:
2,214,132 UART: Running Caliptra ROM ...
2,215,296 UART:
2,215,466 UART: [state] CFI Enabled
2,216,432 UART: [state] LifecycleState = Unprovisioned
2,218,086 UART: [state] DebugLocked = No
2,219,186 UART: [state] WD Timer not started. Device not locked for debugging
2,221,651 UART: [kat] SHA2-256
2,222,315 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,225,314 UART: [kat] ++
2,225,763 UART: [kat] sha1
2,226,299 UART: [kat] SHA2-256
2,226,977 UART: [kat] SHA2-384
2,227,634 UART: [kat] SHA2-512-ACC
2,228,512 UART: [kat] ECC-384
4,100,648 UART: [kat] HMAC-384Kdf
4,112,804 UART: [kat] LMS
5,185,978 UART: [kat] --
5,190,763 UART: [cold-reset] ++
5,192,701 UART: [fht] FHT @ 0x50003400
5,204,364 UART: [idev] ++
5,205,076 UART: [idev] CDI.KEYID = 6
5,206,267 UART: [idev] SUBJECT.KEYID = 7
5,207,700 UART: [idev] UDS.KEYID = 0
5,222,401 UART: [idev] Erasing UDS.KEYID = 0
8,497,129 UART: [idev] Sha1 KeyId Algorithm
8,519,008 UART: [idev] --
8,522,633 UART: [ldev] ++
8,523,219 UART: [ldev] CDI.KEYID = 6
8,524,392 UART: [ldev] SUBJECT.KEYID = 5
8,525,871 UART: [ldev] AUTHORITY.KEYID = 7
8,527,417 UART: [ldev] FE.KEYID = 1
8,537,839 UART: [ldev] Erasing FE.KEYID = 1
11,830,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,861 UART: [ldev] --
14,194,794 UART: [fwproc] Wait for Commands...
14,197,214 UART: [fwproc] Recv command 0x46574c44
14,199,531 UART: [fwproc] Recv'd Img size: 111324 bytes
22,503,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,583,805 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,644,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,961,095 >>> mbox cmd response: success
22,965,386 UART: [afmc] ++
22,966,105 UART: [afmc] CDI.KEYID = 6
22,967,295 UART: [afmc] SUBJECT.KEYID = 7
22,968,453 UART: [afmc] AUTHORITY.KEYID = 5
26,289,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,584,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,586,021 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,602,180 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,618,175 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,634,112 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,656,557 UART: [afmc] --
28,660,168 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,660,539 UART: [cold-reset] --
28,663,940 UART: [state] Locking Datavault
28,671,142 UART: [state] Locking PCR0, PCR1 and PCR31
28,672,787 UART: [state] Locking ICCM
28,675,690 UART: [exit] Launching FMC @ 0x40000000
28,684,291 UART:
28,684,517 UART: Running Caliptra FMC ...
28,685,609 UART:
28,685,762 UART: [fmc] Received command: 0x10000000
28,688,242 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,075,884 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,648,278 >>> mbox cmd response: success
28,271,897 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,287,320 UART:
28,287,653 UART: Running Caliptra FMC ...
28,288,805 UART:
28,288,969 UART: [fmc] Received command: 0x10000000
28,291,240 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,061,849 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,203,169 UART:
2,203,591 UART: Running Caliptra ROM ...
2,204,771 UART:
2,204,942 UART: [state] CFI Enabled
2,205,913 UART: [state] LifecycleState = Unprovisioned
2,207,562 UART: [state] DebugLocked = No
2,208,670 UART: [state] WD Timer not started. Device not locked for debugging
2,211,171 UART: [kat] SHA2-256
2,211,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,864 UART: [kat] ++
2,215,320 UART: [kat] sha1
2,215,834 UART: [kat] SHA2-256
2,216,573 UART: [kat] SHA2-384
2,217,238 UART: [kat] SHA2-512-ACC
2,218,041 UART: [kat] ECC-384
2,948,404 UART: [kat] HMAC-384Kdf
2,971,053 UART: [kat] LMS
3,500,515 UART: [kat] --
3,504,535 UART: [cold-reset] ++
3,507,057 UART: [fht] FHT @ 0x50003400
3,518,039 UART: [idev] ++
3,518,616 UART: [idev] CDI.KEYID = 6
3,519,632 UART: [idev] SUBJECT.KEYID = 7
3,520,754 UART: [idev] UDS.KEYID = 0
3,542,463 UART: [idev] Erasing UDS.KEYID = 0
6,027,248 UART: [idev] Sha1 KeyId Algorithm
6,051,334 UART: [idev] --
6,055,410 UART: [ldev] ++
6,055,989 UART: [ldev] CDI.KEYID = 6
6,056,918 UART: [ldev] SUBJECT.KEYID = 5
6,058,085 UART: [ldev] AUTHORITY.KEYID = 7
6,059,326 UART: [ldev] FE.KEYID = 1
6,098,766 UART: [ldev] Erasing FE.KEYID = 1
8,605,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,846 UART: [ldev] --
10,410,103 UART: [fwproc] Wait for Commands...
10,411,886 UART: [fwproc] Recv command 0x46574c44
10,413,983 UART: [fwproc] Recv'd Img size: 111668 bytes
14,939,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,012,193 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,072,481 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,390,448 >>> mbox cmd response: success
15,395,122 UART: [afmc] ++
15,395,733 UART: [afmc] CDI.KEYID = 6
15,396,623 UART: [afmc] SUBJECT.KEYID = 7
15,397,841 UART: [afmc] AUTHORITY.KEYID = 5
17,937,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,674,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,676,439 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,692,420 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,708,344 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,724,190 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,746,741 UART: [afmc] --
19,750,560 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,750,930 UART: [cold-reset] --
19,754,119 UART: [state] Locking Datavault
19,762,330 UART: [state] Locking PCR0, PCR1 and PCR31
19,764,029 UART: [state] Locking ICCM
19,764,992 UART: [exit] Launching FMC @ 0x40000000
19,773,392 UART:
19,773,625 UART: Running Caliptra FMC ...
19,774,727 UART:
19,774,882 UART: [fmc] Received command: 0x10000000
19,777,317 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,062,020 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,033,917 >>> mbox cmd response: success
19,309,077 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,323,422 UART:
19,323,756 UART: Running Caliptra FMC ...
19,324,942 UART:
19,325,107 UART: [fmc] Received command: 0x10000000
19,327,436 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,062,946 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,204,361 UART:
2,204,801 UART: Running Caliptra ROM ...
2,205,885 UART:
2,206,045 UART: [state] CFI Enabled
2,207,038 UART: [state] LifecycleState = Unprovisioned
2,208,689 UART: [state] DebugLocked = No
2,209,716 UART: [state] WD Timer not started. Device not locked for debugging
2,212,182 UART: [kat] SHA2-256
2,212,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,874 UART: [kat] ++
2,216,317 UART: [kat] sha1
2,216,826 UART: [kat] SHA2-256
2,217,480 UART: [kat] SHA2-384
2,218,131 UART: [kat] SHA2-512-ACC
2,218,970 UART: [kat] ECC-384
3,286,046 UART: [kat] HMAC-384Kdf
3,300,358 UART: [kat] LMS
3,829,841 UART: [kat] --
3,834,637 UART: [cold-reset] ++
3,837,267 UART: [fht] FHT @ 0x50003400
3,849,534 UART: [idev] ++
3,850,134 UART: [idev] CDI.KEYID = 6
3,851,017 UART: [idev] SUBJECT.KEYID = 7
3,852,234 UART: [idev] UDS.KEYID = 0
3,865,806 UART: [idev] Erasing UDS.KEYID = 0
6,323,304 UART: [idev] Sha1 KeyId Algorithm
6,346,729 UART: [idev] --
6,349,557 UART: [ldev] ++
6,350,130 UART: [ldev] CDI.KEYID = 6
6,351,061 UART: [ldev] SUBJECT.KEYID = 5
6,352,164 UART: [ldev] AUTHORITY.KEYID = 7
6,353,498 UART: [ldev] FE.KEYID = 1
6,366,572 UART: [ldev] Erasing FE.KEYID = 1
8,840,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,201 UART: [ldev] --
10,629,217 UART: [fwproc] Wait for Commands...
10,631,208 UART: [fwproc] Recv command 0x46574c44
10,633,316 UART: [fwproc] Recv'd Img size: 111668 bytes
15,188,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,265,411 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,325,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,643,568 >>> mbox cmd response: success
15,646,970 UART: [afmc] ++
15,647,559 UART: [afmc] CDI.KEYID = 6
15,648,470 UART: [afmc] SUBJECT.KEYID = 7
15,649,683 UART: [afmc] AUTHORITY.KEYID = 5
18,145,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,866,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,868,310 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,884,321 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,900,203 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,916,034 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,937,517 UART: [afmc] --
19,942,171 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,942,547 UART: [cold-reset] --
19,945,089 UART: [state] Locking Datavault
19,949,954 UART: [state] Locking PCR0, PCR1 and PCR31
19,951,594 UART: [state] Locking ICCM
19,953,467 UART: [exit] Launching FMC @ 0x40000000
19,961,912 UART:
19,962,143 UART: Running Caliptra FMC ...
19,963,242 UART:
19,963,402 UART: [fmc] Received command: 0x10000000
19,965,833 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,066,774 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,232,510 >>> mbox cmd response: success
19,466,982 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,483,126 UART:
19,483,491 UART: Running Caliptra FMC ...
19,484,679 UART:
19,484,849 UART: [fmc] Received command: 0x10000000
19,487,167 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,062,855 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,204,270 UART:
2,204,720 UART: Running Caliptra ROM ...
2,205,809 UART:
2,205,959 UART: [state] CFI Enabled
2,206,942 UART: [state] LifecycleState = Unprovisioned
2,208,592 UART: [state] DebugLocked = No
2,209,618 UART: [state] WD Timer not started. Device not locked for debugging
2,212,084 UART: [kat] SHA2-256
2,212,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,760 UART: [kat] ++
2,216,206 UART: [kat] sha1
2,216,716 UART: [kat] SHA2-256
2,217,370 UART: [kat] SHA2-384
2,218,026 UART: [kat] SHA2-512-ACC
2,218,830 UART: [kat] ECC-384
2,948,306 UART: [kat] HMAC-384Kdf
2,970,050 UART: [kat] LMS
3,499,485 UART: [kat] --
3,503,046 UART: [cold-reset] ++
3,505,517 UART: [fht] FHT @ 0x50003400
3,517,091 UART: [idev] ++
3,517,670 UART: [idev] CDI.KEYID = 6
3,518,593 UART: [idev] SUBJECT.KEYID = 7
3,519,752 UART: [idev] UDS.KEYID = 0
3,541,778 UART: [idev] Erasing UDS.KEYID = 0
6,024,520 UART: [idev] Sha1 KeyId Algorithm
6,048,337 UART: [idev] --
6,051,147 UART: [ldev] ++
6,051,723 UART: [ldev] CDI.KEYID = 6
6,052,611 UART: [ldev] SUBJECT.KEYID = 5
6,053,691 UART: [ldev] AUTHORITY.KEYID = 7
6,055,058 UART: [ldev] FE.KEYID = 1
6,097,954 UART: [ldev] Erasing FE.KEYID = 1
8,599,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,798 UART: [ldev] --
10,389,118 UART: [fwproc] Wait for Commands...
10,391,968 UART: [fwproc] Recv command 0x46574c44
10,394,057 UART: [fwproc] Recv'd Img size: 111668 bytes
14,930,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,004,076 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,064,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,381,217 >>> mbox cmd response: success
15,386,179 UART: [afmc] ++
15,386,792 UART: [afmc] CDI.KEYID = 6
15,387,708 UART: [afmc] SUBJECT.KEYID = 7
15,388,871 UART: [afmc] AUTHORITY.KEYID = 5
17,912,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,637,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,638,978 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,654,971 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,670,879 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,686,706 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,708,876 UART: [afmc] --
19,713,068 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,713,437 UART: [cold-reset] --
19,717,654 UART: [state] Locking Datavault
19,723,655 UART: [state] Locking PCR0, PCR1 and PCR31
19,725,308 UART: [state] Locking ICCM
19,727,515 UART: [exit] Launching FMC @ 0x40000000
19,735,941 UART:
19,736,218 UART: Running Caliptra FMC ...
19,737,331 UART:
19,737,490 UART: [fmc] Received command: 0x10000000
19,739,842 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,063,763 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,993,826 >>> mbox cmd response: success
19,267,130 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,282,616 UART:
19,282,946 UART: Running Caliptra FMC ...
19,284,114 UART:
19,284,296 UART: [fmc] Received command: 0x10000000
19,286,615 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,065,222 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,206,623 UART:
2,207,035 UART: Running Caliptra ROM ...
2,208,118 UART:
2,208,271 UART: [state] CFI Enabled
2,209,192 UART: [state] LifecycleState = Unprovisioned
2,210,839 UART: [state] DebugLocked = No
2,211,861 UART: [state] WD Timer not started. Device not locked for debugging
2,214,326 UART: [kat] SHA2-256
2,214,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,007 UART: [kat] ++
2,218,463 UART: [kat] sha1
2,218,974 UART: [kat] SHA2-256
2,219,715 UART: [kat] SHA2-384
2,220,382 UART: [kat] SHA2-512-ACC
2,221,227 UART: [kat] ECC-384
3,284,492 UART: [kat] HMAC-384Kdf
3,297,627 UART: [kat] LMS
3,827,155 UART: [kat] --
3,829,548 UART: [cold-reset] ++
3,830,400 UART: [fht] FHT @ 0x50003400
3,840,489 UART: [idev] ++
3,841,042 UART: [idev] CDI.KEYID = 6
3,841,974 UART: [idev] SUBJECT.KEYID = 7
3,843,184 UART: [idev] UDS.KEYID = 0
3,860,928 UART: [idev] Erasing UDS.KEYID = 0
6,323,970 UART: [idev] Sha1 KeyId Algorithm
6,346,818 UART: [idev] --
6,350,696 UART: [ldev] ++
6,351,269 UART: [ldev] CDI.KEYID = 6
6,352,174 UART: [ldev] SUBJECT.KEYID = 5
6,353,347 UART: [ldev] AUTHORITY.KEYID = 7
6,354,579 UART: [ldev] FE.KEYID = 1
6,364,194 UART: [ldev] Erasing FE.KEYID = 1
8,838,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,901 UART: [ldev] --
10,630,325 UART: [fwproc] Wait for Commands...
10,633,554 UART: [fwproc] Recv command 0x46574c44
10,635,648 UART: [fwproc] Recv'd Img size: 111668 bytes
15,180,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,260,792 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,321,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,637,566 >>> mbox cmd response: success
15,641,985 UART: [afmc] ++
15,642,576 UART: [afmc] CDI.KEYID = 6
15,643,485 UART: [afmc] SUBJECT.KEYID = 7
15,644,641 UART: [afmc] AUTHORITY.KEYID = 5
18,143,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,862,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,864,041 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,880,051 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,895,940 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,911,709 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,934,923 UART: [afmc] --
19,938,153 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,938,528 UART: [cold-reset] --
19,942,848 UART: [state] Locking Datavault
19,947,333 UART: [state] Locking PCR0, PCR1 and PCR31
19,949,022 UART: [state] Locking ICCM
19,950,381 UART: [exit] Launching FMC @ 0x40000000
19,958,776 UART:
19,959,006 UART: Running Caliptra FMC ...
19,960,106 UART:
19,960,261 UART: [fmc] Received command: 0x10000000
19,962,719 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
2,065,471 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,209,658 >>> mbox cmd response: success
19,451,049 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,466,202 UART:
19,466,536 UART: Running Caliptra FMC ...
19,467,640 UART:
19,467,789 UART: [fmc] Received command: 0x10000000
19,470,224 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,752 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,169 UART: [cold-reset] ++
1,169,699 UART: [fht] FHT @ 0x50003400
1,172,197 UART: [idev] ++
1,172,365 UART: [idev] CDI.KEYID = 6
1,172,726 UART: [idev] SUBJECT.KEYID = 7
1,173,151 UART: [idev] UDS.KEYID = 0
1,180,857 UART: [idev] Erasing UDS.KEYID = 0
1,197,789 UART: [idev] Sha1 KeyId Algorithm
1,206,577 UART: [idev] --
1,207,640 UART: [ldev] ++
1,207,808 UART: [ldev] CDI.KEYID = 6
1,208,172 UART: [ldev] SUBJECT.KEYID = 5
1,208,599 UART: [ldev] AUTHORITY.KEYID = 7
1,209,062 UART: [ldev] FE.KEYID = 1
1,214,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,134 UART: [ldev] --
1,280,470 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 111668 bytes
3,092,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,516 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,281,607 >>> mbox cmd response: success
3,282,628 UART: [afmc] ++
3,282,796 UART: [afmc] CDI.KEYID = 6
3,283,159 UART: [afmc] SUBJECT.KEYID = 7
3,283,585 UART: [afmc] AUTHORITY.KEYID = 5
3,318,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,925 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,619 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,519 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,353,228 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,361,068 UART: [afmc] --
3,362,112 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,134 UART: [cold-reset] --
3,363,228 UART: [state] Locking Datavault
3,364,521 UART: [state] Locking PCR0, PCR1 and PCR31
3,365,125 UART: [state] Locking ICCM
3,365,739 UART: [exit] Launching FMC @ 0x40000000
3,371,036 UART:
3,371,052 UART: Running Caliptra FMC ...
3,371,460 UART:
3,371,690 UART: [fmc] Received command: 0x10000000
3,373,859 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,136,363 >>> mbox cmd response: success
3,192,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,355 UART:
3,199,371 UART: Running Caliptra FMC ...
3,199,779 UART:
3,200,009 UART: [fmc] Received command: 0x10000000
3,202,178 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,634 UART: [idev] ++
1,173,802 UART: [idev] CDI.KEYID = 6
1,174,163 UART: [idev] SUBJECT.KEYID = 7
1,174,588 UART: [idev] UDS.KEYID = 0
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,728 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,095 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,544 UART: [fwproc] Recv command 0x46574c44
1,283,277 UART: [fwproc] Recv'd Img size: 111668 bytes
3,100,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,128,066 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,289,147 >>> mbox cmd response: success
3,290,394 UART: [afmc] ++
3,290,562 UART: [afmc] CDI.KEYID = 6
3,290,925 UART: [afmc] SUBJECT.KEYID = 7
3,291,351 UART: [afmc] AUTHORITY.KEYID = 5
3,327,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,501 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,350,195 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,356,095 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,361,804 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,369,674 UART: [afmc] --
3,370,620 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,642 UART: [cold-reset] --
3,371,538 UART: [state] Locking Datavault
3,372,643 UART: [state] Locking PCR0, PCR1 and PCR31
3,373,247 UART: [state] Locking ICCM
3,373,817 UART: [exit] Launching FMC @ 0x40000000
3,379,114 UART:
3,379,130 UART: Running Caliptra FMC ...
3,379,538 UART:
3,379,768 UART: [fmc] Received command: 0x10000000
3,381,937 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,137,068 >>> mbox cmd response: success
3,193,277 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,108 UART:
3,199,124 UART: Running Caliptra FMC ...
3,199,532 UART:
3,199,762 UART: [fmc] Received command: 0x10000000
3,201,931 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
891,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,264 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,153 UART: [idev] --
1,208,222 UART: [ldev] ++
1,208,390 UART: [ldev] CDI.KEYID = 6
1,208,754 UART: [ldev] SUBJECT.KEYID = 5
1,209,181 UART: [ldev] AUTHORITY.KEYID = 7
1,209,644 UART: [ldev] FE.KEYID = 1
1,215,100 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 111668 bytes
3,085,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,114,071 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,139,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,275,170 >>> mbox cmd response: success
3,276,227 UART: [afmc] ++
3,276,395 UART: [afmc] CDI.KEYID = 6
3,276,758 UART: [afmc] SUBJECT.KEYID = 7
3,277,184 UART: [afmc] AUTHORITY.KEYID = 5
3,312,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,328,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,328,886 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,334,580 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,340,480 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,346,189 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,353,975 UART: [afmc] --
3,355,027 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,355,049 UART: [cold-reset] --
3,355,891 UART: [state] Locking Datavault
3,357,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,357,826 UART: [state] Locking ICCM
3,358,426 UART: [exit] Launching FMC @ 0x40000000
3,363,723 UART:
3,363,739 UART: Running Caliptra FMC ...
3,364,147 UART:
3,364,377 UART: [fmc] Received command: 0x10000000
3,366,546 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,132,937 >>> mbox cmd response: success
3,188,696 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,194,913 UART:
3,194,929 UART: Running Caliptra FMC ...
3,195,337 UART:
3,195,567 UART: [fmc] Received command: 0x10000000
3,197,736 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,250 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,182,424 UART: [idev] Erasing UDS.KEYID = 0
1,200,274 UART: [idev] Sha1 KeyId Algorithm
1,209,192 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,841 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46574c44
1,284,349 UART: [fwproc] Recv'd Img size: 111668 bytes
3,092,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,538 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,281,599 >>> mbox cmd response: success
3,282,674 UART: [afmc] ++
3,282,842 UART: [afmc] CDI.KEYID = 6
3,283,205 UART: [afmc] SUBJECT.KEYID = 7
3,283,631 UART: [afmc] AUTHORITY.KEYID = 5
3,319,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,047 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,741 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,641 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,353,350 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,361,316 UART: [afmc] --
3,362,326 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,348 UART: [cold-reset] --
3,363,192 UART: [state] Locking Datavault
3,364,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,831 UART: [state] Locking ICCM
3,365,473 UART: [exit] Launching FMC @ 0x40000000
3,370,770 UART:
3,370,786 UART: Running Caliptra FMC ...
3,371,194 UART:
3,371,424 UART: [fmc] Received command: 0x10000000
3,373,593 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,113,184 >>> mbox cmd response: success
3,170,195 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,176,216 UART:
3,176,232 UART: Running Caliptra FMC ...
3,176,640 UART:
3,176,870 UART: [fmc] Received command: 0x10000000
3,179,039 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,750 UART: [kat] HMAC-384Kdf
920,442 UART: [kat] LMS
1,168,754 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,978 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x46574c44
1,282,708 UART: [fwproc] Recv'd Img size: 111668 bytes
3,101,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,129,459 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,290,514 >>> mbox cmd response: success
3,291,717 UART: [afmc] ++
3,291,885 UART: [afmc] CDI.KEYID = 6
3,292,248 UART: [afmc] SUBJECT.KEYID = 7
3,292,674 UART: [afmc] AUTHORITY.KEYID = 5
3,327,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,344,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,345,188 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,350,882 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,356,782 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,362,491 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,370,343 UART: [afmc] --
3,371,423 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,371,445 UART: [cold-reset] --
3,372,367 UART: [state] Locking Datavault
3,373,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,374,470 UART: [state] Locking ICCM
3,374,936 UART: [exit] Launching FMC @ 0x40000000
3,380,233 UART:
3,380,249 UART: Running Caliptra FMC ...
3,380,657 UART:
3,380,887 UART: [fmc] Received command: 0x10000000
3,383,056 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,138,393 >>> mbox cmd response: success
3,193,910 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,951 UART:
3,199,967 UART: Running Caliptra FMC ...
3,200,375 UART:
3,200,605 UART: [fmc] Received command: 0x10000000
3,202,774 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,174 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [kat] SHA2-256
891,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,116 UART: [kat] ++
896,268 UART: [kat] sha1
900,550 UART: [kat] SHA2-256
902,490 UART: [kat] SHA2-384
905,217 UART: [kat] SHA2-512-ACC
907,118 UART: [kat] ECC-384
916,979 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,082 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,806 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,629 UART: [ldev] Erasing FE.KEYID = 1
1,241,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,681 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 111668 bytes
3,087,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,115,817 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,141,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,276,992 >>> mbox cmd response: success
3,278,035 UART: [afmc] ++
3,278,203 UART: [afmc] CDI.KEYID = 6
3,278,566 UART: [afmc] SUBJECT.KEYID = 7
3,278,992 UART: [afmc] AUTHORITY.KEYID = 5
3,314,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,330,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,331,344 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,337,038 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,342,938 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,348,647 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,356,589 UART: [afmc] --
3,357,659 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,357,681 UART: [cold-reset] --
3,358,347 UART: [state] Locking Datavault
3,359,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,160 UART: [state] Locking ICCM
3,360,698 UART: [exit] Launching FMC @ 0x40000000
3,365,995 UART:
3,366,011 UART: Running Caliptra FMC ...
3,366,419 UART:
3,366,649 UART: [fmc] Received command: 0x10000000
3,368,818 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,141,048 >>> mbox cmd response: success
3,197,691 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,203,560 UART:
3,203,576 UART: Running Caliptra FMC ...
3,203,984 UART:
3,204,214 UART: [fmc] Received command: 0x10000000
3,206,383 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,052,865 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,193,813 UART:
2,194,219 UART: Running Caliptra ROM ...
2,195,301 UART:
2,195,461 UART: [state] CFI Enabled
2,196,433 UART: [state] LifecycleState = Unprovisioned
2,198,099 UART: [state] DebugLocked = No
2,199,130 UART: [state] WD Timer not started. Device not locked for debugging
2,201,597 UART: [kat] SHA2-256
2,202,261 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,266 UART: [kat] ++
2,205,712 UART: [kat] sha1
2,206,222 UART: [kat] SHA2-256
2,206,880 UART: [kat] SHA2-384
2,207,557 UART: [kat] SHA2-512-ACC
2,208,359 UART: [kat] ECC-384
3,775,541 UART: [kat] HMAC-384Kdf
3,803,464 UART: [kat] LMS
4,876,622 UART: [kat] --
4,879,888 UART: [cold-reset] ++
4,881,179 UART: [fht] FHT @ 0x50003400
4,891,806 UART: [idev] ++
4,892,489 UART: [idev] CDI.KEYID = 6
4,893,670 UART: [idev] SUBJECT.KEYID = 7
4,894,824 UART: [idev] UDS.KEYID = 0
4,932,243 UART: [idev] Erasing UDS.KEYID = 0
8,245,242 UART: [idev] Sha1 KeyId Algorithm
8,267,555 UART: [idev] --
8,270,494 UART: [ldev] ++
8,271,123 UART: [ldev] CDI.KEYID = 6
8,272,339 UART: [ldev] SUBJECT.KEYID = 5
8,273,456 UART: [ldev] AUTHORITY.KEYID = 7
8,274,607 UART: [ldev] FE.KEYID = 1
8,319,030 UART: [ldev] Erasing FE.KEYID = 1
11,658,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,357 UART: [ldev] --
14,041,935 UART: [fwproc] Wait for Commands...
14,044,575 UART: [fwproc] Recv command 0x46574c44
14,046,891 UART: [fwproc] Recv'd Img size: 111324 bytes
18,085,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,164,487 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,224,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,541,262 >>> mbox cmd response: success
18,544,609 UART: [afmc] ++
18,545,205 UART: [afmc] CDI.KEYID = 6
18,546,446 UART: [afmc] SUBJECT.KEYID = 7
18,547,548 UART: [afmc] AUTHORITY.KEYID = 5
21,906,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,315 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,241,343 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,257,407 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,273,500 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,295,864 UART: [afmc] --
24,299,947 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,300,313 UART: [cold-reset] --
24,304,154 UART: [state] Locking Datavault
24,309,405 UART: [state] Locking PCR0, PCR1 and PCR31
24,311,130 UART: [state] Locking ICCM
24,312,691 UART: [exit] Launching FMC @ 0x40000000
24,321,305 UART:
24,321,534 UART: Running Caliptra FMC ...
24,322,632 UART:
24,322,787 UART: [fmc] Received command: 0x10000000
24,325,299 >>> mbox cmd response data (224 bytes)
24,326,778 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,327,187 UART: [fmc] Received command: 0x10000006
24,348,420 >>> mbox cmd response data (1536 bytes)
24,359,088 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,498,995 UART: [fmc] Received command: 0x46574C44
24,500,544 UART:
24,500,713 UART: Running Caliptra ROM ...
24,501,814 UART:
24,501,968 UART: [state] CFI Enabled
24,559,518 UART: [state] LifecycleState = Unprovisioned
24,561,397 UART: [state] DebugLocked = No
24,563,211 UART: [state] WD Timer not started. Device not locked for debugging
24,567,558 UART: [kat] SHA2-256
24,749,491 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,761,011 UART: [kat] ++
24,761,476 UART: [kat] sha1
24,772,204 UART: [kat] SHA2-256
24,775,277 UART: [kat] SHA2-384
24,782,068 UART: [kat] SHA2-512-ACC
24,784,632 UART: [kat] ECC-384
28,072,169 UART: [kat] HMAC-384Kdf
28,097,637 UART: [kat] LMS
29,170,735 UART: [kat] --
29,176,308 UART: [update-reset] ++
33,240,969 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,243,651 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,615,993 >>> mbox cmd response: success
33,616,576 UART: [update-reset] Copying MAN_2 To MAN_1
33,639,425 UART: [update-reset Success] --
33,641,107 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,643,279 UART: [state] Locking Datavault
33,646,551 UART: [state] Locking PCR0, PCR1 and PCR31
33,648,198 UART: [state] Locking ICCM
33,650,889 UART: [exit] Launching FMC @ 0x40000000
33,659,563 UART:
33,659,797 UART: Running Caliptra FMC ...
33,660,893 UART:
33,661,048 UART: [fmc] Received command: 0x10000000
33,663,479 >>> mbox cmd response data (224 bytes)
33,664,924 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,665,335 UART: [fmc] Received command: 0x10000006
33,686,595 >>> mbox cmd response data (1536 bytes)
33,694,822 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,695,277 UART: [fmc] Received command: 0x10000007
33,696,807 >>> mbox cmd response data (4 bytes)
33,697,128 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,697,449 UART: [fmc] Received command: 0x10000006
33,718,664 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,054,481 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,299,869 >>> mbox cmd response: success
23,975,168 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,990,841 UART:
23,991,206 UART: Running Caliptra FMC ...
23,992,313 UART:
23,992,465 UART: [fmc] Received command: 0x10000000
23,994,790 >>> mbox cmd response data (224 bytes)
23,996,208 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
23,996,629 UART: [fmc] Received command: 0x10000006
24,017,891 >>> mbox cmd response data (1536 bytes)
24,028,140 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,168,202 UART: [fmc] Received command: 0x46574C44
33,199,068 >>> mbox cmd response: success
33,220,930 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,234,329 UART:
33,234,585 UART: Running Caliptra FMC ...
33,235,695 UART:
33,235,856 UART: [fmc] Received command: 0x10000000
33,238,286 >>> mbox cmd response data (224 bytes)
33,239,745 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,240,171 UART: [fmc] Received command: 0x10000006
33,261,428 >>> mbox cmd response data (1536 bytes)
33,269,793 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,270,253 UART: [fmc] Received command: 0x10000007
33,271,766 >>> mbox cmd response data (4 bytes)
33,272,076 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,272,399 UART: [fmc] Received command: 0x10000006
33,293,596 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,059,605 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,200,554 UART:
2,200,961 UART: Running Caliptra ROM ...
2,202,127 UART:
2,202,295 UART: [state] CFI Enabled
2,203,248 UART: [state] LifecycleState = Unprovisioned
2,204,895 UART: [state] DebugLocked = No
2,205,993 UART: [state] WD Timer not started. Device not locked for debugging
2,208,453 UART: [kat] SHA2-256
2,209,120 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,116 UART: [kat] ++
2,212,563 UART: [kat] sha1
2,213,116 UART: [kat] SHA2-256
2,213,766 UART: [kat] SHA2-384
2,214,414 UART: [kat] SHA2-512-ACC
2,215,250 UART: [kat] ECC-384
4,093,751 UART: [kat] HMAC-384Kdf
4,104,497 UART: [kat] LMS
5,177,633 UART: [kat] --
5,181,926 UART: [cold-reset] ++
5,183,482 UART: [fht] FHT @ 0x50003400
5,195,266 UART: [idev] ++
5,195,942 UART: [idev] CDI.KEYID = 6
5,197,171 UART: [idev] SUBJECT.KEYID = 7
5,198,594 UART: [idev] UDS.KEYID = 0
5,213,591 UART: [idev] Erasing UDS.KEYID = 0
8,485,608 UART: [idev] Sha1 KeyId Algorithm
8,507,753 UART: [idev] --
8,513,543 UART: [ldev] ++
8,514,134 UART: [ldev] CDI.KEYID = 6
8,515,372 UART: [ldev] SUBJECT.KEYID = 5
8,516,799 UART: [ldev] AUTHORITY.KEYID = 7
8,518,399 UART: [ldev] FE.KEYID = 1
8,530,191 UART: [ldev] Erasing FE.KEYID = 1
11,818,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,177,450 UART: [ldev] --
14,182,387 UART: [fwproc] Wait for Commands...
14,184,476 UART: [fwproc] Recv command 0x46574c44
14,186,781 UART: [fwproc] Recv'd Img size: 111324 bytes
18,228,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,303,269 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,363,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,679,969 >>> mbox cmd response: success
18,683,648 UART: [afmc] ++
18,684,235 UART: [afmc] CDI.KEYID = 6
18,685,434 UART: [afmc] SUBJECT.KEYID = 7
18,686,591 UART: [afmc] AUTHORITY.KEYID = 5
21,998,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,294,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,296,671 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,312,676 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,328,718 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,344,815 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,368,109 UART: [afmc] --
24,372,100 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,372,470 UART: [cold-reset] --
24,376,519 UART: [state] Locking Datavault
24,384,082 UART: [state] Locking PCR0, PCR1 and PCR31
24,385,731 UART: [state] Locking ICCM
24,387,173 UART: [exit] Launching FMC @ 0x40000000
24,395,779 UART:
24,396,025 UART: Running Caliptra FMC ...
24,397,124 UART:
24,397,278 UART: [fmc] Received command: 0x10000000
24,399,758 >>> mbox cmd response data (224 bytes)
24,401,246 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,401,646 UART: [fmc] Received command: 0x10000006
24,422,882 >>> mbox cmd response data (1536 bytes)
24,433,767 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,573,662 UART: [fmc] Received command: 0x46574C44
24,575,203 UART:
24,575,371 UART: Running Caliptra ROM ...
24,576,469 UART:
24,576,784 UART: [state] CFI Enabled
24,590,889 UART: [state] LifecycleState = Unprovisioned
24,592,813 UART: [state] DebugLocked = No
24,594,740 UART: [state] WD Timer not started. Device not locked for debugging
24,598,928 UART: [kat] SHA2-256
24,780,861 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,792,428 UART: [kat] ++
24,793,017 UART: [kat] sha1
24,802,447 UART: [kat] SHA2-256
24,805,501 UART: [kat] SHA2-384
24,811,743 UART: [kat] SHA2-512-ACC
24,814,352 UART: [kat] ECC-384
28,070,867 UART: [kat] HMAC-384Kdf
28,082,780 UART: [kat] LMS
29,155,906 UART: [kat] --
29,160,218 UART: [update-reset] ++
33,226,910 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,231,119 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,603,488 >>> mbox cmd response: success
33,604,533 UART: [update-reset] Copying MAN_2 To MAN_1
33,627,388 UART: [update-reset Success] --
33,629,190 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,633,090 UART: [state] Locking Datavault
33,637,928 UART: [state] Locking PCR0, PCR1 and PCR31
33,639,574 UART: [state] Locking ICCM
33,641,503 UART: [exit] Launching FMC @ 0x40000000
33,650,162 UART:
33,650,389 UART: Running Caliptra FMC ...
33,651,477 UART:
33,651,625 UART: [fmc] Received command: 0x10000000
33,654,104 >>> mbox cmd response data (224 bytes)
33,655,529 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,655,925 UART: [fmc] Received command: 0x10000006
33,677,156 >>> mbox cmd response data (1536 bytes)
33,685,383 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,685,823 UART: [fmc] Received command: 0x10000007
33,687,373 >>> mbox cmd response data (4 bytes)
33,687,683 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,687,989 UART: [fmc] Received command: 0x10000006
33,709,532 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,060,976 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,490,332 >>> mbox cmd response: success
24,113,233 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,128,679 UART:
24,129,041 UART: Running Caliptra FMC ...
24,130,229 UART:
24,130,396 UART: [fmc] Received command: 0x10000000
24,132,624 >>> mbox cmd response data (224 bytes)
24,134,041 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,134,456 UART: [fmc] Received command: 0x10000006
24,155,695 >>> mbox cmd response data (1536 bytes)
24,165,953 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,305,984 UART: [fmc] Received command: 0x46574C44
33,228,104 >>> mbox cmd response: success
33,249,599 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,263,486 UART:
33,263,744 UART: Running Caliptra FMC ...
33,264,850 UART:
33,265,004 UART: [fmc] Received command: 0x10000000
33,267,442 >>> mbox cmd response data (224 bytes)
33,268,866 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,269,269 UART: [fmc] Received command: 0x10000006
33,290,556 >>> mbox cmd response data (1536 bytes)
33,298,744 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,299,189 UART: [fmc] Received command: 0x10000007
33,300,781 >>> mbox cmd response data (4 bytes)
33,301,088 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,301,396 UART: [fmc] Received command: 0x10000006
33,322,613 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,056,934 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,198,329 UART:
2,198,761 UART: Running Caliptra ROM ...
2,199,931 UART:
2,200,098 UART: [state] CFI Enabled
2,201,082 UART: [state] LifecycleState = Unprovisioned
2,202,733 UART: [state] DebugLocked = No
2,203,843 UART: [state] WD Timer not started. Device not locked for debugging
2,206,314 UART: [kat] SHA2-256
2,207,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,027 UART: [kat] ++
2,210,526 UART: [kat] sha1
2,211,039 UART: [kat] SHA2-256
2,211,788 UART: [kat] SHA2-384
2,212,454 UART: [kat] SHA2-512-ACC
2,213,298 UART: [kat] ECC-384
2,948,050 UART: [kat] HMAC-384Kdf
2,972,519 UART: [kat] LMS
3,501,997 UART: [kat] --
3,505,663 UART: [cold-reset] ++
3,507,541 UART: [fht] FHT @ 0x50003400
3,517,984 UART: [idev] ++
3,518,549 UART: [idev] CDI.KEYID = 6
3,519,453 UART: [idev] SUBJECT.KEYID = 7
3,520,668 UART: [idev] UDS.KEYID = 0
3,544,805 UART: [idev] Erasing UDS.KEYID = 0
6,028,724 UART: [idev] Sha1 KeyId Algorithm
6,050,828 UART: [idev] --
6,054,231 UART: [ldev] ++
6,054,801 UART: [ldev] CDI.KEYID = 6
6,055,685 UART: [ldev] SUBJECT.KEYID = 5
6,056,903 UART: [ldev] AUTHORITY.KEYID = 7
6,058,142 UART: [ldev] FE.KEYID = 1
6,101,068 UART: [ldev] Erasing FE.KEYID = 1
8,606,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,944 UART: [ldev] --
10,414,305 UART: [fwproc] Wait for Commands...
10,415,783 UART: [fwproc] Recv command 0x46574c44
10,417,887 UART: [fwproc] Recv'd Img size: 111668 bytes
13,784,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,853,311 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,913,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,230,069 >>> mbox cmd response: success
14,233,992 UART: [afmc] ++
14,234,583 UART: [afmc] CDI.KEYID = 6
14,235,467 UART: [afmc] SUBJECT.KEYID = 7
14,236,682 UART: [afmc] AUTHORITY.KEYID = 5
16,766,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,171 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,508,098 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,524,019 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,539,933 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,562,288 UART: [afmc] --
18,566,077 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,566,518 UART: [cold-reset] --
18,569,067 UART: [state] Locking Datavault
18,575,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,776 UART: [state] Locking ICCM
18,578,815 UART: [exit] Launching FMC @ 0x40000000
18,587,211 UART:
18,587,449 UART: Running Caliptra FMC ...
18,588,549 UART:
18,588,703 UART: [fmc] Received command: 0x10000000
18,591,109 >>> mbox cmd response data (224 bytes)
18,592,587 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,592,992 UART: [fmc] Received command: 0x10000006
18,614,287 >>> mbox cmd response data (1536 bytes)
18,624,875 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,765,342 UART: [fmc] Received command: 0x46574C44
18,766,893 UART:
18,767,061 UART: Running Caliptra ROM ...
18,768,178 UART:
18,768,333 UART: [state] CFI Enabled
18,842,876 UART: [state] LifecycleState = Unprovisioned
18,844,749 UART: [state] DebugLocked = No
18,846,402 UART: [state] WD Timer not started. Device not locked for debugging
18,850,476 UART: [kat] SHA2-256
19,029,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,041,178 UART: [kat] ++
19,041,719 UART: [kat] sha1
19,053,794 UART: [kat] SHA2-256
19,056,846 UART: [kat] SHA2-384
19,063,054 UART: [kat] SHA2-512-ACC
19,065,954 UART: [kat] ECC-384
21,527,979 UART: [kat] HMAC-384Kdf
21,551,718 UART: [kat] LMS
22,081,186 UART: [kat] --
22,086,037 UART: [update-reset] ++
25,482,328 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,485,119 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,858,713 >>> mbox cmd response: success
25,860,303 UART: [update-reset] Copying MAN_2 To MAN_1
25,882,652 UART: [update-reset Success] --
25,883,921 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,887,915 UART: [state] Locking Datavault
25,892,190 UART: [state] Locking PCR0, PCR1 and PCR31
25,893,836 UART: [state] Locking ICCM
25,896,283 UART: [exit] Launching FMC @ 0x40000000
25,904,673 UART:
25,904,914 UART: Running Caliptra FMC ...
25,905,955 UART:
25,906,104 UART: [fmc] Received command: 0x10000000
25,908,593 >>> mbox cmd response data (224 bytes)
25,909,931 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,910,350 UART: [fmc] Received command: 0x10000006
25,931,615 >>> mbox cmd response data (1536 bytes)
25,939,872 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,940,334 UART: [fmc] Received command: 0x10000007
25,941,875 >>> mbox cmd response data (4 bytes)
25,942,190 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,942,502 UART: [fmc] Received command: 0x10000006
25,963,747 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,056,785 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,017,070 >>> mbox cmd response: success
18,283,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,298,095 UART:
18,298,432 UART: Running Caliptra FMC ...
18,299,610 UART:
18,299,785 UART: [fmc] Received command: 0x10000000
18,302,104 >>> mbox cmd response data (224 bytes)
18,303,600 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,304,004 UART: [fmc] Received command: 0x10000006
18,325,257 >>> mbox cmd response data (1536 bytes)
18,335,370 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,475,816 UART: [fmc] Received command: 0x46574C44
25,434,909 >>> mbox cmd response: success
25,456,033 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,468,476 UART:
25,468,763 UART: Running Caliptra FMC ...
25,469,882 UART:
25,470,048 UART: [fmc] Received command: 0x10000000
25,472,487 >>> mbox cmd response data (224 bytes)
25,473,917 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,474,329 UART: [fmc] Received command: 0x10000006
25,495,574 >>> mbox cmd response data (1536 bytes)
25,503,788 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,504,244 UART: [fmc] Received command: 0x10000007
25,505,767 >>> mbox cmd response data (4 bytes)
25,506,070 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,506,407 UART: [fmc] Received command: 0x10000006
25,527,611 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,060,688 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,201,955 UART:
2,202,359 UART: Running Caliptra ROM ...
2,203,529 UART:
2,203,698 UART: [state] CFI Enabled
2,204,669 UART: [state] LifecycleState = Unprovisioned
2,206,309 UART: [state] DebugLocked = No
2,207,411 UART: [state] WD Timer not started. Device not locked for debugging
2,209,880 UART: [kat] SHA2-256
2,210,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,794 UART: [kat] ++
2,214,276 UART: [kat] sha1
2,214,796 UART: [kat] SHA2-256
2,215,453 UART: [kat] SHA2-384
2,216,106 UART: [kat] SHA2-512-ACC
2,216,906 UART: [kat] ECC-384
3,283,339 UART: [kat] HMAC-384Kdf
3,294,979 UART: [kat] LMS
3,824,501 UART: [kat] --
3,828,906 UART: [cold-reset] ++
3,831,325 UART: [fht] FHT @ 0x50003400
3,841,542 UART: [idev] ++
3,842,104 UART: [idev] CDI.KEYID = 6
3,843,012 UART: [idev] SUBJECT.KEYID = 7
3,844,227 UART: [idev] UDS.KEYID = 0
3,860,419 UART: [idev] Erasing UDS.KEYID = 0
6,316,277 UART: [idev] Sha1 KeyId Algorithm
6,340,707 UART: [idev] --
6,343,499 UART: [ldev] ++
6,344,070 UART: [ldev] CDI.KEYID = 6
6,344,980 UART: [ldev] SUBJECT.KEYID = 5
6,346,136 UART: [ldev] AUTHORITY.KEYID = 7
6,347,416 UART: [ldev] FE.KEYID = 1
6,358,869 UART: [ldev] Erasing FE.KEYID = 1
8,834,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,469 UART: [ldev] --
10,624,723 UART: [fwproc] Wait for Commands...
10,626,709 UART: [fwproc] Recv command 0x46574c44
10,628,803 UART: [fwproc] Recv'd Img size: 111668 bytes
13,995,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,066,641 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,444,343 >>> mbox cmd response: success
14,448,913 UART: [afmc] ++
14,449,494 UART: [afmc] CDI.KEYID = 6
14,450,404 UART: [afmc] SUBJECT.KEYID = 7
14,451,760 UART: [afmc] AUTHORITY.KEYID = 5
16,950,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,672,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,673,921 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,689,818 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,705,733 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,721,670 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,744,493 UART: [afmc] --
18,748,953 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,749,354 UART: [cold-reset] --
18,753,759 UART: [state] Locking Datavault
18,759,220 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,872 UART: [state] Locking ICCM
18,761,941 UART: [exit] Launching FMC @ 0x40000000
18,770,282 UART:
18,770,514 UART: Running Caliptra FMC ...
18,771,833 UART:
18,772,009 UART: [fmc] Received command: 0x10000000
18,774,245 >>> mbox cmd response data (224 bytes)
18,775,716 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,776,131 UART: [fmc] Received command: 0x10000006
18,797,374 >>> mbox cmd response data (1536 bytes)
18,808,334 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,948,786 UART: [fmc] Received command: 0x46574C44
18,950,327 UART:
18,950,514 UART: Running Caliptra ROM ...
18,951,534 UART:
18,951,895 UART: [state] CFI Enabled
18,967,507 UART: [state] LifecycleState = Unprovisioned
18,969,339 UART: [state] DebugLocked = No
18,972,169 UART: [state] WD Timer not started. Device not locked for debugging
18,976,659 UART: [kat] SHA2-256
19,155,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,167,435 UART: [kat] ++
19,167,888 UART: [kat] sha1
19,179,092 UART: [kat] SHA2-256
19,182,094 UART: [kat] SHA2-384
19,188,409 UART: [kat] SHA2-512-ACC
19,191,346 UART: [kat] ECC-384
21,633,014 UART: [kat] HMAC-384Kdf
21,644,711 UART: [kat] LMS
22,174,218 UART: [kat] --
22,178,766 UART: [update-reset] ++
25,569,645 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,573,146 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,946,743 >>> mbox cmd response: success
25,948,176 UART: [update-reset] Copying MAN_2 To MAN_1
25,970,518 UART: [update-reset Success] --
25,971,988 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,974,103 UART: [state] Locking Datavault
25,977,144 UART: [state] Locking PCR0, PCR1 and PCR31
25,978,845 UART: [state] Locking ICCM
25,981,258 UART: [exit] Launching FMC @ 0x40000000
25,989,657 UART:
25,989,888 UART: Running Caliptra FMC ...
25,990,986 UART:
25,991,140 UART: [fmc] Received command: 0x10000000
25,993,591 >>> mbox cmd response data (224 bytes)
25,995,006 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,995,418 UART: [fmc] Received command: 0x10000006
26,016,654 >>> mbox cmd response data (1536 bytes)
26,024,849 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,025,296 UART: [fmc] Received command: 0x10000007
26,026,834 >>> mbox cmd response data (4 bytes)
26,027,161 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,027,479 UART: [fmc] Received command: 0x10000006
26,048,721 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
2,059,273 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,228,660 >>> mbox cmd response: success
18,458,143 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,474,110 UART:
18,474,434 UART: Running Caliptra FMC ...
18,475,612 UART:
18,475,779 UART: [fmc] Received command: 0x10000000
18,478,112 >>> mbox cmd response data (224 bytes)
18,479,581 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,479,991 UART: [fmc] Received command: 0x10000006
18,501,281 >>> mbox cmd response data (1536 bytes)
18,511,328 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,651,788 UART: [fmc] Received command: 0x46574C44
25,509,877 >>> mbox cmd response: success
25,531,367 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,544,829 UART:
25,545,084 UART: Running Caliptra FMC ...
25,546,199 UART:
25,546,358 UART: [fmc] Received command: 0x10000000
25,548,792 >>> mbox cmd response data (224 bytes)
25,550,199 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,550,556 UART: [fmc] Received command: 0x10000006
25,571,808 >>> mbox cmd response data (1536 bytes)
25,580,324 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,580,807 UART: [fmc] Received command: 0x10000007
25,582,404 >>> mbox cmd response data (4 bytes)
25,582,734 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,583,055 UART: [fmc] Received command: 0x10000006
25,604,250 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,061,954 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,203,151 UART:
2,203,575 UART: Running Caliptra ROM ...
2,204,659 UART:
2,204,810 UART: [state] CFI Enabled
2,205,792 UART: [state] LifecycleState = Unprovisioned
2,207,457 UART: [state] DebugLocked = No
2,208,506 UART: [state] WD Timer not started. Device not locked for debugging
2,210,980 UART: [kat] SHA2-256
2,211,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,914 UART: [kat] ++
2,215,375 UART: [kat] sha1
2,215,892 UART: [kat] SHA2-256
2,216,545 UART: [kat] SHA2-384
2,217,233 UART: [kat] SHA2-512-ACC
2,218,129 UART: [kat] ECC-384
2,946,557 UART: [kat] HMAC-384Kdf
2,969,976 UART: [kat] LMS
3,499,450 UART: [kat] --
3,502,546 UART: [cold-reset] ++
3,504,752 UART: [fht] FHT @ 0x50003400
3,516,004 UART: [idev] ++
3,516,583 UART: [idev] CDI.KEYID = 6
3,517,522 UART: [idev] SUBJECT.KEYID = 7
3,518,692 UART: [idev] UDS.KEYID = 0
3,543,091 UART: [idev] Erasing UDS.KEYID = 0
6,025,267 UART: [idev] Sha1 KeyId Algorithm
6,048,312 UART: [idev] --
6,052,238 UART: [ldev] ++
6,052,822 UART: [ldev] CDI.KEYID = 6
6,053,708 UART: [ldev] SUBJECT.KEYID = 5
6,054,934 UART: [ldev] AUTHORITY.KEYID = 7
6,056,168 UART: [ldev] FE.KEYID = 1
6,100,307 UART: [ldev] Erasing FE.KEYID = 1
8,602,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,594 UART: [ldev] --
10,414,267 UART: [fwproc] Wait for Commands...
10,415,717 UART: [fwproc] Recv command 0x46574c44
10,417,816 UART: [fwproc] Recv'd Img size: 111668 bytes
13,789,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,864,123 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,924,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,241,976 >>> mbox cmd response: success
14,245,735 UART: [afmc] ++
14,246,329 UART: [afmc] CDI.KEYID = 6
14,247,235 UART: [afmc] SUBJECT.KEYID = 7
14,248,394 UART: [afmc] AUTHORITY.KEYID = 5
16,783,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,587 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,526,516 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,542,408 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,558,325 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,580,406 UART: [afmc] --
18,584,379 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,584,782 UART: [cold-reset] --
18,587,979 UART: [state] Locking Datavault
18,594,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,853 UART: [state] Locking ICCM
18,596,976 UART: [exit] Launching FMC @ 0x40000000
18,605,370 UART:
18,605,604 UART: Running Caliptra FMC ...
18,606,702 UART:
18,606,861 UART: [fmc] Received command: 0x10000000
18,609,321 >>> mbox cmd response data (224 bytes)
18,610,824 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,611,234 UART: [fmc] Received command: 0x10000006
18,632,495 >>> mbox cmd response data (1536 bytes)
18,643,188 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,783,660 UART: [fmc] Received command: 0x46574C44
18,785,219 UART:
18,785,386 UART: Running Caliptra ROM ...
18,786,496 UART:
18,786,657 UART: [state] CFI Enabled
18,859,792 UART: [state] LifecycleState = Unprovisioned
18,861,671 UART: [state] DebugLocked = No
18,862,895 UART: [state] WD Timer not started. Device not locked for debugging
18,866,098 UART: [kat] SHA2-256
19,045,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,056,796 UART: [kat] ++
19,057,341 UART: [kat] sha1
19,067,733 UART: [kat] SHA2-256
19,070,759 UART: [kat] SHA2-384
19,076,502 UART: [kat] SHA2-512-ACC
19,079,402 UART: [kat] ECC-384
21,546,111 UART: [kat] HMAC-384Kdf
21,568,168 UART: [kat] LMS
22,097,619 UART: [kat] --
22,100,688 UART: [update-reset] ++
25,491,593 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,495,457 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,869,059 >>> mbox cmd response: success
25,870,592 UART: [update-reset] Copying MAN_2 To MAN_1
25,892,884 UART: [update-reset Success] --
25,894,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,898,254 UART: [state] Locking Datavault
25,902,636 UART: [state] Locking PCR0, PCR1 and PCR31
25,904,335 UART: [state] Locking ICCM
25,905,754 UART: [exit] Launching FMC @ 0x40000000
25,914,172 UART:
25,914,416 UART: Running Caliptra FMC ...
25,915,451 UART:
25,915,598 UART: [fmc] Received command: 0x10000000
25,918,083 >>> mbox cmd response data (224 bytes)
25,919,430 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,919,840 UART: [fmc] Received command: 0x10000006
25,941,121 >>> mbox cmd response data (1536 bytes)
25,949,389 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,949,842 UART: [fmc] Received command: 0x10000007
25,951,301 >>> mbox cmd response data (4 bytes)
25,951,607 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,951,919 UART: [fmc] Received command: 0x10000006
25,973,163 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,055,649 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,021,465 >>> mbox cmd response: success
18,296,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,311,593 UART:
18,311,924 UART: Running Caliptra FMC ...
18,313,093 UART:
18,313,269 UART: [fmc] Received command: 0x10000000
18,315,566 >>> mbox cmd response data (224 bytes)
18,317,050 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,317,455 UART: [fmc] Received command: 0x10000006
18,338,730 >>> mbox cmd response data (1536 bytes)
18,348,645 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,488,934 UART: [fmc] Received command: 0x46574C44
25,434,099 >>> mbox cmd response: success
25,456,512 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,471,278 UART:
25,471,545 UART: Running Caliptra FMC ...
25,472,656 UART:
25,472,814 UART: [fmc] Received command: 0x10000000
25,475,307 >>> mbox cmd response data (224 bytes)
25,476,680 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,477,090 UART: [fmc] Received command: 0x10000006
25,498,360 >>> mbox cmd response data (1536 bytes)
25,506,541 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,506,998 UART: [fmc] Received command: 0x10000007
25,508,508 >>> mbox cmd response data (4 bytes)
25,508,835 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,509,151 UART: [fmc] Received command: 0x10000006
25,530,369 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,059,290 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,200,494 UART:
2,200,907 UART: Running Caliptra ROM ...
2,202,081 UART:
2,202,254 UART: [state] CFI Enabled
2,203,389 UART: [state] LifecycleState = Unprovisioned
2,205,044 UART: [state] DebugLocked = No
2,206,182 UART: [state] WD Timer not started. Device not locked for debugging
2,208,659 UART: [kat] SHA2-256
2,209,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,346 UART: [kat] ++
2,212,798 UART: [kat] sha1
2,213,314 UART: [kat] SHA2-256
2,213,972 UART: [kat] SHA2-384
2,214,627 UART: [kat] SHA2-512-ACC
2,215,453 UART: [kat] ECC-384
3,277,117 UART: [kat] HMAC-384Kdf
3,291,341 UART: [kat] LMS
3,820,862 UART: [kat] --
3,824,580 UART: [cold-reset] ++
3,826,828 UART: [fht] FHT @ 0x50003400
3,837,639 UART: [idev] ++
3,838,195 UART: [idev] CDI.KEYID = 6
3,839,120 UART: [idev] SUBJECT.KEYID = 7
3,840,276 UART: [idev] UDS.KEYID = 0
3,854,232 UART: [idev] Erasing UDS.KEYID = 0
6,312,991 UART: [idev] Sha1 KeyId Algorithm
6,334,992 UART: [idev] --
6,340,497 UART: [ldev] ++
6,341,060 UART: [ldev] CDI.KEYID = 6
6,341,943 UART: [ldev] SUBJECT.KEYID = 5
6,343,156 UART: [ldev] AUTHORITY.KEYID = 7
6,344,385 UART: [ldev] FE.KEYID = 1
6,355,703 UART: [ldev] Erasing FE.KEYID = 1
8,829,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,195 UART: [ldev] --
10,618,126 UART: [fwproc] Wait for Commands...
10,620,600 UART: [fwproc] Recv command 0x46574c44
10,622,691 UART: [fwproc] Recv'd Img size: 111668 bytes
13,989,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,066,353 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,443,269 >>> mbox cmd response: success
14,446,683 UART: [afmc] ++
14,447,259 UART: [afmc] CDI.KEYID = 6
14,448,136 UART: [afmc] SUBJECT.KEYID = 7
14,449,346 UART: [afmc] AUTHORITY.KEYID = 5
16,946,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,666,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,667,932 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,683,883 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,699,783 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,715,723 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,738,438 UART: [afmc] --
18,741,707 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,742,081 UART: [cold-reset] --
18,744,891 UART: [state] Locking Datavault
18,751,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,752,700 UART: [state] Locking ICCM
18,754,118 UART: [exit] Launching FMC @ 0x40000000
18,762,504 UART:
18,762,918 UART: Running Caliptra FMC ...
18,764,052 UART:
18,764,214 UART: [fmc] Received command: 0x10000000
18,766,428 >>> mbox cmd response data (224 bytes)
18,767,825 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,768,148 UART: [fmc] Received command: 0x10000006
18,789,404 >>> mbox cmd response data (1536 bytes)
18,800,244 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,941,166 UART: [fmc] Received command: 0x46574C44
18,942,724 UART:
18,942,895 UART: Running Caliptra ROM ...
18,943,917 UART:
18,944,281 UART: [state] CFI Enabled
18,956,142 UART: [state] LifecycleState = Unprovisioned
18,957,976 UART: [state] DebugLocked = No
18,960,056 UART: [state] WD Timer not started. Device not locked for debugging
18,963,738 UART: [kat] SHA2-256
19,142,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,154,511 UART: [kat] ++
19,155,061 UART: [kat] sha1
19,166,929 UART: [kat] SHA2-256
19,169,928 UART: [kat] SHA2-384
19,174,854 UART: [kat] SHA2-512-ACC
19,177,791 UART: [kat] ECC-384
21,619,407 UART: [kat] HMAC-384Kdf
21,630,940 UART: [kat] LMS
22,160,438 UART: [kat] --
22,165,907 UART: [update-reset] ++
25,557,280 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,561,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,934,695 >>> mbox cmd response: success
25,935,893 UART: [update-reset] Copying MAN_2 To MAN_1
25,958,232 UART: [update-reset Success] --
25,959,496 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,962,144 UART: [state] Locking Datavault
25,965,923 UART: [state] Locking PCR0, PCR1 and PCR31
25,967,634 UART: [state] Locking ICCM
25,968,711 UART: [exit] Launching FMC @ 0x40000000
25,977,125 UART:
25,977,357 UART: Running Caliptra FMC ...
25,978,453 UART:
25,978,623 UART: [fmc] Received command: 0x10000000
25,981,107 >>> mbox cmd response data (224 bytes)
25,982,525 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,982,942 UART: [fmc] Received command: 0x10000006
26,004,209 >>> mbox cmd response data (1536 bytes)
26,012,526 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,012,973 UART: [fmc] Received command: 0x10000007
26,014,514 >>> mbox cmd response data (4 bytes)
26,014,835 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,015,153 UART: [fmc] Received command: 0x10000006
26,036,393 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,065,154 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,231,592 >>> mbox cmd response: success
18,462,178 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,476,777 UART:
18,477,127 UART: Running Caliptra FMC ...
18,478,314 UART:
18,478,503 UART: [fmc] Received command: 0x10000000
18,480,822 >>> mbox cmd response data (224 bytes)
18,482,322 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,482,737 UART: [fmc] Received command: 0x10000006
18,503,980 >>> mbox cmd response data (1536 bytes)
18,514,283 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,654,797 UART: [fmc] Received command: 0x46574C44
25,510,062 >>> mbox cmd response: success
25,531,388 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,543,642 UART:
25,543,929 UART: Running Caliptra FMC ...
25,545,039 UART:
25,545,203 UART: [fmc] Received command: 0x10000000
25,547,641 >>> mbox cmd response data (224 bytes)
25,549,140 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,549,548 UART: [fmc] Received command: 0x10000006
25,570,806 >>> mbox cmd response data (1536 bytes)
25,579,411 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,579,864 UART: [fmc] Received command: 0x10000007
25,581,499 >>> mbox cmd response data (4 bytes)
25,581,821 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,582,139 UART: [fmc] Received command: 0x10000006
25,603,376 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Unprovisioned
86,275 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,948 UART: [kat] SHA2-512-ACC
906,849 UART: [kat] ECC-384
916,698 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,489 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,385 UART: [idev] ++
1,173,553 UART: [idev] CDI.KEYID = 6
1,173,914 UART: [idev] SUBJECT.KEYID = 7
1,174,339 UART: [idev] UDS.KEYID = 0
1,182,403 UART: [idev] Erasing UDS.KEYID = 0
1,199,265 UART: [idev] Sha1 KeyId Algorithm
1,208,239 UART: [idev] --
1,209,278 UART: [ldev] ++
1,209,446 UART: [ldev] CDI.KEYID = 6
1,209,810 UART: [ldev] SUBJECT.KEYID = 5
1,210,237 UART: [ldev] AUTHORITY.KEYID = 7
1,210,700 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,846 UART: [fwproc] Wait for Commands...
1,281,605 UART: [fwproc] Recv command 0x46574c44
1,282,338 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,675 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,734 >>> mbox cmd response: success
2,737,785 UART: [afmc] ++
2,737,953 UART: [afmc] CDI.KEYID = 6
2,738,316 UART: [afmc] SUBJECT.KEYID = 7
2,738,742 UART: [afmc] AUTHORITY.KEYID = 5
2,774,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,145 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,797,865 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,803,757 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,809,451 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,817,212 UART: [afmc] --
2,818,260 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,818,282 UART: [cold-reset] --
2,819,246 UART: [state] Locking Datavault
2,820,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,167 UART: [state] Locking ICCM
2,821,713 UART: [exit] Launching FMC @ 0x40000000
2,827,010 UART:
2,827,026 UART: Running Caliptra FMC ...
2,827,434 UART:
2,827,664 UART: [fmc] Received command: 0x10000000
2,829,833 >>> mbox cmd response data (224 bytes)
2,829,834 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,829,863 UART: [fmc] Received command: 0x10000006
2,847,880 >>> mbox cmd response data (1536 bytes)
2,847,881 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,847,909 UART: [fmc] Received command: 0x46574C44
2,848,735 UART:
2,848,751 UART: Running Caliptra ROM ...
2,849,159 UART:
2,849,214 UART: [state] CFI Enabled
2,851,452 UART: [state] LifecycleState = Unprovisioned
2,852,107 UART: [state] DebugLocked = No
2,852,739 UART: [state] WD Timer not started. Device not locked for debugging
2,853,891 UART: [kat] SHA2-256
3,657,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,570 UART: [kat] ++
3,661,722 UART: [kat] sha1
3,665,930 UART: [kat] SHA2-256
3,667,870 UART: [kat] SHA2-384
3,670,849 UART: [kat] SHA2-512-ACC
3,672,749 UART: [kat] ECC-384
3,682,556 UART: [kat] HMAC-384Kdf
3,687,006 UART: [kat] LMS
3,935,318 UART: [kat] --
3,936,372 UART: [update-reset] ++
5,217,616 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,218,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,366,247 >>> mbox cmd response: success
5,366,382 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,396 UART: [update-reset Success] --
5,374,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,375,409 UART: [state] Locking Datavault
5,376,129 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,733 UART: [state] Locking ICCM
5,377,181 UART: [exit] Launching FMC @ 0x40000000
5,382,478 UART:
5,382,494 UART: Running Caliptra FMC ...
5,382,902 UART:
5,383,124 UART: [fmc] Received command: 0x10000000
5,385,293 >>> mbox cmd response data (224 bytes)
5,385,294 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,385,323 UART: [fmc] Received command: 0x10000006
5,403,340 >>> mbox cmd response data (1536 bytes)
5,403,341 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,403,369 UART: [fmc] Received command: 0x10000007
5,404,161 >>> mbox cmd response data (4 bytes)
5,404,162 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,404,190 UART: [fmc] Received command: 0x10000006
5,422,207 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,848 >>> mbox cmd response: success
2,645,034 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,245 UART:
2,651,261 UART: Running Caliptra FMC ...
2,651,669 UART:
2,651,899 UART: [fmc] Received command: 0x10000000
2,654,068 >>> mbox cmd response data (224 bytes)
2,654,069 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,098 UART: [fmc] Received command: 0x10000006
2,672,115 >>> mbox cmd response data (1536 bytes)
2,672,116 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,672,144 UART: [fmc] Received command: 0x46574C44
5,070,841 >>> mbox cmd response: success
5,078,561 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,084,217 UART:
5,084,233 UART: Running Caliptra FMC ...
5,084,641 UART:
5,084,863 UART: [fmc] Received command: 0x10000000
5,087,032 >>> mbox cmd response data (224 bytes)
5,087,033 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,087,062 UART: [fmc] Received command: 0x10000006
5,105,079 >>> mbox cmd response data (1536 bytes)
5,105,080 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,105,108 UART: [fmc] Received command: 0x10000007
5,105,900 >>> mbox cmd response data (4 bytes)
5,105,901 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,105,929 UART: [fmc] Received command: 0x10000006
5,123,946 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,634 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,890 UART: [idev] ++
1,174,058 UART: [idev] CDI.KEYID = 6
1,174,419 UART: [idev] SUBJECT.KEYID = 7
1,174,844 UART: [idev] UDS.KEYID = 0
1,182,928 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,209,795 UART: [ldev] ++
1,209,963 UART: [ldev] CDI.KEYID = 6
1,210,327 UART: [ldev] SUBJECT.KEYID = 5
1,210,754 UART: [ldev] AUTHORITY.KEYID = 7
1,211,217 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,282,081 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,388 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,535 >>> mbox cmd response: success
2,739,596 UART: [afmc] ++
2,739,764 UART: [afmc] CDI.KEYID = 6
2,740,127 UART: [afmc] SUBJECT.KEYID = 7
2,740,553 UART: [afmc] AUTHORITY.KEYID = 5
2,776,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,906 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,626 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,518 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,212 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,055 UART: [afmc] --
2,820,049 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,071 UART: [cold-reset] --
2,821,077 UART: [state] Locking Datavault
2,822,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,890 UART: [state] Locking ICCM
2,823,328 UART: [exit] Launching FMC @ 0x40000000
2,828,625 UART:
2,828,641 UART: Running Caliptra FMC ...
2,829,049 UART:
2,829,279 UART: [fmc] Received command: 0x10000000
2,831,448 >>> mbox cmd response data (224 bytes)
2,831,449 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,478 UART: [fmc] Received command: 0x10000006
2,849,495 >>> mbox cmd response data (1536 bytes)
2,849,496 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,849,524 UART: [fmc] Received command: 0x46574C44
2,850,350 UART:
2,850,366 UART: Running Caliptra ROM ...
2,850,774 UART:
2,850,916 UART: [state] CFI Enabled
2,854,104 UART: [state] LifecycleState = Unprovisioned
2,854,759 UART: [state] DebugLocked = No
2,855,493 UART: [state] WD Timer not started. Device not locked for debugging
2,856,747 UART: [kat] SHA2-256
3,660,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,426 UART: [kat] ++
3,664,578 UART: [kat] sha1
3,668,716 UART: [kat] SHA2-256
3,670,656 UART: [kat] SHA2-384
3,673,613 UART: [kat] SHA2-512-ACC
3,675,513 UART: [kat] ECC-384
3,685,706 UART: [kat] HMAC-384Kdf
3,690,476 UART: [kat] LMS
3,938,788 UART: [kat] --
3,939,872 UART: [update-reset] ++
5,220,172 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,221,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,368,833 >>> mbox cmd response: success
5,369,046 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,060 UART: [update-reset Success] --
5,377,469 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,378,035 UART: [state] Locking Datavault
5,378,817 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,421 UART: [state] Locking ICCM
5,380,021 UART: [exit] Launching FMC @ 0x40000000
5,385,318 UART:
5,385,334 UART: Running Caliptra FMC ...
5,385,742 UART:
5,385,964 UART: [fmc] Received command: 0x10000000
5,388,133 >>> mbox cmd response data (224 bytes)
5,388,134 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,388,163 UART: [fmc] Received command: 0x10000006
5,406,180 >>> mbox cmd response data (1536 bytes)
5,406,181 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,406,209 UART: [fmc] Received command: 0x10000007
5,407,001 >>> mbox cmd response data (4 bytes)
5,407,002 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,407,030 UART: [fmc] Received command: 0x10000006
5,425,047 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,487 >>> mbox cmd response: success
2,643,253 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,366 UART:
2,649,382 UART: Running Caliptra FMC ...
2,649,790 UART:
2,650,020 UART: [fmc] Received command: 0x10000000
2,652,189 >>> mbox cmd response data (224 bytes)
2,652,190 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,219 UART: [fmc] Received command: 0x10000006
2,670,236 >>> mbox cmd response data (1536 bytes)
2,670,237 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,670,265 UART: [fmc] Received command: 0x46574C44
5,071,875 >>> mbox cmd response: success
5,079,495 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,371 UART:
5,085,387 UART: Running Caliptra FMC ...
5,085,795 UART:
5,086,017 UART: [fmc] Received command: 0x10000000
5,088,186 >>> mbox cmd response data (224 bytes)
5,088,187 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,088,216 UART: [fmc] Received command: 0x10000006
5,106,233 >>> mbox cmd response data (1536 bytes)
5,106,234 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,106,262 UART: [fmc] Received command: 0x10000007
5,107,054 >>> mbox cmd response data (4 bytes)
5,107,055 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,107,083 UART: [fmc] Received command: 0x10000006
5,125,100 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,334 UART: [kat] HMAC-384Kdf
919,852 UART: [kat] LMS
1,168,164 UART: [kat] --
1,168,873 UART: [cold-reset] ++
1,169,255 UART: [fht] FHT @ 0x50003400
1,171,961 UART: [idev] ++
1,172,129 UART: [idev] CDI.KEYID = 6
1,172,490 UART: [idev] SUBJECT.KEYID = 7
1,172,915 UART: [idev] UDS.KEYID = 0
1,180,785 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,026 UART: [ldev] ++
1,208,194 UART: [ldev] CDI.KEYID = 6
1,208,558 UART: [ldev] SUBJECT.KEYID = 5
1,208,985 UART: [ldev] AUTHORITY.KEYID = 7
1,209,448 UART: [ldev] FE.KEYID = 1
1,214,626 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,194 UART: [ldev] --
1,279,518 UART: [fwproc] Wait for Commands...
1,280,193 UART: [fwproc] Recv command 0x46574c44
1,280,926 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,574,879 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,012 >>> mbox cmd response: success
2,737,233 UART: [afmc] ++
2,737,401 UART: [afmc] CDI.KEYID = 6
2,737,764 UART: [afmc] SUBJECT.KEYID = 7
2,738,190 UART: [afmc] AUTHORITY.KEYID = 5
2,773,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,319 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,797,039 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,802,931 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,808,625 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,816,404 UART: [afmc] --
2,817,266 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,288 UART: [cold-reset] --
2,818,254 UART: [state] Locking Datavault
2,819,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,149 UART: [state] Locking ICCM
2,820,749 UART: [exit] Launching FMC @ 0x40000000
2,826,046 UART:
2,826,062 UART: Running Caliptra FMC ...
2,826,470 UART:
2,826,700 UART: [fmc] Received command: 0x10000000
2,828,869 >>> mbox cmd response data (224 bytes)
2,828,870 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,828,899 UART: [fmc] Received command: 0x10000006
2,846,916 >>> mbox cmd response data (1536 bytes)
2,846,917 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,846,945 UART: [fmc] Received command: 0x46574C44
2,847,771 UART:
2,847,787 UART: Running Caliptra ROM ...
2,848,195 UART:
2,848,250 UART: [state] CFI Enabled
2,851,150 UART: [state] LifecycleState = Unprovisioned
2,851,805 UART: [state] DebugLocked = No
2,852,525 UART: [state] WD Timer not started. Device not locked for debugging
2,853,677 UART: [kat] SHA2-256
3,657,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,356 UART: [kat] ++
3,661,508 UART: [kat] sha1
3,665,576 UART: [kat] SHA2-256
3,667,516 UART: [kat] SHA2-384
3,670,171 UART: [kat] SHA2-512-ACC
3,672,071 UART: [kat] ECC-384
3,681,978 UART: [kat] HMAC-384Kdf
3,686,724 UART: [kat] LMS
3,935,036 UART: [kat] --
3,936,064 UART: [update-reset] ++
5,217,632 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,218,699 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,366,339 >>> mbox cmd response: success
5,366,570 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,584 UART: [update-reset Success] --
5,374,993 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,375,599 UART: [state] Locking Datavault
5,376,365 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,969 UART: [state] Locking ICCM
5,377,593 UART: [exit] Launching FMC @ 0x40000000
5,382,890 UART:
5,382,906 UART: Running Caliptra FMC ...
5,383,314 UART:
5,383,536 UART: [fmc] Received command: 0x10000000
5,385,705 >>> mbox cmd response data (224 bytes)
5,385,706 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,385,735 UART: [fmc] Received command: 0x10000006
5,403,752 >>> mbox cmd response data (1536 bytes)
5,403,753 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,403,781 UART: [fmc] Received command: 0x10000007
5,404,573 >>> mbox cmd response data (4 bytes)
5,404,574 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,404,602 UART: [fmc] Received command: 0x10000006
5,422,619 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,808 >>> mbox cmd response: success
2,642,446 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,648,721 UART:
2,648,737 UART: Running Caliptra FMC ...
2,649,145 UART:
2,649,375 UART: [fmc] Received command: 0x10000000
2,651,544 >>> mbox cmd response data (224 bytes)
2,651,545 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,651,574 UART: [fmc] Received command: 0x10000006
2,669,591 >>> mbox cmd response data (1536 bytes)
2,669,592 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,669,620 UART: [fmc] Received command: 0x46574C44
5,069,319 >>> mbox cmd response: success
5,076,821 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,082,777 UART:
5,082,793 UART: Running Caliptra FMC ...
5,083,201 UART:
5,083,423 UART: [fmc] Received command: 0x10000000
5,085,592 >>> mbox cmd response data (224 bytes)
5,085,593 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,085,622 UART: [fmc] Received command: 0x10000006
5,103,639 >>> mbox cmd response data (1536 bytes)
5,103,640 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,103,668 UART: [fmc] Received command: 0x10000007
5,104,460 >>> mbox cmd response data (4 bytes)
5,104,461 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,104,489 UART: [fmc] Received command: 0x10000006
5,122,506 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,677 UART: [state] LifecycleState = Unprovisioned
85,332 UART: [state] DebugLocked = No
85,882 UART: [state] WD Timer not started. Device not locked for debugging
87,049 UART: [kat] SHA2-256
890,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,728 UART: [kat] ++
894,880 UART: [kat] sha1
899,158 UART: [kat] SHA2-256
901,098 UART: [kat] SHA2-384
903,847 UART: [kat] SHA2-512-ACC
905,748 UART: [kat] ECC-384
915,369 UART: [kat] HMAC-384Kdf
920,003 UART: [kat] LMS
1,168,315 UART: [kat] --
1,169,566 UART: [cold-reset] ++
1,169,970 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,724 UART: [idev] Erasing UDS.KEYID = 0
1,198,642 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,385 UART: [ldev] ++
1,208,553 UART: [ldev] CDI.KEYID = 6
1,208,917 UART: [ldev] SUBJECT.KEYID = 5
1,209,344 UART: [ldev] AUTHORITY.KEYID = 7
1,209,807 UART: [ldev] FE.KEYID = 1
1,215,095 UART: [ldev] Erasing FE.KEYID = 1
1,241,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,275 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,208 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,389 >>> mbox cmd response: success
2,739,602 UART: [afmc] ++
2,739,770 UART: [afmc] CDI.KEYID = 6
2,740,133 UART: [afmc] SUBJECT.KEYID = 7
2,740,559 UART: [afmc] AUTHORITY.KEYID = 5
2,776,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,762 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,482 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,374 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,068 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,818,885 UART: [afmc] --
2,819,901 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,923 UART: [cold-reset] --
2,820,715 UART: [state] Locking Datavault
2,821,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,238 UART: [state] Locking ICCM
2,822,726 UART: [exit] Launching FMC @ 0x40000000
2,828,023 UART:
2,828,039 UART: Running Caliptra FMC ...
2,828,447 UART:
2,828,677 UART: [fmc] Received command: 0x10000000
2,830,846 >>> mbox cmd response data (224 bytes)
2,830,847 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,830,876 UART: [fmc] Received command: 0x10000006
2,848,893 >>> mbox cmd response data (1536 bytes)
2,848,894 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,848,922 UART: [fmc] Received command: 0x46574C44
2,849,748 UART:
2,849,764 UART: Running Caliptra ROM ...
2,850,172 UART:
2,850,314 UART: [state] CFI Enabled
2,853,190 UART: [state] LifecycleState = Unprovisioned
2,853,845 UART: [state] DebugLocked = No
2,854,447 UART: [state] WD Timer not started. Device not locked for debugging
2,855,779 UART: [kat] SHA2-256
3,659,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,458 UART: [kat] ++
3,663,610 UART: [kat] sha1
3,667,962 UART: [kat] SHA2-256
3,669,902 UART: [kat] SHA2-384
3,672,563 UART: [kat] SHA2-512-ACC
3,674,463 UART: [kat] ECC-384
3,684,358 UART: [kat] HMAC-384Kdf
3,689,144 UART: [kat] LMS
3,937,456 UART: [kat] --
3,938,510 UART: [update-reset] ++
5,219,164 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,220,287 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,367,927 >>> mbox cmd response: success
5,368,174 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,188 UART: [update-reset Success] --
5,376,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,377,287 UART: [state] Locking Datavault
5,378,219 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,823 UART: [state] Locking ICCM
5,379,485 UART: [exit] Launching FMC @ 0x40000000
5,384,782 UART:
5,384,798 UART: Running Caliptra FMC ...
5,385,206 UART:
5,385,428 UART: [fmc] Received command: 0x10000000
5,387,597 >>> mbox cmd response data (224 bytes)
5,387,598 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,387,627 UART: [fmc] Received command: 0x10000006
5,405,644 >>> mbox cmd response data (1536 bytes)
5,405,645 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,405,673 UART: [fmc] Received command: 0x10000007
5,406,465 >>> mbox cmd response data (4 bytes)
5,406,466 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,406,494 UART: [fmc] Received command: 0x10000006
5,424,511 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,255 >>> mbox cmd response: success
2,643,677 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,900 UART:
2,649,916 UART: Running Caliptra FMC ...
2,650,324 UART:
2,650,554 UART: [fmc] Received command: 0x10000000
2,652,723 >>> mbox cmd response data (224 bytes)
2,652,724 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,753 UART: [fmc] Received command: 0x10000006
2,670,770 >>> mbox cmd response data (1536 bytes)
2,670,771 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,670,799 UART: [fmc] Received command: 0x46574C44
5,070,407 >>> mbox cmd response: success
5,077,907 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,083,527 UART:
5,083,543 UART: Running Caliptra FMC ...
5,083,951 UART:
5,084,173 UART: [fmc] Received command: 0x10000000
5,086,342 >>> mbox cmd response data (224 bytes)
5,086,343 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,086,372 UART: [fmc] Received command: 0x10000006
5,104,389 >>> mbox cmd response data (1536 bytes)
5,104,390 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,104,418 UART: [fmc] Received command: 0x10000007
5,105,210 >>> mbox cmd response data (4 bytes)
5,105,211 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,105,239 UART: [fmc] Received command: 0x10000006
5,123,256 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
85,917 UART: [state] WD Timer not started. Device not locked for debugging
87,130 UART: [kat] SHA2-256
890,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,809 UART: [kat] ++
894,961 UART: [kat] sha1
899,223 UART: [kat] SHA2-256
901,163 UART: [kat] SHA2-384
903,926 UART: [kat] SHA2-512-ACC
905,827 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,772 UART: [ldev] ++
1,208,940 UART: [ldev] CDI.KEYID = 6
1,209,304 UART: [ldev] SUBJECT.KEYID = 5
1,209,731 UART: [ldev] AUTHORITY.KEYID = 7
1,210,194 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,482 UART: [fwproc] Wait for Commands...
1,281,075 UART: [fwproc] Recv command 0x46574c44
1,281,808 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,823 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,886 >>> mbox cmd response: success
2,738,043 UART: [afmc] ++
2,738,211 UART: [afmc] CDI.KEYID = 6
2,738,574 UART: [afmc] SUBJECT.KEYID = 7
2,739,000 UART: [afmc] AUTHORITY.KEYID = 5
2,775,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,937 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,797,657 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,803,549 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,809,243 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,817,012 UART: [afmc] --
2,817,920 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,942 UART: [cold-reset] --
2,818,730 UART: [state] Locking Datavault
2,820,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,831 UART: [state] Locking ICCM
2,821,261 UART: [exit] Launching FMC @ 0x40000000
2,826,558 UART:
2,826,574 UART: Running Caliptra FMC ...
2,826,982 UART:
2,827,212 UART: [fmc] Received command: 0x10000000
2,829,381 >>> mbox cmd response data (224 bytes)
2,829,382 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,829,411 UART: [fmc] Received command: 0x10000006
2,847,428 >>> mbox cmd response data (1536 bytes)
2,847,429 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,847,457 UART: [fmc] Received command: 0x46574C44
2,848,283 UART:
2,848,299 UART: Running Caliptra ROM ...
2,848,707 UART:
2,848,762 UART: [state] CFI Enabled
2,851,734 UART: [state] LifecycleState = Unprovisioned
2,852,389 UART: [state] DebugLocked = No
2,853,095 UART: [state] WD Timer not started. Device not locked for debugging
2,854,379 UART: [kat] SHA2-256
3,657,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,058 UART: [kat] ++
3,662,210 UART: [kat] sha1
3,666,334 UART: [kat] SHA2-256
3,668,274 UART: [kat] SHA2-384
3,671,093 UART: [kat] SHA2-512-ACC
3,672,993 UART: [kat] ECC-384
3,682,472 UART: [kat] HMAC-384Kdf
3,687,030 UART: [kat] LMS
3,935,342 UART: [kat] --
3,936,158 UART: [update-reset] ++
5,217,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,218,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,366,559 >>> mbox cmd response: success
5,366,786 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,800 UART: [update-reset Success] --
5,375,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,376,041 UART: [state] Locking Datavault
5,376,635 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,239 UART: [state] Locking ICCM
5,377,661 UART: [exit] Launching FMC @ 0x40000000
5,382,958 UART:
5,382,974 UART: Running Caliptra FMC ...
5,383,382 UART:
5,383,604 UART: [fmc] Received command: 0x10000000
5,385,773 >>> mbox cmd response data (224 bytes)
5,385,774 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,385,803 UART: [fmc] Received command: 0x10000006
5,403,820 >>> mbox cmd response data (1536 bytes)
5,403,821 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,403,849 UART: [fmc] Received command: 0x10000007
5,404,641 >>> mbox cmd response data (4 bytes)
5,404,642 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,404,670 UART: [fmc] Received command: 0x10000006
5,422,687 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,512 >>> mbox cmd response: success
2,641,588 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,648,057 UART:
2,648,073 UART: Running Caliptra FMC ...
2,648,481 UART:
2,648,711 UART: [fmc] Received command: 0x10000000
2,650,880 >>> mbox cmd response data (224 bytes)
2,650,881 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,650,910 UART: [fmc] Received command: 0x10000006
2,668,927 >>> mbox cmd response data (1536 bytes)
2,668,928 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,668,956 UART: [fmc] Received command: 0x46574C44
5,068,515 >>> mbox cmd response: success
5,076,135 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,081,859 UART:
5,081,875 UART: Running Caliptra FMC ...
5,082,283 UART:
5,082,505 UART: [fmc] Received command: 0x10000000
5,084,674 >>> mbox cmd response data (224 bytes)
5,084,675 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,084,704 UART: [fmc] Received command: 0x10000006
5,102,721 >>> mbox cmd response data (1536 bytes)
5,102,722 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,102,750 UART: [fmc] Received command: 0x10000007
5,103,542 >>> mbox cmd response data (4 bytes)
5,103,543 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,103,571 UART: [fmc] Received command: 0x10000006
5,121,588 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,441 UART: [kat] SHA2-256
891,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,120 UART: [kat] ++
896,272 UART: [kat] sha1
900,642 UART: [kat] SHA2-256
902,582 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
916,819 UART: [kat] HMAC-384Kdf
921,509 UART: [kat] LMS
1,169,821 UART: [kat] --
1,170,718 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,874 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,587 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,590 UART: [fwproc] Recv command 0x46574c44
1,284,323 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,576,678 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,747 >>> mbox cmd response: success
2,738,870 UART: [afmc] ++
2,739,038 UART: [afmc] CDI.KEYID = 6
2,739,401 UART: [afmc] SUBJECT.KEYID = 7
2,739,827 UART: [afmc] AUTHORITY.KEYID = 5
2,775,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,996 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,798,716 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,804,608 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,810,302 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,817,989 UART: [afmc] --
2,819,071 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,093 UART: [cold-reset] --
2,819,983 UART: [state] Locking Datavault
2,821,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,658 UART: [state] Locking ICCM
2,822,170 UART: [exit] Launching FMC @ 0x40000000
2,827,467 UART:
2,827,483 UART: Running Caliptra FMC ...
2,827,891 UART:
2,828,121 UART: [fmc] Received command: 0x10000000
2,830,290 >>> mbox cmd response data (224 bytes)
2,830,291 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,830,320 UART: [fmc] Received command: 0x10000006
2,848,337 >>> mbox cmd response data (1536 bytes)
2,848,338 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,848,366 UART: [fmc] Received command: 0x46574C44
2,849,192 UART:
2,849,208 UART: Running Caliptra ROM ...
2,849,616 UART:
2,849,758 UART: [state] CFI Enabled
2,852,234 UART: [state] LifecycleState = Unprovisioned
2,852,889 UART: [state] DebugLocked = No
2,853,625 UART: [state] WD Timer not started. Device not locked for debugging
2,854,807 UART: [kat] SHA2-256
3,658,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,486 UART: [kat] ++
3,662,638 UART: [kat] sha1
3,666,740 UART: [kat] SHA2-256
3,668,680 UART: [kat] SHA2-384
3,671,645 UART: [kat] SHA2-512-ACC
3,673,545 UART: [kat] ECC-384
3,683,276 UART: [kat] HMAC-384Kdf
3,688,038 UART: [kat] LMS
3,936,350 UART: [kat] --
3,937,104 UART: [update-reset] ++
5,216,490 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,217,479 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,365,119 >>> mbox cmd response: success
5,365,326 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,340 UART: [update-reset Success] --
5,373,749 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,374,429 UART: [state] Locking Datavault
5,375,179 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,783 UART: [state] Locking ICCM
5,376,395 UART: [exit] Launching FMC @ 0x40000000
5,381,692 UART:
5,381,708 UART: Running Caliptra FMC ...
5,382,116 UART:
5,382,338 UART: [fmc] Received command: 0x10000000
5,384,507 >>> mbox cmd response data (224 bytes)
5,384,508 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,384,537 UART: [fmc] Received command: 0x10000006
5,402,554 >>> mbox cmd response data (1536 bytes)
5,402,555 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,402,583 UART: [fmc] Received command: 0x10000007
5,403,375 >>> mbox cmd response data (4 bytes)
5,403,376 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,403,404 UART: [fmc] Received command: 0x10000006
5,421,421 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,997 >>> mbox cmd response: success
2,643,309 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,420 UART:
2,649,436 UART: Running Caliptra FMC ...
2,649,844 UART:
2,650,074 UART: [fmc] Received command: 0x10000000
2,652,243 >>> mbox cmd response data (224 bytes)
2,652,244 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,273 UART: [fmc] Received command: 0x10000006
2,670,290 >>> mbox cmd response data (1536 bytes)
2,670,291 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,670,319 UART: [fmc] Received command: 0x46574C44
5,069,879 >>> mbox cmd response: success
5,077,429 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,083,543 UART:
5,083,559 UART: Running Caliptra FMC ...
5,083,967 UART:
5,084,189 UART: [fmc] Received command: 0x10000000
5,086,358 >>> mbox cmd response data (224 bytes)
5,086,359 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,086,388 UART: [fmc] Received command: 0x10000006
5,104,405 >>> mbox cmd response data (1536 bytes)
5,104,406 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,104,434 UART: [fmc] Received command: 0x10000007
5,105,226 >>> mbox cmd response data (4 bytes)
5,105,227 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,105,255 UART: [fmc] Received command: 0x10000006
5,123,272 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,054,712 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,195,623 UART:
2,196,025 UART: Running Caliptra ROM ...
2,197,143 UART:
2,197,311 UART: [state] CFI Enabled
2,198,285 UART: [state] LifecycleState = Unprovisioned
2,199,941 UART: [state] DebugLocked = No
2,201,046 UART: [state] WD Timer not started. Device not locked for debugging
2,203,510 UART: [kat] SHA2-256
2,204,176 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,179 UART: [kat] ++
2,207,651 UART: [kat] sha1
2,208,166 UART: [kat] SHA2-256
2,208,905 UART: [kat] SHA2-384
2,209,570 UART: [kat] SHA2-512-ACC
2,210,397 UART: [kat] ECC-384
3,776,178 UART: [kat] HMAC-384Kdf
3,801,272 UART: [kat] LMS
4,874,453 UART: [kat] --
4,877,797 UART: [cold-reset] ++
4,880,010 UART: [fht] FHT @ 0x50003400
4,891,159 UART: [idev] ++
4,891,844 UART: [idev] CDI.KEYID = 6
4,893,076 UART: [idev] SUBJECT.KEYID = 7
4,894,185 UART: [idev] UDS.KEYID = 0
4,928,766 UART: [idev] Erasing UDS.KEYID = 0
8,243,598 UART: [idev] Sha1 KeyId Algorithm
8,266,901 UART: [idev] --
8,270,681 UART: [ldev] ++
8,271,253 UART: [ldev] CDI.KEYID = 6
8,272,617 UART: [ldev] SUBJECT.KEYID = 5
8,273,655 UART: [ldev] AUTHORITY.KEYID = 7
8,274,885 UART: [ldev] FE.KEYID = 1
8,318,300 UART: [ldev] Erasing FE.KEYID = 1
11,651,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,384 UART: [ldev] --
14,017,487 UART: [fwproc] Wait for Commands...
14,019,961 UART: [fwproc] Recv command 0x46574c44
14,022,278 UART: [fwproc] Recv'd Img size: 111324 bytes
18,060,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,133,165 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,193,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,508,376 >>> mbox cmd response: success
18,512,939 UART: [afmc] ++
18,513,529 UART: [afmc] CDI.KEYID = 6
18,514,638 UART: [afmc] SUBJECT.KEYID = 7
18,515,854 UART: [afmc] AUTHORITY.KEYID = 5
21,883,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,184,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,186,565 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,202,610 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,218,668 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,234,589 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,257,844 UART: [afmc] --
24,261,124 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,261,526 UART: [cold-reset] --
24,264,286 UART: [state] Locking Datavault
24,269,323 UART: [state] Locking PCR0, PCR1 and PCR31
24,270,972 UART: [state] Locking ICCM
24,273,103 UART: [exit] Launching FMC @ 0x40000000
24,281,718 UART:
24,281,957 UART: Running Caliptra FMC ...
24,282,983 UART:
24,283,130 UART: [fmc] Received command: 0x10000000
24,285,642 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,057,742 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,303,933 >>> mbox cmd response: success
23,981,165 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,996,742 UART:
23,997,074 UART: Running Caliptra FMC ...
23,998,250 UART:
23,998,414 UART: [fmc] Received command: 0x10000000
24,000,690 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
2,067,143 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,207,970 UART:
2,208,386 UART: Running Caliptra ROM ...
2,209,549 UART:
2,209,721 UART: [state] CFI Enabled
2,210,678 UART: [state] LifecycleState = Unprovisioned
2,212,330 UART: [state] DebugLocked = No
2,213,431 UART: [state] WD Timer not started. Device not locked for debugging
2,215,893 UART: [kat] SHA2-256
2,216,556 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,551 UART: [kat] ++
2,219,996 UART: [kat] sha1
2,220,503 UART: [kat] SHA2-256
2,221,233 UART: [kat] SHA2-384
2,221,891 UART: [kat] SHA2-512-ACC
2,222,781 UART: [kat] ECC-384
4,093,121 UART: [kat] HMAC-384Kdf
4,105,042 UART: [kat] LMS
5,178,159 UART: [kat] --
5,183,890 UART: [cold-reset] ++
5,186,189 UART: [fht] FHT @ 0x50003400
5,197,770 UART: [idev] ++
5,198,446 UART: [idev] CDI.KEYID = 6
5,199,679 UART: [idev] SUBJECT.KEYID = 7
5,201,107 UART: [idev] UDS.KEYID = 0
5,218,208 UART: [idev] Erasing UDS.KEYID = 0
8,490,753 UART: [idev] Sha1 KeyId Algorithm
8,513,131 UART: [idev] --
8,517,829 UART: [ldev] ++
8,518,392 UART: [ldev] CDI.KEYID = 6
8,519,629 UART: [ldev] SUBJECT.KEYID = 5
8,521,029 UART: [ldev] AUTHORITY.KEYID = 7
8,522,640 UART: [ldev] FE.KEYID = 1
8,533,961 UART: [ldev] Erasing FE.KEYID = 1
11,825,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,738 UART: [ldev] --
14,191,781 UART: [fwproc] Wait for Commands...
14,194,367 UART: [fwproc] Recv command 0x46574c44
14,196,675 UART: [fwproc] Recv'd Img size: 111324 bytes
18,245,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,315,773 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,376,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,690,971 >>> mbox cmd response: success
18,695,060 UART: [afmc] ++
18,695,651 UART: [afmc] CDI.KEYID = 6
18,696,887 UART: [afmc] SUBJECT.KEYID = 7
18,697,983 UART: [afmc] AUTHORITY.KEYID = 5
22,017,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,312,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,315,202 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,331,251 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,347,344 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,363,221 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,386,287 UART: [afmc] --
24,389,929 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,390,300 UART: [cold-reset] --
24,393,918 UART: [state] Locking Datavault
24,399,211 UART: [state] Locking PCR0, PCR1 and PCR31
24,400,897 UART: [state] Locking ICCM
24,402,301 UART: [exit] Launching FMC @ 0x40000000
24,410,908 UART:
24,411,135 UART: Running Caliptra FMC ...
24,412,227 UART:
24,412,380 UART: [fmc] Received command: 0x10000000
24,414,886 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,061,534 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,493,302 >>> mbox cmd response: success
24,119,882 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,136,153 UART:
24,136,521 UART: Running Caliptra FMC ...
24,137,711 UART:
24,137,905 UART: [fmc] Received command: 0x10000000
24,140,115 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,056,828 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,198,150 UART:
2,198,573 UART: Running Caliptra ROM ...
2,199,740 UART:
2,199,910 UART: [state] CFI Enabled
2,200,905 UART: [state] LifecycleState = Unprovisioned
2,202,557 UART: [state] DebugLocked = No
2,203,664 UART: [state] WD Timer not started. Device not locked for debugging
2,206,136 UART: [kat] SHA2-256
2,206,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,817 UART: [kat] ++
2,210,266 UART: [kat] sha1
2,210,825 UART: [kat] SHA2-256
2,211,480 UART: [kat] SHA2-384
2,212,133 UART: [kat] SHA2-512-ACC
2,212,976 UART: [kat] ECC-384
2,951,378 UART: [kat] HMAC-384Kdf
2,972,690 UART: [kat] LMS
3,502,143 UART: [kat] --
3,504,731 UART: [cold-reset] ++
3,507,255 UART: [fht] FHT @ 0x50003400
3,518,414 UART: [idev] ++
3,518,984 UART: [idev] CDI.KEYID = 6
3,519,949 UART: [idev] SUBJECT.KEYID = 7
3,521,109 UART: [idev] UDS.KEYID = 0
3,544,918 UART: [idev] Erasing UDS.KEYID = 0
6,025,170 UART: [idev] Sha1 KeyId Algorithm
6,046,890 UART: [idev] --
6,051,503 UART: [ldev] ++
6,052,082 UART: [ldev] CDI.KEYID = 6
6,052,993 UART: [ldev] SUBJECT.KEYID = 5
6,054,210 UART: [ldev] AUTHORITY.KEYID = 7
6,055,447 UART: [ldev] FE.KEYID = 1
6,100,177 UART: [ldev] Erasing FE.KEYID = 1
8,604,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,488 UART: [ldev] --
10,398,890 UART: [fwproc] Wait for Commands...
10,400,454 UART: [fwproc] Recv command 0x46574c44
10,402,563 UART: [fwproc] Recv'd Img size: 111668 bytes
13,774,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,844,125 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,904,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,221,141 >>> mbox cmd response: success
14,226,116 UART: [afmc] ++
14,226,716 UART: [afmc] CDI.KEYID = 6
14,227,606 UART: [afmc] SUBJECT.KEYID = 7
14,228,826 UART: [afmc] AUTHORITY.KEYID = 5
16,767,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,288 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,508,284 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,524,284 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,540,004 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,562,088 UART: [afmc] --
18,565,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,565,971 UART: [cold-reset] --
18,569,485 UART: [state] Locking Datavault
18,576,240 UART: [state] Locking PCR0, PCR1 and PCR31
18,577,886 UART: [state] Locking ICCM
18,579,558 UART: [exit] Launching FMC @ 0x40000000
18,587,958 UART:
18,588,196 UART: Running Caliptra FMC ...
18,589,299 UART:
18,589,452 UART: [fmc] Received command: 0x10000000
18,591,862 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,066,876 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
13,991,909 >>> mbox cmd response: success
18,264,843 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,282,142 UART:
18,282,489 UART: Running Caliptra FMC ...
18,283,677 UART:
18,283,862 UART: [fmc] Received command: 0x10000000
18,286,141 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,060,150 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,201,556 UART:
2,201,965 UART: Running Caliptra ROM ...
2,203,129 UART:
2,203,301 UART: [state] CFI Enabled
2,204,281 UART: [state] LifecycleState = Unprovisioned
2,205,926 UART: [state] DebugLocked = No
2,207,034 UART: [state] WD Timer not started. Device not locked for debugging
2,209,512 UART: [kat] SHA2-256
2,210,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,189 UART: [kat] ++
2,213,641 UART: [kat] sha1
2,214,153 UART: [kat] SHA2-256
2,214,902 UART: [kat] SHA2-384
2,215,565 UART: [kat] SHA2-512-ACC
2,216,444 UART: [kat] ECC-384
3,281,286 UART: [kat] HMAC-384Kdf
3,294,639 UART: [kat] LMS
3,824,127 UART: [kat] --
3,828,509 UART: [cold-reset] ++
3,830,325 UART: [fht] FHT @ 0x50003400
3,841,949 UART: [idev] ++
3,842,505 UART: [idev] CDI.KEYID = 6
3,843,437 UART: [idev] SUBJECT.KEYID = 7
3,844,645 UART: [idev] UDS.KEYID = 0
3,858,173 UART: [idev] Erasing UDS.KEYID = 0
6,313,741 UART: [idev] Sha1 KeyId Algorithm
6,336,814 UART: [idev] --
6,341,275 UART: [ldev] ++
6,341,847 UART: [ldev] CDI.KEYID = 6
6,342,725 UART: [ldev] SUBJECT.KEYID = 5
6,343,938 UART: [ldev] AUTHORITY.KEYID = 7
6,345,244 UART: [ldev] FE.KEYID = 1
6,356,239 UART: [ldev] Erasing FE.KEYID = 1
8,832,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,809 UART: [ldev] --
10,622,091 UART: [fwproc] Wait for Commands...
10,623,645 UART: [fwproc] Recv command 0x46574c44
10,625,742 UART: [fwproc] Recv'd Img size: 111668 bytes
13,983,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,059,269 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,119,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,437,208 >>> mbox cmd response: success
14,441,378 UART: [afmc] ++
14,441,985 UART: [afmc] CDI.KEYID = 6
14,442,868 UART: [afmc] SUBJECT.KEYID = 7
14,443,974 UART: [afmc] AUTHORITY.KEYID = 5
16,944,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,421 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,682,417 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,698,353 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,714,074 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,736,326 UART: [afmc] --
18,739,936 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,740,306 UART: [cold-reset] --
18,743,496 UART: [state] Locking Datavault
18,748,090 UART: [state] Locking PCR0, PCR1 and PCR31
18,749,735 UART: [state] Locking ICCM
18,752,154 UART: [exit] Launching FMC @ 0x40000000
18,760,562 UART:
18,760,798 UART: Running Caliptra FMC ...
18,761,895 UART:
18,762,048 UART: [fmc] Received command: 0x10000000
18,764,458 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
2,061,322 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,223,083 >>> mbox cmd response: success
18,452,862 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,468,560 UART:
18,468,902 UART: Running Caliptra FMC ...
18,470,080 UART:
18,470,256 UART: [fmc] Received command: 0x10000000
18,472,567 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,066,110 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,207,447 UART:
2,207,881 UART: Running Caliptra ROM ...
2,209,063 UART:
2,209,238 UART: [state] CFI Enabled
2,210,212 UART: [state] LifecycleState = Unprovisioned
2,211,855 UART: [state] DebugLocked = No
2,212,961 UART: [state] WD Timer not started. Device not locked for debugging
2,215,432 UART: [kat] SHA2-256
2,216,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,147 UART: [kat] ++
2,219,650 UART: [kat] sha1
2,220,170 UART: [kat] SHA2-256
2,220,829 UART: [kat] SHA2-384
2,221,484 UART: [kat] SHA2-512-ACC
2,222,280 UART: [kat] ECC-384
2,945,411 UART: [kat] HMAC-384Kdf
2,971,584 UART: [kat] LMS
3,501,009 UART: [kat] --
3,504,956 UART: [cold-reset] ++
3,507,429 UART: [fht] FHT @ 0x50003400
3,518,733 UART: [idev] ++
3,519,299 UART: [idev] CDI.KEYID = 6
3,520,224 UART: [idev] SUBJECT.KEYID = 7
3,521,443 UART: [idev] UDS.KEYID = 0
3,543,391 UART: [idev] Erasing UDS.KEYID = 0
6,026,883 UART: [idev] Sha1 KeyId Algorithm
6,049,725 UART: [idev] --
6,053,832 UART: [ldev] ++
6,054,409 UART: [ldev] CDI.KEYID = 6
6,055,323 UART: [ldev] SUBJECT.KEYID = 5
6,056,483 UART: [ldev] AUTHORITY.KEYID = 7
6,057,716 UART: [ldev] FE.KEYID = 1
6,098,715 UART: [ldev] Erasing FE.KEYID = 1
8,604,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,210 UART: [ldev] --
10,413,756 UART: [fwproc] Wait for Commands...
10,415,451 UART: [fwproc] Recv command 0x46574c44
10,417,556 UART: [fwproc] Recv'd Img size: 111668 bytes
13,785,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,862,268 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,239,867 >>> mbox cmd response: success
14,244,096 UART: [afmc] ++
14,244,711 UART: [afmc] CDI.KEYID = 6
14,245,624 UART: [afmc] SUBJECT.KEYID = 7
14,246,794 UART: [afmc] AUTHORITY.KEYID = 5
16,786,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,754 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,524,743 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,540,695 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,556,466 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,579,878 UART: [afmc] --
18,583,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,583,436 UART: [cold-reset] --
18,585,873 UART: [state] Locking Datavault
18,592,306 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,951 UART: [state] Locking ICCM
18,595,183 UART: [exit] Launching FMC @ 0x40000000
18,603,580 UART:
18,603,822 UART: Running Caliptra FMC ...
18,604,926 UART:
18,605,088 UART: [fmc] Received command: 0x10000000
18,607,486 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,060,417 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
13,997,693 >>> mbox cmd response: success
18,261,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,277,859 UART:
18,278,195 UART: Running Caliptra FMC ...
18,279,301 UART:
18,279,464 UART: [fmc] Received command: 0x10000000
18,281,876 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,315 writing to cptra_bootfsm_go
2,061,510 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,202,807 UART:
2,203,228 UART: Running Caliptra ROM ...
2,204,317 UART:
2,204,473 UART: [state] CFI Enabled
2,205,460 UART: [state] LifecycleState = Unprovisioned
2,207,107 UART: [state] DebugLocked = No
2,208,128 UART: [state] WD Timer not started. Device not locked for debugging
2,210,594 UART: [kat] SHA2-256
2,211,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,257 UART: [kat] ++
2,214,704 UART: [kat] sha1
2,215,212 UART: [kat] SHA2-256
2,215,868 UART: [kat] SHA2-384
2,216,521 UART: [kat] SHA2-512-ACC
2,217,340 UART: [kat] ECC-384
3,284,697 UART: [kat] HMAC-384Kdf
3,298,060 UART: [kat] LMS
3,827,525 UART: [kat] --
3,832,618 UART: [cold-reset] ++
3,834,498 UART: [fht] FHT @ 0x50003400
3,844,888 UART: [idev] ++
3,845,500 UART: [idev] CDI.KEYID = 6
3,846,565 UART: [idev] SUBJECT.KEYID = 7
3,847,669 UART: [idev] UDS.KEYID = 0
3,862,687 UART: [idev] Erasing UDS.KEYID = 0
6,318,677 UART: [idev] Sha1 KeyId Algorithm
6,340,682 UART: [idev] --
6,345,028 UART: [ldev] ++
6,345,605 UART: [ldev] CDI.KEYID = 6
6,346,516 UART: [ldev] SUBJECT.KEYID = 5
6,347,692 UART: [ldev] AUTHORITY.KEYID = 7
6,348,922 UART: [ldev] FE.KEYID = 1
6,358,248 UART: [ldev] Erasing FE.KEYID = 1
8,833,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,564 UART: [ldev] --
10,623,374 UART: [fwproc] Wait for Commands...
10,624,873 UART: [fwproc] Recv command 0x46574c44
10,626,964 UART: [fwproc] Recv'd Img size: 111668 bytes
13,997,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,074,611 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,134,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,452,404 >>> mbox cmd response: success
14,456,122 UART: [afmc] ++
14,456,712 UART: [afmc] CDI.KEYID = 6
14,457,619 UART: [afmc] SUBJECT.KEYID = 7
14,458,833 UART: [afmc] AUTHORITY.KEYID = 5
16,963,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,688,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,690,398 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,706,350 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,722,339 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,738,086 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,761,319 UART: [afmc] --
18,764,872 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,765,237 UART: [cold-reset] --
18,768,593 UART: [state] Locking Datavault
18,774,272 UART: [state] Locking PCR0, PCR1 and PCR31
18,775,913 UART: [state] Locking ICCM
18,777,107 UART: [exit] Launching FMC @ 0x40000000
18,785,501 UART:
18,785,774 UART: Running Caliptra FMC ...
18,786,814 UART:
18,786,961 UART: [fmc] Received command: 0x10000000
18,789,392 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,062,121 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,216,529 >>> mbox cmd response: success
18,451,259 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,464,154 UART:
18,464,488 UART: Running Caliptra FMC ...
18,465,676 UART:
18,465,844 UART: [fmc] Received command: 0x10000000
18,468,164 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,230 UART: [ldev] ++
1,208,398 UART: [ldev] CDI.KEYID = 6
1,208,762 UART: [ldev] SUBJECT.KEYID = 5
1,209,189 UART: [ldev] AUTHORITY.KEYID = 7
1,209,652 UART: [ldev] FE.KEYID = 1
1,214,730 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,754 UART: [ldev] --
1,280,166 UART: [fwproc] Wait for Commands...
1,280,879 UART: [fwproc] Recv command 0x46574c44
1,281,612 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,211 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,258 >>> mbox cmd response: success
2,737,495 UART: [afmc] ++
2,737,663 UART: [afmc] CDI.KEYID = 6
2,738,026 UART: [afmc] SUBJECT.KEYID = 7
2,738,452 UART: [afmc] AUTHORITY.KEYID = 5
2,774,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,870 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,796,576 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,802,463 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,808,182 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,816,128 UART: [afmc] --
2,817,202 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,224 UART: [cold-reset] --
2,818,010 UART: [state] Locking Datavault
2,818,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,601 UART: [state] Locking ICCM
2,820,093 UART: [exit] Launching FMC @ 0x40000000
2,825,390 UART:
2,825,406 UART: Running Caliptra FMC ...
2,825,814 UART:
2,826,044 UART: [fmc] Received command: 0x10000000
2,828,213 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,416 >>> mbox cmd response: success
2,643,899 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,990 UART:
2,650,006 UART: Running Caliptra FMC ...
2,650,414 UART:
2,650,644 UART: [fmc] Received command: 0x10000000
2,652,813 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,164 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,989 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,168 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,429 >>> mbox cmd response: success
2,739,640 UART: [afmc] ++
2,739,808 UART: [afmc] CDI.KEYID = 6
2,740,171 UART: [afmc] SUBJECT.KEYID = 7
2,740,597 UART: [afmc] AUTHORITY.KEYID = 5
2,776,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,495 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,799,201 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,805,088 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,810,807 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,818,649 UART: [afmc] --
2,819,533 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,555 UART: [cold-reset] --
2,820,253 UART: [state] Locking Datavault
2,821,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,068 UART: [state] Locking ICCM
2,822,694 UART: [exit] Launching FMC @ 0x40000000
2,827,991 UART:
2,828,007 UART: Running Caliptra FMC ...
2,828,415 UART:
2,828,645 UART: [fmc] Received command: 0x10000000
2,830,814 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,589,479 >>> mbox cmd response: success
2,645,416 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,621 UART:
2,651,637 UART: Running Caliptra FMC ...
2,652,045 UART:
2,652,275 UART: [fmc] Received command: 0x10000000
2,654,444 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,919 UART: [state] WD Timer not started. Device not locked for debugging
88,266 UART: [kat] SHA2-256
891,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
904,950 UART: [kat] SHA2-512-ACC
906,851 UART: [kat] ECC-384
916,682 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,182,415 UART: [idev] Erasing UDS.KEYID = 0
1,199,499 UART: [idev] Sha1 KeyId Algorithm
1,208,405 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,242,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,134 UART: [ldev] --
1,281,416 UART: [fwproc] Wait for Commands...
1,282,111 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,576,097 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,782 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,150 >>> mbox cmd response: success
2,738,373 UART: [afmc] ++
2,738,541 UART: [afmc] CDI.KEYID = 6
2,738,904 UART: [afmc] SUBJECT.KEYID = 7
2,739,330 UART: [afmc] AUTHORITY.KEYID = 5
2,775,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,948 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,797,654 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,803,541 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,809,260 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,817,150 UART: [afmc] --
2,818,202 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,818,224 UART: [cold-reset] --
2,819,254 UART: [state] Locking Datavault
2,820,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,135 UART: [state] Locking ICCM
2,821,777 UART: [exit] Launching FMC @ 0x40000000
2,827,074 UART:
2,827,090 UART: Running Caliptra FMC ...
2,827,498 UART:
2,827,728 UART: [fmc] Received command: 0x10000000
2,829,897 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,350 >>> mbox cmd response: success
2,640,329 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,646,376 UART:
2,646,392 UART: Running Caliptra FMC ...
2,646,800 UART:
2,647,030 UART: [fmc] Received command: 0x10000000
2,649,199 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,336 UART: [state] WD Timer not started. Device not locked for debugging
88,493 UART: [kat] SHA2-256
892,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,172 UART: [kat] ++
896,324 UART: [kat] sha1
900,616 UART: [kat] SHA2-256
902,556 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,225 UART: [kat] HMAC-384Kdf
921,923 UART: [kat] LMS
1,170,235 UART: [kat] --
1,171,418 UART: [cold-reset] ++
1,171,758 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,913 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,183,170 UART: [idev] Erasing UDS.KEYID = 0
1,200,066 UART: [idev] Sha1 KeyId Algorithm
1,208,894 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,635 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,368 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,565 >>> mbox cmd response: success
2,739,768 UART: [afmc] ++
2,739,936 UART: [afmc] CDI.KEYID = 6
2,740,299 UART: [afmc] SUBJECT.KEYID = 7
2,740,725 UART: [afmc] AUTHORITY.KEYID = 5
2,776,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,237 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,798,943 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,804,830 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,810,549 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,818,263 UART: [afmc] --
2,819,263 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,285 UART: [cold-reset] --
2,820,237 UART: [state] Locking Datavault
2,821,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,972 UART: [state] Locking ICCM
2,822,604 UART: [exit] Launching FMC @ 0x40000000
2,827,901 UART:
2,827,917 UART: Running Caliptra FMC ...
2,828,325 UART:
2,828,555 UART: [fmc] Received command: 0x10000000
2,830,724 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,451 >>> mbox cmd response: success
2,644,932 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,149 UART:
2,651,165 UART: Running Caliptra FMC ...
2,651,573 UART:
2,651,803 UART: [fmc] Received command: 0x10000000
2,653,972 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,359 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,644 UART: [ldev] --
1,280,140 UART: [fwproc] Wait for Commands...
1,280,823 UART: [fwproc] Recv command 0x46574c44
1,281,556 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,553 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,644 >>> mbox cmd response: success
2,737,883 UART: [afmc] ++
2,738,051 UART: [afmc] CDI.KEYID = 6
2,738,414 UART: [afmc] SUBJECT.KEYID = 7
2,738,840 UART: [afmc] AUTHORITY.KEYID = 5
2,774,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,846 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,797,552 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,803,439 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,809,158 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,816,930 UART: [afmc] --
2,818,030 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,818,052 UART: [cold-reset] --
2,818,864 UART: [state] Locking Datavault
2,819,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,471 UART: [state] Locking ICCM
2,821,041 UART: [exit] Launching FMC @ 0x40000000
2,826,338 UART:
2,826,354 UART: Running Caliptra FMC ...
2,826,762 UART:
2,826,992 UART: [fmc] Received command: 0x10000000
2,829,161 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,694 >>> mbox cmd response: success
2,641,521 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,647,566 UART:
2,647,582 UART: Running Caliptra FMC ...
2,647,990 UART:
2,648,220 UART: [fmc] Received command: 0x10000000
2,650,389 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,604 UART: [idev] ++
1,173,772 UART: [idev] CDI.KEYID = 6
1,174,133 UART: [idev] SUBJECT.KEYID = 7
1,174,558 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,569 UART: [ldev] --
1,281,005 UART: [fwproc] Wait for Commands...
1,281,752 UART: [fwproc] Recv command 0x46574c44
1,282,485 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,574,860 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,077 >>> mbox cmd response: success
2,737,282 UART: [afmc] ++
2,737,450 UART: [afmc] CDI.KEYID = 6
2,737,813 UART: [afmc] SUBJECT.KEYID = 7
2,738,239 UART: [afmc] AUTHORITY.KEYID = 5
2,774,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,247 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,796,953 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,802,840 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,808,559 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,816,553 UART: [afmc] --
2,817,521 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,543 UART: [cold-reset] --
2,818,345 UART: [state] Locking Datavault
2,819,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,064 UART: [state] Locking ICCM
2,820,660 UART: [exit] Launching FMC @ 0x40000000
2,825,957 UART:
2,825,973 UART: Running Caliptra FMC ...
2,826,381 UART:
2,826,611 UART: [fmc] Received command: 0x10000000
2,828,780 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,059 >>> mbox cmd response: success
2,644,742 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,717 UART:
2,650,733 UART: Running Caliptra FMC ...
2,651,141 UART:
2,651,371 UART: [fmc] Received command: 0x10000000
2,653,540 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,059,996 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,200,910 UART:
2,201,308 UART: Running Caliptra ROM ...
2,202,476 UART:
2,202,648 UART: [state] CFI Enabled
2,203,611 UART: [state] LifecycleState = Unprovisioned
2,205,278 UART: [state] DebugLocked = No
2,206,357 UART: [state] WD Timer not started. Device not locked for debugging
2,208,847 UART: [kat] SHA2-256
2,209,513 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,520 UART: [kat] ++
2,212,974 UART: [kat] sha1
2,213,490 UART: [kat] SHA2-256
2,214,229 UART: [kat] SHA2-384
2,214,899 UART: [kat] SHA2-512-ACC
2,215,706 UART: [kat] ECC-384
3,773,026 UART: [kat] HMAC-384Kdf
3,803,190 UART: [kat] LMS
4,876,350 UART: [kat] --
4,880,180 UART: [cold-reset] ++
4,882,813 UART: [fht] FHT @ 0x50003400
4,893,254 UART: [idev] ++
4,893,931 UART: [idev] CDI.KEYID = 6
4,895,092 UART: [idev] SUBJECT.KEYID = 7
4,896,331 UART: [idev] UDS.KEYID = 0
4,930,470 UART: [idev] Erasing UDS.KEYID = 0
8,244,318 UART: [idev] Sha1 KeyId Algorithm
8,267,224 UART: [idev] --
8,271,085 UART: [ldev] ++
8,271,659 UART: [ldev] CDI.KEYID = 6
8,272,893 UART: [ldev] SUBJECT.KEYID = 5
8,274,049 UART: [ldev] AUTHORITY.KEYID = 7
8,275,280 UART: [ldev] FE.KEYID = 1
8,318,980 UART: [ldev] Erasing FE.KEYID = 1
11,652,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,992 UART: [ldev] --
14,036,046 UART: [fwproc] Wait for Commands...
14,038,756 UART: [fwproc] Recv command 0x46574c44
14,041,074 UART: [fwproc] Recv'd Img size: 111324 bytes
21,920,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
21,998,660 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,058,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,375,602 >>> mbox cmd response: success
22,379,356 UART: [afmc] ++
22,380,056 UART: [afmc] CDI.KEYID = 6
22,381,304 UART: [afmc] SUBJECT.KEYID = 7
22,382,459 UART: [afmc] AUTHORITY.KEYID = 5
25,741,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,042,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,044,488 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,060,695 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,076,786 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,092,771 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,115,306 UART: [afmc] --
28,118,486 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,118,878 UART: [cold-reset] --
28,121,749 UART: [state] Locking Datavault
28,125,866 UART: [state] Locking PCR0, PCR1 and PCR31
28,127,516 UART: [state] Locking ICCM
28,130,530 UART: [exit] Launching FMC @ 0x40000000
28,139,145 UART:
28,139,375 UART: Running Caliptra FMC ...
28,140,472 UART:
28,140,628 UART: [fmc] Received command: 0x10000000
28,143,063 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,057,527 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,100,904 >>> mbox cmd response: success
27,770,941 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
27,785,880 UART:
27,786,221 UART: Running Caliptra FMC ...
27,787,410 UART:
27,787,583 UART: [fmc] Received command: 0x10000000
27,789,812 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,061,441 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,202,205 UART:
2,202,626 UART: Running Caliptra ROM ...
2,203,797 UART:
2,203,977 UART: [state] CFI Enabled
2,204,948 UART: [state] LifecycleState = Unprovisioned
2,206,867 UART: [state] DebugLocked = No
2,207,987 UART: [state] WD Timer not started. Device not locked for debugging
2,210,452 UART: [kat] SHA2-256
2,211,115 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,122 UART: [kat] ++
2,214,570 UART: [kat] sha1
2,215,160 UART: [kat] SHA2-256
2,215,822 UART: [kat] SHA2-384
2,216,474 UART: [kat] SHA2-512-ACC
2,217,349 UART: [kat] ECC-384
4,100,637 UART: [kat] HMAC-384Kdf
4,113,382 UART: [kat] LMS
5,186,531 UART: [kat] --
5,192,644 UART: [cold-reset] ++
5,194,692 UART: [fht] FHT @ 0x50003400
5,207,290 UART: [idev] ++
5,207,959 UART: [idev] CDI.KEYID = 6
5,209,185 UART: [idev] SUBJECT.KEYID = 7
5,210,609 UART: [idev] UDS.KEYID = 0
5,224,043 UART: [idev] Erasing UDS.KEYID = 0
8,495,770 UART: [idev] Sha1 KeyId Algorithm
8,519,111 UART: [idev] --
8,521,968 UART: [ldev] ++
8,522,529 UART: [ldev] CDI.KEYID = 6
8,523,755 UART: [ldev] SUBJECT.KEYID = 5
8,525,234 UART: [ldev] AUTHORITY.KEYID = 7
8,526,844 UART: [ldev] FE.KEYID = 1
8,538,927 UART: [ldev] Erasing FE.KEYID = 1
11,834,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,935 UART: [ldev] --
14,202,547 UART: [fwproc] Wait for Commands...
14,204,041 UART: [fwproc] Recv command 0x46574c44
14,206,126 UART: [fwproc] Recv'd Img size: 111324 bytes
22,305,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,380,146 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,440,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,756,417 >>> mbox cmd response: success
22,760,215 UART: [afmc] ++
22,760,911 UART: [afmc] CDI.KEYID = 6
22,762,092 UART: [afmc] SUBJECT.KEYID = 7
22,763,314 UART: [afmc] AUTHORITY.KEYID = 5
26,079,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,376,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,378,332 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,394,548 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,410,592 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,426,581 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,448,431 UART: [afmc] --
28,452,293 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,452,678 UART: [cold-reset] --
28,456,290 UART: [state] Locking Datavault
28,463,311 UART: [state] Locking PCR0, PCR1 and PCR31
28,464,946 UART: [state] Locking ICCM
28,466,905 UART: [exit] Launching FMC @ 0x40000000
28,475,513 UART:
28,475,763 UART: Running Caliptra FMC ...
28,476,780 UART:
28,476,917 UART: [fmc] Received command: 0x10000000
28,479,480 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,065,804 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,363,718 >>> mbox cmd response: success
27,988,492 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,002,750 UART:
28,003,087 UART: Running Caliptra FMC ...
28,004,277 UART:
28,004,445 UART: [fmc] Received command: 0x10000000
28,006,669 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,817 writing to cptra_bootfsm_go
2,059,152 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,200,581 UART:
2,201,010 UART: Running Caliptra ROM ...
2,202,094 UART:
2,202,269 UART: [state] CFI Enabled
2,203,260 UART: [state] LifecycleState = Unprovisioned
2,204,908 UART: [state] DebugLocked = No
2,205,932 UART: [state] WD Timer not started. Device not locked for debugging
2,208,399 UART: [kat] SHA2-256
2,209,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,073 UART: [kat] ++
2,212,523 UART: [kat] sha1
2,213,031 UART: [kat] SHA2-256
2,213,688 UART: [kat] SHA2-384
2,214,342 UART: [kat] SHA2-512-ACC
2,215,142 UART: [kat] ECC-384
2,947,901 UART: [kat] HMAC-384Kdf
2,971,963 UART: [kat] LMS
3,501,436 UART: [kat] --
3,505,325 UART: [cold-reset] ++
3,507,334 UART: [fht] FHT @ 0x50003400
3,518,485 UART: [idev] ++
3,519,051 UART: [idev] CDI.KEYID = 6
3,519,979 UART: [idev] SUBJECT.KEYID = 7
3,521,195 UART: [idev] UDS.KEYID = 0
3,544,630 UART: [idev] Erasing UDS.KEYID = 0
6,025,736 UART: [idev] Sha1 KeyId Algorithm
6,049,426 UART: [idev] --
6,052,509 UART: [ldev] ++
6,053,082 UART: [ldev] CDI.KEYID = 6
6,053,994 UART: [ldev] SUBJECT.KEYID = 5
6,055,258 UART: [ldev] AUTHORITY.KEYID = 7
6,056,443 UART: [ldev] FE.KEYID = 1
6,100,566 UART: [ldev] Erasing FE.KEYID = 1
8,602,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,851 UART: [ldev] --
10,391,923 UART: [fwproc] Wait for Commands...
10,395,098 UART: [fwproc] Recv command 0x46574c44
10,397,199 UART: [fwproc] Recv'd Img size: 111668 bytes
14,936,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,015,443 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,075,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,392,377 >>> mbox cmd response: success
15,397,142 UART: [afmc] ++
15,397,732 UART: [afmc] CDI.KEYID = 6
15,398,641 UART: [afmc] SUBJECT.KEYID = 7
15,399,857 UART: [afmc] AUTHORITY.KEYID = 5
17,942,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,664,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,666,893 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,683,016 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,698,897 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,714,701 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,737,315 UART: [afmc] --
19,740,225 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,740,613 UART: [cold-reset] --
19,746,403 UART: [state] Locking Datavault
19,750,730 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,374 UART: [state] Locking ICCM
19,754,687 UART: [exit] Launching FMC @ 0x40000000
19,763,107 UART:
19,763,386 UART: Running Caliptra FMC ...
19,764,498 UART:
19,764,662 UART: [fmc] Received command: 0x10000000
19,767,040 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,057,275 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,003,482 >>> mbox cmd response: success
19,268,399 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,284,156 UART:
19,284,500 UART: Running Caliptra FMC ...
19,285,681 UART:
19,285,866 UART: [fmc] Received command: 0x10000000
19,288,194 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,061,155 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,202,550 UART:
2,202,948 UART: Running Caliptra ROM ...
2,204,069 UART:
2,204,236 UART: [state] CFI Enabled
2,205,170 UART: [state] LifecycleState = Unprovisioned
2,206,821 UART: [state] DebugLocked = No
2,207,931 UART: [state] WD Timer not started. Device not locked for debugging
2,210,413 UART: [kat] SHA2-256
2,211,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,096 UART: [kat] ++
2,214,549 UART: [kat] sha1
2,215,066 UART: [kat] SHA2-256
2,215,803 UART: [kat] SHA2-384
2,216,467 UART: [kat] SHA2-512-ACC
2,217,299 UART: [kat] ECC-384
3,281,798 UART: [kat] HMAC-384Kdf
3,295,763 UART: [kat] LMS
3,825,283 UART: [kat] --
3,827,973 UART: [cold-reset] ++
3,830,546 UART: [fht] FHT @ 0x50003400
3,840,941 UART: [idev] ++
3,841,516 UART: [idev] CDI.KEYID = 6
3,842,419 UART: [idev] SUBJECT.KEYID = 7
3,843,631 UART: [idev] UDS.KEYID = 0
3,857,905 UART: [idev] Erasing UDS.KEYID = 0
6,313,509 UART: [idev] Sha1 KeyId Algorithm
6,336,095 UART: [idev] --
6,340,364 UART: [ldev] ++
6,340,934 UART: [ldev] CDI.KEYID = 6
6,341,840 UART: [ldev] SUBJECT.KEYID = 5
6,343,049 UART: [ldev] AUTHORITY.KEYID = 7
6,344,281 UART: [ldev] FE.KEYID = 1
6,354,590 UART: [ldev] Erasing FE.KEYID = 1
8,830,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,231 UART: [ldev] --
10,622,902 UART: [fwproc] Wait for Commands...
10,625,812 UART: [fwproc] Recv command 0x46574c44
10,627,853 UART: [fwproc] Recv'd Img size: 111668 bytes
15,181,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,259,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,319,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,636,049 >>> mbox cmd response: success
15,641,284 UART: [afmc] ++
15,641,891 UART: [afmc] CDI.KEYID = 6
15,642,802 UART: [afmc] SUBJECT.KEYID = 7
15,643,907 UART: [afmc] AUTHORITY.KEYID = 5
18,146,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,865,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,867,817 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,883,904 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,899,827 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,915,576 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,937,438 UART: [afmc] --
19,940,650 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,941,009 UART: [cold-reset] --
19,945,447 UART: [state] Locking Datavault
19,949,335 UART: [state] Locking PCR0, PCR1 and PCR31
19,950,967 UART: [state] Locking ICCM
19,952,864 UART: [exit] Launching FMC @ 0x40000000
19,961,368 UART:
19,961,640 UART: Running Caliptra FMC ...
19,962,667 UART:
19,962,813 UART: [fmc] Received command: 0x10000000
19,965,168 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
2,062,986 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,179,557 >>> mbox cmd response: success
19,414,068 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,428,423 UART:
19,428,785 UART: Running Caliptra FMC ...
19,429,989 UART:
19,430,154 UART: [fmc] Received command: 0x10000000
19,432,471 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,060,961 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,202,342 UART:
2,202,766 UART: Running Caliptra ROM ...
2,203,954 UART:
2,204,121 UART: [state] CFI Enabled
2,205,099 UART: [state] LifecycleState = Unprovisioned
2,206,755 UART: [state] DebugLocked = No
2,207,865 UART: [state] WD Timer not started. Device not locked for debugging
2,210,339 UART: [kat] SHA2-256
2,211,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,034 UART: [kat] ++
2,214,539 UART: [kat] sha1
2,215,056 UART: [kat] SHA2-256
2,215,715 UART: [kat] SHA2-384
2,216,368 UART: [kat] SHA2-512-ACC
2,217,190 UART: [kat] ECC-384
2,947,918 UART: [kat] HMAC-384Kdf
2,973,262 UART: [kat] LMS
3,502,722 UART: [kat] --
3,509,069 UART: [cold-reset] ++
3,510,046 UART: [fht] FHT @ 0x50003400
3,521,679 UART: [idev] ++
3,522,244 UART: [idev] CDI.KEYID = 6
3,523,213 UART: [idev] SUBJECT.KEYID = 7
3,524,371 UART: [idev] UDS.KEYID = 0
3,545,005 UART: [idev] Erasing UDS.KEYID = 0
6,029,929 UART: [idev] Sha1 KeyId Algorithm
6,054,203 UART: [idev] --
6,057,774 UART: [ldev] ++
6,058,350 UART: [ldev] CDI.KEYID = 6
6,059,259 UART: [ldev] SUBJECT.KEYID = 5
6,060,440 UART: [ldev] AUTHORITY.KEYID = 7
6,061,680 UART: [ldev] FE.KEYID = 1
6,100,075 UART: [ldev] Erasing FE.KEYID = 1
8,604,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,104 UART: [ldev] --
10,413,999 UART: [fwproc] Wait for Commands...
10,415,816 UART: [fwproc] Recv command 0x46574c44
10,417,924 UART: [fwproc] Recv'd Img size: 111668 bytes
14,961,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,038,295 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,098,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,414,856 >>> mbox cmd response: success
15,419,044 UART: [afmc] ++
15,419,668 UART: [afmc] CDI.KEYID = 6
15,420,559 UART: [afmc] SUBJECT.KEYID = 7
15,421,634 UART: [afmc] AUTHORITY.KEYID = 5
17,946,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,666,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,668,528 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,684,643 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,700,575 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,716,334 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,738,125 UART: [afmc] --
19,741,091 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,741,483 UART: [cold-reset] --
19,747,315 UART: [state] Locking Datavault
19,753,423 UART: [state] Locking PCR0, PCR1 and PCR31
19,755,124 UART: [state] Locking ICCM
19,757,539 UART: [exit] Launching FMC @ 0x40000000
19,765,578 UART:
19,765,828 UART: Running Caliptra FMC ...
19,766,937 UART:
19,767,101 UART: [fmc] Received command: 0x10000000
19,769,540 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
2,071,301 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,990,926 >>> mbox cmd response: success
19,265,497 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,279,542 UART:
19,279,904 UART: Running Caliptra FMC ...
19,281,006 UART:
19,281,163 UART: [fmc] Received command: 0x10000000
19,283,582 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,062,540 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,204,027 UART:
2,204,432 UART: Running Caliptra ROM ...
2,205,522 UART:
2,205,678 UART: [state] CFI Enabled
2,206,582 UART: [state] LifecycleState = Unprovisioned
2,208,238 UART: [state] DebugLocked = No
2,209,258 UART: [state] WD Timer not started. Device not locked for debugging
2,211,762 UART: [kat] SHA2-256
2,212,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,440 UART: [kat] ++
2,215,885 UART: [kat] sha1
2,216,392 UART: [kat] SHA2-256
2,217,047 UART: [kat] SHA2-384
2,217,704 UART: [kat] SHA2-512-ACC
2,218,701 UART: [kat] ECC-384
3,284,413 UART: [kat] HMAC-384Kdf
3,297,499 UART: [kat] LMS
3,826,950 UART: [kat] --
3,830,611 UART: [cold-reset] ++
3,832,269 UART: [fht] FHT @ 0x50003400
3,843,462 UART: [idev] ++
3,844,020 UART: [idev] CDI.KEYID = 6
3,845,010 UART: [idev] SUBJECT.KEYID = 7
3,846,212 UART: [idev] UDS.KEYID = 0
3,859,498 UART: [idev] Erasing UDS.KEYID = 0
6,314,686 UART: [idev] Sha1 KeyId Algorithm
6,337,055 UART: [idev] --
6,341,192 UART: [ldev] ++
6,341,773 UART: [ldev] CDI.KEYID = 6
6,342,659 UART: [ldev] SUBJECT.KEYID = 5
6,343,870 UART: [ldev] AUTHORITY.KEYID = 7
6,345,097 UART: [ldev] FE.KEYID = 1
6,355,555 UART: [ldev] Erasing FE.KEYID = 1
8,829,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,052 UART: [ldev] --
10,619,635 UART: [fwproc] Wait for Commands...
10,621,627 UART: [fwproc] Recv command 0x46574c44
10,623,721 UART: [fwproc] Recv'd Img size: 111668 bytes
15,147,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,229,590 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,289,876 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,606,508 >>> mbox cmd response: success
15,610,117 UART: [afmc] ++
15,610,730 UART: [afmc] CDI.KEYID = 6
15,611,643 UART: [afmc] SUBJECT.KEYID = 7
15,612,804 UART: [afmc] AUTHORITY.KEYID = 5
18,111,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,833,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,835,057 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,851,191 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,867,069 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,882,873 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,906,358 UART: [afmc] --
19,910,818 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,911,197 UART: [cold-reset] --
19,914,821 UART: [state] Locking Datavault
19,918,873 UART: [state] Locking PCR0, PCR1 and PCR31
19,920,513 UART: [state] Locking ICCM
19,923,146 UART: [exit] Launching FMC @ 0x40000000
19,931,549 UART:
19,931,829 UART: Running Caliptra FMC ...
19,932,939 UART:
19,933,095 UART: [fmc] Received command: 0x10000000
19,935,474 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,062,184 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,214,318 >>> mbox cmd response: success
19,445,779 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,461,968 UART:
19,462,304 UART: Running Caliptra FMC ...
19,463,498 UART:
19,463,685 UART: [fmc] Received command: 0x10000000
19,465,954 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,241,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,700 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 111668 bytes
3,092,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,119,881 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,280,988 >>> mbox cmd response: success
3,282,217 UART: [afmc] ++
3,282,385 UART: [afmc] CDI.KEYID = 6
3,282,748 UART: [afmc] SUBJECT.KEYID = 7
3,283,174 UART: [afmc] AUTHORITY.KEYID = 5
3,318,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,790 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,341,493 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,347,375 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,353,081 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,360,909 UART: [afmc] --
3,361,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,361,827 UART: [cold-reset] --
3,362,639 UART: [state] Locking Datavault
3,363,644 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,248 UART: [state] Locking ICCM
3,364,874 UART: [exit] Launching FMC @ 0x40000000
3,370,171 UART:
3,370,187 UART: Running Caliptra FMC ...
3,370,595 UART:
3,370,825 UART: [fmc] Received command: 0x10000000
3,372,994 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,119,583 >>> mbox cmd response: success
3,175,280 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,181,509 UART:
3,181,525 UART: Running Caliptra FMC ...
3,181,933 UART:
3,182,163 UART: [fmc] Received command: 0x10000000
3,184,332 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
891,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,008 UART: [kat] ++
896,160 UART: [kat] sha1
900,352 UART: [kat] SHA2-256
902,292 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,797 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,200,114 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,591 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,297 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 111668 bytes
3,104,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,132,494 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,158,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,293,665 >>> mbox cmd response: success
3,294,830 UART: [afmc] ++
3,294,998 UART: [afmc] CDI.KEYID = 6
3,295,361 UART: [afmc] SUBJECT.KEYID = 7
3,295,787 UART: [afmc] AUTHORITY.KEYID = 5
3,331,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,347,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,348,661 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,354,364 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,360,246 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,365,952 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,373,746 UART: [afmc] --
3,374,772 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,374,794 UART: [cold-reset] --
3,375,738 UART: [state] Locking Datavault
3,377,201 UART: [state] Locking PCR0, PCR1 and PCR31
3,377,805 UART: [state] Locking ICCM
3,378,247 UART: [exit] Launching FMC @ 0x40000000
3,383,544 UART:
3,383,560 UART: Running Caliptra FMC ...
3,383,968 UART:
3,384,198 UART: [fmc] Received command: 0x10000000
3,386,367 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,136,709 >>> mbox cmd response: success
3,193,114 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,211 UART:
3,199,227 UART: Running Caliptra FMC ...
3,199,635 UART:
3,199,865 UART: [fmc] Received command: 0x10000000
3,202,034 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,557 UART: [idev] ++
1,173,725 UART: [idev] CDI.KEYID = 6
1,174,086 UART: [idev] SUBJECT.KEYID = 7
1,174,511 UART: [idev] UDS.KEYID = 0
1,182,731 UART: [idev] Erasing UDS.KEYID = 0
1,200,565 UART: [idev] Sha1 KeyId Algorithm
1,209,471 UART: [idev] --
1,210,346 UART: [ldev] ++
1,210,514 UART: [ldev] CDI.KEYID = 6
1,210,878 UART: [ldev] SUBJECT.KEYID = 5
1,211,305 UART: [ldev] AUTHORITY.KEYID = 7
1,211,768 UART: [ldev] FE.KEYID = 1
1,216,548 UART: [ldev] Erasing FE.KEYID = 1
1,242,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,558 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,685 UART: [fwproc] Recv command 0x46574c44
1,283,418 UART: [fwproc] Recv'd Img size: 111668 bytes
3,096,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,124,150 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,149,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,285,319 >>> mbox cmd response: success
3,286,532 UART: [afmc] ++
3,286,700 UART: [afmc] CDI.KEYID = 6
3,287,063 UART: [afmc] SUBJECT.KEYID = 7
3,287,489 UART: [afmc] AUTHORITY.KEYID = 5
3,322,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,339,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,853 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,345,556 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,351,438 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,357,144 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,970 UART: [afmc] --
3,366,046 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,366,068 UART: [cold-reset] --
3,366,826 UART: [state] Locking Datavault
3,368,007 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,611 UART: [state] Locking ICCM
3,369,247 UART: [exit] Launching FMC @ 0x40000000
3,374,544 UART:
3,374,560 UART: Running Caliptra FMC ...
3,374,968 UART:
3,375,198 UART: [fmc] Received command: 0x10000000
3,377,367 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,139,338 >>> mbox cmd response: success
3,195,537 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,201,380 UART:
3,201,396 UART: Running Caliptra FMC ...
3,201,804 UART:
3,202,034 UART: [fmc] Received command: 0x10000000
3,204,203 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,153 UART: [kat] LMS
1,169,465 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,853 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,293 UART: [fwproc] Recv'd Img size: 111668 bytes
3,094,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,122,470 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,283,593 >>> mbox cmd response: success
3,284,812 UART: [afmc] ++
3,284,980 UART: [afmc] CDI.KEYID = 6
3,285,343 UART: [afmc] SUBJECT.KEYID = 7
3,285,769 UART: [afmc] AUTHORITY.KEYID = 5
3,321,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,047 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,344,750 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,350,632 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,356,338 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,364,050 UART: [afmc] --
3,365,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,365,108 UART: [cold-reset] --
3,365,904 UART: [state] Locking Datavault
3,367,361 UART: [state] Locking PCR0, PCR1 and PCR31
3,367,965 UART: [state] Locking ICCM
3,368,395 UART: [exit] Launching FMC @ 0x40000000
3,373,692 UART:
3,373,708 UART: Running Caliptra FMC ...
3,374,116 UART:
3,374,346 UART: [fmc] Received command: 0x10000000
3,376,515 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,129,636 >>> mbox cmd response: success
3,185,363 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,191,596 UART:
3,191,612 UART: Running Caliptra FMC ...
3,192,020 UART:
3,192,250 UART: [fmc] Received command: 0x10000000
3,194,419 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Sha1 KeyId Algorithm
1,208,147 UART: [idev] --
1,209,080 UART: [ldev] ++
1,209,248 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,039 UART: [ldev] AUTHORITY.KEYID = 7
1,210,502 UART: [ldev] FE.KEYID = 1
1,215,464 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,070 UART: [ldev] --
1,281,528 UART: [fwproc] Wait for Commands...
1,282,279 UART: [fwproc] Recv command 0x46574c44
1,283,012 UART: [fwproc] Recv'd Img size: 111668 bytes
3,083,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,110,981 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,136,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,272,070 >>> mbox cmd response: success
3,273,177 UART: [afmc] ++
3,273,345 UART: [afmc] CDI.KEYID = 6
3,273,708 UART: [afmc] SUBJECT.KEYID = 7
3,274,134 UART: [afmc] AUTHORITY.KEYID = 5
3,309,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,326,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,327,038 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,332,741 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,338,623 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,344,329 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,352,201 UART: [afmc] --
3,353,161 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,353,183 UART: [cold-reset] --
3,354,041 UART: [state] Locking Datavault
3,354,992 UART: [state] Locking PCR0, PCR1 and PCR31
3,355,596 UART: [state] Locking ICCM
3,356,176 UART: [exit] Launching FMC @ 0x40000000
3,361,473 UART:
3,361,489 UART: Running Caliptra FMC ...
3,361,897 UART:
3,362,127 UART: [fmc] Received command: 0x10000000
3,364,296 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,129,609 >>> mbox cmd response: success
3,185,792 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,191,933 UART:
3,191,949 UART: Running Caliptra FMC ...
3,192,357 UART:
3,192,587 UART: [fmc] Received command: 0x10000000
3,194,756 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,248 UART: [idev] ++
1,173,416 UART: [idev] CDI.KEYID = 6
1,173,777 UART: [idev] SUBJECT.KEYID = 7
1,174,202 UART: [idev] UDS.KEYID = 0
1,182,568 UART: [idev] Erasing UDS.KEYID = 0
1,199,802 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,849 UART: [ldev] ++
1,210,017 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,808 UART: [ldev] AUTHORITY.KEYID = 7
1,211,271 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,604 UART: [fwproc] Recv command 0x46574c44
1,283,337 UART: [fwproc] Recv'd Img size: 111668 bytes
3,086,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,114,815 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,140,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,275,854 >>> mbox cmd response: success
3,277,101 UART: [afmc] ++
3,277,269 UART: [afmc] CDI.KEYID = 6
3,277,632 UART: [afmc] SUBJECT.KEYID = 7
3,278,058 UART: [afmc] AUTHORITY.KEYID = 5
3,313,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,330,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,330,970 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,336,673 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,342,555 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,348,261 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,356,259 UART: [afmc] --
3,357,181 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,357,203 UART: [cold-reset] --
3,357,955 UART: [state] Locking Datavault
3,359,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,359,770 UART: [state] Locking ICCM
3,360,418 UART: [exit] Launching FMC @ 0x40000000
3,365,715 UART:
3,365,731 UART: Running Caliptra FMC ...
3,366,139 UART:
3,366,369 UART: [fmc] Received command: 0x10000000
3,368,538 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,128,369 >>> mbox cmd response: success
3,184,106 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,190,225 UART:
3,190,241 UART: Running Caliptra FMC ...
3,190,649 UART:
3,190,879 UART: [fmc] Received command: 0x10000000
3,193,048 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,214,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,215,501 UART:
2,215,751 UART: Running Caliptra ROM ...
2,216,819 UART:
2,216,973 UART: [state] CFI Enabled
2,217,864 UART: [state] LifecycleState = Unprovisioned
2,219,534 UART: [state] DebugLocked = No
2,220,598 UART: [state] WD Timer not started. Device not locked for debugging
2,223,095 UART: [kat] SHA2-256
2,223,769 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,226,780 UART: [kat] ++
2,227,229 UART: [kat] sha1
2,227,743 UART: [kat] SHA2-256
2,228,481 UART: [kat] SHA2-384
2,229,144 UART: [kat] SHA2-512-ACC
2,229,971 UART: [kat] ECC-384
3,773,812 UART: [kat] HMAC-384Kdf
3,802,535 UART: [kat] LMS
4,875,685 UART: [kat] --
4,878,716 UART: [cold-reset] ++
4,880,006 UART: [fht] FHT @ 0x50003400
4,892,016 UART: [idev] ++
4,892,732 UART: [idev] CDI.KEYID = 6
4,893,840 UART: [idev] SUBJECT.KEYID = 7
4,895,071 UART: [idev] UDS.KEYID = 0
4,929,793 UART: [idev] Erasing UDS.KEYID = 0
8,244,264 UART: [idev] Sha1 KeyId Algorithm
8,265,618 UART: [idev] --
8,269,158 UART: [ldev] ++
8,269,730 UART: [ldev] CDI.KEYID = 6
8,270,838 UART: [ldev] SUBJECT.KEYID = 5
8,272,104 UART: [ldev] AUTHORITY.KEYID = 7
8,273,255 UART: [ldev] FE.KEYID = 1
8,317,412 UART: [ldev] Erasing FE.KEYID = 1
11,653,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,861 UART: [ldev] --
14,036,743 UART: [fwproc] Wait for Commands...
14,039,705 UART: [fwproc] Recv command 0x4d454153
14,048,728 >>> mbox cmd response data (12 bytes)
14,049,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,051,196 UART: [fwproc] Recv command 0x4d454153
14,060,171 >>> mbox cmd response data (12 bytes)
14,060,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,061,656 UART: [fwproc] Recv command 0x4d454153
14,070,580 >>> mbox cmd response data (12 bytes)
14,071,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,071,788 UART: [fwproc] Recv command 0x4d454153
14,080,710 >>> mbox cmd response data (12 bytes)
14,081,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,082,290 UART: [fwproc] Recv command 0x4d454153
14,091,175 >>> mbox cmd response data (12 bytes)
14,091,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,092,247 UART: [fwproc] Recv command 0x4d454153
14,101,125 >>> mbox cmd response data (12 bytes)
14,101,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,103,034 UART: [fwproc] Recv command 0x4d454153
14,111,901 >>> mbox cmd response data (12 bytes)
14,112,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,113,544 UART: [fwproc] Recv command 0x4d454153
14,122,458 >>> mbox cmd response data (12 bytes)
14,124,144 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
14,265,261 UART: [fwproc] Recv command 0x46574c44
14,267,665 UART: [fwproc] Recv'd Img size: 111324 bytes
18,299,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,371,238 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,431,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,746,758 >>> mbox cmd response: success
18,751,101 UART: [afmc] ++
18,751,699 UART: [afmc] CDI.KEYID = 6
18,752,807 UART: [afmc] SUBJECT.KEYID = 7
18,754,028 UART: [afmc] AUTHORITY.KEYID = 5
22,116,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,420,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,422,742 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,438,892 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,454,983 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,470,846 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,493,725 UART: [afmc] --
24,498,190 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,498,603 UART: [cold-reset] --
24,503,205 UART: [state] Locking Datavault
24,507,324 UART: [state] Locking PCR0, PCR1 and PCR31
24,509,025 UART: [state] Locking ICCM
24,510,502 UART: [exit] Launching FMC @ 0x40000000
24,519,099 UART:
24,519,337 UART: Running Caliptra FMC ...
24,520,439 UART:
24,520,594 UART: [fmc] Received command: 0x1000000A
24,527,134 >>> mbox cmd response data (928 bytes)
24,532,408 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,532,854 UART: [fmc] Received command: 0x10000009
24,534,658 >>> mbox cmd response data (48 bytes)
24,536,853 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,537,326 UART: [fmc] Received command: 0x10000003
24,547,298 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,209,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,834,750 >>> mbox cmd response data (12 bytes)
13,835,719 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,843,563 >>> mbox cmd response data (12 bytes)
13,844,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,852,157 >>> mbox cmd response data (12 bytes)
13,852,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,859,808 >>> mbox cmd response data (12 bytes)
13,860,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,867,882 >>> mbox cmd response data (12 bytes)
13,868,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,876,209 >>> mbox cmd response data (12 bytes)
13,876,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,884,870 >>> mbox cmd response data (12 bytes)
13,885,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,892,845 >>> mbox cmd response data (12 bytes)
13,894,638 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,510,817 >>> mbox cmd response: success
24,198,822 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,213,243 UART:
24,213,571 UART: Running Caliptra FMC ...
24,214,730 UART:
24,214,886 UART: [fmc] Received command: 0x1000000A
24,221,256 >>> mbox cmd response data (928 bytes)
24,226,447 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,226,887 UART: [fmc] Received command: 0x10000009
24,228,693 >>> mbox cmd response data (48 bytes)
24,231,024 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,231,518 UART: [fmc] Received command: 0x10000003
24,241,443 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,220,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,833 UART:
2,222,101 UART: Running Caliptra ROM ...
2,223,174 UART:
2,223,321 UART: [state] CFI Enabled
2,224,195 UART: [state] LifecycleState = Unprovisioned
2,225,847 UART: [state] DebugLocked = No
2,226,989 UART: [state] WD Timer not started. Device not locked for debugging
2,229,461 UART: [kat] SHA2-256
2,230,124 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,233,128 UART: [kat] ++
2,233,571 UART: [kat] sha1
2,234,109 UART: [kat] SHA2-256
2,234,763 UART: [kat] SHA2-384
2,235,412 UART: [kat] SHA2-512-ACC
2,236,225 UART: [kat] ECC-384
4,093,232 UART: [kat] HMAC-384Kdf
4,105,289 UART: [kat] LMS
5,178,473 UART: [kat] --
5,181,987 UART: [cold-reset] ++
5,183,272 UART: [fht] FHT @ 0x50003400
5,194,426 UART: [idev] ++
5,195,091 UART: [idev] CDI.KEYID = 6
5,196,264 UART: [idev] SUBJECT.KEYID = 7
5,197,742 UART: [idev] UDS.KEYID = 0
5,211,634 UART: [idev] Erasing UDS.KEYID = 0
8,488,288 UART: [idev] Sha1 KeyId Algorithm
8,510,065 UART: [idev] --
8,513,288 UART: [ldev] ++
8,513,858 UART: [ldev] CDI.KEYID = 6
8,515,008 UART: [ldev] SUBJECT.KEYID = 5
8,516,541 UART: [ldev] AUTHORITY.KEYID = 7
8,518,011 UART: [ldev] FE.KEYID = 1
8,529,521 UART: [ldev] Erasing FE.KEYID = 1
11,821,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,754 UART: [ldev] --
14,186,933 UART: [fwproc] Wait for Commands...
14,189,790 UART: [fwproc] Recv command 0x4d454153
14,198,806 >>> mbox cmd response data (12 bytes)
14,199,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,200,281 UART: [fwproc] Recv command 0x4d454153
14,209,257 >>> mbox cmd response data (12 bytes)
14,209,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,210,315 UART: [fwproc] Recv command 0x4d454153
14,219,219 >>> mbox cmd response data (12 bytes)
14,219,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,220,127 UART: [fwproc] Recv command 0x4d454153
14,229,047 >>> mbox cmd response data (12 bytes)
14,229,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,230,076 UART: [fwproc] Recv command 0x4d454153
14,238,983 >>> mbox cmd response data (12 bytes)
14,239,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,240,394 UART: [fwproc] Recv command 0x4d454153
14,249,296 >>> mbox cmd response data (12 bytes)
14,249,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,250,317 UART: [fwproc] Recv command 0x4d454153
14,259,220 >>> mbox cmd response data (12 bytes)
14,259,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,260,504 UART: [fwproc] Recv command 0x4d454153
14,269,373 >>> mbox cmd response data (12 bytes)
14,271,054 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
14,411,569 UART: [fwproc] Recv command 0x46574c44
14,413,945 UART: [fwproc] Recv'd Img size: 111324 bytes
18,447,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,520,623 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,580,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,896,841 >>> mbox cmd response: success
18,901,245 UART: [afmc] ++
18,901,844 UART: [afmc] CDI.KEYID = 6
18,902,956 UART: [afmc] SUBJECT.KEYID = 7
18,904,181 UART: [afmc] AUTHORITY.KEYID = 5
22,223,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,516,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,519,183 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,535,361 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,551,467 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,567,301 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,590,743 UART: [afmc] --
24,594,471 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,594,866 UART: [cold-reset] --
24,599,297 UART: [state] Locking Datavault
24,606,102 UART: [state] Locking PCR0, PCR1 and PCR31
24,607,804 UART: [state] Locking ICCM
24,609,987 UART: [exit] Launching FMC @ 0x40000000
24,618,602 UART:
24,618,830 UART: Running Caliptra FMC ...
24,619,920 UART:
24,620,071 UART: [fmc] Received command: 0x1000000A
24,626,609 >>> mbox cmd response data (928 bytes)
24,631,823 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,632,259 UART: [fmc] Received command: 0x10000009
24,634,062 >>> mbox cmd response data (48 bytes)
24,636,226 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,636,699 UART: [fmc] Received command: 0x10000003
24,646,665 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,217,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,028,493 >>> mbox cmd response data (12 bytes)
14,029,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,036,603 >>> mbox cmd response data (12 bytes)
14,037,092 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,045,198 >>> mbox cmd response data (12 bytes)
14,045,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,053,004 >>> mbox cmd response data (12 bytes)
14,053,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,061,227 >>> mbox cmd response data (12 bytes)
14,061,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,069,756 >>> mbox cmd response data (12 bytes)
14,070,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,078,141 >>> mbox cmd response data (12 bytes)
14,078,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,086,775 >>> mbox cmd response data (12 bytes)
14,088,505 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,696,835 >>> mbox cmd response: success
24,316,913 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,333,356 UART:
24,333,702 UART: Running Caliptra FMC ...
24,334,910 UART:
24,335,076 UART: [fmc] Received command: 0x1000000A
24,341,354 >>> mbox cmd response data (928 bytes)
24,346,697 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,347,165 UART: [fmc] Received command: 0x10000009
24,348,975 >>> mbox cmd response data (48 bytes)
24,351,163 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,351,623 UART: [fmc] Received command: 0x10000003
24,361,560 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,225,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,255 UART:
2,227,513 UART: Running Caliptra ROM ...
2,228,573 UART:
2,228,725 UART: [state] CFI Enabled
2,229,586 UART: [state] LifecycleState = Unprovisioned
2,231,265 UART: [state] DebugLocked = No
2,232,328 UART: [state] WD Timer not started. Device not locked for debugging
2,234,814 UART: [kat] SHA2-256
2,235,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,238,491 UART: [kat] ++
2,238,942 UART: [kat] sha1
2,239,477 UART: [kat] SHA2-256
2,240,138 UART: [kat] SHA2-384
2,240,795 UART: [kat] SHA2-512-ACC
2,241,621 UART: [kat] ECC-384
2,947,325 UART: [kat] HMAC-384Kdf
2,970,099 UART: [kat] LMS
3,499,564 UART: [kat] --
3,503,181 UART: [cold-reset] ++
3,504,089 UART: [fht] FHT @ 0x50003400
3,514,808 UART: [idev] ++
3,515,382 UART: [idev] CDI.KEYID = 6
3,516,400 UART: [idev] SUBJECT.KEYID = 7
3,517,507 UART: [idev] UDS.KEYID = 0
3,541,424 UART: [idev] Erasing UDS.KEYID = 0
6,025,513 UART: [idev] Sha1 KeyId Algorithm
6,049,403 UART: [idev] --
6,053,989 UART: [ldev] ++
6,054,571 UART: [ldev] CDI.KEYID = 6
6,055,486 UART: [ldev] SUBJECT.KEYID = 5
6,056,647 UART: [ldev] AUTHORITY.KEYID = 7
6,057,882 UART: [ldev] FE.KEYID = 1
6,097,750 UART: [ldev] Erasing FE.KEYID = 1
8,601,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,335 UART: [ldev] --
10,412,954 UART: [fwproc] Wait for Commands...
10,415,979 UART: [fwproc] Recv command 0x4d454153
10,424,514 >>> mbox cmd response data (12 bytes)
10,425,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,426,201 UART: [fwproc] Recv command 0x4d454153
10,434,713 >>> mbox cmd response data (12 bytes)
10,435,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,038 UART: [fwproc] Recv command 0x4d454153
10,444,534 >>> mbox cmd response data (12 bytes)
10,444,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,952 UART: [fwproc] Recv command 0x4d454153
10,454,385 >>> mbox cmd response data (12 bytes)
10,454,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,302 UART: [fwproc] Recv command 0x4d454153
10,464,732 >>> mbox cmd response data (12 bytes)
10,465,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,570 UART: [fwproc] Recv command 0x4d454153
10,474,999 >>> mbox cmd response data (12 bytes)
10,475,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,477,215 UART: [fwproc] Recv command 0x4d454153
10,485,661 >>> mbox cmd response data (12 bytes)
10,486,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,487,312 UART: [fwproc] Recv command 0x4d454153
10,495,744 >>> mbox cmd response data (12 bytes)
10,497,410 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,638,307 UART: [fwproc] Recv command 0x46574c44
10,640,442 UART: [fwproc] Recv'd Img size: 111668 bytes
14,004,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,075,527 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,135,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,453,578 >>> mbox cmd response: success
14,458,685 UART: [afmc] ++
14,459,278 UART: [afmc] CDI.KEYID = 6
14,460,189 UART: [afmc] SUBJECT.KEYID = 7
14,461,346 UART: [afmc] AUTHORITY.KEYID = 5
16,998,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,684 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,741,733 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,757,801 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,773,554 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,796,023 UART: [afmc] --
18,799,264 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,799,661 UART: [cold-reset] --
18,804,093 UART: [state] Locking Datavault
18,809,239 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,884 UART: [state] Locking ICCM
18,813,153 UART: [exit] Launching FMC @ 0x40000000
18,821,550 UART:
18,821,784 UART: Running Caliptra FMC ...
18,822,884 UART:
18,823,042 UART: [fmc] Received command: 0x1000000A
18,829,607 >>> mbox cmd response data (928 bytes)
18,835,023 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,835,480 UART: [fmc] Received command: 0x10000009
18,837,289 >>> mbox cmd response data (48 bytes)
18,839,526 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,839,991 UART: [fmc] Received command: 0x10000003
18,849,910 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,212,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,199,030 >>> mbox cmd response data (12 bytes)
10,200,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,208,271 >>> mbox cmd response data (12 bytes)
10,208,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,216,481 >>> mbox cmd response data (12 bytes)
10,216,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,225,159 >>> mbox cmd response data (12 bytes)
10,225,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,232,837 >>> mbox cmd response data (12 bytes)
10,233,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,241,170 >>> mbox cmd response data (12 bytes)
10,241,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,947 >>> mbox cmd response data (12 bytes)
10,249,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,257,216 >>> mbox cmd response data (12 bytes)
10,258,973 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,220,075 >>> mbox cmd response: success
18,490,068 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,503,653 UART:
18,503,981 UART: Running Caliptra FMC ...
18,505,143 UART:
18,505,323 UART: [fmc] Received command: 0x1000000A
18,511,752 >>> mbox cmd response data (928 bytes)
18,517,021 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,517,463 UART: [fmc] Received command: 0x10000009
18,519,259 >>> mbox cmd response data (48 bytes)
18,521,477 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,521,945 UART: [fmc] Received command: 0x10000003
18,531,884 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,222,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,223,409 UART:
2,223,677 UART: Running Caliptra ROM ...
2,224,782 UART:
2,224,941 UART: [state] CFI Enabled
2,225,816 UART: [state] LifecycleState = Unprovisioned
2,227,514 UART: [state] DebugLocked = No
2,228,575 UART: [state] WD Timer not started. Device not locked for debugging
2,231,048 UART: [kat] SHA2-256
2,231,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,724 UART: [kat] ++
2,235,171 UART: [kat] sha1
2,235,683 UART: [kat] SHA2-256
2,236,421 UART: [kat] SHA2-384
2,237,082 UART: [kat] SHA2-512-ACC
2,237,907 UART: [kat] ECC-384
3,279,785 UART: [kat] HMAC-384Kdf
3,292,842 UART: [kat] LMS
3,822,301 UART: [kat] --
3,827,880 UART: [cold-reset] ++
3,830,295 UART: [fht] FHT @ 0x50003400
3,840,725 UART: [idev] ++
3,841,279 UART: [idev] CDI.KEYID = 6
3,842,209 UART: [idev] SUBJECT.KEYID = 7
3,843,416 UART: [idev] UDS.KEYID = 0
3,858,607 UART: [idev] Erasing UDS.KEYID = 0
6,316,090 UART: [idev] Sha1 KeyId Algorithm
6,338,542 UART: [idev] --
6,342,381 UART: [ldev] ++
6,342,942 UART: [ldev] CDI.KEYID = 6
6,343,827 UART: [ldev] SUBJECT.KEYID = 5
6,345,033 UART: [ldev] AUTHORITY.KEYID = 7
6,346,317 UART: [ldev] FE.KEYID = 1
6,356,176 UART: [ldev] Erasing FE.KEYID = 1
8,828,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,894 UART: [ldev] --
10,618,087 UART: [fwproc] Wait for Commands...
10,620,889 UART: [fwproc] Recv command 0x4d454153
10,629,415 >>> mbox cmd response data (12 bytes)
10,630,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,630,691 UART: [fwproc] Recv command 0x4d454153
10,639,172 >>> mbox cmd response data (12 bytes)
10,639,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,031 UART: [fwproc] Recv command 0x4d454153
10,649,507 >>> mbox cmd response data (12 bytes)
10,649,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,650,449 UART: [fwproc] Recv command 0x4d454153
10,658,892 >>> mbox cmd response data (12 bytes)
10,659,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,660,633 UART: [fwproc] Recv command 0x4d454153
10,669,109 >>> mbox cmd response data (12 bytes)
10,669,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,671,669 UART: [fwproc] Recv command 0x4d454153
10,680,093 >>> mbox cmd response data (12 bytes)
10,680,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,681,568 UART: [fwproc] Recv command 0x4d454153
10,690,044 >>> mbox cmd response data (12 bytes)
10,690,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,691,360 UART: [fwproc] Recv command 0x4d454153
10,699,785 >>> mbox cmd response data (12 bytes)
10,701,492 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,841,996 UART: [fwproc] Recv command 0x46574c44
10,844,166 UART: [fwproc] Recv'd Img size: 111668 bytes
14,217,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,297,111 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,357,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,675,095 >>> mbox cmd response: success
14,679,116 UART: [afmc] ++
14,679,697 UART: [afmc] CDI.KEYID = 6
14,680,575 UART: [afmc] SUBJECT.KEYID = 7
14,681,782 UART: [afmc] AUTHORITY.KEYID = 5
17,180,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,902,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,894 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,919,955 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,936,014 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,951,692 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,975,559 UART: [afmc] --
18,978,888 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,979,253 UART: [cold-reset] --
18,981,959 UART: [state] Locking Datavault
18,989,097 UART: [state] Locking PCR0, PCR1 and PCR31
18,990,796 UART: [state] Locking ICCM
18,992,731 UART: [exit] Launching FMC @ 0x40000000
19,001,127 UART:
19,001,366 UART: Running Caliptra FMC ...
19,002,466 UART:
19,002,625 UART: [fmc] Received command: 0x1000000A
19,009,111 >>> mbox cmd response data (928 bytes)
19,014,558 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,015,032 UART: [fmc] Received command: 0x10000009
19,016,848 >>> mbox cmd response data (48 bytes)
19,019,024 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,019,499 UART: [fmc] Received command: 0x10000003
19,029,417 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,217,170 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,966 >>> mbox cmd response data (12 bytes)
10,415,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,537 >>> mbox cmd response data (12 bytes)
10,423,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,064 >>> mbox cmd response data (12 bytes)
10,430,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,438,196 >>> mbox cmd response data (12 bytes)
10,438,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,447,393 >>> mbox cmd response data (12 bytes)
10,447,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,802 >>> mbox cmd response data (12 bytes)
10,456,265 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,423 >>> mbox cmd response data (12 bytes)
10,463,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,471,105 >>> mbox cmd response data (12 bytes)
10,472,952 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,429,887 >>> mbox cmd response: success
18,667,909 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,684,370 UART:
18,684,686 UART: Running Caliptra FMC ...
18,685,845 UART:
18,686,007 UART: [fmc] Received command: 0x1000000A
18,692,486 >>> mbox cmd response data (928 bytes)
18,697,765 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,698,209 UART: [fmc] Received command: 0x10000009
18,700,006 >>> mbox cmd response data (48 bytes)
18,702,144 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,702,621 UART: [fmc] Received command: 0x10000003
18,712,588 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,215,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,554 UART:
2,216,819 UART: Running Caliptra ROM ...
2,217,891 UART:
2,218,038 UART: [state] CFI Enabled
2,218,909 UART: [state] LifecycleState = Unprovisioned
2,220,479 UART: [state] DebugLocked = No
2,221,536 UART: [state] WD Timer not started. Device not locked for debugging
2,224,041 UART: [kat] SHA2-256
2,224,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,732 UART: [kat] ++
2,228,179 UART: [kat] sha1
2,228,774 UART: [kat] SHA2-256
2,229,474 UART: [kat] SHA2-384
2,230,158 UART: [kat] SHA2-512-ACC
2,231,043 UART: [kat] ECC-384
2,948,673 UART: [kat] HMAC-384Kdf
2,970,142 UART: [kat] LMS
3,499,611 UART: [kat] --
3,505,496 UART: [cold-reset] ++
3,507,162 UART: [fht] FHT @ 0x50003400
3,517,116 UART: [idev] ++
3,517,683 UART: [idev] CDI.KEYID = 6
3,518,649 UART: [idev] SUBJECT.KEYID = 7
3,519,747 UART: [idev] UDS.KEYID = 0
3,541,577 UART: [idev] Erasing UDS.KEYID = 0
6,024,786 UART: [idev] Sha1 KeyId Algorithm
6,047,777 UART: [idev] --
6,051,702 UART: [ldev] ++
6,052,284 UART: [ldev] CDI.KEYID = 6
6,053,174 UART: [ldev] SUBJECT.KEYID = 5
6,054,392 UART: [ldev] AUTHORITY.KEYID = 7
6,055,596 UART: [ldev] FE.KEYID = 1
6,098,357 UART: [ldev] Erasing FE.KEYID = 1
8,600,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,535 UART: [ldev] --
10,408,286 UART: [fwproc] Wait for Commands...
10,411,247 UART: [fwproc] Recv command 0x4d454153
10,419,786 >>> mbox cmd response data (12 bytes)
10,420,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,421,019 UART: [fwproc] Recv command 0x4d454153
10,429,505 >>> mbox cmd response data (12 bytes)
10,429,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,847 UART: [fwproc] Recv command 0x4d454153
10,439,300 >>> mbox cmd response data (12 bytes)
10,439,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,440,283 UART: [fwproc] Recv command 0x4d454153
10,448,775 >>> mbox cmd response data (12 bytes)
10,449,193 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,450,509 UART: [fwproc] Recv command 0x4d454153
10,458,936 >>> mbox cmd response data (12 bytes)
10,459,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,460,828 UART: [fwproc] Recv command 0x4d454153
10,469,268 >>> mbox cmd response data (12 bytes)
10,469,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,246 UART: [fwproc] Recv command 0x4d454153
10,478,725 >>> mbox cmd response data (12 bytes)
10,479,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,480,560 UART: [fwproc] Recv command 0x4d454153
10,489,050 >>> mbox cmd response data (12 bytes)
10,490,770 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,631,335 UART: [fwproc] Recv command 0x46574c44
10,633,448 UART: [fwproc] Recv'd Img size: 111668 bytes
14,000,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,068,302 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,128,639 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,445,568 >>> mbox cmd response: success
14,449,917 UART: [afmc] ++
14,450,513 UART: [afmc] CDI.KEYID = 6
14,451,394 UART: [afmc] SUBJECT.KEYID = 7
14,452,610 UART: [afmc] AUTHORITY.KEYID = 5
16,994,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,621 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,734,716 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,750,733 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,766,427 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,788,582 UART: [afmc] --
18,792,238 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,792,607 UART: [cold-reset] --
18,794,072 UART: [state] Locking Datavault
18,799,811 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,458 UART: [state] Locking ICCM
18,803,509 UART: [exit] Launching FMC @ 0x40000000
18,811,917 UART:
18,812,199 UART: Running Caliptra FMC ...
18,813,309 UART:
18,813,469 UART: [fmc] Received command: 0x1000000A
18,819,907 >>> mbox cmd response data (928 bytes)
18,825,171 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,825,618 UART: [fmc] Received command: 0x10000009
18,827,421 >>> mbox cmd response data (48 bytes)
18,829,649 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,830,118 UART: [fmc] Received command: 0x10000003
18,840,041 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,229,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,209,997 >>> mbox cmd response data (12 bytes)
10,210,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,218,347 >>> mbox cmd response data (12 bytes)
10,218,801 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,227,091 >>> mbox cmd response data (12 bytes)
10,227,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,234,855 >>> mbox cmd response data (12 bytes)
10,235,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,242,808 >>> mbox cmd response data (12 bytes)
10,243,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,251,484 >>> mbox cmd response data (12 bytes)
10,251,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,260,145 >>> mbox cmd response data (12 bytes)
10,260,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,267,713 >>> mbox cmd response data (12 bytes)
10,269,415 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,232,558 >>> mbox cmd response: success
18,499,506 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,511,798 UART:
18,512,198 UART: Running Caliptra FMC ...
18,513,410 UART:
18,513,583 UART: [fmc] Received command: 0x1000000A
18,519,928 >>> mbox cmd response data (928 bytes)
18,524,997 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,525,446 UART: [fmc] Received command: 0x10000009
18,527,209 >>> mbox cmd response data (48 bytes)
18,529,408 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,529,893 UART: [fmc] Received command: 0x10000003
18,539,821 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,220,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,404 UART:
2,221,657 UART: Running Caliptra ROM ...
2,222,723 UART:
2,222,873 UART: [state] CFI Enabled
2,223,736 UART: [state] LifecycleState = Unprovisioned
2,225,418 UART: [state] DebugLocked = No
2,226,443 UART: [state] WD Timer not started. Device not locked for debugging
2,228,916 UART: [kat] SHA2-256
2,229,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,232,604 UART: [kat] ++
2,233,051 UART: [kat] sha1
2,233,568 UART: [kat] SHA2-256
2,234,225 UART: [kat] SHA2-384
2,234,881 UART: [kat] SHA2-512-ACC
2,235,678 UART: [kat] ECC-384
3,283,814 UART: [kat] HMAC-384Kdf
3,296,278 UART: [kat] LMS
3,825,760 UART: [kat] --
3,828,915 UART: [cold-reset] ++
3,830,313 UART: [fht] FHT @ 0x50003400
3,841,989 UART: [idev] ++
3,842,552 UART: [idev] CDI.KEYID = 6
3,843,567 UART: [idev] SUBJECT.KEYID = 7
3,844,665 UART: [idev] UDS.KEYID = 0
3,861,984 UART: [idev] Erasing UDS.KEYID = 0
6,323,664 UART: [idev] Sha1 KeyId Algorithm
6,347,066 UART: [idev] --
6,349,768 UART: [ldev] ++
6,350,340 UART: [ldev] CDI.KEYID = 6
6,351,256 UART: [ldev] SUBJECT.KEYID = 5
6,352,415 UART: [ldev] AUTHORITY.KEYID = 7
6,353,648 UART: [ldev] FE.KEYID = 1
6,362,298 UART: [ldev] Erasing FE.KEYID = 1
8,840,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,785 UART: [ldev] --
10,628,773 UART: [fwproc] Wait for Commands...
10,631,301 UART: [fwproc] Recv command 0x4d454153
10,639,794 >>> mbox cmd response data (12 bytes)
10,640,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,270 UART: [fwproc] Recv command 0x4d454153
10,649,754 >>> mbox cmd response data (12 bytes)
10,650,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,651,413 UART: [fwproc] Recv command 0x4d454153
10,659,893 >>> mbox cmd response data (12 bytes)
10,660,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,661,842 UART: [fwproc] Recv command 0x4d454153
10,670,266 >>> mbox cmd response data (12 bytes)
10,670,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,671,281 UART: [fwproc] Recv command 0x4d454153
10,679,703 >>> mbox cmd response data (12 bytes)
10,680,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,681,169 UART: [fwproc] Recv command 0x4d454153
10,689,610 >>> mbox cmd response data (12 bytes)
10,690,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,691,877 UART: [fwproc] Recv command 0x4d454153
10,700,304 >>> mbox cmd response data (12 bytes)
10,700,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,701,400 UART: [fwproc] Recv command 0x4d454153
10,709,874 >>> mbox cmd response data (12 bytes)
10,711,610 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,852,105 UART: [fwproc] Recv command 0x46574c44
10,854,226 UART: [fwproc] Recv'd Img size: 111668 bytes
14,224,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,296,117 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,356,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,674,275 >>> mbox cmd response: success
14,678,787 UART: [afmc] ++
14,679,374 UART: [afmc] CDI.KEYID = 6
14,680,288 UART: [afmc] SUBJECT.KEYID = 7
14,681,465 UART: [afmc] AUTHORITY.KEYID = 5
17,180,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,900,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,902,742 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,918,797 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,934,859 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,950,539 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,971,921 UART: [afmc] --
18,975,516 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,975,863 UART: [cold-reset] --
18,981,051 UART: [state] Locking Datavault
18,984,946 UART: [state] Locking PCR0, PCR1 and PCR31
18,986,585 UART: [state] Locking ICCM
18,989,325 UART: [exit] Launching FMC @ 0x40000000
18,997,727 UART:
18,997,957 UART: Running Caliptra FMC ...
18,999,075 UART:
18,999,238 UART: [fmc] Received command: 0x1000000A
19,005,727 >>> mbox cmd response data (928 bytes)
19,011,110 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,011,573 UART: [fmc] Received command: 0x10000009
19,013,388 >>> mbox cmd response data (48 bytes)
19,015,544 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,016,019 UART: [fmc] Received command: 0x10000003
19,025,939 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,217,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,011 >>> mbox cmd response data (12 bytes)
10,414,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,610 >>> mbox cmd response data (12 bytes)
10,423,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,440 >>> mbox cmd response data (12 bytes)
10,431,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,439,199 >>> mbox cmd response data (12 bytes)
10,439,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,447,808 >>> mbox cmd response data (12 bytes)
10,448,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,777 >>> mbox cmd response data (12 bytes)
10,456,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,453 >>> mbox cmd response data (12 bytes)
10,464,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,472,571 >>> mbox cmd response data (12 bytes)
10,474,354 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,430,867 >>> mbox cmd response: success
18,671,576 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,686,566 UART:
18,686,905 UART: Running Caliptra FMC ...
18,688,101 UART:
18,688,268 UART: [fmc] Received command: 0x1000000A
18,694,682 >>> mbox cmd response data (928 bytes)
18,699,960 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,700,410 UART: [fmc] Received command: 0x10000009
18,702,217 >>> mbox cmd response data (48 bytes)
18,704,396 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,704,867 UART: [fmc] Received command: 0x10000003
18,714,862 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,658 UART: [state] LifecycleState = Unprovisioned
85,313 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,375 UART: [kat] SHA2-256
901,315 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,207,841 UART: [idev] --
1,208,854 UART: [ldev] ++
1,209,022 UART: [ldev] CDI.KEYID = 6
1,209,386 UART: [ldev] SUBJECT.KEYID = 5
1,209,813 UART: [ldev] AUTHORITY.KEYID = 7
1,210,276 UART: [ldev] FE.KEYID = 1
1,215,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,656 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,739 UART: [fwproc] Recv command 0x4d454153
1,286,766 >>> mbox cmd response data (12 bytes)
1,286,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,952 UART: [fwproc] Recv command 0x4d454153
1,290,979 >>> mbox cmd response data (12 bytes)
1,290,980 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,101 UART: [fwproc] Recv command 0x4d454153
1,295,128 >>> mbox cmd response data (12 bytes)
1,295,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,238 UART: [fwproc] Recv command 0x4d454153
1,299,265 >>> mbox cmd response data (12 bytes)
1,299,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,347 UART: [fwproc] Recv command 0x4d454153
1,303,374 >>> mbox cmd response data (12 bytes)
1,303,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,476 UART: [fwproc] Recv command 0x4d454153
1,307,503 >>> mbox cmd response data (12 bytes)
1,307,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,703 UART: [fwproc] Recv command 0x4d454153
1,311,730 >>> mbox cmd response data (12 bytes)
1,311,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,932 UART: [fwproc] Recv command 0x4d454153
1,315,959 >>> mbox cmd response data (12 bytes)
1,315,960 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,316,101 UART: [fwproc] Recv command 0x46574c44
1,316,834 UART: [fwproc] Recv'd Img size: 111668 bytes
2,583,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,288 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,301 >>> mbox cmd response: success
2,773,382 UART: [afmc] ++
2,773,550 UART: [afmc] CDI.KEYID = 6
2,773,913 UART: [afmc] SUBJECT.KEYID = 7
2,774,339 UART: [afmc] AUTHORITY.KEYID = 5
2,809,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,891 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,587 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,486 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,844,179 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,852,055 UART: [afmc] --
2,853,141 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,853,163 UART: [cold-reset] --
2,854,033 UART: [state] Locking Datavault
2,855,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,680 UART: [state] Locking ICCM
2,856,316 UART: [exit] Launching FMC @ 0x40000000
2,861,613 UART:
2,861,629 UART: Running Caliptra FMC ...
2,862,037 UART:
2,862,267 UART: [fmc] Received command: 0x1000000A
2,868,498 >>> mbox cmd response data (928 bytes)
2,868,499 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,528 UART: [fmc] Received command: 0x10000009
2,869,726 >>> mbox cmd response data (48 bytes)
2,869,727 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,756 UART: [fmc] Received command: 0x10000003
2,879,212 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,748 >>> mbox cmd response data (12 bytes)
1,139,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,170 >>> mbox cmd response data (12 bytes)
1,143,171 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,774 >>> mbox cmd response data (12 bytes)
1,146,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,202 >>> mbox cmd response data (12 bytes)
1,150,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,762 >>> mbox cmd response data (12 bytes)
1,153,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,360 >>> mbox cmd response data (12 bytes)
1,157,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,744 >>> mbox cmd response data (12 bytes)
1,160,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,272 >>> mbox cmd response data (12 bytes)
1,164,273 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,615,027 >>> mbox cmd response: success
2,670,856 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,677,203 UART:
2,677,219 UART: Running Caliptra FMC ...
2,677,627 UART:
2,677,857 UART: [fmc] Received command: 0x1000000A
2,684,088 >>> mbox cmd response data (928 bytes)
2,684,089 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,684,118 UART: [fmc] Received command: 0x10000009
2,685,316 >>> mbox cmd response data (48 bytes)
2,685,317 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,685,346 UART: [fmc] Received command: 0x10000003
2,694,802 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,043 UART: [kat] SHA2-512-ACC
905,944 UART: [kat] ECC-384
915,919 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,216 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,533 UART: [ldev] --
1,280,805 UART: [fwproc] Wait for Commands...
1,281,560 UART: [fwproc] Recv command 0x4d454153
1,285,587 >>> mbox cmd response data (12 bytes)
1,285,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,765 UART: [fwproc] Recv command 0x4d454153
1,289,792 >>> mbox cmd response data (12 bytes)
1,289,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,914 UART: [fwproc] Recv command 0x4d454153
1,293,941 >>> mbox cmd response data (12 bytes)
1,293,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,081 UART: [fwproc] Recv command 0x4d454153
1,298,108 >>> mbox cmd response data (12 bytes)
1,298,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,352 UART: [fwproc] Recv command 0x4d454153
1,302,379 >>> mbox cmd response data (12 bytes)
1,302,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,443 UART: [fwproc] Recv command 0x4d454153
1,306,470 >>> mbox cmd response data (12 bytes)
1,306,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,772 UART: [fwproc] Recv command 0x4d454153
1,310,799 >>> mbox cmd response data (12 bytes)
1,310,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,925 UART: [fwproc] Recv command 0x4d454153
1,314,952 >>> mbox cmd response data (12 bytes)
1,314,953 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,315,100 UART: [fwproc] Recv command 0x46574c44
1,315,833 UART: [fwproc] Recv'd Img size: 111668 bytes
2,583,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,679 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,635,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,798 >>> mbox cmd response: success
2,771,857 UART: [afmc] ++
2,772,025 UART: [afmc] CDI.KEYID = 6
2,772,388 UART: [afmc] SUBJECT.KEYID = 7
2,772,814 UART: [afmc] AUTHORITY.KEYID = 5
2,808,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,978 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,831,674 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,837,573 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,843,266 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,851,018 UART: [afmc] --
2,852,076 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,852,098 UART: [cold-reset] --
2,852,972 UART: [state] Locking Datavault
2,854,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,777 UART: [state] Locking ICCM
2,855,227 UART: [exit] Launching FMC @ 0x40000000
2,860,524 UART:
2,860,540 UART: Running Caliptra FMC ...
2,860,948 UART:
2,861,178 UART: [fmc] Received command: 0x1000000A
2,867,409 >>> mbox cmd response data (928 bytes)
2,867,410 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,867,439 UART: [fmc] Received command: 0x10000009
2,868,637 >>> mbox cmd response data (48 bytes)
2,868,638 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,868,667 UART: [fmc] Received command: 0x10000003
2,878,123 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,193 >>> mbox cmd response data (12 bytes)
1,141,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,711 >>> mbox cmd response data (12 bytes)
1,144,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,323 >>> mbox cmd response data (12 bytes)
1,148,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,737 >>> mbox cmd response data (12 bytes)
1,151,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,219 >>> mbox cmd response data (12 bytes)
1,155,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,691 >>> mbox cmd response data (12 bytes)
1,158,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,203 >>> mbox cmd response data (12 bytes)
1,162,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,737 >>> mbox cmd response data (12 bytes)
1,165,738 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,616,430 >>> mbox cmd response: success
2,673,215 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,679,352 UART:
2,679,368 UART: Running Caliptra FMC ...
2,679,776 UART:
2,680,006 UART: [fmc] Received command: 0x1000000A
2,686,237 >>> mbox cmd response data (928 bytes)
2,686,238 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,267 UART: [fmc] Received command: 0x10000009
2,687,465 >>> mbox cmd response data (48 bytes)
2,687,466 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,495 UART: [fmc] Received command: 0x10000003
2,696,951 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,688 UART: [state] LifecycleState = Unprovisioned
85,343 UART: [state] DebugLocked = No
85,931 UART: [state] WD Timer not started. Device not locked for debugging
87,100 UART: [kat] SHA2-256
890,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,779 UART: [kat] ++
894,931 UART: [kat] sha1
899,165 UART: [kat] SHA2-256
901,105 UART: [kat] SHA2-384
903,838 UART: [kat] SHA2-512-ACC
905,739 UART: [kat] ECC-384
914,840 UART: [kat] HMAC-384Kdf
919,258 UART: [kat] LMS
1,167,570 UART: [kat] --
1,168,399 UART: [cold-reset] ++
1,168,905 UART: [fht] FHT @ 0x50003400
1,171,591 UART: [idev] ++
1,171,759 UART: [idev] CDI.KEYID = 6
1,172,120 UART: [idev] SUBJECT.KEYID = 7
1,172,545 UART: [idev] UDS.KEYID = 0
1,180,819 UART: [idev] Erasing UDS.KEYID = 0
1,197,905 UART: [idev] Sha1 KeyId Algorithm
1,206,687 UART: [idev] --
1,207,896 UART: [ldev] ++
1,208,064 UART: [ldev] CDI.KEYID = 6
1,208,428 UART: [ldev] SUBJECT.KEYID = 5
1,208,855 UART: [ldev] AUTHORITY.KEYID = 7
1,209,318 UART: [ldev] FE.KEYID = 1
1,214,584 UART: [ldev] Erasing FE.KEYID = 1
1,240,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,598 UART: [ldev] --
1,280,000 UART: [fwproc] Wait for Commands...
1,280,659 UART: [fwproc] Recv command 0x4d454153
1,284,686 >>> mbox cmd response data (12 bytes)
1,284,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,894 UART: [fwproc] Recv command 0x4d454153
1,288,921 >>> mbox cmd response data (12 bytes)
1,288,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,011 UART: [fwproc] Recv command 0x4d454153
1,293,038 >>> mbox cmd response data (12 bytes)
1,293,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,230 UART: [fwproc] Recv command 0x4d454153
1,297,257 >>> mbox cmd response data (12 bytes)
1,297,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,487 UART: [fwproc] Recv command 0x4d454153
1,301,514 >>> mbox cmd response data (12 bytes)
1,301,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,784 UART: [fwproc] Recv command 0x4d454153
1,305,811 >>> mbox cmd response data (12 bytes)
1,305,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,897 UART: [fwproc] Recv command 0x4d454153
1,309,924 >>> mbox cmd response data (12 bytes)
1,309,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,152 UART: [fwproc] Recv command 0x4d454153
1,314,179 >>> mbox cmd response data (12 bytes)
1,314,180 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,314,297 UART: [fwproc] Recv command 0x46574c44
1,315,030 UART: [fwproc] Recv'd Img size: 111668 bytes
2,581,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,940 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,633,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,037 >>> mbox cmd response: success
2,770,134 UART: [afmc] ++
2,770,302 UART: [afmc] CDI.KEYID = 6
2,770,665 UART: [afmc] SUBJECT.KEYID = 7
2,771,091 UART: [afmc] AUTHORITY.KEYID = 5
2,807,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,803 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,830,499 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,836,398 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,842,091 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,850,037 UART: [afmc] --
2,850,951 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,850,973 UART: [cold-reset] --
2,851,629 UART: [state] Locking Datavault
2,852,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,286 UART: [state] Locking ICCM
2,853,872 UART: [exit] Launching FMC @ 0x40000000
2,859,169 UART:
2,859,185 UART: Running Caliptra FMC ...
2,859,593 UART:
2,859,823 UART: [fmc] Received command: 0x1000000A
2,866,054 >>> mbox cmd response data (928 bytes)
2,866,055 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,866,084 UART: [fmc] Received command: 0x10000009
2,867,282 >>> mbox cmd response data (48 bytes)
2,867,283 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,867,312 UART: [fmc] Received command: 0x10000003
2,876,768 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,454 >>> mbox cmd response data (12 bytes)
1,139,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,864 >>> mbox cmd response data (12 bytes)
1,142,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,298 >>> mbox cmd response data (12 bytes)
1,146,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,806 >>> mbox cmd response data (12 bytes)
1,149,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,186 >>> mbox cmd response data (12 bytes)
1,153,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,600 >>> mbox cmd response data (12 bytes)
1,156,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,132 >>> mbox cmd response data (12 bytes)
1,160,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,738 >>> mbox cmd response data (12 bytes)
1,163,739 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,615,333 >>> mbox cmd response: success
2,670,256 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,676,257 UART:
2,676,273 UART: Running Caliptra FMC ...
2,676,681 UART:
2,676,911 UART: [fmc] Received command: 0x1000000A
2,683,142 >>> mbox cmd response data (928 bytes)
2,683,143 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,683,172 UART: [fmc] Received command: 0x10000009
2,684,370 >>> mbox cmd response data (48 bytes)
2,684,371 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,684,400 UART: [fmc] Received command: 0x10000003
2,693,856 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,181,688 UART: [idev] Erasing UDS.KEYID = 0
1,198,586 UART: [idev] Sha1 KeyId Algorithm
1,207,566 UART: [idev] --
1,208,429 UART: [ldev] ++
1,208,597 UART: [ldev] CDI.KEYID = 6
1,208,961 UART: [ldev] SUBJECT.KEYID = 5
1,209,388 UART: [ldev] AUTHORITY.KEYID = 7
1,209,851 UART: [ldev] FE.KEYID = 1
1,215,019 UART: [ldev] Erasing FE.KEYID = 1
1,241,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,897 UART: [ldev] --
1,280,335 UART: [fwproc] Wait for Commands...
1,281,120 UART: [fwproc] Recv command 0x4d454153
1,285,147 >>> mbox cmd response data (12 bytes)
1,285,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,397 UART: [fwproc] Recv command 0x4d454153
1,289,424 >>> mbox cmd response data (12 bytes)
1,289,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,668 UART: [fwproc] Recv command 0x4d454153
1,293,695 >>> mbox cmd response data (12 bytes)
1,293,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,843 UART: [fwproc] Recv command 0x4d454153
1,297,870 >>> mbox cmd response data (12 bytes)
1,297,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,988 UART: [fwproc] Recv command 0x4d454153
1,302,015 >>> mbox cmd response data (12 bytes)
1,302,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,135 UART: [fwproc] Recv command 0x4d454153
1,306,162 >>> mbox cmd response data (12 bytes)
1,306,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,338 UART: [fwproc] Recv command 0x4d454153
1,310,365 >>> mbox cmd response data (12 bytes)
1,310,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,455 UART: [fwproc] Recv command 0x4d454153
1,314,482 >>> mbox cmd response data (12 bytes)
1,314,483 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,314,764 UART: [fwproc] Recv command 0x46574c44
1,315,497 UART: [fwproc] Recv'd Img size: 111668 bytes
2,581,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,634,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,964 >>> mbox cmd response: success
2,771,051 UART: [afmc] ++
2,771,219 UART: [afmc] CDI.KEYID = 6
2,771,582 UART: [afmc] SUBJECT.KEYID = 7
2,772,008 UART: [afmc] AUTHORITY.KEYID = 5
2,808,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,502 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,831,198 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,837,097 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,842,790 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,850,600 UART: [afmc] --
2,851,678 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,851,700 UART: [cold-reset] --
2,852,528 UART: [state] Locking Datavault
2,853,637 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,241 UART: [state] Locking ICCM
2,854,913 UART: [exit] Launching FMC @ 0x40000000
2,860,210 UART:
2,860,226 UART: Running Caliptra FMC ...
2,860,634 UART:
2,860,864 UART: [fmc] Received command: 0x1000000A
2,867,095 >>> mbox cmd response data (928 bytes)
2,867,096 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,867,125 UART: [fmc] Received command: 0x10000009
2,868,323 >>> mbox cmd response data (48 bytes)
2,868,324 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,868,353 UART: [fmc] Received command: 0x10000003
2,877,809 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,421 >>> mbox cmd response data (12 bytes)
1,140,422 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,807 >>> mbox cmd response data (12 bytes)
1,143,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,401 >>> mbox cmd response data (12 bytes)
1,147,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,899 >>> mbox cmd response data (12 bytes)
1,150,900 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,451 >>> mbox cmd response data (12 bytes)
1,154,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,049 >>> mbox cmd response data (12 bytes)
1,158,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,495 >>> mbox cmd response data (12 bytes)
1,161,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,871 >>> mbox cmd response data (12 bytes)
1,164,872 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,616,138 >>> mbox cmd response: success
2,673,003 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,679,278 UART:
2,679,294 UART: Running Caliptra FMC ...
2,679,702 UART:
2,679,932 UART: [fmc] Received command: 0x1000000A
2,686,163 >>> mbox cmd response data (928 bytes)
2,686,164 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,193 UART: [fmc] Received command: 0x10000009
2,687,391 >>> mbox cmd response data (48 bytes)
2,687,392 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,421 UART: [fmc] Received command: 0x10000003
2,696,877 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,111 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,486 UART: [ldev] Erasing FE.KEYID = 1
1,240,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,044 UART: [fwproc] Wait for Commands...
1,280,675 UART: [fwproc] Recv command 0x4d454153
1,284,702 >>> mbox cmd response data (12 bytes)
1,284,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,846 UART: [fwproc] Recv command 0x4d454153
1,288,873 >>> mbox cmd response data (12 bytes)
1,288,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,161 UART: [fwproc] Recv command 0x4d454153
1,293,188 >>> mbox cmd response data (12 bytes)
1,293,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,440 UART: [fwproc] Recv command 0x4d454153
1,297,467 >>> mbox cmd response data (12 bytes)
1,297,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,659 UART: [fwproc] Recv command 0x4d454153
1,301,686 >>> mbox cmd response data (12 bytes)
1,301,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,946 UART: [fwproc] Recv command 0x4d454153
1,305,973 >>> mbox cmd response data (12 bytes)
1,305,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,255 UART: [fwproc] Recv command 0x4d454153
1,310,282 >>> mbox cmd response data (12 bytes)
1,310,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,350 UART: [fwproc] Recv command 0x4d454153
1,314,377 >>> mbox cmd response data (12 bytes)
1,314,378 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,314,555 UART: [fwproc] Recv command 0x46574c44
1,315,288 UART: [fwproc] Recv'd Img size: 111668 bytes
2,582,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,958 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,635,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,163 >>> mbox cmd response: success
2,772,240 UART: [afmc] ++
2,772,408 UART: [afmc] CDI.KEYID = 6
2,772,771 UART: [afmc] SUBJECT.KEYID = 7
2,773,197 UART: [afmc] AUTHORITY.KEYID = 5
2,809,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,211 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,831,907 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,837,806 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,843,499 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,851,513 UART: [afmc] --
2,852,443 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,852,465 UART: [cold-reset] --
2,853,127 UART: [state] Locking Datavault
2,854,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,174 UART: [state] Locking ICCM
2,855,834 UART: [exit] Launching FMC @ 0x40000000
2,861,131 UART:
2,861,147 UART: Running Caliptra FMC ...
2,861,555 UART:
2,861,785 UART: [fmc] Received command: 0x1000000A
2,868,016 >>> mbox cmd response data (928 bytes)
2,868,017 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,046 UART: [fmc] Received command: 0x10000009
2,869,244 >>> mbox cmd response data (48 bytes)
2,869,245 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,274 UART: [fmc] Received command: 0x10000003
2,878,730 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,910 >>> mbox cmd response data (12 bytes)
1,139,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,286 >>> mbox cmd response data (12 bytes)
1,143,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,728 >>> mbox cmd response data (12 bytes)
1,146,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,096 >>> mbox cmd response data (12 bytes)
1,150,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,592 >>> mbox cmd response data (12 bytes)
1,153,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,120 >>> mbox cmd response data (12 bytes)
1,157,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,602 >>> mbox cmd response data (12 bytes)
1,160,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,160 >>> mbox cmd response data (12 bytes)
1,164,161 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,615,527 >>> mbox cmd response: success
2,671,538 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,677,823 UART:
2,677,839 UART: Running Caliptra FMC ...
2,678,247 UART:
2,678,477 UART: [fmc] Received command: 0x1000000A
2,684,708 >>> mbox cmd response data (928 bytes)
2,684,709 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,684,738 UART: [fmc] Received command: 0x10000009
2,685,936 >>> mbox cmd response data (48 bytes)
2,685,937 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,685,966 UART: [fmc] Received command: 0x10000003
2,695,422 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
921,287 UART: [kat] LMS
1,169,599 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,170,926 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,183,090 UART: [idev] Erasing UDS.KEYID = 0
1,200,366 UART: [idev] Sha1 KeyId Algorithm
1,209,130 UART: [idev] --
1,210,161 UART: [ldev] ++
1,210,329 UART: [ldev] CDI.KEYID = 6
1,210,693 UART: [ldev] SUBJECT.KEYID = 5
1,211,120 UART: [ldev] AUTHORITY.KEYID = 7
1,211,583 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x4d454153
1,287,489 >>> mbox cmd response data (12 bytes)
1,287,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,747 UART: [fwproc] Recv command 0x4d454153
1,291,774 >>> mbox cmd response data (12 bytes)
1,291,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,888 UART: [fwproc] Recv command 0x4d454153
1,295,915 >>> mbox cmd response data (12 bytes)
1,295,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,193 UART: [fwproc] Recv command 0x4d454153
1,300,220 >>> mbox cmd response data (12 bytes)
1,300,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,382 UART: [fwproc] Recv command 0x4d454153
1,304,409 >>> mbox cmd response data (12 bytes)
1,304,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,549 UART: [fwproc] Recv command 0x4d454153
1,308,576 >>> mbox cmd response data (12 bytes)
1,308,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,682 UART: [fwproc] Recv command 0x4d454153
1,312,709 >>> mbox cmd response data (12 bytes)
1,312,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,813 UART: [fwproc] Recv command 0x4d454153
1,316,840 >>> mbox cmd response data (12 bytes)
1,316,841 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,316,946 UART: [fwproc] Recv command 0x46574c44
1,317,679 UART: [fwproc] Recv'd Img size: 111668 bytes
2,584,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,327 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,528 >>> mbox cmd response: success
2,772,597 UART: [afmc] ++
2,772,765 UART: [afmc] CDI.KEYID = 6
2,773,128 UART: [afmc] SUBJECT.KEYID = 7
2,773,554 UART: [afmc] AUTHORITY.KEYID = 5
2,809,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,602 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,298 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,197 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,843,890 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,851,596 UART: [afmc] --
2,852,646 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,852,668 UART: [cold-reset] --
2,853,578 UART: [state] Locking Datavault
2,855,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,639 UART: [state] Locking ICCM
2,856,119 UART: [exit] Launching FMC @ 0x40000000
2,861,416 UART:
2,861,432 UART: Running Caliptra FMC ...
2,861,840 UART:
2,862,070 UART: [fmc] Received command: 0x1000000A
2,868,301 >>> mbox cmd response data (928 bytes)
2,868,302 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,331 UART: [fmc] Received command: 0x10000009
2,869,529 >>> mbox cmd response data (48 bytes)
2,869,530 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,559 UART: [fmc] Received command: 0x10000003
2,879,015 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,783 >>> mbox cmd response data (12 bytes)
1,139,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,269 >>> mbox cmd response data (12 bytes)
1,143,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,863 >>> mbox cmd response data (12 bytes)
1,146,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,239 >>> mbox cmd response data (12 bytes)
1,150,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,841 >>> mbox cmd response data (12 bytes)
1,153,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,217 >>> mbox cmd response data (12 bytes)
1,157,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,627 >>> mbox cmd response data (12 bytes)
1,160,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,181 >>> mbox cmd response data (12 bytes)
1,164,182 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,615,882 >>> mbox cmd response: success
2,672,365 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,678,706 UART:
2,678,722 UART: Running Caliptra FMC ...
2,679,130 UART:
2,679,360 UART: [fmc] Received command: 0x1000000A
2,685,591 >>> mbox cmd response data (928 bytes)
2,685,592 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,685,621 UART: [fmc] Received command: 0x10000009
2,686,819 >>> mbox cmd response data (48 bytes)
2,686,820 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,686,849 UART: [fmc] Received command: 0x10000003
2,696,305 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,075 UART:
192,449 UART: Running Caliptra ROM ...
193,586 UART:
193,731 UART: [state] CFI Enabled
266,060 UART: [state] LifecycleState = Unprovisioned
268,463 UART: [state] DebugLocked = No
270,598 UART: [state] WD Timer not started. Device not locked for debugging
274,474 UART: [kat] SHA2-256
456,384 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,908 UART: [kat] ++
468,440 UART: [kat] sha1
479,209 UART: [kat] SHA2-256
482,214 UART: [kat] SHA2-384
487,264 UART: [kat] SHA2-512-ACC
489,896 UART: [kat] ECC-384
3,777,425 UART: [kat] HMAC-384Kdf
3,800,954 UART: [kat] LMS
4,874,089 UART: [kat] --
4,878,172 UART: [cold-reset] ++
4,879,789 UART: [fht] FHT @ 0x50003400
4,890,498 UART: [idev] ++
4,891,175 UART: [idev] CDI.KEYID = 6
4,892,339 UART: [idev] SUBJECT.KEYID = 7
4,893,555 UART: [idev] UDS.KEYID = 0
4,928,899 UART: [idev] Erasing UDS.KEYID = 0
8,242,338 UART: [idev] Sha1 KeyId Algorithm
8,264,486 UART: [idev] --
8,269,395 UART: [ldev] ++
8,270,015 UART: [ldev] CDI.KEYID = 6
8,271,202 UART: [ldev] SUBJECT.KEYID = 5
8,272,377 UART: [ldev] AUTHORITY.KEYID = 7
8,273,608 UART: [ldev] FE.KEYID = 1
8,317,061 UART: [ldev] Erasing FE.KEYID = 1
11,654,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,883 UART: [ldev] --
14,036,793 UART: [fwproc] Wait for Commands...
14,039,790 UART: [fwproc] Recv command 0x4d454153
14,048,771 >>> mbox cmd response data (12 bytes)
14,049,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,050,458 UART: [fwproc] Recv command 0x4d454153
14,059,441 >>> mbox cmd response data (12 bytes)
14,059,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,061,380 UART: [fwproc] Recv command 0x4d454153
14,070,358 >>> mbox cmd response data (12 bytes)
14,070,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,072,258 UART: [fwproc] Recv command 0x4d454153
14,081,182 >>> mbox cmd response data (12 bytes)
14,081,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,082,338 UART: [fwproc] Recv command 0x4d454153
14,091,254 >>> mbox cmd response data (12 bytes)
14,091,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,092,449 UART: [fwproc] Recv command 0x4d454153
14,101,310 >>> mbox cmd response data (12 bytes)
14,101,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,102,241 UART: [fwproc] Recv command 0x4d454153
14,111,108 >>> mbox cmd response data (12 bytes)
14,111,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,112,951 UART: [fwproc] Recv command 0x4d454153
14,121,853 >>> mbox cmd response data (12 bytes)
14,122,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,124,093 UART: [fwproc] Recv command 0x4d454153
14,126,430 UART: [fwproc] Max # of measurements received.
14,128,260 >>> mbox cmd response: failed
14,130,204 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,813,843 >>> mbox cmd response data (12 bytes)
13,814,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,822,407 >>> mbox cmd response data (12 bytes)
13,822,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,830,763 >>> mbox cmd response data (12 bytes)
13,831,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,839,102 >>> mbox cmd response data (12 bytes)
13,839,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,846,794 >>> mbox cmd response data (12 bytes)
13,847,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,855,793 >>> mbox cmd response data (12 bytes)
13,856,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,863,808 >>> mbox cmd response data (12 bytes)
13,864,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,871,983 >>> mbox cmd response data (12 bytes)
13,872,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,873,008 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
4,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,647 UART:
193,018 UART: Running Caliptra ROM ...
194,213 UART:
603,633 UART: [state] CFI Enabled
616,957 UART: [state] LifecycleState = Unprovisioned
619,307 UART: [state] DebugLocked = No
620,922 UART: [state] WD Timer not started. Device not locked for debugging
625,972 UART: [kat] SHA2-256
807,946 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,496 UART: [kat] ++
819,995 UART: [kat] sha1
830,380 UART: [kat] SHA2-256
833,436 UART: [kat] SHA2-384
839,139 UART: [kat] SHA2-512-ACC
841,744 UART: [kat] ECC-384
4,097,032 UART: [kat] HMAC-384Kdf
4,109,516 UART: [kat] LMS
5,182,688 UART: [kat] --
5,186,339 UART: [cold-reset] ++
5,187,619 UART: [fht] FHT @ 0x50003400
5,198,577 UART: [idev] ++
5,199,302 UART: [idev] CDI.KEYID = 6
5,200,403 UART: [idev] SUBJECT.KEYID = 7
5,201,927 UART: [idev] UDS.KEYID = 0
5,219,867 UART: [idev] Erasing UDS.KEYID = 0
8,491,478 UART: [idev] Sha1 KeyId Algorithm
8,514,807 UART: [idev] --
8,518,260 UART: [ldev] ++
8,518,829 UART: [ldev] CDI.KEYID = 6
8,520,058 UART: [ldev] SUBJECT.KEYID = 5
8,521,492 UART: [ldev] AUTHORITY.KEYID = 7
8,523,045 UART: [ldev] FE.KEYID = 1
8,532,228 UART: [ldev] Erasing FE.KEYID = 1
11,825,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,319 UART: [ldev] --
14,190,748 UART: [fwproc] Wait for Commands...
14,192,893 UART: [fwproc] Recv command 0x4d454153
14,201,922 >>> mbox cmd response data (12 bytes)
14,202,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,203,751 UART: [fwproc] Recv command 0x4d454153
14,212,669 >>> mbox cmd response data (12 bytes)
14,213,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,214,339 UART: [fwproc] Recv command 0x4d454153
14,223,301 >>> mbox cmd response data (12 bytes)
14,223,708 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,224,398 UART: [fwproc] Recv command 0x4d454153
14,233,140 >>> mbox cmd response data (12 bytes)
14,233,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,234,441 UART: [fwproc] Recv command 0x4d454153
14,243,353 >>> mbox cmd response data (12 bytes)
14,243,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,244,417 UART: [fwproc] Recv command 0x4d454153
14,253,332 >>> mbox cmd response data (12 bytes)
14,253,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,254,311 UART: [fwproc] Recv command 0x4d454153
14,263,166 >>> mbox cmd response data (12 bytes)
14,263,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,264,084 UART: [fwproc] Recv command 0x4d454153
14,272,997 >>> mbox cmd response data (12 bytes)
14,273,418 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,274,352 UART: [fwproc] Recv command 0x4d454153
14,276,670 UART: [fwproc] Max # of measurements received.
14,278,497 >>> mbox cmd response: failed
14,280,598 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
4,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,017,868 >>> mbox cmd response data (12 bytes)
14,018,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,027,017 >>> mbox cmd response data (12 bytes)
14,027,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,035,108 >>> mbox cmd response data (12 bytes)
14,035,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,042,905 >>> mbox cmd response data (12 bytes)
14,043,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,050,875 >>> mbox cmd response data (12 bytes)
14,051,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,059,855 >>> mbox cmd response data (12 bytes)
14,060,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,068,663 >>> mbox cmd response data (12 bytes)
14,069,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,076,363 >>> mbox cmd response data (12 bytes)
14,076,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,077,649 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,013 UART:
192,416 UART: Running Caliptra ROM ...
193,603 UART:
193,758 UART: [state] CFI Enabled
264,662 UART: [state] LifecycleState = Unprovisioned
266,550 UART: [state] DebugLocked = No
267,713 UART: [state] WD Timer not started. Device not locked for debugging
271,471 UART: [kat] SHA2-256
450,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,141 UART: [kat] ++
462,673 UART: [kat] sha1
474,038 UART: [kat] SHA2-256
477,106 UART: [kat] SHA2-384
483,860 UART: [kat] SHA2-512-ACC
486,801 UART: [kat] ECC-384
2,946,946 UART: [kat] HMAC-384Kdf
2,971,834 UART: [kat] LMS
3,501,263 UART: [kat] --
3,506,352 UART: [cold-reset] ++
3,507,266 UART: [fht] FHT @ 0x50003400
3,519,272 UART: [idev] ++
3,519,841 UART: [idev] CDI.KEYID = 6
3,520,808 UART: [idev] SUBJECT.KEYID = 7
3,521,964 UART: [idev] UDS.KEYID = 0
3,543,608 UART: [idev] Erasing UDS.KEYID = 0
6,027,750 UART: [idev] Sha1 KeyId Algorithm
6,050,389 UART: [idev] --
6,054,324 UART: [ldev] ++
6,054,894 UART: [ldev] CDI.KEYID = 6
6,055,798 UART: [ldev] SUBJECT.KEYID = 5
6,056,965 UART: [ldev] AUTHORITY.KEYID = 7
6,058,206 UART: [ldev] FE.KEYID = 1
6,099,297 UART: [ldev] Erasing FE.KEYID = 1
8,604,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,813 UART: [ldev] --
10,411,479 UART: [fwproc] Wait for Commands...
10,413,904 UART: [fwproc] Recv command 0x4d454153
10,422,400 >>> mbox cmd response data (12 bytes)
10,423,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,352 UART: [fwproc] Recv command 0x4d454153
10,432,848 >>> mbox cmd response data (12 bytes)
10,433,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,434,444 UART: [fwproc] Recv command 0x4d454153
10,442,928 >>> mbox cmd response data (12 bytes)
10,443,340 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,411 UART: [fwproc] Recv command 0x4d454153
10,453,838 >>> mbox cmd response data (12 bytes)
10,454,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,727 UART: [fwproc] Recv command 0x4d454153
10,464,149 >>> mbox cmd response data (12 bytes)
10,464,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,660 UART: [fwproc] Recv command 0x4d454153
10,474,145 >>> mbox cmd response data (12 bytes)
10,474,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,475,651 UART: [fwproc] Recv command 0x4d454153
10,484,088 >>> mbox cmd response data (12 bytes)
10,484,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,485,478 UART: [fwproc] Recv command 0x4d454153
10,493,904 >>> mbox cmd response data (12 bytes)
10,494,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,494,929 UART: [fwproc] Recv command 0x4d454153
10,496,989 UART: [fwproc] Max # of measurements received.
10,499,010 >>> mbox cmd response: failed
10,501,186 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,802 >>> mbox cmd response data (12 bytes)
10,208,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,216,889 >>> mbox cmd response data (12 bytes)
10,217,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,225,084 >>> mbox cmd response data (12 bytes)
10,225,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,232,604 >>> mbox cmd response data (12 bytes)
10,233,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,241,243 >>> mbox cmd response data (12 bytes)
10,241,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,249,025 >>> mbox cmd response data (12 bytes)
10,249,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,256,530 >>> mbox cmd response data (12 bytes)
10,256,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,264,258 >>> mbox cmd response data (12 bytes)
10,264,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,265,648 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
4,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,487 UART:
193,047 UART: Running Caliptra ROM ...
194,150 UART:
603,680 UART: [state] CFI Enabled
616,808 UART: [state] LifecycleState = Unprovisioned
618,657 UART: [state] DebugLocked = No
620,190 UART: [state] WD Timer not started. Device not locked for debugging
623,937 UART: [kat] SHA2-256
803,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,632 UART: [kat] ++
815,161 UART: [kat] sha1
827,774 UART: [kat] SHA2-256
830,775 UART: [kat] SHA2-384
837,162 UART: [kat] SHA2-512-ACC
840,101 UART: [kat] ECC-384
3,283,108 UART: [kat] HMAC-384Kdf
3,294,496 UART: [kat] LMS
3,823,966 UART: [kat] --
3,828,972 UART: [cold-reset] ++
3,830,634 UART: [fht] FHT @ 0x50003400
3,842,202 UART: [idev] ++
3,842,761 UART: [idev] CDI.KEYID = 6
3,843,730 UART: [idev] SUBJECT.KEYID = 7
3,844,885 UART: [idev] UDS.KEYID = 0
3,859,455 UART: [idev] Erasing UDS.KEYID = 0
6,318,973 UART: [idev] Sha1 KeyId Algorithm
6,341,493 UART: [idev] --
6,345,095 UART: [ldev] ++
6,345,663 UART: [ldev] CDI.KEYID = 6
6,346,567 UART: [ldev] SUBJECT.KEYID = 5
6,347,744 UART: [ldev] AUTHORITY.KEYID = 7
6,348,973 UART: [ldev] FE.KEYID = 1
6,359,354 UART: [ldev] Erasing FE.KEYID = 1
8,831,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,294 UART: [ldev] --
10,624,233 UART: [fwproc] Wait for Commands...
10,625,735 UART: [fwproc] Recv command 0x4d454153
10,634,211 >>> mbox cmd response data (12 bytes)
10,634,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,635,788 UART: [fwproc] Recv command 0x4d454153
10,644,265 >>> mbox cmd response data (12 bytes)
10,644,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,645,910 UART: [fwproc] Recv command 0x4d454153
10,654,392 >>> mbox cmd response data (12 bytes)
10,654,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,655,430 UART: [fwproc] Recv command 0x4d454153
10,663,853 >>> mbox cmd response data (12 bytes)
10,664,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,665,367 UART: [fwproc] Recv command 0x4d454153
10,673,856 >>> mbox cmd response data (12 bytes)
10,674,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,674,940 UART: [fwproc] Recv command 0x4d454153
10,683,370 >>> mbox cmd response data (12 bytes)
10,683,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,684,939 UART: [fwproc] Recv command 0x4d454153
10,693,411 >>> mbox cmd response data (12 bytes)
10,693,838 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,695,101 UART: [fwproc] Recv command 0x4d454153
10,703,543 >>> mbox cmd response data (12 bytes)
10,703,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,704,735 UART: [fwproc] Recv command 0x4d454153
10,706,834 UART: [fwproc] Max # of measurements received.
10,708,584 >>> mbox cmd response: failed
10,711,064 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
4,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,751 >>> mbox cmd response data (12 bytes)
10,414,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,764 >>> mbox cmd response data (12 bytes)
10,423,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,332 >>> mbox cmd response data (12 bytes)
10,430,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,439,205 >>> mbox cmd response data (12 bytes)
10,439,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,447,802 >>> mbox cmd response data (12 bytes)
10,448,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,173 >>> mbox cmd response data (12 bytes)
10,455,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,769 >>> mbox cmd response data (12 bytes)
10,464,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,471,997 >>> mbox cmd response data (12 bytes)
10,472,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,474,153 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,294 UART:
192,662 UART: Running Caliptra ROM ...
193,826 UART:
193,973 UART: [state] CFI Enabled
261,994 UART: [state] LifecycleState = Unprovisioned
263,893 UART: [state] DebugLocked = No
266,466 UART: [state] WD Timer not started. Device not locked for debugging
270,325 UART: [kat] SHA2-256
449,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,044 UART: [kat] ++
461,580 UART: [kat] sha1
473,161 UART: [kat] SHA2-256
476,214 UART: [kat] SHA2-384
481,934 UART: [kat] SHA2-512-ACC
484,930 UART: [kat] ECC-384
2,947,875 UART: [kat] HMAC-384Kdf
2,971,559 UART: [kat] LMS
3,501,039 UART: [kat] --
3,506,266 UART: [cold-reset] ++
3,507,611 UART: [fht] FHT @ 0x50003400
3,517,896 UART: [idev] ++
3,518,496 UART: [idev] CDI.KEYID = 6
3,519,425 UART: [idev] SUBJECT.KEYID = 7
3,520,522 UART: [idev] UDS.KEYID = 0
3,542,706 UART: [idev] Erasing UDS.KEYID = 0
6,027,449 UART: [idev] Sha1 KeyId Algorithm
6,050,004 UART: [idev] --
6,052,766 UART: [ldev] ++
6,053,339 UART: [ldev] CDI.KEYID = 6
6,054,251 UART: [ldev] SUBJECT.KEYID = 5
6,055,470 UART: [ldev] AUTHORITY.KEYID = 7
6,056,708 UART: [ldev] FE.KEYID = 1
6,099,822 UART: [ldev] Erasing FE.KEYID = 1
8,602,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,321 UART: [ldev] --
10,393,434 UART: [fwproc] Wait for Commands...
10,396,399 UART: [fwproc] Recv command 0x4d454153
10,404,934 >>> mbox cmd response data (12 bytes)
10,405,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,406,396 UART: [fwproc] Recv command 0x4d454153
10,414,889 >>> mbox cmd response data (12 bytes)
10,415,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,578 UART: [fwproc] Recv command 0x4d454153
10,425,062 >>> mbox cmd response data (12 bytes)
10,425,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,426,750 UART: [fwproc] Recv command 0x4d454153
10,435,205 >>> mbox cmd response data (12 bytes)
10,435,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,180 UART: [fwproc] Recv command 0x4d454153
10,444,661 >>> mbox cmd response data (12 bytes)
10,445,076 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,446,557 UART: [fwproc] Recv command 0x4d454153
10,454,983 >>> mbox cmd response data (12 bytes)
10,455,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,162 UART: [fwproc] Recv command 0x4d454153
10,464,608 >>> mbox cmd response data (12 bytes)
10,465,082 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,601 UART: [fwproc] Recv command 0x4d454153
10,474,040 >>> mbox cmd response data (12 bytes)
10,474,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,475,941 UART: [fwproc] Recv command 0x4d454153
10,478,049 UART: [fwproc] Max # of measurements received.
10,479,901 >>> mbox cmd response: failed
10,483,035 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,227,854 >>> mbox cmd response data (12 bytes)
10,229,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,237,812 >>> mbox cmd response data (12 bytes)
10,238,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,245,621 >>> mbox cmd response data (12 bytes)
10,246,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,253,753 >>> mbox cmd response data (12 bytes)
10,254,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,261,644 >>> mbox cmd response data (12 bytes)
10,262,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,269,329 >>> mbox cmd response data (12 bytes)
10,269,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,277,426 >>> mbox cmd response data (12 bytes)
10,277,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,285,807 >>> mbox cmd response data (12 bytes)
10,286,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,288,452 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,450 UART:
192,810 UART: Running Caliptra ROM ...
193,934 UART:
603,543 UART: [state] CFI Enabled
619,353 UART: [state] LifecycleState = Unprovisioned
621,212 UART: [state] DebugLocked = No
623,394 UART: [state] WD Timer not started. Device not locked for debugging
627,028 UART: [kat] SHA2-256
806,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,732 UART: [kat] ++
818,263 UART: [kat] sha1
829,038 UART: [kat] SHA2-256
832,093 UART: [kat] SHA2-384
838,010 UART: [kat] SHA2-512-ACC
840,978 UART: [kat] ECC-384
3,281,702 UART: [kat] HMAC-384Kdf
3,293,260 UART: [kat] LMS
3,822,722 UART: [kat] --
3,828,362 UART: [cold-reset] ++
3,829,179 UART: [fht] FHT @ 0x50003400
3,840,350 UART: [idev] ++
3,840,911 UART: [idev] CDI.KEYID = 6
3,841,853 UART: [idev] SUBJECT.KEYID = 7
3,843,064 UART: [idev] UDS.KEYID = 0
3,856,870 UART: [idev] Erasing UDS.KEYID = 0
6,311,911 UART: [idev] Sha1 KeyId Algorithm
6,334,974 UART: [idev] --
6,338,265 UART: [ldev] ++
6,338,832 UART: [ldev] CDI.KEYID = 6
6,339,711 UART: [ldev] SUBJECT.KEYID = 5
6,340,922 UART: [ldev] AUTHORITY.KEYID = 7
6,342,205 UART: [ldev] FE.KEYID = 1
6,351,906 UART: [ldev] Erasing FE.KEYID = 1
8,824,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,899 UART: [ldev] --
10,615,464 UART: [fwproc] Wait for Commands...
10,617,244 UART: [fwproc] Recv command 0x4d454153
10,625,774 >>> mbox cmd response data (12 bytes)
10,626,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,627,446 UART: [fwproc] Recv command 0x4d454153
10,635,933 >>> mbox cmd response data (12 bytes)
10,636,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,636,880 UART: [fwproc] Recv command 0x4d454153
10,645,412 >>> mbox cmd response data (12 bytes)
10,645,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,647,304 UART: [fwproc] Recv command 0x4d454153
10,655,778 >>> mbox cmd response data (12 bytes)
10,656,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,657,705 UART: [fwproc] Recv command 0x4d454153
10,666,127 >>> mbox cmd response data (12 bytes)
10,666,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,667,915 UART: [fwproc] Recv command 0x4d454153
10,676,389 >>> mbox cmd response data (12 bytes)
10,676,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,678,129 UART: [fwproc] Recv command 0x4d454153
10,686,606 >>> mbox cmd response data (12 bytes)
10,687,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,687,563 UART: [fwproc] Recv command 0x4d454153
10,696,043 >>> mbox cmd response data (12 bytes)
10,696,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,697,365 UART: [fwproc] Recv command 0x4d454153
10,699,463 UART: [fwproc] Max # of measurements received.
10,701,288 >>> mbox cmd response: failed
10,702,441 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,411,445 >>> mbox cmd response data (12 bytes)
10,412,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,659 >>> mbox cmd response data (12 bytes)
10,420,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,427,458 >>> mbox cmd response data (12 bytes)
10,427,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,435,193 >>> mbox cmd response data (12 bytes)
10,435,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,442,999 >>> mbox cmd response data (12 bytes)
10,443,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,451,221 >>> mbox cmd response data (12 bytes)
10,451,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,458,791 >>> mbox cmd response data (12 bytes)
10,459,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,686 >>> mbox cmd response data (12 bytes)
10,467,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,468,470 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,181,949 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,241,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,156 UART: [fwproc] Wait for Commands...
1,280,881 UART: [fwproc] Recv command 0x4d454153
1,284,908 >>> mbox cmd response data (12 bytes)
1,284,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,210 UART: [fwproc] Recv command 0x4d454153
1,289,237 >>> mbox cmd response data (12 bytes)
1,289,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,419 UART: [fwproc] Recv command 0x4d454153
1,293,446 >>> mbox cmd response data (12 bytes)
1,293,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,692 UART: [fwproc] Recv command 0x4d454153
1,297,719 >>> mbox cmd response data (12 bytes)
1,297,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,827 UART: [fwproc] Recv command 0x4d454153
1,301,854 >>> mbox cmd response data (12 bytes)
1,301,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,164 UART: [fwproc] Recv command 0x4d454153
1,306,191 >>> mbox cmd response data (12 bytes)
1,306,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,407 UART: [fwproc] Recv command 0x4d454153
1,310,434 >>> mbox cmd response data (12 bytes)
1,310,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,512 UART: [fwproc] Recv command 0x4d454153
1,314,539 >>> mbox cmd response data (12 bytes)
1,314,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,839 UART: [fwproc] Recv command 0x4d454153
1,315,582 UART: [fwproc] Max # of measurements received.
1,316,227 >>> mbox cmd response: failed
1,316,841 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,328 >>> mbox cmd response data (12 bytes)
1,139,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,878 >>> mbox cmd response data (12 bytes)
1,142,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,378 >>> mbox cmd response data (12 bytes)
1,146,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,946 >>> mbox cmd response data (12 bytes)
1,149,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,414 >>> mbox cmd response data (12 bytes)
1,153,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,028 >>> mbox cmd response data (12 bytes)
1,157,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,624 >>> mbox cmd response data (12 bytes)
1,160,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,176 >>> mbox cmd response data (12 bytes)
1,164,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,340 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,074 UART: [state] WD Timer not started. Device not locked for debugging
87,247 UART: [kat] SHA2-256
890,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,926 UART: [kat] ++
895,078 UART: [kat] sha1
899,156 UART: [kat] SHA2-256
901,096 UART: [kat] SHA2-384
904,099 UART: [kat] SHA2-512-ACC
906,000 UART: [kat] ECC-384
915,683 UART: [kat] HMAC-384Kdf
920,451 UART: [kat] LMS
1,168,763 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,198,572 UART: [idev] Sha1 KeyId Algorithm
1,207,322 UART: [idev] --
1,208,355 UART: [ldev] ++
1,208,523 UART: [ldev] CDI.KEYID = 6
1,208,887 UART: [ldev] SUBJECT.KEYID = 5
1,209,314 UART: [ldev] AUTHORITY.KEYID = 7
1,209,777 UART: [ldev] FE.KEYID = 1
1,215,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,239 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,488 UART: [fwproc] Recv command 0x4d454153
1,286,515 >>> mbox cmd response data (12 bytes)
1,286,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,657 UART: [fwproc] Recv command 0x4d454153
1,290,684 >>> mbox cmd response data (12 bytes)
1,290,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,786 UART: [fwproc] Recv command 0x4d454153
1,294,813 >>> mbox cmd response data (12 bytes)
1,294,814 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,105 UART: [fwproc] Recv command 0x4d454153
1,299,132 >>> mbox cmd response data (12 bytes)
1,299,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,246 UART: [fwproc] Recv command 0x4d454153
1,303,273 >>> mbox cmd response data (12 bytes)
1,303,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,567 UART: [fwproc] Recv command 0x4d454153
1,307,594 >>> mbox cmd response data (12 bytes)
1,307,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,832 UART: [fwproc] Recv command 0x4d454153
1,311,859 >>> mbox cmd response data (12 bytes)
1,311,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,099 UART: [fwproc] Recv command 0x4d454153
1,316,126 >>> mbox cmd response data (12 bytes)
1,316,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,374 UART: [fwproc] Recv command 0x4d454153
1,317,117 UART: [fwproc] Max # of measurements received.
1,317,762 >>> mbox cmd response: failed
1,318,114 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,325 >>> mbox cmd response data (12 bytes)
1,140,326 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,931 >>> mbox cmd response data (12 bytes)
1,143,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,475 >>> mbox cmd response data (12 bytes)
1,147,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,073 >>> mbox cmd response data (12 bytes)
1,151,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,445 >>> mbox cmd response data (12 bytes)
1,154,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,025 >>> mbox cmd response data (12 bytes)
1,158,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,449 >>> mbox cmd response data (12 bytes)
1,161,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,847 >>> mbox cmd response data (12 bytes)
1,164,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,083 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,375 UART: [idev] Erasing UDS.KEYID = 0
1,199,601 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,464 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,497 UART: [fwproc] Recv command 0x4d454153
1,286,524 >>> mbox cmd response data (12 bytes)
1,286,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,646 UART: [fwproc] Recv command 0x4d454153
1,290,673 >>> mbox cmd response data (12 bytes)
1,290,674 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,835 UART: [fwproc] Recv command 0x4d454153
1,294,862 >>> mbox cmd response data (12 bytes)
1,294,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,110 UART: [fwproc] Recv command 0x4d454153
1,299,137 >>> mbox cmd response data (12 bytes)
1,299,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,447 UART: [fwproc] Recv command 0x4d454153
1,303,474 >>> mbox cmd response data (12 bytes)
1,303,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,654 UART: [fwproc] Recv command 0x4d454153
1,307,681 >>> mbox cmd response data (12 bytes)
1,307,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,919 UART: [fwproc] Recv command 0x4d454153
1,311,946 >>> mbox cmd response data (12 bytes)
1,311,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,202 UART: [fwproc] Recv command 0x4d454153
1,316,229 >>> mbox cmd response data (12 bytes)
1,316,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,415 UART: [fwproc] Recv command 0x4d454153
1,317,158 UART: [fwproc] Max # of measurements received.
1,317,803 >>> mbox cmd response: failed
1,318,237 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,472 >>> mbox cmd response data (12 bytes)
1,139,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,068 >>> mbox cmd response data (12 bytes)
1,143,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,674 >>> mbox cmd response data (12 bytes)
1,146,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,286 >>> mbox cmd response data (12 bytes)
1,150,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,750 >>> mbox cmd response data (12 bytes)
1,153,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,368 >>> mbox cmd response data (12 bytes)
1,157,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,982 >>> mbox cmd response data (12 bytes)
1,160,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,510 >>> mbox cmd response data (12 bytes)
1,164,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,698 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,143 UART: [kat] SHA2-512-ACC
906,044 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,598 UART: [idev] ++
1,172,766 UART: [idev] CDI.KEYID = 6
1,173,127 UART: [idev] SUBJECT.KEYID = 7
1,173,552 UART: [idev] UDS.KEYID = 0
1,181,582 UART: [idev] Erasing UDS.KEYID = 0
1,198,528 UART: [idev] Sha1 KeyId Algorithm
1,207,392 UART: [idev] --
1,208,443 UART: [ldev] ++
1,208,611 UART: [ldev] CDI.KEYID = 6
1,208,975 UART: [ldev] SUBJECT.KEYID = 5
1,209,402 UART: [ldev] AUTHORITY.KEYID = 7
1,209,865 UART: [ldev] FE.KEYID = 1
1,215,197 UART: [ldev] Erasing FE.KEYID = 1
1,241,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,135 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,362 UART: [fwproc] Recv command 0x4d454153
1,286,389 >>> mbox cmd response data (12 bytes)
1,286,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,649 UART: [fwproc] Recv command 0x4d454153
1,290,676 >>> mbox cmd response data (12 bytes)
1,290,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,886 UART: [fwproc] Recv command 0x4d454153
1,294,913 >>> mbox cmd response data (12 bytes)
1,294,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,093 UART: [fwproc] Recv command 0x4d454153
1,299,120 >>> mbox cmd response data (12 bytes)
1,299,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,308 UART: [fwproc] Recv command 0x4d454153
1,303,335 >>> mbox cmd response data (12 bytes)
1,303,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,559 UART: [fwproc] Recv command 0x4d454153
1,307,586 >>> mbox cmd response data (12 bytes)
1,307,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,800 UART: [fwproc] Recv command 0x4d454153
1,311,827 >>> mbox cmd response data (12 bytes)
1,311,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,037 UART: [fwproc] Recv command 0x4d454153
1,316,064 >>> mbox cmd response data (12 bytes)
1,316,065 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,136 UART: [fwproc] Recv command 0x4d454153
1,316,879 UART: [fwproc] Max # of measurements received.
1,317,524 >>> mbox cmd response: failed
1,317,834 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,185 >>> mbox cmd response data (12 bytes)
1,141,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,795 >>> mbox cmd response data (12 bytes)
1,144,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,249 >>> mbox cmd response data (12 bytes)
1,148,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,635 >>> mbox cmd response data (12 bytes)
1,151,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,029 >>> mbox cmd response data (12 bytes)
1,155,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,445 >>> mbox cmd response data (12 bytes)
1,158,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,007 >>> mbox cmd response data (12 bytes)
1,162,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,529 >>> mbox cmd response data (12 bytes)
1,165,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,827 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,554 UART: [state] LifecycleState = Unprovisioned
85,209 UART: [state] DebugLocked = No
85,707 UART: [state] WD Timer not started. Device not locked for debugging
87,062 UART: [kat] SHA2-256
890,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,741 UART: [kat] ++
894,893 UART: [kat] sha1
899,107 UART: [kat] SHA2-256
901,047 UART: [kat] SHA2-384
903,718 UART: [kat] SHA2-512-ACC
905,619 UART: [kat] ECC-384
915,356 UART: [kat] HMAC-384Kdf
919,928 UART: [kat] LMS
1,168,240 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,729 UART: [fht] FHT @ 0x50003400
1,172,385 UART: [idev] ++
1,172,553 UART: [idev] CDI.KEYID = 6
1,172,914 UART: [idev] SUBJECT.KEYID = 7
1,173,339 UART: [idev] UDS.KEYID = 0
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,065 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,208,028 UART: [ldev] ++
1,208,196 UART: [ldev] CDI.KEYID = 6
1,208,560 UART: [ldev] SUBJECT.KEYID = 5
1,208,987 UART: [ldev] AUTHORITY.KEYID = 7
1,209,450 UART: [ldev] FE.KEYID = 1
1,214,646 UART: [ldev] Erasing FE.KEYID = 1
1,241,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,632 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x4d454153
1,285,286 >>> mbox cmd response data (12 bytes)
1,285,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,466 UART: [fwproc] Recv command 0x4d454153
1,289,493 >>> mbox cmd response data (12 bytes)
1,289,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,791 UART: [fwproc] Recv command 0x4d454153
1,293,818 >>> mbox cmd response data (12 bytes)
1,293,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,006 UART: [fwproc] Recv command 0x4d454153
1,298,033 >>> mbox cmd response data (12 bytes)
1,298,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,181 UART: [fwproc] Recv command 0x4d454153
1,302,208 >>> mbox cmd response data (12 bytes)
1,302,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,514 UART: [fwproc] Recv command 0x4d454153
1,306,541 >>> mbox cmd response data (12 bytes)
1,306,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,687 UART: [fwproc] Recv command 0x4d454153
1,310,714 >>> mbox cmd response data (12 bytes)
1,310,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,826 UART: [fwproc] Recv command 0x4d454153
1,314,853 >>> mbox cmd response data (12 bytes)
1,314,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,161 UART: [fwproc] Recv command 0x4d454153
1,315,904 UART: [fwproc] Max # of measurements received.
1,316,549 >>> mbox cmd response: failed
1,317,129 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,454 >>> mbox cmd response data (12 bytes)
1,139,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,070 >>> mbox cmd response data (12 bytes)
1,143,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,532 >>> mbox cmd response data (12 bytes)
1,146,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,090 >>> mbox cmd response data (12 bytes)
1,150,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,506 >>> mbox cmd response data (12 bytes)
1,153,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,956 >>> mbox cmd response data (12 bytes)
1,156,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,568 >>> mbox cmd response data (12 bytes)
1,160,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,078 >>> mbox cmd response data (12 bytes)
1,164,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,206 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,872 UART: [kat] ++
896,024 UART: [kat] sha1
900,414 UART: [kat] SHA2-256
902,354 UART: [kat] SHA2-384
905,097 UART: [kat] SHA2-512-ACC
906,998 UART: [kat] ECC-384
916,823 UART: [kat] HMAC-384Kdf
921,595 UART: [kat] LMS
1,169,907 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,738 UART: [idev] ++
1,173,906 UART: [idev] CDI.KEYID = 6
1,174,267 UART: [idev] SUBJECT.KEYID = 7
1,174,692 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,207,984 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,005 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x4d454153
1,286,653 >>> mbox cmd response data (12 bytes)
1,286,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,801 UART: [fwproc] Recv command 0x4d454153
1,290,828 >>> mbox cmd response data (12 bytes)
1,290,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,930 UART: [fwproc] Recv command 0x4d454153
1,294,957 >>> mbox cmd response data (12 bytes)
1,294,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,105 UART: [fwproc] Recv command 0x4d454153
1,299,132 >>> mbox cmd response data (12 bytes)
1,299,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,430 UART: [fwproc] Recv command 0x4d454153
1,303,457 >>> mbox cmd response data (12 bytes)
1,303,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,709 UART: [fwproc] Recv command 0x4d454153
1,307,736 >>> mbox cmd response data (12 bytes)
1,307,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,028 UART: [fwproc] Recv command 0x4d454153
1,312,055 >>> mbox cmd response data (12 bytes)
1,312,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,271 UART: [fwproc] Recv command 0x4d454153
1,316,298 >>> mbox cmd response data (12 bytes)
1,316,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,574 UART: [fwproc] Recv command 0x4d454153
1,317,317 UART: [fwproc] Max # of measurements received.
1,317,962 >>> mbox cmd response: failed
1,318,272 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,787 >>> mbox cmd response data (12 bytes)
1,138,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,207 >>> mbox cmd response data (12 bytes)
1,142,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,733 >>> mbox cmd response data (12 bytes)
1,145,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,237 >>> mbox cmd response data (12 bytes)
1,149,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,717 >>> mbox cmd response data (12 bytes)
1,152,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,261 >>> mbox cmd response data (12 bytes)
1,156,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,651 >>> mbox cmd response data (12 bytes)
1,159,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,065 >>> mbox cmd response data (12 bytes)
1,163,066 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,259 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
2,213,097 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,353,677 UART:
2,354,078 UART: Running Caliptra ROM ...
2,355,155 UART:
2,355,311 UART: [state] CFI Enabled
2,356,292 UART: [state] LifecycleState = Unprovisioned
2,357,953 UART: [state] DebugLocked = No
2,359,001 UART: [state] WD Timer not started. Device not locked for debugging
2,361,486 UART: [kat] SHA2-256
2,362,152 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,365,162 UART: [kat] ++
2,365,608 UART: [kat] sha1
2,366,117 UART: [kat] SHA2-256
2,366,777 UART: [kat] SHA2-384
2,367,438 UART: [kat] SHA2-512-ACC
2,368,318 UART: [kat] ECC-384
3,774,332 UART: [kat] HMAC-384Kdf
3,800,998 UART: [kat] LMS
4,874,146 UART: [kat] --
4,879,348 UART: [cold-reset] ++
4,881,402 UART: [fht] FHT @ 0x50003400
4,893,034 UART: [idev] ++
4,893,710 UART: [idev] CDI.KEYID = 6
4,894,964 UART: [idev] SUBJECT.KEYID = 7
4,896,067 UART: [idev] UDS.KEYID = 0
4,929,597 UART: [idev] Erasing UDS.KEYID = 0
8,243,529 UART: [idev] Sha1 KeyId Algorithm
8,266,529 UART: [idev] --
8,271,333 UART: [ldev] ++
8,271,956 UART: [ldev] CDI.KEYID = 6
8,273,141 UART: [ldev] SUBJECT.KEYID = 5
8,274,302 UART: [ldev] AUTHORITY.KEYID = 7
8,275,537 UART: [ldev] FE.KEYID = 1
8,315,966 UART: [ldev] Erasing FE.KEYID = 1
11,649,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,017 UART: [ldev] --
14,014,287 UART: [fwproc] Wait for Commands...
14,017,462 UART: [fwproc] Recv command 0x46574c44
14,019,724 UART: [fwproc] Recv'd Img size: 111324 bytes
18,058,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,127,217 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,187,466 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,502,846 >>> mbox cmd response: success
18,507,131 UART: [afmc] ++
18,507,715 UART: [afmc] CDI.KEYID = 6
18,508,897 UART: [afmc] SUBJECT.KEYID = 7
18,510,059 UART: [afmc] AUTHORITY.KEYID = 5
21,880,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,178,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,180,929 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,197,075 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,213,212 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,229,028 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,251,132 UART: [afmc] --
24,255,053 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,255,430 UART: [cold-reset] --
24,258,458 UART: [state] Locking Datavault
24,265,111 UART: [state] Locking PCR0, PCR1 and PCR31
24,266,753 UART: [state] Locking ICCM
24,268,363 UART: [exit] Launching FMC @ 0x40000000
24,276,982 UART:
24,277,221 UART: Running Caliptra FMC ...
24,278,320 UART:
24,278,478 UART: [fmc] Received command: 0x10000009
24,279,987 >>> mbox cmd response data (48 bytes)
24,280,594 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,280,914 UART: [fmc] Received command: 0x1000000A
24,282,374 >>> mbox cmd response data (0 bytes)
24,282,632 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,282,942 UART: [fmc] Received command: 0x10000003
24,292,913 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
2,209,747 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,345,110 >>> mbox cmd response: success
24,019,725 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,034,730 UART:
24,035,060 UART: Running Caliptra FMC ...
24,036,158 UART:
24,036,309 UART: [fmc] Received command: 0x10000009
24,037,884 >>> mbox cmd response data (48 bytes)
24,038,466 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,038,790 UART: [fmc] Received command: 0x1000000A
24,040,398 >>> mbox cmd response data (0 bytes)
24,040,668 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,040,976 UART: [fmc] Received command: 0x10000003
24,050,946 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,216,310 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
2,357,601 UART:
2,358,041 UART: Running Caliptra ROM ...
2,359,224 UART:
2,359,397 UART: [state] CFI Enabled
2,360,387 UART: [state] LifecycleState = Unprovisioned
2,362,033 UART: [state] DebugLocked = No
2,363,138 UART: [state] WD Timer not started. Device not locked for debugging
2,365,610 UART: [kat] SHA2-256
2,366,271 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,369,277 UART: [kat] ++
2,369,724 UART: [kat] sha1
2,370,314 UART: [kat] SHA2-256
2,371,012 UART: [kat] SHA2-384
2,371,692 UART: [kat] SHA2-512-ACC
2,372,590 UART: [kat] ECC-384
4,101,393 UART: [kat] HMAC-384Kdf
4,114,071 UART: [kat] LMS
5,187,207 UART: [kat] --
5,191,090 UART: [cold-reset] ++
5,193,272 UART: [fht] FHT @ 0x50003400
5,205,340 UART: [idev] ++
5,206,016 UART: [idev] CDI.KEYID = 6
5,207,249 UART: [idev] SUBJECT.KEYID = 7
5,208,681 UART: [idev] UDS.KEYID = 0
5,223,652 UART: [idev] Erasing UDS.KEYID = 0
8,495,364 UART: [idev] Sha1 KeyId Algorithm
8,516,875 UART: [idev] --
8,520,712 UART: [ldev] ++
8,521,275 UART: [ldev] CDI.KEYID = 6
8,522,512 UART: [ldev] SUBJECT.KEYID = 5
8,524,016 UART: [ldev] AUTHORITY.KEYID = 7
8,525,441 UART: [ldev] FE.KEYID = 1
8,539,324 UART: [ldev] Erasing FE.KEYID = 1
11,829,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,113 UART: [ldev] --
14,194,943 UART: [fwproc] Wait for Commands...
14,196,932 UART: [fwproc] Recv command 0x46574c44
14,199,239 UART: [fwproc] Recv'd Img size: 111324 bytes
18,238,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,312,527 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,372,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,687,995 >>> mbox cmd response: success
18,691,325 UART: [afmc] ++
18,691,912 UART: [afmc] CDI.KEYID = 6
18,693,091 UART: [afmc] SUBJECT.KEYID = 7
18,694,242 UART: [afmc] AUTHORITY.KEYID = 5
22,011,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,308,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,311,029 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,327,214 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,343,322 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,359,143 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,381,386 UART: [afmc] --
24,385,306 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,385,680 UART: [cold-reset] --
24,388,867 UART: [state] Locking Datavault
24,395,716 UART: [state] Locking PCR0, PCR1 and PCR31
24,397,428 UART: [state] Locking ICCM
24,399,608 UART: [exit] Launching FMC @ 0x40000000
24,408,283 UART:
24,408,528 UART: Running Caliptra FMC ...
24,409,571 UART:
24,409,719 UART: [fmc] Received command: 0x10000009
24,411,282 >>> mbox cmd response data (48 bytes)
24,411,876 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,412,220 UART: [fmc] Received command: 0x1000000A
24,413,740 >>> mbox cmd response data (0 bytes)
24,413,998 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,414,301 UART: [fmc] Received command: 0x10000003
24,424,246 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,215,971 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,475,012 >>> mbox cmd response: success
24,102,170 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,117,680 UART:
24,118,034 UART: Running Caliptra FMC ...
24,119,217 UART:
24,119,376 UART: [fmc] Received command: 0x10000009
24,120,955 >>> mbox cmd response data (48 bytes)
24,121,538 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,121,850 UART: [fmc] Received command: 0x1000000A
24,123,449 >>> mbox cmd response data (0 bytes)
24,123,709 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,124,009 UART: [fmc] Received command: 0x10000003
24,133,972 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,222,661 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,363,824 UART:
2,364,244 UART: Running Caliptra ROM ...
2,365,413 UART:
2,365,584 UART: [state] CFI Enabled
2,366,548 UART: [state] LifecycleState = Unprovisioned
2,368,213 UART: [state] DebugLocked = No
2,369,550 UART: [state] WD Timer not started. Device not locked for debugging
2,372,046 UART: [kat] SHA2-256
2,372,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,375,734 UART: [kat] ++
2,376,187 UART: [kat] sha1
2,376,700 UART: [kat] SHA2-256
2,377,445 UART: [kat] SHA2-384
2,378,108 UART: [kat] SHA2-512-ACC
2,378,934 UART: [kat] ECC-384
2,947,364 UART: [kat] HMAC-384Kdf
2,970,978 UART: [kat] LMS
3,500,425 UART: [kat] --
3,504,612 UART: [cold-reset] ++
3,506,985 UART: [fht] FHT @ 0x50003400
3,519,317 UART: [idev] ++
3,519,884 UART: [idev] CDI.KEYID = 6
3,520,903 UART: [idev] SUBJECT.KEYID = 7
3,522,007 UART: [idev] UDS.KEYID = 0
3,543,345 UART: [idev] Erasing UDS.KEYID = 0
6,028,094 UART: [idev] Sha1 KeyId Algorithm
6,051,596 UART: [idev] --
6,055,528 UART: [ldev] ++
6,056,116 UART: [ldev] CDI.KEYID = 6
6,057,051 UART: [ldev] SUBJECT.KEYID = 5
6,058,219 UART: [ldev] AUTHORITY.KEYID = 7
6,059,470 UART: [ldev] FE.KEYID = 1
6,099,832 UART: [ldev] Erasing FE.KEYID = 1
8,598,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,424 UART: [ldev] --
10,391,464 UART: [fwproc] Wait for Commands...
10,393,512 UART: [fwproc] Recv command 0x46574c44
10,395,607 UART: [fwproc] Recv'd Img size: 111668 bytes
13,767,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,848,119 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,908,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,225,120 >>> mbox cmd response: success
14,229,376 UART: [afmc] ++
14,229,986 UART: [afmc] CDI.KEYID = 6
14,230,902 UART: [afmc] SUBJECT.KEYID = 7
14,232,062 UART: [afmc] AUTHORITY.KEYID = 5
16,762,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,175 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,505,217 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,521,290 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,537,022 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,559,152 UART: [afmc] --
18,563,783 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,564,156 UART: [cold-reset] --
18,568,156 UART: [state] Locking Datavault
18,572,114 UART: [state] Locking PCR0, PCR1 and PCR31
18,573,765 UART: [state] Locking ICCM
18,574,835 UART: [exit] Launching FMC @ 0x40000000
18,583,195 UART:
18,583,434 UART: Running Caliptra FMC ...
18,584,535 UART:
18,584,699 UART: [fmc] Received command: 0x10000009
18,586,266 >>> mbox cmd response data (48 bytes)
18,586,871 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,587,220 UART: [fmc] Received command: 0x1000000A
18,588,747 >>> mbox cmd response data (0 bytes)
18,589,014 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,589,320 UART: [fmc] Received command: 0x10000003
18,599,282 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,198 writing to cptra_bootfsm_go
2,212,706 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,037,218 >>> mbox cmd response: success
18,319,546 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,333,318 UART:
18,333,693 UART: Running Caliptra FMC ...
18,334,883 UART:
18,335,052 UART: [fmc] Received command: 0x10000009
18,336,687 >>> mbox cmd response data (48 bytes)
18,337,278 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,337,786 UART: [fmc] Received command: 0x1000000A
18,339,363 >>> mbox cmd response data (0 bytes)
18,339,631 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,339,938 UART: [fmc] Received command: 0x10000003
18,349,885 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,221,594 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,362,820 UART:
2,363,222 UART: Running Caliptra ROM ...
2,364,311 UART:
2,364,463 UART: [state] CFI Enabled
2,365,423 UART: [state] LifecycleState = Unprovisioned
2,367,078 UART: [state] DebugLocked = No
2,368,104 UART: [state] WD Timer not started. Device not locked for debugging
2,370,569 UART: [kat] SHA2-256
2,371,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,374,238 UART: [kat] ++
2,374,683 UART: [kat] sha1
2,375,194 UART: [kat] SHA2-256
2,375,850 UART: [kat] SHA2-384
2,376,505 UART: [kat] SHA2-512-ACC
2,377,305 UART: [kat] ECC-384
3,283,289 UART: [kat] HMAC-384Kdf
3,297,091 UART: [kat] LMS
3,826,600 UART: [kat] --
3,831,643 UART: [cold-reset] ++
3,833,901 UART: [fht] FHT @ 0x50003400
3,844,883 UART: [idev] ++
3,845,446 UART: [idev] CDI.KEYID = 6
3,846,358 UART: [idev] SUBJECT.KEYID = 7
3,847,572 UART: [idev] UDS.KEYID = 0
3,865,227 UART: [idev] Erasing UDS.KEYID = 0
6,324,521 UART: [idev] Sha1 KeyId Algorithm
6,345,794 UART: [idev] --
6,349,006 UART: [ldev] ++
6,349,581 UART: [ldev] CDI.KEYID = 6
6,350,460 UART: [ldev] SUBJECT.KEYID = 5
6,351,617 UART: [ldev] AUTHORITY.KEYID = 7
6,352,899 UART: [ldev] FE.KEYID = 1
6,362,667 UART: [ldev] Erasing FE.KEYID = 1
8,836,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,370 UART: [ldev] --
10,627,254 UART: [fwproc] Wait for Commands...
10,630,377 UART: [fwproc] Recv command 0x46574c44
10,632,469 UART: [fwproc] Recv'd Img size: 111668 bytes
14,005,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,076,185 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,136,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,454,078 >>> mbox cmd response: success
14,458,780 UART: [afmc] ++
14,459,363 UART: [afmc] CDI.KEYID = 6
14,460,263 UART: [afmc] SUBJECT.KEYID = 7
14,461,474 UART: [afmc] AUTHORITY.KEYID = 5
16,960,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,682,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,684,279 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,700,335 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,716,366 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,732,083 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,754,634 UART: [afmc] --
18,758,669 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,759,026 UART: [cold-reset] --
18,762,164 UART: [state] Locking Datavault
18,768,378 UART: [state] Locking PCR0, PCR1 and PCR31
18,770,021 UART: [state] Locking ICCM
18,772,686 UART: [exit] Launching FMC @ 0x40000000
18,781,075 UART:
18,781,327 UART: Running Caliptra FMC ...
18,782,349 UART:
18,782,494 UART: [fmc] Received command: 0x10000009
18,784,061 >>> mbox cmd response data (48 bytes)
18,784,637 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,784,952 UART: [fmc] Received command: 0x1000000A
18,786,418 >>> mbox cmd response data (0 bytes)
18,786,672 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,786,979 UART: [fmc] Received command: 0x10000003
18,796,938 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,215,239 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,229,960 >>> mbox cmd response: success
18,461,718 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,480,019 UART:
18,480,363 UART: Running Caliptra FMC ...
18,481,547 UART:
18,481,712 UART: [fmc] Received command: 0x10000009
18,483,351 >>> mbox cmd response data (48 bytes)
18,483,943 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,484,261 UART: [fmc] Received command: 0x1000000A
18,485,829 >>> mbox cmd response data (0 bytes)
18,486,094 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,486,411 UART: [fmc] Received command: 0x10000003
18,496,325 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,217,568 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,358,890 UART:
2,359,344 UART: Running Caliptra ROM ...
2,360,526 UART:
2,360,697 UART: [state] CFI Enabled
2,361,654 UART: [state] LifecycleState = Unprovisioned
2,363,318 UART: [state] DebugLocked = No
2,364,430 UART: [state] WD Timer not started. Device not locked for debugging
2,366,905 UART: [kat] SHA2-256
2,367,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,589 UART: [kat] ++
2,371,091 UART: [kat] sha1
2,371,609 UART: [kat] SHA2-256
2,372,351 UART: [kat] SHA2-384
2,373,015 UART: [kat] SHA2-512-ACC
2,373,847 UART: [kat] ECC-384
2,949,792 UART: [kat] HMAC-384Kdf
2,970,787 UART: [kat] LMS
3,500,265 UART: [kat] --
3,504,352 UART: [cold-reset] ++
3,505,908 UART: [fht] FHT @ 0x50003400
3,516,621 UART: [idev] ++
3,517,196 UART: [idev] CDI.KEYID = 6
3,518,111 UART: [idev] SUBJECT.KEYID = 7
3,519,270 UART: [idev] UDS.KEYID = 0
3,542,661 UART: [idev] Erasing UDS.KEYID = 0
6,026,266 UART: [idev] Sha1 KeyId Algorithm
6,048,976 UART: [idev] --
6,053,457 UART: [ldev] ++
6,054,031 UART: [ldev] CDI.KEYID = 6
6,054,945 UART: [ldev] SUBJECT.KEYID = 5
6,056,163 UART: [ldev] AUTHORITY.KEYID = 7
6,057,399 UART: [ldev] FE.KEYID = 1
6,098,686 UART: [ldev] Erasing FE.KEYID = 1
8,602,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,921 UART: [ldev] --
10,412,193 UART: [fwproc] Wait for Commands...
10,415,314 UART: [fwproc] Recv command 0x46574c44
10,417,419 UART: [fwproc] Recv'd Img size: 111668 bytes
13,787,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,864,156 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,924,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,241,431 >>> mbox cmd response: success
14,246,412 UART: [afmc] ++
14,247,029 UART: [afmc] CDI.KEYID = 6
14,247,948 UART: [afmc] SUBJECT.KEYID = 7
14,249,136 UART: [afmc] AUTHORITY.KEYID = 5
16,784,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,561 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,524,654 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,540,691 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,556,391 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,578,848 UART: [afmc] --
18,582,523 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,582,901 UART: [cold-reset] --
18,586,470 UART: [state] Locking Datavault
18,591,172 UART: [state] Locking PCR0, PCR1 and PCR31
18,592,883 UART: [state] Locking ICCM
18,594,981 UART: [exit] Launching FMC @ 0x40000000
18,603,381 UART:
18,603,615 UART: Running Caliptra FMC ...
18,604,735 UART:
18,604,900 UART: [fmc] Received command: 0x10000009
18,606,392 >>> mbox cmd response data (48 bytes)
18,606,993 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,607,305 UART: [fmc] Received command: 0x1000000A
18,608,833 >>> mbox cmd response data (0 bytes)
18,609,099 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,609,408 UART: [fmc] Received command: 0x10000003
18,619,359 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,221,949 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,009,861 >>> mbox cmd response: success
18,293,923 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,308,888 UART:
18,309,231 UART: Running Caliptra FMC ...
18,310,425 UART:
18,310,592 UART: [fmc] Received command: 0x10000009
18,312,220 >>> mbox cmd response data (48 bytes)
18,312,822 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,313,133 UART: [fmc] Received command: 0x1000000A
18,314,713 >>> mbox cmd response data (0 bytes)
18,314,982 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,315,289 UART: [fmc] Received command: 0x10000003
18,325,233 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,220,919 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,362,212 UART:
2,362,643 UART: Running Caliptra ROM ...
2,364,089 UART:
2,364,267 UART: [state] CFI Enabled
2,365,182 UART: [state] LifecycleState = Unprovisioned
2,366,840 UART: [state] DebugLocked = No
2,367,870 UART: [state] WD Timer not started. Device not locked for debugging
2,370,375 UART: [kat] SHA2-256
2,371,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,374,059 UART: [kat] ++
2,374,514 UART: [kat] sha1
2,375,024 UART: [kat] SHA2-256
2,375,800 UART: [kat] SHA2-384
2,376,470 UART: [kat] SHA2-512-ACC
2,377,295 UART: [kat] ECC-384
3,284,251 UART: [kat] HMAC-384Kdf
3,297,585 UART: [kat] LMS
3,827,054 UART: [kat] --
3,830,450 UART: [cold-reset] ++
3,831,836 UART: [fht] FHT @ 0x50003400
3,842,702 UART: [idev] ++
3,843,265 UART: [idev] CDI.KEYID = 6
3,844,271 UART: [idev] SUBJECT.KEYID = 7
3,845,424 UART: [idev] UDS.KEYID = 0
3,860,532 UART: [idev] Erasing UDS.KEYID = 0
6,317,778 UART: [idev] Sha1 KeyId Algorithm
6,339,702 UART: [idev] --
6,342,878 UART: [ldev] ++
6,343,441 UART: [ldev] CDI.KEYID = 6
6,344,374 UART: [ldev] SUBJECT.KEYID = 5
6,345,582 UART: [ldev] AUTHORITY.KEYID = 7
6,346,811 UART: [ldev] FE.KEYID = 1
6,356,667 UART: [ldev] Erasing FE.KEYID = 1
8,828,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,483 UART: [ldev] --
10,622,745 UART: [fwproc] Wait for Commands...
10,624,407 UART: [fwproc] Recv command 0x46574c44
10,626,496 UART: [fwproc] Recv'd Img size: 111668 bytes
13,993,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,064,123 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,124,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,442,223 >>> mbox cmd response: success
14,445,717 UART: [afmc] ++
14,446,321 UART: [afmc] CDI.KEYID = 6
14,447,235 UART: [afmc] SUBJECT.KEYID = 7
14,448,333 UART: [afmc] AUTHORITY.KEYID = 5
16,948,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,669,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,671,506 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,687,448 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,703,451 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,719,100 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,741,108 UART: [afmc] --
18,745,529 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,745,943 UART: [cold-reset] --
18,748,057 UART: [state] Locking Datavault
18,751,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,753,068 UART: [state] Locking ICCM
18,754,131 UART: [exit] Launching FMC @ 0x40000000
18,762,531 UART:
18,762,793 UART: Running Caliptra FMC ...
18,763,818 UART:
18,763,961 UART: [fmc] Received command: 0x10000009
18,765,582 >>> mbox cmd response data (48 bytes)
18,766,185 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,766,504 UART: [fmc] Received command: 0x1000000A
18,768,034 >>> mbox cmd response data (0 bytes)
18,768,303 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,768,615 UART: [fmc] Received command: 0x10000003
18,778,567 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,215,615 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,238,324 >>> mbox cmd response: success
18,476,096 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,491,730 UART:
18,492,048 UART: Running Caliptra FMC ...
18,493,223 UART:
18,493,392 UART: [fmc] Received command: 0x10000009
18,495,014 >>> mbox cmd response data (48 bytes)
18,495,603 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,495,957 UART: [fmc] Received command: 0x1000000A
18,497,532 >>> mbox cmd response data (0 bytes)
18,497,805 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,498,118 UART: [fmc] Received command: 0x10000003
18,508,034 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
920,052 UART: [kat] LMS
1,168,364 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,707 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,418 UART: [ldev] --
1,281,844 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,316 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,475 >>> mbox cmd response: success
2,739,662 UART: [afmc] ++
2,739,830 UART: [afmc] CDI.KEYID = 6
2,740,193 UART: [afmc] SUBJECT.KEYID = 7
2,740,619 UART: [afmc] AUTHORITY.KEYID = 5
2,776,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,625 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,321 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,220 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,913 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,863 UART: [afmc] --
2,819,857 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,819,879 UART: [cold-reset] --
2,820,667 UART: [state] Locking Datavault
2,821,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,194 UART: [state] Locking ICCM
2,822,818 UART: [exit] Launching FMC @ 0x40000000
2,828,115 UART:
2,828,131 UART: Running Caliptra FMC ...
2,828,539 UART:
2,828,769 UART: [fmc] Received command: 0x10000009
2,829,967 >>> mbox cmd response data (48 bytes)
2,829,968 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,829,997 UART: [fmc] Received command: 0x1000000A
2,830,737 >>> mbox cmd response data (0 bytes)
2,830,738 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,767 UART: [fmc] Received command: 0x10000003
2,840,223 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,433 >>> mbox cmd response: success
2,643,474 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,649,719 UART:
2,649,735 UART: Running Caliptra FMC ...
2,650,143 UART:
2,650,373 UART: [fmc] Received command: 0x10000009
2,651,571 >>> mbox cmd response data (48 bytes)
2,651,572 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,651,601 UART: [fmc] Received command: 0x1000000A
2,652,341 >>> mbox cmd response data (0 bytes)
2,652,342 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,652,371 UART: [fmc] Received command: 0x10000003
2,661,827 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,198,522 UART: [idev] Sha1 KeyId Algorithm
1,207,454 UART: [idev] --
1,208,545 UART: [ldev] ++
1,208,713 UART: [ldev] CDI.KEYID = 6
1,209,077 UART: [ldev] SUBJECT.KEYID = 5
1,209,504 UART: [ldev] AUTHORITY.KEYID = 7
1,209,967 UART: [ldev] FE.KEYID = 1
1,215,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,311 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,711 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,917 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,082 >>> mbox cmd response: success
2,739,097 UART: [afmc] ++
2,739,265 UART: [afmc] CDI.KEYID = 6
2,739,628 UART: [afmc] SUBJECT.KEYID = 7
2,740,054 UART: [afmc] AUTHORITY.KEYID = 5
2,775,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,388 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,084 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,983 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,676 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,568 UART: [afmc] --
2,818,522 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,818,544 UART: [cold-reset] --
2,819,440 UART: [state] Locking Datavault
2,820,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,137 UART: [state] Locking ICCM
2,821,791 UART: [exit] Launching FMC @ 0x40000000
2,827,088 UART:
2,827,104 UART: Running Caliptra FMC ...
2,827,512 UART:
2,827,742 UART: [fmc] Received command: 0x10000009
2,828,940 >>> mbox cmd response data (48 bytes)
2,828,941 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,828,970 UART: [fmc] Received command: 0x1000000A
2,829,710 >>> mbox cmd response data (0 bytes)
2,829,711 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,829,740 UART: [fmc] Received command: 0x10000003
2,839,196 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,222 >>> mbox cmd response: success
2,642,169 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,648,206 UART:
2,648,222 UART: Running Caliptra FMC ...
2,648,630 UART:
2,648,860 UART: [fmc] Received command: 0x10000009
2,650,058 >>> mbox cmd response data (48 bytes)
2,650,059 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,650,088 UART: [fmc] Received command: 0x1000000A
2,650,828 >>> mbox cmd response data (0 bytes)
2,650,829 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,650,858 UART: [fmc] Received command: 0x10000003
2,660,314 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
921,120 UART: [kat] LMS
1,169,432 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,349 UART: [idev] ++
1,173,517 UART: [idev] CDI.KEYID = 6
1,173,878 UART: [idev] SUBJECT.KEYID = 7
1,174,303 UART: [idev] UDS.KEYID = 0
1,182,261 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,178 UART: [ldev] ++
1,209,346 UART: [ldev] CDI.KEYID = 6
1,209,710 UART: [ldev] SUBJECT.KEYID = 5
1,210,137 UART: [ldev] AUTHORITY.KEYID = 7
1,210,600 UART: [ldev] FE.KEYID = 1
1,215,902 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,598 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,557 UART: [fwproc] Recv command 0x46574c44
1,284,290 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,100 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,740,345 >>> mbox cmd response: success
2,741,538 UART: [afmc] ++
2,741,706 UART: [afmc] CDI.KEYID = 6
2,742,069 UART: [afmc] SUBJECT.KEYID = 7
2,742,495 UART: [afmc] AUTHORITY.KEYID = 5
2,778,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,895 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,591 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,490 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,183 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,017 UART: [afmc] --
2,821,943 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,821,965 UART: [cold-reset] --
2,822,805 UART: [state] Locking Datavault
2,824,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,608 UART: [state] Locking ICCM
2,825,154 UART: [exit] Launching FMC @ 0x40000000
2,830,451 UART:
2,830,467 UART: Running Caliptra FMC ...
2,830,875 UART:
2,831,105 UART: [fmc] Received command: 0x10000009
2,832,303 >>> mbox cmd response data (48 bytes)
2,832,304 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,832,333 UART: [fmc] Received command: 0x1000000A
2,833,073 >>> mbox cmd response data (0 bytes)
2,833,074 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,103 UART: [fmc] Received command: 0x10000003
2,842,559 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,185 >>> mbox cmd response: success
2,640,666 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,646,885 UART:
2,646,901 UART: Running Caliptra FMC ...
2,647,309 UART:
2,647,539 UART: [fmc] Received command: 0x10000009
2,648,737 >>> mbox cmd response data (48 bytes)
2,648,738 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,648,767 UART: [fmc] Received command: 0x1000000A
2,649,507 >>> mbox cmd response data (0 bytes)
2,649,508 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,649,537 UART: [fmc] Received command: 0x10000003
2,658,993 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,688 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,181,700 UART: [idev] Erasing UDS.KEYID = 0
1,198,638 UART: [idev] Sha1 KeyId Algorithm
1,207,472 UART: [idev] --
1,208,467 UART: [ldev] ++
1,208,635 UART: [ldev] CDI.KEYID = 6
1,208,999 UART: [ldev] SUBJECT.KEYID = 5
1,209,426 UART: [ldev] AUTHORITY.KEYID = 7
1,209,889 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,241,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,280,853 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,521 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,698 >>> mbox cmd response: success
2,739,751 UART: [afmc] ++
2,739,919 UART: [afmc] CDI.KEYID = 6
2,740,282 UART: [afmc] SUBJECT.KEYID = 7
2,740,708 UART: [afmc] AUTHORITY.KEYID = 5
2,776,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,482 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,178 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,077 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,770 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,804 UART: [afmc] --
2,819,686 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,819,708 UART: [cold-reset] --
2,820,458 UART: [state] Locking Datavault
2,821,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,481 UART: [state] Locking ICCM
2,823,009 UART: [exit] Launching FMC @ 0x40000000
2,828,306 UART:
2,828,322 UART: Running Caliptra FMC ...
2,828,730 UART:
2,828,960 UART: [fmc] Received command: 0x10000009
2,830,158 >>> mbox cmd response data (48 bytes)
2,830,159 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,188 UART: [fmc] Received command: 0x1000000A
2,830,928 >>> mbox cmd response data (0 bytes)
2,830,929 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,958 UART: [fmc] Received command: 0x10000003
2,840,414 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,176 >>> mbox cmd response: success
2,642,945 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,649,290 UART:
2,649,306 UART: Running Caliptra FMC ...
2,649,714 UART:
2,649,944 UART: [fmc] Received command: 0x10000009
2,651,142 >>> mbox cmd response data (48 bytes)
2,651,143 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,651,172 UART: [fmc] Received command: 0x1000000A
2,651,912 >>> mbox cmd response data (0 bytes)
2,651,913 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,651,942 UART: [fmc] Received command: 0x10000003
2,661,398 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,450 UART: [kat] HMAC-384Kdf
919,948 UART: [kat] LMS
1,168,260 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,571 UART: [fht] FHT @ 0x50003400
1,172,213 UART: [idev] ++
1,172,381 UART: [idev] CDI.KEYID = 6
1,172,742 UART: [idev] SUBJECT.KEYID = 7
1,173,167 UART: [idev] UDS.KEYID = 0
1,180,961 UART: [idev] Erasing UDS.KEYID = 0
1,197,371 UART: [idev] Sha1 KeyId Algorithm
1,206,305 UART: [idev] --
1,207,252 UART: [ldev] ++
1,207,420 UART: [ldev] CDI.KEYID = 6
1,207,784 UART: [ldev] SUBJECT.KEYID = 5
1,208,211 UART: [ldev] AUTHORITY.KEYID = 7
1,208,674 UART: [ldev] FE.KEYID = 1
1,213,886 UART: [ldev] Erasing FE.KEYID = 1
1,240,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,036 UART: [ldev] --
1,279,408 UART: [fwproc] Wait for Commands...
1,280,153 UART: [fwproc] Recv command 0x46574c44
1,280,886 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,574,559 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,735,594 >>> mbox cmd response: success
2,736,789 UART: [afmc] ++
2,736,957 UART: [afmc] CDI.KEYID = 6
2,737,320 UART: [afmc] SUBJECT.KEYID = 7
2,737,746 UART: [afmc] AUTHORITY.KEYID = 5
2,772,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,086 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,795,782 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,801,681 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,807,374 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,815,114 UART: [afmc] --
2,816,176 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,816,198 UART: [cold-reset] --
2,816,838 UART: [state] Locking Datavault
2,818,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,818,747 UART: [state] Locking ICCM
2,819,417 UART: [exit] Launching FMC @ 0x40000000
2,824,714 UART:
2,824,730 UART: Running Caliptra FMC ...
2,825,138 UART:
2,825,368 UART: [fmc] Received command: 0x10000009
2,826,566 >>> mbox cmd response data (48 bytes)
2,826,567 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,596 UART: [fmc] Received command: 0x1000000A
2,827,336 >>> mbox cmd response data (0 bytes)
2,827,337 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,827,366 UART: [fmc] Received command: 0x10000003
2,836,822 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,301 >>> mbox cmd response: success
2,643,532 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,649,383 UART:
2,649,399 UART: Running Caliptra FMC ...
2,649,807 UART:
2,650,037 UART: [fmc] Received command: 0x10000009
2,651,235 >>> mbox cmd response data (48 bytes)
2,651,236 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,651,265 UART: [fmc] Received command: 0x1000000A
2,652,005 >>> mbox cmd response data (0 bytes)
2,652,006 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,652,035 UART: [fmc] Received command: 0x10000003
2,661,491 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
892,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,148 UART: [kat] ++
896,300 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,817 UART: [kat] HMAC-384Kdf
921,503 UART: [kat] LMS
1,169,815 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,736 UART: [idev] ++
1,173,904 UART: [idev] CDI.KEYID = 6
1,174,265 UART: [idev] SUBJECT.KEYID = 7
1,174,690 UART: [idev] UDS.KEYID = 0
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,198,676 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,427 UART: [ldev] ++
1,208,595 UART: [ldev] CDI.KEYID = 6
1,208,959 UART: [ldev] SUBJECT.KEYID = 5
1,209,386 UART: [ldev] AUTHORITY.KEYID = 7
1,209,849 UART: [ldev] FE.KEYID = 1
1,214,849 UART: [ldev] Erasing FE.KEYID = 1
1,240,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,357 UART: [ldev] --
1,279,789 UART: [fwproc] Wait for Commands...
1,280,506 UART: [fwproc] Recv command 0x46574c44
1,281,239 UART: [fwproc] Recv'd Img size: 111668 bytes
2,546,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,573,379 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,599,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,734,584 >>> mbox cmd response: success
2,735,615 UART: [afmc] ++
2,735,783 UART: [afmc] CDI.KEYID = 6
2,736,146 UART: [afmc] SUBJECT.KEYID = 7
2,736,572 UART: [afmc] AUTHORITY.KEYID = 5
2,772,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,028 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,795,724 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,801,623 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,807,316 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,814,996 UART: [afmc] --
2,815,854 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,815,876 UART: [cold-reset] --
2,816,570 UART: [state] Locking Datavault
2,817,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,818,451 UART: [state] Locking ICCM
2,819,103 UART: [exit] Launching FMC @ 0x40000000
2,824,400 UART:
2,824,416 UART: Running Caliptra FMC ...
2,824,824 UART:
2,825,054 UART: [fmc] Received command: 0x10000009
2,826,252 >>> mbox cmd response data (48 bytes)
2,826,253 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,826,282 UART: [fmc] Received command: 0x1000000A
2,827,022 >>> mbox cmd response data (0 bytes)
2,827,023 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,827,052 UART: [fmc] Received command: 0x10000003
2,836,508 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,786 >>> mbox cmd response: success
2,644,425 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,650,784 UART:
2,650,800 UART: Running Caliptra FMC ...
2,651,208 UART:
2,651,438 UART: [fmc] Received command: 0x10000009
2,652,636 >>> mbox cmd response data (48 bytes)
2,652,637 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,666 UART: [fmc] Received command: 0x1000000A
2,653,406 >>> mbox cmd response data (0 bytes)
2,653,407 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,653,436 UART: [fmc] Received command: 0x10000003
2,662,892 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,216,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,651 UART:
2,217,900 UART: Running Caliptra ROM ...
2,218,957 UART:
2,219,110 UART: [state] CFI Enabled
2,219,998 UART: [state] LifecycleState = Unprovisioned
2,221,658 UART: [state] DebugLocked = No
2,222,716 UART: [state] WD Timer not started. Device not locked for debugging
2,225,194 UART: [kat] SHA2-256
2,225,861 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,228,872 UART: [kat] ++
2,229,316 UART: [kat] sha1
2,229,828 UART: [kat] SHA2-256
2,230,506 UART: [kat] SHA2-384
2,231,163 UART: [kat] SHA2-512-ACC
2,231,964 UART: [kat] ECC-384
3,776,413 UART: [kat] HMAC-384Kdf
3,803,442 UART: [kat] LMS
4,876,626 UART: [kat] --
4,883,392 UART: [cold-reset] ++
4,884,789 UART: [fht] FHT @ 0x50003400
4,894,960 UART: [idev] ++
4,895,632 UART: [idev] CDI.KEYID = 6
4,896,866 UART: [idev] SUBJECT.KEYID = 7
4,897,964 UART: [idev] UDS.KEYID = 0
4,930,905 UART: [idev] Erasing UDS.KEYID = 0
8,242,703 UART: [idev] Sha1 KeyId Algorithm
8,264,534 UART: [idev] --
8,269,113 UART: [ldev] ++
8,269,698 UART: [ldev] CDI.KEYID = 6
8,270,936 UART: [ldev] SUBJECT.KEYID = 5
8,272,036 UART: [ldev] AUTHORITY.KEYID = 7
8,273,269 UART: [ldev] FE.KEYID = 1
8,319,391 UART: [ldev] Erasing FE.KEYID = 1
11,651,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,902 UART: [ldev] --
14,016,978 UART: [fwproc] Wait for Commands...
14,019,833 UART: [fwproc] Recv command 0x4d454153
14,028,867 >>> mbox cmd response data (12 bytes)
14,030,774 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
14,171,493 UART: [fwproc] Recv command 0x46574c44
14,173,909 UART: [fwproc] Recv'd Img size: 111324 bytes
18,220,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,295,344 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,355,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,671,745 >>> mbox cmd response: success
18,675,308 UART: [afmc] ++
18,675,899 UART: [afmc] CDI.KEYID = 6
18,677,086 UART: [afmc] SUBJECT.KEYID = 7
18,678,246 UART: [afmc] AUTHORITY.KEYID = 5
22,056,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,370,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,372,856 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,389,052 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,405,185 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,420,985 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,443,252 UART: [afmc] --
24,445,905 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,446,322 UART: [cold-reset] --
24,448,334 UART: [state] Locking Datavault
24,453,804 UART: [state] Locking PCR0, PCR1 and PCR31
24,455,448 UART: [state] Locking ICCM
24,458,082 UART: [exit] Launching FMC @ 0x40000000
24,466,704 UART:
24,466,944 UART: Running Caliptra FMC ...
24,468,048 UART:
24,468,210 UART: [fmc] Received command: 0x1000000A
24,469,883 >>> mbox cmd response data (116 bytes)
24,471,387 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,471,812 UART: [fmc] Received command: 0x10000009
24,473,610 >>> mbox cmd response data (48 bytes)
24,475,138 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,475,594 UART: [fmc] Received command: 0x10000003
24,485,528 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,551 writing to cptra_bootfsm_go
2,216,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,806,540 >>> mbox cmd response data (12 bytes)
13,809,001 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,427,332 >>> mbox cmd response: success
24,103,869 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,115,538 UART:
24,115,874 UART: Running Caliptra FMC ...
24,116,953 UART:
24,117,101 UART: [fmc] Received command: 0x1000000A
24,118,720 >>> mbox cmd response data (116 bytes)
24,120,112 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,120,452 UART: [fmc] Received command: 0x10000009
24,122,230 >>> mbox cmd response data (48 bytes)
24,123,763 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,124,231 UART: [fmc] Received command: 0x10000003
24,134,161 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
2,224,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,741 UART:
2,226,003 UART: Running Caliptra ROM ...
2,227,101 UART:
2,227,246 UART: [state] CFI Enabled
2,228,131 UART: [state] LifecycleState = Unprovisioned
2,229,787 UART: [state] DebugLocked = No
2,230,902 UART: [state] WD Timer not started. Device not locked for debugging
2,233,373 UART: [kat] SHA2-256
2,234,035 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,237,042 UART: [kat] ++
2,237,486 UART: [kat] sha1
2,238,023 UART: [kat] SHA2-256
2,238,680 UART: [kat] SHA2-384
2,239,331 UART: [kat] SHA2-512-ACC
2,240,123 UART: [kat] ECC-384
4,098,381 UART: [kat] HMAC-384Kdf
4,109,677 UART: [kat] LMS
5,182,790 UART: [kat] --
5,187,705 UART: [cold-reset] ++
5,189,322 UART: [fht] FHT @ 0x50003400
5,200,297 UART: [idev] ++
5,200,968 UART: [idev] CDI.KEYID = 6
5,202,192 UART: [idev] SUBJECT.KEYID = 7
5,203,668 UART: [idev] UDS.KEYID = 0
5,220,346 UART: [idev] Erasing UDS.KEYID = 0
8,489,227 UART: [idev] Sha1 KeyId Algorithm
8,511,599 UART: [idev] --
8,515,650 UART: [ldev] ++
8,516,279 UART: [ldev] CDI.KEYID = 6
8,517,381 UART: [ldev] SUBJECT.KEYID = 5
8,518,911 UART: [ldev] AUTHORITY.KEYID = 7
8,520,385 UART: [ldev] FE.KEYID = 1
8,533,891 UART: [ldev] Erasing FE.KEYID = 1
11,823,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,471 UART: [ldev] --
14,187,984 UART: [fwproc] Wait for Commands...
14,190,781 UART: [fwproc] Recv command 0x4d454153
14,199,791 >>> mbox cmd response data (12 bytes)
14,201,667 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
14,341,589 UART: [fwproc] Recv command 0x46574c44
14,343,935 UART: [fwproc] Recv'd Img size: 111324 bytes
18,382,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,458,705 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,518,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,833,841 >>> mbox cmd response: success
18,837,983 UART: [afmc] ++
18,838,590 UART: [afmc] CDI.KEYID = 6
18,839,691 UART: [afmc] SUBJECT.KEYID = 7
18,840,899 UART: [afmc] AUTHORITY.KEYID = 5
22,160,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,456,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,458,836 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,475,004 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,491,177 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,506,957 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,530,068 UART: [afmc] --
24,534,207 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,534,554 UART: [cold-reset] --
24,538,277 UART: [state] Locking Datavault
24,543,634 UART: [state] Locking PCR0, PCR1 and PCR31
24,545,272 UART: [state] Locking ICCM
24,546,336 UART: [exit] Launching FMC @ 0x40000000
24,554,958 UART:
24,555,186 UART: Running Caliptra FMC ...
24,556,278 UART:
24,556,426 UART: [fmc] Received command: 0x1000000A
24,558,151 >>> mbox cmd response data (116 bytes)
24,559,629 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,560,058 UART: [fmc] Received command: 0x10000009
24,561,855 >>> mbox cmd response data (48 bytes)
24,563,369 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,563,826 UART: [fmc] Received command: 0x10000003
24,573,761 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,219,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,022,570 >>> mbox cmd response data (12 bytes)
14,024,992 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,638,014 >>> mbox cmd response: success
24,266,003 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,279,745 UART:
24,280,069 UART: Running Caliptra FMC ...
24,281,170 UART:
24,281,319 UART: [fmc] Received command: 0x1000000A
24,282,933 >>> mbox cmd response data (116 bytes)
24,284,378 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,284,810 UART: [fmc] Received command: 0x10000009
24,286,619 >>> mbox cmd response data (48 bytes)
24,288,144 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,288,601 UART: [fmc] Received command: 0x10000003
24,298,564 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,221,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,594 UART:
2,222,858 UART: Running Caliptra ROM ...
2,223,936 UART:
2,224,090 UART: [state] CFI Enabled
2,224,958 UART: [state] LifecycleState = Unprovisioned
2,226,630 UART: [state] DebugLocked = No
2,227,747 UART: [state] WD Timer not started. Device not locked for debugging
2,230,226 UART: [kat] SHA2-256
2,230,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,233,906 UART: [kat] ++
2,234,430 UART: [kat] sha1
2,234,947 UART: [kat] SHA2-256
2,235,691 UART: [kat] SHA2-384
2,236,358 UART: [kat] SHA2-512-ACC
2,237,190 UART: [kat] ECC-384
2,947,244 UART: [kat] HMAC-384Kdf
2,973,827 UART: [kat] LMS
3,503,281 UART: [kat] --
3,509,424 UART: [cold-reset] ++
3,510,489 UART: [fht] FHT @ 0x50003400
3,522,816 UART: [idev] ++
3,523,377 UART: [idev] CDI.KEYID = 6
3,524,287 UART: [idev] SUBJECT.KEYID = 7
3,525,502 UART: [idev] UDS.KEYID = 0
3,544,879 UART: [idev] Erasing UDS.KEYID = 0
6,032,404 UART: [idev] Sha1 KeyId Algorithm
6,056,640 UART: [idev] --
6,060,134 UART: [ldev] ++
6,060,711 UART: [ldev] CDI.KEYID = 6
6,061,594 UART: [ldev] SUBJECT.KEYID = 5
6,062,811 UART: [ldev] AUTHORITY.KEYID = 7
6,064,111 UART: [ldev] FE.KEYID = 1
6,101,365 UART: [ldev] Erasing FE.KEYID = 1
8,603,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,585 UART: [ldev] --
10,416,989 UART: [fwproc] Wait for Commands...
10,419,044 UART: [fwproc] Recv command 0x4d454153
10,427,579 >>> mbox cmd response data (12 bytes)
10,429,422 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,570,712 UART: [fwproc] Recv command 0x46574c44
10,572,893 UART: [fwproc] Recv'd Img size: 111668 bytes
13,947,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,025,005 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,085,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,401,546 >>> mbox cmd response: success
14,406,419 UART: [afmc] ++
14,407,008 UART: [afmc] CDI.KEYID = 6
14,407,896 UART: [afmc] SUBJECT.KEYID = 7
14,409,063 UART: [afmc] AUTHORITY.KEYID = 5
16,937,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,054 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,682,098 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,698,165 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,713,837 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,736,823 UART: [afmc] --
18,740,316 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,740,665 UART: [cold-reset] --
18,743,690 UART: [state] Locking Datavault
18,747,266 UART: [state] Locking PCR0, PCR1 and PCR31
18,748,968 UART: [state] Locking ICCM
18,751,469 UART: [exit] Launching FMC @ 0x40000000
18,759,808 UART:
18,760,040 UART: Running Caliptra FMC ...
18,761,068 UART:
18,761,217 UART: [fmc] Received command: 0x1000000A
18,763,002 >>> mbox cmd response data (116 bytes)
18,764,346 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,764,780 UART: [fmc] Received command: 0x10000009
18,766,584 >>> mbox cmd response data (48 bytes)
18,768,102 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,768,563 UART: [fmc] Received command: 0x10000003
18,778,509 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,217,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,173,178 >>> mbox cmd response data (12 bytes)
10,175,812 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,138,050 >>> mbox cmd response: success
18,417,443 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,431,603 UART:
18,431,987 UART: Running Caliptra FMC ...
18,433,154 UART:
18,433,324 UART: [fmc] Received command: 0x1000000A
18,434,918 >>> mbox cmd response data (116 bytes)
18,436,399 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,436,833 UART: [fmc] Received command: 0x10000009
18,438,639 >>> mbox cmd response data (48 bytes)
18,440,179 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,440,645 UART: [fmc] Received command: 0x10000003
18,450,609 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
2,223,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,225,200 UART:
2,225,459 UART: Running Caliptra ROM ...
2,226,536 UART:
2,226,687 UART: [state] CFI Enabled
2,227,567 UART: [state] LifecycleState = Unprovisioned
2,229,263 UART: [state] DebugLocked = No
2,230,382 UART: [state] WD Timer not started. Device not locked for debugging
2,232,855 UART: [kat] SHA2-256
2,233,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,236,537 UART: [kat] ++
2,236,985 UART: [kat] sha1
2,237,582 UART: [kat] SHA2-256
2,238,248 UART: [kat] SHA2-384
2,238,953 UART: [kat] SHA2-512-ACC
2,239,782 UART: [kat] ECC-384
3,277,445 UART: [kat] HMAC-384Kdf
3,288,764 UART: [kat] LMS
3,818,279 UART: [kat] --
3,823,570 UART: [cold-reset] ++
3,824,637 UART: [fht] FHT @ 0x50003400
3,835,348 UART: [idev] ++
3,835,906 UART: [idev] CDI.KEYID = 6
3,836,917 UART: [idev] SUBJECT.KEYID = 7
3,838,016 UART: [idev] UDS.KEYID = 0
3,855,025 UART: [idev] Erasing UDS.KEYID = 0
6,309,390 UART: [idev] Sha1 KeyId Algorithm
6,332,661 UART: [idev] --
6,336,542 UART: [ldev] ++
6,337,100 UART: [ldev] CDI.KEYID = 6
6,337,998 UART: [ldev] SUBJECT.KEYID = 5
6,339,155 UART: [ldev] AUTHORITY.KEYID = 7
6,340,440 UART: [ldev] FE.KEYID = 1
6,352,782 UART: [ldev] Erasing FE.KEYID = 1
8,825,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,669 UART: [ldev] --
10,619,592 UART: [fwproc] Wait for Commands...
10,622,342 UART: [fwproc] Recv command 0x4d454153
10,630,869 >>> mbox cmd response data (12 bytes)
10,632,590 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,773,270 UART: [fwproc] Recv command 0x46574c44
10,775,487 UART: [fwproc] Recv'd Img size: 111668 bytes
14,143,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,209,303 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,269,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,587,119 >>> mbox cmd response: success
14,591,616 UART: [afmc] ++
14,592,199 UART: [afmc] CDI.KEYID = 6
14,593,110 UART: [afmc] SUBJECT.KEYID = 7
14,594,324 UART: [afmc] AUTHORITY.KEYID = 5
17,094,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,814,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,815,898 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,831,949 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,847,992 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,863,717 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,886,557 UART: [afmc] --
18,889,612 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,889,985 UART: [cold-reset] --
18,892,311 UART: [state] Locking Datavault
18,898,416 UART: [state] Locking PCR0, PCR1 and PCR31
18,900,070 UART: [state] Locking ICCM
18,902,357 UART: [exit] Launching FMC @ 0x40000000
18,910,694 UART:
18,910,924 UART: Running Caliptra FMC ...
18,912,019 UART:
18,912,176 UART: [fmc] Received command: 0x1000000A
18,913,896 >>> mbox cmd response data (116 bytes)
18,915,245 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,915,679 UART: [fmc] Received command: 0x10000009
18,917,483 >>> mbox cmd response data (48 bytes)
18,918,942 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,919,401 UART: [fmc] Received command: 0x10000003
18,929,366 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,220,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,406,095 >>> mbox cmd response data (12 bytes)
10,408,542 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,368,461 >>> mbox cmd response: success
18,600,016 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,615,593 UART:
18,615,942 UART: Running Caliptra FMC ...
18,617,130 UART:
18,617,286 UART: [fmc] Received command: 0x1000000A
18,618,893 >>> mbox cmd response data (116 bytes)
18,620,356 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,620,798 UART: [fmc] Received command: 0x10000009
18,622,595 >>> mbox cmd response data (48 bytes)
18,624,151 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,624,620 UART: [fmc] Received command: 0x10000003
18,634,581 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,221,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,782 UART:
2,223,043 UART: Running Caliptra ROM ...
2,224,126 UART:
2,224,276 UART: [state] CFI Enabled
2,225,144 UART: [state] LifecycleState = Unprovisioned
2,226,819 UART: [state] DebugLocked = No
2,227,937 UART: [state] WD Timer not started. Device not locked for debugging
2,230,416 UART: [kat] SHA2-256
2,231,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,122 UART: [kat] ++
2,234,577 UART: [kat] sha1
2,235,140 UART: [kat] SHA2-256
2,235,827 UART: [kat] SHA2-384
2,236,487 UART: [kat] SHA2-512-ACC
2,237,376 UART: [kat] ECC-384
2,948,281 UART: [kat] HMAC-384Kdf
2,971,489 UART: [kat] LMS
3,500,928 UART: [kat] --
3,504,872 UART: [cold-reset] ++
3,507,080 UART: [fht] FHT @ 0x50003400
3,518,768 UART: [idev] ++
3,519,335 UART: [idev] CDI.KEYID = 6
3,520,240 UART: [idev] SUBJECT.KEYID = 7
3,521,453 UART: [idev] UDS.KEYID = 0
3,544,684 UART: [idev] Erasing UDS.KEYID = 0
6,040,552 UART: [idev] Sha1 KeyId Algorithm
6,062,698 UART: [idev] --
6,066,769 UART: [ldev] ++
6,067,349 UART: [ldev] CDI.KEYID = 6
6,068,420 UART: [ldev] SUBJECT.KEYID = 5
6,069,527 UART: [ldev] AUTHORITY.KEYID = 7
6,070,706 UART: [ldev] FE.KEYID = 1
6,112,958 UART: [ldev] Erasing FE.KEYID = 1
8,615,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,568 UART: [ldev] --
10,406,400 UART: [fwproc] Wait for Commands...
10,409,119 UART: [fwproc] Recv command 0x4d454153
10,417,654 >>> mbox cmd response data (12 bytes)
10,419,551 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,560,316 UART: [fwproc] Recv command 0x46574c44
10,562,437 UART: [fwproc] Recv'd Img size: 111668 bytes
13,931,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,639 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,062,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,379,696 >>> mbox cmd response: success
14,383,871 UART: [afmc] ++
14,384,463 UART: [afmc] CDI.KEYID = 6
14,385,395 UART: [afmc] SUBJECT.KEYID = 7
14,386,555 UART: [afmc] AUTHORITY.KEYID = 5
16,929,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,654,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,655,961 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,672,096 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,688,087 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,703,784 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,727,728 UART: [afmc] --
18,732,196 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,732,566 UART: [cold-reset] --
18,735,487 UART: [state] Locking Datavault
18,741,808 UART: [state] Locking PCR0, PCR1 and PCR31
18,743,506 UART: [state] Locking ICCM
18,745,421 UART: [exit] Launching FMC @ 0x40000000
18,753,813 UART:
18,754,070 UART: Running Caliptra FMC ...
18,755,181 UART:
18,755,344 UART: [fmc] Received command: 0x1000000A
18,756,973 >>> mbox cmd response data (116 bytes)
18,758,433 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,758,892 UART: [fmc] Received command: 0x10000009
18,760,696 >>> mbox cmd response data (48 bytes)
18,762,255 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,762,715 UART: [fmc] Received command: 0x10000003
18,772,630 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,219,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,205,662 >>> mbox cmd response data (12 bytes)
10,208,107 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,170,649 >>> mbox cmd response: success
18,433,462 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,450,371 UART:
18,450,713 UART: Running Caliptra FMC ...
18,451,871 UART:
18,452,032 UART: [fmc] Received command: 0x1000000A
18,453,834 >>> mbox cmd response data (116 bytes)
18,455,283 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,455,731 UART: [fmc] Received command: 0x10000009
18,457,533 >>> mbox cmd response data (48 bytes)
18,459,074 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,459,529 UART: [fmc] Received command: 0x10000003
18,469,492 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,223,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,224,854 UART:
2,225,104 UART: Running Caliptra ROM ...
2,226,171 UART:
2,226,320 UART: [state] CFI Enabled
2,227,183 UART: [state] LifecycleState = Unprovisioned
2,228,788 UART: [state] DebugLocked = No
2,229,921 UART: [state] WD Timer not started. Device not locked for debugging
2,232,398 UART: [kat] SHA2-256
2,233,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,236,063 UART: [kat] ++
2,236,510 UART: [kat] sha1
2,237,037 UART: [kat] SHA2-256
2,237,698 UART: [kat] SHA2-384
2,238,356 UART: [kat] SHA2-512-ACC
2,239,154 UART: [kat] ECC-384
3,280,234 UART: [kat] HMAC-384Kdf
3,293,707 UART: [kat] LMS
3,823,178 UART: [kat] --
3,829,017 UART: [cold-reset] ++
3,830,629 UART: [fht] FHT @ 0x50003400
3,842,681 UART: [idev] ++
3,843,250 UART: [idev] CDI.KEYID = 6
3,844,168 UART: [idev] SUBJECT.KEYID = 7
3,845,382 UART: [idev] UDS.KEYID = 0
3,860,789 UART: [idev] Erasing UDS.KEYID = 0
6,318,899 UART: [idev] Sha1 KeyId Algorithm
6,341,341 UART: [idev] --
6,344,792 UART: [ldev] ++
6,345,371 UART: [ldev] CDI.KEYID = 6
6,346,281 UART: [ldev] SUBJECT.KEYID = 5
6,347,440 UART: [ldev] AUTHORITY.KEYID = 7
6,348,667 UART: [ldev] FE.KEYID = 1
6,359,637 UART: [ldev] Erasing FE.KEYID = 1
8,834,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,759 UART: [ldev] --
10,627,291 UART: [fwproc] Wait for Commands...
10,630,305 UART: [fwproc] Recv command 0x4d454153
10,638,833 >>> mbox cmd response data (12 bytes)
10,640,669 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
10,782,380 UART: [fwproc] Recv command 0x46574c44
10,784,552 UART: [fwproc] Recv'd Img size: 111668 bytes
14,159,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,717 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,288,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,605,331 >>> mbox cmd response: success
14,610,483 UART: [afmc] ++
14,611,065 UART: [afmc] CDI.KEYID = 6
14,611,980 UART: [afmc] SUBJECT.KEYID = 7
14,613,139 UART: [afmc] AUTHORITY.KEYID = 5
17,114,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,834,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,836,608 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,852,650 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,868,699 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,884,371 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,908,734 UART: [afmc] --
18,912,827 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,913,182 UART: [cold-reset] --
18,916,698 UART: [state] Locking Datavault
18,921,883 UART: [state] Locking PCR0, PCR1 and PCR31
18,923,528 UART: [state] Locking ICCM
18,925,918 UART: [exit] Launching FMC @ 0x40000000
18,934,306 UART:
18,934,535 UART: Running Caliptra FMC ...
18,935,630 UART:
18,935,786 UART: [fmc] Received command: 0x1000000A
18,937,458 >>> mbox cmd response data (116 bytes)
18,938,819 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,939,258 UART: [fmc] Received command: 0x10000009
18,941,056 >>> mbox cmd response data (48 bytes)
18,942,565 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,943,043 UART: [fmc] Received command: 0x10000003
18,953,009 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,219,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,645 >>> mbox cmd response data (12 bytes)
10,419,056 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,375,456 >>> mbox cmd response: success
18,610,102 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,627,627 UART:
18,627,985 UART: Running Caliptra FMC ...
18,629,067 UART:
18,629,221 UART: [fmc] Received command: 0x1000000A
18,630,883 >>> mbox cmd response data (116 bytes)
18,632,352 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,632,700 UART: [fmc] Received command: 0x10000009
18,634,508 >>> mbox cmd response data (48 bytes)
18,635,996 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,636,352 UART: [fmc] Received command: 0x10000003
18,646,275 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,117 UART: [kat] ++
895,269 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,123 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,198,981 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x4d454153
1,285,634 >>> mbox cmd response data (12 bytes)
1,285,635 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,285,830 UART: [fwproc] Recv command 0x46574c44
1,286,563 UART: [fwproc] Recv'd Img size: 111668 bytes
2,552,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,417 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,740,658 >>> mbox cmd response: success
2,741,737 UART: [afmc] ++
2,741,905 UART: [afmc] CDI.KEYID = 6
2,742,268 UART: [afmc] SUBJECT.KEYID = 7
2,742,694 UART: [afmc] AUTHORITY.KEYID = 5
2,778,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,292 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,988 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,887 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,580 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,458 UART: [afmc] --
2,821,318 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,821,340 UART: [cold-reset] --
2,822,410 UART: [state] Locking Datavault
2,823,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,807 UART: [state] Locking ICCM
2,824,233 UART: [exit] Launching FMC @ 0x40000000
2,829,530 UART:
2,829,546 UART: Running Caliptra FMC ...
2,829,954 UART:
2,830,184 UART: [fmc] Received command: 0x1000000A
2,831,613 >>> mbox cmd response data (116 bytes)
2,831,614 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,831,643 UART: [fmc] Received command: 0x10000009
2,832,841 >>> mbox cmd response data (48 bytes)
2,832,842 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,832,871 UART: [fmc] Received command: 0x10000003
2,842,327 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,652 >>> mbox cmd response data (12 bytes)
1,139,653 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,591,333 >>> mbox cmd response: success
2,646,666 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,637 UART:
2,652,653 UART: Running Caliptra FMC ...
2,653,061 UART:
2,653,291 UART: [fmc] Received command: 0x1000000A
2,654,720 >>> mbox cmd response data (116 bytes)
2,654,721 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,750 UART: [fmc] Received command: 0x10000009
2,655,948 >>> mbox cmd response data (48 bytes)
2,655,949 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,655,978 UART: [fmc] Received command: 0x10000003
2,665,434 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,200,040 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,242,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x4d454153
1,286,927 >>> mbox cmd response data (12 bytes)
1,286,928 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,287,113 UART: [fwproc] Recv command 0x46574c44
1,287,846 UART: [fwproc] Recv'd Img size: 111668 bytes
2,554,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,212 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,742,321 >>> mbox cmd response: success
2,743,428 UART: [afmc] ++
2,743,596 UART: [afmc] CDI.KEYID = 6
2,743,959 UART: [afmc] SUBJECT.KEYID = 7
2,744,385 UART: [afmc] AUTHORITY.KEYID = 5
2,780,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,525 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,221 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,120 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,814,813 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,655 UART: [afmc] --
2,823,639 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,823,661 UART: [cold-reset] --
2,824,491 UART: [state] Locking Datavault
2,825,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,410 UART: [state] Locking ICCM
2,826,834 UART: [exit] Launching FMC @ 0x40000000
2,832,131 UART:
2,832,147 UART: Running Caliptra FMC ...
2,832,555 UART:
2,832,785 UART: [fmc] Received command: 0x1000000A
2,834,214 >>> mbox cmd response data (116 bytes)
2,834,215 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,244 UART: [fmc] Received command: 0x10000009
2,835,442 >>> mbox cmd response data (48 bytes)
2,835,443 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,472 UART: [fmc] Received command: 0x10000003
2,844,928 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,683 >>> mbox cmd response data (12 bytes)
1,140,684 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,592,200 >>> mbox cmd response: success
2,648,363 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,482 UART:
2,654,498 UART: Running Caliptra FMC ...
2,654,906 UART:
2,655,136 UART: [fmc] Received command: 0x1000000A
2,656,565 >>> mbox cmd response data (116 bytes)
2,656,566 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,656,595 UART: [fmc] Received command: 0x10000009
2,657,793 >>> mbox cmd response data (48 bytes)
2,657,794 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,657,823 UART: [fmc] Received command: 0x10000003
2,667,279 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,621 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,206,975 UART: [idev] --
1,207,820 UART: [ldev] ++
1,207,988 UART: [ldev] CDI.KEYID = 6
1,208,352 UART: [ldev] SUBJECT.KEYID = 5
1,208,779 UART: [ldev] AUTHORITY.KEYID = 7
1,209,242 UART: [ldev] FE.KEYID = 1
1,214,410 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,280,102 UART: [fwproc] Wait for Commands...
1,280,889 UART: [fwproc] Recv command 0x4d454153
1,284,916 >>> mbox cmd response data (12 bytes)
1,284,917 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,285,146 UART: [fwproc] Recv command 0x46574c44
1,285,879 UART: [fwproc] Recv'd Img size: 111668 bytes
2,552,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,669 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,676 >>> mbox cmd response: success
2,740,815 UART: [afmc] ++
2,740,983 UART: [afmc] CDI.KEYID = 6
2,741,346 UART: [afmc] SUBJECT.KEYID = 7
2,741,772 UART: [afmc] AUTHORITY.KEYID = 5
2,776,889 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,950 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,646 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,545 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,238 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,894 UART: [afmc] --
2,819,970 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,819,992 UART: [cold-reset] --
2,820,944 UART: [state] Locking Datavault
2,822,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,737 UART: [state] Locking ICCM
2,823,319 UART: [exit] Launching FMC @ 0x40000000
2,828,616 UART:
2,828,632 UART: Running Caliptra FMC ...
2,829,040 UART:
2,829,270 UART: [fmc] Received command: 0x1000000A
2,830,699 >>> mbox cmd response data (116 bytes)
2,830,700 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,830,729 UART: [fmc] Received command: 0x10000009
2,831,927 >>> mbox cmd response data (48 bytes)
2,831,928 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,957 UART: [fmc] Received command: 0x10000003
2,841,413 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,234 >>> mbox cmd response data (12 bytes)
1,139,235 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,591,975 >>> mbox cmd response: success
2,647,182 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,175 UART:
2,653,191 UART: Running Caliptra FMC ...
2,653,599 UART:
2,653,829 UART: [fmc] Received command: 0x1000000A
2,655,258 >>> mbox cmd response data (116 bytes)
2,655,259 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,655,288 UART: [fmc] Received command: 0x10000009
2,656,486 >>> mbox cmd response data (48 bytes)
2,656,487 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,516 UART: [fmc] Received command: 0x10000003
2,665,972 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,776 UART: [idev] ++
1,173,944 UART: [idev] CDI.KEYID = 6
1,174,305 UART: [idev] SUBJECT.KEYID = 7
1,174,730 UART: [idev] UDS.KEYID = 0
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,244 UART: [idev] Sha1 KeyId Algorithm
1,209,070 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,617 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,898 UART: [fwproc] Recv command 0x4d454153
1,287,925 >>> mbox cmd response data (12 bytes)
1,287,926 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,288,019 UART: [fwproc] Recv command 0x46574c44
1,288,752 UART: [fwproc] Recv'd Img size: 111668 bytes
2,554,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,490 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,742,511 >>> mbox cmd response: success
2,743,672 UART: [afmc] ++
2,743,840 UART: [afmc] CDI.KEYID = 6
2,744,203 UART: [afmc] SUBJECT.KEYID = 7
2,744,629 UART: [afmc] AUTHORITY.KEYID = 5
2,780,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,751 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,447 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,346 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,039 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,011 UART: [afmc] --
2,824,007 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,029 UART: [cold-reset] --
2,825,039 UART: [state] Locking Datavault
2,826,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,704 UART: [state] Locking ICCM
2,827,124 UART: [exit] Launching FMC @ 0x40000000
2,832,421 UART:
2,832,437 UART: Running Caliptra FMC ...
2,832,845 UART:
2,833,075 UART: [fmc] Received command: 0x1000000A
2,834,504 >>> mbox cmd response data (116 bytes)
2,834,505 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,534 UART: [fmc] Received command: 0x10000009
2,835,732 >>> mbox cmd response data (48 bytes)
2,835,733 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,762 UART: [fmc] Received command: 0x10000003
2,845,218 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,999 >>> mbox cmd response data (12 bytes)
1,140,000 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,590,044 >>> mbox cmd response: success
2,646,415 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,784 UART:
2,652,800 UART: Running Caliptra FMC ...
2,653,208 UART:
2,653,438 UART: [fmc] Received command: 0x1000000A
2,654,867 >>> mbox cmd response data (116 bytes)
2,654,868 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,654,897 UART: [fmc] Received command: 0x10000009
2,656,095 >>> mbox cmd response data (48 bytes)
2,656,096 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,656,125 UART: [fmc] Received command: 0x10000003
2,665,581 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,567 UART: [idev] Sha1 KeyId Algorithm
1,208,599 UART: [idev] --
1,209,758 UART: [ldev] ++
1,209,926 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,717 UART: [ldev] AUTHORITY.KEYID = 7
1,211,180 UART: [ldev] FE.KEYID = 1
1,216,340 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,598 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x4d454153
1,286,216 >>> mbox cmd response data (12 bytes)
1,286,217 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,286,528 UART: [fwproc] Recv command 0x46574c44
1,287,261 UART: [fwproc] Recv'd Img size: 111668 bytes
2,553,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,555 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,741,636 >>> mbox cmd response: success
2,742,891 UART: [afmc] ++
2,743,059 UART: [afmc] CDI.KEYID = 6
2,743,422 UART: [afmc] SUBJECT.KEYID = 7
2,743,848 UART: [afmc] AUTHORITY.KEYID = 5
2,779,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,130 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,826 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,725 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,418 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,226 UART: [afmc] --
2,822,108 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,822,130 UART: [cold-reset] --
2,822,972 UART: [state] Locking Datavault
2,824,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,807 UART: [state] Locking ICCM
2,825,265 UART: [exit] Launching FMC @ 0x40000000
2,830,562 UART:
2,830,578 UART: Running Caliptra FMC ...
2,830,986 UART:
2,831,216 UART: [fmc] Received command: 0x1000000A
2,832,645 >>> mbox cmd response data (116 bytes)
2,832,646 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,832,675 UART: [fmc] Received command: 0x10000009
2,833,873 >>> mbox cmd response data (48 bytes)
2,833,874 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,833,903 UART: [fmc] Received command: 0x10000003
2,843,359 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,688 >>> mbox cmd response data (12 bytes)
1,137,689 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,589,039 >>> mbox cmd response: success
2,645,122 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,651,063 UART:
2,651,079 UART: Running Caliptra FMC ...
2,651,487 UART:
2,651,717 UART: [fmc] Received command: 0x1000000A
2,653,146 >>> mbox cmd response data (116 bytes)
2,653,147 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,653,176 UART: [fmc] Received command: 0x10000009
2,654,374 >>> mbox cmd response data (48 bytes)
2,654,375 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,404 UART: [fmc] Received command: 0x10000003
2,663,860 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
900,126 UART: [kat] SHA2-256
902,066 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,818 UART: [idev] Erasing UDS.KEYID = 0
1,200,034 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,927 UART: [fwproc] Wait for Commands...
1,282,700 UART: [fwproc] Recv command 0x4d454153
1,286,727 >>> mbox cmd response data (12 bytes)
1,286,728 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,286,877 UART: [fwproc] Recv command 0x46574c44
1,287,610 UART: [fwproc] Recv'd Img size: 111668 bytes
2,554,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,402 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,742,557 >>> mbox cmd response: success
2,743,696 UART: [afmc] ++
2,743,864 UART: [afmc] CDI.KEYID = 6
2,744,227 UART: [afmc] SUBJECT.KEYID = 7
2,744,653 UART: [afmc] AUTHORITY.KEYID = 5
2,780,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,721 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,417 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,316 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,009 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,822,777 UART: [afmc] --
2,823,693 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,823,715 UART: [cold-reset] --
2,824,871 UART: [state] Locking Datavault
2,825,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,540 UART: [state] Locking ICCM
2,827,084 UART: [exit] Launching FMC @ 0x40000000
2,832,381 UART:
2,832,397 UART: Running Caliptra FMC ...
2,832,805 UART:
2,833,035 UART: [fmc] Received command: 0x1000000A
2,834,464 >>> mbox cmd response data (116 bytes)
2,834,465 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,494 UART: [fmc] Received command: 0x10000009
2,835,692 >>> mbox cmd response data (48 bytes)
2,835,693 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,722 UART: [fmc] Received command: 0x10000003
2,845,178 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,579 >>> mbox cmd response data (12 bytes)
1,141,580 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,592,498 >>> mbox cmd response: success
2,648,715 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,228 UART:
2,655,244 UART: Running Caliptra FMC ...
2,655,652 UART:
2,655,882 UART: [fmc] Received command: 0x1000000A
2,657,311 >>> mbox cmd response data (116 bytes)
2,657,312 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,341 UART: [fmc] Received command: 0x10000009
2,658,539 >>> mbox cmd response data (48 bytes)
2,658,540 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,569 UART: [fmc] Received command: 0x10000003
2,668,025 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,752 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,027 UART:
192,413 UART: Running Caliptra ROM ...
193,926 UART:
194,084 UART: [state] CFI Enabled
263,869 UART: [state] LifecycleState = Unprovisioned
266,272 UART: [state] DebugLocked = No
267,863 UART: [state] WD Timer not started. Device not locked for debugging
272,559 UART: [kat] SHA2-256
454,487 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,017 UART: [kat] ++
466,609 UART: [kat] sha1
476,467 UART: [kat] SHA2-256
479,480 UART: [kat] SHA2-384
485,252 UART: [kat] SHA2-512-ACC
487,874 UART: [kat] ECC-384
3,774,520 UART: [kat] HMAC-384Kdf
3,804,050 UART: [kat] LMS
4,877,203 UART: [kat] --
4,881,085 UART: [cold-reset] ++
4,882,434 UART: [fht] FHT @ 0x50003400
4,893,366 UART: [idev] ++
4,894,037 UART: [idev] CDI.KEYID = 6
4,895,281 UART: [idev] SUBJECT.KEYID = 7
4,896,390 UART: [idev] UDS.KEYID = 0
4,929,779 UART: [idev] Erasing UDS.KEYID = 0
8,244,563 UART: [idev] Sha1 KeyId Algorithm
8,267,273 UART: [idev] --
8,271,208 UART: [ldev] ++
8,271,777 UART: [ldev] CDI.KEYID = 6
8,273,106 UART: [ldev] SUBJECT.KEYID = 5
8,274,244 UART: [ldev] AUTHORITY.KEYID = 7
8,275,374 UART: [ldev] FE.KEYID = 1
8,318,289 UART: [ldev] Erasing FE.KEYID = 1
11,652,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,205 UART: [ldev] --
14,017,934 UART: [fwproc] Wait for Commands...
14,020,572 UART: [fwproc] Recv command 0x46574c44
14,022,897 UART: Invalid Img size: 0 bytes
14,025,609 UART: ROM Fatal Error: 0x01020002
14,028,927 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,864 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,848,694 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
4,393 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,583 UART:
192,960 UART: Running Caliptra ROM ...
194,070 UART:
603,795 UART: [state] CFI Enabled
614,979 UART: [state] LifecycleState = Unprovisioned
617,010 UART: [state] DebugLocked = No
619,460 UART: [state] WD Timer not started. Device not locked for debugging
624,815 UART: [kat] SHA2-256
806,823 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,339 UART: [kat] ++
818,937 UART: [kat] sha1
827,984 UART: [kat] SHA2-256
831,040 UART: [kat] SHA2-384
835,980 UART: [kat] SHA2-512-ACC
838,646 UART: [kat] ECC-384
4,089,485 UART: [kat] HMAC-384Kdf
4,101,949 UART: [kat] LMS
5,175,065 UART: [kat] --
5,178,694 UART: [cold-reset] ++
5,180,414 UART: [fht] FHT @ 0x50003400
5,192,633 UART: [idev] ++
5,193,306 UART: [idev] CDI.KEYID = 6
5,194,538 UART: [idev] SUBJECT.KEYID = 7
5,195,965 UART: [idev] UDS.KEYID = 0
5,209,235 UART: [idev] Erasing UDS.KEYID = 0
8,480,882 UART: [idev] Sha1 KeyId Algorithm
8,501,806 UART: [idev] --
8,504,729 UART: [ldev] ++
8,505,298 UART: [ldev] CDI.KEYID = 6
8,506,537 UART: [ldev] SUBJECT.KEYID = 5
8,507,977 UART: [ldev] AUTHORITY.KEYID = 7
8,509,466 UART: [ldev] FE.KEYID = 1
8,521,031 UART: [ldev] Erasing FE.KEYID = 1
11,809,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,100,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,116,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,132,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,148,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,168,654 UART: [ldev] --
14,172,786 UART: [fwproc] Wait for Commands...
14,174,447 UART: [fwproc] Recv command 0x46574c44
14,176,710 UART: Invalid Img size: 0 bytes
14,180,084 UART: ROM Fatal Error: 0x01020002
14,183,409 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
4,022 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,009,000 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,864 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,116 UART:
192,505 UART: Running Caliptra ROM ...
193,622 UART:
193,761 UART: [state] CFI Enabled
267,870 UART: [state] LifecycleState = Unprovisioned
269,739 UART: [state] DebugLocked = No
272,473 UART: [state] WD Timer not started. Device not locked for debugging
276,302 UART: [kat] SHA2-256
455,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,991 UART: [kat] ++
467,522 UART: [kat] sha1
477,548 UART: [kat] SHA2-256
480,598 UART: [kat] SHA2-384
487,012 UART: [kat] SHA2-512-ACC
489,957 UART: [kat] ECC-384
2,950,104 UART: [kat] HMAC-384Kdf
2,972,827 UART: [kat] LMS
3,502,312 UART: [kat] --
3,507,067 UART: [cold-reset] ++
3,509,278 UART: [fht] FHT @ 0x50003400
3,520,044 UART: [idev] ++
3,520,649 UART: [idev] CDI.KEYID = 6
3,521,531 UART: [idev] SUBJECT.KEYID = 7
3,522,747 UART: [idev] UDS.KEYID = 0
3,543,760 UART: [idev] Erasing UDS.KEYID = 0
6,030,101 UART: [idev] Sha1 KeyId Algorithm
6,052,248 UART: [idev] --
6,056,572 UART: [ldev] ++
6,057,145 UART: [ldev] CDI.KEYID = 6
6,058,032 UART: [ldev] SUBJECT.KEYID = 5
6,059,251 UART: [ldev] AUTHORITY.KEYID = 7
6,060,491 UART: [ldev] FE.KEYID = 1
6,100,641 UART: [ldev] Erasing FE.KEYID = 1
8,604,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,595 UART: [ldev] --
10,417,779 UART: [fwproc] Wait for Commands...
10,419,279 UART: [fwproc] Recv command 0x46574c44
10,421,320 UART: Invalid Img size: 0 bytes
10,424,624 UART: ROM Fatal Error: 0x01020002
10,427,779 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,743 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,205,876 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
4,398 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,530 UART:
192,951 UART: Running Caliptra ROM ...
194,129 UART:
603,632 UART: [state] CFI Enabled
618,006 UART: [state] LifecycleState = Unprovisioned
619,855 UART: [state] DebugLocked = No
622,524 UART: [state] WD Timer not started. Device not locked for debugging
625,394 UART: [kat] SHA2-256
804,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,057 UART: [kat] ++
816,588 UART: [kat] sha1
826,658 UART: [kat] SHA2-256
829,656 UART: [kat] SHA2-384
835,464 UART: [kat] SHA2-512-ACC
838,391 UART: [kat] ECC-384
3,279,296 UART: [kat] HMAC-384Kdf
3,292,066 UART: [kat] LMS
3,821,573 UART: [kat] --
3,826,153 UART: [cold-reset] ++
3,828,022 UART: [fht] FHT @ 0x50003400
3,837,943 UART: [idev] ++
3,838,525 UART: [idev] CDI.KEYID = 6
3,839,492 UART: [idev] SUBJECT.KEYID = 7
3,840,608 UART: [idev] UDS.KEYID = 0
3,857,007 UART: [idev] Erasing UDS.KEYID = 0
6,316,847 UART: [idev] Sha1 KeyId Algorithm
6,339,643 UART: [idev] --
6,343,686 UART: [ldev] ++
6,344,252 UART: [ldev] CDI.KEYID = 6
6,345,158 UART: [ldev] SUBJECT.KEYID = 5
6,346,318 UART: [ldev] AUTHORITY.KEYID = 7
6,347,602 UART: [ldev] FE.KEYID = 1
6,357,441 UART: [ldev] Erasing FE.KEYID = 1
8,835,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,172 UART: [ldev] --
10,626,696 UART: [fwproc] Wait for Commands...
10,628,793 UART: [fwproc] Recv command 0x46574c44
10,630,892 UART: Invalid Img size: 0 bytes
10,634,097 UART: ROM Fatal Error: 0x01020002
10,637,191 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,236 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,401,150 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,739 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,016 UART:
192,408 UART: Running Caliptra ROM ...
193,636 UART:
193,793 UART: [state] CFI Enabled
263,712 UART: [state] LifecycleState = Unprovisioned
265,529 UART: [state] DebugLocked = No
267,418 UART: [state] WD Timer not started. Device not locked for debugging
270,678 UART: [kat] SHA2-256
449,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,409 UART: [kat] ++
461,858 UART: [kat] sha1
473,756 UART: [kat] SHA2-256
476,758 UART: [kat] SHA2-384
483,011 UART: [kat] SHA2-512-ACC
485,955 UART: [kat] ECC-384
2,947,735 UART: [kat] HMAC-384Kdf
2,971,892 UART: [kat] LMS
3,501,376 UART: [kat] --
3,506,176 UART: [cold-reset] ++
3,507,890 UART: [fht] FHT @ 0x50003400
3,519,738 UART: [idev] ++
3,520,304 UART: [idev] CDI.KEYID = 6
3,521,303 UART: [idev] SUBJECT.KEYID = 7
3,522,468 UART: [idev] UDS.KEYID = 0
3,544,395 UART: [idev] Erasing UDS.KEYID = 0
6,022,851 UART: [idev] Sha1 KeyId Algorithm
6,045,494 UART: [idev] --
6,050,196 UART: [ldev] ++
6,050,768 UART: [ldev] CDI.KEYID = 6
6,051,678 UART: [ldev] SUBJECT.KEYID = 5
6,052,842 UART: [ldev] AUTHORITY.KEYID = 7
6,054,134 UART: [ldev] FE.KEYID = 1
6,098,963 UART: [ldev] Erasing FE.KEYID = 1
8,605,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,876 UART: [ldev] --
10,413,550 UART: [fwproc] Wait for Commands...
10,415,816 UART: [fwproc] Recv command 0x46574c44
10,417,792 UART: Invalid Img size: 0 bytes
10,421,006 UART: ROM Fatal Error: 0x01020002
10,424,121 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
4,054 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,206,894 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
4,451 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,593 UART:
192,978 UART: Running Caliptra ROM ...
194,100 UART:
603,797 UART: [state] CFI Enabled
617,132 UART: [state] LifecycleState = Unprovisioned
619,022 UART: [state] DebugLocked = No
620,428 UART: [state] WD Timer not started. Device not locked for debugging
623,391 UART: [kat] SHA2-256
802,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,091 UART: [kat] ++
814,816 UART: [kat] sha1
825,518 UART: [kat] SHA2-256
828,517 UART: [kat] SHA2-384
835,747 UART: [kat] SHA2-512-ACC
838,733 UART: [kat] ECC-384
3,278,429 UART: [kat] HMAC-384Kdf
3,291,053 UART: [kat] LMS
3,820,569 UART: [kat] --
3,824,192 UART: [cold-reset] ++
3,826,014 UART: [fht] FHT @ 0x50003400
3,835,701 UART: [idev] ++
3,836,261 UART: [idev] CDI.KEYID = 6
3,837,271 UART: [idev] SUBJECT.KEYID = 7
3,838,369 UART: [idev] UDS.KEYID = 0
3,853,048 UART: [idev] Erasing UDS.KEYID = 0
6,312,566 UART: [idev] Sha1 KeyId Algorithm
6,336,506 UART: [idev] --
6,340,209 UART: [ldev] ++
6,340,806 UART: [ldev] CDI.KEYID = 6
6,341,721 UART: [ldev] SUBJECT.KEYID = 5
6,342,878 UART: [ldev] AUTHORITY.KEYID = 7
6,344,112 UART: [ldev] FE.KEYID = 1
6,356,431 UART: [ldev] Erasing FE.KEYID = 1
8,825,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,686 UART: [ldev] --
10,615,971 UART: [fwproc] Wait for Commands...
10,618,879 UART: [fwproc] Recv command 0x46574c44
10,620,964 UART: Invalid Img size: 0 bytes
10,623,327 UART: ROM Fatal Error: 0x01020002
10,626,469 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,160 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,415,905 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,537 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,360 UART: [ldev] ++
1,208,528 UART: [ldev] CDI.KEYID = 6
1,208,892 UART: [ldev] SUBJECT.KEYID = 5
1,209,319 UART: [ldev] AUTHORITY.KEYID = 7
1,209,782 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,486 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,522 UART: Invalid Img size: 0 bytes
1,283,278 UART: ROM Fatal Error: 0x01020002
1,284,437 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,771 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,727 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,592 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,297 UART: [ldev] ++
1,209,465 UART: [ldev] CDI.KEYID = 6
1,209,829 UART: [ldev] SUBJECT.KEYID = 5
1,210,256 UART: [ldev] AUTHORITY.KEYID = 7
1,210,719 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,871 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,863 UART: Invalid Img size: 0 bytes
1,284,897 UART: ROM Fatal Error: 0x01020002
1,286,056 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,138 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,538 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,182,285 UART: [idev] Erasing UDS.KEYID = 0
1,198,989 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,866 UART: [ldev] ++
1,209,034 UART: [ldev] CDI.KEYID = 6
1,209,398 UART: [ldev] SUBJECT.KEYID = 5
1,209,825 UART: [ldev] AUTHORITY.KEYID = 7
1,210,288 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,340 UART: [ldev] --
1,280,810 UART: [fwproc] Wait for Commands...
1,281,397 UART: [fwproc] Recv command 0x46574c44
1,282,126 UART: Invalid Img size: 0 bytes
1,282,882 UART: ROM Fatal Error: 0x01020002
1,284,041 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,921 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
900,190 UART: [kat] SHA2-256
902,130 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,182,314 UART: [idev] Erasing UDS.KEYID = 0
1,199,652 UART: [idev] Sha1 KeyId Algorithm
1,208,380 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: Invalid Img size: 0 bytes
1,284,799 UART: ROM Fatal Error: 0x01020002
1,285,958 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,950 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,256 UART: [kat] SHA2-512-ACC
906,157 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,321 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,641 UART: [idev] Sha1 KeyId Algorithm
1,208,561 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,216,194 UART: [ldev] Erasing FE.KEYID = 1
1,242,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,090 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,928 UART: Invalid Img size: 0 bytes
1,283,858 UART: ROM Fatal Error: 0x01020002
1,285,017 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,373 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,923 UART: [kat] SHA2-512-ACC
906,824 UART: [kat] ECC-384
917,117 UART: [kat] HMAC-384Kdf
921,869 UART: [kat] LMS
1,170,181 UART: [kat] --
1,171,050 UART: [cold-reset] ++
1,171,530 UART: [fht] FHT @ 0x50003400
1,174,126 UART: [idev] ++
1,174,294 UART: [idev] CDI.KEYID = 6
1,174,655 UART: [idev] SUBJECT.KEYID = 7
1,175,080 UART: [idev] UDS.KEYID = 0
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,168 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,803 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,227 UART: Invalid Img size: 0 bytes
1,285,247 UART: ROM Fatal Error: 0x01020002
1,286,406 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,868 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,070 UART:
192,458 UART: Running Caliptra ROM ...
193,654 UART:
193,803 UART: [state] CFI Enabled
263,152 UART: [state] LifecycleState = Unprovisioned
265,577 UART: [state] DebugLocked = No
268,147 UART: [state] WD Timer not started. Device not locked for debugging
273,556 UART: [kat] SHA2-256
455,462 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,020 UART: [kat] ++
467,657 UART: [kat] sha1
478,221 UART: [kat] SHA2-256
481,225 UART: [kat] SHA2-384
486,497 UART: [kat] SHA2-512-ACC
489,114 UART: [kat] ECC-384
3,777,873 UART: [kat] HMAC-384Kdf
3,801,898 UART: [kat] LMS
4,875,055 UART: [kat] --
4,880,493 UART: [cold-reset] ++
4,882,221 UART: [fht] FHT @ 0x50003400
4,893,594 UART: [idev] ++
4,894,338 UART: [idev] CDI.KEYID = 6
4,895,477 UART: [idev] SUBJECT.KEYID = 7
4,896,637 UART: [idev] UDS.KEYID = 0
4,929,634 UART: [idev] Erasing UDS.KEYID = 0
8,243,244 UART: [idev] Sha1 KeyId Algorithm
8,264,317 UART: [idev] CSR upload begun
8,269,765 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,575,295 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,591,576 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,607,698 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,623,695 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,648,240 UART: [idev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
10,794,174 UART: [idev] CSR uploaded
10,811,535 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,954,684 UART: [idev] --
10,955,322 UART: [ldev] ++
10,955,838 UART: [ldev] CDI.KEYID = 6
10,956,722 UART: [ldev] SUBJECT.KEYID = 5
10,957,900 UART: [ldev] AUTHORITY.KEYID = 7
10,959,029 UART: [ldev] FE.KEYID = 1
10,959,872 UART: [ldev] Erasing FE.KEYID = 1
14,192,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,504,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,521,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,536,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,552,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,572,437 UART: [ldev] --
16,576,673 UART: [fwproc] Wait for Commands...
16,578,671 UART: [fwproc] Recv command 0x46574c44
16,580,936 UART: [fwproc] Recv'd Img size: 113760 bytes
20,652,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,732,571 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,801,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,117,179 >>> mbox cmd response: success
21,121,201 UART: [afmc] ++
21,121,784 UART: [afmc] CDI.KEYID = 6
21,122,983 UART: [afmc] SUBJECT.KEYID = 7
21,124,092 UART: [afmc] AUTHORITY.KEYID = 5
24,489,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,787,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,789,719 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,805,864 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,821,915 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,837,896 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,862,071 UART: [afmc] --
26,866,255 UART: [cold-reset] --
26,870,491 UART: [state] Locking Datavault
26,875,523 UART: [state] Locking PCR0, PCR1 and PCR31
26,877,182 UART: [state] Locking ICCM
26,880,015 UART: [exit] Launching FMC @ 0x40000130
26,888,684 UART:
26,888,910 UART: Running Caliptra FMC ...
26,889,933 UART:
26,890,080 UART: [state] CFI Enabled
26,946,020 UART: [fht] FMC Alias Private Key: 7
29,283,778 UART: [art] Extend RT PCRs Done
29,284,997 UART: [art] Lock RT PCRs Done
29,286,405 UART: [art] Populate DV Done
29,291,661 UART: [fht] FMC Alias Private Key: 7
29,293,239 UART: [art] Derive CDI
29,294,063 UART: [art] Store in in slot 0x4
29,355,111 UART: [art] Derive Key Pair
29,356,112 UART: [art] Store priv key in slot 0x5
32,649,087 UART: [art] Derive Key Pair - Done
32,661,833 UART: [art] Signing Cert with AUTHO
32,663,173 UART: RITY.KEYID = 7
34,951,052 UART: [art] Erasing AUTHORITY.KEYID = 7
34,952,563 UART: [art] PUB.X = 56232BCC93CDF48361D4C73D5844AF36940DA9EE83D1E9BA783A489D0F3ADD7602BCBADB451F65AA2ADAB1B6E6CAD2F6
34,959,826 UART: [art] PUB.Y = F84639A5C52C67583508D49A357FD6C3357797126D06A641E18A8AA6D8F9092F01643DAEDAF61CC38C9C9E1E25F50A62
34,967,069 UART: [art] SIG.R = 6A3ED5FEF2E6EEDA605CAE0E49F028287E13CB7FEC2944BB48B75CEA4AC913E95128DDE6ED10FE94E6FBECD7BB167E55
34,974,496 UART: [art] SIG.S = 07A62629DD04575A26C1E2E3A84E270F0E639DA8F3944850497D9B5A24E2283BE9E57F7AA4007AB742FA3D7D022494C5
36,279,359 UART: Caliptra RT
36,280,047 UART: [state] CFI Enabled
36,441,515 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
10,481,157 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,668,526 >>> mbox cmd response: success
26,365,564 UART:
26,366,466 UART: Running Caliptra FMC ...
26,367,736 UART:
26,367,897 UART: [state] CFI Enabled
26,432,881 UART: [fht] FMC Alias Private Key: 7
28,770,738 UART: [art] Extend RT PCRs Done
28,772,115 UART: [art] Lock RT PCRs Done
28,773,944 UART: [art] Populate DV Done
28,779,252 UART: [fht] FMC Alias Private Key: 7
28,780,795 UART: [art] Derive CDI
28,781,607 UART: [art] Store in in slot 0x4
28,840,983 UART: [art] Derive Key Pair
28,842,025 UART: [art] Store priv key in slot 0x5
32,134,568 UART: [art] Derive Key Pair - Done
32,147,520 UART: [art] Signing Cert with AUTHO
32,148,822 UART: RITY.KEYID = 7
34,435,233 UART: [art] Erasing AUTHORITY.KEYID = 7
34,436,743 UART: [art] PUB.X = 53F4F86E4EE29B3DCC0BC576EE5379D427E34E67B3DCC5AE1AB3B7D8648A734B7337AE215ABC6DE215C60981DD4E2703
34,444,007 UART: [art] PUB.Y = 218A775EFD4D2DFE0C91B93535B9A1DBD392DC5EFD73686D3813357BF26C5F7C5B9705AACC95F1F02347694895514488
34,451,247 UART: [art] SIG.R = C0F12F4212EE927255F78C905B59E8AE5FA9F59204EC4B37E160AF9814F79A0E0B0B28E365B904ED74998C4862250BDF
34,458,596 UART: [art] SIG.S = 5E87A10CCB0DAD98AF428E05008873418DAC2899312597854BD30E5FF260C2A31425DB4AFF9AF108F323878CF77EB9A8
35,763,991 UART: Caliptra RT
35,764,709 UART: [state] CFI Enabled
35,925,991 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,350 UART:
192,745 UART: Running Caliptra ROM ...
193,873 UART:
603,391 UART: [state] CFI Enabled
615,433 UART: [state] LifecycleState = Unprovisioned
617,745 UART: [state] DebugLocked = No
620,626 UART: [state] WD Timer not started. Device not locked for debugging
624,472 UART: [kat] SHA2-256
806,464 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,984 UART: [kat] ++
818,484 UART: [kat] sha1
829,300 UART: [kat] SHA2-256
832,355 UART: [kat] SHA2-384
837,675 UART: [kat] SHA2-512-ACC
840,275 UART: [kat] ECC-384
4,093,442 UART: [kat] HMAC-384Kdf
4,106,077 UART: [kat] LMS
5,179,239 UART: [kat] --
5,185,188 UART: [cold-reset] ++
5,187,281 UART: [fht] FHT @ 0x50003400
5,198,522 UART: [idev] ++
5,199,196 UART: [idev] CDI.KEYID = 6
5,200,425 UART: [idev] SUBJECT.KEYID = 7
5,201,869 UART: [idev] UDS.KEYID = 0
5,218,771 UART: [idev] Erasing UDS.KEYID = 0
8,491,894 UART: [idev] Sha1 KeyId Algorithm
8,511,616 UART: [idev] CSR upload begun
8,517,119 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,807,956 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,824,313 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,840,420 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,856,412 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,880,946 UART: [idev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
11,026,901 UART: [idev] CSR uploaded
11,044,062 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
11,187,123 UART: [idev] --
11,187,764 UART: [ldev] ++
11,188,257 UART: [ldev] CDI.KEYID = 6
11,189,128 UART: [ldev] SUBJECT.KEYID = 5
11,190,332 UART: [ldev] AUTHORITY.KEYID = 7
11,191,519 UART: [ldev] FE.KEYID = 1
11,192,358 UART: [ldev] Erasing FE.KEYID = 1
14,356,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,649,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,666,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,682,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,698,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,718,754 UART: [ldev] --
16,723,690 UART: [fwproc] Wait for Commands...
16,725,302 UART: [fwproc] Recv command 0x46574c44
16,727,618 UART: [fwproc] Recv'd Img size: 113760 bytes
20,798,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,872,623 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,941,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,257,070 >>> mbox cmd response: success
21,260,547 UART: [afmc] ++
21,261,138 UART: [afmc] CDI.KEYID = 6
21,262,315 UART: [afmc] SUBJECT.KEYID = 7
21,263,466 UART: [afmc] AUTHORITY.KEYID = 5
24,577,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,872,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,874,775 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,890,891 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,906,979 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,922,981 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,945,946 UART: [afmc] --
26,949,693 UART: [cold-reset] --
26,953,603 UART: [state] Locking Datavault
26,959,708 UART: [state] Locking PCR0, PCR1 and PCR31
26,961,346 UART: [state] Locking ICCM
26,963,748 UART: [exit] Launching FMC @ 0x40000130
26,972,420 UART:
26,972,647 UART: Running Caliptra FMC ...
26,973,665 UART:
26,974,014 UART: [state] CFI Enabled
26,981,918 UART: [fht] FMC Alias Private Key: 7
29,312,354 UART: [art] Extend RT PCRs Done
29,313,575 UART: [art] Lock RT PCRs Done
29,315,486 UART: [art] Populate DV Done
29,320,673 UART: [fht] FMC Alias Private Key: 7
29,322,309 UART: [art] Derive CDI
29,323,037 UART: [art] Store in in slot 0x4
29,365,890 UART: [art] Derive Key Pair
29,366,881 UART: [art] Store priv key in slot 0x5
32,609,085 UART: [art] Derive Key Pair - Done
32,621,821 UART: [art] Signing Cert with AUTHO
32,623,128 UART: RITY.KEYID = 7
34,902,733 UART: [art] Erasing AUTHORITY.KEYID = 7
34,904,244 UART: [art] PUB.X = 1DAAA38181A6FCC0D63886B168ECB54E44440968A7FD9BC33A7431AF44566BC9CE58D648ECBBB1DFA063849B3E60C1D9
34,911,520 UART: [art] PUB.Y = 069129622D19E962FDA92C004736719006E7BA1071979E48C0A4488D7284BBB523078C3AB419C07304DF5FB43A14E162
34,918,710 UART: [art] SIG.R = 3FCDBD7B823CCE2E111171DCA625B918F38FB0F1153ED0CDBA33D050ED67F2D4AA5895E67C1709605A0FCF7CB7904BF3
34,926,103 UART: [art] SIG.S = 29927481B85563CAF0150848E55A7F7ACA491997F75BAA350509F78F66FCCF94A5A920F89DB67CD3DEFA3287E3D45BE6
36,231,360 UART: Caliptra RT
36,232,055 UART: [state] CFI Enabled
36,349,697 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
10,733,587 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,849,666 >>> mbox cmd response: success
26,491,789 UART:
26,492,656 UART: Running Caliptra FMC ...
26,493,834 UART:
26,493,978 UART: [state] CFI Enabled
26,501,377 UART: [fht] FMC Alias Private Key: 7
28,831,982 UART: [art] Extend RT PCRs Done
28,833,209 UART: [art] Lock RT PCRs Done
28,834,971 UART: [art] Populate DV Done
28,840,221 UART: [fht] FMC Alias Private Key: 7
28,841,758 UART: [art] Derive CDI
28,842,569 UART: [art] Store in in slot 0x4
28,885,316 UART: [art] Derive Key Pair
28,886,312 UART: [art] Store priv key in slot 0x5
32,128,884 UART: [art] Derive Key Pair - Done
32,142,150 UART: [art] Signing Cert with AUTHO
32,143,461 UART: RITY.KEYID = 7
34,422,721 UART: [art] Erasing AUTHORITY.KEYID = 7
34,424,232 UART: [art] PUB.X = 92B0842362BDE2EAFED0FF5AD098C92F76E4DAC2D21D81B0B5AD1D5409B7D606A2437470BBD1BC082EA34BD2613E21DA
34,431,527 UART: [art] PUB.Y = 270CA8C96D91B320D0FACA6B66ED4067FE2543551DD77C7B9DF63089325FA6D9A75C3A0A0F05725788833D8BC145C839
34,438,740 UART: [art] SIG.R = A585F3A10C5504937DF8DC667997A9C7C9F4D4C42C948B7C7AF791351BF38404F7A853DB7CEC2B60A6B88F79713209FE
34,446,117 UART: [art] SIG.S = 6073475CA9CAEF1A2226EA0F088DC035DFD95C4B81BE5792E1AD59933786CA8F3DDB53396B89BEA9C6C4A49DB7A1DE8A
35,751,468 UART: Caliptra RT
35,752,186 UART: [state] CFI Enabled
35,868,766 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,124 UART:
192,508 UART: Running Caliptra ROM ...
193,728 UART:
193,882 UART: [state] CFI Enabled
264,030 UART: [state] LifecycleState = Unprovisioned
265,957 UART: [state] DebugLocked = No
267,958 UART: [state] WD Timer not started. Device not locked for debugging
272,488 UART: [kat] SHA2-256
451,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,200 UART: [kat] ++
463,740 UART: [kat] sha1
474,736 UART: [kat] SHA2-256
477,753 UART: [kat] SHA2-384
484,542 UART: [kat] SHA2-512-ACC
487,527 UART: [kat] ECC-384
2,947,186 UART: [kat] HMAC-384Kdf
2,972,617 UART: [kat] LMS
3,502,112 UART: [kat] --
3,504,811 UART: [cold-reset] ++
3,507,448 UART: [fht] FHT @ 0x50003400
3,517,780 UART: [idev] ++
3,518,348 UART: [idev] CDI.KEYID = 6
3,519,278 UART: [idev] SUBJECT.KEYID = 7
3,520,445 UART: [idev] UDS.KEYID = 0
3,544,364 UART: [idev] Erasing UDS.KEYID = 0
6,030,178 UART: [idev] Sha1 KeyId Algorithm
6,050,548 UART: [idev] CSR upload begun
6,055,283 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,214 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,800,271 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,816,241 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,832,064 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,855,883 UART: [idev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
8,001,077 UART: [idev] CSR uploaded
8,019,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,162,980 UART: [idev] --
8,163,628 UART: [ldev] ++
8,164,125 UART: [ldev] CDI.KEYID = 6
8,165,020 UART: [ldev] SUBJECT.KEYID = 5
8,166,296 UART: [ldev] AUTHORITY.KEYID = 7
8,167,434 UART: [ldev] FE.KEYID = 1
8,168,277 UART: [ldev] Erasing FE.KEYID = 1
10,566,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,320,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,351,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,371,777 UART: [ldev] --
12,375,565 UART: [fwproc] Wait for Commands...
12,377,213 UART: [fwproc] Recv command 0x46574c44
12,379,320 UART: [fwproc] Recv'd Img size: 114084 bytes
15,774,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,848,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,917,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,234,110 >>> mbox cmd response: success
16,238,710 UART: [afmc] ++
16,239,299 UART: [afmc] CDI.KEYID = 6
16,240,211 UART: [afmc] SUBJECT.KEYID = 7
16,241,371 UART: [afmc] AUTHORITY.KEYID = 5
18,770,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,494,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,496,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,512,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,528,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,544,329 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,567,522 UART: [afmc] --
20,571,921 UART: [cold-reset] --
20,574,377 UART: [state] Locking Datavault
20,579,625 UART: [state] Locking PCR0, PCR1 and PCR31
20,581,269 UART: [state] Locking ICCM
20,583,436 UART: [exit] Launching FMC @ 0x40000130
20,591,888 UART:
20,592,125 UART: Running Caliptra FMC ...
20,593,226 UART:
20,593,385 UART: [state] CFI Enabled
20,653,629 UART: [fht] FMC Alias Private Key: 7
22,417,163 UART: [art] Extend RT PCRs Done
22,418,389 UART: [art] Lock RT PCRs Done
22,419,903 UART: [art] Populate DV Done
22,425,412 UART: [fht] FMC Alias Private Key: 7
22,426,912 UART: [art] Derive CDI
22,427,680 UART: [art] Store in in slot 0x4
22,486,233 UART: [art] Derive Key Pair
22,487,269 UART: [art] Store priv key in slot 0x5
24,950,624 UART: [art] Derive Key Pair - Done
24,963,952 UART: [art] Signing Cert with AUTHO
24,965,281 UART: RITY.KEYID = 7
26,675,557 UART: [art] Erasing AUTHORITY.KEYID = 7
26,677,082 UART: [art] PUB.X = A361224F0FF15F02BEC6BA9C34A7BE21949E8B27410444CA02DB64057B6B0CCF6CA2314BB5BE31115652AEFBBD18168A
26,684,349 UART: [art] PUB.Y = B222C5F7BD027B65BD15FCA01F2B462B068A56437549F47E76E97F25A8D4E7F7A94C861A68949EDDB3E3A76FCDCE3DED
26,691,580 UART: [art] SIG.R = 1386AA56ACE282D066A24A3C74A0320A2F7B6537E075986C4257DB02D3B01BF011C945F8B7E4085037FF17F5B0E41DD8
26,699,027 UART: [art] SIG.S = 146B319C5E1CF5E821A4199CB722EE27C9C5A8CD2348E128FF332BACD79721A3ACAEC95C0214E18E62AD386C9E49E582
27,677,420 UART: Caliptra RT
27,678,121 UART: [state] CFI Enabled
27,842,696 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
7,684,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,841,918 >>> mbox cmd response: success
20,138,100 UART:
20,138,492 UART: Running Caliptra FMC ...
20,139,712 UART:
20,139,886 UART: [state] CFI Enabled
20,201,715 UART: [fht] FMC Alias Private Key: 7
21,966,102 UART: [art] Extend RT PCRs Done
21,967,330 UART: [art] Lock RT PCRs Done
21,968,982 UART: [art] Populate DV Done
21,974,555 UART: [fht] FMC Alias Private Key: 7
21,975,988 UART: [art] Derive CDI
21,976,719 UART: [art] Store in in slot 0x4
22,036,086 UART: [art] Derive Key Pair
22,037,135 UART: [art] Store priv key in slot 0x5
24,500,028 UART: [art] Derive Key Pair - Done
24,513,140 UART: [art] Signing Cert with AUTHO
24,514,445 UART: RITY.KEYID = 7
26,225,768 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,281 UART: [art] PUB.X = C85EAFF140DA38CC3E61F0F452155CEC60002CEF173410EFBC3BC682CD8525B39F61185A90AC840F3C814F53C3C26893
26,234,528 UART: [art] PUB.Y = 60B2B0EA8CA13B76B9618C225E7142A24A35FF7DA226CC416B0514F599AA46F0C07DCB01D645DB359D12F3BBEE447389
26,241,825 UART: [art] SIG.R = D6DD829C1514FB5063CBCDDFB6F7EF4E5F8981449EB86E6FE252B4DA540F9B6D4413A508C6DF18B5856A9FDABEC2B2EF
26,249,228 UART: [art] SIG.S = DFD79D079968F51E3CBCC1C3B3FB705FD08A57E1D790F14E4056D55FBD31F0C0B345BE5A0D0A6F7F09D029F2008F8FCC
27,228,399 UART: Caliptra RT
27,229,113 UART: [state] CFI Enabled
27,393,227 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,050 writing to cptra_bootfsm_go
193,357 UART:
193,730 UART: Running Caliptra ROM ...
194,888 UART:
604,312 UART: [state] CFI Enabled
615,504 UART: [state] LifecycleState = Unprovisioned
617,389 UART: [state] DebugLocked = No
620,329 UART: [state] WD Timer not started. Device not locked for debugging
624,199 UART: [kat] SHA2-256
803,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,914 UART: [kat] ++
815,358 UART: [kat] sha1
826,769 UART: [kat] SHA2-256
829,832 UART: [kat] SHA2-384
836,775 UART: [kat] SHA2-512-ACC
839,758 UART: [kat] ECC-384
3,282,624 UART: [kat] HMAC-384Kdf
3,294,080 UART: [kat] LMS
3,823,606 UART: [kat] --
3,829,545 UART: [cold-reset] ++
3,831,523 UART: [fht] FHT @ 0x50003400
3,843,867 UART: [idev] ++
3,844,470 UART: [idev] CDI.KEYID = 6
3,845,393 UART: [idev] SUBJECT.KEYID = 7
3,846,552 UART: [idev] UDS.KEYID = 0
3,861,877 UART: [idev] Erasing UDS.KEYID = 0
6,322,651 UART: [idev] Sha1 KeyId Algorithm
6,343,355 UART: [idev] CSR upload begun
6,348,073 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,064,192 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,080,287 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,096,218 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,112,056 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,135,862 UART: [idev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
8,281,094 UART: [idev] CSR uploaded
8,299,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,442,670 UART: [idev] --
8,443,344 UART: [ldev] ++
8,443,841 UART: [ldev] CDI.KEYID = 6
8,444,764 UART: [ldev] SUBJECT.KEYID = 5
8,445,854 UART: [ldev] AUTHORITY.KEYID = 7
8,446,948 UART: [ldev] FE.KEYID = 1
8,447,782 UART: [ldev] Erasing FE.KEYID = 1
10,792,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,510,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,526,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,542,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,558,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,579,076 UART: [ldev] --
12,582,893 UART: [fwproc] Wait for Commands...
12,585,691 UART: [fwproc] Recv command 0x46574c44
12,587,787 UART: [fwproc] Recv'd Img size: 114084 bytes
15,985,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,806 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,443,177 >>> mbox cmd response: success
16,446,815 UART: [afmc] ++
16,447,400 UART: [afmc] CDI.KEYID = 6
16,448,305 UART: [afmc] SUBJECT.KEYID = 7
16,449,516 UART: [afmc] AUTHORITY.KEYID = 5
18,949,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,671,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,673,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,689,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,705,706 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,721,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,744,116 UART: [afmc] --
20,748,569 UART: [cold-reset] --
20,753,729 UART: [state] Locking Datavault
20,760,016 UART: [state] Locking PCR0, PCR1 and PCR31
20,761,662 UART: [state] Locking ICCM
20,763,648 UART: [exit] Launching FMC @ 0x40000130
20,772,095 UART:
20,772,337 UART: Running Caliptra FMC ...
20,773,435 UART:
20,773,591 UART: [state] CFI Enabled
20,782,072 UART: [fht] FMC Alias Private Key: 7
22,538,467 UART: [art] Extend RT PCRs Done
22,539,688 UART: [art] Lock RT PCRs Done
22,541,443 UART: [art] Populate DV Done
22,546,959 UART: [fht] FMC Alias Private Key: 7
22,548,543 UART: [art] Derive CDI
22,549,278 UART: [art] Store in in slot 0x4
22,592,246 UART: [art] Derive Key Pair
22,593,282 UART: [art] Store priv key in slot 0x5
25,020,041 UART: [art] Derive Key Pair - Done
25,033,113 UART: [art] Signing Cert with AUTHO
25,034,422 UART: RITY.KEYID = 7
26,739,702 UART: [art] Erasing AUTHORITY.KEYID = 7
26,741,222 UART: [art] PUB.X = B29A2DF127AF75AB76AA38A4DCBDF027D7FDA4990678B92E9DFBC522D0FCA9D95956F70320DE3132C92FF5141A7E1410
26,748,483 UART: [art] PUB.Y = 353822739EBA0AE1CCAA0169CD1A46560492DD188F7C819AB56AA5A96ABA10B883778BFD8755F780FAE449031861F82B
26,755,724 UART: [art] SIG.R = 95C6AD3EABFB52AF2FE52E8A78D45914CF828EB8D9355080E8DBDF257B0447C4CCA948A0F6C5881ED3863FB69842F38F
26,763,176 UART: [art] SIG.S = 07B786980CC7D08EB58F4E094D2B5CBBB841832AE4C7B888CD7D24140857AE2EE85007E819FD91964C540166875C4FA8
27,742,458 UART: Caliptra RT
27,743,166 UART: [state] CFI Enabled
27,860,678 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
7,937,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,001,012 >>> mbox cmd response: success
20,246,667 UART:
20,247,066 UART: Running Caliptra FMC ...
20,248,235 UART:
20,248,394 UART: [state] CFI Enabled
20,256,063 UART: [fht] FMC Alias Private Key: 7
22,013,222 UART: [art] Extend RT PCRs Done
22,014,576 UART: [art] Lock RT PCRs Done
22,016,017 UART: [art] Populate DV Done
22,021,377 UART: [fht] FMC Alias Private Key: 7
22,023,030 UART: [art] Derive CDI
22,023,849 UART: [art] Store in in slot 0x4
22,066,223 UART: [art] Derive Key Pair
22,067,222 UART: [art] Store priv key in slot 0x5
24,494,247 UART: [art] Derive Key Pair - Done
24,507,521 UART: [art] Signing Cert with AUTHO
24,508,830 UART: RITY.KEYID = 7
26,213,592 UART: [art] Erasing AUTHORITY.KEYID = 7
26,215,100 UART: [art] PUB.X = 84B9A251F4688F99FD8E6E440D3F0D6F015D5FA4C082352AF5492EB908B804B30AB832B99938C6BE5CB14710140BA2C5
26,222,362 UART: [art] PUB.Y = 69813B9256644EAB31F7D8CBEB24E6D055A707C7837AD83A138925EDCDBA49DA7B7055EE54F81B05442CC5201B2542B9
26,229,626 UART: [art] SIG.R = BC8FE40543A46D10A8B80A5EA6E54CEF1FB3E5BCBE214D58B4595F23C59AFE5E7171F9D9025F42E6BBB6F67370AB2875
26,237,024 UART: [art] SIG.S = 19EB6DD2B5742FF2E7A123BDD1173C849F65F10D841DA8690F35B171709991B169D617D92C27E711407BCED04BE7B5B1
27,215,569 UART: Caliptra RT
27,216,262 UART: [state] CFI Enabled
27,332,816 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,364 UART:
192,734 UART: Running Caliptra ROM ...
193,943 UART:
194,098 UART: [state] CFI Enabled
267,129 UART: [state] LifecycleState = Unprovisioned
268,973 UART: [state] DebugLocked = No
271,646 UART: [state] WD Timer not started. Device not locked for debugging
275,202 UART: [kat] SHA2-256
454,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,904 UART: [kat] ++
466,416 UART: [kat] sha1
478,271 UART: [kat] SHA2-256
481,293 UART: [kat] SHA2-384
486,252 UART: [kat] SHA2-512-ACC
489,240 UART: [kat] ECC-384
2,945,742 UART: [kat] HMAC-384Kdf
2,969,931 UART: [kat] LMS
3,499,352 UART: [kat] --
3,503,581 UART: [cold-reset] ++
3,505,767 UART: [fht] FHT @ 0x50003400
3,517,029 UART: [idev] ++
3,517,597 UART: [idev] CDI.KEYID = 6
3,518,476 UART: [idev] SUBJECT.KEYID = 7
3,519,695 UART: [idev] UDS.KEYID = 0
3,541,756 UART: [idev] Erasing UDS.KEYID = 0
6,025,603 UART: [idev] Sha1 KeyId Algorithm
6,045,483 UART: [idev] CSR upload begun
6,050,144 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,777,692 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,793,809 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,809,749 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,825,603 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,849,400 UART: [idev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
7,994,371 UART: [idev] CSR uploaded
8,012,463 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,156,200 UART: [idev] --
8,156,845 UART: [ldev] ++
8,157,340 UART: [ldev] CDI.KEYID = 6
8,158,216 UART: [ldev] SUBJECT.KEYID = 5
8,159,288 UART: [ldev] AUTHORITY.KEYID = 7
8,160,476 UART: [ldev] FE.KEYID = 1
8,161,320 UART: [ldev] Erasing FE.KEYID = 1
10,561,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,301,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,317,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,370,450 UART: [ldev] --
12,375,236 UART: [fwproc] Wait for Commands...
12,377,012 UART: [fwproc] Recv command 0x46574c44
12,379,124 UART: [fwproc] Recv'd Img size: 114084 bytes
15,782,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,857,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,926,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,243,770 >>> mbox cmd response: success
16,248,433 UART: [afmc] ++
16,249,019 UART: [afmc] CDI.KEYID = 6
16,249,902 UART: [afmc] SUBJECT.KEYID = 7
16,251,118 UART: [afmc] AUTHORITY.KEYID = 5
18,786,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,512,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,514,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,530,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,546,239 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,562,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,584,262 UART: [afmc] --
20,587,851 UART: [cold-reset] --
20,590,139 UART: [state] Locking Datavault
20,594,196 UART: [state] Locking PCR0, PCR1 and PCR31
20,595,840 UART: [state] Locking ICCM
20,597,853 UART: [exit] Launching FMC @ 0x40000130
20,606,307 UART:
20,606,585 UART: Running Caliptra FMC ...
20,607,614 UART:
20,607,761 UART: [state] CFI Enabled
20,669,308 UART: [fht] FMC Alias Private Key: 7
22,433,832 UART: [art] Extend RT PCRs Done
22,435,055 UART: [art] Lock RT PCRs Done
22,436,981 UART: [art] Populate DV Done
22,442,504 UART: [fht] FMC Alias Private Key: 7
22,443,990 UART: [art] Derive CDI
22,444,733 UART: [art] Store in in slot 0x4
22,500,905 UART: [art] Derive Key Pair
22,501,901 UART: [art] Store priv key in slot 0x5
24,964,436 UART: [art] Derive Key Pair - Done
24,977,050 UART: [art] Signing Cert with AUTHO
24,978,361 UART: RITY.KEYID = 7
26,690,375 UART: [art] Erasing AUTHORITY.KEYID = 7
26,691,881 UART: [art] PUB.X = EFB096C0AB821F2687B0B2DF15A119ACC70CE6E807C8B9DF13885BA65FA3AD2B33B7E44E6B421272FA286487996AC62D
26,699,169 UART: [art] PUB.Y = 355DF6C64482D01EAA1AB5945BD3C59613B434E8F6BA308B113FCE2B0C9B3BC3C936AAE67E8A5822553AA06F1A2BA28F
26,706,410 UART: [art] SIG.R = F0F8A50EEA25D8411B4757E97FDE31EB224E52AFEC4D41E96243C57E6FFDA2A11ED17B1870CB013C9AEC84B3DCD1CB34
26,713,855 UART: [art] SIG.S = CA59D6B33916CD4F8D659DC78E9F0351E0C62EDF9E7E9F0547CD3E237CFBD235E5C1802A8B36C4AC57751BB98E550DF3
27,692,422 UART: Caliptra RT
27,693,140 UART: [state] CFI Enabled
27,858,692 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
7,687,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,807,937 >>> mbox cmd response: success
20,102,634 UART:
20,103,532 UART: Running Caliptra FMC ...
20,104,719 UART:
20,104,871 UART: [state] CFI Enabled
20,167,461 UART: [fht] FMC Alias Private Key: 7
21,930,740 UART: [art] Extend RT PCRs Done
21,932,048 UART: [art] Lock RT PCRs Done
21,933,595 UART: [art] Populate DV Done
21,939,053 UART: [fht] FMC Alias Private Key: 7
21,940,696 UART: [art] Derive CDI
21,941,525 UART: [art] Store in in slot 0x4
22,000,303 UART: [art] Derive Key Pair
22,001,304 UART: [art] Store priv key in slot 0x5
24,463,919 UART: [art] Derive Key Pair - Done
24,476,998 UART: [art] Signing Cert with AUTHO
24,478,307 UART: RITY.KEYID = 7
26,190,681 UART: [art] Erasing AUTHORITY.KEYID = 7
26,192,198 UART: [art] PUB.X = 48F2506D393421BB68383D4EB032A1E08ADA32ECC7090006D0729FF8A52133DEE39262CF05A9A27E78C9B7E1FAE1B548
26,199,445 UART: [art] PUB.Y = 3D5F20E992B0935317F7E363FD867B469E7F7DD6618E6FF877311E3FCBD91034C116424D5F4FA4CD780AAEAE217D1497
26,206,716 UART: [art] SIG.R = F260DEB5A20B23B12E8827F2EC3452D2F94B76ACBC9482E713670EFE153ED2CADCC0BEEDA1372A27441C1F086E4CE19C
26,214,108 UART: [art] SIG.S = 0A2DAA7AF26B3E86FDB0C8B2F20C4F2D9CF3831A01ABCCDA128509C0F6646D8336F794D087D9203BE0D634C543E48F1A
27,192,962 UART: Caliptra RT
27,193,652 UART: [state] CFI Enabled
27,357,820 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,415 UART:
192,815 UART: Running Caliptra ROM ...
193,951 UART:
603,474 UART: [state] CFI Enabled
617,540 UART: [state] LifecycleState = Unprovisioned
619,382 UART: [state] DebugLocked = No
621,537 UART: [state] WD Timer not started. Device not locked for debugging
625,310 UART: [kat] SHA2-256
804,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,008 UART: [kat] ++
816,552 UART: [kat] sha1
827,010 UART: [kat] SHA2-256
830,064 UART: [kat] SHA2-384
835,884 UART: [kat] SHA2-512-ACC
838,868 UART: [kat] ECC-384
3,279,867 UART: [kat] HMAC-384Kdf
3,292,868 UART: [kat] LMS
3,822,316 UART: [kat] --
3,827,012 UART: [cold-reset] ++
3,828,618 UART: [fht] FHT @ 0x50003400
3,839,433 UART: [idev] ++
3,839,992 UART: [idev] CDI.KEYID = 6
3,840,972 UART: [idev] SUBJECT.KEYID = 7
3,842,126 UART: [idev] UDS.KEYID = 0
3,858,154 UART: [idev] Erasing UDS.KEYID = 0
6,314,555 UART: [idev] Sha1 KeyId Algorithm
6,334,273 UART: [idev] CSR upload begun
6,338,978 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,056,926 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,072,999 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,088,945 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,104,808 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,128,603 UART: [idev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
8,273,637 UART: [idev] CSR uploaded
8,291,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,435,057 UART: [idev] --
8,435,712 UART: [ldev] ++
8,436,211 UART: [ldev] CDI.KEYID = 6
8,437,109 UART: [ldev] SUBJECT.KEYID = 5
8,438,193 UART: [ldev] AUTHORITY.KEYID = 7
8,439,386 UART: [ldev] FE.KEYID = 1
8,440,262 UART: [ldev] Erasing FE.KEYID = 1
10,785,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,505,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,521,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,537,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,553,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,574,670 UART: [ldev] --
12,579,063 UART: [fwproc] Wait for Commands...
12,581,490 UART: [fwproc] Recv command 0x46574c44
12,583,570 UART: [fwproc] Recv'd Img size: 114084 bytes
15,980,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,652 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,441,911 >>> mbox cmd response: success
16,446,409 UART: [afmc] ++
16,446,996 UART: [afmc] CDI.KEYID = 6
16,447,875 UART: [afmc] SUBJECT.KEYID = 7
16,449,082 UART: [afmc] AUTHORITY.KEYID = 5
18,948,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,669,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,671,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,687,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,703,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,719,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,741,214 UART: [afmc] --
20,744,088 UART: [cold-reset] --
20,747,797 UART: [state] Locking Datavault
20,752,020 UART: [state] Locking PCR0, PCR1 and PCR31
20,753,714 UART: [state] Locking ICCM
20,754,855 UART: [exit] Launching FMC @ 0x40000130
20,763,300 UART:
20,763,531 UART: Running Caliptra FMC ...
20,764,628 UART:
20,764,784 UART: [state] CFI Enabled
20,772,935 UART: [fht] FMC Alias Private Key: 7
22,529,930 UART: [art] Extend RT PCRs Done
22,531,162 UART: [art] Lock RT PCRs Done
22,532,947 UART: [art] Populate DV Done
22,538,358 UART: [fht] FMC Alias Private Key: 7
22,539,892 UART: [art] Derive CDI
22,540,699 UART: [art] Store in in slot 0x4
22,583,618 UART: [art] Derive Key Pair
22,584,659 UART: [art] Store priv key in slot 0x5
25,011,513 UART: [art] Derive Key Pair - Done
25,024,530 UART: [art] Signing Cert with AUTHO
25,025,864 UART: RITY.KEYID = 7
26,731,238 UART: [art] Erasing AUTHORITY.KEYID = 7
26,732,743 UART: [art] PUB.X = 600D00133C43215C29E30DD330B77E7059A24DA1E792DBFDFE102D7D7F4CDAEBDBB58F0869E0F1366779397094026574
26,739,992 UART: [art] PUB.Y = CEC3D86C93E3CB2E2EF6A0B8F56DCB95892A8F638DC3CF6F3037CE710A920A434B2E5298639FF518F84DA1CE65ABE1E0
26,747,276 UART: [art] SIG.R = FDA28E33777223316945D114A3A4F9EC45CF5811E334F7CE58E2046B3B082C2908D928D8994FF8443E93BB1E981053F8
26,754,643 UART: [art] SIG.S = ECA6B37363356E055594E65D7AADA057726262F7C247321660F0971B60101BBDA03E389078DD1BDAEF90B243F43CAC9B
27,733,030 UART: Caliptra RT
27,733,745 UART: [state] CFI Enabled
27,851,841 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
7,942,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,023,171 >>> mbox cmd response: success
20,271,762 UART:
20,272,151 UART: Running Caliptra FMC ...
20,273,367 UART:
20,273,535 UART: [state] CFI Enabled
20,280,856 UART: [fht] FMC Alias Private Key: 7
22,038,262 UART: [art] Extend RT PCRs Done
22,039,486 UART: [art] Lock RT PCRs Done
22,040,989 UART: [art] Populate DV Done
22,046,124 UART: [fht] FMC Alias Private Key: 7
22,047,716 UART: [art] Derive CDI
22,048,448 UART: [art] Store in in slot 0x4
22,091,378 UART: [art] Derive Key Pair
22,092,375 UART: [art] Store priv key in slot 0x5
24,519,243 UART: [art] Derive Key Pair - Done
24,532,295 UART: [art] Signing Cert with AUTHO
24,533,594 UART: RITY.KEYID = 7
26,239,043 UART: [art] Erasing AUTHORITY.KEYID = 7
26,240,557 UART: [art] PUB.X = A57A3FBE8A931471656C88635B0F33A8A303F353282B8797E28C3B60C2D1637EF5C44068EC79A99E4F0FEB0F2D3D61DB
26,247,831 UART: [art] PUB.Y = AA9A5925CFC0AB7BAC4DD176D3B5F52D9C1C8A1B373E515E1C2F104950F0AD5F240D23766BB21EE049FB19E34DE9BC4B
26,255,116 UART: [art] SIG.R = 60DADDE50842D56D78931DF93F2DFF9B5C2560CC747F25306401F22CFF2EF8F0EA5C8A0A478058B54BD50D5527CA136C
26,262,472 UART: [art] SIG.S = 59BE25F455CF8DBCA71F8E940157F747F62BDF5022690F72D75702854E8AF5C1EC9E7E79AD81EE6B29392B1FF201CB69
27,241,936 UART: Caliptra RT
27,242,647 UART: [state] CFI Enabled
27,359,636 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
921,194 UART: [kat] LMS
1,169,506 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,841 UART: [idev] ++
1,174,009 UART: [idev] CDI.KEYID = 6
1,174,370 UART: [idev] SUBJECT.KEYID = 7
1,174,795 UART: [idev] UDS.KEYID = 0
1,182,741 UART: [idev] Erasing UDS.KEYID = 0
1,199,927 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] CSR upload begun
1,209,962 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,171 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,879 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,764 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,470 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,899 UART: [idev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
1,297,396 UART: [idev] CSR uploaded
1,300,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,610 UART: [idev] --
1,301,777 UART: [ldev] ++
1,301,945 UART: [ldev] CDI.KEYID = 6
1,302,309 UART: [ldev] SUBJECT.KEYID = 5
1,302,736 UART: [ldev] AUTHORITY.KEYID = 7
1,303,199 UART: [ldev] FE.KEYID = 1
1,308,139 UART: [ldev] Erasing FE.KEYID = 1
1,334,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,753 UART: [ldev] --
1,374,097 UART: [fwproc] Wait for Commands...
1,374,698 UART: [fwproc] Recv command 0x46574c44
1,375,431 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,512 >>> mbox cmd response: success
2,863,665 UART: [afmc] ++
2,863,833 UART: [afmc] CDI.KEYID = 6
2,864,196 UART: [afmc] SUBJECT.KEYID = 7
2,864,622 UART: [afmc] AUTHORITY.KEYID = 5
2,899,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,536 UART: [afmc] --
2,942,486 UART: [cold-reset] --
2,943,162 UART: [state] Locking Datavault
2,944,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,165 UART: [state] Locking ICCM
2,945,671 UART: [exit] Launching FMC @ 0x40000130
2,951,000 UART:
2,951,016 UART: Running Caliptra FMC ...
2,951,424 UART:
2,951,478 UART: [state] CFI Enabled
2,962,059 UART: [fht] FMC Alias Private Key: 7
3,069,792 UART: [art] Extend RT PCRs Done
3,070,220 UART: [art] Lock RT PCRs Done
3,071,688 UART: [art] Populate DV Done
3,079,985 UART: [fht] FMC Alias Private Key: 7
3,080,943 UART: [art] Derive CDI
3,081,223 UART: [art] Store in in slot 0x4
3,166,838 UART: [art] Derive Key Pair
3,167,198 UART: [art] Store priv key in slot 0x5
3,181,224 UART: [art] Derive Key Pair - Done
3,196,529 UART: [art] Signing Cert with AUTHO
3,197,009 UART: RITY.KEYID = 7
3,211,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,748 UART: [art] PUB.X = B80FE025877A424FDB9A39B7EA48F7C119623FA4D127E152C82540F4375C6264B6DFE713DB47D93AACEEC7FD5BB6E197
3,219,529 UART: [art] PUB.Y = 355B18A195060FEEDDCD07373492378755E99BF40A6539D1F425A7C1AB18F30D092CE5259706E4E33FCBEA8503552366
3,226,453 UART: [art] SIG.R = F7B9A801C1BF6C9182AF5F1BEBA34AAE6EB473FA1E9BE28F4241620A9210AE139254B08BA11F28F73B7C681AA69648F4
3,233,231 UART: [art] SIG.S = A7AF555282F259B04F10D48F75BD6E1219BA9BA2648D5037404F012A9A58A35AFE7A377B137666382BC446345B3B3000
3,257,083 UART: Caliptra RT
3,257,336 UART: [state] CFI Enabled
3,364,604 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,767 >>> mbox cmd response: success
2,699,573 UART:
2,699,589 UART: Running Caliptra FMC ...
2,699,997 UART:
2,700,051 UART: [state] CFI Enabled
2,710,484 UART: [fht] FMC Alias Private Key: 7
2,817,923 UART: [art] Extend RT PCRs Done
2,818,351 UART: [art] Lock RT PCRs Done
2,819,991 UART: [art] Populate DV Done
2,828,214 UART: [fht] FMC Alias Private Key: 7
2,829,342 UART: [art] Derive CDI
2,829,622 UART: [art] Store in in slot 0x4
2,915,339 UART: [art] Derive Key Pair
2,915,699 UART: [art] Store priv key in slot 0x5
2,929,089 UART: [art] Derive Key Pair - Done
2,943,865 UART: [art] Signing Cert with AUTHO
2,944,345 UART: RITY.KEYID = 7
2,959,633 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,398 UART: [art] PUB.X = 43DBD0392E9AED3B8834F4F5A440F0474E4B268180824CBF8804F1B1E7E9CA1DDDBFB461158D8CD136F7C50EDB38E262
2,967,176 UART: [art] PUB.Y = F80CE75856B7FFB3A7CF4ADBA9FD4208627CB03656F339D96068FA39BE239D11EE8D32A88EF07ACDC0AB6C9455F1517A
2,974,138 UART: [art] SIG.R = B6446541F5870748574C78085D8931576440104FF9CA62170A48BA68D5707A7B0A48ACA4BEB051667F3218DC00BB6E38
2,980,866 UART: [art] SIG.S = 3FBC7370A014C37CB18385E6563F3703B836A871BBBB946A5CBF67AEFD64E47666441C8074998CEFD7D70B4B17CFF19A
3,004,829 UART: Caliptra RT
3,005,082 UART: [state] CFI Enabled
3,112,541 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
891,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,948 UART: [kat] ++
896,100 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] CSR upload begun
1,209,469 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,970 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,678 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,563 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,269 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,698 UART: [idev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
1,297,195 UART: [idev] CSR uploaded
1,300,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,409 UART: [idev] --
1,301,436 UART: [ldev] ++
1,301,604 UART: [ldev] CDI.KEYID = 6
1,301,968 UART: [ldev] SUBJECT.KEYID = 5
1,302,395 UART: [ldev] AUTHORITY.KEYID = 7
1,302,858 UART: [ldev] FE.KEYID = 1
1,308,164 UART: [ldev] Erasing FE.KEYID = 1
1,334,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,100 UART: [ldev] --
1,373,584 UART: [fwproc] Wait for Commands...
1,374,329 UART: [fwproc] Recv command 0x46574c44
1,375,062 UART: [fwproc] Recv'd Img size: 114084 bytes
2,669,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,387 >>> mbox cmd response: success
2,862,408 UART: [afmc] ++
2,862,576 UART: [afmc] CDI.KEYID = 6
2,862,939 UART: [afmc] SUBJECT.KEYID = 7
2,863,365 UART: [afmc] AUTHORITY.KEYID = 5
2,899,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,595 UART: [afmc] --
2,942,707 UART: [cold-reset] --
2,943,519 UART: [state] Locking Datavault
2,944,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,170 UART: [state] Locking ICCM
2,945,762 UART: [exit] Launching FMC @ 0x40000130
2,951,091 UART:
2,951,107 UART: Running Caliptra FMC ...
2,951,515 UART:
2,951,658 UART: [state] CFI Enabled
2,962,133 UART: [fht] FMC Alias Private Key: 7
3,070,240 UART: [art] Extend RT PCRs Done
3,070,668 UART: [art] Lock RT PCRs Done
3,072,398 UART: [art] Populate DV Done
3,080,729 UART: [fht] FMC Alias Private Key: 7
3,081,889 UART: [art] Derive CDI
3,082,169 UART: [art] Store in in slot 0x4
3,167,778 UART: [art] Derive Key Pair
3,168,138 UART: [art] Store priv key in slot 0x5
3,181,320 UART: [art] Derive Key Pair - Done
3,196,287 UART: [art] Signing Cert with AUTHO
3,196,767 UART: RITY.KEYID = 7
3,211,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,704 UART: [art] PUB.X = 870ADC538CBF4CD061A7746827A117F188C73B89108F45553941CEE6B84FBCB7DFC1921C6F879CFA7D8061AC46749DC2
3,219,479 UART: [art] PUB.Y = 81671F6B51B46177144CD36E98B1C063791B26CC50750438CB5C58819C245A2C837AF7DA993237134C0661452F8DA6CB
3,226,415 UART: [art] SIG.R = E77E4FAFA729BF8E12AA664227AF7307705E37B567DC2BBBB369B1F83B44FA34C24D1BD615228DAE032131382226105C
3,233,185 UART: [art] SIG.S = CBE832E55B5BDF0BECD327ECC6756A1697A64383D43400EAE697AAC4222BBB16A9EBDDFDFA6F0AE3E68795E7FB81CA33
3,257,244 UART: Caliptra RT
3,257,589 UART: [state] CFI Enabled
3,364,667 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,558 >>> mbox cmd response: success
2,700,050 UART:
2,700,066 UART: Running Caliptra FMC ...
2,700,474 UART:
2,700,617 UART: [state] CFI Enabled
2,710,962 UART: [fht] FMC Alias Private Key: 7
2,819,603 UART: [art] Extend RT PCRs Done
2,820,031 UART: [art] Lock RT PCRs Done
2,821,475 UART: [art] Populate DV Done
2,829,614 UART: [fht] FMC Alias Private Key: 7
2,830,772 UART: [art] Derive CDI
2,831,052 UART: [art] Store in in slot 0x4
2,916,281 UART: [art] Derive Key Pair
2,916,641 UART: [art] Store priv key in slot 0x5
2,929,805 UART: [art] Derive Key Pair - Done
2,944,497 UART: [art] Signing Cert with AUTHO
2,944,977 UART: RITY.KEYID = 7
2,960,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,310 UART: [art] PUB.X = EDB3EAD6873F25C8961BA1AD9AEAC0E97E89D27D8E6AE44F5D42AE111BDABC4902274B6572635D1BBD6F059FE84157B1
2,968,094 UART: [art] PUB.Y = 623D5CFC12FC8770B14253CE7419376929ACD3B9B0924AACECF39CD0B07F6AB46DFBB2BAADF1704E9BBB7E56D0CCDF26
2,975,072 UART: [art] SIG.R = 8CDD45CBE0B7110673B7EFCAE93AD7243A94EC9E46C08729BD85B14FD38AE06ED0CB3E3C8800B75B6315789DA7BC7E15
2,981,835 UART: [art] SIG.S = D592B64904FD5F81FD9A4C91A32EAD4F31D244E425FAE760CE0007C8DFE242CE1594C971E5BAD19516626CED15A4BDB4
3,005,072 UART: Caliptra RT
3,005,417 UART: [state] CFI Enabled
3,113,357 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,266 UART: [kat] SHA2-256
890,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,307 UART: [kat] SHA2-256
901,247 UART: [kat] SHA2-384
903,878 UART: [kat] SHA2-512-ACC
905,779 UART: [kat] ECC-384
915,352 UART: [kat] HMAC-384Kdf
919,796 UART: [kat] LMS
1,168,108 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,181,375 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,206,671 UART: [idev] CSR upload begun
1,208,450 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,913 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,621 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,506 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,212 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,641 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,138 UART: [idev] CSR uploaded
1,299,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,299,352 UART: [idev] --
1,300,343 UART: [ldev] ++
1,300,511 UART: [ldev] CDI.KEYID = 6
1,300,875 UART: [ldev] SUBJECT.KEYID = 5
1,301,302 UART: [ldev] AUTHORITY.KEYID = 7
1,301,765 UART: [ldev] FE.KEYID = 1
1,306,601 UART: [ldev] Erasing FE.KEYID = 1
1,333,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,225 UART: [ldev] --
1,372,509 UART: [fwproc] Wait for Commands...
1,373,190 UART: [fwproc] Recv command 0x46574c44
1,373,923 UART: [fwproc] Recv'd Img size: 114084 bytes
2,668,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,695,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,724,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,860,434 >>> mbox cmd response: success
2,861,641 UART: [afmc] ++
2,861,809 UART: [afmc] CDI.KEYID = 6
2,862,172 UART: [afmc] SUBJECT.KEYID = 7
2,862,598 UART: [afmc] AUTHORITY.KEYID = 5
2,898,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,935 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,940,658 UART: [afmc] --
2,941,718 UART: [cold-reset] --
2,942,562 UART: [state] Locking Datavault
2,943,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,121 UART: [state] Locking ICCM
2,944,667 UART: [exit] Launching FMC @ 0x40000130
2,949,996 UART:
2,950,012 UART: Running Caliptra FMC ...
2,950,420 UART:
2,950,474 UART: [state] CFI Enabled
2,960,961 UART: [fht] FMC Alias Private Key: 7
3,068,954 UART: [art] Extend RT PCRs Done
3,069,382 UART: [art] Lock RT PCRs Done
3,070,990 UART: [art] Populate DV Done
3,079,295 UART: [fht] FMC Alias Private Key: 7
3,080,291 UART: [art] Derive CDI
3,080,571 UART: [art] Store in in slot 0x4
3,166,204 UART: [art] Derive Key Pair
3,166,564 UART: [art] Store priv key in slot 0x5
3,179,654 UART: [art] Derive Key Pair - Done
3,194,519 UART: [art] Signing Cert with AUTHO
3,194,999 UART: RITY.KEYID = 7
3,210,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,902 UART: [art] PUB.X = CA5D71478A98AB3F8CE6E1D0532CB03DBD791CD39B2F0C614CF1E462E848336886EE35243F531C0523260A789CBD2F83
3,217,669 UART: [art] PUB.Y = 0BDF49D01FF80BC84CB96100EFE76A46AB08D78FF161F7A9722F4BD65F638E3A0885D14B01C6197021276EB28D7FD6A2
3,224,592 UART: [art] SIG.R = 694DD06F08A16EECFE84C2DC34510E704DE131EFA0B37D63191140E7850D827F4625DEBC1390E68A3948D189D41D974C
3,231,357 UART: [art] SIG.S = 6C1081F4484CDB64169C2674182D549B01504FC531C4768565DE4711699898A40230562CEDE75CFA1E7EEA72679A5F7A
3,255,060 UART: Caliptra RT
3,255,313 UART: [state] CFI Enabled
3,362,908 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,681 >>> mbox cmd response: success
2,700,649 UART:
2,700,665 UART: Running Caliptra FMC ...
2,701,073 UART:
2,701,127 UART: [state] CFI Enabled
2,711,572 UART: [fht] FMC Alias Private Key: 7
2,819,749 UART: [art] Extend RT PCRs Done
2,820,177 UART: [art] Lock RT PCRs Done
2,821,743 UART: [art] Populate DV Done
2,829,704 UART: [fht] FMC Alias Private Key: 7
2,830,870 UART: [art] Derive CDI
2,831,150 UART: [art] Store in in slot 0x4
2,916,797 UART: [art] Derive Key Pair
2,917,157 UART: [art] Store priv key in slot 0x5
2,929,557 UART: [art] Derive Key Pair - Done
2,944,337 UART: [art] Signing Cert with AUTHO
2,944,817 UART: RITY.KEYID = 7
2,959,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,754 UART: [art] PUB.X = DEBE1C547F29D2BC1BAF5232633F34CD7B74354A26B053C8C3A1A2EDF1105D0CA7808D7FC617174EF148B3C6F310194C
2,967,533 UART: [art] PUB.Y = 9DE9BBCB64EBAA90AE7DAA2E0D84E9FF4641D610C85BC4C4F2CA52FABA5418A5F27E5E7EBE10B1E39F5C4639435F09DC
2,974,507 UART: [art] SIG.R = 6EAE23C2470A10836EF57E5000DFAA617BF241022598694F5C0D976411D75E64C894CABAB17FE5904C088767DA4884F4
2,981,243 UART: [art] SIG.S = 01DE0FC17316D211012B6010331EA4F22F543938C2796953B356EFB3B8CE1F77F5F2C749D4B7DBE18E071F1040413970
3,005,034 UART: Caliptra RT
3,005,287 UART: [state] CFI Enabled
3,111,716 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
891,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,730 UART: [kat] ++
895,882 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,568 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] CSR upload begun
1,209,691 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,820 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,528 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,413 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,119 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,548 UART: [idev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
1,298,045 UART: [idev] CSR uploaded
1,301,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,301,259 UART: [idev] --
1,302,312 UART: [ldev] ++
1,302,480 UART: [ldev] CDI.KEYID = 6
1,302,844 UART: [ldev] SUBJECT.KEYID = 5
1,303,271 UART: [ldev] AUTHORITY.KEYID = 7
1,303,734 UART: [ldev] FE.KEYID = 1
1,309,152 UART: [ldev] Erasing FE.KEYID = 1
1,335,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,050 UART: [ldev] --
1,374,544 UART: [fwproc] Wait for Commands...
1,375,323 UART: [fwproc] Recv command 0x46574c44
1,376,056 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,709 >>> mbox cmd response: success
2,863,880 UART: [afmc] ++
2,864,048 UART: [afmc] CDI.KEYID = 6
2,864,411 UART: [afmc] SUBJECT.KEYID = 7
2,864,837 UART: [afmc] AUTHORITY.KEYID = 5
2,901,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,529 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,248 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,043 UART: [afmc] --
2,944,029 UART: [cold-reset] --
2,944,761 UART: [state] Locking Datavault
2,946,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,908 UART: [state] Locking ICCM
2,947,552 UART: [exit] Launching FMC @ 0x40000130
2,952,881 UART:
2,952,897 UART: Running Caliptra FMC ...
2,953,305 UART:
2,953,448 UART: [state] CFI Enabled
2,964,037 UART: [fht] FMC Alias Private Key: 7
3,072,456 UART: [art] Extend RT PCRs Done
3,072,884 UART: [art] Lock RT PCRs Done
3,074,132 UART: [art] Populate DV Done
3,082,523 UART: [fht] FMC Alias Private Key: 7
3,083,461 UART: [art] Derive CDI
3,083,741 UART: [art] Store in in slot 0x4
3,170,030 UART: [art] Derive Key Pair
3,170,390 UART: [art] Store priv key in slot 0x5
3,184,042 UART: [art] Derive Key Pair - Done
3,199,012 UART: [art] Signing Cert with AUTHO
3,199,492 UART: RITY.KEYID = 7
3,214,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,365 UART: [art] PUB.X = D8D4ED6CF267593FB726880150C408E362925D33B89E2203CB6C95434B2C7D3FA7063C9603C4B7B88C46D87471C017A7
3,222,116 UART: [art] PUB.Y = 6E5EB458DABC1409A70E1701B4194B4761137AFCE9853B68E316FD8A3D58E026366E0DFD58913346ACA74FD59D1629A6
3,229,058 UART: [art] SIG.R = F398FC375FCBDA385426F8F142A6941A4D904F20C2EBB6C29C955DA5B5AD5885E101840B2813F1341DF7F676346E1ACC
3,235,830 UART: [art] SIG.S = 1950571ACA1FDD36A521C111D20950A85163A3D2E87AB52120CEC495C1D879A4EFB97181D277C6CE8CD8E6E8F1E8408A
3,259,440 UART: Caliptra RT
3,259,785 UART: [state] CFI Enabled
3,368,178 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,779 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,062 >>> mbox cmd response: success
2,703,836 UART:
2,703,852 UART: Running Caliptra FMC ...
2,704,260 UART:
2,704,403 UART: [state] CFI Enabled
2,715,164 UART: [fht] FMC Alias Private Key: 7
2,822,651 UART: [art] Extend RT PCRs Done
2,823,079 UART: [art] Lock RT PCRs Done
2,824,481 UART: [art] Populate DV Done
2,832,536 UART: [fht] FMC Alias Private Key: 7
2,833,548 UART: [art] Derive CDI
2,833,828 UART: [art] Store in in slot 0x4
2,919,347 UART: [art] Derive Key Pair
2,919,707 UART: [art] Store priv key in slot 0x5
2,932,819 UART: [art] Derive Key Pair - Done
2,947,814 UART: [art] Signing Cert with AUTHO
2,948,294 UART: RITY.KEYID = 7
2,963,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,643 UART: [art] PUB.X = E3DF20748B4DC8AE9FD0D3DCA057DAB9D27F1B1A720EA2412AB00D32D69BC0FEF03DED797B9C14FECE99AD122FCC9C16
2,971,439 UART: [art] PUB.Y = 5DE249890A655FBBF62E46D6D3A9D2C642E80504B7BE30C772B92225C2413C10DF939E71843E90B6289725B67853F66E
2,978,376 UART: [art] SIG.R = D6D97FC338B618C51AEB5906999FFE44A86F28FB156B5E06CFAE7DEDB85AD08FE64314D15BE457A8883188AB81CD13E9
2,985,156 UART: [art] SIG.S = 0C053F5BFB3286D50D93D44B136FD79E7729510970C2894BBB23BF319889063B7CA156A0C2E542712FCD772CF882A7A9
3,008,934 UART: Caliptra RT
3,009,279 UART: [state] CFI Enabled
3,117,170 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,215 UART: [kat] SHA2-256
901,155 UART: [kat] SHA2-384
903,988 UART: [kat] SHA2-512-ACC
905,889 UART: [kat] ECC-384
915,518 UART: [kat] HMAC-384Kdf
920,340 UART: [kat] LMS
1,168,652 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,170,057 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,198,595 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] CSR upload begun
1,208,714 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,303 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,011 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,896 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,602 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,031 UART: [idev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
1,296,528 UART: [idev] CSR uploaded
1,299,573 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,299,742 UART: [idev] --
1,300,743 UART: [ldev] ++
1,300,911 UART: [ldev] CDI.KEYID = 6
1,301,275 UART: [ldev] SUBJECT.KEYID = 5
1,301,702 UART: [ldev] AUTHORITY.KEYID = 7
1,302,165 UART: [ldev] FE.KEYID = 1
1,307,599 UART: [ldev] Erasing FE.KEYID = 1
1,333,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,575 UART: [ldev] --
1,372,861 UART: [fwproc] Wait for Commands...
1,373,474 UART: [fwproc] Recv command 0x46574c44
1,374,207 UART: [fwproc] Recv'd Img size: 114084 bytes
2,668,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,106 >>> mbox cmd response: success
2,862,297 UART: [afmc] ++
2,862,465 UART: [afmc] CDI.KEYID = 6
2,862,828 UART: [afmc] SUBJECT.KEYID = 7
2,863,254 UART: [afmc] AUTHORITY.KEYID = 5
2,898,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,940,804 UART: [afmc] --
2,941,928 UART: [cold-reset] --
2,943,010 UART: [state] Locking Datavault
2,944,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,715 UART: [state] Locking ICCM
2,945,187 UART: [exit] Launching FMC @ 0x40000130
2,950,516 UART:
2,950,532 UART: Running Caliptra FMC ...
2,950,940 UART:
2,950,994 UART: [state] CFI Enabled
2,961,355 UART: [fht] FMC Alias Private Key: 7
3,068,754 UART: [art] Extend RT PCRs Done
3,069,182 UART: [art] Lock RT PCRs Done
3,070,778 UART: [art] Populate DV Done
3,079,209 UART: [fht] FMC Alias Private Key: 7
3,080,143 UART: [art] Derive CDI
3,080,423 UART: [art] Store in in slot 0x4
3,166,044 UART: [art] Derive Key Pair
3,166,404 UART: [art] Store priv key in slot 0x5
3,179,876 UART: [art] Derive Key Pair - Done
3,194,408 UART: [art] Signing Cert with AUTHO
3,194,888 UART: RITY.KEYID = 7
3,210,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,999 UART: [art] PUB.X = 9E531C4FCFD7AF41C3F286ED1801FF5BDF516EE20BF146BE306AF83344533BA69C911F4DCED57A10094A82FE88D5F676
3,217,776 UART: [art] PUB.Y = 590CBA37354BFC9C6AECC4C9BB8A31F778DAB55B6FFDE0784E54C66D5C57D8A95D429ED48390A2B7164C15B215FDC50A
3,224,740 UART: [art] SIG.R = 6FC5E0762A9A8090ACB8AD2481F17ABF7D19343A4E127B81036E962D205781A6DF7984ECCC4DCC8F6FFAEBB0ECED202E
3,231,529 UART: [art] SIG.S = 9DD4B49344D2C9FEF59E7717460FC5A5EF20D8B84165D299D7FC27A8D53CCA99F1BF44A044C435527F8636C3A9CCEA0F
3,255,186 UART: Caliptra RT
3,255,439 UART: [state] CFI Enabled
3,363,670 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,599 >>> mbox cmd response: success
2,699,965 UART:
2,699,981 UART: Running Caliptra FMC ...
2,700,389 UART:
2,700,443 UART: [state] CFI Enabled
2,710,758 UART: [fht] FMC Alias Private Key: 7
2,818,839 UART: [art] Extend RT PCRs Done
2,819,267 UART: [art] Lock RT PCRs Done
2,821,067 UART: [art] Populate DV Done
2,829,166 UART: [fht] FMC Alias Private Key: 7
2,830,174 UART: [art] Derive CDI
2,830,454 UART: [art] Store in in slot 0x4
2,915,891 UART: [art] Derive Key Pair
2,916,251 UART: [art] Store priv key in slot 0x5
2,929,715 UART: [art] Derive Key Pair - Done
2,944,546 UART: [art] Signing Cert with AUTHO
2,945,026 UART: RITY.KEYID = 7
2,960,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,079 UART: [art] PUB.X = 32747EF8B41AE209FA93198348E18F222BB38ACA9BBC0B9E68B3AE4C5E8FDBA6A4D93A04EBA03321B2CDD37D99C859A1
2,967,860 UART: [art] PUB.Y = 7E619F1D899193EE5E7F400A95B273343E7B53FA8D41BCBD58EA87473586BF2073E6417558991A24ABBC669212A7C81A
2,974,807 UART: [art] SIG.R = C1BD13295162E29AA7BECBB8390E0E35211F17D3AD175BE42483F65584E5DEED88A0C7D5F9A52D77BA1480CC29BB4DF4
2,981,587 UART: [art] SIG.S = 1B21606DFF694B881E58757DE8322E27EADB8C5D772C3743C594DC511B3FD6F4F04661AB251FEA40FE61D554296F4AE4
3,005,702 UART: Caliptra RT
3,005,955 UART: [state] CFI Enabled
3,113,164 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,185 UART: [kat] SHA2-512-ACC
906,086 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,181,620 UART: [idev] Erasing UDS.KEYID = 0
1,198,000 UART: [idev] Sha1 KeyId Algorithm
1,206,460 UART: [idev] CSR upload begun
1,208,239 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,034 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,742 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,627 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,333 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,762 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,259 UART: [idev] CSR uploaded
1,299,304 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,299,473 UART: [idev] --
1,300,472 UART: [ldev] ++
1,300,640 UART: [ldev] CDI.KEYID = 6
1,301,004 UART: [ldev] SUBJECT.KEYID = 5
1,301,431 UART: [ldev] AUTHORITY.KEYID = 7
1,301,894 UART: [ldev] FE.KEYID = 1
1,307,006 UART: [ldev] Erasing FE.KEYID = 1
1,333,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,412 UART: [ldev] --
1,372,838 UART: [fwproc] Wait for Commands...
1,373,591 UART: [fwproc] Recv command 0x46574c44
1,374,324 UART: [fwproc] Recv'd Img size: 114084 bytes
2,668,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,345 >>> mbox cmd response: success
2,862,520 UART: [afmc] ++
2,862,688 UART: [afmc] CDI.KEYID = 6
2,863,051 UART: [afmc] SUBJECT.KEYID = 7
2,863,477 UART: [afmc] AUTHORITY.KEYID = 5
2,898,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,955 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,674 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,479 UART: [afmc] --
2,942,559 UART: [cold-reset] --
2,943,471 UART: [state] Locking Datavault
2,944,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,104 UART: [state] Locking ICCM
2,945,564 UART: [exit] Launching FMC @ 0x40000130
2,950,893 UART:
2,950,909 UART: Running Caliptra FMC ...
2,951,317 UART:
2,951,460 UART: [state] CFI Enabled
2,961,845 UART: [fht] FMC Alias Private Key: 7
3,069,376 UART: [art] Extend RT PCRs Done
3,069,804 UART: [art] Lock RT PCRs Done
3,071,528 UART: [art] Populate DV Done
3,079,565 UART: [fht] FMC Alias Private Key: 7
3,080,513 UART: [art] Derive CDI
3,080,793 UART: [art] Store in in slot 0x4
3,166,232 UART: [art] Derive Key Pair
3,166,592 UART: [art] Store priv key in slot 0x5
3,179,742 UART: [art] Derive Key Pair - Done
3,194,826 UART: [art] Signing Cert with AUTHO
3,195,306 UART: RITY.KEYID = 7
3,210,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,927 UART: [art] PUB.X = 57A3D445E721DD45C760A52FA5BEADE3D251E32711E0BFC4B43BEFDA6B6ADA213F84519BBB27FAE176A521ACCB60CEDC
3,217,727 UART: [art] PUB.Y = D77E7869443FD816C66CCB0B760BEDA513B2829C13FB871A778687CF890308EEA767E4CAE86D76A3D2537C8428CBE6C0
3,224,673 UART: [art] SIG.R = 84B36B988FA8E5FA51275C9A34A00A45BA6193DD5B3F0DC53CF9B4880E5CE2080D5B2FABC0A7ADBE8E8F4AF39B9AD0CA
3,231,456 UART: [art] SIG.S = 61FCF9E51876542F748C752E2A366A43249B52A4DB933A4561CE5F27C91757A7C0EE4D0CF56C4AF64C78AEE7058E23E2
3,254,401 UART: Caliptra RT
3,254,746 UART: [state] CFI Enabled
3,362,333 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,548 >>> mbox cmd response: success
2,700,132 UART:
2,700,148 UART: Running Caliptra FMC ...
2,700,556 UART:
2,700,699 UART: [state] CFI Enabled
2,711,378 UART: [fht] FMC Alias Private Key: 7
2,818,959 UART: [art] Extend RT PCRs Done
2,819,387 UART: [art] Lock RT PCRs Done
2,820,985 UART: [art] Populate DV Done
2,829,230 UART: [fht] FMC Alias Private Key: 7
2,830,314 UART: [art] Derive CDI
2,830,594 UART: [art] Store in in slot 0x4
2,916,321 UART: [art] Derive Key Pair
2,916,681 UART: [art] Store priv key in slot 0x5
2,929,919 UART: [art] Derive Key Pair - Done
2,944,584 UART: [art] Signing Cert with AUTHO
2,945,064 UART: RITY.KEYID = 7
2,960,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,341 UART: [art] PUB.X = F04C846DEB7F3335B71A61F3F168C69BC79A3A8D9B0CFDDC67876C3848B542C32AE920AF8BB867E280526B766BACEC62
2,968,122 UART: [art] PUB.Y = A9F985AC9250EB51DF095AF0E1765AE79BA62453DB37FB6EDFF83081A39B0ACE90D6AF5251683AE36CA6E50646D15376
2,975,075 UART: [art] SIG.R = A42BE5DBC406AD19FEB6B6D85D203A8469F61C8275A726EFEA4F5E05303684B4ACDF863AAB8420BAB0C5BBD2CEB912BD
2,981,865 UART: [art] SIG.S = 684E3EFAA069FB2A44D10F793A92ED74F928AC2A8A8CE3440ADE239CFFD7402FC31C5F78B1F5E6DE1D350D7E38AA9133
3,005,837 UART: Caliptra RT
3,006,182 UART: [state] CFI Enabled
3,113,409 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 7343978 bytes from beginning
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
10,788,911 UART: [idev] CSR uploaded
10,805,230 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,948,464 UART: [idev] --
10,949,096 UART: [ldev] ++
10,949,597 UART: [ldev] CDI.KEYID = 6
10,950,471 UART: [ldev] SUBJECT.KEYID = 5
10,951,646 UART: [ldev] AUTHORITY.KEYID = 7
10,952,744 UART: [ldev] FE.KEYID = 1
10,953,580 UART: [ldev] Erasing FE.KEYID = 1
14,192,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,500,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,516,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,532,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,548,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,568,938 UART: [ldev] --
16,573,330 UART: [fwproc] Wait for Commands...
16,575,474 UART: [fwproc] Recv command 0x46574c44
16,577,790 UART: [fwproc] Recv'd Img size: 113760 bytes
20,652,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,735,673 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,804,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,121,089 >>> mbox cmd response: success
21,125,875 UART: [afmc] ++
21,126,472 UART: [afmc] CDI.KEYID = 6
21,127,658 UART: [afmc] SUBJECT.KEYID = 7
21,128,812 UART: [afmc] AUTHORITY.KEYID = 5
24,488,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,803,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,806,272 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,822,420 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,838,479 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,854,521 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,877,025 UART: [afmc] --
26,879,755 UART: [cold-reset] --
26,883,559 UART: [state] Locking Datavault
26,888,003 UART: [state] Locking PCR0, PCR1 and PCR31
26,889,650 UART: [state] Locking ICCM
26,891,151 UART: [exit] Launching FMC @ 0x40000130
26,899,817 UART:
26,900,048 UART: Running Caliptra FMC ...
26,901,148 UART:
26,901,309 UART: [state] CFI Enabled
26,964,887 UART: [fht] FMC Alias Private Key: 7
29,303,437 UART: [art] Extend RT PCRs Done
29,304,695 UART: [art] Lock RT PCRs Done
29,306,080 UART: [art] Populate DV Done
29,311,341 UART: [fht] FMC Alias Private Key: 7
29,312,876 UART: [art] Derive CDI
29,313,685 UART: [art] Store in in slot 0x4
29,374,137 UART: [art] Derive Key Pair
29,375,176 UART: [art] Store priv key in slot 0x5
32,667,792 UART: [art] Derive Key Pair - Done
32,680,483 UART: [art] Signing Cert with AUTHO
32,681,816 UART: RITY.KEYID = 7
34,969,061 UART: [art] Erasing AUTHORITY.KEYID = 7
34,970,579 UART: [art] PUB.X = 155C0C787A37C94125CCC6CF94C6D6447493C05E934A0B46C1814A9E771CED7EC10D82E600AEB46256517B03EA5A96DA
34,977,813 UART: [art] PUB.Y = 3975957F253CBDDED86AA48F307CEEB84781EF8D3CE1ECB838521B56D47066C33CC06012DCE27D92E077DFCF12F9DC1E
34,985,105 UART: [art] SIG.R = C6FD2A475F3A13A115256495D5CAE38D3FB0A92C62F957BA2AC1F765C05F437EA4FC3D9D736CFC82BE98533FFFE404D6
34,992,510 UART: [art] SIG.S = 53EB7008DB238396AEA88D990CAC31C0A7022D289FD4548B3060AA884377176F9906D3D5E01386701E82AF020F352E44
36,297,368 UART: Caliptra RT
36,298,078 UART: [state] CFI Enabled
36,458,109 UART: [rt] RT listening for mailbox commands...
36,609,195 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,639,330 UART: [rt]cmd =0x4c444556, len=4
36,650,449 >>> mbox cmd response data (687 bytes)
36,796,053 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,825,879 UART: [rt]cmd =0x43455246, len=4
36,838,630 >>> mbox cmd response data (886 bytes)
36,982,268 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
37,012,238 UART: [rt]cmd =0x43455252, len=4
37,023,458 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,243 UART:
192,620 UART: Running Caliptra ROM ...
193,778 UART:
193,935 UART: [state] CFI Enabled
260,257 UART: [state] LifecycleState = Unprovisioned
262,670 UART: [state] DebugLocked = No
265,235 UART: [state] WD Timer not started. Device not locked for debugging
269,067 UART: [kat] SHA2-256
450,990 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,501 UART: [kat] ++
463,029 UART: [kat] sha1
474,218 UART: [kat] SHA2-256
477,221 UART: [kat] SHA2-384
484,335 UART: [kat] SHA2-512-ACC
486,943 UART: [kat] ECC-384
3,777,501 UART: [kat] HMAC-384Kdf
3,801,617 UART: [kat] LMS
4,874,809 UART: [kat] --
4,879,938 UART: [cold-reset] ++
4,882,032 UART: [fht] FHT @ 0x50003400
4,893,663 UART: [idev] ++
4,894,336 UART: [idev] CDI.KEYID = 6
4,895,563 UART: [idev] SUBJECT.KEYID = 7
4,896,716 UART: [idev] UDS.KEYID = 0
4,930,030 UART: [idev] Erasing UDS.KEYID = 0
8,240,733 UART: [idev] Sha1 KeyId Algorithm
8,260,079 UART: [idev] CSR upload begun
8,265,557 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,571,372 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,587,715 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,603,770 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,619,764 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,644,336 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,789,798 UART: [idev] CSR uploaded
10,806,097 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,949,231 UART: [idev] --
10,949,862 UART: [ldev] ++
10,950,355 UART: [ldev] CDI.KEYID = 6
10,951,227 UART: [ldev] SUBJECT.KEYID = 5
10,952,401 UART: [ldev] AUTHORITY.KEYID = 7
10,953,899 UART: [ldev] FE.KEYID = 1
10,954,782 UART: [ldev] Erasing FE.KEYID = 1
14,194,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,551,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,571,660 UART: [ldev] --
16,577,150 UART: [fwproc] Wait for Commands...
16,580,346 UART: [fwproc] Recv command 0x46574c44
16,582,609 UART: [fwproc] Recv'd Img size: 113760 bytes
20,650,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,731,179 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,799,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,116,011 >>> mbox cmd response: success
21,120,421 UART: [afmc] ++
21,121,008 UART: [afmc] CDI.KEYID = 6
21,122,123 UART: [afmc] SUBJECT.KEYID = 7
21,123,338 UART: [afmc] AUTHORITY.KEYID = 5
24,484,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,784,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,786,707 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,802,936 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,818,966 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,834,925 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,857,825 UART: [afmc] --
26,860,819 UART: [cold-reset] --
26,866,682 UART: [state] Locking Datavault
26,871,067 UART: [state] Locking PCR0, PCR1 and PCR31
26,872,709 UART: [state] Locking ICCM
26,874,139 UART: [exit] Launching FMC @ 0x40000130
26,882,767 UART:
26,883,008 UART: Running Caliptra FMC ...
26,884,115 UART:
26,884,270 UART: [state] CFI Enabled
26,942,946 UART: [fht] FMC Alias Private Key: 7
29,280,074 UART: [art] Extend RT PCRs Done
29,281,298 UART: [art] Lock RT PCRs Done
29,283,355 UART: [art] Populate DV Done
29,288,554 UART: [fht] FMC Alias Private Key: 7
29,290,246 UART: [art] Derive CDI
29,291,081 UART: [art] Store in in slot 0x4
29,350,617 UART: [art] Derive Key Pair
29,351,612 UART: [art] Store priv key in slot 0x5
32,644,528 UART: [art] Derive Key Pair - Done
32,657,739 UART: [art] Signing Cert with AUTHO
32,659,037 UART: RITY.KEYID = 7
34,945,382 UART: [art] Erasing AUTHORITY.KEYID = 7
34,946,887 UART: [art] PUB.X = 3286CF10DD5F1D38F81565ED04D16195FE383287E4CEB68E2CE4A6EA64A4521EB49DBCDA35B53F7C794108B0BC6BECF7
34,954,335 UART: [art] PUB.Y = F37429E1268C0FAB22BD03B6BACA197ECAB9BD2A781DBD78B700AB6295631710C34A74660384894C79B8FFAD8917BB90
34,961,417 UART: [art] SIG.R = 5E2FFA3871FF57EC1EE5CF7E0FB40F1C18198965985C206F504C76A6E5D5BA3CA240F3F9E619841785D58DE3C7563112
34,968,751 UART: [art] SIG.S = 09D824624C0C6CEBDE2052B7E246ABB427044D8F99AAB1EC1AC4212C9B8FC44E0DBA1D80D057FD68BDE904ED990578DE
36,274,565 UART: Caliptra RT
36,275,276 UART: [state] CFI Enabled
36,436,327 UART: [rt] RT listening for mailbox commands...
36,587,000 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,617,084 UART: [rt]cmd =0x4c444556, len=4
36,628,158 >>> mbox cmd response data (687 bytes)
36,773,622 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,803,263 UART: [rt]cmd =0x43455246, len=4
36,815,853 >>> mbox cmd response data (886 bytes)
36,959,600 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,989,679 UART: [rt]cmd =0x43455252, len=4
37,000,949 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1964.94s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
10,477,612 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,660,377 >>> mbox cmd response: success
26,365,507 UART:
26,365,898 UART: Running Caliptra FMC ...
26,367,101 UART:
26,367,275 UART: [state] CFI Enabled
26,429,476 UART: [fht] FMC Alias Private Key: 7
28,766,869 UART: [art] Extend RT PCRs Done
28,768,095 UART: [art] Lock RT PCRs Done
28,769,517 UART: [art] Populate DV Done
28,774,922 UART: [fht] FMC Alias Private Key: 7
28,776,512 UART: [art] Derive CDI
28,777,248 UART: [art] Store in in slot 0x4
28,839,750 UART: [art] Derive Key Pair
28,840,791 UART: [art] Store priv key in slot 0x5
32,133,120 UART: [art] Derive Key Pair - Done
32,146,124 UART: [art] Signing Cert with AUTHO
32,147,427 UART: RITY.KEYID = 7
34,434,784 UART: [art] Erasing AUTHORITY.KEYID = 7
34,436,288 UART: [art] PUB.X = AC19C1497B51E3431ACB0064C217204A1768308749455331E65BF882ABCAD1CE7A9AC53E36A48CAE7DF81102FA2E6512
34,443,567 UART: [art] PUB.Y = F4C3D87A4742C1D05FF16844902B9B0E388BD9BBA570B49721DCEACD4A267F6EB7B21443D02684EAE1A55EE284412F0E
34,450,812 UART: [art] SIG.R = 44264918026A4B20ACDE9371B9A81E894F73CBC81CF3756A72E7A404E7635A48D70404A7D105481FF3196C1E2C7D18B6
34,458,221 UART: [art] SIG.S = 44EAD7C52AF7823301FD07469AC48BC6AC6B5CCA0183E57A3494576A42CD6BEEB7615A1D67DBC067919C565F703AC86E
35,763,760 UART: Caliptra RT
35,764,447 UART: [state] CFI Enabled
35,923,439 UART: [rt] RT listening for mailbox commands...
36,073,477 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,103,453 UART: [rt]cmd =0x4c444556, len=4
36,114,509 >>> mbox cmd response data (687 bytes)
36,259,790 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,289,668 UART: [rt]cmd =0x43455246, len=4
36,302,464 >>> mbox cmd response data (886 bytes)
36,446,053 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,475,856 UART: [rt]cmd =0x43455252, len=4
36,487,134 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
10,500,103 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,711,969 >>> mbox cmd response: success
26,405,597 UART:
26,405,994 UART: Running Caliptra FMC ...
26,407,106 UART:
26,407,259 UART: [state] CFI Enabled
26,472,988 UART: [fht] FMC Alias Private Key: 7
28,810,819 UART: [art] Extend RT PCRs Done
28,812,042 UART: [art] Lock RT PCRs Done
28,814,022 UART: [art] Populate DV Done
28,819,330 UART: [fht] FMC Alias Private Key: 7
28,820,930 UART: [art] Derive CDI
28,821,667 UART: [art] Store in in slot 0x4
28,880,872 UART: [art] Derive Key Pair
28,881,913 UART: [art] Store priv key in slot 0x5
32,174,758 UART: [art] Derive Key Pair - Done
32,187,699 UART: [art] Signing Cert with AUTHO
32,188,998 UART: RITY.KEYID = 7
34,475,775 UART: [art] Erasing AUTHORITY.KEYID = 7
34,477,284 UART: [art] PUB.X = 52385B0B69E9372A4AD6362EF38ABEC4E342365F2798E1A4ED7C2E6879BD00DCDD32A547362272D65DAC6D132A968ED1
34,484,501 UART: [art] PUB.Y = A4B2B51F86AC1B1C63B64990A96CB7772BDE5C524BF5F9EA5C5A071F37944D99C5867DD2CE6C2654DF4F4329F20F8D03
34,491,781 UART: [art] SIG.R = 78B7E77D6356F1C4227BA9EA32D6191C20BBF4F83512C467C9B667F851D2792473149CBEE59DC0D44B8CE1FA10C0DDB0
34,499,192 UART: [art] SIG.S = 7E82483FAA4F100D861010BA4744C6A7A78EA94928D9A174BE66042AFF56693DDA014C5FB3704D9E5E596F4C1A60899F
35,804,492 UART: Caliptra RT
35,805,202 UART: [state] CFI Enabled
35,986,596 UART: [rt] RT listening for mailbox commands...
36,136,602 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,166,405 UART: [rt]cmd =0x4c444556, len=4
36,177,741 >>> mbox cmd response data (687 bytes)
36,323,379 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,353,260 UART: [rt]cmd =0x43455246, len=4
36,366,117 >>> mbox cmd response data (886 bytes)
36,509,392 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,539,448 UART: [rt]cmd =0x43455252, len=4
36,551,015 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
10,498,890 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,712,997 >>> mbox cmd response: success
26,402,000 UART:
26,402,394 UART: Running Caliptra FMC ...
26,403,598 UART:
26,403,765 UART: [state] CFI Enabled
26,471,870 UART: [fht] FMC Alias Private Key: 7
28,809,531 UART: [art] Extend RT PCRs Done
28,810,756 UART: [art] Lock RT PCRs Done
28,812,384 UART: [art] Populate DV Done
28,817,759 UART: [fht] FMC Alias Private Key: 7
28,819,354 UART: [art] Derive CDI
28,820,162 UART: [art] Store in in slot 0x4
28,880,773 UART: [art] Derive Key Pair
28,881,811 UART: [art] Store priv key in slot 0x5
32,174,512 UART: [art] Derive Key Pair - Done
32,187,618 UART: [art] Signing Cert with AUTHO
32,188,913 UART: RITY.KEYID = 7
34,476,454 UART: [art] Erasing AUTHORITY.KEYID = 7
34,477,963 UART: [art] PUB.X = 48A28FF61CB7F3B48BA379FD37E1C2F490276FF60F37FD6A76E66B00116644F9745825E5173BA0DD689F4E021F6AC2A2
34,485,170 UART: [art] PUB.Y = 8112CB6A1D333F5CB6BB232D6D1C6EA5AFBF22C171B742CBA5C5B0F67A069425BCF780E365C6FA718D7CB43CE2C67628
34,492,481 UART: [art] SIG.R = 9E06F56D4B64D9CE792BB687E2688F080311665F74EDA2485942ABD99B17CB56730E41D642D06F0980FB2B65C184740A
34,499,830 UART: [art] SIG.S = F6A4388E388A821BBAF4E59966D4266C54EAE0A4960EE66B3EDE6A60917AEE99E7D2CC0711544D8245DA401F387A3416
35,805,687 UART: Caliptra RT
35,806,403 UART: [state] CFI Enabled
35,965,573 UART: [rt] RT listening for mailbox commands...
36,115,736 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,145,849 UART: [rt]cmd =0x4c444556, len=4
36,156,787 >>> mbox cmd response data (687 bytes)
36,302,465 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,332,273 UART: [rt]cmd =0x43455246, len=4
36,345,079 >>> mbox cmd response data (886 bytes)
36,488,822 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,518,922 UART: [rt]cmd =0x43455252, len=4
36,530,150 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
10,499,813 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,702,548 >>> mbox cmd response: success
26,398,592 UART:
26,399,009 UART: Running Caliptra FMC ...
26,400,125 UART:
26,400,299 UART: [state] CFI Enabled
26,466,436 UART: [fht] FMC Alias Private Key: 7
28,804,573 UART: [art] Extend RT PCRs Done
28,805,797 UART: [art] Lock RT PCRs Done
28,807,291 UART: [art] Populate DV Done
28,812,648 UART: [fht] FMC Alias Private Key: 7
28,814,127 UART: [art] Derive CDI
28,814,859 UART: [art] Store in in slot 0x4
28,873,629 UART: [art] Derive Key Pair
28,874,673 UART: [art] Store priv key in slot 0x5
32,167,104 UART: [art] Derive Key Pair - Done
32,180,208 UART: [art] Signing Cert with AUTHO
32,181,507 UART: RITY.KEYID = 7
34,468,733 UART: [art] Erasing AUTHORITY.KEYID = 7
34,470,242 UART: [art] PUB.X = CF035F982288BED2F182B8813601ACE9640D3B19BB90A9C466B025736A768C537C5C1F3E3CE6B5E73F5488DCC27B7311
34,477,544 UART: [art] PUB.Y = 35E1C82BAF8DDC33443C1810E76DF673916BAF4ACCDD193A62929B5855F2C367DBC54DB225D72C64111BCE0AF81AF4A8
34,484,760 UART: [art] SIG.R = 062512F1535CDB798B9904A4995DAECA64F8C7F6D8B2CC05B4C06BD480245A7761E55DF0697F9FFA9A7CD3FEEF0DE7B9
34,492,119 UART: [art] SIG.S = 217A7F76D56FA627A8B16ABD5A58D2A564F58933FEA52C203FBF3D45254C5D21AA1E4975B15CACC394E7BD011690181E
35,797,497 UART: Caliptra RT
35,798,189 UART: [state] CFI Enabled
35,959,142 UART: [rt] RT listening for mailbox commands...
36,108,879 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,138,812 UART: [rt]cmd =0x4c444556, len=4
36,149,865 >>> mbox cmd response data (687 bytes)
36,296,018 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,325,736 UART: [rt]cmd =0x43455246, len=4
36,338,562 >>> mbox cmd response data (886 bytes)
36,482,067 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,511,944 UART: [rt]cmd =0x43455252, len=4
36,523,288 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
10,479,102 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,677,656 >>> mbox cmd response: success
26,358,780 UART:
26,359,169 UART: Running Caliptra FMC ...
26,360,266 UART:
26,360,416 UART: [state] CFI Enabled
26,428,731 UART: [fht] FMC Alias Private Key: 7
28,766,055 UART: [art] Extend RT PCRs Done
28,767,288 UART: [art] Lock RT PCRs Done
28,768,672 UART: [art] Populate DV Done
28,774,405 UART: [fht] FMC Alias Private Key: 7
28,776,104 UART: [art] Derive CDI
28,776,839 UART: [art] Store in in slot 0x4
28,836,966 UART: [art] Derive Key Pair
28,838,004 UART: [art] Store priv key in slot 0x5
32,130,905 UART: [art] Derive Key Pair - Done
32,143,708 UART: [art] Signing Cert with AUTHO
32,145,017 UART: RITY.KEYID = 7
34,431,549 UART: [art] Erasing AUTHORITY.KEYID = 7
34,433,196 UART: [art] PUB.X = 74762BCA39CF6F8C72F06C5D8A0285718CD2FF7E2C78BA5BD62AB314C408E10C2571C9D691630C0C38C5292A2A988482
34,440,294 UART: [art] PUB.Y = 7D5C98345022B8ED2FF32D39D9D26AEAAB55CC88B76E8BB70EF87F01BE0404E1BCCA6F3C4382A7128FEA0B5CBC443E5E
34,447,556 UART: [art] SIG.R = 94F2C66DA9DBAC00BB5767756A986ED031D73DB2D2F40287160E1229CF1DE6BA8939EE4DE40BB4949375FD6C99EFA9AD
34,454,959 UART: [art] SIG.S = 6FD3F8B684DC5EC86A11F28E3926B11BAD7F790DF5EA4778D8D6350BAEF13AB76559BE46C4B0D49E66BA4793E80506F8
35,760,012 UART: Caliptra RT
35,760,721 UART: [state] CFI Enabled
35,920,546 UART: [rt] RT listening for mailbox commands...
36,070,470 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,100,306 UART: [rt]cmd =0x4c444556, len=4
36,111,314 >>> mbox cmd response data (687 bytes)
36,256,976 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,286,972 UART: [rt]cmd =0x43455246, len=4
36,299,504 >>> mbox cmd response data (886 bytes)
36,443,438 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,473,315 UART: [rt]cmd =0x43455252, len=4
36,484,747 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1940.02s
Truncated 7343978 bytes from beginning
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
11,027,608 UART: [idev] CSR uploaded
11,043,981 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
11,186,961 UART: [idev] --
11,187,593 UART: [ldev] ++
11,188,080 UART: [ldev] CDI.KEYID = 6
11,188,949 UART: [ldev] SUBJECT.KEYID = 5
11,190,025 UART: [ldev] AUTHORITY.KEYID = 7
11,191,202 UART: [ldev] FE.KEYID = 1
11,192,069 UART: [ldev] Erasing FE.KEYID = 1
14,355,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,645,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,662,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,678,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,694,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,713,701 UART: [ldev] --
16,719,125 UART: [fwproc] Wait for Commands...
16,721,105 UART: [fwproc] Recv command 0x46574c44
16,723,409 UART: [fwproc] Recv'd Img size: 113760 bytes
20,792,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,865,264 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,934,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,249,525 >>> mbox cmd response: success
21,253,061 UART: [afmc] ++
21,253,645 UART: [afmc] CDI.KEYID = 6
21,254,973 UART: [afmc] SUBJECT.KEYID = 7
21,256,094 UART: [afmc] AUTHORITY.KEYID = 5
24,571,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,867,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,869,400 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,885,552 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,901,641 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,917,616 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,940,310 UART: [afmc] --
26,944,588 UART: [cold-reset] --
26,949,368 UART: [state] Locking Datavault
26,954,170 UART: [state] Locking PCR0, PCR1 and PCR31
26,955,853 UART: [state] Locking ICCM
26,957,275 UART: [exit] Launching FMC @ 0x40000130
26,965,986 UART:
26,966,219 UART: Running Caliptra FMC ...
26,967,237 UART:
26,967,374 UART: [state] CFI Enabled
26,975,591 UART: [fht] FMC Alias Private Key: 7
29,305,929 UART: [art] Extend RT PCRs Done
29,307,155 UART: [art] Lock RT PCRs Done
29,309,072 UART: [art] Populate DV Done
29,314,477 UART: [fht] FMC Alias Private Key: 7
29,316,015 UART: [art] Derive CDI
29,316,774 UART: [art] Store in in slot 0x4
29,359,423 UART: [art] Derive Key Pair
29,360,461 UART: [art] Store priv key in slot 0x5
32,603,039 UART: [art] Derive Key Pair - Done
32,616,152 UART: [art] Signing Cert with AUTHO
32,617,485 UART: RITY.KEYID = 7
34,896,758 UART: [art] Erasing AUTHORITY.KEYID = 7
34,898,264 UART: [art] PUB.X = D74FE2929623A0B18894EE337C3EA34EC710E13574AD551C7B3511F9854FB643D26353AA8904ADF67F98DF7BBE2D1F9F
34,905,517 UART: [art] PUB.Y = F94A1D21DF0133E7FD46B9363310ADFA1CF0634B12784B5DB8BDCEACC180FF3120DCF9E4161147CE32FEC613FA717992
34,912,768 UART: [art] SIG.R = 10CDA35B8D8C37A427B6A5DDAC9AB8157BA639703DB401C24FA7C4E7DE03EC70C5D1920B5112F6056D84E17B09D6BF7E
34,920,184 UART: [art] SIG.S = 85E1B5C6777561672477CF3CC0E48BBF7B47678B6E2B33EBFB7E502597294C3480DFCB2E097544C3B43C4B591985C73F
36,225,697 UART: Caliptra RT
36,226,402 UART: [state] CFI Enabled
36,343,512 UART: [rt] RT listening for mailbox commands...
36,494,694 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,524,843 UART: [rt]cmd =0x4c444556, len=4
36,535,775 >>> mbox cmd response data (687 bytes)
36,680,874 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,710,789 UART: [rt]cmd =0x43455246, len=4
36,723,495 >>> mbox cmd response data (886 bytes)
36,866,735 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,896,605 UART: [rt]cmd =0x43455252, len=4
36,907,774 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,338 UART:
192,733 UART: Running Caliptra ROM ...
193,802 UART:
603,424 UART: [state] CFI Enabled
617,813 UART: [state] LifecycleState = Unprovisioned
620,175 UART: [state] DebugLocked = No
621,841 UART: [state] WD Timer not started. Device not locked for debugging
626,473 UART: [kat] SHA2-256
808,413 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,961 UART: [kat] ++
820,453 UART: [kat] sha1
831,373 UART: [kat] SHA2-256
834,433 UART: [kat] SHA2-384
840,727 UART: [kat] SHA2-512-ACC
843,314 UART: [kat] ECC-384
4,096,296 UART: [kat] HMAC-384Kdf
4,107,084 UART: [kat] LMS
5,180,210 UART: [kat] --
5,187,361 UART: [cold-reset] ++
5,190,048 UART: [fht] FHT @ 0x50003400
5,200,103 UART: [idev] ++
5,200,776 UART: [idev] CDI.KEYID = 6
5,201,924 UART: [idev] SUBJECT.KEYID = 7
5,203,451 UART: [idev] UDS.KEYID = 0
5,220,633 UART: [idev] Erasing UDS.KEYID = 0
8,493,932 UART: [idev] Sha1 KeyId Algorithm
8,513,911 UART: [idev] CSR upload begun
8,519,390 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,811,818 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,828,153 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,844,267 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,860,274 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,884,812 UART: [idev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
11,030,261 UART: [idev] CSR uploaded
11,046,641 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
11,189,636 UART: [idev] --
11,190,265 UART: [ldev] ++
11,190,750 UART: [ldev] CDI.KEYID = 6
11,191,610 UART: [ldev] SUBJECT.KEYID = 5
11,192,779 UART: [ldev] AUTHORITY.KEYID = 7
11,193,868 UART: [ldev] FE.KEYID = 1
11,194,700 UART: [ldev] Erasing FE.KEYID = 1
14,355,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,647,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,663,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,679,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,695,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,714,619 UART: [ldev] --
16,720,093 UART: [fwproc] Wait for Commands...
16,722,204 UART: [fwproc] Recv command 0x46574c44
16,724,512 UART: [fwproc] Recv'd Img size: 113760 bytes
20,789,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,867,699 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,936,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,252,901 >>> mbox cmd response: success
21,257,743 UART: [afmc] ++
21,258,336 UART: [afmc] CDI.KEYID = 6
21,259,571 UART: [afmc] SUBJECT.KEYID = 7
21,260,667 UART: [afmc] AUTHORITY.KEYID = 5
24,579,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,872,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,874,977 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,891,196 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,907,239 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,923,251 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,946,176 UART: [afmc] --
26,950,472 UART: [cold-reset] --
26,953,627 UART: [state] Locking Datavault
26,958,431 UART: [state] Locking PCR0, PCR1 and PCR31
26,960,118 UART: [state] Locking ICCM
26,962,674 UART: [exit] Launching FMC @ 0x40000130
26,971,387 UART:
26,971,610 UART: Running Caliptra FMC ...
26,972,629 UART:
26,972,769 UART: [state] CFI Enabled
26,980,754 UART: [fht] FMC Alias Private Key: 7
29,311,983 UART: [art] Extend RT PCRs Done
29,313,208 UART: [art] Lock RT PCRs Done
29,314,744 UART: [art] Populate DV Done
29,319,934 UART: [fht] FMC Alias Private Key: 7
29,321,672 UART: [art] Derive CDI
29,322,429 UART: [art] Store in in slot 0x4
29,365,021 UART: [art] Derive Key Pair
29,366,019 UART: [art] Store priv key in slot 0x5
32,608,133 UART: [art] Derive Key Pair - Done
32,620,927 UART: [art] Signing Cert with AUTHO
32,622,225 UART: RITY.KEYID = 7
34,901,528 UART: [art] Erasing AUTHORITY.KEYID = 7
34,903,033 UART: [art] PUB.X = 3DB2402F15E8508B2663F7428D30D69327C08EB8473BE8035EDCED65AEB689DBCBF33AB9524414E95CD36E2722E9FC24
34,910,294 UART: [art] PUB.Y = 3E24F3A2240DD96315A44ABF5DF60FC38D8F6810E3D3094E27951B33170617B3A063FF98DB56244235F36F8A1E70D61D
34,917,524 UART: [art] SIG.R = 077A7A9436E762F691A99EBCA61689DF293A5FCDEFB32E708320B1895D3052059E333F4B7714B6E3F787F8CDE9B1FBAF
34,924,881 UART: [art] SIG.S = F868A39DB52DFEEF4628E0ACEBB68E957C680B29C9079A9B0A8A8A0A9809B3F9DD6CB191721BA93825A08A352EB10BB0
36,229,953 UART: Caliptra RT
36,230,660 UART: [state] CFI Enabled
36,348,848 UART: [rt] RT listening for mailbox commands...
36,499,488 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,529,531 UART: [rt]cmd =0x4c444556, len=4
36,540,680 >>> mbox cmd response data (687 bytes)
36,685,706 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,715,555 UART: [rt]cmd =0x43455246, len=4
36,728,372 >>> mbox cmd response data (886 bytes)
36,871,584 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,901,568 UART: [rt]cmd =0x43455252, len=4
36,913,049 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1961.08s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
10,728,859 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,840,133 >>> mbox cmd response: success
26,476,246 UART:
26,476,673 UART: Running Caliptra FMC ...
26,477,800 UART:
26,477,979 UART: [state] CFI Enabled
26,486,102 UART: [fht] FMC Alias Private Key: 7
28,816,821 UART: [art] Extend RT PCRs Done
28,818,054 UART: [art] Lock RT PCRs Done
28,819,819 UART: [art] Populate DV Done
28,825,064 UART: [fht] FMC Alias Private Key: 7
28,826,506 UART: [art] Derive CDI
28,827,268 UART: [art] Store in in slot 0x4
28,869,647 UART: [art] Derive Key Pair
28,870,689 UART: [art] Store priv key in slot 0x5
32,112,174 UART: [art] Derive Key Pair - Done
32,125,225 UART: [art] Signing Cert with AUTHO
32,126,532 UART: RITY.KEYID = 7
34,406,331 UART: [art] Erasing AUTHORITY.KEYID = 7
34,407,836 UART: [art] PUB.X = 2B494AC05AC9B82B5CC32036AF040A02EB9F7D216A6B1DD092B7A9C7C30B8DAB54CF1782EEC750CD9EA1B9D00D1FF8E9
34,415,104 UART: [art] PUB.Y = 86F1AD1CA379A7BFF03B1F2672DF519E6026BBBB8B66264539FFCB0BA29A1867360356065FD7EFF06116A479986A3350
34,422,383 UART: [art] SIG.R = 1D6B785260779D2D61A649494091153C34BE0791A07BAC339D619A060AEAC456C814C6CFB7D4432510C7594B1B81FCBA
34,429,749 UART: [art] SIG.S = 6C746233A1AA2F93A86E7F64BADADB9C4A44EE3D7DC77F7133221CC07BB3EE0E090CD59B48CBEAC77590E6719B40BC92
35,735,577 UART: Caliptra RT
35,736,279 UART: [state] CFI Enabled
35,854,218 UART: [rt] RT listening for mailbox commands...
36,004,101 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,034,209 UART: [rt]cmd =0x4c444556, len=4
36,045,268 >>> mbox cmd response data (687 bytes)
36,190,157 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,219,924 UART: [rt]cmd =0x43455246, len=4
36,232,488 >>> mbox cmd response data (886 bytes)
36,376,448 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,406,301 UART: [rt]cmd =0x43455252, len=4
36,417,770 >>> mbox cmd response data (782 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
10,726,129 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,842,056 >>> mbox cmd response: success
26,481,604 UART:
26,482,007 UART: Running Caliptra FMC ...
26,483,155 UART:
26,483,311 UART: [state] CFI Enabled
26,491,251 UART: [fht] FMC Alias Private Key: 7
28,821,868 UART: [art] Extend RT PCRs Done
28,823,090 UART: [art] Lock RT PCRs Done
28,824,768 UART: [art] Populate DV Done
28,829,957 UART: [fht] FMC Alias Private Key: 7
28,831,555 UART: [art] Derive CDI
28,832,364 UART: [art] Store in in slot 0x4
28,875,128 UART: [art] Derive Key Pair
28,876,166 UART: [art] Store priv key in slot 0x5
32,117,688 UART: [art] Derive Key Pair - Done
32,130,815 UART: [art] Signing Cert with AUTHO
32,132,153 UART: RITY.KEYID = 7
34,411,702 UART: [art] Erasing AUTHORITY.KEYID = 7
34,413,216 UART: [art] PUB.X = 70096B97484B7DDDA8E04A9F437096C306799A66E30E9C5D2251AB95E930192F4785C9F8476BCC80743FA8B0EE720388
34,420,430 UART: [art] PUB.Y = FF237B3535C84E23105315395FEFF325D7B3E32185B6F714FAABCD73AB35F1B46A8D603239F42ACB06FDDB83BAE9CB5C
34,427,670 UART: [art] SIG.R = 834932BC6D13DBE80AD2CA2989AF1F4D14CE55693897F1430EA9984ADC50A81F20C99B9E529689C66D401C62DA07D1B2
34,435,095 UART: [art] SIG.S = 1961A6579F74EC4681B9E695FCBA47DC1EE8AA2BEB182A17EACCE05055453FE2047AC35DF2DD2C09624103CDB43AB8C4
35,740,512 UART: Caliptra RT
35,741,221 UART: [state] CFI Enabled
35,858,604 UART: [rt] RT listening for mailbox commands...
36,008,576 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,038,482 UART: [rt]cmd =0x4c444556, len=4
36,049,601 >>> mbox cmd response data (687 bytes)
36,194,720 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,224,875 UART: [rt]cmd =0x43455246, len=4
36,237,573 >>> mbox cmd response data (886 bytes)
36,382,436 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,412,375 UART: [rt]cmd =0x43455252, len=4
36,423,631 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
10,726,341 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,856,677 >>> mbox cmd response: success
26,496,600 UART:
26,497,022 UART: Running Caliptra FMC ...
26,498,196 UART:
26,498,357 UART: [state] CFI Enabled
26,506,262 UART: [fht] FMC Alias Private Key: 7
28,837,754 UART: [art] Extend RT PCRs Done
28,838,976 UART: [art] Lock RT PCRs Done
28,840,542 UART: [art] Populate DV Done
28,846,066 UART: [fht] FMC Alias Private Key: 7
28,847,503 UART: [art] Derive CDI
28,848,243 UART: [art] Store in in slot 0x4
28,890,993 UART: [art] Derive Key Pair
28,891,989 UART: [art] Store priv key in slot 0x5
32,133,524 UART: [art] Derive Key Pair - Done
32,146,640 UART: [art] Signing Cert with AUTHO
32,147,947 UART: RITY.KEYID = 7
34,427,289 UART: [art] Erasing AUTHORITY.KEYID = 7
34,428,797 UART: [art] PUB.X = C0F0DFC96AAF795808902F7C43C03300D4D2802E1103EE41C5D4AF3402112D58C252AAADD2474C30552714073F1651BA
34,436,010 UART: [art] PUB.Y = 3851FA97E656DEC50D80200695E9EC9A5CB944C89CE965F8D94747A5A46D7CE403BEF69FA907DF093BB22F8C787861C3
34,443,275 UART: [art] SIG.R = 9D2C71B3A5EC7BC5429722EAA7952D2DCAEEE442197B6BBEF810FE48D2D625FD601CD060F747796EF373BF92EE154384
34,450,714 UART: [art] SIG.S = 047BF1FD0CC502A59DC8A279D3E3F02ADF48E195080763DACC78B67BC3FE41546E56872C714D09E0951FE873471240F0
35,756,255 UART: Caliptra RT
35,756,972 UART: [state] CFI Enabled
35,874,202 UART: [rt] RT listening for mailbox commands...
36,023,893 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,053,892 UART: [rt]cmd =0x4c444556, len=4
36,064,887 >>> mbox cmd response data (687 bytes)
36,210,002 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,240,094 UART: [rt]cmd =0x43455246, len=4
36,252,980 >>> mbox cmd response data (886 bytes)
36,396,320 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,426,308 UART: [rt]cmd =0x43455252, len=4
36,437,526 >>> mbox cmd response data (783 bytes)
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
10,740,294 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,872,964 >>> mbox cmd response: success
26,514,586 UART:
26,514,967 UART: Running Caliptra FMC ...
26,516,052 UART:
26,516,198 UART: [state] CFI Enabled
26,524,425 UART: [fht] FMC Alias Private Key: 7
28,855,648 UART: [art] Extend RT PCRs Done
28,856,869 UART: [art] Lock RT PCRs Done
28,858,788 UART: [art] Populate DV Done
28,864,042 UART: [fht] FMC Alias Private Key: 7
28,865,638 UART: [art] Derive CDI
28,866,454 UART: [art] Store in in slot 0x4
28,908,676 UART: [art] Derive Key Pair
28,909,715 UART: [art] Store priv key in slot 0x5
32,152,424 UART: [art] Derive Key Pair - Done
32,165,428 UART: [art] Signing Cert with AUTHO
32,166,733 UART: RITY.KEYID = 7
34,445,953 UART: [art] Erasing AUTHORITY.KEYID = 7
34,447,457 UART: [art] PUB.X = F932300AA48936C89129CBE39981997E2C74911748229727E89080D675D97B47717E20738D4975CBF69600B3A78EF76F
34,454,618 UART: [art] PUB.Y = C8CCA31EACFDF91BB3B22C96BB7293285746481701F4E33EC2DD100BC899BCDEDA674431E0024B00BB68FD8683E57B75
34,461,908 UART: [art] SIG.R = E0240423ED449902E0A40418F6FFBADE8761F8E2F8F8A928375923F71312074A37B0A05EE23EF00D08F258889A012B4B
34,469,290 UART: [art] SIG.S = 4372A7CF39A89D273D14F659E3D5BDC3D41123B7E4FEEE4CB403122B23F50CAF5AE5646A18102C469A34048F3C683244
35,774,520 UART: Caliptra RT
35,775,340 UART: [state] CFI Enabled
35,892,996 UART: [rt] RT listening for mailbox commands...
36,042,696 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,072,766 UART: [rt]cmd =0x4c444556, len=4
36,083,764 >>> mbox cmd response data (687 bytes)
36,229,298 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,259,205 UART: [rt]cmd =0x43455246, len=4
36,272,066 >>> mbox cmd response data (886 bytes)
36,415,541 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,445,522 UART: [rt]cmd =0x43455252, len=4
36,456,644 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
10,733,652 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,851,411 >>> mbox cmd response: success
26,490,922 UART:
26,491,314 UART: Running Caliptra FMC ...
26,492,411 UART:
26,492,555 UART: [state] CFI Enabled
26,500,876 UART: [fht] FMC Alias Private Key: 7
28,831,352 UART: [art] Extend RT PCRs Done
28,832,580 UART: [art] Lock RT PCRs Done
28,834,336 UART: [art] Populate DV Done
28,839,581 UART: [fht] FMC Alias Private Key: 7
28,841,118 UART: [art] Derive CDI
28,841,881 UART: [art] Store in in slot 0x4
28,884,741 UART: [art] Derive Key Pair
28,885,780 UART: [art] Store priv key in slot 0x5
32,128,137 UART: [art] Derive Key Pair - Done
32,140,866 UART: [art] Signing Cert with AUTHO
32,142,374 UART: RITY.KEYID = 7
34,422,061 UART: [art] Erasing AUTHORITY.KEYID = 7
34,423,573 UART: [art] PUB.X = F1723E8E72B8665A4E8FFF8F8312D8298EA92C8383FBBE8C15806C91A41F45BF4F4576102F8EEF702D02FCADD59634EE
34,430,786 UART: [art] PUB.Y = 3B1A2F526D7AEA24314F75CB4B1D4480A87DE7E23ECEA767ADEDF31D5A0DE0961AC383ED4DDB6F165440BB8F66485D4D
34,438,093 UART: [art] SIG.R = 17EB55E6D9A2EA0AF6B85F845CCF840C497FAC669698C77BD225A3BEC6D64E89C29572414C61E3F7ED3D5EEAA7AE99AD
34,445,461 UART: [art] SIG.S = 8DFF66394567E209D032C1669D7359FE5444A07691FA60B3A4ACC250115FD24391FC8110EA379C4673F3FEA254A2508B
35,750,344 UART: Caliptra RT
35,751,054 UART: [state] CFI Enabled
35,868,771 UART: [rt] RT listening for mailbox commands...
36,018,530 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,048,458 UART: [rt]cmd =0x4c444556, len=4
36,059,749 >>> mbox cmd response data (687 bytes)
36,205,227 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,235,031 UART: [rt]cmd =0x43455246, len=4
36,247,592 >>> mbox cmd response data (886 bytes)
36,391,723 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,421,491 UART: [rt]cmd =0x43455252, len=4
36,432,944 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1936.84s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,998,993 UART: [idev] CSR uploaded
8,016,384 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,160,077 UART: [idev] --
8,160,719 UART: [ldev] ++
8,161,211 UART: [ldev] CDI.KEYID = 6
8,162,116 UART: [ldev] SUBJECT.KEYID = 5
8,163,205 UART: [ldev] AUTHORITY.KEYID = 7
8,164,400 UART: [ldev] FE.KEYID = 1
8,165,248 UART: [ldev] Erasing FE.KEYID = 1
10,565,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,300,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,315,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,331,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,353,078 UART: [ldev] --
12,358,131 UART: [fwproc] Wait for Commands...
12,360,333 UART: [fwproc] Recv command 0x46574c44
12,362,428 UART: [fwproc] Recv'd Img size: 114084 bytes
15,769,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,838,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,907,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,224,886 >>> mbox cmd response: success
16,229,478 UART: [afmc] ++
16,230,067 UART: [afmc] CDI.KEYID = 6
16,230,986 UART: [afmc] SUBJECT.KEYID = 7
16,232,144 UART: [afmc] AUTHORITY.KEYID = 5
18,776,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,515,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,517,821 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,533,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,549,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,565,624 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,589,655 UART: [afmc] --
20,593,514 UART: [cold-reset] --
20,595,857 UART: [state] Locking Datavault
20,599,758 UART: [state] Locking PCR0, PCR1 and PCR31
20,601,403 UART: [state] Locking ICCM
20,602,477 UART: [exit] Launching FMC @ 0x40000130
20,610,927 UART:
20,611,162 UART: Running Caliptra FMC ...
20,612,262 UART:
20,612,436 UART: [state] CFI Enabled
20,675,046 UART: [fht] FMC Alias Private Key: 7
22,439,328 UART: [art] Extend RT PCRs Done
22,440,561 UART: [art] Lock RT PCRs Done
22,442,348 UART: [art] Populate DV Done
22,447,654 UART: [fht] FMC Alias Private Key: 7
22,449,303 UART: [art] Derive CDI
22,450,115 UART: [art] Store in in slot 0x4
22,508,084 UART: [art] Derive Key Pair
22,509,125 UART: [art] Store priv key in slot 0x5
24,971,954 UART: [art] Derive Key Pair - Done
24,985,325 UART: [art] Signing Cert with AUTHO
24,986,631 UART: RITY.KEYID = 7
26,698,296 UART: [art] Erasing AUTHORITY.KEYID = 7
26,699,956 UART: [art] PUB.X = CF2643C42B5A45865B11E167C3A5DED9D599439A8D37BC0D11037574F622A77CB04DE38FF0EE117D98538679B7BE6901
26,707,072 UART: [art] PUB.Y = 232FC72A3F5F4C463422283B92DEAFB97F4BF7EF0D21FE102F48115F375902CE95A559AE04501F3E1113574E6AAC517C
26,714,317 UART: [art] SIG.R = A0944D97D5500917CBB42BA68708F041260536695B5D8C6C7AF7865F1405890F1370922CF426DA0E46B4800CE18ABFA5
26,721,681 UART: [art] SIG.S = 7C6968EAE6D9637F6C395555D65C31B4BBBC896572CC87B1A85D3C1C886D6143383DB130A2F7F903A8A7CCB36C35B8C6
27,700,698 UART: Caliptra RT
27,701,418 UART: [state] CFI Enabled
27,866,101 UART: [rt] RT listening for mailbox commands...
28,017,123 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,047,120 UART: [rt]cmd =0x4c444556, len=4
28,058,310 >>> mbox cmd response data (687 bytes)
28,203,770 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,233,728 UART: [rt]cmd =0x43455246, len=4
28,246,309 >>> mbox cmd response data (887 bytes)
28,389,561 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,419,679 UART: [rt]cmd =0x43455252, len=4
28,430,877 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,181 UART:
192,567 UART: Running Caliptra ROM ...
193,743 UART:
193,893 UART: [state] CFI Enabled
263,487 UART: [state] LifecycleState = Unprovisioned
265,349 UART: [state] DebugLocked = No
267,652 UART: [state] WD Timer not started. Device not locked for debugging
270,997 UART: [kat] SHA2-256
450,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,701 UART: [kat] ++
462,234 UART: [kat] sha1
473,277 UART: [kat] SHA2-256
476,274 UART: [kat] SHA2-384
483,487 UART: [kat] SHA2-512-ACC
486,472 UART: [kat] ECC-384
2,948,301 UART: [kat] HMAC-384Kdf
2,971,955 UART: [kat] LMS
3,501,439 UART: [kat] --
3,506,052 UART: [cold-reset] ++
3,507,555 UART: [fht] FHT @ 0x50003400
3,517,671 UART: [idev] ++
3,518,239 UART: [idev] CDI.KEYID = 6
3,519,156 UART: [idev] SUBJECT.KEYID = 7
3,520,376 UART: [idev] UDS.KEYID = 0
3,543,809 UART: [idev] Erasing UDS.KEYID = 0
6,027,762 UART: [idev] Sha1 KeyId Algorithm
6,047,855 UART: [idev] CSR upload begun
6,052,554 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,987 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,034 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,995 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,832 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,851,686 UART: [idev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
7,996,145 UART: [idev] CSR uploaded
8,013,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,157,191 UART: [idev] --
8,157,836 UART: [ldev] ++
8,158,331 UART: [ldev] CDI.KEYID = 6
8,159,206 UART: [ldev] SUBJECT.KEYID = 5
8,160,315 UART: [ldev] AUTHORITY.KEYID = 7
8,161,511 UART: [ldev] FE.KEYID = 1
8,162,359 UART: [ldev] Erasing FE.KEYID = 1
10,563,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,281,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,297,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,313,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,329,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,350,401 UART: [ldev] --
12,355,882 UART: [fwproc] Wait for Commands...
12,358,810 UART: [fwproc] Recv command 0x46574c44
12,360,909 UART: [fwproc] Recv'd Img size: 114084 bytes
15,752,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,827,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,896,470 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,213,295 >>> mbox cmd response: success
16,217,749 UART: [afmc] ++
16,218,334 UART: [afmc] CDI.KEYID = 6
16,219,243 UART: [afmc] SUBJECT.KEYID = 7
16,220,459 UART: [afmc] AUTHORITY.KEYID = 5
18,748,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,471,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,472,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,488,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,504,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,520,759 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,543,318 UART: [afmc] --
20,547,567 UART: [cold-reset] --
20,550,506 UART: [state] Locking Datavault
20,557,210 UART: [state] Locking PCR0, PCR1 and PCR31
20,558,850 UART: [state] Locking ICCM
20,561,161 UART: [exit] Launching FMC @ 0x40000130
20,569,607 UART:
20,569,850 UART: Running Caliptra FMC ...
20,570,955 UART:
20,571,118 UART: [state] CFI Enabled
20,630,019 UART: [fht] FMC Alias Private Key: 7
22,393,257 UART: [art] Extend RT PCRs Done
22,394,481 UART: [art] Lock RT PCRs Done
22,396,154 UART: [art] Populate DV Done
22,401,507 UART: [fht] FMC Alias Private Key: 7
22,403,152 UART: [art] Derive CDI
22,403,984 UART: [art] Store in in slot 0x4
22,462,751 UART: [art] Derive Key Pair
22,463,795 UART: [art] Store priv key in slot 0x5
24,926,767 UART: [art] Derive Key Pair - Done
24,939,823 UART: [art] Signing Cert with AUTHO
24,941,121 UART: RITY.KEYID = 7
26,652,768 UART: [art] Erasing AUTHORITY.KEYID = 7
26,654,268 UART: [art] PUB.X = C626F2CD7E96CABA9AEFCA8225CD1B5574A2F0694C6ABB935FD4EA08411691DE5364C088610BE1CF6D932240D0E1DFE0
26,661,553 UART: [art] PUB.Y = 997EB0C87566DE28D577A61F3C3B16CA41702C24390066C78FD3FE98C88A5487BA78E75AF4F880F75668EDFA9650633B
26,668,788 UART: [art] SIG.R = 69C73C62C4724CF1458D9BECDA300D6AB613774F595B253780012A94B4C6D8996AEB18CA2900184BF61D08309F0F95B7
26,676,177 UART: [art] SIG.S = 36C9F20B3FB015982ED9A2D3E56F9B81074120F4EF5C8DE6956B2D80FB250D348DB75421D9014860329B69FFDE4A21BE
27,655,115 UART: Caliptra RT
27,655,827 UART: [state] CFI Enabled
27,821,809 UART: [rt] RT listening for mailbox commands...
27,972,577 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,002,720 UART: [rt]cmd =0x4c444556, len=4
28,013,952 >>> mbox cmd response data (687 bytes)
28,159,470 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,189,626 UART: [rt]cmd =0x43455246, len=4
28,202,242 >>> mbox cmd response data (887 bytes)
28,345,528 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,375,397 UART: [rt]cmd =0x43455252, len=4
28,386,845 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1535.99s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
7,688,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,831,689 >>> mbox cmd response: success
20,128,155 UART:
20,128,544 UART: Running Caliptra FMC ...
20,129,684 UART:
20,129,849 UART: [state] CFI Enabled
20,193,146 UART: [fht] FMC Alias Private Key: 7
21,957,497 UART: [art] Extend RT PCRs Done
21,958,765 UART: [art] Lock RT PCRs Done
21,960,364 UART: [art] Populate DV Done
21,965,731 UART: [fht] FMC Alias Private Key: 7
21,967,334 UART: [art] Derive CDI
21,968,155 UART: [art] Store in in slot 0x4
22,026,397 UART: [art] Derive Key Pair
22,027,441 UART: [art] Store priv key in slot 0x5
24,490,537 UART: [art] Derive Key Pair - Done
24,503,267 UART: [art] Signing Cert with AUTHO
24,504,578 UART: RITY.KEYID = 7
26,215,786 UART: [art] Erasing AUTHORITY.KEYID = 7
26,217,289 UART: [art] PUB.X = F21C18AC8F06B1A57D96F5C699BFC6A8EA9B37D14E783C5245D963A244457A59E53658EABE7737FDE1E773607F533FA1
26,224,601 UART: [art] PUB.Y = 572A81A1D96CD493907D31886871CACE472D8740544F1BFE5700FA1BCEBE1BA7B2B1474E494B91D4A62269ECC2A083DF
26,231,829 UART: [art] SIG.R = 074D362165C29F30AD4EC245CF79E0765411DC8B00C27E3A02F1AE05B7E59CD0D7DD38BEC20CF76813709843C8C2C6FD
26,239,223 UART: [art] SIG.S = EF6BE234F75BE991D968472D9F259817F711F0A508A50F6F0FCB95C464948843ED9B882401A43A34298E60D757D173E1
27,218,172 UART: Caliptra RT
27,218,884 UART: [state] CFI Enabled
27,385,134 UART: [rt] RT listening for mailbox commands...
27,534,520 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,564,704 UART: [rt]cmd =0x4c444556, len=4
27,575,918 >>> mbox cmd response data (687 bytes)
27,720,953 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,750,996 UART: [rt]cmd =0x43455246, len=4
27,763,769 >>> mbox cmd response data (887 bytes)
27,908,003 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,938,117 UART: [rt]cmd =0x43455252, len=4
27,949,593 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
7,687,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,802,825 >>> mbox cmd response: success
20,089,287 UART:
20,089,677 UART: Running Caliptra FMC ...
20,090,798 UART:
20,090,952 UART: [state] CFI Enabled
20,158,254 UART: [fht] FMC Alias Private Key: 7
21,922,193 UART: [art] Extend RT PCRs Done
21,923,420 UART: [art] Lock RT PCRs Done
21,925,067 UART: [art] Populate DV Done
21,930,531 UART: [fht] FMC Alias Private Key: 7
21,932,181 UART: [art] Derive CDI
21,932,920 UART: [art] Store in in slot 0x4
21,991,339 UART: [art] Derive Key Pair
21,992,387 UART: [art] Store priv key in slot 0x5
24,455,089 UART: [art] Derive Key Pair - Done
24,468,025 UART: [art] Signing Cert with AUTHO
24,469,329 UART: RITY.KEYID = 7
26,180,521 UART: [art] Erasing AUTHORITY.KEYID = 7
26,182,030 UART: [art] PUB.X = 016FEEAA6DED6D2578D6F7534904092F69F87D7CE9CA4195194557EF112F2877EA843D4D3D43A178FE9443178299CB12
26,189,279 UART: [art] PUB.Y = 7AF8DF7629198796E3BB5AAD342966415FE522D389ED0979D0BBE28ECA68A3F4AA1F60D2547BF1068101D48B2E1DFF59
26,196,552 UART: [art] SIG.R = D6B6D82B2AFC7E85488118802E514167FC6E54D0291A4BB044B518B0E9F287D87630A37AC11ABCCBE5BC24F546A2B7A5
26,203,945 UART: [art] SIG.S = 27BB85AA699D5BA862D66B7DA7010AD3A391C31F8DE60C1B0AB5708054E0AD0D8DCBEFE1194280BB2F617FA7436B757F
27,183,368 UART: Caliptra RT
27,184,059 UART: [state] CFI Enabled
27,349,062 UART: [rt] RT listening for mailbox commands...
27,498,511 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,528,544 UART: [rt]cmd =0x4c444556, len=4
27,539,755 >>> mbox cmd response data (687 bytes)
27,684,921 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,714,834 UART: [rt]cmd =0x43455246, len=4
27,727,591 >>> mbox cmd response data (887 bytes)
27,870,549 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,900,596 UART: [rt]cmd =0x43455252, len=4
27,911,977 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
7,688,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,836,690 >>> mbox cmd response: success
20,118,943 UART:
20,119,338 UART: Running Caliptra FMC ...
20,120,460 UART:
20,120,628 UART: [state] CFI Enabled
20,183,914 UART: [fht] FMC Alias Private Key: 7
21,948,227 UART: [art] Extend RT PCRs Done
21,949,471 UART: [art] Lock RT PCRs Done
21,951,099 UART: [art] Populate DV Done
21,956,516 UART: [fht] FMC Alias Private Key: 7
21,958,406 UART: [art] Derive CDI
21,959,161 UART: [art] Store in in slot 0x4
22,016,913 UART: [art] Derive Key Pair
22,017,921 UART: [art] Store priv key in slot 0x5
24,481,082 UART: [art] Derive Key Pair - Done
24,493,977 UART: [art] Signing Cert with AUTHO
24,495,283 UART: RITY.KEYID = 7
26,207,021 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,543 UART: [art] PUB.X = D3E2D00F8037A266E11189F82D74FC554E90D57A97DBED84DEBF8D3F5B786710F0C8A6A0DAA758301EB7AA0139A44E00
26,215,797 UART: [art] PUB.Y = 42C6E7CBE331EBA63017B45FABB4C7EFB46B974864206990645BECA70339D6F1DE17EEC9E7F931145C006A6C68D1F1A0
26,223,012 UART: [art] SIG.R = 23730F14A83DA55709F1189985F1A734FF70012192430FC925A34F16A23278F1654ECFAA6D3C3C32D1F8C8FB7B76AA48
26,230,410 UART: [art] SIG.S = F22FEBE64FB0EA1522E280052D425FA04559BD12F63706A97876F7E41A315429B3B913DD33EEA947DA356B95C8428FAF
27,208,818 UART: Caliptra RT
27,209,535 UART: [state] CFI Enabled
27,375,650 UART: [rt] RT listening for mailbox commands...
27,525,784 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,555,742 UART: [rt]cmd =0x4c444556, len=4
27,566,705 >>> mbox cmd response data (687 bytes)
27,712,323 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,742,288 UART: [rt]cmd =0x43455246, len=4
27,754,931 >>> mbox cmd response data (887 bytes)
27,897,889 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,927,886 UART: [rt]cmd =0x43455252, len=4
27,939,328 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
7,686,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,809,198 >>> mbox cmd response: success
20,098,557 UART:
20,098,981 UART: Running Caliptra FMC ...
20,100,175 UART:
20,100,344 UART: [state] CFI Enabled
20,161,210 UART: [fht] FMC Alias Private Key: 7
21,925,437 UART: [art] Extend RT PCRs Done
21,926,656 UART: [art] Lock RT PCRs Done
21,928,386 UART: [art] Populate DV Done
21,933,856 UART: [fht] FMC Alias Private Key: 7
21,935,556 UART: [art] Derive CDI
21,936,372 UART: [art] Store in in slot 0x4
21,994,277 UART: [art] Derive Key Pair
21,995,331 UART: [art] Store priv key in slot 0x5
24,458,105 UART: [art] Derive Key Pair - Done
24,470,888 UART: [art] Signing Cert with AUTHO
24,472,188 UART: RITY.KEYID = 7
26,184,815 UART: [art] Erasing AUTHORITY.KEYID = 7
26,186,343 UART: [art] PUB.X = 9E1448AE5D7AFFD87F7CC28DE59D061F10574995603B0B051305D0B1EF919B8BE587637531BDB7AF2DCC01A2AE85835F
26,193,597 UART: [art] PUB.Y = 11401F4D5560D6534B6A03D8D22C9B7E19CB4D8E2B1967A528D1B56A78E0830F31D9864C4572BC429EE16E49754C55DC
26,200,829 UART: [art] SIG.R = 0EA2A29FCBAE168F2A0D5B25A82BE99A0A967CE64FF131B76422001D02F7AE9E202373B2D1544845259A2EF17FB90483
26,208,264 UART: [art] SIG.S = A1F205BBF2735D11C0D4D34FEAA84F202F446B61689733AFAEF067928C0C3E5B251105A143DF23B4622ED0F24B02E559
27,187,366 UART: Caliptra RT
27,188,081 UART: [state] CFI Enabled
27,353,485 UART: [rt] RT listening for mailbox commands...
27,503,482 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,533,632 UART: [rt]cmd =0x4c444556, len=4
27,544,644 >>> mbox cmd response data (687 bytes)
27,690,319 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,720,037 UART: [rt]cmd =0x43455246, len=4
27,732,640 >>> mbox cmd response data (887 bytes)
27,875,409 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,905,268 UART: [rt]cmd =0x43455252, len=4
27,916,729 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
7,684,071 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,829,674 >>> mbox cmd response: success
20,109,460 UART:
20,110,390 UART: Running Caliptra FMC ...
20,111,544 UART:
20,111,698 UART: [state] CFI Enabled
20,179,542 UART: [fht] FMC Alias Private Key: 7
21,943,891 UART: [art] Extend RT PCRs Done
21,945,128 UART: [art] Lock RT PCRs Done
21,946,834 UART: [art] Populate DV Done
21,952,469 UART: [fht] FMC Alias Private Key: 7
21,954,176 UART: [art] Derive CDI
21,954,914 UART: [art] Store in in slot 0x4
22,012,934 UART: [art] Derive Key Pair
22,014,003 UART: [art] Store priv key in slot 0x5
24,477,058 UART: [art] Derive Key Pair - Done
24,490,009 UART: [art] Signing Cert with AUTHO
24,491,320 UART: RITY.KEYID = 7
26,202,738 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,245 UART: [art] PUB.X = 5686B5BD9CFAFB5897E728A31D2A1C82F082475DC68CCDA26342393AFBF589F63B6A335A1F28281FA3B53BA6C187ECEB
26,211,550 UART: [art] PUB.Y = EFC51E391C546158EFF87ABE17C0031EA3970CD2EA479435ECB6FDDD9FEBB22CED722527E895FC55DBE7E94121316788
26,218,821 UART: [art] SIG.R = B6C5E890C61989B35AD49A238300E1EDA878BFABF276860CFDCE6EB3D8F1DC2BAFAFBFA4FDD8747F8D5311E77958CC3D
26,226,229 UART: [art] SIG.S = 52BBB3EF95CBA45062852FC25596EAED19FC529346EB25D3FA35F44C6F80EA4B21C11A0FA4A40D240780B2DEA9C5A518
27,204,890 UART: Caliptra RT
27,205,605 UART: [state] CFI Enabled
27,371,552 UART: [rt] RT listening for mailbox commands...
27,521,516 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,551,889 UART: [rt]cmd =0x4c444556, len=4
27,562,743 >>> mbox cmd response data (687 bytes)
27,708,074 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,738,216 UART: [rt]cmd =0x43455246, len=4
27,750,916 >>> mbox cmd response data (887 bytes)
27,893,820 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,923,743 UART: [rt]cmd =0x43455252, len=4
27,934,888 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.50s
Truncated 7343978 bytes from beginning
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
8,282,615 UART: [idev] CSR uploaded
8,299,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,443,232 UART: [idev] --
8,443,895 UART: [ldev] ++
8,444,388 UART: [ldev] CDI.KEYID = 6
8,445,263 UART: [ldev] SUBJECT.KEYID = 5
8,446,432 UART: [ldev] AUTHORITY.KEYID = 7
8,447,612 UART: [ldev] FE.KEYID = 1
8,448,487 UART: [ldev] Erasing FE.KEYID = 1
10,791,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,510,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,526,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,542,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,558,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,577,027 UART: [ldev] --
12,582,233 UART: [fwproc] Wait for Commands...
12,585,302 UART: [fwproc] Recv command 0x46574c44
12,587,398 UART: [fwproc] Recv'd Img size: 114084 bytes
15,989,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,130,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,447,146 >>> mbox cmd response: success
16,451,222 UART: [afmc] ++
16,451,808 UART: [afmc] CDI.KEYID = 6
16,452,721 UART: [afmc] SUBJECT.KEYID = 7
16,453,952 UART: [afmc] AUTHORITY.KEYID = 5
18,950,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,672,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,674,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,690,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,706,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,722,350 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,744,815 UART: [afmc] --
20,748,133 UART: [cold-reset] --
20,751,497 UART: [state] Locking Datavault
20,754,788 UART: [state] Locking PCR0, PCR1 and PCR31
20,756,480 UART: [state] Locking ICCM
20,758,924 UART: [exit] Launching FMC @ 0x40000130
20,767,364 UART:
20,767,599 UART: Running Caliptra FMC ...
20,768,621 UART:
20,768,786 UART: [state] CFI Enabled
20,776,829 UART: [fht] FMC Alias Private Key: 7
22,533,647 UART: [art] Extend RT PCRs Done
22,534,867 UART: [art] Lock RT PCRs Done
22,536,513 UART: [art] Populate DV Done
22,542,110 UART: [fht] FMC Alias Private Key: 7
22,543,843 UART: [art] Derive CDI
22,544,657 UART: [art] Store in in slot 0x4
22,587,355 UART: [art] Derive Key Pair
22,588,350 UART: [art] Store priv key in slot 0x5
25,015,304 UART: [art] Derive Key Pair - Done
25,028,132 UART: [art] Signing Cert with AUTHO
25,029,467 UART: RITY.KEYID = 7
26,734,555 UART: [art] Erasing AUTHORITY.KEYID = 7
26,736,052 UART: [art] PUB.X = C02EA2AFCC599B608D24EE50406851E4E2EAB8648CFEF28594CA6AE60712B6FD80985C0F3D94889C64EEC44971E420D1
26,743,344 UART: [art] PUB.Y = 869A7391DC6817B86375055B3D9491841F1063CDFFA00777EC643E4F91AAE193E630F677159BAB2CD50C9B45C5A3793F
26,750,615 UART: [art] SIG.R = 6008C75210F86ABE19BB982532CD0B4132204916CB1D4524E3937FE5D4F3ED7A9DC4413A6D2E17FCAA31D8392C16CA23
26,757,961 UART: [art] SIG.S = 776440C434A59FC4DD9DA6106C3864E110FF493A75E3398BD79A6D64AD6FB65624A7DF0395394D4EF99AC2B51A310270
27,737,611 UART: Caliptra RT
27,738,329 UART: [state] CFI Enabled
27,855,417 UART: [rt] RT listening for mailbox commands...
28,005,865 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,035,950 UART: [rt]cmd =0x4c444556, len=4
28,047,131 >>> mbox cmd response data (687 bytes)
28,191,884 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,221,850 UART: [rt]cmd =0x43455246, len=4
28,234,436 >>> mbox cmd response data (887 bytes)
28,377,740 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,407,599 UART: [rt]cmd =0x43455252, len=4
28,418,988 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,528 UART:
192,891 UART: Running Caliptra ROM ...
194,067 UART:
603,589 UART: [state] CFI Enabled
617,101 UART: [state] LifecycleState = Unprovisioned
618,969 UART: [state] DebugLocked = No
621,159 UART: [state] WD Timer not started. Device not locked for debugging
624,900 UART: [kat] SHA2-256
803,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,562 UART: [kat] ++
816,093 UART: [kat] sha1
827,194 UART: [kat] SHA2-256
830,243 UART: [kat] SHA2-384
835,943 UART: [kat] SHA2-512-ACC
838,923 UART: [kat] ECC-384
3,280,347 UART: [kat] HMAC-384Kdf
3,292,755 UART: [kat] LMS
3,822,242 UART: [kat] --
3,825,528 UART: [cold-reset] ++
3,827,562 UART: [fht] FHT @ 0x50003400
3,838,696 UART: [idev] ++
3,839,261 UART: [idev] CDI.KEYID = 6
3,840,227 UART: [idev] SUBJECT.KEYID = 7
3,841,379 UART: [idev] UDS.KEYID = 0
3,856,380 UART: [idev] Erasing UDS.KEYID = 0
6,310,143 UART: [idev] Sha1 KeyId Algorithm
6,330,450 UART: [idev] CSR upload begun
6,335,153 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,051,335 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,067,369 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,083,341 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,099,187 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,123,031 UART: [idev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
8,267,472 UART: [idev] CSR uploaded
8,284,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,428,233 UART: [idev] --
8,428,868 UART: [ldev] ++
8,429,363 UART: [ldev] CDI.KEYID = 6
8,430,454 UART: [ldev] SUBJECT.KEYID = 5
8,431,557 UART: [ldev] AUTHORITY.KEYID = 7
8,432,654 UART: [ldev] FE.KEYID = 1
8,433,493 UART: [ldev] Erasing FE.KEYID = 1
10,772,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,489,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,505,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,521,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,537,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,556,593 UART: [ldev] --
12,561,280 UART: [fwproc] Wait for Commands...
12,563,001 UART: [fwproc] Recv command 0x46574c44
12,565,049 UART: [fwproc] Recv'd Img size: 114084 bytes
15,967,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,030,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,099,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,416,537 >>> mbox cmd response: success
16,420,295 UART: [afmc] ++
16,420,884 UART: [afmc] CDI.KEYID = 6
16,421,794 UART: [afmc] SUBJECT.KEYID = 7
16,422,949 UART: [afmc] AUTHORITY.KEYID = 5
18,924,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,647,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,649,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,664,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,680,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,696,879 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,719,376 UART: [afmc] --
20,723,560 UART: [cold-reset] --
20,727,470 UART: [state] Locking Datavault
20,731,626 UART: [state] Locking PCR0, PCR1 and PCR31
20,733,263 UART: [state] Locking ICCM
20,734,602 UART: [exit] Launching FMC @ 0x40000130
20,743,048 UART:
20,743,289 UART: Running Caliptra FMC ...
20,744,387 UART:
20,744,543 UART: [state] CFI Enabled
20,753,074 UART: [fht] FMC Alias Private Key: 7
22,509,735 UART: [art] Extend RT PCRs Done
22,510,957 UART: [art] Lock RT PCRs Done
22,512,414 UART: [art] Populate DV Done
22,517,934 UART: [fht] FMC Alias Private Key: 7
22,519,590 UART: [art] Derive CDI
22,520,400 UART: [art] Store in in slot 0x4
22,562,831 UART: [art] Derive Key Pair
22,563,870 UART: [art] Store priv key in slot 0x5
24,989,920 UART: [art] Derive Key Pair - Done
25,002,798 UART: [art] Signing Cert with AUTHO
25,004,109 UART: RITY.KEYID = 7
26,709,320 UART: [art] Erasing AUTHORITY.KEYID = 7
26,710,827 UART: [art] PUB.X = A187869C48269E40A57B1004F596D23DE5E5A7690E28D4FA1085E848AA3D8A983033C7BD75FEA3151F18F1FC98FB147C
26,718,078 UART: [art] PUB.Y = 696987EA4FE3023FD1DB9421053E2866DDB8FE67EB43633A76A1CC3FABA849D77415558DCDB3C7D8D415D47EF440856E
26,725,323 UART: [art] SIG.R = AFE05CB0B5CEA292981F9880632EBC41E89C3A968A7FAB711D3F2FC49FCDD900F4B57D0347D6BA9A1760E678BF521702
26,732,716 UART: [art] SIG.S = 108F6EE4F2E2EA3EE5443184822FC7D7E42780C9AD404C4FBCA0BB3842EECB080EACBE6C9AB5638EDFBD8892E0DA168C
27,711,776 UART: Caliptra RT
27,712,466 UART: [state] CFI Enabled
27,829,528 UART: [rt] RT listening for mailbox commands...
27,980,437 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,010,631 UART: [rt]cmd =0x4c444556, len=4
28,021,691 >>> mbox cmd response data (687 bytes)
28,167,632 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,197,629 UART: [rt]cmd =0x43455246, len=4
28,210,246 >>> mbox cmd response data (887 bytes)
28,353,592 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,383,499 UART: [rt]cmd =0x43455252, len=4
28,394,627 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.06s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
7,946,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,028,199 >>> mbox cmd response: success
20,271,006 UART:
20,271,383 UART: Running Caliptra FMC ...
20,272,711 UART:
20,272,883 UART: [state] CFI Enabled
20,280,819 UART: [fht] FMC Alias Private Key: 7
22,037,501 UART: [art] Extend RT PCRs Done
22,038,744 UART: [art] Lock RT PCRs Done
22,040,156 UART: [art] Populate DV Done
22,045,539 UART: [fht] FMC Alias Private Key: 7
22,047,028 UART: [art] Derive CDI
22,047,791 UART: [art] Store in in slot 0x4
22,090,115 UART: [art] Derive Key Pair
22,091,114 UART: [art] Store priv key in slot 0x5
24,518,420 UART: [art] Derive Key Pair - Done
24,531,526 UART: [art] Signing Cert with AUTHO
24,532,851 UART: RITY.KEYID = 7
26,238,136 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,643 UART: [art] PUB.X = 48B8A56F00AEF7294F0D377A9A74337D4F31CF585608D3669AD47D45DC629C4E22BC654D09AB1DE1C0C864CC9ACB2F2B
26,246,863 UART: [art] PUB.Y = 431300B5EEFDEE027CBAD69374CE31CA95D4709E7190459941E45DAB2ADADFC5B9BD005F2C09E1F2A4F9DB4AC280B57A
26,254,152 UART: [art] SIG.R = 4AB416A491228F5713291A3AA07683F49E0A3F204D42D8485E5601D75B84F373079B3053716DAA069CC6A970F1BE0B9D
26,261,499 UART: [art] SIG.S = F212DEC4D423475DDC6BB7CCE7CC359A45CFF9B547CB8D44CB109DD0932835763E888BFB047C07BF31CD1001E37486A0
27,240,686 UART: Caliptra RT
27,241,374 UART: [state] CFI Enabled
27,358,057 UART: [rt] RT listening for mailbox commands...
27,507,807 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,537,756 UART: [rt]cmd =0x4c444556, len=4
27,548,874 >>> mbox cmd response data (687 bytes)
27,694,178 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,723,929 UART: [rt]cmd =0x43455246, len=4
27,736,427 >>> mbox cmd response data (887 bytes)
27,880,498 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,910,325 UART: [rt]cmd =0x43455252, len=4
27,921,843 >>> mbox cmd response data (783 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
7,946,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,019,551 >>> mbox cmd response: success
20,268,123 UART:
20,268,575 UART: Running Caliptra FMC ...
20,269,706 UART:
20,269,871 UART: [state] CFI Enabled
20,277,652 UART: [fht] FMC Alias Private Key: 7
22,034,633 UART: [art] Extend RT PCRs Done
22,035,864 UART: [art] Lock RT PCRs Done
22,037,542 UART: [art] Populate DV Done
22,042,745 UART: [fht] FMC Alias Private Key: 7
22,044,339 UART: [art] Derive CDI
22,045,176 UART: [art] Store in in slot 0x4
22,087,814 UART: [art] Derive Key Pair
22,088,858 UART: [art] Store priv key in slot 0x5
24,515,611 UART: [art] Derive Key Pair - Done
24,528,494 UART: [art] Signing Cert with AUTHO
24,529,830 UART: RITY.KEYID = 7
26,235,275 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,781 UART: [art] PUB.X = 6347FCBD4838DF216FF19D1B8BE9D05EC78E6D188C539DDF4558A5A40DECD531B3ED7A2811CD1E7D85C263C0A956415F
26,244,100 UART: [art] PUB.Y = AEC5938A3808F46E30EE0512665E087D5564974C220FE0274264D1A7D3170927A66F27801483326946C653C4165E3848
26,251,328 UART: [art] SIG.R = 54E67C862BDED4941F55957CC9B24F85A704F10CA543AD28F7D244D744B2CD7F5A721763EF915158E0ADB57E321AEA4E
26,258,670 UART: [art] SIG.S = 499B86D29BD7D5BB4F797C050C2E820703D4BA9C67702F70E7AE806E2773F1D07A2817086B550A596BA76B59AF983387
27,238,101 UART: Caliptra RT
27,238,813 UART: [state] CFI Enabled
27,356,489 UART: [rt] RT listening for mailbox commands...
27,506,387 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,536,453 UART: [rt]cmd =0x4c444556, len=4
27,547,677 >>> mbox cmd response data (687 bytes)
27,692,823 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,722,822 UART: [rt]cmd =0x43455246, len=4
27,735,381 >>> mbox cmd response data (887 bytes)
27,877,866 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,907,783 UART: [rt]cmd =0x43455252, len=4
27,919,133 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
7,942,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,012,365 >>> mbox cmd response: success
20,264,364 UART:
20,264,737 UART: Running Caliptra FMC ...
20,265,844 UART:
20,265,996 UART: [state] CFI Enabled
20,273,678 UART: [fht] FMC Alias Private Key: 7
22,030,614 UART: [art] Extend RT PCRs Done
22,031,842 UART: [art] Lock RT PCRs Done
22,033,439 UART: [art] Populate DV Done
22,038,794 UART: [fht] FMC Alias Private Key: 7
22,040,499 UART: [art] Derive CDI
22,041,232 UART: [art] Store in in slot 0x4
22,083,997 UART: [art] Derive Key Pair
22,085,043 UART: [art] Store priv key in slot 0x5
24,511,374 UART: [art] Derive Key Pair - Done
24,524,291 UART: [art] Signing Cert with AUTHO
24,525,592 UART: RITY.KEYID = 7
26,230,716 UART: [art] Erasing AUTHORITY.KEYID = 7
26,232,221 UART: [art] PUB.X = 2890B10071FCA726A94C996FF4BB64970B602F30C47C76C085367E687F2232E45F0057C7B0DA7268F8DCE81F13454F38
26,239,430 UART: [art] PUB.Y = B6EEC06D0407BAE02051D2CD1846C54FABAC936CF50B5ABDB5C55E7776B7AD3EB8F5C2A1A4C8DD4008B914ED698394A6
26,246,716 UART: [art] SIG.R = 130FD77AEE1E7F6B9C650819A376DC1A0F9154D000D5D467A537E4D682BB8164B617E6BFBD889A2F8371F4305E0CFC61
26,254,069 UART: [art] SIG.S = 1E0417FFBD8A49AF7E57791B152C090B218134C8885AF545A0B8A754C6B50E1061B08E09253CFCE5030D9004A35EEA74
27,232,495 UART: Caliptra RT
27,233,193 UART: [state] CFI Enabled
27,349,723 UART: [rt] RT listening for mailbox commands...
27,499,688 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,529,767 UART: [rt]cmd =0x4c444556, len=4
27,540,948 >>> mbox cmd response data (687 bytes)
27,686,676 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,728 UART: [rt]cmd =0x43455246, len=4
27,729,331 >>> mbox cmd response data (887 bytes)
27,872,821 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,630 UART: [rt]cmd =0x43455252, len=4
27,914,203 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
7,941,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,013,792 >>> mbox cmd response: success
20,262,213 UART:
20,262,595 UART: Running Caliptra FMC ...
20,263,691 UART:
20,263,840 UART: [state] CFI Enabled
20,272,164 UART: [fht] FMC Alias Private Key: 7
22,028,895 UART: [art] Extend RT PCRs Done
22,030,118 UART: [art] Lock RT PCRs Done
22,031,665 UART: [art] Populate DV Done
22,036,943 UART: [fht] FMC Alias Private Key: 7
22,038,429 UART: [art] Derive CDI
22,039,194 UART: [art] Store in in slot 0x4
22,082,179 UART: [art] Derive Key Pair
22,083,224 UART: [art] Store priv key in slot 0x5
24,510,766 UART: [art] Derive Key Pair - Done
24,523,557 UART: [art] Signing Cert with AUTHO
24,524,863 UART: RITY.KEYID = 7
26,230,342 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,842 UART: [art] PUB.X = E9194B607E29A87E298A074F31CFF4A15B178FE5DCFF6A76682308415B462C98F656DD13AE7F0C2B88C27BFD85CE8F0D
26,239,122 UART: [art] PUB.Y = FC1147597A4B931F50BB4D4038E4B76E20699FAA3EEB3B059E7B226029C6FD0899870E622569F60FB8552EA104B1B344
26,246,374 UART: [art] SIG.R = B67655CD578BC25C78DFCD21D2FD7F6704470FFF707FD252DB56C5E3BE2AED063DB080B83807BA7FAA40AD0BE6A97062
26,253,774 UART: [art] SIG.S = B44A4E00B88E7C0ED04A2B2EC068D7EA461071D5A25271695CB17192258785DE45F7E497B34232D875C0F116CE41F443
27,232,640 UART: Caliptra RT
27,233,345 UART: [state] CFI Enabled
27,350,442 UART: [rt] RT listening for mailbox commands...
27,500,638 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,530,818 UART: [rt]cmd =0x4c444556, len=4
27,541,845 >>> mbox cmd response data (687 bytes)
27,687,310 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,717,470 UART: [rt]cmd =0x43455246, len=4
27,730,238 >>> mbox cmd response data (887 bytes)
27,874,032 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,903,917 UART: [rt]cmd =0x43455252, len=4
27,915,355 >>> mbox cmd response data (784 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
7,944,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,020,757 >>> mbox cmd response: success
20,267,315 UART:
20,267,687 UART: Running Caliptra FMC ...
20,268,877 UART:
20,269,048 UART: [state] CFI Enabled
20,277,203 UART: [fht] FMC Alias Private Key: 7
22,033,639 UART: [art] Extend RT PCRs Done
22,034,868 UART: [art] Lock RT PCRs Done
22,036,658 UART: [art] Populate DV Done
22,042,068 UART: [fht] FMC Alias Private Key: 7
22,043,776 UART: [art] Derive CDI
22,044,590 UART: [art] Store in in slot 0x4
22,087,634 UART: [art] Derive Key Pair
22,088,637 UART: [art] Store priv key in slot 0x5
24,515,120 UART: [art] Derive Key Pair - Done
24,528,112 UART: [art] Signing Cert with AUTHO
24,529,406 UART: RITY.KEYID = 7
26,234,846 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,357 UART: [art] PUB.X = 17C117B5618B3F47D8B3A00F46F486A014F335801D1422ECFCCBA4DBB4910BA5A72CFE20EDD989489BC48ADEC1CC1E6A
26,243,674 UART: [art] PUB.Y = 2D1CD170FD3E4F4B2CED12901675DBA4B145B8B8A17FE985F87E91ADBB1F8620D67402E1C4B76CAB2EED6816F1E03443
26,250,945 UART: [art] SIG.R = 459C406AABC6B93C0320458B52709EA744E4339F1EB1DDA81E3ABBF780C6C8D767ED100ADF1F3D14ED327D003D18FA25
26,258,356 UART: [art] SIG.S = 9E3376764E310D8BA0A228F432BD326CBD6D71F602C0F1AAA61688EF1EA6584728413F3E013AA6C61F7AA3FAF0D34D60
27,237,217 UART: Caliptra RT
27,237,907 UART: [state] CFI Enabled
27,354,370 UART: [rt] RT listening for mailbox commands...
27,504,545 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,534,848 UART: [rt]cmd =0x4c444556, len=4
27,546,024 >>> mbox cmd response data (687 bytes)
27,691,377 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,721,263 UART: [rt]cmd =0x43455246, len=4
27,734,034 >>> mbox cmd response data (887 bytes)
27,877,099 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,907,148 UART: [rt]cmd =0x43455252, len=4
27,918,627 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.17s
Truncated 7343978 bytes from beginning
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
7,998,632 UART: [idev] CSR uploaded
8,015,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,159,664 UART: [idev] --
8,160,310 UART: [ldev] ++
8,160,810 UART: [ldev] CDI.KEYID = 6
8,161,689 UART: [ldev] SUBJECT.KEYID = 5
8,162,807 UART: [ldev] AUTHORITY.KEYID = 7
8,163,902 UART: [ldev] FE.KEYID = 1
8,164,735 UART: [ldev] Erasing FE.KEYID = 1
10,565,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,351,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,370,679 UART: [ldev] --
12,375,625 UART: [fwproc] Wait for Commands...
12,378,912 UART: [fwproc] Recv command 0x46574c44
12,380,953 UART: [fwproc] Recv'd Img size: 114084 bytes
15,781,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,857,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,926,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,243,233 >>> mbox cmd response: success
16,246,785 UART: [afmc] ++
16,247,373 UART: [afmc] CDI.KEYID = 6
16,248,282 UART: [afmc] SUBJECT.KEYID = 7
16,249,443 UART: [afmc] AUTHORITY.KEYID = 5
18,787,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,514,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,516,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,531,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,547,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,563,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,587,003 UART: [afmc] --
20,590,957 UART: [cold-reset] --
20,594,510 UART: [state] Locking Datavault
20,600,627 UART: [state] Locking PCR0, PCR1 and PCR31
20,602,271 UART: [state] Locking ICCM
20,603,878 UART: [exit] Launching FMC @ 0x40000130
20,612,278 UART:
20,612,520 UART: Running Caliptra FMC ...
20,613,624 UART:
20,613,787 UART: [state] CFI Enabled
20,672,603 UART: [fht] FMC Alias Private Key: 7
22,436,888 UART: [art] Extend RT PCRs Done
22,438,117 UART: [art] Lock RT PCRs Done
22,439,908 UART: [art] Populate DV Done
22,445,266 UART: [fht] FMC Alias Private Key: 7
22,446,802 UART: [art] Derive CDI
22,447,614 UART: [art] Store in in slot 0x4
22,505,522 UART: [art] Derive Key Pair
22,506,566 UART: [art] Store priv key in slot 0x5
24,968,960 UART: [art] Derive Key Pair - Done
24,981,741 UART: [art] Signing Cert with AUTHO
24,983,050 UART: RITY.KEYID = 7
26,695,872 UART: [art] Erasing AUTHORITY.KEYID = 7
26,697,379 UART: [art] PUB.X = A9E873F28188C87498BA7C6C25392F1BB3B82E933FC55C53594298EF2E315335EF4A21FE5C214AE1959FEC27285AAA82
26,704,665 UART: [art] PUB.Y = B76B948B2BE37D860FE6800873A00D59B3AB3ACA68CFFCB215DF19A9AD0E01C79B050E91A227D6ABC404E2D8744C31C8
26,711,959 UART: [art] SIG.R = 734F8879C7B7573C17AF3F6DAE5FA78781836413F89234B01361B51FFB86413BDBFAFDA4E4F47A7C5867AF23A7C930C2
26,719,368 UART: [art] SIG.S = AD5E9173C9D71E64BE2D114EF5D43362B75AA3F891D06DF97F42A395007D0B870AC47F448A53DD8C1531CC4C8164F1AE
27,698,185 UART: Caliptra RT
27,698,903 UART: [state] CFI Enabled
27,863,590 UART: [rt] RT listening for mailbox commands...
28,014,261 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,044,205 UART: [rt]cmd =0x4c444556, len=4
28,055,209 >>> mbox cmd response data (687 bytes)
28,200,100 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,230,096 UART: [rt]cmd =0x43455246, len=4
28,242,708 >>> mbox cmd response data (887 bytes)
28,385,706 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,415,521 UART: [rt]cmd =0x43455252, len=4
28,426,812 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,084 UART:
192,481 UART: Running Caliptra ROM ...
193,578 UART:
193,719 UART: [state] CFI Enabled
265,303 UART: [state] LifecycleState = Unprovisioned
267,176 UART: [state] DebugLocked = No
268,363 UART: [state] WD Timer not started. Device not locked for debugging
272,673 UART: [kat] SHA2-256
451,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,370 UART: [kat] ++
463,813 UART: [kat] sha1
474,251 UART: [kat] SHA2-256
477,268 UART: [kat] SHA2-384
482,172 UART: [kat] SHA2-512-ACC
485,165 UART: [kat] ECC-384
2,947,106 UART: [kat] HMAC-384Kdf
2,971,394 UART: [kat] LMS
3,500,850 UART: [kat] --
3,506,915 UART: [cold-reset] ++
3,508,691 UART: [fht] FHT @ 0x50003400
3,520,488 UART: [idev] ++
3,521,063 UART: [idev] CDI.KEYID = 6
3,521,980 UART: [idev] SUBJECT.KEYID = 7
3,523,197 UART: [idev] UDS.KEYID = 0
3,543,883 UART: [idev] Erasing UDS.KEYID = 0
6,025,043 UART: [idev] Sha1 KeyId Algorithm
6,046,279 UART: [idev] CSR upload begun
6,050,996 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,078 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,137 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,075 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,947 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,772 UART: [idev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
7,997,253 UART: [idev] CSR uploaded
8,014,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,158,231 UART: [idev] --
8,158,870 UART: [ldev] ++
8,159,361 UART: [ldev] CDI.KEYID = 6
8,160,264 UART: [ldev] SUBJECT.KEYID = 5
8,161,354 UART: [ldev] AUTHORITY.KEYID = 7
8,162,543 UART: [ldev] FE.KEYID = 1
8,163,389 UART: [ldev] Erasing FE.KEYID = 1
10,564,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,280,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,296,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,312,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,328,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,348,917 UART: [ldev] --
12,353,112 UART: [fwproc] Wait for Commands...
12,355,773 UART: [fwproc] Recv command 0x46574c44
12,357,874 UART: [fwproc] Recv'd Img size: 114084 bytes
15,765,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,839,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,907,989 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,225,424 >>> mbox cmd response: success
16,229,543 UART: [afmc] ++
16,230,131 UART: [afmc] CDI.KEYID = 6
16,231,011 UART: [afmc] SUBJECT.KEYID = 7
16,232,227 UART: [afmc] AUTHORITY.KEYID = 5
18,771,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,494,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,496,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,512,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,528,689 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,544,545 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,568,093 UART: [afmc] --
20,572,341 UART: [cold-reset] --
20,576,846 UART: [state] Locking Datavault
20,582,561 UART: [state] Locking PCR0, PCR1 and PCR31
20,584,265 UART: [state] Locking ICCM
20,586,016 UART: [exit] Launching FMC @ 0x40000130
20,594,412 UART:
20,594,643 UART: Running Caliptra FMC ...
20,595,666 UART:
20,595,812 UART: [state] CFI Enabled
20,653,081 UART: [fht] FMC Alias Private Key: 7
22,417,607 UART: [art] Extend RT PCRs Done
22,418,820 UART: [art] Lock RT PCRs Done
22,420,199 UART: [art] Populate DV Done
22,425,615 UART: [fht] FMC Alias Private Key: 7
22,427,255 UART: [art] Derive CDI
22,428,010 UART: [art] Store in in slot 0x4
22,486,461 UART: [art] Derive Key Pair
22,487,464 UART: [art] Store priv key in slot 0x5
24,950,573 UART: [art] Derive Key Pair - Done
24,963,472 UART: [art] Signing Cert with AUTHO
24,964,774 UART: RITY.KEYID = 7
26,676,004 UART: [art] Erasing AUTHORITY.KEYID = 7
26,677,519 UART: [art] PUB.X = A562DEABD1929D87F73E265B798869B65B4A685902D4CE9BADBBC4825273F0FE1B4A522E9D5B54E5A55ED0CA7E1FF259
26,684,768 UART: [art] PUB.Y = 3B29E54283A0B6F70443D7DD893680340D8F1A7C12D5A8B21187A7EB56E27A1A8A728BDE9BB6ACACAC2E6B2EB77BF6E3
26,692,063 UART: [art] SIG.R = 7BB542CD71F114635E664C1BB53DD2515A4B04349E9D2AF6C7C72EEF63918AC3E67DB5772CABA86D2DC378E0ADD7D8F2
26,699,461 UART: [art] SIG.S = 845BE3133589FB462FDEF8420A16238B7744F26D81621AF47BD1D9B066B9760D779E751C07CB48507359DAAFA809108E
27,678,105 UART: Caliptra RT
27,678,802 UART: [state] CFI Enabled
27,844,399 UART: [rt] RT listening for mailbox commands...
27,995,420 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,025,375 UART: [rt]cmd =0x4c444556, len=4
28,036,443 >>> mbox cmd response data (687 bytes)
28,181,725 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,211,826 UART: [rt]cmd =0x43455246, len=4
28,224,603 >>> mbox cmd response data (887 bytes)
28,367,600 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,397,601 UART: [rt]cmd =0x43455252, len=4
28,408,934 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1535.96s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
7,688,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,830,709 >>> mbox cmd response: success
20,114,944 UART:
20,115,338 UART: Running Caliptra FMC ...
20,116,443 UART:
20,116,593 UART: [state] CFI Enabled
20,178,206 UART: [fht] FMC Alias Private Key: 7
21,942,061 UART: [art] Extend RT PCRs Done
21,943,298 UART: [art] Lock RT PCRs Done
21,945,332 UART: [art] Populate DV Done
21,950,793 UART: [fht] FMC Alias Private Key: 7
21,952,439 UART: [art] Derive CDI
21,953,177 UART: [art] Store in in slot 0x4
22,011,520 UART: [art] Derive Key Pair
22,012,590 UART: [art] Store priv key in slot 0x5
24,475,165 UART: [art] Derive Key Pair - Done
24,487,794 UART: [art] Signing Cert with AUTHO
24,489,110 UART: RITY.KEYID = 7
26,201,189 UART: [art] Erasing AUTHORITY.KEYID = 7
26,202,697 UART: [art] PUB.X = 9C9505BFB7C328C608A7D30E73F3D85CFDDDCE3A4F71EA71C2F831303186E808E88CC6232B8AF96B9AA16FCA4DE7DB65
26,210,014 UART: [art] PUB.Y = 827E63856F34B8EBAD31FF47D128622C094D8946382E63453F0AB2BE445A09E34FEB6685F1BA8A2C17473C515B29DBE7
26,217,250 UART: [art] SIG.R = 6BBF723BF692835E0FBFE035818EFD67F35BAD681871500CFC3602809271185F27732F0D29C7EE722A5E6E001C3C5626
26,224,652 UART: [art] SIG.S = 2B02EEED433F287C858DD44155D4FCA0C42BE64329C0ACD883E5DD2CCF64FFD181BCD6726740E5E68CDC59B7C934F340
27,204,163 UART: Caliptra RT
27,204,880 UART: [state] CFI Enabled
27,370,380 UART: [rt] RT listening for mailbox commands...
27,520,632 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,550,641 UART: [rt]cmd =0x4c444556, len=4
27,561,922 >>> mbox cmd response data (687 bytes)
27,707,236 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,737,300 UART: [rt]cmd =0x43455246, len=4
27,749,986 >>> mbox cmd response data (887 bytes)
27,893,336 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,923,279 UART: [rt]cmd =0x43455252, len=4
27,934,789 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
7,664,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,809,710 >>> mbox cmd response: success
20,092,175 UART:
20,092,593 UART: Running Caliptra FMC ...
20,093,703 UART:
20,093,855 UART: [state] CFI Enabled
20,158,353 UART: [fht] FMC Alias Private Key: 7
21,922,516 UART: [art] Extend RT PCRs Done
21,923,741 UART: [art] Lock RT PCRs Done
21,925,377 UART: [art] Populate DV Done
21,930,838 UART: [fht] FMC Alias Private Key: 7
21,932,541 UART: [art] Derive CDI
21,933,276 UART: [art] Store in in slot 0x4
21,991,401 UART: [art] Derive Key Pair
21,992,446 UART: [art] Store priv key in slot 0x5
24,455,294 UART: [art] Derive Key Pair - Done
24,468,093 UART: [art] Signing Cert with AUTHO
24,469,402 UART: RITY.KEYID = 7
26,180,601 UART: [art] Erasing AUTHORITY.KEYID = 7
26,182,114 UART: [art] PUB.X = 45B88BA9B348B7D90774C87C07166F23CE1EA0FA46BA56642DEFA9E3D7A0D69F8768F6DD81E45831EEA3DB9716638D35
26,189,357 UART: [art] PUB.Y = C1935340401BBB8E68FDFEE2EBC41187F89E0B758902A9AD9689B2B57CF33C06339501D2CAD22A9C11B9D16ED959327F
26,196,633 UART: [art] SIG.R = 73A6D4E87ED8A187398A03EBDB50BD825C4414EF298AE13EDE1F7536422D3D90BA8001210D1A7A5DD7FE08280FACAD84
26,204,030 UART: [art] SIG.S = CF8940956D9F725FFFA588FB1743484EB782E4A21E76CB86411787257993051F24D70D6F4FB25E0484EA3A5567FB3619
27,183,240 UART: Caliptra RT
27,183,953 UART: [state] CFI Enabled
27,347,407 UART: [rt] RT listening for mailbox commands...
27,497,419 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,527,535 UART: [rt]cmd =0x4c444556, len=4
27,538,495 >>> mbox cmd response data (687 bytes)
27,684,217 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,714,376 UART: [rt]cmd =0x43455246, len=4
27,727,094 >>> mbox cmd response data (887 bytes)
27,870,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,900,269 UART: [rt]cmd =0x43455252, len=4
27,911,735 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
7,685,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,837,640 >>> mbox cmd response: success
20,132,543 UART:
20,132,935 UART: Running Caliptra FMC ...
20,134,168 UART:
20,134,341 UART: [state] CFI Enabled
20,199,479 UART: [fht] FMC Alias Private Key: 7
21,963,349 UART: [art] Extend RT PCRs Done
21,964,582 UART: [art] Lock RT PCRs Done
21,966,317 UART: [art] Populate DV Done
21,971,894 UART: [fht] FMC Alias Private Key: 7
21,973,438 UART: [art] Derive CDI
21,974,252 UART: [art] Store in in slot 0x4
22,031,686 UART: [art] Derive Key Pair
22,032,736 UART: [art] Store priv key in slot 0x5
24,494,747 UART: [art] Derive Key Pair - Done
24,507,817 UART: [art] Signing Cert with AUTHO
24,509,129 UART: RITY.KEYID = 7
26,220,434 UART: [art] Erasing AUTHORITY.KEYID = 7
26,221,943 UART: [art] PUB.X = 59B11E5B0B56E503E9294168D0B84E3604BD4EEB911F09C19DE05978BC82DC5FD0AB71BB514622E38A0767A85A277028
26,229,211 UART: [art] PUB.Y = 2D378018B36C50CC48E2166956CB7A0FABE3816F69FBDB7A2F12DACB101907A12D70699F5D296285ED473D8884DFD8E9
26,236,432 UART: [art] SIG.R = 13094A12C72D9646F9A8729745A5D969738D52FBDD4A87F1793A786211EC7CB6DE2B98D0F456A087F5CC475D02C43BED
26,244,033 UART: [art] SIG.S = CF3492E2B21769FF4C71B6B060BC08155C3A4451B6729C3C9771C57EE4BDFFE75A1CF96B4B277ECA9EF2FEF59814820D
27,223,032 UART: Caliptra RT
27,223,745 UART: [state] CFI Enabled
27,388,762 UART: [rt] RT listening for mailbox commands...
27,538,603 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,568,610 UART: [rt]cmd =0x4c444556, len=4
27,579,580 >>> mbox cmd response data (687 bytes)
27,725,049 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,754,998 UART: [rt]cmd =0x43455246, len=4
27,767,582 >>> mbox cmd response data (887 bytes)
27,910,737 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,940,833 UART: [rt]cmd =0x43455252, len=4
27,952,469 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
7,665,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,789,246 >>> mbox cmd response: success
20,075,743 UART:
20,076,122 UART: Running Caliptra FMC ...
20,077,324 UART:
20,077,505 UART: [state] CFI Enabled
20,139,663 UART: [fht] FMC Alias Private Key: 7
21,903,823 UART: [art] Extend RT PCRs Done
21,905,046 UART: [art] Lock RT PCRs Done
21,907,217 UART: [art] Populate DV Done
21,912,856 UART: [fht] FMC Alias Private Key: 7
21,914,389 UART: [art] Derive CDI
21,915,140 UART: [art] Store in in slot 0x4
21,972,400 UART: [art] Derive Key Pair
21,973,396 UART: [art] Store priv key in slot 0x5
24,436,074 UART: [art] Derive Key Pair - Done
24,448,979 UART: [art] Signing Cert with AUTHO
24,450,285 UART: RITY.KEYID = 7
26,162,585 UART: [art] Erasing AUTHORITY.KEYID = 7
26,164,095 UART: [art] PUB.X = 03FD3670BE18843EA4AAA2009AF9A7C9AE965CF3C620F5373F5553C6E46999D4564A1EF1DB94EC0C81105F8C543FFDF7
26,171,353 UART: [art] PUB.Y = 09D38B4C3E39F83DF7FB77A1934CFFCA65792DF0B3D9082D93DBEBDAACC0680DED74126CD146858B64A34F8DBF673592
26,178,641 UART: [art] SIG.R = 0A52CD1EDE9040608718C558615F582D476DF06CE10EC63F3F164F3DB9602CA0695BB3E9F63D59E2495F4CF03281301A
26,186,036 UART: [art] SIG.S = 7DF71A798E724D906FEAFFE5C32F0A70E03ED9440732BF41C32D146213F654529F65C80450E95FBD0EF5CFFAC2997185
27,164,680 UART: Caliptra RT
27,165,374 UART: [state] CFI Enabled
27,330,811 UART: [rt] RT listening for mailbox commands...
27,480,817 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,510,774 UART: [rt]cmd =0x4c444556, len=4
27,521,659 >>> mbox cmd response data (687 bytes)
27,667,213 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,697,248 UART: [rt]cmd =0x43455246, len=4
27,709,948 >>> mbox cmd response data (887 bytes)
27,853,048 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,882,925 UART: [rt]cmd =0x43455252, len=4
27,894,190 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
7,690,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,837,115 >>> mbox cmd response: success
20,118,215 UART:
20,118,601 UART: Running Caliptra FMC ...
20,119,734 UART:
20,119,896 UART: [state] CFI Enabled
20,183,882 UART: [fht] FMC Alias Private Key: 7
21,947,737 UART: [art] Extend RT PCRs Done
21,948,973 UART: [art] Lock RT PCRs Done
21,950,436 UART: [art] Populate DV Done
21,956,139 UART: [fht] FMC Alias Private Key: 7
21,957,799 UART: [art] Derive CDI
21,958,618 UART: [art] Store in in slot 0x4
22,016,047 UART: [art] Derive Key Pair
22,017,100 UART: [art] Store priv key in slot 0x5
24,480,181 UART: [art] Derive Key Pair - Done
24,492,969 UART: [art] Signing Cert with AUTHO
24,494,270 UART: RITY.KEYID = 7
26,205,258 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,775 UART: [art] PUB.X = BA16C493B6C4D36F4EBB256AF162472EC6DEA57898F043159A257688A127D0378D7CC94230CF5F81C4DCA0CD25A921C8
26,214,020 UART: [art] PUB.Y = 7A2F4E6BB7A9B8DEED029710C372CACB77B918A2EFF210FE4639E329BC5DF0DB9BE040BE7359F5FCB68802375F3CC41B
26,221,302 UART: [art] SIG.R = 350C492586DB2FB98199AEE1C13D64C264371F548AC4828B6E4AEBF6CAA9EC10485ABEE787AACEF8588062E5376F07EA
26,228,755 UART: [art] SIG.S = D156DC45AD84B011B5DA270C1C177A8EEC2A007AA9F65DAC52AD5FA876DED1B7760DCDA18D3EBCF705AF51C63D9F77ED
27,207,638 UART: Caliptra RT
27,208,358 UART: [state] CFI Enabled
27,372,884 UART: [rt] RT listening for mailbox commands...
27,522,941 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,065 UART: [rt]cmd =0x4c444556, len=4
27,564,279 >>> mbox cmd response data (687 bytes)
27,709,678 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,739,394 UART: [rt]cmd =0x43455246, len=4
27,752,145 >>> mbox cmd response data (887 bytes)
27,895,479 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,925,408 UART: [rt]cmd =0x43455252, len=4
27,936,859 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.56s
Truncated 7343978 bytes from beginning
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
8,271,029 UART: [idev] CSR uploaded
8,288,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,431,798 UART: [idev] --
8,432,433 UART: [ldev] ++
8,432,926 UART: [ldev] CDI.KEYID = 6
8,433,829 UART: [ldev] SUBJECT.KEYID = 5
8,434,909 UART: [ldev] AUTHORITY.KEYID = 7
8,436,098 UART: [ldev] FE.KEYID = 1
8,436,945 UART: [ldev] Erasing FE.KEYID = 1
10,779,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,529,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,545,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,567,509 UART: [ldev] --
12,571,360 UART: [fwproc] Wait for Commands...
12,573,691 UART: [fwproc] Recv command 0x46574c44
12,575,786 UART: [fwproc] Recv'd Img size: 114084 bytes
15,979,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,113,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,431,764 >>> mbox cmd response: success
16,435,944 UART: [afmc] ++
16,436,526 UART: [afmc] CDI.KEYID = 6
16,437,409 UART: [afmc] SUBJECT.KEYID = 7
16,438,616 UART: [afmc] AUTHORITY.KEYID = 5
18,938,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,661,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,663,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,679,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,695,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,710,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,733,490 UART: [afmc] --
20,737,891 UART: [cold-reset] --
20,741,959 UART: [state] Locking Datavault
20,746,822 UART: [state] Locking PCR0, PCR1 and PCR31
20,748,464 UART: [state] Locking ICCM
20,750,079 UART: [exit] Launching FMC @ 0x40000130
20,758,466 UART:
20,758,708 UART: Running Caliptra FMC ...
20,759,804 UART:
20,759,959 UART: [state] CFI Enabled
20,768,215 UART: [fht] FMC Alias Private Key: 7
22,524,921 UART: [art] Extend RT PCRs Done
22,526,130 UART: [art] Lock RT PCRs Done
22,527,940 UART: [art] Populate DV Done
22,533,237 UART: [fht] FMC Alias Private Key: 7
22,534,826 UART: [art] Derive CDI
22,535,589 UART: [art] Store in in slot 0x4
22,577,748 UART: [art] Derive Key Pair
22,578,737 UART: [art] Store priv key in slot 0x5
25,005,113 UART: [art] Derive Key Pair - Done
25,017,944 UART: [art] Signing Cert with AUTHO
25,019,241 UART: RITY.KEYID = 7
26,724,654 UART: [art] Erasing AUTHORITY.KEYID = 7
26,726,151 UART: [art] PUB.X = 24EFBF493B1D57DFED761B851B801B6CF5428BD42995295D0E1983BEA8DD5B3C6C8570038A791FC67206BCB3149E6DEE
26,733,445 UART: [art] PUB.Y = C3168C7560996098397C1D3DEE93F557B2174F4E50998B508293F744608635018FB64608A675187C2155ECE84446CD4C
26,740,633 UART: [art] SIG.R = 117A63524302AD4F4867CAD57ACAED0B8CA098FEAFCD306F722E1A28FB2F2C7EF9DD093F50617F30B32AFA4522999524
26,748,039 UART: [art] SIG.S = 048718983D4D1BF4022D6D385BCB8D87C45510B02A755600CB7A61B70AF9CE7911CDCAC2CCDC4666DFE3D192F8D4B11A
27,727,176 UART: Caliptra RT
27,727,871 UART: [state] CFI Enabled
27,844,545 UART: [rt] RT listening for mailbox commands...
27,995,634 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,025,651 UART: [rt]cmd =0x4c444556, len=4
28,036,701 >>> mbox cmd response data (687 bytes)
28,182,174 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,212,248 UART: [rt]cmd =0x43455246, len=4
28,224,776 >>> mbox cmd response data (887 bytes)
28,367,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,397,933 UART: [rt]cmd =0x43455252, len=4
28,409,206 >>> mbox cmd response data (782 bytes)
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,424 UART:
192,807 UART: Running Caliptra ROM ...
193,974 UART:
603,547 UART: [state] CFI Enabled
619,746 UART: [state] LifecycleState = Unprovisioned
621,621 UART: [state] DebugLocked = No
623,399 UART: [state] WD Timer not started. Device not locked for debugging
627,403 UART: [kat] SHA2-256
806,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,111 UART: [kat] ++
818,553 UART: [kat] sha1
829,911 UART: [kat] SHA2-256
832,897 UART: [kat] SHA2-384
839,795 UART: [kat] SHA2-512-ACC
842,723 UART: [kat] ECC-384
3,282,345 UART: [kat] HMAC-384Kdf
3,294,135 UART: [kat] LMS
3,823,655 UART: [kat] --
3,828,248 UART: [cold-reset] ++
3,829,535 UART: [fht] FHT @ 0x50003400
3,840,668 UART: [idev] ++
3,841,225 UART: [idev] CDI.KEYID = 6
3,842,131 UART: [idev] SUBJECT.KEYID = 7
3,843,358 UART: [idev] UDS.KEYID = 0
3,859,010 UART: [idev] Erasing UDS.KEYID = 0
6,314,091 UART: [idev] Sha1 KeyId Algorithm
6,334,839 UART: [idev] CSR upload begun
6,339,559 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,056,191 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,072,237 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,088,189 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,104,019 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,127,864 UART: [idev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
8,272,499 UART: [idev] CSR uploaded
8,289,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,433,219 UART: [idev] --
8,433,843 UART: [ldev] ++
8,434,343 UART: [ldev] CDI.KEYID = 6
8,435,305 UART: [ldev] SUBJECT.KEYID = 5
8,436,419 UART: [ldev] AUTHORITY.KEYID = 7
8,437,511 UART: [ldev] FE.KEYID = 1
8,438,374 UART: [ldev] Erasing FE.KEYID = 1
10,781,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,530,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,545,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,565,514 UART: [ldev] --
12,569,314 UART: [fwproc] Wait for Commands...
12,571,136 UART: [fwproc] Recv command 0x46574c44
12,573,227 UART: [fwproc] Recv'd Img size: 114084 bytes
15,967,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,042,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,427,560 >>> mbox cmd response: success
16,432,321 UART: [afmc] ++
16,432,942 UART: [afmc] CDI.KEYID = 6
16,433,856 UART: [afmc] SUBJECT.KEYID = 7
16,435,019 UART: [afmc] AUTHORITY.KEYID = 5
18,933,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,656,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,658,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,673,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,690,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,705,850 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,728,523 UART: [afmc] --
20,732,916 UART: [cold-reset] --
20,734,833 UART: [state] Locking Datavault
20,741,153 UART: [state] Locking PCR0, PCR1 and PCR31
20,742,790 UART: [state] Locking ICCM
20,745,156 UART: [exit] Launching FMC @ 0x40000130
20,753,572 UART:
20,753,850 UART: Running Caliptra FMC ...
20,754,957 UART:
20,755,116 UART: [state] CFI Enabled
20,763,108 UART: [fht] FMC Alias Private Key: 7
22,519,502 UART: [art] Extend RT PCRs Done
22,520,722 UART: [art] Lock RT PCRs Done
22,522,286 UART: [art] Populate DV Done
22,527,636 UART: [fht] FMC Alias Private Key: 7
22,529,275 UART: [art] Derive CDI
22,530,085 UART: [art] Store in in slot 0x4
22,572,793 UART: [art] Derive Key Pair
22,573,786 UART: [art] Store priv key in slot 0x5
25,000,371 UART: [art] Derive Key Pair - Done
25,013,492 UART: [art] Signing Cert with AUTHO
25,014,802 UART: RITY.KEYID = 7
26,720,693 UART: [art] Erasing AUTHORITY.KEYID = 7
26,722,201 UART: [art] PUB.X = 7443D82F5C61A7E5CF6ACA0B7C267142C5CC4BCEC0EBC3768FE01D194D293DE6CB1CC7F291E0B6AE986C184509F56789
26,729,513 UART: [art] PUB.Y = 7F3A6A335DBCB2916FB1159EC465B3E56CE509B1281AD9355641F388800960EBF63B88078D97E7DF0B09DF0863069056
26,736,709 UART: [art] SIG.R = 1BD5BFCEF453468C35649388FDD6F479ABD0F620FC7F2E8982F163BBE2003E119F1EE3314E34133C4478DB41CDAC01CE
26,744,105 UART: [art] SIG.S = 740EBB2FC5BE1731A0834155188121CCC6A331BC87774DD77F36A24648C04C96006D208FD7FB96198E273DBA24B04DFA
27,722,478 UART: Caliptra RT
27,723,162 UART: [state] CFI Enabled
27,841,457 UART: [rt] RT listening for mailbox commands...
27,992,631 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,022,807 UART: [rt]cmd =0x4c444556, len=4
28,033,897 >>> mbox cmd response data (687 bytes)
28,179,000 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,208,836 UART: [rt]cmd =0x43455246, len=4
28,221,422 >>> mbox cmd response data (887 bytes)
28,365,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,395,446 UART: [rt]cmd =0x43455252, len=4
28,406,774 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.07s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
7,938,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,007,213 >>> mbox cmd response: success
20,261,778 UART:
20,262,170 UART: Running Caliptra FMC ...
20,263,369 UART:
20,263,540 UART: [state] CFI Enabled
20,271,322 UART: [fht] FMC Alias Private Key: 7
22,028,248 UART: [art] Extend RT PCRs Done
22,029,463 UART: [art] Lock RT PCRs Done
22,030,716 UART: [art] Populate DV Done
22,036,125 UART: [fht] FMC Alias Private Key: 7
22,037,664 UART: [art] Derive CDI
22,038,478 UART: [art] Store in in slot 0x4
22,081,417 UART: [art] Derive Key Pair
22,082,458 UART: [art] Store priv key in slot 0x5
24,509,326 UART: [art] Derive Key Pair - Done
24,522,274 UART: [art] Signing Cert with AUTHO
24,523,630 UART: RITY.KEYID = 7
26,229,119 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,599 UART: [art] PUB.X = 6BAA7DDF46FEE502DB22923D35859F1B9D7E29D725A2CF670E3980BFD0BD891FBAFDCF4F013461F0A137FD7880F1450C
26,237,928 UART: [art] PUB.Y = 10F881CA8CB5AF7E2615E88D1EA8D30413F03A97E8B031154D22BA021A9DB7116869C5DEFD3277B88972169F93BA5D09
26,245,180 UART: [art] SIG.R = 950DEE6F7A168ADF53509E2CFA39E368E22F53991028FA387F921A46AFFBF4EC637A92855E15B8468543CEF521004434
26,252,542 UART: [art] SIG.S = F692F2B3177A87A981E60BBC16D47F7A8E8E10A70DB35053A46D7FF6593674788B2FCDE2E83620563F267457E7E8D6D2
27,231,546 UART: Caliptra RT
27,232,262 UART: [state] CFI Enabled
27,348,755 UART: [rt] RT listening for mailbox commands...
27,498,454 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,528,510 UART: [rt]cmd =0x4c444556, len=4
27,539,639 >>> mbox cmd response data (687 bytes)
27,685,092 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,715,148 UART: [rt]cmd =0x43455246, len=4
27,727,808 >>> mbox cmd response data (887 bytes)
27,871,268 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,901,228 UART: [rt]cmd =0x43455252, len=4
27,912,478 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
7,942,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,033,188 >>> mbox cmd response: success
20,284,845 UART:
20,285,221 UART: Running Caliptra FMC ...
20,286,326 UART:
20,286,481 UART: [state] CFI Enabled
20,294,320 UART: [fht] FMC Alias Private Key: 7
22,050,685 UART: [art] Extend RT PCRs Done
22,051,920 UART: [art] Lock RT PCRs Done
22,053,811 UART: [art] Populate DV Done
22,059,236 UART: [fht] FMC Alias Private Key: 7
22,060,763 UART: [art] Derive CDI
22,061,561 UART: [art] Store in in slot 0x4
22,103,891 UART: [art] Derive Key Pair
22,104,899 UART: [art] Store priv key in slot 0x5
24,532,496 UART: [art] Derive Key Pair - Done
24,545,430 UART: [art] Signing Cert with AUTHO
24,546,750 UART: RITY.KEYID = 7
26,252,897 UART: [art] Erasing AUTHORITY.KEYID = 7
26,254,408 UART: [art] PUB.X = E4E046F29C566C925C2F9D61E17932F90596200A2387C370DB51798921C02EACAAC69CA4F1C668E8D2ADD0F0B023E6F8
26,261,632 UART: [art] PUB.Y = 024B271B6E86A9917467319A4DEE093C9FE09F81BA002AFE498DF8EB6CF0B8F9E3613328A55D3285CB91A57715EE9F17
26,268,866 UART: [art] SIG.R = B8489EF476CA0C3B86677281D2F2495536EEEE9A6E1560CBD9A1C9F888B1C69764CBE0D913A4DE3082D59D7D93D6BCC6
26,276,289 UART: [art] SIG.S = 0B948340A1DF39EDA54B58CFD3472F3C76D7F6FC42D2B516B7C7F4892173AC87518E669BC5459BFDFC36B3756572E543
27,254,892 UART: Caliptra RT
27,255,586 UART: [state] CFI Enabled
27,371,677 UART: [rt] RT listening for mailbox commands...
27,521,677 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,551,599 UART: [rt]cmd =0x4c444556, len=4
27,562,673 >>> mbox cmd response data (687 bytes)
27,708,109 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,737,917 UART: [rt]cmd =0x43455246, len=4
27,750,614 >>> mbox cmd response data (887 bytes)
27,893,883 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,923,909 UART: [rt]cmd =0x43455252, len=4
27,935,264 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
7,942,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,015,762 >>> mbox cmd response: success
20,265,532 UART:
20,265,918 UART: Running Caliptra FMC ...
20,267,038 UART:
20,267,211 UART: [state] CFI Enabled
20,275,058 UART: [fht] FMC Alias Private Key: 7
22,032,255 UART: [art] Extend RT PCRs Done
22,033,472 UART: [art] Lock RT PCRs Done
22,035,043 UART: [art] Populate DV Done
22,040,399 UART: [fht] FMC Alias Private Key: 7
22,042,100 UART: [art] Derive CDI
22,042,921 UART: [art] Store in in slot 0x4
22,085,676 UART: [art] Derive Key Pair
22,086,743 UART: [art] Store priv key in slot 0x5
24,513,386 UART: [art] Derive Key Pair - Done
24,526,216 UART: [art] Signing Cert with AUTHO
24,527,705 UART: RITY.KEYID = 7
26,232,901 UART: [art] Erasing AUTHORITY.KEYID = 7
26,234,392 UART: [art] PUB.X = 21C79DEF30E531FA078CC1AB4CE7E697416A1480FB8C31A21E5C88D37A5C2795EA362E5D0D166236142D7C1C46BE967F
26,241,667 UART: [art] PUB.Y = 9034847B2C2ACE77C0409EBD31109F9CCC3D61B4AAFFF0B1B4D4B400A51AF6110A8FBB90AE4313FBD3EB183D32387929
26,248,929 UART: [art] SIG.R = 6B41A4F6F524BA87703976806306A6E5C81083976A3A3ABA77D8731388BDF56624792E23A57A54DC1184EECF9879B1F0
26,256,287 UART: [art] SIG.S = 398B9D80A8A9EA7A800DE99B497BC03A355A0D8198AE0DD4BEB57A71BC82FEC1E354AF18EFE3D0C09E3F4EFFF339A564
27,235,034 UART: Caliptra RT
27,235,729 UART: [state] CFI Enabled
27,353,591 UART: [rt] RT listening for mailbox commands...
27,503,348 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,533,294 UART: [rt]cmd =0x4c444556, len=4
27,544,527 >>> mbox cmd response data (687 bytes)
27,690,103 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,719,878 UART: [rt]cmd =0x43455246, len=4
27,732,362 >>> mbox cmd response data (887 bytes)
27,876,020 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,906,068 UART: [rt]cmd =0x43455252, len=4
27,917,394 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
7,938,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,020,986 >>> mbox cmd response: success
20,271,458 UART:
20,271,829 UART: Running Caliptra FMC ...
20,272,935 UART:
20,273,092 UART: [state] CFI Enabled
20,280,829 UART: [fht] FMC Alias Private Key: 7
22,037,833 UART: [art] Extend RT PCRs Done
22,039,062 UART: [art] Lock RT PCRs Done
22,040,785 UART: [art] Populate DV Done
22,046,137 UART: [fht] FMC Alias Private Key: 7
22,047,626 UART: [art] Derive CDI
22,048,399 UART: [art] Store in in slot 0x4
22,091,330 UART: [art] Derive Key Pair
22,092,383 UART: [art] Store priv key in slot 0x5
24,518,596 UART: [art] Derive Key Pair - Done
24,531,432 UART: [art] Signing Cert with AUTHO
24,532,724 UART: RITY.KEYID = 7
26,238,252 UART: [art] Erasing AUTHORITY.KEYID = 7
26,239,765 UART: [art] PUB.X = 73E0D52131BC96C9E218CE221AB380A8AF32CE8D5E5CCFD32CB44FA414E5541DC0F552B60A970DBB5D674CE37F4AADCD
26,247,035 UART: [art] PUB.Y = 7E7CCED0BBAF2BCD531F4E141249DEE5A3F91929F4BC5AD5A54AC3D608E67EA9BED06C42A3E4498118B2787F3F09DB8D
26,254,351 UART: [art] SIG.R = 96CA9B50D9CD5298FFE79615F550E0C9E0A66E3098DFEE7FE4552998C4A249B84FB5E57AA9047ECFB45603B0A2D5CC9F
26,261,706 UART: [art] SIG.S = 6EE2B3171A5EECD479AA64F7ABB6DEA72911EBFD65F1BE8C31ABC6DD03D5D2F986C61E8CB25CACE68FD00CE04275423A
27,240,339 UART: Caliptra RT
27,241,048 UART: [state] CFI Enabled
27,357,551 UART: [rt] RT listening for mailbox commands...
27,507,415 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,537,319 UART: [rt]cmd =0x4c444556, len=4
27,548,335 >>> mbox cmd response data (687 bytes)
27,693,647 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,723,647 UART: [rt]cmd =0x43455246, len=4
27,736,473 >>> mbox cmd response data (887 bytes)
27,880,039 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,910,116 UART: [rt]cmd =0x43455252, len=4
27,921,567 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
7,949,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,025,214 >>> mbox cmd response: success
20,274,289 UART:
20,274,669 UART: Running Caliptra FMC ...
20,275,860 UART:
20,276,032 UART: [state] CFI Enabled
20,284,091 UART: [fht] FMC Alias Private Key: 7
22,041,128 UART: [art] Extend RT PCRs Done
22,042,348 UART: [art] Lock RT PCRs Done
22,044,030 UART: [art] Populate DV Done
22,049,324 UART: [fht] FMC Alias Private Key: 7
22,050,806 UART: [art] Derive CDI
22,051,572 UART: [art] Store in in slot 0x4
22,094,245 UART: [art] Derive Key Pair
22,095,290 UART: [art] Store priv key in slot 0x5
24,521,894 UART: [art] Derive Key Pair - Done
24,535,216 UART: [art] Signing Cert with AUTHO
24,536,522 UART: RITY.KEYID = 7
26,242,375 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,879 UART: [art] PUB.X = F0950C12BB09A2C97A511481CB48426C7A979B71650D34FB6910A76105855ABF51E6041C496DB257261C00888E8E7C89
26,251,103 UART: [art] PUB.Y = 1B2D1F18CC131B0C874F5CEE1A8A1E1AEBAFCE8D31C40DD8A60004C09D5A593A9B19A9868628659CB4FB91F08004360E
26,258,367 UART: [art] SIG.R = 7B9CF4F60A3808BA19477A989961130A5F2ECB7914B078E63A2313B7E39D0F4AACE94CF67DFB16715F8DB70C00CFDD27
26,265,719 UART: [art] SIG.S = D004800CDA63CF7C74A7E08849C53075FE485B6C9D02685F64F7383159FCB968082B1716558F569E61E79EDAD55D38B8
27,244,783 UART: Caliptra RT
27,245,469 UART: [state] CFI Enabled
27,362,800 UART: [rt] RT listening for mailbox commands...
27,512,426 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,542,485 UART: [rt]cmd =0x4c444556, len=4
27,553,624 >>> mbox cmd response data (687 bytes)
27,698,955 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,728,836 UART: [rt]cmd =0x43455246, len=4
27,741,504 >>> mbox cmd response data (887 bytes)
27,885,079 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,915,040 UART: [rt]cmd =0x43455252, len=4
27,926,453 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.16s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,810 UART: [idev] CSR uploaded
1,299,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,024 UART: [idev] --
1,300,965 UART: [ldev] ++
1,301,133 UART: [ldev] CDI.KEYID = 6
1,301,497 UART: [ldev] SUBJECT.KEYID = 5
1,301,924 UART: [ldev] AUTHORITY.KEYID = 7
1,302,387 UART: [ldev] FE.KEYID = 1
1,307,317 UART: [ldev] Erasing FE.KEYID = 1
1,334,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,921 UART: [ldev] --
1,373,303 UART: [fwproc] Wait for Commands...
1,374,010 UART: [fwproc] Recv command 0x46574c44
1,374,743 UART: [fwproc] Recv'd Img size: 114084 bytes
2,668,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,695,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,860,554 >>> mbox cmd response: success
2,861,735 UART: [afmc] ++
2,861,903 UART: [afmc] CDI.KEYID = 6
2,862,266 UART: [afmc] SUBJECT.KEYID = 7
2,862,692 UART: [afmc] AUTHORITY.KEYID = 5
2,897,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,913,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,914,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,920,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,926,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,931,731 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,939,622 UART: [afmc] --
2,940,622 UART: [cold-reset] --
2,941,476 UART: [state] Locking Datavault
2,942,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,943,533 UART: [state] Locking ICCM
2,944,033 UART: [exit] Launching FMC @ 0x40000130
2,949,362 UART:
2,949,378 UART: Running Caliptra FMC ...
2,949,786 UART:
2,949,840 UART: [state] CFI Enabled
2,960,511 UART: [fht] FMC Alias Private Key: 7
3,068,546 UART: [art] Extend RT PCRs Done
3,068,974 UART: [art] Lock RT PCRs Done
3,070,536 UART: [art] Populate DV Done
3,078,697 UART: [fht] FMC Alias Private Key: 7
3,079,675 UART: [art] Derive CDI
3,079,955 UART: [art] Store in in slot 0x4
3,165,474 UART: [art] Derive Key Pair
3,165,834 UART: [art] Store priv key in slot 0x5
3,179,126 UART: [art] Derive Key Pair - Done
3,193,789 UART: [art] Signing Cert with AUTHO
3,194,269 UART: RITY.KEYID = 7
3,210,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,956 UART: [art] PUB.X = F126128E4BC924286709B50E9D20A3BEC71B45BF73AE549B600693C6F0BA70CC33A7467FD0464791FB9788D591A84571
3,217,715 UART: [art] PUB.Y = 2AFD5F1C1CB986F6EE60BB7941F69D0F468DC1DAB099355D634ECD92E8620638D0528A87D56E3958CA7679965A476BE6
3,224,665 UART: [art] SIG.R = 9865C00A2B549DA0D268DCBFDB4D46B442A9ECF510582574DAA5ECB147EDD18A2211BEB8DF6E86B6446B82E337808D23
3,231,446 UART: [art] SIG.S = 4F033188E7ED9EEBC879B9452B4B5528B8EFAD7C04D418BEA8F7FC162E10F1E97359C7CF3263C2B09018FF3AFEF5AA0C
3,255,016 UART: Caliptra RT
3,255,269 UART: [state] CFI Enabled
3,363,664 UART: [rt] RT listening for mailbox commands...
3,364,334 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,170 UART: [rt]cmd =0x4c444556, len=4
3,404,703 >>> mbox cmd response data (687 bytes)
3,404,704 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,273 UART: [rt]cmd =0x43455246, len=4
3,446,268 >>> mbox cmd response data (887 bytes)
3,446,269 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,792 UART: [rt]cmd =0x43455252, len=4
3,486,630 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,305 UART: [cold-reset] ++
1,169,669 UART: [fht] FHT @ 0x50003400
1,172,105 UART: [idev] ++
1,172,273 UART: [idev] CDI.KEYID = 6
1,172,634 UART: [idev] SUBJECT.KEYID = 7
1,173,059 UART: [idev] UDS.KEYID = 0
1,180,677 UART: [idev] Erasing UDS.KEYID = 0
1,197,073 UART: [idev] Sha1 KeyId Algorithm
1,205,281 UART: [idev] CSR upload begun
1,207,060 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,217,889 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,597 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,482 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,188 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,617 UART: [idev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
1,295,114 UART: [idev] CSR uploaded
1,298,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,298,328 UART: [idev] --
1,299,515 UART: [ldev] ++
1,299,683 UART: [ldev] CDI.KEYID = 6
1,300,047 UART: [ldev] SUBJECT.KEYID = 5
1,300,474 UART: [ldev] AUTHORITY.KEYID = 7
1,300,937 UART: [ldev] FE.KEYID = 1
1,306,079 UART: [ldev] Erasing FE.KEYID = 1
1,332,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,077 UART: [ldev] --
1,371,517 UART: [fwproc] Wait for Commands...
1,372,190 UART: [fwproc] Recv command 0x46574c44
1,372,923 UART: [fwproc] Recv'd Img size: 114084 bytes
2,667,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,695,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,724,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,860,054 >>> mbox cmd response: success
2,861,215 UART: [afmc] ++
2,861,383 UART: [afmc] CDI.KEYID = 6
2,861,746 UART: [afmc] SUBJECT.KEYID = 7
2,862,172 UART: [afmc] AUTHORITY.KEYID = 5
2,897,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,914,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,920,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,926,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,939,952 UART: [afmc] --
2,940,880 UART: [cold-reset] --
2,941,740 UART: [state] Locking Datavault
2,942,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,943,513 UART: [state] Locking ICCM
2,944,165 UART: [exit] Launching FMC @ 0x40000130
2,949,494 UART:
2,949,510 UART: Running Caliptra FMC ...
2,949,918 UART:
2,949,972 UART: [state] CFI Enabled
2,960,313 UART: [fht] FMC Alias Private Key: 7
3,067,904 UART: [art] Extend RT PCRs Done
3,068,332 UART: [art] Lock RT PCRs Done
3,069,722 UART: [art] Populate DV Done
3,078,159 UART: [fht] FMC Alias Private Key: 7
3,079,255 UART: [art] Derive CDI
3,079,535 UART: [art] Store in in slot 0x4
3,164,900 UART: [art] Derive Key Pair
3,165,260 UART: [art] Store priv key in slot 0x5
3,178,482 UART: [art] Derive Key Pair - Done
3,193,225 UART: [art] Signing Cert with AUTHO
3,193,705 UART: RITY.KEYID = 7
3,209,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,209,828 UART: [art] PUB.X = 139FFD6209948089403899EA881634E60D4E8C6CF82E230181614104A80040E4DBDEDEAC6AE469CB1B446050711B1412
3,216,558 UART: [art] PUB.Y = 5FA96B98021603D657BF59DC6B9786EC11BC5717D12D0650E1FCEEE688417C45C3DEF3C06393FB87A3A5ABDECA42BB2C
3,223,517 UART: [art] SIG.R = 00BA86BE2E19327D50041937993BEC6A3DA08BBC8CC1F66931EEC171AC9156619C1E5A933F5D3656F0C8A44CAF594601
3,230,265 UART: [art] SIG.S = FFD24B198E6F78390DB998526DAA5EBDA6F84724421F4ACF6A36ACEF657B4F0AC4519F51B26E9CDCB7A73BC6518EC732
3,254,116 UART: Caliptra RT
3,254,369 UART: [state] CFI Enabled
3,362,121 UART: [rt] RT listening for mailbox commands...
3,362,791 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,605 UART: [rt]cmd =0x4c444556, len=4
3,403,022 >>> mbox cmd response data (687 bytes)
3,403,023 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,536 UART: [rt]cmd =0x43455246, len=4
3,444,415 >>> mbox cmd response data (887 bytes)
3,444,416 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,651 UART: [rt]cmd =0x43455252, len=4
3,484,578 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 927.78s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,818,357 UART: [art] Lock RT PCRs Done
2,819,949 UART: [art] Populate DV Done
2,828,032 UART: [fht] FMC Alias Private Key: 7
2,829,136 UART: [art] Derive CDI
2,829,416 UART: [art] Store in in slot 0x4
2,914,707 UART: [art] Derive Key Pair
2,915,067 UART: [art] Store priv key in slot 0x5
2,928,545 UART: [art] Derive Key Pair - Done
2,943,135 UART: [art] Signing Cert with AUTHO
2,943,615 UART: RITY.KEYID = 7
2,959,081 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,846 UART: [art] PUB.X = 445287B65680918B5FC5FF1DA48BA4744C19964657507A5AF29DC7511187AF8751627BF211B84F5609E6C001C0C68120
2,966,600 UART: [art] PUB.Y = 81A6B6C348C83B062EEF17CFF8AB9B3D7E67ABE199736C99D2F4BE4210612D55439DE8BA7A1D24B2F8CCB82DF9C15683
2,973,563 UART: [art] SIG.R = 878671EF91101C585DF8BE5D008F2CC3FA54F52814A171774AE15DD701EFCF40E23D4837292C5EF48099BC97686331F5
2,980,308 UART: [art] SIG.S = 1FC16889FA649E93AD756A2561FB6446CBE081672CB004FF458E31CD83664F4FF2C49144CB2A7696D60030F226F65094
3,004,330 UART: Caliptra RT
3,004,583 UART: [state] CFI Enabled
3,112,600 UART: [rt] RT listening for mailbox commands...
3,113,270 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,406 UART: [rt]cmd =0x4c444556, len=4
3,153,813 >>> mbox cmd response data (687 bytes)
3,153,814 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,237 UART: [rt]cmd =0x43455246, len=4
3,195,496 >>> mbox cmd response data (887 bytes)
3,195,497 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,916 UART: [rt]cmd =0x43455252, len=4
3,235,484 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,636,983 >>> mbox cmd response: success
2,699,405 UART:
2,699,421 UART: Running Caliptra FMC ...
2,699,829 UART:
2,699,883 UART: [state] CFI Enabled
2,710,074 UART: [fht] FMC Alias Private Key: 7
2,818,479 UART: [art] Extend RT PCRs Done
2,818,907 UART: [art] Lock RT PCRs Done
2,820,339 UART: [art] Populate DV Done
2,828,616 UART: [fht] FMC Alias Private Key: 7
2,829,736 UART: [art] Derive CDI
2,830,016 UART: [art] Store in in slot 0x4
2,915,743 UART: [art] Derive Key Pair
2,916,103 UART: [art] Store priv key in slot 0x5
2,929,249 UART: [art] Derive Key Pair - Done
2,943,753 UART: [art] Signing Cert with AUTHO
2,944,233 UART: RITY.KEYID = 7
2,958,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,706 UART: [art] PUB.X = 5545DB789EF7C06CC0FDB5AF684E3F27A76EAD102D204910EF68873728EDB79E98F435A188A3D72D133C31604985FA31
2,966,480 UART: [art] PUB.Y = 9D3987E702DCC5ACCDB930BCF27A91315DFEF58942ECCBD39E2FE87345DF98A2637B9CF7750FC245CB264988D1DC8D1E
2,973,444 UART: [art] SIG.R = C01385E7B8FC117B21000CE7E4F543C777957771254D66BF83E8DAFC675724ABD2DED2BF46AF9A76BA70DE521E859C20
2,980,199 UART: [art] SIG.S = 4B4ACBB11468F39C749482FEC6361D8C50A677283B1FA14B9495E3415C5C0D7CF792E0CA4532E195461BC3BA73EF3CC4
3,003,645 UART: Caliptra RT
3,003,898 UART: [state] CFI Enabled
3,111,045 UART: [rt] RT listening for mailbox commands...
3,111,715 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,351 UART: [rt]cmd =0x4c444556, len=4
3,151,866 >>> mbox cmd response data (687 bytes)
3,151,867 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,134 UART: [rt]cmd =0x43455246, len=4
3,192,977 >>> mbox cmd response data (887 bytes)
3,192,978 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,339 UART: [rt]cmd =0x43455252, len=4
3,232,955 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,147 >>> mbox cmd response: success
2,698,273 UART:
2,698,289 UART: Running Caliptra FMC ...
2,698,697 UART:
2,698,751 UART: [state] CFI Enabled
2,709,080 UART: [fht] FMC Alias Private Key: 7
2,817,629 UART: [art] Extend RT PCRs Done
2,818,057 UART: [art] Lock RT PCRs Done
2,819,587 UART: [art] Populate DV Done
2,827,720 UART: [fht] FMC Alias Private Key: 7
2,828,698 UART: [art] Derive CDI
2,828,978 UART: [art] Store in in slot 0x4
2,914,851 UART: [art] Derive Key Pair
2,915,211 UART: [art] Store priv key in slot 0x5
2,928,467 UART: [art] Derive Key Pair - Done
2,943,344 UART: [art] Signing Cert with AUTHO
2,943,824 UART: RITY.KEYID = 7
2,959,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,945 UART: [art] PUB.X = 72125E892A6DEFE9C0C61A45A6D898EB53A8D14D3B8436A5796347D92DA4D90D0FF5CBE815410F7B43BAC9E1303CC925
2,966,716 UART: [art] PUB.Y = 783BFC17F5B97DBC49C280D2B7D334B569C7C979AA407F8C70CE522A680FEE59D9CF9B75F4D0A37D4A2B740D4D95B5C4
2,973,676 UART: [art] SIG.R = 1F191070D9A1984B9933D060C1CADF3D8A995FAFB212828F24CBB8A3229685A0736657D3E913654671F542585EB12241
2,980,438 UART: [art] SIG.S = ACA97896DCD786F76E3672380B0452557629EADDC06446757B8D8E7C95C79B665FC1BC3A4D708787588188D008E7B143
3,004,058 UART: Caliptra RT
3,004,311 UART: [state] CFI Enabled
3,112,544 UART: [rt] RT listening for mailbox commands...
3,113,214 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,830 UART: [rt]cmd =0x4c444556, len=4
3,153,165 >>> mbox cmd response data (687 bytes)
3,153,166 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,451 UART: [rt]cmd =0x43455246, len=4
3,194,566 >>> mbox cmd response data (887 bytes)
3,194,567 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,852 UART: [rt]cmd =0x43455252, len=4
3,234,832 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,647 >>> mbox cmd response: success
2,700,913 UART:
2,700,929 UART: Running Caliptra FMC ...
2,701,337 UART:
2,701,391 UART: [state] CFI Enabled
2,711,570 UART: [fht] FMC Alias Private Key: 7
2,819,155 UART: [art] Extend RT PCRs Done
2,819,583 UART: [art] Lock RT PCRs Done
2,821,221 UART: [art] Populate DV Done
2,829,238 UART: [fht] FMC Alias Private Key: 7
2,830,214 UART: [art] Derive CDI
2,830,494 UART: [art] Store in in slot 0x4
2,916,311 UART: [art] Derive Key Pair
2,916,671 UART: [art] Store priv key in slot 0x5
2,929,581 UART: [art] Derive Key Pair - Done
2,944,384 UART: [art] Signing Cert with AUTHO
2,944,864 UART: RITY.KEYID = 7
2,959,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,399 UART: [art] PUB.X = 64BA5E7860DB74A3E955CA65266C53DA1C058BE37A61F787BD3CC558193307E631A544F4CD067EDD111E424EED81BB66
2,967,168 UART: [art] PUB.Y = 5A63FA38E86A6AF6399604F049D0EF3E982DC71C2E0A1252D9AEA399F116FB66330A5D76F44D9386FCD094E67722B836
2,974,113 UART: [art] SIG.R = 996C03D803944FC21818D24930B3FFD61B6CDD1895315368E1C19A49C2A1295E90378E2259CD2D704B3CDA7E118B491A
2,980,875 UART: [art] SIG.S = D8AC8914D31835C000A9BD0030F53F2428A642EBF3FDD66041003D980ABFAB2F0B10B6B3B3516F4FC434B23BD10F682E
3,004,871 UART: Caliptra RT
3,005,124 UART: [state] CFI Enabled
3,113,342 UART: [rt] RT listening for mailbox commands...
3,114,012 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,876 UART: [rt]cmd =0x4c444556, len=4
3,154,457 >>> mbox cmd response data (687 bytes)
3,154,458 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,917 UART: [rt]cmd =0x43455246, len=4
3,195,964 >>> mbox cmd response data (887 bytes)
3,195,965 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,414 UART: [rt]cmd =0x43455252, len=4
3,235,967 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,969 >>> mbox cmd response: success
2,700,079 UART:
2,700,095 UART: Running Caliptra FMC ...
2,700,503 UART:
2,700,557 UART: [state] CFI Enabled
2,711,158 UART: [fht] FMC Alias Private Key: 7
2,818,561 UART: [art] Extend RT PCRs Done
2,818,989 UART: [art] Lock RT PCRs Done
2,820,411 UART: [art] Populate DV Done
2,828,804 UART: [fht] FMC Alias Private Key: 7
2,829,962 UART: [art] Derive CDI
2,830,242 UART: [art] Store in in slot 0x4
2,916,103 UART: [art] Derive Key Pair
2,916,463 UART: [art] Store priv key in slot 0x5
2,928,793 UART: [art] Derive Key Pair - Done
2,943,212 UART: [art] Signing Cert with AUTHO
2,943,692 UART: RITY.KEYID = 7
2,958,756 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,521 UART: [art] PUB.X = 45E3F2105A05737712D11F7D13F14D437226856FEE36C0F215D539A97603746A479B6D08A913264B89D2F6AF5381132A
2,966,270 UART: [art] PUB.Y = 49F2A5876FACC476C228F08884421BBF0C3C126F061C44FC82637AEDC0EDD2D9C2D4D1135B92AF3956CDE0BA45910D80
2,973,223 UART: [art] SIG.R = A82006086052961CFAEE9EFFEA3CFE4AA44573567FDD463458296D1288EDECBF515DD72B21D07CC619829E1B0882285A
2,979,992 UART: [art] SIG.S = FB9172E5AEC8792ADDDA9A73AFB5A3C88627515844000B6C21A41DC7A9DF4F06E41594C572E43C1A22936651F2258FA4
3,003,995 UART: Caliptra RT
3,004,248 UART: [state] CFI Enabled
3,111,928 UART: [rt] RT listening for mailbox commands...
3,112,598 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,468 UART: [rt]cmd =0x4c444556, len=4
3,152,863 >>> mbox cmd response data (687 bytes)
3,152,864 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,091 UART: [rt]cmd =0x43455246, len=4
3,194,132 >>> mbox cmd response data (887 bytes)
3,194,133 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,414 UART: [rt]cmd =0x43455252, len=4
3,234,061 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 890.99s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,391 UART: [idev] CSR uploaded
1,300,436 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,605 UART: [idev] --
1,301,800 UART: [ldev] ++
1,301,968 UART: [ldev] CDI.KEYID = 6
1,302,332 UART: [ldev] SUBJECT.KEYID = 5
1,302,759 UART: [ldev] AUTHORITY.KEYID = 7
1,303,222 UART: [ldev] FE.KEYID = 1
1,308,550 UART: [ldev] Erasing FE.KEYID = 1
1,335,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,126 UART: [ldev] --
1,374,580 UART: [fwproc] Wait for Commands...
1,375,189 UART: [fwproc] Recv command 0x46574c44
1,375,922 UART: [fwproc] Recv'd Img size: 114084 bytes
2,672,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,864,073 >>> mbox cmd response: success
2,865,192 UART: [afmc] ++
2,865,360 UART: [afmc] CDI.KEYID = 6
2,865,723 UART: [afmc] SUBJECT.KEYID = 7
2,866,149 UART: [afmc] AUTHORITY.KEYID = 5
2,901,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,683 UART: [afmc] --
2,944,671 UART: [cold-reset] --
2,945,455 UART: [state] Locking Datavault
2,946,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,212 UART: [state] Locking ICCM
2,947,682 UART: [exit] Launching FMC @ 0x40000130
2,953,011 UART:
2,953,027 UART: Running Caliptra FMC ...
2,953,435 UART:
2,953,578 UART: [state] CFI Enabled
2,963,887 UART: [fht] FMC Alias Private Key: 7
3,071,594 UART: [art] Extend RT PCRs Done
3,072,022 UART: [art] Lock RT PCRs Done
3,073,710 UART: [art] Populate DV Done
3,081,921 UART: [fht] FMC Alias Private Key: 7
3,083,033 UART: [art] Derive CDI
3,083,313 UART: [art] Store in in slot 0x4
3,169,080 UART: [art] Derive Key Pair
3,169,440 UART: [art] Store priv key in slot 0x5
3,182,578 UART: [art] Derive Key Pair - Done
3,197,391 UART: [art] Signing Cert with AUTHO
3,197,871 UART: RITY.KEYID = 7
3,212,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,712 UART: [art] PUB.X = 7BB94920B8D06D7561FA079848D2CDA63F3D6850B2F378BBA404F2D9A5765916F4B58EC1E5E9A5F5BF95B5318B37A552
3,220,482 UART: [art] PUB.Y = B60F8B007649BB7FCD81DE1DFD9060FF4B691B2B44E0D13DA9BF29656A9582A55D26FA3ED4DC3300B8DC21E87529A300
3,227,377 UART: [art] SIG.R = 27A4907F7F22A51A2FD8A2A5DC052C8102C43933734ECB4E7A0C742F9D918737FB90DA4760546ECC6A1CAA0729FD0F72
3,234,140 UART: [art] SIG.S = FEDBB675F2504F5B40EF75A834B8F27BD9586F4F02A1F2EB124C7B652124C1C0ECFAA20E9FDE824812C35C57002FD7AC
3,257,433 UART: Caliptra RT
3,257,778 UART: [state] CFI Enabled
3,364,945 UART: [rt] RT listening for mailbox commands...
3,365,615 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,161 UART: [rt]cmd =0x4c444556, len=4
3,405,740 >>> mbox cmd response data (687 bytes)
3,405,741 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,126 UART: [rt]cmd =0x43455246, len=4
3,447,263 >>> mbox cmd response data (887 bytes)
3,447,264 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,719 UART: [rt]cmd =0x43455252, len=4
3,487,379 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,119 UART: [kat] SHA2-512-ACC
906,020 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,207,720 UART: [idev] CSR upload begun
1,209,499 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,210 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,918 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,803 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,509 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,938 UART: [idev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
1,297,435 UART: [idev] CSR uploaded
1,300,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,649 UART: [idev] --
1,301,720 UART: [ldev] ++
1,301,888 UART: [ldev] CDI.KEYID = 6
1,302,252 UART: [ldev] SUBJECT.KEYID = 5
1,302,679 UART: [ldev] AUTHORITY.KEYID = 7
1,303,142 UART: [ldev] FE.KEYID = 1
1,308,364 UART: [ldev] Erasing FE.KEYID = 1
1,334,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,828 UART: [ldev] --
1,374,222 UART: [fwproc] Wait for Commands...
1,374,945 UART: [fwproc] Recv command 0x46574c44
1,375,678 UART: [fwproc] Recv'd Img size: 114084 bytes
2,669,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,267 >>> mbox cmd response: success
2,862,296 UART: [afmc] ++
2,862,464 UART: [afmc] CDI.KEYID = 6
2,862,827 UART: [afmc] SUBJECT.KEYID = 7
2,863,253 UART: [afmc] AUTHORITY.KEYID = 5
2,898,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,954 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,940,879 UART: [afmc] --
2,941,951 UART: [cold-reset] --
2,942,573 UART: [state] Locking Datavault
2,943,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,102 UART: [state] Locking ICCM
2,944,600 UART: [exit] Launching FMC @ 0x40000130
2,949,929 UART:
2,949,945 UART: Running Caliptra FMC ...
2,950,353 UART:
2,950,496 UART: [state] CFI Enabled
2,961,149 UART: [fht] FMC Alias Private Key: 7
3,069,154 UART: [art] Extend RT PCRs Done
3,069,582 UART: [art] Lock RT PCRs Done
3,071,290 UART: [art] Populate DV Done
3,079,503 UART: [fht] FMC Alias Private Key: 7
3,080,547 UART: [art] Derive CDI
3,080,827 UART: [art] Store in in slot 0x4
3,166,614 UART: [art] Derive Key Pair
3,166,974 UART: [art] Store priv key in slot 0x5
3,180,536 UART: [art] Derive Key Pair - Done
3,195,090 UART: [art] Signing Cert with AUTHO
3,195,570 UART: RITY.KEYID = 7
3,210,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,583 UART: [art] PUB.X = 622A8971DA82FEC364593B5B31FB88B77C5D972A8544206AF774BF646DFA9E4CDFE2BD816060C827973F1F5C3480C068
3,218,357 UART: [art] PUB.Y = 839F8751E83FCA545A93FB7680E0CCB81871A986DED319F9CFC3F55CD80C277E6F73C8E0733C1CA269D547F4BE12E560
3,225,314 UART: [art] SIG.R = DBCAF2BF7E055AA585B5B5785F4768957C48C0FA2C10064C893CD9D8A9CC279467502C596BD5B547F04539C71EEC7548
3,232,084 UART: [art] SIG.S = 7A96D539CFBCEFD727728D42956636E61782CD75F2A92E0991A5AD4D19FE5ACD550977A4411DB4C1AD968185FCA7C930
3,255,615 UART: Caliptra RT
3,255,960 UART: [state] CFI Enabled
3,363,345 UART: [rt] RT listening for mailbox commands...
3,364,015 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,765 UART: [rt]cmd =0x4c444556, len=4
3,404,252 >>> mbox cmd response data (687 bytes)
3,404,253 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,538 UART: [rt]cmd =0x43455246, len=4
3,445,637 >>> mbox cmd response data (887 bytes)
3,445,638 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,945 UART: [rt]cmd =0x43455252, len=4
3,485,811 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 919.72s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,821,695 UART: [art] Lock RT PCRs Done
2,823,165 UART: [art] Populate DV Done
2,831,468 UART: [fht] FMC Alias Private Key: 7
2,832,464 UART: [art] Derive CDI
2,832,744 UART: [art] Store in in slot 0x4
2,918,691 UART: [art] Derive Key Pair
2,919,051 UART: [art] Store priv key in slot 0x5
2,932,595 UART: [art] Derive Key Pair - Done
2,947,540 UART: [art] Signing Cert with AUTHO
2,948,020 UART: RITY.KEYID = 7
2,963,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,121 UART: [art] PUB.X = 47DB035C47FAECE80E81E05DECFCE54020AA5DBEB6A562B138569798009E3B7343B1B6DD2AB7E70A0D22FEA9ECB6CE91
2,970,881 UART: [art] PUB.Y = 4954D98E9F282F89D3E97AEB89EDC3C815D3A4131F64A8DD83052BC39C6247FFA5C77B577AB8B2CDB72508CF220B0BEE
2,977,835 UART: [art] SIG.R = 0D3799AFBE2E93EFE99917F5746F06CA5DB9E5963F1CBB2618D619A78259E47D3491518A4DCCFD6EE0B5AA385EE4F163
2,984,613 UART: [art] SIG.S = DC948C7EE9928C9F8F464322561869383D354A37F560F04D261C5E429F08BBE50D93A5E35B7D1FFBBAB15B191D72E096
3,008,728 UART: Caliptra RT
3,009,073 UART: [state] CFI Enabled
3,117,300 UART: [rt] RT listening for mailbox commands...
3,117,970 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,010 UART: [rt]cmd =0x4c444556, len=4
3,158,463 >>> mbox cmd response data (687 bytes)
3,158,464 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,873 UART: [rt]cmd =0x43455246, len=4
3,200,052 >>> mbox cmd response data (887 bytes)
3,200,053 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,152 UART: [rt]cmd =0x43455252, len=4
3,239,862 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,302 >>> mbox cmd response: success
2,701,066 UART:
2,701,082 UART: Running Caliptra FMC ...
2,701,490 UART:
2,701,633 UART: [state] CFI Enabled
2,712,532 UART: [fht] FMC Alias Private Key: 7
2,820,493 UART: [art] Extend RT PCRs Done
2,820,921 UART: [art] Lock RT PCRs Done
2,822,501 UART: [art] Populate DV Done
2,830,964 UART: [fht] FMC Alias Private Key: 7
2,832,048 UART: [art] Derive CDI
2,832,328 UART: [art] Store in in slot 0x4
2,918,309 UART: [art] Derive Key Pair
2,918,669 UART: [art] Store priv key in slot 0x5
2,931,589 UART: [art] Derive Key Pair - Done
2,946,319 UART: [art] Signing Cert with AUTHO
2,946,799 UART: RITY.KEYID = 7
2,962,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,114 UART: [art] PUB.X = 82B661D69EBB5BC7662BF1071A567E7BDE9BF5F9D6F76F570A744F8DEE57977BD729A331D96DFBBA093B809DD67FE534
2,969,891 UART: [art] PUB.Y = 39730D91161F8EB7D05311D4BC5E299E4290680E67DA455041C71592831827A3C26D7090463DFA9F00A413B553A22E83
2,976,801 UART: [art] SIG.R = 853A49B67A78F4B1AEC829370DEF69C6B7981052372BF23BA2055FB1D24DAA8E52B29790C03780750A4C12DA360EB10A
2,983,560 UART: [art] SIG.S = 8C46DF921CF0DB2CFD79096F313FD9E879C7E4F9765728825FE8EB4B7A51C2EF2A63CF1691A2A62D388B6A46BE4D763C
3,007,662 UART: Caliptra RT
3,008,007 UART: [state] CFI Enabled
3,115,675 UART: [rt] RT listening for mailbox commands...
3,116,345 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,039 UART: [rt]cmd =0x4c444556, len=4
3,156,300 >>> mbox cmd response data (687 bytes)
3,156,301 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,498 UART: [rt]cmd =0x43455246, len=4
3,197,411 >>> mbox cmd response data (887 bytes)
3,197,412 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,599 UART: [rt]cmd =0x43455252, len=4
3,237,192 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,206 >>> mbox cmd response: success
2,700,756 UART:
2,700,772 UART: Running Caliptra FMC ...
2,701,180 UART:
2,701,323 UART: [state] CFI Enabled
2,711,930 UART: [fht] FMC Alias Private Key: 7
2,820,393 UART: [art] Extend RT PCRs Done
2,820,821 UART: [art] Lock RT PCRs Done
2,822,375 UART: [art] Populate DV Done
2,830,380 UART: [fht] FMC Alias Private Key: 7
2,831,334 UART: [art] Derive CDI
2,831,614 UART: [art] Store in in slot 0x4
2,917,271 UART: [art] Derive Key Pair
2,917,631 UART: [art] Store priv key in slot 0x5
2,931,333 UART: [art] Derive Key Pair - Done
2,946,298 UART: [art] Signing Cert with AUTHO
2,946,778 UART: RITY.KEYID = 7
2,961,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,305 UART: [art] PUB.X = 5B444B92F557CC38959781C9F4377F843BB67EEE2BA14E862C8C7303E3D4F29084B5E7102060D0DD33EAED665623D74F
2,969,074 UART: [art] PUB.Y = 9671047396C41EA4B0EA2B49A5BF16F7A7F6D15BE46A34499475512376068E091F6715115D7CD4CCDA20678CF44E3900
2,975,989 UART: [art] SIG.R = FCAFD6A40649F12A7F3194B6F01DB24975DE30A074B3A81AFA6EA5E471344B4BA2C5D413753D1E4C3F35A8F2B9A32C3E
2,982,772 UART: [art] SIG.S = AFDBE91E41D0ADEB875E47649E64BE58373331E5600A11363DBDF1E1AF8748E7326714EAF72B1D1189C05BAC7E82587B
3,006,016 UART: Caliptra RT
3,006,361 UART: [state] CFI Enabled
3,114,473 UART: [rt] RT listening for mailbox commands...
3,115,143 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,767 UART: [rt]cmd =0x4c444556, len=4
3,155,318 >>> mbox cmd response data (687 bytes)
3,155,319 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,416 UART: [rt]cmd =0x43455246, len=4
3,196,511 >>> mbox cmd response data (887 bytes)
3,196,512 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,751 UART: [rt]cmd =0x43455252, len=4
3,236,478 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,633,976 >>> mbox cmd response: success
2,696,892 UART:
2,696,908 UART: Running Caliptra FMC ...
2,697,316 UART:
2,697,459 UART: [state] CFI Enabled
2,707,872 UART: [fht] FMC Alias Private Key: 7
2,815,477 UART: [art] Extend RT PCRs Done
2,815,905 UART: [art] Lock RT PCRs Done
2,817,353 UART: [art] Populate DV Done
2,825,782 UART: [fht] FMC Alias Private Key: 7
2,826,906 UART: [art] Derive CDI
2,827,186 UART: [art] Store in in slot 0x4
2,912,685 UART: [art] Derive Key Pair
2,913,045 UART: [art] Store priv key in slot 0x5
2,926,415 UART: [art] Derive Key Pair - Done
2,941,222 UART: [art] Signing Cert with AUTHO
2,941,702 UART: RITY.KEYID = 7
2,957,174 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,939 UART: [art] PUB.X = A290DA49C38D0BA70D8D375BD150105447436BD276C91A297DE1F4C37257E7DED4EAAF7C80F340519F829C7F99F10F04
2,964,703 UART: [art] PUB.Y = DCAFEB078FF6C664149FC8D35E054FA3A708E050692812C04655AEB44C79B0E3826DE9B1C7F77D5D9971E1D0F1E5B871
2,971,654 UART: [art] SIG.R = 870530D5F0D81A1AB202771A5F58E146006C03E0E7C62FC172A2F9C26FB943087A2B0C3A6707BCD97ADE9C180A191F82
2,978,385 UART: [art] SIG.S = A9679620F00C40C0F62643DAC945194DCE0C07F984C5CBC3ACB94C54CCDB7BB052B71118A04A75F4F7CB3CC6239BC871
3,002,021 UART: Caliptra RT
3,002,366 UART: [state] CFI Enabled
3,110,480 UART: [rt] RT listening for mailbox commands...
3,111,150 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,954 UART: [rt]cmd =0x4c444556, len=4
3,151,529 >>> mbox cmd response data (687 bytes)
3,151,530 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,837 UART: [rt]cmd =0x43455246, len=4
3,192,812 >>> mbox cmd response data (887 bytes)
3,192,813 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,060 UART: [rt]cmd =0x43455252, len=4
3,232,837 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,357 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,362 >>> mbox cmd response: success
2,700,146 UART:
2,700,162 UART: Running Caliptra FMC ...
2,700,570 UART:
2,700,713 UART: [state] CFI Enabled
2,711,206 UART: [fht] FMC Alias Private Key: 7
2,819,519 UART: [art] Extend RT PCRs Done
2,819,947 UART: [art] Lock RT PCRs Done
2,821,543 UART: [art] Populate DV Done
2,829,774 UART: [fht] FMC Alias Private Key: 7
2,830,868 UART: [art] Derive CDI
2,831,148 UART: [art] Store in in slot 0x4
2,916,853 UART: [art] Derive Key Pair
2,917,213 UART: [art] Store priv key in slot 0x5
2,929,845 UART: [art] Derive Key Pair - Done
2,945,080 UART: [art] Signing Cert with AUTHO
2,945,560 UART: RITY.KEYID = 7
2,961,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,103 UART: [art] PUB.X = 052ECEC7AEFC00F91E27B4B4057039888D07DC7283F9EE152D017524688ADDAFC6290E168EC7895A3E3EAA0EEE707225
2,968,843 UART: [art] PUB.Y = DAEA514CE6DE66D8DEFACC9E4F488F105E4F4A5FE2D315A169FBD588090A34F041CBEEDF84883CA38099546A33E690FB
2,975,809 UART: [art] SIG.R = 1807508EC65F79CE720ED03F8C5BC74A37B575DFB288E8D1C83A90390EA34D90A2D5A97627D65A9F7C3EAE513BE9BD15
2,982,582 UART: [art] SIG.S = A987868636B28086C013251C375585F9DE9272C18CBCBA8DB23946E000878088195A4CDC50A614DFD6B27C448B5F1E85
3,006,559 UART: Caliptra RT
3,006,904 UART: [state] CFI Enabled
3,114,785 UART: [rt] RT listening for mailbox commands...
3,115,455 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,295 UART: [rt]cmd =0x4c444556, len=4
3,155,664 >>> mbox cmd response data (687 bytes)
3,155,665 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,872 UART: [rt]cmd =0x43455246, len=4
3,196,783 >>> mbox cmd response data (887 bytes)
3,196,784 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,097 UART: [rt]cmd =0x43455252, len=4
3,236,983 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 883.03s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,802 UART: [idev] CSR uploaded
1,299,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,016 UART: [idev] --
1,301,107 UART: [ldev] ++
1,301,275 UART: [ldev] CDI.KEYID = 6
1,301,639 UART: [ldev] SUBJECT.KEYID = 5
1,302,066 UART: [ldev] AUTHORITY.KEYID = 7
1,302,529 UART: [ldev] FE.KEYID = 1
1,307,679 UART: [ldev] Erasing FE.KEYID = 1
1,333,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,817 UART: [ldev] --
1,373,109 UART: [fwproc] Wait for Commands...
1,373,804 UART: [fwproc] Recv command 0x46574c44
1,374,537 UART: [fwproc] Recv'd Img size: 114084 bytes
2,669,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,802 >>> mbox cmd response: success
2,863,045 UART: [afmc] ++
2,863,213 UART: [afmc] CDI.KEYID = 6
2,863,576 UART: [afmc] SUBJECT.KEYID = 7
2,864,002 UART: [afmc] AUTHORITY.KEYID = 5
2,899,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,173 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,952 UART: [afmc] --
2,942,976 UART: [cold-reset] --
2,944,124 UART: [state] Locking Datavault
2,945,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,037 UART: [state] Locking ICCM
2,946,635 UART: [exit] Launching FMC @ 0x40000130
2,951,964 UART:
2,951,980 UART: Running Caliptra FMC ...
2,952,388 UART:
2,952,442 UART: [state] CFI Enabled
2,963,191 UART: [fht] FMC Alias Private Key: 7
3,071,234 UART: [art] Extend RT PCRs Done
3,071,662 UART: [art] Lock RT PCRs Done
3,073,240 UART: [art] Populate DV Done
3,081,685 UART: [fht] FMC Alias Private Key: 7
3,082,851 UART: [art] Derive CDI
3,083,131 UART: [art] Store in in slot 0x4
3,169,210 UART: [art] Derive Key Pair
3,169,570 UART: [art] Store priv key in slot 0x5
3,182,656 UART: [art] Derive Key Pair - Done
3,197,703 UART: [art] Signing Cert with AUTHO
3,198,183 UART: RITY.KEYID = 7
3,213,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,276 UART: [art] PUB.X = 60BD25D2920336F921DE8DE8AE1AD6C71F26C88B8473AFD8AA4A7F9FBB6113AE88B66111523C375BC6545CE097DC456D
3,221,055 UART: [art] PUB.Y = 883614B96309870E9EC72A12E394D9381517B9B6E15E9445763B78DFF0F44A9EA4DDB8BE0A8737A5E5A3B98BFA5FEBF6
3,228,006 UART: [art] SIG.R = 7392268F5CDBC712039131AEB51C50165679A5CC8AA04E58CCFC04A89488D7464F6EF9FA3EBA91C3674DBBFEEE7E72AE
3,234,788 UART: [art] SIG.S = 516CE943D1A06200E1324342182B7D0128D910BEB11CB9150AE633D74A332C829941A1D805462D9D558C5D2A7B8156E8
3,258,824 UART: Caliptra RT
3,259,077 UART: [state] CFI Enabled
3,365,536 UART: [rt] RT listening for mailbox commands...
3,366,206 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,066 UART: [rt]cmd =0x4c444556, len=4
3,406,475 >>> mbox cmd response data (687 bytes)
3,406,476 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,541 UART: [rt]cmd =0x43455246, len=4
3,447,520 >>> mbox cmd response data (887 bytes)
3,447,521 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,786 UART: [rt]cmd =0x43455252, len=4
3,487,666 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,619 UART: [idev] ++
1,172,787 UART: [idev] CDI.KEYID = 6
1,173,148 UART: [idev] SUBJECT.KEYID = 7
1,173,573 UART: [idev] UDS.KEYID = 0
1,181,729 UART: [idev] Erasing UDS.KEYID = 0
1,199,267 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] CSR upload begun
1,209,466 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,085 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,793 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,678 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,384 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,813 UART: [idev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
1,297,310 UART: [idev] CSR uploaded
1,300,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,524 UART: [idev] --
1,301,665 UART: [ldev] ++
1,301,833 UART: [ldev] CDI.KEYID = 6
1,302,197 UART: [ldev] SUBJECT.KEYID = 5
1,302,624 UART: [ldev] AUTHORITY.KEYID = 7
1,303,087 UART: [ldev] FE.KEYID = 1
1,308,055 UART: [ldev] Erasing FE.KEYID = 1
1,334,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,845 UART: [ldev] --
1,374,277 UART: [fwproc] Wait for Commands...
1,375,014 UART: [fwproc] Recv command 0x46574c44
1,375,747 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,672 >>> mbox cmd response: success
2,863,757 UART: [afmc] ++
2,863,925 UART: [afmc] CDI.KEYID = 6
2,864,288 UART: [afmc] SUBJECT.KEYID = 7
2,864,714 UART: [afmc] AUTHORITY.KEYID = 5
2,900,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,734 UART: [afmc] --
2,943,850 UART: [cold-reset] --
2,944,654 UART: [state] Locking Datavault
2,945,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,379 UART: [state] Locking ICCM
2,946,869 UART: [exit] Launching FMC @ 0x40000130
2,952,198 UART:
2,952,214 UART: Running Caliptra FMC ...
2,952,622 UART:
2,952,676 UART: [state] CFI Enabled
2,962,969 UART: [fht] FMC Alias Private Key: 7
3,070,630 UART: [art] Extend RT PCRs Done
3,071,058 UART: [art] Lock RT PCRs Done
3,072,808 UART: [art] Populate DV Done
3,081,147 UART: [fht] FMC Alias Private Key: 7
3,082,329 UART: [art] Derive CDI
3,082,609 UART: [art] Store in in slot 0x4
3,168,138 UART: [art] Derive Key Pair
3,168,498 UART: [art] Store priv key in slot 0x5
3,182,006 UART: [art] Derive Key Pair - Done
3,196,872 UART: [art] Signing Cert with AUTHO
3,197,352 UART: RITY.KEYID = 7
3,212,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,341 UART: [art] PUB.X = B7534578F719E1A6213126D1C908D7D77CF42DDE6981F290B629531BD28F4D67B2674186C8C2DF37FD2DD638E9DF549C
3,220,110 UART: [art] PUB.Y = 5BD55DA4F2B73F4C0C58F6CEA9FE928B80FB7F4C19F838CFF4ED1907A8E11270F267B68190E52FA79D1B0F72AAA37993
3,227,067 UART: [art] SIG.R = 9136368F59FEEEE8AD9F7C4BCC23199582C6B576326D3DC99CA4AE2BF411E106F2854C2123CBE1B45D6139B60D7248FD
3,233,841 UART: [art] SIG.S = C5CAC392367BBD8D4F5F7D654CF07C5B01B589C795261DFE1A8AF9CF67DC00E570095EBE089A649B1900D28637383BB6
3,257,647 UART: Caliptra RT
3,257,900 UART: [state] CFI Enabled
3,366,058 UART: [rt] RT listening for mailbox commands...
3,366,728 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,722 UART: [rt]cmd =0x4c444556, len=4
3,407,027 >>> mbox cmd response data (687 bytes)
3,407,028 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,253 UART: [rt]cmd =0x43455246, len=4
3,448,204 >>> mbox cmd response data (887 bytes)
3,448,205 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,690 UART: [rt]cmd =0x43455252, len=4
3,488,513 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 891.18s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,243 UART: [art] Lock RT PCRs Done
2,821,905 UART: [art] Populate DV Done
2,830,138 UART: [fht] FMC Alias Private Key: 7
2,831,070 UART: [art] Derive CDI
2,831,350 UART: [art] Store in in slot 0x4
2,917,399 UART: [art] Derive Key Pair
2,917,759 UART: [art] Store priv key in slot 0x5
2,930,393 UART: [art] Derive Key Pair - Done
2,945,184 UART: [art] Signing Cert with AUTHO
2,945,664 UART: RITY.KEYID = 7
2,960,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,627 UART: [art] PUB.X = 23313818324576AD90FC339514D7C8CFAD529FA5186A9D405A5DC619D7302DB9025C62761E8AC49008E3339E46F94992
2,968,383 UART: [art] PUB.Y = C3CD4101C0C765E9792BA8E11E53D662D4BCBCA8BB3D1566DB555B8E9043C88DFA205FCE543D82EBD06AC2CB939AAAE8
2,975,354 UART: [art] SIG.R = 08983E99CA3DF2FCD8E196BD70FAE017AE910B18BDDF7DF6CD3B3990E2F9F4B69CE249DEE5724824F3699BBB4D080F99
2,982,132 UART: [art] SIG.S = 095C0C89954C4A1E9C3B1735E3330C82BA812C5390279DDBEC24E79AE45DF7CC142F4F358D5AFB49FF0A15DD25AA06F9
3,006,106 UART: Caliptra RT
3,006,359 UART: [state] CFI Enabled
3,114,944 UART: [rt] RT listening for mailbox commands...
3,115,614 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,410 UART: [rt]cmd =0x4c444556, len=4
3,155,861 >>> mbox cmd response data (687 bytes)
3,155,862 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,253 UART: [rt]cmd =0x43455246, len=4
3,197,542 >>> mbox cmd response data (887 bytes)
3,197,543 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,828 UART: [rt]cmd =0x43455252, len=4
3,237,650 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,023 >>> mbox cmd response: success
2,701,199 UART:
2,701,215 UART: Running Caliptra FMC ...
2,701,623 UART:
2,701,677 UART: [state] CFI Enabled
2,712,380 UART: [fht] FMC Alias Private Key: 7
2,820,489 UART: [art] Extend RT PCRs Done
2,820,917 UART: [art] Lock RT PCRs Done
2,822,607 UART: [art] Populate DV Done
2,830,508 UART: [fht] FMC Alias Private Key: 7
2,831,628 UART: [art] Derive CDI
2,831,908 UART: [art] Store in in slot 0x4
2,917,547 UART: [art] Derive Key Pair
2,917,907 UART: [art] Store priv key in slot 0x5
2,930,631 UART: [art] Derive Key Pair - Done
2,945,498 UART: [art] Signing Cert with AUTHO
2,945,978 UART: RITY.KEYID = 7
2,960,922 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,687 UART: [art] PUB.X = 088E45C0E72FA5F4FB55D794A8BDA40B4EBA8C8278099AF27E239673CABD16EBEBC065377AB3E0BE685FDBF48915DE9F
2,968,470 UART: [art] PUB.Y = C1A0E75E19AE38FACA0C669D33E1F31D787FD2D8CF9C498328DF69258B925F6D90C13CC27350DCAC4B95F57784935F2C
2,975,429 UART: [art] SIG.R = E04B73B199135D8882C3C8635820D12481AB4BAD07258AC06677E8550EFF3AB61C539CF4935BC4AAECA4591EBE235CD1
2,982,201 UART: [art] SIG.S = B841E6F0ABF4A21D98B16620696CBAF08C1480567886AC44F805803CA9B4CA77015647C1C51F64A2F518357154C51A0B
3,006,019 UART: Caliptra RT
3,006,272 UART: [state] CFI Enabled
3,114,020 UART: [rt] RT listening for mailbox commands...
3,114,690 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,386 UART: [rt]cmd =0x4c444556, len=4
3,154,901 >>> mbox cmd response data (687 bytes)
3,154,902 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,443 UART: [rt]cmd =0x43455246, len=4
3,196,280 >>> mbox cmd response data (887 bytes)
3,196,281 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,476 UART: [rt]cmd =0x43455252, len=4
3,236,345 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,733 >>> mbox cmd response: success
2,700,439 UART:
2,700,455 UART: Running Caliptra FMC ...
2,700,863 UART:
2,700,917 UART: [state] CFI Enabled
2,711,548 UART: [fht] FMC Alias Private Key: 7
2,820,309 UART: [art] Extend RT PCRs Done
2,820,737 UART: [art] Lock RT PCRs Done
2,822,101 UART: [art] Populate DV Done
2,830,122 UART: [fht] FMC Alias Private Key: 7
2,831,086 UART: [art] Derive CDI
2,831,366 UART: [art] Store in in slot 0x4
2,916,697 UART: [art] Derive Key Pair
2,917,057 UART: [art] Store priv key in slot 0x5
2,930,279 UART: [art] Derive Key Pair - Done
2,945,156 UART: [art] Signing Cert with AUTHO
2,945,636 UART: RITY.KEYID = 7
2,960,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,477 UART: [art] PUB.X = 4E5ABD41538FAEAEA817461ACE3DD06415A49C5373B2049E9924C3B3AF771643F86E06E447F3877228E13149EAA9AEC9
2,968,247 UART: [art] PUB.Y = 4A7A70754325A2FD727950DCB670874C9652C0557A6400C2199D1C34CC833D70C25B51B2115A9A868F9CE1E91B024F0E
2,975,165 UART: [art] SIG.R = 1F5F2F37A703982D21CCBE3944821318F81AFE84BCD0245F8A944F17CF0AF9B2214B53933FCCE5F3562F1110772AF159
2,981,933 UART: [art] SIG.S = F796504D51BE4690BCB17666BB75252BDD81F5DCC1D50D93736DD703A6CC171A9DAF4510981E5DF6AD957E3A2CE1BBC8
3,005,718 UART: Caliptra RT
3,005,971 UART: [state] CFI Enabled
3,113,348 UART: [rt] RT listening for mailbox commands...
3,114,018 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,792 UART: [rt]cmd =0x4c444556, len=4
3,154,427 >>> mbox cmd response data (687 bytes)
3,154,428 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,547 UART: [rt]cmd =0x43455246, len=4
3,195,488 >>> mbox cmd response data (887 bytes)
3,195,489 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,820 UART: [rt]cmd =0x43455252, len=4
3,235,738 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,723 >>> mbox cmd response: success
2,700,979 UART:
2,700,995 UART: Running Caliptra FMC ...
2,701,403 UART:
2,701,457 UART: [state] CFI Enabled
2,711,898 UART: [fht] FMC Alias Private Key: 7
2,819,737 UART: [art] Extend RT PCRs Done
2,820,165 UART: [art] Lock RT PCRs Done
2,821,497 UART: [art] Populate DV Done
2,829,764 UART: [fht] FMC Alias Private Key: 7
2,830,752 UART: [art] Derive CDI
2,831,032 UART: [art] Store in in slot 0x4
2,917,231 UART: [art] Derive Key Pair
2,917,591 UART: [art] Store priv key in slot 0x5
2,930,879 UART: [art] Derive Key Pair - Done
2,945,797 UART: [art] Signing Cert with AUTHO
2,946,277 UART: RITY.KEYID = 7
2,960,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,458 UART: [art] PUB.X = 82EB1BC85E825C97F4C7CC6CA850DF5AB0BAEE10A9D1B358D9D1B42558CE6388286C75C19580227186150E7460351581
2,968,225 UART: [art] PUB.Y = E3378571BBF5B928C7AAA759EAFBB2FA85BEF92AE196601815A134503BC08509F1AE8E23BA7B4C91EB7C19F4D952E1FF
2,975,190 UART: [art] SIG.R = D4B1CB4C6FAB8EA44516054470FF7158F0FB590B7ED695383C855A4D033DE086C267879D61D302B4789A2D8649DE9DB1
2,981,952 UART: [art] SIG.S = D054CA61AC70D410B75927597A47E77D9187C81D56882EA8DF74B4CED6782E4DF0943575A401087AC3D426165509F025
3,005,732 UART: Caliptra RT
3,005,985 UART: [state] CFI Enabled
3,115,205 UART: [rt] RT listening for mailbox commands...
3,115,875 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,619 UART: [rt]cmd =0x4c444556, len=4
3,156,276 >>> mbox cmd response data (687 bytes)
3,156,277 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,794 UART: [rt]cmd =0x43455246, len=4
3,197,653 >>> mbox cmd response data (887 bytes)
3,197,654 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,909 UART: [rt]cmd =0x43455252, len=4
3,237,714 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,591 >>> mbox cmd response: success
2,700,401 UART:
2,700,417 UART: Running Caliptra FMC ...
2,700,825 UART:
2,700,879 UART: [state] CFI Enabled
2,711,138 UART: [fht] FMC Alias Private Key: 7
2,819,045 UART: [art] Extend RT PCRs Done
2,819,473 UART: [art] Lock RT PCRs Done
2,821,219 UART: [art] Populate DV Done
2,829,422 UART: [fht] FMC Alias Private Key: 7
2,830,394 UART: [art] Derive CDI
2,830,674 UART: [art] Store in in slot 0x4
2,916,055 UART: [art] Derive Key Pair
2,916,415 UART: [art] Store priv key in slot 0x5
2,929,607 UART: [art] Derive Key Pair - Done
2,944,284 UART: [art] Signing Cert with AUTHO
2,944,764 UART: RITY.KEYID = 7
2,960,074 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,839 UART: [art] PUB.X = 7381B86424457C291154521A7712A3C3060DDA95CA88D11A69D5E44D12CFB05F34F2DE5D96609FE0C0379DEE26219B49
2,967,601 UART: [art] PUB.Y = 8446400ED02D01167762D9677C36E6373F9E229CD6120A5610B335C8B9E0497FF20B5798D29D0867F27B6E5A48F84E7C
2,974,528 UART: [art] SIG.R = 70E8835B7D31EA25F952BEEDCDF2104BC737B13C770796DD65FAA17C9691B9E4370215538033098A6E050450F63B06F7
2,981,278 UART: [art] SIG.S = D496DB53FDD9432213039E7859B5193400E5235FAA43BBAB91AB111174EE930D3A169ADD395F4063A4BE85F634B63B96
3,004,855 UART: Caliptra RT
3,005,108 UART: [state] CFI Enabled
3,111,951 UART: [rt] RT listening for mailbox commands...
3,112,621 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,463 UART: [rt]cmd =0x4c444556, len=4
3,153,034 >>> mbox cmd response data (687 bytes)
3,153,035 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,558 UART: [rt]cmd =0x43455246, len=4
3,194,549 >>> mbox cmd response data (887 bytes)
3,194,550 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,019 UART: [rt]cmd =0x43455252, len=4
3,235,039 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 855.79s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,967 UART: [idev] CSR uploaded
1,300,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,181 UART: [idev] --
1,301,230 UART: [ldev] ++
1,301,398 UART: [ldev] CDI.KEYID = 6
1,301,762 UART: [ldev] SUBJECT.KEYID = 5
1,302,189 UART: [ldev] AUTHORITY.KEYID = 7
1,302,652 UART: [ldev] FE.KEYID = 1
1,307,978 UART: [ldev] Erasing FE.KEYID = 1
1,334,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,624 UART: [ldev] --
1,374,134 UART: [fwproc] Wait for Commands...
1,374,893 UART: [fwproc] Recv command 0x46574c44
1,375,626 UART: [fwproc] Recv'd Img size: 114084 bytes
2,671,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,307 >>> mbox cmd response: success
2,863,558 UART: [afmc] ++
2,863,726 UART: [afmc] CDI.KEYID = 6
2,864,089 UART: [afmc] SUBJECT.KEYID = 7
2,864,515 UART: [afmc] AUTHORITY.KEYID = 5
2,900,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,759 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,090 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,087 UART: [afmc] --
2,944,207 UART: [cold-reset] --
2,945,079 UART: [state] Locking Datavault
2,946,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,040 UART: [state] Locking ICCM
2,947,542 UART: [exit] Launching FMC @ 0x40000130
2,952,871 UART:
2,952,887 UART: Running Caliptra FMC ...
2,953,295 UART:
2,953,438 UART: [state] CFI Enabled
2,964,527 UART: [fht] FMC Alias Private Key: 7
3,072,508 UART: [art] Extend RT PCRs Done
3,072,936 UART: [art] Lock RT PCRs Done
3,074,514 UART: [art] Populate DV Done
3,082,795 UART: [fht] FMC Alias Private Key: 7
3,083,843 UART: [art] Derive CDI
3,084,123 UART: [art] Store in in slot 0x4
3,169,592 UART: [art] Derive Key Pair
3,169,952 UART: [art] Store priv key in slot 0x5
3,183,654 UART: [art] Derive Key Pair - Done
3,198,481 UART: [art] Signing Cert with AUTHO
3,198,961 UART: RITY.KEYID = 7
3,214,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,000 UART: [art] PUB.X = 68B7908DE237458D78CD0317BF4ABD24486051DFD5C76925CF7EB367DADAE202BB7B778D2C72A3363F2C8CBF4A92C416
3,221,776 UART: [art] PUB.Y = 72EA986A45A673358B013667330110B0D1F627FFC0DF01D6029B1451CD46CC57F350AEFD7ECBFD1582F7E9EDF53405C1
3,228,719 UART: [art] SIG.R = 174BF8A248C8B5028DA61752E5D25FD9C263EFD3A180641A4DC03B6BEDD4B1B540562833AA00E2D5D95741312C4B0CA6
3,235,469 UART: [art] SIG.S = C5BB53E0DC73B28C12F6FFFE988EA03C06F868BD49DEB0BB1BD7C0AECDB1D3BC652BFB35D1520BB656C79921311ECA20
3,259,372 UART: Caliptra RT
3,259,717 UART: [state] CFI Enabled
3,367,174 UART: [rt] RT listening for mailbox commands...
3,367,844 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,600 UART: [rt]cmd =0x4c444556, len=4
3,407,905 >>> mbox cmd response data (687 bytes)
3,407,906 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,269 UART: [rt]cmd =0x43455246, len=4
3,449,366 >>> mbox cmd response data (887 bytes)
3,449,367 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,766 UART: [rt]cmd =0x43455252, len=4
3,489,754 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,909 UART: [kat] HMAC-384Kdf
921,755 UART: [kat] LMS
1,170,067 UART: [kat] --
1,171,020 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,173,932 UART: [idev] ++
1,174,100 UART: [idev] CDI.KEYID = 6
1,174,461 UART: [idev] SUBJECT.KEYID = 7
1,174,886 UART: [idev] UDS.KEYID = 0
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] CSR upload begun
1,209,815 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,280 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,988 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,873 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,579 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,008 UART: [idev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
1,297,505 UART: [idev] CSR uploaded
1,300,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,719 UART: [idev] --
1,301,636 UART: [ldev] ++
1,301,804 UART: [ldev] CDI.KEYID = 6
1,302,168 UART: [ldev] SUBJECT.KEYID = 5
1,302,595 UART: [ldev] AUTHORITY.KEYID = 7
1,303,058 UART: [ldev] FE.KEYID = 1
1,308,548 UART: [ldev] Erasing FE.KEYID = 1
1,335,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,448 UART: [ldev] --
1,374,950 UART: [fwproc] Wait for Commands...
1,375,761 UART: [fwproc] Recv command 0x46574c44
1,376,494 UART: [fwproc] Recv'd Img size: 114084 bytes
2,671,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,849 >>> mbox cmd response: success
2,864,082 UART: [afmc] ++
2,864,250 UART: [afmc] CDI.KEYID = 6
2,864,613 UART: [afmc] SUBJECT.KEYID = 7
2,865,039 UART: [afmc] AUTHORITY.KEYID = 5
2,901,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,759 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,425 UART: [afmc] --
2,944,313 UART: [cold-reset] --
2,945,173 UART: [state] Locking Datavault
2,946,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,094 UART: [state] Locking ICCM
2,947,656 UART: [exit] Launching FMC @ 0x40000130
2,952,985 UART:
2,953,001 UART: Running Caliptra FMC ...
2,953,409 UART:
2,953,552 UART: [state] CFI Enabled
2,964,199 UART: [fht] FMC Alias Private Key: 7
3,072,408 UART: [art] Extend RT PCRs Done
3,072,836 UART: [art] Lock RT PCRs Done
3,074,124 UART: [art] Populate DV Done
3,082,307 UART: [fht] FMC Alias Private Key: 7
3,083,265 UART: [art] Derive CDI
3,083,545 UART: [art] Store in in slot 0x4
3,169,266 UART: [art] Derive Key Pair
3,169,626 UART: [art] Store priv key in slot 0x5
3,183,608 UART: [art] Derive Key Pair - Done
3,198,324 UART: [art] Signing Cert with AUTHO
3,198,804 UART: RITY.KEYID = 7
3,214,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,069 UART: [art] PUB.X = 98513C39C5F7A4C215156B13E0286343B743003E5C3D2F4CEDB8410D8B4E8D629BCE459EC00B8A027EFE52DC86C159C9
3,221,814 UART: [art] PUB.Y = 080DC3F83F7D4927D4049D9DC4D40AB82D3D846719B63E2591145EE9F084210059A4AAE2DD5F11C2F183CAFD97357FB0
3,228,736 UART: [art] SIG.R = 815CD878A70DFA447DBFCF300FEE2718328958C17EE1DEF178935BD33AAE8D8E9BC04B989D1D420FBDB442DF386F00C6
3,235,493 UART: [art] SIG.S = AEE691D7CB217F8D33110BED5267EA918B554B7D86FF6042242C81A1792AAE628FFD9D35E6AEA564123B714D0FB75AFB
3,259,316 UART: Caliptra RT
3,259,661 UART: [state] CFI Enabled
3,367,539 UART: [rt] RT listening for mailbox commands...
3,368,209 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,967 UART: [rt]cmd =0x4c444556, len=4
3,408,200 >>> mbox cmd response data (687 bytes)
3,408,201 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,326 UART: [rt]cmd =0x43455246, len=4
3,449,457 >>> mbox cmd response data (887 bytes)
3,449,458 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,899 UART: [rt]cmd =0x43455252, len=4
3,489,700 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 889.11s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,821,481 UART: [art] Lock RT PCRs Done
2,823,053 UART: [art] Populate DV Done
2,831,348 UART: [fht] FMC Alias Private Key: 7
2,832,458 UART: [art] Derive CDI
2,832,738 UART: [art] Store in in slot 0x4
2,918,249 UART: [art] Derive Key Pair
2,918,609 UART: [art] Store priv key in slot 0x5
2,931,737 UART: [art] Derive Key Pair - Done
2,946,470 UART: [art] Signing Cert with AUTHO
2,946,950 UART: RITY.KEYID = 7
2,961,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,299 UART: [art] PUB.X = 55CA8C6A67A79EE702F4941560073BBDD8C65893B5E95E606F288E1D13EEBB8B1922D73CC2B7821FCA948F4BA6C07C79
2,969,073 UART: [art] PUB.Y = E8D081582584BC9ADE41C174F4CBEC0B4BAFFCB7354A14BA95CB4A9FF4CBF9EA0618FC434368D175C8E7D4E9673FAE06
2,976,038 UART: [art] SIG.R = A67905B3AE68A194CC7D108733951CA7488AC94F5C50B200802B5F4C1BC9D96C0FCEB469DA4B7CE26DBC8CD87A078DB0
2,982,793 UART: [art] SIG.S = 7B48C9065CE6BA2DBAF36B2BC8FC69F1A29E7F84FE2D277713521601A483F3647CAB12B49A0487DFCF4F1BDC0822257A
3,006,120 UART: Caliptra RT
3,006,465 UART: [state] CFI Enabled
3,113,994 UART: [rt] RT listening for mailbox commands...
3,114,664 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,488 UART: [rt]cmd =0x4c444556, len=4
3,155,091 >>> mbox cmd response data (687 bytes)
3,155,092 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,431 UART: [rt]cmd =0x43455246, len=4
3,196,436 >>> mbox cmd response data (887 bytes)
3,196,437 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,788 UART: [rt]cmd =0x43455252, len=4
3,236,452 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,782 >>> mbox cmd response: success
2,700,540 UART:
2,700,556 UART: Running Caliptra FMC ...
2,700,964 UART:
2,701,107 UART: [state] CFI Enabled
2,711,920 UART: [fht] FMC Alias Private Key: 7
2,820,337 UART: [art] Extend RT PCRs Done
2,820,765 UART: [art] Lock RT PCRs Done
2,822,359 UART: [art] Populate DV Done
2,830,784 UART: [fht] FMC Alias Private Key: 7
2,831,904 UART: [art] Derive CDI
2,832,184 UART: [art] Store in in slot 0x4
2,918,267 UART: [art] Derive Key Pair
2,918,627 UART: [art] Store priv key in slot 0x5
2,931,999 UART: [art] Derive Key Pair - Done
2,946,592 UART: [art] Signing Cert with AUTHO
2,947,072 UART: RITY.KEYID = 7
2,962,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,627 UART: [art] PUB.X = ABE190665DEE69CBC9578F242E6D31ED5D846E8BA3BF77471C6F690865F10549861322B28BA5E53F75480DDAA992374A
2,970,392 UART: [art] PUB.Y = 0BDB208111B24968223A5530B6CFB7EC619F5FC51BED387E1B8460DE3BCAF4C4A2BDAEE826667A66DAC1E6599BC5AF26
2,977,359 UART: [art] SIG.R = 1AA28F4193C3B9ACEEF75A3ACE59014673FAE7798DF1317D63BE52EAACC6571FB30053E20AEAC47263DEBA0A4800179F
2,984,094 UART: [art] SIG.S = 5D4E5C4913ED354F8C70AD67452C4F5D66D2CA7313878678539AECB8093B62F76B022C6C94C8856C310874CC19592F46
3,007,728 UART: Caliptra RT
3,008,073 UART: [state] CFI Enabled
3,115,644 UART: [rt] RT listening for mailbox commands...
3,116,314 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,266 UART: [rt]cmd =0x4c444556, len=4
3,156,781 >>> mbox cmd response data (687 bytes)
3,156,782 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,045 UART: [rt]cmd =0x43455246, len=4
3,198,156 >>> mbox cmd response data (887 bytes)
3,198,157 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,662 UART: [rt]cmd =0x43455252, len=4
3,238,682 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,612 >>> mbox cmd response: success
2,700,040 UART:
2,700,056 UART: Running Caliptra FMC ...
2,700,464 UART:
2,700,607 UART: [state] CFI Enabled
2,711,190 UART: [fht] FMC Alias Private Key: 7
2,819,665 UART: [art] Extend RT PCRs Done
2,820,093 UART: [art] Lock RT PCRs Done
2,821,543 UART: [art] Populate DV Done
2,829,716 UART: [fht] FMC Alias Private Key: 7
2,830,742 UART: [art] Derive CDI
2,831,022 UART: [art] Store in in slot 0x4
2,917,175 UART: [art] Derive Key Pair
2,917,535 UART: [art] Store priv key in slot 0x5
2,930,605 UART: [art] Derive Key Pair - Done
2,945,270 UART: [art] Signing Cert with AUTHO
2,945,750 UART: RITY.KEYID = 7
2,960,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,451 UART: [art] PUB.X = F96F048B1D7BEC5170AB0989AF55A3893C2EAEDF4429CE8C4478EB3E7C38CFA470EF88B02AD7A5A2A0F80F3BF732501E
2,968,232 UART: [art] PUB.Y = F4E19E2C9470F2F41234EE8004F9632453690BE9D3E540B6398AE2F2DD267EB26DBDFD0094883B448CA550E42D79DFFB
2,975,162 UART: [art] SIG.R = 67C4FAFF85E4B93D6B5B561337C09407C8874AE3C483B27FAC23CC4D3420A10592B23A37325C94F54B456B5EDB26B9D2
2,981,932 UART: [art] SIG.S = F5E1D5B1BCFB10EA87CA789780B78146E86BDF00CDA0C652D4A7435C26B5F921518F18BDDB36D6F378AF4ADD33FB885F
3,005,361 UART: Caliptra RT
3,005,706 UART: [state] CFI Enabled
3,114,087 UART: [rt] RT listening for mailbox commands...
3,114,757 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,287 UART: [rt]cmd =0x4c444556, len=4
3,154,814 >>> mbox cmd response data (687 bytes)
3,154,815 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,254 UART: [rt]cmd =0x43455246, len=4
3,196,143 >>> mbox cmd response data (887 bytes)
3,196,144 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,655 UART: [rt]cmd =0x43455252, len=4
3,236,543 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,721 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,064 >>> mbox cmd response: success
2,700,264 UART:
2,700,280 UART: Running Caliptra FMC ...
2,700,688 UART:
2,700,831 UART: [state] CFI Enabled
2,711,288 UART: [fht] FMC Alias Private Key: 7
2,819,607 UART: [art] Extend RT PCRs Done
2,820,035 UART: [art] Lock RT PCRs Done
2,821,873 UART: [art] Populate DV Done
2,829,910 UART: [fht] FMC Alias Private Key: 7
2,831,018 UART: [art] Derive CDI
2,831,298 UART: [art] Store in in slot 0x4
2,916,855 UART: [art] Derive Key Pair
2,917,215 UART: [art] Store priv key in slot 0x5
2,930,357 UART: [art] Derive Key Pair - Done
2,945,089 UART: [art] Signing Cert with AUTHO
2,945,569 UART: RITY.KEYID = 7
2,960,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,580 UART: [art] PUB.X = 73DA54023443192C25EAEF34FDA6F849825D2002B0F7CE1E747303BACE3AA8A218EBDD0B82868FB859E784D7CE765BC5
2,968,350 UART: [art] PUB.Y = 56676118EBF5793AA17CAAEED219EF90724A6F08FD402C9A8C2CB868B826F0E0283A34BF746C1208810F7339E29D1AC9
2,975,297 UART: [art] SIG.R = 1041EE814DAE4A17472B58F174BAFEC3C737F505A1CF5667B8A9CE9EF0FB3BF48D92DDAAC06454F6BE90C158B30D0350
2,982,076 UART: [art] SIG.S = 7CDF0CC25FE9B8E099FFBA88A9EAFF2390374B113D44D92569B5EEE648E012A4D6D22D7455D3E1849987928422D479D5
3,005,772 UART: Caliptra RT
3,006,117 UART: [state] CFI Enabled
3,114,924 UART: [rt] RT listening for mailbox commands...
3,115,594 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,688 UART: [rt]cmd =0x4c444556, len=4
3,156,041 >>> mbox cmd response data (687 bytes)
3,156,042 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,427 UART: [rt]cmd =0x43455246, len=4
3,197,452 >>> mbox cmd response data (887 bytes)
3,197,453 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,930 UART: [rt]cmd =0x43455252, len=4
3,237,768 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,842 >>> mbox cmd response: success
2,701,888 UART:
2,701,904 UART: Running Caliptra FMC ...
2,702,312 UART:
2,702,455 UART: [state] CFI Enabled
2,712,960 UART: [fht] FMC Alias Private Key: 7
2,820,785 UART: [art] Extend RT PCRs Done
2,821,213 UART: [art] Lock RT PCRs Done
2,822,967 UART: [art] Populate DV Done
2,831,094 UART: [fht] FMC Alias Private Key: 7
2,832,216 UART: [art] Derive CDI
2,832,496 UART: [art] Store in in slot 0x4
2,918,353 UART: [art] Derive Key Pair
2,918,713 UART: [art] Store priv key in slot 0x5
2,932,167 UART: [art] Derive Key Pair - Done
2,946,977 UART: [art] Signing Cert with AUTHO
2,947,457 UART: RITY.KEYID = 7
2,962,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,318 UART: [art] PUB.X = 4D9150D1BC36D952BB8E05129B0ED829B00B890B9375719E7340F4E5064BA4A185ABB2BF0F4D82FC85E3C96418F58A1A
2,970,076 UART: [art] PUB.Y = 24A5A053A0F1245CF2E555EA1FE7DAE71D3DFA0BDF8CB5E013DA897580A4235F2AE9394F00FF8CD10840C60F9B7F9078
2,977,011 UART: [art] SIG.R = 24BA62E39F0809697602A238F2F8105A0150143F6BB803CBBE3DCCB4C5303AE64C40714584E3E6B123355C9C46D47267
2,983,762 UART: [art] SIG.S = 07723217D6FF83DD5AE6D8335AF5FEBA9DB3E18826513324309A9FAB32AD4732E48AE3BFA0252778B44688E7BCCD184E
3,007,522 UART: Caliptra RT
3,007,867 UART: [state] CFI Enabled
3,115,154 UART: [rt] RT listening for mailbox commands...
3,115,824 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,556 UART: [rt]cmd =0x4c444556, len=4
3,156,007 >>> mbox cmd response data (687 bytes)
3,156,008 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,431 UART: [rt]cmd =0x43455246, len=4
3,197,310 >>> mbox cmd response data (887 bytes)
3,197,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,510 UART: [rt]cmd =0x43455252, len=4
3,237,184 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 870.17s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,648 UART: [idev] CSR uploaded
1,299,693 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,299,862 UART: [idev] --
1,301,061 UART: [ldev] ++
1,301,229 UART: [ldev] CDI.KEYID = 6
1,301,593 UART: [ldev] SUBJECT.KEYID = 5
1,302,020 UART: [ldev] AUTHORITY.KEYID = 7
1,302,483 UART: [ldev] FE.KEYID = 1
1,307,663 UART: [ldev] Erasing FE.KEYID = 1
1,333,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,107 UART: [ldev] --
1,373,383 UART: [fwproc] Wait for Commands...
1,374,020 UART: [fwproc] Recv command 0x46574c44
1,374,753 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,861,818 >>> mbox cmd response: success
2,863,069 UART: [afmc] ++
2,863,237 UART: [afmc] CDI.KEYID = 6
2,863,600 UART: [afmc] SUBJECT.KEYID = 7
2,864,026 UART: [afmc] AUTHORITY.KEYID = 5
2,899,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,978 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,746 UART: [afmc] --
2,942,718 UART: [cold-reset] --
2,943,486 UART: [state] Locking Datavault
2,944,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,189 UART: [state] Locking ICCM
2,945,755 UART: [exit] Launching FMC @ 0x40000130
2,951,084 UART:
2,951,100 UART: Running Caliptra FMC ...
2,951,508 UART:
2,951,562 UART: [state] CFI Enabled
2,961,949 UART: [fht] FMC Alias Private Key: 7
3,070,074 UART: [art] Extend RT PCRs Done
3,070,502 UART: [art] Lock RT PCRs Done
3,072,158 UART: [art] Populate DV Done
3,080,425 UART: [fht] FMC Alias Private Key: 7
3,081,571 UART: [art] Derive CDI
3,081,851 UART: [art] Store in in slot 0x4
3,167,162 UART: [art] Derive Key Pair
3,167,522 UART: [art] Store priv key in slot 0x5
3,180,706 UART: [art] Derive Key Pair - Done
3,195,206 UART: [art] Signing Cert with AUTHO
3,195,686 UART: RITY.KEYID = 7
3,211,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,807 UART: [art] PUB.X = 95433CF69699999A9926F041569550CB9E97EB75A227B20B650657DA9C96C8FBB0F4835FD103DE6186AE16543D510558
3,218,557 UART: [art] PUB.Y = CBF4EDD3912ACBA0100436936518595A1D491FCAAE068038403E9DDBBEC6A66927FDFB587B372A372C23509A4932B65D
3,225,509 UART: [art] SIG.R = 6FFE5F0BB6F80B01B04F14B93584F9DC765DDDE40CE9A79F14571D7DC81D25CE23254A3F91840DF7F8ACB76E9D3AF520
3,232,282 UART: [art] SIG.S = 7D4F23265BEB8E12BFF90C2582413E702B3610B8772EEA8A843618BC4A875BFE5DDABE15AF998A9F4A19AFE570BFA9CA
3,256,024 UART: Caliptra RT
3,256,277 UART: [state] CFI Enabled
3,363,788 UART: [rt] RT listening for mailbox commands...
3,364,458 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,154 UART: [rt]cmd =0x4c444556, len=4
3,404,737 >>> mbox cmd response data (687 bytes)
3,404,738 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,977 UART: [rt]cmd =0x43455246, len=4
3,446,178 >>> mbox cmd response data (887 bytes)
3,446,179 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,386 UART: [rt]cmd =0x43455252, len=4
3,486,218 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,888 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,172,995 UART: [idev] ++
1,173,163 UART: [idev] CDI.KEYID = 6
1,173,524 UART: [idev] SUBJECT.KEYID = 7
1,173,949 UART: [idev] UDS.KEYID = 0
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,237 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] CSR upload begun
1,209,346 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,331 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,039 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,924 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,630 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,059 UART: [idev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
1,297,556 UART: [idev] CSR uploaded
1,300,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,770 UART: [idev] --
1,301,799 UART: [ldev] ++
1,301,967 UART: [ldev] CDI.KEYID = 6
1,302,331 UART: [ldev] SUBJECT.KEYID = 5
1,302,758 UART: [ldev] AUTHORITY.KEYID = 7
1,303,221 UART: [ldev] FE.KEYID = 1
1,308,525 UART: [ldev] Erasing FE.KEYID = 1
1,335,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,517 UART: [ldev] --
1,374,839 UART: [fwproc] Wait for Commands...
1,375,564 UART: [fwproc] Recv command 0x46574c44
1,376,297 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,863,196 >>> mbox cmd response: success
2,864,445 UART: [afmc] ++
2,864,613 UART: [afmc] CDI.KEYID = 6
2,864,976 UART: [afmc] SUBJECT.KEYID = 7
2,865,402 UART: [afmc] AUTHORITY.KEYID = 5
2,900,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,090 UART: [afmc] --
2,944,060 UART: [cold-reset] --
2,944,954 UART: [state] Locking Datavault
2,946,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,833 UART: [state] Locking ICCM
2,947,463 UART: [exit] Launching FMC @ 0x40000130
2,952,792 UART:
2,952,808 UART: Running Caliptra FMC ...
2,953,216 UART:
2,953,270 UART: [state] CFI Enabled
2,963,985 UART: [fht] FMC Alias Private Key: 7
3,071,618 UART: [art] Extend RT PCRs Done
3,072,046 UART: [art] Lock RT PCRs Done
3,073,476 UART: [art] Populate DV Done
3,081,861 UART: [fht] FMC Alias Private Key: 7
3,082,823 UART: [art] Derive CDI
3,083,103 UART: [art] Store in in slot 0x4
3,168,848 UART: [art] Derive Key Pair
3,169,208 UART: [art] Store priv key in slot 0x5
3,182,156 UART: [art] Derive Key Pair - Done
3,196,973 UART: [art] Signing Cert with AUTHO
3,197,453 UART: RITY.KEYID = 7
3,212,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,684 UART: [art] PUB.X = AE2000DDFA14242BD897311656984048BBA7E902550ACDEBF5AEED06CB9A46540A282ED7BC35838536472AB719911E26
3,220,424 UART: [art] PUB.Y = 2B99B11C5ACA274A8A45F26C03626AEE836AF07E723CBA87EAFDE199D8D013132D609C0702827C266E2D17A032916716
3,227,367 UART: [art] SIG.R = 367842C201B50135FC9DC3CF9D7A15CF9542A1D30EA90AF9D2EA074F23CC3546DCD9602B99DCFF6ACA259683A09664BB
3,234,136 UART: [art] SIG.S = 8D9A4621E3D8984DBEA8FA23446BA55D38B882BE491D4EE1BAEF1BC3D7C530D5781AAC32365EBB6C212FE2C9E1D2E06E
3,258,031 UART: Caliptra RT
3,258,284 UART: [state] CFI Enabled
3,365,889 UART: [rt] RT listening for mailbox commands...
3,366,559 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,111 UART: [rt]cmd =0x4c444556, len=4
3,406,350 >>> mbox cmd response data (687 bytes)
3,406,351 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,784 UART: [rt]cmd =0x43455246, len=4
3,447,891 >>> mbox cmd response data (887 bytes)
3,447,892 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,409 UART: [rt]cmd =0x43455252, len=4
3,488,469 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 892.88s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,819,613 UART: [art] Lock RT PCRs Done
2,821,193 UART: [art] Populate DV Done
2,829,288 UART: [fht] FMC Alias Private Key: 7
2,830,424 UART: [art] Derive CDI
2,830,704 UART: [art] Store in in slot 0x4
2,916,507 UART: [art] Derive Key Pair
2,916,867 UART: [art] Store priv key in slot 0x5
2,929,697 UART: [art] Derive Key Pair - Done
2,944,204 UART: [art] Signing Cert with AUTHO
2,944,684 UART: RITY.KEYID = 7
2,959,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,037 UART: [art] PUB.X = 786C55EFC574818A60863692A66138E42ED05C7FDAB745100566A5CC757266A4AA79DDC71108231F7F0574980E012A9F
2,966,786 UART: [art] PUB.Y = 2696695287B4244671A3BC980D1BED4F2FB0393A52BB11F5F7172EE3654E9B5D670D8048DF34F8690627120C40006982
2,973,692 UART: [art] SIG.R = 4FE3DC7E04B34F847A61E5AEF0B5D35F6EB019C1A1D51A4E8C7609B9A56DF75918D29AE72F030E366D0C8DB17DC553D7
2,980,463 UART: [art] SIG.S = B81A4DEAB74179B147BDF16E21AC54332092D1034B1F0C4E3B714841EE83CFE7CE65397B2F401C71AE813791E8C30644
3,004,995 UART: Caliptra RT
3,005,248 UART: [state] CFI Enabled
3,114,009 UART: [rt] RT listening for mailbox commands...
3,114,679 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,349 UART: [rt]cmd =0x4c444556, len=4
3,154,778 >>> mbox cmd response data (687 bytes)
3,154,779 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,036 UART: [rt]cmd =0x43455246, len=4
3,196,083 >>> mbox cmd response data (887 bytes)
3,196,084 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,239 UART: [rt]cmd =0x43455252, len=4
3,235,955 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,704 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,634,881 >>> mbox cmd response: success
2,696,967 UART:
2,696,983 UART: Running Caliptra FMC ...
2,697,391 UART:
2,697,445 UART: [state] CFI Enabled
2,707,902 UART: [fht] FMC Alias Private Key: 7
2,815,679 UART: [art] Extend RT PCRs Done
2,816,107 UART: [art] Lock RT PCRs Done
2,817,695 UART: [art] Populate DV Done
2,825,852 UART: [fht] FMC Alias Private Key: 7
2,826,850 UART: [art] Derive CDI
2,827,130 UART: [art] Store in in slot 0x4
2,912,205 UART: [art] Derive Key Pair
2,912,565 UART: [art] Store priv key in slot 0x5
2,925,553 UART: [art] Derive Key Pair - Done
2,940,442 UART: [art] Signing Cert with AUTHO
2,940,922 UART: RITY.KEYID = 7
2,955,780 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,545 UART: [art] PUB.X = A5C157DA58638D0D305142C7D534026077BB01DE501B343760072AE3F2AEA9182D15FB7A4459D61BB840FB413A483012
2,963,299 UART: [art] PUB.Y = 864170E1261CB01CCB4F949B397154189DFA870BFD3A1AD4757D05AD1DFD5BC9B5E7D1880F858DC37067210BB077B5AA
2,970,247 UART: [art] SIG.R = DCBC97353F221099C5BF0BF4513CD64F14AF8EA2743D70E7F68A9780FE516F2A8F851D423A537074687F9711735AA692
2,977,014 UART: [art] SIG.S = 4483561EEB39CEE91795318D84D8F0FBFA98C02265B1176999D7BD33517287A5334D0F45AD76B7FA611395683B20E225
3,000,556 UART: Caliptra RT
3,000,809 UART: [state] CFI Enabled
3,108,198 UART: [rt] RT listening for mailbox commands...
3,108,868 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,128 UART: [rt]cmd =0x4c444556, len=4
3,149,539 >>> mbox cmd response data (687 bytes)
3,149,540 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,159 UART: [rt]cmd =0x43455246, len=4
3,191,292 >>> mbox cmd response data (887 bytes)
3,191,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,916 UART: [rt]cmd =0x43455252, len=4
3,231,788 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,268 >>> mbox cmd response: success
2,701,396 UART:
2,701,412 UART: Running Caliptra FMC ...
2,701,820 UART:
2,701,874 UART: [state] CFI Enabled
2,712,529 UART: [fht] FMC Alias Private Key: 7
2,820,584 UART: [art] Extend RT PCRs Done
2,821,012 UART: [art] Lock RT PCRs Done
2,822,616 UART: [art] Populate DV Done
2,830,779 UART: [fht] FMC Alias Private Key: 7
2,831,729 UART: [art] Derive CDI
2,832,009 UART: [art] Store in in slot 0x4
2,917,734 UART: [art] Derive Key Pair
2,918,094 UART: [art] Store priv key in slot 0x5
2,931,576 UART: [art] Derive Key Pair - Done
2,946,368 UART: [art] Signing Cert with AUTHO
2,946,848 UART: RITY.KEYID = 7
2,962,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,037 UART: [art] PUB.X = 4C9D2FA7A597FF22B09CD3C2E6096AEA75E99AEDDE84038820B609D328A25A62593383E8E42F58D6070FFCFCEB250546
2,969,799 UART: [art] PUB.Y = 799A3E6647B12EEEC47A84CC05D4751C5295BA4BEBFA92ED5DEA04E926165871DE1BCC4917187A23D70D18A79BD46133
2,976,750 UART: [art] SIG.R = E8A8F5C6C2BAD1FFDB367FFE1D37F19104F564269A1BE0D9D7280B27847FB295B339B8246433CE4BF3A160888FA9FDCA
2,983,530 UART: [art] SIG.S = 5B35156387FA442A3BE273B475BD8C639225308BEA36A1B9532F6C60C6CD83236B33A6A595AEBCD477BAA3055AB21574
3,006,920 UART: Caliptra RT
3,007,173 UART: [state] CFI Enabled
3,114,196 UART: [rt] RT listening for mailbox commands...
3,114,866 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,484 UART: [rt]cmd =0x4c444556, len=4
3,154,925 >>> mbox cmd response data (687 bytes)
3,154,926 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,301 UART: [rt]cmd =0x43455246, len=4
3,196,120 >>> mbox cmd response data (887 bytes)
3,196,121 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,698 UART: [rt]cmd =0x43455252, len=4
3,236,342 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,433 >>> mbox cmd response: success
2,700,337 UART:
2,700,353 UART: Running Caliptra FMC ...
2,700,761 UART:
2,700,815 UART: [state] CFI Enabled
2,711,180 UART: [fht] FMC Alias Private Key: 7
2,818,669 UART: [art] Extend RT PCRs Done
2,819,097 UART: [art] Lock RT PCRs Done
2,820,611 UART: [art] Populate DV Done
2,829,032 UART: [fht] FMC Alias Private Key: 7
2,830,026 UART: [art] Derive CDI
2,830,306 UART: [art] Store in in slot 0x4
2,915,961 UART: [art] Derive Key Pair
2,916,321 UART: [art] Store priv key in slot 0x5
2,929,279 UART: [art] Derive Key Pair - Done
2,944,318 UART: [art] Signing Cert with AUTHO
2,944,798 UART: RITY.KEYID = 7
2,959,942 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,707 UART: [art] PUB.X = 2613128CBAFCE09481B92F02591AEBA94E7111B030DDFA4543B48DFC599F84A2DEDABA1FD3ED2D6104C88C17ACC4F0F1
2,967,493 UART: [art] PUB.Y = F14CE3F9ED5CF63BFB9C4221CFB9B17EA3F988A6687F634F5975B2C86FA8F5C1D74F3B68B8EA8DD2163346340448B36A
2,974,454 UART: [art] SIG.R = 1F0BD305EFC20BC76E0EB18C7C8F66338A554400A6F19885082C965EACB064DC0EF97C6AC56BA472F520A157FB35B3A1
2,981,196 UART: [art] SIG.S = B59F4BD6EB4C01FAE28066077E3E118DB1CED160D5A1BD66C9AF7FD3A6F737BD3DD4EEA5F0565A9164CADB9F075266E7
3,004,814 UART: Caliptra RT
3,005,067 UART: [state] CFI Enabled
3,112,820 UART: [rt] RT listening for mailbox commands...
3,113,490 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,152 UART: [rt]cmd =0x4c444556, len=4
3,153,619 >>> mbox cmd response data (687 bytes)
3,153,620 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,791 UART: [rt]cmd =0x43455246, len=4
3,194,894 >>> mbox cmd response data (887 bytes)
3,194,895 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,360 UART: [rt]cmd =0x43455252, len=4
3,235,086 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,423 >>> mbox cmd response: success
2,701,913 UART:
2,701,929 UART: Running Caliptra FMC ...
2,702,337 UART:
2,702,391 UART: [state] CFI Enabled
2,712,956 UART: [fht] FMC Alias Private Key: 7
2,820,639 UART: [art] Extend RT PCRs Done
2,821,067 UART: [art] Lock RT PCRs Done
2,822,855 UART: [art] Populate DV Done
2,831,258 UART: [fht] FMC Alias Private Key: 7
2,832,296 UART: [art] Derive CDI
2,832,576 UART: [art] Store in in slot 0x4
2,918,117 UART: [art] Derive Key Pair
2,918,477 UART: [art] Store priv key in slot 0x5
2,931,335 UART: [art] Derive Key Pair - Done
2,945,796 UART: [art] Signing Cert with AUTHO
2,946,276 UART: RITY.KEYID = 7
2,961,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,515 UART: [art] PUB.X = BF1A5C859C7C29A208D2602E33248A41AEB69E847A09FB0E088D383746B500828C34E365E9726C2F0A144E74EA9003CE
2,969,245 UART: [art] PUB.Y = 2683D464995B2574DE2063FB3A599E4A35B0C4656FF856B7B6782104179BBA6EC15C30C4BAC028E5D1A777388CBC63F0
2,976,194 UART: [art] SIG.R = 7FFEC219AB88BE60E34988F3A4A814EEFA68AAD812065A49266AF2B90B37B191501BE11B438EAD8096C48CBC5E64B3E5
2,982,972 UART: [art] SIG.S = BBE056461655D1DD47239DA3694F478D167B574624A570663E1FEAAA0297613DD36F461D8FEA9D90B944B6EF2D74F448
3,007,248 UART: Caliptra RT
3,007,501 UART: [state] CFI Enabled
3,115,232 UART: [rt] RT listening for mailbox commands...
3,115,902 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,432 UART: [rt]cmd =0x4c444556, len=4
3,155,691 >>> mbox cmd response data (687 bytes)
3,155,692 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,067 UART: [rt]cmd =0x43455246, len=4
3,197,050 >>> mbox cmd response data (887 bytes)
3,197,051 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,246 UART: [rt]cmd =0x43455252, len=4
3,237,212 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 858.89s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,053 UART: [idev] CSR uploaded
1,300,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,267 UART: [idev] --
1,301,328 UART: [ldev] ++
1,301,496 UART: [ldev] CDI.KEYID = 6
1,301,860 UART: [ldev] SUBJECT.KEYID = 5
1,302,287 UART: [ldev] AUTHORITY.KEYID = 7
1,302,750 UART: [ldev] FE.KEYID = 1
1,307,952 UART: [ldev] Erasing FE.KEYID = 1
1,334,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,844 UART: [ldev] --
1,374,164 UART: [fwproc] Wait for Commands...
1,374,771 UART: [fwproc] Recv command 0x46574c44
1,375,504 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,519 >>> mbox cmd response: success
2,863,712 UART: [afmc] ++
2,863,880 UART: [afmc] CDI.KEYID = 6
2,864,243 UART: [afmc] SUBJECT.KEYID = 7
2,864,669 UART: [afmc] AUTHORITY.KEYID = 5
2,900,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,919 UART: [afmc] --
2,943,921 UART: [cold-reset] --
2,944,961 UART: [state] Locking Datavault
2,946,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,954 UART: [state] Locking ICCM
2,947,386 UART: [exit] Launching FMC @ 0x40000130
2,952,715 UART:
2,952,731 UART: Running Caliptra FMC ...
2,953,139 UART:
2,953,282 UART: [state] CFI Enabled
2,964,057 UART: [fht] FMC Alias Private Key: 7
3,072,402 UART: [art] Extend RT PCRs Done
3,072,830 UART: [art] Lock RT PCRs Done
3,074,664 UART: [art] Populate DV Done
3,082,799 UART: [fht] FMC Alias Private Key: 7
3,083,825 UART: [art] Derive CDI
3,084,105 UART: [art] Store in in slot 0x4
3,170,078 UART: [art] Derive Key Pair
3,170,438 UART: [art] Store priv key in slot 0x5
3,183,226 UART: [art] Derive Key Pair - Done
3,197,912 UART: [art] Signing Cert with AUTHO
3,198,392 UART: RITY.KEYID = 7
3,213,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,169 UART: [art] PUB.X = E415462F80E8EF8D14C2AE3AB5A93ECC04DCE8630FE0669026F049B40232F4D5CA98DB34E10157425FDC91DCFED2BD6B
3,220,945 UART: [art] PUB.Y = 36E43EA3B047DF94365D40B771F0678A0254300B84AF0C43314CC2CB1CCC469B6285169AB4C8B7A661538B5119113863
3,227,880 UART: [art] SIG.R = 9AE4E55C428B9C5A87DCCD23EC1A8162F92E85431BB0FCB9A0314DCE0D878B0AD74090C742E42CD742A3BC8034B9045A
3,234,655 UART: [art] SIG.S = 4946F3CF032DABB161CF5C69074FC03B1BB00F1F5F22A61D0BBD32E15D18F09AF2E47D01B65300FEBDC5FF07B3E1FBE8
3,258,846 UART: Caliptra RT
3,259,191 UART: [state] CFI Enabled
3,366,176 UART: [rt] RT listening for mailbox commands...
3,366,846 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,664 UART: [rt]cmd =0x4c444556, len=4
3,407,107 >>> mbox cmd response data (687 bytes)
3,407,108 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,391 UART: [rt]cmd =0x43455246, len=4
3,448,386 >>> mbox cmd response data (887 bytes)
3,448,387 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,700 UART: [rt]cmd =0x43455252, len=4
3,488,558 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,200,206 UART: [idev] Sha1 KeyId Algorithm
1,208,600 UART: [idev] CSR upload begun
1,210,379 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,352 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,060 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,945 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,651 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,080 UART: [idev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
1,298,577 UART: [idev] CSR uploaded
1,301,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,301,791 UART: [idev] --
1,302,822 UART: [ldev] ++
1,302,990 UART: [ldev] CDI.KEYID = 6
1,303,354 UART: [ldev] SUBJECT.KEYID = 5
1,303,781 UART: [ldev] AUTHORITY.KEYID = 7
1,304,244 UART: [ldev] FE.KEYID = 1
1,309,920 UART: [ldev] Erasing FE.KEYID = 1
1,336,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,308 UART: [ldev] --
1,375,632 UART: [fwproc] Wait for Commands...
1,376,343 UART: [fwproc] Recv command 0x46574c44
1,377,076 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,483 >>> mbox cmd response: success
2,863,538 UART: [afmc] ++
2,863,706 UART: [afmc] CDI.KEYID = 6
2,864,069 UART: [afmc] SUBJECT.KEYID = 7
2,864,495 UART: [afmc] AUTHORITY.KEYID = 5
2,899,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,862 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,499 UART: [afmc] --
2,943,559 UART: [cold-reset] --
2,944,683 UART: [state] Locking Datavault
2,945,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,256 UART: [state] Locking ICCM
2,946,822 UART: [exit] Launching FMC @ 0x40000130
2,952,151 UART:
2,952,167 UART: Running Caliptra FMC ...
2,952,575 UART:
2,952,718 UART: [state] CFI Enabled
2,963,331 UART: [fht] FMC Alias Private Key: 7
3,071,360 UART: [art] Extend RT PCRs Done
3,071,788 UART: [art] Lock RT PCRs Done
3,073,132 UART: [art] Populate DV Done
3,081,673 UART: [fht] FMC Alias Private Key: 7
3,082,841 UART: [art] Derive CDI
3,083,121 UART: [art] Store in in slot 0x4
3,169,008 UART: [art] Derive Key Pair
3,169,368 UART: [art] Store priv key in slot 0x5
3,182,400 UART: [art] Derive Key Pair - Done
3,196,614 UART: [art] Signing Cert with AUTHO
3,197,094 UART: RITY.KEYID = 7
3,212,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,311 UART: [art] PUB.X = 2E57C02831EF636FC4AC3B4EB33F83E6FA61229827C19E97F0B1E2D3358C310542976722725E28CCDF3FCFE3BA04BA1D
3,220,085 UART: [art] PUB.Y = C66B3FB09B21AA57BF414D7373ED2E4D2CE7D8D0BA0BE49C7BCDB25A30FCFCB7D8E723F9F26302509170148992C78FB3
3,227,047 UART: [art] SIG.R = 10640A2D26CA130EEAEFC873C2FE51A19EF7338CD2A81A3E8BE1BA15B7CBBE6585E4B9AB438C18822B01B1C71D0D52E0
3,233,825 UART: [art] SIG.S = 63950AF41F774562AE17F7FBC794BE3AC0D322F550B924F00E611192FB4336491099164B347E78F2996602B27489BC65
3,258,039 UART: Caliptra RT
3,258,384 UART: [state] CFI Enabled
3,366,357 UART: [rt] RT listening for mailbox commands...
3,367,027 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,915 UART: [rt]cmd =0x4c444556, len=4
3,407,296 >>> mbox cmd response data (687 bytes)
3,407,297 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,624 UART: [rt]cmd =0x43455246, len=4
3,448,799 >>> mbox cmd response data (887 bytes)
3,448,800 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,143 UART: [rt]cmd =0x43455252, len=4
3,488,827 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 888.98s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,821,173 UART: [art] Lock RT PCRs Done
2,822,995 UART: [art] Populate DV Done
2,831,266 UART: [fht] FMC Alias Private Key: 7
2,832,406 UART: [art] Derive CDI
2,832,686 UART: [art] Store in in slot 0x4
2,918,405 UART: [art] Derive Key Pair
2,918,765 UART: [art] Store priv key in slot 0x5
2,932,387 UART: [art] Derive Key Pair - Done
2,947,019 UART: [art] Signing Cert with AUTHO
2,947,499 UART: RITY.KEYID = 7
2,962,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,458 UART: [art] PUB.X = 0F706BCDC13CCE5F66CC2D0F9F77A8BFBC855343C181ECC2E191C0B2D4BCF7B10DC39FE01636CC6FE3F9970720C6BC23
2,970,240 UART: [art] PUB.Y = 7F7D811807F605F38A1949B5E726F05134582DF1E9B6C3DC5F7D5179D16070501415162ED8422E1F2049B6F3044CCA5B
2,977,175 UART: [art] SIG.R = DA96444806767A27E662040DF782C1F5FFA2B37E5FE04548058657796E66D11F8C153EDD15D5B8CB53EFE0763917C68E
2,983,933 UART: [art] SIG.S = 4C846D26FE1E231752E7909DA63DE3EA17383FD8133551B216BFEF3C18B134FE2E11F9E0D94A905CBD13909B44C9246E
3,007,864 UART: Caliptra RT
3,008,209 UART: [state] CFI Enabled
3,116,466 UART: [rt] RT listening for mailbox commands...
3,117,136 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,202 UART: [rt]cmd =0x4c444556, len=4
3,157,825 >>> mbox cmd response data (687 bytes)
3,157,826 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,209 UART: [rt]cmd =0x43455246, len=4
3,199,334 >>> mbox cmd response data (887 bytes)
3,199,335 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,766 UART: [rt]cmd =0x43455252, len=4
3,239,684 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,772 >>> mbox cmd response: success
2,701,790 UART:
2,701,806 UART: Running Caliptra FMC ...
2,702,214 UART:
2,702,357 UART: [state] CFI Enabled
2,712,932 UART: [fht] FMC Alias Private Key: 7
2,820,955 UART: [art] Extend RT PCRs Done
2,821,383 UART: [art] Lock RT PCRs Done
2,822,549 UART: [art] Populate DV Done
2,830,782 UART: [fht] FMC Alias Private Key: 7
2,831,818 UART: [art] Derive CDI
2,832,098 UART: [art] Store in in slot 0x4
2,918,057 UART: [art] Derive Key Pair
2,918,417 UART: [art] Store priv key in slot 0x5
2,931,725 UART: [art] Derive Key Pair - Done
2,946,536 UART: [art] Signing Cert with AUTHO
2,947,016 UART: RITY.KEYID = 7
2,962,366 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,131 UART: [art] PUB.X = 269EA42B17F441D1FC35AF4455E3B961659C7BA494518B87A354F73238FCA101E482864F1DA3CA7FCB5223938A78DA6D
2,969,902 UART: [art] PUB.Y = D8D969072A9CD8D2A017AF0B6F00F787B2CBD95CDC05960DADEF19245869B2A32CC4E733A1B811E3F7B965AA7F32EB60
2,976,834 UART: [art] SIG.R = 11ADACBD2EA92C430E60D860349F197FCEAEE95146A0EB735C40A7B3C0DEC8B9775AECA16CF2C350D2D834B3F90E380C
2,983,617 UART: [art] SIG.S = 44D25B83DC04B54505B234BFB72AB6D8F829C0B9B5CD353E8C10415834A13FC0D4A677BFEAAB8A6FC0728C3F87830A7F
3,007,403 UART: Caliptra RT
3,007,748 UART: [state] CFI Enabled
3,114,471 UART: [rt] RT listening for mailbox commands...
3,115,141 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,951 UART: [rt]cmd =0x4c444556, len=4
3,155,374 >>> mbox cmd response data (687 bytes)
3,155,375 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,714 UART: [rt]cmd =0x43455246, len=4
3,196,581 >>> mbox cmd response data (887 bytes)
3,196,582 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,037 UART: [rt]cmd =0x43455252, len=4
3,236,643 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,350 >>> mbox cmd response: success
2,700,900 UART:
2,700,916 UART: Running Caliptra FMC ...
2,701,324 UART:
2,701,467 UART: [state] CFI Enabled
2,711,962 UART: [fht] FMC Alias Private Key: 7
2,819,821 UART: [art] Extend RT PCRs Done
2,820,249 UART: [art] Lock RT PCRs Done
2,821,683 UART: [art] Populate DV Done
2,829,790 UART: [fht] FMC Alias Private Key: 7
2,830,852 UART: [art] Derive CDI
2,831,132 UART: [art] Store in in slot 0x4
2,916,503 UART: [art] Derive Key Pair
2,916,863 UART: [art] Store priv key in slot 0x5
2,930,283 UART: [art] Derive Key Pair - Done
2,945,046 UART: [art] Signing Cert with AUTHO
2,945,526 UART: RITY.KEYID = 7
2,960,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,517 UART: [art] PUB.X = FE31B6B3D61351D1249B99FE535B86D0561C8727B640E7E3FF3BB9D06B623639EED6D28ED07E6D316C41B5C49E121BE3
2,968,295 UART: [art] PUB.Y = 1605A6C29AE057F6988DC34DC8C1E796E56F9ACA05A2C191D74B709426C86250CA063616605517FCEF9C6D47F3C49521
2,975,236 UART: [art] SIG.R = AC3D80C799062E721FC66180D9ABA07176E4939228A82E9A6F419ED992B0174BE9CFFF820DC407050232510584656F8B
2,981,984 UART: [art] SIG.S = AAD93807EC05BD5411DA2BAB2F6C7BB5712063877A74BDC6EDBD5BF5AF489A82982FF50F27865E3863A986A4082093A1
3,005,739 UART: Caliptra RT
3,006,084 UART: [state] CFI Enabled
3,114,496 UART: [rt] RT listening for mailbox commands...
3,115,166 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,702 UART: [rt]cmd =0x4c444556, len=4
3,155,091 >>> mbox cmd response data (687 bytes)
3,155,092 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,515 UART: [rt]cmd =0x43455246, len=4
3,196,676 >>> mbox cmd response data (887 bytes)
3,196,677 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,826 UART: [rt]cmd =0x43455252, len=4
3,236,679 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,637,676 >>> mbox cmd response: success
2,699,886 UART:
2,699,902 UART: Running Caliptra FMC ...
2,700,310 UART:
2,700,453 UART: [state] CFI Enabled
2,710,834 UART: [fht] FMC Alias Private Key: 7
2,819,571 UART: [art] Extend RT PCRs Done
2,819,999 UART: [art] Lock RT PCRs Done
2,821,451 UART: [art] Populate DV Done
2,829,556 UART: [fht] FMC Alias Private Key: 7
2,830,580 UART: [art] Derive CDI
2,830,860 UART: [art] Store in in slot 0x4
2,916,111 UART: [art] Derive Key Pair
2,916,471 UART: [art] Store priv key in slot 0x5
2,929,861 UART: [art] Derive Key Pair - Done
2,944,613 UART: [art] Signing Cert with AUTHO
2,945,093 UART: RITY.KEYID = 7
2,960,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,480 UART: [art] PUB.X = B4A825ACEF4472540A6830DE6A6DDF967CD77B5BB86A87D5F6EF6CD6F06DFAAE9DE8D949AB8641175964F200678CAEEF
2,968,247 UART: [art] PUB.Y = BEB3F94F9475E4E5E27B4D52A8A5C951089E6A0E9134DCDA0DD079F05F9D34F7B32D96E5BED606CD7FFD4FAEDEEEA84A
2,975,215 UART: [art] SIG.R = DB27C930470F11BB1CA9CDB54D6210D9889DADA027B4E50F225636F0080E505539F6FF69B2017419313F49C7F126999F
2,981,968 UART: [art] SIG.S = EE761E2AA9B1C3A56618663D5D67E4F68C6E5517735EF42D606EEEE03A6541010BA629EA0268550901C021EB17481131
3,005,932 UART: Caliptra RT
3,006,277 UART: [state] CFI Enabled
3,114,473 UART: [rt] RT listening for mailbox commands...
3,115,143 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,339 UART: [rt]cmd =0x4c444556, len=4
3,155,734 >>> mbox cmd response data (687 bytes)
3,155,735 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,946 UART: [rt]cmd =0x43455246, len=4
3,197,019 >>> mbox cmd response data (887 bytes)
3,197,020 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,361 UART: [rt]cmd =0x43455252, len=4
3,237,126 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,090 >>> mbox cmd response: success
2,700,722 UART:
2,700,738 UART: Running Caliptra FMC ...
2,701,146 UART:
2,701,289 UART: [state] CFI Enabled
2,711,550 UART: [fht] FMC Alias Private Key: 7
2,819,823 UART: [art] Extend RT PCRs Done
2,820,251 UART: [art] Lock RT PCRs Done
2,821,893 UART: [art] Populate DV Done
2,830,172 UART: [fht] FMC Alias Private Key: 7
2,831,304 UART: [art] Derive CDI
2,831,584 UART: [art] Store in in slot 0x4
2,917,047 UART: [art] Derive Key Pair
2,917,407 UART: [art] Store priv key in slot 0x5
2,930,987 UART: [art] Derive Key Pair - Done
2,946,242 UART: [art] Signing Cert with AUTHO
2,946,722 UART: RITY.KEYID = 7
2,961,864 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,629 UART: [art] PUB.X = 006ACACA00257556F0A3951D8BA797928476CD14B549609D4EF5EA816DAABB9BEA15C5EF647572D3E11AB5E3C8197035
2,969,363 UART: [art] PUB.Y = E1ED751EC17326F61FB49DE2596353036AE0AA31ED97290D3AF247C9DBB3B62728530DE330B75472D2D2A1F104B66352
2,976,303 UART: [art] SIG.R = 6F0FA8772D8E10DE7D1E2373663A94409A4616AB47C28A3FD4213E4A11F3CB9B539DA924169F15FBBA7BE2715513FEA5
2,983,078 UART: [art] SIG.S = 1519EFD235F1DF93314DA804047BC209798F5F270275D3D16BE4471053B73DA1578A98D7390C37793DA484B968FE228A
3,007,080 UART: Caliptra RT
3,007,425 UART: [state] CFI Enabled
3,115,450 UART: [rt] RT listening for mailbox commands...
3,116,120 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,140 UART: [rt]cmd =0x4c444556, len=4
3,156,603 >>> mbox cmd response data (687 bytes)
3,156,604 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,255 UART: [rt]cmd =0x43455246, len=4
3,198,296 >>> mbox cmd response data (887 bytes)
3,198,297 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,408 UART: [rt]cmd =0x43455252, len=4
3,238,404 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 871.71s
Truncated 9072 bytes from beginning
24,261,173 UART: [state] Locking Datavault
24,265,019 UART: [state] Locking PCR0, PCR1 and PCR31
24,266,718 UART: [state] Locking ICCM
24,268,110 UART: [exit] Launching FMC @ 0x40000130
24,276,776 UART:
24,277,007 UART: Running Caliptra FMC ...
24,278,110 UART:
24,278,263 UART: [state] CFI Enabled
24,342,139 UART: [fht] FMC Alias Private Key: 7
26,680,846 UART: [art] Extend RT PCRs Done
26,682,065 UART: [art] Lock RT PCRs Done
26,683,739 UART: [art] Populate DV Done
26,689,041 UART: [fht] FMC Alias Private Key: 7
26,690,586 UART: [art] Derive CDI
26,691,319 UART: [art] Store in in slot 0x4
26,751,053 UART: [art] Derive Key Pair
26,752,088 UART: [art] Store priv key in slot 0x5
30,045,613 UART: [art] Derive Key Pair - Done
30,058,450 UART: [art] Signing Cert with AUTHO
30,059,749 UART: RITY.KEYID = 7
32,347,541 UART: [art] Erasing AUTHORITY.KEYID = 7
32,349,049 UART: [art] PUB.X = 057BA50AF002752F000DEA2CD3D3A6B173E9AAC8DF9CCB1A7A56BF2D8421D3A4E914051B66FC2878AAA29A2B0EBAF6C3
32,356,348 UART: [art] PUB.Y = 0A7EE2A5A335B912645F31A6F20D93624ED6D9BA7CBA616040272ED940C1896D8E36C920BB08C3D89F6E52FFFA42EAE4
32,363,627 UART: [art] SIG.R = 20371430E9E772902799B46E5493ACC24565EEFBD1DE104438D2C8CC3C7FE184A192E5C4F287F6F21B1DCA3FB48EEC55
32,371,010 UART: [art] SIG.S = 52FEBE34E1BA50CED305B41AB8D1C7EEA1BDB265049BB0C6D4551B406E660624F48D619FEACE1C185A314AB65E8DC79B
33,676,400 UART: Caliptra RT
33,677,099 UART: [state] CFI Enabled
33,837,863 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
4,685 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,070 UART:
192,519 UART: Running Caliptra ROM ...
193,602 UART:
193,749 UART: [state] CFI Enabled
263,390 UART: [state] LifecycleState = Unprovisioned
265,802 UART: [state] DebugLocked = No
267,717 UART: [state] WD Timer not started. Device not locked for debugging
272,251 UART: [kat] SHA2-256
454,150 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,703 UART: [kat] ++
466,183 UART: [kat] sha1
476,524 UART: [kat] SHA2-256
479,536 UART: [kat] SHA2-384
485,082 UART: [kat] SHA2-512-ACC
487,690 UART: [kat] ECC-384
3,779,718 UART: [kat] HMAC-384Kdf
3,804,089 UART: [kat] LMS
4,877,291 UART: [kat] --
4,881,788 UART: [cold-reset] ++
4,884,485 UART: [fht] FHT @ 0x50003400
4,896,715 UART: [idev] ++
4,897,445 UART: [idev] CDI.KEYID = 6
4,898,618 UART: [idev] SUBJECT.KEYID = 7
4,899,775 UART: [idev] UDS.KEYID = 0
4,931,996 UART: [idev] Erasing UDS.KEYID = 0
8,245,920 UART: [idev] Sha384 KeyId Algorithm
8,255,179 UART: [idev] --
8,259,491 UART: [ldev] ++
8,260,114 UART: [ldev] CDI.KEYID = 6
8,261,294 UART: [ldev] SUBJECT.KEYID = 5
8,262,451 UART: [ldev] AUTHORITY.KEYID = 7
8,263,679 UART: [ldev] FE.KEYID = 1
8,298,458 UART: [ldev] Erasing FE.KEYID = 1
11,632,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,947,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,964,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,979,960 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
13,995,948 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,016,620 UART: [ldev] --
14,020,586 UART: [fwproc] Wait for Commands...
14,022,736 UART: [fwproc] Recv command 0x46574c44
14,025,051 UART: [fwproc] Recv'd Img size: 113760 bytes
18,088,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,162,230 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,230,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,547,014 >>> mbox cmd response: success
18,550,825 UART: [afmc] ++
18,551,411 UART: [afmc] CDI.KEYID = 6
18,552,593 UART: [afmc] SUBJECT.KEYID = 7
18,553,769 UART: [afmc] AUTHORITY.KEYID = 5
21,929,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,510 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,245,710 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,261,729 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,277,732 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,301,653 UART: [afmc] --
24,304,811 UART: [cold-reset] --
24,309,431 UART: [state] Locking Datavault
24,315,488 UART: [state] Locking PCR0, PCR1 and PCR31
24,317,128 UART: [state] Locking ICCM
24,319,925 UART: [exit] Launching FMC @ 0x40000130
24,328,647 UART:
24,328,886 UART: Running Caliptra FMC ...
24,329,984 UART:
24,330,165 UART: [state] CFI Enabled
24,389,604 UART: [fht] FMC Alias Private Key: 7
26,727,028 UART: [art] Extend RT PCRs Done
26,728,248 UART: [art] Lock RT PCRs Done
26,729,555 UART: [art] Populate DV Done
26,734,747 UART: [fht] FMC Alias Private Key: 7
26,736,328 UART: [art] Derive CDI
26,737,136 UART: [art] Store in in slot 0x4
26,798,389 UART: [art] Derive Key Pair
26,799,422 UART: [art] Store priv key in slot 0x5
30,092,321 UART: [art] Derive Key Pair - Done
30,105,655 UART: [art] Signing Cert with AUTHO
30,106,960 UART: RITY.KEYID = 7
32,393,547 UART: [art] Erasing AUTHORITY.KEYID = 7
32,395,054 UART: [art] PUB.X = A02E22F637FA1CEAF0509772211F26D9E9BA349D749D758EAE80FC60203AFBD232EFD13CA52B9A66375B9F7CAA96C830
32,402,308 UART: [art] PUB.Y = 2A8C1FB170BF8C72E3C3958913C2A1DCC371DBC80EA9C006860FE33C7C0B1680F7CF7EA4BB44B52A6F3032CB8FABAEA2
32,409,558 UART: [art] SIG.R = 6A140E0BD456DE4A81EFEBDBF350D2F2670C9DF630348EB4B469D4320FFCC1B23ACBD4C427F8D6FFE7BF5531A9D3000F
32,416,947 UART: [art] SIG.S = 826C9626F6326F9C3DF920FA3061F640CEF562EB28218C5B3234CFB9DA82696ED41747EB2E6AB0E0A415ACF77A14AD13
33,721,696 UART: Caliptra RT
33,722,405 UART: [state] CFI Enabled
33,883,300 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
4,702 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,117 UART:
192,515 UART: Running Caliptra ROM ...
193,635 UART:
193,778 UART: [state] CFI Enabled
265,216 UART: [state] LifecycleState = Unprovisioned
267,579 UART: [state] DebugLocked = No
270,308 UART: [state] WD Timer not started. Device not locked for debugging
274,975 UART: [kat] SHA2-256
456,906 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,415 UART: [kat] ++
468,913 UART: [kat] sha1
479,631 UART: [kat] SHA2-256
482,631 UART: [kat] SHA2-384
489,853 UART: [kat] SHA2-512-ACC
492,455 UART: [kat] ECC-384
3,776,057 UART: [kat] HMAC-384Kdf
3,802,937 UART: [kat] LMS
4,876,121 UART: [kat] --
4,880,545 UART: [cold-reset] ++
4,882,641 UART: [fht] FHT @ 0x50003400
4,895,187 UART: [idev] ++
4,895,899 UART: [idev] CDI.KEYID = 6
4,897,141 UART: [idev] SUBJECT.KEYID = 7
4,898,241 UART: [idev] UDS.KEYID = 0
4,932,256 UART: [idev] Erasing UDS.KEYID = 0
8,243,850 UART: [idev] Fuse KeyId
8,248,095 UART: [idev] --
8,250,879 UART: [ldev] ++
8,251,512 UART: [ldev] CDI.KEYID = 6
8,252,720 UART: [ldev] SUBJECT.KEYID = 5
8,253,830 UART: [ldev] AUTHORITY.KEYID = 7
8,255,060 UART: [ldev] FE.KEYID = 1
8,298,982 UART: [ldev] Erasing FE.KEYID = 1
11,629,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,939,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,955,100 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
13,971,064 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
13,991,833 UART: [ldev] --
13,996,661 UART: [fwproc] Wait for Commands...
13,999,671 UART: [fwproc] Recv command 0x46574c44
14,001,657 UART: [fwproc] Recv'd Img size: 113760 bytes
18,073,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,145,995 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,214,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,530,427 >>> mbox cmd response: success
18,534,477 UART: [afmc] ++
18,535,068 UART: [afmc] CDI.KEYID = 6
18,536,258 UART: [afmc] SUBJECT.KEYID = 7
18,537,364 UART: [afmc] AUTHORITY.KEYID = 5
21,907,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,207,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,209,847 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,225,985 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,242,055 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,258,051 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,281,298 UART: [afmc] --
24,285,004 UART: [cold-reset] --
24,288,395 UART: [state] Locking Datavault
24,294,076 UART: [state] Locking PCR0, PCR1 and PCR31
24,295,776 UART: [state] Locking ICCM
24,297,891 UART: [exit] Launching FMC @ 0x40000130
24,306,563 UART:
24,306,804 UART: Running Caliptra FMC ...
24,307,906 UART:
24,308,062 UART: [state] CFI Enabled
24,368,265 UART: [fht] FMC Alias Private Key: 7
26,706,387 UART: [art] Extend RT PCRs Done
26,707,610 UART: [art] Lock RT PCRs Done
26,709,427 UART: [art] Populate DV Done
26,714,620 UART: [fht] FMC Alias Private Key: 7
26,716,102 UART: [art] Derive CDI
26,716,861 UART: [art] Store in in slot 0x4
26,777,198 UART: [art] Derive Key Pair
26,778,240 UART: [art] Store priv key in slot 0x5
30,071,821 UART: [art] Derive Key Pair - Done
30,084,866 UART: [art] Signing Cert with AUTHO
30,086,187 UART: RITY.KEYID = 7
32,372,823 UART: [art] Erasing AUTHORITY.KEYID = 7
32,374,332 UART: [art] PUB.X = 74DCF196F100FD602D64435487171F9705C30C2EBC989F8CD1AC2F3C2341DCFB85FFA45254D59D5E6F6DEBC5E1BF246F
32,381,629 UART: [art] PUB.Y = F187931B26CBC3244BD1C775315DDD1C2BD45FA111750624B37A75DC7DC8F886BCAF90B3ADE2677D2264224F53E99428
32,388,851 UART: [art] SIG.R = D431D9AEDAB3F029CFFB33A084D955E716AAD8BD9A42B781C52A2F3EA08DD497D346D36A1B285343A13337E3AEDA3540
32,396,290 UART: [art] SIG.S = 11208714E84EE57C4679A56E9F0B521FB8E31C6E9DB63C193C023B943E7EA2876F99CD84ADA029B2CA8AFC9049EDD0ED
33,701,603 UART: Caliptra RT
33,702,318 UART: [state] CFI Enabled
33,863,806 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
5,013 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,307,676 >>> mbox cmd response: success
23,998,402 UART:
23,998,809 UART: Running Caliptra FMC ...
23,999,988 UART:
24,000,150 UART: [state] CFI Enabled
24,051,385 UART: [fht] FMC Alias Private Key: 7
26,389,349 UART: [art] Extend RT PCRs Done
26,390,574 UART: [art] Lock RT PCRs Done
26,392,335 UART: [art] Populate DV Done
26,397,805 UART: [fht] FMC Alias Private Key: 7
26,399,504 UART: [art] Derive CDI
26,400,240 UART: [art] Store in in slot 0x4
26,460,098 UART: [art] Derive Key Pair
26,461,143 UART: [art] Store priv key in slot 0x5
29,754,253 UART: [art] Derive Key Pair - Done
29,767,303 UART: [art] Signing Cert with AUTHO
29,768,605 UART: RITY.KEYID = 7
32,055,954 UART: [art] Erasing AUTHORITY.KEYID = 7
32,057,461 UART: [art] PUB.X = 7D2FE330E1D3A93F02C08076C21C0101D928337938EE859034DBA1A6F21499C2BF862F1B5C8B943D9359CC5E4950B85F
32,064,671 UART: [art] PUB.Y = C962442F3A6E5847BFB20341D03DDA7307F588C39054E89744544CCF78A20B49B7FF4A569A6D2230AAACF04F0B581D8A
32,071,953 UART: [art] SIG.R = 5EDE0D6977AFD315CC9178CBA50DCF6EC03FE318DA09D3D7E303ECBB99FB528E283303C1A153263C0808CEE33D471681
32,079,310 UART: [art] SIG.S = 24A3D5D66A30D1A22FD1EA787B495DC54B0DF4E196022B157691485785E92B76C229EA184E077597338D8CD5EBC13A9A
33,384,151 UART: Caliptra RT
33,384,866 UART: [state] CFI Enabled
33,545,118 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
4,844 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,336,179 >>> mbox cmd response: success
24,034,892 UART:
24,035,325 UART: Running Caliptra FMC ...
24,036,435 UART:
24,036,589 UART: [state] CFI Enabled
24,104,601 UART: [fht] FMC Alias Private Key: 7
26,442,328 UART: [art] Extend RT PCRs Done
26,443,555 UART: [art] Lock RT PCRs Done
26,445,098 UART: [art] Populate DV Done
26,450,309 UART: [fht] FMC Alias Private Key: 7
26,451,901 UART: [art] Derive CDI
26,452,638 UART: [art] Store in in slot 0x4
26,511,895 UART: [art] Derive Key Pair
26,512,889 UART: [art] Store priv key in slot 0x5
29,805,080 UART: [art] Derive Key Pair - Done
29,818,078 UART: [art] Signing Cert with AUTHO
29,819,386 UART: RITY.KEYID = 7
32,105,958 UART: [art] Erasing AUTHORITY.KEYID = 7
32,107,475 UART: [art] PUB.X = DEA2AFB00781437F6FB978492810591DA9E59696BD0A132471DBA3A737C1F3856B44224B99C543CC7D9D8455D3E15285
32,114,686 UART: [art] PUB.Y = 591BF20D1E9E1EB2FED6EBDFBE83228D25CEDD2B8F8E481CFA9DB41EF89D2DCAA9065AF2666E19DE286B697BC458E9D8
32,122,003 UART: [art] SIG.R = 42D2D4784FF6638C0BBC536CFCACD87C357625DF154F723F8D07EDC4252214FA68A9CB2F71FCFA0C399C370CCA0F315E
32,129,363 UART: [art] SIG.S = D84BFDD3FF80C5C98B949A1D6F90D92EE3A069FB0534832B4D069CD5483A80DB2FECB54530A5A63AD7F90CA1359C2A31
33,434,384 UART: Caliptra RT
33,435,075 UART: [state] CFI Enabled
33,596,344 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
4,871 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,348,491 >>> mbox cmd response: success
24,040,174 UART:
24,040,584 UART: Running Caliptra FMC ...
24,041,775 UART:
24,041,941 UART: [state] CFI Enabled
24,108,883 UART: [fht] FMC Alias Private Key: 7
26,446,744 UART: [art] Extend RT PCRs Done
26,447,969 UART: [art] Lock RT PCRs Done
26,449,545 UART: [art] Populate DV Done
26,455,108 UART: [fht] FMC Alias Private Key: 7
26,456,654 UART: [art] Derive CDI
26,457,411 UART: [art] Store in in slot 0x4
26,517,862 UART: [art] Derive Key Pair
26,518,901 UART: [art] Store priv key in slot 0x5
29,812,042 UART: [art] Derive Key Pair - Done
29,824,926 UART: [art] Signing Cert with AUTHO
29,826,254 UART: RITY.KEYID = 7
32,113,677 UART: [art] Erasing AUTHORITY.KEYID = 7
32,115,182 UART: [art] PUB.X = 8A7893C28BFF3E4375D917291A7FA2BDE1D38524433063AF1B3EE49008B9DDA331921069DD0CC28D5A06F739EFF35689
32,122,403 UART: [art] PUB.Y = 4B389932D7E01BFA6EB215A8A4B8F08F38031287787D62BD830472A029E0AD99A0684DAA2836D2AB0F114C920D6F12AE
32,129,674 UART: [art] SIG.R = 773D683B8254716F1647F5B71A68A792A60CD94CA0D5319FDB276DBBDF6B415501F98EC02FB0875037AEDCCA238D8B2C
32,137,023 UART: [art] SIG.S = C7D9A951B65414EBA07D447FDBD38417D64B6C746547C992F8EA0C50B8DB39039B37AC6DDCCA3BE2652915B4BDA5E536
33,442,399 UART: Caliptra RT
33,443,100 UART: [state] CFI Enabled
33,605,086 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
5,254 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,361,260 >>> mbox cmd response: success
24,056,960 UART:
24,057,346 UART: Running Caliptra FMC ...
24,058,459 UART:
24,058,616 UART: [state] CFI Enabled
24,125,424 UART: [fht] FMC Alias Private Key: 7
26,462,860 UART: [art] Extend RT PCRs Done
26,464,086 UART: [art] Lock RT PCRs Done
26,465,364 UART: [art] Populate DV Done
26,470,905 UART: [fht] FMC Alias Private Key: 7
26,472,491 UART: [art] Derive CDI
26,473,254 UART: [art] Store in in slot 0x4
26,533,003 UART: [art] Derive Key Pair
26,534,050 UART: [art] Store priv key in slot 0x5
29,827,096 UART: [art] Derive Key Pair - Done
29,840,043 UART: [art] Signing Cert with AUTHO
29,841,373 UART: RITY.KEYID = 7
32,127,911 UART: [art] Erasing AUTHORITY.KEYID = 7
32,129,417 UART: [art] PUB.X = 339E6A901B17AA57D9A41942FF98A0AC37828D7A369F3BFD44DAFFF7D48DBCBD7133FF10A610531456ECA9F16B20B002
32,136,635 UART: [art] PUB.Y = 31BA6B148AE8BF9664824E1386376D80EEC499DED6092A1AF1FA8598F372885E46A008ED052022B8FAA4C79AB4175C5C
32,143,901 UART: [art] SIG.R = A91682D8593DA10927EF4C7378F6EF9874DF033BE0CB8BD8E3B6E7CD081A269DA0DBDD8DCFDE4F5DB7C6ED1ED9417F6A
32,151,309 UART: [art] SIG.S = A587A5B13FA60B6C636F1E7639C41EF81EF0F63193589735D870509A3C8C9A2CD101225C30E312F285D3C280BEEFF546
33,457,009 UART: Caliptra RT
33,457,728 UART: [state] CFI Enabled
33,617,500 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.16s
Truncated 9072 bytes from beginning
24,412,538 UART: [state] Locking Datavault
24,417,183 UART: [state] Locking PCR0, PCR1 and PCR31
24,418,815 UART: [state] Locking ICCM
24,420,607 UART: [exit] Launching FMC @ 0x40000130
24,429,314 UART:
24,429,537 UART: Running Caliptra FMC ...
24,430,739 UART:
24,430,936 UART: [state] CFI Enabled
24,439,128 UART: [fht] FMC Alias Private Key: 7
26,769,215 UART: [art] Extend RT PCRs Done
26,770,996 UART: [art] Lock RT PCRs Done
26,772,067 UART: [art] Populate DV Done
26,777,494 UART: [fht] FMC Alias Private Key: 7
26,779,188 UART: [art] Derive CDI
26,780,001 UART: [art] Store in in slot 0x4
26,822,592 UART: [art] Derive Key Pair
26,823,581 UART: [art] Store priv key in slot 0x5
30,065,191 UART: [art] Derive Key Pair - Done
30,078,306 UART: [art] Signing Cert with AUTHO
30,079,612 UART: RITY.KEYID = 7
32,358,827 UART: [art] Erasing AUTHORITY.KEYID = 7
32,360,347 UART: [art] PUB.X = 5CC865C534D8FCE894884AFAE98105092F498A4F5490D1F00136741400FD875EC90AB81B74FE966B47D545651CBA663D
32,367,552 UART: [art] PUB.Y = DE0716012394E5246FB881059C7F804177F8A1297341802143F56149015E544F700C3251C5A3EF77BDF7854E2A7AD01D
32,374,752 UART: [art] SIG.R = EA214A0A4155C52BE50BE388B04CADCEF99FE46BE740ED899912487FF90D4171285E399F3A7D7A670DF9C83B3354AE5D
32,382,159 UART: [art] SIG.S = 3AA24E849CCB286BFB703C613E9BB1169BBF9BAC8D1A38538189362658491BFFE4943C1D65BEED502B9E054777A25746
33,687,080 UART: Caliptra RT
33,687,802 UART: [state] CFI Enabled
33,805,620 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
5,621 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,477 UART:
192,859 UART: Running Caliptra ROM ...
194,021 UART:
603,684 UART: [state] CFI Enabled
618,845 UART: [state] LifecycleState = Unprovisioned
621,225 UART: [state] DebugLocked = No
623,538 UART: [state] WD Timer not started. Device not locked for debugging
627,999 UART: [kat] SHA2-256
809,987 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,496 UART: [kat] ++
821,994 UART: [kat] sha1
831,999 UART: [kat] SHA2-256
834,993 UART: [kat] SHA2-384
841,282 UART: [kat] SHA2-512-ACC
843,894 UART: [kat] ECC-384
4,097,807 UART: [kat] HMAC-384Kdf
4,108,972 UART: [kat] LMS
5,182,133 UART: [kat] --
5,187,057 UART: [cold-reset] ++
5,189,260 UART: [fht] FHT @ 0x50003400
5,201,104 UART: [idev] ++
5,201,813 UART: [idev] CDI.KEYID = 6
5,202,913 UART: [idev] SUBJECT.KEYID = 7
5,204,443 UART: [idev] UDS.KEYID = 0
5,222,006 UART: [idev] Erasing UDS.KEYID = 0
8,495,836 UART: [idev] Sha384 KeyId Algorithm
8,505,743 UART: [idev] --
8,510,970 UART: [ldev] ++
8,511,531 UART: [ldev] CDI.KEYID = 6
8,512,681 UART: [ldev] SUBJECT.KEYID = 5
8,514,211 UART: [ldev] AUTHORITY.KEYID = 7
8,515,704 UART: [ldev] FE.KEYID = 1
8,528,235 UART: [ldev] Erasing FE.KEYID = 1
11,817,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,108,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,124,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,140,312 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
14,156,269 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,176,430 UART: [ldev] --
14,181,527 UART: [fwproc] Wait for Commands...
14,182,970 UART: [fwproc] Recv command 0x46574c44
14,184,950 UART: [fwproc] Recv'd Img size: 113760 bytes
18,246,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,869 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,388,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,703,828 >>> mbox cmd response: success
18,707,130 UART: [afmc] ++
18,707,744 UART: [afmc] CDI.KEYID = 6
18,708,930 UART: [afmc] SUBJECT.KEYID = 7
18,710,039 UART: [afmc] AUTHORITY.KEYID = 5
22,025,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,318,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,320,727 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,336,955 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,352,992 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,368,962 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,392,822 UART: [afmc] --
24,396,647 UART: [cold-reset] --
24,400,857 UART: [state] Locking Datavault
24,407,016 UART: [state] Locking PCR0, PCR1 and PCR31
24,408,655 UART: [state] Locking ICCM
24,411,495 UART: [exit] Launching FMC @ 0x40000130
24,420,159 UART:
24,420,406 UART: Running Caliptra FMC ...
24,421,500 UART:
24,421,649 UART: [state] CFI Enabled
24,429,688 UART: [fht] FMC Alias Private Key: 7
26,760,189 UART: [art] Extend RT PCRs Done
26,761,406 UART: [art] Lock RT PCRs Done
26,763,240 UART: [art] Populate DV Done
26,768,475 UART: [fht] FMC Alias Private Key: 7
26,770,004 UART: [art] Derive CDI
26,770,818 UART: [art] Store in in slot 0x4
26,813,402 UART: [art] Derive Key Pair
26,814,439 UART: [art] Store priv key in slot 0x5
30,057,114 UART: [art] Derive Key Pair - Done
30,069,891 UART: [art] Signing Cert with AUTHO
30,071,188 UART: RITY.KEYID = 7
32,350,618 UART: [art] Erasing AUTHORITY.KEYID = 7
32,352,148 UART: [art] PUB.X = 802B2DB0873177DD658A43E442A8BFD5FF1748B6E0786EF17D779B9D7EB45979101D1974B2933CC3DF7D6D79AD943243
32,359,355 UART: [art] PUB.Y = 000E42AF93848229F762614B639A606F8F361D8A29AFBB7C81BC93E4567A972F815883F5F2A4F2AC76CFB811DC66B439
32,366,591 UART: [art] SIG.R = FE3A9F61C5D15BBF15DA03CE01E9104F3A43F7140D21103D2CEFA0B14249A6C605B0C1CA982E07145B683E8D97B01166
32,373,979 UART: [art] SIG.S = 746D931303D837490A102F9F07F38FD23AE224E5CBD168E1E42AEEA5938F7B389315F248598B81C40FAD86ADE47D85D5
33,679,228 UART: Caliptra RT
33,679,918 UART: [state] CFI Enabled
33,798,324 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
5,577 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,381 UART:
192,759 UART: Running Caliptra ROM ...
193,829 UART:
603,569 UART: [state] CFI Enabled
620,683 UART: [state] LifecycleState = Unprovisioned
623,040 UART: [state] DebugLocked = No
625,043 UART: [state] WD Timer not started. Device not locked for debugging
629,024 UART: [kat] SHA2-256
810,995 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,554 UART: [kat] ++
823,049 UART: [kat] sha1
832,650 UART: [kat] SHA2-256
835,661 UART: [kat] SHA2-384
842,010 UART: [kat] SHA2-512-ACC
844,615 UART: [kat] ECC-384
4,096,719 UART: [kat] HMAC-384Kdf
4,108,791 UART: [kat] LMS
5,181,903 UART: [kat] --
5,185,607 UART: [cold-reset] ++
5,188,360 UART: [fht] FHT @ 0x50003400
5,199,400 UART: [idev] ++
5,200,071 UART: [idev] CDI.KEYID = 6
5,201,226 UART: [idev] SUBJECT.KEYID = 7
5,202,699 UART: [idev] UDS.KEYID = 0
5,219,616 UART: [idev] Erasing UDS.KEYID = 0
8,493,172 UART: [idev] Fuse KeyId
8,497,353 UART: [idev] --
8,501,731 UART: [ldev] ++
8,502,296 UART: [ldev] CDI.KEYID = 6
8,503,524 UART: [ldev] SUBJECT.KEYID = 5
8,504,956 UART: [ldev] AUTHORITY.KEYID = 7
8,506,505 UART: [ldev] FE.KEYID = 1
8,517,718 UART: [ldev] Erasing FE.KEYID = 1
11,808,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,100,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,116,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,132,309 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
14,148,311 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,169,646 UART: [ldev] --
14,174,093 UART: [fwproc] Wait for Commands...
14,176,776 UART: [fwproc] Recv command 0x46574c44
14,178,753 UART: [fwproc] Recv'd Img size: 113760 bytes
18,246,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,324,497 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,393,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,708,179 >>> mbox cmd response: success
18,711,586 UART: [afmc] ++
18,712,170 UART: [afmc] CDI.KEYID = 6
18,713,354 UART: [afmc] SUBJECT.KEYID = 7
18,714,504 UART: [afmc] AUTHORITY.KEYID = 5
22,030,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,325,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,327,348 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,343,527 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,359,570 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,375,543 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,397,872 UART: [afmc] --
24,401,796 UART: [cold-reset] --
24,405,768 UART: [state] Locking Datavault
24,411,405 UART: [state] Locking PCR0, PCR1 and PCR31
24,413,042 UART: [state] Locking ICCM
24,414,647 UART: [exit] Launching FMC @ 0x40000130
24,423,356 UART:
24,423,589 UART: Running Caliptra FMC ...
24,424,683 UART:
24,424,834 UART: [state] CFI Enabled
24,432,924 UART: [fht] FMC Alias Private Key: 7
26,764,149 UART: [art] Extend RT PCRs Done
26,765,830 UART: [art] Lock RT PCRs Done
26,766,994 UART: [art] Populate DV Done
26,772,530 UART: [fht] FMC Alias Private Key: 7
26,774,220 UART: [art] Derive CDI
26,774,947 UART: [art] Store in in slot 0x4
26,817,814 UART: [art] Derive Key Pair
26,818,853 UART: [art] Store priv key in slot 0x5
30,060,852 UART: [art] Derive Key Pair - Done
30,073,587 UART: [art] Signing Cert with AUTHO
30,074,889 UART: RITY.KEYID = 7
32,353,799 UART: [art] Erasing AUTHORITY.KEYID = 7
32,355,301 UART: [art] PUB.X = 6468A83ADEBE026CB1B95C9AD0C7034D29B9BDE619C8C738C77C9201B39C9D3944E91811CA21B3800DAFF8EE0456D409
32,362,557 UART: [art] PUB.Y = 5A9C797FB055E9F40B47CF76E399123DFC9DD6683EA44AC6EDD10AEF2DD81EA0ABEF72FCEBC68B798FB781FAE105FC50
32,369,858 UART: [art] SIG.R = DE0FA51F3325D9F70FD40504832B9AA6337D850CC3A472547CC676B04111D3C562FCD1E00022A99BFA38DB4F162D188C
32,377,391 UART: [art] SIG.S = A5331687A9334B1216E07EA28C703B6F2B9CAF051827D4EA2554D084ED8C0373ADA42394AD00765913D08569A4B2FCDB
33,682,099 UART: Caliptra RT
33,682,797 UART: [state] CFI Enabled
33,800,773 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,793 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,523,836 >>> mbox cmd response: success
24,159,823 UART:
24,160,220 UART: Running Caliptra FMC ...
24,161,470 UART:
24,161,635 UART: [state] CFI Enabled
24,169,835 UART: [fht] FMC Alias Private Key: 7
26,500,915 UART: [art] Extend RT PCRs Done
26,502,149 UART: [art] Lock RT PCRs Done
26,503,878 UART: [art] Populate DV Done
26,508,919 UART: [fht] FMC Alias Private Key: 7
26,510,559 UART: [art] Derive CDI
26,511,293 UART: [art] Store in in slot 0x4
26,554,076 UART: [art] Derive Key Pair
26,555,124 UART: [art] Store priv key in slot 0x5
29,796,775 UART: [art] Derive Key Pair - Done
29,809,874 UART: [art] Signing Cert with AUTHO
29,811,176 UART: RITY.KEYID = 7
32,090,265 UART: [art] Erasing AUTHORITY.KEYID = 7
32,091,773 UART: [art] PUB.X = 28D2239A45505EB077307FA86AB4A66D2803756094F72802500E21834A5CAB6E6716D4F5B27EE32D8F564AF538AB7AD6
32,098,994 UART: [art] PUB.Y = 3BFE992A61D1714AC546F0006904942939F0A7391794A0F9BDD8B16A688B7BE3139D01724DAEBD2BAEAE02CDB5FB5B10
32,106,222 UART: [art] SIG.R = 757436E47866D4EC477F7599265B772B9594B67BD33EACF6249CCDD0866E016719CCD4E9A282E550B81DA640B010A628
32,114,133 UART: [art] SIG.S = C4552D29DC1F0B593FA5DC80DD4A655F0FC116569CD033447FE5297988E20AA1ABCC828FD103E33B2856029A0427751F
33,418,831 UART: Caliptra RT
33,419,533 UART: [state] CFI Enabled
33,537,510 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,518,411 >>> mbox cmd response: success
24,147,244 UART:
24,147,652 UART: Running Caliptra FMC ...
24,148,875 UART:
24,149,041 UART: [state] CFI Enabled
24,156,500 UART: [fht] FMC Alias Private Key: 7
26,487,352 UART: [art] Extend RT PCRs Done
26,488,581 UART: [art] Lock RT PCRs Done
26,489,992 UART: [art] Populate DV Done
26,495,413 UART: [fht] FMC Alias Private Key: 7
26,497,013 UART: [art] Derive CDI
26,497,829 UART: [art] Store in in slot 0x4
26,540,271 UART: [art] Derive Key Pair
26,541,315 UART: [art] Store priv key in slot 0x5
29,783,031 UART: [art] Derive Key Pair - Done
29,795,814 UART: [art] Signing Cert with AUTHO
29,797,154 UART: RITY.KEYID = 7
32,076,515 UART: [art] Erasing AUTHORITY.KEYID = 7
32,078,026 UART: [art] PUB.X = 7BD864D26D56D5009DADA4D52562E9A83FB8093A8DE5004C2920297EA55C9F46073CAD66A613ED411FF7250A1DA192B3
32,085,264 UART: [art] PUB.Y = 81086AC4D3C43DF4B485CBA8CCD6320DCD4580000F725252133F0D515182597808082E87EFD91C4E96ACA96C07F70666
32,092,443 UART: [art] SIG.R = D1045E4E6D349AF7B039A1657E94D7FF77DB9858A20D0FE40E2B2C910759AAC3D447AB06FF9C026698A760878C6C50CD
32,099,865 UART: [art] SIG.S = F10746EE48F12E2B2EE9466AEA386DBC0043722DAA0B27087F755B7F191982B758922A648966611D8C4E8ECF9FED2CC4
33,405,243 UART: Caliptra RT
33,405,934 UART: [state] CFI Enabled
33,524,184 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
5,371 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,505,379 >>> mbox cmd response: success
24,144,375 UART:
24,144,768 UART: Running Caliptra FMC ...
24,145,874 UART:
24,146,030 UART: [state] CFI Enabled
24,153,694 UART: [fht] FMC Alias Private Key: 7
26,484,493 UART: [art] Extend RT PCRs Done
26,485,721 UART: [art] Lock RT PCRs Done
26,487,587 UART: [art] Populate DV Done
26,493,064 UART: [fht] FMC Alias Private Key: 7
26,494,660 UART: [art] Derive CDI
26,495,474 UART: [art] Store in in slot 0x4
26,538,476 UART: [art] Derive Key Pair
26,539,520 UART: [art] Store priv key in slot 0x5
29,781,455 UART: [art] Derive Key Pair - Done
29,794,451 UART: [art] Signing Cert with AUTHO
29,795,756 UART: RITY.KEYID = 7
32,074,754 UART: [art] Erasing AUTHORITY.KEYID = 7
32,076,264 UART: [art] PUB.X = A78B21BC81E63DB49DF756C276476BBD407AD6C44070DE07C0AE40524AF5893C2D500BAEF0FCEBBFE0EE2C2351C7252D
32,083,535 UART: [art] PUB.Y = 07A7787849D8593D90B8ECBB7BF901CCFA265588FBB871FB517982E5D3B416C36AB7DE1A2088699CB37E4DA2D5CCE977
32,090,758 UART: [art] SIG.R = 2EA42CCDCEE3CBC1BF1CE92F91B2CFBE1406FB9DA64932B8E2429AAAD3B28A28BEB4018DB0EB591B5551E1FB47C76C33
32,098,179 UART: [art] SIG.S = 4EAF44272FA6A6DFE61A9DB154B8441C2E03012712150FB6BD9BDBD04F0C6108132BC844CACFBC8C32E375BD5C2BDC69
33,403,293 UART: Caliptra RT
33,404,012 UART: [state] CFI Enabled
33,522,594 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
5,594 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,508,016 >>> mbox cmd response: success
24,148,472 UART:
24,148,862 UART: Running Caliptra FMC ...
24,149,996 UART:
24,150,152 UART: [state] CFI Enabled
24,158,298 UART: [fht] FMC Alias Private Key: 7
26,489,552 UART: [art] Extend RT PCRs Done
26,490,774 UART: [art] Lock RT PCRs Done
26,492,398 UART: [art] Populate DV Done
26,497,769 UART: [fht] FMC Alias Private Key: 7
26,499,411 UART: [art] Derive CDI
26,500,219 UART: [art] Store in in slot 0x4
26,542,967 UART: [art] Derive Key Pair
26,543,961 UART: [art] Store priv key in slot 0x5
29,786,364 UART: [art] Derive Key Pair - Done
29,799,640 UART: [art] Signing Cert with AUTHO
29,800,942 UART: RITY.KEYID = 7
32,080,027 UART: [art] Erasing AUTHORITY.KEYID = 7
32,081,545 UART: [art] PUB.X = 67BEB1B70F03F9975F79AF60FE9B2D08F7D304E455DA699166B7BEFBD28D15E80BAD0C60014BE9393662687564FD821E
32,088,761 UART: [art] PUB.Y = 98D6C239E9B12E972C4E5893F38F2237FE9B4CD00D99EB5583371F54E666198A7D171DC8B30D901BCD4834B4F287FD58
32,095,982 UART: [art] SIG.R = D2FC48486D1D7CCA1C4137FA6CF9BC1281FE8603D6CA758F6C152E2DCCA3952BCECD7866411D22065BC4558380CE016B
32,103,423 UART: [art] SIG.S = E634DAE4B47A1A5A5FE2E6C70E8582504D3116CF9403386F907EDE1247E03E2650D9072CD55F61DBB7C470E70A4DD0C9
33,408,898 UART: Caliptra RT
33,409,614 UART: [state] CFI Enabled
33,526,921 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.14s
Truncated 9072 bytes from beginning
18,598,557 UART: [state] Locking Datavault
18,605,098 UART: [state] Locking PCR0, PCR1 and PCR31
18,606,767 UART: [state] Locking ICCM
18,609,026 UART: [exit] Launching FMC @ 0x40000130
18,617,442 UART:
18,617,719 UART: Running Caliptra FMC ...
18,618,832 UART:
18,619,001 UART: [state] CFI Enabled
18,676,606 UART: [fht] FMC Alias Private Key: 7
20,440,551 UART: [art] Extend RT PCRs Done
20,441,766 UART: [art] Lock RT PCRs Done
20,443,386 UART: [art] Populate DV Done
20,448,797 UART: [fht] FMC Alias Private Key: 7
20,450,386 UART: [art] Derive CDI
20,451,202 UART: [art] Store in in slot 0x4
20,509,921 UART: [art] Derive Key Pair
20,510,960 UART: [art] Store priv key in slot 0x5
22,974,106 UART: [art] Derive Key Pair - Done
22,986,959 UART: [art] Signing Cert with AUTHO
22,988,264 UART: RITY.KEYID = 7
24,699,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,701,448 UART: [art] PUB.X = FFD928984C338FCABC12C3707CAE801426C25ADA85CD34C560124C8667F0BAF4A66AD2EE62D009A2A3236646350FFDAF
24,708,690 UART: [art] PUB.Y = 74A470E904E90F3ED4AEAC1C79347EE5B54B80F1BAE4F82E2E9A792349CB1310E9A48065F5DCF30E12D62F825C28AB0B
24,715,985 UART: [art] SIG.R = 430C68FA1776F2FC63E289FD8E26A990C4ECE065684B15CF9469652359CCAD3D9783468B5F60E380025C047C4DB43A75
24,723,377 UART: [art] SIG.S = C490C0562914EA8FE2AC9D01765CB6291A4317D4BBA241F3592AD75934910550232838FB2304C3886911CAF5006DA7E9
25,702,849 UART: Caliptra RT
25,703,539 UART: [state] CFI Enabled
25,867,232 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
4,709 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,407 UART:
192,809 UART: Running Caliptra ROM ...
193,926 UART:
194,071 UART: [state] CFI Enabled
265,228 UART: [state] LifecycleState = Unprovisioned
267,111 UART: [state] DebugLocked = No
268,810 UART: [state] WD Timer not started. Device not locked for debugging
273,373 UART: [kat] SHA2-256
452,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,032 UART: [kat] ++
464,487 UART: [kat] sha1
476,387 UART: [kat] SHA2-256
479,449 UART: [kat] SHA2-384
486,285 UART: [kat] SHA2-512-ACC
489,276 UART: [kat] ECC-384
2,947,794 UART: [kat] HMAC-384Kdf
2,970,778 UART: [kat] LMS
3,500,246 UART: [kat] --
3,505,264 UART: [cold-reset] ++
3,507,090 UART: [fht] FHT @ 0x50003400
3,517,534 UART: [idev] ++
3,518,101 UART: [idev] CDI.KEYID = 6
3,518,981 UART: [idev] SUBJECT.KEYID = 7
3,520,197 UART: [idev] UDS.KEYID = 0
3,543,523 UART: [idev] Erasing UDS.KEYID = 0
6,025,796 UART: [idev] Sha384 KeyId Algorithm
6,034,659 UART: [idev] --
6,039,067 UART: [ldev] ++
6,039,650 UART: [ldev] CDI.KEYID = 6
6,040,535 UART: [ldev] SUBJECT.KEYID = 5
6,041,697 UART: [ldev] AUTHORITY.KEYID = 7
6,042,985 UART: [ldev] FE.KEYID = 1
6,077,562 UART: [ldev] Erasing FE.KEYID = 1
8,579,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,459 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,366,274 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,386,525 UART: [ldev] --
10,391,359 UART: [fwproc] Wait for Commands...
10,394,538 UART: [fwproc] Recv command 0x46574c44
10,396,654 UART: [fwproc] Recv'd Img size: 114084 bytes
13,803,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,263,219 >>> mbox cmd response: success
14,266,843 UART: [afmc] ++
14,267,430 UART: [afmc] CDI.KEYID = 6
14,268,311 UART: [afmc] SUBJECT.KEYID = 7
14,269,526 UART: [afmc] AUTHORITY.KEYID = 5
16,805,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,203 UART: [afmc] --
18,602,597 UART: [cold-reset] --
18,605,989 UART: [state] Locking Datavault
18,610,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,021 UART: [state] Locking ICCM
18,613,418 UART: [exit] Launching FMC @ 0x40000130
18,621,811 UART:
18,622,048 UART: Running Caliptra FMC ...
18,623,153 UART:
18,623,308 UART: [state] CFI Enabled
18,686,709 UART: [fht] FMC Alias Private Key: 7
20,450,376 UART: [art] Extend RT PCRs Done
20,451,595 UART: [art] Lock RT PCRs Done
20,453,222 UART: [art] Populate DV Done
20,458,470 UART: [fht] FMC Alias Private Key: 7
20,460,111 UART: [art] Derive CDI
20,460,925 UART: [art] Store in in slot 0x4
20,518,848 UART: [art] Derive Key Pair
20,519,889 UART: [art] Store priv key in slot 0x5
22,982,253 UART: [art] Derive Key Pair - Done
22,995,044 UART: [art] Signing Cert with AUTHO
22,996,387 UART: RITY.KEYID = 7
24,708,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,430 UART: [art] PUB.X = 1FBBC99ED5F75FC8219601C7DFB92E94A13F1B12E4CA4D9066E3912C93E7B4BA117A21EDA8A68919D16A46EC95BEF13C
24,717,724 UART: [art] PUB.Y = F1B0D997E97C08F9F44371D6E2996DBAF8F83E980B5EF5CD96A062F3390A427F3F9D1D1CC894EDF5EDE018CF48386BA0
24,725,002 UART: [art] SIG.R = B98708FC878E304CA86DDDC02C69479355F001ADC2D52E663701A5216A640F4519FB4EBFA4B812D27F5702B32FB92FCD
24,732,392 UART: [art] SIG.S = 1FC41E225C208112C033E2D7B6A01EC9286D94AAD246A8FB7AB29E755E00AA3586C9C2F0B182F83621E4530CB55411EA
25,711,132 UART: Caliptra RT
25,711,983 UART: [state] CFI Enabled
25,875,131 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,269 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,433 UART:
192,802 UART: Running Caliptra ROM ...
194,103 UART:
194,256 UART: [state] CFI Enabled
264,133 UART: [state] LifecycleState = Unprovisioned
266,071 UART: [state] DebugLocked = No
267,785 UART: [state] WD Timer not started. Device not locked for debugging
272,175 UART: [kat] SHA2-256
451,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,853 UART: [kat] ++
463,387 UART: [kat] sha1
475,081 UART: [kat] SHA2-256
478,096 UART: [kat] SHA2-384
483,339 UART: [kat] SHA2-512-ACC
486,274 UART: [kat] ECC-384
2,947,065 UART: [kat] HMAC-384Kdf
2,969,290 UART: [kat] LMS
3,498,791 UART: [kat] --
3,503,938 UART: [cold-reset] ++
3,506,092 UART: [fht] FHT @ 0x50003400
3,517,087 UART: [idev] ++
3,517,719 UART: [idev] CDI.KEYID = 6
3,518,637 UART: [idev] SUBJECT.KEYID = 7
3,519,803 UART: [idev] UDS.KEYID = 0
3,540,912 UART: [idev] Erasing UDS.KEYID = 0
6,026,936 UART: [idev] Fuse KeyId
6,030,897 UART: [idev] --
6,034,238 UART: [ldev] ++
6,034,812 UART: [ldev] CDI.KEYID = 6
6,035,719 UART: [ldev] SUBJECT.KEYID = 5
6,036,883 UART: [ldev] AUTHORITY.KEYID = 7
6,038,118 UART: [ldev] FE.KEYID = 1
6,074,588 UART: [ldev] Erasing FE.KEYID = 1
8,576,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,310,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,876 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,341,707 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,361,581 UART: [ldev] --
10,365,930 UART: [fwproc] Wait for Commands...
10,367,389 UART: [fwproc] Recv command 0x46574c44
10,369,487 UART: [fwproc] Recv'd Img size: 114084 bytes
13,769,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,846,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,915,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,231,654 >>> mbox cmd response: success
14,235,383 UART: [afmc] ++
14,236,156 UART: [afmc] CDI.KEYID = 6
14,237,049 UART: [afmc] SUBJECT.KEYID = 7
14,238,153 UART: [afmc] AUTHORITY.KEYID = 5
16,782,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,504,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,506,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,522,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,538,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,554,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,577,190 UART: [afmc] --
18,580,207 UART: [cold-reset] --
18,584,717 UART: [state] Locking Datavault
18,589,165 UART: [state] Locking PCR0, PCR1 and PCR31
18,590,863 UART: [state] Locking ICCM
18,592,635 UART: [exit] Launching FMC @ 0x40000130
18,601,092 UART:
18,601,332 UART: Running Caliptra FMC ...
18,602,436 UART:
18,602,599 UART: [state] CFI Enabled
18,662,644 UART: [fht] FMC Alias Private Key: 7
20,426,662 UART: [art] Extend RT PCRs Done
20,427,885 UART: [art] Lock RT PCRs Done
20,429,663 UART: [art] Populate DV Done
20,435,084 UART: [fht] FMC Alias Private Key: 7
20,436,734 UART: [art] Derive CDI
20,437,551 UART: [art] Store in in slot 0x4
20,495,126 UART: [art] Derive Key Pair
20,496,170 UART: [art] Store priv key in slot 0x5
22,958,420 UART: [art] Derive Key Pair - Done
22,971,256 UART: [art] Signing Cert with AUTHO
22,972,562 UART: RITY.KEYID = 7
24,684,081 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,586 UART: [art] PUB.X = 111E685513360D73B7AA34EA9121C11BF8EBFFAFDB42E06C0E5465D13ABFF02594898AA0BB0654CD24B6CFE9A2A031DD
24,692,832 UART: [art] PUB.Y = EC0EA04DD6DE438EF5C9EA8E564C94925E226F04A16AF9BDBDBDD94A49075347AD5B89F2F84D29655D6DC4BCF0A4BB24
24,700,169 UART: [art] SIG.R = A5307773C386FB6A347D754AF765E31E345E52A763B30D00F91F0CE750C184A4F8DC50AAD99DFC101044A5FAA2736727
24,707,563 UART: [art] SIG.S = FFF16842EF7F6E8F5840566EEFCF97ED70519D5A85C95A7147D4C227C318B297D0B85B9440976773678290FD884E9F6D
25,686,175 UART: Caliptra RT
25,686,877 UART: [state] CFI Enabled
25,851,547 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,662 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,060,934 >>> mbox cmd response: success
18,347,796 UART:
18,348,208 UART: Running Caliptra FMC ...
18,349,385 UART:
18,349,550 UART: [state] CFI Enabled
18,414,074 UART: [fht] FMC Alias Private Key: 7
20,178,312 UART: [art] Extend RT PCRs Done
20,179,535 UART: [art] Lock RT PCRs Done
20,181,159 UART: [art] Populate DV Done
20,186,624 UART: [fht] FMC Alias Private Key: 7
20,188,172 UART: [art] Derive CDI
20,188,927 UART: [art] Store in in slot 0x4
20,246,410 UART: [art] Derive Key Pair
20,247,447 UART: [art] Store priv key in slot 0x5
22,710,399 UART: [art] Derive Key Pair - Done
22,723,014 UART: [art] Signing Cert with AUTHO
22,724,321 UART: RITY.KEYID = 7
24,436,289 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,801 UART: [art] PUB.X = ACF0EE95F41A5458E14AC13599B34B3000D9820CF051DC7D0A2A53A0C1EEEE3849EFE571A2E181D77793366CA0B8ED19
24,445,089 UART: [art] PUB.Y = 80C1D0C1BEE9E620D37343EC25B0FF63AD162E465E279572BBCD99EAA1D571B5C07D9D4984355F638DFC0CAC40A27754
24,452,318 UART: [art] SIG.R = B1EE764D4E9FB59BD8CBBF414B16F7B5C4C3C587F8DC386CD78D5F28A705871EA9C5F205E54D2F90D8BFDA4E1EB8E9E5
24,459,764 UART: [art] SIG.S = 0B2A801EFEA21AA0BF07F308DD3744397D43671C1B5AC908B97AF9AC4700EE2F5E7E62620D3448933B09B3A3B44F994D
25,439,018 UART: Caliptra RT
25,439,728 UART: [state] CFI Enabled
25,604,928 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
4,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,042,277 >>> mbox cmd response: success
18,340,598 UART:
18,341,013 UART: Running Caliptra FMC ...
18,342,254 UART:
18,342,430 UART: [state] CFI Enabled
18,409,174 UART: [fht] FMC Alias Private Key: 7
20,173,092 UART: [art] Extend RT PCRs Done
20,174,324 UART: [art] Lock RT PCRs Done
20,175,579 UART: [art] Populate DV Done
20,180,841 UART: [fht] FMC Alias Private Key: 7
20,182,441 UART: [art] Derive CDI
20,183,181 UART: [art] Store in in slot 0x4
20,241,738 UART: [art] Derive Key Pair
20,242,781 UART: [art] Store priv key in slot 0x5
22,705,739 UART: [art] Derive Key Pair - Done
22,718,474 UART: [art] Signing Cert with AUTHO
22,719,789 UART: RITY.KEYID = 7
24,430,514 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,004 UART: [art] PUB.X = 02F7DCF42419C924946D916634C697CDF39450F84DC6D94333DBBB240EC597AC5793E01A0450FC7A28102B6F987041B8
24,439,334 UART: [art] PUB.Y = 1BCE60B04D4B6B1965D111926566FD73B6897AB941FE3E3F9FB136A6535DF7DE13FFD0B9D00B095B1DB11AB4A4956FD2
24,446,545 UART: [art] SIG.R = 341554808D89F3C1443F3F157FCFACC5D790FB08173CAEE318AF53E4A4D023520C25AEC48FF2D96A1C6F169BA520B1C8
24,453,972 UART: [art] SIG.S = FF87C382330047257C6BC9363246E252EA1669B632CF3F11C4A796FAEDBD744A5BAD3502EB977C7ECF2E633C74A547B8
25,432,880 UART: Caliptra RT
25,433,587 UART: [state] CFI Enabled
25,598,431 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
4,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,016,690 >>> mbox cmd response: success
18,320,216 UART:
18,320,658 UART: Running Caliptra FMC ...
18,321,813 UART:
18,321,975 UART: [state] CFI Enabled
18,389,504 UART: [fht] FMC Alias Private Key: 7
20,153,310 UART: [art] Extend RT PCRs Done
20,154,530 UART: [art] Lock RT PCRs Done
20,156,049 UART: [art] Populate DV Done
20,161,262 UART: [fht] FMC Alias Private Key: 7
20,162,802 UART: [art] Derive CDI
20,163,613 UART: [art] Store in in slot 0x4
20,222,237 UART: [art] Derive Key Pair
20,223,240 UART: [art] Store priv key in slot 0x5
22,685,504 UART: [art] Derive Key Pair - Done
22,698,496 UART: [art] Signing Cert with AUTHO
22,699,793 UART: RITY.KEYID = 7
24,411,188 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,698 UART: [art] PUB.X = EDD29FD0FE682406293427A8C248A1D0C36A4CE8EB67AED8350DF3519C9BEC2E3A5C7712D7D15372D9D7929F12DDFABA
24,420,006 UART: [art] PUB.Y = C36000CE2D480F37862BC5EBAA15F2411713333BCA8B363D364A1FD9A05A9B1D05764DF995A355F79ABBDC44BC8E9137
24,427,270 UART: [art] SIG.R = 4A5017D25C0D40A534617519B45277F89852D5ABA1FBE1CBA6F4EB08112D2EDCDA0E39AB81081262F140AD98D5105CF7
24,434,659 UART: [art] SIG.S = 00E0B1B09507B4F3AB115EF4DA3907D0514ECB3F8759F0C133E5F15C738876A90FCF4D88F1E6F895F4D684F2AC329543
25,412,869 UART: Caliptra RT
25,413,587 UART: [state] CFI Enabled
25,578,448 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,052,336 >>> mbox cmd response: success
18,342,016 UART:
18,342,412 UART: Running Caliptra FMC ...
18,343,628 UART:
18,343,803 UART: [state] CFI Enabled
18,409,602 UART: [fht] FMC Alias Private Key: 7
20,173,124 UART: [art] Extend RT PCRs Done
20,174,346 UART: [art] Lock RT PCRs Done
20,175,913 UART: [art] Populate DV Done
20,181,341 UART: [fht] FMC Alias Private Key: 7
20,182,825 UART: [art] Derive CDI
20,183,583 UART: [art] Store in in slot 0x4
20,241,979 UART: [art] Derive Key Pair
20,243,020 UART: [art] Store priv key in slot 0x5
22,705,886 UART: [art] Derive Key Pair - Done
22,718,340 UART: [art] Signing Cert with AUTHO
22,719,640 UART: RITY.KEYID = 7
24,431,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,694 UART: [art] PUB.X = 2A2EF14554F3D5B3082EBE1880E132AE4C9A20ED22927BE0311BDA4D9110463286F56E9E617235C59143B32F53EB8EDF
24,439,838 UART: [art] PUB.Y = D49F47C4D142BF00B16A55B69A13DF90F8F0C8382D19B2787096B98DBF8636DE3A0257BAE1A2A37EE14E3A51E37B0122
24,447,103 UART: [art] SIG.R = 1AC4E6260367C9F18065DE76BF3BDBD1DEA6202A644B3CE14A4DA5C71D489BDA4B91DD68C4F63EE6E6D364DAE5193856
24,454,513 UART: [art] SIG.S = A3C65E96BE9CA371FFD5893DE72BDD95608E58BBCED2F17BF5B939187CB1B5CFE25DBA2E71802D1D357181625F03BA08
25,433,503 UART: Caliptra RT
25,434,216 UART: [state] CFI Enabled
25,598,633 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,771,306 UART: [state] Locking Datavault
18,774,927 UART: [state] Locking PCR0, PCR1 and PCR31
18,776,629 UART: [state] Locking ICCM
18,778,020 UART: [exit] Launching FMC @ 0x40000130
18,786,438 UART:
18,786,672 UART: Running Caliptra FMC ...
18,787,769 UART:
18,787,925 UART: [state] CFI Enabled
18,795,699 UART: [fht] FMC Alias Private Key: 7
20,552,238 UART: [art] Extend RT PCRs Done
20,553,455 UART: [art] Lock RT PCRs Done
20,555,130 UART: [art] Populate DV Done
20,560,430 UART: [fht] FMC Alias Private Key: 7
20,561,969 UART: [art] Derive CDI
20,562,780 UART: [art] Store in in slot 0x4
20,605,105 UART: [art] Derive Key Pair
20,606,147 UART: [art] Store priv key in slot 0x5
23,032,655 UART: [art] Derive Key Pair - Done
23,045,657 UART: [art] Signing Cert with AUTHO
23,046,962 UART: RITY.KEYID = 7
24,752,904 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,408 UART: [art] PUB.X = 5B7B966CB2A14CAE05FB777A651CEFE68AF2A6BA8D4A84DD1193EC761BE5948F058F89BC94DD79DCE00E77511CED61FE
24,761,711 UART: [art] PUB.Y = 735C3AE8919B4824D62609BB3DC85D0A442B12689D3775C5F79F0AAA2BED997F8F40630D983A34BD6BBB6EBA828C67CD
24,768,996 UART: [art] SIG.R = D19B5ADE213D9A5E6F1A9D8B89E70C78582957E2BC51BC8459D33D7E996877687F502BF39BDAEC1BF2258EA65637E897
24,776,348 UART: [art] SIG.S = D83A97CABFDCE1E50BAA1A04F383E2C10CA562DDE393DFC6D858EBDC8DAD62E8007E2CBBB796CF3AFC2962D2256BF0AC
25,755,268 UART: Caliptra RT
25,755,954 UART: [state] CFI Enabled
25,871,885 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
5,710 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,583 UART:
192,945 UART: Running Caliptra ROM ...
194,121 UART:
603,772 UART: [state] CFI Enabled
617,489 UART: [state] LifecycleState = Unprovisioned
619,370 UART: [state] DebugLocked = No
621,986 UART: [state] WD Timer not started. Device not locked for debugging
625,057 UART: [kat] SHA2-256
804,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,774 UART: [kat] ++
816,334 UART: [kat] sha1
827,539 UART: [kat] SHA2-256
830,604 UART: [kat] SHA2-384
836,573 UART: [kat] SHA2-512-ACC
839,554 UART: [kat] ECC-384
3,282,463 UART: [kat] HMAC-384Kdf
3,296,106 UART: [kat] LMS
3,825,579 UART: [kat] --
3,828,784 UART: [cold-reset] ++
3,830,710 UART: [fht] FHT @ 0x50003400
3,841,783 UART: [idev] ++
3,842,469 UART: [idev] CDI.KEYID = 6
3,843,360 UART: [idev] SUBJECT.KEYID = 7
3,844,420 UART: [idev] UDS.KEYID = 0
3,861,659 UART: [idev] Erasing UDS.KEYID = 0
6,316,585 UART: [idev] Sha384 KeyId Algorithm
6,326,355 UART: [idev] --
6,331,962 UART: [ldev] ++
6,332,531 UART: [ldev] CDI.KEYID = 6
6,333,418 UART: [ldev] SUBJECT.KEYID = 5
6,334,546 UART: [ldev] AUTHORITY.KEYID = 7
6,335,879 UART: [ldev] FE.KEYID = 1
6,347,168 UART: [ldev] Erasing FE.KEYID = 1
8,820,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,954 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,586,736 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,606,715 UART: [ldev] --
10,611,330 UART: [fwproc] Wait for Commands...
10,614,239 UART: [fwproc] Recv command 0x46574c44
10,616,335 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,473,334 >>> mbox cmd response: success
14,476,778 UART: [afmc] ++
14,477,362 UART: [afmc] CDI.KEYID = 6
14,478,276 UART: [afmc] SUBJECT.KEYID = 7
14,479,434 UART: [afmc] AUTHORITY.KEYID = 5
16,976,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,697,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,699,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,414 UART: [afmc] --
18,774,491 UART: [cold-reset] --
18,778,040 UART: [state] Locking Datavault
18,784,850 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,539 UART: [state] Locking ICCM
18,788,501 UART: [exit] Launching FMC @ 0x40000130
18,796,933 UART:
18,797,200 UART: Running Caliptra FMC ...
18,798,229 UART:
18,798,374 UART: [state] CFI Enabled
18,806,690 UART: [fht] FMC Alias Private Key: 7
20,564,121 UART: [art] Extend RT PCRs Done
20,565,347 UART: [art] Lock RT PCRs Done
20,566,968 UART: [art] Populate DV Done
20,572,432 UART: [fht] FMC Alias Private Key: 7
20,574,081 UART: [art] Derive CDI
20,574,897 UART: [art] Store in in slot 0x4
20,617,218 UART: [art] Derive Key Pair
20,618,232 UART: [art] Store priv key in slot 0x5
23,044,924 UART: [art] Derive Key Pair - Done
23,057,598 UART: [art] Signing Cert with AUTHO
23,058,904 UART: RITY.KEYID = 7
24,764,818 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,321 UART: [art] PUB.X = 4D116DCCB41C5FDF67FABAA6DD83C5D38E15726808B5AFC6B73CCE54C5758A8F7FBD8D441AED07ECA36F02D8ABA2250D
24,773,637 UART: [art] PUB.Y = 196169CA5BF7DF9B08DBB7D436C1994BF1A17356233F2462C3A5FBA71619C76B88A34DEB72978A23E6CA7070C39A6A53
24,780,932 UART: [art] SIG.R = ABF95CC36A1DFBE37453A0CEEA6E36762B3944F2A4A4FE50471FE8985F1B474F6259BBD36E6B8A170CD0A82ADDECB23A
24,788,320 UART: [art] SIG.S = 6163BABD48AAEBFD4C44DA666AE41B44B059C4CBD2640CA0C1359B8A91471BD2C790EC577BB43A47F20AC2FB4B943E8D
25,766,735 UART: Caliptra RT
25,767,443 UART: [state] CFI Enabled
25,884,544 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
5,566 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,513 UART:
192,881 UART: Running Caliptra ROM ...
194,358 UART:
603,588 UART: [state] CFI Enabled
616,632 UART: [state] LifecycleState = Unprovisioned
618,507 UART: [state] DebugLocked = No
621,020 UART: [state] WD Timer not started. Device not locked for debugging
625,030 UART: [kat] SHA2-256
804,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,734 UART: [kat] ++
816,267 UART: [kat] sha1
826,351 UART: [kat] SHA2-256
829,355 UART: [kat] SHA2-384
834,684 UART: [kat] SHA2-512-ACC
837,657 UART: [kat] ECC-384
3,281,469 UART: [kat] HMAC-384Kdf
3,293,157 UART: [kat] LMS
3,822,680 UART: [kat] --
3,826,313 UART: [cold-reset] ++
3,828,571 UART: [fht] FHT @ 0x50003400
3,839,437 UART: [idev] ++
3,840,005 UART: [idev] CDI.KEYID = 6
3,840,970 UART: [idev] SUBJECT.KEYID = 7
3,842,146 UART: [idev] UDS.KEYID = 0
3,856,530 UART: [idev] Erasing UDS.KEYID = 0
6,314,922 UART: [idev] Fuse KeyId
6,318,882 UART: [idev] --
6,321,407 UART: [ldev] ++
6,321,969 UART: [ldev] CDI.KEYID = 6
6,322,875 UART: [ldev] SUBJECT.KEYID = 5
6,324,032 UART: [ldev] AUTHORITY.KEYID = 7
6,325,320 UART: [ldev] FE.KEYID = 1
6,335,316 UART: [ldev] Erasing FE.KEYID = 1
8,811,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,531,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,547,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,562,983 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,578,775 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,598,803 UART: [ldev] --
10,602,747 UART: [fwproc] Wait for Commands...
10,604,521 UART: [fwproc] Recv command 0x46574c44
10,606,613 UART: [fwproc] Recv'd Img size: 114084 bytes
14,012,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,082,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,151,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,468,255 >>> mbox cmd response: success
14,471,845 UART: [afmc] ++
14,472,435 UART: [afmc] CDI.KEYID = 6
14,473,314 UART: [afmc] SUBJECT.KEYID = 7
14,474,523 UART: [afmc] AUTHORITY.KEYID = 5
16,977,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,701,299 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,717,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,733,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,749,114 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,622 UART: [afmc] --
18,774,274 UART: [cold-reset] --
18,778,829 UART: [state] Locking Datavault
18,782,881 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,520 UART: [state] Locking ICCM
18,786,856 UART: [exit] Launching FMC @ 0x40000130
18,795,242 UART:
18,795,478 UART: Running Caliptra FMC ...
18,796,500 UART:
18,796,643 UART: [state] CFI Enabled
18,805,227 UART: [fht] FMC Alias Private Key: 7
20,562,506 UART: [art] Extend RT PCRs Done
20,563,723 UART: [art] Lock RT PCRs Done
20,565,205 UART: [art] Populate DV Done
20,570,558 UART: [fht] FMC Alias Private Key: 7
20,572,270 UART: [art] Derive CDI
20,573,010 UART: [art] Store in in slot 0x4
20,615,115 UART: [art] Derive Key Pair
20,616,149 UART: [art] Store priv key in slot 0x5
23,043,072 UART: [art] Derive Key Pair - Done
23,055,966 UART: [art] Signing Cert with AUTHO
23,057,273 UART: RITY.KEYID = 7
24,762,404 UART: [art] Erasing AUTHORITY.KEYID = 7
24,763,910 UART: [art] PUB.X = FBF9D4309C6AB8B7D742EE2EB0D96EFF319B3DE4AA350DC4D5307EB398F52C46AD046E98325BF46E5E43B632EAE8DFE7
24,771,171 UART: [art] PUB.Y = 3C5E08E953C84EB9C16D38C4FC77F29D494ADA4944A4A033DF0C979154BB2A33E2F3B289393292B33EA6A2B93C074611
24,778,465 UART: [art] SIG.R = 9148BA52BB494A5136012C95E8A081D1589F62D179149B9683E29B760BF6E7006BC55C0A845F35ABD372CEED9ECC72E7
24,785,809 UART: [art] SIG.S = 442124207797081A8B35825F868505CF351D03D8E69CB1B5FEF0868ACCEC9D268C3F26D09525BAE038D13C5B163E64E4
25,765,174 UART: Caliptra RT
25,765,873 UART: [state] CFI Enabled
25,882,355 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
5,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,953 >>> mbox cmd response: success
18,518,177 UART:
18,518,664 UART: Running Caliptra FMC ...
18,519,826 UART:
18,519,989 UART: [state] CFI Enabled
18,527,651 UART: [fht] FMC Alias Private Key: 7
20,284,190 UART: [art] Extend RT PCRs Done
20,285,418 UART: [art] Lock RT PCRs Done
20,287,072 UART: [art] Populate DV Done
20,292,339 UART: [fht] FMC Alias Private Key: 7
20,293,986 UART: [art] Derive CDI
20,294,723 UART: [art] Store in in slot 0x4
20,337,528 UART: [art] Derive Key Pair
20,338,521 UART: [art] Store priv key in slot 0x5
22,765,839 UART: [art] Derive Key Pair - Done
22,778,780 UART: [art] Signing Cert with AUTHO
22,780,081 UART: RITY.KEYID = 7
24,485,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,038 UART: [art] PUB.X = 00C47D90496E2F2ECF9A8DABBB006E730CC2E6F4041C796FDC130EF6767CC3BBCF7DFAE48F74441301FA14EE2B1AAEB8
24,494,717 UART: [art] PUB.Y = 55260688F2348020B19CB6A4153949E339B48A9A7929C52D4CFF3D2F43F09EC7C760F8704EA855AD1DD53FC08C74C85C
24,501,955 UART: [art] SIG.R = E0116A6DA2CA42334FC6D154DEA5C72DCBC7F1972AFE2866C6D3CB914A39896C150AB4F6EADA07DF628B57BC11712E41
24,509,412 UART: [art] SIG.S = 0630401A390BCD732F1B48828E9B4BCB98A29BF740584796275628A86F78134BDDA1F238AC4FC9FAAB56B2B660A0C6DB
25,488,801 UART: Caliptra RT
25,489,511 UART: [state] CFI Enabled
25,607,167 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
5,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,245,829 >>> mbox cmd response: success
18,497,444 UART:
18,497,831 UART: Running Caliptra FMC ...
18,498,959 UART:
18,499,112 UART: [state] CFI Enabled
18,507,320 UART: [fht] FMC Alias Private Key: 7
20,263,927 UART: [art] Extend RT PCRs Done
20,265,152 UART: [art] Lock RT PCRs Done
20,266,586 UART: [art] Populate DV Done
20,271,880 UART: [fht] FMC Alias Private Key: 7
20,273,562 UART: [art] Derive CDI
20,274,301 UART: [art] Store in in slot 0x4
20,316,517 UART: [art] Derive Key Pair
20,317,513 UART: [art] Store priv key in slot 0x5
22,744,714 UART: [art] Derive Key Pair - Done
22,757,324 UART: [art] Signing Cert with AUTHO
22,758,659 UART: RITY.KEYID = 7
24,463,553 UART: [art] Erasing AUTHORITY.KEYID = 7
24,465,056 UART: [art] PUB.X = C62605EAFB1538797B7707F3D8F506F1917EBB2512BE3347BDD632BA7E15AFACFE31178B5F4C7230684E12C82186F3A6
24,472,322 UART: [art] PUB.Y = B7CE87FE684F658423FA8920BCC4850609C44BB800FE3D081E9E422B82D6CF79239BD8E114A84A39BA1C2912F4E93D47
24,479,545 UART: [art] SIG.R = BC5621F1428D9DA703202A3B1465617BA2054288115F5B752AC8A41AFD4D6C208A8DA3CD61ED57780BDE913919543616
24,486,892 UART: [art] SIG.S = AAE9681DEFE0952C5FF023AD178CA2945EAD80503453E4AFC5D22CADC7D8156C40F3D5CF09A480911867BB3A9B4ACFA3
25,465,676 UART: Caliptra RT
25,466,390 UART: [state] CFI Enabled
25,585,143 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
5,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,494 >>> mbox cmd response: success
18,509,449 UART:
18,509,839 UART: Running Caliptra FMC ...
18,511,026 UART:
18,511,196 UART: [state] CFI Enabled
18,519,109 UART: [fht] FMC Alias Private Key: 7
20,276,398 UART: [art] Extend RT PCRs Done
20,277,614 UART: [art] Lock RT PCRs Done
20,279,315 UART: [art] Populate DV Done
20,284,607 UART: [fht] FMC Alias Private Key: 7
20,286,053 UART: [art] Derive CDI
20,286,790 UART: [art] Store in in slot 0x4
20,328,952 UART: [art] Derive Key Pair
20,329,994 UART: [art] Store priv key in slot 0x5
22,756,563 UART: [art] Derive Key Pair - Done
22,769,556 UART: [art] Signing Cert with AUTHO
22,770,852 UART: RITY.KEYID = 7
24,476,406 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,898 UART: [art] PUB.X = 357F35A987FC6BF87198D03D7E914EB51B84EEB042D79E88BC66CE0591F70C236681422A525DCBB0004A36EA388CDEC3
24,485,149 UART: [art] PUB.Y = 188D9013FC8DB91543CB024F32F5F92A1F24E76F60DCBB99FE7D2EF33849E40BA2F74A7429DBF99F71CD64CD8609EA9C
24,492,471 UART: [art] SIG.R = 14D29A99EB57E296FE78E660E115B8DEBF299635902B2D5A7072F00E1166824F411F75694B1843CD48B9165D78F2F21A
24,499,822 UART: [art] SIG.S = 98D562F5A88914BE8B93C463BADABB35DDB5543B88D5A01F3E9C3F20E56550BAEEED9B995CE572FAD91687C46184BF05
25,479,278 UART: Caliptra RT
25,479,988 UART: [state] CFI Enabled
25,596,421 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
6,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,053 >>> mbox cmd response: success
18,505,256 UART:
18,505,664 UART: Running Caliptra FMC ...
18,506,779 UART:
18,506,955 UART: [state] CFI Enabled
18,515,066 UART: [fht] FMC Alias Private Key: 7
20,271,790 UART: [art] Extend RT PCRs Done
20,273,055 UART: [art] Lock RT PCRs Done
20,274,386 UART: [art] Populate DV Done
20,279,865 UART: [fht] FMC Alias Private Key: 7
20,281,459 UART: [art] Derive CDI
20,282,196 UART: [art] Store in in slot 0x4
20,324,898 UART: [art] Derive Key Pair
20,325,941 UART: [art] Store priv key in slot 0x5
22,752,288 UART: [art] Derive Key Pair - Done
22,765,295 UART: [art] Signing Cert with AUTHO
22,766,606 UART: RITY.KEYID = 7
24,472,404 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,906 UART: [art] PUB.X = 99ED37DCE7D7BCDC98645988769BCC54661FCDC0590F6F51B73BF6A89FF47A33B46C9FCA9D57A2FB21CACBD4B51DC5E7
24,481,237 UART: [art] PUB.Y = 6FF199488B2FF6677C5E468834D77377A5907B557F53B5CF315AA012BC3FA308616FCB74A8BDDB69702F022B43CA59E1
24,488,503 UART: [art] SIG.R = C772B75C2D31F2E8A05FB9301AC4A600DE1369F7168CC8B57511FE049E2AF301479901DBFE433B2AE1EC46E6DB1B67D5
24,495,870 UART: [art] SIG.S = A44C0C4A7269F0F496C8CB46154B7234E3AC72391F3F80ABF85314E0BC236C4807541EDAC5DBEDC0DE70C0D7924AE768
25,474,586 UART: Caliptra RT
25,475,278 UART: [state] CFI Enabled
25,592,276 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,597,585 UART: [state] Locking Datavault
18,603,196 UART: [state] Locking PCR0, PCR1 and PCR31
18,604,857 UART: [state] Locking ICCM
18,607,280 UART: [exit] Launching FMC @ 0x40000130
18,615,676 UART:
18,615,911 UART: Running Caliptra FMC ...
18,617,012 UART:
18,617,176 UART: [state] CFI Enabled
18,672,940 UART: [fht] FMC Alias Private Key: 7
20,436,560 UART: [art] Extend RT PCRs Done
20,437,783 UART: [art] Lock RT PCRs Done
20,439,017 UART: [art] Populate DV Done
20,444,572 UART: [fht] FMC Alias Private Key: 7
20,446,223 UART: [art] Derive CDI
20,447,047 UART: [art] Store in in slot 0x4
20,504,630 UART: [art] Derive Key Pair
20,505,627 UART: [art] Store priv key in slot 0x5
22,968,692 UART: [art] Derive Key Pair - Done
22,981,635 UART: [art] Signing Cert with AUTHO
22,982,932 UART: RITY.KEYID = 7
24,694,031 UART: [art] Erasing AUTHORITY.KEYID = 7
24,695,542 UART: [art] PUB.X = 72ABA23AFF6DD88293BED7AEAB6E7477F3876270687071B10D4E1AE4B0E6FEE9597C12837F97C00AAB26E4BFB418D023
24,702,785 UART: [art] PUB.Y = 2CEDC612F4236CE8923EA502AEC345CC25C79C4679EDA727AC6E6597281B47198D21FDC838594B7651C2497474762EB9
24,710,081 UART: [art] SIG.R = 9B498622C986E2B28ACACD4A9AC05E738D0C0CC391232DBF700AD596E8975A0E1CB3BB08156F291AEBE6DD3E469DF31B
24,717,478 UART: [art] SIG.S = C4DC875791CDCA6881555268B9326DCB8477B05C068AA2EA0D926952335F0653C2C35674CE8676748C55EBA769E1828C
25,696,031 UART: Caliptra RT
25,696,720 UART: [state] CFI Enabled
25,860,861 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
4,699 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,070 UART:
192,442 UART: Running Caliptra ROM ...
193,720 UART:
193,897 UART: [state] CFI Enabled
265,909 UART: [state] LifecycleState = Unprovisioned
267,746 UART: [state] DebugLocked = No
269,609 UART: [state] WD Timer not started. Device not locked for debugging
273,813 UART: [kat] SHA2-256
452,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,465 UART: [kat] ++
465,048 UART: [kat] sha1
474,801 UART: [kat] SHA2-256
477,809 UART: [kat] SHA2-384
484,434 UART: [kat] SHA2-512-ACC
487,416 UART: [kat] ECC-384
2,949,427 UART: [kat] HMAC-384Kdf
2,971,885 UART: [kat] LMS
3,501,339 UART: [kat] --
3,505,495 UART: [cold-reset] ++
3,506,910 UART: [fht] FHT @ 0x50003400
3,517,460 UART: [idev] ++
3,518,031 UART: [idev] CDI.KEYID = 6
3,518,949 UART: [idev] SUBJECT.KEYID = 7
3,520,164 UART: [idev] UDS.KEYID = 0
3,544,349 UART: [idev] Erasing UDS.KEYID = 0
6,024,693 UART: [idev] Sha384 KeyId Algorithm
6,035,325 UART: [idev] --
6,039,792 UART: [ldev] ++
6,040,373 UART: [ldev] CDI.KEYID = 6
6,041,259 UART: [ldev] SUBJECT.KEYID = 5
6,042,391 UART: [ldev] AUTHORITY.KEYID = 7
6,043,591 UART: [ldev] FE.KEYID = 1
6,079,193 UART: [ldev] Erasing FE.KEYID = 1
8,586,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,751 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,364,653 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,384,051 UART: [ldev] --
10,387,862 UART: [fwproc] Wait for Commands...
10,389,964 UART: [fwproc] Recv command 0x46574c44
10,392,063 UART: [fwproc] Recv'd Img size: 114084 bytes
13,788,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,861,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,247,201 >>> mbox cmd response: success
14,252,260 UART: [afmc] ++
14,252,851 UART: [afmc] CDI.KEYID = 6
14,253,737 UART: [afmc] SUBJECT.KEYID = 7
14,254,833 UART: [afmc] AUTHORITY.KEYID = 5
16,787,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,926 UART: [afmc] --
18,587,092 UART: [cold-reset] --
18,591,068 UART: [state] Locking Datavault
18,594,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,067 UART: [state] Locking ICCM
18,597,035 UART: [exit] Launching FMC @ 0x40000130
18,605,434 UART:
18,605,667 UART: Running Caliptra FMC ...
18,606,770 UART:
18,606,923 UART: [state] CFI Enabled
18,669,171 UART: [fht] FMC Alias Private Key: 7
20,433,234 UART: [art] Extend RT PCRs Done
20,434,443 UART: [art] Lock RT PCRs Done
20,436,118 UART: [art] Populate DV Done
20,441,634 UART: [fht] FMC Alias Private Key: 7
20,443,180 UART: [art] Derive CDI
20,443,995 UART: [art] Store in in slot 0x4
20,502,175 UART: [art] Derive Key Pair
20,503,174 UART: [art] Store priv key in slot 0x5
22,965,937 UART: [art] Derive Key Pair - Done
22,979,052 UART: [art] Signing Cert with AUTHO
22,980,367 UART: RITY.KEYID = 7
24,692,181 UART: [art] Erasing AUTHORITY.KEYID = 7
24,693,673 UART: [art] PUB.X = 857B8CE2A8670B95710EA2996A27BF53D7092425FD30F002EA3CA4220AC2C703060B7193A38917A728C3A3F7AAEA6656
24,700,923 UART: [art] PUB.Y = 2CD5C23C95758B83775DB823FB16F9AC60F6F7818E3953D689C7D68046A7461130CAC1B09EFF02235F28B5968BCC3427
24,708,211 UART: [art] SIG.R = 1BABC554AD5CB46ADC959D29DC7775CDC4820F05E037B3E8DF071BA9CC56E185E24717F84D083F403C3669501F946B86
24,715,606 UART: [art] SIG.S = CC7E7E99C8FE907006BB0174157DCE42D5413D60E9966F1888C2AAF9413C437CC7FAF5380D90A4400657B31AA816A94F
25,694,183 UART: Caliptra RT
25,694,902 UART: [state] CFI Enabled
25,860,519 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
4,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,169 UART:
192,542 UART: Running Caliptra ROM ...
193,625 UART:
193,771 UART: [state] CFI Enabled
263,103 UART: [state] LifecycleState = Unprovisioned
265,017 UART: [state] DebugLocked = No
266,864 UART: [state] WD Timer not started. Device not locked for debugging
271,188 UART: [kat] SHA2-256
450,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,897 UART: [kat] ++
462,347 UART: [kat] sha1
472,844 UART: [kat] SHA2-256
475,909 UART: [kat] SHA2-384
482,257 UART: [kat] SHA2-512-ACC
485,241 UART: [kat] ECC-384
2,948,959 UART: [kat] HMAC-384Kdf
2,970,268 UART: [kat] LMS
3,499,757 UART: [kat] --
3,505,068 UART: [cold-reset] ++
3,506,521 UART: [fht] FHT @ 0x50003400
3,518,634 UART: [idev] ++
3,519,206 UART: [idev] CDI.KEYID = 6
3,520,225 UART: [idev] SUBJECT.KEYID = 7
3,521,331 UART: [idev] UDS.KEYID = 0
3,540,772 UART: [idev] Erasing UDS.KEYID = 0
6,023,647 UART: [idev] Fuse KeyId
6,027,671 UART: [idev] --
6,031,123 UART: [ldev] ++
6,031,699 UART: [ldev] CDI.KEYID = 6
6,032,611 UART: [ldev] SUBJECT.KEYID = 5
6,033,829 UART: [ldev] AUTHORITY.KEYID = 7
6,035,090 UART: [ldev] FE.KEYID = 1
6,075,125 UART: [ldev] Erasing FE.KEYID = 1
8,576,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,703 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,363,478 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,383,301 UART: [ldev] --
10,388,460 UART: [fwproc] Wait for Commands...
10,391,155 UART: [fwproc] Recv command 0x46574c44
10,393,201 UART: [fwproc] Recv'd Img size: 114084 bytes
13,790,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,857,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,925,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,242,262 >>> mbox cmd response: success
14,246,750 UART: [afmc] ++
14,247,368 UART: [afmc] CDI.KEYID = 6
14,248,282 UART: [afmc] SUBJECT.KEYID = 7
14,249,441 UART: [afmc] AUTHORITY.KEYID = 5
16,781,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,527,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,543,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,558,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,582,217 UART: [afmc] --
18,585,444 UART: [cold-reset] --
18,588,759 UART: [state] Locking Datavault
18,595,031 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,678 UART: [state] Locking ICCM
18,598,074 UART: [exit] Launching FMC @ 0x40000130
18,606,534 UART:
18,606,791 UART: Running Caliptra FMC ...
18,607,896 UART:
18,608,054 UART: [state] CFI Enabled
18,666,473 UART: [fht] FMC Alias Private Key: 7
20,429,828 UART: [art] Extend RT PCRs Done
20,431,043 UART: [art] Lock RT PCRs Done
20,432,778 UART: [art] Populate DV Done
20,438,084 UART: [fht] FMC Alias Private Key: 7
20,439,739 UART: [art] Derive CDI
20,440,550 UART: [art] Store in in slot 0x4
20,499,154 UART: [art] Derive Key Pair
20,500,188 UART: [art] Store priv key in slot 0x5
22,962,962 UART: [art] Derive Key Pair - Done
22,976,195 UART: [art] Signing Cert with AUTHO
22,977,526 UART: RITY.KEYID = 7
24,688,917 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,444 UART: [art] PUB.X = 40B778A38955B32D19A13BC74B880D4D81A7C48FCED11F2AAEFE91958F21B434EEDC36A805EEF225443825B3357A9BBC
24,697,695 UART: [art] PUB.Y = 9DDBBB2262E2DB2D765D0A0456869E813B921D2E60C082454C9D4EEA69192B1964259863A691B923EFE67957EF246715
24,704,927 UART: [art] SIG.R = 654E28CA5215F3C2220A702484552FC3CAA8F3749E2EDB6B8197C2C69FB0D23EC5599625730643A34700A8DADF8885F8
24,712,320 UART: [art] SIG.S = 0DD3FF988064E37B4FF18271AC638ECD7B2F586BAD6D74A8C2776A41F77587B8D991198265DCF57D5A53A9FEB8E626CD
25,690,756 UART: Caliptra RT
25,691,459 UART: [state] CFI Enabled
25,858,035 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,045,781 >>> mbox cmd response: success
18,335,736 UART:
18,336,160 UART: Running Caliptra FMC ...
18,337,311 UART:
18,337,461 UART: [state] CFI Enabled
18,399,706 UART: [fht] FMC Alias Private Key: 7
20,163,256 UART: [art] Extend RT PCRs Done
20,164,488 UART: [art] Lock RT PCRs Done
20,165,978 UART: [art] Populate DV Done
20,171,279 UART: [fht] FMC Alias Private Key: 7
20,172,922 UART: [art] Derive CDI
20,173,657 UART: [art] Store in in slot 0x4
20,231,729 UART: [art] Derive Key Pair
20,232,770 UART: [art] Store priv key in slot 0x5
22,695,477 UART: [art] Derive Key Pair - Done
22,708,341 UART: [art] Signing Cert with AUTHO
22,709,660 UART: RITY.KEYID = 7
24,421,792 UART: [art] Erasing AUTHORITY.KEYID = 7
24,423,303 UART: [art] PUB.X = B7A543820AC167046C1181D89D075EF1861230B86A09E8D7A485B3C738BB301F8C6E47B74477A7261AC488092A5F1B87
24,430,554 UART: [art] PUB.Y = 85532E9116171845A1E74DECAD3A4ECE8D44B8C75D6639BCDE581C9FC46C3F37FAEC8F8562A703D0737632D4286BB558
24,437,818 UART: [art] SIG.R = 7E8214B78BEC81A964C78D1A02374D8BA00FFDD793E99EE8BA43670D2B9B42BB890B44291200CEDE79B2D57159754A4F
24,445,245 UART: [art] SIG.S = B06D213E7854BC19B232EEC534962A0FE05E5C9C6058A071013748E988B15611EB522789518385B6D282A6D84C47C744
25,423,824 UART: Caliptra RT
25,424,522 UART: [state] CFI Enabled
25,590,824 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
4,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,044,925 >>> mbox cmd response: success
18,341,018 UART:
18,341,474 UART: Running Caliptra FMC ...
18,342,609 UART:
18,342,770 UART: [state] CFI Enabled
18,408,807 UART: [fht] FMC Alias Private Key: 7
20,172,639 UART: [art] Extend RT PCRs Done
20,173,899 UART: [art] Lock RT PCRs Done
20,175,388 UART: [art] Populate DV Done
20,180,908 UART: [fht] FMC Alias Private Key: 7
20,182,398 UART: [art] Derive CDI
20,183,169 UART: [art] Store in in slot 0x4
20,241,627 UART: [art] Derive Key Pair
20,242,675 UART: [art] Store priv key in slot 0x5
22,705,943 UART: [art] Derive Key Pair - Done
22,718,947 UART: [art] Signing Cert with AUTHO
22,720,254 UART: RITY.KEYID = 7
24,431,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,230 UART: [art] PUB.X = 3FE49409D1FC6EB097C7FB35CEA529B07EAE2C70420D51038CA7CE36B6A5D400DB43633CC18EC8B06208EE312007B78D
24,440,483 UART: [art] PUB.Y = BB22A2C2C68B8563D3A2DB66C5B968E6898E1A706E5BC8592D630B6C1D49CEA3D76A9EA696B466EA94E35C3CD1B6B599
24,447,750 UART: [art] SIG.R = 1A92D2EEA5DF6DC29C5898BC910423CE5E4008232C6AC558330D4B5737B36CEC578DAEF67C2E255AC68C9FE0C557EA8A
24,455,139 UART: [art] SIG.S = 12B77D06CCACCA184CCFC2588B6AD00218454AD8E5F1E33933CD5877D564C673D676982CD9A9A98F405F68F5372586C1
25,433,876 UART: Caliptra RT
25,434,607 UART: [state] CFI Enabled
25,599,335 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
4,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,044,685 >>> mbox cmd response: success
18,322,645 UART:
18,323,057 UART: Running Caliptra FMC ...
18,324,275 UART:
18,324,436 UART: [state] CFI Enabled
18,391,131 UART: [fht] FMC Alias Private Key: 7
20,154,889 UART: [art] Extend RT PCRs Done
20,156,098 UART: [art] Lock RT PCRs Done
20,157,944 UART: [art] Populate DV Done
20,163,255 UART: [fht] FMC Alias Private Key: 7
20,164,798 UART: [art] Derive CDI
20,165,561 UART: [art] Store in in slot 0x4
20,224,383 UART: [art] Derive Key Pair
20,225,383 UART: [art] Store priv key in slot 0x5
22,688,193 UART: [art] Derive Key Pair - Done
22,701,035 UART: [art] Signing Cert with AUTHO
22,702,368 UART: RITY.KEYID = 7
24,413,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,444 UART: [art] PUB.X = 60F0A38443908B8DE8D4A6F708D2EAA150A7C59E7B6B12875A72664AAC2C9ED1E682D1F6A61005F625138FE36549FABD
24,422,750 UART: [art] PUB.Y = 2686488245CE3BDCA24B7B4E5742904560710C8BD6231D769B3A7D2AF297173C62C7EA6E378E2B2707BE81BE6958473D
24,430,005 UART: [art] SIG.R = 0330B6C173E4290A6D6019895FFAB0455AD7B8D46A5B78C91C4EF8FB7ADF2D5383335D22A205605D5D96B93B41549A13
24,437,344 UART: [art] SIG.S = E044D079FE11BAF7A64D1AAF1C14E497E9CC2D2D29C6FC4C87C39430DF2496F7793A62588CEC5E05615FBE4EE486FDBA
25,415,627 UART: Caliptra RT
25,416,340 UART: [state] CFI Enabled
25,583,063 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
4,713 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,047,615 >>> mbox cmd response: success
18,346,493 UART:
18,346,893 UART: Running Caliptra FMC ...
18,348,048 UART:
18,348,217 UART: [state] CFI Enabled
18,411,537 UART: [fht] FMC Alias Private Key: 7
20,174,890 UART: [art] Extend RT PCRs Done
20,176,124 UART: [art] Lock RT PCRs Done
20,177,532 UART: [art] Populate DV Done
20,183,091 UART: [fht] FMC Alias Private Key: 7
20,184,646 UART: [art] Derive CDI
20,185,616 UART: [art] Store in in slot 0x4
20,244,050 UART: [art] Derive Key Pair
20,245,066 UART: [art] Store priv key in slot 0x5
22,708,251 UART: [art] Derive Key Pair - Done
22,721,085 UART: [art] Signing Cert with AUTHO
22,722,399 UART: RITY.KEYID = 7
24,433,991 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,496 UART: [art] PUB.X = 0002F8EE2C94C4365F666345421077A2262C5B583D56253101891C5DB596C69C0EC23AFB7855263B51571CB5B30A737D
24,442,751 UART: [art] PUB.Y = 000605C6AE5FE50DEB2340AB500227C95189173BC63D5FF3FD621F6FC37C5EF8F97B78201B9276C0B6FED700E26550E3
24,449,947 UART: [art] SIG.R = DA3DB5E20099DD85F78B264F32FA067790674BD033705082D63476D681741FE7739F3DC041233FDE2052CDC0F69FF711
24,457,351 UART: [art] SIG.S = 4BB14B4C283705E22C2B4A2BE5F83803CFFE2D45A7255781EBBBAC39F012D57686CDC5DC1CB40251C69DAB8B28994EF0
25,436,168 UART: Caliptra RT
25,436,864 UART: [state] CFI Enabled
25,602,338 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,766,919 UART: [state] Locking Datavault
18,771,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,773,044 UART: [state] Locking ICCM
18,774,290 UART: [exit] Launching FMC @ 0x40000130
18,782,726 UART:
18,782,965 UART: Running Caliptra FMC ...
18,784,063 UART:
18,784,252 UART: [state] CFI Enabled
18,791,922 UART: [fht] FMC Alias Private Key: 7
20,548,281 UART: [art] Extend RT PCRs Done
20,549,514 UART: [art] Lock RT PCRs Done
20,551,274 UART: [art] Populate DV Done
20,556,917 UART: [fht] FMC Alias Private Key: 7
20,558,558 UART: [art] Derive CDI
20,559,372 UART: [art] Store in in slot 0x4
20,601,909 UART: [art] Derive Key Pair
20,602,902 UART: [art] Store priv key in slot 0x5
23,029,514 UART: [art] Derive Key Pair - Done
23,042,410 UART: [art] Signing Cert with AUTHO
23,043,708 UART: RITY.KEYID = 7
24,749,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,531 UART: [art] PUB.X = D52845AEEB5F782AEBB82D3841401FC6A18C6D75DA97E53750E4878A642795D255CC3CD99245632C0504EE6D80487388
24,757,784 UART: [art] PUB.Y = 3AF2A3C3E67B665F246EF7F3AE698D725E4FA7A7529A4E7F397F04E48EE4DC386FE80E116C81C9CC707D275EE805BC1C
24,765,038 UART: [art] SIG.R = 50DF464288370573E1186AF0CB92E3192AFBD541774AC8BA7E6DF585154C3EB796CD8E57371117466AA4F32EC1BA7951
24,772,444 UART: [art] SIG.S = 938AFC73D031C8AE23DCA2F45890D128A95DD301469EAD45552D0AAA8A19B7DE18647F283E8EDF7E6196C956ED325AC3
25,751,526 UART: Caliptra RT
25,752,225 UART: [state] CFI Enabled
25,869,338 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
5,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,528 UART:
192,909 UART: Running Caliptra ROM ...
194,087 UART:
603,609 UART: [state] CFI Enabled
618,893 UART: [state] LifecycleState = Unprovisioned
620,781 UART: [state] DebugLocked = No
622,694 UART: [state] WD Timer not started. Device not locked for debugging
627,278 UART: [kat] SHA2-256
806,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,946 UART: [kat] ++
818,474 UART: [kat] sha1
829,463 UART: [kat] SHA2-256
832,523 UART: [kat] SHA2-384
837,543 UART: [kat] SHA2-512-ACC
840,524 UART: [kat] ECC-384
3,281,892 UART: [kat] HMAC-384Kdf
3,295,677 UART: [kat] LMS
3,825,190 UART: [kat] --
3,830,697 UART: [cold-reset] ++
3,833,110 UART: [fht] FHT @ 0x50003400
3,844,189 UART: [idev] ++
3,844,756 UART: [idev] CDI.KEYID = 6
3,845,661 UART: [idev] SUBJECT.KEYID = 7
3,846,870 UART: [idev] UDS.KEYID = 0
3,862,577 UART: [idev] Erasing UDS.KEYID = 0
6,317,002 UART: [idev] Sha384 KeyId Algorithm
6,327,018 UART: [idev] --
6,331,703 UART: [ldev] ++
6,332,262 UART: [ldev] CDI.KEYID = 6
6,333,217 UART: [ldev] SUBJECT.KEYID = 5
6,334,293 UART: [ldev] AUTHORITY.KEYID = 7
6,335,545 UART: [ldev] FE.KEYID = 1
6,345,511 UART: [ldev] Erasing FE.KEYID = 1
8,819,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,422 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,585,234 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,604,839 UART: [ldev] --
10,610,246 UART: [fwproc] Wait for Commands...
10,613,317 UART: [fwproc] Recv command 0x46574c44
10,615,406 UART: [fwproc] Recv'd Img size: 114084 bytes
14,020,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,481,034 >>> mbox cmd response: success
14,484,956 UART: [afmc] ++
14,485,534 UART: [afmc] CDI.KEYID = 6
14,486,416 UART: [afmc] SUBJECT.KEYID = 7
14,487,626 UART: [afmc] AUTHORITY.KEYID = 5
16,985,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,285 UART: [afmc] --
18,782,865 UART: [cold-reset] --
18,786,991 UART: [state] Locking Datavault
18,791,909 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,604 UART: [state] Locking ICCM
18,796,040 UART: [exit] Launching FMC @ 0x40000130
18,804,502 UART:
18,804,736 UART: Running Caliptra FMC ...
18,805,832 UART:
18,805,984 UART: [state] CFI Enabled
18,814,404 UART: [fht] FMC Alias Private Key: 7
20,570,933 UART: [art] Extend RT PCRs Done
20,572,149 UART: [art] Lock RT PCRs Done
20,573,928 UART: [art] Populate DV Done
20,579,336 UART: [fht] FMC Alias Private Key: 7
20,580,980 UART: [art] Derive CDI
20,581,787 UART: [art] Store in in slot 0x4
20,624,027 UART: [art] Derive Key Pair
20,625,064 UART: [art] Store priv key in slot 0x5
23,051,990 UART: [art] Derive Key Pair - Done
23,064,874 UART: [art] Signing Cert with AUTHO
23,066,192 UART: RITY.KEYID = 7
24,771,937 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,449 UART: [art] PUB.X = 055103BF2BE5BD4F1B32045B5E9447A5D437DE266BA59987204C5CB072D9430511FCB57B6151CDD40301579930E1DF67
24,780,701 UART: [art] PUB.Y = 026E9900D301B45253FA784AA5394666FCC3D725B08D397BACFF2860A2981169C613A13E071794D37BDFD3002ACBDA55
24,787,888 UART: [art] SIG.R = BCB90984D69230165456553180CE329189458576CA08FE2BB98096C7D5F1A348046276EF875EC06E703710C1CE41682F
24,795,251 UART: [art] SIG.S = 8C4B1964092681B25D14BA581C0183D6D577F62D84D0DE637847C1C33E00829750CBA75855CD952462064D7FE595DF24
25,774,263 UART: Caliptra RT
25,774,977 UART: [state] CFI Enabled
25,890,874 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
5,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,586 UART:
192,957 UART: Running Caliptra ROM ...
194,126 UART:
603,811 UART: [state] CFI Enabled
616,898 UART: [state] LifecycleState = Unprovisioned
618,780 UART: [state] DebugLocked = No
620,095 UART: [state] WD Timer not started. Device not locked for debugging
623,388 UART: [kat] SHA2-256
802,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,090 UART: [kat] ++
814,643 UART: [kat] sha1
825,957 UART: [kat] SHA2-256
829,018 UART: [kat] SHA2-384
835,098 UART: [kat] SHA2-512-ACC
838,024 UART: [kat] ECC-384
3,278,216 UART: [kat] HMAC-384Kdf
3,290,076 UART: [kat] LMS
3,819,540 UART: [kat] --
3,824,949 UART: [cold-reset] ++
3,827,419 UART: [fht] FHT @ 0x50003400
3,838,567 UART: [idev] ++
3,839,177 UART: [idev] CDI.KEYID = 6
3,840,089 UART: [idev] SUBJECT.KEYID = 7
3,841,253 UART: [idev] UDS.KEYID = 0
3,855,988 UART: [idev] Erasing UDS.KEYID = 0
6,315,002 UART: [idev] Fuse KeyId
6,318,992 UART: [idev] --
6,323,224 UART: [ldev] ++
6,323,800 UART: [ldev] CDI.KEYID = 6
6,324,710 UART: [ldev] SUBJECT.KEYID = 5
6,325,867 UART: [ldev] AUTHORITY.KEYID = 7
6,327,102 UART: [ldev] FE.KEYID = 1
6,336,723 UART: [ldev] Erasing FE.KEYID = 1
8,809,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,524,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,540,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,883 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,571,696 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,591,906 UART: [ldev] --
10,596,097 UART: [fwproc] Wait for Commands...
10,598,142 UART: [fwproc] Recv command 0x46574c44
10,600,234 UART: [fwproc] Recv'd Img size: 114084 bytes
14,008,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,076,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,144,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,461,216 >>> mbox cmd response: success
14,465,522 UART: [afmc] ++
14,466,105 UART: [afmc] CDI.KEYID = 6
14,467,012 UART: [afmc] SUBJECT.KEYID = 7
14,468,228 UART: [afmc] AUTHORITY.KEYID = 5
16,967,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,689,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,691,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,707,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,723,784 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,739,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,762,721 UART: [afmc] --
18,767,065 UART: [cold-reset] --
18,770,077 UART: [state] Locking Datavault
18,774,793 UART: [state] Locking PCR0, PCR1 and PCR31
18,776,434 UART: [state] Locking ICCM
18,778,795 UART: [exit] Launching FMC @ 0x40000130
18,787,240 UART:
18,787,470 UART: Running Caliptra FMC ...
18,788,568 UART:
18,788,724 UART: [state] CFI Enabled
18,797,145 UART: [fht] FMC Alias Private Key: 7
20,553,803 UART: [art] Extend RT PCRs Done
20,555,020 UART: [art] Lock RT PCRs Done
20,556,696 UART: [art] Populate DV Done
20,562,166 UART: [fht] FMC Alias Private Key: 7
20,563,794 UART: [art] Derive CDI
20,564,612 UART: [art] Store in in slot 0x4
20,607,099 UART: [art] Derive Key Pair
20,608,117 UART: [art] Store priv key in slot 0x5
23,034,693 UART: [art] Derive Key Pair - Done
23,047,464 UART: [art] Signing Cert with AUTHO
23,048,794 UART: RITY.KEYID = 7
24,753,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,436 UART: [art] PUB.X = 8FA2AB159345A167F58A42C145F205D003D832599523FD7F09F171263DB92876BEA0E5F2F72814F6CE00F43A0B12C201
24,762,695 UART: [art] PUB.Y = AD8691E134B1E7A95B494F8245777944CC45810E74C83C6A635A100F7DF8FF410118B835DFE0839C1BA922B7A3BF0D01
24,769,933 UART: [art] SIG.R = F53B54C539689AD460C0DD0BE3E31FCF464AC94C009EC13F6D30B48AC35158A34660F0725C47FBDC5EF12C82DC947656
24,777,328 UART: [art] SIG.S = EB6F999FF564D0DE8DE12C672B53FDD41D01C9C9B3F81F27927C3FCE50636AC373E755053D1BDF3A9EFCA26B9328401A
25,756,306 UART: Caliptra RT
25,757,004 UART: [state] CFI Enabled
25,874,128 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,671 writing to cptra_bootfsm_go
6,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,680 >>> mbox cmd response: success
18,517,770 UART:
18,518,213 UART: Running Caliptra FMC ...
18,519,398 UART:
18,519,562 UART: [state] CFI Enabled
18,527,531 UART: [fht] FMC Alias Private Key: 7
20,283,918 UART: [art] Extend RT PCRs Done
20,285,155 UART: [art] Lock RT PCRs Done
20,286,781 UART: [art] Populate DV Done
20,292,187 UART: [fht] FMC Alias Private Key: 7
20,293,614 UART: [art] Derive CDI
20,294,346 UART: [art] Store in in slot 0x4
20,336,924 UART: [art] Derive Key Pair
20,337,990 UART: [art] Store priv key in slot 0x5
22,764,272 UART: [art] Derive Key Pair - Done
22,777,168 UART: [art] Signing Cert with AUTHO
22,778,475 UART: RITY.KEYID = 7
24,483,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,243 UART: [art] PUB.X = D8EDABB73EBB57947B30428362562EDD8B890698C58C98DC06901460E96DD50726A74B432AF82C22925E684E02A5316C
24,492,515 UART: [art] PUB.Y = 230EEF91C6D323B2F102EBCBB1651AFC186B9B5AA89DC349800D64241A7B14AA7E726C1817403C7C788D527FCA5CFD7C
24,499,799 UART: [art] SIG.R = 6848AFF907527859402FEEAF98A6BCE5C28F283D43486000A893FC872FED7E3864B1DF1BE474B00B2DB7A47E3042B49D
24,507,157 UART: [art] SIG.S = F8B6A145AAA19C26B51B78E8947C1B9A63E95DE2D3DF67DEB8E556AD7650993B7A51DA5B84098938104632889A86DA0C
25,486,155 UART: Caliptra RT
25,486,875 UART: [state] CFI Enabled
25,604,824 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
6,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,247,371 >>> mbox cmd response: success
18,499,491 UART:
18,499,921 UART: Running Caliptra FMC ...
18,501,053 UART:
18,501,224 UART: [state] CFI Enabled
18,508,958 UART: [fht] FMC Alias Private Key: 7
20,266,085 UART: [art] Extend RT PCRs Done
20,267,321 UART: [art] Lock RT PCRs Done
20,269,028 UART: [art] Populate DV Done
20,274,132 UART: [fht] FMC Alias Private Key: 7
20,275,735 UART: [art] Derive CDI
20,276,547 UART: [art] Store in in slot 0x4
20,319,080 UART: [art] Derive Key Pair
20,320,078 UART: [art] Store priv key in slot 0x5
22,747,350 UART: [art] Derive Key Pair - Done
22,760,286 UART: [art] Signing Cert with AUTHO
22,761,584 UART: RITY.KEYID = 7
24,467,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,748 UART: [art] PUB.X = FA8E2843717608D81929FAECC9D84E92F71FB431E885BCA8CAAB060B71331948B9BD497ABE490500F76C92C16017CF45
24,476,014 UART: [art] PUB.Y = 4BCD9E4F6ECB0308C708CA7BF1127026EBA01CEDF0CA9FA7CC97BC0BC0508362B809E2829F499C9663F1C40407ED076F
24,483,290 UART: [art] SIG.R = 341A7B519A20BC7DD80A85C68B37D66046913CC25E0D5962FD3931CB4137AAD8944B760E07258F763709A1BE9A31C7C3
24,490,734 UART: [art] SIG.S = 3246AEACDA7A9600EDCB4AA7BA0860B201B38FBF2F8D3F9E153BD4010AC65360A2B3E998165395A000E0B29974222DC5
25,469,463 UART: Caliptra RT
25,470,154 UART: [state] CFI Enabled
25,586,886 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
5,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,251,074 >>> mbox cmd response: success
18,500,072 UART:
18,500,461 UART: Running Caliptra FMC ...
18,501,609 UART:
18,501,770 UART: [state] CFI Enabled
18,509,590 UART: [fht] FMC Alias Private Key: 7
20,266,828 UART: [art] Extend RT PCRs Done
20,268,073 UART: [art] Lock RT PCRs Done
20,269,785 UART: [art] Populate DV Done
20,275,198 UART: [fht] FMC Alias Private Key: 7
20,276,736 UART: [art] Derive CDI
20,277,467 UART: [art] Store in in slot 0x4
20,320,279 UART: [art] Derive Key Pair
20,321,320 UART: [art] Store priv key in slot 0x5
22,748,050 UART: [art] Derive Key Pair - Done
22,761,100 UART: [art] Signing Cert with AUTHO
22,762,425 UART: RITY.KEYID = 7
24,467,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,469,501 UART: [art] PUB.X = B7CFC3537EFEB28FF5ABBDAC196A48479B92A06119BC9199F97064AE3B47957FB64AE053B355D4DEBCA125DB3A79E022
24,476,767 UART: [art] PUB.Y = B2EFA11DFD5FA07A2D6CC7A2094508D0695252419D1B32E9E8F35717976C6A42E89B34CA1E181B8D1277A09E2DC2C8FA
24,484,042 UART: [art] SIG.R = 6566972DD0B3FA24D667643EB222BBF4B49DAD6DD1694804C7C921D1C472E01FAC9BA32FFF58062A9CF6EB0EEA39FB2B
24,491,451 UART: [art] SIG.S = 423866F28F6FC152E3CD6A86FE9A2B2E82F82C1D911EA186C85492B412372E35DBBD1C579DFBDCBAE5125269863A505A
25,470,989 UART: Caliptra RT
25,471,711 UART: [state] CFI Enabled
25,588,956 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
5,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,234,427 >>> mbox cmd response: success
18,481,773 UART:
18,482,164 UART: Running Caliptra FMC ...
18,483,354 UART:
18,483,523 UART: [state] CFI Enabled
18,491,068 UART: [fht] FMC Alias Private Key: 7
20,248,454 UART: [art] Extend RT PCRs Done
20,249,671 UART: [art] Lock RT PCRs Done
20,251,569 UART: [art] Populate DV Done
20,256,980 UART: [fht] FMC Alias Private Key: 7
20,258,676 UART: [art] Derive CDI
20,259,484 UART: [art] Store in in slot 0x4
20,301,749 UART: [art] Derive Key Pair
20,302,742 UART: [art] Store priv key in slot 0x5
22,729,452 UART: [art] Derive Key Pair - Done
22,742,289 UART: [art] Signing Cert with AUTHO
22,743,591 UART: RITY.KEYID = 7
24,448,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,450,506 UART: [art] PUB.X = 4E97A9179469698E870134EE20B9F31EC73A574E624D060561A90D5072D649B4E305AF720D67C5211722040AD32D3EC5
24,457,716 UART: [art] PUB.Y = EB03D20E88C35EB0F3875FD2FBEED8314EFDB00744448E47EC1819F6799141A5E7DE8AA75BCE2FB61BBCC7C6D91686E0
24,464,991 UART: [art] SIG.R = E6CF2D47C8F769E529C41A33DC1BE4CA5C693989AC8BC79D1F686CBD1AD43276372FB9F086F5E67841A0631D2EF81F73
24,472,404 UART: [art] SIG.S = F7D1BAE2D5A9C656A04D9325F7E88AFE3B6D86B83C1C982202A27E615B1A49C428E23E181F08E2146A54057EEB1083EE
25,451,063 UART: Caliptra RT
25,451,759 UART: [state] CFI Enabled
25,569,196 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.55s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,365 UART: [afmc] --
2,846,445 UART: [cold-reset] --
2,847,085 UART: [state] Locking Datavault
2,848,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,758 UART: [state] Locking ICCM
2,849,192 UART: [exit] Launching FMC @ 0x40000130
2,854,521 UART:
2,854,537 UART: Running Caliptra FMC ...
2,854,945 UART:
2,854,999 UART: [state] CFI Enabled
2,865,204 UART: [fht] FMC Alias Private Key: 7
2,973,195 UART: [art] Extend RT PCRs Done
2,973,623 UART: [art] Lock RT PCRs Done
2,975,223 UART: [art] Populate DV Done
2,983,274 UART: [fht] FMC Alias Private Key: 7
2,984,424 UART: [art] Derive CDI
2,984,704 UART: [art] Store in in slot 0x4
3,070,035 UART: [art] Derive Key Pair
3,070,395 UART: [art] Store priv key in slot 0x5
3,084,153 UART: [art] Derive Key Pair - Done
3,098,733 UART: [art] Signing Cert with AUTHO
3,099,213 UART: RITY.KEYID = 7
3,114,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,332 UART: [art] PUB.X = DE4A76C9F265365A6E43C65B4537688173F0AD1D43A79C3CE6710AABA5BA1305DDF41FAF2041788C67BBDE203D45613C
3,122,106 UART: [art] PUB.Y = 615D09B2292F9C79ABDB1ECE9AA63ED1FE67526A87854A68F1075AD1CDEA02D18ADA970A5C7E3FE3DF7E80427655C447
3,129,060 UART: [art] SIG.R = 0F6845A75EC6A71C1994A63E8510D2FD3461A68439ACD69316C2553AE39CE5EE8379E99F15645BCA70943F3FA8904B86
3,135,827 UART: [art] SIG.S = 157922587924A009F432F416887B82D10BD764509881C3E595F589609DD920EA37762D0E5D658B826A68E5F6F1A78DC7
3,159,547 UART: Caliptra RT
3,159,800 UART: [state] CFI Enabled
3,266,825 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,399 UART: [kat] SHA2-256
901,339 UART: [kat] SHA2-384
903,946 UART: [kat] SHA2-512-ACC
905,847 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,122 UART: [idev] Sha384 KeyId Algorithm
1,201,879 UART: [idev] --
1,202,820 UART: [ldev] ++
1,202,988 UART: [ldev] CDI.KEYID = 6
1,203,352 UART: [ldev] SUBJECT.KEYID = 5
1,203,779 UART: [ldev] AUTHORITY.KEYID = 7
1,204,242 UART: [ldev] FE.KEYID = 1
1,209,598 UART: [ldev] Erasing FE.KEYID = 1
1,235,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,162 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,884 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,000 UART: [ldev] --
1,275,314 UART: [fwproc] Wait for Commands...
1,275,971 UART: [fwproc] Recv command 0x46574c44
1,276,704 UART: [fwproc] Recv'd Img size: 114084 bytes
2,572,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,765,037 >>> mbox cmd response: success
2,766,098 UART: [afmc] ++
2,766,266 UART: [afmc] CDI.KEYID = 6
2,766,629 UART: [afmc] SUBJECT.KEYID = 7
2,767,055 UART: [afmc] AUTHORITY.KEYID = 5
2,802,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,911 UART: [afmc] --
2,845,905 UART: [cold-reset] --
2,846,971 UART: [state] Locking Datavault
2,848,014 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,618 UART: [state] Locking ICCM
2,849,174 UART: [exit] Launching FMC @ 0x40000130
2,854,503 UART:
2,854,519 UART: Running Caliptra FMC ...
2,854,927 UART:
2,854,981 UART: [state] CFI Enabled
2,865,266 UART: [fht] FMC Alias Private Key: 7
2,972,915 UART: [art] Extend RT PCRs Done
2,973,343 UART: [art] Lock RT PCRs Done
2,974,737 UART: [art] Populate DV Done
2,983,076 UART: [fht] FMC Alias Private Key: 7
2,984,114 UART: [art] Derive CDI
2,984,394 UART: [art] Store in in slot 0x4
3,069,967 UART: [art] Derive Key Pair
3,070,327 UART: [art] Store priv key in slot 0x5
3,083,231 UART: [art] Derive Key Pair - Done
3,098,118 UART: [art] Signing Cert with AUTHO
3,098,598 UART: RITY.KEYID = 7
3,113,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,341 UART: [art] PUB.X = B0DC2290BF34B251305ED110B7C2BFB5EDC93160727FB529EEA7D313EA3EA523CF69F86E52DAE7B69DF2813424B1385A
3,121,125 UART: [art] PUB.Y = 6FF00A2782A13F66693D29C4C58743E3A9544EB242B41561026E1DFEBEBD064F6EB261BAD843A1B622C6BA3276B1D73F
3,128,074 UART: [art] SIG.R = 293B4C15131217F65ECC6ACCADCBCF56831E303EBE81893B226AF54201EDF7AD82DB7607989962F1D7AD24AF2220A323
3,134,848 UART: [art] SIG.S = C01EE04CB91140E3E2793D49B9A1E2961E297FE3AFD034090D20337EC0CCBECF7DFA872B4119C6B36DD14D7673070F14
3,158,401 UART: Caliptra RT
3,158,654 UART: [state] CFI Enabled
3,266,252 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,625 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,182,461 UART: [idev] Erasing UDS.KEYID = 0
1,199,930 UART: [idev] Fuse KeyId
1,201,152 UART: [idev] --
1,202,173 UART: [ldev] ++
1,202,341 UART: [ldev] CDI.KEYID = 6
1,202,705 UART: [ldev] SUBJECT.KEYID = 5
1,203,132 UART: [ldev] AUTHORITY.KEYID = 7
1,203,595 UART: [ldev] FE.KEYID = 1
1,208,967 UART: [ldev] Erasing FE.KEYID = 1
1,235,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,783 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,465 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,524 UART: [ldev] --
1,274,970 UART: [fwproc] Wait for Commands...
1,275,627 UART: [fwproc] Recv command 0x46574c44
1,276,360 UART: [fwproc] Recv'd Img size: 114084 bytes
2,571,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,598,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,763,571 >>> mbox cmd response: success
2,764,616 UART: [afmc] ++
2,764,784 UART: [afmc] CDI.KEYID = 6
2,765,147 UART: [afmc] SUBJECT.KEYID = 7
2,765,573 UART: [afmc] AUTHORITY.KEYID = 5
2,800,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,117 UART: [afmc] --
2,844,177 UART: [cold-reset] --
2,845,131 UART: [state] Locking Datavault
2,846,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,116 UART: [state] Locking ICCM
2,847,688 UART: [exit] Launching FMC @ 0x40000130
2,853,017 UART:
2,853,033 UART: Running Caliptra FMC ...
2,853,441 UART:
2,853,495 UART: [state] CFI Enabled
2,864,278 UART: [fht] FMC Alias Private Key: 7
2,971,845 UART: [art] Extend RT PCRs Done
2,972,273 UART: [art] Lock RT PCRs Done
2,974,055 UART: [art] Populate DV Done
2,982,176 UART: [fht] FMC Alias Private Key: 7
2,983,106 UART: [art] Derive CDI
2,983,386 UART: [art] Store in in slot 0x4
3,069,327 UART: [art] Derive Key Pair
3,069,687 UART: [art] Store priv key in slot 0x5
3,082,599 UART: [art] Derive Key Pair - Done
3,097,412 UART: [art] Signing Cert with AUTHO
3,097,892 UART: RITY.KEYID = 7
3,113,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,113,815 UART: [art] PUB.X = 3674C3BC45A6AE276DD21F7FAE56E199F6B4F2C87A5D74DA8B6B6A7ECE1EF410B2E0FFD654E3C741EE9B7F78EEA1D8ED
3,120,615 UART: [art] PUB.Y = 7CC167BC0474C7524C500ED667B50B289FB8FAA4BF9E561CE496854C368087630BE48A5A7ACAD92BFEF255A4602DA8AF
3,127,567 UART: [art] SIG.R = CB3B95224832D14032F1239D085A5A1F5874834E5150BEFD4A87584BF51BC274C511982AC72E336BED52B43F903DE341
3,134,332 UART: [art] SIG.S = A299884F941DC2AADC7AC10C6923A8C0ACDB56B18A8AA6006EDE53797AB30C7EF5E7BE624DC7B8BFDBF6AB61E67A682A
3,158,513 UART: Caliptra RT
3,158,766 UART: [state] CFI Enabled
3,266,166 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,609 >>> mbox cmd response: success
2,678,375 UART:
2,678,391 UART: Running Caliptra FMC ...
2,678,799 UART:
2,678,853 UART: [state] CFI Enabled
2,689,362 UART: [fht] FMC Alias Private Key: 7
2,797,605 UART: [art] Extend RT PCRs Done
2,798,033 UART: [art] Lock RT PCRs Done
2,799,669 UART: [art] Populate DV Done
2,807,892 UART: [fht] FMC Alias Private Key: 7
2,809,046 UART: [art] Derive CDI
2,809,326 UART: [art] Store in in slot 0x4
2,895,171 UART: [art] Derive Key Pair
2,895,531 UART: [art] Store priv key in slot 0x5
2,908,889 UART: [art] Derive Key Pair - Done
2,924,118 UART: [art] Signing Cert with AUTHO
2,924,598 UART: RITY.KEYID = 7
2,939,594 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,359 UART: [art] PUB.X = 17EE59F5FCA7A8B8171E999B1969F29C6DB35C95CD3B0B1F493A850C7B164F95413F0ABA2718C2B6A6133A8688EDC617
2,947,128 UART: [art] PUB.Y = C5DAAA58ACCC395327B479C424F500BABF57B3AA9B70E1A84509985C7216188A671F003A48CD2A2D1D322E114D30EE68
2,954,039 UART: [art] SIG.R = 67D9EFA2FAC01BBA40BBEC661207A3A78AE0EF6297423E88078A15DA27A769BA935A46B7D54C8BE20DBF291FED51F95B
2,960,820 UART: [art] SIG.S = E682FA8B3AEBD455A36350A9D93FA1C0060ACECEF93A1729E70A612A7E4AE523C59A177F44C4F8890CFF9D7DFFC02348
2,984,661 UART: Caliptra RT
2,984,914 UART: [state] CFI Enabled
3,092,849 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,613,329 >>> mbox cmd response: success
2,675,213 UART:
2,675,229 UART: Running Caliptra FMC ...
2,675,637 UART:
2,675,691 UART: [state] CFI Enabled
2,686,188 UART: [fht] FMC Alias Private Key: 7
2,794,245 UART: [art] Extend RT PCRs Done
2,794,673 UART: [art] Lock RT PCRs Done
2,796,263 UART: [art] Populate DV Done
2,804,482 UART: [fht] FMC Alias Private Key: 7
2,805,538 UART: [art] Derive CDI
2,805,818 UART: [art] Store in in slot 0x4
2,891,257 UART: [art] Derive Key Pair
2,891,617 UART: [art] Store priv key in slot 0x5
2,905,161 UART: [art] Derive Key Pair - Done
2,920,305 UART: [art] Signing Cert with AUTHO
2,920,785 UART: RITY.KEYID = 7
2,936,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,960 UART: [art] PUB.X = 8B01C2E1339D710EFFD67F5B0A814DC90181597B5BA21FD18B34AC3D6CAEF65FA9323BC8EF422012FA450A6F090E2BC8
2,943,725 UART: [art] PUB.Y = 9C138E3B88EC63EF02720214B90E428A1D33A7A3990C6B609DA879A24C4B5E042353C041ECFEF2573DE0A65326B6B669
2,950,662 UART: [art] SIG.R = 87E750C9A5FEBF274F018BAA1802B44947EC94D03ED8346C708DB318EF4519C27EB4451B9AF633299C38FA8F055C8DEB
2,957,433 UART: [art] SIG.S = B8F8E90011089DBF80494E0744F9D908F530926B2CB81688ABE4C4CE10EA6FF09A552BF8706D37028D08D45C2149FDCA
2,981,327 UART: Caliptra RT
2,981,580 UART: [state] CFI Enabled
3,088,363 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,735 >>> mbox cmd response: success
2,677,571 UART:
2,677,587 UART: Running Caliptra FMC ...
2,677,995 UART:
2,678,049 UART: [state] CFI Enabled
2,688,432 UART: [fht] FMC Alias Private Key: 7
2,796,795 UART: [art] Extend RT PCRs Done
2,797,223 UART: [art] Lock RT PCRs Done
2,798,655 UART: [art] Populate DV Done
2,806,778 UART: [fht] FMC Alias Private Key: 7
2,807,818 UART: [art] Derive CDI
2,808,098 UART: [art] Store in in slot 0x4
2,893,457 UART: [art] Derive Key Pair
2,893,817 UART: [art] Store priv key in slot 0x5
2,906,681 UART: [art] Derive Key Pair - Done
2,921,370 UART: [art] Signing Cert with AUTHO
2,921,850 UART: RITY.KEYID = 7
2,936,866 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,631 UART: [art] PUB.X = 28392186B57D28D3487EDE494337F41E5D112A6005DEAEB5F07AB20F094272116CA4BA04884B1EA3138940F6B72DFB60
2,944,389 UART: [art] PUB.Y = AF077B746FA48A00243CF5DFBA9013C915512E7F00D7792DA1F03B39D909125370951C775EF7DEE9558AFE937B21E3A6
2,951,293 UART: [art] SIG.R = 399F837C1FCC238398D64FA8BD02E9255E1404D2188434C75BC032BAFA18FDEFF139F2A1E61AECEC9AC2C2FE57F379B1
2,958,075 UART: [art] SIG.S = 18DF82145EC6E87566C103BE01B68D7AB6C21D925617B2A6BC5BEB404BA71F6F7C3697B9BFBD0DFC87107F107DF4D0C6
2,981,519 UART: Caliptra RT
2,981,772 UART: [state] CFI Enabled
3,089,583 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,611,838 >>> mbox cmd response: success
2,673,900 UART:
2,673,916 UART: Running Caliptra FMC ...
2,674,324 UART:
2,674,378 UART: [state] CFI Enabled
2,684,941 UART: [fht] FMC Alias Private Key: 7
2,792,876 UART: [art] Extend RT PCRs Done
2,793,304 UART: [art] Lock RT PCRs Done
2,794,886 UART: [art] Populate DV Done
2,803,049 UART: [fht] FMC Alias Private Key: 7
2,804,219 UART: [art] Derive CDI
2,804,499 UART: [art] Store in in slot 0x4
2,890,054 UART: [art] Derive Key Pair
2,890,414 UART: [art] Store priv key in slot 0x5
2,903,580 UART: [art] Derive Key Pair - Done
2,918,618 UART: [art] Signing Cert with AUTHO
2,919,098 UART: RITY.KEYID = 7
2,934,698 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,463 UART: [art] PUB.X = 4A4868C0EA5C03040940907132A41F60153F25E928FBB06578FBF9FF263B18DD6FDEE763A387D2C8225E1D72CAE5A3BD
2,942,232 UART: [art] PUB.Y = 595D0FCEA230F5EEDFE4FF503228A9CBEBF3B1AA8FA95DE7DAC2B20DDC37046474F93C7D85ABE36FDEC315F214B4BD6E
2,949,207 UART: [art] SIG.R = EB476CEFAFFD38AE9BF13B5610CD551BDEF325E9F7BDE2ABD1C330C42DB89D228732FFFAF6E9DA945BE7F43DCA368F66
2,956,011 UART: [art] SIG.S = 67B9AA72A5A85EC8E28994225C1BFCE47893ABE14A5B3B9F10BC754F26E11B7C5BBD3412A016097EF0070F766112BA34
2,980,443 UART: Caliptra RT
2,980,696 UART: [state] CFI Enabled
3,088,469 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.17s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,562 UART: [afmc] --
2,845,660 UART: [cold-reset] --
2,846,424 UART: [state] Locking Datavault
2,847,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,247 UART: [state] Locking ICCM
2,848,709 UART: [exit] Launching FMC @ 0x40000130
2,854,038 UART:
2,854,054 UART: Running Caliptra FMC ...
2,854,462 UART:
2,854,605 UART: [state] CFI Enabled
2,865,336 UART: [fht] FMC Alias Private Key: 7
2,972,911 UART: [art] Extend RT PCRs Done
2,973,339 UART: [art] Lock RT PCRs Done
2,974,767 UART: [art] Populate DV Done
2,983,022 UART: [fht] FMC Alias Private Key: 7
2,984,002 UART: [art] Derive CDI
2,984,282 UART: [art] Store in in slot 0x4
3,070,015 UART: [art] Derive Key Pair
3,070,375 UART: [art] Store priv key in slot 0x5
3,083,751 UART: [art] Derive Key Pair - Done
3,098,241 UART: [art] Signing Cert with AUTHO
3,098,721 UART: RITY.KEYID = 7
3,113,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,524 UART: [art] PUB.X = 3EFDE84A3A2251F351CE70A62F7BB41DEFFA35E3704987A8908E540F22851F07F89C380F0EBB119FADB0F6F3DBB8ED06
3,121,297 UART: [art] PUB.Y = AE81BC53C6FE3DB18A2B34EBB14496A32B676C28D7F26714E38FA7825E64A1004ADE5244A06787FF85537B5F1611DB21
3,128,231 UART: [art] SIG.R = C1EC6A8F8F4B06E6AE9E57FB3B5DF644B228439EC71796615823D13D7C47B4D7D5D6AE81D71A044A57F075198CB4EE0B
3,135,004 UART: [art] SIG.S = 8A45AC3620322C6C7F2C3685780F0CE9C54EFB90890EDEC2158476F417C57DBD393FF4260C2AEC6626B0124D8CD25DB1
3,158,315 UART: Caliptra RT
3,158,660 UART: [state] CFI Enabled
3,265,333 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha384 KeyId Algorithm
1,203,396 UART: [idev] --
1,204,583 UART: [ldev] ++
1,204,751 UART: [ldev] CDI.KEYID = 6
1,205,115 UART: [ldev] SUBJECT.KEYID = 5
1,205,542 UART: [ldev] AUTHORITY.KEYID = 7
1,206,005 UART: [ldev] FE.KEYID = 1
1,211,319 UART: [ldev] Erasing FE.KEYID = 1
1,237,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,183 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,905 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,877 UART: [ldev] --
1,277,295 UART: [fwproc] Wait for Commands...
1,278,052 UART: [fwproc] Recv command 0x46574c44
1,278,785 UART: [fwproc] Recv'd Img size: 114084 bytes
2,573,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,765,624 >>> mbox cmd response: success
2,766,747 UART: [afmc] ++
2,766,915 UART: [afmc] CDI.KEYID = 6
2,767,278 UART: [afmc] SUBJECT.KEYID = 7
2,767,704 UART: [afmc] AUTHORITY.KEYID = 5
2,803,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,103 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,986 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,632 UART: [afmc] --
2,847,742 UART: [cold-reset] --
2,848,656 UART: [state] Locking Datavault
2,849,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,413 UART: [state] Locking ICCM
2,850,929 UART: [exit] Launching FMC @ 0x40000130
2,856,258 UART:
2,856,274 UART: Running Caliptra FMC ...
2,856,682 UART:
2,856,825 UART: [state] CFI Enabled
2,867,518 UART: [fht] FMC Alias Private Key: 7
2,976,345 UART: [art] Extend RT PCRs Done
2,976,773 UART: [art] Lock RT PCRs Done
2,978,201 UART: [art] Populate DV Done
2,986,248 UART: [fht] FMC Alias Private Key: 7
2,987,240 UART: [art] Derive CDI
2,987,520 UART: [art] Store in in slot 0x4
3,073,281 UART: [art] Derive Key Pair
3,073,641 UART: [art] Store priv key in slot 0x5
3,087,001 UART: [art] Derive Key Pair - Done
3,101,586 UART: [art] Signing Cert with AUTHO
3,102,066 UART: RITY.KEYID = 7
3,117,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,123 UART: [art] PUB.X = D0511A29452153CA1DE33810114DAD0E9683D2907349A0DD5BB87268E7B600A99723F389ACF459AA01197675E3971448
3,124,855 UART: [art] PUB.Y = 2A84FD8EC94BF66F02668F608FB5A191F05F6A9FD413B8EDC196632DC55DEB175323552DD21A8B17B9888EAE155E16F2
3,131,812 UART: [art] SIG.R = 7FC610A4007E7E94D0D7AE1875FBF8E5198A8EF5C9CDD65E2517B52F64C2CE69910A6D191053CB06C95141435EAFD0A9
3,138,564 UART: [art] SIG.S = 44D0415AA22946F463E5D96B8302D96572BF52777601AE293A099AA10AB90D4D8FF331D06E4AD1B5FD367C203FF88DD4
3,162,594 UART: Caliptra RT
3,162,939 UART: [state] CFI Enabled
3,271,674 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,573 UART: [idev] Fuse KeyId
1,200,795 UART: [idev] --
1,201,864 UART: [ldev] ++
1,202,032 UART: [ldev] CDI.KEYID = 6
1,202,396 UART: [ldev] SUBJECT.KEYID = 5
1,202,823 UART: [ldev] AUTHORITY.KEYID = 7
1,203,286 UART: [ldev] FE.KEYID = 1
1,208,880 UART: [ldev] Erasing FE.KEYID = 1
1,234,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,030 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,712 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,647 UART: [ldev] --
1,274,013 UART: [fwproc] Wait for Commands...
1,274,624 UART: [fwproc] Recv command 0x46574c44
1,275,357 UART: [fwproc] Recv'd Img size: 114084 bytes
2,569,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,596,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,626,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,761,766 >>> mbox cmd response: success
2,762,853 UART: [afmc] ++
2,763,021 UART: [afmc] CDI.KEYID = 6
2,763,384 UART: [afmc] SUBJECT.KEYID = 7
2,763,810 UART: [afmc] AUTHORITY.KEYID = 5
2,798,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,815,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,815,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,821,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,827,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,833,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,841,132 UART: [afmc] --
2,842,264 UART: [cold-reset] --
2,843,104 UART: [state] Locking Datavault
2,844,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,844,759 UART: [state] Locking ICCM
2,845,317 UART: [exit] Launching FMC @ 0x40000130
2,850,646 UART:
2,850,662 UART: Running Caliptra FMC ...
2,851,070 UART:
2,851,213 UART: [state] CFI Enabled
2,861,584 UART: [fht] FMC Alias Private Key: 7
2,968,859 UART: [art] Extend RT PCRs Done
2,969,287 UART: [art] Lock RT PCRs Done
2,970,725 UART: [art] Populate DV Done
2,979,016 UART: [fht] FMC Alias Private Key: 7
2,980,146 UART: [art] Derive CDI
2,980,426 UART: [art] Store in in slot 0x4
3,066,277 UART: [art] Derive Key Pair
3,066,637 UART: [art] Store priv key in slot 0x5
3,080,045 UART: [art] Derive Key Pair - Done
3,094,958 UART: [art] Signing Cert with AUTHO
3,095,438 UART: RITY.KEYID = 7
3,110,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,111,287 UART: [art] PUB.X = 671BF2E6721423AD38BF0029B12B522CEF515E024C763106618F90068C2AB1FD463826F2A0E0C8EEB930ED09EEB63BB1
3,118,029 UART: [art] PUB.Y = 5AEC12591239F0ADD9FED73E76FC1561A2932632EC754EB85F36E5E954927541B3D6AEBF29538AD75C4993DEDB8BD4E7
3,124,991 UART: [art] SIG.R = 497000E156F80848B20A59C73FE7F05A84A537EF5861B9607D6B88F9D58AD3D73876726A228981735025228EEB612FD2
3,131,723 UART: [art] SIG.S = 5E7FA38EDDF94F65E280D7C61F5E2FDAB7EA3D8DEC6D492596C37D90927249DEA817DAF22A96B35BDD2F42766282FFE6
3,155,378 UART: Caliptra RT
3,155,723 UART: [state] CFI Enabled
3,262,864 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,678 >>> mbox cmd response: success
2,682,352 UART:
2,682,368 UART: Running Caliptra FMC ...
2,682,776 UART:
2,682,919 UART: [state] CFI Enabled
2,693,910 UART: [fht] FMC Alias Private Key: 7
2,802,605 UART: [art] Extend RT PCRs Done
2,803,033 UART: [art] Lock RT PCRs Done
2,804,375 UART: [art] Populate DV Done
2,812,484 UART: [fht] FMC Alias Private Key: 7
2,813,524 UART: [art] Derive CDI
2,813,804 UART: [art] Store in in slot 0x4
2,899,677 UART: [art] Derive Key Pair
2,900,037 UART: [art] Store priv key in slot 0x5
2,913,389 UART: [art] Derive Key Pair - Done
2,928,288 UART: [art] Signing Cert with AUTHO
2,928,768 UART: RITY.KEYID = 7
2,943,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,749 UART: [art] PUB.X = 3C1C79EB1B5FF18D442301B18C3999C5B078773299FE77BB56B5BCB54F15EB0EFE6FB2816AE7A68BEC6247EF5E8BB423
2,951,529 UART: [art] PUB.Y = 9121B58195209A3ED13FA869BFE3B8520967DCA2630AA748885BD7F50B39B7B763B8F812439766F5D950B6E3BDD1B9EC
2,958,474 UART: [art] SIG.R = 604F386AFBB46DD468884A76F5991C09704291ACEE39A0E7DFDABA71ED9FC102D5867E6B39205425EEEB0A298E20AD5E
2,965,249 UART: [art] SIG.S = 5C64954C7936112F6E0875652E3680CA4047DCB555BF913296FFC4401D8BF3A26B979603AED406F6B061BE94EE0320F3
2,989,084 UART: Caliptra RT
2,989,429 UART: [state] CFI Enabled
3,097,044 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,662 >>> mbox cmd response: success
2,677,124 UART:
2,677,140 UART: Running Caliptra FMC ...
2,677,548 UART:
2,677,691 UART: [state] CFI Enabled
2,688,314 UART: [fht] FMC Alias Private Key: 7
2,795,931 UART: [art] Extend RT PCRs Done
2,796,359 UART: [art] Lock RT PCRs Done
2,797,907 UART: [art] Populate DV Done
2,806,140 UART: [fht] FMC Alias Private Key: 7
2,807,238 UART: [art] Derive CDI
2,807,518 UART: [art] Store in in slot 0x4
2,893,591 UART: [art] Derive Key Pair
2,893,951 UART: [art] Store priv key in slot 0x5
2,906,609 UART: [art] Derive Key Pair - Done
2,921,640 UART: [art] Signing Cert with AUTHO
2,922,120 UART: RITY.KEYID = 7
2,937,714 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,479 UART: [art] PUB.X = 9B6FB98A48CF9DC68CAC75DA9C9E5640EF66533951B31947A64DA35D55C893E3DEE0CC27588A9803B93D1C78FC9FAD62
2,945,260 UART: [art] PUB.Y = D96CC0B98F556CC06BDB71D9F9CE07E28BE759D5FA9EFA0D3E4EF3B540B82DBC6FD0673B4FB80A87600694F922C4B7B4
2,952,220 UART: [art] SIG.R = 8C028DE21D36D675DC7860D8EB2078D20F1D7A3D113869262915CF600CEB695215A30ADA90A1B0AEC2ACDA3E3362110B
2,958,983 UART: [art] SIG.S = 02FDE8858DFFE14E56588B1652ED1FD105675524578CA6F3AEBAD96F5D325717C368C4404D6A4AB27C991560C4A6AEBE
2,982,996 UART: Caliptra RT
2,983,341 UART: [state] CFI Enabled
3,090,365 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,614,770 >>> mbox cmd response: success
2,676,468 UART:
2,676,484 UART: Running Caliptra FMC ...
2,676,892 UART:
2,677,035 UART: [state] CFI Enabled
2,687,956 UART: [fht] FMC Alias Private Key: 7
2,795,917 UART: [art] Extend RT PCRs Done
2,796,345 UART: [art] Lock RT PCRs Done
2,797,981 UART: [art] Populate DV Done
2,806,136 UART: [fht] FMC Alias Private Key: 7
2,807,068 UART: [art] Derive CDI
2,807,348 UART: [art] Store in in slot 0x4
2,892,983 UART: [art] Derive Key Pair
2,893,343 UART: [art] Store priv key in slot 0x5
2,906,215 UART: [art] Derive Key Pair - Done
2,921,249 UART: [art] Signing Cert with AUTHO
2,921,729 UART: RITY.KEYID = 7
2,937,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,056 UART: [art] PUB.X = D796446602139037E8FBC7AA9D5DFB184F2DCDA66919FD4373A142F08DF85BBCF1213865F46D87261F9681498440FA20
2,944,823 UART: [art] PUB.Y = 74A13575C5B9B337BBA3E7A5EA6A730425638C17E69B1BAEA4229917937EC3D59DD783EEBE881FDA70DED1038D39BF9A
2,951,781 UART: [art] SIG.R = 9567F8366BB7E8DD275199246ADD4B3B72B0F36DA872919FF924413E99E4C1BD0AF6D16BA9811281F44BB245732F003B
2,958,528 UART: [art] SIG.S = 325BAD98DBC90A211934A1CE167B32C16D0E8A7138C0BA266229AF8C400F42C88376C861D819D96ADB8B86EC0A54C0ED
2,981,905 UART: Caliptra RT
2,982,250 UART: [state] CFI Enabled
3,090,204 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,611,086 >>> mbox cmd response: success
2,674,514 UART:
2,674,530 UART: Running Caliptra FMC ...
2,674,938 UART:
2,675,081 UART: [state] CFI Enabled
2,685,692 UART: [fht] FMC Alias Private Key: 7
2,793,929 UART: [art] Extend RT PCRs Done
2,794,357 UART: [art] Lock RT PCRs Done
2,795,947 UART: [art] Populate DV Done
2,803,920 UART: [fht] FMC Alias Private Key: 7
2,804,908 UART: [art] Derive CDI
2,805,188 UART: [art] Store in in slot 0x4
2,891,131 UART: [art] Derive Key Pair
2,891,491 UART: [art] Store priv key in slot 0x5
2,904,233 UART: [art] Derive Key Pair - Done
2,919,335 UART: [art] Signing Cert with AUTHO
2,919,815 UART: RITY.KEYID = 7
2,935,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,842 UART: [art] PUB.X = 7482DB504F3D9E2D788974C9A497A780273D97D3F76C4D8ED18D238783A53B45C907DF18526435FE4359271B7CAC1D2F
2,942,607 UART: [art] PUB.Y = D46E4E3ABA4CC846CD157E225115199EFAF859AB0750D0021E09E59A6122727E04BF2660CDD417392C3B429711178860
2,949,541 UART: [art] SIG.R = CE662773C383440363A3D259595B4D7C9D48D69ABA68D3CCCA0573AE5CD35D28ADFBAE79484905943E7D3D862748F991
2,956,306 UART: [art] SIG.S = 9D07EC558A036D5C03453709CD965BC1F88955D348C4EFFD5284FDCF0DA9D49F6B11AEB7CBFAE408CE469BFAFB4A2CC4
2,980,287 UART: Caliptra RT
2,980,632 UART: [state] CFI Enabled
3,088,400 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.77s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,819 UART: [afmc] --
2,845,837 UART: [cold-reset] --
2,846,751 UART: [state] Locking Datavault
2,847,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,324 UART: [state] Locking ICCM
2,848,852 UART: [exit] Launching FMC @ 0x40000130
2,854,181 UART:
2,854,197 UART: Running Caliptra FMC ...
2,854,605 UART:
2,854,659 UART: [state] CFI Enabled
2,865,478 UART: [fht] FMC Alias Private Key: 7
2,973,275 UART: [art] Extend RT PCRs Done
2,973,703 UART: [art] Lock RT PCRs Done
2,975,413 UART: [art] Populate DV Done
2,983,602 UART: [fht] FMC Alias Private Key: 7
2,984,734 UART: [art] Derive CDI
2,985,014 UART: [art] Store in in slot 0x4
3,070,715 UART: [art] Derive Key Pair
3,071,075 UART: [art] Store priv key in slot 0x5
3,084,007 UART: [art] Derive Key Pair - Done
3,098,789 UART: [art] Signing Cert with AUTHO
3,099,269 UART: RITY.KEYID = 7
3,114,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,116 UART: [art] PUB.X = 2277FD2E0D369968809037AAED61AC231F02E5BF629BC0BFEA0533AB83C3326B23A60E2F816864101E79EF76B8C84D1C
3,121,880 UART: [art] PUB.Y = 1CA8BE17BCF69AA777EE965AB03558097FBBC7BC0FCB5FEE9BF023AC0A76C49970CB81AA8BC3230DBB1FDE9D2781A4E7
3,128,848 UART: [art] SIG.R = 53E77160AFEB48927A5BD0B57E43A1045AFC3F7DD350BAD53E879AD69D266C093033C76775D8B697F6B261ACF1A3086C
3,135,617 UART: [art] SIG.S = A9E44627CFEB33471F722F985771F6087C30C6DECAAB7E0F984265FC547CEEED581F15CDA8579F0080A7B22D20E3D5D1
3,159,692 UART: Caliptra RT
3,159,945 UART: [state] CFI Enabled
3,266,479 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,105 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,182,267 UART: [idev] Erasing UDS.KEYID = 0
1,199,346 UART: [idev] Sha384 KeyId Algorithm
1,203,031 UART: [idev] --
1,204,068 UART: [ldev] ++
1,204,236 UART: [ldev] CDI.KEYID = 6
1,204,600 UART: [ldev] SUBJECT.KEYID = 5
1,205,027 UART: [ldev] AUTHORITY.KEYID = 7
1,205,490 UART: [ldev] FE.KEYID = 1
1,210,498 UART: [ldev] Erasing FE.KEYID = 1
1,236,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,042 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,764 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,714 UART: [ldev] --
1,276,136 UART: [fwproc] Wait for Commands...
1,276,857 UART: [fwproc] Recv command 0x46574c44
1,277,590 UART: [fwproc] Recv'd Img size: 114084 bytes
2,572,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,764,957 >>> mbox cmd response: success
2,766,112 UART: [afmc] ++
2,766,280 UART: [afmc] CDI.KEYID = 6
2,766,643 UART: [afmc] SUBJECT.KEYID = 7
2,767,069 UART: [afmc] AUTHORITY.KEYID = 5
2,803,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,275 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,994 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,645 UART: [afmc] --
2,846,733 UART: [cold-reset] --
2,847,807 UART: [state] Locking Datavault
2,848,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,544 UART: [state] Locking ICCM
2,850,006 UART: [exit] Launching FMC @ 0x40000130
2,855,335 UART:
2,855,351 UART: Running Caliptra FMC ...
2,855,759 UART:
2,855,813 UART: [state] CFI Enabled
2,866,032 UART: [fht] FMC Alias Private Key: 7
2,973,497 UART: [art] Extend RT PCRs Done
2,973,925 UART: [art] Lock RT PCRs Done
2,975,929 UART: [art] Populate DV Done
2,984,094 UART: [fht] FMC Alias Private Key: 7
2,985,072 UART: [art] Derive CDI
2,985,352 UART: [art] Store in in slot 0x4
3,071,019 UART: [art] Derive Key Pair
3,071,379 UART: [art] Store priv key in slot 0x5
3,084,465 UART: [art] Derive Key Pair - Done
3,099,419 UART: [art] Signing Cert with AUTHO
3,099,899 UART: RITY.KEYID = 7
3,115,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,860 UART: [art] PUB.X = F7856B6067AB36B1D3F3CB4D14B484F52FD9B31E9DDA63791C2833BDA1754BDDD5DA24D5F59EEAF683573B28DE17A4A4
3,122,648 UART: [art] PUB.Y = FFE9543B445F0B8A0E12FB65A980F5072E1263C0E79161B61C626826363580CE383B30E96433494F6C71E35A6CD89058
3,129,581 UART: [art] SIG.R = 3A5B71CB58555D41AA2D0DAB35DA0A02E7529E65C1A200E4B867DAFBA88FDBC55D9607C80B456B999030552FE007FA65
3,136,323 UART: [art] SIG.S = 5E1263F5393288C2AC928C2B52D8FE1B2AE4ABA54440FBAFDDC93DB2037FE2A3662DBA62816AC4CD5E416C2F0290CAA5
3,159,740 UART: Caliptra RT
3,159,993 UART: [state] CFI Enabled
3,266,580 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,411 UART: [kat] SHA2-256
901,351 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,102 UART: [kat] HMAC-384Kdf
919,730 UART: [kat] LMS
1,168,042 UART: [kat] --
1,168,715 UART: [cold-reset] ++
1,169,279 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,180,795 UART: [idev] Erasing UDS.KEYID = 0
1,197,422 UART: [idev] Fuse KeyId
1,198,644 UART: [idev] --
1,199,735 UART: [ldev] ++
1,199,903 UART: [ldev] CDI.KEYID = 6
1,200,267 UART: [ldev] SUBJECT.KEYID = 5
1,200,694 UART: [ldev] AUTHORITY.KEYID = 7
1,201,157 UART: [ldev] FE.KEYID = 1
1,206,277 UART: [ldev] Erasing FE.KEYID = 1
1,232,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,257,923 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,605 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,740 UART: [ldev] --
1,272,086 UART: [fwproc] Wait for Commands...
1,272,703 UART: [fwproc] Recv command 0x46574c44
1,273,436 UART: [fwproc] Recv'd Img size: 114084 bytes
2,569,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,596,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,625,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,761,003 >>> mbox cmd response: success
2,762,100 UART: [afmc] ++
2,762,268 UART: [afmc] CDI.KEYID = 6
2,762,631 UART: [afmc] SUBJECT.KEYID = 7
2,763,057 UART: [afmc] AUTHORITY.KEYID = 5
2,798,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,814,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,815,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,821,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,827,295 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,833,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,840,653 UART: [afmc] --
2,841,543 UART: [cold-reset] --
2,842,147 UART: [state] Locking Datavault
2,843,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,843,646 UART: [state] Locking ICCM
2,844,082 UART: [exit] Launching FMC @ 0x40000130
2,849,411 UART:
2,849,427 UART: Running Caliptra FMC ...
2,849,835 UART:
2,849,889 UART: [state] CFI Enabled
2,860,642 UART: [fht] FMC Alias Private Key: 7
2,968,665 UART: [art] Extend RT PCRs Done
2,969,093 UART: [art] Lock RT PCRs Done
2,970,535 UART: [art] Populate DV Done
2,978,732 UART: [fht] FMC Alias Private Key: 7
2,979,720 UART: [art] Derive CDI
2,980,000 UART: [art] Store in in slot 0x4
3,065,509 UART: [art] Derive Key Pair
3,065,869 UART: [art] Store priv key in slot 0x5
3,079,827 UART: [art] Derive Key Pair - Done
3,095,118 UART: [art] Signing Cert with AUTHO
3,095,598 UART: RITY.KEYID = 7
3,110,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,111,253 UART: [art] PUB.X = F55D60176749D63C7180AABAF01FE30F6AB17855398FA4D56F47958421D0C05B8A8267B00F2E82AF08F8E7995854BFC9
3,118,016 UART: [art] PUB.Y = 004B8C05D3BFC5A8E574AE5218FE1167339E29ADAF6F9311018311CF7F85008ED28D4E805F609AC7D3EA88F96D01BB93
3,124,921 UART: [art] SIG.R = 13E4B10A28D96C3F300C754EF644CA245DD2783CC5302FA600699901DC5E679B36768E985E6DBE93738A3138FFD26E68
3,131,660 UART: [art] SIG.S = F85C70D2FEF024704F524777E6F0DA44E43A0070C4EC32EC01E6D9E59291CF66A94CFA1F2FC8CC21B957742B99D5EF91
3,155,284 UART: Caliptra RT
3,155,537 UART: [state] CFI Enabled
3,263,848 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,057 >>> mbox cmd response: success
2,682,121 UART:
2,682,137 UART: Running Caliptra FMC ...
2,682,545 UART:
2,682,599 UART: [state] CFI Enabled
2,693,256 UART: [fht] FMC Alias Private Key: 7
2,801,817 UART: [art] Extend RT PCRs Done
2,802,245 UART: [art] Lock RT PCRs Done
2,803,601 UART: [art] Populate DV Done
2,811,814 UART: [fht] FMC Alias Private Key: 7
2,812,936 UART: [art] Derive CDI
2,813,216 UART: [art] Store in in slot 0x4
2,898,703 UART: [art] Derive Key Pair
2,899,063 UART: [art] Store priv key in slot 0x5
2,912,319 UART: [art] Derive Key Pair - Done
2,927,412 UART: [art] Signing Cert with AUTHO
2,927,892 UART: RITY.KEYID = 7
2,943,202 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,967 UART: [art] PUB.X = 1C24E7FAF118701C7D2B39C40D9F7E4600C66FB4469CA9D04EA9B50E2B8586378510000817FD67C66A4BB5A502DC0B8E
2,950,684 UART: [art] PUB.Y = BFAD3C1738B0D5921470D6CAE3FFE898A7F837B14726138E266FE79C749D8769EFE9B10BC3E31067813B0A4BF20BC8DF
2,957,637 UART: [art] SIG.R = 7A496DD3F6BDE3443C2D2951354EF254FC70D059749806772F9F1741EC4A4C6B58DA9D1EE7A9C19659FA5B1ACDF1BE00
2,964,394 UART: [art] SIG.S = 6C9BDF856B4318CAD60D491DD3809455FA4C8EDD0D8F0B8BEDF8A73279A0FB6CCAF575F6006CF6809BA23908AB83BC4E
2,988,393 UART: Caliptra RT
2,988,646 UART: [state] CFI Enabled
3,096,545 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,612,155 >>> mbox cmd response: success
2,674,589 UART:
2,674,605 UART: Running Caliptra FMC ...
2,675,013 UART:
2,675,067 UART: [state] CFI Enabled
2,685,798 UART: [fht] FMC Alias Private Key: 7
2,794,049 UART: [art] Extend RT PCRs Done
2,794,477 UART: [art] Lock RT PCRs Done
2,795,815 UART: [art] Populate DV Done
2,803,934 UART: [fht] FMC Alias Private Key: 7
2,804,908 UART: [art] Derive CDI
2,805,188 UART: [art] Store in in slot 0x4
2,890,955 UART: [art] Derive Key Pair
2,891,315 UART: [art] Store priv key in slot 0x5
2,904,279 UART: [art] Derive Key Pair - Done
2,919,157 UART: [art] Signing Cert with AUTHO
2,919,637 UART: RITY.KEYID = 7
2,935,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,040 UART: [art] PUB.X = A6DD0F06C62BEEAC3ABD054C08CADA4F942201B8953EC8ADB35A87A50F19FCE1E71F03B924797E9F25808D83183ED75A
2,942,807 UART: [art] PUB.Y = 0B1C1FEB25AA9D29EAE66F2D7D13F2489CE28738D1DB8E501A522DC3614420B9256C2734A5F4275B925ECD973CBC2631
2,949,762 UART: [art] SIG.R = 55A0202C49B95EA97BE0671F66E4F5C44B81C42613F51DFE8A471E91C0AF1F50AEB4D094C146D46F7E7E4054DDEC9AF7
2,956,546 UART: [art] SIG.S = D699AD1CB35026648F45C28F53F31DE51459EDB2CE87E3B08D37F33A6189451E5757D1312D87675F62FC67E56B12C4F8
2,980,141 UART: Caliptra RT
2,980,394 UART: [state] CFI Enabled
3,087,948 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,613,785 >>> mbox cmd response: success
2,675,127 UART:
2,675,143 UART: Running Caliptra FMC ...
2,675,551 UART:
2,675,605 UART: [state] CFI Enabled
2,686,408 UART: [fht] FMC Alias Private Key: 7
2,794,633 UART: [art] Extend RT PCRs Done
2,795,061 UART: [art] Lock RT PCRs Done
2,796,461 UART: [art] Populate DV Done
2,804,482 UART: [fht] FMC Alias Private Key: 7
2,805,514 UART: [art] Derive CDI
2,805,794 UART: [art] Store in in slot 0x4
2,891,371 UART: [art] Derive Key Pair
2,891,731 UART: [art] Store priv key in slot 0x5
2,905,243 UART: [art] Derive Key Pair - Done
2,920,055 UART: [art] Signing Cert with AUTHO
2,920,535 UART: RITY.KEYID = 7
2,935,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,196 UART: [art] PUB.X = 6B93122EFC5D0E8DE3D83F2F8C37C8D72248F5A7A6EB45C8777BC919C3E7E50A3C1CEC7762616E34C0752E2C16464BF7
2,942,970 UART: [art] PUB.Y = 6A8AF5F7E330EB706B84125E94D803B5DD20AC29343286590A6D6C9005D22F8C1330270AC98CBD1F7065EF9B80156BB3
2,949,910 UART: [art] SIG.R = 94401F5E737AC8A701EC054E4095115D115DFEF83F4B74579B0A0BEFB7BD10AFE2C1F7C3B28AAC5C6BEFE83F26B71603
2,956,683 UART: [art] SIG.S = 1BEC49A8BBB1BEC43037E784F3D719BB260FAD4B932B17106579F1D7D67CAB2946B547111AAFAC413B4D41E0D5F00022
2,980,601 UART: Caliptra RT
2,980,854 UART: [state] CFI Enabled
3,089,000 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,610,647 >>> mbox cmd response: success
2,672,745 UART:
2,672,761 UART: Running Caliptra FMC ...
2,673,169 UART:
2,673,223 UART: [state] CFI Enabled
2,683,490 UART: [fht] FMC Alias Private Key: 7
2,791,465 UART: [art] Extend RT PCRs Done
2,791,893 UART: [art] Lock RT PCRs Done
2,793,227 UART: [art] Populate DV Done
2,801,546 UART: [fht] FMC Alias Private Key: 7
2,802,640 UART: [art] Derive CDI
2,802,920 UART: [art] Store in in slot 0x4
2,888,117 UART: [art] Derive Key Pair
2,888,477 UART: [art] Store priv key in slot 0x5
2,901,511 UART: [art] Derive Key Pair - Done
2,916,201 UART: [art] Signing Cert with AUTHO
2,916,681 UART: RITY.KEYID = 7
2,931,357 UART: [art] Erasing AUTHORITY.KEYID = 7
2,932,122 UART: [art] PUB.X = DB15354E9DCB7D960719164D2B6016B7C27DC151A218AE74DEDB0CF3AE7CE40254F9BF29B63D88EED50258D7C0A17653
2,938,892 UART: [art] PUB.Y = 7EFDEC570F01E7C688160F4F5FF5CB58CAAF2AF5D52F296A15D69C9AD53FFCF285F8F7C7C6908748BAE0878178834459
2,945,847 UART: [art] SIG.R = D666FC394F4A6EA0BE8D50A25CBECECD5913A2A6E0261431A5F7CF6AFCE5306DB112C1E466B55D3A9AA70E6EFBA3F187
2,952,640 UART: [art] SIG.S = 4B9B3E08409FD2B4CD7A135506F9F33B5AEBE3C57EB9C1A5CBB05F975F2250C45CBA2787057FE8DE6A471DFD4C6A9B7E
2,976,578 UART: Caliptra RT
2,976,831 UART: [state] CFI Enabled
3,084,284 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.70s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,580 UART: [afmc] --
2,847,658 UART: [cold-reset] --
2,848,604 UART: [state] Locking Datavault
2,849,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,567 UART: [state] Locking ICCM
2,851,109 UART: [exit] Launching FMC @ 0x40000130
2,856,438 UART:
2,856,454 UART: Running Caliptra FMC ...
2,856,862 UART:
2,857,005 UART: [state] CFI Enabled
2,867,244 UART: [fht] FMC Alias Private Key: 7
2,975,175 UART: [art] Extend RT PCRs Done
2,975,603 UART: [art] Lock RT PCRs Done
2,977,031 UART: [art] Populate DV Done
2,985,118 UART: [fht] FMC Alias Private Key: 7
2,986,226 UART: [art] Derive CDI
2,986,506 UART: [art] Store in in slot 0x4
3,072,493 UART: [art] Derive Key Pair
3,072,853 UART: [art] Store priv key in slot 0x5
3,086,309 UART: [art] Derive Key Pair - Done
3,100,789 UART: [art] Signing Cert with AUTHO
3,101,269 UART: RITY.KEYID = 7
3,116,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,132 UART: [art] PUB.X = AD6C4FB9B531D329730EDC1F391DBD140C586478C03821D3A0A12FB3C7DDA9162DF9253BF7663572016832E4AA8B5FD7
3,123,901 UART: [art] PUB.Y = F87BE3E94F50267676C9190ED93FA23E0BE2BD45049F0FC44E30A1DBA31BCA2657A084630E2D9252B4536AFEDB1CC688
3,130,848 UART: [art] SIG.R = B6C653C77881ED7C2DFF32F051CBD14277EBA0BE6D587856C34A55653BCC4CCBA3F2DD6C7CAC259FF4B990A0D9283C8A
3,137,640 UART: [art] SIG.S = D8D89B52499190F221573AB29BC1E37E13691C637B231D3833FD9DEA63B55D5FABA6EBA5C56C44C68C1E989249E40E3F
3,161,378 UART: Caliptra RT
3,161,723 UART: [state] CFI Enabled
3,269,370 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,040 UART: [fht] FHT @ 0x50003400
1,172,668 UART: [idev] ++
1,172,836 UART: [idev] CDI.KEYID = 6
1,173,197 UART: [idev] SUBJECT.KEYID = 7
1,173,622 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha384 KeyId Algorithm
1,202,312 UART: [idev] --
1,203,243 UART: [ldev] ++
1,203,411 UART: [ldev] CDI.KEYID = 6
1,203,775 UART: [ldev] SUBJECT.KEYID = 5
1,204,202 UART: [ldev] AUTHORITY.KEYID = 7
1,204,665 UART: [ldev] FE.KEYID = 1
1,209,937 UART: [ldev] Erasing FE.KEYID = 1
1,236,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,327 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,049 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,195 UART: [ldev] --
1,275,561 UART: [fwproc] Wait for Commands...
1,276,144 UART: [fwproc] Recv command 0x46574c44
1,276,877 UART: [fwproc] Recv'd Img size: 114084 bytes
2,571,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,598,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,627,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,762,966 >>> mbox cmd response: success
2,764,105 UART: [afmc] ++
2,764,273 UART: [afmc] CDI.KEYID = 6
2,764,636 UART: [afmc] SUBJECT.KEYID = 7
2,765,062 UART: [afmc] AUTHORITY.KEYID = 5
2,801,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,624 UART: [afmc] --
2,844,540 UART: [cold-reset] --
2,845,546 UART: [state] Locking Datavault
2,846,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,301 UART: [state] Locking ICCM
2,847,743 UART: [exit] Launching FMC @ 0x40000130
2,853,072 UART:
2,853,088 UART: Running Caliptra FMC ...
2,853,496 UART:
2,853,639 UART: [state] CFI Enabled
2,864,450 UART: [fht] FMC Alias Private Key: 7
2,972,399 UART: [art] Extend RT PCRs Done
2,972,827 UART: [art] Lock RT PCRs Done
2,974,481 UART: [art] Populate DV Done
2,982,484 UART: [fht] FMC Alias Private Key: 7
2,983,608 UART: [art] Derive CDI
2,983,888 UART: [art] Store in in slot 0x4
3,069,449 UART: [art] Derive Key Pair
3,069,809 UART: [art] Store priv key in slot 0x5
3,083,341 UART: [art] Derive Key Pair - Done
3,098,065 UART: [art] Signing Cert with AUTHO
3,098,545 UART: RITY.KEYID = 7
3,113,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,330 UART: [art] PUB.X = 328E8C5D5E6E82EBCF5A3757DD88C2FB989822B23163161E52422C428D71702D8FEA9A089B3ED0A5C2B126FFD37C1CA8
3,121,107 UART: [art] PUB.Y = 45DB74B01CA8379ACA6DB5DF1A2F789604ECBF2735294563252F9645BBC18F242C3E3A0866F598D9A4CB5E63BC68FBB6
3,128,063 UART: [art] SIG.R = 94DA2EBF0CDE8AFB839582BF3D769BAFAD96721B470A145F82C9BABF4092D561EB01CA41ADA82F864AE3AF5F4AD81DEC
3,134,854 UART: [art] SIG.S = ACE55EEB83D53EC3BE1B3D69D5CA316DDC13D14DE7ACED0A89FB193BE4ACF44594F3BCC7EA5A9CEC328062F10F9E49B2
3,158,877 UART: Caliptra RT
3,159,222 UART: [state] CFI Enabled
3,266,751 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,199,671 UART: [idev] Fuse KeyId
1,200,893 UART: [idev] --
1,202,046 UART: [ldev] ++
1,202,214 UART: [ldev] CDI.KEYID = 6
1,202,578 UART: [ldev] SUBJECT.KEYID = 5
1,203,005 UART: [ldev] AUTHORITY.KEYID = 7
1,203,468 UART: [ldev] FE.KEYID = 1
1,208,604 UART: [ldev] Erasing FE.KEYID = 1
1,234,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,162 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,844 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,963 UART: [ldev] --
1,274,387 UART: [fwproc] Wait for Commands...
1,275,132 UART: [fwproc] Recv command 0x46574c44
1,275,865 UART: [fwproc] Recv'd Img size: 114084 bytes
2,569,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,626,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,761,964 >>> mbox cmd response: success
2,762,987 UART: [afmc] ++
2,763,155 UART: [afmc] CDI.KEYID = 6
2,763,518 UART: [afmc] SUBJECT.KEYID = 7
2,763,944 UART: [afmc] AUTHORITY.KEYID = 5
2,799,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,184 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,720 UART: [afmc] --
2,843,808 UART: [cold-reset] --
2,844,634 UART: [state] Locking Datavault
2,845,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,331 UART: [state] Locking ICCM
2,846,995 UART: [exit] Launching FMC @ 0x40000130
2,852,324 UART:
2,852,340 UART: Running Caliptra FMC ...
2,852,748 UART:
2,852,891 UART: [state] CFI Enabled
2,863,570 UART: [fht] FMC Alias Private Key: 7
2,971,205 UART: [art] Extend RT PCRs Done
2,971,633 UART: [art] Lock RT PCRs Done
2,973,207 UART: [art] Populate DV Done
2,981,274 UART: [fht] FMC Alias Private Key: 7
2,982,422 UART: [art] Derive CDI
2,982,702 UART: [art] Store in in slot 0x4
3,068,233 UART: [art] Derive Key Pair
3,068,593 UART: [art] Store priv key in slot 0x5
3,082,171 UART: [art] Derive Key Pair - Done
3,096,659 UART: [art] Signing Cert with AUTHO
3,097,139 UART: RITY.KEYID = 7
3,111,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,112,752 UART: [art] PUB.X = 12021B9E5E928A44507D33B69574A56DCB001966EB200455146DB20F235FBFEEAE327381044ADB663649B2B5B0191FFB
3,119,488 UART: [art] PUB.Y = 70FFD47B8419040515EFF287407E2502A352312C2046D11D48059F2B69F7551A95D2AFED91A4FB8ABE04EA2FE5AF6F0F
3,126,428 UART: [art] SIG.R = B4D73E187567F012F10510146CCB31A915741ABFBF4F5297384EE99550D1E01B767D479F0A944A08D5D6DAD5EC744225
3,133,189 UART: [art] SIG.S = E1907957AC09C7A3D49AC07701DA348A507D115CA66DAAD78165086AB1F3199BBF38CD786D94F03D3348DF7F8FF48D09
3,156,936 UART: Caliptra RT
3,157,281 UART: [state] CFI Enabled
3,266,241 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,626 >>> mbox cmd response: success
2,684,610 UART:
2,684,626 UART: Running Caliptra FMC ...
2,685,034 UART:
2,685,177 UART: [state] CFI Enabled
2,695,512 UART: [fht] FMC Alias Private Key: 7
2,803,211 UART: [art] Extend RT PCRs Done
2,803,639 UART: [art] Lock RT PCRs Done
2,805,235 UART: [art] Populate DV Done
2,813,538 UART: [fht] FMC Alias Private Key: 7
2,814,492 UART: [art] Derive CDI
2,814,772 UART: [art] Store in in slot 0x4
2,900,415 UART: [art] Derive Key Pair
2,900,775 UART: [art] Store priv key in slot 0x5
2,914,247 UART: [art] Derive Key Pair - Done
2,928,993 UART: [art] Signing Cert with AUTHO
2,929,473 UART: RITY.KEYID = 7
2,944,799 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,564 UART: [art] PUB.X = 3BE47F5601B9D03F7251B266F9815C1A2D4CD4986AEA2FFE37AB0E763CEA56CEB9BDA5DF2212B61C107661981F772B21
2,952,340 UART: [art] PUB.Y = 464E3DF2B87582B2FF9EE360CAD01678F2CD8F40EFD15B7184EF4762B0A09DCA892A6FCFB49BAE64392E8D93306AFC49
2,959,308 UART: [art] SIG.R = C366CB2FF9A3DAEA1CA0584F7BDBF5CD4F05A6E209E044BB1B57E6A7B7C21C868249DF37C76157B945AB8A3FF02941EF
2,966,094 UART: [art] SIG.S = 54E95C049AAC9651CFF65E171AFFF57E93012F77D5CBEC5F0EC9DF01B36642DDA5F1C7D3BDE4CB6D1B0ACEC58CD350A2
2,990,222 UART: Caliptra RT
2,990,567 UART: [state] CFI Enabled
3,098,344 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,614,938 >>> mbox cmd response: success
2,676,316 UART:
2,676,332 UART: Running Caliptra FMC ...
2,676,740 UART:
2,676,883 UART: [state] CFI Enabled
2,687,584 UART: [fht] FMC Alias Private Key: 7
2,795,525 UART: [art] Extend RT PCRs Done
2,795,953 UART: [art] Lock RT PCRs Done
2,797,469 UART: [art] Populate DV Done
2,805,756 UART: [fht] FMC Alias Private Key: 7
2,806,768 UART: [art] Derive CDI
2,807,048 UART: [art] Store in in slot 0x4
2,892,587 UART: [art] Derive Key Pair
2,892,947 UART: [art] Store priv key in slot 0x5
2,906,593 UART: [art] Derive Key Pair - Done
2,921,072 UART: [art] Signing Cert with AUTHO
2,921,552 UART: RITY.KEYID = 7
2,936,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,531 UART: [art] PUB.X = E3CDAE7222B479C0F706CA46A953A6D2EE4D75BBB489DA9A4F88EFD0F2E67E3F88486D0C6684D0F65FBCC87C8A0409A6
2,944,309 UART: [art] PUB.Y = D759BF88958D8F1403258592343D717E9CEEAB9A42A75744FE0D049200A54E3C27F788463C07030AEC01A2736D556A8E
2,951,212 UART: [art] SIG.R = 33D87ACCC8BAB3E795B5D179BFE72E79F2DABF0B386694D669C9AF7B64A7A5CCB97F43CE50795313DA4D6142A5FABB68
2,958,001 UART: [art] SIG.S = 5689B61BE9A2F236A6E016DE6962A3DA5517A6754F2C781C77C2C021F87F9701CD5CE6544DE06C74142E14665F871266
2,982,575 UART: Caliptra RT
2,982,920 UART: [state] CFI Enabled
3,089,133 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,768 >>> mbox cmd response: success
2,678,324 UART:
2,678,340 UART: Running Caliptra FMC ...
2,678,748 UART:
2,678,891 UART: [state] CFI Enabled
2,689,234 UART: [fht] FMC Alias Private Key: 7
2,796,879 UART: [art] Extend RT PCRs Done
2,797,307 UART: [art] Lock RT PCRs Done
2,798,789 UART: [art] Populate DV Done
2,807,272 UART: [fht] FMC Alias Private Key: 7
2,808,230 UART: [art] Derive CDI
2,808,510 UART: [art] Store in in slot 0x4
2,893,865 UART: [art] Derive Key Pair
2,894,225 UART: [art] Store priv key in slot 0x5
2,906,921 UART: [art] Derive Key Pair - Done
2,921,758 UART: [art] Signing Cert with AUTHO
2,922,238 UART: RITY.KEYID = 7
2,938,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,987 UART: [art] PUB.X = 97B491C4002A6FFDB431FD6B3B500F3C537FBF631E9CAF3212DC6F20988FAF54491F11036653141630BC2D72A75D08BA
2,945,732 UART: [art] PUB.Y = BEEFF5C4F1F17CF51E3C84B000A090EE3EE6CF5B49D13A405B5F3E8C9867DAE43E0766A2F8554DBF7B7E7BAA0BAF7835
2,952,680 UART: [art] SIG.R = AA3FA04F14738A7F2CB6B47287AC0F11ABFBE470B6B55EE36CC91625E01CC6202092BC2006D61DEBDB58E5A818A451DC
2,959,462 UART: [art] SIG.S = 8D89CF9B433AD05657CD9065AF4335DD0EA8C5ADCEB68E052F87785471254C0DC739D5657D1F6C1AB958C92B4FCFBAF9
2,983,644 UART: Caliptra RT
2,983,989 UART: [state] CFI Enabled
3,091,836 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,612,022 >>> mbox cmd response: success
2,674,236 UART:
2,674,252 UART: Running Caliptra FMC ...
2,674,660 UART:
2,674,803 UART: [state] CFI Enabled
2,685,154 UART: [fht] FMC Alias Private Key: 7
2,792,767 UART: [art] Extend RT PCRs Done
2,793,195 UART: [art] Lock RT PCRs Done
2,794,773 UART: [art] Populate DV Done
2,802,930 UART: [fht] FMC Alias Private Key: 7
2,804,044 UART: [art] Derive CDI
2,804,324 UART: [art] Store in in slot 0x4
2,890,183 UART: [art] Derive Key Pair
2,890,543 UART: [art] Store priv key in slot 0x5
2,903,867 UART: [art] Derive Key Pair - Done
2,918,653 UART: [art] Signing Cert with AUTHO
2,919,133 UART: RITY.KEYID = 7
2,934,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,624 UART: [art] PUB.X = 3FD5BA4D9DCA6661586C544068A363429B7D8D23FB9D62EDAEBD191C7C7E09DD1C4EDC61E2A59A2FE60FBED98DEC4EB9
2,942,416 UART: [art] PUB.Y = DC9D68EFB8DBE43160D731A21FA4358D0D09CA0CD553B488B2C532E02DDA6E20AA2DBDDF5ED006FACB2878D0C5020ED3
2,949,374 UART: [art] SIG.R = 1602FCDD23DE4CA2D8146A501D23DFBB09A8882C00CB37C9A9D577210F5F6A9EB28F2EEA5D667D45AD60AE0D51C86F3E
2,956,130 UART: [art] SIG.S = 7EBF5B9ADF9515F5B0F3D45CCFA06CCCC075527C8D4676E19635F8C23CADAD883BC375B7948907F37E8C4647099B0FE7
2,979,556 UART: Caliptra RT
2,979,901 UART: [state] CFI Enabled
3,087,048 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.75s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,085 UART: [afmc] --
2,847,103 UART: [cold-reset] --
2,848,001 UART: [state] Locking Datavault
2,849,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,710 UART: [state] Locking ICCM
2,850,192 UART: [exit] Launching FMC @ 0x40000130
2,855,521 UART:
2,855,537 UART: Running Caliptra FMC ...
2,855,945 UART:
2,855,999 UART: [state] CFI Enabled
2,866,222 UART: [fht] FMC Alias Private Key: 7
2,974,851 UART: [art] Extend RT PCRs Done
2,975,279 UART: [art] Lock RT PCRs Done
2,976,515 UART: [art] Populate DV Done
2,984,666 UART: [fht] FMC Alias Private Key: 7
2,985,600 UART: [art] Derive CDI
2,985,880 UART: [art] Store in in slot 0x4
3,071,643 UART: [art] Derive Key Pair
3,072,003 UART: [art] Store priv key in slot 0x5
3,085,467 UART: [art] Derive Key Pair - Done
3,100,573 UART: [art] Signing Cert with AUTHO
3,101,053 UART: RITY.KEYID = 7
3,115,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,512 UART: [art] PUB.X = 929CE660A3BCF743963709CCD27CC23E0F47D0B6A5CF49E768178622A4B93F24781059E0AF29DC05E3441F58BE7AF966
3,123,277 UART: [art] PUB.Y = 868B17323B4687E5A890A005E15C5EB476A5E38F4A7079263220842204ADAF9ABABD2A783EDEEC15D0AF7EA4D311083C
3,130,226 UART: [art] SIG.R = FA70F8D4D022E48F397F8704091EE5875C6515E40515F97052213B05B06637BF64ECDF51CC20C4B355F09317970038CF
3,136,956 UART: [art] SIG.S = 7DED378E66B0F40D8F96D16A60FE46BC624196EC8EE18F88DA3AF7FAE77460B8EEC086CB7F08D4CFD4ED4DE0FF26333D
3,160,451 UART: Caliptra RT
3,160,704 UART: [state] CFI Enabled
3,267,996 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha384 KeyId Algorithm
1,203,127 UART: [idev] --
1,204,270 UART: [ldev] ++
1,204,438 UART: [ldev] CDI.KEYID = 6
1,204,802 UART: [ldev] SUBJECT.KEYID = 5
1,205,229 UART: [ldev] AUTHORITY.KEYID = 7
1,205,692 UART: [ldev] FE.KEYID = 1
1,210,482 UART: [ldev] Erasing FE.KEYID = 1
1,236,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,342 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,064 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,058 UART: [ldev] --
1,275,478 UART: [fwproc] Wait for Commands...
1,276,163 UART: [fwproc] Recv command 0x46574c44
1,276,896 UART: [fwproc] Recv'd Img size: 114084 bytes
2,571,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,763,943 >>> mbox cmd response: success
2,765,200 UART: [afmc] ++
2,765,368 UART: [afmc] CDI.KEYID = 6
2,765,731 UART: [afmc] SUBJECT.KEYID = 7
2,766,157 UART: [afmc] AUTHORITY.KEYID = 5
2,801,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,604 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,611 UART: [afmc] --
2,844,683 UART: [cold-reset] --
2,845,421 UART: [state] Locking Datavault
2,846,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,390 UART: [state] Locking ICCM
2,847,922 UART: [exit] Launching FMC @ 0x40000130
2,853,251 UART:
2,853,267 UART: Running Caliptra FMC ...
2,853,675 UART:
2,853,729 UART: [state] CFI Enabled
2,864,026 UART: [fht] FMC Alias Private Key: 7
2,972,031 UART: [art] Extend RT PCRs Done
2,972,459 UART: [art] Lock RT PCRs Done
2,973,999 UART: [art] Populate DV Done
2,982,220 UART: [fht] FMC Alias Private Key: 7
2,983,286 UART: [art] Derive CDI
2,983,566 UART: [art] Store in in slot 0x4
3,069,245 UART: [art] Derive Key Pair
3,069,605 UART: [art] Store priv key in slot 0x5
3,083,145 UART: [art] Derive Key Pair - Done
3,098,030 UART: [art] Signing Cert with AUTHO
3,098,510 UART: RITY.KEYID = 7
3,113,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,417 UART: [art] PUB.X = DA2D78D99967EAF6378F64A87D07DCAD04427E1C533E9A9868CBB97968B9C90253D2BD2F332EAD71A4A1399B26137562
3,121,182 UART: [art] PUB.Y = 1E2E7E6B4ED8732D61F71B599C6D81CFDCB478E88763D3D1A8674FCE8E88BB02B9CF8C5A1E01C9D665DA0AD363AB64E1
3,128,143 UART: [art] SIG.R = 80267F24EFC75A9EA5959E1510F3F5BA9AB486ED577C9706144C756993E7EA2F3D5B5F342D4EA849DE208FD506C549EB
3,134,915 UART: [art] SIG.S = 8E8283AFA2E37E880D94A7EBC174B7405A6D0236F2D50F3A4B642E591FEBE731F70C529FA10D1840D4F7047A3B813D66
3,158,698 UART: Caliptra RT
3,158,951 UART: [state] CFI Enabled
3,266,050 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,989 UART: [state] WD Timer not started. Device not locked for debugging
88,120 UART: [kat] SHA2-256
891,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,961 UART: [fht] FHT @ 0x50003400
1,173,757 UART: [idev] ++
1,173,925 UART: [idev] CDI.KEYID = 6
1,174,286 UART: [idev] SUBJECT.KEYID = 7
1,174,711 UART: [idev] UDS.KEYID = 0
1,182,837 UART: [idev] Erasing UDS.KEYID = 0
1,200,600 UART: [idev] Fuse KeyId
1,201,822 UART: [idev] --
1,202,803 UART: [ldev] ++
1,202,971 UART: [ldev] CDI.KEYID = 6
1,203,335 UART: [ldev] SUBJECT.KEYID = 5
1,203,762 UART: [ldev] AUTHORITY.KEYID = 7
1,204,225 UART: [ldev] FE.KEYID = 1
1,209,351 UART: [ldev] Erasing FE.KEYID = 1
1,235,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,797 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,479 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,634 UART: [ldev] --
1,274,978 UART: [fwproc] Wait for Commands...
1,275,693 UART: [fwproc] Recv command 0x46574c44
1,276,426 UART: [fwproc] Recv'd Img size: 114084 bytes
2,571,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,598,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,763,495 >>> mbox cmd response: success
2,764,522 UART: [afmc] ++
2,764,690 UART: [afmc] CDI.KEYID = 6
2,765,053 UART: [afmc] SUBJECT.KEYID = 7
2,765,479 UART: [afmc] AUTHORITY.KEYID = 5
2,801,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,832 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,715 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,417 UART: [afmc] --
2,844,433 UART: [cold-reset] --
2,845,063 UART: [state] Locking Datavault
2,846,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,804 UART: [state] Locking ICCM
2,847,314 UART: [exit] Launching FMC @ 0x40000130
2,852,643 UART:
2,852,659 UART: Running Caliptra FMC ...
2,853,067 UART:
2,853,121 UART: [state] CFI Enabled
2,863,430 UART: [fht] FMC Alias Private Key: 7
2,971,149 UART: [art] Extend RT PCRs Done
2,971,577 UART: [art] Lock RT PCRs Done
2,973,277 UART: [art] Populate DV Done
2,981,488 UART: [fht] FMC Alias Private Key: 7
2,982,596 UART: [art] Derive CDI
2,982,876 UART: [art] Store in in slot 0x4
3,068,707 UART: [art] Derive Key Pair
3,069,067 UART: [art] Store priv key in slot 0x5
3,082,801 UART: [art] Derive Key Pair - Done
3,097,263 UART: [art] Signing Cert with AUTHO
3,097,743 UART: RITY.KEYID = 7
3,112,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,113,356 UART: [art] PUB.X = 05CFCA81416010CADB76A97C1E7788B797AFB553C73F0153292C2A783C64C98492065AAC4091422119B12DAE09DE6964
3,120,112 UART: [art] PUB.Y = B81038390F21D03363B5EECCAE10D3245537BEDB3C82BF2AEA10CEA48C8F33695380C70E53596589E2BFE1265163D930
3,127,060 UART: [art] SIG.R = DE6E51A3D6A5B9750EC8E7D893816CE9DEAB125D231F9FBDB0FBF26DDDEDD174F5F284E3A59D200DA597E7DF2418D18E
3,133,850 UART: [art] SIG.S = 68B5CF3647E4D981064EEACE62D77DFA49C8E16B4979EB27DCF82D5A6E5C3D9599991D0A8882B8EB349C63FFA6751C4E
3,157,657 UART: Caliptra RT
3,157,910 UART: [state] CFI Enabled
3,266,499 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,623 >>> mbox cmd response: success
2,680,545 UART:
2,680,561 UART: Running Caliptra FMC ...
2,680,969 UART:
2,681,023 UART: [state] CFI Enabled
2,691,658 UART: [fht] FMC Alias Private Key: 7
2,799,721 UART: [art] Extend RT PCRs Done
2,800,149 UART: [art] Lock RT PCRs Done
2,801,689 UART: [art] Populate DV Done
2,809,880 UART: [fht] FMC Alias Private Key: 7
2,811,042 UART: [art] Derive CDI
2,811,322 UART: [art] Store in in slot 0x4
2,897,299 UART: [art] Derive Key Pair
2,897,659 UART: [art] Store priv key in slot 0x5
2,911,387 UART: [art] Derive Key Pair - Done
2,926,080 UART: [art] Signing Cert with AUTHO
2,926,560 UART: RITY.KEYID = 7
2,941,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,583 UART: [art] PUB.X = 8276F316BA41E3B90606407A2DFBFCD2747928138533CA8929BC118CB3122827163C5E8E7669FFAD9401390DC9D4DB48
2,949,339 UART: [art] PUB.Y = 5AD2AB40B73244A71A7AF091FC3F6D1071B4ED25D2D414C23E4FABDFE0A8A62DC663D9264F77E32F29E23C478D2E4249
2,956,303 UART: [art] SIG.R = 63DEFE1289EB899917133D09BC675B78E03C00DF7C3C72188E89BE9665FA9C4639D5E65B2F40F6A3ABD5227CB8590AA7
2,963,053 UART: [art] SIG.S = D202C3ED17B6F81D07A6734DAF5F99ED0F770A04552648B53E29C258BF48BADE4CDFBF2AA723DCD08857234154B9D1DB
2,986,739 UART: Caliptra RT
2,986,992 UART: [state] CFI Enabled
3,094,577 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,612,909 >>> mbox cmd response: success
2,674,909 UART:
2,674,925 UART: Running Caliptra FMC ...
2,675,333 UART:
2,675,387 UART: [state] CFI Enabled
2,686,182 UART: [fht] FMC Alias Private Key: 7
2,793,879 UART: [art] Extend RT PCRs Done
2,794,307 UART: [art] Lock RT PCRs Done
2,795,677 UART: [art] Populate DV Done
2,803,968 UART: [fht] FMC Alias Private Key: 7
2,805,006 UART: [art] Derive CDI
2,805,286 UART: [art] Store in in slot 0x4
2,890,973 UART: [art] Derive Key Pair
2,891,333 UART: [art] Store priv key in slot 0x5
2,904,723 UART: [art] Derive Key Pair - Done
2,919,457 UART: [art] Signing Cert with AUTHO
2,919,937 UART: RITY.KEYID = 7
2,935,379 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,144 UART: [art] PUB.X = E3D62029D2D5B4670DC7633FDEE6DB20F574C245162AFCC8E12701B2C1283076081E94CD49305B552C7273FB89FFB7DD
2,942,911 UART: [art] PUB.Y = 01EB18D47032384989C3B1ADD7FAA7204952616CE6F5E524EBB0C720F18A0DE33BF98CB1C49646C7049AB5255D78234F
2,949,856 UART: [art] SIG.R = A351150CA6D383AE70F4502263D3312B5DCD1878A487F00D8521DA61B9D03BD7D18DCA8DF71710EEFB7A264F93186090
2,956,624 UART: [art] SIG.S = CC95722CB7D3FB63DA9E98357C474EF36038C830F92BD95DB54CD044DA7D3A855DF660AB5FFE4853195AF780389CFC46
2,980,819 UART: Caliptra RT
2,981,072 UART: [state] CFI Enabled
3,088,125 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,141 >>> mbox cmd response: success
2,676,693 UART:
2,676,709 UART: Running Caliptra FMC ...
2,677,117 UART:
2,677,171 UART: [state] CFI Enabled
2,688,042 UART: [fht] FMC Alias Private Key: 7
2,796,281 UART: [art] Extend RT PCRs Done
2,796,709 UART: [art] Lock RT PCRs Done
2,798,219 UART: [art] Populate DV Done
2,806,210 UART: [fht] FMC Alias Private Key: 7
2,807,206 UART: [art] Derive CDI
2,807,486 UART: [art] Store in in slot 0x4
2,892,943 UART: [art] Derive Key Pair
2,893,303 UART: [art] Store priv key in slot 0x5
2,907,377 UART: [art] Derive Key Pair - Done
2,921,877 UART: [art] Signing Cert with AUTHO
2,922,357 UART: RITY.KEYID = 7
2,937,461 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,226 UART: [art] PUB.X = 33E21F276CD8C85121CE74A14147631DDAC1BE04C069006AAA9C23FB9B89DA8A277D2D992AB793C5A4B6F0D15FD60249
2,944,978 UART: [art] PUB.Y = 96C7467225C13B1C3E5A85611C2C723D012F8E61247C052B231B1C988B0338D2E910C7877C7C2E283F7F1EF02A5D0C9E
2,951,914 UART: [art] SIG.R = B40D82A4DC62E551135094A48AA021F36FFD4FC2A84D2425BA884D274AD10BE8F6A8518BA4C7A9A058435BABBE5F624A
2,958,692 UART: [art] SIG.S = 144E8D98777A7A2D80E6E7CBC00A4F889B838F4731F4863E27E0A69EEDE49C6310EB51112A220568BB554B0A28A255C0
2,982,644 UART: Caliptra RT
2,982,897 UART: [state] CFI Enabled
3,089,865 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,611,793 >>> mbox cmd response: success
2,674,115 UART:
2,674,131 UART: Running Caliptra FMC ...
2,674,539 UART:
2,674,593 UART: [state] CFI Enabled
2,685,024 UART: [fht] FMC Alias Private Key: 7
2,792,747 UART: [art] Extend RT PCRs Done
2,793,175 UART: [art] Lock RT PCRs Done
2,794,773 UART: [art] Populate DV Done
2,802,690 UART: [fht] FMC Alias Private Key: 7
2,803,630 UART: [art] Derive CDI
2,803,910 UART: [art] Store in in slot 0x4
2,889,709 UART: [art] Derive Key Pair
2,890,069 UART: [art] Store priv key in slot 0x5
2,903,169 UART: [art] Derive Key Pair - Done
2,917,919 UART: [art] Signing Cert with AUTHO
2,918,399 UART: RITY.KEYID = 7
2,933,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,934,002 UART: [art] PUB.X = A84ED62251768E2E8309972A0BC14DF57B85A07D0B38AE811DCBEBDE650925CAC2E285E29EF6E62988E346ED4F12CD65
2,940,772 UART: [art] PUB.Y = CD7B39C311228B8923F7F7FE8F199EEAC4D15B1661B8D8C022EDF2382E2584CD883E61CD855A7B533C74237D472A695B
2,947,728 UART: [art] SIG.R = 7390DA0CC1A45BC0A68CF99951F2E51C1075A02EC9F2A3005F7A3469D8FAD2211F335B20FD245AAE773F800DD054B94A
2,954,480 UART: [art] SIG.S = 42559879D4C080EBC2B5B3CB3D8381C5AE8D7102FD422F8653B933343D5DA5AB940F9B0D245474F19D3E77FE3B9DB6B9
2,978,110 UART: Caliptra RT
2,978,363 UART: [state] CFI Enabled
3,086,132 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.65s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,772 UART: [afmc] --
2,845,770 UART: [cold-reset] --
2,846,484 UART: [state] Locking Datavault
2,847,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,263 UART: [state] Locking ICCM
2,848,705 UART: [exit] Launching FMC @ 0x40000130
2,854,034 UART:
2,854,050 UART: Running Caliptra FMC ...
2,854,458 UART:
2,854,601 UART: [state] CFI Enabled
2,865,502 UART: [fht] FMC Alias Private Key: 7
2,973,205 UART: [art] Extend RT PCRs Done
2,973,633 UART: [art] Lock RT PCRs Done
2,975,607 UART: [art] Populate DV Done
2,983,600 UART: [fht] FMC Alias Private Key: 7
2,984,646 UART: [art] Derive CDI
2,984,926 UART: [art] Store in in slot 0x4
3,070,527 UART: [art] Derive Key Pair
3,070,887 UART: [art] Store priv key in slot 0x5
3,084,021 UART: [art] Derive Key Pair - Done
3,098,661 UART: [art] Signing Cert with AUTHO
3,099,141 UART: RITY.KEYID = 7
3,114,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,996 UART: [art] PUB.X = 6563FCA8169F3445592C3D7FFC44D4634E4EFFE58A5E7B1E2F9E8F8712A9C61E4436DB908DA21CA1B74AA9E626DD246F
3,121,780 UART: [art] PUB.Y = 21DC7F87ADBEE49739CDCC6191866E57B385999DB9B249B59FF72BBE5E1924D5626DE63AAFCDFB15C06A434A422E15B5
3,128,746 UART: [art] SIG.R = 76CE3CCC708B5B471D37BA031D5AB06ECA2DBE86DD6DF9EFB47799CF13B8CD62C05ECBEA95C4B6E8AE27077F282D951D
3,135,538 UART: [art] SIG.S = E918E660B117BC4FEF75C633325D967C7AE4BAEA7A71378734E35E517BBC7898E0B89A3BB2433EA5B58241F0AA473A61
3,159,119 UART: Caliptra RT
3,159,464 UART: [state] CFI Enabled
3,266,768 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,815 UART: [state] LifecycleState = Unprovisioned
85,470 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,357 UART: [kat] SHA2-256
890,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
904,065 UART: [kat] SHA2-512-ACC
905,966 UART: [kat] ECC-384
915,551 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,546 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,301 UART: [idev] Sha384 KeyId Algorithm
1,202,852 UART: [idev] --
1,203,941 UART: [ldev] ++
1,204,109 UART: [ldev] CDI.KEYID = 6
1,204,473 UART: [ldev] SUBJECT.KEYID = 5
1,204,900 UART: [ldev] AUTHORITY.KEYID = 7
1,205,363 UART: [ldev] FE.KEYID = 1
1,210,771 UART: [ldev] Erasing FE.KEYID = 1
1,237,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,291 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,013 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,129 UART: [ldev] --
1,276,485 UART: [fwproc] Wait for Commands...
1,277,172 UART: [fwproc] Recv command 0x46574c44
1,277,905 UART: [fwproc] Recv'd Img size: 114084 bytes
2,573,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,764,758 >>> mbox cmd response: success
2,766,011 UART: [afmc] ++
2,766,179 UART: [afmc] CDI.KEYID = 6
2,766,542 UART: [afmc] SUBJECT.KEYID = 7
2,766,968 UART: [afmc] AUTHORITY.KEYID = 5
2,802,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,406 UART: [afmc] --
2,846,408 UART: [cold-reset] --
2,847,336 UART: [state] Locking Datavault
2,848,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,093 UART: [state] Locking ICCM
2,849,533 UART: [exit] Launching FMC @ 0x40000130
2,854,862 UART:
2,854,878 UART: Running Caliptra FMC ...
2,855,286 UART:
2,855,429 UART: [state] CFI Enabled
2,866,010 UART: [fht] FMC Alias Private Key: 7
2,973,607 UART: [art] Extend RT PCRs Done
2,974,035 UART: [art] Lock RT PCRs Done
2,975,559 UART: [art] Populate DV Done
2,983,942 UART: [fht] FMC Alias Private Key: 7
2,985,070 UART: [art] Derive CDI
2,985,350 UART: [art] Store in in slot 0x4
3,070,529 UART: [art] Derive Key Pair
3,070,889 UART: [art] Store priv key in slot 0x5
3,084,213 UART: [art] Derive Key Pair - Done
3,099,070 UART: [art] Signing Cert with AUTHO
3,099,550 UART: RITY.KEYID = 7
3,115,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,939 UART: [art] PUB.X = 2BC32E7CFC485AF9026FDF2F51FC9A0C82CEED4BD16EB1CA079A9C888671344D7DA44104ACFC7B7FF5B79A70A83BC0C9
3,122,723 UART: [art] PUB.Y = C04F5F5AB82E4309EF02BD8DDC57BB340D05C6D8A398CC4B586F772CF925005F024935CA5422389D6397C6FB2F5D8FF6
3,129,646 UART: [art] SIG.R = E489574D883A6B4A11F54A0008F07804961473F6D42FDC02D8CE46C2CA9A34788E42995FEFE64112E8483D61B9095E64
3,136,378 UART: [art] SIG.S = AE132CD38DFA8FF8F86D2D906E13784CB1259AA063A7B6760BE5695ADE698EEBF89CEB8B08CA67B800631ABB0A5CED19
3,160,198 UART: Caliptra RT
3,160,543 UART: [state] CFI Enabled
3,267,454 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Fuse KeyId
1,200,469 UART: [idev] --
1,201,594 UART: [ldev] ++
1,201,762 UART: [ldev] CDI.KEYID = 6
1,202,126 UART: [ldev] SUBJECT.KEYID = 5
1,202,553 UART: [ldev] AUTHORITY.KEYID = 7
1,203,016 UART: [ldev] FE.KEYID = 1
1,208,084 UART: [ldev] Erasing FE.KEYID = 1
1,233,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,012 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,694 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,663 UART: [ldev] --
1,273,043 UART: [fwproc] Wait for Commands...
1,273,726 UART: [fwproc] Recv command 0x46574c44
1,274,459 UART: [fwproc] Recv'd Img size: 114084 bytes
2,569,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,596,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,626,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,761,588 >>> mbox cmd response: success
2,762,823 UART: [afmc] ++
2,762,991 UART: [afmc] CDI.KEYID = 6
2,763,354 UART: [afmc] SUBJECT.KEYID = 7
2,763,780 UART: [afmc] AUTHORITY.KEYID = 5
2,799,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,815,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,816,332 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,822,061 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,827,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,833,663 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,841,508 UART: [afmc] --
2,842,408 UART: [cold-reset] --
2,843,140 UART: [state] Locking Datavault
2,844,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,844,833 UART: [state] Locking ICCM
2,845,333 UART: [exit] Launching FMC @ 0x40000130
2,850,662 UART:
2,850,678 UART: Running Caliptra FMC ...
2,851,086 UART:
2,851,229 UART: [state] CFI Enabled
2,861,780 UART: [fht] FMC Alias Private Key: 7
2,970,401 UART: [art] Extend RT PCRs Done
2,970,829 UART: [art] Lock RT PCRs Done
2,972,173 UART: [art] Populate DV Done
2,980,302 UART: [fht] FMC Alias Private Key: 7
2,981,272 UART: [art] Derive CDI
2,981,552 UART: [art] Store in in slot 0x4
3,067,151 UART: [art] Derive Key Pair
3,067,511 UART: [art] Store priv key in slot 0x5
3,080,913 UART: [art] Derive Key Pair - Done
3,095,642 UART: [art] Signing Cert with AUTHO
3,096,122 UART: RITY.KEYID = 7
3,111,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,112,237 UART: [art] PUB.X = 427920C17BAFEABF1741BE81B503E142BEB92F1816A3475CA141AED3B586D293B8B6269BD7390526DAFE8586312C5724
3,119,005 UART: [art] PUB.Y = A0282739B2BAC6EF35A1B12F767E7C6DCD7DCC04411C539A89CED4E941E26257FD4FACBF712488ABB759C6A9EF25890C
3,125,967 UART: [art] SIG.R = E599671B657AEBAAF7696726A3EB959F5310C272D86D57EE5208CD7BFE2640928F588247480A8C625330A732D99A7902
3,132,722 UART: [art] SIG.S = D2DB85FF26DFC0EA0F4B8A1F5558AFB0C58E3D79CB67E92D864E08CB47EB61921C1D2CCCD998E0E6E8C9570607A70662
3,156,242 UART: Caliptra RT
3,156,587 UART: [state] CFI Enabled
3,264,885 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,452 >>> mbox cmd response: success
2,680,250 UART:
2,680,266 UART: Running Caliptra FMC ...
2,680,674 UART:
2,680,817 UART: [state] CFI Enabled
2,691,458 UART: [fht] FMC Alias Private Key: 7
2,799,717 UART: [art] Extend RT PCRs Done
2,800,145 UART: [art] Lock RT PCRs Done
2,801,551 UART: [art] Populate DV Done
2,809,772 UART: [fht] FMC Alias Private Key: 7
2,810,770 UART: [art] Derive CDI
2,811,050 UART: [art] Store in in slot 0x4
2,896,991 UART: [art] Derive Key Pair
2,897,351 UART: [art] Store priv key in slot 0x5
2,910,719 UART: [art] Derive Key Pair - Done
2,925,440 UART: [art] Signing Cert with AUTHO
2,925,920 UART: RITY.KEYID = 7
2,941,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,875 UART: [art] PUB.X = 45A6BC6E163921E0341474F47CCAE7A0F0953AECA72C9F0DC142E4DE68F42A66FC8423280A5F6DDD55D3F72D0EAF1375
2,948,650 UART: [art] PUB.Y = E3204E0AF60A3A3FFCD29DFD8453E060E10A97FC2770D4257427845475864AB7BACB9CD2388853DF7DFF0CA191728EB9
2,955,598 UART: [art] SIG.R = 17950ECA9509DEEFD7815D4D10AF191AD7B7C853951F1DEAD8A6E0EAFA14105348D41A1CE949A1C80274C10980973FF9
2,962,366 UART: [art] SIG.S = 3771736D5E33EA08C0C67EC54B4553225CE4630A868CF21E07C95FFC81A7E59C5A9A073B7EFE7CFA7408FC9175043F42
2,986,427 UART: Caliptra RT
2,986,772 UART: [state] CFI Enabled
3,094,507 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,614,140 >>> mbox cmd response: success
2,675,162 UART:
2,675,178 UART: Running Caliptra FMC ...
2,675,586 UART:
2,675,729 UART: [state] CFI Enabled
2,686,698 UART: [fht] FMC Alias Private Key: 7
2,794,679 UART: [art] Extend RT PCRs Done
2,795,107 UART: [art] Lock RT PCRs Done
2,796,741 UART: [art] Populate DV Done
2,805,144 UART: [fht] FMC Alias Private Key: 7
2,806,104 UART: [art] Derive CDI
2,806,384 UART: [art] Store in in slot 0x4
2,892,119 UART: [art] Derive Key Pair
2,892,479 UART: [art] Store priv key in slot 0x5
2,905,625 UART: [art] Derive Key Pair - Done
2,920,324 UART: [art] Signing Cert with AUTHO
2,920,804 UART: RITY.KEYID = 7
2,935,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,749 UART: [art] PUB.X = 46C4504C81F6D95A4F6C49CE5A1B237352074018013E460CD90431AE8A50E91058F1BBD924B85988E9AAEA33322BD27C
2,943,507 UART: [art] PUB.Y = 151C7BE6ECC2DD143F868E00EDFE4D960EF738EA6CE309183A699C8074843CC4308EACC4E2B2F7A64A18E5E9383D7F50
2,950,443 UART: [art] SIG.R = 07B13F9292D9615DF4BD477989E39E09D83675AE2787F27F2884E32A73225B8CD32B8AFEBE1C8689067D1CCCE2260B84
2,957,203 UART: [art] SIG.S = D4B045288C304C2601C154EA8E8BD813E75E920978CF00AA337A3DB3E1E8BD8A072D75558FD132754B4470E676182F94
2,981,159 UART: Caliptra RT
2,981,504 UART: [state] CFI Enabled
3,089,002 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,654 >>> mbox cmd response: success
2,678,214 UART:
2,678,230 UART: Running Caliptra FMC ...
2,678,638 UART:
2,678,781 UART: [state] CFI Enabled
2,689,430 UART: [fht] FMC Alias Private Key: 7
2,797,801 UART: [art] Extend RT PCRs Done
2,798,229 UART: [art] Lock RT PCRs Done
2,799,939 UART: [art] Populate DV Done
2,808,060 UART: [fht] FMC Alias Private Key: 7
2,809,180 UART: [art] Derive CDI
2,809,460 UART: [art] Store in in slot 0x4
2,895,341 UART: [art] Derive Key Pair
2,895,701 UART: [art] Store priv key in slot 0x5
2,909,019 UART: [art] Derive Key Pair - Done
2,923,987 UART: [art] Signing Cert with AUTHO
2,924,467 UART: RITY.KEYID = 7
2,939,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,598 UART: [art] PUB.X = 5A278A326C6857C44F4575898F4204CA8F595C91CD376E62C22CE1D2DA2546FF59C3F2500548FB3150E6A7FF335B0538
2,947,357 UART: [art] PUB.Y = B7DDCB31A98DAE2A267EC91C74344C8B6833DA2764BE4902BF320EB784C0ED526DF1F6A0038B72FE672760B6946EAD9F
2,954,312 UART: [art] SIG.R = 29129BCAEADB01CB2B64B4E7F5AFE75BECB0BAC59BD112A26B2CBF515545DC2D320B66E5941A86D423D6DFEE9E79ADF1
2,961,106 UART: [art] SIG.S = 26A559D770CC9862C7250B7CED4A27996547F145F8C7723B86FD00422017ABA3B60096AF43B682FF7A8B9C8EA4DCB4FE
2,985,242 UART: Caliptra RT
2,985,587 UART: [state] CFI Enabled
3,093,010 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,611,594 >>> mbox cmd response: success
2,674,280 UART:
2,674,296 UART: Running Caliptra FMC ...
2,674,704 UART:
2,674,847 UART: [state] CFI Enabled
2,685,556 UART: [fht] FMC Alias Private Key: 7
2,792,961 UART: [art] Extend RT PCRs Done
2,793,389 UART: [art] Lock RT PCRs Done
2,794,723 UART: [art] Populate DV Done
2,803,008 UART: [fht] FMC Alias Private Key: 7
2,804,050 UART: [art] Derive CDI
2,804,330 UART: [art] Store in in slot 0x4
2,890,253 UART: [art] Derive Key Pair
2,890,613 UART: [art] Store priv key in slot 0x5
2,903,453 UART: [art] Derive Key Pair - Done
2,918,247 UART: [art] Signing Cert with AUTHO
2,918,727 UART: RITY.KEYID = 7
2,934,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,934,816 UART: [art] PUB.X = 338DE71F401032E9B4F12FC77401027CC6C670F8F58BB4E249D2C3291C2C9DC223A44AC7623B8EE390796AF7FD13A35D
2,941,586 UART: [art] PUB.Y = 7B9CC581E79B514A650E6C5DA0FA3452DCFB151422FE7FD3241A8966AE411EFDB95C209784ACBFDCD847DC324DC874F8
2,948,551 UART: [art] SIG.R = 193D3E3C15CE3E484BE8B9A6EF1F65732636B8BA584F1122191E9F7AC880369B85DF03495AB8F67EDA0C5C77FD49B636
2,955,323 UART: [art] SIG.S = 8FF0BC42EB697E464878E7F2150272EFF006BD25C2F458346E1B69D90BAAD50311D624BF4599C9CF6913765D45C97D33
2,979,172 UART: Caliptra RT
2,979,517 UART: [state] CFI Enabled
3,087,188 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.72s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
27,009,769 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:44:26 2025 GMT
Not After : Jun 29 12:44:26 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ef:05:ee:6d:ea:9d:87:17:f5:19:da:9b:3d:04:
68:d2:b9:6c:66:28:cc:8e:dc:1c:41:60:a2:68:4e:
f8:66:10:b3:b9:57:6b:6b:71:40:47:e5:bf:b7:f1:
5b:c6:be:6c:c0:b7:23:4a:2b:2c:7c:2d:f4:5b:2b:
2e:cf:e1:d1:30:55:21:cb:c4:a8:c1:62:b5:ef:09:
99:30:e1:2e:9b:ee:93:3f:83:52:31:66:d9:7e:4a:
90:dd:50:a4:7e:16:df:4f:d2:29:e8:3e:ef:ed:06:
33:a5:e7:fa:76:e7:6d:87:52:75:0b:2f:e4:a5:d3:
f7:86:ce:cf:39:3e:c3:60:5a:84:49:ba:16:6a:9a:
2c:96:76:36:99:70:d2:3f:41:d4:ad:55:9e:06:49:
f1:3c:02:20:ab:39:4f:12:32:7c:41:55:71:7c:b4:
ec:a2:da:35:7d:9d:9f:e0:5f:00:9c:02:b1:b7:09:
62:99:2e:72:ab:d4:ef:23:06:2a:71:3c:05:1b:92:
a0:81:41:9c:07:a2:cd:b8:d9:96:10:d6:34:86:85:
42:d7:c9:90:24:4f:b3:66:95:d6:ce:75:18:f2:b2:
e4:07:68:43:20:bc:bb:d9:9a:5c:26:cd:f7:72:15:
d7:4d:cf:40:4a:65:64:26:31:eb:9e:d0:a1:56:22:
96:0d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
60:18:6a:bd:dd:7c:d5:5d:05:3e:bb:81:8b:3b:e4:e2:aa:be:
1e:42:5a:1c:76:19:67:1b:09:cf:6f:a2:12:c4:22:6c:bd:35:
92:dc:1e:ac:29:b2:a2:02:15:8b:59:30:57:e9:49:3b:0b:d6:
7d:24:ff:30:9f:41:84:7c:6d:5b:83:e2:00:8c:65:e7:38:4c:
4c:86:08:8d:87:9e:eb:0b:cd:99:09:fb:5c:ff:13:5c:85:32:
70:e1:a5:af:05:5f:fb:fb:ef:37:2a:80:c0:2d:64:34:f9:b6:
5c:f6:4f:64:a5:b2:49:b1:46:e9:a0:a1:bc:e3:d8:ea:89:1e:
0e:60:b5:0b:68:19:74:4b:48:2e:73:01:4e:e7:e2:8e:f6:97:
b2:93:69:2c:bb:a6:00:6d:db:a7:86:c7:b2:79:4a:ed:3d:2d:
62:01:87:8b:fb:05:c7:d4:1f:d9:6a:7b:d7:6e:1e:05:e8:df:
74:e3:1e:06:72:64:b8:1c:1b:01:c0:83:31:90:d9:15:12:69:
c1:d7:d6:61:73:3e:df:a7:2d:fe:70:16:d4:bc:38:08:44:c3:
de:c1:47:30:32:72:d1:77:31:4c:64:54:4f:2e:db:c2:e3:e9:
78:70:df:72:05:aa:4b:b1:89:df:84:7d:68:83:b4:9e:64:bd:
20:b9:71:96
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:44:26 2025 GMT
Not After : May 31 12:44:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5f:85:32:57:14:cd:9a:52:ae:14:f0:71:67:44:87:61:1e:8c:
12:8b:6d:ca:3e:1c:97:ab:73:2b:24:30:09:73:cb:9f:c9:91:
df:eb:06:b8:13:ea:d0:f4:2c:e1:76:09:5f:e2:30:ab:98:e3:
37:db:7a:e3:47:85:96:2d:e3:0f:fb:7c:05:4c:22:ac:63:c7:
92:24:bd:88:a5:45:49:d2:3b:f3:bc:6b:ad:fd:10:a9:39:2a:
ca:5c:7f:69:0d:96:96:c0:a3:ba:bc:d3:f2:b8:3f:b1:c4:a0:
97:e4:10:5d:38:9c:83:02:8d:3a:7f:92:03:61:ce:63:3b:10:
ee:39:78:3b:60:a0:b2:53:31:25:aa:22:a6:76:87:51:ec:a4:
eb:61:1c:4a:a6:fb:29:93:2d:7b:15:5c:ea:16:41:f2:c1:7b:
44:56:93:04:9f:31:5f:2b:c4:7f:16:2b:9c:94:03:a1:23:ff:
e4:4f:ff:fb:56:dc:a0:c0:37:81:24:a0:46:cf:55:45:9d:95:
96:25:c4:46:c5:1d:78:dd:90:94:be:21:2e:a9:07:5e:e1:e7:
d1:84:bd:b4:bc:35:4b:48:ba:fd:c1:8b:a6:f4:07:a5:04:ea:
77:65:9f:ca:42:94:d0:0e:21:32:24:6c:7f:e8:4f:9a:7f:50:
a6:5a:5c:0e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
26,496,169 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:50 2025 GMT
Not After : Jun 29 10:59:50 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:cb:f6:cc:9f:5f:32:46:3c:7e:a5:bd:fe:93:
bc:7e:a7:b4:ff:4c:d5:37:a6:d4:34:4b:b2:0f:8a:
34:bd:06:98:77:82:9a:27:a5:dd:09:78:ac:96:71:
32:d1:e8:74:53:29:24:90:a3:41:6d:f5:67:b8:20:
93:c9:70:bf:5e:be:ac:15:f2:f0:08:a2:9b:c9:8a:
b2:d2:9d:bd:db:20:ad:52:91:3d:6e:6b:3d:b5:93:
e2:16:49:78:a8:9d:38:75:bf:b8:f8:54:37:78:24:
57:4f:f2:7b:a5:32:e9:5e:a5:9d:98:6a:d6:44:46:
78:32:37:54:f2:7f:a8:9a:b3:18:82:45:e1:87:47:
08:26:5e:f1:5a:59:e1:1c:d9:cf:76:11:d5:cf:c2:
c0:02:ed:52:95:aa:3c:90:48:b5:53:fc:6c:dd:b4:
85:02:7f:08:33:b1:98:50:73:7b:34:ea:0f:7c:d0:
8f:bf:db:ba:90:37:2c:1b:a2:96:ad:95:e5:ea:6a:
4b:bf:6b:22:07:5a:a9:34:9d:90:9e:f5:cc:82:48:
db:51:6e:f7:b1:f7:e5:b3:77:5f:f1:d2:62:2b:07:
d6:06:0d:42:fe:ea:c9:e3:6e:bd:7e:8b:f2:dd:0c:
9c:aa:73:c6:5a:1b:1c:28:5e:71:a6:b7:3f:da:28:
bd:3d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
88:1e:a5:99:31:a4:17:04:11:f1:48:ac:f1:c6:fe:20:0a:44:
66:1b:02:02:08:2b:b2:d9:91:6e:5e:0b:fa:88:5e:c6:8d:47:
3c:94:68:a3:34:bd:ba:60:96:9f:66:42:70:5d:3d:08:34:d1:
a2:99:6b:e7:cd:39:23:a1:aa:b2:a7:c4:3b:52:b4:a9:dd:fa:
0f:64:47:ea:a9:fc:61:94:cf:6a:fe:66:c0:f7:06:ac:db:d4:
a3:db:ab:8c:54:92:ad:50:5a:5e:ad:c8:95:99:8c:45:60:68:
59:99:06:bd:6d:55:11:43:04:22:6a:56:c2:82:96:e9:27:a1:
e2:0a:8c:ca:82:d2:5e:bc:f5:46:f2:fb:de:06:d9:05:02:0a:
06:ec:34:ef:66:6c:cb:90:a5:46:dc:87:8f:6e:69:32:9f:5a:
65:ae:6b:8d:17:ac:f8:3b:2a:6f:56:71:4e:d9:21:3f:88:1c:
a2:a8:5e:68:70:0e:bd:b4:21:5d:6e:c8:64:39:4c:c2:59:eb:
46:41:cc:1a:e2:8c:1e:7b:5b:1c:04:b7:30:5c:03:5a:92:b4:
49:80:3d:c7:77:54:03:81:ed:b3:25:34:a0:4a:df:e5:0e:ac:
4b:7a:b0:8e:14:a2:12:92:ad:b5:56:00:17:8c:83:a7:38:a2:
bf:db:0d:41
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:50 2025 GMT
Not After : May 31 10:59:50 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4f:89:bd:8b:21:5d:51:30:2a:b3:af:d9:de:61:0d:5a:eb:9d:
6b:e9:5f:2c:43:e9:50:9b:62:a6:c3:ea:70:ac:dd:9b:7d:7e:
08:f3:66:5c:93:52:d7:16:ee:5b:87:8d:51:85:6c:d0:ed:b0:
42:cb:3c:59:25:0b:30:b9:d3:f6:04:52:ef:17:69:81:25:3a:
30:14:60:cf:4f:6d:98:13:b6:97:4b:41:50:4e:20:32:90:87:
7a:d0:d8:1b:0b:3a:23:94:7a:74:c9:49:13:d8:64:06:d6:90:
98:38:cc:8e:5a:4e:e8:61:06:19:94:0c:62:b6:d4:63:6c:e3:
9e:15:40:59:b0:19:62:18:40:fc:95:9e:7f:fc:d9:0a:d1:c2:
c4:45:22:ff:e2:97:bc:20:1e:a5:83:76:b1:74:0d:27:c7:d9:
2e:0c:92:74:e2:1a:14:d0:a4:ce:17:80:c6:38:b5:a7:79:9b:
a1:85:81:c7:11:45:df:3e:b1:34:40:f6:60:cb:51:00:03:83:
72:ad:0e:1a:1d:22:17:b3:d4:6e:30:b8:12:cc:0d:bb:7c:60:
49:ee:6c:c3:c6:87:50:f8:8c:0e:08:bd:cd:b4:bd:52:dc:93:
1e:5b:91:66:89:cf:13:b4:96:42:73:b3:92:27:11:b4:36:0c:
82:07:69:45
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.59s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,096,815 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:16:20 2025 GMT
Not After : Jun 29 14:16:20 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:da:1e:aa:dc:db:ad:ac:83:89:d8:e8:2c:b0:80:
b2:32:75:20:2b:f2:03:5a:27:4b:04:a7:db:d6:f0:
59:04:a7:9c:f9:32:10:ec:b3:77:c0:2b:55:12:ac:
e4:56:73:db:ec:54:cf:3c:ec:76:74:16:20:35:ef:
a4:a0:77:9b:2f:7e:60:ce:1d:c3:d0:ef:6d:6b:ec:
d7:e6:f5:38:aa:1d:ec:44:12:da:2d:fc:da:94:83:
b2:97:7f:7d:be:66:24:da:13:dc:3e:77:23:e1:b4:
d6:e8:04:34:ca:3e:75:ee:a5:be:4e:12:83:f3:3f:
df:e3:2a:3e:be:0f:e7:f1:3a:ad:83:38:36:61:b1:
2a:4c:22:4f:f2:e7:f2:7e:fa:7d:d2:9a:04:21:bf:
54:ce:43:3b:6a:5e:87:ff:5c:84:df:bd:9f:20:79:
81:d2:b5:c1:29:c3:88:f6:7b:12:9c:1d:09:1c:89:
58:55:10:98:19:54:88:ca:95:7c:d5:2c:39:0c:1f:
5f:14:e7:f8:12:1b:f4:ad:c3:65:b1:d2:28:a3:b9:
18:a3:7e:c6:3c:be:84:de:e1:e8:8d:7d:f9:12:7f:
0b:35:5c:ee:47:d3:cb:27:05:37:0a:99:4d:29:57:
1b:56:96:56:50:75:60:f1:24:ad:e8:eb:3d:32:de:
d7:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b6:06:e5:13:66:65:7e:bc:7c:20:af:69:b6:d7:a2:1f:8b:6b:
ac:46:c2:28:13:f5:54:78:cf:7f:90:d1:e1:a9:0d:e9:42:f2:
62:dd:eb:d6:fb:fa:f1:26:1c:8e:2a:0e:38:11:b1:76:80:86:
a5:29:05:86:c0:bc:3b:bf:73:f6:b5:17:22:35:1f:30:01:08:
e8:13:04:b0:e7:d2:6c:9c:b2:72:46:bd:7f:f4:f4:fd:0d:df:
b7:ab:8d:30:37:c9:83:7e:c8:a0:34:3d:9c:c7:6a:3d:bf:13:
88:ae:98:5a:be:a2:a9:b2:84:47:47:00:ff:df:be:06:02:b5:
9c:71:2e:a1:8d:1a:70:89:3e:41:25:b2:1d:30:7b:29:26:12:
c1:a7:41:9b:db:dc:ba:6d:3e:91:57:68:a1:a8:25:40:2f:56:
9b:aa:07:24:fd:a1:29:5c:dd:96:c2:36:90:82:64:99:92:47:
21:77:ff:16:e8:84:74:b3:42:8f:13:24:67:50:53:0d:cd:2d:
26:ea:7f:ec:34:a9:a4:ad:6b:6a:33:55:b2:a0:e6:bc:02:37:
e9:56:65:c8:cf:8c:9b:45:3e:81:1d:6d:ae:77:a3:a7:0f:40:
39:b9:0c:d1:98:3f:f6:0f:5d:19:ee:4a:3a:99:61:84:06:84:
14:2d:d5:26
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:16:21 2025 GMT
Not After : May 31 14:16:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:17:8e:e4:d5:4a:a8:8a:b6:48:ea:f5:6f:72:ad:1a:9d:e8:
02:0b:31:1a:9a:a7:2d:81:d1:29:71:b2:37:9e:ea:92:f4:db:
d2:d0:bc:01:3a:36:69:9b:46:bb:c1:ca:89:aa:0c:71:ac:f6:
42:ed:f6:6f:93:85:1b:ed:ea:d3:8f:77:4b:8f:da:f2:fa:09:
6b:2a:91:13:28:e5:78:50:ef:ec:ff:da:93:fc:3f:df:60:15:
56:1b:e5:fb:28:ea:ed:8c:82:e9:17:4f:d4:4d:5b:97:59:b5:
31:1f:ec:cd:4b:55:48:f4:e3:f4:b6:f2:78:fe:8b:93:ec:ca:
19:1a:b7:d2:9f:fb:5d:4b:fa:7a:69:7f:b9:bd:ac:02:1b:20:
90:28:58:a6:73:f4:32:1c:b3:7d:85:76:54:01:98:c0:f2:35:
bb:81:fa:7f:c5:e8:93:9d:b7:6c:12:0b:96:fc:d4:7f:63:9d:
93:44:01:93:9e:37:4b:18:a0:1e:db:2e:2d:89:f8:f2:5e:80:
e1:58:37:c8:af:53:bc:74:7c:b2:42:c9:bd:2e:4a:7b:f6:b2:
df:ab:33:25:09:5b:ad:33:15:69:0f:b1:30:9f:ea:6c:8a:8e:
69:64:9b:16:74:ac:5e:af:57:b0:96:85:3e:25:08:89:25:9f:
49:84:62:e9
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.46s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
26,630,918 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:49 2025 GMT
Not After : Jun 29 10:59:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:b7:72:30:f2:78:99:b4:21:ba:29:9a:63:a0:
19:9d:f7:db:79:4e:b6:d8:8d:87:46:1b:21:5d:b6:
eb:d7:90:e5:1c:b3:8d:09:df:07:82:74:ff:c3:9d:
e2:33:fe:58:5e:dd:bf:6b:af:4a:a6:65:ee:27:6f:
25:cb:0d:55:58:9c:24:74:ef:07:97:d9:85:15:23:
fb:dd:ea:46:b3:43:0f:49:88:2a:a0:36:ad:cd:45:
29:a0:f5:4a:80:bf:b0:9a:35:37:cc:dc:44:56:10:
a2:ef:a9:83:49:11:64:a2:78:11:92:67:c8:5d:83:
d2:11:57:ed:37:04:a9:d1:83:b8:5c:1d:f4:47:37:
bd:a3:bf:6f:2a:8a:f3:90:13:01:a9:75:a2:1e:c3:
d5:0b:34:f3:0a:78:9c:4a:89:b0:8b:ac:b4:87:87:
31:1b:6f:96:c9:65:7f:77:b5:39:a5:25:c9:fc:92:
21:7c:c6:bc:bb:c7:bc:3c:ee:21:82:f1:21:b1:db:
43:53:7f:2d:14:bb:57:a8:0a:85:0d:61:f3:76:69:
4d:ea:0d:82:ed:72:ba:83:56:d4:bd:91:02:d2:15:
1d:69:f3:75:49:48:0c:49:91:3c:1c:3c:0b:c0:d8:
0a:67:65:21:b5:c2:da:60:7d:d8:54:8e:95:93:8a:
dd:a3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
48:c6:f5:59:ee:80:e4:51:c2:95:de:78:4f:f3:b0:1e:d1:3e:
28:6d:54:d9:db:79:fa:fc:d0:8a:2e:7f:f4:8b:e9:c0:91:82:
b2:86:07:8c:cd:7a:90:05:41:14:fa:18:e2:ca:a7:e3:dc:f7:
a5:53:7d:1f:74:d1:a2:6d:87:c4:12:80:10:d7:9c:d7:aa:64:
42:99:c7:fd:3d:7d:0c:14:f7:e0:5d:9b:8c:4e:88:55:41:c7:
1b:f2:77:16:6b:95:2b:97:89:88:39:55:f9:e3:f5:ef:71:4a:
18:b1:06:dd:4a:18:ee:1a:15:0d:5a:6b:73:30:57:38:6d:62:
37:1e:5f:68:13:69:04:c3:5f:06:b3:12:80:43:26:a7:3a:d5:
25:a6:a5:d8:83:2d:2a:0a:d6:1a:a5:76:dd:1a:a2:59:ba:24:
89:1f:9d:f2:1d:7b:cf:9f:4f:68:4a:1b:a9:f7:24:ec:4d:75:
9d:ae:49:23:39:9c:7b:63:ac:6d:4f:23:dc:13:5b:b7:78:d4:
2e:73:7a:9d:20:e9:75:ff:c0:b3:22:24:c0:d0:32:0f:85:60:
68:55:b7:07:02:4b:2b:35:bd:d7:1c:97:b3:a1:aa:5f:ac:e3:
cd:6f:4d:14:75:02:3b:33:e4:24:fb:31:8d:4f:d0:18:1b:ca:
76:78:d2:ff
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:50 2025 GMT
Not After : May 31 10:59:50 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:b8:72:03:db:0c:a3:45:34:d8:48:ed:03:51:96:e6:4b:9f:
49:93:0f:8a:79:22:20:a2:e8:01:56:6f:df:73:63:43:eb:b0:
09:d9:a1:68:59:37:19:67:64:3d:f0:fd:a4:30:09:37:c9:af:
83:cb:c8:fe:59:41:45:9a:60:f5:b3:42:7a:18:ed:5f:ce:72:
9f:49:8a:e6:88:b4:ab:73:a7:85:ff:7f:f0:9d:c0:7d:f6:9d:
f5:b7:35:91:69:11:41:2a:c7:ce:79:4b:8b:4d:43:93:87:a5:
2b:e8:64:90:d3:98:23:05:ad:a8:73:27:39:d8:5f:d2:e8:39:
30:d9:87:22:d9:4a:ec:0b:68:69:69:35:67:74:a5:b0:fb:da:
4e:8a:cc:ea:a7:1f:78:a8:17:ce:5c:a6:6f:d8:08:ab:1a:28:
17:50:02:30:b2:ac:ac:f6:48:87:1c:54:2b:f3:c4:5e:a3:04:
52:f8:9f:3b:d5:64:ef:d0:31:b2:79:b6:aa:b8:fa:7c:cb:f5:
1e:ea:d4:4c:d3:8f:c7:96:7a:0f:61:99:97:8f:d0:f9:a5:07:
95:7d:7a:12:7a:67:3f:e9:cb:be:cd:6a:90:88:39:8e:42:5e:
1c:09:27:e8:39:92:d1:83:c5:11:65:14:5e:b6:ff:07:ff:28:
fd:d9:ca:4b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.08s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,739,829 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:51 2025 GMT
Not After : Jun 29 11:50:51 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:90:2b:7e:33:f9:bc:5b:d8:2a:d6:e8:dc:b6:
16:f2:e4:fb:67:aa:09:7c:35:a8:8e:52:91:a1:8d:
9d:06:19:9c:ed:8d:36:43:1a:70:bb:e8:d1:57:3a:
70:bf:4f:61:31:64:d6:ae:94:00:15:b6:29:be:da:
a5:cb:dc:6a:61:38:39:99:db:47:10:cd:84:9f:43:
b6:20:2a:75:88:f1:cc:83:14:38:ec:9c:a8:42:72:
70:6b:35:f3:d6:13:74:47:9e:4b:1b:b7:1e:fc:2e:
be:14:fa:83:ae:c3:2f:e0:cc:7d:97:e1:8b:eb:22:
4b:ae:65:a2:90:a7:33:62:70:be:0e:32:ff:af:21:
99:f8:a7:50:4a:45:ac:40:5b:2c:50:0d:1c:d5:56:
78:94:80:2b:c8:20:6d:74:53:51:d3:25:6b:e2:30:
1f:33:cf:b6:65:bb:07:9b:e3:aa:d7:9a:bd:e6:7f:
bb:f4:f2:ca:89:6f:c6:2d:85:46:10:33:57:96:d2:
10:64:51:cd:44:29:73:cb:90:80:31:9d:49:b1:0e:
80:ee:54:fd:db:6b:71:4c:f2:5b:24:5e:36:6e:ae:
b0:04:4f:85:10:0a:ae:63:32:a1:4a:86:53:92:ca:
f1:45:01:fd:2a:cf:75:1b:09:d0:72:b9:d7:c2:60:
74:0d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:d3:c8:d9:3f:e7:da:34:97:81:cf:d5:73:f4:56:43:d7:18:
ce:53:2d:7f:ce:ff:a3:e8:2f:75:76:41:45:08:c0:e8:70:2f:
e7:d7:f7:68:c4:c8:c2:41:8b:19:b2:d9:71:c5:46:bd:2a:8b:
97:35:15:38:43:85:a0:cd:b9:6b:07:8a:d1:3b:d1:be:6c:b6:
f9:55:19:67:52:b3:77:44:2c:61:eb:6a:e7:9f:02:76:3a:03:
63:5e:a5:e3:e2:1b:0f:b9:63:a2:6d:c9:e7:74:b0:63:90:99:
f3:fd:8b:1b:7d:c4:92:ac:9b:89:67:2d:af:c2:d6:4e:56:69:
87:25:34:65:ed:03:9d:c0:a6:43:af:92:0b:dd:05:fa:df:10:
39:d6:2a:f5:19:ce:9a:72:1a:7c:63:b5:3a:2c:92:9a:c0:e9:
70:c0:29:15:3b:07:22:3c:ce:80:ac:50:ec:e7:27:6f:51:41:
e7:a5:a1:bd:50:54:df:42:31:17:34:93:10:16:36:9d:a8:0d:
4d:c0:d8:d9:3f:de:95:e7:f0:31:9d:04:d9:ae:f6:19:43:2d:
54:2a:75:93:9c:b6:2b:69:37:e9:89:c6:6a:80:2e:fc:eb:4d:
1e:3d:0e:e1:24:15:e3:38:96:04:14:83:e4:1a:e7:55:19:b0:
7b:04:2a:c7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:51 2025 GMT
Not After : May 31 11:50:51 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5a:e7:2d:d5:e7:d9:9b:12:f1:ec:db:cb:bc:a1:19:47:17:a6:
01:eb:d5:cc:da:76:d0:28:c1:36:be:b9:a4:b6:81:e6:c5:5f:
1c:5e:36:14:79:bc:22:fa:38:92:9b:97:d3:8b:fa:96:2b:d2:
da:2b:70:24:15:98:cb:ba:26:ff:36:7b:e1:17:28:d0:8f:c5:
bc:32:f0:42:45:60:ba:4d:7e:29:37:d4:06:f9:b9:b2:a5:e5:
28:c8:e9:f7:85:d3:c8:de:e3:e3:fe:41:3a:80:fb:a7:35:1b:
ac:26:1f:16:5a:f1:8f:49:84:22:43:ab:73:19:a5:57:0a:13:
e2:5a:3d:27:5f:50:8f:36:ab:2b:2d:7c:01:f3:4b:77:99:0a:
13:67:d1:b0:7c:b8:8a:4d:f3:17:eb:9f:7d:bd:4a:32:7a:59:
44:ad:d5:16:6a:56:0d:4e:64:78:f2:38:db:61:9d:0f:80:d0:
48:6c:49:1a:8b:2d:17:a6:50:01:69:2d:82:27:d2:cf:55:4c:
fe:dc:f8:98:c4:61:24:c9:aa:06:31:8d:0f:5d:59:23:63:e3:
a4:9d:4b:e2:3b:04:38:a3:11:fd:b9:e8:8c:18:c4:c8:1f:97:
ce:e7:53:4b:d7:3a:55:53:a5:4c:34:97:3a:b8:98:c8:f7:f2:
f4:71:fa:40
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,232,523 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:22:49 2025 GMT
Not After : Jun 29 13:22:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:e0:55:e1:ad:08:e8:77:98:65:59:b5:c7:ef:
bd:27:cd:55:fc:f5:24:66:c1:f4:87:c7:57:f9:08:
b3:5f:7f:67:d3:75:63:2e:47:dd:d0:7e:32:87:53:
4c:ca:f9:36:1f:40:98:5b:73:b1:82:b6:d8:6d:a4:
13:d9:15:99:fa:04:52:64:11:33:d7:02:95:31:68:
2b:26:a9:27:4c:02:43:36:c8:95:42:d9:5d:d5:32:
01:c9:78:04:f7:a6:38:5a:eb:a4:16:91:e6:15:e0:
fd:d1:2a:e1:83:f3:b6:6a:12:3f:45:70:80:fb:d4:
e4:ed:72:dc:d6:ad:e7:e4:cd:00:f8:a5:97:65:22:
42:59:f7:70:17:23:d9:3d:45:e1:39:86:ad:57:b1:
1c:3a:01:d8:55:2b:fc:4b:58:a1:21:91:4e:e1:a6:
73:c0:45:4d:7f:b5:fb:91:dd:ea:06:7a:e5:84:5e:
4b:9f:2c:7e:9c:ab:2c:44:9e:4c:cc:fd:ff:57:ad:
d6:e0:99:6e:fe:0a:2f:7d:91:ba:a6:ba:24:5b:2b:
db:ee:46:a5:03:96:b6:4b:d6:1f:5f:0e:d2:c3:81:
92:77:f3:58:b0:65:35:3c:b4:90:5d:10:71:28:48:
d9:ce:33:9d:a8:07:a7:81:42:36:e9:c8:2b:e6:e6:
d7:e3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
15:8f:36:07:b9:fe:d8:08:09:e4:a4:c1:c7:a6:6f:11:b7:8c:
9f:ed:c6:49:6c:04:c6:6f:e9:fe:7e:7a:79:43:81:0f:87:3b:
59:c6:4f:27:09:3b:91:af:24:35:87:56:7c:26:7a:a0:94:3b:
07:ba:7f:35:ad:b9:e4:2f:e9:eb:92:1b:a3:8a:3d:ce:31:e2:
81:09:24:cd:ec:07:df:b3:96:35:29:a3:16:f0:e2:58:67:a2:
c5:3f:45:4e:9f:01:87:b9:2e:f2:07:e1:22:1a:3c:cc:f1:5b:
da:e8:8a:f8:1b:c8:ca:2c:94:3d:2e:4f:f3:b7:e5:22:8c:f1:
97:70:55:53:d2:63:ed:5a:cf:6a:41:f1:20:4e:d8:20:71:b9:
91:c6:5a:3a:5d:51:e9:c0:10:a7:2b:87:ad:40:b1:e1:f6:fd:
f7:81:ac:93:d1:4c:9e:91:21:60:40:53:7a:17:e2:91:f2:32:
66:7d:a9:42:9e:b5:48:38:79:66:86:cd:f1:94:b3:75:ed:b7:
72:9d:f8:cb:a3:c3:b7:c5:e2:ef:11:ab:8b:2d:bd:ff:c7:9a:
40:c5:f0:80:93:ab:73:f8:cf:2b:03:7f:d3:31:35:60:e1:0a:
ea:70:42:0a:d0:f1:18:e4:2d:af:bb:b0:3b:9f:a6:ac:97:75:
6f:dc:55:c4
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:22:49 2025 GMT
Not After : May 31 13:22:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:ab:ef:81:fc:98:56:98:64:e3:3a:d8:21:b5:c1:9e:b4:c4:
00:aa:d9:c9:10:56:3d:bc:5a:7b:9c:0d:51:d6:ac:a8:27:16:
68:09:db:c1:91:79:fc:96:52:ac:2c:40:e3:fd:e2:64:cb:80:
33:3e:39:86:39:6a:bb:99:82:c2:a3:7d:30:35:cf:1f:86:63:
40:8b:11:49:7d:9d:fe:c8:4c:b3:c7:b0:c0:7f:b1:a2:6c:1c:
45:bd:2c:af:51:21:ce:4a:e0:0b:64:9f:e6:4e:bb:a8:25:50:
ff:ac:3e:79:88:f2:4a:8f:d3:15:6e:40:dd:43:91:8c:e1:5d:
67:d7:04:4f:b1:b2:4f:c5:01:82:26:62:17:b6:62:e4:77:fe:
53:66:33:4b:42:89:7e:ab:54:6c:05:fb:43:35:6c:16:81:1c:
3e:bf:21:86:47:91:35:68:dc:15:c6:a8:c7:9d:87:26:23:02:
11:2d:de:eb:1c:f8:07:3c:d9:79:07:e9:f5:38:fc:33:0d:f5:
dc:32:c2:44:34:0a:6e:3f:c5:20:9a:00:a0:72:b5:a5:ed:cc:
f3:19:ab:f8:a2:83:79:7d:9c:ac:59:7b:79:95:7b:23:99:81:
02:2e:a3:5d:59:85:cc:c4:2b:fa:48:b8:e9:32:26:49:77:8f:
36:c6:4b:9e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.72s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,901,149 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:09:38 2025 GMT
Not After : Jun 29 15:09:38 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:99:ae:9b:92:93:15:93:96:92:12:ff:00:97:d6:
da:3a:07:3e:8b:75:84:b6:3f:a4:8f:52:1c:58:23:
1c:87:49:ee:16:9f:d2:8d:56:1c:a6:76:d1:d3:77:
ee:4f:4d:ab:03:ee:4d:44:b4:dc:e7:8f:bb:bf:91:
0e:2c:d3:db:6f:94:c1:28:07:ad:ff:14:f8:8c:25:
43:c5:0a:aa:ac:80:df:49:cd:75:bb:16:2d:03:a9:
e3:b0:10:b0:3c:2a:f6:f8:84:9c:18:bc:9a:69:42:
3a:f9:fe:c0:d1:db:2a:bc:70:4e:f7:6e:02:11:fb:
83:8e:24:87:cd:e7:ed:2b:ae:59:f0:d2:6d:2d:5f:
ad:58:c8:48:9b:a0:53:c8:53:38:70:73:6a:28:ea:
ed:bd:52:ca:5c:7c:1d:82:63:24:60:e6:98:b6:75:
4d:13:a0:88:4f:81:69:66:f5:37:62:50:79:c4:33:
84:9f:d9:71:70:b6:5f:37:a0:99:6f:d2:44:9c:18:
38:0b:a2:19:4d:89:18:54:58:b0:39:6e:f2:98:6a:
91:2b:0c:17:ae:18:a9:0e:fb:aa:5a:9d:40:4e:42:
cd:ad:6a:f4:a5:28:8b:b5:a1:42:1a:0c:78:b0:20:
9b:a2:06:c1:de:87:19:45:f4:30:eb:c3:90:c7:d5:
80:67
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:67:51:0c:2e:3a:21:0d:55:1c:5a:45:21:04:8d:27:0f:54:
a4:ec:69:50:9a:0f:3a:cc:a8:8d:67:0c:5b:09:71:71:58:d6:
b9:04:bb:24:a9:c1:10:43:cb:b4:03:3c:2b:a7:30:6e:9f:3a:
74:f6:c6:bc:8b:58:59:44:64:21:15:7d:19:05:b8:26:73:8c:
09:00:70:ab:3a:2e:e1:e1:e1:43:ab:e7:7b:b5:fa:69:76:3f:
d7:b1:ed:6a:9d:ee:dd:dc:2b:a5:15:de:05:d6:87:93:17:69:
31:7f:cc:d3:c8:91:3b:ac:4b:9c:75:e9:80:88:6c:2c:9c:6b:
4b:54:c4:0c:ab:28:c5:6a:aa:55:aa:b5:bc:48:2a:bc:b9:e3:
e1:fa:86:86:de:af:9b:9b:3b:7a:6b:28:d0:e1:f3:b7:8c:be:
2d:a8:ef:e5:c9:32:16:a1:e9:b2:3f:a1:9e:d9:b2:09:1f:86:
eb:97:bf:e5:f5:87:d8:3d:c7:21:c7:95:8d:5d:74:37:af:c9:
46:73:38:bd:2d:bb:b6:fe:9e:ba:9f:87:ae:26:d2:88:da:85:
07:89:e2:ab:53:80:13:d7:cd:fb:fc:b4:f5:02:c5:39:ea:1a:
c4:97:4e:4a:77:b2:43:b2:5e:33:fa:00:01:2e:f8:ea:fa:37:
05:87:86:3e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:09:38 2025 GMT
Not After : May 31 15:09:38 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:92:38:e0:ff:29:64:8f:1f:44:d2:39:f1:81:86:81:e1:d5:
fe:d1:db:75:34:44:c6:57:be:62:d3:48:67:c4:a0:03:05:74:
49:fe:27:27:4a:f8:95:3e:f0:ea:ab:c9:96:07:92:42:dc:0a:
bc:11:62:05:70:95:0f:e1:49:05:ec:49:66:72:a3:0e:58:10:
92:34:10:a2:4a:eb:a5:4f:e1:da:4a:2b:f4:b5:5a:7f:bf:bc:
ff:63:bb:e2:68:f0:54:73:90:49:e8:1f:82:fc:f9:ed:ba:ac:
1c:ed:fb:a2:2f:4b:27:a7:0f:6b:e1:82:f8:10:ae:22:ad:95:
c6:31:98:be:af:17:8c:f9:53:4a:28:a9:c9:4a:69:34:41:61:
34:21:4a:a6:65:ed:db:37:50:0f:b3:07:b1:9a:39:3a:d3:fe:
26:e6:0f:e2:9c:6b:aa:83:35:0d:7b:0b:b5:68:4e:bb:c9:3c:
53:65:dd:aa:29:7f:79:e0:50:a7:2c:05:8f:09:4e:b1:08:af:
fd:5f:69:93:51:8b:5b:1c:43:dc:2e:40:a8:c3:47:2f:22:a3:
c8:16:c8:57:49:c1:78:e7:d9:a8:b2:0e:cd:df:2b:ed:c4:14:
71:59:35:fb:57:7b:27:c5:45:1d:c2:a7:fa:47:3b:38:cb:a7:
78:74:32:e7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,416,781 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:05:46 2025 GMT
Not After : Jun 29 15:05:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:8e:63:d5:47:b8:3a:d9:ce:91:7b:96:03:ac:
b1:ec:fe:a4:9b:d7:01:a7:ea:2f:0d:e4:80:1a:42:
1a:96:a2:03:d4:94:92:69:2f:ec:c9:fa:0e:b4:91:
99:45:55:62:92:3d:91:66:ec:b0:95:7d:f5:20:35:
f1:e2:c0:0c:1f:6b:8e:23:73:d8:de:d0:c1:7e:92:
3c:84:e7:d7:53:10:a7:bc:d3:c7:3d:90:a9:d1:b7:
9c:83:46:d5:b1:1c:58:d3:32:d2:7d:66:31:f3:c1:
a4:3a:aa:ad:73:34:e1:ef:7b:aa:56:02:cc:1c:11:
29:23:0d:0b:3e:f1:4c:eb:ba:7d:56:6b:44:79:17:
73:b0:87:fb:cd:7d:88:2e:e2:b7:18:8d:d7:11:b1:
ef:d9:22:ce:78:a2:70:50:70:e0:0e:3a:6f:96:80:
eb:44:64:e8:bb:dc:20:38:fb:27:8f:88:e5:d4:a6:
99:3d:08:eb:19:7d:0e:0c:62:8c:bf:c5:66:c9:0b:
ba:aa:05:93:b2:d9:29:78:e5:29:7e:2f:98:a1:05:
5f:b6:b4:99:bc:4e:c7:0b:8a:49:3b:a7:95:60:82:
66:f0:05:76:37:c6:86:2c:7e:cc:bc:96:02:94:f6:
2e:10:8f:28:37:14:a6:64:6d:76:b5:6a:f0:e5:be:
c9:cd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
76:c5:74:17:7a:8c:c3:8a:04:c1:71:05:c2:e2:b4:46:5f:44:
f7:ec:a0:41:cb:23:15:7d:42:b0:94:27:90:77:f8:e3:bc:a7:
67:69:38:d6:a8:8e:ff:e0:32:d1:9e:59:55:15:ab:b1:46:1c:
04:b7:13:87:ca:fa:d8:0d:75:d4:82:b7:1d:26:c1:5e:a7:d6:
80:f4:c2:4b:e5:35:75:e3:3a:41:57:b2:72:13:8f:e4:87:95:
0b:14:5d:0e:79:b0:49:28:79:2b:ce:4f:a0:9e:91:c3:ef:c3:
24:dc:55:6c:8c:26:6c:9d:c1:1c:d8:cb:b2:dc:5e:c4:e5:34:
9e:4a:3c:0f:bc:99:96:d0:8d:84:3c:d4:da:bf:21:1d:b3:d7:
67:f2:fc:7e:a3:6f:33:e7:43:77:a8:6a:df:2c:a0:bc:94:83:
48:39:13:77:9e:91:3e:a0:5a:4d:71:dd:20:c4:66:46:cf:6e:
b0:1d:c0:21:02:c2:09:bc:7e:1c:06:b2:b3:d3:62:e0:d2:9f:
7c:d0:e2:f5:a3:c7:a6:34:90:79:91:d9:f6:4f:7b:ad:0e:05:
a3:86:c0:87:e3:79:2f:3f:83:7a:4a:11:df:a9:64:08:a2:d6:
58:07:b5:71:17:db:9a:b1:ff:d5:d9:6f:e7:df:4b:ea:86:b7:
cb:98:68:bd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:05:47 2025 GMT
Not After : May 31 15:05:47 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:56:75:45:d6:5b:53:1f:05:26:17:8a:6c:90:77:a9:dc:23:
fa:6d:01:3c:55:57:c6:cb:24:fb:08:10:03:0a:3e:e4:85:65:
9e:1d:41:a3:a4:fd:8e:bf:e5:f2:cb:5d:71:76:c4:7e:a7:90:
8f:25:60:cb:bb:d3:6f:56:3a:6d:32:5e:30:56:5b:b9:21:75:
a8:03:5b:dd:88:9f:0c:2b:9d:91:75:9a:6f:05:d2:20:a6:3a:
60:83:17:6b:fc:e2:b7:25:83:27:c4:90:d0:91:11:d8:8b:d7:
7a:ad:89:0c:91:af:44:75:97:61:0e:49:83:eb:39:aa:f1:8c:
30:9f:b6:cf:09:ad:19:3c:6d:08:82:a7:0e:48:8d:90:db:cd:
8a:8a:a7:0c:66:17:dc:fa:d2:b3:f3:84:b8:38:5c:69:0c:c3:
f4:89:a5:be:f3:7e:4d:69:81:54:6f:73:57:44:19:8e:53:4e:
b5:a8:15:a9:40:27:b7:5f:0b:54:57:b2:7b:7f:79:63:dc:12:
6c:4e:f1:f1:d0:55:f2:de:40:0a:44:19:c4:af:68:a8:78:60:
6f:07:9f:94:2a:12:f4:f7:81:32:ab:cd:b3:bd:11:2e:32:69:
bc:21:18:bb:3b:42:3f:a1:e9:d6:6c:13:3f:5b:3f:44:87:29:
98:90:35:bf
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
Truncated 8000 bytes from beginning
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mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:37:13 2025 GMT
Not After : Jun 29 12:37:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:9f:4d:e2:94:68:8f:c8:98:40:96:91:c7:c8:
f7:c1:66:de:57:52:4d:4f:53:1e:9b:c1:77:8e:83:
41:ca:0a:f9:c2:5c:97:db:12:9d:b8:bc:bc:38:2d:
ea:32:06:f7:50:7b:97:7a:1c:dc:07:1f:f2:e5:31:
23:cb:af:2f:bc:55:e5:76:bd:33:5d:5e:d8:44:f2:
7f:06:54:52:b1:e3:be:e4:e5:1b:68:29:7f:52:86:
3b:0e:00:f5:b1:6e:e0:b9:a5:93:36:38:ce:d2:99:
53:4b:3e:b9:ec:4e:54:52:8f:ff:1f:e5:13:77:36:
29:05:a8:ea:a8:6b:b7:94:8e:a7:00:1a:06:20:3a:
2b:b9:32:96:58:da:af:ad:f7:cc:4a:f9:b9:27:33:
c6:71:a7:1a:d0:e6:74:82:44:f7:ac:6c:9f:9a:56:
09:63:8f:27:3c:d8:0e:46:01:2f:ab:6f:c4:53:31:
1a:16:27:54:cb:d9:03:94:a8:0e:cf:f9:70:29:11:
42:ab:bc:66:1a:c7:92:08:39:ae:76:24:ab:a1:e1:
35:4f:a7:4d:a4:2f:06:b9:3e:62:a3:80:f4:30:69:
66:09:99:12:6a:6f:28:a5:4f:f6:bd:94:37:60:1a:
e0:92:df:26:d3:75:56:e7:45:61:fa:82:3c:b8:e0:
e5:b9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
61:78:e9:37:1f:fa:7b:89:72:30:9b:83:24:5c:26:a8:9e:33:
62:8a:3d:a9:b4:88:34:01:f3:b7:d9:59:b2:4d:cb:10:da:11:
b8:db:ae:7e:a6:13:ac:a5:98:a4:46:d4:c5:2d:0d:3b:85:c2:
66:a4:81:8c:f6:fe:57:19:e9:a9:c6:f8:07:f9:d2:6e:93:cb:
51:d3:96:56:fa:cb:6f:56:41:74:92:c4:db:9e:30:71:3b:46:
fb:87:f2:d5:7f:c9:15:ae:3c:34:1b:e2:2f:10:bb:59:42:52:
fa:50:27:74:c2:a5:af:fd:03:74:9f:dd:40:ad:78:05:43:55:
bd:9d:2e:ae:ca:a5:e1:cc:65:64:0c:5e:ce:85:20:c5:29:3e:
bf:41:d2:81:bd:da:26:0a:06:41:53:86:54:89:8f:31:bb:4a:
d8:33:7f:d3:2f:a1:a1:5d:90:d2:a6:b1:b6:40:49:34:4a:51:
b8:13:b3:3e:fa:2e:a5:fd:4a:ad:14:93:de:0b:84:7a:0d:b0:
ca:45:5c:ac:b0:2b:5a:3f:27:35:4b:33:88:49:93:4d:07:0e:
82:3a:a2:09:9a:77:81:ce:ac:5a:43:e6:e5:e4:87:01:82:47:
4e:af:70:4a:b3:fc:31:4b:7c:72:38:13:5a:19:70:23:a1:f0:
17:a3:04:60
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:37:14 2025 GMT
Not After : May 31 12:37:14 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
15:cd:4d:0c:32:16:97:be:b9:f1:0b:b0:34:0a:d6:0b:0c:c8:
1a:56:e3:25:d1:ec:c7:07:e8:f1:18:ad:54:56:33:13:32:0f:
66:2a:71:e4:4d:20:32:44:ab:52:9f:83:b4:7f:77:8e:9e:6f:
c1:4f:18:ed:e7:ef:59:01:59:8a:1f:22:ec:9a:6e:f4:c8:0f:
de:63:4a:ee:27:32:af:8e:9a:ce:9b:fa:cb:d2:16:7c:c4:6e:
8f:f6:ec:4b:77:a1:df:aa:5e:55:2a:05:af:53:1d:53:1c:e3:
aa:7c:55:b0:81:53:63:fa:74:14:78:ea:85:a1:cf:a5:5e:11:
ba:94:6b:e4:f4:5a:58:82:b3:68:3a:51:8b:a2:aa:2f:50:26:
ea:24:24:87:3c:87:57:69:3b:24:70:a6:16:2f:c7:87:cb:80:
59:6a:e4:cc:30:50:2b:6c:f4:3c:39:05:96:95:d0:45:24:5a:
9a:f4:14:07:03:ed:4b:41:2d:eb:4f:ef:85:ee:4c:c7:91:0d:
4c:6b:85:9f:2e:2f:23:49:b9:e5:31:12:72:7b:d3:f1:04:9e:
79:2c:5d:1e:85:58:00:9b:28:4a:3f:00:9b:e0:4c:cc:aa:77:
15:29:aa:41:c9:3d:bf:b8:0b:e4:74:9f:34:aa:c9:50:13:bf:
bc:c6:96:b1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,283,567 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:21:55 2025 GMT
Not After : Jun 29 14:21:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d6:af:75:b9:5c:e5:a6:b4:38:94:da:4d:e7:31:
d8:55:36:02:dd:8b:e4:da:4a:87:79:b1:5d:ee:19:
c7:a7:37:f9:c5:b5:a3:e0:ff:d5:e0:8e:39:5b:ba:
fa:e0:87:0b:f5:34:8c:fa:f5:43:d1:2c:0b:c7:d3:
9e:84:e6:f7:3d:0a:3e:1e:fd:05:a1:ac:c3:67:d5:
1d:a3:a8:1b:13:75:3e:87:6d:6b:d6:65:26:87:0c:
30:cc:73:54:57:ec:a1:f4:9f:c6:29:56:a4:5c:23:
59:5d:ba:af:1e:9b:60:0a:be:01:b8:77:fc:13:14:
e5:1b:d7:33:2e:49:5b:63:80:47:44:16:9b:e5:e0:
f8:cf:7b:43:84:e2:93:14:79:e0:49:d2:0e:55:50:
5d:b5:c3:dc:29:61:e3:b5:a2:6e:1a:cf:47:5a:85:
5a:84:5e:ed:04:16:a7:39:0c:96:cf:d8:3e:6f:e9:
42:31:c0:91:e1:d3:b9:6c:57:b6:05:3b:40:f3:51:
aa:ee:b5:d6:9f:f8:ce:a5:79:79:0d:bc:c4:e5:2e:
26:01:bf:fa:ee:17:7b:6a:e0:78:0c:02:7f:8d:08:
10:c4:d9:b6:6c:45:05:44:31:46:df:54:0b:54:e1:
b6:2f:a8:fe:bd:ad:5c:f0:8f:78:b4:49:6f:fa:03:
f8:df
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a0:45:26:f7:49:93:f2:81:33:d8:91:2f:e8:e3:c1:7b:06:de:
58:0d:1c:dd:31:34:2a:db:57:51:cc:46:e1:e8:f5:c8:a1:4d:
52:4c:7d:82:c1:dd:9e:93:22:98:eb:19:70:9e:75:77:5d:e5:
a7:6a:8a:3c:10:25:4a:61:8c:e7:dd:12:55:39:5f:17:9e:0c:
9d:30:ad:c5:e4:f1:0e:80:6f:1e:36:04:4e:f0:27:0c:6c:d8:
f1:96:e1:40:d0:8e:e5:b0:a3:b7:a7:0c:86:a1:02:30:db:7c:
69:f0:d3:bd:70:ab:7e:36:9e:07:55:29:4b:a9:e3:01:19:5f:
c7:48:eb:e1:ab:6d:a4:e6:e8:44:38:3d:0a:35:fa:ee:b2:be:
31:07:6a:f6:d5:d0:70:c6:74:27:a1:3b:1f:f8:40:8b:b7:41:
35:ad:1a:c8:81:6b:a9:31:bc:e3:bd:0c:88:2b:97:22:3c:08:
99:86:4f:17:29:1e:e1:bb:15:79:40:62:8c:d0:9e:29:1c:a1:
29:6b:41:5d:b1:43:be:bf:85:9f:00:0f:1d:40:41:d9:39:9a:
d6:e0:fb:e3:d5:02:43:31:ad:f0:52:f1:c9:c2:24:29:d9:20:
f3:65:25:e6:29:e2:70:f1:2c:72:8a:87:e1:b5:25:ba:56:db:
c6:40:9d:20
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:21:56 2025 GMT
Not After : May 31 14:21:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:b3:72:df:51:2c:31:cb:0d:86:94:5d:e1:ea:77:48:a5:77:
76:34:c5:d6:e6:cc:1a:58:b2:df:64:c9:4a:5d:24:0b:bf:96:
f8:c9:b8:43:eb:2e:83:d4:28:92:0c:a5:c4:71:1b:fe:c2:ae:
59:6b:18:76:7e:ae:ad:d0:8c:ca:f5:37:ac:de:17:13:77:b0:
6c:cb:bb:d3:17:85:24:b2:c6:15:20:50:c9:db:4a:93:5e:a1:
06:51:25:1a:df:74:84:8d:74:e9:ed:8c:17:9b:c9:d3:cb:35:
2e:e2:15:88:bb:bf:84:2c:f8:37:c5:06:da:31:64:7d:f9:5e:
5b:92:93:87:2e:ec:be:c1:39:02:cb:23:9a:87:d7:ec:4b:eb:
d5:4a:af:97:b4:de:5f:73:0b:98:c4:29:70:e6:95:ad:12:f2:
5d:78:88:f3:74:57:74:4f:0a:0d:10:0c:8d:02:49:d5:1c:2f:
ba:52:43:9e:a4:09:e5:3a:6e:8a:26:4f:f6:37:ce:cd:bf:94:
fe:60:78:46:85:ef:65:87:4a:62:6b:ae:f4:1f:3b:11:4a:b9:
9d:13:ff:64:64:85:8b:14:6a:d7:96:2e:a5:af:c3:8d:ca:85:
1a:18:a3:82:a0:ed:81:68:79:9b:02:63:46:50:c6:a9:66:41:
b8:83:93:c6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,896,057 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:34:25 2025 GMT
Not After : Jun 29 13:34:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cc:d8:df:e8:82:56:52:3f:4f:74:bf:47:36:75:
61:c2:1f:3b:cd:20:c2:a2:57:e4:c7:2f:64:44:89:
2a:25:0c:28:24:57:c8:d4:ac:c5:23:40:8a:d7:cb:
33:65:30:7d:02:52:6c:cd:72:b6:47:48:91:ad:16:
12:4c:92:53:bc:4c:20:10:fb:77:80:81:d3:e6:1e:
8f:9e:bf:8a:d5:1a:25:60:90:32:31:7c:2c:4d:a0:
b9:03:64:7f:c7:c4:8f:ca:b5:a9:24:75:4e:54:d5:
fe:e1:21:27:61:30:3b:bd:a8:00:93:44:52:8d:bf:
34:3b:a9:72:1e:75:c7:0f:e4:c1:0f:d0:f4:be:12:
ce:ad:89:6a:6f:f9:12:c3:8b:1a:e9:f0:cd:a2:eb:
ec:1a:2b:fa:77:5b:d1:94:5d:76:90:c4:dd:6d:4f:
f2:40:86:9d:b6:bf:e3:49:5c:30:38:a0:d8:64:04:
bf:dd:a4:8f:6d:f9:02:b8:0f:05:78:9c:bc:7a:ec:
14:e2:b2:25:8f:4a:e1:c9:f6:f6:37:8c:51:94:93:
4c:26:4e:37:7b:c8:34:c9:38:68:34:b2:ca:8f:f9:
9d:39:5c:f7:cb:34:31:a6:39:bc:3d:51:83:36:b5:
0f:04:e2:19:89:e3:5c:70:75:c9:c7:ec:7d:80:c4:
89:a5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3d:ed:8f:ea:43:58:e9:9e:5d:d6:ff:5f:98:1c:f0:35:93:ba:
9b:28:fb:25:1c:2b:23:09:b7:a8:7a:ef:e3:c8:7c:4b:90:a4:
e6:bd:59:88:75:60:95:81:b9:6f:96:c4:b0:eb:1e:ab:eb:02:
d6:87:9a:9c:86:fd:cc:4c:cd:f6:bb:b8:67:84:d2:a8:52:83:
e6:e9:bb:ac:f5:63:42:e0:50:20:2d:8c:02:34:fe:95:f2:82:
76:24:4e:8c:e9:60:c3:9d:11:b2:1b:18:e6:d2:d4:63:8d:8a:
04:fd:11:8f:be:6d:00:dd:62:58:c7:52:dd:29:c1:af:56:da:
fe:f5:31:69:5b:9c:35:84:eb:64:66:55:75:77:11:dc:f0:d9:
cd:f0:e6:cd:89:90:b7:bc:6c:2c:a1:7a:d8:22:8b:ce:89:80:
55:17:74:69:b3:73:66:a9:f6:d4:2e:9c:e7:e6:cb:af:e2:6d:
93:20:bd:30:3e:f3:f5:14:80:75:98:30:2f:11:66:7d:b2:98:
44:d1:11:48:f8:74:40:ed:e5:df:36:d1:2b:f6:f1:f4:e8:fa:
03:1d:a7:d6:aa:64:ea:f5:7d:8d:f5:65:fb:30:8a:f4:6d:22:
88:f3:37:84:66:e6:7e:ab:40:69:55:1a:44:62:16:8a:a9:01:
99:97:69:f7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:34:26 2025 GMT
Not After : May 31 13:34:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1b:e4:92:3f:82:93:e7:b0:3d:98:72:04:68:c4:e0:d6:c9:33:
19:c0:19:64:a3:b4:1a:75:3a:86:7b:73:54:7a:af:e3:12:5c:
78:cd:4f:9c:57:55:48:a5:2e:5e:36:57:ab:6a:fa:d4:44:ca:
b6:7b:58:b3:a2:8d:f3:77:d8:c3:84:2a:b9:ab:a0:2b:32:45:
3b:f1:ca:8d:36:ce:1b:58:eb:33:f6:f7:10:ad:4f:f7:39:ce:
fe:18:5b:c4:c1:f6:8f:88:b4:58:7b:60:a9:01:76:73:34:7a:
98:f2:ee:d4:03:d6:c5:76:06:0b:ef:9b:a1:fd:b6:1a:41:88:
c3:87:ee:48:b4:8a:01:e4:a7:75:75:8f:1f:8e:43:41:b0:a3:
a8:cb:35:fa:31:08:cc:9d:da:55:2b:db:a8:46:13:76:44:4d:
26:88:8f:51:e8:99:45:c3:f1:83:1e:92:2f:b5:b4:61:75:ef:
51:85:1f:a2:38:9d:13:64:9c:05:67:4b:31:21:03:6a:89:3a:
1f:da:77:f8:dc:c1:1e:46:75:2f:e5:5d:12:66:6a:4b:4d:37:
89:a0:c8:52:45:a7:d5:e4:6c:fa:e4:f8:28:2d:1a:6e:b6:30:
94:8a:98:51:23:ea:13:ae:a9:e9:a7:cc:7d:02:a6:9a:3b:b8:
fd:5a:d0:f8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.12s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,413,510 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:07 2025 GMT
Not After : Jun 29 11:50:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8a:f2:f8:49:32:e1:1a:6f:ff:61:ac:42:6a:36:
04:0b:0e:8d:d4:80:1c:ba:49:a3:80:41:69:ae:fb:
91:b3:f5:93:eb:dd:59:c1:ed:6d:56:a2:0f:75:05:
99:81:27:00:0c:ab:86:03:ec:26:5c:2e:ef:5e:f2:
ff:f6:2b:7d:43:40:6f:65:05:0f:69:6f:90:fd:36:
b0:27:f1:43:b8:8d:22:72:3f:a3:09:34:db:08:df:
a3:ff:96:ed:1a:05:73:e1:aa:46:2b:a5:08:33:68:
5c:58:5e:f1:e6:be:2d:55:37:35:74:a3:ac:82:b8:
16:62:ba:a4:32:05:06:4d:80:1d:2b:15:61:b5:1a:
80:c1:a3:88:9d:69:48:b0:6c:8c:2b:89:ff:b1:3f:
14:9d:5b:f1:f3:e9:95:00:09:77:42:16:94:16:cd:
de:c6:e7:6b:71:1d:00:53:e7:c8:27:09:4c:30:91:
2a:63:e4:1e:b3:ab:d7:c3:d2:82:80:6f:2a:2d:e8:
28:fc:3e:63:75:32:f6:a7:43:e6:52:77:79:fc:87:
c1:3b:69:65:4b:47:2c:a6:24:41:99:ba:37:bf:7a:
c0:0f:3b:d8:f2:1e:9a:b7:db:07:85:32:b1:a9:5e:
15:e3:6b:aa:1d:f9:2a:ee:71:ab:a3:88:e5:7e:e1:
3a:bd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
12:3d:b1:96:94:5b:43:a9:76:07:f9:a2:c5:f3:78:bb:4e:d8:
77:93:48:97:c3:8a:a3:ca:9a:88:ac:0b:4b:89:63:fc:df:95:
66:b6:f5:a1:48:69:3e:22:dd:2f:08:e5:45:3b:16:f9:bd:8e:
a2:31:2b:9c:d6:8e:d2:8c:e2:39:29:0f:5c:dc:b7:29:5a:67:
f2:85:e3:65:46:21:a8:ca:97:c0:91:36:34:c9:83:a6:f8:92:
95:25:1c:a8:72:97:4b:98:53:25:de:75:64:29:b0:1c:e0:53:
4b:33:a8:b1:80:ed:11:18:a7:07:07:3f:71:88:3e:bf:8f:8e:
e5:61:4d:ad:98:13:00:03:7e:97:69:0e:99:c9:18:4c:64:da:
6c:cb:54:5d:80:df:f4:d6:f0:2a:03:21:0b:3a:ad:9d:89:e4:
92:61:bd:62:b9:be:27:59:fb:75:7a:5c:93:12:83:56:f6:c8:
96:c3:ea:81:88:2e:14:c3:43:e8:10:7e:90:52:fa:13:7a:36:
ee:73:f4:04:57:f9:c5:eb:76:2a:f1:de:46:1e:c5:e9:6a:ce:
1e:bf:f9:b8:8c:0b:64:b1:f7:c4:11:83:74:8e:86:a5:0e:82:
78:52:fe:11:36:5f:ce:49:19:2d:cd:22:47:3f:18:f5:30:8d:
80:f3:9a:bb
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:08 2025 GMT
Not After : May 31 11:50:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
24:56:03:42:17:c8:8b:63:62:b7:dc:ca:29:67:89:d8:7b:e6:
f1:57:4d:5a:3d:79:b8:44:d0:41:60:42:77:62:bb:ee:93:41:
b8:84:6e:44:b1:8f:8a:15:6e:88:2e:a4:90:52:4b:c3:f0:6a:
f0:1f:4d:83:71:9e:d1:b1:82:70:88:10:c1:27:16:4e:08:fe:
f9:53:b4:1b:8b:19:8a:8d:00:24:35:40:46:2c:d8:5f:cb:be:
63:1c:f2:91:03:7f:d3:39:e7:eb:a5:ed:18:62:10:03:dd:f6:
f5:2e:06:7a:57:98:9e:12:25:b3:35:39:55:b7:d7:0b:58:73:
bf:a6:24:fc:88:13:94:25:fe:23:cc:2f:4e:0e:98:d5:e7:ef:
36:a4:b4:8c:09:14:7c:21:be:8b:87:12:61:95:b4:20:3d:66:
08:1a:b3:69:55:2c:6c:33:49:56:51:71:77:3a:29:56:f0:a1:
ef:7f:e9:8f:2d:11:f9:8e:e5:4e:85:6f:4e:a0:1d:7b:fd:e6:
fc:44:32:84:13:f9:4e:d0:7b:2b:9d:09:2f:33:46:a3:fa:1c:
22:75:8e:a4:7a:ef:1e:18:16:f2:31:c1:e7:9b:0b:2a:c3:ba:
3a:c7:73:e8:49:c5:8c:0e:4f:2b:ba:54:7d:41:ff:9e:d4:69:
4a:5e:57:aa
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.72s
Truncated 7935 bytes from beginning
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
3,103,123 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:03 2025 GMT
Not After : Jun 29 10:25:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:aa:d5:49:33:90:d1:d3:fd:6d:43:63:08:99:45:
f5:78:2b:86:f3:b5:8c:79:f4:ab:76:a9:79:cb:1c:
d8:0b:24:8e:55:44:31:1f:45:a5:fa:0e:1f:37:59:
e0:be:c2:15:95:6d:70:60:74:29:62:e6:d7:da:5c:
c9:34:72:a3:50:a2:8c:cd:0c:5c:64:0d:84:c2:c2:
38:e9:06:9f:22:82:f7:a2:83:f8:99:5b:e0:b0:e8:
93:a1:82:72:68:26:5a:ae:28:5b:17:f8:d7:8b:c6:
c0:64:15:f1:05:34:6b:0e:d1:f4:fa:30:b6:71:6a:
c7:c0:ce:37:33:a1:64:87:16:25:fe:4f:3a:db:5f:
57:ce:dd:52:28:7b:04:6c:cb:65:64:b1:94:22:a3:
83:ad:4d:23:d4:39:0a:2b:44:8d:bf:43:cf:a3:76:
59:dd:31:7b:17:5e:6a:e3:37:af:b6:45:84:21:32:
f9:fe:85:9b:20:bf:6a:5c:1c:68:1b:a7:2b:5d:1f:
24:5a:cf:04:c1:ee:a6:eb:61:1c:01:10:5c:92:11:
51:cd:e5:2c:dd:10:c3:09:28:75:c5:ad:bb:74:79:
86:5c:a6:8c:4f:18:51:f6:6b:57:31:90:c8:80:d5:
13:bd:0a:d6:4b:9e:ad:f2:80:5e:82:d8:a6:ea:db:
82:cd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:f7:52:8a:51:74:ec:78:2a:cc:92:52:38:ab:44:e7:b0:6a:
0d:b2:de:c7:00:eb:4e:fe:fd:f5:50:7e:05:f8:4b:53:67:fe:
79:42:ea:20:c8:c1:23:59:13:b3:4f:eb:7f:83:4c:d2:8f:7c:
c7:49:14:b1:ef:b9:bd:42:3e:63:6e:f7:22:4b:98:76:19:bc:
be:f6:bc:49:d8:8a:19:ba:5f:57:7e:2e:73:6c:4f:56:4e:4f:
1b:1d:7c:d8:1f:55:a4:f8:cf:5d:20:27:2c:ca:dd:65:3e:af:
ec:71:ce:23:bf:36:36:1e:64:d4:17:55:85:05:85:5b:ce:ac:
36:6f:3e:b7:a4:d9:09:68:a8:78:e7:bb:6c:21:08:f2:b1:1f:
2c:33:8a:f3:93:bf:01:24:84:bb:c2:87:86:ac:fe:0b:d5:40:
97:b4:91:bc:90:bf:c1:a6:da:3d:08:62:f2:0c:7c:30:b3:d2:
0b:b8:e5:89:e9:75:de:23:0a:c4:76:d1:41:80:6c:da:8b:58:
e0:48:6e:23:7b:a5:10:a3:f4:42:be:a7:ad:9c:c7:3b:09:a1:
95:f1:29:75:70:18:09:72:63:32:96:b2:fd:0a:0c:08:fb:e7:
56:f0:2d:a5:2a:9d:74:69:eb:af:5a:7e:ca:3a:2e:5d:dd:60:
7b:84:4f:ad
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:03 2025 GMT
Not After : May 31 10:25:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
45:4f:c2:f0:dc:3e:33:80:f3:f1:93:29:cc:e6:42:54:d1:ae:
44:75:bd:91:06:a8:8f:02:c2:75:49:8e:ae:0e:96:1c:06:43:
31:a9:0a:1c:07:e3:d4:cf:2d:d3:81:83:fe:da:60:fd:b9:85:
35:6c:98:4b:74:b5:3e:05:66:6c:02:7e:db:07:4f:37:b1:c0:
bf:f6:ca:99:42:0d:fe:33:86:3e:ab:05:a5:e3:61:5b:14:48:
5a:96:84:d0:cc:a0:12:53:11:cf:b4:3e:ba:35:a4:7e:a4:16:
c0:09:d0:e8:16:b2:4d:84:4f:26:14:2a:f6:07:4f:42:86:7e:
0a:d9:81:2a:b7:6d:2a:67:db:64:c4:0f:e9:39:0e:6e:0b:1c:
e7:70:63:0b:e6:5f:27:b8:43:ff:42:fe:d7:70:9f:3b:78:f5:
89:51:a4:94:73:75:96:1a:18:b6:8d:ad:7f:25:2f:1d:35:18:
e9:34:87:2d:a6:da:4c:13:0d:8e:c7:e9:cb:4f:7c:2c:6b:8a:
94:33:83:23:1c:86:63:fa:43:78:eb:e1:5f:4a:c1:a7:34:76:
47:af:e0:b3:97:82:4c:13:3d:08:86:62:42:e7:ca:43:32:aa:
a5:7c:f4:14:26:cb:da:a3:62:27:a5:58:6d:6e:fc:19:9d:ba:
97:82:1e:39
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
Truncated 3059 bytes from beginning
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
2,851,859 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:01 2025 GMT
Not After : Jun 29 10:25:01 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b1:20:e9:c1:e0:16:c0:65:8d:99:a8:5e:8c:fa:
90:df:fd:2c:2a:55:c8:60:bf:b3:dc:2f:f9:85:27:
5f:92:cb:85:ba:cc:cb:f1:5f:02:7c:e3:fa:c4:bb:
ee:fd:0c:d7:00:7f:b6:eb:ea:64:cc:39:0f:a9:92:
80:b6:cd:44:ac:82:10:e8:b8:ff:17:ef:20:e5:7b:
03:ab:a1:75:f2:6c:a8:57:e4:a4:b9:f6:97:33:1e:
2e:d6:24:a2:0e:27:19:2d:2f:29:5e:b6:7b:c3:5e:
08:17:84:08:a8:7e:81:ce:00:d0:dc:95:e3:26:1b:
4d:8f:d6:ac:fe:83:de:51:f8:dd:d5:78:11:bb:15:
0b:71:93:fd:5d:70:46:a7:4d:ea:39:b4:2d:c8:1d:
cb:93:ae:d0:9a:d0:f6:80:bb:a3:99:49:73:93:69:
37:ee:21:81:86:bf:86:25:6c:70:49:c2:90:36:4a:
08:86:50:32:27:08:23:f5:7b:15:f4:23:a6:08:35:
e4:ac:03:eb:bb:5e:af:9e:6f:1d:28:24:d5:a0:af:
36:60:1b:62:16:b7:01:19:18:3d:a0:2f:e0:18:db:
b5:d9:6f:81:8e:ac:c1:f1:2c:e7:9a:af:dc:b1:3e:
f2:62:da:de:d1:fe:a6:48:45:26:89:d6:fb:3c:a8:
d3:79
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
aa:5a:6c:d4:f1:ef:e9:94:33:78:5e:db:ce:fd:35:b8:97:f1:
5a:19:38:39:4a:f5:56:dd:47:d4:58:c2:c9:4f:ec:25:1a:72:
dd:18:48:2d:89:ec:84:66:a9:86:8c:e8:61:1e:bb:cf:d9:cc:
73:f7:f5:5b:78:d0:97:19:35:48:4b:b6:9b:a7:6d:4a:cb:6f:
96:d4:08:e8:a0:d6:e2:d4:35:28:ab:31:79:f1:d8:a1:f0:60:
1d:d0:0e:9b:04:e0:27:80:94:0e:50:53:1f:7d:2d:d2:2a:53:
04:04:24:25:95:2b:09:33:4b:6e:09:87:00:2f:94:fb:d2:c4:
68:2a:fb:8c:34:29:2e:67:1a:a0:14:ae:87:8f:8c:e3:a2:c2:
b1:3c:71:45:05:b0:95:a2:da:07:df:04:7b:7e:8c:33:11:98:
d2:12:66:26:d4:f5:f5:e3:64:76:68:b3:56:d1:d4:89:94:42:
5f:36:d7:c3:aa:4e:65:3f:7e:e1:32:81:dd:f7:d3:90:e8:a3:
4d:50:05:7f:8b:b6:01:87:b5:4c:38:19:b8:b1:51:37:89:c5:
61:0a:95:2e:3b:a4:65:06:8e:70:7f:82:f6:32:33:54:f4:c6:
b4:8a:01:de:a0:a3:b4:b8:86:e8:15:87:e8:4d:88:bb:a7:3a:
7f:48:21:37
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:01 2025 GMT
Not After : May 31 10:25:01 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
74:e7:fa:de:ad:9f:9b:8c:2a:80:3f:d8:fc:8b:33:8d:81:2b:
5f:64:84:75:bb:5a:ab:ec:0f:61:8a:61:d9:08:66:1c:75:5c:
c6:02:1a:0a:66:29:bf:fc:e5:50:63:40:c9:99:98:9e:ee:33:
78:6a:af:99:b8:3e:f4:5a:ca:aa:db:16:65:54:17:22:1b:a3:
34:95:2f:d6:84:c9:9f:a8:51:ef:59:12:e6:9b:f2:07:5c:9d:
52:1a:7c:e5:5f:9a:91:61:6b:8f:66:34:9a:e0:e9:d7:e8:90:
d2:98:7a:e6:5e:4b:17:28:87:6f:f8:3f:0f:c0:19:2b:0b:78:
3e:f4:d2:48:e2:64:97:41:83:d5:32:d9:d2:29:82:92:e8:c2:
23:33:31:40:ab:ca:1d:8f:6b:20:2b:42:e2:37:71:85:08:4f:
29:74:e6:2b:7d:68:2f:dd:f1:2c:cb:63:30:94:2a:9a:37:d6:
3b:36:41:c7:ad:8d:98:4c:16:67:f7:74:b8:d0:f9:4b:3d:eb:
72:4a:a3:d1:1a:7f:d7:c2:34:e0:f5:28:39:ce:ba:f5:0c:3d:
a3:74:cf:a7:b1:15:69:2a:d4:1a:85:f6:7d:bd:98:ac:7e:10:
fa:0e:4b:3f:65:56:e4:89:10:5f:a1:9b:2e:8f:da:09:cc:98:
32:07:4a:39
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
Truncated 7935 bytes from beginning
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
3,102,074 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:23 2025 GMT
Not After : Jun 29 10:25:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b3:e4:6b:a0:34:0f:30:31:18:45:b0:3c:17:c9:
8d:79:63:b5:35:22:31:72:28:59:78:f7:70:69:dd:
7f:80:03:49:76:5f:3b:c7:8d:5f:be:f3:2a:dc:f7:
7f:13:a7:b1:cd:9a:70:2f:79:f3:6d:21:2e:33:c6:
e8:08:15:82:db:6f:21:32:a5:2f:5a:ed:db:39:95:
8c:e2:53:31:17:57:d8:66:42:96:99:a2:b0:b3:40:
e6:b8:22:9f:df:a5:1a:e2:c3:1f:83:6e:2f:93:d3:
a8:03:52:04:d9:ed:70:b1:21:a7:2d:5a:22:40:b3:
51:b2:31:c5:d8:9c:7e:8a:cc:70:db:a6:1c:70:22:
3a:fa:9c:cf:c7:a8:8d:e7:7d:f6:d3:18:f6:c3:a3:
5a:f2:a0:3c:df:55:e4:6d:0b:9b:d5:13:5c:ce:58:
fd:1b:41:13:61:77:d5:8c:b9:04:8f:17:ae:89:6c:
2c:54:6a:f1:97:9e:35:dd:08:ef:57:b5:65:47:20:
d0:bf:39:5b:eb:99:1f:47:ff:4a:16:79:7b:0d:81:
48:3d:59:c7:52:cf:2f:0e:f1:8f:18:e3:70:b7:a0:
07:d9:ef:6e:7d:42:47:3b:7e:7c:e9:78:de:89:55:
4f:82:51:73:93:a6:d7:a7:2c:e1:56:98:b7:17:6c:
6b:f5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:1b:10:96:4f:3a:d4:41:02:b4:d8:e3:41:d2:ef:6a:8f:15:
a8:4b:00:4a:ce:1e:4b:e7:99:6d:08:3b:02:aa:e8:96:2d:84:
04:83:c3:e2:35:95:c3:8d:29:f3:76:66:6a:73:05:c2:0d:60:
4f:de:ad:ad:32:81:71:46:aa:08:d3:88:97:ba:3f:82:c3:ce:
04:0c:5e:ac:13:4f:06:31:c3:44:eb:79:a1:c0:3b:76:19:d9:
ad:99:b0:0a:56:35:8a:3c:12:9c:1f:39:01:dd:74:bc:d6:80:
6e:32:d9:6b:ad:94:dc:9a:e7:06:b0:fd:a4:02:6d:18:91:7a:
cd:be:42:ae:27:d6:c4:77:19:e8:62:97:ac:73:da:ba:77:d6:
44:ca:93:7b:0a:68:c3:ed:33:f9:d1:76:93:4f:b0:74:a0:4d:
62:71:9d:0f:87:9e:16:41:ad:49:79:ec:0b:88:7d:32:b8:f3:
f3:1e:2c:a5:26:60:b5:48:10:88:5a:7e:8d:85:6b:7a:4f:12:
78:c7:7f:60:27:a3:2a:7a:92:21:c7:34:8d:da:37:53:86:5a:
f2:79:54:d9:fd:2f:c1:57:27:50:bc:5b:d4:a3:e1:4e:2d:ed:
9d:af:84:db:f7:26:84:02:7f:e8:b7:3f:5f:24:2c:bd:95:57:
5b:6f:69:9a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:24 2025 GMT
Not After : May 31 10:25:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ac:0a:bd:84:30:03:76:e7:44:ef:23:c7:c9:07:d3:a4:c0:29:
fc:1f:d7:42:b5:4f:0c:58:8d:3e:97:f4:4f:84:9e:09:03:69:
ca:78:ec:6e:4a:61:09:ae:b4:ce:1d:56:ce:9f:a6:da:19:d8:
85:78:a5:3a:90:57:d1:b0:e9:37:4a:f8:cf:53:f9:21:70:9c:
c8:40:48:73:f9:50:2a:8d:31:a3:38:36:cd:f1:00:de:37:99:
71:51:a1:28:eb:d6:cd:73:7a:60:e9:36:78:44:06:70:17:fb:
fb:8b:59:fa:70:6b:e6:e7:00:b6:96:71:50:7c:d7:31:11:fa:
08:54:b1:8a:ac:d0:0c:8d:fc:81:e7:a9:af:3a:d7:b9:d4:5f:
d4:04:b6:5d:a6:a7:ea:4b:bb:1b:8b:d7:17:a3:0f:b4:05:ed:
bd:25:bc:f5:f6:92:0d:a9:ff:75:7c:3c:b6:d8:62:da:68:ad:
0f:7e:4f:ad:46:74:f2:73:74:6f:77:9a:48:27:ac:21:db:5a:
84:19:89:59:ac:a5:87:2c:f1:a3:10:19:8c:e0:86:6f:42:b0:
99:c6:03:29:5b:a3:f1:40:6a:99:4e:a3:2f:4f:91:56:b3:04:
7c:57:79:56:75:48:35:9f:52:95:2e:30:c1:cc:eb:12:4b:f9:
4f:0c:30:f3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,852,624 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:13 2025 GMT
Not After : Jun 29 10:25:13 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:df:74:b7:ca:61:d3:ab:7e:b2:10:0a:27:98:fe:
ea:b4:2f:d9:e1:fa:83:be:29:db:50:ee:42:fc:be:
36:a2:fa:c6:77:e4:cf:61:66:35:07:aa:f4:4f:43:
07:8e:2d:57:44:95:f7:9f:86:9a:67:ec:83:65:3e:
0d:51:17:8e:11:e6:1e:e3:96:8d:3d:48:85:50:7f:
af:aa:45:c7:43:b9:cc:37:72:54:30:ed:31:ab:f0:
70:b1:b9:5d:1b:e3:c5:f2:27:2b:07:54:51:61:f4:
53:6e:07:4d:14:ff:d3:83:a2:76:13:c0:32:48:dd:
38:27:4f:d1:cf:38:c7:3c:8b:73:87:b7:b0:0a:8f:
52:eb:04:a7:e4:77:24:a0:ab:1c:39:d4:b6:f9:92:
97:63:ec:f0:28:4f:6e:53:aa:bf:72:6b:a8:7e:4d:
80:a6:82:5d:aa:94:5e:59:f7:de:96:b9:35:0b:c4:
d3:50:d5:5c:88:40:4f:b6:f8:80:d8:8e:c7:f7:5d:
3d:08:6c:b3:9c:79:18:92:a2:d4:6b:76:3e:40:9b:
ae:63:eb:5c:2b:90:29:99:e1:7a:6c:fd:d2:d0:b3:
11:3c:6c:f3:41:c4:97:2d:1d:92:7c:c2:40:1a:37:
cd:b9:4c:17:c7:3b:5b:fa:48:9d:d1:53:cd:58:11:
af:3d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:ea:a3:25:40:75:79:4b:5b:1e:8e:10:b0:51:f1:52:70:d5:
7d:a6:db:0d:08:f2:9e:15:81:6b:8c:f5:0e:46:06:dc:f7:44:
47:c4:99:4c:c4:fd:ec:3e:51:63:c5:11:29:cc:f3:ce:54:26:
60:1c:04:65:9a:29:76:34:54:38:3c:2b:d3:eb:29:f6:65:a6:
8c:a1:9f:68:9d:31:c1:6a:7c:c5:d6:42:53:41:3d:3f:65:80:
08:58:92:97:72:49:5f:65:6e:8d:ae:68:f8:d7:6d:04:f2:72:
ba:46:17:85:f8:21:1b:61:a8:92:8f:dc:c0:a7:1c:08:53:91:
53:0b:94:15:ef:e4:e9:04:e5:fc:d8:0b:a3:04:a6:21:f2:e1:
ba:98:94:01:d2:77:55:7b:75:3f:dd:bf:ed:ea:a6:95:da:6e:
54:2f:af:0b:61:8f:60:d4:b5:06:40:7e:95:c9:5c:b1:6a:61:
de:d5:92:fe:42:20:4c:ec:12:d2:c2:f7:96:e4:39:dd:51:9e:
9a:3b:7c:d5:b2:4f:b8:4b:25:e4:65:c2:f8:f3:22:03:44:f1:
58:e5:55:cd:ef:b1:11:da:11:ea:15:dd:71:fe:1c:2b:c2:e8:
01:21:39:7c:04:52:26:0e:eb:1a:f2:e8:b8:27:20:9a:58:b4:
8e:2a:5d:aa
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:13 2025 GMT
Not After : May 31 10:25:13 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d2:81:48:9b:98:58:24:38:d1:23:64:a6:64:4f:d2:73:56:b4:
90:45:89:68:7b:03:a0:e9:97:bd:ba:b3:d9:07:fd:2e:cd:d7:
4a:9b:6d:17:d3:92:da:c4:c9:12:92:c4:96:71:ca:71:af:56:
04:e0:81:2e:94:9e:b9:f4:dc:5a:71:84:4c:cf:cf:1b:35:94:
8a:1c:c1:0d:af:1c:49:f6:d4:4c:a7:79:18:f4:ea:d2:a7:3c:
55:78:0e:1a:8c:17:82:a9:7f:16:fe:f2:03:53:23:b8:49:a8:
4e:cf:44:34:0d:37:65:2f:01:4e:53:37:c2:3c:b1:b5:c1:85:
0a:5e:37:61:61:bb:61:3b:68:3b:18:6b:fb:75:11:2d:84:6a:
17:32:a9:e1:e6:11:7b:1b:1f:7d:7c:3a:32:42:cc:52:b8:7d:
f4:2a:bc:c7:a0:42:50:45:31:10:87:af:bd:57:f3:13:88:92:
69:ec:4f:ec:ad:ad:46:2d:87:57:1f:08:fa:cb:99:44:a6:74:
d6:5f:9b:0c:64:3e:e9:bc:92:4d:cc:20:89:51:90:e1:bb:ea:
65:dc:85:ce:94:46:52:aa:e3:29:37:7d:81:5e:0f:b6:df:6b:
83:4d:fe:c8:f3:05:ad:f1:46:c8:91:34:9a:7c:00:4b:5a:2e:
15:f0:d1:58
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,103,885 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:06 2025 GMT
Not After : Jun 29 10:25:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d9:21:cc:9d:8f:08:56:15:a5:f2:c7:b1:44:1f:
e2:d4:0d:4e:5a:1a:dd:cb:a2:a5:4a:f9:28:35:3e:
3e:38:08:c4:5b:f1:49:e5:0e:80:17:80:73:63:62:
a9:b8:a1:9d:5f:75:8b:90:48:f9:6a:0d:d2:8f:6d:
4f:db:7f:18:a0:4f:66:5c:05:de:38:5a:09:62:67:
60:db:4c:d6:a1:1b:a5:d6:b7:64:6d:a1:f0:c5:ff:
ce:f9:4c:29:0e:76:eb:a6:a6:48:86:0d:5a:6b:06:
77:eb:3d:67:98:1b:be:35:c5:9f:a1:e1:97:c0:db:
9e:65:63:da:c0:77:c1:d3:10:df:86:da:35:da:79:
9e:64:6e:0b:c8:8f:8d:ed:45:dc:94:fe:f3:90:c0:
cc:9a:ec:29:0d:0a:9f:57:ad:9e:c9:ad:e3:77:4c:
69:3b:31:60:82:35:f8:f0:af:ee:41:3f:32:f8:3c:
e8:42:0c:a1:d2:bf:1b:f7:2b:ea:d9:37:ef:fc:89:
fc:18:ae:4b:f8:68:58:66:fc:70:5d:d6:2c:59:a1:
50:93:0f:49:27:0c:23:53:b1:22:08:27:72:67:8d:
b1:42:8e:e5:a0:c7:42:80:d6:26:5d:73:84:6e:b9:
3c:86:1c:6a:87:e0:03:a8:e5:8a:0b:9d:f1:c1:76:
0f:5f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c2:ae:05:f5:e2:67:a7:32:3f:0e:72:50:f6:e9:c9:4b:af:48:
64:f1:d3:87:ac:00:bd:f8:31:7b:52:ab:df:bb:0f:c5:2c:33:
dc:89:f3:cd:00:fb:50:32:51:1e:9e:0e:2e:0e:d8:c4:68:ba:
22:54:22:e6:9a:70:c1:c6:62:74:a3:c0:02:7b:a4:c4:95:5e:
dd:b0:60:0b:57:bc:d3:a2:48:38:8c:32:65:fc:2f:9b:6e:b7:
ca:d3:48:9d:24:e0:6d:b0:5a:f0:47:82:05:cd:bb:6d:a6:cc:
f3:58:a3:6e:2f:6c:28:bf:ed:3a:f4:1e:98:4d:34:cc:ae:eb:
fd:65:47:bb:7d:0c:a8:32:9b:45:b3:94:9e:77:bd:53:d6:94:
3d:34:6e:37:3e:d3:11:b5:76:af:e1:8c:17:dc:74:bf:67:ce:
41:e1:ae:13:30:ed:eb:ef:1c:36:fe:05:90:90:2e:b1:d3:74:
6c:6d:60:fe:c0:a4:f2:96:54:4d:88:e4:41:71:3c:aa:49:b7:
7a:6a:00:a8:12:12:46:79:ab:69:b3:31:2a:9c:21:9f:7e:cb:
76:68:33:08:4e:4b:b8:a1:c5:54:c0:69:4b:5f:8c:e0:33:24:
ca:f9:ba:a5:33:15:b6:60:66:f4:8c:07:fc:d2:ba:3c:84:c3:
86:78:09:ce
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:06 2025 GMT
Not After : May 31 10:25:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4f:b0:f0:bb:97:7b:18:97:c0:0e:50:e3:d2:8a:cc:cb:07:98:
22:f9:08:d8:3b:1e:5b:a3:fb:1e:70:6a:57:81:9a:9f:53:3d:
b7:e5:fe:4c:e1:a2:96:d8:d0:95:ef:07:18:18:09:9a:c6:39:
e7:28:9d:45:1c:39:9f:83:21:da:2a:e8:b5:29:48:c9:82:62:
ab:f8:3d:9f:42:51:c2:85:02:58:ac:45:f1:13:c1:a4:03:c3:
96:b6:f7:d3:a6:8e:bd:90:ef:02:22:d4:85:65:3d:0a:28:bf:
ad:5c:8f:0f:06:85:98:31:50:6d:ae:ec:2c:d9:4f:a8:b9:af:
8a:51:a7:45:6a:de:a8:7c:cf:26:8e:0f:52:cb:cd:6e:f4:f5:
86:c4:15:0b:7f:58:81:f1:d9:66:ac:1f:c1:2d:ca:3a:e7:9d:
af:3e:f6:e2:0f:46:71:e8:28:c1:88:fa:ab:38:0d:db:96:c6:
6f:2e:28:11:38:aa:b2:48:a8:91:8c:25:91:67:d7:7d:6c:13:
ac:de:27:31:18:ba:3f:9d:49:a5:25:8f:46:90:91:f6:b3:2b:
ca:e4:46:90:7b:ea:69:c1:5f:a6:23:cf:c0:fe:8d:6d:16:c5:
52:32:d5:87:83:e9:f4:59:fa:30:1c:4d:6c:03:cc:3a:86:85:
2f:d7:38:78
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
Truncated 3059 bytes from beginning
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
2,853,547 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:11 2025 GMT
Not After : Jun 29 10:25:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:86:57:03:18:82:f1:ab:43:2e:fa:28:6b:f0:
04:9b:a8:80:ef:d1:8e:aa:9c:5c:a2:c3:af:08:35:
33:90:6b:ee:32:fe:5c:e6:3e:21:aa:ee:20:cf:97:
a2:31:47:ec:c8:2a:c5:89:7c:8a:11:82:d9:be:ef:
19:2c:86:94:e3:ca:bb:cb:05:f7:36:bd:92:10:c2:
2f:76:c7:0b:de:af:4d:44:38:21:13:e3:86:ea:5a:
be:71:17:6b:82:65:72:71:c9:93:d7:83:fe:b8:6b:
19:50:d3:07:b4:08:e8:ea:d1:5e:99:4b:fc:2a:2e:
bb:bd:95:ea:8f:9b:5e:3b:34:70:97:9e:8e:d1:c8:
23:e8:b1:1d:b2:9c:be:e5:89:a5:17:1d:2f:91:f3:
c4:ea:db:0e:30:c0:62:cc:b0:6e:68:ea:0f:20:46:
61:d1:d1:da:d0:fe:a0:9a:7b:1f:f6:d0:ac:57:dd:
f5:13:e8:24:16:f8:04:ee:37:f6:7e:b4:7e:cf:6f:
a4:de:8c:38:73:4c:89:5d:71:89:0d:14:ee:3b:50:
0c:47:5b:9e:f5:9c:c5:d9:39:ee:60:e7:29:15:f2:
ef:82:fb:f0:28:3d:28:fe:97:68:cb:a0:52:f1:34:
92:b8:f8:84:45:ab:dd:80:ae:30:e0:0d:7e:5f:23:
7a:71
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:1d:a4:c0:ee:4e:3d:ac:eb:95:12:b4:5b:f8:8d:06:78:a0:
cb:63:95:b3:0a:a3:81:f3:47:7e:ba:2c:5b:c0:71:59:75:6e:
e8:de:d3:be:7b:b5:6f:12:d1:69:ef:a1:11:9d:a4:b1:7f:76:
6b:f3:13:b8:a0:2d:75:1e:06:b7:6c:8b:a7:1e:95:f3:9c:5f:
66:8a:9f:01:bc:c3:61:0d:84:43:f4:69:69:81:15:85:f5:1a:
14:16:9d:e5:38:d9:5d:18:b7:7e:b1:7e:0a:0a:70:cc:1f:19:
3d:7c:f6:83:e0:e8:fb:e4:92:e1:ab:12:c9:e5:0c:79:be:bc:
cb:64:bc:ff:3f:5c:5c:a2:df:8e:94:0d:a2:aa:1a:61:10:2b:
a4:33:8e:9a:3f:d6:1d:8a:52:c9:4b:67:73:63:c6:b7:c4:6b:
63:eb:be:70:8e:a6:bf:16:8b:7a:b8:c0:fd:67:61:90:71:dc:
db:4f:17:9a:aa:14:93:6c:42:3e:c6:a9:e0:fc:56:71:c0:5c:
d9:d7:b5:b6:44:1d:43:ad:c2:dc:f6:0c:32:7f:aa:38:1e:10:
32:f8:7e:93:f6:30:e0:1f:50:01:ab:32:89:67:ed:8a:c4:4a:
20:a1:5d:55:d3:e1:c0:db:96:42:c0:d4:d2:d7:04:53:1e:00:
ea:79:ff:38
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:11 2025 GMT
Not After : May 31 10:25:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2a:f7:20:7c:ed:dc:30:01:db:e2:b4:c3:aa:c7:e2:d3:44:67:
af:61:17:18:8c:27:e4:2a:bc:ba:a2:65:05:f8:00:5b:5a:a1:
14:57:ff:55:ae:48:f9:31:7c:cc:2d:95:20:6f:8e:fc:4d:67:
b0:b4:48:97:de:da:2c:cf:08:59:a1:8d:87:15:48:56:05:63:
a4:f9:74:07:43:b8:38:0e:8e:50:16:bb:b3:4d:88:25:70:9d:
8f:c8:8a:5c:3e:27:69:3b:8c:38:ac:39:14:57:55:e2:83:f4:
b2:d6:01:1d:8a:75:0a:42:96:cd:89:d2:21:7e:b0:2e:3a:76:
27:93:ff:48:0a:a1:1d:47:a8:1d:08:09:92:96:19:99:96:a0:
c5:82:f3:3d:6b:5a:b4:f6:b7:13:c2:2c:59:2d:27:1f:65:0d:
3e:45:7d:ed:14:a5:65:6f:cb:01:fd:72:21:a0:79:f4:58:c0:
ec:ff:a2:5f:a8:a1:fc:71:23:9d:e2:a2:c2:a2:ff:50:1f:52:
dc:ba:dc:e6:88:34:26:1f:76:e5:ad:7b:44:0b:ae:4b:79:9d:
aa:f2:4b:25:fb:62:56:52:a7:f5:77:d4:d3:4c:9a:32:de:69:
c5:30:2a:bb:92:e5:67:1e:b2:7e:fb:86:be:35:54:e2:09:73:
8f:9b:49:ec
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 7935 bytes from beginning
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
3,102,182 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:09 2025 GMT
Not After : Jun 29 10:25:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:23:d2:7c:6e:22:0e:9e:8d:3b:4b:58:e9:ac:
c2:45:8d:ee:24:aa:89:fc:75:49:8a:ac:b2:5c:62:
5f:9a:bc:0c:01:19:21:39:70:2e:3e:54:ce:96:fb:
86:f7:1b:c2:26:f3:1f:ce:8d:2d:d2:de:cd:37:e0:
d2:42:a1:c6:cd:af:d6:9d:3b:96:80:81:ba:a3:bd:
ce:4b:2f:f6:12:28:fe:1b:cc:90:fd:4f:c6:98:2b:
47:f4:97:77:3b:13:be:a2:fc:1f:8f:c9:9b:bb:6c:
ff:d6:a1:93:c7:a3:74:9d:68:26:8f:ae:e1:38:c6:
42:2c:fb:4c:4c:7a:70:06:fb:59:5e:9c:80:3e:11:
57:22:e9:9f:82:16:aa:80:4d:72:08:d1:e3:f8:03:
d8:d2:7a:eb:2a:65:b6:85:6d:45:da:a0:52:55:83:
8a:07:48:ac:0c:9f:cc:9c:5b:3f:b2:fb:91:db:8c:
be:19:c5:62:7b:92:5d:ae:5c:a6:ca:c7:9b:f9:1f:
2f:b6:95:e7:d7:ee:a3:50:e3:30:02:44:56:24:55:
20:94:67:a2:a0:26:43:74:20:a9:cb:6c:d8:79:98:
f3:28:97:48:cf:65:57:dc:ce:a8:4b:53:3e:67:3b:
91:1b:09:43:d8:1e:36:fc:06:75:61:a6:e5:8e:23:
17:49
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:20:77:5b:6a:bc:ad:56:bd:11:f8:3a:a9:ef:b9:ff:1d:9b:
cf:2e:ee:7e:9d:fa:23:6d:14:74:5e:1e:fe:c9:0b:86:03:7a:
f4:29:27:0b:03:10:d2:59:2c:36:36:61:c2:a8:8e:cf:ec:1e:
d7:b9:4a:2a:25:1b:63:9e:7b:cb:3c:85:c8:c5:03:04:fe:6e:
6d:d8:94:79:a9:65:84:8d:cf:7e:f0:bc:8c:1b:65:5c:1f:f9:
1d:1f:0f:8b:9d:77:3e:ae:87:68:c1:f7:74:35:ab:54:23:a6:
29:52:a2:55:28:2d:1e:30:9d:4b:8e:13:01:0b:8c:cc:14:20:
d5:bd:c0:f0:bc:2c:02:e8:4b:f6:bc:01:d3:8d:1e:c2:d1:9d:
bc:d8:c8:07:59:ba:27:7d:c2:50:50:1d:28:6b:9f:10:0e:c9:
6d:89:f6:4c:46:1a:63:09:98:d9:a9:56:4d:7d:18:59:62:7a:
5e:37:70:04:44:7b:05:d4:35:67:4b:d9:fc:ac:6d:f1:ef:81:
54:3d:b7:26:1f:a4:7f:a9:db:7b:2a:7d:8a:a0:09:53:5e:ae:
3d:66:c7:05:06:e8:d5:dc:87:f3:35:9d:95:55:06:69:62:1d:
99:95:13:8a:88:ae:53:c6:bd:52:21:29:a4:c0:50:ca:ef:6b:
db:3d:d6:19
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:09 2025 GMT
Not After : May 31 10:25:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9c:66:97:89:45:f1:01:24:f5:96:1b:b9:ef:4f:b9:e5:53:c2:
70:e6:07:72:dc:f1:c2:35:ec:e5:dd:16:42:b5:a7:0f:cd:e2:
46:79:86:7b:ef:13:ae:2c:df:e8:0e:96:1d:78:2e:d1:ab:dd:
8e:2d:ce:26:da:61:74:07:24:a6:f6:d8:23:88:7e:f7:c6:1e:
25:5c:68:55:79:c6:7a:27:b5:6e:a9:26:da:bc:85:cf:65:a7:
4e:85:a7:75:3f:b2:6e:44:47:b8:7f:83:7c:25:61:f9:4a:5e:
01:7d:14:8c:13:36:13:31:6b:61:3a:f8:de:b5:d0:90:8e:1f:
17:62:1c:08:b9:3b:65:9b:9c:3a:32:ac:63:db:0c:5f:0b:dd:
e3:41:dc:d6:9d:df:c8:dc:37:8a:6e:8f:dd:f2:8f:85:c8:c9:
ae:dc:a0:16:7b:36:bd:64:72:b9:b5:bb:8a:94:fd:2d:a0:a8:
ca:09:c4:1e:bb:02:f3:ca:4c:67:4b:ff:e8:f4:bf:ef:78:e6:
00:d0:76:31:5d:80:14:c5:43:de:b7:eb:bc:2a:09:db:76:c7:
22:32:24:06:a4:88:87:80:cc:7c:c9:18:da:b2:f1:d0:f7:08:
4a:41:46:ab:98:4f:ea:95:bd:11:5b:c9:21:44:06:4b:07:57:
0b:72:46:93
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
Truncated 3059 bytes from beginning
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
2,851,094 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:01 2025 GMT
Not After : Jun 29 10:25:01 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:da:b5:0e:51:93:f6:c5:83:57:3c:06:cf:35:98:
a1:88:5e:36:9d:f3:54:a9:a1:d7:7f:90:a0:4c:ae:
ee:30:1d:fc:64:74:fa:02:90:94:ae:a6:79:76:35:
0c:37:7a:2f:38:ee:04:c7:9e:98:6a:1d:9b:b4:fd:
aa:6f:6e:7c:92:5c:a8:f7:dc:ba:c3:57:e2:8a:79:
6a:2a:7f:55:ab:01:26:8b:04:e4:c3:a7:fc:b1:29:
a3:0a:2b:37:7a:39:de:24:e5:f1:32:d5:61:93:32:
3c:7e:19:5f:d7:f2:47:35:b4:57:ba:eb:bc:1a:89:
68:f2:27:5a:be:dc:7e:16:e3:18:b4:0e:f9:90:d0:
8d:ae:22:4e:b7:e7:8b:ec:aa:dd:32:c7:50:58:16:
99:f4:4d:65:af:b7:c6:80:17:39:0a:bc:be:6f:6d:
09:45:73:15:79:75:88:11:78:0d:3e:1d:ef:7a:79:
49:54:26:dc:61:ac:d5:84:95:5d:4d:62:9a:99:6e:
33:70:74:53:0e:a6:f8:68:9b:f2:b5:d0:ef:32:7d:
c3:5a:de:a3:7d:de:5f:3f:cc:19:c3:83:c0:cf:f6:
c2:c8:94:f8:63:6b:de:6c:1a:a0:42:39:5d:14:78:
94:cb:fc:bb:20:a1:60:48:04:5a:b8:07:5b:e0:11:
34:29
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b5:d0:9f:fa:42:22:a0:7d:d6:33:5e:5f:a7:00:06:4c:4c:48:
64:00:2f:c2:06:45:cd:a3:40:c9:0a:44:7f:62:0e:74:43:de:
69:44:69:4d:d5:e7:7f:44:67:53:7b:4a:5b:28:2a:6d:46:33:
3e:43:2e:34:dd:9f:98:fc:16:eb:38:d4:7f:c3:bd:00:fc:a9:
80:aa:70:f0:41:8d:c6:b1:ac:a0:e0:3c:de:af:98:1a:da:12:
f5:c8:79:ff:56:0d:d8:2f:5b:ae:a8:45:65:2d:0b:9e:33:88:
b2:41:d4:09:3d:0d:38:40:51:b4:24:13:11:ce:9e:16:8e:a8:
3a:a8:32:33:df:7c:3f:c5:8d:71:24:02:e0:ae:43:cd:fd:cf:
f8:9a:7f:be:f4:e8:2b:e3:e9:8b:e3:73:c5:5f:1d:44:c7:33:
ff:89:0f:c2:6c:7c:ff:ee:89:77:cf:2c:69:f5:aa:b7:1f:bf:
7b:01:67:f4:52:10:bd:16:2f:e5:d8:e0:7c:88:a1:41:9e:3f:
02:09:a6:92:52:ff:a5:6e:61:d1:98:fd:fe:c8:af:0f:37:ec:
c3:75:91:80:e7:3f:57:33:d1:ac:84:df:11:5b:55:3d:73:54:
6a:85:88:69:27:1d:a0:64:95:af:d6:75:78:7b:b2:d2:33:8c:
1e:c8:15:32
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:01 2025 GMT
Not After : May 31 10:25:01 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4b:bd:a2:a0:41:5c:e1:1e:26:21:ce:fa:d4:39:26:f2:63:94:
79:98:0c:3e:46:71:c1:dd:ff:ac:82:25:e7:27:f9:98:1f:3f:
36:65:27:ae:74:30:d7:63:d8:8e:65:f2:01:51:db:2a:d1:3d:
15:7e:0e:0f:94:c3:fc:be:40:4b:43:9b:8c:93:a1:9d:42:c2:
29:26:4b:93:28:66:72:13:c8:c5:aa:7a:bb:05:7b:b6:20:5a:
30:8a:6a:38:eb:06:64:4d:c6:00:0d:be:9e:a9:d4:8a:af:94:
b9:7b:81:39:df:8f:64:30:bb:21:b4:4b:31:29:b9:22:73:b3:
d8:ea:86:77:bd:36:73:a6:98:58:e9:89:f3:3f:cc:13:2a:9c:
e6:a0:5b:08:a9:05:c8:c2:f8:19:9b:11:77:58:6b:4b:ca:ce:
55:f0:88:34:0e:df:01:ce:69:6a:ff:c6:35:e4:8f:36:8c:79:
c6:cf:4e:ec:5d:75:14:3c:f5:15:08:4f:11:e7:e3:20:20:b9:
1f:bf:5a:70:48:e9:59:f2:e6:39:4f:27:ce:e7:34:25:e0:b2:
4f:1f:ef:a8:89:c4:38:a4:31:67:85:e6:4e:dd:49:23:23:7f:
1f:45:96:0c:19:f0:68:f5:84:2c:f7:4a:d3:4e:6a:05:cf:5b:
e7:83:ad:ad
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 7935 bytes from beginning
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
3,101,925 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : Jun 29 10:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:a4:04:b4:59:e2:3f:cd:0c:69:0d:c0:2a:25:
3e:74:ee:c7:d7:ac:7c:7b:c1:8f:12:4d:a8:bf:9d:
19:b7:af:4a:7c:ac:e1:2b:6c:cb:6d:63:a4:3e:da:
8e:4e:0f:49:60:43:90:a7:67:ca:5a:54:db:81:5a:
d3:d7:30:ba:86:fa:a3:60:71:66:a5:fe:13:df:38:
37:28:fb:66:c3:70:58:56:5e:07:1a:3b:43:bf:a4:
4b:6c:57:7b:77:a5:7a:97:66:b6:a5:09:2a:3e:b6:
7e:56:57:8e:fa:59:36:61:76:96:58:5d:9d:b9:18:
79:bb:0a:eb:c6:00:61:60:12:27:0f:76:99:5f:89:
1a:9c:f1:20:e0:bb:60:f8:d3:b5:13:1d:c2:04:76:
06:91:b5:4c:8c:7d:b5:ac:9a:49:4c:30:5b:b0:d3:
d6:04:3b:51:53:b6:b5:18:f3:8c:2b:00:ca:76:eb:
99:e2:d2:be:a8:2c:ea:34:fb:cd:35:d1:47:e1:d2:
bd:70:78:8e:a0:ee:63:42:2c:25:9d:12:44:71:70:
7e:3e:f5:75:58:0f:48:82:db:5a:1d:fc:48:3b:06:
ed:b2:fc:7d:40:81:05:3b:e4:21:d4:b2:e0:bc:78:
e5:17:9a:aa:30:27:31:83:a0:71:45:d8:4a:e7:d1:
a2:33
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:a8:87:7f:91:26:38:57:8f:02:e9:52:0c:53:cb:be:24:18:
a7:6f:36:5c:4a:01:19:4b:b9:4f:22:88:f5:e8:a6:6b:b1:36:
a5:96:4d:60:6b:bb:1a:95:dc:b9:7c:ce:94:df:6e:f5:43:1a:
c1:43:c7:d3:92:34:f4:ee:6b:09:68:ef:c7:00:85:a3:83:34:
14:ce:16:47:ff:63:d2:35:fe:3f:f2:a1:45:06:40:b9:a9:31:
34:1f:57:c8:a1:9f:7b:ca:33:ed:46:68:1e:0f:cb:20:b0:79:
25:9e:2b:2a:79:ca:83:0f:d5:93:bf:91:54:1d:4d:31:8c:af:
d3:b5:f7:db:e6:c0:ed:42:f0:fb:18:3d:38:4a:43:71:a6:86:
fe:59:fc:4b:73:28:fa:61:f1:91:f1:70:89:44:57:cf:b1:f6:
89:fc:d7:d1:ba:7c:36:36:b5:6e:8a:0b:bc:05:52:b5:17:89:
89:5f:53:4b:fc:47:e7:22:96:56:1e:d3:26:c5:ee:06:bd:6b:
f4:ca:f9:c6:a5:8d:2a:45:ca:17:7e:c5:3c:be:f5:4d:4a:23:
aa:d9:b5:c2:fa:9a:b3:ab:a3:d9:ed:2c:c6:0f:3c:52:04:53:
33:44:2e:03:77:3a:2f:6d:82:fc:0d:9f:56:0b:f8:0f:0f:60:
af:30:6e:88
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : May 31 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
58:7e:6f:b2:0a:11:e0:0a:66:c4:1b:2f:06:c3:cc:e2:f7:73:
05:1b:21:50:33:47:71:64:3b:c4:51:47:1a:ce:d6:9d:46:22:
66:07:49:01:15:57:6d:95:9c:b0:4d:39:9d:bc:5f:f4:57:5a:
73:f7:34:e4:ea:a7:37:1d:40:67:d8:d4:27:79:89:08:a3:06:
55:ba:db:c6:db:67:34:70:1e:50:11:3a:2b:64:23:9e:b8:c0:
80:6e:56:1f:48:54:ad:43:cf:a4:9f:b6:0f:26:6c:e1:2e:80:
51:e7:98:87:4f:5d:6c:be:f5:71:2e:e9:c3:27:9f:c8:74:04:
b7:0e:23:4d:24:87:65:85:2a:11:27:f6:90:5d:1a:79:92:82:
4d:e0:a1:eb:b5:e7:6f:54:10:14:56:1c:41:74:29:ed:cd:0c:
ec:84:72:1a:ac:11:69:8f:d1:fc:33:94:46:fe:00:63:af:7b:
5a:5e:29:6e:ac:17:df:d9:f1:90:65:01:a9:67:77:3f:75:6c:
e7:de:da:99:a3:e8:b6:a8:37:72:d5:26:ef:01:a3:31:ae:b8:
a0:d4:46:47:cb:87:61:d7:53:4e:84:51:8f:69:c3:40:9a:69:
bc:c8:3e:32:fb:20:38:63:85:4e:87:71:1e:3f:f7:dc:e1:99:
f1:74:23:c3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 3059 bytes from beginning
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
2,851,399 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:10 2025 GMT
Not After : Jun 29 10:25:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d9:c2:0a:d9:c1:42:0f:6c:de:95:19:d4:17:b2:
1c:0a:fa:ba:26:3a:1d:71:19:f9:d1:7e:49:77:9e:
0b:03:f6:19:54:59:4e:06:70:53:5d:17:cc:cb:db:
3c:0d:3a:52:d4:21:8b:fa:2d:d8:d2:2b:df:79:3c:
67:88:b6:f6:a0:fd:7c:e8:d2:c1:86:5f:03:38:d9:
7f:bd:40:8b:56:0a:dc:5f:f0:d5:30:95:2d:5e:82:
aa:bc:f9:48:36:bb:c0:5b:dd:0c:82:b3:21:a7:c8:
26:03:15:67:86:3a:16:65:4e:87:0c:95:9c:5c:16:
b6:f4:4d:37:b6:35:22:37:44:af:88:f0:58:35:80:
9e:48:3a:f4:fb:67:29:c2:6f:07:2e:1c:e8:7e:82:
cd:fa:34:c9:c8:ce:e2:b2:e4:13:37:93:32:b9:cc:
db:c9:48:ea:b7:95:0f:a5:ce:dc:45:1b:7d:a4:fc:
31:78:31:74:81:41:3d:15:aa:e2:fa:9d:cc:4b:a2:
05:ac:28:2e:8c:64:39:2f:3d:65:40:17:91:49:bb:
b0:f8:34:0c:b8:26:5b:9e:37:45:05:de:6e:5f:ce:
c6:ea:b2:a2:fd:55:f1:e4:01:09:7b:09:85:96:fd:
d6:67:54:44:d9:54:5b:71:bc:bb:03:e0:93:9c:d9:
dc:3b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6d:45:8d:83:15:1b:b4:b4:d1:d9:59:65:1e:49:35:47:13:4c:
8c:6d:48:ce:a8:d2:b7:0d:16:84:91:e6:5a:17:78:cd:c3:0d:
29:37:f1:98:a6:ee:79:cd:43:6d:ed:34:82:d2:ce:94:1c:ac:
63:8a:2d:a8:78:52:c6:83:a6:e6:06:a3:c1:69:1a:e9:b9:d0:
b3:de:bd:e9:53:73:5a:f1:49:0f:77:31:b7:6d:ae:45:0b:df:
0c:1a:d3:8b:9e:79:19:f4:d2:6e:b1:9d:fa:c7:60:d3:48:e0:
3a:78:55:26:0d:f8:47:e2:c3:cc:93:b8:94:28:6c:b7:de:e7:
32:94:b4:eb:8b:82:0b:c5:11:ee:f0:95:b1:31:62:48:2a:ea:
00:ca:ac:c6:a9:cc:3f:f1:28:4b:13:26:51:b3:27:e9:53:ac:
b7:2f:bc:48:5b:35:3f:dd:66:96:3e:99:23:70:b0:a1:58:05:
c3:62:a6:b1:af:2c:bc:a3:b8:e4:9f:b0:bf:32:62:04:82:e9:
7b:c6:ba:25:66:56:6a:7a:4f:4e:68:2c:84:f2:f7:4a:8f:30:
c1:f2:1c:e5:14:92:be:0f:45:31:45:bc:83:d4:1d:25:57:7a:
d5:76:16:e0:41:4d:3a:36:f3:75:8f:b1:86:02:e3:42:41:69:
3e:2d:c5:99
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:10 2025 GMT
Not After : May 31 10:25:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:de:49:e8:1f:bd:ad:92:12:b4:7b:73:30:53:82:69:a7:84:
aa:0b:cd:46:21:c4:50:1c:21:06:c9:83:92:e0:3d:00:9d:c5:
8f:db:0c:d2:23:a6:c7:ab:b6:80:99:23:73:11:f2:ed:66:02:
56:41:76:d5:0b:bb:48:92:ce:98:ac:80:cc:2a:81:66:5b:d3:
df:68:39:74:69:f0:0c:5e:fd:d1:1e:0a:6e:c4:27:34:9b:4a:
80:90:1f:66:0c:80:bd:62:27:00:28:6b:59:bf:5e:45:28:c9:
59:80:fa:70:99:a2:b2:a5:31:4f:95:6c:8f:2d:50:8f:a3:3e:
d6:fe:b4:de:40:35:cc:b1:b9:9b:a8:77:f8:17:37:81:ea:29:
91:3a:36:10:26:1c:d3:9c:14:be:07:41:68:1f:e1:12:c2:34:
41:55:10:fa:ad:9e:4f:df:04:3e:dc:5d:52:c4:cc:89:d1:cf:
fb:ab:3a:72:9c:79:6e:36:ea:f3:42:7d:79:72:86:41:cb:69:
b3:fe:da:4c:b0:46:ce:3a:42:5f:2b:15:2c:47:7e:0e:f3:fe:
f7:3d:83:0e:f2:2d:58:ce:29:cc:42:76:f7:8f:82:44:80:6f:
f3:86:1d:85:3b:cd:3e:c3:e2:1a:80:2b:6f:ef:29:18:8c:76:
ac:8d:38:8f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 7935 bytes from beginning
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
3,102,702 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:00 2025 GMT
Not After : Jun 29 10:25:00 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:0f:61:5d:c2:cb:08:a4:fe:f6:3b:85:dd:a8:
24:a9:12:ff:f2:3b:67:cc:47:7b:0e:81:f3:a9:c7:
75:4c:7b:69:8e:1f:b2:41:8f:5f:0b:db:f8:01:fc:
7d:14:70:4b:61:ba:82:57:d3:76:46:fd:67:6c:c4:
87:76:58:19:d4:0e:e3:ed:da:fc:cf:13:fb:ed:a9:
88:44:10:a6:85:bf:c3:c4:85:43:5e:a2:1d:c1:1b:
dc:8e:70:fb:b6:b0:a8:b7:6b:64:44:3a:bd:d8:28:
24:8d:0a:18:5a:30:bf:f7:36:04:c3:72:cf:2d:06:
b1:d2:30:79:e9:75:a0:66:e5:95:5c:fd:74:4e:9b:
a9:6a:e8:d0:67:6a:48:71:0a:f4:12:7e:96:9e:c4:
2a:c3:32:2b:16:d0:4f:80:44:28:b9:7e:54:7c:ed:
69:d6:fe:13:37:f4:7a:58:24:46:40:57:74:79:04:
c2:24:3c:ef:18:b3:4a:e0:bc:53:a6:fe:a6:e0:c1:
a1:38:3c:97:e5:27:0d:0b:9d:4d:d0:8c:a2:6a:2d:
85:f2:fb:4e:a3:aa:34:33:46:f1:51:94:4f:c5:8a:
dd:90:fd:ab:52:18:62:c4:31:2f:8d:d0:af:84:1d:
cf:cd:e1:d2:82:1e:86:ff:cb:64:aa:1a:0d:a0:3b:
db:e3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:a5:00:4c:64:12:de:82:5a:3d:4c:94:c7:fd:06:7a:a5:0e:
aa:81:95:d1:af:bb:49:f5:91:2d:cf:51:c6:0b:f8:d1:ac:36:
78:cf:0f:fb:e7:f4:b8:d0:88:8f:ed:80:6e:26:ba:d7:50:db:
15:d7:e7:84:3c:ea:3a:57:9b:e5:aa:0f:01:84:2a:64:20:25:
f8:7f:3a:9a:82:52:79:c7:1d:2c:0f:86:84:f1:9d:6d:bd:ea:
15:83:8a:fb:d6:f6:6f:69:48:9e:77:42:88:c6:f9:fa:02:7f:
cd:27:15:6c:0a:11:9a:0d:f8:ec:45:32:0c:f9:11:a2:ed:b0:
fc:8f:a5:04:da:5d:ab:2b:f1:da:1d:4a:e1:87:96:d6:35:c8:
39:03:08:86:cf:88:64:f9:c3:f9:cf:21:e2:86:97:07:00:bf:
22:c8:04:ea:03:e9:4b:f0:4e:7d:95:61:4d:34:38:e4:a6:4f:
5d:d4:16:06:f8:82:8d:86:5f:1a:e9:93:94:93:48:93:71:49:
0a:a9:89:d4:d5:d3:ce:ed:19:87:6a:33:c6:4f:e6:09:34:29:
94:76:90:c2:5e:9a:48:2b:97:63:3b:20:5d:51:1f:7d:38:ea:
90:ab:e3:79:61:8f:22:9c:f6:fb:4d:7e:ae:f6:17:04:99:44:
0e:06:28:09
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:00 2025 GMT
Not After : May 31 10:25:00 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b0:62:5c:74:b6:b3:77:5b:ee:ec:b3:28:02:6e:58:60:a0:82:
00:6b:6c:dd:13:f2:61:16:a9:e8:71:30:a8:e6:60:99:42:84:
f0:e7:d3:6a:59:87:2b:56:c5:f4:15:48:93:5b:1b:08:b9:87:
15:98:de:fc:7f:a7:63:fc:cc:cf:76:18:dc:ce:cb:44:10:4c:
eb:2a:39:22:af:52:14:22:9e:6e:36:79:22:90:0b:85:24:38:
b0:2d:46:7b:82:18:60:1c:d0:ab:1c:3d:f2:3d:74:30:1c:5b:
12:87:2a:7d:5e:73:9c:c2:78:d4:31:5c:ea:d6:1d:74:29:97:
13:c1:00:41:36:3f:7a:82:8b:30:cd:45:14:cc:0f:66:0b:e0:
1f:57:bf:29:62:e8:82:3d:54:22:24:5a:d6:d7:6a:ef:f0:f6:
ff:14:91:bb:03:45:aa:98:25:b5:06:0f:66:0b:fc:e1:2b:bb:
f2:16:47:c5:00:30:24:ca:39:2b:9d:44:73:1c:76:5e:4d:8a:
16:cd:43:77:57:bc:46:59:87:10:6b:e1:94:56:29:95:91:52:
70:f1:1b:4c:1f:43:ab:bc:52:da:ca:a6:a5:f2:50:0e:e5:ae:
35:3d:37:19:6c:f8:52:87:f3:ed:ec:14:4f:a8:51:20:0e:19:
7e:dd:d2:9a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
Truncated 3059 bytes from beginning
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
2,852,408 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:17 2025 GMT
Not After : Jun 29 10:25:17 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:de:c2:43:29:78:df:51:9a:1e:07:a3:5d:f8:84:
37:06:81:d2:26:9e:cb:0c:f9:c1:85:44:33:ba:59:
d2:3b:31:62:b1:09:ab:c2:15:29:6b:c5:01:73:27:
78:3f:d4:4e:80:c4:1f:28:ca:b3:8f:87:68:bb:d5:
78:4d:50:ff:ce:15:e9:c5:6e:c2:4c:12:f9:9f:ed:
f9:92:9f:16:13:e1:58:9e:54:b9:45:d3:9d:ab:83:
8c:94:9d:25:6b:0f:7c:c8:49:fc:58:e6:0c:f6:5a:
26:fd:31:03:62:5f:91:af:9e:5c:cb:77:e2:de:4c:
00:9e:e7:28:c4:16:ce:b8:e0:f1:95:fa:cd:bb:09:
84:95:45:1d:7f:e9:d1:aa:9b:64:e1:67:78:e3:c1:
11:93:8f:16:c8:aa:54:3e:b2:ef:10:4a:5d:74:48:
0a:32:2c:f4:ff:44:af:f9:df:22:86:57:3a:62:35:
f0:c9:7e:cb:73:ab:a5:06:f4:62:4d:7c:0d:bd:9a:
5a:6b:bd:7e:85:7d:d1:64:fc:77:46:0f:2b:02:aa:
67:08:5e:1f:2e:8f:ab:19:ad:11:93:33:34:b1:22:
3a:bf:f3:47:1b:86:ad:fe:49:18:0e:be:d2:2d:56:
96:14:0d:ee:9b:43:c7:3f:b6:ba:0a:d4:4a:96:15:
f7:73
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b9:83:11:fb:87:3d:1e:ab:fa:1a:24:8b:a7:74:93:6c:b7:36:
83:20:de:3c:b7:95:b2:7b:b1:26:5b:45:73:54:99:d2:60:0a:
dd:bb:08:c5:4b:1f:ef:f5:59:e5:f4:39:80:bd:ba:7e:6d:e7:
56:9c:a0:52:df:65:65:38:f5:77:86:04:3d:d1:08:fd:c3:eb:
94:fd:8f:8a:60:6d:6a:b2:02:0e:48:58:d6:98:2d:ed:24:96:
d6:c9:a1:e6:c4:83:ed:6d:e7:59:5b:59:d9:11:30:83:a0:53:
59:51:ca:97:25:cf:d6:fe:24:e8:9c:48:a6:01:fc:bb:6b:13:
22:c8:e7:dd:cd:fa:57:6b:c1:bb:05:c2:bd:bf:bc:ea:82:8e:
25:87:7e:2d:16:dd:bb:de:5b:7d:31:dc:ba:5a:15:65:56:ba:
b7:19:ad:3f:c7:cc:33:74:77:71:b3:e5:e8:3f:ce:7b:a2:ba:
15:d2:47:61:04:36:98:5d:b5:3f:cd:68:e5:ea:f0:56:e8:95:
74:8f:33:e2:35:93:3a:c5:13:5d:a4:b8:c4:a9:bc:9e:c0:f3:
d8:d2:86:e6:44:41:17:60:de:07:a4:30:ab:0c:99:b6:3e:0b:
ab:44:90:79:51:29:6b:81:3b:68:b1:15:44:f4:80:c0:77:e3:
dc:79:df:98
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:17 2025 GMT
Not After : May 31 10:25:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bb:d8:dc:84:00:c3:9e:34:78:b0:71:df:b4:81:6c:e0:93:b5:
40:e4:47:49:2f:f6:d5:0d:55:c0:61:f6:9d:ec:76:b7:eb:ab:
e0:73:d8:af:6a:52:c4:7a:ff:70:26:9b:40:f9:3c:13:a4:c7:
c5:10:e3:bf:0d:81:e1:35:ca:a6:8d:30:c3:38:d1:fd:74:cd:
54:6b:27:a1:93:5f:32:02:ba:87:a9:aa:30:9e:4d:56:4c:f0:
e8:08:76:a2:40:fc:32:96:b9:0e:ee:07:46:7b:16:33:ac:65:
27:11:ff:83:b3:ba:90:33:3a:23:1c:48:f1:1b:e8:c0:c2:99:
c1:58:56:1f:ab:18:b3:04:ab:4f:75:2d:98:21:2c:f2:56:b4:
4a:3e:0a:02:0e:d8:57:45:37:1a:49:f8:fa:90:11:36:7f:e3:
3a:03:c8:1a:9e:2b:f8:51:62:c7:67:fd:9c:60:82:7c:ff:5e:
7c:9b:f2:e2:7a:12:ca:43:69:36:06:5c:e9:ff:69:e1:11:be:
7a:55:2e:3c:34:27:53:0c:7a:6a:9b:b6:5b:5d:18:80:c4:85:
09:d3:4e:9a:ea:a7:61:49:15:9a:e5:fb:a6:d2:e1:0c:b5:67:
1a:be:55:3c:5f:87:93:7e:de:69:de:0d:be:95:0c:e8:7c:e4:
c7:fd:1f:46
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,029,958 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:44:28 2025 GMT
Not After : Jun 29 12:44:28 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:30:79:85:03:ea:d7:94:b0:ca:cb:c8:ce:01:
12:5a:0e:31:50:86:e6:14:bc:c4:48:4a:d3:25:60:
48:6a:92:21:77:54:a3:2b:84:14:3f:73:68:72:ab:
0a:a3:27:26:87:07:78:e7:e8:b9:43:4b:a5:7d:18:
e8:4b:2d:b7:35:15:60:3a:93:2b:89:90:e3:4e:2a:
c9:fb:31:ec:05:ac:fd:19:0a:d0:87:0e:85:44:b4:
b1:5e:f9:8d:9a:2b:6e:a4:40:6e:b3:8c:c9:f2:76:
83:e8:7a:08:38:fc:7b:2b:15:52:3b:9e:32:a3:ad:
76:1b:28:06:f4:62:aa:fb:47:fa:bf:6d:d4:cf:9b:
2d:1f:18:8d:6c:ae:32:ba:be:a6:8c:4d:de:42:de:
a5:9a:e0:cf:3a:c4:30:e4:67:3b:e5:e2:bb:f4:14:
cb:9a:84:dc:5a:f4:54:1f:40:fb:c9:5a:17:62:c8:
84:02:f4:26:bf:54:8b:09:e6:a4:99:68:a9:e0:57:
08:73:91:b1:27:d9:26:eb:e1:42:39:6e:f3:af:51:
78:7e:e8:75:0a:1f:80:de:e0:86:71:ac:ae:de:e2:
79:6b:14:16:5a:68:e1:09:4b:2b:91:9d:8c:ba:f0:
6a:c9:2b:c2:c7:70:a8:8a:ee:4c:72:cf:78:d0:75:
4d:21
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bc:0d:92:18:02:a4:d8:aa:43:da:01:54:a2:95:69:8e:b1:d5:
96:6a:7d:dc:a5:66:2a:d7:ba:d2:dc:df:10:3a:af:c4:a4:44:
d1:ea:1e:ce:f0:14:36:6f:56:99:4e:ad:bc:91:68:41:07:74:
98:1f:f0:dc:2e:91:83:d7:17:d2:4c:f4:45:43:1a:dc:b7:d1:
ee:f8:e8:8f:e3:c9:e0:cb:fa:9e:67:a3:36:60:cf:a2:96:54:
f5:f8:12:9e:dd:86:45:58:77:f6:6c:a6:60:c9:8c:25:b4:80:
c5:b4:79:e8:c6:0b:ce:2d:21:ca:cf:80:3a:68:3d:57:42:5b:
19:c4:75:37:23:87:e3:c2:0b:d0:ee:19:51:88:7e:89:4c:f3:
12:3f:5e:fe:f5:23:69:ac:19:9d:12:a4:1c:76:48:eb:ab:9f:
46:d8:fc:ed:63:d4:49:17:47:ae:1e:72:ff:70:bd:87:2c:cf:
de:90:c2:45:34:42:f6:c2:34:c4:3a:42:ff:57:db:e7:7c:90:
4e:ae:bd:fd:d8:d4:d9:05:f3:3f:47:82:59:a1:c8:d1:69:99:
20:2c:02:ad:72:30:41:6e:eb:48:95:85:13:3c:d9:23:bb:4d:
7b:20:bb:36:39:fd:40:5a:d8:f8:fe:4a:b0:09:ed:b7:bb:10:
62:51:ad:39
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:44:29 2025 GMT
Not After : May 31 12:44:29 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:13:85:f3:33:f0:32:6a:0d:2a:ec:25:13:e0:45:78:1a:a3:
65:e5:c5:97:b2:f6:d7:86:3d:f8:38:e7:77:4b:ab:2e:a2:52:
ac:30:b5:b3:2a:06:8b:ef:15:58:2e:43:31:c7:7f:23:98:55:
78:27:a1:6c:d5:c8:50:87:aa:85:42:c7:04:9e:61:36:9a:b8:
02:c2:6c:7b:42:24:84:05:99:24:d7:30:a1:e5:b2:a5:bc:a1:
42:11:44:b8:37:8e:82:06:2e:e8:13:de:77:ab:0d:f4:88:19:
88:0d:2a:14:6a:e4:85:91:3e:a9:1e:ed:95:a9:a9:5b:6a:37:
81:c0:ff:f2:51:1c:e3:5c:54:d2:66:2d:90:84:29:3d:92:75:
78:a0:28:43:3f:c5:c6:6b:bc:87:0f:cd:fa:07:8d:6c:4f:ee:
0f:87:47:6f:8b:b9:5c:aa:b4:bb:7e:63:53:ec:7e:67:31:26:
76:91:6a:60:5f:44:81:1e:f9:2d:98:8d:42:4d:5a:3d:84:24:
ad:51:0c:b9:c8:4a:b5:cf:01:d0:ae:3b:ba:06:ba:b6:f4:db:
49:3f:5f:28:b0:22:ce:99:cb:3c:f9:3d:b9:72:4a:5a:2d:09:
af:dd:db:2f:24:26:01:37:fe:c2:79:a0:48:1a:3d:a4:96:d7:
75:44:42:94
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.08s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A 26,534,806 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:52 2025 GMT
Not After : Jun 29 10:59:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:dd:60:d8:7d:30:e6:1a:38:5b:13:6f:6f:c0:35:
8a:01:25:94:7c:f0:8f:92:48:96:75:19:1f:43:19:
90:0c:12:fd:41:04:51:b0:0d:50:73:62:67:c7:e6:
45:21:75:fe:8d:6f:f0:a3:6d:f1:85:28:50:cd:cd:
17:f9:0e:76:72:fe:fe:0d:5d:ee:67:cf:81:16:ca:
7d:e9:38:0a:18:90:0a:0f:30:c2:00:1e:d2:88:02:
60:f8:c4:18:19:c2:88:78:ac:2d:7c:24:b2:f3:17:
40:25:b6:64:09:58:8d:68:64:06:7d:dc:84:35:4d:
0f:a8:2c:95:9f:e6:f6:db:16:44:59:45:ae:74:79:
43:e6:98:90:c1:db:24:89:b4:fc:be:53:f3:5b:d0:
a7:5b:b8:4b:8e:25:88:a7:75:07:06:9b:42:44:9f:
f8:86:29:70:a1:7e:4b:a2:17:9d:b5:60:1e:64:e9:
d8:3b:9f:15:95:e6:ce:c2:e2:6e:15:65:1b:eb:43:
a4:58:85:11:2e:f9:a6:75:02:80:d2:40:6e:db:85:
77:74:33:95:42:cb:6b:45:e7:d1:b7:8f:91:57:08:
61:bd:47:c4:4a:cd:27:cb:bd:d8:65:af:5a:0a:5f:
be:95:20:09:a5:6d:0f:16:32:87:44:33:00:74:fa:
86:3d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:fc:03:31:e5:1d:e9:ba:37:55:c1:ac:4c:b6:09:18:5b:b0:
94:25:63:55:8d:68:82:74:59:08:50:93:c4:8a:2c:37:0a:aa:
b4:fa:7c:95:87:67:11:04:9f:2b:ca:9c:7d:36:41:27:ac:86:
85:7e:c3:e5:9a:9e:33:36:66:02:63:fb:c5:7e:80:fc:d7:a7:
e4:4b:53:e4:55:38:b2:be:86:a1:81:96:00:1e:09:7c:9c:3f:
45:3a:67:34:af:c3:02:11:a1:b5:3d:c3:98:25:52:69:e8:9f:
55:09:0c:8c:42:5f:dd:5f:8d:cb:a2:68:68:5e:37:17:32:2f:
07:d4:91:e2:7b:38:5e:75:7f:24:a2:28:29:82:ae:be:08:f6:
dc:18:91:5f:96:f3:2c:04:46:cb:93:40:38:e3:51:02:45:e0:
21:53:2e:fc:f1:40:1e:b6:f0:a4:03:1c:dd:ce:91:27:dc:8c:
7c:17:bb:26:11:93:81:0f:e4:63:5b:0d:11:d1:e8:47:dd:00:
76:99:59:25:76:5e:82:8f:f4:fa:e0:d8:ce:5b:30:25:3c:f5:
23:80:a9:b6:a5:e6:2e:de:83:32:08:87:83:a6:de:af:40:b1:
16:83:99:13:f5:7f:53:5d:97:d1:c6:86:09:3c:85:14:2d:b6:
64:e7:81:c9
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:53 2025 GMT
Not After : May 31 10:59:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:2f:dd:f9:e6:7e:9f:e7:3a:81:69:0a:ec:e5:ed:1f:a7:e8:
18:00:76:ef:e7:2d:ae:58:13:23:69:9d:52:d0:5a:51:de:4a:
76:f6:16:62:f3:b3:3c:23:84:78:d8:97:7c:dc:fc:09:d9:f7:
c4:9c:f1:79:a3:7d:9f:04:24:8d:bf:9b:72:94:c7:8a:90:03:
7f:70:98:47:d0:be:74:ed:1d:15:d3:06:ef:ef:34:9a:b4:bb:
f0:5a:79:f1:f7:1a:85:ae:ee:a1:6c:df:2b:65:7e:7f:d0:22:
1a:39:37:04:76:2f:f3:c8:17:64:d9:d1:c2:4d:23:9e:a8:a0:
ef:25:16:1e:ad:62:49:a7:dc:8e:3c:7d:32:cd:d5:1d:56:d1:
22:47:bc:a4:7b:b8:3e:2d:d1:2a:29:dc:ef:2b:1c:3d:47:73:
6d:f8:fe:e4:25:c9:41:d5:d5:4c:2b:75:b7:7f:e6:3c:87:c5:
46:78:e1:85:34:db:e2:c5:63:c5:c4:63:c5:2f:e9:07:3f:48:
1f:d6:d2:a2:59:3d:ec:b2:4d:4b:18:10:cb:bc:da:f5:77:4f:
63:62:a4:81:c2:e8:d5:a0:92:cd:31:be:56:e1:8c:60:6e:f8:
2d:39:d8:13:ea:8b:6b:ac:21:34:44:d8:8d:b9:2f:ef:eb:34:
ac:fe:b2:b4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,098,313 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:16:23 2025 GMT
Not After : Jun 29 14:16:23 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c5:d4:b2:f3:c8:9d:b8:d3:20:40:2d:d2:d8:cd:
7c:85:b1:f1:1e:c9:2c:24:0c:e2:85:58:d1:66:f7:
cd:ef:68:73:da:9b:34:d2:cd:57:e9:0e:49:ce:78:
f2:1e:8f:65:36:1c:95:52:74:91:90:ee:0b:8f:4c:
e6:f0:43:56:d0:65:20:2d:19:d0:a5:ec:7c:86:e0:
44:0e:a2:6a:de:3a:43:11:2e:af:e9:8c:cd:96:82:
45:db:a3:97:5b:84:26:76:26:38:5e:ab:03:d9:e5:
d8:46:c4:9d:d6:44:06:e0:eb:28:42:e8:5e:b5:8f:
10:66:ae:ce:e8:f1:b8:47:23:48:93:7b:24:77:c9:
c6:dd:a6:76:a8:66:51:77:e3:93:7e:c3:7f:51:10:
dd:f0:ac:99:18:6d:22:ee:72:83:c4:8c:dd:9b:69:
9a:a8:4e:41:89:d5:d3:46:db:3f:a9:8f:6e:96:da:
f3:2c:4e:ee:d8:5e:39:1d:9c:14:eb:9f:1e:d5:fd:
06:f8:f7:0c:3b:f4:de:1e:84:dc:1c:f5:b4:bf:ad:
cc:dc:c2:51:0c:1f:5f:fe:1c:56:2d:27:b7:f8:4f:
39:56:22:50:9a:51:e1:22:7f:92:8a:17:8d:1d:35:
fd:9e:1b:b8:47:33:5d:90:60:76:68:f1:65:95:9b:
8f:db
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b7:46:ea:98:e5:44:6d:c4:f4:f3:0d:e1:ee:db:ed:bc:c5:eb:
f4:8a:1a:14:e5:5f:bf:b6:a5:26:89:71:38:41:3e:80:2a:6b:
5a:20:c1:eb:1a:85:cd:cf:3c:02:97:f1:c3:a7:b2:c2:87:d5:
f2:98:19:06:2e:a5:05:01:22:f3:e2:4a:8d:4f:f5:67:9a:77:
d0:09:ef:0f:2d:81:b4:5a:67:3a:6f:c4:e3:40:87:52:e9:c8:
f4:c0:04:fd:95:dc:ad:ea:5e:6f:60:2d:61:10:8d:f3:09:31:
80:6f:6f:15:2b:e2:2e:6a:72:de:4c:37:cb:6c:cc:33:00:b7:
6a:2b:40:71:a0:72:33:13:45:b7:da:34:9f:e4:a4:1e:4b:9b:
fd:7a:ae:60:5b:45:37:df:a5:73:bd:a4:c1:4b:f7:99:ad:45:
60:be:39:9b:06:e8:f8:b1:93:c6:55:3d:60:ca:4c:57:c3:78:
e2:e0:c4:54:33:63:e9:54:06:f3:21:ce:f0:eb:32:37:18:6c:
ac:d1:41:16:f4:9c:0c:c3:ab:00:1e:94:bb:97:c4:c0:e0:f9:
6d:2e:d0:91:d1:c6:46:b4:0b:04:0d:16:13:19:79:4d:d9:c6:
bf:f4:97:74:d2:da:e5:7b:34:6a:54:63:aa:dc:20:52:54:06:
24:1c:b7:d1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:16:23 2025 GMT
Not After : May 31 14:16:23 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a8:ac:4c:3b:8d:5a:bf:ff:67:df:a7:a8:e6:f2:24:18:96:08:
ca:60:f5:bb:33:59:bc:cd:a8:c4:ab:07:9e:19:bc:3a:ee:06:
ab:19:8f:a5:ea:ec:0b:8a:64:95:75:8c:b5:3c:9d:7a:01:f4:
cd:f4:3c:e7:6c:31:41:9d:b0:33:20:b4:cc:08:49:dc:e4:fe:
7c:01:0a:1e:bd:19:bf:30:a3:9b:92:ca:c8:f7:d7:aa:e8:c3:
2a:b5:40:35:b0:0a:63:f0:86:6a:0e:d7:ae:45:f2:79:97:8f:
79:42:3e:52:62:1d:74:22:2f:4a:96:d2:4b:ce:14:64:67:a7:
45:f9:78:59:80:b9:e4:54:cb:5d:05:e4:f4:48:02:2c:3a:d4:
3d:5c:13:08:21:e7:b9:e1:e7:b0:86:39:6f:a3:c2:82:70:34:
52:ad:ee:a3:6f:d5:90:05:5c:47:d4:06:d5:55:34:06:17:d1:
c9:02:75:e7:89:c7:28:10:70:55:82:7b:86:ca:4d:9f:01:f6:
3d:5a:57:91:60:15:00:03:4c:7d:58:8a:ab:a9:1a:49:f6:bf:
09:65:fc:71:cc:dc:fc:e7:d2:59:74:4f:91:47:c7:23:a3:63:
9d:24:f3:a7:2d:9a:aa:fc:b3:8b:92:1c:14:fe:7b:1a:f8:93:
a8:38:19:b8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,635,010 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:51 2025 GMT
Not After : Jun 29 10:59:51 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c6:c0:12:db:46:78:7b:cc:86:9c:9c:dd:2c:d9:
82:ca:82:df:8b:1c:89:74:5e:9d:b1:57:d8:5a:61:
27:70:cd:c9:73:0c:af:1c:64:f1:ff:ab:98:76:e3:
f0:00:04:ef:8a:2d:0f:82:41:da:8b:88:da:fe:ca:
c2:ed:f7:a8:74:c4:72:0a:17:30:7d:f8:8c:ab:37:
7f:b4:5b:7c:04:6e:80:07:7a:33:12:4d:ab:5d:aa:
61:d6:32:f5:cc:c7:0c:cd:de:13:7a:26:7b:18:1e:
c5:78:24:bc:ee:7a:bd:49:c9:e3:0c:01:a9:00:e2:
be:28:11:16:ad:12:39:79:d9:f6:82:7b:e0:36:67:
db:26:d3:f6:d1:61:07:14:30:a6:95:57:11:d9:80:
d2:f2:90:53:11:66:16:63:5c:0e:81:bd:7c:2f:a2:
ab:e3:d7:10:d6:0c:51:81:f7:bc:9a:2b:48:92:01:
35:6d:26:fd:5e:01:d5:f7:36:1f:c6:84:7a:b6:83:
b4:24:94:0e:95:4b:6b:15:bf:b4:6a:84:c3:83:b1:
03:45:28:e3:98:e6:5e:0a:ba:d7:ed:02:e6:a0:75:
36:23:91:b1:72:84:cd:d1:47:9a:c3:a5:75:2b:ff:
f5:e9:32:2c:89:7c:31:09:04:8b:c0:1c:69:ed:f1:
f3:89
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a2:ba:c5:34:97:9e:94:ba:9b:fc:01:a9:54:bc:e2:7e:1b:13:
bc:07:9f:e1:e6:69:24:60:5f:29:c5:fc:a3:cd:3f:85:6f:0c:
ea:01:6c:ca:cd:d3:78:fe:75:78:31:4d:9b:78:4e:a8:90:c6:
c7:90:57:a4:25:fb:64:3f:55:2c:6a:65:df:7c:bd:f6:80:a7:
0b:e8:d0:a0:86:c3:4c:b8:a8:96:d1:ff:f0:60:60:3c:9b:0d:
29:27:26:73:b1:49:dc:c8:22:4c:b8:52:31:ab:e2:b3:32:ab:
a4:ff:5d:b0:a6:28:d8:0c:39:3a:76:4b:de:15:43:ca:d6:a7:
ae:e0:3b:f6:33:57:88:64:d8:7a:27:b5:fc:1f:cf:d8:9d:df:
90:52:10:bc:29:ed:fd:6f:bc:ed:95:9d:0b:90:04:ea:48:20:
5c:6c:21:17:8e:07:94:b3:62:f6:87:58:95:29:ff:6f:e8:59:
02:09:74:7d:79:a3:f3:79:ed:f6:d0:1a:45:cb:d3:c6:c9:4a:
d9:93:fe:cd:06:ea:c2:0e:f3:d4:c9:a5:eb:7d:51:a7:ab:81:
55:a7:a8:8e:f9:05:5c:f2:cc:e5:65:61:36:86:24:a3:aa:3b:
f2:82:c0:88:79:94:f0:ae:d1:34:75:33:ef:9c:bd:6d:12:00:
78:78:8c:8f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:59:51 2025 GMT
Not After : May 31 10:59:51 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
be:cf:c0:b6:24:04:75:3f:8c:90:75:3f:25:ca:27:36:fa:5a:
2f:e6:2f:c5:50:65:68:36:fb:78:c5:5a:15:1c:a8:3e:a7:9a:
31:ca:3b:f8:48:d0:ba:9d:cb:61:0b:d7:e0:25:97:03:4a:9f:
db:e6:cc:3e:ea:bb:24:4a:1b:e3:04:89:ae:4f:fb:be:70:e3:
e2:3d:71:53:62:91:25:67:73:48:d4:b4:9c:ca:2a:fd:b3:c4:
54:72:43:22:fe:a2:24:db:ff:85:51:4f:0c:c4:03:6e:f7:d8:
8d:cc:05:8d:8a:4d:4c:3c:e9:91:42:e7:2b:ae:ee:1e:db:d6:
be:b8:5c:27:eb:56:93:49:29:c5:37:65:ac:3c:10:3c:4b:fa:
89:2f:81:ad:02:d5:e1:71:01:b9:91:01:e8:3c:5d:01:f3:9c:
e7:de:cf:89:26:07:a8:4e:9e:8b:7b:dd:fe:86:e0:2c:bc:69:
b1:63:58:1e:c8:57:26:7a:0a:8d:2b:38:ad:78:33:3d:91:7e:
9b:ae:a5:22:48:c9:fb:0f:35:43:d5:fb:bc:8d:06:f2:ee:70:
7a:a0:de:d3:2b:9f:f3:fc:2a:ea:0f:72:11:7f:2d:0d:f0:de:
44:73:f8:ee:0e:79:31:e9:d2:c5:4b:84:10:39:6f:8f:4c:a8:
e9:ce:95:15
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.72s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,737,270 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:53 2025 GMT
Not After : Jun 29 11:50:53 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:c8:ef:7f:24:89:61:43:fb:12:46:29:d7:fa:
25:6b:de:ce:4a:02:f9:59:9d:82:dd:e4:7e:6b:1e:
5c:a5:71:8e:9a:58:29:fa:3e:7d:bd:a5:3c:65:14:
7b:6b:f3:cd:7b:58:b3:33:d8:f5:df:3b:cd:a8:e0:
1a:03:64:93:76:c0:48:cd:51:65:f1:53:36:6c:5c:
bf:e4:dc:aa:8f:66:9d:40:56:33:fc:70:e7:3d:35:
8b:4b:17:75:16:6d:a4:a5:7d:31:dd:4b:d8:98:0d:
6c:3e:cf:c9:2a:f0:54:09:6f:37:34:75:c4:91:d5:
67:1b:0d:5f:69:1f:8c:11:a8:47:71:ba:33:e1:51:
96:47:06:fc:cc:d8:0b:d8:3a:b9:21:9b:ef:2f:2b:
52:c4:0e:40:77:0e:2d:5b:ae:4c:86:5c:19:3e:11:
77:04:9b:f0:b2:a2:aa:e3:41:94:94:ec:04:42:c2:
e1:ae:7a:a5:cf:61:71:42:59:76:3a:97:d4:75:bd:
27:8d:d0:7c:fc:bc:2a:28:a9:4d:0b:a4:d7:37:85:
57:12:47:cc:25:0b:a5:42:db:61:8e:22:cd:7a:57:
8a:ec:c7:4c:98:8e:47:d3:30:89:dc:96:f1:2d:ea:
18:09:a7:ab:58:af:f5:16:47:e4:0d:e0:4e:fd:41:
13:71
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:a2:5b:b1:18:a3:c3:e1:0f:8a:96:9d:4d:81:ec:9f:50:29:
6c:04:fc:8a:6b:4d:3d:3b:51:2b:0d:4f:57:a8:78:28:0d:3c:
29:c7:0e:93:b8:0b:d7:e3:49:92:bb:31:8a:a4:fd:ca:97:7a:
f3:cc:04:b2:96:f2:00:61:46:11:69:11:13:a7:07:7e:5b:88:
21:76:b3:ab:cc:93:40:69:c2:da:db:5a:3f:67:10:64:a6:9e:
b1:2a:d7:0d:17:8b:67:12:a8:b4:15:5e:dc:2c:a9:69:28:30:
43:59:6b:23:20:ac:e1:d2:e3:47:fe:41:1a:70:7e:73:d7:6d:
65:9e:82:88:db:56:cd:2f:88:f1:cd:1b:02:b8:1d:55:fe:53:
29:70:e6:ac:a6:b0:2e:e7:5f:4d:5f:88:c9:51:02:ad:bd:1b:
8c:36:6d:45:01:25:23:a1:b5:75:5d:58:0e:c0:43:ca:6e:ec:
41:5b:6b:f3:30:f5:9f:f3:d4:3b:5a:21:e2:a2:5f:2d:80:c9:
1c:dd:b5:48:41:6b:14:ae:b9:0e:55:cd:49:e8:ee:26:e8:7b:
db:37:17:9a:ca:ef:47:7e:b5:af:84:75:0d:cf:6d:84:93:29:
1d:ed:06:fe:92:bd:d3:f7:b7:1b:ed:77:76:02:64:bb:cb:e6:
d3:2b:be:47
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:53 2025 GMT
Not After : May 31 11:50:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:cb:bc:52:a0:13:38:3f:a9:97:00:4c:07:4f:f9:ae:e3:ba:
93:8d:66:0b:d4:83:49:01:17:7d:05:46:23:0e:ad:65:3a:2d:
5e:37:2b:d5:0b:cd:3d:3f:85:43:70:f6:ac:77:21:14:17:b7:
48:15:68:ae:79:48:86:a8:0d:81:a3:ab:e2:46:be:f8:fd:9f:
9a:b2:aa:90:53:1f:65:5f:1e:35:77:42:75:08:2f:6f:80:6d:
d2:8b:49:be:40:a5:d7:16:e1:17:4a:18:a9:fb:48:fc:cf:c8:
4e:ea:4c:ac:49:55:2c:94:64:22:bc:e3:d4:43:cc:44:7e:1c:
b9:f8:1b:1e:c0:46:ad:21:1f:5d:aa:41:71:71:e2:52:4f:d6:
66:fa:a4:2a:8d:79:27:16:f8:96:91:f2:7b:3f:bc:f7:d0:72:
1e:c8:47:c2:2d:7f:29:92:8b:e1:d8:dd:65:c0:5b:a0:14:29:
84:55:bf:93:fc:3a:c2:52:61:c1:34:4b:4d:41:97:4c:1b:b5:
db:23:02:04:cb:2c:eb:17:5a:62:d7:39:6c:b4:e8:05:14:c1:
65:fe:d4:e9:c8:2e:1a:ce:52:f3:75:93:3a:4e:2a:b4:40:01:
08:88:83:26:97:65:1d:61:30:8e:ff:a9:0b:55:35:2f:bf:88:
89:2e:4f:fc
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,260,917 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:22:51 2025 GMT
Not After : Jun 29 13:22:51 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:f9:73:17:3d:71:02:19:0d:30:19:78:53:cd:
34:4b:be:df:59:fb:de:24:51:c2:52:dc:1e:18:ec:
c8:6f:f8:16:4e:eb:3a:ca:92:de:bc:38:7c:a4:f0:
89:00:81:31:48:da:eb:d2:f8:be:14:39:cc:64:ef:
eb:b7:d5:10:e5:4e:ba:a9:ce:83:2f:90:e7:06:54:
95:6d:d2:c5:96:2b:2c:8f:91:9b:27:bd:df:87:38:
82:a1:41:62:8e:d3:cb:79:7e:ad:fd:77:d0:8f:b8:
02:b6:8c:6b:11:01:0e:41:ba:33:9f:8c:88:35:4f:
b7:81:60:e8:e7:d7:06:1a:e2:ff:fb:da:4e:7f:09:
b0:9e:e5:3f:0e:28:8c:6a:5e:34:b2:df:24:86:a1:
13:fe:7e:b8:4e:b1:02:7b:ed:70:96:68:ff:63:c5:
b0:c5:ee:9d:1f:08:cc:d7:cb:30:6d:7e:da:b3:59:
02:8a:de:ed:26:91:ab:ae:48:26:e2:4a:51:d2:87:
86:cf:62:62:15:69:31:9f:6e:7a:bd:37:2d:ea:d4:
66:28:8c:c1:11:68:e2:35:14:a9:3a:da:3f:19:06:
f5:8c:d7:a6:08:d0:38:4a:bb:83:29:47:a2:d6:6c:
27:25:30:f7:c7:0b:4c:c5:44:83:29:ba:03:fb:07:
46:a3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5f:46:3b:a0:38:1d:14:7c:d1:cb:b6:35:ac:ca:85:f8:ec:e5:
91:bb:18:0e:a7:81:38:76:54:37:3d:d4:46:3d:90:a5:36:90:
4d:ed:ef:4d:b2:f1:0d:d0:2d:ee:6f:03:ca:d3:e6:1e:33:13:
2f:b4:07:c6:e3:39:b8:63:a5:4f:62:17:8d:56:c9:50:9d:23:
55:e6:06:06:cc:a0:e1:d6:ba:f7:ca:09:81:fe:e1:da:6b:49:
14:5c:e7:4c:99:b3:5b:31:87:4d:05:00:39:0a:19:a7:7d:56:
d0:90:07:0b:b8:38:20:cb:2a:0a:32:c0:90:38:c2:87:b5:66:
ba:e6:6e:d6:13:b1:d7:76:11:6c:ad:74:27:3a:67:5c:06:b5:
7b:fb:c9:25:b5:8a:01:66:84:16:5b:90:77:4e:d7:e5:d6:fc:
0d:8d:13:0d:31:f2:f8:08:f4:dd:86:e5:1c:d7:0d:e7:43:3c:
ca:a5:26:e7:d8:11:85:25:63:84:3e:26:86:7c:4d:21:3d:9d:
96:e6:34:63:ba:82:fb:b0:d8:3b:d0:c9:7c:67:fb:ec:ab:61:
02:c2:a2:97:86:ae:cc:28:3b:08:b3:91:6b:49:4f:01:d6:9c:
e5:28:40:26:44:7b:33:bc:53:66:7e:90:6b:68:73:66:ac:c3:
3b:89:b1:97
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:22:52 2025 GMT
Not After : May 31 13:22:52 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
88:a2:3b:4b:26:53:58:ee:4f:bb:71:4d:ff:1d:f6:05:e3:ae:
ce:d9:bb:cc:be:43:09:ff:b7:85:b2:9f:34:2e:ed:91:0b:14:
69:29:d6:cf:bb:6e:99:9b:d3:8c:bf:b5:54:78:5b:6d:41:6b:
96:fa:a6:92:71:13:02:66:4d:36:f4:f9:c3:c8:38:0b:1c:f7:
6f:e9:c6:7a:d8:1b:12:72:13:89:91:2f:c5:09:b4:29:0e:0f:
0a:cc:f4:99:f8:c0:30:96:10:9d:db:0e:17:3a:b3:16:29:3c:
1c:01:b4:2c:c9:13:01:82:f3:b0:de:d6:00:a0:5c:66:b7:53:
00:0a:b8:08:ea:ee:df:33:15:39:38:57:b6:71:cf:eb:04:95:
e5:dc:29:6a:21:57:cf:ef:54:10:bd:51:8f:68:2c:7f:74:3e:
a2:04:4c:72:1c:ca:c7:87:5f:f7:6f:34:21:a3:9a:f4:db:bb:
0d:74:ae:e8:91:aa:76:50:e0:39:1c:eb:0f:f2:49:e2:0a:1e:
c6:44:8f:a7:69:3b:89:ba:9f:a2:9f:ff:56:9e:0a:5b:fe:86:
4b:85:02:15:7d:8e:94:4f:a0:02:a3:63:4d:97:e6:96:00:c1:
3b:7e:1e:ac:10:61:16:4a:0c:a4:fe:e2:9c:bd:84:ab:9b:4b:
82:71:39:5f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.14s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,886,869 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:09:39 2025 GMT
Not After : Jun 29 15:09:39 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a9:14:ea:02:a0:07:46:96:e9:e0:0a:37:35:94:
6a:99:07:3a:54:4d:90:71:67:92:6e:f6:26:1d:67:
61:ef:2e:96:3a:52:97:34:a9:39:ad:38:ad:e4:f6:
99:14:bb:38:28:78:e3:2b:56:fe:d2:ca:f1:c2:42:
df:0a:74:9a:d0:af:c9:64:88:6c:cf:33:14:5a:ae:
2d:ee:ad:3b:d2:63:ce:32:b2:ca:4f:8b:93:67:38:
96:f0:fe:8d:65:a5:0a:8d:80:cc:13:f2:94:73:1a:
5a:53:d9:bf:6e:d0:6b:1f:fb:ce:f8:db:93:56:49:
ee:ef:a9:19:fb:74:82:da:ad:45:34:2a:98:0a:d4:
46:2d:13:35:d1:3e:58:94:1e:5f:5f:96:d7:9a:73:
cb:4b:56:96:4a:e6:89:02:be:37:12:4f:69:b7:8e:
78:af:96:ba:7d:7f:0f:d4:b2:6d:23:f3:db:23:a6:
83:81:97:b6:c7:8e:70:66:a1:3f:b8:35:d9:d0:35:
a7:0a:3e:26:a7:8f:16:d8:93:fd:6e:f1:ac:fd:9b:
41:a9:32:c7:13:d6:5e:bd:fd:9d:8e:ae:3a:fc:eb:
3f:b5:2a:94:97:87:d6:68:b0:a9:a6:b3:ad:88:3b:
2a:08:6f:26:8b:b1:a2:15:9b:63:31:54:61:bc:45:
0d:9d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
41:08:4f:49:71:95:49:a2:59:35:ea:8c:1f:59:bd:86:a3:b5:
e8:0b:e0:d8:e9:91:f8:3c:44:b9:c8:00:40:12:be:be:07:47:
51:6e:89:74:52:a8:0c:0f:88:bb:fd:cf:c5:c7:ea:55:33:9f:
b8:9e:74:9e:a7:76:06:6e:82:09:02:69:01:91:28:d0:f6:60:
2a:72:41:99:97:09:db:4f:f2:3c:82:ad:24:6a:ce:6f:e2:7d:
eb:e2:d7:9c:65:90:51:fc:33:be:06:3b:0e:86:57:b9:ac:72:
53:de:b3:ac:0f:2f:83:0e:e1:32:e8:15:7f:ab:f8:ff:ad:11:
61:e8:f9:bc:23:97:63:05:9b:80:4d:3f:db:b9:52:21:a9:83:
86:4a:dc:7a:b5:f9:fc:54:81:e9:85:50:12:b6:ae:a5:0f:31:
4b:b7:fe:13:04:32:c8:20:89:35:a3:65:ca:27:9c:9b:b1:1a:
af:50:6f:cb:9e:94:7d:a1:77:21:a6:d9:d9:f4:4d:c1:05:e6:
43:9a:80:ef:78:c3:8c:a1:a7:06:67:23:6e:ac:87:40:a3:ec:
f1:ad:1b:d4:71:ce:f9:ae:6e:b8:79:a5:0c:49:d0:03:37:6f:
15:ad:9f:c5:36:df:e9:65:70:f3:0c:92:57:e4:62:2d:e1:e3:
c2:43:e3:2a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:09:40 2025 GMT
Not After : May 31 15:09:40 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:8d:b5:63:47:1c:56:5b:35:82:56:6e:6d:87:93:fd:84:67:
a0:82:86:52:2a:fa:eb:57:ec:0b:89:2f:42:dd:53:5c:03:ed:
7e:48:32:35:38:41:a4:cb:f3:f2:40:da:b2:15:22:2c:58:48:
9b:08:04:c3:8e:62:ac:6b:a9:e3:1e:96:2b:24:29:38:29:91:
6f:81:f5:01:9c:b3:f3:e6:58:5d:c5:69:80:b6:81:a8:52:72:
b1:77:cb:cd:f6:4c:83:c7:5b:61:f3:68:29:1f:5d:2c:75:c8:
a6:0d:c5:05:f2:c2:38:e8:80:f4:61:48:b0:94:63:f9:36:83:
cb:b6:d9:5f:62:8b:79:c8:c5:50:73:ec:8e:84:91:d3:c1:4d:
5a:cc:26:8c:6b:62:79:a2:34:b3:ad:63:ba:96:79:9f:5c:e1:
e1:18:45:04:e1:ce:58:c5:0d:f1:7d:ae:7e:f4:78:ac:f4:e8:
e1:63:38:fa:17:e1:d7:f2:40:44:86:0e:5f:0c:be:15:89:36:
a1:77:09:19:f1:2c:8b:cc:23:ad:08:a8:7a:d2:d0:05:32:1b:
85:97:57:e2:e3:b7:8c:37:d0:01:09:85:c7:a6:c7:87:fa:ca:
fe:fe:c3:3f:32:95:db:2d:f2:32:f3:68:4c:a1:ef:d1:30:2d:
ea:c0:f5:ad
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,413,355 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:05:48 2025 GMT
Not After : Jun 29 15:05:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:90:f7:12:ae:ca:0d:ba:fe:89:5a:e8:04:fe:b7:
ec:75:8e:41:d1:c8:72:47:91:c9:6e:01:39:97:ae:
62:e4:53:7c:6f:bc:f7:29:ba:fc:de:42:f4:bc:b3:
92:ea:cc:05:2c:65:fd:af:54:35:cc:5d:06:d5:aa:
ab:89:c1:b2:87:7a:ad:2f:a3:2e:8d:56:ca:41:a4:
7e:40:7a:1e:03:69:ff:c0:11:3c:f0:f7:6d:d6:e5:
8a:76:50:48:87:01:f2:11:fd:cd:24:50:f4:7e:5f:
a7:0f:f0:ec:87:a3:c6:f8:34:b0:8b:c9:f7:c6:fd:
17:2d:19:a3:79:5f:0a:35:ba:58:be:bd:db:2a:88:
c1:72:bf:91:51:f2:a7:1d:b6:62:50:28:b0:89:e3:
a1:b9:b0:6e:65:d5:4b:29:4e:4e:37:ee:51:e8:de:
a8:a3:ce:2b:58:07:72:f0:cc:88:21:80:47:07:36:
4a:0f:ed:c5:77:bc:fb:e7:ac:5f:98:63:f5:fc:5d:
08:7e:48:4e:aa:05:01:2c:1b:33:0d:6e:9e:3a:bc:
f0:58:6e:26:80:b2:0e:01:47:02:93:70:9b:68:a8:
26:bd:c8:64:66:26:bf:4a:9b:bc:ec:ea:40:53:9e:
71:f4:f2:98:29:89:cf:de:01:7b:a6:e2:52:06:ad:
44:07
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
11:05:96:f7:f8:b8:c0:b1:f4:61:0c:56:fa:d7:e4:d3:f1:f9:
37:f0:75:2c:f4:fd:63:5d:f2:ab:78:0c:af:15:92:62:3a:03:
9a:48:3f:77:93:d9:6b:b5:c4:b2:d5:8e:28:71:70:26:06:d4:
27:ea:7c:42:e0:21:d7:1b:c4:bd:de:a3:a9:13:25:0e:a0:04:
f1:7b:d4:7c:30:0a:52:fc:a3:f2:8b:44:77:54:32:5c:e2:39:
1c:a8:70:3a:fd:52:11:32:f3:18:2b:9a:fe:0e:fd:41:51:fc:
22:ed:d8:0e:9c:bf:07:7a:cc:12:6c:f4:14:4e:bc:b0:75:af:
95:53:83:1d:95:03:25:c9:58:ee:f9:f5:c4:da:4e:87:ac:a4:
5f:94:da:58:d2:ad:dd:c6:f4:73:ce:20:a1:3f:bc:fd:d3:ab:
47:a9:a0:99:6f:d6:fe:f3:39:a5:0e:2b:69:59:10:dc:9f:5f:
8c:92:4d:8e:4b:74:4e:77:da:a7:97:1f:0f:77:84:51:2a:05:
73:e8:61:e0:97:1b:a4:e1:a9:df:5c:e8:0d:77:43:89:87:11:
86:e7:b3:cb:e3:05:e3:dc:30:eb:01:00:6b:99:12:9a:63:34:
5f:13:f5:91:94:55:d8:7c:78:c9:31:d1:1d:c7:61:da:d9:aa:
57:4a:80:6d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 15:05:49 2025 GMT
Not After : May 31 15:05:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4c:0e:ec:47:52:f6:e0:9a:9e:33:9c:9a:2b:5b:4c:d2:1d:1f:
18:06:fc:61:53:05:7b:e6:cd:34:d0:cd:d5:54:23:5c:a5:5d:
c4:4c:18:fb:a4:97:ef:fe:6b:d2:7f:10:52:96:f7:74:90:46:
bf:53:9e:35:88:fa:de:fa:c4:33:34:b6:0f:c4:ae:4b:3e:45:
53:4e:d4:d3:1b:e8:65:b5:6f:3e:71:42:c6:16:e7:7b:3c:69:
fd:95:78:e7:53:01:4d:cc:18:3c:09:af:a1:75:db:82:3b:1b:
07:d0:cc:ac:2f:4b:31:ff:41:83:f5:e1:f3:b6:c3:c1:14:ec:
0d:6e:79:67:21:0f:9c:45:df:72:50:c5:9a:a4:90:ea:12:ad:
78:cc:ed:44:0d:b3:8c:d6:d2:73:08:22:80:46:50:06:d3:70:
f0:8b:e4:4a:db:93:c3:24:41:a5:98:f8:3b:64:f2:80:2f:17:
c7:00:fe:66:bb:6c:a6:e2:21:b6:04:f6:75:dc:7a:2e:6b:0c:
10:6e:17:ef:9f:44:f8:18:c1:4b:b1:74:6c:90:85:73:a5:f6:
64:e9:f6:ce:25:c1:ac:0a:51:87:59:85:f6:a8:49:f6:b7:b7:
d3:4c:82:72:9e:8f:76:43:8a:90:b9:37:0f:68:5d:2f:9b:98:
eb:5b:37:39
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.05s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,742,303 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:37:15 2025 GMT
Not After : Jun 29 12:37:15 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:88:e7:42:a2:2b:05:c0:80:c0:e6:a1:4a:46:0c:
31:75:f8:96:2b:a6:3b:fc:76:28:b9:5d:51:dd:82:
7d:e0:a6:af:61:9c:aa:db:c4:91:33:a3:61:ce:50:
20:33:f1:22:ec:69:ae:8f:83:2d:ac:93:ac:b1:85:
e1:f2:40:83:26:49:8f:63:42:7c:0a:cf:bc:ce:ba:
a7:80:fe:2e:4b:24:0b:b4:69:86:52:ca:70:c3:09:
51:0f:c3:be:49:3d:df:99:d1:d7:58:98:6c:53:a0:
6a:48:bd:48:14:31:75:ef:d8:66:96:ae:9a:6d:fd:
e9:99:3b:18:a6:a4:f4:d2:92:07:13:8a:f0:31:e0:
0f:1d:49:9a:2f:da:91:77:fe:15:f1:79:c9:8b:35:
fd:b7:b3:1a:b6:61:10:17:9d:bb:b2:0e:8f:ae:f4:
1d:79:86:54:52:03:e6:36:92:3e:8b:03:7b:7b:da:
db:22:22:df:be:98:06:1d:07:3a:c8:3e:c7:23:62:
1d:a4:e8:26:3d:ea:00:8a:3a:ec:84:00:e8:8a:ae:
27:4b:17:be:04:ee:d2:43:40:eb:13:d0:cd:cf:ef:
82:92:2c:c1:2e:42:72:e8:6f:a5:c2:7b:af:6d:d4:
fa:95:7d:00:37:bd:05:37:5f:89:c5:23:1a:a8:1b:
a5:59
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:ea:8c:bc:e3:36:f5:80:e6:75:56:be:17:cd:09:de:cf:1b:
0f:ae:36:55:ad:94:03:f0:57:24:55:8a:04:07:61:df:27:5f:
b5:d1:3d:a2:c3:17:f4:c0:ac:2f:51:c7:69:54:bd:4d:88:55:
f3:ed:13:b7:4c:bc:43:4f:41:f1:38:fc:93:c2:f1:ce:a1:3d:
24:9c:69:b8:03:31:3f:f1:9c:2f:4c:67:27:92:67:a7:d2:0b:
ab:d1:3a:c3:47:83:7a:32:db:4c:d0:6e:b5:63:43:39:ae:45:
cf:54:60:e5:9f:35:c3:1e:20:4b:84:4a:0a:28:67:15:4c:e0:
39:b1:97:74:ba:15:26:a3:65:de:2c:2f:f5:2d:d0:75:6f:8b:
ca:60:a3:1d:d5:7b:ad:fa:b4:a6:0e:ac:dd:fe:b4:3a:ed:cf:
c5:e1:fa:cd:c1:74:a3:58:4c:f4:02:07:7e:8f:d2:8a:9d:a3:
78:79:f3:65:c8:26:ef:0a:21:fc:c6:61:18:fc:07:8d:a8:b5:
99:2c:8d:ab:41:0f:7b:a7:51:5e:a9:61:41:46:55:41:88:c9:
57:73:18:72:d9:cc:5f:4f:01:81:10:16:70:7a:71:79:ab:3b:
82:0b:4d:5c:60:70:d4:62:97:f2:7c:e9:bc:0f:d8:de:ee:5f:
8c:88:98:e7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 12:37:15 2025 GMT
Not After : May 31 12:37:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:2e:64:0e:92:45:3e:49:33:75:01:9e:aa:15:b2:f4:25:a1:
f7:e1:c6:3e:ea:4a:3e:a0:15:62:eb:8f:a2:80:22:93:7f:7b:
0f:6b:98:16:7d:75:89:9a:96:c4:29:e3:7b:9e:8b:f7:fc:f4:
46:f3:56:18:e4:52:c9:86:9b:57:b9:4b:1b:0c:cd:c4:39:da:
be:56:5f:a8:91:d7:3a:2c:2e:0b:dc:93:55:06:0d:ad:8f:7a:
c8:3d:27:63:32:8e:e8:ca:12:93:ee:c1:cc:55:61:9b:bd:69:
d3:a6:75:7a:c2:9d:67:2d:35:94:18:76:04:a9:03:53:1e:83:
42:3a:16:3b:54:5e:00:30:e8:5e:b8:ee:ea:98:67:0e:b8:0b:
3d:b2:34:29:48:d0:7e:9d:d5:9b:45:44:da:50:72:b3:4d:18:
ba:fe:35:96:fa:3c:6a:14:92:01:98:48:91:3b:d0:95:dd:a8:
98:86:6f:eb:b0:1d:d0:9d:ee:79:3b:b3:2c:db:17:1f:e3:b8:
d6:6a:e0:38:f8:7e:19:84:17:cc:26:08:16:e4:7e:ed:7f:8a:
8a:72:15:f3:23:b3:26:f9:cc:c4:66:1f:45:d9:68:81:13:2d:
43:57:dd:8f:71:e7:af:d8:78:bf:3f:8b:00:6f:99:54:98:f0:
40:7a:17:86
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.71s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,244,880 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:21:57 2025 GMT
Not After : Jun 29 14:21:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a0:f6:1b:f2:88:0e:d0:ea:0e:67:1b:b3:cd:65:
e1:e7:b6:bb:d5:35:9f:58:9c:2a:c1:48:b1:44:a8:
11:2d:d4:3f:68:e2:25:a5:e6:d7:b8:e4:42:9b:47:
0a:57:a7:6c:56:2d:a8:fb:bf:2c:49:12:27:7f:bc:
32:fe:e2:34:29:a5:ee:7a:10:59:16:82:50:19:5b:
0e:b7:08:80:75:c3:77:c5:85:cb:95:e4:bc:26:58:
38:45:3a:80:bb:8e:66:28:7b:e9:ed:17:92:62:ed:
f1:85:2e:41:1c:9a:32:50:23:08:df:c3:61:e8:ab:
ad:78:1e:92:69:7f:89:bf:50:3e:94:fb:2c:7c:33:
93:8f:1f:28:03:f2:cc:f5:2d:79:a6:24:d9:d9:af:
36:d8:77:5a:a9:6e:81:f7:43:4a:34:51:88:df:6b:
08:a8:c5:aa:56:f7:e7:43:bf:4f:4c:f3:63:5a:8f:
73:48:da:de:5f:27:2b:e3:be:86:c8:1c:7b:07:2e:
bc:f0:b1:d3:c7:a3:47:b0:26:53:34:18:1a:77:b7:
50:ef:19:66:7b:61:bb:f8:9e:12:c7:09:15:d6:1c:
4f:cd:35:a6:e8:ae:9f:8d:85:57:4a:ef:c8:92:cf:
d5:d3:c8:79:19:d3:d8:80:ef:a3:d8:0a:14:71:a7:
5f:33
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
17:c7:95:a5:01:f5:93:5d:4a:e2:24:5f:58:6b:ce:37:2c:61:
76:86:43:ee:52:fa:62:b0:fe:d6:c2:51:7c:6e:4d:4f:95:43:
fd:d5:57:8e:5c:84:3a:2d:15:b0:78:bc:aa:66:67:b6:37:ae:
f6:5c:f6:4c:a3:c9:23:a7:55:95:88:6a:8a:77:8a:dd:0e:3f:
32:1c:a3:1f:a3:71:2e:89:a3:07:6e:35:fd:b4:24:9f:26:20:
8e:3a:e8:ef:77:3a:38:9e:5e:f9:14:e3:9d:4a:92:65:b5:6f:
47:0f:f1:50:b4:bc:65:10:fd:3c:94:eb:b4:20:81:a0:0f:81:
56:97:ef:a6:44:cb:df:c6:0b:b6:27:21:05:5d:f8:ee:aa:4e:
70:5f:33:28:65:8a:10:1d:e0:f6:91:36:a8:17:69:7b:64:8c:
8b:41:09:e4:c6:44:40:d6:98:fe:67:52:13:84:4c:99:33:e6:
da:7a:a0:13:a0:7d:cd:9b:01:62:1c:b1:23:8f:05:76:e8:63:
d7:1c:7d:eb:b8:6b:15:77:76:84:67:78:97:14:53:ed:b5:d2:
d5:07:c6:e7:3a:1b:d2:df:d2:f3:98:9d:b5:9a:71:90:26:46:
2f:8a:69:13:4d:61:ce:25:4a:51:6c:92:4a:39:d0:4a:86:c6:
bd:a3:b9:b0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 14:21:57 2025 GMT
Not After : May 31 14:21:57 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
11:37:4f:25:38:6e:a6:74:48:d2:38:d1:02:c3:86:c7:b2:af:
27:6c:a3:d5:e7:6c:6c:b3:b1:f5:38:4e:43:b2:ed:7b:15:0e:
cf:d9:9c:8b:c8:c3:ef:10:98:fd:78:50:ae:49:86:54:b4:46:
f4:52:62:78:ca:61:2e:7c:12:de:c4:30:a5:97:ee:67:ab:da:
f2:48:79:2f:22:1e:21:42:be:63:24:b9:c1:94:67:3e:72:1b:
1d:56:44:54:7e:c3:ee:6d:f8:db:94:bd:5e:e8:c7:5f:12:c6:
b3:c1:27:33:ad:d4:c8:41:17:17:ad:c6:9e:d9:21:e0:8e:1b:
27:52:b5:22:94:57:c3:d7:34:c5:69:c6:8f:ce:86:fa:0c:3a:
c7:66:be:5a:fe:3b:c8:39:cf:e0:8e:90:06:c7:b3:29:7c:e8:
5b:c9:07:95:07:98:24:c5:64:df:07:a6:cd:81:6d:47:01:58:
45:97:4f:23:5a:31:0a:01:8d:e4:fd:9c:cc:63:6c:16:95:b8:
0b:3a:96:fd:fd:ae:46:d2:53:32:fb:df:40:73:7a:5c:56:a4:
0d:00:32:51:3f:92:f4:98:55:14:df:74:2a:db:2e:3f:71:11:
d1:36:96:b6:b4:0d:e9:45:e2:a3:3b:64:d2:24:7f:14:2e:4a:
e5:fe:2e:b2
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,905,478 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:34:27 2025 GMT
Not After : Jun 29 13:34:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e0:9b:68:51:77:5f:5f:7b:86:88:ab:6d:4b:cc:
1e:2f:d4:e9:63:ce:79:48:ef:87:b5:bc:75:16:c5:
56:ad:3d:8f:8d:35:ea:2f:65:3a:f5:6d:51:33:c5:
3f:16:83:84:bd:9c:f2:83:09:fb:a5:92:46:e3:8f:
6e:37:fd:fb:88:b1:54:fa:f5:6c:34:cc:39:54:fc:
29:54:26:51:83:56:93:e9:ef:ed:00:77:fa:c5:a8:
2c:d1:08:bd:47:7b:cf:2d:de:75:ac:1a:f1:11:33:
58:5b:a7:f0:fc:3d:9e:8a:37:9f:0f:b4:e7:79:1c:
8c:cc:e1:1c:be:7f:23:b4:ac:ae:09:25:73:f4:fb:
49:e9:fe:60:c1:4d:31:e4:7c:be:41:f8:16:19:41:
41:31:bb:89:87:55:37:44:89:6c:07:9d:61:cf:e6:
40:fc:0d:6e:6f:6e:99:a6:f8:b9:29:94:fb:ae:7a:
57:62:4b:c9:9e:e9:9c:08:65:9b:6c:2e:a5:2d:a8:
97:89:1a:b3:43:7d:07:58:a7:a3:33:e3:b6:85:ce:
c2:a9:a8:bb:06:c4:ef:3c:2a:30:2a:7f:74:95:71:
ad:63:a3:93:c1:eb:1f:d9:a2:a5:49:dc:43:9e:d0:
64:01:98:26:ea:4a:db:5c:c9:0b:bc:e2:14:8e:7b:
e3:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b9:4e:8c:5f:aa:66:e2:fb:b1:00:3a:8e:06:ab:df:a8:57:f9:
2c:7e:a7:e9:ef:ab:d5:50:56:0b:23:64:da:aa:cb:94:c1:c2:
70:7e:2a:97:46:e1:3d:fb:16:fb:65:77:8f:e2:b2:cf:e9:08:
bc:a9:42:bc:db:99:44:12:4e:72:d2:a9:71:86:76:fb:cf:ae:
f5:77:db:7b:28:aa:da:09:b4:f3:2f:3c:35:71:09:cf:3a:fd:
d6:e8:eb:15:66:08:66:ce:57:a6:80:37:fb:1a:ee:a9:8a:47:
99:d3:86:22:4b:79:92:b6:c2:70:44:13:3c:ef:11:ad:6b:09:
1e:dc:93:f5:36:94:81:e9:68:62:0d:74:cd:c8:37:50:fd:91:
56:ee:b3:c8:f8:83:0f:5c:c5:1d:c9:38:f1:2b:5e:76:a4:13:
9e:b3:ba:80:e5:0e:52:7b:b6:55:85:63:e0:cd:dd:bf:7a:e9:
d8:04:d0:d8:ff:ea:3e:80:73:6f:58:46:8b:ff:af:6f:de:30:
b0:0a:79:2b:9c:5d:46:05:32:27:12:07:51:82:0e:66:e4:fd:
74:30:6f:c2:b2:85:35:b2:ce:7a:6f:72:e1:f5:0c:fd:33:a6:
2a:a5:b0:b9:40:49:b1:42:d7:00:c7:e5:11:77:d6:57:ad:da:
88:5f:8f:6c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 13:34:28 2025 GMT
Not After : May 31 13:34:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:fd:b5:5d:99:fe:ea:9d:99:f6:7f:7d:10:38:95:7c:63:b1:
6c:bb:2b:60:f9:1f:6e:8c:44:95:8f:94:cf:d6:d2:22:1d:07:
7b:b0:7c:c4:47:3a:df:ed:db:3c:e9:fc:b8:55:30:08:8e:0f:
22:e8:a4:d7:cf:b1:39:a9:53:7c:c5:db:78:b8:be:9d:a9:93:
a0:a4:29:d2:ef:f3:c0:6b:f2:37:98:d5:ec:ad:4a:13:58:a4:
63:60:f2:ff:9d:04:78:3d:ed:c8:a3:3b:33:11:7c:3e:a1:17:
1e:fb:a0:bb:e9:89:f2:ba:dd:e9:f0:2e:30:a9:ee:8b:02:01:
db:a0:16:99:83:fa:7d:e9:3d:69:ba:35:5b:b9:2c:31:dc:21:
52:6d:be:d8:f4:2a:5d:b8:9f:f4:df:fb:cf:3f:15:12:ba:a7:
b0:f6:aa:9d:87:55:4b:de:f8:af:f6:68:7d:29:45:bd:40:1c:
e5:ee:a3:7d:74:f2:16:c8:e0:75:14:f9:da:c0:d9:f6:2c:38:
0c:9d:42:41:ac:4d:f1:95:c2:c5:50:cc:e2:72:51:e0:a6:a8:
20:b6:b9:fc:1b:c3:73:1a:34:28:5c:22:3a:bd:38:e6:64:4f:
68:93:03:05:b9:dc:61:ef:02:1d:5c:44:54:f4:c1:65:a4:9f:
2e:d9:4a:72
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,406,051 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:09 2025 GMT
Not After : Jun 29 11:50:09 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bc:67:b8:4c:e9:b2:4a:d5:bb:a6:bc:72:bc:d1:
e4:a9:2a:6c:d7:3c:c3:07:d3:46:12:17:0c:45:24:
65:1b:f7:c9:ca:0a:f2:e1:85:0d:10:c8:0f:6c:fa:
34:d6:bf:0d:2d:0b:52:c3:b6:30:0d:a9:4d:a8:f4:
df:fa:d2:d7:f4:fe:0f:0b:b7:ab:b7:a5:2a:47:03:
71:f1:19:ef:5e:b2:bd:2b:ef:4a:a9:c0:23:6a:98:
0f:81:9b:04:97:c7:a3:cf:50:f6:2f:0a:36:b9:fb:
58:c8:a2:d6:7f:7f:79:ae:be:48:5f:71:de:ce:f4:
2b:cc:94:4f:c9:70:21:fa:f3:4b:3d:ca:34:65:8a:
03:a4:f2:22:3e:d6:e9:7c:d3:dc:66:b3:f8:d6:02:
30:58:c8:14:4d:cf:8f:7d:c9:b0:33:de:90:b2:86:
74:5d:81:36:9c:5f:c9:50:7a:9b:a5:27:04:ad:29:
a5:64:df:0e:56:c4:0b:7b:7e:80:cb:d7:5c:c3:f7:
6d:ca:09:5f:32:df:40:f8:5e:0b:90:6a:45:f4:08:
71:30:11:43:cd:4c:a2:c6:4c:92:69:b3:ae:5e:cb:
1e:40:f4:3a:5b:36:7d:c4:74:ff:66:56:ef:b1:96:
47:fc:24:68:c7:8f:ae:c0:d8:5f:37:95:c2:20:9e:
00:a5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:9d:68:f0:ee:d6:96:96:1a:8c:4f:e0:5a:21:43:ab:70:c3:
df:17:d3:2a:0e:9d:fe:14:96:5b:b3:55:8a:80:d1:8b:94:08:
80:ef:f2:05:fe:e6:20:b6:1c:13:5a:76:6e:b4:1a:21:d5:c0:
c6:1e:59:f3:bf:07:e8:de:4d:b9:fe:cc:bd:70:e0:42:9c:53:
22:13:47:27:d4:03:0b:6c:d5:a7:88:12:71:e4:d1:ef:e9:9f:
20:b5:70:cf:47:32:00:09:da:b4:54:ad:a0:8b:81:aa:10:e3:
ae:ab:36:1d:bf:4a:ef:b3:4e:f8:05:01:b6:0c:15:5b:4b:c5:
19:df:81:24:cb:61:0e:10:83:8b:bf:9e:06:1f:f5:5b:87:86:
4f:d6:09:a9:8b:d6:87:96:96:08:e9:2b:a1:be:f7:3f:3a:2a:
0f:6d:64:2c:a7:94:7d:f7:69:c2:63:d0:a7:6a:c4:26:2a:fe:
0b:9e:b5:e4:c2:26:3b:37:5d:b3:15:db:a6:39:2a:e1:f0:fb:
e2:24:e7:0c:19:67:51:c5:2a:cf:d1:05:f8:18:84:21:3b:65:
cd:3c:f7:76:9e:9d:31:0c:39:20:8f:1b:9a:08:df:60:dd:41:
a9:c2:fa:e3:51:ef:2f:97:de:cb:2c:ec:a5:fd:12:28:cc:5d:
7b:61:a4:57
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 11:50:10 2025 GMT
Not After : May 31 11:50:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1a:e0:7f:d3:95:7d:5a:05:d1:34:7d:53:ce:8a:e6:45:df:a5:
59:1c:26:b1:f8:d2:00:2b:af:d9:b2:6b:34:3d:b1:2d:17:02:
75:20:33:68:b1:3b:6b:fe:16:b5:33:9d:53:01:59:d1:ca:41:
2c:f8:8c:0d:d6:aa:a8:3e:75:7f:06:87:47:e1:50:1e:bd:59:
e4:e7:00:9e:72:89:a9:42:35:77:11:4f:3f:ae:62:2d:4e:1a:
c3:ff:9b:85:f6:06:82:fa:57:0b:71:38:d1:b6:dd:f0:3d:60:
4d:cd:ea:61:85:ae:d3:82:53:0a:9e:9d:96:88:22:42:9f:ce:
f5:80:90:51:c5:9a:50:03:29:25:c0:5c:46:83:aa:4c:8e:87:
b5:fb:38:c2:51:d0:ae:9d:ca:03:c9:0f:4f:21:5c:3f:20:4a:
3d:d8:0a:69:73:06:94:72:e5:04:85:0e:76:d4:9b:7e:29:a5:
8a:7e:db:6c:59:eb:76:1f:61:d0:7c:f6:23:5d:30:4c:c6:8f:
b7:ca:e3:62:d6:69:bc:cc:1b:3b:38:52:7a:81:7b:06:3d:55:
31:21:8d:22:ac:d5:d8:ed:b0:30:c5:59:a3:41:d0:5f:3d:4a:
5f:56:d7:30:7a:12:20:1c:53:73:f7:69:24:51:f2:58:e4:d6:
10:d2:42:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
Truncated 7958 bytes from beginning
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
3,101,893 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:04 2025 GMT
Not After : Jun 29 10:25:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f0:7d:1c:c4:5c:77:03:44:c7:10:22:f5:7a:bf:
80:e5:f5:c7:9d:ed:30:8a:02:cb:1f:8f:9b:f5:ad:
46:2d:1e:5c:07:7c:ec:55:82:ec:49:b3:6b:0b:b7:
58:07:ee:dc:23:d5:38:7c:43:68:8d:ff:1b:a8:b5:
54:9b:7e:6e:15:61:2a:eb:47:f9:c6:7e:80:0f:5a:
b0:64:ab:3c:bd:30:90:cb:1a:27:5e:e3:3c:9b:a0:
b3:72:42:86:a8:e2:99:49:67:c2:0f:2b:e0:a9:34:
88:c5:29:b4:55:38:27:91:06:be:0e:ca:a4:ef:96:
93:76:15:2f:2a:14:41:61:84:84:9b:c0:78:b4:17:
3a:b8:05:e7:5e:73:b7:73:16:a0:0f:c3:a9:8e:69:
d7:17:bd:d0:79:b1:c0:0a:06:88:b1:ca:73:92:65:
df:53:05:89:bc:54:78:84:cf:96:e4:ab:5f:b6:62:
46:d7:19:7e:42:43:e7:b6:29:e5:6b:50:94:3d:9e:
3f:81:06:7a:b1:e0:79:df:70:19:04:e8:b3:ec:3c:
2b:92:c2:c5:8c:f2:86:36:72:db:2c:2a:8c:d1:a6:
9f:93:7f:ba:14:e7:1c:6d:9d:90:84:23:9d:2e:64:
4f:80:28:99:d6:1b:06:35:9f:12:da:28:87:ce:7e:
10:ef
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
85:31:47:0b:5f:96:59:51:32:87:3f:74:c3:c1:fb:f1:a5:bd:
27:dd:e2:fe:b7:2d:f7:d2:e9:93:47:99:34:01:91:ab:e6:c4:
36:f5:37:68:f6:eb:22:07:59:11:c7:92:44:c3:09:84:fb:b2:
a0:7d:29:51:ae:00:8d:bb:28:d1:c8:54:e2:7f:ea:2f:c5:10:
b2:54:45:ee:7f:ce:b5:74:fd:ba:62:76:02:d2:29:f0:7a:f7:
15:67:6b:e8:6a:67:02:99:e4:56:20:96:60:90:5d:c6:32:e6:
58:c6:30:e9:15:79:85:af:bb:92:1b:05:fb:a8:c3:22:c8:3e:
e8:98:21:e4:e7:f4:8f:8f:73:80:3a:2b:8a:f6:79:9b:77:a3:
85:ab:70:2a:ec:7d:3e:dd:11:7b:bf:3a:6b:5b:8e:e7:42:a1:
ba:dd:2e:ff:ae:9b:c7:2b:45:3a:3c:c0:63:b2:82:37:05:a4:
4a:d7:99:e5:63:c9:20:47:9f:96:49:20:11:53:4d:84:73:03:
5c:03:c3:e2:80:10:81:46:78:07:b1:66:34:24:44:f9:b1:9a:
f3:d7:72:5c:ea:16:3d:4f:47:45:17:a2:80:46:63:02:12:68:
8d:ae:d3:2f:4c:fc:9e:a4:6f:18:28:9f:e7:3d:b4:06:16:a9:
9f:aa:b8:84
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:04 2025 GMT
Not After : May 31 10:25:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bf:1f:58:24:2e:42:ba:d7:2b:98:85:87:37:14:5d:44:42:10:
2f:05:cc:3d:7a:49:ec:1a:33:d6:06:90:01:13:0a:9a:1b:a2:
ad:5b:dd:84:9a:e5:9e:06:fe:a3:c1:07:d6:5c:2b:a2:c6:bf:
3a:44:b5:f1:ae:b5:0f:b4:d0:bc:d9:8f:14:5b:d0:c1:9d:0f:
b5:2b:84:74:1a:0c:a5:11:92:37:4b:78:b5:25:28:e0:ce:61:
19:ab:f5:64:74:88:88:08:78:20:9d:0d:ee:a2:7a:c1:4f:61:
2c:f3:7e:40:3b:f6:42:e4:21:8e:50:ce:7b:de:0b:b9:a0:17:
30:22:89:62:19:3b:2b:df:ba:17:15:14:1f:65:de:6d:be:f0:
ba:f6:f9:9f:aa:7e:c7:e6:37:27:d0:34:25:94:e9:58:f1:cd:
51:61:bc:96:4b:1e:93:08:36:28:9f:85:7a:27:89:38:50:00:
04:51:1c:65:32:ac:86:8d:e6:17:87:4b:7a:5f:64:f7:c2:70:
b8:a2:ec:30:a3:6f:83:8b:d4:e8:c7:d1:42:9c:8e:c4:83:8c:
63:15:a7:ee:de:99:65:52:3d:f0:97:3f:f4:58:f8:2a:b5:1b:
92:f9:40:0a:e9:6d:29:6d:d5:ba:f2:1c:ce:80:16:4d:2b:51:
e3:f6:63:01
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
Truncated 3082 bytes from beginning
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
2,851,156 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : Jun 29 10:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9c:68:c3:4d:a3:04:e5:ef:97:e4:d2:a8:41:7a:
c8:c9:a5:19:6b:7b:ee:2b:d1:71:e9:25:4a:58:51:
58:a3:d7:7c:dc:6b:cc:f9:6d:7d:35:29:cd:16:23:
67:65:fe:fd:a1:76:ba:bc:6b:1f:44:61:1a:8b:21:
13:2b:9c:d9:d6:35:ab:47:f9:75:c0:c8:13:f1:92:
54:33:c1:07:d7:3a:ae:4b:d1:27:a8:70:f7:39:e1:
e6:ad:02:12:ca:42:99:81:57:cf:8d:4f:72:8b:df:
b4:80:90:8c:51:79:d3:6c:93:8d:42:34:04:5e:4b:
b6:90:97:6b:d8:ba:ae:e7:7e:06:4c:11:6d:15:b1:
f4:a0:2a:df:73:c3:31:9a:3d:66:91:5f:f2:79:09:
bd:06:e3:32:1a:56:84:41:b6:f2:e9:c8:c8:ca:e4:
67:a3:96:34:8f:5b:01:73:18:54:01:95:ef:06:47:
ad:5d:4d:a3:aa:85:c7:a6:d6:65:a0:18:d0:dd:30:
e7:33:47:bd:dd:fe:fb:79:2e:a7:e1:96:81:6f:3d:
d0:53:b0:23:82:5b:cf:fe:04:6b:e7:75:d5:7b:d7:
12:c8:2a:74:9d:9e:c9:8e:fb:20:62:d3:3e:71:4d:
41:ed:d3:aa:39:e5:8d:8a:d9:ae:5a:44:d7:07:11:
f8:39
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
56:6e:0f:78:76:9b:28:69:5b:97:2b:cb:b5:ef:6c:a6:7a:c9:
d0:59:67:04:77:10:de:9b:cc:33:0c:f3:25:9d:b7:df:2d:42:
5c:c4:0b:05:18:f8:a0:f5:a3:94:6a:3e:ed:4c:87:10:41:21:
58:d2:f1:91:b5:cc:83:fb:d9:33:ae:84:bf:95:3a:fd:20:11:
04:af:20:c3:d3:b2:fc:d3:36:f7:cb:f0:72:60:d8:61:36:99:
cf:2b:c8:3d:ee:b8:f7:62:bc:fb:23:6c:40:a4:0f:38:c5:dd:
be:38:a9:4c:4a:da:96:56:a3:3a:2b:26:b1:aa:90:68:fc:4d:
41:c0:14:99:ef:8c:02:16:b6:b2:58:40:08:0d:9e:5c:24:d7:
b4:2b:c7:15:1e:bd:a2:4e:72:17:f7:d4:a7:37:66:2f:5c:59:
9c:ea:7c:d1:66:bf:61:44:7c:c4:8e:3f:17:91:96:fe:60:03:
48:f2:e1:64:09:95:14:0b:5e:b9:96:f6:41:f4:c0:15:69:18:
7f:bb:c2:e7:a6:68:0d:b9:e4:25:25:ac:51:88:eb:98:56:31:
4f:c4:88:9c:68:6c:09:a5:26:24:e1:ee:6e:97:7b:65:74:74:
4c:9c:4a:be:f4:a7:99:20:04:1d:d2:71:b6:af:3d:ad:6e:71:
38:36:9b:b5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : May 31 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
91:f3:63:a4:04:24:24:68:bb:3f:cd:11:60:73:d4:ca:2b:0e:
20:33:15:b3:8d:0b:1f:85:66:2d:ba:78:4d:0f:78:d5:22:ce:
23:01:d8:b7:39:cc:05:d8:70:ef:13:9b:6c:1c:ed:60:d9:03:
1d:93:c2:06:d8:15:7d:05:a6:db:a5:fe:9b:ff:fa:bd:89:ea:
37:ca:c5:0c:11:37:f5:c4:b5:c2:87:02:82:6e:e9:f9:b7:d7:
6e:f3:f2:b5:f3:1b:04:1d:01:e3:90:5a:96:75:be:ec:a3:de:
53:3d:74:95:bc:b9:f5:77:c1:a6:d7:59:c4:7d:d3:99:a2:fb:
c3:0d:cb:be:fe:d1:53:04:7f:ad:cc:6d:49:c8:bd:f1:e9:bb:
ce:43:1a:67:19:3b:4d:85:72:fa:8b:ce:eb:b4:f7:bf:ef:95:
b6:be:38:c4:5a:0b:9d:f0:93:25:fc:9b:49:32:1f:be:ff:4e:
72:65:a8:05:1f:1d:b3:1e:72:45:23:cb:d9:15:90:b5:0d:a5:
bc:f1:0b:c9:0d:9f:26:4c:5f:6c:81:04:fb:58:37:df:52:13:
83:8e:7a:f5:79:4c:ed:49:20:7c:da:e9:19:8a:ba:87:68:06:
18:e8:96:3c:20:ad:c9:5c:c1:1d:2f:1d:74:fa:df:84:b2:57:
28:9e:fe:df
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
Truncated 7958 bytes from beginning
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
3,101,924 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:25 2025 GMT
Not After : Jun 29 10:25:25 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ae:0f:b3:de:ca:4f:96:fe:6a:47:4c:d9:2b:d3:
7d:83:83:99:62:20:af:7d:bd:e4:85:63:39:59:73:
74:09:b6:09:f5:a1:9c:9b:b3:92:02:a7:af:f9:ca:
51:84:13:96:ab:c6:19:44:4c:24:c2:28:d3:e3:8a:
ec:93:ea:4d:67:73:d8:aa:91:86:fc:6f:55:4d:dc:
bc:7d:a1:5d:0c:4f:00:6a:5a:fa:62:fb:06:1a:cd:
28:cd:e3:bf:f1:0d:8e:e7:d5:9c:66:14:55:a9:ff:
89:06:5d:a1:9e:05:fa:84:f3:fd:8f:f7:5f:a3:ca:
a7:bb:37:bf:86:20:32:ef:c6:9c:28:d8:74:93:80:
43:6e:0a:c2:f9:c9:bd:1f:08:ac:d0:60:4e:4b:51:
70:f9:10:c8:7e:c2:9d:ec:08:71:3a:73:1f:27:da:
c1:dd:52:f6:47:5c:f2:0b:be:1b:14:b9:13:64:15:
bb:6e:a4:1a:80:8a:28:d0:f9:4d:f1:c7:f8:d7:40:
60:ce:5b:2c:de:0f:4e:68:a3:82:93:36:2c:d4:6f:
19:86:29:36:11:45:4c:28:23:00:33:3e:bf:fb:ab:
81:c6:ab:9e:a9:73:61:e6:b1:13:56:b5:82:98:11:
83:50:bd:cc:3f:fa:b8:ac:c9:6c:2a:b5:16:f4:17:
3e:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a7:ce:ae:88:29:3c:dd:67:cb:32:37:70:7d:37:a7:86:56:d4:
cf:c7:37:a4:92:a5:eb:de:e1:d8:44:f4:f4:81:56:f4:46:9f:
c5:4a:6b:2f:be:63:0d:41:66:e7:02:8a:3a:03:ce:b0:f3:5d:
a2:cc:34:b8:d7:e6:8a:71:63:0c:7a:4e:b3:12:c0:1b:9c:45:
bb:01:6c:61:94:9f:14:2d:4f:b6:13:7d:a2:e7:59:84:ee:9e:
76:fa:19:95:12:5e:ee:5e:53:11:36:3b:1c:ed:64:04:39:59:
aa:99:4f:18:ae:f4:fb:fa:5d:3a:d5:9a:05:6b:59:b9:ab:d3:
31:ac:ce:be:9a:c7:c5:d5:c9:35:6d:7a:ab:78:e7:98:2d:3c:
43:55:68:05:35:75:b4:eb:9a:86:6a:23:70:39:c5:09:f1:c9:
cd:d9:80:84:1b:5b:42:62:aa:15:1c:23:cf:d5:6a:ee:8b:55:
23:65:85:f8:69:04:b1:0c:a3:ee:c4:b6:25:62:38:4a:56:ec:
0d:83:cc:d3:e5:dc:47:a4:2c:ee:27:39:97:90:cf:f7:8d:47:
ef:9b:7b:4d:39:11:29:85:5a:67:bd:a0:ee:ea:68:50:8d:fa:
ed:52:27:e3:89:2f:9c:2a:32:07:98:ec:de:20:f4:2b:fe:a0:
88:54:6f:bd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:25 2025 GMT
Not After : May 31 10:25:25 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3a:56:7c:cc:ce:a0:4f:df:82:ec:bc:74:bd:9e:8e:aa:46:a6:
3e:ce:f2:a1:fb:6a:fe:7f:d6:a5:5a:6b:8b:0a:47:49:14:04:
77:53:5e:cc:83:4b:96:0b:12:34:54:88:b9:ab:b0:bb:21:87:
0a:29:be:24:b8:42:0f:5a:9c:c3:af:98:86:ff:ef:fb:0a:af:
84:8e:32:9c:89:04:78:cd:6c:13:ab:1f:68:f4:a6:97:d7:23:
a8:bd:dc:51:ca:bc:0a:fe:0d:98:06:ff:a3:72:e8:73:ea:0f:
71:fc:4f:6a:55:9a:60:c3:9c:21:5c:78:e7:ac:7d:c8:99:c2:
1c:54:37:28:78:c7:b1:90:a3:58:93:c6:d0:71:d1:b3:87:de:
a3:14:b5:78:75:89:e4:4a:8a:24:31:7f:db:8c:84:72:45:ee:
d5:22:05:46:af:8f:41:58:91:bb:a0:6e:d0:87:8b:64:9d:41:
b9:18:7b:ce:1e:84:55:51:28:cd:9e:3b:13:c2:5c:70:5c:99:
22:45:b3:8c:f9:44:d3:3b:b0:4f:f1:56:37:be:7d:be:22:02:
ab:8c:6e:7d:26:ce:0e:e9:ca:31:88:1c:3d:9b:d3:54:a4:ef:
cc:e9:a7:60:aa:b6:2b:a1:e6:e9:dd:26:68:40:b0:12:ee:5b:
de:3c:b3:7a
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,851,497 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:14 2025 GMT
Not After : Jun 29 10:25:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ec:96:ff:ec:e6:07:cc:90:b5:2a:c9:96:24:29:
33:e2:e4:08:8d:70:5d:18:9c:f3:21:c2:0e:9c:18:
ed:ea:3d:1e:bd:0a:5c:34:25:d2:86:6e:59:a3:81:
13:ec:69:3f:06:bd:48:55:2b:ba:2b:3e:d3:a8:93:
cc:6b:83:4f:07:2c:e8:dd:dc:c9:6e:1e:85:d3:7f:
f8:6d:97:ee:54:73:73:31:3a:93:3b:de:3c:2e:2c:
7b:2d:f9:e0:62:ad:ec:2a:c5:41:fe:1c:18:c0:6f:
c9:3c:4d:1d:f0:21:e2:e8:39:39:8c:bf:bf:99:86:
5f:4b:98:04:29:a2:08:ef:37:71:b9:ba:6c:d6:89:
3b:ac:09:12:31:fb:9b:ae:63:0d:55:d2:06:fd:e0:
b4:29:b6:16:2b:c5:2a:49:71:4c:c8:a1:ce:8f:e6:
16:ef:ca:69:64:4a:60:fb:c6:97:b4:df:ae:a8:86:
78:34:91:3c:70:be:3a:c0:03:76:d1:10:b3:69:9a:
d1:5c:60:91:96:0c:74:23:d0:97:9d:69:0d:9a:aa:
3b:ba:15:43:38:b9:04:00:d2:22:0d:03:05:7f:59:
2d:ed:47:6c:a9:e3:e7:73:3f:46:7f:a1:df:c0:12:
4f:13:7d:93:d8:d8:e5:56:2b:5a:16:11:aa:e3:bc:
cb:77
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0d:cd:d2:25:f7:d4:41:14:f4:7f:ce:36:16:23:2c:8d:ee:a8:
11:29:d1:38:12:e8:8d:41:7e:a7:b4:28:bc:72:63:83:91:d1:
ae:e5:bc:72:93:9d:1a:69:2b:8e:8a:52:b3:c0:0e:0d:d5:2c:
f0:8e:9b:54:fb:61:d4:64:1d:d4:82:6a:e7:b6:89:98:5f:a1:
35:16:a9:ed:35:e5:9d:43:54:c3:75:d7:6b:37:47:44:43:ba:
e5:3b:43:4e:47:39:8c:d4:74:33:48:d2:25:23:65:9b:ac:e7:
72:80:09:72:42:8e:5d:25:d9:3d:0f:78:06:60:09:15:f7:41:
89:7f:cc:83:6b:ed:2b:38:61:af:4d:21:4a:79:c8:24:f4:09:
9b:e4:64:14:85:6e:74:a3:39:f4:5c:8f:fa:05:63:56:fb:29:
b3:cd:5b:57:3c:5b:c9:b1:29:57:72:9f:a4:1b:ae:31:20:5f:
79:e5:c5:37:79:ed:2a:32:74:fb:24:bd:6d:9e:c7:b6:b2:0f:
2f:88:ce:ef:ac:27:98:0b:8c:06:d5:94:9c:65:4a:e4:49:17:
9e:fc:e4:a7:db:90:94:5f:fa:ac:d0:ec:19:34:1d:bd:e5:18:
0d:37:d0:54:cc:56:9c:83:d3:ea:85:f6:3c:8f:ae:2e:5c:78:
e1:40:34:67
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:14 2025 GMT
Not After : May 31 10:25:14 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
96:70:a7:87:87:1b:a0:5a:a4:d8:db:e5:ec:c6:56:cf:b3:49:
db:33:48:c3:26:9a:6f:5b:9f:4e:eb:f4:ad:f8:f8:c6:06:d9:
40:41:62:ac:dd:91:30:3b:56:4e:56:a6:6d:94:ea:75:73:fc:
ec:68:c4:d5:d7:7d:66:c9:41:03:bb:c7:01:6c:0e:28:b4:01:
44:e4:67:aa:6e:f6:01:d0:41:c0:2f:e4:d5:5d:20:0c:6e:f3:
51:26:94:ca:96:6f:bb:41:27:e3:70:ac:b1:d8:1f:c4:a7:61:
89:42:be:9b:16:96:f5:ef:a2:4d:55:6d:36:03:66:be:4e:64:
ee:3e:3f:85:2e:ef:54:3b:f9:20:13:7e:a2:53:4b:43:88:13:
5d:bb:fc:3f:25:b5:fb:92:b6:19:38:d7:d3:9c:d2:de:4b:3a:
c5:66:c5:ca:da:52:54:33:e4:a8:92:46:ef:2c:4b:1d:fe:13:
de:88:21:d3:e4:05:ff:4d:82:5e:da:24:9f:4e:a4:2f:a8:46:
21:a6:38:69:fe:1b:d8:74:f9:28:74:57:38:df:61:63:b2:a7:
68:34:cc:7a:e3:b4:ad:f8:a5:0b:0e:47:e4:5f:16:1d:e2:4a:
48:25:05:2d:bc:36:5e:b1:7e:42:f7:c5:63:63:31:78:59:4e:
fe:8b:be:62
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
Truncated 7958 bytes from beginning
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
3,101,321 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:07 2025 GMT
Not After : Jun 29 10:25:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:9e:01:20:a4:9a:72:07:6c:15:29:0c:2d:c1:
c4:ce:4c:a5:49:27:a9:d7:65:d6:4a:af:1b:21:9f:
bd:62:a0:15:68:11:27:1e:af:67:0f:d1:45:49:53:
d9:83:26:e6:c1:d7:7a:91:de:12:2b:92:b4:d8:b1:
d4:54:d9:18:41:f2:2e:4f:ce:9d:c3:5d:41:55:82:
93:06:c5:f4:2c:ed:5d:d8:b6:5a:d1:d9:dc:7e:f2:
14:44:1c:0e:3e:b4:7a:4e:2c:76:b0:48:f4:2d:10:
04:56:e6:14:a3:e9:27:3d:a1:8d:7e:f2:82:7b:e2:
4e:28:2f:e0:fa:76:24:84:76:9e:c4:94:d7:0a:70:
50:11:59:90:31:12:c6:6c:50:a3:31:85:5b:94:fa:
71:23:03:fd:90:82:66:a1:2e:51:03:9d:ec:19:5a:
9d:a2:c1:ad:f9:7c:e5:ea:2d:03:b3:fa:eb:2a:b4:
4c:77:d3:d6:fb:97:87:f6:fb:4e:98:3d:3e:16:df:
4b:da:5f:fc:dc:1f:ba:f7:b1:9a:78:2c:77:ae:3f:
2d:db:63:74:1f:0e:71:94:2a:30:15:68:82:75:36:
4f:93:1b:6d:a0:ac:69:4c:1f:38:c3:c9:e7:75:44:
e0:38:76:66:be:23:79:15:04:a2:b0:2b:89:73:c5:
fb:77
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
10:56:d6:06:2c:3d:4e:df:75:af:2a:0c:b2:dc:56:e5:b9:60:
31:23:0c:a4:8c:c3:ee:48:5d:6f:6d:3d:b1:48:3d:b3:a4:08:
26:9b:a4:dd:cd:b7:e1:05:06:1d:e3:c9:94:08:13:c1:64:aa:
e9:a2:58:15:52:c3:f5:d9:be:e3:de:9e:09:f6:62:c5:ee:1a:
ba:47:27:81:fe:f9:3e:6e:a8:44:cb:5f:b9:4c:b0:f1:ed:1c:
28:97:4e:c8:d3:7b:22:60:23:c8:2c:96:8c:f4:74:12:fe:1c:
00:1a:e1:8a:7e:cf:04:46:a0:d1:8b:61:95:72:3e:d6:15:c4:
a5:4f:fe:22:de:99:31:1b:1c:28:25:63:de:ee:4f:ad:3c:1c:
4a:a2:8f:7c:de:3a:da:4e:91:34:02:49:1b:6e:67:9a:77:8f:
ca:41:27:20:67:93:26:f0:6b:97:b3:4e:1c:d4:ba:8b:eb:e1:
04:4a:b8:64:86:ee:6d:a8:a9:55:81:22:4c:32:c9:a2:4c:b4:
d0:56:ae:b6:cf:53:40:c9:21:1f:43:a3:46:33:0d:e3:b0:fe:
e5:ef:1f:c9:c9:12:e4:85:cb:87:09:e3:40:d9:be:00:d5:6a:
90:e6:fd:55:77:e5:9f:73:c5:fe:7f:2b:ee:09:b7:d1:31:4b:
cf:97:d1:4d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:07 2025 GMT
Not After : May 31 10:25:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
42:98:c0:d6:2c:fa:13:2b:1b:54:fa:95:dd:cd:fe:a4:34:3d:
7c:ad:44:d6:2c:d1:68:3f:2b:bf:05:36:27:5f:4b:29:26:1e:
e1:43:d2:53:4d:c0:0c:94:9a:b0:32:62:0d:82:af:52:ba:dc:
66:5b:ec:fa:8b:c0:b9:19:5b:5b:41:b9:3b:14:ee:09:2b:56:
83:49:2a:c1:06:82:7a:d5:bc:d3:0c:2a:70:68:03:76:d4:8f:
f6:9f:22:6c:1a:40:ed:02:4f:db:04:b0:31:f3:2a:c2:29:12:
eb:1a:83:6b:ec:ef:61:46:fe:d5:ad:e3:7d:f4:41:82:c4:64:
35:7d:8b:98:e1:41:41:9b:3e:5c:a4:79:8d:59:1d:01:1c:20:
cb:75:aa:6e:10:a2:3e:24:72:c3:7f:46:64:49:b7:5e:1e:80:
e0:ca:a6:86:5e:0f:9f:3a:bb:dd:31:ab:cc:2f:ad:46:ce:ae:
e0:33:a8:de:f8:f7:99:0d:71:ea:8b:f9:c9:ef:35:78:16:a8:
d1:fd:ee:23:78:1f:54:04:48:7d:55:a4:81:85:07:1d:76:a8:
22:94:62:48:fe:16:08:4f:79:a6:a0:94:55:33:64:ea:ee:10:
c4:79:3a:d9:9e:ba:ed:75:77:ea:89:da:91:82:f9:4f:47:f2:
7e:34:86:d8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
Truncated 3082 bytes from beginning
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
2,850,388 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:12 2025 GMT
Not After : Jun 29 10:25:12 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ca:e7:b5:eb:d2:a0:16:55:1a:26:7b:6f:1f:e8:
40:89:54:be:bb:f6:c4:40:ab:97:43:0a:ed:d0:61:
c9:22:1c:2a:98:95:60:1b:8c:bf:82:24:c9:7f:03:
ba:d0:5a:8e:e9:5f:ed:0c:e8:e7:53:94:ea:44:93:
19:96:6d:9f:05:db:b2:47:84:49:5a:a9:6f:1f:2a:
74:60:d5:59:31:e0:da:06:26:bc:b1:cf:32:d0:00:
f5:24:fa:5d:b8:17:57:74:7a:6d:46:30:0c:85:a8:
0f:bc:f5:b8:9b:c2:de:b5:c0:44:ad:8f:9d:96:33:
83:1d:7c:38:f3:04:bc:55:21:a0:16:6b:0b:7d:6f:
0f:23:69:35:01:d3:1b:2f:49:6f:67:32:3f:dc:5c:
2c:40:0e:79:11:90:00:9d:38:de:62:3d:82:e2:c9:
32:fe:a7:43:c3:d3:37:a3:05:c5:f2:e0:c6:26:95:
38:c1:57:39:1f:35:6f:a9:76:d2:e5:e6:d4:79:e6:
09:31:4b:a5:5e:c4:38:98:1e:5f:c6:8e:b3:c8:f5:
4d:c9:f4:89:6b:bf:07:c7:dc:4e:33:dc:ff:c4:83:
13:b7:06:d5:63:12:30:8b:06:7c:6d:2c:47:f5:33:
af:56:95:33:bd:b2:d4:b7:f5:6d:99:f8:67:d4:c9:
ae:27
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
50:d7:b3:9c:c0:6f:17:f0:a9:31:18:b8:f5:9b:53:7a:a3:8a:
8d:75:63:4f:07:9f:31:6b:6e:1d:e8:20:ab:7a:29:4f:06:31:
25:81:4f:b8:ab:f5:0a:11:53:ac:3a:2e:7f:2f:ee:d6:e0:5f:
a5:1a:e5:79:5a:a0:b7:93:50:47:f1:88:b8:34:dc:3d:d8:12:
09:2e:6f:23:67:33:03:a0:ac:41:ae:e6:0a:2b:31:1f:30:b6:
c8:b7:68:66:46:bf:49:99:01:67:f3:2d:c7:7a:1f:d6:7f:44:
bc:fd:fe:0b:5b:4e:3f:04:78:2e:25:0f:56:e4:a7:7f:d4:a1:
d4:6e:fb:f7:27:c3:8d:f0:dc:c4:28:62:2a:11:0e:5f:bd:b3:
89:dd:16:a9:da:e4:2d:8a:4e:1c:3e:9c:cd:3d:33:60:e5:f1:
e5:6f:43:9b:b3:b1:cd:08:e7:a3:9e:22:9c:c4:b1:78:c1:8a:
b7:2b:95:61:30:8f:49:50:36:01:c4:ba:df:01:22:fd:f1:29:
e1:ca:0a:13:87:41:94:33:11:59:69:89:69:dc:87:15:e3:4e:
33:69:31:cf:92:0c:3a:d1:94:e5:e3:2d:01:1c:a8:c2:37:21:
85:1e:05:1c:26:7f:dc:16:96:48:7e:6a:5f:2b:5f:78:c5:ea:
8a:67:e5:68
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:12 2025 GMT
Not After : May 31 10:25:12 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
74:91:ba:c7:ea:0b:f2:74:fa:86:e0:a2:0f:03:ab:d0:9f:3b:
16:a8:43:44:35:47:87:16:0a:d0:15:07:3e:b1:46:f6:76:fb:
76:16:f7:7a:2d:51:df:63:33:48:17:c4:98:a6:bf:c8:ad:39:
52:0f:1a:ca:a2:51:a4:0f:60:2f:56:ce:c6:81:70:c1:73:2f:
67:34:ab:80:05:d8:35:1a:c2:ba:11:07:0a:b2:a7:b0:f8:eb:
96:4b:a9:1e:39:8d:b5:9a:c2:ce:48:4c:f0:28:e7:32:d0:36:
40:a4:2e:10:3d:ff:66:2d:2e:7e:2d:15:13:b8:f2:96:ef:19:
26:c0:f6:27:78:63:88:30:d3:89:e0:e0:05:c5:02:96:aa:62:
57:b4:15:45:da:04:84:d9:5f:77:d2:3d:dc:59:ae:7f:2c:f1:
1a:93:2d:2e:1f:2b:f9:99:0d:59:05:1b:bf:03:de:d3:2e:9f:
da:c2:4e:64:e1:b3:da:a9:0e:f6:a4:84:48:2a:1e:95:76:bc:
26:17:a2:5a:0b:4b:1b:c6:02:00:d0:57:8c:c7:95:3c:fc:e7:
89:fe:a2:45:e0:5b:76:c3:86:25:00:19:3f:e0:c3:1d:5d:ea:
f5:75:3f:cf:13:6e:ab:eb:bc:14:49:17:90:8c:b4:28:c0:68:
bc:85:5b:2e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7958 bytes from beginning
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
3,103,014 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:10 2025 GMT
Not After : Jun 29 10:25:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:1f:93:b1:c1:a1:86:21:09:94:a6:94:9f:f3:
49:fa:22:02:0d:a6:fe:cb:cb:94:ab:90:9b:01:cd:
f0:46:30:1e:8f:e3:70:45:75:76:e3:1d:e5:6e:90:
8f:ca:2f:83:82:12:8b:76:4d:8c:a6:e5:50:e6:c4:
33:72:c0:a2:44:fe:30:b2:e3:88:31:b8:14:3a:75:
65:71:e5:fc:ea:9c:69:0c:b6:24:e1:21:d4:12:2e:
6d:ff:8d:d3:16:e4:a2:7e:4c:0e:b2:71:5e:86:17:
87:f1:e2:14:60:c7:55:a0:a6:f5:d4:de:ca:21:3f:
0a:e0:5d:f1:74:20:4b:3c:ec:e2:e2:97:fb:e5:0f:
48:59:4f:74:4a:f1:e6:d7:09:82:e8:fa:6b:1c:de:
39:83:84:ad:cf:8b:26:6a:ba:bd:f4:d4:c0:05:58:
98:89:65:aa:fa:91:fc:f6:4b:df:95:cd:3c:df:7a:
90:a5:ce:6d:5a:a2:3d:5d:21:82:ea:35:5c:67:15:
8c:37:b9:b4:b1:23:f3:7e:dd:7e:b5:46:82:19:65:
20:35:ec:4f:c1:9a:b5:bb:ce:1f:43:03:8b:10:7c:
1a:80:fb:fc:91:01:d9:5f:4a:03:26:50:5f:e4:0c:
d0:f8:4b:07:d0:ef:c2:de:f1:d8:88:57:9e:b5:84:
0f:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2d:36:52:79:a6:18:b3:05:31:f4:cc:14:64:d1:db:6d:c9:68:
26:c1:4e:0b:96:59:63:22:32:f5:1f:52:a9:5b:1c:5c:58:67:
0d:a3:c5:e3:25:6d:11:fd:bb:0f:82:ae:57:b5:2f:a6:50:73:
f1:c8:42:de:66:7f:0c:74:ee:15:2b:e9:8e:a4:46:3c:b3:c6:
d2:e5:4a:02:d7:0e:17:57:64:79:5d:2d:87:2e:03:cf:7d:96:
53:27:b4:16:f3:4b:18:90:9a:ed:6b:45:af:a9:32:ed:41:a9:
5c:d3:3b:1b:ad:6d:01:2c:0a:c3:42:f8:ec:11:80:69:a8:c5:
18:55:b1:43:7f:ea:1a:40:15:6d:08:b7:2c:74:f7:c4:dd:3e:
9e:c8:3b:07:7d:b3:cc:a4:fd:27:db:8f:9d:d3:ce:93:b2:97:
ed:20:5b:08:c4:81:3b:f0:7f:a1:fa:fa:1d:44:e8:04:62:47:
6c:a5:01:ec:85:67:69:13:ae:99:ac:e1:b9:e2:81:22:e0:48:
17:f6:61:cf:9d:cb:f6:37:9a:3e:35:5a:85:12:74:0f:25:d0:
97:f9:9d:16:95:a7:88:fe:dc:52:06:e4:80:17:89:7a:2d:10:
f5:a4:50:f8:10:c9:1b:ba:45:3e:16:a0:60:63:b6:60:d9:5b:
eb:e3:eb:e7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:10 2025 GMT
Not After : May 31 10:25:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
96:7b:99:b9:da:31:2f:c6:c8:c7:c3:29:51:cb:89:95:69:63:
dd:f9:f3:d4:18:3b:35:7b:be:fb:44:38:e6:9c:08:da:3c:06:
0c:08:d6:87:7a:1f:c2:29:6b:db:f6:04:80:ba:c6:ab:2a:87:
16:20:22:96:13:cf:31:97:f0:f9:ce:ac:5b:44:26:a9:af:79:
03:9c:5e:b0:f0:9f:f7:21:f6:41:8b:51:8e:51:9a:a0:3f:69:
80:a0:13:22:65:0f:b5:31:4c:a7:60:47:5a:2d:5f:60:46:7c:
c4:1a:8b:f0:5a:69:e5:d4:e8:59:7a:b6:9f:fa:24:e7:75:e0:
74:1c:0d:a4:4e:62:ac:73:a2:20:8d:5f:a0:38:a8:d8:4d:4b:
a9:c7:f2:7b:54:f7:ce:d7:39:8a:71:68:5d:98:e2:e0:fa:cc:
79:64:01:9d:3c:7c:24:58:a5:c0:80:4e:a8:2f:84:8e:7e:b2:
b2:3f:d7:78:e5:1c:ca:2d:62:fb:8b:54:60:6d:c9:c3:41:99:
eb:a9:f6:0a:1e:41:6b:50:6c:7f:b4:65:a0:e0:26:a1:a5:f9:
65:cc:4a:cc:5d:4f:ab:c0:11:a8:b8:e4:76:65:5e:df:d2:ce:
c0:b9:11:08:b2:72:d4:47:df:a9:bd:3e:ba:92:5e:56:a4:9d:
65:67:45:24
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3082 bytes from beginning
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
2,851,447 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : Jun 29 10:25:02 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e3:67:b3:fa:56:93:62:09:b7:c2:34:f7:ac:8a:
bf:64:3f:94:1e:81:f4:a2:30:cf:93:61:80:19:00:
37:77:06:8f:e8:bd:71:1a:65:61:19:98:46:87:7f:
62:1b:d7:8d:4e:74:51:df:01:78:6c:76:eb:19:fc:
a5:4c:47:fe:fe:ce:c7:c4:d8:0e:cc:5e:96:4f:70:
50:45:72:74:be:c9:6f:4b:7e:da:47:81:91:85:f8:
90:81:b3:90:1b:ef:d2:62:64:a4:01:04:94:94:22:
0c:7e:01:f6:6d:d0:18:8f:cd:8d:6b:f8:25:dd:0f:
8d:45:fd:ed:c2:77:5b:d1:61:a5:c9:a7:ab:00:56:
c6:c9:ab:8e:ec:3d:8a:16:31:2b:75:a8:9f:09:80:
eb:ba:5b:ac:04:e7:74:99:59:1b:60:18:d0:5a:12:
32:e6:9f:17:b2:24:bf:b2:5d:7e:b1:30:d6:a9:94:
a6:67:bc:93:0c:26:56:9e:da:6b:71:c8:99:86:96:
42:08:d5:e3:cc:6c:fc:3a:b6:3b:44:0f:4e:59:58:
88:c4:04:7c:27:df:b3:ac:ad:6b:00:6c:66:3d:d7:
c9:f7:af:7a:d6:d9:8c:d0:3d:0f:1d:82:7f:98:b3:
81:a1:cd:b1:0c:d7:b9:48:01:43:c0:2d:6c:b2:36:
05:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7d:f2:08:23:40:a7:6a:6b:cf:94:42:9a:2d:48:0a:6c:1f:a7:
d4:5d:2d:e3:f2:36:d7:83:bc:59:1a:34:2c:c1:6b:c9:fb:78:
2d:93:97:fe:c7:20:10:c4:03:79:a1:f7:60:76:ed:ce:81:66:
18:27:26:6a:f3:f9:21:4f:f7:8c:37:ad:18:e4:ff:fc:4f:1f:
4b:91:36:b4:4c:08:e7:e7:77:10:83:06:fb:af:46:bd:79:25:
46:5b:b4:b1:49:e7:af:a9:ed:cd:90:0c:bd:74:a2:8d:26:1f:
54:3c:63:5e:26:ee:bc:4c:da:94:aa:c2:35:5c:77:06:0b:2f:
99:d4:f5:dc:42:8e:17:0a:a3:d1:f8:7f:58:99:3d:5f:33:5f:
40:70:03:9f:ae:97:1a:d6:00:4d:e0:db:9c:62:f5:50:01:85:
14:10:ae:72:e7:22:22:62:3e:b8:0b:ac:eb:1d:20:13:3e:6d:
83:8d:eb:07:83:66:d8:87:76:ea:c5:36:fd:ea:c8:55:b7:db:
9b:28:9e:07:fe:af:6c:aa:b7:63:74:00:3f:72:5c:9d:a0:45:
8d:7d:d9:37:af:1c:80:66:10:43:fa:61:37:40:9d:6d:8a:27:
b7:91:70:98:f3:03:91:da:8a:ff:0c:09:5c:d8:59:3f:9a:34:
fc:f8:59:ac
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : May 31 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a0:2b:79:15:a1:80:e4:2e:a5:cb:07:72:d6:c6:c6:d6:76:c1:
6a:34:dc:8e:98:4a:2c:a5:42:aa:e7:8c:e3:5d:74:2d:74:9d:
92:84:92:2e:d9:89:47:56:72:29:a6:c0:f6:79:33:d6:a8:6d:
6b:0c:50:cd:a0:de:9e:a8:ed:af:d5:a4:dc:8f:2e:6f:ed:2b:
87:a5:34:c2:ce:b1:f6:3b:b5:0f:08:40:be:88:e2:af:f4:32:
a0:1c:1f:69:f6:a6:ec:b7:23:9f:46:e8:60:53:1c:c3:57:1e:
16:fe:d3:b3:c5:68:47:78:f3:00:40:1d:de:ef:19:ae:d3:fe:
5a:82:2c:b0:a6:ae:6c:e1:01:42:2f:36:32:24:75:88:48:d2:
1f:48:a5:8b:2c:73:16:06:8d:2f:12:9e:11:0e:e1:02:95:12:
d1:5f:59:cc:15:37:83:4a:8d:b4:ca:95:a3:4d:6b:b0:91:f6:
e4:00:25:35:f4:f5:a1:5e:f6:28:7f:65:a9:7d:cd:e7:4d:3c:
f4:f6:76:d0:7a:d1:60:63:ce:4b:2d:d9:48:a8:c6:c2:27:22:
09:6c:4d:6e:98:71:ab:5e:de:41:9b:bc:6c:bb:fa:1e:f2:fd:
5b:a3:50:f6:dc:23:9c:08:f5:25:28:68:32:9b:01:8c:d8:a3:
d3:b4:67:14
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
Truncated 7958 bytes from beginning
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
3,101,195 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:03 2025 GMT
Not After : Jun 29 10:25:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bb:a8:42:be:81:85:d0:d3:1a:b0:4e:87:ac:b2:
06:cb:af:90:75:6b:46:48:7a:1a:81:f9:e8:cf:97:
d4:01:d4:7d:24:69:1f:54:83:d7:62:54:c8:97:58:
17:13:ae:df:b9:16:f9:4a:7d:ff:af:74:4c:ba:c1:
57:80:db:db:72:16:a9:8f:05:98:34:69:14:80:d3:
a3:5d:c9:43:0a:8f:09:27:b1:77:cc:e5:34:cb:3a:
91:f4:5c:fc:85:b9:b1:52:c4:45:76:d4:8a:1a:b5:
cb:37:17:b9:16:a1:2d:3d:c6:8e:c2:54:1b:10:9a:
4c:a9:57:c6:de:97:17:5f:b9:f2:01:53:87:e0:66:
57:e4:10:b5:84:25:66:5a:43:d5:b6:b6:7f:36:8a:
bc:f5:de:b9:31:77:7f:81:55:1b:f4:a8:2a:ab:3f:
de:62:dc:fa:a0:71:a1:a2:13:6f:a3:da:90:2c:ca:
1e:c2:f1:aa:9f:eb:13:18:30:67:9b:5d:24:b2:ec:
30:fd:b8:59:39:48:e2:af:49:12:27:00:d5:a9:65:
22:80:15:f0:0f:ad:e4:28:b4:96:4f:b3:57:73:83:
e2:d3:69:11:96:4e:0e:f3:8a:86:6d:82:0a:19:a8:
dc:8b:64:57:a7:d2:f5:a0:b3:85:1d:0f:8f:bc:c9:
d7:69
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
43:7b:d4:0f:f8:d4:92:bc:cc:fa:a3:15:5c:46:e6:5f:56:de:
a0:64:4d:f2:ac:7b:36:56:34:ea:a7:eb:7a:eb:cf:8f:9b:23:
33:66:81:2f:9d:ee:c1:f4:df:28:db:40:e8:69:0d:41:11:b2:
11:4a:fa:e2:86:20:02:7e:4b:4a:5e:5b:ba:e1:76:f0:f8:f8:
c4:5b:04:0b:14:5e:cc:f3:93:fc:93:e4:4d:51:8b:a1:83:c0:
fe:a3:f5:d9:d2:66:6d:68:44:17:27:e3:4b:77:94:c8:18:0d:
b5:d7:fc:fb:78:a1:f8:e7:2e:13:87:5f:51:f3:6e:f3:14:39:
1e:e2:41:d4:45:48:8a:00:f1:02:7d:e4:fc:d5:93:1d:9b:2e:
31:cc:a5:61:63:15:6d:95:0e:38:d6:95:97:4c:d2:19:1c:3c:
87:f8:14:36:7d:fb:be:75:0c:74:36:1d:90:09:ab:89:5b:34:
b3:d4:ed:6a:e7:be:4a:7d:65:6a:28:9c:51:b5:9f:96:97:c7:
00:43:04:0a:62:c5:cd:20:e8:be:f7:de:78:03:75:77:14:6f:
bc:1f:30:88:18:d7:d9:41:b3:a8:2e:bb:81:e7:9b:55:21:fe:
4e:b4:13:73:c7:c2:64:02:57:53:25:9b:bc:4a:a2:61:61:1d:
8c:b2:92:a2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:03 2025 GMT
Not After : May 31 10:25:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:2a:8e:48:e6:32:6e:31:8a:ee:9a:23:91:93:32:1e:0d:91:
30:46:5e:b8:5b:0b:87:0d:51:98:5a:81:a7:c6:db:78:41:6f:
7b:44:3d:cc:3b:b5:3b:f9:39:d5:5d:1a:70:13:3b:7f:69:07:
ef:28:6a:e2:50:39:72:7c:4c:f9:a3:51:e2:46:c1:14:1d:ff:
6c:98:24:53:eb:79:e7:a9:dc:d4:35:d2:b8:13:e2:ed:52:10:
ce:32:61:0f:d9:b7:24:b2:12:27:b2:82:88:3c:14:64:d0:96:
c2:4c:1b:d1:ad:b2:9f:b5:e1:20:55:2e:44:38:ae:1f:a7:37:
e6:3c:19:67:f2:3e:a3:cb:f3:4e:5d:27:ed:7f:e2:95:05:89:
b2:1e:d2:9c:96:0a:f9:d5:5a:11:51:dc:08:ac:c0:01:65:9c:
13:7d:13:c7:a6:7f:a9:c2:f3:7c:d4:3f:ed:09:76:be:e5:1c:
1f:c6:51:64:10:a6:7a:72:ab:10:42:09:bd:48:95:ef:0c:4b:
96:de:c5:64:63:60:83:c1:de:0d:af:d1:27:3a:23:60:35:88:
6a:d1:d5:68:1b:5b:5e:5b:f8:3f:43:1b:2b:cf:d4:99:ef:64:
52:60:39:44:2a:99:68:4b:e7:83:7c:7a:64:30:04:cb:39:9a:
03:46:77:99
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
Truncated 3082 bytes from beginning
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
2,852,332 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:11 2025 GMT
Not After : Jun 29 10:25:11 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:5a:69:4e:18:bd:c0:4c:11:e3:4e:37:40:f8:
a5:bd:2b:ae:9f:7c:e4:7a:df:6c:60:85:00:4f:d2:
0d:9d:1a:f5:25:40:1d:2e:28:1c:2b:22:c5:74:64:
62:3f:44:ca:6a:ab:11:88:01:8a:f1:8f:d4:2c:71:
b1:97:4d:75:5e:60:cc:2f:0a:bf:5b:df:27:90:dc:
10:de:3e:c1:43:9c:14:4d:00:b5:a2:ed:8c:61:4b:
6b:6a:70:2d:a3:b7:31:42:fc:21:d4:63:44:2e:68:
9c:de:85:26:da:3f:94:bb:91:86:6b:6f:9f:22:3c:
f1:69:a6:c6:f8:8a:85:62:b6:dc:c2:b5:05:d9:a3:
6f:e5:f8:ab:e9:ed:a1:91:d1:62:67:64:96:97:b2:
db:62:6c:45:96:75:31:25:4d:03:61:86:6e:63:52:
a1:ef:59:a6:71:b0:ab:b0:29:e8:9b:f8:91:7f:d2:
12:94:6c:75:92:60:1e:0c:a2:95:3a:8a:b1:86:1d:
94:6b:4f:c7:86:7b:06:de:9a:bb:ed:32:84:70:a4:
b9:2c:d7:f0:aa:e6:a3:b2:39:b3:cd:86:c4:87:7c:
78:76:d4:90:b9:02:82:12:23:48:9e:6a:98:a4:3e:
14:8a:95:24:32:c6:3c:2f:a7:7c:5d:9a:5f:d8:cf:
eb:97
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
04:af:2b:c6:f0:0c:99:ef:3b:e7:8c:9e:d2:a9:b6:c2:3d:d1:
a0:db:fe:fd:d3:f4:ef:53:54:73:21:f6:25:59:0e:6f:83:ed:
14:9e:76:a7:b5:52:d2:5c:9b:f3:41:e1:53:e1:f1:82:2c:b8:
87:ac:ea:67:69:61:13:8a:41:fc:98:88:63:6a:63:09:ca:0e:
89:cf:4c:67:e8:30:22:6f:9b:fa:45:b7:9b:fa:3b:b2:3b:26:
63:63:75:26:f8:da:87:09:05:00:37:14:e2:10:bb:b0:31:eb:
52:cb:94:33:41:78:8f:0f:df:3b:e0:f4:c9:5d:7f:8f:03:2f:
45:88:11:25:d4:5d:61:cc:12:ed:c1:ae:ee:ea:f1:c9:18:ec:
48:2f:b9:87:db:f1:21:75:dc:f2:25:9a:6b:60:60:fe:c8:b1:
85:ef:33:dc:c1:7e:ea:5c:8b:3c:5f:e6:a6:87:b8:f5:bf:db:
05:5f:dc:8f:a4:f9:20:14:ff:7c:91:79:b1:59:15:e4:ec:c2:
3f:cf:07:38:83:93:15:46:ef:6b:a1:94:8c:1c:ba:f6:89:99:
bc:41:aa:69:ff:20:52:91:8e:de:18:fc:c4:a6:e5:86:5d:c5:
fe:10:41:df:ca:a6:86:86:fb:9e:b0:17:98:5d:fc:36:02:1c:
3f:93:09:0e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:11 2025 GMT
Not After : May 31 10:25:11 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
84:04:4e:ff:93:7f:43:69:b3:43:07:c7:0f:0e:0b:bb:2e:3b:
d3:a7:7a:ba:f4:76:fc:26:4c:f4:97:0d:30:81:b6:0e:0b:1c:
51:1c:ad:c7:5e:91:69:a9:79:06:1e:d4:1b:9c:3b:e8:ca:27:
63:b9:16:fd:0b:d2:4e:4f:7d:8b:3c:45:cd:61:76:12:da:31:
92:2a:11:2b:e4:77:c0:51:72:18:8f:37:bb:88:62:72:b3:3d:
18:73:c0:40:54:d5:b3:7e:ba:14:6a:70:4a:d4:e3:a3:29:bf:
e7:91:b3:81:1f:69:3c:ab:94:39:35:d4:73:d0:1f:05:55:d3:
90:65:cb:fa:65:ef:5b:58:5b:ab:48:04:21:1c:5c:59:d4:43:
fe:9c:3d:03:4c:ea:27:2c:5f:57:24:e7:c1:72:9e:4b:ad:b7:
0c:0e:6f:18:a3:58:9b:1e:4c:fd:75:50:78:b2:64:48:15:ff:
3b:2f:21:92:95:44:5a:53:16:01:0c:b7:5d:9c:03:b6:19:4d:
30:04:6e:1c:59:32:6b:7e:ea:7d:ca:be:bc:41:c9:f6:18:10:
1b:65:8b:d3:09:cb:ac:0b:cc:62:d8:2a:18:e5:d5:e9:e3:56:
c6:8b:53:f6:18:1d:ce:0f:1a:f5:d1:f2:59:4f:3e:10:a3:79:
15:7b:9a:96
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
Truncated 7958 bytes from beginning
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
3,104,054 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:01 2025 GMT
Not After : Jun 29 10:25:01 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:9b:45:b4:f5:43:5f:58:d7:b7:b8:f9:dc:06:
86:fc:94:3b:b6:05:96:1c:52:48:b9:fe:98:22:18:
a5:6b:af:2a:ed:4b:e8:df:c5:97:5b:b3:43:bd:3e:
ec:89:75:06:c7:a2:d0:e1:7f:b3:83:77:b9:a6:ec:
b6:b0:52:b7:d6:79:81:f9:7c:53:9b:58:72:c4:13:
2f:c9:bc:ff:b5:04:b3:09:93:a3:1c:51:8a:e9:e1:
7a:14:00:71:a0:91:45:9f:9e:57:b5:e5:2a:65:a9:
72:60:d0:2a:fd:ec:e5:ee:07:15:91:07:d7:ca:65:
d2:2b:78:85:41:73:d6:a6:f0:d9:0a:5e:b2:b0:f6:
c6:b0:3e:25:fb:86:bd:2b:b0:23:95:cf:b0:71:a1:
82:f6:ba:fa:a3:55:a4:8e:ce:7b:d1:bb:b3:29:1c:
76:c2:d2:76:5e:a4:c0:e4:7c:a2:bb:28:e5:ca:35:
42:d8:7c:81:6f:05:4e:bc:a6:90:d8:b0:f2:64:5a:
41:f5:76:be:e0:7a:6a:06:b4:64:90:c4:05:25:8f:
a9:70:d9:09:8b:bb:8d:10:2f:77:24:13:71:3b:17:
24:d8:15:ba:3e:d2:70:fb:d5:6d:5d:55:19:8e:2e:
60:2e:f4:a0:09:e9:1f:c1:1d:2e:cf:c0:79:88:43:
bd:53
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7d:81:8d:b9:fd:66:d1:6d:12:d1:62:62:1a:62:46:6c:a5:51:
ad:ed:02:e9:3b:e2:e9:b5:61:10:08:f4:5c:a0:6b:e2:71:52:
4b:45:81:4f:a0:41:ff:a1:70:0d:76:54:7e:21:8b:5b:97:40:
63:cc:87:b1:69:6f:59:e5:22:82:d8:e5:a3:7f:1e:25:65:ce:
e5:f3:c8:18:98:0a:32:95:67:65:f0:90:c1:35:71:ac:c2:03:
f1:dd:cd:91:1f:24:38:c5:ed:67:fb:6e:a5:80:ba:e9:28:02:
2f:04:2a:ec:47:5f:87:2a:fe:44:6f:a6:58:57:f6:4a:02:59:
e1:ca:cb:65:17:7d:93:b2:31:76:52:73:88:4d:8a:fe:99:65:
c8:ec:8a:8f:d2:16:80:26:ce:3b:f7:d0:a2:a3:9a:4f:5b:cb:
23:58:53:15:be:e1:81:8c:f8:8e:a7:5a:8a:4d:bc:4c:5b:cc:
92:05:82:20:fa:40:70:01:a0:b4:f7:29:2f:b9:b3:e9:a7:e8:
20:e7:8a:9d:cc:88:50:de:a2:b3:db:70:31:a1:0d:46:75:b7:
0b:0a:1e:de:c8:48:49:ab:2c:5a:7a:04:0c:4a:56:a0:17:5d:
77:6e:19:89:ac:97:e9:70:06:66:18:50:93:f4:c2:c7:51:4e:
a8:7b:2a:56
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:02 2025 GMT
Not After : May 31 10:25:02 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:ea:0a:48:c9:63:86:10:23:2c:11:6c:b0:41:00:bc:ee:6f:
12:1f:78:74:e0:79:b9:0c:c9:72:95:13:46:03:fd:26:10:d2:
93:3d:42:0d:8d:b2:47:2c:8e:1f:5f:d0:74:e4:1f:17:3c:2c:
c0:65:e5:66:e5:fd:be:52:a3:90:3f:db:e4:8f:25:69:27:dd:
04:10:a0:c0:3b:ea:bf:51:62:1d:e8:82:5c:d6:79:fd:67:0e:
6f:06:3c:16:dc:48:33:ff:1d:a2:07:dc:3c:13:89:86:ec:cd:
71:e6:0a:ec:1e:94:dd:74:28:35:d4:55:61:ed:e2:db:2c:8c:
da:8d:eb:03:eb:d2:3e:5a:23:76:8f:a9:35:e4:ec:59:9b:ed:
c9:97:0c:01:d6:7d:71:c7:a8:02:e1:e6:b7:09:90:20:d1:de:
b5:64:ce:5d:77:90:26:51:d6:8b:72:b2:b1:97:2c:3d:b7:e7:
de:13:4e:25:53:d5:30:e0:1e:b7:95:7e:14:de:0c:b6:fa:93:
62:d7:dc:ca:da:f7:35:fb:92:2b:6e:80:75:54:6b:01:fb:2d:
3a:e3:08:7b:09:34:88:d3:17:26:a7:9f:5c:32:ad:76:ad:ca:
6d:57:6d:01:3b:50:bc:4e:fe:44:99:ae:68:09:0d:83:e8:96:
30:09:0a:9d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,852,747 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:18 2025 GMT
Not After : Jun 29 10:25:18 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:98:ed:ad:22:c4:4a:9b:90:0a:2d:13:a1:25:
30:95:dc:ae:03:0d:ce:71:1c:ed:ca:5b:92:b1:e9:
d2:2c:86:bc:73:65:c0:00:72:50:80:87:fd:d7:05:
e9:82:92:2c:10:0e:1a:b2:96:00:0f:2b:46:e5:2d:
95:75:a6:54:3a:f7:d0:4d:1e:58:a4:4c:31:86:97:
42:e1:88:3a:05:91:62:37:1b:e7:d8:d2:f5:c9:1d:
94:b8:92:ad:ba:01:35:75:94:7f:ba:92:b0:0f:82:
5c:86:8d:ac:9c:4c:05:27:52:83:a7:3d:50:18:fb:
82:24:f2:9a:e1:7c:63:f7:89:e2:89:ad:91:81:0d:
d8:12:6e:a3:a5:10:9b:80:e1:b3:7f:0b:84:55:04:
34:a8:13:83:f6:33:31:0d:54:a9:29:47:6d:71:a5:
7b:39:83:e0:0e:5a:f1:0a:85:57:bb:e6:09:31:1e:
cd:2a:19:29:54:97:a1:e1:d9:f2:be:1e:68:b0:0b:
c7:27:dd:45:99:e8:28:b5:0b:d0:ae:4e:ba:21:1f:
16:e6:c2:55:42:8d:e4:8f:c0:64:b7:36:97:51:38:
c9:9c:98:2f:31:66:c0:b6:cc:f8:54:9d:5e:86:18:
16:9e:93:71:06:57:2f:14:4f:a6:41:ab:cf:49:6d:
95:9f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:21:26:5f:ad:08:4b:40:77:bf:9a:ea:ed:61:9a:a7:ce:d6:
23:96:53:0c:e9:13:99:0d:b0:85:b8:63:27:eb:1b:e0:76:4a:
bb:64:d9:1b:78:5a:4b:47:d3:78:f6:84:78:b6:12:86:e7:89:
4e:ff:27:00:a5:fd:45:0d:79:d0:34:f5:17:85:e1:66:e7:aa:
39:01:f6:ab:f1:ac:0b:57:3e:56:fb:4f:1b:a8:ce:a8:63:81:
97:7a:5e:97:98:2b:42:d8:76:ca:c6:61:3d:fb:37:0a:c8:a6:
b4:7d:1a:ba:b9:7e:8d:88:77:41:84:65:9d:a7:29:83:4f:2e:
a1:2f:80:a1:a5:e3:ef:c5:96:31:c8:f8:0d:23:70:76:51:f7:
d0:f1:85:3b:a8:14:d7:48:5e:fa:48:03:9d:bd:48:9d:d8:78:
56:05:89:37:c4:ab:60:2e:50:da:e8:97:b0:92:d0:11:df:40:
29:42:41:fe:6f:a7:87:f4:84:93:5b:2a:2b:f7:34:58:f2:a5:
80:58:aa:5c:71:d7:33:76:38:2a:cb:2e:3d:f2:1d:36:7f:5a:
87:74:49:81:2f:ea:02:d4:9f:bd:98:7e:73:9f:a7:73:66:0d:
2c:ef:26:e7:e4:d0:23:51:41:84:70:8c:49:7c:5e:ff:97:60:
23:52:70:dd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 30 10:25:18 2025 GMT
Not After : May 31 10:25:18 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:27:df:99:63:eb:af:ed:de:b9:6d:ae:79:00:cc:dd:53:07:
3b:3c:5b:cd:4d:76:2d:fa:a4:bc:46:4a:a6:60:4d:8d:6c:8f:
0c:2d:4c:a2:15:7c:74:d6:2e:1a:db:c1:38:9f:17:4b:4f:3c:
14:88:1b:c3:16:d3:4e:10:ed:78:c3:a7:53:af:55:cb:d5:d0:
d9:ca:7b:ce:f4:a5:cf:73:c7:19:83:f7:11:67:24:ec:86:da:
06:fd:e8:ed:09:5c:cb:5c:4e:b6:e6:98:39:62:6d:80:02:cb:
59:50:42:e5:e0:68:51:af:4a:d2:f6:83:50:6d:ec:96:b3:ae:
10:7c:16:52:66:d7:0e:27:6d:49:9c:92:d8:a8:f5:74:ec:f4:
55:c8:8a:cc:84:26:f6:0f:e9:ed:f7:40:f5:f6:a8:31:9d:11:
e3:22:59:af:c4:45:47:9d:89:c8:35:2d:1d:35:64:97:91:e8:
2e:63:04:05:e5:15:1a:9f:81:78:94:43:cb:3c:a6:f8:11:0c:
58:49:8e:59:8f:74:94:14:79:47:3f:a6:83:16:b2:06:df:9f:
c1:f2:6d:6a:69:2a:f7:95:75:b7:cb:a4:01:ee:5e:7e:5f:68:
50:61:e1:92:95:e8:cc:fc:8e:f6:45:60:6a:e3:d3:f7:99:cd:
2f:ef:6d:6d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,210,076 UART:
2,211,084 UART: Running Caliptra ROM ...
2,212,182 UART:
2,212,335 UART: [state] CFI Enabled
2,213,222 UART: [state] LifecycleState = Unprovisioned
2,214,882 UART: [state] DebugLocked = No
2,215,906 UART: [state] WD Timer not started. Device not locked for debugging
2,218,378 UART: [kat] SHA2-256
2,219,041 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,222,049 UART: [kat] ++
2,222,495 UART: [kat] sha1
2,223,004 UART: [kat] SHA2-256
2,223,666 UART: [kat] SHA2-384
2,224,320 UART: [kat] SHA2-512-ACC
2,225,169 UART: [kat] ECC-384
3,776,070 UART: [kat] HMAC-384Kdf
3,803,027 UART: [kat] LMS
4,876,202 UART: [kat] --
4,881,072 UART: [cold-reset] ++
4,882,149 UART: [fht] FHT @ 0x50003400
4,893,557 UART: [idev] ++
4,894,228 UART: [idev] CDI.KEYID = 6
4,895,469 UART: [idev] SUBJECT.KEYID = 7
4,896,623 UART: [idev] UDS.KEYID = 0
4,930,252 UART: [idev] Erasing UDS.KEYID = 0
8,242,875 UART: [idev] Sha1 KeyId Algorithm
8,261,360 UART: [idev] CSR upload begun
8,266,813 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,572,918 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,589,205 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,605,286 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,621,321 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,645,719 UART: [idev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
10,792,616 UART: [idev] CSR uploaded
10,809,454 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
10,943,386 UART: [idev] --
10,944,028 UART: [ldev] ++
10,944,523 UART: [ldev] CDI.KEYID = 6
10,945,428 UART: [ldev] SUBJECT.KEYID = 5
10,946,477 UART: [ldev] AUTHORITY.KEYID = 7
10,947,668 UART: [ldev] FE.KEYID = 1
10,948,541 UART: [ldev] Erasing FE.KEYID = 1
14,190,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,483,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,500,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,516,195 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,532,079 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,552,263 UART: [ldev] --
16,557,525 UART: [fwproc] Wait for Commands...
16,559,728 UART: [fwproc] Recv command 0x46574c44
16,561,988 UART: [fwproc] Recv'd Img size: 106256 bytes
20,534,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,608,404 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,650,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
20,966,580 >>> mbox cmd response: success
20,966,971 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,970,286 UART: [afmc] ++
20,970,859 UART: [afmc] CDI.KEYID = 6
20,972,024 UART: [afmc] SUBJECT.KEYID = 7
20,973,245 UART: [afmc] AUTHORITY.KEYID = 5
24,340,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,636,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,639,100 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,655,191 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,671,243 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,687,217 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,710,424 UART: [afmc] --
26,713,260 UART: [cold-reset] --
26,718,955 UART: [state] Locking Datavault
26,725,172 UART: [state] Locking PCR0, PCR1 and PCR31
26,726,868 UART: [state] Locking ICCM
26,729,451 UART: [exit] Launching FMC @ 0x40000000
26,738,077 UART:
26,738,310 UART: Running Caliptra FMC ...
26,739,344 UART:
26,739,492 UART: [fmc] Received command: 0x10000001
26,740,946 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,760,768 UART: [fmc] LDEVID cert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
26,853,531 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,874,205 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,995,257 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
10,478,255 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
20,548,962 >>> mbox cmd response: success
20,549,487 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,257,047 UART:
26,257,432 UART: Running Caliptra FMC ...
26,258,562 UART:
26,258,724 UART: [fmc] Received command: 0x10000001
26,260,267 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,279,642 UART: [fmc] LDEVID cert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
26,372,410 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,393,102 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,514,147 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,216,243 UART:
2,217,236 UART: Running Caliptra ROM ...
2,218,339 UART:
2,218,512 UART: [state] CFI Enabled
2,219,413 UART: [state] LifecycleState = Unprovisioned
2,221,071 UART: [state] DebugLocked = No
2,222,193 UART: [state] WD Timer not started. Device not locked for debugging
2,224,677 UART: [kat] SHA2-256
2,225,336 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,228,338 UART: [kat] ++
2,228,779 UART: [kat] sha1
2,229,280 UART: [kat] SHA2-256
2,229,928 UART: [kat] SHA2-384
2,230,575 UART: [kat] SHA2-512-ACC
2,231,367 UART: [kat] ECC-384
4,096,276 UART: [kat] HMAC-384Kdf
4,109,476 UART: [kat] LMS
5,182,621 UART: [kat] --
5,187,835 UART: [cold-reset] ++
5,189,465 UART: [fht] FHT @ 0x50003400
5,201,527 UART: [idev] ++
5,202,197 UART: [idev] CDI.KEYID = 6
5,203,496 UART: [idev] SUBJECT.KEYID = 7
5,204,879 UART: [idev] UDS.KEYID = 0
5,221,723 UART: [idev] Erasing UDS.KEYID = 0
8,492,748 UART: [idev] Sha1 KeyId Algorithm
8,512,032 UART: [idev] CSR upload begun
8,517,505 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,808,263 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,824,596 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,840,701 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,856,732 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,881,144 UART: [idev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
11,027,978 UART: [idev] CSR uploaded
11,044,697 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
11,178,393 UART: [idev] --
11,179,048 UART: [ldev] ++
11,179,540 UART: [ldev] CDI.KEYID = 6
11,180,452 UART: [ldev] SUBJECT.KEYID = 5
11,181,497 UART: [ldev] AUTHORITY.KEYID = 7
11,182,581 UART: [ldev] FE.KEYID = 1
11,183,406 UART: [ldev] Erasing FE.KEYID = 1
14,353,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,649,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,665,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,681,480 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,697,355 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,717,053 UART: [ldev] --
16,722,474 UART: [fwproc] Wait for Commands...
16,725,370 UART: [fwproc] Recv command 0x46574c44
16,727,620 UART: [fwproc] Recv'd Img size: 106256 bytes
20,702,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,778,319 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,820,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
21,137,466 >>> mbox cmd response: success
21,137,843 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,141,957 UART: [afmc] ++
21,142,536 UART: [afmc] CDI.KEYID = 6
21,143,770 UART: [afmc] SUBJECT.KEYID = 7
21,144,865 UART: [afmc] AUTHORITY.KEYID = 5
24,463,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,758,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,760,594 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,776,650 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,792,703 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,808,710 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,830,974 UART: [afmc] --
26,833,987 UART: [cold-reset] --
26,839,525 UART: [state] Locking Datavault
26,845,309 UART: [state] Locking PCR0, PCR1 and PCR31
26,846,949 UART: [state] Locking ICCM
26,848,225 UART: [exit] Launching FMC @ 0x40000000
26,856,886 UART:
26,857,120 UART: Running Caliptra FMC ...
26,858,217 UART:
26,858,368 UART: [fmc] Received command: 0x10000001
26,859,816 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,879,574 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
26,972,305 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,992,995 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,114,024 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
10,739,752 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
20,744,353 >>> mbox cmd response: success
20,745,105 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,387,179 UART:
26,387,571 UART: Running Caliptra FMC ...
26,388,755 UART:
26,388,912 UART: [fmc] Received command: 0x10000001
26,390,456 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,409,785 UART: [fmc] LDEVID cert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
26,502,593 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,523,275 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,644,346 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,228,563 UART:
2,229,465 UART: Running Caliptra ROM ...
2,230,967 UART:
2,231,145 UART: [state] CFI Enabled
2,232,034 UART: [state] LifecycleState = Unprovisioned
2,233,698 UART: [state] DebugLocked = No
2,234,818 UART: [state] WD Timer not started. Device not locked for debugging
2,237,312 UART: [kat] SHA2-256
2,237,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,240,999 UART: [kat] ++
2,241,452 UART: [kat] sha1
2,241,960 UART: [kat] SHA2-256
2,242,701 UART: [kat] SHA2-384
2,243,370 UART: [kat] SHA2-512-ACC
2,244,250 UART: [kat] ECC-384
2,947,364 UART: [kat] HMAC-384Kdf
2,970,958 UART: [kat] LMS
3,500,411 UART: [kat] --
3,503,705 UART: [cold-reset] ++
3,504,551 UART: [fht] FHT @ 0x50003400
3,515,888 UART: [idev] ++
3,516,494 UART: [idev] CDI.KEYID = 6
3,517,378 UART: [idev] SUBJECT.KEYID = 7
3,518,483 UART: [idev] UDS.KEYID = 0
3,542,441 UART: [idev] Erasing UDS.KEYID = 0
6,025,576 UART: [idev] Sha1 KeyId Algorithm
6,044,981 UART: [idev] CSR upload begun
6,049,705 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,780,055 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,171 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,099 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,827,985 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,851,670 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,997,393 UART: [idev] CSR uploaded
8,015,081 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
8,149,311 UART: [idev] --
8,149,947 UART: [ldev] ++
8,150,633 UART: [ldev] CDI.KEYID = 6
8,151,518 UART: [ldev] SUBJECT.KEYID = 5
8,152,670 UART: [ldev] AUTHORITY.KEYID = 7
8,153,852 UART: [ldev] FE.KEYID = 1
8,154,696 UART: [ldev] Erasing FE.KEYID = 1
10,564,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,305,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,321,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,337,484 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,353,232 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,373,808 UART: [ldev] --
12,379,181 UART: [fwproc] Wait for Commands...
12,380,682 UART: [fwproc] Recv command 0x46574c44
12,382,777 UART: [fwproc] Recv'd Img size: 106600 bytes
15,683,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,759,433 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,802,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,118,712 >>> mbox cmd response: success
16,119,065 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,123,718 UART: [afmc] ++
16,124,292 UART: [afmc] CDI.KEYID = 6
16,125,172 UART: [afmc] SUBJECT.KEYID = 7
16,126,386 UART: [afmc] AUTHORITY.KEYID = 5
18,660,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,386,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,388,821 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,404,967 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,420,846 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,436,647 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,459,160 UART: [afmc] --
20,462,807 UART: [cold-reset] --
20,465,423 UART: [state] Locking Datavault
20,470,617 UART: [state] Locking PCR0, PCR1 and PCR31
20,472,304 UART: [state] Locking ICCM
20,474,248 UART: [exit] Launching FMC @ 0x40000000
20,482,597 UART:
20,482,841 UART: Running Caliptra FMC ...
20,483,946 UART:
20,484,102 UART: [fmc] Received command: 0x10000001
20,485,560 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,505,267 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,598,074 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,618,758 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,739,781 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
7,688,672 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,691,941 >>> mbox cmd response: success
15,692,448 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
19,986,530 UART:
19,986,925 UART: Running Caliptra FMC ...
19,988,018 UART:
19,988,180 UART: [fmc] Received command: 0x10000001
19,989,736 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,009,174 UART: [fmc] LDEVID cert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
20,102,068 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,122,756 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,244,014 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,120 writing to cptra_bootfsm_go
2,217,910 UART:
2,218,832 UART: Running Caliptra ROM ...
2,219,955 UART:
2,220,116 UART: [state] CFI Enabled
2,221,020 UART: [state] LifecycleState = Unprovisioned
2,222,626 UART: [state] DebugLocked = No
2,223,750 UART: [state] WD Timer not started. Device not locked for debugging
2,226,229 UART: [kat] SHA2-256
2,226,899 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,229,913 UART: [kat] ++
2,230,368 UART: [kat] sha1
2,230,879 UART: [kat] SHA2-256
2,231,563 UART: [kat] SHA2-384
2,232,223 UART: [kat] SHA2-512-ACC
2,233,023 UART: [kat] ECC-384
3,281,472 UART: [kat] HMAC-384Kdf
3,294,619 UART: [kat] LMS
3,824,146 UART: [kat] --
3,828,401 UART: [cold-reset] ++
3,830,761 UART: [fht] FHT @ 0x50003400
3,840,822 UART: [idev] ++
3,841,428 UART: [idev] CDI.KEYID = 6
3,842,341 UART: [idev] SUBJECT.KEYID = 7
3,843,382 UART: [idev] UDS.KEYID = 0
3,861,719 UART: [idev] Erasing UDS.KEYID = 0
6,318,091 UART: [idev] Sha1 KeyId Algorithm
6,339,285 UART: [idev] CSR upload begun
6,343,988 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,059,943 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,076,022 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,091,950 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,107,851 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,131,519 UART: [idev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
8,277,296 UART: [idev] CSR uploaded
8,294,888 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
8,428,972 UART: [idev] --
8,429,615 UART: [ldev] ++
8,430,108 UART: [ldev] CDI.KEYID = 6
8,431,009 UART: [ldev] SUBJECT.KEYID = 5
8,432,066 UART: [ldev] AUTHORITY.KEYID = 7
8,433,263 UART: [ldev] FE.KEYID = 1
8,434,132 UART: [ldev] Erasing FE.KEYID = 1
10,779,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,530,186 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,545,910 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,565,398 UART: [ldev] --
12,570,454 UART: [fwproc] Wait for Commands...
12,572,895 UART: [fwproc] Recv command 0x46574c44
12,574,996 UART: [fwproc] Recv'd Img size: 106600 bytes
15,884,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,957,574 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,000,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,317,168 >>> mbox cmd response: success
16,317,540 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,321,935 UART: [afmc] ++
16,322,543 UART: [afmc] CDI.KEYID = 6
16,323,451 UART: [afmc] SUBJECT.KEYID = 7
16,324,606 UART: [afmc] AUTHORITY.KEYID = 5
18,822,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,542,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,544,785 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,561,000 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,576,806 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,592,657 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,614,373 UART: [afmc] --
20,617,466 UART: [cold-reset] --
20,621,161 UART: [state] Locking Datavault
20,625,105 UART: [state] Locking PCR0, PCR1 and PCR31
20,626,742 UART: [state] Locking ICCM
20,627,807 UART: [exit] Launching FMC @ 0x40000000
20,636,205 UART:
20,636,439 UART: Running Caliptra FMC ...
20,637,536 UART:
20,637,692 UART: [fmc] Received command: 0x10000001
20,639,143 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,658,851 UART: [fmc] LDEVID cert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
20,751,649 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,772,322 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,893,343 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
7,941,068 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,896,387 >>> mbox cmd response: success
15,896,861 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,154,640 UART:
20,155,031 UART: Running Caliptra FMC ...
20,156,152 UART:
20,156,310 UART: [fmc] Received command: 0x10000001
20,157,845 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,177,319 UART: [fmc] LDEVID cert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
20,270,157 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,290,878 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,412,131 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,210,615 UART:
2,211,533 UART: Running Caliptra ROM ...
2,212,636 UART:
2,212,792 UART: [state] CFI Enabled
2,213,690 UART: [state] LifecycleState = Unprovisioned
2,215,301 UART: [state] DebugLocked = No
2,216,546 UART: [state] WD Timer not started. Device not locked for debugging
2,219,041 UART: [kat] SHA2-256
2,219,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,222,716 UART: [kat] ++
2,223,166 UART: [kat] sha1
2,223,675 UART: [kat] SHA2-256
2,224,415 UART: [kat] SHA2-384
2,225,080 UART: [kat] SHA2-512-ACC
2,225,909 UART: [kat] ECC-384
2,946,898 UART: [kat] HMAC-384Kdf
2,969,868 UART: [kat] LMS
3,499,341 UART: [kat] --
3,502,552 UART: [cold-reset] ++
3,504,977 UART: [fht] FHT @ 0x50003400
3,516,182 UART: [idev] ++
3,516,808 UART: [idev] CDI.KEYID = 6
3,517,728 UART: [idev] SUBJECT.KEYID = 7
3,518,897 UART: [idev] UDS.KEYID = 0
3,541,243 UART: [idev] Erasing UDS.KEYID = 0
6,019,990 UART: [idev] Sha1 KeyId Algorithm
6,040,409 UART: [idev] CSR upload begun
6,045,131 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,281 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,384 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,318 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,826,192 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,849,922 UART: [idev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
7,995,687 UART: [idev] CSR uploaded
8,013,270 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
8,147,614 UART: [idev] --
8,148,347 UART: [ldev] ++
8,148,880 UART: [ldev] CDI.KEYID = 6
8,149,768 UART: [ldev] SUBJECT.KEYID = 5
8,150,937 UART: [ldev] AUTHORITY.KEYID = 7
8,152,246 UART: [ldev] FE.KEYID = 1
8,153,101 UART: [ldev] Erasing FE.KEYID = 1
10,558,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,278,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,294,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,310,715 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,326,467 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,345,577 UART: [ldev] --
12,350,843 UART: [fwproc] Wait for Commands...
12,352,938 UART: [fwproc] Recv command 0x46574c44
12,355,032 UART: [fwproc] Recv'd Img size: 106600 bytes
15,670,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,741,113 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,783,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,100,439 >>> mbox cmd response: success
16,100,843 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,104,208 UART: [afmc] ++
16,104,787 UART: [afmc] CDI.KEYID = 6
16,105,662 UART: [afmc] SUBJECT.KEYID = 7
16,106,927 UART: [afmc] AUTHORITY.KEYID = 5
18,639,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,363,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,365,451 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,381,543 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,397,496 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,413,314 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,435,394 UART: [afmc] --
20,438,549 UART: [cold-reset] --
20,441,809 UART: [state] Locking Datavault
20,446,702 UART: [state] Locking PCR0, PCR1 and PCR31
20,448,351 UART: [state] Locking ICCM
20,450,147 UART: [exit] Launching FMC @ 0x40000000
20,458,486 UART:
20,458,720 UART: Running Caliptra FMC ...
20,459,821 UART:
20,459,975 UART: [fmc] Received command: 0x10000001
20,461,429 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,481,185 UART: [fmc] LDEVID cert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
20,573,966 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,594,601 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,715,670 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
7,686,133 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,713,898 >>> mbox cmd response: success
15,714,407 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,031,662 UART:
20,032,051 UART: Running Caliptra FMC ...
20,033,167 UART:
20,033,328 UART: [fmc] Received command: 0x10000001
20,034,877 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,054,368 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,147,243 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,167,916 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,289,205 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,217,064 UART:
2,217,998 UART: Running Caliptra ROM ...
2,219,113 UART:
2,219,266 UART: [state] CFI Enabled
2,220,183 UART: [state] LifecycleState = Unprovisioned
2,221,841 UART: [state] DebugLocked = No
2,222,959 UART: [state] WD Timer not started. Device not locked for debugging
2,225,450 UART: [kat] SHA2-256
2,226,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,229,135 UART: [kat] ++
2,229,584 UART: [kat] sha1
2,230,157 UART: [kat] SHA2-256
2,230,821 UART: [kat] SHA2-384
2,231,479 UART: [kat] SHA2-512-ACC
2,232,359 UART: [kat] ECC-384
3,279,635 UART: [kat] HMAC-384Kdf
3,291,646 UART: [kat] LMS
3,821,131 UART: [kat] --
3,826,768 UART: [cold-reset] ++
3,827,785 UART: [fht] FHT @ 0x50003400
3,838,543 UART: [idev] ++
3,839,103 UART: [idev] CDI.KEYID = 6
3,840,015 UART: [idev] SUBJECT.KEYID = 7
3,841,229 UART: [idev] UDS.KEYID = 0
3,859,666 UART: [idev] Erasing UDS.KEYID = 0
6,317,707 UART: [idev] Sha1 KeyId Algorithm
6,339,746 UART: [idev] CSR upload begun
6,344,424 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,059,655 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,075,729 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,091,691 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,107,578 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,131,233 UART: [idev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
8,277,004 UART: [idev] CSR uploaded
8,294,606 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
8,428,559 UART: [idev] --
8,429,187 UART: [ldev] ++
8,429,682 UART: [ldev] CDI.KEYID = 6
8,430,626 UART: [ldev] SUBJECT.KEYID = 5
8,431,671 UART: [ldev] AUTHORITY.KEYID = 7
8,432,758 UART: [ldev] FE.KEYID = 1
8,433,691 UART: [ldev] Erasing FE.KEYID = 1
10,787,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,507,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,523,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,539,626 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,555,398 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,575,538 UART: [ldev] --
12,579,929 UART: [fwproc] Wait for Commands...
12,582,616 UART: [fwproc] Recv command 0x46574c44
12,584,653 UART: [fwproc] Recv'd Img size: 106600 bytes
15,888,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,957,022 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,999,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,316,589 >>> mbox cmd response: success
16,316,965 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,320,876 UART: [afmc] ++
16,321,456 UART: [afmc] CDI.KEYID = 6
16,322,336 UART: [afmc] SUBJECT.KEYID = 7
16,323,571 UART: [afmc] AUTHORITY.KEYID = 5
18,822,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,544,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,546,236 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,562,348 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,578,285 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,594,056 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,616,619 UART: [afmc] --
20,620,162 UART: [cold-reset] --
20,622,775 UART: [state] Locking Datavault
20,625,694 UART: [state] Locking PCR0, PCR1 and PCR31
20,627,387 UART: [state] Locking ICCM
20,630,077 UART: [exit] Launching FMC @ 0x40000000
20,638,472 UART:
20,638,706 UART: Running Caliptra FMC ...
20,639,805 UART:
20,639,980 UART: [fmc] Received command: 0x10000001
20,641,439 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,661,115 UART: [fmc] LDEVID cert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
20,753,884 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,774,588 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,895,571 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
7,944,261 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
15,898,490 >>> mbox cmd response: success
15,899,157 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,148,083 UART:
20,148,489 UART: Running Caliptra FMC ...
20,149,591 UART:
20,149,744 UART: [fmc] Received command: 0x10000001
20,151,260 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,170,761 UART: [fmc] LDEVID cert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
20,263,643 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,284,304 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,405,568 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,277 UART: [idev] Sha1 KeyId Algorithm
1,207,583 UART: [idev] CSR upload begun
1,209,362 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,751 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,459 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,344 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,060 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,525 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,297,315 UART: [idev] CSR uploaded
1,300,360 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,300,529 UART: [idev] --
1,301,646 UART: [ldev] ++
1,301,814 UART: [ldev] CDI.KEYID = 6
1,302,178 UART: [ldev] SUBJECT.KEYID = 5
1,302,605 UART: [ldev] AUTHORITY.KEYID = 7
1,303,068 UART: [ldev] FE.KEYID = 1
1,307,918 UART: [ldev] Erasing FE.KEYID = 1
1,333,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,272 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,996 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,031 UART: [ldev] --
1,373,443 UART: [fwproc] Wait for Commands...
1,374,114 UART: [fwproc] Recv command 0x46574c44
1,374,847 UART: [fwproc] Recv'd Img size: 106600 bytes
2,582,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,802 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,627,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,763,235 >>> mbox cmd response: success
2,763,235 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,764,306 UART: [afmc] ++
2,764,474 UART: [afmc] CDI.KEYID = 6
2,764,837 UART: [afmc] SUBJECT.KEYID = 7
2,765,263 UART: [afmc] AUTHORITY.KEYID = 5
2,801,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,620 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,824,340 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,830,233 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,835,938 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,843,599 UART: [afmc] --
2,844,611 UART: [cold-reset] --
2,845,387 UART: [state] Locking Datavault
2,846,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,986 UART: [state] Locking ICCM
2,847,602 UART: [exit] Launching FMC @ 0x40000000
2,852,899 UART:
2,852,915 UART: Running Caliptra FMC ...
2,853,323 UART:
2,853,461 UART: [fmc] Received command: 0x10000001
2,854,554 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,873,414 UART: [fmc] LDEVID cert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
2,964,391 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,983,982 UART: [fmc] FMCALIAS cert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
3,102,517 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,552 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,539,456 >>> mbox cmd response: success
2,539,456 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,601,231 UART:
2,601,247 UART: Running Caliptra FMC ...
2,601,655 UART:
2,601,793 UART: [fmc] Received command: 0x10000001
2,602,886 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,621,746 UART: [fmc] LDEVID cert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
2,712,723 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,732,314 UART: [fmc] FMCALIAS cert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
2,850,849 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,874 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,478 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] CSR upload begun
1,209,571 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,248 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,956 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,841 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,557 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,022 UART: [idev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
1,297,812 UART: [idev] CSR uploaded
1,300,857 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,301,026 UART: [idev] --
1,301,917 UART: [ldev] ++
1,302,085 UART: [ldev] CDI.KEYID = 6
1,302,449 UART: [ldev] SUBJECT.KEYID = 5
1,302,876 UART: [ldev] AUTHORITY.KEYID = 7
1,303,339 UART: [ldev] FE.KEYID = 1
1,308,871 UART: [ldev] Erasing FE.KEYID = 1
1,335,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,161 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,885 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,852 UART: [ldev] --
1,374,134 UART: [fwproc] Wait for Commands...
1,374,869 UART: [fwproc] Recv command 0x46574c44
1,375,602 UART: [fwproc] Recv'd Img size: 106600 bytes
2,582,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,523 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,627,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,763,058 >>> mbox cmd response: success
2,763,058 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,764,215 UART: [afmc] ++
2,764,383 UART: [afmc] CDI.KEYID = 6
2,764,746 UART: [afmc] SUBJECT.KEYID = 7
2,765,172 UART: [afmc] AUTHORITY.KEYID = 5
2,800,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,301 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,823,021 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,828,914 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,834,619 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,842,328 UART: [afmc] --
2,843,234 UART: [cold-reset] --
2,844,182 UART: [state] Locking Datavault
2,845,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,845,871 UART: [state] Locking ICCM
2,846,407 UART: [exit] Launching FMC @ 0x40000000
2,851,704 UART:
2,851,720 UART: Running Caliptra FMC ...
2,852,128 UART:
2,852,266 UART: [fmc] Received command: 0x10000001
2,853,359 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,872,219 UART: [fmc] LDEVID cert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
2,963,196 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,982,787 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,101,322 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,517 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,541,097 >>> mbox cmd response: success
2,541,097 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,680 UART:
2,603,696 UART: Running Caliptra FMC ...
2,604,104 UART:
2,604,242 UART: [fmc] Received command: 0x10000001
2,605,335 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,624,195 UART: [fmc] LDEVID cert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
2,715,172 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,763 UART: [fmc] FMCALIAS cert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
2,853,298 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,110 UART: [kat] LMS
1,168,422 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,169,849 UART: [fht] FHT @ 0x50003400
1,172,503 UART: [idev] ++
1,172,671 UART: [idev] CDI.KEYID = 6
1,173,032 UART: [idev] SUBJECT.KEYID = 7
1,173,457 UART: [idev] UDS.KEYID = 0
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,063 UART: [idev] CSR upload begun
1,208,842 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,713 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,421 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,306 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,022 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,487 UART: [idev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
1,297,277 UART: [idev] CSR uploaded
1,300,322 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,300,491 UART: [idev] --
1,301,628 UART: [ldev] ++
1,301,796 UART: [ldev] CDI.KEYID = 6
1,302,160 UART: [ldev] SUBJECT.KEYID = 5
1,302,587 UART: [ldev] AUTHORITY.KEYID = 7
1,303,050 UART: [ldev] FE.KEYID = 1
1,308,014 UART: [ldev] Erasing FE.KEYID = 1
1,334,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,370 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,094 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,327 UART: [ldev] --
1,373,707 UART: [fwproc] Wait for Commands...
1,374,310 UART: [fwproc] Recv command 0x46574c44
1,375,043 UART: [fwproc] Recv'd Img size: 106600 bytes
2,583,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,060 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,629,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,764,521 >>> mbox cmd response: success
2,764,521 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,765,564 UART: [afmc] ++
2,765,732 UART: [afmc] CDI.KEYID = 6
2,766,095 UART: [afmc] SUBJECT.KEYID = 7
2,766,521 UART: [afmc] AUTHORITY.KEYID = 5
2,801,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,660 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,824,380 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,830,273 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,835,978 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,843,933 UART: [afmc] --
2,844,899 UART: [cold-reset] --
2,845,839 UART: [state] Locking Datavault
2,847,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,850 UART: [state] Locking ICCM
2,848,322 UART: [exit] Launching FMC @ 0x40000000
2,853,619 UART:
2,853,635 UART: Running Caliptra FMC ...
2,854,043 UART:
2,854,181 UART: [fmc] Received command: 0x10000001
2,855,274 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,874,134 UART: [fmc] LDEVID cert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
2,965,111 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,984,702 UART: [fmc] FMCALIAS cert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
3,103,237 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,794 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,540,440 >>> mbox cmd response: success
2,540,440 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,071 UART:
2,603,087 UART: Running Caliptra FMC ...
2,603,495 UART:
2,603,633 UART: [fmc] Received command: 0x10000001
2,604,726 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,623,586 UART: [fmc] LDEVID cert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
2,714,563 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,154 UART: [fmc] FMCALIAS cert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
2,852,689 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,097 UART: [state] LifecycleState = Unprovisioned
86,752 UART: [state] DebugLocked = No
87,400 UART: [state] WD Timer not started. Device not locked for debugging
88,747 UART: [kat] SHA2-256
892,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,426 UART: [kat] ++
896,578 UART: [kat] sha1
900,854 UART: [kat] SHA2-256
902,794 UART: [kat] SHA2-384
905,475 UART: [kat] SHA2-512-ACC
907,376 UART: [kat] ECC-384
917,125 UART: [kat] HMAC-384Kdf
921,741 UART: [kat] LMS
1,170,053 UART: [kat] --
1,171,188 UART: [cold-reset] ++
1,171,538 UART: [fht] FHT @ 0x50003400
1,174,170 UART: [idev] ++
1,174,338 UART: [idev] CDI.KEYID = 6
1,174,699 UART: [idev] SUBJECT.KEYID = 7
1,175,124 UART: [idev] UDS.KEYID = 0
1,182,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,512 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] CSR upload begun
1,210,583 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,092 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,800 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,685 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,238,401 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,866 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,298,656 UART: [idev] CSR uploaded
1,301,701 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,301,870 UART: [idev] --
1,303,113 UART: [ldev] ++
1,303,281 UART: [ldev] CDI.KEYID = 6
1,303,645 UART: [ldev] SUBJECT.KEYID = 5
1,304,072 UART: [ldev] AUTHORITY.KEYID = 7
1,304,535 UART: [ldev] FE.KEYID = 1
1,309,867 UART: [ldev] Erasing FE.KEYID = 1
1,335,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,495 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,219 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,294 UART: [ldev] --
1,374,714 UART: [fwproc] Wait for Commands...
1,375,477 UART: [fwproc] Recv command 0x46574c44
1,376,210 UART: [fwproc] Recv'd Img size: 106600 bytes
2,583,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,753 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,628,836 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,764,404 >>> mbox cmd response: success
2,764,404 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,765,543 UART: [afmc] ++
2,765,711 UART: [afmc] CDI.KEYID = 6
2,766,074 UART: [afmc] SUBJECT.KEYID = 7
2,766,500 UART: [afmc] AUTHORITY.KEYID = 5
2,802,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,519 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,825,239 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,831,132 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,836,837 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,844,840 UART: [afmc] --
2,845,950 UART: [cold-reset] --
2,846,760 UART: [state] Locking Datavault
2,848,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,639 UART: [state] Locking ICCM
2,849,303 UART: [exit] Launching FMC @ 0x40000000
2,854,600 UART:
2,854,616 UART: Running Caliptra FMC ...
2,855,024 UART:
2,855,162 UART: [fmc] Received command: 0x10000001
2,856,255 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,115 UART: [fmc] LDEVID cert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
2,966,092 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,985,683 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,104,218 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,929 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,538,567 >>> mbox cmd response: success
2,538,567 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,601,838 UART:
2,601,854 UART: Running Caliptra FMC ...
2,602,262 UART:
2,602,400 UART: [fmc] Received command: 0x10000001
2,603,493 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,622,353 UART: [fmc] LDEVID cert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
2,713,330 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,732,921 UART: [fmc] FMCALIAS cert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
2,851,456 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,708 UART: [kat] HMAC-384Kdf
920,230 UART: [kat] LMS
1,168,542 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,773 UART: [idev] ++
1,172,941 UART: [idev] CDI.KEYID = 6
1,173,302 UART: [idev] SUBJECT.KEYID = 7
1,173,727 UART: [idev] UDS.KEYID = 0
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,199,263 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] CSR upload begun
1,209,394 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,815 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,523 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,408 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,124 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,589 UART: [idev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
1,297,379 UART: [idev] CSR uploaded
1,300,424 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,300,593 UART: [idev] --
1,301,726 UART: [ldev] ++
1,301,894 UART: [ldev] CDI.KEYID = 6
1,302,258 UART: [ldev] SUBJECT.KEYID = 5
1,302,685 UART: [ldev] AUTHORITY.KEYID = 7
1,303,148 UART: [ldev] FE.KEYID = 1
1,308,254 UART: [ldev] Erasing FE.KEYID = 1
1,334,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,344 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,068 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,271 UART: [ldev] --
1,373,687 UART: [fwproc] Wait for Commands...
1,374,314 UART: [fwproc] Recv command 0x46574c44
1,375,047 UART: [fwproc] Recv'd Img size: 106600 bytes
2,581,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,086 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,627,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,762,623 >>> mbox cmd response: success
2,762,623 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,763,808 UART: [afmc] ++
2,763,976 UART: [afmc] CDI.KEYID = 6
2,764,339 UART: [afmc] SUBJECT.KEYID = 7
2,764,765 UART: [afmc] AUTHORITY.KEYID = 5
2,800,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,004 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,822,724 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,828,617 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,834,322 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,842,197 UART: [afmc] --
2,843,175 UART: [cold-reset] --
2,843,887 UART: [state] Locking Datavault
2,845,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,845,828 UART: [state] Locking ICCM
2,846,324 UART: [exit] Launching FMC @ 0x40000000
2,851,621 UART:
2,851,637 UART: Running Caliptra FMC ...
2,852,045 UART:
2,852,183 UART: [fmc] Received command: 0x10000001
2,853,276 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,872,136 UART: [fmc] LDEVID cert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
2,963,113 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,982,704 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,101,239 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,136 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,540,224 >>> mbox cmd response: success
2,540,224 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,601,437 UART:
2,601,453 UART: Running Caliptra FMC ...
2,601,861 UART:
2,601,999 UART: [fmc] Received command: 0x10000001
2,603,092 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,621,952 UART: [fmc] LDEVID cert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
2,712,929 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,732,520 UART: [fmc] FMCALIAS cert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
2,851,055 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,175 UART: [kat] SHA2-512-ACC
906,076 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,181,466 UART: [idev] Erasing UDS.KEYID = 0
1,198,076 UART: [idev] Sha1 KeyId Algorithm
1,206,264 UART: [idev] CSR upload begun
1,208,043 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,046 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,754 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,639 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,355 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,820 UART: [idev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
1,296,610 UART: [idev] CSR uploaded
1,299,655 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,299,824 UART: [idev] --
1,300,897 UART: [ldev] ++
1,301,065 UART: [ldev] CDI.KEYID = 6
1,301,429 UART: [ldev] SUBJECT.KEYID = 5
1,301,856 UART: [ldev] AUTHORITY.KEYID = 7
1,302,319 UART: [ldev] FE.KEYID = 1
1,307,647 UART: [ldev] Erasing FE.KEYID = 1
1,333,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,891 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,615 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,768 UART: [ldev] --
1,373,250 UART: [fwproc] Wait for Commands...
1,373,855 UART: [fwproc] Recv command 0x46574c44
1,374,588 UART: [fwproc] Recv'd Img size: 106600 bytes
2,582,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,169 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,627,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,762,772 >>> mbox cmd response: success
2,762,772 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,763,787 UART: [afmc] ++
2,763,955 UART: [afmc] CDI.KEYID = 6
2,764,318 UART: [afmc] SUBJECT.KEYID = 7
2,764,744 UART: [afmc] AUTHORITY.KEYID = 5
2,800,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,823,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,829,506 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,835,211 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,843,090 UART: [afmc] --
2,844,102 UART: [cold-reset] --
2,845,104 UART: [state] Locking Datavault
2,846,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,901 UART: [state] Locking ICCM
2,847,353 UART: [exit] Launching FMC @ 0x40000000
2,852,650 UART:
2,852,666 UART: Running Caliptra FMC ...
2,853,074 UART:
2,853,212 UART: [fmc] Received command: 0x10000001
2,854,305 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,873,165 UART: [fmc] LDEVID cert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
2,964,142 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,983,733 UART: [fmc] FMCALIAS cert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
3,102,268 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,103 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,539,471 >>> mbox cmd response: success
2,539,471 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,602,244 UART:
2,602,260 UART: Running Caliptra FMC ...
2,602,668 UART:
2,602,806 UART: [fmc] Received command: 0x10000001
2,603,899 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,622,759 UART: [fmc] LDEVID cert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
2,713,736 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,733,327 UART: [fmc] FMCALIAS cert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
2,851,862 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
5,802 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,283 UART:
192,649 UART: Running Caliptra ROM ...
193,832 UART:
193,988 UART: [state] CFI Enabled
261,981 UART: [state] LifecycleState = Unprovisioned
264,348 UART: [state] DebugLocked = No
265,725 UART: [state] WD Timer not started. Device not locked for debugging
271,076 UART: [kat] SHA2-256
453,017 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,507 UART: [kat] ++
465,101 UART: [kat] sha1
475,538 UART: [kat] SHA2-256
478,542 UART: [kat] SHA2-384
484,308 UART: [kat] SHA2-512-ACC
486,924 UART: [kat] ECC-384
3,775,661 UART: [kat] HMAC-384Kdf
3,802,813 UART: [kat] LMS
4,875,974 UART: [kat] --
4,880,256 UART: [cold-reset] ++
4,882,746 UART: [fht] FHT @ 0x50003400
4,893,516 UART: [idev] ++
4,894,189 UART: [idev] CDI.KEYID = 6
4,895,431 UART: [idev] SUBJECT.KEYID = 7
4,896,527 UART: [idev] UDS.KEYID = 0
4,929,739 UART: [idev] Erasing UDS.KEYID = 0
8,242,042 UART: [idev] Sha1 KeyId Algorithm
8,264,309 UART: [idev] --
8,268,574 UART: [ldev] ++
8,269,141 UART: [ldev] CDI.KEYID = 6
8,270,324 UART: [ldev] SUBJECT.KEYID = 5
8,271,524 UART: [ldev] AUTHORITY.KEYID = 7
8,272,627 UART: [ldev] FE.KEYID = 1
8,316,250 UART: [ldev] Erasing FE.KEYID = 1
11,651,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,964 UART: [ldev] --
14,039,263 UART: [fwproc] Wait for Commands...
14,041,253 UART: [fwproc] Recv command 0x46574c44
14,043,550 UART: [fwproc] Recv'd Img size: 113760 bytes
16,986,552 UART: ROM Fatal Error: 0x000B0014
16,989,956 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,135 writing to cptra_bootfsm_go
6,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,749,675 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
6,326 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,462 UART:
192,863 UART: Running Caliptra ROM ...
193,983 UART:
603,667 UART: [state] CFI Enabled
617,440 UART: [state] LifecycleState = Unprovisioned
619,438 UART: [state] DebugLocked = No
621,548 UART: [state] WD Timer not started. Device not locked for debugging
626,074 UART: [kat] SHA2-256
808,051 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,567 UART: [kat] ++
820,065 UART: [kat] sha1
831,111 UART: [kat] SHA2-256
834,164 UART: [kat] SHA2-384
840,965 UART: [kat] SHA2-512-ACC
843,579 UART: [kat] ECC-384
4,099,522 UART: [kat] HMAC-384Kdf
4,112,729 UART: [kat] LMS
5,185,881 UART: [kat] --
5,190,045 UART: [cold-reset] ++
5,191,500 UART: [fht] FHT @ 0x50003400
5,203,935 UART: [idev] ++
5,204,660 UART: [idev] CDI.KEYID = 6
5,205,830 UART: [idev] SUBJECT.KEYID = 7
5,207,316 UART: [idev] UDS.KEYID = 0
5,222,910 UART: [idev] Erasing UDS.KEYID = 0
8,496,199 UART: [idev] Sha1 KeyId Algorithm
8,518,401 UART: [idev] --
8,522,151 UART: [ldev] ++
8,522,724 UART: [ldev] CDI.KEYID = 6
8,523,981 UART: [ldev] SUBJECT.KEYID = 5
8,525,412 UART: [ldev] AUTHORITY.KEYID = 7
8,526,973 UART: [ldev] FE.KEYID = 1
8,537,351 UART: [ldev] Erasing FE.KEYID = 1
11,828,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,483 UART: [ldev] --
14,195,164 UART: [fwproc] Wait for Commands...
14,196,983 UART: [fwproc] Recv command 0x46574c44
14,199,298 UART: [fwproc] Recv'd Img size: 113760 bytes
17,147,093 UART: ROM Fatal Error: 0x000B0014
17,150,518 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,138 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,946,997 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
5,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,143 UART:
192,527 UART: Running Caliptra ROM ...
193,732 UART:
193,884 UART: [state] CFI Enabled
267,337 UART: [state] LifecycleState = Unprovisioned
269,205 UART: [state] DebugLocked = No
271,673 UART: [state] WD Timer not started. Device not locked for debugging
276,000 UART: [kat] SHA2-256
455,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,679 UART: [kat] ++
467,272 UART: [kat] sha1
477,683 UART: [kat] SHA2-256
480,712 UART: [kat] SHA2-384
486,046 UART: [kat] SHA2-512-ACC
489,044 UART: [kat] ECC-384
2,947,768 UART: [kat] HMAC-384Kdf
2,972,967 UART: [kat] LMS
3,502,386 UART: [kat] --
3,509,533 UART: [cold-reset] ++
3,511,580 UART: [fht] FHT @ 0x50003400
3,522,994 UART: [idev] ++
3,523,568 UART: [idev] CDI.KEYID = 6
3,524,476 UART: [idev] SUBJECT.KEYID = 7
3,525,696 UART: [idev] UDS.KEYID = 0
3,545,726 UART: [idev] Erasing UDS.KEYID = 0
6,026,317 UART: [idev] Sha1 KeyId Algorithm
6,047,771 UART: [idev] --
6,052,153 UART: [ldev] ++
6,052,764 UART: [ldev] CDI.KEYID = 6
6,053,681 UART: [ldev] SUBJECT.KEYID = 5
6,054,790 UART: [ldev] AUTHORITY.KEYID = 7
6,056,143 UART: [ldev] FE.KEYID = 1
6,100,914 UART: [ldev] Erasing FE.KEYID = 1
8,604,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,694 UART: [ldev] --
10,416,557 UART: [fwproc] Wait for Commands...
10,418,710 UART: [fwproc] Recv command 0x46574c44
10,420,831 UART: [fwproc] Recv'd Img size: 114084 bytes
12,699,911 UART: ROM Fatal Error: 0x000B0014
12,703,040 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
5,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,509,171 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
6,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,367 UART:
192,731 UART: Running Caliptra ROM ...
193,910 UART:
603,661 UART: [state] CFI Enabled
617,377 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
620,820 UART: [state] WD Timer not started. Device not locked for debugging
624,978 UART: [kat] SHA2-256
804,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,689 UART: [kat] ++
816,157 UART: [kat] sha1
826,601 UART: [kat] SHA2-256
829,595 UART: [kat] SHA2-384
834,972 UART: [kat] SHA2-512-ACC
837,956 UART: [kat] ECC-384
3,280,010 UART: [kat] HMAC-384Kdf
3,292,451 UART: [kat] LMS
3,821,919 UART: [kat] --
3,825,364 UART: [cold-reset] ++
3,827,771 UART: [fht] FHT @ 0x50003400
3,838,253 UART: [idev] ++
3,838,854 UART: [idev] CDI.KEYID = 6
3,839,769 UART: [idev] SUBJECT.KEYID = 7
3,840,982 UART: [idev] UDS.KEYID = 0
3,856,737 UART: [idev] Erasing UDS.KEYID = 0
6,310,654 UART: [idev] Sha1 KeyId Algorithm
6,333,732 UART: [idev] --
6,336,572 UART: [ldev] ++
6,337,149 UART: [ldev] CDI.KEYID = 6
6,338,058 UART: [ldev] SUBJECT.KEYID = 5
6,339,219 UART: [ldev] AUTHORITY.KEYID = 7
6,340,448 UART: [ldev] FE.KEYID = 1
6,352,011 UART: [ldev] Erasing FE.KEYID = 1
8,823,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,130 UART: [ldev] --
10,611,528 UART: [fwproc] Wait for Commands...
10,614,699 UART: [fwproc] Recv command 0x46574c44
10,616,734 UART: [fwproc] Recv'd Img size: 114084 bytes
12,904,956 UART: ROM Fatal Error: 0x000B0014
12,908,090 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
6,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,707,336 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
5,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,222 UART:
192,608 UART: Running Caliptra ROM ...
193,702 UART:
193,842 UART: [state] CFI Enabled
262,812 UART: [state] LifecycleState = Unprovisioned
264,731 UART: [state] DebugLocked = No
266,600 UART: [state] WD Timer not started. Device not locked for debugging
269,854 UART: [kat] SHA2-256
448,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,559 UART: [kat] ++
461,091 UART: [kat] sha1
473,033 UART: [kat] SHA2-256
476,078 UART: [kat] SHA2-384
480,604 UART: [kat] SHA2-512-ACC
483,539 UART: [kat] ECC-384
2,949,400 UART: [kat] HMAC-384Kdf
2,970,252 UART: [kat] LMS
3,499,713 UART: [kat] --
3,503,275 UART: [cold-reset] ++
3,504,771 UART: [fht] FHT @ 0x50003400
3,515,906 UART: [idev] ++
3,516,509 UART: [idev] CDI.KEYID = 6
3,517,392 UART: [idev] SUBJECT.KEYID = 7
3,518,608 UART: [idev] UDS.KEYID = 0
3,542,899 UART: [idev] Erasing UDS.KEYID = 0
6,024,176 UART: [idev] Sha1 KeyId Algorithm
6,046,774 UART: [idev] --
6,049,428 UART: [ldev] ++
6,050,006 UART: [ldev] CDI.KEYID = 6
6,050,896 UART: [ldev] SUBJECT.KEYID = 5
6,051,974 UART: [ldev] AUTHORITY.KEYID = 7
6,053,318 UART: [ldev] FE.KEYID = 1
6,099,040 UART: [ldev] Erasing FE.KEYID = 1
8,599,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,542 UART: [ldev] --
10,410,360 UART: [fwproc] Wait for Commands...
10,412,425 UART: [fwproc] Recv command 0x46574c44
10,414,470 UART: [fwproc] Recv'd Img size: 114084 bytes
12,702,181 UART: ROM Fatal Error: 0x000B0014
12,705,321 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
5,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,515,504 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
6,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,427 UART:
192,898 UART: Running Caliptra ROM ...
194,009 UART:
603,344 UART: [state] CFI Enabled
616,869 UART: [state] LifecycleState = Unprovisioned
618,764 UART: [state] DebugLocked = No
621,378 UART: [state] WD Timer not started. Device not locked for debugging
624,609 UART: [kat] SHA2-256
803,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,292 UART: [kat] ++
815,820 UART: [kat] sha1
825,513 UART: [kat] SHA2-256
828,510 UART: [kat] SHA2-384
835,601 UART: [kat] SHA2-512-ACC
838,560 UART: [kat] ECC-384
3,280,169 UART: [kat] HMAC-384Kdf
3,292,230 UART: [kat] LMS
3,821,722 UART: [kat] --
3,826,472 UART: [cold-reset] ++
3,828,404 UART: [fht] FHT @ 0x50003400
3,838,785 UART: [idev] ++
3,839,340 UART: [idev] CDI.KEYID = 6
3,840,273 UART: [idev] SUBJECT.KEYID = 7
3,841,480 UART: [idev] UDS.KEYID = 0
3,853,430 UART: [idev] Erasing UDS.KEYID = 0
6,313,983 UART: [idev] Sha1 KeyId Algorithm
6,336,935 UART: [idev] --
6,341,575 UART: [ldev] ++
6,342,138 UART: [ldev] CDI.KEYID = 6
6,343,045 UART: [ldev] SUBJECT.KEYID = 5
6,344,263 UART: [ldev] AUTHORITY.KEYID = 7
6,345,507 UART: [ldev] FE.KEYID = 1
6,356,318 UART: [ldev] Erasing FE.KEYID = 1
8,829,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,283 UART: [ldev] --
10,620,732 UART: [fwproc] Wait for Commands...
10,622,667 UART: [fwproc] Recv command 0x46574c44
10,624,703 UART: [fwproc] Recv'd Img size: 114084 bytes
12,919,742 UART: ROM Fatal Error: 0x000B0014
12,922,870 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
6,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,702,658 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,181,729 UART: [idev] Erasing UDS.KEYID = 0
1,198,443 UART: [idev] Sha1 KeyId Algorithm
1,207,349 UART: [idev] --
1,208,410 UART: [ldev] ++
1,208,578 UART: [ldev] CDI.KEYID = 6
1,208,942 UART: [ldev] SUBJECT.KEYID = 5
1,209,369 UART: [ldev] AUTHORITY.KEYID = 7
1,209,832 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,372 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114084 bytes
1,546,401 UART: ROM Fatal Error: 0x000B0014
1,547,558 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,088 UART: [state] WD Timer not started. Device not locked for debugging
87,253 UART: [kat] SHA2-256
890,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,932 UART: [kat] ++
895,084 UART: [kat] sha1
899,390 UART: [kat] SHA2-256
901,330 UART: [kat] SHA2-384
904,003 UART: [kat] SHA2-512-ACC
905,904 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,617 UART: [kat] LMS
1,168,929 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,490 UART: [idev] ++
1,172,658 UART: [idev] CDI.KEYID = 6
1,173,019 UART: [idev] SUBJECT.KEYID = 7
1,173,444 UART: [idev] UDS.KEYID = 0
1,181,830 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,243,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,932 UART: [fwproc] Recv command 0x46574c44
1,283,665 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,250 UART: ROM Fatal Error: 0x000B0014
1,549,407 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,056 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,495 UART: [idev] ++
1,172,663 UART: [idev] CDI.KEYID = 6
1,173,024 UART: [idev] SUBJECT.KEYID = 7
1,173,449 UART: [idev] UDS.KEYID = 0
1,181,265 UART: [idev] Erasing UDS.KEYID = 0
1,197,785 UART: [idev] Sha1 KeyId Algorithm
1,206,495 UART: [idev] --
1,207,508 UART: [ldev] ++
1,207,676 UART: [ldev] CDI.KEYID = 6
1,208,040 UART: [ldev] SUBJECT.KEYID = 5
1,208,467 UART: [ldev] AUTHORITY.KEYID = 7
1,208,930 UART: [ldev] FE.KEYID = 1
1,213,842 UART: [ldev] Erasing FE.KEYID = 1
1,240,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,572 UART: [ldev] --
1,280,012 UART: [fwproc] Wait for Commands...
1,280,815 UART: [fwproc] Recv command 0x46574c44
1,281,548 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,387 UART: ROM Fatal Error: 0x000B0014
1,548,544 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,447 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,912 UART: [kat] ++
896,064 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,494 UART: [idev] ++
1,173,662 UART: [idev] CDI.KEYID = 6
1,174,023 UART: [idev] SUBJECT.KEYID = 7
1,174,448 UART: [idev] UDS.KEYID = 0
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,087 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,437 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,046 UART: ROM Fatal Error: 0x000B0014
1,550,203 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,532 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,299 UART: [kat] SHA2-256
902,239 UART: [kat] SHA2-384
904,850 UART: [kat] SHA2-512-ACC
906,751 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,753 UART: [idev] ++
1,173,921 UART: [idev] CDI.KEYID = 6
1,174,282 UART: [idev] SUBJECT.KEYID = 7
1,174,707 UART: [idev] UDS.KEYID = 0
1,182,431 UART: [idev] Erasing UDS.KEYID = 0
1,199,255 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,490 UART: [fwproc] Wait for Commands...
1,282,151 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,987 UART: ROM Fatal Error: 0x000B0014
1,549,144 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,085 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,791 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,562 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,399 UART: [ldev] Erasing FE.KEYID = 1
1,241,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,406 UART: ROM Fatal Error: 0x000B0014
1,549,563 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,912 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,108 UART:
192,512 UART: Running Caliptra ROM ...
193,651 UART:
193,796 UART: [state] CFI Enabled
264,314 UART: [state] LifecycleState = Unprovisioned
266,682 UART: [state] DebugLocked = No
268,651 UART: [state] WD Timer not started. Device not locked for debugging
273,590 UART: [kat] SHA2-256
455,479 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,997 UART: [kat] ++
467,586 UART: [kat] sha1
478,794 UART: [kat] SHA2-256
481,804 UART: [kat] SHA2-384
488,367 UART: [kat] SHA2-512-ACC
491,032 UART: [kat] ECC-384
3,777,771 UART: [kat] HMAC-384Kdf
3,803,070 UART: [kat] LMS
4,876,199 UART: [kat] --
4,879,718 UART: [cold-reset] ++
4,881,708 UART: [fht] FHT @ 0x50003400
4,893,557 UART: [idev] ++
4,894,233 UART: [idev] CDI.KEYID = 6
4,895,467 UART: [idev] SUBJECT.KEYID = 7
4,896,566 UART: [idev] UDS.KEYID = 0
4,931,232 UART: [idev] Erasing UDS.KEYID = 0
8,243,473 UART: [idev] Sha1 KeyId Algorithm
8,263,998 UART: [idev] --
8,267,889 UART: [ldev] ++
8,268,453 UART: [ldev] CDI.KEYID = 6
8,269,689 UART: [ldev] SUBJECT.KEYID = 5
8,271,042 UART: [ldev] AUTHORITY.KEYID = 7
8,272,239 UART: [ldev] FE.KEYID = 1
8,318,833 UART: [ldev] Erasing FE.KEYID = 1
11,653,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,450 UART: [ldev] --
14,037,603 UART: [fwproc] Wait for Commands...
14,040,629 UART: [fwproc] Recv command 0x46574c44
14,042,951 UART: [fwproc] Recv'd Img size: 113760 bytes
16,986,457 UART: ROM Fatal Error: 0x000B0024
16,989,868 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,393 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,753,669 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,606 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,337 UART:
192,731 UART: Running Caliptra ROM ...
193,954 UART:
603,309 UART: [state] CFI Enabled
615,712 UART: [state] LifecycleState = Unprovisioned
618,105 UART: [state] DebugLocked = No
620,518 UART: [state] WD Timer not started. Device not locked for debugging
625,585 UART: [kat] SHA2-256
807,539 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,082 UART: [kat] ++
819,672 UART: [kat] sha1
828,826 UART: [kat] SHA2-256
831,847 UART: [kat] SHA2-384
837,816 UART: [kat] SHA2-512-ACC
840,429 UART: [kat] ECC-384
4,096,956 UART: [kat] HMAC-384Kdf
4,108,477 UART: [kat] LMS
5,181,652 UART: [kat] --
5,184,700 UART: [cold-reset] ++
5,186,911 UART: [fht] FHT @ 0x50003400
5,197,183 UART: [idev] ++
5,197,907 UART: [idev] CDI.KEYID = 6
5,199,137 UART: [idev] SUBJECT.KEYID = 7
5,200,560 UART: [idev] UDS.KEYID = 0
5,217,232 UART: [idev] Erasing UDS.KEYID = 0
8,495,643 UART: [idev] Sha1 KeyId Algorithm
8,517,743 UART: [idev] --
8,522,116 UART: [ldev] ++
8,522,703 UART: [ldev] CDI.KEYID = 6
8,523,878 UART: [ldev] SUBJECT.KEYID = 5
8,525,355 UART: [ldev] AUTHORITY.KEYID = 7
8,526,905 UART: [ldev] FE.KEYID = 1
8,537,449 UART: [ldev] Erasing FE.KEYID = 1
11,830,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,915 UART: [ldev] --
14,195,340 UART: [fwproc] Wait for Commands...
14,197,813 UART: [fwproc] Recv command 0x46574c44
14,200,122 UART: [fwproc] Recv'd Img size: 113760 bytes
17,139,542 UART: ROM Fatal Error: 0x000B0024
17,142,995 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,625 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,956,287 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,099 UART:
192,639 UART: Running Caliptra ROM ...
193,808 UART:
194,226 UART: [state] CFI Enabled
267,514 UART: [state] LifecycleState = Unprovisioned
269,394 UART: [state] DebugLocked = No
271,371 UART: [state] WD Timer not started. Device not locked for debugging
274,856 UART: [kat] SHA2-256
453,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,554 UART: [kat] ++
466,104 UART: [kat] sha1
476,717 UART: [kat] SHA2-256
479,725 UART: [kat] SHA2-384
485,110 UART: [kat] SHA2-512-ACC
488,096 UART: [kat] ECC-384
2,948,654 UART: [kat] HMAC-384Kdf
2,970,937 UART: [kat] LMS
3,500,373 UART: [kat] --
3,505,081 UART: [cold-reset] ++
3,507,611 UART: [fht] FHT @ 0x50003400
3,518,655 UART: [idev] ++
3,519,219 UART: [idev] CDI.KEYID = 6
3,520,123 UART: [idev] SUBJECT.KEYID = 7
3,521,338 UART: [idev] UDS.KEYID = 0
3,543,710 UART: [idev] Erasing UDS.KEYID = 0
6,025,461 UART: [idev] Sha1 KeyId Algorithm
6,050,044 UART: [idev] --
6,052,940 UART: [ldev] ++
6,053,519 UART: [ldev] CDI.KEYID = 6
6,054,431 UART: [ldev] SUBJECT.KEYID = 5
6,055,650 UART: [ldev] AUTHORITY.KEYID = 7
6,056,887 UART: [ldev] FE.KEYID = 1
6,098,748 UART: [ldev] Erasing FE.KEYID = 1
8,605,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,178 UART: [ldev] --
10,411,397 UART: [fwproc] Wait for Commands...
10,413,137 UART: [fwproc] Recv command 0x46574c44
10,415,192 UART: [fwproc] Recv'd Img size: 114084 bytes
12,706,603 UART: ROM Fatal Error: 0x000B0024
12,709,739 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,495,740 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,445 UART:
192,819 UART: Running Caliptra ROM ...
193,942 UART:
603,568 UART: [state] CFI Enabled
617,593 UART: [state] LifecycleState = Unprovisioned
619,483 UART: [state] DebugLocked = No
622,103 UART: [state] WD Timer not started. Device not locked for debugging
626,630 UART: [kat] SHA2-256
805,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,343 UART: [kat] ++
817,884 UART: [kat] sha1
829,798 UART: [kat] SHA2-256
832,786 UART: [kat] SHA2-384
838,766 UART: [kat] SHA2-512-ACC
841,699 UART: [kat] ECC-384
3,280,433 UART: [kat] HMAC-384Kdf
3,293,856 UART: [kat] LMS
3,823,341 UART: [kat] --
3,827,117 UART: [cold-reset] ++
3,829,367 UART: [fht] FHT @ 0x50003400
3,841,228 UART: [idev] ++
3,841,802 UART: [idev] CDI.KEYID = 6
3,842,819 UART: [idev] SUBJECT.KEYID = 7
3,843,923 UART: [idev] UDS.KEYID = 0
3,862,442 UART: [idev] Erasing UDS.KEYID = 0
6,315,906 UART: [idev] Sha1 KeyId Algorithm
6,339,083 UART: [idev] --
6,343,345 UART: [ldev] ++
6,344,097 UART: [ldev] CDI.KEYID = 6
6,345,031 UART: [ldev] SUBJECT.KEYID = 5
6,346,149 UART: [ldev] AUTHORITY.KEYID = 7
6,347,325 UART: [ldev] FE.KEYID = 1
6,357,482 UART: [ldev] Erasing FE.KEYID = 1
8,833,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,720 UART: [ldev] --
10,625,259 UART: [fwproc] Wait for Commands...
10,627,736 UART: [fwproc] Recv command 0x46574c44
10,629,831 UART: [fwproc] Recv'd Img size: 114084 bytes
12,917,752 UART: ROM Fatal Error: 0x000B0024
12,920,872 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,738 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,697,645 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,324 UART:
192,724 UART: Running Caliptra ROM ...
193,963 UART:
194,116 UART: [state] CFI Enabled
265,967 UART: [state] LifecycleState = Unprovisioned
267,889 UART: [state] DebugLocked = No
270,681 UART: [state] WD Timer not started. Device not locked for debugging
273,916 UART: [kat] SHA2-256
453,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,653 UART: [kat] ++
465,192 UART: [kat] sha1
477,811 UART: [kat] SHA2-256
480,880 UART: [kat] SHA2-384
486,284 UART: [kat] SHA2-512-ACC
489,276 UART: [kat] ECC-384
2,948,190 UART: [kat] HMAC-384Kdf
2,971,174 UART: [kat] LMS
3,500,662 UART: [kat] --
3,505,151 UART: [cold-reset] ++
3,507,627 UART: [fht] FHT @ 0x50003400
3,518,401 UART: [idev] ++
3,518,964 UART: [idev] CDI.KEYID = 6
3,519,947 UART: [idev] SUBJECT.KEYID = 7
3,521,106 UART: [idev] UDS.KEYID = 0
3,544,000 UART: [idev] Erasing UDS.KEYID = 0
6,028,911 UART: [idev] Sha1 KeyId Algorithm
6,052,845 UART: [idev] --
6,056,143 UART: [ldev] ++
6,056,722 UART: [ldev] CDI.KEYID = 6
6,057,855 UART: [ldev] SUBJECT.KEYID = 5
6,058,983 UART: [ldev] AUTHORITY.KEYID = 7
6,060,171 UART: [ldev] FE.KEYID = 1
6,099,719 UART: [ldev] Erasing FE.KEYID = 1
8,601,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,928 UART: [ldev] --
10,412,091 UART: [fwproc] Wait for Commands...
10,415,230 UART: [fwproc] Recv command 0x46574c44
10,417,278 UART: [fwproc] Recv'd Img size: 114084 bytes
12,709,503 UART: ROM Fatal Error: 0x000B0024
12,712,578 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,495,059 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,398 UART:
192,801 UART: Running Caliptra ROM ...
193,957 UART:
603,323 UART: [state] CFI Enabled
619,723 UART: [state] LifecycleState = Unprovisioned
621,610 UART: [state] DebugLocked = No
623,061 UART: [state] WD Timer not started. Device not locked for debugging
626,725 UART: [kat] SHA2-256
805,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,454 UART: [kat] ++
817,925 UART: [kat] sha1
828,907 UART: [kat] SHA2-256
831,973 UART: [kat] SHA2-384
838,383 UART: [kat] SHA2-512-ACC
841,359 UART: [kat] ECC-384
3,282,202 UART: [kat] HMAC-384Kdf
3,295,375 UART: [kat] LMS
3,824,832 UART: [kat] --
3,830,875 UART: [cold-reset] ++
3,832,696 UART: [fht] FHT @ 0x50003400
3,844,162 UART: [idev] ++
3,844,720 UART: [idev] CDI.KEYID = 6
3,845,653 UART: [idev] SUBJECT.KEYID = 7
3,846,857 UART: [idev] UDS.KEYID = 0
3,862,748 UART: [idev] Erasing UDS.KEYID = 0
6,326,310 UART: [idev] Sha1 KeyId Algorithm
6,349,781 UART: [idev] --
6,353,667 UART: [ldev] ++
6,354,236 UART: [ldev] CDI.KEYID = 6
6,355,145 UART: [ldev] SUBJECT.KEYID = 5
6,356,360 UART: [ldev] AUTHORITY.KEYID = 7
6,357,591 UART: [ldev] FE.KEYID = 1
6,368,141 UART: [ldev] Erasing FE.KEYID = 1
8,844,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,435 UART: [ldev] --
10,632,942 UART: [fwproc] Wait for Commands...
10,635,198 UART: [fwproc] Recv command 0x46574c44
10,637,291 UART: [fwproc] Recv'd Img size: 114084 bytes
12,925,665 UART: ROM Fatal Error: 0x000B0024
12,928,836 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,696,533 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
890,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,835 UART: [kat] ++
894,987 UART: [kat] sha1
899,191 UART: [kat] SHA2-256
901,131 UART: [kat] SHA2-384
903,810 UART: [kat] SHA2-512-ACC
905,711 UART: [kat] ECC-384
915,228 UART: [kat] HMAC-384Kdf
919,750 UART: [kat] LMS
1,168,062 UART: [kat] --
1,168,817 UART: [cold-reset] ++
1,169,231 UART: [fht] FHT @ 0x50003400
1,171,889 UART: [idev] ++
1,172,057 UART: [idev] CDI.KEYID = 6
1,172,418 UART: [idev] SUBJECT.KEYID = 7
1,172,843 UART: [idev] UDS.KEYID = 0
1,180,517 UART: [idev] Erasing UDS.KEYID = 0
1,197,407 UART: [idev] Sha1 KeyId Algorithm
1,206,263 UART: [idev] --
1,207,246 UART: [ldev] ++
1,207,414 UART: [ldev] CDI.KEYID = 6
1,207,778 UART: [ldev] SUBJECT.KEYID = 5
1,208,205 UART: [ldev] AUTHORITY.KEYID = 7
1,208,668 UART: [ldev] FE.KEYID = 1
1,214,036 UART: [ldev] Erasing FE.KEYID = 1
1,240,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,388 UART: [ldev] --
1,279,878 UART: [fwproc] Wait for Commands...
1,280,643 UART: [fwproc] Recv command 0x46574c44
1,281,376 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,383 UART: ROM Fatal Error: 0x000B0024
1,548,540 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,863 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,076 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,640 UART: [idev] Erasing UDS.KEYID = 0
1,198,638 UART: [idev] Sha1 KeyId Algorithm
1,207,468 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,047 UART: [ldev] Erasing FE.KEYID = 1
1,241,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,553 UART: [ldev] --
1,280,827 UART: [fwproc] Wait for Commands...
1,281,510 UART: [fwproc] Recv command 0x46574c44
1,282,243 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,258 UART: ROM Fatal Error: 0x000B0024
1,549,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,890 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,092 UART: [kat] LMS
1,168,404 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,755 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,181,047 UART: [idev] Erasing UDS.KEYID = 0
1,197,775 UART: [idev] Sha1 KeyId Algorithm
1,206,765 UART: [idev] --
1,207,772 UART: [ldev] ++
1,207,940 UART: [ldev] CDI.KEYID = 6
1,208,304 UART: [ldev] SUBJECT.KEYID = 5
1,208,731 UART: [ldev] AUTHORITY.KEYID = 7
1,209,194 UART: [ldev] FE.KEYID = 1
1,214,742 UART: [ldev] Erasing FE.KEYID = 1
1,241,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,558 UART: [ldev] --
1,280,826 UART: [fwproc] Wait for Commands...
1,281,535 UART: [fwproc] Recv command 0x46574c44
1,282,268 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,869 UART: ROM Fatal Error: 0x000B0024
1,549,026 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,409 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,808 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,108 UART: ROM Fatal Error: 0x000B0024
1,550,265 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,906 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,828 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,183 UART: ROM Fatal Error: 0x000B0024
1,549,340 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,400,913 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,193 UART: [kat] SHA2-512-ACC
906,094 UART: [kat] ECC-384
915,627 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,181,908 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,688 UART: [idev] --
1,208,569 UART: [ldev] ++
1,208,737 UART: [ldev] CDI.KEYID = 6
1,209,101 UART: [ldev] SUBJECT.KEYID = 5
1,209,528 UART: [ldev] AUTHORITY.KEYID = 7
1,209,991 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,240,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,831 UART: [ldev] --
1,280,121 UART: [fwproc] Wait for Commands...
1,280,834 UART: [fwproc] Recv command 0x46574c44
1,281,567 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,774 UART: ROM Fatal Error: 0x000B0024
1,548,931 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,574 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,418 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,189 UART:
192,576 UART: Running Caliptra ROM ...
193,782 UART:
193,936 UART: [state] CFI Enabled
264,281 UART: [state] LifecycleState = Unprovisioned
266,709 UART: [state] DebugLocked = No
268,255 UART: [state] WD Timer not started. Device not locked for debugging
273,280 UART: [kat] SHA2-256
455,221 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,748 UART: [kat] ++
467,348 UART: [kat] sha1
478,087 UART: [kat] SHA2-256
481,104 UART: [kat] SHA2-384
486,805 UART: [kat] SHA2-512-ACC
489,414 UART: [kat] ECC-384
3,776,432 UART: [kat] HMAC-384Kdf
3,802,165 UART: [kat] LMS
4,875,352 UART: [kat] --
4,879,687 UART: [cold-reset] ++
4,880,880 UART: [fht] FHT @ 0x50003400
4,893,289 UART: [idev] ++
4,893,964 UART: [idev] CDI.KEYID = 6
4,895,124 UART: [idev] SUBJECT.KEYID = 7
4,896,335 UART: [idev] UDS.KEYID = 0
4,931,724 UART: [idev] Erasing UDS.KEYID = 0
8,243,868 UART: [idev] Sha1 KeyId Algorithm
8,264,721 UART: [idev] --
8,269,151 UART: [ldev] ++
8,269,719 UART: [ldev] CDI.KEYID = 6
8,270,877 UART: [ldev] SUBJECT.KEYID = 5
8,272,091 UART: [ldev] AUTHORITY.KEYID = 7
8,273,246 UART: [ldev] FE.KEYID = 1
8,317,897 UART: [ldev] Erasing FE.KEYID = 1
11,654,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,544 UART: [ldev] --
14,038,809 UART: [fwproc] Wait for Commands...
14,041,177 UART: [fwproc] Recv command 0x46574c44
14,043,438 UART: [fwproc] Recv'd Img size: 113760 bytes
16,980,511 UART: ROM Fatal Error: 0x000B0023
16,983,916 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,567 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,794,897 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,681 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,429 UART:
192,819 UART: Running Caliptra ROM ...
194,023 UART:
603,386 UART: [state] CFI Enabled
615,663 UART: [state] LifecycleState = Unprovisioned
618,023 UART: [state] DebugLocked = No
620,231 UART: [state] WD Timer not started. Device not locked for debugging
624,866 UART: [kat] SHA2-256
806,843 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,402 UART: [kat] ++
818,995 UART: [kat] sha1
828,956 UART: [kat] SHA2-256
832,012 UART: [kat] SHA2-384
838,420 UART: [kat] SHA2-512-ACC
841,025 UART: [kat] ECC-384
4,096,208 UART: [kat] HMAC-384Kdf
4,109,370 UART: [kat] LMS
5,182,523 UART: [kat] --
5,186,957 UART: [cold-reset] ++
5,189,719 UART: [fht] FHT @ 0x50003400
5,199,677 UART: [idev] ++
5,200,369 UART: [idev] CDI.KEYID = 6
5,201,599 UART: [idev] SUBJECT.KEYID = 7
5,203,025 UART: [idev] UDS.KEYID = 0
5,221,102 UART: [idev] Erasing UDS.KEYID = 0
8,493,730 UART: [idev] Sha1 KeyId Algorithm
8,515,847 UART: [idev] --
8,520,820 UART: [ldev] ++
8,521,444 UART: [ldev] CDI.KEYID = 6
8,522,623 UART: [ldev] SUBJECT.KEYID = 5
8,524,113 UART: [ldev] AUTHORITY.KEYID = 7
8,525,670 UART: [ldev] FE.KEYID = 1
8,536,585 UART: [ldev] Erasing FE.KEYID = 1
11,827,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,980 UART: [ldev] --
14,191,304 UART: [fwproc] Wait for Commands...
14,194,271 UART: [fwproc] Recv command 0x46574c44
14,196,582 UART: [fwproc] Recv'd Img size: 113760 bytes
17,141,194 UART: ROM Fatal Error: 0x000B0023
17,144,640 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,717 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,956,295 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,010 UART:
192,410 UART: Running Caliptra ROM ...
193,575 UART:
193,742 UART: [state] CFI Enabled
264,189 UART: [state] LifecycleState = Unprovisioned
266,047 UART: [state] DebugLocked = No
268,193 UART: [state] WD Timer not started. Device not locked for debugging
271,636 UART: [kat] SHA2-256
450,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,308 UART: [kat] ++
462,841 UART: [kat] sha1
472,913 UART: [kat] SHA2-256
475,916 UART: [kat] SHA2-384
482,863 UART: [kat] SHA2-512-ACC
485,822 UART: [kat] ECC-384
2,951,254 UART: [kat] HMAC-384Kdf
2,973,393 UART: [kat] LMS
3,502,815 UART: [kat] --
3,508,323 UART: [cold-reset] ++
3,509,364 UART: [fht] FHT @ 0x50003400
3,520,240 UART: [idev] ++
3,520,804 UART: [idev] CDI.KEYID = 6
3,521,688 UART: [idev] SUBJECT.KEYID = 7
3,522,899 UART: [idev] UDS.KEYID = 0
3,545,413 UART: [idev] Erasing UDS.KEYID = 0
6,027,622 UART: [idev] Sha1 KeyId Algorithm
6,052,156 UART: [idev] --
6,055,562 UART: [ldev] ++
6,056,136 UART: [ldev] CDI.KEYID = 6
6,057,047 UART: [ldev] SUBJECT.KEYID = 5
6,058,211 UART: [ldev] AUTHORITY.KEYID = 7
6,059,448 UART: [ldev] FE.KEYID = 1
6,101,862 UART: [ldev] Erasing FE.KEYID = 1
8,605,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,088 UART: [ldev] --
10,414,138 UART: [fwproc] Wait for Commands...
10,416,672 UART: [fwproc] Recv command 0x46574c44
10,418,770 UART: [fwproc] Recv'd Img size: 114084 bytes
12,705,063 UART: ROM Fatal Error: 0x000B0023
12,708,197 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,518,573 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
18,142 writing to cptra_bootfsm_go
18,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
207,309 UART:
207,711 UART: Running Caliptra ROM ...
208,884 UART:
618,214 UART: [state] CFI Enabled
632,382 UART: [state] LifecycleState = Unprovisioned
634,208 UART: [state] DebugLocked = No
636,983 UART: [state] WD Timer not started. Device not locked for debugging
639,944 UART: [kat] SHA2-256
819,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
830,599 UART: [kat] ++
831,129 UART: [kat] sha1
842,987 UART: [kat] SHA2-256
845,990 UART: [kat] SHA2-384
851,651 UART: [kat] SHA2-512-ACC
854,642 UART: [kat] ECC-384
3,294,006 UART: [kat] HMAC-384Kdf
3,306,594 UART: [kat] LMS
3,836,073 UART: [kat] --
3,838,991 UART: [cold-reset] ++
3,840,326 UART: [fht] FHT @ 0x50003400
3,849,952 UART: [idev] ++
3,850,520 UART: [idev] CDI.KEYID = 6
3,851,431 UART: [idev] SUBJECT.KEYID = 7
3,852,641 UART: [idev] UDS.KEYID = 0
3,871,751 UART: [idev] Erasing UDS.KEYID = 0
6,327,355 UART: [idev] Sha1 KeyId Algorithm
6,349,929 UART: [idev] --
6,352,997 UART: [ldev] ++
6,353,581 UART: [ldev] CDI.KEYID = 6
6,354,493 UART: [ldev] SUBJECT.KEYID = 5
6,355,649 UART: [ldev] AUTHORITY.KEYID = 7
6,356,879 UART: [ldev] FE.KEYID = 1
6,369,641 UART: [ldev] Erasing FE.KEYID = 1
8,845,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,606 UART: [ldev] --
10,636,647 UART: [fwproc] Wait for Commands...
10,638,629 UART: [fwproc] Recv command 0x46574c44
10,640,720 UART: [fwproc] Recv'd Img size: 114084 bytes
12,929,808 UART: ROM Fatal Error: 0x000B0023
12,932,944 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,692,604 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,121 UART:
192,508 UART: Running Caliptra ROM ...
193,724 UART:
193,880 UART: [state] CFI Enabled
262,834 UART: [state] LifecycleState = Unprovisioned
264,652 UART: [state] DebugLocked = No
267,171 UART: [state] WD Timer not started. Device not locked for debugging
270,606 UART: [kat] SHA2-256
449,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,280 UART: [kat] ++
461,732 UART: [kat] sha1
473,418 UART: [kat] SHA2-256
476,434 UART: [kat] SHA2-384
482,578 UART: [kat] SHA2-512-ACC
485,510 UART: [kat] ECC-384
2,947,909 UART: [kat] HMAC-384Kdf
2,971,264 UART: [kat] LMS
3,500,707 UART: [kat] --
3,505,359 UART: [cold-reset] ++
3,507,934 UART: [fht] FHT @ 0x50003400
3,519,505 UART: [idev] ++
3,520,065 UART: [idev] CDI.KEYID = 6
3,521,002 UART: [idev] SUBJECT.KEYID = 7
3,522,223 UART: [idev] UDS.KEYID = 0
3,543,029 UART: [idev] Erasing UDS.KEYID = 0
6,024,939 UART: [idev] Sha1 KeyId Algorithm
6,047,435 UART: [idev] --
6,051,798 UART: [ldev] ++
6,052,382 UART: [ldev] CDI.KEYID = 6
6,053,266 UART: [ldev] SUBJECT.KEYID = 5
6,054,486 UART: [ldev] AUTHORITY.KEYID = 7
6,055,718 UART: [ldev] FE.KEYID = 1
6,098,445 UART: [ldev] Erasing FE.KEYID = 1
8,599,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,489 UART: [ldev] --
10,412,464 UART: [fwproc] Wait for Commands...
10,415,482 UART: [fwproc] Recv command 0x46574c44
10,417,600 UART: [fwproc] Recv'd Img size: 114084 bytes
12,705,981 UART: ROM Fatal Error: 0x000B0023
12,709,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,276 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,475,128 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,408 UART:
192,796 UART: Running Caliptra ROM ...
193,943 UART:
603,418 UART: [state] CFI Enabled
615,112 UART: [state] LifecycleState = Unprovisioned
616,986 UART: [state] DebugLocked = No
618,764 UART: [state] WD Timer not started. Device not locked for debugging
621,983 UART: [kat] SHA2-256
801,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,666 UART: [kat] ++
813,111 UART: [kat] sha1
825,548 UART: [kat] SHA2-256
828,556 UART: [kat] SHA2-384
833,689 UART: [kat] SHA2-512-ACC
836,630 UART: [kat] ECC-384
3,277,617 UART: [kat] HMAC-384Kdf
3,289,088 UART: [kat] LMS
3,818,610 UART: [kat] --
3,822,936 UART: [cold-reset] ++
3,824,811 UART: [fht] FHT @ 0x50003400
3,836,332 UART: [idev] ++
3,836,894 UART: [idev] CDI.KEYID = 6
3,837,811 UART: [idev] SUBJECT.KEYID = 7
3,839,022 UART: [idev] UDS.KEYID = 0
3,853,759 UART: [idev] Erasing UDS.KEYID = 0
6,310,250 UART: [idev] Sha1 KeyId Algorithm
6,333,050 UART: [idev] --
6,336,511 UART: [ldev] ++
6,337,081 UART: [ldev] CDI.KEYID = 6
6,338,012 UART: [ldev] SUBJECT.KEYID = 5
6,339,180 UART: [ldev] AUTHORITY.KEYID = 7
6,340,416 UART: [ldev] FE.KEYID = 1
6,350,955 UART: [ldev] Erasing FE.KEYID = 1
8,830,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,398 UART: [ldev] --
10,619,077 UART: [fwproc] Wait for Commands...
10,620,749 UART: [fwproc] Recv command 0x46574c44
10,622,787 UART: [fwproc] Recv'd Img size: 114084 bytes
12,912,891 UART: ROM Fatal Error: 0x000B0023
12,916,015 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,702,705 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,476 UART: [ldev] ++
1,208,644 UART: [ldev] CDI.KEYID = 6
1,209,008 UART: [ldev] SUBJECT.KEYID = 5
1,209,435 UART: [ldev] AUTHORITY.KEYID = 7
1,209,898 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,102 UART: [ldev] --
1,280,468 UART: [fwproc] Wait for Commands...
1,281,123 UART: [fwproc] Recv command 0x46574c44
1,281,856 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,536 UART: ROM Fatal Error: 0x000B0023
1,549,693 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,399,918 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,478 UART: [kat] SHA2-256
901,418 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,665 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,182,160 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,537 UART: [fwproc] Wait for Commands...
1,282,272 UART: [fwproc] Recv command 0x46574c44
1,283,005 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,655 UART: ROM Fatal Error: 0x000B0023
1,549,812 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,529 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,439 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,429 UART: [idev] ++
1,172,597 UART: [idev] CDI.KEYID = 6
1,172,958 UART: [idev] SUBJECT.KEYID = 7
1,173,383 UART: [idev] UDS.KEYID = 0
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,169 UART: [idev] Sha1 KeyId Algorithm
1,207,071 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,215,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,604 UART: [fwproc] Wait for Commands...
1,281,421 UART: [fwproc] Recv command 0x46574c44
1,282,154 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,894 UART: ROM Fatal Error: 0x000B0023
1,550,051 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,984 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,361 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,254 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,241,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,825 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,815 UART: ROM Fatal Error: 0x000B0023
1,549,972 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,039 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,185 UART: [cold-reset] ++
1,169,695 UART: [fht] FHT @ 0x50003400
1,172,381 UART: [idev] ++
1,172,549 UART: [idev] CDI.KEYID = 6
1,172,910 UART: [idev] SUBJECT.KEYID = 7
1,173,335 UART: [idev] UDS.KEYID = 0
1,180,963 UART: [idev] Erasing UDS.KEYID = 0
1,197,943 UART: [idev] Sha1 KeyId Algorithm
1,206,809 UART: [idev] --
1,207,814 UART: [ldev] ++
1,207,982 UART: [ldev] CDI.KEYID = 6
1,208,346 UART: [ldev] SUBJECT.KEYID = 5
1,208,773 UART: [ldev] AUTHORITY.KEYID = 7
1,209,236 UART: [ldev] FE.KEYID = 1
1,214,636 UART: [ldev] Erasing FE.KEYID = 1
1,241,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,280,154 UART: [fwproc] Wait for Commands...
1,280,803 UART: [fwproc] Recv command 0x46574c44
1,281,536 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,928 UART: ROM Fatal Error: 0x000B0023
1,549,085 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,038 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,745 UART: [kat] SHA2-512-ACC
906,646 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,660 UART: [idev] ++
1,173,828 UART: [idev] CDI.KEYID = 6
1,174,189 UART: [idev] SUBJECT.KEYID = 7
1,174,614 UART: [idev] UDS.KEYID = 0
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,181 UART: [ldev] ++
1,209,349 UART: [ldev] CDI.KEYID = 6
1,209,713 UART: [ldev] SUBJECT.KEYID = 5
1,210,140 UART: [ldev] AUTHORITY.KEYID = 7
1,210,603 UART: [ldev] FE.KEYID = 1
1,216,011 UART: [ldev] Erasing FE.KEYID = 1
1,242,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,171 UART: ROM Fatal Error: 0x000B0023
1,549,328 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,625 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,020,903 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,738 UART:
2,165,130 UART: Running Caliptra ROM ...
2,166,292 UART:
2,166,466 UART: [state] CFI Enabled
2,167,377 UART: [state] LifecycleState = Unprovisioned
2,169,013 UART: [state] DebugLocked = No
2,170,121 UART: [state] WD Timer not started. Device not locked for debugging
2,172,598 UART: [kat] SHA2-256
2,173,287 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,301 UART: [kat] ++
2,176,753 UART: [kat] sha1
2,177,265 UART: [kat] SHA2-256
2,178,000 UART: [kat] SHA2-384
2,178,672 UART: [kat] SHA2-512-ACC
2,179,498 UART: [kat] ECC-384
3,776,467 UART: [kat] HMAC-384Kdf
3,803,181 UART: [kat] LMS
4,876,325 UART: [kat] --
4,879,640 UART: [cold-reset] ++
4,881,086 UART: [fht] FHT @ 0x50003400
4,892,994 UART: [idev] ++
4,893,667 UART: [idev] CDI.KEYID = 6
4,894,904 UART: [idev] SUBJECT.KEYID = 7
4,896,016 UART: [idev] UDS.KEYID = 0
4,930,688 UART: [idev] Erasing UDS.KEYID = 0
8,242,779 UART: [idev] Sha1 KeyId Algorithm
8,265,836 UART: [idev] --
8,268,423 UART: [ldev] ++
8,268,987 UART: [ldev] CDI.KEYID = 6
8,270,226 UART: [ldev] SUBJECT.KEYID = 5
8,271,383 UART: [ldev] AUTHORITY.KEYID = 7
8,272,609 UART: [ldev] FE.KEYID = 1
8,318,358 UART: [ldev] Erasing FE.KEYID = 1
11,657,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,075 UART: [ldev] --
14,038,882 UART: [fwproc] Wait for Commands...
14,041,993 UART: [fwproc] Recv command 0x46574c44
14,044,307 UART: [fwproc] Recv'd Img size: 113760 bytes
16,997,866 UART: ROM Fatal Error: 0x000B0023
17,001,275 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,019,260 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,755,111 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,022,545 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,175 UART:
2,166,580 UART: Running Caliptra ROM ...
2,167,661 UART:
2,167,807 UART: [state] CFI Enabled
2,168,772 UART: [state] LifecycleState = Unprovisioned
2,170,413 UART: [state] DebugLocked = No
2,171,450 UART: [state] WD Timer not started. Device not locked for debugging
2,173,915 UART: [kat] SHA2-256
2,174,575 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,575 UART: [kat] ++
2,178,015 UART: [kat] sha1
2,178,519 UART: [kat] SHA2-256
2,179,171 UART: [kat] SHA2-384
2,179,820 UART: [kat] SHA2-512-ACC
2,180,611 UART: [kat] ECC-384
4,098,127 UART: [kat] HMAC-384Kdf
4,111,785 UART: [kat] LMS
5,184,927 UART: [kat] --
5,188,570 UART: [cold-reset] ++
5,191,218 UART: [fht] FHT @ 0x50003400
5,202,300 UART: [idev] ++
5,203,035 UART: [idev] CDI.KEYID = 6
5,204,237 UART: [idev] SUBJECT.KEYID = 7
5,205,669 UART: [idev] UDS.KEYID = 0
5,220,616 UART: [idev] Erasing UDS.KEYID = 0
8,492,804 UART: [idev] Sha1 KeyId Algorithm
8,513,983 UART: [idev] --
8,518,399 UART: [ldev] ++
8,519,018 UART: [ldev] CDI.KEYID = 6
8,520,198 UART: [ldev] SUBJECT.KEYID = 5
8,521,683 UART: [ldev] AUTHORITY.KEYID = 7
8,523,239 UART: [ldev] FE.KEYID = 1
8,533,069 UART: [ldev] Erasing FE.KEYID = 1
11,822,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,030 UART: [ldev] --
14,189,812 UART: [fwproc] Wait for Commands...
14,192,717 UART: [fwproc] Recv command 0x46574c44
14,195,034 UART: [fwproc] Recv'd Img size: 113760 bytes
17,140,775 UART: ROM Fatal Error: 0x000B0023
17,144,229 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,031,721 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,957,794 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,021,142 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,248 UART:
2,165,642 UART: Running Caliptra ROM ...
2,166,722 UART:
2,166,878 UART: [state] CFI Enabled
2,167,861 UART: [state] LifecycleState = Unprovisioned
2,169,509 UART: [state] DebugLocked = No
2,170,539 UART: [state] WD Timer not started. Device not locked for debugging
2,173,014 UART: [kat] SHA2-256
2,173,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,691 UART: [kat] ++
2,177,140 UART: [kat] sha1
2,177,651 UART: [kat] SHA2-256
2,178,308 UART: [kat] SHA2-384
2,178,965 UART: [kat] SHA2-512-ACC
2,179,765 UART: [kat] ECC-384
2,946,373 UART: [kat] HMAC-384Kdf
2,973,232 UART: [kat] LMS
3,502,721 UART: [kat] --
3,507,282 UART: [cold-reset] ++
3,509,217 UART: [fht] FHT @ 0x50003400
3,520,901 UART: [idev] ++
3,521,476 UART: [idev] CDI.KEYID = 6
3,522,398 UART: [idev] SUBJECT.KEYID = 7
3,523,561 UART: [idev] UDS.KEYID = 0
3,544,350 UART: [idev] Erasing UDS.KEYID = 0
6,026,184 UART: [idev] Sha1 KeyId Algorithm
6,049,151 UART: [idev] --
6,054,547 UART: [ldev] ++
6,055,179 UART: [ldev] CDI.KEYID = 6
6,056,069 UART: [ldev] SUBJECT.KEYID = 5
6,057,177 UART: [ldev] AUTHORITY.KEYID = 7
6,058,494 UART: [ldev] FE.KEYID = 1
6,100,827 UART: [ldev] Erasing FE.KEYID = 1
8,607,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,886 UART: [ldev] --
10,412,773 UART: [fwproc] Wait for Commands...
10,415,516 UART: [fwproc] Recv command 0x46574c44
10,417,616 UART: [fwproc] Recv'd Img size: 114084 bytes
12,707,581 UART: ROM Fatal Error: 0x000B0023
12,710,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,027,451 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,467,800 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
2,022,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,161 UART:
2,166,558 UART: Running Caliptra ROM ...
2,167,630 UART:
2,167,784 UART: [state] CFI Enabled
2,168,718 UART: [state] LifecycleState = Unprovisioned
2,170,370 UART: [state] DebugLocked = No
2,171,400 UART: [state] WD Timer not started. Device not locked for debugging
2,173,869 UART: [kat] SHA2-256
2,174,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,549 UART: [kat] ++
2,177,994 UART: [kat] sha1
2,178,531 UART: [kat] SHA2-256
2,179,212 UART: [kat] SHA2-384
2,179,869 UART: [kat] SHA2-512-ACC
2,180,752 UART: [kat] ECC-384
3,282,313 UART: [kat] HMAC-384Kdf
3,294,277 UART: [kat] LMS
3,823,745 UART: [kat] --
3,827,253 UART: [cold-reset] ++
3,829,234 UART: [fht] FHT @ 0x50003400
3,840,749 UART: [idev] ++
3,841,347 UART: [idev] CDI.KEYID = 6
3,842,264 UART: [idev] SUBJECT.KEYID = 7
3,843,419 UART: [idev] UDS.KEYID = 0
3,860,477 UART: [idev] Erasing UDS.KEYID = 0
6,318,812 UART: [idev] Sha1 KeyId Algorithm
6,341,710 UART: [idev] --
6,346,618 UART: [ldev] ++
6,347,204 UART: [ldev] CDI.KEYID = 6
6,348,111 UART: [ldev] SUBJECT.KEYID = 5
6,349,270 UART: [ldev] AUTHORITY.KEYID = 7
6,350,552 UART: [ldev] FE.KEYID = 1
6,361,031 UART: [ldev] Erasing FE.KEYID = 1
8,836,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,108 UART: [ldev] --
10,630,418 UART: [fwproc] Wait for Commands...
10,633,211 UART: [fwproc] Recv command 0x46574c44
10,635,300 UART: [fwproc] Recv'd Img size: 114084 bytes
12,920,677 UART: ROM Fatal Error: 0x000B0023
12,923,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
2,021,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,692,476 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,025,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,715 UART:
2,170,122 UART: Running Caliptra ROM ...
2,171,300 UART:
2,171,471 UART: [state] CFI Enabled
2,172,452 UART: [state] LifecycleState = Unprovisioned
2,174,110 UART: [state] DebugLocked = No
2,175,222 UART: [state] WD Timer not started. Device not locked for debugging
2,177,694 UART: [kat] SHA2-256
2,178,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,360 UART: [kat] ++
2,181,811 UART: [kat] sha1
2,182,341 UART: [kat] SHA2-256
2,183,001 UART: [kat] SHA2-384
2,183,660 UART: [kat] SHA2-512-ACC
2,184,503 UART: [kat] ECC-384
2,954,310 UART: [kat] HMAC-384Kdf
2,975,193 UART: [kat] LMS
3,504,624 UART: [kat] --
3,509,373 UART: [cold-reset] ++
3,510,605 UART: [fht] FHT @ 0x50003400
3,522,613 UART: [idev] ++
3,523,184 UART: [idev] CDI.KEYID = 6
3,524,089 UART: [idev] SUBJECT.KEYID = 7
3,525,254 UART: [idev] UDS.KEYID = 0
3,548,478 UART: [idev] Erasing UDS.KEYID = 0
6,030,426 UART: [idev] Sha1 KeyId Algorithm
6,053,481 UART: [idev] --
6,058,446 UART: [ldev] ++
6,059,033 UART: [ldev] CDI.KEYID = 6
6,059,947 UART: [ldev] SUBJECT.KEYID = 5
6,061,115 UART: [ldev] AUTHORITY.KEYID = 7
6,062,409 UART: [ldev] FE.KEYID = 1
6,103,685 UART: [ldev] Erasing FE.KEYID = 1
8,606,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,726 UART: [ldev] --
10,415,934 UART: [fwproc] Wait for Commands...
10,417,987 UART: [fwproc] Recv command 0x46574c44
10,420,087 UART: [fwproc] Recv'd Img size: 114084 bytes
12,711,008 UART: ROM Fatal Error: 0x000B0023
12,714,107 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,036,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,520,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,020,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,164,444 UART:
2,164,837 UART: Running Caliptra ROM ...
2,166,006 UART:
2,166,209 UART: [state] CFI Enabled
2,167,181 UART: [state] LifecycleState = Unprovisioned
2,168,821 UART: [state] DebugLocked = No
2,169,924 UART: [state] WD Timer not started. Device not locked for debugging
2,172,386 UART: [kat] SHA2-256
2,173,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,064 UART: [kat] ++
2,176,518 UART: [kat] sha1
2,177,032 UART: [kat] SHA2-256
2,177,771 UART: [kat] SHA2-384
2,178,437 UART: [kat] SHA2-512-ACC
2,179,237 UART: [kat] ECC-384
3,281,756 UART: [kat] HMAC-384Kdf
3,293,613 UART: [kat] LMS
3,823,091 UART: [kat] --
3,826,706 UART: [cold-reset] ++
3,828,000 UART: [fht] FHT @ 0x50003400
3,840,286 UART: [idev] ++
3,840,887 UART: [idev] CDI.KEYID = 6
3,841,770 UART: [idev] SUBJECT.KEYID = 7
3,842,984 UART: [idev] UDS.KEYID = 0
3,859,471 UART: [idev] Erasing UDS.KEYID = 0
6,321,389 UART: [idev] Sha1 KeyId Algorithm
6,344,827 UART: [idev] --
6,349,191 UART: [ldev] ++
6,349,756 UART: [ldev] CDI.KEYID = 6
6,350,660 UART: [ldev] SUBJECT.KEYID = 5
6,351,870 UART: [ldev] AUTHORITY.KEYID = 7
6,353,095 UART: [ldev] FE.KEYID = 1
6,363,957 UART: [ldev] Erasing FE.KEYID = 1
8,837,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,759 UART: [ldev] --
10,628,100 UART: [fwproc] Wait for Commands...
10,631,326 UART: [fwproc] Recv command 0x46574c44
10,633,417 UART: [fwproc] Recv'd Img size: 114084 bytes
12,931,466 UART: ROM Fatal Error: 0x000B0023
12,934,597 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,020,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,686,660 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,406 UART: [ldev] ++
1,208,574 UART: [ldev] CDI.KEYID = 6
1,208,938 UART: [ldev] SUBJECT.KEYID = 5
1,209,365 UART: [ldev] AUTHORITY.KEYID = 7
1,209,828 UART: [ldev] FE.KEYID = 1
1,214,916 UART: [ldev] Erasing FE.KEYID = 1
1,241,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,808 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,012 UART: ROM Fatal Error: 0x000B0023
1,550,169 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,992 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,337 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,231 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,687 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,285 UART: ROM Fatal Error: 0x000B0023
1,551,442 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,551 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,170,301 UART: [cold-reset] ++
1,170,875 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,653 UART: [idev] --
1,209,908 UART: [ldev] ++
1,210,076 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,867 UART: [ldev] AUTHORITY.KEYID = 7
1,211,330 UART: [ldev] FE.KEYID = 1
1,216,594 UART: [ldev] Erasing FE.KEYID = 1
1,242,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,564 UART: ROM Fatal Error: 0x000B0023
1,549,721 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,542 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,175 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,727 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,593 UART: ROM Fatal Error: 0x000B0023
1,550,750 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,443 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,555 UART: [idev] ++
1,172,723 UART: [idev] CDI.KEYID = 6
1,173,084 UART: [idev] SUBJECT.KEYID = 7
1,173,509 UART: [idev] UDS.KEYID = 0
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,836 UART: ROM Fatal Error: 0x000B0023
1,548,993 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,180 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,174 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,779 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x46574c44
1,283,089 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,127 UART: ROM Fatal Error: 0x000B0023
1,551,284 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,491 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,020,672 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,417 UART:
2,164,801 UART: Running Caliptra ROM ...
2,165,879 UART:
2,166,035 UART: [state] CFI Enabled
2,167,005 UART: [state] LifecycleState = Unprovisioned
2,168,652 UART: [state] DebugLocked = No
2,169,676 UART: [state] WD Timer not started. Device not locked for debugging
2,172,151 UART: [kat] SHA2-256
2,172,815 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,820 UART: [kat] ++
2,176,270 UART: [kat] sha1
2,176,781 UART: [kat] SHA2-256
2,177,439 UART: [kat] SHA2-384
2,178,095 UART: [kat] SHA2-512-ACC
2,178,959 UART: [kat] ECC-384
3,773,410 UART: [kat] HMAC-384Kdf
3,799,846 UART: [kat] LMS
4,873,015 UART: [kat] --
4,877,779 UART: [cold-reset] ++
4,880,077 UART: [fht] FHT @ 0x50003400
4,891,123 UART: [idev] ++
4,891,806 UART: [idev] CDI.KEYID = 6
4,892,972 UART: [idev] SUBJECT.KEYID = 7
4,894,130 UART: [idev] UDS.KEYID = 0
4,927,603 UART: [idev] Erasing UDS.KEYID = 0
8,237,373 UART: [idev] Sha1 KeyId Algorithm
8,260,935 UART: [idev] --
8,264,884 UART: [ldev] ++
8,265,460 UART: [ldev] CDI.KEYID = 6
8,266,698 UART: [ldev] SUBJECT.KEYID = 5
8,267,826 UART: [ldev] AUTHORITY.KEYID = 7
8,269,110 UART: [ldev] FE.KEYID = 1
8,314,676 UART: [ldev] Erasing FE.KEYID = 1
11,645,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,229 UART: [ldev] --
14,033,689 UART: [fwproc] Wait for Commands...
14,036,821 UART: [fwproc] Recv command 0x46574c44
14,039,089 UART: [fwproc] Recv'd Img size: 113760 bytes
16,978,718 UART: ROM Fatal Error: 0x000B0021
16,982,118 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,019,875 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,770,356 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,026,974 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,170,716 UART:
2,171,115 UART: Running Caliptra ROM ...
2,172,275 UART:
2,172,447 UART: [state] CFI Enabled
2,173,404 UART: [state] LifecycleState = Unprovisioned
2,175,043 UART: [state] DebugLocked = No
2,176,166 UART: [state] WD Timer not started. Device not locked for debugging
2,178,641 UART: [kat] SHA2-256
2,179,304 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,304 UART: [kat] ++
2,182,750 UART: [kat] sha1
2,183,343 UART: [kat] SHA2-256
2,184,002 UART: [kat] SHA2-384
2,184,657 UART: [kat] SHA2-512-ACC
2,185,530 UART: [kat] ECC-384
4,096,071 UART: [kat] HMAC-384Kdf
4,107,134 UART: [kat] LMS
5,180,282 UART: [kat] --
5,186,768 UART: [cold-reset] ++
5,189,029 UART: [fht] FHT @ 0x50003400
5,201,693 UART: [idev] ++
5,202,367 UART: [idev] CDI.KEYID = 6
5,203,625 UART: [idev] SUBJECT.KEYID = 7
5,205,022 UART: [idev] UDS.KEYID = 0
5,221,358 UART: [idev] Erasing UDS.KEYID = 0
8,497,944 UART: [idev] Sha1 KeyId Algorithm
8,520,856 UART: [idev] --
8,525,266 UART: [ldev] ++
8,525,908 UART: [ldev] CDI.KEYID = 6
8,527,094 UART: [ldev] SUBJECT.KEYID = 5
8,528,531 UART: [ldev] AUTHORITY.KEYID = 7
8,530,094 UART: [ldev] FE.KEYID = 1
8,542,852 UART: [ldev] Erasing FE.KEYID = 1
11,833,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,550 UART: [ldev] --
14,199,834 UART: [fwproc] Wait for Commands...
14,202,588 UART: [fwproc] Recv command 0x46574c44
14,204,859 UART: [fwproc] Recv'd Img size: 113760 bytes
17,156,339 UART: ROM Fatal Error: 0x000B0021
17,159,749 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,026,135 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,955,210 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,021,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,828 UART:
2,166,344 UART: Running Caliptra ROM ...
2,167,443 UART:
2,167,611 UART: [state] CFI Enabled
2,168,741 UART: [state] LifecycleState = Unprovisioned
2,170,398 UART: [state] DebugLocked = No
2,171,511 UART: [state] WD Timer not started. Device not locked for debugging
2,173,982 UART: [kat] SHA2-256
2,174,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,683 UART: [kat] ++
2,178,140 UART: [kat] sha1
2,178,693 UART: [kat] SHA2-256
2,179,354 UART: [kat] SHA2-384
2,180,011 UART: [kat] SHA2-512-ACC
2,180,818 UART: [kat] ECC-384
2,949,871 UART: [kat] HMAC-384Kdf
2,973,414 UART: [kat] LMS
3,502,846 UART: [kat] --
3,505,595 UART: [cold-reset] ++
3,506,556 UART: [fht] FHT @ 0x50003400
3,517,855 UART: [idev] ++
3,518,419 UART: [idev] CDI.KEYID = 6
3,519,385 UART: [idev] SUBJECT.KEYID = 7
3,520,543 UART: [idev] UDS.KEYID = 0
3,545,272 UART: [idev] Erasing UDS.KEYID = 0
6,029,943 UART: [idev] Sha1 KeyId Algorithm
6,053,997 UART: [idev] --
6,057,999 UART: [ldev] ++
6,058,575 UART: [ldev] CDI.KEYID = 6
6,059,482 UART: [ldev] SUBJECT.KEYID = 5
6,060,698 UART: [ldev] AUTHORITY.KEYID = 7
6,061,932 UART: [ldev] FE.KEYID = 1
6,102,880 UART: [ldev] Erasing FE.KEYID = 1
8,606,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,634 UART: [ldev] --
10,416,743 UART: [fwproc] Wait for Commands...
10,419,591 UART: [fwproc] Recv command 0x46574c44
10,421,715 UART: [fwproc] Recv'd Img size: 114084 bytes
12,713,293 UART: ROM Fatal Error: 0x000B0021
12,716,417 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,021,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,519,182 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,021,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,279 UART:
2,166,891 UART: Running Caliptra ROM ...
2,168,000 UART:
2,168,192 UART: [state] CFI Enabled
2,169,100 UART: [state] LifecycleState = Unprovisioned
2,170,762 UART: [state] DebugLocked = No
2,171,880 UART: [state] WD Timer not started. Device not locked for debugging
2,174,350 UART: [kat] SHA2-256
2,175,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,052 UART: [kat] ++
2,178,504 UART: [kat] sha1
2,179,251 UART: [kat] SHA2-256
2,179,923 UART: [kat] SHA2-384
2,180,666 UART: [kat] SHA2-512-ACC
2,181,498 UART: [kat] ECC-384
3,283,008 UART: [kat] HMAC-384Kdf
3,295,197 UART: [kat] LMS
3,824,693 UART: [kat] --
3,828,021 UART: [cold-reset] ++
3,829,277 UART: [fht] FHT @ 0x50003400
3,840,204 UART: [idev] ++
3,840,773 UART: [idev] CDI.KEYID = 6
3,841,737 UART: [idev] SUBJECT.KEYID = 7
3,842,837 UART: [idev] UDS.KEYID = 0
3,859,021 UART: [idev] Erasing UDS.KEYID = 0
6,315,185 UART: [idev] Sha1 KeyId Algorithm
6,338,421 UART: [idev] --
6,341,546 UART: [ldev] ++
6,342,114 UART: [ldev] CDI.KEYID = 6
6,343,247 UART: [ldev] SUBJECT.KEYID = 5
6,344,389 UART: [ldev] AUTHORITY.KEYID = 7
6,345,571 UART: [ldev] FE.KEYID = 1
6,356,219 UART: [ldev] Erasing FE.KEYID = 1
8,829,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,042 UART: [ldev] --
10,617,989 UART: [fwproc] Wait for Commands...
10,621,058 UART: [fwproc] Recv command 0x46574c44
10,623,153 UART: [fwproc] Recv'd Img size: 114084 bytes
12,914,149 UART: ROM Fatal Error: 0x000B0021
12,917,273 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
2,021,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,691,450 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,023,202 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,350 UART:
2,167,752 UART: Running Caliptra ROM ...
2,168,856 UART:
2,169,016 UART: [state] CFI Enabled
2,170,005 UART: [state] LifecycleState = Unprovisioned
2,171,662 UART: [state] DebugLocked = No
2,172,690 UART: [state] WD Timer not started. Device not locked for debugging
2,175,160 UART: [kat] SHA2-256
2,175,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,838 UART: [kat] ++
2,179,287 UART: [kat] sha1
2,179,797 UART: [kat] SHA2-256
2,180,454 UART: [kat] SHA2-384
2,181,109 UART: [kat] SHA2-512-ACC
2,181,909 UART: [kat] ECC-384
2,948,390 UART: [kat] HMAC-384Kdf
2,969,978 UART: [kat] LMS
3,499,391 UART: [kat] --
3,503,732 UART: [cold-reset] ++
3,506,164 UART: [fht] FHT @ 0x50003400
3,516,933 UART: [idev] ++
3,517,497 UART: [idev] CDI.KEYID = 6
3,518,420 UART: [idev] SUBJECT.KEYID = 7
3,519,642 UART: [idev] UDS.KEYID = 0
3,542,264 UART: [idev] Erasing UDS.KEYID = 0
6,024,564 UART: [idev] Sha1 KeyId Algorithm
6,048,716 UART: [idev] --
6,052,207 UART: [ldev] ++
6,052,792 UART: [ldev] CDI.KEYID = 6
6,053,682 UART: [ldev] SUBJECT.KEYID = 5
6,054,848 UART: [ldev] AUTHORITY.KEYID = 7
6,056,143 UART: [ldev] FE.KEYID = 1
6,098,151 UART: [ldev] Erasing FE.KEYID = 1
8,602,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,241 UART: [ldev] --
10,412,320 UART: [fwproc] Wait for Commands...
10,415,073 UART: [fwproc] Recv command 0x46574c44
10,417,118 UART: [fwproc] Recv'd Img size: 114084 bytes
12,710,958 UART: ROM Fatal Error: 0x000B0021
12,714,035 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,021,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,515,069 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
2,020,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,111 UART:
2,165,499 UART: Running Caliptra ROM ...
2,166,690 UART:
2,166,865 UART: [state] CFI Enabled
2,167,834 UART: [state] LifecycleState = Unprovisioned
2,169,471 UART: [state] DebugLocked = No
2,170,572 UART: [state] WD Timer not started. Device not locked for debugging
2,173,047 UART: [kat] SHA2-256
2,173,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,723 UART: [kat] ++
2,177,168 UART: [kat] sha1
2,177,680 UART: [kat] SHA2-256
2,178,419 UART: [kat] SHA2-384
2,179,084 UART: [kat] SHA2-512-ACC
2,179,915 UART: [kat] ECC-384
3,278,278 UART: [kat] HMAC-384Kdf
3,290,561 UART: [kat] LMS
3,820,101 UART: [kat] --
3,826,349 UART: [cold-reset] ++
3,827,529 UART: [fht] FHT @ 0x50003400
3,839,565 UART: [idev] ++
3,840,128 UART: [idev] CDI.KEYID = 6
3,841,004 UART: [idev] SUBJECT.KEYID = 7
3,842,222 UART: [idev] UDS.KEYID = 0
3,856,143 UART: [idev] Erasing UDS.KEYID = 0
6,311,623 UART: [idev] Sha1 KeyId Algorithm
6,334,634 UART: [idev] --
6,339,919 UART: [ldev] ++
6,340,481 UART: [ldev] CDI.KEYID = 6
6,341,388 UART: [ldev] SUBJECT.KEYID = 5
6,342,602 UART: [ldev] AUTHORITY.KEYID = 7
6,343,840 UART: [ldev] FE.KEYID = 1
6,354,208 UART: [ldev] Erasing FE.KEYID = 1
8,828,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,445 UART: [ldev] --
10,618,111 UART: [fwproc] Wait for Commands...
10,620,854 UART: [fwproc] Recv command 0x46574c44
10,622,945 UART: [fwproc] Recv'd Img size: 114084 bytes
12,908,058 UART: ROM Fatal Error: 0x000B0021
12,911,193 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,022,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,701,430 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,447 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,182,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,865 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,888 UART: [ldev] ++
1,210,056 UART: [ldev] CDI.KEYID = 6
1,210,420 UART: [ldev] SUBJECT.KEYID = 5
1,210,847 UART: [ldev] AUTHORITY.KEYID = 7
1,211,310 UART: [ldev] FE.KEYID = 1
1,216,438 UART: [ldev] Erasing FE.KEYID = 1
1,242,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,058 UART: [ldev] --
1,282,340 UART: [fwproc] Wait for Commands...
1,283,085 UART: [fwproc] Recv command 0x46574c44
1,283,818 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,053 UART: ROM Fatal Error: 0x000B0021
1,551,210 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,400,513 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,586 UART: [cold-reset] ++
1,171,044 UART: [fht] FHT @ 0x50003400
1,173,672 UART: [idev] ++
1,173,840 UART: [idev] CDI.KEYID = 6
1,174,201 UART: [idev] SUBJECT.KEYID = 7
1,174,626 UART: [idev] UDS.KEYID = 0
1,182,248 UART: [idev] Erasing UDS.KEYID = 0
1,199,598 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,095 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,552 UART: ROM Fatal Error: 0x000B0021
1,550,709 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,974 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,496 UART: [ldev] Erasing FE.KEYID = 1
1,240,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,260 UART: [fwproc] Wait for Commands...
1,281,079 UART: [fwproc] Recv command 0x46574c44
1,281,812 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,155 UART: ROM Fatal Error: 0x000B0021
1,549,312 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,400,921 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,283 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,872 UART: ROM Fatal Error: 0x000B0021
1,551,029 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,400,623 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,601 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,817 UART: [idev] Sha1 KeyId Algorithm
1,208,653 UART: [idev] --
1,209,924 UART: [ldev] ++
1,210,092 UART: [ldev] CDI.KEYID = 6
1,210,456 UART: [ldev] SUBJECT.KEYID = 5
1,210,883 UART: [ldev] AUTHORITY.KEYID = 7
1,211,346 UART: [ldev] FE.KEYID = 1
1,216,566 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,276 UART: [ldev] --
1,281,684 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,571 UART: ROM Fatal Error: 0x000B0021
1,550,728 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,391 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,865 UART: [state] LifecycleState = Unprovisioned
85,520 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,196 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,181,694 UART: [idev] Erasing UDS.KEYID = 0
1,198,638 UART: [idev] Sha1 KeyId Algorithm
1,207,524 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,347 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,423 UART: [ldev] --
1,280,935 UART: [fwproc] Wait for Commands...
1,281,668 UART: [fwproc] Recv command 0x46574c44
1,282,401 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,120 UART: ROM Fatal Error: 0x000B0021
1,550,277 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,674 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,019,937 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,568 UART:
2,163,972 UART: Running Caliptra ROM ...
2,165,047 UART:
2,165,207 UART: [state] CFI Enabled
2,166,194 UART: [state] LifecycleState = Unprovisioned
2,167,836 UART: [state] DebugLocked = No
2,168,856 UART: [state] WD Timer not started. Device not locked for debugging
2,171,337 UART: [kat] SHA2-256
2,172,001 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,016 UART: [kat] ++
2,175,471 UART: [kat] sha1
2,175,984 UART: [kat] SHA2-256
2,176,722 UART: [kat] SHA2-384
2,177,383 UART: [kat] SHA2-512-ACC
2,178,228 UART: [kat] ECC-384
3,773,370 UART: [kat] HMAC-384Kdf
3,801,930 UART: [kat] LMS
4,875,074 UART: [kat] --
4,879,854 UART: [cold-reset] ++
4,881,299 UART: [fht] FHT @ 0x50003400
4,892,410 UART: [idev] ++
4,893,143 UART: [idev] CDI.KEYID = 6
4,894,327 UART: [idev] SUBJECT.KEYID = 7
4,895,483 UART: [idev] UDS.KEYID = 0
4,929,177 UART: [idev] Erasing UDS.KEYID = 0
8,242,851 UART: [idev] Sha1 KeyId Algorithm
8,264,903 UART: [idev] --
8,270,170 UART: [ldev] ++
8,270,775 UART: [ldev] CDI.KEYID = 6
8,271,970 UART: [ldev] SUBJECT.KEYID = 5
8,273,128 UART: [ldev] AUTHORITY.KEYID = 7
8,274,359 UART: [ldev] FE.KEYID = 1
8,317,167 UART: [ldev] Erasing FE.KEYID = 1
11,650,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,105 UART: [ldev] --
14,038,529 UART: [fwproc] Wait for Commands...
14,041,166 UART: [fwproc] Recv command 0x46574c44
14,043,493 UART: [fwproc] Recv'd Img size: 113760 bytes
16,985,515 UART: ROM Fatal Error: 0x000B0021
16,988,923 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,000 writing to cptra_bootfsm_go
2,021,181 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,773,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,024,561 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,168,416 UART:
2,168,832 UART: Running Caliptra ROM ...
2,169,916 UART:
2,170,065 UART: [state] CFI Enabled
2,171,264 UART: [state] LifecycleState = Unprovisioned
2,172,923 UART: [state] DebugLocked = No
2,173,947 UART: [state] WD Timer not started. Device not locked for debugging
2,176,442 UART: [kat] SHA2-256
2,177,103 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,107 UART: [kat] ++
2,180,549 UART: [kat] sha1
2,181,053 UART: [kat] SHA2-256
2,181,709 UART: [kat] SHA2-384
2,182,359 UART: [kat] SHA2-512-ACC
2,183,187 UART: [kat] ECC-384
4,102,261 UART: [kat] HMAC-384Kdf
4,113,961 UART: [kat] LMS
5,187,124 UART: [kat] --
5,191,775 UART: [cold-reset] ++
5,193,441 UART: [fht] FHT @ 0x50003400
5,204,529 UART: [idev] ++
5,205,203 UART: [idev] CDI.KEYID = 6
5,206,440 UART: [idev] SUBJECT.KEYID = 7
5,207,900 UART: [idev] UDS.KEYID = 0
5,223,139 UART: [idev] Erasing UDS.KEYID = 0
8,495,994 UART: [idev] Sha1 KeyId Algorithm
8,517,179 UART: [idev] --
8,521,497 UART: [ldev] ++
8,522,120 UART: [ldev] CDI.KEYID = 6
8,523,296 UART: [ldev] SUBJECT.KEYID = 5
8,524,788 UART: [ldev] AUTHORITY.KEYID = 7
8,526,345 UART: [ldev] FE.KEYID = 1
8,537,102 UART: [ldev] Erasing FE.KEYID = 1
11,830,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,797 UART: [ldev] --
14,196,216 UART: [fwproc] Wait for Commands...
14,199,179 UART: [fwproc] Recv command 0x46574c44
14,201,444 UART: [fwproc] Recv'd Img size: 113760 bytes
17,146,245 UART: ROM Fatal Error: 0x000B0021
17,149,652 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
2,029,662 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,968,002 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,022,880 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,084 UART:
2,167,493 UART: Running Caliptra ROM ...
2,168,596 UART:
2,168,756 UART: [state] CFI Enabled
2,169,742 UART: [state] LifecycleState = Unprovisioned
2,171,389 UART: [state] DebugLocked = No
2,172,417 UART: [state] WD Timer not started. Device not locked for debugging
2,174,883 UART: [kat] SHA2-256
2,175,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,560 UART: [kat] ++
2,179,007 UART: [kat] sha1
2,179,519 UART: [kat] SHA2-256
2,180,172 UART: [kat] SHA2-384
2,180,825 UART: [kat] SHA2-512-ACC
2,181,624 UART: [kat] ECC-384
2,950,577 UART: [kat] HMAC-384Kdf
2,974,805 UART: [kat] LMS
3,504,243 UART: [kat] --
3,509,553 UART: [cold-reset] ++
3,512,087 UART: [fht] FHT @ 0x50003400
3,522,261 UART: [idev] ++
3,522,834 UART: [idev] CDI.KEYID = 6
3,523,743 UART: [idev] SUBJECT.KEYID = 7
3,524,959 UART: [idev] UDS.KEYID = 0
3,546,068 UART: [idev] Erasing UDS.KEYID = 0
6,029,086 UART: [idev] Sha1 KeyId Algorithm
6,052,609 UART: [idev] --
6,056,073 UART: [ldev] ++
6,056,649 UART: [ldev] CDI.KEYID = 6
6,057,534 UART: [ldev] SUBJECT.KEYID = 5
6,058,749 UART: [ldev] AUTHORITY.KEYID = 7
6,059,991 UART: [ldev] FE.KEYID = 1
6,101,673 UART: [ldev] Erasing FE.KEYID = 1
8,604,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,394 UART: [ldev] --
10,395,602 UART: [fwproc] Wait for Commands...
10,397,156 UART: [fwproc] Recv command 0x46574c44
10,399,251 UART: [fwproc] Recv'd Img size: 114084 bytes
12,694,027 UART: ROM Fatal Error: 0x000B0021
12,697,161 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,035,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,488,922 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,022,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,056 UART:
2,166,444 UART: Running Caliptra ROM ...
2,167,529 UART:
2,167,685 UART: [state] CFI Enabled
2,168,662 UART: [state] LifecycleState = Unprovisioned
2,170,305 UART: [state] DebugLocked = No
2,171,331 UART: [state] WD Timer not started. Device not locked for debugging
2,173,815 UART: [kat] SHA2-256
2,174,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,483 UART: [kat] ++
2,177,928 UART: [kat] sha1
2,178,439 UART: [kat] SHA2-256
2,179,096 UART: [kat] SHA2-384
2,179,844 UART: [kat] SHA2-512-ACC
2,180,653 UART: [kat] ECC-384
3,280,727 UART: [kat] HMAC-384Kdf
3,292,884 UART: [kat] LMS
3,822,360 UART: [kat] --
3,826,643 UART: [cold-reset] ++
3,828,363 UART: [fht] FHT @ 0x50003400
3,839,077 UART: [idev] ++
3,839,685 UART: [idev] CDI.KEYID = 6
3,840,574 UART: [idev] SUBJECT.KEYID = 7
3,841,803 UART: [idev] UDS.KEYID = 0
3,859,298 UART: [idev] Erasing UDS.KEYID = 0
6,317,266 UART: [idev] Sha1 KeyId Algorithm
6,339,353 UART: [idev] --
6,343,017 UART: [ldev] ++
6,343,590 UART: [ldev] CDI.KEYID = 6
6,344,553 UART: [ldev] SUBJECT.KEYID = 5
6,345,712 UART: [ldev] AUTHORITY.KEYID = 7
6,346,940 UART: [ldev] FE.KEYID = 1
6,358,878 UART: [ldev] Erasing FE.KEYID = 1
8,834,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,008 UART: [ldev] --
10,625,412 UART: [fwproc] Wait for Commands...
10,627,347 UART: [fwproc] Recv command 0x46574c44
10,629,444 UART: [fwproc] Recv'd Img size: 114084 bytes
12,923,218 UART: ROM Fatal Error: 0x000B0021
12,926,350 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,021,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,695,149 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,028,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,172,597 UART:
2,172,997 UART: Running Caliptra ROM ...
2,174,079 UART:
2,174,235 UART: [state] CFI Enabled
2,175,218 UART: [state] LifecycleState = Unprovisioned
2,176,912 UART: [state] DebugLocked = No
2,177,942 UART: [state] WD Timer not started. Device not locked for debugging
2,180,421 UART: [kat] SHA2-256
2,181,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,816 UART: [kat] ++
2,185,280 UART: [kat] sha1
2,185,788 UART: [kat] SHA2-256
2,186,444 UART: [kat] SHA2-384
2,187,101 UART: [kat] SHA2-512-ACC
2,187,998 UART: [kat] ECC-384
2,946,693 UART: [kat] HMAC-384Kdf
2,970,700 UART: [kat] LMS
3,500,168 UART: [kat] --
3,503,789 UART: [cold-reset] ++
3,505,124 UART: [fht] FHT @ 0x50003400
3,515,510 UART: [idev] ++
3,516,096 UART: [idev] CDI.KEYID = 6
3,517,007 UART: [idev] SUBJECT.KEYID = 7
3,518,174 UART: [idev] UDS.KEYID = 0
3,543,180 UART: [idev] Erasing UDS.KEYID = 0
6,025,616 UART: [idev] Sha1 KeyId Algorithm
6,048,612 UART: [idev] --
6,051,805 UART: [ldev] ++
6,052,377 UART: [ldev] CDI.KEYID = 6
6,053,431 UART: [ldev] SUBJECT.KEYID = 5
6,054,546 UART: [ldev] AUTHORITY.KEYID = 7
6,055,729 UART: [ldev] FE.KEYID = 1
6,099,221 UART: [ldev] Erasing FE.KEYID = 1
8,598,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,908 UART: [ldev] --
10,393,421 UART: [fwproc] Wait for Commands...
10,395,738 UART: [fwproc] Recv command 0x46574c44
10,397,843 UART: [fwproc] Recv'd Img size: 114084 bytes
12,688,409 UART: ROM Fatal Error: 0x000B0021
12,691,546 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,025,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,472,054 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
2,022,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,796 UART:
2,167,195 UART: Running Caliptra ROM ...
2,168,360 UART:
2,168,529 UART: [state] CFI Enabled
2,169,502 UART: [state] LifecycleState = Unprovisioned
2,171,146 UART: [state] DebugLocked = No
2,172,250 UART: [state] WD Timer not started. Device not locked for debugging
2,174,717 UART: [kat] SHA2-256
2,175,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,388 UART: [kat] ++
2,178,837 UART: [kat] sha1
2,179,348 UART: [kat] SHA2-256
2,180,091 UART: [kat] SHA2-384
2,180,758 UART: [kat] SHA2-512-ACC
2,181,619 UART: [kat] ECC-384
3,282,852 UART: [kat] HMAC-384Kdf
3,295,361 UART: [kat] LMS
3,824,825 UART: [kat] --
3,829,506 UART: [cold-reset] ++
3,831,461 UART: [fht] FHT @ 0x50003400
3,842,937 UART: [idev] ++
3,843,499 UART: [idev] CDI.KEYID = 6
3,844,403 UART: [idev] SUBJECT.KEYID = 7
3,845,613 UART: [idev] UDS.KEYID = 0
3,860,374 UART: [idev] Erasing UDS.KEYID = 0
6,318,858 UART: [idev] Sha1 KeyId Algorithm
6,342,997 UART: [idev] --
6,346,712 UART: [ldev] ++
6,347,275 UART: [ldev] CDI.KEYID = 6
6,348,180 UART: [ldev] SUBJECT.KEYID = 5
6,349,413 UART: [ldev] AUTHORITY.KEYID = 7
6,350,643 UART: [ldev] FE.KEYID = 1
6,361,771 UART: [ldev] Erasing FE.KEYID = 1
8,837,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,039 UART: [ldev] --
10,629,101 UART: [fwproc] Wait for Commands...
10,630,722 UART: [fwproc] Recv command 0x46574c44
10,632,848 UART: [fwproc] Recv'd Img size: 114084 bytes
12,926,202 UART: ROM Fatal Error: 0x000B0021
12,929,325 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,020,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,694,715 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,182,049 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,489 UART: ROM Fatal Error: 0x000B0021
1,549,646 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,677 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
891,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,998 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,268 UART: [idev] Sha1 KeyId Algorithm
1,209,210 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,409 UART: [ldev] --
1,281,853 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,347 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,164 UART: ROM Fatal Error: 0x000B0021
1,551,321 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,762 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,999 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,640 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,822 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,715 UART: ROM Fatal Error: 0x000B0021
1,548,872 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,652 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,451 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,162 UART: [fwproc] Recv command 0x46574c44
1,282,895 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,874 UART: ROM Fatal Error: 0x000B0021
1,551,031 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,644 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,786 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,321 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,403 UART: [idev] ++
1,172,571 UART: [idev] CDI.KEYID = 6
1,172,932 UART: [idev] SUBJECT.KEYID = 7
1,173,357 UART: [idev] UDS.KEYID = 0
1,181,069 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,296 UART: [fwproc] Wait for Commands...
1,280,951 UART: [fwproc] Recv command 0x46574c44
1,281,684 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,911 UART: ROM Fatal Error: 0x000B0021
1,549,068 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,787 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,819 UART: [fwproc] Wait for Commands...
1,281,640 UART: [fwproc] Recv command 0x46574c44
1,282,373 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,236 UART: ROM Fatal Error: 0x000B0021
1,549,393 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,226 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,022,728 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,626 UART:
2,167,019 UART: Running Caliptra ROM ...
2,168,198 UART:
2,168,386 UART: [state] CFI Enabled
2,169,357 UART: [state] LifecycleState = Unprovisioned
2,170,999 UART: [state] DebugLocked = No
2,172,105 UART: [state] WD Timer not started. Device not locked for debugging
2,174,579 UART: [kat] SHA2-256
2,175,245 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,255 UART: [kat] ++
2,178,727 UART: [kat] sha1
2,179,244 UART: [kat] SHA2-256
2,179,996 UART: [kat] SHA2-384
2,180,664 UART: [kat] SHA2-512-ACC
2,181,546 UART: [kat] ECC-384
3,778,135 UART: [kat] HMAC-384Kdf
3,802,599 UART: [kat] LMS
4,875,740 UART: [kat] --
4,881,459 UART: [cold-reset] ++
4,882,911 UART: [fht] FHT @ 0x50003400
4,893,464 UART: [idev] ++
4,894,133 UART: [idev] CDI.KEYID = 6
4,895,297 UART: [idev] SUBJECT.KEYID = 7
4,896,509 UART: [idev] UDS.KEYID = 0
4,930,171 UART: [idev] Erasing UDS.KEYID = 0
8,243,305 UART: [idev] Sha1 KeyId Algorithm
8,264,670 UART: [idev] --
8,267,701 UART: [ldev] ++
8,268,272 UART: [ldev] CDI.KEYID = 6
8,269,460 UART: [ldev] SUBJECT.KEYID = 5
8,270,627 UART: [ldev] AUTHORITY.KEYID = 7
8,271,781 UART: [ldev] FE.KEYID = 1
8,318,323 UART: [ldev] Erasing FE.KEYID = 1
11,654,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,244 UART: [ldev] --
14,037,924 UART: [fwproc] Wait for Commands...
14,040,224 UART: [fwproc] Recv command 0x46574c44
14,042,556 UART: [fwproc] Recv'd Img size: 113760 bytes
16,980,462 UART: ROM Fatal Error: 0x000B0022
16,983,927 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,020,697 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,753,701 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
2,029,374 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,173,349 UART:
2,173,745 UART: Running Caliptra ROM ...
2,174,829 UART:
2,174,977 UART: [state] CFI Enabled
2,175,943 UART: [state] LifecycleState = Unprovisioned
2,177,583 UART: [state] DebugLocked = No
2,178,606 UART: [state] WD Timer not started. Device not locked for debugging
2,181,097 UART: [kat] SHA2-256
2,181,760 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,777 UART: [kat] ++
2,185,220 UART: [kat] sha1
2,185,722 UART: [kat] SHA2-256
2,186,372 UART: [kat] SHA2-384
2,187,022 UART: [kat] SHA2-512-ACC
2,187,826 UART: [kat] ECC-384
4,102,540 UART: [kat] HMAC-384Kdf
4,114,624 UART: [kat] LMS
5,187,750 UART: [kat] --
5,191,274 UART: [cold-reset] ++
5,192,344 UART: [fht] FHT @ 0x50003400
5,204,668 UART: [idev] ++
5,205,346 UART: [idev] CDI.KEYID = 6
5,206,581 UART: [idev] SUBJECT.KEYID = 7
5,208,030 UART: [idev] UDS.KEYID = 0
5,224,117 UART: [idev] Erasing UDS.KEYID = 0
8,499,065 UART: [idev] Sha1 KeyId Algorithm
8,521,115 UART: [idev] --
8,525,487 UART: [ldev] ++
8,526,052 UART: [ldev] CDI.KEYID = 6
8,527,292 UART: [ldev] SUBJECT.KEYID = 5
8,528,728 UART: [ldev] AUTHORITY.KEYID = 7
8,530,214 UART: [ldev] FE.KEYID = 1
8,542,933 UART: [ldev] Erasing FE.KEYID = 1
11,830,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,498 UART: [ldev] --
14,196,180 UART: [fwproc] Wait for Commands...
14,198,491 UART: [fwproc] Recv command 0x46574c44
14,200,751 UART: [fwproc] Recv'd Img size: 113760 bytes
17,155,664 UART: ROM Fatal Error: 0x000B0022
17,159,122 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,021,938 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,965,345 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,032,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,177,115 UART:
2,177,515 UART: Running Caliptra ROM ...
2,178,693 UART:
2,178,863 UART: [state] CFI Enabled
2,179,791 UART: [state] LifecycleState = Unprovisioned
2,181,463 UART: [state] DebugLocked = No
2,182,577 UART: [state] WD Timer not started. Device not locked for debugging
2,185,051 UART: [kat] SHA2-256
2,185,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,743 UART: [kat] ++
2,189,196 UART: [kat] sha1
2,189,710 UART: [kat] SHA2-256
2,190,450 UART: [kat] SHA2-384
2,191,115 UART: [kat] SHA2-512-ACC
2,191,915 UART: [kat] ECC-384
2,946,489 UART: [kat] HMAC-384Kdf
2,972,019 UART: [kat] LMS
3,501,462 UART: [kat] --
3,504,885 UART: [cold-reset] ++
3,506,513 UART: [fht] FHT @ 0x50003400
3,517,993 UART: [idev] ++
3,518,575 UART: [idev] CDI.KEYID = 6
3,519,456 UART: [idev] SUBJECT.KEYID = 7
3,520,670 UART: [idev] UDS.KEYID = 0
3,543,751 UART: [idev] Erasing UDS.KEYID = 0
6,027,778 UART: [idev] Sha1 KeyId Algorithm
6,050,574 UART: [idev] --
6,053,035 UART: [ldev] ++
6,053,625 UART: [ldev] CDI.KEYID = 6
6,054,538 UART: [ldev] SUBJECT.KEYID = 5
6,055,756 UART: [ldev] AUTHORITY.KEYID = 7
6,056,990 UART: [ldev] FE.KEYID = 1
6,098,755 UART: [ldev] Erasing FE.KEYID = 1
8,601,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,186 UART: [ldev] --
10,411,914 UART: [fwproc] Wait for Commands...
10,414,067 UART: [fwproc] Recv command 0x46574c44
10,416,166 UART: [fwproc] Recv'd Img size: 114084 bytes
12,709,686 UART: ROM Fatal Error: 0x000B0022
12,712,829 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,024,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,496,855 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,024,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,637 UART:
2,169,032 UART: Running Caliptra ROM ...
2,170,211 UART:
2,170,390 UART: [state] CFI Enabled
2,171,363 UART: [state] LifecycleState = Unprovisioned
2,173,005 UART: [state] DebugLocked = No
2,174,121 UART: [state] WD Timer not started. Device not locked for debugging
2,176,583 UART: [kat] SHA2-256
2,177,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,257 UART: [kat] ++
2,180,707 UART: [kat] sha1
2,181,310 UART: [kat] SHA2-256
2,181,977 UART: [kat] SHA2-384
2,182,679 UART: [kat] SHA2-512-ACC
2,183,477 UART: [kat] ECC-384
3,279,699 UART: [kat] HMAC-384Kdf
3,290,998 UART: [kat] LMS
3,820,462 UART: [kat] --
3,826,025 UART: [cold-reset] ++
3,828,603 UART: [fht] FHT @ 0x50003400
3,840,335 UART: [idev] ++
3,840,901 UART: [idev] CDI.KEYID = 6
3,841,839 UART: [idev] SUBJECT.KEYID = 7
3,843,050 UART: [idev] UDS.KEYID = 0
3,857,545 UART: [idev] Erasing UDS.KEYID = 0
6,315,141 UART: [idev] Sha1 KeyId Algorithm
6,338,043 UART: [idev] --
6,341,925 UART: [ldev] ++
6,342,488 UART: [ldev] CDI.KEYID = 6
6,343,399 UART: [ldev] SUBJECT.KEYID = 5
6,344,611 UART: [ldev] AUTHORITY.KEYID = 7
6,345,839 UART: [ldev] FE.KEYID = 1
6,358,884 UART: [ldev] Erasing FE.KEYID = 1
8,834,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,462 UART: [ldev] --
10,623,993 UART: [fwproc] Wait for Commands...
10,625,656 UART: [fwproc] Recv command 0x46574c44
10,627,748 UART: [fwproc] Recv'd Img size: 114084 bytes
12,913,776 UART: ROM Fatal Error: 0x000B0022
12,916,903 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
2,022,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,696,031 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,029,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,173,884 UART:
2,174,285 UART: Running Caliptra ROM ...
2,175,455 UART:
2,175,625 UART: [state] CFI Enabled
2,176,599 UART: [state] LifecycleState = Unprovisioned
2,178,252 UART: [state] DebugLocked = No
2,179,281 UART: [state] WD Timer not started. Device not locked for debugging
2,181,748 UART: [kat] SHA2-256
2,182,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,428 UART: [kat] ++
2,185,881 UART: [kat] sha1
2,186,393 UART: [kat] SHA2-256
2,187,137 UART: [kat] SHA2-384
2,187,826 UART: [kat] SHA2-512-ACC
2,188,716 UART: [kat] ECC-384
2,948,059 UART: [kat] HMAC-384Kdf
2,972,673 UART: [kat] LMS
3,502,096 UART: [kat] --
3,506,580 UART: [cold-reset] ++
3,508,188 UART: [fht] FHT @ 0x50003400
3,519,597 UART: [idev] ++
3,520,163 UART: [idev] CDI.KEYID = 6
3,521,087 UART: [idev] SUBJECT.KEYID = 7
3,522,254 UART: [idev] UDS.KEYID = 0
3,545,148 UART: [idev] Erasing UDS.KEYID = 0
6,027,682 UART: [idev] Sha1 KeyId Algorithm
6,049,732 UART: [idev] --
6,053,547 UART: [ldev] ++
6,054,133 UART: [ldev] CDI.KEYID = 6
6,055,038 UART: [ldev] SUBJECT.KEYID = 5
6,056,210 UART: [ldev] AUTHORITY.KEYID = 7
6,057,450 UART: [ldev] FE.KEYID = 1
6,100,862 UART: [ldev] Erasing FE.KEYID = 1
8,607,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,054 UART: [ldev] --
10,415,617 UART: [fwproc] Wait for Commands...
10,418,691 UART: [fwproc] Recv command 0x46574c44
10,420,743 UART: [fwproc] Recv'd Img size: 114084 bytes
12,716,501 UART: ROM Fatal Error: 0x000B0022
12,719,643 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,023,241 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,431,922 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,022,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,803 UART:
2,167,198 UART: Running Caliptra ROM ...
2,168,281 UART:
2,168,433 UART: [state] CFI Enabled
2,169,411 UART: [state] LifecycleState = Unprovisioned
2,171,054 UART: [state] DebugLocked = No
2,172,086 UART: [state] WD Timer not started. Device not locked for debugging
2,174,549 UART: [kat] SHA2-256
2,175,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,219 UART: [kat] ++
2,178,667 UART: [kat] sha1
2,179,179 UART: [kat] SHA2-256
2,180,069 UART: [kat] SHA2-384
2,180,743 UART: [kat] SHA2-512-ACC
2,181,624 UART: [kat] ECC-384
3,280,659 UART: [kat] HMAC-384Kdf
3,293,684 UART: [kat] LMS
3,823,191 UART: [kat] --
3,829,203 UART: [cold-reset] ++
3,830,168 UART: [fht] FHT @ 0x50003400
3,841,610 UART: [idev] ++
3,842,164 UART: [idev] CDI.KEYID = 6
3,843,095 UART: [idev] SUBJECT.KEYID = 7
3,844,306 UART: [idev] UDS.KEYID = 0
3,859,229 UART: [idev] Erasing UDS.KEYID = 0
6,318,287 UART: [idev] Sha1 KeyId Algorithm
6,341,302 UART: [idev] --
6,345,913 UART: [ldev] ++
6,346,489 UART: [ldev] CDI.KEYID = 6
6,347,404 UART: [ldev] SUBJECT.KEYID = 5
6,348,563 UART: [ldev] AUTHORITY.KEYID = 7
6,349,794 UART: [ldev] FE.KEYID = 1
6,357,589 UART: [ldev] Erasing FE.KEYID = 1
8,830,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,970 UART: [ldev] --
10,624,180 UART: [fwproc] Wait for Commands...
10,626,119 UART: [fwproc] Recv command 0x46574c44
10,628,216 UART: [fwproc] Recv'd Img size: 114084 bytes
12,912,917 UART: ROM Fatal Error: 0x000B0022
12,916,036 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,021,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,697,206 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,254 UART: [kat] HMAC-384Kdf
920,054 UART: [kat] LMS
1,168,366 UART: [kat] --
1,169,193 UART: [cold-reset] ++
1,169,655 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,319 UART: [idev] Sha1 KeyId Algorithm
1,207,237 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,072 UART: [ldev] Erasing FE.KEYID = 1
1,241,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,796 UART: [ldev] --
1,280,160 UART: [fwproc] Wait for Commands...
1,280,963 UART: [fwproc] Recv command 0x46574c44
1,281,696 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,817 UART: ROM Fatal Error: 0x000B0022
1,548,974 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,399,691 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,966 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,879 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,826 UART: ROM Fatal Error: 0x000B0022
1,550,983 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,062 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,567 UART: [cold-reset] ++
1,171,145 UART: [fht] FHT @ 0x50003400
1,173,803 UART: [idev] ++
1,173,971 UART: [idev] CDI.KEYID = 6
1,174,332 UART: [idev] SUBJECT.KEYID = 7
1,174,757 UART: [idev] UDS.KEYID = 0
1,182,853 UART: [idev] Erasing UDS.KEYID = 0
1,199,347 UART: [idev] Sha1 KeyId Algorithm
1,208,375 UART: [idev] --
1,209,536 UART: [ldev] ++
1,209,704 UART: [ldev] CDI.KEYID = 6
1,210,068 UART: [ldev] SUBJECT.KEYID = 5
1,210,495 UART: [ldev] AUTHORITY.KEYID = 7
1,210,958 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,922 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,282,031 UART: [fwproc] Recv command 0x46574c44
1,282,764 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,145 UART: ROM Fatal Error: 0x000B0022
1,550,302 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,400,557 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,499 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,590 UART: ROM Fatal Error: 0x000B0022
1,551,747 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,446 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,182,433 UART: [idev] Erasing UDS.KEYID = 0
1,199,331 UART: [idev] Sha1 KeyId Algorithm
1,208,363 UART: [idev] --
1,209,270 UART: [ldev] ++
1,209,438 UART: [ldev] CDI.KEYID = 6
1,209,802 UART: [ldev] SUBJECT.KEYID = 5
1,210,229 UART: [ldev] AUTHORITY.KEYID = 7
1,210,692 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,243,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,720 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,783 UART: [fwproc] Recv command 0x46574c44
1,283,516 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,587 UART: ROM Fatal Error: 0x000B0022
1,549,744 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,903 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,070 UART: [kat] SHA2-256
902,010 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,341 UART: [kat] LMS
1,169,653 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,786 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,228 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,215,891 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,281,924 UART: [fwproc] Recv command 0x46574c44
1,282,657 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,174 UART: ROM Fatal Error: 0x000B0022
1,549,331 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,778 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,023,706 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,167,461 UART:
2,167,851 UART: Running Caliptra ROM ...
2,168,932 UART:
2,169,089 UART: [state] CFI Enabled
2,170,058 UART: [state] LifecycleState = Unprovisioned
2,171,703 UART: [state] DebugLocked = No
2,172,952 UART: [state] WD Timer not started. Device not locked for debugging
2,175,450 UART: [kat] SHA2-256
2,176,116 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,129 UART: [kat] ++
2,179,579 UART: [kat] sha1
2,180,096 UART: [kat] SHA2-256
2,180,836 UART: [kat] SHA2-384
2,181,501 UART: [kat] SHA2-512-ACC
2,182,302 UART: [kat] ECC-384
3,776,288 UART: [kat] HMAC-384Kdf
3,803,726 UART: [kat] LMS
4,876,873 UART: [kat] --
4,879,743 UART: [cold-reset] ++
4,881,032 UART: [fht] FHT @ 0x50003400
4,892,611 UART: [idev] ++
4,893,336 UART: [idev] CDI.KEYID = 6
4,894,527 UART: [idev] SUBJECT.KEYID = 7
4,895,683 UART: [idev] UDS.KEYID = 0
4,930,992 UART: [idev] Erasing UDS.KEYID = 0
8,244,615 UART: [idev] Sha1 KeyId Algorithm
8,266,316 UART: [idev] --
8,270,551 UART: [ldev] ++
8,271,128 UART: [ldev] CDI.KEYID = 6
8,272,366 UART: [ldev] SUBJECT.KEYID = 5
8,273,525 UART: [ldev] AUTHORITY.KEYID = 7
8,274,702 UART: [ldev] FE.KEYID = 1
8,319,394 UART: [ldev] Erasing FE.KEYID = 1
11,654,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,485 UART: [ldev] --
14,040,730 UART: [fwproc] Wait for Commands...
14,042,776 UART: [fwproc] Recv command 0x46574c44
14,045,104 UART: [fwproc] Recv'd Img size: 113760 bytes
16,993,293 UART: ROM Fatal Error: 0x000B0021
16,996,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,023,858 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,762,527 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,031,819 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,177,243 UART:
2,177,663 UART: Running Caliptra ROM ...
2,178,830 UART:
2,179,005 UART: [state] CFI Enabled
2,179,968 UART: [state] LifecycleState = Unprovisioned
2,181,601 UART: [state] DebugLocked = No
2,182,704 UART: [state] WD Timer not started. Device not locked for debugging
2,185,174 UART: [kat] SHA2-256
2,185,837 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,188,857 UART: [kat] ++
2,189,542 UART: [kat] sha1
2,190,073 UART: [kat] SHA2-256
2,190,833 UART: [kat] SHA2-384
2,191,498 UART: [kat] SHA2-512-ACC
2,192,323 UART: [kat] ECC-384
4,098,007 UART: [kat] HMAC-384Kdf
4,110,317 UART: [kat] LMS
5,183,482 UART: [kat] --
5,187,804 UART: [cold-reset] ++
5,190,225 UART: [fht] FHT @ 0x50003400
5,201,847 UART: [idev] ++
5,202,510 UART: [idev] CDI.KEYID = 6
5,203,745 UART: [idev] SUBJECT.KEYID = 7
5,205,184 UART: [idev] UDS.KEYID = 0
5,222,401 UART: [idev] Erasing UDS.KEYID = 0
8,496,775 UART: [idev] Sha1 KeyId Algorithm
8,517,520 UART: [idev] --
8,522,251 UART: [ldev] ++
8,522,882 UART: [ldev] CDI.KEYID = 6
8,524,059 UART: [ldev] SUBJECT.KEYID = 5
8,525,502 UART: [ldev] AUTHORITY.KEYID = 7
8,527,061 UART: [ldev] FE.KEYID = 1
8,537,982 UART: [ldev] Erasing FE.KEYID = 1
11,829,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,648 UART: [ldev] --
14,195,066 UART: [fwproc] Wait for Commands...
14,198,147 UART: [fwproc] Recv command 0x46574c44
14,200,432 UART: [fwproc] Recv'd Img size: 113760 bytes
17,144,152 UART: ROM Fatal Error: 0x000B0021
17,147,587 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,036,536 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,965,957 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,038,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,183,176 UART:
2,183,586 UART: Running Caliptra ROM ...
2,184,678 UART:
2,184,833 UART: [state] CFI Enabled
2,185,817 UART: [state] LifecycleState = Unprovisioned
2,187,460 UART: [state] DebugLocked = No
2,188,489 UART: [state] WD Timer not started. Device not locked for debugging
2,190,954 UART: [kat] SHA2-256
2,191,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,194,626 UART: [kat] ++
2,195,072 UART: [kat] sha1
2,195,583 UART: [kat] SHA2-256
2,196,239 UART: [kat] SHA2-384
2,196,894 UART: [kat] SHA2-512-ACC
2,197,712 UART: [kat] ECC-384
2,949,736 UART: [kat] HMAC-384Kdf
2,970,932 UART: [kat] LMS
3,500,407 UART: [kat] --
3,504,944 UART: [cold-reset] ++
3,507,314 UART: [fht] FHT @ 0x50003400
3,518,129 UART: [idev] ++
3,518,702 UART: [idev] CDI.KEYID = 6
3,519,616 UART: [idev] SUBJECT.KEYID = 7
3,520,831 UART: [idev] UDS.KEYID = 0
3,543,236 UART: [idev] Erasing UDS.KEYID = 0
6,024,107 UART: [idev] Sha1 KeyId Algorithm
6,047,533 UART: [idev] --
6,051,996 UART: [ldev] ++
6,052,580 UART: [ldev] CDI.KEYID = 6
6,053,491 UART: [ldev] SUBJECT.KEYID = 5
6,054,729 UART: [ldev] AUTHORITY.KEYID = 7
6,055,974 UART: [ldev] FE.KEYID = 1
6,099,243 UART: [ldev] Erasing FE.KEYID = 1
8,600,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,025 UART: [ldev] --
10,387,947 UART: [fwproc] Wait for Commands...
10,390,748 UART: [fwproc] Recv command 0x46574c44
10,392,848 UART: [fwproc] Recv'd Img size: 114084 bytes
12,680,620 UART: ROM Fatal Error: 0x000B0021
12,683,921 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,029,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,501,108 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,024,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,079 UART:
2,168,461 UART: Running Caliptra ROM ...
2,169,560 UART:
2,169,714 UART: [state] CFI Enabled
2,170,690 UART: [state] LifecycleState = Unprovisioned
2,172,332 UART: [state] DebugLocked = No
2,173,437 UART: [state] WD Timer not started. Device not locked for debugging
2,175,906 UART: [kat] SHA2-256
2,176,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,577 UART: [kat] ++
2,180,027 UART: [kat] sha1
2,180,540 UART: [kat] SHA2-256
2,181,277 UART: [kat] SHA2-384
2,181,942 UART: [kat] SHA2-512-ACC
2,182,826 UART: [kat] ECC-384
3,281,757 UART: [kat] HMAC-384Kdf
3,293,327 UART: [kat] LMS
3,822,847 UART: [kat] --
3,826,822 UART: [cold-reset] ++
3,828,053 UART: [fht] FHT @ 0x50003400
3,839,517 UART: [idev] ++
3,840,119 UART: [idev] CDI.KEYID = 6
3,841,005 UART: [idev] SUBJECT.KEYID = 7
3,842,169 UART: [idev] UDS.KEYID = 0
3,857,338 UART: [idev] Erasing UDS.KEYID = 0
6,312,585 UART: [idev] Sha1 KeyId Algorithm
6,336,483 UART: [idev] --
6,339,313 UART: [ldev] ++
6,339,887 UART: [ldev] CDI.KEYID = 6
6,340,809 UART: [ldev] SUBJECT.KEYID = 5
6,341,968 UART: [ldev] AUTHORITY.KEYID = 7
6,343,199 UART: [ldev] FE.KEYID = 1
6,355,116 UART: [ldev] Erasing FE.KEYID = 1
8,825,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,138 UART: [ldev] --
10,613,747 UART: [fwproc] Wait for Commands...
10,616,377 UART: [fwproc] Recv command 0x46574c44
10,618,414 UART: [fwproc] Recv'd Img size: 114084 bytes
12,909,121 UART: ROM Fatal Error: 0x000B0021
12,912,256 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,026,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,696,352 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,038,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,182,083 UART:
2,182,509 UART: Running Caliptra ROM ...
2,183,599 UART:
2,183,754 UART: [state] CFI Enabled
2,184,738 UART: [state] LifecycleState = Unprovisioned
2,186,304 UART: [state] DebugLocked = No
2,187,325 UART: [state] WD Timer not started. Device not locked for debugging
2,189,789 UART: [kat] SHA2-256
2,190,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,193,473 UART: [kat] ++
2,193,925 UART: [kat] sha1
2,194,471 UART: [kat] SHA2-256
2,195,362 UART: [kat] SHA2-384
2,196,028 UART: [kat] SHA2-512-ACC
2,196,833 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,971,611 UART: [kat] LMS
3,501,035 UART: [kat] --
3,507,175 UART: [cold-reset] ++
3,508,414 UART: [fht] FHT @ 0x50003400
3,519,500 UART: [idev] ++
3,520,072 UART: [idev] CDI.KEYID = 6
3,520,996 UART: [idev] SUBJECT.KEYID = 7
3,522,157 UART: [idev] UDS.KEYID = 0
3,542,992 UART: [idev] Erasing UDS.KEYID = 0
6,025,304 UART: [idev] Sha1 KeyId Algorithm
6,048,049 UART: [idev] --
6,051,325 UART: [ldev] ++
6,051,911 UART: [ldev] CDI.KEYID = 6
6,052,822 UART: [ldev] SUBJECT.KEYID = 5
6,053,988 UART: [ldev] AUTHORITY.KEYID = 7
6,055,225 UART: [ldev] FE.KEYID = 1
6,100,434 UART: [ldev] Erasing FE.KEYID = 1
8,603,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,833 UART: [ldev] --
10,414,882 UART: [fwproc] Wait for Commands...
10,417,747 UART: [fwproc] Recv command 0x46574c44
10,419,846 UART: [fwproc] Recv'd Img size: 114084 bytes
12,714,746 UART: ROM Fatal Error: 0x000B0021
12,717,881 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
2,025,282 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,493,014 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
2,023,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,834 UART:
2,168,242 UART: Running Caliptra ROM ...
2,169,326 UART:
2,169,480 UART: [state] CFI Enabled
2,170,455 UART: [state] LifecycleState = Unprovisioned
2,172,011 UART: [state] DebugLocked = No
2,173,038 UART: [state] WD Timer not started. Device not locked for debugging
2,175,499 UART: [kat] SHA2-256
2,176,162 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,172 UART: [kat] ++
2,179,616 UART: [kat] sha1
2,180,129 UART: [kat] SHA2-256
2,180,783 UART: [kat] SHA2-384
2,181,438 UART: [kat] SHA2-512-ACC
2,182,264 UART: [kat] ECC-384
3,278,602 UART: [kat] HMAC-384Kdf
3,291,257 UART: [kat] LMS
3,820,738 UART: [kat] --
3,826,616 UART: [cold-reset] ++
3,828,059 UART: [fht] FHT @ 0x50003400
3,840,134 UART: [idev] ++
3,840,708 UART: [idev] CDI.KEYID = 6
3,841,588 UART: [idev] SUBJECT.KEYID = 7
3,842,796 UART: [idev] UDS.KEYID = 0
3,855,695 UART: [idev] Erasing UDS.KEYID = 0
6,316,312 UART: [idev] Sha1 KeyId Algorithm
6,339,887 UART: [idev] --
6,342,908 UART: [ldev] ++
6,343,474 UART: [ldev] CDI.KEYID = 6
6,344,350 UART: [ldev] SUBJECT.KEYID = 5
6,345,563 UART: [ldev] AUTHORITY.KEYID = 7
6,346,852 UART: [ldev] FE.KEYID = 1
6,357,196 UART: [ldev] Erasing FE.KEYID = 1
8,828,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,434 UART: [ldev] --
10,620,368 UART: [fwproc] Wait for Commands...
10,622,025 UART: [fwproc] Recv command 0x46574c44
10,624,119 UART: [fwproc] Recv'd Img size: 114084 bytes
12,919,639 UART: ROM Fatal Error: 0x000B0021
12,922,721 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
2,024,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,699,784 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,344 UART: [state] LifecycleState = Unprovisioned
84,999 UART: [state] DebugLocked = No
85,573 UART: [state] WD Timer not started. Device not locked for debugging
86,850 UART: [kat] SHA2-256
890,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,529 UART: [kat] ++
894,681 UART: [kat] sha1
898,823 UART: [kat] SHA2-256
900,763 UART: [kat] SHA2-384
903,348 UART: [kat] SHA2-512-ACC
905,249 UART: [kat] ECC-384
914,840 UART: [kat] HMAC-384Kdf
919,284 UART: [kat] LMS
1,167,596 UART: [kat] --
1,168,655 UART: [cold-reset] ++
1,169,221 UART: [fht] FHT @ 0x50003400
1,171,895 UART: [idev] ++
1,172,063 UART: [idev] CDI.KEYID = 6
1,172,424 UART: [idev] SUBJECT.KEYID = 7
1,172,849 UART: [idev] UDS.KEYID = 0
1,180,589 UART: [idev] Erasing UDS.KEYID = 0
1,197,703 UART: [idev] Sha1 KeyId Algorithm
1,206,437 UART: [idev] --
1,207,674 UART: [ldev] ++
1,207,842 UART: [ldev] CDI.KEYID = 6
1,208,206 UART: [ldev] SUBJECT.KEYID = 5
1,208,633 UART: [ldev] AUTHORITY.KEYID = 7
1,209,096 UART: [ldev] FE.KEYID = 1
1,214,228 UART: [ldev] Erasing FE.KEYID = 1
1,240,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,376 UART: [fwproc] Wait for Commands...
1,280,989 UART: [fwproc] Recv command 0x46574c44
1,281,722 UART: [fwproc] Recv'd Img size: 114084 bytes
1,546,821 UART: ROM Fatal Error: 0x000B0021
1,547,978 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,967 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,698 UART: [kat] SHA2-256
901,638 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,198,980 UART: [idev] Sha1 KeyId Algorithm
1,207,716 UART: [idev] --
1,208,871 UART: [ldev] ++
1,209,039 UART: [ldev] CDI.KEYID = 6
1,209,403 UART: [ldev] SUBJECT.KEYID = 5
1,209,830 UART: [ldev] AUTHORITY.KEYID = 7
1,210,293 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,241,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,507 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,576 UART: ROM Fatal Error: 0x000B0021
1,550,733 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,428 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,807 UART: [fht] FHT @ 0x50003400
1,173,591 UART: [idev] ++
1,173,759 UART: [idev] CDI.KEYID = 6
1,174,120 UART: [idev] SUBJECT.KEYID = 7
1,174,545 UART: [idev] UDS.KEYID = 0
1,182,753 UART: [idev] Erasing UDS.KEYID = 0
1,199,965 UART: [idev] Sha1 KeyId Algorithm
1,208,833 UART: [idev] --
1,209,998 UART: [ldev] ++
1,210,166 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,957 UART: [ldev] AUTHORITY.KEYID = 7
1,211,420 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,364 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,489 UART: [fwproc] Recv command 0x46574c44
1,283,222 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,577 UART: ROM Fatal Error: 0x000B0021
1,550,734 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,951 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,842 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,809 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,243 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,424 UART: ROM Fatal Error: 0x000B0021
1,550,581 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,296 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,689 UART: [fht] FHT @ 0x50003400
1,172,455 UART: [idev] ++
1,172,623 UART: [idev] CDI.KEYID = 6
1,172,984 UART: [idev] SUBJECT.KEYID = 7
1,173,409 UART: [idev] UDS.KEYID = 0
1,181,273 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,302 UART: [ldev] ++
1,208,470 UART: [ldev] CDI.KEYID = 6
1,208,834 UART: [ldev] SUBJECT.KEYID = 5
1,209,261 UART: [ldev] AUTHORITY.KEYID = 7
1,209,724 UART: [ldev] FE.KEYID = 1
1,215,140 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,471 UART: [fwproc] Recv command 0x46574c44
1,283,204 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,511 UART: ROM Fatal Error: 0x000B0021
1,549,668 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,313 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
905,093 UART: [kat] SHA2-512-ACC
906,994 UART: [kat] ECC-384
916,921 UART: [kat] HMAC-384Kdf
921,631 UART: [kat] LMS
1,169,943 UART: [kat] --
1,170,788 UART: [cold-reset] ++
1,171,248 UART: [fht] FHT @ 0x50003400
1,173,984 UART: [idev] ++
1,174,152 UART: [idev] CDI.KEYID = 6
1,174,513 UART: [idev] SUBJECT.KEYID = 7
1,174,938 UART: [idev] UDS.KEYID = 0
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,720 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,447 UART: [ldev] --
1,282,729 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,219 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,278 UART: ROM Fatal Error: 0x000B0021
1,550,435 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,492 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,019,867 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,483 UART:
2,163,881 UART: Running Caliptra ROM ...
2,165,005 UART:
2,165,178 UART: [state] CFI Enabled
2,166,074 UART: [state] LifecycleState = Unprovisioned
2,167,719 UART: [state] DebugLocked = No
2,168,823 UART: [state] WD Timer not started. Device not locked for debugging
2,171,308 UART: [kat] SHA2-256
2,171,975 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,985 UART: [kat] ++
2,175,471 UART: [kat] sha1
2,175,984 UART: [kat] SHA2-256
2,176,720 UART: [kat] SHA2-384
2,177,406 UART: [kat] SHA2-512-ACC
2,178,236 UART: [kat] ECC-384
3,774,695 UART: [kat] HMAC-384Kdf
3,802,382 UART: [kat] LMS
4,875,554 UART: [kat] --
4,880,113 UART: [cold-reset] ++
4,881,887 UART: [fht] FHT @ 0x50003400
4,894,109 UART: [idev] ++
4,894,785 UART: [idev] CDI.KEYID = 6
4,895,892 UART: [idev] SUBJECT.KEYID = 7
4,897,105 UART: [idev] UDS.KEYID = 0
4,929,571 UART: [idev] Erasing UDS.KEYID = 0
8,240,624 UART: [idev] Sha1 KeyId Algorithm
8,263,213 UART: [idev] --
8,267,045 UART: [ldev] ++
8,267,618 UART: [ldev] CDI.KEYID = 6
8,268,818 UART: [ldev] SUBJECT.KEYID = 5
8,269,979 UART: [ldev] AUTHORITY.KEYID = 7
8,271,210 UART: [ldev] FE.KEYID = 1
8,315,733 UART: [ldev] Erasing FE.KEYID = 1
11,650,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,217 UART: [ldev] --
14,036,560 UART: [fwproc] Wait for Commands...
14,038,985 UART: [fwproc] Recv command 0x46574c44
14,041,303 UART: [fwproc] Recv'd Img size: 113760 bytes
16,743,708 UART: ROM Fatal Error: 0x000B0034
16,747,109 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,019,550 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,162,971 UART:
2,163,359 UART: Running Caliptra ROM ...
2,164,437 UART:
2,164,591 UART: [state] CFI Enabled
2,165,509 UART: [state] LifecycleState = Unprovisioned
2,167,152 UART: [state] DebugLocked = No
2,168,175 UART: [state] WD Timer not started. Device not locked for debugging
2,170,652 UART: [kat] SHA2-256
2,171,314 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,351 UART: [kat] ++
2,174,800 UART: [kat] sha1
2,175,307 UART: [kat] SHA2-256
2,175,963 UART: [kat] SHA2-384
2,176,618 UART: [kat] SHA2-512-ACC
2,177,443 UART: [kat] ECC-384
3,775,349 UART: [kat] HMAC-384Kdf
3,802,503 UART: [kat] LMS
4,875,663 UART: [kat] --
4,878,877 UART: [cold-reset] ++
4,881,196 UART: [fht] FHT @ 0x50003400
4,891,425 UART: [idev] ++
4,892,098 UART: [idev] CDI.KEYID = 6
4,893,344 UART: [idev] SUBJECT.KEYID = 7
4,894,448 UART: [idev] UDS.KEYID = 0
4,931,060 UART: [idev] Erasing UDS.KEYID = 0
8,243,929 UART: [idev] Sha1 KeyId Algorithm
8,266,402 UART: [idev] --
8,270,881 UART: [ldev] ++
8,271,450 UART: [ldev] CDI.KEYID = 6
8,272,688 UART: [ldev] SUBJECT.KEYID = 5
8,273,845 UART: [ldev] AUTHORITY.KEYID = 7
8,275,077 UART: [ldev] FE.KEYID = 1
8,317,743 UART: [ldev] Erasing FE.KEYID = 1
11,650,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,141 UART: [ldev] --
14,016,273 UART: [fwproc] Wait for Commands...
14,019,133 UART: [fwproc] Recv command 0x46574c44
14,021,471 UART: [fwproc] Recv'd Img size: 113760 bytes
16,728,165 UART: ROM Fatal Error: 0x000B0034
16,731,567 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,021,227 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,531,544 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,019,772 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,521,944 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
2,022,703 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,668 UART:
2,167,076 UART: Running Caliptra ROM ...
2,168,253 UART:
2,168,414 UART: [state] CFI Enabled
2,169,379 UART: [state] LifecycleState = Unprovisioned
2,171,035 UART: [state] DebugLocked = No
2,172,140 UART: [state] WD Timer not started. Device not locked for debugging
2,174,617 UART: [kat] SHA2-256
2,175,281 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,288 UART: [kat] ++
2,178,732 UART: [kat] sha1
2,179,241 UART: [kat] SHA2-256
2,179,893 UART: [kat] SHA2-384
2,180,541 UART: [kat] SHA2-512-ACC
2,181,331 UART: [kat] ECC-384
4,097,805 UART: [kat] HMAC-384Kdf
4,109,180 UART: [kat] LMS
5,182,337 UART: [kat] --
5,187,697 UART: [cold-reset] ++
5,189,314 UART: [fht] FHT @ 0x50003400
5,201,155 UART: [idev] ++
5,201,850 UART: [idev] CDI.KEYID = 6
5,203,026 UART: [idev] SUBJECT.KEYID = 7
5,204,510 UART: [idev] UDS.KEYID = 0
5,219,075 UART: [idev] Erasing UDS.KEYID = 0
8,495,140 UART: [idev] Sha1 KeyId Algorithm
8,517,133 UART: [idev] --
8,521,942 UART: [ldev] ++
8,522,510 UART: [ldev] CDI.KEYID = 6
8,523,742 UART: [ldev] SUBJECT.KEYID = 5
8,525,230 UART: [ldev] AUTHORITY.KEYID = 7
8,526,709 UART: [ldev] FE.KEYID = 1
8,536,918 UART: [ldev] Erasing FE.KEYID = 1
11,826,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,575 UART: [ldev] --
14,191,538 UART: [fwproc] Wait for Commands...
14,194,711 UART: [fwproc] Recv command 0x46574c44
14,197,017 UART: [fwproc] Recv'd Img size: 113760 bytes
16,902,261 UART: ROM Fatal Error: 0x000B0034
16,905,711 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,021,266 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,623 UART:
2,165,038 UART: Running Caliptra ROM ...
2,166,219 UART:
2,166,392 UART: [state] CFI Enabled
2,167,307 UART: [state] LifecycleState = Unprovisioned
2,168,944 UART: [state] DebugLocked = No
2,170,052 UART: [state] WD Timer not started. Device not locked for debugging
2,172,516 UART: [kat] SHA2-256
2,173,176 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,186 UART: [kat] ++
2,176,631 UART: [kat] sha1
2,177,134 UART: [kat] SHA2-256
2,177,864 UART: [kat] SHA2-384
2,178,525 UART: [kat] SHA2-512-ACC
2,179,318 UART: [kat] ECC-384
4,096,811 UART: [kat] HMAC-384Kdf
4,109,376 UART: [kat] LMS
5,182,535 UART: [kat] --
5,186,904 UART: [cold-reset] ++
5,189,104 UART: [fht] FHT @ 0x50003400
5,200,346 UART: [idev] ++
5,201,022 UART: [idev] CDI.KEYID = 6
5,202,259 UART: [idev] SUBJECT.KEYID = 7
5,203,687 UART: [idev] UDS.KEYID = 0
5,218,230 UART: [idev] Erasing UDS.KEYID = 0
8,490,842 UART: [idev] Sha1 KeyId Algorithm
8,513,214 UART: [idev] --
8,517,265 UART: [ldev] ++
8,517,829 UART: [ldev] CDI.KEYID = 6
8,519,062 UART: [ldev] SUBJECT.KEYID = 5
8,520,487 UART: [ldev] AUTHORITY.KEYID = 7
8,522,040 UART: [ldev] FE.KEYID = 1
8,535,171 UART: [ldev] Erasing FE.KEYID = 1
11,824,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,004 UART: [ldev] --
14,190,212 UART: [fwproc] Wait for Commands...
14,192,248 UART: [fwproc] Recv command 0x46574c44
14,194,554 UART: [fwproc] Recv'd Img size: 113760 bytes
16,903,817 UART: ROM Fatal Error: 0x000B0034
16,907,260 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
2,027,967 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,713,279 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,021,649 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,719,964 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,023,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,684 UART:
2,168,105 UART: Running Caliptra ROM ...
2,169,282 UART:
2,169,453 UART: [state] CFI Enabled
2,170,425 UART: [state] LifecycleState = Unprovisioned
2,172,071 UART: [state] DebugLocked = No
2,173,180 UART: [state] WD Timer not started. Device not locked for debugging
2,175,650 UART: [kat] SHA2-256
2,176,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,352 UART: [kat] ++
2,179,801 UART: [kat] sha1
2,180,316 UART: [kat] SHA2-256
2,180,970 UART: [kat] SHA2-384
2,181,626 UART: [kat] SHA2-512-ACC
2,182,425 UART: [kat] ECC-384
2,949,057 UART: [kat] HMAC-384Kdf
2,977,369 UART: [kat] LMS
3,506,850 UART: [kat] --
3,509,520 UART: [cold-reset] ++
3,510,430 UART: [fht] FHT @ 0x50003400
3,521,461 UART: [idev] ++
3,522,025 UART: [idev] CDI.KEYID = 6
3,522,942 UART: [idev] SUBJECT.KEYID = 7
3,524,159 UART: [idev] UDS.KEYID = 0
3,548,777 UART: [idev] Erasing UDS.KEYID = 0
6,031,633 UART: [idev] Sha1 KeyId Algorithm
6,055,136 UART: [idev] --
6,059,024 UART: [ldev] ++
6,059,597 UART: [ldev] CDI.KEYID = 6
6,060,486 UART: [ldev] SUBJECT.KEYID = 5
6,061,703 UART: [ldev] AUTHORITY.KEYID = 7
6,062,940 UART: [ldev] FE.KEYID = 1
6,104,838 UART: [ldev] Erasing FE.KEYID = 1
8,609,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,249 UART: [ldev] --
10,418,473 UART: [fwproc] Wait for Commands...
10,421,354 UART: [fwproc] Recv command 0x46574c44
10,423,456 UART: [fwproc] Recv'd Img size: 114084 bytes
12,470,993 UART: ROM Fatal Error: 0x000B0034
12,474,126 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,019,974 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,163,881 UART:
2,164,295 UART: Running Caliptra ROM ...
2,165,467 UART:
2,165,637 UART: [state] CFI Enabled
2,166,614 UART: [state] LifecycleState = Unprovisioned
2,168,256 UART: [state] DebugLocked = No
2,169,367 UART: [state] WD Timer not started. Device not locked for debugging
2,171,847 UART: [kat] SHA2-256
2,172,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,530 UART: [kat] ++
2,175,981 UART: [kat] sha1
2,176,497 UART: [kat] SHA2-256
2,177,155 UART: [kat] SHA2-384
2,177,840 UART: [kat] SHA2-512-ACC
2,178,820 UART: [kat] ECC-384
2,945,799 UART: [kat] HMAC-384Kdf
2,970,813 UART: [kat] LMS
3,500,300 UART: [kat] --
3,504,530 UART: [cold-reset] ++
3,506,464 UART: [fht] FHT @ 0x50003400
3,517,789 UART: [idev] ++
3,518,361 UART: [idev] CDI.KEYID = 6
3,519,270 UART: [idev] SUBJECT.KEYID = 7
3,520,484 UART: [idev] UDS.KEYID = 0
3,542,404 UART: [idev] Erasing UDS.KEYID = 0
6,022,044 UART: [idev] Sha1 KeyId Algorithm
6,043,832 UART: [idev] --
6,048,806 UART: [ldev] ++
6,049,377 UART: [ldev] CDI.KEYID = 6
6,050,263 UART: [ldev] SUBJECT.KEYID = 5
6,051,474 UART: [ldev] AUTHORITY.KEYID = 7
6,052,764 UART: [ldev] FE.KEYID = 1
6,099,789 UART: [ldev] Erasing FE.KEYID = 1
8,604,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,604 UART: [ldev] --
10,412,704 UART: [fwproc] Wait for Commands...
10,415,230 UART: [fwproc] Recv command 0x46574c44
10,417,328 UART: [fwproc] Recv'd Img size: 114084 bytes
12,468,850 UART: ROM Fatal Error: 0x000B0034
12,471,967 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,021,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,275,420 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,023,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,238,182 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
2,021,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,477 UART:
2,165,875 UART: Running Caliptra ROM ...
2,166,956 UART:
2,167,111 UART: [state] CFI Enabled
2,168,088 UART: [state] LifecycleState = Unprovisioned
2,169,732 UART: [state] DebugLocked = No
2,170,839 UART: [state] WD Timer not started. Device not locked for debugging
2,173,307 UART: [kat] SHA2-256
2,173,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,005 UART: [kat] ++
2,177,464 UART: [kat] sha1
2,177,977 UART: [kat] SHA2-256
2,178,634 UART: [kat] SHA2-384
2,179,481 UART: [kat] SHA2-512-ACC
2,180,319 UART: [kat] ECC-384
3,284,906 UART: [kat] HMAC-384Kdf
3,297,175 UART: [kat] LMS
3,826,701 UART: [kat] --
3,831,304 UART: [cold-reset] ++
3,832,912 UART: [fht] FHT @ 0x50003400
3,845,183 UART: [idev] ++
3,845,751 UART: [idev] CDI.KEYID = 6
3,846,654 UART: [idev] SUBJECT.KEYID = 7
3,847,865 UART: [idev] UDS.KEYID = 0
3,863,674 UART: [idev] Erasing UDS.KEYID = 0
6,323,296 UART: [idev] Sha1 KeyId Algorithm
6,347,495 UART: [idev] --
6,352,027 UART: [ldev] ++
6,352,598 UART: [ldev] CDI.KEYID = 6
6,353,508 UART: [ldev] SUBJECT.KEYID = 5
6,354,775 UART: [ldev] AUTHORITY.KEYID = 7
6,355,945 UART: [ldev] FE.KEYID = 1
6,364,969 UART: [ldev] Erasing FE.KEYID = 1
8,836,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,080 UART: [ldev] --
10,628,189 UART: [fwproc] Wait for Commands...
10,630,233 UART: [fwproc] Recv command 0x46574c44
10,632,291 UART: [fwproc] Recv'd Img size: 114084 bytes
12,689,034 UART: ROM Fatal Error: 0x000B0034
12,692,166 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,020,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,163,952 UART:
2,164,331 UART: Running Caliptra ROM ...
2,165,695 UART:
2,165,871 UART: [state] CFI Enabled
2,166,841 UART: [state] LifecycleState = Unprovisioned
2,168,520 UART: [state] DebugLocked = No
2,169,626 UART: [state] WD Timer not started. Device not locked for debugging
2,172,092 UART: [kat] SHA2-256
2,172,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,765 UART: [kat] ++
2,176,213 UART: [kat] sha1
2,176,722 UART: [kat] SHA2-256
2,177,459 UART: [kat] SHA2-384
2,178,123 UART: [kat] SHA2-512-ACC
2,178,955 UART: [kat] ECC-384
3,282,434 UART: [kat] HMAC-384Kdf
3,294,210 UART: [kat] LMS
3,823,718 UART: [kat] --
3,829,364 UART: [cold-reset] ++
3,831,784 UART: [fht] FHT @ 0x50003400
3,843,620 UART: [idev] ++
3,844,196 UART: [idev] CDI.KEYID = 6
3,845,108 UART: [idev] SUBJECT.KEYID = 7
3,846,363 UART: [idev] UDS.KEYID = 0
3,861,968 UART: [idev] Erasing UDS.KEYID = 0
6,318,310 UART: [idev] Sha1 KeyId Algorithm
6,341,106 UART: [idev] --
6,345,077 UART: [ldev] ++
6,345,656 UART: [ldev] CDI.KEYID = 6
6,346,564 UART: [ldev] SUBJECT.KEYID = 5
6,347,781 UART: [ldev] AUTHORITY.KEYID = 7
6,349,013 UART: [ldev] FE.KEYID = 1
6,358,633 UART: [ldev] Erasing FE.KEYID = 1
8,830,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,806 UART: [ldev] --
10,620,554 UART: [fwproc] Wait for Commands...
10,622,814 UART: [fwproc] Recv command 0x46574c44
10,624,850 UART: [fwproc] Recv'd Img size: 114084 bytes
12,682,633 UART: ROM Fatal Error: 0x000B0034
12,685,711 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
2,021,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,452,529 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,020,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,453,377 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,029,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,173,855 UART:
2,174,260 UART: Running Caliptra ROM ...
2,175,420 UART:
2,175,588 UART: [state] CFI Enabled
2,176,555 UART: [state] LifecycleState = Unprovisioned
2,178,199 UART: [state] DebugLocked = No
2,179,329 UART: [state] WD Timer not started. Device not locked for debugging
2,181,802 UART: [kat] SHA2-256
2,182,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,482 UART: [kat] ++
2,185,977 UART: [kat] sha1
2,186,495 UART: [kat] SHA2-256
2,187,148 UART: [kat] SHA2-384
2,187,797 UART: [kat] SHA2-512-ACC
2,188,596 UART: [kat] ECC-384
2,947,199 UART: [kat] HMAC-384Kdf
2,972,222 UART: [kat] LMS
3,501,676 UART: [kat] --
3,506,485 UART: [cold-reset] ++
3,508,583 UART: [fht] FHT @ 0x50003400
3,519,777 UART: [idev] ++
3,520,342 UART: [idev] CDI.KEYID = 6
3,521,339 UART: [idev] SUBJECT.KEYID = 7
3,522,502 UART: [idev] UDS.KEYID = 0
3,544,636 UART: [idev] Erasing UDS.KEYID = 0
6,026,172 UART: [idev] Sha1 KeyId Algorithm
6,048,245 UART: [idev] --
6,051,922 UART: [ldev] ++
6,052,510 UART: [ldev] CDI.KEYID = 6
6,053,420 UART: [ldev] SUBJECT.KEYID = 5
6,054,640 UART: [ldev] AUTHORITY.KEYID = 7
6,055,880 UART: [ldev] FE.KEYID = 1
6,100,177 UART: [ldev] Erasing FE.KEYID = 1
8,605,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,355 UART: [ldev] --
10,416,569 UART: [fwproc] Wait for Commands...
10,418,397 UART: [fwproc] Recv command 0x46574c44
10,420,497 UART: [fwproc] Recv'd Img size: 114084 bytes
12,472,843 UART: ROM Fatal Error: 0x000B0034
12,475,964 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,024,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,114 UART:
2,168,506 UART: Running Caliptra ROM ...
2,169,610 UART:
2,169,767 UART: [state] CFI Enabled
2,170,739 UART: [state] LifecycleState = Unprovisioned
2,172,379 UART: [state] DebugLocked = No
2,173,410 UART: [state] WD Timer not started. Device not locked for debugging
2,175,893 UART: [kat] SHA2-256
2,176,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,561 UART: [kat] ++
2,180,007 UART: [kat] sha1
2,180,521 UART: [kat] SHA2-256
2,181,177 UART: [kat] SHA2-384
2,181,831 UART: [kat] SHA2-512-ACC
2,182,833 UART: [kat] ECC-384
2,948,244 UART: [kat] HMAC-384Kdf
2,969,705 UART: [kat] LMS
3,499,167 UART: [kat] --
3,504,741 UART: [cold-reset] ++
3,506,784 UART: [fht] FHT @ 0x50003400
3,517,708 UART: [idev] ++
3,518,276 UART: [idev] CDI.KEYID = 6
3,519,158 UART: [idev] SUBJECT.KEYID = 7
3,520,372 UART: [idev] UDS.KEYID = 0
3,540,890 UART: [idev] Erasing UDS.KEYID = 0
6,023,742 UART: [idev] Sha1 KeyId Algorithm
6,045,260 UART: [idev] --
6,049,564 UART: [ldev] ++
6,050,142 UART: [ldev] CDI.KEYID = 6
6,051,058 UART: [ldev] SUBJECT.KEYID = 5
6,052,223 UART: [ldev] AUTHORITY.KEYID = 7
6,053,512 UART: [ldev] FE.KEYID = 1
6,096,492 UART: [ldev] Erasing FE.KEYID = 1
8,599,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,358 UART: [ldev] --
10,409,515 UART: [fwproc] Wait for Commands...
10,411,233 UART: [fwproc] Recv command 0x46574c44
10,413,277 UART: [fwproc] Recv'd Img size: 114084 bytes
12,460,251 UART: ROM Fatal Error: 0x000B0034
12,463,382 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,032,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,220,020 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,019,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,228,001 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,025,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,641 UART:
2,170,032 UART: Running Caliptra ROM ...
2,171,125 UART:
2,171,283 UART: [state] CFI Enabled
2,172,177 UART: [state] LifecycleState = Unprovisioned
2,173,819 UART: [state] DebugLocked = No
2,174,846 UART: [state] WD Timer not started. Device not locked for debugging
2,177,311 UART: [kat] SHA2-256
2,177,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,210 UART: [kat] ++
2,181,672 UART: [kat] sha1
2,182,184 UART: [kat] SHA2-256
2,182,840 UART: [kat] SHA2-384
2,183,493 UART: [kat] SHA2-512-ACC
2,184,313 UART: [kat] ECC-384
3,281,694 UART: [kat] HMAC-384Kdf
3,294,745 UART: [kat] LMS
3,824,193 UART: [kat] --
3,826,728 UART: [cold-reset] ++
3,828,764 UART: [fht] FHT @ 0x50003400
3,840,232 UART: [idev] ++
3,840,795 UART: [idev] CDI.KEYID = 6
3,841,807 UART: [idev] SUBJECT.KEYID = 7
3,842,969 UART: [idev] UDS.KEYID = 0
3,858,137 UART: [idev] Erasing UDS.KEYID = 0
6,315,171 UART: [idev] Sha1 KeyId Algorithm
6,337,756 UART: [idev] --
6,341,483 UART: [ldev] ++
6,342,090 UART: [ldev] CDI.KEYID = 6
6,343,008 UART: [ldev] SUBJECT.KEYID = 5
6,344,199 UART: [ldev] AUTHORITY.KEYID = 7
6,345,431 UART: [ldev] FE.KEYID = 1
6,355,805 UART: [ldev] Erasing FE.KEYID = 1
8,829,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,519 UART: [ldev] --
10,619,702 UART: [fwproc] Wait for Commands...
10,622,341 UART: [fwproc] Recv command 0x46574c44
10,624,440 UART: [fwproc] Recv'd Img size: 114084 bytes
12,674,223 UART: ROM Fatal Error: 0x000B0034
12,677,355 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,019,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,163,264 UART:
2,163,653 UART: Running Caliptra ROM ...
2,164,731 UART:
2,164,881 UART: [state] CFI Enabled
2,165,848 UART: [state] LifecycleState = Unprovisioned
2,167,506 UART: [state] DebugLocked = No
2,168,538 UART: [state] WD Timer not started. Device not locked for debugging
2,171,004 UART: [kat] SHA2-256
2,171,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,174,684 UART: [kat] ++
2,175,148 UART: [kat] sha1
2,175,664 UART: [kat] SHA2-256
2,176,322 UART: [kat] SHA2-384
2,176,979 UART: [kat] SHA2-512-ACC
2,177,778 UART: [kat] ECC-384
3,283,992 UART: [kat] HMAC-384Kdf
3,297,419 UART: [kat] LMS
3,826,932 UART: [kat] --
3,831,193 UART: [cold-reset] ++
3,832,634 UART: [fht] FHT @ 0x50003400
3,842,799 UART: [idev] ++
3,843,406 UART: [idev] CDI.KEYID = 6
3,844,341 UART: [idev] SUBJECT.KEYID = 7
3,845,498 UART: [idev] UDS.KEYID = 0
3,862,931 UART: [idev] Erasing UDS.KEYID = 0
6,323,438 UART: [idev] Sha1 KeyId Algorithm
6,344,949 UART: [idev] --
6,349,361 UART: [ldev] ++
6,349,924 UART: [ldev] CDI.KEYID = 6
6,350,828 UART: [ldev] SUBJECT.KEYID = 5
6,351,981 UART: [ldev] AUTHORITY.KEYID = 7
6,353,264 UART: [ldev] FE.KEYID = 1
6,363,886 UART: [ldev] Erasing FE.KEYID = 1
8,836,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,908 UART: [ldev] --
10,627,168 UART: [fwproc] Wait for Commands...
10,629,151 UART: [fwproc] Recv command 0x46574c44
10,631,245 UART: [fwproc] Recv'd Img size: 114084 bytes
12,682,895 UART: ROM Fatal Error: 0x000B0034
12,686,023 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,022,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,468,995 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,020,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,463,298 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,880 UART: [kat] HMAC-384Kdf
921,668 UART: [kat] LMS
1,169,980 UART: [kat] --
1,170,723 UART: [cold-reset] ++
1,171,151 UART: [fht] FHT @ 0x50003400
1,173,787 UART: [idev] ++
1,173,955 UART: [idev] CDI.KEYID = 6
1,174,316 UART: [idev] SUBJECT.KEYID = 7
1,174,741 UART: [idev] UDS.KEYID = 0
1,182,523 UART: [idev] Erasing UDS.KEYID = 0
1,199,709 UART: [idev] Sha1 KeyId Algorithm
1,208,603 UART: [idev] --
1,209,644 UART: [ldev] ++
1,209,812 UART: [ldev] CDI.KEYID = 6
1,210,176 UART: [ldev] SUBJECT.KEYID = 5
1,210,603 UART: [ldev] AUTHORITY.KEYID = 7
1,211,066 UART: [ldev] FE.KEYID = 1
1,216,430 UART: [ldev] Erasing FE.KEYID = 1
1,242,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,224 UART: [ldev] --
1,281,562 UART: [fwproc] Wait for Commands...
1,282,151 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,310 UART: ROM Fatal Error: 0x000B0034
1,330,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,279 UART: [kat] SHA2-256
901,219 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,791 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,482 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,316 UART: ROM Fatal Error: 0x000B0034
1,330,473 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,292 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,041 UART: [kat] SHA2-256
891,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,720 UART: [kat] ++
895,872 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,618 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,188 UART: [idev] --
1,210,291 UART: [ldev] ++
1,210,459 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,243,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,243 UART: [fwproc] Wait for Commands...
1,283,040 UART: [fwproc] Recv command 0x46574c44
1,283,773 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,705 UART: ROM Fatal Error: 0x000B0034
1,332,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,894 UART: [kat] ++
896,046 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
917,025 UART: [kat] HMAC-384Kdf
921,697 UART: [kat] LMS
1,170,009 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,050 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,875 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,287 UART: ROM Fatal Error: 0x000B0034
1,331,444 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,973 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,182,263 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,655 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,116 UART: [ldev] --
1,281,450 UART: [fwproc] Wait for Commands...
1,282,199 UART: [fwproc] Recv command 0x46574c44
1,282,932 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,846 UART: ROM Fatal Error: 0x000B0034
1,331,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,951 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,831 UART: [kat] ++
894,983 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,336 UART: [kat] HMAC-384Kdf
919,918 UART: [kat] LMS
1,168,230 UART: [kat] --
1,168,949 UART: [cold-reset] ++
1,169,371 UART: [fht] FHT @ 0x50003400
1,172,009 UART: [idev] ++
1,172,177 UART: [idev] CDI.KEYID = 6
1,172,538 UART: [idev] SUBJECT.KEYID = 7
1,172,963 UART: [idev] UDS.KEYID = 0
1,180,443 UART: [idev] Erasing UDS.KEYID = 0
1,197,139 UART: [idev] Sha1 KeyId Algorithm
1,205,865 UART: [idev] --
1,207,058 UART: [ldev] ++
1,207,226 UART: [ldev] CDI.KEYID = 6
1,207,590 UART: [ldev] SUBJECT.KEYID = 5
1,208,017 UART: [ldev] AUTHORITY.KEYID = 7
1,208,480 UART: [ldev] FE.KEYID = 1
1,213,542 UART: [ldev] Erasing FE.KEYID = 1
1,239,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,274 UART: [ldev] --
1,278,654 UART: [fwproc] Wait for Commands...
1,279,463 UART: [fwproc] Recv command 0x46574c44
1,280,196 UART: [fwproc] Recv'd Img size: 114084 bytes
1,326,898 UART: ROM Fatal Error: 0x000B0034
1,328,055 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,766 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,967 UART: [state] LifecycleState = Unprovisioned
85,622 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
891,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,609 UART: [kat] LMS
1,168,921 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,922 UART: [fht] FHT @ 0x50003400
1,172,428 UART: [idev] ++
1,172,596 UART: [idev] CDI.KEYID = 6
1,172,957 UART: [idev] SUBJECT.KEYID = 7
1,173,382 UART: [idev] UDS.KEYID = 0
1,181,360 UART: [idev] Erasing UDS.KEYID = 0
1,197,960 UART: [idev] Sha1 KeyId Algorithm
1,206,912 UART: [idev] --
1,207,971 UART: [ldev] ++
1,208,139 UART: [ldev] CDI.KEYID = 6
1,208,503 UART: [ldev] SUBJECT.KEYID = 5
1,208,930 UART: [ldev] AUTHORITY.KEYID = 7
1,209,393 UART: [ldev] FE.KEYID = 1
1,214,465 UART: [ldev] Erasing FE.KEYID = 1
1,241,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,207 UART: [ldev] --
1,280,637 UART: [fwproc] Wait for Commands...
1,281,302 UART: [fwproc] Recv command 0x46574c44
1,282,035 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,429 UART: ROM Fatal Error: 0x000B0034
1,329,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,180 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,934 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,265 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,581 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,665 UART: ROM Fatal Error: 0x000B0034
1,331,822 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,964 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,968 UART: [kat] HMAC-384Kdf
921,548 UART: [kat] LMS
1,169,860 UART: [kat] --
1,170,933 UART: [cold-reset] ++
1,171,499 UART: [fht] FHT @ 0x50003400
1,174,381 UART: [idev] ++
1,174,549 UART: [idev] CDI.KEYID = 6
1,174,910 UART: [idev] SUBJECT.KEYID = 7
1,175,335 UART: [idev] UDS.KEYID = 0
1,183,431 UART: [idev] Erasing UDS.KEYID = 0
1,200,155 UART: [idev] Sha1 KeyId Algorithm
1,209,161 UART: [idev] --
1,210,172 UART: [ldev] ++
1,210,340 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,131 UART: [ldev] AUTHORITY.KEYID = 7
1,211,594 UART: [ldev] FE.KEYID = 1
1,217,080 UART: [ldev] Erasing FE.KEYID = 1
1,243,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,378 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,417 UART: [fwproc] Recv command 0x46574c44
1,284,150 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,946 UART: ROM Fatal Error: 0x000B0034
1,332,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,604 UART: [state] LifecycleState = Unprovisioned
85,259 UART: [state] DebugLocked = No
85,935 UART: [state] WD Timer not started. Device not locked for debugging
87,076 UART: [kat] SHA2-256
890,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,755 UART: [kat] ++
894,907 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,160 UART: [kat] HMAC-384Kdf
919,778 UART: [kat] LMS
1,168,090 UART: [kat] --
1,168,963 UART: [cold-reset] ++
1,169,351 UART: [fht] FHT @ 0x50003400
1,171,951 UART: [idev] ++
1,172,119 UART: [idev] CDI.KEYID = 6
1,172,480 UART: [idev] SUBJECT.KEYID = 7
1,172,905 UART: [idev] UDS.KEYID = 0
1,180,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,942 UART: [ldev] ++
1,208,110 UART: [ldev] CDI.KEYID = 6
1,208,474 UART: [ldev] SUBJECT.KEYID = 5
1,208,901 UART: [ldev] AUTHORITY.KEYID = 7
1,209,364 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,668 UART: [ldev] --
1,279,988 UART: [fwproc] Wait for Commands...
1,280,699 UART: [fwproc] Recv command 0x46574c44
1,281,432 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,270 UART: ROM Fatal Error: 0x000B0034
1,330,427 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,714 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,181,830 UART: [idev] Erasing UDS.KEYID = 0
1,198,850 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,795 UART: [ldev] ++
1,208,963 UART: [ldev] CDI.KEYID = 6
1,209,327 UART: [ldev] SUBJECT.KEYID = 5
1,209,754 UART: [ldev] AUTHORITY.KEYID = 7
1,210,217 UART: [ldev] FE.KEYID = 1
1,215,261 UART: [ldev] Erasing FE.KEYID = 1
1,241,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,567 UART: [ldev] --
1,281,035 UART: [fwproc] Wait for Commands...
1,281,678 UART: [fwproc] Recv command 0x46574c44
1,282,411 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,731 UART: ROM Fatal Error: 0x000B0034
1,330,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,527 UART: [ldev] ++
1,209,695 UART: [ldev] CDI.KEYID = 6
1,210,059 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,216,127 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,150 UART: [fwproc] Recv command 0x46574c44
1,282,883 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,111 UART: ROM Fatal Error: 0x000B0034
1,331,268 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,669 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,246 writing to cptra_bootfsm_go
6,885 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
193,358 UART:
193,734 UART: Running Caliptra ROM ...
194,820 UART:
194,982 UART: [state] CFI Enabled
265,199 UART: [state] LifecycleState = Manufacturing
267,614 UART: [state] DebugLocked = No
269,887 UART: [state] WD Timer not started. Device not locked for debugging
274,783 UART: [kat] SHA2-256
456,724 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,228 UART: [kat] ++
468,723 UART: [kat] sha1
480,086 UART: [kat] SHA2-256
483,065 UART: [kat] SHA2-384
489,763 UART: [kat] SHA2-512-ACC
492,382 UART: [kat] ECC-384
3,777,374 UART: [kat] HMAC-384Kdf
3,803,881 UART: [kat] LMS
4,877,045 UART: [kat] --
4,882,274 UART: [cold-reset] ++
4,884,419 UART: [fht] FHT @ 0x50003400
4,895,785 UART: [idev] ++
4,896,471 UART: [idev] CDI.KEYID = 6
4,897,701 UART: [idev] SUBJECT.KEYID = 7
4,898,854 UART: [idev] UDS.KEYID = 0
4,931,840 UART: [idev] Erasing UDS.KEYID = 0
8,244,941 UART: [idev] Sha1 KeyId Algorithm
8,265,953 UART: [idev] --
8,270,482 UART: [ldev] ++
8,271,053 UART: [ldev] CDI.KEYID = 6
8,272,213 UART: [ldev] SUBJECT.KEYID = 5
8,273,425 UART: [ldev] AUTHORITY.KEYID = 7
8,274,576 UART: [ldev] FE.KEYID = 1
8,319,707 UART: [ldev] Erasing FE.KEYID = 1
11,655,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,441 UART: [ldev] --
14,039,167 UART: [fwproc] Wait for Commands...
14,041,541 UART: [fwproc] Recv command 0x46574c44
14,043,860 UART: [fwproc] Recv'd Img size: 113760 bytes
17,021,699 UART: ROM Fatal Error: 0x000B0025
17,025,098 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
5,540 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,809,238 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,230 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,393 UART:
192,909 UART: Running Caliptra ROM ...
194,005 UART:
603,565 UART: [state] CFI Enabled
617,087 UART: [state] LifecycleState = Manufacturing
619,478 UART: [state] DebugLocked = No
621,147 UART: [state] WD Timer not started. Device not locked for debugging
625,641 UART: [kat] SHA2-256
807,604 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,152 UART: [kat] ++
819,670 UART: [kat] sha1
830,921 UART: [kat] SHA2-256
833,984 UART: [kat] SHA2-384
839,581 UART: [kat] SHA2-512-ACC
842,183 UART: [kat] ECC-384
4,096,738 UART: [kat] HMAC-384Kdf
4,108,982 UART: [kat] LMS
5,182,090 UART: [kat] --
5,185,020 UART: [cold-reset] ++
5,186,375 UART: [fht] FHT @ 0x50003400
5,198,941 UART: [idev] ++
5,199,613 UART: [idev] CDI.KEYID = 6
5,200,842 UART: [idev] SUBJECT.KEYID = 7
5,202,269 UART: [idev] UDS.KEYID = 0
5,217,757 UART: [idev] Erasing UDS.KEYID = 0
8,492,600 UART: [idev] Sha1 KeyId Algorithm
8,513,620 UART: [idev] --
8,517,075 UART: [ldev] ++
8,517,642 UART: [ldev] CDI.KEYID = 6
8,518,871 UART: [ldev] SUBJECT.KEYID = 5
8,520,347 UART: [ldev] AUTHORITY.KEYID = 7
8,521,920 UART: [ldev] FE.KEYID = 1
8,532,777 UART: [ldev] Erasing FE.KEYID = 1
11,827,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,988 UART: [ldev] --
14,193,110 UART: [fwproc] Wait for Commands...
14,195,358 UART: [fwproc] Recv command 0x46574c44
14,197,663 UART: [fwproc] Recv'd Img size: 113760 bytes
17,177,742 UART: ROM Fatal Error: 0x000B0025
17,181,138 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
6,277 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,984,097 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
5,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,182 UART:
192,589 UART: Running Caliptra ROM ...
193,911 UART:
194,067 UART: [state] CFI Enabled
262,360 UART: [state] LifecycleState = Manufacturing
264,234 UART: [state] DebugLocked = No
265,718 UART: [state] WD Timer not started. Device not locked for debugging
269,453 UART: [kat] SHA2-256
448,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,184 UART: [kat] ++
460,709 UART: [kat] sha1
471,806 UART: [kat] SHA2-256
474,832 UART: [kat] SHA2-384
482,486 UART: [kat] SHA2-512-ACC
485,417 UART: [kat] ECC-384
2,950,827 UART: [kat] HMAC-384Kdf
2,972,779 UART: [kat] LMS
3,502,192 UART: [kat] --
3,506,143 UART: [cold-reset] ++
3,507,314 UART: [fht] FHT @ 0x50003400
3,518,435 UART: [idev] ++
3,519,000 UART: [idev] CDI.KEYID = 6
3,519,888 UART: [idev] SUBJECT.KEYID = 7
3,521,102 UART: [idev] UDS.KEYID = 0
3,544,816 UART: [idev] Erasing UDS.KEYID = 0
6,024,483 UART: [idev] Sha1 KeyId Algorithm
6,047,728 UART: [idev] --
6,052,081 UART: [ldev] ++
6,052,686 UART: [ldev] CDI.KEYID = 6
6,053,575 UART: [ldev] SUBJECT.KEYID = 5
6,054,740 UART: [ldev] AUTHORITY.KEYID = 7
6,055,978 UART: [ldev] FE.KEYID = 1
6,100,082 UART: [ldev] Erasing FE.KEYID = 1
8,606,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,663 UART: [ldev] --
10,413,529 UART: [fwproc] Wait for Commands...
10,416,221 UART: [fwproc] Recv command 0x46574c44
10,418,327 UART: [fwproc] Recv'd Img size: 114084 bytes
12,733,629 UART: ROM Fatal Error: 0x000B0025
12,736,765 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
5,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,525,040 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
6,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,363 UART:
192,744 UART: Running Caliptra ROM ...
193,919 UART:
603,468 UART: [state] CFI Enabled
616,946 UART: [state] LifecycleState = Manufacturing
618,820 UART: [state] DebugLocked = No
620,296 UART: [state] WD Timer not started. Device not locked for debugging
624,499 UART: [kat] SHA2-256
803,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,152 UART: [kat] ++
815,741 UART: [kat] sha1
826,345 UART: [kat] SHA2-256
829,345 UART: [kat] SHA2-384
835,713 UART: [kat] SHA2-512-ACC
838,641 UART: [kat] ECC-384
3,280,243 UART: [kat] HMAC-384Kdf
3,293,227 UART: [kat] LMS
3,822,685 UART: [kat] --
3,828,370 UART: [cold-reset] ++
3,829,276 UART: [fht] FHT @ 0x50003400
3,839,926 UART: [idev] ++
3,840,495 UART: [idev] CDI.KEYID = 6
3,841,429 UART: [idev] SUBJECT.KEYID = 7
3,842,638 UART: [idev] UDS.KEYID = 0
3,858,264 UART: [idev] Erasing UDS.KEYID = 0
6,317,911 UART: [idev] Sha1 KeyId Algorithm
6,342,376 UART: [idev] --
6,347,228 UART: [ldev] ++
6,347,795 UART: [ldev] CDI.KEYID = 6
6,348,727 UART: [ldev] SUBJECT.KEYID = 5
6,349,888 UART: [ldev] AUTHORITY.KEYID = 7
6,351,114 UART: [ldev] FE.KEYID = 1
6,360,028 UART: [ldev] Erasing FE.KEYID = 1
8,836,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,795 UART: [ldev] --
10,627,775 UART: [fwproc] Wait for Commands...
10,630,794 UART: [fwproc] Recv command 0x46574c44
10,632,890 UART: [fwproc] Recv'd Img size: 114084 bytes
12,957,175 UART: ROM Fatal Error: 0x000B0025
12,960,320 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,739,408 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
5,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,183 UART:
192,564 UART: Running Caliptra ROM ...
193,737 UART:
193,890 UART: [state] CFI Enabled
264,280 UART: [state] LifecycleState = Manufacturing
266,137 UART: [state] DebugLocked = No
267,299 UART: [state] WD Timer not started. Device not locked for debugging
271,633 UART: [kat] SHA2-256
450,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,351 UART: [kat] ++
462,887 UART: [kat] sha1
474,097 UART: [kat] SHA2-256
477,122 UART: [kat] SHA2-384
483,409 UART: [kat] SHA2-512-ACC
486,360 UART: [kat] ECC-384
2,948,765 UART: [kat] HMAC-384Kdf
2,971,588 UART: [kat] LMS
3,501,038 UART: [kat] --
3,506,454 UART: [cold-reset] ++
3,507,796 UART: [fht] FHT @ 0x50003400
3,518,995 UART: [idev] ++
3,519,600 UART: [idev] CDI.KEYID = 6
3,520,518 UART: [idev] SUBJECT.KEYID = 7
3,521,684 UART: [idev] UDS.KEYID = 0
3,543,762 UART: [idev] Erasing UDS.KEYID = 0
6,027,164 UART: [idev] Sha1 KeyId Algorithm
6,049,530 UART: [idev] --
6,052,989 UART: [ldev] ++
6,053,563 UART: [ldev] CDI.KEYID = 6
6,054,473 UART: [ldev] SUBJECT.KEYID = 5
6,055,636 UART: [ldev] AUTHORITY.KEYID = 7
6,056,923 UART: [ldev] FE.KEYID = 1
6,099,836 UART: [ldev] Erasing FE.KEYID = 1
8,601,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,160 UART: [ldev] --
10,389,781 UART: [fwproc] Wait for Commands...
10,392,365 UART: [fwproc] Recv command 0x46574c44
10,394,488 UART: [fwproc] Recv'd Img size: 114084 bytes
12,713,974 UART: ROM Fatal Error: 0x000B0025
12,717,075 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
5,344 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,505,152 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
6,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,523 UART:
192,905 UART: Running Caliptra ROM ...
194,085 UART:
603,761 UART: [state] CFI Enabled
621,257 UART: [state] LifecycleState = Manufacturing
623,171 UART: [state] DebugLocked = No
625,581 UART: [state] WD Timer not started. Device not locked for debugging
628,496 UART: [kat] SHA2-256
807,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,190 UART: [kat] ++
819,725 UART: [kat] sha1
831,845 UART: [kat] SHA2-256
834,863 UART: [kat] SHA2-384
841,490 UART: [kat] SHA2-512-ACC
844,417 UART: [kat] ECC-384
3,288,749 UART: [kat] HMAC-384Kdf
3,301,433 UART: [kat] LMS
3,830,915 UART: [kat] --
3,836,378 UART: [cold-reset] ++
3,838,640 UART: [fht] FHT @ 0x50003400
3,849,838 UART: [idev] ++
3,850,398 UART: [idev] CDI.KEYID = 6
3,851,280 UART: [idev] SUBJECT.KEYID = 7
3,852,489 UART: [idev] UDS.KEYID = 0
3,869,593 UART: [idev] Erasing UDS.KEYID = 0
6,328,264 UART: [idev] Sha1 KeyId Algorithm
6,351,002 UART: [idev] --
6,355,102 UART: [ldev] ++
6,355,664 UART: [ldev] CDI.KEYID = 6
6,356,569 UART: [ldev] SUBJECT.KEYID = 5
6,357,724 UART: [ldev] AUTHORITY.KEYID = 7
6,359,005 UART: [ldev] FE.KEYID = 1
6,368,224 UART: [ldev] Erasing FE.KEYID = 1
8,843,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,305 UART: [ldev] --
10,633,663 UART: [fwproc] Wait for Commands...
10,636,894 UART: [fwproc] Recv command 0x46574c44
10,638,992 UART: [fwproc] Recv'd Img size: 114084 bytes
12,958,807 UART: ROM Fatal Error: 0x000B0025
12,961,926 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,739,997 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Manufacturing
85,925 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,182,401 UART: [idev] Erasing UDS.KEYID = 0
1,199,663 UART: [idev] Sha1 KeyId Algorithm
1,208,443 UART: [idev] --
1,209,252 UART: [ldev] ++
1,209,420 UART: [ldev] CDI.KEYID = 6
1,209,784 UART: [ldev] SUBJECT.KEYID = 5
1,210,211 UART: [ldev] AUTHORITY.KEYID = 7
1,210,674 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 114084 bytes
1,573,791 UART: ROM Fatal Error: 0x000B0025
1,574,948 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,927 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Manufacturing
86,144 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,817 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,351 UART: [fwproc] Recv'd Img size: 114084 bytes
1,575,192 UART: ROM Fatal Error: 0x000B0025
1,576,349 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,425,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Manufacturing
86,115 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
891,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,787 UART: [kat] ++
895,939 UART: [kat] sha1
900,191 UART: [kat] SHA2-256
902,131 UART: [kat] SHA2-384
905,066 UART: [kat] SHA2-512-ACC
906,967 UART: [kat] ECC-384
916,714 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,409 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,281 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,822 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,164 UART: [ldev] --
1,281,622 UART: [fwproc] Wait for Commands...
1,282,277 UART: [fwproc] Recv command 0x46574c44
1,283,010 UART: [fwproc] Recv'd Img size: 114084 bytes
1,573,343 UART: ROM Fatal Error: 0x000B0025
1,574,500 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,527 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Manufacturing
86,062 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,576 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,955 UART: [ldev] ++
1,210,123 UART: [ldev] CDI.KEYID = 6
1,210,487 UART: [ldev] SUBJECT.KEYID = 5
1,210,914 UART: [ldev] AUTHORITY.KEYID = 7
1,211,377 UART: [ldev] FE.KEYID = 1
1,216,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 114084 bytes
1,574,426 UART: ROM Fatal Error: 0x000B0025
1,575,583 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,268 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Manufacturing
85,795 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,182,269 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,424 UART: [ldev] Erasing FE.KEYID = 1
1,242,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,250 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,239 UART: [fwproc] Recv command 0x46574c44
1,282,972 UART: [fwproc] Recv'd Img size: 114084 bytes
1,574,319 UART: ROM Fatal Error: 0x000B0025
1,575,476 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,426,601 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Manufacturing
85,756 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,761 UART: [kat] HMAC-384Kdf
920,289 UART: [kat] LMS
1,168,601 UART: [kat] --
1,169,500 UART: [cold-reset] ++
1,169,850 UART: [fht] FHT @ 0x50003400
1,172,486 UART: [idev] ++
1,172,654 UART: [idev] CDI.KEYID = 6
1,173,015 UART: [idev] SUBJECT.KEYID = 7
1,173,440 UART: [idev] UDS.KEYID = 0
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,198,382 UART: [idev] Sha1 KeyId Algorithm
1,207,070 UART: [idev] --
1,207,925 UART: [ldev] ++
1,208,093 UART: [ldev] CDI.KEYID = 6
1,208,457 UART: [ldev] SUBJECT.KEYID = 5
1,208,884 UART: [ldev] AUTHORITY.KEYID = 7
1,209,347 UART: [ldev] FE.KEYID = 1
1,214,659 UART: [ldev] Erasing FE.KEYID = 1
1,240,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,303 UART: [ldev] --
1,279,599 UART: [fwproc] Wait for Commands...
1,280,402 UART: [fwproc] Recv command 0x46574c44
1,281,135 UART: [fwproc] Recv'd Img size: 114084 bytes
1,571,380 UART: ROM Fatal Error: 0x000B0025
1,572,537 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,324 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,316 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,096 UART:
192,499 UART: Running Caliptra ROM ...
193,672 UART:
193,818 UART: [state] CFI Enabled
265,655 UART: [state] LifecycleState = Manufacturing
268,044 UART: [state] DebugLocked = No
269,907 UART: [state] WD Timer not started. Device not locked for debugging
274,487 UART: [kat] SHA2-256
456,437 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,934 UART: [kat] ++
468,528 UART: [kat] sha1
479,409 UART: [kat] SHA2-256
482,415 UART: [kat] SHA2-384
489,252 UART: [kat] SHA2-512-ACC
491,862 UART: [kat] ECC-384
3,778,037 UART: [kat] HMAC-384Kdf
3,802,273 UART: [kat] LMS
4,875,450 UART: [kat] --
4,879,198 UART: [cold-reset] ++
4,880,436 UART: [fht] FHT @ 0x50003400
4,891,199 UART: [idev] ++
4,891,903 UART: [idev] CDI.KEYID = 6
4,893,091 UART: [idev] SUBJECT.KEYID = 7
4,894,211 UART: [idev] UDS.KEYID = 0
4,930,258 UART: [idev] Erasing UDS.KEYID = 0
8,241,787 UART: [idev] Sha1 KeyId Algorithm
8,263,825 UART: [idev] --
8,266,307 UART: [ldev] ++
8,266,875 UART: [ldev] CDI.KEYID = 6
8,268,109 UART: [ldev] SUBJECT.KEYID = 5
8,269,266 UART: [ldev] AUTHORITY.KEYID = 7
8,270,495 UART: [ldev] FE.KEYID = 1
8,317,583 UART: [ldev] Erasing FE.KEYID = 1
11,651,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,925 UART: [ldev] --
14,037,996 UART: [fwproc] Wait for Commands...
14,041,133 UART: [fwproc] Recv command 0x46574c44
14,043,399 UART: [fwproc] Recv'd Img size: 113760 bytes
17,020,785 UART: ROM Fatal Error: 0x000B0027
17,024,182 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
5,378 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,802,237 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
5,959 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,457 UART:
192,855 UART: Running Caliptra ROM ...
194,025 UART:
603,679 UART: [state] CFI Enabled
618,242 UART: [state] LifecycleState = Manufacturing
620,616 UART: [state] DebugLocked = No
622,205 UART: [state] WD Timer not started. Device not locked for debugging
626,225 UART: [kat] SHA2-256
808,184 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,719 UART: [kat] ++
820,223 UART: [kat] sha1
831,902 UART: [kat] SHA2-256
834,962 UART: [kat] SHA2-384
840,623 UART: [kat] SHA2-512-ACC
843,272 UART: [kat] ECC-384
4,098,319 UART: [kat] HMAC-384Kdf
4,110,295 UART: [kat] LMS
5,183,456 UART: [kat] --
5,187,851 UART: [cold-reset] ++
5,190,001 UART: [fht] FHT @ 0x50003400
5,200,892 UART: [idev] ++
5,201,572 UART: [idev] CDI.KEYID = 6
5,202,804 UART: [idev] SUBJECT.KEYID = 7
5,204,232 UART: [idev] UDS.KEYID = 0
5,218,961 UART: [idev] Erasing UDS.KEYID = 0
8,491,909 UART: [idev] Sha1 KeyId Algorithm
8,515,467 UART: [idev] --
8,520,179 UART: [ldev] ++
8,520,786 UART: [ldev] CDI.KEYID = 6
8,521,973 UART: [ldev] SUBJECT.KEYID = 5
8,523,400 UART: [ldev] AUTHORITY.KEYID = 7
8,524,948 UART: [ldev] FE.KEYID = 1
8,533,912 UART: [ldev] Erasing FE.KEYID = 1
11,821,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,090 UART: [ldev] --
14,187,595 UART: [fwproc] Wait for Commands...
14,190,064 UART: [fwproc] Recv command 0x46574c44
14,192,367 UART: [fwproc] Recv'd Img size: 113760 bytes
17,169,794 UART: ROM Fatal Error: 0x000B0027
17,173,234 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
6,542 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,991,966 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
5,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,070 UART:
192,489 UART: Running Caliptra ROM ...
193,623 UART:
193,772 UART: [state] CFI Enabled
264,271 UART: [state] LifecycleState = Manufacturing
266,145 UART: [state] DebugLocked = No
267,479 UART: [state] WD Timer not started. Device not locked for debugging
270,824 UART: [kat] SHA2-256
449,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,535 UART: [kat] ++
462,079 UART: [kat] sha1
473,399 UART: [kat] SHA2-256
476,415 UART: [kat] SHA2-384
482,573 UART: [kat] SHA2-512-ACC
485,510 UART: [kat] ECC-384
2,928,559 UART: [kat] HMAC-384Kdf
2,950,656 UART: [kat] LMS
3,480,117 UART: [kat] --
3,486,173 UART: [cold-reset] ++
3,487,193 UART: [fht] FHT @ 0x50003400
3,497,851 UART: [idev] ++
3,498,424 UART: [idev] CDI.KEYID = 6
3,499,343 UART: [idev] SUBJECT.KEYID = 7
3,500,558 UART: [idev] UDS.KEYID = 0
3,524,094 UART: [idev] Erasing UDS.KEYID = 0
6,009,127 UART: [idev] Sha1 KeyId Algorithm
6,032,199 UART: [idev] --
6,034,884 UART: [ldev] ++
6,035,466 UART: [ldev] CDI.KEYID = 6
6,036,404 UART: [ldev] SUBJECT.KEYID = 5
6,037,575 UART: [ldev] AUTHORITY.KEYID = 7
6,038,812 UART: [ldev] FE.KEYID = 1
6,079,326 UART: [ldev] Erasing FE.KEYID = 1
8,580,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,172 UART: [ldev] --
10,393,548 UART: [fwproc] Wait for Commands...
10,396,193 UART: [fwproc] Recv command 0x46574c44
10,398,294 UART: [fwproc] Recv'd Img size: 114084 bytes
12,725,059 UART: ROM Fatal Error: 0x000B0027
12,728,137 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,545,074 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
6,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,503 UART:
193,058 UART: Running Caliptra ROM ...
194,189 UART:
603,553 UART: [state] CFI Enabled
615,296 UART: [state] LifecycleState = Manufacturing
617,139 UART: [state] DebugLocked = No
618,887 UART: [state] WD Timer not started. Device not locked for debugging
622,661 UART: [kat] SHA2-256
801,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,337 UART: [kat] ++
813,792 UART: [kat] sha1
824,450 UART: [kat] SHA2-256
827,505 UART: [kat] SHA2-384
832,826 UART: [kat] SHA2-512-ACC
835,781 UART: [kat] ECC-384
3,276,027 UART: [kat] HMAC-384Kdf
3,288,007 UART: [kat] LMS
3,817,497 UART: [kat] --
3,821,976 UART: [cold-reset] ++
3,822,938 UART: [fht] FHT @ 0x50003400
3,834,451 UART: [idev] ++
3,835,020 UART: [idev] CDI.KEYID = 6
3,835,986 UART: [idev] SUBJECT.KEYID = 7
3,837,143 UART: [idev] UDS.KEYID = 0
3,852,798 UART: [idev] Erasing UDS.KEYID = 0
6,314,529 UART: [idev] Sha1 KeyId Algorithm
6,338,016 UART: [idev] --
6,342,144 UART: [ldev] ++
6,342,714 UART: [ldev] CDI.KEYID = 6
6,343,623 UART: [ldev] SUBJECT.KEYID = 5
6,344,856 UART: [ldev] AUTHORITY.KEYID = 7
6,346,086 UART: [ldev] FE.KEYID = 1
6,355,817 UART: [ldev] Erasing FE.KEYID = 1
8,831,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,137 UART: [ldev] --
10,619,696 UART: [fwproc] Wait for Commands...
10,622,003 UART: [fwproc] Recv command 0x46574c44
10,624,044 UART: [fwproc] Recv'd Img size: 114084 bytes
12,940,855 UART: ROM Fatal Error: 0x000B0027
12,943,975 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
5,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,718,427 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,107 UART:
192,519 UART: Running Caliptra ROM ...
193,696 UART:
193,847 UART: [state] CFI Enabled
265,576 UART: [state] LifecycleState = Manufacturing
267,484 UART: [state] DebugLocked = No
270,158 UART: [state] WD Timer not started. Device not locked for debugging
274,810 UART: [kat] SHA2-256
453,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,509 UART: [kat] ++
466,063 UART: [kat] sha1
476,795 UART: [kat] SHA2-256
479,802 UART: [kat] SHA2-384
486,324 UART: [kat] SHA2-512-ACC
489,269 UART: [kat] ECC-384
2,946,680 UART: [kat] HMAC-384Kdf
2,973,534 UART: [kat] LMS
3,502,985 UART: [kat] --
3,508,496 UART: [cold-reset] ++
3,510,645 UART: [fht] FHT @ 0x50003400
3,520,759 UART: [idev] ++
3,521,328 UART: [idev] CDI.KEYID = 6
3,522,210 UART: [idev] SUBJECT.KEYID = 7
3,523,426 UART: [idev] UDS.KEYID = 0
3,544,484 UART: [idev] Erasing UDS.KEYID = 0
6,027,546 UART: [idev] Sha1 KeyId Algorithm
6,050,425 UART: [idev] --
6,055,829 UART: [ldev] ++
6,056,403 UART: [ldev] CDI.KEYID = 6
6,057,286 UART: [ldev] SUBJECT.KEYID = 5
6,058,506 UART: [ldev] AUTHORITY.KEYID = 7
6,059,758 UART: [ldev] FE.KEYID = 1
6,100,793 UART: [ldev] Erasing FE.KEYID = 1
8,602,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,603 UART: [ldev] --
10,411,566 UART: [fwproc] Wait for Commands...
10,413,190 UART: [fwproc] Recv command 0x46574c44
10,415,298 UART: [fwproc] Recv'd Img size: 114084 bytes
12,740,468 UART: ROM Fatal Error: 0x000B0027
12,743,595 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,461 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,506,080 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,451 UART:
192,854 UART: Running Caliptra ROM ...
194,146 UART:
603,752 UART: [state] CFI Enabled
618,269 UART: [state] LifecycleState = Manufacturing
620,166 UART: [state] DebugLocked = No
621,736 UART: [state] WD Timer not started. Device not locked for debugging
625,955 UART: [kat] SHA2-256
805,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,651 UART: [kat] ++
817,091 UART: [kat] sha1
828,081 UART: [kat] SHA2-256
831,070 UART: [kat] SHA2-384
837,754 UART: [kat] SHA2-512-ACC
840,736 UART: [kat] ECC-384
3,283,726 UART: [kat] HMAC-384Kdf
3,295,488 UART: [kat] LMS
3,824,964 UART: [kat] --
3,827,714 UART: [cold-reset] ++
3,829,126 UART: [fht] FHT @ 0x50003400
3,840,326 UART: [idev] ++
3,840,896 UART: [idev] CDI.KEYID = 6
3,841,773 UART: [idev] SUBJECT.KEYID = 7
3,842,982 UART: [idev] UDS.KEYID = 0
3,856,959 UART: [idev] Erasing UDS.KEYID = 0
6,314,645 UART: [idev] Sha1 KeyId Algorithm
6,337,670 UART: [idev] --
6,340,908 UART: [ldev] ++
6,341,513 UART: [ldev] CDI.KEYID = 6
6,342,426 UART: [ldev] SUBJECT.KEYID = 5
6,343,527 UART: [ldev] AUTHORITY.KEYID = 7
6,344,699 UART: [ldev] FE.KEYID = 1
6,354,914 UART: [ldev] Erasing FE.KEYID = 1
8,830,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,517 UART: [ldev] --
10,622,403 UART: [fwproc] Wait for Commands...
10,624,386 UART: [fwproc] Recv command 0x46574c44
10,626,479 UART: [fwproc] Recv'd Img size: 114084 bytes
12,945,364 UART: ROM Fatal Error: 0x000B0027
12,948,434 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
6,131 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,725,060 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Manufacturing
85,703 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,429 UART: [idev] ++
1,173,597 UART: [idev] CDI.KEYID = 6
1,173,958 UART: [idev] SUBJECT.KEYID = 7
1,174,383 UART: [idev] UDS.KEYID = 0
1,182,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,601 UART: [idev] --
1,209,724 UART: [ldev] ++
1,209,892 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,683 UART: [ldev] AUTHORITY.KEYID = 7
1,211,146 UART: [ldev] FE.KEYID = 1
1,216,458 UART: [ldev] Erasing FE.KEYID = 1
1,242,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,934 UART: [ldev] --
1,282,312 UART: [fwproc] Wait for Commands...
1,283,081 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 114084 bytes
1,575,083 UART: ROM Fatal Error: 0x000B0027
1,576,240 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,425,303 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Manufacturing
86,146 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,238 UART: [fht] FHT @ 0x50003400
1,174,104 UART: [idev] ++
1,174,272 UART: [idev] CDI.KEYID = 6
1,174,633 UART: [idev] SUBJECT.KEYID = 7
1,175,058 UART: [idev] UDS.KEYID = 0
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,974 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,169 UART: [ldev] --
1,282,677 UART: [fwproc] Wait for Commands...
1,283,418 UART: [fwproc] Recv command 0x46574c44
1,284,151 UART: [fwproc] Recv'd Img size: 114084 bytes
1,576,098 UART: ROM Fatal Error: 0x000B0027
1,577,255 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,792 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Manufacturing
85,613 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,393 UART: [idev] ++
1,173,561 UART: [idev] CDI.KEYID = 6
1,173,922 UART: [idev] SUBJECT.KEYID = 7
1,174,347 UART: [idev] UDS.KEYID = 0
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,033 UART: [idev] --
1,208,078 UART: [ldev] ++
1,208,246 UART: [ldev] CDI.KEYID = 6
1,208,610 UART: [ldev] SUBJECT.KEYID = 5
1,209,037 UART: [ldev] AUTHORITY.KEYID = 7
1,209,500 UART: [ldev] FE.KEYID = 1
1,214,748 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,618 UART: [ldev] --
1,280,012 UART: [fwproc] Wait for Commands...
1,280,799 UART: [fwproc] Recv command 0x46574c44
1,281,532 UART: [fwproc] Recv'd Img size: 114084 bytes
1,573,453 UART: ROM Fatal Error: 0x000B0027
1,574,610 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,426,449 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Manufacturing
85,888 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,818 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,501 UART: [ldev] Erasing FE.KEYID = 1
1,241,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,511 UART: [ldev] --
1,280,775 UART: [fwproc] Wait for Commands...
1,281,488 UART: [fwproc] Recv command 0x46574c44
1,282,221 UART: [fwproc] Recv'd Img size: 114084 bytes
1,573,316 UART: ROM Fatal Error: 0x000B0027
1,574,473 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,616 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Manufacturing
85,825 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
915,546 UART: [kat] HMAC-384Kdf
920,056 UART: [kat] LMS
1,168,368 UART: [kat] --
1,169,093 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,153 UART: [idev] ++
1,172,321 UART: [idev] CDI.KEYID = 6
1,172,682 UART: [idev] SUBJECT.KEYID = 7
1,173,107 UART: [idev] UDS.KEYID = 0
1,180,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,207,950 UART: [ldev] ++
1,208,118 UART: [ldev] CDI.KEYID = 6
1,208,482 UART: [ldev] SUBJECT.KEYID = 5
1,208,909 UART: [ldev] AUTHORITY.KEYID = 7
1,209,372 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,154 UART: [ldev] --
1,279,672 UART: [fwproc] Wait for Commands...
1,280,447 UART: [fwproc] Recv command 0x46574c44
1,281,180 UART: [fwproc] Recv'd Img size: 114084 bytes
1,573,047 UART: ROM Fatal Error: 0x000B0027
1,574,204 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,933 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Manufacturing
85,928 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,632 UART: [idev] ++
1,172,800 UART: [idev] CDI.KEYID = 6
1,173,161 UART: [idev] SUBJECT.KEYID = 7
1,173,586 UART: [idev] UDS.KEYID = 0
1,181,822 UART: [idev] Erasing UDS.KEYID = 0
1,198,922 UART: [idev] Sha1 KeyId Algorithm
1,207,820 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,491 UART: [ldev] Erasing FE.KEYID = 1
1,241,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,491 UART: [ldev] --
1,280,851 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 114084 bytes
1,572,870 UART: ROM Fatal Error: 0x000B0027
1,574,027 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,429,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,021,794 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,560 UART:
2,165,977 UART: Running Caliptra ROM ...
2,167,149 UART:
2,167,320 UART: [state] CFI Enabled
2,168,279 UART: [state] LifecycleState = Unprovisioned
2,169,916 UART: [state] DebugLocked = No
2,170,990 UART: [state] WD Timer not started. Device not locked for debugging
2,173,477 UART: [kat] SHA2-256
2,174,168 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,184 UART: [kat] ++
2,177,635 UART: [kat] sha1
2,178,147 UART: [kat] SHA2-256
2,178,889 UART: [kat] SHA2-384
2,179,554 UART: [kat] SHA2-512-ACC
2,180,384 UART: [kat] ECC-384
3,776,618 UART: [kat] HMAC-384Kdf
3,802,497 UART: [kat] LMS
4,875,696 UART: [kat] --
4,880,050 UART: [cold-reset] ++
4,881,730 UART: [fht] FHT @ 0x50003400
4,892,494 UART: [idev] ++
4,893,166 UART: [idev] CDI.KEYID = 6
4,894,400 UART: [idev] SUBJECT.KEYID = 7
4,895,554 UART: [idev] UDS.KEYID = 0
4,929,697 UART: [idev] Erasing UDS.KEYID = 0
8,241,764 UART: [idev] Sha1 KeyId Algorithm
8,264,463 UART: [idev] --
8,268,891 UART: [ldev] ++
8,269,461 UART: [ldev] CDI.KEYID = 6
8,270,699 UART: [ldev] SUBJECT.KEYID = 5
8,271,754 UART: [ldev] AUTHORITY.KEYID = 7
8,273,039 UART: [ldev] FE.KEYID = 1
8,317,129 UART: [ldev] Erasing FE.KEYID = 1
11,653,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,958 UART: [ldev] --
14,038,403 UART: [fwproc] Wait for Commands...
14,040,619 UART: [fwproc] Recv command 0x46574c44
14,042,903 UART: [fwproc] Recv'd Img size: 113760 bytes
15,436,902 UART: ROM Fatal Error: 0x000B000D
15,440,314 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,021,289 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,214,714 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,022,461 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,244 UART:
2,166,634 UART: Running Caliptra ROM ...
2,167,718 UART:
2,167,862 UART: [state] CFI Enabled
2,168,826 UART: [state] LifecycleState = Unprovisioned
2,170,477 UART: [state] DebugLocked = No
2,171,492 UART: [state] WD Timer not started. Device not locked for debugging
2,173,963 UART: [kat] SHA2-256
2,174,643 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,652 UART: [kat] ++
2,178,096 UART: [kat] sha1
2,178,599 UART: [kat] SHA2-256
2,179,249 UART: [kat] SHA2-384
2,179,901 UART: [kat] SHA2-512-ACC
2,180,775 UART: [kat] ECC-384
4,094,519 UART: [kat] HMAC-384Kdf
4,106,321 UART: [kat] LMS
5,179,472 UART: [kat] --
5,183,983 UART: [cold-reset] ++
5,185,916 UART: [fht] FHT @ 0x50003400
5,197,222 UART: [idev] ++
5,197,889 UART: [idev] CDI.KEYID = 6
5,199,114 UART: [idev] SUBJECT.KEYID = 7
5,200,544 UART: [idev] UDS.KEYID = 0
5,218,901 UART: [idev] Erasing UDS.KEYID = 0
8,489,468 UART: [idev] Sha1 KeyId Algorithm
8,511,943 UART: [idev] --
8,515,397 UART: [ldev] ++
8,515,968 UART: [ldev] CDI.KEYID = 6
8,517,073 UART: [ldev] SUBJECT.KEYID = 5
8,518,619 UART: [ldev] AUTHORITY.KEYID = 7
8,520,104 UART: [ldev] FE.KEYID = 1
8,530,697 UART: [ldev] Erasing FE.KEYID = 1
11,824,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,662 UART: [ldev] --
14,192,135 UART: [fwproc] Wait for Commands...
14,193,647 UART: [fwproc] Recv command 0x46574c44
14,195,602 UART: [fwproc] Recv'd Img size: 113760 bytes
15,593,490 UART: ROM Fatal Error: 0x000B000D
15,596,933 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
2,022,666 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,409,000 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,023,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,191 UART:
2,167,585 UART: Running Caliptra ROM ...
2,168,757 UART:
2,168,922 UART: [state] CFI Enabled
2,169,890 UART: [state] LifecycleState = Unprovisioned
2,171,531 UART: [state] DebugLocked = No
2,172,640 UART: [state] WD Timer not started. Device not locked for debugging
2,175,128 UART: [kat] SHA2-256
2,175,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,808 UART: [kat] ++
2,179,262 UART: [kat] sha1
2,179,775 UART: [kat] SHA2-256
2,180,515 UART: [kat] SHA2-384
2,181,180 UART: [kat] SHA2-512-ACC
2,182,013 UART: [kat] ECC-384
2,946,046 UART: [kat] HMAC-384Kdf
2,971,556 UART: [kat] LMS
3,501,019 UART: [kat] --
3,505,292 UART: [cold-reset] ++
3,506,195 UART: [fht] FHT @ 0x50003400
3,517,362 UART: [idev] ++
3,517,961 UART: [idev] CDI.KEYID = 6
3,518,848 UART: [idev] SUBJECT.KEYID = 7
3,520,086 UART: [idev] UDS.KEYID = 0
3,543,745 UART: [idev] Erasing UDS.KEYID = 0
6,026,239 UART: [idev] Sha1 KeyId Algorithm
6,049,800 UART: [idev] --
6,054,172 UART: [ldev] ++
6,054,744 UART: [ldev] CDI.KEYID = 6
6,055,650 UART: [ldev] SUBJECT.KEYID = 5
6,056,812 UART: [ldev] AUTHORITY.KEYID = 7
6,058,043 UART: [ldev] FE.KEYID = 1
6,099,157 UART: [ldev] Erasing FE.KEYID = 1
8,600,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,301 UART: [ldev] --
10,390,373 UART: [fwproc] Wait for Commands...
10,392,458 UART: [fwproc] Recv command 0x46574c44
10,394,574 UART: [fwproc] Recv'd Img size: 114084 bytes
11,456,909 UART: ROM Fatal Error: 0x000B000D
11,460,032 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,024,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,287,494 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,022,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,847 UART:
2,167,244 UART: Running Caliptra ROM ...
2,168,330 UART:
2,168,484 UART: [state] CFI Enabled
2,169,461 UART: [state] LifecycleState = Unprovisioned
2,171,126 UART: [state] DebugLocked = No
2,172,233 UART: [state] WD Timer not started. Device not locked for debugging
2,174,698 UART: [kat] SHA2-256
2,175,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,376 UART: [kat] ++
2,178,822 UART: [kat] sha1
2,179,369 UART: [kat] SHA2-256
2,180,027 UART: [kat] SHA2-384
2,180,728 UART: [kat] SHA2-512-ACC
2,181,531 UART: [kat] ECC-384
3,280,925 UART: [kat] HMAC-384Kdf
3,293,225 UART: [kat] LMS
3,822,703 UART: [kat] --
3,828,479 UART: [cold-reset] ++
3,830,835 UART: [fht] FHT @ 0x50003400
3,842,458 UART: [idev] ++
3,843,046 UART: [idev] CDI.KEYID = 6
3,843,959 UART: [idev] SUBJECT.KEYID = 7
3,845,174 UART: [idev] UDS.KEYID = 0
3,862,209 UART: [idev] Erasing UDS.KEYID = 0
6,317,993 UART: [idev] Sha1 KeyId Algorithm
6,340,435 UART: [idev] --
6,345,594 UART: [ldev] ++
6,346,163 UART: [ldev] CDI.KEYID = 6
6,347,072 UART: [ldev] SUBJECT.KEYID = 5
6,348,230 UART: [ldev] AUTHORITY.KEYID = 7
6,349,512 UART: [ldev] FE.KEYID = 1
6,360,425 UART: [ldev] Erasing FE.KEYID = 1
8,838,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,793 UART: [ldev] --
10,630,918 UART: [fwproc] Wait for Commands...
10,634,089 UART: [fwproc] Recv command 0x46574c44
10,636,180 UART: [fwproc] Recv'd Img size: 114084 bytes
11,702,562 UART: ROM Fatal Error: 0x000B000D
11,705,633 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
2,021,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,478,117 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,026,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,170,848 UART:
2,171,247 UART: Running Caliptra ROM ...
2,172,361 UART:
2,172,523 UART: [state] CFI Enabled
2,173,500 UART: [state] LifecycleState = Unprovisioned
2,175,062 UART: [state] DebugLocked = No
2,176,133 UART: [state] WD Timer not started. Device not locked for debugging
2,178,611 UART: [kat] SHA2-256
2,179,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,286 UART: [kat] ++
2,182,741 UART: [kat] sha1
2,183,276 UART: [kat] SHA2-256
2,183,939 UART: [kat] SHA2-384
2,184,622 UART: [kat] SHA2-512-ACC
2,185,519 UART: [kat] ECC-384
2,946,562 UART: [kat] HMAC-384Kdf
2,971,907 UART: [kat] LMS
3,501,350 UART: [kat] --
3,505,020 UART: [cold-reset] ++
3,506,682 UART: [fht] FHT @ 0x50003400
3,518,149 UART: [idev] ++
3,518,710 UART: [idev] CDI.KEYID = 6
3,519,592 UART: [idev] SUBJECT.KEYID = 7
3,520,748 UART: [idev] UDS.KEYID = 0
3,542,400 UART: [idev] Erasing UDS.KEYID = 0
6,026,157 UART: [idev] Sha1 KeyId Algorithm
6,048,688 UART: [idev] --
6,051,198 UART: [ldev] ++
6,051,774 UART: [ldev] CDI.KEYID = 6
6,052,659 UART: [ldev] SUBJECT.KEYID = 5
6,053,797 UART: [ldev] AUTHORITY.KEYID = 7
6,055,142 UART: [ldev] FE.KEYID = 1
6,099,417 UART: [ldev] Erasing FE.KEYID = 1
8,599,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,202 UART: [ldev] --
10,389,720 UART: [fwproc] Wait for Commands...
10,392,414 UART: [fwproc] Recv command 0x46574c44
10,394,464 UART: [fwproc] Recv'd Img size: 114084 bytes
11,459,261 UART: ROM Fatal Error: 0x000B000D
11,462,383 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,030,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,287,531 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
2,022,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,932 UART:
2,167,323 UART: Running Caliptra ROM ...
2,168,491 UART:
2,168,659 UART: [state] CFI Enabled
2,169,655 UART: [state] LifecycleState = Unprovisioned
2,171,298 UART: [state] DebugLocked = No
2,172,400 UART: [state] WD Timer not started. Device not locked for debugging
2,174,873 UART: [kat] SHA2-256
2,175,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,539 UART: [kat] ++
2,179,034 UART: [kat] sha1
2,179,550 UART: [kat] SHA2-256
2,180,286 UART: [kat] SHA2-384
2,180,949 UART: [kat] SHA2-512-ACC
2,181,826 UART: [kat] ECC-384
3,285,164 UART: [kat] HMAC-384Kdf
3,298,193 UART: [kat] LMS
3,827,732 UART: [kat] --
3,831,581 UART: [cold-reset] ++
3,833,508 UART: [fht] FHT @ 0x50003400
3,844,895 UART: [idev] ++
3,845,503 UART: [idev] CDI.KEYID = 6
3,846,386 UART: [idev] SUBJECT.KEYID = 7
3,847,433 UART: [idev] UDS.KEYID = 0
3,865,350 UART: [idev] Erasing UDS.KEYID = 0
6,322,410 UART: [idev] Sha1 KeyId Algorithm
6,346,275 UART: [idev] --
6,349,376 UART: [ldev] ++
6,349,951 UART: [ldev] CDI.KEYID = 6
6,350,828 UART: [ldev] SUBJECT.KEYID = 5
6,352,044 UART: [ldev] AUTHORITY.KEYID = 7
6,353,275 UART: [ldev] FE.KEYID = 1
6,362,654 UART: [ldev] Erasing FE.KEYID = 1
8,838,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,860 UART: [ldev] --
10,633,283 UART: [fwproc] Wait for Commands...
10,635,320 UART: [fwproc] Recv command 0x46574c44
10,637,418 UART: [fwproc] Recv'd Img size: 114084 bytes
11,703,787 UART: ROM Fatal Error: 0x000B000D
11,706,892 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,021,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,472,537 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,188 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114084 bytes
1,320,989 UART: ROM Fatal Error: 0x000B000D
1,322,148 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,929 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
917,143 UART: [kat] HMAC-384Kdf
921,563 UART: [kat] LMS
1,169,875 UART: [kat] --
1,170,846 UART: [cold-reset] ++
1,171,394 UART: [fht] FHT @ 0x50003400
1,174,190 UART: [idev] ++
1,174,358 UART: [idev] CDI.KEYID = 6
1,174,719 UART: [idev] SUBJECT.KEYID = 7
1,175,144 UART: [idev] UDS.KEYID = 0
1,183,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,935 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114084 bytes
1,320,932 UART: ROM Fatal Error: 0x000B000D
1,322,091 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,840 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,003 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,929 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,816 UART: [ldev] ++
1,208,984 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,775 UART: [ldev] AUTHORITY.KEYID = 7
1,210,238 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,241,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,511 UART: [fwproc] Recv command 0x46574c44
1,282,244 UART: [fwproc] Recv'd Img size: 114084 bytes
1,320,435 UART: ROM Fatal Error: 0x000B000D
1,321,594 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,615 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,271 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,779 UART: [fwproc] Recv'd Img size: 114084 bytes
1,322,150 UART: ROM Fatal Error: 0x000B000D
1,323,309 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,176,190 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,240,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,790 UART: [ldev] --
1,280,182 UART: [fwproc] Wait for Commands...
1,280,815 UART: [fwproc] Recv command 0x46574c44
1,281,548 UART: [fwproc] Recv'd Img size: 114084 bytes
1,319,747 UART: ROM Fatal Error: 0x000B000D
1,320,906 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,583 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
917,157 UART: [kat] HMAC-384Kdf
921,691 UART: [kat] LMS
1,170,003 UART: [kat] --
1,170,756 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,473 UART: [idev] SUBJECT.KEYID = 7
1,174,898 UART: [idev] UDS.KEYID = 0
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,327 UART: [fwproc] Wait for Commands...
1,281,946 UART: [fwproc] Recv command 0x46574c44
1,282,679 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,466 UART: ROM Fatal Error: 0x000B000D
1,322,625 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,174,022 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,022,976 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,167,046 UART:
2,167,472 UART: Running Caliptra ROM ...
2,168,643 UART:
2,168,831 UART: [state] CFI Enabled
2,169,795 UART: [state] LifecycleState = Unprovisioned
2,171,437 UART: [state] DebugLocked = No
2,172,509 UART: [state] WD Timer not started. Device not locked for debugging
2,174,987 UART: [kat] SHA2-256
2,175,653 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,662 UART: [kat] ++
2,179,112 UART: [kat] sha1
2,179,649 UART: [kat] SHA2-256
2,180,306 UART: [kat] SHA2-384
2,180,961 UART: [kat] SHA2-512-ACC
2,181,781 UART: [kat] ECC-384
3,774,774 UART: [kat] HMAC-384Kdf
3,803,162 UART: [kat] LMS
4,876,314 UART: [kat] --
4,881,140 UART: [cold-reset] ++
4,882,484 UART: [fht] FHT @ 0x50003400
4,893,790 UART: [idev] ++
4,894,469 UART: [idev] CDI.KEYID = 6
4,895,570 UART: [idev] SUBJECT.KEYID = 7
4,896,783 UART: [idev] UDS.KEYID = 0
4,931,413 UART: [idev] Erasing UDS.KEYID = 0
8,242,219 UART: [idev] Sha1 KeyId Algorithm
8,263,125 UART: [idev] --
8,267,174 UART: [ldev] ++
8,267,736 UART: [ldev] CDI.KEYID = 6
8,268,891 UART: [ldev] SUBJECT.KEYID = 5
8,270,102 UART: [ldev] AUTHORITY.KEYID = 7
8,271,250 UART: [ldev] FE.KEYID = 1
8,296,340 UART: [ldev] Erasing FE.KEYID = 1
11,629,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,018 UART: [ldev] --
14,019,337 UART: [fwproc] Wait for Commands...
14,021,380 UART: [fwproc] Recv command 0x46574c44
14,023,643 UART: [fwproc] Recv'd Img size: 113760 bytes
18,096,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,172,348 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,241,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,557,026 >>> mbox cmd response: success
18,560,260 UART: [afmc] ++
18,561,017 UART: [afmc] CDI.KEYID = 6
18,561,930 UART: [afmc] SUBJECT.KEYID = 7
18,563,107 UART: [afmc] AUTHORITY.KEYID = 5
21,925,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,006 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,245,159 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,261,236 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,277,191 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,300,687 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,022,196 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,368,908 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,024,197 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,168,212 UART:
2,168,598 UART: Running Caliptra ROM ...
2,169,774 UART:
2,169,946 UART: [state] CFI Enabled
2,170,902 UART: [state] LifecycleState = Unprovisioned
2,172,536 UART: [state] DebugLocked = No
2,173,634 UART: [state] WD Timer not started. Device not locked for debugging
2,176,123 UART: [kat] SHA2-256
2,176,784 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,789 UART: [kat] ++
2,180,232 UART: [kat] sha1
2,180,741 UART: [kat] SHA2-256
2,181,471 UART: [kat] SHA2-384
2,182,130 UART: [kat] SHA2-512-ACC
2,182,958 UART: [kat] ECC-384
4,096,387 UART: [kat] HMAC-384Kdf
4,108,687 UART: [kat] LMS
5,181,831 UART: [kat] --
5,186,914 UART: [cold-reset] ++
5,189,654 UART: [fht] FHT @ 0x50003400
5,201,324 UART: [idev] ++
5,202,039 UART: [idev] CDI.KEYID = 6
5,203,143 UART: [idev] SUBJECT.KEYID = 7
5,204,695 UART: [idev] UDS.KEYID = 0
5,224,205 UART: [idev] Erasing UDS.KEYID = 0
8,497,945 UART: [idev] Sha1 KeyId Algorithm
8,520,147 UART: [idev] --
8,524,842 UART: [ldev] ++
8,525,405 UART: [ldev] CDI.KEYID = 6
8,526,635 UART: [ldev] SUBJECT.KEYID = 5
8,528,069 UART: [ldev] AUTHORITY.KEYID = 7
8,529,627 UART: [ldev] FE.KEYID = 1
8,541,565 UART: [ldev] Erasing FE.KEYID = 1
11,832,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,922 UART: [ldev] --
14,196,878 UART: [fwproc] Wait for Commands...
14,199,407 UART: [fwproc] Recv command 0x46574c44
14,201,707 UART: [fwproc] Recv'd Img size: 113760 bytes
18,263,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,337,030 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,405,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,721,289 >>> mbox cmd response: success
18,725,389 UART: [afmc] ++
18,725,973 UART: [afmc] CDI.KEYID = 6
18,727,155 UART: [afmc] SUBJECT.KEYID = 7
18,728,304 UART: [afmc] AUTHORITY.KEYID = 5
22,043,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,339,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,342,172 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,358,338 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,374,386 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,390,392 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,412,991 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,024,645 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,532,313 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,022,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,701 UART:
2,167,108 UART: Running Caliptra ROM ...
2,168,274 UART:
2,168,437 UART: [state] CFI Enabled
2,169,413 UART: [state] LifecycleState = Unprovisioned
2,171,053 UART: [state] DebugLocked = No
2,172,163 UART: [state] WD Timer not started. Device not locked for debugging
2,174,632 UART: [kat] SHA2-256
2,175,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,310 UART: [kat] ++
2,178,758 UART: [kat] sha1
2,179,269 UART: [kat] SHA2-256
2,180,029 UART: [kat] SHA2-384
2,180,698 UART: [kat] SHA2-512-ACC
2,181,526 UART: [kat] ECC-384
2,947,923 UART: [kat] HMAC-384Kdf
2,972,404 UART: [kat] LMS
3,501,821 UART: [kat] --
3,507,432 UART: [cold-reset] ++
3,508,337 UART: [fht] FHT @ 0x50003400
3,519,207 UART: [idev] ++
3,519,779 UART: [idev] CDI.KEYID = 6
3,520,684 UART: [idev] SUBJECT.KEYID = 7
3,521,897 UART: [idev] UDS.KEYID = 0
3,543,813 UART: [idev] Erasing UDS.KEYID = 0
6,023,945 UART: [idev] Sha1 KeyId Algorithm
6,046,252 UART: [idev] --
6,050,926 UART: [ldev] ++
6,051,535 UART: [ldev] CDI.KEYID = 6
6,052,503 UART: [ldev] SUBJECT.KEYID = 5
6,053,612 UART: [ldev] AUTHORITY.KEYID = 7
6,054,847 UART: [ldev] FE.KEYID = 1
6,100,006 UART: [ldev] Erasing FE.KEYID = 1
8,599,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,535 UART: [ldev] --
10,391,048 UART: [fwproc] Wait for Commands...
10,393,806 UART: [fwproc] Recv command 0x46574c44
10,395,901 UART: [fwproc] Recv'd Img size: 114084 bytes
13,795,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,934,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,251,707 >>> mbox cmd response: success
14,256,037 UART: [afmc] ++
14,256,627 UART: [afmc] CDI.KEYID = 6
14,257,512 UART: [afmc] SUBJECT.KEYID = 7
14,258,725 UART: [afmc] AUTHORITY.KEYID = 5
16,789,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,669 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,689 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,546 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,579 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,023,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,074,006 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,023,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,901 UART:
2,168,288 UART: Running Caliptra ROM ...
2,169,477 UART:
2,169,648 UART: [state] CFI Enabled
2,170,629 UART: [state] LifecycleState = Unprovisioned
2,172,276 UART: [state] DebugLocked = No
2,173,380 UART: [state] WD Timer not started. Device not locked for debugging
2,176,095 UART: [kat] SHA2-256
2,176,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,802 UART: [kat] ++
2,180,255 UART: [kat] sha1
2,181,004 UART: [kat] SHA2-256
2,181,683 UART: [kat] SHA2-384
2,182,390 UART: [kat] SHA2-512-ACC
2,183,199 UART: [kat] ECC-384
3,279,492 UART: [kat] HMAC-384Kdf
3,293,385 UART: [kat] LMS
3,822,906 UART: [kat] --
3,828,140 UART: [cold-reset] ++
3,829,042 UART: [fht] FHT @ 0x50003400
3,840,051 UART: [idev] ++
3,840,608 UART: [idev] CDI.KEYID = 6
3,841,485 UART: [idev] SUBJECT.KEYID = 7
3,842,694 UART: [idev] UDS.KEYID = 0
3,859,108 UART: [idev] Erasing UDS.KEYID = 0
6,319,648 UART: [idev] Sha1 KeyId Algorithm
6,342,816 UART: [idev] --
6,348,193 UART: [ldev] ++
6,348,773 UART: [ldev] CDI.KEYID = 6
6,349,704 UART: [ldev] SUBJECT.KEYID = 5
6,350,862 UART: [ldev] AUTHORITY.KEYID = 7
6,352,089 UART: [ldev] FE.KEYID = 1
6,364,155 UART: [ldev] Erasing FE.KEYID = 1
8,839,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,330 UART: [ldev] --
10,631,108 UART: [fwproc] Wait for Commands...
10,633,203 UART: [fwproc] Recv command 0x46574c44
10,635,238 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,494,614 >>> mbox cmd response: success
14,498,422 UART: [afmc] ++
14,499,005 UART: [afmc] CDI.KEYID = 6
14,499,920 UART: [afmc] SUBJECT.KEYID = 7
14,501,132 UART: [afmc] AUTHORITY.KEYID = 5
17,001,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,456 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,958 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,022,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,271,747 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,027,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,171,268 UART:
2,171,686 UART: Running Caliptra ROM ...
2,172,777 UART:
2,172,938 UART: [state] CFI Enabled
2,173,925 UART: [state] LifecycleState = Unprovisioned
2,175,487 UART: [state] DebugLocked = No
2,176,597 UART: [state] WD Timer not started. Device not locked for debugging
2,179,084 UART: [kat] SHA2-256
2,179,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,760 UART: [kat] ++
2,183,208 UART: [kat] sha1
2,183,722 UART: [kat] SHA2-256
2,184,378 UART: [kat] SHA2-384
2,185,035 UART: [kat] SHA2-512-ACC
2,185,928 UART: [kat] ECC-384
2,947,620 UART: [kat] HMAC-384Kdf
2,971,033 UART: [kat] LMS
3,500,448 UART: [kat] --
3,505,091 UART: [cold-reset] ++
3,506,810 UART: [fht] FHT @ 0x50003400
3,518,553 UART: [idev] ++
3,519,119 UART: [idev] CDI.KEYID = 6
3,520,046 UART: [idev] SUBJECT.KEYID = 7
3,521,282 UART: [idev] UDS.KEYID = 0
3,543,851 UART: [idev] Erasing UDS.KEYID = 0
6,024,461 UART: [idev] Sha1 KeyId Algorithm
6,047,568 UART: [idev] --
6,051,572 UART: [ldev] ++
6,052,144 UART: [ldev] CDI.KEYID = 6
6,053,058 UART: [ldev] SUBJECT.KEYID = 5
6,054,233 UART: [ldev] AUTHORITY.KEYID = 7
6,055,526 UART: [ldev] FE.KEYID = 1
6,098,262 UART: [ldev] Erasing FE.KEYID = 1
8,603,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,154 UART: [ldev] --
10,413,209 UART: [fwproc] Wait for Commands...
10,415,565 UART: [fwproc] Recv command 0x46574c44
10,417,667 UART: [fwproc] Recv'd Img size: 114084 bytes
13,821,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,195 >>> mbox cmd response: success
14,285,111 UART: [afmc] ++
14,285,710 UART: [afmc] CDI.KEYID = 6
14,286,623 UART: [afmc] SUBJECT.KEYID = 7
14,287,786 UART: [afmc] AUTHORITY.KEYID = 5
16,827,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,848 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,538 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,038,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,086,568 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,023,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,389 UART:
2,167,779 UART: Running Caliptra ROM ...
2,168,949 UART:
2,169,120 UART: [state] CFI Enabled
2,170,045 UART: [state] LifecycleState = Unprovisioned
2,171,728 UART: [state] DebugLocked = No
2,172,762 UART: [state] WD Timer not started. Device not locked for debugging
2,175,233 UART: [kat] SHA2-256
2,175,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,918 UART: [kat] ++
2,179,369 UART: [kat] sha1
2,179,900 UART: [kat] SHA2-256
2,180,586 UART: [kat] SHA2-384
2,181,266 UART: [kat] SHA2-512-ACC
2,182,208 UART: [kat] ECC-384
3,277,944 UART: [kat] HMAC-384Kdf
3,291,859 UART: [kat] LMS
3,821,371 UART: [kat] --
3,825,685 UART: [cold-reset] ++
3,826,640 UART: [fht] FHT @ 0x50003400
3,836,707 UART: [idev] ++
3,837,270 UART: [idev] CDI.KEYID = 6
3,838,233 UART: [idev] SUBJECT.KEYID = 7
3,839,389 UART: [idev] UDS.KEYID = 0
3,853,523 UART: [idev] Erasing UDS.KEYID = 0
6,313,405 UART: [idev] Sha1 KeyId Algorithm
6,337,712 UART: [idev] --
6,340,781 UART: [ldev] ++
6,341,345 UART: [ldev] CDI.KEYID = 6
6,342,246 UART: [ldev] SUBJECT.KEYID = 5
6,343,347 UART: [ldev] AUTHORITY.KEYID = 7
6,344,690 UART: [ldev] FE.KEYID = 1
6,355,582 UART: [ldev] Erasing FE.KEYID = 1
8,827,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,720 UART: [ldev] --
10,614,638 UART: [fwproc] Wait for Commands...
10,617,758 UART: [fwproc] Recv command 0x46574c44
10,619,852 UART: [fwproc] Recv'd Img size: 114084 bytes
14,010,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,153,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,471,858 >>> mbox cmd response: success
14,475,265 UART: [afmc] ++
14,475,842 UART: [afmc] CDI.KEYID = 6
14,476,751 UART: [afmc] SUBJECT.KEYID = 7
14,477,904 UART: [afmc] AUTHORITY.KEYID = 5
16,980,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,719,353 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,735,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,773,705 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,023,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,274,024 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,090 UART: [kat] LMS
1,168,402 UART: [kat] --
1,169,421 UART: [cold-reset] ++
1,169,761 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,181,213 UART: [idev] Erasing UDS.KEYID = 0
1,197,657 UART: [idev] Sha1 KeyId Algorithm
1,206,565 UART: [idev] --
1,207,560 UART: [ldev] ++
1,207,728 UART: [ldev] CDI.KEYID = 6
1,208,092 UART: [ldev] SUBJECT.KEYID = 5
1,208,519 UART: [ldev] AUTHORITY.KEYID = 7
1,208,982 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,240,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,570 UART: [ldev] --
1,279,978 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,335 >>> mbox cmd response: success
2,769,542 UART: [afmc] ++
2,769,710 UART: [afmc] CDI.KEYID = 6
2,770,073 UART: [afmc] SUBJECT.KEYID = 7
2,770,499 UART: [afmc] AUTHORITY.KEYID = 5
2,806,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,065 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,784 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,411 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,993 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,182,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,868 UART: [idev] Sha1 KeyId Algorithm
1,208,850 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,825 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,376 >>> mbox cmd response: success
2,771,473 UART: [afmc] ++
2,771,641 UART: [afmc] CDI.KEYID = 6
2,772,004 UART: [afmc] SUBJECT.KEYID = 7
2,772,430 UART: [afmc] AUTHORITY.KEYID = 5
2,808,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,487 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,370 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,914 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,924 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
85,987 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,023 UART: [kat] ++
895,175 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
903,934 UART: [kat] SHA2-512-ACC
905,835 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,037 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,796 UART: [ldev] --
1,281,220 UART: [fwproc] Wait for Commands...
1,282,035 UART: [fwproc] Recv command 0x46574c44
1,282,768 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,629 >>> mbox cmd response: success
2,771,754 UART: [afmc] ++
2,771,922 UART: [afmc] CDI.KEYID = 6
2,772,285 UART: [afmc] SUBJECT.KEYID = 7
2,772,711 UART: [afmc] AUTHORITY.KEYID = 5
2,807,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,635 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,785 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,955 UART: [state] LifecycleState = Unprovisioned
86,610 UART: [state] DebugLocked = No
87,346 UART: [state] WD Timer not started. Device not locked for debugging
88,557 UART: [kat] SHA2-256
892,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,236 UART: [kat] ++
896,388 UART: [kat] sha1
900,608 UART: [kat] SHA2-256
902,548 UART: [kat] SHA2-384
905,273 UART: [kat] SHA2-512-ACC
907,174 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,547 UART: [kat] LMS
1,169,859 UART: [kat] --
1,170,684 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,904 UART: [idev] ++
1,174,072 UART: [idev] CDI.KEYID = 6
1,174,433 UART: [idev] SUBJECT.KEYID = 7
1,174,858 UART: [idev] UDS.KEYID = 0
1,183,042 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,209,296 UART: [idev] --
1,210,337 UART: [ldev] ++
1,210,505 UART: [ldev] CDI.KEYID = 6
1,210,869 UART: [ldev] SUBJECT.KEYID = 5
1,211,296 UART: [ldev] AUTHORITY.KEYID = 7
1,211,759 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,287 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,669 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,518 >>> mbox cmd response: success
2,770,569 UART: [afmc] ++
2,770,737 UART: [afmc] CDI.KEYID = 6
2,771,100 UART: [afmc] SUBJECT.KEYID = 7
2,771,526 UART: [afmc] AUTHORITY.KEYID = 5
2,808,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,918 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,496 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,352 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,404 UART: [kat] LMS
1,168,716 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,431 UART: [idev] ++
1,172,599 UART: [idev] CDI.KEYID = 6
1,172,960 UART: [idev] SUBJECT.KEYID = 7
1,173,385 UART: [idev] UDS.KEYID = 0
1,181,445 UART: [idev] Erasing UDS.KEYID = 0
1,198,461 UART: [idev] Sha1 KeyId Algorithm
1,207,213 UART: [idev] --
1,208,300 UART: [ldev] ++
1,208,468 UART: [ldev] CDI.KEYID = 6
1,208,832 UART: [ldev] SUBJECT.KEYID = 5
1,209,259 UART: [ldev] AUTHORITY.KEYID = 7
1,209,722 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,241,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,086 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,181 UART: [fwproc] Recv command 0x46574c44
1,281,914 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,501 >>> mbox cmd response: success
2,769,550 UART: [afmc] ++
2,769,718 UART: [afmc] CDI.KEYID = 6
2,770,081 UART: [afmc] SUBJECT.KEYID = 7
2,770,507 UART: [afmc] AUTHORITY.KEYID = 5
2,806,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,445 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,749 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,115 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,743 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,988 >>> mbox cmd response: success
2,773,213 UART: [afmc] ++
2,773,381 UART: [afmc] CDI.KEYID = 6
2,773,744 UART: [afmc] SUBJECT.KEYID = 7
2,774,170 UART: [afmc] AUTHORITY.KEYID = 5
2,809,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,870 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,134 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,021,742 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,435 UART:
2,165,837 UART: Running Caliptra ROM ...
2,167,008 UART:
2,167,182 UART: [state] CFI Enabled
2,168,148 UART: [state] LifecycleState = Unprovisioned
2,169,785 UART: [state] DebugLocked = No
2,170,888 UART: [state] WD Timer not started. Device not locked for debugging
2,173,376 UART: [kat] SHA2-256
2,174,043 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,053 UART: [kat] ++
2,177,506 UART: [kat] sha1
2,178,023 UART: [kat] SHA2-256
2,178,766 UART: [kat] SHA2-384
2,179,431 UART: [kat] SHA2-512-ACC
2,180,328 UART: [kat] ECC-384
3,775,043 UART: [kat] HMAC-384Kdf
3,799,974 UART: [kat] LMS
4,873,133 UART: [kat] --
4,879,288 UART: [cold-reset] ++
4,881,119 UART: [fht] FHT @ 0x50003400
4,892,637 UART: [idev] ++
4,893,304 UART: [idev] CDI.KEYID = 6
4,894,536 UART: [idev] SUBJECT.KEYID = 7
4,895,691 UART: [idev] UDS.KEYID = 0
4,926,529 UART: [idev] Erasing UDS.KEYID = 0
8,241,320 UART: [idev] Sha1 KeyId Algorithm
8,262,983 UART: [idev] --
8,267,888 UART: [ldev] ++
8,268,451 UART: [ldev] CDI.KEYID = 6
8,269,605 UART: [ldev] SUBJECT.KEYID = 5
8,270,843 UART: [ldev] AUTHORITY.KEYID = 7
8,271,939 UART: [ldev] FE.KEYID = 1
8,315,455 UART: [ldev] Erasing FE.KEYID = 1
11,648,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,311 UART: [ldev] --
14,018,309 UART: [fwproc] Wait for Commands...
14,021,109 UART: [fwproc] Recv command 0x46574c44
14,023,371 UART: [fwproc] Recv'd Img size: 113760 bytes
17,205,355 UART: ROM Fatal Error: 0x000B0030
17,208,478 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
2,020,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,020,095 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,022,276 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,998 UART:
2,166,403 UART: Running Caliptra ROM ...
2,167,479 UART:
2,167,624 UART: [state] CFI Enabled
2,168,586 UART: [state] LifecycleState = Unprovisioned
2,170,219 UART: [state] DebugLocked = No
2,171,237 UART: [state] WD Timer not started. Device not locked for debugging
2,173,735 UART: [kat] SHA2-256
2,174,397 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,404 UART: [kat] ++
2,177,846 UART: [kat] sha1
2,178,349 UART: [kat] SHA2-256
2,178,999 UART: [kat] SHA2-384
2,179,648 UART: [kat] SHA2-512-ACC
2,180,443 UART: [kat] ECC-384
4,092,844 UART: [kat] HMAC-384Kdf
4,104,717 UART: [kat] LMS
5,177,906 UART: [kat] --
5,183,329 UART: [cold-reset] ++
5,184,453 UART: [fht] FHT @ 0x50003400
5,196,187 UART: [idev] ++
5,196,863 UART: [idev] CDI.KEYID = 6
5,198,041 UART: [idev] SUBJECT.KEYID = 7
5,199,542 UART: [idev] UDS.KEYID = 0
5,218,970 UART: [idev] Erasing UDS.KEYID = 0
8,492,516 UART: [idev] Sha1 KeyId Algorithm
8,513,528 UART: [idev] --
8,518,492 UART: [ldev] ++
8,519,054 UART: [ldev] CDI.KEYID = 6
8,520,441 UART: [ldev] SUBJECT.KEYID = 5
8,521,719 UART: [ldev] AUTHORITY.KEYID = 7
8,523,273 UART: [ldev] FE.KEYID = 1
8,532,670 UART: [ldev] Erasing FE.KEYID = 1
11,826,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,939 UART: [ldev] --
14,192,104 UART: [fwproc] Wait for Commands...
14,194,418 UART: [fwproc] Recv command 0x46574c44
14,196,733 UART: [fwproc] Recv'd Img size: 113760 bytes
17,584,395 UART: ROM Fatal Error: 0x000B0030
17,587,528 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
2,034,533 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,380,280 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,021,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,282 UART:
2,165,679 UART: Running Caliptra ROM ...
2,166,846 UART:
2,167,016 UART: [state] CFI Enabled
2,167,999 UART: [state] LifecycleState = Unprovisioned
2,169,644 UART: [state] DebugLocked = No
2,170,751 UART: [state] WD Timer not started. Device not locked for debugging
2,173,221 UART: [kat] SHA2-256
2,173,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,916 UART: [kat] ++
2,177,369 UART: [kat] sha1
2,177,882 UART: [kat] SHA2-256
2,178,623 UART: [kat] SHA2-384
2,179,289 UART: [kat] SHA2-512-ACC
2,180,132 UART: [kat] ECC-384
2,945,924 UART: [kat] HMAC-384Kdf
2,966,353 UART: [kat] LMS
3,495,831 UART: [kat] --
3,502,468 UART: [cold-reset] ++
3,505,082 UART: [fht] FHT @ 0x50003400
3,516,934 UART: [idev] ++
3,517,501 UART: [idev] CDI.KEYID = 6
3,518,523 UART: [idev] SUBJECT.KEYID = 7
3,519,629 UART: [idev] UDS.KEYID = 0
3,539,123 UART: [idev] Erasing UDS.KEYID = 0
6,021,992 UART: [idev] Sha1 KeyId Algorithm
6,043,404 UART: [idev] --
6,047,674 UART: [ldev] ++
6,048,246 UART: [ldev] CDI.KEYID = 6
6,049,166 UART: [ldev] SUBJECT.KEYID = 5
6,050,331 UART: [ldev] AUTHORITY.KEYID = 7
6,051,565 UART: [ldev] FE.KEYID = 1
6,095,428 UART: [ldev] Erasing FE.KEYID = 1
8,600,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,482 UART: [ldev] --
10,409,938 UART: [fwproc] Wait for Commands...
10,411,819 UART: [fwproc] Recv command 0x46574c44
10,413,929 UART: [fwproc] Recv'd Img size: 114084 bytes
12,072,324 UART: ROM Fatal Error: 0x000B0030
12,075,446 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,035,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,747,395 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,021,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,458 UART:
2,165,846 UART: Running Caliptra ROM ...
2,166,931 UART:
2,167,085 UART: [state] CFI Enabled
2,168,067 UART: [state] LifecycleState = Unprovisioned
2,169,718 UART: [state] DebugLocked = No
2,170,745 UART: [state] WD Timer not started. Device not locked for debugging
2,173,207 UART: [kat] SHA2-256
2,173,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,884 UART: [kat] ++
2,177,332 UART: [kat] sha1
2,177,869 UART: [kat] SHA2-256
2,178,528 UART: [kat] SHA2-384
2,179,184 UART: [kat] SHA2-512-ACC
2,179,979 UART: [kat] ECC-384
3,281,978 UART: [kat] HMAC-384Kdf
3,295,121 UART: [kat] LMS
3,824,628 UART: [kat] --
3,829,212 UART: [cold-reset] ++
3,830,599 UART: [fht] FHT @ 0x50003400
3,841,093 UART: [idev] ++
3,841,667 UART: [idev] CDI.KEYID = 6
3,842,576 UART: [idev] SUBJECT.KEYID = 7
3,843,786 UART: [idev] UDS.KEYID = 0
3,860,513 UART: [idev] Erasing UDS.KEYID = 0
6,314,639 UART: [idev] Sha1 KeyId Algorithm
6,337,491 UART: [idev] --
6,342,255 UART: [ldev] ++
6,342,821 UART: [ldev] CDI.KEYID = 6
6,343,699 UART: [ldev] SUBJECT.KEYID = 5
6,344,853 UART: [ldev] AUTHORITY.KEYID = 7
6,346,188 UART: [ldev] FE.KEYID = 1
6,356,592 UART: [ldev] Erasing FE.KEYID = 1
8,834,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,751 UART: [ldev] --
10,625,774 UART: [fwproc] Wait for Commands...
10,628,299 UART: [fwproc] Recv command 0x46574c44
10,630,388 UART: [fwproc] Recv'd Img size: 114084 bytes
12,284,307 UART: ROM Fatal Error: 0x000B0030
12,287,400 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,022,071 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,966,113 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,031,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,175,710 UART:
2,176,146 UART: Running Caliptra ROM ...
2,177,233 UART:
2,177,385 UART: [state] CFI Enabled
2,178,317 UART: [state] LifecycleState = Unprovisioned
2,179,963 UART: [state] DebugLocked = No
2,181,007 UART: [state] WD Timer not started. Device not locked for debugging
2,183,483 UART: [kat] SHA2-256
2,184,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,145 UART: [kat] ++
2,187,594 UART: [kat] sha1
2,188,103 UART: [kat] SHA2-256
2,188,760 UART: [kat] SHA2-384
2,189,412 UART: [kat] SHA2-512-ACC
2,190,212 UART: [kat] ECC-384
2,925,705 UART: [kat] HMAC-384Kdf
2,949,382 UART: [kat] LMS
3,478,825 UART: [kat] --
3,483,869 UART: [cold-reset] ++
3,485,912 UART: [fht] FHT @ 0x50003400
3,496,842 UART: [idev] ++
3,497,407 UART: [idev] CDI.KEYID = 6
3,498,336 UART: [idev] SUBJECT.KEYID = 7
3,499,554 UART: [idev] UDS.KEYID = 0
3,520,448 UART: [idev] Erasing UDS.KEYID = 0
6,002,440 UART: [idev] Sha1 KeyId Algorithm
6,025,238 UART: [idev] --
6,028,995 UART: [ldev] ++
6,029,578 UART: [ldev] CDI.KEYID = 6
6,030,487 UART: [ldev] SUBJECT.KEYID = 5
6,031,650 UART: [ldev] AUTHORITY.KEYID = 7
6,032,882 UART: [ldev] FE.KEYID = 1
6,076,156 UART: [ldev] Erasing FE.KEYID = 1
8,579,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,904 UART: [ldev] --
10,389,173 UART: [fwproc] Wait for Commands...
10,392,349 UART: [fwproc] Recv command 0x46574c44
10,394,445 UART: [fwproc] Recv'd Img size: 114084 bytes
12,044,534 UART: ROM Fatal Error: 0x000B0030
12,047,658 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,029,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,760,841 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
2,021,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,551 UART:
2,165,970 UART: Running Caliptra ROM ...
2,167,051 UART:
2,167,206 UART: [state] CFI Enabled
2,168,180 UART: [state] LifecycleState = Unprovisioned
2,169,829 UART: [state] DebugLocked = No
2,170,851 UART: [state] WD Timer not started. Device not locked for debugging
2,173,313 UART: [kat] SHA2-256
2,173,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,989 UART: [kat] ++
2,177,438 UART: [kat] sha1
2,177,946 UART: [kat] SHA2-256
2,178,644 UART: [kat] SHA2-384
2,179,302 UART: [kat] SHA2-512-ACC
2,180,121 UART: [kat] ECC-384
3,282,501 UART: [kat] HMAC-384Kdf
3,295,986 UART: [kat] LMS
3,825,478 UART: [kat] --
3,829,412 UART: [cold-reset] ++
3,830,747 UART: [fht] FHT @ 0x50003400
3,842,591 UART: [idev] ++
3,843,159 UART: [idev] CDI.KEYID = 6
3,844,174 UART: [idev] SUBJECT.KEYID = 7
3,845,273 UART: [idev] UDS.KEYID = 0
3,862,540 UART: [idev] Erasing UDS.KEYID = 0
6,320,696 UART: [idev] Sha1 KeyId Algorithm
6,342,362 UART: [idev] --
6,346,354 UART: [ldev] ++
6,346,918 UART: [ldev] CDI.KEYID = 6
6,347,823 UART: [ldev] SUBJECT.KEYID = 5
6,348,943 UART: [ldev] AUTHORITY.KEYID = 7
6,350,228 UART: [ldev] FE.KEYID = 1
6,361,898 UART: [ldev] Erasing FE.KEYID = 1
8,834,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,484 UART: [ldev] --
10,623,002 UART: [fwproc] Wait for Commands...
10,625,324 UART: [fwproc] Recv command 0x46574c44
10,627,420 UART: [fwproc] Recv'd Img size: 114084 bytes
12,288,367 UART: ROM Fatal Error: 0x000B0030
12,291,493 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
2,021,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,968,999 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,250 UART: [kat] SHA2-256
891,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,929 UART: [kat] ++
896,081 UART: [kat] sha1
900,329 UART: [kat] SHA2-256
902,269 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
920,980 UART: [kat] LMS
1,169,292 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,199,081 UART: [idev] Sha1 KeyId Algorithm
1,207,953 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,241,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,312 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,467 UART: [fwproc] Recv command 0x46574c44
1,282,200 UART: [fwproc] Recv'd Img size: 114084 bytes
1,585,650 UART: ROM Fatal Error: 0x000B0030
1,586,807 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,440,273 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,198,734 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,253 UART: [ldev] Erasing FE.KEYID = 1
1,241,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,315 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 114084 bytes
1,597,360 UART: ROM Fatal Error: 0x000B0030
1,598,517 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,452,054 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,215,100 UART: [ldev] Erasing FE.KEYID = 1
1,241,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,366 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 114084 bytes
1,599,730 UART: ROM Fatal Error: 0x000B0030
1,600,887 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,438,530 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,635 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,181,984 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,654 UART: [fwproc] Recv command 0x46574c44
1,283,387 UART: [fwproc] Recv'd Img size: 114084 bytes
1,591,251 UART: ROM Fatal Error: 0x000B0030
1,592,408 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,438,296 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,181,921 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,612 UART: [ldev] ++
1,208,780 UART: [ldev] CDI.KEYID = 6
1,209,144 UART: [ldev] SUBJECT.KEYID = 5
1,209,571 UART: [ldev] AUTHORITY.KEYID = 7
1,210,034 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,280 UART: [fwproc] Wait for Commands...
1,281,011 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: [fwproc] Recv'd Img size: 114084 bytes
1,593,632 UART: ROM Fatal Error: 0x000B0030
1,594,789 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,447,175 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,632 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
1,181,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,214 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,241,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,241 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 114084 bytes
1,600,935 UART: ROM Fatal Error: 0x000B0030
1,602,092 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,445,579 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
5,621 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,245 UART:
192,651 UART: Running Caliptra ROM ...
193,843 UART:
193,995 UART: [state] CFI Enabled
266,293 UART: [state] LifecycleState = Unprovisioned
268,703 UART: [state] DebugLocked = No
270,358 UART: [state] WD Timer not started. Device not locked for debugging
274,624 UART: [kat] SHA2-256
456,532 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,079 UART: [kat] ++
468,620 UART: [kat] sha1
480,533 UART: [kat] SHA2-256
483,546 UART: [kat] SHA2-384
489,303 UART: [kat] SHA2-512-ACC
491,921 UART: [kat] ECC-384
3,769,887 UART: [kat] HMAC-384Kdf
3,795,362 UART: [kat] LMS
4,868,530 UART: [kat] --
4,872,913 UART: [cold-reset] ++
4,874,369 UART: [fht] FHT @ 0x50003400
4,886,196 UART: [idev] ++
4,886,876 UART: [idev] CDI.KEYID = 6
4,888,118 UART: [idev] SUBJECT.KEYID = 7
4,889,277 UART: [idev] UDS.KEYID = 0
4,924,327 UART: [idev] Erasing UDS.KEYID = 0
8,234,753 UART: [idev] Sha1 KeyId Algorithm
8,255,305 UART: [idev] --
8,258,611 UART: [ldev] ++
8,259,223 UART: [ldev] CDI.KEYID = 6
8,260,202 UART: [ldev] SUBJECT.KEYID = 5
8,261,368 UART: [ldev] AUTHORITY.KEYID = 7
8,262,603 UART: [ldev] FE.KEYID = 1
8,290,367 UART: [ldev] Erasing FE.KEYID = 1
11,625,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,930,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,946,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,962,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,978,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,999,944 UART: [ldev] --
14,005,104 UART: [fwproc] Wait for Commands...
14,008,124 UART: [fwproc] Recv command 0x46574c44
14,010,455 UART: [fwproc] Recv'd Img size: 113760 bytes
14,063,329 UART: ROM Fatal Error: 0x000B0001
14,066,762 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
5,198 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,879,797 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
6,254 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,295 UART:
192,711 UART: Running Caliptra ROM ...
193,913 UART:
603,540 UART: [state] CFI Enabled
616,314 UART: [state] LifecycleState = Unprovisioned
618,670 UART: [state] DebugLocked = No
621,338 UART: [state] WD Timer not started. Device not locked for debugging
626,837 UART: [kat] SHA2-256
808,807 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,347 UART: [kat] ++
820,940 UART: [kat] sha1
830,415 UART: [kat] SHA2-256
833,475 UART: [kat] SHA2-384
839,769 UART: [kat] SHA2-512-ACC
842,394 UART: [kat] ECC-384
4,095,849 UART: [kat] HMAC-384Kdf
4,106,638 UART: [kat] LMS
5,179,799 UART: [kat] --
5,185,656 UART: [cold-reset] ++
5,186,853 UART: [fht] FHT @ 0x50003400
5,197,943 UART: [idev] ++
5,198,663 UART: [idev] CDI.KEYID = 6
5,199,844 UART: [idev] SUBJECT.KEYID = 7
5,201,331 UART: [idev] UDS.KEYID = 0
5,220,337 UART: [idev] Erasing UDS.KEYID = 0
8,495,072 UART: [idev] Sha1 KeyId Algorithm
8,516,961 UART: [idev] --
8,521,512 UART: [ldev] ++
8,522,136 UART: [ldev] CDI.KEYID = 6
8,523,319 UART: [ldev] SUBJECT.KEYID = 5
8,524,752 UART: [ldev] AUTHORITY.KEYID = 7
8,526,315 UART: [ldev] FE.KEYID = 1
8,537,988 UART: [ldev] Erasing FE.KEYID = 1
11,834,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,590 UART: [ldev] --
14,200,408 UART: [fwproc] Wait for Commands...
14,202,227 UART: [fwproc] Recv command 0x46574c44
14,204,543 UART: [fwproc] Recv'd Img size: 113760 bytes
14,260,350 UART: ROM Fatal Error: 0x000B0001
14,263,712 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
6,193 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,074,660 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
5,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,261 UART:
192,633 UART: Running Caliptra ROM ...
193,736 UART:
193,877 UART: [state] CFI Enabled
263,113 UART: [state] LifecycleState = Unprovisioned
265,050 UART: [state] DebugLocked = No
266,733 UART: [state] WD Timer not started. Device not locked for debugging
270,301 UART: [kat] SHA2-256
449,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,953 UART: [kat] ++
461,457 UART: [kat] sha1
472,113 UART: [kat] SHA2-256
475,129 UART: [kat] SHA2-384
482,184 UART: [kat] SHA2-512-ACC
485,183 UART: [kat] ECC-384
2,946,557 UART: [kat] HMAC-384Kdf
2,968,885 UART: [kat] LMS
3,498,364 UART: [kat] --
3,500,571 UART: [cold-reset] ++
3,502,346 UART: [fht] FHT @ 0x50003400
3,512,702 UART: [idev] ++
3,513,281 UART: [idev] CDI.KEYID = 6
3,514,354 UART: [idev] SUBJECT.KEYID = 7
3,515,669 UART: [idev] UDS.KEYID = 0
3,541,162 UART: [idev] Erasing UDS.KEYID = 0
6,023,937 UART: [idev] Sha1 KeyId Algorithm
6,047,702 UART: [idev] --
6,051,318 UART: [ldev] ++
6,051,894 UART: [ldev] CDI.KEYID = 6
6,052,804 UART: [ldev] SUBJECT.KEYID = 5
6,053,970 UART: [ldev] AUTHORITY.KEYID = 7
6,055,208 UART: [ldev] FE.KEYID = 1
6,097,552 UART: [ldev] Erasing FE.KEYID = 1
8,596,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,855 UART: [ldev] --
10,391,339 UART: [fwproc] Wait for Commands...
10,393,282 UART: [fwproc] Recv command 0x46574c44
10,395,591 UART: [fwproc] Recv'd Img size: 114084 bytes
10,451,822 UART: ROM Fatal Error: 0x000B0001
10,454,931 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
5,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,237,014 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
6,276 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,414 UART:
192,829 UART: Running Caliptra ROM ...
193,927 UART:
603,353 UART: [state] CFI Enabled
617,716 UART: [state] LifecycleState = Unprovisioned
619,597 UART: [state] DebugLocked = No
621,783 UART: [state] WD Timer not started. Device not locked for debugging
625,992 UART: [kat] SHA2-256
805,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,651 UART: [kat] ++
817,181 UART: [kat] sha1
829,681 UART: [kat] SHA2-256
832,734 UART: [kat] SHA2-384
838,678 UART: [kat] SHA2-512-ACC
841,663 UART: [kat] ECC-384
3,282,484 UART: [kat] HMAC-384Kdf
3,295,867 UART: [kat] LMS
3,825,328 UART: [kat] --
3,828,993 UART: [cold-reset] ++
3,830,599 UART: [fht] FHT @ 0x50003400
3,840,820 UART: [idev] ++
3,841,375 UART: [idev] CDI.KEYID = 6
3,842,384 UART: [idev] SUBJECT.KEYID = 7
3,843,480 UART: [idev] UDS.KEYID = 0
3,860,257 UART: [idev] Erasing UDS.KEYID = 0
6,318,084 UART: [idev] Sha1 KeyId Algorithm
6,339,807 UART: [idev] --
6,343,208 UART: [ldev] ++
6,343,777 UART: [ldev] CDI.KEYID = 6
6,344,724 UART: [ldev] SUBJECT.KEYID = 5
6,345,982 UART: [ldev] AUTHORITY.KEYID = 7
6,347,169 UART: [ldev] FE.KEYID = 1
6,358,409 UART: [ldev] Erasing FE.KEYID = 1
8,836,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,144 UART: [ldev] --
10,626,297 UART: [fwproc] Wait for Commands...
10,628,118 UART: [fwproc] Recv command 0x46574c44
10,630,208 UART: [fwproc] Recv'd Img size: 114084 bytes
10,684,902 UART: ROM Fatal Error: 0x000B0001
10,687,990 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,466,587 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
5,825 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,260 UART:
192,653 UART: Running Caliptra ROM ...
193,752 UART:
193,893 UART: [state] CFI Enabled
261,100 UART: [state] LifecycleState = Unprovisioned
263,041 UART: [state] DebugLocked = No
265,192 UART: [state] WD Timer not started. Device not locked for debugging
268,105 UART: [kat] SHA2-256
447,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,818 UART: [kat] ++
459,369 UART: [kat] sha1
470,314 UART: [kat] SHA2-256
473,324 UART: [kat] SHA2-384
479,194 UART: [kat] SHA2-512-ACC
482,131 UART: [kat] ECC-384
2,944,414 UART: [kat] HMAC-384Kdf
2,968,822 UART: [kat] LMS
3,498,252 UART: [kat] --
3,503,078 UART: [cold-reset] ++
3,504,538 UART: [fht] FHT @ 0x50003400
3,514,985 UART: [idev] ++
3,515,570 UART: [idev] CDI.KEYID = 6
3,516,510 UART: [idev] SUBJECT.KEYID = 7
3,517,729 UART: [idev] UDS.KEYID = 0
3,540,894 UART: [idev] Erasing UDS.KEYID = 0
6,020,737 UART: [idev] Sha1 KeyId Algorithm
6,044,330 UART: [idev] --
6,048,273 UART: [ldev] ++
6,048,843 UART: [ldev] CDI.KEYID = 6
6,049,759 UART: [ldev] SUBJECT.KEYID = 5
6,050,922 UART: [ldev] AUTHORITY.KEYID = 7
6,052,160 UART: [ldev] FE.KEYID = 1
6,098,770 UART: [ldev] Erasing FE.KEYID = 1
8,601,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,667 UART: [ldev] --
10,412,289 UART: [fwproc] Wait for Commands...
10,413,902 UART: [fwproc] Recv command 0x46574c44
10,415,950 UART: [fwproc] Recv'd Img size: 114084 bytes
10,472,871 UART: ROM Fatal Error: 0x000B0001
10,475,975 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,213,564 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,088 writing to cptra_bootfsm_go
7,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
193,359 UART:
193,732 UART: Running Caliptra ROM ...
194,825 UART:
604,655 UART: [state] CFI Enabled
615,184 UART: [state] LifecycleState = Unprovisioned
617,058 UART: [state] DebugLocked = No
618,731 UART: [state] WD Timer not started. Device not locked for debugging
622,715 UART: [kat] SHA2-256
801,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,416 UART: [kat] ++
813,860 UART: [kat] sha1
825,272 UART: [kat] SHA2-256
828,325 UART: [kat] SHA2-384
834,260 UART: [kat] SHA2-512-ACC
837,187 UART: [kat] ECC-384
3,278,219 UART: [kat] HMAC-384Kdf
3,290,707 UART: [kat] LMS
3,820,196 UART: [kat] --
3,823,509 UART: [cold-reset] ++
3,825,606 UART: [fht] FHT @ 0x50003400
3,836,645 UART: [idev] ++
3,837,208 UART: [idev] CDI.KEYID = 6
3,838,174 UART: [idev] SUBJECT.KEYID = 7
3,839,330 UART: [idev] UDS.KEYID = 0
3,853,987 UART: [idev] Erasing UDS.KEYID = 0
6,313,812 UART: [idev] Sha1 KeyId Algorithm
6,336,920 UART: [idev] --
6,340,888 UART: [ldev] ++
6,341,463 UART: [ldev] CDI.KEYID = 6
6,342,391 UART: [ldev] SUBJECT.KEYID = 5
6,343,550 UART: [ldev] AUTHORITY.KEYID = 7
6,344,834 UART: [ldev] FE.KEYID = 1
6,355,804 UART: [ldev] Erasing FE.KEYID = 1
8,833,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,158 UART: [ldev] --
10,623,956 UART: [fwproc] Wait for Commands...
10,626,964 UART: [fwproc] Recv command 0x46574c44
10,629,055 UART: [fwproc] Recv'd Img size: 114084 bytes
10,685,577 UART: ROM Fatal Error: 0x000B0001
10,688,667 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
6,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,461,063 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,106 UART: [kat] SHA2-512-ACC
906,007 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,023 UART: [idev] ++
1,173,191 UART: [idev] CDI.KEYID = 6
1,173,552 UART: [idev] SUBJECT.KEYID = 7
1,173,977 UART: [idev] UDS.KEYID = 0
1,181,851 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,242,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,624 UART: [fwproc] Wait for Commands...
1,282,413 UART: [fwproc] Recv command 0x46574c44
1,283,146 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,599 UART: ROM Fatal Error: 0x000B0001
1,303,756 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,156,331 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,501 UART: [kat] LMS
1,168,813 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,126 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,329 UART: [ldev] --
1,282,627 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,190 UART: ROM Fatal Error: 0x000B0001
1,304,347 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,588 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,182,071 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,486 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,807 UART: ROM Fatal Error: 0x000B0001
1,302,964 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,615 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,859 UART: [kat] SHA2-512-ACC
906,760 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,560 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,922 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,028 UART: [fwproc] Recv command 0x46574c44
1,283,761 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,134 UART: ROM Fatal Error: 0x000B0001
1,304,291 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,157,056 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,043 UART: [fwproc] Recv command 0x46574c44
1,282,776 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,107 UART: ROM Fatal Error: 0x000B0001
1,303,264 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,153,841 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,570 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,077 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,556 UART: ROM Fatal Error: 0x000B0001
1,303,713 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,154,618 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
5,460 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,096 UART:
192,510 UART: Running Caliptra ROM ...
193,609 UART:
193,755 UART: [state] CFI Enabled
263,236 UART: [state] LifecycleState = Unprovisioned
265,604 UART: [state] DebugLocked = No
266,869 UART: [state] WD Timer not started. Device not locked for debugging
270,289 UART: [kat] SHA2-256
452,221 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,743 UART: [kat] ++
464,271 UART: [kat] sha1
475,482 UART: [kat] SHA2-256
478,494 UART: [kat] SHA2-384
484,196 UART: [kat] SHA2-512-ACC
486,815 UART: [kat] ECC-384
3,776,853 UART: [kat] HMAC-384Kdf
3,802,597 UART: [kat] LMS
4,875,706 UART: [kat] --
4,879,243 UART: [cold-reset] ++
4,881,560 UART: [fht] FHT @ 0x50003400
4,894,213 UART: [idev] ++
4,895,033 UART: [idev] CDI.KEYID = 6
4,896,099 UART: [idev] SUBJECT.KEYID = 7
4,897,284 UART: [idev] UDS.KEYID = 0
4,929,221 UART: [idev] Erasing UDS.KEYID = 0
8,241,792 UART: [idev] Sha1 KeyId Algorithm
8,263,119 UART: [idev] --
8,268,108 UART: [ldev] ++
8,268,684 UART: [ldev] CDI.KEYID = 6
8,269,875 UART: [ldev] SUBJECT.KEYID = 5
8,271,035 UART: [ldev] AUTHORITY.KEYID = 7
8,272,269 UART: [ldev] FE.KEYID = 1
8,316,419 UART: [ldev] Erasing FE.KEYID = 1
11,651,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,966 UART: [ldev] --
14,035,519 UART: [fwproc] Wait for Commands...
14,037,310 UART: [fwproc] Recv command 0x46574c44
14,039,585 UART: [fwproc] Recv'd Img size: 113760 bytes
14,096,101 UART: ROM Fatal Error: 0x000B0002
14,099,524 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
6,557 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,862,419 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
6,447 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,552 UART:
192,933 UART: Running Caliptra ROM ...
194,142 UART:
603,706 UART: [state] CFI Enabled
615,265 UART: [state] LifecycleState = Unprovisioned
617,612 UART: [state] DebugLocked = No
619,471 UART: [state] WD Timer not started. Device not locked for debugging
623,996 UART: [kat] SHA2-256
805,977 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,546 UART: [kat] ++
818,049 UART: [kat] sha1
829,685 UART: [kat] SHA2-256
832,690 UART: [kat] SHA2-384
838,015 UART: [kat] SHA2-512-ACC
840,634 UART: [kat] ECC-384
4,097,853 UART: [kat] HMAC-384Kdf
4,109,825 UART: [kat] LMS
5,182,949 UART: [kat] --
5,188,940 UART: [cold-reset] ++
5,191,646 UART: [fht] FHT @ 0x50003400
5,202,093 UART: [idev] ++
5,202,819 UART: [idev] CDI.KEYID = 6
5,204,013 UART: [idev] SUBJECT.KEYID = 7
5,205,450 UART: [idev] UDS.KEYID = 0
5,223,321 UART: [idev] Erasing UDS.KEYID = 0
8,498,968 UART: [idev] Sha1 KeyId Algorithm
8,522,045 UART: [idev] --
8,525,124 UART: [ldev] ++
8,525,692 UART: [ldev] CDI.KEYID = 6
8,526,931 UART: [ldev] SUBJECT.KEYID = 5
8,528,361 UART: [ldev] AUTHORITY.KEYID = 7
8,529,919 UART: [ldev] FE.KEYID = 1
8,542,510 UART: [ldev] Erasing FE.KEYID = 1
11,835,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,396 UART: [ldev] --
14,200,386 UART: [fwproc] Wait for Commands...
14,202,752 UART: [fwproc] Recv command 0x46574c44
14,205,070 UART: [fwproc] Recv'd Img size: 113760 bytes
14,260,494 UART: ROM Fatal Error: 0x000B0002
14,263,920 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
6,002 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,070,870 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
5,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,233 UART:
192,636 UART: Running Caliptra ROM ...
193,836 UART:
193,997 UART: [state] CFI Enabled
263,990 UART: [state] LifecycleState = Unprovisioned
265,864 UART: [state] DebugLocked = No
267,793 UART: [state] WD Timer not started. Device not locked for debugging
271,463 UART: [kat] SHA2-256
450,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,190 UART: [kat] ++
462,730 UART: [kat] sha1
474,156 UART: [kat] SHA2-256
477,185 UART: [kat] SHA2-384
484,026 UART: [kat] SHA2-512-ACC
486,968 UART: [kat] ECC-384
2,946,363 UART: [kat] HMAC-384Kdf
2,971,513 UART: [kat] LMS
3,500,987 UART: [kat] --
3,507,535 UART: [cold-reset] ++
3,509,739 UART: [fht] FHT @ 0x50003400
3,520,777 UART: [idev] ++
3,521,342 UART: [idev] CDI.KEYID = 6
3,522,307 UART: [idev] SUBJECT.KEYID = 7
3,523,467 UART: [idev] UDS.KEYID = 0
3,544,258 UART: [idev] Erasing UDS.KEYID = 0
6,025,071 UART: [idev] Sha1 KeyId Algorithm
6,048,621 UART: [idev] --
6,052,998 UART: [ldev] ++
6,053,590 UART: [ldev] CDI.KEYID = 6
6,054,511 UART: [ldev] SUBJECT.KEYID = 5
6,055,617 UART: [ldev] AUTHORITY.KEYID = 7
6,056,908 UART: [ldev] FE.KEYID = 1
6,100,476 UART: [ldev] Erasing FE.KEYID = 1
8,607,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,178 UART: [ldev] --
10,412,905 UART: [fwproc] Wait for Commands...
10,414,568 UART: [fwproc] Recv command 0x46574c44
10,416,664 UART: [fwproc] Recv'd Img size: 114084 bytes
10,471,830 UART: ROM Fatal Error: 0x000B0002
10,474,918 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
5,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,237,935 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
6,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,548 UART:
192,922 UART: Running Caliptra ROM ...
194,107 UART:
603,615 UART: [state] CFI Enabled
614,638 UART: [state] LifecycleState = Unprovisioned
616,540 UART: [state] DebugLocked = No
618,614 UART: [state] WD Timer not started. Device not locked for debugging
622,869 UART: [kat] SHA2-256
801,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,551 UART: [kat] ++
814,081 UART: [kat] sha1
825,722 UART: [kat] SHA2-256
828,768 UART: [kat] SHA2-384
833,554 UART: [kat] SHA2-512-ACC
836,532 UART: [kat] ECC-384
3,279,192 UART: [kat] HMAC-384Kdf
3,292,489 UART: [kat] LMS
3,822,006 UART: [kat] --
3,826,547 UART: [cold-reset] ++
3,828,891 UART: [fht] FHT @ 0x50003400
3,841,015 UART: [idev] ++
3,841,599 UART: [idev] CDI.KEYID = 6
3,842,478 UART: [idev] SUBJECT.KEYID = 7
3,843,640 UART: [idev] UDS.KEYID = 0
3,861,232 UART: [idev] Erasing UDS.KEYID = 0
6,315,324 UART: [idev] Sha1 KeyId Algorithm
6,337,356 UART: [idev] --
6,340,482 UART: [ldev] ++
6,341,042 UART: [ldev] CDI.KEYID = 6
6,341,925 UART: [ldev] SUBJECT.KEYID = 5
6,343,136 UART: [ldev] AUTHORITY.KEYID = 7
6,344,430 UART: [ldev] FE.KEYID = 1
6,355,805 UART: [ldev] Erasing FE.KEYID = 1
8,825,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,110 UART: [ldev] --
10,614,933 UART: [fwproc] Wait for Commands...
10,616,485 UART: [fwproc] Recv command 0x46574c44
10,618,519 UART: [fwproc] Recv'd Img size: 114084 bytes
10,673,600 UART: ROM Fatal Error: 0x000B0002
10,676,687 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
6,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,464,463 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
5,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,262 UART:
192,632 UART: Running Caliptra ROM ...
193,822 UART:
193,974 UART: [state] CFI Enabled
266,529 UART: [state] LifecycleState = Unprovisioned
268,415 UART: [state] DebugLocked = No
271,265 UART: [state] WD Timer not started. Device not locked for debugging
274,621 UART: [kat] SHA2-256
453,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,309 UART: [kat] ++
465,846 UART: [kat] sha1
477,648 UART: [kat] SHA2-256
480,653 UART: [kat] SHA2-384
486,092 UART: [kat] SHA2-512-ACC
489,088 UART: [kat] ECC-384
2,947,783 UART: [kat] HMAC-384Kdf
2,974,264 UART: [kat] LMS
3,503,719 UART: [kat] --
3,507,985 UART: [cold-reset] ++
3,509,698 UART: [fht] FHT @ 0x50003400
3,520,410 UART: [idev] ++
3,520,992 UART: [idev] CDI.KEYID = 6
3,521,876 UART: [idev] SUBJECT.KEYID = 7
3,523,092 UART: [idev] UDS.KEYID = 0
3,545,203 UART: [idev] Erasing UDS.KEYID = 0
6,025,779 UART: [idev] Sha1 KeyId Algorithm
6,049,710 UART: [idev] --
6,053,817 UART: [ldev] ++
6,054,386 UART: [ldev] CDI.KEYID = 6
6,055,300 UART: [ldev] SUBJECT.KEYID = 5
6,056,463 UART: [ldev] AUTHORITY.KEYID = 7
6,057,790 UART: [ldev] FE.KEYID = 1
6,102,786 UART: [ldev] Erasing FE.KEYID = 1
8,605,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,518 UART: [ldev] --
10,415,090 UART: [fwproc] Wait for Commands...
10,416,707 UART: [fwproc] Recv command 0x46574c44
10,418,810 UART: [fwproc] Recv'd Img size: 114084 bytes
10,473,790 UART: ROM Fatal Error: 0x000B0002
10,476,878 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
5,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,237,768 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
6,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,320 UART:
192,714 UART: Running Caliptra ROM ...
193,905 UART:
603,581 UART: [state] CFI Enabled
615,799 UART: [state] LifecycleState = Unprovisioned
617,681 UART: [state] DebugLocked = No
618,998 UART: [state] WD Timer not started. Device not locked for debugging
623,474 UART: [kat] SHA2-256
802,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,136 UART: [kat] ++
814,671 UART: [kat] sha1
826,339 UART: [kat] SHA2-256
829,392 UART: [kat] SHA2-384
836,018 UART: [kat] SHA2-512-ACC
838,949 UART: [kat] ECC-384
3,280,334 UART: [kat] HMAC-384Kdf
3,292,782 UART: [kat] LMS
3,822,240 UART: [kat] --
3,827,362 UART: [cold-reset] ++
3,829,455 UART: [fht] FHT @ 0x50003400
3,839,853 UART: [idev] ++
3,840,416 UART: [idev] CDI.KEYID = 6
3,841,428 UART: [idev] SUBJECT.KEYID = 7
3,842,480 UART: [idev] UDS.KEYID = 0
3,857,857 UART: [idev] Erasing UDS.KEYID = 0
6,315,177 UART: [idev] Sha1 KeyId Algorithm
6,337,969 UART: [idev] --
6,341,368 UART: [ldev] ++
6,341,974 UART: [ldev] CDI.KEYID = 6
6,342,887 UART: [ldev] SUBJECT.KEYID = 5
6,344,048 UART: [ldev] AUTHORITY.KEYID = 7
6,345,285 UART: [ldev] FE.KEYID = 1
6,356,366 UART: [ldev] Erasing FE.KEYID = 1
8,832,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,289 UART: [ldev] --
10,624,719 UART: [fwproc] Wait for Commands...
10,627,893 UART: [fwproc] Recv command 0x46574c44
10,629,985 UART: [fwproc] Recv'd Img size: 114084 bytes
10,685,759 UART: ROM Fatal Error: 0x000B0002
10,688,853 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
7,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,465,007 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,434 UART: [kat] HMAC-384Kdf
920,040 UART: [kat] LMS
1,168,352 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,789 UART: [fht] FHT @ 0x50003400
1,172,343 UART: [idev] ++
1,172,511 UART: [idev] CDI.KEYID = 6
1,172,872 UART: [idev] SUBJECT.KEYID = 7
1,173,297 UART: [idev] UDS.KEYID = 0
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,197,865 UART: [idev] Sha1 KeyId Algorithm
1,206,551 UART: [idev] --
1,207,598 UART: [ldev] ++
1,207,766 UART: [ldev] CDI.KEYID = 6
1,208,130 UART: [ldev] SUBJECT.KEYID = 5
1,208,557 UART: [ldev] AUTHORITY.KEYID = 7
1,209,020 UART: [ldev] FE.KEYID = 1
1,213,996 UART: [ldev] Erasing FE.KEYID = 1
1,240,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,396 UART: [ldev] --
1,279,768 UART: [fwproc] Wait for Commands...
1,280,457 UART: [fwproc] Recv command 0x46574c44
1,281,190 UART: [fwproc] Recv'd Img size: 114084 bytes
1,300,772 UART: ROM Fatal Error: 0x000B0002
1,301,929 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,153,780 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,771 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,590 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,830 UART: [idev] ++
1,173,998 UART: [idev] CDI.KEYID = 6
1,174,359 UART: [idev] SUBJECT.KEYID = 7
1,174,784 UART: [idev] UDS.KEYID = 0
1,183,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,610 UART: [idev] Sha1 KeyId Algorithm
1,209,516 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,043 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,282,971 UART: [fwproc] Wait for Commands...
1,283,672 UART: [fwproc] Recv command 0x46574c44
1,284,405 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,943 UART: ROM Fatal Error: 0x000B0002
1,305,100 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,899 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,515 UART: [kat] SHA2-256
901,455 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,123 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,382 UART: [ldev] ++
1,208,550 UART: [ldev] CDI.KEYID = 6
1,208,914 UART: [ldev] SUBJECT.KEYID = 5
1,209,341 UART: [ldev] AUTHORITY.KEYID = 7
1,209,804 UART: [ldev] FE.KEYID = 1
1,215,024 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,298 UART: [ldev] --
1,279,766 UART: [fwproc] Wait for Commands...
1,280,579 UART: [fwproc] Recv command 0x46574c44
1,281,312 UART: [fwproc] Recv'd Img size: 114084 bytes
1,300,558 UART: ROM Fatal Error: 0x000B0002
1,301,715 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,154,154 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,730 UART: [cold-reset] ++
1,171,102 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,182,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,241,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,526 UART: [fwproc] Recv command 0x46574c44
1,282,259 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,461 UART: ROM Fatal Error: 0x000B0002
1,302,618 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,409 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,198,723 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,506 UART: [fwproc] Wait for Commands...
1,281,331 UART: [fwproc] Recv command 0x46574c44
1,282,064 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,338 UART: ROM Fatal Error: 0x000B0002
1,302,495 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,730 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
905,091 UART: [kat] SHA2-512-ACC
906,992 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,489 UART: [kat] LMS
1,169,801 UART: [kat] --
1,170,738 UART: [cold-reset] ++
1,171,278 UART: [fht] FHT @ 0x50003400
1,173,888 UART: [idev] ++
1,174,056 UART: [idev] CDI.KEYID = 6
1,174,417 UART: [idev] SUBJECT.KEYID = 7
1,174,842 UART: [idev] UDS.KEYID = 0
1,182,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,555 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,221 UART: ROM Fatal Error: 0x000B0002
1,304,378 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,156,033 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,217,803 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,384,122 UART:
2,384,551 UART: Running Caliptra ROM ...
2,385,687 UART:
2,385,854 UART: [state] CFI Enabled
2,386,824 UART: [state] LifecycleState = Unprovisioned
2,388,491 UART: [state] DebugLocked = No
2,389,599 UART: [state] WD Timer not started. Device not locked for debugging
2,392,069 UART: [kat] SHA2-256
2,392,740 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,395,750 UART: [kat] ++
2,396,201 UART: [kat] sha1
2,396,715 UART: [kat] SHA2-256
2,397,403 UART: [kat] SHA2-384
2,398,086 UART: [kat] SHA2-512-ACC
2,398,918 UART: [kat] ECC-384
3,774,845 UART: [kat] HMAC-384Kdf
3,801,280 UART: [kat] LMS
4,874,432 UART: [kat] --
4,879,240 UART: [cold-reset] ++
4,881,347 UART: [fht] FHT @ 0x50003400
4,893,902 UART: [idev] ++
4,894,588 UART: [idev] CDI.KEYID = 6
4,895,827 UART: [idev] SUBJECT.KEYID = 7
4,896,932 UART: [idev] UDS.KEYID = 0
4,929,280 UART: [idev] Erasing UDS.KEYID = 0
8,241,774 UART: [idev] Sha1 KeyId Algorithm
8,263,278 UART: [idev] --
8,266,185 UART: [ldev] ++
8,266,751 UART: [ldev] CDI.KEYID = 6
8,267,988 UART: [ldev] SUBJECT.KEYID = 5
8,269,143 UART: [ldev] AUTHORITY.KEYID = 7
8,270,371 UART: [ldev] FE.KEYID = 1
8,296,264 UART: [ldev] Erasing FE.KEYID = 1
11,632,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,181 UART: [ldev] --
14,017,074 UART: [fwproc] Wait for Commands...
14,020,094 UART: [fwproc] Recv command 0x46574c44
14,022,363 UART: [fwproc] Recv'd Img size: 131072 bytes
18,310,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,386,425 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,446,661 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,832,381 >>> mbox cmd response: success
18,837,158 UART: [afmc] ++
18,837,860 UART: [afmc] CDI.KEYID = 6
18,839,048 UART: [afmc] SUBJECT.KEYID = 7
18,840,210 UART: [afmc] AUTHORITY.KEYID = 5
22,205,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,503,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,505,471 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,521,621 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,537,739 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,553,559 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,576,319 UART: [afmc] --
24,581,724 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,739,150 UART: [cold-reset] --
24,740,026 UART: [state] Locking Datavault
24,741,186 UART: [state] Locking PCR0, PCR1 and PCR31
24,742,724 UART: [state] Locking ICCM
24,743,628 UART: [exit] Launching FMC @ 0x40000000
24,745,049 UART:
24,745,217 UART: Running Caliptra FMC ...
24,746,314 UART:
24,746,484 UART: [fmc] Received command: 0x1000000E
25,523,520 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,214,689 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,588,465 >>> mbox cmd response: success
24,281,883 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,439,241 UART:
24,439,624 UART: Running Caliptra FMC ...
24,440,775 UART:
24,440,932 UART: [fmc] Received command: 0x1000000E
25,223,612 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,225,130 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,390,803 UART:
2,391,228 UART: Running Caliptra ROM ...
2,392,321 UART:
2,392,467 UART: [state] CFI Enabled
2,393,435 UART: [state] LifecycleState = Unprovisioned
2,395,096 UART: [state] DebugLocked = No
2,396,120 UART: [state] WD Timer not started. Device not locked for debugging
2,398,583 UART: [kat] SHA2-256
2,399,260 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,402,267 UART: [kat] ++
2,402,706 UART: [kat] sha1
2,403,205 UART: [kat] SHA2-256
2,403,851 UART: [kat] SHA2-384
2,404,498 UART: [kat] SHA2-512-ACC
2,405,289 UART: [kat] ECC-384
4,101,300 UART: [kat] HMAC-384Kdf
4,114,155 UART: [kat] LMS
5,187,308 UART: [kat] --
5,192,853 UART: [cold-reset] ++
5,195,125 UART: [fht] FHT @ 0x50003400
5,205,453 UART: [idev] ++
5,206,130 UART: [idev] CDI.KEYID = 6
5,207,367 UART: [idev] SUBJECT.KEYID = 7
5,208,796 UART: [idev] UDS.KEYID = 0
5,222,151 UART: [idev] Erasing UDS.KEYID = 0
8,497,096 UART: [idev] Sha1 KeyId Algorithm
8,519,122 UART: [idev] --
8,522,001 UART: [ldev] ++
8,522,579 UART: [ldev] CDI.KEYID = 6
8,523,758 UART: [ldev] SUBJECT.KEYID = 5
8,525,237 UART: [ldev] AUTHORITY.KEYID = 7
8,526,793 UART: [ldev] FE.KEYID = 1
8,540,079 UART: [ldev] Erasing FE.KEYID = 1
11,831,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,516 UART: [ldev] --
14,197,546 UART: [fwproc] Wait for Commands...
14,199,443 UART: [fwproc] Recv command 0x46574c44
14,201,751 UART: [fwproc] Recv'd Img size: 131072 bytes
18,480,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,554,598 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,614,849 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
19,000,147 >>> mbox cmd response: success
19,004,541 UART: [afmc] ++
19,005,260 UART: [afmc] CDI.KEYID = 6
19,006,450 UART: [afmc] SUBJECT.KEYID = 7
19,007,567 UART: [afmc] AUTHORITY.KEYID = 5
22,323,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,615,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,617,936 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,634,104 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,650,196 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,666,056 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,689,949 UART: [afmc] --
24,696,153 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,853,409 UART: [cold-reset] --
24,854,259 UART: [state] Locking Datavault
24,855,322 UART: [state] Locking PCR0, PCR1 and PCR31
24,856,851 UART: [state] Locking ICCM
24,857,721 UART: [exit] Launching FMC @ 0x40000000
24,859,054 UART:
24,859,197 UART: Running Caliptra FMC ...
24,860,290 UART:
24,860,433 UART: [fmc] Received command: 0x1000000E
25,637,795 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,218,076 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,807,023 >>> mbox cmd response: success
24,435,295 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,593,077 UART:
24,593,478 UART: Running Caliptra FMC ...
24,594,617 UART:
24,594,764 UART: [fmc] Received command: 0x1000000E
25,377,465 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,229,570 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,395,382 UART:
2,395,804 UART: Running Caliptra ROM ...
2,396,895 UART:
2,397,048 UART: [state] CFI Enabled
2,398,026 UART: [state] LifecycleState = Unprovisioned
2,399,695 UART: [state] DebugLocked = No
2,400,806 UART: [state] WD Timer not started. Device not locked for debugging
2,403,280 UART: [kat] SHA2-256
2,403,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,406,961 UART: [kat] ++
2,407,437 UART: [kat] sha1
2,407,953 UART: [kat] SHA2-256
2,408,699 UART: [kat] SHA2-384
2,409,362 UART: [kat] SHA2-512-ACC
2,410,190 UART: [kat] ECC-384
2,947,047 UART: [kat] HMAC-384Kdf
2,970,313 UART: [kat] LMS
3,499,779 UART: [kat] --
3,503,961 UART: [cold-reset] ++
3,506,109 UART: [fht] FHT @ 0x50003400
3,517,264 UART: [idev] ++
3,517,873 UART: [idev] CDI.KEYID = 6
3,518,762 UART: [idev] SUBJECT.KEYID = 7
3,519,984 UART: [idev] UDS.KEYID = 0
3,541,743 UART: [idev] Erasing UDS.KEYID = 0
6,023,186 UART: [idev] Sha1 KeyId Algorithm
6,045,499 UART: [idev] --
6,049,612 UART: [ldev] ++
6,050,186 UART: [ldev] CDI.KEYID = 6
6,051,072 UART: [ldev] SUBJECT.KEYID = 5
6,052,293 UART: [ldev] AUTHORITY.KEYID = 7
6,053,529 UART: [ldev] FE.KEYID = 1
6,097,872 UART: [ldev] Erasing FE.KEYID = 1
8,602,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,923 UART: [ldev] --
10,414,253 UART: [fwproc] Wait for Commands...
10,417,324 UART: [fwproc] Recv command 0x46574c44
10,419,371 UART: [fwproc] Recv'd Img size: 131072 bytes
14,023,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,935 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,159,269 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,544,665 >>> mbox cmd response: success
14,549,703 UART: [afmc] ++
14,550,324 UART: [afmc] CDI.KEYID = 6
14,551,212 UART: [afmc] SUBJECT.KEYID = 7
14,552,318 UART: [afmc] AUTHORITY.KEYID = 5
17,081,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,807,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,809,340 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,825,373 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,841,444 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,857,142 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,880,954 UART: [afmc] --
18,887,415 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,044,728 UART: [cold-reset] --
19,045,600 UART: [state] Locking Datavault
19,046,760 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,303 UART: [state] Locking ICCM
19,049,210 UART: [exit] Launching FMC @ 0x40000000
19,050,633 UART:
19,050,792 UART: Running Caliptra FMC ...
19,051,891 UART:
19,052,048 UART: [fmc] Received command: 0x1000000E
19,829,146 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,218,915 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,352,608 >>> mbox cmd response: success
18,627,703 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,785,095 UART:
18,785,486 UART: Running Caliptra FMC ...
18,786,631 UART:
18,786,791 UART: [fmc] Received command: 0x1000000E
19,569,474 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,227,571 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,393,355 UART:
2,393,780 UART: Running Caliptra ROM ...
2,394,952 UART:
2,395,120 UART: [state] CFI Enabled
2,396,083 UART: [state] LifecycleState = Unprovisioned
2,397,973 UART: [state] DebugLocked = No
2,399,091 UART: [state] WD Timer not started. Device not locked for debugging
2,401,572 UART: [kat] SHA2-256
2,402,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,405,270 UART: [kat] ++
2,405,723 UART: [kat] sha1
2,406,237 UART: [kat] SHA2-256
2,406,974 UART: [kat] SHA2-384
2,407,637 UART: [kat] SHA2-512-ACC
2,408,471 UART: [kat] ECC-384
3,277,460 UART: [kat] HMAC-384Kdf
3,291,411 UART: [kat] LMS
3,820,930 UART: [kat] --
3,825,343 UART: [cold-reset] ++
3,826,564 UART: [fht] FHT @ 0x50003400
3,837,702 UART: [idev] ++
3,838,311 UART: [idev] CDI.KEYID = 6
3,839,226 UART: [idev] SUBJECT.KEYID = 7
3,840,509 UART: [idev] UDS.KEYID = 0
3,857,808 UART: [idev] Erasing UDS.KEYID = 0
6,315,566 UART: [idev] Sha1 KeyId Algorithm
6,337,240 UART: [idev] --
6,340,505 UART: [ldev] ++
6,341,079 UART: [ldev] CDI.KEYID = 6
6,341,992 UART: [ldev] SUBJECT.KEYID = 5
6,343,144 UART: [ldev] AUTHORITY.KEYID = 7
6,344,424 UART: [ldev] FE.KEYID = 1
6,353,608 UART: [ldev] Erasing FE.KEYID = 1
8,825,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,849 UART: [ldev] --
10,616,865 UART: [fwproc] Wait for Commands...
10,619,386 UART: [fwproc] Recv command 0x46574c44
10,621,499 UART: [fwproc] Recv'd Img size: 131072 bytes
14,224,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,293,736 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,354,056 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,738,509 >>> mbox cmd response: success
14,743,390 UART: [afmc] ++
14,743,973 UART: [afmc] CDI.KEYID = 6
14,744,880 UART: [afmc] SUBJECT.KEYID = 7
14,746,089 UART: [afmc] AUTHORITY.KEYID = 5
17,245,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,963,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,157 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,981,215 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,997,257 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,012,920 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,033,992 UART: [afmc] --
19,040,328 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,197,633 UART: [cold-reset] --
19,198,492 UART: [state] Locking Datavault
19,199,642 UART: [state] Locking PCR0, PCR1 and PCR31
19,201,173 UART: [state] Locking ICCM
19,202,078 UART: [exit] Launching FMC @ 0x40000000
19,203,502 UART:
19,203,662 UART: Running Caliptra FMC ...
19,204,758 UART:
19,204,909 UART: [fmc] Received command: 0x1000000E
19,981,909 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,218,942 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,540,283 >>> mbox cmd response: success
18,776,888 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,934,636 UART:
18,935,011 UART: Running Caliptra FMC ...
18,936,235 UART:
18,936,416 UART: [fmc] Received command: 0x1000000E
19,719,049 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,228,569 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,394,367 UART:
2,394,786 UART: Running Caliptra ROM ...
2,395,869 UART:
2,396,025 UART: [state] CFI Enabled
2,397,002 UART: [state] LifecycleState = Unprovisioned
2,398,675 UART: [state] DebugLocked = No
2,399,705 UART: [state] WD Timer not started. Device not locked for debugging
2,402,177 UART: [kat] SHA2-256
2,402,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,405,876 UART: [kat] ++
2,406,323 UART: [kat] sha1
2,406,839 UART: [kat] SHA2-256
2,407,493 UART: [kat] SHA2-384
2,408,146 UART: [kat] SHA2-512-ACC
2,409,168 UART: [kat] ECC-384
2,948,592 UART: [kat] HMAC-384Kdf
2,971,430 UART: [kat] LMS
3,500,858 UART: [kat] --
3,506,229 UART: [cold-reset] ++
3,508,106 UART: [fht] FHT @ 0x50003400
3,518,380 UART: [idev] ++
3,518,940 UART: [idev] CDI.KEYID = 6
3,519,819 UART: [idev] SUBJECT.KEYID = 7
3,521,088 UART: [idev] UDS.KEYID = 0
3,543,541 UART: [idev] Erasing UDS.KEYID = 0
6,026,696 UART: [idev] Sha1 KeyId Algorithm
6,051,170 UART: [idev] --
6,055,110 UART: [ldev] ++
6,055,682 UART: [ldev] CDI.KEYID = 6
6,056,561 UART: [ldev] SUBJECT.KEYID = 5
6,057,730 UART: [ldev] AUTHORITY.KEYID = 7
6,059,023 UART: [ldev] FE.KEYID = 1
6,098,536 UART: [ldev] Erasing FE.KEYID = 1
8,602,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,241 UART: [ldev] --
10,411,475 UART: [fwproc] Wait for Commands...
10,414,166 UART: [fwproc] Recv command 0x46574c44
10,416,282 UART: [fwproc] Recv'd Img size: 131072 bytes
14,024,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,875 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,159,226 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,544,661 >>> mbox cmd response: success
14,548,430 UART: [afmc] ++
14,549,013 UART: [afmc] CDI.KEYID = 6
14,549,896 UART: [afmc] SUBJECT.KEYID = 7
14,551,114 UART: [afmc] AUTHORITY.KEYID = 5
17,081,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,825,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,827,579 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,843,627 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,859,708 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,875,420 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,897,644 UART: [afmc] --
18,903,267 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,060,560 UART: [cold-reset] --
19,061,420 UART: [state] Locking Datavault
19,062,494 UART: [state] Locking PCR0, PCR1 and PCR31
19,064,038 UART: [state] Locking ICCM
19,064,954 UART: [exit] Launching FMC @ 0x40000000
19,066,384 UART:
19,066,544 UART: Running Caliptra FMC ...
19,067,648 UART:
19,067,807 UART: [fmc] Received command: 0x1000000E
19,844,963 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
2,216,636 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,333,749 >>> mbox cmd response: success
18,605,009 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,762,415 UART:
18,762,797 UART: Running Caliptra FMC ...
18,764,008 UART:
18,764,184 UART: [fmc] Received command: 0x1000000E
19,546,812 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,223,662 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,521 UART:
2,389,936 UART: Running Caliptra ROM ...
2,391,096 UART:
2,391,268 UART: [state] CFI Enabled
2,392,184 UART: [state] LifecycleState = Unprovisioned
2,393,846 UART: [state] DebugLocked = No
2,394,973 UART: [state] WD Timer not started. Device not locked for debugging
2,397,444 UART: [kat] SHA2-256
2,398,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,127 UART: [kat] ++
2,401,574 UART: [kat] sha1
2,402,086 UART: [kat] SHA2-256
2,402,827 UART: [kat] SHA2-384
2,403,494 UART: [kat] SHA2-512-ACC
2,404,328 UART: [kat] ECC-384
3,280,920 UART: [kat] HMAC-384Kdf
3,293,473 UART: [kat] LMS
3,822,996 UART: [kat] --
3,827,202 UART: [cold-reset] ++
3,828,813 UART: [fht] FHT @ 0x50003400
3,838,707 UART: [idev] ++
3,839,268 UART: [idev] CDI.KEYID = 6
3,840,196 UART: [idev] SUBJECT.KEYID = 7
3,841,354 UART: [idev] UDS.KEYID = 0
3,858,391 UART: [idev] Erasing UDS.KEYID = 0
6,312,236 UART: [idev] Sha1 KeyId Algorithm
6,334,652 UART: [idev] --
6,338,966 UART: [ldev] ++
6,339,531 UART: [ldev] CDI.KEYID = 6
6,340,411 UART: [ldev] SUBJECT.KEYID = 5
6,341,620 UART: [ldev] AUTHORITY.KEYID = 7
6,342,856 UART: [ldev] FE.KEYID = 1
6,354,026 UART: [ldev] Erasing FE.KEYID = 1
8,829,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,160 UART: [ldev] --
10,620,566 UART: [fwproc] Wait for Commands...
10,622,394 UART: [fwproc] Recv command 0x46574c44
10,624,434 UART: [fwproc] Recv'd Img size: 131072 bytes
14,229,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,305,346 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,365,679 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,751,149 >>> mbox cmd response: success
14,756,247 UART: [afmc] ++
14,756,837 UART: [afmc] CDI.KEYID = 6
14,757,754 UART: [afmc] SUBJECT.KEYID = 7
14,758,910 UART: [afmc] AUTHORITY.KEYID = 5
17,258,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,979,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,981,171 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,997,272 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,013,262 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,028,982 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,051,662 UART: [afmc] --
19,057,471 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,214,744 UART: [cold-reset] --
19,215,600 UART: [state] Locking Datavault
19,216,755 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,290 UART: [state] Locking ICCM
19,219,198 UART: [exit] Launching FMC @ 0x40000000
19,220,623 UART:
19,220,780 UART: Running Caliptra FMC ...
19,221,879 UART:
19,222,032 UART: [fmc] Received command: 0x1000000E
19,999,180 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
2,223,700 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,531,624 >>> mbox cmd response: success
18,769,116 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,926,511 UART:
18,926,881 UART: Running Caliptra FMC ...
18,928,092 UART:
18,928,260 UART: [fmc] Received command: 0x1000000E
19,710,914 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
891,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,856 UART: [kat] HMAC-384Kdf
921,452 UART: [kat] LMS
1,169,764 UART: [kat] --
1,170,847 UART: [cold-reset] ++
1,171,351 UART: [fht] FHT @ 0x50003400
1,174,019 UART: [idev] ++
1,174,187 UART: [idev] CDI.KEYID = 6
1,174,548 UART: [idev] SUBJECT.KEYID = 7
1,174,973 UART: [idev] UDS.KEYID = 0
1,183,235 UART: [idev] Erasing UDS.KEYID = 0
1,200,411 UART: [idev] Sha1 KeyId Algorithm
1,209,233 UART: [idev] --
1,210,326 UART: [ldev] ++
1,210,494 UART: [ldev] CDI.KEYID = 6
1,210,858 UART: [ldev] SUBJECT.KEYID = 5
1,211,285 UART: [ldev] AUTHORITY.KEYID = 7
1,211,748 UART: [ldev] FE.KEYID = 1
1,216,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,662 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,753 UART: [fwproc] Recv command 0x46574c44
1,283,486 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,802 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,487 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,007 >>> mbox cmd response: success
2,991,116 UART: [afmc] ++
2,991,284 UART: [afmc] CDI.KEYID = 6
2,991,647 UART: [afmc] SUBJECT.KEYID = 7
2,992,073 UART: [afmc] AUTHORITY.KEYID = 5
3,028,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,477 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,173 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,072 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,765 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,683 UART: [afmc] --
3,071,651 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,673 UART: [cold-reset] --
3,072,557 UART: [state] Locking Datavault
3,073,742 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,346 UART: [state] Locking ICCM
3,074,938 UART: [exit] Launching FMC @ 0x40000000
3,080,235 UART:
3,080,251 UART: Running Caliptra FMC ...
3,080,659 UART:
3,080,889 UART: [fmc] Received command: 0x1000000E
3,425,943 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,836,755 >>> mbox cmd response: success
2,892,034 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,898,473 UART:
2,898,489 UART: Running Caliptra FMC ...
2,898,897 UART:
2,899,127 UART: [fmc] Received command: 0x1000000E
3,244,181 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,974 UART: [kat] ++
896,126 UART: [kat] sha1
900,470 UART: [kat] SHA2-256
902,410 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,485 UART: [fwproc] Wait for Commands...
1,282,278 UART: [fwproc] Recv command 0x46574c44
1,283,011 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,647 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,332 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,914 >>> mbox cmd response: success
2,991,059 UART: [afmc] ++
2,991,227 UART: [afmc] CDI.KEYID = 6
2,991,590 UART: [afmc] SUBJECT.KEYID = 7
2,992,016 UART: [afmc] AUTHORITY.KEYID = 5
3,027,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,864 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,560 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,459 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,152 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,922 UART: [afmc] --
3,070,816 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,838 UART: [cold-reset] --
3,071,516 UART: [state] Locking Datavault
3,072,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,381 UART: [state] Locking ICCM
3,074,015 UART: [exit] Launching FMC @ 0x40000000
3,079,312 UART:
3,079,328 UART: Running Caliptra FMC ...
3,079,736 UART:
3,079,966 UART: [fmc] Received command: 0x1000000E
3,425,020 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,562 >>> mbox cmd response: success
2,895,083 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,944 UART:
2,900,960 UART: Running Caliptra FMC ...
2,901,368 UART:
2,901,598 UART: [fmc] Received command: 0x1000000E
3,246,652 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,550 UART: [kat] LMS
1,168,862 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,173,107 UART: [idev] ++
1,173,275 UART: [idev] CDI.KEYID = 6
1,173,636 UART: [idev] SUBJECT.KEYID = 7
1,174,061 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,637 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,220 UART: [ldev] --
1,280,722 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,978 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,663 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,143 >>> mbox cmd response: success
2,990,166 UART: [afmc] ++
2,990,334 UART: [afmc] CDI.KEYID = 6
2,990,697 UART: [afmc] SUBJECT.KEYID = 7
2,991,123 UART: [afmc] AUTHORITY.KEYID = 5
3,026,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,679 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,375 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,274 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,967 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,765 UART: [afmc] --
3,069,845 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,867 UART: [cold-reset] --
3,070,697 UART: [state] Locking Datavault
3,071,984 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,588 UART: [state] Locking ICCM
3,073,070 UART: [exit] Launching FMC @ 0x40000000
3,078,367 UART:
3,078,383 UART: Running Caliptra FMC ...
3,078,791 UART:
3,079,021 UART: [fmc] Received command: 0x1000000E
3,424,075 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,189 >>> mbox cmd response: success
2,895,460 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,707 UART:
2,901,723 UART: Running Caliptra FMC ...
2,902,131 UART:
2,902,361 UART: [fmc] Received command: 0x1000000E
3,247,415 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,713 UART: [ldev] ++
1,209,881 UART: [ldev] CDI.KEYID = 6
1,210,245 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,025 UART: [fwproc] Wait for Commands...
1,282,612 UART: [fwproc] Recv command 0x46574c44
1,283,345 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,419 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,104 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,674 >>> mbox cmd response: success
2,989,869 UART: [afmc] ++
2,990,037 UART: [afmc] CDI.KEYID = 6
2,990,400 UART: [afmc] SUBJECT.KEYID = 7
2,990,826 UART: [afmc] AUTHORITY.KEYID = 5
3,026,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,356 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,052 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,951 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,644 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,474 UART: [afmc] --
3,070,570 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,592 UART: [cold-reset] --
3,071,500 UART: [state] Locking Datavault
3,072,631 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,235 UART: [state] Locking ICCM
3,073,817 UART: [exit] Launching FMC @ 0x40000000
3,079,114 UART:
3,079,130 UART: Running Caliptra FMC ...
3,079,538 UART:
3,079,768 UART: [fmc] Received command: 0x1000000E
3,424,822 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,302 >>> mbox cmd response: success
2,897,351 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,470 UART:
2,903,486 UART: Running Caliptra FMC ...
2,903,894 UART:
2,904,124 UART: [fmc] Received command: 0x1000000E
3,249,178 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,250 UART: [ldev] Erasing FE.KEYID = 1
1,241,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,797,628 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,313 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,987,939 >>> mbox cmd response: success
2,989,012 UART: [afmc] ++
2,989,180 UART: [afmc] CDI.KEYID = 6
2,989,543 UART: [afmc] SUBJECT.KEYID = 7
2,989,969 UART: [afmc] AUTHORITY.KEYID = 5
3,025,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,041,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,707 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,403 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,302 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,059,995 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,067,845 UART: [afmc] --
3,068,891 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,068,913 UART: [cold-reset] --
3,069,611 UART: [state] Locking Datavault
3,070,808 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,412 UART: [state] Locking ICCM
3,071,924 UART: [exit] Launching FMC @ 0x40000000
3,077,221 UART:
3,077,237 UART: Running Caliptra FMC ...
3,077,645 UART:
3,077,875 UART: [fmc] Received command: 0x1000000E
3,422,929 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,153 >>> mbox cmd response: success
2,895,198 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,431 UART:
2,901,447 UART: Running Caliptra FMC ...
2,901,855 UART:
2,902,085 UART: [fmc] Received command: 0x1000000E
3,247,139 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,330 UART: [kat] SHA2-256
902,270 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,725 UART: [kat] HMAC-384Kdf
921,349 UART: [kat] LMS
1,169,661 UART: [kat] --
1,170,680 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,842 UART: [idev] ++
1,174,010 UART: [idev] CDI.KEYID = 6
1,174,371 UART: [idev] SUBJECT.KEYID = 7
1,174,796 UART: [idev] UDS.KEYID = 0
1,182,678 UART: [idev] Erasing UDS.KEYID = 0
1,199,734 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,987 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,672 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,382 >>> mbox cmd response: success
2,991,419 UART: [afmc] ++
2,991,587 UART: [afmc] CDI.KEYID = 6
2,991,950 UART: [afmc] SUBJECT.KEYID = 7
2,992,376 UART: [afmc] AUTHORITY.KEYID = 5
3,028,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,342 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,038 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,937 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,630 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,382 UART: [afmc] --
3,071,288 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,310 UART: [cold-reset] --
3,071,916 UART: [state] Locking Datavault
3,073,049 UART: [state] Locking PCR0, PCR1 and PCR31
3,073,653 UART: [state] Locking ICCM
3,074,115 UART: [exit] Launching FMC @ 0x40000000
3,079,412 UART:
3,079,428 UART: Running Caliptra FMC ...
3,079,836 UART:
3,080,066 UART: [fmc] Received command: 0x1000000E
3,425,120 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,412 >>> mbox cmd response: success
2,896,475 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,304 UART:
2,902,320 UART: Running Caliptra FMC ...
2,902,728 UART:
2,902,958 UART: [fmc] Received command: 0x1000000E
3,248,012 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
5,554 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,051 UART:
192,456 UART: Running Caliptra ROM ...
193,545 UART:
193,690 UART: [state] CFI Enabled
262,974 UART: [state] LifecycleState = Unprovisioned
265,324 UART: [state] DebugLocked = No
266,960 UART: [state] WD Timer not started. Device not locked for debugging
271,563 UART: [kat] SHA2-256
453,498 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,031 UART: [kat] ++
465,479 UART: [kat] sha1
476,413 UART: [kat] SHA2-256
479,419 UART: [kat] SHA2-384
486,793 UART: [kat] SHA2-512-ACC
489,406 UART: [kat] ECC-384
3,778,276 UART: [kat] HMAC-384Kdf
3,804,075 UART: [kat] LMS
4,877,226 UART: [kat] --
4,883,451 UART: [cold-reset] ++
4,885,544 UART: [fht] FHT @ 0x50003400
4,897,221 UART: [idev] ++
4,897,953 UART: [idev] CDI.KEYID = 6
4,899,153 UART: [idev] SUBJECT.KEYID = 7
4,900,256 UART: [idev] UDS.KEYID = 0
4,931,136 UART: [idev] Erasing UDS.KEYID = 0
8,245,568 UART: [idev] Sha1 KeyId Algorithm
8,269,034 UART: [idev] --
8,273,030 UART: [ldev] ++
8,273,596 UART: [ldev] CDI.KEYID = 6
8,274,836 UART: [ldev] SUBJECT.KEYID = 5
8,276,002 UART: [ldev] AUTHORITY.KEYID = 7
8,277,166 UART: [ldev] FE.KEYID = 1
8,321,914 UART: [ldev] Erasing FE.KEYID = 1
11,656,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,969,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,986,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,002,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,018,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,039,252 UART: [ldev] --
14,043,679 UART: [fwproc] Wait for Commands...
14,046,577 UART: [fwproc] Recv command 0x46574c44
14,048,906 UART: [fwproc] Recv'd Img size: 113760 bytes
14,116,143 UART: ROM Fatal Error: 0x000B0007
14,119,522 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
5,402 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,894,732 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
6,880 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,616 UART:
193,004 UART: Running Caliptra ROM ...
194,109 UART:
603,599 UART: [state] CFI Enabled
616,669 UART: [state] LifecycleState = Unprovisioned
619,081 UART: [state] DebugLocked = No
621,462 UART: [state] WD Timer not started. Device not locked for debugging
626,920 UART: [kat] SHA2-256
808,894 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,419 UART: [kat] ++
820,922 UART: [kat] sha1
832,278 UART: [kat] SHA2-256
835,309 UART: [kat] SHA2-384
841,553 UART: [kat] SHA2-512-ACC
844,158 UART: [kat] ECC-384
4,098,786 UART: [kat] HMAC-384Kdf
4,110,044 UART: [kat] LMS
5,183,194 UART: [kat] --
5,185,754 UART: [cold-reset] ++
5,187,208 UART: [fht] FHT @ 0x50003400
5,198,370 UART: [idev] ++
5,199,042 UART: [idev] CDI.KEYID = 6
5,200,222 UART: [idev] SUBJECT.KEYID = 7
5,201,702 UART: [idev] UDS.KEYID = 0
5,216,482 UART: [idev] Erasing UDS.KEYID = 0
8,487,838 UART: [idev] Sha1 KeyId Algorithm
8,509,278 UART: [idev] --
8,513,101 UART: [ldev] ++
8,513,682 UART: [ldev] CDI.KEYID = 6
8,514,862 UART: [ldev] SUBJECT.KEYID = 5
8,516,345 UART: [ldev] AUTHORITY.KEYID = 7
8,517,821 UART: [ldev] FE.KEYID = 1
8,527,223 UART: [ldev] Erasing FE.KEYID = 1
11,821,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,043 UART: [ldev] --
14,184,442 UART: [fwproc] Wait for Commands...
14,186,372 UART: [fwproc] Recv command 0x46574c44
14,188,680 UART: [fwproc] Recv'd Img size: 113760 bytes
14,258,315 UART: ROM Fatal Error: 0x000B0007
14,261,723 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
6,178 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,079,888 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
5,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,400 UART:
192,784 UART: Running Caliptra ROM ...
193,969 UART:
194,125 UART: [state] CFI Enabled
267,964 UART: [state] LifecycleState = Unprovisioned
269,886 UART: [state] DebugLocked = No
271,433 UART: [state] WD Timer not started. Device not locked for debugging
275,282 UART: [kat] SHA2-256
454,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,009 UART: [kat] ++
466,552 UART: [kat] sha1
478,946 UART: [kat] SHA2-256
481,951 UART: [kat] SHA2-384
487,334 UART: [kat] SHA2-512-ACC
490,267 UART: [kat] ECC-384
2,948,326 UART: [kat] HMAC-384Kdf
2,970,576 UART: [kat] LMS
3,500,029 UART: [kat] --
3,502,107 UART: [cold-reset] ++
3,503,501 UART: [fht] FHT @ 0x50003400
3,514,392 UART: [idev] ++
3,514,982 UART: [idev] CDI.KEYID = 6
3,515,871 UART: [idev] SUBJECT.KEYID = 7
3,517,113 UART: [idev] UDS.KEYID = 0
3,542,923 UART: [idev] Erasing UDS.KEYID = 0
6,025,368 UART: [idev] Sha1 KeyId Algorithm
6,047,412 UART: [idev] --
6,051,360 UART: [ldev] ++
6,051,939 UART: [ldev] CDI.KEYID = 6
6,052,830 UART: [ldev] SUBJECT.KEYID = 5
6,053,942 UART: [ldev] AUTHORITY.KEYID = 7
6,055,293 UART: [ldev] FE.KEYID = 1
6,099,466 UART: [ldev] Erasing FE.KEYID = 1
8,602,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,491 UART: [ldev] --
10,414,516 UART: [fwproc] Wait for Commands...
10,416,302 UART: [fwproc] Recv command 0x46574c44
10,418,401 UART: [fwproc] Recv'd Img size: 114084 bytes
10,481,098 UART: ROM Fatal Error: 0x000B0007
10,484,193 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
5,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,289,196 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
6,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,501 UART:
192,897 UART: Running Caliptra ROM ...
193,997 UART:
603,397 UART: [state] CFI Enabled
616,199 UART: [state] LifecycleState = Unprovisioned
618,080 UART: [state] DebugLocked = No
620,219 UART: [state] WD Timer not started. Device not locked for debugging
624,040 UART: [kat] SHA2-256
803,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,757 UART: [kat] ++
815,308 UART: [kat] sha1
826,267 UART: [kat] SHA2-256
829,324 UART: [kat] SHA2-384
836,480 UART: [kat] SHA2-512-ACC
839,416 UART: [kat] ECC-384
3,280,587 UART: [kat] HMAC-384Kdf
3,293,413 UART: [kat] LMS
3,822,941 UART: [kat] --
3,828,090 UART: [cold-reset] ++
3,829,107 UART: [fht] FHT @ 0x50003400
3,840,893 UART: [idev] ++
3,841,462 UART: [idev] CDI.KEYID = 6
3,842,426 UART: [idev] SUBJECT.KEYID = 7
3,843,579 UART: [idev] UDS.KEYID = 0
3,858,319 UART: [idev] Erasing UDS.KEYID = 0
6,313,422 UART: [idev] Sha1 KeyId Algorithm
6,337,172 UART: [idev] --
6,340,463 UART: [ldev] ++
6,341,040 UART: [ldev] CDI.KEYID = 6
6,341,954 UART: [ldev] SUBJECT.KEYID = 5
6,343,113 UART: [ldev] AUTHORITY.KEYID = 7
6,344,396 UART: [ldev] FE.KEYID = 1
6,354,014 UART: [ldev] Erasing FE.KEYID = 1
8,825,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,617 UART: [ldev] --
10,611,691 UART: [fwproc] Wait for Commands...
10,614,323 UART: [fwproc] Recv command 0x46574c44
10,616,413 UART: [fwproc] Recv'd Img size: 114084 bytes
10,686,340 UART: ROM Fatal Error: 0x000B0007
10,689,441 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
6,125 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,471,065 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,113 UART:
192,513 UART: Running Caliptra ROM ...
193,710 UART:
193,867 UART: [state] CFI Enabled
262,578 UART: [state] LifecycleState = Unprovisioned
264,532 UART: [state] DebugLocked = No
266,136 UART: [state] WD Timer not started. Device not locked for debugging
269,207 UART: [kat] SHA2-256
448,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,906 UART: [kat] ++
460,444 UART: [kat] sha1
472,331 UART: [kat] SHA2-256
475,365 UART: [kat] SHA2-384
481,614 UART: [kat] SHA2-512-ACC
484,600 UART: [kat] ECC-384
2,950,250 UART: [kat] HMAC-384Kdf
2,970,426 UART: [kat] LMS
3,499,887 UART: [kat] --
3,505,335 UART: [cold-reset] ++
3,506,892 UART: [fht] FHT @ 0x50003400
3,516,737 UART: [idev] ++
3,517,306 UART: [idev] CDI.KEYID = 6
3,518,234 UART: [idev] SUBJECT.KEYID = 7
3,519,394 UART: [idev] UDS.KEYID = 0
3,542,610 UART: [idev] Erasing UDS.KEYID = 0
6,025,057 UART: [idev] Sha1 KeyId Algorithm
6,047,594 UART: [idev] --
6,052,296 UART: [ldev] ++
6,052,896 UART: [ldev] CDI.KEYID = 6
6,053,816 UART: [ldev] SUBJECT.KEYID = 5
6,054,979 UART: [ldev] AUTHORITY.KEYID = 7
6,056,216 UART: [ldev] FE.KEYID = 1
6,099,165 UART: [ldev] Erasing FE.KEYID = 1
8,608,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,662 UART: [ldev] --
10,412,394 UART: [fwproc] Wait for Commands...
10,414,051 UART: [fwproc] Recv command 0x46574c44
10,416,163 UART: [fwproc] Recv'd Img size: 114084 bytes
10,482,099 UART: ROM Fatal Error: 0x000B0007
10,485,206 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
5,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,288,160 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
6,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,439 UART:
192,824 UART: Running Caliptra ROM ...
193,929 UART:
603,563 UART: [state] CFI Enabled
620,252 UART: [state] LifecycleState = Unprovisioned
622,094 UART: [state] DebugLocked = No
624,041 UART: [state] WD Timer not started. Device not locked for debugging
628,311 UART: [kat] SHA2-256
807,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,992 UART: [kat] ++
819,442 UART: [kat] sha1
831,178 UART: [kat] SHA2-256
834,245 UART: [kat] SHA2-384
839,461 UART: [kat] SHA2-512-ACC
842,387 UART: [kat] ECC-384
3,285,433 UART: [kat] HMAC-384Kdf
3,297,113 UART: [kat] LMS
3,826,617 UART: [kat] --
3,830,875 UART: [cold-reset] ++
3,831,775 UART: [fht] FHT @ 0x50003400
3,842,477 UART: [idev] ++
3,843,035 UART: [idev] CDI.KEYID = 6
3,844,050 UART: [idev] SUBJECT.KEYID = 7
3,845,170 UART: [idev] UDS.KEYID = 0
3,863,894 UART: [idev] Erasing UDS.KEYID = 0
6,322,711 UART: [idev] Sha1 KeyId Algorithm
6,344,823 UART: [idev] --
6,348,795 UART: [ldev] ++
6,349,375 UART: [ldev] CDI.KEYID = 6
6,350,288 UART: [ldev] SUBJECT.KEYID = 5
6,351,447 UART: [ldev] AUTHORITY.KEYID = 7
6,352,674 UART: [ldev] FE.KEYID = 1
6,364,243 UART: [ldev] Erasing FE.KEYID = 1
8,837,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,367 UART: [ldev] --
10,630,435 UART: [fwproc] Wait for Commands...
10,632,637 UART: [fwproc] Recv command 0x46574c44
10,634,730 UART: [fwproc] Recv'd Img size: 114084 bytes
10,700,548 UART: ROM Fatal Error: 0x000B0007
10,703,634 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
6,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,476,700 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,532 UART: [ldev] --
1,279,986 UART: [fwproc] Wait for Commands...
1,280,675 UART: [fwproc] Recv command 0x46574c44
1,281,408 UART: [fwproc] Recv'd Img size: 114084 bytes
1,305,085 UART: ROM Fatal Error: 0x000B0007
1,306,242 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,735 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,309 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,215,935 UART: [ldev] Erasing FE.KEYID = 1
1,242,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,038 UART: [fwproc] Recv command 0x46574c44
1,282,771 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,764 UART: ROM Fatal Error: 0x000B0007
1,307,921 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,100 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,715 UART: [idev] ++
1,172,883 UART: [idev] CDI.KEYID = 6
1,173,244 UART: [idev] SUBJECT.KEYID = 7
1,173,669 UART: [idev] UDS.KEYID = 0
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,637 UART: [idev] --
1,208,798 UART: [ldev] ++
1,208,966 UART: [ldev] CDI.KEYID = 6
1,209,330 UART: [ldev] SUBJECT.KEYID = 5
1,209,757 UART: [ldev] AUTHORITY.KEYID = 7
1,210,220 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,568 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,721 UART: [fwproc] Recv command 0x46574c44
1,282,454 UART: [fwproc] Recv'd Img size: 114084 bytes
1,305,913 UART: ROM Fatal Error: 0x000B0007
1,307,070 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,158,415 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,698 UART: [cold-reset] ++
1,171,232 UART: [fht] FHT @ 0x50003400
1,173,884 UART: [idev] ++
1,174,052 UART: [idev] CDI.KEYID = 6
1,174,413 UART: [idev] SUBJECT.KEYID = 7
1,174,838 UART: [idev] UDS.KEYID = 0
1,183,246 UART: [idev] Erasing UDS.KEYID = 0
1,200,340 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,809 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,673 UART: [ldev] --
1,282,027 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,469 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,794 UART: ROM Fatal Error: 0x000B0007
1,307,951 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,158,994 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,458 UART: [kat] HMAC-384Kdf
919,850 UART: [kat] LMS
1,168,162 UART: [kat] --
1,169,227 UART: [cold-reset] ++
1,169,731 UART: [fht] FHT @ 0x50003400
1,172,465 UART: [idev] ++
1,172,633 UART: [idev] CDI.KEYID = 6
1,172,994 UART: [idev] SUBJECT.KEYID = 7
1,173,419 UART: [idev] UDS.KEYID = 0
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,197,619 UART: [idev] Sha1 KeyId Algorithm
1,206,705 UART: [idev] --
1,207,678 UART: [ldev] ++
1,207,846 UART: [ldev] CDI.KEYID = 6
1,208,210 UART: [ldev] SUBJECT.KEYID = 5
1,208,637 UART: [ldev] AUTHORITY.KEYID = 7
1,209,100 UART: [ldev] FE.KEYID = 1
1,214,126 UART: [ldev] Erasing FE.KEYID = 1
1,239,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,182 UART: [ldev] --
1,278,644 UART: [fwproc] Wait for Commands...
1,279,333 UART: [fwproc] Recv command 0x46574c44
1,280,066 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,321 UART: ROM Fatal Error: 0x000B0007
1,305,478 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,861 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,713 UART: [kat] HMAC-384Kdf
921,251 UART: [kat] LMS
1,169,563 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,287 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,646 UART: ROM Fatal Error: 0x000B0007
1,307,803 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,200 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
5,546 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,062 UART:
192,468 UART: Running Caliptra ROM ...
193,575 UART:
193,716 UART: [state] CFI Enabled
262,132 UART: [state] LifecycleState = Unprovisioned
264,531 UART: [state] DebugLocked = No
266,370 UART: [state] WD Timer not started. Device not locked for debugging
271,003 UART: [kat] SHA2-256
452,911 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,433 UART: [kat] ++
464,931 UART: [kat] sha1
474,898 UART: [kat] SHA2-256
477,914 UART: [kat] SHA2-384
484,319 UART: [kat] SHA2-512-ACC
486,935 UART: [kat] ECC-384
3,777,730 UART: [kat] HMAC-384Kdf
3,802,939 UART: [kat] LMS
4,876,069 UART: [kat] --
4,880,073 UART: [cold-reset] ++
4,881,361 UART: [fht] FHT @ 0x50003400
4,893,610 UART: [idev] ++
4,894,325 UART: [idev] CDI.KEYID = 6
4,895,440 UART: [idev] SUBJECT.KEYID = 7
4,896,651 UART: [idev] UDS.KEYID = 0
4,930,178 UART: [idev] Erasing UDS.KEYID = 0
8,243,710 UART: [idev] Sha1 KeyId Algorithm
8,264,656 UART: [idev] --
8,269,541 UART: [ldev] ++
8,270,117 UART: [ldev] CDI.KEYID = 6
8,271,358 UART: [ldev] SUBJECT.KEYID = 5
8,272,410 UART: [ldev] AUTHORITY.KEYID = 7
8,273,697 UART: [ldev] FE.KEYID = 1
8,319,073 UART: [ldev] Erasing FE.KEYID = 1
11,652,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,096 UART: [ldev] --
14,036,619 UART: [fwproc] Wait for Commands...
14,038,393 UART: [fwproc] Recv command 0x46574c44
14,040,725 UART: [fwproc] Recv'd Img size: 113760 bytes
14,107,859 UART: ROM Fatal Error: 0x000B0008
14,111,283 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
5,475 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,914,633 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
6,547 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,507 UART:
192,912 UART: Running Caliptra ROM ...
194,002 UART:
603,753 UART: [state] CFI Enabled
615,803 UART: [state] LifecycleState = Unprovisioned
618,146 UART: [state] DebugLocked = No
619,897 UART: [state] WD Timer not started. Device not locked for debugging
624,153 UART: [kat] SHA2-256
806,101 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,671 UART: [kat] ++
818,254 UART: [kat] sha1
829,473 UART: [kat] SHA2-256
832,528 UART: [kat] SHA2-384
838,440 UART: [kat] SHA2-512-ACC
841,062 UART: [kat] ECC-384
4,098,778 UART: [kat] HMAC-384Kdf
4,109,244 UART: [kat] LMS
5,182,362 UART: [kat] --
5,186,524 UART: [cold-reset] ++
5,188,347 UART: [fht] FHT @ 0x50003400
5,200,514 UART: [idev] ++
5,201,246 UART: [idev] CDI.KEYID = 6
5,202,425 UART: [idev] SUBJECT.KEYID = 7
5,203,859 UART: [idev] UDS.KEYID = 0
5,220,159 UART: [idev] Erasing UDS.KEYID = 0
8,492,203 UART: [idev] Sha1 KeyId Algorithm
8,515,406 UART: [idev] --
8,518,341 UART: [ldev] ++
8,518,965 UART: [ldev] CDI.KEYID = 6
8,520,142 UART: [ldev] SUBJECT.KEYID = 5
8,521,726 UART: [ldev] AUTHORITY.KEYID = 7
8,523,189 UART: [ldev] FE.KEYID = 1
8,533,620 UART: [ldev] Erasing FE.KEYID = 1
11,829,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,130 UART: [ldev] --
14,195,388 UART: [fwproc] Wait for Commands...
14,197,106 UART: [fwproc] Recv command 0x46574c44
14,199,422 UART: [fwproc] Recv'd Img size: 113760 bytes
14,265,979 UART: ROM Fatal Error: 0x000B0008
14,269,399 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
6,127 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,081,847 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
5,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,253 UART:
192,633 UART: Running Caliptra ROM ...
193,762 UART:
193,906 UART: [state] CFI Enabled
265,058 UART: [state] LifecycleState = Unprovisioned
267,017 UART: [state] DebugLocked = No
269,158 UART: [state] WD Timer not started. Device not locked for debugging
273,163 UART: [kat] SHA2-256
452,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,898 UART: [kat] ++
464,432 UART: [kat] sha1
475,586 UART: [kat] SHA2-256
478,645 UART: [kat] SHA2-384
484,734 UART: [kat] SHA2-512-ACC
487,724 UART: [kat] ECC-384
2,946,126 UART: [kat] HMAC-384Kdf
2,971,597 UART: [kat] LMS
3,501,054 UART: [kat] --
3,506,417 UART: [cold-reset] ++
3,507,842 UART: [fht] FHT @ 0x50003400
3,519,437 UART: [idev] ++
3,520,032 UART: [idev] CDI.KEYID = 6
3,520,918 UART: [idev] SUBJECT.KEYID = 7
3,522,132 UART: [idev] UDS.KEYID = 0
3,543,617 UART: [idev] Erasing UDS.KEYID = 0
6,024,740 UART: [idev] Sha1 KeyId Algorithm
6,048,088 UART: [idev] --
6,052,630 UART: [ldev] ++
6,053,203 UART: [ldev] CDI.KEYID = 6
6,054,112 UART: [ldev] SUBJECT.KEYID = 5
6,055,270 UART: [ldev] AUTHORITY.KEYID = 7
6,056,560 UART: [ldev] FE.KEYID = 1
6,098,863 UART: [ldev] Erasing FE.KEYID = 1
8,602,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,601 UART: [ldev] --
10,413,387 UART: [fwproc] Wait for Commands...
10,415,542 UART: [fwproc] Recv command 0x46574c44
10,417,643 UART: [fwproc] Recv'd Img size: 114084 bytes
10,488,180 UART: ROM Fatal Error: 0x000B0008
10,491,328 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,216 writing to cptra_bootfsm_go
6,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,269,550 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
6,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,245 UART:
192,640 UART: Running Caliptra ROM ...
193,779 UART:
603,454 UART: [state] CFI Enabled
617,221 UART: [state] LifecycleState = Unprovisioned
619,045 UART: [state] DebugLocked = No
620,597 UART: [state] WD Timer not started. Device not locked for debugging
623,831 UART: [kat] SHA2-256
802,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,503 UART: [kat] ++
815,036 UART: [kat] sha1
827,493 UART: [kat] SHA2-256
830,532 UART: [kat] SHA2-384
836,699 UART: [kat] SHA2-512-ACC
839,692 UART: [kat] ECC-384
3,281,421 UART: [kat] HMAC-384Kdf
3,294,090 UART: [kat] LMS
3,823,602 UART: [kat] --
3,827,588 UART: [cold-reset] ++
3,829,895 UART: [fht] FHT @ 0x50003400
3,841,190 UART: [idev] ++
3,841,749 UART: [idev] CDI.KEYID = 6
3,842,759 UART: [idev] SUBJECT.KEYID = 7
3,843,909 UART: [idev] UDS.KEYID = 0
3,857,564 UART: [idev] Erasing UDS.KEYID = 0
6,312,822 UART: [idev] Sha1 KeyId Algorithm
6,335,941 UART: [idev] --
6,340,308 UART: [ldev] ++
6,340,873 UART: [ldev] CDI.KEYID = 6
6,341,803 UART: [ldev] SUBJECT.KEYID = 5
6,342,964 UART: [ldev] AUTHORITY.KEYID = 7
6,344,195 UART: [ldev] FE.KEYID = 1
6,352,623 UART: [ldev] Erasing FE.KEYID = 1
8,829,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,898 UART: [ldev] --
10,623,110 UART: [fwproc] Wait for Commands...
10,625,486 UART: [fwproc] Recv command 0x46574c44
10,627,587 UART: [fwproc] Recv'd Img size: 114084 bytes
10,692,552 UART: ROM Fatal Error: 0x000B0008
10,695,637 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
6,262 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,474,141 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
5,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,314 UART:
192,690 UART: Running Caliptra ROM ...
193,883 UART:
194,039 UART: [state] CFI Enabled
267,204 UART: [state] LifecycleState = Unprovisioned
269,074 UART: [state] DebugLocked = No
271,240 UART: [state] WD Timer not started. Device not locked for debugging
274,212 UART: [kat] SHA2-256
453,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,901 UART: [kat] ++
465,436 UART: [kat] sha1
475,673 UART: [kat] SHA2-256
478,667 UART: [kat] SHA2-384
483,240 UART: [kat] SHA2-512-ACC
486,181 UART: [kat] ECC-384
2,948,914 UART: [kat] HMAC-384Kdf
2,972,864 UART: [kat] LMS
3,502,363 UART: [kat] --
3,507,347 UART: [cold-reset] ++
3,509,939 UART: [fht] FHT @ 0x50003400
3,520,444 UART: [idev] ++
3,521,047 UART: [idev] CDI.KEYID = 6
3,521,984 UART: [idev] SUBJECT.KEYID = 7
3,523,150 UART: [idev] UDS.KEYID = 0
3,545,123 UART: [idev] Erasing UDS.KEYID = 0
6,028,048 UART: [idev] Sha1 KeyId Algorithm
6,051,117 UART: [idev] --
6,054,737 UART: [ldev] ++
6,055,310 UART: [ldev] CDI.KEYID = 6
6,056,198 UART: [ldev] SUBJECT.KEYID = 5
6,057,355 UART: [ldev] AUTHORITY.KEYID = 7
6,058,649 UART: [ldev] FE.KEYID = 1
6,100,228 UART: [ldev] Erasing FE.KEYID = 1
8,603,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,673 UART: [ldev] --
10,415,798 UART: [fwproc] Wait for Commands...
10,418,172 UART: [fwproc] Recv command 0x46574c44
10,420,272 UART: [fwproc] Recv'd Img size: 114084 bytes
10,489,390 UART: ROM Fatal Error: 0x000B0008
10,492,485 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
5,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,273,564 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,374 UART:
192,768 UART: Running Caliptra ROM ...
193,969 UART:
603,450 UART: [state] CFI Enabled
616,272 UART: [state] LifecycleState = Unprovisioned
618,100 UART: [state] DebugLocked = No
619,607 UART: [state] WD Timer not started. Device not locked for debugging
624,190 UART: [kat] SHA2-256
803,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,860 UART: [kat] ++
815,304 UART: [kat] sha1
827,042 UART: [kat] SHA2-256
830,056 UART: [kat] SHA2-384
836,200 UART: [kat] SHA2-512-ACC
839,184 UART: [kat] ECC-384
3,281,726 UART: [kat] HMAC-384Kdf
3,293,713 UART: [kat] LMS
3,823,210 UART: [kat] --
3,827,043 UART: [cold-reset] ++
3,827,951 UART: [fht] FHT @ 0x50003400
3,838,458 UART: [idev] ++
3,839,020 UART: [idev] CDI.KEYID = 6
3,839,933 UART: [idev] SUBJECT.KEYID = 7
3,841,145 UART: [idev] UDS.KEYID = 0
3,855,280 UART: [idev] Erasing UDS.KEYID = 0
6,311,565 UART: [idev] Sha1 KeyId Algorithm
6,334,250 UART: [idev] --
6,337,266 UART: [ldev] ++
6,337,829 UART: [ldev] CDI.KEYID = 6
6,338,764 UART: [ldev] SUBJECT.KEYID = 5
6,339,970 UART: [ldev] AUTHORITY.KEYID = 7
6,341,201 UART: [ldev] FE.KEYID = 1
6,351,121 UART: [ldev] Erasing FE.KEYID = 1
8,824,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,248 UART: [ldev] --
10,618,190 UART: [fwproc] Wait for Commands...
10,621,323 UART: [fwproc] Recv command 0x46574c44
10,623,429 UART: [fwproc] Recv'd Img size: 114084 bytes
10,694,713 UART: ROM Fatal Error: 0x000B0008
10,697,799 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,474,304 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,481 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,174 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,224 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,291 UART: [fwproc] Recv command 0x46574c44
1,282,024 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,074 UART: ROM Fatal Error: 0x000B0008
1,308,231 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,016 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,658 UART: [idev] ++
1,173,826 UART: [idev] CDI.KEYID = 6
1,174,187 UART: [idev] SUBJECT.KEYID = 7
1,174,612 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,629 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,387 UART: ROM Fatal Error: 0x000B0008
1,310,544 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,517 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,489 UART: [kat] ++
895,641 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,345 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,482 UART: [ldev] --
1,279,804 UART: [fwproc] Wait for Commands...
1,280,591 UART: [fwproc] Recv command 0x46574c44
1,281,324 UART: [fwproc] Recv'd Img size: 114084 bytes
1,305,792 UART: ROM Fatal Error: 0x000B0008
1,306,949 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,260 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,394 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,626 UART: [idev] ++
1,173,794 UART: [idev] CDI.KEYID = 6
1,174,155 UART: [idev] SUBJECT.KEYID = 7
1,174,580 UART: [idev] UDS.KEYID = 0
1,182,752 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,295 UART: ROM Fatal Error: 0x000B0008
1,309,452 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,607 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,517 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,554 UART: [fwproc] Wait for Commands...
1,281,365 UART: [fwproc] Recv command 0x46574c44
1,282,098 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,074 UART: ROM Fatal Error: 0x000B0008
1,308,231 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,192 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
891,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,908 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,705 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,535 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,717 UART: ROM Fatal Error: 0x000B0008
1,309,874 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,655 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,220,891 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,365,292 UART:
2,365,698 UART: Running Caliptra ROM ...
2,366,869 UART:
2,367,054 UART: [state] CFI Enabled
2,368,038 UART: [state] LifecycleState = Unprovisioned
2,369,714 UART: [state] DebugLocked = No
2,370,824 UART: [state] WD Timer not started. Device not locked for debugging
2,373,318 UART: [kat] SHA2-256
2,373,983 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,377,004 UART: [kat] ++
2,377,463 UART: [kat] sha1
2,377,977 UART: [kat] SHA2-256
2,378,716 UART: [kat] SHA2-384
2,379,380 UART: [kat] SHA2-512-ACC
2,380,223 UART: [kat] ECC-384
3,777,204 UART: [kat] HMAC-384Kdf
3,795,774 UART: [kat] LMS
4,868,956 UART: [kat] --
4,872,867 UART: [cold-reset] ++
4,875,077 UART: [fht] FHT @ 0x50003400
4,885,418 UART: [idev] ++
4,886,094 UART: [idev] CDI.KEYID = 6
4,887,272 UART: [idev] SUBJECT.KEYID = 7
4,888,450 UART: [idev] UDS.KEYID = 0
4,923,024 UART: [idev] Erasing UDS.KEYID = 0
8,237,350 UART: [idev] Sha1 KeyId Algorithm
8,259,353 UART: [idev] --
8,264,429 UART: [ldev] ++
8,264,998 UART: [ldev] CDI.KEYID = 6
8,266,234 UART: [ldev] SUBJECT.KEYID = 5
8,267,290 UART: [ldev] AUTHORITY.KEYID = 7
8,268,569 UART: [ldev] FE.KEYID = 1
8,311,717 UART: [ldev] Erasing FE.KEYID = 1
11,647,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,991,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,772 UART: [ldev] --
14,033,529 UART: [fwproc] Wait for Commands...
14,036,546 UART: [fwproc] Recv command 0x46574c44
14,038,826 UART: [fwproc] Recv'd Img size: 113760 bytes
14,108,917 UART: ROM Fatal Error: 0x000B0009
14,112,297 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,058,571 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,202,312 UART:
2,202,739 UART: Running Caliptra ROM ...
2,203,830 UART:
2,203,987 UART: [state] CFI Enabled
2,204,906 UART: [state] LifecycleState = Unprovisioned
2,206,574 UART: [state] DebugLocked = No
2,207,597 UART: [state] WD Timer not started. Device not locked for debugging
2,210,061 UART: [kat] SHA2-256
2,210,727 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,723 UART: [kat] ++
2,214,173 UART: [kat] sha1
2,214,683 UART: [kat] SHA2-256
2,215,339 UART: [kat] SHA2-384
2,216,092 UART: [kat] SHA2-512-ACC
2,216,907 UART: [kat] ECC-384
3,776,272 UART: [kat] HMAC-384Kdf
3,801,512 UART: [kat] LMS
4,874,626 UART: [kat] --
4,879,758 UART: [cold-reset] ++
4,882,068 UART: [fht] FHT @ 0x50003400
4,893,329 UART: [idev] ++
4,894,043 UART: [idev] CDI.KEYID = 6
4,895,158 UART: [idev] SUBJECT.KEYID = 7
4,896,369 UART: [idev] UDS.KEYID = 0
4,929,064 UART: [idev] Erasing UDS.KEYID = 0
8,244,811 UART: [idev] Sha1 KeyId Algorithm
8,266,534 UART: [idev] --
8,270,886 UART: [ldev] ++
8,271,460 UART: [ldev] CDI.KEYID = 6
8,272,703 UART: [ldev] SUBJECT.KEYID = 5
8,273,813 UART: [ldev] AUTHORITY.KEYID = 7
8,274,969 UART: [ldev] FE.KEYID = 1
8,315,798 UART: [ldev] Erasing FE.KEYID = 1
11,651,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,906 UART: [ldev] --
14,036,902 UART: [fwproc] Wait for Commands...
14,039,866 UART: [fwproc] Recv command 0x46574c44
14,042,187 UART: [fwproc] Recv'd Img size: 113760 bytes
14,116,324 UART: ROM Fatal Error: 0x000B0009
14,119,715 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,050,266 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,194,003 UART:
2,194,414 UART: Running Caliptra ROM ...
2,195,506 UART:
2,195,659 UART: [state] CFI Enabled
2,196,642 UART: [state] LifecycleState = Unprovisioned
2,198,289 UART: [state] DebugLocked = No
2,199,312 UART: [state] WD Timer not started. Device not locked for debugging
2,201,773 UART: [kat] SHA2-256
2,202,440 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,448 UART: [kat] ++
2,205,893 UART: [kat] sha1
2,206,402 UART: [kat] SHA2-256
2,207,078 UART: [kat] SHA2-384
2,207,741 UART: [kat] SHA2-512-ACC
2,208,541 UART: [kat] ECC-384
3,775,630 UART: [kat] HMAC-384Kdf
3,801,412 UART: [kat] LMS
4,874,576 UART: [kat] --
4,878,323 UART: [cold-reset] ++
4,879,443 UART: [fht] FHT @ 0x50003400
4,892,479 UART: [idev] ++
4,893,158 UART: [idev] CDI.KEYID = 6
4,894,394 UART: [idev] SUBJECT.KEYID = 7
4,895,510 UART: [idev] UDS.KEYID = 0
4,928,634 UART: [idev] Erasing UDS.KEYID = 0
8,243,155 UART: [idev] Sha1 KeyId Algorithm
8,264,382 UART: [idev] --
8,268,861 UART: [ldev] ++
8,269,453 UART: [ldev] CDI.KEYID = 6
8,270,687 UART: [ldev] SUBJECT.KEYID = 5
8,271,789 UART: [ldev] AUTHORITY.KEYID = 7
8,273,024 UART: [ldev] FE.KEYID = 1
8,318,677 UART: [ldev] Erasing FE.KEYID = 1
11,653,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,423 UART: [ldev] --
14,040,695 UART: [fwproc] Wait for Commands...
14,043,333 UART: [fwproc] Recv command 0x46574c44
14,045,601 UART: [fwproc] Recv'd Img size: 113760 bytes
14,116,466 UART: ROM Fatal Error: 0x000B0009
14,119,888 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,053,052 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,196,681 UART:
2,197,079 UART: Running Caliptra ROM ...
2,198,160 UART:
2,198,311 UART: [state] CFI Enabled
2,199,272 UART: [state] LifecycleState = Unprovisioned
2,200,930 UART: [state] DebugLocked = No
2,201,957 UART: [state] WD Timer not started. Device not locked for debugging
2,204,441 UART: [kat] SHA2-256
2,205,104 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,093 UART: [kat] ++
2,208,544 UART: [kat] sha1
2,209,057 UART: [kat] SHA2-256
2,209,717 UART: [kat] SHA2-384
2,210,373 UART: [kat] SHA2-512-ACC
2,211,206 UART: [kat] ECC-384
3,775,896 UART: [kat] HMAC-384Kdf
3,804,601 UART: [kat] LMS
4,877,739 UART: [kat] --
4,881,103 UART: [cold-reset] ++
4,882,227 UART: [fht] FHT @ 0x50003400
4,893,669 UART: [idev] ++
4,894,336 UART: [idev] CDI.KEYID = 6
4,895,494 UART: [idev] SUBJECT.KEYID = 7
4,896,728 UART: [idev] UDS.KEYID = 0
4,931,677 UART: [idev] Erasing UDS.KEYID = 0
8,247,094 UART: [idev] Sha1 KeyId Algorithm
8,268,913 UART: [idev] --
8,272,558 UART: [ldev] ++
8,273,134 UART: [ldev] CDI.KEYID = 6
8,274,320 UART: [ldev] SUBJECT.KEYID = 5
8,275,480 UART: [ldev] AUTHORITY.KEYID = 7
8,276,708 UART: [ldev] FE.KEYID = 1
8,320,559 UART: [ldev] Erasing FE.KEYID = 1
11,654,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,924 UART: [ldev] --
14,040,766 UART: [fwproc] Wait for Commands...
14,042,551 UART: [fwproc] Recv command 0x46574c44
14,044,820 UART: [fwproc] Recv'd Img size: 113760 bytes
18,110,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,181,895 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,250,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,566,727 >>> mbox cmd response: success
18,570,702 UART: [afmc] ++
18,571,403 UART: [afmc] CDI.KEYID = 6
18,572,638 UART: [afmc] SUBJECT.KEYID = 7
18,573,740 UART: [afmc] AUTHORITY.KEYID = 5
21,951,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,246,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,248,629 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,264,771 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,280,885 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,296,786 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,319,488 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,216,612 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,881,965 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,055,054 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,888,028 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,049,285 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,898,102 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,050,650 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,367,533 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,226,802 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,370,973 UART:
2,371,433 UART: Running Caliptra ROM ...
2,372,537 UART:
2,372,693 UART: [state] CFI Enabled
2,373,583 UART: [state] LifecycleState = Unprovisioned
2,375,241 UART: [state] DebugLocked = No
2,376,353 UART: [state] WD Timer not started. Device not locked for debugging
2,378,818 UART: [kat] SHA2-256
2,379,481 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,382,514 UART: [kat] ++
2,382,961 UART: [kat] sha1
2,383,511 UART: [kat] SHA2-256
2,384,169 UART: [kat] SHA2-384
2,384,815 UART: [kat] SHA2-512-ACC
2,385,605 UART: [kat] ECC-384
4,094,021 UART: [kat] HMAC-384Kdf
4,104,649 UART: [kat] LMS
5,177,814 UART: [kat] --
5,181,405 UART: [cold-reset] ++
5,184,046 UART: [fht] FHT @ 0x50003400
5,196,209 UART: [idev] ++
5,196,886 UART: [idev] CDI.KEYID = 6
5,198,116 UART: [idev] SUBJECT.KEYID = 7
5,199,539 UART: [idev] UDS.KEYID = 0
5,214,048 UART: [idev] Erasing UDS.KEYID = 0
8,489,520 UART: [idev] Sha1 KeyId Algorithm
8,511,396 UART: [idev] --
8,515,111 UART: [ldev] ++
8,515,672 UART: [ldev] CDI.KEYID = 6
8,516,900 UART: [ldev] SUBJECT.KEYID = 5
8,518,326 UART: [ldev] AUTHORITY.KEYID = 7
8,519,874 UART: [ldev] FE.KEYID = 1
8,531,708 UART: [ldev] Erasing FE.KEYID = 1
11,820,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,999 UART: [ldev] --
14,185,748 UART: [fwproc] Wait for Commands...
14,188,382 UART: [fwproc] Recv command 0x46574c44
14,190,706 UART: [fwproc] Recv'd Img size: 113760 bytes
14,263,287 UART: ROM Fatal Error: 0x000B0009
14,266,711 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,063,655 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,207,290 UART:
2,207,689 UART: Running Caliptra ROM ...
2,208,866 UART:
2,209,038 UART: [state] CFI Enabled
2,209,996 UART: [state] LifecycleState = Unprovisioned
2,211,657 UART: [state] DebugLocked = No
2,212,756 UART: [state] WD Timer not started. Device not locked for debugging
2,215,215 UART: [kat] SHA2-256
2,215,873 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,218,874 UART: [kat] ++
2,219,323 UART: [kat] sha1
2,219,830 UART: [kat] SHA2-256
2,220,567 UART: [kat] SHA2-384
2,221,229 UART: [kat] SHA2-512-ACC
2,222,058 UART: [kat] ECC-384
4,096,412 UART: [kat] HMAC-384Kdf
4,109,643 UART: [kat] LMS
5,182,771 UART: [kat] --
5,187,774 UART: [cold-reset] ++
5,189,439 UART: [fht] FHT @ 0x50003400
5,200,737 UART: [idev] ++
5,201,410 UART: [idev] CDI.KEYID = 6
5,202,639 UART: [idev] SUBJECT.KEYID = 7
5,204,064 UART: [idev] UDS.KEYID = 0
5,222,355 UART: [idev] Erasing UDS.KEYID = 0
8,494,666 UART: [idev] Sha1 KeyId Algorithm
8,516,218 UART: [idev] --
8,520,625 UART: [ldev] ++
8,521,199 UART: [ldev] CDI.KEYID = 6
8,522,429 UART: [ldev] SUBJECT.KEYID = 5
8,523,855 UART: [ldev] AUTHORITY.KEYID = 7
8,525,405 UART: [ldev] FE.KEYID = 1
8,536,473 UART: [ldev] Erasing FE.KEYID = 1
11,825,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,894 UART: [ldev] --
14,191,396 UART: [fwproc] Wait for Commands...
14,193,647 UART: [fwproc] Recv command 0x46574c44
14,195,972 UART: [fwproc] Recv'd Img size: 113760 bytes
14,266,275 UART: ROM Fatal Error: 0x000B0009
14,269,640 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,057,296 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,201,059 UART:
2,201,470 UART: Running Caliptra ROM ...
2,202,553 UART:
2,202,702 UART: [state] CFI Enabled
2,203,685 UART: [state] LifecycleState = Unprovisioned
2,205,330 UART: [state] DebugLocked = No
2,206,347 UART: [state] WD Timer not started. Device not locked for debugging
2,208,806 UART: [kat] SHA2-256
2,209,465 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,465 UART: [kat] ++
2,212,905 UART: [kat] sha1
2,213,405 UART: [kat] SHA2-256
2,214,056 UART: [kat] SHA2-384
2,214,728 UART: [kat] SHA2-512-ACC
2,215,522 UART: [kat] ECC-384
4,095,324 UART: [kat] HMAC-384Kdf
4,107,478 UART: [kat] LMS
5,180,626 UART: [kat] --
5,185,289 UART: [cold-reset] ++
5,186,639 UART: [fht] FHT @ 0x50003400
5,197,456 UART: [idev] ++
5,198,124 UART: [idev] CDI.KEYID = 6
5,199,349 UART: [idev] SUBJECT.KEYID = 7
5,200,770 UART: [idev] UDS.KEYID = 0
5,218,310 UART: [idev] Erasing UDS.KEYID = 0
8,492,382 UART: [idev] Sha1 KeyId Algorithm
8,513,508 UART: [idev] --
8,518,996 UART: [ldev] ++
8,519,583 UART: [ldev] CDI.KEYID = 6
8,520,788 UART: [ldev] SUBJECT.KEYID = 5
8,522,220 UART: [ldev] AUTHORITY.KEYID = 7
8,523,821 UART: [ldev] FE.KEYID = 1
8,534,731 UART: [ldev] Erasing FE.KEYID = 1
11,826,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,228 UART: [ldev] --
14,191,231 UART: [fwproc] Wait for Commands...
14,193,062 UART: [fwproc] Recv command 0x46574c44
14,195,370 UART: [fwproc] Recv'd Img size: 113760 bytes
14,266,911 UART: ROM Fatal Error: 0x000B0009
14,270,320 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,062,962 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,206,625 UART:
2,207,032 UART: Running Caliptra ROM ...
2,208,192 UART:
2,208,366 UART: [state] CFI Enabled
2,209,324 UART: [state] LifecycleState = Unprovisioned
2,210,975 UART: [state] DebugLocked = No
2,212,076 UART: [state] WD Timer not started. Device not locked for debugging
2,214,553 UART: [kat] SHA2-256
2,215,235 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,218,228 UART: [kat] ++
2,218,673 UART: [kat] sha1
2,219,180 UART: [kat] SHA2-256
2,219,912 UART: [kat] SHA2-384
2,220,572 UART: [kat] SHA2-512-ACC
2,221,443 UART: [kat] ECC-384
4,090,631 UART: [kat] HMAC-384Kdf
4,103,209 UART: [kat] LMS
5,176,368 UART: [kat] --
5,182,144 UART: [cold-reset] ++
5,184,615 UART: [fht] FHT @ 0x50003400
5,196,399 UART: [idev] ++
5,197,071 UART: [idev] CDI.KEYID = 6
5,198,301 UART: [idev] SUBJECT.KEYID = 7
5,200,182 UART: [idev] UDS.KEYID = 0
5,215,734 UART: [idev] Erasing UDS.KEYID = 0
8,489,481 UART: [idev] Sha1 KeyId Algorithm
8,512,123 UART: [idev] --
8,516,170 UART: [ldev] ++
8,516,729 UART: [ldev] CDI.KEYID = 6
8,517,961 UART: [ldev] SUBJECT.KEYID = 5
8,519,388 UART: [ldev] AUTHORITY.KEYID = 7
8,520,920 UART: [ldev] FE.KEYID = 1
8,532,918 UART: [ldev] Erasing FE.KEYID = 1
11,820,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,572 UART: [ldev] --
14,186,890 UART: [fwproc] Wait for Commands...
14,188,685 UART: [fwproc] Recv command 0x46574c44
14,191,003 UART: [fwproc] Recv'd Img size: 113760 bytes
18,258,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,330,458 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,399,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,715,665 >>> mbox cmd response: success
18,719,650 UART: [afmc] ++
18,720,372 UART: [afmc] CDI.KEYID = 6
18,721,479 UART: [afmc] SUBJECT.KEYID = 7
18,722,689 UART: [afmc] AUTHORITY.KEYID = 5
22,039,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,335,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,337,854 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,353,952 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,370,106 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,385,923 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,409,152 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,229,308 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,081,378 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,062,139 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,084,168 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,055,503 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,088,112 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,055,630 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,524,847 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,226,844 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,371,467 UART:
2,371,903 UART: Running Caliptra ROM ...
2,373,084 UART:
2,373,263 UART: [state] CFI Enabled
2,374,236 UART: [state] LifecycleState = Unprovisioned
2,375,895 UART: [state] DebugLocked = No
2,377,003 UART: [state] WD Timer not started. Device not locked for debugging
2,379,481 UART: [kat] SHA2-256
2,380,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,383,164 UART: [kat] ++
2,383,614 UART: [kat] sha1
2,384,131 UART: [kat] SHA2-256
2,384,823 UART: [kat] SHA2-384
2,385,481 UART: [kat] SHA2-512-ACC
2,386,282 UART: [kat] ECC-384
2,946,187 UART: [kat] HMAC-384Kdf
2,971,148 UART: [kat] LMS
3,500,624 UART: [kat] --
3,504,616 UART: [cold-reset] ++
3,505,577 UART: [fht] FHT @ 0x50003400
3,516,231 UART: [idev] ++
3,516,803 UART: [idev] CDI.KEYID = 6
3,517,709 UART: [idev] SUBJECT.KEYID = 7
3,518,927 UART: [idev] UDS.KEYID = 0
3,542,789 UART: [idev] Erasing UDS.KEYID = 0
6,024,686 UART: [idev] Sha1 KeyId Algorithm
6,048,792 UART: [idev] --
6,052,900 UART: [ldev] ++
6,053,483 UART: [ldev] CDI.KEYID = 6
6,054,399 UART: [ldev] SUBJECT.KEYID = 5
6,055,568 UART: [ldev] AUTHORITY.KEYID = 7
6,056,805 UART: [ldev] FE.KEYID = 1
6,098,964 UART: [ldev] Erasing FE.KEYID = 1
8,599,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,200 UART: [ldev] --
10,393,924 UART: [fwproc] Wait for Commands...
10,396,030 UART: [fwproc] Recv command 0x46574c44
10,398,129 UART: [fwproc] Recv'd Img size: 114084 bytes
10,467,790 UART: ROM Fatal Error: 0x000B0009
10,470,884 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
2,066,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,210,377 UART:
2,210,815 UART: Running Caliptra ROM ...
2,211,938 UART:
2,212,096 UART: [state] CFI Enabled
2,212,991 UART: [state] LifecycleState = Unprovisioned
2,214,657 UART: [state] DebugLocked = No
2,215,775 UART: [state] WD Timer not started. Device not locked for debugging
2,218,262 UART: [kat] SHA2-256
2,218,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,937 UART: [kat] ++
2,222,409 UART: [kat] sha1
2,222,965 UART: [kat] SHA2-256
2,223,625 UART: [kat] SHA2-384
2,224,280 UART: [kat] SHA2-512-ACC
2,225,081 UART: [kat] ECC-384
2,949,230 UART: [kat] HMAC-384Kdf
2,971,704 UART: [kat] LMS
3,501,149 UART: [kat] --
3,504,819 UART: [cold-reset] ++
3,506,319 UART: [fht] FHT @ 0x50003400
3,516,983 UART: [idev] ++
3,517,554 UART: [idev] CDI.KEYID = 6
3,518,432 UART: [idev] SUBJECT.KEYID = 7
3,519,647 UART: [idev] UDS.KEYID = 0
3,543,886 UART: [idev] Erasing UDS.KEYID = 0
6,027,162 UART: [idev] Sha1 KeyId Algorithm
6,049,314 UART: [idev] --
6,051,759 UART: [ldev] ++
6,052,335 UART: [ldev] CDI.KEYID = 6
6,053,247 UART: [ldev] SUBJECT.KEYID = 5
6,054,415 UART: [ldev] AUTHORITY.KEYID = 7
6,055,707 UART: [ldev] FE.KEYID = 1
6,099,583 UART: [ldev] Erasing FE.KEYID = 1
8,603,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,686 UART: [ldev] --
10,413,494 UART: [fwproc] Wait for Commands...
10,416,397 UART: [fwproc] Recv command 0x46574c44
10,418,437 UART: [fwproc] Recv'd Img size: 114084 bytes
10,493,040 UART: ROM Fatal Error: 0x000B0009
10,496,186 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,062,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,207,547 UART:
2,207,963 UART: Running Caliptra ROM ...
2,209,130 UART:
2,209,304 UART: [state] CFI Enabled
2,210,281 UART: [state] LifecycleState = Unprovisioned
2,211,942 UART: [state] DebugLocked = No
2,213,053 UART: [state] WD Timer not started. Device not locked for debugging
2,215,525 UART: [kat] SHA2-256
2,216,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,199 UART: [kat] ++
2,219,649 UART: [kat] sha1
2,220,163 UART: [kat] SHA2-256
2,220,900 UART: [kat] SHA2-384
2,221,564 UART: [kat] SHA2-512-ACC
2,222,405 UART: [kat] ECC-384
2,949,764 UART: [kat] HMAC-384Kdf
2,972,613 UART: [kat] LMS
3,502,068 UART: [kat] --
3,505,741 UART: [cold-reset] ++
3,507,072 UART: [fht] FHT @ 0x50003400
3,518,161 UART: [idev] ++
3,518,743 UART: [idev] CDI.KEYID = 6
3,519,651 UART: [idev] SUBJECT.KEYID = 7
3,520,867 UART: [idev] UDS.KEYID = 0
3,545,647 UART: [idev] Erasing UDS.KEYID = 0
6,028,386 UART: [idev] Sha1 KeyId Algorithm
6,051,144 UART: [idev] --
6,055,417 UART: [ldev] ++
6,055,993 UART: [ldev] CDI.KEYID = 6
6,056,908 UART: [ldev] SUBJECT.KEYID = 5
6,058,066 UART: [ldev] AUTHORITY.KEYID = 7
6,059,355 UART: [ldev] FE.KEYID = 1
6,100,363 UART: [ldev] Erasing FE.KEYID = 1
8,605,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,250 UART: [ldev] --
10,414,625 UART: [fwproc] Wait for Commands...
10,417,857 UART: [fwproc] Recv command 0x46574c44
10,419,955 UART: [fwproc] Recv'd Img size: 114084 bytes
10,495,133 UART: ROM Fatal Error: 0x000B0009
10,498,278 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,053,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,197,861 UART:
2,198,273 UART: Running Caliptra ROM ...
2,199,356 UART:
2,199,512 UART: [state] CFI Enabled
2,200,498 UART: [state] LifecycleState = Unprovisioned
2,202,146 UART: [state] DebugLocked = No
2,203,174 UART: [state] WD Timer not started. Device not locked for debugging
2,205,637 UART: [kat] SHA2-256
2,206,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,307 UART: [kat] ++
2,209,753 UART: [kat] sha1
2,210,262 UART: [kat] SHA2-256
2,210,916 UART: [kat] SHA2-384
2,211,571 UART: [kat] SHA2-512-ACC
2,212,370 UART: [kat] ECC-384
2,949,987 UART: [kat] HMAC-384Kdf
2,970,330 UART: [kat] LMS
3,499,750 UART: [kat] --
3,503,657 UART: [cold-reset] ++
3,506,023 UART: [fht] FHT @ 0x50003400
3,516,897 UART: [idev] ++
3,517,462 UART: [idev] CDI.KEYID = 6
3,518,480 UART: [idev] SUBJECT.KEYID = 7
3,519,582 UART: [idev] UDS.KEYID = 0
3,541,898 UART: [idev] Erasing UDS.KEYID = 0
6,023,520 UART: [idev] Sha1 KeyId Algorithm
6,046,371 UART: [idev] --
6,050,910 UART: [ldev] ++
6,051,487 UART: [ldev] CDI.KEYID = 6
6,052,376 UART: [ldev] SUBJECT.KEYID = 5
6,053,591 UART: [ldev] AUTHORITY.KEYID = 7
6,054,825 UART: [ldev] FE.KEYID = 1
6,097,161 UART: [ldev] Erasing FE.KEYID = 1
8,602,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,484 UART: [ldev] --
10,411,891 UART: [fwproc] Wait for Commands...
10,414,262 UART: [fwproc] Recv command 0x46574c44
10,416,357 UART: [fwproc] Recv'd Img size: 114084 bytes
13,815,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,888,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,513 >>> mbox cmd response: success
14,278,005 UART: [afmc] ++
14,278,606 UART: [afmc] CDI.KEYID = 6
14,279,533 UART: [afmc] SUBJECT.KEYID = 7
14,280,577 UART: [afmc] AUTHORITY.KEYID = 5
16,804,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,853 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,545,783 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,561,644 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,577,387 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,600,224 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,225,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,995 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,065,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,254,208 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,059,787 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,234,897 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
2,069,903 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,069,138 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,225,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,370,408 UART:
2,370,828 UART: Running Caliptra ROM ...
2,372,015 UART:
2,372,190 UART: [state] CFI Enabled
2,373,154 UART: [state] LifecycleState = Unprovisioned
2,374,809 UART: [state] DebugLocked = No
2,375,917 UART: [state] WD Timer not started. Device not locked for debugging
2,378,393 UART: [kat] SHA2-256
2,379,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,382,065 UART: [kat] ++
2,382,517 UART: [kat] sha1
2,383,030 UART: [kat] SHA2-256
2,383,768 UART: [kat] SHA2-384
2,384,454 UART: [kat] SHA2-512-ACC
2,385,338 UART: [kat] ECC-384
3,283,281 UART: [kat] HMAC-384Kdf
3,296,322 UART: [kat] LMS
3,825,797 UART: [kat] --
3,829,222 UART: [cold-reset] ++
3,830,134 UART: [fht] FHT @ 0x50003400
3,841,174 UART: [idev] ++
3,841,789 UART: [idev] CDI.KEYID = 6
3,842,710 UART: [idev] SUBJECT.KEYID = 7
3,843,872 UART: [idev] UDS.KEYID = 0
3,864,171 UART: [idev] Erasing UDS.KEYID = 0
6,316,411 UART: [idev] Sha1 KeyId Algorithm
6,339,045 UART: [idev] --
6,342,927 UART: [ldev] ++
6,343,495 UART: [ldev] CDI.KEYID = 6
6,344,395 UART: [ldev] SUBJECT.KEYID = 5
6,345,611 UART: [ldev] AUTHORITY.KEYID = 7
6,346,843 UART: [ldev] FE.KEYID = 1
6,359,031 UART: [ldev] Erasing FE.KEYID = 1
8,828,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,744 UART: [ldev] --
10,618,760 UART: [fwproc] Wait for Commands...
10,620,363 UART: [fwproc] Recv command 0x46574c44
10,622,467 UART: [fwproc] Recv'd Img size: 114084 bytes
10,692,639 UART: ROM Fatal Error: 0x000B0009
10,695,719 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,061,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,205,766 UART:
2,206,166 UART: Running Caliptra ROM ...
2,207,333 UART:
2,207,506 UART: [state] CFI Enabled
2,208,470 UART: [state] LifecycleState = Unprovisioned
2,210,137 UART: [state] DebugLocked = No
2,211,261 UART: [state] WD Timer not started. Device not locked for debugging
2,213,732 UART: [kat] SHA2-256
2,214,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,400 UART: [kat] ++
2,217,855 UART: [kat] sha1
2,218,367 UART: [kat] SHA2-256
2,219,058 UART: [kat] SHA2-384
2,219,719 UART: [kat] SHA2-512-ACC
2,220,519 UART: [kat] ECC-384
3,282,984 UART: [kat] HMAC-384Kdf
3,295,855 UART: [kat] LMS
3,825,309 UART: [kat] --
3,830,929 UART: [cold-reset] ++
3,833,014 UART: [fht] FHT @ 0x50003400
3,843,077 UART: [idev] ++
3,843,638 UART: [idev] CDI.KEYID = 6
3,844,538 UART: [idev] SUBJECT.KEYID = 7
3,845,748 UART: [idev] UDS.KEYID = 0
3,863,425 UART: [idev] Erasing UDS.KEYID = 0
6,319,090 UART: [idev] Sha1 KeyId Algorithm
6,340,275 UART: [idev] --
6,343,239 UART: [ldev] ++
6,343,807 UART: [ldev] CDI.KEYID = 6
6,344,823 UART: [ldev] SUBJECT.KEYID = 5
6,345,926 UART: [ldev] AUTHORITY.KEYID = 7
6,347,156 UART: [ldev] FE.KEYID = 1
6,356,882 UART: [ldev] Erasing FE.KEYID = 1
8,829,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,981 UART: [ldev] --
10,623,313 UART: [fwproc] Wait for Commands...
10,624,977 UART: [fwproc] Recv command 0x46574c44
10,627,076 UART: [fwproc] Recv'd Img size: 114084 bytes
10,702,621 UART: ROM Fatal Error: 0x000B0009
10,705,703 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,055,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,457 UART:
2,199,884 UART: Running Caliptra ROM ...
2,201,056 UART:
2,201,246 UART: [state] CFI Enabled
2,202,233 UART: [state] LifecycleState = Unprovisioned
2,203,886 UART: [state] DebugLocked = No
2,204,995 UART: [state] WD Timer not started. Device not locked for debugging
2,207,464 UART: [kat] SHA2-256
2,208,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,138 UART: [kat] ++
2,211,589 UART: [kat] sha1
2,212,101 UART: [kat] SHA2-256
2,212,840 UART: [kat] SHA2-384
2,213,503 UART: [kat] SHA2-512-ACC
2,214,346 UART: [kat] ECC-384
3,276,964 UART: [kat] HMAC-384Kdf
3,290,070 UART: [kat] LMS
3,819,590 UART: [kat] --
3,822,724 UART: [cold-reset] ++
3,824,674 UART: [fht] FHT @ 0x50003400
3,836,683 UART: [idev] ++
3,837,247 UART: [idev] CDI.KEYID = 6
3,838,205 UART: [idev] SUBJECT.KEYID = 7
3,839,303 UART: [idev] UDS.KEYID = 0
3,855,605 UART: [idev] Erasing UDS.KEYID = 0
6,315,170 UART: [idev] Sha1 KeyId Algorithm
6,337,634 UART: [idev] --
6,340,156 UART: [ldev] ++
6,340,719 UART: [ldev] CDI.KEYID = 6
6,341,624 UART: [ldev] SUBJECT.KEYID = 5
6,342,841 UART: [ldev] AUTHORITY.KEYID = 7
6,344,067 UART: [ldev] FE.KEYID = 1
6,353,306 UART: [ldev] Erasing FE.KEYID = 1
8,827,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,172 UART: [ldev] --
10,619,679 UART: [fwproc] Wait for Commands...
10,622,854 UART: [fwproc] Recv command 0x46574c44
10,624,928 UART: [fwproc] Recv'd Img size: 114084 bytes
10,697,886 UART: ROM Fatal Error: 0x000B0009
10,700,983 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,055,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,955 UART:
2,200,341 UART: Running Caliptra ROM ...
2,201,512 UART:
2,201,682 UART: [state] CFI Enabled
2,202,662 UART: [state] LifecycleState = Unprovisioned
2,204,303 UART: [state] DebugLocked = No
2,205,331 UART: [state] WD Timer not started. Device not locked for debugging
2,207,809 UART: [kat] SHA2-256
2,208,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,479 UART: [kat] ++
2,211,931 UART: [kat] sha1
2,212,446 UART: [kat] SHA2-256
2,213,202 UART: [kat] SHA2-384
2,213,872 UART: [kat] SHA2-512-ACC
2,214,755 UART: [kat] ECC-384
3,283,323 UART: [kat] HMAC-384Kdf
3,295,989 UART: [kat] LMS
3,825,476 UART: [kat] --
3,830,066 UART: [cold-reset] ++
3,832,376 UART: [fht] FHT @ 0x50003400
3,842,539 UART: [idev] ++
3,843,103 UART: [idev] CDI.KEYID = 6
3,843,983 UART: [idev] SUBJECT.KEYID = 7
3,845,193 UART: [idev] UDS.KEYID = 0
3,860,361 UART: [idev] Erasing UDS.KEYID = 0
6,318,515 UART: [idev] Sha1 KeyId Algorithm
6,342,190 UART: [idev] --
6,346,075 UART: [ldev] ++
6,346,666 UART: [ldev] CDI.KEYID = 6
6,347,549 UART: [ldev] SUBJECT.KEYID = 5
6,348,812 UART: [ldev] AUTHORITY.KEYID = 7
6,350,009 UART: [ldev] FE.KEYID = 1
6,361,879 UART: [ldev] Erasing FE.KEYID = 1
8,834,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,337 UART: [ldev] --
10,626,218 UART: [fwproc] Wait for Commands...
10,629,333 UART: [fwproc] Recv command 0x46574c44
10,631,425 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,105,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,792 >>> mbox cmd response: success
14,495,069 UART: [afmc] ++
14,495,661 UART: [afmc] CDI.KEYID = 6
14,496,571 UART: [afmc] SUBJECT.KEYID = 7
14,497,669 UART: [afmc] AUTHORITY.KEYID = 5
16,997,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,087 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,733,059 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,878 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,655 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,788,505 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,226,216 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,484,158 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,061,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,473,600 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,055,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,481,608 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
2,055,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,244 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,231,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,376,118 UART:
2,376,550 UART: Running Caliptra ROM ...
2,377,726 UART:
2,377,895 UART: [state] CFI Enabled
2,378,860 UART: [state] LifecycleState = Unprovisioned
2,380,518 UART: [state] DebugLocked = No
2,381,624 UART: [state] WD Timer not started. Device not locked for debugging
2,384,099 UART: [kat] SHA2-256
2,384,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,387,805 UART: [kat] ++
2,388,263 UART: [kat] sha1
2,388,775 UART: [kat] SHA2-256
2,389,459 UART: [kat] SHA2-384
2,390,116 UART: [kat] SHA2-512-ACC
2,390,919 UART: [kat] ECC-384
2,948,873 UART: [kat] HMAC-384Kdf
2,971,837 UART: [kat] LMS
3,501,295 UART: [kat] --
3,505,448 UART: [cold-reset] ++
3,507,059 UART: [fht] FHT @ 0x50003400
3,517,340 UART: [idev] ++
3,517,911 UART: [idev] CDI.KEYID = 6
3,518,791 UART: [idev] SUBJECT.KEYID = 7
3,520,007 UART: [idev] UDS.KEYID = 0
3,543,613 UART: [idev] Erasing UDS.KEYID = 0
6,027,204 UART: [idev] Sha1 KeyId Algorithm
6,050,748 UART: [idev] --
6,055,080 UART: [ldev] ++
6,055,665 UART: [ldev] CDI.KEYID = 6
6,056,578 UART: [ldev] SUBJECT.KEYID = 5
6,057,798 UART: [ldev] AUTHORITY.KEYID = 7
6,059,035 UART: [ldev] FE.KEYID = 1
6,098,959 UART: [ldev] Erasing FE.KEYID = 1
8,600,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,217 UART: [ldev] --
10,393,106 UART: [fwproc] Wait for Commands...
10,395,582 UART: [fwproc] Recv command 0x46574c44
10,397,652 UART: [fwproc] Recv'd Img size: 114084 bytes
10,474,556 UART: ROM Fatal Error: 0x000B0009
10,477,704 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,062,870 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,206,943 UART:
2,207,380 UART: Running Caliptra ROM ...
2,208,492 UART:
2,208,654 UART: [state] CFI Enabled
2,209,626 UART: [state] LifecycleState = Unprovisioned
2,211,286 UART: [state] DebugLocked = No
2,212,314 UART: [state] WD Timer not started. Device not locked for debugging
2,214,782 UART: [kat] SHA2-256
2,215,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,448 UART: [kat] ++
2,218,899 UART: [kat] sha1
2,219,413 UART: [kat] SHA2-256
2,220,157 UART: [kat] SHA2-384
2,220,822 UART: [kat] SHA2-512-ACC
2,221,703 UART: [kat] ECC-384
2,927,123 UART: [kat] HMAC-384Kdf
2,949,590 UART: [kat] LMS
3,479,046 UART: [kat] --
3,483,903 UART: [cold-reset] ++
3,484,987 UART: [fht] FHT @ 0x50003400
3,495,808 UART: [idev] ++
3,496,371 UART: [idev] CDI.KEYID = 6
3,497,296 UART: [idev] SUBJECT.KEYID = 7
3,498,513 UART: [idev] UDS.KEYID = 0
3,522,435 UART: [idev] Erasing UDS.KEYID = 0
6,001,871 UART: [idev] Sha1 KeyId Algorithm
6,024,239 UART: [idev] --
6,027,696 UART: [ldev] ++
6,028,271 UART: [ldev] CDI.KEYID = 6
6,029,183 UART: [ldev] SUBJECT.KEYID = 5
6,030,404 UART: [ldev] AUTHORITY.KEYID = 7
6,031,643 UART: [ldev] FE.KEYID = 1
6,079,428 UART: [ldev] Erasing FE.KEYID = 1
8,582,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,418 UART: [ldev] --
10,392,088 UART: [fwproc] Wait for Commands...
10,394,136 UART: [fwproc] Recv command 0x46574c44
10,396,232 UART: [fwproc] Recv'd Img size: 114084 bytes
10,466,699 UART: ROM Fatal Error: 0x000B0009
10,469,791 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,055,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,875 UART:
2,200,279 UART: Running Caliptra ROM ...
2,201,444 UART:
2,201,615 UART: [state] CFI Enabled
2,202,587 UART: [state] LifecycleState = Unprovisioned
2,204,225 UART: [state] DebugLocked = No
2,205,334 UART: [state] WD Timer not started. Device not locked for debugging
2,207,808 UART: [kat] SHA2-256
2,208,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,483 UART: [kat] ++
2,211,934 UART: [kat] sha1
2,212,443 UART: [kat] SHA2-256
2,213,204 UART: [kat] SHA2-384
2,213,874 UART: [kat] SHA2-512-ACC
2,214,715 UART: [kat] ECC-384
2,949,170 UART: [kat] HMAC-384Kdf
2,972,444 UART: [kat] LMS
3,501,877 UART: [kat] --
3,507,949 UART: [cold-reset] ++
3,509,896 UART: [fht] FHT @ 0x50003400
3,520,840 UART: [idev] ++
3,521,452 UART: [idev] CDI.KEYID = 6
3,522,365 UART: [idev] SUBJECT.KEYID = 7
3,523,530 UART: [idev] UDS.KEYID = 0
3,556,951 UART: [idev] Erasing UDS.KEYID = 0
6,042,030 UART: [idev] Sha1 KeyId Algorithm
6,066,291 UART: [idev] --
6,069,689 UART: [ldev] ++
6,070,283 UART: [ldev] CDI.KEYID = 6
6,071,197 UART: [ldev] SUBJECT.KEYID = 5
6,072,548 UART: [ldev] AUTHORITY.KEYID = 7
6,073,757 UART: [ldev] FE.KEYID = 1
6,114,008 UART: [ldev] Erasing FE.KEYID = 1
8,619,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,425,047 UART: [ldev] --
10,430,478 UART: [fwproc] Wait for Commands...
10,432,100 UART: [fwproc] Recv command 0x46574c44
10,434,202 UART: [fwproc] Recv'd Img size: 114084 bytes
10,504,619 UART: ROM Fatal Error: 0x000B0009
10,507,712 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,054,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,198,243 UART:
2,198,639 UART: Running Caliptra ROM ...
2,199,804 UART:
2,199,977 UART: [state] CFI Enabled
2,200,951 UART: [state] LifecycleState = Unprovisioned
2,202,592 UART: [state] DebugLocked = No
2,203,619 UART: [state] WD Timer not started. Device not locked for debugging
2,206,099 UART: [kat] SHA2-256
2,206,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,790 UART: [kat] ++
2,210,239 UART: [kat] sha1
2,210,751 UART: [kat] SHA2-256
2,211,726 UART: [kat] SHA2-384
2,212,401 UART: [kat] SHA2-512-ACC
2,213,233 UART: [kat] ECC-384
2,948,045 UART: [kat] HMAC-384Kdf
2,970,644 UART: [kat] LMS
3,500,091 UART: [kat] --
3,505,464 UART: [cold-reset] ++
3,506,646 UART: [fht] FHT @ 0x50003400
3,519,278 UART: [idev] ++
3,519,846 UART: [idev] CDI.KEYID = 6
3,520,784 UART: [idev] SUBJECT.KEYID = 7
3,522,014 UART: [idev] UDS.KEYID = 0
3,543,804 UART: [idev] Erasing UDS.KEYID = 0
6,026,545 UART: [idev] Sha1 KeyId Algorithm
6,049,563 UART: [idev] --
6,052,212 UART: [ldev] ++
6,052,822 UART: [ldev] CDI.KEYID = 6
6,053,739 UART: [ldev] SUBJECT.KEYID = 5
6,054,911 UART: [ldev] AUTHORITY.KEYID = 7
6,056,143 UART: [ldev] FE.KEYID = 1
6,100,712 UART: [ldev] Erasing FE.KEYID = 1
8,600,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,943 UART: [ldev] --
10,391,377 UART: [fwproc] Wait for Commands...
10,394,502 UART: [fwproc] Recv command 0x46574c44
10,396,605 UART: [fwproc] Recv'd Img size: 114084 bytes
13,794,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,866,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,252,259 >>> mbox cmd response: success
14,257,245 UART: [afmc] ++
14,257,837 UART: [afmc] CDI.KEYID = 6
14,258,746 UART: [afmc] SUBJECT.KEYID = 7
14,259,901 UART: [afmc] AUTHORITY.KEYID = 5
16,783,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,351 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,527,339 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,543,133 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,558,929 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,581,591 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,221,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,511 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
2,057,939 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,272,185 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,064,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,274,169 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,061,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,914 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,230,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,375,297 UART:
2,375,720 UART: Running Caliptra ROM ...
2,376,814 UART:
2,376,970 UART: [state] CFI Enabled
2,377,939 UART: [state] LifecycleState = Unprovisioned
2,379,597 UART: [state] DebugLocked = No
2,380,621 UART: [state] WD Timer not started. Device not locked for debugging
2,383,086 UART: [kat] SHA2-256
2,383,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,386,785 UART: [kat] ++
2,387,231 UART: [kat] sha1
2,387,737 UART: [kat] SHA2-256
2,388,391 UART: [kat] SHA2-384
2,389,046 UART: [kat] SHA2-512-ACC
2,389,880 UART: [kat] ECC-384
3,282,379 UART: [kat] HMAC-384Kdf
3,294,423 UART: [kat] LMS
3,823,929 UART: [kat] --
3,828,293 UART: [cold-reset] ++
3,829,135 UART: [fht] FHT @ 0x50003400
3,841,132 UART: [idev] ++
3,841,693 UART: [idev] CDI.KEYID = 6
3,842,598 UART: [idev] SUBJECT.KEYID = 7
3,843,809 UART: [idev] UDS.KEYID = 0
3,860,181 UART: [idev] Erasing UDS.KEYID = 0
6,312,322 UART: [idev] Sha1 KeyId Algorithm
6,334,415 UART: [idev] --
6,337,709 UART: [ldev] ++
6,338,274 UART: [ldev] CDI.KEYID = 6
6,339,237 UART: [ldev] SUBJECT.KEYID = 5
6,340,392 UART: [ldev] AUTHORITY.KEYID = 7
6,341,622 UART: [ldev] FE.KEYID = 1
6,352,729 UART: [ldev] Erasing FE.KEYID = 1
8,830,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,500 UART: [ldev] --
10,621,522 UART: [fwproc] Wait for Commands...
10,623,320 UART: [fwproc] Recv command 0x46574c44
10,625,361 UART: [fwproc] Recv'd Img size: 114084 bytes
10,699,021 UART: ROM Fatal Error: 0x000B0009
10,702,106 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,062,878 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,206,925 UART:
2,207,362 UART: Running Caliptra ROM ...
2,208,536 UART:
2,208,713 UART: [state] CFI Enabled
2,209,672 UART: [state] LifecycleState = Unprovisioned
2,211,339 UART: [state] DebugLocked = No
2,212,446 UART: [state] WD Timer not started. Device not locked for debugging
2,214,916 UART: [kat] SHA2-256
2,215,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,582 UART: [kat] ++
2,219,075 UART: [kat] sha1
2,219,589 UART: [kat] SHA2-256
2,220,325 UART: [kat] SHA2-384
2,220,991 UART: [kat] SHA2-512-ACC
2,221,836 UART: [kat] ECC-384
3,284,653 UART: [kat] HMAC-384Kdf
3,297,996 UART: [kat] LMS
3,827,448 UART: [kat] --
3,832,360 UART: [cold-reset] ++
3,833,589 UART: [fht] FHT @ 0x50003400
3,845,913 UART: [idev] ++
3,846,535 UART: [idev] CDI.KEYID = 6
3,847,426 UART: [idev] SUBJECT.KEYID = 7
3,848,585 UART: [idev] UDS.KEYID = 0
3,864,326 UART: [idev] Erasing UDS.KEYID = 0
6,325,661 UART: [idev] Sha1 KeyId Algorithm
6,348,579 UART: [idev] --
6,352,356 UART: [ldev] ++
6,352,920 UART: [ldev] CDI.KEYID = 6
6,353,830 UART: [ldev] SUBJECT.KEYID = 5
6,354,985 UART: [ldev] AUTHORITY.KEYID = 7
6,356,305 UART: [ldev] FE.KEYID = 1
6,367,634 UART: [ldev] Erasing FE.KEYID = 1
8,841,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,494 UART: [ldev] --
10,633,229 UART: [fwproc] Wait for Commands...
10,635,492 UART: [fwproc] Recv command 0x46574c44
10,637,530 UART: [fwproc] Recv'd Img size: 114084 bytes
10,710,852 UART: ROM Fatal Error: 0x000B0009
10,713,941 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,058,698 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,202,809 UART:
2,203,227 UART: Running Caliptra ROM ...
2,204,314 UART:
2,204,468 UART: [state] CFI Enabled
2,205,452 UART: [state] LifecycleState = Unprovisioned
2,207,094 UART: [state] DebugLocked = No
2,208,123 UART: [state] WD Timer not started. Device not locked for debugging
2,210,589 UART: [kat] SHA2-256
2,211,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,260 UART: [kat] ++
2,214,712 UART: [kat] sha1
2,215,226 UART: [kat] SHA2-256
2,215,984 UART: [kat] SHA2-384
2,216,654 UART: [kat] SHA2-512-ACC
2,217,484 UART: [kat] ECC-384
3,279,691 UART: [kat] HMAC-384Kdf
3,290,870 UART: [kat] LMS
3,820,347 UART: [kat] --
3,826,086 UART: [cold-reset] ++
3,827,483 UART: [fht] FHT @ 0x50003400
3,839,653 UART: [idev] ++
3,840,216 UART: [idev] CDI.KEYID = 6
3,841,092 UART: [idev] SUBJECT.KEYID = 7
3,842,309 UART: [idev] UDS.KEYID = 0
3,857,318 UART: [idev] Erasing UDS.KEYID = 0
6,313,291 UART: [idev] Sha1 KeyId Algorithm
6,336,505 UART: [idev] --
6,340,357 UART: [ldev] ++
6,340,951 UART: [ldev] CDI.KEYID = 6
6,341,857 UART: [ldev] SUBJECT.KEYID = 5
6,343,014 UART: [ldev] AUTHORITY.KEYID = 7
6,344,246 UART: [ldev] FE.KEYID = 1
6,353,485 UART: [ldev] Erasing FE.KEYID = 1
8,828,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,552 UART: [ldev] --
10,623,865 UART: [fwproc] Wait for Commands...
10,627,045 UART: [fwproc] Recv command 0x46574c44
10,629,086 UART: [fwproc] Recv'd Img size: 114084 bytes
10,700,265 UART: ROM Fatal Error: 0x000B0009
10,703,352 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,055,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,924 UART:
2,200,313 UART: Running Caliptra ROM ...
2,201,398 UART:
2,201,550 UART: [state] CFI Enabled
2,202,532 UART: [state] LifecycleState = Unprovisioned
2,204,173 UART: [state] DebugLocked = No
2,205,196 UART: [state] WD Timer not started. Device not locked for debugging
2,207,673 UART: [kat] SHA2-256
2,208,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,342 UART: [kat] ++
2,211,788 UART: [kat] sha1
2,212,297 UART: [kat] SHA2-256
2,212,952 UART: [kat] SHA2-384
2,213,607 UART: [kat] SHA2-512-ACC
2,214,407 UART: [kat] ECC-384
3,279,623 UART: [kat] HMAC-384Kdf
3,292,502 UART: [kat] LMS
3,822,026 UART: [kat] --
3,827,206 UART: [cold-reset] ++
3,829,671 UART: [fht] FHT @ 0x50003400
3,839,835 UART: [idev] ++
3,840,396 UART: [idev] CDI.KEYID = 6
3,841,368 UART: [idev] SUBJECT.KEYID = 7
3,842,541 UART: [idev] UDS.KEYID = 0
3,857,485 UART: [idev] Erasing UDS.KEYID = 0
6,316,559 UART: [idev] Sha1 KeyId Algorithm
6,340,214 UART: [idev] --
6,344,361 UART: [ldev] ++
6,344,923 UART: [ldev] CDI.KEYID = 6
6,345,799 UART: [ldev] SUBJECT.KEYID = 5
6,347,009 UART: [ldev] AUTHORITY.KEYID = 7
6,348,300 UART: [ldev] FE.KEYID = 1
6,359,566 UART: [ldev] Erasing FE.KEYID = 1
8,835,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,192 UART: [ldev] --
10,625,122 UART: [fwproc] Wait for Commands...
10,627,222 UART: [fwproc] Recv command 0x46574c44
10,629,318 UART: [fwproc] Recv'd Img size: 114084 bytes
14,017,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,083,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,152,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,469,448 >>> mbox cmd response: success
14,473,274 UART: [afmc] ++
14,473,858 UART: [afmc] CDI.KEYID = 6
14,474,761 UART: [afmc] SUBJECT.KEYID = 7
14,475,969 UART: [afmc] AUTHORITY.KEYID = 5
16,978,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,113 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,720,111 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,735,928 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,751,921 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,774,616 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,225,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,470,699 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,063,577 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,476,969 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,054,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,469,590 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,056,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,196 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,242,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,777 UART: [fwproc] Recv command 0x46574c44
1,283,510 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,530 UART: ROM Fatal Error: 0x000B0009
1,309,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,182,065 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,843 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,176 UART: [ldev] Erasing FE.KEYID = 1
1,240,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,344 UART: [ldev] --
1,279,722 UART: [fwproc] Wait for Commands...
1,280,361 UART: [fwproc] Recv command 0x46574c44
1,281,094 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,406 UART: ROM Fatal Error: 0x000B0009
1,307,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,929 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,752 UART: [ldev] --
1,281,044 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,958 UART: ROM Fatal Error: 0x000B0009
1,309,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,276 UART: [kat] SHA2-256
890,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,955 UART: [kat] ++
895,107 UART: [kat] sha1
899,235 UART: [kat] SHA2-256
901,175 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,924 UART: [kat] HMAC-384Kdf
920,544 UART: [kat] LMS
1,168,856 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,989 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,426 UART: [ldev] --
1,280,790 UART: [fwproc] Wait for Commands...
1,281,465 UART: [fwproc] Recv command 0x46574c44
1,282,198 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,876 >>> mbox cmd response: success
2,769,923 UART: [afmc] ++
2,770,091 UART: [afmc] CDI.KEYID = 6
2,770,454 UART: [afmc] SUBJECT.KEYID = 7
2,770,880 UART: [afmc] AUTHORITY.KEYID = 5
2,806,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,582 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,295 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,204 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,918 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,975 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,694 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,155 UART: [kat] SHA2-512-ACC
906,056 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,181,580 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,241,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,931 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,281,884 UART: [fwproc] Recv command 0x46574c44
1,282,617 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,503 UART: ROM Fatal Error: 0x000B0009
1,308,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,196 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,902 UART: [idev] --
1,209,895 UART: [ldev] ++
1,210,063 UART: [ldev] CDI.KEYID = 6
1,210,427 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,407 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,528 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,789 UART: ROM Fatal Error: 0x000B0009
1,310,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,238 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,198,814 UART: [idev] Sha1 KeyId Algorithm
1,207,798 UART: [idev] --
1,208,687 UART: [ldev] ++
1,208,855 UART: [ldev] CDI.KEYID = 6
1,209,219 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,297 UART: [ldev] Erasing FE.KEYID = 1
1,241,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,095 UART: [ldev] --
1,280,551 UART: [fwproc] Wait for Commands...
1,281,218 UART: [fwproc] Recv command 0x46574c44
1,281,951 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,423 UART: ROM Fatal Error: 0x000B0009
1,308,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,282,952 UART: [fwproc] Recv command 0x46574c44
1,283,685 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,021 >>> mbox cmd response: success
2,771,148 UART: [afmc] ++
2,771,316 UART: [afmc] CDI.KEYID = 6
2,771,679 UART: [afmc] SUBJECT.KEYID = 7
2,772,105 UART: [afmc] AUTHORITY.KEYID = 5
2,808,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,139 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,852 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,761 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,475 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,312 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,509 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,786 UART: [kat] SHA2-512-ACC
906,687 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,821 UART: [fht] FHT @ 0x50003400
1,173,647 UART: [idev] ++
1,173,815 UART: [idev] CDI.KEYID = 6
1,174,176 UART: [idev] SUBJECT.KEYID = 7
1,174,601 UART: [idev] UDS.KEYID = 0
1,182,413 UART: [idev] Erasing UDS.KEYID = 0
1,199,711 UART: [idev] Sha1 KeyId Algorithm
1,208,753 UART: [idev] --
1,209,854 UART: [ldev] ++
1,210,022 UART: [ldev] CDI.KEYID = 6
1,210,386 UART: [ldev] SUBJECT.KEYID = 5
1,210,813 UART: [ldev] AUTHORITY.KEYID = 7
1,211,276 UART: [ldev] FE.KEYID = 1
1,216,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,346 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,445 UART: [fwproc] Recv command 0x46574c44
1,284,178 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,300 UART: ROM Fatal Error: 0x000B0009
1,310,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
891,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,737 UART: [kat] ++
895,889 UART: [kat] sha1
900,171 UART: [kat] SHA2-256
902,111 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,452 UART: [kat] HMAC-384Kdf
921,060 UART: [kat] LMS
1,169,372 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,415 UART: [idev] Sha1 KeyId Algorithm
1,207,199 UART: [idev] --
1,208,294 UART: [ldev] ++
1,208,462 UART: [ldev] CDI.KEYID = 6
1,208,826 UART: [ldev] SUBJECT.KEYID = 5
1,209,253 UART: [ldev] AUTHORITY.KEYID = 7
1,209,716 UART: [ldev] FE.KEYID = 1
1,214,938 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,162 UART: [ldev] --
1,280,456 UART: [fwproc] Wait for Commands...
1,281,185 UART: [fwproc] Recv command 0x46574c44
1,281,918 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,262 UART: ROM Fatal Error: 0x000B0009
1,308,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,855 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,794 UART: [ldev] Erasing FE.KEYID = 1
1,242,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,508 UART: [ldev] --
1,281,818 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,536 UART: ROM Fatal Error: 0x000B0009
1,309,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,347 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,288 UART: [ldev] ++
1,209,456 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,247 UART: [ldev] AUTHORITY.KEYID = 7
1,210,710 UART: [ldev] FE.KEYID = 1
1,215,932 UART: [ldev] Erasing FE.KEYID = 1
1,242,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,620 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,120 >>> mbox cmd response: success
2,770,167 UART: [afmc] ++
2,770,335 UART: [afmc] CDI.KEYID = 6
2,770,698 UART: [afmc] SUBJECT.KEYID = 7
2,771,124 UART: [afmc] AUTHORITY.KEYID = 5
2,806,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,712 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,425 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,334 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,048 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,743 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,372 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,198,802 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,397 UART: [ldev] Erasing FE.KEYID = 1
1,241,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,711 UART: ROM Fatal Error: 0x000B0009
1,308,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,207,904 UART: [idev] --
1,208,823 UART: [ldev] ++
1,208,991 UART: [ldev] CDI.KEYID = 6
1,209,355 UART: [ldev] SUBJECT.KEYID = 5
1,209,782 UART: [ldev] AUTHORITY.KEYID = 7
1,210,245 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,759 UART: ROM Fatal Error: 0x000B0009
1,308,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,643 UART: [kat] HMAC-384Kdf
920,409 UART: [kat] LMS
1,168,721 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,108 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,198,720 UART: [idev] Sha1 KeyId Algorithm
1,207,588 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,257 UART: [ldev] Erasing FE.KEYID = 1
1,241,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,001 UART: [ldev] --
1,280,481 UART: [fwproc] Wait for Commands...
1,281,142 UART: [fwproc] Recv command 0x46574c44
1,281,875 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,399 UART: ROM Fatal Error: 0x000B0009
1,308,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,915 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,804 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,456 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,552 UART: [fwproc] Recv command 0x46574c44
1,283,285 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,229 >>> mbox cmd response: success
2,771,280 UART: [afmc] ++
2,771,448 UART: [afmc] CDI.KEYID = 6
2,771,811 UART: [afmc] SUBJECT.KEYID = 7
2,772,237 UART: [afmc] AUTHORITY.KEYID = 5
2,808,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,495 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,208 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,117 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,831 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,690 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,675 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,859 UART: [idev] ++
1,173,027 UART: [idev] CDI.KEYID = 6
1,173,388 UART: [idev] SUBJECT.KEYID = 7
1,173,813 UART: [idev] UDS.KEYID = 0
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,836 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,862 UART: ROM Fatal Error: 0x000B0009
1,309,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,476 UART: [kat] HMAC-384Kdf
920,050 UART: [kat] LMS
1,168,362 UART: [kat] --
1,169,399 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,575 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,476 UART: ROM Fatal Error: 0x000B0009
1,308,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,817 UART: [idev] ++
1,172,985 UART: [idev] CDI.KEYID = 6
1,173,346 UART: [idev] SUBJECT.KEYID = 7
1,173,771 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,172 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,908 UART: ROM Fatal Error: 0x000B0009
1,308,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,305 UART: [kat] SHA2-256
902,245 UART: [kat] SHA2-384
905,022 UART: [kat] SHA2-512-ACC
906,923 UART: [kat] ECC-384
916,788 UART: [kat] HMAC-384Kdf
921,342 UART: [kat] LMS
1,169,654 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,871 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,182,933 UART: [idev] Erasing UDS.KEYID = 0
1,200,049 UART: [idev] Sha1 KeyId Algorithm
1,209,029 UART: [idev] --
1,210,126 UART: [ldev] ++
1,210,294 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,085 UART: [ldev] AUTHORITY.KEYID = 7
1,211,548 UART: [ldev] FE.KEYID = 1
1,216,888 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,736 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,282,881 UART: [fwproc] Recv command 0x46574c44
1,283,614 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,856 >>> mbox cmd response: success
2,773,037 UART: [afmc] ++
2,773,205 UART: [afmc] CDI.KEYID = 6
2,773,568 UART: [afmc] SUBJECT.KEYID = 7
2,773,994 UART: [afmc] AUTHORITY.KEYID = 5
2,809,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,668 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,381 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,290 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,004 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,981 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,714 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,243,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,771 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,235 UART: ROM Fatal Error: 0x000B0009
1,309,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,591 UART: [kat] HMAC-384Kdf
921,341 UART: [kat] LMS
1,169,653 UART: [kat] --
1,170,668 UART: [cold-reset] ++
1,171,138 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,886 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,933 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,349 UART: ROM Fatal Error: 0x000B0009
1,310,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,198,660 UART: [idev] Sha1 KeyId Algorithm
1,207,570 UART: [idev] --
1,208,709 UART: [ldev] ++
1,208,877 UART: [ldev] CDI.KEYID = 6
1,209,241 UART: [ldev] SUBJECT.KEYID = 5
1,209,668 UART: [ldev] AUTHORITY.KEYID = 7
1,210,131 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,241,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,341 UART: [fwproc] Wait for Commands...
1,282,140 UART: [fwproc] Recv command 0x46574c44
1,282,873 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,907 UART: ROM Fatal Error: 0x000B0009
1,309,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,730 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,683 UART: [ldev] --
1,280,991 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,305 >>> mbox cmd response: success
2,769,478 UART: [afmc] ++
2,769,646 UART: [afmc] CDI.KEYID = 6
2,770,009 UART: [afmc] SUBJECT.KEYID = 7
2,770,435 UART: [afmc] AUTHORITY.KEYID = 5
2,806,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,307 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,020 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,929 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,643 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,480 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,857 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
5,658 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,175 UART:
192,585 UART: Running Caliptra ROM ...
193,775 UART:
193,929 UART: [state] CFI Enabled
261,360 UART: [state] LifecycleState = Unprovisioned
263,751 UART: [state] DebugLocked = No
266,106 UART: [state] WD Timer not started. Device not locked for debugging
271,564 UART: [kat] SHA2-256
453,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,037 UART: [kat] ++
465,575 UART: [kat] sha1
476,246 UART: [kat] SHA2-256
479,266 UART: [kat] SHA2-384
485,943 UART: [kat] SHA2-512-ACC
488,553 UART: [kat] ECC-384
3,774,533 UART: [kat] HMAC-384Kdf
3,799,511 UART: [kat] LMS
4,872,679 UART: [kat] --
4,877,156 UART: [cold-reset] ++
4,879,799 UART: [fht] FHT @ 0x50003400
4,891,484 UART: [idev] ++
4,892,155 UART: [idev] CDI.KEYID = 6
4,893,315 UART: [idev] SUBJECT.KEYID = 7
4,894,545 UART: [idev] UDS.KEYID = 0
4,926,318 UART: [idev] Erasing UDS.KEYID = 0
8,238,112 UART: [idev] Sha1 KeyId Algorithm
8,259,773 UART: [idev] --
8,264,070 UART: [ldev] ++
8,264,768 UART: [ldev] CDI.KEYID = 6
8,265,667 UART: [ldev] SUBJECT.KEYID = 5
8,266,896 UART: [ldev] AUTHORITY.KEYID = 7
8,268,132 UART: [ldev] FE.KEYID = 1
8,313,003 UART: [ldev] Erasing FE.KEYID = 1
11,649,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,034 UART: [ldev] --
14,036,150 UART: [fwproc] Wait for Commands...
14,038,586 UART: [fwproc] Recv command 0x46574c44
14,040,908 UART: [fwproc] Recv'd Img size: 113760 bytes
18,112,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,187,074 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,255,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,571,081 >>> mbox cmd response: success
18,574,420 UART: [afmc] ++
18,575,019 UART: [afmc] CDI.KEYID = 6
18,576,211 UART: [afmc] SUBJECT.KEYID = 7
18,577,370 UART: [afmc] AUTHORITY.KEYID = 5
21,945,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,246,953 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,263,250 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,279,139 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,295,136 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,317,975 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
5,686 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,323,894 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
6,792 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,516 UART:
192,879 UART: Running Caliptra ROM ...
193,989 UART:
603,550 UART: [state] CFI Enabled
618,617 UART: [state] LifecycleState = Unprovisioned
621,032 UART: [state] DebugLocked = No
623,032 UART: [state] WD Timer not started. Device not locked for debugging
627,300 UART: [kat] SHA2-256
809,233 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,807 UART: [kat] ++
821,389 UART: [kat] sha1
831,564 UART: [kat] SHA2-256
834,636 UART: [kat] SHA2-384
840,276 UART: [kat] SHA2-512-ACC
842,883 UART: [kat] ECC-384
4,096,488 UART: [kat] HMAC-384Kdf
4,108,626 UART: [kat] LMS
5,181,781 UART: [kat] --
5,185,228 UART: [cold-reset] ++
5,187,596 UART: [fht] FHT @ 0x50003400
5,199,651 UART: [idev] ++
5,200,317 UART: [idev] CDI.KEYID = 6
5,201,540 UART: [idev] SUBJECT.KEYID = 7
5,202,964 UART: [idev] UDS.KEYID = 0
5,221,574 UART: [idev] Erasing UDS.KEYID = 0
8,497,388 UART: [idev] Sha1 KeyId Algorithm
8,520,364 UART: [idev] --
8,523,654 UART: [ldev] ++
8,524,243 UART: [ldev] CDI.KEYID = 6
8,525,474 UART: [ldev] SUBJECT.KEYID = 5
8,526,897 UART: [ldev] AUTHORITY.KEYID = 7
8,528,447 UART: [ldev] FE.KEYID = 1
8,541,261 UART: [ldev] Erasing FE.KEYID = 1
11,832,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,059 UART: [ldev] --
14,198,614 UART: [fwproc] Wait for Commands...
14,200,107 UART: [fwproc] Recv command 0x46574c44
14,202,084 UART: [fwproc] Recv'd Img size: 113760 bytes
18,274,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,352,146 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,420,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,736,103 >>> mbox cmd response: success
18,739,800 UART: [afmc] ++
18,740,388 UART: [afmc] CDI.KEYID = 6
18,741,576 UART: [afmc] SUBJECT.KEYID = 7
18,742,739 UART: [afmc] AUTHORITY.KEYID = 5
22,054,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,349,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,351,709 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,367,869 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,383,890 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,399,893 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,422,725 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
6,464 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,541,756 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
5,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,127 UART:
192,506 UART: Running Caliptra ROM ...
193,609 UART:
193,755 UART: [state] CFI Enabled
256,854 UART: [state] LifecycleState = Unprovisioned
258,772 UART: [state] DebugLocked = No
260,744 UART: [state] WD Timer not started. Device not locked for debugging
263,620 UART: [kat] SHA2-256
442,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,311 UART: [kat] ++
454,850 UART: [kat] sha1
464,816 UART: [kat] SHA2-256
467,879 UART: [kat] SHA2-384
473,800 UART: [kat] SHA2-512-ACC
476,730 UART: [kat] ECC-384
2,922,636 UART: [kat] HMAC-384Kdf
2,947,680 UART: [kat] LMS
3,477,117 UART: [kat] --
3,482,026 UART: [cold-reset] ++
3,484,126 UART: [fht] FHT @ 0x50003400
3,494,862 UART: [idev] ++
3,495,440 UART: [idev] CDI.KEYID = 6
3,496,345 UART: [idev] SUBJECT.KEYID = 7
3,497,583 UART: [idev] UDS.KEYID = 0
3,518,102 UART: [idev] Erasing UDS.KEYID = 0
6,001,948 UART: [idev] Sha1 KeyId Algorithm
6,024,340 UART: [idev] --
6,027,428 UART: [ldev] ++
6,028,001 UART: [ldev] CDI.KEYID = 6
6,028,899 UART: [ldev] SUBJECT.KEYID = 5
6,030,120 UART: [ldev] AUTHORITY.KEYID = 7
6,031,357 UART: [ldev] FE.KEYID = 1
6,074,065 UART: [ldev] Erasing FE.KEYID = 1
8,578,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,320 UART: [ldev] --
10,388,429 UART: [fwproc] Wait for Commands...
10,390,481 UART: [fwproc] Recv command 0x46574c44
10,392,581 UART: [fwproc] Recv'd Img size: 114084 bytes
13,792,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,256,607 >>> mbox cmd response: success
14,260,444 UART: [afmc] ++
14,261,039 UART: [afmc] CDI.KEYID = 6
14,261,959 UART: [afmc] SUBJECT.KEYID = 7
14,263,122 UART: [afmc] AUTHORITY.KEYID = 5
16,800,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,817 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,205 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
5,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,588 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
6,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,418 UART:
192,816 UART: Running Caliptra ROM ...
193,942 UART:
603,515 UART: [state] CFI Enabled
615,874 UART: [state] LifecycleState = Unprovisioned
617,697 UART: [state] DebugLocked = No
619,913 UART: [state] WD Timer not started. Device not locked for debugging
623,564 UART: [kat] SHA2-256
802,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,287 UART: [kat] ++
814,733 UART: [kat] sha1
825,337 UART: [kat] SHA2-256
828,335 UART: [kat] SHA2-384
835,375 UART: [kat] SHA2-512-ACC
838,367 UART: [kat] ECC-384
3,279,538 UART: [kat] HMAC-384Kdf
3,291,891 UART: [kat] LMS
3,821,383 UART: [kat] --
3,827,440 UART: [cold-reset] ++
3,829,800 UART: [fht] FHT @ 0x50003400
3,839,732 UART: [idev] ++
3,840,308 UART: [idev] CDI.KEYID = 6
3,841,379 UART: [idev] SUBJECT.KEYID = 7
3,842,480 UART: [idev] UDS.KEYID = 0
3,857,047 UART: [idev] Erasing UDS.KEYID = 0
6,316,593 UART: [idev] Sha1 KeyId Algorithm
6,338,160 UART: [idev] --
6,343,608 UART: [ldev] ++
6,344,172 UART: [ldev] CDI.KEYID = 6
6,345,138 UART: [ldev] SUBJECT.KEYID = 5
6,346,294 UART: [ldev] AUTHORITY.KEYID = 7
6,347,526 UART: [ldev] FE.KEYID = 1
6,356,616 UART: [ldev] Erasing FE.KEYID = 1
8,831,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,421 UART: [ldev] --
10,620,305 UART: [fwproc] Wait for Commands...
10,622,671 UART: [fwproc] Recv command 0x46574c44
10,624,767 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,863 >>> mbox cmd response: success
14,488,443 UART: [afmc] ++
14,489,040 UART: [afmc] CDI.KEYID = 6
14,489,977 UART: [afmc] SUBJECT.KEYID = 7
14,491,141 UART: [afmc] AUTHORITY.KEYID = 5
16,990,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,287 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,691 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
6,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,806 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
5,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,112 UART:
192,524 UART: Running Caliptra ROM ...
193,836 UART:
193,992 UART: [state] CFI Enabled
261,524 UART: [state] LifecycleState = Unprovisioned
263,435 UART: [state] DebugLocked = No
265,901 UART: [state] WD Timer not started. Device not locked for debugging
270,313 UART: [kat] SHA2-256
449,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,982 UART: [kat] ++
461,532 UART: [kat] sha1
473,011 UART: [kat] SHA2-256
476,037 UART: [kat] SHA2-384
481,751 UART: [kat] SHA2-512-ACC
484,695 UART: [kat] ECC-384
2,947,797 UART: [kat] HMAC-384Kdf
2,969,841 UART: [kat] LMS
3,499,305 UART: [kat] --
3,505,239 UART: [cold-reset] ++
3,506,531 UART: [fht] FHT @ 0x50003400
3,518,272 UART: [idev] ++
3,518,839 UART: [idev] CDI.KEYID = 6
3,519,911 UART: [idev] SUBJECT.KEYID = 7
3,521,017 UART: [idev] UDS.KEYID = 0
3,542,302 UART: [idev] Erasing UDS.KEYID = 0
6,023,235 UART: [idev] Sha1 KeyId Algorithm
6,047,332 UART: [idev] --
6,049,820 UART: [ldev] ++
6,050,413 UART: [ldev] CDI.KEYID = 6
6,051,328 UART: [ldev] SUBJECT.KEYID = 5
6,052,494 UART: [ldev] AUTHORITY.KEYID = 7
6,053,678 UART: [ldev] FE.KEYID = 1
6,098,565 UART: [ldev] Erasing FE.KEYID = 1
8,602,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,273 UART: [ldev] --
10,410,728 UART: [fwproc] Wait for Commands...
10,413,701 UART: [fwproc] Recv command 0x46574c44
10,415,793 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,823 >>> mbox cmd response: success
14,284,200 UART: [afmc] ++
14,284,787 UART: [afmc] CDI.KEYID = 6
14,285,668 UART: [afmc] SUBJECT.KEYID = 7
14,286,886 UART: [afmc] AUTHORITY.KEYID = 5
16,827,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,020 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,143 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,062,277 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
6,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,606 UART:
192,996 UART: Running Caliptra ROM ...
194,180 UART:
603,662 UART: [state] CFI Enabled
617,384 UART: [state] LifecycleState = Unprovisioned
619,301 UART: [state] DebugLocked = No
621,440 UART: [state] WD Timer not started. Device not locked for debugging
625,375 UART: [kat] SHA2-256
804,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,064 UART: [kat] ++
816,610 UART: [kat] sha1
829,059 UART: [kat] SHA2-256
832,079 UART: [kat] SHA2-384
838,109 UART: [kat] SHA2-512-ACC
841,054 UART: [kat] ECC-384
3,282,668 UART: [kat] HMAC-384Kdf
3,294,804 UART: [kat] LMS
3,824,308 UART: [kat] --
3,828,217 UART: [cold-reset] ++
3,829,294 UART: [fht] FHT @ 0x50003400
3,841,947 UART: [idev] ++
3,842,512 UART: [idev] CDI.KEYID = 6
3,843,419 UART: [idev] SUBJECT.KEYID = 7
3,844,628 UART: [idev] UDS.KEYID = 0
3,858,010 UART: [idev] Erasing UDS.KEYID = 0
6,315,294 UART: [idev] Sha1 KeyId Algorithm
6,339,009 UART: [idev] --
6,342,821 UART: [ldev] ++
6,343,400 UART: [ldev] CDI.KEYID = 6
6,344,285 UART: [ldev] SUBJECT.KEYID = 5
6,345,514 UART: [ldev] AUTHORITY.KEYID = 7
6,346,747 UART: [ldev] FE.KEYID = 1
6,358,910 UART: [ldev] Erasing FE.KEYID = 1
8,829,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,012 UART: [ldev] --
10,620,891 UART: [fwproc] Wait for Commands...
10,623,262 UART: [fwproc] Recv command 0x46574c44
10,625,358 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,407 >>> mbox cmd response: success
14,491,296 UART: [afmc] ++
14,491,879 UART: [afmc] CDI.KEYID = 6
14,492,792 UART: [afmc] SUBJECT.KEYID = 7
14,493,949 UART: [afmc] AUTHORITY.KEYID = 5
16,992,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,274 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,398 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
6,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,263,321 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,459 UART: [idev] --
1,208,466 UART: [ldev] ++
1,208,634 UART: [ldev] CDI.KEYID = 6
1,208,998 UART: [ldev] SUBJECT.KEYID = 5
1,209,425 UART: [ldev] AUTHORITY.KEYID = 7
1,209,888 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,612 UART: [ldev] --
1,280,972 UART: [fwproc] Wait for Commands...
1,281,627 UART: [fwproc] Recv command 0x46574c44
1,282,360 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,015 >>> mbox cmd response: success
2,769,260 UART: [afmc] ++
2,769,428 UART: [afmc] CDI.KEYID = 6
2,769,791 UART: [afmc] SUBJECT.KEYID = 7
2,770,217 UART: [afmc] AUTHORITY.KEYID = 5
2,806,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,217 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,889 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,039 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,453 UART: [fwproc] Wait for Commands...
1,283,142 UART: [fwproc] Recv command 0x46574c44
1,283,875 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,594 >>> mbox cmd response: success
2,771,643 UART: [afmc] ++
2,771,811 UART: [afmc] CDI.KEYID = 6
2,772,174 UART: [afmc] SUBJECT.KEYID = 7
2,772,600 UART: [afmc] AUTHORITY.KEYID = 5
2,808,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,764 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,616 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,432 UART: [state] LifecycleState = Unprovisioned
85,087 UART: [state] DebugLocked = No
85,739 UART: [state] WD Timer not started. Device not locked for debugging
87,064 UART: [kat] SHA2-256
890,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,743 UART: [kat] ++
894,895 UART: [kat] sha1
899,083 UART: [kat] SHA2-256
901,023 UART: [kat] SHA2-384
903,746 UART: [kat] SHA2-512-ACC
905,647 UART: [kat] ECC-384
915,054 UART: [kat] HMAC-384Kdf
919,628 UART: [kat] LMS
1,167,940 UART: [kat] --
1,169,039 UART: [cold-reset] ++
1,169,399 UART: [fht] FHT @ 0x50003400
1,172,219 UART: [idev] ++
1,172,387 UART: [idev] CDI.KEYID = 6
1,172,748 UART: [idev] SUBJECT.KEYID = 7
1,173,173 UART: [idev] UDS.KEYID = 0
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,833 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,324 UART: [ldev] Erasing FE.KEYID = 1
1,241,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,672 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,693 >>> mbox cmd response: success
2,769,888 UART: [afmc] ++
2,770,056 UART: [afmc] CDI.KEYID = 6
2,770,419 UART: [afmc] SUBJECT.KEYID = 7
2,770,845 UART: [afmc] AUTHORITY.KEYID = 5
2,806,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,216 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,749 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,835 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,392 UART: [kat] SHA2-256
901,332 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
915,693 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,394 UART: [cold-reset] ++
1,169,880 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,198,428 UART: [idev] Sha1 KeyId Algorithm
1,207,346 UART: [idev] --
1,208,351 UART: [ldev] ++
1,208,519 UART: [ldev] CDI.KEYID = 6
1,208,883 UART: [ldev] SUBJECT.KEYID = 5
1,209,310 UART: [ldev] AUTHORITY.KEYID = 7
1,209,773 UART: [ldev] FE.KEYID = 1
1,215,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,891 UART: [ldev] --
1,280,251 UART: [fwproc] Wait for Commands...
1,281,058 UART: [fwproc] Recv command 0x46574c44
1,281,791 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,094 >>> mbox cmd response: success
2,770,213 UART: [afmc] ++
2,770,381 UART: [afmc] CDI.KEYID = 6
2,770,744 UART: [afmc] SUBJECT.KEYID = 7
2,771,170 UART: [afmc] AUTHORITY.KEYID = 5
2,807,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,636 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,804 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,388 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,469 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,646 UART: [fwproc] Wait for Commands...
1,281,335 UART: [fwproc] Recv command 0x46574c44
1,282,068 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,671 >>> mbox cmd response: success
2,769,784 UART: [afmc] ++
2,769,952 UART: [afmc] CDI.KEYID = 6
2,770,315 UART: [afmc] SUBJECT.KEYID = 7
2,770,741 UART: [afmc] AUTHORITY.KEYID = 5
2,806,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,649 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,175 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
891,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,900 UART: [kat] ++
896,052 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,923 UART: [kat] SHA2-512-ACC
906,824 UART: [kat] ECC-384
916,579 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,158 UART: [idev] ++
1,173,326 UART: [idev] CDI.KEYID = 6
1,173,687 UART: [idev] SUBJECT.KEYID = 7
1,174,112 UART: [idev] UDS.KEYID = 0
1,182,258 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,471 UART: [fwproc] Wait for Commands...
1,283,180 UART: [fwproc] Recv command 0x46574c44
1,283,913 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,654 >>> mbox cmd response: success
2,769,779 UART: [afmc] ++
2,769,947 UART: [afmc] CDI.KEYID = 6
2,770,310 UART: [afmc] SUBJECT.KEYID = 7
2,770,736 UART: [afmc] AUTHORITY.KEYID = 5
2,805,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,160 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,516 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,312 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
Truncated 107056 bytes from beginning
214,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,532,077 >>> mbox cmd response: success
18,536,098 UART: [afmc] ++
18,536,809 UART: [afmc] CDI.KEYID = 6
18,538,048 UART: [afmc] SUBJECT.KEYID = 7
18,539,153 UART: [afmc] AUTHORITY.KEYID = 5
21,896,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,197,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,199,205 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,215,343 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,231,463 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,247,269 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,270,308 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,048,954 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,192,583 UART:
2,192,991 UART: Running Caliptra ROM ...
2,194,172 UART:
2,194,340 UART: [state] CFI Enabled
2,195,299 UART: [state] LifecycleState = Unprovisioned
2,196,954 UART: [state] DebugLocked = No
2,198,058 UART: [state] WD Timer not started. Device not locked for debugging
2,200,539 UART: [kat] SHA2-256
2,201,205 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,204,225 UART: [kat] ++
2,204,674 UART: [kat] sha1
2,205,187 UART: [kat] SHA2-256
2,205,947 UART: [kat] SHA2-384
2,206,610 UART: [kat] SHA2-512-ACC
2,207,490 UART: [kat] ECC-384
3,773,945 UART: [kat] HMAC-384Kdf
3,798,078 UART: [kat] LMS
4,871,270 UART: [kat] --
4,874,253 UART: [cold-reset] ++
4,876,665 UART: [fht] FHT @ 0x50003400
4,888,779 UART: [idev] ++
4,889,511 UART: [idev] CDI.KEYID = 6
4,890,689 UART: [idev] SUBJECT.KEYID = 7
4,891,841 UART: [idev] UDS.KEYID = 0
4,925,959 UART: [idev] Erasing UDS.KEYID = 0
8,238,031 UART: [idev] Sha1 KeyId Algorithm
8,259,532 UART: [idev] --
8,263,634 UART: [ldev] ++
8,264,225 UART: [ldev] CDI.KEYID = 6
8,265,409 UART: [ldev] SUBJECT.KEYID = 5
8,266,563 UART: [ldev] AUTHORITY.KEYID = 7
8,267,784 UART: [ldev] FE.KEYID = 1
8,314,898 UART: [ldev] Erasing FE.KEYID = 1
11,650,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,454 UART: [ldev] --
14,037,187 UART: [fwproc] Wait for Commands...
14,038,746 UART: [fwproc] Recv command 0x46574c44
14,041,066 UART: [fwproc] Recv'd Img size: 113760 bytes
18,103,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,172,025 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,240,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,556,768 >>> mbox cmd response: success
18,561,681 UART: [afmc] ++
18,562,383 UART: [afmc] CDI.KEYID = 6
18,563,619 UART: [afmc] SUBJECT.KEYID = 7
18,564,730 UART: [afmc] AUTHORITY.KEYID = 5
21,925,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,221,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,982 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,239,145 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,255,181 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,271,042 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,294,611 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,050,519 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,194,239 UART:
2,194,628 UART: Running Caliptra ROM ...
2,195,796 UART:
2,195,972 UART: [state] CFI Enabled
2,196,922 UART: [state] LifecycleState = Unprovisioned
2,198,577 UART: [state] DebugLocked = No
2,199,681 UART: [state] WD Timer not started. Device not locked for debugging
2,202,165 UART: [kat] SHA2-256
2,202,834 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,205,839 UART: [kat] ++
2,206,288 UART: [kat] sha1
2,206,905 UART: [kat] SHA2-256
2,207,577 UART: [kat] SHA2-384
2,208,234 UART: [kat] SHA2-512-ACC
2,209,111 UART: [kat] ECC-384
3,771,923 UART: [kat] HMAC-384Kdf
3,798,637 UART: [kat] LMS
4,871,763 UART: [kat] --
4,875,375 UART: [cold-reset] ++
4,876,437 UART: [fht] FHT @ 0x50003400
4,887,340 UART: [idev] ++
4,888,059 UART: [idev] CDI.KEYID = 6
4,889,166 UART: [idev] SUBJECT.KEYID = 7
4,890,377 UART: [idev] UDS.KEYID = 0
4,926,689 UART: [idev] Erasing UDS.KEYID = 0
8,236,932 UART: [idev] Sha1 KeyId Algorithm
8,259,805 UART: [idev] --
8,263,011 UART: [ldev] ++
8,263,637 UART: [ldev] CDI.KEYID = 6
8,264,819 UART: [ldev] SUBJECT.KEYID = 5
8,265,972 UART: [ldev] AUTHORITY.KEYID = 7
8,267,479 UART: [ldev] FE.KEYID = 1
8,312,226 UART: [ldev] Erasing FE.KEYID = 1
11,649,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,160 UART: [ldev] --
14,033,109 UART: [fwproc] Wait for Commands...
14,034,733 UART: [fwproc] Recv command 0x46574c44
14,037,050 UART: [fwproc] Recv'd Img size: 113760 bytes
18,104,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,176,183 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,245,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,561,946 >>> mbox cmd response: success
18,565,520 UART: [afmc] ++
18,566,222 UART: [afmc] CDI.KEYID = 6
18,567,405 UART: [afmc] SUBJECT.KEYID = 7
18,568,571 UART: [afmc] AUTHORITY.KEYID = 5
21,945,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,258,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,260,737 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,276,908 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,292,989 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,308,783 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,332,234 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
2,050,366 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,194,539 UART:
2,194,965 UART: Running Caliptra ROM ...
2,196,127 UART:
2,196,298 UART: [state] CFI Enabled
2,197,262 UART: [state] LifecycleState = Unprovisioned
2,198,922 UART: [state] DebugLocked = No
2,200,026 UART: [state] WD Timer not started. Device not locked for debugging
2,202,502 UART: [kat] SHA2-256
2,203,168 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,182 UART: [kat] ++
2,206,653 UART: [kat] sha1
2,207,213 UART: [kat] SHA2-256
2,207,904 UART: [kat] SHA2-384
2,208,609 UART: [kat] SHA2-512-ACC
2,209,413 UART: [kat] ECC-384
3,771,789 UART: [kat] HMAC-384Kdf
3,799,358 UART: [kat] LMS
4,872,478 UART: [kat] --
4,877,359 UART: [cold-reset] ++
4,878,818 UART: [fht] FHT @ 0x50003400
4,891,103 UART: [idev] ++
4,891,775 UART: [idev] CDI.KEYID = 6
4,892,929 UART: [idev] SUBJECT.KEYID = 7
4,894,141 UART: [idev] UDS.KEYID = 0
4,926,285 UART: [idev] Erasing UDS.KEYID = 0
8,238,091 UART: [idev] Sha1 KeyId Algorithm
8,259,836 UART: [idev] --
8,263,615 UART: [ldev] ++
8,264,220 UART: [ldev] CDI.KEYID = 6
8,265,416 UART: [ldev] SUBJECT.KEYID = 5
8,266,587 UART: [ldev] AUTHORITY.KEYID = 7
8,267,741 UART: [ldev] FE.KEYID = 1
8,314,920 UART: [ldev] Erasing FE.KEYID = 1
11,650,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,758 UART: [ldev] --
14,036,655 UART: [fwproc] Wait for Commands...
14,039,778 UART: [fwproc] Recv command 0x46574c44
14,042,102 UART: [fwproc] Recv'd Img size: 113760 bytes
18,105,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,175,839 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,244,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,561,042 >>> mbox cmd response: success
18,565,141 UART: [afmc] ++
18,565,830 UART: [afmc] CDI.KEYID = 6
18,566,985 UART: [afmc] SUBJECT.KEYID = 7
18,568,196 UART: [afmc] AUTHORITY.KEYID = 5
21,945,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,263,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,265,859 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,282,006 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,298,091 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,313,893 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,336,866 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.01s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,055,444 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,330,865 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,048,044 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,338,583 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,049,303 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,299,726 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,049,579 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,333,598 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,049,923 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,338,042 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,050,012 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,319,493 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
2,053,614 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,338,177 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,048,349 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,362,700 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,049,166 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,344,097 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,048,979 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,363,867 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,048,403 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,361,113 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,049,640 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,339,758 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,048,670 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,315,942 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,054,855 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,382,934 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,049,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,304,051 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,049,657 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,329,767 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,055,778 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,336,454 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,058,465 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,314,328 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,049,787 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,321,302 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.53s
Truncated 107056 bytes from beginning
407,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,722,838 >>> mbox cmd response: success
18,727,376 UART: [afmc] ++
18,728,261 UART: [afmc] CDI.KEYID = 6
18,729,238 UART: [afmc] SUBJECT.KEYID = 7
18,730,453 UART: [afmc] AUTHORITY.KEYID = 5
22,047,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,344,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,346,838 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,362,951 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,379,059 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,394,891 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,418,513 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
2,054,631 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,198,264 UART:
2,198,671 UART: Running Caliptra ROM ...
2,199,834 UART:
2,200,001 UART: [state] CFI Enabled
2,200,965 UART: [state] LifecycleState = Unprovisioned
2,202,610 UART: [state] DebugLocked = No
2,203,711 UART: [state] WD Timer not started. Device not locked for debugging
2,206,175 UART: [kat] SHA2-256
2,206,854 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,870 UART: [kat] ++
2,210,365 UART: [kat] sha1
2,210,871 UART: [kat] SHA2-256
2,211,522 UART: [kat] SHA2-384
2,212,173 UART: [kat] SHA2-512-ACC
2,213,049 UART: [kat] ECC-384
4,091,080 UART: [kat] HMAC-384Kdf
4,103,491 UART: [kat] LMS
5,176,640 UART: [kat] --
5,180,708 UART: [cold-reset] ++
5,182,532 UART: [fht] FHT @ 0x50003400
5,192,858 UART: [idev] ++
5,193,592 UART: [idev] CDI.KEYID = 6
5,194,773 UART: [idev] SUBJECT.KEYID = 7
5,196,195 UART: [idev] UDS.KEYID = 0
5,213,059 UART: [idev] Erasing UDS.KEYID = 0
8,487,420 UART: [idev] Sha1 KeyId Algorithm
8,509,355 UART: [idev] --
8,513,241 UART: [ldev] ++
8,513,804 UART: [ldev] CDI.KEYID = 6
8,514,960 UART: [ldev] SUBJECT.KEYID = 5
8,516,488 UART: [ldev] AUTHORITY.KEYID = 7
8,517,959 UART: [ldev] FE.KEYID = 1
8,527,572 UART: [ldev] Erasing FE.KEYID = 1
11,819,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,484 UART: [ldev] --
14,184,519 UART: [fwproc] Wait for Commands...
14,186,845 UART: [fwproc] Recv command 0x46574c44
14,189,154 UART: [fwproc] Recv'd Img size: 113760 bytes
18,252,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,328,604 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,397,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,714,213 >>> mbox cmd response: success
18,717,859 UART: [afmc] ++
18,718,610 UART: [afmc] CDI.KEYID = 6
18,719,706 UART: [afmc] SUBJECT.KEYID = 7
18,721,082 UART: [afmc] AUTHORITY.KEYID = 5
22,038,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,334,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,336,099 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,352,198 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,368,349 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,384,167 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,407,453 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,055,786 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,199,606 UART:
2,200,004 UART: Running Caliptra ROM ...
2,201,184 UART:
2,201,354 UART: [state] CFI Enabled
2,202,311 UART: [state] LifecycleState = Unprovisioned
2,203,965 UART: [state] DebugLocked = No
2,205,064 UART: [state] WD Timer not started. Device not locked for debugging
2,207,555 UART: [kat] SHA2-256
2,208,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,234 UART: [kat] ++
2,211,681 UART: [kat] sha1
2,212,186 UART: [kat] SHA2-256
2,212,920 UART: [kat] SHA2-384
2,213,581 UART: [kat] SHA2-512-ACC
2,214,455 UART: [kat] ECC-384
4,091,127 UART: [kat] HMAC-384Kdf
4,102,349 UART: [kat] LMS
5,175,526 UART: [kat] --
5,179,840 UART: [cold-reset] ++
5,182,524 UART: [fht] FHT @ 0x50003400
5,194,847 UART: [idev] ++
5,195,576 UART: [idev] CDI.KEYID = 6
5,196,751 UART: [idev] SUBJECT.KEYID = 7
5,198,250 UART: [idev] UDS.KEYID = 0
5,214,818 UART: [idev] Erasing UDS.KEYID = 0
8,489,934 UART: [idev] Sha1 KeyId Algorithm
8,512,093 UART: [idev] --
8,516,303 UART: [ldev] ++
8,516,921 UART: [ldev] CDI.KEYID = 6
8,518,026 UART: [ldev] SUBJECT.KEYID = 5
8,519,557 UART: [ldev] AUTHORITY.KEYID = 7
8,521,084 UART: [ldev] FE.KEYID = 1
8,532,810 UART: [ldev] Erasing FE.KEYID = 1
11,820,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,240 UART: [ldev] --
14,187,533 UART: [fwproc] Wait for Commands...
14,189,202 UART: [fwproc] Recv command 0x46574c44
14,191,511 UART: [fwproc] Recv'd Img size: 113760 bytes
18,258,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,328,223 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,397,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,712,899 >>> mbox cmd response: success
18,717,582 UART: [afmc] ++
18,718,275 UART: [afmc] CDI.KEYID = 6
18,719,376 UART: [afmc] SUBJECT.KEYID = 7
18,720,639 UART: [afmc] AUTHORITY.KEYID = 5
22,038,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,334,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,336,399 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,352,510 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,368,661 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,384,499 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,408,302 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
2,053,913 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,197,696 UART:
2,198,111 UART: Running Caliptra ROM ...
2,199,196 UART:
2,199,350 UART: [state] CFI Enabled
2,200,319 UART: [state] LifecycleState = Unprovisioned
2,201,891 UART: [state] DebugLocked = No
2,203,023 UART: [state] WD Timer not started. Device not locked for debugging
2,205,503 UART: [kat] SHA2-256
2,206,165 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,168 UART: [kat] ++
2,209,607 UART: [kat] sha1
2,210,109 UART: [kat] SHA2-256
2,210,753 UART: [kat] SHA2-384
2,211,427 UART: [kat] SHA2-512-ACC
2,212,217 UART: [kat] ECC-384
4,099,364 UART: [kat] HMAC-384Kdf
4,112,800 UART: [kat] LMS
5,185,930 UART: [kat] --
5,190,567 UART: [cold-reset] ++
5,192,177 UART: [fht] FHT @ 0x50003400
5,202,457 UART: [idev] ++
5,203,124 UART: [idev] CDI.KEYID = 6
5,204,373 UART: [idev] SUBJECT.KEYID = 7
5,205,807 UART: [idev] UDS.KEYID = 0
5,219,677 UART: [idev] Erasing UDS.KEYID = 0
8,496,847 UART: [idev] Sha1 KeyId Algorithm
8,518,843 UART: [idev] --
8,521,706 UART: [ldev] ++
8,522,327 UART: [ldev] CDI.KEYID = 6
8,523,426 UART: [ldev] SUBJECT.KEYID = 5
8,524,959 UART: [ldev] AUTHORITY.KEYID = 7
8,526,432 UART: [ldev] FE.KEYID = 1
8,537,233 UART: [ldev] Erasing FE.KEYID = 1
11,834,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,916 UART: [ldev] --
14,200,888 UART: [fwproc] Wait for Commands...
14,202,599 UART: [fwproc] Recv command 0x46574c44
14,204,903 UART: [fwproc] Recv'd Img size: 113760 bytes
18,269,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,340,883 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,409,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,725,738 >>> mbox cmd response: success
18,729,603 UART: [afmc] ++
18,730,297 UART: [afmc] CDI.KEYID = 6
18,731,454 UART: [afmc] SUBJECT.KEYID = 7
18,732,663 UART: [afmc] AUTHORITY.KEYID = 5
22,045,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,341,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,343,274 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,359,394 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,375,506 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,391,336 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,413,837 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.18s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,053,343 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,535,653 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,062,685 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,537,003 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,059,260 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,525,681 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
2,058,853 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,523,309 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
2,060,534 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,521,872 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,054,947 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,539,458 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,052,031 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,529,170 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,054,450 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,524,579 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,053,621 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,525,484 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,053,637 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,534,350 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,059,113 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,518,510 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,054,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,517,903 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
2,056,002 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,516,891 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
2,052,884 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,531,106 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,054,501 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,530,854 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,053,381 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,517,606 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,059,626 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,533,151 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,066,991 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,525,254 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,052,454 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,529,592 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.75s
Truncated 107056 bytes from beginning
949,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,266,575 >>> mbox cmd response: success
14,270,851 UART: [afmc] ++
14,271,469 UART: [afmc] CDI.KEYID = 6
14,272,383 UART: [afmc] SUBJECT.KEYID = 7
14,273,545 UART: [afmc] AUTHORITY.KEYID = 5
16,821,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,562,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,564,512 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,580,500 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,596,308 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,612,087 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,634,531 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,055,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,143 UART:
2,200,557 UART: Running Caliptra ROM ...
2,201,725 UART:
2,201,895 UART: [state] CFI Enabled
2,202,860 UART: [state] LifecycleState = Unprovisioned
2,204,514 UART: [state] DebugLocked = No
2,205,619 UART: [state] WD Timer not started. Device not locked for debugging
2,208,101 UART: [kat] SHA2-256
2,208,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,783 UART: [kat] ++
2,212,239 UART: [kat] sha1
2,212,757 UART: [kat] SHA2-256
2,213,415 UART: [kat] SHA2-384
2,214,068 UART: [kat] SHA2-512-ACC
2,214,982 UART: [kat] ECC-384
2,942,933 UART: [kat] HMAC-384Kdf
2,967,999 UART: [kat] LMS
3,497,480 UART: [kat] --
3,502,623 UART: [cold-reset] ++
3,505,130 UART: [fht] FHT @ 0x50003400
3,516,016 UART: [idev] ++
3,516,593 UART: [idev] CDI.KEYID = 6
3,517,521 UART: [idev] SUBJECT.KEYID = 7
3,518,683 UART: [idev] UDS.KEYID = 0
3,540,219 UART: [idev] Erasing UDS.KEYID = 0
6,024,217 UART: [idev] Sha1 KeyId Algorithm
6,047,397 UART: [idev] --
6,052,308 UART: [ldev] ++
6,052,887 UART: [ldev] CDI.KEYID = 6
6,053,800 UART: [ldev] SUBJECT.KEYID = 5
6,054,984 UART: [ldev] AUTHORITY.KEYID = 7
6,056,225 UART: [ldev] FE.KEYID = 1
6,097,022 UART: [ldev] Erasing FE.KEYID = 1
8,601,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,371 UART: [ldev] --
10,410,749 UART: [fwproc] Wait for Commands...
10,413,926 UART: [fwproc] Recv command 0x46574c44
10,415,977 UART: [fwproc] Recv'd Img size: 114084 bytes
13,812,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,887,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,070 >>> mbox cmd response: success
14,278,255 UART: [afmc] ++
14,278,841 UART: [afmc] CDI.KEYID = 6
14,279,749 UART: [afmc] SUBJECT.KEYID = 7
14,280,908 UART: [afmc] AUTHORITY.KEYID = 5
16,804,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,267 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,547,219 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,563,048 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,578,807 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,602,605 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,059,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,203,818 UART:
2,204,225 UART: Running Caliptra ROM ...
2,205,381 UART:
2,205,555 UART: [state] CFI Enabled
2,206,514 UART: [state] LifecycleState = Unprovisioned
2,208,183 UART: [state] DebugLocked = No
2,209,295 UART: [state] WD Timer not started. Device not locked for debugging
2,211,777 UART: [kat] SHA2-256
2,212,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,466 UART: [kat] ++
2,215,918 UART: [kat] sha1
2,216,468 UART: [kat] SHA2-256
2,217,145 UART: [kat] SHA2-384
2,217,807 UART: [kat] SHA2-512-ACC
2,218,653 UART: [kat] ECC-384
2,943,670 UART: [kat] HMAC-384Kdf
2,968,029 UART: [kat] LMS
3,497,510 UART: [kat] --
3,501,858 UART: [cold-reset] ++
3,504,234 UART: [fht] FHT @ 0x50003400
3,515,271 UART: [idev] ++
3,515,846 UART: [idev] CDI.KEYID = 6
3,516,759 UART: [idev] SUBJECT.KEYID = 7
3,517,922 UART: [idev] UDS.KEYID = 0
3,539,412 UART: [idev] Erasing UDS.KEYID = 0
6,022,238 UART: [idev] Sha1 KeyId Algorithm
6,045,519 UART: [idev] --
6,049,387 UART: [ldev] ++
6,049,989 UART: [ldev] CDI.KEYID = 6
6,050,904 UART: [ldev] SUBJECT.KEYID = 5
6,052,069 UART: [ldev] AUTHORITY.KEYID = 7
6,053,307 UART: [ldev] FE.KEYID = 1
6,096,250 UART: [ldev] Erasing FE.KEYID = 1
8,598,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,454 UART: [ldev] --
10,408,428 UART: [fwproc] Wait for Commands...
10,411,125 UART: [fwproc] Recv command 0x46574c44
10,413,223 UART: [fwproc] Recv'd Img size: 114084 bytes
13,807,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,883,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,268,560 >>> mbox cmd response: success
14,272,265 UART: [afmc] ++
14,272,880 UART: [afmc] CDI.KEYID = 6
14,273,799 UART: [afmc] SUBJECT.KEYID = 7
14,274,964 UART: [afmc] AUTHORITY.KEYID = 5
16,802,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,978 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,544,972 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,560,778 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,576,581 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,599,299 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,587 writing to cptra_bootfsm_go
2,056,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,201,196 UART:
2,201,620 UART: Running Caliptra ROM ...
2,202,708 UART:
2,202,863 UART: [state] CFI Enabled
2,203,833 UART: [state] LifecycleState = Unprovisioned
2,205,493 UART: [state] DebugLocked = No
2,206,520 UART: [state] WD Timer not started. Device not locked for debugging
2,208,987 UART: [kat] SHA2-256
2,209,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,668 UART: [kat] ++
2,213,115 UART: [kat] sha1
2,213,643 UART: [kat] SHA2-256
2,214,305 UART: [kat] SHA2-384
2,214,958 UART: [kat] SHA2-512-ACC
2,215,789 UART: [kat] ECC-384
2,943,415 UART: [kat] HMAC-384Kdf
2,968,846 UART: [kat] LMS
3,498,323 UART: [kat] --
3,502,560 UART: [cold-reset] ++
3,503,695 UART: [fht] FHT @ 0x50003400
3,514,459 UART: [idev] ++
3,515,023 UART: [idev] CDI.KEYID = 6
3,515,936 UART: [idev] SUBJECT.KEYID = 7
3,517,154 UART: [idev] UDS.KEYID = 0
3,541,556 UART: [idev] Erasing UDS.KEYID = 0
6,020,483 UART: [idev] Sha1 KeyId Algorithm
6,043,930 UART: [idev] --
6,046,326 UART: [ldev] ++
6,046,906 UART: [ldev] CDI.KEYID = 6
6,047,791 UART: [ldev] SUBJECT.KEYID = 5
6,048,929 UART: [ldev] AUTHORITY.KEYID = 7
6,050,270 UART: [ldev] FE.KEYID = 1
6,097,565 UART: [ldev] Erasing FE.KEYID = 1
8,599,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,533 UART: [ldev] --
10,408,766 UART: [fwproc] Wait for Commands...
10,411,192 UART: [fwproc] Recv command 0x46574c44
10,413,290 UART: [fwproc] Recv'd Img size: 114084 bytes
13,813,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,884,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,673 >>> mbox cmd response: success
14,275,091 UART: [afmc] ++
14,275,686 UART: [afmc] CDI.KEYID = 6
14,276,567 UART: [afmc] SUBJECT.KEYID = 7
14,277,785 UART: [afmc] AUTHORITY.KEYID = 5
16,815,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,539,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,541,817 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,557,807 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,573,642 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,589,404 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,611,731 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.87s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,056,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,470 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,061,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,032,067 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,049,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,083,527 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,059,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,085,384 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,058,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,042,055 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,051,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,040,788 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,050,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,416 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,050,491 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,911 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,050,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,863 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
2,058,435 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,604 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,050,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,040,815 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,054,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,692 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
2,050,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,058 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,052,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,054,706 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,057,520 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,018,713 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,567 writing to cptra_bootfsm_go
2,052,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,000 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,065,134 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,072,508 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
2,064,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,046,998 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,050,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,046,104 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.42s
Truncated 107056 bytes from beginning
163,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,481,388 >>> mbox cmd response: success
14,485,234 UART: [afmc] ++
14,485,823 UART: [afmc] CDI.KEYID = 6
14,486,732 UART: [afmc] SUBJECT.KEYID = 7
14,487,942 UART: [afmc] AUTHORITY.KEYID = 5
16,986,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,741 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,724,755 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,740,588 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,756,300 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,779,493 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
2,053,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,197,577 UART:
2,197,972 UART: Running Caliptra ROM ...
2,199,147 UART:
2,199,352 UART: [state] CFI Enabled
2,200,307 UART: [state] LifecycleState = Unprovisioned
2,201,962 UART: [state] DebugLocked = No
2,203,067 UART: [state] WD Timer not started. Device not locked for debugging
2,205,546 UART: [kat] SHA2-256
2,206,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,219 UART: [kat] ++
2,209,670 UART: [kat] sha1
2,210,182 UART: [kat] SHA2-256
2,210,919 UART: [kat] SHA2-384
2,211,583 UART: [kat] SHA2-512-ACC
2,212,412 UART: [kat] ECC-384
3,281,079 UART: [kat] HMAC-384Kdf
3,292,424 UART: [kat] LMS
3,821,903 UART: [kat] --
3,825,566 UART: [cold-reset] ++
3,826,432 UART: [fht] FHT @ 0x50003400
3,838,108 UART: [idev] ++
3,838,742 UART: [idev] CDI.KEYID = 6
3,839,660 UART: [idev] SUBJECT.KEYID = 7
3,840,768 UART: [idev] UDS.KEYID = 0
3,856,635 UART: [idev] Erasing UDS.KEYID = 0
6,313,546 UART: [idev] Sha1 KeyId Algorithm
6,335,040 UART: [idev] --
6,339,251 UART: [ldev] ++
6,339,817 UART: [ldev] CDI.KEYID = 6
6,340,723 UART: [ldev] SUBJECT.KEYID = 5
6,341,824 UART: [ldev] AUTHORITY.KEYID = 7
6,343,167 UART: [ldev] FE.KEYID = 1
6,354,026 UART: [ldev] Erasing FE.KEYID = 1
8,829,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,360 UART: [ldev] --
10,619,650 UART: [fwproc] Wait for Commands...
10,621,850 UART: [fwproc] Recv command 0x46574c44
10,623,944 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,099,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,484,840 >>> mbox cmd response: success
14,489,705 UART: [afmc] ++
14,490,294 UART: [afmc] CDI.KEYID = 6
14,491,358 UART: [afmc] SUBJECT.KEYID = 7
14,492,456 UART: [afmc] AUTHORITY.KEYID = 5
16,992,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,811 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,730,824 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,746,647 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,762,418 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,785,515 UART: [afmc] --
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,056,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,387 UART:
2,200,793 UART: Running Caliptra ROM ...
2,201,942 UART:
2,202,112 UART: [state] CFI Enabled
2,203,080 UART: [state] LifecycleState = Unprovisioned
2,204,735 UART: [state] DebugLocked = No
2,205,840 UART: [state] WD Timer not started. Device not locked for debugging
2,208,318 UART: [kat] SHA2-256
2,208,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,996 UART: [kat] ++
2,212,488 UART: [kat] sha1
2,213,033 UART: [kat] SHA2-256
2,213,695 UART: [kat] SHA2-384
2,214,352 UART: [kat] SHA2-512-ACC
2,215,151 UART: [kat] ECC-384
3,285,805 UART: [kat] HMAC-384Kdf
3,298,975 UART: [kat] LMS
3,828,496 UART: [kat] --
3,832,476 UART: [cold-reset] ++
3,833,438 UART: [fht] FHT @ 0x50003400
3,843,391 UART: [idev] ++
3,843,949 UART: [idev] CDI.KEYID = 6
3,844,856 UART: [idev] SUBJECT.KEYID = 7
3,846,066 UART: [idev] UDS.KEYID = 0
3,863,289 UART: [idev] Erasing UDS.KEYID = 0
6,322,017 UART: [idev] Sha1 KeyId Algorithm
6,345,139 UART: [idev] --
6,348,784 UART: [ldev] ++
6,349,357 UART: [ldev] CDI.KEYID = 6
6,350,264 UART: [ldev] SUBJECT.KEYID = 5
6,351,473 UART: [ldev] AUTHORITY.KEYID = 7
6,352,703 UART: [ldev] FE.KEYID = 1
6,365,503 UART: [ldev] Erasing FE.KEYID = 1
8,840,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,146 UART: [ldev] --
10,631,705 UART: [fwproc] Wait for Commands...
10,634,013 UART: [fwproc] Recv command 0x46574c44
10,636,105 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,105,865 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,183 >>> mbox cmd response: success
14,494,947 UART: [afmc] ++
14,495,711 UART: [afmc] CDI.KEYID = 6
14,496,604 UART: [afmc] SUBJECT.KEYID = 7
14,497,650 UART: [afmc] AUTHORITY.KEYID = 5
16,996,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,886 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,736,850 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,752,634 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,768,407 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,790,638 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,055,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,135 UART:
2,199,565 UART: Running Caliptra ROM ...
2,200,647 UART:
2,200,804 UART: [state] CFI Enabled
2,201,705 UART: [state] LifecycleState = Unprovisioned
2,203,364 UART: [state] DebugLocked = No
2,204,387 UART: [state] WD Timer not started. Device not locked for debugging
2,206,865 UART: [kat] SHA2-256
2,207,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,541 UART: [kat] ++
2,210,993 UART: [kat] sha1
2,211,505 UART: [kat] SHA2-256
2,212,244 UART: [kat] SHA2-384
2,212,911 UART: [kat] SHA2-512-ACC
2,213,716 UART: [kat] ECC-384
3,279,568 UART: [kat] HMAC-384Kdf
3,291,741 UART: [kat] LMS
3,821,202 UART: [kat] --
3,824,461 UART: [cold-reset] ++
3,825,798 UART: [fht] FHT @ 0x50003400
3,835,860 UART: [idev] ++
3,836,418 UART: [idev] CDI.KEYID = 6
3,837,352 UART: [idev] SUBJECT.KEYID = 7
3,838,559 UART: [idev] UDS.KEYID = 0
3,856,667 UART: [idev] Erasing UDS.KEYID = 0
6,314,154 UART: [idev] Sha1 KeyId Algorithm
6,337,213 UART: [idev] --
6,342,444 UART: [ldev] ++
6,343,010 UART: [ldev] CDI.KEYID = 6
6,343,920 UART: [ldev] SUBJECT.KEYID = 5
6,345,135 UART: [ldev] AUTHORITY.KEYID = 7
6,346,371 UART: [ldev] FE.KEYID = 1
6,355,393 UART: [ldev] Erasing FE.KEYID = 1
8,830,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,786 UART: [ldev] --
10,617,247 UART: [fwproc] Wait for Commands...
10,619,401 UART: [fwproc] Recv command 0x46574c44
10,621,495 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,090,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,476,886 >>> mbox cmd response: success
14,480,750 UART: [afmc] ++
14,481,339 UART: [afmc] CDI.KEYID = 6
14,482,221 UART: [afmc] SUBJECT.KEYID = 7
14,483,445 UART: [afmc] AUTHORITY.KEYID = 5
16,983,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,058 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,719,999 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,735,834 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,751,595 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,774,910 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,055,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,114 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,052,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,778 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
2,054,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,948 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,053,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,262,385 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,062,186 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,947 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,053,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,364 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,060,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,850 >>> mbox cmd response: success
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,053,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,417 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,053,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,256,533 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,054,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,221 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,061,704 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,111 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
2,068,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,258,500 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,053,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,243,907 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,053,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,620 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
2,054,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,306 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,862 writing to cptra_bootfsm_go
2,054,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,330 >>> mbox cmd response: success
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,060,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,289 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,054,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,252 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
2,060,455 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,741 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.70s
Truncated 107056 bytes from beginning
935,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,252,618 >>> mbox cmd response: success
14,256,837 UART: [afmc] ++
14,257,429 UART: [afmc] CDI.KEYID = 6
14,258,337 UART: [afmc] SUBJECT.KEYID = 7
14,259,499 UART: [afmc] AUTHORITY.KEYID = 5
16,788,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,662 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,526,601 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,542,460 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,558,213 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,580,692 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,057,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,201,752 UART:
2,202,170 UART: Running Caliptra ROM ...
2,203,252 UART:
2,203,403 UART: [state] CFI Enabled
2,204,372 UART: [state] LifecycleState = Unprovisioned
2,206,032 UART: [state] DebugLocked = No
2,207,145 UART: [state] WD Timer not started. Device not locked for debugging
2,209,623 UART: [kat] SHA2-256
2,210,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,324 UART: [kat] ++
2,213,782 UART: [kat] sha1
2,214,300 UART: [kat] SHA2-256
2,214,962 UART: [kat] SHA2-384
2,215,614 UART: [kat] SHA2-512-ACC
2,216,411 UART: [kat] ECC-384
2,947,273 UART: [kat] HMAC-384Kdf
2,970,876 UART: [kat] LMS
3,500,369 UART: [kat] --
3,506,792 UART: [cold-reset] ++
3,508,190 UART: [fht] FHT @ 0x50003400
3,519,723 UART: [idev] ++
3,520,325 UART: [idev] CDI.KEYID = 6
3,521,257 UART: [idev] SUBJECT.KEYID = 7
3,522,414 UART: [idev] UDS.KEYID = 0
3,541,634 UART: [idev] Erasing UDS.KEYID = 0
6,025,333 UART: [idev] Sha1 KeyId Algorithm
6,048,416 UART: [idev] --
6,052,151 UART: [ldev] ++
6,052,728 UART: [ldev] CDI.KEYID = 6
6,053,616 UART: [ldev] SUBJECT.KEYID = 5
6,054,834 UART: [ldev] AUTHORITY.KEYID = 7
6,055,994 UART: [ldev] FE.KEYID = 1
6,099,727 UART: [ldev] Erasing FE.KEYID = 1
8,600,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,389 UART: [ldev] --
10,411,081 UART: [fwproc] Wait for Commands...
10,413,456 UART: [fwproc] Recv command 0x46574c44
10,415,570 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,886,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,271,559 >>> mbox cmd response: success
14,276,012 UART: [afmc] ++
14,276,601 UART: [afmc] CDI.KEYID = 6
14,277,513 UART: [afmc] SUBJECT.KEYID = 7
14,278,666 UART: [afmc] AUTHORITY.KEYID = 5
16,803,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,141 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,546,087 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,561,943 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,577,704 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,599,500 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,052,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,196,979 UART:
2,197,385 UART: Running Caliptra ROM ...
2,198,553 UART:
2,198,728 UART: [state] CFI Enabled
2,199,695 UART: [state] LifecycleState = Unprovisioned
2,201,358 UART: [state] DebugLocked = No
2,202,468 UART: [state] WD Timer not started. Device not locked for debugging
2,205,197 UART: [kat] SHA2-256
2,205,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,898 UART: [kat] ++
2,209,352 UART: [kat] sha1
2,209,865 UART: [kat] SHA2-256
2,210,605 UART: [kat] SHA2-384
2,211,268 UART: [kat] SHA2-512-ACC
2,212,098 UART: [kat] ECC-384
2,945,957 UART: [kat] HMAC-384Kdf
2,967,785 UART: [kat] LMS
3,497,200 UART: [kat] --
3,502,375 UART: [cold-reset] ++
3,503,450 UART: [fht] FHT @ 0x50003400
3,513,945 UART: [idev] ++
3,514,507 UART: [idev] CDI.KEYID = 6
3,515,521 UART: [idev] SUBJECT.KEYID = 7
3,516,645 UART: [idev] UDS.KEYID = 0
3,540,240 UART: [idev] Erasing UDS.KEYID = 0
6,022,496 UART: [idev] Sha1 KeyId Algorithm
6,045,314 UART: [idev] --
6,049,186 UART: [ldev] ++
6,049,770 UART: [ldev] CDI.KEYID = 6
6,050,684 UART: [ldev] SUBJECT.KEYID = 5
6,051,850 UART: [ldev] AUTHORITY.KEYID = 7
6,053,086 UART: [ldev] FE.KEYID = 1
6,097,417 UART: [ldev] Erasing FE.KEYID = 1
8,598,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,953 UART: [ldev] --
10,409,598 UART: [fwproc] Wait for Commands...
10,412,238 UART: [fwproc] Recv command 0x46574c44
10,414,282 UART: [fwproc] Recv'd Img size: 114084 bytes
13,808,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,883,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,269,971 >>> mbox cmd response: success
14,273,703 UART: [afmc] ++
14,274,290 UART: [afmc] CDI.KEYID = 6
14,275,200 UART: [afmc] SUBJECT.KEYID = 7
14,276,417 UART: [afmc] AUTHORITY.KEYID = 5
16,800,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,491 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,544,443 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,560,314 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,576,077 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,598,471 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,053,365 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,197,485 UART:
2,197,900 UART: Running Caliptra ROM ...
2,199,071 UART:
2,199,244 UART: [state] CFI Enabled
2,200,205 UART: [state] LifecycleState = Unprovisioned
2,201,862 UART: [state] DebugLocked = No
2,202,990 UART: [state] WD Timer not started. Device not locked for debugging
2,205,470 UART: [kat] SHA2-256
2,206,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,147 UART: [kat] ++
2,209,597 UART: [kat] sha1
2,210,140 UART: [kat] SHA2-256
2,210,847 UART: [kat] SHA2-384
2,211,504 UART: [kat] SHA2-512-ACC
2,212,303 UART: [kat] ECC-384
2,944,883 UART: [kat] HMAC-384Kdf
2,970,376 UART: [kat] LMS
3,499,805 UART: [kat] --
3,505,538 UART: [cold-reset] ++
3,507,200 UART: [fht] FHT @ 0x50003400
3,518,018 UART: [idev] ++
3,518,592 UART: [idev] CDI.KEYID = 6
3,519,517 UART: [idev] SUBJECT.KEYID = 7
3,520,679 UART: [idev] UDS.KEYID = 0
3,541,466 UART: [idev] Erasing UDS.KEYID = 0
6,027,486 UART: [idev] Sha1 KeyId Algorithm
6,050,724 UART: [idev] --
6,053,802 UART: [ldev] ++
6,054,378 UART: [ldev] CDI.KEYID = 6
6,055,263 UART: [ldev] SUBJECT.KEYID = 5
6,056,479 UART: [ldev] AUTHORITY.KEYID = 7
6,057,715 UART: [ldev] FE.KEYID = 1
6,098,430 UART: [ldev] Erasing FE.KEYID = 1
8,596,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,219 UART: [ldev] --
10,389,434 UART: [fwproc] Wait for Commands...
10,392,066 UART: [fwproc] Recv command 0x46574c44
10,394,164 UART: [fwproc] Recv'd Img size: 114084 bytes
13,795,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,869,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,255,178 >>> mbox cmd response: success
14,259,775 UART: [afmc] ++
14,260,363 UART: [afmc] CDI.KEYID = 6
14,261,268 UART: [afmc] SUBJECT.KEYID = 7
14,262,427 UART: [afmc] AUTHORITY.KEYID = 5
16,802,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,983 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,546,934 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,562,721 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,578,524 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,601,077 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.88s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,061,494 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,268 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,051,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,033,317 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,052,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,799 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,065,807 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,049,998 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,062,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,052,802 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,051,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,314 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,059,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,084 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,050,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,060,413 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,051,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,055,726 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,050,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,086,410 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,055,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,061,708 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,058,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,046,068 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,061,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,078,448 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
2,053,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,062,188 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
2,050,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,027,159 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,063,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,033,184 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,059,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,032,301 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,063,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,054,597 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,060,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,101 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.43s
Truncated 107056 bytes from beginning
159,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,855 >>> mbox cmd response: success
14,480,552 UART: [afmc] ++
14,481,137 UART: [afmc] CDI.KEYID = 6
14,482,044 UART: [afmc] SUBJECT.KEYID = 7
14,483,259 UART: [afmc] AUTHORITY.KEYID = 5
16,981,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,700,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,742 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,718,690 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,734,512 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,750,281 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,772,697 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
2,054,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,006 UART:
2,199,394 UART: Running Caliptra ROM ...
2,200,582 UART:
2,200,755 UART: [state] CFI Enabled
2,201,713 UART: [state] LifecycleState = Unprovisioned
2,203,376 UART: [state] DebugLocked = No
2,204,481 UART: [state] WD Timer not started. Device not locked for debugging
2,206,977 UART: [kat] SHA2-256
2,207,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,650 UART: [kat] ++
2,211,098 UART: [kat] sha1
2,211,697 UART: [kat] SHA2-256
2,212,362 UART: [kat] SHA2-384
2,213,018 UART: [kat] SHA2-512-ACC
2,213,900 UART: [kat] ECC-384
3,278,631 UART: [kat] HMAC-384Kdf
3,290,966 UART: [kat] LMS
3,820,473 UART: [kat] --
3,824,949 UART: [cold-reset] ++
3,827,416 UART: [fht] FHT @ 0x50003400
3,837,470 UART: [idev] ++
3,838,032 UART: [idev] CDI.KEYID = 6
3,839,049 UART: [idev] SUBJECT.KEYID = 7
3,840,170 UART: [idev] UDS.KEYID = 0
3,855,766 UART: [idev] Erasing UDS.KEYID = 0
6,311,404 UART: [idev] Sha1 KeyId Algorithm
6,334,252 UART: [idev] --
6,338,870 UART: [ldev] ++
6,339,494 UART: [ldev] CDI.KEYID = 6
6,340,430 UART: [ldev] SUBJECT.KEYID = 5
6,341,535 UART: [ldev] AUTHORITY.KEYID = 7
6,342,767 UART: [ldev] FE.KEYID = 1
6,352,927 UART: [ldev] Erasing FE.KEYID = 1
8,827,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,441 UART: [ldev] --
10,619,024 UART: [fwproc] Wait for Commands...
10,622,262 UART: [fwproc] Recv command 0x46574c44
10,624,355 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,088,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,474,454 >>> mbox cmd response: success
14,478,976 UART: [afmc] ++
14,479,562 UART: [afmc] CDI.KEYID = 6
14,480,470 UART: [afmc] SUBJECT.KEYID = 7
14,481,629 UART: [afmc] AUTHORITY.KEYID = 5
16,983,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,352 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,723,286 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,739,131 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,754,940 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,779,087 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,056,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,171 UART:
2,200,562 UART: Running Caliptra ROM ...
2,201,729 UART:
2,201,904 UART: [state] CFI Enabled
2,202,859 UART: [state] LifecycleState = Unprovisioned
2,204,737 UART: [state] DebugLocked = No
2,205,878 UART: [state] WD Timer not started. Device not locked for debugging
2,208,362 UART: [kat] SHA2-256
2,209,029 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,047 UART: [kat] ++
2,212,500 UART: [kat] sha1
2,213,016 UART: [kat] SHA2-256
2,213,677 UART: [kat] SHA2-384
2,214,332 UART: [kat] SHA2-512-ACC
2,215,132 UART: [kat] ECC-384
3,282,565 UART: [kat] HMAC-384Kdf
3,295,451 UART: [kat] LMS
3,824,955 UART: [kat] --
3,828,408 UART: [cold-reset] ++
3,829,363 UART: [fht] FHT @ 0x50003400
3,840,072 UART: [idev] ++
3,840,640 UART: [idev] CDI.KEYID = 6
3,841,628 UART: [idev] SUBJECT.KEYID = 7
3,842,783 UART: [idev] UDS.KEYID = 0
3,860,912 UART: [idev] Erasing UDS.KEYID = 0
6,318,825 UART: [idev] Sha1 KeyId Algorithm
6,341,188 UART: [idev] --
6,345,235 UART: [ldev] ++
6,345,801 UART: [ldev] CDI.KEYID = 6
6,346,762 UART: [ldev] SUBJECT.KEYID = 5
6,347,923 UART: [ldev] AUTHORITY.KEYID = 7
6,349,152 UART: [ldev] FE.KEYID = 1
6,360,716 UART: [ldev] Erasing FE.KEYID = 1
8,832,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,874 UART: [ldev] --
10,623,459 UART: [fwproc] Wait for Commands...
10,625,669 UART: [fwproc] Recv command 0x46574c44
10,627,714 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,097,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,484,062 >>> mbox cmd response: success
14,487,884 UART: [afmc] ++
14,488,468 UART: [afmc] CDI.KEYID = 6
14,489,350 UART: [afmc] SUBJECT.KEYID = 7
14,490,563 UART: [afmc] AUTHORITY.KEYID = 5
16,993,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,416 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,730,346 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,746,197 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,761,982 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,784,100 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,054,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,198,887 UART:
2,199,320 UART: Running Caliptra ROM ...
2,200,443 UART:
2,200,617 UART: [state] CFI Enabled
2,201,586 UART: [state] LifecycleState = Unprovisioned
2,203,271 UART: [state] DebugLocked = No
2,204,384 UART: [state] WD Timer not started. Device not locked for debugging
2,206,861 UART: [kat] SHA2-256
2,207,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,556 UART: [kat] ++
2,211,007 UART: [kat] sha1
2,211,721 UART: [kat] SHA2-256
2,212,393 UART: [kat] SHA2-384
2,213,050 UART: [kat] SHA2-512-ACC
2,213,883 UART: [kat] ECC-384
3,281,954 UART: [kat] HMAC-384Kdf
3,294,938 UART: [kat] LMS
3,824,456 UART: [kat] --
3,828,406 UART: [cold-reset] ++
3,830,552 UART: [fht] FHT @ 0x50003400
3,841,523 UART: [idev] ++
3,842,145 UART: [idev] CDI.KEYID = 6
3,843,062 UART: [idev] SUBJECT.KEYID = 7
3,844,227 UART: [idev] UDS.KEYID = 0
3,863,978 UART: [idev] Erasing UDS.KEYID = 0
6,319,712 UART: [idev] Sha1 KeyId Algorithm
6,342,503 UART: [idev] --
6,346,385 UART: [ldev] ++
6,346,954 UART: [ldev] CDI.KEYID = 6
6,347,841 UART: [ldev] SUBJECT.KEYID = 5
6,349,050 UART: [ldev] AUTHORITY.KEYID = 7
6,350,284 UART: [ldev] FE.KEYID = 1
6,361,772 UART: [ldev] Erasing FE.KEYID = 1
8,834,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,853 UART: [ldev] --
10,624,038 UART: [fwproc] Wait for Commands...
10,625,759 UART: [fwproc] Recv command 0x46574c44
10,627,854 UART: [fwproc] Recv'd Img size: 114084 bytes
14,025,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,097,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,540 >>> mbox cmd response: success
14,488,466 UART: [afmc] ++
14,489,054 UART: [afmc] CDI.KEYID = 6
14,489,965 UART: [afmc] SUBJECT.KEYID = 7
14,491,123 UART: [afmc] AUTHORITY.KEYID = 5
16,992,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,243 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,731,222 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,747,059 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,762,845 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,785,539 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,061,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,559 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,053,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,660 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,061,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,305 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,053,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,200 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,055,520 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,644 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,055,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,700 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,057,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,211 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,054,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,253,470 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,053,520 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,701 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,054,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,425 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,053,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,672 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,055,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,698 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,054,398 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,276,230 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,053,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,859 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,055,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,854 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,054,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,555 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,053,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,288,771 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,054,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,777 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
2,054,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,917 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.71s
Truncated 104976 bytes from beginning
4
1,283,210 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,860 >>> mbox cmd response: success
2,770,891 UART: [afmc] ++
2,771,059 UART: [afmc] CDI.KEYID = 6
2,771,422 UART: [afmc] SUBJECT.KEYID = 7
2,771,848 UART: [afmc] AUTHORITY.KEYID = 5
2,807,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,676 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,389 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,298 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,012 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,859 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,681 UART: [idev] ++
1,173,849 UART: [idev] CDI.KEYID = 6
1,174,210 UART: [idev] SUBJECT.KEYID = 7
1,174,635 UART: [idev] UDS.KEYID = 0
1,182,737 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,819 UART: [idev] --
1,209,970 UART: [ldev] ++
1,210,138 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,929 UART: [ldev] AUTHORITY.KEYID = 7
1,211,392 UART: [ldev] FE.KEYID = 1
1,216,584 UART: [ldev] Erasing FE.KEYID = 1
1,243,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,040 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,396 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,758 >>> mbox cmd response: success
2,771,903 UART: [afmc] ++
2,772,071 UART: [afmc] CDI.KEYID = 6
2,772,434 UART: [afmc] SUBJECT.KEYID = 7
2,772,860 UART: [afmc] AUTHORITY.KEYID = 5
2,809,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,318 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,031 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,940 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,654 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,517 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,367 UART: [kat] SHA2-256
901,307 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
920,904 UART: [kat] LMS
1,169,216 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,694 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,056 >>> mbox cmd response: success
2,769,197 UART: [afmc] ++
2,769,365 UART: [afmc] CDI.KEYID = 6
2,769,728 UART: [afmc] SUBJECT.KEYID = 7
2,770,154 UART: [afmc] AUTHORITY.KEYID = 5
2,805,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,848 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,561 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,470 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,184 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,137 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,563 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,040 UART: [ldev] ++
1,209,208 UART: [ldev] CDI.KEYID = 6
1,209,572 UART: [ldev] SUBJECT.KEYID = 5
1,209,999 UART: [ldev] AUTHORITY.KEYID = 7
1,210,462 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,826 >>> mbox cmd response: success
2,770,073 UART: [afmc] ++
2,770,241 UART: [afmc] CDI.KEYID = 6
2,770,604 UART: [afmc] SUBJECT.KEYID = 7
2,771,030 UART: [afmc] AUTHORITY.KEYID = 5
2,807,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,464 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,177 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,086 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,800 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,491 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.03s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,028 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,868 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,496 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,072 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,854 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,628 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,394 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,134 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,294 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,240 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,144 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,228 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,092 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,230 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,162 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,586 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,592 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,628 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,942 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,092 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,226 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.79s
Truncated 104976 bytes from beginning
4
1,283,011 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,549 >>> mbox cmd response: success
2,771,644 UART: [afmc] ++
2,771,812 UART: [afmc] CDI.KEYID = 6
2,772,175 UART: [afmc] SUBJECT.KEYID = 7
2,772,601 UART: [afmc] AUTHORITY.KEYID = 5
2,807,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,165 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,878 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,787 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,501 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,238 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,867 UART: [state] LifecycleState = Unprovisioned
85,522 UART: [state] DebugLocked = No
86,112 UART: [state] WD Timer not started. Device not locked for debugging
87,233 UART: [kat] SHA2-256
890,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,912 UART: [kat] ++
895,064 UART: [kat] sha1
899,182 UART: [kat] SHA2-256
901,122 UART: [kat] SHA2-384
904,015 UART: [kat] SHA2-512-ACC
905,916 UART: [kat] ECC-384
915,475 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,068 UART: [cold-reset] ++
1,169,622 UART: [fht] FHT @ 0x50003400
1,172,350 UART: [idev] ++
1,172,518 UART: [idev] CDI.KEYID = 6
1,172,879 UART: [idev] SUBJECT.KEYID = 7
1,173,304 UART: [idev] UDS.KEYID = 0
1,181,384 UART: [idev] Erasing UDS.KEYID = 0
1,198,360 UART: [idev] Sha1 KeyId Algorithm
1,207,132 UART: [idev] --
1,208,151 UART: [ldev] ++
1,208,319 UART: [ldev] CDI.KEYID = 6
1,208,683 UART: [ldev] SUBJECT.KEYID = 5
1,209,110 UART: [ldev] AUTHORITY.KEYID = 7
1,209,573 UART: [ldev] FE.KEYID = 1
1,214,791 UART: [ldev] Erasing FE.KEYID = 1
1,240,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,825 UART: [ldev] --
1,280,307 UART: [fwproc] Wait for Commands...
1,280,990 UART: [fwproc] Recv command 0x46574c44
1,281,723 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,473 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,841 >>> mbox cmd response: success
2,768,898 UART: [afmc] ++
2,769,066 UART: [afmc] CDI.KEYID = 6
2,769,429 UART: [afmc] SUBJECT.KEYID = 7
2,769,855 UART: [afmc] AUTHORITY.KEYID = 5
2,804,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,617 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,330 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,239 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,839,953 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,847,710 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
905,177 UART: [kat] SHA2-512-ACC
907,078 UART: [kat] ECC-384
917,113 UART: [kat] HMAC-384Kdf
921,757 UART: [kat] LMS
1,170,069 UART: [kat] --
1,171,170 UART: [cold-reset] ++
1,171,572 UART: [fht] FHT @ 0x50003400
1,174,242 UART: [idev] ++
1,174,410 UART: [idev] CDI.KEYID = 6
1,174,771 UART: [idev] SUBJECT.KEYID = 7
1,175,196 UART: [idev] UDS.KEYID = 0
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,209,164 UART: [idev] --
1,210,153 UART: [ldev] ++
1,210,321 UART: [ldev] CDI.KEYID = 6
1,210,685 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,225 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,187 >>> mbox cmd response: success
2,769,298 UART: [afmc] ++
2,769,466 UART: [afmc] CDI.KEYID = 6
2,769,829 UART: [afmc] SUBJECT.KEYID = 7
2,770,255 UART: [afmc] AUTHORITY.KEYID = 5
2,805,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,961 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,674 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,583 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,297 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,130 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,340 UART: [kat] SHA2-256
902,280 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,182,424 UART: [idev] Erasing UDS.KEYID = 0
1,198,822 UART: [idev] Sha1 KeyId Algorithm
1,207,660 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,559 UART: [ldev] --
1,282,049 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,017 >>> mbox cmd response: success
2,771,230 UART: [afmc] ++
2,771,398 UART: [afmc] CDI.KEYID = 6
2,771,761 UART: [afmc] SUBJECT.KEYID = 7
2,772,187 UART: [afmc] AUTHORITY.KEYID = 5
2,808,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,507 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,220 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,129 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,843 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,612 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.94s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,937 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,221 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,279 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,451 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,849 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,165 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,681 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,487 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,131 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,989 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,669 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,251 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,483 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,935 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,323 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,157 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,945 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,937 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,953 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,979 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,339 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.98s
Truncated 104976 bytes from beginning
4
1,281,850 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,240 >>> mbox cmd response: success
2,769,459 UART: [afmc] ++
2,769,627 UART: [afmc] CDI.KEYID = 6
2,769,990 UART: [afmc] SUBJECT.KEYID = 7
2,770,416 UART: [afmc] AUTHORITY.KEYID = 5
2,806,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,166 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,879 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,788 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,502 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,489 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,640 UART: [kat] LMS
1,168,952 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,315 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,216,134 UART: [ldev] Erasing FE.KEYID = 1
1,242,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,554 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,728 >>> mbox cmd response: success
2,770,821 UART: [afmc] ++
2,770,989 UART: [afmc] CDI.KEYID = 6
2,771,352 UART: [afmc] SUBJECT.KEYID = 7
2,771,778 UART: [afmc] AUTHORITY.KEYID = 5
2,807,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,840 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,553 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,462 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,176 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,067 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
915,734 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,197,963 UART: [idev] Sha1 KeyId Algorithm
1,206,853 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,886 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,055 UART: [fwproc] Recv command 0x46574c44
1,281,788 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,424 >>> mbox cmd response: success
2,770,453 UART: [afmc] ++
2,770,621 UART: [afmc] CDI.KEYID = 6
2,770,984 UART: [afmc] SUBJECT.KEYID = 7
2,771,410 UART: [afmc] AUTHORITY.KEYID = 5
2,806,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,336 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,049 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,958 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,672 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,471 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,500 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,445 UART: [idev] ++
1,172,613 UART: [idev] CDI.KEYID = 6
1,172,974 UART: [idev] SUBJECT.KEYID = 7
1,173,399 UART: [idev] UDS.KEYID = 0
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,207,815 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,280,850 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,286 >>> mbox cmd response: success
2,770,409 UART: [afmc] ++
2,770,577 UART: [afmc] CDI.KEYID = 6
2,770,940 UART: [afmc] SUBJECT.KEYID = 7
2,771,366 UART: [afmc] AUTHORITY.KEYID = 5
2,806,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,946 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,659 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,568 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,282 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,067 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.86s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,090 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,712 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,304 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,920 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,996 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,382 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,306 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,020 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,752 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,256 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,924 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,806 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,366 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,668 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,664 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,954 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,310 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,574 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,010 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,120 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,068 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.49s
Truncated 104976 bytes from beginning
4
1,283,003 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,919 >>> mbox cmd response: success
2,770,078 UART: [afmc] ++
2,770,246 UART: [afmc] CDI.KEYID = 6
2,770,609 UART: [afmc] SUBJECT.KEYID = 7
2,771,035 UART: [afmc] AUTHORITY.KEYID = 5
2,806,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,541 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,254 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,163 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,877 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,652 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,863 UART: [fwproc] Wait for Commands...
1,282,442 UART: [fwproc] Recv command 0x46574c44
1,283,175 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,771 >>> mbox cmd response: success
2,771,036 UART: [afmc] ++
2,771,204 UART: [afmc] CDI.KEYID = 6
2,771,567 UART: [afmc] SUBJECT.KEYID = 7
2,771,993 UART: [afmc] AUTHORITY.KEYID = 5
2,807,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,581 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,294 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,203 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,917 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,674 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,397 UART: [kat] SHA2-256
891,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,076 UART: [kat] ++
896,228 UART: [kat] sha1
900,492 UART: [kat] SHA2-256
902,432 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,730 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,174,026 UART: [idev] ++
1,174,194 UART: [idev] CDI.KEYID = 6
1,174,555 UART: [idev] SUBJECT.KEYID = 7
1,174,980 UART: [idev] UDS.KEYID = 0
1,182,998 UART: [idev] Erasing UDS.KEYID = 0
1,200,652 UART: [idev] Sha1 KeyId Algorithm
1,209,640 UART: [idev] --
1,210,869 UART: [ldev] ++
1,211,037 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,489 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,839 UART: [ldev] --
1,282,325 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,965 >>> mbox cmd response: success
2,770,062 UART: [afmc] ++
2,770,230 UART: [afmc] CDI.KEYID = 6
2,770,593 UART: [afmc] SUBJECT.KEYID = 7
2,771,019 UART: [afmc] AUTHORITY.KEYID = 5
2,807,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,371 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,084 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,993 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,707 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,758 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,875 UART: [kat] HMAC-384Kdf
921,441 UART: [kat] LMS
1,169,753 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,650 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,729 UART: [ldev] --
1,282,083 UART: [fwproc] Wait for Commands...
1,282,840 UART: [fwproc] Recv command 0x46574c44
1,283,573 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,175 >>> mbox cmd response: success
2,771,270 UART: [afmc] ++
2,771,438 UART: [afmc] CDI.KEYID = 6
2,771,801 UART: [afmc] SUBJECT.KEYID = 7
2,772,227 UART: [afmc] AUTHORITY.KEYID = 5
2,807,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,051 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,764 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,673 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,387 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,154 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.90s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,663 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,117 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,815 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,075 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,579 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,843 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,807 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,623 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,945 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,183 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,353 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,015 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,623 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,225 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,697 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,917 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,613 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,093 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,631 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,501 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.94s
Truncated 104976 bytes from beginning
4
1,282,684 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,242 >>> mbox cmd response: success
2,770,273 UART: [afmc] ++
2,770,441 UART: [afmc] CDI.KEYID = 6
2,770,804 UART: [afmc] SUBJECT.KEYID = 7
2,771,230 UART: [afmc] AUTHORITY.KEYID = 5
2,806,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,716 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,429 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,338 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,052 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,001 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,807 UART: [kat] ++
894,959 UART: [kat] sha1
899,115 UART: [kat] SHA2-256
901,055 UART: [kat] SHA2-384
903,794 UART: [kat] SHA2-512-ACC
905,695 UART: [kat] ECC-384
915,878 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,198,207 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,120 UART: [ldev] ++
1,208,288 UART: [ldev] CDI.KEYID = 6
1,208,652 UART: [ldev] SUBJECT.KEYID = 5
1,209,079 UART: [ldev] AUTHORITY.KEYID = 7
1,209,542 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,972 UART: [ldev] --
1,280,388 UART: [fwproc] Wait for Commands...
1,281,163 UART: [fwproc] Recv command 0x46574c44
1,281,896 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,986 >>> mbox cmd response: success
2,769,217 UART: [afmc] ++
2,769,385 UART: [afmc] CDI.KEYID = 6
2,769,748 UART: [afmc] SUBJECT.KEYID = 7
2,770,174 UART: [afmc] AUTHORITY.KEYID = 5
2,805,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,850 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,563 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,472 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,186 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,847,939 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
916,332 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,221 UART: [idev] --
1,208,252 UART: [ldev] ++
1,208,420 UART: [ldev] CDI.KEYID = 6
1,208,784 UART: [ldev] SUBJECT.KEYID = 5
1,209,211 UART: [ldev] AUTHORITY.KEYID = 7
1,209,674 UART: [ldev] FE.KEYID = 1
1,214,820 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,794 UART: [fwproc] Wait for Commands...
1,281,557 UART: [fwproc] Recv command 0x46574c44
1,282,290 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,114 >>> mbox cmd response: success
2,770,193 UART: [afmc] ++
2,770,361 UART: [afmc] CDI.KEYID = 6
2,770,724 UART: [afmc] SUBJECT.KEYID = 7
2,771,150 UART: [afmc] AUTHORITY.KEYID = 5
2,807,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,142 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,855 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,764 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,478 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,381 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,983 UART: [kat] ++
895,135 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
903,902 UART: [kat] SHA2-512-ACC
905,803 UART: [kat] ECC-384
915,174 UART: [kat] HMAC-384Kdf
919,688 UART: [kat] LMS
1,168,000 UART: [kat] --
1,168,713 UART: [cold-reset] ++
1,169,273 UART: [fht] FHT @ 0x50003400
1,171,953 UART: [idev] ++
1,172,121 UART: [idev] CDI.KEYID = 6
1,172,482 UART: [idev] SUBJECT.KEYID = 7
1,172,907 UART: [idev] UDS.KEYID = 0
1,180,949 UART: [idev] Erasing UDS.KEYID = 0
1,197,647 UART: [idev] Sha1 KeyId Algorithm
1,206,425 UART: [idev] --
1,207,344 UART: [ldev] ++
1,207,512 UART: [ldev] CDI.KEYID = 6
1,207,876 UART: [ldev] SUBJECT.KEYID = 5
1,208,303 UART: [ldev] AUTHORITY.KEYID = 7
1,208,766 UART: [ldev] FE.KEYID = 1
1,213,804 UART: [ldev] Erasing FE.KEYID = 1
1,239,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,696 UART: [ldev] --
1,279,042 UART: [fwproc] Wait for Commands...
1,279,807 UART: [fwproc] Recv command 0x46574c44
1,280,540 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,601,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,766,570 >>> mbox cmd response: success
2,767,619 UART: [afmc] ++
2,767,787 UART: [afmc] CDI.KEYID = 6
2,768,150 UART: [afmc] SUBJECT.KEYID = 7
2,768,576 UART: [afmc] AUTHORITY.KEYID = 5
2,803,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,208 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,826,921 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,832,830 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,838,544 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,846,221 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.70s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,802 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,504 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,256 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,562 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,906 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,154 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,374 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,716 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,822 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,615,770 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,556 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,494 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,950 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,770 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,834 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,336 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,452 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,208 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,952 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,666 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,372 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.70s
Truncated 104976 bytes from beginning
4
1,283,177 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,259 >>> mbox cmd response: success
2,771,526 UART: [afmc] ++
2,771,694 UART: [afmc] CDI.KEYID = 6
2,772,057 UART: [afmc] SUBJECT.KEYID = 7
2,772,483 UART: [afmc] AUTHORITY.KEYID = 5
2,808,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,221 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,934 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,843 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,557 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,490 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,282,014 UART: [fwproc] Recv command 0x46574c44
1,282,747 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,751 >>> mbox cmd response: success
2,769,876 UART: [afmc] ++
2,770,044 UART: [afmc] CDI.KEYID = 6
2,770,407 UART: [afmc] SUBJECT.KEYID = 7
2,770,833 UART: [afmc] AUTHORITY.KEYID = 5
2,805,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,171 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,884 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,793 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,507 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,232 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
905,073 UART: [kat] SHA2-512-ACC
906,974 UART: [kat] ECC-384
917,097 UART: [kat] HMAC-384Kdf
921,657 UART: [kat] LMS
1,169,969 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,171,116 UART: [fht] FHT @ 0x50003400
1,173,936 UART: [idev] ++
1,174,104 UART: [idev] CDI.KEYID = 6
1,174,465 UART: [idev] SUBJECT.KEYID = 7
1,174,890 UART: [idev] UDS.KEYID = 0
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,072 UART: [idev] Sha1 KeyId Algorithm
1,209,040 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,443 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,835 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,191 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,617 >>> mbox cmd response: success
2,771,796 UART: [afmc] ++
2,771,964 UART: [afmc] CDI.KEYID = 6
2,772,327 UART: [afmc] SUBJECT.KEYID = 7
2,772,753 UART: [afmc] AUTHORITY.KEYID = 5
2,808,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,467 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,180 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,089 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,803 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,616 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,650 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,425 UART: [ldev] ++
1,208,593 UART: [ldev] CDI.KEYID = 6
1,208,957 UART: [ldev] SUBJECT.KEYID = 5
1,209,384 UART: [ldev] AUTHORITY.KEYID = 7
1,209,847 UART: [ldev] FE.KEYID = 1
1,215,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,759 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,377 >>> mbox cmd response: success
2,769,532 UART: [afmc] ++
2,769,700 UART: [afmc] CDI.KEYID = 6
2,770,063 UART: [afmc] SUBJECT.KEYID = 7
2,770,489 UART: [afmc] AUTHORITY.KEYID = 5
2,806,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,213 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,926 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,835 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,549 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,634 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.92s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,263 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,351 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,731 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,081 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,615 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,985 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,333 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,070 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,349 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,809 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,415 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,001 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,667 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,815 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,083 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,441 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,715 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,989 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,021 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,595 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,611 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
5,946 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,179 UART:
192,565 UART: Running Caliptra ROM ...
193,654 UART:
193,794 UART: [state] CFI Enabled
261,813 UART: [state] LifecycleState = Unprovisioned
264,181 UART: [state] DebugLocked = No
266,774 UART: [state] WD Timer not started. Device not locked for debugging
271,083 UART: [kat] SHA2-256
452,987 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,543 UART: [kat] ++
465,080 UART: [kat] sha1
474,131 UART: [kat] SHA2-256
477,142 UART: [kat] SHA2-384
483,060 UART: [kat] SHA2-512-ACC
485,640 UART: [kat] ECC-384
3,772,066 UART: [kat] HMAC-384Kdf
3,799,157 UART: [kat] LMS
4,872,327 UART: [kat] --
4,877,583 UART: [cold-reset] ++
4,879,487 UART: [fht] FHT @ 0x50003400
4,891,925 UART: [idev] ++
4,892,654 UART: [idev] CDI.KEYID = 6
4,893,831 UART: [idev] SUBJECT.KEYID = 7
4,895,004 UART: [idev] UDS.KEYID = 0
4,927,558 UART: [idev] Erasing UDS.KEYID = 0
8,242,449 UART: [idev] Sha1 KeyId Algorithm
8,264,180 UART: [idev] --
8,267,152 UART: [ldev] ++
8,267,727 UART: [ldev] CDI.KEYID = 6
8,268,836 UART: [ldev] SUBJECT.KEYID = 5
8,270,103 UART: [ldev] AUTHORITY.KEYID = 7
8,271,253 UART: [ldev] FE.KEYID = 1
8,315,137 UART: [ldev] Erasing FE.KEYID = 1
11,652,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,909 UART: [ldev] --
14,037,844 UART: [fwproc] Wait for Commands...
14,040,159 UART: [fwproc] Recv command 0x46574c44
14,042,478 UART: [fwproc] Recv'd Img size: 113760 bytes
14,120,509 UART: ROM Fatal Error: 0x000B0032
14,123,924 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
5,505 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,904,518 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
6,577 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,457 UART:
192,954 UART: Running Caliptra ROM ...
194,103 UART:
603,799 UART: [state] CFI Enabled
619,744 UART: [state] LifecycleState = Unprovisioned
622,065 UART: [state] DebugLocked = No
623,869 UART: [state] WD Timer not started. Device not locked for debugging
627,839 UART: [kat] SHA2-256
809,789 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,333 UART: [kat] ++
821,915 UART: [kat] sha1
832,417 UART: [kat] SHA2-256
835,472 UART: [kat] SHA2-384
841,436 UART: [kat] SHA2-512-ACC
844,036 UART: [kat] ECC-384
4,096,698 UART: [kat] HMAC-384Kdf
4,109,378 UART: [kat] LMS
5,182,511 UART: [kat] --
5,187,754 UART: [cold-reset] ++
5,189,557 UART: [fht] FHT @ 0x50003400
5,200,214 UART: [idev] ++
5,200,892 UART: [idev] CDI.KEYID = 6
5,202,066 UART: [idev] SUBJECT.KEYID = 7
5,203,566 UART: [idev] UDS.KEYID = 0
5,220,025 UART: [idev] Erasing UDS.KEYID = 0
8,495,818 UART: [idev] Sha1 KeyId Algorithm
8,518,405 UART: [idev] --
8,522,823 UART: [ldev] ++
8,523,439 UART: [ldev] CDI.KEYID = 6
8,524,538 UART: [ldev] SUBJECT.KEYID = 5
8,526,066 UART: [ldev] AUTHORITY.KEYID = 7
8,527,598 UART: [ldev] FE.KEYID = 1
8,538,078 UART: [ldev] Erasing FE.KEYID = 1
11,829,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,016 UART: [ldev] --
14,194,900 UART: [fwproc] Wait for Commands...
14,196,665 UART: [fwproc] Recv command 0x46574c44
14,198,970 UART: [fwproc] Recv'd Img size: 113760 bytes
14,272,814 UART: ROM Fatal Error: 0x000B0032
14,276,227 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
6,228 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,096,296 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
5,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,150 UART:
192,553 UART: Running Caliptra ROM ...
193,758 UART:
193,916 UART: [state] CFI Enabled
263,014 UART: [state] LifecycleState = Unprovisioned
264,873 UART: [state] DebugLocked = No
266,152 UART: [state] WD Timer not started. Device not locked for debugging
269,117 UART: [kat] SHA2-256
448,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,800 UART: [kat] ++
460,336 UART: [kat] sha1
471,219 UART: [kat] SHA2-256
474,240 UART: [kat] SHA2-384
479,846 UART: [kat] SHA2-512-ACC
482,780 UART: [kat] ECC-384
2,946,562 UART: [kat] HMAC-384Kdf
2,969,011 UART: [kat] LMS
3,498,449 UART: [kat] --
3,505,327 UART: [cold-reset] ++
3,506,193 UART: [fht] FHT @ 0x50003400
3,516,662 UART: [idev] ++
3,517,225 UART: [idev] CDI.KEYID = 6
3,518,160 UART: [idev] SUBJECT.KEYID = 7
3,519,370 UART: [idev] UDS.KEYID = 0
3,540,970 UART: [idev] Erasing UDS.KEYID = 0
6,022,155 UART: [idev] Sha1 KeyId Algorithm
6,045,534 UART: [idev] --
6,047,697 UART: [ldev] ++
6,048,273 UART: [ldev] CDI.KEYID = 6
6,049,158 UART: [ldev] SUBJECT.KEYID = 5
6,050,376 UART: [ldev] AUTHORITY.KEYID = 7
6,051,534 UART: [ldev] FE.KEYID = 1
6,096,776 UART: [ldev] Erasing FE.KEYID = 1
8,601,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,680 UART: [ldev] --
10,409,197 UART: [fwproc] Wait for Commands...
10,412,296 UART: [fwproc] Recv command 0x46574c44
10,414,348 UART: [fwproc] Recv'd Img size: 114084 bytes
10,489,419 UART: ROM Fatal Error: 0x000B0032
10,492,510 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
5,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,126 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
6,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,479 UART:
192,856 UART: Running Caliptra ROM ...
194,046 UART:
603,667 UART: [state] CFI Enabled
615,993 UART: [state] LifecycleState = Unprovisioned
617,843 UART: [state] DebugLocked = No
620,524 UART: [state] WD Timer not started. Device not locked for debugging
623,811 UART: [kat] SHA2-256
802,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,516 UART: [kat] ++
815,055 UART: [kat] sha1
826,105 UART: [kat] SHA2-256
829,104 UART: [kat] SHA2-384
835,235 UART: [kat] SHA2-512-ACC
838,226 UART: [kat] ECC-384
3,278,679 UART: [kat] HMAC-384Kdf
3,292,123 UART: [kat] LMS
3,821,622 UART: [kat] --
3,826,098 UART: [cold-reset] ++
3,827,003 UART: [fht] FHT @ 0x50003400
3,837,796 UART: [idev] ++
3,838,359 UART: [idev] CDI.KEYID = 6
3,839,291 UART: [idev] SUBJECT.KEYID = 7
3,840,498 UART: [idev] UDS.KEYID = 0
3,856,875 UART: [idev] Erasing UDS.KEYID = 0
6,314,517 UART: [idev] Sha1 KeyId Algorithm
6,338,771 UART: [idev] --
6,343,736 UART: [ldev] ++
6,344,308 UART: [ldev] CDI.KEYID = 6
6,345,217 UART: [ldev] SUBJECT.KEYID = 5
6,346,375 UART: [ldev] AUTHORITY.KEYID = 7
6,347,659 UART: [ldev] FE.KEYID = 1
6,356,224 UART: [ldev] Erasing FE.KEYID = 1
8,831,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,047 UART: [ldev] --
10,624,221 UART: [fwproc] Wait for Commands...
10,626,267 UART: [fwproc] Recv command 0x46574c44
10,628,360 UART: [fwproc] Recv'd Img size: 114084 bytes
10,701,750 UART: ROM Fatal Error: 0x000B0032
10,704,830 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
6,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,487,523 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
5,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,154 UART:
192,546 UART: Running Caliptra ROM ...
193,733 UART:
193,887 UART: [state] CFI Enabled
259,639 UART: [state] LifecycleState = Unprovisioned
261,452 UART: [state] DebugLocked = No
263,637 UART: [state] WD Timer not started. Device not locked for debugging
267,192 UART: [kat] SHA2-256
446,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,859 UART: [kat] ++
458,400 UART: [kat] sha1
470,205 UART: [kat] SHA2-256
473,262 UART: [kat] SHA2-384
478,640 UART: [kat] SHA2-512-ACC
481,584 UART: [kat] ECC-384
2,946,427 UART: [kat] HMAC-384Kdf
2,969,271 UART: [kat] LMS
3,498,725 UART: [kat] --
3,503,339 UART: [cold-reset] ++
3,504,951 UART: [fht] FHT @ 0x50003400
3,516,097 UART: [idev] ++
3,516,663 UART: [idev] CDI.KEYID = 6
3,517,542 UART: [idev] SUBJECT.KEYID = 7
3,518,757 UART: [idev] UDS.KEYID = 0
3,540,996 UART: [idev] Erasing UDS.KEYID = 0
6,022,631 UART: [idev] Sha1 KeyId Algorithm
6,046,189 UART: [idev] --
6,049,357 UART: [ldev] ++
6,049,938 UART: [ldev] CDI.KEYID = 6
6,050,823 UART: [ldev] SUBJECT.KEYID = 5
6,051,991 UART: [ldev] AUTHORITY.KEYID = 7
6,053,285 UART: [ldev] FE.KEYID = 1
6,096,911 UART: [ldev] Erasing FE.KEYID = 1
8,600,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,083 UART: [ldev] --
10,412,457 UART: [fwproc] Wait for Commands...
10,414,467 UART: [fwproc] Recv command 0x46574c44
10,416,567 UART: [fwproc] Recv'd Img size: 114084 bytes
10,490,477 UART: ROM Fatal Error: 0x000B0032
10,493,571 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
5,375 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,280,330 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
6,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,393 UART:
192,770 UART: Running Caliptra ROM ...
193,974 UART:
603,672 UART: [state] CFI Enabled
617,883 UART: [state] LifecycleState = Unprovisioned
619,710 UART: [state] DebugLocked = No
621,917 UART: [state] WD Timer not started. Device not locked for debugging
625,362 UART: [kat] SHA2-256
804,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,057 UART: [kat] ++
816,593 UART: [kat] sha1
828,069 UART: [kat] SHA2-256
831,071 UART: [kat] SHA2-384
836,781 UART: [kat] SHA2-512-ACC
839,721 UART: [kat] ECC-384
3,282,049 UART: [kat] HMAC-384Kdf
3,293,651 UART: [kat] LMS
3,823,114 UART: [kat] --
3,827,238 UART: [cold-reset] ++
3,829,281 UART: [fht] FHT @ 0x50003400
3,839,670 UART: [idev] ++
3,840,274 UART: [idev] CDI.KEYID = 6
3,841,182 UART: [idev] SUBJECT.KEYID = 7
3,842,343 UART: [idev] UDS.KEYID = 0
3,860,078 UART: [idev] Erasing UDS.KEYID = 0
6,317,675 UART: [idev] Sha1 KeyId Algorithm
6,341,330 UART: [idev] --
6,344,778 UART: [ldev] ++
6,345,342 UART: [ldev] CDI.KEYID = 6
6,346,220 UART: [ldev] SUBJECT.KEYID = 5
6,347,431 UART: [ldev] AUTHORITY.KEYID = 7
6,348,658 UART: [ldev] FE.KEYID = 1
6,359,866 UART: [ldev] Erasing FE.KEYID = 1
8,838,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,940 UART: [ldev] --
10,627,799 UART: [fwproc] Wait for Commands...
10,631,033 UART: [fwproc] Recv command 0x46574c44
10,633,126 UART: [fwproc] Recv'd Img size: 114084 bytes
10,707,440 UART: ROM Fatal Error: 0x000B0032
10,710,589 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
6,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,485,346 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,129 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,209,182 UART: [ldev] ++
1,209,350 UART: [ldev] CDI.KEYID = 6
1,209,714 UART: [ldev] SUBJECT.KEYID = 5
1,210,141 UART: [ldev] AUTHORITY.KEYID = 7
1,210,604 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,694 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,456 UART: ROM Fatal Error: 0x000B0032
1,309,613 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,382 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,915 UART: [kat] SHA2-512-ACC
906,816 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,169,948 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,335 UART: [ldev] --
1,282,643 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,955 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,947 UART: ROM Fatal Error: 0x000B0032
1,310,104 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,899 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,214,944 UART: [ldev] Erasing FE.KEYID = 1
1,241,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,962 UART: [ldev] --
1,280,392 UART: [fwproc] Wait for Commands...
1,281,213 UART: [fwproc] Recv command 0x46574c44
1,281,946 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,698 UART: ROM Fatal Error: 0x000B0032
1,308,855 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,262 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,217 UART: [kat] SHA2-512-ACC
906,118 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,007 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,803 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,531 UART: ROM Fatal Error: 0x000B0032
1,309,688 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,505 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,242,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,314 UART: ROM Fatal Error: 0x000B0032
1,309,471 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,890 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,463 UART: [kat] SHA2-256
891,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,165 UART: [kat] SHA2-512-ACC
906,066 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,546 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,405 UART: [ldev] --
1,282,871 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,395 UART: [fwproc] Recv'd Img size: 114084 bytes
1,310,093 UART: ROM Fatal Error: 0x000B0032
1,311,250 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,893 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 76844 bytes from beginning
4,037,719 UART: [fwproc] Recv'd Img size: 113760 bytes
14,114,948 UART: ROM Fatal Error: 0x00B0003A
14,118,319 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
2,051,716 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,195,496 UART:
2,195,908 UART: Running Caliptra ROM ...
2,196,989 UART:
2,197,146 UART: [state] CFI Enabled
2,198,125 UART: [state] LifecycleState = Unprovisioned
2,199,769 UART: [state] DebugLocked = No
2,200,798 UART: [state] WD Timer not started. Device not locked for debugging
2,203,257 UART: [kat] SHA2-256
2,203,918 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,951 UART: [kat] ++
2,207,401 UART: [kat] sha1
2,207,910 UART: [kat] SHA2-256
2,208,590 UART: [kat] SHA2-384
2,209,247 UART: [kat] SHA2-512-ACC
2,210,084 UART: [kat] ECC-384
3,775,481 UART: [kat] HMAC-384Kdf
3,803,056 UART: [kat] LMS
4,876,164 UART: [kat] --
4,881,074 UART: [cold-reset] ++
4,882,474 UART: [fht] FHT @ 0x50003400
4,893,889 UART: [idev] ++
4,894,571 UART: [idev] CDI.KEYID = 6
4,895,755 UART: [idev] SUBJECT.KEYID = 7
4,896,912 UART: [idev] UDS.KEYID = 0
4,928,635 UART: [idev] Erasing UDS.KEYID = 0
8,241,643 UART: [idev] Sha1 KeyId Algorithm
8,264,389 UART: [idev] --
8,268,761 UART: [ldev] ++
8,269,398 UART: [ldev] CDI.KEYID = 6
8,270,596 UART: [ldev] SUBJECT.KEYID = 5
8,271,707 UART: [ldev] AUTHORITY.KEYID = 7
8,272,939 UART: [ldev] FE.KEYID = 1
8,317,042 UART: [ldev] Erasing FE.KEYID = 1
11,651,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,068 UART: [ldev] --
14,038,376 UART: [fwproc] Wait for Commands...
14,041,455 UART: [fwproc] Recv command 0x46574c44
14,043,775 UART: [fwproc] Recv'd Img size: 113760 bytes
14,115,694 UART: ROM Fatal Error: 0x00B0003A
14,119,059 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,058,906 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,202,630 UART:
2,203,028 UART: Running Caliptra ROM ...
2,204,202 UART:
2,204,376 UART: [state] CFI Enabled
2,205,334 UART: [state] LifecycleState = Unprovisioned
2,206,994 UART: [state] DebugLocked = No
2,208,125 UART: [state] WD Timer not started. Device not locked for debugging
2,210,605 UART: [kat] SHA2-256
2,211,274 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,307 UART: [kat] ++
2,214,760 UART: [kat] sha1
2,215,278 UART: [kat] SHA2-256
2,216,018 UART: [kat] SHA2-384
2,216,686 UART: [kat] SHA2-512-ACC
2,217,515 UART: [kat] ECC-384
3,773,653 UART: [kat] HMAC-384Kdf
3,801,489 UART: [kat] LMS
4,874,648 UART: [kat] --
4,878,950 UART: [cold-reset] ++
4,881,674 UART: [fht] FHT @ 0x50003400
4,893,589 UART: [idev] ++
4,894,265 UART: [idev] CDI.KEYID = 6
4,895,524 UART: [idev] SUBJECT.KEYID = 7
4,896,644 UART: [idev] UDS.KEYID = 0
4,929,069 UART: [idev] Erasing UDS.KEYID = 0
8,242,515 UART: [idev] Sha1 KeyId Algorithm
8,264,614 UART: [idev] --
8,268,557 UART: [ldev] ++
8,269,179 UART: [ldev] CDI.KEYID = 6
8,270,363 UART: [ldev] SUBJECT.KEYID = 5
8,271,535 UART: [ldev] AUTHORITY.KEYID = 7
8,272,689 UART: [ldev] FE.KEYID = 1
8,316,960 UART: [ldev] Erasing FE.KEYID = 1
11,648,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,389 UART: [ldev] --
14,016,129 UART: [fwproc] Wait for Commands...
14,018,822 UART: [fwproc] Recv command 0x46574c44
14,021,144 UART: [fwproc] Recv'd Img size: 113760 bytes
14,095,987 UART: ROM Fatal Error: 0x00B0003A
14,099,343 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,051,687 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,195,967 UART:
2,196,395 UART: Running Caliptra ROM ...
2,197,578 UART:
2,197,751 UART: [state] CFI Enabled
2,198,711 UART: [state] LifecycleState = Unprovisioned
2,200,368 UART: [state] DebugLocked = No
2,201,475 UART: [state] WD Timer not started. Device not locked for debugging
2,203,952 UART: [kat] SHA2-256
2,204,619 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,634 UART: [kat] ++
2,208,132 UART: [kat] sha1
2,208,649 UART: [kat] SHA2-256
2,209,305 UART: [kat] SHA2-384
2,209,962 UART: [kat] SHA2-512-ACC
2,210,813 UART: [kat] ECC-384
3,777,350 UART: [kat] HMAC-384Kdf
3,804,588 UART: [kat] LMS
4,877,743 UART: [kat] --
4,881,571 UART: [cold-reset] ++
4,883,491 UART: [fht] FHT @ 0x50003400
4,895,446 UART: [idev] ++
4,896,119 UART: [idev] CDI.KEYID = 6
4,897,355 UART: [idev] SUBJECT.KEYID = 7
4,898,456 UART: [idev] UDS.KEYID = 0
4,932,259 UART: [idev] Erasing UDS.KEYID = 0
8,244,342 UART: [idev] Sha1 KeyId Algorithm
8,266,119 UART: [idev] --
8,271,461 UART: [ldev] ++
8,272,081 UART: [ldev] CDI.KEYID = 6
8,273,192 UART: [ldev] SUBJECT.KEYID = 5
8,274,409 UART: [ldev] AUTHORITY.KEYID = 7
8,275,563 UART: [ldev] FE.KEYID = 1
8,318,382 UART: [ldev] Erasing FE.KEYID = 1
11,653,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,776 UART: [ldev] --
14,040,665 UART: [fwproc] Wait for Commands...
14,043,736 UART: [fwproc] Recv command 0x46574c44
14,046,055 UART: [fwproc] Recv'd Img size: 113760 bytes
14,121,200 UART: ROM Fatal Error: 0x00B0003A
14,124,551 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,818 writing to cptra_bootfsm_go
2,053,836 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,197,401 UART:
2,197,807 UART: Running Caliptra ROM ...
2,199,091 UART:
2,199,259 UART: [state] CFI Enabled
2,200,244 UART: [state] LifecycleState = Unprovisioned
2,201,910 UART: [state] DebugLocked = No
2,202,937 UART: [state] WD Timer not started. Device not locked for debugging
2,205,404 UART: [kat] SHA2-256
2,206,070 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,082 UART: [kat] ++
2,209,533 UART: [kat] sha1
2,210,042 UART: [kat] SHA2-256
2,210,702 UART: [kat] SHA2-384
2,211,360 UART: [kat] SHA2-512-ACC
2,212,208 UART: [kat] ECC-384
3,773,324 UART: [kat] HMAC-384Kdf
3,803,112 UART: [kat] LMS
4,876,256 UART: [kat] --
4,879,412 UART: [cold-reset] ++
4,880,482 UART: [fht] FHT @ 0x50003400
4,891,270 UART: [idev] ++
4,891,945 UART: [idev] CDI.KEYID = 6
4,893,107 UART: [idev] SUBJECT.KEYID = 7
4,894,331 UART: [idev] UDS.KEYID = 0
4,930,377 UART: [idev] Erasing UDS.KEYID = 0
8,245,015 UART: [idev] Sha1 KeyId Algorithm
8,266,688 UART: [idev] --
8,270,567 UART: [ldev] ++
8,271,131 UART: [ldev] CDI.KEYID = 6
8,272,371 UART: [ldev] SUBJECT.KEYID = 5
8,273,554 UART: [ldev] AUTHORITY.KEYID = 7
8,274,654 UART: [ldev] FE.KEYID = 1
8,319,294 UART: [ldev] Erasing FE.KEYID = 1
11,656,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,230 UART: [ldev] --
14,038,309 UART: [fwproc] Wait for Commands...
14,040,495 UART: [fwproc] Recv command 0x46574c44
14,042,824 UART: [fwproc] Recv'd Img size: 113760 bytes
22,311,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,385,423 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,454,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,770,239 >>> mbox cmd response: success
22,773,873 UART: [afmc] ++
22,774,462 UART: [afmc] CDI.KEYID = 6
22,775,645 UART: [afmc] SUBJECT.KEYID = 7
22,776,800 UART: [afmc] AUTHORITY.KEYID = 5
26,148,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,447,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,449,058 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,465,151 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,481,274 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,496,959 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,518,987 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.41s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,050,730 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,887,078 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,051,845 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,927,148 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,057,473 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,905,121 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,051,177 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,880,044 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,051,640 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,879,496 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,052,718 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,920,276 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,056,454 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,880,506 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,052,762 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,902,790 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,056,622 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,939,760 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,050,922 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,903,451 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
2,058,761 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,884,694 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,052,196 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,882,693 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,050,584 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,903,325 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,051,482 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,881,846 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,059,934 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,925,762 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,051,006 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,926,995 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
2,050,933 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,903,367 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,050,445 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,880,964 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,050,729 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,555,613 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.07s
Truncated 76844 bytes from beginning
4,199,525 UART: [fwproc] Recv'd Img size: 113760 bytes
14,278,141 UART: ROM Fatal Error: 0x00B0003A
14,281,545 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,058,885 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,202,421 UART:
2,202,826 UART: Running Caliptra ROM ...
2,204,241 UART:
2,204,429 UART: [state] CFI Enabled
2,205,385 UART: [state] LifecycleState = Unprovisioned
2,207,054 UART: [state] DebugLocked = No
2,208,082 UART: [state] WD Timer not started. Device not locked for debugging
2,210,563 UART: [kat] SHA2-256
2,211,226 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,241 UART: [kat] ++
2,214,682 UART: [kat] sha1
2,215,184 UART: [kat] SHA2-256
2,215,833 UART: [kat] SHA2-384
2,216,480 UART: [kat] SHA2-512-ACC
2,217,269 UART: [kat] ECC-384
4,102,487 UART: [kat] HMAC-384Kdf
4,112,952 UART: [kat] LMS
5,186,113 UART: [kat] --
5,191,171 UART: [cold-reset] ++
5,192,675 UART: [fht] FHT @ 0x50003400
5,203,970 UART: [idev] ++
5,204,635 UART: [idev] CDI.KEYID = 6
5,205,861 UART: [idev] SUBJECT.KEYID = 7
5,207,281 UART: [idev] UDS.KEYID = 0
5,222,990 UART: [idev] Erasing UDS.KEYID = 0
8,496,034 UART: [idev] Sha1 KeyId Algorithm
8,517,637 UART: [idev] --
8,520,437 UART: [ldev] ++
8,521,002 UART: [ldev] CDI.KEYID = 6
8,522,163 UART: [ldev] SUBJECT.KEYID = 5
8,523,906 UART: [ldev] AUTHORITY.KEYID = 7
8,525,174 UART: [ldev] FE.KEYID = 1
8,537,768 UART: [ldev] Erasing FE.KEYID = 1
11,834,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,742 UART: [ldev] --
14,199,028 UART: [fwproc] Wait for Commands...
14,202,199 UART: [fwproc] Recv command 0x46574c44
14,204,557 UART: [fwproc] Recv'd Img size: 113760 bytes
14,280,806 UART: ROM Fatal Error: 0x00B0003A
14,284,123 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,058,988 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,202,702 UART:
2,203,106 UART: Running Caliptra ROM ...
2,204,271 UART:
2,204,455 UART: [state] CFI Enabled
2,205,414 UART: [state] LifecycleState = Unprovisioned
2,207,072 UART: [state] DebugLocked = No
2,208,171 UART: [state] WD Timer not started. Device not locked for debugging
2,210,635 UART: [kat] SHA2-256
2,211,297 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,298 UART: [kat] ++
2,214,743 UART: [kat] sha1
2,215,249 UART: [kat] SHA2-256
2,215,982 UART: [kat] SHA2-384
2,216,666 UART: [kat] SHA2-512-ACC
2,217,542 UART: [kat] ECC-384
4,097,623 UART: [kat] HMAC-384Kdf
4,108,832 UART: [kat] LMS
5,181,991 UART: [kat] --
5,187,209 UART: [cold-reset] ++
5,190,010 UART: [fht] FHT @ 0x50003400
5,200,338 UART: [idev] ++
5,201,074 UART: [idev] CDI.KEYID = 6
5,202,254 UART: [idev] SUBJECT.KEYID = 7
5,203,682 UART: [idev] UDS.KEYID = 0
5,215,654 UART: [idev] Erasing UDS.KEYID = 0
8,489,774 UART: [idev] Sha1 KeyId Algorithm
8,511,712 UART: [idev] --
8,515,304 UART: [ldev] ++
8,515,877 UART: [ldev] CDI.KEYID = 6
8,517,138 UART: [ldev] SUBJECT.KEYID = 5
8,518,568 UART: [ldev] AUTHORITY.KEYID = 7
8,520,044 UART: [ldev] FE.KEYID = 1
8,531,171 UART: [ldev] Erasing FE.KEYID = 1
11,823,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,322 UART: [ldev] --
14,191,032 UART: [fwproc] Wait for Commands...
14,192,502 UART: [fwproc] Recv command 0x46574c44
14,194,491 UART: [fwproc] Recv'd Img size: 113760 bytes
14,271,694 UART: ROM Fatal Error: 0x00B0003A
14,275,089 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,065,753 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,209,528 UART:
2,209,945 UART: Running Caliptra ROM ...
2,211,243 UART:
2,211,414 UART: [state] CFI Enabled
2,212,370 UART: [state] LifecycleState = Unprovisioned
2,214,025 UART: [state] DebugLocked = No
2,215,080 UART: [state] WD Timer not started. Device not locked for debugging
2,217,545 UART: [kat] SHA2-256
2,218,210 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,221,235 UART: [kat] ++
2,221,681 UART: [kat] sha1
2,222,187 UART: [kat] SHA2-256
2,222,921 UART: [kat] SHA2-384
2,223,579 UART: [kat] SHA2-512-ACC
2,224,454 UART: [kat] ECC-384
4,096,819 UART: [kat] HMAC-384Kdf
4,108,866 UART: [kat] LMS
5,181,998 UART: [kat] --
5,187,031 UART: [cold-reset] ++
5,189,343 UART: [fht] FHT @ 0x50003400
5,200,314 UART: [idev] ++
5,200,976 UART: [idev] CDI.KEYID = 6
5,202,128 UART: [idev] SUBJECT.KEYID = 7
5,203,653 UART: [idev] UDS.KEYID = 0
5,219,033 UART: [idev] Erasing UDS.KEYID = 0
8,490,821 UART: [idev] Sha1 KeyId Algorithm
8,512,793 UART: [idev] --
8,516,618 UART: [ldev] ++
8,517,190 UART: [ldev] CDI.KEYID = 6
8,518,423 UART: [ldev] SUBJECT.KEYID = 5
8,519,848 UART: [ldev] AUTHORITY.KEYID = 7
8,521,397 UART: [ldev] FE.KEYID = 1
8,531,821 UART: [ldev] Erasing FE.KEYID = 1
11,823,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,575 UART: [ldev] --
14,189,604 UART: [fwproc] Wait for Commands...
14,191,695 UART: [fwproc] Recv command 0x46574c44
14,193,961 UART: [fwproc] Recv'd Img size: 113760 bytes
14,272,692 UART: ROM Fatal Error: 0x00B0003A
14,276,037 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,060,016 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,203,786 UART:
2,204,200 UART: Running Caliptra ROM ...
2,205,363 UART:
2,205,532 UART: [state] CFI Enabled
2,206,484 UART: [state] LifecycleState = Unprovisioned
2,208,151 UART: [state] DebugLocked = No
2,209,259 UART: [state] WD Timer not started. Device not locked for debugging
2,211,729 UART: [kat] SHA2-256
2,212,392 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,215,410 UART: [kat] ++
2,215,853 UART: [kat] sha1
2,216,360 UART: [kat] SHA2-256
2,217,057 UART: [kat] SHA2-384
2,217,711 UART: [kat] SHA2-512-ACC
2,218,503 UART: [kat] ECC-384
4,096,813 UART: [kat] HMAC-384Kdf
4,108,624 UART: [kat] LMS
5,181,739 UART: [kat] --
5,185,627 UART: [cold-reset] ++
5,186,690 UART: [fht] FHT @ 0x50003400
5,198,744 UART: [idev] ++
5,199,476 UART: [idev] CDI.KEYID = 6
5,200,610 UART: [idev] SUBJECT.KEYID = 7
5,202,091 UART: [idev] UDS.KEYID = 0
5,218,984 UART: [idev] Erasing UDS.KEYID = 0
8,493,204 UART: [idev] Sha1 KeyId Algorithm
8,515,891 UART: [idev] --
8,520,031 UART: [ldev] ++
8,520,593 UART: [ldev] CDI.KEYID = 6
8,521,827 UART: [ldev] SUBJECT.KEYID = 5
8,523,253 UART: [ldev] AUTHORITY.KEYID = 7
8,524,852 UART: [ldev] FE.KEYID = 1
8,536,840 UART: [ldev] Erasing FE.KEYID = 1
11,825,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,088 UART: [ldev] --
14,192,077 UART: [fwproc] Wait for Commands...
14,194,280 UART: [fwproc] Recv command 0x46574c44
14,196,581 UART: [fwproc] Recv'd Img size: 113760 bytes
22,747,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,829,041 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,897,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
23,213,640 >>> mbox cmd response: success
23,218,290 UART: [afmc] ++
23,218,985 UART: [afmc] CDI.KEYID = 6
23,220,220 UART: [afmc] SUBJECT.KEYID = 7
23,221,370 UART: [afmc] AUTHORITY.KEYID = 5
26,539,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,831,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,833,778 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,849,903 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,866,010 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,881,762 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,904,108 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.68s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,060,064 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,089,892 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,056,738 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,089,495 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,056,967 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,089,079 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,062,708 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,086,693 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
2,056,540 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,081,310 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,062,555 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,081,050 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,056,584 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,083,503 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,057,159 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,091,413 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,057,615 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,085,403 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,063,192 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,083,810 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,056,051 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,081,039 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,058,526 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,090,528 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,056,984 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,084,874 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,056,472 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,087,087 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,056,916 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,083,648 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,056,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,084,447 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,058,541 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,089,890 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,057,335 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,092,487 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,065,822 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,611,655 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.35s
Truncated 76844 bytes from beginning
0,415,113 UART: [fwproc] Recv'd Img size: 114084 bytes
10,492,179 UART: ROM Fatal Error: 0x00B0003A
10,495,272 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,054,748 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,198,920 UART:
2,199,313 UART: Running Caliptra ROM ...
2,200,414 UART:
2,200,571 UART: [state] CFI Enabled
2,201,542 UART: [state] LifecycleState = Unprovisioned
2,203,207 UART: [state] DebugLocked = No
2,204,236 UART: [state] WD Timer not started. Device not locked for debugging
2,206,707 UART: [kat] SHA2-256
2,207,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,383 UART: [kat] ++
2,210,832 UART: [kat] sha1
2,211,377 UART: [kat] SHA2-256
2,212,035 UART: [kat] SHA2-384
2,212,714 UART: [kat] SHA2-512-ACC
2,213,538 UART: [kat] ECC-384
2,947,290 UART: [kat] HMAC-384Kdf
2,971,031 UART: [kat] LMS
3,500,499 UART: [kat] --
3,504,005 UART: [cold-reset] ++
3,506,589 UART: [fht] FHT @ 0x50003400
3,516,700 UART: [idev] ++
3,517,278 UART: [idev] CDI.KEYID = 6
3,518,185 UART: [idev] SUBJECT.KEYID = 7
3,519,405 UART: [idev] UDS.KEYID = 0
3,543,102 UART: [idev] Erasing UDS.KEYID = 0
6,023,486 UART: [idev] Sha1 KeyId Algorithm
6,046,014 UART: [idev] --
6,049,237 UART: [ldev] ++
6,049,818 UART: [ldev] CDI.KEYID = 6
6,050,749 UART: [ldev] SUBJECT.KEYID = 5
6,051,920 UART: [ldev] AUTHORITY.KEYID = 7
6,053,157 UART: [ldev] FE.KEYID = 1
6,098,408 UART: [ldev] Erasing FE.KEYID = 1
8,599,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,967 UART: [ldev] --
10,392,721 UART: [fwproc] Wait for Commands...
10,394,926 UART: [fwproc] Recv command 0x46574c44
10,397,029 UART: [fwproc] Recv'd Img size: 114084 bytes
10,473,500 UART: ROM Fatal Error: 0x00B0003A
10,476,645 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,055,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,199,227 UART:
2,199,624 UART: Running Caliptra ROM ...
2,200,790 UART:
2,200,962 UART: [state] CFI Enabled
2,201,926 UART: [state] LifecycleState = Unprovisioned
2,203,594 UART: [state] DebugLocked = No
2,204,706 UART: [state] WD Timer not started. Device not locked for debugging
2,207,185 UART: [kat] SHA2-256
2,207,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,125 UART: [kat] ++
2,211,591 UART: [kat] sha1
2,212,109 UART: [kat] SHA2-256
2,212,859 UART: [kat] SHA2-384
2,213,527 UART: [kat] SHA2-512-ACC
2,214,357 UART: [kat] ECC-384
2,947,448 UART: [kat] HMAC-384Kdf
2,973,831 UART: [kat] LMS
3,503,278 UART: [kat] --
3,507,545 UART: [cold-reset] ++
3,509,528 UART: [fht] FHT @ 0x50003400
3,520,072 UART: [idev] ++
3,520,638 UART: [idev] CDI.KEYID = 6
3,521,517 UART: [idev] SUBJECT.KEYID = 7
3,522,734 UART: [idev] UDS.KEYID = 0
3,545,462 UART: [idev] Erasing UDS.KEYID = 0
6,025,622 UART: [idev] Sha1 KeyId Algorithm
6,048,954 UART: [idev] --
6,053,143 UART: [ldev] ++
6,053,722 UART: [ldev] CDI.KEYID = 6
6,054,604 UART: [ldev] SUBJECT.KEYID = 5
6,055,760 UART: [ldev] AUTHORITY.KEYID = 7
6,057,053 UART: [ldev] FE.KEYID = 1
6,101,387 UART: [ldev] Erasing FE.KEYID = 1
8,603,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,573 UART: [ldev] --
10,413,187 UART: [fwproc] Wait for Commands...
10,416,253 UART: [fwproc] Recv command 0x46574c44
10,418,368 UART: [fwproc] Recv'd Img size: 114084 bytes
10,495,172 UART: ROM Fatal Error: 0x00B0003A
10,498,253 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,056,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,745 UART:
2,201,153 UART: Running Caliptra ROM ...
2,202,237 UART:
2,202,391 UART: [state] CFI Enabled
2,203,379 UART: [state] LifecycleState = Unprovisioned
2,205,265 UART: [state] DebugLocked = No
2,206,301 UART: [state] WD Timer not started. Device not locked for debugging
2,208,796 UART: [kat] SHA2-256
2,209,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,483 UART: [kat] ++
2,212,934 UART: [kat] sha1
2,213,445 UART: [kat] SHA2-256
2,214,101 UART: [kat] SHA2-384
2,214,756 UART: [kat] SHA2-512-ACC
2,215,555 UART: [kat] ECC-384
2,947,913 UART: [kat] HMAC-384Kdf
2,969,735 UART: [kat] LMS
3,499,199 UART: [kat] --
3,504,377 UART: [cold-reset] ++
3,506,792 UART: [fht] FHT @ 0x50003400
3,517,683 UART: [idev] ++
3,518,250 UART: [idev] CDI.KEYID = 6
3,519,187 UART: [idev] SUBJECT.KEYID = 7
3,520,402 UART: [idev] UDS.KEYID = 0
3,541,541 UART: [idev] Erasing UDS.KEYID = 0
6,023,834 UART: [idev] Sha1 KeyId Algorithm
6,046,476 UART: [idev] --
6,050,612 UART: [ldev] ++
6,051,190 UART: [ldev] CDI.KEYID = 6
6,052,073 UART: [ldev] SUBJECT.KEYID = 5
6,053,296 UART: [ldev] AUTHORITY.KEYID = 7
6,054,536 UART: [ldev] FE.KEYID = 1
6,097,925 UART: [ldev] Erasing FE.KEYID = 1
8,602,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,841 UART: [ldev] --
10,412,707 UART: [fwproc] Wait for Commands...
10,415,234 UART: [fwproc] Recv command 0x46574c44
10,417,328 UART: [fwproc] Recv'd Img size: 114084 bytes
10,494,398 UART: ROM Fatal Error: 0x00B0003A
10,497,512 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,056,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,259 UART:
2,200,659 UART: Running Caliptra ROM ...
2,201,739 UART:
2,201,894 UART: [state] CFI Enabled
2,202,870 UART: [state] LifecycleState = Unprovisioned
2,204,730 UART: [state] DebugLocked = No
2,205,764 UART: [state] WD Timer not started. Device not locked for debugging
2,208,234 UART: [kat] SHA2-256
2,208,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,907 UART: [kat] ++
2,212,351 UART: [kat] sha1
2,212,860 UART: [kat] SHA2-256
2,213,514 UART: [kat] SHA2-384
2,214,166 UART: [kat] SHA2-512-ACC
2,214,998 UART: [kat] ECC-384
2,949,052 UART: [kat] HMAC-384Kdf
2,970,615 UART: [kat] LMS
3,500,093 UART: [kat] --
3,505,362 UART: [cold-reset] ++
3,507,239 UART: [fht] FHT @ 0x50003400
3,518,005 UART: [idev] ++
3,518,582 UART: [idev] CDI.KEYID = 6
3,519,463 UART: [idev] SUBJECT.KEYID = 7
3,520,677 UART: [idev] UDS.KEYID = 0
3,542,139 UART: [idev] Erasing UDS.KEYID = 0
6,020,884 UART: [idev] Sha1 KeyId Algorithm
6,043,244 UART: [idev] --
6,047,055 UART: [ldev] ++
6,047,637 UART: [ldev] CDI.KEYID = 6
6,048,551 UART: [ldev] SUBJECT.KEYID = 5
6,049,714 UART: [ldev] AUTHORITY.KEYID = 7
6,050,971 UART: [ldev] FE.KEYID = 1
6,097,701 UART: [ldev] Erasing FE.KEYID = 1
8,603,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,418 UART: [ldev] --
10,412,194 UART: [fwproc] Wait for Commands...
10,413,638 UART: [fwproc] Recv command 0x46574c44
10,415,734 UART: [fwproc] Recv'd Img size: 114084 bytes
14,989,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,071,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,140,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,457,396 >>> mbox cmd response: success
15,461,092 UART: [afmc] ++
15,461,703 UART: [afmc] CDI.KEYID = 6
15,462,781 UART: [afmc] SUBJECT.KEYID = 7
15,463,885 UART: [afmc] AUTHORITY.KEYID = 5
17,996,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,719,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,721,807 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,737,880 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,753,814 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,769,624 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,791,140 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,055,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,281,487 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,058,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,278,624 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,055,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,259,690 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,058,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,257,558 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,055,535 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,253,058 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,053,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,741 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
2,054,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,257,049 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,592 writing to cptra_bootfsm_go
2,055,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,320 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,054,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,277,375 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,055,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,272,507 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,053,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,278,173 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,057,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,277,911 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
2,066,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,461 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,065,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,298,551 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,066,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,296,081 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,056,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,374 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,666 writing to cptra_bootfsm_go
2,064,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,261,891 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,052,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,555 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,054,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,995,785 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 16.99s
Truncated 76844 bytes from beginning
0,626,473 UART: [fwproc] Recv'd Img size: 114084 bytes
10,705,639 UART: ROM Fatal Error: 0x00B0003A
10,708,747 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,056,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,619 UART:
2,201,045 UART: Running Caliptra ROM ...
2,202,149 UART:
2,202,317 UART: [state] CFI Enabled
2,203,274 UART: [state] LifecycleState = Unprovisioned
2,204,940 UART: [state] DebugLocked = No
2,206,047 UART: [state] WD Timer not started. Device not locked for debugging
2,208,521 UART: [kat] SHA2-256
2,209,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,210 UART: [kat] ++
2,212,659 UART: [kat] sha1
2,213,254 UART: [kat] SHA2-256
2,213,921 UART: [kat] SHA2-384
2,214,578 UART: [kat] SHA2-512-ACC
2,215,459 UART: [kat] ECC-384
3,282,357 UART: [kat] HMAC-384Kdf
3,294,824 UART: [kat] LMS
3,824,320 UART: [kat] --
3,829,560 UART: [cold-reset] ++
3,831,973 UART: [fht] FHT @ 0x50003400
3,842,351 UART: [idev] ++
3,842,909 UART: [idev] CDI.KEYID = 6
3,843,880 UART: [idev] SUBJECT.KEYID = 7
3,845,035 UART: [idev] UDS.KEYID = 0
3,861,657 UART: [idev] Erasing UDS.KEYID = 0
6,317,149 UART: [idev] Sha1 KeyId Algorithm
6,340,698 UART: [idev] --
6,344,799 UART: [ldev] ++
6,345,365 UART: [ldev] CDI.KEYID = 6
6,346,269 UART: [ldev] SUBJECT.KEYID = 5
6,347,483 UART: [ldev] AUTHORITY.KEYID = 7
6,348,709 UART: [ldev] FE.KEYID = 1
6,358,221 UART: [ldev] Erasing FE.KEYID = 1
8,829,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,886 UART: [ldev] --
10,618,031 UART: [fwproc] Wait for Commands...
10,620,563 UART: [fwproc] Recv command 0x46574c44
10,622,654 UART: [fwproc] Recv'd Img size: 114084 bytes
10,702,780 UART: ROM Fatal Error: 0x00B0003A
10,705,919 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
2,062,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,206,776 UART:
2,207,170 UART: Running Caliptra ROM ...
2,208,345 UART:
2,208,532 UART: [state] CFI Enabled
2,209,493 UART: [state] LifecycleState = Unprovisioned
2,211,147 UART: [state] DebugLocked = No
2,212,251 UART: [state] WD Timer not started. Device not locked for debugging
2,214,725 UART: [kat] SHA2-256
2,215,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,620 UART: [kat] ++
2,219,083 UART: [kat] sha1
2,219,687 UART: [kat] SHA2-256
2,220,352 UART: [kat] SHA2-384
2,221,072 UART: [kat] SHA2-512-ACC
2,221,904 UART: [kat] ECC-384
3,278,190 UART: [kat] HMAC-384Kdf
3,290,783 UART: [kat] LMS
3,820,256 UART: [kat] --
3,825,401 UART: [cold-reset] ++
3,826,842 UART: [fht] FHT @ 0x50003400
3,837,328 UART: [idev] ++
3,837,889 UART: [idev] CDI.KEYID = 6
3,838,794 UART: [idev] SUBJECT.KEYID = 7
3,840,015 UART: [idev] UDS.KEYID = 0
3,856,044 UART: [idev] Erasing UDS.KEYID = 0
6,312,150 UART: [idev] Sha1 KeyId Algorithm
6,333,696 UART: [idev] --
6,336,163 UART: [ldev] ++
6,336,733 UART: [ldev] CDI.KEYID = 6
6,337,715 UART: [ldev] SUBJECT.KEYID = 5
6,338,873 UART: [ldev] AUTHORITY.KEYID = 7
6,340,097 UART: [ldev] FE.KEYID = 1
6,349,810 UART: [ldev] Erasing FE.KEYID = 1
8,821,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,344 UART: [ldev] --
10,611,170 UART: [fwproc] Wait for Commands...
10,614,124 UART: [fwproc] Recv command 0x46574c44
10,616,223 UART: [fwproc] Recv'd Img size: 114084 bytes
10,700,127 UART: ROM Fatal Error: 0x00B0003A
10,703,222 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,059,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,203,155 UART:
2,203,565 UART: Running Caliptra ROM ...
2,204,651 UART:
2,204,808 UART: [state] CFI Enabled
2,205,773 UART: [state] LifecycleState = Unprovisioned
2,207,437 UART: [state] DebugLocked = No
2,208,465 UART: [state] WD Timer not started. Device not locked for debugging
2,210,932 UART: [kat] SHA2-256
2,211,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,619 UART: [kat] ++
2,215,066 UART: [kat] sha1
2,215,581 UART: [kat] SHA2-256
2,216,236 UART: [kat] SHA2-384
2,216,893 UART: [kat] SHA2-512-ACC
2,217,694 UART: [kat] ECC-384
3,282,135 UART: [kat] HMAC-384Kdf
3,294,468 UART: [kat] LMS
3,823,927 UART: [kat] --
3,829,290 UART: [cold-reset] ++
3,830,462 UART: [fht] FHT @ 0x50003400
3,842,461 UART: [idev] ++
3,843,028 UART: [idev] CDI.KEYID = 6
3,843,953 UART: [idev] SUBJECT.KEYID = 7
3,845,109 UART: [idev] UDS.KEYID = 0
3,860,762 UART: [idev] Erasing UDS.KEYID = 0
6,317,712 UART: [idev] Sha1 KeyId Algorithm
6,339,645 UART: [idev] --
6,344,178 UART: [ldev] ++
6,344,779 UART: [ldev] CDI.KEYID = 6
6,345,690 UART: [ldev] SUBJECT.KEYID = 5
6,346,845 UART: [ldev] AUTHORITY.KEYID = 7
6,348,069 UART: [ldev] FE.KEYID = 1
6,358,445 UART: [ldev] Erasing FE.KEYID = 1
8,831,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,379 UART: [ldev] --
10,623,895 UART: [fwproc] Wait for Commands...
10,627,013 UART: [fwproc] Recv command 0x46574c44
10,629,071 UART: [fwproc] Recv'd Img size: 114084 bytes
10,704,292 UART: ROM Fatal Error: 0x00B0003A
10,707,376 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,057,503 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,201,322 UART:
2,201,699 UART: Running Caliptra ROM ...
2,202,864 UART:
2,203,036 UART: [state] CFI Enabled
2,204,224 UART: [state] LifecycleState = Unprovisioned
2,205,923 UART: [state] DebugLocked = No
2,207,034 UART: [state] WD Timer not started. Device not locked for debugging
2,209,519 UART: [kat] SHA2-256
2,210,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,198 UART: [kat] ++
2,213,699 UART: [kat] sha1
2,214,213 UART: [kat] SHA2-256
2,215,060 UART: [kat] SHA2-384
2,215,730 UART: [kat] SHA2-512-ACC
2,216,614 UART: [kat] ECC-384
3,281,482 UART: [kat] HMAC-384Kdf
3,292,955 UART: [kat] LMS
3,822,396 UART: [kat] --
3,828,279 UART: [cold-reset] ++
3,829,938 UART: [fht] FHT @ 0x50003400
3,841,941 UART: [idev] ++
3,842,515 UART: [idev] CDI.KEYID = 6
3,843,424 UART: [idev] SUBJECT.KEYID = 7
3,844,637 UART: [idev] UDS.KEYID = 0
3,858,342 UART: [idev] Erasing UDS.KEYID = 0
6,312,518 UART: [idev] Sha1 KeyId Algorithm
6,336,875 UART: [idev] --
6,340,977 UART: [ldev] ++
6,341,548 UART: [ldev] CDI.KEYID = 6
6,342,612 UART: [ldev] SUBJECT.KEYID = 5
6,343,714 UART: [ldev] AUTHORITY.KEYID = 7
6,344,885 UART: [ldev] FE.KEYID = 1
6,354,773 UART: [ldev] Erasing FE.KEYID = 1
8,830,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,825 UART: [ldev] --
10,623,780 UART: [fwproc] Wait for Commands...
10,626,093 UART: [fwproc] Recv command 0x46574c44
10,628,186 UART: [fwproc] Recv'd Img size: 114084 bytes
15,189,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,262,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,331,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,648,587 >>> mbox cmd response: success
15,653,343 UART: [afmc] ++
15,653,935 UART: [afmc] CDI.KEYID = 6
15,654,818 UART: [afmc] SUBJECT.KEYID = 7
15,656,027 UART: [afmc] AUTHORITY.KEYID = 5
18,156,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,877,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,879,194 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,895,248 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,911,253 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,927,021 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,949,639 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.70s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,057,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,488,525 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,055,933 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,480,706 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,056,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,474,707 >>> mbox cmd response: failed
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,056,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,481,259 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
2,064,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,475,150 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
2,055,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,478,592 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,058,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,485,169 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,054,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,486,977 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,055,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,483,689 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,056,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,490,094 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,057,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,489,749 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,055,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,484,497 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,062,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,482,233 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,055,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,490,773 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,058,722 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,479,734 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,056,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,486,719 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,062,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,491,404 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,055,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,489,003 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,056,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,251,107 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 76844 bytes from beginning
0,417,126 UART: [fwproc] Recv'd Img size: 114084 bytes
10,487,731 UART: ROM Fatal Error: 0x00B0003A
10,490,829 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,059,021 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,203,185 UART:
2,203,608 UART: Running Caliptra ROM ...
2,204,798 UART:
2,204,985 UART: [state] CFI Enabled
2,205,945 UART: [state] LifecycleState = Unprovisioned
2,207,598 UART: [state] DebugLocked = No
2,208,730 UART: [state] WD Timer not started. Device not locked for debugging
2,211,209 UART: [kat] SHA2-256
2,211,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,887 UART: [kat] ++
2,215,337 UART: [kat] sha1
2,215,887 UART: [kat] SHA2-256
2,216,549 UART: [kat] SHA2-384
2,217,203 UART: [kat] SHA2-512-ACC
2,218,032 UART: [kat] ECC-384
2,947,990 UART: [kat] HMAC-384Kdf
2,971,027 UART: [kat] LMS
3,500,430 UART: [kat] --
3,504,205 UART: [cold-reset] ++
3,506,353 UART: [fht] FHT @ 0x50003400
3,516,790 UART: [idev] ++
3,517,353 UART: [idev] CDI.KEYID = 6
3,518,338 UART: [idev] SUBJECT.KEYID = 7
3,519,498 UART: [idev] UDS.KEYID = 0
3,543,095 UART: [idev] Erasing UDS.KEYID = 0
6,028,062 UART: [idev] Sha1 KeyId Algorithm
6,050,373 UART: [idev] --
6,055,451 UART: [ldev] ++
6,056,027 UART: [ldev] CDI.KEYID = 6
6,057,094 UART: [ldev] SUBJECT.KEYID = 5
6,058,207 UART: [ldev] AUTHORITY.KEYID = 7
6,059,385 UART: [ldev] FE.KEYID = 1
6,098,709 UART: [ldev] Erasing FE.KEYID = 1
8,602,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,633 UART: [ldev] --
10,411,634 UART: [fwproc] Wait for Commands...
10,414,547 UART: [fwproc] Recv command 0x46574c44
10,416,647 UART: [fwproc] Recv'd Img size: 114084 bytes
10,493,602 UART: ROM Fatal Error: 0x00B0003A
10,496,684 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,078,918 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,223,107 UART:
2,223,525 UART: Running Caliptra ROM ...
2,224,715 UART:
2,224,890 UART: [state] CFI Enabled
2,225,859 UART: [state] LifecycleState = Unprovisioned
2,227,514 UART: [state] DebugLocked = No
2,228,625 UART: [state] WD Timer not started. Device not locked for debugging
2,231,102 UART: [kat] SHA2-256
2,231,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,234,782 UART: [kat] ++
2,235,230 UART: [kat] sha1
2,235,772 UART: [kat] SHA2-256
2,236,428 UART: [kat] SHA2-384
2,237,082 UART: [kat] SHA2-512-ACC
2,237,886 UART: [kat] ECC-384
2,948,661 UART: [kat] HMAC-384Kdf
2,974,189 UART: [kat] LMS
3,503,661 UART: [kat] --
3,506,328 UART: [cold-reset] ++
3,507,244 UART: [fht] FHT @ 0x50003400
3,517,102 UART: [idev] ++
3,517,670 UART: [idev] CDI.KEYID = 6
3,518,690 UART: [idev] SUBJECT.KEYID = 7
3,519,796 UART: [idev] UDS.KEYID = 0
3,545,335 UART: [idev] Erasing UDS.KEYID = 0
6,026,292 UART: [idev] Sha1 KeyId Algorithm
6,049,201 UART: [idev] --
6,054,074 UART: [ldev] ++
6,054,656 UART: [ldev] CDI.KEYID = 6
6,055,540 UART: [ldev] SUBJECT.KEYID = 5
6,056,762 UART: [ldev] AUTHORITY.KEYID = 7
6,058,000 UART: [ldev] FE.KEYID = 1
6,101,937 UART: [ldev] Erasing FE.KEYID = 1
8,604,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,869 UART: [ldev] --
10,415,001 UART: [fwproc] Wait for Commands...
10,418,029 UART: [fwproc] Recv command 0x46574c44
10,420,173 UART: [fwproc] Recv'd Img size: 114084 bytes
10,497,722 UART: ROM Fatal Error: 0x00B0003A
10,500,813 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,059,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,203,590 UART:
2,203,995 UART: Running Caliptra ROM ...
2,205,167 UART:
2,205,340 UART: [state] CFI Enabled
2,206,297 UART: [state] LifecycleState = Unprovisioned
2,207,960 UART: [state] DebugLocked = No
2,209,066 UART: [state] WD Timer not started. Device not locked for debugging
2,211,543 UART: [kat] SHA2-256
2,212,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,227 UART: [kat] ++
2,215,677 UART: [kat] sha1
2,216,278 UART: [kat] SHA2-256
2,216,943 UART: [kat] SHA2-384
2,217,620 UART: [kat] SHA2-512-ACC
2,218,425 UART: [kat] ECC-384
2,949,823 UART: [kat] HMAC-384Kdf
2,973,549 UART: [kat] LMS
3,502,989 UART: [kat] --
3,508,817 UART: [cold-reset] ++
3,510,577 UART: [fht] FHT @ 0x50003400
3,520,426 UART: [idev] ++
3,520,987 UART: [idev] CDI.KEYID = 6
3,521,924 UART: [idev] SUBJECT.KEYID = 7
3,523,137 UART: [idev] UDS.KEYID = 0
3,544,706 UART: [idev] Erasing UDS.KEYID = 0
6,025,630 UART: [idev] Sha1 KeyId Algorithm
6,047,903 UART: [idev] --
6,052,435 UART: [ldev] ++
6,053,008 UART: [ldev] CDI.KEYID = 6
6,053,958 UART: [ldev] SUBJECT.KEYID = 5
6,055,070 UART: [ldev] AUTHORITY.KEYID = 7
6,056,366 UART: [ldev] FE.KEYID = 1
6,101,477 UART: [ldev] Erasing FE.KEYID = 1
8,605,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,564 UART: [ldev] --
10,414,136 UART: [fwproc] Wait for Commands...
10,416,009 UART: [fwproc] Recv command 0x46574c44
10,418,118 UART: [fwproc] Recv'd Img size: 114084 bytes
10,492,732 UART: ROM Fatal Error: 0x00B0003A
10,495,820 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,059,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,204,321 UART:
2,204,774 UART: Running Caliptra ROM ...
2,205,906 UART:
2,206,070 UART: [state] CFI Enabled
2,206,974 UART: [state] LifecycleState = Unprovisioned
2,208,634 UART: [state] DebugLocked = No
2,209,749 UART: [state] WD Timer not started. Device not locked for debugging
2,212,230 UART: [kat] SHA2-256
2,212,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,934 UART: [kat] ++
2,216,388 UART: [kat] sha1
2,216,991 UART: [kat] SHA2-256
2,217,652 UART: [kat] SHA2-384
2,218,307 UART: [kat] SHA2-512-ACC
2,219,104 UART: [kat] ECC-384
2,949,379 UART: [kat] HMAC-384Kdf
2,974,065 UART: [kat] LMS
3,503,504 UART: [kat] --
3,508,035 UART: [cold-reset] ++
3,510,613 UART: [fht] FHT @ 0x50003400
3,521,540 UART: [idev] ++
3,522,110 UART: [idev] CDI.KEYID = 6
3,523,018 UART: [idev] SUBJECT.KEYID = 7
3,524,181 UART: [idev] UDS.KEYID = 0
3,544,534 UART: [idev] Erasing UDS.KEYID = 0
6,024,693 UART: [idev] Sha1 KeyId Algorithm
6,047,345 UART: [idev] --
6,051,132 UART: [ldev] ++
6,051,711 UART: [ldev] CDI.KEYID = 6
6,052,625 UART: [ldev] SUBJECT.KEYID = 5
6,053,848 UART: [ldev] AUTHORITY.KEYID = 7
6,055,083 UART: [ldev] FE.KEYID = 1
6,100,436 UART: [ldev] Erasing FE.KEYID = 1
8,602,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,608 UART: [ldev] --
10,413,263 UART: [fwproc] Wait for Commands...
10,416,081 UART: [fwproc] Recv command 0x46574c44
10,418,209 UART: [fwproc] Recv'd Img size: 114084 bytes
14,966,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,044,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,112,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,429,001 >>> mbox cmd response: success
15,433,974 UART: [afmc] ++
15,434,559 UART: [afmc] CDI.KEYID = 6
15,435,444 UART: [afmc] SUBJECT.KEYID = 7
15,436,660 UART: [afmc] AUTHORITY.KEYID = 5
17,960,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,685,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,054 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,703,049 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,719,028 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,734,861 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,758,279 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,056,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,502 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
2,068,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,235,765 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
2,054,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,258,840 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,053,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,304,161 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
2,060,552 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,280,492 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,054,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,523 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
2,061,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,305,580 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,059,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,145 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,052,951 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,260,322 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
2,053,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,278,430 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
2,053,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,276,947 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,070,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,271,669 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,052,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,299,275 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,052,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,260,269 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,052,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,256,951 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,053,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,258,148 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
2,059,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,259,982 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,066,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,236,472 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
2,055,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,020,962 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.00s
Truncated 76844 bytes from beginning
0,629,198 UART: [fwproc] Recv'd Img size: 114084 bytes
10,706,108 UART: ROM Fatal Error: 0x00B0003A
10,709,233 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,056,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,665 UART:
2,201,075 UART: Running Caliptra ROM ...
2,202,249 UART:
2,202,422 UART: [state] CFI Enabled
2,203,384 UART: [state] LifecycleState = Unprovisioned
2,205,067 UART: [state] DebugLocked = No
2,206,176 UART: [state] WD Timer not started. Device not locked for debugging
2,208,648 UART: [kat] SHA2-256
2,209,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,563 UART: [kat] ++
2,213,028 UART: [kat] sha1
2,213,545 UART: [kat] SHA2-256
2,214,290 UART: [kat] SHA2-384
2,214,955 UART: [kat] SHA2-512-ACC
2,215,832 UART: [kat] ECC-384
3,281,039 UART: [kat] HMAC-384Kdf
3,293,877 UART: [kat] LMS
3,823,373 UART: [kat] --
3,829,147 UART: [cold-reset] ++
3,831,023 UART: [fht] FHT @ 0x50003400
3,842,008 UART: [idev] ++
3,842,601 UART: [idev] CDI.KEYID = 6
3,843,674 UART: [idev] SUBJECT.KEYID = 7
3,844,778 UART: [idev] UDS.KEYID = 0
3,858,699 UART: [idev] Erasing UDS.KEYID = 0
6,317,337 UART: [idev] Sha1 KeyId Algorithm
6,340,348 UART: [idev] --
6,343,202 UART: [ldev] ++
6,343,766 UART: [ldev] CDI.KEYID = 6
6,344,670 UART: [ldev] SUBJECT.KEYID = 5
6,345,883 UART: [ldev] AUTHORITY.KEYID = 7
6,347,111 UART: [ldev] FE.KEYID = 1
6,356,945 UART: [ldev] Erasing FE.KEYID = 1
8,830,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,712 UART: [ldev] --
10,618,903 UART: [fwproc] Wait for Commands...
10,621,802 UART: [fwproc] Recv command 0x46574c44
10,623,889 UART: [fwproc] Recv'd Img size: 114084 bytes
10,699,728 UART: ROM Fatal Error: 0x00B0003A
10,702,816 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,056,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,200,624 UART:
2,201,069 UART: Running Caliptra ROM ...
2,202,256 UART:
2,202,427 UART: [state] CFI Enabled
2,203,327 UART: [state] LifecycleState = Unprovisioned
2,204,972 UART: [state] DebugLocked = No
2,205,993 UART: [state] WD Timer not started. Device not locked for debugging
2,208,464 UART: [kat] SHA2-256
2,209,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,122 UART: [kat] ++
2,212,568 UART: [kat] sha1
2,213,076 UART: [kat] SHA2-256
2,213,735 UART: [kat] SHA2-384
2,214,391 UART: [kat] SHA2-512-ACC
2,215,220 UART: [kat] ECC-384
3,281,895 UART: [kat] HMAC-384Kdf
3,293,851 UART: [kat] LMS
3,823,333 UART: [kat] --
3,828,408 UART: [cold-reset] ++
3,830,061 UART: [fht] FHT @ 0x50003400
3,841,630 UART: [idev] ++
3,842,242 UART: [idev] CDI.KEYID = 6
3,843,319 UART: [idev] SUBJECT.KEYID = 7
3,844,425 UART: [idev] UDS.KEYID = 0
3,859,486 UART: [idev] Erasing UDS.KEYID = 0
6,317,081 UART: [idev] Sha1 KeyId Algorithm
6,339,610 UART: [idev] --
6,342,789 UART: [ldev] ++
6,343,352 UART: [ldev] CDI.KEYID = 6
6,344,282 UART: [ldev] SUBJECT.KEYID = 5
6,345,491 UART: [ldev] AUTHORITY.KEYID = 7
6,346,715 UART: [ldev] FE.KEYID = 1
6,357,565 UART: [ldev] Erasing FE.KEYID = 1
8,832,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,126 UART: [ldev] --
10,626,627 UART: [fwproc] Wait for Commands...
10,628,391 UART: [fwproc] Recv command 0x46574c44
10,630,482 UART: [fwproc] Recv'd Img size: 114084 bytes
10,707,950 UART: ROM Fatal Error: 0x00B0003A
10,711,032 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,058,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,203,050 UART:
2,203,446 UART: Running Caliptra ROM ...
2,204,539 UART:
2,204,693 UART: [state] CFI Enabled
2,205,658 UART: [state] LifecycleState = Unprovisioned
2,207,317 UART: [state] DebugLocked = No
2,208,348 UART: [state] WD Timer not started. Device not locked for debugging
2,210,813 UART: [kat] SHA2-256
2,211,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,484 UART: [kat] ++
2,214,933 UART: [kat] sha1
2,215,446 UART: [kat] SHA2-256
2,216,101 UART: [kat] SHA2-384
2,216,778 UART: [kat] SHA2-512-ACC
2,217,607 UART: [kat] ECC-384
3,283,052 UART: [kat] HMAC-384Kdf
3,295,501 UART: [kat] LMS
3,825,006 UART: [kat] --
3,829,649 UART: [cold-reset] ++
3,832,223 UART: [fht] FHT @ 0x50003400
3,844,223 UART: [idev] ++
3,844,789 UART: [idev] CDI.KEYID = 6
3,845,723 UART: [idev] SUBJECT.KEYID = 7
3,846,934 UART: [idev] UDS.KEYID = 0
3,863,692 UART: [idev] Erasing UDS.KEYID = 0
6,318,091 UART: [idev] Sha1 KeyId Algorithm
6,340,878 UART: [idev] --
6,345,495 UART: [ldev] ++
6,346,073 UART: [ldev] CDI.KEYID = 6
6,347,009 UART: [ldev] SUBJECT.KEYID = 5
6,348,173 UART: [ldev] AUTHORITY.KEYID = 7
6,349,405 UART: [ldev] FE.KEYID = 1
6,361,344 UART: [ldev] Erasing FE.KEYID = 1
8,838,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,148 UART: [ldev] --
10,628,464 UART: [fwproc] Wait for Commands...
10,630,823 UART: [fwproc] Recv command 0x46574c44
10,632,919 UART: [fwproc] Recv'd Img size: 114084 bytes
10,708,621 UART: ROM Fatal Error: 0x00B0003A
10,711,755 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,063,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,207,692 UART:
2,208,102 UART: Running Caliptra ROM ...
2,209,272 UART:
2,209,439 UART: [state] CFI Enabled
2,210,399 UART: [state] LifecycleState = Unprovisioned
2,212,056 UART: [state] DebugLocked = No
2,213,163 UART: [state] WD Timer not started. Device not locked for debugging
2,215,633 UART: [kat] SHA2-256
2,216,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,338 UART: [kat] ++
2,219,788 UART: [kat] sha1
2,220,302 UART: [kat] SHA2-256
2,221,038 UART: [kat] SHA2-384
2,221,706 UART: [kat] SHA2-512-ACC
2,222,537 UART: [kat] ECC-384
3,284,795 UART: [kat] HMAC-384Kdf
3,297,331 UART: [kat] LMS
3,826,784 UART: [kat] --
3,831,830 UART: [cold-reset] ++
3,832,790 UART: [fht] FHT @ 0x50003400
3,842,952 UART: [idev] ++
3,843,509 UART: [idev] CDI.KEYID = 6
3,844,414 UART: [idev] SUBJECT.KEYID = 7
3,845,622 UART: [idev] UDS.KEYID = 0
3,861,945 UART: [idev] Erasing UDS.KEYID = 0
6,316,812 UART: [idev] Sha1 KeyId Algorithm
6,341,189 UART: [idev] --
6,345,283 UART: [ldev] ++
6,345,847 UART: [ldev] CDI.KEYID = 6
6,346,858 UART: [ldev] SUBJECT.KEYID = 5
6,347,958 UART: [ldev] AUTHORITY.KEYID = 7
6,349,242 UART: [ldev] FE.KEYID = 1
6,360,372 UART: [ldev] Erasing FE.KEYID = 1
8,833,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,393 UART: [ldev] --
10,625,187 UART: [fwproc] Wait for Commands...
10,627,410 UART: [fwproc] Recv command 0x46574c44
10,629,451 UART: [fwproc] Recv'd Img size: 114084 bytes
15,176,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,258,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,327,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,643,912 >>> mbox cmd response: success
15,648,523 UART: [afmc] ++
15,649,105 UART: [afmc] CDI.KEYID = 6
15,649,984 UART: [afmc] SUBJECT.KEYID = 7
15,651,188 UART: [afmc] AUTHORITY.KEYID = 5
18,152,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,870,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,872,843 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,888,881 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,904,886 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,920,657 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,943,513 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.70s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,055,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,476,509 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,055,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,491,530 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
2,056,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,476,279 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,056,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,496,256 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,065,097 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,480,340 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,056,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,478,436 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,056,205 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,475,387 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,055,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,473,882 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
2,056,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,484,351 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,056,481 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,490,309 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,055,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,474,727 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
2,057,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,476,796 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,056,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,485,697 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
2,056,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,477,817 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,056,721 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,485,490 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,058,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,488,396 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,056,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,491,908 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,057,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,477,920 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,056,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,249,218 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.33s
Truncated 74764 bytes from beginning
1,271,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,020 UART: [ldev] --
1,279,474 UART: [fwproc] Wait for Commands...
1,280,207 UART: [fwproc] Recv command 0x46574c44
1,280,940 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,794 UART: ROM Fatal Error: 0x00B0003A
1,307,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,097 UART: [kat] ++
895,249 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,677 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,479 UART: [idev] ++
1,172,647 UART: [idev] CDI.KEYID = 6
1,173,008 UART: [idev] SUBJECT.KEYID = 7
1,173,433 UART: [idev] UDS.KEYID = 0
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,313 UART: [idev] Sha1 KeyId Algorithm
1,207,337 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,796 UART: [ldev] --
1,280,064 UART: [fwproc] Wait for Commands...
1,280,745 UART: [fwproc] Recv command 0x46574c44
1,281,478 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,288 UART: ROM Fatal Error: 0x00B0003A
1,308,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,182,565 UART: [idev] Erasing UDS.KEYID = 0
1,199,651 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,586 UART: [ldev] Erasing FE.KEYID = 1
1,242,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,732 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,392 UART: ROM Fatal Error: 0x00B0003A
1,310,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,020 UART: [ldev] --
1,280,466 UART: [fwproc] Wait for Commands...
1,281,199 UART: [fwproc] Recv command 0x46574c44
1,281,932 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,272 UART: ROM Fatal Error: 0x00B0003A
1,309,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,199,661 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,658 UART: [ldev] ++
1,209,826 UART: [ldev] CDI.KEYID = 6
1,210,190 UART: [ldev] SUBJECT.KEYID = 5
1,210,617 UART: [ldev] AUTHORITY.KEYID = 7
1,211,080 UART: [ldev] FE.KEYID = 1
1,216,536 UART: [ldev] Erasing FE.KEYID = 1
1,243,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,332 UART: [ldev] --
1,282,848 UART: [fwproc] Wait for Commands...
1,283,427 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 114084 bytes
3,109,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,136,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,166,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,301,670 >>> mbox cmd response: success
3,302,691 UART: [afmc] ++
3,302,859 UART: [afmc] CDI.KEYID = 6
3,303,222 UART: [afmc] SUBJECT.KEYID = 7
3,303,648 UART: [afmc] AUTHORITY.KEYID = 5
3,339,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,356,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,356,775 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,362,483 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,368,368 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,374,070 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,382,038 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 19.13s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,106 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,153,313 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.07s
Truncated 74764 bytes from beginning
1,273,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,443 UART: [fwproc] Wait for Commands...
1,283,194 UART: [fwproc] Recv command 0x46574c44
1,283,927 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,529 UART: ROM Fatal Error: 0x00B0003A
1,310,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,641 UART: [state] LifecycleState = Unprovisioned
85,296 UART: [state] DebugLocked = No
86,006 UART: [state] WD Timer not started. Device not locked for debugging
87,121 UART: [kat] SHA2-256
890,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,800 UART: [kat] ++
894,952 UART: [kat] sha1
899,138 UART: [kat] SHA2-256
901,078 UART: [kat] SHA2-384
903,795 UART: [kat] SHA2-512-ACC
905,696 UART: [kat] ECC-384
915,271 UART: [kat] HMAC-384Kdf
919,893 UART: [kat] LMS
1,168,205 UART: [kat] --
1,169,282 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,512 UART: [idev] ++
1,172,680 UART: [idev] CDI.KEYID = 6
1,173,041 UART: [idev] SUBJECT.KEYID = 7
1,173,466 UART: [idev] UDS.KEYID = 0
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,808 UART: [idev] Sha1 KeyId Algorithm
1,207,596 UART: [idev] --
1,208,615 UART: [ldev] ++
1,208,783 UART: [ldev] CDI.KEYID = 6
1,209,147 UART: [ldev] SUBJECT.KEYID = 5
1,209,574 UART: [ldev] AUTHORITY.KEYID = 7
1,210,037 UART: [ldev] FE.KEYID = 1
1,214,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,385 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,239 UART: ROM Fatal Error: 0x00B0003A
1,310,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,162 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,101 UART: [ldev] ++
1,209,269 UART: [ldev] CDI.KEYID = 6
1,209,633 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,157 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,363 UART: ROM Fatal Error: 0x00B0003A
1,310,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,676 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,723 UART: [ldev] --
1,281,147 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,705 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,955 UART: ROM Fatal Error: 0x00B0003A
1,309,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
921,277 UART: [kat] LMS
1,169,589 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,079 UART: [ldev] ++
1,209,247 UART: [ldev] CDI.KEYID = 6
1,209,611 UART: [ldev] SUBJECT.KEYID = 5
1,210,038 UART: [ldev] AUTHORITY.KEYID = 7
1,210,501 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,335 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,588 UART: [fwproc] Recv command 0x46574c44
1,283,321 UART: [fwproc] Recv'd Img size: 114084 bytes
3,119,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,147,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,403 >>> mbox cmd response: success
3,313,672 UART: [afmc] ++
3,313,840 UART: [afmc] CDI.KEYID = 6
3,314,203 UART: [afmc] SUBJECT.KEYID = 7
3,314,629 UART: [afmc] AUTHORITY.KEYID = 5
3,349,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,300 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,373,008 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,378,893 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,384,595 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,392,495 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.87s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,155,248 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.05s
Truncated 74764 bytes from beginning
1,272,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,762 UART: [fwproc] Wait for Commands...
1,281,417 UART: [fwproc] Recv command 0x46574c44
1,282,150 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,718 UART: ROM Fatal Error: 0x00B0003A
1,308,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,034 UART: [kat] LMS
1,168,346 UART: [kat] --
1,169,261 UART: [cold-reset] ++
1,169,635 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,045 UART: [idev] Sha1 KeyId Algorithm
1,206,823 UART: [idev] --
1,207,786 UART: [ldev] ++
1,207,954 UART: [ldev] CDI.KEYID = 6
1,208,318 UART: [ldev] SUBJECT.KEYID = 5
1,208,745 UART: [ldev] AUTHORITY.KEYID = 7
1,209,208 UART: [ldev] FE.KEYID = 1
1,214,358 UART: [ldev] Erasing FE.KEYID = 1
1,239,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,344 UART: [ldev] --
1,278,656 UART: [fwproc] Wait for Commands...
1,279,385 UART: [fwproc] Recv command 0x46574c44
1,280,118 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,256 UART: ROM Fatal Error: 0x00B0003A
1,307,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,331 UART: [kat] SHA2-256
901,271 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,649 UART: [idev] ++
1,172,817 UART: [idev] CDI.KEYID = 6
1,173,178 UART: [idev] SUBJECT.KEYID = 7
1,173,603 UART: [idev] UDS.KEYID = 0
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,199,043 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,844 UART: [ldev] ++
1,209,012 UART: [ldev] CDI.KEYID = 6
1,209,376 UART: [ldev] SUBJECT.KEYID = 5
1,209,803 UART: [ldev] AUTHORITY.KEYID = 7
1,210,266 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,241,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,008 UART: [ldev] --
1,281,500 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,960 UART: ROM Fatal Error: 0x00B0003A
1,310,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
890,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,015 UART: [kat] ++
895,167 UART: [kat] sha1
899,411 UART: [kat] SHA2-256
901,351 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,430 UART: [kat] HMAC-384Kdf
919,900 UART: [kat] LMS
1,168,212 UART: [kat] --
1,169,231 UART: [cold-reset] ++
1,169,641 UART: [fht] FHT @ 0x50003400
1,172,277 UART: [idev] ++
1,172,445 UART: [idev] CDI.KEYID = 6
1,172,806 UART: [idev] SUBJECT.KEYID = 7
1,173,231 UART: [idev] UDS.KEYID = 0
1,181,319 UART: [idev] Erasing UDS.KEYID = 0
1,197,887 UART: [idev] Sha1 KeyId Algorithm
1,206,655 UART: [idev] --
1,207,744 UART: [ldev] ++
1,207,912 UART: [ldev] CDI.KEYID = 6
1,208,276 UART: [ldev] SUBJECT.KEYID = 5
1,208,703 UART: [ldev] AUTHORITY.KEYID = 7
1,209,166 UART: [ldev] FE.KEYID = 1
1,214,168 UART: [ldev] Erasing FE.KEYID = 1
1,240,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,992 UART: [ldev] --
1,279,370 UART: [fwproc] Wait for Commands...
1,280,045 UART: [fwproc] Recv command 0x46574c44
1,280,778 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,890 UART: ROM Fatal Error: 0x00B0003A
1,308,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
1,169,208 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,181,943 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,042 UART: [ldev] ++
1,209,210 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,001 UART: [ldev] AUTHORITY.KEYID = 7
1,210,464 UART: [ldev] FE.KEYID = 1
1,215,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114084 bytes
3,111,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,138,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,168,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,303,633 >>> mbox cmd response: success
3,304,802 UART: [afmc] ++
3,304,970 UART: [afmc] CDI.KEYID = 6
3,305,333 UART: [afmc] SUBJECT.KEYID = 7
3,305,759 UART: [afmc] AUTHORITY.KEYID = 5
3,340,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,357,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,358,540 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,364,248 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,370,133 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,375,835 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,383,501 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.44s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,047 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.43s
Truncated 74764 bytes from beginning
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,549 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,971 UART: ROM Fatal Error: 0x00B0003A
1,311,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,749 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,181 UART: [fwproc] Recv'd Img size: 114084 bytes
1,310,311 UART: ROM Fatal Error: 0x00B0003A
1,311,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,198,706 UART: [idev] Sha1 KeyId Algorithm
1,207,502 UART: [idev] --
1,208,551 UART: [ldev] ++
1,208,719 UART: [ldev] CDI.KEYID = 6
1,209,083 UART: [ldev] SUBJECT.KEYID = 5
1,209,510 UART: [ldev] AUTHORITY.KEYID = 7
1,209,973 UART: [ldev] FE.KEYID = 1
1,215,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,345 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,537 UART: ROM Fatal Error: 0x00B0003A
1,309,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,991 UART: [state] LifecycleState = Unprovisioned
86,646 UART: [state] DebugLocked = No
87,356 UART: [state] WD Timer not started. Device not locked for debugging
88,611 UART: [kat] SHA2-256
892,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,290 UART: [kat] ++
896,442 UART: [kat] sha1
900,598 UART: [kat] SHA2-256
902,538 UART: [kat] SHA2-384
905,369 UART: [kat] SHA2-512-ACC
907,270 UART: [kat] ECC-384
917,217 UART: [kat] HMAC-384Kdf
921,867 UART: [kat] LMS
1,170,179 UART: [kat] --
1,171,194 UART: [cold-reset] ++
1,171,762 UART: [fht] FHT @ 0x50003400
1,174,414 UART: [idev] ++
1,174,582 UART: [idev] CDI.KEYID = 6
1,174,943 UART: [idev] SUBJECT.KEYID = 7
1,175,368 UART: [idev] UDS.KEYID = 0
1,183,342 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,244,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,103 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,220 UART: [fwproc] Recv command 0x46574c44
1,284,953 UART: [fwproc] Recv'd Img size: 114084 bytes
1,311,233 UART: ROM Fatal Error: 0x00B0003A
1,312,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,389 UART: [kat] SHA2-256
890,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,068 UART: [kat] ++
895,220 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,181,590 UART: [idev] Erasing UDS.KEYID = 0
1,198,174 UART: [idev] Sha1 KeyId Algorithm
1,207,012 UART: [idev] --
1,207,911 UART: [ldev] ++
1,208,079 UART: [ldev] CDI.KEYID = 6
1,208,443 UART: [ldev] SUBJECT.KEYID = 5
1,208,870 UART: [ldev] AUTHORITY.KEYID = 7
1,209,333 UART: [ldev] FE.KEYID = 1
1,214,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,247 UART: [ldev] --
1,280,741 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 114084 bytes
3,112,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,140,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,305,689 >>> mbox cmd response: success
3,306,718 UART: [afmc] ++
3,306,886 UART: [afmc] CDI.KEYID = 6
3,307,249 UART: [afmc] SUBJECT.KEYID = 7
3,307,675 UART: [afmc] AUTHORITY.KEYID = 5
3,343,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,520 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,366,228 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,372,113 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,377,815 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,385,753 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.55s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,344 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.55s
Truncated 74764 bytes from beginning
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,538 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,844 UART: ROM Fatal Error: 0x00B0003A
1,310,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,526 UART: [fwproc] Wait for Commands...
1,281,201 UART: [fwproc] Recv command 0x46574c44
1,281,934 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,534 UART: ROM Fatal Error: 0x00B0003A
1,308,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,855 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,321 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,199,219 UART: [idev] Sha1 KeyId Algorithm
1,207,997 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,418 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,594 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,562 UART: ROM Fatal Error: 0x00B0003A
1,309,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,045 UART: [kat] ++
895,197 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,622 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,313 UART: [fwproc] Recv command 0x46574c44
1,283,046 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,334 UART: ROM Fatal Error: 0x00B0003A
1,310,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: [kat] ++
895,325 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,715 UART: [idev] Sha1 KeyId Algorithm
1,207,751 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,800 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,148,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,889 >>> mbox cmd response: success
3,314,092 UART: [afmc] ++
3,314,260 UART: [afmc] CDI.KEYID = 6
3,314,623 UART: [afmc] SUBJECT.KEYID = 7
3,315,049 UART: [afmc] AUTHORITY.KEYID = 5
3,350,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,618 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,373,326 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,379,211 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,384,913 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,392,707 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.40s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,482 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,169,181 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.54s
Truncated 74764 bytes from beginning
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,807 UART: [fwproc] Wait for Commands...
1,282,446 UART: [fwproc] Recv command 0x46574c44
1,283,179 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,907 UART: ROM Fatal Error: 0x00B0003A
1,310,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,576 UART: [kat] SHA2-256
902,516 UART: [kat] SHA2-384
905,213 UART: [kat] SHA2-512-ACC
907,114 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,583 UART: [kat] LMS
1,169,895 UART: [kat] --
1,171,022 UART: [cold-reset] ++
1,171,408 UART: [fht] FHT @ 0x50003400
1,174,128 UART: [idev] ++
1,174,296 UART: [idev] CDI.KEYID = 6
1,174,657 UART: [idev] SUBJECT.KEYID = 7
1,175,082 UART: [idev] UDS.KEYID = 0
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,426 UART: [idev] --
1,209,535 UART: [ldev] ++
1,209,703 UART: [ldev] CDI.KEYID = 6
1,210,067 UART: [ldev] SUBJECT.KEYID = 5
1,210,494 UART: [ldev] AUTHORITY.KEYID = 7
1,210,957 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,843 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,857 UART: ROM Fatal Error: 0x00B0003A
1,310,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,252 UART: [fwproc] Recv command 0x46574c44
1,282,985 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,911 UART: ROM Fatal Error: 0x00B0003A
1,309,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,851 UART: [kat] SHA2-512-ACC
906,752 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,199,324 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,027 UART: [ldev] SUBJECT.KEYID = 5
1,210,454 UART: [ldev] AUTHORITY.KEYID = 7
1,210,917 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,993 UART: [fwproc] Wait for Commands...
1,282,758 UART: [fwproc] Recv command 0x46574c44
1,283,491 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,365 UART: ROM Fatal Error: 0x00B0003A
1,310,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,525 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,182,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,283,112 UART: [fwproc] Recv command 0x46574c44
1,283,845 UART: [fwproc] Recv'd Img size: 114084 bytes
3,107,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,135,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,165,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,300,634 >>> mbox cmd response: success
3,301,845 UART: [afmc] ++
3,302,013 UART: [afmc] CDI.KEYID = 6
3,302,376 UART: [afmc] SUBJECT.KEYID = 7
3,302,802 UART: [afmc] AUTHORITY.KEYID = 5
3,338,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,354,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,355,645 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,361,353 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,367,238 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,372,940 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,380,844 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.76s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,589 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
6,065 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,393 UART:
192,780 UART: Running Caliptra ROM ...
193,958 UART:
194,106 UART: [state] CFI Enabled
264,239 UART: [state] LifecycleState = Manufacturing
266,600 UART: [state] DebugLocked = No
268,919 UART: [state] WD Timer not started. Device not locked for debugging
274,178 UART: [kat] SHA2-256
456,124 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,631 UART: [kat] ++
468,142 UART: [kat] sha1
478,915 UART: [kat] SHA2-256
481,929 UART: [kat] SHA2-384
488,438 UART: [kat] SHA2-512-ACC
491,043 UART: [kat] ECC-384
3,773,744 UART: [kat] HMAC-384Kdf
3,799,574 UART: [kat] LMS
4,872,701 UART: [kat] --
4,877,258 UART: [cold-reset] ++
4,880,011 UART: [fht] FHT @ 0x50003400
4,891,486 UART: [idev] ++
4,892,160 UART: [idev] CDI.KEYID = 6
4,893,285 UART: [idev] SUBJECT.KEYID = 7
4,894,497 UART: [idev] UDS.KEYID = 0
4,926,703 UART: [idev] Erasing UDS.KEYID = 0
8,237,672 UART: [idev] Sha1 KeyId Algorithm
8,259,280 UART: [idev] --
8,264,025 UART: [ldev] ++
8,264,640 UART: [ldev] CDI.KEYID = 6
8,265,753 UART: [ldev] SUBJECT.KEYID = 5
8,266,970 UART: [ldev] AUTHORITY.KEYID = 7
8,268,126 UART: [ldev] FE.KEYID = 1
8,313,368 UART: [ldev] Erasing FE.KEYID = 1
11,648,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,991,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,162 UART: [ldev] --
14,031,671 UART: [fwproc] Wait for Commands...
14,034,900 UART: [fwproc] Recv command 0x46574c44
14,037,215 UART: [fwproc] Recv'd Img size: 113760 bytes
14,126,136 UART: ROM Fatal Error: 0x000B0005
14,129,500 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,444 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,914,787 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,384 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,433 UART:
192,836 UART: Running Caliptra ROM ...
194,170 UART:
603,715 UART: [state] CFI Enabled
618,694 UART: [state] LifecycleState = Manufacturing
621,068 UART: [state] DebugLocked = No
623,257 UART: [state] WD Timer not started. Device not locked for debugging
627,685 UART: [kat] SHA2-256
809,635 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,206 UART: [kat] ++
821,795 UART: [kat] sha1
831,862 UART: [kat] SHA2-256
834,927 UART: [kat] SHA2-384
840,832 UART: [kat] SHA2-512-ACC
843,444 UART: [kat] ECC-384
4,097,183 UART: [kat] HMAC-384Kdf
4,109,572 UART: [kat] LMS
5,182,695 UART: [kat] --
5,188,832 UART: [cold-reset] ++
5,190,828 UART: [fht] FHT @ 0x50003400
5,202,511 UART: [idev] ++
5,203,181 UART: [idev] CDI.KEYID = 6
5,204,411 UART: [idev] SUBJECT.KEYID = 7
5,205,833 UART: [idev] UDS.KEYID = 0
5,221,644 UART: [idev] Erasing UDS.KEYID = 0
8,495,643 UART: [idev] Sha1 KeyId Algorithm
8,517,698 UART: [idev] --
8,521,836 UART: [ldev] ++
8,522,408 UART: [ldev] CDI.KEYID = 6
8,523,539 UART: [ldev] SUBJECT.KEYID = 5
8,525,076 UART: [ldev] AUTHORITY.KEYID = 7
8,526,557 UART: [ldev] FE.KEYID = 1
8,537,575 UART: [ldev] Erasing FE.KEYID = 1
11,827,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,279 UART: [ldev] --
14,190,429 UART: [fwproc] Wait for Commands...
14,193,285 UART: [fwproc] Recv command 0x46574c44
14,195,604 UART: [fwproc] Recv'd Img size: 113760 bytes
14,286,413 UART: ROM Fatal Error: 0x000B0005
14,289,819 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
6,872 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,105,482 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
6,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,547 UART:
192,916 UART: Running Caliptra ROM ...
194,097 UART:
194,258 UART: [state] CFI Enabled
259,571 UART: [state] LifecycleState = Manufacturing
261,437 UART: [state] DebugLocked = No
262,767 UART: [state] WD Timer not started. Device not locked for debugging
266,562 UART: [kat] SHA2-256
445,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,274 UART: [kat] ++
457,805 UART: [kat] sha1
469,174 UART: [kat] SHA2-256
472,351 UART: [kat] SHA2-384
479,655 UART: [kat] SHA2-512-ACC
482,593 UART: [kat] ECC-384
2,944,491 UART: [kat] HMAC-384Kdf
2,967,203 UART: [kat] LMS
3,496,693 UART: [kat] --
3,500,006 UART: [cold-reset] ++
3,500,867 UART: [fht] FHT @ 0x50003400
3,511,770 UART: [idev] ++
3,512,538 UART: [idev] CDI.KEYID = 6
3,513,459 UART: [idev] SUBJECT.KEYID = 7
3,514,585 UART: [idev] UDS.KEYID = 0
3,539,234 UART: [idev] Erasing UDS.KEYID = 0
6,022,195 UART: [idev] Sha1 KeyId Algorithm
6,046,912 UART: [idev] --
6,051,075 UART: [ldev] ++
6,051,645 UART: [ldev] CDI.KEYID = 6
6,052,532 UART: [ldev] SUBJECT.KEYID = 5
6,053,693 UART: [ldev] AUTHORITY.KEYID = 7
6,054,984 UART: [ldev] FE.KEYID = 1
6,095,948 UART: [ldev] Erasing FE.KEYID = 1
8,597,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,141 UART: [ldev] --
10,386,614 UART: [fwproc] Wait for Commands...
10,388,346 UART: [fwproc] Recv command 0x46574c44
10,390,447 UART: [fwproc] Recv'd Img size: 114084 bytes
10,478,037 UART: ROM Fatal Error: 0x000B0005
10,481,135 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
5,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,309,862 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
6,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,518 UART:
192,941 UART: Running Caliptra ROM ...
194,062 UART:
603,609 UART: [state] CFI Enabled
618,682 UART: [state] LifecycleState = Manufacturing
620,568 UART: [state] DebugLocked = No
623,292 UART: [state] WD Timer not started. Device not locked for debugging
627,169 UART: [kat] SHA2-256
806,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,888 UART: [kat] ++
818,427 UART: [kat] sha1
829,147 UART: [kat] SHA2-256
832,148 UART: [kat] SHA2-384
839,383 UART: [kat] SHA2-512-ACC
842,317 UART: [kat] ECC-384
3,282,152 UART: [kat] HMAC-384Kdf
3,294,555 UART: [kat] LMS
3,824,079 UART: [kat] --
3,829,562 UART: [cold-reset] ++
3,831,336 UART: [fht] FHT @ 0x50003400
3,842,470 UART: [idev] ++
3,843,031 UART: [idev] CDI.KEYID = 6
3,844,005 UART: [idev] SUBJECT.KEYID = 7
3,845,166 UART: [idev] UDS.KEYID = 0
3,863,302 UART: [idev] Erasing UDS.KEYID = 0
6,320,865 UART: [idev] Sha1 KeyId Algorithm
6,342,864 UART: [idev] --
6,346,886 UART: [ldev] ++
6,347,463 UART: [ldev] CDI.KEYID = 6
6,348,395 UART: [ldev] SUBJECT.KEYID = 5
6,349,550 UART: [ldev] AUTHORITY.KEYID = 7
6,350,831 UART: [ldev] FE.KEYID = 1
6,361,636 UART: [ldev] Erasing FE.KEYID = 1
8,834,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,331 UART: [ldev] --
10,623,511 UART: [fwproc] Wait for Commands...
10,625,446 UART: [fwproc] Recv command 0x46574c44
10,627,535 UART: [fwproc] Recv'd Img size: 114084 bytes
10,716,722 UART: ROM Fatal Error: 0x000B0005
10,719,811 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
6,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,486,674 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,185 UART:
192,557 UART: Running Caliptra ROM ...
193,766 UART:
193,919 UART: [state] CFI Enabled
260,926 UART: [state] LifecycleState = Manufacturing
262,851 UART: [state] DebugLocked = No
264,446 UART: [state] WD Timer not started. Device not locked for debugging
268,329 UART: [kat] SHA2-256
447,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,046 UART: [kat] ++
459,580 UART: [kat] sha1
471,272 UART: [kat] SHA2-256
474,271 UART: [kat] SHA2-384
479,171 UART: [kat] SHA2-512-ACC
482,086 UART: [kat] ECC-384
2,944,339 UART: [kat] HMAC-384Kdf
2,969,458 UART: [kat] LMS
3,498,942 UART: [kat] --
3,504,249 UART: [cold-reset] ++
3,505,868 UART: [fht] FHT @ 0x50003400
3,516,904 UART: [idev] ++
3,517,501 UART: [idev] CDI.KEYID = 6
3,518,389 UART: [idev] SUBJECT.KEYID = 7
3,519,609 UART: [idev] UDS.KEYID = 0
3,542,645 UART: [idev] Erasing UDS.KEYID = 0
6,025,504 UART: [idev] Sha1 KeyId Algorithm
6,047,283 UART: [idev] --
6,052,736 UART: [ldev] ++
6,053,309 UART: [ldev] CDI.KEYID = 6
6,054,194 UART: [ldev] SUBJECT.KEYID = 5
6,055,408 UART: [ldev] AUTHORITY.KEYID = 7
6,056,645 UART: [ldev] FE.KEYID = 1
6,099,457 UART: [ldev] Erasing FE.KEYID = 1
8,602,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,997 UART: [ldev] --
10,408,978 UART: [fwproc] Wait for Commands...
10,411,351 UART: [fwproc] Recv command 0x46574c44
10,413,394 UART: [fwproc] Recv'd Img size: 114084 bytes
10,502,194 UART: ROM Fatal Error: 0x000B0005
10,505,344 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,313,328 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
7,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,294 UART:
192,729 UART: Running Caliptra ROM ...
194,072 UART:
603,565 UART: [state] CFI Enabled
615,826 UART: [state] LifecycleState = Manufacturing
617,654 UART: [state] DebugLocked = No
620,320 UART: [state] WD Timer not started. Device not locked for debugging
624,303 UART: [kat] SHA2-256
803,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,966 UART: [kat] ++
815,508 UART: [kat] sha1
827,416 UART: [kat] SHA2-256
830,469 UART: [kat] SHA2-384
835,786 UART: [kat] SHA2-512-ACC
838,765 UART: [kat] ECC-384
3,279,106 UART: [kat] HMAC-384Kdf
3,291,480 UART: [kat] LMS
3,820,941 UART: [kat] --
3,827,563 UART: [cold-reset] ++
3,830,109 UART: [fht] FHT @ 0x50003400
3,841,906 UART: [idev] ++
3,842,473 UART: [idev] CDI.KEYID = 6
3,843,443 UART: [idev] SUBJECT.KEYID = 7
3,844,599 UART: [idev] UDS.KEYID = 0
3,863,008 UART: [idev] Erasing UDS.KEYID = 0
6,321,729 UART: [idev] Sha1 KeyId Algorithm
6,344,258 UART: [idev] --
6,349,705 UART: [ldev] ++
6,350,283 UART: [ldev] CDI.KEYID = 6
6,351,193 UART: [ldev] SUBJECT.KEYID = 5
6,352,352 UART: [ldev] AUTHORITY.KEYID = 7
6,353,637 UART: [ldev] FE.KEYID = 1
6,363,525 UART: [ldev] Erasing FE.KEYID = 1
8,836,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,088 UART: [ldev] --
10,626,757 UART: [fwproc] Wait for Commands...
10,629,609 UART: [fwproc] Recv command 0x46574c44
10,631,707 UART: [fwproc] Recv'd Img size: 114084 bytes
10,723,646 UART: ROM Fatal Error: 0x000B0005
10,726,759 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
6,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,496,632 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Manufacturing
85,941 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,637 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,208,197 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,476 UART: [fwproc] Wait for Commands...
1,282,169 UART: [fwproc] Recv command 0x46574c44
1,282,902 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,853 UART: ROM Fatal Error: 0x000B0005
1,329,010 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,655 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,327 UART: [state] LifecycleState = Manufacturing
85,982 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,890 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,920 UART: [idev] Sha1 KeyId Algorithm
1,208,822 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,834 UART: ROM Fatal Error: 0x000B0005
1,328,991 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,632 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Manufacturing
85,623 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,003 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,173,137 UART: [idev] ++
1,173,305 UART: [idev] CDI.KEYID = 6
1,173,666 UART: [idev] SUBJECT.KEYID = 7
1,174,091 UART: [idev] UDS.KEYID = 0
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,307 UART: [idev] --
1,208,416 UART: [ldev] ++
1,208,584 UART: [ldev] CDI.KEYID = 6
1,208,948 UART: [ldev] SUBJECT.KEYID = 5
1,209,375 UART: [ldev] AUTHORITY.KEYID = 7
1,209,838 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,241,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,395 UART: [fwproc] Recv command 0x46574c44
1,282,128 UART: [fwproc] Recv'd Img size: 114084 bytes
1,326,717 UART: ROM Fatal Error: 0x000B0005
1,327,874 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,721 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Manufacturing
86,070 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,209,809 UART: [ldev] ++
1,209,977 UART: [ldev] CDI.KEYID = 6
1,210,341 UART: [ldev] SUBJECT.KEYID = 5
1,210,768 UART: [ldev] AUTHORITY.KEYID = 7
1,211,231 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,664 UART: [fwproc] Recv command 0x46574c44
1,283,397 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,846 UART: ROM Fatal Error: 0x000B0005
1,329,003 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,176 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Manufacturing
85,635 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,746 UART: [kat] LMS
1,169,058 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,181,609 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,055 UART: [idev] --
1,208,066 UART: [ldev] ++
1,208,234 UART: [ldev] CDI.KEYID = 6
1,208,598 UART: [ldev] SUBJECT.KEYID = 5
1,209,025 UART: [ldev] AUTHORITY.KEYID = 7
1,209,488 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,240,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,502 UART: [ldev] --
1,279,784 UART: [fwproc] Wait for Commands...
1,280,529 UART: [fwproc] Recv command 0x46574c44
1,281,262 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,625 UART: ROM Fatal Error: 0x000B0005
1,326,782 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,599 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Manufacturing
86,322 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
917,143 UART: [kat] HMAC-384Kdf
921,727 UART: [kat] LMS
1,170,039 UART: [kat] --
1,171,034 UART: [cold-reset] ++
1,171,570 UART: [fht] FHT @ 0x50003400
1,174,292 UART: [idev] ++
1,174,460 UART: [idev] CDI.KEYID = 6
1,174,821 UART: [idev] SUBJECT.KEYID = 7
1,175,246 UART: [idev] UDS.KEYID = 0
1,183,322 UART: [idev] Erasing UDS.KEYID = 0
1,200,848 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,769 UART: [ldev] ++
1,210,937 UART: [ldev] CDI.KEYID = 6
1,211,301 UART: [ldev] SUBJECT.KEYID = 5
1,211,728 UART: [ldev] AUTHORITY.KEYID = 7
1,212,191 UART: [ldev] FE.KEYID = 1
1,217,747 UART: [ldev] Erasing FE.KEYID = 1
1,244,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,205 UART: [ldev] --
1,283,531 UART: [fwproc] Wait for Commands...
1,284,286 UART: [fwproc] Recv command 0x46574c44
1,285,019 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,680 UART: ROM Fatal Error: 0x000B0005
1,330,837 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,268 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
5,619 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,122 UART:
192,501 UART: Running Caliptra ROM ...
193,686 UART:
193,838 UART: [state] CFI Enabled
265,866 UART: [state] LifecycleState = Manufacturing
268,205 UART: [state] DebugLocked = No
269,875 UART: [state] WD Timer not started. Device not locked for debugging
273,718 UART: [kat] SHA2-256
455,673 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,200 UART: [kat] ++
467,726 UART: [kat] sha1
478,016 UART: [kat] SHA2-256
481,033 UART: [kat] SHA2-384
487,330 UART: [kat] SHA2-512-ACC
489,988 UART: [kat] ECC-384
3,775,943 UART: [kat] HMAC-384Kdf
3,803,263 UART: [kat] LMS
4,876,377 UART: [kat] --
4,880,698 UART: [cold-reset] ++
4,882,469 UART: [fht] FHT @ 0x50003400
4,893,014 UART: [idev] ++
4,893,744 UART: [idev] CDI.KEYID = 6
4,894,938 UART: [idev] SUBJECT.KEYID = 7
4,896,094 UART: [idev] UDS.KEYID = 0
4,930,669 UART: [idev] Erasing UDS.KEYID = 0
8,245,214 UART: [idev] Sha1 KeyId Algorithm
8,267,220 UART: [idev] --
8,271,302 UART: [ldev] ++
8,271,934 UART: [ldev] CDI.KEYID = 6
8,273,217 UART: [ldev] SUBJECT.KEYID = 5
8,274,253 UART: [ldev] AUTHORITY.KEYID = 7
8,275,486 UART: [ldev] FE.KEYID = 1
8,318,885 UART: [ldev] Erasing FE.KEYID = 1
11,654,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,635 UART: [ldev] --
14,034,761 UART: [fwproc] Wait for Commands...
14,036,327 UART: [fwproc] Recv command 0x46574c44
14,038,596 UART: [fwproc] Recv'd Img size: 113760 bytes
14,099,052 UART: ROM Fatal Error: 0x000B0003
14,102,483 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
5,844 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,887,065 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
6,568 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,510 UART:
192,886 UART: Running Caliptra ROM ...
194,062 UART:
603,874 UART: [state] CFI Enabled
614,472 UART: [state] LifecycleState = Manufacturing
616,852 UART: [state] DebugLocked = No
619,277 UART: [state] WD Timer not started. Device not locked for debugging
623,003 UART: [kat] SHA2-256
804,810 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,362 UART: [kat] ++
816,855 UART: [kat] sha1
827,668 UART: [kat] SHA2-256
830,687 UART: [kat] SHA2-384
835,799 UART: [kat] SHA2-512-ACC
838,409 UART: [kat] ECC-384
4,095,306 UART: [kat] HMAC-384Kdf
4,105,713 UART: [kat] LMS
5,178,885 UART: [kat] --
5,183,272 UART: [cold-reset] ++
5,184,506 UART: [fht] FHT @ 0x50003400
5,195,631 UART: [idev] ++
5,196,315 UART: [idev] CDI.KEYID = 6
5,197,550 UART: [idev] SUBJECT.KEYID = 7
5,198,980 UART: [idev] UDS.KEYID = 0
5,215,223 UART: [idev] Erasing UDS.KEYID = 0
8,485,131 UART: [idev] Sha1 KeyId Algorithm
8,507,875 UART: [idev] --
8,511,116 UART: [ldev] ++
8,511,679 UART: [ldev] CDI.KEYID = 6
8,512,914 UART: [ldev] SUBJECT.KEYID = 5
8,514,346 UART: [ldev] AUTHORITY.KEYID = 7
8,515,840 UART: [ldev] FE.KEYID = 1
8,526,860 UART: [ldev] Erasing FE.KEYID = 1
11,816,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,232 UART: [ldev] --
14,184,543 UART: [fwproc] Wait for Commands...
14,187,719 UART: [fwproc] Recv command 0x46574c44
14,190,025 UART: [fwproc] Recv'd Img size: 113760 bytes
14,248,943 UART: ROM Fatal Error: 0x000B0003
14,252,352 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
6,201 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,076,072 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,265 UART:
192,632 UART: Running Caliptra ROM ...
193,817 UART:
193,994 UART: [state] CFI Enabled
264,182 UART: [state] LifecycleState = Manufacturing
266,105 UART: [state] DebugLocked = No
268,948 UART: [state] WD Timer not started. Device not locked for debugging
272,076 UART: [kat] SHA2-256
451,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,739 UART: [kat] ++
463,273 UART: [kat] sha1
474,319 UART: [kat] SHA2-256
477,350 UART: [kat] SHA2-384
484,004 UART: [kat] SHA2-512-ACC
486,949 UART: [kat] ECC-384
2,950,155 UART: [kat] HMAC-384Kdf
2,973,526 UART: [kat] LMS
3,503,000 UART: [kat] --
3,507,687 UART: [cold-reset] ++
3,509,975 UART: [fht] FHT @ 0x50003400
3,521,602 UART: [idev] ++
3,522,225 UART: [idev] CDI.KEYID = 6
3,523,153 UART: [idev] SUBJECT.KEYID = 7
3,524,316 UART: [idev] UDS.KEYID = 0
3,545,376 UART: [idev] Erasing UDS.KEYID = 0
6,027,739 UART: [idev] Sha1 KeyId Algorithm
6,051,045 UART: [idev] --
6,055,535 UART: [ldev] ++
6,056,115 UART: [ldev] CDI.KEYID = 6
6,057,185 UART: [ldev] SUBJECT.KEYID = 5
6,058,292 UART: [ldev] AUTHORITY.KEYID = 7
6,059,468 UART: [ldev] FE.KEYID = 1
6,102,419 UART: [ldev] Erasing FE.KEYID = 1
8,604,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,492 UART: [ldev] --
10,394,326 UART: [fwproc] Wait for Commands...
10,396,860 UART: [fwproc] Recv command 0x46574c44
10,398,968 UART: [fwproc] Recv'd Img size: 114084 bytes
10,460,476 UART: ROM Fatal Error: 0x000B0003
10,463,581 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
5,732 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,260,335 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
6,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,435 UART:
193,040 UART: Running Caliptra ROM ...
194,208 UART:
603,755 UART: [state] CFI Enabled
618,937 UART: [state] LifecycleState = Manufacturing
620,825 UART: [state] DebugLocked = No
623,439 UART: [state] WD Timer not started. Device not locked for debugging
626,349 UART: [kat] SHA2-256
805,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,047 UART: [kat] ++
817,585 UART: [kat] sha1
829,380 UART: [kat] SHA2-256
832,376 UART: [kat] SHA2-384
838,234 UART: [kat] SHA2-512-ACC
841,157 UART: [kat] ECC-384
3,285,475 UART: [kat] HMAC-384Kdf
3,297,120 UART: [kat] LMS
3,826,601 UART: [kat] --
3,831,775 UART: [cold-reset] ++
3,833,506 UART: [fht] FHT @ 0x50003400
3,845,128 UART: [idev] ++
3,845,696 UART: [idev] CDI.KEYID = 6
3,846,606 UART: [idev] SUBJECT.KEYID = 7
3,847,818 UART: [idev] UDS.KEYID = 0
3,864,337 UART: [idev] Erasing UDS.KEYID = 0
6,322,748 UART: [idev] Sha1 KeyId Algorithm
6,345,481 UART: [idev] --
6,348,172 UART: [ldev] ++
6,348,747 UART: [ldev] CDI.KEYID = 6
6,349,651 UART: [ldev] SUBJECT.KEYID = 5
6,350,810 UART: [ldev] AUTHORITY.KEYID = 7
6,352,094 UART: [ldev] FE.KEYID = 1
6,362,257 UART: [ldev] Erasing FE.KEYID = 1
8,834,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,962 UART: [ldev] --
10,624,954 UART: [fwproc] Wait for Commands...
10,626,559 UART: [fwproc] Recv command 0x46574c44
10,628,594 UART: [fwproc] Recv'd Img size: 114084 bytes
10,688,341 UART: ROM Fatal Error: 0x000B0003
10,691,477 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,454,168 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
5,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,118 UART:
192,501 UART: Running Caliptra ROM ...
193,687 UART:
193,849 UART: [state] CFI Enabled
264,037 UART: [state] LifecycleState = Manufacturing
265,918 UART: [state] DebugLocked = No
268,284 UART: [state] WD Timer not started. Device not locked for debugging
272,160 UART: [kat] SHA2-256
451,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,846 UART: [kat] ++
463,299 UART: [kat] sha1
473,797 UART: [kat] SHA2-256
476,807 UART: [kat] SHA2-384
481,975 UART: [kat] SHA2-512-ACC
484,965 UART: [kat] ECC-384
2,949,032 UART: [kat] HMAC-384Kdf
2,970,154 UART: [kat] LMS
3,499,638 UART: [kat] --
3,505,310 UART: [cold-reset] ++
3,507,087 UART: [fht] FHT @ 0x50003400
3,517,486 UART: [idev] ++
3,518,057 UART: [idev] CDI.KEYID = 6
3,518,979 UART: [idev] SUBJECT.KEYID = 7
3,520,188 UART: [idev] UDS.KEYID = 0
3,542,001 UART: [idev] Erasing UDS.KEYID = 0
6,025,568 UART: [idev] Sha1 KeyId Algorithm
6,048,381 UART: [idev] --
6,052,923 UART: [ldev] ++
6,053,536 UART: [ldev] CDI.KEYID = 6
6,054,452 UART: [ldev] SUBJECT.KEYID = 5
6,055,560 UART: [ldev] AUTHORITY.KEYID = 7
6,056,793 UART: [ldev] FE.KEYID = 1
6,098,008 UART: [ldev] Erasing FE.KEYID = 1
8,599,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,972 UART: [ldev] --
10,391,419 UART: [fwproc] Wait for Commands...
10,393,951 UART: [fwproc] Recv command 0x46574c44
10,396,048 UART: [fwproc] Recv'd Img size: 114084 bytes
10,460,386 UART: ROM Fatal Error: 0x000B0003
10,463,506 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
5,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,259,723 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
6,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,474 UART:
192,831 UART: Running Caliptra ROM ...
194,015 UART:
603,791 UART: [state] CFI Enabled
620,263 UART: [state] LifecycleState = Manufacturing
622,108 UART: [state] DebugLocked = No
624,204 UART: [state] WD Timer not started. Device not locked for debugging
627,488 UART: [kat] SHA2-256
806,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,160 UART: [kat] ++
818,605 UART: [kat] sha1
830,988 UART: [kat] SHA2-256
834,048 UART: [kat] SHA2-384
840,834 UART: [kat] SHA2-512-ACC
843,815 UART: [kat] ECC-384
3,285,592 UART: [kat] HMAC-384Kdf
3,299,083 UART: [kat] LMS
3,828,592 UART: [kat] --
3,833,201 UART: [cold-reset] ++
3,835,134 UART: [fht] FHT @ 0x50003400
3,845,506 UART: [idev] ++
3,846,078 UART: [idev] CDI.KEYID = 6
3,847,031 UART: [idev] SUBJECT.KEYID = 7
3,848,197 UART: [idev] UDS.KEYID = 0
3,864,653 UART: [idev] Erasing UDS.KEYID = 0
6,321,727 UART: [idev] Sha1 KeyId Algorithm
6,345,003 UART: [idev] --
6,347,597 UART: [ldev] ++
6,348,162 UART: [ldev] CDI.KEYID = 6
6,349,123 UART: [ldev] SUBJECT.KEYID = 5
6,350,280 UART: [ldev] AUTHORITY.KEYID = 7
6,351,506 UART: [ldev] FE.KEYID = 1
6,360,372 UART: [ldev] Erasing FE.KEYID = 1
8,832,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,789 UART: [ldev] --
10,625,028 UART: [fwproc] Wait for Commands...
10,626,852 UART: [fwproc] Recv command 0x46574c44
10,628,887 UART: [fwproc] Recv'd Img size: 114084 bytes
10,689,120 UART: ROM Fatal Error: 0x000B0003
10,692,212 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
6,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,460,778 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Manufacturing
85,585 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,216 UART: [kat] LMS
1,168,528 UART: [kat] --
1,169,451 UART: [cold-reset] ++
1,170,007 UART: [fht] FHT @ 0x50003400
1,172,595 UART: [idev] ++
1,172,763 UART: [idev] CDI.KEYID = 6
1,173,124 UART: [idev] SUBJECT.KEYID = 7
1,173,549 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,208,780 UART: [ldev] ++
1,208,948 UART: [ldev] CDI.KEYID = 6
1,209,312 UART: [ldev] SUBJECT.KEYID = 5
1,209,739 UART: [ldev] AUTHORITY.KEYID = 7
1,210,202 UART: [ldev] FE.KEYID = 1
1,215,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,016 UART: [fwproc] Wait for Commands...
1,281,663 UART: [fwproc] Recv command 0x46574c44
1,282,396 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,529 UART: ROM Fatal Error: 0x000B0003
1,303,686 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,335 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Manufacturing
86,184 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,182,120 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,897 UART: [ldev] --
1,281,177 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,956 UART: ROM Fatal Error: 0x000B0003
1,304,113 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,157,334 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Manufacturing
85,685 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,580 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,295 UART: [cold-reset] ++
1,169,813 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,282,169 UART: [fwproc] Recv command 0x46574c44
1,282,902 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,193 UART: ROM Fatal Error: 0x000B0003
1,304,350 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,173 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Manufacturing
85,944 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,281,891 UART: [fwproc] Wait for Commands...
1,282,652 UART: [fwproc] Recv command 0x46574c44
1,283,385 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,488 UART: ROM Fatal Error: 0x000B0003
1,304,645 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,712 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Manufacturing
85,815 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,684 UART: [kat] LMS
1,168,996 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,957 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,668 UART: [ldev] Erasing FE.KEYID = 1
1,242,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,184 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,299 UART: [fwproc] Recv command 0x46574c44
1,283,032 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,049 UART: ROM Fatal Error: 0x000B0003
1,304,206 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,369 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Manufacturing
85,850 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,718 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,200,034 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,129 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,838 UART: ROM Fatal Error: 0x000B0003
1,304,995 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,157,546 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,999 writing to cptra_bootfsm_go
6,768 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
193,144 UART:
193,530 UART: Running Caliptra ROM ...
194,714 UART:
194,864 UART: [state] CFI Enabled
265,164 UART: [state] LifecycleState = Unprovisioned
267,547 UART: [state] DebugLocked = No
270,067 UART: [state] WD Timer not started. Device not locked for debugging
275,151 UART: [kat] SHA2-256
457,107 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,603 UART: [kat] ++
469,114 UART: [kat] sha1
478,970 UART: [kat] SHA2-256
482,005 UART: [kat] SHA2-384
489,216 UART: [kat] SHA2-512-ACC
491,788 UART: [kat] ECC-384
3,777,028 UART: [kat] HMAC-384Kdf
3,802,303 UART: [kat] LMS
4,875,425 UART: [kat] --
4,878,580 UART: [cold-reset] ++
4,880,249 UART: [fht] FHT @ 0x50003400
4,892,483 UART: [idev] ++
4,893,175 UART: [idev] CDI.KEYID = 6
4,894,289 UART: [idev] SUBJECT.KEYID = 7
4,895,506 UART: [idev] UDS.KEYID = 0
4,931,659 UART: [idev] Erasing UDS.KEYID = 0
8,242,242 UART: [idev] Sha1 KeyId Algorithm
8,264,077 UART: [idev] --
8,268,884 UART: [ldev] ++
8,269,449 UART: [ldev] CDI.KEYID = 6
8,270,695 UART: [ldev] SUBJECT.KEYID = 5
8,271,854 UART: [ldev] AUTHORITY.KEYID = 7
8,273,084 UART: [ldev] FE.KEYID = 1
8,319,819 UART: [ldev] Erasing FE.KEYID = 1
11,651,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,336 UART: [ldev] --
14,016,108 UART: [fwproc] Wait for Commands...
14,019,131 UART: [fwproc] Recv command 0x46574c44
14,021,421 UART: [fwproc] Recv'd Img size: 113760 bytes
18,084,021 UART: ROM Fatal Error: 0x000B0016
18,087,497 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
5,274 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,936,075 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,272 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,382 UART:
192,787 UART: Running Caliptra ROM ...
193,934 UART:
603,663 UART: [state] CFI Enabled
614,593 UART: [state] LifecycleState = Unprovisioned
616,644 UART: [state] DebugLocked = No
617,880 UART: [state] WD Timer not started. Device not locked for debugging
622,732 UART: [kat] SHA2-256
804,745 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,251 UART: [kat] ++
816,750 UART: [kat] sha1
827,409 UART: [kat] SHA2-256
830,478 UART: [kat] SHA2-384
836,771 UART: [kat] SHA2-512-ACC
839,385 UART: [kat] ECC-384
4,093,352 UART: [kat] HMAC-384Kdf
4,103,751 UART: [kat] LMS
5,176,954 UART: [kat] --
5,179,638 UART: [cold-reset] ++
5,181,741 UART: [fht] FHT @ 0x50003400
5,192,186 UART: [idev] ++
5,192,866 UART: [idev] CDI.KEYID = 6
5,194,096 UART: [idev] SUBJECT.KEYID = 7
5,195,529 UART: [idev] UDS.KEYID = 0
5,210,423 UART: [idev] Erasing UDS.KEYID = 0
8,484,013 UART: [idev] Sha1 KeyId Algorithm
8,507,318 UART: [idev] --
8,509,960 UART: [ldev] ++
8,510,525 UART: [ldev] CDI.KEYID = 6
8,511,760 UART: [ldev] SUBJECT.KEYID = 5
8,513,193 UART: [ldev] AUTHORITY.KEYID = 7
8,514,752 UART: [ldev] FE.KEYID = 1
8,526,547 UART: [ldev] Erasing FE.KEYID = 1
11,819,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,759 UART: [ldev] --
14,186,862 UART: [fwproc] Wait for Commands...
14,188,479 UART: [fwproc] Recv command 0x46574c44
14,190,744 UART: [fwproc] Recv'd Img size: 113760 bytes
18,260,658 UART: ROM Fatal Error: 0x000B0016
18,264,127 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
6,108 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,075,223 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
5,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,076 UART:
192,505 UART: Running Caliptra ROM ...
193,626 UART:
193,769 UART: [state] CFI Enabled
264,636 UART: [state] LifecycleState = Unprovisioned
266,548 UART: [state] DebugLocked = No
268,309 UART: [state] WD Timer not started. Device not locked for debugging
272,580 UART: [kat] SHA2-256
451,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,286 UART: [kat] ++
463,818 UART: [kat] sha1
474,806 UART: [kat] SHA2-256
477,818 UART: [kat] SHA2-384
483,439 UART: [kat] SHA2-512-ACC
486,592 UART: [kat] ECC-384
2,948,123 UART: [kat] HMAC-384Kdf
2,971,658 UART: [kat] LMS
3,501,106 UART: [kat] --
3,506,245 UART: [cold-reset] ++
3,507,910 UART: [fht] FHT @ 0x50003400
3,518,401 UART: [idev] ++
3,518,965 UART: [idev] CDI.KEYID = 6
3,519,931 UART: [idev] SUBJECT.KEYID = 7
3,521,087 UART: [idev] UDS.KEYID = 0
3,543,075 UART: [idev] Erasing UDS.KEYID = 0
6,029,880 UART: [idev] Sha1 KeyId Algorithm
6,053,065 UART: [idev] --
6,057,175 UART: [ldev] ++
6,057,745 UART: [ldev] CDI.KEYID = 6
6,058,840 UART: [ldev] SUBJECT.KEYID = 5
6,059,961 UART: [ldev] AUTHORITY.KEYID = 7
6,061,140 UART: [ldev] FE.KEYID = 1
6,100,313 UART: [ldev] Erasing FE.KEYID = 1
8,605,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,918 UART: [ldev] --
10,414,418 UART: [fwproc] Wait for Commands...
10,416,591 UART: [fwproc] Recv command 0x46574c44
10,418,639 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,869 UART: ROM Fatal Error: 0x000B0016
13,812,958 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
5,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,588,933 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
6,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,450 UART:
192,829 UART: Running Caliptra ROM ...
194,018 UART:
603,618 UART: [state] CFI Enabled
618,847 UART: [state] LifecycleState = Unprovisioned
620,721 UART: [state] DebugLocked = No
623,286 UART: [state] WD Timer not started. Device not locked for debugging
627,757 UART: [kat] SHA2-256
806,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,440 UART: [kat] ++
818,980 UART: [kat] sha1
829,483 UART: [kat] SHA2-256
832,543 UART: [kat] SHA2-384
837,547 UART: [kat] SHA2-512-ACC
840,524 UART: [kat] ECC-384
3,280,998 UART: [kat] HMAC-384Kdf
3,292,480 UART: [kat] LMS
3,821,981 UART: [kat] --
3,826,404 UART: [cold-reset] ++
3,828,923 UART: [fht] FHT @ 0x50003400
3,840,703 UART: [idev] ++
3,841,268 UART: [idev] CDI.KEYID = 6
3,842,177 UART: [idev] SUBJECT.KEYID = 7
3,843,390 UART: [idev] UDS.KEYID = 0
3,858,984 UART: [idev] Erasing UDS.KEYID = 0
6,313,665 UART: [idev] Sha1 KeyId Algorithm
6,336,133 UART: [idev] --
6,341,092 UART: [ldev] ++
6,341,664 UART: [ldev] CDI.KEYID = 6
6,342,569 UART: [ldev] SUBJECT.KEYID = 5
6,343,730 UART: [ldev] AUTHORITY.KEYID = 7
6,345,014 UART: [ldev] FE.KEYID = 1
6,355,288 UART: [ldev] Erasing FE.KEYID = 1
8,827,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,621 UART: [ldev] --
10,620,061 UART: [fwproc] Wait for Commands...
10,623,180 UART: [fwproc] Recv command 0x46574c44
10,625,332 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,675 UART: ROM Fatal Error: 0x000B0016
14,026,801 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
6,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,810,790 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
5,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,191 UART:
192,558 UART: Running Caliptra ROM ...
193,740 UART:
193,893 UART: [state] CFI Enabled
260,471 UART: [state] LifecycleState = Unprovisioned
262,374 UART: [state] DebugLocked = No
264,940 UART: [state] WD Timer not started. Device not locked for debugging
268,236 UART: [kat] SHA2-256
447,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,914 UART: [kat] ++
459,443 UART: [kat] sha1
469,965 UART: [kat] SHA2-256
472,999 UART: [kat] SHA2-384
479,098 UART: [kat] SHA2-512-ACC
482,052 UART: [kat] ECC-384
2,928,005 UART: [kat] HMAC-384Kdf
2,952,228 UART: [kat] LMS
3,481,700 UART: [kat] --
3,486,036 UART: [cold-reset] ++
3,487,866 UART: [fht] FHT @ 0x50003400
3,499,329 UART: [idev] ++
3,499,902 UART: [idev] CDI.KEYID = 6
3,500,812 UART: [idev] SUBJECT.KEYID = 7
3,502,030 UART: [idev] UDS.KEYID = 0
3,523,966 UART: [idev] Erasing UDS.KEYID = 0
6,005,614 UART: [idev] Sha1 KeyId Algorithm
6,028,305 UART: [idev] --
6,032,920 UART: [ldev] ++
6,033,504 UART: [ldev] CDI.KEYID = 6
6,034,421 UART: [ldev] SUBJECT.KEYID = 5
6,035,585 UART: [ldev] AUTHORITY.KEYID = 7
6,036,821 UART: [ldev] FE.KEYID = 1
6,079,132 UART: [ldev] Erasing FE.KEYID = 1
8,581,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,090 UART: [ldev] --
10,373,468 UART: [fwproc] Wait for Commands...
10,375,036 UART: [fwproc] Recv command 0x46574c44
10,377,090 UART: [fwproc] Recv'd Img size: 114084 bytes
13,770,716 UART: ROM Fatal Error: 0x000B0016
13,773,816 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
5,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,595,067 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
6,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,591 UART:
192,979 UART: Running Caliptra ROM ...
194,177 UART:
603,550 UART: [state] CFI Enabled
615,052 UART: [state] LifecycleState = Unprovisioned
616,885 UART: [state] DebugLocked = No
619,771 UART: [state] WD Timer not started. Device not locked for debugging
623,823 UART: [kat] SHA2-256
802,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,519 UART: [kat] ++
815,087 UART: [kat] sha1
826,056 UART: [kat] SHA2-256
829,051 UART: [kat] SHA2-384
835,793 UART: [kat] SHA2-512-ACC
838,777 UART: [kat] ECC-384
3,278,326 UART: [kat] HMAC-384Kdf
3,291,687 UART: [kat] LMS
3,821,145 UART: [kat] --
3,825,351 UART: [cold-reset] ++
3,827,769 UART: [fht] FHT @ 0x50003400
3,839,066 UART: [idev] ++
3,839,628 UART: [idev] CDI.KEYID = 6
3,840,593 UART: [idev] SUBJECT.KEYID = 7
3,841,748 UART: [idev] UDS.KEYID = 0
3,858,372 UART: [idev] Erasing UDS.KEYID = 0
6,315,977 UART: [idev] Sha1 KeyId Algorithm
6,340,359 UART: [idev] --
6,345,708 UART: [ldev] ++
6,346,322 UART: [ldev] CDI.KEYID = 6
6,347,240 UART: [ldev] SUBJECT.KEYID = 5
6,348,345 UART: [ldev] AUTHORITY.KEYID = 7
6,349,573 UART: [ldev] FE.KEYID = 1
6,360,482 UART: [ldev] Erasing FE.KEYID = 1
8,831,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,717 UART: [ldev] --
10,620,436 UART: [fwproc] Wait for Commands...
10,623,177 UART: [fwproc] Recv command 0x46574c44
10,625,273 UART: [fwproc] Recv'd Img size: 114084 bytes
14,027,393 UART: ROM Fatal Error: 0x000B0016
14,030,527 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
6,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,810,821 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,270 UART: [kat] HMAC-384Kdf
919,860 UART: [kat] LMS
1,168,172 UART: [kat] --
1,168,863 UART: [cold-reset] ++
1,169,379 UART: [fht] FHT @ 0x50003400
1,172,237 UART: [idev] ++
1,172,405 UART: [idev] CDI.KEYID = 6
1,172,766 UART: [idev] SUBJECT.KEYID = 7
1,173,191 UART: [idev] UDS.KEYID = 0
1,180,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,214,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,096 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,289 UART: [fwproc] Recv command 0x46574c44
1,282,022 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,580 UART: ROM Fatal Error: 0x000B0016
2,576,737 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,382 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,822 UART: [idev] ++
1,173,990 UART: [idev] CDI.KEYID = 6
1,174,351 UART: [idev] SUBJECT.KEYID = 7
1,174,776 UART: [idev] UDS.KEYID = 0
1,182,700 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,213 UART: [ldev] --
1,282,671 UART: [fwproc] Wait for Commands...
1,283,464 UART: [fwproc] Recv command 0x46574c44
1,284,197 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,511 UART: ROM Fatal Error: 0x000B0016
2,578,668 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,427,433 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,887 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,103 UART: [idev] --
1,208,298 UART: [ldev] ++
1,208,466 UART: [ldev] CDI.KEYID = 6
1,208,830 UART: [ldev] SUBJECT.KEYID = 5
1,209,257 UART: [ldev] AUTHORITY.KEYID = 7
1,209,720 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,380 UART: [ldev] --
1,280,866 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,740 UART: ROM Fatal Error: 0x000B0016
2,577,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,028 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,768 UART: [kat] ++
895,920 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,691 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,199,370 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,881 UART: ROM Fatal Error: 0x000B0016
2,577,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,869 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,906 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,709 UART: [cold-reset] ++
1,171,195 UART: [fht] FHT @ 0x50003400
1,173,877 UART: [idev] ++
1,174,045 UART: [idev] CDI.KEYID = 6
1,174,406 UART: [idev] SUBJECT.KEYID = 7
1,174,831 UART: [idev] UDS.KEYID = 0
1,182,493 UART: [idev] Erasing UDS.KEYID = 0
1,199,305 UART: [idev] Sha1 KeyId Algorithm
1,208,065 UART: [idev] --
1,209,130 UART: [ldev] ++
1,209,298 UART: [ldev] CDI.KEYID = 6
1,209,662 UART: [ldev] SUBJECT.KEYID = 5
1,210,089 UART: [ldev] AUTHORITY.KEYID = 7
1,210,552 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,451 UART: [fwproc] Recv command 0x46574c44
1,283,184 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,424 UART: ROM Fatal Error: 0x000B0016
2,577,581 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,078 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,309 UART: [kat] LMS
1,169,621 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x46574c44
1,282,929 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,187 UART: ROM Fatal Error: 0x000B0016
2,577,344 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,449 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,021,018 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,728 UART:
2,165,124 UART: Running Caliptra ROM ...
2,166,290 UART:
2,166,465 UART: [state] CFI Enabled
2,167,445 UART: [state] LifecycleState = Unprovisioned
2,169,086 UART: [state] DebugLocked = No
2,170,192 UART: [state] WD Timer not started. Device not locked for debugging
2,172,671 UART: [kat] SHA2-256
2,173,339 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,345 UART: [kat] ++
2,176,798 UART: [kat] sha1
2,177,356 UART: [kat] SHA2-256
2,178,020 UART: [kat] SHA2-384
2,178,704 UART: [kat] SHA2-512-ACC
2,179,511 UART: [kat] ECC-384
3,775,849 UART: [kat] HMAC-384Kdf
3,801,677 UART: [kat] LMS
4,874,790 UART: [kat] --
4,880,821 UART: [cold-reset] ++
4,881,851 UART: [fht] FHT @ 0x50003400
4,892,155 UART: [idev] ++
4,892,829 UART: [idev] CDI.KEYID = 6
4,894,069 UART: [idev] SUBJECT.KEYID = 7
4,895,226 UART: [idev] UDS.KEYID = 0
4,928,430 UART: [idev] Erasing UDS.KEYID = 0
8,238,660 UART: [idev] Sha1 KeyId Algorithm
8,260,702 UART: [idev] --
8,265,728 UART: [ldev] ++
8,266,297 UART: [ldev] CDI.KEYID = 6
8,267,483 UART: [ldev] SUBJECT.KEYID = 5
8,268,638 UART: [ldev] AUTHORITY.KEYID = 7
8,269,868 UART: [ldev] FE.KEYID = 1
8,315,068 UART: [ldev] Erasing FE.KEYID = 1
11,654,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,733 UART: [ldev] --
14,035,834 UART: [fwproc] Wait for Commands...
14,037,771 UART: [fwproc] Recv command 0x46574c44
14,040,041 UART: [fwproc] Recv'd Img size: 113760 bytes
18,106,403 UART: ROM Fatal Error: 0x000B002B
18,109,773 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,020,887 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,881,692 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
2,027,134 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,170,683 UART:
2,171,068 UART: Running Caliptra ROM ...
2,172,248 UART:
2,172,413 UART: [state] CFI Enabled
2,173,370 UART: [state] LifecycleState = Unprovisioned
2,175,004 UART: [state] DebugLocked = No
2,176,108 UART: [state] WD Timer not started. Device not locked for debugging
2,178,590 UART: [kat] SHA2-256
2,179,255 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,260 UART: [kat] ++
2,182,704 UART: [kat] sha1
2,183,211 UART: [kat] SHA2-256
2,183,940 UART: [kat] SHA2-384
2,184,824 UART: [kat] SHA2-512-ACC
2,185,635 UART: [kat] ECC-384
4,099,999 UART: [kat] HMAC-384Kdf
4,111,936 UART: [kat] LMS
5,185,099 UART: [kat] --
5,191,355 UART: [cold-reset] ++
5,193,251 UART: [fht] FHT @ 0x50003400
5,203,202 UART: [idev] ++
5,203,938 UART: [idev] CDI.KEYID = 6
5,205,118 UART: [idev] SUBJECT.KEYID = 7
5,206,551 UART: [idev] UDS.KEYID = 0
5,224,147 UART: [idev] Erasing UDS.KEYID = 0
8,496,758 UART: [idev] Sha1 KeyId Algorithm
8,518,225 UART: [idev] --
8,521,988 UART: [ldev] ++
8,522,560 UART: [ldev] CDI.KEYID = 6
8,523,801 UART: [ldev] SUBJECT.KEYID = 5
8,525,242 UART: [ldev] AUTHORITY.KEYID = 7
8,526,807 UART: [ldev] FE.KEYID = 1
8,537,220 UART: [ldev] Erasing FE.KEYID = 1
11,829,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,909 UART: [ldev] --
14,195,804 UART: [fwproc] Wait for Commands...
14,198,171 UART: [fwproc] Recv command 0x46574c44
14,200,491 UART: [fwproc] Recv'd Img size: 113760 bytes
18,266,480 UART: ROM Fatal Error: 0x000B002B
18,269,892 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,025,105 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,103 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,033,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,177,916 UART:
2,178,438 UART: Running Caliptra ROM ...
2,179,532 UART:
2,179,695 UART: [state] CFI Enabled
2,180,640 UART: [state] LifecycleState = Unprovisioned
2,182,295 UART: [state] DebugLocked = No
2,183,406 UART: [state] WD Timer not started. Device not locked for debugging
2,185,887 UART: [kat] SHA2-256
2,186,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,582 UART: [kat] ++
2,190,033 UART: [kat] sha1
2,190,551 UART: [kat] SHA2-256
2,191,293 UART: [kat] SHA2-384
2,191,955 UART: [kat] SHA2-512-ACC
2,192,779 UART: [kat] ECC-384
2,948,815 UART: [kat] HMAC-384Kdf
2,974,164 UART: [kat] LMS
3,503,602 UART: [kat] --
3,507,917 UART: [cold-reset] ++
3,509,571 UART: [fht] FHT @ 0x50003400
3,520,230 UART: [idev] ++
3,520,796 UART: [idev] CDI.KEYID = 6
3,521,698 UART: [idev] SUBJECT.KEYID = 7
3,522,912 UART: [idev] UDS.KEYID = 0
3,544,826 UART: [idev] Erasing UDS.KEYID = 0
6,026,403 UART: [idev] Sha1 KeyId Algorithm
6,048,791 UART: [idev] --
6,052,664 UART: [ldev] ++
6,053,247 UART: [ldev] CDI.KEYID = 6
6,054,163 UART: [ldev] SUBJECT.KEYID = 5
6,055,331 UART: [ldev] AUTHORITY.KEYID = 7
6,056,586 UART: [ldev] FE.KEYID = 1
6,102,620 UART: [ldev] Erasing FE.KEYID = 1
8,609,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,586 UART: [ldev] --
10,416,923 UART: [fwproc] Wait for Commands...
10,418,754 UART: [fwproc] Recv command 0x46574c44
10,420,803 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,545 UART: ROM Fatal Error: 0x000B002B
13,822,698 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,027,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,578,516 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,022,990 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,308 UART:
2,167,698 UART: Running Caliptra ROM ...
2,168,779 UART:
2,168,932 UART: [state] CFI Enabled
2,169,844 UART: [state] LifecycleState = Unprovisioned
2,171,495 UART: [state] DebugLocked = No
2,172,525 UART: [state] WD Timer not started. Device not locked for debugging
2,175,222 UART: [kat] SHA2-256
2,175,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,912 UART: [kat] ++
2,179,360 UART: [kat] sha1
2,179,867 UART: [kat] SHA2-256
2,180,524 UART: [kat] SHA2-384
2,181,177 UART: [kat] SHA2-512-ACC
2,181,975 UART: [kat] ECC-384
3,282,582 UART: [kat] HMAC-384Kdf
3,294,793 UART: [kat] LMS
3,823,658 UART: [kat] --
3,828,788 UART: [cold-reset] ++
3,830,133 UART: [fht] FHT @ 0x50003400
3,842,140 UART: [idev] ++
3,842,698 UART: [idev] CDI.KEYID = 6
3,843,634 UART: [idev] SUBJECT.KEYID = 7
3,844,838 UART: [idev] UDS.KEYID = 0
3,861,165 UART: [idev] Erasing UDS.KEYID = 0
6,317,895 UART: [idev] Sha1 KeyId Algorithm
6,341,705 UART: [idev] --
6,346,106 UART: [ldev] ++
6,346,687 UART: [ldev] CDI.KEYID = 6
6,347,566 UART: [ldev] SUBJECT.KEYID = 5
6,348,775 UART: [ldev] AUTHORITY.KEYID = 7
6,350,060 UART: [ldev] FE.KEYID = 1
6,360,381 UART: [ldev] Erasing FE.KEYID = 1
8,836,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,869 UART: [ldev] --
10,624,886 UART: [fwproc] Wait for Commands...
10,627,468 UART: [fwproc] Recv command 0x46574c44
10,629,561 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,344 UART: ROM Fatal Error: 0x000B002B
14,034,476 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,212 writing to cptra_bootfsm_go
2,020,913 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,806,676 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,024,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,551 UART:
2,168,949 UART: Running Caliptra ROM ...
2,170,122 UART:
2,170,293 UART: [state] CFI Enabled
2,171,279 UART: [state] LifecycleState = Unprovisioned
2,172,928 UART: [state] DebugLocked = No
2,174,034 UART: [state] WD Timer not started. Device not locked for debugging
2,176,506 UART: [kat] SHA2-256
2,177,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,190 UART: [kat] ++
2,180,639 UART: [kat] sha1
2,181,197 UART: [kat] SHA2-256
2,181,858 UART: [kat] SHA2-384
2,182,536 UART: [kat] SHA2-512-ACC
2,183,427 UART: [kat] ECC-384
2,948,253 UART: [kat] HMAC-384Kdf
2,972,042 UART: [kat] LMS
3,501,527 UART: [kat] --
3,506,170 UART: [cold-reset] ++
3,507,021 UART: [fht] FHT @ 0x50003400
3,518,706 UART: [idev] ++
3,519,270 UART: [idev] CDI.KEYID = 6
3,520,229 UART: [idev] SUBJECT.KEYID = 7
3,521,443 UART: [idev] UDS.KEYID = 0
3,543,947 UART: [idev] Erasing UDS.KEYID = 0
6,024,611 UART: [idev] Sha1 KeyId Algorithm
6,048,068 UART: [idev] --
6,052,561 UART: [ldev] ++
6,053,134 UART: [ldev] CDI.KEYID = 6
6,054,066 UART: [ldev] SUBJECT.KEYID = 5
6,055,180 UART: [ldev] AUTHORITY.KEYID = 7
6,056,571 UART: [ldev] FE.KEYID = 1
6,099,664 UART: [ldev] Erasing FE.KEYID = 1
8,605,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,209 UART: [ldev] --
10,414,397 UART: [fwproc] Wait for Commands...
10,416,766 UART: [fwproc] Recv command 0x46574c44
10,418,865 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,646 UART: ROM Fatal Error: 0x000B002B
13,817,759 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,025,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,609,722 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,863 writing to cptra_bootfsm_go
2,024,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,019 UART:
2,169,423 UART: Running Caliptra ROM ...
2,170,590 UART:
2,170,771 UART: [state] CFI Enabled
2,171,740 UART: [state] LifecycleState = Unprovisioned
2,173,406 UART: [state] DebugLocked = No
2,174,441 UART: [state] WD Timer not started. Device not locked for debugging
2,176,907 UART: [kat] SHA2-256
2,177,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,580 UART: [kat] ++
2,181,033 UART: [kat] sha1
2,181,562 UART: [kat] SHA2-256
2,182,218 UART: [kat] SHA2-384
2,182,873 UART: [kat] SHA2-512-ACC
2,183,699 UART: [kat] ECC-384
3,280,066 UART: [kat] HMAC-384Kdf
3,293,505 UART: [kat] LMS
3,822,986 UART: [kat] --
3,825,192 UART: [cold-reset] ++
3,827,777 UART: [fht] FHT @ 0x50003400
3,838,156 UART: [idev] ++
3,838,738 UART: [idev] CDI.KEYID = 6
3,839,648 UART: [idev] SUBJECT.KEYID = 7
3,840,808 UART: [idev] UDS.KEYID = 0
3,855,007 UART: [idev] Erasing UDS.KEYID = 0
6,310,185 UART: [idev] Sha1 KeyId Algorithm
6,333,850 UART: [idev] --
6,337,546 UART: [ldev] ++
6,338,126 UART: [ldev] CDI.KEYID = 6
6,339,036 UART: [ldev] SUBJECT.KEYID = 5
6,340,250 UART: [ldev] AUTHORITY.KEYID = 7
6,341,475 UART: [ldev] FE.KEYID = 1
6,350,822 UART: [ldev] Erasing FE.KEYID = 1
8,827,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,365 UART: [ldev] --
10,618,088 UART: [fwproc] Wait for Commands...
10,620,503 UART: [fwproc] Recv command 0x46574c44
10,622,604 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,586 UART: ROM Fatal Error: 0x000B002B
14,024,717 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
2,020,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,811,634 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,278 UART: [ldev] Erasing FE.KEYID = 1
1,241,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,124 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,439 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,179 UART: ROM Fatal Error: 0x000B002B
2,577,338 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,535 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,182,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,922 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,825 UART: [ldev] Erasing FE.KEYID = 1
1,243,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,593 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,894 UART: ROM Fatal Error: 0x000B002B
2,579,053 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,412 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,347 UART: [cold-reset] ++
1,169,883 UART: [fht] FHT @ 0x50003400
1,172,569 UART: [idev] ++
1,172,737 UART: [idev] CDI.KEYID = 6
1,173,098 UART: [idev] SUBJECT.KEYID = 7
1,173,523 UART: [idev] UDS.KEYID = 0
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,880 UART: [ldev] Erasing FE.KEYID = 1
1,242,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,432 UART: [ldev] --
1,281,926 UART: [fwproc] Wait for Commands...
1,282,699 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,833 UART: ROM Fatal Error: 0x000B002B
2,577,992 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,851 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,660 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,227 UART: [ldev] SUBJECT.KEYID = 5
1,210,654 UART: [ldev] AUTHORITY.KEYID = 7
1,211,117 UART: [ldev] FE.KEYID = 1
1,216,331 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,281,985 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,120 UART: ROM Fatal Error: 0x000B002B
2,578,279 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,834 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,590 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,763 UART: [fht] FHT @ 0x50003400
1,173,519 UART: [idev] ++
1,173,687 UART: [idev] CDI.KEYID = 6
1,174,048 UART: [idev] SUBJECT.KEYID = 7
1,174,473 UART: [idev] UDS.KEYID = 0
1,182,459 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,197 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,684 UART: [ldev] --
1,282,170 UART: [fwproc] Wait for Commands...
1,282,861 UART: [fwproc] Recv command 0x46574c44
1,283,594 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,007 UART: ROM Fatal Error: 0x000B002B
2,578,166 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,427,477 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,198,976 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,841 UART: [ldev] ++
1,209,009 UART: [ldev] CDI.KEYID = 6
1,209,373 UART: [ldev] SUBJECT.KEYID = 5
1,209,800 UART: [ldev] AUTHORITY.KEYID = 7
1,210,263 UART: [ldev] FE.KEYID = 1
1,215,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,027 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,696 UART: ROM Fatal Error: 0x000B002B
2,576,855 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,396 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,020,701 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,480 UART:
2,164,881 UART: Running Caliptra ROM ...
2,166,052 UART:
2,166,233 UART: [state] CFI Enabled
2,167,202 UART: [state] LifecycleState = Unprovisioned
2,168,846 UART: [state] DebugLocked = No
2,169,951 UART: [state] WD Timer not started. Device not locked for debugging
2,172,432 UART: [kat] SHA2-256
2,173,101 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,110 UART: [kat] ++
2,176,563 UART: [kat] sha1
2,177,078 UART: [kat] SHA2-256
2,177,841 UART: [kat] SHA2-384
2,178,511 UART: [kat] SHA2-512-ACC
2,179,396 UART: [kat] ECC-384
3,775,566 UART: [kat] HMAC-384Kdf
3,795,600 UART: [kat] LMS
4,868,759 UART: [kat] --
4,875,425 UART: [cold-reset] ++
4,877,750 UART: [fht] FHT @ 0x50003400
4,888,893 UART: [idev] ++
4,889,563 UART: [idev] CDI.KEYID = 6
4,890,724 UART: [idev] SUBJECT.KEYID = 7
4,891,940 UART: [idev] UDS.KEYID = 0
4,923,549 UART: [idev] Erasing UDS.KEYID = 0
8,237,360 UART: [idev] Sha1 KeyId Algorithm
8,258,344 UART: [idev] --
8,261,422 UART: [ldev] ++
8,262,012 UART: [ldev] CDI.KEYID = 6
8,263,204 UART: [ldev] SUBJECT.KEYID = 5
8,264,360 UART: [ldev] AUTHORITY.KEYID = 7
8,265,592 UART: [ldev] FE.KEYID = 1
8,310,620 UART: [ldev] Erasing FE.KEYID = 1
11,644,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,959,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,991,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,007,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,028,593 UART: [ldev] --
14,033,151 UART: [fwproc] Wait for Commands...
14,034,660 UART: [fwproc] Recv command 0x46574c44
14,036,598 UART: [fwproc] Recv'd Img size: 113760 bytes
18,105,576 UART: ROM Fatal Error: 0x000B002A
18,109,001 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,019,955 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,861,049 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,021,197 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,720 UART:
2,165,114 UART: Running Caliptra ROM ...
2,166,191 UART:
2,166,338 UART: [state] CFI Enabled
2,167,301 UART: [state] LifecycleState = Unprovisioned
2,168,940 UART: [state] DebugLocked = No
2,169,957 UART: [state] WD Timer not started. Device not locked for debugging
2,172,440 UART: [kat] SHA2-256
2,173,105 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,109 UART: [kat] ++
2,176,555 UART: [kat] sha1
2,177,059 UART: [kat] SHA2-256
2,177,795 UART: [kat] SHA2-384
2,178,457 UART: [kat] SHA2-512-ACC
2,179,352 UART: [kat] ECC-384
4,099,369 UART: [kat] HMAC-384Kdf
4,111,722 UART: [kat] LMS
5,184,869 UART: [kat] --
5,187,896 UART: [cold-reset] ++
5,189,886 UART: [fht] FHT @ 0x50003400
5,199,870 UART: [idev] ++
5,200,553 UART: [idev] CDI.KEYID = 6
5,201,731 UART: [idev] SUBJECT.KEYID = 7
5,203,221 UART: [idev] UDS.KEYID = 0
5,222,594 UART: [idev] Erasing UDS.KEYID = 0
8,497,578 UART: [idev] Sha1 KeyId Algorithm
8,520,489 UART: [idev] --
8,524,054 UART: [ldev] ++
8,524,678 UART: [ldev] CDI.KEYID = 6
8,525,856 UART: [ldev] SUBJECT.KEYID = 5
8,527,364 UART: [ldev] AUTHORITY.KEYID = 7
8,528,869 UART: [ldev] FE.KEYID = 1
8,540,325 UART: [ldev] Erasing FE.KEYID = 1
11,827,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,627 UART: [ldev] --
14,189,970 UART: [fwproc] Wait for Commands...
14,192,334 UART: [fwproc] Recv command 0x46574c44
14,194,603 UART: [fwproc] Recv'd Img size: 113760 bytes
18,262,468 UART: ROM Fatal Error: 0x000B002A
18,265,878 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
2,028,333 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,073,982 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
2,023,282 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,525 UART:
2,167,927 UART: Running Caliptra ROM ...
2,169,097 UART:
2,169,270 UART: [state] CFI Enabled
2,170,239 UART: [state] LifecycleState = Unprovisioned
2,171,879 UART: [state] DebugLocked = No
2,173,011 UART: [state] WD Timer not started. Device not locked for debugging
2,175,492 UART: [kat] SHA2-256
2,176,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,165 UART: [kat] ++
2,179,616 UART: [kat] sha1
2,180,214 UART: [kat] SHA2-256
2,180,879 UART: [kat] SHA2-384
2,181,535 UART: [kat] SHA2-512-ACC
2,182,413 UART: [kat] ECC-384
2,946,693 UART: [kat] HMAC-384Kdf
2,971,171 UART: [kat] LMS
3,500,635 UART: [kat] --
3,503,598 UART: [cold-reset] ++
3,505,156 UART: [fht] FHT @ 0x50003400
3,517,437 UART: [idev] ++
3,518,008 UART: [idev] CDI.KEYID = 6
3,518,955 UART: [idev] SUBJECT.KEYID = 7
3,520,124 UART: [idev] UDS.KEYID = 0
3,542,887 UART: [idev] Erasing UDS.KEYID = 0
6,028,894 UART: [idev] Sha1 KeyId Algorithm
6,052,053 UART: [idev] --
6,055,383 UART: [ldev] ++
6,055,966 UART: [ldev] CDI.KEYID = 6
6,056,885 UART: [ldev] SUBJECT.KEYID = 5
6,058,054 UART: [ldev] AUTHORITY.KEYID = 7
6,059,295 UART: [ldev] FE.KEYID = 1
6,098,295 UART: [ldev] Erasing FE.KEYID = 1
8,601,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,727 UART: [ldev] --
10,412,755 UART: [fwproc] Wait for Commands...
10,414,647 UART: [fwproc] Recv command 0x46574c44
10,416,748 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,231 UART: ROM Fatal Error: 0x000B002A
13,819,372 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,024,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,633,405 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,022,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,778 UART:
2,167,187 UART: Running Caliptra ROM ...
2,168,355 UART:
2,168,527 UART: [state] CFI Enabled
2,169,500 UART: [state] LifecycleState = Unprovisioned
2,171,151 UART: [state] DebugLocked = No
2,172,260 UART: [state] WD Timer not started. Device not locked for debugging
2,174,729 UART: [kat] SHA2-256
2,175,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,428 UART: [kat] ++
2,178,880 UART: [kat] sha1
2,179,393 UART: [kat] SHA2-256
2,180,137 UART: [kat] SHA2-384
2,180,807 UART: [kat] SHA2-512-ACC
2,181,688 UART: [kat] ECC-384
3,286,588 UART: [kat] HMAC-384Kdf
3,299,091 UART: [kat] LMS
3,828,601 UART: [kat] --
3,833,074 UART: [cold-reset] ++
3,835,011 UART: [fht] FHT @ 0x50003400
3,845,396 UART: [idev] ++
3,845,969 UART: [idev] CDI.KEYID = 6
3,847,031 UART: [idev] SUBJECT.KEYID = 7
3,848,136 UART: [idev] UDS.KEYID = 0
3,860,784 UART: [idev] Erasing UDS.KEYID = 0
6,318,799 UART: [idev] Sha1 KeyId Algorithm
6,341,064 UART: [idev] --
6,345,166 UART: [ldev] ++
6,345,732 UART: [ldev] CDI.KEYID = 6
6,346,639 UART: [ldev] SUBJECT.KEYID = 5
6,347,853 UART: [ldev] AUTHORITY.KEYID = 7
6,349,081 UART: [ldev] FE.KEYID = 1
6,360,216 UART: [ldev] Erasing FE.KEYID = 1
8,835,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,347 UART: [ldev] --
10,626,429 UART: [fwproc] Wait for Commands...
10,629,130 UART: [fwproc] Recv command 0x46574c44
10,631,248 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,771 UART: ROM Fatal Error: 0x000B002A
14,026,925 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
2,021,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,802,611 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,021,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,789 UART:
2,166,195 UART: Running Caliptra ROM ...
2,167,272 UART:
2,167,426 UART: [state] CFI Enabled
2,168,412 UART: [state] LifecycleState = Unprovisioned
2,170,084 UART: [state] DebugLocked = No
2,171,147 UART: [state] WD Timer not started. Device not locked for debugging
2,173,616 UART: [kat] SHA2-256
2,174,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,300 UART: [kat] ++
2,177,753 UART: [kat] sha1
2,178,264 UART: [kat] SHA2-256
2,179,004 UART: [kat] SHA2-384
2,179,674 UART: [kat] SHA2-512-ACC
2,180,498 UART: [kat] ECC-384
2,948,831 UART: [kat] HMAC-384Kdf
2,972,181 UART: [kat] LMS
3,501,652 UART: [kat] --
3,505,916 UART: [cold-reset] ++
3,506,815 UART: [fht] FHT @ 0x50003400
3,519,167 UART: [idev] ++
3,519,763 UART: [idev] CDI.KEYID = 6
3,520,679 UART: [idev] SUBJECT.KEYID = 7
3,521,895 UART: [idev] UDS.KEYID = 0
3,545,595 UART: [idev] Erasing UDS.KEYID = 0
6,025,568 UART: [idev] Sha1 KeyId Algorithm
6,049,611 UART: [idev] --
6,053,855 UART: [ldev] ++
6,054,436 UART: [ldev] CDI.KEYID = 6
6,055,321 UART: [ldev] SUBJECT.KEYID = 5
6,056,542 UART: [ldev] AUTHORITY.KEYID = 7
6,057,782 UART: [ldev] FE.KEYID = 1
6,101,084 UART: [ldev] Erasing FE.KEYID = 1
8,603,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,847 UART: [ldev] --
10,416,329 UART: [fwproc] Wait for Commands...
10,417,781 UART: [fwproc] Recv command 0x46574c44
10,419,881 UART: [fwproc] Recv'd Img size: 114084 bytes
13,811,118 UART: ROM Fatal Error: 0x000B002A
13,814,250 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,023,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,634,543 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
2,022,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,780 UART:
2,167,191 UART: Running Caliptra ROM ...
2,168,363 UART:
2,168,535 UART: [state] CFI Enabled
2,169,510 UART: [state] LifecycleState = Unprovisioned
2,171,151 UART: [state] DebugLocked = No
2,172,255 UART: [state] WD Timer not started. Device not locked for debugging
2,174,723 UART: [kat] SHA2-256
2,175,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,400 UART: [kat] ++
2,178,853 UART: [kat] sha1
2,179,365 UART: [kat] SHA2-256
2,180,103 UART: [kat] SHA2-384
2,180,766 UART: [kat] SHA2-512-ACC
2,181,609 UART: [kat] ECC-384
3,280,468 UART: [kat] HMAC-384Kdf
3,292,971 UART: [kat] LMS
3,822,494 UART: [kat] --
3,827,583 UART: [cold-reset] ++
3,830,075 UART: [fht] FHT @ 0x50003400
3,841,137 UART: [idev] ++
3,841,712 UART: [idev] CDI.KEYID = 6
3,842,730 UART: [idev] SUBJECT.KEYID = 7
3,843,829 UART: [idev] UDS.KEYID = 0
3,861,375 UART: [idev] Erasing UDS.KEYID = 0
6,318,672 UART: [idev] Sha1 KeyId Algorithm
6,341,518 UART: [idev] --
6,344,424 UART: [ldev] ++
6,344,988 UART: [ldev] CDI.KEYID = 6
6,346,000 UART: [ldev] SUBJECT.KEYID = 5
6,347,106 UART: [ldev] AUTHORITY.KEYID = 7
6,348,332 UART: [ldev] FE.KEYID = 1
6,358,811 UART: [ldev] Erasing FE.KEYID = 1
8,830,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,210 UART: [ldev] --
10,621,493 UART: [fwproc] Wait for Commands...
10,624,391 UART: [fwproc] Recv command 0x46574c44
10,626,486 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,139 UART: ROM Fatal Error: 0x000B002A
14,027,232 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
2,021,740 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,808,890 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,935 UART: [idev] ++
1,173,103 UART: [idev] CDI.KEYID = 6
1,173,464 UART: [idev] SUBJECT.KEYID = 7
1,173,889 UART: [idev] UDS.KEYID = 0
1,181,759 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,498 UART: [ldev] ++
1,208,666 UART: [ldev] CDI.KEYID = 6
1,209,030 UART: [ldev] SUBJECT.KEYID = 5
1,209,457 UART: [ldev] AUTHORITY.KEYID = 7
1,209,920 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,241,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,614 UART: [ldev] --
1,280,884 UART: [fwproc] Wait for Commands...
1,281,695 UART: [fwproc] Recv command 0x46574c44
1,282,428 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,709 UART: ROM Fatal Error: 0x000B002A
2,576,868 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,295 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,747 UART: [kat] LMS
1,170,059 UART: [kat] --
1,170,910 UART: [cold-reset] ++
1,171,336 UART: [fht] FHT @ 0x50003400
1,173,908 UART: [idev] ++
1,174,076 UART: [idev] CDI.KEYID = 6
1,174,437 UART: [idev] SUBJECT.KEYID = 7
1,174,862 UART: [idev] UDS.KEYID = 0
1,182,874 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,654 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,283,048 UART: [fwproc] Recv command 0x46574c44
1,283,781 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,090 UART: ROM Fatal Error: 0x000B002A
2,579,249 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,212 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,401 UART: [kat] SHA2-256
901,341 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,420 UART: [kat] HMAC-384Kdf
919,968 UART: [kat] LMS
1,168,280 UART: [kat] --
1,169,313 UART: [cold-reset] ++
1,169,739 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,181,343 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,139 UART: ROM Fatal Error: 0x000B002A
2,577,298 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,067 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,444 UART: [idev] ++
1,173,612 UART: [idev] CDI.KEYID = 6
1,173,973 UART: [idev] SUBJECT.KEYID = 7
1,174,398 UART: [idev] UDS.KEYID = 0
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,851 UART: [ldev] Erasing FE.KEYID = 1
1,242,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,191 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,788 UART: ROM Fatal Error: 0x000B002A
2,577,947 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,886 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,280 UART: [kat] SHA2-512-ACC
906,181 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,457 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,371 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,310 UART: [ldev] ++
1,209,478 UART: [ldev] CDI.KEYID = 6
1,209,842 UART: [ldev] SUBJECT.KEYID = 5
1,210,269 UART: [ldev] AUTHORITY.KEYID = 7
1,210,732 UART: [ldev] FE.KEYID = 1
1,215,662 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,026 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,101 UART: [fwproc] Recv command 0x46574c44
1,282,834 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,855 UART: ROM Fatal Error: 0x000B002A
2,578,014 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,263 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,222 UART: [state] WD Timer not started. Device not locked for debugging
87,539 UART: [kat] SHA2-256
891,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,157 UART: [kat] LMS
1,168,469 UART: [kat] --
1,169,356 UART: [cold-reset] ++
1,169,702 UART: [fht] FHT @ 0x50003400
1,172,228 UART: [idev] ++
1,172,396 UART: [idev] CDI.KEYID = 6
1,172,757 UART: [idev] SUBJECT.KEYID = 7
1,173,182 UART: [idev] UDS.KEYID = 0
1,181,558 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,241,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,381 UART: [ldev] --
1,280,747 UART: [fwproc] Wait for Commands...
1,281,380 UART: [fwproc] Recv command 0x46574c44
1,282,113 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,486 UART: ROM Fatal Error: 0x000B002A
2,575,645 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,608 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,020,808 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,331 UART:
2,164,716 UART: Running Caliptra ROM ...
2,165,794 UART:
2,165,952 UART: [state] CFI Enabled
2,166,914 UART: [state] LifecycleState = Unprovisioned
2,168,551 UART: [state] DebugLocked = No
2,169,653 UART: [state] WD Timer not started. Device not locked for debugging
2,172,135 UART: [kat] SHA2-256
2,172,804 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,813 UART: [kat] ++
2,176,260 UART: [kat] sha1
2,176,990 UART: [kat] SHA2-256
2,177,662 UART: [kat] SHA2-384
2,178,318 UART: [kat] SHA2-512-ACC
2,179,155 UART: [kat] ECC-384
3,773,870 UART: [kat] HMAC-384Kdf
3,793,472 UART: [kat] LMS
4,866,591 UART: [kat] --
4,871,959 UART: [cold-reset] ++
4,874,225 UART: [fht] FHT @ 0x50003400
4,886,285 UART: [idev] ++
4,887,022 UART: [idev] CDI.KEYID = 6
4,888,212 UART: [idev] SUBJECT.KEYID = 7
4,889,370 UART: [idev] UDS.KEYID = 0
4,920,794 UART: [idev] Erasing UDS.KEYID = 0
8,236,075 UART: [idev] Sha1 KeyId Algorithm
8,258,760 UART: [idev] --
8,263,830 UART: [ldev] ++
8,264,405 UART: [ldev] CDI.KEYID = 6
8,265,523 UART: [ldev] SUBJECT.KEYID = 5
8,266,790 UART: [ldev] AUTHORITY.KEYID = 7
8,268,021 UART: [ldev] FE.KEYID = 1
8,309,622 UART: [ldev] Erasing FE.KEYID = 1
11,644,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,969,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,985,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,001,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,022,429 UART: [ldev] --
14,027,379 UART: [fwproc] Wait for Commands...
14,030,131 UART: [fwproc] Recv command 0x46574c44
14,032,460 UART: [fwproc] Recv'd Img size: 113760 bytes
18,105,900 UART: ROM Fatal Error: 0x000B002A
18,109,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,019,870 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,907,291 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
2,028,650 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,172,409 UART:
2,172,803 UART: Running Caliptra ROM ...
2,173,921 UART:
2,174,083 UART: [state] CFI Enabled
2,175,055 UART: [state] LifecycleState = Unprovisioned
2,176,699 UART: [state] DebugLocked = No
2,177,726 UART: [state] WD Timer not started. Device not locked for debugging
2,180,196 UART: [kat] SHA2-256
2,180,857 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,866 UART: [kat] ++
2,184,309 UART: [kat] sha1
2,184,810 UART: [kat] SHA2-256
2,185,462 UART: [kat] SHA2-384
2,186,115 UART: [kat] SHA2-512-ACC
2,186,908 UART: [kat] ECC-384
4,094,710 UART: [kat] HMAC-384Kdf
4,105,725 UART: [kat] LMS
5,178,913 UART: [kat] --
5,182,525 UART: [cold-reset] ++
5,183,993 UART: [fht] FHT @ 0x50003400
5,195,134 UART: [idev] ++
5,195,867 UART: [idev] CDI.KEYID = 6
5,197,047 UART: [idev] SUBJECT.KEYID = 7
5,198,484 UART: [idev] UDS.KEYID = 0
5,214,409 UART: [idev] Erasing UDS.KEYID = 0
8,488,231 UART: [idev] Sha1 KeyId Algorithm
8,510,448 UART: [idev] --
8,515,359 UART: [ldev] ++
8,515,922 UART: [ldev] CDI.KEYID = 6
8,517,090 UART: [ldev] SUBJECT.KEYID = 5
8,518,577 UART: [ldev] AUTHORITY.KEYID = 7
8,520,092 UART: [ldev] FE.KEYID = 1
8,531,936 UART: [ldev] Erasing FE.KEYID = 1
11,820,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,481 UART: [ldev] --
14,185,417 UART: [fwproc] Wait for Commands...
14,187,031 UART: [fwproc] Recv command 0x46574c44
14,189,303 UART: [fwproc] Recv'd Img size: 113760 bytes
18,252,553 UART: ROM Fatal Error: 0x000B002A
18,255,968 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,020,438 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,075,178 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,021,912 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,178 UART:
2,166,580 UART: Running Caliptra ROM ...
2,167,757 UART:
2,167,928 UART: [state] CFI Enabled
2,168,861 UART: [state] LifecycleState = Unprovisioned
2,170,508 UART: [state] DebugLocked = No
2,171,541 UART: [state] WD Timer not started. Device not locked for debugging
2,174,012 UART: [kat] SHA2-256
2,174,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,689 UART: [kat] ++
2,178,141 UART: [kat] sha1
2,178,649 UART: [kat] SHA2-256
2,179,300 UART: [kat] SHA2-384
2,179,954 UART: [kat] SHA2-512-ACC
2,180,780 UART: [kat] ECC-384
2,948,890 UART: [kat] HMAC-384Kdf
2,972,352 UART: [kat] LMS
3,501,824 UART: [kat] --
3,505,493 UART: [cold-reset] ++
3,507,099 UART: [fht] FHT @ 0x50003400
3,517,444 UART: [idev] ++
3,518,008 UART: [idev] CDI.KEYID = 6
3,518,893 UART: [idev] SUBJECT.KEYID = 7
3,520,105 UART: [idev] UDS.KEYID = 0
3,543,930 UART: [idev] Erasing UDS.KEYID = 0
6,028,379 UART: [idev] Sha1 KeyId Algorithm
6,052,695 UART: [idev] --
6,056,563 UART: [ldev] ++
6,057,149 UART: [ldev] CDI.KEYID = 6
6,058,060 UART: [ldev] SUBJECT.KEYID = 5
6,059,226 UART: [ldev] AUTHORITY.KEYID = 7
6,060,481 UART: [ldev] FE.KEYID = 1
6,100,351 UART: [ldev] Erasing FE.KEYID = 1
8,606,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,051 UART: [ldev] --
10,413,952 UART: [fwproc] Wait for Commands...
10,416,859 UART: [fwproc] Recv command 0x46574c44
10,418,899 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,659 UART: ROM Fatal Error: 0x000B002A
13,813,725 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,023,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,566,029 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,021,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,288 UART:
2,165,690 UART: Running Caliptra ROM ...
2,166,853 UART:
2,167,030 UART: [state] CFI Enabled
2,168,006 UART: [state] LifecycleState = Unprovisioned
2,169,650 UART: [state] DebugLocked = No
2,170,754 UART: [state] WD Timer not started. Device not locked for debugging
2,173,243 UART: [kat] SHA2-256
2,173,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,917 UART: [kat] ++
2,177,383 UART: [kat] sha1
2,177,894 UART: [kat] SHA2-256
2,178,632 UART: [kat] SHA2-384
2,179,295 UART: [kat] SHA2-512-ACC
2,180,174 UART: [kat] ECC-384
3,278,374 UART: [kat] HMAC-384Kdf
3,290,479 UART: [kat] LMS
3,820,001 UART: [kat] --
3,825,403 UART: [cold-reset] ++
3,827,923 UART: [fht] FHT @ 0x50003400
3,840,137 UART: [idev] ++
3,840,695 UART: [idev] CDI.KEYID = 6
3,841,627 UART: [idev] SUBJECT.KEYID = 7
3,842,801 UART: [idev] UDS.KEYID = 0
3,861,361 UART: [idev] Erasing UDS.KEYID = 0
6,320,617 UART: [idev] Sha1 KeyId Algorithm
6,344,441 UART: [idev] --
6,347,894 UART: [ldev] ++
6,348,463 UART: [ldev] CDI.KEYID = 6
6,349,344 UART: [ldev] SUBJECT.KEYID = 5
6,350,553 UART: [ldev] AUTHORITY.KEYID = 7
6,351,786 UART: [ldev] FE.KEYID = 1
6,362,890 UART: [ldev] Erasing FE.KEYID = 1
8,832,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,958 UART: [ldev] --
10,624,464 UART: [fwproc] Wait for Commands...
10,626,503 UART: [fwproc] Recv command 0x46574c44
10,628,600 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,573 UART: ROM Fatal Error: 0x000B002A
14,027,709 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
2,020,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,824,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,034,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,178,296 UART:
2,178,700 UART: Running Caliptra ROM ...
2,179,849 UART:
2,180,017 UART: [state] CFI Enabled
2,180,904 UART: [state] LifecycleState = Unprovisioned
2,182,549 UART: [state] DebugLocked = No
2,183,602 UART: [state] WD Timer not started. Device not locked for debugging
2,186,079 UART: [kat] SHA2-256
2,186,750 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,768 UART: [kat] ++
2,190,221 UART: [kat] sha1
2,190,732 UART: [kat] SHA2-256
2,191,411 UART: [kat] SHA2-384
2,192,068 UART: [kat] SHA2-512-ACC
2,192,870 UART: [kat] ECC-384
2,948,741 UART: [kat] HMAC-384Kdf
2,971,561 UART: [kat] LMS
3,500,991 UART: [kat] --
3,504,680 UART: [cold-reset] ++
3,506,349 UART: [fht] FHT @ 0x50003400
3,516,797 UART: [idev] ++
3,517,396 UART: [idev] CDI.KEYID = 6
3,518,311 UART: [idev] SUBJECT.KEYID = 7
3,519,475 UART: [idev] UDS.KEYID = 0
3,544,900 UART: [idev] Erasing UDS.KEYID = 0
6,025,443 UART: [idev] Sha1 KeyId Algorithm
6,048,466 UART: [idev] --
6,052,357 UART: [ldev] ++
6,052,928 UART: [ldev] CDI.KEYID = 6
6,053,836 UART: [ldev] SUBJECT.KEYID = 5
6,054,996 UART: [ldev] AUTHORITY.KEYID = 7
6,056,284 UART: [ldev] FE.KEYID = 1
6,099,985 UART: [ldev] Erasing FE.KEYID = 1
8,599,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,473 UART: [ldev] --
10,392,139 UART: [fwproc] Wait for Commands...
10,393,799 UART: [fwproc] Recv command 0x46574c44
10,395,904 UART: [fwproc] Recv'd Img size: 114084 bytes
13,788,142 UART: ROM Fatal Error: 0x000B002A
13,791,275 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,021,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,635,605 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
2,021,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,993 UART:
2,166,384 UART: Running Caliptra ROM ...
2,167,556 UART:
2,167,720 UART: [state] CFI Enabled
2,168,690 UART: [state] LifecycleState = Unprovisioned
2,170,330 UART: [state] DebugLocked = No
2,171,435 UART: [state] WD Timer not started. Device not locked for debugging
2,173,900 UART: [kat] SHA2-256
2,174,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,573 UART: [kat] ++
2,178,023 UART: [kat] sha1
2,178,539 UART: [kat] SHA2-256
2,179,278 UART: [kat] SHA2-384
2,179,940 UART: [kat] SHA2-512-ACC
2,180,781 UART: [kat] ECC-384
3,281,711 UART: [kat] HMAC-384Kdf
3,293,145 UART: [kat] LMS
3,822,667 UART: [kat] --
3,827,194 UART: [cold-reset] ++
3,828,040 UART: [fht] FHT @ 0x50003400
3,837,990 UART: [idev] ++
3,838,556 UART: [idev] CDI.KEYID = 6
3,839,462 UART: [idev] SUBJECT.KEYID = 7
3,840,674 UART: [idev] UDS.KEYID = 0
3,856,215 UART: [idev] Erasing UDS.KEYID = 0
6,313,549 UART: [idev] Sha1 KeyId Algorithm
6,336,662 UART: [idev] --
6,341,621 UART: [ldev] ++
6,342,187 UART: [ldev] CDI.KEYID = 6
6,343,091 UART: [ldev] SUBJECT.KEYID = 5
6,344,253 UART: [ldev] AUTHORITY.KEYID = 7
6,345,535 UART: [ldev] FE.KEYID = 1
6,353,666 UART: [ldev] Erasing FE.KEYID = 1
8,825,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,146 UART: [ldev] --
10,617,145 UART: [fwproc] Wait for Commands...
10,619,988 UART: [fwproc] Recv command 0x46574c44
10,622,095 UART: [fwproc] Recv'd Img size: 114084 bytes
14,020,231 UART: ROM Fatal Error: 0x000B002A
14,023,322 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
2,021,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,804,756 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,069 UART: [kat] ++
895,221 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,317 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,822 UART: [ldev] Erasing FE.KEYID = 1
1,240,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,946 UART: [ldev] --
1,279,416 UART: [fwproc] Wait for Commands...
1,280,085 UART: [fwproc] Recv command 0x46574c44
1,280,818 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,031 UART: ROM Fatal Error: 0x000B002A
2,577,190 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,073 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,929 UART: [kat] HMAC-384Kdf
921,439 UART: [kat] LMS
1,169,751 UART: [kat] --
1,170,764 UART: [cold-reset] ++
1,171,306 UART: [fht] FHT @ 0x50003400
1,174,068 UART: [idev] ++
1,174,236 UART: [idev] CDI.KEYID = 6
1,174,597 UART: [idev] SUBJECT.KEYID = 7
1,175,022 UART: [idev] UDS.KEYID = 0
1,183,170 UART: [idev] Erasing UDS.KEYID = 0
1,200,382 UART: [idev] Sha1 KeyId Algorithm
1,209,178 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,817 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,393 UART: [fwproc] Wait for Commands...
1,283,138 UART: [fwproc] Recv command 0x46574c44
1,283,871 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,728 UART: ROM Fatal Error: 0x000B002A
2,578,887 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,682 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,335 UART: [kat] SHA2-256
902,275 UART: [kat] SHA2-384
905,170 UART: [kat] SHA2-512-ACC
907,071 UART: [kat] ECC-384
916,726 UART: [kat] HMAC-384Kdf
921,336 UART: [kat] LMS
1,169,648 UART: [kat] --
1,170,657 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,891 UART: [idev] ++
1,174,059 UART: [idev] CDI.KEYID = 6
1,174,420 UART: [idev] SUBJECT.KEYID = 7
1,174,845 UART: [idev] UDS.KEYID = 0
1,183,193 UART: [idev] Erasing UDS.KEYID = 0
1,199,629 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,750 UART: [ldev] ++
1,209,918 UART: [ldev] CDI.KEYID = 6
1,210,282 UART: [ldev] SUBJECT.KEYID = 5
1,210,709 UART: [ldev] AUTHORITY.KEYID = 7
1,211,172 UART: [ldev] FE.KEYID = 1
1,216,276 UART: [ldev] Erasing FE.KEYID = 1
1,242,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,948 UART: [ldev] --
1,281,224 UART: [fwproc] Wait for Commands...
1,281,859 UART: [fwproc] Recv command 0x46574c44
1,282,592 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,255 UART: ROM Fatal Error: 0x000B002A
2,578,414 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,975 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
890,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,374 UART: [kat] SHA2-256
901,314 UART: [kat] SHA2-384
903,909 UART: [kat] SHA2-512-ACC
905,810 UART: [kat] ECC-384
915,149 UART: [kat] HMAC-384Kdf
919,721 UART: [kat] LMS
1,168,033 UART: [kat] --
1,168,572 UART: [cold-reset] ++
1,169,034 UART: [fht] FHT @ 0x50003400
1,171,630 UART: [idev] ++
1,171,798 UART: [idev] CDI.KEYID = 6
1,172,159 UART: [idev] SUBJECT.KEYID = 7
1,172,584 UART: [idev] UDS.KEYID = 0
1,180,716 UART: [idev] Erasing UDS.KEYID = 0
1,197,820 UART: [idev] Sha1 KeyId Algorithm
1,206,700 UART: [idev] --
1,207,789 UART: [ldev] ++
1,207,957 UART: [ldev] CDI.KEYID = 6
1,208,321 UART: [ldev] SUBJECT.KEYID = 5
1,208,748 UART: [ldev] AUTHORITY.KEYID = 7
1,209,211 UART: [ldev] FE.KEYID = 1
1,214,405 UART: [ldev] Erasing FE.KEYID = 1
1,240,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,109 UART: [ldev] --
1,280,529 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,154 UART: ROM Fatal Error: 0x000B002A
2,577,313 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,592 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
903,958 UART: [kat] SHA2-512-ACC
905,859 UART: [kat] ECC-384
915,578 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,573 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,389 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,224 UART: [ldev] ++
1,208,392 UART: [ldev] CDI.KEYID = 6
1,208,756 UART: [ldev] SUBJECT.KEYID = 5
1,209,183 UART: [ldev] AUTHORITY.KEYID = 7
1,209,646 UART: [ldev] FE.KEYID = 1
1,214,914 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,168 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,177 UART: ROM Fatal Error: 0x000B002A
2,576,336 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,023 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,808 UART: [idev] ++
1,172,976 UART: [idev] CDI.KEYID = 6
1,173,337 UART: [idev] SUBJECT.KEYID = 7
1,173,762 UART: [idev] UDS.KEYID = 0
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,198,964 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,283 UART: [ldev] --
1,281,715 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,752 UART: ROM Fatal Error: 0x000B002A
2,578,911 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,068 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,020,317 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,031 UART:
2,164,444 UART: Running Caliptra ROM ...
2,165,609 UART:
2,165,780 UART: [state] CFI Enabled
2,166,736 UART: [state] LifecycleState = Unprovisioned
2,168,367 UART: [state] DebugLocked = No
2,169,470 UART: [state] WD Timer not started. Device not locked for debugging
2,171,949 UART: [kat] SHA2-256
2,172,617 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,646 UART: [kat] ++
2,176,098 UART: [kat] sha1
2,176,620 UART: [kat] SHA2-256
2,177,356 UART: [kat] SHA2-384
2,178,023 UART: [kat] SHA2-512-ACC
2,178,906 UART: [kat] ECC-384
3,774,903 UART: [kat] HMAC-384Kdf
3,802,755 UART: [kat] LMS
4,875,959 UART: [kat] --
4,882,300 UART: [cold-reset] ++
4,883,980 UART: [fht] FHT @ 0x50003400
4,894,542 UART: [idev] ++
4,895,217 UART: [idev] CDI.KEYID = 6
4,896,456 UART: [idev] SUBJECT.KEYID = 7
4,897,626 UART: [idev] UDS.KEYID = 0
4,929,207 UART: [idev] Erasing UDS.KEYID = 0
8,242,342 UART: [idev] Sha1 KeyId Algorithm
8,265,730 UART: [idev] --
8,271,082 UART: [ldev] ++
8,271,655 UART: [ldev] CDI.KEYID = 6
8,272,861 UART: [ldev] SUBJECT.KEYID = 5
8,274,073 UART: [ldev] AUTHORITY.KEYID = 7
8,275,248 UART: [ldev] FE.KEYID = 1
8,317,818 UART: [ldev] Erasing FE.KEYID = 1
11,656,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,138 UART: [ldev] --
14,040,186 UART: [fwproc] Wait for Commands...
14,043,146 UART: [fwproc] Recv command 0x46574c44
14,045,495 UART: [fwproc] Recv'd Img size: 113760 bytes
18,106,591 UART: ROM Fatal Error: 0x000B0028
18,110,050 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,019,086 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,858,157 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,021,106 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,803 UART:
2,166,222 UART: Running Caliptra ROM ...
2,167,394 UART:
2,167,574 UART: [state] CFI Enabled
2,168,544 UART: [state] LifecycleState = Unprovisioned
2,170,183 UART: [state] DebugLocked = No
2,171,286 UART: [state] WD Timer not started. Device not locked for debugging
2,173,767 UART: [kat] SHA2-256
2,174,429 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,430 UART: [kat] ++
2,177,894 UART: [kat] sha1
2,178,488 UART: [kat] SHA2-256
2,179,147 UART: [kat] SHA2-384
2,179,828 UART: [kat] SHA2-512-ACC
2,180,704 UART: [kat] ECC-384
4,096,313 UART: [kat] HMAC-384Kdf
4,107,954 UART: [kat] LMS
5,181,097 UART: [kat] --
5,187,495 UART: [cold-reset] ++
5,189,866 UART: [fht] FHT @ 0x50003400
5,200,790 UART: [idev] ++
5,201,457 UART: [idev] CDI.KEYID = 6
5,202,690 UART: [idev] SUBJECT.KEYID = 7
5,204,120 UART: [idev] UDS.KEYID = 0
5,221,529 UART: [idev] Erasing UDS.KEYID = 0
8,497,381 UART: [idev] Sha1 KeyId Algorithm
8,518,587 UART: [idev] --
8,522,911 UART: [ldev] ++
8,523,477 UART: [ldev] CDI.KEYID = 6
8,524,726 UART: [ldev] SUBJECT.KEYID = 5
8,526,175 UART: [ldev] AUTHORITY.KEYID = 7
8,527,657 UART: [ldev] FE.KEYID = 1
8,537,822 UART: [ldev] Erasing FE.KEYID = 1
11,826,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,930 UART: [ldev] --
14,192,970 UART: [fwproc] Wait for Commands...
14,195,709 UART: [fwproc] Recv command 0x46574c44
14,198,027 UART: [fwproc] Recv'd Img size: 113760 bytes
18,267,868 UART: ROM Fatal Error: 0x000B0028
18,271,344 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,021,911 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,305 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,021,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,967 UART:
2,166,435 UART: Running Caliptra ROM ...
2,167,552 UART:
2,167,715 UART: [state] CFI Enabled
2,168,652 UART: [state] LifecycleState = Unprovisioned
2,170,308 UART: [state] DebugLocked = No
2,171,423 UART: [state] WD Timer not started. Device not locked for debugging
2,173,906 UART: [kat] SHA2-256
2,174,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,590 UART: [kat] ++
2,178,061 UART: [kat] sha1
2,178,582 UART: [kat] SHA2-256
2,179,325 UART: [kat] SHA2-384
2,179,989 UART: [kat] SHA2-512-ACC
2,180,794 UART: [kat] ECC-384
2,946,816 UART: [kat] HMAC-384Kdf
2,973,930 UART: [kat] LMS
3,503,381 UART: [kat] --
3,507,597 UART: [cold-reset] ++
3,509,332 UART: [fht] FHT @ 0x50003400
3,520,803 UART: [idev] ++
3,521,365 UART: [idev] CDI.KEYID = 6
3,522,275 UART: [idev] SUBJECT.KEYID = 7
3,523,497 UART: [idev] UDS.KEYID = 0
3,546,227 UART: [idev] Erasing UDS.KEYID = 0
6,030,106 UART: [idev] Sha1 KeyId Algorithm
6,052,594 UART: [idev] --
6,056,769 UART: [ldev] ++
6,057,347 UART: [ldev] CDI.KEYID = 6
6,058,259 UART: [ldev] SUBJECT.KEYID = 5
6,059,481 UART: [ldev] AUTHORITY.KEYID = 7
6,060,719 UART: [ldev] FE.KEYID = 1
6,102,652 UART: [ldev] Erasing FE.KEYID = 1
8,607,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,057 UART: [ldev] --
10,416,307 UART: [fwproc] Wait for Commands...
10,418,676 UART: [fwproc] Recv command 0x46574c44
10,420,778 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,948 UART: ROM Fatal Error: 0x000B0028
13,826,042 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,035,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,574,727 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,025,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,170,091 UART:
2,170,515 UART: Running Caliptra ROM ...
2,171,679 UART:
2,171,844 UART: [state] CFI Enabled
2,172,771 UART: [state] LifecycleState = Unprovisioned
2,174,406 UART: [state] DebugLocked = No
2,175,433 UART: [state] WD Timer not started. Device not locked for debugging
2,177,897 UART: [kat] SHA2-256
2,178,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,584 UART: [kat] ++
2,182,032 UART: [kat] sha1
2,182,546 UART: [kat] SHA2-256
2,183,204 UART: [kat] SHA2-384
2,183,860 UART: [kat] SHA2-512-ACC
2,184,657 UART: [kat] ECC-384
3,279,818 UART: [kat] HMAC-384Kdf
3,292,204 UART: [kat] LMS
3,821,686 UART: [kat] --
3,827,375 UART: [cold-reset] ++
3,829,045 UART: [fht] FHT @ 0x50003400
3,839,862 UART: [idev] ++
3,840,432 UART: [idev] CDI.KEYID = 6
3,841,396 UART: [idev] SUBJECT.KEYID = 7
3,842,552 UART: [idev] UDS.KEYID = 0
3,861,949 UART: [idev] Erasing UDS.KEYID = 0
6,318,436 UART: [idev] Sha1 KeyId Algorithm
6,341,662 UART: [idev] --
6,345,548 UART: [ldev] ++
6,346,116 UART: [ldev] CDI.KEYID = 6
6,347,019 UART: [ldev] SUBJECT.KEYID = 5
6,348,180 UART: [ldev] AUTHORITY.KEYID = 7
6,349,462 UART: [ldev] FE.KEYID = 1
6,358,334 UART: [ldev] Erasing FE.KEYID = 1
8,832,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,256 UART: [ldev] --
10,621,766 UART: [fwproc] Wait for Commands...
10,623,989 UART: [fwproc] Recv command 0x46574c44
10,626,032 UART: [fwproc] Recv'd Img size: 114084 bytes
14,025,160 UART: ROM Fatal Error: 0x000B0028
14,028,292 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,524 writing to cptra_bootfsm_go
2,021,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,808,925 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,022,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,981 UART:
2,167,384 UART: Running Caliptra ROM ...
2,168,561 UART:
2,168,734 UART: [state] CFI Enabled
2,169,725 UART: [state] LifecycleState = Unprovisioned
2,171,372 UART: [state] DebugLocked = No
2,172,480 UART: [state] WD Timer not started. Device not locked for debugging
2,174,948 UART: [kat] SHA2-256
2,175,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,635 UART: [kat] ++
2,179,087 UART: [kat] sha1
2,179,603 UART: [kat] SHA2-256
2,180,346 UART: [kat] SHA2-384
2,181,013 UART: [kat] SHA2-512-ACC
2,181,862 UART: [kat] ECC-384
2,945,474 UART: [kat] HMAC-384Kdf
2,972,130 UART: [kat] LMS
3,501,560 UART: [kat] --
3,506,612 UART: [cold-reset] ++
3,508,005 UART: [fht] FHT @ 0x50003400
3,518,368 UART: [idev] ++
3,518,935 UART: [idev] CDI.KEYID = 6
3,519,874 UART: [idev] SUBJECT.KEYID = 7
3,521,091 UART: [idev] UDS.KEYID = 0
3,543,260 UART: [idev] Erasing UDS.KEYID = 0
6,024,734 UART: [idev] Sha1 KeyId Algorithm
6,046,725 UART: [idev] --
6,051,684 UART: [ldev] ++
6,052,287 UART: [ldev] CDI.KEYID = 6
6,053,203 UART: [ldev] SUBJECT.KEYID = 5
6,054,315 UART: [ldev] AUTHORITY.KEYID = 7
6,055,606 UART: [ldev] FE.KEYID = 1
6,099,418 UART: [ldev] Erasing FE.KEYID = 1
8,603,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,772 UART: [ldev] --
10,411,581 UART: [fwproc] Wait for Commands...
10,414,704 UART: [fwproc] Recv command 0x46574c44
10,416,748 UART: [fwproc] Recv'd Img size: 114084 bytes
13,808,243 UART: ROM Fatal Error: 0x000B0028
13,811,354 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,021,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,585,204 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,023,092 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,517 UART:
2,167,919 UART: Running Caliptra ROM ...
2,169,093 UART:
2,169,275 UART: [state] CFI Enabled
2,170,249 UART: [state] LifecycleState = Unprovisioned
2,171,889 UART: [state] DebugLocked = No
2,172,990 UART: [state] WD Timer not started. Device not locked for debugging
2,175,459 UART: [kat] SHA2-256
2,176,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,131 UART: [kat] ++
2,179,577 UART: [kat] sha1
2,180,087 UART: [kat] SHA2-256
2,180,786 UART: [kat] SHA2-384
2,181,531 UART: [kat] SHA2-512-ACC
2,182,342 UART: [kat] ECC-384
3,281,746 UART: [kat] HMAC-384Kdf
3,293,174 UART: [kat] LMS
3,822,639 UART: [kat] --
3,826,089 UART: [cold-reset] ++
3,827,319 UART: [fht] FHT @ 0x50003400
3,839,188 UART: [idev] ++
3,839,748 UART: [idev] CDI.KEYID = 6
3,840,627 UART: [idev] SUBJECT.KEYID = 7
3,841,833 UART: [idev] UDS.KEYID = 0
3,860,182 UART: [idev] Erasing UDS.KEYID = 0
6,318,048 UART: [idev] Sha1 KeyId Algorithm
6,340,306 UART: [idev] --
6,345,214 UART: [ldev] ++
6,345,783 UART: [ldev] CDI.KEYID = 6
6,346,667 UART: [ldev] SUBJECT.KEYID = 5
6,347,877 UART: [ldev] AUTHORITY.KEYID = 7
6,349,131 UART: [ldev] FE.KEYID = 1
6,359,351 UART: [ldev] Erasing FE.KEYID = 1
8,832,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,858 UART: [ldev] --
10,623,210 UART: [fwproc] Wait for Commands...
10,626,172 UART: [fwproc] Recv command 0x46574c44
10,628,271 UART: [fwproc] Recv'd Img size: 114084 bytes
14,013,650 UART: ROM Fatal Error: 0x000B0028
14,016,791 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,020,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,815,765 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,221 UART: [kat] SHA2-256
901,161 UART: [kat] SHA2-384
903,832 UART: [kat] SHA2-512-ACC
905,733 UART: [kat] ECC-384
915,074 UART: [kat] HMAC-384Kdf
919,692 UART: [kat] LMS
1,168,004 UART: [kat] --
1,168,881 UART: [cold-reset] ++
1,169,321 UART: [fht] FHT @ 0x50003400
1,171,943 UART: [idev] ++
1,172,111 UART: [idev] CDI.KEYID = 6
1,172,472 UART: [idev] SUBJECT.KEYID = 7
1,172,897 UART: [idev] UDS.KEYID = 0
1,180,571 UART: [idev] Erasing UDS.KEYID = 0
1,197,901 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,778 UART: [ldev] ++
1,207,946 UART: [ldev] CDI.KEYID = 6
1,208,310 UART: [ldev] SUBJECT.KEYID = 5
1,208,737 UART: [ldev] AUTHORITY.KEYID = 7
1,209,200 UART: [ldev] FE.KEYID = 1
1,214,532 UART: [ldev] Erasing FE.KEYID = 1
1,239,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,600 UART: [ldev] --
1,278,874 UART: [fwproc] Wait for Commands...
1,279,557 UART: [fwproc] Recv command 0x46574c44
1,280,290 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,788 UART: ROM Fatal Error: 0x000B0028
2,575,945 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,312 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,919 UART: [state] LifecycleState = Unprovisioned
86,574 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,097 UART: [kat] LMS
1,169,409 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,534 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,121 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x46574c44
1,283,453 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,819 UART: ROM Fatal Error: 0x000B0028
2,577,976 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,259 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,968 UART: [kat] SHA2-512-ACC
906,869 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,558 UART: [ldev] ++
1,209,726 UART: [ldev] CDI.KEYID = 6
1,210,090 UART: [ldev] SUBJECT.KEYID = 5
1,210,517 UART: [ldev] AUTHORITY.KEYID = 7
1,210,980 UART: [ldev] FE.KEYID = 1
1,215,998 UART: [ldev] Erasing FE.KEYID = 1
1,242,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,515 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,864 UART: ROM Fatal Error: 0x000B0028
2,578,021 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,054 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,632 UART: [idev] Sha1 KeyId Algorithm
1,208,630 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,225 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,728 UART: [fwproc] Recv command 0x46574c44
1,283,461 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,107 UART: ROM Fatal Error: 0x000B0028
2,578,264 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,087 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,181,621 UART: [idev] Erasing UDS.KEYID = 0
1,199,201 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,668 UART: [ldev] Erasing FE.KEYID = 1
1,241,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,414 UART: [fwproc] Wait for Commands...
1,281,001 UART: [fwproc] Recv command 0x46574c44
1,281,734 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,266 UART: ROM Fatal Error: 0x000B0028
2,576,423 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,846 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,365 UART: [kat] LMS
1,169,677 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,212 UART: [fht] FHT @ 0x50003400
1,173,960 UART: [idev] ++
1,174,128 UART: [idev] CDI.KEYID = 6
1,174,489 UART: [idev] SUBJECT.KEYID = 7
1,174,914 UART: [idev] UDS.KEYID = 0
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,678 UART: [fwproc] Recv command 0x46574c44
1,283,411 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,287 UART: ROM Fatal Error: 0x000B0028
2,577,444 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,399 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,020,740 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,578 UART:
2,164,985 UART: Running Caliptra ROM ...
2,166,158 UART:
2,166,325 UART: [state] CFI Enabled
2,167,285 UART: [state] LifecycleState = Unprovisioned
2,168,925 UART: [state] DebugLocked = No
2,170,031 UART: [state] WD Timer not started. Device not locked for debugging
2,172,518 UART: [kat] SHA2-256
2,173,185 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,199 UART: [kat] ++
2,176,650 UART: [kat] sha1
2,177,165 UART: [kat] SHA2-256
2,177,925 UART: [kat] SHA2-384
2,178,592 UART: [kat] SHA2-512-ACC
2,179,470 UART: [kat] ECC-384
3,779,486 UART: [kat] HMAC-384Kdf
3,805,612 UART: [kat] LMS
4,878,781 UART: [kat] --
4,883,856 UART: [cold-reset] ++
4,884,930 UART: [fht] FHT @ 0x50003400
4,895,596 UART: [idev] ++
4,896,272 UART: [idev] CDI.KEYID = 6
4,897,439 UART: [idev] SUBJECT.KEYID = 7
4,898,652 UART: [idev] UDS.KEYID = 0
4,932,268 UART: [idev] Erasing UDS.KEYID = 0
8,243,481 UART: [idev] Sha1 KeyId Algorithm
8,265,365 UART: [idev] --
8,269,738 UART: [ldev] ++
8,270,321 UART: [ldev] CDI.KEYID = 6
8,271,511 UART: [ldev] SUBJECT.KEYID = 5
8,272,667 UART: [ldev] AUTHORITY.KEYID = 7
8,273,892 UART: [ldev] FE.KEYID = 1
8,319,885 UART: [ldev] Erasing FE.KEYID = 1
11,655,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,666 UART: [ldev] --
14,040,646 UART: [fwproc] Wait for Commands...
14,043,760 UART: [fwproc] Recv command 0x46574c44
14,046,039 UART: [fwproc] Recv'd Img size: 113760 bytes
18,111,880 UART: ROM Fatal Error: 0x000B0028
18,115,302 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,019,487 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,916,046 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,021,214 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,105 UART:
2,165,509 UART: Running Caliptra ROM ...
2,166,676 UART:
2,166,864 UART: [state] CFI Enabled
2,167,832 UART: [state] LifecycleState = Unprovisioned
2,170,209 UART: [state] DebugLocked = No
2,171,331 UART: [state] WD Timer not started. Device not locked for debugging
2,173,808 UART: [kat] SHA2-256
2,174,473 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,481 UART: [kat] ++
2,177,929 UART: [kat] sha1
2,178,436 UART: [kat] SHA2-256
2,179,171 UART: [kat] SHA2-384
2,179,829 UART: [kat] SHA2-512-ACC
2,180,702 UART: [kat] ECC-384
4,094,125 UART: [kat] HMAC-384Kdf
4,105,262 UART: [kat] LMS
5,178,394 UART: [kat] --
5,183,549 UART: [cold-reset] ++
5,186,318 UART: [fht] FHT @ 0x50003400
5,197,241 UART: [idev] ++
5,197,919 UART: [idev] CDI.KEYID = 6
5,199,153 UART: [idev] SUBJECT.KEYID = 7
5,200,584 UART: [idev] UDS.KEYID = 0
5,217,651 UART: [idev] Erasing UDS.KEYID = 0
8,493,872 UART: [idev] Sha1 KeyId Algorithm
8,517,056 UART: [idev] --
8,521,219 UART: [ldev] ++
8,521,839 UART: [ldev] CDI.KEYID = 6
8,523,019 UART: [ldev] SUBJECT.KEYID = 5
8,524,511 UART: [ldev] AUTHORITY.KEYID = 7
8,526,067 UART: [ldev] FE.KEYID = 1
8,538,229 UART: [ldev] Erasing FE.KEYID = 1
11,829,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,715 UART: [ldev] --
14,192,503 UART: [fwproc] Wait for Commands...
14,194,766 UART: [fwproc] Recv command 0x46574c44
14,197,087 UART: [fwproc] Recv'd Img size: 113760 bytes
18,261,126 UART: ROM Fatal Error: 0x000B0028
18,264,579 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,021,467 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,082,769 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,022,246 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,062 UART:
2,167,474 UART: Running Caliptra ROM ...
2,168,605 UART:
2,168,771 UART: [state] CFI Enabled
2,169,677 UART: [state] LifecycleState = Unprovisioned
2,171,321 UART: [state] DebugLocked = No
2,172,442 UART: [state] WD Timer not started. Device not locked for debugging
2,174,914 UART: [kat] SHA2-256
2,175,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,593 UART: [kat] ++
2,179,040 UART: [kat] sha1
2,179,641 UART: [kat] SHA2-256
2,180,306 UART: [kat] SHA2-384
2,180,982 UART: [kat] SHA2-512-ACC
2,181,869 UART: [kat] ECC-384
2,946,343 UART: [kat] HMAC-384Kdf
2,971,832 UART: [kat] LMS
3,501,335 UART: [kat] --
3,504,547 UART: [cold-reset] ++
3,506,209 UART: [fht] FHT @ 0x50003400
3,516,818 UART: [idev] ++
3,517,430 UART: [idev] CDI.KEYID = 6
3,518,346 UART: [idev] SUBJECT.KEYID = 7
3,519,510 UART: [idev] UDS.KEYID = 0
3,543,698 UART: [idev] Erasing UDS.KEYID = 0
6,024,126 UART: [idev] Sha1 KeyId Algorithm
6,047,313 UART: [idev] --
6,051,201 UART: [ldev] ++
6,051,777 UART: [ldev] CDI.KEYID = 6
6,052,708 UART: [ldev] SUBJECT.KEYID = 5
6,053,874 UART: [ldev] AUTHORITY.KEYID = 7
6,055,107 UART: [ldev] FE.KEYID = 1
6,099,894 UART: [ldev] Erasing FE.KEYID = 1
8,602,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,434 UART: [ldev] --
10,416,604 UART: [fwproc] Wait for Commands...
10,418,547 UART: [fwproc] Recv command 0x46574c44
10,420,647 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,055 UART: ROM Fatal Error: 0x000B0028
13,823,143 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,020,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,622,296 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,021,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,132 UART:
2,166,532 UART: Running Caliptra ROM ...
2,167,703 UART:
2,167,877 UART: [state] CFI Enabled
2,168,851 UART: [state] LifecycleState = Unprovisioned
2,170,488 UART: [state] DebugLocked = No
2,171,589 UART: [state] WD Timer not started. Device not locked for debugging
2,174,051 UART: [kat] SHA2-256
2,174,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,739 UART: [kat] ++
2,178,245 UART: [kat] sha1
2,178,756 UART: [kat] SHA2-256
2,179,636 UART: [kat] SHA2-384
2,180,304 UART: [kat] SHA2-512-ACC
2,181,106 UART: [kat] ECC-384
3,284,056 UART: [kat] HMAC-384Kdf
3,296,400 UART: [kat] LMS
3,825,880 UART: [kat] --
3,828,734 UART: [cold-reset] ++
3,830,508 UART: [fht] FHT @ 0x50003400
3,840,462 UART: [idev] ++
3,841,075 UART: [idev] CDI.KEYID = 6
3,842,003 UART: [idev] SUBJECT.KEYID = 7
3,843,170 UART: [idev] UDS.KEYID = 0
3,858,201 UART: [idev] Erasing UDS.KEYID = 0
6,315,172 UART: [idev] Sha1 KeyId Algorithm
6,339,502 UART: [idev] --
6,342,959 UART: [ldev] ++
6,343,547 UART: [ldev] CDI.KEYID = 6
6,344,452 UART: [ldev] SUBJECT.KEYID = 5
6,345,664 UART: [ldev] AUTHORITY.KEYID = 7
6,346,888 UART: [ldev] FE.KEYID = 1
6,359,583 UART: [ldev] Erasing FE.KEYID = 1
8,832,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,088 UART: [ldev] --
10,620,513 UART: [fwproc] Wait for Commands...
10,623,419 UART: [fwproc] Recv command 0x46574c44
10,625,460 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,774 UART: ROM Fatal Error: 0x000B0028
14,026,908 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,021,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,807,704 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,030,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,174,962 UART:
2,175,368 UART: Running Caliptra ROM ...
2,176,541 UART:
2,176,718 UART: [state] CFI Enabled
2,177,691 UART: [state] LifecycleState = Unprovisioned
2,179,363 UART: [state] DebugLocked = No
2,180,477 UART: [state] WD Timer not started. Device not locked for debugging
2,182,950 UART: [kat] SHA2-256
2,183,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,629 UART: [kat] ++
2,187,081 UART: [kat] sha1
2,187,598 UART: [kat] SHA2-256
2,188,340 UART: [kat] SHA2-384
2,189,007 UART: [kat] SHA2-512-ACC
2,189,816 UART: [kat] ECC-384
2,948,833 UART: [kat] HMAC-384Kdf
2,971,644 UART: [kat] LMS
3,501,059 UART: [kat] --
3,505,519 UART: [cold-reset] ++
3,508,109 UART: [fht] FHT @ 0x50003400
3,518,803 UART: [idev] ++
3,519,394 UART: [idev] CDI.KEYID = 6
3,520,313 UART: [idev] SUBJECT.KEYID = 7
3,521,471 UART: [idev] UDS.KEYID = 0
3,543,062 UART: [idev] Erasing UDS.KEYID = 0
6,030,101 UART: [idev] Sha1 KeyId Algorithm
6,053,890 UART: [idev] --
6,058,757 UART: [ldev] ++
6,059,331 UART: [ldev] CDI.KEYID = 6
6,060,216 UART: [ldev] SUBJECT.KEYID = 5
6,061,434 UART: [ldev] AUTHORITY.KEYID = 7
6,062,671 UART: [ldev] FE.KEYID = 1
6,100,512 UART: [ldev] Erasing FE.KEYID = 1
8,601,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,846 UART: [ldev] --
10,392,064 UART: [fwproc] Wait for Commands...
10,394,581 UART: [fwproc] Recv command 0x46574c44
10,396,686 UART: [fwproc] Recv'd Img size: 114084 bytes
13,798,305 UART: ROM Fatal Error: 0x000B0028
13,801,437 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,032,317 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,598,344 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,021,861 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,832 UART:
2,166,221 UART: Running Caliptra ROM ...
2,167,392 UART:
2,167,566 UART: [state] CFI Enabled
2,168,540 UART: [state] LifecycleState = Unprovisioned
2,170,179 UART: [state] DebugLocked = No
2,171,282 UART: [state] WD Timer not started. Device not locked for debugging
2,173,744 UART: [kat] SHA2-256
2,174,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,422 UART: [kat] ++
2,177,893 UART: [kat] sha1
2,178,408 UART: [kat] SHA2-256
2,179,354 UART: [kat] SHA2-384
2,180,044 UART: [kat] SHA2-512-ACC
2,180,886 UART: [kat] ECC-384
3,278,786 UART: [kat] HMAC-384Kdf
3,292,854 UART: [kat] LMS
3,822,364 UART: [kat] --
3,827,135 UART: [cold-reset] ++
3,827,984 UART: [fht] FHT @ 0x50003400
3,840,094 UART: [idev] ++
3,840,653 UART: [idev] CDI.KEYID = 6
3,841,664 UART: [idev] SUBJECT.KEYID = 7
3,842,819 UART: [idev] UDS.KEYID = 0
3,859,610 UART: [idev] Erasing UDS.KEYID = 0
6,315,182 UART: [idev] Sha1 KeyId Algorithm
6,336,947 UART: [idev] --
6,341,596 UART: [ldev] ++
6,342,208 UART: [ldev] CDI.KEYID = 6
6,343,126 UART: [ldev] SUBJECT.KEYID = 5
6,344,290 UART: [ldev] AUTHORITY.KEYID = 7
6,345,521 UART: [ldev] FE.KEYID = 1
6,355,193 UART: [ldev] Erasing FE.KEYID = 1
8,831,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,898 UART: [ldev] --
10,622,353 UART: [fwproc] Wait for Commands...
10,625,206 UART: [fwproc] Recv command 0x46574c44
10,627,301 UART: [fwproc] Recv'd Img size: 114084 bytes
14,020,034 UART: ROM Fatal Error: 0x000B0028
14,023,182 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,022,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,807,696 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,071 UART: [kat] ++
895,223 UART: [kat] sha1
899,309 UART: [kat] SHA2-256
901,249 UART: [kat] SHA2-384
903,944 UART: [kat] SHA2-512-ACC
905,845 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,098 UART: [kat] LMS
1,168,410 UART: [kat] --
1,169,291 UART: [cold-reset] ++
1,169,681 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,600 UART: [ldev] ++
1,208,768 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,559 UART: [ldev] AUTHORITY.KEYID = 7
1,210,022 UART: [ldev] FE.KEYID = 1
1,215,000 UART: [ldev] Erasing FE.KEYID = 1
1,241,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,361 UART: [fwproc] Recv command 0x46574c44
1,282,094 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,182 UART: ROM Fatal Error: 0x000B0028
2,577,339 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,492 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,955 UART: [ldev] --
1,281,441 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,683 UART: ROM Fatal Error: 0x000B0028
2,577,840 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,619 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,792 UART: [kat] HMAC-384Kdf
921,274 UART: [kat] LMS
1,169,586 UART: [kat] --
1,170,675 UART: [cold-reset] ++
1,171,205 UART: [fht] FHT @ 0x50003400
1,173,967 UART: [idev] ++
1,174,135 UART: [idev] CDI.KEYID = 6
1,174,496 UART: [idev] SUBJECT.KEYID = 7
1,174,921 UART: [idev] UDS.KEYID = 0
1,183,315 UART: [idev] Erasing UDS.KEYID = 0
1,199,835 UART: [idev] Sha1 KeyId Algorithm
1,208,849 UART: [idev] --
1,210,004 UART: [ldev] ++
1,210,172 UART: [ldev] CDI.KEYID = 6
1,210,536 UART: [ldev] SUBJECT.KEYID = 5
1,210,963 UART: [ldev] AUTHORITY.KEYID = 7
1,211,426 UART: [ldev] FE.KEYID = 1
1,216,550 UART: [ldev] Erasing FE.KEYID = 1
1,242,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,664 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,681 UART: [fwproc] Recv command 0x46574c44
1,283,414 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,348 UART: ROM Fatal Error: 0x000B0028
2,578,505 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,044 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,240 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
892,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,188 UART: [kat] ++
896,340 UART: [kat] sha1
900,552 UART: [kat] SHA2-256
902,492 UART: [kat] SHA2-384
905,221 UART: [kat] SHA2-512-ACC
907,122 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,608 UART: [idev] ++
1,173,776 UART: [idev] CDI.KEYID = 6
1,174,137 UART: [idev] SUBJECT.KEYID = 7
1,174,562 UART: [idev] UDS.KEYID = 0
1,182,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,352 UART: [idev] Sha1 KeyId Algorithm
1,209,292 UART: [idev] --
1,210,315 UART: [ldev] ++
1,210,483 UART: [ldev] CDI.KEYID = 6
1,210,847 UART: [ldev] SUBJECT.KEYID = 5
1,211,274 UART: [ldev] AUTHORITY.KEYID = 7
1,211,737 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,244,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,247 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,242 UART: [fwproc] Recv command 0x46574c44
1,284,975 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,125 UART: ROM Fatal Error: 0x000B0028
2,580,282 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,163 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,887 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [kat] SHA2-256
891,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,905 UART: [kat] ++
896,057 UART: [kat] sha1
900,203 UART: [kat] SHA2-256
902,143 UART: [kat] SHA2-384
905,048 UART: [kat] SHA2-512-ACC
906,949 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,247 UART: [idev] ++
1,173,415 UART: [idev] CDI.KEYID = 6
1,173,776 UART: [idev] SUBJECT.KEYID = 7
1,174,201 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,095 UART: [idev] Sha1 KeyId Algorithm
1,208,097 UART: [idev] --
1,209,166 UART: [ldev] ++
1,209,334 UART: [ldev] CDI.KEYID = 6
1,209,698 UART: [ldev] SUBJECT.KEYID = 5
1,210,125 UART: [ldev] AUTHORITY.KEYID = 7
1,210,588 UART: [ldev] FE.KEYID = 1
1,215,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,654 UART: [fwproc] Wait for Commands...
1,282,271 UART: [fwproc] Recv command 0x46574c44
1,283,004 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,104 UART: ROM Fatal Error: 0x000B0028
2,578,261 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,936 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,171,058 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,170 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,689 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,216,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,304 UART: [fwproc] Recv command 0x46574c44
1,283,037 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,071 UART: ROM Fatal Error: 0x000B0028
2,578,228 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,019,709 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,411 UART:
2,163,982 UART: Running Caliptra ROM ...
2,165,175 UART:
2,165,354 UART: [state] CFI Enabled
2,166,323 UART: [state] LifecycleState = Unprovisioned
2,167,965 UART: [state] DebugLocked = No
2,168,994 UART: [state] WD Timer not started. Device not locked for debugging
2,171,471 UART: [kat] SHA2-256
2,172,139 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,145 UART: [kat] ++
2,175,595 UART: [kat] sha1
2,176,112 UART: [kat] SHA2-256
2,176,849 UART: [kat] SHA2-384
2,177,514 UART: [kat] SHA2-512-ACC
2,178,353 UART: [kat] ECC-384
3,776,589 UART: [kat] HMAC-384Kdf
3,801,409 UART: [kat] LMS
4,874,575 UART: [kat] --
4,879,991 UART: [cold-reset] ++
4,882,527 UART: [fht] FHT @ 0x50003400
4,893,762 UART: [idev] ++
4,894,447 UART: [idev] CDI.KEYID = 6
4,895,617 UART: [idev] SUBJECT.KEYID = 7
4,896,778 UART: [idev] UDS.KEYID = 0
4,929,253 UART: [idev] Erasing UDS.KEYID = 0
8,241,784 UART: [idev] Sha1 KeyId Algorithm
8,262,936 UART: [idev] --
8,265,599 UART: [ldev] ++
8,266,168 UART: [ldev] CDI.KEYID = 6
8,267,403 UART: [ldev] SUBJECT.KEYID = 5
8,268,561 UART: [ldev] AUTHORITY.KEYID = 7
8,269,786 UART: [ldev] FE.KEYID = 1
8,315,777 UART: [ldev] Erasing FE.KEYID = 1
11,652,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,214 UART: [ldev] --
14,036,780 UART: [fwproc] Wait for Commands...
14,038,721 UART: [fwproc] Recv command 0x46574c44
14,040,997 UART: [fwproc] Recv'd Img size: 113760 bytes
18,096,684 UART: ROM Fatal Error: 0x000B0029
18,100,107 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,019,445 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,896,283 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
2,031,504 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,176,067 UART:
2,176,496 UART: Running Caliptra ROM ...
2,177,664 UART:
2,177,831 UART: [state] CFI Enabled
2,178,788 UART: [state] LifecycleState = Unprovisioned
2,180,420 UART: [state] DebugLocked = No
2,181,519 UART: [state] WD Timer not started. Device not locked for debugging
2,183,990 UART: [kat] SHA2-256
2,184,650 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,187,653 UART: [kat] ++
2,188,097 UART: [kat] sha1
2,188,603 UART: [kat] SHA2-256
2,189,335 UART: [kat] SHA2-384
2,189,992 UART: [kat] SHA2-512-ACC
2,190,836 UART: [kat] ECC-384
4,100,893 UART: [kat] HMAC-384Kdf
4,113,230 UART: [kat] LMS
5,186,365 UART: [kat] --
5,191,585 UART: [cold-reset] ++
5,193,556 UART: [fht] FHT @ 0x50003400
5,204,855 UART: [idev] ++
5,205,535 UART: [idev] CDI.KEYID = 6
5,206,773 UART: [idev] SUBJECT.KEYID = 7
5,208,216 UART: [idev] UDS.KEYID = 0
5,225,273 UART: [idev] Erasing UDS.KEYID = 0
8,499,855 UART: [idev] Sha1 KeyId Algorithm
8,521,357 UART: [idev] --
8,526,595 UART: [ldev] ++
8,527,159 UART: [ldev] CDI.KEYID = 6
8,528,393 UART: [ldev] SUBJECT.KEYID = 5
8,529,848 UART: [ldev] AUTHORITY.KEYID = 7
8,531,407 UART: [ldev] FE.KEYID = 1
8,543,431 UART: [ldev] Erasing FE.KEYID = 1
11,835,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,521 UART: [ldev] --
14,201,380 UART: [fwproc] Wait for Commands...
14,204,441 UART: [fwproc] Recv command 0x46574c44
14,206,764 UART: [fwproc] Recv'd Img size: 113760 bytes
18,269,127 UART: ROM Fatal Error: 0x000B0029
18,272,585 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,020,437 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,086,014 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,022,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,770 UART:
2,167,176 UART: Running Caliptra ROM ...
2,168,256 UART:
2,168,406 UART: [state] CFI Enabled
2,169,395 UART: [state] LifecycleState = Unprovisioned
2,171,045 UART: [state] DebugLocked = No
2,172,073 UART: [state] WD Timer not started. Device not locked for debugging
2,174,546 UART: [kat] SHA2-256
2,175,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,220 UART: [kat] ++
2,178,692 UART: [kat] sha1
2,179,204 UART: [kat] SHA2-256
2,179,861 UART: [kat] SHA2-384
2,180,517 UART: [kat] SHA2-512-ACC
2,181,350 UART: [kat] ECC-384
2,947,504 UART: [kat] HMAC-384Kdf
2,970,648 UART: [kat] LMS
3,500,130 UART: [kat] --
3,502,821 UART: [cold-reset] ++
3,505,076 UART: [fht] FHT @ 0x50003400
3,515,296 UART: [idev] ++
3,515,988 UART: [idev] CDI.KEYID = 6
3,516,882 UART: [idev] SUBJECT.KEYID = 7
3,518,091 UART: [idev] UDS.KEYID = 0
3,542,961 UART: [idev] Erasing UDS.KEYID = 0
6,026,428 UART: [idev] Sha1 KeyId Algorithm
6,049,467 UART: [idev] --
6,052,124 UART: [ldev] ++
6,052,700 UART: [ldev] CDI.KEYID = 6
6,053,616 UART: [ldev] SUBJECT.KEYID = 5
6,054,842 UART: [ldev] AUTHORITY.KEYID = 7
6,056,079 UART: [ldev] FE.KEYID = 1
6,099,450 UART: [ldev] Erasing FE.KEYID = 1
8,605,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,850 UART: [ldev] --
10,412,697 UART: [fwproc] Wait for Commands...
10,415,180 UART: [fwproc] Recv command 0x46574c44
10,417,275 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,251 UART: ROM Fatal Error: 0x000B0029
13,813,328 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,020,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,608,465 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
2,020,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,164,714 UART:
2,165,103 UART: Running Caliptra ROM ...
2,166,281 UART:
2,166,458 UART: [state] CFI Enabled
2,167,437 UART: [state] LifecycleState = Unprovisioned
2,169,078 UART: [state] DebugLocked = No
2,170,185 UART: [state] WD Timer not started. Device not locked for debugging
2,172,651 UART: [kat] SHA2-256
2,173,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,322 UART: [kat] ++
2,176,775 UART: [kat] sha1
2,177,285 UART: [kat] SHA2-256
2,178,021 UART: [kat] SHA2-384
2,178,688 UART: [kat] SHA2-512-ACC
2,179,518 UART: [kat] ECC-384
3,277,909 UART: [kat] HMAC-384Kdf
3,291,960 UART: [kat] LMS
3,821,462 UART: [kat] --
3,826,707 UART: [cold-reset] ++
3,828,748 UART: [fht] FHT @ 0x50003400
3,840,156 UART: [idev] ++
3,840,724 UART: [idev] CDI.KEYID = 6
3,841,664 UART: [idev] SUBJECT.KEYID = 7
3,842,870 UART: [idev] UDS.KEYID = 0
3,859,249 UART: [idev] Erasing UDS.KEYID = 0
6,316,361 UART: [idev] Sha1 KeyId Algorithm
6,338,951 UART: [idev] --
6,341,653 UART: [ldev] ++
6,342,224 UART: [ldev] CDI.KEYID = 6
6,343,240 UART: [ldev] SUBJECT.KEYID = 5
6,344,341 UART: [ldev] AUTHORITY.KEYID = 7
6,345,593 UART: [ldev] FE.KEYID = 1
6,357,213 UART: [ldev] Erasing FE.KEYID = 1
8,829,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,738 UART: [ldev] --
10,619,778 UART: [fwproc] Wait for Commands...
10,621,331 UART: [fwproc] Recv command 0x46574c44
10,623,473 UART: [fwproc] Recv'd Img size: 114084 bytes
14,020,033 UART: ROM Fatal Error: 0x000B0029
14,023,160 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,021,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,814,313 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,023,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,970 UART:
2,168,358 UART: Running Caliptra ROM ...
2,169,647 UART:
2,169,811 UART: [state] CFI Enabled
2,170,794 UART: [state] LifecycleState = Unprovisioned
2,172,449 UART: [state] DebugLocked = No
2,173,595 UART: [state] WD Timer not started. Device not locked for debugging
2,176,075 UART: [kat] SHA2-256
2,176,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,760 UART: [kat] ++
2,180,212 UART: [kat] sha1
2,180,726 UART: [kat] SHA2-256
2,181,468 UART: [kat] SHA2-384
2,182,136 UART: [kat] SHA2-512-ACC
2,183,021 UART: [kat] ECC-384
2,949,790 UART: [kat] HMAC-384Kdf
2,973,140 UART: [kat] LMS
3,502,584 UART: [kat] --
3,506,688 UART: [cold-reset] ++
3,508,790 UART: [fht] FHT @ 0x50003400
3,519,012 UART: [idev] ++
3,519,580 UART: [idev] CDI.KEYID = 6
3,520,566 UART: [idev] SUBJECT.KEYID = 7
3,521,730 UART: [idev] UDS.KEYID = 0
3,545,165 UART: [idev] Erasing UDS.KEYID = 0
6,027,264 UART: [idev] Sha1 KeyId Algorithm
6,049,659 UART: [idev] --
6,053,174 UART: [ldev] ++
6,053,749 UART: [ldev] CDI.KEYID = 6
6,054,679 UART: [ldev] SUBJECT.KEYID = 5
6,055,841 UART: [ldev] AUTHORITY.KEYID = 7
6,057,190 UART: [ldev] FE.KEYID = 1
6,102,687 UART: [ldev] Erasing FE.KEYID = 1
8,604,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,231 UART: [ldev] --
10,396,075 UART: [fwproc] Wait for Commands...
10,397,905 UART: [fwproc] Recv command 0x46574c44
10,400,009 UART: [fwproc] Recv'd Img size: 114084 bytes
13,800,963 UART: ROM Fatal Error: 0x000B0029
13,804,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
2,034,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,572,719 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,021,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,534 UART:
2,165,930 UART: Running Caliptra ROM ...
2,167,014 UART:
2,167,174 UART: [state] CFI Enabled
2,168,157 UART: [state] LifecycleState = Unprovisioned
2,169,802 UART: [state] DebugLocked = No
2,170,829 UART: [state] WD Timer not started. Device not locked for debugging
2,173,302 UART: [kat] SHA2-256
2,173,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,999 UART: [kat] ++
2,177,446 UART: [kat] sha1
2,177,957 UART: [kat] SHA2-256
2,178,694 UART: [kat] SHA2-384
2,179,354 UART: [kat] SHA2-512-ACC
2,180,192 UART: [kat] ECC-384
3,281,800 UART: [kat] HMAC-384Kdf
3,293,225 UART: [kat] LMS
3,822,704 UART: [kat] --
3,827,287 UART: [cold-reset] ++
3,828,300 UART: [fht] FHT @ 0x50003400
3,839,358 UART: [idev] ++
3,839,914 UART: [idev] CDI.KEYID = 6
3,840,848 UART: [idev] SUBJECT.KEYID = 7
3,842,055 UART: [idev] UDS.KEYID = 0
3,857,922 UART: [idev] Erasing UDS.KEYID = 0
6,316,731 UART: [idev] Sha1 KeyId Algorithm
6,339,460 UART: [idev] --
6,344,779 UART: [ldev] ++
6,345,355 UART: [ldev] CDI.KEYID = 6
6,346,260 UART: [ldev] SUBJECT.KEYID = 5
6,347,473 UART: [ldev] AUTHORITY.KEYID = 7
6,348,698 UART: [ldev] FE.KEYID = 1
6,360,909 UART: [ldev] Erasing FE.KEYID = 1
8,833,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,119 UART: [ldev] --
10,622,080 UART: [fwproc] Wait for Commands...
10,625,007 UART: [fwproc] Recv command 0x46574c44
10,627,052 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,714 UART: ROM Fatal Error: 0x000B0029
14,025,866 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,026,267 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,803,583 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,466 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,299 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,259 UART: [idev] ++
1,172,427 UART: [idev] CDI.KEYID = 6
1,172,788 UART: [idev] SUBJECT.KEYID = 7
1,173,213 UART: [idev] UDS.KEYID = 0
1,180,997 UART: [idev] Erasing UDS.KEYID = 0
1,197,503 UART: [idev] Sha1 KeyId Algorithm
1,206,409 UART: [idev] --
1,207,334 UART: [ldev] ++
1,207,502 UART: [ldev] CDI.KEYID = 6
1,207,866 UART: [ldev] SUBJECT.KEYID = 5
1,208,293 UART: [ldev] AUTHORITY.KEYID = 7
1,208,756 UART: [ldev] FE.KEYID = 1
1,213,816 UART: [ldev] Erasing FE.KEYID = 1
1,239,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,492 UART: [ldev] --
1,278,834 UART: [fwproc] Wait for Commands...
1,279,659 UART: [fwproc] Recv command 0x46574c44
1,280,392 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,460 UART: ROM Fatal Error: 0x000B0029
2,575,617 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,504 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,063 UART: [kat] LMS
1,169,375 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,527 UART: [ldev] ++
1,209,695 UART: [ldev] CDI.KEYID = 6
1,210,059 UART: [ldev] SUBJECT.KEYID = 5
1,210,486 UART: [ldev] AUTHORITY.KEYID = 7
1,210,949 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,449 UART: ROM Fatal Error: 0x000B0029
2,578,606 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,593 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,756 UART: [state] LifecycleState = Unprovisioned
86,411 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,214 UART: [kat] SHA2-256
891,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,893 UART: [kat] ++
896,045 UART: [kat] sha1
900,345 UART: [kat] SHA2-256
902,285 UART: [kat] SHA2-384
905,084 UART: [kat] SHA2-512-ACC
906,985 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
921,278 UART: [kat] LMS
1,169,590 UART: [kat] --
1,170,337 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,621 UART: [idev] ++
1,173,789 UART: [idev] CDI.KEYID = 6
1,174,150 UART: [idev] SUBJECT.KEYID = 7
1,174,575 UART: [idev] UDS.KEYID = 0
1,182,341 UART: [idev] Erasing UDS.KEYID = 0
1,199,751 UART: [idev] Sha1 KeyId Algorithm
1,208,685 UART: [idev] --
1,209,808 UART: [ldev] ++
1,209,976 UART: [ldev] CDI.KEYID = 6
1,210,340 UART: [ldev] SUBJECT.KEYID = 5
1,210,767 UART: [ldev] AUTHORITY.KEYID = 7
1,211,230 UART: [ldev] FE.KEYID = 1
1,216,398 UART: [ldev] Erasing FE.KEYID = 1
1,242,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,892 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,182 UART: ROM Fatal Error: 0x000B0029
2,577,339 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,204 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,608 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,642 UART: [idev] ++
1,172,810 UART: [idev] CDI.KEYID = 6
1,173,171 UART: [idev] SUBJECT.KEYID = 7
1,173,596 UART: [idev] UDS.KEYID = 0
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,198,804 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,589 UART: [ldev] ++
1,208,757 UART: [ldev] CDI.KEYID = 6
1,209,121 UART: [ldev] SUBJECT.KEYID = 5
1,209,548 UART: [ldev] AUTHORITY.KEYID = 7
1,210,011 UART: [ldev] FE.KEYID = 1
1,215,377 UART: [ldev] Erasing FE.KEYID = 1
1,241,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,739 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,521 UART: ROM Fatal Error: 0x000B0029
2,576,678 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,209 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,248 UART: [kat] LMS
1,168,560 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,705 UART: [idev] ++
1,172,873 UART: [idev] CDI.KEYID = 6
1,173,234 UART: [idev] SUBJECT.KEYID = 7
1,173,659 UART: [idev] UDS.KEYID = 0
1,181,455 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,245 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,286 UART: [ldev] Erasing FE.KEYID = 1
1,240,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,636 UART: [ldev] --
1,279,988 UART: [fwproc] Wait for Commands...
1,280,781 UART: [fwproc] Recv command 0x46574c44
1,281,514 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,886 UART: ROM Fatal Error: 0x000B0029
2,577,043 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,678 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,832 UART: [kat] ++
895,984 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
915,981 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,686 UART: [idev] ++
1,172,854 UART: [idev] CDI.KEYID = 6
1,173,215 UART: [idev] SUBJECT.KEYID = 7
1,173,640 UART: [idev] UDS.KEYID = 0
1,181,568 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,859 UART: ROM Fatal Error: 0x000B0029
2,577,016 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,683 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,023,364 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,916 UART:
2,167,308 UART: Running Caliptra ROM ...
2,168,479 UART:
2,168,650 UART: [state] CFI Enabled
2,169,568 UART: [state] LifecycleState = Unprovisioned
2,171,202 UART: [state] DebugLocked = No
2,172,254 UART: [state] WD Timer not started. Device not locked for debugging
2,174,725 UART: [kat] SHA2-256
2,175,394 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,398 UART: [kat] ++
2,178,869 UART: [kat] sha1
2,179,473 UART: [kat] SHA2-256
2,180,135 UART: [kat] SHA2-384
2,180,788 UART: [kat] SHA2-512-ACC
2,181,667 UART: [kat] ECC-384
3,775,401 UART: [kat] HMAC-384Kdf
3,803,001 UART: [kat] LMS
4,876,181 UART: [kat] --
4,881,601 UART: [cold-reset] ++
4,883,975 UART: [fht] FHT @ 0x50003400
4,895,457 UART: [idev] ++
4,896,187 UART: [idev] CDI.KEYID = 6
4,897,373 UART: [idev] SUBJECT.KEYID = 7
4,898,529 UART: [idev] UDS.KEYID = 0
4,930,551 UART: [idev] Erasing UDS.KEYID = 0
8,241,340 UART: [idev] Sha1 KeyId Algorithm
8,263,075 UART: [idev] --
8,265,884 UART: [ldev] ++
8,266,503 UART: [ldev] CDI.KEYID = 6
8,267,611 UART: [ldev] SUBJECT.KEYID = 5
8,268,820 UART: [ldev] AUTHORITY.KEYID = 7
8,270,105 UART: [ldev] FE.KEYID = 1
8,317,398 UART: [ldev] Erasing FE.KEYID = 1
11,651,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,689 UART: [ldev] --
14,037,854 UART: [fwproc] Wait for Commands...
14,040,224 UART: [fwproc] Recv command 0x46574c44
14,042,549 UART: [fwproc] Recv'd Img size: 113760 bytes
18,104,571 UART: ROM Fatal Error: 0x000B0028
18,108,023 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,022,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,882,781 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,025,834 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,169,531 UART:
2,169,931 UART: Running Caliptra ROM ...
2,171,100 UART:
2,171,291 UART: [state] CFI Enabled
2,172,257 UART: [state] LifecycleState = Unprovisioned
2,173,899 UART: [state] DebugLocked = No
2,174,999 UART: [state] WD Timer not started. Device not locked for debugging
2,177,477 UART: [kat] SHA2-256
2,178,146 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,161 UART: [kat] ++
2,181,609 UART: [kat] sha1
2,182,116 UART: [kat] SHA2-256
2,182,849 UART: [kat] SHA2-384
2,183,511 UART: [kat] SHA2-512-ACC
2,184,347 UART: [kat] ECC-384
4,097,266 UART: [kat] HMAC-384Kdf
4,108,767 UART: [kat] LMS
5,181,924 UART: [kat] --
5,187,457 UART: [cold-reset] ++
5,189,309 UART: [fht] FHT @ 0x50003400
5,200,023 UART: [idev] ++
5,200,707 UART: [idev] CDI.KEYID = 6
5,201,941 UART: [idev] SUBJECT.KEYID = 7
5,203,374 UART: [idev] UDS.KEYID = 0
5,220,268 UART: [idev] Erasing UDS.KEYID = 0
8,493,376 UART: [idev] Sha1 KeyId Algorithm
8,514,284 UART: [idev] --
8,518,770 UART: [ldev] ++
8,519,371 UART: [ldev] CDI.KEYID = 6
8,520,478 UART: [ldev] SUBJECT.KEYID = 5
8,522,017 UART: [ldev] AUTHORITY.KEYID = 7
8,523,507 UART: [ldev] FE.KEYID = 1
8,534,264 UART: [ldev] Erasing FE.KEYID = 1
11,829,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,059 UART: [ldev] --
14,194,081 UART: [fwproc] Wait for Commands...
14,196,064 UART: [fwproc] Recv command 0x46574c44
14,198,383 UART: [fwproc] Recv'd Img size: 113760 bytes
18,256,033 UART: ROM Fatal Error: 0x000B0028
18,259,494 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,025,803 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,210 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,024,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,037 UART:
2,169,437 UART: Running Caliptra ROM ...
2,170,517 UART:
2,170,670 UART: [state] CFI Enabled
2,171,658 UART: [state] LifecycleState = Unprovisioned
2,173,309 UART: [state] DebugLocked = No
2,174,418 UART: [state] WD Timer not started. Device not locked for debugging
2,176,890 UART: [kat] SHA2-256
2,177,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,567 UART: [kat] ++
2,181,018 UART: [kat] sha1
2,181,765 UART: [kat] SHA2-256
2,182,534 UART: [kat] SHA2-384
2,183,203 UART: [kat] SHA2-512-ACC
2,184,053 UART: [kat] ECC-384
2,948,460 UART: [kat] HMAC-384Kdf
2,971,493 UART: [kat] LMS
3,500,968 UART: [kat] --
3,506,059 UART: [cold-reset] ++
3,507,621 UART: [fht] FHT @ 0x50003400
3,518,339 UART: [idev] ++
3,518,903 UART: [idev] CDI.KEYID = 6
3,519,841 UART: [idev] SUBJECT.KEYID = 7
3,521,052 UART: [idev] UDS.KEYID = 0
3,543,392 UART: [idev] Erasing UDS.KEYID = 0
6,025,151 UART: [idev] Sha1 KeyId Algorithm
6,048,464 UART: [idev] --
6,051,981 UART: [ldev] ++
6,052,554 UART: [ldev] CDI.KEYID = 6
6,053,523 UART: [ldev] SUBJECT.KEYID = 5
6,054,706 UART: [ldev] AUTHORITY.KEYID = 7
6,055,945 UART: [ldev] FE.KEYID = 1
6,098,569 UART: [ldev] Erasing FE.KEYID = 1
8,600,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,069 UART: [ldev] --
10,409,882 UART: [fwproc] Wait for Commands...
10,412,316 UART: [fwproc] Recv command 0x46574c44
10,414,421 UART: [fwproc] Recv'd Img size: 114084 bytes
13,811,303 UART: ROM Fatal Error: 0x000B0028
13,814,447 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,028,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,629,516 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
2,032,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,176,787 UART:
2,177,198 UART: Running Caliptra ROM ...
2,178,368 UART:
2,178,544 UART: [state] CFI Enabled
2,179,521 UART: [state] LifecycleState = Unprovisioned
2,181,166 UART: [state] DebugLocked = No
2,182,293 UART: [state] WD Timer not started. Device not locked for debugging
2,184,764 UART: [kat] SHA2-256
2,185,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,188,440 UART: [kat] ++
2,188,890 UART: [kat] sha1
2,189,403 UART: [kat] SHA2-256
2,190,142 UART: [kat] SHA2-384
2,190,806 UART: [kat] SHA2-512-ACC
2,191,687 UART: [kat] ECC-384
3,281,273 UART: [kat] HMAC-384Kdf
3,293,189 UART: [kat] LMS
3,822,669 UART: [kat] --
3,827,393 UART: [cold-reset] ++
3,829,172 UART: [fht] FHT @ 0x50003400
3,841,393 UART: [idev] ++
3,841,956 UART: [idev] CDI.KEYID = 6
3,842,988 UART: [idev] SUBJECT.KEYID = 7
3,844,088 UART: [idev] UDS.KEYID = 0
3,856,667 UART: [idev] Erasing UDS.KEYID = 0
6,312,766 UART: [idev] Sha1 KeyId Algorithm
6,335,290 UART: [idev] --
6,339,553 UART: [ldev] ++
6,340,121 UART: [ldev] CDI.KEYID = 6
6,341,045 UART: [ldev] SUBJECT.KEYID = 5
6,342,264 UART: [ldev] AUTHORITY.KEYID = 7
6,343,503 UART: [ldev] FE.KEYID = 1
6,353,987 UART: [ldev] Erasing FE.KEYID = 1
8,827,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,183 UART: [ldev] --
10,617,328 UART: [fwproc] Wait for Commands...
10,618,883 UART: [fwproc] Recv command 0x46574c44
10,620,988 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,859 UART: ROM Fatal Error: 0x000B0028
14,021,946 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
2,031,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,808,081 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,040,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,185,224 UART:
2,185,647 UART: Running Caliptra ROM ...
2,186,828 UART:
2,186,999 UART: [state] CFI Enabled
2,188,153 UART: [state] LifecycleState = Unprovisioned
2,189,819 UART: [state] DebugLocked = No
2,190,934 UART: [state] WD Timer not started. Device not locked for debugging
2,193,404 UART: [kat] SHA2-256
2,194,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,197,093 UART: [kat] ++
2,197,549 UART: [kat] sha1
2,198,063 UART: [kat] SHA2-256
2,198,723 UART: [kat] SHA2-384
2,199,377 UART: [kat] SHA2-512-ACC
2,200,177 UART: [kat] ECC-384
2,949,972 UART: [kat] HMAC-384Kdf
2,974,069 UART: [kat] LMS
3,503,510 UART: [kat] --
3,507,954 UART: [cold-reset] ++
3,509,352 UART: [fht] FHT @ 0x50003400
3,521,364 UART: [idev] ++
3,521,927 UART: [idev] CDI.KEYID = 6
3,522,888 UART: [idev] SUBJECT.KEYID = 7
3,524,046 UART: [idev] UDS.KEYID = 0
3,546,286 UART: [idev] Erasing UDS.KEYID = 0
6,029,472 UART: [idev] Sha1 KeyId Algorithm
6,052,373 UART: [idev] --
6,054,801 UART: [ldev] ++
6,055,374 UART: [ldev] CDI.KEYID = 6
6,056,283 UART: [ldev] SUBJECT.KEYID = 5
6,057,393 UART: [ldev] AUTHORITY.KEYID = 7
6,058,700 UART: [ldev] FE.KEYID = 1
6,102,939 UART: [ldev] Erasing FE.KEYID = 1
8,604,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,015 UART: [ldev] --
10,399,448 UART: [fwproc] Wait for Commands...
10,401,007 UART: [fwproc] Recv command 0x46574c44
10,403,109 UART: [fwproc] Recv'd Img size: 114084 bytes
13,797,604 UART: ROM Fatal Error: 0x000B0028
13,800,742 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,025,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,569,550 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
2,026,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,170,869 UART:
2,171,281 UART: Running Caliptra ROM ...
2,172,456 UART:
2,172,627 UART: [state] CFI Enabled
2,173,596 UART: [state] LifecycleState = Unprovisioned
2,175,235 UART: [state] DebugLocked = No
2,176,263 UART: [state] WD Timer not started. Device not locked for debugging
2,178,730 UART: [kat] SHA2-256
2,179,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,429 UART: [kat] ++
2,182,878 UART: [kat] sha1
2,183,386 UART: [kat] SHA2-256
2,184,041 UART: [kat] SHA2-384
2,184,702 UART: [kat] SHA2-512-ACC
2,185,532 UART: [kat] ECC-384
3,278,292 UART: [kat] HMAC-384Kdf
3,290,361 UART: [kat] LMS
3,819,864 UART: [kat] --
3,826,443 UART: [cold-reset] ++
3,828,364 UART: [fht] FHT @ 0x50003400
3,839,211 UART: [idev] ++
3,839,790 UART: [idev] CDI.KEYID = 6
3,840,731 UART: [idev] SUBJECT.KEYID = 7
3,841,941 UART: [idev] UDS.KEYID = 0
3,858,050 UART: [idev] Erasing UDS.KEYID = 0
6,313,941 UART: [idev] Sha1 KeyId Algorithm
6,337,115 UART: [idev] --
6,342,188 UART: [ldev] ++
6,342,754 UART: [ldev] CDI.KEYID = 6
6,343,630 UART: [ldev] SUBJECT.KEYID = 5
6,344,839 UART: [ldev] AUTHORITY.KEYID = 7
6,346,121 UART: [ldev] FE.KEYID = 1
6,356,411 UART: [ldev] Erasing FE.KEYID = 1
8,830,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,593 UART: [ldev] --
10,622,585 UART: [fwproc] Wait for Commands...
10,625,325 UART: [fwproc] Recv command 0x46574c44
10,627,435 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,202 UART: ROM Fatal Error: 0x000B0028
14,036,298 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
2,024,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,823,061 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,446 UART: [kat] SHA2-256
890,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,169,847 UART: [fht] FHT @ 0x50003400
1,172,649 UART: [idev] ++
1,172,817 UART: [idev] CDI.KEYID = 6
1,173,178 UART: [idev] SUBJECT.KEYID = 7
1,173,603 UART: [idev] UDS.KEYID = 0
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,271 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,687 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,124 UART: ROM Fatal Error: 0x000B0028
2,577,281 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,548 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [kat] SHA2-256
892,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,140 UART: [kat] ++
896,292 UART: [kat] sha1
900,540 UART: [kat] SHA2-256
902,480 UART: [kat] SHA2-384
905,235 UART: [kat] SHA2-512-ACC
907,136 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,322 UART: [idev] Sha1 KeyId Algorithm
1,209,296 UART: [idev] --
1,210,313 UART: [ldev] ++
1,210,481 UART: [ldev] CDI.KEYID = 6
1,210,845 UART: [ldev] SUBJECT.KEYID = 5
1,211,272 UART: [ldev] AUTHORITY.KEYID = 7
1,211,735 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,459 UART: [ldev] --
1,282,779 UART: [fwproc] Wait for Commands...
1,283,352 UART: [fwproc] Recv command 0x46574c44
1,284,085 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,925 UART: ROM Fatal Error: 0x000B0028
2,579,082 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
915,690 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,207 UART: [idev] Sha1 KeyId Algorithm
1,206,947 UART: [idev] --
1,207,918 UART: [ldev] ++
1,208,086 UART: [ldev] CDI.KEYID = 6
1,208,450 UART: [ldev] SUBJECT.KEYID = 5
1,208,877 UART: [ldev] AUTHORITY.KEYID = 7
1,209,340 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,804 UART: [ldev] --
1,280,186 UART: [fwproc] Wait for Commands...
1,280,929 UART: [fwproc] Recv command 0x46574c44
1,281,662 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,740 UART: ROM Fatal Error: 0x000B0028
2,575,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,096 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,382 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,183,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,435 UART: [ldev] ++
1,209,603 UART: [ldev] CDI.KEYID = 6
1,209,967 UART: [ldev] SUBJECT.KEYID = 5
1,210,394 UART: [ldev] AUTHORITY.KEYID = 7
1,210,857 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,469 UART: [fwproc] Wait for Commands...
1,282,176 UART: [fwproc] Recv command 0x46574c44
1,282,909 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,117 UART: ROM Fatal Error: 0x000B0028
2,579,274 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,971 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,257 UART: [kat] SHA2-256
901,197 UART: [kat] SHA2-384
903,858 UART: [kat] SHA2-512-ACC
905,759 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,200 UART: [kat] LMS
1,168,512 UART: [kat] --
1,169,503 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,543 UART: [idev] ++
1,172,711 UART: [idev] CDI.KEYID = 6
1,173,072 UART: [idev] SUBJECT.KEYID = 7
1,173,497 UART: [idev] UDS.KEYID = 0
1,181,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,569 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,670 UART: [fwproc] Wait for Commands...
1,281,359 UART: [fwproc] Recv command 0x46574c44
1,282,092 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,294 UART: ROM Fatal Error: 0x000B0028
2,577,451 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,550 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,044 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,405 UART: [ldev] --
1,281,907 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,333 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,857 UART: ROM Fatal Error: 0x000B0028
2,578,014 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,425 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
5,586 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,211 UART:
192,588 UART: Running Caliptra ROM ...
193,753 UART:
193,926 UART: [state] CFI Enabled
263,447 UART: [state] LifecycleState = Manufacturing
265,810 UART: [state] DebugLocked = No
268,112 UART: [state] WD Timer not started. Device not locked for debugging
273,448 UART: [kat] SHA2-256
455,372 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,880 UART: [kat] ++
467,429 UART: [kat] sha1
476,654 UART: [kat] SHA2-256
479,706 UART: [kat] SHA2-384
486,655 UART: [kat] SHA2-512-ACC
489,267 UART: [kat] ECC-384
3,774,659 UART: [kat] HMAC-384Kdf
3,802,731 UART: [kat] LMS
4,875,873 UART: [kat] --
4,879,814 UART: [cold-reset] ++
4,881,064 UART: [fht] FHT @ 0x50003400
4,892,050 UART: [idev] ++
4,892,778 UART: [idev] CDI.KEYID = 6
4,893,957 UART: [idev] SUBJECT.KEYID = 7
4,895,113 UART: [idev] UDS.KEYID = 0
4,929,930 UART: [idev] Erasing UDS.KEYID = 0
8,241,791 UART: [idev] Sha1 KeyId Algorithm
8,264,318 UART: [idev] --
8,268,202 UART: [ldev] ++
8,268,770 UART: [ldev] CDI.KEYID = 6
8,270,011 UART: [ldev] SUBJECT.KEYID = 5
8,271,176 UART: [ldev] AUTHORITY.KEYID = 7
8,272,329 UART: [ldev] FE.KEYID = 1
8,317,357 UART: [ldev] Erasing FE.KEYID = 1
11,653,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,781 UART: [ldev] --
14,035,103 UART: [fwproc] Wait for Commands...
14,036,932 UART: [fwproc] Recv command 0x46574c44
14,039,251 UART: [fwproc] Recv'd Img size: 113760 bytes
18,132,910 UART: ROM Fatal Error: 0x000B002C
18,136,267 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,259 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,916,911 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
6,579 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,709 UART:
193,099 UART: Running Caliptra ROM ...
194,212 UART:
603,915 UART: [state] CFI Enabled
617,781 UART: [state] LifecycleState = Manufacturing
620,187 UART: [state] DebugLocked = No
621,795 UART: [state] WD Timer not started. Device not locked for debugging
625,547 UART: [kat] SHA2-256
807,330 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,864 UART: [kat] ++
819,451 UART: [kat] sha1
828,383 UART: [kat] SHA2-256
831,431 UART: [kat] SHA2-384
837,124 UART: [kat] SHA2-512-ACC
839,723 UART: [kat] ECC-384
4,094,690 UART: [kat] HMAC-384Kdf
4,107,155 UART: [kat] LMS
5,180,315 UART: [kat] --
5,183,741 UART: [cold-reset] ++
5,185,944 UART: [fht] FHT @ 0x50003400
5,198,696 UART: [idev] ++
5,199,358 UART: [idev] CDI.KEYID = 6
5,200,532 UART: [idev] SUBJECT.KEYID = 7
5,202,070 UART: [idev] UDS.KEYID = 0
5,218,287 UART: [idev] Erasing UDS.KEYID = 0
8,490,848 UART: [idev] Sha1 KeyId Algorithm
8,513,103 UART: [idev] --
8,516,919 UART: [ldev] ++
8,517,533 UART: [ldev] CDI.KEYID = 6
8,518,683 UART: [ldev] SUBJECT.KEYID = 5
8,520,218 UART: [ldev] AUTHORITY.KEYID = 7
8,521,768 UART: [ldev] FE.KEYID = 1
8,532,301 UART: [ldev] Erasing FE.KEYID = 1
11,820,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,172 UART: [ldev] --
14,186,459 UART: [fwproc] Wait for Commands...
14,188,439 UART: [fwproc] Recv command 0x46574c44
14,190,745 UART: [fwproc] Recv'd Img size: 113760 bytes
18,281,375 UART: ROM Fatal Error: 0x000B002C
18,284,770 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
6,249 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,102,475 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,936 writing to cptra_bootfsm_go
6,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
193,222 UART:
193,600 UART: Running Caliptra ROM ...
194,771 UART:
194,927 UART: [state] CFI Enabled
264,289 UART: [state] LifecycleState = Manufacturing
266,194 UART: [state] DebugLocked = No
267,360 UART: [state] WD Timer not started. Device not locked for debugging
271,083 UART: [kat] SHA2-256
450,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,787 UART: [kat] ++
462,325 UART: [kat] sha1
474,612 UART: [kat] SHA2-256
477,642 UART: [kat] SHA2-384
483,386 UART: [kat] SHA2-512-ACC
486,348 UART: [kat] ECC-384
2,951,025 UART: [kat] HMAC-384Kdf
2,973,094 UART: [kat] LMS
3,502,530 UART: [kat] --
3,506,205 UART: [cold-reset] ++
3,508,245 UART: [fht] FHT @ 0x50003400
3,518,738 UART: [idev] ++
3,519,300 UART: [idev] CDI.KEYID = 6
3,520,234 UART: [idev] SUBJECT.KEYID = 7
3,521,444 UART: [idev] UDS.KEYID = 0
3,545,049 UART: [idev] Erasing UDS.KEYID = 0
6,027,277 UART: [idev] Sha1 KeyId Algorithm
6,051,158 UART: [idev] --
6,054,072 UART: [ldev] ++
6,054,666 UART: [ldev] CDI.KEYID = 6
6,055,554 UART: [ldev] SUBJECT.KEYID = 5
6,056,636 UART: [ldev] AUTHORITY.KEYID = 7
6,057,973 UART: [ldev] FE.KEYID = 1
6,101,597 UART: [ldev] Erasing FE.KEYID = 1
8,605,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,497 UART: [ldev] --
10,416,637 UART: [fwproc] Wait for Commands...
10,418,198 UART: [fwproc] Recv command 0x46574c44
10,420,297 UART: [fwproc] Recv'd Img size: 114084 bytes
13,845,475 UART: ROM Fatal Error: 0x000B002C
13,848,571 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
5,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,652,562 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
6,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,349 UART:
192,724 UART: Running Caliptra ROM ...
193,894 UART:
603,439 UART: [state] CFI Enabled
614,170 UART: [state] LifecycleState = Manufacturing
616,043 UART: [state] DebugLocked = No
618,265 UART: [state] WD Timer not started. Device not locked for debugging
622,260 UART: [kat] SHA2-256
801,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,958 UART: [kat] ++
813,489 UART: [kat] sha1
824,854 UART: [kat] SHA2-256
827,907 UART: [kat] SHA2-384
834,793 UART: [kat] SHA2-512-ACC
837,774 UART: [kat] ECC-384
3,277,478 UART: [kat] HMAC-384Kdf
3,289,188 UART: [kat] LMS
3,818,670 UART: [kat] --
3,823,474 UART: [cold-reset] ++
3,824,700 UART: [fht] FHT @ 0x50003400
3,837,300 UART: [idev] ++
3,837,868 UART: [idev] CDI.KEYID = 6
3,838,836 UART: [idev] SUBJECT.KEYID = 7
3,839,991 UART: [idev] UDS.KEYID = 0
3,853,914 UART: [idev] Erasing UDS.KEYID = 0
6,312,630 UART: [idev] Sha1 KeyId Algorithm
6,336,238 UART: [idev] --
6,340,122 UART: [ldev] ++
6,340,687 UART: [ldev] CDI.KEYID = 6
6,341,651 UART: [ldev] SUBJECT.KEYID = 5
6,342,859 UART: [ldev] AUTHORITY.KEYID = 7
6,343,988 UART: [ldev] FE.KEYID = 1
6,355,306 UART: [ldev] Erasing FE.KEYID = 1
8,828,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,867 UART: [ldev] --
10,617,863 UART: [fwproc] Wait for Commands...
10,619,836 UART: [fwproc] Recv command 0x46574c44
10,621,937 UART: [fwproc] Recv'd Img size: 114084 bytes
14,050,973 UART: ROM Fatal Error: 0x000B002C
14,054,116 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,524 writing to cptra_bootfsm_go
6,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,844,887 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
5,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,086 UART:
192,479 UART: Running Caliptra ROM ...
193,671 UART:
193,827 UART: [state] CFI Enabled
261,505 UART: [state] LifecycleState = Manufacturing
263,361 UART: [state] DebugLocked = No
265,413 UART: [state] WD Timer not started. Device not locked for debugging
269,635 UART: [kat] SHA2-256
448,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,299 UART: [kat] ++
460,752 UART: [kat] sha1
471,897 UART: [kat] SHA2-256
474,972 UART: [kat] SHA2-384
481,220 UART: [kat] SHA2-512-ACC
484,154 UART: [kat] ECC-384
2,950,066 UART: [kat] HMAC-384Kdf
2,972,583 UART: [kat] LMS
3,502,088 UART: [kat] --
3,505,751 UART: [cold-reset] ++
3,506,721 UART: [fht] FHT @ 0x50003400
3,518,406 UART: [idev] ++
3,518,979 UART: [idev] CDI.KEYID = 6
3,520,051 UART: [idev] SUBJECT.KEYID = 7
3,521,165 UART: [idev] UDS.KEYID = 0
3,545,102 UART: [idev] Erasing UDS.KEYID = 0
6,027,941 UART: [idev] Sha1 KeyId Algorithm
6,052,418 UART: [idev] --
6,056,957 UART: [ldev] ++
6,057,529 UART: [ldev] CDI.KEYID = 6
6,058,441 UART: [ldev] SUBJECT.KEYID = 5
6,059,606 UART: [ldev] AUTHORITY.KEYID = 7
6,060,844 UART: [ldev] FE.KEYID = 1
6,100,073 UART: [ldev] Erasing FE.KEYID = 1
8,605,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,514 UART: [ldev] --
10,414,481 UART: [fwproc] Wait for Commands...
10,417,340 UART: [fwproc] Recv command 0x46574c44
10,419,456 UART: [fwproc] Recv'd Img size: 114084 bytes
13,843,159 UART: ROM Fatal Error: 0x000B002C
13,846,238 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
5,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,624,942 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
6,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,671 UART:
193,054 UART: Running Caliptra ROM ...
194,234 UART:
603,647 UART: [state] CFI Enabled
617,396 UART: [state] LifecycleState = Manufacturing
619,272 UART: [state] DebugLocked = No
622,180 UART: [state] WD Timer not started. Device not locked for debugging
625,637 UART: [kat] SHA2-256
804,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,345 UART: [kat] ++
816,898 UART: [kat] sha1
828,916 UART: [kat] SHA2-256
831,969 UART: [kat] SHA2-384
837,612 UART: [kat] SHA2-512-ACC
840,603 UART: [kat] ECC-384
3,282,261 UART: [kat] HMAC-384Kdf
3,294,287 UART: [kat] LMS
3,823,750 UART: [kat] --
3,828,924 UART: [cold-reset] ++
3,830,849 UART: [fht] FHT @ 0x50003400
3,843,275 UART: [idev] ++
3,843,839 UART: [idev] CDI.KEYID = 6
3,844,770 UART: [idev] SUBJECT.KEYID = 7
3,845,980 UART: [idev] UDS.KEYID = 0
3,862,902 UART: [idev] Erasing UDS.KEYID = 0
6,317,478 UART: [idev] Sha1 KeyId Algorithm
6,339,641 UART: [idev] --
6,342,822 UART: [ldev] ++
6,343,386 UART: [ldev] CDI.KEYID = 6
6,344,292 UART: [ldev] SUBJECT.KEYID = 5
6,345,450 UART: [ldev] AUTHORITY.KEYID = 7
6,346,733 UART: [ldev] FE.KEYID = 1
6,356,295 UART: [ldev] Erasing FE.KEYID = 1
8,833,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,703 UART: [ldev] --
10,623,842 UART: [fwproc] Wait for Commands...
10,626,141 UART: [fwproc] Recv command 0x46574c44
10,628,243 UART: [fwproc] Recv'd Img size: 114084 bytes
14,061,106 UART: ROM Fatal Error: 0x000B002C
14,064,236 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
6,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,843,947 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Manufacturing
86,139 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,208,215 UART: [idev] --
1,209,138 UART: [ldev] ++
1,209,306 UART: [ldev] CDI.KEYID = 6
1,209,670 UART: [ldev] SUBJECT.KEYID = 5
1,210,097 UART: [ldev] AUTHORITY.KEYID = 7
1,210,560 UART: [ldev] FE.KEYID = 1
1,215,948 UART: [ldev] Erasing FE.KEYID = 1
1,242,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,627 UART: ROM Fatal Error: 0x000B002C
2,601,786 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,303 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Manufacturing
85,932 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,316 UART: [kat] ++
895,468 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,198,668 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,199 UART: [ldev] --
1,281,675 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,590 UART: ROM Fatal Error: 0x000B002C
2,602,749 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,456,744 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Manufacturing
86,327 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,182,077 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,388 UART: [ldev] ++
1,209,556 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,347 UART: [ldev] AUTHORITY.KEYID = 7
1,210,810 UART: [ldev] FE.KEYID = 1
1,215,930 UART: [ldev] Erasing FE.KEYID = 1
1,242,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,958 UART: [ldev] --
1,281,250 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,879 UART: ROM Fatal Error: 0x000B002C
2,603,038 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,452,837 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Manufacturing
85,648 UART: [state] DebugLocked = No
86,252 UART: [state] WD Timer not started. Device not locked for debugging
87,407 UART: [kat] SHA2-256
890,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,044 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,241,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,527 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,073 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,440 UART: ROM Fatal Error: 0x000B002C
2,602,599 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,766 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Manufacturing
85,793 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,173 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,881 UART: ROM Fatal Error: 0x000B002C
2,602,040 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,545 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Manufacturing
85,734 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,503 UART: [kat] HMAC-384Kdf
920,097 UART: [kat] LMS
1,168,409 UART: [kat] --
1,169,590 UART: [cold-reset] ++
1,169,972 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,181,854 UART: [idev] Erasing UDS.KEYID = 0
1,198,420 UART: [idev] Sha1 KeyId Algorithm
1,207,122 UART: [idev] --
1,208,295 UART: [ldev] ++
1,208,463 UART: [ldev] CDI.KEYID = 6
1,208,827 UART: [ldev] SUBJECT.KEYID = 5
1,209,254 UART: [ldev] AUTHORITY.KEYID = 7
1,209,717 UART: [ldev] FE.KEYID = 1
1,215,003 UART: [ldev] Erasing FE.KEYID = 1
1,241,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,543 UART: [ldev] --
1,280,909 UART: [fwproc] Wait for Commands...
1,281,718 UART: [fwproc] Recv command 0x46574c44
1,282,451 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,730 UART: ROM Fatal Error: 0x000B002C
2,602,889 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,456,388 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
5,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,132 UART:
192,516 UART: Running Caliptra ROM ...
193,684 UART:
193,836 UART: [state] CFI Enabled
269,847 UART: [state] LifecycleState = Manufacturing
272,206 UART: [state] DebugLocked = No
273,749 UART: [state] WD Timer not started. Device not locked for debugging
277,650 UART: [kat] SHA2-256
459,622 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,121 UART: [kat] ++
471,713 UART: [kat] sha1
482,106 UART: [kat] SHA2-256
485,161 UART: [kat] SHA2-384
490,968 UART: [kat] SHA2-512-ACC
493,575 UART: [kat] ECC-384
3,775,892 UART: [kat] HMAC-384Kdf
3,804,662 UART: [kat] LMS
4,877,836 UART: [kat] --
4,884,579 UART: [cold-reset] ++
4,887,213 UART: [fht] FHT @ 0x50003400
4,897,702 UART: [idev] ++
4,898,433 UART: [idev] CDI.KEYID = 6
4,899,613 UART: [idev] SUBJECT.KEYID = 7
4,900,787 UART: [idev] UDS.KEYID = 0
4,931,386 UART: [idev] Erasing UDS.KEYID = 0
8,242,628 UART: [idev] Sha1 KeyId Algorithm
8,264,405 UART: [idev] --
8,268,129 UART: [ldev] ++
8,268,753 UART: [ldev] CDI.KEYID = 6
8,269,936 UART: [ldev] SUBJECT.KEYID = 5
8,271,090 UART: [ldev] AUTHORITY.KEYID = 7
8,272,320 UART: [ldev] FE.KEYID = 1
8,319,160 UART: [ldev] Erasing FE.KEYID = 1
11,656,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,509 UART: [ldev] --
14,041,524 UART: [fwproc] Wait for Commands...
14,043,676 UART: [fwproc] Recv command 0x46574c44
14,046,044 UART: [fwproc] Recv'd Img size: 113760 bytes
18,138,848 UART: ROM Fatal Error: 0x000B002E
18,142,191 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
5,540 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,951,378 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
5,954 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,383 UART:
192,763 UART: Running Caliptra ROM ...
193,839 UART:
603,679 UART: [state] CFI Enabled
616,659 UART: [state] LifecycleState = Manufacturing
619,033 UART: [state] DebugLocked = No
621,570 UART: [state] WD Timer not started. Device not locked for debugging
626,505 UART: [kat] SHA2-256
808,454 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,015 UART: [kat] ++
820,522 UART: [kat] sha1
831,228 UART: [kat] SHA2-256
834,288 UART: [kat] SHA2-384
839,562 UART: [kat] SHA2-512-ACC
842,212 UART: [kat] ECC-384
4,096,696 UART: [kat] HMAC-384Kdf
4,109,338 UART: [kat] LMS
5,182,528 UART: [kat] --
5,187,963 UART: [cold-reset] ++
5,190,666 UART: [fht] FHT @ 0x50003400
5,202,831 UART: [idev] ++
5,203,553 UART: [idev] CDI.KEYID = 6
5,204,709 UART: [idev] SUBJECT.KEYID = 7
5,206,178 UART: [idev] UDS.KEYID = 0
5,221,471 UART: [idev] Erasing UDS.KEYID = 0
8,494,618 UART: [idev] Sha1 KeyId Algorithm
8,515,158 UART: [idev] --
8,520,135 UART: [ldev] ++
8,520,745 UART: [ldev] CDI.KEYID = 6
8,521,847 UART: [ldev] SUBJECT.KEYID = 5
8,523,379 UART: [ldev] AUTHORITY.KEYID = 7
8,524,854 UART: [ldev] FE.KEYID = 1
8,535,606 UART: [ldev] Erasing FE.KEYID = 1
11,828,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,057 UART: [ldev] --
14,195,238 UART: [fwproc] Wait for Commands...
14,198,202 UART: [fwproc] Recv command 0x46574c44
14,200,576 UART: [fwproc] Recv'd Img size: 113760 bytes
18,300,067 UART: ROM Fatal Error: 0x000B002E
18,303,479 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
6,013 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,107,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
5,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,161 UART:
192,537 UART: Running Caliptra ROM ...
193,712 UART:
193,861 UART: [state] CFI Enabled
266,534 UART: [state] LifecycleState = Manufacturing
268,457 UART: [state] DebugLocked = No
270,325 UART: [state] WD Timer not started. Device not locked for debugging
273,948 UART: [kat] SHA2-256
453,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,617 UART: [kat] ++
465,120 UART: [kat] sha1
475,743 UART: [kat] SHA2-256
478,760 UART: [kat] SHA2-384
483,617 UART: [kat] SHA2-512-ACC
486,546 UART: [kat] ECC-384
2,948,649 UART: [kat] HMAC-384Kdf
2,971,591 UART: [kat] LMS
3,501,053 UART: [kat] --
3,506,348 UART: [cold-reset] ++
3,507,957 UART: [fht] FHT @ 0x50003400
3,518,837 UART: [idev] ++
3,519,448 UART: [idev] CDI.KEYID = 6
3,520,380 UART: [idev] SUBJECT.KEYID = 7
3,521,480 UART: [idev] UDS.KEYID = 0
3,543,768 UART: [idev] Erasing UDS.KEYID = 0
6,025,378 UART: [idev] Sha1 KeyId Algorithm
6,047,957 UART: [idev] --
6,050,547 UART: [ldev] ++
6,051,138 UART: [ldev] CDI.KEYID = 6
6,052,050 UART: [ldev] SUBJECT.KEYID = 5
6,053,215 UART: [ldev] AUTHORITY.KEYID = 7
6,054,456 UART: [ldev] FE.KEYID = 1
6,099,472 UART: [ldev] Erasing FE.KEYID = 1
8,599,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,363 UART: [ldev] --
10,390,656 UART: [fwproc] Wait for Commands...
10,393,498 UART: [fwproc] Recv command 0x46574c44
10,395,613 UART: [fwproc] Recv'd Img size: 114084 bytes
13,829,939 UART: ROM Fatal Error: 0x000B002E
13,833,050 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
5,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,637,246 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
6,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,492 UART:
192,893 UART: Running Caliptra ROM ...
193,994 UART:
603,478 UART: [state] CFI Enabled
618,214 UART: [state] LifecycleState = Manufacturing
620,092 UART: [state] DebugLocked = No
621,656 UART: [state] WD Timer not started. Device not locked for debugging
626,245 UART: [kat] SHA2-256
805,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,978 UART: [kat] ++
817,423 UART: [kat] sha1
828,566 UART: [kat] SHA2-256
831,622 UART: [kat] SHA2-384
836,565 UART: [kat] SHA2-512-ACC
839,516 UART: [kat] ECC-384
3,282,733 UART: [kat] HMAC-384Kdf
3,294,973 UART: [kat] LMS
3,824,455 UART: [kat] --
3,828,577 UART: [cold-reset] ++
3,829,429 UART: [fht] FHT @ 0x50003400
3,839,733 UART: [idev] ++
3,840,296 UART: [idev] CDI.KEYID = 6
3,841,173 UART: [idev] SUBJECT.KEYID = 7
3,842,384 UART: [idev] UDS.KEYID = 0
3,860,198 UART: [idev] Erasing UDS.KEYID = 0
6,318,969 UART: [idev] Sha1 KeyId Algorithm
6,342,036 UART: [idev] --
6,346,786 UART: [ldev] ++
6,347,351 UART: [ldev] CDI.KEYID = 6
6,348,257 UART: [ldev] SUBJECT.KEYID = 5
6,349,495 UART: [ldev] AUTHORITY.KEYID = 7
6,350,724 UART: [ldev] FE.KEYID = 1
6,358,670 UART: [ldev] Erasing FE.KEYID = 1
8,830,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,039 UART: [ldev] --
10,622,616 UART: [fwproc] Wait for Commands...
10,625,841 UART: [fwproc] Recv command 0x46574c44
10,627,877 UART: [fwproc] Recv'd Img size: 114084 bytes
14,058,982 UART: ROM Fatal Error: 0x000B002E
14,062,122 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,441 writing to cptra_bootfsm_go
7,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,860,265 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
5,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,030 UART:
192,437 UART: Running Caliptra ROM ...
193,525 UART:
193,668 UART: [state] CFI Enabled
266,491 UART: [state] LifecycleState = Manufacturing
268,358 UART: [state] DebugLocked = No
270,160 UART: [state] WD Timer not started. Device not locked for debugging
274,772 UART: [kat] SHA2-256
453,931 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,459 UART: [kat] ++
465,902 UART: [kat] sha1
476,504 UART: [kat] SHA2-256
479,516 UART: [kat] SHA2-384
486,356 UART: [kat] SHA2-512-ACC
489,291 UART: [kat] ECC-384
2,950,678 UART: [kat] HMAC-384Kdf
2,972,625 UART: [kat] LMS
3,502,050 UART: [kat] --
3,507,094 UART: [cold-reset] ++
3,508,937 UART: [fht] FHT @ 0x50003400
3,519,437 UART: [idev] ++
3,520,001 UART: [idev] CDI.KEYID = 6
3,520,946 UART: [idev] SUBJECT.KEYID = 7
3,522,112 UART: [idev] UDS.KEYID = 0
3,544,522 UART: [idev] Erasing UDS.KEYID = 0
6,027,861 UART: [idev] Sha1 KeyId Algorithm
6,050,783 UART: [idev] --
6,053,917 UART: [ldev] ++
6,054,492 UART: [ldev] CDI.KEYID = 6
6,055,563 UART: [ldev] SUBJECT.KEYID = 5
6,056,674 UART: [ldev] AUTHORITY.KEYID = 7
6,057,853 UART: [ldev] FE.KEYID = 1
6,100,857 UART: [ldev] Erasing FE.KEYID = 1
8,604,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,326 UART: [ldev] --
10,392,943 UART: [fwproc] Wait for Commands...
10,395,904 UART: [fwproc] Recv command 0x46574c44
10,398,003 UART: [fwproc] Recv'd Img size: 114084 bytes
13,828,153 UART: ROM Fatal Error: 0x000B002E
13,831,293 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
5,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,660,579 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
6,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,551 UART:
192,939 UART: Running Caliptra ROM ...
194,045 UART:
603,497 UART: [state] CFI Enabled
617,738 UART: [state] LifecycleState = Manufacturing
619,623 UART: [state] DebugLocked = No
622,190 UART: [state] WD Timer not started. Device not locked for debugging
626,717 UART: [kat] SHA2-256
805,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,431 UART: [kat] ++
817,961 UART: [kat] sha1
829,274 UART: [kat] SHA2-256
832,282 UART: [kat] SHA2-384
837,629 UART: [kat] SHA2-512-ACC
840,575 UART: [kat] ECC-384
3,281,813 UART: [kat] HMAC-384Kdf
3,294,881 UART: [kat] LMS
3,824,387 UART: [kat] --
3,829,817 UART: [cold-reset] ++
3,831,432 UART: [fht] FHT @ 0x50003400
3,841,272 UART: [idev] ++
3,841,840 UART: [idev] CDI.KEYID = 6
3,842,754 UART: [idev] SUBJECT.KEYID = 7
3,843,968 UART: [idev] UDS.KEYID = 0
3,857,459 UART: [idev] Erasing UDS.KEYID = 0
6,316,989 UART: [idev] Sha1 KeyId Algorithm
6,340,704 UART: [idev] --
6,345,671 UART: [ldev] ++
6,346,235 UART: [ldev] CDI.KEYID = 6
6,347,215 UART: [ldev] SUBJECT.KEYID = 5
6,348,375 UART: [ldev] AUTHORITY.KEYID = 7
6,349,603 UART: [ldev] FE.KEYID = 1
6,360,372 UART: [ldev] Erasing FE.KEYID = 1
8,837,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,995 UART: [ldev] --
10,629,664 UART: [fwproc] Wait for Commands...
10,631,160 UART: [fwproc] Recv command 0x46574c44
10,633,251 UART: [fwproc] Recv'd Img size: 114084 bytes
14,059,710 UART: ROM Fatal Error: 0x000B002E
14,062,789 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
6,402 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,839,335 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Manufacturing
85,871 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,013 UART: [fht] FHT @ 0x50003400
1,172,787 UART: [idev] ++
1,172,955 UART: [idev] CDI.KEYID = 6
1,173,316 UART: [idev] SUBJECT.KEYID = 7
1,173,741 UART: [idev] UDS.KEYID = 0
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,007 UART: [idev] Sha1 KeyId Algorithm
1,206,763 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,584 UART: [ldev] Erasing FE.KEYID = 1
1,240,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,854 UART: [ldev] --
1,280,130 UART: [fwproc] Wait for Commands...
1,280,723 UART: [fwproc] Recv command 0x46574c44
1,281,456 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,757 UART: ROM Fatal Error: 0x000B002E
2,601,916 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,517 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Manufacturing
85,628 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,393 UART: [kat] SHA2-256
890,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,502 UART: [kat] SHA2-256
901,442 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,106 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,953 UART: [ldev] ++
1,209,121 UART: [ldev] CDI.KEYID = 6
1,209,485 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,981 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,624 UART: ROM Fatal Error: 0x000B002E
2,602,783 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,774 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Manufacturing
86,037 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,683 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,182,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,999 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,619 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,323 UART: ROM Fatal Error: 0x000B002E
2,601,482 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,039 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Manufacturing
85,924 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,636 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,854 UART: [idev] ++
1,174,022 UART: [idev] CDI.KEYID = 6
1,174,383 UART: [idev] SUBJECT.KEYID = 7
1,174,808 UART: [idev] UDS.KEYID = 0
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,746 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,341 UART: [fwproc] Wait for Commands...
1,283,114 UART: [fwproc] Recv command 0x46574c44
1,283,847 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,246 UART: ROM Fatal Error: 0x000B002E
2,603,405 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,455,688 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Manufacturing
85,691 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,973 UART: [idev] ++
1,173,141 UART: [idev] CDI.KEYID = 6
1,173,502 UART: [idev] SUBJECT.KEYID = 7
1,173,927 UART: [idev] UDS.KEYID = 0
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,334 UART: [fwproc] Wait for Commands...
1,281,011 UART: [fwproc] Recv command 0x46574c44
1,281,744 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,669 UART: ROM Fatal Error: 0x000B002E
2,601,828 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,453,343 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Manufacturing
86,588 UART: [state] DebugLocked = No
87,204 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,470 UART: [kat] SHA2-256
902,410 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,030 UART: [idev] Sha1 KeyId Algorithm
1,207,890 UART: [idev] --
1,208,869 UART: [ldev] ++
1,209,037 UART: [ldev] CDI.KEYID = 6
1,209,401 UART: [ldev] SUBJECT.KEYID = 5
1,209,828 UART: [ldev] AUTHORITY.KEYID = 7
1,210,291 UART: [ldev] FE.KEYID = 1
1,215,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,435 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x46574c44
1,283,447 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,282 UART: ROM Fatal Error: 0x000B002E
2,603,441 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,455,710 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,019,650 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,241 UART:
2,163,636 UART: Running Caliptra ROM ...
2,164,825 UART:
2,165,002 UART: [state] CFI Enabled
2,165,972 UART: [state] LifecycleState = Unprovisioned
2,167,616 UART: [state] DebugLocked = No
2,168,649 UART: [state] WD Timer not started. Device not locked for debugging
2,171,123 UART: [kat] SHA2-256
2,171,785 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,795 UART: [kat] ++
2,175,248 UART: [kat] sha1
2,175,774 UART: [kat] SHA2-256
2,176,431 UART: [kat] SHA2-384
2,177,085 UART: [kat] SHA2-512-ACC
2,177,926 UART: [kat] ECC-384
3,773,260 UART: [kat] HMAC-384Kdf
3,802,457 UART: [kat] LMS
4,875,573 UART: [kat] --
4,882,236 UART: [cold-reset] ++
4,883,741 UART: [fht] FHT @ 0x50003400
4,895,103 UART: [idev] ++
4,895,786 UART: [idev] CDI.KEYID = 6
4,897,022 UART: [idev] SUBJECT.KEYID = 7
4,898,181 UART: [idev] UDS.KEYID = 0
4,929,768 UART: [idev] Erasing UDS.KEYID = 0
8,240,141 UART: [idev] Sha1 KeyId Algorithm
8,261,937 UART: [idev] --
8,266,315 UART: [ldev] ++
8,266,884 UART: [ldev] CDI.KEYID = 6
8,268,120 UART: [ldev] SUBJECT.KEYID = 5
8,269,284 UART: [ldev] AUTHORITY.KEYID = 7
8,270,514 UART: [ldev] FE.KEYID = 1
8,316,605 UART: [ldev] Erasing FE.KEYID = 1
11,654,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,453 UART: [ldev] --
14,036,726 UART: [fwproc] Wait for Commands...
14,038,562 UART: [fwproc] Recv command 0x46574c44
14,040,835 UART: [fwproc] Recv'd Img size: 113760 bytes
16,741,915 UART: ROM Fatal Error: 0x000B0018
16,745,325 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,033,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,515,210 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
2,023,998 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,167,697 UART:
2,168,073 UART: Running Caliptra ROM ...
2,169,175 UART:
2,169,329 UART: [state] CFI Enabled
2,170,293 UART: [state] LifecycleState = Unprovisioned
2,171,931 UART: [state] DebugLocked = No
2,172,950 UART: [state] WD Timer not started. Device not locked for debugging
2,175,422 UART: [kat] SHA2-256
2,176,089 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,101 UART: [kat] ++
2,179,553 UART: [kat] sha1
2,180,057 UART: [kat] SHA2-256
2,180,794 UART: [kat] SHA2-384
2,181,454 UART: [kat] SHA2-512-ACC
2,182,278 UART: [kat] ECC-384
4,093,424 UART: [kat] HMAC-384Kdf
4,105,714 UART: [kat] LMS
5,178,865 UART: [kat] --
5,184,836 UART: [cold-reset] ++
5,186,506 UART: [fht] FHT @ 0x50003400
5,198,838 UART: [idev] ++
5,199,512 UART: [idev] CDI.KEYID = 6
5,200,675 UART: [idev] SUBJECT.KEYID = 7
5,202,215 UART: [idev] UDS.KEYID = 0
5,221,348 UART: [idev] Erasing UDS.KEYID = 0
8,496,308 UART: [idev] Sha1 KeyId Algorithm
8,517,755 UART: [idev] --
8,522,940 UART: [ldev] ++
8,523,619 UART: [ldev] CDI.KEYID = 6
8,524,796 UART: [ldev] SUBJECT.KEYID = 5
8,526,284 UART: [ldev] AUTHORITY.KEYID = 7
8,527,843 UART: [ldev] FE.KEYID = 1
8,538,982 UART: [ldev] Erasing FE.KEYID = 1
11,829,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,320 UART: [ldev] --
14,191,068 UART: [fwproc] Wait for Commands...
14,194,192 UART: [fwproc] Recv command 0x46574c44
14,196,523 UART: [fwproc] Recv'd Img size: 113760 bytes
16,893,459 UART: ROM Fatal Error: 0x000B0018
16,896,918 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
2,020,893 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,711,139 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
2,023,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,544 UART:
2,167,955 UART: Running Caliptra ROM ...
2,169,129 UART:
2,169,297 UART: [state] CFI Enabled
2,170,270 UART: [state] LifecycleState = Unprovisioned
2,171,918 UART: [state] DebugLocked = No
2,172,947 UART: [state] WD Timer not started. Device not locked for debugging
2,175,411 UART: [kat] SHA2-256
2,176,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,093 UART: [kat] ++
2,179,564 UART: [kat] sha1
2,180,082 UART: [kat] SHA2-256
2,180,827 UART: [kat] SHA2-384
2,181,493 UART: [kat] SHA2-512-ACC
2,182,374 UART: [kat] ECC-384
2,948,786 UART: [kat] HMAC-384Kdf
2,971,100 UART: [kat] LMS
3,500,529 UART: [kat] --
3,505,139 UART: [cold-reset] ++
3,506,049 UART: [fht] FHT @ 0x50003400
3,516,362 UART: [idev] ++
3,516,969 UART: [idev] CDI.KEYID = 6
3,517,853 UART: [idev] SUBJECT.KEYID = 7
3,519,075 UART: [idev] UDS.KEYID = 0
3,542,216 UART: [idev] Erasing UDS.KEYID = 0
6,027,740 UART: [idev] Sha1 KeyId Algorithm
6,050,662 UART: [idev] --
6,053,366 UART: [ldev] ++
6,053,941 UART: [ldev] CDI.KEYID = 6
6,054,870 UART: [ldev] SUBJECT.KEYID = 5
6,055,974 UART: [ldev] AUTHORITY.KEYID = 7
6,057,265 UART: [ldev] FE.KEYID = 1
6,098,759 UART: [ldev] Erasing FE.KEYID = 1
8,600,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,270 UART: [ldev] --
10,411,734 UART: [fwproc] Wait for Commands...
10,413,675 UART: [fwproc] Recv command 0x46574c44
10,415,773 UART: [fwproc] Recv'd Img size: 114084 bytes
12,468,313 UART: ROM Fatal Error: 0x000B0018
12,471,441 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,032,548 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,248,155 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
2,028,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,172,691 UART:
2,173,096 UART: Running Caliptra ROM ...
2,174,274 UART:
2,174,445 UART: [state] CFI Enabled
2,175,416 UART: [state] LifecycleState = Unprovisioned
2,177,056 UART: [state] DebugLocked = No
2,178,160 UART: [state] WD Timer not started. Device not locked for debugging
2,180,625 UART: [kat] SHA2-256
2,181,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,296 UART: [kat] ++
2,184,745 UART: [kat] sha1
2,185,255 UART: [kat] SHA2-256
2,185,989 UART: [kat] SHA2-384
2,186,651 UART: [kat] SHA2-512-ACC
2,187,492 UART: [kat] ECC-384
3,284,251 UART: [kat] HMAC-384Kdf
3,297,118 UART: [kat] LMS
3,826,633 UART: [kat] --
3,828,976 UART: [cold-reset] ++
3,829,828 UART: [fht] FHT @ 0x50003400
3,842,207 UART: [idev] ++
3,842,771 UART: [idev] CDI.KEYID = 6
3,843,731 UART: [idev] SUBJECT.KEYID = 7
3,844,897 UART: [idev] UDS.KEYID = 0
3,863,244 UART: [idev] Erasing UDS.KEYID = 0
6,320,523 UART: [idev] Sha1 KeyId Algorithm
6,342,280 UART: [idev] --
6,347,303 UART: [ldev] ++
6,347,871 UART: [ldev] CDI.KEYID = 6
6,348,778 UART: [ldev] SUBJECT.KEYID = 5
6,349,993 UART: [ldev] AUTHORITY.KEYID = 7
6,351,238 UART: [ldev] FE.KEYID = 1
6,359,832 UART: [ldev] Erasing FE.KEYID = 1
8,836,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,060 UART: [ldev] --
10,627,178 UART: [fwproc] Wait for Commands...
10,630,355 UART: [fwproc] Recv command 0x46574c44
10,632,450 UART: [fwproc] Recv'd Img size: 114084 bytes
12,681,221 UART: ROM Fatal Error: 0x000B0018
12,684,352 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,020,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,453,310 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,022,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,972 UART:
2,167,367 UART: Running Caliptra ROM ...
2,168,449 UART:
2,168,600 UART: [state] CFI Enabled
2,169,588 UART: [state] LifecycleState = Unprovisioned
2,171,240 UART: [state] DebugLocked = No
2,172,267 UART: [state] WD Timer not started. Device not locked for debugging
2,174,728 UART: [kat] SHA2-256
2,175,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,406 UART: [kat] ++
2,178,853 UART: [kat] sha1
2,179,363 UART: [kat] SHA2-256
2,180,019 UART: [kat] SHA2-384
2,180,677 UART: [kat] SHA2-512-ACC
2,181,740 UART: [kat] ECC-384
2,946,406 UART: [kat] HMAC-384Kdf
2,971,337 UART: [kat] LMS
3,500,743 UART: [kat] --
3,506,112 UART: [cold-reset] ++
3,507,947 UART: [fht] FHT @ 0x50003400
3,517,526 UART: [idev] ++
3,518,091 UART: [idev] CDI.KEYID = 6
3,519,001 UART: [idev] SUBJECT.KEYID = 7
3,520,223 UART: [idev] UDS.KEYID = 0
3,542,187 UART: [idev] Erasing UDS.KEYID = 0
6,028,422 UART: [idev] Sha1 KeyId Algorithm
6,050,846 UART: [idev] --
6,054,096 UART: [ldev] ++
6,054,669 UART: [ldev] CDI.KEYID = 6
6,055,581 UART: [ldev] SUBJECT.KEYID = 5
6,056,746 UART: [ldev] AUTHORITY.KEYID = 7
6,057,980 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,605,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,870 UART: [ldev] --
10,414,541 UART: [fwproc] Wait for Commands...
10,417,233 UART: [fwproc] Recv command 0x46574c44
10,419,330 UART: [fwproc] Recv'd Img size: 114084 bytes
12,473,025 UART: ROM Fatal Error: 0x000B0018
12,476,109 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
2,029,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,227,932 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,022,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,690 UART:
2,167,080 UART: Running Caliptra ROM ...
2,168,167 UART:
2,168,320 UART: [state] CFI Enabled
2,169,298 UART: [state] LifecycleState = Unprovisioned
2,170,954 UART: [state] DebugLocked = No
2,171,980 UART: [state] WD Timer not started. Device not locked for debugging
2,174,464 UART: [kat] SHA2-256
2,175,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,136 UART: [kat] ++
2,178,583 UART: [kat] sha1
2,179,090 UART: [kat] SHA2-256
2,179,750 UART: [kat] SHA2-384
2,180,407 UART: [kat] SHA2-512-ACC
2,181,295 UART: [kat] ECC-384
3,280,652 UART: [kat] HMAC-384Kdf
3,291,967 UART: [kat] LMS
3,821,466 UART: [kat] --
3,825,997 UART: [cold-reset] ++
3,828,091 UART: [fht] FHT @ 0x50003400
3,839,832 UART: [idev] ++
3,840,392 UART: [idev] CDI.KEYID = 6
3,841,403 UART: [idev] SUBJECT.KEYID = 7
3,842,581 UART: [idev] UDS.KEYID = 0
3,859,687 UART: [idev] Erasing UDS.KEYID = 0
6,316,127 UART: [idev] Sha1 KeyId Algorithm
6,339,387 UART: [idev] --
6,343,218 UART: [ldev] ++
6,343,786 UART: [ldev] CDI.KEYID = 6
6,344,708 UART: [ldev] SUBJECT.KEYID = 5
6,345,875 UART: [ldev] AUTHORITY.KEYID = 7
6,347,159 UART: [ldev] FE.KEYID = 1
6,357,747 UART: [ldev] Erasing FE.KEYID = 1
8,832,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,840 UART: [ldev] --
10,624,132 UART: [fwproc] Wait for Commands...
10,626,659 UART: [fwproc] Recv command 0x46574c44
10,628,750 UART: [fwproc] Recv'd Img size: 114084 bytes
12,684,631 UART: ROM Fatal Error: 0x000B0018
12,687,747 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
2,020,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,455,480 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,044 UART: [kat] SHA2-512-ACC
905,945 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,216 UART: [kat] LMS
1,168,528 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,631 UART: [idev] ++
1,172,799 UART: [idev] CDI.KEYID = 6
1,173,160 UART: [idev] SUBJECT.KEYID = 7
1,173,585 UART: [idev] UDS.KEYID = 0
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,716 UART: [ldev] ++
1,208,884 UART: [ldev] CDI.KEYID = 6
1,209,248 UART: [ldev] SUBJECT.KEYID = 5
1,209,675 UART: [ldev] AUTHORITY.KEYID = 7
1,210,138 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,242,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,282 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,712 UART: ROM Fatal Error: 0x000B0018
1,330,869 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,512 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,122 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,302 UART: [fwproc] Recv command 0x46574c44
1,284,035 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,080 UART: ROM Fatal Error: 0x000B0018
1,332,237 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,977 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,948 UART: [kat] SHA2-512-ACC
905,849 UART: [kat] ECC-384
915,342 UART: [kat] HMAC-384Kdf
919,946 UART: [kat] LMS
1,168,258 UART: [kat] --
1,169,235 UART: [cold-reset] ++
1,169,563 UART: [fht] FHT @ 0x50003400
1,172,243 UART: [idev] ++
1,172,411 UART: [idev] CDI.KEYID = 6
1,172,772 UART: [idev] SUBJECT.KEYID = 7
1,173,197 UART: [idev] UDS.KEYID = 0
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,377 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,289 UART: [fwproc] Recv command 0x46574c44
1,282,022 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,762 UART: ROM Fatal Error: 0x000B0018
1,329,919 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,554 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,696 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,270 UART: [idev] Sha1 KeyId Algorithm
1,208,348 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,041 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,283,003 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,387 UART: ROM Fatal Error: 0x000B0018
1,332,544 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,996 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,181,577 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,000 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,722 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,154 UART: ROM Fatal Error: 0x000B0018
1,331,311 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,346 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,645 UART: [kat] SHA2-512-ACC
906,546 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,629 UART: ROM Fatal Error: 0x000B0018
1,331,786 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,020,187 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,973 UART:
2,164,383 UART: Running Caliptra ROM ...
2,165,460 UART:
2,165,633 UART: [state] CFI Enabled
2,166,595 UART: [state] LifecycleState = Unprovisioned
2,168,236 UART: [state] DebugLocked = No
2,169,337 UART: [state] WD Timer not started. Device not locked for debugging
2,171,811 UART: [kat] SHA2-256
2,172,481 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,491 UART: [kat] ++
2,175,937 UART: [kat] sha1
2,176,492 UART: [kat] SHA2-256
2,177,153 UART: [kat] SHA2-384
2,177,807 UART: [kat] SHA2-512-ACC
2,178,806 UART: [kat] ECC-384
3,777,771 UART: [kat] HMAC-384Kdf
3,803,347 UART: [kat] LMS
4,876,500 UART: [kat] --
4,880,892 UART: [cold-reset] ++
4,882,633 UART: [fht] FHT @ 0x50003400
4,892,538 UART: [idev] ++
4,893,205 UART: [idev] CDI.KEYID = 6
4,894,363 UART: [idev] SUBJECT.KEYID = 7
4,895,576 UART: [idev] UDS.KEYID = 0
4,931,407 UART: [idev] Erasing UDS.KEYID = 0
8,243,656 UART: [idev] Sha1 KeyId Algorithm
8,265,041 UART: [idev] --
8,269,360 UART: [ldev] ++
8,269,921 UART: [ldev] CDI.KEYID = 6
8,271,155 UART: [ldev] SUBJECT.KEYID = 5
8,272,309 UART: [ldev] AUTHORITY.KEYID = 7
8,273,535 UART: [ldev] FE.KEYID = 1
8,320,003 UART: [ldev] Erasing FE.KEYID = 1
11,656,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,774 UART: [ldev] --
14,040,446 UART: [fwproc] Wait for Commands...
14,042,206 UART: [fwproc] Recv command 0x46574c44
14,044,479 UART: [fwproc] Recv'd Img size: 113760 bytes
16,748,694 UART: ROM Fatal Error: 0x000B0017
16,752,092 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,020,007 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,163,274 UART:
2,163,666 UART: Running Caliptra ROM ...
2,164,832 UART:
2,165,015 UART: [state] CFI Enabled
2,165,978 UART: [state] LifecycleState = Unprovisioned
2,167,616 UART: [state] DebugLocked = No
2,168,719 UART: [state] WD Timer not started. Device not locked for debugging
2,171,198 UART: [kat] SHA2-256
2,171,869 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,878 UART: [kat] ++
2,175,331 UART: [kat] sha1
2,175,845 UART: [kat] SHA2-256
2,176,581 UART: [kat] SHA2-384
2,177,244 UART: [kat] SHA2-512-ACC
2,178,295 UART: [kat] ECC-384
3,774,735 UART: [kat] HMAC-384Kdf
3,800,594 UART: [kat] LMS
4,873,744 UART: [kat] --
4,877,864 UART: [cold-reset] ++
4,880,405 UART: [fht] FHT @ 0x50003400
4,891,872 UART: [idev] ++
4,892,544 UART: [idev] CDI.KEYID = 6
4,893,778 UART: [idev] SUBJECT.KEYID = 7
4,894,887 UART: [idev] UDS.KEYID = 0
4,928,931 UART: [idev] Erasing UDS.KEYID = 0
8,239,535 UART: [idev] Sha1 KeyId Algorithm
8,262,437 UART: [idev] --
8,266,669 UART: [ldev] ++
8,267,242 UART: [ldev] CDI.KEYID = 6
8,268,480 UART: [ldev] SUBJECT.KEYID = 5
8,269,578 UART: [ldev] AUTHORITY.KEYID = 7
8,270,826 UART: [ldev] FE.KEYID = 1
8,316,204 UART: [ldev] Erasing FE.KEYID = 1
11,649,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,008,800 UART: [ldev] --
14,014,227 UART: [fwproc] Wait for Commands...
14,016,112 UART: [fwproc] Recv command 0x46574c44
14,018,622 UART: [fwproc] Recv'd Img size: 113760 bytes
16,719,571 UART: ROM Fatal Error: 0x000B0017
16,722,979 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,022,022 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,422 UART:
2,165,807 UART: Running Caliptra ROM ...
2,166,976 UART:
2,167,147 UART: [state] CFI Enabled
2,168,107 UART: [state] LifecycleState = Unprovisioned
2,169,746 UART: [state] DebugLocked = No
2,170,856 UART: [state] WD Timer not started. Device not locked for debugging
2,173,339 UART: [kat] SHA2-256
2,174,008 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,024 UART: [kat] ++
2,177,476 UART: [kat] sha1
2,178,011 UART: [kat] SHA2-256
2,178,672 UART: [kat] SHA2-384
2,179,381 UART: [kat] SHA2-512-ACC
2,180,187 UART: [kat] ECC-384
3,777,348 UART: [kat] HMAC-384Kdf
3,802,003 UART: [kat] LMS
4,875,177 UART: [kat] --
4,879,406 UART: [cold-reset] ++
4,881,989 UART: [fht] FHT @ 0x50003400
4,894,319 UART: [idev] ++
4,894,988 UART: [idev] CDI.KEYID = 6
4,896,227 UART: [idev] SUBJECT.KEYID = 7
4,897,334 UART: [idev] UDS.KEYID = 0
4,928,894 UART: [idev] Erasing UDS.KEYID = 0
8,241,000 UART: [idev] Sha1 KeyId Algorithm
8,262,075 UART: [idev] --
8,264,660 UART: [ldev] ++
8,265,251 UART: [ldev] CDI.KEYID = 6
8,266,491 UART: [ldev] SUBJECT.KEYID = 5
8,267,591 UART: [ldev] AUTHORITY.KEYID = 7
8,268,817 UART: [ldev] FE.KEYID = 1
8,315,057 UART: [ldev] Erasing FE.KEYID = 1
11,648,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,688 UART: [ldev] --
14,035,211 UART: [fwproc] Wait for Commands...
14,038,176 UART: [fwproc] Recv command 0x46574c44
14,040,438 UART: [fwproc] Recv'd Img size: 113760 bytes
16,745,181 UART: ROM Fatal Error: 0x000B0017
16,748,620 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,019,785 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,501,840 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,020,654 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,531,557 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,020,920 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,549,947 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,021,137 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,007 UART:
2,165,408 UART: Running Caliptra ROM ...
2,166,580 UART:
2,166,749 UART: [state] CFI Enabled
2,167,702 UART: [state] LifecycleState = Unprovisioned
2,169,335 UART: [state] DebugLocked = No
2,170,458 UART: [state] WD Timer not started. Device not locked for debugging
2,172,933 UART: [kat] SHA2-256
2,173,597 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,599 UART: [kat] ++
2,177,043 UART: [kat] sha1
2,177,553 UART: [kat] SHA2-256
2,178,285 UART: [kat] SHA2-384
2,178,944 UART: [kat] SHA2-512-ACC
2,179,740 UART: [kat] ECC-384
4,101,441 UART: [kat] HMAC-384Kdf
4,113,183 UART: [kat] LMS
5,186,299 UART: [kat] --
5,192,409 UART: [cold-reset] ++
5,195,016 UART: [fht] FHT @ 0x50003400
5,207,029 UART: [idev] ++
5,207,703 UART: [idev] CDI.KEYID = 6
5,208,951 UART: [idev] SUBJECT.KEYID = 7
5,210,335 UART: [idev] UDS.KEYID = 0
5,226,340 UART: [idev] Erasing UDS.KEYID = 0
8,500,543 UART: [idev] Sha1 KeyId Algorithm
8,523,624 UART: [idev] --
8,528,761 UART: [ldev] ++
8,529,362 UART: [ldev] CDI.KEYID = 6
8,530,601 UART: [ldev] SUBJECT.KEYID = 5
8,532,025 UART: [ldev] AUTHORITY.KEYID = 7
8,533,575 UART: [ldev] FE.KEYID = 1
8,542,971 UART: [ldev] Erasing FE.KEYID = 1
11,836,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,244 UART: [ldev] --
14,201,255 UART: [fwproc] Wait for Commands...
14,204,750 UART: [fwproc] Recv command 0x46574c44
14,207,097 UART: [fwproc] Recv'd Img size: 113760 bytes
16,912,729 UART: ROM Fatal Error: 0x000B0017
16,916,179 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,021,173 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,164,296 UART:
2,164,683 UART: Running Caliptra ROM ...
2,165,804 UART:
2,165,962 UART: [state] CFI Enabled
2,166,922 UART: [state] LifecycleState = Unprovisioned
2,168,558 UART: [state] DebugLocked = No
2,169,656 UART: [state] WD Timer not started. Device not locked for debugging
2,172,115 UART: [kat] SHA2-256
2,172,778 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,791 UART: [kat] ++
2,176,235 UART: [kat] sha1
2,176,740 UART: [kat] SHA2-256
2,177,468 UART: [kat] SHA2-384
2,178,127 UART: [kat] SHA2-512-ACC
2,178,945 UART: [kat] ECC-384
4,101,570 UART: [kat] HMAC-384Kdf
4,113,286 UART: [kat] LMS
5,186,467 UART: [kat] --
5,192,605 UART: [cold-reset] ++
5,195,086 UART: [fht] FHT @ 0x50003400
5,207,853 UART: [idev] ++
5,208,529 UART: [idev] CDI.KEYID = 6
5,209,764 UART: [idev] SUBJECT.KEYID = 7
5,211,197 UART: [idev] UDS.KEYID = 0
5,228,301 UART: [idev] Erasing UDS.KEYID = 0
8,498,713 UART: [idev] Sha1 KeyId Algorithm
8,520,886 UART: [idev] --
8,523,806 UART: [ldev] ++
8,524,369 UART: [ldev] CDI.KEYID = 6
8,525,603 UART: [ldev] SUBJECT.KEYID = 5
8,527,033 UART: [ldev] AUTHORITY.KEYID = 7
8,528,508 UART: [ldev] FE.KEYID = 1
8,540,390 UART: [ldev] Erasing FE.KEYID = 1
11,824,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,078 UART: [ldev] --
14,189,336 UART: [fwproc] Wait for Commands...
14,192,187 UART: [fwproc] Recv command 0x46574c44
14,194,491 UART: [fwproc] Recv'd Img size: 113760 bytes
16,902,721 UART: ROM Fatal Error: 0x000B0017
16,906,183 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,025,853 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,169,200 UART:
2,169,599 UART: Running Caliptra ROM ...
2,170,767 UART:
2,170,939 UART: [state] CFI Enabled
2,171,897 UART: [state] LifecycleState = Unprovisioned
2,173,546 UART: [state] DebugLocked = No
2,174,649 UART: [state] WD Timer not started. Device not locked for debugging
2,177,116 UART: [kat] SHA2-256
2,177,779 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,785 UART: [kat] ++
2,181,233 UART: [kat] sha1
2,181,737 UART: [kat] SHA2-256
2,182,469 UART: [kat] SHA2-384
2,183,151 UART: [kat] SHA2-512-ACC
2,184,028 UART: [kat] ECC-384
4,097,557 UART: [kat] HMAC-384Kdf
4,108,982 UART: [kat] LMS
5,182,127 UART: [kat] --
5,185,934 UART: [cold-reset] ++
5,187,119 UART: [fht] FHT @ 0x50003400
5,198,805 UART: [idev] ++
5,199,571 UART: [idev] CDI.KEYID = 6
5,200,755 UART: [idev] SUBJECT.KEYID = 7
5,202,178 UART: [idev] UDS.KEYID = 0
5,218,523 UART: [idev] Erasing UDS.KEYID = 0
8,490,902 UART: [idev] Sha1 KeyId Algorithm
8,512,231 UART: [idev] --
8,515,942 UART: [ldev] ++
8,516,503 UART: [ldev] CDI.KEYID = 6
8,517,750 UART: [ldev] SUBJECT.KEYID = 5
8,519,181 UART: [ldev] AUTHORITY.KEYID = 7
8,520,796 UART: [ldev] FE.KEYID = 1
8,533,118 UART: [ldev] Erasing FE.KEYID = 1
11,829,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,937 UART: [ldev] --
14,196,334 UART: [fwproc] Wait for Commands...
14,197,990 UART: [fwproc] Recv command 0x46574c44
14,200,298 UART: [fwproc] Recv'd Img size: 113760 bytes
16,904,931 UART: ROM Fatal Error: 0x000B0017
16,908,379 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
2,026,452 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,720,088 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,020,871 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,729,068 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
2,022,072 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,718,124 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,022,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,941 UART:
2,167,341 UART: Running Caliptra ROM ...
2,168,512 UART:
2,168,682 UART: [state] CFI Enabled
2,169,655 UART: [state] LifecycleState = Unprovisioned
2,171,302 UART: [state] DebugLocked = No
2,172,413 UART: [state] WD Timer not started. Device not locked for debugging
2,175,095 UART: [kat] SHA2-256
2,175,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,792 UART: [kat] ++
2,179,244 UART: [kat] sha1
2,179,843 UART: [kat] SHA2-256
2,180,509 UART: [kat] SHA2-384
2,181,169 UART: [kat] SHA2-512-ACC
2,181,969 UART: [kat] ECC-384
2,946,140 UART: [kat] HMAC-384Kdf
2,970,099 UART: [kat] LMS
3,499,504 UART: [kat] --
3,504,194 UART: [cold-reset] ++
3,505,585 UART: [fht] FHT @ 0x50003400
3,516,993 UART: [idev] ++
3,517,557 UART: [idev] CDI.KEYID = 6
3,518,434 UART: [idev] SUBJECT.KEYID = 7
3,519,649 UART: [idev] UDS.KEYID = 0
3,542,703 UART: [idev] Erasing UDS.KEYID = 0
6,026,073 UART: [idev] Sha1 KeyId Algorithm
6,047,565 UART: [idev] --
6,051,564 UART: [ldev] ++
6,052,136 UART: [ldev] CDI.KEYID = 6
6,053,064 UART: [ldev] SUBJECT.KEYID = 5
6,054,168 UART: [ldev] AUTHORITY.KEYID = 7
6,055,474 UART: [ldev] FE.KEYID = 1
6,098,965 UART: [ldev] Erasing FE.KEYID = 1
8,601,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,765 UART: [ldev] --
10,409,870 UART: [fwproc] Wait for Commands...
10,411,809 UART: [fwproc] Recv command 0x46574c44
10,413,907 UART: [fwproc] Recv'd Img size: 114084 bytes
12,472,267 UART: ROM Fatal Error: 0x000B0017
12,475,400 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,029,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,172,993 UART:
2,173,379 UART: Running Caliptra ROM ...
2,174,498 UART:
2,174,660 UART: [state] CFI Enabled
2,175,624 UART: [state] LifecycleState = Unprovisioned
2,177,269 UART: [state] DebugLocked = No
2,178,377 UART: [state] WD Timer not started. Device not locked for debugging
2,181,069 UART: [kat] SHA2-256
2,181,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,790 UART: [kat] ++
2,185,248 UART: [kat] sha1
2,185,781 UART: [kat] SHA2-256
2,186,468 UART: [kat] SHA2-384
2,187,128 UART: [kat] SHA2-512-ACC
2,188,125 UART: [kat] ECC-384
2,944,188 UART: [kat] HMAC-384Kdf
2,969,330 UART: [kat] LMS
3,498,800 UART: [kat] --
3,503,768 UART: [cold-reset] ++
3,505,261 UART: [fht] FHT @ 0x50003400
3,515,481 UART: [idev] ++
3,516,042 UART: [idev] CDI.KEYID = 6
3,516,926 UART: [idev] SUBJECT.KEYID = 7
3,518,138 UART: [idev] UDS.KEYID = 0
3,541,455 UART: [idev] Erasing UDS.KEYID = 0
6,022,879 UART: [idev] Sha1 KeyId Algorithm
6,045,855 UART: [idev] --
6,049,929 UART: [ldev] ++
6,050,506 UART: [ldev] CDI.KEYID = 6
6,051,395 UART: [ldev] SUBJECT.KEYID = 5
6,052,562 UART: [ldev] AUTHORITY.KEYID = 7
6,053,799 UART: [ldev] FE.KEYID = 1
6,095,768 UART: [ldev] Erasing FE.KEYID = 1
8,600,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,966 UART: [ldev] --
10,407,828 UART: [fwproc] Wait for Commands...
10,410,520 UART: [fwproc] Recv command 0x46574c44
10,412,613 UART: [fwproc] Recv'd Img size: 114084 bytes
12,459,975 UART: ROM Fatal Error: 0x000B0017
12,463,119 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,021,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,406 UART:
2,165,807 UART: Running Caliptra ROM ...
2,166,973 UART:
2,167,144 UART: [state] CFI Enabled
2,168,103 UART: [state] LifecycleState = Unprovisioned
2,169,754 UART: [state] DebugLocked = No
2,170,864 UART: [state] WD Timer not started. Device not locked for debugging
2,173,362 UART: [kat] SHA2-256
2,174,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,045 UART: [kat] ++
2,177,541 UART: [kat] sha1
2,178,058 UART: [kat] SHA2-256
2,178,719 UART: [kat] SHA2-384
2,179,404 UART: [kat] SHA2-512-ACC
2,180,227 UART: [kat] ECC-384
2,948,367 UART: [kat] HMAC-384Kdf
2,969,510 UART: [kat] LMS
3,498,989 UART: [kat] --
3,504,294 UART: [cold-reset] ++
3,505,202 UART: [fht] FHT @ 0x50003400
3,515,586 UART: [idev] ++
3,516,157 UART: [idev] CDI.KEYID = 6
3,517,063 UART: [idev] SUBJECT.KEYID = 7
3,518,301 UART: [idev] UDS.KEYID = 0
3,541,729 UART: [idev] Erasing UDS.KEYID = 0
6,027,408 UART: [idev] Sha1 KeyId Algorithm
6,051,080 UART: [idev] --
6,055,351 UART: [ldev] ++
6,055,960 UART: [ldev] CDI.KEYID = 6
6,056,845 UART: [ldev] SUBJECT.KEYID = 5
6,058,065 UART: [ldev] AUTHORITY.KEYID = 7
6,059,305 UART: [ldev] FE.KEYID = 1
6,098,960 UART: [ldev] Erasing FE.KEYID = 1
8,601,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,915 UART: [ldev] --
10,408,957 UART: [fwproc] Wait for Commands...
10,411,816 UART: [fwproc] Recv command 0x46574c44
10,413,913 UART: [fwproc] Recv'd Img size: 114084 bytes
12,468,370 UART: ROM Fatal Error: 0x000B0017
12,471,505 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,035,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,249,381 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
2,021,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,254,698 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,029,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,208,624 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,024,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,104 UART:
2,169,514 UART: Running Caliptra ROM ...
2,170,601 UART:
2,170,753 UART: [state] CFI Enabled
2,171,751 UART: [state] LifecycleState = Unprovisioned
2,173,397 UART: [state] DebugLocked = No
2,174,420 UART: [state] WD Timer not started. Device not locked for debugging
2,176,884 UART: [kat] SHA2-256
2,177,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,481 UART: [kat] ++
2,181,993 UART: [kat] sha1
2,182,506 UART: [kat] SHA2-256
2,183,195 UART: [kat] SHA2-384
2,183,855 UART: [kat] SHA2-512-ACC
2,184,652 UART: [kat] ECC-384
3,280,050 UART: [kat] HMAC-384Kdf
3,293,742 UART: [kat] LMS
3,823,217 UART: [kat] --
3,826,936 UART: [cold-reset] ++
3,827,996 UART: [fht] FHT @ 0x50003400
3,837,962 UART: [idev] ++
3,838,524 UART: [idev] CDI.KEYID = 6
3,839,431 UART: [idev] SUBJECT.KEYID = 7
3,840,645 UART: [idev] UDS.KEYID = 0
3,856,347 UART: [idev] Erasing UDS.KEYID = 0
6,312,619 UART: [idev] Sha1 KeyId Algorithm
6,335,740 UART: [idev] --
6,339,843 UART: [ldev] ++
6,340,451 UART: [ldev] CDI.KEYID = 6
6,341,360 UART: [ldev] SUBJECT.KEYID = 5
6,342,467 UART: [ldev] AUTHORITY.KEYID = 7
6,343,759 UART: [ldev] FE.KEYID = 1
6,351,753 UART: [ldev] Erasing FE.KEYID = 1
8,826,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,367 UART: [ldev] --
10,617,682 UART: [fwproc] Wait for Commands...
10,620,042 UART: [fwproc] Recv command 0x46574c44
10,622,143 UART: [fwproc] Recv'd Img size: 114084 bytes
12,670,736 UART: ROM Fatal Error: 0x000B0017
12,673,863 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
2,019,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,163,809 UART:
2,164,210 UART: Running Caliptra ROM ...
2,165,290 UART:
2,165,444 UART: [state] CFI Enabled
2,166,413 UART: [state] LifecycleState = Unprovisioned
2,168,075 UART: [state] DebugLocked = No
2,169,103 UART: [state] WD Timer not started. Device not locked for debugging
2,171,570 UART: [kat] SHA2-256
2,172,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,247 UART: [kat] ++
2,175,697 UART: [kat] sha1
2,176,242 UART: [kat] SHA2-256
2,176,902 UART: [kat] SHA2-384
2,177,558 UART: [kat] SHA2-512-ACC
2,178,442 UART: [kat] ECC-384
3,282,545 UART: [kat] HMAC-384Kdf
3,295,000 UART: [kat] LMS
3,824,509 UART: [kat] --
3,828,662 UART: [cold-reset] ++
3,829,508 UART: [fht] FHT @ 0x50003400
3,841,681 UART: [idev] ++
3,842,265 UART: [idev] CDI.KEYID = 6
3,843,203 UART: [idev] SUBJECT.KEYID = 7
3,844,419 UART: [idev] UDS.KEYID = 0
3,861,670 UART: [idev] Erasing UDS.KEYID = 0
6,316,969 UART: [idev] Sha1 KeyId Algorithm
6,338,700 UART: [idev] --
6,342,266 UART: [ldev] ++
6,342,835 UART: [ldev] CDI.KEYID = 6
6,343,743 UART: [ldev] SUBJECT.KEYID = 5
6,344,905 UART: [ldev] AUTHORITY.KEYID = 7
6,346,191 UART: [ldev] FE.KEYID = 1
6,357,451 UART: [ldev] Erasing FE.KEYID = 1
8,828,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,498 UART: [ldev] --
10,616,358 UART: [fwproc] Wait for Commands...
10,618,126 UART: [fwproc] Recv command 0x46574c44
10,620,218 UART: [fwproc] Recv'd Img size: 114084 bytes
12,671,927 UART: ROM Fatal Error: 0x000B0017
12,675,053 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,022,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,101 UART:
2,166,490 UART: Running Caliptra ROM ...
2,167,593 UART:
2,167,747 UART: [state] CFI Enabled
2,168,722 UART: [state] LifecycleState = Unprovisioned
2,170,362 UART: [state] DebugLocked = No
2,171,386 UART: [state] WD Timer not started. Device not locked for debugging
2,173,853 UART: [kat] SHA2-256
2,174,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,524 UART: [kat] ++
2,177,975 UART: [kat] sha1
2,178,488 UART: [kat] SHA2-256
2,179,245 UART: [kat] SHA2-384
2,179,914 UART: [kat] SHA2-512-ACC
2,180,761 UART: [kat] ECC-384
3,275,092 UART: [kat] HMAC-384Kdf
3,287,476 UART: [kat] LMS
3,816,934 UART: [kat] --
3,822,867 UART: [cold-reset] ++
3,823,775 UART: [fht] FHT @ 0x50003400
3,834,244 UART: [idev] ++
3,834,800 UART: [idev] CDI.KEYID = 6
3,835,733 UART: [idev] SUBJECT.KEYID = 7
3,836,943 UART: [idev] UDS.KEYID = 0
3,854,565 UART: [idev] Erasing UDS.KEYID = 0
6,310,328 UART: [idev] Sha1 KeyId Algorithm
6,333,773 UART: [idev] --
6,337,498 UART: [ldev] ++
6,338,081 UART: [ldev] CDI.KEYID = 6
6,338,966 UART: [ldev] SUBJECT.KEYID = 5
6,340,178 UART: [ldev] AUTHORITY.KEYID = 7
6,341,461 UART: [ldev] FE.KEYID = 1
6,352,078 UART: [ldev] Erasing FE.KEYID = 1
8,820,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,357 UART: [ldev] --
10,612,844 UART: [fwproc] Wait for Commands...
10,615,576 UART: [fwproc] Recv command 0x46574c44
10,617,685 UART: [fwproc] Recv'd Img size: 114084 bytes
12,669,058 UART: ROM Fatal Error: 0x000B0017
12,672,187 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
2,023,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,458,164 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
2,020,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,452,015 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,021,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,440,622 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,022,156 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,791 UART:
2,167,284 UART: Running Caliptra ROM ...
2,168,379 UART:
2,168,545 UART: [state] CFI Enabled
2,169,532 UART: [state] LifecycleState = Unprovisioned
2,171,190 UART: [state] DebugLocked = No
2,172,240 UART: [state] WD Timer not started. Device not locked for debugging
2,174,958 UART: [kat] SHA2-256
2,175,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,660 UART: [kat] ++
2,179,113 UART: [kat] sha1
2,179,631 UART: [kat] SHA2-256
2,180,289 UART: [kat] SHA2-384
2,180,944 UART: [kat] SHA2-512-ACC
2,181,771 UART: [kat] ECC-384
2,947,769 UART: [kat] HMAC-384Kdf
2,975,227 UART: [kat] LMS
3,504,677 UART: [kat] --
3,508,188 UART: [cold-reset] ++
3,510,019 UART: [fht] FHT @ 0x50003400
3,521,228 UART: [idev] ++
3,521,802 UART: [idev] CDI.KEYID = 6
3,522,786 UART: [idev] SUBJECT.KEYID = 7
3,523,954 UART: [idev] UDS.KEYID = 0
3,547,529 UART: [idev] Erasing UDS.KEYID = 0
6,026,964 UART: [idev] Sha1 KeyId Algorithm
6,048,738 UART: [idev] --
6,053,277 UART: [ldev] ++
6,053,845 UART: [ldev] CDI.KEYID = 6
6,054,756 UART: [ldev] SUBJECT.KEYID = 5
6,055,918 UART: [ldev] AUTHORITY.KEYID = 7
6,057,154 UART: [ldev] FE.KEYID = 1
6,101,300 UART: [ldev] Erasing FE.KEYID = 1
8,609,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,712 UART: [ldev] --
10,413,447 UART: [fwproc] Wait for Commands...
10,415,691 UART: [fwproc] Recv command 0x46574c44
10,417,752 UART: [fwproc] Recv'd Img size: 114084 bytes
12,470,995 UART: ROM Fatal Error: 0x000B0017
12,474,134 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,021,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,169 UART:
2,165,560 UART: Running Caliptra ROM ...
2,166,656 UART:
2,166,813 UART: [state] CFI Enabled
2,167,782 UART: [state] LifecycleState = Unprovisioned
2,169,423 UART: [state] DebugLocked = No
2,170,455 UART: [state] WD Timer not started. Device not locked for debugging
2,172,929 UART: [kat] SHA2-256
2,173,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,599 UART: [kat] ++
2,177,043 UART: [kat] sha1
2,177,553 UART: [kat] SHA2-256
2,178,208 UART: [kat] SHA2-384
2,178,865 UART: [kat] SHA2-512-ACC
2,179,664 UART: [kat] ECC-384
2,926,257 UART: [kat] HMAC-384Kdf
2,950,211 UART: [kat] LMS
3,479,652 UART: [kat] --
3,483,344 UART: [cold-reset] ++
3,485,435 UART: [fht] FHT @ 0x50003400
3,495,609 UART: [idev] ++
3,496,175 UART: [idev] CDI.KEYID = 6
3,497,085 UART: [idev] SUBJECT.KEYID = 7
3,498,253 UART: [idev] UDS.KEYID = 0
3,522,552 UART: [idev] Erasing UDS.KEYID = 0
6,006,362 UART: [idev] Sha1 KeyId Algorithm
6,030,193 UART: [idev] --
6,035,324 UART: [ldev] ++
6,035,898 UART: [ldev] CDI.KEYID = 6
6,036,786 UART: [ldev] SUBJECT.KEYID = 5
6,037,949 UART: [ldev] AUTHORITY.KEYID = 7
6,039,330 UART: [ldev] FE.KEYID = 1
6,078,676 UART: [ldev] Erasing FE.KEYID = 1
8,581,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,529 UART: [ldev] --
10,393,040 UART: [fwproc] Wait for Commands...
10,396,168 UART: [fwproc] Recv command 0x46574c44
10,398,261 UART: [fwproc] Recv'd Img size: 114084 bytes
12,455,709 UART: ROM Fatal Error: 0x000B0017
12,458,842 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,022,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,165,684 UART:
2,166,079 UART: Running Caliptra ROM ...
2,167,253 UART:
2,167,415 UART: [state] CFI Enabled
2,168,369 UART: [state] LifecycleState = Unprovisioned
2,170,023 UART: [state] DebugLocked = No
2,171,136 UART: [state] WD Timer not started. Device not locked for debugging
2,173,609 UART: [kat] SHA2-256
2,174,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,288 UART: [kat] ++
2,177,739 UART: [kat] sha1
2,178,335 UART: [kat] SHA2-256
2,179,001 UART: [kat] SHA2-384
2,179,664 UART: [kat] SHA2-512-ACC
2,180,569 UART: [kat] ECC-384
2,947,544 UART: [kat] HMAC-384Kdf
2,970,789 UART: [kat] LMS
3,500,223 UART: [kat] --
3,504,430 UART: [cold-reset] ++
3,505,476 UART: [fht] FHT @ 0x50003400
3,517,219 UART: [idev] ++
3,517,784 UART: [idev] CDI.KEYID = 6
3,518,665 UART: [idev] SUBJECT.KEYID = 7
3,519,880 UART: [idev] UDS.KEYID = 0
3,542,889 UART: [idev] Erasing UDS.KEYID = 0
6,024,917 UART: [idev] Sha1 KeyId Algorithm
6,048,099 UART: [idev] --
6,051,778 UART: [ldev] ++
6,052,353 UART: [ldev] CDI.KEYID = 6
6,053,264 UART: [ldev] SUBJECT.KEYID = 5
6,054,502 UART: [ldev] AUTHORITY.KEYID = 7
6,055,686 UART: [ldev] FE.KEYID = 1
6,098,803 UART: [ldev] Erasing FE.KEYID = 1
8,602,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,418 UART: [ldev] --
10,413,847 UART: [fwproc] Wait for Commands...
10,415,892 UART: [fwproc] Recv command 0x46574c44
10,417,990 UART: [fwproc] Recv'd Img size: 114084 bytes
12,467,823 UART: ROM Fatal Error: 0x000B0017
12,470,952 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,036,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,258,736 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,021,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,243,149 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,023,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,275,004 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
2,023,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,332 UART:
2,167,759 UART: Running Caliptra ROM ...
2,168,956 UART:
2,169,125 UART: [state] CFI Enabled
2,170,096 UART: [state] LifecycleState = Unprovisioned
2,171,742 UART: [state] DebugLocked = No
2,172,844 UART: [state] WD Timer not started. Device not locked for debugging
2,175,306 UART: [kat] SHA2-256
2,175,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,989 UART: [kat] ++
2,179,484 UART: [kat] sha1
2,179,999 UART: [kat] SHA2-256
2,180,658 UART: [kat] SHA2-384
2,181,330 UART: [kat] SHA2-512-ACC
2,182,129 UART: [kat] ECC-384
3,278,839 UART: [kat] HMAC-384Kdf
3,291,282 UART: [kat] LMS
3,820,786 UART: [kat] --
3,824,149 UART: [cold-reset] ++
3,826,617 UART: [fht] FHT @ 0x50003400
3,837,213 UART: [idev] ++
3,837,813 UART: [idev] CDI.KEYID = 6
3,838,724 UART: [idev] SUBJECT.KEYID = 7
3,839,884 UART: [idev] UDS.KEYID = 0
3,858,018 UART: [idev] Erasing UDS.KEYID = 0
6,316,872 UART: [idev] Sha1 KeyId Algorithm
6,339,826 UART: [idev] --
6,344,679 UART: [ldev] ++
6,345,245 UART: [ldev] CDI.KEYID = 6
6,346,120 UART: [ldev] SUBJECT.KEYID = 5
6,347,331 UART: [ldev] AUTHORITY.KEYID = 7
6,348,617 UART: [ldev] FE.KEYID = 1
6,359,070 UART: [ldev] Erasing FE.KEYID = 1
8,835,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,597 UART: [ldev] --
10,626,963 UART: [fwproc] Wait for Commands...
10,628,787 UART: [fwproc] Recv command 0x46574c44
10,630,879 UART: [fwproc] Recv'd Img size: 114084 bytes
12,675,522 UART: ROM Fatal Error: 0x000B0017
12,678,654 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,020,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,163,954 UART:
2,164,328 UART: Running Caliptra ROM ...
2,165,487 UART:
2,165,656 UART: [state] CFI Enabled
2,166,575 UART: [state] LifecycleState = Unprovisioned
2,168,239 UART: [state] DebugLocked = No
2,169,265 UART: [state] WD Timer not started. Device not locked for debugging
2,171,729 UART: [kat] SHA2-256
2,172,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,405 UART: [kat] ++
2,175,852 UART: [kat] sha1
2,176,360 UART: [kat] SHA2-256
2,177,017 UART: [kat] SHA2-384
2,177,677 UART: [kat] SHA2-512-ACC
2,178,496 UART: [kat] ECC-384
3,286,584 UART: [kat] HMAC-384Kdf
3,298,477 UART: [kat] LMS
3,827,945 UART: [kat] --
3,833,204 UART: [cold-reset] ++
3,835,738 UART: [fht] FHT @ 0x50003400
3,846,336 UART: [idev] ++
3,846,905 UART: [idev] CDI.KEYID = 6
3,847,810 UART: [idev] SUBJECT.KEYID = 7
3,849,022 UART: [idev] UDS.KEYID = 0
3,865,054 UART: [idev] Erasing UDS.KEYID = 0
6,321,070 UART: [idev] Sha1 KeyId Algorithm
6,343,214 UART: [idev] --
6,346,714 UART: [ldev] ++
6,347,276 UART: [ldev] CDI.KEYID = 6
6,348,154 UART: [ldev] SUBJECT.KEYID = 5
6,349,384 UART: [ldev] AUTHORITY.KEYID = 7
6,350,616 UART: [ldev] FE.KEYID = 1
6,361,771 UART: [ldev] Erasing FE.KEYID = 1
8,836,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,702 UART: [ldev] --
10,630,085 UART: [fwproc] Wait for Commands...
10,633,157 UART: [fwproc] Recv command 0x46574c44
10,635,199 UART: [fwproc] Recv'd Img size: 114084 bytes
12,686,833 UART: ROM Fatal Error: 0x000B0017
12,689,961 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,024,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,944 UART:
2,168,338 UART: Running Caliptra ROM ...
2,169,517 UART:
2,169,692 UART: [state] CFI Enabled
2,170,669 UART: [state] LifecycleState = Unprovisioned
2,172,318 UART: [state] DebugLocked = No
2,173,423 UART: [state] WD Timer not started. Device not locked for debugging
2,175,893 UART: [kat] SHA2-256
2,176,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,568 UART: [kat] ++
2,180,040 UART: [kat] sha1
2,180,557 UART: [kat] SHA2-256
2,181,295 UART: [kat] SHA2-384
2,181,961 UART: [kat] SHA2-512-ACC
2,182,840 UART: [kat] ECC-384
3,282,736 UART: [kat] HMAC-384Kdf
3,296,141 UART: [kat] LMS
3,825,616 UART: [kat] --
3,829,576 UART: [cold-reset] ++
3,830,380 UART: [fht] FHT @ 0x50003400
3,841,299 UART: [idev] ++
3,841,856 UART: [idev] CDI.KEYID = 6
3,842,824 UART: [idev] SUBJECT.KEYID = 7
3,843,983 UART: [idev] UDS.KEYID = 0
3,858,447 UART: [idev] Erasing UDS.KEYID = 0
6,312,176 UART: [idev] Sha1 KeyId Algorithm
6,334,936 UART: [idev] --
6,339,818 UART: [ldev] ++
6,340,391 UART: [ldev] CDI.KEYID = 6
6,341,300 UART: [ldev] SUBJECT.KEYID = 5
6,342,466 UART: [ldev] AUTHORITY.KEYID = 7
6,343,693 UART: [ldev] FE.KEYID = 1
6,352,068 UART: [ldev] Erasing FE.KEYID = 1
8,830,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,277 UART: [ldev] --
10,620,942 UART: [fwproc] Wait for Commands...
10,623,629 UART: [fwproc] Recv command 0x46574c44
10,625,729 UART: [fwproc] Recv'd Img size: 114084 bytes
12,680,172 UART: ROM Fatal Error: 0x000B0017
12,683,296 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,021,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,454,307 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,021,334 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,451,723 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
2,019,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,461,202 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,435 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,031 UART: [idev] Sha1 KeyId Algorithm
1,206,753 UART: [idev] --
1,207,868 UART: [ldev] ++
1,208,036 UART: [ldev] CDI.KEYID = 6
1,208,400 UART: [ldev] SUBJECT.KEYID = 5
1,208,827 UART: [ldev] AUTHORITY.KEYID = 7
1,209,290 UART: [ldev] FE.KEYID = 1
1,214,640 UART: [ldev] Erasing FE.KEYID = 1
1,241,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,434 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x46574c44
1,282,792 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,840 UART: ROM Fatal Error: 0x000B0017
1,330,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,632 UART: [kat] HMAC-384Kdf
921,178 UART: [kat] LMS
1,169,490 UART: [kat] --
1,170,691 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,641 UART: [idev] ++
1,173,809 UART: [idev] CDI.KEYID = 6
1,174,170 UART: [idev] SUBJECT.KEYID = 7
1,174,595 UART: [idev] UDS.KEYID = 0
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,438 UART: [ldev] ++
1,209,606 UART: [ldev] CDI.KEYID = 6
1,209,970 UART: [ldev] SUBJECT.KEYID = 5
1,210,397 UART: [ldev] AUTHORITY.KEYID = 7
1,210,860 UART: [ldev] FE.KEYID = 1
1,216,054 UART: [ldev] Erasing FE.KEYID = 1
1,242,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,796 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,987 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,592 UART: ROM Fatal Error: 0x000B0017
1,331,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,555 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,538 UART: [ldev] ++
1,208,706 UART: [ldev] CDI.KEYID = 6
1,209,070 UART: [ldev] SUBJECT.KEYID = 5
1,209,497 UART: [ldev] AUTHORITY.KEYID = 7
1,209,960 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,472 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,519 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,310 UART: ROM Fatal Error: 0x000B0017
1,330,467 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,364 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,522 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,208,985 UART: [ldev] ++
1,209,153 UART: [ldev] CDI.KEYID = 6
1,209,517 UART: [ldev] SUBJECT.KEYID = 5
1,209,944 UART: [ldev] AUTHORITY.KEYID = 7
1,210,407 UART: [ldev] FE.KEYID = 1
1,215,361 UART: [ldev] Erasing FE.KEYID = 1
1,241,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,371 UART: [ldev] --
1,280,705 UART: [fwproc] Wait for Commands...
1,281,408 UART: [fwproc] Recv command 0x46574c44
1,282,141 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,169 UART: ROM Fatal Error: 0x000B0017
1,331,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,343 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,659 UART: ROM Fatal Error: 0x000B0017
1,331,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,099 UART: [kat] HMAC-384Kdf
920,677 UART: [kat] LMS
1,168,989 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,241 UART: [ldev] --
1,281,601 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,645 UART: ROM Fatal Error: 0x000B0017
1,331,802 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,441 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,055 UART: [kat] ++
895,207 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,815 UART: [fwproc] Recv command 0x46574c44
1,282,548 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,326 UART: ROM Fatal Error: 0x000B0017
1,330,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,240,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,554 UART: [ldev] --
1,279,972 UART: [fwproc] Wait for Commands...
1,280,775 UART: [fwproc] Recv command 0x46574c44
1,281,508 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,126 UART: ROM Fatal Error: 0x000B0017
1,329,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,559 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,182,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,862 UART: ROM Fatal Error: 0x000B0017
1,330,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,826 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,420 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,597 UART: [kat] LMS
1,168,909 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,712 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,219 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,281,951 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,359 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,801 UART: ROM Fatal Error: 0x000B0017
1,331,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,181,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,114 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,515 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,488 UART: [fwproc] Recv command 0x46574c44
1,282,221 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,623 UART: ROM Fatal Error: 0x000B0017
1,330,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
904,947 UART: [kat] SHA2-512-ACC
906,848 UART: [kat] ECC-384
916,885 UART: [kat] HMAC-384Kdf
921,409 UART: [kat] LMS
1,169,721 UART: [kat] --
1,170,876 UART: [cold-reset] ++
1,171,410 UART: [fht] FHT @ 0x50003400
1,174,082 UART: [idev] ++
1,174,250 UART: [idev] CDI.KEYID = 6
1,174,611 UART: [idev] SUBJECT.KEYID = 7
1,175,036 UART: [idev] UDS.KEYID = 0
1,182,802 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,209,276 UART: [idev] --
1,210,329 UART: [ldev] ++
1,210,497 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,288 UART: [ldev] AUTHORITY.KEYID = 7
1,211,751 UART: [ldev] FE.KEYID = 1
1,216,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,279 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46574c44
1,283,693 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,821 UART: ROM Fatal Error: 0x000B0017
1,331,978 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,371 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,522 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,169,129 UART: [cold-reset] ++
1,169,599 UART: [fht] FHT @ 0x50003400
1,172,383 UART: [idev] ++
1,172,551 UART: [idev] CDI.KEYID = 6
1,172,912 UART: [idev] SUBJECT.KEYID = 7
1,173,337 UART: [idev] UDS.KEYID = 0
1,181,289 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,464 UART: [ldev] Erasing FE.KEYID = 1
1,241,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,532 UART: ROM Fatal Error: 0x000B0017
1,330,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,498 UART: [kat] SHA2-256
891,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,207,995 UART: [idev] --
1,209,046 UART: [ldev] ++
1,209,214 UART: [ldev] CDI.KEYID = 6
1,209,578 UART: [ldev] SUBJECT.KEYID = 5
1,210,005 UART: [ldev] AUTHORITY.KEYID = 7
1,210,468 UART: [ldev] FE.KEYID = 1
1,215,476 UART: [ldev] Erasing FE.KEYID = 1
1,242,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,304 UART: [fwproc] Wait for Commands...
1,282,023 UART: [fwproc] Recv command 0x46574c44
1,282,756 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,060 UART: ROM Fatal Error: 0x000B0017
1,331,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,182,597 UART: [idev] Erasing UDS.KEYID = 0
1,199,461 UART: [idev] Sha1 KeyId Algorithm
1,208,421 UART: [idev] --
1,209,476 UART: [ldev] ++
1,209,644 UART: [ldev] CDI.KEYID = 6
1,210,008 UART: [ldev] SUBJECT.KEYID = 5
1,210,435 UART: [ldev] AUTHORITY.KEYID = 7
1,210,898 UART: [ldev] FE.KEYID = 1
1,215,956 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,090 UART: ROM Fatal Error: 0x000B0017
1,331,247 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,112 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,396 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,109 UART: [fwproc] Wait for Commands...
1,282,722 UART: [fwproc] Recv command 0x46574c44
1,283,455 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,241 UART: ROM Fatal Error: 0x000B0017
1,331,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,778 UART: [kat] ++
895,930 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,960 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,208,124 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,635 UART: [ldev] --
1,280,941 UART: [fwproc] Wait for Commands...
1,281,614 UART: [fwproc] Recv command 0x46574c44
1,282,347 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,429 UART: ROM Fatal Error: 0x000B0017
1,330,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,181,962 UART: [idev] Erasing UDS.KEYID = 0
1,198,616 UART: [idev] Sha1 KeyId Algorithm
1,207,586 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,649 UART: [ldev] Erasing FE.KEYID = 1
1,241,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,688 UART: [fwproc] Recv command 0x46574c44
1,282,421 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,683 UART: ROM Fatal Error: 0x000B0017
1,329,840 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,315 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
2,023,246 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,167,010 UART:
2,167,417 UART: Running Caliptra ROM ...
2,168,499 UART:
2,168,655 UART: [state] CFI Enabled
2,169,618 UART: [state] LifecycleState = Unprovisioned
2,171,184 UART: [state] DebugLocked = No
2,172,296 UART: [state] WD Timer not started. Device not locked for debugging
2,174,777 UART: [kat] SHA2-256
2,175,443 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,455 UART: [kat] ++
2,178,901 UART: [kat] sha1
2,179,431 UART: [kat] SHA2-256
2,180,086 UART: [kat] SHA2-384
2,180,833 UART: [kat] SHA2-512-ACC
2,181,665 UART: [kat] ECC-384
3,775,427 UART: [kat] HMAC-384Kdf
3,800,903 UART: [kat] LMS
4,874,020 UART: [kat] --
4,878,016 UART: [cold-reset] ++
4,879,246 UART: [fht] FHT @ 0x50003400
4,890,369 UART: [idev] ++
4,891,035 UART: [idev] CDI.KEYID = 6
4,892,199 UART: [idev] SUBJECT.KEYID = 7
4,893,408 UART: [idev] UDS.KEYID = 0
4,928,421 UART: [idev] Erasing UDS.KEYID = 0
8,241,177 UART: [idev] Sha1 KeyId Algorithm
8,261,973 UART: [idev] --
8,265,498 UART: [ldev] ++
8,266,122 UART: [ldev] CDI.KEYID = 6
8,267,225 UART: [ldev] SUBJECT.KEYID = 5
8,268,494 UART: [ldev] AUTHORITY.KEYID = 7
8,269,642 UART: [ldev] FE.KEYID = 1
8,296,515 UART: [ldev] Erasing FE.KEYID = 1
11,628,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,922,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,938,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,954,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,970,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,990,765 UART: [ldev] --
13,995,718 UART: [fwproc] Wait for Commands...
13,998,262 UART: [fwproc] Recv command 0x46574c44
14,000,535 UART: [fwproc] Recv'd Img size: 113760 bytes
16,703,660 UART: ROM Fatal Error: 0x000B003B
16,707,085 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
2,032,429 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,539,681 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,026,680 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,170,414 UART:
2,170,813 UART: Running Caliptra ROM ...
2,171,986 UART:
2,172,162 UART: [state] CFI Enabled
2,173,119 UART: [state] LifecycleState = Unprovisioned
2,174,757 UART: [state] DebugLocked = No
2,175,858 UART: [state] WD Timer not started. Device not locked for debugging
2,178,328 UART: [kat] SHA2-256
2,178,993 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,996 UART: [kat] ++
2,182,443 UART: [kat] sha1
2,182,948 UART: [kat] SHA2-256
2,183,705 UART: [kat] SHA2-384
2,184,370 UART: [kat] SHA2-512-ACC
2,185,244 UART: [kat] ECC-384
4,097,010 UART: [kat] HMAC-384Kdf
4,107,697 UART: [kat] LMS
5,180,855 UART: [kat] --
5,186,070 UART: [cold-reset] ++
5,188,824 UART: [fht] FHT @ 0x50003400
5,201,274 UART: [idev] ++
5,201,947 UART: [idev] CDI.KEYID = 6
5,203,183 UART: [idev] SUBJECT.KEYID = 7
5,204,612 UART: [idev] UDS.KEYID = 0
5,220,694 UART: [idev] Erasing UDS.KEYID = 0
8,495,237 UART: [idev] Sha1 KeyId Algorithm
8,518,497 UART: [idev] --
8,522,618 UART: [ldev] ++
8,523,207 UART: [ldev] CDI.KEYID = 6
8,524,453 UART: [ldev] SUBJECT.KEYID = 5
8,525,892 UART: [ldev] AUTHORITY.KEYID = 7
8,527,452 UART: [ldev] FE.KEYID = 1
8,536,801 UART: [ldev] Erasing FE.KEYID = 1
11,829,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,804 UART: [ldev] --
14,197,132 UART: [fwproc] Wait for Commands...
14,200,293 UART: [fwproc] Recv command 0x46574c44
14,202,567 UART: [fwproc] Recv'd Img size: 113760 bytes
16,904,728 UART: ROM Fatal Error: 0x000B003B
16,908,133 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,028,777 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,712,366 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,030,694 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,175,151 UART:
2,175,550 UART: Running Caliptra ROM ...
2,176,717 UART:
2,176,895 UART: [state] CFI Enabled
2,177,894 UART: [state] LifecycleState = Unprovisioned
2,179,547 UART: [state] DebugLocked = No
2,180,658 UART: [state] WD Timer not started. Device not locked for debugging
2,183,134 UART: [kat] SHA2-256
2,183,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,820 UART: [kat] ++
2,187,271 UART: [kat] sha1
2,187,784 UART: [kat] SHA2-256
2,188,523 UART: [kat] SHA2-384
2,189,189 UART: [kat] SHA2-512-ACC
2,190,070 UART: [kat] ECC-384
2,944,421 UART: [kat] HMAC-384Kdf
2,970,260 UART: [kat] LMS
3,499,721 UART: [kat] --
3,505,762 UART: [cold-reset] ++
3,506,847 UART: [fht] FHT @ 0x50003400
3,518,940 UART: [idev] ++
3,519,512 UART: [idev] CDI.KEYID = 6
3,520,493 UART: [idev] SUBJECT.KEYID = 7
3,521,655 UART: [idev] UDS.KEYID = 0
3,541,575 UART: [idev] Erasing UDS.KEYID = 0
6,024,624 UART: [idev] Sha1 KeyId Algorithm
6,047,157 UART: [idev] --
6,050,129 UART: [ldev] ++
6,050,703 UART: [ldev] CDI.KEYID = 6
6,051,611 UART: [ldev] SUBJECT.KEYID = 5
6,052,717 UART: [ldev] AUTHORITY.KEYID = 7
6,054,005 UART: [ldev] FE.KEYID = 1
6,097,029 UART: [ldev] Erasing FE.KEYID = 1
8,600,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,722 UART: [ldev] --
10,409,921 UART: [fwproc] Wait for Commands...
10,411,429 UART: [fwproc] Recv command 0x46574c44
10,413,531 UART: [fwproc] Recv'd Img size: 114084 bytes
12,468,406 UART: ROM Fatal Error: 0x000B003B
12,471,534 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,026,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,225,801 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,024,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,194 UART:
2,168,586 UART: Running Caliptra ROM ...
2,169,668 UART:
2,169,822 UART: [state] CFI Enabled
2,170,794 UART: [state] LifecycleState = Unprovisioned
2,172,673 UART: [state] DebugLocked = No
2,173,704 UART: [state] WD Timer not started. Device not locked for debugging
2,176,177 UART: [kat] SHA2-256
2,176,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,861 UART: [kat] ++
2,180,308 UART: [kat] sha1
2,180,817 UART: [kat] SHA2-256
2,181,474 UART: [kat] SHA2-384
2,182,130 UART: [kat] SHA2-512-ACC
2,182,928 UART: [kat] ECC-384
3,281,900 UART: [kat] HMAC-384Kdf
3,294,957 UART: [kat] LMS
3,824,461 UART: [kat] --
3,829,177 UART: [cold-reset] ++
3,830,678 UART: [fht] FHT @ 0x50003400
3,840,784 UART: [idev] ++
3,841,350 UART: [idev] CDI.KEYID = 6
3,842,256 UART: [idev] SUBJECT.KEYID = 7
3,843,467 UART: [idev] UDS.KEYID = 0
3,859,391 UART: [idev] Erasing UDS.KEYID = 0
6,314,263 UART: [idev] Sha1 KeyId Algorithm
6,337,246 UART: [idev] --
6,340,017 UART: [ldev] ++
6,340,597 UART: [ldev] CDI.KEYID = 6
6,341,508 UART: [ldev] SUBJECT.KEYID = 5
6,342,667 UART: [ldev] AUTHORITY.KEYID = 7
6,343,954 UART: [ldev] FE.KEYID = 1
6,354,779 UART: [ldev] Erasing FE.KEYID = 1
8,827,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,920 UART: [ldev] --
10,620,176 UART: [fwproc] Wait for Commands...
10,622,646 UART: [fwproc] Recv command 0x46574c44
10,624,738 UART: [fwproc] Recv'd Img size: 114084 bytes
12,679,396 UART: ROM Fatal Error: 0x000B003B
12,682,520 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
2,026,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,468,660 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,027,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,171,215 UART:
2,171,620 UART: Running Caliptra ROM ...
2,172,704 UART:
2,172,858 UART: [state] CFI Enabled
2,173,838 UART: [state] LifecycleState = Unprovisioned
2,175,491 UART: [state] DebugLocked = No
2,176,602 UART: [state] WD Timer not started. Device not locked for debugging
2,179,072 UART: [kat] SHA2-256
2,179,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,752 UART: [kat] ++
2,183,202 UART: [kat] sha1
2,183,736 UART: [kat] SHA2-256
2,184,474 UART: [kat] SHA2-384
2,185,138 UART: [kat] SHA2-512-ACC
2,185,985 UART: [kat] ECC-384
2,947,856 UART: [kat] HMAC-384Kdf
2,971,495 UART: [kat] LMS
3,500,944 UART: [kat] --
3,506,451 UART: [cold-reset] ++
3,508,826 UART: [fht] FHT @ 0x50003400
3,518,739 UART: [idev] ++
3,519,310 UART: [idev] CDI.KEYID = 6
3,520,218 UART: [idev] SUBJECT.KEYID = 7
3,521,432 UART: [idev] UDS.KEYID = 0
3,543,617 UART: [idev] Erasing UDS.KEYID = 0
6,026,189 UART: [idev] Sha1 KeyId Algorithm
6,049,260 UART: [idev] --
6,053,440 UART: [ldev] ++
6,054,048 UART: [ldev] CDI.KEYID = 6
6,054,943 UART: [ldev] SUBJECT.KEYID = 5
6,056,043 UART: [ldev] AUTHORITY.KEYID = 7
6,057,339 UART: [ldev] FE.KEYID = 1
6,099,688 UART: [ldev] Erasing FE.KEYID = 1
8,601,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,096 UART: [ldev] --
10,411,881 UART: [fwproc] Wait for Commands...
10,413,492 UART: [fwproc] Recv command 0x46574c44
10,415,535 UART: [fwproc] Recv'd Img size: 114084 bytes
12,470,963 UART: ROM Fatal Error: 0x000B003B
12,474,061 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,024,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,256,635 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
2,024,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,168,449 UART:
2,168,848 UART: Running Caliptra ROM ...
2,169,933 UART:
2,170,087 UART: [state] CFI Enabled
2,171,068 UART: [state] LifecycleState = Unprovisioned
2,172,631 UART: [state] DebugLocked = No
2,173,652 UART: [state] WD Timer not started. Device not locked for debugging
2,176,112 UART: [kat] SHA2-256
2,176,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,778 UART: [kat] ++
2,180,223 UART: [kat] sha1
2,180,730 UART: [kat] SHA2-256
2,181,385 UART: [kat] SHA2-384
2,182,040 UART: [kat] SHA2-512-ACC
2,183,053 UART: [kat] ECC-384
3,281,310 UART: [kat] HMAC-384Kdf
3,293,812 UART: [kat] LMS
3,823,307 UART: [kat] --
3,827,995 UART: [cold-reset] ++
3,828,945 UART: [fht] FHT @ 0x50003400
3,841,031 UART: [idev] ++
3,841,588 UART: [idev] CDI.KEYID = 6
3,842,521 UART: [idev] SUBJECT.KEYID = 7
3,843,731 UART: [idev] UDS.KEYID = 0
3,859,574 UART: [idev] Erasing UDS.KEYID = 0
6,313,647 UART: [idev] Sha1 KeyId Algorithm
6,336,679 UART: [idev] --
6,340,890 UART: [ldev] ++
6,341,452 UART: [ldev] CDI.KEYID = 6
6,342,373 UART: [ldev] SUBJECT.KEYID = 5
6,343,551 UART: [ldev] AUTHORITY.KEYID = 7
6,344,783 UART: [ldev] FE.KEYID = 1
6,354,632 UART: [ldev] Erasing FE.KEYID = 1
8,832,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,205 UART: [ldev] --
10,623,206 UART: [fwproc] Wait for Commands...
10,624,980 UART: [fwproc] Recv command 0x46574c44
10,627,075 UART: [fwproc] Recv'd Img size: 114084 bytes
12,672,510 UART: ROM Fatal Error: 0x000B003B
12,675,592 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
2,025,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,466,034 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,169,947 UART: [fht] FHT @ 0x50003400
1,172,413 UART: [idev] ++
1,172,581 UART: [idev] CDI.KEYID = 6
1,172,942 UART: [idev] SUBJECT.KEYID = 7
1,173,367 UART: [idev] UDS.KEYID = 0
1,181,111 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,241,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,676 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,196 UART: ROM Fatal Error: 0x000B003B
1,330,355 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,782 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,732 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,234 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,281,967 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,775 UART: ROM Fatal Error: 0x000B003B
1,331,934 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,755 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,181,865 UART: [idev] Erasing UDS.KEYID = 0
1,198,337 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,214,440 UART: [ldev] Erasing FE.KEYID = 1
1,240,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,188 UART: [ldev] --
1,279,476 UART: [fwproc] Wait for Commands...
1,280,099 UART: [fwproc] Recv command 0x46574c44
1,280,832 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,132 UART: ROM Fatal Error: 0x000B003B
1,329,291 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,106 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,198,776 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,473 UART: [ldev] Erasing FE.KEYID = 1
1,242,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,515 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,559 UART: ROM Fatal Error: 0x000B003B
1,331,718 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,109 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
891,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,506 UART: [kat] SHA2-512-ACC
906,407 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,715 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,182,237 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,208,145 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,858 UART: [ldev] SUBJECT.KEYID = 5
1,210,285 UART: [ldev] AUTHORITY.KEYID = 7
1,210,748 UART: [ldev] FE.KEYID = 1
1,215,906 UART: [ldev] Erasing FE.KEYID = 1
1,242,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,672 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,829 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,376 UART: ROM Fatal Error: 0x000B003B
1,331,535 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,774 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,757 UART: [state] LifecycleState = Unprovisioned
85,412 UART: [state] DebugLocked = No
86,096 UART: [state] WD Timer not started. Device not locked for debugging
87,299 UART: [kat] SHA2-256
890,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
903,927 UART: [kat] SHA2-512-ACC
905,828 UART: [kat] ECC-384
915,673 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,330 UART: [cold-reset] ++
1,169,746 UART: [fht] FHT @ 0x50003400
1,172,380 UART: [idev] ++
1,172,548 UART: [idev] CDI.KEYID = 6
1,172,909 UART: [idev] SUBJECT.KEYID = 7
1,173,334 UART: [idev] UDS.KEYID = 0
1,180,890 UART: [idev] Erasing UDS.KEYID = 0
1,198,508 UART: [idev] Sha1 KeyId Algorithm
1,207,226 UART: [idev] --
1,208,403 UART: [ldev] ++
1,208,571 UART: [ldev] CDI.KEYID = 6
1,208,935 UART: [ldev] SUBJECT.KEYID = 5
1,209,362 UART: [ldev] AUTHORITY.KEYID = 7
1,209,825 UART: [ldev] FE.KEYID = 1
1,215,083 UART: [ldev] Erasing FE.KEYID = 1
1,241,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,611 UART: [ldev] --
1,281,009 UART: [fwproc] Wait for Commands...
1,281,750 UART: [fwproc] Recv command 0x46574c44
1,282,483 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,311 UART: ROM Fatal Error: 0x000B003B
1,332,470 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,653 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,021,915 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,165,976 UART:
2,166,393 UART: Running Caliptra ROM ...
2,167,487 UART:
2,167,640 UART: [state] CFI Enabled
2,168,611 UART: [state] LifecycleState = Unprovisioned
2,170,253 UART: [state] DebugLocked = No
2,171,278 UART: [state] WD Timer not started. Device not locked for debugging
2,173,751 UART: [kat] SHA2-256
2,174,415 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,429 UART: [kat] ++
2,177,878 UART: [kat] sha1
2,178,387 UART: [kat] SHA2-256
2,179,041 UART: [kat] SHA2-384
2,179,699 UART: [kat] SHA2-512-ACC
2,180,699 UART: [kat] ECC-384
3,775,184 UART: [kat] HMAC-384Kdf
3,804,665 UART: [kat] LMS
4,877,801 UART: [kat] --
4,883,885 UART: [cold-reset] ++
4,885,467 UART: [fht] FHT @ 0x50003400
4,897,912 UART: [idev] ++
4,898,642 UART: [idev] CDI.KEYID = 6
4,899,818 UART: [idev] SUBJECT.KEYID = 7
4,900,975 UART: [idev] UDS.KEYID = 0
4,931,226 UART: [idev] Erasing UDS.KEYID = 0
8,242,205 UART: [idev] Sha1 KeyId Algorithm
8,265,226 UART: [idev] --
8,268,843 UART: [ldev] ++
8,269,414 UART: [ldev] CDI.KEYID = 6
8,270,653 UART: [ldev] SUBJECT.KEYID = 5
8,271,754 UART: [ldev] AUTHORITY.KEYID = 7
8,272,982 UART: [ldev] FE.KEYID = 1
8,320,259 UART: [ldev] Erasing FE.KEYID = 1
11,657,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,307 UART: [ldev] --
14,039,709 UART: [fwproc] Wait for Commands...
14,042,234 UART: [fwproc] Recv command 0x46574c44
14,044,504 UART: [fwproc] Recv'd Img size: 113760 bytes
16,735,082 UART: ROM Fatal Error: 0x000B0010
16,738,494 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,020,388 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,511,305 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,024,136 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,167,766 UART:
2,168,164 UART: Running Caliptra ROM ...
2,169,337 UART:
2,169,504 UART: [state] CFI Enabled
2,170,461 UART: [state] LifecycleState = Unprovisioned
2,172,100 UART: [state] DebugLocked = No
2,173,202 UART: [state] WD Timer not started. Device not locked for debugging
2,175,699 UART: [kat] SHA2-256
2,176,367 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,613 UART: [kat] ++
2,180,074 UART: [kat] sha1
2,180,586 UART: [kat] SHA2-256
2,181,323 UART: [kat] SHA2-384
2,181,985 UART: [kat] SHA2-512-ACC
2,182,808 UART: [kat] ECC-384
4,100,716 UART: [kat] HMAC-384Kdf
4,112,415 UART: [kat] LMS
5,185,572 UART: [kat] --
5,188,120 UART: [cold-reset] ++
5,188,977 UART: [fht] FHT @ 0x50003400
5,200,813 UART: [idev] ++
5,201,490 UART: [idev] CDI.KEYID = 6
5,202,726 UART: [idev] SUBJECT.KEYID = 7
5,204,181 UART: [idev] UDS.KEYID = 0
5,220,523 UART: [idev] Erasing UDS.KEYID = 0
8,490,950 UART: [idev] Sha1 KeyId Algorithm
8,513,000 UART: [idev] --
8,517,086 UART: [ldev] ++
8,517,665 UART: [ldev] CDI.KEYID = 6
8,518,851 UART: [ldev] SUBJECT.KEYID = 5
8,520,342 UART: [ldev] AUTHORITY.KEYID = 7
8,521,906 UART: [ldev] FE.KEYID = 1
8,532,071 UART: [ldev] Erasing FE.KEYID = 1
11,823,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,162,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,792 UART: [ldev] --
14,188,923 UART: [fwproc] Wait for Commands...
14,191,884 UART: [fwproc] Recv command 0x46574c44
14,194,146 UART: [fwproc] Recv'd Img size: 113760 bytes
16,887,053 UART: ROM Fatal Error: 0x000B0010
16,890,472 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,026,195 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,727,999 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,022,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,851 UART:
2,167,256 UART: Running Caliptra ROM ...
2,168,429 UART:
2,168,602 UART: [state] CFI Enabled
2,169,580 UART: [state] LifecycleState = Unprovisioned
2,171,223 UART: [state] DebugLocked = No
2,172,337 UART: [state] WD Timer not started. Device not locked for debugging
2,174,807 UART: [kat] SHA2-256
2,175,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,479 UART: [kat] ++
2,178,930 UART: [kat] sha1
2,179,446 UART: [kat] SHA2-256
2,180,188 UART: [kat] SHA2-384
2,180,877 UART: [kat] SHA2-512-ACC
2,181,766 UART: [kat] ECC-384
2,928,111 UART: [kat] HMAC-384Kdf
2,949,831 UART: [kat] LMS
3,479,263 UART: [kat] --
3,485,929 UART: [cold-reset] ++
3,487,399 UART: [fht] FHT @ 0x50003400
3,498,707 UART: [idev] ++
3,499,273 UART: [idev] CDI.KEYID = 6
3,500,197 UART: [idev] SUBJECT.KEYID = 7
3,501,357 UART: [idev] UDS.KEYID = 0
3,522,133 UART: [idev] Erasing UDS.KEYID = 0
6,006,074 UART: [idev] Sha1 KeyId Algorithm
6,029,664 UART: [idev] --
6,033,780 UART: [ldev] ++
6,034,354 UART: [ldev] CDI.KEYID = 6
6,035,285 UART: [ldev] SUBJECT.KEYID = 5
6,036,454 UART: [ldev] AUTHORITY.KEYID = 7
6,037,689 UART: [ldev] FE.KEYID = 1
6,077,968 UART: [ldev] Erasing FE.KEYID = 1
8,581,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,227 UART: [ldev] --
10,392,587 UART: [fwproc] Wait for Commands...
10,395,663 UART: [fwproc] Recv command 0x46574c44
10,397,762 UART: [fwproc] Recv'd Img size: 114084 bytes
12,441,517 UART: ROM Fatal Error: 0x000B0010
12,444,642 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,499 writing to cptra_bootfsm_go
2,030,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,246,607 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,025,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,169,574 UART:
2,169,983 UART: Running Caliptra ROM ...
2,171,153 UART:
2,171,324 UART: [state] CFI Enabled
2,172,301 UART: [state] LifecycleState = Unprovisioned
2,173,943 UART: [state] DebugLocked = No
2,175,047 UART: [state] WD Timer not started. Device not locked for debugging
2,177,515 UART: [kat] SHA2-256
2,178,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,213 UART: [kat] ++
2,181,702 UART: [kat] sha1
2,182,217 UART: [kat] SHA2-256
2,182,954 UART: [kat] SHA2-384
2,183,620 UART: [kat] SHA2-512-ACC
2,184,450 UART: [kat] ECC-384
3,272,810 UART: [kat] HMAC-384Kdf
3,285,154 UART: [kat] LMS
3,814,667 UART: [kat] --
3,819,567 UART: [cold-reset] ++
3,821,412 UART: [fht] FHT @ 0x50003400
3,833,853 UART: [idev] ++
3,834,424 UART: [idev] CDI.KEYID = 6
3,835,334 UART: [idev] SUBJECT.KEYID = 7
3,836,493 UART: [idev] UDS.KEYID = 0
3,853,994 UART: [idev] Erasing UDS.KEYID = 0
6,307,691 UART: [idev] Sha1 KeyId Algorithm
6,329,997 UART: [idev] --
6,333,882 UART: [ldev] ++
6,334,452 UART: [ldev] CDI.KEYID = 6
6,335,361 UART: [ldev] SUBJECT.KEYID = 5
6,336,518 UART: [ldev] AUTHORITY.KEYID = 7
6,337,802 UART: [ldev] FE.KEYID = 1
6,350,555 UART: [ldev] Erasing FE.KEYID = 1
8,822,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,749 UART: [ldev] --
10,613,687 UART: [fwproc] Wait for Commands...
10,615,318 UART: [fwproc] Recv command 0x46574c44
10,617,464 UART: [fwproc] Recv'd Img size: 114084 bytes
12,656,897 UART: ROM Fatal Error: 0x000B0010
12,660,027 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
2,027,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,440,996 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,022,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,887 UART:
2,167,290 UART: Running Caliptra ROM ...
2,168,393 UART:
2,168,554 UART: [state] CFI Enabled
2,169,531 UART: [state] LifecycleState = Unprovisioned
2,171,175 UART: [state] DebugLocked = No
2,172,284 UART: [state] WD Timer not started. Device not locked for debugging
2,174,756 UART: [kat] SHA2-256
2,175,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,425 UART: [kat] ++
2,178,873 UART: [kat] sha1
2,179,428 UART: [kat] SHA2-256
2,180,085 UART: [kat] SHA2-384
2,180,741 UART: [kat] SHA2-512-ACC
2,181,627 UART: [kat] ECC-384
2,948,322 UART: [kat] HMAC-384Kdf
2,972,808 UART: [kat] LMS
3,502,298 UART: [kat] --
3,506,740 UART: [cold-reset] ++
3,508,629 UART: [fht] FHT @ 0x50003400
3,518,967 UART: [idev] ++
3,519,530 UART: [idev] CDI.KEYID = 6
3,520,548 UART: [idev] SUBJECT.KEYID = 7
3,521,651 UART: [idev] UDS.KEYID = 0
3,544,004 UART: [idev] Erasing UDS.KEYID = 0
6,024,826 UART: [idev] Sha1 KeyId Algorithm
6,047,721 UART: [idev] --
6,052,611 UART: [ldev] ++
6,053,230 UART: [ldev] CDI.KEYID = 6
6,054,122 UART: [ldev] SUBJECT.KEYID = 5
6,055,245 UART: [ldev] AUTHORITY.KEYID = 7
6,056,544 UART: [ldev] FE.KEYID = 1
6,091,152 UART: [ldev] Erasing FE.KEYID = 1
8,592,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,301 UART: [ldev] --
10,387,738 UART: [fwproc] Wait for Commands...
10,389,245 UART: [fwproc] Recv command 0x46574c44
10,391,348 UART: [fwproc] Recv'd Img size: 114084 bytes
12,434,989 UART: ROM Fatal Error: 0x000B0010
12,438,112 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,039,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,278,514 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,023,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,167,660 UART:
2,168,067 UART: Running Caliptra ROM ...
2,169,147 UART:
2,169,302 UART: [state] CFI Enabled
2,170,281 UART: [state] LifecycleState = Unprovisioned
2,171,925 UART: [state] DebugLocked = No
2,172,945 UART: [state] WD Timer not started. Device not locked for debugging
2,175,409 UART: [kat] SHA2-256
2,176,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,114 UART: [kat] ++
2,179,564 UART: [kat] sha1
2,180,075 UART: [kat] SHA2-256
2,180,815 UART: [kat] SHA2-384
2,181,505 UART: [kat] SHA2-512-ACC
2,182,390 UART: [kat] ECC-384
3,277,820 UART: [kat] HMAC-384Kdf
3,291,122 UART: [kat] LMS
3,820,630 UART: [kat] --
3,826,777 UART: [cold-reset] ++
3,828,915 UART: [fht] FHT @ 0x50003400
3,840,317 UART: [idev] ++
3,840,920 UART: [idev] CDI.KEYID = 6
3,841,847 UART: [idev] SUBJECT.KEYID = 7
3,842,951 UART: [idev] UDS.KEYID = 0
3,858,505 UART: [idev] Erasing UDS.KEYID = 0
6,311,640 UART: [idev] Sha1 KeyId Algorithm
6,333,791 UART: [idev] --
6,339,215 UART: [ldev] ++
6,339,786 UART: [ldev] CDI.KEYID = 6
6,340,696 UART: [ldev] SUBJECT.KEYID = 5
6,341,852 UART: [ldev] AUTHORITY.KEYID = 7
6,343,079 UART: [ldev] FE.KEYID = 1
6,354,590 UART: [ldev] Erasing FE.KEYID = 1
8,828,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,878 UART: [ldev] --
10,618,982 UART: [fwproc] Wait for Commands...
10,621,473 UART: [fwproc] Recv command 0x46574c44
10,623,564 UART: [fwproc] Recv'd Img size: 114084 bytes
12,663,819 UART: ROM Fatal Error: 0x000B0010
12,666,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
2,023,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,441,372 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,202 UART: [kat] LMS
1,168,514 UART: [kat] --
1,169,461 UART: [cold-reset] ++
1,169,873 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,493 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,230 UART: [ldev] ++
1,208,398 UART: [ldev] CDI.KEYID = 6
1,208,762 UART: [ldev] SUBJECT.KEYID = 5
1,209,189 UART: [ldev] AUTHORITY.KEYID = 7
1,209,652 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,494 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,953 UART: ROM Fatal Error: 0x000B0010
1,325,110 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,551 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,326 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,281,031 UART: [fwproc] Wait for Commands...
1,281,648 UART: [fwproc] Recv command 0x46574c44
1,282,381 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,951 UART: ROM Fatal Error: 0x000B0010
1,326,108 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,028 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,769 UART: [idev] ++
1,172,937 UART: [idev] CDI.KEYID = 6
1,173,298 UART: [idev] SUBJECT.KEYID = 7
1,173,723 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,979 UART: [idev] --
1,209,254 UART: [ldev] ++
1,209,422 UART: [ldev] CDI.KEYID = 6
1,209,786 UART: [ldev] SUBJECT.KEYID = 5
1,210,213 UART: [ldev] AUTHORITY.KEYID = 7
1,210,676 UART: [ldev] FE.KEYID = 1
1,215,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,780 UART: [fwproc] Wait for Commands...
1,281,603 UART: [fwproc] Recv command 0x46574c44
1,282,336 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,371 UART: ROM Fatal Error: 0x000B0010
1,325,528 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,537 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,700 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,181,706 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,207,994 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,241,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,535 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,726 UART: [fwproc] Recv command 0x46574c44
1,282,459 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,118 UART: ROM Fatal Error: 0x000B0010
1,326,275 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,018 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
915,148 UART: [kat] HMAC-384Kdf
919,792 UART: [kat] LMS
1,168,104 UART: [kat] --
1,168,971 UART: [cold-reset] ++
1,169,471 UART: [fht] FHT @ 0x50003400
1,172,227 UART: [idev] ++
1,172,395 UART: [idev] CDI.KEYID = 6
1,172,756 UART: [idev] SUBJECT.KEYID = 7
1,173,181 UART: [idev] UDS.KEYID = 0
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,198,181 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,240,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,086 UART: [ldev] --
1,279,590 UART: [fwproc] Wait for Commands...
1,280,223 UART: [fwproc] Recv command 0x46574c44
1,280,956 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,585 UART: ROM Fatal Error: 0x000B0010
1,324,742 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,176,055 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,534 UART: [idev] ++
1,173,702 UART: [idev] CDI.KEYID = 6
1,174,063 UART: [idev] SUBJECT.KEYID = 7
1,174,488 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,982 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,210,051 UART: [ldev] ++
1,210,219 UART: [ldev] CDI.KEYID = 6
1,210,583 UART: [ldev] SUBJECT.KEYID = 5
1,211,010 UART: [ldev] AUTHORITY.KEYID = 7
1,211,473 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,601 UART: [ldev] --
1,281,935 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,898 UART: ROM Fatal Error: 0x000B0010
1,327,055 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,188 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,022,388 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,166,370 UART:
2,166,771 UART: Running Caliptra ROM ...
2,167,857 UART:
2,168,016 UART: [state] CFI Enabled
2,168,997 UART: [state] LifecycleState = Unprovisioned
2,170,650 UART: [state] DebugLocked = No
2,171,676 UART: [state] WD Timer not started. Device not locked for debugging
2,174,152 UART: [kat] SHA2-256
2,174,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,828 UART: [kat] ++
2,178,277 UART: [kat] sha1
2,178,788 UART: [kat] SHA2-256
2,179,447 UART: [kat] SHA2-384
2,180,103 UART: [kat] SHA2-512-ACC
2,180,904 UART: [kat] ECC-384
3,776,133 UART: [kat] HMAC-384Kdf
3,803,127 UART: [kat] LMS
4,876,285 UART: [kat] --
4,879,708 UART: [cold-reset] ++
4,882,519 UART: [fht] FHT @ 0x50003400
4,893,609 UART: [idev] ++
4,894,284 UART: [idev] CDI.KEYID = 6
4,895,519 UART: [idev] SUBJECT.KEYID = 7
4,896,576 UART: [idev] UDS.KEYID = 0
4,928,914 UART: [idev] Erasing UDS.KEYID = 0
8,242,856 UART: [idev] Sha1 KeyId Algorithm
8,263,491 UART: [idev] --
8,266,403 UART: [ldev] ++
8,266,974 UART: [ldev] CDI.KEYID = 6
8,268,154 UART: [ldev] SUBJECT.KEYID = 5
8,269,308 UART: [ldev] AUTHORITY.KEYID = 7
8,270,555 UART: [ldev] FE.KEYID = 1
8,317,828 UART: [ldev] Erasing FE.KEYID = 1
11,648,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,103 UART: [ldev] --
14,017,481 UART: [fwproc] Wait for Commands...
14,020,563 UART: [fwproc] Recv command 0x46574c44
14,022,836 UART: [fwproc] Recv'd Img size: 113760 bytes
16,729,440 UART: ROM Fatal Error: 0x000B0012
16,732,915 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,021,616 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,554,030 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,026,722 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,170,536 UART:
2,170,944 UART: Running Caliptra ROM ...
2,172,050 UART:
2,172,200 UART: [state] CFI Enabled
2,173,165 UART: [state] LifecycleState = Unprovisioned
2,174,768 UART: [state] DebugLocked = No
2,175,787 UART: [state] WD Timer not started. Device not locked for debugging
2,178,267 UART: [kat] SHA2-256
2,178,927 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,934 UART: [kat] ++
2,182,378 UART: [kat] sha1
2,182,883 UART: [kat] SHA2-256
2,183,530 UART: [kat] SHA2-384
2,184,177 UART: [kat] SHA2-512-ACC
2,184,966 UART: [kat] ECC-384
4,096,724 UART: [kat] HMAC-384Kdf
4,109,290 UART: [kat] LMS
5,182,473 UART: [kat] --
5,187,752 UART: [cold-reset] ++
5,189,744 UART: [fht] FHT @ 0x50003400
5,201,811 UART: [idev] ++
5,202,480 UART: [idev] CDI.KEYID = 6
5,203,710 UART: [idev] SUBJECT.KEYID = 7
5,205,303 UART: [idev] UDS.KEYID = 0
5,223,342 UART: [idev] Erasing UDS.KEYID = 0
8,495,125 UART: [idev] Sha1 KeyId Algorithm
8,516,552 UART: [idev] --
8,520,699 UART: [ldev] ++
8,521,318 UART: [ldev] CDI.KEYID = 6
8,522,494 UART: [ldev] SUBJECT.KEYID = 5
8,523,981 UART: [ldev] AUTHORITY.KEYID = 7
8,525,548 UART: [ldev] FE.KEYID = 1
8,536,466 UART: [ldev] Erasing FE.KEYID = 1
11,825,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,300 UART: [ldev] --
14,188,437 UART: [fwproc] Wait for Commands...
14,190,809 UART: [fwproc] Recv command 0x46574c44
14,193,075 UART: [fwproc] Recv'd Img size: 113760 bytes
16,894,680 UART: ROM Fatal Error: 0x000B0012
16,898,137 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,023,725 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,714,500 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,027,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,171,687 UART:
2,172,126 UART: Running Caliptra ROM ...
2,173,256 UART:
2,173,443 UART: [state] CFI Enabled
2,174,428 UART: [state] LifecycleState = Unprovisioned
2,176,079 UART: [state] DebugLocked = No
2,177,111 UART: [state] WD Timer not started. Device not locked for debugging
2,179,585 UART: [kat] SHA2-256
2,180,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,499 UART: [kat] ++
2,183,966 UART: [kat] sha1
2,184,485 UART: [kat] SHA2-256
2,185,232 UART: [kat] SHA2-384
2,185,896 UART: [kat] SHA2-512-ACC
2,186,721 UART: [kat] ECC-384
2,946,000 UART: [kat] HMAC-384Kdf
2,970,913 UART: [kat] LMS
3,500,358 UART: [kat] --
3,504,869 UART: [cold-reset] ++
3,507,476 UART: [fht] FHT @ 0x50003400
3,518,246 UART: [idev] ++
3,518,809 UART: [idev] CDI.KEYID = 6
3,519,716 UART: [idev] SUBJECT.KEYID = 7
3,520,931 UART: [idev] UDS.KEYID = 0
3,542,861 UART: [idev] Erasing UDS.KEYID = 0
6,027,590 UART: [idev] Sha1 KeyId Algorithm
6,050,604 UART: [idev] --
6,055,683 UART: [ldev] ++
6,056,251 UART: [ldev] CDI.KEYID = 6
6,057,137 UART: [ldev] SUBJECT.KEYID = 5
6,058,354 UART: [ldev] AUTHORITY.KEYID = 7
6,059,590 UART: [ldev] FE.KEYID = 1
6,099,330 UART: [ldev] Erasing FE.KEYID = 1
8,602,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,225 UART: [ldev] --
10,412,033 UART: [fwproc] Wait for Commands...
10,414,786 UART: [fwproc] Recv command 0x46574c44
10,416,890 UART: [fwproc] Recv'd Img size: 114084 bytes
12,469,725 UART: ROM Fatal Error: 0x000B0012
12,472,852 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
2,029,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,282,041 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,022,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,839 UART:
2,167,223 UART: Running Caliptra ROM ...
2,168,389 UART:
2,168,561 UART: [state] CFI Enabled
2,169,532 UART: [state] LifecycleState = Unprovisioned
2,171,167 UART: [state] DebugLocked = No
2,172,268 UART: [state] WD Timer not started. Device not locked for debugging
2,174,737 UART: [kat] SHA2-256
2,175,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,477 UART: [kat] ++
2,178,930 UART: [kat] sha1
2,179,463 UART: [kat] SHA2-256
2,180,124 UART: [kat] SHA2-384
2,180,779 UART: [kat] SHA2-512-ACC
2,181,580 UART: [kat] ECC-384
3,285,225 UART: [kat] HMAC-384Kdf
3,299,066 UART: [kat] LMS
3,828,569 UART: [kat] --
3,832,663 UART: [cold-reset] ++
3,834,314 UART: [fht] FHT @ 0x50003400
3,846,263 UART: [idev] ++
3,846,832 UART: [idev] CDI.KEYID = 6
3,847,713 UART: [idev] SUBJECT.KEYID = 7
3,848,927 UART: [idev] UDS.KEYID = 0
3,862,925 UART: [idev] Erasing UDS.KEYID = 0
6,319,157 UART: [idev] Sha1 KeyId Algorithm
6,342,042 UART: [idev] --
6,346,653 UART: [ldev] ++
6,347,223 UART: [ldev] CDI.KEYID = 6
6,348,138 UART: [ldev] SUBJECT.KEYID = 5
6,349,302 UART: [ldev] AUTHORITY.KEYID = 7
6,350,537 UART: [ldev] FE.KEYID = 1
6,361,884 UART: [ldev] Erasing FE.KEYID = 1
8,831,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,023 UART: [ldev] --
10,622,109 UART: [fwproc] Wait for Commands...
10,623,612 UART: [fwproc] Recv command 0x46574c44
10,625,656 UART: [fwproc] Recv'd Img size: 114084 bytes
12,673,871 UART: ROM Fatal Error: 0x000B0012
12,677,015 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,023,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,453,050 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
2,022,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,166,763 UART:
2,167,158 UART: Running Caliptra ROM ...
2,168,336 UART:
2,168,505 UART: [state] CFI Enabled
2,169,491 UART: [state] LifecycleState = Unprovisioned
2,171,058 UART: [state] DebugLocked = No
2,172,083 UART: [state] WD Timer not started. Device not locked for debugging
2,174,559 UART: [kat] SHA2-256
2,175,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,235 UART: [kat] ++
2,178,682 UART: [kat] sha1
2,179,195 UART: [kat] SHA2-256
2,179,874 UART: [kat] SHA2-384
2,180,534 UART: [kat] SHA2-512-ACC
2,181,378 UART: [kat] ECC-384
2,946,831 UART: [kat] HMAC-384Kdf
2,972,167 UART: [kat] LMS
3,501,646 UART: [kat] --
3,505,817 UART: [cold-reset] ++
3,507,589 UART: [fht] FHT @ 0x50003400
3,519,323 UART: [idev] ++
3,519,933 UART: [idev] CDI.KEYID = 6
3,520,856 UART: [idev] SUBJECT.KEYID = 7
3,522,026 UART: [idev] UDS.KEYID = 0
3,544,218 UART: [idev] Erasing UDS.KEYID = 0
6,025,491 UART: [idev] Sha1 KeyId Algorithm
6,049,755 UART: [idev] --
6,053,481 UART: [ldev] ++
6,054,082 UART: [ldev] CDI.KEYID = 6
6,054,998 UART: [ldev] SUBJECT.KEYID = 5
6,056,170 UART: [ldev] AUTHORITY.KEYID = 7
6,057,406 UART: [ldev] FE.KEYID = 1
6,101,281 UART: [ldev] Erasing FE.KEYID = 1
8,605,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,546 UART: [ldev] --
10,411,527 UART: [fwproc] Wait for Commands...
10,414,167 UART: [fwproc] Recv command 0x46574c44
10,416,278 UART: [fwproc] Recv'd Img size: 114084 bytes
12,467,873 UART: ROM Fatal Error: 0x000B0012
12,470,948 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,024,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,276,718 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,029,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,173,271 UART:
2,173,672 UART: Running Caliptra ROM ...
2,174,833 UART:
2,175,003 UART: [state] CFI Enabled
2,175,979 UART: [state] LifecycleState = Unprovisioned
2,177,620 UART: [state] DebugLocked = No
2,178,651 UART: [state] WD Timer not started. Device not locked for debugging
2,181,143 UART: [kat] SHA2-256
2,181,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,815 UART: [kat] ++
2,185,262 UART: [kat] sha1
2,185,770 UART: [kat] SHA2-256
2,186,426 UART: [kat] SHA2-384
2,187,082 UART: [kat] SHA2-512-ACC
2,187,914 UART: [kat] ECC-384
3,282,132 UART: [kat] HMAC-384Kdf
3,294,030 UART: [kat] LMS
3,823,487 UART: [kat] --
3,828,451 UART: [cold-reset] ++
3,829,451 UART: [fht] FHT @ 0x50003400
3,840,455 UART: [idev] ++
3,841,017 UART: [idev] CDI.KEYID = 6
3,841,953 UART: [idev] SUBJECT.KEYID = 7
3,843,179 UART: [idev] UDS.KEYID = 0
3,862,263 UART: [idev] Erasing UDS.KEYID = 0
6,319,139 UART: [idev] Sha1 KeyId Algorithm
6,342,590 UART: [idev] --
6,345,930 UART: [ldev] ++
6,346,492 UART: [ldev] CDI.KEYID = 6
6,347,369 UART: [ldev] SUBJECT.KEYID = 5
6,348,577 UART: [ldev] AUTHORITY.KEYID = 7
6,349,804 UART: [ldev] FE.KEYID = 1
6,357,402 UART: [ldev] Erasing FE.KEYID = 1
8,830,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,178 UART: [ldev] --
10,619,445 UART: [fwproc] Wait for Commands...
10,621,979 UART: [fwproc] Recv command 0x46574c44
10,624,073 UART: [fwproc] Recv'd Img size: 114084 bytes
12,672,671 UART: ROM Fatal Error: 0x000B0012
12,675,808 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,232 writing to cptra_bootfsm_go
2,022,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,466,733 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,099 UART: [fht] FHT @ 0x50003400
1,173,949 UART: [idev] ++
1,174,117 UART: [idev] CDI.KEYID = 6
1,174,478 UART: [idev] SUBJECT.KEYID = 7
1,174,903 UART: [idev] UDS.KEYID = 0
1,182,797 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,215,738 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,813 UART: [fwproc] Recv command 0x46574c44
1,282,546 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,803 UART: ROM Fatal Error: 0x000B0012
1,329,960 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,143 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
905,027 UART: [kat] SHA2-512-ACC
906,928 UART: [kat] ECC-384
916,479 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,429 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,592 UART: [fwproc] Recv command 0x46574c44
1,283,325 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,740 UART: ROM Fatal Error: 0x000B0012
1,330,897 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,270 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,208,942 UART: [ldev] ++
1,209,110 UART: [ldev] CDI.KEYID = 6
1,209,474 UART: [ldev] SUBJECT.KEYID = 5
1,209,901 UART: [ldev] AUTHORITY.KEYID = 7
1,210,364 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,241,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,636 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,579 UART: [fwproc] Recv command 0x46574c44
1,282,312 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,837 UART: ROM Fatal Error: 0x000B0012
1,330,994 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,243 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,561 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,010 UART: ROM Fatal Error: 0x000B0012
1,330,167 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,992 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,181,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,037 UART: [idev] --
1,207,968 UART: [ldev] ++
1,208,136 UART: [ldev] CDI.KEYID = 6
1,208,500 UART: [ldev] SUBJECT.KEYID = 5
1,208,927 UART: [ldev] AUTHORITY.KEYID = 7
1,209,390 UART: [ldev] FE.KEYID = 1
1,214,324 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,279,976 UART: [fwproc] Wait for Commands...
1,280,757 UART: [fwproc] Recv command 0x46574c44
1,281,490 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,677 UART: ROM Fatal Error: 0x000B0012
1,329,834 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,541 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,880 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,935 UART: [ldev] --
1,281,433 UART: [fwproc] Wait for Commands...
1,282,252 UART: [fwproc] Recv command 0x46574c44
1,282,985 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,424 UART: ROM Fatal Error: 0x000B0012
1,330,581 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,580 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,024,145 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,168,207 UART:
2,168,621 UART: Running Caliptra ROM ...
2,169,791 UART:
2,169,972 UART: [state] CFI Enabled
2,170,940 UART: [state] LifecycleState = Unprovisioned
2,172,586 UART: [state] DebugLocked = No
2,173,689 UART: [state] WD Timer not started. Device not locked for debugging
2,176,172 UART: [kat] SHA2-256
2,176,861 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,876 UART: [kat] ++
2,180,329 UART: [kat] sha1
2,180,887 UART: [kat] SHA2-256
2,181,593 UART: [kat] SHA2-384
2,182,254 UART: [kat] SHA2-512-ACC
2,183,078 UART: [kat] ECC-384
3,773,354 UART: [kat] HMAC-384Kdf
3,799,930 UART: [kat] LMS
4,873,130 UART: [kat] --
4,877,995 UART: [cold-reset] ++
4,880,638 UART: [fht] FHT @ 0x50003400
4,890,703 UART: [idev] ++
4,891,377 UART: [idev] CDI.KEYID = 6
4,892,539 UART: [idev] SUBJECT.KEYID = 7
4,893,754 UART: [idev] UDS.KEYID = 0
4,927,653 UART: [idev] Erasing UDS.KEYID = 0
8,239,200 UART: [idev] Sha1 KeyId Algorithm
8,261,032 UART: [idev] --
8,265,406 UART: [ldev] ++
8,266,029 UART: [ldev] CDI.KEYID = 6
8,267,142 UART: [ldev] SUBJECT.KEYID = 5
8,268,361 UART: [ldev] AUTHORITY.KEYID = 7
8,269,518 UART: [ldev] FE.KEYID = 1
8,314,979 UART: [ldev] Erasing FE.KEYID = 1
11,645,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,939,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,955,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,971,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,987,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,007,672 UART: [ldev] --
14,012,352 UART: [fwproc] Wait for Commands...
14,015,497 UART: [fwproc] Recv command 0x46574c44
14,017,827 UART: [fwproc] Recv'd Img size: 113760 bytes
16,718,370 UART: ROM Fatal Error: 0x000B003C
16,721,799 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,023,005 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,525,897 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
2,034,003 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,177,560 UART:
2,177,987 UART: Running Caliptra ROM ...
2,179,062 UART:
2,179,215 UART: [state] CFI Enabled
2,180,076 UART: [state] LifecycleState = Unprovisioned
2,181,712 UART: [state] DebugLocked = No
2,182,730 UART: [state] WD Timer not started. Device not locked for debugging
2,185,200 UART: [kat] SHA2-256
2,185,856 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,188,857 UART: [kat] ++
2,189,293 UART: [kat] sha1
2,189,794 UART: [kat] SHA2-256
2,190,444 UART: [kat] SHA2-384
2,191,092 UART: [kat] SHA2-512-ACC
2,191,951 UART: [kat] ECC-384
4,094,308 UART: [kat] HMAC-384Kdf
4,105,316 UART: [kat] LMS
5,178,506 UART: [kat] --
5,182,359 UART: [cold-reset] ++
5,184,891 UART: [fht] FHT @ 0x50003400
5,197,487 UART: [idev] ++
5,198,163 UART: [idev] CDI.KEYID = 6
5,199,339 UART: [idev] SUBJECT.KEYID = 7
5,200,823 UART: [idev] UDS.KEYID = 0
5,217,820 UART: [idev] Erasing UDS.KEYID = 0
8,487,632 UART: [idev] Sha1 KeyId Algorithm
8,507,911 UART: [idev] --
8,512,771 UART: [ldev] ++
8,513,393 UART: [ldev] CDI.KEYID = 6
8,514,571 UART: [ldev] SUBJECT.KEYID = 5
8,516,077 UART: [ldev] AUTHORITY.KEYID = 7
8,517,584 UART: [ldev] FE.KEYID = 1
8,530,013 UART: [ldev] Erasing FE.KEYID = 1
11,822,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,650 UART: [ldev] --
14,189,046 UART: [fwproc] Wait for Commands...
14,190,488 UART: [fwproc] Recv command 0x46574c44
14,192,469 UART: [fwproc] Recv'd Img size: 113760 bytes
16,889,992 UART: ROM Fatal Error: 0x000B003C
16,893,402 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,030,531 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,698,837 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,040,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,184,520 UART:
2,184,903 UART: Running Caliptra ROM ...
2,185,986 UART:
2,186,138 UART: [state] CFI Enabled
2,187,070 UART: [state] LifecycleState = Unprovisioned
2,188,730 UART: [state] DebugLocked = No
2,189,754 UART: [state] WD Timer not started. Device not locked for debugging
2,192,441 UART: [kat] SHA2-256
2,193,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,196,138 UART: [kat] ++
2,196,588 UART: [kat] sha1
2,197,096 UART: [kat] SHA2-256
2,197,755 UART: [kat] SHA2-384
2,198,408 UART: [kat] SHA2-512-ACC
2,199,247 UART: [kat] ECC-384
2,925,576 UART: [kat] HMAC-384Kdf
2,949,097 UART: [kat] LMS
3,478,555 UART: [kat] --
3,482,915 UART: [cold-reset] ++
3,484,357 UART: [fht] FHT @ 0x50003400
3,495,661 UART: [idev] ++
3,496,231 UART: [idev] CDI.KEYID = 6
3,497,115 UART: [idev] SUBJECT.KEYID = 7
3,498,328 UART: [idev] UDS.KEYID = 0
3,521,920 UART: [idev] Erasing UDS.KEYID = 0
6,006,435 UART: [idev] Sha1 KeyId Algorithm
6,028,518 UART: [idev] --
6,033,013 UART: [ldev] ++
6,033,629 UART: [ldev] CDI.KEYID = 6
6,034,523 UART: [ldev] SUBJECT.KEYID = 5
6,035,628 UART: [ldev] AUTHORITY.KEYID = 7
6,036,921 UART: [ldev] FE.KEYID = 1
6,078,670 UART: [ldev] Erasing FE.KEYID = 1
8,583,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,621 UART: [ldev] --
10,392,241 UART: [fwproc] Wait for Commands...
10,395,196 UART: [fwproc] Recv command 0x46574c44
10,397,301 UART: [fwproc] Recv'd Img size: 114084 bytes
12,448,300 UART: ROM Fatal Error: 0x000B003C
12,451,427 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,026,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,201,844 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,592 writing to cptra_bootfsm_go
2,027,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,171,359 UART:
2,171,757 UART: Running Caliptra ROM ...
2,172,841 UART:
2,172,996 UART: [state] CFI Enabled
2,173,971 UART: [state] LifecycleState = Unprovisioned
2,175,630 UART: [state] DebugLocked = No
2,176,661 UART: [state] WD Timer not started. Device not locked for debugging
2,179,124 UART: [kat] SHA2-256
2,179,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,786 UART: [kat] ++
2,183,234 UART: [kat] sha1
2,183,740 UART: [kat] SHA2-256
2,184,394 UART: [kat] SHA2-384
2,185,047 UART: [kat] SHA2-512-ACC
2,185,897 UART: [kat] ECC-384
3,280,930 UART: [kat] HMAC-384Kdf
3,293,578 UART: [kat] LMS
3,823,076 UART: [kat] --
3,827,202 UART: [cold-reset] ++
3,828,268 UART: [fht] FHT @ 0x50003400
3,838,650 UART: [idev] ++
3,839,229 UART: [idev] CDI.KEYID = 6
3,840,158 UART: [idev] SUBJECT.KEYID = 7
3,841,316 UART: [idev] UDS.KEYID = 0
3,858,919 UART: [idev] Erasing UDS.KEYID = 0
6,318,008 UART: [idev] Sha1 KeyId Algorithm
6,341,403 UART: [idev] --
6,346,611 UART: [ldev] ++
6,347,184 UART: [ldev] CDI.KEYID = 6
6,348,121 UART: [ldev] SUBJECT.KEYID = 5
6,349,274 UART: [ldev] AUTHORITY.KEYID = 7
6,350,555 UART: [ldev] FE.KEYID = 1
6,361,012 UART: [ldev] Erasing FE.KEYID = 1
8,832,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,057 UART: [ldev] --
10,623,110 UART: [fwproc] Wait for Commands...
10,624,827 UART: [fwproc] Recv command 0x46574c44
10,626,923 UART: [fwproc] Recv'd Img size: 114084 bytes
12,679,096 UART: ROM Fatal Error: 0x000B003C
12,682,175 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,025,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,465,029 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,027,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,171,269 UART:
2,171,662 UART: Running Caliptra ROM ...
2,172,846 UART:
2,173,014 UART: [state] CFI Enabled
2,173,994 UART: [state] LifecycleState = Unprovisioned
2,175,636 UART: [state] DebugLocked = No
2,176,752 UART: [state] WD Timer not started. Device not locked for debugging
2,179,227 UART: [kat] SHA2-256
2,179,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,901 UART: [kat] ++
2,183,407 UART: [kat] sha1
2,183,922 UART: [kat] SHA2-256
2,184,576 UART: [kat] SHA2-384
2,185,231 UART: [kat] SHA2-512-ACC
2,186,031 UART: [kat] ECC-384
2,947,054 UART: [kat] HMAC-384Kdf
2,971,282 UART: [kat] LMS
3,500,730 UART: [kat] --
3,505,926 UART: [cold-reset] ++
3,508,451 UART: [fht] FHT @ 0x50003400
3,519,968 UART: [idev] ++
3,520,574 UART: [idev] CDI.KEYID = 6
3,521,498 UART: [idev] SUBJECT.KEYID = 7
3,522,663 UART: [idev] UDS.KEYID = 0
3,543,558 UART: [idev] Erasing UDS.KEYID = 0
6,022,405 UART: [idev] Sha1 KeyId Algorithm
6,045,062 UART: [idev] --
6,049,559 UART: [ldev] ++
6,050,129 UART: [ldev] CDI.KEYID = 6
6,051,046 UART: [ldev] SUBJECT.KEYID = 5
6,052,270 UART: [ldev] AUTHORITY.KEYID = 7
6,053,506 UART: [ldev] FE.KEYID = 1
6,099,226 UART: [ldev] Erasing FE.KEYID = 1
8,600,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,734 UART: [ldev] --
10,389,754 UART: [fwproc] Wait for Commands...
10,391,850 UART: [fwproc] Recv command 0x46574c44
10,393,895 UART: [fwproc] Recv'd Img size: 114084 bytes
12,438,835 UART: ROM Fatal Error: 0x000B003C
12,441,913 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,038,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,230,907 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,026,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,170,764 UART:
2,171,161 UART: Running Caliptra ROM ...
2,172,425 UART:
2,172,613 UART: [state] CFI Enabled
2,173,497 UART: [state] LifecycleState = Unprovisioned
2,175,145 UART: [state] DebugLocked = No
2,176,174 UART: [state] WD Timer not started. Device not locked for debugging
2,178,636 UART: [kat] SHA2-256
2,179,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,302 UART: [kat] ++
2,182,755 UART: [kat] sha1
2,183,269 UART: [kat] SHA2-256
2,184,006 UART: [kat] SHA2-384
2,184,675 UART: [kat] SHA2-512-ACC
2,185,516 UART: [kat] ECC-384
3,284,767 UART: [kat] HMAC-384Kdf
3,297,160 UART: [kat] LMS
3,826,636 UART: [kat] --
3,830,466 UART: [cold-reset] ++
3,831,443 UART: [fht] FHT @ 0x50003400
3,842,102 UART: [idev] ++
3,842,666 UART: [idev] CDI.KEYID = 6
3,843,570 UART: [idev] SUBJECT.KEYID = 7
3,844,779 UART: [idev] UDS.KEYID = 0
3,862,860 UART: [idev] Erasing UDS.KEYID = 0
6,323,958 UART: [idev] Sha1 KeyId Algorithm
6,346,483 UART: [idev] --
6,350,985 UART: [ldev] ++
6,351,566 UART: [ldev] CDI.KEYID = 6
6,352,473 UART: [ldev] SUBJECT.KEYID = 5
6,353,685 UART: [ldev] AUTHORITY.KEYID = 7
6,354,908 UART: [ldev] FE.KEYID = 1
6,365,929 UART: [ldev] Erasing FE.KEYID = 1
8,844,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,171 UART: [ldev] --
10,633,790 UART: [fwproc] Wait for Commands...
10,636,644 UART: [fwproc] Recv command 0x46574c44
10,638,732 UART: [fwproc] Recv'd Img size: 114084 bytes
12,689,923 UART: ROM Fatal Error: 0x000B003C
12,693,053 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
2,035,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,460,658 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
919,926 UART: [kat] LMS
1,168,238 UART: [kat] --
1,168,957 UART: [cold-reset] ++
1,169,397 UART: [fht] FHT @ 0x50003400
1,172,029 UART: [idev] ++
1,172,197 UART: [idev] CDI.KEYID = 6
1,172,558 UART: [idev] SUBJECT.KEYID = 7
1,172,983 UART: [idev] UDS.KEYID = 0
1,180,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,788 UART: [ldev] --
1,281,256 UART: [fwproc] Wait for Commands...
1,282,057 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,667 UART: ROM Fatal Error: 0x000B003C
1,330,826 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,739 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,250 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,833 UART: [kat] HMAC-384Kdf
921,657 UART: [kat] LMS
1,169,969 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,102 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,291 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,808 UART: ROM Fatal Error: 0x000B003C
1,331,967 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,640 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,359 UART: [kat] SHA2-256
901,299 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,060 UART: [kat] LMS
1,168,372 UART: [kat] --
1,169,403 UART: [cold-reset] ++
1,169,973 UART: [fht] FHT @ 0x50003400
1,172,521 UART: [idev] ++
1,172,689 UART: [idev] CDI.KEYID = 6
1,173,050 UART: [idev] SUBJECT.KEYID = 7
1,173,475 UART: [idev] UDS.KEYID = 0
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,197,881 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,207,976 UART: [ldev] ++
1,208,144 UART: [ldev] CDI.KEYID = 6
1,208,508 UART: [ldev] SUBJECT.KEYID = 5
1,208,935 UART: [ldev] AUTHORITY.KEYID = 7
1,209,398 UART: [ldev] FE.KEYID = 1
1,214,392 UART: [ldev] Erasing FE.KEYID = 1
1,240,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,774 UART: [ldev] --
1,280,290 UART: [fwproc] Wait for Commands...
1,280,921 UART: [fwproc] Recv command 0x46574c44
1,281,654 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,289 UART: ROM Fatal Error: 0x000B003C
1,330,448 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,611 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,059 UART: [kat] LMS
1,169,371 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,376 UART: [idev] ++
1,173,544 UART: [idev] CDI.KEYID = 6
1,173,905 UART: [idev] SUBJECT.KEYID = 7
1,174,330 UART: [idev] UDS.KEYID = 0
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,334 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,009 UART: [ldev] Erasing FE.KEYID = 1
1,242,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,816 UART: ROM Fatal Error: 0x000B003C
1,331,975 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,562 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,056 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,827 UART: ROM Fatal Error: 0x000B003C
1,331,986 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,901 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,703 UART: [kat] HMAC-384Kdf
920,221 UART: [kat] LMS
1,168,533 UART: [kat] --
1,169,262 UART: [cold-reset] ++
1,169,710 UART: [fht] FHT @ 0x50003400
1,172,198 UART: [idev] ++
1,172,366 UART: [idev] CDI.KEYID = 6
1,172,727 UART: [idev] SUBJECT.KEYID = 7
1,173,152 UART: [idev] UDS.KEYID = 0
1,181,044 UART: [idev] Erasing UDS.KEYID = 0
1,197,864 UART: [idev] Sha1 KeyId Algorithm
1,206,704 UART: [idev] --
1,207,733 UART: [ldev] ++
1,207,901 UART: [ldev] CDI.KEYID = 6
1,208,265 UART: [ldev] SUBJECT.KEYID = 5
1,208,692 UART: [ldev] AUTHORITY.KEYID = 7
1,209,155 UART: [ldev] FE.KEYID = 1
1,214,599 UART: [ldev] Erasing FE.KEYID = 1
1,241,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,981 UART: [ldev] --
1,280,425 UART: [fwproc] Wait for Commands...
1,281,216 UART: [fwproc] Recv command 0x46574c44
1,281,949 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,970 UART: ROM Fatal Error: 0x000B003C
1,330,129 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,920 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,501 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,144 UART:
192,522 UART: Running Caliptra ROM ...
193,724 UART:
193,872 UART: [state] CFI Enabled
264,675 UART: [state] LifecycleState = Unprovisioned
267,110 UART: [state] DebugLocked = No
268,437 UART: [state] WD Timer not started. Device not locked for debugging
272,288 UART: [kat] SHA2-256
454,211 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,735 UART: [kat] ++
466,238 UART: [kat] sha1
476,528 UART: [kat] SHA2-256
479,590 UART: [kat] SHA2-384
484,802 UART: [kat] SHA2-512-ACC
487,427 UART: [kat] ECC-384
3,774,705 UART: [kat] HMAC-384Kdf
3,803,088 UART: [kat] LMS
4,876,248 UART: [kat] --
4,880,998 UART: [cold-reset] ++
4,882,831 UART: [fht] FHT @ 0x50003400
4,895,054 UART: [idev] ++
4,895,735 UART: [idev] CDI.KEYID = 6
4,896,973 UART: [idev] SUBJECT.KEYID = 7
4,898,095 UART: [idev] UDS.KEYID = 0
4,932,071 UART: [idev] Erasing UDS.KEYID = 0
8,242,987 UART: [idev] Sha1 KeyId Algorithm
8,265,629 UART: [idev] --
8,268,486 UART: [ldev] ++
8,269,054 UART: [ldev] CDI.KEYID = 6
8,270,220 UART: [ldev] SUBJECT.KEYID = 5
8,271,430 UART: [ldev] AUTHORITY.KEYID = 7
8,272,581 UART: [ldev] FE.KEYID = 1
8,319,824 UART: [ldev] Erasing FE.KEYID = 1
11,658,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,859 UART: [ldev] --
14,039,384 UART: [fwproc] Wait for Commands...
14,042,453 UART: [fwproc] Recv command 0x46574c44
14,044,723 UART: Invalid Img size: 0 bytes
14,049,144 UART: ROM Fatal Error: 0x01020002
14,052,448 >>> mbox cmd response: failed
14,055,019 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,197,915 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,464 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,824,967 >>> mbox cmd response: failed
13,827,887 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,970,888 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
3,962 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,541 UART:
192,908 UART: Running Caliptra ROM ...
194,115 UART:
603,627 UART: [state] CFI Enabled
618,079 UART: [state] LifecycleState = Unprovisioned
620,463 UART: [state] DebugLocked = No
622,512 UART: [state] WD Timer not started. Device not locked for debugging
626,448 UART: [kat] SHA2-256
808,422 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,986 UART: [kat] ++
820,486 UART: [kat] sha1
830,438 UART: [kat] SHA2-256
833,453 UART: [kat] SHA2-384
840,615 UART: [kat] SHA2-512-ACC
843,230 UART: [kat] ECC-384
4,100,169 UART: [kat] HMAC-384Kdf
4,112,534 UART: [kat] LMS
5,185,720 UART: [kat] --
5,189,963 UART: [cold-reset] ++
5,191,909 UART: [fht] FHT @ 0x50003400
5,203,967 UART: [idev] ++
5,204,688 UART: [idev] CDI.KEYID = 6
5,205,863 UART: [idev] SUBJECT.KEYID = 7
5,207,352 UART: [idev] UDS.KEYID = 0
5,223,813 UART: [idev] Erasing UDS.KEYID = 0
8,496,814 UART: [idev] Sha1 KeyId Algorithm
8,519,508 UART: [idev] --
8,523,556 UART: [ldev] ++
8,524,124 UART: [ldev] CDI.KEYID = 6
8,525,363 UART: [ldev] SUBJECT.KEYID = 5
8,526,801 UART: [ldev] AUTHORITY.KEYID = 7
8,528,288 UART: [ldev] FE.KEYID = 1
8,540,852 UART: [ldev] Erasing FE.KEYID = 1
11,835,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,131,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,198,405 UART: [ldev] --
14,202,800 UART: [fwproc] Wait for Commands...
14,204,780 UART: [fwproc] Recv command 0x46574c44
14,207,098 UART: Invalid Img size: 0 bytes
14,211,639 UART: ROM Fatal Error: 0x01020002
14,214,951 >>> mbox cmd response: failed
14,217,756 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,360,651 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,970 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,022,741 >>> mbox cmd response: failed
14,025,681 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,168,645 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,604 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,211 UART:
192,577 UART: Running Caliptra ROM ...
193,807 UART:
193,960 UART: [state] CFI Enabled
264,726 UART: [state] LifecycleState = Unprovisioned
266,652 UART: [state] DebugLocked = No
269,462 UART: [state] WD Timer not started. Device not locked for debugging
273,570 UART: [kat] SHA2-256
452,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,290 UART: [kat] ++
464,767 UART: [kat] sha1
476,022 UART: [kat] SHA2-256
479,039 UART: [kat] SHA2-384
486,156 UART: [kat] SHA2-512-ACC
489,140 UART: [kat] ECC-384
2,946,027 UART: [kat] HMAC-384Kdf
2,970,426 UART: [kat] LMS
3,499,858 UART: [kat] --
3,504,431 UART: [cold-reset] ++
3,505,797 UART: [fht] FHT @ 0x50003400
3,516,030 UART: [idev] ++
3,516,598 UART: [idev] CDI.KEYID = 6
3,517,507 UART: [idev] SUBJECT.KEYID = 7
3,518,721 UART: [idev] UDS.KEYID = 0
3,542,963 UART: [idev] Erasing UDS.KEYID = 0
6,021,225 UART: [idev] Sha1 KeyId Algorithm
6,044,474 UART: [idev] --
6,048,748 UART: [ldev] ++
6,049,324 UART: [ldev] CDI.KEYID = 6
6,050,233 UART: [ldev] SUBJECT.KEYID = 5
6,051,450 UART: [ldev] AUTHORITY.KEYID = 7
6,052,687 UART: [ldev] FE.KEYID = 1
6,098,605 UART: [ldev] Erasing FE.KEYID = 1
8,601,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,102 UART: [ldev] --
10,409,963 UART: [fwproc] Wait for Commands...
10,412,761 UART: [fwproc] Recv command 0x46574c44
10,414,807 UART: Invalid Img size: 0 bytes
10,419,298 UART: ROM Fatal Error: 0x01020002
10,422,393 >>> mbox cmd response: failed
10,424,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,568,333 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,439 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,185,525 >>> mbox cmd response: failed
10,188,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,332,115 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
4,014 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,636 UART:
192,995 UART: Running Caliptra ROM ...
194,221 UART:
603,654 UART: [state] CFI Enabled
618,767 UART: [state] LifecycleState = Unprovisioned
620,681 UART: [state] DebugLocked = No
622,874 UART: [state] WD Timer not started. Device not locked for debugging
625,947 UART: [kat] SHA2-256
805,079 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,614 UART: [kat] ++
817,142 UART: [kat] sha1
829,322 UART: [kat] SHA2-256
832,326 UART: [kat] SHA2-384
839,157 UART: [kat] SHA2-512-ACC
842,118 UART: [kat] ECC-384
3,282,424 UART: [kat] HMAC-384Kdf
3,294,721 UART: [kat] LMS
3,824,185 UART: [kat] --
3,827,471 UART: [cold-reset] ++
3,828,423 UART: [fht] FHT @ 0x50003400
3,838,911 UART: [idev] ++
3,839,481 UART: [idev] CDI.KEYID = 6
3,840,444 UART: [idev] SUBJECT.KEYID = 7
3,841,546 UART: [idev] UDS.KEYID = 0
3,857,822 UART: [idev] Erasing UDS.KEYID = 0
6,316,722 UART: [idev] Sha1 KeyId Algorithm
6,339,253 UART: [idev] --
6,343,244 UART: [ldev] ++
6,343,813 UART: [ldev] CDI.KEYID = 6
6,344,723 UART: [ldev] SUBJECT.KEYID = 5
6,345,954 UART: [ldev] AUTHORITY.KEYID = 7
6,347,186 UART: [ldev] FE.KEYID = 1
6,357,830 UART: [ldev] Erasing FE.KEYID = 1
8,833,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,439 UART: [ldev] --
10,624,388 UART: [fwproc] Wait for Commands...
10,627,515 UART: [fwproc] Recv command 0x46574c44
10,629,609 UART: Invalid Img size: 0 bytes
10,632,908 UART: ROM Fatal Error: 0x01020002
10,636,056 >>> mbox cmd response: failed
10,638,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,781,987 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,848 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,407,828 >>> mbox cmd response: failed
10,410,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,553,947 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,393 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,056 UART:
192,451 UART: Running Caliptra ROM ...
193,615 UART:
193,760 UART: [state] CFI Enabled
261,579 UART: [state] LifecycleState = Unprovisioned
263,449 UART: [state] DebugLocked = No
264,767 UART: [state] WD Timer not started. Device not locked for debugging
269,028 UART: [kat] SHA2-256
448,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,688 UART: [kat] ++
460,222 UART: [kat] sha1
471,540 UART: [kat] SHA2-256
474,613 UART: [kat] SHA2-384
480,588 UART: [kat] SHA2-512-ACC
483,524 UART: [kat] ECC-384
2,946,542 UART: [kat] HMAC-384Kdf
2,972,231 UART: [kat] LMS
3,501,678 UART: [kat] --
3,507,539 UART: [cold-reset] ++
3,510,069 UART: [fht] FHT @ 0x50003400
3,520,850 UART: [idev] ++
3,521,418 UART: [idev] CDI.KEYID = 6
3,522,383 UART: [idev] SUBJECT.KEYID = 7
3,523,540 UART: [idev] UDS.KEYID = 0
3,544,916 UART: [idev] Erasing UDS.KEYID = 0
6,025,533 UART: [idev] Sha1 KeyId Algorithm
6,047,675 UART: [idev] --
6,051,865 UART: [ldev] ++
6,052,441 UART: [ldev] CDI.KEYID = 6
6,053,353 UART: [ldev] SUBJECT.KEYID = 5
6,054,521 UART: [ldev] AUTHORITY.KEYID = 7
6,055,781 UART: [ldev] FE.KEYID = 1
6,101,409 UART: [ldev] Erasing FE.KEYID = 1
8,602,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,168 UART: [ldev] --
10,393,986 UART: [fwproc] Wait for Commands...
10,395,928 UART: [fwproc] Recv command 0x46574c44
10,397,971 UART: Invalid Img size: 0 bytes
10,401,496 UART: ROM Fatal Error: 0x01020002
10,404,595 >>> mbox cmd response: failed
10,407,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,550,603 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,383 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,229,024 >>> mbox cmd response: failed
10,231,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,374,835 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,769 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,425 UART:
192,825 UART: Running Caliptra ROM ...
193,936 UART:
603,474 UART: [state] CFI Enabled
617,844 UART: [state] LifecycleState = Unprovisioned
619,667 UART: [state] DebugLocked = No
622,314 UART: [state] WD Timer not started. Device not locked for debugging
626,742 UART: [kat] SHA2-256
805,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,407 UART: [kat] ++
817,938 UART: [kat] sha1
828,454 UART: [kat] SHA2-256
831,495 UART: [kat] SHA2-384
837,420 UART: [kat] SHA2-512-ACC
840,360 UART: [kat] ECC-384
3,283,228 UART: [kat] HMAC-384Kdf
3,296,002 UART: [kat] LMS
3,825,480 UART: [kat] --
3,831,359 UART: [cold-reset] ++
3,833,355 UART: [fht] FHT @ 0x50003400
3,843,471 UART: [idev] ++
3,844,031 UART: [idev] CDI.KEYID = 6
3,844,996 UART: [idev] SUBJECT.KEYID = 7
3,846,148 UART: [idev] UDS.KEYID = 0
3,862,230 UART: [idev] Erasing UDS.KEYID = 0
6,323,226 UART: [idev] Sha1 KeyId Algorithm
6,345,327 UART: [idev] --
6,348,777 UART: [ldev] ++
6,349,363 UART: [ldev] CDI.KEYID = 6
6,350,278 UART: [ldev] SUBJECT.KEYID = 5
6,351,493 UART: [ldev] AUTHORITY.KEYID = 7
6,352,725 UART: [ldev] FE.KEYID = 1
6,363,529 UART: [ldev] Erasing FE.KEYID = 1
8,839,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,882 UART: [ldev] --
10,631,398 UART: [fwproc] Wait for Commands...
10,633,821 UART: [fwproc] Recv command 0x46574c44
10,635,920 UART: Invalid Img size: 0 bytes
10,640,414 UART: ROM Fatal Error: 0x01020002
10,643,509 >>> mbox cmd response: failed
10,646,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,789,533 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
3,818 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,408,456 >>> mbox cmd response: failed
10,411,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,554,693 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
921,114 UART: [kat] LMS
1,169,426 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,686 UART: [fwproc] Wait for Commands...
1,281,483 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: Invalid Img size: 0 bytes
1,283,188 UART: ROM Fatal Error: 0x01020002
1,284,347 >>> mbox cmd response: failed
1,284,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,284,353 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,134,887 >>> mbox cmd response: failed
1,134,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,134,893 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,198,892 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,177 UART: [ldev] Erasing FE.KEYID = 1
1,241,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,339 UART: Invalid Img size: 0 bytes
1,284,223 UART: ROM Fatal Error: 0x01020002
1,285,382 >>> mbox cmd response: failed
1,285,382 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,285,388 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,056 >>> mbox cmd response: failed
1,137,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,137,062 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,209,176 UART: [ldev] ++
1,209,344 UART: [ldev] CDI.KEYID = 6
1,209,708 UART: [ldev] SUBJECT.KEYID = 5
1,210,135 UART: [ldev] AUTHORITY.KEYID = 7
1,210,598 UART: [ldev] FE.KEYID = 1
1,215,610 UART: [ldev] Erasing FE.KEYID = 1
1,241,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,754 UART: [fwproc] Wait for Commands...
1,281,433 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: Invalid Img size: 0 bytes
1,283,086 UART: ROM Fatal Error: 0x01020002
1,284,245 >>> mbox cmd response: failed
1,284,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,284,251 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,263 >>> mbox cmd response: failed
1,138,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,138,269 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,339 UART: [kat] SHA2-512-ACC
906,240 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,500 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,147 UART: [ldev] SUBJECT.KEYID = 5
1,210,574 UART: [ldev] AUTHORITY.KEYID = 7
1,211,037 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,779 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,125 UART: Invalid Img size: 0 bytes
1,285,173 UART: ROM Fatal Error: 0x01020002
1,286,332 >>> mbox cmd response: failed
1,286,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,286,338 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,300 >>> mbox cmd response: failed
1,139,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,139,306 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,889 UART: [state] WD Timer not started. Device not locked for debugging
88,114 UART: [kat] SHA2-256
891,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,793 UART: [kat] ++
895,945 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
905,154 UART: [kat] SHA2-512-ACC
907,055 UART: [kat] ECC-384
916,510 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,171,017 UART: [fht] FHT @ 0x50003400
1,173,749 UART: [idev] ++
1,173,917 UART: [idev] CDI.KEYID = 6
1,174,278 UART: [idev] SUBJECT.KEYID = 7
1,174,703 UART: [idev] UDS.KEYID = 0
1,182,931 UART: [idev] Erasing UDS.KEYID = 0
1,199,627 UART: [idev] Sha1 KeyId Algorithm
1,208,357 UART: [idev] --
1,209,420 UART: [ldev] ++
1,209,588 UART: [ldev] CDI.KEYID = 6
1,209,952 UART: [ldev] SUBJECT.KEYID = 5
1,210,379 UART: [ldev] AUTHORITY.KEYID = 7
1,210,842 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,242,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,516 UART: [fwproc] Wait for Commands...
1,282,297 UART: [fwproc] Recv command 0x46574c44
1,283,026 UART: Invalid Img size: 0 bytes
1,283,720 UART: ROM Fatal Error: 0x01020002
1,284,879 >>> mbox cmd response: failed
1,284,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,284,885 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,547 >>> mbox cmd response: failed
1,136,547 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,136,553 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,648 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,215,899 UART: [ldev] Erasing FE.KEYID = 1
1,241,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,616 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: Invalid Img size: 0 bytes
1,283,139 UART: ROM Fatal Error: 0x01020002
1,284,298 >>> mbox cmd response: failed
1,284,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,284,304 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,976 >>> mbox cmd response: failed
1,136,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,136,982 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,051 UART:
192,433 UART: Running Caliptra ROM ...
193,543 UART:
193,682 UART: [state] CFI Enabled
264,456 UART: [state] LifecycleState = Unprovisioned
266,828 UART: [state] DebugLocked = No
269,102 UART: [state] WD Timer not started. Device not locked for debugging
274,359 UART: [kat] SHA2-256
456,281 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,798 UART: [kat] ++
468,296 UART: [kat] sha1
479,175 UART: [kat] SHA2-256
482,187 UART: [kat] SHA2-384
488,208 UART: [kat] SHA2-512-ACC
490,836 UART: [kat] ECC-384
3,775,864 UART: [kat] HMAC-384Kdf
3,802,445 UART: [kat] LMS
4,875,576 UART: [kat] --
4,880,762 UART: [cold-reset] ++
4,882,968 UART: [fht] FHT @ 0x50003400
4,894,322 UART: [idev] ++
4,894,993 UART: [idev] CDI.KEYID = 6
4,896,227 UART: [idev] SUBJECT.KEYID = 7
4,897,528 UART: [idev] UDS.KEYID = 0
4,930,097 UART: [idev] Erasing UDS.KEYID = 0
8,244,491 UART: [idev] Sha1 KeyId Algorithm
8,266,088 UART: [idev] --
8,270,711 UART: [ldev] ++
8,271,299 UART: [ldev] CDI.KEYID = 6
8,272,533 UART: [ldev] SUBJECT.KEYID = 5
8,273,710 UART: [ldev] AUTHORITY.KEYID = 7
8,274,882 UART: [ldev] FE.KEYID = 1
8,318,907 UART: [ldev] Erasing FE.KEYID = 1
11,652,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,373 UART: [ldev] --
14,038,301 UART: [fwproc] Wait for Commands...
14,039,976 UART: [fwproc] Recv command 0x4d454153
14,046,998 UART: ROM Fatal Error: 0x01020005
14,050,369 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,854,006 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,448 UART:
192,984 UART: Running Caliptra ROM ...
194,175 UART:
603,453 UART: [state] CFI Enabled
618,741 UART: [state] LifecycleState = Unprovisioned
621,067 UART: [state] DebugLocked = No
623,722 UART: [state] WD Timer not started. Device not locked for debugging
628,853 UART: [kat] SHA2-256
810,831 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,359 UART: [kat] ++
822,861 UART: [kat] sha1
832,654 UART: [kat] SHA2-256
835,708 UART: [kat] SHA2-384
839,785 UART: [kat] SHA2-512-ACC
842,450 UART: [kat] ECC-384
4,093,927 UART: [kat] HMAC-384Kdf
4,107,314 UART: [kat] LMS
5,180,455 UART: [kat] --
5,184,043 UART: [cold-reset] ++
5,186,326 UART: [fht] FHT @ 0x50003400
5,197,955 UART: [idev] ++
5,198,624 UART: [idev] CDI.KEYID = 6
5,199,855 UART: [idev] SUBJECT.KEYID = 7
5,201,300 UART: [idev] UDS.KEYID = 0
5,222,448 UART: [idev] Erasing UDS.KEYID = 0
8,490,847 UART: [idev] Sha1 KeyId Algorithm
8,513,163 UART: [idev] --
8,517,670 UART: [ldev] ++
8,518,356 UART: [ldev] CDI.KEYID = 6
8,519,592 UART: [ldev] SUBJECT.KEYID = 5
8,521,016 UART: [ldev] AUTHORITY.KEYID = 7
8,522,623 UART: [ldev] FE.KEYID = 1
8,533,915 UART: [ldev] Erasing FE.KEYID = 1
11,822,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,762 UART: [ldev] --
14,187,525 UART: [fwproc] Wait for Commands...
14,189,729 UART: [fwproc] Recv command 0x4d454153
14,197,221 UART: ROM Fatal Error: 0x01020005
14,200,530 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,028,136 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,134 UART:
192,503 UART: Running Caliptra ROM ...
193,712 UART:
193,866 UART: [state] CFI Enabled
267,849 UART: [state] LifecycleState = Unprovisioned
269,802 UART: [state] DebugLocked = No
272,052 UART: [state] WD Timer not started. Device not locked for debugging
275,025 UART: [kat] SHA2-256
454,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,717 UART: [kat] ++
466,251 UART: [kat] sha1
476,320 UART: [kat] SHA2-256
479,381 UART: [kat] SHA2-384
485,946 UART: [kat] SHA2-512-ACC
488,933 UART: [kat] ECC-384
2,949,600 UART: [kat] HMAC-384Kdf
2,972,043 UART: [kat] LMS
3,501,505 UART: [kat] --
3,506,879 UART: [cold-reset] ++
3,507,794 UART: [fht] FHT @ 0x50003400
3,519,692 UART: [idev] ++
3,520,286 UART: [idev] CDI.KEYID = 6
3,521,203 UART: [idev] SUBJECT.KEYID = 7
3,522,366 UART: [idev] UDS.KEYID = 0
3,544,335 UART: [idev] Erasing UDS.KEYID = 0
6,029,199 UART: [idev] Sha1 KeyId Algorithm
6,053,067 UART: [idev] --
6,056,555 UART: [ldev] ++
6,057,134 UART: [ldev] CDI.KEYID = 6
6,058,208 UART: [ldev] SUBJECT.KEYID = 5
6,059,320 UART: [ldev] AUTHORITY.KEYID = 7
6,060,499 UART: [ldev] FE.KEYID = 1
6,101,582 UART: [ldev] Erasing FE.KEYID = 1
8,606,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,648 UART: [ldev] --
10,416,861 UART: [fwproc] Wait for Commands...
10,419,941 UART: [fwproc] Recv command 0x4d454153
10,426,310 UART: ROM Fatal Error: 0x01020005
10,429,369 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,888 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,505 UART:
192,887 UART: Running Caliptra ROM ...
194,110 UART:
603,520 UART: [state] CFI Enabled
616,649 UART: [state] LifecycleState = Unprovisioned
618,478 UART: [state] DebugLocked = No
621,367 UART: [state] WD Timer not started. Device not locked for debugging
625,751 UART: [kat] SHA2-256
804,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,419 UART: [kat] ++
816,947 UART: [kat] sha1
827,394 UART: [kat] SHA2-256
830,450 UART: [kat] SHA2-384
837,826 UART: [kat] SHA2-512-ACC
840,753 UART: [kat] ECC-384
3,279,088 UART: [kat] HMAC-384Kdf
3,290,499 UART: [kat] LMS
3,820,009 UART: [kat] --
3,823,461 UART: [cold-reset] ++
3,824,305 UART: [fht] FHT @ 0x50003400
3,834,524 UART: [idev] ++
3,835,082 UART: [idev] CDI.KEYID = 6
3,836,247 UART: [idev] SUBJECT.KEYID = 7
3,837,308 UART: [idev] UDS.KEYID = 0
3,854,689 UART: [idev] Erasing UDS.KEYID = 0
6,317,766 UART: [idev] Sha1 KeyId Algorithm
6,341,435 UART: [idev] --
6,345,532 UART: [ldev] ++
6,346,099 UART: [ldev] CDI.KEYID = 6
6,346,988 UART: [ldev] SUBJECT.KEYID = 5
6,348,200 UART: [ldev] AUTHORITY.KEYID = 7
6,349,430 UART: [ldev] FE.KEYID = 1
6,358,752 UART: [ldev] Erasing FE.KEYID = 1
8,830,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,996 UART: [ldev] --
10,619,249 UART: [fwproc] Wait for Commands...
10,621,614 UART: [fwproc] Recv command 0x4d454153
10,628,135 UART: ROM Fatal Error: 0x01020005
10,631,274 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,975 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,239 UART:
192,624 UART: Running Caliptra ROM ...
193,737 UART:
193,881 UART: [state] CFI Enabled
268,120 UART: [state] LifecycleState = Unprovisioned
269,991 UART: [state] DebugLocked = No
272,695 UART: [state] WD Timer not started. Device not locked for debugging
276,255 UART: [kat] SHA2-256
455,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,932 UART: [kat] ++
467,382 UART: [kat] sha1
477,931 UART: [kat] SHA2-256
480,950 UART: [kat] SHA2-384
486,125 UART: [kat] SHA2-512-ACC
489,118 UART: [kat] ECC-384
2,946,396 UART: [kat] HMAC-384Kdf
2,972,731 UART: [kat] LMS
3,502,205 UART: [kat] --
3,506,201 UART: [cold-reset] ++
3,507,594 UART: [fht] FHT @ 0x50003400
3,518,462 UART: [idev] ++
3,519,036 UART: [idev] CDI.KEYID = 6
3,519,953 UART: [idev] SUBJECT.KEYID = 7
3,521,168 UART: [idev] UDS.KEYID = 0
3,543,839 UART: [idev] Erasing UDS.KEYID = 0
6,025,076 UART: [idev] Sha1 KeyId Algorithm
6,047,897 UART: [idev] --
6,052,467 UART: [ldev] ++
6,053,043 UART: [ldev] CDI.KEYID = 6
6,053,957 UART: [ldev] SUBJECT.KEYID = 5
6,055,175 UART: [ldev] AUTHORITY.KEYID = 7
6,056,434 UART: [ldev] FE.KEYID = 1
6,100,681 UART: [ldev] Erasing FE.KEYID = 1
8,607,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,422 UART: [ldev] --
10,413,493 UART: [fwproc] Wait for Commands...
10,416,666 UART: [fwproc] Recv command 0x4d454153
10,423,079 UART: ROM Fatal Error: 0x01020005
10,426,227 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,221,217 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,562 UART:
192,936 UART: Running Caliptra ROM ...
194,167 UART:
603,444 UART: [state] CFI Enabled
622,451 UART: [state] LifecycleState = Unprovisioned
624,357 UART: [state] DebugLocked = No
626,198 UART: [state] WD Timer not started. Device not locked for debugging
630,281 UART: [kat] SHA2-256
809,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,940 UART: [kat] ++
821,526 UART: [kat] sha1
831,668 UART: [kat] SHA2-256
834,713 UART: [kat] SHA2-384
840,123 UART: [kat] SHA2-512-ACC
843,065 UART: [kat] ECC-384
3,285,707 UART: [kat] HMAC-384Kdf
3,298,161 UART: [kat] LMS
3,827,690 UART: [kat] --
3,832,454 UART: [cold-reset] ++
3,834,599 UART: [fht] FHT @ 0x50003400
3,846,491 UART: [idev] ++
3,847,052 UART: [idev] CDI.KEYID = 6
3,848,018 UART: [idev] SUBJECT.KEYID = 7
3,849,176 UART: [idev] UDS.KEYID = 0
3,868,123 UART: [idev] Erasing UDS.KEYID = 0
6,325,752 UART: [idev] Sha1 KeyId Algorithm
6,348,533 UART: [idev] --
6,352,986 UART: [ldev] ++
6,353,564 UART: [ldev] CDI.KEYID = 6
6,354,474 UART: [ldev] SUBJECT.KEYID = 5
6,355,685 UART: [ldev] AUTHORITY.KEYID = 7
6,356,916 UART: [ldev] FE.KEYID = 1
6,365,724 UART: [ldev] Erasing FE.KEYID = 1
8,838,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,148 UART: [ldev] --
10,632,246 UART: [fwproc] Wait for Commands...
10,634,507 UART: [fwproc] Recv command 0x4d454153
10,641,135 UART: ROM Fatal Error: 0x01020005
10,644,277 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,431 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,527 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,241,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x4d454153
1,283,370 UART: ROM Fatal Error: 0x01020005
1,284,529 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,853 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,293 UART: [kat] LMS
1,169,605 UART: [kat] --
1,170,752 UART: [cold-reset] ++
1,171,266 UART: [fht] FHT @ 0x50003400
1,173,886 UART: [idev] ++
1,174,054 UART: [idev] CDI.KEYID = 6
1,174,415 UART: [idev] SUBJECT.KEYID = 7
1,174,840 UART: [idev] UDS.KEYID = 0
1,182,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,259 UART: [ldev] ++
1,209,427 UART: [ldev] CDI.KEYID = 6
1,209,791 UART: [ldev] SUBJECT.KEYID = 5
1,210,218 UART: [ldev] AUTHORITY.KEYID = 7
1,210,681 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,255 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x4d454153
1,285,191 UART: ROM Fatal Error: 0x01020005
1,286,350 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,088 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,294 UART: [kat] SHA2-512-ACC
906,195 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,511 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,390 UART: [ldev] ++
1,208,558 UART: [ldev] CDI.KEYID = 6
1,208,922 UART: [ldev] SUBJECT.KEYID = 5
1,209,349 UART: [ldev] AUTHORITY.KEYID = 7
1,209,812 UART: [ldev] FE.KEYID = 1
1,215,056 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x4d454153
1,283,874 UART: ROM Fatal Error: 0x01020005
1,285,033 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,119 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,578 UART: [kat] SHA2-256
902,518 UART: [kat] SHA2-384
905,185 UART: [kat] SHA2-512-ACC
907,086 UART: [kat] ECC-384
916,919 UART: [kat] HMAC-384Kdf
921,431 UART: [kat] LMS
1,169,743 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,328 UART: [fht] FHT @ 0x50003400
1,174,018 UART: [idev] ++
1,174,186 UART: [idev] CDI.KEYID = 6
1,174,547 UART: [idev] SUBJECT.KEYID = 7
1,174,972 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,516 UART: [idev] --
1,209,523 UART: [ldev] ++
1,209,691 UART: [ldev] CDI.KEYID = 6
1,210,055 UART: [ldev] SUBJECT.KEYID = 5
1,210,482 UART: [ldev] AUTHORITY.KEYID = 7
1,210,945 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,112 UART: [fwproc] Recv command 0x4d454153
1,284,095 UART: ROM Fatal Error: 0x01020005
1,285,254 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,024 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,301 UART: [kat] SHA2-256
901,241 UART: [kat] SHA2-384
903,900 UART: [kat] SHA2-512-ACC
905,801 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,216 UART: [kat] LMS
1,168,528 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,461 UART: [idev] ++
1,172,629 UART: [idev] CDI.KEYID = 6
1,172,990 UART: [idev] SUBJECT.KEYID = 7
1,173,415 UART: [idev] UDS.KEYID = 0
1,181,109 UART: [idev] Erasing UDS.KEYID = 0
1,197,581 UART: [idev] Sha1 KeyId Algorithm
1,206,405 UART: [idev] --
1,207,472 UART: [ldev] ++
1,207,640 UART: [ldev] CDI.KEYID = 6
1,208,004 UART: [ldev] SUBJECT.KEYID = 5
1,208,431 UART: [ldev] AUTHORITY.KEYID = 7
1,208,894 UART: [ldev] FE.KEYID = 1
1,213,992 UART: [ldev] Erasing FE.KEYID = 1
1,240,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,624 UART: [ldev] --
1,279,948 UART: [fwproc] Wait for Commands...
1,280,675 UART: [fwproc] Recv command 0x4d454153
1,282,882 UART: ROM Fatal Error: 0x01020005
1,284,041 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,136,947 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,235 UART: [ldev] ++
1,209,403 UART: [ldev] CDI.KEYID = 6
1,209,767 UART: [ldev] SUBJECT.KEYID = 5
1,210,194 UART: [ldev] AUTHORITY.KEYID = 7
1,210,657 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x4d454153
1,284,225 UART: ROM Fatal Error: 0x01020005
1,285,384 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,136,640 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,438 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,075 UART:
192,446 UART: Running Caliptra ROM ...
193,667 UART:
193,823 UART: [state] CFI Enabled
260,920 UART: [state] LifecycleState = Unprovisioned
263,418 UART: [state] DebugLocked = No
264,939 UART: [state] WD Timer not started. Device not locked for debugging
268,802 UART: [kat] SHA2-256
450,778 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,298 UART: [kat] ++
462,783 UART: [kat] sha1
472,691 UART: [kat] SHA2-256
475,751 UART: [kat] SHA2-384
481,183 UART: [kat] SHA2-512-ACC
483,800 UART: [kat] ECC-384
3,776,649 UART: [kat] HMAC-384Kdf
3,801,667 UART: [kat] LMS
4,874,811 UART: [kat] --
4,878,778 UART: [cold-reset] ++
4,881,525 UART: [fht] FHT @ 0x50003400
4,892,610 UART: [idev] ++
4,893,281 UART: [idev] CDI.KEYID = 6
4,894,513 UART: [idev] SUBJECT.KEYID = 7
4,895,667 UART: [idev] UDS.KEYID = 0
4,930,087 UART: [idev] Erasing UDS.KEYID = 0
8,239,919 UART: [idev] Sha1 KeyId Algorithm
8,262,231 UART: [idev] --
8,265,948 UART: [ldev] ++
8,266,513 UART: [ldev] CDI.KEYID = 6
8,267,751 UART: [ldev] SUBJECT.KEYID = 5
8,268,858 UART: [ldev] AUTHORITY.KEYID = 7
8,270,010 UART: [ldev] FE.KEYID = 1
8,316,821 UART: [ldev] Erasing FE.KEYID = 1
11,652,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,245 UART: [ldev] --
14,036,321 UART: [fwproc] Wait for Commands...
14,039,228 UART: [fwproc] Recv command 0x43415053
14,044,300 UART: ROM Fatal Error: 0x01020006
14,047,666 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,459 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
13,806,097 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,761 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,366 UART:
192,754 UART: Running Caliptra ROM ...
193,853 UART:
603,476 UART: [state] CFI Enabled
614,658 UART: [state] LifecycleState = Unprovisioned
617,057 UART: [state] DebugLocked = No
618,624 UART: [state] WD Timer not started. Device not locked for debugging
623,541 UART: [kat] SHA2-256
805,479 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,025 UART: [kat] ++
817,526 UART: [kat] sha1
827,748 UART: [kat] SHA2-256
830,795 UART: [kat] SHA2-384
836,580 UART: [kat] SHA2-512-ACC
839,190 UART: [kat] ECC-384
4,094,392 UART: [kat] HMAC-384Kdf
4,106,764 UART: [kat] LMS
5,179,938 UART: [kat] --
5,182,374 UART: [cold-reset] ++
5,183,820 UART: [fht] FHT @ 0x50003400
5,195,925 UART: [idev] ++
5,196,663 UART: [idev] CDI.KEYID = 6
5,197,769 UART: [idev] SUBJECT.KEYID = 7
5,199,297 UART: [idev] UDS.KEYID = 0
5,214,431 UART: [idev] Erasing UDS.KEYID = 0
8,485,183 UART: [idev] Sha1 KeyId Algorithm
8,507,661 UART: [idev] --
8,512,197 UART: [ldev] ++
8,512,815 UART: [ldev] CDI.KEYID = 6
8,514,013 UART: [ldev] SUBJECT.KEYID = 5
8,515,442 UART: [ldev] AUTHORITY.KEYID = 7
8,517,047 UART: [ldev] FE.KEYID = 1
8,528,825 UART: [ldev] Erasing FE.KEYID = 1
11,820,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,034 UART: [ldev] --
14,184,469 UART: [fwproc] Wait for Commands...
14,185,974 UART: [fwproc] Recv command 0x43415053
14,191,144 UART: ROM Fatal Error: 0x01020006
14,194,457 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,871 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
14,013,893 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,476 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,103 UART:
192,485 UART: Running Caliptra ROM ...
193,710 UART:
193,863 UART: [state] CFI Enabled
264,707 UART: [state] LifecycleState = Unprovisioned
266,572 UART: [state] DebugLocked = No
269,522 UART: [state] WD Timer not started. Device not locked for debugging
272,494 UART: [kat] SHA2-256
451,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,182 UART: [kat] ++
463,717 UART: [kat] sha1
474,542 UART: [kat] SHA2-256
477,600 UART: [kat] SHA2-384
482,386 UART: [kat] SHA2-512-ACC
485,333 UART: [kat] ECC-384
2,948,544 UART: [kat] HMAC-384Kdf
2,970,842 UART: [kat] LMS
3,500,298 UART: [kat] --
3,505,529 UART: [cold-reset] ++
3,508,103 UART: [fht] FHT @ 0x50003400
3,518,535 UART: [idev] ++
3,519,098 UART: [idev] CDI.KEYID = 6
3,520,037 UART: [idev] SUBJECT.KEYID = 7
3,521,253 UART: [idev] UDS.KEYID = 0
3,541,632 UART: [idev] Erasing UDS.KEYID = 0
6,022,262 UART: [idev] Sha1 KeyId Algorithm
6,044,117 UART: [idev] --
6,048,980 UART: [ldev] ++
6,049,556 UART: [ldev] CDI.KEYID = 6
6,050,475 UART: [ldev] SUBJECT.KEYID = 5
6,051,634 UART: [ldev] AUTHORITY.KEYID = 7
6,052,866 UART: [ldev] FE.KEYID = 1
6,098,700 UART: [ldev] Erasing FE.KEYID = 1
8,598,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,526 UART: [ldev] --
10,390,356 UART: [fwproc] Wait for Commands...
10,393,263 UART: [fwproc] Recv command 0x43415053
10,397,357 UART: ROM Fatal Error: 0x01020006
10,400,449 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,740 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,207,753 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,939 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,536 UART:
192,923 UART: Running Caliptra ROM ...
194,131 UART:
603,497 UART: [state] CFI Enabled
613,391 UART: [state] LifecycleState = Unprovisioned
615,271 UART: [state] DebugLocked = No
616,669 UART: [state] WD Timer not started. Device not locked for debugging
621,294 UART: [kat] SHA2-256
800,420 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,954 UART: [kat] ++
812,403 UART: [kat] sha1
823,442 UART: [kat] SHA2-256
826,447 UART: [kat] SHA2-384
833,444 UART: [kat] SHA2-512-ACC
836,391 UART: [kat] ECC-384
3,276,801 UART: [kat] HMAC-384Kdf
3,289,662 UART: [kat] LMS
3,819,148 UART: [kat] --
3,823,547 UART: [cold-reset] ++
3,825,481 UART: [fht] FHT @ 0x50003400
3,837,269 UART: [idev] ++
3,837,829 UART: [idev] CDI.KEYID = 6
3,838,737 UART: [idev] SUBJECT.KEYID = 7
3,839,949 UART: [idev] UDS.KEYID = 0
3,854,896 UART: [idev] Erasing UDS.KEYID = 0
6,311,345 UART: [idev] Sha1 KeyId Algorithm
6,333,098 UART: [idev] --
6,336,902 UART: [ldev] ++
6,337,478 UART: [ldev] CDI.KEYID = 6
6,338,387 UART: [ldev] SUBJECT.KEYID = 5
6,339,564 UART: [ldev] AUTHORITY.KEYID = 7
6,340,793 UART: [ldev] FE.KEYID = 1
6,351,114 UART: [ldev] Erasing FE.KEYID = 1
8,823,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,340 UART: [ldev] --
10,613,361 UART: [fwproc] Wait for Commands...
10,615,886 UART: [fwproc] Recv command 0x43415053
10,619,390 UART: ROM Fatal Error: 0x01020006
10,622,531 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,777 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,405,366 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,391 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,007 UART:
192,386 UART: Running Caliptra ROM ...
193,601 UART:
193,781 UART: [state] CFI Enabled
265,388 UART: [state] LifecycleState = Unprovisioned
267,258 UART: [state] DebugLocked = No
269,722 UART: [state] WD Timer not started. Device not locked for debugging
273,221 UART: [kat] SHA2-256
452,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,899 UART: [kat] ++
464,431 UART: [kat] sha1
475,418 UART: [kat] SHA2-256
478,421 UART: [kat] SHA2-384
484,776 UART: [kat] SHA2-512-ACC
487,765 UART: [kat] ECC-384
2,948,187 UART: [kat] HMAC-384Kdf
2,970,313 UART: [kat] LMS
3,499,757 UART: [kat] --
3,504,742 UART: [cold-reset] ++
3,507,187 UART: [fht] FHT @ 0x50003400
3,517,632 UART: [idev] ++
3,518,204 UART: [idev] CDI.KEYID = 6
3,519,132 UART: [idev] SUBJECT.KEYID = 7
3,520,293 UART: [idev] UDS.KEYID = 0
3,542,702 UART: [idev] Erasing UDS.KEYID = 0
6,025,839 UART: [idev] Sha1 KeyId Algorithm
6,049,077 UART: [idev] --
6,052,747 UART: [ldev] ++
6,053,318 UART: [ldev] CDI.KEYID = 6
6,054,282 UART: [ldev] SUBJECT.KEYID = 5
6,055,443 UART: [ldev] AUTHORITY.KEYID = 7
6,056,674 UART: [ldev] FE.KEYID = 1
6,097,735 UART: [ldev] Erasing FE.KEYID = 1
8,612,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,977 UART: [ldev] --
10,424,148 UART: [fwproc] Wait for Commands...
10,427,066 UART: [fwproc] Recv command 0x43415053
10,430,467 UART: ROM Fatal Error: 0x01020006
10,433,623 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,793 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,202,479 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,833 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,406 UART:
192,799 UART: Running Caliptra ROM ...
194,029 UART:
603,542 UART: [state] CFI Enabled
618,992 UART: [state] LifecycleState = Unprovisioned
620,872 UART: [state] DebugLocked = No
622,165 UART: [state] WD Timer not started. Device not locked for debugging
625,285 UART: [kat] SHA2-256
804,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,943 UART: [kat] ++
816,412 UART: [kat] sha1
827,287 UART: [kat] SHA2-256
830,356 UART: [kat] SHA2-384
835,407 UART: [kat] SHA2-512-ACC
838,339 UART: [kat] ECC-384
3,281,636 UART: [kat] HMAC-384Kdf
3,293,805 UART: [kat] LMS
3,823,261 UART: [kat] --
3,827,899 UART: [cold-reset] ++
3,829,179 UART: [fht] FHT @ 0x50003400
3,839,884 UART: [idev] ++
3,840,445 UART: [idev] CDI.KEYID = 6
3,841,349 UART: [idev] SUBJECT.KEYID = 7
3,842,559 UART: [idev] UDS.KEYID = 0
3,856,428 UART: [idev] Erasing UDS.KEYID = 0
6,319,412 UART: [idev] Sha1 KeyId Algorithm
6,341,916 UART: [idev] --
6,346,948 UART: [ldev] ++
6,347,518 UART: [ldev] CDI.KEYID = 6
6,348,421 UART: [ldev] SUBJECT.KEYID = 5
6,349,575 UART: [ldev] AUTHORITY.KEYID = 7
6,350,855 UART: [ldev] FE.KEYID = 1
6,361,979 UART: [ldev] Erasing FE.KEYID = 1
8,835,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,549 UART: [ldev] --
10,626,942 UART: [fwproc] Wait for Commands...
10,628,978 UART: [fwproc] Recv command 0x43415053
10,633,766 UART: ROM Fatal Error: 0x01020006
10,636,885 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
3,989 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,413,821 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,514 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,501 UART: [cold-reset] ++
1,171,013 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,182,545 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,930 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x43415053
1,283,146 UART: ROM Fatal Error: 0x01020006
1,284,305 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,303 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
891,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,882 UART: [kat] ++
896,034 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,499 UART: [kat] LMS
1,169,811 UART: [kat] --
1,170,742 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,473 UART: [idev] SUBJECT.KEYID = 7
1,174,898 UART: [idev] UDS.KEYID = 0
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,986 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,659 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x43415053
1,284,571 UART: ROM Fatal Error: 0x01020006
1,285,730 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,182 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,645 UART: [kat] ++
895,797 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,818 UART: [kat] SHA2-512-ACC
906,719 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,149 UART: [cold-reset] ++
1,170,661 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,182,547 UART: [idev] Erasing UDS.KEYID = 0
1,199,001 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,188 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x43415053
1,282,060 UART: ROM Fatal Error: 0x01020006
1,283,219 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,037 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,185 UART: [kat] SHA2-512-ACC
907,086 UART: [kat] ECC-384
916,783 UART: [kat] HMAC-384Kdf
921,499 UART: [kat] LMS
1,169,811 UART: [kat] --
1,171,092 UART: [cold-reset] ++
1,171,596 UART: [fht] FHT @ 0x50003400
1,174,124 UART: [idev] ++
1,174,292 UART: [idev] CDI.KEYID = 6
1,174,653 UART: [idev] SUBJECT.KEYID = 7
1,175,078 UART: [idev] UDS.KEYID = 0
1,183,066 UART: [idev] Erasing UDS.KEYID = 0
1,200,460 UART: [idev] Sha1 KeyId Algorithm
1,209,476 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,247 UART: [ldev] --
1,282,573 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x43415053
1,284,239 UART: ROM Fatal Error: 0x01020006
1,285,398 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,128 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,142 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,207,085 UART: [idev] --
1,208,070 UART: [ldev] ++
1,208,238 UART: [ldev] CDI.KEYID = 6
1,208,602 UART: [ldev] SUBJECT.KEYID = 5
1,209,029 UART: [ldev] AUTHORITY.KEYID = 7
1,209,492 UART: [ldev] FE.KEYID = 1
1,214,728 UART: [ldev] Erasing FE.KEYID = 1
1,241,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,281,027 UART: [fwproc] Recv command 0x43415053
1,282,150 UART: ROM Fatal Error: 0x01020006
1,283,309 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,905 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,199,222 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,175 UART: [ldev] ++
1,209,343 UART: [ldev] CDI.KEYID = 6
1,209,707 UART: [ldev] SUBJECT.KEYID = 5
1,210,134 UART: [ldev] AUTHORITY.KEYID = 7
1,210,597 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,919 UART: [ldev] --
1,281,295 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x43415053
1,283,091 UART: ROM Fatal Error: 0x01020006
1,284,250 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,130 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,459 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,087 UART:
192,477 UART: Running Caliptra ROM ...
193,677 UART:
193,832 UART: [state] CFI Enabled
264,767 UART: [state] LifecycleState = Unprovisioned
267,179 UART: [state] DebugLocked = No
268,448 UART: [state] WD Timer not started. Device not locked for debugging
272,623 UART: [kat] SHA2-256
454,529 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,069 UART: [kat] ++
466,519 UART: [kat] sha1
476,050 UART: [kat] SHA2-256
479,069 UART: [kat] SHA2-384
484,720 UART: [kat] SHA2-512-ACC
487,328 UART: [kat] ECC-384
3,775,905 UART: [kat] HMAC-384Kdf
3,802,691 UART: [kat] LMS
4,875,850 UART: [kat] --
4,879,764 UART: [cold-reset] ++
4,881,970 UART: [fht] FHT @ 0x50003400
4,892,625 UART: [idev] ++
4,893,340 UART: [idev] CDI.KEYID = 6
4,894,528 UART: [idev] SUBJECT.KEYID = 7
4,895,636 UART: [idev] UDS.KEYID = 0
4,929,773 UART: [idev] Erasing UDS.KEYID = 0
8,240,346 UART: [idev] Sha1 KeyId Algorithm
8,262,886 UART: [idev] --
8,266,745 UART: [ldev] ++
8,267,320 UART: [ldev] CDI.KEYID = 6
8,268,555 UART: [ldev] SUBJECT.KEYID = 5
8,269,637 UART: [ldev] AUTHORITY.KEYID = 7
8,270,839 UART: [ldev] FE.KEYID = 1
8,319,066 UART: [ldev] Erasing FE.KEYID = 1
11,650,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,949 UART: [ldev] --
14,017,362 UART: [fwproc] Wait for Commands...
14,019,980 UART: [fwproc] Recv command 0x4d454153
14,024,089 UART: ROM Fatal Error: 0x01020006
14,027,457 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,543 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
13,851,627 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,069 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,676 UART:
193,060 UART: Running Caliptra ROM ...
194,268 UART:
603,684 UART: [state] CFI Enabled
615,787 UART: [state] LifecycleState = Unprovisioned
618,170 UART: [state] DebugLocked = No
620,837 UART: [state] WD Timer not started. Device not locked for debugging
625,586 UART: [kat] SHA2-256
807,534 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,075 UART: [kat] ++
819,605 UART: [kat] sha1
829,777 UART: [kat] SHA2-256
832,858 UART: [kat] SHA2-384
838,183 UART: [kat] SHA2-512-ACC
840,788 UART: [kat] ECC-384
4,095,586 UART: [kat] HMAC-384Kdf
4,106,899 UART: [kat] LMS
5,180,074 UART: [kat] --
5,183,343 UART: [cold-reset] ++
5,185,276 UART: [fht] FHT @ 0x50003400
5,196,892 UART: [idev] ++
5,197,555 UART: [idev] CDI.KEYID = 6
5,198,703 UART: [idev] SUBJECT.KEYID = 7
5,200,232 UART: [idev] UDS.KEYID = 0
5,217,581 UART: [idev] Erasing UDS.KEYID = 0
8,487,759 UART: [idev] Sha1 KeyId Algorithm
8,510,770 UART: [idev] --
8,514,630 UART: [ldev] ++
8,515,222 UART: [ldev] CDI.KEYID = 6
8,516,453 UART: [ldev] SUBJECT.KEYID = 5
8,517,880 UART: [ldev] AUTHORITY.KEYID = 7
8,519,431 UART: [ldev] FE.KEYID = 1
8,530,502 UART: [ldev] Erasing FE.KEYID = 1
11,822,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,235 UART: [ldev] --
14,190,725 UART: [fwproc] Wait for Commands...
14,192,383 UART: [fwproc] Recv command 0x4d454153
14,197,554 UART: ROM Fatal Error: 0x01020006
14,200,918 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
4,077 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
14,021,238 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,643 writing to cptra_bootfsm_go
5,128 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
193,764 UART:
194,142 UART: Running Caliptra ROM ...
195,362 UART:
195,515 UART: [state] CFI Enabled
263,627 UART: [state] LifecycleState = Unprovisioned
265,510 UART: [state] DebugLocked = No
266,953 UART: [state] WD Timer not started. Device not locked for debugging
270,459 UART: [kat] SHA2-256
449,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,130 UART: [kat] ++
461,664 UART: [kat] sha1
473,680 UART: [kat] SHA2-256
476,680 UART: [kat] SHA2-384
482,880 UART: [kat] SHA2-512-ACC
485,803 UART: [kat] ECC-384
2,948,022 UART: [kat] HMAC-384Kdf
2,970,368 UART: [kat] LMS
3,499,801 UART: [kat] --
3,503,146 UART: [cold-reset] ++
3,505,683 UART: [fht] FHT @ 0x50003400
3,515,855 UART: [idev] ++
3,516,419 UART: [idev] CDI.KEYID = 6
3,517,387 UART: [idev] SUBJECT.KEYID = 7
3,518,546 UART: [idev] UDS.KEYID = 0
3,543,761 UART: [idev] Erasing UDS.KEYID = 0
6,026,269 UART: [idev] Sha1 KeyId Algorithm
6,049,395 UART: [idev] --
6,054,203 UART: [ldev] ++
6,054,779 UART: [ldev] CDI.KEYID = 6
6,055,686 UART: [ldev] SUBJECT.KEYID = 5
6,056,904 UART: [ldev] AUTHORITY.KEYID = 7
6,058,160 UART: [ldev] FE.KEYID = 1
6,099,386 UART: [ldev] Erasing FE.KEYID = 1
8,604,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,642 UART: [ldev] --
10,416,715 UART: [fwproc] Wait for Commands...
10,418,387 UART: [fwproc] Recv command 0x4d454153
10,422,224 UART: ROM Fatal Error: 0x01020006
10,425,377 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,557 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,227,590 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,858 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,448 UART:
192,824 UART: Running Caliptra ROM ...
193,986 UART:
603,546 UART: [state] CFI Enabled
616,514 UART: [state] LifecycleState = Unprovisioned
618,356 UART: [state] DebugLocked = No
620,059 UART: [state] WD Timer not started. Device not locked for debugging
623,459 UART: [kat] SHA2-256
802,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,126 UART: [kat] ++
814,570 UART: [kat] sha1
826,212 UART: [kat] SHA2-256
829,200 UART: [kat] SHA2-384
835,398 UART: [kat] SHA2-512-ACC
838,378 UART: [kat] ECC-384
3,280,398 UART: [kat] HMAC-384Kdf
3,293,062 UART: [kat] LMS
3,822,565 UART: [kat] --
3,828,292 UART: [cold-reset] ++
3,830,874 UART: [fht] FHT @ 0x50003400
3,842,118 UART: [idev] ++
3,842,698 UART: [idev] CDI.KEYID = 6
3,843,713 UART: [idev] SUBJECT.KEYID = 7
3,844,812 UART: [idev] UDS.KEYID = 0
3,859,062 UART: [idev] Erasing UDS.KEYID = 0
6,313,652 UART: [idev] Sha1 KeyId Algorithm
6,336,088 UART: [idev] --
6,339,725 UART: [ldev] ++
6,340,301 UART: [ldev] CDI.KEYID = 6
6,341,217 UART: [ldev] SUBJECT.KEYID = 5
6,342,376 UART: [ldev] AUTHORITY.KEYID = 7
6,343,661 UART: [ldev] FE.KEYID = 1
6,353,603 UART: [ldev] Erasing FE.KEYID = 1
8,823,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,006 UART: [ldev] --
10,613,741 UART: [fwproc] Wait for Commands...
10,615,726 UART: [fwproc] Recv command 0x4d454153
10,619,765 UART: ROM Fatal Error: 0x01020006
10,622,918 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,878 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,406,593 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,668 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,287 UART:
192,649 UART: Running Caliptra ROM ...
193,851 UART:
194,001 UART: [state] CFI Enabled
262,117 UART: [state] LifecycleState = Unprovisioned
263,999 UART: [state] DebugLocked = No
266,573 UART: [state] WD Timer not started. Device not locked for debugging
270,288 UART: [kat] SHA2-256
449,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,981 UART: [kat] ++
461,508 UART: [kat] sha1
473,054 UART: [kat] SHA2-256
476,085 UART: [kat] SHA2-384
480,723 UART: [kat] SHA2-512-ACC
483,710 UART: [kat] ECC-384
2,946,057 UART: [kat] HMAC-384Kdf
2,970,780 UART: [kat] LMS
3,500,235 UART: [kat] --
3,505,525 UART: [cold-reset] ++
3,507,676 UART: [fht] FHT @ 0x50003400
3,518,471 UART: [idev] ++
3,519,075 UART: [idev] CDI.KEYID = 6
3,519,991 UART: [idev] SUBJECT.KEYID = 7
3,521,152 UART: [idev] UDS.KEYID = 0
3,542,367 UART: [idev] Erasing UDS.KEYID = 0
6,024,007 UART: [idev] Sha1 KeyId Algorithm
6,047,358 UART: [idev] --
6,052,436 UART: [ldev] ++
6,053,009 UART: [ldev] CDI.KEYID = 6
6,053,924 UART: [ldev] SUBJECT.KEYID = 5
6,055,145 UART: [ldev] AUTHORITY.KEYID = 7
6,056,380 UART: [ldev] FE.KEYID = 1
6,099,222 UART: [ldev] Erasing FE.KEYID = 1
8,601,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,831 UART: [ldev] --
10,390,788 UART: [fwproc] Wait for Commands...
10,393,588 UART: [fwproc] Recv command 0x4d454153
10,398,941 UART: ROM Fatal Error: 0x01020006
10,402,038 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,404 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,182,412 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
4,143 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,714 UART:
193,094 UART: Running Caliptra ROM ...
194,311 UART:
603,736 UART: [state] CFI Enabled
615,183 UART: [state] LifecycleState = Unprovisioned
617,063 UART: [state] DebugLocked = No
618,873 UART: [state] WD Timer not started. Device not locked for debugging
621,879 UART: [kat] SHA2-256
801,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,586 UART: [kat] ++
813,110 UART: [kat] sha1
824,910 UART: [kat] SHA2-256
827,952 UART: [kat] SHA2-384
833,409 UART: [kat] SHA2-512-ACC
836,339 UART: [kat] ECC-384
3,278,886 UART: [kat] HMAC-384Kdf
3,292,626 UART: [kat] LMS
3,822,098 UART: [kat] --
3,827,945 UART: [cold-reset] ++
3,829,446 UART: [fht] FHT @ 0x50003400
3,839,067 UART: [idev] ++
3,839,631 UART: [idev] CDI.KEYID = 6
3,840,538 UART: [idev] SUBJECT.KEYID = 7
3,841,748 UART: [idev] UDS.KEYID = 0
3,858,045 UART: [idev] Erasing UDS.KEYID = 0
6,317,617 UART: [idev] Sha1 KeyId Algorithm
6,341,682 UART: [idev] --
6,346,358 UART: [ldev] ++
6,346,930 UART: [ldev] CDI.KEYID = 6
6,347,832 UART: [ldev] SUBJECT.KEYID = 5
6,349,046 UART: [ldev] AUTHORITY.KEYID = 7
6,350,274 UART: [ldev] FE.KEYID = 1
6,359,595 UART: [ldev] Erasing FE.KEYID = 1
8,831,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,161 UART: [ldev] --
10,620,531 UART: [fwproc] Wait for Commands...
10,623,008 UART: [fwproc] Recv command 0x4d454153
10,627,916 UART: ROM Fatal Error: 0x01020006
10,631,003 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,753 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,412,629 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,096 UART: [kat] SHA2-256
890,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,775 UART: [kat] ++
894,927 UART: [kat] sha1
899,401 UART: [kat] SHA2-256
901,341 UART: [kat] SHA2-384
903,976 UART: [kat] SHA2-512-ACC
905,877 UART: [kat] ECC-384
915,480 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,107 UART: [cold-reset] ++
1,169,523 UART: [fht] FHT @ 0x50003400
1,172,143 UART: [idev] ++
1,172,311 UART: [idev] CDI.KEYID = 6
1,172,672 UART: [idev] SUBJECT.KEYID = 7
1,173,097 UART: [idev] UDS.KEYID = 0
1,181,133 UART: [idev] Erasing UDS.KEYID = 0
1,197,845 UART: [idev] Sha1 KeyId Algorithm
1,206,733 UART: [idev] --
1,207,652 UART: [ldev] ++
1,207,820 UART: [ldev] CDI.KEYID = 6
1,208,184 UART: [ldev] SUBJECT.KEYID = 5
1,208,611 UART: [ldev] AUTHORITY.KEYID = 7
1,209,074 UART: [ldev] FE.KEYID = 1
1,213,922 UART: [ldev] Erasing FE.KEYID = 1
1,239,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,826 UART: [ldev] --
1,279,164 UART: [fwproc] Wait for Commands...
1,279,763 UART: [fwproc] Recv command 0x4d454153
1,281,159 UART: ROM Fatal Error: 0x01020006
1,282,318 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,422 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
899,996 UART: [kat] SHA2-256
901,936 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
920,921 UART: [kat] LMS
1,169,233 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,435 UART: [ldev] --
1,281,719 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x4d454153
1,283,696 UART: ROM Fatal Error: 0x01020006
1,284,855 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,381 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,181,555 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,820 UART: [ldev] ++
1,208,988 UART: [ldev] CDI.KEYID = 6
1,209,352 UART: [ldev] SUBJECT.KEYID = 5
1,209,779 UART: [ldev] AUTHORITY.KEYID = 7
1,210,242 UART: [ldev] FE.KEYID = 1
1,215,676 UART: [ldev] Erasing FE.KEYID = 1
1,242,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,152 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x4d454153
1,284,453 UART: ROM Fatal Error: 0x01020006
1,285,612 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,482 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,206 UART: [kat] SHA2-256
902,146 UART: [kat] SHA2-384
905,041 UART: [kat] SHA2-512-ACC
906,942 UART: [kat] ECC-384
916,907 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,634 UART: [cold-reset] ++
1,171,154 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,182,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,928 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,747 UART: [ldev] ++
1,209,915 UART: [ldev] CDI.KEYID = 6
1,210,279 UART: [ldev] SUBJECT.KEYID = 5
1,210,706 UART: [ldev] AUTHORITY.KEYID = 7
1,211,169 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,507 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x4d454153
1,284,172 UART: ROM Fatal Error: 0x01020006
1,285,331 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,939 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,198,753 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,732 UART: [ldev] ++
1,208,900 UART: [ldev] CDI.KEYID = 6
1,209,264 UART: [ldev] SUBJECT.KEYID = 5
1,209,691 UART: [ldev] AUTHORITY.KEYID = 7
1,210,154 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,492 UART: [ldev] --
1,280,838 UART: [fwproc] Wait for Commands...
1,281,449 UART: [fwproc] Recv command 0x4d454153
1,282,787 UART: ROM Fatal Error: 0x01020006
1,283,946 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,184 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,528 UART: [kat] SHA2-256
901,468 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,011 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,181,554 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,572 UART: [idev] --
1,208,617 UART: [ldev] ++
1,208,785 UART: [ldev] CDI.KEYID = 6
1,209,149 UART: [ldev] SUBJECT.KEYID = 5
1,209,576 UART: [ldev] AUTHORITY.KEYID = 7
1,210,039 UART: [ldev] FE.KEYID = 1
1,215,013 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,749 UART: [fwproc] Wait for Commands...
1,281,568 UART: [fwproc] Recv command 0x4d454153
1,282,668 UART: ROM Fatal Error: 0x01020006
1,283,827 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,429 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,183 UART:
192,552 UART: Running Caliptra ROM ...
193,676 UART:
193,823 UART: [state] CFI Enabled
263,609 UART: [state] LifecycleState = Unprovisioned
266,029 UART: [state] DebugLocked = No
267,440 UART: [state] WD Timer not started. Device not locked for debugging
272,896 UART: [kat] SHA2-256
454,806 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,593 UART: [kat] ++
467,123 UART: [kat] sha1
478,549 UART: [kat] SHA2-256
481,584 UART: [kat] SHA2-384
488,588 UART: [kat] SHA2-512-ACC
491,203 UART: [kat] ECC-384
3,774,366 UART: [kat] HMAC-384Kdf
3,801,633 UART: [kat] LMS
4,874,753 UART: [kat] --
4,881,505 UART: [cold-reset] ++
4,883,071 UART: [fht] FHT @ 0x50003400
4,894,439 UART: [idev] ++
4,895,112 UART: [idev] CDI.KEYID = 6
4,896,349 UART: [idev] SUBJECT.KEYID = 7
4,897,502 UART: [idev] UDS.KEYID = 0
4,928,870 UART: [idev] Erasing UDS.KEYID = 0
8,241,500 UART: [idev] Sha1 KeyId Algorithm
8,262,021 UART: [idev] --
8,265,585 UART: [ldev] ++
8,266,150 UART: [ldev] CDI.KEYID = 6
8,267,391 UART: [ldev] SUBJECT.KEYID = 5
8,268,418 UART: [ldev] AUTHORITY.KEYID = 7
8,269,706 UART: [ldev] FE.KEYID = 1
8,315,412 UART: [ldev] Erasing FE.KEYID = 1
11,654,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,589 UART: [ldev] --
14,035,074 UART: [fwproc] Wait for Commands...
14,038,255 UART: [fwproc] Recv command 0x43415053
14,043,551 UART: ROM Fatal Error: 0x01020006
14,046,896 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,403 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
13,826,432 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,916 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,502 UART:
192,900 UART: Running Caliptra ROM ...
194,106 UART:
603,797 UART: [state] CFI Enabled
620,049 UART: [state] LifecycleState = Unprovisioned
622,447 UART: [state] DebugLocked = No
625,092 UART: [state] WD Timer not started. Device not locked for debugging
630,464 UART: [kat] SHA2-256
812,466 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
824,016 UART: [kat] ++
824,518 UART: [kat] sha1
835,986 UART: [kat] SHA2-256
839,054 UART: [kat] SHA2-384
845,028 UART: [kat] SHA2-512-ACC
847,642 UART: [kat] ECC-384
4,104,025 UART: [kat] HMAC-384Kdf
4,117,145 UART: [kat] LMS
5,190,293 UART: [kat] --
5,194,972 UART: [cold-reset] ++
5,196,215 UART: [fht] FHT @ 0x50003400
5,207,655 UART: [idev] ++
5,208,322 UART: [idev] CDI.KEYID = 6
5,209,564 UART: [idev] SUBJECT.KEYID = 7
5,211,003 UART: [idev] UDS.KEYID = 0
5,226,064 UART: [idev] Erasing UDS.KEYID = 0
8,497,345 UART: [idev] Sha1 KeyId Algorithm
8,519,974 UART: [idev] --
8,524,713 UART: [ldev] ++
8,525,286 UART: [ldev] CDI.KEYID = 6
8,526,471 UART: [ldev] SUBJECT.KEYID = 5
8,527,961 UART: [ldev] AUTHORITY.KEYID = 7
8,529,521 UART: [ldev] FE.KEYID = 1
8,541,352 UART: [ldev] Erasing FE.KEYID = 1
11,831,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,574 UART: [ldev] --
14,197,809 UART: [fwproc] Wait for Commands...
14,200,822 UART: [fwproc] Recv command 0x43415053
14,204,542 UART: ROM Fatal Error: 0x01020006
14,207,859 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
4,027 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
14,017,712 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,151 UART:
192,538 UART: Running Caliptra ROM ...
193,682 UART:
193,827 UART: [state] CFI Enabled
262,551 UART: [state] LifecycleState = Unprovisioned
264,422 UART: [state] DebugLocked = No
266,850 UART: [state] WD Timer not started. Device not locked for debugging
269,832 UART: [kat] SHA2-256
448,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,527 UART: [kat] ++
460,976 UART: [kat] sha1
471,957 UART: [kat] SHA2-256
474,969 UART: [kat] SHA2-384
481,108 UART: [kat] SHA2-512-ACC
484,096 UART: [kat] ECC-384
2,948,539 UART: [kat] HMAC-384Kdf
2,963,160 UART: [kat] LMS
3,492,619 UART: [kat] --
3,497,615 UART: [cold-reset] ++
3,498,525 UART: [fht] FHT @ 0x50003400
3,509,600 UART: [idev] ++
3,510,187 UART: [idev] CDI.KEYID = 6
3,511,101 UART: [idev] SUBJECT.KEYID = 7
3,512,281 UART: [idev] UDS.KEYID = 0
3,535,332 UART: [idev] Erasing UDS.KEYID = 0
6,015,118 UART: [idev] Sha1 KeyId Algorithm
6,038,181 UART: [idev] --
6,043,042 UART: [ldev] ++
6,043,618 UART: [ldev] CDI.KEYID = 6
6,044,526 UART: [ldev] SUBJECT.KEYID = 5
6,045,744 UART: [ldev] AUTHORITY.KEYID = 7
6,046,926 UART: [ldev] FE.KEYID = 1
6,091,660 UART: [ldev] Erasing FE.KEYID = 1
8,595,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,729 UART: [ldev] --
10,402,945 UART: [fwproc] Wait for Commands...
10,404,671 UART: [fwproc] Recv command 0x43415053
10,408,402 UART: ROM Fatal Error: 0x01020006
10,411,501 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,391 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,165,479 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,807 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,410 UART:
192,795 UART: Running Caliptra ROM ...
193,908 UART:
603,489 UART: [state] CFI Enabled
619,682 UART: [state] LifecycleState = Unprovisioned
621,584 UART: [state] DebugLocked = No
623,634 UART: [state] WD Timer not started. Device not locked for debugging
627,513 UART: [kat] SHA2-256
806,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,232 UART: [kat] ++
818,677 UART: [kat] sha1
830,150 UART: [kat] SHA2-256
833,146 UART: [kat] SHA2-384
838,374 UART: [kat] SHA2-512-ACC
841,360 UART: [kat] ECC-384
3,283,790 UART: [kat] HMAC-384Kdf
3,296,679 UART: [kat] LMS
3,826,146 UART: [kat] --
3,829,734 UART: [cold-reset] ++
3,830,974 UART: [fht] FHT @ 0x50003400
3,840,765 UART: [idev] ++
3,841,348 UART: [idev] CDI.KEYID = 6
3,842,256 UART: [idev] SUBJECT.KEYID = 7
3,843,469 UART: [idev] UDS.KEYID = 0
3,855,395 UART: [idev] Erasing UDS.KEYID = 0
6,315,601 UART: [idev] Sha1 KeyId Algorithm
6,339,156 UART: [idev] --
6,344,497 UART: [ldev] ++
6,345,109 UART: [ldev] CDI.KEYID = 6
6,346,002 UART: [ldev] SUBJECT.KEYID = 5
6,347,116 UART: [ldev] AUTHORITY.KEYID = 7
6,348,409 UART: [ldev] FE.KEYID = 1
6,358,541 UART: [ldev] Erasing FE.KEYID = 1
8,828,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,032 UART: [ldev] --
10,618,949 UART: [fwproc] Wait for Commands...
10,620,505 UART: [fwproc] Recv command 0x43415053
10,623,740 UART: ROM Fatal Error: 0x01020006
10,626,883 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,671 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,395,649 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,828 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,473 UART:
192,851 UART: Running Caliptra ROM ...
194,065 UART:
194,224 UART: [state] CFI Enabled
268,758 UART: [state] LifecycleState = Unprovisioned
270,615 UART: [state] DebugLocked = No
272,916 UART: [state] WD Timer not started. Device not locked for debugging
277,238 UART: [kat] SHA2-256
456,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,911 UART: [kat] ++
468,449 UART: [kat] sha1
479,546 UART: [kat] SHA2-256
482,559 UART: [kat] SHA2-384
488,446 UART: [kat] SHA2-512-ACC
491,380 UART: [kat] ECC-384
2,951,310 UART: [kat] HMAC-384Kdf
2,972,296 UART: [kat] LMS
3,501,752 UART: [kat] --
3,505,789 UART: [cold-reset] ++
3,507,300 UART: [fht] FHT @ 0x50003400
3,517,480 UART: [idev] ++
3,518,047 UART: [idev] CDI.KEYID = 6
3,518,955 UART: [idev] SUBJECT.KEYID = 7
3,520,119 UART: [idev] UDS.KEYID = 0
3,544,575 UART: [idev] Erasing UDS.KEYID = 0
6,027,382 UART: [idev] Sha1 KeyId Algorithm
6,049,253 UART: [idev] --
6,052,916 UART: [ldev] ++
6,053,496 UART: [ldev] CDI.KEYID = 6
6,054,432 UART: [ldev] SUBJECT.KEYID = 5
6,055,541 UART: [ldev] AUTHORITY.KEYID = 7
6,056,843 UART: [ldev] FE.KEYID = 1
6,101,969 UART: [ldev] Erasing FE.KEYID = 1
8,603,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,423 UART: [ldev] --
10,417,850 UART: [fwproc] Wait for Commands...
10,419,838 UART: [fwproc] Recv command 0x43415053
10,425,019 UART: ROM Fatal Error: 0x01020006
10,428,113 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,641 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,205,918 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,888 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,500 UART:
192,880 UART: Running Caliptra ROM ...
194,026 UART:
603,669 UART: [state] CFI Enabled
617,541 UART: [state] LifecycleState = Unprovisioned
619,410 UART: [state] DebugLocked = No
620,968 UART: [state] WD Timer not started. Device not locked for debugging
624,997 UART: [kat] SHA2-256
804,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,689 UART: [kat] ++
816,190 UART: [kat] sha1
828,521 UART: [kat] SHA2-256
831,539 UART: [kat] SHA2-384
838,043 UART: [kat] SHA2-512-ACC
840,985 UART: [kat] ECC-384
3,282,536 UART: [kat] HMAC-384Kdf
3,295,059 UART: [kat] LMS
3,824,524 UART: [kat] --
3,829,860 UART: [cold-reset] ++
3,831,417 UART: [fht] FHT @ 0x50003400
3,841,208 UART: [idev] ++
3,841,767 UART: [idev] CDI.KEYID = 6
3,842,728 UART: [idev] SUBJECT.KEYID = 7
3,843,935 UART: [idev] UDS.KEYID = 0
3,859,531 UART: [idev] Erasing UDS.KEYID = 0
6,315,075 UART: [idev] Sha1 KeyId Algorithm
6,338,567 UART: [idev] --
6,341,795 UART: [ldev] ++
6,342,355 UART: [ldev] CDI.KEYID = 6
6,343,317 UART: [ldev] SUBJECT.KEYID = 5
6,344,475 UART: [ldev] AUTHORITY.KEYID = 7
6,345,758 UART: [ldev] FE.KEYID = 1
6,357,833 UART: [ldev] Erasing FE.KEYID = 1
8,830,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,641 UART: [ldev] --
10,623,116 UART: [fwproc] Wait for Commands...
10,626,131 UART: [fwproc] Recv command 0x43415053
10,629,898 UART: ROM Fatal Error: 0x01020006
10,632,991 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,862 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,418,302 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,814 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,749 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,829 UART: [idev] ++
1,172,997 UART: [idev] CDI.KEYID = 6
1,173,358 UART: [idev] SUBJECT.KEYID = 7
1,173,783 UART: [idev] UDS.KEYID = 0
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,197,891 UART: [idev] Sha1 KeyId Algorithm
1,206,869 UART: [idev] --
1,207,876 UART: [ldev] ++
1,208,044 UART: [ldev] CDI.KEYID = 6
1,208,408 UART: [ldev] SUBJECT.KEYID = 5
1,208,835 UART: [ldev] AUTHORITY.KEYID = 7
1,209,298 UART: [ldev] FE.KEYID = 1
1,214,438 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,662 UART: [ldev] --
1,279,978 UART: [fwproc] Wait for Commands...
1,280,673 UART: [fwproc] Recv command 0x43415053
1,281,834 UART: ROM Fatal Error: 0x01020006
1,282,993 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,179 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,345 UART: [kat] LMS
1,169,657 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,064 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,942 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,771 UART: [ldev] ++
1,209,939 UART: [ldev] CDI.KEYID = 6
1,210,303 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,069 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x43415053
1,283,885 UART: ROM Fatal Error: 0x01020006
1,285,044 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,762 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,242,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,242 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,315 UART: [fwproc] Recv command 0x43415053
1,283,584 UART: ROM Fatal Error: 0x01020006
1,284,743 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,933 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,686 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,181,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,511 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,741 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x43415053
1,283,691 UART: ROM Fatal Error: 0x01020006
1,284,850 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,860 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,027 UART: [fwproc] Recv command 0x43415053
1,283,174 UART: ROM Fatal Error: 0x01020006
1,284,333 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,711 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,281,985 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x43415053
1,283,945 UART: ROM Fatal Error: 0x01020006
1,285,104 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,240 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,605 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,274 UART:
192,649 UART: Running Caliptra ROM ...
193,867 UART:
194,019 UART: [state] CFI Enabled
265,757 UART: [state] LifecycleState = Unprovisioned
267,756 UART: [state] DebugLocked = No
269,464 UART: [state] WD Timer not started. Device not locked for debugging
273,287 UART: [kat] SHA2-256
455,211 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,720 UART: [kat] ++
467,241 UART: [kat] sha1
477,638 UART: [kat] SHA2-256
480,672 UART: [kat] SHA2-384
485,851 UART: [kat] SHA2-512-ACC
488,475 UART: [kat] ECC-384
3,777,316 UART: [kat] HMAC-384Kdf
3,801,912 UART: [kat] LMS
4,875,073 UART: [kat] --
4,881,030 UART: [cold-reset] ++
4,883,302 UART: [fht] FHT @ 0x50003400
4,895,850 UART: [idev] ++
4,896,531 UART: [idev] CDI.KEYID = 6
4,897,764 UART: [idev] SUBJECT.KEYID = 7
4,898,920 UART: [idev] UDS.KEYID = 0
4,929,969 UART: [idev] Erasing UDS.KEYID = 0
8,238,980 UART: [idev] Sha1 KeyId Algorithm
8,260,063 UART: [idev] --
8,262,764 UART: [ldev] ++
8,263,325 UART: [ldev] CDI.KEYID = 6
8,264,482 UART: [ldev] SUBJECT.KEYID = 5
8,265,814 UART: [ldev] AUTHORITY.KEYID = 7
8,267,004 UART: [ldev] FE.KEYID = 1
8,295,290 UART: [ldev] Erasing FE.KEYID = 1
11,631,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,108 UART: [ldev] --
14,014,237 UART: [fwproc] Wait for Commands...
14,019,144 UART: ROM Fatal Error: 0x01020009
14,022,459 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,635 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
13,834,905 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,847 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,457 UART:
192,840 UART: Running Caliptra ROM ...
194,044 UART:
603,543 UART: [state] CFI Enabled
619,629 UART: [state] LifecycleState = Unprovisioned
621,965 UART: [state] DebugLocked = No
624,041 UART: [state] WD Timer not started. Device not locked for debugging
628,627 UART: [kat] SHA2-256
810,577 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,136 UART: [kat] ++
822,717 UART: [kat] sha1
832,682 UART: [kat] SHA2-256
835,738 UART: [kat] SHA2-384
841,440 UART: [kat] SHA2-512-ACC
844,057 UART: [kat] ECC-384
4,098,137 UART: [kat] HMAC-384Kdf
4,110,712 UART: [kat] LMS
5,183,824 UART: [kat] --
5,188,498 UART: [cold-reset] ++
5,190,113 UART: [fht] FHT @ 0x50003400
5,201,144 UART: [idev] ++
5,201,826 UART: [idev] CDI.KEYID = 6
5,203,060 UART: [idev] SUBJECT.KEYID = 7
5,204,494 UART: [idev] UDS.KEYID = 0
5,219,725 UART: [idev] Erasing UDS.KEYID = 0
8,491,802 UART: [idev] Sha1 KeyId Algorithm
8,513,735 UART: [idev] --
8,516,952 UART: [ldev] ++
8,517,527 UART: [ldev] CDI.KEYID = 6
8,518,765 UART: [ldev] SUBJECT.KEYID = 5
8,520,197 UART: [ldev] AUTHORITY.KEYID = 7
8,521,759 UART: [ldev] FE.KEYID = 1
8,533,830 UART: [ldev] Erasing FE.KEYID = 1
11,822,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,382 UART: [ldev] --
14,186,067 UART: [fwproc] Wait for Commands...
14,192,596 UART: ROM Fatal Error: 0x01020009
14,195,910 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,809 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
14,012,969 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,478 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,085 UART:
192,448 UART: Running Caliptra ROM ...
193,670 UART:
193,826 UART: [state] CFI Enabled
264,605 UART: [state] LifecycleState = Unprovisioned
266,538 UART: [state] DebugLocked = No
267,756 UART: [state] WD Timer not started. Device not locked for debugging
272,132 UART: [kat] SHA2-256
451,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,870 UART: [kat] ++
463,401 UART: [kat] sha1
474,177 UART: [kat] SHA2-256
477,184 UART: [kat] SHA2-384
483,432 UART: [kat] SHA2-512-ACC
486,376 UART: [kat] ECC-384
2,949,817 UART: [kat] HMAC-384Kdf
2,973,668 UART: [kat] LMS
3,503,108 UART: [kat] --
3,507,396 UART: [cold-reset] ++
3,509,657 UART: [fht] FHT @ 0x50003400
3,522,152 UART: [idev] ++
3,522,749 UART: [idev] CDI.KEYID = 6
3,523,664 UART: [idev] SUBJECT.KEYID = 7
3,524,827 UART: [idev] UDS.KEYID = 0
3,546,204 UART: [idev] Erasing UDS.KEYID = 0
6,025,766 UART: [idev] Sha1 KeyId Algorithm
6,048,308 UART: [idev] --
6,052,882 UART: [ldev] ++
6,053,511 UART: [ldev] CDI.KEYID = 6
6,054,433 UART: [ldev] SUBJECT.KEYID = 5
6,055,545 UART: [ldev] AUTHORITY.KEYID = 7
6,056,731 UART: [ldev] FE.KEYID = 1
6,103,272 UART: [ldev] Erasing FE.KEYID = 1
8,606,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,010 UART: [ldev] --
10,416,578 UART: [fwproc] Wait for Commands...
10,420,511 UART: ROM Fatal Error: 0x01020009
10,423,617 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,432 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,205,276 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,954 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,577 UART:
192,953 UART: Running Caliptra ROM ...
194,164 UART:
603,722 UART: [state] CFI Enabled
618,106 UART: [state] LifecycleState = Unprovisioned
619,924 UART: [state] DebugLocked = No
621,757 UART: [state] WD Timer not started. Device not locked for debugging
626,287 UART: [kat] SHA2-256
805,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,990 UART: [kat] ++
817,436 UART: [kat] sha1
829,009 UART: [kat] SHA2-256
832,040 UART: [kat] SHA2-384
836,980 UART: [kat] SHA2-512-ACC
839,921 UART: [kat] ECC-384
3,280,357 UART: [kat] HMAC-384Kdf
3,293,189 UART: [kat] LMS
3,822,636 UART: [kat] --
3,827,651 UART: [cold-reset] ++
3,828,767 UART: [fht] FHT @ 0x50003400
3,839,167 UART: [idev] ++
3,839,739 UART: [idev] CDI.KEYID = 6
3,840,754 UART: [idev] SUBJECT.KEYID = 7
3,841,852 UART: [idev] UDS.KEYID = 0
3,859,552 UART: [idev] Erasing UDS.KEYID = 0
6,317,476 UART: [idev] Sha1 KeyId Algorithm
6,340,481 UART: [idev] --
6,345,282 UART: [ldev] ++
6,345,849 UART: [ldev] CDI.KEYID = 6
6,346,756 UART: [ldev] SUBJECT.KEYID = 5
6,347,966 UART: [ldev] AUTHORITY.KEYID = 7
6,349,191 UART: [ldev] FE.KEYID = 1
6,360,593 UART: [ldev] Erasing FE.KEYID = 1
8,835,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,881 UART: [ldev] --
10,628,414 UART: [fwproc] Wait for Commands...
10,633,970 UART: ROM Fatal Error: 0x01020009
10,637,062 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,852 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,401,446 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,485 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,133 UART:
192,532 UART: Running Caliptra ROM ...
193,744 UART:
193,899 UART: [state] CFI Enabled
267,871 UART: [state] LifecycleState = Unprovisioned
269,808 UART: [state] DebugLocked = No
271,675 UART: [state] WD Timer not started. Device not locked for debugging
275,187 UART: [kat] SHA2-256
454,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,893 UART: [kat] ++
466,433 UART: [kat] sha1
477,533 UART: [kat] SHA2-256
480,532 UART: [kat] SHA2-384
485,806 UART: [kat] SHA2-512-ACC
488,793 UART: [kat] ECC-384
2,949,938 UART: [kat] HMAC-384Kdf
2,973,226 UART: [kat] LMS
3,502,673 UART: [kat] --
3,507,339 UART: [cold-reset] ++
3,509,551 UART: [fht] FHT @ 0x50003400
3,520,960 UART: [idev] ++
3,521,519 UART: [idev] CDI.KEYID = 6
3,522,460 UART: [idev] SUBJECT.KEYID = 7
3,523,674 UART: [idev] UDS.KEYID = 0
3,544,967 UART: [idev] Erasing UDS.KEYID = 0
6,026,008 UART: [idev] Sha1 KeyId Algorithm
6,050,055 UART: [idev] --
6,054,740 UART: [ldev] ++
6,055,324 UART: [ldev] CDI.KEYID = 6
6,056,399 UART: [ldev] SUBJECT.KEYID = 5
6,057,509 UART: [ldev] AUTHORITY.KEYID = 7
6,058,689 UART: [ldev] FE.KEYID = 1
6,100,602 UART: [ldev] Erasing FE.KEYID = 1
8,604,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,772 UART: [ldev] --
10,415,278 UART: [fwproc] Wait for Commands...
10,419,771 UART: ROM Fatal Error: 0x01020009
10,422,870 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,653 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,202,224 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,878 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,407 UART:
192,774 UART: Running Caliptra ROM ...
193,895 UART:
603,555 UART: [state] CFI Enabled
616,801 UART: [state] LifecycleState = Unprovisioned
618,682 UART: [state] DebugLocked = No
621,594 UART: [state] WD Timer not started. Device not locked for debugging
625,794 UART: [kat] SHA2-256
804,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,458 UART: [kat] ++
816,902 UART: [kat] sha1
828,531 UART: [kat] SHA2-256
831,529 UART: [kat] SHA2-384
837,563 UART: [kat] SHA2-512-ACC
840,534 UART: [kat] ECC-384
3,284,214 UART: [kat] HMAC-384Kdf
3,295,948 UART: [kat] LMS
3,825,426 UART: [kat] --
3,831,525 UART: [cold-reset] ++
3,832,866 UART: [fht] FHT @ 0x50003400
3,842,812 UART: [idev] ++
3,843,372 UART: [idev] CDI.KEYID = 6
3,844,281 UART: [idev] SUBJECT.KEYID = 7
3,845,487 UART: [idev] UDS.KEYID = 0
3,863,780 UART: [idev] Erasing UDS.KEYID = 0
6,319,392 UART: [idev] Sha1 KeyId Algorithm
6,341,805 UART: [idev] --
6,345,631 UART: [ldev] ++
6,346,203 UART: [ldev] CDI.KEYID = 6
6,347,106 UART: [ldev] SUBJECT.KEYID = 5
6,348,319 UART: [ldev] AUTHORITY.KEYID = 7
6,349,563 UART: [ldev] FE.KEYID = 1
6,360,815 UART: [ldev] Erasing FE.KEYID = 1
8,834,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,929 UART: [ldev] --
10,626,194 UART: [fwproc] Wait for Commands...
10,630,562 UART: ROM Fatal Error: 0x01020009
10,633,653 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,915 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,412,325 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
4,282 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,907 UART:
193,280 UART: Running Caliptra ROM ...
194,472 UART:
194,631 UART: [state] CFI Enabled
268,011 UART: [state] LifecycleState = Unprovisioned
270,471 UART: [state] DebugLocked = No
271,911 UART: [state] WD Timer not started. Device not locked for debugging
276,013 UART: [kat] SHA2-256
457,951 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,495 UART: [kat] ++
470,026 UART: [kat] sha1
480,916 UART: [kat] SHA2-256
483,937 UART: [kat] SHA2-384
490,358 UART: [kat] SHA2-512-ACC
492,979 UART: [kat] ECC-384
3,777,714 UART: [kat] HMAC-384Kdf
3,803,319 UART: [kat] LMS
4,876,467 UART: [kat] --
4,880,398 UART: [cold-reset] ++
4,881,865 UART: [fht] FHT @ 0x50003400
4,893,004 UART: [idev] ++
4,893,693 UART: [idev] CDI.KEYID = 6
4,894,880 UART: [idev] SUBJECT.KEYID = 7
4,896,041 UART: [idev] UDS.KEYID = 0
4,930,728 UART: [idev] Erasing UDS.KEYID = 0
8,242,444 UART: [idev] Sha1 KeyId Algorithm
8,265,192 UART: [idev] --
8,269,733 UART: [ldev] ++
8,270,302 UART: [ldev] CDI.KEYID = 6
8,271,418 UART: [ldev] SUBJECT.KEYID = 5
8,272,688 UART: [ldev] AUTHORITY.KEYID = 7
8,273,792 UART: [ldev] FE.KEYID = 1
8,318,490 UART: [ldev] Erasing FE.KEYID = 1
11,658,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,968,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,984,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,000,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,016,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,037,787 UART: [ldev] --
14,042,785 UART: [fwproc] Wait for Commands...
14,045,176 UART: [fwproc] Recv command 0xabcd1234
14,047,570 UART: [fwproc] Invalid command received
14,052,027 UART: ROM Fatal Error: 0x01020004
14,055,357 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,480 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
13,828,528 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,881 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,452 UART:
192,820 UART: Running Caliptra ROM ...
194,013 UART:
603,626 UART: [state] CFI Enabled
617,010 UART: [state] LifecycleState = Unprovisioned
619,351 UART: [state] DebugLocked = No
621,290 UART: [state] WD Timer not started. Device not locked for debugging
626,465 UART: [kat] SHA2-256
808,446 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,007 UART: [kat] ++
820,507 UART: [kat] sha1
831,972 UART: [kat] SHA2-256
835,056 UART: [kat] SHA2-384
841,999 UART: [kat] SHA2-512-ACC
844,613 UART: [kat] ECC-384
4,102,258 UART: [kat] HMAC-384Kdf
4,114,389 UART: [kat] LMS
5,187,520 UART: [kat] --
5,193,788 UART: [cold-reset] ++
5,194,865 UART: [fht] FHT @ 0x50003400
5,205,996 UART: [idev] ++
5,206,721 UART: [idev] CDI.KEYID = 6
5,207,849 UART: [idev] SUBJECT.KEYID = 7
5,209,335 UART: [idev] UDS.KEYID = 0
5,226,390 UART: [idev] Erasing UDS.KEYID = 0
8,501,016 UART: [idev] Sha1 KeyId Algorithm
8,522,132 UART: [idev] --
8,526,280 UART: [ldev] ++
8,526,925 UART: [ldev] CDI.KEYID = 6
8,528,109 UART: [ldev] SUBJECT.KEYID = 5
8,529,544 UART: [ldev] AUTHORITY.KEYID = 7
8,531,037 UART: [ldev] FE.KEYID = 1
8,543,845 UART: [ldev] Erasing FE.KEYID = 1
11,831,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,180 UART: [ldev] --
14,194,086 UART: [fwproc] Wait for Commands...
14,196,282 UART: [fwproc] Recv command 0xabcd1234
14,198,596 UART: [fwproc] Invalid command received
14,201,132 UART: ROM Fatal Error: 0x01020004
14,204,491 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,403 writing to cptra_bootfsm_go
5,035 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
14,019,844 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,533 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,165 UART:
192,546 UART: Running Caliptra ROM ...
193,771 UART:
193,946 UART: [state] CFI Enabled
265,208 UART: [state] LifecycleState = Unprovisioned
267,065 UART: [state] DebugLocked = No
268,563 UART: [state] WD Timer not started. Device not locked for debugging
271,852 UART: [kat] SHA2-256
451,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,575 UART: [kat] ++
463,110 UART: [kat] sha1
474,425 UART: [kat] SHA2-256
477,483 UART: [kat] SHA2-384
483,682 UART: [kat] SHA2-512-ACC
486,672 UART: [kat] ECC-384
2,950,825 UART: [kat] HMAC-384Kdf
2,974,298 UART: [kat] LMS
3,503,721 UART: [kat] --
3,508,170 UART: [cold-reset] ++
3,510,241 UART: [fht] FHT @ 0x50003400
3,521,553 UART: [idev] ++
3,522,124 UART: [idev] CDI.KEYID = 6
3,523,014 UART: [idev] SUBJECT.KEYID = 7
3,524,237 UART: [idev] UDS.KEYID = 0
3,544,888 UART: [idev] Erasing UDS.KEYID = 0
6,026,749 UART: [idev] Sha1 KeyId Algorithm
6,050,680 UART: [idev] --
6,055,543 UART: [ldev] ++
6,056,124 UART: [ldev] CDI.KEYID = 6
6,057,015 UART: [ldev] SUBJECT.KEYID = 5
6,058,235 UART: [ldev] AUTHORITY.KEYID = 7
6,059,476 UART: [ldev] FE.KEYID = 1
6,100,727 UART: [ldev] Erasing FE.KEYID = 1
8,608,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,723 UART: [ldev] --
10,414,123 UART: [fwproc] Wait for Commands...
10,416,223 UART: [fwproc] Recv command 0xabcd1234
10,418,328 UART: [fwproc] Invalid command received
10,421,427 UART: ROM Fatal Error: 0x01020004
10,424,507 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,678 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,161,857 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,962 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,533 UART:
192,925 UART: Running Caliptra ROM ...
194,144 UART:
603,721 UART: [state] CFI Enabled
616,046 UART: [state] LifecycleState = Unprovisioned
617,917 UART: [state] DebugLocked = No
619,786 UART: [state] WD Timer not started. Device not locked for debugging
622,757 UART: [kat] SHA2-256
801,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,486 UART: [kat] ++
813,931 UART: [kat] sha1
825,096 UART: [kat] SHA2-256
828,113 UART: [kat] SHA2-384
835,603 UART: [kat] SHA2-512-ACC
838,532 UART: [kat] ECC-384
3,277,410 UART: [kat] HMAC-384Kdf
3,290,767 UART: [kat] LMS
3,820,259 UART: [kat] --
3,823,563 UART: [cold-reset] ++
3,825,982 UART: [fht] FHT @ 0x50003400
3,837,983 UART: [idev] ++
3,838,540 UART: [idev] CDI.KEYID = 6
3,839,444 UART: [idev] SUBJECT.KEYID = 7
3,840,605 UART: [idev] UDS.KEYID = 0
3,854,627 UART: [idev] Erasing UDS.KEYID = 0
6,313,575 UART: [idev] Sha1 KeyId Algorithm
6,336,773 UART: [idev] --
6,339,915 UART: [ldev] ++
6,340,484 UART: [ldev] CDI.KEYID = 6
6,341,390 UART: [ldev] SUBJECT.KEYID = 5
6,342,602 UART: [ldev] AUTHORITY.KEYID = 7
6,343,828 UART: [ldev] FE.KEYID = 1
6,355,442 UART: [ldev] Erasing FE.KEYID = 1
8,829,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,117 UART: [ldev] --
10,622,413 UART: [fwproc] Wait for Commands...
10,625,585 UART: [fwproc] Recv command 0xabcd1234
10,627,675 UART: [fwproc] Invalid command received
10,630,646 UART: ROM Fatal Error: 0x01020004
10,633,756 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,867 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,411,708 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,538 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,203 UART:
192,567 UART: Running Caliptra ROM ...
193,686 UART:
193,827 UART: [state] CFI Enabled
264,003 UART: [state] LifecycleState = Unprovisioned
265,937 UART: [state] DebugLocked = No
267,267 UART: [state] WD Timer not started. Device not locked for debugging
270,938 UART: [kat] SHA2-256
450,079 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,645 UART: [kat] ++
462,177 UART: [kat] sha1
472,501 UART: [kat] SHA2-256
475,563 UART: [kat] SHA2-384
481,047 UART: [kat] SHA2-512-ACC
483,983 UART: [kat] ECC-384
2,950,775 UART: [kat] HMAC-384Kdf
2,970,947 UART: [kat] LMS
3,500,384 UART: [kat] --
3,503,101 UART: [cold-reset] ++
3,504,661 UART: [fht] FHT @ 0x50003400
3,515,672 UART: [idev] ++
3,516,237 UART: [idev] CDI.KEYID = 6
3,517,150 UART: [idev] SUBJECT.KEYID = 7
3,518,310 UART: [idev] UDS.KEYID = 0
3,542,394 UART: [idev] Erasing UDS.KEYID = 0
6,024,184 UART: [idev] Sha1 KeyId Algorithm
6,046,245 UART: [idev] --
6,049,592 UART: [ldev] ++
6,050,161 UART: [ldev] CDI.KEYID = 6
6,051,044 UART: [ldev] SUBJECT.KEYID = 5
6,052,264 UART: [ldev] AUTHORITY.KEYID = 7
6,053,504 UART: [ldev] FE.KEYID = 1
6,099,023 UART: [ldev] Erasing FE.KEYID = 1
8,600,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,498 UART: [ldev] --
10,410,508 UART: [fwproc] Wait for Commands...
10,413,533 UART: [fwproc] Recv command 0xabcd1234
10,415,636 UART: [fwproc] Invalid command received
10,418,905 UART: ROM Fatal Error: 0x01020004
10,422,002 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,601 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,201,999 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,907 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,445 UART:
192,823 UART: Running Caliptra ROM ...
193,969 UART:
603,533 UART: [state] CFI Enabled
617,517 UART: [state] LifecycleState = Unprovisioned
619,342 UART: [state] DebugLocked = No
622,193 UART: [state] WD Timer not started. Device not locked for debugging
625,112 UART: [kat] SHA2-256
804,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,809 UART: [kat] ++
816,253 UART: [kat] sha1
826,207 UART: [kat] SHA2-256
829,264 UART: [kat] SHA2-384
836,095 UART: [kat] SHA2-512-ACC
839,090 UART: [kat] ECC-384
3,278,052 UART: [kat] HMAC-384Kdf
3,291,531 UART: [kat] LMS
3,821,022 UART: [kat] --
3,824,222 UART: [cold-reset] ++
3,826,694 UART: [fht] FHT @ 0x50003400
3,836,591 UART: [idev] ++
3,837,157 UART: [idev] CDI.KEYID = 6
3,838,057 UART: [idev] SUBJECT.KEYID = 7
3,839,276 UART: [idev] UDS.KEYID = 0
3,853,223 UART: [idev] Erasing UDS.KEYID = 0
6,310,666 UART: [idev] Sha1 KeyId Algorithm
6,333,756 UART: [idev] --
6,336,831 UART: [ldev] ++
6,337,395 UART: [ldev] CDI.KEYID = 6
6,338,301 UART: [ldev] SUBJECT.KEYID = 5
6,339,525 UART: [ldev] AUTHORITY.KEYID = 7
6,340,673 UART: [ldev] FE.KEYID = 1
6,351,937 UART: [ldev] Erasing FE.KEYID = 1
8,825,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,950 UART: [ldev] --
10,616,149 UART: [fwproc] Wait for Commands...
10,619,273 UART: [fwproc] Recv command 0xabcd1234
10,621,363 UART: [fwproc] Invalid command received
10,625,327 UART: ROM Fatal Error: 0x01020004
10,628,476 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,943 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,411,179 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,360 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,601 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,182,177 UART: [idev] Erasing UDS.KEYID = 0
1,199,513 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,215,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,120 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0xabcd1234
1,282,684 UART: [fwproc] Invalid command received
1,283,669 UART: ROM Fatal Error: 0x01020004
1,284,828 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,135,918 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,967 UART: [kat] LMS
1,169,279 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,172,972 UART: [idev] ++
1,173,140 UART: [idev] CDI.KEYID = 6
1,173,501 UART: [idev] SUBJECT.KEYID = 7
1,173,926 UART: [idev] UDS.KEYID = 0
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,064 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,251 UART: [ldev] ++
1,209,419 UART: [ldev] CDI.KEYID = 6
1,209,783 UART: [ldev] SUBJECT.KEYID = 5
1,210,210 UART: [ldev] AUTHORITY.KEYID = 7
1,210,673 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,463 UART: [ldev] --
1,281,829 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0xabcd1234
1,283,163 UART: [fwproc] Invalid command received
1,284,250 UART: ROM Fatal Error: 0x01020004
1,285,409 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,203 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,961 UART: [kat] ++
895,113 UART: [kat] sha1
899,273 UART: [kat] SHA2-256
901,213 UART: [kat] SHA2-384
903,892 UART: [kat] SHA2-512-ACC
905,793 UART: [kat] ECC-384
915,544 UART: [kat] HMAC-384Kdf
919,950 UART: [kat] LMS
1,168,262 UART: [kat] --
1,169,161 UART: [cold-reset] ++
1,169,555 UART: [fht] FHT @ 0x50003400
1,172,145 UART: [idev] ++
1,172,313 UART: [idev] CDI.KEYID = 6
1,172,674 UART: [idev] SUBJECT.KEYID = 7
1,173,099 UART: [idev] UDS.KEYID = 0
1,180,809 UART: [idev] Erasing UDS.KEYID = 0
1,197,755 UART: [idev] Sha1 KeyId Algorithm
1,206,731 UART: [idev] --
1,207,952 UART: [ldev] ++
1,208,120 UART: [ldev] CDI.KEYID = 6
1,208,484 UART: [ldev] SUBJECT.KEYID = 5
1,208,911 UART: [ldev] AUTHORITY.KEYID = 7
1,209,374 UART: [ldev] FE.KEYID = 1
1,214,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,028 UART: [ldev] --
1,280,378 UART: [fwproc] Wait for Commands...
1,281,033 UART: [fwproc] Recv command 0xabcd1234
1,281,778 UART: [fwproc] Invalid command received
1,282,627 UART: ROM Fatal Error: 0x01020004
1,283,786 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,342 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,468 UART: [kat] ++
895,620 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,170,020 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,282,022 UART: [fwproc] Recv command 0xabcd1234
1,282,767 UART: [fwproc] Invalid command received
1,283,692 UART: ROM Fatal Error: 0x01020004
1,284,851 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,337 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,759 UART: [kat] ++
895,911 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,703 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,412 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0xabcd1234
1,282,806 UART: [fwproc] Invalid command received
1,283,537 UART: ROM Fatal Error: 0x01020004
1,284,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,306 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,744 UART: [idev] ++
1,173,912 UART: [idev] CDI.KEYID = 6
1,174,273 UART: [idev] SUBJECT.KEYID = 7
1,174,698 UART: [idev] UDS.KEYID = 0
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,725 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0xabcd1234
1,283,673 UART: [fwproc] Invalid command received
1,284,574 UART: ROM Fatal Error: 0x01020004
1,285,733 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,841 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,002 UART:
192,390 UART: Running Caliptra ROM ...
193,569 UART:
193,741 UART: [state] CFI Enabled
262,991 UART: [state] LifecycleState = Unprovisioned
265,334 UART: [state] DebugLocked = No
266,797 UART: [state] WD Timer not started. Device not locked for debugging
270,618 UART: [kat] SHA2-256
452,545 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,056 UART: [kat] ++
464,509 UART: [kat] sha1
475,663 UART: [kat] SHA2-256
478,663 UART: [kat] SHA2-384
484,928 UART: [kat] SHA2-512-ACC
487,582 UART: [kat] ECC-384
3,775,577 UART: [kat] HMAC-384Kdf
3,802,755 UART: [kat] LMS
4,875,912 UART: [kat] --
4,879,644 UART: [cold-reset] ++
4,880,742 UART: [fht] FHT @ 0x50003400
4,892,283 UART: [idev] ++
4,892,989 UART: [idev] CDI.KEYID = 6
4,894,085 UART: [idev] SUBJECT.KEYID = 7
4,895,330 UART: [idev] UDS.KEYID = 0
4,896,225 ready_for_fw is high
4,896,406 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,030,123 UART: [idev] Erasing UDS.KEYID = 0
8,242,563 UART: [idev] Sha1 KeyId Algorithm
8,263,957 UART: [idev] --
8,268,630 UART: [ldev] ++
8,269,210 UART: [ldev] CDI.KEYID = 6
8,270,445 UART: [ldev] SUBJECT.KEYID = 5
8,271,601 UART: [ldev] AUTHORITY.KEYID = 7
8,272,825 UART: [ldev] FE.KEYID = 1
8,319,465 UART: [ldev] Erasing FE.KEYID = 1
11,656,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,514 UART: [ldev] --
14,036,553 UART: [fwproc] Wait for Commands...
14,038,814 UART: [fwproc] Recv command 0x46574c44
14,041,068 UART: [fwproc] Recv'd Img size: 106256 bytes
18,011,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,090,240 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,132,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,447,854 >>> mbox cmd response: success
18,448,849 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,451,932 UART: [afmc] ++
18,452,536 UART: [afmc] CDI.KEYID = 6
18,453,743 UART: [afmc] SUBJECT.KEYID = 7
18,454,903 UART: [afmc] AUTHORITY.KEYID = 5
21,817,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,117,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,119,356 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,135,388 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,151,465 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,167,540 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,190,406 UART: [afmc] --
24,194,707 UART: [cold-reset] --
24,198,406 UART: [state] Locking Datavault
24,203,926 UART: [state] Locking PCR0, PCR1 and PCR31
24,205,627 UART: [state] Locking ICCM
24,207,831 UART: [exit] Launching FMC @ 0x40000000
24,216,447 UART:
24,216,677 UART: Running Caliptra FMC ...
24,217,794 UART:
24,217,951 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,219,599 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
4,780,297 ready_for_fw is high
4,780,694 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,196,590 >>> mbox cmd response: success
18,197,592 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
23,890,122 UART:
23,890,525 UART: Running Caliptra FMC ...
23,891,675 UART:
23,891,827 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
23,893,735 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,257 UART:
192,624 UART: Running Caliptra ROM ...
193,719 UART:
603,264 UART: [state] CFI Enabled
618,621 UART: [state] LifecycleState = Unprovisioned
620,996 UART: [state] DebugLocked = No
622,518 UART: [state] WD Timer not started. Device not locked for debugging
626,196 UART: [kat] SHA2-256
807,996 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,507 UART: [kat] ++
820,102 UART: [kat] sha1
830,408 UART: [kat] SHA2-256
833,478 UART: [kat] SHA2-384
839,954 UART: [kat] SHA2-512-ACC
842,596 UART: [kat] ECC-384
4,095,563 UART: [kat] HMAC-384Kdf
4,106,592 UART: [kat] LMS
5,179,731 UART: [kat] --
5,184,106 UART: [cold-reset] ++
5,186,817 UART: [fht] FHT @ 0x50003400
5,197,532 UART: [idev] ++
5,198,283 UART: [idev] CDI.KEYID = 6
5,199,382 UART: [idev] SUBJECT.KEYID = 7
5,200,927 UART: [idev] UDS.KEYID = 0
5,202,033 ready_for_fw is high
5,202,217 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,335,543 UART: [idev] Erasing UDS.KEYID = 0
8,483,804 UART: [idev] Sha1 KeyId Algorithm
8,505,585 UART: [idev] --
8,510,116 UART: [ldev] ++
8,510,678 UART: [ldev] CDI.KEYID = 6
8,511,907 UART: [ldev] SUBJECT.KEYID = 5
8,513,330 UART: [ldev] AUTHORITY.KEYID = 7
8,514,927 UART: [ldev] FE.KEYID = 1
8,527,396 UART: [ldev] Erasing FE.KEYID = 1
11,822,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,941 UART: [ldev] --
14,186,746 UART: [fwproc] Wait for Commands...
14,188,401 UART: [fwproc] Recv command 0x46574c44
14,190,703 UART: [fwproc] Recv'd Img size: 106256 bytes
18,173,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,249,016 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,291,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,607,978 >>> mbox cmd response: success
18,608,818 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,611,208 UART: [afmc] ++
18,611,926 UART: [afmc] CDI.KEYID = 6
18,612,806 UART: [afmc] SUBJECT.KEYID = 7
18,614,016 UART: [afmc] AUTHORITY.KEYID = 5
21,930,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,225,816 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,241,853 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,257,913 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,273,996 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,297,905 UART: [afmc] --
24,301,119 UART: [cold-reset] --
24,304,278 UART: [state] Locking Datavault
24,308,925 UART: [state] Locking PCR0, PCR1 and PCR31
24,310,617 UART: [state] Locking ICCM
24,313,207 UART: [exit] Launching FMC @ 0x40000000
24,321,728 UART:
24,321,982 UART: Running Caliptra FMC ...
24,323,084 UART:
24,323,242 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,324,878 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,104,278 ready_for_fw is high
5,104,656 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,403,563 >>> mbox cmd response: success
18,404,727 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
24,038,337 UART:
24,038,765 UART: Running Caliptra FMC ...
24,039,954 UART:
24,040,111 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,041,801 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,108 UART:
192,493 UART: Running Caliptra ROM ...
193,623 UART:
193,775 UART: [state] CFI Enabled
265,212 UART: [state] LifecycleState = Unprovisioned
267,063 UART: [state] DebugLocked = No
268,888 UART: [state] WD Timer not started. Device not locked for debugging
273,270 UART: [kat] SHA2-256
452,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,984 UART: [kat] ++
464,522 UART: [kat] sha1
476,628 UART: [kat] SHA2-256
479,645 UART: [kat] SHA2-384
485,371 UART: [kat] SHA2-512-ACC
488,312 UART: [kat] ECC-384
2,945,644 UART: [kat] HMAC-384Kdf
2,969,695 UART: [kat] LMS
3,499,097 UART: [kat] --
3,506,292 UART: [cold-reset] ++
3,508,078 UART: [fht] FHT @ 0x50003400
3,517,853 UART: [idev] ++
3,518,420 UART: [idev] CDI.KEYID = 6
3,519,399 UART: [idev] SUBJECT.KEYID = 7
3,520,574 UART: [idev] UDS.KEYID = 0
3,521,494 ready_for_fw is high
3,521,694 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,656,242 UART: [idev] Erasing UDS.KEYID = 0
6,024,428 UART: [idev] Sha1 KeyId Algorithm
6,047,341 UART: [idev] --
6,050,768 UART: [ldev] ++
6,051,383 UART: [ldev] CDI.KEYID = 6
6,052,303 UART: [ldev] SUBJECT.KEYID = 5
6,053,580 UART: [ldev] AUTHORITY.KEYID = 7
6,054,758 UART: [ldev] FE.KEYID = 1
6,099,319 UART: [ldev] Erasing FE.KEYID = 1
8,602,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,166 UART: [ldev] --
10,413,478 UART: [fwproc] Wait for Commands...
10,416,654 UART: [fwproc] Recv command 0x46574c44
10,418,748 UART: [fwproc] Recv'd Img size: 106600 bytes
13,730,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,803,771 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,846,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,163,198 >>> mbox cmd response: success
14,164,091 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,167,273 UART: [afmc] ++
14,167,877 UART: [afmc] CDI.KEYID = 6
14,168,766 UART: [afmc] SUBJECT.KEYID = 7
14,169,930 UART: [afmc] AUTHORITY.KEYID = 5
16,696,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,419,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,420,975 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,436,955 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,452,908 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,468,833 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,492,567 UART: [afmc] --
18,496,699 UART: [cold-reset] --
18,500,305 UART: [state] Locking Datavault
18,505,983 UART: [state] Locking PCR0, PCR1 and PCR31
18,507,689 UART: [state] Locking ICCM
18,509,652 UART: [exit] Launching FMC @ 0x40000000
18,518,050 UART:
18,518,287 UART: Running Caliptra FMC ...
18,519,389 UART:
18,519,548 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,521,191 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,357,644 ready_for_fw is high
3,358,046 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,915,045 >>> mbox cmd response: success
13,916,144 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,216,411 UART:
18,216,809 UART: Running Caliptra FMC ...
18,218,132 UART:
18,218,318 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,219,962 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,358 UART:
192,727 UART: Running Caliptra ROM ...
193,849 UART:
603,284 UART: [state] CFI Enabled
616,030 UART: [state] LifecycleState = Unprovisioned
617,920 UART: [state] DebugLocked = No
620,428 UART: [state] WD Timer not started. Device not locked for debugging
623,453 UART: [kat] SHA2-256
802,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,197 UART: [kat] ++
814,730 UART: [kat] sha1
825,464 UART: [kat] SHA2-256
828,549 UART: [kat] SHA2-384
833,327 UART: [kat] SHA2-512-ACC
836,258 UART: [kat] ECC-384
3,272,672 UART: [kat] HMAC-384Kdf
3,285,337 UART: [kat] LMS
3,814,808 UART: [kat] --
3,821,715 UART: [cold-reset] ++
3,823,006 UART: [fht] FHT @ 0x50003400
3,833,915 UART: [idev] ++
3,834,475 UART: [idev] CDI.KEYID = 6
3,835,394 UART: [idev] SUBJECT.KEYID = 7
3,836,565 UART: [idev] UDS.KEYID = 0
3,837,487 ready_for_fw is high
3,837,711 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,971,740 UART: [idev] Erasing UDS.KEYID = 0
6,309,197 UART: [idev] Sha1 KeyId Algorithm
6,332,102 UART: [idev] --
6,336,092 UART: [ldev] ++
6,336,658 UART: [ldev] CDI.KEYID = 6
6,337,563 UART: [ldev] SUBJECT.KEYID = 5
6,338,721 UART: [ldev] AUTHORITY.KEYID = 7
6,340,005 UART: [ldev] FE.KEYID = 1
6,351,084 UART: [ldev] Erasing FE.KEYID = 1
8,827,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,663 UART: [ldev] --
10,618,930 UART: [fwproc] Wait for Commands...
10,620,432 UART: [fwproc] Recv command 0x46574c44
10,622,524 UART: [fwproc] Recv'd Img size: 106600 bytes
13,931,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,820 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,050,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,368,251 >>> mbox cmd response: success
14,369,216 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,372,985 UART: [afmc] ++
14,373,590 UART: [afmc] CDI.KEYID = 6
14,374,498 UART: [afmc] SUBJECT.KEYID = 7
14,375,658 UART: [afmc] AUTHORITY.KEYID = 5
16,874,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,498 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,613,509 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,629,420 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,645,342 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,668,978 UART: [afmc] --
18,673,219 UART: [cold-reset] --
18,676,859 UART: [state] Locking Datavault
18,681,384 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,034 UART: [state] Locking ICCM
18,684,077 UART: [exit] Launching FMC @ 0x40000000
18,692,471 UART:
18,692,712 UART: Running Caliptra FMC ...
18,693,812 UART:
18,693,964 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,695,531 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,690,372 ready_for_fw is high
3,690,796 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,133,361 >>> mbox cmd response: success
14,134,655 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,386,928 UART:
18,387,344 UART: Running Caliptra FMC ...
18,389,057 UART:
18,389,233 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,390,964 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,260 UART:
192,641 UART: Running Caliptra ROM ...
193,979 UART:
194,132 UART: [state] CFI Enabled
266,522 UART: [state] LifecycleState = Unprovisioned
268,393 UART: [state] DebugLocked = No
270,927 UART: [state] WD Timer not started. Device not locked for debugging
273,908 UART: [kat] SHA2-256
453,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,602 UART: [kat] ++
465,142 UART: [kat] sha1
475,882 UART: [kat] SHA2-256
478,891 UART: [kat] SHA2-384
485,661 UART: [kat] SHA2-512-ACC
488,593 UART: [kat] ECC-384
2,948,779 UART: [kat] HMAC-384Kdf
2,971,891 UART: [kat] LMS
3,501,371 UART: [kat] --
3,507,003 UART: [cold-reset] ++
3,507,872 UART: [fht] FHT @ 0x50003400
3,519,555 UART: [idev] ++
3,520,124 UART: [idev] CDI.KEYID = 6
3,521,030 UART: [idev] SUBJECT.KEYID = 7
3,522,299 UART: [idev] UDS.KEYID = 0
3,523,224 ready_for_fw is high
3,523,407 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,657,547 UART: [idev] Erasing UDS.KEYID = 0
6,023,983 UART: [idev] Sha1 KeyId Algorithm
6,046,243 UART: [idev] --
6,049,676 UART: [ldev] ++
6,050,260 UART: [ldev] CDI.KEYID = 6
6,051,178 UART: [ldev] SUBJECT.KEYID = 5
6,052,341 UART: [ldev] AUTHORITY.KEYID = 7
6,053,630 UART: [ldev] FE.KEYID = 1
6,100,250 UART: [ldev] Erasing FE.KEYID = 1
8,605,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,987 UART: [ldev] --
10,414,873 UART: [fwproc] Wait for Commands...
10,417,295 UART: [fwproc] Recv command 0x46574c44
10,419,393 UART: [fwproc] Recv'd Img size: 106600 bytes
13,729,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,800,369 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,842,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,160,710 >>> mbox cmd response: success
14,161,713 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,165,448 UART: [afmc] ++
14,166,046 UART: [afmc] CDI.KEYID = 6
14,167,021 UART: [afmc] SUBJECT.KEYID = 7
14,168,133 UART: [afmc] AUTHORITY.KEYID = 5
16,698,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,422,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,424,502 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,440,513 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,456,392 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,472,362 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,495,320 UART: [afmc] --
18,499,560 UART: [cold-reset] --
18,504,441 UART: [state] Locking Datavault
18,508,604 UART: [state] Locking PCR0, PCR1 and PCR31
18,510,308 UART: [state] Locking ICCM
18,513,062 UART: [exit] Launching FMC @ 0x40000000
18,521,454 UART:
18,521,699 UART: Running Caliptra FMC ...
18,522,803 UART:
18,522,962 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,524,526 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,382,291 ready_for_fw is high
3,382,673 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,942,230 >>> mbox cmd response: success
13,943,154 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,239,311 UART:
18,239,721 UART: Running Caliptra FMC ...
18,240,961 UART:
18,241,138 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,242,848 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,367 UART:
192,765 UART: Running Caliptra ROM ...
193,898 UART:
603,495 UART: [state] CFI Enabled
619,351 UART: [state] LifecycleState = Unprovisioned
621,223 UART: [state] DebugLocked = No
622,890 UART: [state] WD Timer not started. Device not locked for debugging
626,795 UART: [kat] SHA2-256
805,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,458 UART: [kat] ++
817,905 UART: [kat] sha1
830,765 UART: [kat] SHA2-256
833,840 UART: [kat] SHA2-384
838,657 UART: [kat] SHA2-512-ACC
841,638 UART: [kat] ECC-384
3,284,624 UART: [kat] HMAC-384Kdf
3,297,420 UART: [kat] LMS
3,826,891 UART: [kat] --
3,830,811 UART: [cold-reset] ++
3,831,673 UART: [fht] FHT @ 0x50003400
3,842,221 UART: [idev] ++
3,842,790 UART: [idev] CDI.KEYID = 6
3,843,773 UART: [idev] SUBJECT.KEYID = 7
3,845,057 UART: [idev] UDS.KEYID = 0
3,845,984 ready_for_fw is high
3,846,211 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,980,252 UART: [idev] Erasing UDS.KEYID = 0
6,319,665 UART: [idev] Sha1 KeyId Algorithm
6,343,324 UART: [idev] --
6,348,336 UART: [ldev] ++
6,348,902 UART: [ldev] CDI.KEYID = 6
6,349,813 UART: [ldev] SUBJECT.KEYID = 5
6,350,986 UART: [ldev] AUTHORITY.KEYID = 7
6,352,218 UART: [ldev] FE.KEYID = 1
6,360,866 UART: [ldev] Erasing FE.KEYID = 1
8,833,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,845 UART: [ldev] --
10,624,679 UART: [fwproc] Wait for Commands...
10,626,662 UART: [fwproc] Recv command 0x46574c44
10,628,752 UART: [fwproc] Recv'd Img size: 106600 bytes
13,943,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,375 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,054,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,372,547 >>> mbox cmd response: success
14,373,500 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,377,147 UART: [afmc] ++
14,377,750 UART: [afmc] CDI.KEYID = 6
14,378,659 UART: [afmc] SUBJECT.KEYID = 7
14,379,821 UART: [afmc] AUTHORITY.KEYID = 5
16,878,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,604,214 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,620,151 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,636,089 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,652,022 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,673,778 UART: [afmc] --
18,678,382 UART: [cold-reset] --
18,681,948 UART: [state] Locking Datavault
18,688,340 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,038 UART: [state] Locking ICCM
18,691,451 UART: [exit] Launching FMC @ 0x40000000
18,699,794 UART:
18,700,026 UART: Running Caliptra FMC ...
18,701,124 UART:
18,701,281 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,702,951 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,702,709 ready_for_fw is high
3,703,313 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,158,980 >>> mbox cmd response: success
14,160,086 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,402,993 UART:
18,403,389 UART: Running Caliptra FMC ...
18,404,640 UART:
18,404,807 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,406,495 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,199,453 UART: [idev] Sha1 KeyId Algorithm
1,208,393 UART: [idev] --
1,209,576 UART: [ldev] ++
1,209,744 UART: [ldev] CDI.KEYID = 6
1,210,108 UART: [ldev] SUBJECT.KEYID = 5
1,210,535 UART: [ldev] AUTHORITY.KEYID = 7
1,210,998 UART: [ldev] FE.KEYID = 1
1,216,072 UART: [ldev] Erasing FE.KEYID = 1
1,242,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,708 UART: [ldev] --
1,282,206 UART: [fwproc] Wait for Commands...
1,282,835 UART: [fwproc] Recv command 0x46574c44
1,283,568 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,039 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,514 >>> mbox cmd response: success
2,672,514 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,673,577 UART: [afmc] ++
2,673,745 UART: [afmc] CDI.KEYID = 6
2,674,108 UART: [afmc] SUBJECT.KEYID = 7
2,674,534 UART: [afmc] AUTHORITY.KEYID = 5
2,710,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,577 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,297 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,190 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,883 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,948 UART: [afmc] --
2,753,954 UART: [cold-reset] --
2,754,656 UART: [state] Locking Datavault
2,755,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,303 UART: [state] Locking ICCM
2,756,887 UART: [exit] Launching FMC @ 0x40000000
2,762,184 UART:
2,762,200 UART: Running Caliptra FMC ...
2,762,608 UART:
2,762,746 UART: [fmc] Received command: 0x10000008
2,763,778 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,398 ready_for_fw is high
1,055,398 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,518,524 >>> mbox cmd response: success
2,518,524 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,581,299 UART:
2,581,315 UART: Running Caliptra FMC ...
2,581,723 UART:
2,581,861 UART: [fmc] Received command: 0x10000008
2,582,893 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,464 UART: [idev] ++
1,173,632 UART: [idev] CDI.KEYID = 6
1,173,993 UART: [idev] SUBJECT.KEYID = 7
1,174,418 UART: [idev] UDS.KEYID = 0
1,174,764 ready_for_fw is high
1,174,764 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,973 UART: [ldev] --
1,282,405 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,759 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,654 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,155 >>> mbox cmd response: success
2,672,155 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,673,300 UART: [afmc] ++
2,673,468 UART: [afmc] CDI.KEYID = 6
2,673,831 UART: [afmc] SUBJECT.KEYID = 7
2,674,257 UART: [afmc] AUTHORITY.KEYID = 5
2,709,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,848 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,568 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,461 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,154 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,025 UART: [afmc] --
2,753,125 UART: [cold-reset] --
2,753,959 UART: [state] Locking Datavault
2,755,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,690 UART: [state] Locking ICCM
2,756,232 UART: [exit] Launching FMC @ 0x40000000
2,761,529 UART:
2,761,545 UART: Running Caliptra FMC ...
2,761,953 UART:
2,762,091 UART: [fmc] Received command: 0x10000008
2,763,123 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,733 ready_for_fw is high
1,055,733 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,243 >>> mbox cmd response: success
2,522,243 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,440 UART:
2,584,456 UART: Running Caliptra FMC ...
2,584,864 UART:
2,585,002 UART: [fmc] Received command: 0x10000008
2,586,034 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
903,986 UART: [kat] SHA2-512-ACC
905,887 UART: [kat] ECC-384
915,214 UART: [kat] HMAC-384Kdf
919,728 UART: [kat] LMS
1,168,040 UART: [kat] --
1,169,083 UART: [cold-reset] ++
1,169,425 UART: [fht] FHT @ 0x50003400
1,172,081 UART: [idev] ++
1,172,249 UART: [idev] CDI.KEYID = 6
1,172,610 UART: [idev] SUBJECT.KEYID = 7
1,173,035 UART: [idev] UDS.KEYID = 0
1,173,381 ready_for_fw is high
1,173,381 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,180,805 UART: [idev] Erasing UDS.KEYID = 0
1,197,579 UART: [idev] Sha1 KeyId Algorithm
1,206,483 UART: [idev] --
1,207,640 UART: [ldev] ++
1,207,808 UART: [ldev] CDI.KEYID = 6
1,208,172 UART: [ldev] SUBJECT.KEYID = 5
1,208,599 UART: [ldev] AUTHORITY.KEYID = 7
1,209,062 UART: [ldev] FE.KEYID = 1
1,214,190 UART: [ldev] Erasing FE.KEYID = 1
1,240,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,426 UART: [ldev] --
1,279,822 UART: [fwproc] Wait for Commands...
1,280,413 UART: [fwproc] Recv command 0x46574c44
1,281,146 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,515,969 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,669,500 >>> mbox cmd response: success
2,669,500 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,670,653 UART: [afmc] ++
2,670,821 UART: [afmc] CDI.KEYID = 6
2,671,184 UART: [afmc] SUBJECT.KEYID = 7
2,671,610 UART: [afmc] AUTHORITY.KEYID = 5
2,706,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,099 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,729,819 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,712 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,405 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,314 UART: [afmc] --
2,750,446 UART: [cold-reset] --
2,751,384 UART: [state] Locking Datavault
2,752,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,037 UART: [state] Locking ICCM
2,753,617 UART: [exit] Launching FMC @ 0x40000000
2,758,914 UART:
2,758,930 UART: Running Caliptra FMC ...
2,759,338 UART:
2,759,476 UART: [fmc] Received command: 0x10000008
2,760,508 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,092 ready_for_fw is high
1,056,092 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,523,408 >>> mbox cmd response: success
2,523,408 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,885 UART:
2,585,901 UART: Running Caliptra FMC ...
2,586,309 UART:
2,586,447 UART: [fmc] Received command: 0x10000008
2,587,479 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,360 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,660 UART: [kat] SHA2-256
901,600 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,741 UART: [kat] LMS
1,169,053 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,824 UART: [fht] FHT @ 0x50003400
1,173,550 UART: [idev] ++
1,173,718 UART: [idev] CDI.KEYID = 6
1,174,079 UART: [idev] SUBJECT.KEYID = 7
1,174,504 UART: [idev] UDS.KEYID = 0
1,174,850 ready_for_fw is high
1,174,850 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,200,200 UART: [idev] Sha1 KeyId Algorithm
1,209,012 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,825 UART: [ldev] SUBJECT.KEYID = 5
1,211,252 UART: [ldev] AUTHORITY.KEYID = 7
1,211,715 UART: [ldev] FE.KEYID = 1
1,217,221 UART: [ldev] Erasing FE.KEYID = 1
1,243,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,611 UART: [ldev] --
1,283,089 UART: [fwproc] Wait for Commands...
1,283,848 UART: [fwproc] Recv command 0x46574c44
1,284,581 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,466 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,107 >>> mbox cmd response: success
2,673,107 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,304 UART: [afmc] ++
2,674,472 UART: [afmc] CDI.KEYID = 6
2,674,835 UART: [afmc] SUBJECT.KEYID = 7
2,675,261 UART: [afmc] AUTHORITY.KEYID = 5
2,710,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,472 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,192 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,085 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,778 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,877 UART: [afmc] --
2,753,907 UART: [cold-reset] --
2,754,809 UART: [state] Locking Datavault
2,756,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,840 UART: [state] Locking ICCM
2,757,274 UART: [exit] Launching FMC @ 0x40000000
2,762,571 UART:
2,762,587 UART: Running Caliptra FMC ...
2,762,995 UART:
2,763,133 UART: [fmc] Received command: 0x10000008
2,764,165 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,075 ready_for_fw is high
1,056,075 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,687 >>> mbox cmd response: success
2,520,687 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,583,100 UART:
2,583,116 UART: Running Caliptra FMC ...
2,583,524 UART:
2,583,662 UART: [fmc] Received command: 0x10000008
2,584,694 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,232 UART: [kat] LMS
1,169,544 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,809 UART: [idev] ++
1,173,977 UART: [idev] CDI.KEYID = 6
1,174,338 UART: [idev] SUBJECT.KEYID = 7
1,174,763 UART: [idev] UDS.KEYID = 0
1,175,109 ready_for_fw is high
1,175,109 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,613 UART: [idev] --
1,208,720 UART: [ldev] ++
1,208,888 UART: [ldev] CDI.KEYID = 6
1,209,252 UART: [ldev] SUBJECT.KEYID = 5
1,209,679 UART: [ldev] AUTHORITY.KEYID = 7
1,210,142 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,240,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46574c44
1,281,826 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,516,583 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,170 >>> mbox cmd response: success
2,670,170 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,671,225 UART: [afmc] ++
2,671,393 UART: [afmc] CDI.KEYID = 6
2,671,756 UART: [afmc] SUBJECT.KEYID = 7
2,672,182 UART: [afmc] AUTHORITY.KEYID = 5
2,707,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,381 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,101 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,994 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,687 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,476 UART: [afmc] --
2,750,360 UART: [cold-reset] --
2,751,204 UART: [state] Locking Datavault
2,752,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,017 UART: [state] Locking ICCM
2,753,491 UART: [exit] Launching FMC @ 0x40000000
2,758,788 UART:
2,758,804 UART: Running Caliptra FMC ...
2,759,212 UART:
2,759,350 UART: [fmc] Received command: 0x10000008
2,760,382 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 ready_for_fw is high
1,055,864 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,188 >>> mbox cmd response: success
2,522,188 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,141 UART:
2,584,157 UART: Running Caliptra FMC ...
2,584,565 UART:
2,584,703 UART: [fmc] Received command: 0x10000008
2,585,735 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,982 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,365 UART: [ldev] Erasing FE.KEYID = 1
1,242,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,603 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,961 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,428 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,997 >>> mbox cmd response: success
2,672,997 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,076 UART: [afmc] ++
2,674,244 UART: [afmc] CDI.KEYID = 6
2,674,607 UART: [afmc] SUBJECT.KEYID = 7
2,675,033 UART: [afmc] AUTHORITY.KEYID = 5
2,710,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,692 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,412 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,305 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,998 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,941 UART: [afmc] --
2,754,033 UART: [cold-reset] --
2,755,029 UART: [state] Locking Datavault
2,756,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,756 UART: [state] Locking ICCM
2,757,256 UART: [exit] Launching FMC @ 0x40000000
2,762,553 UART:
2,762,569 UART: Running Caliptra FMC ...
2,762,977 UART:
2,763,115 UART: [fmc] Received command: 0x10000008
2,764,147 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,229 ready_for_fw is high
1,056,229 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,625 >>> mbox cmd response: success
2,521,625 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,583,442 UART:
2,583,458 UART: Running Caliptra FMC ...
2,583,866 UART:
2,584,004 UART: [fmc] Received command: 0x10000008
2,585,036 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
191,902 UART:
192,297 UART: Running Caliptra ROM ...
193,471 UART:
193,627 UART: [state] CFI Enabled
263,305 UART: [state] LifecycleState = Unprovisioned
265,691 UART: [state] DebugLocked = No
267,224 UART: [state] WD Timer not started. Device not locked for debugging
271,059 UART: [kat] SHA2-256
452,966 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,142 UART: ROM integrity test failed
465,431 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,451 UART:
192,835 UART: Running Caliptra ROM ...
193,964 UART:
603,670 UART: [state] CFI Enabled
617,355 UART: [state] LifecycleState = Unprovisioned
619,736 UART: [state] DebugLocked = No
621,549 UART: [state] WD Timer not started. Device not locked for debugging
625,355 UART: [kat] SHA2-256
807,311 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,498 UART: ROM integrity test failed
819,785 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 41856
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,172 UART:
192,552 UART: Running Caliptra ROM ...
193,653 UART:
193,793 UART: [state] CFI Enabled
261,713 UART: [state] LifecycleState = Unprovisioned
263,597 UART: [state] DebugLocked = No
264,701 UART: [state] WD Timer not started. Device not locked for debugging
268,153 UART: [kat] SHA2-256
447,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,311 UART: ROM integrity test failed
459,537 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,207 UART:
192,606 UART: Running Caliptra ROM ...
193,728 UART:
603,403 UART: [state] CFI Enabled
618,573 UART: [state] LifecycleState = Unprovisioned
620,430 UART: [state] DebugLocked = No
622,098 UART: [state] WD Timer not started. Device not locked for debugging
625,620 UART: [kat] SHA2-256
804,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,718 UART: ROM integrity test failed
817,011 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,068 UART:
192,483 UART: Running Caliptra ROM ...
193,579 UART:
193,727 UART: [state] CFI Enabled
261,160 UART: [state] LifecycleState = Unprovisioned
263,016 UART: [state] DebugLocked = No
265,402 UART: [state] WD Timer not started. Device not locked for debugging
269,555 UART: [kat] SHA2-256
448,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,733 UART: ROM integrity test failed
460,946 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,401 UART:
192,761 UART: Running Caliptra ROM ...
193,885 UART:
603,612 UART: [state] CFI Enabled
617,364 UART: [state] LifecycleState = Unprovisioned
619,222 UART: [state] DebugLocked = No
621,242 UART: [state] WD Timer not started. Device not locked for debugging
625,677 UART: [kat] SHA2-256
804,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,832 UART: ROM integrity test failed
817,044 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
890,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,735 UART: ROM integrity test failed
895,182 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: ROM integrity test failed
895,951 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: ROM integrity test failed
895,510 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
891,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,016 UART: ROM integrity test failed
895,463 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: ROM integrity test failed
895,702 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,043 UART: [state] LifecycleState = Unprovisioned
86,698 UART: [state] DebugLocked = No
87,428 UART: [state] WD Timer not started. Device not locked for debugging
88,701 UART: [kat] SHA2-256
892,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,222 UART: ROM integrity test failed
896,669 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d5c3ec0f1e5a71d25c7e972403694093162f25b8b44026567b206699ebbd358bad009e1694077eab66391680feda66f7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,195 UART:
192,546 UART: Running Caliptra ROM ...
193,715 UART:
193,868 UART: [state] CFI Enabled
267,541 UART: [state] LifecycleState = Unprovisioned
269,975 UART: [state] DebugLocked = No
271,438 UART: [state] WD Timer not started. Device not locked for debugging
275,611 UART: [kat] SHA2-256
457,554 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,071 UART: [kat] ++
469,619 UART: [kat] sha1
480,460 UART: [kat] SHA2-256
483,488 UART: [kat] SHA2-384
488,267 UART: [kat] SHA2-512-ACC
490,846 UART: [kat] ECC-384
3,775,428 UART: [kat] HMAC-384Kdf
3,802,362 UART: [kat] LMS
4,875,487 UART: [kat] --
4,880,255 UART: [cold-reset] ++
4,881,408 UART: [fht] FHT @ 0x50003400
4,892,245 UART: [idev] ++
4,892,967 UART: [idev] CDI.KEYID = 6
4,894,152 UART: [idev] SUBJECT.KEYID = 7
4,895,324 UART: [idev] UDS.KEYID = 0
4,896,250 ready_for_fw is high
4,896,433 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,036,443 UART: [idev] Erasing UDS.KEYID = 0
8,247,502 UART: [idev] Sha1 KeyId Algorithm
8,270,024 UART: [idev] --
8,273,914 UART: [ldev] ++
8,274,484 UART: [ldev] CDI.KEYID = 6
8,275,666 UART: [ldev] SUBJECT.KEYID = 5
8,276,826 UART: [ldev] AUTHORITY.KEYID = 7
8,278,053 UART: [ldev] FE.KEYID = 1
8,319,112 UART: [ldev] Erasing FE.KEYID = 1
11,653,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,443 UART: [ldev] --
14,037,925 UART: [fwproc] Wait for Commands...
14,040,179 UART: [fwproc] Recv command 0x46574c44
14,042,489 UART: [fwproc] Recv'd Img size: 111324 bytes
18,081,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,158,584 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,218,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,534,545 >>> mbox cmd response: success
18,538,460 UART: [afmc] ++
18,539,080 UART: [afmc] CDI.KEYID = 6
18,540,222 UART: [afmc] SUBJECT.KEYID = 7
18,541,381 UART: [afmc] AUTHORITY.KEYID = 5
21,906,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,205,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,208,175 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,224,317 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,240,475 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,256,286 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,279,468 UART: [afmc] --
24,284,360 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,424,650 UART: [cold-reset] --
24,425,509 UART: [state] Locking Datavault
24,426,588 UART: [state] Locking PCR0, PCR1 and PCR31
24,428,130 UART: [state] Locking ICCM
24,429,034 UART: [exit] Launching FMC @ 0x40000000
24,430,461 UART:
24,430,618 UART: Running Caliptra FMC ...
24,431,715 UART:
24,431,865 UART: [fmc] Received command: 0x46574C44
24,433,340 UART:
24,433,496 UART: Running Caliptra ROM ...
24,434,591 UART:
24,434,744 UART: [state] CFI Enabled
24,497,081 UART: [state] LifecycleState = Unprovisioned
24,498,957 UART: [state] DebugLocked = No
24,501,207 UART: [state] WD Timer not started. Device not locked for debugging
24,505,445 UART: [kat] SHA2-256
24,687,348 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,698,868 UART: [kat] ++
24,699,381 UART: [kat] sha1
24,709,622 UART: [kat] SHA2-256
24,712,678 UART: [kat] SHA2-384
24,718,672 UART: [kat] SHA2-512-ACC
24,721,304 UART: [kat] ECC-384
28,009,167 UART: [kat] HMAC-384Kdf
28,034,660 UART: [kat] LMS
29,107,782 UART: [kat] --
29,112,279 UART: [update-reset] ++
33,173,714 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,176,662 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,549,042 >>> mbox cmd response: success
33,550,308 UART: [update-reset] Copying MAN_2 To MAN_1
33,573,188 UART: [update-reset Success] --
33,574,835 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,577,921 UART: [state] Locking Datavault
33,581,610 UART: [state] Locking PCR0, PCR1 and PCR31
33,583,305 UART: [state] Locking ICCM
33,585,188 UART: [exit] Launching FMC @ 0x40000000
33,593,806 UART:
33,594,080 UART: Running Caliptra FMC ...
33,595,112 UART:
33,595,279 UART: [fmc] Received command: 0x1000000D
33,596,802 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
4,780,678 ready_for_fw is high
4,781,375 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,281,582 >>> mbox cmd response: success
23,958,904 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,099,143 UART:
24,099,530 UART: Running Caliptra FMC ...
24,100,666 UART:
24,100,820 UART: [fmc] Received command: 0x46574C44
33,124,318 >>> mbox cmd response: success
33,146,828 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,158,671 UART:
33,158,959 UART: Running Caliptra FMC ...
33,160,152 UART:
33,160,314 UART: [fmc] Received command: 0x1000000D
33,161,836 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,121 writing to cptra_bootfsm_go
193,367 UART:
193,809 UART: Running Caliptra ROM ...
194,936 UART:
604,715 UART: [state] CFI Enabled
616,957 UART: [state] LifecycleState = Unprovisioned
619,346 UART: [state] DebugLocked = No
621,867 UART: [state] WD Timer not started. Device not locked for debugging
626,172 UART: [kat] SHA2-256
808,095 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,690 UART: [kat] ++
820,220 UART: [kat] sha1
829,886 UART: [kat] SHA2-256
832,956 UART: [kat] SHA2-384
840,236 UART: [kat] SHA2-512-ACC
842,886 UART: [kat] ECC-384
4,099,260 UART: [kat] HMAC-384Kdf
4,112,135 UART: [kat] LMS
5,185,240 UART: [kat] --
5,189,751 UART: [cold-reset] ++
5,192,529 UART: [fht] FHT @ 0x50003400
5,202,750 UART: [idev] ++
5,203,424 UART: [idev] CDI.KEYID = 6
5,204,671 UART: [idev] SUBJECT.KEYID = 7
5,206,053 UART: [idev] UDS.KEYID = 0
5,207,319 ready_for_fw is high
5,207,531 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,347,299 UART: [idev] Erasing UDS.KEYID = 0
8,498,244 UART: [idev] Sha1 KeyId Algorithm
8,519,166 UART: [idev] --
8,523,716 UART: [ldev] ++
8,524,286 UART: [ldev] CDI.KEYID = 6
8,525,513 UART: [ldev] SUBJECT.KEYID = 5
8,526,988 UART: [ldev] AUTHORITY.KEYID = 7
8,528,534 UART: [ldev] FE.KEYID = 1
8,539,169 UART: [ldev] Erasing FE.KEYID = 1
11,835,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,513 UART: [ldev] --
14,201,259 UART: [fwproc] Wait for Commands...
14,202,859 UART: [fwproc] Recv command 0x46574c44
14,205,160 UART: [fwproc] Recv'd Img size: 111324 bytes
18,239,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,311,345 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,371,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,687,764 >>> mbox cmd response: success
18,691,886 UART: [afmc] ++
18,692,540 UART: [afmc] CDI.KEYID = 6
18,693,590 UART: [afmc] SUBJECT.KEYID = 7
18,694,800 UART: [afmc] AUTHORITY.KEYID = 5
22,012,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,305,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,307,879 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,324,040 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,340,156 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,355,981 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,378,847 UART: [afmc] --
24,384,465 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,524,756 UART: [cold-reset] --
24,525,642 UART: [state] Locking Datavault
24,526,709 UART: [state] Locking PCR0, PCR1 and PCR31
24,528,238 UART: [state] Locking ICCM
24,529,111 UART: [exit] Launching FMC @ 0x40000000
24,530,442 UART:
24,530,580 UART: Running Caliptra FMC ...
24,531,670 UART:
24,531,811 UART: [fmc] Received command: 0x46574C44
24,533,174 UART:
24,533,306 UART: Running Caliptra ROM ...
24,534,342 UART:
24,534,480 UART: [state] CFI Enabled
24,542,194 UART: [state] LifecycleState = Unprovisioned
24,544,081 UART: [state] DebugLocked = No
24,546,535 UART: [state] WD Timer not started. Device not locked for debugging
24,550,918 UART: [kat] SHA2-256
24,732,821 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,744,409 UART: [kat] ++
24,744,946 UART: [kat] sha1
24,755,509 UART: [kat] SHA2-256
24,758,574 UART: [kat] SHA2-384
24,763,689 UART: [kat] SHA2-512-ACC
24,766,297 UART: [kat] ECC-384
28,019,545 UART: [kat] HMAC-384Kdf
28,030,327 UART: [kat] LMS
29,103,440 UART: [kat] --
29,107,395 UART: [update-reset] ++
33,174,827 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,178,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,550,448 >>> mbox cmd response: success
33,552,409 UART: [update-reset] Copying MAN_2 To MAN_1
33,575,281 UART: [update-reset Success] --
33,576,941 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,578,936 UART: [state] Locking Datavault
33,583,478 UART: [state] Locking PCR0, PCR1 and PCR31
33,585,173 UART: [state] Locking ICCM
33,587,506 UART: [exit] Launching FMC @ 0x40000000
33,596,165 UART:
33,596,387 UART: Running Caliptra FMC ...
33,597,402 UART:
33,597,538 UART: [fmc] Received command: 0x1000000D
33,599,096 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,163 writing to cptra_bootfsm_go
5,099,982 ready_for_fw is high
5,100,399 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,494,030 >>> mbox cmd response: success
24,119,344 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,259,672 UART:
24,260,059 UART: Running Caliptra FMC ...
24,261,279 UART:
24,261,438 UART: [fmc] Received command: 0x46574C44
33,176,857 >>> mbox cmd response: success
33,199,216 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,212,407 UART:
33,212,699 UART: Running Caliptra FMC ...
33,213,873 UART:
33,214,028 UART: [fmc] Received command: 0x1000000D
33,215,563 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,149 UART:
192,518 UART: Running Caliptra ROM ...
193,699 UART:
193,846 UART: [state] CFI Enabled
264,229 UART: [state] LifecycleState = Unprovisioned
266,159 UART: [state] DebugLocked = No
267,623 UART: [state] WD Timer not started. Device not locked for debugging
272,227 UART: [kat] SHA2-256
451,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,910 UART: [kat] ++
463,447 UART: [kat] sha1
474,898 UART: [kat] SHA2-256
477,907 UART: [kat] SHA2-384
483,542 UART: [kat] SHA2-512-ACC
486,479 UART: [kat] ECC-384
2,949,094 UART: [kat] HMAC-384Kdf
2,971,145 UART: [kat] LMS
3,500,600 UART: [kat] --
3,505,186 UART: [cold-reset] ++
3,507,263 UART: [fht] FHT @ 0x50003400
3,517,962 UART: [idev] ++
3,518,533 UART: [idev] CDI.KEYID = 6
3,519,568 UART: [idev] SUBJECT.KEYID = 7
3,520,674 UART: [idev] UDS.KEYID = 0
3,521,618 ready_for_fw is high
3,521,806 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,662,819 UART: [idev] Erasing UDS.KEYID = 0
6,028,017 UART: [idev] Sha1 KeyId Algorithm
6,051,421 UART: [idev] --
6,053,914 UART: [ldev] ++
6,054,489 UART: [ldev] CDI.KEYID = 6
6,055,406 UART: [ldev] SUBJECT.KEYID = 5
6,056,574 UART: [ldev] AUTHORITY.KEYID = 7
6,057,810 UART: [ldev] FE.KEYID = 1
6,100,542 UART: [ldev] Erasing FE.KEYID = 1
8,605,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,463 UART: [ldev] --
10,413,866 UART: [fwproc] Wait for Commands...
10,417,048 UART: [fwproc] Recv command 0x46574c44
10,419,093 UART: [fwproc] Recv'd Img size: 111668 bytes
13,796,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,491 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,928,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,245,834 >>> mbox cmd response: success
14,250,203 UART: [afmc] ++
14,250,821 UART: [afmc] CDI.KEYID = 6
14,251,741 UART: [afmc] SUBJECT.KEYID = 7
14,252,850 UART: [afmc] AUTHORITY.KEYID = 5
16,787,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,511 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,600 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,624 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,332 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,582,978 UART: [afmc] --
18,588,532 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,729,264 UART: [cold-reset] --
18,730,130 UART: [state] Locking Datavault
18,731,206 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,745 UART: [state] Locking ICCM
18,733,626 UART: [exit] Launching FMC @ 0x40000000
18,734,964 UART:
18,735,113 UART: Running Caliptra FMC ...
18,736,214 UART:
18,736,364 UART: [fmc] Received command: 0x46574C44
18,737,739 UART:
18,737,882 UART: Running Caliptra ROM ...
18,738,893 UART:
18,739,055 UART: [state] CFI Enabled
18,801,831 UART: [state] LifecycleState = Unprovisioned
18,803,705 UART: [state] DebugLocked = No
18,805,118 UART: [state] WD Timer not started. Device not locked for debugging
18,809,240 UART: [kat] SHA2-256
18,988,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,999,926 UART: [kat] ++
19,000,379 UART: [kat] sha1
19,011,700 UART: [kat] SHA2-256
19,014,721 UART: [kat] SHA2-384
19,021,247 UART: [kat] SHA2-512-ACC
19,024,171 UART: [kat] ECC-384
21,485,434 UART: [kat] HMAC-384Kdf
21,511,366 UART: [kat] LMS
22,040,828 UART: [kat] --
22,044,790 UART: [update-reset] ++
25,438,692 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,442,500 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,816,079 >>> mbox cmd response: success
25,817,492 UART: [update-reset] Copying MAN_2 To MAN_1
25,839,828 UART: [update-reset Success] --
25,841,114 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,843,226 UART: [state] Locking Datavault
25,846,643 UART: [state] Locking PCR0, PCR1 and PCR31
25,848,290 UART: [state] Locking ICCM
25,850,384 UART: [exit] Launching FMC @ 0x40000000
25,858,784 UART:
25,859,019 UART: Running Caliptra FMC ...
25,860,125 UART:
25,860,278 UART: [fmc] Received command: 0x1000000D
25,861,793 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,361,645 ready_for_fw is high
3,362,106 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
13,977,848 >>> mbox cmd response: success
18,247,155 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,387,956 UART:
18,388,336 UART: Running Caliptra FMC ...
18,389,469 UART:
18,389,621 UART: [fmc] Received command: 0x46574C44
25,314,718 >>> mbox cmd response: success
25,337,445 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,349,370 UART:
25,349,618 UART: Running Caliptra FMC ...
25,350,705 UART:
25,350,857 UART: [fmc] Received command: 0x1000000D
25,352,382 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,370 UART:
192,727 UART: Running Caliptra ROM ...
193,906 UART:
603,304 UART: [state] CFI Enabled
620,270 UART: [state] LifecycleState = Unprovisioned
622,182 UART: [state] DebugLocked = No
624,568 UART: [state] WD Timer not started. Device not locked for debugging
628,814 UART: [kat] SHA2-256
807,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,468 UART: [kat] ++
820,003 UART: [kat] sha1
830,609 UART: [kat] SHA2-256
833,614 UART: [kat] SHA2-384
839,315 UART: [kat] SHA2-512-ACC
842,314 UART: [kat] ECC-384
3,284,082 UART: [kat] HMAC-384Kdf
3,295,612 UART: [kat] LMS
3,825,075 UART: [kat] --
3,829,287 UART: [cold-reset] ++
3,831,137 UART: [fht] FHT @ 0x50003400
3,842,699 UART: [idev] ++
3,843,268 UART: [idev] CDI.KEYID = 6
3,844,298 UART: [idev] SUBJECT.KEYID = 7
3,845,395 UART: [idev] UDS.KEYID = 0
3,846,319 ready_for_fw is high
3,846,510 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,986,822 UART: [idev] Erasing UDS.KEYID = 0
6,316,935 UART: [idev] Sha1 KeyId Algorithm
6,338,798 UART: [idev] --
6,344,351 UART: [ldev] ++
6,344,918 UART: [ldev] CDI.KEYID = 6
6,345,898 UART: [ldev] SUBJECT.KEYID = 5
6,346,972 UART: [ldev] AUTHORITY.KEYID = 7
6,348,307 UART: [ldev] FE.KEYID = 1
6,357,444 UART: [ldev] Erasing FE.KEYID = 1
8,830,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,341 UART: [ldev] --
10,622,258 UART: [fwproc] Wait for Commands...
10,624,239 UART: [fwproc] Recv command 0x46574c44
10,626,325 UART: [fwproc] Recv'd Img size: 111668 bytes
13,985,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,057,731 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,118,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,434,791 >>> mbox cmd response: success
14,438,598 UART: [afmc] ++
14,439,209 UART: [afmc] CDI.KEYID = 6
14,440,122 UART: [afmc] SUBJECT.KEYID = 7
14,441,282 UART: [afmc] AUTHORITY.KEYID = 5
16,941,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,658,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,660,819 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,676,888 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,692,978 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,708,651 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,730,785 UART: [afmc] --
18,735,022 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,875,752 UART: [cold-reset] --
18,876,633 UART: [state] Locking Datavault
18,877,709 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,244 UART: [state] Locking ICCM
18,880,152 UART: [exit] Launching FMC @ 0x40000000
18,881,572 UART:
18,881,726 UART: Running Caliptra FMC ...
18,882,820 UART:
18,882,994 UART: [fmc] Received command: 0x46574C44
18,884,450 UART:
18,884,603 UART: Running Caliptra ROM ...
18,885,702 UART:
18,885,853 UART: [state] CFI Enabled
18,889,743 UART: [state] LifecycleState = Unprovisioned
18,891,621 UART: [state] DebugLocked = No
18,892,883 UART: [state] WD Timer not started. Device not locked for debugging
18,896,019 UART: [kat] SHA2-256
19,075,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,086,800 UART: [kat] ++
19,087,336 UART: [kat] sha1
19,098,604 UART: [kat] SHA2-256
19,101,605 UART: [kat] SHA2-384
19,107,650 UART: [kat] SHA2-512-ACC
19,110,600 UART: [kat] ECC-384
21,551,712 UART: [kat] HMAC-384Kdf
21,564,097 UART: [kat] LMS
22,093,592 UART: [kat] --
22,098,521 UART: [update-reset] ++
25,493,671 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,497,474 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,871,015 >>> mbox cmd response: success
25,872,592 UART: [update-reset] Copying MAN_2 To MAN_1
25,894,926 UART: [update-reset Success] --
25,896,233 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,899,168 UART: [state] Locking Datavault
25,902,258 UART: [state] Locking PCR0, PCR1 and PCR31
25,903,909 UART: [state] Locking ICCM
25,906,430 UART: [exit] Launching FMC @ 0x40000000
25,914,874 UART:
25,915,105 UART: Running Caliptra FMC ...
25,916,219 UART:
25,916,372 UART: [fmc] Received command: 0x1000000D
25,917,882 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,691,308 ready_for_fw is high
3,691,858 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,216,121 >>> mbox cmd response: success
18,453,545 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,594,363 UART:
18,594,748 UART: Running Caliptra FMC ...
18,595,951 UART:
18,596,119 UART: [fmc] Received command: 0x46574C44
25,456,733 >>> mbox cmd response: success
25,478,014 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,488,119 UART:
25,488,373 UART: Running Caliptra FMC ...
25,489,543 UART:
25,489,709 UART: [fmc] Received command: 0x1000000D
25,491,228 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
191,995 UART:
192,358 UART: Running Caliptra ROM ...
193,462 UART:
193,604 UART: [state] CFI Enabled
264,420 UART: [state] LifecycleState = Unprovisioned
266,260 UART: [state] DebugLocked = No
268,287 UART: [state] WD Timer not started. Device not locked for debugging
272,330 UART: [kat] SHA2-256
451,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,067 UART: [kat] ++
463,608 UART: [kat] sha1
474,203 UART: [kat] SHA2-256
477,207 UART: [kat] SHA2-384
482,910 UART: [kat] SHA2-512-ACC
485,853 UART: [kat] ECC-384
2,946,806 UART: [kat] HMAC-384Kdf
2,972,029 UART: [kat] LMS
3,501,439 UART: [kat] --
3,505,796 UART: [cold-reset] ++
3,508,020 UART: [fht] FHT @ 0x50003400
3,520,209 UART: [idev] ++
3,520,775 UART: [idev] CDI.KEYID = 6
3,521,700 UART: [idev] SUBJECT.KEYID = 7
3,522,876 UART: [idev] UDS.KEYID = 0
3,523,820 ready_for_fw is high
3,524,028 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,664,571 UART: [idev] Erasing UDS.KEYID = 0
6,027,691 UART: [idev] Sha1 KeyId Algorithm
6,050,830 UART: [idev] --
6,055,211 UART: [ldev] ++
6,055,787 UART: [ldev] CDI.KEYID = 6
6,056,701 UART: [ldev] SUBJECT.KEYID = 5
6,057,867 UART: [ldev] AUTHORITY.KEYID = 7
6,059,159 UART: [ldev] FE.KEYID = 1
6,099,895 UART: [ldev] Erasing FE.KEYID = 1
8,605,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,044 UART: [ldev] --
10,417,261 UART: [fwproc] Wait for Commands...
10,419,247 UART: [fwproc] Recv command 0x46574c44
10,421,340 UART: [fwproc] Recv'd Img size: 111668 bytes
13,795,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,400 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,926,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,243,480 >>> mbox cmd response: success
14,247,153 UART: [afmc] ++
14,247,768 UART: [afmc] CDI.KEYID = 6
14,248,653 UART: [afmc] SUBJECT.KEYID = 7
14,249,810 UART: [afmc] AUTHORITY.KEYID = 5
16,784,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,473 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,527,525 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,543,587 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,559,290 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,582,230 UART: [afmc] --
18,587,544 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,728,180 UART: [cold-reset] --
18,729,037 UART: [state] Locking Datavault
18,730,197 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,737 UART: [state] Locking ICCM
18,732,644 UART: [exit] Launching FMC @ 0x40000000
18,734,074 UART:
18,734,231 UART: Running Caliptra FMC ...
18,735,338 UART:
18,735,494 UART: [fmc] Received command: 0x46574C44
18,736,960 UART:
18,737,116 UART: Running Caliptra ROM ...
18,738,215 UART:
18,738,392 UART: [state] CFI Enabled
18,802,247 UART: [state] LifecycleState = Unprovisioned
18,804,125 UART: [state] DebugLocked = No
18,806,235 UART: [state] WD Timer not started. Device not locked for debugging
18,810,028 UART: [kat] SHA2-256
18,989,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,000,698 UART: [kat] ++
19,001,161 UART: [kat] sha1
19,012,212 UART: [kat] SHA2-256
19,015,228 UART: [kat] SHA2-384
19,021,322 UART: [kat] SHA2-512-ACC
19,024,274 UART: [kat] ECC-384
21,482,846 UART: [kat] HMAC-384Kdf
21,506,957 UART: [kat] LMS
22,036,457 UART: [kat] --
22,043,755 UART: [update-reset] ++
25,440,291 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,443,609 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,817,144 >>> mbox cmd response: success
25,817,884 UART: [update-reset] Copying MAN_2 To MAN_1
25,840,230 UART: [update-reset Success] --
25,841,495 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,844,360 UART: [state] Locking Datavault
25,846,805 UART: [state] Locking PCR0, PCR1 and PCR31
25,848,450 UART: [state] Locking ICCM
25,850,386 UART: [exit] Launching FMC @ 0x40000000
25,858,786 UART:
25,859,028 UART: Running Caliptra FMC ...
25,860,132 UART:
25,860,286 UART: [fmc] Received command: 0x1000000D
25,861,802 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,375,733 ready_for_fw is high
3,376,183 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,036,813 >>> mbox cmd response: success
18,298,651 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,439,722 UART:
18,440,116 UART: Running Caliptra FMC ...
18,441,338 UART:
18,441,505 UART: [fmc] Received command: 0x46574C44
25,367,484 >>> mbox cmd response: success
25,389,355 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,402,896 UART:
25,403,160 UART: Running Caliptra FMC ...
25,404,336 UART:
25,404,500 UART: [fmc] Received command: 0x1000000D
25,406,041 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,359 UART:
192,727 UART: Running Caliptra ROM ...
193,809 UART:
603,459 UART: [state] CFI Enabled
616,302 UART: [state] LifecycleState = Unprovisioned
618,202 UART: [state] DebugLocked = No
620,947 UART: [state] WD Timer not started. Device not locked for debugging
624,905 UART: [kat] SHA2-256
804,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,621 UART: [kat] ++
816,062 UART: [kat] sha1
826,225 UART: [kat] SHA2-256
829,237 UART: [kat] SHA2-384
835,938 UART: [kat] SHA2-512-ACC
838,871 UART: [kat] ECC-384
3,278,538 UART: [kat] HMAC-384Kdf
3,290,625 UART: [kat] LMS
3,820,094 UART: [kat] --
3,823,872 UART: [cold-reset] ++
3,825,371 UART: [fht] FHT @ 0x50003400
3,835,849 UART: [idev] ++
3,836,412 UART: [idev] CDI.KEYID = 6
3,837,339 UART: [idev] SUBJECT.KEYID = 7
3,838,513 UART: [idev] UDS.KEYID = 0
3,839,432 ready_for_fw is high
3,839,620 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,979,912 UART: [idev] Erasing UDS.KEYID = 0
6,310,938 UART: [idev] Sha1 KeyId Algorithm
6,334,282 UART: [idev] --
6,339,083 UART: [ldev] ++
6,339,660 UART: [ldev] CDI.KEYID = 6
6,340,566 UART: [ldev] SUBJECT.KEYID = 5
6,341,780 UART: [ldev] AUTHORITY.KEYID = 7
6,343,004 UART: [ldev] FE.KEYID = 1
6,351,847 UART: [ldev] Erasing FE.KEYID = 1
8,823,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,564 UART: [ldev] --
10,616,055 UART: [fwproc] Wait for Commands...
10,618,913 UART: [fwproc] Recv command 0x46574c44
10,621,009 UART: [fwproc] Recv'd Img size: 111668 bytes
13,995,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,070,877 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,131,189 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,448,480 >>> mbox cmd response: success
14,451,956 UART: [afmc] ++
14,452,574 UART: [afmc] CDI.KEYID = 6
14,453,486 UART: [afmc] SUBJECT.KEYID = 7
14,454,589 UART: [afmc] AUTHORITY.KEYID = 5
16,955,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,675,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,677,646 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,693,711 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,709,755 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,725,424 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,748,473 UART: [afmc] --
18,753,703 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,894,439 UART: [cold-reset] --
18,895,304 UART: [state] Locking Datavault
18,896,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,897,983 UART: [state] Locking ICCM
18,898,889 UART: [exit] Launching FMC @ 0x40000000
18,900,307 UART:
18,900,462 UART: Running Caliptra FMC ...
18,901,553 UART:
18,901,703 UART: [fmc] Received command: 0x46574C44
18,903,154 UART:
18,903,324 UART: Running Caliptra ROM ...
18,904,416 UART:
18,904,569 UART: [state] CFI Enabled
18,913,692 UART: [state] LifecycleState = Unprovisioned
18,915,515 UART: [state] DebugLocked = No
18,917,318 UART: [state] WD Timer not started. Device not locked for debugging
18,920,298 UART: [kat] SHA2-256
19,099,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,111,078 UART: [kat] ++
19,111,617 UART: [kat] sha1
19,123,422 UART: [kat] SHA2-256
19,126,485 UART: [kat] SHA2-384
19,132,838 UART: [kat] SHA2-512-ACC
19,135,771 UART: [kat] ECC-384
21,578,193 UART: [kat] HMAC-384Kdf
21,589,882 UART: [kat] LMS
22,119,360 UART: [kat] --
22,125,393 UART: [update-reset] ++
25,519,334 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,521,960 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,895,528 >>> mbox cmd response: success
25,896,289 UART: [update-reset] Copying MAN_2 To MAN_1
25,918,620 UART: [update-reset Success] --
25,919,937 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,923,605 UART: [state] Locking Datavault
25,925,343 UART: [state] Locking PCR0, PCR1 and PCR31
25,927,039 UART: [state] Locking ICCM
25,929,431 UART: [exit] Launching FMC @ 0x40000000
25,937,823 UART:
25,938,050 UART: Running Caliptra FMC ...
25,939,071 UART:
25,939,217 UART: [fmc] Received command: 0x1000000D
25,940,801 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,699,229 ready_for_fw is high
3,699,810 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,236,514 >>> mbox cmd response: success
18,475,183 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,615,961 UART:
18,616,341 UART: Running Caliptra FMC ...
18,617,556 UART:
18,617,728 UART: [fmc] Received command: 0x46574C44
25,474,754 >>> mbox cmd response: success
25,497,376 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,510,928 UART:
25,511,180 UART: Running Caliptra FMC ...
25,512,342 UART:
25,512,499 UART: [fmc] Received command: 0x1000000D
25,514,036 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,142 UART: [kat] SHA2-256
891,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,821 UART: [kat] ++
895,973 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,751 UART: [cold-reset] ++
1,171,123 UART: [fht] FHT @ 0x50003400
1,173,653 UART: [idev] ++
1,173,821 UART: [idev] CDI.KEYID = 6
1,174,182 UART: [idev] SUBJECT.KEYID = 7
1,174,607 UART: [idev] UDS.KEYID = 0
1,174,953 ready_for_fw is high
1,174,953 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,499 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,239 UART: [idev] --
1,209,154 UART: [ldev] ++
1,209,322 UART: [ldev] CDI.KEYID = 6
1,209,686 UART: [ldev] SUBJECT.KEYID = 5
1,210,113 UART: [ldev] AUTHORITY.KEYID = 7
1,210,576 UART: [ldev] FE.KEYID = 1
1,215,418 UART: [ldev] Erasing FE.KEYID = 1
1,241,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,968 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,085 UART: [fwproc] Recv command 0x46574c44
1,282,818 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,468 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,645 >>> mbox cmd response: success
2,739,912 UART: [afmc] ++
2,740,080 UART: [afmc] CDI.KEYID = 6
2,740,443 UART: [afmc] SUBJECT.KEYID = 7
2,740,869 UART: [afmc] AUTHORITY.KEYID = 5
2,775,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,785 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,481 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,380 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,073 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,823 UART: [afmc] --
2,818,861 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,818,883 UART: [cold-reset] --
2,819,501 UART: [state] Locking Datavault
2,820,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,284 UART: [state] Locking ICCM
2,821,772 UART: [exit] Launching FMC @ 0x40000000
2,827,069 UART:
2,827,085 UART: Running Caliptra FMC ...
2,827,493 UART:
2,827,723 UART: [fmc] Received command: 0x46574C44
2,828,549 UART:
2,828,565 UART: Running Caliptra ROM ...
2,828,973 UART:
2,829,028 UART: [state] CFI Enabled
2,832,086 UART: [state] LifecycleState = Unprovisioned
2,832,741 UART: [state] DebugLocked = No
2,833,285 UART: [state] WD Timer not started. Device not locked for debugging
2,834,553 UART: [kat] SHA2-256
3,638,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,232 UART: [kat] ++
3,642,384 UART: [kat] sha1
3,646,690 UART: [kat] SHA2-256
3,648,630 UART: [kat] SHA2-384
3,651,435 UART: [kat] SHA2-512-ACC
3,653,335 UART: [kat] ECC-384
3,663,376 UART: [kat] HMAC-384Kdf
3,667,930 UART: [kat] LMS
3,916,242 UART: [kat] --
3,917,164 UART: [update-reset] ++
5,198,029 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,002 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,346,642 >>> mbox cmd response: success
5,346,791 UART: [update-reset] Copying MAN_2 To MAN_1
5,354,805 UART: [update-reset Success] --
5,355,214 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,355,586 UART: [state] Locking Datavault
5,356,400 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,004 UART: [state] Locking ICCM
5,357,648 UART: [exit] Launching FMC @ 0x40000000
5,362,945 UART:
5,362,961 UART: Running Caliptra FMC ...
5,363,369 UART:
5,363,591 UART: [fmc] Received command: 0x1000000D
5,364,683 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,202 ready_for_fw is high
1,056,202 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,919 >>> mbox cmd response: success
2,642,448 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,648,623 UART:
2,648,639 UART: Running Caliptra FMC ...
2,649,047 UART:
2,649,277 UART: [fmc] Received command: 0x46574C44
5,050,273 >>> mbox cmd response: success
5,057,945 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,063,741 UART:
5,063,757 UART: Running Caliptra FMC ...
5,064,165 UART:
5,064,387 UART: [fmc] Received command: 0x1000000D
5,065,479 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,398 UART: [kat] SHA2-256
902,338 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,809 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,554 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,174,846 ready_for_fw is high
1,174,846 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,443 UART: [ldev] ++
1,209,611 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,923 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,281 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,430 >>> mbox cmd response: success
2,739,623 UART: [afmc] ++
2,739,791 UART: [afmc] CDI.KEYID = 6
2,740,154 UART: [afmc] SUBJECT.KEYID = 7
2,740,580 UART: [afmc] AUTHORITY.KEYID = 5
2,776,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,008 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,704 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,603 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,296 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,084 UART: [afmc] --
2,819,976 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,819,998 UART: [cold-reset] --
2,820,920 UART: [state] Locking Datavault
2,821,849 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,453 UART: [state] Locking ICCM
2,822,937 UART: [exit] Launching FMC @ 0x40000000
2,828,234 UART:
2,828,250 UART: Running Caliptra FMC ...
2,828,658 UART:
2,828,888 UART: [fmc] Received command: 0x46574C44
2,829,714 UART:
2,829,730 UART: Running Caliptra ROM ...
2,830,138 UART:
2,830,280 UART: [state] CFI Enabled
2,832,774 UART: [state] LifecycleState = Unprovisioned
2,833,429 UART: [state] DebugLocked = No
2,833,977 UART: [state] WD Timer not started. Device not locked for debugging
2,835,159 UART: [kat] SHA2-256
3,638,709 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,838 UART: [kat] ++
3,642,990 UART: [kat] sha1
3,647,358 UART: [kat] SHA2-256
3,649,298 UART: [kat] SHA2-384
3,652,015 UART: [kat] SHA2-512-ACC
3,653,915 UART: [kat] ECC-384
3,663,388 UART: [kat] HMAC-384Kdf
3,667,962 UART: [kat] LMS
3,916,274 UART: [kat] --
3,917,180 UART: [update-reset] ++
5,198,221 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,370 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,347,010 >>> mbox cmd response: success
5,347,311 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,325 UART: [update-reset Success] --
5,355,734 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,356,480 UART: [state] Locking Datavault
5,357,456 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,060 UART: [state] Locking ICCM
5,358,498 UART: [exit] Launching FMC @ 0x40000000
5,363,795 UART:
5,363,811 UART: Running Caliptra FMC ...
5,364,219 UART:
5,364,441 UART: [fmc] Received command: 0x1000000D
5,365,533 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,579 ready_for_fw is high
1,056,579 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,722 >>> mbox cmd response: success
2,643,935 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,650,242 UART:
2,650,258 UART: Running Caliptra FMC ...
2,650,666 UART:
2,650,896 UART: [fmc] Received command: 0x46574C44
5,049,907 >>> mbox cmd response: success
5,057,613 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,063,347 UART:
5,063,363 UART: Running Caliptra FMC ...
5,063,771 UART:
5,063,993 UART: [fmc] Received command: 0x1000000D
5,065,085 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,849 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,240,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,692 UART: [ldev] --
1,280,192 UART: [fwproc] Wait for Commands...
1,280,801 UART: [fwproc] Recv command 0x46574c44
1,281,534 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,102 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,295 >>> mbox cmd response: success
2,737,428 UART: [afmc] ++
2,737,596 UART: [afmc] CDI.KEYID = 6
2,737,959 UART: [afmc] SUBJECT.KEYID = 7
2,738,385 UART: [afmc] AUTHORITY.KEYID = 5
2,773,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,501 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,796,197 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,802,096 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,807,789 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,815,629 UART: [afmc] --
2,816,687 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,816,709 UART: [cold-reset] --
2,817,651 UART: [state] Locking Datavault
2,818,636 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,240 UART: [state] Locking ICCM
2,819,886 UART: [exit] Launching FMC @ 0x40000000
2,825,183 UART:
2,825,199 UART: Running Caliptra FMC ...
2,825,607 UART:
2,825,837 UART: [fmc] Received command: 0x46574C44
2,826,663 UART:
2,826,679 UART: Running Caliptra ROM ...
2,827,087 UART:
2,827,142 UART: [state] CFI Enabled
2,829,394 UART: [state] LifecycleState = Unprovisioned
2,830,049 UART: [state] DebugLocked = No
2,830,543 UART: [state] WD Timer not started. Device not locked for debugging
2,831,815 UART: [kat] SHA2-256
3,635,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,639,494 UART: [kat] ++
3,639,646 UART: [kat] sha1
3,643,954 UART: [kat] SHA2-256
3,645,894 UART: [kat] SHA2-384
3,648,775 UART: [kat] SHA2-512-ACC
3,650,675 UART: [kat] ECC-384
3,660,614 UART: [kat] HMAC-384Kdf
3,665,226 UART: [kat] LMS
3,913,538 UART: [kat] --
3,914,584 UART: [update-reset] ++
5,196,209 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,197,362 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,345,002 >>> mbox cmd response: success
5,345,339 UART: [update-reset] Copying MAN_2 To MAN_1
5,353,353 UART: [update-reset Success] --
5,353,762 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,354,432 UART: [state] Locking Datavault
5,355,154 UART: [state] Locking PCR0, PCR1 and PCR31
5,355,758 UART: [state] Locking ICCM
5,356,376 UART: [exit] Launching FMC @ 0x40000000
5,361,673 UART:
5,361,689 UART: Running Caliptra FMC ...
5,362,097 UART:
5,362,319 UART: [fmc] Received command: 0x1000000D
5,363,411 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,926 ready_for_fw is high
1,056,926 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,629 >>> mbox cmd response: success
2,642,562 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,648,989 UART:
2,649,005 UART: Running Caliptra FMC ...
2,649,413 UART:
2,649,643 UART: [fmc] Received command: 0x46574C44
5,049,751 >>> mbox cmd response: success
5,057,411 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,062,735 UART:
5,062,751 UART: Running Caliptra FMC ...
5,063,159 UART:
5,063,381 UART: [fmc] Received command: 0x1000000D
5,064,473 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,173,988 ready_for_fw is high
1,173,988 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,783 UART: [fwproc] Wait for Commands...
1,282,546 UART: [fwproc] Recv command 0x46574c44
1,283,279 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,589 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,274 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,762 >>> mbox cmd response: success
2,740,981 UART: [afmc] ++
2,741,149 UART: [afmc] CDI.KEYID = 6
2,741,512 UART: [afmc] SUBJECT.KEYID = 7
2,741,938 UART: [afmc] AUTHORITY.KEYID = 5
2,776,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,640 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,336 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,235 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,928 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,918 UART: [afmc] --
2,819,948 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,819,970 UART: [cold-reset] --
2,820,990 UART: [state] Locking Datavault
2,822,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,825 UART: [state] Locking ICCM
2,823,401 UART: [exit] Launching FMC @ 0x40000000
2,828,698 UART:
2,828,714 UART: Running Caliptra FMC ...
2,829,122 UART:
2,829,352 UART: [fmc] Received command: 0x46574C44
2,830,178 UART:
2,830,194 UART: Running Caliptra ROM ...
2,830,602 UART:
2,830,744 UART: [state] CFI Enabled
2,833,214 UART: [state] LifecycleState = Unprovisioned
2,833,869 UART: [state] DebugLocked = No
2,834,457 UART: [state] WD Timer not started. Device not locked for debugging
2,835,693 UART: [kat] SHA2-256
3,639,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,372 UART: [kat] ++
3,643,524 UART: [kat] sha1
3,647,756 UART: [kat] SHA2-256
3,649,696 UART: [kat] SHA2-384
3,652,477 UART: [kat] SHA2-512-ACC
3,654,377 UART: [kat] ECC-384
3,664,324 UART: [kat] HMAC-384Kdf
3,668,968 UART: [kat] LMS
3,917,280 UART: [kat] --
3,918,082 UART: [update-reset] ++
5,198,853 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,928 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,347,568 >>> mbox cmd response: success
5,347,925 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,939 UART: [update-reset Success] --
5,356,348 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,357,030 UART: [state] Locking Datavault
5,357,782 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,386 UART: [state] Locking ICCM
5,358,860 UART: [exit] Launching FMC @ 0x40000000
5,364,157 UART:
5,364,173 UART: Running Caliptra FMC ...
5,364,581 UART:
5,364,803 UART: [fmc] Received command: 0x1000000D
5,365,895 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,095 ready_for_fw is high
1,056,095 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,144 >>> mbox cmd response: success
2,642,551 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,648,680 UART:
2,648,696 UART: Running Caliptra FMC ...
2,649,104 UART:
2,649,334 UART: [fmc] Received command: 0x46574C44
5,050,021 >>> mbox cmd response: success
5,057,695 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,063,429 UART:
5,063,445 UART: Running Caliptra FMC ...
5,063,853 UART:
5,064,075 UART: [fmc] Received command: 0x1000000D
5,065,167 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,695 UART: [idev] ++
1,172,863 UART: [idev] CDI.KEYID = 6
1,173,224 UART: [idev] SUBJECT.KEYID = 7
1,173,649 UART: [idev] UDS.KEYID = 0
1,173,995 ready_for_fw is high
1,173,995 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,207,263 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,364 UART: [fwproc] Wait for Commands...
1,281,101 UART: [fwproc] Recv command 0x46574c44
1,281,834 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,048 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,079 >>> mbox cmd response: success
2,737,168 UART: [afmc] ++
2,737,336 UART: [afmc] CDI.KEYID = 6
2,737,699 UART: [afmc] SUBJECT.KEYID = 7
2,738,125 UART: [afmc] AUTHORITY.KEYID = 5
2,773,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,521 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,796,217 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,802,116 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,807,809 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,815,675 UART: [afmc] --
2,816,723 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,816,745 UART: [cold-reset] --
2,817,491 UART: [state] Locking Datavault
2,818,612 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,216 UART: [state] Locking ICCM
2,819,842 UART: [exit] Launching FMC @ 0x40000000
2,825,139 UART:
2,825,155 UART: Running Caliptra FMC ...
2,825,563 UART:
2,825,793 UART: [fmc] Received command: 0x46574C44
2,826,619 UART:
2,826,635 UART: Running Caliptra ROM ...
2,827,043 UART:
2,827,098 UART: [state] CFI Enabled
2,829,544 UART: [state] LifecycleState = Unprovisioned
2,830,199 UART: [state] DebugLocked = No
2,830,771 UART: [state] WD Timer not started. Device not locked for debugging
2,832,115 UART: [kat] SHA2-256
3,635,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,639,794 UART: [kat] ++
3,639,946 UART: [kat] sha1
3,644,072 UART: [kat] SHA2-256
3,646,012 UART: [kat] SHA2-384
3,648,619 UART: [kat] SHA2-512-ACC
3,650,519 UART: [kat] ECC-384
3,660,734 UART: [kat] HMAC-384Kdf
3,665,382 UART: [kat] LMS
3,913,694 UART: [kat] --
3,914,602 UART: [update-reset] ++
5,195,397 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,196,422 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,344,062 >>> mbox cmd response: success
5,344,311 UART: [update-reset] Copying MAN_2 To MAN_1
5,352,325 UART: [update-reset Success] --
5,352,734 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,353,150 UART: [state] Locking Datavault
5,354,036 UART: [state] Locking PCR0, PCR1 and PCR31
5,354,640 UART: [state] Locking ICCM
5,355,240 UART: [exit] Launching FMC @ 0x40000000
5,360,537 UART:
5,360,553 UART: Running Caliptra FMC ...
5,360,961 UART:
5,361,183 UART: [fmc] Received command: 0x1000000D
5,362,275 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,972 ready_for_fw is high
1,054,972 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,475 >>> mbox cmd response: success
2,640,886 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,646,933 UART:
2,646,949 UART: Running Caliptra FMC ...
2,647,357 UART:
2,647,587 UART: [fmc] Received command: 0x46574C44
5,048,307 >>> mbox cmd response: success
5,055,991 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,061,919 UART:
5,061,935 UART: Running Caliptra FMC ...
5,062,343 UART:
5,062,565 UART: [fmc] Received command: 0x1000000D
5,063,657 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: [kat] ++
895,892 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,748 UART: [cold-reset] ++
1,171,112 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,370 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,283 UART: [fwproc] Wait for Commands...
1,282,952 UART: [fwproc] Recv command 0x46574c44
1,283,685 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,825 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,010 >>> mbox cmd response: success
2,739,107 UART: [afmc] ++
2,739,275 UART: [afmc] CDI.KEYID = 6
2,739,638 UART: [afmc] SUBJECT.KEYID = 7
2,740,064 UART: [afmc] AUTHORITY.KEYID = 5
2,775,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,402 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,098 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,997 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,690 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,444 UART: [afmc] --
2,818,396 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,818,418 UART: [cold-reset] --
2,819,340 UART: [state] Locking Datavault
2,820,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,169 UART: [state] Locking ICCM
2,821,801 UART: [exit] Launching FMC @ 0x40000000
2,827,098 UART:
2,827,114 UART: Running Caliptra FMC ...
2,827,522 UART:
2,827,752 UART: [fmc] Received command: 0x46574C44
2,828,578 UART:
2,828,594 UART: Running Caliptra ROM ...
2,829,002 UART:
2,829,144 UART: [state] CFI Enabled
2,831,464 UART: [state] LifecycleState = Unprovisioned
2,832,119 UART: [state] DebugLocked = No
2,832,759 UART: [state] WD Timer not started. Device not locked for debugging
2,834,023 UART: [kat] SHA2-256
3,637,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,702 UART: [kat] ++
3,641,854 UART: [kat] sha1
3,646,058 UART: [kat] SHA2-256
3,647,998 UART: [kat] SHA2-384
3,650,859 UART: [kat] SHA2-512-ACC
3,652,759 UART: [kat] ECC-384
3,662,054 UART: [kat] HMAC-384Kdf
3,666,848 UART: [kat] LMS
3,915,160 UART: [kat] --
3,915,730 UART: [update-reset] ++
5,198,071 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,216 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,346,856 >>> mbox cmd response: success
5,346,981 UART: [update-reset] Copying MAN_2 To MAN_1
5,354,995 UART: [update-reset Success] --
5,355,404 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,356,140 UART: [state] Locking Datavault
5,356,788 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,392 UART: [state] Locking ICCM
5,357,966 UART: [exit] Launching FMC @ 0x40000000
5,363,263 UART:
5,363,279 UART: Running Caliptra FMC ...
5,363,687 UART:
5,363,909 UART: [fmc] Received command: 0x1000000D
5,365,001 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,581 ready_for_fw is high
1,055,581 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,210 >>> mbox cmd response: success
2,644,627 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,650,716 UART:
2,650,732 UART: Running Caliptra FMC ...
2,651,140 UART:
2,651,370 UART: [fmc] Received command: 0x46574C44
5,051,983 >>> mbox cmd response: success
5,059,701 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,065,571 UART:
5,065,587 UART: Running Caliptra FMC ...
5,065,995 UART:
5,066,217 UART: [fmc] Received command: 0x1000000D
5,067,309 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,990 UART:
192,365 UART: Running Caliptra ROM ...
193,564 UART:
193,722 UART: [state] CFI Enabled
264,734 UART: [state] LifecycleState = Unprovisioned
267,157 UART: [state] DebugLocked = No
268,549 UART: [state] WD Timer not started. Device not locked for debugging
273,154 UART: [kat] SHA2-256
455,079 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,603 UART: [kat] ++
467,046 UART: [kat] sha1
476,572 UART: [kat] SHA2-256
479,576 UART: [kat] SHA2-384
484,855 UART: [kat] SHA2-512-ACC
487,499 UART: [kat] ECC-384
3,776,524 UART: [kat] HMAC-384Kdf
3,802,045 UART: [kat] LMS
4,875,176 UART: [kat] --
4,880,172 UART: [cold-reset] ++
4,881,337 UART: [fht] FHT @ 0x50003400
4,893,328 UART: [idev] ++
4,894,069 UART: [idev] CDI.KEYID = 6
4,895,252 UART: [idev] SUBJECT.KEYID = 7
4,896,427 UART: [idev] UDS.KEYID = 0
4,897,376 ready_for_fw is high
4,897,581 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,037,516 UART: [idev] Erasing UDS.KEYID = 0
8,241,415 UART: [idev] Sha1 KeyId Algorithm
8,262,983 UART: [idev] --
8,267,928 UART: [ldev] ++
8,268,506 UART: [ldev] CDI.KEYID = 6
8,269,684 UART: [ldev] SUBJECT.KEYID = 5
8,270,852 UART: [ldev] AUTHORITY.KEYID = 7
8,272,004 UART: [ldev] FE.KEYID = 1
8,318,996 UART: [ldev] Erasing FE.KEYID = 1
11,653,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,382 UART: [ldev] --
14,041,270 UART: [fwproc] Wait for Commands...
14,044,283 UART: [fwproc] Recv command 0x46574c44
14,046,536 UART: [fwproc] Recv'd Img size: 111324 bytes
18,088,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,163,157 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,223,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,540,041 >>> mbox cmd response: success
18,544,509 UART: [afmc] ++
18,545,120 UART: [afmc] CDI.KEYID = 6
18,546,331 UART: [afmc] SUBJECT.KEYID = 7
18,547,438 UART: [afmc] AUTHORITY.KEYID = 5
21,905,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,204,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,206,652 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,222,801 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,238,923 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,254,762 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,276,445 UART: [afmc] --
24,280,415 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,420,771 UART: [cold-reset] --
24,421,648 UART: [state] Locking Datavault
24,422,807 UART: [state] Locking PCR0, PCR1 and PCR31
24,424,341 UART: [state] Locking ICCM
24,425,248 UART: [exit] Launching FMC @ 0x40000000
24,426,672 UART:
24,426,851 UART: Running Caliptra FMC ...
24,427,949 UART:
24,428,106 UART: [fmc] Received command: 0x46574C44
24,429,566 UART:
24,429,718 UART: Running Caliptra ROM ...
24,430,812 UART:
24,430,964 UART: [state] CFI Enabled
24,497,680 UART: [state] LifecycleState = Unprovisioned
24,499,553 UART: [state] DebugLocked = No
24,501,584 UART: [state] WD Timer not started. Device not locked for debugging
24,505,660 UART: [kat] SHA2-256
24,687,553 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,699,097 UART: [kat] ++
24,699,640 UART: [kat] sha1
24,710,475 UART: [kat] SHA2-256
24,713,491 UART: [kat] SHA2-384
24,720,081 UART: [kat] SHA2-512-ACC
24,722,707 UART: [kat] ECC-384
28,009,546 UART: [kat] HMAC-384Kdf
28,036,836 UART: [kat] LMS
29,109,937 UART: [kat] --
29,114,198 UART: [update-reset] ++
33,171,376 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,174,221 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,547,838 UART: [update-reset] Copying MAN_2 To MAN_1
33,570,705 UART: [update-reset Success] --
33,572,368 >>> mbox cmd response: success
33,572,597 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,574,694 UART: [state] Locking Datavault
33,577,090 UART: [state] Locking PCR0, PCR1 and PCR31
33,578,738 UART: [state] Locking ICCM
33,580,132 UART: [exit] Launching FMC @ 0x40000000
33,588,767 UART:
33,589,002 UART: Running Caliptra FMC ...
33,590,110 UART:
33,590,267 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,591,903 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
4,805,192 ready_for_fw is high
4,805,599 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,327,723 >>> mbox cmd response: success
24,001,795 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,142,587 UART:
24,142,985 UART: Running Caliptra FMC ...
24,144,209 UART:
24,144,394 UART: [fmc] Received command: 0x46574C44
33,175,722 >>> mbox cmd response: success
33,176,116 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,188,498 UART:
33,188,747 UART: Running Caliptra FMC ...
33,189,832 UART:
33,189,981 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,191,625 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,348 UART:
192,731 UART: Running Caliptra ROM ...
193,814 UART:
603,448 UART: [state] CFI Enabled
616,956 UART: [state] LifecycleState = Unprovisioned
619,340 UART: [state] DebugLocked = No
622,002 UART: [state] WD Timer not started. Device not locked for debugging
626,318 UART: [kat] SHA2-256
808,307 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,808 UART: [kat] ++
820,324 UART: [kat] sha1
831,473 UART: [kat] SHA2-256
834,542 UART: [kat] SHA2-384
841,111 UART: [kat] SHA2-512-ACC
843,692 UART: [kat] ECC-384
4,097,695 UART: [kat] HMAC-384Kdf
4,108,730 UART: [kat] LMS
5,181,906 UART: [kat] --
5,186,690 UART: [cold-reset] ++
5,188,480 UART: [fht] FHT @ 0x50003400
5,200,727 UART: [idev] ++
5,201,436 UART: [idev] CDI.KEYID = 6
5,202,607 UART: [idev] SUBJECT.KEYID = 7
5,204,061 UART: [idev] UDS.KEYID = 0
5,205,316 ready_for_fw is high
5,205,501 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,345,541 UART: [idev] Erasing UDS.KEYID = 0
8,493,701 UART: [idev] Sha1 KeyId Algorithm
8,514,482 UART: [idev] --
8,518,606 UART: [ldev] ++
8,519,177 UART: [ldev] CDI.KEYID = 6
8,520,408 UART: [ldev] SUBJECT.KEYID = 5
8,521,882 UART: [ldev] AUTHORITY.KEYID = 7
8,523,428 UART: [ldev] FE.KEYID = 1
8,534,602 UART: [ldev] Erasing FE.KEYID = 1
11,829,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,139 UART: [ldev] --
14,195,544 UART: [fwproc] Wait for Commands...
14,197,362 UART: [fwproc] Recv command 0x46574c44
14,199,610 UART: [fwproc] Recv'd Img size: 111324 bytes
18,238,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,310,299 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,370,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,687,054 >>> mbox cmd response: success
18,691,994 UART: [afmc] ++
18,692,609 UART: [afmc] CDI.KEYID = 6
18,693,741 UART: [afmc] SUBJECT.KEYID = 7
18,694,911 UART: [afmc] AUTHORITY.KEYID = 5
22,006,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,302,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,304,646 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,320,815 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,336,956 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,352,789 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,375,133 UART: [afmc] --
24,380,381 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,520,674 UART: [cold-reset] --
24,521,547 UART: [state] Locking Datavault
24,522,705 UART: [state] Locking PCR0, PCR1 and PCR31
24,524,238 UART: [state] Locking ICCM
24,525,138 UART: [exit] Launching FMC @ 0x40000000
24,526,556 UART:
24,526,716 UART: Running Caliptra FMC ...
24,527,805 UART:
24,527,950 UART: [fmc] Received command: 0x46574C44
24,529,396 UART:
24,529,539 UART: Running Caliptra ROM ...
24,530,626 UART:
24,530,769 UART: [state] CFI Enabled
24,536,644 UART: [state] LifecycleState = Unprovisioned
24,538,469 UART: [state] DebugLocked = No
24,540,377 UART: [state] WD Timer not started. Device not locked for debugging
24,544,700 UART: [kat] SHA2-256
24,726,660 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,738,213 UART: [kat] ++
24,738,748 UART: [kat] sha1
24,748,283 UART: [kat] SHA2-256
24,751,301 UART: [kat] SHA2-384
24,756,627 UART: [kat] SHA2-512-ACC
24,759,236 UART: [kat] ECC-384
28,013,449 UART: [kat] HMAC-384Kdf
28,024,723 UART: [kat] LMS
29,097,834 UART: [kat] --
29,102,977 UART: [update-reset] ++
33,160,334 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,163,608 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,537,599 UART: [update-reset] Copying MAN_2 To MAN_1
33,560,470 UART: [update-reset Success] --
33,562,138 >>> mbox cmd response: success
33,562,386 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,565,774 UART: [state] Locking Datavault
33,568,541 UART: [state] Locking PCR0, PCR1 and PCR31
33,570,184 UART: [state] Locking ICCM
33,572,761 UART: [exit] Launching FMC @ 0x40000000
33,581,379 UART:
33,581,609 UART: Running Caliptra FMC ...
33,582,701 UART:
33,582,849 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,584,468 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
5,099,079 ready_for_fw is high
5,099,496 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,485,643 >>> mbox cmd response: success
24,107,243 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,247,694 UART:
24,248,077 UART: Running Caliptra FMC ...
24,249,229 UART:
24,249,389 UART: [fmc] Received command: 0x46574C44
33,199,759 >>> mbox cmd response: success
33,200,156 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,213,633 UART:
33,213,922 UART: Running Caliptra FMC ...
33,215,094 UART:
33,215,252 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,216,888 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,091 UART:
192,483 UART: Running Caliptra ROM ...
193,630 UART:
193,775 UART: [state] CFI Enabled
260,974 UART: [state] LifecycleState = Unprovisioned
262,901 UART: [state] DebugLocked = No
264,512 UART: [state] WD Timer not started. Device not locked for debugging
267,565 UART: [kat] SHA2-256
446,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,281 UART: [kat] ++
458,783 UART: [kat] sha1
470,582 UART: [kat] SHA2-256
473,588 UART: [kat] SHA2-384
479,193 UART: [kat] SHA2-512-ACC
482,144 UART: [kat] ECC-384
2,949,026 UART: [kat] HMAC-384Kdf
2,970,519 UART: [kat] LMS
3,499,951 UART: [kat] --
3,505,816 UART: [cold-reset] ++
3,506,824 UART: [fht] FHT @ 0x50003400
3,517,540 UART: [idev] ++
3,518,114 UART: [idev] CDI.KEYID = 6
3,519,097 UART: [idev] SUBJECT.KEYID = 7
3,520,273 UART: [idev] UDS.KEYID = 0
3,521,196 ready_for_fw is high
3,521,404 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,661,946 UART: [idev] Erasing UDS.KEYID = 0
6,026,255 UART: [idev] Sha1 KeyId Algorithm
6,049,648 UART: [idev] --
6,054,455 UART: [ldev] ++
6,055,031 UART: [ldev] CDI.KEYID = 6
6,055,943 UART: [ldev] SUBJECT.KEYID = 5
6,057,105 UART: [ldev] AUTHORITY.KEYID = 7
6,058,340 UART: [ldev] FE.KEYID = 1
6,099,723 UART: [ldev] Erasing FE.KEYID = 1
8,605,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,557 UART: [ldev] --
10,411,954 UART: [fwproc] Wait for Commands...
10,414,846 UART: [fwproc] Recv command 0x46574c44
10,416,959 UART: [fwproc] Recv'd Img size: 111668 bytes
13,789,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,217 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,240,087 >>> mbox cmd response: success
14,244,190 UART: [afmc] ++
14,244,806 UART: [afmc] CDI.KEYID = 6
14,245,722 UART: [afmc] SUBJECT.KEYID = 7
14,246,880 UART: [afmc] AUTHORITY.KEYID = 5
16,784,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,345 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,524,386 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,540,462 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,556,158 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,579,895 UART: [afmc] --
18,584,541 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,725,146 UART: [cold-reset] --
18,726,001 UART: [state] Locking Datavault
18,727,166 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,703 UART: [state] Locking ICCM
18,729,605 UART: [exit] Launching FMC @ 0x40000000
18,731,025 UART:
18,731,188 UART: Running Caliptra FMC ...
18,732,287 UART:
18,732,462 UART: [fmc] Received command: 0x46574C44
18,734,143 UART:
18,734,310 UART: Running Caliptra ROM ...
18,735,410 UART:
18,735,566 UART: [state] CFI Enabled
18,797,310 UART: [state] LifecycleState = Unprovisioned
18,799,135 UART: [state] DebugLocked = No
18,801,211 UART: [state] WD Timer not started. Device not locked for debugging
18,805,379 UART: [kat] SHA2-256
18,984,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,996,057 UART: [kat] ++
18,996,593 UART: [kat] sha1
19,007,099 UART: [kat] SHA2-256
19,010,113 UART: [kat] SHA2-384
19,015,770 UART: [kat] SHA2-512-ACC
19,018,715 UART: [kat] ECC-384
21,481,014 UART: [kat] HMAC-384Kdf
21,505,603 UART: [kat] LMS
22,035,033 UART: [kat] --
22,039,423 UART: [update-reset] ++
25,441,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,445,308 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,819,585 UART: [update-reset] Copying MAN_2 To MAN_1
25,841,902 UART: [update-reset Success] --
25,843,187 >>> mbox cmd response: success
25,843,421 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,846,504 UART: [state] Locking Datavault
25,848,948 UART: [state] Locking PCR0, PCR1 and PCR31
25,850,650 UART: [state] Locking ICCM
25,852,661 UART: [exit] Launching FMC @ 0x40000000
25,861,052 UART:
25,861,314 UART: Running Caliptra FMC ...
25,862,364 UART:
25,862,516 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,864,154 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,363,715 ready_for_fw is high
3,364,286 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,021,013 >>> mbox cmd response: success
18,310,735 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,451,572 UART:
18,451,953 UART: Running Caliptra FMC ...
18,453,093 UART:
18,453,251 UART: [fmc] Received command: 0x46574C44
25,429,086 >>> mbox cmd response: success
25,429,486 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,442,785 UART:
25,443,054 UART: Running Caliptra FMC ...
25,444,150 UART:
25,444,319 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,445,968 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,115 writing to cptra_bootfsm_go
193,310 UART:
193,667 UART: Running Caliptra ROM ...
194,755 UART:
604,368 UART: [state] CFI Enabled
617,451 UART: [state] LifecycleState = Unprovisioned
619,257 UART: [state] DebugLocked = No
621,340 UART: [state] WD Timer not started. Device not locked for debugging
625,225 UART: [kat] SHA2-256
804,377 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,942 UART: [kat] ++
816,385 UART: [kat] sha1
827,344 UART: [kat] SHA2-256
830,353 UART: [kat] SHA2-384
835,699 UART: [kat] SHA2-512-ACC
838,631 UART: [kat] ECC-384
3,282,573 UART: [kat] HMAC-384Kdf
3,293,619 UART: [kat] LMS
3,823,072 UART: [kat] --
3,827,572 UART: [cold-reset] ++
3,829,073 UART: [fht] FHT @ 0x50003400
3,840,191 UART: [idev] ++
3,840,761 UART: [idev] CDI.KEYID = 6
3,841,819 UART: [idev] SUBJECT.KEYID = 7
3,842,919 UART: [idev] UDS.KEYID = 0
3,844,016 ready_for_fw is high
3,844,225 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,984,397 UART: [idev] Erasing UDS.KEYID = 0
6,310,298 UART: [idev] Sha1 KeyId Algorithm
6,332,984 UART: [idev] --
6,338,032 UART: [ldev] ++
6,338,616 UART: [ldev] CDI.KEYID = 6
6,339,532 UART: [ldev] SUBJECT.KEYID = 5
6,340,694 UART: [ldev] AUTHORITY.KEYID = 7
6,341,924 UART: [ldev] FE.KEYID = 1
6,351,380 UART: [ldev] Erasing FE.KEYID = 1
8,825,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,686 UART: [ldev] --
10,612,807 UART: [fwproc] Wait for Commands...
10,615,013 UART: [fwproc] Recv command 0x46574c44
10,617,124 UART: [fwproc] Recv'd Img size: 111668 bytes
13,984,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,056,191 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,116,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,432,760 >>> mbox cmd response: success
14,436,666 UART: [afmc] ++
14,437,274 UART: [afmc] CDI.KEYID = 6
14,438,157 UART: [afmc] SUBJECT.KEYID = 7
14,439,368 UART: [afmc] AUTHORITY.KEYID = 5
16,934,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,652,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,654,717 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,670,767 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,686,811 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,702,464 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,724,862 UART: [afmc] --
18,729,213 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,869,822 UART: [cold-reset] --
18,870,681 UART: [state] Locking Datavault
18,871,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,282 UART: [state] Locking ICCM
18,874,189 UART: [exit] Launching FMC @ 0x40000000
18,875,612 UART:
18,875,768 UART: Running Caliptra FMC ...
18,876,868 UART:
18,877,021 UART: [fmc] Received command: 0x46574C44
18,878,477 UART:
18,878,630 UART: Running Caliptra ROM ...
18,879,721 UART:
18,879,871 UART: [state] CFI Enabled
18,885,166 UART: [state] LifecycleState = Unprovisioned
18,887,028 UART: [state] DebugLocked = No
18,888,540 UART: [state] WD Timer not started. Device not locked for debugging
18,891,949 UART: [kat] SHA2-256
19,071,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,082,669 UART: [kat] ++
19,083,205 UART: [kat] sha1
19,094,043 UART: [kat] SHA2-256
19,097,066 UART: [kat] SHA2-384
19,103,266 UART: [kat] SHA2-512-ACC
19,106,202 UART: [kat] ECC-384
21,549,465 UART: [kat] HMAC-384Kdf
21,562,816 UART: [kat] LMS
22,092,311 UART: [kat] --
22,097,288 UART: [update-reset] ++
25,488,738 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,491,465 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,866,043 UART: [update-reset] Copying MAN_2 To MAN_1
25,888,330 UART: [update-reset Success] --
25,889,668 >>> mbox cmd response: success
25,889,891 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,892,373 UART: [state] Locking Datavault
25,895,782 UART: [state] Locking PCR0, PCR1 and PCR31
25,897,480 UART: [state] Locking ICCM
25,898,678 UART: [exit] Launching FMC @ 0x40000000
25,907,066 UART:
25,907,296 UART: Running Caliptra FMC ...
25,908,334 UART:
25,908,479 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,910,111 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,697,300 ready_for_fw is high
3,697,725 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,225,026 >>> mbox cmd response: success
18,456,424 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,597,145 UART:
18,597,529 UART: Running Caliptra FMC ...
18,598,750 UART:
18,598,929 UART: [fmc] Received command: 0x46574C44
25,484,893 >>> mbox cmd response: success
25,485,277 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,498,202 UART:
25,498,463 UART: Running Caliptra FMC ...
25,499,542 UART:
25,499,690 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,501,336 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,128 UART:
192,508 UART: Running Caliptra ROM ...
193,636 UART:
193,783 UART: [state] CFI Enabled
264,950 UART: [state] LifecycleState = Unprovisioned
266,872 UART: [state] DebugLocked = No
269,454 UART: [state] WD Timer not started. Device not locked for debugging
273,290 UART: [kat] SHA2-256
452,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,993 UART: [kat] ++
464,532 UART: [kat] sha1
474,772 UART: [kat] SHA2-256
477,781 UART: [kat] SHA2-384
483,346 UART: [kat] SHA2-512-ACC
486,286 UART: [kat] ECC-384
2,951,301 UART: [kat] HMAC-384Kdf
2,972,089 UART: [kat] LMS
3,501,567 UART: [kat] --
3,505,216 UART: [cold-reset] ++
3,506,299 UART: [fht] FHT @ 0x50003400
3,516,641 UART: [idev] ++
3,517,218 UART: [idev] CDI.KEYID = 6
3,518,148 UART: [idev] SUBJECT.KEYID = 7
3,519,327 UART: [idev] UDS.KEYID = 0
3,520,380 ready_for_fw is high
3,520,566 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,661,258 UART: [idev] Erasing UDS.KEYID = 0
6,026,999 UART: [idev] Sha1 KeyId Algorithm
6,050,501 UART: [idev] --
6,054,229 UART: [ldev] ++
6,054,809 UART: [ldev] CDI.KEYID = 6
6,055,701 UART: [ldev] SUBJECT.KEYID = 5
6,056,807 UART: [ldev] AUTHORITY.KEYID = 7
6,058,152 UART: [ldev] FE.KEYID = 1
6,100,235 UART: [ldev] Erasing FE.KEYID = 1
8,604,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,951 UART: [ldev] --
10,413,860 UART: [fwproc] Wait for Commands...
10,416,179 UART: [fwproc] Recv command 0x46574c44
10,418,222 UART: [fwproc] Recv'd Img size: 111668 bytes
13,785,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,860,884 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,921,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,237,436 >>> mbox cmd response: success
14,242,510 UART: [afmc] ++
14,243,130 UART: [afmc] CDI.KEYID = 6
14,244,044 UART: [afmc] SUBJECT.KEYID = 7
14,245,212 UART: [afmc] AUTHORITY.KEYID = 5
16,789,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,106 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,529,205 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,545,264 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,944 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,582,896 UART: [afmc] --
18,587,785 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,728,527 UART: [cold-reset] --
18,729,393 UART: [state] Locking Datavault
18,730,550 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,088 UART: [state] Locking ICCM
18,732,996 UART: [exit] Launching FMC @ 0x40000000
18,734,420 UART:
18,734,580 UART: Running Caliptra FMC ...
18,735,678 UART:
18,735,835 UART: [fmc] Received command: 0x46574C44
18,737,293 UART:
18,737,468 UART: Running Caliptra ROM ...
18,738,574 UART:
18,738,730 UART: [state] CFI Enabled
18,803,272 UART: [state] LifecycleState = Unprovisioned
18,805,112 UART: [state] DebugLocked = No
18,807,918 UART: [state] WD Timer not started. Device not locked for debugging
18,810,953 UART: [kat] SHA2-256
18,990,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,001,619 UART: [kat] ++
19,002,164 UART: [kat] sha1
19,012,413 UART: [kat] SHA2-256
19,015,423 UART: [kat] SHA2-384
19,022,112 UART: [kat] SHA2-512-ACC
19,025,058 UART: [kat] ECC-384
21,487,140 UART: [kat] HMAC-384Kdf
21,510,607 UART: [kat] LMS
22,040,039 UART: [kat] --
22,043,245 UART: [update-reset] ++
25,437,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,440,379 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,814,386 UART: [update-reset] Copying MAN_2 To MAN_1
25,836,724 UART: [update-reset Success] --
25,838,008 >>> mbox cmd response: success
25,838,233 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,840,283 UART: [state] Locking Datavault
25,844,618 UART: [state] Locking PCR0, PCR1 and PCR31
25,846,261 UART: [state] Locking ICCM
25,847,997 UART: [exit] Launching FMC @ 0x40000000
25,856,361 UART:
25,856,602 UART: Running Caliptra FMC ...
25,857,706 UART:
25,857,861 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,859,514 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,361,458 ready_for_fw is high
3,362,040 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,004,304 >>> mbox cmd response: success
18,286,515 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,427,834 UART:
18,428,232 UART: Running Caliptra FMC ...
18,429,436 UART:
18,429,607 UART: [fmc] Received command: 0x46574C44
25,386,551 >>> mbox cmd response: success
25,386,943 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,399,483 UART:
25,399,750 UART: Running Caliptra FMC ...
25,400,924 UART:
25,401,088 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,402,732 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,499 UART:
192,860 UART: Running Caliptra ROM ...
194,041 UART:
603,716 UART: [state] CFI Enabled
618,894 UART: [state] LifecycleState = Unprovisioned
620,743 UART: [state] DebugLocked = No
622,277 UART: [state] WD Timer not started. Device not locked for debugging
625,176 UART: [kat] SHA2-256
804,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,878 UART: [kat] ++
816,417 UART: [kat] sha1
827,158 UART: [kat] SHA2-256
830,166 UART: [kat] SHA2-384
836,100 UART: [kat] SHA2-512-ACC
839,104 UART: [kat] ECC-384
3,278,965 UART: [kat] HMAC-384Kdf
3,290,937 UART: [kat] LMS
3,820,485 UART: [kat] --
3,824,407 UART: [cold-reset] ++
3,825,409 UART: [fht] FHT @ 0x50003400
3,836,883 UART: [idev] ++
3,837,440 UART: [idev] CDI.KEYID = 6
3,838,428 UART: [idev] SUBJECT.KEYID = 7
3,839,595 UART: [idev] UDS.KEYID = 0
3,840,494 ready_for_fw is high
3,840,703 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,981,051 UART: [idev] Erasing UDS.KEYID = 0
6,309,452 UART: [idev] Sha1 KeyId Algorithm
6,333,810 UART: [idev] --
6,337,165 UART: [ldev] ++
6,337,734 UART: [ldev] CDI.KEYID = 6
6,338,615 UART: [ldev] SUBJECT.KEYID = 5
6,339,820 UART: [ldev] AUTHORITY.KEYID = 7
6,341,043 UART: [ldev] FE.KEYID = 1
6,351,263 UART: [ldev] Erasing FE.KEYID = 1
8,827,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,337 UART: [ldev] --
10,617,155 UART: [fwproc] Wait for Commands...
10,618,922 UART: [fwproc] Recv command 0x46574c44
10,621,010 UART: [fwproc] Recv'd Img size: 111668 bytes
13,988,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,060,997 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,121,323 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,438,897 >>> mbox cmd response: success
14,442,996 UART: [afmc] ++
14,443,604 UART: [afmc] CDI.KEYID = 6
14,444,514 UART: [afmc] SUBJECT.KEYID = 7
14,445,672 UART: [afmc] AUTHORITY.KEYID = 5
16,943,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,663,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,665,599 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,681,639 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,697,720 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,713,402 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,736,779 UART: [afmc] --
18,740,987 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,881,718 UART: [cold-reset] --
18,882,602 UART: [state] Locking Datavault
18,883,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,213 UART: [state] Locking ICCM
18,886,117 UART: [exit] Launching FMC @ 0x40000000
18,887,540 UART:
18,887,693 UART: Running Caliptra FMC ...
18,888,787 UART:
18,888,939 UART: [fmc] Received command: 0x46574C44
18,890,391 UART:
18,890,545 UART: Running Caliptra ROM ...
18,891,645 UART:
18,891,799 UART: [state] CFI Enabled
18,895,417 UART: [state] LifecycleState = Unprovisioned
18,897,235 UART: [state] DebugLocked = No
18,899,899 UART: [state] WD Timer not started. Device not locked for debugging
18,903,406 UART: [kat] SHA2-256
19,082,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,094,167 UART: [kat] ++
19,094,705 UART: [kat] sha1
19,106,733 UART: [kat] SHA2-256
19,109,744 UART: [kat] SHA2-384
19,115,122 UART: [kat] SHA2-512-ACC
19,118,112 UART: [kat] ECC-384
21,560,584 UART: [kat] HMAC-384Kdf
21,571,753 UART: [kat] LMS
22,101,310 UART: [kat] --
22,106,109 UART: [update-reset] ++
25,494,741 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,498,819 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,873,473 UART: [update-reset] Copying MAN_2 To MAN_1
25,895,806 UART: [update-reset Success] --
25,897,126 >>> mbox cmd response: success
25,897,371 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,901,851 UART: [state] Locking Datavault
25,906,518 UART: [state] Locking PCR0, PCR1 and PCR31
25,908,166 UART: [state] Locking ICCM
25,909,750 UART: [exit] Launching FMC @ 0x40000000
25,918,144 UART:
25,918,372 UART: Running Caliptra FMC ...
25,919,471 UART:
25,919,629 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,921,256 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,699,824 ready_for_fw is high
3,700,192 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,236,396 >>> mbox cmd response: success
18,479,508 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,620,920 UART:
18,621,302 UART: Running Caliptra FMC ...
18,622,515 UART:
18,622,688 UART: [fmc] Received command: 0x46574C44
25,495,288 >>> mbox cmd response: success
25,495,692 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,507,552 UART:
25,507,841 UART: Running Caliptra FMC ...
25,508,929 UART:
25,509,080 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,510,723 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
890,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,123 UART: [kat] ++
895,275 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 ready_for_fw is high
1,174,221 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,285 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,674 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,681 UART: [fwproc] Recv command 0x46574c44
1,283,414 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,720 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,813 >>> mbox cmd response: success
2,739,876 UART: [afmc] ++
2,740,044 UART: [afmc] CDI.KEYID = 6
2,740,407 UART: [afmc] SUBJECT.KEYID = 7
2,740,833 UART: [afmc] AUTHORITY.KEYID = 5
2,776,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,531 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,227 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,126 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,819 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,665 UART: [afmc] --
2,819,613 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,819,635 UART: [cold-reset] --
2,820,637 UART: [state] Locking Datavault
2,821,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,528 UART: [state] Locking ICCM
2,822,992 UART: [exit] Launching FMC @ 0x40000000
2,828,289 UART:
2,828,305 UART: Running Caliptra FMC ...
2,828,713 UART:
2,828,943 UART: [fmc] Received command: 0x46574C44
2,829,769 UART:
2,829,785 UART: Running Caliptra ROM ...
2,830,193 UART:
2,830,248 UART: [state] CFI Enabled
2,833,138 UART: [state] LifecycleState = Unprovisioned
2,833,793 UART: [state] DebugLocked = No
2,834,295 UART: [state] WD Timer not started. Device not locked for debugging
2,835,579 UART: [kat] SHA2-256
3,639,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,258 UART: [kat] ++
3,643,410 UART: [kat] sha1
3,647,752 UART: [kat] SHA2-256
3,649,692 UART: [kat] SHA2-384
3,652,291 UART: [kat] SHA2-512-ACC
3,654,191 UART: [kat] ECC-384
3,663,968 UART: [kat] HMAC-384Kdf
3,668,680 UART: [kat] LMS
3,916,992 UART: [kat] --
3,917,946 UART: [update-reset] ++
5,198,663 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,347,643 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,657 UART: [update-reset Success] --
5,356,066 >>> mbox cmd response: success
5,356,066 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,356,614 UART: [state] Locking Datavault
5,357,376 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,980 UART: [state] Locking ICCM
5,358,576 UART: [exit] Launching FMC @ 0x40000000
5,363,873 UART:
5,363,889 UART: Running Caliptra FMC ...
5,364,297 UART:
5,364,519 UART: [fmc] Received command: 0x1000000C
5,365,254 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 ready_for_fw is high
1,056,314 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,375 >>> mbox cmd response: success
2,643,630 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,650,019 UART:
2,650,035 UART: Running Caliptra FMC ...
2,650,443 UART:
2,650,673 UART: [fmc] Received command: 0x46574C44
5,057,529 >>> mbox cmd response: success
5,057,529 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,063,343 UART:
5,063,359 UART: Running Caliptra FMC ...
5,063,767 UART:
5,063,989 UART: [fmc] Received command: 0x1000000C
5,064,724 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,755 UART: [kat] SHA2-512-ACC
906,656 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,207,788 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,993 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,076 >>> mbox cmd response: success
2,739,277 UART: [afmc] ++
2,739,445 UART: [afmc] CDI.KEYID = 6
2,739,808 UART: [afmc] SUBJECT.KEYID = 7
2,740,234 UART: [afmc] AUTHORITY.KEYID = 5
2,776,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,320 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,016 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,915 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,608 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,504 UART: [afmc] --
2,819,532 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,819,554 UART: [cold-reset] --
2,820,388 UART: [state] Locking Datavault
2,821,579 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,183 UART: [state] Locking ICCM
2,822,849 UART: [exit] Launching FMC @ 0x40000000
2,828,146 UART:
2,828,162 UART: Running Caliptra FMC ...
2,828,570 UART:
2,828,800 UART: [fmc] Received command: 0x46574C44
2,829,626 UART:
2,829,642 UART: Running Caliptra ROM ...
2,830,050 UART:
2,830,192 UART: [state] CFI Enabled
2,833,004 UART: [state] LifecycleState = Unprovisioned
2,833,659 UART: [state] DebugLocked = No
2,834,205 UART: [state] WD Timer not started. Device not locked for debugging
2,835,549 UART: [kat] SHA2-256
3,639,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,228 UART: [kat] ++
3,643,380 UART: [kat] sha1
3,647,602 UART: [kat] SHA2-256
3,649,542 UART: [kat] SHA2-384
3,652,375 UART: [kat] SHA2-512-ACC
3,654,275 UART: [kat] ECC-384
3,664,248 UART: [kat] HMAC-384Kdf
3,668,812 UART: [kat] LMS
3,917,124 UART: [kat] --
3,918,010 UART: [update-reset] ++
5,198,295 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,448 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,347,219 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,233 UART: [update-reset Success] --
5,355,642 >>> mbox cmd response: success
5,355,642 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,356,294 UART: [state] Locking Datavault
5,357,076 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,680 UART: [state] Locking ICCM
5,358,128 UART: [exit] Launching FMC @ 0x40000000
5,363,425 UART:
5,363,441 UART: Running Caliptra FMC ...
5,363,849 UART:
5,364,071 UART: [fmc] Received command: 0x1000000C
5,364,806 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,989 ready_for_fw is high
1,055,989 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,348 >>> mbox cmd response: success
2,643,325 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,649,290 UART:
2,649,306 UART: Running Caliptra FMC ...
2,649,714 UART:
2,649,944 UART: [fmc] Received command: 0x46574C44
5,058,083 >>> mbox cmd response: success
5,058,083 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,063,641 UART:
5,063,657 UART: Running Caliptra FMC ...
5,064,065 UART:
5,064,287 UART: [fmc] Received command: 0x1000000C
5,065,022 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,189 UART: [kat] SHA2-256
902,129 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,572 UART: [kat] HMAC-384Kdf
921,090 UART: [kat] LMS
1,169,402 UART: [kat] --
1,170,597 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,829 UART: [idev] ++
1,173,997 UART: [idev] CDI.KEYID = 6
1,174,358 UART: [idev] SUBJECT.KEYID = 7
1,174,783 UART: [idev] UDS.KEYID = 0
1,175,129 ready_for_fw is high
1,175,129 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,885 UART: [idev] Erasing UDS.KEYID = 0
1,199,549 UART: [idev] Sha1 KeyId Algorithm
1,208,307 UART: [idev] --
1,209,354 UART: [ldev] ++
1,209,522 UART: [ldev] CDI.KEYID = 6
1,209,886 UART: [ldev] SUBJECT.KEYID = 5
1,210,313 UART: [ldev] AUTHORITY.KEYID = 7
1,210,776 UART: [ldev] FE.KEYID = 1
1,216,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,528 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,164 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,389 >>> mbox cmd response: success
2,738,490 UART: [afmc] ++
2,738,658 UART: [afmc] CDI.KEYID = 6
2,739,021 UART: [afmc] SUBJECT.KEYID = 7
2,739,447 UART: [afmc] AUTHORITY.KEYID = 5
2,775,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,679 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,375 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,274 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,967 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,947 UART: [afmc] --
2,818,945 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,818,967 UART: [cold-reset] --
2,819,929 UART: [state] Locking Datavault
2,821,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,692 UART: [state] Locking ICCM
2,822,160 UART: [exit] Launching FMC @ 0x40000000
2,827,457 UART:
2,827,473 UART: Running Caliptra FMC ...
2,827,881 UART:
2,828,111 UART: [fmc] Received command: 0x46574C44
2,828,937 UART:
2,828,953 UART: Running Caliptra ROM ...
2,829,361 UART:
2,829,416 UART: [state] CFI Enabled
2,832,080 UART: [state] LifecycleState = Unprovisioned
2,832,735 UART: [state] DebugLocked = No
2,833,323 UART: [state] WD Timer not started. Device not locked for debugging
2,834,491 UART: [kat] SHA2-256
3,638,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,170 UART: [kat] ++
3,642,322 UART: [kat] sha1
3,646,520 UART: [kat] SHA2-256
3,648,460 UART: [kat] SHA2-384
3,651,225 UART: [kat] SHA2-512-ACC
3,653,125 UART: [kat] ECC-384
3,662,852 UART: [kat] HMAC-384Kdf
3,667,420 UART: [kat] LMS
3,915,732 UART: [kat] --
3,916,540 UART: [update-reset] ++
5,196,975 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,198,008 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,345,857 UART: [update-reset] Copying MAN_2 To MAN_1
5,353,871 UART: [update-reset Success] --
5,354,280 >>> mbox cmd response: success
5,354,280 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,355,110 UART: [state] Locking Datavault
5,355,938 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,542 UART: [state] Locking ICCM
5,357,058 UART: [exit] Launching FMC @ 0x40000000
5,362,355 UART:
5,362,371 UART: Running Caliptra FMC ...
5,362,779 UART:
5,363,001 UART: [fmc] Received command: 0x1000000C
5,363,736 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,048 ready_for_fw is high
1,056,048 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,701 >>> mbox cmd response: success
2,645,410 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,651,721 UART:
2,651,737 UART: Running Caliptra FMC ...
2,652,145 UART:
2,652,375 UART: [fmc] Received command: 0x46574C44
5,059,481 >>> mbox cmd response: success
5,059,481 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,064,983 UART:
5,064,999 UART: Running Caliptra FMC ...
5,065,407 UART:
5,065,629 UART: [fmc] Received command: 0x1000000C
5,066,364 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,170,232 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 ready_for_fw is high
1,174,778 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,688 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,702 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,127 UART: [fwproc] Wait for Commands...
1,283,894 UART: [fwproc] Recv command 0x46574c44
1,284,627 UART: [fwproc] Recv'd Img size: 111668 bytes
2,552,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,580,141 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,826 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,741,286 >>> mbox cmd response: success
2,742,385 UART: [afmc] ++
2,742,553 UART: [afmc] CDI.KEYID = 6
2,742,916 UART: [afmc] SUBJECT.KEYID = 7
2,743,342 UART: [afmc] AUTHORITY.KEYID = 5
2,778,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,862 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,558 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,457 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,150 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,022 UART: [afmc] --
2,821,906 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,821,928 UART: [cold-reset] --
2,822,952 UART: [state] Locking Datavault
2,824,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,919 UART: [state] Locking ICCM
2,825,501 UART: [exit] Launching FMC @ 0x40000000
2,830,798 UART:
2,830,814 UART: Running Caliptra FMC ...
2,831,222 UART:
2,831,452 UART: [fmc] Received command: 0x46574C44
2,832,278 UART:
2,832,294 UART: Running Caliptra ROM ...
2,832,702 UART:
2,832,844 UART: [state] CFI Enabled
2,835,702 UART: [state] LifecycleState = Unprovisioned
2,836,357 UART: [state] DebugLocked = No
2,837,027 UART: [state] WD Timer not started. Device not locked for debugging
2,838,277 UART: [kat] SHA2-256
3,641,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,956 UART: [kat] ++
3,646,108 UART: [kat] sha1
3,650,428 UART: [kat] SHA2-256
3,652,368 UART: [kat] SHA2-384
3,655,079 UART: [kat] SHA2-512-ACC
3,656,979 UART: [kat] ECC-384
3,666,788 UART: [kat] HMAC-384Kdf
3,671,358 UART: [kat] LMS
3,919,670 UART: [kat] --
3,920,462 UART: [update-reset] ++
5,202,549 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,614 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,351,465 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,479 UART: [update-reset Success] --
5,359,888 >>> mbox cmd response: success
5,359,888 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,360,406 UART: [state] Locking Datavault
5,361,238 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,842 UART: [state] Locking ICCM
5,362,446 UART: [exit] Launching FMC @ 0x40000000
5,367,743 UART:
5,367,759 UART: Running Caliptra FMC ...
5,368,167 UART:
5,368,389 UART: [fmc] Received command: 0x1000000C
5,369,124 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,467 ready_for_fw is high
1,057,467 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,186 >>> mbox cmd response: success
2,643,645 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,649,630 UART:
2,649,646 UART: Running Caliptra FMC ...
2,650,054 UART:
2,650,284 UART: [fmc] Received command: 0x46574C44
5,057,239 >>> mbox cmd response: success
5,057,239 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,062,997 UART:
5,063,013 UART: Running Caliptra FMC ...
5,063,421 UART:
5,063,643 UART: [fmc] Received command: 0x1000000C
5,064,378 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 ready_for_fw is high
1,174,189 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,087 UART: [fwproc] Recv command 0x46574c44
1,282,820 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,732 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,887 >>> mbox cmd response: success
2,740,020 UART: [afmc] ++
2,740,188 UART: [afmc] CDI.KEYID = 6
2,740,551 UART: [afmc] SUBJECT.KEYID = 7
2,740,977 UART: [afmc] AUTHORITY.KEYID = 5
2,776,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,993 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,689 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,588 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,281 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,275 UART: [afmc] --
2,820,163 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,820,185 UART: [cold-reset] --
2,821,109 UART: [state] Locking Datavault
2,822,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,872 UART: [state] Locking ICCM
2,823,502 UART: [exit] Launching FMC @ 0x40000000
2,828,799 UART:
2,828,815 UART: Running Caliptra FMC ...
2,829,223 UART:
2,829,453 UART: [fmc] Received command: 0x46574C44
2,830,279 UART:
2,830,295 UART: Running Caliptra ROM ...
2,830,703 UART:
2,830,758 UART: [state] CFI Enabled
2,833,622 UART: [state] LifecycleState = Unprovisioned
2,834,277 UART: [state] DebugLocked = No
2,834,769 UART: [state] WD Timer not started. Device not locked for debugging
2,836,045 UART: [kat] SHA2-256
3,639,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,724 UART: [kat] ++
3,643,876 UART: [kat] sha1
3,648,054 UART: [kat] SHA2-256
3,649,994 UART: [kat] SHA2-384
3,652,623 UART: [kat] SHA2-512-ACC
3,654,523 UART: [kat] ECC-384
3,664,306 UART: [kat] HMAC-384Kdf
3,668,870 UART: [kat] LMS
3,917,182 UART: [kat] --
3,918,012 UART: [update-reset] ++
5,199,453 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,466 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,348,355 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,369 UART: [update-reset Success] --
5,356,778 >>> mbox cmd response: success
5,356,778 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,256 UART: [state] Locking Datavault
5,357,948 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,552 UART: [state] Locking ICCM
5,359,002 UART: [exit] Launching FMC @ 0x40000000
5,364,299 UART:
5,364,315 UART: Running Caliptra FMC ...
5,364,723 UART:
5,364,945 UART: [fmc] Received command: 0x1000000C
5,365,680 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,666 ready_for_fw is high
1,056,666 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,535 >>> mbox cmd response: success
2,642,626 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,648,889 UART:
2,648,905 UART: Running Caliptra FMC ...
2,649,313 UART:
2,649,543 UART: [fmc] Received command: 0x46574C44
5,058,465 >>> mbox cmd response: success
5,058,465 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,064,303 UART:
5,064,319 UART: Running Caliptra FMC ...
5,064,727 UART:
5,064,949 UART: [fmc] Received command: 0x1000000C
5,065,684 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,819 UART: [kat] SHA2-512-ACC
906,720 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,171,094 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,175,140 ready_for_fw is high
1,175,140 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,243 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,621 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,045 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,250 >>> mbox cmd response: success
2,740,511 UART: [afmc] ++
2,740,679 UART: [afmc] CDI.KEYID = 6
2,741,042 UART: [afmc] SUBJECT.KEYID = 7
2,741,468 UART: [afmc] AUTHORITY.KEYID = 5
2,777,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,344 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,040 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,939 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,632 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,454 UART: [afmc] --
2,820,362 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,820,384 UART: [cold-reset] --
2,821,224 UART: [state] Locking Datavault
2,822,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,941 UART: [state] Locking ICCM
2,823,483 UART: [exit] Launching FMC @ 0x40000000
2,828,780 UART:
2,828,796 UART: Running Caliptra FMC ...
2,829,204 UART:
2,829,434 UART: [fmc] Received command: 0x46574C44
2,830,260 UART:
2,830,276 UART: Running Caliptra ROM ...
2,830,684 UART:
2,830,826 UART: [state] CFI Enabled
2,833,670 UART: [state] LifecycleState = Unprovisioned
2,834,325 UART: [state] DebugLocked = No
2,834,815 UART: [state] WD Timer not started. Device not locked for debugging
2,835,977 UART: [kat] SHA2-256
3,639,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,656 UART: [kat] ++
3,643,808 UART: [kat] sha1
3,647,812 UART: [kat] SHA2-256
3,649,752 UART: [kat] SHA2-384
3,652,725 UART: [kat] SHA2-512-ACC
3,654,625 UART: [kat] ECC-384
3,664,894 UART: [kat] HMAC-384Kdf
3,669,520 UART: [kat] LMS
3,917,832 UART: [kat] --
3,918,638 UART: [update-reset] ++
5,200,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,201,450 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,349,399 UART: [update-reset] Copying MAN_2 To MAN_1
5,357,413 UART: [update-reset Success] --
5,357,822 >>> mbox cmd response: success
5,357,822 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,358,308 UART: [state] Locking Datavault
5,359,066 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,670 UART: [state] Locking ICCM
5,360,158 UART: [exit] Launching FMC @ 0x40000000
5,365,455 UART:
5,365,471 UART: Running Caliptra FMC ...
5,365,879 UART:
5,366,101 UART: [fmc] Received command: 0x1000000C
5,366,836 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,967 ready_for_fw is high
1,056,967 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,028 >>> mbox cmd response: success
2,643,619 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,649,644 UART:
2,649,660 UART: Running Caliptra FMC ...
2,650,068 UART:
2,650,298 UART: [fmc] Received command: 0x46574C44
5,058,207 >>> mbox cmd response: success
5,058,207 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,063,827 UART:
5,063,843 UART: Running Caliptra FMC ...
5,064,251 UART:
5,064,473 UART: [fmc] Received command: 0x1000000C
5,065,208 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,994 UART:
192,368 UART: Running Caliptra ROM ...
193,559 UART:
193,710 UART: [state] CFI Enabled
262,414 UART: [state] LifecycleState = Unprovisioned
264,793 UART: [state] DebugLocked = No
266,713 UART: [state] WD Timer not started. Device not locked for debugging
271,314 UART: [kat] SHA2-256
453,263 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,788 UART: [kat] ++
465,272 UART: [kat] sha1
475,935 UART: [kat] SHA2-256
478,946 UART: [kat] SHA2-384
485,149 UART: [kat] SHA2-512-ACC
487,728 UART: [kat] ECC-384
3,777,731 UART: [kat] HMAC-384Kdf
3,804,387 UART: [kat] LMS
4,877,566 UART: [kat] --
4,881,272 UART: [cold-reset] ++
4,883,698 UART: [fht] FHT @ 0x50003400
4,894,741 UART: [idev] ++
4,895,444 UART: [idev] CDI.KEYID = 6
4,896,608 UART: [idev] SUBJECT.KEYID = 7
4,897,777 UART: [idev] UDS.KEYID = 0
4,898,671 ready_for_fw is high
4,898,877 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,038,905 UART: [idev] Erasing UDS.KEYID = 0
8,243,646 UART: [idev] Sha1 KeyId Algorithm
8,264,972 UART: [idev] --
8,269,795 UART: [ldev] ++
8,270,368 UART: [ldev] CDI.KEYID = 6
8,271,524 UART: [ldev] SUBJECT.KEYID = 5
8,272,737 UART: [ldev] AUTHORITY.KEYID = 7
8,273,888 UART: [ldev] FE.KEYID = 1
8,317,233 UART: [ldev] Erasing FE.KEYID = 1
11,651,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,213 UART: [ldev] --
14,033,543 UART: [fwproc] Wait for Commands...
14,035,647 UART: [fwproc] Recv command 0x46574c44
14,037,901 UART: [fwproc] Recv'd Img size: 111324 bytes
18,069,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,141,092 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,201,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,516,534 >>> mbox cmd response: success
18,520,458 UART: [afmc] ++
18,521,068 UART: [afmc] CDI.KEYID = 6
18,522,179 UART: [afmc] SUBJECT.KEYID = 7
18,523,393 UART: [afmc] AUTHORITY.KEYID = 5
21,884,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,202,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,204,689 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,220,892 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,236,968 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,252,841 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,275,529 UART: [afmc] --
26,335,694 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,501,464 UART: [cold-reset] --
26,502,404 UART: [state] Locking Datavault
26,503,569 UART: [state] Locking PCR0, PCR1 and PCR31
26,505,826 UART: [state] Locking ICCM
26,506,756 UART: [exit] Launching FMC @ 0x40000000
26,508,191 UART:
26,508,351 UART: Running Caliptra FMC ...
26,509,468 UART:
26,509,627 UART: [fmc] Received command: 0x46574C44
26,511,084 UART:
26,511,236 UART: Running Caliptra ROM ...
26,512,332 UART:
26,512,486 UART: [state] CFI Enabled
26,564,335 UART: [state] LifecycleState = Unprovisioned
26,566,167 UART: [state] DebugLocked = No
26,568,032 UART: [state] WD Timer not started. Device not locked for debugging
26,572,541 UART: [kat] SHA2-256
26,754,436 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,765,992 UART: [kat] ++
26,766,443 UART: [kat] sha1
26,776,900 UART: [kat] SHA2-256
26,779,916 UART: [kat] SHA2-384
26,785,892 UART: [kat] SHA2-512-ACC
26,788,525 UART: [kat] ECC-384
30,075,086 UART: [kat] HMAC-384Kdf
30,101,098 UART: [kat] LMS
31,174,261 UART: [kat] --
31,179,567 UART: [update-reset] ++
35,482,379 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,486,138 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,927,636 >>> mbox cmd response: success
35,929,332 UART: [update-reset] Copying MAN_2 To MAN_1
35,952,209 UART: [update-reset Success] --
35,959,723 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,117,205 UART: [state] Locking Datavault
36,118,763 UART: [state] Locking PCR0, PCR1 and PCR31
36,120,240 UART: [state] Locking ICCM
36,121,118 UART: [exit] Launching FMC @ 0x40000000
36,122,573 UART:
36,122,739 UART: Running Caliptra FMC ...
36,123,842 UART:
36,124,018 UART: [fmc] Received command: 0x1000000E
36,901,638 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
4,785,500 ready_for_fw is high
4,786,097 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,304,452 >>> mbox cmd response: success
26,036,015 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,201,678 UART:
26,202,119 UART: Running Caliptra FMC ...
26,203,198 UART:
26,203,353 UART: [fmc] Received command: 0x46574C44
35,511,954 >>> mbox cmd response: success
35,539,581 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,696,992 UART:
35,697,341 UART: Running Caliptra FMC ...
35,698,474 UART:
35,698,629 UART: [fmc] Received command: 0x1000000E
36,481,375 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,408 UART:
192,777 UART: Running Caliptra ROM ...
193,871 UART:
603,709 UART: [state] CFI Enabled
618,207 UART: [state] LifecycleState = Unprovisioned
620,576 UART: [state] DebugLocked = No
622,654 UART: [state] WD Timer not started. Device not locked for debugging
626,877 UART: [kat] SHA2-256
808,885 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,417 UART: [kat] ++
820,932 UART: [kat] sha1
831,959 UART: [kat] SHA2-256
835,011 UART: [kat] SHA2-384
842,142 UART: [kat] SHA2-512-ACC
844,788 UART: [kat] ECC-384
4,097,296 UART: [kat] HMAC-384Kdf
4,109,271 UART: [kat] LMS
5,182,419 UART: [kat] --
5,184,717 UART: [cold-reset] ++
5,185,862 UART: [fht] FHT @ 0x50003400
5,196,401 UART: [idev] ++
5,197,098 UART: [idev] CDI.KEYID = 6
5,198,337 UART: [idev] SUBJECT.KEYID = 7
5,199,787 UART: [idev] UDS.KEYID = 0
5,200,971 ready_for_fw is high
5,201,203 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,341,119 UART: [idev] Erasing UDS.KEYID = 0
8,492,737 UART: [idev] Sha1 KeyId Algorithm
8,515,787 UART: [idev] --
8,518,939 UART: [ldev] ++
8,519,511 UART: [ldev] CDI.KEYID = 6
8,520,740 UART: [ldev] SUBJECT.KEYID = 5
8,522,218 UART: [ldev] AUTHORITY.KEYID = 7
8,523,690 UART: [ldev] FE.KEYID = 1
8,534,327 UART: [ldev] Erasing FE.KEYID = 1
11,823,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,417 UART: [ldev] --
14,192,635 UART: [fwproc] Wait for Commands...
14,194,735 UART: [fwproc] Recv command 0x46574c44
14,197,040 UART: [fwproc] Recv'd Img size: 111324 bytes
18,235,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,311,646 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,371,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,688,495 >>> mbox cmd response: success
18,691,922 UART: [afmc] ++
18,692,529 UART: [afmc] CDI.KEYID = 6
18,693,715 UART: [afmc] SUBJECT.KEYID = 7
18,694,865 UART: [afmc] AUTHORITY.KEYID = 5
22,010,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,303,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,153 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,322,376 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,338,477 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,354,309 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,376,887 UART: [afmc] --
26,437,231 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,602,851 UART: [cold-reset] --
26,603,786 UART: [state] Locking Datavault
26,604,905 UART: [state] Locking PCR0, PCR1 and PCR31
26,606,448 UART: [state] Locking ICCM
26,607,363 UART: [exit] Launching FMC @ 0x40000000
26,608,830 UART:
26,608,996 UART: Running Caliptra FMC ...
26,610,031 UART:
26,610,180 UART: [fmc] Received command: 0x46574C44
26,611,694 UART:
26,611,852 UART: Running Caliptra ROM ...
26,612,982 UART:
26,613,133 UART: [state] CFI Enabled
26,620,176 UART: [state] LifecycleState = Unprovisioned
26,621,999 UART: [state] DebugLocked = No
26,623,992 UART: [state] WD Timer not started. Device not locked for debugging
26,628,636 UART: [kat] SHA2-256
26,810,599 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,822,171 UART: [kat] ++
26,822,622 UART: [kat] sha1
26,833,129 UART: [kat] SHA2-256
26,836,190 UART: [kat] SHA2-384
26,841,583 UART: [kat] SHA2-512-ACC
26,844,162 UART: [kat] ECC-384
30,100,038 UART: [kat] HMAC-384Kdf
30,112,382 UART: [kat] LMS
31,185,474 UART: [kat] --
31,189,973 UART: [update-reset] ++
35,501,437 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,505,247 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,946,787 >>> mbox cmd response: success
35,948,535 UART: [update-reset] Copying MAN_2 To MAN_1
35,971,398 UART: [update-reset Success] --
35,978,898 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,136,283 UART: [state] Locking Datavault
36,137,513 UART: [state] Locking PCR0, PCR1 and PCR31
36,139,059 UART: [state] Locking ICCM
36,139,969 UART: [exit] Launching FMC @ 0x40000000
36,141,415 UART:
36,141,581 UART: Running Caliptra FMC ...
36,142,668 UART:
36,142,813 UART: [fmc] Received command: 0x1000000E
36,920,696 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
5,101,837 ready_for_fw is high
5,102,352 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,487,927 >>> mbox cmd response: success
26,168,421 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,334,184 UART:
26,334,613 UART: Running Caliptra FMC ...
26,335,737 UART:
26,335,891 UART: [fmc] Received command: 0x46574C44
35,570,439 >>> mbox cmd response: success
35,598,440 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,755,845 UART:
35,756,163 UART: Running Caliptra FMC ...
35,757,263 UART:
35,757,430 UART: [fmc] Received command: 0x1000000E
36,540,280 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,242 UART:
192,642 UART: Running Caliptra ROM ...
193,975 UART:
194,134 UART: [state] CFI Enabled
266,189 UART: [state] LifecycleState = Unprovisioned
268,109 UART: [state] DebugLocked = No
269,306 UART: [state] WD Timer not started. Device not locked for debugging
272,858 UART: [kat] SHA2-256
452,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,697 UART: [kat] ++
464,200 UART: [kat] sha1
475,358 UART: [kat] SHA2-256
478,377 UART: [kat] SHA2-384
484,444 UART: [kat] SHA2-512-ACC
487,381 UART: [kat] ECC-384
2,947,834 UART: [kat] HMAC-384Kdf
2,971,914 UART: [kat] LMS
3,501,354 UART: [kat] --
3,506,189 UART: [cold-reset] ++
3,508,429 UART: [fht] FHT @ 0x50003400
3,519,208 UART: [idev] ++
3,519,778 UART: [idev] CDI.KEYID = 6
3,520,754 UART: [idev] SUBJECT.KEYID = 7
3,521,934 UART: [idev] UDS.KEYID = 0
3,522,853 ready_for_fw is high
3,523,064 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,663,455 UART: [idev] Erasing UDS.KEYID = 0
6,027,634 UART: [idev] Sha1 KeyId Algorithm
6,051,033 UART: [idev] --
6,055,466 UART: [ldev] ++
6,056,041 UART: [ldev] CDI.KEYID = 6
6,056,974 UART: [ldev] SUBJECT.KEYID = 5
6,058,142 UART: [ldev] AUTHORITY.KEYID = 7
6,059,376 UART: [ldev] FE.KEYID = 1
6,100,634 UART: [ldev] Erasing FE.KEYID = 1
8,605,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,326 UART: [ldev] --
10,413,001 UART: [fwproc] Wait for Commands...
10,415,370 UART: [fwproc] Recv command 0x46574c44
10,417,467 UART: [fwproc] Recv'd Img size: 111668 bytes
13,790,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,535 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,239,308 >>> mbox cmd response: success
14,243,568 UART: [afmc] ++
14,244,185 UART: [afmc] CDI.KEYID = 6
14,245,100 UART: [afmc] SUBJECT.KEYID = 7
14,246,271 UART: [afmc] AUTHORITY.KEYID = 5
16,787,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,581 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,526,627 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,542,711 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,558,392 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,581,767 UART: [afmc] --
20,656,987 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,822,719 UART: [cold-reset] --
20,823,682 UART: [state] Locking Datavault
20,824,809 UART: [state] Locking PCR0, PCR1 and PCR31
20,826,359 UART: [state] Locking ICCM
20,827,246 UART: [exit] Launching FMC @ 0x40000000
20,828,674 UART:
20,828,835 UART: Running Caliptra FMC ...
20,829,935 UART:
20,830,092 UART: [fmc] Received command: 0x46574C44
20,831,470 UART:
20,831,615 UART: Running Caliptra ROM ...
20,832,715 UART:
20,832,869 UART: [state] CFI Enabled
20,896,107 UART: [state] LifecycleState = Unprovisioned
20,897,994 UART: [state] DebugLocked = No
20,899,486 UART: [state] WD Timer not started. Device not locked for debugging
20,902,973 UART: [kat] SHA2-256
21,082,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,093,708 UART: [kat] ++
21,094,252 UART: [kat] sha1
21,106,006 UART: [kat] SHA2-256
21,109,023 UART: [kat] SHA2-384
21,116,479 UART: [kat] SHA2-512-ACC
21,119,420 UART: [kat] ECC-384
23,577,041 UART: [kat] HMAC-384Kdf
23,599,537 UART: [kat] LMS
24,128,998 UART: [kat] --
24,133,142 UART: [update-reset] ++
27,770,765 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,774,325 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,215,923 >>> mbox cmd response: success
28,217,400 UART: [update-reset] Copying MAN_2 To MAN_1
28,239,728 UART: [update-reset Success] --
28,246,474 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,403,849 UART: [state] Locking Datavault
28,405,084 UART: [state] Locking PCR0, PCR1 and PCR31
28,406,645 UART: [state] Locking ICCM
28,407,565 UART: [exit] Launching FMC @ 0x40000000
28,408,992 UART:
28,409,154 UART: Running Caliptra FMC ...
28,410,250 UART:
28,410,403 UART: [fmc] Received command: 0x1000000E
29,188,300 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,362,448 ready_for_fw is high
3,362,843 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,003,431 >>> mbox cmd response: success
20,345,231 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,510,952 UART:
20,511,391 UART: Running Caliptra FMC ...
20,512,579 UART:
20,512,744 UART: [fmc] Received command: 0x46574C44
27,764,974 >>> mbox cmd response: success
27,791,882 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,949,276 UART:
27,949,619 UART: Running Caliptra FMC ...
27,950,701 UART:
27,950,876 UART: [fmc] Received command: 0x1000000E
28,733,703 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,383 UART:
192,774 UART: Running Caliptra ROM ...
193,885 UART:
603,472 UART: [state] CFI Enabled
616,281 UART: [state] LifecycleState = Unprovisioned
618,154 UART: [state] DebugLocked = No
619,742 UART: [state] WD Timer not started. Device not locked for debugging
624,220 UART: [kat] SHA2-256
803,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,937 UART: [kat] ++
815,385 UART: [kat] sha1
826,470 UART: [kat] SHA2-256
829,477 UART: [kat] SHA2-384
836,247 UART: [kat] SHA2-512-ACC
839,251 UART: [kat] ECC-384
3,278,950 UART: [kat] HMAC-384Kdf
3,292,098 UART: [kat] LMS
3,821,638 UART: [kat] --
3,826,477 UART: [cold-reset] ++
3,828,685 UART: [fht] FHT @ 0x50003400
3,840,159 UART: [idev] ++
3,840,717 UART: [idev] CDI.KEYID = 6
3,841,621 UART: [idev] SUBJECT.KEYID = 7
3,842,863 UART: [idev] UDS.KEYID = 0
3,843,785 ready_for_fw is high
3,843,973 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,984,535 UART: [idev] Erasing UDS.KEYID = 0
6,318,269 UART: [idev] Sha1 KeyId Algorithm
6,341,040 UART: [idev] --
6,345,653 UART: [ldev] ++
6,346,226 UART: [ldev] CDI.KEYID = 6
6,347,194 UART: [ldev] SUBJECT.KEYID = 5
6,348,352 UART: [ldev] AUTHORITY.KEYID = 7
6,349,599 UART: [ldev] FE.KEYID = 1
6,360,675 UART: [ldev] Erasing FE.KEYID = 1
8,831,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,573 UART: [ldev] --
10,619,806 UART: [fwproc] Wait for Commands...
10,622,868 UART: [fwproc] Recv command 0x46574c44
10,624,964 UART: [fwproc] Recv'd Img size: 111668 bytes
13,996,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,072,122 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,132,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,449,613 >>> mbox cmd response: success
14,453,653 UART: [afmc] ++
14,454,284 UART: [afmc] CDI.KEYID = 6
14,455,170 UART: [afmc] SUBJECT.KEYID = 7
14,456,268 UART: [afmc] AUTHORITY.KEYID = 5
16,954,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,673,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,560 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,691,623 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,707,655 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,325 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,746,299 UART: [afmc] --
20,808,171 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,974,044 UART: [cold-reset] --
20,975,000 UART: [state] Locking Datavault
20,976,171 UART: [state] Locking PCR0, PCR1 and PCR31
20,977,716 UART: [state] Locking ICCM
20,978,627 UART: [exit] Launching FMC @ 0x40000000
20,980,049 UART:
20,980,216 UART: Running Caliptra FMC ...
20,981,314 UART:
20,981,467 UART: [fmc] Received command: 0x46574C44
20,982,928 UART:
20,983,083 UART: Running Caliptra ROM ...
20,984,179 UART:
20,984,330 UART: [state] CFI Enabled
20,991,890 UART: [state] LifecycleState = Unprovisioned
20,993,714 UART: [state] DebugLocked = No
20,996,675 UART: [state] WD Timer not started. Device not locked for debugging
21,000,999 UART: [kat] SHA2-256
21,180,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,191,765 UART: [kat] ++
21,192,297 UART: [kat] sha1
21,204,212 UART: [kat] SHA2-256
21,207,231 UART: [kat] SHA2-384
21,212,716 UART: [kat] SHA2-512-ACC
21,215,632 UART: [kat] ECC-384
23,656,028 UART: [kat] HMAC-384Kdf
23,669,126 UART: [kat] LMS
24,198,637 UART: [kat] --
24,204,515 UART: [update-reset] ++
27,838,557 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,842,037 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,283,577 >>> mbox cmd response: success
28,284,353 UART: [update-reset] Copying MAN_2 To MAN_1
28,306,696 UART: [update-reset Success] --
28,313,786 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,471,100 UART: [state] Locking Datavault
28,472,328 UART: [state] Locking PCR0, PCR1 and PCR31
28,473,876 UART: [state] Locking ICCM
28,474,792 UART: [exit] Launching FMC @ 0x40000000
28,476,216 UART:
28,476,377 UART: Running Caliptra FMC ...
28,477,474 UART:
28,477,628 UART: [fmc] Received command: 0x1000000E
29,255,505 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,695,970 ready_for_fw is high
3,696,361 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,219,241 >>> mbox cmd response: success
20,514,155 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,679,884 UART:
20,680,314 UART: Running Caliptra FMC ...
20,681,392 UART:
20,681,555 UART: [fmc] Received command: 0x46574C44
27,852,374 >>> mbox cmd response: success
27,879,174 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,036,564 UART:
28,036,906 UART: Running Caliptra FMC ...
28,038,080 UART:
28,038,254 UART: [fmc] Received command: 0x1000000E
28,821,000 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,175 UART:
192,543 UART: Running Caliptra ROM ...
193,734 UART:
193,891 UART: [state] CFI Enabled
265,836 UART: [state] LifecycleState = Unprovisioned
267,691 UART: [state] DebugLocked = No
269,801 UART: [state] WD Timer not started. Device not locked for debugging
273,676 UART: [kat] SHA2-256
452,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,331 UART: [kat] ++
464,867 UART: [kat] sha1
474,684 UART: [kat] SHA2-256
477,691 UART: [kat] SHA2-384
483,543 UART: [kat] SHA2-512-ACC
486,482 UART: [kat] ECC-384
2,946,636 UART: [kat] HMAC-384Kdf
2,971,400 UART: [kat] LMS
3,500,828 UART: [kat] --
3,505,537 UART: [cold-reset] ++
3,506,475 UART: [fht] FHT @ 0x50003400
3,517,941 UART: [idev] ++
3,518,531 UART: [idev] CDI.KEYID = 6
3,519,443 UART: [idev] SUBJECT.KEYID = 7
3,520,622 UART: [idev] UDS.KEYID = 0
3,521,562 ready_for_fw is high
3,521,742 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,662,588 UART: [idev] Erasing UDS.KEYID = 0
6,025,331 UART: [idev] Sha1 KeyId Algorithm
6,047,174 UART: [idev] --
6,052,255 UART: [ldev] ++
6,052,834 UART: [ldev] CDI.KEYID = 6
6,053,745 UART: [ldev] SUBJECT.KEYID = 5
6,055,103 UART: [ldev] AUTHORITY.KEYID = 7
6,056,324 UART: [ldev] FE.KEYID = 1
6,099,926 UART: [ldev] Erasing FE.KEYID = 1
8,600,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,309 UART: [ldev] --
10,411,374 UART: [fwproc] Wait for Commands...
10,413,255 UART: [fwproc] Recv command 0x46574c44
10,415,350 UART: [fwproc] Recv'd Img size: 111668 bytes
13,779,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,853,645 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,913,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,231,227 >>> mbox cmd response: success
14,235,984 UART: [afmc] ++
14,236,602 UART: [afmc] CDI.KEYID = 6
14,237,523 UART: [afmc] SUBJECT.KEYID = 7
14,238,627 UART: [afmc] AUTHORITY.KEYID = 5
16,761,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,361 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,505,413 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,521,496 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,537,177 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,560,182 UART: [afmc] --
20,628,594 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,794,430 UART: [cold-reset] --
20,795,360 UART: [state] Locking Datavault
20,796,470 UART: [state] Locking PCR0, PCR1 and PCR31
20,798,043 UART: [state] Locking ICCM
20,798,964 UART: [exit] Launching FMC @ 0x40000000
20,800,393 UART:
20,800,574 UART: Running Caliptra FMC ...
20,801,683 UART:
20,801,842 UART: [fmc] Received command: 0x46574C44
20,803,315 UART:
20,803,471 UART: Running Caliptra ROM ...
20,804,483 UART:
20,804,630 UART: [state] CFI Enabled
20,872,000 UART: [state] LifecycleState = Unprovisioned
20,873,876 UART: [state] DebugLocked = No
20,876,748 UART: [state] WD Timer not started. Device not locked for debugging
20,880,433 UART: [kat] SHA2-256
21,059,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,071,096 UART: [kat] ++
21,071,577 UART: [kat] sha1
21,083,819 UART: [kat] SHA2-256
21,086,840 UART: [kat] SHA2-384
21,093,912 UART: [kat] SHA2-512-ACC
21,096,904 UART: [kat] ECC-384
23,552,401 UART: [kat] HMAC-384Kdf
23,573,659 UART: [kat] LMS
24,103,082 UART: [kat] --
24,108,476 UART: [update-reset] ++
27,743,021 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,745,873 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,187,446 >>> mbox cmd response: success
28,188,171 UART: [update-reset] Copying MAN_2 To MAN_1
28,210,508 UART: [update-reset Success] --
28,217,581 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,374,952 UART: [state] Locking Datavault
28,376,179 UART: [state] Locking PCR0, PCR1 and PCR31
28,377,646 UART: [state] Locking ICCM
28,378,560 UART: [exit] Launching FMC @ 0x40000000
28,379,993 UART:
28,380,151 UART: Running Caliptra FMC ...
28,381,165 UART:
28,381,309 UART: [fmc] Received command: 0x1000000E
29,159,379 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,386,123 ready_for_fw is high
3,386,535 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,024,920 >>> mbox cmd response: success
20,372,059 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,537,770 UART:
20,538,204 UART: Running Caliptra FMC ...
20,539,292 UART:
20,539,449 UART: [fmc] Received command: 0x46574C44
27,780,328 >>> mbox cmd response: success
27,807,737 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,965,131 UART:
27,965,456 UART: Running Caliptra FMC ...
27,966,534 UART:
27,966,714 UART: [fmc] Received command: 0x1000000E
28,749,574 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,407 UART:
192,777 UART: Running Caliptra ROM ...
193,871 UART:
603,323 UART: [state] CFI Enabled
618,506 UART: [state] LifecycleState = Unprovisioned
620,428 UART: [state] DebugLocked = No
622,732 UART: [state] WD Timer not started. Device not locked for debugging
627,056 UART: [kat] SHA2-256
806,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,734 UART: [kat] ++
818,260 UART: [kat] sha1
829,136 UART: [kat] SHA2-256
832,213 UART: [kat] SHA2-384
838,623 UART: [kat] SHA2-512-ACC
841,557 UART: [kat] ECC-384
3,284,712 UART: [kat] HMAC-384Kdf
3,297,302 UART: [kat] LMS
3,826,779 UART: [kat] --
3,830,153 UART: [cold-reset] ++
3,831,374 UART: [fht] FHT @ 0x50003400
3,842,152 UART: [idev] ++
3,842,714 UART: [idev] CDI.KEYID = 6
3,843,710 UART: [idev] SUBJECT.KEYID = 7
3,844,886 UART: [idev] UDS.KEYID = 0
3,845,783 ready_for_fw is high
3,845,972 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,986,281 UART: [idev] Erasing UDS.KEYID = 0
6,316,209 UART: [idev] Sha1 KeyId Algorithm
6,337,923 UART: [idev] --
6,341,369 UART: [ldev] ++
6,341,938 UART: [ldev] CDI.KEYID = 6
6,342,845 UART: [ldev] SUBJECT.KEYID = 5
6,344,054 UART: [ldev] AUTHORITY.KEYID = 7
6,345,284 UART: [ldev] FE.KEYID = 1
6,355,494 UART: [ldev] Erasing FE.KEYID = 1
8,827,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,824 UART: [ldev] --
10,614,526 UART: [fwproc] Wait for Commands...
10,616,301 UART: [fwproc] Recv command 0x46574c44
10,618,404 UART: [fwproc] Recv'd Img size: 111668 bytes
13,991,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,066,634 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,964 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,444,777 >>> mbox cmd response: success
14,449,929 UART: [afmc] ++
14,450,559 UART: [afmc] CDI.KEYID = 6
14,451,478 UART: [afmc] SUBJECT.KEYID = 7
14,452,519 UART: [afmc] AUTHORITY.KEYID = 5
16,950,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,669,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,671,379 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,687,428 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,703,455 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,719,129 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,742,878 UART: [afmc] --
20,806,841 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,972,531 UART: [cold-reset] --
20,973,535 UART: [state] Locking Datavault
20,974,635 UART: [state] Locking PCR0, PCR1 and PCR31
20,976,189 UART: [state] Locking ICCM
20,977,117 UART: [exit] Launching FMC @ 0x40000000
20,978,547 UART:
20,978,709 UART: Running Caliptra FMC ...
20,979,806 UART:
20,979,960 UART: [fmc] Received command: 0x46574C44
20,981,422 UART:
20,981,574 UART: Running Caliptra ROM ...
20,982,586 UART:
20,982,729 UART: [state] CFI Enabled
20,986,430 UART: [state] LifecycleState = Unprovisioned
20,988,252 UART: [state] DebugLocked = No
20,990,281 UART: [state] WD Timer not started. Device not locked for debugging
20,994,230 UART: [kat] SHA2-256
21,173,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,184,987 UART: [kat] ++
21,185,526 UART: [kat] sha1
21,196,632 UART: [kat] SHA2-256
21,199,641 UART: [kat] SHA2-384
21,205,677 UART: [kat] SHA2-512-ACC
21,208,614 UART: [kat] ECC-384
23,648,078 UART: [kat] HMAC-384Kdf
23,660,959 UART: [kat] LMS
24,190,468 UART: [kat] --
24,195,393 UART: [update-reset] ++
27,825,937 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,829,046 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,270,574 >>> mbox cmd response: success
28,271,566 UART: [update-reset] Copying MAN_2 To MAN_1
28,293,901 UART: [update-reset Success] --
28,300,924 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,458,249 UART: [state] Locking Datavault
28,459,470 UART: [state] Locking PCR0, PCR1 and PCR31
28,460,937 UART: [state] Locking ICCM
28,461,811 UART: [exit] Launching FMC @ 0x40000000
28,463,241 UART:
28,463,402 UART: Running Caliptra FMC ...
28,464,501 UART:
28,464,655 UART: [fmc] Received command: 0x1000000E
29,242,696 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,701,674 ready_for_fw is high
3,702,058 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,224,432 >>> mbox cmd response: success
20,510,910 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,676,559 UART:
20,676,985 UART: Running Caliptra FMC ...
20,678,160 UART:
20,678,326 UART: [fmc] Received command: 0x46574C44
27,845,738 >>> mbox cmd response: success
27,873,430 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,030,885 UART:
28,031,244 UART: Running Caliptra FMC ...
28,032,427 UART:
28,032,602 UART: [fmc] Received command: 0x1000000E
28,815,272 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,594 UART: [state] LifecycleState = Unprovisioned
85,249 UART: [state] DebugLocked = No
85,957 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
890,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,853 UART: [kat] ++
895,005 UART: [kat] sha1
899,393 UART: [kat] SHA2-256
901,333 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 ready_for_fw is high
1,174,683 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,533 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,392 UART: [ldev] ++
1,209,560 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,351 UART: [ldev] AUTHORITY.KEYID = 7
1,210,814 UART: [ldev] FE.KEYID = 1
1,216,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,472 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,588 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,733 >>> mbox cmd response: success
2,739,880 UART: [afmc] ++
2,740,048 UART: [afmc] CDI.KEYID = 6
2,740,411 UART: [afmc] SUBJECT.KEYID = 7
2,740,837 UART: [afmc] AUTHORITY.KEYID = 5
2,776,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,267 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,963 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,862 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,555 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,427 UART: [afmc] --
2,819,449 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,819,471 UART: [cold-reset] --
2,820,157 UART: [state] Locking Datavault
2,821,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,764 UART: [state] Locking ICCM
2,822,244 UART: [exit] Launching FMC @ 0x40000000
2,827,541 UART:
2,827,557 UART: Running Caliptra FMC ...
2,827,965 UART:
2,828,195 UART: [fmc] Received command: 0x46574C44
2,829,021 UART:
2,829,037 UART: Running Caliptra ROM ...
2,829,445 UART:
2,829,500 UART: [state] CFI Enabled
2,832,458 UART: [state] LifecycleState = Unprovisioned
2,833,113 UART: [state] DebugLocked = No
2,833,607 UART: [state] WD Timer not started. Device not locked for debugging
2,834,795 UART: [kat] SHA2-256
3,638,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,474 UART: [kat] ++
3,642,626 UART: [kat] sha1
3,646,626 UART: [kat] SHA2-256
3,648,566 UART: [kat] SHA2-384
3,651,343 UART: [kat] SHA2-512-ACC
3,653,243 UART: [kat] ECC-384
3,662,868 UART: [kat] HMAC-384Kdf
3,667,696 UART: [kat] LMS
3,916,008 UART: [kat] --
3,916,874 UART: [update-reset] ++
5,420,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,421,242 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,598,016 >>> mbox cmd response: success
5,598,321 UART: [update-reset] Copying MAN_2 To MAN_1
5,606,335 UART: [update-reset Success] --
5,606,744 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,607,062 UART: [state] Locking Datavault
5,607,884 UART: [state] Locking PCR0, PCR1 and PCR31
5,608,488 UART: [state] Locking ICCM
5,609,134 UART: [exit] Launching FMC @ 0x40000000
5,614,431 UART:
5,614,447 UART: Running Caliptra FMC ...
5,614,855 UART:
5,615,077 UART: [fmc] Received command: 0x1000000E
5,960,131 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,678 ready_for_fw is high
1,055,678 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,487 >>> mbox cmd response: success
2,643,522 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,649,253 UART:
2,649,269 UART: Running Caliptra FMC ...
2,649,677 UART:
2,649,907 UART: [fmc] Received command: 0x46574C44
5,302,573 >>> mbox cmd response: success
5,310,119 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,315,833 UART:
5,315,849 UART: Running Caliptra FMC ...
5,316,257 UART:
5,316,479 UART: [fmc] Received command: 0x1000000E
5,661,533 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,172,938 UART: [idev] ++
1,173,106 UART: [idev] CDI.KEYID = 6
1,173,467 UART: [idev] SUBJECT.KEYID = 7
1,173,892 UART: [idev] UDS.KEYID = 0
1,174,238 ready_for_fw is high
1,174,238 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,334 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,459 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,487 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,748 >>> mbox cmd response: success
2,740,931 UART: [afmc] ++
2,741,099 UART: [afmc] CDI.KEYID = 6
2,741,462 UART: [afmc] SUBJECT.KEYID = 7
2,741,888 UART: [afmc] AUTHORITY.KEYID = 5
2,777,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,012 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,708 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,607 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,300 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,192 UART: [afmc] --
2,821,216 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,238 UART: [cold-reset] --
2,822,262 UART: [state] Locking Datavault
2,823,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,975 UART: [state] Locking ICCM
2,824,509 UART: [exit] Launching FMC @ 0x40000000
2,829,806 UART:
2,829,822 UART: Running Caliptra FMC ...
2,830,230 UART:
2,830,460 UART: [fmc] Received command: 0x46574C44
2,831,286 UART:
2,831,302 UART: Running Caliptra ROM ...
2,831,710 UART:
2,831,852 UART: [state] CFI Enabled
2,834,354 UART: [state] LifecycleState = Unprovisioned
2,835,009 UART: [state] DebugLocked = No
2,835,551 UART: [state] WD Timer not started. Device not locked for debugging
2,836,899 UART: [kat] SHA2-256
3,640,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,578 UART: [kat] ++
3,644,730 UART: [kat] sha1
3,648,878 UART: [kat] SHA2-256
3,650,818 UART: [kat] SHA2-384
3,653,507 UART: [kat] SHA2-512-ACC
3,655,407 UART: [kat] ECC-384
3,664,940 UART: [kat] HMAC-384Kdf
3,669,562 UART: [kat] LMS
3,917,874 UART: [kat] --
3,918,726 UART: [update-reset] ++
5,422,432 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,501 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,275 >>> mbox cmd response: success
5,600,432 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,446 UART: [update-reset Success] --
5,608,855 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,631 UART: [state] Locking Datavault
5,610,265 UART: [state] Locking PCR0, PCR1 and PCR31
5,610,869 UART: [state] Locking ICCM
5,611,333 UART: [exit] Launching FMC @ 0x40000000
5,616,630 UART:
5,616,646 UART: Running Caliptra FMC ...
5,617,054 UART:
5,617,276 UART: [fmc] Received command: 0x1000000E
5,962,330 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,771 ready_for_fw is high
1,056,771 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,439 >>> mbox cmd response: success
2,643,724 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,650,191 UART:
2,650,207 UART: Running Caliptra FMC ...
2,650,615 UART:
2,650,845 UART: [fmc] Received command: 0x46574C44
5,302,826 >>> mbox cmd response: success
5,310,550 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,316,580 UART:
5,316,596 UART: Running Caliptra FMC ...
5,317,004 UART:
5,317,226 UART: [fmc] Received command: 0x1000000E
5,662,280 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 ready_for_fw is high
1,174,329 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,277 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,798 UART: [ldev] Erasing FE.KEYID = 1
1,242,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,044 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,388 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,599 >>> mbox cmd response: success
2,738,848 UART: [afmc] ++
2,739,016 UART: [afmc] CDI.KEYID = 6
2,739,379 UART: [afmc] SUBJECT.KEYID = 7
2,739,805 UART: [afmc] AUTHORITY.KEYID = 5
2,774,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,165 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,861 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,760 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,453 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,407 UART: [afmc] --
2,818,289 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,818,311 UART: [cold-reset] --
2,819,249 UART: [state] Locking Datavault
2,820,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,064 UART: [state] Locking ICCM
2,821,702 UART: [exit] Launching FMC @ 0x40000000
2,826,999 UART:
2,827,015 UART: Running Caliptra FMC ...
2,827,423 UART:
2,827,653 UART: [fmc] Received command: 0x46574C44
2,828,479 UART:
2,828,495 UART: Running Caliptra ROM ...
2,828,903 UART:
2,828,958 UART: [state] CFI Enabled
2,831,642 UART: [state] LifecycleState = Unprovisioned
2,832,297 UART: [state] DebugLocked = No
2,832,855 UART: [state] WD Timer not started. Device not locked for debugging
2,834,195 UART: [kat] SHA2-256
3,637,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,874 UART: [kat] ++
3,642,026 UART: [kat] sha1
3,646,166 UART: [kat] SHA2-256
3,648,106 UART: [kat] SHA2-384
3,650,799 UART: [kat] SHA2-512-ACC
3,652,699 UART: [kat] ECC-384
3,662,478 UART: [kat] HMAC-384Kdf
3,667,162 UART: [kat] LMS
3,915,474 UART: [kat] --
3,916,408 UART: [update-reset] ++
5,420,905 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,421,954 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,598,728 >>> mbox cmd response: success
5,598,849 UART: [update-reset] Copying MAN_2 To MAN_1
5,606,863 UART: [update-reset Success] --
5,607,272 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,607,886 UART: [state] Locking Datavault
5,608,718 UART: [state] Locking PCR0, PCR1 and PCR31
5,609,322 UART: [state] Locking ICCM
5,609,888 UART: [exit] Launching FMC @ 0x40000000
5,615,185 UART:
5,615,201 UART: Running Caliptra FMC ...
5,615,609 UART:
5,615,831 UART: [fmc] Received command: 0x1000000E
5,960,885 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,144 ready_for_fw is high
1,056,144 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,657 >>> mbox cmd response: success
2,642,516 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,648,423 UART:
2,648,439 UART: Running Caliptra FMC ...
2,648,847 UART:
2,649,077 UART: [fmc] Received command: 0x46574C44
5,299,705 >>> mbox cmd response: success
5,307,201 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,313,079 UART:
5,313,095 UART: Running Caliptra FMC ...
5,313,503 UART:
5,313,725 UART: [fmc] Received command: 0x1000000E
5,658,779 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,174,316 ready_for_fw is high
1,174,316 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,568 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,111 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,801 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,755 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,810 >>> mbox cmd response: success
2,740,985 UART: [afmc] ++
2,741,153 UART: [afmc] CDI.KEYID = 6
2,741,516 UART: [afmc] SUBJECT.KEYID = 7
2,741,942 UART: [afmc] AUTHORITY.KEYID = 5
2,777,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,242 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,938 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,837 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,530 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,486 UART: [afmc] --
2,820,408 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,430 UART: [cold-reset] --
2,821,328 UART: [state] Locking Datavault
2,822,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,157 UART: [state] Locking ICCM
2,823,739 UART: [exit] Launching FMC @ 0x40000000
2,829,036 UART:
2,829,052 UART: Running Caliptra FMC ...
2,829,460 UART:
2,829,690 UART: [fmc] Received command: 0x46574C44
2,830,516 UART:
2,830,532 UART: Running Caliptra ROM ...
2,830,940 UART:
2,831,082 UART: [state] CFI Enabled
2,833,918 UART: [state] LifecycleState = Unprovisioned
2,834,573 UART: [state] DebugLocked = No
2,835,233 UART: [state] WD Timer not started. Device not locked for debugging
2,836,443 UART: [kat] SHA2-256
3,639,993 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,122 UART: [kat] ++
3,644,274 UART: [kat] sha1
3,648,716 UART: [kat] SHA2-256
3,650,656 UART: [kat] SHA2-384
3,653,577 UART: [kat] SHA2-512-ACC
3,655,477 UART: [kat] ECC-384
3,665,300 UART: [kat] HMAC-384Kdf
3,669,852 UART: [kat] LMS
3,918,164 UART: [kat] --
3,918,748 UART: [update-reset] ++
5,422,337 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,478 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,252 >>> mbox cmd response: success
5,600,541 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,555 UART: [update-reset Success] --
5,608,964 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,652 UART: [state] Locking Datavault
5,610,616 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,220 UART: [state] Locking ICCM
5,611,744 UART: [exit] Launching FMC @ 0x40000000
5,617,041 UART:
5,617,057 UART: Running Caliptra FMC ...
5,617,465 UART:
5,617,687 UART: [fmc] Received command: 0x1000000E
5,962,741 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,697 ready_for_fw is high
1,056,697 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,832 >>> mbox cmd response: success
2,645,157 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,628 UART:
2,651,644 UART: Running Caliptra FMC ...
2,652,052 UART:
2,652,282 UART: [fmc] Received command: 0x46574C44
5,304,597 >>> mbox cmd response: success
5,312,091 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,877 UART:
5,317,893 UART: Running Caliptra FMC ...
5,318,301 UART:
5,318,523 UART: [fmc] Received command: 0x1000000E
5,663,577 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,201 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 ready_for_fw is high
1,174,101 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,271 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,358 UART: [ldev] ++
1,208,526 UART: [ldev] CDI.KEYID = 6
1,208,890 UART: [ldev] SUBJECT.KEYID = 5
1,209,317 UART: [ldev] AUTHORITY.KEYID = 7
1,209,780 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,172 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,405 >>> mbox cmd response: success
2,739,494 UART: [afmc] ++
2,739,662 UART: [afmc] CDI.KEYID = 6
2,740,025 UART: [afmc] SUBJECT.KEYID = 7
2,740,451 UART: [afmc] AUTHORITY.KEYID = 5
2,776,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,443 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,139 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,038 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,731 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,741 UART: [afmc] --
2,819,741 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,819,763 UART: [cold-reset] --
2,820,645 UART: [state] Locking Datavault
2,821,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,370 UART: [state] Locking ICCM
2,822,866 UART: [exit] Launching FMC @ 0x40000000
2,828,163 UART:
2,828,179 UART: Running Caliptra FMC ...
2,828,587 UART:
2,828,817 UART: [fmc] Received command: 0x46574C44
2,829,643 UART:
2,829,659 UART: Running Caliptra ROM ...
2,830,067 UART:
2,830,122 UART: [state] CFI Enabled
2,833,158 UART: [state] LifecycleState = Unprovisioned
2,833,813 UART: [state] DebugLocked = No
2,834,463 UART: [state] WD Timer not started. Device not locked for debugging
2,835,735 UART: [kat] SHA2-256
3,639,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,414 UART: [kat] ++
3,643,566 UART: [kat] sha1
3,647,882 UART: [kat] SHA2-256
3,649,822 UART: [kat] SHA2-384
3,652,453 UART: [kat] SHA2-512-ACC
3,654,353 UART: [kat] ECC-384
3,663,898 UART: [kat] HMAC-384Kdf
3,668,414 UART: [kat] LMS
3,916,726 UART: [kat] --
3,917,622 UART: [update-reset] ++
5,422,567 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,734 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,508 >>> mbox cmd response: success
5,600,663 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,677 UART: [update-reset Success] --
5,609,086 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,672 UART: [state] Locking Datavault
5,610,536 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,140 UART: [state] Locking ICCM
5,611,638 UART: [exit] Launching FMC @ 0x40000000
5,616,935 UART:
5,616,951 UART: Running Caliptra FMC ...
5,617,359 UART:
5,617,581 UART: [fmc] Received command: 0x1000000E
5,962,635 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,730 ready_for_fw is high
1,055,730 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,359 >>> mbox cmd response: success
2,642,222 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,648,467 UART:
2,648,483 UART: Running Caliptra FMC ...
2,648,891 UART:
2,649,121 UART: [fmc] Received command: 0x46574C44
5,301,405 >>> mbox cmd response: success
5,309,119 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,314,853 UART:
5,314,869 UART: Running Caliptra FMC ...
5,315,277 UART:
5,315,499 UART: [fmc] Received command: 0x1000000E
5,660,553 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,666 UART: [cold-reset] ++
1,170,124 UART: [fht] FHT @ 0x50003400
1,172,782 UART: [idev] ++
1,172,950 UART: [idev] CDI.KEYID = 6
1,173,311 UART: [idev] SUBJECT.KEYID = 7
1,173,736 UART: [idev] UDS.KEYID = 0
1,174,082 ready_for_fw is high
1,174,082 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,826 UART: [idev] Erasing UDS.KEYID = 0
1,198,990 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,630 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,307 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,488 >>> mbox cmd response: success
2,739,751 UART: [afmc] ++
2,739,919 UART: [afmc] CDI.KEYID = 6
2,740,282 UART: [afmc] SUBJECT.KEYID = 7
2,740,708 UART: [afmc] AUTHORITY.KEYID = 5
2,776,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,436 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,132 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,031 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,724 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,752 UART: [afmc] --
2,819,776 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,819,798 UART: [cold-reset] --
2,820,520 UART: [state] Locking Datavault
2,821,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,279 UART: [state] Locking ICCM
2,822,767 UART: [exit] Launching FMC @ 0x40000000
2,828,064 UART:
2,828,080 UART: Running Caliptra FMC ...
2,828,488 UART:
2,828,718 UART: [fmc] Received command: 0x46574C44
2,829,544 UART:
2,829,560 UART: Running Caliptra ROM ...
2,829,968 UART:
2,830,110 UART: [state] CFI Enabled
2,832,624 UART: [state] LifecycleState = Unprovisioned
2,833,279 UART: [state] DebugLocked = No
2,833,891 UART: [state] WD Timer not started. Device not locked for debugging
2,835,031 UART: [kat] SHA2-256
3,638,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,710 UART: [kat] ++
3,642,862 UART: [kat] sha1
3,646,924 UART: [kat] SHA2-256
3,648,864 UART: [kat] SHA2-384
3,651,653 UART: [kat] SHA2-512-ACC
3,653,553 UART: [kat] ECC-384
3,663,188 UART: [kat] HMAC-384Kdf
3,667,824 UART: [kat] LMS
3,916,136 UART: [kat] --
3,917,042 UART: [update-reset] ++
5,420,685 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,421,792 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,598,566 >>> mbox cmd response: success
5,598,767 UART: [update-reset] Copying MAN_2 To MAN_1
5,606,781 UART: [update-reset Success] --
5,607,190 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,607,946 UART: [state] Locking Datavault
5,608,724 UART: [state] Locking PCR0, PCR1 and PCR31
5,609,328 UART: [state] Locking ICCM
5,609,986 UART: [exit] Launching FMC @ 0x40000000
5,615,283 UART:
5,615,299 UART: Running Caliptra FMC ...
5,615,707 UART:
5,615,929 UART: [fmc] Received command: 0x1000000E
5,960,983 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,883 ready_for_fw is high
1,056,883 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,618 >>> mbox cmd response: success
2,643,023 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,649,316 UART:
2,649,332 UART: Running Caliptra FMC ...
2,649,740 UART:
2,649,970 UART: [fmc] Received command: 0x46574C44
5,302,987 >>> mbox cmd response: success
5,310,687 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,316,515 UART:
5,316,531 UART: Running Caliptra FMC ...
5,316,939 UART:
5,317,161 UART: [fmc] Received command: 0x1000000E
5,662,215 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,089 UART:
192,461 UART: Running Caliptra ROM ...
193,667 UART:
193,822 UART: [state] CFI Enabled
262,958 UART: [state] LifecycleState = Unprovisioned
265,388 UART: [state] DebugLocked = No
266,783 UART: [state] WD Timer not started. Device not locked for debugging
271,108 UART: [kat] SHA2-256
453,029 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,557 UART: [kat] ++
465,029 UART: [kat] sha1
475,343 UART: [kat] SHA2-256
478,354 UART: [kat] SHA2-384
484,420 UART: [kat] SHA2-512-ACC
487,080 UART: [kat] ECC-384
3,775,802 UART: [kat] HMAC-384Kdf
3,802,209 UART: [kat] LMS
4,875,394 UART: [kat] --
4,880,282 UART: [cold-reset] ++
4,882,972 UART: [fht] FHT @ 0x50003400
4,893,388 UART: [idev] ++
4,894,092 UART: [idev] CDI.KEYID = 6
4,895,262 UART: [idev] SUBJECT.KEYID = 7
4,896,434 UART: [idev] UDS.KEYID = 0
4,897,375 ready_for_fw is high
4,897,592 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,031,266 UART: [idev] Erasing UDS.KEYID = 0
8,241,697 UART: [idev] Sha1 KeyId Algorithm
8,265,147 UART: [idev] --
8,268,705 UART: [ldev] ++
8,269,268 UART: [ldev] CDI.KEYID = 6
8,270,424 UART: [ldev] SUBJECT.KEYID = 5
8,271,631 UART: [ldev] AUTHORITY.KEYID = 7
8,272,778 UART: [ldev] FE.KEYID = 1
8,317,814 UART: [ldev] Erasing FE.KEYID = 1
11,650,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,589 UART: [ldev] --
14,015,486 UART: [fwproc] Wait for Commands...
14,017,744 UART: [fwproc] Recv command 0x46574c44
14,020,002 UART: [fwproc] Recv'd Img size: 106256 bytes
17,991,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,068,807 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,111,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,427,903 >>> mbox cmd response: success
18,431,982 UART: [afmc] ++
18,432,583 UART: [afmc] CDI.KEYID = 6
18,433,734 UART: [afmc] SUBJECT.KEYID = 7
18,434,833 UART: [afmc] AUTHORITY.KEYID = 5
21,802,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,114,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,116,480 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,132,505 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,148,569 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,164,730 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,188,422 UART: [afmc] --
24,191,536 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,192,525 UART: [cold-reset] --
24,195,681 UART: [state] Locking Datavault
24,202,251 UART: [state] Locking PCR0, PCR1 and PCR31
24,203,897 UART: [state] Locking ICCM
24,205,376 UART: [exit] Launching FMC @ 0x40000000
24,213,986 UART:
24,214,231 UART: Running Caliptra FMC ...
24,215,257 UART:
24,215,401 UART: [fmc] Received command: 0x10000004
24,216,854 UART:
24,217,009 UART: Running Caliptra ROM ...
24,218,110 UART:
24,218,264 UART: [state] CFI Enabled
24,219,218 >>> mbox cmd response: success
24,289,425 UART: [state] LifecycleState = Unprovisioned
24,291,304 UART: [state] DebugLocked = No
24,293,525 UART: [state] WD Timer not started. Device not locked for debugging
24,297,966 UART: [kat] SHA2-256
24,479,872 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,491,427 UART: [kat] ++
24,491,880 UART: [kat] sha1
24,500,984 UART: [kat] SHA2-256
24,504,017 UART: [kat] SHA2-384
24,509,572 UART: [kat] SHA2-512-ACC
24,512,199 UART: [kat] ECC-384
27,806,368 UART: [kat] HMAC-384Kdf
27,830,584 UART: [kat] LMS
28,903,737 UART: [kat] --
28,909,460 UART: [update-reset] ++
28,910,602 UART: Failed To Get Mailbox Txn
28,914,306 UART: ROM Non-Fatal Error: 0x01040004
28,916,576 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,916,846 UART: [state] Locking Datavault
28,919,781 UART: [state] Locking PCR0, PCR1 and PCR31
28,921,917 UART: [state] Locking ICCM
28,923,469 UART: [exit] Launching FMC @ 0x40000000
28,932,136 UART:
28,932,368 UART: Running Caliptra FMC ...
28,933,486 UART:
28,933,642 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,935,280 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
4,779,416 ready_for_fw is high
4,779,936 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,224,130 >>> mbox cmd response: success
23,914,793 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
23,929,547 UART:
23,929,891 UART: Running Caliptra FMC ...
23,931,150 UART:
23,931,317 UART: [fmc] Received command: 0x10000004
23,932,863 >>> mbox cmd response: success
28,505,872 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,515,973 UART:
28,516,245 UART: Running Caliptra FMC ...
28,517,410 UART:
28,517,569 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,519,199 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,309 UART:
192,682 UART: Running Caliptra ROM ...
193,858 UART:
603,657 UART: [state] CFI Enabled
617,104 UART: [state] LifecycleState = Unprovisioned
619,497 UART: [state] DebugLocked = No
621,108 UART: [state] WD Timer not started. Device not locked for debugging
625,852 UART: [kat] SHA2-256
807,845 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,405 UART: [kat] ++
819,889 UART: [kat] sha1
830,046 UART: [kat] SHA2-256
833,072 UART: [kat] SHA2-384
838,705 UART: [kat] SHA2-512-ACC
841,348 UART: [kat] ECC-384
4,095,651 UART: [kat] HMAC-384Kdf
4,107,865 UART: [kat] LMS
5,181,010 UART: [kat] --
5,186,297 UART: [cold-reset] ++
5,187,943 UART: [fht] FHT @ 0x50003400
5,198,004 UART: [idev] ++
5,198,712 UART: [idev] CDI.KEYID = 6
5,199,885 UART: [idev] SUBJECT.KEYID = 7
5,201,335 UART: [idev] UDS.KEYID = 0
5,202,600 ready_for_fw is high
5,202,844 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,336,466 UART: [idev] Erasing UDS.KEYID = 0
8,491,374 UART: [idev] Sha1 KeyId Algorithm
8,513,639 UART: [idev] --
8,516,335 UART: [ldev] ++
8,516,902 UART: [ldev] CDI.KEYID = 6
8,518,046 UART: [ldev] SUBJECT.KEYID = 5
8,519,576 UART: [ldev] AUTHORITY.KEYID = 7
8,521,046 UART: [ldev] FE.KEYID = 1
8,534,447 UART: [ldev] Erasing FE.KEYID = 1
11,825,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,184,787 UART: [ldev] --
14,188,936 UART: [fwproc] Wait for Commands...
14,191,565 UART: [fwproc] Recv command 0x46574c44
14,193,865 UART: [fwproc] Recv'd Img size: 106256 bytes
18,172,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,249,287 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,291,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,607,633 >>> mbox cmd response: success
18,611,328 UART: [afmc] ++
18,611,949 UART: [afmc] CDI.KEYID = 6
18,613,141 UART: [afmc] SUBJECT.KEYID = 7
18,614,252 UART: [afmc] AUTHORITY.KEYID = 5
21,932,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,226,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,028 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,245,025 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,261,077 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,277,192 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,058 UART: [afmc] --
24,304,206 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,305,163 UART: [cold-reset] --
24,307,996 UART: [state] Locking Datavault
24,312,714 UART: [state] Locking PCR0, PCR1 and PCR31
24,314,411 UART: [state] Locking ICCM
24,317,291 UART: [exit] Launching FMC @ 0x40000000
24,325,946 UART:
24,326,172 UART: Running Caliptra FMC ...
24,327,189 UART:
24,327,324 UART: [fmc] Received command: 0x10000004
24,328,770 UART:
24,328,916 UART: Running Caliptra ROM ...
24,329,918 UART:
24,330,095 >>> mbox cmd response: success
24,330,342 UART: [state] CFI Enabled
24,343,487 UART: [state] LifecycleState = Unprovisioned
24,345,313 UART: [state] DebugLocked = No
24,347,470 UART: [state] WD Timer not started. Device not locked for debugging
24,351,620 UART: [kat] SHA2-256
24,533,605 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,545,161 UART: [kat] ++
24,545,617 UART: [kat] sha1
24,556,659 UART: [kat] SHA2-256
24,559,670 UART: [kat] SHA2-384
24,564,619 UART: [kat] SHA2-512-ACC
24,567,234 UART: [kat] ECC-384
27,820,021 UART: [kat] HMAC-384Kdf
27,831,772 UART: [kat] LMS
28,904,920 UART: [kat] --
28,908,267 UART: [update-reset] ++
28,909,421 UART: Failed To Get Mailbox Txn
28,911,860 UART: ROM Non-Fatal Error: 0x01040004
28,914,161 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,915,018 UART: [state] Locking Datavault
28,918,433 UART: [state] Locking PCR0, PCR1 and PCR31
28,920,615 UART: [state] Locking ICCM
28,922,408 UART: [exit] Launching FMC @ 0x40000000
28,931,073 UART:
28,931,357 UART: Running Caliptra FMC ...
28,932,378 UART:
28,932,516 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,934,151 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
5,103,892 ready_for_fw is high
5,104,587 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,411,369 >>> mbox cmd response: success
24,037,409 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,052,257 UART:
24,052,622 UART: Running Caliptra FMC ...
24,053,799 UART:
24,053,997 UART: [fmc] Received command: 0x10000004
24,055,538 >>> mbox cmd response: success
28,543,631 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,554,711 UART:
28,554,984 UART: Running Caliptra FMC ...
28,556,057 UART:
28,556,203 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,557,838 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,174 UART:
192,605 UART: Running Caliptra ROM ...
193,765 UART:
193,912 UART: [state] CFI Enabled
263,716 UART: [state] LifecycleState = Unprovisioned
265,653 UART: [state] DebugLocked = No
267,885 UART: [state] WD Timer not started. Device not locked for debugging
270,776 UART: [kat] SHA2-256
449,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,423 UART: [kat] ++
461,870 UART: [kat] sha1
471,814 UART: [kat] SHA2-256
474,855 UART: [kat] SHA2-384
480,892 UART: [kat] SHA2-512-ACC
483,837 UART: [kat] ECC-384
2,948,028 UART: [kat] HMAC-384Kdf
2,970,812 UART: [kat] LMS
3,500,293 UART: [kat] --
3,504,540 UART: [cold-reset] ++
3,506,765 UART: [fht] FHT @ 0x50003400
3,517,556 UART: [idev] ++
3,518,168 UART: [idev] CDI.KEYID = 6
3,519,085 UART: [idev] SUBJECT.KEYID = 7
3,520,267 UART: [idev] UDS.KEYID = 0
3,521,190 ready_for_fw is high
3,521,377 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,655,433 UART: [idev] Erasing UDS.KEYID = 0
6,029,858 UART: [idev] Sha1 KeyId Algorithm
6,053,362 UART: [idev] --
6,056,498 UART: [ldev] ++
6,057,073 UART: [ldev] CDI.KEYID = 6
6,057,963 UART: [ldev] SUBJECT.KEYID = 5
6,059,178 UART: [ldev] AUTHORITY.KEYID = 7
6,060,413 UART: [ldev] FE.KEYID = 1
6,099,492 UART: [ldev] Erasing FE.KEYID = 1
8,600,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,574 UART: [ldev] --
10,410,501 UART: [fwproc] Wait for Commands...
10,412,818 UART: [fwproc] Recv command 0x46574c44
10,414,914 UART: [fwproc] Recv'd Img size: 106600 bytes
13,718,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,797,322 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,839,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,156,609 >>> mbox cmd response: success
14,161,292 UART: [afmc] ++
14,161,874 UART: [afmc] CDI.KEYID = 6
14,162,778 UART: [afmc] SUBJECT.KEYID = 7
14,163,939 UART: [afmc] AUTHORITY.KEYID = 5
16,700,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,436,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,438,781 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,454,769 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,470,689 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,486,691 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,510,115 UART: [afmc] --
18,513,837 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,514,792 UART: [cold-reset] --
18,517,827 UART: [state] Locking Datavault
18,522,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,524,078 UART: [state] Locking ICCM
18,526,074 UART: [exit] Launching FMC @ 0x40000000
18,534,482 UART:
18,534,739 UART: Running Caliptra FMC ...
18,535,846 UART:
18,535,999 UART: [fmc] Received command: 0x10000004
18,537,456 UART:
18,537,607 UART: Running Caliptra ROM ...
18,538,704 UART:
18,538,860 UART: [state] CFI Enabled
18,539,818 >>> mbox cmd response: success
18,602,462 UART: [state] LifecycleState = Unprovisioned
18,604,393 UART: [state] DebugLocked = No
18,605,615 UART: [state] WD Timer not started. Device not locked for debugging
18,608,857 UART: [kat] SHA2-256
18,787,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,799,569 UART: [kat] ++
18,800,032 UART: [kat] sha1
18,810,274 UART: [kat] SHA2-256
18,813,302 UART: [kat] SHA2-384
18,818,911 UART: [kat] SHA2-512-ACC
18,821,854 UART: [kat] ECC-384
21,285,359 UART: [kat] HMAC-384Kdf
21,307,459 UART: [kat] LMS
21,836,902 UART: [kat] --
21,839,440 UART: [update-reset] ++
21,840,363 UART: Failed To Get Mailbox Txn
21,844,828 UART: ROM Non-Fatal Error: 0x01040004
21,846,924 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,847,191 UART: [state] Locking Datavault
21,850,008 UART: [state] Locking PCR0, PCR1 and PCR31
21,851,662 UART: [state] Locking ICCM
21,852,841 UART: [exit] Launching FMC @ 0x40000000
21,861,239 UART:
21,861,480 UART: Running Caliptra FMC ...
21,862,548 UART:
21,862,701 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,864,344 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,363,153 ready_for_fw is high
3,363,714 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,942,005 >>> mbox cmd response: success
18,223,558 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,240,089 UART:
18,240,462 UART: Running Caliptra FMC ...
18,241,739 UART:
18,241,904 UART: [fmc] Received command: 0x10000004
18,243,450 >>> mbox cmd response: success
21,418,770 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,428,916 UART:
21,429,189 UART: Running Caliptra FMC ...
21,430,368 UART:
21,430,533 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,432,174 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,485 UART:
192,854 UART: Running Caliptra ROM ...
194,062 UART:
603,514 UART: [state] CFI Enabled
618,020 UART: [state] LifecycleState = Unprovisioned
619,903 UART: [state] DebugLocked = No
622,706 UART: [state] WD Timer not started. Device not locked for debugging
625,596 UART: [kat] SHA2-256
804,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,297 UART: [kat] ++
816,825 UART: [kat] sha1
828,574 UART: [kat] SHA2-256
831,645 UART: [kat] SHA2-384
838,055 UART: [kat] SHA2-512-ACC
841,030 UART: [kat] ECC-384
3,283,025 UART: [kat] HMAC-384Kdf
3,295,646 UART: [kat] LMS
3,825,140 UART: [kat] --
3,829,508 UART: [cold-reset] ++
3,831,795 UART: [fht] FHT @ 0x50003400
3,843,694 UART: [idev] ++
3,844,263 UART: [idev] CDI.KEYID = 6
3,845,181 UART: [idev] SUBJECT.KEYID = 7
3,846,353 UART: [idev] UDS.KEYID = 0
3,847,279 ready_for_fw is high
3,847,483 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,981,512 UART: [idev] Erasing UDS.KEYID = 0
6,320,510 UART: [idev] Sha1 KeyId Algorithm
6,342,785 UART: [idev] --
6,346,671 UART: [ldev] ++
6,347,237 UART: [ldev] CDI.KEYID = 6
6,348,198 UART: [ldev] SUBJECT.KEYID = 5
6,349,353 UART: [ldev] AUTHORITY.KEYID = 7
6,350,632 UART: [ldev] FE.KEYID = 1
6,360,877 UART: [ldev] Erasing FE.KEYID = 1
8,836,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,262 UART: [ldev] --
10,627,119 UART: [fwproc] Wait for Commands...
10,629,967 UART: [fwproc] Recv command 0x46574c44
10,632,064 UART: [fwproc] Recv'd Img size: 106600 bytes
13,936,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,543 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,056,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,374,048 >>> mbox cmd response: success
14,378,381 UART: [afmc] ++
14,378,969 UART: [afmc] CDI.KEYID = 6
14,379,901 UART: [afmc] SUBJECT.KEYID = 7
14,381,063 UART: [afmc] AUTHORITY.KEYID = 5
16,882,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,960 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,619,963 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,635,899 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,651,838 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,674,303 UART: [afmc] --
18,678,226 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,679,184 UART: [cold-reset] --
18,680,299 UART: [state] Locking Datavault
18,684,372 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,043 UART: [state] Locking ICCM
18,688,687 UART: [exit] Launching FMC @ 0x40000000
18,697,085 UART:
18,697,345 UART: Running Caliptra FMC ...
18,698,451 UART:
18,698,605 UART: [fmc] Received command: 0x10000004
18,700,064 UART:
18,700,221 UART: Running Caliptra ROM ...
18,701,236 UART:
18,701,379 UART: [state] CFI Enabled
18,702,253 >>> mbox cmd response: success
18,716,857 UART: [state] LifecycleState = Unprovisioned
18,718,690 UART: [state] DebugLocked = No
18,721,255 UART: [state] WD Timer not started. Device not locked for debugging
18,724,704 UART: [kat] SHA2-256
18,903,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,915,480 UART: [kat] ++
18,915,936 UART: [kat] sha1
18,926,657 UART: [kat] SHA2-256
18,929,673 UART: [kat] SHA2-384
18,935,503 UART: [kat] SHA2-512-ACC
18,938,448 UART: [kat] ECC-384
21,377,971 UART: [kat] HMAC-384Kdf
21,390,140 UART: [kat] LMS
21,919,632 UART: [kat] --
21,925,551 UART: [update-reset] ++
21,926,466 UART: Failed To Get Mailbox Txn
21,929,415 UART: ROM Non-Fatal Error: 0x01040004
21,931,498 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,931,933 UART: [state] Locking Datavault
21,936,100 UART: [state] Locking PCR0, PCR1 and PCR31
21,937,753 UART: [state] Locking ICCM
21,940,168 UART: [exit] Launching FMC @ 0x40000000
21,948,564 UART:
21,948,794 UART: Running Caliptra FMC ...
21,949,908 UART:
21,950,062 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,951,693 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,696,270 ready_for_fw is high
3,696,667 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,161,211 >>> mbox cmd response: success
18,394,656 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,410,982 UART:
18,411,321 UART: Running Caliptra FMC ...
18,412,563 UART:
18,412,734 UART: [fmc] Received command: 0x10000004
18,414,270 >>> mbox cmd response: success
21,502,236 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,512,614 UART:
21,512,901 UART: Running Caliptra FMC ...
21,514,064 UART:
21,514,239 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,515,887 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,224 UART:
192,602 UART: Running Caliptra ROM ...
193,786 UART:
193,939 UART: [state] CFI Enabled
264,955 UART: [state] LifecycleState = Unprovisioned
266,875 UART: [state] DebugLocked = No
269,268 UART: [state] WD Timer not started. Device not locked for debugging
272,869 UART: [kat] SHA2-256
452,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,607 UART: [kat] ++
464,138 UART: [kat] sha1
475,940 UART: [kat] SHA2-256
478,948 UART: [kat] SHA2-384
484,751 UART: [kat] SHA2-512-ACC
487,655 UART: [kat] ECC-384
2,948,654 UART: [kat] HMAC-384Kdf
2,972,062 UART: [kat] LMS
3,501,526 UART: [kat] --
3,506,085 UART: [cold-reset] ++
3,506,951 UART: [fht] FHT @ 0x50003400
3,516,797 UART: [idev] ++
3,517,370 UART: [idev] CDI.KEYID = 6
3,518,250 UART: [idev] SUBJECT.KEYID = 7
3,519,377 UART: [idev] UDS.KEYID = 0
3,520,361 ready_for_fw is high
3,520,561 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,654,694 UART: [idev] Erasing UDS.KEYID = 0
6,026,625 UART: [idev] Sha1 KeyId Algorithm
6,050,398 UART: [idev] --
6,053,806 UART: [ldev] ++
6,054,381 UART: [ldev] CDI.KEYID = 6
6,055,297 UART: [ldev] SUBJECT.KEYID = 5
6,056,462 UART: [ldev] AUTHORITY.KEYID = 7
6,057,752 UART: [ldev] FE.KEYID = 1
6,100,104 UART: [ldev] Erasing FE.KEYID = 1
8,604,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,555 UART: [ldev] --
10,413,477 UART: [fwproc] Wait for Commands...
10,415,150 UART: [fwproc] Recv command 0x46574c44
10,417,250 UART: [fwproc] Recv'd Img size: 106600 bytes
13,723,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,795,581 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,838,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,154,351 >>> mbox cmd response: success
14,159,150 UART: [afmc] ++
14,159,747 UART: [afmc] CDI.KEYID = 6
14,160,628 UART: [afmc] SUBJECT.KEYID = 7
14,161,845 UART: [afmc] AUTHORITY.KEYID = 5
16,698,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,940 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,937 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,828 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,814 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,307 UART: [afmc] --
18,501,362 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,502,377 UART: [cold-reset] --
18,505,897 UART: [state] Locking Datavault
18,511,692 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,395 UART: [state] Locking ICCM
18,515,252 UART: [exit] Launching FMC @ 0x40000000
18,523,648 UART:
18,523,880 UART: Running Caliptra FMC ...
18,524,905 UART:
18,525,051 UART: [fmc] Received command: 0x10000004
18,526,511 UART:
18,526,660 UART: Running Caliptra ROM ...
18,527,670 UART:
18,527,812 UART: [state] CFI Enabled
18,528,709 >>> mbox cmd response: success
18,585,356 UART: [state] LifecycleState = Unprovisioned
18,587,266 UART: [state] DebugLocked = No
18,588,494 UART: [state] WD Timer not started. Device not locked for debugging
18,592,345 UART: [kat] SHA2-256
18,771,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,782,995 UART: [kat] ++
18,783,534 UART: [kat] sha1
18,795,018 UART: [kat] SHA2-256
18,798,027 UART: [kat] SHA2-384
18,804,994 UART: [kat] SHA2-512-ACC
18,807,926 UART: [kat] ECC-384
21,268,440 UART: [kat] HMAC-384Kdf
21,293,249 UART: [kat] LMS
21,822,678 UART: [kat] --
21,828,225 UART: [update-reset] ++
21,829,114 UART: Failed To Get Mailbox Txn
21,832,392 UART: ROM Non-Fatal Error: 0x01040004 21,834,243 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,835,600 UART: [state] Locking Datavault
21,838,052 UART: [state] Locking PCR0, PCR1 and PCR31
21,839,700 UART: [state] Locking ICCM
21,842,040 UART: [exit] Launching FMC @ 0x40000000
21,850,480 UART:
21,850,728 UART: Running Caliptra FMC ...
21,851,834 UART:
21,851,995 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,853,598 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,383,240 ready_for_fw is high
3,383,698 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,950,262 >>> mbox cmd response: success
18,223,397 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,238,384 UART:
18,238,756 UART: Running Caliptra FMC ...
18,240,020 UART:
18,240,192 UART: [fmc] Received command: 0x10000004
18,241,751 >>> mbox cmd response: success
21,396,101 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,408,086 UART:
21,408,379 UART: Running Caliptra FMC ...
21,409,552 UART:
21,409,717 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,411,356 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,354 UART:
192,732 UART: Running Caliptra ROM ...
193,861 UART:
603,525 UART: [state] CFI Enabled
617,968 UART: [state] LifecycleState = Unprovisioned
619,841 UART: [state] DebugLocked = No
621,501 UART: [state] WD Timer not started. Device not locked for debugging
625,167 UART: [kat] SHA2-256
804,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,915 UART: [kat] ++
816,361 UART: [kat] sha1
828,438 UART: [kat] SHA2-256
831,446 UART: [kat] SHA2-384
837,500 UART: [kat] SHA2-512-ACC
840,428 UART: [kat] ECC-384
3,279,301 UART: [kat] HMAC-384Kdf
3,292,991 UART: [kat] LMS
3,822,460 UART: [kat] --
3,826,595 UART: [cold-reset] ++
3,829,015 UART: [fht] FHT @ 0x50003400
3,838,707 UART: [idev] ++
3,839,268 UART: [idev] CDI.KEYID = 6
3,840,145 UART: [idev] SUBJECT.KEYID = 7
3,841,384 UART: [idev] UDS.KEYID = 0
3,842,284 ready_for_fw is high
3,842,478 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,976,476 UART: [idev] Erasing UDS.KEYID = 0
6,317,924 UART: [idev] Sha1 KeyId Algorithm
6,341,252 UART: [idev] --
6,344,791 UART: [ldev] ++
6,345,365 UART: [ldev] CDI.KEYID = 6
6,346,248 UART: [ldev] SUBJECT.KEYID = 5
6,347,451 UART: [ldev] AUTHORITY.KEYID = 7
6,348,694 UART: [ldev] FE.KEYID = 1
6,360,099 UART: [ldev] Erasing FE.KEYID = 1
8,836,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,775 UART: [ldev] --
10,631,486 UART: [fwproc] Wait for Commands...
10,633,198 UART: [fwproc] Recv command 0x46574c44
10,635,231 UART: [fwproc] Recv'd Img size: 106600 bytes
13,946,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,017,924 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,060,492 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,377,056 >>> mbox cmd response: success
14,380,870 UART: [afmc] ++
14,381,473 UART: [afmc] CDI.KEYID = 6
14,382,381 UART: [afmc] SUBJECT.KEYID = 7
14,383,593 UART: [afmc] AUTHORITY.KEYID = 5
16,884,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,608,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,610,404 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,626,406 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,642,336 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,658,301 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,679,851 UART: [afmc] --
18,684,099 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,685,057 UART: [cold-reset] --
18,687,548 UART: [state] Locking Datavault
18,691,014 UART: [state] Locking PCR0, PCR1 and PCR31
18,692,723 UART: [state] Locking ICCM
18,694,007 UART: [exit] Launching FMC @ 0x40000000
18,702,424 UART:
18,702,658 UART: Running Caliptra FMC ...
18,703,759 UART:
18,703,929 UART: [fmc] Received command: 0x10000004
18,705,385 UART:
18,705,534 UART: Running Caliptra ROM ...
18,706,625 UART:
18,706,778 UART: [state] CFI Enabled
18,707,731 >>> mbox cmd response: success
18,720,182 UART: [state] LifecycleState = Unprovisioned
18,722,012 UART: [state] DebugLocked = No
18,724,357 UART: [state] WD Timer not started. Device not locked for debugging
18,727,534 UART: [kat] SHA2-256
18,906,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,918,306 UART: [kat] ++
18,918,839 UART: [kat] sha1
18,929,046 UART: [kat] SHA2-256
18,932,062 UART: [kat] SHA2-384
18,938,368 UART: [kat] SHA2-512-ACC
18,941,298 UART: [kat] ECC-384
21,381,281 UART: [kat] HMAC-384Kdf
21,395,128 UART: [kat] LMS
21,924,616 UART: [kat] --
21,928,323 UART: [update-reset] ++
21,929,238 UART: Failed To Get Mailbox Txn
21,933,377 UART: ROM Non-Fatal Error: 0x01040004
21,935,455 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,936,493 UART: [state] Locking Datavault
21,940,776 UART: [state] Locking PCR0, PCR1 and PCR31
21,942,482 UART: [state] Locking ICCM
21,944,197 UART: [exit] Launching FMC @ 0x40000000
21,952,587 UART:
21,952,837 UART: Running Caliptra FMC ...
21,953,938 UART:
21,954,087 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,955,716 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,694,980 ready_for_fw is high
3,695,351 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,146,230 >>> mbox cmd response: success
18,381,947 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,397,565 UART:
18,397,934 UART: Running Caliptra FMC ...
18,399,197 UART:
18,399,410 UART: [fmc] Received command: 0x10000004
18,400,970 >>> mbox cmd response: success
21,487,549 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,499,258 UART:
21,499,519 UART: Running Caliptra FMC ...
21,500,603 UART:
21,500,754 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,502,389 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,865 UART: [idev] ++
1,173,033 UART: [idev] CDI.KEYID = 6
1,173,394 UART: [idev] SUBJECT.KEYID = 7
1,173,819 UART: [idev] UDS.KEYID = 0
1,174,165 ready_for_fw is high
1,174,165 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,224 UART: [ldev] --
1,280,574 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,516,789 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,234 >>> mbox cmd response: success
2,671,319 UART: [afmc] ++
2,671,487 UART: [afmc] CDI.KEYID = 6
2,671,850 UART: [afmc] SUBJECT.KEYID = 7
2,672,276 UART: [afmc] AUTHORITY.KEYID = 5
2,708,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,724,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,321 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,041 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,934 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,742,627 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,750,478 UART: [afmc] --
2,751,586 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,751,608 UART: [cold-reset] --
2,752,588 UART: [state] Locking Datavault
2,753,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,519 UART: [state] Locking ICCM
2,755,145 UART: [exit] Launching FMC @ 0x40000000
2,760,442 UART:
2,760,458 UART: Running Caliptra FMC ...
2,760,866 UART:
2,761,004 UART: [fmc] Received command: 0x10000004
2,761,741 >>> mbox cmd response: success
2,761,837 UART:
2,761,853 UART: Running Caliptra ROM ...
2,762,261 UART:
2,762,316 UART: [state] CFI Enabled
2,764,806 UART: [state] LifecycleState = Unprovisioned
2,765,461 UART: [state] DebugLocked = No
2,766,179 UART: [state] WD Timer not started. Device not locked for debugging
2,767,441 UART: [kat] SHA2-256
3,570,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,120 UART: [kat] ++
3,575,272 UART: [kat] sha1
3,579,346 UART: [kat] SHA2-256
3,581,286 UART: [kat] SHA2-384
3,584,031 UART: [kat] SHA2-512-ACC
3,585,931 UART: [kat] ECC-384
3,596,054 UART: [kat] HMAC-384Kdf
3,600,780 UART: [kat] LMS
3,849,092 UART: [kat] --
3,850,126 UART: [update-reset] ++
3,850,437 UART: Failed To Get Mailbox Txn
3,851,206 UART: ROM Non-Fatal Error: 0x01040004
3,851,881 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,852,032 UART: [state] Locking Datavault
3,852,810 UART: [state] Locking PCR0, PCR1 and PCR31
3,853,414 UART: [state] Locking ICCM
3,853,904 UART: [exit] Launching FMC @ 0x40000000
3,859,201 UART:
3,859,217 UART: Running Caliptra FMC ...
3,859,625 UART:
3,859,755 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,860,531 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,370 ready_for_fw is high
1,056,370 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,538 >>> mbox cmd response: success
2,578,492 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,584,369 UART:
2,584,385 UART: Running Caliptra FMC ...
2,584,793 UART:
2,584,931 UART: [fmc] Received command: 0x10000004
2,585,668 >>> mbox cmd response: success
3,557,410 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,562,555 UART:
3,562,571 UART: Running Caliptra FMC ...
3,562,979 UART:
3,563,109 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,563,885 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
1,174,964 ready_for_fw is high
1,174,964 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,200,362 UART: [idev] Sha1 KeyId Algorithm
1,209,122 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,232 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,861 >>> mbox cmd response: success
2,673,996 UART: [afmc] ++
2,674,164 UART: [afmc] CDI.KEYID = 6
2,674,527 UART: [afmc] SUBJECT.KEYID = 7
2,674,953 UART: [afmc] AUTHORITY.KEYID = 5
2,711,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,148 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,868 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,761 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,454 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,475 UART: [afmc] --
2,754,387 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,409 UART: [cold-reset] --
2,755,099 UART: [state] Locking Datavault
2,756,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,796 UART: [state] Locking ICCM
2,757,340 UART: [exit] Launching FMC @ 0x40000000
2,762,637 UART:
2,762,653 UART: Running Caliptra FMC ...
2,763,061 UART:
2,763,199 UART: [fmc] Received command: 0x10000004
2,763,936 >>> mbox cmd response: success
2,764,032 UART:
2,764,048 UART: Running Caliptra ROM ...
2,764,456 UART:
2,764,598 UART: [state] CFI Enabled
2,767,140 UART: [state] LifecycleState = Unprovisioned
2,767,795 UART: [state] DebugLocked = No
2,768,479 UART: [state] WD Timer not started. Device not locked for debugging
2,769,801 UART: [kat] SHA2-256
3,573,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,480 UART: [kat] ++
3,577,632 UART: [kat] sha1
3,581,696 UART: [kat] SHA2-256
3,583,636 UART: [kat] SHA2-384
3,586,529 UART: [kat] SHA2-512-ACC
3,588,429 UART: [kat] ECC-384
3,598,170 UART: [kat] HMAC-384Kdf
3,602,736 UART: [kat] LMS
3,851,048 UART: [kat] --
3,851,852 UART: [update-reset] ++
3,852,163 UART: Failed To Get Mailbox Txn
3,853,042 UART: ROM Non-Fatal Error: 0x01040004
3,853,717 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,844 UART: [state] Locking Datavault
3,854,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,344 UART: [state] Locking ICCM
3,855,778 UART: [exit] Launching FMC @ 0x40000000
3,861,075 UART:
3,861,091 UART: Running Caliptra FMC ...
3,861,499 UART:
3,861,629 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,405 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 ready_for_fw is high
1,056,053 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,119 >>> mbox cmd response: success
2,576,437 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,582,444 UART:
2,582,460 UART: Running Caliptra FMC ...
2,582,868 UART:
2,583,006 UART: [fmc] Received command: 0x10000004
2,583,743 >>> mbox cmd response: success
3,555,520 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,561,157 UART:
3,561,173 UART: Running Caliptra FMC ...
3,561,581 UART:
3,561,711 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,562,487 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,281 UART: [idev] ++
1,173,449 UART: [idev] CDI.KEYID = 6
1,173,810 UART: [idev] SUBJECT.KEYID = 7
1,174,235 UART: [idev] UDS.KEYID = 0
1,174,581 ready_for_fw is high
1,174,581 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,659 UART: [idev] Erasing UDS.KEYID = 0
1,199,755 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,438 UART: [ldev] ++
1,209,606 UART: [ldev] CDI.KEYID = 6
1,209,970 UART: [ldev] SUBJECT.KEYID = 5
1,210,397 UART: [ldev] AUTHORITY.KEYID = 7
1,210,860 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,952 UART: [ldev] --
1,281,370 UART: [fwproc] Wait for Commands...
1,282,151 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,915 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,436 >>> mbox cmd response: success
2,672,535 UART: [afmc] ++
2,672,703 UART: [afmc] CDI.KEYID = 6
2,673,066 UART: [afmc] SUBJECT.KEYID = 7
2,673,492 UART: [afmc] AUTHORITY.KEYID = 5
2,708,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,061 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,781 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,674 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,367 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,210 UART: [afmc] --
2,752,196 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,752,218 UART: [cold-reset] --
2,753,062 UART: [state] Locking Datavault
2,754,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,953 UART: [state] Locking ICCM
2,755,467 UART: [exit] Launching FMC @ 0x40000000
2,760,764 UART:
2,760,780 UART: Running Caliptra FMC ...
2,761,188 UART:
2,761,326 UART: [fmc] Received command: 0x10000004
2,762,063 >>> mbox cmd response: success
2,762,159 UART:
2,762,175 UART: Running Caliptra ROM ...
2,762,583 UART:
2,762,638 UART: [state] CFI Enabled
2,764,864 UART: [state] LifecycleState = Unprovisioned
2,765,519 UART: [state] DebugLocked = No
2,766,227 UART: [state] WD Timer not started. Device not locked for debugging
2,767,557 UART: [kat] SHA2-256
3,571,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,236 UART: [kat] ++
3,575,388 UART: [kat] sha1
3,579,494 UART: [kat] SHA2-256
3,581,434 UART: [kat] SHA2-384
3,584,191 UART: [kat] SHA2-512-ACC
3,586,091 UART: [kat] ECC-384
3,595,726 UART: [kat] HMAC-384Kdf
3,600,360 UART: [kat] LMS
3,848,672 UART: [kat] --
3,849,258 UART: [update-reset] ++
3,849,569 UART: Failed To Get Mailbox Txn
3,850,392 UART: ROM Non-Fatal Error: 0x01040004
3,851,067 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,851,200 UART: [state] Locking Datavault
3,851,840 UART: [state] Locking PCR0, PCR1 and PCR31
3,852,444 UART: [state] Locking ICCM
3,853,088 UART: [exit] Launching FMC @ 0x40000000
3,858,385 UART:
3,858,401 UART: Running Caliptra FMC ...
3,858,809 UART:
3,858,939 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,859,715 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,240 ready_for_fw is high
1,055,240 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,934 >>> mbox cmd response: success
2,575,688 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,581,609 UART:
2,581,625 UART: Running Caliptra FMC ...
2,582,033 UART:
2,582,171 UART: [fmc] Received command: 0x10000004
2,582,908 >>> mbox cmd response: success
3,555,252 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,560,653 UART:
3,560,669 UART: Running Caliptra FMC ...
3,561,077 UART:
3,561,207 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,561,983 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,775 UART: [state] LifecycleState = Unprovisioned
85,430 UART: [state] DebugLocked = No
86,128 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
891,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,412 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 ready_for_fw is high
1,174,392 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,983 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,604 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,163 >>> mbox cmd response: success
2,673,184 UART: [afmc] ++
2,673,352 UART: [afmc] CDI.KEYID = 6
2,673,715 UART: [afmc] SUBJECT.KEYID = 7
2,674,141 UART: [afmc] AUTHORITY.KEYID = 5
2,710,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,626 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,346 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,239 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,932 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,883 UART: [afmc] --
2,753,875 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,753,897 UART: [cold-reset] --
2,754,899 UART: [state] Locking Datavault
2,755,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,500 UART: [state] Locking ICCM
2,756,960 UART: [exit] Launching FMC @ 0x40000000
2,762,257 UART:
2,762,273 UART: Running Caliptra FMC ...
2,762,681 UART:
2,762,819 UART: [fmc] Received command: 0x10000004
2,763,556 >>> mbox cmd response: success
2,763,652 UART:
2,763,668 UART: Running Caliptra ROM ...
2,764,076 UART:
2,764,218 UART: [state] CFI Enabled
2,767,298 UART: [state] LifecycleState = Unprovisioned
2,767,953 UART: [state] DebugLocked = No
2,768,463 UART: [state] WD Timer not started. Device not locked for debugging
2,769,643 UART: [kat] SHA2-256
3,573,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,322 UART: [kat] ++
3,577,474 UART: [kat] sha1
3,581,732 UART: [kat] SHA2-256
3,583,672 UART: [kat] SHA2-384
3,586,399 UART: [kat] SHA2-512-ACC
3,588,299 UART: [kat] ECC-384
3,598,434 UART: [kat] HMAC-384Kdf
3,603,022 UART: [kat] LMS
3,851,334 UART: [kat] --
3,851,922 UART: [update-reset] ++
3,852,233 UART: Failed To Get Mailbox Txn
3,853,154 UART: ROM Non-Fatal Error: 0x01040004
3,853,829 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,934 UART: [state] Locking Datavault
3,854,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,382 UART: [state] Locking ICCM
3,855,928 UART: [exit] Launching FMC @ 0x40000000
3,861,225 UART:
3,861,241 UART: Running Caliptra FMC ...
3,861,649 UART:
3,861,779 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,555 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,873 ready_for_fw is high
1,055,873 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,111 >>> mbox cmd response: success
2,577,531 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,583,364 UART:
2,583,380 UART: Running Caliptra FMC ...
2,583,788 UART:
2,583,926 UART: [fmc] Received command: 0x10000004
2,584,663 >>> mbox cmd response: success
3,557,172 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,562,477 UART:
3,562,493 UART: Running Caliptra FMC ...
3,562,901 UART:
3,563,031 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,563,807 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,186 UART: [kat] SHA2-512-ACC
906,087 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,078 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,045 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,664 >>> mbox cmd response: success
2,671,769 UART: [afmc] ++
2,671,937 UART: [afmc] CDI.KEYID = 6
2,672,300 UART: [afmc] SUBJECT.KEYID = 7
2,672,726 UART: [afmc] AUTHORITY.KEYID = 5
2,708,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,724,382 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,133 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,853 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,746 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,742,439 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,750,486 UART: [afmc] --
2,751,504 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,751,526 UART: [cold-reset] --
2,752,478 UART: [state] Locking Datavault
2,753,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,067 UART: [state] Locking ICCM
2,754,521 UART: [exit] Launching FMC @ 0x40000000
2,759,818 UART:
2,759,834 UART: Running Caliptra FMC ...
2,760,242 UART:
2,760,380 UART: [fmc] Received command: 0x10000004
2,761,117 >>> mbox cmd response: success
2,761,213 UART:
2,761,229 UART: Running Caliptra ROM ...
2,761,637 UART:
2,761,692 UART: [state] CFI Enabled
2,764,578 UART: [state] LifecycleState = Unprovisioned
2,765,233 UART: [state] DebugLocked = No
2,765,945 UART: [state] WD Timer not started. Device not locked for debugging
2,767,115 UART: [kat] SHA2-256
3,570,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,574,794 UART: [kat] ++
3,574,946 UART: [kat] sha1
3,579,252 UART: [kat] SHA2-256
3,581,192 UART: [kat] SHA2-384
3,584,059 UART: [kat] SHA2-512-ACC
3,585,959 UART: [kat] ECC-384
3,595,582 UART: [kat] HMAC-384Kdf
3,600,116 UART: [kat] LMS
3,848,428 UART: [kat] --
3,849,280 UART: [update-reset] ++
3,849,591 UART: Failed To Get Mailbox Txn
3,850,506 UART: ROM Non-Fatal Error: 0x01040004
3,851,181 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,851,460 UART: [state] Locking Datavault
3,852,254 UART: [state] Locking PCR0, PCR1 and PCR31
3,852,858 UART: [state] Locking ICCM
3,853,522 UART: [exit] Launching FMC @ 0x40000000
3,858,819 UART:
3,858,835 UART: Running Caliptra FMC ...
3,859,243 UART:
3,859,373 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,860,149 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,862 ready_for_fw is high
1,055,862 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,088 >>> mbox cmd response: success
2,575,614 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,581,947 UART:
2,581,963 UART: Running Caliptra FMC ...
2,582,371 UART:
2,582,509 UART: [fmc] Received command: 0x10000004
2,583,246 >>> mbox cmd response: success
3,556,278 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,561,619 UART:
3,561,635 UART: Running Caliptra FMC ...
3,562,043 UART:
3,562,173 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,562,949 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
904,907 UART: [kat] SHA2-512-ACC
906,808 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 ready_for_fw is high
1,174,666 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,905 UART: [ldev] ++
1,210,073 UART: [ldev] CDI.KEYID = 6
1,210,437 UART: [ldev] SUBJECT.KEYID = 5
1,210,864 UART: [ldev] AUTHORITY.KEYID = 7
1,211,327 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,200 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,673,767 >>> mbox cmd response: success
2,674,816 UART: [afmc] ++
2,674,984 UART: [afmc] CDI.KEYID = 6
2,675,347 UART: [afmc] SUBJECT.KEYID = 7
2,675,773 UART: [afmc] AUTHORITY.KEYID = 5
2,710,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,846 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,566 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,459 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,152 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,029 UART: [afmc] --
2,754,109 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,131 UART: [cold-reset] --
2,754,911 UART: [state] Locking Datavault
2,756,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,988 UART: [state] Locking ICCM
2,757,564 UART: [exit] Launching FMC @ 0x40000000
2,762,861 UART:
2,762,877 UART: Running Caliptra FMC ...
2,763,285 UART:
2,763,423 UART: [fmc] Received command: 0x10000004
2,764,160 >>> mbox cmd response: success
2,764,256 UART:
2,764,272 UART: Running Caliptra ROM ...
2,764,680 UART:
2,764,822 UART: [state] CFI Enabled
2,767,386 UART: [state] LifecycleState = Unprovisioned
2,768,041 UART: [state] DebugLocked = No
2,768,775 UART: [state] WD Timer not started. Device not locked for debugging
2,769,951 UART: [kat] SHA2-256
3,573,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,630 UART: [kat] ++
3,577,782 UART: [kat] sha1
3,582,038 UART: [kat] SHA2-256
3,583,978 UART: [kat] SHA2-384
3,586,607 UART: [kat] SHA2-512-ACC
3,588,507 UART: [kat] ECC-384
3,598,434 UART: [kat] HMAC-384Kdf
3,603,154 UART: [kat] LMS
3,851,466 UART: [kat] --
3,852,258 UART: [update-reset] ++
3,852,569 UART: Failed To Get Mailbox Txn
3,853,226 UART: ROM Non-Fatal Error: 0x01040004
3,853,901 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,212 UART: [state] Locking Datavault
3,854,940 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,544 UART: [state] Locking ICCM
3,856,090 UART: [exit] Launching FMC @ 0x40000000
3,861,387 UART:
3,861,403 UART: Running Caliptra FMC ...
3,861,811 UART:
3,861,941 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,717 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,685 ready_for_fw is high
1,055,685 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,417 >>> mbox cmd response: success
2,577,207 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,583,166 UART:
2,583,182 UART: Running Caliptra FMC ...
2,583,590 UART:
2,583,728 UART: [fmc] Received command: 0x10000004
2,584,465 >>> mbox cmd response: success
3,556,868 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,562,119 UART:
3,562,135 UART: Running Caliptra FMC ...
3,562,543 UART:
3,562,673 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,563,449 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,307 UART:
192,685 UART: Running Caliptra ROM ...
193,771 UART:
193,914 UART: [state] CFI Enabled
265,780 UART: [state] LifecycleState = Unprovisioned
268,184 UART: [state] DebugLocked = No
269,429 UART: [state] WD Timer not started. Device not locked for debugging
272,335 UART: [kat] SHA2-256
454,041 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,554 UART: [kat] ++
466,105 UART: [kat] sha1
476,979 UART: [kat] SHA2-256
479,979 UART: [kat] SHA2-384
485,749 UART: [kat] SHA2-512-ACC
488,398 UART: [kat] ECC-384
3,776,214 UART: [kat] HMAC-384Kdf
3,802,830 UART: [kat] LMS
4,876,032 UART: [kat] --
4,882,047 UART: [cold-reset] ++
4,884,406 UART: [fht] FHT @ 0x50003400
4,896,451 UART: [idev] ++
4,897,082 UART: [idev] CDI.KEYID = 6
4,898,332 UART: [idev] SUBJECT.KEYID = 7
4,899,359 UART: [idev] UDS.KEYID = 0
4,900,623 ready_for_fw is high
4,900,836 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,034,481 UART: [idev] Erasing UDS.KEYID = 0
8,243,175 UART: [idev] Sha1 KeyId Algorithm
8,265,159 UART: [idev] --
8,270,001 UART: [ldev] ++
8,270,587 UART: [ldev] CDI.KEYID = 6
8,271,848 UART: [ldev] SUBJECT.KEYID = 5
8,272,956 UART: [ldev] AUTHORITY.KEYID = 7
8,274,185 UART: [ldev] FE.KEYID = 1
8,315,932 UART: [ldev] Erasing FE.KEYID = 1
11,654,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,389 UART: [ldev] --
14,037,406 UART: [fwproc] Wait for Commands...
14,040,050 UART: [fwproc] Recv command 0x46574c44
14,042,362 UART: [fwproc] Recv'd Img size: 106256 bytes
18,016,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,094,186 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,136,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,451,842 >>> mbox cmd response: success
18,456,744 UART: [afmc] ++
18,457,337 UART: [afmc] CDI.KEYID = 6
18,458,521 UART: [afmc] SUBJECT.KEYID = 7
18,459,682 UART: [afmc] AUTHORITY.KEYID = 5
21,815,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,112,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,115,052 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,131,096 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,147,124 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,163,253 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,185,196 UART: [afmc] --
24,187,868 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,188,939 UART: [cold-reset] --
24,192,581 UART: [state] Locking Datavault
24,197,199 UART: [state] Locking PCR0, PCR1 and PCR31
24,198,921 UART: [state] Locking ICCM
24,200,729 UART: [exit] Launching FMC @ 0x40000000
24,209,348 UART:
24,209,576 UART: Running Caliptra FMC ...
24,210,599 UART:
24,210,745 UART: [fmc] Received command: 0x1000000B
24,212,197 UART:
24,212,346 UART: Running Caliptra ROM ...
24,213,357 UART:
24,213,497 UART: [state] CFI Enabled
24,277,148 UART: [state] LifecycleState = Unprovisioned
24,279,029 UART: [state] DebugLocked = No
24,280,276 UART: [state] WD Timer not started. Device not locked for debugging
24,284,876 UART: [kat] SHA2-256
24,466,773 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,478,318 UART: [kat] ++
24,478,783 UART: [kat] sha1
24,488,753 UART: [kat] SHA2-256
24,491,767 UART: [kat] SHA2-384
24,497,960 UART: [kat] SHA2-512-ACC
24,500,753 UART: [kat] ECC-384
27,789,684 UART: [kat] HMAC-384Kdf
27,815,637 UART: [kat] LMS
28,888,774 UART: [kat] --
28,892,607 UART: [update-reset] ++
28,893,746 UART: Invalid command 0x1000000b recv
28,898,838 UART: ROM Non-Fatal Error: 0x01040003
28,901,831 UART: [state] Locking Datavault
28,905,010 UART: [state] Locking PCR0, PCR1 and PCR31
28,907,209 UART: [state] Locking ICCM
28,908,667 UART: [exit] Launching FMC @ 0x40000000
28,917,328 UART:
28,917,583 UART: Running Caliptra FMC ...
28,918,697 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
4,805,008 ready_for_fw is high
4,805,659 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,239,380 >>> mbox cmd response: success
23,920,100 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
23,934,316 UART:
23,934,667 UART: Running Caliptra FMC ...
23,935,932 UART:
23,936,101 UART: [fmc] Received command: 0x1000000B
28,553,665 UART:
28,554,000 UART: Running Caliptra FMC ...
28,555,090 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,550 UART:
192,909 UART: Running Caliptra ROM ...
194,085 UART:
603,764 UART: [state] CFI Enabled
616,155 UART: [state] LifecycleState = Unprovisioned
618,527 UART: [state] DebugLocked = No
621,179 UART: [state] WD Timer not started. Device not locked for debugging
625,135 UART: [kat] SHA2-256
807,045 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,626 UART: [kat] ++
819,141 UART: [kat] sha1
828,940 UART: [kat] SHA2-256
832,014 UART: [kat] SHA2-384
837,932 UART: [kat] SHA2-512-ACC
840,577 UART: [kat] ECC-384
4,094,722 UART: [kat] HMAC-384Kdf
4,106,609 UART: [kat] LMS
5,179,800 UART: [kat] --
5,183,822 UART: [cold-reset] ++
5,186,108 UART: [fht] FHT @ 0x50003400
5,196,708 UART: [idev] ++
5,197,469 UART: [idev] CDI.KEYID = 6
5,198,653 UART: [idev] SUBJECT.KEYID = 7
5,200,114 UART: [idev] UDS.KEYID = 0
5,201,221 ready_for_fw is high
5,201,399 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,334,728 UART: [idev] Erasing UDS.KEYID = 0
8,487,730 UART: [idev] Sha1 KeyId Algorithm
8,508,202 UART: [idev] --
8,511,754 UART: [ldev] ++
8,512,368 UART: [ldev] CDI.KEYID = 6
8,513,540 UART: [ldev] SUBJECT.KEYID = 5
8,515,012 UART: [ldev] AUTHORITY.KEYID = 7
8,516,558 UART: [ldev] FE.KEYID = 1
8,527,518 UART: [ldev] Erasing FE.KEYID = 1
11,821,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,136 UART: [ldev] --
14,185,479 UART: [fwproc] Wait for Commands...
14,188,378 UART: [fwproc] Recv command 0x46574c44
14,190,676 UART: [fwproc] Recv'd Img size: 106256 bytes
18,163,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,237,147 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,279,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,596,114 >>> mbox cmd response: success
18,599,488 UART: [afmc] ++
18,600,076 UART: [afmc] CDI.KEYID = 6
18,601,259 UART: [afmc] SUBJECT.KEYID = 7
18,602,413 UART: [afmc] AUTHORITY.KEYID = 5
21,913,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,207,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,210,058 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,226,060 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,242,103 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,258,196 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,280,708 UART: [afmc] --
24,283,607 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,284,540 UART: [cold-reset] --
24,285,839 UART: [state] Locking Datavault
24,290,237 UART: [state] Locking PCR0, PCR1 and PCR31
24,291,875 UART: [state] Locking ICCM
24,294,645 UART: [exit] Launching FMC @ 0x40000000
24,303,245 UART:
24,303,482 UART: Running Caliptra FMC ...
24,304,580 UART:
24,304,764 UART: [fmc] Received command: 0x1000000B
24,306,215 UART:
24,306,366 UART: Running Caliptra ROM ...
24,307,459 UART:
24,307,606 UART: [state] CFI Enabled
24,319,936 UART: [state] LifecycleState = Unprovisioned
24,321,813 UART: [state] DebugLocked = No
24,323,574 UART: [state] WD Timer not started. Device not locked for debugging
24,328,858 UART: [kat] SHA2-256
24,510,842 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,522,396 UART: [kat] ++
24,522,846 UART: [kat] sha1
24,531,781 UART: [kat] SHA2-256
24,534,850 UART: [kat] SHA2-384
24,540,341 UART: [kat] SHA2-512-ACC
24,542,953 UART: [kat] ECC-384
27,798,109 UART: [kat] HMAC-384Kdf
27,809,692 UART: [kat] LMS
28,882,860 UART: [kat] --
28,886,266 UART: [update-reset] ++
28,887,459 UART: Invalid command 0x1000000b recv
28,892,696 UART: ROM Non-Fatal Error: 0x01040003
28,895,478 UART: [state] Locking Datavault
28,899,463 UART: [state] Locking PCR0, PCR1 and PCR31
28,901,655 UART: [state] Locking ICCM
28,903,678 UART: [exit] Launching FMC @ 0x40000000
28,912,340 UART:
28,912,575 UART: Running Caliptra FMC ...
28,913,746 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
5,102,233 ready_for_fw is high
5,102,818 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,409,807 >>> mbox cmd response: success
24,034,545 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,047,210 UART:
24,047,573 UART: Running Caliptra FMC ...
24,048,831 UART:
24,048,994 UART: [fmc] Received command: 0x1000000B
28,552,209 UART:
28,552,542 UART: Running Caliptra FMC ...
28,553,626 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,095 UART:
192,511 UART: Running Caliptra ROM ...
193,601 UART:
193,745 UART: [state] CFI Enabled
264,843 UART: [state] LifecycleState = Unprovisioned
266,685 UART: [state] DebugLocked = No
267,867 UART: [state] WD Timer not started. Device not locked for debugging
271,610 UART: [kat] SHA2-256
450,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,301 UART: [kat] ++
462,840 UART: [kat] sha1
474,427 UART: [kat] SHA2-256
477,501 UART: [kat] SHA2-384
482,995 UART: [kat] SHA2-512-ACC
486,004 UART: [kat] ECC-384
2,960,280 UART: [kat] HMAC-384Kdf
2,985,026 UART: [kat] LMS
3,514,521 UART: [kat] --
3,519,967 UART: [cold-reset] ++
3,521,696 UART: [fht] FHT @ 0x50003400
3,533,108 UART: [idev] ++
3,533,681 UART: [idev] CDI.KEYID = 6
3,534,602 UART: [idev] SUBJECT.KEYID = 7
3,535,776 UART: [idev] UDS.KEYID = 0
3,536,701 ready_for_fw is high
3,536,891 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,671,080 UART: [idev] Erasing UDS.KEYID = 0
6,037,238 UART: [idev] Sha1 KeyId Algorithm
6,060,324 UART: [idev] --
6,065,204 UART: [ldev] ++
6,065,790 UART: [ldev] CDI.KEYID = 6
6,066,705 UART: [ldev] SUBJECT.KEYID = 5
6,067,870 UART: [ldev] AUTHORITY.KEYID = 7
6,069,120 UART: [ldev] FE.KEYID = 1
6,111,525 UART: [ldev] Erasing FE.KEYID = 1
8,616,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,767 UART: [ldev] --
10,427,032 UART: [fwproc] Wait for Commands...
10,429,135 UART: [fwproc] Recv command 0x46574c44
10,431,230 UART: [fwproc] Recv'd Img size: 106600 bytes
13,742,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,814,822 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,857,438 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,173,905 >>> mbox cmd response: success
14,178,044 UART: [afmc] ++
14,178,667 UART: [afmc] CDI.KEYID = 6
14,179,580 UART: [afmc] SUBJECT.KEYID = 7
14,180,740 UART: [afmc] AUTHORITY.KEYID = 5
16,710,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,433,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,435,532 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,451,551 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,467,437 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,483,408 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,505,570 UART: [afmc] --
18,510,200 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,511,229 UART: [cold-reset] --
18,514,470 UART: [state] Locking Datavault
18,520,694 UART: [state] Locking PCR0, PCR1 and PCR31
18,522,347 UART: [state] Locking ICCM
18,523,960 UART: [exit] Launching FMC @ 0x40000000
18,532,342 UART:
18,532,630 UART: Running Caliptra FMC ...
18,533,741 UART:
18,533,917 UART: [fmc] Received command: 0x1000000B
18,535,291 UART:
18,535,438 UART: Running Caliptra ROM ...
18,536,474 UART:
18,536,621 UART: [state] CFI Enabled
18,597,325 UART: [state] LifecycleState = Unprovisioned
18,599,161 UART: [state] DebugLocked = No
18,601,999 UART: [state] WD Timer not started. Device not locked for debugging
18,605,026 UART: [kat] SHA2-256
18,784,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,795,733 UART: [kat] ++
18,796,272 UART: [kat] sha1
18,808,132 UART: [kat] SHA2-256
18,811,166 UART: [kat] SHA2-384
18,818,612 UART: [kat] SHA2-512-ACC
18,821,563 UART: [kat] ECC-384
21,278,967 UART: [kat] HMAC-384Kdf
21,303,180 UART: [kat] LMS
21,832,647 UART: [kat] --
21,835,501 UART: [update-reset] ++
21,836,368 UART: Invalid command 0x1000000b recv
21,840,340 UART: ROM Non-Fatal Error: 0x01040003
21,842,847 UART: [state] Locking Datavault
21,845,097 UART: [state] Locking PCR0, PCR1 and PCR31
21,846,776 UART: [state] Locking ICCM
21,848,779 UART: [exit] Launching FMC @ 0x40000000
21,857,153 UART:
21,857,407 UART: Running Caliptra FMC ...
21,858,471 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,362,144 ready_for_fw is high
3,362,591 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,928,464 >>> mbox cmd response: success
18,200,716 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,216,536 UART:
18,216,899 UART: Running Caliptra FMC ...
18,218,181 UART:
18,218,348 UART: [fmc] Received command: 0x1000000B
21,408,926 UART:
21,409,265 UART: Running Caliptra FMC ...
21,410,385 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,460 UART:
192,838 UART: Running Caliptra ROM ...
193,948 UART:
603,439 UART: [state] CFI Enabled
616,883 UART: [state] LifecycleState = Unprovisioned
618,759 UART: [state] DebugLocked = No
621,277 UART: [state] WD Timer not started. Device not locked for debugging
625,658 UART: [kat] SHA2-256
804,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,347 UART: [kat] ++
816,878 UART: [kat] sha1
827,186 UART: [kat] SHA2-256
830,263 UART: [kat] SHA2-384
836,034 UART: [kat] SHA2-512-ACC
838,969 UART: [kat] ECC-384
3,280,398 UART: [kat] HMAC-384Kdf
3,293,074 UART: [kat] LMS
3,822,601 UART: [kat] --
3,826,499 UART: [cold-reset] ++
3,828,787 UART: [fht] FHT @ 0x50003400
3,838,910 UART: [idev] ++
3,839,473 UART: [idev] CDI.KEYID = 6
3,840,384 UART: [idev] SUBJECT.KEYID = 7
3,841,553 UART: [idev] UDS.KEYID = 0
3,842,595 ready_for_fw is high
3,842,788 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,976,699 UART: [idev] Erasing UDS.KEYID = 0
6,314,498 UART: [idev] Sha1 KeyId Algorithm
6,337,555 UART: [idev] --
6,341,515 UART: [ldev] ++
6,342,080 UART: [ldev] CDI.KEYID = 6
6,342,962 UART: [ldev] SUBJECT.KEYID = 5
6,344,171 UART: [ldev] AUTHORITY.KEYID = 7
6,345,457 UART: [ldev] FE.KEYID = 1
6,355,981 UART: [ldev] Erasing FE.KEYID = 1
8,830,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,666 UART: [ldev] --
10,619,928 UART: [fwproc] Wait for Commands...
10,622,403 UART: [fwproc] Recv command 0x46574c44
10,624,490 UART: [fwproc] Recv'd Img size: 106600 bytes
13,935,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,603 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,048,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,365,150 >>> mbox cmd response: success
14,368,936 UART: [afmc] ++
14,369,516 UART: [afmc] CDI.KEYID = 6
14,370,419 UART: [afmc] SUBJECT.KEYID = 7
14,371,631 UART: [afmc] AUTHORITY.KEYID = 5
16,873,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,594,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,239 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,612,196 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,628,183 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,644,106 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,587 UART: [afmc] --
18,670,005 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,670,966 UART: [cold-reset] --
18,672,766 UART: [state] Locking Datavault
18,680,402 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,046 UART: [state] Locking ICCM
18,683,199 UART: [exit] Launching FMC @ 0x40000000
18,691,591 UART:
18,691,850 UART: Running Caliptra FMC ...
18,692,951 UART:
18,693,104 UART: [fmc] Received command: 0x1000000B
18,694,556 UART:
18,694,707 UART: Running Caliptra ROM ...
18,695,812 UART:
18,695,968 UART: [state] CFI Enabled
18,710,382 UART: [state] LifecycleState = Unprovisioned
18,712,256 UART: [state] DebugLocked = No
18,714,706 UART: [state] WD Timer not started. Device not locked for debugging
18,717,987 UART: [kat] SHA2-256
18,897,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,908,719 UART: [kat] ++
18,909,260 UART: [kat] sha1
18,919,553 UART: [kat] SHA2-256
18,922,560 UART: [kat] SHA2-384
18,929,158 UART: [kat] SHA2-512-ACC
18,932,097 UART: [kat] ECC-384
21,372,265 UART: [kat] HMAC-384Kdf
21,385,507 UART: [kat] LMS
21,915,043 UART: [kat] --
21,919,609 UART: [update-reset] ++
21,920,469 UART: Invalid command 0x1000000b recv
21,924,493 UART: ROM Non-Fatal Error: 0x01040003
21,927,382 UART: [state] Locking Datavault
21,931,208 UART: [state] Locking PCR0, PCR1 and PCR31
21,932,896 UART: [state] Locking ICCM
21,934,058 UART: [exit] Launching FMC @ 0x40000000
21,942,433 UART:
21,942,684 UART: Running Caliptra FMC ...
21,943,822 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,695,604 ready_for_fw is high
3,696,124 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,139,584 >>> mbox cmd response: success
18,375,106 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,389,705 UART:
18,390,070 UART: Running Caliptra FMC ...
18,391,251 UART:
18,391,402 UART: [fmc] Received command: 0x1000000B
21,488,990 UART:
21,489,328 UART: Running Caliptra FMC ...
21,490,432 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,193 UART:
192,553 UART: Running Caliptra ROM ...
193,746 UART:
193,911 UART: [state] CFI Enabled
263,019 UART: [state] LifecycleState = Unprovisioned
264,969 UART: [state] DebugLocked = No
267,145 UART: [state] WD Timer not started. Device not locked for debugging
270,894 UART: [kat] SHA2-256
450,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,576 UART: [kat] ++
462,182 UART: [kat] sha1
473,146 UART: [kat] SHA2-256
476,213 UART: [kat] SHA2-384
482,001 UART: [kat] SHA2-512-ACC
485,014 UART: [kat] ECC-384
2,947,959 UART: [kat] HMAC-384Kdf
2,971,912 UART: [kat] LMS
3,501,406 UART: [kat] --
3,505,834 UART: [cold-reset] ++
3,507,689 UART: [fht] FHT @ 0x50003400
3,517,622 UART: [idev] ++
3,518,249 UART: [idev] CDI.KEYID = 6
3,519,140 UART: [idev] SUBJECT.KEYID = 7
3,520,316 UART: [idev] UDS.KEYID = 0
3,521,363 ready_for_fw is high
3,521,569 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,655,632 UART: [idev] Erasing UDS.KEYID = 0
6,028,828 UART: [idev] Sha1 KeyId Algorithm
6,052,123 UART: [idev] --
6,056,335 UART: [ldev] ++
6,056,907 UART: [ldev] CDI.KEYID = 6
6,057,819 UART: [ldev] SUBJECT.KEYID = 5
6,059,034 UART: [ldev] AUTHORITY.KEYID = 7
6,060,272 UART: [ldev] FE.KEYID = 1
6,100,895 UART: [ldev] Erasing FE.KEYID = 1
8,604,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,376 UART: [ldev] --
10,414,821 UART: [fwproc] Wait for Commands...
10,417,621 UART: [fwproc] Recv command 0x46574c44
10,419,658 UART: [fwproc] Recv'd Img size: 106600 bytes
13,723,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,799,985 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,842,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,160,096 >>> mbox cmd response: success
14,164,243 UART: [afmc] ++
14,164,836 UART: [afmc] CDI.KEYID = 6
14,165,751 UART: [afmc] SUBJECT.KEYID = 7
14,166,910 UART: [afmc] AUTHORITY.KEYID = 5
16,696,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,501 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,484 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,402 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,474,354 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,356 UART: [afmc] --
18,501,445 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,502,438 UART: [cold-reset] --
18,503,410 UART: [state] Locking Datavault
18,508,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,509,997 UART: [state] Locking ICCM
18,512,208 UART: [exit] Launching FMC @ 0x40000000
18,520,553 UART:
18,520,786 UART: Running Caliptra FMC ...
18,521,883 UART:
18,522,040 UART: [fmc] Received command: 0x1000000B
18,523,442 UART:
18,523,592 UART: Running Caliptra ROM ...
18,524,701 UART:
18,524,860 UART: [state] CFI Enabled
18,582,476 UART: [state] LifecycleState = Unprovisioned
18,584,358 UART: [state] DebugLocked = No
18,587,175 UART: [state] WD Timer not started. Device not locked for debugging
18,590,894 UART: [kat] SHA2-256
18,770,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,781,610 UART: [kat] ++
18,782,068 UART: [kat] sha1
18,792,691 UART: [kat] SHA2-256
18,795,748 UART: [kat] SHA2-384
18,801,959 UART: [kat] SHA2-512-ACC
18,804,909 UART: [kat] ECC-384
21,268,976 UART: [kat] HMAC-384Kdf
21,292,806 UART: [kat] LMS
21,822,280 UART: [kat] --
21,827,495 UART: [update-reset] ++
21,828,414 UART: Invalid command 0x1000000b recv
21,832,275 UART: ROM Non-Fatal Error: 0x01040003
21,835,775 UART: [state] Locking Datavault
21,839,136 UART: [state] Locking PCR0, PCR1 and PCR31
21,840,831 UART: [state] Locking ICCM
21,841,825 UART: [exit] Launching FMC @ 0x40000000
21,850,233 UART:
21,850,482 UART: Running Caliptra FMC ...
21,851,638 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,362,415 ready_for_fw is high
3,362,835 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,928,699 >>> mbox cmd response: success
18,198,077 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,212,988 UART:
18,213,335 UART: Running Caliptra FMC ...
18,214,480 UART:
18,214,634 UART: [fmc] Received command: 0x1000000B
21,403,282 UART:
21,403,620 UART: Running Caliptra FMC ...
21,404,741 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,580 UART:
192,950 UART: Running Caliptra ROM ...
194,038 UART:
603,765 UART: [state] CFI Enabled
616,792 UART: [state] LifecycleState = Unprovisioned
618,733 UART: [state] DebugLocked = No
621,354 UART: [state] WD Timer not started. Device not locked for debugging
625,241 UART: [kat] SHA2-256
804,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,952 UART: [kat] ++
816,480 UART: [kat] sha1
827,361 UART: [kat] SHA2-256
830,365 UART: [kat] SHA2-384
836,848 UART: [kat] SHA2-512-ACC
839,779 UART: [kat] ECC-384
3,282,923 UART: [kat] HMAC-384Kdf
3,295,178 UART: [kat] LMS
3,824,660 UART: [kat] --
3,829,229 UART: [cold-reset] ++
3,830,301 UART: [fht] FHT @ 0x50003400
3,841,130 UART: [idev] ++
3,841,689 UART: [idev] CDI.KEYID = 6
3,842,595 UART: [idev] SUBJECT.KEYID = 7
3,843,764 UART: [idev] UDS.KEYID = 0
3,844,821 ready_for_fw is high
3,845,008 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,978,945 UART: [idev] Erasing UDS.KEYID = 0
6,310,084 UART: [idev] Sha1 KeyId Algorithm
6,333,479 UART: [idev] --
6,336,503 UART: [ldev] ++
6,337,069 UART: [ldev] CDI.KEYID = 6
6,338,143 UART: [ldev] SUBJECT.KEYID = 5
6,339,266 UART: [ldev] AUTHORITY.KEYID = 7
6,340,448 UART: [ldev] FE.KEYID = 1
6,350,716 UART: [ldev] Erasing FE.KEYID = 1
8,820,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,722 UART: [ldev] --
10,610,949 UART: [fwproc] Wait for Commands...
10,612,822 UART: [fwproc] Recv command 0x46574c44
10,614,956 UART: [fwproc] Recv'd Img size: 106600 bytes
13,925,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,057 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,624 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,358,829 >>> mbox cmd response: success
14,362,519 UART: [afmc] ++
14,363,112 UART: [afmc] CDI.KEYID = 6
14,363,995 UART: [afmc] SUBJECT.KEYID = 7
14,365,208 UART: [afmc] AUTHORITY.KEYID = 5
16,862,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,585,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,587,011 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,602,960 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,618,886 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,634,912 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,657,213 UART: [afmc] --
18,661,622 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,662,540 UART: [cold-reset] --
18,666,214 UART: [state] Locking Datavault
18,671,734 UART: [state] Locking PCR0, PCR1 and PCR31
18,673,381 UART: [state] Locking ICCM
18,675,604 UART: [exit] Launching FMC @ 0x40000000
18,683,945 UART:
18,684,178 UART: Running Caliptra FMC ...
18,685,273 UART:
18,685,424 UART: [fmc] Received command: 0x1000000B
18,686,874 UART:
18,687,024 UART: Running Caliptra ROM ...
18,688,121 UART:
18,688,272 UART: [state] CFI Enabled
18,703,888 UART: [state] LifecycleState = Unprovisioned
18,705,820 UART: [state] DebugLocked = No
18,707,416 UART: [state] WD Timer not started. Device not locked for debugging
18,711,620 UART: [kat] SHA2-256
18,890,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,902,334 UART: [kat] ++
18,902,870 UART: [kat] sha1
18,914,481 UART: [kat] SHA2-256
18,917,490 UART: [kat] SHA2-384
18,923,736 UART: [kat] SHA2-512-ACC
18,926,679 UART: [kat] ECC-384
21,368,025 UART: [kat] HMAC-384Kdf
21,380,682 UART: [kat] LMS
21,910,196 UART: [kat] --
21,912,247 UART: [update-reset] ++
21,913,170 UART: Invalid command 0x1000000b recv
21,917,203 UART: ROM Non-Fatal Error: 0x01040003
21,920,302 UART: [state] Locking Datavault
21,923,330 UART: [state] Locking PCR0, PCR1 and PCR31
21,925,005 UART: [state] Locking ICCM
21,926,016 UART: [exit] Launching FMC @ 0x40000000
21,934,411 UART:
21,934,650 UART: Running Caliptra FMC ...
21,935,724 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,700,110 ready_for_fw is high
3,700,722 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,162,515 >>> mbox cmd response: success
18,400,071 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,414,191 UART:
18,414,561 UART: Running Caliptra FMC ...
18,415,845 UART:
18,416,014 UART: [fmc] Received command: 0x1000000B
21,512,355 UART:
21,512,689 UART: Running Caliptra FMC ...
21,513,797 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,174,747 ready_for_fw is high
1,174,747 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,073 UART: [idev] Erasing UDS.KEYID = 0
1,198,511 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,720 UART: [fwproc] Wait for Commands...
1,281,333 UART: [fwproc] Recv command 0x46574c44
1,282,066 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,515,673 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,533,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,669,096 >>> mbox cmd response: success
2,670,289 UART: [afmc] ++
2,670,457 UART: [afmc] CDI.KEYID = 6
2,670,820 UART: [afmc] SUBJECT.KEYID = 7
2,671,246 UART: [afmc] AUTHORITY.KEYID = 5
2,707,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,395 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,730,115 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,008 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,701 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,664 UART: [afmc] --
2,750,688 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,750,710 UART: [cold-reset] --
2,751,590 UART: [state] Locking Datavault
2,752,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,377 UART: [state] Locking ICCM
2,754,037 UART: [exit] Launching FMC @ 0x40000000
2,759,334 UART:
2,759,350 UART: Running Caliptra FMC ...
2,759,758 UART:
2,759,896 UART: [fmc] Received command: 0x1000000B
2,760,728 UART:
2,760,744 UART: Running Caliptra ROM ...
2,761,152 UART:
2,761,207 UART: [state] CFI Enabled
2,764,049 UART: [state] LifecycleState = Unprovisioned
2,764,704 UART: [state] DebugLocked = No
2,765,244 UART: [state] WD Timer not started. Device not locked for debugging
2,766,478 UART: [kat] SHA2-256
3,570,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,574,157 UART: [kat] ++
3,574,309 UART: [kat] sha1
3,578,453 UART: [kat] SHA2-256
3,580,393 UART: [kat] SHA2-384
3,583,080 UART: [kat] SHA2-512-ACC
3,584,980 UART: [kat] ECC-384
3,594,469 UART: [kat] HMAC-384Kdf
3,599,175 UART: [kat] LMS
3,847,487 UART: [kat] --
3,848,385 UART: [update-reset] ++
3,848,702 UART: Invalid command 0x1000000b recv
3,849,836 UART: ROM Non-Fatal Error: 0x01040003
3,850,650 UART: [state] Locking Datavault
3,851,350 UART: [state] Locking PCR0, PCR1 and PCR31
3,851,954 UART: [state] Locking ICCM
3,852,580 UART: [exit] Launching FMC @ 0x40000000
3,857,877 UART:
3,857,893 UART: Running Caliptra FMC ...
3,858,301 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,728 ready_for_fw is high
1,055,728 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,247 >>> mbox cmd response: success
2,576,731 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,582,762 UART:
2,582,778 UART: Running Caliptra FMC ...
2,583,186 UART:
2,583,324 UART: [fmc] Received command: 0x1000000B
3,561,667 UART:
3,561,683 UART: Running Caliptra FMC ...
3,562,091 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,118 UART: [kat] ++
896,270 UART: [kat] sha1
900,446 UART: [kat] SHA2-256
902,386 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,208 UART: [idev] Erasing UDS.KEYID = 0
1,199,196 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,511 UART: [ldev] Erasing FE.KEYID = 1
1,241,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,427 UART: [fwproc] Wait for Commands...
1,282,000 UART: [fwproc] Recv command 0x46574c44
1,282,733 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,448 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,670,931 >>> mbox cmd response: success
2,672,042 UART: [afmc] ++
2,672,210 UART: [afmc] CDI.KEYID = 6
2,672,573 UART: [afmc] SUBJECT.KEYID = 7
2,672,999 UART: [afmc] AUTHORITY.KEYID = 5
2,708,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,884 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,604 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,497 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,190 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,015 UART: [afmc] --
2,751,961 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,751,983 UART: [cold-reset] --
2,752,923 UART: [state] Locking Datavault
2,754,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,942 UART: [state] Locking ICCM
2,755,488 UART: [exit] Launching FMC @ 0x40000000
2,760,785 UART:
2,760,801 UART: Running Caliptra FMC ...
2,761,209 UART:
2,761,347 UART: [fmc] Received command: 0x1000000B
2,762,179 UART:
2,762,195 UART: Running Caliptra ROM ...
2,762,603 UART:
2,762,745 UART: [state] CFI Enabled
2,765,869 UART: [state] LifecycleState = Unprovisioned
2,766,524 UART: [state] DebugLocked = No
2,767,030 UART: [state] WD Timer not started. Device not locked for debugging
2,768,214 UART: [kat] SHA2-256
3,571,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,893 UART: [kat] ++
3,576,045 UART: [kat] sha1
3,580,283 UART: [kat] SHA2-256
3,582,223 UART: [kat] SHA2-384
3,585,070 UART: [kat] SHA2-512-ACC
3,586,970 UART: [kat] ECC-384
3,596,803 UART: [kat] HMAC-384Kdf
3,601,373 UART: [kat] LMS
3,849,685 UART: [kat] --
3,850,497 UART: [update-reset] ++
3,850,814 UART: Invalid command 0x1000000b recv
3,851,936 UART: ROM Non-Fatal Error: 0x01040003
3,852,888 UART: [state] Locking Datavault
3,853,714 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,318 UART: [state] Locking ICCM
3,854,846 UART: [exit] Launching FMC @ 0x40000000
3,860,143 UART:
3,860,159 UART: Running Caliptra FMC ...
3,860,567 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,039 ready_for_fw is high
1,057,039 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,469 >>> mbox cmd response: success
2,578,099 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,584,474 UART:
2,584,490 UART: Running Caliptra FMC ...
2,584,898 UART:
2,585,036 UART: [fmc] Received command: 0x1000000B
3,563,602 UART:
3,563,618 UART: Running Caliptra FMC ...
3,564,026 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 ready_for_fw is high
1,174,363 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,647 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,087 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,640 >>> mbox cmd response: success
2,672,851 UART: [afmc] ++
2,673,019 UART: [afmc] CDI.KEYID = 6
2,673,382 UART: [afmc] SUBJECT.KEYID = 7
2,673,808 UART: [afmc] AUTHORITY.KEYID = 5
2,709,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,827 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,547 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,440 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,133 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,918 UART: [afmc] --
2,752,868 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,752,890 UART: [cold-reset] --
2,753,934 UART: [state] Locking Datavault
2,755,133 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,737 UART: [state] Locking ICCM
2,756,191 UART: [exit] Launching FMC @ 0x40000000
2,761,488 UART:
2,761,504 UART: Running Caliptra FMC ...
2,761,912 UART:
2,762,050 UART: [fmc] Received command: 0x1000000B
2,762,882 UART:
2,762,898 UART: Running Caliptra ROM ...
2,763,306 UART:
2,763,361 UART: [state] CFI Enabled
2,765,815 UART: [state] LifecycleState = Unprovisioned
2,766,470 UART: [state] DebugLocked = No
2,767,124 UART: [state] WD Timer not started. Device not locked for debugging
2,768,376 UART: [kat] SHA2-256
3,571,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,055 UART: [kat] ++
3,576,207 UART: [kat] sha1
3,580,485 UART: [kat] SHA2-256
3,582,425 UART: [kat] SHA2-384
3,585,224 UART: [kat] SHA2-512-ACC
3,587,124 UART: [kat] ECC-384
3,596,625 UART: [kat] HMAC-384Kdf
3,601,061 UART: [kat] LMS
3,849,373 UART: [kat] --
3,850,333 UART: [update-reset] ++
3,850,650 UART: Invalid command 0x1000000b recv
3,851,784 UART: ROM Non-Fatal Error: 0x01040003
3,852,788 UART: [state] Locking Datavault
3,853,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,096 UART: [state] Locking ICCM
3,854,670 UART: [exit] Launching FMC @ 0x40000000
3,859,967 UART:
3,859,983 UART: Running Caliptra FMC ...
3,860,391 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,338 ready_for_fw is high
1,056,338 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,624 >>> mbox cmd response: success
2,577,364 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,583,683 UART:
2,583,699 UART: Running Caliptra FMC ...
2,584,107 UART:
2,584,245 UART: [fmc] Received command: 0x1000000B
3,562,560 UART:
3,562,576 UART: Running Caliptra FMC ...
3,562,984 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,170,260 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,174,822 ready_for_fw is high
1,174,822 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,198,896 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,859 UART: [ldev] ++
1,209,027 UART: [ldev] CDI.KEYID = 6
1,209,391 UART: [ldev] SUBJECT.KEYID = 5
1,209,818 UART: [ldev] AUTHORITY.KEYID = 7
1,210,281 UART: [ldev] FE.KEYID = 1
1,215,383 UART: [ldev] Erasing FE.KEYID = 1
1,241,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,309 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,290 UART: [fwproc] Recv command 0x46574c44
1,282,023 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,594 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,223 >>> mbox cmd response: success
2,673,376 UART: [afmc] ++
2,673,544 UART: [afmc] CDI.KEYID = 6
2,673,907 UART: [afmc] SUBJECT.KEYID = 7
2,674,333 UART: [afmc] AUTHORITY.KEYID = 5
2,710,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,764 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,484 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,377 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,070 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,897 UART: [afmc] --
2,753,981 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,003 UART: [cold-reset] --
2,754,709 UART: [state] Locking Datavault
2,755,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,438 UART: [state] Locking ICCM
2,756,994 UART: [exit] Launching FMC @ 0x40000000
2,762,291 UART:
2,762,307 UART: Running Caliptra FMC ...
2,762,715 UART:
2,762,853 UART: [fmc] Received command: 0x1000000B
2,763,685 UART:
2,763,701 UART: Running Caliptra ROM ...
2,764,109 UART:
2,764,251 UART: [state] CFI Enabled
2,767,173 UART: [state] LifecycleState = Unprovisioned
2,767,828 UART: [state] DebugLocked = No
2,768,422 UART: [state] WD Timer not started. Device not locked for debugging
2,769,732 UART: [kat] SHA2-256
3,573,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,411 UART: [kat] ++
3,577,563 UART: [kat] sha1
3,582,015 UART: [kat] SHA2-256
3,583,955 UART: [kat] SHA2-384
3,586,706 UART: [kat] SHA2-512-ACC
3,588,606 UART: [kat] ECC-384
3,598,655 UART: [kat] HMAC-384Kdf
3,603,273 UART: [kat] LMS
3,851,585 UART: [kat] --
3,852,617 UART: [update-reset] ++
3,852,934 UART: Invalid command 0x1000000b recv
3,854,084 UART: ROM Non-Fatal Error: 0x01040003
3,854,906 UART: [state] Locking Datavault
3,855,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,252 UART: [state] Locking ICCM
3,856,862 UART: [exit] Launching FMC @ 0x40000000
3,862,159 UART:
3,862,175 UART: Running Caliptra FMC ...
3,862,583 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,305 ready_for_fw is high
1,057,305 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,524,081 >>> mbox cmd response: success
2,579,693 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,585,684 UART:
2,585,700 UART: Running Caliptra FMC ...
2,586,108 UART:
2,586,246 UART: [fmc] Received command: 0x1000000B
3,564,572 UART:
3,564,588 UART: Running Caliptra FMC ...
3,564,996 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,046 UART: [kat] SHA2-512-ACC
905,947 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,174,391 ready_for_fw is high
1,174,391 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,631 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,658 UART: [ldev] ++
1,209,826 UART: [ldev] CDI.KEYID = 6
1,210,190 UART: [ldev] SUBJECT.KEYID = 5
1,210,617 UART: [ldev] AUTHORITY.KEYID = 7
1,211,080 UART: [ldev] FE.KEYID = 1
1,216,592 UART: [ldev] Erasing FE.KEYID = 1
1,242,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,500 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,637 UART: [fwproc] Recv command 0x46574c44
1,283,370 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,713 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,118 >>> mbox cmd response: success
2,673,301 UART: [afmc] ++
2,673,469 UART: [afmc] CDI.KEYID = 6
2,673,832 UART: [afmc] SUBJECT.KEYID = 7
2,674,258 UART: [afmc] AUTHORITY.KEYID = 5
2,710,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,337 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,057 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,950 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,643 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,610 UART: [afmc] --
2,753,680 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,753,702 UART: [cold-reset] --
2,754,750 UART: [state] Locking Datavault
2,756,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,711 UART: [state] Locking ICCM
2,757,223 UART: [exit] Launching FMC @ 0x40000000
2,762,520 UART:
2,762,536 UART: Running Caliptra FMC ...
2,762,944 UART:
2,763,082 UART: [fmc] Received command: 0x1000000B
2,763,914 UART:
2,763,930 UART: Running Caliptra ROM ...
2,764,338 UART:
2,764,393 UART: [state] CFI Enabled
2,767,269 UART: [state] LifecycleState = Unprovisioned
2,767,924 UART: [state] DebugLocked = No
2,768,458 UART: [state] WD Timer not started. Device not locked for debugging
2,769,618 UART: [kat] SHA2-256
3,573,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,297 UART: [kat] ++
3,577,449 UART: [kat] sha1
3,581,811 UART: [kat] SHA2-256
3,583,751 UART: [kat] SHA2-384
3,586,514 UART: [kat] SHA2-512-ACC
3,588,414 UART: [kat] ECC-384
3,597,847 UART: [kat] HMAC-384Kdf
3,602,437 UART: [kat] LMS
3,850,749 UART: [kat] --
3,851,535 UART: [update-reset] ++
3,851,852 UART: Invalid command 0x1000000b recv
3,852,818 UART: ROM Non-Fatal Error: 0x01040003
3,853,692 UART: [state] Locking Datavault
3,854,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,020 UART: [state] Locking ICCM
3,855,596 UART: [exit] Launching FMC @ 0x40000000
3,860,893 UART:
3,860,909 UART: Running Caliptra FMC ...
3,861,317 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,468 ready_for_fw is high
1,056,468 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,520,466 >>> mbox cmd response: success
2,575,792 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,582,147 UART:
2,582,163 UART: Running Caliptra FMC ...
2,582,571 UART:
2,582,709 UART: [fmc] Received command: 0x1000000B
3,560,226 UART:
3,560,242 UART: Running Caliptra FMC ...
3,560,650 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,750 UART: [idev] ++
1,172,918 UART: [idev] CDI.KEYID = 6
1,173,279 UART: [idev] SUBJECT.KEYID = 7
1,173,704 UART: [idev] UDS.KEYID = 0
1,174,050 ready_for_fw is high
1,174,050 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,830 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,474 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,995 >>> mbox cmd response: success
2,673,262 UART: [afmc] ++
2,673,430 UART: [afmc] CDI.KEYID = 6
2,673,793 UART: [afmc] SUBJECT.KEYID = 7
2,674,219 UART: [afmc] AUTHORITY.KEYID = 5
2,709,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,620 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,340 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,233 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,926 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,793 UART: [afmc] --
2,752,833 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,752,855 UART: [cold-reset] --
2,753,545 UART: [state] Locking Datavault
2,754,806 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,410 UART: [state] Locking ICCM
2,756,004 UART: [exit] Launching FMC @ 0x40000000
2,761,301 UART:
2,761,317 UART: Running Caliptra FMC ...
2,761,725 UART:
2,761,863 UART: [fmc] Received command: 0x1000000B
2,762,695 UART:
2,762,711 UART: Running Caliptra ROM ...
2,763,119 UART:
2,763,261 UART: [state] CFI Enabled
2,766,331 UART: [state] LifecycleState = Unprovisioned
2,766,986 UART: [state] DebugLocked = No
2,767,580 UART: [state] WD Timer not started. Device not locked for debugging
2,768,722 UART: [kat] SHA2-256
3,572,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,401 UART: [kat] ++
3,576,553 UART: [kat] sha1
3,580,639 UART: [kat] SHA2-256
3,582,579 UART: [kat] SHA2-384
3,585,344 UART: [kat] SHA2-512-ACC
3,587,244 UART: [kat] ECC-384
3,597,411 UART: [kat] HMAC-384Kdf
3,601,955 UART: [kat] LMS
3,850,267 UART: [kat] --
3,851,331 UART: [update-reset] ++
3,851,648 UART: Invalid command 0x1000000b recv
3,852,702 UART: ROM Non-Fatal Error: 0x01040003
3,853,598 UART: [state] Locking Datavault
3,854,222 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,826 UART: [state] Locking ICCM
3,855,388 UART: [exit] Launching FMC @ 0x40000000
3,860,685 UART:
3,860,701 UART: Running Caliptra FMC ...
3,861,109 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,643 ready_for_fw is high
1,056,643 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,631 >>> mbox cmd response: success
2,578,497 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,584,714 UART:
2,584,730 UART: Running Caliptra FMC ...
2,585,138 UART:
2,585,276 UART: [fmc] Received command: 0x1000000B
3,564,304 UART:
3,564,320 UART: Running Caliptra FMC ...
3,564,728 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,131 UART:
192,511 UART: Running Caliptra ROM ...
193,689 UART:
193,843 UART: [state] CFI Enabled
263,794 UART: [state] LifecycleState = Unprovisioned
266,144 UART: [state] DebugLocked = No
268,672 UART: [state] WD Timer not started. Device not locked for debugging
273,059 UART: [kat] SHA2-256
455,024 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,553 UART: [kat] ++
467,032 UART: [kat] sha1
477,623 UART: [kat] SHA2-256
480,703 UART: [kat] SHA2-384
485,982 UART: [kat] SHA2-512-ACC
488,636 UART: [kat] ECC-384
3,776,074 UART: [kat] HMAC-384Kdf
3,803,100 UART: [kat] LMS
4,876,302 UART: [kat] --
4,879,868 UART: [cold-reset] ++
4,882,444 UART: [fht] FHT @ 0x50003400
4,893,063 UART: [idev] ++
4,893,771 UART: [idev] CDI.KEYID = 6
4,895,014 UART: [idev] SUBJECT.KEYID = 7
4,896,121 UART: [idev] UDS.KEYID = 0
4,897,045 ready_for_fw is high
4,897,238 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,037,280 UART: [idev] Erasing UDS.KEYID = 0
8,245,474 UART: [idev] Sha1 KeyId Algorithm
8,267,881 UART: [idev] --
8,271,016 UART: [ldev] ++
8,271,593 UART: [ldev] CDI.KEYID = 6
8,272,827 UART: [ldev] SUBJECT.KEYID = 5
8,273,932 UART: [ldev] AUTHORITY.KEYID = 7
8,275,189 UART: [ldev] FE.KEYID = 1
8,318,191 UART: [ldev] Erasing FE.KEYID = 1
11,653,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,639 UART: [ldev] --
14,036,444 UART: [fwproc] Wait for Commands...
14,039,078 UART: [fwproc] Recv command 0x46574c44
14,041,396 UART: [fwproc] Recv'd Img size: 111324 bytes
18,079,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,151,552 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,211,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,526,951 >>> mbox cmd response: success
18,530,998 UART: [afmc] ++
18,531,607 UART: [afmc] CDI.KEYID = 6
18,532,791 UART: [afmc] SUBJECT.KEYID = 7
18,534,030 UART: [afmc] AUTHORITY.KEYID = 5
21,906,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,204,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,206,922 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,223,117 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,239,222 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,255,025 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,279,157 UART: [afmc] --
24,284,598 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,425,217 UART: [cold-reset] --
24,426,093 UART: [state] Locking Datavault
24,427,253 UART: [state] Locking PCR0, PCR1 and PCR31
24,428,792 UART: [state] Locking ICCM
24,429,675 UART: [exit] Launching FMC @ 0x40000000
24,431,033 UART:
24,431,187 UART: Running Caliptra FMC ...
24,432,290 UART:
24,432,444 UART: [fmc] Received command: 0x46574C44
24,433,817 UART:
24,433,959 UART: Running Caliptra ROM ...
24,435,053 UART:
24,435,210 UART: [state] CFI Enabled
24,497,972 UART: [state] LifecycleState = Unprovisioned
24,499,849 UART: [state] DebugLocked = No
24,501,831 UART: [state] WD Timer not started. Device not locked for debugging
24,505,968 UART: [kat] SHA2-256
24,687,850 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,699,417 UART: [kat] ++
24,699,955 UART: [kat] sha1
24,710,631 UART: [kat] SHA2-256
24,713,658 UART: [kat] SHA2-384
24,718,991 UART: [kat] SHA2-512-ACC
24,721,568 UART: [kat] ECC-384
28,009,164 UART: [kat] HMAC-384Kdf
28,035,387 UART: [kat] LMS
29,108,519 UART: [kat] --
29,112,969 UART: [update-reset] ++
33,173,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,176,892 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,549,273 >>> mbox cmd response: success
33,550,578 UART: [update-reset] Copying MAN_2 To MAN_1
33,573,512 UART: [update-reset Success] --
33,575,085 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,576,511 UART: [state] Locking Datavault
33,581,179 UART: [state] Locking PCR0, PCR1 and PCR31
33,582,876 UART: [state] Locking ICCM
33,584,451 UART: [exit] Launching FMC @ 0x40000000
33,593,070 UART:
33,593,311 UART: Running Caliptra FMC ...
33,594,413 UART:
33,594,568 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,596,216 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,803,584 ready_for_fw is high
4,804,112 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,323,302 >>> mbox cmd response: success
24,005,215 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,145,876 UART:
24,146,269 UART: Running Caliptra FMC ...
24,147,398 UART:
24,147,571 UART: [fmc] Received command: 0x46574C44
33,147,273 >>> mbox cmd response: success
33,168,654 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,182,703 UART:
33,182,997 UART: Running Caliptra FMC ...
33,184,094 UART:
33,184,248 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,185,900 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,407 UART:
192,779 UART: Running Caliptra ROM ...
193,970 UART:
603,674 UART: [state] CFI Enabled
619,386 UART: [state] LifecycleState = Unprovisioned
621,685 UART: [state] DebugLocked = No
624,131 UART: [state] WD Timer not started. Device not locked for debugging
628,888 UART: [kat] SHA2-256
810,831 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,407 UART: [kat] ++
823,001 UART: [kat] sha1
833,457 UART: [kat] SHA2-256
836,435 UART: [kat] SHA2-384
842,299 UART: [kat] SHA2-512-ACC
844,887 UART: [kat] ECC-384
4,098,803 UART: [kat] HMAC-384Kdf
4,110,966 UART: [kat] LMS
5,184,097 UART: [kat] --
5,187,471 UART: [cold-reset] ++
5,189,616 UART: [fht] FHT @ 0x50003400
5,200,516 UART: [idev] ++
5,201,151 UART: [idev] CDI.KEYID = 6
5,202,392 UART: [idev] SUBJECT.KEYID = 7
5,203,861 UART: [idev] UDS.KEYID = 0
5,205,049 ready_for_fw is high
5,205,243 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,345,030 UART: [idev] Erasing UDS.KEYID = 0
8,497,688 UART: [idev] Sha1 KeyId Algorithm
8,518,223 UART: [idev] --
8,523,425 UART: [ldev] ++
8,523,995 UART: [ldev] CDI.KEYID = 6
8,525,224 UART: [ldev] SUBJECT.KEYID = 5
8,526,703 UART: [ldev] AUTHORITY.KEYID = 7
8,528,252 UART: [ldev] FE.KEYID = 1
8,538,781 UART: [ldev] Erasing FE.KEYID = 1
11,830,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,523 UART: [ldev] --
14,198,134 UART: [fwproc] Wait for Commands...
14,199,946 UART: [fwproc] Recv command 0x46574c44
14,202,262 UART: [fwproc] Recv'd Img size: 111324 bytes
18,244,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,322,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,382,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,697,381 >>> mbox cmd response: success
18,701,731 UART: [afmc] ++
18,702,318 UART: [afmc] CDI.KEYID = 6
18,703,423 UART: [afmc] SUBJECT.KEYID = 7
18,704,688 UART: [afmc] AUTHORITY.KEYID = 5
22,020,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,315,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,318,258 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,334,450 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,350,553 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,366,418 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,390,399 UART: [afmc] --
24,395,119 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,535,652 UART: [cold-reset] --
24,536,523 UART: [state] Locking Datavault
24,537,594 UART: [state] Locking PCR0, PCR1 and PCR31
24,539,128 UART: [state] Locking ICCM
24,540,004 UART: [exit] Launching FMC @ 0x40000000
24,541,347 UART:
24,541,487 UART: Running Caliptra FMC ...
24,542,577 UART:
24,542,724 UART: [fmc] Received command: 0x46574C44
24,544,171 UART:
24,544,318 UART: Running Caliptra ROM ...
24,545,426 UART:
24,545,577 UART: [state] CFI Enabled
24,551,836 UART: [state] LifecycleState = Unprovisioned
24,553,652 UART: [state] DebugLocked = No
24,555,285 UART: [state] WD Timer not started. Device not locked for debugging
24,559,668 UART: [kat] SHA2-256
24,741,620 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,753,161 UART: [kat] ++
24,753,613 UART: [kat] sha1
24,763,159 UART: [kat] SHA2-256
24,766,162 UART: [kat] SHA2-384
24,771,228 UART: [kat] SHA2-512-ACC
24,773,838 UART: [kat] ECC-384
28,029,268 UART: [kat] HMAC-384Kdf
28,040,575 UART: [kat] LMS
29,113,704 UART: [kat] --
29,118,651 UART: [update-reset] ++
33,177,045 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,180,156 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
33,552,529 >>> mbox cmd response: success
33,554,270 UART: [update-reset] Copying MAN_2 To MAN_1
33,577,141 UART: [update-reset Success] --
33,578,818 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,582,445 UART: [state] Locking Datavault
33,586,559 UART: [state] Locking PCR0, PCR1 and PCR31
33,588,256 UART: [state] Locking ICCM
33,591,207 UART: [exit] Launching FMC @ 0x40000000
33,599,868 UART:
33,600,102 UART: Running Caliptra FMC ...
33,601,199 UART:
33,601,347 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,602,989 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
5,099,777 ready_for_fw is high
5,100,215 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,492,537 >>> mbox cmd response: success
24,120,208 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
24,260,589 UART:
24,260,970 UART: Running Caliptra FMC ...
24,262,174 UART:
24,262,333 UART: [fmc] Received command: 0x46574C44
33,176,123 >>> mbox cmd response: success
33,198,400 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,211,799 UART:
33,212,048 UART: Running Caliptra FMC ...
33,213,220 UART:
33,213,400 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,215,033 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,005 UART:
192,388 UART: Running Caliptra ROM ...
193,478 UART:
193,621 UART: [state] CFI Enabled
261,698 UART: [state] LifecycleState = Unprovisioned
263,572 UART: [state] DebugLocked = No
265,730 UART: [state] WD Timer not started. Device not locked for debugging
269,834 UART: [kat] SHA2-256
449,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,585 UART: [kat] ++
461,049 UART: [kat] sha1
471,574 UART: [kat] SHA2-256
474,651 UART: [kat] SHA2-384
480,711 UART: [kat] SHA2-512-ACC
483,723 UART: [kat] ECC-384
2,948,393 UART: [kat] HMAC-384Kdf
2,971,658 UART: [kat] LMS
3,501,138 UART: [kat] --
3,505,917 UART: [cold-reset] ++
3,507,917 UART: [fht] FHT @ 0x50003400
3,518,398 UART: [idev] ++
3,518,961 UART: [idev] CDI.KEYID = 6
3,519,841 UART: [idev] SUBJECT.KEYID = 7
3,521,087 UART: [idev] UDS.KEYID = 0
3,521,991 ready_for_fw is high
3,522,202 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,662,760 UART: [idev] Erasing UDS.KEYID = 0
6,028,824 UART: [idev] Sha1 KeyId Algorithm
6,052,059 UART: [idev] --
6,055,622 UART: [ldev] ++
6,056,211 UART: [ldev] CDI.KEYID = 6
6,057,143 UART: [ldev] SUBJECT.KEYID = 5
6,058,304 UART: [ldev] AUTHORITY.KEYID = 7
6,059,538 UART: [ldev] FE.KEYID = 1
6,100,160 UART: [ldev] Erasing FE.KEYID = 1
8,605,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,544 UART: [ldev] --
10,414,807 UART: [fwproc] Wait for Commands...
10,416,539 UART: [fwproc] Recv command 0x46574c44
10,418,636 UART: [fwproc] Recv'd Img size: 111668 bytes
13,781,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,859,094 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,919,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,236,488 >>> mbox cmd response: success
14,240,706 UART: [afmc] ++
14,241,298 UART: [afmc] CDI.KEYID = 6
14,242,180 UART: [afmc] SUBJECT.KEYID = 7
14,243,394 UART: [afmc] AUTHORITY.KEYID = 5
16,782,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,313 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,358 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,387 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,090 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,582,323 UART: [afmc] --
18,587,662 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,728,623 UART: [cold-reset] --
18,729,494 UART: [state] Locking Datavault
18,730,571 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,112 UART: [state] Locking ICCM
18,732,988 UART: [exit] Launching FMC @ 0x40000000
18,734,333 UART:
18,734,482 UART: Running Caliptra FMC ...
18,735,582 UART:
18,735,736 UART: [fmc] Received command: 0x46574C44
18,737,195 UART:
18,737,347 UART: Running Caliptra ROM ...
18,738,447 UART:
18,738,603 UART: [state] CFI Enabled
18,798,362 UART: [state] LifecycleState = Unprovisioned
18,800,260 UART: [state] DebugLocked = No
18,802,051 UART: [state] WD Timer not started. Device not locked for debugging
18,806,658 UART: [kat] SHA2-256
18,985,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,997,362 UART: [kat] ++
18,997,820 UART: [kat] sha1
19,009,674 UART: [kat] SHA2-256
19,012,748 UART: [kat] SHA2-384
19,018,678 UART: [kat] SHA2-512-ACC
19,021,630 UART: [kat] ECC-384
21,484,824 UART: [kat] HMAC-384Kdf
21,507,957 UART: [kat] LMS
22,037,388 UART: [kat] --
22,041,490 UART: [update-reset] ++
25,435,472 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,439,230 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,812,801 >>> mbox cmd response: success
25,814,323 UART: [update-reset] Copying MAN_2 To MAN_1
25,836,658 UART: [update-reset Success] --
25,837,921 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,840,784 UART: [state] Locking Datavault
25,844,683 UART: [state] Locking PCR0, PCR1 and PCR31
25,846,381 UART: [state] Locking ICCM
25,847,512 UART: [exit] Launching FMC @ 0x40000000
25,855,912 UART:
25,856,154 UART: Running Caliptra FMC ...
25,857,256 UART:
25,857,412 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,859,045 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,930 writing to cptra_bootfsm_go
3,359,120 ready_for_fw is high
3,359,503 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,019,149 >>> mbox cmd response: success
18,286,938 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,427,996 UART:
18,428,378 UART: Running Caliptra FMC ...
18,429,580 UART:
18,429,750 UART: [fmc] Received command: 0x46574C44
25,379,565 >>> mbox cmd response: success
25,401,233 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,413,168 UART:
25,413,420 UART: Running Caliptra FMC ...
25,414,506 UART:
25,414,658 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,416,300 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,464 UART:
192,820 UART: Running Caliptra ROM ...
193,962 UART:
603,431 UART: [state] CFI Enabled
618,653 UART: [state] LifecycleState = Unprovisioned
620,535 UART: [state] DebugLocked = No
623,483 UART: [state] WD Timer not started. Device not locked for debugging
627,660 UART: [kat] SHA2-256
806,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,371 UART: [kat] ++
818,897 UART: [kat] sha1
829,915 UART: [kat] SHA2-256
832,988 UART: [kat] SHA2-384
839,110 UART: [kat] SHA2-512-ACC
842,040 UART: [kat] ECC-384
3,287,244 UART: [kat] HMAC-384Kdf
3,300,111 UART: [kat] LMS
3,829,603 UART: [kat] --
3,834,330 UART: [cold-reset] ++
3,836,734 UART: [fht] FHT @ 0x50003400
3,847,923 UART: [idev] ++
3,848,494 UART: [idev] CDI.KEYID = 6
3,849,411 UART: [idev] SUBJECT.KEYID = 7
3,850,580 UART: [idev] UDS.KEYID = 0
3,851,573 ready_for_fw is high
3,851,774 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,991,948 UART: [idev] Erasing UDS.KEYID = 0
6,323,989 UART: [idev] Sha1 KeyId Algorithm
6,346,793 UART: [idev] --
6,350,245 UART: [ldev] ++
6,350,812 UART: [ldev] CDI.KEYID = 6
6,351,718 UART: [ldev] SUBJECT.KEYID = 5
6,352,928 UART: [ldev] AUTHORITY.KEYID = 7
6,354,151 UART: [ldev] FE.KEYID = 1
6,365,700 UART: [ldev] Erasing FE.KEYID = 1
8,841,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,956 UART: [ldev] --
10,631,404 UART: [fwproc] Wait for Commands...
10,633,166 UART: [fwproc] Recv command 0x46574c44
10,635,300 UART: [fwproc] Recv'd Img size: 111668 bytes
13,999,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,071,204 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,131,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,447,830 >>> mbox cmd response: success
14,452,943 UART: [afmc] ++
14,453,534 UART: [afmc] CDI.KEYID = 6
14,454,442 UART: [afmc] SUBJECT.KEYID = 7
14,455,673 UART: [afmc] AUTHORITY.KEYID = 5
16,959,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,679,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,681,684 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,697,741 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,713,944 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,729,493 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,751,478 UART: [afmc] --
18,756,326 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,897,283 UART: [cold-reset] --
18,898,147 UART: [state] Locking Datavault
18,899,300 UART: [state] Locking PCR0, PCR1 and PCR31
18,900,833 UART: [state] Locking ICCM
18,901,734 UART: [exit] Launching FMC @ 0x40000000
18,903,159 UART:
18,903,318 UART: Running Caliptra FMC ...
18,904,431 UART:
18,904,590 UART: [fmc] Received command: 0x46574C44
18,906,054 UART:
18,906,208 UART: Running Caliptra ROM ...
18,907,220 UART:
18,907,363 UART: [state] CFI Enabled
18,910,679 UART: [state] LifecycleState = Unprovisioned
18,912,495 UART: [state] DebugLocked = No
18,913,739 UART: [state] WD Timer not started. Device not locked for debugging
18,917,893 UART: [kat] SHA2-256
19,097,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,108,667 UART: [kat] ++
19,109,121 UART: [kat] sha1
19,120,325 UART: [kat] SHA2-256
19,123,381 UART: [kat] SHA2-384
19,129,746 UART: [kat] SHA2-512-ACC
19,132,706 UART: [kat] ECC-384
21,571,797 UART: [kat] HMAC-384Kdf
21,584,995 UART: [kat] LMS
22,114,485 UART: [kat] --
22,117,717 UART: [update-reset] ++
25,510,672 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,514,367 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,887,940 >>> mbox cmd response: success
25,888,708 UART: [update-reset] Copying MAN_2 To MAN_1
25,911,039 UART: [update-reset Success] --
25,912,356 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,916,579 UART: [state] Locking Datavault
25,919,382 UART: [state] Locking PCR0, PCR1 and PCR31
25,921,086 UART: [state] Locking ICCM
25,922,237 UART: [exit] Launching FMC @ 0x40000000
25,930,628 UART:
25,930,882 UART: Running Caliptra FMC ...
25,931,904 UART:
25,932,050 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,933,683 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,697,982 ready_for_fw is high
3,698,406 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,228,314 >>> mbox cmd response: success
18,463,952 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,605,339 UART:
18,605,723 UART: Running Caliptra FMC ...
18,606,921 UART:
18,607,098 UART: [fmc] Received command: 0x46574C44
25,470,357 >>> mbox cmd response: success
25,491,464 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,503,561 UART:
25,503,812 UART: Running Caliptra FMC ...
25,504,976 UART:
25,505,137 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,506,768 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,206 UART:
192,565 UART: Running Caliptra ROM ...
193,748 UART:
193,897 UART: [state] CFI Enabled
266,778 UART: [state] LifecycleState = Unprovisioned
268,637 UART: [state] DebugLocked = No
271,023 UART: [state] WD Timer not started. Device not locked for debugging
274,857 UART: [kat] SHA2-256
453,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,510 UART: [kat] ++
465,972 UART: [kat] sha1
476,632 UART: [kat] SHA2-256
479,646 UART: [kat] SHA2-384
485,141 UART: [kat] SHA2-512-ACC
488,075 UART: [kat] ECC-384
2,946,467 UART: [kat] HMAC-384Kdf
2,973,257 UART: [kat] LMS
3,502,671 UART: [kat] --
3,505,744 UART: [cold-reset] ++
3,507,181 UART: [fht] FHT @ 0x50003400
3,519,811 UART: [idev] ++
3,520,389 UART: [idev] CDI.KEYID = 6
3,521,300 UART: [idev] SUBJECT.KEYID = 7
3,522,474 UART: [idev] UDS.KEYID = 0
3,523,519 ready_for_fw is high
3,523,710 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,664,155 UART: [idev] Erasing UDS.KEYID = 0
6,027,691 UART: [idev] Sha1 KeyId Algorithm
6,050,765 UART: [idev] --
6,053,579 UART: [ldev] ++
6,054,161 UART: [ldev] CDI.KEYID = 6
6,055,070 UART: [ldev] SUBJECT.KEYID = 5
6,056,241 UART: [ldev] AUTHORITY.KEYID = 7
6,057,530 UART: [ldev] FE.KEYID = 1
6,101,497 UART: [ldev] Erasing FE.KEYID = 1
8,607,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,654 UART: [ldev] --
10,414,975 UART: [fwproc] Wait for Commands...
10,416,427 UART: [fwproc] Recv command 0x46574c44
10,418,522 UART: [fwproc] Recv'd Img size: 111668 bytes
13,794,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,861,742 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,238,760 >>> mbox cmd response: success
14,243,497 UART: [afmc] ++
14,244,105 UART: [afmc] CDI.KEYID = 6
14,244,991 UART: [afmc] SUBJECT.KEYID = 7
14,246,255 UART: [afmc] AUTHORITY.KEYID = 5
16,787,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,362 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,406 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,463 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,182 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,583,867 UART: [afmc] --
18,588,909 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,729,853 UART: [cold-reset] --
18,730,722 UART: [state] Locking Datavault
18,731,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,412 UART: [state] Locking ICCM
18,734,313 UART: [exit] Launching FMC @ 0x40000000
18,735,736 UART:
18,735,891 UART: Running Caliptra FMC ...
18,736,986 UART:
18,737,157 UART: [fmc] Received command: 0x46574C44
18,738,613 UART:
18,738,763 UART: Running Caliptra ROM ...
18,739,859 UART:
18,740,014 UART: [state] CFI Enabled
18,802,244 UART: [state] LifecycleState = Unprovisioned
18,804,119 UART: [state] DebugLocked = No
18,806,855 UART: [state] WD Timer not started. Device not locked for debugging
18,810,272 UART: [kat] SHA2-256
18,989,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,001,002 UART: [kat] ++
19,001,464 UART: [kat] sha1
19,012,458 UART: [kat] SHA2-256
19,015,472 UART: [kat] SHA2-384
19,020,587 UART: [kat] SHA2-512-ACC
19,023,514 UART: [kat] ECC-384
21,485,078 UART: [kat] HMAC-384Kdf
21,508,805 UART: [kat] LMS
22,038,273 UART: [kat] --
22,043,447 UART: [update-reset] ++
25,434,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,438,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,811,914 >>> mbox cmd response: success
25,812,844 UART: [update-reset] Copying MAN_2 To MAN_1
25,835,132 UART: [update-reset Success] --
25,836,490 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,839,685 UART: [state] Locking Datavault
25,842,667 UART: [state] Locking PCR0, PCR1 and PCR31
25,844,311 UART: [state] Locking ICCM
25,846,481 UART: [exit] Launching FMC @ 0x40000000
25,854,871 UART:
25,855,104 UART: Running Caliptra FMC ...
25,856,147 UART:
25,856,300 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,857,924 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,380,607 ready_for_fw is high
3,380,971 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,016,805 >>> mbox cmd response: success
18,287,883 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,428,927 UART:
18,429,314 UART: Running Caliptra FMC ...
18,430,440 UART:
18,430,596 UART: [fmc] Received command: 0x46574C44
25,385,712 >>> mbox cmd response: success
25,407,089 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,420,110 UART:
25,420,367 UART: Running Caliptra FMC ...
25,421,653 UART:
25,421,819 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,423,473 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,356 UART:
192,734 UART: Running Caliptra ROM ...
193,918 UART:
603,625 UART: [state] CFI Enabled
617,487 UART: [state] LifecycleState = Unprovisioned
619,365 UART: [state] DebugLocked = No
620,977 UART: [state] WD Timer not started. Device not locked for debugging
624,164 UART: [kat] SHA2-256
803,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,833 UART: [kat] ++
815,359 UART: [kat] sha1
826,948 UART: [kat] SHA2-256
829,947 UART: [kat] SHA2-384
835,866 UART: [kat] SHA2-512-ACC
838,870 UART: [kat] ECC-384
3,285,009 UART: [kat] HMAC-384Kdf
3,296,546 UART: [kat] LMS
3,826,078 UART: [kat] --
3,831,901 UART: [cold-reset] ++
3,833,491 UART: [fht] FHT @ 0x50003400
3,843,909 UART: [idev] ++
3,844,469 UART: [idev] CDI.KEYID = 6
3,845,400 UART: [idev] SUBJECT.KEYID = 7
3,846,573 UART: [idev] UDS.KEYID = 0
3,847,567 ready_for_fw is high
3,847,772 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,988,132 UART: [idev] Erasing UDS.KEYID = 0
6,318,093 UART: [idev] Sha1 KeyId Algorithm
6,341,381 UART: [idev] --
6,345,528 UART: [ldev] ++
6,346,102 UART: [ldev] CDI.KEYID = 6
6,347,011 UART: [ldev] SUBJECT.KEYID = 5
6,348,168 UART: [ldev] AUTHORITY.KEYID = 7
6,349,449 UART: [ldev] FE.KEYID = 1
6,360,733 UART: [ldev] Erasing FE.KEYID = 1
8,829,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,439 UART: [ldev] --
10,620,120 UART: [fwproc] Wait for Commands...
10,622,592 UART: [fwproc] Recv command 0x46574c44
10,624,693 UART: [fwproc] Recv'd Img size: 111668 bytes
13,998,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,069,637 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,129,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,446,570 >>> mbox cmd response: success
14,451,347 UART: [afmc] ++
14,451,940 UART: [afmc] CDI.KEYID = 6
14,452,848 UART: [afmc] SUBJECT.KEYID = 7
14,454,061 UART: [afmc] AUTHORITY.KEYID = 5
16,953,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,674,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,676,084 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,692,177 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,708,178 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,838 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,747,617 UART: [afmc] --
18,752,070 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,893,116 UART: [cold-reset] --
18,893,996 UART: [state] Locking Datavault
18,895,152 UART: [state] Locking PCR0, PCR1 and PCR31
18,896,689 UART: [state] Locking ICCM
18,897,594 UART: [exit] Launching FMC @ 0x40000000
18,899,013 UART:
18,899,176 UART: Running Caliptra FMC ...
18,900,268 UART:
18,900,423 UART: [fmc] Received command: 0x46574C44
18,901,875 UART:
18,902,048 UART: Running Caliptra ROM ...
18,903,144 UART:
18,903,297 UART: [state] CFI Enabled
18,913,609 UART: [state] LifecycleState = Unprovisioned
18,915,442 UART: [state] DebugLocked = No
18,916,918 UART: [state] WD Timer not started. Device not locked for debugging
18,920,770 UART: [kat] SHA2-256
19,099,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,111,561 UART: [kat] ++
19,112,104 UART: [kat] sha1
19,123,322 UART: [kat] SHA2-256
19,126,333 UART: [kat] SHA2-384
19,131,766 UART: [kat] SHA2-512-ACC
19,134,700 UART: [kat] ECC-384
21,576,884 UART: [kat] HMAC-384Kdf
21,589,010 UART: [kat] LMS
22,118,523 UART: [kat] --
22,122,944 UART: [update-reset] ++
25,512,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,515,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
25,888,856 >>> mbox cmd response: success
25,889,454 UART: [update-reset] Copying MAN_2 To MAN_1
25,911,754 UART: [update-reset Success] --
25,913,065 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,916,365 UART: [state] Locking Datavault
25,918,808 UART: [state] Locking PCR0, PCR1 and PCR31
25,920,505 UART: [state] Locking ICCM
25,922,706 UART: [exit] Launching FMC @ 0x40000000
25,931,094 UART:
25,931,327 UART: Running Caliptra FMC ...
25,932,427 UART:
25,932,580 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,934,236 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,695,953 ready_for_fw is high
3,696,362 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,233,806 >>> mbox cmd response: success
18,470,245 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
18,611,226 UART:
18,611,636 UART: Running Caliptra FMC ...
18,612,844 UART:
18,613,019 UART: [fmc] Received command: 0x46574C44
25,474,044 >>> mbox cmd response: success
25,496,772 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,509,782 UART:
25,510,036 UART: Running Caliptra FMC ...
25,511,204 UART:
25,511,360 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,513,000 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,081 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 ready_for_fw is high
1,174,569 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,374 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,102 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,075 UART: [fwproc] Recv command 0x46574c44
1,282,808 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,268 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,309 >>> mbox cmd response: success
2,739,366 UART: [afmc] ++
2,739,534 UART: [afmc] CDI.KEYID = 6
2,739,897 UART: [afmc] SUBJECT.KEYID = 7
2,740,323 UART: [afmc] AUTHORITY.KEYID = 5
2,776,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,509 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,205 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,104 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,797 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,597 UART: [afmc] --
2,819,467 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,819,489 UART: [cold-reset] --
2,820,409 UART: [state] Locking Datavault
2,821,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,058 UART: [state] Locking ICCM
2,822,596 UART: [exit] Launching FMC @ 0x40000000
2,827,893 UART:
2,827,909 UART: Running Caliptra FMC ...
2,828,317 UART:
2,828,547 UART: [fmc] Received command: 0x46574C44
2,829,373 UART:
2,829,389 UART: Running Caliptra ROM ...
2,829,797 UART:
2,829,852 UART: [state] CFI Enabled
2,832,480 UART: [state] LifecycleState = Unprovisioned
2,833,135 UART: [state] DebugLocked = No
2,833,869 UART: [state] WD Timer not started. Device not locked for debugging
2,835,009 UART: [kat] SHA2-256
3,638,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,688 UART: [kat] ++
3,642,840 UART: [kat] sha1
3,647,202 UART: [kat] SHA2-256
3,649,142 UART: [kat] SHA2-384
3,652,021 UART: [kat] SHA2-512-ACC
3,653,921 UART: [kat] ECC-384
3,663,890 UART: [kat] HMAC-384Kdf
3,668,456 UART: [kat] LMS
3,916,768 UART: [kat] --
3,917,786 UART: [update-reset] ++
5,199,243 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,432 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,348,072 >>> mbox cmd response: success
5,348,265 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,279 UART: [update-reset Success] --
5,356,688 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,206 UART: [state] Locking Datavault
5,357,876 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,480 UART: [state] Locking ICCM
5,358,986 UART: [exit] Launching FMC @ 0x40000000
5,364,283 UART:
5,364,299 UART: Running Caliptra FMC ...
5,364,707 UART:
5,364,929 UART: [fmc] Received command: 0x1000000C
5,365,664 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,352 ready_for_fw is high
1,056,352 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,213 >>> mbox cmd response: success
2,641,208 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,647,475 UART:
2,647,491 UART: Running Caliptra FMC ...
2,647,899 UART:
2,648,129 UART: [fmc] Received command: 0x46574C44
5,048,979 >>> mbox cmd response: success
5,056,547 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,062,517 UART:
5,062,533 UART: Running Caliptra FMC ...
5,062,941 UART:
5,063,163 UART: [fmc] Received command: 0x1000000C
5,063,898 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,056 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,174,520 ready_for_fw is high
1,174,520 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,956 UART: [idev] Sha1 KeyId Algorithm
1,208,672 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,209 UART: [ldev] SUBJECT.KEYID = 5
1,210,636 UART: [ldev] AUTHORITY.KEYID = 7
1,211,099 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,943 UART: [ldev] --
1,282,365 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,953 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,158 >>> mbox cmd response: success
2,739,203 UART: [afmc] ++
2,739,371 UART: [afmc] CDI.KEYID = 6
2,739,734 UART: [afmc] SUBJECT.KEYID = 7
2,740,160 UART: [afmc] AUTHORITY.KEYID = 5
2,775,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,592 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,288 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,187 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,880 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,758 UART: [afmc] --
2,818,794 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,818,816 UART: [cold-reset] --
2,819,712 UART: [state] Locking Datavault
2,820,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,361 UART: [state] Locking ICCM
2,822,021 UART: [exit] Launching FMC @ 0x40000000
2,827,318 UART:
2,827,334 UART: Running Caliptra FMC ...
2,827,742 UART:
2,827,972 UART: [fmc] Received command: 0x46574C44
2,828,798 UART:
2,828,814 UART: Running Caliptra ROM ...
2,829,222 UART:
2,829,364 UART: [state] CFI Enabled
2,831,948 UART: [state] LifecycleState = Unprovisioned
2,832,603 UART: [state] DebugLocked = No
2,833,287 UART: [state] WD Timer not started. Device not locked for debugging
2,834,455 UART: [kat] SHA2-256
3,638,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,134 UART: [kat] ++
3,642,286 UART: [kat] sha1
3,646,638 UART: [kat] SHA2-256
3,648,578 UART: [kat] SHA2-384
3,651,333 UART: [kat] SHA2-512-ACC
3,653,233 UART: [kat] ECC-384
3,662,914 UART: [kat] HMAC-384Kdf
3,667,626 UART: [kat] LMS
3,915,938 UART: [kat] --
3,916,804 UART: [update-reset] ++
5,197,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,198,656 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,346,296 >>> mbox cmd response: success
5,346,519 UART: [update-reset] Copying MAN_2 To MAN_1
5,354,533 UART: [update-reset Success] --
5,354,942 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,355,732 UART: [state] Locking Datavault
5,356,760 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,364 UART: [state] Locking ICCM
5,357,802 UART: [exit] Launching FMC @ 0x40000000
5,363,099 UART:
5,363,115 UART: Running Caliptra FMC ...
5,363,523 UART:
5,363,745 UART: [fmc] Received command: 0x1000000C
5,364,480 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,017 ready_for_fw is high
1,056,017 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,666 >>> mbox cmd response: success
2,645,483 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,651,594 UART:
2,651,610 UART: Running Caliptra FMC ...
2,652,018 UART:
2,652,248 UART: [fmc] Received command: 0x46574C44
5,053,107 >>> mbox cmd response: success
5,060,843 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,571 UART:
5,066,587 UART: Running Caliptra FMC ...
5,066,995 UART:
5,067,217 UART: [fmc] Received command: 0x1000000C
5,067,952 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,430 UART: [kat] HMAC-384Kdf
919,952 UART: [kat] LMS
1,168,264 UART: [kat] --
1,169,269 UART: [cold-reset] ++
1,169,655 UART: [fht] FHT @ 0x50003400
1,172,203 UART: [idev] ++
1,172,371 UART: [idev] CDI.KEYID = 6
1,172,732 UART: [idev] SUBJECT.KEYID = 7
1,173,157 UART: [idev] UDS.KEYID = 0
1,173,503 ready_for_fw is high
1,173,503 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,180,899 UART: [idev] Erasing UDS.KEYID = 0
1,197,665 UART: [idev] Sha1 KeyId Algorithm
1,206,651 UART: [idev] --
1,207,614 UART: [ldev] ++
1,207,782 UART: [ldev] CDI.KEYID = 6
1,208,146 UART: [ldev] SUBJECT.KEYID = 5
1,208,573 UART: [ldev] AUTHORITY.KEYID = 7
1,209,036 UART: [ldev] FE.KEYID = 1
1,214,188 UART: [ldev] Erasing FE.KEYID = 1
1,240,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,202 UART: [ldev] --
1,279,510 UART: [fwproc] Wait for Commands...
1,280,311 UART: [fwproc] Recv command 0x46574c44
1,281,044 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,574,362 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,735,409 >>> mbox cmd response: success
2,736,464 UART: [afmc] ++
2,736,632 UART: [afmc] CDI.KEYID = 6
2,736,995 UART: [afmc] SUBJECT.KEYID = 7
2,737,421 UART: [afmc] AUTHORITY.KEYID = 5
2,773,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,321 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,796,017 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,801,916 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,807,609 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,815,559 UART: [afmc] --
2,816,519 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,816,541 UART: [cold-reset] --
2,817,419 UART: [state] Locking Datavault
2,818,656 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,260 UART: [state] Locking ICCM
2,819,690 UART: [exit] Launching FMC @ 0x40000000
2,824,987 UART:
2,825,003 UART: Running Caliptra FMC ...
2,825,411 UART:
2,825,641 UART: [fmc] Received command: 0x46574C44
2,826,467 UART:
2,826,483 UART: Running Caliptra ROM ...
2,826,891 UART:
2,826,946 UART: [state] CFI Enabled
2,829,710 UART: [state] LifecycleState = Unprovisioned
2,830,365 UART: [state] DebugLocked = No
2,831,029 UART: [state] WD Timer not started. Device not locked for debugging
2,832,361 UART: [kat] SHA2-256
3,635,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,040 UART: [kat] ++
3,640,192 UART: [kat] sha1
3,644,486 UART: [kat] SHA2-256
3,646,426 UART: [kat] SHA2-384
3,649,273 UART: [kat] SHA2-512-ACC
3,651,173 UART: [kat] ECC-384
3,660,724 UART: [kat] HMAC-384Kdf
3,665,272 UART: [kat] LMS
3,913,584 UART: [kat] --
3,914,354 UART: [update-reset] ++
5,195,015 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,196,172 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,343,812 >>> mbox cmd response: success
5,344,147 UART: [update-reset] Copying MAN_2 To MAN_1
5,352,161 UART: [update-reset Success] --
5,352,570 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,353,238 UART: [state] Locking Datavault
5,353,980 UART: [state] Locking PCR0, PCR1 and PCR31
5,354,584 UART: [state] Locking ICCM
5,355,214 UART: [exit] Launching FMC @ 0x40000000
5,360,511 UART:
5,360,527 UART: Running Caliptra FMC ...
5,360,935 UART:
5,361,157 UART: [fmc] Received command: 0x1000000C
5,361,892 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,540 ready_for_fw is high
1,055,540 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,935 >>> mbox cmd response: success
2,641,374 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,647,719 UART:
2,647,735 UART: Running Caliptra FMC ...
2,648,143 UART:
2,648,373 UART: [fmc] Received command: 0x46574C44
5,048,867 >>> mbox cmd response: success
5,056,377 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,062,595 UART:
5,062,611 UART: Running Caliptra FMC ...
5,063,019 UART:
5,063,241 UART: [fmc] Received command: 0x1000000C
5,063,976 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,817 UART: [state] LifecycleState = Unprovisioned
85,472 UART: [state] DebugLocked = No
86,108 UART: [state] WD Timer not started. Device not locked for debugging
87,221 UART: [kat] SHA2-256
890,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,900 UART: [kat] ++
895,052 UART: [kat] sha1
899,180 UART: [kat] SHA2-256
901,120 UART: [kat] SHA2-384
903,987 UART: [kat] SHA2-512-ACC
905,888 UART: [kat] ECC-384
915,695 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,598 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 ready_for_fw is high
1,174,122 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,888 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,319 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,415 UART: [ldev] --
1,280,933 UART: [fwproc] Wait for Commands...
1,281,596 UART: [fwproc] Recv command 0x46574c44
1,282,329 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,029 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,148 >>> mbox cmd response: success
2,738,303 UART: [afmc] ++
2,738,471 UART: [afmc] CDI.KEYID = 6
2,738,834 UART: [afmc] SUBJECT.KEYID = 7
2,739,260 UART: [afmc] AUTHORITY.KEYID = 5
2,774,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,936 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,632 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,531 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,224 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,158 UART: [afmc] --
2,818,024 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,818,046 UART: [cold-reset] --
2,818,826 UART: [state] Locking Datavault
2,819,915 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,519 UART: [state] Locking ICCM
2,821,015 UART: [exit] Launching FMC @ 0x40000000
2,826,312 UART:
2,826,328 UART: Running Caliptra FMC ...
2,826,736 UART:
2,826,966 UART: [fmc] Received command: 0x46574C44
2,827,792 UART:
2,827,808 UART: Running Caliptra ROM ...
2,828,216 UART:
2,828,358 UART: [state] CFI Enabled
2,831,102 UART: [state] LifecycleState = Unprovisioned
2,831,757 UART: [state] DebugLocked = No
2,832,429 UART: [state] WD Timer not started. Device not locked for debugging
2,833,551 UART: [kat] SHA2-256
3,637,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,230 UART: [kat] ++
3,641,382 UART: [kat] sha1
3,645,562 UART: [kat] SHA2-256
3,647,502 UART: [kat] SHA2-384
3,650,243 UART: [kat] SHA2-512-ACC
3,652,143 UART: [kat] ECC-384
3,661,876 UART: [kat] HMAC-384Kdf
3,666,480 UART: [kat] LMS
3,914,792 UART: [kat] --
3,915,706 UART: [update-reset] ++
5,197,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,198,426 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,346,066 >>> mbox cmd response: success
5,346,303 UART: [update-reset] Copying MAN_2 To MAN_1
5,354,317 UART: [update-reset Success] --
5,354,726 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,355,260 UART: [state] Locking Datavault
5,356,030 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,634 UART: [state] Locking ICCM
5,357,178 UART: [exit] Launching FMC @ 0x40000000
5,362,475 UART:
5,362,491 UART: Running Caliptra FMC ...
5,362,899 UART:
5,363,121 UART: [fmc] Received command: 0x1000000C
5,363,856 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,821 ready_for_fw is high
1,056,821 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,716 >>> mbox cmd response: success
2,643,481 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,649,850 UART:
2,649,866 UART: Running Caliptra FMC ...
2,650,274 UART:
2,650,504 UART: [fmc] Received command: 0x46574C44
5,051,541 >>> mbox cmd response: success
5,059,131 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,064,745 UART:
5,064,761 UART: Running Caliptra FMC ...
5,065,169 UART:
5,065,391 UART: [fmc] Received command: 0x1000000C
5,066,126 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,297 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,445 UART: [idev] ++
1,172,613 UART: [idev] CDI.KEYID = 6
1,172,974 UART: [idev] SUBJECT.KEYID = 7
1,173,399 UART: [idev] UDS.KEYID = 0
1,173,745 ready_for_fw is high
1,173,745 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,007 UART: [idev] Sha1 KeyId Algorithm
1,206,969 UART: [idev] --
1,207,808 UART: [ldev] ++
1,207,976 UART: [ldev] CDI.KEYID = 6
1,208,340 UART: [ldev] SUBJECT.KEYID = 5
1,208,767 UART: [ldev] AUTHORITY.KEYID = 7
1,209,230 UART: [ldev] FE.KEYID = 1
1,214,658 UART: [ldev] Erasing FE.KEYID = 1
1,240,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,212 UART: [ldev] --
1,279,718 UART: [fwproc] Wait for Commands...
1,280,347 UART: [fwproc] Recv command 0x46574c44
1,281,080 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,554 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,699 >>> mbox cmd response: success
2,737,758 UART: [afmc] ++
2,737,926 UART: [afmc] CDI.KEYID = 6
2,738,289 UART: [afmc] SUBJECT.KEYID = 7
2,738,715 UART: [afmc] AUTHORITY.KEYID = 5
2,773,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,935 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,796,631 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,802,530 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,808,223 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,199 UART: [afmc] --
2,817,177 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,817,199 UART: [cold-reset] --
2,818,043 UART: [state] Locking Datavault
2,819,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,004 UART: [state] Locking ICCM
2,820,620 UART: [exit] Launching FMC @ 0x40000000
2,825,917 UART:
2,825,933 UART: Running Caliptra FMC ...
2,826,341 UART:
2,826,571 UART: [fmc] Received command: 0x46574C44
2,827,397 UART:
2,827,413 UART: Running Caliptra ROM ...
2,827,821 UART:
2,827,876 UART: [state] CFI Enabled
2,830,820 UART: [state] LifecycleState = Unprovisioned
2,831,475 UART: [state] DebugLocked = No
2,832,083 UART: [state] WD Timer not started. Device not locked for debugging
2,833,301 UART: [kat] SHA2-256
3,636,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,980 UART: [kat] ++
3,641,132 UART: [kat] sha1
3,645,258 UART: [kat] SHA2-256
3,647,198 UART: [kat] SHA2-384
3,650,093 UART: [kat] SHA2-512-ACC
3,651,993 UART: [kat] ECC-384
3,661,590 UART: [kat] HMAC-384Kdf
3,666,210 UART: [kat] LMS
3,914,522 UART: [kat] --
3,915,358 UART: [update-reset] ++
5,196,999 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,198,116 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,345,756 >>> mbox cmd response: success
5,345,869 UART: [update-reset] Copying MAN_2 To MAN_1
5,353,883 UART: [update-reset Success] --
5,354,292 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,354,854 UART: [state] Locking Datavault
5,355,754 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,358 UART: [state] Locking ICCM
5,356,996 UART: [exit] Launching FMC @ 0x40000000
5,362,293 UART:
5,362,309 UART: Running Caliptra FMC ...
5,362,717 UART:
5,362,939 UART: [fmc] Received command: 0x1000000C
5,363,674 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,938 ready_for_fw is high
1,056,938 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,589,639 >>> mbox cmd response: success
2,646,314 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,652,541 UART:
2,652,557 UART: Running Caliptra FMC ...
2,652,965 UART:
2,653,195 UART: [fmc] Received command: 0x46574C44
5,052,499 >>> mbox cmd response: success
5,060,117 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,065,587 UART:
5,065,603 UART: Running Caliptra FMC ...
5,066,011 UART:
5,066,233 UART: [fmc] Received command: 0x1000000C
5,066,968 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 ready_for_fw is high
1,174,490 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,156 UART: [idev] --
1,209,341 UART: [ldev] ++
1,209,509 UART: [ldev] CDI.KEYID = 6
1,209,873 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,217 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,471 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,532 >>> mbox cmd response: success
2,737,681 UART: [afmc] ++
2,737,849 UART: [afmc] CDI.KEYID = 6
2,738,212 UART: [afmc] SUBJECT.KEYID = 7
2,738,638 UART: [afmc] AUTHORITY.KEYID = 5
2,773,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,342 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,038 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,802,937 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,808,630 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,642 UART: [afmc] --
2,817,734 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,817,756 UART: [cold-reset] --
2,818,746 UART: [state] Locking Datavault
2,819,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,573 UART: [state] Locking ICCM
2,821,005 UART: [exit] Launching FMC @ 0x40000000
2,826,302 UART:
2,826,318 UART: Running Caliptra FMC ...
2,826,726 UART:
2,826,956 UART: [fmc] Received command: 0x46574C44
2,827,782 UART:
2,827,798 UART: Running Caliptra ROM ...
2,828,206 UART:
2,828,348 UART: [state] CFI Enabled
2,830,760 UART: [state] LifecycleState = Unprovisioned
2,831,415 UART: [state] DebugLocked = No
2,832,031 UART: [state] WD Timer not started. Device not locked for debugging
2,833,259 UART: [kat] SHA2-256
3,636,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,938 UART: [kat] ++
3,641,090 UART: [kat] sha1
3,645,156 UART: [kat] SHA2-256
3,647,096 UART: [kat] SHA2-384
3,649,771 UART: [kat] SHA2-512-ACC
3,651,671 UART: [kat] ECC-384
3,661,270 UART: [kat] HMAC-384Kdf
3,665,904 UART: [kat] LMS
3,914,216 UART: [kat] --
3,915,070 UART: [update-reset] ++
5,196,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,197,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,344,918 >>> mbox cmd response: success
5,345,201 UART: [update-reset] Copying MAN_2 To MAN_1
5,353,215 UART: [update-reset Success] --
5,353,624 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,354,172 UART: [state] Locking Datavault
5,354,938 UART: [state] Locking PCR0, PCR1 and PCR31
5,355,542 UART: [state] Locking ICCM
5,356,208 UART: [exit] Launching FMC @ 0x40000000
5,361,505 UART:
5,361,521 UART: Running Caliptra FMC ...
5,361,929 UART:
5,362,151 UART: [fmc] Received command: 0x1000000C
5,362,886 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,111 ready_for_fw is high
1,056,111 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,794 >>> mbox cmd response: success
2,643,727 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,649,874 UART:
2,649,890 UART: Running Caliptra FMC ...
2,650,298 UART:
2,650,528 UART: [fmc] Received command: 0x46574C44
5,051,041 >>> mbox cmd response: success
5,058,547 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,064,215 UART:
5,064,231 UART: Running Caliptra FMC ...
5,064,639 UART:
5,064,861 UART: [fmc] Received command: 0x1000000C
5,065,596 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
191,982 UART:
192,349 UART: Running Caliptra ROM ...
193,460 UART:
193,607 UART: [state] CFI Enabled
267,473 UART: [state] LifecycleState = Unprovisioned
269,871 UART: [state] DebugLocked = No
271,894 UART: [state] WD Timer not started. Device not locked for debugging
276,345 UART: [kat] SHA2-256
458,300 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,825 UART: [kat] ++
470,274 UART: [kat] sha1
480,831 UART: [kat] SHA2-256
483,836 UART: [kat] SHA2-384
490,814 UART: [kat] SHA2-512-ACC
493,463 UART: [kat] ECC-384
3,775,438 UART: [kat] HMAC-384Kdf
3,804,028 UART: [kat] LMS
4,877,181 UART: [kat] --
4,881,361 UART: [cold-reset] ++
4,883,369 UART: [fht] FHT @ 0x50003400
4,894,344 UART: [idev] ++
4,895,058 UART: [idev] CDI.KEYID = 6
4,896,302 UART: [idev] SUBJECT.KEYID = 7
4,897,402 UART: [idev] UDS.KEYID = 0
4,898,325 ready_for_fw is high
4,898,512 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,038,518 UART: [idev] Erasing UDS.KEYID = 0
8,247,813 UART: [idev] Sha1 KeyId Algorithm
8,271,092 UART: [idev] --
8,276,327 UART: [ldev] ++
8,276,896 UART: [ldev] CDI.KEYID = 6
8,278,124 UART: [ldev] SUBJECT.KEYID = 5
8,279,289 UART: [ldev] AUTHORITY.KEYID = 7
8,280,466 UART: [ldev] FE.KEYID = 1
8,319,934 UART: [ldev] Erasing FE.KEYID = 1
11,651,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,395 UART: [ldev] --
14,017,856 UART: [fwproc] Wait for Commands...
14,019,793 UART: [fwproc] Recv command 0x46574c44
14,022,103 UART: [fwproc] Recv'd Img size: 111324 bytes
18,058,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,134,496 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,194,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,510,427 >>> mbox cmd response: success
18,513,737 UART: [afmc] ++
18,514,460 UART: [afmc] CDI.KEYID = 6
18,515,591 UART: [afmc] SUBJECT.KEYID = 7
18,516,755 UART: [afmc] AUTHORITY.KEYID = 5
21,886,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,183,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,185,477 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,201,557 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,217,722 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,233,700 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,256,455 UART: [afmc] --
26,318,409 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
26,453,436 UART: [cold-reset] --
26,454,459 UART: [state] Locking Datavault
26,455,541 UART: [state] Locking PCR0, PCR1 and PCR31
26,457,084 UART: [state] Locking ICCM
26,458,198 UART: [exit] Launching FMC @ 0x40000000
26,459,635 UART:
26,459,801 UART: Running Caliptra FMC ...
26,460,913 UART:
26,461,068 UART: [fmc] Received command: 0x46574C44
26,462,525 UART:
26,462,678 UART: Running Caliptra ROM ...
26,463,774 UART:
26,463,927 UART: [state] CFI Enabled
26,524,436 UART: [state] LifecycleState = Unprovisioned
26,526,150 UART: [state] DebugLocked = No
26,527,584 UART: [state] WD Timer not started. Device not locked for debugging
26,532,525 UART: [kat] SHA2-256
26,714,464 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,725,968 UART: [kat] ++
26,726,474 UART: [kat] sha1
26,737,899 UART: [kat] SHA2-256
26,740,909 UART: [kat] SHA2-384
26,746,612 UART: [kat] SHA2-512-ACC
26,749,227 UART: [kat] ECC-384
30,035,024 UART: [kat] HMAC-384Kdf
30,060,723 UART: [kat] LMS
31,133,849 UART: [kat] --
31,137,481 UART: [update-reset] ++
31,182,818 >>> mbox cmd response: failed
31,183,246 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,186,174 UART: ROM Non-Fatal Error: 0x000B001E
31,188,311 UART: [state] Locking Datavault
31,192,465 UART: [state] Locking PCR0, PCR1 and PCR31
31,194,597 UART: [state] Locking ICCM
31,196,777 UART: [exit] Launching FMC @ 0x40000000
31,205,395 UART:
31,205,625 UART: Running Caliptra FMC ...
31,206,651 UART:
31,206,796 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,208,425 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
4,802,742 ready_for_fw is high
4,803,119 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,288,379 >>> mbox cmd response: success
26,034,232 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
26,169,003 UART:
26,169,450 UART: Running Caliptra FMC ...
26,170,628 UART:
26,170,800 UART: [fmc] Received command: 0x46574C44
30,814,795 >>> mbox cmd response: failed
30,815,235 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,828,866 UART:
30,829,123 UART: Running Caliptra FMC ...
30,830,276 UART:
30,830,435 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,832,072 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,459 UART:
192,823 UART: Running Caliptra ROM ...
193,895 UART:
603,539 UART: [state] CFI Enabled
618,628 UART: [state] LifecycleState = Unprovisioned
621,003 UART: [state] DebugLocked = No
622,962 UART: [state] WD Timer not started. Device not locked for debugging
627,830 UART: [kat] SHA2-256
809,779 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,352 UART: [kat] ++
821,955 UART: [kat] sha1
832,094 UART: [kat] SHA2-256
835,095 UART: [kat] SHA2-384
841,381 UART: [kat] SHA2-512-ACC
844,028 UART: [kat] ECC-384
4,098,756 UART: [kat] HMAC-384Kdf
4,110,611 UART: [kat] LMS
5,183,740 UART: [kat] --
5,187,174 UART: [cold-reset] ++
5,189,522 UART: [fht] FHT @ 0x50003400
5,199,944 UART: [idev] ++
5,200,641 UART: [idev] CDI.KEYID = 6
5,201,736 UART: [idev] SUBJECT.KEYID = 7
5,203,252 UART: [idev] UDS.KEYID = 0
5,204,426 ready_for_fw is high
5,204,622 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,344,547 UART: [idev] Erasing UDS.KEYID = 0
8,495,091 UART: [idev] Sha1 KeyId Algorithm
8,515,893 UART: [idev] --
8,521,101 UART: [ldev] ++
8,521,731 UART: [ldev] CDI.KEYID = 6
8,522,905 UART: [ldev] SUBJECT.KEYID = 5
8,524,380 UART: [ldev] AUTHORITY.KEYID = 7
8,525,922 UART: [ldev] FE.KEYID = 1
8,537,582 UART: [ldev] Erasing FE.KEYID = 1
11,829,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,180 UART: [ldev] --
14,195,501 UART: [fwproc] Wait for Commands...
14,197,374 UART: [fwproc] Recv command 0x46574c44
14,199,676 UART: [fwproc] Recv'd Img size: 111324 bytes
18,244,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,323,394 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,383,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,700,681 >>> mbox cmd response: success
18,704,223 UART: [afmc] ++
18,704,961 UART: [afmc] CDI.KEYID = 6
18,706,065 UART: [afmc] SUBJECT.KEYID = 7
18,707,280 UART: [afmc] AUTHORITY.KEYID = 5
22,025,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,601 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,319,513 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,335,623 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,351,754 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,367,742 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,392,033 UART: [afmc] --
26,456,792 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
26,591,754 UART: [cold-reset] --
26,592,690 UART: [state] Locking Datavault
26,593,769 UART: [state] Locking PCR0, PCR1 and PCR31
26,595,306 UART: [state] Locking ICCM
26,596,215 UART: [exit] Launching FMC @ 0x40000000
26,597,635 UART:
26,597,795 UART: Running Caliptra FMC ...
26,598,887 UART:
26,599,036 UART: [fmc] Received command: 0x46574C44
26,600,488 UART:
26,600,636 UART: Running Caliptra ROM ...
26,601,724 UART:
26,601,872 UART: [state] CFI Enabled
26,609,315 UART: [state] LifecycleState = Unprovisioned
26,611,189 UART: [state] DebugLocked = No
26,612,470 UART: [state] WD Timer not started. Device not locked for debugging
26,617,770 UART: [kat] SHA2-256
26,799,764 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,811,304 UART: [kat] ++
26,811,840 UART: [kat] sha1
26,821,916 UART: [kat] SHA2-256
26,824,937 UART: [kat] SHA2-384
26,830,894 UART: [kat] SHA2-512-ACC
26,833,516 UART: [kat] ECC-384
30,089,431 UART: [kat] HMAC-384Kdf
30,101,207 UART: [kat] LMS
31,174,375 UART: [kat] --
31,179,253 UART: [update-reset] ++
31,225,139 >>> mbox cmd response: failed
31,225,537 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,227,543 UART: ROM Non-Fatal Error: 0x000B001E
31,230,123 UART: [state] Locking Datavault
31,234,788 UART: [state] Locking PCR0, PCR1 and PCR31
31,236,921 UART: [state] Locking ICCM
31,239,822 UART: [exit] Launching FMC @ 0x40000000
31,248,481 UART:
31,248,710 UART: Running Caliptra FMC ...
31,249,805 UART:
31,249,955 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,251,585 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
5,101,659 ready_for_fw is high
5,102,355 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,496,594 >>> mbox cmd response: success
26,171,783 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
26,306,558 UART:
26,307,014 UART: Running Caliptra FMC ...
26,308,108 UART:
26,308,253 UART: [fmc] Received command: 0x46574C44
30,842,566 >>> mbox cmd response: failed
30,842,998 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,853,434 UART:
30,853,687 UART: Running Caliptra FMC ...
30,854,832 UART:
30,854,987 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,856,618 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,015 UART:
192,395 UART: Running Caliptra ROM ...
193,526 UART:
193,670 UART: [state] CFI Enabled
264,471 UART: [state] LifecycleState = Unprovisioned
266,374 UART: [state] DebugLocked = No
268,694 UART: [state] WD Timer not started. Device not locked for debugging
272,873 UART: [kat] SHA2-256
451,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,535 UART: [kat] ++
464,075 UART: [kat] sha1
474,968 UART: [kat] SHA2-256
477,977 UART: [kat] SHA2-384
483,257 UART: [kat] SHA2-512-ACC
486,265 UART: [kat] ECC-384
2,950,040 UART: [kat] HMAC-384Kdf
2,972,333 UART: [kat] LMS
3,501,795 UART: [kat] --
3,504,299 UART: [cold-reset] ++
3,506,519 UART: [fht] FHT @ 0x50003400
3,517,568 UART: [idev] ++
3,518,135 UART: [idev] CDI.KEYID = 6
3,519,049 UART: [idev] SUBJECT.KEYID = 7
3,520,227 UART: [idev] UDS.KEYID = 0
3,521,244 ready_for_fw is high
3,521,454 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,661,973 UART: [idev] Erasing UDS.KEYID = 0
6,027,102 UART: [idev] Sha1 KeyId Algorithm
6,049,904 UART: [idev] --
6,053,080 UART: [ldev] ++
6,053,653 UART: [ldev] CDI.KEYID = 6
6,054,570 UART: [ldev] SUBJECT.KEYID = 5
6,055,673 UART: [ldev] AUTHORITY.KEYID = 7
6,056,959 UART: [ldev] FE.KEYID = 1
6,100,391 UART: [ldev] Erasing FE.KEYID = 1
8,604,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,219 UART: [ldev] --
10,414,015 UART: [fwproc] Wait for Commands...
10,416,226 UART: [fwproc] Recv command 0x46574c44
10,418,325 UART: [fwproc] Recv'd Img size: 111668 bytes
13,781,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,849,958 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,910,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,228,031 >>> mbox cmd response: success
14,232,875 UART: [afmc] ++
14,233,494 UART: [afmc] CDI.KEYID = 6
14,234,408 UART: [afmc] SUBJECT.KEYID = 7
14,235,572 UART: [afmc] AUTHORITY.KEYID = 5
16,766,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,492,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,494,797 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,510,838 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,526,820 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,542,620 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,565,807 UART: [afmc] --
20,631,133 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,766,552 UART: [cold-reset] --
20,767,491 UART: [state] Locking Datavault
20,768,664 UART: [state] Locking PCR0, PCR1 and PCR31
20,770,228 UART: [state] Locking ICCM
20,771,145 UART: [exit] Launching FMC @ 0x40000000
20,772,566 UART:
20,772,729 UART: Running Caliptra FMC ...
20,773,826 UART:
20,773,982 UART: [fmc] Received command: 0x46574C44
20,775,569 UART:
20,775,735 UART: Running Caliptra ROM ...
20,776,775 UART:
20,776,921 UART: [state] CFI Enabled
20,831,332 UART: [state] LifecycleState = Unprovisioned
20,833,247 UART: [state] DebugLocked = No
20,835,879 UART: [state] WD Timer not started. Device not locked for debugging
20,839,730 UART: [kat] SHA2-256
21,018,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,030,398 UART: [kat] ++
21,030,963 UART: [kat] sha1
21,042,886 UART: [kat] SHA2-256
21,045,897 UART: [kat] SHA2-384
21,051,788 UART: [kat] SHA2-512-ACC
21,054,703 UART: [kat] ECC-384
23,518,238 UART: [kat] HMAC-384Kdf
23,538,680 UART: [kat] LMS
24,068,159 UART: [kat] --
24,073,282 UART: [update-reset] ++
24,115,261 >>> mbox cmd response: failed
24,115,652 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,116,254 UART: ROM Non-Fatal Error: 0x000B001E
24,119,090 UART: [state] Locking Datavault
24,122,290 UART: [state] Locking PCR0, PCR1 and PCR31
24,123,935 UART: [state] Locking ICCM
24,124,948 UART: [exit] Launching FMC @ 0x40000000
24,133,367 UART:
24,133,614 UART: Running Caliptra FMC ...
24,134,720 UART:
24,134,874 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,136,507 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,384,755 ready_for_fw is high
3,385,219 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,050,397 >>> mbox cmd response: success
20,381,874 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,517,037 UART:
20,517,467 UART: Running Caliptra FMC ...
20,518,593 UART:
20,518,753 UART: [fmc] Received command: 0x46574C44
23,741,178 >>> mbox cmd response: failed
23,741,733 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,751,857 UART:
23,752,123 UART: Running Caliptra FMC ...
23,753,295 UART:
23,753,460 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,755,092 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,689 UART:
193,050 UART: Running Caliptra ROM ...
194,236 UART:
603,720 UART: [state] CFI Enabled
619,115 UART: [state] LifecycleState = Unprovisioned
620,960 UART: [state] DebugLocked = No
623,134 UART: [state] WD Timer not started. Device not locked for debugging
625,971 UART: [kat] SHA2-256
805,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,674 UART: [kat] ++
817,208 UART: [kat] sha1
828,462 UART: [kat] SHA2-256
831,465 UART: [kat] SHA2-384
838,657 UART: [kat] SHA2-512-ACC
841,657 UART: [kat] ECC-384
3,281,689 UART: [kat] HMAC-384Kdf
3,293,987 UART: [kat] LMS
3,823,501 UART: [kat] --
3,827,283 UART: [cold-reset] ++
3,828,783 UART: [fht] FHT @ 0x50003400
3,839,191 UART: [idev] ++
3,839,753 UART: [idev] CDI.KEYID = 6
3,840,703 UART: [idev] SUBJECT.KEYID = 7
3,841,940 UART: [idev] UDS.KEYID = 0
3,842,861 ready_for_fw is high
3,843,048 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,983,293 UART: [idev] Erasing UDS.KEYID = 0
6,314,522 UART: [idev] Sha1 KeyId Algorithm
6,338,937 UART: [idev] --
6,342,875 UART: [ldev] ++
6,343,444 UART: [ldev] CDI.KEYID = 6
6,344,358 UART: [ldev] SUBJECT.KEYID = 5
6,345,568 UART: [ldev] AUTHORITY.KEYID = 7
6,346,794 UART: [ldev] FE.KEYID = 1
6,356,353 UART: [ldev] Erasing FE.KEYID = 1
8,832,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,589 UART: [ldev] --
10,620,836 UART: [fwproc] Wait for Commands...
10,622,823 UART: [fwproc] Recv command 0x46574c44
10,624,927 UART: [fwproc] Recv'd Img size: 111668 bytes
13,998,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,069,820 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,130,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,447,865 >>> mbox cmd response: success
14,451,372 UART: [afmc] ++
14,451,979 UART: [afmc] CDI.KEYID = 6
14,452,862 UART: [afmc] SUBJECT.KEYID = 7
14,453,959 UART: [afmc] AUTHORITY.KEYID = 5
16,953,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,675,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,677,833 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,693,837 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,709,867 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,725,643 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,748,455 UART: [afmc] --
20,814,124 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,949,444 UART: [cold-reset] --
20,950,368 UART: [state] Locking Datavault
20,951,444 UART: [state] Locking PCR0, PCR1 and PCR31
20,952,984 UART: [state] Locking ICCM
20,953,906 UART: [exit] Launching FMC @ 0x40000000
20,955,328 UART:
20,955,511 UART: Running Caliptra FMC ...
20,956,612 UART:
20,956,764 UART: [fmc] Received command: 0x46574C44
20,958,219 UART:
20,958,369 UART: Running Caliptra ROM ...
20,959,464 UART:
20,959,612 UART: [state] CFI Enabled
20,964,582 UART: [state] LifecycleState = Unprovisioned
20,966,410 UART: [state] DebugLocked = No
20,969,185 UART: [state] WD Timer not started. Device not locked for debugging
20,973,727 UART: [kat] SHA2-256
21,152,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,164,457 UART: [kat] ++
21,164,992 UART: [kat] sha1
21,175,929 UART: [kat] SHA2-256
21,178,965 UART: [kat] SHA2-384
21,184,709 UART: [kat] SHA2-512-ACC
21,187,653 UART: [kat] ECC-384
23,629,492 UART: [kat] HMAC-384Kdf
23,642,314 UART: [kat] LMS
24,171,828 UART: [kat] --
24,177,117 UART: [update-reset] ++
24,223,900 >>> mbox cmd response: failed
24,224,298 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,226,461 UART: ROM Non-Fatal Error: 0x000B001E
24,229,941 UART: [state] Locking Datavault
24,232,485 UART: [state] Locking PCR0, PCR1 and PCR31
24,234,127 UART: [state] Locking ICCM
24,236,244 UART: [exit] Launching FMC @ 0x40000000
24,244,641 UART:
24,244,873 UART: Running Caliptra FMC ...
24,245,968 UART:
24,246,141 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,247,776 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,694,421 ready_for_fw is high
3,695,035 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,225,376 >>> mbox cmd response: success
20,514,524 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,649,788 UART:
20,650,225 UART: Running Caliptra FMC ...
20,651,386 UART:
20,651,593 UART: [fmc] Received command: 0x46574C44
23,779,762 >>> mbox cmd response: failed
23,780,593 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,791,823 UART:
23,792,110 UART: Running Caliptra FMC ...
23,793,324 UART:
23,793,483 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,795,118 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,199 UART:
192,561 UART: Running Caliptra ROM ...
193,710 UART:
193,857 UART: [state] CFI Enabled
259,586 UART: [state] LifecycleState = Unprovisioned
261,436 UART: [state] DebugLocked = No
262,690 UART: [state] WD Timer not started. Device not locked for debugging
265,875 UART: [kat] SHA2-256
445,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,569 UART: [kat] ++
457,106 UART: [kat] sha1
467,349 UART: [kat] SHA2-256
470,352 UART: [kat] SHA2-384
477,475 UART: [kat] SHA2-512-ACC
480,379 UART: [kat] ECC-384
2,926,547 UART: [kat] HMAC-384Kdf
2,949,588 UART: [kat] LMS
3,478,970 UART: [kat] --
3,482,773 UART: [cold-reset] ++
3,485,346 UART: [fht] FHT @ 0x50003400
3,497,319 UART: [idev] ++
3,497,884 UART: [idev] CDI.KEYID = 6
3,498,787 UART: [idev] SUBJECT.KEYID = 7
3,499,962 UART: [idev] UDS.KEYID = 0
3,500,975 ready_for_fw is high
3,501,170 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,641,689 UART: [idev] Erasing UDS.KEYID = 0
6,003,679 UART: [idev] Sha1 KeyId Algorithm
6,025,669 UART: [idev] --
6,030,096 UART: [ldev] ++
6,030,681 UART: [ldev] CDI.KEYID = 6
6,031,593 UART: [ldev] SUBJECT.KEYID = 5
6,032,793 UART: [ldev] AUTHORITY.KEYID = 7
6,033,930 UART: [ldev] FE.KEYID = 1
6,078,348 UART: [ldev] Erasing FE.KEYID = 1
8,580,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,895 UART: [ldev] --
10,391,034 UART: [fwproc] Wait for Commands...
10,393,731 UART: [fwproc] Recv command 0x46574c44
10,395,770 UART: [fwproc] Recv'd Img size: 111668 bytes
13,768,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,844,687 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,905,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,221,615 >>> mbox cmd response: success
14,225,847 UART: [afmc] ++
14,226,463 UART: [afmc] CDI.KEYID = 6
14,227,377 UART: [afmc] SUBJECT.KEYID = 7
14,228,423 UART: [afmc] AUTHORITY.KEYID = 5
16,764,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,486,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,488,483 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,504,464 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,520,497 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,536,324 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,560,007 UART: [afmc] --
20,643,091 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,778,610 UART: [cold-reset] --
20,779,546 UART: [state] Locking Datavault
20,780,629 UART: [state] Locking PCR0, PCR1 and PCR31
20,782,199 UART: [state] Locking ICCM
20,783,120 UART: [exit] Launching FMC @ 0x40000000
20,784,552 UART:
20,784,715 UART: Running Caliptra FMC ...
20,785,814 UART:
20,785,969 UART: [fmc] Received command: 0x46574C44
20,787,430 UART:
20,787,584 UART: Running Caliptra ROM ...
20,788,684 UART:
20,788,841 UART: [state] CFI Enabled
20,850,029 UART: [state] LifecycleState = Unprovisioned
20,851,910 UART: [state] DebugLocked = No
20,854,347 UART: [state] WD Timer not started. Device not locked for debugging
20,857,820 UART: [kat] SHA2-256
21,036,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,048,501 UART: [kat] ++
21,049,066 UART: [kat] sha1
21,058,762 UART: [kat] SHA2-256
21,061,837 UART: [kat] SHA2-384
21,068,904 UART: [kat] SHA2-512-ACC
21,071,857 UART: [kat] ECC-384
23,532,979 UART: [kat] HMAC-384Kdf
23,556,877 UART: [kat] LMS
24,086,349 UART: [kat] --
24,091,117 UART: [update-reset] ++
24,134,883 >>> mbox cmd response: failed
24,135,282 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,135,934 UART: ROM Non-Fatal Error: 0x000B001E
24,138,931 UART: [state] Locking Datavault
24,143,484 UART: [state] Locking PCR0, PCR1 and PCR31
24,145,130 UART: [state] Locking ICCM
24,147,474 UART: [exit] Launching FMC @ 0x40000000
24,155,904 UART:
24,156,143 UART: Running Caliptra FMC ...
24,157,169 UART:
24,157,317 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,158,956 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,349,333 ready_for_fw is high
3,349,724 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
13,988,154 >>> mbox cmd response: success
20,326,717 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,461,874 UART:
20,462,299 UART: Running Caliptra FMC ...
20,463,473 UART:
20,463,641 UART: [fmc] Received command: 0x46574C44
23,688,872 >>> mbox cmd response: failed
23,689,316 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,700,721 UART:
23,700,986 UART: Running Caliptra FMC ...
23,702,134 UART:
23,702,290 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,703,952 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,351 UART:
192,714 UART: Running Caliptra ROM ...
193,828 UART:
603,441 UART: [state] CFI Enabled
617,453 UART: [state] LifecycleState = Unprovisioned
619,340 UART: [state] DebugLocked = No
622,064 UART: [state] WD Timer not started. Device not locked for debugging
625,537 UART: [kat] SHA2-256
804,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,175 UART: [kat] ++
816,626 UART: [kat] sha1
828,281 UART: [kat] SHA2-256
831,361 UART: [kat] SHA2-384
837,915 UART: [kat] SHA2-512-ACC
840,914 UART: [kat] ECC-384
3,282,242 UART: [kat] HMAC-384Kdf
3,293,491 UART: [kat] LMS
3,822,972 UART: [kat] --
3,826,510 UART: [cold-reset] ++
3,828,723 UART: [fht] FHT @ 0x50003400
3,840,615 UART: [idev] ++
3,841,173 UART: [idev] CDI.KEYID = 6
3,842,079 UART: [idev] SUBJECT.KEYID = 7
3,843,250 UART: [idev] UDS.KEYID = 0
3,844,294 ready_for_fw is high
3,844,481 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,984,730 UART: [idev] Erasing UDS.KEYID = 0
6,313,127 UART: [idev] Sha1 KeyId Algorithm
6,336,189 UART: [idev] --
6,340,422 UART: [ldev] ++
6,340,996 UART: [ldev] CDI.KEYID = 6
6,341,876 UART: [ldev] SUBJECT.KEYID = 5
6,343,085 UART: [ldev] AUTHORITY.KEYID = 7
6,344,315 UART: [ldev] FE.KEYID = 1
6,356,625 UART: [ldev] Erasing FE.KEYID = 1
8,826,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,043 UART: [ldev] --
10,616,949 UART: [fwproc] Wait for Commands...
10,620,117 UART: [fwproc] Recv command 0x46574c44
10,622,209 UART: [fwproc] Recv'd Img size: 111668 bytes
13,983,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,055,536 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,115,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,433,404 >>> mbox cmd response: success
14,437,179 UART: [afmc] ++
14,437,798 UART: [afmc] CDI.KEYID = 6
14,438,742 UART: [afmc] SUBJECT.KEYID = 7
14,439,849 UART: [afmc] AUTHORITY.KEYID = 5
16,942,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,662,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,664,041 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,680,048 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,696,089 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,711,865 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,734,542 UART: [afmc] --
20,799,612 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,934,992 UART: [cold-reset] --
20,935,935 UART: [state] Locking Datavault
20,937,018 UART: [state] Locking PCR0, PCR1 and PCR31
20,938,573 UART: [state] Locking ICCM
20,939,486 UART: [exit] Launching FMC @ 0x40000000
20,940,911 UART:
20,941,073 UART: Running Caliptra FMC ...
20,942,175 UART:
20,942,332 UART: [fmc] Received command: 0x46574C44
20,943,789 UART:
20,943,942 UART: Running Caliptra ROM ...
20,945,036 UART:
20,945,191 UART: [state] CFI Enabled
20,950,883 UART: [state] LifecycleState = Unprovisioned
20,952,709 UART: [state] DebugLocked = No
20,954,622 UART: [state] WD Timer not started. Device not locked for debugging
20,957,865 UART: [kat] SHA2-256
21,137,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,148,628 UART: [kat] ++
21,149,084 UART: [kat] sha1
21,160,401 UART: [kat] SHA2-256
21,163,416 UART: [kat] SHA2-384
21,168,054 UART: [kat] SHA2-512-ACC
21,171,000 UART: [kat] ECC-384
23,613,898 UART: [kat] HMAC-384Kdf
23,626,454 UART: [kat] LMS
24,155,955 UART: [kat] --
24,160,207 UART: [update-reset] ++
24,207,363 >>> mbox cmd response: failed
24,207,778 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,209,191 UART: ROM Non-Fatal Error: 0x000B001E
24,211,488 UART: [state] Locking Datavault
24,215,552 UART: [state] Locking PCR0, PCR1 and PCR31
24,217,193 UART: [state] Locking ICCM
24,218,963 UART: [exit] Launching FMC @ 0x40000000
24,227,356 UART:
24,227,588 UART: Running Caliptra FMC ...
24,228,686 UART:
24,228,839 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,230,469 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,694,403 ready_for_fw is high
3,694,794 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,220,852 >>> mbox cmd response: success
20,508,051 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
20,643,185 UART:
20,643,598 UART: Running Caliptra FMC ...
20,644,682 UART:
20,644,831 UART: [fmc] Received command: 0x46574C44
23,766,544 >>> mbox cmd response: failed
23,766,976 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,778,922 UART:
23,779,181 UART: Running Caliptra FMC ...
23,780,328 UART:
23,780,483 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,782,139 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,860 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,174,181 ready_for_fw is high
1,174,181 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,069 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,500 UART: [ldev] Erasing FE.KEYID = 1
1,239,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,530 UART: [ldev] --
1,278,800 UART: [fwproc] Wait for Commands...
1,279,435 UART: [fwproc] Recv command 0x46574c44
1,280,168 UART: [fwproc] Recv'd Img size: 111668 bytes
2,546,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,574,393 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,735,526 >>> mbox cmd response: success
2,736,655 UART: [afmc] ++
2,736,823 UART: [afmc] CDI.KEYID = 6
2,737,186 UART: [afmc] SUBJECT.KEYID = 7
2,737,612 UART: [afmc] AUTHORITY.KEYID = 5
2,772,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,789,952 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,795,667 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,801,559 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,807,271 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,815,096 UART: [afmc] --
2,816,028 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,816,050 UART: [cold-reset] --
2,816,878 UART: [state] Locking Datavault
2,818,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,818,937 UART: [state] Locking ICCM
2,819,435 UART: [exit] Launching FMC @ 0x40000000
2,824,732 UART:
2,824,748 UART: Running Caliptra FMC ...
2,825,156 UART:
2,825,386 UART: [fmc] Received command: 0x46574C44
2,826,212 UART:
2,826,228 UART: Running Caliptra ROM ...
2,826,636 UART:
2,826,691 UART: [state] CFI Enabled
2,829,597 UART: [state] LifecycleState = Unprovisioned
2,830,252 UART: [state] DebugLocked = No
2,830,782 UART: [state] WD Timer not started. Device not locked for debugging
2,832,034 UART: [kat] SHA2-256
3,635,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,639,713 UART: [kat] ++
3,639,865 UART: [kat] sha1
3,644,127 UART: [kat] SHA2-256
3,646,067 UART: [kat] SHA2-384
3,648,964 UART: [kat] SHA2-512-ACC
3,650,864 UART: [kat] ECC-384
3,660,625 UART: [kat] HMAC-384Kdf
3,665,083 UART: [kat] LMS
3,913,395 UART: [kat] --
3,914,143 UART: [update-reset] ++
3,931,181 >>> mbox cmd response: failed
3,931,181 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,931,595 UART: ROM Non-Fatal Error: 0x000B001E
3,932,409 UART: [state] Locking Datavault
3,933,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,905 UART: [state] Locking ICCM
3,934,527 UART: [exit] Launching FMC @ 0x40000000
3,939,824 UART:
3,939,840 UART: Running Caliptra FMC ...
3,940,248 UART:
3,940,470 UART: [fmc] Received command: 0x1000000C
3,941,205 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,946 ready_for_fw is high
1,055,946 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,474 >>> mbox cmd response: success
2,643,303 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,649,464 UART:
2,649,480 UART: Running Caliptra FMC ...
2,649,888 UART:
2,650,118 UART: [fmc] Received command: 0x46574C44
3,639,871 >>> mbox cmd response: failed
3,639,871 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,645,856 UART:
3,645,872 UART: Running Caliptra FMC ...
3,646,280 UART:
3,646,502 UART: [fmc] Received command: 0x1000000C
3,647,237 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,173,064 UART: [idev] ++
1,173,232 UART: [idev] CDI.KEYID = 6
1,173,593 UART: [idev] SUBJECT.KEYID = 7
1,174,018 UART: [idev] UDS.KEYID = 0
1,174,364 ready_for_fw is high
1,174,364 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,208,975 UART: [ldev] ++
1,209,143 UART: [ldev] CDI.KEYID = 6
1,209,507 UART: [ldev] SUBJECT.KEYID = 5
1,209,934 UART: [ldev] AUTHORITY.KEYID = 7
1,210,397 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,623 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,575,170 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,431 >>> mbox cmd response: success
2,737,678 UART: [afmc] ++
2,737,846 UART: [afmc] CDI.KEYID = 6
2,738,209 UART: [afmc] SUBJECT.KEYID = 7
2,738,635 UART: [afmc] AUTHORITY.KEYID = 5
2,774,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,659 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,797,374 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,803,266 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,808,978 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,816,691 UART: [afmc] --
2,817,733 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,817,755 UART: [cold-reset] --
2,818,381 UART: [state] Locking Datavault
2,819,282 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,886 UART: [state] Locking ICCM
2,820,346 UART: [exit] Launching FMC @ 0x40000000
2,825,643 UART:
2,825,659 UART: Running Caliptra FMC ...
2,826,067 UART:
2,826,297 UART: [fmc] Received command: 0x46574C44
2,827,123 UART:
2,827,139 UART: Running Caliptra ROM ...
2,827,547 UART:
2,827,689 UART: [state] CFI Enabled
2,830,433 UART: [state] LifecycleState = Unprovisioned
2,831,088 UART: [state] DebugLocked = No
2,831,774 UART: [state] WD Timer not started. Device not locked for debugging
2,833,116 UART: [kat] SHA2-256
3,636,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,795 UART: [kat] ++
3,640,947 UART: [kat] sha1
3,645,077 UART: [kat] SHA2-256
3,647,017 UART: [kat] SHA2-384
3,649,646 UART: [kat] SHA2-512-ACC
3,651,546 UART: [kat] ECC-384
3,661,565 UART: [kat] HMAC-384Kdf
3,666,155 UART: [kat] LMS
3,914,467 UART: [kat] --
3,915,251 UART: [update-reset] ++
3,931,615 >>> mbox cmd response: failed
3,931,615 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,932,027 UART: ROM Non-Fatal Error: 0x000B001E
3,932,855 UART: [state] Locking Datavault
3,933,673 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,277 UART: [state] Locking ICCM
3,934,839 UART: [exit] Launching FMC @ 0x40000000
3,940,136 UART:
3,940,152 UART: Running Caliptra FMC ...
3,940,560 UART:
3,940,782 UART: [fmc] Received command: 0x1000000C
3,941,517 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,129 ready_for_fw is high
1,056,129 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,709 >>> mbox cmd response: success
2,642,546 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,648,793 UART:
2,648,809 UART: Running Caliptra FMC ...
2,649,217 UART:
2,649,447 UART: [fmc] Received command: 0x46574C44
3,639,339 >>> mbox cmd response: failed
3,639,339 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,645,290 UART:
3,645,306 UART: Running Caliptra FMC ...
3,645,714 UART:
3,645,936 UART: [fmc] Received command: 0x1000000C
3,646,671 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,174,095 ready_for_fw is high
1,174,095 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,568 UART: [ldev] Erasing FE.KEYID = 1
1,240,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,142 UART: [fwproc] Wait for Commands...
1,280,761 UART: [fwproc] Recv command 0x46574c44
1,281,494 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,575,017 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,224 >>> mbox cmd response: success
2,737,307 UART: [afmc] ++
2,737,475 UART: [afmc] CDI.KEYID = 6
2,737,838 UART: [afmc] SUBJECT.KEYID = 7
2,738,264 UART: [afmc] AUTHORITY.KEYID = 5
2,774,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,436 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,797,151 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,803,043 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,808,755 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,816,624 UART: [afmc] --
2,817,668 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,817,690 UART: [cold-reset] --
2,818,404 UART: [state] Locking Datavault
2,819,745 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,349 UART: [state] Locking ICCM
2,820,911 UART: [exit] Launching FMC @ 0x40000000
2,826,208 UART:
2,826,224 UART: Running Caliptra FMC ...
2,826,632 UART:
2,826,862 UART: [fmc] Received command: 0x46574C44
2,827,688 UART:
2,827,704 UART: Running Caliptra ROM ...
2,828,112 UART:
2,828,167 UART: [state] CFI Enabled
2,830,359 UART: [state] LifecycleState = Unprovisioned
2,831,014 UART: [state] DebugLocked = No
2,831,614 UART: [state] WD Timer not started. Device not locked for debugging
2,832,956 UART: [kat] SHA2-256
3,636,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,635 UART: [kat] ++
3,640,787 UART: [kat] sha1
3,645,001 UART: [kat] SHA2-256
3,646,941 UART: [kat] SHA2-384
3,649,760 UART: [kat] SHA2-512-ACC
3,651,660 UART: [kat] ECC-384
3,661,481 UART: [kat] HMAC-384Kdf
3,666,083 UART: [kat] LMS
3,914,395 UART: [kat] --
3,915,309 UART: [update-reset] ++
3,931,727 >>> mbox cmd response: failed
3,931,727 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,931,975 UART: ROM Non-Fatal Error: 0x000B001E
3,932,939 UART: [state] Locking Datavault
3,933,769 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,373 UART: [state] Locking ICCM
3,934,797 UART: [exit] Launching FMC @ 0x40000000
3,940,094 UART:
3,940,110 UART: Running Caliptra FMC ...
3,940,518 UART:
3,940,740 UART: [fmc] Received command: 0x1000000C
3,941,475 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,028 ready_for_fw is high
1,056,028 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,585,646 >>> mbox cmd response: success
2,641,393 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,647,902 UART:
2,647,918 UART: Running Caliptra FMC ...
2,648,326 UART:
2,648,556 UART: [fmc] Received command: 0x46574C44
3,636,949 >>> mbox cmd response: failed
3,636,949 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,642,422 UART:
3,642,438 UART: Running Caliptra FMC ...
3,642,846 UART:
3,643,068 UART: [fmc] Received command: 0x1000000C
3,643,803 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,174,802 ready_for_fw is high
1,174,802 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,463 UART: [fwproc] Wait for Commands...
1,283,262 UART: [fwproc] Recv command 0x46574c44
1,283,995 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,577,342 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,575 >>> mbox cmd response: success
2,739,692 UART: [afmc] ++
2,739,860 UART: [afmc] CDI.KEYID = 6
2,740,223 UART: [afmc] SUBJECT.KEYID = 7
2,740,649 UART: [afmc] AUTHORITY.KEYID = 5
2,776,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,995 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,798,710 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,804,602 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,810,314 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,818,039 UART: [afmc] --
2,819,005 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,819,027 UART: [cold-reset] --
2,820,101 UART: [state] Locking Datavault
2,821,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,762 UART: [state] Locking ICCM
2,822,318 UART: [exit] Launching FMC @ 0x40000000
2,827,615 UART:
2,827,631 UART: Running Caliptra FMC ...
2,828,039 UART:
2,828,269 UART: [fmc] Received command: 0x46574C44
2,829,095 UART:
2,829,111 UART: Running Caliptra ROM ...
2,829,519 UART:
2,829,661 UART: [state] CFI Enabled
2,832,481 UART: [state] LifecycleState = Unprovisioned
2,833,136 UART: [state] DebugLocked = No
2,833,868 UART: [state] WD Timer not started. Device not locked for debugging
2,835,126 UART: [kat] SHA2-256
3,638,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,805 UART: [kat] ++
3,642,957 UART: [kat] sha1
3,647,157 UART: [kat] SHA2-256
3,649,097 UART: [kat] SHA2-384
3,651,730 UART: [kat] SHA2-512-ACC
3,653,630 UART: [kat] ECC-384
3,663,533 UART: [kat] HMAC-384Kdf
3,668,119 UART: [kat] LMS
3,916,431 UART: [kat] --
3,917,181 UART: [update-reset] ++
3,933,953 >>> mbox cmd response: failed
3,933,953 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,934,461 UART: ROM Non-Fatal Error: 0x000B001E
3,935,295 UART: [state] Locking Datavault
3,935,975 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,579 UART: [state] Locking ICCM
3,937,153 UART: [exit] Launching FMC @ 0x40000000
3,942,450 UART:
3,942,466 UART: Running Caliptra FMC ...
3,942,874 UART:
3,943,096 UART: [fmc] Received command: 0x1000000C
3,943,831 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,745 ready_for_fw is high
1,055,745 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,049 >>> mbox cmd response: success
2,643,414 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,649,555 UART:
2,649,571 UART: Running Caliptra FMC ...
2,649,979 UART:
2,650,209 UART: [fmc] Received command: 0x46574C44
3,639,907 >>> mbox cmd response: failed
3,639,907 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,645,818 UART:
3,645,834 UART: Running Caliptra FMC ...
3,646,242 UART:
3,646,464 UART: [fmc] Received command: 0x1000000C
3,647,199 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 ready_for_fw is high
1,174,207 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,206,789 UART: [idev] --
1,207,684 UART: [ldev] ++
1,207,852 UART: [ldev] CDI.KEYID = 6
1,208,216 UART: [ldev] SUBJECT.KEYID = 5
1,208,643 UART: [ldev] AUTHORITY.KEYID = 7
1,209,106 UART: [ldev] FE.KEYID = 1
1,214,294 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,420 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,574,495 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,735,610 >>> mbox cmd response: success
2,736,767 UART: [afmc] ++
2,736,935 UART: [afmc] CDI.KEYID = 6
2,737,298 UART: [afmc] SUBJECT.KEYID = 7
2,737,724 UART: [afmc] AUTHORITY.KEYID = 5
2,773,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,789,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,746 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,796,461 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,802,353 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,808,065 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,815,954 UART: [afmc] --
2,816,944 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,816,966 UART: [cold-reset] --
2,817,752 UART: [state] Locking Datavault
2,818,891 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,495 UART: [state] Locking ICCM
2,820,029 UART: [exit] Launching FMC @ 0x40000000
2,825,326 UART:
2,825,342 UART: Running Caliptra FMC ...
2,825,750 UART:
2,825,980 UART: [fmc] Received command: 0x46574C44
2,826,806 UART:
2,826,822 UART: Running Caliptra ROM ...
2,827,230 UART:
2,827,285 UART: [state] CFI Enabled
2,829,573 UART: [state] LifecycleState = Unprovisioned
2,830,228 UART: [state] DebugLocked = No
2,830,912 UART: [state] WD Timer not started. Device not locked for debugging
2,832,206 UART: [kat] SHA2-256
3,635,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,639,885 UART: [kat] ++
3,640,037 UART: [kat] sha1
3,644,343 UART: [kat] SHA2-256
3,646,283 UART: [kat] SHA2-384
3,649,204 UART: [kat] SHA2-512-ACC
3,651,104 UART: [kat] ECC-384
3,660,799 UART: [kat] HMAC-384Kdf
3,665,297 UART: [kat] LMS
3,913,609 UART: [kat] --
3,914,391 UART: [update-reset] ++
3,931,371 >>> mbox cmd response: failed
3,931,371 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,931,815 UART: ROM Non-Fatal Error: 0x000B001E
3,932,817 UART: [state] Locking Datavault
3,933,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,353 UART: [state] Locking ICCM
3,934,809 UART: [exit] Launching FMC @ 0x40000000
3,940,106 UART:
3,940,122 UART: Running Caliptra FMC ...
3,940,530 UART:
3,940,752 UART: [fmc] Received command: 0x1000000C
3,941,487 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,706 ready_for_fw is high
1,056,706 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,386 >>> mbox cmd response: success
2,642,969 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,648,658 UART:
2,648,674 UART: Running Caliptra FMC ...
2,649,082 UART:
2,649,312 UART: [fmc] Received command: 0x46574C44
3,637,263 >>> mbox cmd response: failed
3,637,263 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,642,902 UART:
3,642,918 UART: Running Caliptra FMC ...
3,643,326 UART:
3,643,548 UART: [fmc] Received command: 0x1000000C
3,644,283 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,102 UART: [idev] ++
1,173,270 UART: [idev] CDI.KEYID = 6
1,173,631 UART: [idev] SUBJECT.KEYID = 7
1,174,056 UART: [idev] UDS.KEYID = 0
1,174,402 ready_for_fw is high
1,174,402 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,315 UART: [ldev] ++
1,209,483 UART: [ldev] CDI.KEYID = 6
1,209,847 UART: [ldev] SUBJECT.KEYID = 5
1,210,274 UART: [ldev] AUTHORITY.KEYID = 7
1,210,737 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,707 UART: [ldev] --
1,282,157 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 111668 bytes
2,550,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,577,586 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,738,653 >>> mbox cmd response: success
2,739,670 UART: [afmc] ++
2,739,838 UART: [afmc] CDI.KEYID = 6
2,740,201 UART: [afmc] SUBJECT.KEYID = 7
2,740,627 UART: [afmc] AUTHORITY.KEYID = 5
2,776,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,071 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,799,786 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,805,678 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,811,390 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,329 UART: [afmc] --
2,820,399 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,820,421 UART: [cold-reset] --
2,821,273 UART: [state] Locking Datavault
2,822,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,048 UART: [state] Locking ICCM
2,823,502 UART: [exit] Launching FMC @ 0x40000000
2,828,799 UART:
2,828,815 UART: Running Caliptra FMC ...
2,829,223 UART:
2,829,453 UART: [fmc] Received command: 0x46574C44
2,830,279 UART:
2,830,295 UART: Running Caliptra ROM ...
2,830,703 UART:
2,830,845 UART: [state] CFI Enabled
2,833,717 UART: [state] LifecycleState = Unprovisioned
2,834,372 UART: [state] DebugLocked = No
2,834,976 UART: [state] WD Timer not started. Device not locked for debugging
2,836,170 UART: [kat] SHA2-256
3,639,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,849 UART: [kat] ++
3,644,001 UART: [kat] sha1
3,648,315 UART: [kat] SHA2-256
3,650,255 UART: [kat] SHA2-384
3,652,946 UART: [kat] SHA2-512-ACC
3,654,846 UART: [kat] ECC-384
3,664,729 UART: [kat] HMAC-384Kdf
3,669,245 UART: [kat] LMS
3,917,557 UART: [kat] --
3,918,397 UART: [update-reset] ++
3,935,155 >>> mbox cmd response: failed
3,935,155 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,477 UART: ROM Non-Fatal Error: 0x000B001E
3,936,367 UART: [state] Locking Datavault
3,937,181 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,785 UART: [state] Locking ICCM
3,938,447 UART: [exit] Launching FMC @ 0x40000000
3,943,744 UART:
3,943,760 UART: Running Caliptra FMC ...
3,944,168 UART:
3,944,390 UART: [fmc] Received command: 0x1000000C
3,945,125 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,833 ready_for_fw is high
1,056,833 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,588,549 >>> mbox cmd response: success
2,643,924 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,649,933 UART:
2,649,949 UART: Running Caliptra FMC ...
2,650,357 UART:
2,650,587 UART: [fmc] Received command: 0x46574C44
3,640,077 >>> mbox cmd response: failed
3,640,077 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,645,892 UART:
3,645,908 UART: Running Caliptra FMC ...
3,646,316 UART:
3,646,538 UART: [fmc] Received command: 0x1000000C
3,647,273 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,007 UART:
192,365 UART: Running Caliptra ROM ...
193,444 UART:
193,586 UART: [state] CFI Enabled
263,207 UART: [state] LifecycleState = Unprovisioned
265,550 UART: [state] DebugLocked = No
267,390 UART: [state] WD Timer not started. Device not locked for debugging
272,484 UART: [kat] SHA2-256
454,407 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,936 UART: [kat] ++
466,540 UART: [kat] sha1
476,426 UART: [kat] SHA2-256
479,432 UART: [kat] SHA2-384
484,563 UART: [kat] SHA2-512-ACC
487,137 UART: [kat] ECC-384
3,776,937 UART: [kat] HMAC-384Kdf
3,802,333 UART: [kat] LMS
4,875,476 UART: [kat] --
4,879,424 UART: [cold-reset] ++
4,881,287 UART: [fht] FHT @ 0x50003400
4,891,907 UART: [idev] ++
4,892,608 UART: [idev] CDI.KEYID = 6
4,893,795 UART: [idev] SUBJECT.KEYID = 7
4,894,969 UART: [idev] UDS.KEYID = 0
4,895,907 ready_for_fw is high
4,896,114 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,036,234 UART: [idev] Erasing UDS.KEYID = 0
8,244,777 UART: [idev] Sha1 KeyId Algorithm
8,268,004 UART: [idev] --
8,271,946 UART: [ldev] ++
8,272,572 UART: [ldev] CDI.KEYID = 6
8,273,745 UART: [ldev] SUBJECT.KEYID = 5
8,274,902 UART: [ldev] AUTHORITY.KEYID = 7
8,276,133 UART: [ldev] FE.KEYID = 1
8,320,279 UART: [ldev] Erasing FE.KEYID = 1
11,657,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,444 UART: [ldev] --
14,041,708 UART: [fwproc] Wait for Commands...
14,044,077 UART: [fwproc] Recv command 0x46574c44
14,046,385 UART: [fwproc] Recv'd Img size: 111324 bytes
22,422,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,496,151 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,556,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,873,030 >>> mbox cmd response: success
22,876,774 UART: [afmc] ++
22,877,388 UART: [afmc] CDI.KEYID = 6
22,878,528 UART: [afmc] SUBJECT.KEYID = 7
22,879,689 UART: [afmc] AUTHORITY.KEYID = 5
26,237,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,532,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,534,673 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,550,765 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,566,834 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,582,805 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,606,152 UART: [afmc] --
28,611,283 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
28,751,494 UART: [cold-reset] --
28,752,348 UART: [state] Locking Datavault
28,753,429 UART: [state] Locking PCR0, PCR1 and PCR31
28,754,965 UART: [state] Locking ICCM
28,755,844 UART: [exit] Launching FMC @ 0x40000000
28,757,184 UART:
28,757,331 UART: Running Caliptra FMC ...
28,758,426 UART:
28,758,577 UART: [fmc] Received command: 0x46574C44
28,759,946 UART:
28,760,110 UART: Running Caliptra ROM ...
28,761,130 UART:
28,761,276 UART: [state] CFI Enabled
28,828,794 UART: [state] LifecycleState = Unprovisioned
28,830,669 UART: [state] DebugLocked = No
28,833,430 UART: [state] WD Timer not started. Device not locked for debugging
28,837,934 UART: [kat] SHA2-256
29,019,851 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,031,365 UART: [kat] ++
29,031,825 UART: [kat] sha1
29,043,041 UART: [kat] SHA2-256
29,046,068 UART: [kat] SHA2-384
29,052,808 UART: [kat] SHA2-512-ACC
29,055,428 UART: [kat] ECC-384
32,340,240 UART: [kat] HMAC-384Kdf
32,364,993 UART: [kat] LMS
33,438,107 UART: [kat] --
33,442,227 UART: [update-reset] ++
33,491,470 >>> mbox cmd response: failed
33,491,893 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,493,309 UART: ROM Non-Fatal Error: 0x000B003D
33,495,763 UART: [state] Locking Datavault
33,500,204 UART: [state] Locking PCR0, PCR1 and PCR31
33,502,349 UART: [state] Locking ICCM
33,504,767 UART: [exit] Launching FMC @ 0x40000000
33,513,436 UART:
33,513,663 UART: Running Caliptra FMC ...
33,514,762 UART:
33,514,915 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,516,555 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
4,801,311 ready_for_fw is high
4,801,706 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,274,281 >>> mbox cmd response: success
27,949,799 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
28,090,133 UART:
28,090,514 UART: Running Caliptra FMC ...
28,091,704 UART:
28,091,884 UART: [fmc] Received command: 0x46574C44
32,738,532 >>> mbox cmd response: failed
32,739,040 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,750,896 UART:
32,751,163 UART: Running Caliptra FMC ...
32,752,346 UART:
32,752,505 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,754,143 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,390 UART:
192,745 UART: Running Caliptra ROM ...
193,905 UART:
603,363 UART: [state] CFI Enabled
617,557 UART: [state] LifecycleState = Unprovisioned
619,932 UART: [state] DebugLocked = No
622,520 UART: [state] WD Timer not started. Device not locked for debugging
627,037 UART: [kat] SHA2-256
808,972 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,560 UART: [kat] ++
821,159 UART: [kat] sha1
830,260 UART: [kat] SHA2-256
833,327 UART: [kat] SHA2-384
838,810 UART: [kat] SHA2-512-ACC
841,460 UART: [kat] ECC-384
4,098,005 UART: [kat] HMAC-384Kdf
4,109,843 UART: [kat] LMS
5,183,003 UART: [kat] --
5,186,890 UART: [cold-reset] ++
5,189,394 UART: [fht] FHT @ 0x50003400
5,200,527 UART: [idev] ++
5,201,206 UART: [idev] CDI.KEYID = 6
5,202,382 UART: [idev] SUBJECT.KEYID = 7
5,203,836 UART: [idev] UDS.KEYID = 0
5,205,086 ready_for_fw is high
5,205,280 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,344,953 UART: [idev] Erasing UDS.KEYID = 0
8,490,965 UART: [idev] Sha1 KeyId Algorithm
8,513,321 UART: [idev] --
8,517,633 UART: [ldev] ++
8,518,192 UART: [ldev] CDI.KEYID = 6
8,519,416 UART: [ldev] SUBJECT.KEYID = 5
8,520,909 UART: [ldev] AUTHORITY.KEYID = 7
8,522,457 UART: [ldev] FE.KEYID = 1
8,532,336 UART: [ldev] Erasing FE.KEYID = 1
11,822,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,451 UART: [ldev] --
14,187,764 UART: [fwproc] Wait for Commands...
14,189,469 UART: [fwproc] Recv command 0x46574c44
14,191,766 UART: [fwproc] Recv'd Img size: 111324 bytes
22,492,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,570,188 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,630,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
22,947,249 >>> mbox cmd response: success
22,951,336 UART: [afmc] ++
22,952,063 UART: [afmc] CDI.KEYID = 6
22,953,251 UART: [afmc] SUBJECT.KEYID = 7
22,954,577 UART: [afmc] AUTHORITY.KEYID = 5
26,272,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,566,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,568,614 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,584,718 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,600,804 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,616,780 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,639,876 UART: [afmc] --
28,644,029 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
28,784,151 UART: [cold-reset] --
28,785,009 UART: [state] Locking Datavault
28,786,163 UART: [state] Locking PCR0, PCR1 and PCR31
28,787,691 UART: [state] Locking ICCM
28,788,608 UART: [exit] Launching FMC @ 0x40000000
28,790,070 UART:
28,790,235 UART: Running Caliptra FMC ...
28,791,268 UART:
28,791,406 UART: [fmc] Received command: 0x46574C44
28,792,858 UART:
28,793,005 UART: Running Caliptra ROM ...
28,794,326 UART:
28,794,490 UART: [state] CFI Enabled
28,800,453 UART: [state] LifecycleState = Unprovisioned
28,802,322 UART: [state] DebugLocked = No
28,804,179 UART: [state] WD Timer not started. Device not locked for debugging
28,809,424 UART: [kat] SHA2-256
28,991,358 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
29,002,942 UART: [kat] ++
29,003,397 UART: [kat] sha1
29,015,107 UART: [kat] SHA2-256
29,018,176 UART: [kat] SHA2-384
29,023,399 UART: [kat] SHA2-512-ACC
29,026,019 UART: [kat] ECC-384
32,281,940 UART: [kat] HMAC-384Kdf
32,293,685 UART: [kat] LMS
33,366,789 UART: [kat] --
33,372,571 UART: [update-reset] ++
33,424,831 >>> mbox cmd response: failed
33,425,204 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,427,422 UART: ROM Non-Fatal Error: 0x000B003D
33,430,793 UART: [state] Locking Datavault
33,433,740 UART: [state] Locking PCR0, PCR1 and PCR31
33,435,912 UART: [state] Locking ICCM
33,437,527 UART: [exit] Launching FMC @ 0x40000000
33,446,197 UART:
33,446,437 UART: Running Caliptra FMC ...
33,447,453 UART:
33,447,590 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,449,219 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
5,097,090 ready_for_fw is high
5,097,485 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
22,506,659 >>> mbox cmd response: success
28,130,939 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
28,271,286 UART:
28,271,684 UART: Running Caliptra FMC ...
28,272,875 UART:
28,273,035 UART: [fmc] Received command: 0x46574C44
32,805,425 >>> mbox cmd response: failed
32,805,893 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,819,693 UART:
32,819,953 UART: Running Caliptra FMC ...
32,821,050 UART:
32,821,195 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,822,833 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,088 UART:
192,474 UART: Running Caliptra ROM ...
193,649 UART:
193,807 UART: [state] CFI Enabled
263,845 UART: [state] LifecycleState = Unprovisioned
265,690 UART: [state] DebugLocked = No
267,442 UART: [state] WD Timer not started. Device not locked for debugging
270,484 UART: [kat] SHA2-256
449,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,194 UART: [kat] ++
461,732 UART: [kat] sha1
473,179 UART: [kat] SHA2-256
476,261 UART: [kat] SHA2-384
482,604 UART: [kat] SHA2-512-ACC
485,542 UART: [kat] ECC-384
2,950,183 UART: [kat] HMAC-384Kdf
2,971,246 UART: [kat] LMS
3,500,723 UART: [kat] --
3,502,800 UART: [cold-reset] ++
3,504,950 UART: [fht] FHT @ 0x50003400
3,515,359 UART: [idev] ++
3,515,930 UART: [idev] CDI.KEYID = 6
3,516,848 UART: [idev] SUBJECT.KEYID = 7
3,518,045 UART: [idev] UDS.KEYID = 0
3,518,973 ready_for_fw is high
3,519,160 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,659,612 UART: [idev] Erasing UDS.KEYID = 0
6,028,624 UART: [idev] Sha1 KeyId Algorithm
6,051,458 UART: [idev] --
6,055,494 UART: [ldev] ++
6,056,078 UART: [ldev] CDI.KEYID = 6
6,057,004 UART: [ldev] SUBJECT.KEYID = 5
6,058,178 UART: [ldev] AUTHORITY.KEYID = 7
6,059,411 UART: [ldev] FE.KEYID = 1
6,097,712 UART: [ldev] Erasing FE.KEYID = 1
8,601,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,530 UART: [ldev] --
10,411,772 UART: [fwproc] Wait for Commands...
10,413,224 UART: [fwproc] Recv command 0x46574c44
10,415,318 UART: [fwproc] Recv'd Img size: 111668 bytes
14,949,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,030,607 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,090,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,408,184 >>> mbox cmd response: success
15,411,867 UART: [afmc] ++
15,412,484 UART: [afmc] CDI.KEYID = 6
15,413,399 UART: [afmc] SUBJECT.KEYID = 7
15,414,566 UART: [afmc] AUTHORITY.KEYID = 5
17,956,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,679,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,680,902 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,696,906 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,712,884 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,728,673 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,752,099 UART: [afmc] --
19,757,164 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,897,946 UART: [cold-reset] --
19,898,811 UART: [state] Locking Datavault
19,899,888 UART: [state] Locking PCR0, PCR1 and PCR31
19,901,427 UART: [state] Locking ICCM
19,902,307 UART: [exit] Launching FMC @ 0x40000000
19,903,647 UART:
19,903,794 UART: Running Caliptra FMC ...
19,904,892 UART:
19,905,048 UART: [fmc] Received command: 0x46574C44
19,906,422 UART:
19,906,567 UART: Running Caliptra ROM ...
19,907,630 UART:
19,907,780 UART: [state] CFI Enabled
19,971,823 UART: [state] LifecycleState = Unprovisioned
19,973,695 UART: [state] DebugLocked = No
19,975,646 UART: [state] WD Timer not started. Device not locked for debugging
19,978,789 UART: [kat] SHA2-256
20,157,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,169,501 UART: [kat] ++
20,169,955 UART: [kat] sha1
20,180,567 UART: [kat] SHA2-256
20,183,575 UART: [kat] SHA2-384
20,189,611 UART: [kat] SHA2-512-ACC
20,192,551 UART: [kat] ECC-384
22,655,703 UART: [kat] HMAC-384Kdf
22,669,765 UART: [kat] LMS
23,199,233 UART: [kat] --
23,203,643 UART: [update-reset] ++
23,257,649 >>> mbox cmd response: failed
23,258,061 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,259,743 UART: ROM Non-Fatal Error: 0x000B003D
23,263,120 UART: [state] Locking Datavault
23,267,073 UART: [state] Locking PCR0, PCR1 and PCR31
23,268,786 UART: [state] Locking ICCM
23,270,720 UART: [exit] Launching FMC @ 0x40000000
23,279,069 UART:
23,279,306 UART: Running Caliptra FMC ...
23,280,406 UART:
23,280,561 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,282,192 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,379,448 ready_for_fw is high
3,379,833 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,058,330 >>> mbox cmd response: success
19,335,620 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,476,400 UART:
19,476,779 UART: Running Caliptra FMC ...
19,477,969 UART:
19,478,138 UART: [fmc] Received command: 0x46574C44
22,709,777 >>> mbox cmd response: failed
22,710,246 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,723,162 UART:
22,723,432 UART: Running Caliptra FMC ...
22,724,633 UART:
22,724,794 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,726,432 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,517 UART:
192,865 UART: Running Caliptra ROM ...
194,034 UART:
603,762 UART: [state] CFI Enabled
620,060 UART: [state] LifecycleState = Unprovisioned
622,579 UART: [state] DebugLocked = No
624,389 UART: [state] WD Timer not started. Device not locked for debugging
628,905 UART: [kat] SHA2-256
808,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,611 UART: [kat] ++
820,077 UART: [kat] sha1
831,022 UART: [kat] SHA2-256
834,097 UART: [kat] SHA2-384
841,076 UART: [kat] SHA2-512-ACC
844,085 UART: [kat] ECC-384
3,284,974 UART: [kat] HMAC-384Kdf
3,297,561 UART: [kat] LMS
3,827,072 UART: [kat] --
3,831,091 UART: [cold-reset] ++
3,833,038 UART: [fht] FHT @ 0x50003400
3,844,515 UART: [idev] ++
3,845,083 UART: [idev] CDI.KEYID = 6
3,846,116 UART: [idev] SUBJECT.KEYID = 7
3,847,213 UART: [idev] UDS.KEYID = 0
3,848,255 ready_for_fw is high
3,848,485 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,988,963 UART: [idev] Erasing UDS.KEYID = 0
6,319,635 UART: [idev] Sha1 KeyId Algorithm
6,342,991 UART: [idev] --
6,346,119 UART: [ldev] ++
6,346,683 UART: [ldev] CDI.KEYID = 6
6,347,608 UART: [ldev] SUBJECT.KEYID = 5
6,348,763 UART: [ldev] AUTHORITY.KEYID = 7
6,349,986 UART: [ldev] FE.KEYID = 1
6,361,654 UART: [ldev] Erasing FE.KEYID = 1
8,833,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,795 UART: [ldev] --
10,625,630 UART: [fwproc] Wait for Commands...
10,628,534 UART: [fwproc] Recv command 0x46574c44
10,630,628 UART: [fwproc] Recv'd Img size: 111668 bytes
15,164,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,238,341 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,298,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,615,343 >>> mbox cmd response: success
15,618,853 UART: [afmc] ++
15,619,463 UART: [afmc] CDI.KEYID = 6
15,620,379 UART: [afmc] SUBJECT.KEYID = 7
15,621,542 UART: [afmc] AUTHORITY.KEYID = 5
18,115,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,836,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,838,251 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,854,232 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,870,216 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,885,989 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,908,988 UART: [afmc] --
19,914,164 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
20,054,798 UART: [cold-reset] --
20,055,661 UART: [state] Locking Datavault
20,056,735 UART: [state] Locking PCR0, PCR1 and PCR31
20,058,275 UART: [state] Locking ICCM
20,059,156 UART: [exit] Launching FMC @ 0x40000000
20,060,495 UART:
20,060,644 UART: Running Caliptra FMC ...
20,061,955 UART:
20,062,117 UART: [fmc] Received command: 0x46574C44
20,063,493 UART:
20,063,636 UART: Running Caliptra ROM ...
20,064,810 UART:
20,064,975 UART: [state] CFI Enabled
20,070,175 UART: [state] LifecycleState = Unprovisioned
20,072,099 UART: [state] DebugLocked = No
20,073,952 UART: [state] WD Timer not started. Device not locked for debugging
20,078,276 UART: [kat] SHA2-256
20,257,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,269,016 UART: [kat] ++
20,269,472 UART: [kat] sha1
20,279,647 UART: [kat] SHA2-256
20,282,707 UART: [kat] SHA2-384
20,289,441 UART: [kat] SHA2-512-ACC
20,292,377 UART: [kat] ECC-384
22,736,415 UART: [kat] HMAC-384Kdf
22,749,768 UART: [kat] LMS
23,279,313 UART: [kat] --
23,281,951 UART: [update-reset] ++
23,331,779 >>> mbox cmd response: failed
23,332,176 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,334,737 UART: ROM Non-Fatal Error: 0x000B003D
23,337,247 UART: [state] Locking Datavault
23,340,604 UART: [state] Locking PCR0, PCR1 and PCR31
23,342,392 UART: [state] Locking ICCM
23,343,637 UART: [exit] Launching FMC @ 0x40000000
23,352,032 UART:
23,352,268 UART: Running Caliptra FMC ...
23,353,292 UART:
23,353,437 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,355,071 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,695,300 ready_for_fw is high
3,695,887 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,193,994 >>> mbox cmd response: success
19,424,795 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,565,586 UART:
19,565,970 UART: Running Caliptra FMC ...
19,567,076 UART:
19,567,232 UART: [fmc] Received command: 0x46574C44
22,702,457 >>> mbox cmd response: failed
22,702,934 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,714,556 UART:
22,714,811 UART: Running Caliptra FMC ...
22,715,899 UART:
22,716,047 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,717,714 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,151 UART:
192,515 UART: Running Caliptra ROM ...
193,813 UART:
193,964 UART: [state] CFI Enabled
266,328 UART: [state] LifecycleState = Unprovisioned
268,236 UART: [state] DebugLocked = No
270,840 UART: [state] WD Timer not started. Device not locked for debugging
274,574 UART: [kat] SHA2-256
453,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,224 UART: [kat] ++
465,762 UART: [kat] sha1
476,928 UART: [kat] SHA2-256
479,944 UART: [kat] SHA2-384
486,648 UART: [kat] SHA2-512-ACC
489,585 UART: [kat] ECC-384
2,949,712 UART: [kat] HMAC-384Kdf
2,971,901 UART: [kat] LMS
3,501,322 UART: [kat] --
3,505,817 UART: [cold-reset] ++
3,506,970 UART: [fht] FHT @ 0x50003400
3,517,309 UART: [idev] ++
3,517,879 UART: [idev] CDI.KEYID = 6
3,518,804 UART: [idev] SUBJECT.KEYID = 7
3,519,978 UART: [idev] UDS.KEYID = 0
3,520,971 ready_for_fw is high
3,521,179 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,661,749 UART: [idev] Erasing UDS.KEYID = 0
6,030,165 UART: [idev] Sha1 KeyId Algorithm
6,053,559 UART: [idev] --
6,058,131 UART: [ldev] ++
6,058,714 UART: [ldev] CDI.KEYID = 6
6,059,646 UART: [ldev] SUBJECT.KEYID = 5
6,060,811 UART: [ldev] AUTHORITY.KEYID = 7
6,062,098 UART: [ldev] FE.KEYID = 1
6,100,515 UART: [ldev] Erasing FE.KEYID = 1
8,603,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,390 UART: [ldev] --
10,414,899 UART: [fwproc] Wait for Commands...
10,416,453 UART: [fwproc] Recv command 0x46574c44
10,418,544 UART: [fwproc] Recv'd Img size: 111668 bytes
14,932,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,007,352 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,067,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,384,839 >>> mbox cmd response: success
15,388,250 UART: [afmc] ++
15,388,861 UART: [afmc] CDI.KEYID = 6
15,389,775 UART: [afmc] SUBJECT.KEYID = 7
15,390,934 UART: [afmc] AUTHORITY.KEYID = 5
17,912,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,640,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,642,272 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,658,260 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,674,231 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,690,048 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,711,791 UART: [afmc] --
19,716,794 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,857,424 UART: [cold-reset] --
19,858,271 UART: [state] Locking Datavault
19,859,424 UART: [state] Locking PCR0, PCR1 and PCR31
19,860,981 UART: [state] Locking ICCM
19,861,889 UART: [exit] Launching FMC @ 0x40000000
19,863,315 UART:
19,863,473 UART: Running Caliptra FMC ...
19,864,570 UART:
19,864,721 UART: [fmc] Received command: 0x46574C44
19,866,177 UART:
19,866,331 UART: Running Caliptra ROM ...
19,867,426 UART:
19,867,577 UART: [state] CFI Enabled
19,929,378 UART: [state] LifecycleState = Unprovisioned
19,931,250 UART: [state] DebugLocked = No
19,933,661 UART: [state] WD Timer not started. Device not locked for debugging
19,936,861 UART: [kat] SHA2-256
20,116,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,127,537 UART: [kat] ++
20,128,093 UART: [kat] sha1
20,139,962 UART: [kat] SHA2-256
20,142,969 UART: [kat] SHA2-384
20,149,594 UART: [kat] SHA2-512-ACC
20,152,532 UART: [kat] ECC-384
22,614,928 UART: [kat] HMAC-384Kdf
22,638,014 UART: [kat] LMS
23,167,491 UART: [kat] --
23,171,866 UART: [update-reset] ++
23,222,353 >>> mbox cmd response: failed
23,222,743 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,223,076 UART: ROM Non-Fatal Error: 0x000B003D
23,226,691 UART: [state] Locking Datavault
23,228,485 UART: [state] Locking PCR0, PCR1 and PCR31
23,230,191 UART: [state] Locking ICCM
23,232,176 UART: [exit] Launching FMC @ 0x40000000
23,240,611 UART:
23,240,890 UART: Running Caliptra FMC ...
23,242,003 UART:
23,242,168 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,243,798 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,380,931 ready_for_fw is high
3,381,325 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,978,861 >>> mbox cmd response: success
19,244,495 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,385,674 UART:
19,386,061 UART: Running Caliptra FMC ...
19,387,280 UART:
19,387,448 UART: [fmc] Received command: 0x46574C44
22,589,761 >>> mbox cmd response: failed
22,590,249 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,602,624 UART:
22,602,884 UART: Running Caliptra FMC ...
22,603,978 UART:
22,604,126 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,605,763 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,364 UART:
192,736 UART: Running Caliptra ROM ...
193,938 UART:
603,658 UART: [state] CFI Enabled
617,402 UART: [state] LifecycleState = Unprovisioned
619,276 UART: [state] DebugLocked = No
621,079 UART: [state] WD Timer not started. Device not locked for debugging
624,097 UART: [kat] SHA2-256
803,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,789 UART: [kat] ++
815,236 UART: [kat] sha1
825,112 UART: [kat] SHA2-256
828,120 UART: [kat] SHA2-384
835,029 UART: [kat] SHA2-512-ACC
838,042 UART: [kat] ECC-384
3,281,061 UART: [kat] HMAC-384Kdf
3,293,433 UART: [kat] LMS
3,822,925 UART: [kat] --
3,828,166 UART: [cold-reset] ++
3,829,887 UART: [fht] FHT @ 0x50003400
3,841,577 UART: [idev] ++
3,842,143 UART: [idev] CDI.KEYID = 6
3,843,169 UART: [idev] SUBJECT.KEYID = 7
3,844,269 UART: [idev] UDS.KEYID = 0
3,845,192 ready_for_fw is high
3,845,381 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,985,638 UART: [idev] Erasing UDS.KEYID = 0
6,320,765 UART: [idev] Sha1 KeyId Algorithm
6,344,806 UART: [idev] --
6,347,825 UART: [ldev] ++
6,348,390 UART: [ldev] CDI.KEYID = 6
6,349,298 UART: [ldev] SUBJECT.KEYID = 5
6,350,457 UART: [ldev] AUTHORITY.KEYID = 7
6,351,740 UART: [ldev] FE.KEYID = 1
6,365,074 UART: [ldev] Erasing FE.KEYID = 1
8,838,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,490 UART: [ldev] --
10,627,270 UART: [fwproc] Wait for Commands...
10,629,845 UART: [fwproc] Recv command 0x46574c44
10,631,936 UART: [fwproc] Recv'd Img size: 111668 bytes
15,156,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,230,018 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,290,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,606,876 >>> mbox cmd response: success
15,611,745 UART: [afmc] ++
15,612,348 UART: [afmc] CDI.KEYID = 6
15,613,251 UART: [afmc] SUBJECT.KEYID = 7
15,614,468 UART: [afmc] AUTHORITY.KEYID = 5
18,114,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,832,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,834,806 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,850,806 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,866,803 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,882,613 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,905,016 UART: [afmc] --
19,910,647 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
20,051,378 UART: [cold-reset] --
20,052,244 UART: [state] Locking Datavault
20,053,321 UART: [state] Locking PCR0, PCR1 and PCR31
20,054,857 UART: [state] Locking ICCM
20,055,736 UART: [exit] Launching FMC @ 0x40000000
20,057,079 UART:
20,057,253 UART: Running Caliptra FMC ...
20,058,408 UART:
20,058,571 UART: [fmc] Received command: 0x46574C44
20,060,121 UART:
20,060,282 UART: Running Caliptra ROM ...
20,061,359 UART:
20,061,518 UART: [state] CFI Enabled
20,069,209 UART: [state] LifecycleState = Unprovisioned
20,071,095 UART: [state] DebugLocked = No
20,072,967 UART: [state] WD Timer not started. Device not locked for debugging
20,077,285 UART: [kat] SHA2-256
20,256,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,268,029 UART: [kat] ++
20,268,490 UART: [kat] sha1
20,278,128 UART: [kat] SHA2-256
20,281,146 UART: [kat] SHA2-384
20,288,423 UART: [kat] SHA2-512-ACC
20,291,363 UART: [kat] ECC-384
22,733,919 UART: [kat] HMAC-384Kdf
22,745,816 UART: [kat] LMS
23,275,327 UART: [kat] --
23,277,985 UART: [update-reset] ++
23,333,604 >>> mbox cmd response: failed
23,334,015 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,336,238 UART: ROM Non-Fatal Error: 0x000B003D
23,340,108 UART: [state] Locking Datavault
23,344,600 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,242 UART: [state] Locking ICCM
23,348,574 UART: [exit] Launching FMC @ 0x40000000
23,356,956 UART:
23,357,185 UART: Running Caliptra FMC ...
23,358,204 UART:
23,358,368 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,359,990 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,697,957 ready_for_fw is high
3,698,615 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
15,226,051 >>> mbox cmd response: success
19,462,787 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
19,603,592 UART:
19,603,977 UART: Running Caliptra FMC ...
19,605,164 UART:
19,605,332 UART: [fmc] Received command: 0x46574C44
22,741,879 >>> mbox cmd response: failed
22,742,373 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,753,959 UART:
22,754,254 UART: Running Caliptra FMC ...
22,755,446 UART:
22,755,605 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,757,238 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,174,627 ready_for_fw is high
1,174,627 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,919 UART: [idev] Sha1 KeyId Algorithm
1,208,807 UART: [idev] --
1,210,018 UART: [ldev] ++
1,210,186 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,977 UART: [ldev] AUTHORITY.KEYID = 7
1,211,440 UART: [ldev] FE.KEYID = 1
1,216,618 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,438 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 111668 bytes
3,090,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,119,234 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,280,481 >>> mbox cmd response: success
3,281,598 UART: [afmc] ++
3,281,766 UART: [afmc] CDI.KEYID = 6
3,282,129 UART: [afmc] SUBJECT.KEYID = 7
3,282,555 UART: [afmc] AUTHORITY.KEYID = 5
3,318,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,647 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,341,358 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,347,245 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,352,943 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,360,676 UART: [afmc] --
3,361,756 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,361,778 UART: [cold-reset] --
3,362,680 UART: [state] Locking Datavault
3,363,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,267 UART: [state] Locking ICCM
3,364,727 UART: [exit] Launching FMC @ 0x40000000
3,370,024 UART:
3,370,040 UART: Running Caliptra FMC ...
3,370,448 UART:
3,370,678 UART: [fmc] Received command: 0x46574C44
3,371,504 UART:
3,371,520 UART: Running Caliptra ROM ...
3,371,928 UART:
3,371,983 UART: [state] CFI Enabled
3,374,521 UART: [state] LifecycleState = Unprovisioned
3,375,176 UART: [state] DebugLocked = No
3,375,822 UART: [state] WD Timer not started. Device not locked for debugging
3,377,084 UART: [kat] SHA2-256
4,180,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,184,763 UART: [kat] ++
4,184,915 UART: [kat] sha1
4,189,221 UART: [kat] SHA2-256
4,191,161 UART: [kat] SHA2-384
4,193,960 UART: [kat] SHA2-512-ACC
4,195,860 UART: [kat] ECC-384
4,205,121 UART: [kat] HMAC-384Kdf
4,209,817 UART: [kat] LMS
4,458,129 UART: [kat] --
4,458,923 UART: [update-reset] ++
4,477,131 >>> mbox cmd response: failed
4,477,131 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,477,607 UART: ROM Non-Fatal Error: 0x000B003D
4,478,585 UART: [state] Locking Datavault
4,479,307 UART: [state] Locking PCR0, PCR1 and PCR31
4,479,911 UART: [state] Locking ICCM
4,480,489 UART: [exit] Launching FMC @ 0x40000000
4,485,786 UART:
4,485,802 UART: Running Caliptra FMC ...
4,486,210 UART:
4,486,432 UART: [fmc] Received command: 0x1000000C
4,487,167 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,500 ready_for_fw is high
1,055,500 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,127,368 >>> mbox cmd response: success
3,183,929 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,190,382 UART:
3,190,398 UART: Running Caliptra FMC ...
3,190,806 UART:
3,191,036 UART: [fmc] Received command: 0x46574C44
4,181,077 >>> mbox cmd response: failed
4,181,077 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,187,050 UART:
4,187,066 UART: Running Caliptra FMC ...
4,187,474 UART:
4,187,696 UART: [fmc] Received command: 0x1000000C
4,188,431 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,174,766 ready_for_fw is high
1,174,766 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,650 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,785 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,121 UART: [fwproc] Recv'd Img size: 111668 bytes
3,089,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,117,352 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,278,553 >>> mbox cmd response: success
3,279,592 UART: [afmc] ++
3,279,760 UART: [afmc] CDI.KEYID = 6
3,280,123 UART: [afmc] SUBJECT.KEYID = 7
3,280,549 UART: [afmc] AUTHORITY.KEYID = 5
3,316,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,795 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,339,506 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,345,393 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,351,091 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,359,048 UART: [afmc] --
3,359,940 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,359,962 UART: [cold-reset] --
3,360,548 UART: [state] Locking Datavault
3,361,597 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,201 UART: [state] Locking ICCM
3,362,875 UART: [exit] Launching FMC @ 0x40000000
3,368,172 UART:
3,368,188 UART: Running Caliptra FMC ...
3,368,596 UART:
3,368,826 UART: [fmc] Received command: 0x46574C44
3,369,652 UART:
3,369,668 UART: Running Caliptra ROM ...
3,370,076 UART:
3,370,218 UART: [state] CFI Enabled
3,372,838 UART: [state] LifecycleState = Unprovisioned
3,373,493 UART: [state] DebugLocked = No
3,374,101 UART: [state] WD Timer not started. Device not locked for debugging
3,375,337 UART: [kat] SHA2-256
4,178,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,183,016 UART: [kat] ++
4,183,168 UART: [kat] sha1
4,187,576 UART: [kat] SHA2-256
4,189,516 UART: [kat] SHA2-384
4,192,227 UART: [kat] SHA2-512-ACC
4,194,127 UART: [kat] ECC-384
4,204,132 UART: [kat] HMAC-384Kdf
4,208,910 UART: [kat] LMS
4,457,222 UART: [kat] --
4,457,770 UART: [update-reset] ++
4,475,372 >>> mbox cmd response: failed
4,475,372 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,004 UART: ROM Non-Fatal Error: 0x000B003D
4,476,996 UART: [state] Locking Datavault
4,477,986 UART: [state] Locking PCR0, PCR1 and PCR31
4,478,590 UART: [state] Locking ICCM
4,479,092 UART: [exit] Launching FMC @ 0x40000000
4,484,389 UART:
4,484,405 UART: Running Caliptra FMC ...
4,484,813 UART:
4,485,035 UART: [fmc] Received command: 0x1000000C
4,485,770 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,711 ready_for_fw is high
1,055,711 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,134,894 >>> mbox cmd response: success
3,191,013 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,197,500 UART:
3,197,516 UART: Running Caliptra FMC ...
3,197,924 UART:
3,198,154 UART: [fmc] Received command: 0x46574C44
4,188,912 >>> mbox cmd response: failed
4,188,912 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,194,509 UART:
4,194,525 UART: Running Caliptra FMC ...
4,194,933 UART:
4,195,155 UART: [fmc] Received command: 0x1000000C
4,195,890 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,939 UART: [kat] ++
895,091 UART: [kat] sha1
899,199 UART: [kat] SHA2-256
901,139 UART: [kat] SHA2-384
903,930 UART: [kat] SHA2-512-ACC
905,831 UART: [kat] ECC-384
915,366 UART: [kat] HMAC-384Kdf
919,942 UART: [kat] LMS
1,168,254 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,561 UART: [fht] FHT @ 0x50003400
1,172,255 UART: [idev] ++
1,172,423 UART: [idev] CDI.KEYID = 6
1,172,784 UART: [idev] SUBJECT.KEYID = 7
1,173,209 UART: [idev] UDS.KEYID = 0
1,173,555 ready_for_fw is high
1,173,555 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,214,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 111668 bytes
3,088,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,116,717 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,142,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,277,856 >>> mbox cmd response: success
3,278,917 UART: [afmc] ++
3,279,085 UART: [afmc] CDI.KEYID = 6
3,279,448 UART: [afmc] SUBJECT.KEYID = 7
3,279,874 UART: [afmc] AUTHORITY.KEYID = 5
3,314,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,331,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,332,344 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,338,055 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,343,942 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,349,640 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,357,381 UART: [afmc] --
3,358,425 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,358,447 UART: [cold-reset] --
3,359,265 UART: [state] Locking Datavault
3,360,368 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,972 UART: [state] Locking ICCM
3,361,630 UART: [exit] Launching FMC @ 0x40000000
3,366,927 UART:
3,366,943 UART: Running Caliptra FMC ...
3,367,351 UART:
3,367,581 UART: [fmc] Received command: 0x46574C44
3,368,407 UART:
3,368,423 UART: Running Caliptra ROM ...
3,368,831 UART:
3,368,886 UART: [state] CFI Enabled
3,371,762 UART: [state] LifecycleState = Unprovisioned
3,372,417 UART: [state] DebugLocked = No
3,373,105 UART: [state] WD Timer not started. Device not locked for debugging
3,374,299 UART: [kat] SHA2-256
4,177,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,181,978 UART: [kat] ++
4,182,130 UART: [kat] sha1
4,186,404 UART: [kat] SHA2-256
4,188,344 UART: [kat] SHA2-384
4,190,993 UART: [kat] SHA2-512-ACC
4,192,893 UART: [kat] ECC-384
4,202,624 UART: [kat] HMAC-384Kdf
4,207,206 UART: [kat] LMS
4,455,518 UART: [kat] --
4,456,262 UART: [update-reset] ++
4,474,420 >>> mbox cmd response: failed
4,474,420 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,474,894 UART: ROM Non-Fatal Error: 0x000B003D
4,475,900 UART: [state] Locking Datavault
4,476,718 UART: [state] Locking PCR0, PCR1 and PCR31
4,477,322 UART: [state] Locking ICCM
4,477,984 UART: [exit] Launching FMC @ 0x40000000
4,483,281 UART:
4,483,297 UART: Running Caliptra FMC ...
4,483,705 UART:
4,483,927 UART: [fmc] Received command: 0x1000000C
4,484,662 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,068 ready_for_fw is high
1,055,068 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,133,519 >>> mbox cmd response: success
3,190,408 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,196,813 UART:
3,196,829 UART: Running Caliptra FMC ...
3,197,237 UART:
3,197,467 UART: [fmc] Received command: 0x46574C44
4,187,036 >>> mbox cmd response: failed
4,187,036 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,192,583 UART:
4,192,599 UART: Running Caliptra FMC ...
4,193,007 UART:
4,193,229 UART: [fmc] Received command: 0x1000000C
4,193,964 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,353 UART: [kat] SHA2-256
891,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,032 UART: [kat] ++
896,184 UART: [kat] sha1
900,614 UART: [kat] SHA2-256
902,554 UART: [kat] SHA2-384
905,183 UART: [kat] SHA2-512-ACC
907,084 UART: [kat] ECC-384
917,015 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,171,224 UART: [cold-reset] ++
1,171,658 UART: [fht] FHT @ 0x50003400
1,174,430 UART: [idev] ++
1,174,598 UART: [idev] CDI.KEYID = 6
1,174,959 UART: [idev] SUBJECT.KEYID = 7
1,175,384 UART: [idev] UDS.KEYID = 0
1,175,730 ready_for_fw is high
1,175,730 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,183,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,312 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,216,049 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,997 UART: [fwproc] Recv'd Img size: 111668 bytes
3,087,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,115,497 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,141,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,276,612 >>> mbox cmd response: success
3,277,759 UART: [afmc] ++
3,277,927 UART: [afmc] CDI.KEYID = 6
3,278,290 UART: [afmc] SUBJECT.KEYID = 7
3,278,716 UART: [afmc] AUTHORITY.KEYID = 5
3,313,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,330,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,331,158 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,336,869 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,342,756 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,348,454 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,356,403 UART: [afmc] --
3,357,387 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,357,409 UART: [cold-reset] --
3,358,345 UART: [state] Locking Datavault
3,359,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,360,192 UART: [state] Locking ICCM
3,360,792 UART: [exit] Launching FMC @ 0x40000000
3,366,089 UART:
3,366,105 UART: Running Caliptra FMC ...
3,366,513 UART:
3,366,743 UART: [fmc] Received command: 0x46574C44
3,367,569 UART:
3,367,585 UART: Running Caliptra ROM ...
3,367,993 UART:
3,368,135 UART: [state] CFI Enabled
3,371,297 UART: [state] LifecycleState = Unprovisioned
3,371,952 UART: [state] DebugLocked = No
3,372,456 UART: [state] WD Timer not started. Device not locked for debugging
3,373,812 UART: [kat] SHA2-256
4,177,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,181,491 UART: [kat] ++
4,181,643 UART: [kat] sha1
4,185,865 UART: [kat] SHA2-256
4,187,805 UART: [kat] SHA2-384
4,190,656 UART: [kat] SHA2-512-ACC
4,192,556 UART: [kat] ECC-384
4,202,331 UART: [kat] HMAC-384Kdf
4,206,795 UART: [kat] LMS
4,455,107 UART: [kat] --
4,455,897 UART: [update-reset] ++
4,473,509 >>> mbox cmd response: failed
4,473,509 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,473,841 UART: ROM Non-Fatal Error: 0x000B003D
4,474,635 UART: [state] Locking Datavault
4,475,375 UART: [state] Locking PCR0, PCR1 and PCR31
4,475,979 UART: [state] Locking ICCM
4,476,491 UART: [exit] Launching FMC @ 0x40000000
4,481,788 UART:
4,481,804 UART: Running Caliptra FMC ...
4,482,212 UART:
4,482,434 UART: [fmc] Received command: 0x1000000C
4,483,169 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,753 ready_for_fw is high
1,056,753 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,133,377 >>> mbox cmd response: success
3,189,758 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,195,991 UART:
3,196,007 UART: Running Caliptra FMC ...
3,196,415 UART:
3,196,645 UART: [fmc] Received command: 0x46574C44
4,187,879 >>> mbox cmd response: failed
4,187,879 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,193,430 UART:
4,193,446 UART: Running Caliptra FMC ...
4,193,854 UART:
4,194,076 UART: [fmc] Received command: 0x1000000C
4,194,811 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,553 UART: [kat] SHA2-256
901,493 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,402 UART: [kat] LMS
1,168,714 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,174,455 ready_for_fw is high
1,174,455 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,010 UART: [ldev] ++
1,209,178 UART: [ldev] CDI.KEYID = 6
1,209,542 UART: [ldev] SUBJECT.KEYID = 5
1,209,969 UART: [ldev] AUTHORITY.KEYID = 7
1,210,432 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,438 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,545 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 111668 bytes
3,096,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,124,204 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,149,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,285,301 >>> mbox cmd response: success
3,286,330 UART: [afmc] ++
3,286,498 UART: [afmc] CDI.KEYID = 6
3,286,861 UART: [afmc] SUBJECT.KEYID = 7
3,287,287 UART: [afmc] AUTHORITY.KEYID = 5
3,322,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,338,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,339,619 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,345,330 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,351,217 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,356,915 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,364,816 UART: [afmc] --
3,365,692 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,365,714 UART: [cold-reset] --
3,366,580 UART: [state] Locking Datavault
3,367,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,368,313 UART: [state] Locking ICCM
3,368,785 UART: [exit] Launching FMC @ 0x40000000
3,374,082 UART:
3,374,098 UART: Running Caliptra FMC ...
3,374,506 UART:
3,374,736 UART: [fmc] Received command: 0x46574C44
3,375,562 UART:
3,375,578 UART: Running Caliptra ROM ...
3,375,986 UART:
3,376,041 UART: [state] CFI Enabled
3,378,957 UART: [state] LifecycleState = Unprovisioned
3,379,612 UART: [state] DebugLocked = No
3,380,316 UART: [state] WD Timer not started. Device not locked for debugging
3,381,428 UART: [kat] SHA2-256
4,184,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,189,107 UART: [kat] ++
4,189,259 UART: [kat] sha1
4,193,451 UART: [kat] SHA2-256
4,195,391 UART: [kat] SHA2-384
4,198,108 UART: [kat] SHA2-512-ACC
4,200,008 UART: [kat] ECC-384
4,209,663 UART: [kat] HMAC-384Kdf
4,214,279 UART: [kat] LMS
4,462,591 UART: [kat] --
4,463,271 UART: [update-reset] ++
4,481,299 >>> mbox cmd response: failed
4,481,299 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,481,817 UART: ROM Non-Fatal Error: 0x000B003D
4,482,731 UART: [state] Locking Datavault
4,483,471 UART: [state] Locking PCR0, PCR1 and PCR31
4,484,075 UART: [state] Locking ICCM
4,484,623 UART: [exit] Launching FMC @ 0x40000000
4,489,920 UART:
4,489,936 UART: Running Caliptra FMC ...
4,490,344 UART:
4,490,566 UART: [fmc] Received command: 0x1000000C
4,491,301 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,026 ready_for_fw is high
1,056,026 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,126,343 >>> mbox cmd response: success
3,181,854 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,187,919 UART:
3,187,935 UART: Running Caliptra FMC ...
3,188,343 UART:
3,188,573 UART: [fmc] Received command: 0x46574C44
4,178,524 >>> mbox cmd response: failed
4,178,524 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,184,367 UART:
4,184,383 UART: Running Caliptra FMC ...
4,184,791 UART:
4,185,013 UART: [fmc] Received command: 0x1000000C
4,185,748 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,174,468 ready_for_fw is high
1,174,468 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,122 UART: [idev] Erasing UDS.KEYID = 0
1,199,430 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,809 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,297 UART: [fwproc] Recv'd Img size: 111668 bytes
3,091,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,118,469 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,144,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,279,552 >>> mbox cmd response: success
3,280,655 UART: [afmc] ++
3,280,823 UART: [afmc] CDI.KEYID = 6
3,281,186 UART: [afmc] SUBJECT.KEYID = 7
3,281,612 UART: [afmc] AUTHORITY.KEYID = 5
3,317,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,334,220 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,339,931 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,345,818 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,351,516 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,359,359 UART: [afmc] --
3,360,379 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,360,401 UART: [cold-reset] --
3,361,373 UART: [state] Locking Datavault
3,362,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,363,024 UART: [state] Locking ICCM
3,363,664 UART: [exit] Launching FMC @ 0x40000000
3,368,961 UART:
3,368,977 UART: Running Caliptra FMC ...
3,369,385 UART:
3,369,615 UART: [fmc] Received command: 0x46574C44
3,370,441 UART:
3,370,457 UART: Running Caliptra ROM ...
3,370,865 UART:
3,371,007 UART: [state] CFI Enabled
3,374,309 UART: [state] LifecycleState = Unprovisioned
3,374,964 UART: [state] DebugLocked = No
3,375,660 UART: [state] WD Timer not started. Device not locked for debugging
3,376,982 UART: [kat] SHA2-256
4,180,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,184,661 UART: [kat] ++
4,184,813 UART: [kat] sha1
4,188,951 UART: [kat] SHA2-256
4,190,891 UART: [kat] SHA2-384
4,193,650 UART: [kat] SHA2-512-ACC
4,195,550 UART: [kat] ECC-384
4,205,703 UART: [kat] HMAC-384Kdf
4,210,277 UART: [kat] LMS
4,458,589 UART: [kat] --
4,459,247 UART: [update-reset] ++
4,476,399 >>> mbox cmd response: failed
4,476,399 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,476,899 UART: ROM Non-Fatal Error: 0x000B003D
4,477,887 UART: [state] Locking Datavault
4,478,797 UART: [state] Locking PCR0, PCR1 and PCR31
4,479,401 UART: [state] Locking ICCM
4,479,825 UART: [exit] Launching FMC @ 0x40000000
4,485,122 UART:
4,485,138 UART: Running Caliptra FMC ...
4,485,546 UART:
4,485,768 UART: [fmc] Received command: 0x1000000C
4,486,503 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,725 ready_for_fw is high
1,056,725 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,133,221 >>> mbox cmd response: success
3,189,108 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,195,665 UART:
3,195,681 UART: Running Caliptra FMC ...
3,196,089 UART:
3,196,319 UART: [fmc] Received command: 0x46574C44
4,186,227 >>> mbox cmd response: failed
4,186,227 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,191,990 UART:
4,192,006 UART: Running Caliptra FMC ...
4,192,414 UART:
4,192,636 UART: [fmc] Received command: 0x1000000C
4,193,371 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,033 UART:
192,405 UART: Running Caliptra ROM ...
193,503 UART:
193,644 UART: [state] CFI Enabled
262,259 UART: [state] LifecycleState = Unprovisioned
264,637 UART: [state] DebugLocked = No
267,083 UART: [state] WD Timer not started. Device not locked for debugging
271,254 UART: [kat] SHA2-256
453,155 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,683 UART: [kat] ++
465,209 UART: [kat] sha1
476,579 UART: [kat] SHA2-256
479,592 UART: [kat] SHA2-384
485,081 UART: [kat] SHA2-512-ACC
487,735 UART: [kat] ECC-384
3,776,644 UART: [kat] HMAC-384Kdf
3,802,683 UART: [kat] LMS
4,875,803 UART: [kat] --
4,879,535 UART: [cold-reset] ++
4,880,755 UART: [fht] FHT @ 0x50003400
4,892,223 UART: [idev] ++
4,892,875 UART: [idev] CDI.KEYID = 6
4,894,127 UART: [idev] SUBJECT.KEYID = 7
4,895,237 UART: [idev] UDS.KEYID = 0
4,896,131 ready_for_fw is high
4,896,317 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,030,017 UART: [idev] Erasing UDS.KEYID = 0
8,242,880 UART: [idev] Sha1 KeyId Algorithm
8,265,170 UART: [idev] --
8,268,894 UART: [ldev] ++
8,269,514 UART: [ldev] CDI.KEYID = 6
8,270,699 UART: [ldev] SUBJECT.KEYID = 5
8,271,862 UART: [ldev] AUTHORITY.KEYID = 7
8,273,018 UART: [ldev] FE.KEYID = 1
8,319,141 UART: [ldev] Erasing FE.KEYID = 1
11,655,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,193 UART: [ldev] --
14,038,022 UART: [fwproc] Wait for Commands...
14,040,016 UART: [fwproc] Recv command 0x46574c44
14,042,329 UART: [fwproc] Recv'd Img size: 106256 bytes
18,021,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,095,830 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,138,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,454,970 >>> mbox cmd response: success
18,458,424 UART: [afmc] ++
18,459,039 UART: [afmc] CDI.KEYID = 6
18,460,179 UART: [afmc] SUBJECT.KEYID = 7
18,461,347 UART: [afmc] AUTHORITY.KEYID = 5
21,819,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,116,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,118,942 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,134,978 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,151,026 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,167,109 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,189,426 UART: [afmc] --
24,193,796 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,194,568 UART: [cold-reset] --
24,196,836 UART: [state] Locking Datavault
24,203,284 UART: [state] Locking PCR0, PCR1 and PCR31
24,204,922 UART: [state] Locking ICCM
24,207,895 UART: [exit] Launching FMC @ 0x40000000
24,216,483 UART:
24,216,758 UART: Running Caliptra FMC ...
24,217,788 UART:
24,217,935 UART: [fmc] Received command: 0x46574C44
24,219,413 UART:
24,219,565 UART: Running Caliptra ROM ...
24,220,580 UART:
24,220,722 UART: [state] CFI Enabled
24,284,486 UART: [state] LifecycleState = Unprovisioned
24,286,306 UART: [state] DebugLocked = No
24,287,715 UART: [state] WD Timer not started. Device not locked for debugging
24,291,821 UART: [kat] SHA2-256
24,473,750 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,485,241 UART: [kat] ++
24,485,749 UART: [kat] sha1
24,495,287 UART: [kat] SHA2-256
24,498,297 UART: [kat] SHA2-384
24,503,683 UART: [kat] SHA2-512-ACC
24,506,252 UART: [kat] ECC-384
27,793,235 UART: [kat] HMAC-384Kdf
27,819,686 UART: [kat] LMS
28,892,823 UART: [kat] --
28,898,855 UART: [update-reset] ++
28,908,707 >>> mbox cmd response: failed
28,912,123 UART: ROM Non-Fatal Error: 0x000B0001
28,914,928 UART: [state] Locking Datavault
28,918,719 UART: [state] Locking PCR0, PCR1 and PCR31
28,920,917 UART: [state] Locking ICCM
28,923,561 UART: [exit] Launching FMC @ 0x40000000
28,932,262 UART:
28,932,547 UART: Running Caliptra FMC ...
28,933,710 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
4,781,041 ready_for_fw is high
4,781,606 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,253,001 >>> mbox cmd response: success
23,929,444 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
23,946,924 UART:
23,947,291 UART: Running Caliptra FMC ...
23,948,593 UART:
23,948,760 UART: [fmc] Received command: 0x46574C44
28,527,042 >>> mbox cmd response: failed
28,541,632 UART:
28,541,916 UART: Running Caliptra FMC ...
28,542,994 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,408 UART:
192,852 UART: Running Caliptra ROM ...
193,995 UART:
603,631 UART: [state] CFI Enabled
617,068 UART: [state] LifecycleState = Unprovisioned
619,395 UART: [state] DebugLocked = No
621,414 UART: [state] WD Timer not started. Device not locked for debugging
625,750 UART: [kat] SHA2-256
807,788 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,324 UART: [kat] ++
819,851 UART: [kat] sha1
830,016 UART: [kat] SHA2-256
833,015 UART: [kat] SHA2-384
838,005 UART: [kat] SHA2-512-ACC
840,589 UART: [kat] ECC-384
4,091,848 UART: [kat] HMAC-384Kdf
4,103,876 UART: [kat] LMS
5,177,006 UART: [kat] --
5,183,081 UART: [cold-reset] ++
5,185,538 UART: [fht] FHT @ 0x50003400
5,196,625 UART: [idev] ++
5,197,332 UART: [idev] CDI.KEYID = 6
5,198,423 UART: [idev] SUBJECT.KEYID = 7
5,199,945 UART: [idev] UDS.KEYID = 0
5,201,121 ready_for_fw is high
5,201,336 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
5,335,079 UART: [idev] Erasing UDS.KEYID = 0
8,485,336 UART: [idev] Sha1 KeyId Algorithm
8,507,438 UART: [idev] --
8,510,407 UART: [ldev] ++
8,511,023 UART: [ldev] CDI.KEYID = 6
8,512,250 UART: [ldev] SUBJECT.KEYID = 5
8,513,672 UART: [ldev] AUTHORITY.KEYID = 7
8,515,218 UART: [ldev] FE.KEYID = 1
8,526,552 UART: [ldev] Erasing FE.KEYID = 1
11,821,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,800 UART: [ldev] --
14,187,139 UART: [fwproc] Wait for Commands...
14,188,635 UART: [fwproc] Recv command 0x46574c44
14,190,614 UART: [fwproc] Recv'd Img size: 106256 bytes
18,165,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,237,308 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,279,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,596,427 >>> mbox cmd response: success
18,601,233 UART: [afmc] ++
18,601,836 UART: [afmc] CDI.KEYID = 6
18,602,941 UART: [afmc] SUBJECT.KEYID = 7
18,604,151 UART: [afmc] AUTHORITY.KEYID = 5
21,919,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,213,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,216,014 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,232,061 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,248,063 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,264,171 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,286,850 UART: [afmc] --
24,290,884 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,291,900 UART: [cold-reset] --
24,296,758 UART: [state] Locking Datavault
24,303,358 UART: [state] Locking PCR0, PCR1 and PCR31
24,304,997 UART: [state] Locking ICCM
24,306,389 UART: [exit] Launching FMC @ 0x40000000
24,315,016 UART:
24,315,259 UART: Running Caliptra FMC ...
24,316,308 UART:
24,316,455 UART: [fmc] Received command: 0x46574C44
24,317,900 UART:
24,318,064 UART: Running Caliptra ROM ...
24,319,157 UART:
24,319,305 UART: [state] CFI Enabled
24,333,029 UART: [state] LifecycleState = Unprovisioned
24,334,917 UART: [state] DebugLocked = No
24,336,985 UART: [state] WD Timer not started. Device not locked for debugging
24,341,400 UART: [kat] SHA2-256
24,523,358 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,534,943 UART: [kat] ++
24,535,407 UART: [kat] sha1
24,546,087 UART: [kat] SHA2-256
24,549,155 UART: [kat] SHA2-384
24,555,572 UART: [kat] SHA2-512-ACC
24,558,182 UART: [kat] ECC-384
27,814,200 UART: [kat] HMAC-384Kdf
27,825,320 UART: [kat] LMS
28,898,476 UART: [kat] --
28,903,133 UART: [update-reset] ++
28,909,918 >>> mbox cmd response: failed
28,911,568 UART: ROM Non-Fatal Error: 0x000B0001
28,914,343 UART: [state] Locking Datavault
28,918,105 UART: [state] Locking PCR0, PCR1 and PCR31
28,920,297 UART: [state] Locking ICCM
28,922,452 UART: [exit] Launching FMC @ 0x40000000
28,931,125 UART:
28,931,365 UART: Running Caliptra FMC ...
28,932,508 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
5,101,310 ready_for_fw is high
5,101,872 <<< Executing mbox cmd 0x46574c44 (106256 bytes) from SoC
18,424,382 >>> mbox cmd response: success
24,050,758 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,066,298 UART:
24,066,666 UART: Running Caliptra FMC ...
24,068,159 UART:
24,068,336 UART: [fmc] Received command: 0x46574C44
28,554,587 >>> mbox cmd response: failed
28,568,211 UART:
28,568,515 UART: Running Caliptra FMC ...
28,569,678 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,181 UART:
192,551 UART: Running Caliptra ROM ...
193,738 UART:
193,893 UART: [state] CFI Enabled
265,285 UART: [state] LifecycleState = Unprovisioned
267,190 UART: [state] DebugLocked = No
269,005 UART: [state] WD Timer not started. Device not locked for debugging
272,963 UART: [kat] SHA2-256
452,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,670 UART: [kat] ++
464,200 UART: [kat] sha1
475,100 UART: [kat] SHA2-256
478,116 UART: [kat] SHA2-384
484,032 UART: [kat] SHA2-512-ACC
486,973 UART: [kat] ECC-384
2,947,403 UART: [kat] HMAC-384Kdf
2,972,142 UART: [kat] LMS
3,501,538 UART: [kat] --
3,505,393 UART: [cold-reset] ++
3,506,467 UART: [fht] FHT @ 0x50003400
3,517,511 UART: [idev] ++
3,518,082 UART: [idev] CDI.KEYID = 6
3,519,119 UART: [idev] SUBJECT.KEYID = 7
3,520,220 UART: [idev] UDS.KEYID = 0
3,521,156 ready_for_fw is high
3,521,339 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,655,458 UART: [idev] Erasing UDS.KEYID = 0
6,026,861 UART: [idev] Sha1 KeyId Algorithm
6,050,033 UART: [idev] --
6,054,835 UART: [ldev] ++
6,055,406 UART: [ldev] CDI.KEYID = 6
6,056,293 UART: [ldev] SUBJECT.KEYID = 5
6,057,508 UART: [ldev] AUTHORITY.KEYID = 7
6,058,735 UART: [ldev] FE.KEYID = 1
6,100,923 UART: [ldev] Erasing FE.KEYID = 1
8,606,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,196 UART: [ldev] --
10,411,215 UART: [fwproc] Wait for Commands...
10,414,179 UART: [fwproc] Recv command 0x46574c44
10,416,291 UART: [fwproc] Recv'd Img size: 106600 bytes
13,725,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,797,285 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,839,846 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,157,336 >>> mbox cmd response: success
14,161,815 UART: [afmc] ++
14,162,424 UART: [afmc] CDI.KEYID = 6
14,163,336 UART: [afmc] SUBJECT.KEYID = 7
14,164,496 UART: [afmc] AUTHORITY.KEYID = 5
16,700,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,424,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,426,096 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,442,090 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,458,022 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,945 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,004 UART: [afmc] --
18,498,882 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,499,622 UART: [cold-reset] --
18,501,408 UART: [state] Locking Datavault
18,504,448 UART: [state] Locking PCR0, PCR1 and PCR31
18,506,558 UART: [state] Locking ICCM
18,508,346 UART: [exit] Launching FMC @ 0x40000000
18,516,757 UART:
18,516,995 UART: Running Caliptra FMC ...
18,518,097 UART:
18,518,256 UART: [fmc] Received command: 0x46574C44
18,519,774 UART:
18,519,939 UART: Running Caliptra ROM ...
18,521,046 UART:
18,521,206 UART: [state] CFI Enabled
18,585,329 UART: [state] LifecycleState = Unprovisioned
18,587,206 UART: [state] DebugLocked = No
18,589,126 UART: [state] WD Timer not started. Device not locked for debugging
18,592,483 UART: [kat] SHA2-256
18,771,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,783,218 UART: [kat] ++
18,783,673 UART: [kat] sha1
18,793,201 UART: [kat] SHA2-256
18,796,265 UART: [kat] SHA2-384
18,803,275 UART: [kat] SHA2-512-ACC
18,806,220 UART: [kat] ECC-384
21,271,704 UART: [kat] HMAC-384Kdf
21,294,349 UART: [kat] LMS
21,823,850 UART: [kat] --
21,830,095 UART: [update-reset] ++
21,837,298 >>> mbox cmd response: failed
21,837,785 UART: ROM Non-Fatal Error: 0x000B0001
21,840,807 UART: [state] Locking Datavault
21,845,092 UART: [state] Locking PCR0, PCR1 and PCR31
21,846,782 UART: [state] Locking ICCM
21,849,549 UART: [exit] Launching FMC @ 0x40000000
21,857,925 UART:
21,858,175 UART: Running Caliptra FMC ...
21,859,316 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,361,097 ready_for_fw is high
3,361,603 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,900,706 >>> mbox cmd response: success
18,184,615 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,201,799 UART:
18,202,168 UART: Running Caliptra FMC ...
18,203,437 UART:
18,203,606 UART: [fmc] Received command: 0x46574C44
21,363,985 >>> mbox cmd response: failed
21,373,198 UART:
21,373,476 UART: Running Caliptra FMC ...
21,374,640 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,498 UART:
192,916 UART: Running Caliptra ROM ...
194,048 UART:
603,538 UART: [state] CFI Enabled
618,932 UART: [state] LifecycleState = Unprovisioned
620,789 UART: [state] DebugLocked = No
623,101 UART: [state] WD Timer not started. Device not locked for debugging
626,993 UART: [kat] SHA2-256
806,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,690 UART: [kat] ++
818,134 UART: [kat] sha1
829,853 UART: [kat] SHA2-256
832,926 UART: [kat] SHA2-384
839,548 UART: [kat] SHA2-512-ACC
842,546 UART: [kat] ECC-384
3,283,592 UART: [kat] HMAC-384Kdf
3,295,082 UART: [kat] LMS
3,824,593 UART: [kat] --
3,828,678 UART: [cold-reset] ++
3,830,672 UART: [fht] FHT @ 0x50003400
3,841,855 UART: [idev] ++
3,842,416 UART: [idev] CDI.KEYID = 6
3,843,446 UART: [idev] SUBJECT.KEYID = 7
3,844,545 UART: [idev] UDS.KEYID = 0
3,845,584 ready_for_fw is high
3,845,786 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,979,792 UART: [idev] Erasing UDS.KEYID = 0
6,317,195 UART: [idev] Sha1 KeyId Algorithm
6,339,820 UART: [idev] --
6,343,585 UART: [ldev] ++
6,344,142 UART: [ldev] CDI.KEYID = 6
6,345,105 UART: [ldev] SUBJECT.KEYID = 5
6,346,279 UART: [ldev] AUTHORITY.KEYID = 7
6,347,508 UART: [ldev] FE.KEYID = 1
6,357,932 UART: [ldev] Erasing FE.KEYID = 1
8,832,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,536 UART: [ldev] --
10,621,541 UART: [fwproc] Wait for Commands...
10,623,477 UART: [fwproc] Recv command 0x46574c44
10,625,565 UART: [fwproc] Recv'd Img size: 106600 bytes
13,941,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,729 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,057,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,375,181 >>> mbox cmd response: success
14,379,556 UART: [afmc] ++
14,380,180 UART: [afmc] CDI.KEYID = 6
14,381,100 UART: [afmc] SUBJECT.KEYID = 7
14,382,204 UART: [afmc] AUTHORITY.KEYID = 5
16,882,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,604,681 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,620,712 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,636,607 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,652,535 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,676,010 UART: [afmc] --
18,679,884 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,680,646 UART: [cold-reset] --
18,682,964 UART: [state] Locking Datavault
18,687,132 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,777 UART: [state] Locking ICCM
18,691,105 UART: [exit] Launching FMC @ 0x40000000
18,699,513 UART:
18,699,789 UART: Running Caliptra FMC ...
18,700,898 UART:
18,701,058 UART: [fmc] Received command: 0x46574C44
18,702,436 UART:
18,702,579 UART: Running Caliptra ROM ...
18,703,668 UART:
18,703,815 UART: [state] CFI Enabled
18,718,983 UART: [state] LifecycleState = Unprovisioned
18,720,860 UART: [state] DebugLocked = No
18,722,982 UART: [state] WD Timer not started. Device not locked for debugging
18,725,993 UART: [kat] SHA2-256
18,905,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,916,737 UART: [kat] ++
18,917,265 UART: [kat] sha1
18,928,930 UART: [kat] SHA2-256
18,931,944 UART: [kat] SHA2-384
18,938,249 UART: [kat] SHA2-512-ACC
18,941,171 UART: [kat] ECC-384
21,381,868 UART: [kat] HMAC-384Kdf
21,394,468 UART: [kat] LMS
21,923,966 UART: [kat] --
21,928,743 UART: [update-reset] ++
21,937,127 >>> mbox cmd response: failed
21,939,147 UART: ROM Non-Fatal Error: 0x000B0001
21,941,880 UART: [state] Locking Datavault
21,946,125 UART: [state] Locking PCR0, PCR1 and PCR31
21,947,797 UART: [state] Locking ICCM
21,949,850 UART: [exit] Launching FMC @ 0x40000000
21,958,298 UART:
21,958,541 UART: Running Caliptra FMC ...
21,959,697 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,697,901 ready_for_fw is high
3,698,315 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,135,265 >>> mbox cmd response: success
18,366,628 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,379,404 UART:
18,379,775 UART: Running Caliptra FMC ...
18,380,952 UART:
18,381,100 UART: [fmc] Received command: 0x46574C44
21,470,118 >>> mbox cmd response: failed
21,481,978 UART:
21,482,276 UART: Running Caliptra FMC ...
21,483,360 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,217 UART:
192,571 UART: Running Caliptra ROM ...
193,757 UART:
193,913 UART: [state] CFI Enabled
262,503 UART: [state] LifecycleState = Unprovisioned
264,419 UART: [state] DebugLocked = No
266,475 UART: [state] WD Timer not started. Device not locked for debugging
270,294 UART: [kat] SHA2-256
449,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,976 UART: [kat] ++
461,514 UART: [kat] sha1
473,848 UART: [kat] SHA2-256
476,910 UART: [kat] SHA2-384
483,124 UART: [kat] SHA2-512-ACC
486,064 UART: [kat] ECC-384
2,951,208 UART: [kat] HMAC-384Kdf
2,972,714 UART: [kat] LMS
3,502,171 UART: [kat] --
3,507,873 UART: [cold-reset] ++
3,509,095 UART: [fht] FHT @ 0x50003400
3,520,137 UART: [idev] ++
3,520,741 UART: [idev] CDI.KEYID = 6
3,521,649 UART: [idev] SUBJECT.KEYID = 7
3,522,835 UART: [idev] UDS.KEYID = 0
3,523,764 ready_for_fw is high
3,523,950 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,657,924 UART: [idev] Erasing UDS.KEYID = 0
6,027,902 UART: [idev] Sha1 KeyId Algorithm
6,050,895 UART: [idev] --
6,055,598 UART: [ldev] ++
6,056,170 UART: [ldev] CDI.KEYID = 6
6,057,056 UART: [ldev] SUBJECT.KEYID = 5
6,058,213 UART: [ldev] AUTHORITY.KEYID = 7
6,059,552 UART: [ldev] FE.KEYID = 1
6,101,094 UART: [ldev] Erasing FE.KEYID = 1
8,603,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,769 UART: [ldev] --
10,395,074 UART: [fwproc] Wait for Commands...
10,397,379 UART: [fwproc] Recv command 0x46574c44
10,399,480 UART: [fwproc] Recv'd Img size: 106600 bytes
13,702,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,775,543 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,818,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,135,704 >>> mbox cmd response: success
14,139,920 UART: [afmc] ++
14,140,543 UART: [afmc] CDI.KEYID = 6
14,141,433 UART: [afmc] SUBJECT.KEYID = 7
14,142,533 UART: [afmc] AUTHORITY.KEYID = 5
16,685,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,428,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,430,161 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,446,165 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,462,050 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,478,087 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,501,965 UART: [afmc] --
18,505,643 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,506,408 UART: [cold-reset] --
18,508,198 UART: [state] Locking Datavault
18,511,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,513,370 UART: [state] Locking ICCM
18,515,411 UART: [exit] Launching FMC @ 0x40000000
18,523,810 UART:
18,524,056 UART: Running Caliptra FMC ...
18,525,160 UART:
18,525,319 UART: [fmc] Received command: 0x46574C44
18,526,774 UART:
18,526,949 UART: Running Caliptra ROM ...
18,528,048 UART:
18,528,205 UART: [state] CFI Enabled
18,591,957 UART: [state] LifecycleState = Unprovisioned
18,593,839 UART: [state] DebugLocked = No
18,595,386 UART: [state] WD Timer not started. Device not locked for debugging
18,599,221 UART: [kat] SHA2-256
18,778,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,789,911 UART: [kat] ++
18,790,448 UART: [kat] sha1
18,800,796 UART: [kat] SHA2-256
18,803,859 UART: [kat] SHA2-384
18,811,472 UART: [kat] SHA2-512-ACC
18,814,415 UART: [kat] ECC-384
21,274,222 UART: [kat] HMAC-384Kdf
21,296,990 UART: [kat] LMS
21,826,457 UART: [kat] --
21,830,978 UART: [update-reset] ++
21,838,526 >>> mbox cmd response: failed
21,840,302 UART: ROM Non-Fatal Error: 0x000B0001
21,842,879 UART: [state] Locking Datavault
21,845,465 UART: [state] Locking PCR0, PCR1 and PCR31
21,847,137 UART: [state] Locking ICCM
21,848,699 UART: [exit] Launching FMC @ 0x40000000
21,857,095 UART:
21,857,356 UART: Running Caliptra FMC ...
21,858,412 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,360,269 ready_for_fw is high
3,360,815 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
13,930,061 >>> mbox cmd response: success
18,203,481 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,219,573 UART:
18,219,912 UART: Running Caliptra FMC ...
18,221,178 UART:
18,221,346 UART: [fmc] Received command: 0x46574C44
21,381,256 >>> mbox cmd response: failed
21,393,589 UART:
21,393,914 UART: Running Caliptra FMC ...
21,395,084 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
192,649 UART:
193,359 UART: Running Caliptra ROM ...
194,532 UART:
603,702 UART: [state] CFI Enabled
615,799 UART: [state] LifecycleState = Unprovisioned
617,690 UART: [state] DebugLocked = No
620,326 UART: [state] WD Timer not started. Device not locked for debugging
623,326 UART: [kat] SHA2-256
802,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,005 UART: [kat] ++
814,470 UART: [kat] sha1
826,193 UART: [kat] SHA2-256
829,204 UART: [kat] SHA2-384
835,115 UART: [kat] SHA2-512-ACC
838,120 UART: [kat] ECC-384
3,281,353 UART: [kat] HMAC-384Kdf
3,293,746 UART: [kat] LMS
3,823,237 UART: [kat] --
3,827,814 UART: [cold-reset] ++
3,829,530 UART: [fht] FHT @ 0x50003400
3,839,729 UART: [idev] ++
3,840,290 UART: [idev] CDI.KEYID = 6
3,841,319 UART: [idev] SUBJECT.KEYID = 7
3,842,440 UART: [idev] UDS.KEYID = 0
3,843,378 ready_for_fw is high
3,843,608 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
3,977,648 UART: [idev] Erasing UDS.KEYID = 0
6,312,913 UART: [idev] Sha1 KeyId Algorithm
6,335,543 UART: [idev] --
6,339,823 UART: [ldev] ++
6,340,383 UART: [ldev] CDI.KEYID = 6
6,341,293 UART: [ldev] SUBJECT.KEYID = 5
6,342,449 UART: [ldev] AUTHORITY.KEYID = 7
6,343,727 UART: [ldev] FE.KEYID = 1
6,353,507 UART: [ldev] Erasing FE.KEYID = 1
8,827,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,145 UART: [ldev] --
10,616,234 UART: [fwproc] Wait for Commands...
10,617,684 UART: [fwproc] Recv command 0x46574c44
10,619,780 UART: [fwproc] Recv'd Img size: 106600 bytes
13,924,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,039 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,357,915 >>> mbox cmd response: success
14,361,743 UART: [afmc] ++
14,362,538 UART: [afmc] CDI.KEYID = 6
14,363,975 UART: [afmc] SUBJECT.KEYID = 7
14,365,264 UART: [afmc] AUTHORITY.KEYID = 5
16,862,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,584,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,585,992 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,601,942 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,617,813 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,633,769 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,656,832 UART: [afmc] --
18,660,663 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,661,741 UART: [cold-reset] --
18,663,323 UART: [state] Locking Datavault
18,668,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,669,689 UART: [state] Locking ICCM
18,670,937 UART: [exit] Launching FMC @ 0x40000000
18,679,331 UART:
18,679,559 UART: Running Caliptra FMC ...
18,680,653 UART:
18,680,810 UART: [fmc] Received command: 0x46574C44
18,682,260 UART:
18,682,410 UART: Running Caliptra ROM ...
18,683,943 UART:
18,684,121 UART: [state] CFI Enabled
18,697,056 UART: [state] LifecycleState = Unprovisioned
18,698,895 UART: [state] DebugLocked = No
18,701,135 UART: [state] WD Timer not started. Device not locked for debugging
18,704,869 UART: [kat] SHA2-256
18,884,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,895,614 UART: [kat] ++
18,896,087 UART: [kat] sha1
18,907,245 UART: [kat] SHA2-256
18,910,275 UART: [kat] SHA2-384
18,916,639 UART: [kat] SHA2-512-ACC
18,919,576 UART: [kat] ECC-384
21,362,108 UART: [kat] HMAC-384Kdf
21,374,775 UART: [kat] LMS
21,904,292 UART: [kat] --
21,910,071 UART: [update-reset] ++
21,916,179 >>> mbox cmd response: failed
21,918,213 UART: ROM Non-Fatal Error: 0x000B0001
21,921,959 UART: [state] Locking Datavault
21,924,647 UART: [state] Locking PCR0, PCR1 and PCR31
21,926,328 UART: [state] Locking ICCM
21,928,845 UART: [exit] Launching FMC @ 0x40000000
21,937,247 UART:
21,937,491 UART: Running Caliptra FMC ...
21,938,630 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,697,320 ready_for_fw is high
3,697,694 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
14,156,113 >>> mbox cmd response: success
18,394,495 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,411,127 UART:
18,411,523 UART: Running Caliptra FMC ...
18,412,800 UART:
18,412,968 UART: [fmc] Received command: 0x46574C44
21,507,983 >>> mbox cmd response: failed
21,523,880 UART:
21,524,186 UART: Running Caliptra FMC ...
21,525,354 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 ready_for_fw is high
1,174,393 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,099 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,916 UART: [ldev] --
1,280,424 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 106600 bytes
2,488,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,515,931 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,534,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,669,438 >>> mbox cmd response: success
2,670,619 UART: [afmc] ++
2,670,787 UART: [afmc] CDI.KEYID = 6
2,671,150 UART: [afmc] SUBJECT.KEYID = 7
2,671,576 UART: [afmc] AUTHORITY.KEYID = 5
2,706,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,723,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,724,277 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,729,997 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,890 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,741,583 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,749,642 UART: [afmc] --
2,750,560 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,750,582 UART: [cold-reset] --
2,751,244 UART: [state] Locking Datavault
2,752,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,267 UART: [state] Locking ICCM
2,753,689 UART: [exit] Launching FMC @ 0x40000000
2,758,986 UART:
2,759,002 UART: Running Caliptra FMC ...
2,759,410 UART:
2,759,548 UART: [fmc] Received command: 0x46574C44
2,760,377 UART:
2,760,393 UART: Running Caliptra ROM ...
2,760,801 UART:
2,760,856 UART: [state] CFI Enabled
2,763,960 UART: [state] LifecycleState = Unprovisioned
2,764,615 UART: [state] DebugLocked = No
2,765,287 UART: [state] WD Timer not started. Device not locked for debugging
2,766,513 UART: [kat] SHA2-256
3,570,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,574,192 UART: [kat] ++
3,574,344 UART: [kat] sha1
3,578,724 UART: [kat] SHA2-256
3,580,664 UART: [kat] SHA2-384
3,583,459 UART: [kat] SHA2-512-ACC
3,585,359 UART: [kat] ECC-384
3,594,952 UART: [kat] HMAC-384Kdf
3,599,426 UART: [kat] LMS
3,847,738 UART: [kat] --
3,848,792 UART: [update-reset] ++
3,850,229 >>> mbox cmd response: failed
3,850,633 UART: ROM Non-Fatal Error: 0x000B0001
3,851,403 UART: [state] Locking Datavault
3,852,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,852,921 UART: [state] Locking ICCM
3,853,417 UART: [exit] Launching FMC @ 0x40000000
3,858,714 UART:
3,858,730 UART: Running Caliptra FMC ...
3,859,138 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,178 ready_for_fw is high
1,056,178 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,519,230 >>> mbox cmd response: success
2,575,576 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,581,503 UART:
2,581,519 UART: Running Caliptra FMC ...
2,581,927 UART:
2,582,065 UART: [fmc] Received command: 0x46574C44
3,556,076 >>> mbox cmd response: failed
3,561,869 UART:
3,561,885 UART: Running Caliptra FMC ...
3,562,293 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
891,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,225 UART: [kat] LMS
1,169,537 UART: [kat] --
1,170,516 UART: [cold-reset] ++
1,171,034 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 ready_for_fw is high
1,174,856 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,910 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,651 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,536 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,135 >>> mbox cmd response: success
2,672,150 UART: [afmc] ++
2,672,318 UART: [afmc] CDI.KEYID = 6
2,672,681 UART: [afmc] SUBJECT.KEYID = 7
2,673,107 UART: [afmc] AUTHORITY.KEYID = 5
2,709,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,828 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,548 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,441 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,134 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,081 UART: [afmc] --
2,753,011 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,033 UART: [cold-reset] --
2,753,823 UART: [state] Locking Datavault
2,754,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,446 UART: [state] Locking ICCM
2,755,884 UART: [exit] Launching FMC @ 0x40000000
2,761,181 UART:
2,761,197 UART: Running Caliptra FMC ...
2,761,605 UART:
2,761,743 UART: [fmc] Received command: 0x46574C44
2,762,572 UART:
2,762,588 UART: Running Caliptra ROM ...
2,762,996 UART:
2,763,138 UART: [state] CFI Enabled
2,766,112 UART: [state] LifecycleState = Unprovisioned
2,766,767 UART: [state] DebugLocked = No
2,767,277 UART: [state] WD Timer not started. Device not locked for debugging
2,768,453 UART: [kat] SHA2-256
3,572,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,132 UART: [kat] ++
3,576,284 UART: [kat] sha1
3,580,310 UART: [kat] SHA2-256
3,582,250 UART: [kat] SHA2-384
3,584,987 UART: [kat] SHA2-512-ACC
3,586,887 UART: [kat] ECC-384
3,596,508 UART: [kat] HMAC-384Kdf
3,601,128 UART: [kat] LMS
3,849,440 UART: [kat] --
3,850,238 UART: [update-reset] ++
3,852,003 >>> mbox cmd response: failed
3,852,551 UART: ROM Non-Fatal Error: 0x000B0001
3,853,309 UART: [state] Locking Datavault
3,854,093 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,697 UART: [state] Locking ICCM
3,855,307 UART: [exit] Launching FMC @ 0x40000000
3,860,604 UART:
3,860,620 UART: Running Caliptra FMC ...
3,861,028 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 ready_for_fw is high
1,056,329 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,617 >>> mbox cmd response: success
2,578,541 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,584,612 UART:
2,584,628 UART: Running Caliptra FMC ...
2,585,036 UART:
2,585,174 UART: [fmc] Received command: 0x46574C44
3,559,740 >>> mbox cmd response: failed
3,565,463 UART:
3,565,479 UART: Running Caliptra FMC ...
3,565,887 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,118 UART: [kat] SHA2-256
891,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,950 UART: [kat] HMAC-384Kdf
921,524 UART: [kat] LMS
1,169,836 UART: [kat] --
1,170,857 UART: [cold-reset] ++
1,171,419 UART: [fht] FHT @ 0x50003400
1,174,073 UART: [idev] ++
1,174,241 UART: [idev] CDI.KEYID = 6
1,174,602 UART: [idev] SUBJECT.KEYID = 7
1,175,027 UART: [idev] UDS.KEYID = 0
1,175,373 ready_for_fw is high
1,175,373 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,183,009 UART: [idev] Erasing UDS.KEYID = 0
1,200,243 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,210,218 UART: [ldev] ++
1,210,386 UART: [ldev] CDI.KEYID = 6
1,210,750 UART: [ldev] SUBJECT.KEYID = 5
1,211,177 UART: [ldev] AUTHORITY.KEYID = 7
1,211,640 UART: [ldev] FE.KEYID = 1
1,216,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,252 UART: [ldev] --
1,282,708 UART: [fwproc] Wait for Commands...
1,283,497 UART: [fwproc] Recv command 0x46574c44
1,284,230 UART: [fwproc] Recv'd Img size: 106600 bytes
2,492,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,331 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,842 >>> mbox cmd response: success
2,674,091 UART: [afmc] ++
2,674,259 UART: [afmc] CDI.KEYID = 6
2,674,622 UART: [afmc] SUBJECT.KEYID = 7
2,675,048 UART: [afmc] AUTHORITY.KEYID = 5
2,710,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,703 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,423 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,316 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,009 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,922 UART: [afmc] --
2,753,944 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,966 UART: [cold-reset] --
2,754,652 UART: [state] Locking Datavault
2,755,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,549 UART: [state] Locking ICCM
2,757,005 UART: [exit] Launching FMC @ 0x40000000
2,762,302 UART:
2,762,318 UART: Running Caliptra FMC ...
2,762,726 UART:
2,762,864 UART: [fmc] Received command: 0x46574C44
2,763,693 UART:
2,763,709 UART: Running Caliptra ROM ...
2,764,117 UART:
2,764,172 UART: [state] CFI Enabled
2,766,876 UART: [state] LifecycleState = Unprovisioned
2,767,531 UART: [state] DebugLocked = No
2,768,207 UART: [state] WD Timer not started. Device not locked for debugging
2,769,463 UART: [kat] SHA2-256
3,573,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,142 UART: [kat] ++
3,577,294 UART: [kat] sha1
3,581,422 UART: [kat] SHA2-256
3,583,362 UART: [kat] SHA2-384
3,586,251 UART: [kat] SHA2-512-ACC
3,588,151 UART: [kat] ECC-384
3,598,046 UART: [kat] HMAC-384Kdf
3,602,700 UART: [kat] LMS
3,851,012 UART: [kat] --
3,852,012 UART: [update-reset] ++
3,853,605 >>> mbox cmd response: failed
3,853,823 UART: ROM Non-Fatal Error: 0x000B0001
3,854,809 UART: [state] Locking Datavault
3,855,451 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,055 UART: [state] Locking ICCM
3,856,641 UART: [exit] Launching FMC @ 0x40000000
3,861,938 UART:
3,861,954 UART: Running Caliptra FMC ...
3,862,362 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,232 ready_for_fw is high
1,056,232 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,932 >>> mbox cmd response: success
2,578,606 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,584,531 UART:
2,584,547 UART: Running Caliptra FMC ...
2,584,955 UART:
2,585,093 UART: [fmc] Received command: 0x46574C44
3,558,644 >>> mbox cmd response: failed
3,564,185 UART:
3,564,201 UART: Running Caliptra FMC ...
3,564,609 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,678 UART: [idev] ++
1,172,846 UART: [idev] CDI.KEYID = 6
1,173,207 UART: [idev] SUBJECT.KEYID = 7
1,173,632 UART: [idev] UDS.KEYID = 0
1,173,978 ready_for_fw is high
1,173,978 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,588 UART: [idev] Erasing UDS.KEYID = 0
1,198,924 UART: [idev] Sha1 KeyId Algorithm
1,207,826 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,065 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,975 UART: [fwproc] Recv'd Img size: 106600 bytes
2,491,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,876 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,672,311 >>> mbox cmd response: success
2,673,452 UART: [afmc] ++
2,673,620 UART: [afmc] CDI.KEYID = 6
2,673,983 UART: [afmc] SUBJECT.KEYID = 7
2,674,409 UART: [afmc] AUTHORITY.KEYID = 5
2,710,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,866 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,586 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,479 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,172 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,927 UART: [afmc] --
2,753,893 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,915 UART: [cold-reset] --
2,754,717 UART: [state] Locking Datavault
2,755,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,436 UART: [state] Locking ICCM
2,757,054 UART: [exit] Launching FMC @ 0x40000000
2,762,351 UART:
2,762,367 UART: Running Caliptra FMC ...
2,762,775 UART:
2,762,913 UART: [fmc] Received command: 0x46574C44
2,763,742 UART:
2,763,758 UART: Running Caliptra ROM ...
2,764,166 UART:
2,764,308 UART: [state] CFI Enabled
2,767,218 UART: [state] LifecycleState = Unprovisioned
2,767,873 UART: [state] DebugLocked = No
2,768,531 UART: [state] WD Timer not started. Device not locked for debugging
2,769,653 UART: [kat] SHA2-256
3,573,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,332 UART: [kat] ++
3,577,484 UART: [kat] sha1
3,581,482 UART: [kat] SHA2-256
3,583,422 UART: [kat] SHA2-384
3,586,379 UART: [kat] SHA2-512-ACC
3,588,279 UART: [kat] ECC-384
3,598,228 UART: [kat] HMAC-384Kdf
3,602,972 UART: [kat] LMS
3,851,284 UART: [kat] --
3,851,882 UART: [update-reset] ++
3,853,139 >>> mbox cmd response: failed
3,853,725 UART: ROM Non-Fatal Error: 0x000B0001
3,854,563 UART: [state] Locking Datavault
3,855,381 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,985 UART: [state] Locking ICCM
3,856,419 UART: [exit] Launching FMC @ 0x40000000
3,861,716 UART:
3,861,732 UART: Running Caliptra FMC ...
3,862,140 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,993 ready_for_fw is high
1,055,993 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,045 >>> mbox cmd response: success
2,576,841 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,583,542 UART:
2,583,558 UART: Running Caliptra FMC ...
2,583,966 UART:
2,584,104 UART: [fmc] Received command: 0x46574C44
3,557,978 >>> mbox cmd response: failed
3,563,839 UART:
3,563,855 UART: Running Caliptra FMC ...
3,564,263 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 ready_for_fw is high
1,173,879 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,915 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,166 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 106600 bytes
2,489,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,571 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,126 >>> mbox cmd response: success
2,672,249 UART: [afmc] ++
2,672,417 UART: [afmc] CDI.KEYID = 6
2,672,780 UART: [afmc] SUBJECT.KEYID = 7
2,673,206 UART: [afmc] AUTHORITY.KEYID = 5
2,708,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,027 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,747 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,640 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,333 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,022 UART: [afmc] --
2,751,950 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,751,972 UART: [cold-reset] --
2,752,954 UART: [state] Locking Datavault
2,754,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,841 UART: [state] Locking ICCM
2,755,441 UART: [exit] Launching FMC @ 0x40000000
2,760,738 UART:
2,760,754 UART: Running Caliptra FMC ...
2,761,162 UART:
2,761,300 UART: [fmc] Received command: 0x46574C44
2,762,129 UART:
2,762,145 UART: Running Caliptra ROM ...
2,762,553 UART:
2,762,608 UART: [state] CFI Enabled
2,765,162 UART: [state] LifecycleState = Unprovisioned
2,765,817 UART: [state] DebugLocked = No
2,766,395 UART: [state] WD Timer not started. Device not locked for debugging
2,767,645 UART: [kat] SHA2-256
3,571,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,324 UART: [kat] ++
3,575,476 UART: [kat] sha1
3,579,846 UART: [kat] SHA2-256
3,581,786 UART: [kat] SHA2-384
3,584,607 UART: [kat] SHA2-512-ACC
3,586,507 UART: [kat] ECC-384
3,596,316 UART: [kat] HMAC-384Kdf
3,601,100 UART: [kat] LMS
3,849,412 UART: [kat] --
3,850,212 UART: [update-reset] ++
3,851,565 >>> mbox cmd response: failed
3,851,869 UART: ROM Non-Fatal Error: 0x000B0001
3,852,743 UART: [state] Locking Datavault
3,853,509 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,113 UART: [state] Locking ICCM
3,854,769 UART: [exit] Launching FMC @ 0x40000000
3,860,066 UART:
3,860,082 UART: Running Caliptra FMC ...
3,860,490 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,220 ready_for_fw is high
1,056,220 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,521,012 >>> mbox cmd response: success
2,577,106 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,583,139 UART:
2,583,155 UART: Running Caliptra FMC ...
2,583,563 UART:
2,583,701 UART: [fmc] Received command: 0x46574C44
3,557,170 >>> mbox cmd response: failed
3,562,717 UART:
3,562,733 UART: Running Caliptra FMC ...
3,563,141 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,979 UART: [state] LifecycleState = Unprovisioned
86,634 UART: [state] DebugLocked = No
87,350 UART: [state] WD Timer not started. Device not locked for debugging
88,657 UART: [kat] SHA2-256
892,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,336 UART: [kat] ++
896,488 UART: [kat] sha1
900,582 UART: [kat] SHA2-256
902,522 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,205 UART: [kat] LMS
1,169,517 UART: [kat] --
1,170,348 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,220 UART: [idev] ++
1,173,388 UART: [idev] CDI.KEYID = 6
1,173,749 UART: [idev] SUBJECT.KEYID = 7
1,174,174 UART: [idev] UDS.KEYID = 0
1,174,520 ready_for_fw is high
1,174,520 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,630 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,553 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 106600 bytes
2,490,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,791 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,671,376 >>> mbox cmd response: success
2,672,635 UART: [afmc] ++
2,672,803 UART: [afmc] CDI.KEYID = 6
2,673,166 UART: [afmc] SUBJECT.KEYID = 7
2,673,592 UART: [afmc] AUTHORITY.KEYID = 5
2,709,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,013 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,733 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,626 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,319 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,172 UART: [afmc] --
2,753,248 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,270 UART: [cold-reset] --
2,754,160 UART: [state] Locking Datavault
2,755,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,981 UART: [state] Locking ICCM
2,756,651 UART: [exit] Launching FMC @ 0x40000000
2,761,948 UART:
2,761,964 UART: Running Caliptra FMC ...
2,762,372 UART:
2,762,510 UART: [fmc] Received command: 0x46574C44
2,763,339 UART:
2,763,355 UART: Running Caliptra ROM ...
2,763,763 UART:
2,763,905 UART: [state] CFI Enabled
2,766,021 UART: [state] LifecycleState = Unprovisioned
2,766,676 UART: [state] DebugLocked = No
2,767,384 UART: [state] WD Timer not started. Device not locked for debugging
2,768,616 UART: [kat] SHA2-256
3,572,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,295 UART: [kat] ++
3,576,447 UART: [kat] sha1
3,580,561 UART: [kat] SHA2-256
3,582,501 UART: [kat] SHA2-384
3,585,292 UART: [kat] SHA2-512-ACC
3,587,192 UART: [kat] ECC-384
3,597,001 UART: [kat] HMAC-384Kdf
3,601,663 UART: [kat] LMS
3,849,975 UART: [kat] --
3,850,911 UART: [update-reset] ++
3,852,426 >>> mbox cmd response: failed
3,852,790 UART: ROM Non-Fatal Error: 0x000B0001
3,853,750 UART: [state] Locking Datavault
3,854,524 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,128 UART: [state] Locking ICCM
3,855,726 UART: [exit] Launching FMC @ 0x40000000
3,861,023 UART:
3,861,039 UART: Running Caliptra FMC ...
3,861,447 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,603 ready_for_fw is high
1,056,603 <<< Executing mbox cmd 0x46574c44 (106600 bytes) from SoC
2,522,885 >>> mbox cmd response: success
2,579,659 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,585,680 UART:
2,585,696 UART: Running Caliptra FMC ...
2,586,104 UART:
2,586,242 UART: [fmc] Received command: 0x46574C44
3,560,896 >>> mbox cmd response: failed
3,566,679 UART:
3,566,695 UART: Running Caliptra FMC ...
3,567,103 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
4,646 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,885 UART:
193,252 UART: Running Caliptra ROM ...
194,369 UART:
194,513 UART: [state] CFI Enabled
264,750 UART: [state] LifecycleState = Unprovisioned
267,159 UART: [state] DebugLocked = No
269,531 UART: [state] WD Timer not started. Device not locked for debugging
273,971 UART: [kat] SHA2-256
455,897 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,412 UART: [kat] ++
467,914 UART: [kat] sha1
479,438 UART: [kat] SHA2-256
482,501 UART: [kat] SHA2-384
487,555 UART: [kat] SHA2-512-ACC
490,177 UART: [kat] ECC-384
3,776,223 UART: [kat] HMAC-384Kdf
3,801,583 UART: [kat] LMS
4,874,769 UART: [kat] --
4,877,572 UART: [cold-reset] ++
4,879,717 UART: [fht] FHT @ 0x50003400
4,891,615 UART: [idev] ++
4,892,333 UART: [idev] CDI.KEYID = 6
4,893,519 UART: [idev] SUBJECT.KEYID = 7
4,894,675 UART: [idev] UDS.KEYID = 0
4,929,359 UART: [idev] Erasing UDS.KEYID = 0
8,242,132 UART: [idev] Sha1 KeyId Algorithm
8,263,550 UART: [idev] --
8,267,884 UART: [ldev] ++
8,268,458 UART: [ldev] CDI.KEYID = 6
8,269,691 UART: [ldev] SUBJECT.KEYID = 5
8,270,846 UART: [ldev] AUTHORITY.KEYID = 7
8,272,071 UART: [ldev] FE.KEYID = 1
8,319,154 UART: [ldev] Erasing FE.KEYID = 1
11,654,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,727 UART: [ldev] --
14,039,770 UART: [fwproc] Wait for Commands...
14,042,209 UART: [fwproc] Recv command 0x46505652
14,044,748 UART: [rt] FIPS Version
14,046,560 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,798 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,803,211 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,345 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,534 UART:
192,927 UART: Running Caliptra ROM ...
194,129 UART:
603,740 UART: [state] CFI Enabled
617,738 UART: [state] LifecycleState = Unprovisioned
620,068 UART: [state] DebugLocked = No
622,259 UART: [state] WD Timer not started. Device not locked for debugging
626,646 UART: [kat] SHA2-256
808,625 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,172 UART: [kat] ++
820,900 UART: [kat] sha1
831,189 UART: [kat] SHA2-256
834,254 UART: [kat] SHA2-384
839,742 UART: [kat] SHA2-512-ACC
842,352 UART: [kat] ECC-384
4,100,001 UART: [kat] HMAC-384Kdf
4,112,497 UART: [kat] LMS
5,185,673 UART: [kat] --
5,191,366 UART: [cold-reset] ++
5,192,496 UART: [fht] FHT @ 0x50003400
5,202,846 UART: [idev] ++
5,203,526 UART: [idev] CDI.KEYID = 6
5,204,761 UART: [idev] SUBJECT.KEYID = 7
5,206,189 UART: [idev] UDS.KEYID = 0
5,221,632 UART: [idev] Erasing UDS.KEYID = 0
8,494,086 UART: [idev] Sha1 KeyId Algorithm
8,516,582 UART: [idev] --
8,521,103 UART: [ldev] ++
8,521,675 UART: [ldev] CDI.KEYID = 6
8,522,914 UART: [ldev] SUBJECT.KEYID = 5
8,524,288 UART: [ldev] AUTHORITY.KEYID = 7
8,525,901 UART: [ldev] FE.KEYID = 1
8,536,413 UART: [ldev] Erasing FE.KEYID = 1
11,827,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,611 UART: [ldev] --
14,192,780 UART: [fwproc] Wait for Commands...
14,195,790 UART: [fwproc] Recv command 0x46505652
14,198,375 UART: [rt] FIPS Version
14,200,129 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,012,940 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
4,027 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,257 UART:
192,617 UART: Running Caliptra ROM ...
193,826 UART:
193,979 UART: [state] CFI Enabled
264,404 UART: [state] LifecycleState = Unprovisioned
266,310 UART: [state] DebugLocked = No
268,606 UART: [state] WD Timer not started. Device not locked for debugging
272,588 UART: [kat] SHA2-256
451,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,292 UART: [kat] ++
463,828 UART: [kat] sha1
475,129 UART: [kat] SHA2-256
478,188 UART: [kat] SHA2-384
485,467 UART: [kat] SHA2-512-ACC
488,402 UART: [kat] ECC-384
2,946,666 UART: [kat] HMAC-384Kdf
2,972,116 UART: [kat] LMS
3,501,578 UART: [kat] --
3,507,058 UART: [cold-reset] ++
3,508,398 UART: [fht] FHT @ 0x50003400
3,519,529 UART: [idev] ++
3,520,151 UART: [idev] CDI.KEYID = 6
3,521,071 UART: [idev] SUBJECT.KEYID = 7
3,522,237 UART: [idev] UDS.KEYID = 0
3,544,804 UART: [idev] Erasing UDS.KEYID = 0
6,025,346 UART: [idev] Sha1 KeyId Algorithm
6,047,453 UART: [idev] --
6,051,233 UART: [ldev] ++
6,051,817 UART: [ldev] CDI.KEYID = 6
6,052,729 UART: [ldev] SUBJECT.KEYID = 5
6,053,891 UART: [ldev] AUTHORITY.KEYID = 7
6,055,160 UART: [ldev] FE.KEYID = 1
6,102,125 UART: [ldev] Erasing FE.KEYID = 1
8,608,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,734 UART: [ldev] --
10,416,620 UART: [fwproc] Wait for Commands...
10,419,156 UART: [fwproc] Recv command 0x46505652
10,421,489 UART: [rt] FIPS Version
10,422,997 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,707 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,204,517 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
4,330 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,517 UART:
192,912 UART: Running Caliptra ROM ...
194,125 UART:
603,798 UART: [state] CFI Enabled
616,270 UART: [state] LifecycleState = Unprovisioned
618,150 UART: [state] DebugLocked = No
619,684 UART: [state] WD Timer not started. Device not locked for debugging
623,932 UART: [kat] SHA2-256
803,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,630 UART: [kat] ++
815,163 UART: [kat] sha1
827,775 UART: [kat] SHA2-256
830,827 UART: [kat] SHA2-384
837,672 UART: [kat] SHA2-512-ACC
840,603 UART: [kat] ECC-384
3,284,067 UART: [kat] HMAC-384Kdf
3,296,944 UART: [kat] LMS
3,826,445 UART: [kat] --
3,829,893 UART: [cold-reset] ++
3,831,782 UART: [fht] FHT @ 0x50003400
3,842,214 UART: [idev] ++
3,842,781 UART: [idev] CDI.KEYID = 6
3,843,716 UART: [idev] SUBJECT.KEYID = 7
3,844,925 UART: [idev] UDS.KEYID = 0
3,860,007 UART: [idev] Erasing UDS.KEYID = 0
6,313,543 UART: [idev] Sha1 KeyId Algorithm
6,335,846 UART: [idev] --
6,340,319 UART: [ldev] ++
6,341,104 UART: [ldev] CDI.KEYID = 6
6,342,034 UART: [ldev] SUBJECT.KEYID = 5
6,343,146 UART: [ldev] AUTHORITY.KEYID = 7
6,344,322 UART: [ldev] FE.KEYID = 1
6,353,725 UART: [ldev] Erasing FE.KEYID = 1
8,829,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,321 UART: [ldev] --
10,620,419 UART: [fwproc] Wait for Commands...
10,623,388 UART: [fwproc] Recv command 0x46505652
10,625,758 UART: [rt] FIPS Version
10,627,263 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,283 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,399,113 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,978 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,217 UART:
192,580 UART: Running Caliptra ROM ...
193,796 UART:
193,953 UART: [state] CFI Enabled
261,757 UART: [state] LifecycleState = Unprovisioned
263,663 UART: [state] DebugLocked = No
265,426 UART: [state] WD Timer not started. Device not locked for debugging
269,686 UART: [kat] SHA2-256
448,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,396 UART: [kat] ++
460,938 UART: [kat] sha1
471,713 UART: [kat] SHA2-256
474,712 UART: [kat] SHA2-384
481,498 UART: [kat] SHA2-512-ACC
484,487 UART: [kat] ECC-384
2,948,229 UART: [kat] HMAC-384Kdf
2,970,518 UART: [kat] LMS
3,499,962 UART: [kat] --
3,502,538 UART: [cold-reset] ++
3,504,754 UART: [fht] FHT @ 0x50003400
3,516,058 UART: [idev] ++
3,516,631 UART: [idev] CDI.KEYID = 6
3,517,555 UART: [idev] SUBJECT.KEYID = 7
3,518,713 UART: [idev] UDS.KEYID = 0
3,543,328 UART: [idev] Erasing UDS.KEYID = 0
6,025,506 UART: [idev] Sha1 KeyId Algorithm
6,047,985 UART: [idev] --
6,052,361 UART: [ldev] ++
6,053,130 UART: [ldev] CDI.KEYID = 6
6,054,053 UART: [ldev] SUBJECT.KEYID = 5
6,055,166 UART: [ldev] AUTHORITY.KEYID = 7
6,056,348 UART: [ldev] FE.KEYID = 1
6,098,696 UART: [ldev] Erasing FE.KEYID = 1
8,600,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,730 UART: [ldev] --
10,410,489 UART: [fwproc] Wait for Commands...
10,412,098 UART: [fwproc] Recv command 0x46505652
10,414,473 UART: [rt] FIPS Version
10,415,978 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
4,037 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,205,850 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
4,646 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,762 UART:
193,410 UART: Running Caliptra ROM ...
194,531 UART:
603,738 UART: [state] CFI Enabled
618,247 UART: [state] LifecycleState = Unprovisioned
620,142 UART: [state] DebugLocked = No
622,981 UART: [state] WD Timer not started. Device not locked for debugging
626,118 UART: [kat] SHA2-256
805,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,853 UART: [kat] ++
817,319 UART: [kat] sha1
827,437 UART: [kat] SHA2-256
830,445 UART: [kat] SHA2-384
837,451 UART: [kat] SHA2-512-ACC
840,406 UART: [kat] ECC-384
3,282,171 UART: [kat] HMAC-384Kdf
3,295,639 UART: [kat] LMS
3,825,121 UART: [kat] --
3,829,250 UART: [cold-reset] ++
3,830,743 UART: [fht] FHT @ 0x50003400
3,841,775 UART: [idev] ++
3,842,337 UART: [idev] CDI.KEYID = 6
3,843,217 UART: [idev] SUBJECT.KEYID = 7
3,844,353 UART: [idev] UDS.KEYID = 0
3,857,996 UART: [idev] Erasing UDS.KEYID = 0
6,314,636 UART: [idev] Sha1 KeyId Algorithm
6,337,714 UART: [idev] --
6,341,374 UART: [ldev] ++
6,341,949 UART: [ldev] CDI.KEYID = 6
6,343,013 UART: [ldev] SUBJECT.KEYID = 5
6,344,145 UART: [ldev] AUTHORITY.KEYID = 7
6,345,316 UART: [ldev] FE.KEYID = 1
6,357,318 UART: [ldev] Erasing FE.KEYID = 1
8,833,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,305 UART: [ldev] --
10,625,157 UART: [fwproc] Wait for Commands...
10,627,518 UART: [fwproc] Recv command 0x46505652
10,629,878 UART: [rt] FIPS Version
10,631,384 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,407 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,412,180 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,241 UART: [cold-reset] ++
1,170,661 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,182,417 UART: [idev] Erasing UDS.KEYID = 0
1,199,327 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,382 UART: [ldev] Erasing FE.KEYID = 1
1,241,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46505652
1,282,054 UART: [rt] FIPS Version
1,282,615 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,896 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,044 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,115 UART: [fwproc] Wait for Commands...
1,282,830 UART: [fwproc] Recv command 0x46505652
1,283,657 UART: [rt] FIPS Version
1,284,218 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,347 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,906 UART: [kat] LMS
1,169,218 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,911 UART: [fht] FHT @ 0x50003400
1,173,677 UART: [idev] ++
1,173,845 UART: [idev] CDI.KEYID = 6
1,174,206 UART: [idev] SUBJECT.KEYID = 7
1,174,631 UART: [idev] UDS.KEYID = 0
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,084 UART: [ldev] ++
1,209,252 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,043 UART: [ldev] AUTHORITY.KEYID = 7
1,210,506 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,241,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,574 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46505652
1,282,368 UART: [rt] FIPS Version
1,282,929 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,402 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
891,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,888 UART: [kat] ++
896,040 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,254 UART: [fht] FHT @ 0x50003400
1,174,102 UART: [idev] ++
1,174,270 UART: [idev] CDI.KEYID = 6
1,174,631 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,682 UART: [idev] --
1,209,627 UART: [ldev] ++
1,209,795 UART: [ldev] CDI.KEYID = 6
1,210,159 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,639 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46505652
1,284,267 UART: [rt] FIPS Version
1,284,828 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,875 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,544 UART: [state] LifecycleState = Unprovisioned
85,199 UART: [state] DebugLocked = No
85,829 UART: [state] WD Timer not started. Device not locked for debugging
87,022 UART: [kat] SHA2-256
890,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,701 UART: [kat] ++
894,853 UART: [kat] sha1
899,155 UART: [kat] SHA2-256
901,095 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,060 UART: [kat] LMS
1,168,372 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,741 UART: [fht] FHT @ 0x50003400
1,172,401 UART: [idev] ++
1,172,569 UART: [idev] CDI.KEYID = 6
1,172,930 UART: [idev] SUBJECT.KEYID = 7
1,173,355 UART: [idev] UDS.KEYID = 0
1,181,303 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,206,861 UART: [idev] --
1,207,908 UART: [ldev] ++
1,208,076 UART: [ldev] CDI.KEYID = 6
1,208,440 UART: [ldev] SUBJECT.KEYID = 5
1,208,867 UART: [ldev] AUTHORITY.KEYID = 7
1,209,330 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,241,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,382 UART: [fwproc] Wait for Commands...
1,281,031 UART: [fwproc] Recv command 0x46505652
1,281,858 UART: [rt] FIPS Version
1,282,419 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,844 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,829 UART: [kat] HMAC-384Kdf
921,425 UART: [kat] LMS
1,169,737 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,578 UART: [idev] ++
1,173,746 UART: [idev] CDI.KEYID = 6
1,174,107 UART: [idev] SUBJECT.KEYID = 7
1,174,532 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,183 UART: [ldev] --
1,281,689 UART: [fwproc] Wait for Commands...
1,282,432 UART: [fwproc] Recv command 0x46505652
1,283,259 UART: [rt] FIPS Version
1,283,820 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,407 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,500 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,050 UART:
192,460 UART: Running Caliptra ROM ...
194,386 UART:
194,551 UART: [state] CFI Enabled
263,521 UART: [state] LifecycleState = Unprovisioned
265,904 UART: [state] DebugLocked = No
268,356 UART: [state] WD Timer not started. Device not locked for debugging
273,379 UART: [kat] SHA2-256
455,302 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,819 UART: [kat] ++
467,407 UART: [kat] sha1
477,371 UART: [kat] SHA2-256
480,381 UART: [kat] SHA2-384
487,383 UART: [kat] SHA2-512-ACC
490,003 UART: [kat] ECC-384
3,777,727 UART: [kat] HMAC-384Kdf
3,803,398 UART: [kat] LMS
4,876,558 UART: [kat] --
4,882,246 UART: [cold-reset] ++
4,883,857 UART: [fht] FHT @ 0x50003400
4,895,594 UART: [idev] ++
4,896,326 UART: [idev] CDI.KEYID = 6
4,897,430 UART: [idev] SUBJECT.KEYID = 7
4,898,639 UART: [idev] UDS.KEYID = 0
4,930,072 UART: [idev] Erasing UDS.KEYID = 0
8,243,139 UART: [idev] Sha1 KeyId Algorithm
8,265,555 UART: [idev] --
8,268,679 UART: [ldev] ++
8,269,242 UART: [ldev] CDI.KEYID = 6
8,270,397 UART: [ldev] SUBJECT.KEYID = 5
8,271,610 UART: [ldev] AUTHORITY.KEYID = 7
8,272,758 UART: [ldev] FE.KEYID = 1
8,319,105 UART: [ldev] Erasing FE.KEYID = 1
11,655,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,098 UART: [ldev] --
14,041,201 UART: [fwproc] Wait for Commands...
14,042,773 UART: [fwproc] Recv command 0x46574c44
14,045,096 UART: [fwproc] Recv'd Img size: 113760 bytes
18,114,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,195,176 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,263,945 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,579,599 >>> mbox cmd response: success
18,582,951 UART: [afmc] ++
18,583,534 UART: [afmc] CDI.KEYID = 6
18,584,713 UART: [afmc] SUBJECT.KEYID = 7
18,585,891 UART: [afmc] AUTHORITY.KEYID = 5
21,950,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,248,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,250,347 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,266,492 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,282,552 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,298,532 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
796 UART: [
1,338 UART: Running Caliptra ROM ...
2,442 UART:
2,596 UART: [state] CFI Enabled
68,862 UART: [state] LifecycleState = Unprovisioned
70,727 UART: [state] DebugLocked = No
73,401 UART: [state] WD Timer not started. Device not locked for debugging
78,179 UART: [kat] SHA2-256
260,124 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
271,660 UART: [kat] ++
272,288 UART: [kat] sha1
283,855 UART: [kat] SHA2-256
286,888 UART: [kat] SHA2-384
293,893 UART: [kat] SHA2-512-ACC
296,509 UART: [kat] ECC-384
3,584,630 UART: [kat] HMAC-384Kdf
3,609,172 UART: [kat] LMS
4,682,324 UART: [kat] --
4,687,176 UART: [warm-reset] ++
4,688,250 UART: [warm-reset] Prev Cold-Reset failed
4,691,332 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
5,619 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,359,042 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,777 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,512 UART:
192,897 UART: Running Caliptra ROM ...
194,104 UART:
603,631 UART: [state] CFI Enabled
619,796 UART: [state] LifecycleState = Unprovisioned
622,204 UART: [state] DebugLocked = No
624,542 UART: [state] WD Timer not started. Device not locked for debugging
629,679 UART: [kat] SHA2-256
811,678 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,222 UART: [kat] ++
823,719 UART: [kat] sha1
833,132 UART: [kat] SHA2-256
836,132 UART: [kat] SHA2-384
843,298 UART: [kat] SHA2-512-ACC
845,905 UART: [kat] ECC-384
4,101,119 UART: [kat] HMAC-384Kdf
4,113,914 UART: [kat] LMS
5,187,076 UART: [kat] --
5,191,250 UART: [cold-reset] ++
5,192,420 UART: [fht] FHT @ 0x50003400
5,203,477 UART: [idev] ++
5,204,198 UART: [idev] CDI.KEYID = 6
5,205,369 UART: [idev] SUBJECT.KEYID = 7
5,206,845 UART: [idev] UDS.KEYID = 0
5,224,684 UART: [idev] Erasing UDS.KEYID = 0
8,495,961 UART: [idev] Sha1 KeyId Algorithm
8,517,841 UART: [idev] --
8,521,403 UART: [ldev] ++
8,522,021 UART: [ldev] CDI.KEYID = 6
8,523,117 UART: [ldev] SUBJECT.KEYID = 5
8,524,641 UART: [ldev] AUTHORITY.KEYID = 7
8,526,171 UART: [ldev] FE.KEYID = 1
8,538,116 UART: [ldev] Erasing FE.KEYID = 1
11,829,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,720 UART: [ldev] --
14,197,768 UART: [fwproc] Wait for Commands...
14,199,977 UART: [fwproc] Recv command 0x46574c44
14,202,283 UART: [fwproc] Recv'd Img size: 113760 bytes
18,265,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,338,889 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,407,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,722,795 >>> mbox cmd response: success
18,726,111 UART: [afmc] ++
18,726,702 UART: [afmc] CDI.KEYID = 6
18,727,884 UART: [afmc] SUBJECT.KEYID = 7
18,729,037 UART: [afmc] AUTHORITY.KEYID = 5
22,041,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,337,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,339,520 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,355,644 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,371,716 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,387,756 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
1,143 UART:
1,392 UART: Running Caliptra ROM ...
2,494 UART:
16,170,053 UART: [state] CFI Enabled
16,184,753 UART: [state] LifecycleState = Unprovisioned
16,186,662 UART: [state] DebugLocked = No
16,188,040 UART: [state] WD Timer not started. Device not locked for debugging
16,193,248 UART: [kat] SHA2-256
16,375,212 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
16,386,783 UART: [kat] ++
16,387,322 UART: [kat] sha1
16,397,882 UART: [kat] SHA2-256
16,400,907 UART: [kat] SHA2-384
16,405,884 UART: [kat] SHA2-512-ACC
16,408,501 UART: [kat] ECC-384
19,662,970 UART: [kat] HMAC-384Kdf
19,674,653 UART: [kat] LMS
20,747,807 UART: [kat] --
20,752,522 UART: [warm-reset] ++
20,753,594 UART: [warm-reset] Prev Cold-Reset failed
20,758,182 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,566 writing to cptra_bootfsm_go
6,732 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,529,944 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
5,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,031 UART:
192,437 UART: Running Caliptra ROM ...
193,536 UART:
193,680 UART: [state] CFI Enabled
264,385 UART: [state] LifecycleState = Unprovisioned
266,322 UART: [state] DebugLocked = No
267,835 UART: [state] WD Timer not started. Device not locked for debugging
272,050 UART: [kat] SHA2-256
451,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,713 UART: [kat] ++
463,165 UART: [kat] sha1
474,794 UART: [kat] SHA2-256
477,802 UART: [kat] SHA2-384
484,647 UART: [kat] SHA2-512-ACC
487,580 UART: [kat] ECC-384
2,948,924 UART: [kat] HMAC-384Kdf
2,972,786 UART: [kat] LMS
3,502,240 UART: [kat] --
3,506,773 UART: [cold-reset] ++
3,508,274 UART: [fht] FHT @ 0x50003400
3,519,686 UART: [idev] ++
3,520,278 UART: [idev] CDI.KEYID = 6
3,521,206 UART: [idev] SUBJECT.KEYID = 7
3,522,422 UART: [idev] UDS.KEYID = 0
3,544,828 UART: [idev] Erasing UDS.KEYID = 0
6,026,815 UART: [idev] Sha1 KeyId Algorithm
6,049,567 UART: [idev] --
6,053,436 UART: [ldev] ++
6,054,024 UART: [ldev] CDI.KEYID = 6
6,054,941 UART: [ldev] SUBJECT.KEYID = 5
6,056,105 UART: [ldev] AUTHORITY.KEYID = 7
6,057,342 UART: [ldev] FE.KEYID = 1
6,100,559 UART: [ldev] Erasing FE.KEYID = 1
8,604,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,774 UART: [ldev] --
10,414,855 UART: [fwproc] Wait for Commands...
10,418,094 UART: [fwproc] Recv command 0x46574c44
10,420,139 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,283,519 >>> mbox cmd response: success
14,287,468 UART: [afmc] ++
14,288,581 UART: [afmc] CDI.KEYID = 6
14,289,479 UART: [afmc] SUBJECT.KEYID = 7
14,290,587 UART: [afmc] AUTHORITY.KEYID = 5
16,826,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
811 UART: [
1,285 UART: Running Caliptra ROM ...
2,324 UART:
2,469 UART: [state] CFI Enabled
70,210 UART: [state] LifecycleState = Unprovisioned
72,079 UART: [state] DebugLocked = No
73,864 UART: [state] WD Timer not started. Device not locked for debugging
76,902 UART: [kat] SHA2-256
256,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,598 UART: [kat] ++
268,042 UART: [kat] sha1
278,108 UART: [kat] SHA2-256
281,123 UART: [kat] SHA2-384
286,288 UART: [kat] SHA2-512-ACC
289,281 UART: [kat] ECC-384
2,734,590 UART: [kat] HMAC-384Kdf
2,757,891 UART: [kat] LMS
3,287,333 UART: [kat] --
3,290,289 UART: [warm-reset] ++
3,291,128 UART: [warm-reset] Prev Cold-Reset failed
3,294,101 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
5,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,317 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
6,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,453 UART:
192,863 UART: Running Caliptra ROM ...
193,970 UART:
603,434 UART: [state] CFI Enabled
619,103 UART: [state] LifecycleState = Unprovisioned
620,981 UART: [state] DebugLocked = No
623,897 UART: [state] WD Timer not started. Device not locked for debugging
628,305 UART: [kat] SHA2-256
807,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,992 UART: [kat] ++
819,443 UART: [kat] sha1
831,572 UART: [kat] SHA2-256
834,562 UART: [kat] SHA2-384
841,679 UART: [kat] SHA2-512-ACC
844,667 UART: [kat] ECC-384
3,287,586 UART: [kat] HMAC-384Kdf
3,301,223 UART: [kat] LMS
3,830,721 UART: [kat] --
3,835,354 UART: [cold-reset] ++
3,837,247 UART: [fht] FHT @ 0x50003400
3,847,853 UART: [idev] ++
3,848,421 UART: [idev] CDI.KEYID = 6
3,849,299 UART: [idev] SUBJECT.KEYID = 7
3,850,510 UART: [idev] UDS.KEYID = 0
3,868,933 UART: [idev] Erasing UDS.KEYID = 0
6,328,767 UART: [idev] Sha1 KeyId Algorithm
6,351,233 UART: [idev] --
6,355,145 UART: [ldev] ++
6,355,715 UART: [ldev] CDI.KEYID = 6
6,356,594 UART: [ldev] SUBJECT.KEYID = 5
6,357,805 UART: [ldev] AUTHORITY.KEYID = 7
6,359,030 UART: [ldev] FE.KEYID = 1
6,369,597 UART: [ldev] Erasing FE.KEYID = 1
8,841,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,000 UART: [ldev] --
10,631,887 UART: [fwproc] Wait for Commands...
10,633,332 UART: [fwproc] Recv command 0x46574c44
10,635,421 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,517 >>> mbox cmd response: success
14,495,504 UART: [afmc] ++
14,496,090 UART: [afmc] CDI.KEYID = 6
14,497,004 UART: [afmc] SUBJECT.KEYID = 7
14,498,223 UART: [afmc] AUTHORITY.KEYID = 5
16,996,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,693 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,728 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,617 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
817 UART: [
1,359 UART: Running Caliptra ROM ...
2,461 UART:
1,733,654 UART: [state] CFI Enabled
1,748,544 UART: [state] LifecycleState = Unprovisioned
1,750,436 UART: [state] DebugLocked = No
1,753,161 UART: [state] WD Timer not started. Device not locked for debugging
1,757,657 UART: [kat] SHA2-256
1,936,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,948,376 UART: [kat] ++
1,948,858 UART: [kat] sha1
1,959,959 UART: [kat] SHA2-256
1,962,975 UART: [kat] SHA2-384
1,968,135 UART: [kat] SHA2-512-ACC
1,971,136 UART: [kat] ECC-384
4,411,235 UART: [kat] HMAC-384Kdf
4,422,762 UART: [kat] LMS
4,952,308 UART: [kat] --
4,955,292 UART: [warm-reset] ++
4,956,087 UART: [warm-reset] Prev Cold-Reset failed
4,959,083 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,170 writing to cptra_bootfsm_go
7,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,464 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
5,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,217 UART:
192,606 UART: Running Caliptra ROM ...
193,790 UART:
193,942 UART: [state] CFI Enabled
263,755 UART: [state] LifecycleState = Unprovisioned
265,631 UART: [state] DebugLocked = No
267,881 UART: [state] WD Timer not started. Device not locked for debugging
271,342 UART: [kat] SHA2-256
450,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,079 UART: [kat] ++
462,537 UART: [kat] sha1
472,713 UART: [kat] SHA2-256
475,773 UART: [kat] SHA2-384
482,235 UART: [kat] SHA2-512-ACC
485,175 UART: [kat] ECC-384
2,947,379 UART: [kat] HMAC-384Kdf
2,971,073 UART: [kat] LMS
3,500,530 UART: [kat] --
3,505,905 UART: [cold-reset] ++
3,508,007 UART: [fht] FHT @ 0x50003400
3,518,946 UART: [idev] ++
3,519,510 UART: [idev] CDI.KEYID = 6
3,520,423 UART: [idev] SUBJECT.KEYID = 7
3,521,638 UART: [idev] UDS.KEYID = 0
3,543,467 UART: [idev] Erasing UDS.KEYID = 0
6,024,359 UART: [idev] Sha1 KeyId Algorithm
6,048,720 UART: [idev] --
6,053,922 UART: [ldev] ++
6,054,496 UART: [ldev] CDI.KEYID = 6
6,055,404 UART: [ldev] SUBJECT.KEYID = 5
6,056,566 UART: [ldev] AUTHORITY.KEYID = 7
6,057,804 UART: [ldev] FE.KEYID = 1
6,099,188 UART: [ldev] Erasing FE.KEYID = 1
8,603,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,280 UART: [ldev] --
10,412,625 UART: [fwproc] Wait for Commands...
10,414,959 UART: [fwproc] Recv command 0x46574c44
10,417,061 UART: [fwproc] Recv'd Img size: 114084 bytes
13,815,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,144 >>> mbox cmd response: success
14,284,196 UART: [afmc] ++
14,284,788 UART: [afmc] CDI.KEYID = 6
14,285,711 UART: [afmc] SUBJECT.KEYID = 7
14,286,868 UART: [afmc] AUTHORITY.KEYID = 5
16,828,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,753 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
818 UART: [
1,309 UART: Running Caliptra ROM ...
2,414 UART:
2,565 UART: [state] CFI Enabled
69,657 UART: [state] LifecycleState = Unprovisioned
71,523 UART: [state] DebugLocked = No
73,225 UART: [state] WD Timer not started. Device not locked for debugging
76,906 UART: [kat] SHA2-256
256,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,643 UART: [kat] ++
268,171 UART: [kat] sha1
279,862 UART: [kat] SHA2-256
282,902 UART: [kat] SHA2-384
289,262 UART: [kat] SHA2-512-ACC
292,205 UART: [kat] ECC-384
2,755,328 UART: [kat] HMAC-384Kdf
2,775,433 UART: [kat] LMS
3,304,909 UART: [kat] --
3,310,953 UART: [warm-reset] ++
3,311,812 UART: [warm-reset] Prev Cold-Reset failed
3,315,316 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,081,399 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
6,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,495 UART:
193,235 UART: Running Caliptra ROM ...
194,368 UART:
603,649 UART: [state] CFI Enabled
617,237 UART: [state] LifecycleState = Unprovisioned
619,145 UART: [state] DebugLocked = No
620,906 UART: [state] WD Timer not started. Device not locked for debugging
624,422 UART: [kat] SHA2-256
803,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,137 UART: [kat] ++
815,593 UART: [kat] sha1
827,991 UART: [kat] SHA2-256
831,056 UART: [kat] SHA2-384
836,192 UART: [kat] SHA2-512-ACC
839,179 UART: [kat] ECC-384
3,279,129 UART: [kat] HMAC-384Kdf
3,291,306 UART: [kat] LMS
3,820,817 UART: [kat] --
3,827,059 UART: [cold-reset] ++
3,828,963 UART: [fht] FHT @ 0x50003400
3,839,399 UART: [idev] ++
3,840,048 UART: [idev] CDI.KEYID = 6
3,840,989 UART: [idev] SUBJECT.KEYID = 7
3,842,102 UART: [idev] UDS.KEYID = 0
3,858,887 UART: [idev] Erasing UDS.KEYID = 0
6,310,741 UART: [idev] Sha1 KeyId Algorithm
6,334,075 UART: [idev] --
6,337,440 UART: [ldev] ++
6,338,019 UART: [ldev] CDI.KEYID = 6
6,338,943 UART: [ldev] SUBJECT.KEYID = 5
6,340,108 UART: [ldev] AUTHORITY.KEYID = 7
6,341,393 UART: [ldev] FE.KEYID = 1
6,351,341 UART: [ldev] Erasing FE.KEYID = 1
8,827,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,085 UART: [ldev] --
10,616,714 UART: [fwproc] Wait for Commands...
10,619,132 UART: [fwproc] Recv command 0x46574c44
10,621,221 UART: [fwproc] Recv'd Img size: 114084 bytes
14,017,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,947 >>> mbox cmd response: success
14,479,672 UART: [afmc] ++
14,480,363 UART: [afmc] CDI.KEYID = 6
14,481,435 UART: [afmc] SUBJECT.KEYID = 7
14,482,540 UART: [afmc] AUTHORITY.KEYID = 5
16,979,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
810 UART: [
1,354 UART: Running Caliptra ROM ...
2,459 UART:
1,737,012 UART: [state] CFI Enabled
1,751,391 UART: [state] LifecycleState = Unprovisioned
1,753,250 UART: [state] DebugLocked = No
1,754,796 UART: [state] WD Timer not started. Device not locked for debugging
1,759,020 UART: [kat] SHA2-256
1,938,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,949,737 UART: [kat] ++
1,950,198 UART: [kat] sha1
1,960,437 UART: [kat] SHA2-256
1,963,506 UART: [kat] SHA2-384
1,970,095 UART: [kat] SHA2-512-ACC
1,973,034 UART: [kat] ECC-384
4,413,657 UART: [kat] HMAC-384Kdf
4,426,581 UART: [kat] LMS
4,956,061 UART: [kat] --
4,962,082 UART: [warm-reset] ++
4,962,877 UART: [warm-reset] Prev Cold-Reset failed
4,967,112 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
6,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,274,376 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,182,237 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,208,109 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,216,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,240 UART: [ldev] --
1,281,678 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,572 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,845 >>> mbox cmd response: success
2,769,946 UART: [afmc] ++
2,770,114 UART: [afmc] CDI.KEYID = 6
2,770,477 UART: [afmc] SUBJECT.KEYID = 7
2,770,903 UART: [afmc] AUTHORITY.KEYID = 5
2,806,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,848,902 UART:
2,848,918 UART: Running Caliptra ROM ...
2,849,326 UART:
2,849,381 UART: [state] CFI Enabled
2,851,783 UART: [state] LifecycleState = Unprovisioned
2,852,438 UART: [state] DebugLocked = No
2,853,154 UART: [state] WD Timer not started. Device not locked for debugging
2,854,387 UART: [kat] SHA2-256
3,657,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,066 UART: [kat] ++
3,662,218 UART: [kat] sha1
3,666,556 UART: [kat] SHA2-256
3,668,496 UART: [kat] SHA2-384
3,671,165 UART: [kat] SHA2-512-ACC
3,673,066 UART: [kat] ECC-384
3,683,255 UART: [kat] HMAC-384Kdf
3,687,783 UART: [kat] LMS
3,936,095 UART: [kat] --
3,936,949 UART: [warm-reset] ++
3,937,217 UART: [warm-reset] Prev Cold-Reset failed
3,938,326 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,769 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,445 UART: [kat] SHA2-512-ACC
906,346 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,518 UART: [cold-reset] ++
1,170,894 UART: [fht] FHT @ 0x50003400
1,173,444 UART: [idev] ++
1,173,612 UART: [idev] CDI.KEYID = 6
1,173,973 UART: [idev] SUBJECT.KEYID = 7
1,174,398 UART: [idev] UDS.KEYID = 0
1,182,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,090 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,261 UART: [fwproc] Wait for Commands...
1,283,954 UART: [fwproc] Recv command 0x46574c44
1,284,687 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,432 >>> mbox cmd response: success
2,771,667 UART: [afmc] ++
2,771,835 UART: [afmc] CDI.KEYID = 6
2,772,198 UART: [afmc] SUBJECT.KEYID = 7
2,772,624 UART: [afmc] AUTHORITY.KEYID = 5
2,808,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,249 UART:
2,851,265 UART: Running Caliptra ROM ...
2,851,673 UART:
2,851,815 UART: [state] CFI Enabled
2,854,675 UART: [state] LifecycleState = Unprovisioned
2,855,330 UART: [state] DebugLocked = No
2,856,054 UART: [state] WD Timer not started. Device not locked for debugging
2,857,181 UART: [kat] SHA2-256
3,660,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,860 UART: [kat] ++
3,665,012 UART: [kat] sha1
3,669,358 UART: [kat] SHA2-256
3,671,298 UART: [kat] SHA2-384
3,673,889 UART: [kat] SHA2-512-ACC
3,675,790 UART: [kat] ECC-384
3,685,145 UART: [kat] HMAC-384Kdf
3,689,923 UART: [kat] LMS
3,938,235 UART: [kat] --
3,938,955 UART: [warm-reset] ++
3,939,223 UART: [warm-reset] Prev Cold-Reset failed
3,940,332 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,854 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,292 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,941 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,504 UART: [ldev] Erasing FE.KEYID = 1
1,242,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,818 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,991 UART: [fwproc] Recv command 0x46574c44
1,282,724 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,047 >>> mbox cmd response: success
2,770,160 UART: [afmc] ++
2,770,328 UART: [afmc] CDI.KEYID = 6
2,770,691 UART: [afmc] SUBJECT.KEYID = 7
2,771,117 UART: [afmc] AUTHORITY.KEYID = 5
2,806,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,357 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,848,490 UART:
2,848,506 UART: Running Caliptra ROM ...
2,848,914 UART:
2,848,969 UART: [state] CFI Enabled
2,851,267 UART: [state] LifecycleState = Unprovisioned
2,851,922 UART: [state] DebugLocked = No
2,852,596 UART: [state] WD Timer not started. Device not locked for debugging
2,853,793 UART: [kat] SHA2-256
3,657,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,472 UART: [kat] ++
3,661,624 UART: [kat] sha1
3,665,942 UART: [kat] SHA2-256
3,667,882 UART: [kat] SHA2-384
3,670,773 UART: [kat] SHA2-512-ACC
3,672,674 UART: [kat] ECC-384
3,681,937 UART: [kat] HMAC-384Kdf
3,686,685 UART: [kat] LMS
3,934,997 UART: [kat] --
3,935,905 UART: [warm-reset] ++
3,936,173 UART: [warm-reset] Prev Cold-Reset failed
3,937,170 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,475 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,183 UART: [kat] LMS
1,169,495 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,275 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,560 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,824 >>> mbox cmd response: success
2,772,079 UART: [afmc] ++
2,772,247 UART: [afmc] CDI.KEYID = 6
2,772,610 UART: [afmc] SUBJECT.KEYID = 7
2,773,036 UART: [afmc] AUTHORITY.KEYID = 5
2,809,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,216 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,313 UART:
2,851,329 UART: Running Caliptra ROM ...
2,851,737 UART:
2,851,879 UART: [state] CFI Enabled
2,854,989 UART: [state] LifecycleState = Unprovisioned
2,855,644 UART: [state] DebugLocked = No
2,856,252 UART: [state] WD Timer not started. Device not locked for debugging
2,857,557 UART: [kat] SHA2-256
3,661,107 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,236 UART: [kat] ++
3,665,388 UART: [kat] sha1
3,669,696 UART: [kat] SHA2-256
3,671,636 UART: [kat] SHA2-384
3,674,253 UART: [kat] SHA2-512-ACC
3,676,154 UART: [kat] ECC-384
3,685,795 UART: [kat] HMAC-384Kdf
3,690,503 UART: [kat] LMS
3,938,815 UART: [kat] --
3,939,643 UART: [warm-reset] ++
3,939,911 UART: [warm-reset] Prev Cold-Reset failed
3,941,010 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,716 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,050 UART: [kat] SHA2-512-ACC
905,951 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,181,499 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,398 UART: [ldev] Erasing FE.KEYID = 1
1,241,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,582 UART: [fwproc] Wait for Commands...
1,281,353 UART: [fwproc] Recv command 0x46574c44
1,282,086 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,777 >>> mbox cmd response: success
2,770,036 UART: [afmc] ++
2,770,204 UART: [afmc] CDI.KEYID = 6
2,770,567 UART: [afmc] SUBJECT.KEYID = 7
2,770,993 UART: [afmc] AUTHORITY.KEYID = 5
2,807,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,789 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,508 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,849,208 UART:
2,849,224 UART: Running Caliptra ROM ...
2,849,632 UART:
2,849,687 UART: [state] CFI Enabled
2,852,371 UART: [state] LifecycleState = Unprovisioned
2,853,026 UART: [state] DebugLocked = No
2,853,754 UART: [state] WD Timer not started. Device not locked for debugging
2,854,997 UART: [kat] SHA2-256
3,658,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,676 UART: [kat] ++
3,662,828 UART: [kat] sha1
3,667,218 UART: [kat] SHA2-256
3,669,158 UART: [kat] SHA2-384
3,671,825 UART: [kat] SHA2-512-ACC
3,673,726 UART: [kat] ECC-384
3,683,671 UART: [kat] HMAC-384Kdf
3,688,117 UART: [kat] LMS
3,936,429 UART: [kat] --
3,937,167 UART: [warm-reset] ++
3,937,435 UART: [warm-reset] Prev Cold-Reset failed
3,938,294 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,105 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,427 UART: [ldev] ++
1,209,595 UART: [ldev] CDI.KEYID = 6
1,209,959 UART: [ldev] SUBJECT.KEYID = 5
1,210,386 UART: [ldev] AUTHORITY.KEYID = 7
1,210,849 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,249 UART: [fwproc] Wait for Commands...
1,282,926 UART: [fwproc] Recv command 0x46574c44
1,283,659 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,802 >>> mbox cmd response: success
2,770,997 UART: [afmc] ++
2,771,165 UART: [afmc] CDI.KEYID = 6
2,771,528 UART: [afmc] SUBJECT.KEYID = 7
2,771,954 UART: [afmc] AUTHORITY.KEYID = 5
2,808,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,850,197 UART:
2,850,213 UART: Running Caliptra ROM ...
2,850,621 UART:
2,850,763 UART: [state] CFI Enabled
2,853,771 UART: [state] LifecycleState = Unprovisioned
2,854,426 UART: [state] DebugLocked = No
2,855,142 UART: [state] WD Timer not started. Device not locked for debugging
2,856,325 UART: [kat] SHA2-256
3,659,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,004 UART: [kat] ++
3,664,156 UART: [kat] sha1
3,668,386 UART: [kat] SHA2-256
3,670,326 UART: [kat] SHA2-384
3,672,949 UART: [kat] SHA2-512-ACC
3,674,850 UART: [kat] ECC-384
3,684,397 UART: [kat] HMAC-384Kdf
3,689,153 UART: [kat] LMS
3,937,465 UART: [kat] --
3,938,203 UART: [warm-reset] ++
3,938,471 UART: [warm-reset] Prev Cold-Reset failed
3,939,370 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,404 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,291 UART:
192,685 UART: Running Caliptra ROM ...
193,888 UART:
194,037 UART: [state] CFI Enabled
266,712 UART: [state] LifecycleState = Production
268,969 UART: [state] DebugLocked = No
271,702 UART: [state] WD Timer not started. Device not locked for debugging
275,495 UART: [kat] SHA2-256
457,409 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,956 UART: [kat] ++
469,492 UART: [kat] sha1
480,019 UART: [kat] SHA2-256
483,082 UART: [kat] SHA2-384
488,622 UART: [kat] SHA2-512-ACC
491,282 UART: [kat] ECC-384
3,766,916 UART: [kat] HMAC-384Kdf
3,794,562 UART: [kat] LMS
4,867,698 UART: [kat] --
4,872,793 UART: [cold-reset] ++
4,874,783 UART: [fht] FHT @ 0x50003400
4,886,363 UART: [idev] ++
4,887,035 UART: [idev] CDI.KEYID = 6
4,888,271 UART: [idev] SUBJECT.KEYID = 7
4,889,371 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,366 UART:
1,635 UART: Running Caliptra ROM ...
2,849 UART:
3,007 UART: [state] CFI Enabled
60,008 UART: [state] LifecycleState = Production
61,786 UART: [state] DebugLocked = No
63,274 UART: [state] WD Timer not started. Device not locked for debugging
67,504 UART: [kat] SHA2-256
249,441 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
260,974 UART: [kat] ++
261,495 UART: [kat] sha1
271,513 UART: [kat] SHA2-256
274,573 UART: [kat] SHA2-384
280,699 UART: [kat] SHA2-512-ACC
283,312 UART: [kat] ECC-384
3,572,083 UART: [kat] HMAC-384Kdf
3,598,159 UART: [kat] LMS
4,671,327 UART: [kat] --
4,676,597 UART: [warm-reset] ++
4,677,613 UART: [warm-reset] Prev Cold-Reset failed
4,680,646 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,448 UART:
192,855 UART: Running Caliptra ROM ...
193,967 UART:
603,660 UART: [state] CFI Enabled
616,967 UART: [state] LifecycleState = Production
619,194 UART: [state] DebugLocked = No
620,566 UART: [state] WD Timer not started. Device not locked for debugging
625,105 UART: [kat] SHA2-256
807,113 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,658 UART: [kat] ++
819,238 UART: [kat] sha1
829,737 UART: [kat] SHA2-256
832,731 UART: [kat] SHA2-384
838,806 UART: [kat] SHA2-512-ACC
841,386 UART: [kat] ECC-384
4,099,899 UART: [kat] HMAC-384Kdf
4,112,710 UART: [kat] LMS
5,185,877 UART: [kat] --
5,190,174 UART: [cold-reset] ++
5,191,785 UART: [fht] FHT @ 0x50003400
5,201,959 UART: [idev] ++
5,202,634 UART: [idev] CDI.KEYID = 6
5,203,867 UART: [idev] SUBJECT.KEYID = 7
5,205,296 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,665 UART:
1,842 UART: Running Caliptra ROM ...
3,083 UART:
15,260,814 UART: [state] CFI Enabled
15,272,173 UART: [state] LifecycleState = Production
15,273,938 UART: [state] DebugLocked = No
15,276,214 UART: [state] WD Timer not started. Device not locked for debugging
15,281,183 UART: [kat] SHA2-256
15,463,192 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
15,474,732 UART: [kat] ++
15,475,235 UART: [kat] sha1
15,486,486 UART: [kat] SHA2-256
15,489,540 UART: [kat] SHA2-384
15,496,543 UART: [kat] SHA2-512-ACC
15,499,150 UART: [kat] ECC-384
18,754,191 UART: [kat] HMAC-384Kdf
18,766,916 UART: [kat] LMS
19,840,070 UART: [kat] --
19,842,881 UART: [warm-reset] ++
19,843,888 UART: [warm-reset] Prev Cold-Reset failed
19,848,309 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,203 UART:
192,616 UART: Running Caliptra ROM ...
193,745 UART:
193,886 UART: [state] CFI Enabled
262,343 UART: [state] LifecycleState = Production
264,165 UART: [state] DebugLocked = No
265,826 UART: [state] WD Timer not started. Device not locked for debugging
269,929 UART: [kat] SHA2-256
449,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,605 UART: [kat] ++
461,141 UART: [kat] sha1
471,971 UART: [kat] SHA2-256
475,033 UART: [kat] SHA2-384
481,174 UART: [kat] SHA2-512-ACC
484,116 UART: [kat] ECC-384
2,949,289 UART: [kat] HMAC-384Kdf
2,972,977 UART: [kat] LMS
3,502,427 UART: [kat] --
3,505,773 UART: [cold-reset] ++
3,507,489 UART: [fht] FHT @ 0x50003400
3,517,333 UART: [idev] ++
3,517,907 UART: [idev] CDI.KEYID = 6
3,518,924 UART: [idev] SUBJECT.KEYID = 7
3,520,029 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,371 UART:
1,637 UART: Running Caliptra ROM ...
2,783 UART:
2,941 UART: [state] CFI Enabled
71,768 UART: [state] LifecycleState = Production
73,536 UART: [state] DebugLocked = No
75,420 UART: [state] WD Timer not started. Device not locked for debugging
79,641 UART: [kat] SHA2-256
258,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,366 UART: [kat] ++
270,892 UART: [kat] sha1
281,717 UART: [kat] SHA2-256
284,775 UART: [kat] SHA2-384
290,643 UART: [kat] SHA2-512-ACC
293,608 UART: [kat] ECC-384
2,756,118 UART: [kat] HMAC-384Kdf
2,778,891 UART: [kat] LMS
3,308,353 UART: [kat] --
3,311,872 UART: [warm-reset] ++
3,312,728 UART: [warm-reset] Prev Cold-Reset failed
3,316,662 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,401 UART:
192,797 UART: Running Caliptra ROM ...
193,921 UART:
603,700 UART: [state] CFI Enabled
618,653 UART: [state] LifecycleState = Production
620,376 UART: [state] DebugLocked = No
621,883 UART: [state] WD Timer not started. Device not locked for debugging
625,433 UART: [kat] SHA2-256
804,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,095 UART: [kat] ++
816,543 UART: [kat] sha1
829,088 UART: [kat] SHA2-256
832,152 UART: [kat] SHA2-384
838,523 UART: [kat] SHA2-512-ACC
841,457 UART: [kat] ECC-384
3,283,353 UART: [kat] HMAC-384Kdf
3,295,743 UART: [kat] LMS
3,825,251 UART: [kat] --
3,830,910 UART: [cold-reset] ++
3,832,291 UART: [fht] FHT @ 0x50003400
3,844,348 UART: [idev] ++
3,844,911 UART: [idev] CDI.KEYID = 6
3,845,842 UART: [idev] SUBJECT.KEYID = 7
3,847,050 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,443 UART:
1,611 UART: Running Caliptra ROM ...
2,755 UART:
16,626,045 UART: [state] CFI Enabled
16,642,528 UART: [state] LifecycleState = Production
16,644,283 UART: [state] DebugLocked = No
16,645,688 UART: [state] WD Timer not started. Device not locked for debugging
16,649,260 UART: [kat] SHA2-256
16,828,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,839,983 UART: [kat] ++
16,840,451 UART: [kat] sha1
16,853,062 UART: [kat] SHA2-256
16,856,138 UART: [kat] SHA2-384
16,861,797 UART: [kat] SHA2-512-ACC
16,864,787 UART: [kat] ECC-384
19,302,677 UART: [kat] HMAC-384Kdf
19,314,455 UART: [kat] LMS
19,843,969 UART: [kat] --
19,849,079 UART: [warm-reset] ++
19,849,880 UART: [warm-reset] Prev Cold-Reset failed
19,852,055 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,113 UART:
192,514 UART: Running Caliptra ROM ...
193,622 UART:
193,764 UART: [state] CFI Enabled
261,832 UART: [state] LifecycleState = Production
263,573 UART: [state] DebugLocked = No
265,464 UART: [state] WD Timer not started. Device not locked for debugging
269,939 UART: [kat] SHA2-256
449,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,594 UART: [kat] ++
461,129 UART: [kat] sha1
471,798 UART: [kat] SHA2-256
474,804 UART: [kat] SHA2-384
480,962 UART: [kat] SHA2-512-ACC
483,903 UART: [kat] ECC-384
2,949,726 UART: [kat] HMAC-384Kdf
2,970,506 UART: [kat] LMS
3,499,936 UART: [kat] --
3,503,878 UART: [cold-reset] ++
3,504,902 UART: [fht] FHT @ 0x50003400
3,517,208 UART: [idev] ++
3,517,770 UART: [idev] CDI.KEYID = 6
3,518,707 UART: [idev] SUBJECT.KEYID = 7
3,519,917 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,650 UART:
1,924 UART: Running Caliptra ROM ...
3,023 UART:
3,170 UART: [state] CFI Enabled
72,077 UART: [state] LifecycleState = Production
73,849 UART: [state] DebugLocked = No
75,069 UART: [state] WD Timer not started. Device not locked for debugging
78,754 UART: [kat] SHA2-256
257,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
269,436 UART: [kat] ++
269,973 UART: [kat] sha1
280,519 UART: [kat] SHA2-256
283,535 UART: [kat] SHA2-384
289,671 UART: [kat] SHA2-512-ACC
292,601 UART: [kat] ECC-384
2,752,873 UART: [kat] HMAC-384Kdf
2,775,751 UART: [kat] LMS
3,305,214 UART: [kat] --
3,307,907 UART: [warm-reset] ++
3,308,697 UART: [warm-reset] Prev Cold-Reset failed
3,313,305 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,479 UART:
192,874 UART: Running Caliptra ROM ...
193,984 UART:
603,723 UART: [state] CFI Enabled
621,233 UART: [state] LifecycleState = Production
622,997 UART: [state] DebugLocked = No
624,852 UART: [state] WD Timer not started. Device not locked for debugging
629,431 UART: [kat] SHA2-256
808,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,194 UART: [kat] ++
820,762 UART: [kat] sha1
832,242 UART: [kat] SHA2-256
835,299 UART: [kat] SHA2-384
842,622 UART: [kat] SHA2-512-ACC
845,602 UART: [kat] ECC-384
3,285,813 UART: [kat] HMAC-384Kdf
3,299,532 UART: [kat] LMS
3,829,018 UART: [kat] --
3,832,167 UART: [cold-reset] ++
3,834,154 UART: [fht] FHT @ 0x50003400
3,845,572 UART: [idev] ++
3,846,132 UART: [idev] CDI.KEYID = 6
3,847,144 UART: [idev] SUBJECT.KEYID = 7
3,848,243 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,706 UART:
1,976 UART: Running Caliptra ROM ...
3,144 UART:
16,620,553 UART: [state] CFI Enabled
16,629,951 UART: [state] LifecycleState = Production
16,631,637 UART: [state] DebugLocked = No
16,633,884 UART: [state] WD Timer not started. Device not locked for debugging
16,637,081 UART: [kat] SHA2-256
16,816,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,827,757 UART: [kat] ++
16,828,216 UART: [kat] sha1
16,839,643 UART: [kat] SHA2-256
16,842,651 UART: [kat] SHA2-384
16,848,630 UART: [kat] SHA2-512-ACC
16,851,573 UART: [kat] ECC-384
19,296,888 UART: [kat] HMAC-384Kdf
19,310,205 UART: [kat] LMS
19,839,691 UART: [kat] --
19,844,323 UART: [warm-reset] ++
19,845,117 UART: [warm-reset] Prev Cold-Reset failed
19,847,696 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Production
85,609 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,076 UART: [kat] LMS
1,168,388 UART: [kat] --
1,169,281 UART: [cold-reset] ++
1,169,851 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,031 UART:
1,175,047 UART: Running Caliptra ROM ...
1,175,455 UART:
1,175,510 UART: [state] CFI Enabled
1,178,012 UART: [state] LifecycleState = Production
1,178,619 UART: [state] DebugLocked = No
1,179,181 UART: [state] WD Timer not started. Device not locked for debugging
1,180,394 UART: [kat] SHA2-256
1,983,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,073 UART: [kat] ++
1,988,225 UART: [kat] sha1
1,992,469 UART: [kat] SHA2-256
1,994,409 UART: [kat] SHA2-384
1,997,284 UART: [kat] SHA2-512-ACC
1,999,185 UART: [kat] ECC-384
2,008,702 UART: [kat] HMAC-384Kdf
2,013,254 UART: [kat] LMS
2,261,566 UART: [kat] --
2,262,600 UART: [warm-reset] ++
2,262,868 UART: [warm-reset] Prev Cold-Reset failed
2,263,717 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Production
85,888 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
915,621 UART: [kat] HMAC-384Kdf
920,351 UART: [kat] LMS
1,168,663 UART: [kat] --
1,169,414 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,510 UART: [idev] ++
1,172,678 UART: [idev] CDI.KEYID = 6
1,173,039 UART: [idev] SUBJECT.KEYID = 7
1,173,464 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,150 UART:
1,175,166 UART: Running Caliptra ROM ...
1,175,574 UART:
1,175,716 UART: [state] CFI Enabled
1,178,358 UART: [state] LifecycleState = Production
1,178,965 UART: [state] DebugLocked = No
1,179,533 UART: [state] WD Timer not started. Device not locked for debugging
1,180,848 UART: [kat] SHA2-256
1,984,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,527 UART: [kat] ++
1,988,679 UART: [kat] sha1
1,992,809 UART: [kat] SHA2-256
1,994,749 UART: [kat] SHA2-384
1,997,482 UART: [kat] SHA2-512-ACC
1,999,383 UART: [kat] ECC-384
2,009,270 UART: [kat] HMAC-384Kdf
2,013,904 UART: [kat] LMS
2,262,216 UART: [kat] --
2,263,102 UART: [warm-reset] ++
2,263,370 UART: [warm-reset] Prev Cold-Reset failed
2,264,289 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Production
86,027 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
891,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,493 UART: [kat] ++
895,645 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,391 UART: [idev] ++
1,172,559 UART: [idev] CDI.KEYID = 6
1,172,920 UART: [idev] SUBJECT.KEYID = 7
1,173,345 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,045 UART:
1,175,061 UART: Running Caliptra ROM ...
1,175,469 UART:
1,175,524 UART: [state] CFI Enabled
1,177,908 UART: [state] LifecycleState = Production
1,178,515 UART: [state] DebugLocked = No
1,179,013 UART: [state] WD Timer not started. Device not locked for debugging
1,180,296 UART: [kat] SHA2-256
1,983,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,987,975 UART: [kat] ++
1,988,127 UART: [kat] sha1
1,992,351 UART: [kat] SHA2-256
1,994,291 UART: [kat] SHA2-384
1,996,866 UART: [kat] SHA2-512-ACC
1,998,767 UART: [kat] ECC-384
2,008,522 UART: [kat] HMAC-384Kdf
2,013,118 UART: [kat] LMS
2,261,430 UART: [kat] --
2,262,128 UART: [warm-reset] ++
2,262,396 UART: [warm-reset] Prev Cold-Reset failed
2,263,265 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Production
85,950 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,293 UART: [kat] LMS
1,169,605 UART: [kat] --
1,170,820 UART: [cold-reset] ++
1,171,202 UART: [fht] FHT @ 0x50003400
1,173,914 UART: [idev] ++
1,174,082 UART: [idev] CDI.KEYID = 6
1,174,443 UART: [idev] SUBJECT.KEYID = 7
1,174,868 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,648 UART:
1,176,664 UART: Running Caliptra ROM ...
1,177,072 UART:
1,177,214 UART: [state] CFI Enabled
1,180,006 UART: [state] LifecycleState = Production
1,180,613 UART: [state] DebugLocked = No
1,181,221 UART: [state] WD Timer not started. Device not locked for debugging
1,182,500 UART: [kat] SHA2-256
1,986,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,990,179 UART: [kat] ++
1,990,331 UART: [kat] sha1
1,994,531 UART: [kat] SHA2-256
1,996,471 UART: [kat] SHA2-384
1,999,352 UART: [kat] SHA2-512-ACC
2,001,253 UART: [kat] ECC-384
2,011,398 UART: [kat] HMAC-384Kdf
2,015,978 UART: [kat] LMS
2,264,290 UART: [kat] --
2,265,170 UART: [warm-reset] ++
2,265,438 UART: [warm-reset] Prev Cold-Reset failed
2,266,497 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Production
85,917 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,391 UART: [cold-reset] ++
1,170,909 UART: [fht] FHT @ 0x50003400
1,173,609 UART: [idev] ++
1,173,777 UART: [idev] CDI.KEYID = 6
1,174,138 UART: [idev] SUBJECT.KEYID = 7
1,174,563 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,195 UART:
1,176,211 UART: Running Caliptra ROM ...
1,176,619 UART:
1,176,674 UART: [state] CFI Enabled
1,178,850 UART: [state] LifecycleState = Production
1,179,457 UART: [state] DebugLocked = No
1,180,187 UART: [state] WD Timer not started. Device not locked for debugging
1,181,366 UART: [kat] SHA2-256
1,984,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,045 UART: [kat] ++
1,989,197 UART: [kat] sha1
1,993,561 UART: [kat] SHA2-256
1,995,501 UART: [kat] SHA2-384
1,998,412 UART: [kat] SHA2-512-ACC
2,000,313 UART: [kat] ECC-384
2,010,462 UART: [kat] HMAC-384Kdf
2,014,976 UART: [kat] LMS
2,263,288 UART: [kat] --
2,264,202 UART: [warm-reset] ++
2,264,470 UART: [warm-reset] Prev Cold-Reset failed
2,265,529 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Production
86,134 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
905,019 UART: [kat] SHA2-512-ACC
906,920 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,711 UART: [kat] LMS
1,170,023 UART: [kat] --
1,171,072 UART: [cold-reset] ++
1,171,634 UART: [fht] FHT @ 0x50003400
1,174,300 UART: [idev] ++
1,174,468 UART: [idev] CDI.KEYID = 6
1,174,829 UART: [idev] SUBJECT.KEYID = 7
1,175,254 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,892 UART:
1,176,908 UART: Running Caliptra ROM ...
1,177,316 UART:
1,177,458 UART: [state] CFI Enabled
1,180,202 UART: [state] LifecycleState = Production
1,180,809 UART: [state] DebugLocked = No
1,181,345 UART: [state] WD Timer not started. Device not locked for debugging
1,182,540 UART: [kat] SHA2-256
1,986,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,990,219 UART: [kat] ++
1,990,371 UART: [kat] sha1
1,994,393 UART: [kat] SHA2-256
1,996,333 UART: [kat] SHA2-384
1,999,198 UART: [kat] SHA2-512-ACC
2,001,099 UART: [kat] ECC-384
2,011,008 UART: [kat] HMAC-384Kdf
2,015,750 UART: [kat] LMS
2,264,062 UART: [kat] --
2,264,874 UART: [warm-reset] ++
2,265,142 UART: [warm-reset] Prev Cold-Reset failed
2,266,133 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,219 writing to cptra_bootfsm_go
7,027 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
193,301 UART:
193,679 UART: Running Caliptra ROM ...
194,861 UART:
195,030 UART: [state] CFI Enabled
265,782 UART: [state] LifecycleState = Unprovisioned
268,150 UART: [state] DebugLocked = No
270,229 UART: [state] WD Timer not started. Device not locked for debugging
274,531 UART: [kat] SHA2-256
456,476 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,006 UART: [kat] ++
468,541 UART: [kat] sha1
478,779 UART: [kat] SHA2-256
481,805 UART: [kat] SHA2-384
486,794 UART: [kat] SHA2-512-ACC
489,426 UART: [kat] ECC-384
3,778,543 UART: [kat] HMAC-384Kdf
3,803,431 UART: [kat] LMS
4,876,590 UART: [kat] --
4,882,440 UART: [cold-reset] ++
4,884,517 UART: [fht] FHT @ 0x50003400
4,895,987 UART: [idev] ++
4,896,663 UART: [idev] CDI.KEYID = 6
4,897,808 UART: [idev] SUBJECT.KEYID = 7
4,898,984 UART: [idev] UDS.KEYID = 0
4,931,263 UART: [idev] Erasing UDS.KEYID = 0
8,245,231 UART: [idev] Sha1 KeyId Algorithm
8,266,915 UART: [idev] --
8,270,747 UART: [ldev] ++
8,271,316 UART: [ldev] CDI.KEYID = 6
8,272,549 UART: [ldev] SUBJECT.KEYID = 5
8,273,648 UART: [ldev] AUTHORITY.KEYID = 7
8,274,879 UART: [ldev] FE.KEYID = 1
8,319,821 UART: [ldev] Erasing FE.KEYID = 1
11,657,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,992 UART: [ldev] --
14,041,068 UART: [fwproc] Wait for Commands...
14,043,388 UART: [fwproc] Recv command 0x46574c44
14,045,709 UART: [fwproc] Recv'd Img size: 113760 bytes
Initializing fuses
1,154 UART:
1,357 UART: Running Caliptra ROM ...
2,457 UART:
2,618 UART: [state] CFI Enabled
72,239 UART: [state] LifecycleState = Unprovisioned
74,161 UART: [state] DebugLocked = No
76,243 UART: [state] WD Timer not started. Device not locked for debugging
81,295 UART: [kat] SHA2-256
263,213 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
274,704 UART: [kat] ++
275,280 UART: [kat] sha1
285,028 UART: [kat] SHA2-256
288,049 UART: [kat] SHA2-384
293,218 UART: [kat] SHA2-512-ACC
295,830 UART: [kat] ECC-384
3,583,437 UART: [kat] HMAC-384Kdf
3,610,099 UART: [kat] LMS
4,683,230 UART: [kat] --
4,688,222 UART: [warm-reset] ++
4,689,239 UART: [warm-reset] Prev Cold-Reset failed
4,692,697 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
5,569 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
6,579 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,461 UART:
192,840 UART: Running Caliptra ROM ...
194,031 UART:
603,740 UART: [state] CFI Enabled
617,298 UART: [state] LifecycleState = Unprovisioned
619,669 UART: [state] DebugLocked = No
621,046 UART: [state] WD Timer not started. Device not locked for debugging
625,645 UART: [kat] SHA2-256
807,658 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,205 UART: [kat] ++
819,787 UART: [kat] sha1
831,850 UART: [kat] SHA2-256
834,853 UART: [kat] SHA2-384
841,147 UART: [kat] SHA2-512-ACC
843,802 UART: [kat] ECC-384
4,098,897 UART: [kat] HMAC-384Kdf
4,111,579 UART: [kat] LMS
5,184,761 UART: [kat] --
5,189,698 UART: [cold-reset] ++
5,191,009 UART: [fht] FHT @ 0x50003400
5,204,041 UART: [idev] ++
5,204,729 UART: [idev] CDI.KEYID = 6
5,205,960 UART: [idev] SUBJECT.KEYID = 7
5,207,383 UART: [idev] UDS.KEYID = 0
5,223,025 UART: [idev] Erasing UDS.KEYID = 0
8,495,181 UART: [idev] Sha1 KeyId Algorithm
8,518,303 UART: [idev] --
8,521,851 UART: [ldev] ++
8,522,415 UART: [ldev] CDI.KEYID = 6
8,523,647 UART: [ldev] SUBJECT.KEYID = 5
8,525,074 UART: [ldev] AUTHORITY.KEYID = 7
8,526,636 UART: [ldev] FE.KEYID = 1
8,538,069 UART: [ldev] Erasing FE.KEYID = 1
11,829,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,581 UART: [ldev] --
14,195,621 UART: [fwproc] Wait for Commands...
14,197,819 UART: [fwproc] Recv command 0x46574c44
14,200,071 UART: [fwproc] Recv'd Img size: 113760 bytes
Initializing fuses
1,165 UART:
1,421 UART: Running Caliptra ROM ...
2,516 UART:
6,247,047 UART: [state] CFI Enabled
6,259,240 UART: [state] LifecycleState = Unprovisioned
6,261,097 UART: [state] DebugLocked = No
6,263,941 UART: [state] WD Timer not started. Device not locked for debugging
6,267,804 UART: [kat] SHA2-256
6,449,796 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,461,340 UART: [kat] ++
6,461,803 UART: [kat] sha1
6,472,143 UART: [kat] SHA2-256
6,475,223 UART: [kat] SHA2-384
6,482,017 UART: [kat] SHA2-512-ACC
6,484,635 UART: [kat] ECC-384
9,737,832 UART: [kat] HMAC-384Kdf
9,749,789 UART: [kat] LMS
10,822,928 UART: [kat] --
10,828,453 UART: [warm-reset] ++
10,829,465 UART: [warm-reset] Prev Cold-Reset failed
10,832,431 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
6,131 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
5,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,215 UART:
192,607 UART: Running Caliptra ROM ...
193,739 UART:
193,888 UART: [state] CFI Enabled
267,370 UART: [state] LifecycleState = Unprovisioned
269,241 UART: [state] DebugLocked = No
271,923 UART: [state] WD Timer not started. Device not locked for debugging
275,529 UART: [kat] SHA2-256
454,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,216 UART: [kat] ++
466,756 UART: [kat] sha1
477,748 UART: [kat] SHA2-256
480,823 UART: [kat] SHA2-384
487,467 UART: [kat] SHA2-512-ACC
490,407 UART: [kat] ECC-384
2,951,472 UART: [kat] HMAC-384Kdf
2,972,741 UART: [kat] LMS
3,502,206 UART: [kat] --
3,506,413 UART: [cold-reset] ++
3,507,803 UART: [fht] FHT @ 0x50003400
3,517,820 UART: [idev] ++
3,518,384 UART: [idev] CDI.KEYID = 6
3,519,262 UART: [idev] SUBJECT.KEYID = 7
3,520,475 UART: [idev] UDS.KEYID = 0
3,544,931 UART: [idev] Erasing UDS.KEYID = 0
6,027,286 UART: [idev] Sha1 KeyId Algorithm
6,049,997 UART: [idev] --
6,054,525 UART: [ldev] ++
6,055,150 UART: [ldev] CDI.KEYID = 6
6,056,064 UART: [ldev] SUBJECT.KEYID = 5
6,057,178 UART: [ldev] AUTHORITY.KEYID = 7
6,058,415 UART: [ldev] FE.KEYID = 1
6,099,963 UART: [ldev] Erasing FE.KEYID = 1
8,607,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,672 UART: [ldev] --
10,417,982 UART: [fwproc] Wait for Commands...
10,420,637 UART: [fwproc] Recv command 0x46574c44
10,422,738 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,137 UART:
1,388 UART: Running Caliptra ROM ...
2,506 UART:
2,675 UART: [state] CFI Enabled
68,634 UART: [state] LifecycleState = Unprovisioned
70,557 UART: [state] DebugLocked = No
72,101 UART: [state] WD Timer not started. Device not locked for debugging
74,967 UART: [kat] SHA2-256
254,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,660 UART: [kat] ++
266,103 UART: [kat] sha1
277,567 UART: [kat] SHA2-256
280,627 UART: [kat] SHA2-384
287,678 UART: [kat] SHA2-512-ACC
290,662 UART: [kat] ECC-384
2,752,220 UART: [kat] HMAC-384Kdf
2,774,173 UART: [kat] LMS
3,303,624 UART: [kat] --
3,308,173 UART: [warm-reset] ++
3,309,024 UART: [warm-reset] Prev Cold-Reset failed
3,313,965 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
6,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,461 UART:
192,861 UART: Running Caliptra ROM ...
193,994 UART:
603,647 UART: [state] CFI Enabled
617,649 UART: [state] LifecycleState = Unprovisioned
619,478 UART: [state] DebugLocked = No
622,149 UART: [state] WD Timer not started. Device not locked for debugging
625,858 UART: [kat] SHA2-256
804,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,552 UART: [kat] ++
816,998 UART: [kat] sha1
828,850 UART: [kat] SHA2-256
831,850 UART: [kat] SHA2-384
838,260 UART: [kat] SHA2-512-ACC
841,184 UART: [kat] ECC-384
3,282,059 UART: [kat] HMAC-384Kdf
3,294,785 UART: [kat] LMS
3,824,315 UART: [kat] --
3,826,091 UART: [cold-reset] ++
3,827,534 UART: [fht] FHT @ 0x50003400
3,837,173 UART: [idev] ++
3,837,735 UART: [idev] CDI.KEYID = 6
3,838,669 UART: [idev] SUBJECT.KEYID = 7
3,839,822 UART: [idev] UDS.KEYID = 0
3,857,514 UART: [idev] Erasing UDS.KEYID = 0
6,311,996 UART: [idev] Sha1 KeyId Algorithm
6,334,579 UART: [idev] --
6,339,002 UART: [ldev] ++
6,339,572 UART: [ldev] CDI.KEYID = 6
6,340,872 UART: [ldev] SUBJECT.KEYID = 5
6,341,989 UART: [ldev] AUTHORITY.KEYID = 7
6,343,162 UART: [ldev] FE.KEYID = 1
6,352,509 UART: [ldev] Erasing FE.KEYID = 1
8,822,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,398 UART: [ldev] --
10,613,468 UART: [fwproc] Wait for Commands...
10,615,618 UART: [fwproc] Recv command 0x46574c44
10,617,652 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,143 UART:
1,399 UART: Running Caliptra ROM ...
2,497 UART:
9,840,742 UART: [state] CFI Enabled
9,853,764 UART: [state] LifecycleState = Unprovisioned
9,855,616 UART: [state] DebugLocked = No
9,856,887 UART: [state] WD Timer not started. Device not locked for debugging
9,860,572 UART: [kat] SHA2-256
10,039,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,051,273 UART: [kat] ++
10,051,820 UART: [kat] sha1
10,061,149 UART: [kat] SHA2-256
10,064,341 UART: [kat] SHA2-384
10,069,252 UART: [kat] SHA2-512-ACC
10,072,262 UART: [kat] ECC-384
12,515,563 UART: [kat] HMAC-384Kdf
12,528,226 UART: [kat] LMS
13,057,739 UART: [kat] --
13,063,025 UART: [warm-reset] ++
13,063,811 UART: [warm-reset] Prev Cold-Reset failed
13,067,341 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
6,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
6,111 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,445 UART:
192,818 UART: Running Caliptra ROM ...
193,993 UART:
194,141 UART: [state] CFI Enabled
264,320 UART: [state] LifecycleState = Unprovisioned
266,194 UART: [state] DebugLocked = No
268,332 UART: [state] WD Timer not started. Device not locked for debugging
272,208 UART: [kat] SHA2-256
451,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,878 UART: [kat] ++
463,433 UART: [kat] sha1
475,779 UART: [kat] SHA2-256
478,842 UART: [kat] SHA2-384
485,299 UART: [kat] SHA2-512-ACC
488,284 UART: [kat] ECC-384
2,949,412 UART: [kat] HMAC-384Kdf
2,971,953 UART: [kat] LMS
3,501,409 UART: [kat] --
3,504,211 UART: [cold-reset] ++
3,506,409 UART: [fht] FHT @ 0x50003400
3,517,443 UART: [idev] ++
3,518,005 UART: [idev] CDI.KEYID = 6
3,518,984 UART: [idev] SUBJECT.KEYID = 7
3,520,084 UART: [idev] UDS.KEYID = 0
3,543,733 UART: [idev] Erasing UDS.KEYID = 0
6,027,160 UART: [idev] Sha1 KeyId Algorithm
6,050,841 UART: [idev] --
6,053,979 UART: [ldev] ++
6,054,553 UART: [ldev] CDI.KEYID = 6
6,055,468 UART: [ldev] SUBJECT.KEYID = 5
6,056,633 UART: [ldev] AUTHORITY.KEYID = 7
6,057,866 UART: [ldev] FE.KEYID = 1
6,100,212 UART: [ldev] Erasing FE.KEYID = 1
8,605,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,406 UART: [ldev] --
10,412,671 UART: [fwproc] Wait for Commands...
10,415,264 UART: [fwproc] Recv command 0x46574c44
10,417,305 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,165 UART:
1,428 UART: Running Caliptra ROM ...
2,539 UART:
2,697 UART: [state] CFI Enabled
74,151 UART: [state] LifecycleState = Unprovisioned
76,074 UART: [state] DebugLocked = No
78,646 UART: [state] WD Timer not started. Device not locked for debugging
82,491 UART: [kat] SHA2-256
261,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
273,205 UART: [kat] ++
273,741 UART: [kat] sha1
283,706 UART: [kat] SHA2-256
286,764 UART: [kat] SHA2-384
293,544 UART: [kat] SHA2-512-ACC
296,526 UART: [kat] ECC-384
2,755,830 UART: [kat] HMAC-384Kdf
2,781,505 UART: [kat] LMS
3,310,957 UART: [kat] --
3,313,642 UART: [warm-reset] ++
3,314,491 UART: [warm-reset] Prev Cold-Reset failed
3,318,059 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
5,980 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
7,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,404 UART:
192,779 UART: Running Caliptra ROM ...
193,970 UART:
603,368 UART: [state] CFI Enabled
618,864 UART: [state] LifecycleState = Unprovisioned
620,684 UART: [state] DebugLocked = No
622,456 UART: [state] WD Timer not started. Device not locked for debugging
626,711 UART: [kat] SHA2-256
805,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,384 UART: [kat] ++
817,910 UART: [kat] sha1
829,711 UART: [kat] SHA2-256
832,764 UART: [kat] SHA2-384
837,110 UART: [kat] SHA2-512-ACC
840,039 UART: [kat] ECC-384
3,282,961 UART: [kat] HMAC-384Kdf
3,293,888 UART: [kat] LMS
3,823,427 UART: [kat] --
3,828,277 UART: [cold-reset] ++
3,829,285 UART: [fht] FHT @ 0x50003400
3,840,526 UART: [idev] ++
3,841,092 UART: [idev] CDI.KEYID = 6
3,842,080 UART: [idev] SUBJECT.KEYID = 7
3,843,240 UART: [idev] UDS.KEYID = 0
3,858,139 UART: [idev] Erasing UDS.KEYID = 0
6,316,046 UART: [idev] Sha1 KeyId Algorithm
6,339,973 UART: [idev] --
6,345,185 UART: [ldev] ++
6,345,760 UART: [ldev] CDI.KEYID = 6
6,346,828 UART: [ldev] SUBJECT.KEYID = 5
6,347,930 UART: [ldev] AUTHORITY.KEYID = 7
6,349,101 UART: [ldev] FE.KEYID = 1
6,358,880 UART: [ldev] Erasing FE.KEYID = 1
8,832,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,563 UART: [ldev] --
10,620,691 UART: [fwproc] Wait for Commands...
10,623,913 UART: [fwproc] Recv command 0x46574c44
10,626,003 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,185 UART:
1,397 UART: Running Caliptra ROM ...
2,505 UART:
9,836,231 UART: [state] CFI Enabled
9,848,982 UART: [state] LifecycleState = Unprovisioned
9,850,836 UART: [state] DebugLocked = No
9,853,348 UART: [state] WD Timer not started. Device not locked for debugging
9,857,402 UART: [kat] SHA2-256
10,036,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,048,104 UART: [kat] ++
10,048,650 UART: [kat] sha1
10,058,969 UART: [kat] SHA2-256
10,061,995 UART: [kat] SHA2-384
10,069,273 UART: [kat] SHA2-512-ACC
10,072,210 UART: [kat] ECC-384
12,514,594 UART: [kat] HMAC-384Kdf
12,528,213 UART: [kat] LMS
13,057,737 UART: [kat] --
13,063,346 UART: [warm-reset] ++
13,064,137 UART: [warm-reset] Prev Cold-Reset failed
13,068,371 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
6,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,182,241 UART: [idev] Erasing UDS.KEYID = 0
1,199,073 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,368 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,713 UART: [fwproc] Recv command 0x46574c44
1,282,446 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,293,329 UART:
1,293,345 UART: Running Caliptra ROM ...
1,293,753 UART:
1,293,808 UART: [state] CFI Enabled
1,296,284 UART: [state] LifecycleState = Unprovisioned
1,296,939 UART: [state] DebugLocked = No
1,297,569 UART: [state] WD Timer not started. Device not locked for debugging
1,298,790 UART: [kat] SHA2-256
2,102,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,469 UART: [kat] ++
2,106,621 UART: [kat] sha1
2,110,877 UART: [kat] SHA2-256
2,112,817 UART: [kat] SHA2-384
2,115,742 UART: [kat] SHA2-512-ACC
2,117,643 UART: [kat] ECC-384
2,127,476 UART: [kat] HMAC-384Kdf
2,132,036 UART: [kat] LMS
2,380,348 UART: [kat] --
2,381,150 UART: [warm-reset] ++
2,381,418 UART: [warm-reset] Prev Cold-Reset failed
2,382,273 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,712 UART: [kat] ++
895,864 UART: [kat] sha1
900,218 UART: [kat] SHA2-256
902,158 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,532 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,016 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,761 UART: [ldev] Erasing FE.KEYID = 1
1,241,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,081 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,293,594 UART:
1,293,610 UART: Running Caliptra ROM ...
1,294,018 UART:
1,294,160 UART: [state] CFI Enabled
1,296,874 UART: [state] LifecycleState = Unprovisioned
1,297,529 UART: [state] DebugLocked = No
1,298,181 UART: [state] WD Timer not started. Device not locked for debugging
1,299,398 UART: [kat] SHA2-256
2,102,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,077 UART: [kat] ++
2,107,229 UART: [kat] sha1
2,111,513 UART: [kat] SHA2-256
2,113,453 UART: [kat] SHA2-384
2,116,382 UART: [kat] SHA2-512-ACC
2,118,283 UART: [kat] ECC-384
2,128,734 UART: [kat] HMAC-384Kdf
2,133,402 UART: [kat] LMS
2,381,714 UART: [kat] --
2,382,650 UART: [warm-reset] ++
2,382,918 UART: [warm-reset] Prev Cold-Reset failed
2,383,977 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,182,025 UART: [idev] Erasing UDS.KEYID = 0
1,199,321 UART: [idev] Sha1 KeyId Algorithm
1,208,341 UART: [idev] --
1,209,440 UART: [ldev] ++
1,209,608 UART: [ldev] CDI.KEYID = 6
1,209,972 UART: [ldev] SUBJECT.KEYID = 5
1,210,399 UART: [ldev] AUTHORITY.KEYID = 7
1,210,862 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,242,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,348 UART: [ldev] --
1,281,834 UART: [fwproc] Wait for Commands...
1,282,659 UART: [fwproc] Recv command 0x46574c44
1,283,392 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,294,213 UART:
1,294,229 UART: Running Caliptra ROM ...
1,294,637 UART:
1,294,692 UART: [state] CFI Enabled
1,297,560 UART: [state] LifecycleState = Unprovisioned
1,298,215 UART: [state] DebugLocked = No
1,298,735 UART: [state] WD Timer not started. Device not locked for debugging
1,300,080 UART: [kat] SHA2-256
2,103,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,759 UART: [kat] ++
2,107,911 UART: [kat] sha1
2,112,265 UART: [kat] SHA2-256
2,114,205 UART: [kat] SHA2-384
2,116,940 UART: [kat] SHA2-512-ACC
2,118,841 UART: [kat] ECC-384
2,128,704 UART: [kat] HMAC-384Kdf
2,133,116 UART: [kat] LMS
2,381,428 UART: [kat] --
2,382,386 UART: [warm-reset] ++
2,382,654 UART: [warm-reset] Prev Cold-Reset failed
2,383,545 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,002 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,952 UART: [idev] Sha1 KeyId Algorithm
1,208,990 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,443 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,807 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,294,210 UART:
1,294,226 UART: Running Caliptra ROM ...
1,294,634 UART:
1,294,776 UART: [state] CFI Enabled
1,297,652 UART: [state] LifecycleState = Unprovisioned
1,298,307 UART: [state] DebugLocked = No
1,298,841 UART: [state] WD Timer not started. Device not locked for debugging
1,299,966 UART: [kat] SHA2-256
2,103,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,645 UART: [kat] ++
2,107,797 UART: [kat] sha1
2,112,143 UART: [kat] SHA2-256
2,114,083 UART: [kat] SHA2-384
2,116,884 UART: [kat] SHA2-512-ACC
2,118,785 UART: [kat] ECC-384
2,128,160 UART: [kat] HMAC-384Kdf
2,132,830 UART: [kat] LMS
2,381,142 UART: [kat] --
2,382,190 UART: [warm-reset] ++
2,382,458 UART: [warm-reset] Prev Cold-Reset failed
2,383,505 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,142 UART: [kat] SHA2-512-ACC
906,043 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,170,101 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,181 UART: [idev] --
1,208,210 UART: [ldev] ++
1,208,378 UART: [ldev] CDI.KEYID = 6
1,208,742 UART: [ldev] SUBJECT.KEYID = 5
1,209,169 UART: [ldev] AUTHORITY.KEYID = 7
1,209,632 UART: [ldev] FE.KEYID = 1
1,214,662 UART: [ldev] Erasing FE.KEYID = 1
1,240,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,356 UART: [ldev] --
1,279,818 UART: [fwproc] Wait for Commands...
1,280,443 UART: [fwproc] Recv command 0x46574c44
1,281,176 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,292,159 UART:
1,292,175 UART: Running Caliptra ROM ...
1,292,583 UART:
1,292,638 UART: [state] CFI Enabled
1,295,198 UART: [state] LifecycleState = Unprovisioned
1,295,853 UART: [state] DebugLocked = No
1,296,585 UART: [state] WD Timer not started. Device not locked for debugging
1,297,882 UART: [kat] SHA2-256
2,101,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,561 UART: [kat] ++
2,105,713 UART: [kat] sha1
2,109,829 UART: [kat] SHA2-256
2,111,769 UART: [kat] SHA2-384
2,114,348 UART: [kat] SHA2-512-ACC
2,116,249 UART: [kat] ECC-384
2,126,004 UART: [kat] HMAC-384Kdf
2,130,460 UART: [kat] LMS
2,378,772 UART: [kat] --
2,379,608 UART: [warm-reset] ++
2,379,876 UART: [warm-reset] Prev Cold-Reset failed
2,380,909 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,331 UART: [kat] LMS
1,168,643 UART: [kat] --
1,169,474 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,724 UART: [idev] ++
1,172,892 UART: [idev] CDI.KEYID = 6
1,173,253 UART: [idev] SUBJECT.KEYID = 7
1,173,678 UART: [idev] UDS.KEYID = 0
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,198,404 UART: [idev] Sha1 KeyId Algorithm
1,207,454 UART: [idev] --
1,208,555 UART: [ldev] ++
1,208,723 UART: [ldev] CDI.KEYID = 6
1,209,087 UART: [ldev] SUBJECT.KEYID = 5
1,209,514 UART: [ldev] AUTHORITY.KEYID = 7
1,209,977 UART: [ldev] FE.KEYID = 1
1,215,157 UART: [ldev] Erasing FE.KEYID = 1
1,241,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,711 UART: [ldev] --
1,281,137 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 114084 bytes
Initializing fuses
1,293,506 UART:
1,293,522 UART: Running Caliptra ROM ...
1,293,930 UART:
1,294,072 UART: [state] CFI Enabled
1,296,694 UART: [state] LifecycleState = Unprovisioned
1,297,349 UART: [state] DebugLocked = No
1,298,035 UART: [state] WD Timer not started. Device not locked for debugging
1,299,226 UART: [kat] SHA2-256
2,102,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,905 UART: [kat] ++
2,107,057 UART: [kat] sha1
2,111,449 UART: [kat] SHA2-256
2,113,389 UART: [kat] SHA2-384
2,116,068 UART: [kat] SHA2-512-ACC
2,117,969 UART: [kat] ECC-384
2,128,072 UART: [kat] HMAC-384Kdf
2,132,532 UART: [kat] LMS
2,380,844 UART: [kat] --
2,381,764 UART: [warm-reset] ++
2,382,032 UART: [warm-reset] Prev Cold-Reset failed
2,383,015 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
5,901 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,238 UART:
192,617 UART: Running Caliptra ROM ...
193,798 UART:
193,949 UART: [state] CFI Enabled
261,977 UART: [state] LifecycleState = Unprovisioned
264,345 UART: [state] DebugLocked = No
266,534 UART: [state] WD Timer not started. Device not locked for debugging
271,197 UART: [kat] SHA2-256
453,131 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,651 UART: [kat] ++
465,138 UART: [kat] sha1
476,796 UART: [kat] SHA2-256
479,718 UART: [kat] SHA2-384
485,761 UART: [kat] SHA2-512-ACC
488,377 UART: [kat] ECC-384
3,775,905 UART: [kat] HMAC-384Kdf
3,803,714 UART: [kat] LMS
4,876,887 UART: [kat] --
4,882,554 UART: [cold-reset] ++
4,885,131 UART: [fht] FHT @ 0x50003400
4,896,536 UART: [idev] ++
4,897,205 UART: [idev] CDI.KEYID = 6
4,898,362 UART: [idev] SUBJECT.KEYID = 7
4,899,573 UART: [idev] UDS.KEYID = 0
4,929,885 UART: [idev] Erasing UDS.KEYID = 0
8,244,481 UART: [idev] Sha1 KeyId Algorithm
8,266,523 UART: [idev] --
8,270,354 UART: [ldev] ++
8,270,938 UART: [ldev] CDI.KEYID = 6
8,272,047 UART: [ldev] SUBJECT.KEYID = 5
8,273,264 UART: [ldev] AUTHORITY.KEYID = 7
8,274,413 UART: [ldev] FE.KEYID = 1
8,317,073 UART: [ldev] Erasing FE.KEYID = 1
11,654,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,690 UART: [ldev] --
14,038,466 UART: [fwproc] Wait for Commands...
14,041,208 UART: [fwproc] Recv command 0x46574c44
14,043,536 UART: [fwproc] Recv'd Img size: 113760 bytes
18,116,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,192,999 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,261,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,577,117 >>> mbox cmd response: success
18,581,963 UART: [afmc] ++
18,582,552 UART: [afmc] CDI.KEYID = 6
18,583,738 UART: [afmc] SUBJECT.KEYID = 7
18,584,894 UART: [afmc] AUTHORITY.KEYID = 5
21,944,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,246,341 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,262,498 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,278,571 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,294,524 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,317,714 UART: [afmc] --
24,323,846 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,466,956 UART: [cold-reset] --
24,467,813 UART: [state] Locking Datavault
24,468,982 UART: [state] Locking PCR0, PCR1 and PCR31
24,470,512 UART: [state] Locking ICCM
24,471,417 UART: [exit] Launching FMC @ 0x40000130
24,472,838 UART:
24,472,998 UART: Running Caliptra FMC ...
24,474,095 UART:
24,474,253 UART: [state] CFI Enabled
24,475,112 UART: [fht] FMC Alias Private Key: 7
26,742,637 UART: [art] Extend RT PCRs Done
26,743,866 UART: [art] Lock RT PCRs Done
26,745,678 UART: [art] Populate DV Done
26,751,143 UART: [fht] FMC Alias Private Key: 7
26,752,741 UART: [art] Derive CDI
26,753,553 UART: [art] Store in in slot 0x4
26,813,707 UART: [art] Derive Key Pair
26,814,739 UART: [art] Store priv key in slot 0x5
30,107,266 UART: [art] Derive Key Pair - Done
30,120,260 UART: [art] Signing Cert with AUTHO
30,121,553 UART: RITY.KEYID = 7
32,409,126 UART: [art] Erasing AUTHORITY.KEYID = 7
32,410,633 UART: [art] PUB.X = 17DFAC6ECA1958485FB86CCB185F4392F0F31FA41FB9B4B0FE13B3902107A64CF6E0EDF74CA206B5105C4477D7CE918D
32,417,879 UART: [art] PUB.Y = 082F281157A9D5C61F399197E15F3A4F2CF1CC689590F1142FB173C9EC0BBB8F30333DB03DF59D2CC9C79787B4A82CF2
32,425,157 UART: [art] SIG.R = 462EBEC139C3DFD3A0401564AA3FAC47EFC89007111F8D993A5FF5BF4656274D1B9575F9C570AC45545C4B7B98D0523F
32,432,480 UART: [art] SIG.S = B8928C6FE53C50EC0C6E8A65E73628CFF288632610CD3C99D36D5BF0A514D7C3065D548F500B38E74DCE5793080F8A4D
33,737,312 UART: Caliptra RT
33,738,018 UART: [state] CFI Enabled
33,898,031 UART: [rt] RT listening for mailbox commands...
33,901,153 UART:
33,901,323 UART: Running Caliptra ROM ...
33,902,341 UART:
33,902,490 UART: [state] CFI Enabled
33,963,150 UART: [state] LifecycleState = Unprovisioned
33,965,045 UART: [state] DebugLocked = No
33,966,494 UART: [state] WD Timer not started. Device not locked for debugging
33,971,223 UART: [kat] SHA2-256
34,153,165 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,164,676 UART: [kat] ++
34,165,271 UART: [kat] sha1
34,175,030 UART: [kat] SHA2-256
34,178,021 UART: [kat] SHA2-384
34,183,741 UART: [kat] SHA2-512-ACC
34,186,359 UART: [kat] ECC-384
37,474,990 UART: [kat] HMAC-384Kdf
37,502,463 UART: [kat] LMS
38,575,595 UART: [kat] --
38,580,503 UART: [update-reset] ++
42,665,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,668,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
43,048,881 >>> mbox cmd response: success
Initializing fuses
1,125 UART:
1,320 UART: Running Caliptra ROM ...
2,424 UART:
2,575 UART: [state] CFI Enabled
62,994 UART: [state] LifecycleState = Unprovisioned
64,870 UART: [state] DebugLocked = No
66,288 UART: [state] WD Timer not started. Device not locked for debugging
71,205 UART: [kat] SHA2-256
253,105 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
264,661 UART: [kat] ++
265,191 UART: [kat] sha1
276,504 UART: [kat] SHA2-256
279,561 UART: [kat] SHA2-384
284,121 UART: [kat] SHA2-512-ACC
286,743 UART: [kat] ECC-384
3,574,880 UART: [kat] HMAC-384Kdf
3,601,580 UART: [kat] LMS
4,674,702 UART: [kat] --
4,677,532 UART: [warm-reset] ++
4,681,089 UART: [warm-reset] Prev Update Reset failed
4,684,245 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
5,397 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,342,458 >>> mbox cmd response: success
24,022,705 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,166,567 UART:
24,166,964 UART: Running Caliptra FMC ...
24,168,087 UART:
24,168,243 UART: [state] CFI Enabled
24,169,223 UART: [fht] FMC Alias Private Key: 7
26,444,669 UART: [art] Extend RT PCRs Done
26,445,898 UART: [art] Lock RT PCRs Done
26,447,500 UART: [art] Populate DV Done
26,452,762 UART: [fht] FMC Alias Private Key: 7
26,454,455 UART: [art] Derive CDI
26,455,199 UART: [art] Store in in slot 0x4
26,514,972 UART: [art] Derive Key Pair
26,515,968 UART: [art] Store priv key in slot 0x5
29,808,555 UART: [art] Derive Key Pair - Done
29,821,489 UART: [art] Signing Cert with AUTHO
29,822,821 UART: RITY.KEYID = 7
32,109,447 UART: [art] Erasing AUTHORITY.KEYID = 7
32,110,952 UART: [art] PUB.X = 6A4C691A0EE522DC9F0AFA33F42C34BA61BE4AC85D7ACCCBDFA9CE87EDB3FCFE1A0E8D68F4A821C6EBE9BEB0EFA259D6
32,118,265 UART: [art] PUB.Y = B1A45F63A25F7E3BA56C23C7C332015343F9C0F148CC64E10BDE8AC558DE916F79C1A5998DE4144CBA38A97CF1F4C770
32,125,487 UART: [art] SIG.R = 0A497CB5F2A822B7915B3AB352BDA1CF55D591276B9D6611D982BE61312FD45AD92772BBEC4EF710B51FBA84D8E8689C
32,132,944 UART: [art] SIG.S = 4290F9ACC5FC361F2F5B2A4F71063F6BB12B000860CE2B175C8A322F7689D21E5C1E7B6DC6B94551B96FA05BFDFAF1C5
33,438,205 UART: Caliptra RT
33,438,919 UART: [state] CFI Enabled
33,599,431 UART: [rt] RT listening for mailbox commands...
42,646,295 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
17,555 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
192,429 UART:
192,824 UART: Running Caliptra ROM ...
194,009 UART:
603,698 UART: [state] CFI Enabled
621,677 UART: [state] LifecycleState = Unprovisioned
624,050 UART: [state] DebugLocked = No
625,720 UART: [state] WD Timer not started. Device not locked for debugging
630,583 UART: [kat] SHA2-256
812,591 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
824,109 UART: [kat] ++
824,621 UART: [kat] sha1
835,114 UART: [kat] SHA2-256
838,117 UART: [kat] SHA2-384
843,817 UART: [kat] SHA2-512-ACC
846,442 UART: [kat] ECC-384
4,102,905 UART: [kat] HMAC-384Kdf
4,114,932 UART: [kat] LMS
5,188,078 UART: [kat] --
5,193,016 UART: [cold-reset] ++
5,194,900 UART: [fht] FHT @ 0x50003400
5,206,101 UART: [idev] ++
5,206,809 UART: [idev] CDI.KEYID = 6
5,207,910 UART: [idev] SUBJECT.KEYID = 7
5,209,448 UART: [idev] UDS.KEYID = 0
5,226,277 UART: [idev] Erasing UDS.KEYID = 0
8,499,809 UART: [idev] Sha1 KeyId Algorithm
8,523,307 UART: [idev] --
8,528,706 UART: [ldev] ++
8,529,274 UART: [ldev] CDI.KEYID = 6
8,530,504 UART: [ldev] SUBJECT.KEYID = 5
8,532,011 UART: [ldev] AUTHORITY.KEYID = 7
8,533,524 UART: [ldev] FE.KEYID = 1
8,545,332 UART: [ldev] Erasing FE.KEYID = 1
11,832,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,506 UART: [ldev] --
14,199,635 UART: [fwproc] Wait for Commands...
14,202,261 UART: [fwproc] Recv command 0x46574c44
14,204,565 UART: [fwproc] Recv'd Img size: 113760 bytes
18,268,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,344,204 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,412,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,729,564 >>> mbox cmd response: success
18,733,254 UART: [afmc] ++
18,733,845 UART: [afmc] CDI.KEYID = 6
18,734,942 UART: [afmc] SUBJECT.KEYID = 7
18,736,204 UART: [afmc] AUTHORITY.KEYID = 5
22,048,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,342,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,345,006 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,361,181 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,377,221 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,393,202 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,416,124 UART: [afmc] --
24,421,668 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,564,496 UART: [cold-reset] --
24,565,499 UART: [state] Locking Datavault
24,566,569 UART: [state] Locking PCR0, PCR1 and PCR31
24,568,101 UART: [state] Locking ICCM
24,568,991 UART: [exit] Launching FMC @ 0x40000130
24,570,330 UART:
24,570,468 UART: Running Caliptra FMC ...
24,571,557 UART:
24,571,707 UART: [state] CFI Enabled
24,572,559 UART: [fht] FMC Alias Private Key: 7
26,779,833 UART: [art] Extend RT PCRs Done
26,781,055 UART: [art] Lock RT PCRs Done
26,782,597 UART: [art] Populate DV Done
26,788,218 UART: [fht] FMC Alias Private Key: 7
26,789,812 UART: [art] Derive CDI
26,790,543 UART: [art] Store in in slot 0x4
26,833,239 UART: [art] Derive Key Pair
26,834,273 UART: [art] Store priv key in slot 0x5
30,076,679 UART: [art] Derive Key Pair - Done
30,089,574 UART: [art] Signing Cert with AUTHO
30,090,935 UART: RITY.KEYID = 7
32,370,191 UART: [art] Erasing AUTHORITY.KEYID = 7
32,371,696 UART: [art] PUB.X = 714691B2127FE28B5EBF5E7FF5F398293221412D49079337B2FF56F88AC53F876299C9500756A34EFA235883AB9B4743
32,378,946 UART: [art] PUB.Y = 12F2CDCF13DE42E8E07A7DB2C833C08563100594CB7890EF3969D13B414F741CAABC102D4F108A33C4E6EA7506A9E3FA
32,386,179 UART: [art] SIG.R = 38E59D8E9040023BDA977A97CA879BAA00353D30001EBB842782E47B0CBC6BDE3C4F180246B7E2E1327C4A34760FDBAC
32,393,577 UART: [art] SIG.S = 3242359E04AABBD5A5922520F3A0E890A423B72586D9B4A63D5D169D191BAFD575B025517760234266F0685C21593A10
33,698,640 UART: Caliptra RT
33,699,352 UART: [state] CFI Enabled
33,816,357 UART: [rt] RT listening for mailbox commands...
33,819,526 UART:
33,819,771 UART: Running Caliptra ROM ...
33,820,868 UART:
33,821,132 UART: [state] CFI Enabled
33,831,555 UART: [state] LifecycleState = Unprovisioned
33,833,375 UART: [state] DebugLocked = No
33,834,915 UART: [state] WD Timer not started. Device not locked for debugging
33,840,343 UART: [kat] SHA2-256
34,022,280 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,033,836 UART: [kat] ++
34,034,327 UART: [kat] sha1
34,043,755 UART: [kat] SHA2-256
34,046,778 UART: [kat] SHA2-384
34,051,575 UART: [kat] SHA2-512-ACC
34,054,189 UART: [kat] ECC-384
37,310,285 UART: [kat] HMAC-384Kdf
37,321,584 UART: [kat] LMS
38,394,725 UART: [kat] --
38,398,618 UART: [update-reset] ++
42,494,745 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,498,340 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89056
42,879,237 >>> mbox cmd response: success
Initializing fuses
826 UART: [
1,382 UART: Running Caliptra ROM ...
2,485 UART:
412,430 UART: [state] CFI Enabled
426,954 UART: [state] LifecycleState = Unprovisioned
428,777 UART: [state] DebugLocked = No
430,956 UART: [state] WD Timer not started. Device not locked for debugging
436,152 UART: [kat] SHA2-256
618,134 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
629,700 UART: [kat] ++
630,197 UART: [kat] sha1
639,174 UART: [kat] SHA2-256
642,223 UART: [kat] SHA2-384
648,260 UART: [kat] SHA2-512-ACC
650,851 UART: [kat] ECC-384
3,905,779 UART: [kat] HMAC-384Kdf
3,917,707 UART: [kat] LMS
4,990,862 UART: [kat] --
4,997,565 UART: [warm-reset] ++
5,000,305 UART: [warm-reset] Prev Update Reset failed
5,005,991 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
6,254 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,533,464 >>> mbox cmd response: success
24,152,832 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,295,908 UART:
24,296,285 UART: Running Caliptra FMC ...
24,297,486 UART:
24,297,664 UART: [state] CFI Enabled
24,298,615 UART: [fht] FMC Alias Private Key: 7
26,508,523 UART: [art] Extend RT PCRs Done
26,509,749 UART: [art] Lock RT PCRs Done
26,511,324 UART: [art] Populate DV Done
26,516,602 UART: [fht] FMC Alias Private Key: 7
26,518,091 UART: [art] Derive CDI
26,518,860 UART: [art] Store in in slot 0x4
26,561,502 UART: [art] Derive Key Pair
26,562,497 UART: [art] Store priv key in slot 0x5
29,804,014 UART: [art] Derive Key Pair - Done
29,817,078 UART: [art] Signing Cert with AUTHO
29,818,387 UART: RITY.KEYID = 7
32,097,915 UART: [art] Erasing AUTHORITY.KEYID = 7
32,099,428 UART: [art] PUB.X = 302B7DF28EB6C8988ED9C27DA0A0B2220532B88ADDDC8F069D4092D156191E47B8D88C0B927D066A532670A4107BBA0C
32,106,702 UART: [art] PUB.Y = F31B3A3437B1CB9827E7F28A9D833D63150E786E7F7ED4813BD427F1EF7951090D0CD2D7B9FBF8BDD254860046FC839D
32,113,932 UART: [art] SIG.R = A21D6DE583C284A6ECF450ECAD8D6FF642EB271E4405E6BA9D68CC060157EB5D92F6C11ED035A5A7E28D4ACA49BE7E57
32,121,353 UART: [art] SIG.S = D7FA3FC9D32BE12CFC60231B3C1C1F2535C7E0A34B7133635200D619ABAA56CEB3A8F5E208305F7E5535940EE8206B14
33,426,340 UART: Caliptra RT
33,427,038 UART: [state] CFI Enabled
33,544,856 UART: [rt] RT listening for mailbox commands...
42,498,515 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
6,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,383 UART:
192,751 UART: Running Caliptra ROM ...
193,945 UART:
194,093 UART: [state] CFI Enabled
262,815 UART: [state] LifecycleState = Unprovisioned
264,689 UART: [state] DebugLocked = No
266,882 UART: [state] WD Timer not started. Device not locked for debugging
271,410 UART: [kat] SHA2-256
450,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,120 UART: [kat] ++
462,655 UART: [kat] sha1
474,241 UART: [kat] SHA2-256
477,263 UART: [kat] SHA2-384
483,345 UART: [kat] SHA2-512-ACC
486,331 UART: [kat] ECC-384
2,946,261 UART: [kat] HMAC-384Kdf
2,969,571 UART: [kat] LMS
3,499,015 UART: [kat] --
3,504,979 UART: [cold-reset] ++
3,506,412 UART: [fht] FHT @ 0x50003400
3,517,566 UART: [idev] ++
3,518,131 UART: [idev] CDI.KEYID = 6
3,519,013 UART: [idev] SUBJECT.KEYID = 7
3,520,230 UART: [idev] UDS.KEYID = 0
3,541,395 UART: [idev] Erasing UDS.KEYID = 0
6,024,965 UART: [idev] Sha1 KeyId Algorithm
6,047,713 UART: [idev] --
6,052,308 UART: [ldev] ++
6,052,898 UART: [ldev] CDI.KEYID = 6
6,053,788 UART: [ldev] SUBJECT.KEYID = 5
6,055,009 UART: [ldev] AUTHORITY.KEYID = 7
6,056,252 UART: [ldev] FE.KEYID = 1
6,097,865 UART: [ldev] Erasing FE.KEYID = 1
8,600,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,039 UART: [ldev] --
10,412,827 UART: [fwproc] Wait for Commands...
10,415,514 UART: [fwproc] Recv command 0x46574c44
10,417,605 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,978 >>> mbox cmd response: success
14,286,839 UART: [afmc] ++
14,287,423 UART: [afmc] CDI.KEYID = 6
14,288,304 UART: [afmc] SUBJECT.KEYID = 7
14,289,513 UART: [afmc] AUTHORITY.KEYID = 5
16,825,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,461 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,402 UART: [afmc] --
18,626,178 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,769,686 UART: [cold-reset] --
18,770,542 UART: [state] Locking Datavault
18,771,719 UART: [state] Locking PCR0, PCR1 and PCR31
18,773,260 UART: [state] Locking ICCM
18,774,163 UART: [exit] Launching FMC @ 0x40000130
18,775,583 UART:
18,775,736 UART: Running Caliptra FMC ...
18,776,834 UART:
18,776,988 UART: [state] CFI Enabled
18,777,846 UART: [fht] FMC Alias Private Key: 7
20,470,904 UART: [art] Extend RT PCRs Done
20,472,131 UART: [art] Lock RT PCRs Done
20,473,878 UART: [art] Populate DV Done
20,479,183 UART: [fht] FMC Alias Private Key: 7
20,480,662 UART: [art] Derive CDI
20,481,421 UART: [art] Store in in slot 0x4
20,538,600 UART: [art] Derive Key Pair
20,539,601 UART: [art] Store priv key in slot 0x5
23,002,654 UART: [art] Derive Key Pair - Done
23,016,034 UART: [art] Signing Cert with AUTHO
23,017,347 UART: RITY.KEYID = 7
24,727,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,447 UART: [art] PUB.X = 884167B21357B1F9636F7ACC4DFBECE4C15B13D585128F629D153E919AF61AF3017CCCAE0F14C3529E1A4C29080F3D60
24,736,687 UART: [art] PUB.Y = 32526C27F856D9A20D0B463F1D90715958EC341DC14E0692B3AF1867D6519BAAFE143B6431768CB6723A83F8AE0380D4
24,743,970 UART: [art] SIG.R = 478CAFD1B73571008A0D911C8C8319D684D5EA08E22FD4A5DBF48EEA2CD4088D4164E52CC7E5B9981D666DB4744CD4DC
24,751,364 UART: [art] SIG.S = 01814BF4607DF8C7E170312EB96458086AC0678001362D5B251752834EC3D6E2B46112EB64D7F87388E1E4F46EBBFCFC
25,730,311 UART: Caliptra RT
25,731,033 UART: [state] CFI Enabled
25,895,374 UART: [rt] RT listening for mailbox commands...
25,898,440 UART:
25,898,605 UART: Running Caliptra ROM ...
25,899,623 UART:
25,899,768 UART: [state] CFI Enabled
25,964,627 UART: [state] LifecycleState = Unprovisioned
25,966,501 UART: [state] DebugLocked = No
25,969,235 UART: [state] WD Timer not started. Device not locked for debugging
25,972,271 UART: [kat] SHA2-256
26,151,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,162,987 UART: [kat] ++
26,163,527 UART: [kat] sha1
26,174,907 UART: [kat] SHA2-256
26,177,920 UART: [kat] SHA2-384
26,182,714 UART: [kat] SHA2-512-ACC
26,185,655 UART: [kat] ECC-384
28,645,481 UART: [kat] HMAC-384Kdf
28,669,105 UART: [kat] LMS
29,198,569 UART: [kat] --
29,202,175 UART: [update-reset] ++
32,624,292 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,628,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
33,010,385 >>> mbox cmd response: success
Initializing fuses
1,047 UART:
1,243 UART: Running Caliptra ROM ...
2,355 UART:
2,509 UART: [state] CFI Enabled
74,836 UART: [state] LifecycleState = Unprovisioned
76,708 UART: [state] DebugLocked = No
78,758 UART: [state] WD Timer not started. Device not locked for debugging
82,544 UART: [kat] SHA2-256
261,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
273,245 UART: [kat] ++
273,687 UART: [kat] sha1
285,419 UART: [kat] SHA2-256
288,419 UART: [kat] SHA2-384
293,525 UART: [kat] SHA2-512-ACC
296,480 UART: [kat] ECC-384
2,758,573 UART: [kat] HMAC-384Kdf
2,781,809 UART: [kat] LMS
3,311,257 UART: [kat] --
3,315,190 UART: [warm-reset] ++
3,318,469 UART: [warm-reset] Prev Update Reset failed
3,321,071 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
5,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,842 >>> mbox cmd response: success
18,329,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,473,495 UART:
18,473,874 UART: Running Caliptra FMC ...
18,474,996 UART:
18,475,147 UART: [state] CFI Enabled
18,476,111 UART: [fht] FMC Alias Private Key: 7
20,174,185 UART: [art] Extend RT PCRs Done
20,175,410 UART: [art] Lock RT PCRs Done
20,176,903 UART: [art] Populate DV Done
20,182,311 UART: [fht] FMC Alias Private Key: 7
20,183,906 UART: [art] Derive CDI
20,184,658 UART: [art] Store in in slot 0x4
20,243,192 UART: [art] Derive Key Pair
20,244,229 UART: [art] Store priv key in slot 0x5
22,707,331 UART: [art] Derive Key Pair - Done
22,720,605 UART: [art] Signing Cert with AUTHO
22,721,941 UART: RITY.KEYID = 7
24,432,925 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,436 UART: [art] PUB.X = 7CC844D634D2997B818956781222A78B8D706192E533DB355AD651A03385EC6CA657A0B2A95CB9AA527C69535189F523
24,441,682 UART: [art] PUB.Y = 74BAF37A80D00DFEA7BAFE560A2F57EA2ACB3E4B3F6CFFEA70061A51D5D61D01A5B4E1FB6ACFE38F298223B6849B5A7C
24,448,955 UART: [art] SIG.R = 5F93CBB5D44C640B4A8E7C7FCA70F82A0827504DC11030BB31BA5CE818D32B6A4268758821EC8F124C73989F039F2FF6
24,456,348 UART: [art] SIG.S = 0EECBE5604B7613253FB509AF49DCBAE2302A93D7ACD9D92B3B983B62F07961AA2471EC45D4387EDD7505D5F63339C21
25,435,588 UART: Caliptra RT
25,436,290 UART: [state] CFI Enabled
25,601,881 UART: [rt] RT listening for mailbox commands...
32,555,664 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
6,485 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,456 UART:
192,858 UART: Running Caliptra ROM ...
194,270 UART:
603,518 UART: [state] CFI Enabled
615,667 UART: [state] LifecycleState = Unprovisioned
617,542 UART: [state] DebugLocked = No
618,778 UART: [state] WD Timer not started. Device not locked for debugging
623,299 UART: [kat] SHA2-256
802,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,027 UART: [kat] ++
814,482 UART: [kat] sha1
825,086 UART: [kat] SHA2-256
828,147 UART: [kat] SHA2-384
835,045 UART: [kat] SHA2-512-ACC
838,030 UART: [kat] ECC-384
3,279,531 UART: [kat] HMAC-384Kdf
3,291,816 UART: [kat] LMS
3,821,328 UART: [kat] --
3,825,934 UART: [cold-reset] ++
3,827,399 UART: [fht] FHT @ 0x50003400
3,838,386 UART: [idev] ++
3,838,955 UART: [idev] CDI.KEYID = 6
3,839,865 UART: [idev] SUBJECT.KEYID = 7
3,841,076 UART: [idev] UDS.KEYID = 0
3,857,002 UART: [idev] Erasing UDS.KEYID = 0
6,308,568 UART: [idev] Sha1 KeyId Algorithm
6,331,804 UART: [idev] --
6,335,531 UART: [ldev] ++
6,336,101 UART: [ldev] CDI.KEYID = 6
6,337,117 UART: [ldev] SUBJECT.KEYID = 5
6,338,220 UART: [ldev] AUTHORITY.KEYID = 7
6,339,454 UART: [ldev] FE.KEYID = 1
6,349,994 UART: [ldev] Erasing FE.KEYID = 1
8,822,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,749 UART: [ldev] --
10,613,653 UART: [fwproc] Wait for Commands...
10,616,345 UART: [fwproc] Recv command 0x46574c44
10,618,386 UART: [fwproc] Recv'd Img size: 114084 bytes
14,012,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,084,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,153,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,471,046 >>> mbox cmd response: success
14,474,641 UART: [afmc] ++
14,475,226 UART: [afmc] CDI.KEYID = 6
14,476,138 UART: [afmc] SUBJECT.KEYID = 7
14,477,352 UART: [afmc] AUTHORITY.KEYID = 5
16,980,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,719,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,735,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,891 UART: [afmc] --
18,781,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,924,402 UART: [cold-reset] --
18,925,259 UART: [state] Locking Datavault
18,926,410 UART: [state] Locking PCR0, PCR1 and PCR31
18,927,947 UART: [state] Locking ICCM
18,928,857 UART: [exit] Launching FMC @ 0x40000130
18,930,279 UART:
18,930,440 UART: Running Caliptra FMC ...
18,931,535 UART:
18,931,688 UART: [state] CFI Enabled
18,932,570 UART: [fht] FMC Alias Private Key: 7
20,566,426 UART: [art] Extend RT PCRs Done
20,567,649 UART: [art] Lock RT PCRs Done
20,569,214 UART: [art] Populate DV Done
20,574,631 UART: [fht] FMC Alias Private Key: 7
20,576,225 UART: [art] Derive CDI
20,577,036 UART: [art] Store in in slot 0x4
20,619,851 UART: [art] Derive Key Pair
20,620,892 UART: [art] Store priv key in slot 0x5
23,047,573 UART: [art] Derive Key Pair - Done
23,060,307 UART: [art] Signing Cert with AUTHO
23,061,610 UART: RITY.KEYID = 7
24,767,176 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,679 UART: [art] PUB.X = 4E090EE720DB7385EEE6FBFC4AC3FB3F0197E3CE5B95CFEBB8B2A64D65386FB37369CB9C35A6884A8F901AFEB726DE74
24,775,987 UART: [art] PUB.Y = 3FB1A53EE582E2A0B69D815EBDD4A03747E8C9FE58680EB9A532C4A641137B9A4FE64B9ABEC99A0DCD1833B22852BC05
24,783,273 UART: [art] SIG.R = B65004AD0D627F6966D5258F47B6067714C0CFD7090B8FC4AA2B645C92C81DAF09C099DFC4E57F9D5B1484F821FAD793
24,790,687 UART: [art] SIG.S = 0CA5B2B19C8C725DE94411425AAD7F03C7BC44A1F7A586EEE634671B81B7D23957D52FF358B0296547AEA60A9A7081E2
25,769,188 UART: Caliptra RT
25,769,887 UART: [state] CFI Enabled
25,886,796 UART: [rt] RT listening for mailbox commands...
25,889,751 UART:
25,889,918 UART: Running Caliptra ROM ...
25,891,025 UART:
25,891,295 UART: [state] CFI Enabled
25,905,719 UART: [state] LifecycleState = Unprovisioned
25,907,554 UART: [state] DebugLocked = No
25,910,552 UART: [state] WD Timer not started. Device not locked for debugging
25,914,012 UART: [kat] SHA2-256
26,093,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,104,789 UART: [kat] ++
26,105,324 UART: [kat] sha1
26,115,996 UART: [kat] SHA2-256
26,119,008 UART: [kat] SHA2-384
26,124,845 UART: [kat] SHA2-512-ACC
26,127,788 UART: [kat] ECC-384
28,566,626 UART: [kat] HMAC-384Kdf
28,580,144 UART: [kat] LMS
29,109,643 UART: [kat] --
29,113,250 UART: [update-reset] ++
32,533,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,536,898 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
32,918,950 >>> mbox cmd response: success
Initializing fuses
727 UART: [upda
1,271 UART: Running Caliptra ROM ...
2,297 UART:
7,654,147 UART: [state] CFI Enabled
7,665,910 UART: [state] LifecycleState = Unprovisioned
7,667,776 UART: [state] DebugLocked = No
7,669,349 UART: [state] WD Timer not started. Device not locked for debugging
7,672,706 UART: [kat] SHA2-256
7,851,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,863,454 UART: [kat] ++
7,863,911 UART: [kat] sha1
7,875,552 UART: [kat] SHA2-256
7,878,573 UART: [kat] SHA2-384
7,884,934 UART: [kat] SHA2-512-ACC
7,887,923 UART: [kat] ECC-384
10,330,854 UART: [kat] HMAC-384Kdf
10,342,906 UART: [kat] LMS
10,872,355 UART: [kat] --
10,877,144 UART: [warm-reset] ++
10,879,156 UART: [warm-reset] Prev Update Reset failed
10,882,147 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
6,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,276,040 >>> mbox cmd response: success
18,513,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,656,567 UART:
18,656,937 UART: Running Caliptra FMC ...
18,658,131 UART:
18,658,326 UART: [state] CFI Enabled
18,659,291 UART: [fht] FMC Alias Private Key: 7
20,293,647 UART: [art] Extend RT PCRs Done
20,294,884 UART: [art] Lock RT PCRs Done
20,296,369 UART: [art] Populate DV Done
20,301,781 UART: [fht] FMC Alias Private Key: 7
20,303,483 UART: [art] Derive CDI
20,304,502 UART: [art] Store in in slot 0x4
20,347,001 UART: [art] Derive Key Pair
20,348,010 UART: [art] Store priv key in slot 0x5
22,774,327 UART: [art] Derive Key Pair - Done
22,787,041 UART: [art] Signing Cert with AUTHO
22,788,366 UART: RITY.KEYID = 7
24,493,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,391 UART: [art] PUB.X = F906A3EA0B4DCEA8AECC426C432C2C64BF5BB4BF80E63AD3B5674F47AE5DE0BAA50772BC6E6A823453AF715748029989
24,502,707 UART: [art] PUB.Y = C212BF40BDC9394FFE6FE28C874E3E68427B62AD59A7CD980DF2142B873CB286D57058F935A473D03F727607BDF41EBE
24,509,944 UART: [art] SIG.R = 1E2D59AD19B8FAF6C9CCF12AC5E1527D142458DFABEE78892C00AC310A5149E479F681EE27E5DAA3225267491E920EF2
24,517,340 UART: [art] SIG.S = 4EAE226610716967919481E4FD95A3CAF00264A7DA604202389BCD596F2069497E69996451F4B22A0F88424A471F3920
25,496,302 UART: Caliptra RT
25,497,001 UART: [state] CFI Enabled
25,613,539 UART: [rt] RT listening for mailbox commands...
32,504,275 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
5,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,198 UART:
192,587 UART: Running Caliptra ROM ...
193,708 UART:
193,856 UART: [state] CFI Enabled
266,055 UART: [state] LifecycleState = Unprovisioned
267,925 UART: [state] DebugLocked = No
270,359 UART: [state] WD Timer not started. Device not locked for debugging
274,895 UART: [kat] SHA2-256
454,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,617 UART: [kat] ++
466,059 UART: [kat] sha1
477,639 UART: [kat] SHA2-256
480,691 UART: [kat] SHA2-384
486,938 UART: [kat] SHA2-512-ACC
489,922 UART: [kat] ECC-384
2,949,002 UART: [kat] HMAC-384Kdf
2,971,127 UART: [kat] LMS
3,500,585 UART: [kat] --
3,504,761 UART: [cold-reset] ++
3,506,103 UART: [fht] FHT @ 0x50003400
3,517,024 UART: [idev] ++
3,517,589 UART: [idev] CDI.KEYID = 6
3,518,604 UART: [idev] SUBJECT.KEYID = 7
3,519,702 UART: [idev] UDS.KEYID = 0
3,542,808 UART: [idev] Erasing UDS.KEYID = 0
6,029,457 UART: [idev] Sha1 KeyId Algorithm
6,052,800 UART: [idev] --
6,055,662 UART: [ldev] ++
6,056,236 UART: [ldev] CDI.KEYID = 6
6,057,150 UART: [ldev] SUBJECT.KEYID = 5
6,058,314 UART: [ldev] AUTHORITY.KEYID = 7
6,059,545 UART: [ldev] FE.KEYID = 1
6,099,407 UART: [ldev] Erasing FE.KEYID = 1
8,602,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,539 UART: [ldev] --
10,409,724 UART: [fwproc] Wait for Commands...
10,412,200 UART: [fwproc] Recv command 0x46574c44
10,414,245 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,411 >>> mbox cmd response: success
14,274,255 UART: [afmc] ++
14,274,840 UART: [afmc] CDI.KEYID = 6
14,275,750 UART: [afmc] SUBJECT.KEYID = 7
14,276,908 UART: [afmc] AUTHORITY.KEYID = 5
16,805,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,198 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,049 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,036 UART: [afmc] --
18,607,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,750,858 UART: [cold-reset] --
18,751,718 UART: [state] Locking Datavault
18,752,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,415 UART: [state] Locking ICCM
18,755,317 UART: [exit] Launching FMC @ 0x40000130
18,756,737 UART:
18,756,897 UART: Running Caliptra FMC ...
18,757,990 UART:
18,758,161 UART: [state] CFI Enabled
18,759,023 UART: [fht] FMC Alias Private Key: 7
20,452,645 UART: [art] Extend RT PCRs Done
20,453,853 UART: [art] Lock RT PCRs Done
20,454,993 UART: [art] Populate DV Done
20,460,626 UART: [fht] FMC Alias Private Key: 7
20,462,164 UART: [art] Derive CDI
20,462,976 UART: [art] Store in in slot 0x4
20,520,754 UART: [art] Derive Key Pair
20,521,794 UART: [art] Store priv key in slot 0x5
22,985,028 UART: [art] Derive Key Pair - Done
22,998,465 UART: [art] Signing Cert with AUTHO
22,999,770 UART: RITY.KEYID = 7
24,711,002 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,490 UART: [art] PUB.X = 55ACCC5A5180EDBAC998265301265657CFA13557F6667040BB8B1248CCAD9B2379A19918059306033F5B67FC1C87AC6B
24,719,786 UART: [art] PUB.Y = 1D845D945B39790E00F7A1E4CF3383992144638023A79A8044BAEE94F94060041FCFFB489AC6E0A6DF73930D77312507
24,726,985 UART: [art] SIG.R = C6D62D60736C4FECDB7FDE73BAF4686E4EDFCDB73FEB8FAFAE8E34C1164BAC4F3FC3F417F8B3E655AB50FD339067C019
24,734,435 UART: [art] SIG.S = 292EC72A45D8D93F2968C5529A8520011932BB484E9D8933470BA783E5F725A1003D82E41DA7519AF8B59FD2019C361E
25,712,980 UART: Caliptra RT
25,713,695 UART: [state] CFI Enabled
25,878,839 UART: [rt] RT listening for mailbox commands...
25,881,907 UART:
25,882,155 UART: Running Caliptra ROM ...
25,883,203 UART:
25,883,351 UART: [state] CFI Enabled
25,942,917 UART: [state] LifecycleState = Unprovisioned
25,944,833 UART: [state] DebugLocked = No
25,947,139 UART: [state] WD Timer not started. Device not locked for debugging
25,951,744 UART: [kat] SHA2-256
26,130,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,142,462 UART: [kat] ++
26,143,001 UART: [kat] sha1
26,153,917 UART: [kat] SHA2-256
26,156,993 UART: [kat] SHA2-384
26,163,351 UART: [kat] SHA2-512-ACC
26,166,293 UART: [kat] ECC-384
28,629,443 UART: [kat] HMAC-384Kdf
28,653,656 UART: [kat] LMS
29,183,101 UART: [kat] --
29,187,326 UART: [update-reset] ++
32,604,435 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,607,058 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
32,989,078 >>> mbox cmd response: success
Initializing fuses
813 UART: [
1,306 UART: Running Caliptra ROM ...
2,406 UART:
2,561 UART: [state] CFI Enabled
74,746 UART: [state] LifecycleState = Unprovisioned
76,615 UART: [state] DebugLocked = No
79,128 UART: [state] WD Timer not started. Device not locked for debugging
83,575 UART: [kat] SHA2-256
262,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
274,262 UART: [kat] ++
274,708 UART: [kat] sha1
284,769 UART: [kat] SHA2-256
287,824 UART: [kat] SHA2-384
294,392 UART: [kat] SHA2-512-ACC
297,322 UART: [kat] ECC-384
2,762,409 UART: [kat] HMAC-384Kdf
2,785,112 UART: [kat] LMS
3,314,567 UART: [kat] --
3,317,961 UART: [warm-reset] ++
3,318,968 UART: [warm-reset] Prev Update Reset failed
3,323,213 UART: ROM Fatal Error: 0x01040011test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
5,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,040,848 >>> mbox cmd response: success
18,306,394 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,450,116 UART:
18,450,496 UART: Running Caliptra FMC ...
18,451,707 UART:
18,451,883 UART: [state] CFI Enabled
18,452,757 UART: [fht] FMC Alias Private Key: 7
20,153,986 UART: [art] Extend RT PCRs Done
20,155,212 UART: [art] Lock RT PCRs Done
20,156,626 UART: [art] Populate DV Done
20,162,091 UART: [fht] FMC Alias Private Key: 7
20,163,636 UART: [art] Derive CDI
20,164,457 UART: [art] Store in in slot 0x4
20,221,920 UART: [art] Derive Key Pair
20,222,955 UART: [art] Store priv key in slot 0x5
22,685,562 UART: [art] Derive Key Pair - Done
22,698,347 UART: [art] Signing Cert with AUTHO
22,699,649 UART: RITY.KEYID = 7
24,411,573 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,075 UART: [art] PUB.X = 54376F9B88922CC6258B90FC739D68F7CB972F2941A5E5B13625C96C169D20C3ED847110D03AD6A5DC67C3549D84B997
24,420,319 UART: [art] PUB.Y = D449EC41B4DF4E73919A48ADEDA3B5903E9723FBC19F76C6F01677D34BC29FC65049D6BB49B1D93307E4054D039A052B
24,427,595 UART: [art] SIG.R = C1019E50A3936AED62C5D579C6FF094DF7ACE01350CAE30937A6CF2B726EDB5FC323030C16FD3904515F5138E14CA623
24,435,125 UART: [art] SIG.S = 4A02F52AD84DCD78DE6CB37BD15E8F3C84145C068629B911535FE3141463F206909990DF5A082194A465D512965FFB2D
25,413,720 UART: Caliptra RT
25,414,435 UART: [state] CFI Enabled
25,580,929 UART: [rt] RT listening for mailbox commands...
32,565,141 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
6,515 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
192,369 UART:
192,746 UART: Running Caliptra ROM ...
193,849 UART:
603,311 UART: [state] CFI Enabled
615,626 UART: [state] LifecycleState = Unprovisioned
617,462 UART: [state] DebugLocked = No
620,024 UART: [state] WD Timer not started. Device not locked for debugging
624,500 UART: [kat] SHA2-256
803,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,209 UART: [kat] ++
815,745 UART: [kat] sha1
826,143 UART: [kat] SHA2-256
829,193 UART: [kat] SHA2-384
834,407 UART: [kat] SHA2-512-ACC
837,332 UART: [kat] ECC-384
3,275,282 UART: [kat] HMAC-384Kdf
3,286,902 UART: [kat] LMS
3,816,367 UART: [kat] --
3,820,458 UART: [cold-reset] ++
3,822,818 UART: [fht] FHT @ 0x50003400
3,834,977 UART: [idev] ++
3,835,534 UART: [idev] CDI.KEYID = 6
3,836,468 UART: [idev] SUBJECT.KEYID = 7
3,837,674 UART: [idev] UDS.KEYID = 0
3,850,909 UART: [idev] Erasing UDS.KEYID = 0
6,307,808 UART: [idev] Sha1 KeyId Algorithm
6,329,689 UART: [idev] --
6,333,755 UART: [ldev] ++
6,334,327 UART: [ldev] CDI.KEYID = 6
6,335,209 UART: [ldev] SUBJECT.KEYID = 5
6,336,420 UART: [ldev] AUTHORITY.KEYID = 7
6,337,721 UART: [ldev] FE.KEYID = 1
6,348,051 UART: [ldev] Erasing FE.KEYID = 1
8,822,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,713 UART: [ldev] --
10,609,783 UART: [fwproc] Wait for Commands...
10,612,475 UART: [fwproc] Recv command 0x46574c44
10,614,563 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,478,945 >>> mbox cmd response: success
14,483,909 UART: [afmc] ++
14,484,515 UART: [afmc] CDI.KEYID = 6
14,485,396 UART: [afmc] SUBJECT.KEYID = 7
14,486,552 UART: [afmc] AUTHORITY.KEYID = 5
16,986,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,269 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,158 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,270 UART: [afmc] --
18,784,334 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,927,719 UART: [cold-reset] --
18,928,575 UART: [state] Locking Datavault
18,929,725 UART: [state] Locking PCR0, PCR1 and PCR31
18,931,261 UART: [state] Locking ICCM
18,932,168 UART: [exit] Launching FMC @ 0x40000130
18,933,606 UART:
18,933,769 UART: Running Caliptra FMC ...
18,934,863 UART:
18,935,019 UART: [state] CFI Enabled
18,935,884 UART: [fht] FMC Alias Private Key: 7
20,569,629 UART: [art] Extend RT PCRs Done
20,570,857 UART: [art] Lock RT PCRs Done
20,572,884 UART: [art] Populate DV Done
20,578,190 UART: [fht] FMC Alias Private Key: 7
20,579,828 UART: [art] Derive CDI
20,580,562 UART: [art] Store in in slot 0x4
20,623,318 UART: [art] Derive Key Pair
20,624,312 UART: [art] Store priv key in slot 0x5
23,051,025 UART: [art] Derive Key Pair - Done
23,063,918 UART: [art] Signing Cert with AUTHO
23,065,215 UART: RITY.KEYID = 7
24,770,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,477 UART: [art] PUB.X = B2EBAC85A07A2F687420FA7D24246AB91DD2662A98286DE858DFB8899B0698F67C3EFBDAB07571F39FD310BF66FA5DBE
24,779,730 UART: [art] PUB.Y = D34FFC740171E2A519AAD2398B91BEE4F488FD063AFDB5C9787744A7BB5AB34F103A11A5B925302FA8DF015EA694B4EA
24,787,024 UART: [art] SIG.R = 632A60BABABC413166C36C4C680CC72071F4D81CC173D53216F1B51AD26A221C5A80DC93C20B07A06850C8E666E7B643
24,794,420 UART: [art] SIG.S = 135150632A90E67D0FF2C8C6CFF502C350A489CA8D27E0EBB961091471FEA63BBE2A402FA76C4A7E4FDFC4471E8426DB
25,773,240 UART: Caliptra RT
25,773,954 UART: [state] CFI Enabled
25,891,937 UART: [rt] RT listening for mailbox commands...
25,895,216 UART:
25,895,461 UART: Running Caliptra ROM ...
25,896,563 UART:
25,896,772 UART: [state] CFI Enabled
25,910,702 UART: [state] LifecycleState = Unprovisioned
25,912,523 UART: [state] DebugLocked = No
25,914,269 UART: [state] WD Timer not started. Device not locked for debugging
25,917,134 UART: [kat] SHA2-256
26,096,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,107,922 UART: [kat] ++
26,108,458 UART: [kat] sha1
26,120,968 UART: [kat] SHA2-256
26,124,026 UART: [kat] SHA2-384
26,131,033 UART: [kat] SHA2-512-ACC
26,133,981 UART: [kat] ECC-384
28,575,920 UART: [kat] HMAC-384Kdf
28,588,525 UART: [kat] LMS
29,118,018 UART: [kat] --
29,123,370 UART: [update-reset] ++
32,554,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,557,070 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
32,939,120 >>> mbox cmd response: success
Initializing fuses
1,055 UART:
1,325 UART: Running Caliptra ROM ...
2,429 UART:
7,643,409 UART: [state] CFI Enabled
7,659,592 UART: [state] LifecycleState = Unprovisioned
7,661,496 UART: [state] DebugLocked = No
7,663,741 UART: [state] WD Timer not started. Device not locked for debugging
7,668,017 UART: [kat] SHA2-256
7,847,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,858,828 UART: [kat] ++
7,859,400 UART: [kat] sha1
7,870,112 UART: [kat] SHA2-256
7,873,192 UART: [kat] SHA2-384
7,880,094 UART: [kat] SHA2-512-ACC
7,883,086 UART: [kat] ECC-384
10,324,052 UART: [kat] HMAC-384Kdf
10,337,574 UART: [kat] LMS
10,867,056 UART: [kat] --
10,872,011 UART: [warm-reset] ++
10,875,230 UART: [warm-reset] Prev Update Reset failed
10,877,398 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
6,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,279,266 >>> mbox cmd response: success
18,517,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,660,949 UART:
18,661,335 UART: Running Caliptra FMC ...
18,662,533 UART:
18,662,714 UART: [state] CFI Enabled
18,663,670 UART: [fht] FMC Alias Private Key: 7
20,299,354 UART: [art] Extend RT PCRs Done
20,300,592 UART: [art] Lock RT PCRs Done
20,302,143 UART: [art] Populate DV Done
20,307,581 UART: [fht] FMC Alias Private Key: 7
20,309,076 UART: [art] Derive CDI
20,309,844 UART: [art] Store in in slot 0x4
20,352,386 UART: [art] Derive Key Pair
20,353,384 UART: [art] Store priv key in slot 0x5
22,779,809 UART: [art] Derive Key Pair - Done
22,792,821 UART: [art] Signing Cert with AUTHO
22,794,131 UART: RITY.KEYID = 7
24,499,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,251 UART: [art] PUB.X = 08EE1680DD1CA7EEED4B87D63068CB5D5F4A211765F025A0530B14DE2A175A60E15B271AEF3388E1E805D92D8ECDD975
24,508,520 UART: [art] PUB.Y = FCE3DF9108A6DBCD45C12B3C637A62558D0ABF6EBE34AD1BF6B15BB1BC50BFE6679BF1C6C977AC09CD2F18FF6C0EB192
24,515,804 UART: [art] SIG.R = 8C104B38516ECE888D6BF9FBAD9D34C569FFFBDE4544E01FD7D1FA4C868F24248EC72836520927CAB4E12625457FAE64
24,523,221 UART: [art] SIG.S = C925D4007585DAEB6C744BAED7312A52F2BF43AFBEECB3F3DCFEEB0CA28548CC5FE5CA6DB172662D3311BD984BF81F1E
25,502,361 UART: Caliptra RT
25,503,071 UART: [state] CFI Enabled
25,621,197 UART: [rt] RT listening for mailbox commands...
32,516,538 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,375 UART: [kat] SHA2-256
901,315 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,509 UART: [idev] ++
1,172,677 UART: [idev] CDI.KEYID = 6
1,173,038 UART: [idev] SUBJECT.KEYID = 7
1,173,463 UART: [idev] UDS.KEYID = 0
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,361 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,240,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,708 UART: [ldev] --
1,280,024 UART: [fwproc] Wait for Commands...
1,280,633 UART: [fwproc] Recv command 0x46574c44
1,281,366 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,413 >>> mbox cmd response: success
2,768,666 UART: [afmc] ++
2,768,834 UART: [afmc] CDI.KEYID = 6
2,769,197 UART: [afmc] SUBJECT.KEYID = 7
2,769,623 UART: [afmc] AUTHORITY.KEYID = 5
2,805,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,283 UART: [afmc] --
2,848,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,848,213 UART: [cold-reset] --
2,849,003 UART: [state] Locking Datavault
2,850,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,680 UART: [state] Locking ICCM
2,851,302 UART: [exit] Launching FMC @ 0x40000130
2,856,631 UART:
2,856,647 UART: Running Caliptra FMC ...
2,857,055 UART:
2,857,109 UART: [state] CFI Enabled
2,867,672 UART: [fht] FMC Alias Private Key: 7
2,976,187 UART: [art] Extend RT PCRs Done
2,976,615 UART: [art] Lock RT PCRs Done
2,977,919 UART: [art] Populate DV Done
2,985,796 UART: [fht] FMC Alias Private Key: 7
2,986,978 UART: [art] Derive CDI
2,987,258 UART: [art] Store in in slot 0x4
3,072,869 UART: [art] Derive Key Pair
3,073,229 UART: [art] Store priv key in slot 0x5
3,085,849 UART: [art] Derive Key Pair - Done
3,100,634 UART: [art] Signing Cert with AUTHO
3,101,114 UART: RITY.KEYID = 7
3,115,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,759 UART: [art] PUB.X = FDE26BFD61B7AF973D5C91EBD232D508FBB4F5B77A36486B530E343D80F2BA4473A56AD67A2E25551D70FF6E8C82879E
3,123,537 UART: [art] PUB.Y = 21589A5F50F58620F43BD8990FB23F73DE791A6D92F675F2CA3B075BBAAC5C161CE876972A8E2AD4127DEA9D8552450B
3,130,486 UART: [art] SIG.R = 882E0FE048515AF33A4F7B729640F36C3D9DF96C1AA17FADFAB82BA1BEB64947449F64C9AE1432B50E73F3B1A8BDF745
3,137,266 UART: [art] SIG.S = F031A93356CFA6B7F26637D94E3FE5E75CF6ED57330433055FF08EAA8BE06E3395DE91109B92B38921D8926F2A41B68B
3,161,249 UART: Caliptra RT
3,161,502 UART: [state] CFI Enabled
3,269,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,608 UART:
3,270,624 UART: Running Caliptra ROM ...
3,271,032 UART:
3,271,087 UART: [state] CFI Enabled
3,273,625 UART: [state] LifecycleState = Unprovisioned
3,274,280 UART: [state] DebugLocked = No
3,274,900 UART: [state] WD Timer not started. Device not locked for debugging
3,276,136 UART: [kat] SHA2-256
4,079,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,083,815 UART: [kat] ++
4,083,967 UART: [kat] sha1
4,088,371 UART: [kat] SHA2-256
4,090,311 UART: [kat] SHA2-384
4,092,964 UART: [kat] SHA2-512-ACC
4,094,864 UART: [kat] ECC-384
4,104,699 UART: [kat] HMAC-384Kdf
4,109,221 UART: [kat] LMS
4,357,533 UART: [kat] --
4,358,193 UART: [update-reset] ++
5,667,874 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,668,873 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,818,325 >>> mbox cmd response: success
Initializing fuses
5,818,637 UART:
5,818,653 UART: Running Caliptra ROM ...
5,819,061 UART:
5,819,116 UART: [state] CFI Enabled
5,822,110 UART: [state] LifecycleState = Unprovisioned
5,822,765 UART: [state] DebugLocked = No
5,823,467 UART: [state] WD Timer not started. Device not locked for debugging
5,824,808 UART: [kat] SHA2-256
6,628,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,632,487 UART: [kat] ++
6,632,639 UART: [kat] sha1
6,636,731 UART: [kat] SHA2-256
6,638,671 UART: [kat] SHA2-384
6,641,576 UART: [kat] SHA2-512-ACC
6,643,477 UART: [kat] ECC-384
6,653,526 UART: [kat] HMAC-384Kdf
6,658,204 UART: [kat] LMS
6,906,516 UART: [kat] --
6,907,448 UART: [warm-reset] ++
6,907,967 UART: [warm-reset] Prev Update Reset failed
6,909,078 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,887 >>> mbox cmd response: success
2,674,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,680,173 UART:
2,680,189 UART: Running Caliptra FMC ...
2,680,597 UART:
2,680,651 UART: [state] CFI Enabled
2,691,334 UART: [fht] FMC Alias Private Key: 7
2,798,705 UART: [art] Extend RT PCRs Done
2,799,133 UART: [art] Lock RT PCRs Done
2,800,665 UART: [art] Populate DV Done
2,809,304 UART: [fht] FMC Alias Private Key: 7
2,810,410 UART: [art] Derive CDI
2,810,690 UART: [art] Store in in slot 0x4
2,896,287 UART: [art] Derive Key Pair
2,896,647 UART: [art] Store priv key in slot 0x5
2,910,017 UART: [art] Derive Key Pair - Done
2,924,512 UART: [art] Signing Cert with AUTHO
2,924,992 UART: RITY.KEYID = 7
2,940,150 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,915 UART: [art] PUB.X = 9D0810AABCBFE4E545057F739C5050965F527DCBCF0B99AA5DD07788F952C4E0CFFF4A08733BB71F7E2AF9217E4E79DC
2,947,691 UART: [art] PUB.Y = 3123738845FB51C9E249339D1E0E063AC07BB298D0B6F9D29D49201B793AEF2950CA4D8DD76BA3409D063B6E2B1ECE38
2,954,638 UART: [art] SIG.R = 5BCFA234BFE311DA388C80F41EA9A7466F8C27D0F557BC4D742B58532101B2CD203BA516A5D589ABDB20FC4FCA323CB1
2,961,423 UART: [art] SIG.S = 726BB665467599DE87F0028FA6A449DCCEBFE892C8695D3EFAAF6F5674F0D75E6A263869139F218693D22E7373C6F295
2,985,121 UART: Caliptra RT
2,985,374 UART: [state] CFI Enabled
3,092,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,523,471 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
891,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,911 UART: [kat] HMAC-384Kdf
921,737 UART: [kat] LMS
1,170,049 UART: [kat] --
1,170,994 UART: [cold-reset] ++
1,171,540 UART: [fht] FHT @ 0x50003400
1,174,350 UART: [idev] ++
1,174,518 UART: [idev] CDI.KEYID = 6
1,174,879 UART: [idev] SUBJECT.KEYID = 7
1,175,304 UART: [idev] UDS.KEYID = 0
1,183,204 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,541 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,511 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,989 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,074 >>> mbox cmd response: success
2,771,161 UART: [afmc] ++
2,771,329 UART: [afmc] CDI.KEYID = 6
2,771,692 UART: [afmc] SUBJECT.KEYID = 7
2,772,118 UART: [afmc] AUTHORITY.KEYID = 5
2,808,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,358 UART: [afmc] --
2,851,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,851,398 UART: [cold-reset] --
2,852,336 UART: [state] Locking Datavault
2,853,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,055 UART: [state] Locking ICCM
2,854,593 UART: [exit] Launching FMC @ 0x40000130
2,859,922 UART:
2,859,938 UART: Running Caliptra FMC ...
2,860,346 UART:
2,860,489 UART: [state] CFI Enabled
2,870,914 UART: [fht] FMC Alias Private Key: 7
2,978,947 UART: [art] Extend RT PCRs Done
2,979,375 UART: [art] Lock RT PCRs Done
2,981,081 UART: [art] Populate DV Done
2,989,240 UART: [fht] FMC Alias Private Key: 7
2,990,182 UART: [art] Derive CDI
2,990,462 UART: [art] Store in in slot 0x4
3,076,031 UART: [art] Derive Key Pair
3,076,391 UART: [art] Store priv key in slot 0x5
3,089,003 UART: [art] Derive Key Pair - Done
3,103,535 UART: [art] Signing Cert with AUTHO
3,104,015 UART: RITY.KEYID = 7
3,119,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,806 UART: [art] PUB.X = 9E8A9571B83C450B8A917D0089F61BBAB2214644DF01A566B7948D5C82E0C2B4B0F83C522ABC18722CD11BBFC5AAC375
3,126,558 UART: [art] PUB.Y = B1F4A9F05B9593712499860C158D4F774D1276925CAABFFD6CDF4C0C53E2F50B938200BFD50A11D38FE026D6446CB9FA
3,133,484 UART: [art] SIG.R = C98F2844B65683FF037E342200C570792692B9A8AAC46CEA6CEB6933C22271D8F85789310B39266ACA8D6FC8086789D1
3,140,219 UART: [art] SIG.S = 4D213FAB9791BFA862C5DDDDA2999DCFC28622AC6FA4961B40CA4BA32281D579FEFACD2BAF9331C62DD924626E9AF26B
3,164,256 UART: Caliptra RT
3,164,601 UART: [state] CFI Enabled
3,273,198 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,428 UART:
3,275,444 UART: Running Caliptra ROM ...
3,275,852 UART:
3,275,994 UART: [state] CFI Enabled
3,278,636 UART: [state] LifecycleState = Unprovisioned
3,279,291 UART: [state] DebugLocked = No
3,280,009 UART: [state] WD Timer not started. Device not locked for debugging
3,281,339 UART: [kat] SHA2-256
4,084,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,018 UART: [kat] ++
4,089,170 UART: [kat] sha1
4,093,516 UART: [kat] SHA2-256
4,095,456 UART: [kat] SHA2-384
4,098,239 UART: [kat] SHA2-512-ACC
4,100,139 UART: [kat] ECC-384
4,109,928 UART: [kat] HMAC-384Kdf
4,114,442 UART: [kat] LMS
4,362,754 UART: [kat] --
4,363,692 UART: [update-reset] ++
5,672,969 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,674,176 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,823,628 >>> mbox cmd response: success
Initializing fuses
5,823,974 UART:
5,823,990 UART: Running Caliptra ROM ...
5,824,398 UART:
5,824,540 UART: [state] CFI Enabled
5,827,316 UART: [state] LifecycleState = Unprovisioned
5,827,971 UART: [state] DebugLocked = No
5,828,567 UART: [state] WD Timer not started. Device not locked for debugging
5,829,738 UART: [kat] SHA2-256
6,633,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,637,417 UART: [kat] ++
6,637,569 UART: [kat] sha1
6,641,907 UART: [kat] SHA2-256
6,643,847 UART: [kat] SHA2-384
6,646,774 UART: [kat] SHA2-512-ACC
6,648,675 UART: [kat] ECC-384
6,658,626 UART: [kat] HMAC-384Kdf
6,663,454 UART: [kat] LMS
6,911,766 UART: [kat] --
6,912,830 UART: [warm-reset] ++
6,913,451 UART: [warm-reset] Prev Update Reset failed
6,914,504 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,662 >>> mbox cmd response: success
2,676,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,682,612 UART:
2,682,628 UART: Running Caliptra FMC ...
2,683,036 UART:
2,683,179 UART: [state] CFI Enabled
2,693,930 UART: [fht] FMC Alias Private Key: 7
2,801,775 UART: [art] Extend RT PCRs Done
2,802,203 UART: [art] Lock RT PCRs Done
2,803,651 UART: [art] Populate DV Done
2,811,990 UART: [fht] FMC Alias Private Key: 7
2,813,092 UART: [art] Derive CDI
2,813,372 UART: [art] Store in in slot 0x4
2,899,095 UART: [art] Derive Key Pair
2,899,455 UART: [art] Store priv key in slot 0x5
2,912,885 UART: [art] Derive Key Pair - Done
2,927,568 UART: [art] Signing Cert with AUTHO
2,928,048 UART: RITY.KEYID = 7
2,943,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,999 UART: [art] PUB.X = 4006D2C26AAE1137E6A56E94A118B8A2401E5022A5051386C930A9149A8A6825325BDB04F929A7AAC83C1C1E7E90E740
2,950,758 UART: [art] PUB.Y = 8E4567F58A6A5C43C4B34FFCF7DCA0E67AD37A0B9D57E88DF275A2E5F1981E555E49B3978768C1479722AA12CF83340D
2,957,710 UART: [art] SIG.R = 8D5AAFAA399E2A28249A445507134F24963F541BCD5C0255CFE09A395840F17E635F6012BA160AE7827BB5E080B067E1
2,964,471 UART: [art] SIG.S = 6F601FA036302DB419B2DB931A8779521A99544CA44B9AE1C8D3BC01E177001242B6F67CE4338BA11241A6D041609F7C
2,987,787 UART: Caliptra RT
2,988,132 UART: [state] CFI Enabled
3,096,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,528,356 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,815 UART: [idev] ++
1,172,983 UART: [idev] CDI.KEYID = 6
1,173,344 UART: [idev] SUBJECT.KEYID = 7
1,173,769 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,240 UART: [ldev] Erasing FE.KEYID = 1
1,241,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,793 UART: [fwproc] Recv command 0x46574c44
1,282,526 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,391 >>> mbox cmd response: success
2,769,500 UART: [afmc] ++
2,769,668 UART: [afmc] CDI.KEYID = 6
2,770,031 UART: [afmc] SUBJECT.KEYID = 7
2,770,457 UART: [afmc] AUTHORITY.KEYID = 5
2,805,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,633 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,231 UART: [afmc] --
2,849,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,849,185 UART: [cold-reset] --
2,849,939 UART: [state] Locking Datavault
2,851,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,802 UART: [state] Locking ICCM
2,852,336 UART: [exit] Launching FMC @ 0x40000130
2,857,665 UART:
2,857,681 UART: Running Caliptra FMC ...
2,858,089 UART:
2,858,143 UART: [state] CFI Enabled
2,868,466 UART: [fht] FMC Alias Private Key: 7
2,976,507 UART: [art] Extend RT PCRs Done
2,976,935 UART: [art] Lock RT PCRs Done
2,978,769 UART: [art] Populate DV Done
2,987,074 UART: [fht] FMC Alias Private Key: 7
2,988,184 UART: [art] Derive CDI
2,988,464 UART: [art] Store in in slot 0x4
3,074,603 UART: [art] Derive Key Pair
3,074,963 UART: [art] Store priv key in slot 0x5
3,088,045 UART: [art] Derive Key Pair - Done
3,102,340 UART: [art] Signing Cert with AUTHO
3,102,820 UART: RITY.KEYID = 7
3,118,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,111 UART: [art] PUB.X = 76DF11797414DEA3A27E0B04FD471984000985DC2347085536ACCBE45A7BC563549F1E0F3F0557B7CFED00D3EF5B3662
3,125,823 UART: [art] PUB.Y = CFB21C115F69875277D9B92440E9682A5921E69E15453DEF152FC1C4FB3AB3DC729DCCBEA809653A9750D85C50C9CDF8
3,132,780 UART: [art] SIG.R = F2527401C30577DD9FE6301F9123924362AF629138C95A4546EC299F9B5D71ECDE7A6921FBD8311509AA8E8EEC0B2977
3,139,538 UART: [art] SIG.S = 4ABFB48F7E611A7B0FBF8BECD9137AD35F2F336C4E1845E734511D202CFF4ED25A9F1966583C376EB5870170206F36BE
3,163,051 UART: Caliptra RT
3,163,304 UART: [state] CFI Enabled
3,270,397 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,421 UART:
3,272,437 UART: Running Caliptra ROM ...
3,272,845 UART:
3,272,900 UART: [state] CFI Enabled
3,275,148 UART: [state] LifecycleState = Unprovisioned
3,275,803 UART: [state] DebugLocked = No
3,276,335 UART: [state] WD Timer not started. Device not locked for debugging
3,277,583 UART: [kat] SHA2-256
4,081,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,262 UART: [kat] ++
4,085,414 UART: [kat] sha1
4,089,848 UART: [kat] SHA2-256
4,091,788 UART: [kat] SHA2-384
4,094,449 UART: [kat] SHA2-512-ACC
4,096,349 UART: [kat] ECC-384
4,105,882 UART: [kat] HMAC-384Kdf
4,110,256 UART: [kat] LMS
4,358,568 UART: [kat] --
4,359,414 UART: [update-reset] ++
5,669,145 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,670,158 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,819,610 >>> mbox cmd response: success
Initializing fuses
5,819,868 UART:
5,819,884 UART: Running Caliptra ROM ...
5,820,292 UART:
5,820,347 UART: [state] CFI Enabled
5,822,501 UART: [state] LifecycleState = Unprovisioned
5,823,156 UART: [state] DebugLocked = No
5,823,752 UART: [state] WD Timer not started. Device not locked for debugging
5,824,877 UART: [kat] SHA2-256
6,628,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,632,556 UART: [kat] ++
6,632,708 UART: [kat] sha1
6,636,998 UART: [kat] SHA2-256
6,638,938 UART: [kat] SHA2-384
6,641,877 UART: [kat] SHA2-512-ACC
6,643,778 UART: [kat] ECC-384
6,653,773 UART: [kat] HMAC-384Kdf
6,658,383 UART: [kat] LMS
6,906,695 UART: [kat] --
6,907,687 UART: [warm-reset] ++
6,908,264 UART: [warm-reset] Prev Update Reset failed
6,909,219 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,523 >>> mbox cmd response: success
2,675,748 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,681,491 UART:
2,681,507 UART: Running Caliptra FMC ...
2,681,915 UART:
2,681,969 UART: [state] CFI Enabled
2,692,696 UART: [fht] FMC Alias Private Key: 7
2,801,001 UART: [art] Extend RT PCRs Done
2,801,429 UART: [art] Lock RT PCRs Done
2,802,903 UART: [art] Populate DV Done
2,811,504 UART: [fht] FMC Alias Private Key: 7
2,812,684 UART: [art] Derive CDI
2,812,964 UART: [art] Store in in slot 0x4
2,898,617 UART: [art] Derive Key Pair
2,898,977 UART: [art] Store priv key in slot 0x5
2,912,133 UART: [art] Derive Key Pair - Done
2,926,742 UART: [art] Signing Cert with AUTHO
2,927,222 UART: RITY.KEYID = 7
2,942,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,947 UART: [art] PUB.X = 4B8309C585BA576EF11084844ABB8EC95D1AA0601A423A425942A85116D5E12B0923F923C9CF27B5BA6D9799DBA33329
2,949,711 UART: [art] PUB.Y = 4D950DFF5C2D4073F33D64AB65237ABC9E5043796239A103DF5DC27DE5390516E374DE5FE41124CC40265ABC9FF0EC5E
2,956,662 UART: [art] SIG.R = 60FCB731C1E2C0C5A8C328F4DDEEFBCB7C036F71F1EF92B76DA7E01BC3114D2A48585F967882617DAD67ACA934B42635
2,963,445 UART: [art] SIG.S = CAF8C9193129D3EFB0113B9B953E1AE74F96787276DEC4D32D0EDDBDF8276E059B77176A8E45125DDA6E91A8C4CC32D0
2,986,984 UART: Caliptra RT
2,987,237 UART: [state] CFI Enabled
3,095,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,526,340 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,866 UART: [kat] ++
896,018 UART: [kat] sha1
900,426 UART: [kat] SHA2-256
902,366 UART: [kat] SHA2-384
905,095 UART: [kat] SHA2-512-ACC
906,996 UART: [kat] ECC-384
917,001 UART: [kat] HMAC-384Kdf
921,745 UART: [kat] LMS
1,170,057 UART: [kat] --
1,171,082 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,173,976 UART: [idev] ++
1,174,144 UART: [idev] CDI.KEYID = 6
1,174,505 UART: [idev] SUBJECT.KEYID = 7
1,174,930 UART: [idev] UDS.KEYID = 0
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,529 UART: [ldev] ++
1,209,697 UART: [ldev] CDI.KEYID = 6
1,210,061 UART: [ldev] SUBJECT.KEYID = 5
1,210,488 UART: [ldev] AUTHORITY.KEYID = 7
1,210,951 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,518 UART: [fwproc] Recv command 0x46574c44
1,283,251 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,674 >>> mbox cmd response: success
2,771,869 UART: [afmc] ++
2,772,037 UART: [afmc] CDI.KEYID = 6
2,772,400 UART: [afmc] SUBJECT.KEYID = 7
2,772,826 UART: [afmc] AUTHORITY.KEYID = 5
2,807,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,646 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,972 UART: [afmc] --
2,851,044 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,851,066 UART: [cold-reset] --
2,851,830 UART: [state] Locking Datavault
2,853,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,837 UART: [state] Locking ICCM
2,854,437 UART: [exit] Launching FMC @ 0x40000130
2,859,766 UART:
2,859,782 UART: Running Caliptra FMC ...
2,860,190 UART:
2,860,333 UART: [state] CFI Enabled
2,870,786 UART: [fht] FMC Alias Private Key: 7
2,978,423 UART: [art] Extend RT PCRs Done
2,978,851 UART: [art] Lock RT PCRs Done
2,980,395 UART: [art] Populate DV Done
2,988,662 UART: [fht] FMC Alias Private Key: 7
2,989,632 UART: [art] Derive CDI
2,989,912 UART: [art] Store in in slot 0x4
3,075,713 UART: [art] Derive Key Pair
3,076,073 UART: [art] Store priv key in slot 0x5
3,089,815 UART: [art] Derive Key Pair - Done
3,104,401 UART: [art] Signing Cert with AUTHO
3,104,881 UART: RITY.KEYID = 7
3,120,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,930 UART: [art] PUB.X = DF1500FD179A92DDC8C77850673168D517A358759B2F5457A2659E74F9A5537448BBDA703C743E36C65C11537368A707
3,127,665 UART: [art] PUB.Y = FEFFC107E2C75C652F34D3D3C29AFB26BB2A38304847A2CC22CECCEE34351BD55D644DD956B4B8A16573C75F588D26FC
3,134,630 UART: [art] SIG.R = EF684E84361AFAC6CABC4148A4ED9A70DC1FAFE6F44C8F45ABC393723847E08823CB4B26FEBCD035A9AFE266727187C7
3,141,420 UART: [art] SIG.S = FB73B071C32C0D6F2538D8253724544A69F9DA5D738D301416D91D955771B7FBFB5B327369ACCB7180EFF23E9944699B
3,165,402 UART: Caliptra RT
3,165,747 UART: [state] CFI Enabled
3,272,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,603 UART:
3,274,619 UART: Running Caliptra ROM ...
3,275,027 UART:
3,275,169 UART: [state] CFI Enabled
3,278,181 UART: [state] LifecycleState = Unprovisioned
3,278,836 UART: [state] DebugLocked = No
3,279,320 UART: [state] WD Timer not started. Device not locked for debugging
3,280,558 UART: [kat] SHA2-256
4,084,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,237 UART: [kat] ++
4,088,389 UART: [kat] sha1
4,092,703 UART: [kat] SHA2-256
4,094,643 UART: [kat] SHA2-384
4,097,384 UART: [kat] SHA2-512-ACC
4,099,284 UART: [kat] ECC-384
4,108,847 UART: [kat] HMAC-384Kdf
4,113,503 UART: [kat] LMS
4,361,815 UART: [kat] --
4,362,737 UART: [update-reset] ++
5,671,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,672,991 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,822,443 >>> mbox cmd response: success
Initializing fuses
5,822,859 UART:
5,822,875 UART: Running Caliptra ROM ...
5,823,283 UART:
5,823,425 UART: [state] CFI Enabled
5,825,847 UART: [state] LifecycleState = Unprovisioned
5,826,502 UART: [state] DebugLocked = No
5,827,114 UART: [state] WD Timer not started. Device not locked for debugging
5,828,447 UART: [kat] SHA2-256
6,631,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,636,126 UART: [kat] ++
6,636,278 UART: [kat] sha1
6,640,728 UART: [kat] SHA2-256
6,642,668 UART: [kat] SHA2-384
6,645,253 UART: [kat] SHA2-512-ACC
6,647,154 UART: [kat] ECC-384
6,657,183 UART: [kat] HMAC-384Kdf
6,661,713 UART: [kat] LMS
6,910,025 UART: [kat] --
6,910,713 UART: [warm-reset] ++
6,911,424 UART: [warm-reset] Prev Update Reset failed
6,912,549 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,860 >>> mbox cmd response: success
2,675,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,681,438 UART:
2,681,454 UART: Running Caliptra FMC ...
2,681,862 UART:
2,682,005 UART: [state] CFI Enabled
2,692,998 UART: [fht] FMC Alias Private Key: 7
2,801,141 UART: [art] Extend RT PCRs Done
2,801,569 UART: [art] Lock RT PCRs Done
2,803,157 UART: [art] Populate DV Done
2,811,434 UART: [fht] FMC Alias Private Key: 7
2,812,518 UART: [art] Derive CDI
2,812,798 UART: [art] Store in in slot 0x4
2,898,479 UART: [art] Derive Key Pair
2,898,839 UART: [art] Store priv key in slot 0x5
2,911,695 UART: [art] Derive Key Pair - Done
2,926,771 UART: [art] Signing Cert with AUTHO
2,927,251 UART: RITY.KEYID = 7
2,941,967 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,732 UART: [art] PUB.X = FCB1DEC3D12D5B1EF835F1715BB5374F2949E021E43B9AFB61BC5A39B4C3FBDA966D584F5FA38E9236C6F0E8C91D8E62
2,949,522 UART: [art] PUB.Y = 133D0870BF48F1FF0FF0F87A2C199058FCD78ACD023E77AF582C1F153828428C50590E8243A129495A5A13E59B7C7C20
2,956,460 UART: [art] SIG.R = 0B66A77E94CEE218FDED646CF9FCD4977607775418A7CAC8FE3D0A11DE063AD84CE291C2127EFD0E3741CA3D1D149983
2,963,229 UART: [art] SIG.S = CF4CD1F317DCC384ACB5529606C123A280261E4CAFC2732746B4984C39CDF35AA137AD39E076A3690B221EFBB277A38A
2,986,548 UART: Caliptra RT
2,986,893 UART: [state] CFI Enabled
3,094,632 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,524,857 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,722 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,351 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,385 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,976 UART: [ldev] --
1,280,424 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,506 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,203 >>> mbox cmd response: success
2,769,418 UART: [afmc] ++
2,769,586 UART: [afmc] CDI.KEYID = 6
2,769,949 UART: [afmc] SUBJECT.KEYID = 7
2,770,375 UART: [afmc] AUTHORITY.KEYID = 5
2,805,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,924 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,473 UART: [afmc] --
2,849,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,849,365 UART: [cold-reset] --
2,850,057 UART: [state] Locking Datavault
2,851,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,728 UART: [state] Locking ICCM
2,852,306 UART: [exit] Launching FMC @ 0x40000130
2,857,635 UART:
2,857,651 UART: Running Caliptra FMC ...
2,858,059 UART:
2,858,113 UART: [state] CFI Enabled
2,868,620 UART: [fht] FMC Alias Private Key: 7
2,976,489 UART: [art] Extend RT PCRs Done
2,976,917 UART: [art] Lock RT PCRs Done
2,978,475 UART: [art] Populate DV Done
2,986,714 UART: [fht] FMC Alias Private Key: 7
2,987,838 UART: [art] Derive CDI
2,988,118 UART: [art] Store in in slot 0x4
3,073,679 UART: [art] Derive Key Pair
3,074,039 UART: [art] Store priv key in slot 0x5
3,087,309 UART: [art] Derive Key Pair - Done
3,102,107 UART: [art] Signing Cert with AUTHO
3,102,587 UART: RITY.KEYID = 7
3,117,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,302 UART: [art] PUB.X = D38B2BECDD813F8B5BBCE8D69D6DD06E7FE05A14DD155877AC370477C75F31A444C4F316284B5E37EF6AFA23A3FE57B7
3,125,089 UART: [art] PUB.Y = 35482E276575610AC21B7DFF0DB6AD883C64D572BABAF6466B2A790570DD50F1F54BA75837F553F80090A2A993205A45
3,132,008 UART: [art] SIG.R = DE4B3304F74079069121C13DA09811E68FF603BB386C37F63D27DB326F4EDEBC42E08C786DE008CB88F6326B178A6446
3,138,768 UART: [art] SIG.S = F9C353D3B017F858932BFD5496DC74F92BA0B8CF535A58AF7845ABA5F66EFDF2848B120AA9B8ADB7C52EFF1CE44A86AD
3,162,404 UART: Caliptra RT
3,162,657 UART: [state] CFI Enabled
3,270,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,099 UART:
3,272,115 UART: Running Caliptra ROM ...
3,272,523 UART:
3,272,578 UART: [state] CFI Enabled
3,275,520 UART: [state] LifecycleState = Unprovisioned
3,276,175 UART: [state] DebugLocked = No
3,276,743 UART: [state] WD Timer not started. Device not locked for debugging
3,277,981 UART: [kat] SHA2-256
4,081,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,660 UART: [kat] ++
4,085,812 UART: [kat] sha1
4,090,052 UART: [kat] SHA2-256
4,091,992 UART: [kat] SHA2-384
4,094,935 UART: [kat] SHA2-512-ACC
4,096,835 UART: [kat] ECC-384
4,106,428 UART: [kat] HMAC-384Kdf
4,110,968 UART: [kat] LMS
4,359,280 UART: [kat] --
4,360,100 UART: [update-reset] ++
5,669,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,670,476 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,819,928 >>> mbox cmd response: success
Initializing fuses
5,820,276 UART:
5,820,292 UART: Running Caliptra ROM ...
5,820,700 UART:
5,820,755 UART: [state] CFI Enabled
5,823,359 UART: [state] LifecycleState = Unprovisioned
5,824,014 UART: [state] DebugLocked = No
5,824,740 UART: [state] WD Timer not started. Device not locked for debugging
5,825,917 UART: [kat] SHA2-256
6,629,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,633,596 UART: [kat] ++
6,633,748 UART: [kat] sha1
6,637,946 UART: [kat] SHA2-256
6,639,886 UART: [kat] SHA2-384
6,642,535 UART: [kat] SHA2-512-ACC
6,644,436 UART: [kat] ECC-384
6,654,401 UART: [kat] HMAC-384Kdf
6,658,935 UART: [kat] LMS
6,907,247 UART: [kat] --
6,908,101 UART: [warm-reset] ++
6,908,692 UART: [warm-reset] Prev Update Reset failed
6,909,727 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,381 >>> mbox cmd response: success
2,674,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,680,887 UART:
2,680,903 UART: Running Caliptra FMC ...
2,681,311 UART:
2,681,365 UART: [state] CFI Enabled
2,691,958 UART: [fht] FMC Alias Private Key: 7
2,799,881 UART: [art] Extend RT PCRs Done
2,800,309 UART: [art] Lock RT PCRs Done
2,801,983 UART: [art] Populate DV Done
2,810,270 UART: [fht] FMC Alias Private Key: 7
2,811,320 UART: [art] Derive CDI
2,811,600 UART: [art] Store in in slot 0x4
2,897,009 UART: [art] Derive Key Pair
2,897,369 UART: [art] Store priv key in slot 0x5
2,910,671 UART: [art] Derive Key Pair - Done
2,925,304 UART: [art] Signing Cert with AUTHO
2,925,784 UART: RITY.KEYID = 7
2,940,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,537 UART: [art] PUB.X = A5A663181AA2BFA47854A8225040AAD2617B84981728A8316AF0769A0D046057B7B902B4CEDEAF6509C18FBEF7AA73B8
2,948,301 UART: [art] PUB.Y = 8E882294F2586782456C17C7292E72D92F2F438CCA754762F27EBA57A7CBB0F0C632D28E126B1A16ADB78B13B439B4C8
2,955,253 UART: [art] SIG.R = DB12CB9644BBB3E0C8ED6BCC83AFB42C7030EC767301E490D96269DD041E4F69EF6246FA2ED162EE97838EE7C24E8D4B
2,962,035 UART: [art] SIG.S = A1232B84B08B5D35844FB06B5472E4AD8E8EE70EF7234BF2F842B74A6F56BDEFBF45D97E198E6D772B2AB50193499A0D
2,985,921 UART: Caliptra RT
2,986,174 UART: [state] CFI Enabled
3,093,028 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,522,092 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,988 UART: [kat] ++
896,140 UART: [kat] sha1
900,414 UART: [kat] SHA2-256
902,354 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
917,031 UART: [kat] HMAC-384Kdf
921,559 UART: [kat] LMS
1,169,871 UART: [kat] --
1,170,908 UART: [cold-reset] ++
1,171,488 UART: [fht] FHT @ 0x50003400
1,173,964 UART: [idev] ++
1,174,132 UART: [idev] CDI.KEYID = 6
1,174,493 UART: [idev] SUBJECT.KEYID = 7
1,174,918 UART: [idev] UDS.KEYID = 0
1,182,846 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,507 UART: [ldev] SUBJECT.KEYID = 5
1,210,934 UART: [ldev] AUTHORITY.KEYID = 7
1,211,397 UART: [ldev] FE.KEYID = 1
1,216,411 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,682 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,256 >>> mbox cmd response: success
2,771,395 UART: [afmc] ++
2,771,563 UART: [afmc] CDI.KEYID = 6
2,771,926 UART: [afmc] SUBJECT.KEYID = 7
2,772,352 UART: [afmc] AUTHORITY.KEYID = 5
2,808,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,140 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,294 UART: [afmc] --
2,852,276 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,852,298 UART: [cold-reset] --
2,853,086 UART: [state] Locking Datavault
2,853,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,545 UART: [state] Locking ICCM
2,855,173 UART: [exit] Launching FMC @ 0x40000130
2,860,502 UART:
2,860,518 UART: Running Caliptra FMC ...
2,860,926 UART:
2,861,069 UART: [state] CFI Enabled
2,871,264 UART: [fht] FMC Alias Private Key: 7
2,978,881 UART: [art] Extend RT PCRs Done
2,979,309 UART: [art] Lock RT PCRs Done
2,981,199 UART: [art] Populate DV Done
2,989,466 UART: [fht] FMC Alias Private Key: 7
2,990,494 UART: [art] Derive CDI
2,990,774 UART: [art] Store in in slot 0x4
3,076,731 UART: [art] Derive Key Pair
3,077,091 UART: [art] Store priv key in slot 0x5
3,090,727 UART: [art] Derive Key Pair - Done
3,105,258 UART: [art] Signing Cert with AUTHO
3,105,738 UART: RITY.KEYID = 7
3,121,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,435 UART: [art] PUB.X = 1F80666942D58A16EE2BDC5587D92ECD9D3C3D2321FD2032826A3D72050209CCD1B950D7AF38720C71D00C5A76EE134E
3,129,194 UART: [art] PUB.Y = C8BBC7D16DF7290DCFF86ABC43ED097CE3D81F07E2D8C626313DFC9A54545CFB839F2A6A30ADBCA302ED9A7AC2686EC7
3,136,160 UART: [art] SIG.R = 6717F50C7284CA0E2911C2FD0381522396EE921B088657BE9BB3AC02AB099D69022112B8C9DF7CA121BCD63A56719D09
3,142,906 UART: [art] SIG.S = AD7848133D9E488CC151AEA51B35155142EF0B6BEE04EA624B729BBD6AE0E73CD54C63F3C0D8A7E745812DA5B364286A
3,167,061 UART: Caliptra RT
3,167,406 UART: [state] CFI Enabled
3,276,235 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,279 UART:
3,278,295 UART: Running Caliptra ROM ...
3,278,703 UART:
3,278,845 UART: [state] CFI Enabled
3,281,465 UART: [state] LifecycleState = Unprovisioned
3,282,120 UART: [state] DebugLocked = No
3,282,620 UART: [state] WD Timer not started. Device not locked for debugging
3,283,900 UART: [kat] SHA2-256
4,087,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,579 UART: [kat] ++
4,091,731 UART: [kat] sha1
4,095,947 UART: [kat] SHA2-256
4,097,887 UART: [kat] SHA2-384
4,100,692 UART: [kat] SHA2-512-ACC
4,102,592 UART: [kat] ECC-384
4,112,227 UART: [kat] HMAC-384Kdf
4,116,831 UART: [kat] LMS
4,365,143 UART: [kat] --
4,366,107 UART: [update-reset] ++
5,676,204 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,677,315 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,826,767 >>> mbox cmd response: success
Initializing fuses
5,827,009 UART:
5,827,025 UART: Running Caliptra ROM ...
5,827,433 UART:
5,827,575 UART: [state] CFI Enabled
5,830,609 UART: [state] LifecycleState = Unprovisioned
5,831,264 UART: [state] DebugLocked = No
5,831,976 UART: [state] WD Timer not started. Device not locked for debugging
5,833,237 UART: [kat] SHA2-256
6,636,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,640,916 UART: [kat] ++
6,641,068 UART: [kat] sha1
6,645,258 UART: [kat] SHA2-256
6,647,198 UART: [kat] SHA2-384
6,649,857 UART: [kat] SHA2-512-ACC
6,651,758 UART: [kat] ECC-384
6,661,587 UART: [kat] HMAC-384Kdf
6,666,215 UART: [kat] LMS
6,914,527 UART: [kat] --
6,915,189 UART: [warm-reset] ++
6,915,776 UART: [warm-reset] Prev Update Reset failed
6,916,631 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,652 >>> mbox cmd response: success
2,676,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,682,072 UART:
2,682,088 UART: Running Caliptra FMC ...
2,682,496 UART:
2,682,639 UART: [state] CFI Enabled
2,693,192 UART: [fht] FMC Alias Private Key: 7
2,800,969 UART: [art] Extend RT PCRs Done
2,801,397 UART: [art] Lock RT PCRs Done
2,803,187 UART: [art] Populate DV Done
2,811,348 UART: [fht] FMC Alias Private Key: 7
2,812,528 UART: [art] Derive CDI
2,812,808 UART: [art] Store in in slot 0x4
2,898,375 UART: [art] Derive Key Pair
2,898,735 UART: [art] Store priv key in slot 0x5
2,912,705 UART: [art] Derive Key Pair - Done
2,927,546 UART: [art] Signing Cert with AUTHO
2,928,026 UART: RITY.KEYID = 7
2,943,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,157 UART: [art] PUB.X = 6E39A1F3B33BD87D68AE49D17F599616977938471979A39EFD31656C7A70F7239A4513F94A816DC232C2D4BA8F197C23
2,950,923 UART: [art] PUB.Y = A2CFFDDBC93F95C4314E8B5337BD7214BF60C9F9737681FA294A086A12BFDA190E2A4A497686739BC3F5CBFEA68AEA9D
2,957,887 UART: [art] SIG.R = F0D77E09448E59AA20224B1641E23CDDCE8C7ABBAC2AA5074B8E678F3502078EBFE3C1F855FEA0BA7B4FA3C8A6F6151F
2,964,667 UART: [art] SIG.S = B191222E9EAFF1D69EB663F95847DD2A5CD551C85F095BC1D8F035603AE16E0E0CF160BCB217FE44E46A2194045F060D
2,988,180 UART: Caliptra RT
2,988,525 UART: [state] CFI Enabled
3,097,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,528,818 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,537 UART:
191,920 UART: Running Caliptra ROM ...
193,005 UART:
193,181 UART: [state] CFI Enabled
263,092 UART: [state] LifecycleState = Production
265,331 UART: [state] DebugLocked = Yes
266,972 UART: [state] Starting the WD Timer 40000000 cycles
272,837 UART: [kat] SHA2-256
454,795 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,333 UART: [kat] ++
466,845 UART: [kat] sha1
477,472 UART: [kat] SHA2-256
480,475 UART: [kat] SHA2-384
486,105 UART: [kat] SHA2-512-ACC
488,714 UART: [kat] ECC-384
3,777,618 UART: [kat] HMAC-384Kdf
3,801,284 UART: [kat] LMS
4,874,445 UART: [kat] --
4,879,010 UART: [cold-reset] ++
4,881,030 UART: [fht] FHT @ 0x50003400
4,892,099 UART: [idev] ++
4,892,838 UART: [idev] CDI.KEYID = 6
4,893,945 UART: [idev] SUBJECT.KEYID = 7
4,895,194 UART: [idev] UDS.KEYID = 0
4,896,088 ready_for_fw is high
4,896,295 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,039,287 UART: [idev] Erasing UDS.KEYID = 0
8,244,583 UART: [idev] Sha1 KeyId Algorithm
8,266,062 UART: [idev] --
8,268,578 UART: [ldev] ++
8,269,206 UART: [ldev] CDI.KEYID = 6
8,270,311 UART: [ldev] SUBJECT.KEYID = 5
8,271,442 UART: [ldev] AUTHORITY.KEYID = 7
8,272,782 UART: [ldev] FE.KEYID = 1
8,317,161 UART: [ldev] Erasing FE.KEYID = 1
11,650,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,865 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,979,228 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,995,209 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,011,368 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,031,446 UART: [ldev] --
14,035,197 UART: [fwproc] Wait for Commands...
14,036,752 UART: [fwproc] Recv command 0x46574c44
14,039,061 UART: [fwproc] Recv'd Img size: 113760 bytes
18,138,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,212,650 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,281,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,597,833 >>> mbox cmd response: success
18,601,120 UART: [afmc] ++
18,601,704 UART: [afmc] CDI.KEYID = 6
18,602,810 UART: [afmc] SUBJECT.KEYID = 7
18,604,046 UART: [afmc] AUTHORITY.KEYID = 5
21,969,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,267,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,269,393 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,285,385 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,301,460 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,317,547 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,342,033 UART: [afmc] --
24,345,896 UART: [cold-reset] --
24,350,635 UART: [state] Locking Datavault
24,354,155 UART: [state] Locking PCR0, PCR1 and PCR31
24,355,796 UART: [state] Locking ICCM
24,358,676 UART: [exit] Launching FMC @ 0x40000130
24,367,340 UART:
24,367,580 UART: Running Caliptra FMC ...
24,368,602 UART:
24,368,771 UART: [state] CFI Enabled
24,426,111 UART: [fht] FMC Alias Private Key: 7
26,764,699 UART: [art] Extend RT PCRs Done
26,765,911 UART: [art] Lock RT PCRs Done
26,767,481 UART: [art] Populate DV Done
26,772,998 UART: [fht] FMC Alias Private Key: 7
26,774,532 UART: [art] Derive CDI
26,775,342 UART: [art] Store in in slot 0x4
26,835,078 UART: [art] Derive Key Pair
26,836,113 UART: [art] Store priv key in slot 0x5
30,128,749 UART: [art] Derive Key Pair - Done
30,141,798 UART: [art] Signing Cert with AUTHO
30,143,101 UART: RITY.KEYID = 7
32,431,355 UART: [art] Erasing AUTHORITY.KEYID = 7
32,432,865 UART: [art] PUB.X = 0FDEF87BB6CFDF24BBDD9E93644E5E814B53C3C9DEA469A3C64FEAF8E581D45504842B791A0D91285DD6A2622121BC5D
32,440,113 UART: [art] PUB.Y = 7967A1B3ADA3D2574DA19F64F605F938723D1BB40273252BF9E9D50D3447BB2B9B85460EB719D597051C7F798A0504F0
32,447,361 UART: [art] SIG.R = B8F0ABD014BDC257ADA6985BFFDA0FC3C3D191760F0437F827421B7A58356B9A4253FBD9EE1FDC14196B38D041D2A5F8
32,454,752 UART: [art] SIG.S = 358DF9DBF4ED5B8C115BE345079CA8C005FC5E988B0460205AFA12CEFAB9460E5CA75CE35211A39B98E40888245DECCF
33,759,718 UART: Caliptra RT
33,760,409 UART: [state] CFI Enabled
33,921,354 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,311 UART:
1,587 UART: Running Caliptra ROM ...
2,695 UART:
2,848 UART: [state] CFI Enabled
62,874 UART: [state] LifecycleState = Production
64,634 UART: [state] DebugLocked = Yes
66,750 UART: [state] Starting the WD Timer 40000000 cycles
71,650 UART: [kat] SHA2-256
253,616 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
265,107 UART: [kat] ++
265,706 UART: [kat] sha1
276,208 UART: [kat] SHA2-256
279,262 UART: [kat] SHA2-384
283,876 UART: [kat] SHA2-512-ACC
286,534 UART: [kat] ECC-384
3,576,760 UART: [kat] HMAC-384Kdf
3,603,743 UART: [kat] LMS
4,676,905 UART: [kat] --
4,683,182 UART: [warm-reset] ++
4,688,684 UART: [warm-reset] --
4,692,982 UART: [state] Locking Datavault
4,697,534 UART: [state] Locking PCR0, PCR1 and PCR31
4,699,723 UART: [state] Locking ICCM
4,702,499 UART: [exit] Launching FMC @ 0x40000130
4,711,178 UART:
4,711,408 UART: Running Caliptra FMC ...
4,712,464 UART:
4,712,613 UART: [state] CFI Enabled
4,768,331 UART: [aliasrt :skip pcr extension
4,769,622 UART: [art] Extend RT PCRs Done
4,770,688 UART: [art] Lock RT PCRs Done
4,771,973 UART: [art] Populate DV Done
4,777,542 UART: [fht] FMC Alias Private Key: 7
4,779,129 UART: [art] Derive CDI
4,779,865 UART: [art] Store in in slot 0x4
4,836,627 UART: [art] Derive Key Pair
4,837,663 UART: [art] Store priv key in slot 0x5
8,130,334 UART: [art] Derive Key Pair - Done
8,143,173 UART: [art] Signing Cert with AUTHO
8,144,482 UART: RITY.KEYID = 7
10,433,007 UART: [art] Erasing AUTHORITY.KEYID = 7
10,434,523 UART: [art] PUB.X = 0FDEF87BB6CFDF24BBDD9E93644E5E814B53C3C9DEA469A3C64FEAF8E581D45504842B791A0D91285DD6A2622121BC5D
10,441,793 UART: [art] PUB.Y = 7967A1B3ADA3D2574DA19F64F605F938723D1BB40273252BF9E9D50D3447BB2B9B85460EB719D597051C7F798A0504F0
10,448,979 UART: [art] SIG.R = B8F0ABD014BDC257ADA6985BFFDA0FC3C3D191760F0437F827421B7A58356B9A4253FBD9EE1FDC14196B38D041D2A5F8
10,456,366 UART: [art] SIG.S = 358DF9DBF4ED5B8C115BE345079CA8C005FC5E988B0460205AFA12CEFAB9460E5CA75CE35211A39B98E40888245DECCF
11,761,891 UART: Caliptra RT
11,762,913 UART: [state] CFI Enabled
12,096,599 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
191,534 UART:
191,899 UART: Running Caliptra ROM ...
193,025 UART:
193,173 UART: [state] CFI Enabled
266,432 UART: [state] LifecycleState = Production
268,591 UART: [state] DebugLocked = Yes
270,089 UART: [state] Starting the WD Timer 40000000 cycles
275,732 UART: [kat] SHA2-256
457,725 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,213 UART: [kat] ++
469,815 UART: [kat] sha1
480,403 UART: [kat] SHA2-256
483,421 UART: [kat] SHA2-384
488,981 UART: [kat] SHA2-512-ACC
491,565 UART: [kat] ECC-384
3,778,965 UART: [kat] HMAC-384Kdf
3,805,326 UART: [kat] LMS
4,878,427 UART: [kat] --
4,881,713 UART: [cold-reset] ++
4,882,858 UART: [fht] FHT @ 0x50003400
4,893,406 UART: [idev] ++
4,894,115 UART: [idev] CDI.KEYID = 6
4,895,285 UART: [idev] SUBJECT.KEYID = 7
4,896,456 UART: [idev] UDS.KEYID = 0
4,897,389 ready_for_fw is high
4,897,602 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,040,785 UART: [idev] Erasing UDS.KEYID = 0
8,249,278 UART: [idev] Sha1 KeyId Algorithm
8,271,355 UART: [idev] --
8,274,706 UART: [ldev] ++
8,275,277 UART: [ldev] CDI.KEYID = 6
8,276,430 UART: [ldev] SUBJECT.KEYID = 5
8,277,746 UART: [ldev] AUTHORITY.KEYID = 7
8,278,851 UART: [ldev] FE.KEYID = 1
8,320,896 UART: [ldev] Erasing FE.KEYID = 1
11,651,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,884 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,962,214 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,978,201 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,994,314 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,014,704 UART: [ldev] --
14,019,280 UART: [fwproc] Wait for Commands...
14,020,998 UART: [fwproc] Recv command 0x46574c44
14,023,327 UART: [fwproc] Recv'd Img size: 113760 bytes
18,124,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,203,635 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,272,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,587,627 >>> mbox cmd response: success
18,591,362 UART: [afmc] ++
18,591,949 UART: [afmc] CDI.KEYID = 6
18,593,188 UART: [afmc] SUBJECT.KEYID = 7
18,594,214 UART: [afmc] AUTHORITY.KEYID = 5
21,968,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,267,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,270,259 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,286,292 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,302,398 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,318,440 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,340,904 UART: [afmc] --
24,344,233 UART: [cold-reset] --
24,348,636 UART: [state] Locking Datavault
24,355,008 UART: [state] Locking PCR0, PCR1 and PCR31
24,356,660 UART: [state] Locking ICCM
24,358,419 UART: [exit] Launching FMC @ 0x40000130
24,367,101 UART:
24,367,332 UART: Running Caliptra FMC ...
24,368,431 UART:
24,368,588 UART: [state] CFI Enabled
24,429,922 UART: [fht] FMC Alias Private Key: 7
26,768,027 UART: [art] Extend RT PCRs Done
26,769,249 UART: [art] Lock RT PCRs Done
26,770,851 UART: [art] Populate DV Done
26,776,152 UART: [fht] FMC Alias Private Key: 7
26,777,686 UART: [art] Derive CDI
26,778,416 UART: [art] Store in in slot 0x4
26,838,337 UART: [art] Derive Key Pair
26,839,375 UART: [art] Store priv key in slot 0x5
30,131,677 UART: [art] Derive Key Pair - Done
30,144,512 UART: [art] Signing Cert with AUTHO
30,145,817 UART: RITY.KEYID = 7
32,433,660 UART: [art] Erasing AUTHORITY.KEYID = 7
32,435,170 UART: [art] PUB.X = 71DA6EC11C2D7FCFD9EDCAF12D27B86BBE08928CC7582ECA10C0F49F459B701BFEDC7415C79F690C6DF6B8B8C8F2DD41
32,442,455 UART: [art] PUB.Y = F17A645CB785CBFA7578EA21DBD0C352BC6CCC490EDA9AD4D2479C8D087B243FA861480581C2814067291D1A7BEACEDA
32,449,662 UART: [art] SIG.R = D28F315BE9D831C006546CFE45740D07DC0BB96C7BB6C1D4DE0EAED5C15864ECD8265ED2009BD3A6C01296576BB71209
32,457,063 UART: [art] SIG.S = 2F945EF39EEFD31E9716C7FEAE2EE6B31DF6653E7BAE6A6CFF9E4F1221632FF447B49796395A7DF5C84869952B5D57B7
33,762,523 UART: Caliptra RT
33,763,210 UART: [state] CFI Enabled
33,923,288 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,277 UART:
1,556 UART: Running Caliptra ROM ...
2,691 UART:
2,847 UART: [state] CFI Enabled
65,608 UART: [state] LifecycleState = Production
67,375 UART: [state] DebugLocked = Yes
69,411 UART: [state] Starting the WD Timer 40000000 cycles
73,919 UART: [kat] SHA2-256
255,707 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
267,169 UART: [kat] ++
267,672 UART: [kat] sha1
277,517 UART: [kat] SHA2-256
280,562 UART: [kat] SHA2-384
285,944 UART: [kat] SHA2-512-ACC
288,554 UART: [kat] ECC-384
3,575,638 UART: [kat] HMAC-384Kdf
3,604,352 UART: [kat] LMS
4,677,511 UART: [kat] --
4,682,092 UART: [warm-reset] ++
4,686,197 UART: [warm-reset] --
4,689,365 UART: [state] Locking Datavault
4,691,968 UART: [state] Locking PCR0, PCR1 and PCR31
4,694,098 UART: [state] Locking ICCM
4,695,932 UART: [exit] Launching FMC @ 0x40000130
4,704,603 UART:
4,704,836 UART: Running Caliptra FMC ...
4,705,861 UART:
4,706,010 UART: [state] CFI Enabled
4,768,068 UART: [aliasrt :skip pcr extension
4,769,365 UART: [art] Extend RT PCRs Done
4,770,435 UART: [art] Lock RT PCRs Done
4,771,720 UART: [art] Populate DV Done
4,777,398 UART: [fht] FMC Alias Private Key: 7
4,778,932 UART: [art] Derive CDI
4,779,763 UART: [art] Store in in slot 0x4
4,836,915 UART: [art] Derive Key Pair
4,837,952 UART: [art] Store priv key in slot 0x5
8,130,348 UART: [art] Derive Key Pair - Done
8,143,291 UART: [art] Signing Cert with AUTHO
8,144,588 UART: RITY.KEYID = 7
10,431,306 UART: [art] Erasing AUTHORITY.KEYID = 7
10,432,931 UART: [art] PUB.X = 71DA6EC11C2D7FCFD9EDCAF12D27B86BBE08928CC7582ECA10C0F49F459B701BFEDC7415C79F690C6DF6B8B8C8F2DD41
10,440,076 UART: [art] PUB.Y = F17A645CB785CBFA7578EA21DBD0C352BC6CCC490EDA9AD4D2479C8D087B243FA861480581C2814067291D1A7BEACEDA
10,447,376 UART: [art] SIG.R = D28F315BE9D831C006546CFE45740D07DC0BB96C7BB6C1D4DE0EAED5C15864ECD8265ED2009BD3A6C01296576BB71209
10,454,719 UART: [art] SIG.S = 2F945EF39EEFD31E9716C7FEAE2EE6B31DF6653E7BAE6A6CFF9E4F1221632FF447B49796395A7DF5C84869952B5D57B7
11,759,743 UART: Caliptra RT
11,760,453 UART: [state] CFI Enabled
12,112,076 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
191,788 UART:
192,187 UART: Running Caliptra ROM ...
193,298 UART:
602,926 UART: [state] CFI Enabled
621,838 UART: [state] LifecycleState = Production
624,033 UART: [state] DebugLocked = Yes
625,688 UART: [state] Starting the WD Timer 40000000 cycles
630,190 UART: [kat] SHA2-256
811,973 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,515 UART: [kat] ++
824,112 UART: [kat] sha1
834,069 UART: [kat] SHA2-256
837,128 UART: [kat] SHA2-384
843,049 UART: [kat] SHA2-512-ACC
845,699 UART: [kat] ECC-384
4,101,035 UART: [kat] HMAC-384Kdf
4,113,290 UART: [kat] LMS
5,186,470 UART: [kat] --
5,190,700 UART: [cold-reset] ++
5,193,138 UART: [fht] FHT @ 0x50003400
5,203,471 UART: [idev] ++
5,204,167 UART: [idev] CDI.KEYID = 6
5,205,351 UART: [idev] SUBJECT.KEYID = 7
5,206,807 UART: [idev] UDS.KEYID = 0
5,208,062 ready_for_fw is high
5,208,257 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,351,136 UART: [idev] Erasing UDS.KEYID = 0
8,493,238 UART: [idev] Sha1 KeyId Algorithm
8,515,903 UART: [idev] --
8,519,928 UART: [ldev] ++
8,520,500 UART: [ldev] CDI.KEYID = 6
8,521,681 UART: [ldev] SUBJECT.KEYID = 5
8,522,830 UART: [ldev] AUTHORITY.KEYID = 7
8,524,056 UART: [ldev] FE.KEYID = 1
8,535,135 UART: [ldev] Erasing FE.KEYID = 1
11,827,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,187 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,138,495 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,154,541 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,170,633 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,191,724 UART: [ldev] --
14,196,699 UART: [fwproc] Wait for Commands...
14,199,443 UART: [fwproc] Recv command 0x46574c44
14,201,744 UART: [fwproc] Recv'd Img size: 113760 bytes
18,302,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,374,269 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,443,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,758,356 >>> mbox cmd response: success
18,762,082 UART: [afmc] ++
18,762,676 UART: [afmc] CDI.KEYID = 6
18,763,779 UART: [afmc] SUBJECT.KEYID = 7
18,764,988 UART: [afmc] AUTHORITY.KEYID = 5
22,081,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,375,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,377,650 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,393,652 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,409,745 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,425,770 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,449,054 UART: [afmc] --
24,452,908 UART: [cold-reset] --
24,458,224 UART: [state] Locking Datavault
24,463,083 UART: [state] Locking PCR0, PCR1 and PCR31
24,464,783 UART: [state] Locking ICCM
24,466,146 UART: [exit] Launching FMC @ 0x40000130
24,474,797 UART:
24,475,020 UART: Running Caliptra FMC ...
24,476,038 UART:
24,476,179 UART: [state] CFI Enabled
24,484,320 UART: [fht] FMC Alias Private Key: 7
26,815,115 UART: [art] Extend RT PCRs Done
26,816,353 UART: [art] Lock RT PCRs Done
26,817,893 UART: [art] Populate DV Done
26,823,244 UART: [fht] FMC Alias Private Key: 7
26,824,825 UART: [art] Derive CDI
26,825,551 UART: [art] Store in in slot 0x4
26,867,821 UART: [art] Derive Key Pair
26,868,862 UART: [art] Store priv key in slot 0x5
30,110,805 UART: [art] Derive Key Pair - Done
30,124,072 UART: [art] Signing Cert with AUTHO
30,125,372 UART: RITY.KEYID = 7
32,404,969 UART: [art] Erasing AUTHORITY.KEYID = 7
32,406,473 UART: [art] PUB.X = D0858C007AAE1C0436EB51DB3940DD477F6E11D3FAD8F05E04DE3B01CC8BF7221BD5373B9A58C209FC7F82425B9519CC
32,413,790 UART: [art] PUB.Y = E950E68B1CD8C12A5FB603D229C57D596E2BE6650FBB4BA11B6DE02F58B660C3E67EAE77030BBA68DF3EB32D45469D17
32,421,026 UART: [art] SIG.R = AFA934D7C1F228B2FA07BCE6F59624EA0153D670ED1D358C08F46688C7B4CBC20539CB54BFBF553D485FC3D331B4C568
32,428,473 UART: [art] SIG.S = C7DA050D5AF279B196FD9B79EDC17A8E70E533F8537128323561F44FCEE0FD0A2AC9CD041618E04EB47AE402B8C36CCE
33,733,522 UART: Caliptra RT
33,734,255 UART: [state] CFI Enabled
33,850,887 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,271 UART:
1,481 UART: Running Caliptra ROM ...
2,594 UART:
6,675,259 UART: [state] CFI Enabled
6,687,890 UART: [state] LifecycleState = Production
6,689,627 UART: [state] DebugLocked = Yes
6,691,881 UART: [state] Starting the WD Timer 40000000 cycles
6,697,318 UART: [kat] SHA2-256
6,879,318 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,890,851 UART: [kat] ++
6,891,437 UART: [kat] sha1
6,901,893 UART: [kat] SHA2-256
6,904,948 UART: [kat] SHA2-384
6,911,124 UART: [kat] SHA2-512-ACC
6,913,747 UART: [kat] ECC-384
10,170,040 UART: [kat] HMAC-384Kdf
10,181,895 UART: [kat] LMS
11,255,051 UART: [kat] --
11,260,773 UART: [warm-reset] ++
11,265,344 UART: [warm-reset] --
11,268,987 UART: [state] Locking Datavault
11,273,196 UART: [state] Locking PCR0, PCR1 and PCR31
11,275,369 UART: [state] Locking ICCM
11,278,135 UART: [exit] Launching FMC @ 0x40000130
11,286,785 UART:
11,287,011 UART: Running Caliptra FMC ...
11,288,029 UART:
11,288,170 UART: [state] CFI Enabled
11,290,265 UART: [aliasrt :skip pcr extension
11,291,517 UART: [art] Extend RT PCRs Done
11,292,566 UART: [art] Lock RT PCRs Done
11,294,110 UART: [art] Populate DV Done
11,299,883 UART: [fht] FMC Alias Private Key: 7
11,301,525 UART: [art] Derive CDI
11,302,330 UART: [art] Store in in slot 0x4
11,344,859 UART: [art] Derive Key Pair
11,345,853 UART: [art] Store priv key in slot 0x5
14,588,243 UART: [art] Derive Key Pair - Done
14,601,025 UART: [art] Signing Cert with AUTHO
14,602,333 UART: RITY.KEYID = 7
16,881,691 UART: [art] Erasing AUTHORITY.KEYID = 7
16,883,197 UART: [art] PUB.X = D0858C007AAE1C0436EB51DB3940DD477F6E11D3FAD8F05E04DE3B01CC8BF7221BD5373B9A58C209FC7F82425B9519CC
16,890,462 UART: [art] PUB.Y = E950E68B1CD8C12A5FB603D229C57D596E2BE6650FBB4BA11B6DE02F58B660C3E67EAE77030BBA68DF3EB32D45469D17
16,897,733 UART: [art] SIG.R = AFA934D7C1F228B2FA07BCE6F59624EA0153D670ED1D358C08F46688C7B4CBC20539CB54BFBF553D485FC3D331B4C568
16,905,140 UART: [art] SIG.S = C7DA050D5AF279B196FD9B79EDC17A8E70E533F8537128323561F44FCEE0FD0A2AC9CD041618E04EB47AE402B8C36CCE
18,210,649 UART: Caliptra RT
18,211,351 UART: [state] CFI Enabled
18,499,846 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
191,803 UART:
192,215 UART: Running Caliptra ROM ...
193,298 UART:
602,822 UART: [state] CFI Enabled
616,866 UART: [state] LifecycleState = Production
619,073 UART: [state] DebugLocked = Yes
621,148 UART: [state] Starting the WD Timer 40000000 cycles
625,944 UART: [kat] SHA2-256
807,920 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,481 UART: [kat] ++
819,934 UART: [kat] sha1
830,496 UART: [kat] SHA2-256
833,582 UART: [kat] SHA2-384
840,693 UART: [kat] SHA2-512-ACC
843,354 UART: [kat] ECC-384
4,096,245 UART: [kat] HMAC-384Kdf
4,109,323 UART: [kat] LMS
5,182,543 UART: [kat] --
5,185,990 UART: [cold-reset] ++
5,188,424 UART: [fht] FHT @ 0x50003400
5,198,616 UART: [idev] ++
5,199,313 UART: [idev] CDI.KEYID = 6
5,200,407 UART: [idev] SUBJECT.KEYID = 7
5,201,925 UART: [idev] UDS.KEYID = 0
5,203,124 ready_for_fw is high
5,203,337 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,346,293 UART: [idev] Erasing UDS.KEYID = 0
8,493,072 UART: [idev] Sha1 KeyId Algorithm
8,515,876 UART: [idev] --
8,520,601 UART: [ldev] ++
8,521,172 UART: [ldev] CDI.KEYID = 6
8,522,399 UART: [ldev] SUBJECT.KEYID = 5
8,523,546 UART: [ldev] AUTHORITY.KEYID = 7
8,524,763 UART: [ldev] FE.KEYID = 1
8,535,564 UART: [ldev] Erasing FE.KEYID = 1
11,830,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,527 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,137,884 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,153,921 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,169,960 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,190,903 UART: [ldev] --
14,196,061 UART: [fwproc] Wait for Commands...
14,197,604 UART: [fwproc] Recv command 0x46574c44
14,199,925 UART: [fwproc] Recv'd Img size: 113760 bytes
18,299,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,373,702 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,442,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,758,792 >>> mbox cmd response: success
18,763,758 UART: [afmc] ++
18,764,348 UART: [afmc] CDI.KEYID = 6
18,765,536 UART: [afmc] SUBJECT.KEYID = 7
18,766,691 UART: [afmc] AUTHORITY.KEYID = 5
22,076,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,371,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,373,365 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,389,383 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,405,506 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,421,557 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,443,957 UART: [afmc] --
24,447,876 UART: [cold-reset] --
24,451,527 UART: [state] Locking Datavault
24,456,830 UART: [state] Locking PCR0, PCR1 and PCR31
24,458,522 UART: [state] Locking ICCM
24,460,375 UART: [exit] Launching FMC @ 0x40000130
24,469,041 UART:
24,469,275 UART: Running Caliptra FMC ...
24,470,296 UART:
24,470,435 UART: [state] CFI Enabled
24,478,419 UART: [fht] FMC Alias Private Key: 7
26,809,182 UART: [art] Extend RT PCRs Done
26,810,398 UART: [art] Lock RT PCRs Done
26,812,151 UART: [art] Populate DV Done
26,817,571 UART: [fht] FMC Alias Private Key: 7
26,819,209 UART: [art] Derive CDI
26,819,941 UART: [art] Store in in slot 0x4
26,862,637 UART: [art] Derive Key Pair
26,863,674 UART: [art] Store priv key in slot 0x5
30,104,975 UART: [art] Derive Key Pair - Done
30,118,075 UART: [art] Signing Cert with AUTHO
30,119,410 UART: RITY.KEYID = 7
32,399,092 UART: [art] Erasing AUTHORITY.KEYID = 7
32,400,602 UART: [art] PUB.X = 8780B8DADF641CC756535E1D8E4553BDDEE4D91E46918C9A921DD20171515BF9682A3E6DB631FD6DBF974E8C55519BF7
32,407,863 UART: [art] PUB.Y = E56B363440675C255DB0F3C032094590DE7DC086DB9438AF256184E8FCD0A712BBC4F96E0A1B838564EF1550E4C6813B
32,415,118 UART: [art] SIG.R = F442FAFED5C947B230F6F5F729E449D2024CB2D2BA31A244EBD9D4C5F3C25B522FABDDB53882DF30571BB82DCB26F105
32,422,528 UART: [art] SIG.S = 44C175484D3934D203EA364CDF075AAF73BDDA068FB0AB6F133F51C12135568510B48F672C5A2A722F7F5DC32A1DD0E4
33,726,475 UART: Caliptra RT
33,727,167 UART: [state] CFI Enabled
33,844,208 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,315 UART:
1,593 UART: Running Caliptra ROM ...
2,694 UART:
6,685,723 UART: [state] CFI Enabled
6,697,438 UART: [state] LifecycleState = Production
6,699,181 UART: [state] DebugLocked = Yes
6,701,998 UART: [state] Starting the WD Timer 40000000 cycles
6,707,993 UART: [kat] SHA2-256
6,889,936 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,901,505 UART: [kat] ++
6,902,010 UART: [kat] sha1
6,912,736 UART: [kat] SHA2-256
6,915,803 UART: [kat] SHA2-384
6,922,439 UART: [kat] SHA2-512-ACC
6,925,062 UART: [kat] ECC-384
10,179,743 UART: [kat] HMAC-384Kdf
10,192,408 UART: [kat] LMS
11,265,560 UART: [kat] --
11,270,168 UART: [warm-reset] ++
11,275,287 UART: [warm-reset] --
11,278,616 UART: [state] Locking Datavault
11,283,326 UART: [state] Locking PCR0, PCR1 and PCR31
11,285,462 UART: [state] Locking ICCM
11,287,911 UART: [exit] Launching FMC @ 0x40000130
11,296,578 UART:
11,296,807 UART: Running Caliptra FMC ...
11,297,821 UART:
11,297,957 UART: [state] CFI Enabled
11,299,949 UART: [aliasrt :skip pcr extension
11,301,186 UART: [art] Extend RT PCRs Done
11,302,313 UART: [art] Lock RT PCRs Done
11,303,386 UART: [art] Populate DV Done
11,308,947 UART: [fht] FMC Alias Private Key: 7
11,310,679 UART: [art] Derive CDI
11,311,497 UART: [art] Store in in slot 0x4
11,353,982 UART: [art] Derive Key Pair
11,354,979 UART: [art] Store priv key in slot 0x5
14,596,432 UART: [art] Derive Key Pair - Done
14,609,440 UART: [art] Signing Cert with AUTHO
14,610,748 UART: RITY.KEYID = 7
16,890,210 UART: [art] Erasing AUTHORITY.KEYID = 7
16,891,718 UART: [art] PUB.X = 8780B8DADF641CC756535E1D8E4553BDDEE4D91E46918C9A921DD20171515BF9682A3E6DB631FD6DBF974E8C55519BF7
16,899,007 UART: [art] PUB.Y = E56B363440675C255DB0F3C032094590DE7DC086DB9438AF256184E8FCD0A712BBC4F96E0A1B838564EF1550E4C6813B
16,906,209 UART: [art] SIG.R = F442FAFED5C947B230F6F5F729E449D2024CB2D2BA31A244EBD9D4C5F3C25B522FABDDB53882DF30571BB82DCB26F105
16,913,660 UART: [art] SIG.S = 44C175484D3934D203EA364CDF075AAF73BDDA068FB0AB6F133F51C12135568510B48F672C5A2A722F7F5DC32A1DD0E4
18,219,296 UART: Caliptra RT
18,219,981 UART: [state] CFI Enabled
18,508,580 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
191,558 UART:
191,940 UART: Running Caliptra ROM ...
193,036 UART:
193,181 UART: [state] CFI Enabled
262,619 UART: [state] LifecycleState = Production
264,428 UART: [state] DebugLocked = Yes
266,134 UART: [state] Starting the WD Timer 40000000 cycles
270,732 UART: [kat] SHA2-256
449,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,430 UART: [kat] ++
461,878 UART: [kat] sha1
473,980 UART: [kat] SHA2-256
477,064 UART: [kat] SHA2-384
483,629 UART: [kat] SHA2-512-ACC
486,568 UART: [kat] ECC-384
2,947,160 UART: [kat] HMAC-384Kdf
2,970,734 UART: [kat] LMS
3,500,208 UART: [kat] --
3,506,123 UART: [cold-reset] ++
3,507,553 UART: [fht] FHT @ 0x50003400
3,517,822 UART: [idev] ++
3,518,393 UART: [idev] CDI.KEYID = 6
3,519,277 UART: [idev] SUBJECT.KEYID = 7
3,520,481 UART: [idev] UDS.KEYID = 0
3,521,467 ready_for_fw is high
3,521,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,213 UART: [idev] Erasing UDS.KEYID = 0
6,028,332 UART: [idev] Sha1 KeyId Algorithm
6,051,092 UART: [idev] --
6,054,882 UART: [ldev] ++
6,055,465 UART: [ldev] CDI.KEYID = 6
6,056,354 UART: [ldev] SUBJECT.KEYID = 5
6,057,568 UART: [ldev] AUTHORITY.KEYID = 7
6,058,803 UART: [ldev] FE.KEYID = 1
6,099,724 UART: [ldev] Erasing FE.KEYID = 1
8,601,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,815 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,808 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,648 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,605 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,676 UART: [ldev] --
10,412,025 UART: [fwproc] Wait for Commands...
10,414,991 UART: [fwproc] Recv command 0x46574c44
10,417,094 UART: [fwproc] Recv'd Img size: 114084 bytes
13,854,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,995,684 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,313,279 >>> mbox cmd response: success
14,317,841 UART: [afmc] ++
14,318,431 UART: [afmc] CDI.KEYID = 6
14,319,317 UART: [afmc] SUBJECT.KEYID = 7
14,320,534 UART: [afmc] AUTHORITY.KEYID = 5
16,849,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,183 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,591,176 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,607,050 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,622,771 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,645,493 UART: [afmc] --
18,649,119 UART: [cold-reset] --
18,652,439 UART: [state] Locking Datavault
18,658,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,664 UART: [state] Locking ICCM
18,661,090 UART: [exit] Launching FMC @ 0x40000130
18,669,487 UART:
18,669,721 UART: Running Caliptra FMC ...
18,670,823 UART:
18,670,980 UART: [state] CFI Enabled
18,731,346 UART: [fht] FMC Alias Private Key: 7
20,495,174 UART: [art] Extend RT PCRs Done
20,496,379 UART: [art] Lock RT PCRs Done
20,497,922 UART: [art] Populate DV Done
20,503,191 UART: [fht] FMC Alias Private Key: 7
20,504,901 UART: [art] Derive CDI
20,505,636 UART: [art] Store in in slot 0x4
20,563,592 UART: [art] Derive Key Pair
20,564,628 UART: [art] Store priv key in slot 0x5
23,027,475 UART: [art] Derive Key Pair - Done
23,040,480 UART: [art] Signing Cert with AUTHO
23,041,795 UART: RITY.KEYID = 7
24,753,151 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,638 UART: [art] PUB.X = D27EB61EFF906CBB8FDA6474AE38C418258D84B0E30FB11540EEE92AEC7A78D65372B89E08BA2FA9CBE1D38635003626
24,761,940 UART: [art] PUB.Y = 12C9E398925C17948897C83FB5D8EB44D87732A003BED78C6F508152B1BC0D51AAFC224E685CB896F8056B91342B258B
24,769,199 UART: [art] SIG.R = 80DEA6B333FBF4EBBF96E4DFD8818B83B30E502AF21D50DC6243CF1E35C89EAA266AE77AF98629525A88ACD6FB1B1D31
24,776,609 UART: [art] SIG.S = 5E516E8E441250D29B893E228B6BAC04B42B7CECA3C41D7EF3CC467F249F9B56E0508B948C8B034E020E68E3902CFB72
25,755,789 UART: Caliptra RT
25,756,488 UART: [state] CFI Enabled
25,921,930 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,366 UART:
1,648 UART: Running Caliptra ROM ...
2,761 UART:
2,913 UART: [state] CFI Enabled
62,073 UART: [state] LifecycleState = Production
63,830 UART: [state] DebugLocked = Yes
66,759 UART: [state] Starting the WD Timer 40000000 cycles
72,398 UART: [kat] SHA2-256
251,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,116 UART: [kat] ++
263,563 UART: [kat] sha1
275,894 UART: [kat] SHA2-256
278,948 UART: [kat] SHA2-384
285,186 UART: [kat] SHA2-512-ACC
288,138 UART: [kat] ECC-384
2,749,577 UART: [kat] HMAC-384Kdf
2,771,421 UART: [kat] LMS
3,300,896 UART: [kat] --
3,303,712 UART: [warm-reset] ++
3,308,991 UART: [warm-reset] --
3,313,934 UART: [state] Locking Datavault
3,316,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,290 UART: [state] Locking ICCM
3,319,796 UART: [exit] Launching FMC @ 0x40000130
3,328,226 UART:
3,328,485 UART: Running Caliptra FMC ...
3,329,594 UART:
3,329,758 UART: [state] CFI Enabled
3,381,803 UART: [aliasrt :skip pcr extension
3,383,051 UART: [art] Extend RT PCRs Done
3,384,194 UART: [art] Lock RT PCRs Done
3,385,338 UART: [art] Populate DV Done
3,390,811 UART: [fht] FMC Alias Private Key: 7
3,392,403 UART: [art] Derive CDI
3,393,220 UART: [art] Store in in slot 0x4
3,450,527 UART: [art] Derive Key Pair
3,451,566 UART: [art] Store priv key in slot 0x5
5,914,144 UART: [art] Derive Key Pair - Done
5,927,195 UART: [art] Signing Cert with AUTHO
5,928,509 UART: RITY.KEYID = 7
7,639,782 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,412 UART: [art] PUB.X = D27EB61EFF906CBB8FDA6474AE38C418258D84B0E30FB11540EEE92AEC7A78D65372B89E08BA2FA9CBE1D38635003626
7,648,552 UART: [art] PUB.Y = 12C9E398925C17948897C83FB5D8EB44D87732A003BED78C6F508152B1BC0D51AAFC224E685CB896F8056B91342B258B
7,655,790 UART: [art] SIG.R = 80DEA6B333FBF4EBBF96E4DFD8818B83B30E502AF21D50DC6243CF1E35C89EAA266AE77AF98629525A88ACD6FB1B1D31
7,663,235 UART: [art] SIG.S = 5E516E8E441250D29B893E228B6BAC04B42B7CECA3C41D7EF3CC467F249F9B56E0508B948C8B034E020E68E3902CFB72
8,641,935 UART: Caliptra RT
8,642,626 UART: [state] CFI Enabled
8,979,486 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
191,618 UART:
191,990 UART: Running Caliptra ROM ...
193,117 UART:
193,264 UART: [state] CFI Enabled
261,961 UART: [state] LifecycleState = Production
263,757 UART: [state] DebugLocked = Yes
265,330 UART: [state] Starting the WD Timer 40000000 cycles
270,489 UART: [kat] SHA2-256
449,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,194 UART: [kat] ++
461,643 UART: [kat] sha1
472,326 UART: [kat] SHA2-256
475,342 UART: [kat] SHA2-384
482,043 UART: [kat] SHA2-512-ACC
484,980 UART: [kat] ECC-384
2,946,275 UART: [kat] HMAC-384Kdf
2,970,016 UART: [kat] LMS
3,499,486 UART: [kat] --
3,503,480 UART: [cold-reset] ++
3,504,418 UART: [fht] FHT @ 0x50003400
3,516,268 UART: [idev] ++
3,516,843 UART: [idev] CDI.KEYID = 6
3,517,755 UART: [idev] SUBJECT.KEYID = 7
3,519,000 UART: [idev] UDS.KEYID = 0
3,519,927 ready_for_fw is high
3,520,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,813 UART: [idev] Erasing UDS.KEYID = 0
6,024,337 UART: [idev] Sha1 KeyId Algorithm
6,046,336 UART: [idev] --
6,048,652 UART: [ldev] ++
6,049,229 UART: [ldev] CDI.KEYID = 6
6,050,118 UART: [ldev] SUBJECT.KEYID = 5
6,051,250 UART: [ldev] AUTHORITY.KEYID = 7
6,052,585 UART: [ldev] FE.KEYID = 1
6,097,673 UART: [ldev] Erasing FE.KEYID = 1
8,601,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,514 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,334,493 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,325 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,276 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,215 UART: [ldev] --
10,391,126 UART: [fwproc] Wait for Commands...
10,393,596 UART: [fwproc] Recv command 0x46574c44
10,395,686 UART: [fwproc] Recv'd Img size: 114084 bytes
13,825,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,286,295 >>> mbox cmd response: success
14,291,113 UART: [afmc] ++
14,291,706 UART: [afmc] CDI.KEYID = 6
14,292,591 UART: [afmc] SUBJECT.KEYID = 7
14,293,805 UART: [afmc] AUTHORITY.KEYID = 5
16,825,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,381 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,568,374 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,584,212 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,599,978 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,622,210 UART: [afmc] --
18,625,794 UART: [cold-reset] --
18,627,392 UART: [state] Locking Datavault
18,632,965 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,612 UART: [state] Locking ICCM
18,635,629 UART: [exit] Launching FMC @ 0x40000130
18,644,075 UART:
18,644,312 UART: Running Caliptra FMC ...
18,645,412 UART:
18,645,568 UART: [state] CFI Enabled
18,708,073 UART: [fht] FMC Alias Private Key: 7
20,472,200 UART: [art] Extend RT PCRs Done
20,473,407 UART: [art] Lock RT PCRs Done
20,475,213 UART: [art] Populate DV Done
20,480,731 UART: [fht] FMC Alias Private Key: 7
20,482,432 UART: [art] Derive CDI
20,483,241 UART: [art] Store in in slot 0x4
20,541,035 UART: [art] Derive Key Pair
20,542,078 UART: [art] Store priv key in slot 0x5
23,005,323 UART: [art] Derive Key Pair - Done
23,018,161 UART: [art] Signing Cert with AUTHO
23,019,470 UART: RITY.KEYID = 7
24,730,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,973 UART: [art] PUB.X = 213330894DDB70575E909F8E1E1685548913AC1DA04648F46514110C9D1B1DD714750C8917D8CB8C3CD14534B81DE751
24,739,280 UART: [art] PUB.Y = 4CDF10A195088400AF9733D04A3C957453641032B57B5C3F05F2B4A50AEFAC324CA7BEBFB411558A68DED62DAE17DD67
24,746,468 UART: [art] SIG.R = C2303DFBF0F455D8581E8BDEF1363CE0D821BD8E1F5029279E77FCB46E96A975328EC311CC05315D4FE4A20BC6AE4941
24,753,933 UART: [art] SIG.S = 840F165746374DC3E5054D5451924055304BC9F1762D3ED7C2D81AB8CF5067944F8F121A1837857CC34A05725F7D5235
25,732,412 UART: Caliptra RT
25,733,124 UART: [state] CFI Enabled
25,897,640 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,281 UART:
1,561 UART: Running Caliptra ROM ...
2,670 UART:
2,823 UART: [state] CFI Enabled
64,896 UART: [state] LifecycleState = Production
66,655 UART: [state] DebugLocked = Yes
68,664 UART: [state] Starting the WD Timer 40000000 cycles
73,077 UART: [kat] SHA2-256
252,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,778 UART: [kat] ++
264,314 UART: [kat] sha1
276,882 UART: [kat] SHA2-256
279,924 UART: [kat] SHA2-384
285,312 UART: [kat] SHA2-512-ACC
288,244 UART: [kat] ECC-384
2,746,854 UART: [kat] HMAC-384Kdf
2,771,227 UART: [kat] LMS
3,300,688 UART: [kat] --
3,304,965 UART: [warm-reset] ++
3,310,834 UART: [warm-reset] --
3,314,425 UART: [state] Locking Datavault
3,318,625 UART: [state] Locking PCR0, PCR1 and PCR31
3,320,281 UART: [state] Locking ICCM
3,322,245 UART: [exit] Launching FMC @ 0x40000130
3,330,699 UART:
3,330,939 UART: Running Caliptra FMC ...
3,331,968 UART:
3,332,137 UART: [state] CFI Enabled
3,380,612 UART: [aliasrt :skip pcr extension
3,381,869 UART: [art] Extend RT PCRs Done
3,382,930 UART: [art] Lock RT PCRs Done
3,383,994 UART: [art] Populate DV Done
3,389,266 UART: [fht] FMC Alias Private Key: 7
3,390,911 UART: [art] Derive CDI
3,391,730 UART: [art] Store in in slot 0x4
3,449,589 UART: [art] Derive Key Pair
3,450,629 UART: [art] Store priv key in slot 0x5
5,913,260 UART: [art] Derive Key Pair - Done
5,926,199 UART: [art] Signing Cert with AUTHO
5,927,507 UART: RITY.KEYID = 7
7,639,299 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,809 UART: [art] PUB.X = 213330894DDB70575E909F8E1E1685548913AC1DA04648F46514110C9D1B1DD714750C8917D8CB8C3CD14534B81DE751
7,648,045 UART: [art] PUB.Y = 4CDF10A195088400AF9733D04A3C957453641032B57B5C3F05F2B4A50AEFAC324CA7BEBFB411558A68DED62DAE17DD67
7,655,305 UART: [art] SIG.R = C2303DFBF0F455D8581E8BDEF1363CE0D821BD8E1F5029279E77FCB46E96A975328EC311CC05315D4FE4A20BC6AE4941
7,662,701 UART: [art] SIG.S = 840F165746374DC3E5054D5451924055304BC9F1762D3ED7C2D81AB8CF5067944F8F121A1837857CC34A05725F7D5235
8,641,238 UART: Caliptra RT
8,641,926 UART: [state] CFI Enabled
8,972,543 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
191,956 UART:
192,310 UART: Running Caliptra ROM ...
193,401 UART:
602,896 UART: [state] CFI Enabled
617,634 UART: [state] LifecycleState = Production
619,332 UART: [state] DebugLocked = Yes
621,389 UART: [state] Starting the WD Timer 40000000 cycles
625,690 UART: [kat] SHA2-256
804,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,355 UART: [kat] ++
816,885 UART: [kat] sha1
828,142 UART: [kat] SHA2-256
831,155 UART: [kat] SHA2-384
837,500 UART: [kat] SHA2-512-ACC
840,439 UART: [kat] ECC-384
3,284,379 UART: [kat] HMAC-384Kdf
3,296,327 UART: [kat] LMS
3,825,869 UART: [kat] --
3,830,360 UART: [cold-reset] ++
3,831,720 UART: [fht] FHT @ 0x50003400
3,842,121 UART: [idev] ++
3,842,688 UART: [idev] CDI.KEYID = 6
3,843,601 UART: [idev] SUBJECT.KEYID = 7
3,844,773 UART: [idev] UDS.KEYID = 0
3,845,820 ready_for_fw is high
3,846,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,313 UART: [idev] Erasing UDS.KEYID = 0
6,317,485 UART: [idev] Sha1 KeyId Algorithm
6,340,705 UART: [idev] --
6,344,966 UART: [ldev] ++
6,345,528 UART: [ldev] CDI.KEYID = 6
6,346,404 UART: [ldev] SUBJECT.KEYID = 5
6,347,615 UART: [ldev] AUTHORITY.KEYID = 7
6,348,900 UART: [ldev] FE.KEYID = 1
6,358,705 UART: [ldev] Erasing FE.KEYID = 1
8,832,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,533 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,512 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,375 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,289 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,618,894 UART: [ldev] --
10,623,851 UART: [fwproc] Wait for Commands...
10,625,878 UART: [fwproc] Recv command 0x46574c44
10,627,975 UART: [fwproc] Recv'd Img size: 114084 bytes
14,061,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,207,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,523,779 >>> mbox cmd response: success
14,528,866 UART: [afmc] ++
14,529,447 UART: [afmc] CDI.KEYID = 6
14,530,327 UART: [afmc] SUBJECT.KEYID = 7
14,531,489 UART: [afmc] AUTHORITY.KEYID = 5
17,025,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,108 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,763,111 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,778,946 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,794,720 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,817,189 UART: [afmc] --
18,821,264 UART: [cold-reset] --
18,824,255 UART: [state] Locking Datavault
18,828,845 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,547 UART: [state] Locking ICCM
18,831,885 UART: [exit] Launching FMC @ 0x40000130
18,840,276 UART:
18,840,506 UART: Running Caliptra FMC ...
18,841,602 UART:
18,841,759 UART: [state] CFI Enabled
18,850,071 UART: [fht] FMC Alias Private Key: 7
20,606,997 UART: [art] Extend RT PCRs Done
20,608,214 UART: [art] Lock RT PCRs Done
20,610,001 UART: [art] Populate DV Done
20,615,471 UART: [fht] FMC Alias Private Key: 7
20,617,088 UART: [art] Derive CDI
20,617,910 UART: [art] Store in in slot 0x4
20,660,499 UART: [art] Derive Key Pair
20,661,534 UART: [art] Store priv key in slot 0x5
23,088,446 UART: [art] Derive Key Pair - Done
23,101,599 UART: [art] Signing Cert with AUTHO
23,102,894 UART: RITY.KEYID = 7
24,807,841 UART: [art] Erasing AUTHORITY.KEYID = 7
24,809,341 UART: [art] PUB.X = F2A2BB9E27FB9EA4C986E9572CE7560A7CA49E6341B4C9447A1F0F5F5B846BB10A15417DCC49DB293932C15994A8CC44
24,816,650 UART: [art] PUB.Y = 47D71A909CB3E3DBF352EF59C08BAC3962E96801838705CB63E2B585C3432E24292A6C2DCD4AA3458B79112572B5265F
24,823,880 UART: [art] SIG.R = 8EFB08967573FB5FDC5192C4A323B77E419A1CAE9DAEBAA3EF83810428A0A8B0086E9F1EF864DE7E78FAA302BC20404E
24,831,332 UART: [art] SIG.S = 99C0E98E830A0BC4E7A2C1F2F90905844C0D0A33E54196A3DF7701E6CED25B872C7792EDFABAA5C78F701514A0B74BAB
25,810,058 UART: Caliptra RT
25,810,775 UART: [state] CFI Enabled
25,926,854 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,379 UART:
1,658 UART: Running Caliptra ROM ...
2,765 UART:
14,600,335 UART: [state] CFI Enabled
14,613,410 UART: [state] LifecycleState = Production
14,615,371 UART: [state] DebugLocked = Yes
14,618,157 UART: [state] Starting the WD Timer 40000000 cycles
14,622,464 UART: [kat] SHA2-256
14,801,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,813,193 UART: [kat] ++
14,813,694 UART: [kat] sha1
14,823,232 UART: [kat] SHA2-256
14,826,258 UART: [kat] SHA2-384
14,831,485 UART: [kat] SHA2-512-ACC
14,834,478 UART: [kat] ECC-384
17,275,451 UART: [kat] HMAC-384Kdf
17,288,014 UART: [kat] LMS
17,817,539 UART: [kat] --
17,821,800 UART: [warm-reset] ++
17,825,784 UART: [warm-reset] --
17,829,480 UART: [state] Locking Datavault
17,833,908 UART: [state] Locking PCR0, PCR1 and PCR31
17,835,557 UART: [state] Locking ICCM
17,837,456 UART: [exit] Launching FMC @ 0x40000130
17,845,910 UART:
17,846,142 UART: Running Caliptra FMC ...
17,847,242 UART:
17,847,403 UART: [state] CFI Enabled
17,849,344 UART: [aliasrt :skip pcr extension
17,850,584 UART: [art] Extend RT PCRs Done
17,851,716 UART: [art] Lock RT PCRs Done
17,852,881 UART: [art] Populate DV Done
17,858,523 UART: [fht] FMC Alias Private Key: 7
17,860,022 UART: [art] Derive CDI
17,860,989 UART: [art] Store in in slot 0x4
17,903,345 UART: [art] Derive Key Pair
17,904,600 UART: [art] Store priv key in slot 0x5
20,331,257 UART: [art] Derive Key Pair - Done
20,344,594 UART: [art] Signing Cert with AUTHO
20,345,898 UART: RITY.KEYID = 7
22,051,400 UART: [art] Erasing AUTHORITY.KEYID = 7
22,052,908 UART: [art] PUB.X = F2A2BB9E27FB9EA4C986E9572CE7560A7CA49E6341B4C9447A1F0F5F5B846BB10A15417DCC49DB293932C15994A8CC44
22,060,225 UART: [art] PUB.Y = 47D71A909CB3E3DBF352EF59C08BAC3962E96801838705CB63E2B585C3432E24292A6C2DCD4AA3458B79112572B5265F
22,067,434 UART: [art] SIG.R = 8EFB08967573FB5FDC5192C4A323B77E419A1CAE9DAEBAA3EF83810428A0A8B0086E9F1EF864DE7E78FAA302BC20404E
22,074,903 UART: [art] SIG.S = 99C0E98E830A0BC4E7A2C1F2F90905844C0D0A33E54196A3DF7701E6CED25B872C7792EDFABAA5C78F701514A0B74BAB
23,053,923 UART: Caliptra RT
23,054,634 UART: [state] CFI Enabled
23,345,775 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
191,820 UART:
192,170 UART: Running Caliptra ROM ...
193,358 UART:
603,092 UART: [state] CFI Enabled
617,171 UART: [state] LifecycleState = Production
618,882 UART: [state] DebugLocked = Yes
621,518 UART: [state] Starting the WD Timer 40000000 cycles
627,050 UART: [kat] SHA2-256
806,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,818 UART: [kat] ++
818,345 UART: [kat] sha1
829,835 UART: [kat] SHA2-256
832,907 UART: [kat] SHA2-384
839,251 UART: [kat] SHA2-512-ACC
842,186 UART: [kat] ECC-384
3,285,238 UART: [kat] HMAC-384Kdf
3,299,026 UART: [kat] LMS
3,828,575 UART: [kat] --
3,832,364 UART: [cold-reset] ++
3,834,440 UART: [fht] FHT @ 0x50003400
3,845,999 UART: [idev] ++
3,846,601 UART: [idev] CDI.KEYID = 6
3,847,534 UART: [idev] SUBJECT.KEYID = 7
3,848,711 UART: [idev] UDS.KEYID = 0
3,849,632 ready_for_fw is high
3,849,841 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,001 UART: [idev] Erasing UDS.KEYID = 0
6,319,604 UART: [idev] Sha1 KeyId Algorithm
6,343,772 UART: [idev] --
6,348,517 UART: [ldev] ++
6,349,089 UART: [ldev] CDI.KEYID = 6
6,349,999 UART: [ldev] SUBJECT.KEYID = 5
6,351,203 UART: [ldev] AUTHORITY.KEYID = 7
6,352,480 UART: [ldev] FE.KEYID = 1
6,363,171 UART: [ldev] Erasing FE.KEYID = 1
8,833,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,402 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,567,344 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,583,207 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,599,144 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,802 UART: [ldev] --
10,623,817 UART: [fwproc] Wait for Commands...
10,625,523 UART: [fwproc] Recv command 0x46574c44
10,627,633 UART: [fwproc] Recv'd Img size: 114084 bytes
14,053,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,124,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,193,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,511,297 >>> mbox cmd response: success
14,515,378 UART: [afmc] ++
14,515,966 UART: [afmc] CDI.KEYID = 6
14,516,849 UART: [afmc] SUBJECT.KEYID = 7
14,518,056 UART: [afmc] AUTHORITY.KEYID = 5
17,018,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,811 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,753,808 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,769,638 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,785,356 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,808,627 UART: [afmc] --
18,812,032 UART: [cold-reset] --
18,815,789 UART: [state] Locking Datavault
18,821,032 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,730 UART: [state] Locking ICCM
18,825,309 UART: [exit] Launching FMC @ 0x40000130
18,833,710 UART:
18,833,944 UART: Running Caliptra FMC ...
18,835,040 UART:
18,835,199 UART: [state] CFI Enabled
18,843,297 UART: [fht] FMC Alias Private Key: 7
20,600,332 UART: [art] Extend RT PCRs Done
20,601,536 UART: [art] Lock RT PCRs Done
20,603,132 UART: [art] Populate DV Done
20,608,479 UART: [fht] FMC Alias Private Key: 7
20,610,019 UART: [art] Derive CDI
20,610,755 UART: [art] Store in in slot 0x4
20,653,637 UART: [art] Derive Key Pair
20,654,694 UART: [art] Store priv key in slot 0x5
23,081,749 UART: [art] Derive Key Pair - Done
23,094,797 UART: [art] Signing Cert with AUTHO
23,096,091 UART: RITY.KEYID = 7
24,801,436 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,935 UART: [art] PUB.X = 6B668281CE7E934BA02B50BB2C2F8F7E50738269CB3D143E0E838988AEEAF71C7A260BA000E4BF9B2CFE42A8BA013BE7
24,810,192 UART: [art] PUB.Y = FE3AE826BCCE8A325C5292AE1DF5367F3DA99B83CA9211B68DB3898EB2F1FFBE908BD5EA90C5508D6EE219EC0F787466
24,817,543 UART: [art] SIG.R = 84419F8CB35EFBC7BE39BB199820567D7EFA674535750129755FFD56474E9B30E5DC1C410D952717B85FDDB49B897397
24,824,942 UART: [art] SIG.S = 28EAE68DAF8F383FBED881D97A430E30E5566714DE48E297925857BE61D4CCDD496DCEACD2D0259F9B41779950B52625
25,803,491 UART: Caliptra RT
25,804,189 UART: [state] CFI Enabled
25,921,321 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,369 UART:
1,658 UART: Running Caliptra ROM ...
2,786 UART:
14,607,281 UART: [state] CFI Enabled
14,617,431 UART: [state] LifecycleState = Production
14,619,125 UART: [state] DebugLocked = Yes
14,621,889 UART: [state] Starting the WD Timer 40000000 cycles
14,626,619 UART: [kat] SHA2-256
14,805,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,817,324 UART: [kat] ++
14,817,782 UART: [kat] sha1
14,828,389 UART: [kat] SHA2-256
14,831,392 UART: [kat] SHA2-384
14,838,665 UART: [kat] SHA2-512-ACC
14,841,605 UART: [kat] ECC-384
17,286,233 UART: [kat] HMAC-384Kdf
17,300,343 UART: [kat] LMS
17,829,896 UART: [kat] --
17,834,506 UART: [warm-reset] ++
17,839,489 UART: [warm-reset] --
17,842,873 UART: [state] Locking Datavault
17,844,933 UART: [state] Locking PCR0, PCR1 and PCR31
17,846,571 UART: [state] Locking ICCM
17,848,770 UART: [exit] Launching FMC @ 0x40000130
17,857,219 UART:
17,857,449 UART: Running Caliptra FMC ...
17,858,543 UART:
17,858,693 UART: [state] CFI Enabled
17,860,632 UART: [aliasrt :skip pcr extension
17,861,870 UART: [art] Extend RT PCRs Done
17,862,997 UART: [art] Lock RT PCRs Done
17,864,214 UART: [art] Populate DV Done
17,869,611 UART: [fht] FMC Alias Private Key: 7
17,871,139 UART: [art] Derive CDI
17,871,963 UART: [art] Store in in slot 0x4
17,914,609 UART: [art] Derive Key Pair
17,915,647 UART: [art] Store priv key in slot 0x5
20,342,663 UART: [art] Derive Key Pair - Done
20,355,811 UART: [art] Signing Cert with AUTHO
20,357,109 UART: RITY.KEYID = 7
22,062,448 UART: [art] Erasing AUTHORITY.KEYID = 7
22,063,959 UART: [art] PUB.X = 6B668281CE7E934BA02B50BB2C2F8F7E50738269CB3D143E0E838988AEEAF71C7A260BA000E4BF9B2CFE42A8BA013BE7
22,071,270 UART: [art] PUB.Y = FE3AE826BCCE8A325C5292AE1DF5367F3DA99B83CA9211B68DB3898EB2F1FFBE908BD5EA90C5508D6EE219EC0F787466
22,078,564 UART: [art] SIG.R = 84419F8CB35EFBC7BE39BB199820567D7EFA674535750129755FFD56474E9B30E5DC1C410D952717B85FDDB49B897397
22,085,929 UART: [art] SIG.S = 28EAE68DAF8F383FBED881D97A430E30E5566714DE48E297925857BE61D4CCDD496DCEACD2D0259F9B41779950B52625
23,065,128 UART: Caliptra RT
23,065,816 UART: [state] CFI Enabled
23,352,941 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
191,576 UART:
191,962 UART: Running Caliptra ROM ...
193,153 UART:
193,301 UART: [state] CFI Enabled
266,529 UART: [state] LifecycleState = Production
268,334 UART: [state] DebugLocked = Yes
269,690 UART: [state] Starting the WD Timer 40000000 cycles
274,789 UART: [kat] SHA2-256
453,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,494 UART: [kat] ++
466,025 UART: [kat] sha1
477,222 UART: [kat] SHA2-256
480,225 UART: [kat] SHA2-384
486,286 UART: [kat] SHA2-512-ACC
489,232 UART: [kat] ECC-384
2,948,094 UART: [kat] HMAC-384Kdf
2,970,997 UART: [kat] LMS
3,500,490 UART: [kat] --
3,506,480 UART: [cold-reset] ++
3,509,129 UART: [fht] FHT @ 0x50003400
3,520,602 UART: [idev] ++
3,521,165 UART: [idev] CDI.KEYID = 6
3,522,214 UART: [idev] SUBJECT.KEYID = 7
3,523,322 UART: [idev] UDS.KEYID = 0
3,524,263 ready_for_fw is high
3,524,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,950 UART: [idev] Erasing UDS.KEYID = 0
6,027,160 UART: [idev] Sha1 KeyId Algorithm
6,049,668 UART: [idev] --
6,052,584 UART: [ldev] ++
6,053,157 UART: [ldev] CDI.KEYID = 6
6,054,067 UART: [ldev] SUBJECT.KEYID = 5
6,055,232 UART: [ldev] AUTHORITY.KEYID = 7
6,056,543 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,597,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,671 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,334,659 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,490 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,448 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,386,299 UART: [ldev] --
10,391,458 UART: [fwproc] Wait for Commands...
10,394,577 UART: [fwproc] Recv command 0x46574c44
10,396,668 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,279,398 >>> mbox cmd response: success
14,283,596 UART: [afmc] ++
14,284,207 UART: [afmc] CDI.KEYID = 6
14,285,119 UART: [afmc] SUBJECT.KEYID = 7
14,286,276 UART: [afmc] AUTHORITY.KEYID = 5
16,826,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,062 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,570,063 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,585,939 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,601,655 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,623,408 UART: [afmc] --
18,626,939 UART: [cold-reset] --
18,631,563 UART: [state] Locking Datavault
18,635,731 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,372 UART: [state] Locking ICCM
18,639,087 UART: [exit] Launching FMC @ 0x40000130
18,647,481 UART:
18,647,734 UART: Running Caliptra FMC ...
18,648,839 UART:
18,648,994 UART: [state] CFI Enabled
18,711,636 UART: [fht] FMC Alias Private Key: 7
20,475,537 UART: [art] Extend RT PCRs Done
20,476,765 UART: [art] Lock RT PCRs Done
20,478,495 UART: [art] Populate DV Done
20,483,801 UART: [fht] FMC Alias Private Key: 7
20,485,445 UART: [art] Derive CDI
20,486,256 UART: [art] Store in in slot 0x4
20,545,347 UART: [art] Derive Key Pair
20,546,394 UART: [art] Store priv key in slot 0x5
23,008,908 UART: [art] Derive Key Pair - Done
23,022,177 UART: [art] Signing Cert with AUTHO
23,023,481 UART: RITY.KEYID = 7
24,734,980 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,507 UART: [art] PUB.X = 7BB2E7F18AC30D3AB574D2E181E8B6163E865C6BD35FEC4922CCB2B5CBF20D4F486607FA54547682716B757A62760D2B
24,743,756 UART: [art] PUB.Y = 99787DFC0E9F46129C3DEF341B7A23B55E61909E8BD634FC64C73594E852B60B0EE1E9CF3FB21E77DE7D88894FADEC06
24,751,015 UART: [art] SIG.R = B70FC17240F1B0C76F05274CCD53CAE67301A4663CC56EE712AE61EAFA69012A6E7CD15A6A54D03C6F77A4D42BA9CA4F
24,758,420 UART: [art] SIG.S = 94D2DEA3D7023F2BDC4ED2C83664259924BB0131003355E76F303602E44F85FC0745D9DF83FD75DD81D590BF4BFCA6B7
25,736,806 UART: Caliptra RT
25,737,515 UART: [state] CFI Enabled
25,901,394 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,298 UART:
1,583 UART: Running Caliptra ROM ...
2,698 UART:
2,855 UART: [state] CFI Enabled
65,789 UART: [state] LifecycleState = Production
67,551 UART: [state] DebugLocked = Yes
69,888 UART: [state] Starting the WD Timer 40000000 cycles
74,449 UART: [kat] SHA2-256
253,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,188 UART: [kat] ++
265,723 UART: [kat] sha1
276,447 UART: [kat] SHA2-256
279,460 UART: [kat] SHA2-384
286,032 UART: [kat] SHA2-512-ACC
289,006 UART: [kat] ECC-384
2,749,161 UART: [kat] HMAC-384Kdf
2,771,300 UART: [kat] LMS
3,300,774 UART: [kat] --
3,305,354 UART: [warm-reset] ++
3,310,521 UART: [warm-reset] --
3,314,055 UART: [state] Locking Datavault
3,316,017 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,670 UART: [state] Locking ICCM
3,318,742 UART: [exit] Launching FMC @ 0x40000130
3,327,156 UART:
3,327,434 UART: Running Caliptra FMC ...
3,328,544 UART:
3,328,702 UART: [state] CFI Enabled
3,382,469 UART: [aliasrt :skip pcr extension
3,383,724 UART: [art] Extend RT PCRs Done
3,384,862 UART: [art] Lock RT PCRs Done
3,386,198 UART: [art] Populate DV Done
3,391,653 UART: [fht] FMC Alias Private Key: 7
3,393,344 UART: [art] Derive CDI
3,394,155 UART: [art] Store in in slot 0x4
3,450,976 UART: [art] Derive Key Pair
3,452,018 UART: [art] Store priv key in slot 0x5
5,914,710 UART: [art] Derive Key Pair - Done
5,927,657 UART: [art] Signing Cert with AUTHO
5,928,962 UART: RITY.KEYID = 7
7,640,352 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,997 UART: [art] PUB.X = 7BB2E7F18AC30D3AB574D2E181E8B6163E865C6BD35FEC4922CCB2B5CBF20D4F486607FA54547682716B757A62760D2B
7,649,131 UART: [art] PUB.Y = 99787DFC0E9F46129C3DEF341B7A23B55E61909E8BD634FC64C73594E852B60B0EE1E9CF3FB21E77DE7D88894FADEC06
7,656,429 UART: [art] SIG.R = B70FC17240F1B0C76F05274CCD53CAE67301A4663CC56EE712AE61EAFA69012A6E7CD15A6A54D03C6F77A4D42BA9CA4F
7,663,829 UART: [art] SIG.S = 94D2DEA3D7023F2BDC4ED2C83664259924BB0131003355E76F303602E44F85FC0745D9DF83FD75DD81D590BF4BFCA6B7
8,642,793 UART: Caliptra RT
8,643,516 UART: [state] CFI Enabled
8,979,366 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,528 UART:
191,902 UART: Running Caliptra ROM ...
193,301 UART:
193,462 UART: [state] CFI Enabled
264,531 UART: [state] LifecycleState = Production
266,291 UART: [state] DebugLocked = Yes
267,786 UART: [state] Starting the WD Timer 40000000 cycles
273,342 UART: [kat] SHA2-256
452,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,026 UART: [kat] ++
464,562 UART: [kat] sha1
475,540 UART: [kat] SHA2-256
478,556 UART: [kat] SHA2-384
483,553 UART: [kat] SHA2-512-ACC
486,487 UART: [kat] ECC-384
2,946,841 UART: [kat] HMAC-384Kdf
2,971,755 UART: [kat] LMS
3,501,230 UART: [kat] --
3,507,181 UART: [cold-reset] ++
3,508,693 UART: [fht] FHT @ 0x50003400
3,519,107 UART: [idev] ++
3,519,668 UART: [idev] CDI.KEYID = 6
3,520,575 UART: [idev] SUBJECT.KEYID = 7
3,521,747 UART: [idev] UDS.KEYID = 0
3,522,795 ready_for_fw is high
3,522,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,534 UART: [idev] Erasing UDS.KEYID = 0
6,025,986 UART: [idev] Sha1 KeyId Algorithm
6,048,522 UART: [idev] --
6,051,795 UART: [ldev] ++
6,052,377 UART: [ldev] CDI.KEYID = 6
6,053,288 UART: [ldev] SUBJECT.KEYID = 5
6,054,551 UART: [ldev] AUTHORITY.KEYID = 7
6,055,690 UART: [ldev] FE.KEYID = 1
6,099,168 UART: [ldev] Erasing FE.KEYID = 1
8,604,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,583 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,543 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,369 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,358 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,231 UART: [ldev] --
10,415,549 UART: [fwproc] Wait for Commands...
10,417,212 UART: [fwproc] Recv command 0x46574c44
10,419,306 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,003,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,321,329 >>> mbox cmd response: success
14,325,795 UART: [afmc] ++
14,326,382 UART: [afmc] CDI.KEYID = 6
14,327,281 UART: [afmc] SUBJECT.KEYID = 7
14,328,501 UART: [afmc] AUTHORITY.KEYID = 5
16,874,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,489 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,615,427 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,631,283 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,647,032 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,669,865 UART: [afmc] --
18,673,011 UART: [cold-reset] --
18,677,138 UART: [state] Locking Datavault
18,683,204 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,852 UART: [state] Locking ICCM
18,686,731 UART: [exit] Launching FMC @ 0x40000130
18,695,129 UART:
18,695,369 UART: Running Caliptra FMC ...
18,696,495 UART:
18,696,664 UART: [state] CFI Enabled
18,754,760 UART: [fht] FMC Alias Private Key: 7
20,518,849 UART: [art] Extend RT PCRs Done
20,520,077 UART: [art] Lock RT PCRs Done
20,521,542 UART: [art] Populate DV Done
20,526,739 UART: [fht] FMC Alias Private Key: 7
20,528,278 UART: [art] Derive CDI
20,529,039 UART: [art] Store in in slot 0x4
20,588,403 UART: [art] Derive Key Pair
20,589,396 UART: [art] Store priv key in slot 0x5
23,052,413 UART: [art] Derive Key Pair - Done
23,065,538 UART: [art] Signing Cert with AUTHO
23,066,856 UART: RITY.KEYID = 7
24,778,834 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,338 UART: [art] PUB.X = 005CDEF54ABB2D112F742294554D6281F2D1823612DBA2F205DF90E71E8FB1021B850F595E79349D29DC607F17F9DC1E
24,787,604 UART: [art] PUB.Y = EEA84EA8EEAF5BAD017BB6242A00A7ED841CB0F65763F621B0E63B6386F5C0BED006C67D57F91B7BE53C536E4E641985
24,794,830 UART: [art] SIG.R = 43D8CE0D3472FB15294DE663A5D6AB3E97967B00981135A4D143F2A78252481285FD49C2EFD769A04286AC1CB95DA067
24,802,227 UART: [art] SIG.S = 589812C9DD7A9C5FB2035A01C031E9A0EC9704FC8B18F0CAF82D791101AF45BB5C48CDAB8AE5F5EC11174A625C7B2DC5
25,781,053 UART: Caliptra RT
25,781,759 UART: [state] CFI Enabled
25,946,873 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,277 UART:
1,565 UART: Running Caliptra ROM ...
2,679 UART:
2,834 UART: [state] CFI Enabled
65,368 UART: [state] LifecycleState = Production
67,107 UART: [state] DebugLocked = Yes
68,464 UART: [state] Starting the WD Timer 40000000 cycles
74,162 UART: [kat] SHA2-256
253,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,901 UART: [kat] ++
265,436 UART: [kat] sha1
277,182 UART: [kat] SHA2-256
280,192 UART: [kat] SHA2-384
286,813 UART: [kat] SHA2-512-ACC
289,743 UART: [kat] ECC-384
2,750,250 UART: [kat] HMAC-384Kdf
2,772,261 UART: [kat] LMS
3,301,715 UART: [kat] --
3,307,808 UART: [warm-reset] ++
3,312,919 UART: [warm-reset] --
3,318,076 UART: [state] Locking Datavault
3,320,304 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,951 UART: [state] Locking ICCM
3,323,779 UART: [exit] Launching FMC @ 0x40000130
3,332,235 UART:
3,332,492 UART: Running Caliptra FMC ...
3,333,599 UART:
3,333,764 UART: [state] CFI Enabled
3,381,053 UART: [aliasrt :skip pcr extension
3,382,340 UART: [art] Extend RT PCRs Done
3,383,486 UART: [art] Lock RT PCRs Done
3,384,881 UART: [art] Populate DV Done
3,390,556 UART: [fht] FMC Alias Private Key: 7
3,392,144 UART: [art] Derive CDI
3,392,956 UART: [art] Store in in slot 0x4
3,449,775 UART: [art] Derive Key Pair
3,450,805 UART: [art] Store priv key in slot 0x5
5,913,761 UART: [art] Derive Key Pair - Done
5,926,791 UART: [art] Signing Cert with AUTHO
5,928,123 UART: RITY.KEYID = 7
7,639,799 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,334 UART: [art] PUB.X = 005CDEF54ABB2D112F742294554D6281F2D1823612DBA2F205DF90E71E8FB1021B850F595E79349D29DC607F17F9DC1E
7,648,581 UART: [art] PUB.Y = EEA84EA8EEAF5BAD017BB6242A00A7ED841CB0F65763F621B0E63B6386F5C0BED006C67D57F91B7BE53C536E4E641985
7,655,825 UART: [art] SIG.R = 43D8CE0D3472FB15294DE663A5D6AB3E97967B00981135A4D143F2A78252481285FD49C2EFD769A04286AC1CB95DA067
7,663,221 UART: [art] SIG.S = 589812C9DD7A9C5FB2035A01C031E9A0EC9704FC8B18F0CAF82D791101AF45BB5C48CDAB8AE5F5EC11174A625C7B2DC5
8,642,179 UART: Caliptra RT
8,642,870 UART: [state] CFI Enabled
8,978,901 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
191,937 UART:
192,310 UART: Running Caliptra ROM ...
193,501 UART:
603,129 UART: [state] CFI Enabled
615,591 UART: [state] LifecycleState = Production
617,360 UART: [state] DebugLocked = Yes
619,773 UART: [state] Starting the WD Timer 40000000 cycles
624,809 UART: [kat] SHA2-256
803,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,505 UART: [kat] ++
815,950 UART: [kat] sha1
826,649 UART: [kat] SHA2-256
829,691 UART: [kat] SHA2-384
835,325 UART: [kat] SHA2-512-ACC
838,255 UART: [kat] ECC-384
3,280,371 UART: [kat] HMAC-384Kdf
3,291,547 UART: [kat] LMS
3,821,008 UART: [kat] --
3,826,465 UART: [cold-reset] ++
3,828,254 UART: [fht] FHT @ 0x50003400
3,840,859 UART: [idev] ++
3,841,416 UART: [idev] CDI.KEYID = 6
3,842,437 UART: [idev] SUBJECT.KEYID = 7
3,843,534 UART: [idev] UDS.KEYID = 0
3,844,574 ready_for_fw is high
3,844,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,141 UART: [idev] Erasing UDS.KEYID = 0
6,314,825 UART: [idev] Sha1 KeyId Algorithm
6,337,424 UART: [idev] --
6,340,023 UART: [ldev] ++
6,340,632 UART: [ldev] CDI.KEYID = 6
6,341,566 UART: [ldev] SUBJECT.KEYID = 5
6,342,673 UART: [ldev] AUTHORITY.KEYID = 7
6,343,955 UART: [ldev] FE.KEYID = 1
6,355,192 UART: [ldev] Erasing FE.KEYID = 1
8,830,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,391 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,363 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,176 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,142 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,692 UART: [ldev] --
10,620,946 UART: [fwproc] Wait for Commands...
10,622,763 UART: [fwproc] Recv command 0x46574c44
10,624,796 UART: [fwproc] Recv'd Img size: 114084 bytes
14,060,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,205,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,523,578 >>> mbox cmd response: success
14,527,348 UART: [afmc] ++
14,527,928 UART: [afmc] CDI.KEYID = 6
14,528,805 UART: [afmc] SUBJECT.KEYID = 7
14,530,012 UART: [afmc] AUTHORITY.KEYID = 5
17,028,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,751,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,753,211 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,769,222 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,785,045 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,800,768 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,824,409 UART: [afmc] --
18,828,628 UART: [cold-reset] --
18,832,819 UART: [state] Locking Datavault
18,838,550 UART: [state] Locking PCR0, PCR1 and PCR31
18,840,188 UART: [state] Locking ICCM
18,841,464 UART: [exit] Launching FMC @ 0x40000130
18,849,908 UART:
18,850,139 UART: Running Caliptra FMC ...
18,851,161 UART:
18,851,306 UART: [state] CFI Enabled
18,859,510 UART: [fht] FMC Alias Private Key: 7
20,616,799 UART: [art] Extend RT PCRs Done
20,618,022 UART: [art] Lock RT PCRs Done
20,619,726 UART: [art] Populate DV Done
20,625,132 UART: [fht] FMC Alias Private Key: 7
20,626,615 UART: [art] Derive CDI
20,627,376 UART: [art] Store in in slot 0x4
20,670,292 UART: [art] Derive Key Pair
20,671,325 UART: [art] Store priv key in slot 0x5
23,097,969 UART: [art] Derive Key Pair - Done
23,110,908 UART: [art] Signing Cert with AUTHO
23,112,220 UART: RITY.KEYID = 7
24,817,617 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,256 UART: [art] PUB.X = 68C6E93C2EB83D309B0F42C3CFB16B23ADAA6DA30016862FBE573FFBBBFB313434E92E3307C02456744DA41E3C0AEDD6
24,826,407 UART: [art] PUB.Y = 70C80E1C08A56E0869CECBF23317CEDD74BDBF317FF31E45EF03E884D27B0B48E5FA621CFC7CBE02D0189DEF8AF0284A
24,833,700 UART: [art] SIG.R = 1F912544BC211B09C997506DAC5A93A207416538E2041D3BBE7D0DCCDB258DB04D5E3804C2757B098FE8BC169CCE6064
24,841,047 UART: [art] SIG.S = 9F38D18839D1E15E45D7697D5CCD79FCD007F92BF62554AC791D8346F23BBF0AF77F9EA3B9C008B41EF8A3665FE7EFD8
25,820,622 UART: Caliptra RT
25,821,330 UART: [state] CFI Enabled
25,937,844 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,303 UART:
1,577 UART: Running Caliptra ROM ...
2,682 UART:
14,593,897 UART: [state] CFI Enabled
14,605,207 UART: [state] LifecycleState = Production
14,606,892 UART: [state] DebugLocked = Yes
14,609,062 UART: [state] Starting the WD Timer 40000000 cycles
14,613,901 UART: [kat] SHA2-256
14,793,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,804,633 UART: [kat] ++
14,805,095 UART: [kat] sha1
14,814,958 UART: [kat] SHA2-256
14,817,963 UART: [kat] SHA2-384
14,825,029 UART: [kat] SHA2-512-ACC
14,827,966 UART: [kat] ECC-384
17,269,154 UART: [kat] HMAC-384Kdf
17,281,480 UART: [kat] LMS
17,811,044 UART: [kat] --
17,817,245 UART: [warm-reset] ++
17,823,116 UART: [warm-reset] --
17,828,862 UART: [state] Locking Datavault
17,831,629 UART: [state] Locking PCR0, PCR1 and PCR31
17,833,291 UART: [state] Locking ICCM
17,834,851 UART: [exit] Launching FMC @ 0x40000130
17,843,305 UART:
17,843,577 UART: Running Caliptra FMC ...
17,844,685 UART:
17,844,845 UART: [state] CFI Enabled
17,846,841 UART: [aliasrt :skip pcr extension
17,848,081 UART: [art] Extend RT PCRs Done
17,849,215 UART: [art] Lock RT PCRs Done
17,850,656 UART: [art] Populate DV Done
17,856,058 UART: [fht] FMC Alias Private Key: 7
17,857,746 UART: [art] Derive CDI
17,858,478 UART: [art] Store in in slot 0x4
17,901,340 UART: [art] Derive Key Pair
17,902,331 UART: [art] Store priv key in slot 0x5
20,329,255 UART: [art] Derive Key Pair - Done
20,342,054 UART: [art] Signing Cert with AUTHO
20,343,361 UART: RITY.KEYID = 7
22,048,614 UART: [art] Erasing AUTHORITY.KEYID = 7
22,050,116 UART: [art] PUB.X = 68C6E93C2EB83D309B0F42C3CFB16B23ADAA6DA30016862FBE573FFBBBFB313434E92E3307C02456744DA41E3C0AEDD6
22,057,450 UART: [art] PUB.Y = 70C80E1C08A56E0869CECBF23317CEDD74BDBF317FF31E45EF03E884D27B0B48E5FA621CFC7CBE02D0189DEF8AF0284A
22,064,751 UART: [art] SIG.R = 1F912544BC211B09C997506DAC5A93A207416538E2041D3BBE7D0DCCDB258DB04D5E3804C2757B098FE8BC169CCE6064
22,072,093 UART: [art] SIG.S = 9F38D18839D1E15E45D7697D5CCD79FCD007F92BF62554AC791D8346F23BBF0AF77F9EA3B9C008B41EF8A3665FE7EFD8
23,050,665 UART: Caliptra RT
23,051,372 UART: [state] CFI Enabled
23,335,201 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,049 UART:
192,412 UART: Running Caliptra ROM ...
193,600 UART:
603,007 UART: [state] CFI Enabled
615,595 UART: [state] LifecycleState = Production
617,342 UART: [state] DebugLocked = Yes
619,977 UART: [state] Starting the WD Timer 40000000 cycles
623,948 UART: [kat] SHA2-256
803,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,685 UART: [kat] ++
815,218 UART: [kat] sha1
826,407 UART: [kat] SHA2-256
829,416 UART: [kat] SHA2-384
834,974 UART: [kat] SHA2-512-ACC
837,906 UART: [kat] ECC-384
3,278,924 UART: [kat] HMAC-384Kdf
3,290,745 UART: [kat] LMS
3,820,269 UART: [kat] --
3,824,427 UART: [cold-reset] ++
3,826,355 UART: [fht] FHT @ 0x50003400
3,837,544 UART: [idev] ++
3,838,100 UART: [idev] CDI.KEYID = 6
3,838,980 UART: [idev] SUBJECT.KEYID = 7
3,840,222 UART: [idev] UDS.KEYID = 0
3,841,119 ready_for_fw is high
3,841,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,662 UART: [idev] Erasing UDS.KEYID = 0
6,318,979 UART: [idev] Sha1 KeyId Algorithm
6,341,951 UART: [idev] --
6,345,079 UART: [ldev] ++
6,345,648 UART: [ldev] CDI.KEYID = 6
6,346,556 UART: [ldev] SUBJECT.KEYID = 5
6,347,789 UART: [ldev] AUTHORITY.KEYID = 7
6,349,017 UART: [ldev] FE.KEYID = 1
6,358,745 UART: [ldev] Erasing FE.KEYID = 1
8,835,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,729 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,567 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,505 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,288 UART: [ldev] --
10,625,009 UART: [fwproc] Wait for Commands...
10,627,973 UART: [fwproc] Recv command 0x46574c44
10,630,062 UART: [fwproc] Recv'd Img size: 114084 bytes
14,059,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,134,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,203,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,521,092 >>> mbox cmd response: success
14,525,525 UART: [afmc] ++
14,526,110 UART: [afmc] CDI.KEYID = 6
14,527,020 UART: [afmc] SUBJECT.KEYID = 7
14,528,235 UART: [afmc] AUTHORITY.KEYID = 5
17,030,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,748,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,750,074 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,766,090 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,781,909 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,797,650 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,821,140 UART: [afmc] --
18,825,315 UART: [cold-reset] --
18,827,934 UART: [state] Locking Datavault
18,832,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,834,054 UART: [state] Locking ICCM
18,836,043 UART: [exit] Launching FMC @ 0x40000130
18,844,460 UART:
18,844,698 UART: Running Caliptra FMC ...
18,845,744 UART:
18,845,896 UART: [state] CFI Enabled
18,854,431 UART: [fht] FMC Alias Private Key: 7
20,610,756 UART: [art] Extend RT PCRs Done
20,611,972 UART: [art] Lock RT PCRs Done
20,613,539 UART: [art] Populate DV Done
20,618,876 UART: [fht] FMC Alias Private Key: 7
20,620,475 UART: [art] Derive CDI
20,621,287 UART: [art] Store in in slot 0x4
20,663,284 UART: [art] Derive Key Pair
20,664,277 UART: [art] Store priv key in slot 0x5
23,090,710 UART: [art] Derive Key Pair - Done
23,103,668 UART: [art] Signing Cert with AUTHO
23,105,027 UART: RITY.KEYID = 7
24,810,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,947 UART: [art] PUB.X = F86AE78F60753A66A4253F96F73D0B00B0EC6A964DEDC1E950313EC8D1F6BC4C67F6E70E2F5CC0A2058C4192E9DCE22A
24,819,210 UART: [art] PUB.Y = 35D75BB9594A82328FC89422AFFC1440862FFDE988D239C2C3813B97FE95596E83650ECB1F141B3337B54A31958EB37A
24,826,460 UART: [art] SIG.R = 95F767EE42B9CF1C748B6C93A3F22BD1AA426F0322870AF28893DF2C2E7EDA2C731DC3AC00A571D1A312981F86BA44D7
24,833,869 UART: [art] SIG.S = 933E602AA5E0DBFF890AB1D7CEC092272A66025E21489455B33DC77CA9C09A71BBC3BA69AD68813052C6D60D886935A5
25,812,531 UART: Caliptra RT
25,813,239 UART: [state] CFI Enabled
25,930,575 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,319 UART:
1,599 UART: Running Caliptra ROM ...
2,705 UART:
14,594,826 UART: [state] CFI Enabled
14,605,989 UART: [state] LifecycleState = Production
14,607,711 UART: [state] DebugLocked = Yes
14,609,781 UART: [state] Starting the WD Timer 40000000 cycles
14,614,866 UART: [kat] SHA2-256
14,793,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,805,539 UART: [kat] ++
14,806,071 UART: [kat] sha1
14,817,557 UART: [kat] SHA2-256
14,820,559 UART: [kat] SHA2-384
14,826,049 UART: [kat] SHA2-512-ACC
14,829,045 UART: [kat] ECC-384
17,272,549 UART: [kat] HMAC-384Kdf
17,285,244 UART: [kat] LMS
17,814,795 UART: [kat] --
17,819,638 UART: [warm-reset] ++
17,826,522 UART: [warm-reset] --
17,828,699 UART: [state] Locking Datavault
17,833,130 UART: [state] Locking PCR0, PCR1 and PCR31
17,834,822 UART: [state] Locking ICCM
17,836,747 UART: [exit] Launching FMC @ 0x40000130
17,845,194 UART:
17,845,428 UART: Running Caliptra FMC ...
17,846,463 UART:
17,846,607 UART: [state] CFI Enabled
17,848,546 UART: [aliasrt :skip pcr extension
17,849,782 UART: [art] Extend RT PCRs Done
17,850,841 UART: [art] Lock RT PCRs Done
17,852,442 UART: [art] Populate DV Done
17,858,159 UART: [fht] FMC Alias Private Key: 7
17,859,743 UART: [art] Derive CDI
17,860,548 UART: [art] Store in in slot 0x4
17,903,190 UART: [art] Derive Key Pair
17,904,227 UART: [art] Store priv key in slot 0x5
20,331,574 UART: [art] Derive Key Pair - Done
20,344,407 UART: [art] Signing Cert with AUTHO
20,345,730 UART: RITY.KEYID = 7
22,051,137 UART: [art] Erasing AUTHORITY.KEYID = 7
22,052,635 UART: [art] PUB.X = F86AE78F60753A66A4253F96F73D0B00B0EC6A964DEDC1E950313EC8D1F6BC4C67F6E70E2F5CC0A2058C4192E9DCE22A
22,059,953 UART: [art] PUB.Y = 35D75BB9594A82328FC89422AFFC1440862FFDE988D239C2C3813B97FE95596E83650ECB1F141B3337B54A31958EB37A
22,067,152 UART: [art] SIG.R = 95F767EE42B9CF1C748B6C93A3F22BD1AA426F0322870AF28893DF2C2E7EDA2C731DC3AC00A571D1A312981F86BA44D7
22,074,566 UART: [art] SIG.S = 933E602AA5E0DBFF890AB1D7CEC092272A66025E21489455B33DC77CA9C09A71BBC3BA69AD68813052C6D60D886935A5
23,053,323 UART: Caliptra RT
23,054,031 UART: [state] CFI Enabled
23,340,721 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Production
85,585 UART: [state] DebugLocked = Yes
86,335 UART: [state] Starting the WD Timer 40000000 cycles
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,804 UART: [kat] SHA2-512-ACC
906,705 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 ready_for_fw is high
1,174,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,405 UART: [idev] Erasing UDS.KEYID = 0
1,199,950 UART: [idev] Sha1 KeyId Algorithm
1,208,779 UART: [idev] --
1,209,828 UART: [ldev] ++
1,209,996 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,787 UART: [ldev] AUTHORITY.KEYID = 7
1,211,250 UART: [ldev] FE.KEYID = 1
1,216,700 UART: [ldev] Erasing FE.KEYID = 1
1,242,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,001 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,695 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,565 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,271 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,283 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x46574c44
1,282,933 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,810 >>> mbox cmd response: success
2,794,832 UART: [afmc] ++
2,795,000 UART: [afmc] CDI.KEYID = 6
2,795,363 UART: [afmc] SUBJECT.KEYID = 7
2,795,789 UART: [afmc] AUTHORITY.KEYID = 5
2,830,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,846,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,847,589 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,308 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,201 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,864,908 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,872,861 UART: [afmc] --
2,873,776 UART: [cold-reset] --
2,874,826 UART: [state] Locking Datavault
2,875,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,565 UART: [state] Locking ICCM
2,877,071 UART: [exit] Launching FMC @ 0x40000130
2,882,400 UART:
2,882,416 UART: Running Caliptra FMC ...
2,882,824 UART:
2,882,878 UART: [state] CFI Enabled
2,893,493 UART: [fht] FMC Alias Private Key: 7
3,001,374 UART: [art] Extend RT PCRs Done
3,001,802 UART: [art] Lock RT PCRs Done
3,003,254 UART: [art] Populate DV Done
3,011,184 UART: [fht] FMC Alias Private Key: 7
3,012,320 UART: [art] Derive CDI
3,012,600 UART: [art] Store in in slot 0x4
3,098,323 UART: [art] Derive Key Pair
3,098,683 UART: [art] Store priv key in slot 0x5
3,111,127 UART: [art] Derive Key Pair - Done
3,126,029 UART: [art] Signing Cert with AUTHO
3,126,509 UART: RITY.KEYID = 7
3,141,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,142,270 UART: [art] PUB.X = AF1E7222CEFF7307410F4386DC045BA1A8D5C1B65709DF319A03058C980143C29E592BD6042C4EBD7A62E78EC59B75C8
3,149,022 UART: [art] PUB.Y = 73BF575A4F7469BBD1B080B5BCFCD412B9E245DAEF03D453DDBA2B3C92475AC4582C02EA30468E460EDDBC1CC7D94063
3,155,983 UART: [art] SIG.R = 267DF5707DAF7B1677419273C135BECA13DB79A017FA8DFBA1A1CAC55BE60076477304BEF885AC5DADC1F6ED290FDF66
3,162,745 UART: [art] SIG.S = CEBBE65C3CF990CF65BAB5BDD2457F013F3F775903A1FB87DBB4B21EC5508793932B63F3B452CFE87456AF45BF7DC90A
3,186,433 UART: Caliptra RT
3,186,686 UART: [state] CFI Enabled
3,294,219 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,294,975 UART:
3,294,991 UART: Running Caliptra ROM ...
3,295,399 UART:
3,295,454 UART: [state] CFI Enabled
3,297,701 UART: [state] LifecycleState = Production
3,298,309 UART: [state] DebugLocked = Yes
3,298,861 UART: [state] Starting the WD Timer 40000000 cycles
3,300,368 UART: [kat] SHA2-256
4,103,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,108,047 UART: [kat] ++
4,108,199 UART: [kat] sha1
4,112,351 UART: [kat] SHA2-256
4,114,291 UART: [kat] SHA2-384
4,117,088 UART: [kat] SHA2-512-ACC
4,118,989 UART: [kat] ECC-384
4,128,484 UART: [kat] HMAC-384Kdf
4,133,166 UART: [kat] LMS
4,381,478 UART: [kat] --
4,382,314 UART: [warm-reset] ++
4,383,217 UART: [warm-reset] --
4,384,088 UART: [state] Locking Datavault
4,384,804 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,408 UART: [state] Locking ICCM
4,386,016 UART: [exit] Launching FMC @ 0x40000130
4,391,345 UART:
4,391,361 UART: Running Caliptra FMC ...
4,391,769 UART:
4,391,823 UART: [state] CFI Enabled
4,393,026 UART: [aliasrt :skip pcr extension
4,393,499 UART: [art] Extend RT PCRs Done
4,393,927 UART: [art] Lock RT PCRs Done
4,395,364 UART: [art] Populate DV Done
4,403,842 UART: [fht] FMC Alias Private Key: 7
4,404,790 UART: [art] Derive CDI
4,405,070 UART: [art] Store in in slot 0x4
4,490,699 UART: [art] Derive Key Pair
4,491,059 UART: [art] Store priv key in slot 0x5
4,504,405 UART: [art] Derive Key Pair - Done
4,519,465 UART: [art] Signing Cert with AUTHO
4,519,945 UART: RITY.KEYID = 7
4,535,083 UART: [art] Erasing AUTHORITY.KEYID = 7
4,535,848 UART: [art] PUB.X = AF1E7222CEFF7307410F4386DC045BA1A8D5C1B65709DF319A03058C980143C29E592BD6042C4EBD7A62E78EC59B75C8
4,542,600 UART: [art] PUB.Y = 73BF575A4F7469BBD1B080B5BCFCD412B9E245DAEF03D453DDBA2B3C92475AC4582C02EA30468E460EDDBC1CC7D94063
4,549,561 UART: [art] SIG.R = 267DF5707DAF7B1677419273C135BECA13DB79A017FA8DFBA1A1CAC55BE60076477304BEF885AC5DADC1F6ED290FDF66
4,556,323 UART: [art] SIG.S = CEBBE65C3CF990CF65BAB5BDD2457F013F3F775903A1FB87DBB4B21EC5508793932B63F3B452CFE87456AF45BF7DC90A
4,580,273 UART: Caliptra RT
4,580,526 UART: [state] CFI Enabled
4,861,581 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Production
85,945 UART: [state] DebugLocked = Yes
86,695 UART: [state] Starting the WD Timer 40000000 cycles
88,320 UART: [kat] SHA2-256
891,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,999 UART: [kat] ++
896,151 UART: [kat] sha1
900,357 UART: [kat] SHA2-256
902,297 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,573 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,175,068 ready_for_fw is high
1,175,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,371 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,426 UART: [ldev] ++
1,209,594 UART: [ldev] CDI.KEYID = 6
1,209,958 UART: [ldev] SUBJECT.KEYID = 5
1,210,385 UART: [ldev] AUTHORITY.KEYID = 7
1,210,848 UART: [ldev] FE.KEYID = 1
1,216,144 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,717 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,411 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,281 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,987 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,087 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,260 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,894 >>> mbox cmd response: success
2,794,970 UART: [afmc] ++
2,795,138 UART: [afmc] CDI.KEYID = 6
2,795,501 UART: [afmc] SUBJECT.KEYID = 7
2,795,927 UART: [afmc] AUTHORITY.KEYID = 5
2,831,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,361 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,080 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,973 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,680 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,447 UART: [afmc] --
2,874,504 UART: [cold-reset] --
2,875,664 UART: [state] Locking Datavault
2,876,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,597 UART: [state] Locking ICCM
2,878,127 UART: [exit] Launching FMC @ 0x40000130
2,883,456 UART:
2,883,472 UART: Running Caliptra FMC ...
2,883,880 UART:
2,883,934 UART: [state] CFI Enabled
2,894,271 UART: [fht] FMC Alias Private Key: 7
3,002,140 UART: [art] Extend RT PCRs Done
3,002,568 UART: [art] Lock RT PCRs Done
3,004,342 UART: [art] Populate DV Done
3,012,620 UART: [fht] FMC Alias Private Key: 7
3,013,698 UART: [art] Derive CDI
3,013,978 UART: [art] Store in in slot 0x4
3,099,627 UART: [art] Derive Key Pair
3,099,987 UART: [art] Store priv key in slot 0x5
3,113,327 UART: [art] Derive Key Pair - Done
3,128,236 UART: [art] Signing Cert with AUTHO
3,128,716 UART: RITY.KEYID = 7
3,143,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,561 UART: [art] PUB.X = 8D8D41535BCD6E2A77866911864307E5BE1A73A28D304E86F8806875D560FC7B9A65D69007E88C21A3803B23B2FFDF65
3,151,323 UART: [art] PUB.Y = 2C6EFA5EEFD55EC2B976ECE4A02BC7826FC20EAA65CD73759B5992C6D23CA75C2E11F82CE72C0AEFF90FE9955114EE2F
3,158,290 UART: [art] SIG.R = B18A21839ABFD77FEBC0E86DC80E79CFB3E3A1586C63150DFEAC25C17B34BB29731570D40E2BFCB485DAF8C9A0DAA631
3,165,075 UART: [art] SIG.S = 269C5CB81CF502CBA9DFAA1CA326E881089DAF57036BBC03FE292804CC9906D431AA553D7AE65A89D8F9A81BD22E0BD6
3,188,807 UART: Caliptra RT
3,189,060 UART: [state] CFI Enabled
3,296,365 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,121 UART:
3,297,137 UART: Running Caliptra ROM ...
3,297,545 UART:
3,297,600 UART: [state] CFI Enabled
3,300,049 UART: [state] LifecycleState = Production
3,300,657 UART: [state] DebugLocked = Yes
3,301,389 UART: [state] Starting the WD Timer 40000000 cycles
3,303,086 UART: [kat] SHA2-256
4,106,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,765 UART: [kat] ++
4,110,917 UART: [kat] sha1
4,115,149 UART: [kat] SHA2-256
4,117,089 UART: [kat] SHA2-384
4,119,740 UART: [kat] SHA2-512-ACC
4,121,641 UART: [kat] ECC-384
4,131,510 UART: [kat] HMAC-384Kdf
4,136,074 UART: [kat] LMS
4,384,386 UART: [kat] --
4,385,144 UART: [warm-reset] ++
4,386,171 UART: [warm-reset] --
4,387,020 UART: [state] Locking Datavault
4,387,858 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,462 UART: [state] Locking ICCM
4,388,924 UART: [exit] Launching FMC @ 0x40000130
4,394,253 UART:
4,394,269 UART: Running Caliptra FMC ...
4,394,677 UART:
4,394,731 UART: [state] CFI Enabled
4,395,944 UART: [aliasrt :skip pcr extension
4,396,417 UART: [art] Extend RT PCRs Done
4,396,845 UART: [art] Lock RT PCRs Done
4,398,042 UART: [art] Populate DV Done
4,406,262 UART: [fht] FMC Alias Private Key: 7
4,407,200 UART: [art] Derive CDI
4,407,480 UART: [art] Store in in slot 0x4
4,493,493 UART: [art] Derive Key Pair
4,493,853 UART: [art] Store priv key in slot 0x5
4,507,533 UART: [art] Derive Key Pair - Done
4,522,364 UART: [art] Signing Cert with AUTHO
4,522,844 UART: RITY.KEYID = 7
4,538,152 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,917 UART: [art] PUB.X = 8D8D41535BCD6E2A77866911864307E5BE1A73A28D304E86F8806875D560FC7B9A65D69007E88C21A3803B23B2FFDF65
4,545,679 UART: [art] PUB.Y = 2C6EFA5EEFD55EC2B976ECE4A02BC7826FC20EAA65CD73759B5992C6D23CA75C2E11F82CE72C0AEFF90FE9955114EE2F
4,552,646 UART: [art] SIG.R = B18A21839ABFD77FEBC0E86DC80E79CFB3E3A1586C63150DFEAC25C17B34BB29731570D40E2BFCB485DAF8C9A0DAA631
4,559,431 UART: [art] SIG.S = 269C5CB81CF502CBA9DFAA1CA326E881089DAF57036BBC03FE292804CC9906D431AA553D7AE65A89D8F9A81BD22E0BD6
4,583,193 UART: Caliptra RT
4,583,446 UART: [state] CFI Enabled
4,866,365 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Production
86,246 UART: [state] DebugLocked = Yes
86,860 UART: [state] Starting the WD Timer 40000000 cycles
88,491 UART: [kat] SHA2-256
892,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,170 UART: [kat] ++
896,322 UART: [kat] sha1
900,458 UART: [kat] SHA2-256
902,398 UART: [kat] SHA2-384
905,153 UART: [kat] SHA2-512-ACC
907,054 UART: [kat] ECC-384
916,475 UART: [kat] HMAC-384Kdf
921,329 UART: [kat] LMS
1,169,641 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,170,933 UART: [fht] FHT @ 0x50003400
1,173,643 UART: [idev] ++
1,173,811 UART: [idev] CDI.KEYID = 6
1,174,172 UART: [idev] SUBJECT.KEYID = 7
1,174,597 UART: [idev] UDS.KEYID = 0
1,174,943 ready_for_fw is high
1,174,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,199,923 UART: [idev] Sha1 KeyId Algorithm
1,208,730 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,738 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,432 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,302 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,008 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,880 UART: [ldev] --
1,283,274 UART: [fwproc] Wait for Commands...
1,283,949 UART: [fwproc] Recv command 0x46574c44
1,284,682 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,739 >>> mbox cmd response: success
2,796,837 UART: [afmc] ++
2,797,005 UART: [afmc] CDI.KEYID = 6
2,797,368 UART: [afmc] SUBJECT.KEYID = 7
2,797,794 UART: [afmc] AUTHORITY.KEYID = 5
2,833,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,702 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,421 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,314 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,021 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,898 UART: [afmc] --
2,876,883 UART: [cold-reset] --
2,877,947 UART: [state] Locking Datavault
2,878,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,560 UART: [state] Locking ICCM
2,880,066 UART: [exit] Launching FMC @ 0x40000130
2,885,395 UART:
2,885,411 UART: Running Caliptra FMC ...
2,885,819 UART:
2,885,962 UART: [state] CFI Enabled
2,896,367 UART: [fht] FMC Alias Private Key: 7
3,004,634 UART: [art] Extend RT PCRs Done
3,005,062 UART: [art] Lock RT PCRs Done
3,006,274 UART: [art] Populate DV Done
3,014,352 UART: [fht] FMC Alias Private Key: 7
3,015,524 UART: [art] Derive CDI
3,015,804 UART: [art] Store in in slot 0x4
3,101,977 UART: [art] Derive Key Pair
3,102,337 UART: [art] Store priv key in slot 0x5
3,115,201 UART: [art] Derive Key Pair - Done
3,129,769 UART: [art] Signing Cert with AUTHO
3,130,249 UART: RITY.KEYID = 7
3,145,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,288 UART: [art] PUB.X = 323F16964FEB4C18621261CD4F8D168CCD9B641D317AC287D46302420EA77A80B8923B4463D1E355CE827F155DBDC433
3,153,052 UART: [art] PUB.Y = A14F621ECDA43C7D9FDF2A45F4E8AB6C5F991F326D7346C32653B1280D38E1AB1D62301E57B37EE04A6B77818A2EF64B
3,160,011 UART: [art] SIG.R = 920AD74FDD1A9C1EC122965E9D514FCD186F99A4768E03421DA12F1CD9DDBC7F721FEDF033D5A2F5CDFB93970B628E6D
3,166,792 UART: [art] SIG.S = 104ABAA739BEC6E3370FCD3696B963CC5E545838EF3B7EB087C8B3B3AB994D4DE4DA4AE29F42E7CE4A05BAEF4559A74E
3,190,429 UART: Caliptra RT
3,190,774 UART: [state] CFI Enabled
3,299,183 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,939 UART:
3,299,955 UART: Running Caliptra ROM ...
3,300,363 UART:
3,300,505 UART: [state] CFI Enabled
3,303,026 UART: [state] LifecycleState = Production
3,303,634 UART: [state] DebugLocked = Yes
3,304,170 UART: [state] Starting the WD Timer 40000000 cycles
3,305,633 UART: [kat] SHA2-256
4,109,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,312 UART: [kat] ++
4,113,464 UART: [kat] sha1
4,117,756 UART: [kat] SHA2-256
4,119,696 UART: [kat] SHA2-384
4,122,359 UART: [kat] SHA2-512-ACC
4,124,260 UART: [kat] ECC-384
4,134,217 UART: [kat] HMAC-384Kdf
4,138,833 UART: [kat] LMS
4,387,145 UART: [kat] --
4,388,009 UART: [warm-reset] ++
4,388,938 UART: [warm-reset] --
4,389,709 UART: [state] Locking Datavault
4,390,393 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,997 UART: [state] Locking ICCM
4,391,529 UART: [exit] Launching FMC @ 0x40000130
4,396,858 UART:
4,396,874 UART: Running Caliptra FMC ...
4,397,282 UART:
4,397,425 UART: [state] CFI Enabled
4,398,944 UART: [aliasrt :skip pcr extension
4,399,417 UART: [art] Extend RT PCRs Done
4,399,845 UART: [art] Lock RT PCRs Done
4,401,146 UART: [art] Populate DV Done
4,409,184 UART: [fht] FMC Alias Private Key: 7
4,410,294 UART: [art] Derive CDI
4,410,574 UART: [art] Store in in slot 0x4
4,496,577 UART: [art] Derive Key Pair
4,496,937 UART: [art] Store priv key in slot 0x5
4,510,407 UART: [art] Derive Key Pair - Done
4,525,343 UART: [art] Signing Cert with AUTHO
4,525,823 UART: RITY.KEYID = 7
4,541,081 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,846 UART: [art] PUB.X = 323F16964FEB4C18621261CD4F8D168CCD9B641D317AC287D46302420EA77A80B8923B4463D1E355CE827F155DBDC433
4,548,610 UART: [art] PUB.Y = A14F621ECDA43C7D9FDF2A45F4E8AB6C5F991F326D7346C32653B1280D38E1AB1D62301E57B37EE04A6B77818A2EF64B
4,555,569 UART: [art] SIG.R = 920AD74FDD1A9C1EC122965E9D514FCD186F99A4768E03421DA12F1CD9DDBC7F721FEDF033D5A2F5CDFB93970B628E6D
4,562,350 UART: [art] SIG.S = 104ABAA739BEC6E3370FCD3696B963CC5E545838EF3B7EB087C8B3B3AB994D4DE4DA4AE29F42E7CE4A05BAEF4559A74E
4,586,431 UART: Caliptra RT
4,586,776 UART: [state] CFI Enabled
4,860,495 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Production
86,220 UART: [state] DebugLocked = Yes
86,746 UART: [state] Starting the WD Timer 40000000 cycles
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,476 UART: [kat] SHA2-256
902,416 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,627 UART: [kat] HMAC-384Kdf
921,241 UART: [kat] LMS
1,169,553 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,783 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 ready_for_fw is high
1,174,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,700 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,570 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,276 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,500 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,545 >>> mbox cmd response: success
2,796,691 UART: [afmc] ++
2,796,859 UART: [afmc] CDI.KEYID = 6
2,797,222 UART: [afmc] SUBJECT.KEYID = 7
2,797,648 UART: [afmc] AUTHORITY.KEYID = 5
2,834,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,522 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,241 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,134 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,841 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,656 UART: [afmc] --
2,877,663 UART: [cold-reset] --
2,878,561 UART: [state] Locking Datavault
2,879,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,294 UART: [state] Locking ICCM
2,880,756 UART: [exit] Launching FMC @ 0x40000130
2,886,085 UART:
2,886,101 UART: Running Caliptra FMC ...
2,886,509 UART:
2,886,652 UART: [state] CFI Enabled
2,897,247 UART: [fht] FMC Alias Private Key: 7
3,004,622 UART: [art] Extend RT PCRs Done
3,005,050 UART: [art] Lock RT PCRs Done
3,006,394 UART: [art] Populate DV Done
3,014,690 UART: [fht] FMC Alias Private Key: 7
3,015,848 UART: [art] Derive CDI
3,016,128 UART: [art] Store in in slot 0x4
3,101,675 UART: [art] Derive Key Pair
3,102,035 UART: [art] Store priv key in slot 0x5
3,115,123 UART: [art] Derive Key Pair - Done
3,129,588 UART: [art] Signing Cert with AUTHO
3,130,068 UART: RITY.KEYID = 7
3,145,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,245 UART: [art] PUB.X = FFBE7337AD757E4D0EE18D2D64228F629B25F5486330150B12DA76FE9EF24AD57A6ED72BC845CF224130C78CC41544C2
3,153,017 UART: [art] PUB.Y = B297391FACD2DBBAE9B5F7E2DFFE96FC496AFE294F5EA7420F0EF13FF32CD3B6FEC5FA663FBAB6665B3C6A17D5B9BF42
3,159,997 UART: [art] SIG.R = 75188CF0ECB4772ACE87E739F0B6F590E1BDEE11522C15994494BB8530799DB67851DF283BD9409875BFF96BE5FC0E1D
3,166,772 UART: [art] SIG.S = EC0EAAC674C8F5DE704ABE7378D44114A5D5C9467A76A8FF7686A9BFAA66CF0C47D1775024CE5220A3AC7D965CE04124
3,190,391 UART: Caliptra RT
3,190,736 UART: [state] CFI Enabled
3,299,017 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,773 UART:
3,299,789 UART: Running Caliptra ROM ...
3,300,197 UART:
3,300,339 UART: [state] CFI Enabled
3,303,218 UART: [state] LifecycleState = Production
3,303,826 UART: [state] DebugLocked = Yes
3,304,344 UART: [state] Starting the WD Timer 40000000 cycles
3,305,965 UART: [kat] SHA2-256
4,109,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,644 UART: [kat] ++
4,113,796 UART: [kat] sha1
4,117,910 UART: [kat] SHA2-256
4,119,850 UART: [kat] SHA2-384
4,122,589 UART: [kat] SHA2-512-ACC
4,124,490 UART: [kat] ECC-384
4,134,233 UART: [kat] HMAC-384Kdf
4,138,657 UART: [kat] LMS
4,386,969 UART: [kat] --
4,387,861 UART: [warm-reset] ++
4,388,956 UART: [warm-reset] --
4,389,773 UART: [state] Locking Datavault
4,390,543 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,147 UART: [state] Locking ICCM
4,391,749 UART: [exit] Launching FMC @ 0x40000130
4,397,078 UART:
4,397,094 UART: Running Caliptra FMC ...
4,397,502 UART:
4,397,645 UART: [state] CFI Enabled
4,399,172 UART: [aliasrt :skip pcr extension
4,399,645 UART: [art] Extend RT PCRs Done
4,400,073 UART: [art] Lock RT PCRs Done
4,401,166 UART: [art] Populate DV Done
4,409,546 UART: [fht] FMC Alias Private Key: 7
4,410,678 UART: [art] Derive CDI
4,410,958 UART: [art] Store in in slot 0x4
4,496,753 UART: [art] Derive Key Pair
4,497,113 UART: [art] Store priv key in slot 0x5
4,510,343 UART: [art] Derive Key Pair - Done
4,525,290 UART: [art] Signing Cert with AUTHO
4,525,770 UART: RITY.KEYID = 7
4,540,960 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,725 UART: [art] PUB.X = FFBE7337AD757E4D0EE18D2D64228F629B25F5486330150B12DA76FE9EF24AD57A6ED72BC845CF224130C78CC41544C2
4,548,497 UART: [art] PUB.Y = B297391FACD2DBBAE9B5F7E2DFFE96FC496AFE294F5EA7420F0EF13FF32CD3B6FEC5FA663FBAB6665B3C6A17D5B9BF42
4,555,477 UART: [art] SIG.R = 75188CF0ECB4772ACE87E739F0B6F590E1BDEE11522C15994494BB8530799DB67851DF283BD9409875BFF96BE5FC0E1D
4,562,252 UART: [art] SIG.S = EC0EAAC674C8F5DE704ABE7378D44114A5D5C9467A76A8FF7686A9BFAA66CF0C47D1775024CE5220A3AC7D965CE04124
4,586,229 UART: Caliptra RT
4,586,574 UART: [state] CFI Enabled
4,870,001 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Production
85,727 UART: [state] DebugLocked = Yes
86,381 UART: [state] Starting the WD Timer 40000000 cycles
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,462 UART: [kat] LMS
1,169,774 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,171,074 UART: [fht] FHT @ 0x50003400
1,173,572 UART: [idev] ++
1,173,740 UART: [idev] CDI.KEYID = 6
1,174,101 UART: [idev] SUBJECT.KEYID = 7
1,174,526 UART: [idev] UDS.KEYID = 0
1,174,872 ready_for_fw is high
1,174,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,561 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,465 UART: [idev] --
1,209,428 UART: [ldev] ++
1,209,596 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,857 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,727 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,433 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,505 UART: [ldev] --
1,280,999 UART: [fwproc] Wait for Commands...
1,281,760 UART: [fwproc] Recv command 0x46574c44
1,282,493 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,992 >>> mbox cmd response: success
2,795,116 UART: [afmc] ++
2,795,284 UART: [afmc] CDI.KEYID = 6
2,795,647 UART: [afmc] SUBJECT.KEYID = 7
2,796,073 UART: [afmc] AUTHORITY.KEYID = 5
2,831,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,815 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,534 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,427 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,134 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,957 UART: [afmc] --
2,874,900 UART: [cold-reset] --
2,875,798 UART: [state] Locking Datavault
2,876,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,451 UART: [state] Locking ICCM
2,877,907 UART: [exit] Launching FMC @ 0x40000130
2,883,236 UART:
2,883,252 UART: Running Caliptra FMC ...
2,883,660 UART:
2,883,714 UART: [state] CFI Enabled
2,894,189 UART: [fht] FMC Alias Private Key: 7
3,001,984 UART: [art] Extend RT PCRs Done
3,002,412 UART: [art] Lock RT PCRs Done
3,003,640 UART: [art] Populate DV Done
3,011,784 UART: [fht] FMC Alias Private Key: 7
3,012,802 UART: [art] Derive CDI
3,013,082 UART: [art] Store in in slot 0x4
3,098,385 UART: [art] Derive Key Pair
3,098,745 UART: [art] Store priv key in slot 0x5
3,111,641 UART: [art] Derive Key Pair - Done
3,126,456 UART: [art] Signing Cert with AUTHO
3,126,936 UART: RITY.KEYID = 7
3,141,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,142,713 UART: [art] PUB.X = 4A09BE55A753133AA0E92A0D141283DA91615FFF42BA51FA63BEDFCC5B99FF0DC30D213F111D8AF84CD94D14007B0C0C
3,149,461 UART: [art] PUB.Y = 65D4DDF947BEEF89A8A91A6A6FD8463189AA9CD7D1F0A1206D008EAAF9513DE88089443628746893F845BEB92FE6027D
3,156,394 UART: [art] SIG.R = 54374A8960C681EBB2DBFF843A3E5510F4DB3263F92ED45E7114862233ABBA7174214570D5CE7DCBC01F678C49954152
3,163,164 UART: [art] SIG.S = 7622DC5939B863D72415B0B21D218FD56CFC094278B58F2EBC37E73B8855D43C79F72792BF9FF06D9B055F1447DD8805
3,187,278 UART: Caliptra RT
3,187,531 UART: [state] CFI Enabled
3,295,243 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,295,999 UART:
3,296,015 UART: Running Caliptra ROM ...
3,296,423 UART:
3,296,478 UART: [state] CFI Enabled
3,298,919 UART: [state] LifecycleState = Production
3,299,527 UART: [state] DebugLocked = Yes
3,300,047 UART: [state] Starting the WD Timer 40000000 cycles
3,301,736 UART: [kat] SHA2-256
4,105,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,109,415 UART: [kat] ++
4,109,567 UART: [kat] sha1
4,113,713 UART: [kat] SHA2-256
4,115,653 UART: [kat] SHA2-384
4,118,408 UART: [kat] SHA2-512-ACC
4,120,309 UART: [kat] ECC-384
4,130,322 UART: [kat] HMAC-384Kdf
4,134,804 UART: [kat] LMS
4,383,116 UART: [kat] --
4,383,898 UART: [warm-reset] ++
4,384,689 UART: [warm-reset] --
4,385,736 UART: [state] Locking Datavault
4,386,324 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,928 UART: [state] Locking ICCM
4,387,594 UART: [exit] Launching FMC @ 0x40000130
4,392,923 UART:
4,392,939 UART: Running Caliptra FMC ...
4,393,347 UART:
4,393,401 UART: [state] CFI Enabled
4,394,554 UART: [aliasrt :skip pcr extension
4,395,027 UART: [art] Extend RT PCRs Done
4,395,455 UART: [art] Lock RT PCRs Done
4,396,744 UART: [art] Populate DV Done
4,405,024 UART: [fht] FMC Alias Private Key: 7
4,406,064 UART: [art] Derive CDI
4,406,344 UART: [art] Store in in slot 0x4
4,491,973 UART: [art] Derive Key Pair
4,492,333 UART: [art] Store priv key in slot 0x5
4,505,603 UART: [art] Derive Key Pair - Done
4,520,256 UART: [art] Signing Cert with AUTHO
4,520,736 UART: RITY.KEYID = 7
4,535,726 UART: [art] Erasing AUTHORITY.KEYID = 7
4,536,491 UART: [art] PUB.X = 4A09BE55A753133AA0E92A0D141283DA91615FFF42BA51FA63BEDFCC5B99FF0DC30D213F111D8AF84CD94D14007B0C0C
4,543,239 UART: [art] PUB.Y = 65D4DDF947BEEF89A8A91A6A6FD8463189AA9CD7D1F0A1206D008EAAF9513DE88089443628746893F845BEB92FE6027D
4,550,172 UART: [art] SIG.R = 54374A8960C681EBB2DBFF843A3E5510F4DB3263F92ED45E7114862233ABBA7174214570D5CE7DCBC01F678C49954152
4,556,942 UART: [art] SIG.S = 7622DC5939B863D72415B0B21D218FD56CFC094278B58F2EBC37E73B8855D43C79F72792BF9FF06D9B055F1447DD8805
4,580,334 UART: Caliptra RT
4,580,587 UART: [state] CFI Enabled
4,859,485 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Production
85,773 UART: [state] DebugLocked = Yes
86,419 UART: [state] Starting the WD Timer 40000000 cycles
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
921,072 UART: [kat] LMS
1,169,384 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,224 UART: [idev] ++
1,173,392 UART: [idev] CDI.KEYID = 6
1,173,753 UART: [idev] SUBJECT.KEYID = 7
1,174,178 UART: [idev] UDS.KEYID = 0
1,174,524 ready_for_fw is high
1,174,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,803 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,673 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,379 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,501 UART: [ldev] --
1,280,791 UART: [fwproc] Wait for Commands...
1,281,538 UART: [fwproc] Recv command 0x46574c44
1,282,271 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,627,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,792,544 >>> mbox cmd response: success
2,793,562 UART: [afmc] ++
2,793,730 UART: [afmc] CDI.KEYID = 6
2,794,093 UART: [afmc] SUBJECT.KEYID = 7
2,794,519 UART: [afmc] AUTHORITY.KEYID = 5
2,829,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,845,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,846,267 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,851,986 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,857,879 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,863,586 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,871,505 UART: [afmc] --
2,872,394 UART: [cold-reset] --
2,873,082 UART: [state] Locking Datavault
2,874,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,875,027 UART: [state] Locking ICCM
2,875,583 UART: [exit] Launching FMC @ 0x40000130
2,880,912 UART:
2,880,928 UART: Running Caliptra FMC ...
2,881,336 UART:
2,881,390 UART: [state] CFI Enabled
2,891,901 UART: [fht] FMC Alias Private Key: 7
3,000,080 UART: [art] Extend RT PCRs Done
3,000,508 UART: [art] Lock RT PCRs Done
3,001,776 UART: [art] Populate DV Done
3,010,024 UART: [fht] FMC Alias Private Key: 7
3,011,072 UART: [art] Derive CDI
3,011,352 UART: [art] Store in in slot 0x4
3,097,207 UART: [art] Derive Key Pair
3,097,567 UART: [art] Store priv key in slot 0x5
3,111,437 UART: [art] Derive Key Pair - Done
3,126,019 UART: [art] Signing Cert with AUTHO
3,126,499 UART: RITY.KEYID = 7
3,141,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,142,308 UART: [art] PUB.X = 67CB1678E34A9EE668D98EB16C52F759FAEF98380580E0E26FEF00C1B91254E0250451FE231B068A0F2526D843B62E4F
3,149,046 UART: [art] PUB.Y = 09302DA3EFC7DF93FF711EDDB664B61A10B0A3BD453AAC2BEC953E71D0145E397783B4A4B0C897629BB0264FC710B2F5
3,156,007 UART: [art] SIG.R = 67562DFD6B48D7CACC2B61D936416B0108B68AEEEA775A47FE334D65188368425DC7C3C36F34F40F58CB84CE843E3D12
3,162,776 UART: [art] SIG.S = 85AB55D5AE301B79F8767A99D98FE30D3F31D5C72039F095D64F7F48A47FFF56B751B7AD51A51AB0F5B11D6ABBBF97D8
3,186,912 UART: Caliptra RT
3,187,165 UART: [state] CFI Enabled
3,294,662 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,295,418 UART:
3,295,434 UART: Running Caliptra ROM ...
3,295,842 UART:
3,295,897 UART: [state] CFI Enabled
3,298,232 UART: [state] LifecycleState = Production
3,298,840 UART: [state] DebugLocked = Yes
3,299,584 UART: [state] Starting the WD Timer 40000000 cycles
3,301,103 UART: [kat] SHA2-256
4,104,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,108,782 UART: [kat] ++
4,108,934 UART: [kat] sha1
4,113,084 UART: [kat] SHA2-256
4,115,024 UART: [kat] SHA2-384
4,117,607 UART: [kat] SHA2-512-ACC
4,119,508 UART: [kat] ECC-384
4,129,211 UART: [kat] HMAC-384Kdf
4,133,573 UART: [kat] LMS
4,381,885 UART: [kat] --
4,382,857 UART: [warm-reset] ++
4,383,724 UART: [warm-reset] --
4,384,637 UART: [state] Locking Datavault
4,385,525 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,129 UART: [state] Locking ICCM
4,386,587 UART: [exit] Launching FMC @ 0x40000130
4,391,916 UART:
4,391,932 UART: Running Caliptra FMC ...
4,392,340 UART:
4,392,394 UART: [state] CFI Enabled
4,393,419 UART: [aliasrt :skip pcr extension
4,393,892 UART: [art] Extend RT PCRs Done
4,394,320 UART: [art] Lock RT PCRs Done
4,395,357 UART: [art] Populate DV Done
4,403,699 UART: [fht] FMC Alias Private Key: 7
4,404,739 UART: [art] Derive CDI
4,405,019 UART: [art] Store in in slot 0x4
4,490,506 UART: [art] Derive Key Pair
4,490,866 UART: [art] Store priv key in slot 0x5
4,504,098 UART: [art] Derive Key Pair - Done
4,518,834 UART: [art] Signing Cert with AUTHO
4,519,314 UART: RITY.KEYID = 7
4,534,350 UART: [art] Erasing AUTHORITY.KEYID = 7
4,535,115 UART: [art] PUB.X = 67CB1678E34A9EE668D98EB16C52F759FAEF98380580E0E26FEF00C1B91254E0250451FE231B068A0F2526D843B62E4F
4,541,853 UART: [art] PUB.Y = 09302DA3EFC7DF93FF711EDDB664B61A10B0A3BD453AAC2BEC953E71D0145E397783B4A4B0C897629BB0264FC710B2F5
4,548,814 UART: [art] SIG.R = 67562DFD6B48D7CACC2B61D936416B0108B68AEEEA775A47FE334D65188368425DC7C3C36F34F40F58CB84CE843E3D12
4,555,583 UART: [art] SIG.S = 85AB55D5AE301B79F8767A99D98FE30D3F31D5C72039F095D64F7F48A47FFF56B751B7AD51A51AB0F5B11D6ABBBF97D8
4,579,227 UART: Caliptra RT
4,579,480 UART: [state] CFI Enabled
4,859,267 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Production
85,898 UART: [state] DebugLocked = Yes
86,424 UART: [state] Starting the WD Timer 40000000 cycles
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 ready_for_fw is high
1,174,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,209,091 UART: [ldev] ++
1,209,259 UART: [ldev] CDI.KEYID = 6
1,209,623 UART: [ldev] SUBJECT.KEYID = 5
1,210,050 UART: [ldev] AUTHORITY.KEYID = 7
1,210,513 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,416 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,110 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,980 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,686 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,650 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,735 UART: [fwproc] Recv command 0x46574c44
1,282,468 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,393 >>> mbox cmd response: success
2,795,559 UART: [afmc] ++
2,795,727 UART: [afmc] CDI.KEYID = 6
2,796,090 UART: [afmc] SUBJECT.KEYID = 7
2,796,516 UART: [afmc] AUTHORITY.KEYID = 5
2,832,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,822 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,541 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,434 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,141 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,954 UART: [afmc] --
2,876,061 UART: [cold-reset] --
2,876,983 UART: [state] Locking Datavault
2,878,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,662 UART: [state] Locking ICCM
2,879,308 UART: [exit] Launching FMC @ 0x40000130
2,884,637 UART:
2,884,653 UART: Running Caliptra FMC ...
2,885,061 UART:
2,885,204 UART: [state] CFI Enabled
2,896,033 UART: [fht] FMC Alias Private Key: 7
3,003,298 UART: [art] Extend RT PCRs Done
3,003,726 UART: [art] Lock RT PCRs Done
3,004,988 UART: [art] Populate DV Done
3,013,164 UART: [fht] FMC Alias Private Key: 7
3,014,216 UART: [art] Derive CDI
3,014,496 UART: [art] Store in in slot 0x4
3,100,241 UART: [art] Derive Key Pair
3,100,601 UART: [art] Store priv key in slot 0x5
3,113,759 UART: [art] Derive Key Pair - Done
3,128,358 UART: [art] Signing Cert with AUTHO
3,128,838 UART: RITY.KEYID = 7
3,144,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,949 UART: [art] PUB.X = BAD29BB7EC2416D5A0CDEC23300DC83175CEB8CECB9984E6EC429A84EE3DE44A1F467B23BAA2F342333A1666B977F437
3,151,734 UART: [art] PUB.Y = D8BE15756B539693027737AAE8897216977140F99B434BA1C2DA6DB8237A2D726F66C73B364706D5FF4FAFF703A62878
3,158,671 UART: [art] SIG.R = D64C27828E4796C32A71B5BF292D1AD049A904F2433D84E9AF01440F6FDAFB53A8598DDD52837BC82FCCB51564BB3907
3,165,437 UART: [art] SIG.S = 9211B7772A44D8D171E159083B9551F02158A2629F7F12E2DA6F93C43EA874AC8A898FE5B4B704A0D2B77A944B8634FE
3,189,002 UART: Caliptra RT
3,189,347 UART: [state] CFI Enabled
3,297,462 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,218 UART:
3,298,234 UART: Running Caliptra ROM ...
3,298,642 UART:
3,298,784 UART: [state] CFI Enabled
3,301,445 UART: [state] LifecycleState = Production
3,302,053 UART: [state] DebugLocked = Yes
3,302,795 UART: [state] Starting the WD Timer 40000000 cycles
3,304,486 UART: [kat] SHA2-256
4,108,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,165 UART: [kat] ++
4,112,317 UART: [kat] sha1
4,116,515 UART: [kat] SHA2-256
4,118,455 UART: [kat] SHA2-384
4,121,172 UART: [kat] SHA2-512-ACC
4,123,073 UART: [kat] ECC-384
4,132,400 UART: [kat] HMAC-384Kdf
4,137,148 UART: [kat] LMS
4,385,460 UART: [kat] --
4,386,410 UART: [warm-reset] ++
4,387,019 UART: [warm-reset] --
4,388,092 UART: [state] Locking Datavault
4,388,828 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,432 UART: [state] Locking ICCM
4,389,924 UART: [exit] Launching FMC @ 0x40000130
4,395,253 UART:
4,395,269 UART: Running Caliptra FMC ...
4,395,677 UART:
4,395,820 UART: [state] CFI Enabled
4,397,405 UART: [aliasrt :skip pcr extension
4,397,878 UART: [art] Extend RT PCRs Done
4,398,306 UART: [art] Lock RT PCRs Done
4,399,501 UART: [art] Populate DV Done
4,407,773 UART: [fht] FMC Alias Private Key: 7
4,408,851 UART: [art] Derive CDI
4,409,131 UART: [art] Store in in slot 0x4
4,494,860 UART: [art] Derive Key Pair
4,495,220 UART: [art] Store priv key in slot 0x5
4,508,098 UART: [art] Derive Key Pair - Done
4,522,717 UART: [art] Signing Cert with AUTHO
4,523,197 UART: RITY.KEYID = 7
4,538,295 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,060 UART: [art] PUB.X = BAD29BB7EC2416D5A0CDEC23300DC83175CEB8CECB9984E6EC429A84EE3DE44A1F467B23BAA2F342333A1666B977F437
4,545,845 UART: [art] PUB.Y = D8BE15756B539693027737AAE8897216977140F99B434BA1C2DA6DB8237A2D726F66C73B364706D5FF4FAFF703A62878
4,552,782 UART: [art] SIG.R = D64C27828E4796C32A71B5BF292D1AD049A904F2433D84E9AF01440F6FDAFB53A8598DDD52837BC82FCCB51564BB3907
4,559,548 UART: [art] SIG.S = 9211B7772A44D8D171E159083B9551F02158A2629F7F12E2DA6F93C43EA874AC8A898FE5B4B704A0D2B77A944B8634FE
4,583,309 UART: Caliptra RT
4,583,654 UART: [state] CFI Enabled
4,865,749 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Production
85,912 UART: [state] DebugLocked = Yes
86,464 UART: [state] Starting the WD Timer 40000000 cycles
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,171,024 UART: [cold-reset] ++
1,171,561 UART: [fht] FHT @ 0x50003400
1,174,241 UART: [idev] ++
1,174,409 UART: [idev] CDI.KEYID = 6
1,174,770 UART: [idev] SUBJECT.KEYID = 7
1,175,195 UART: [idev] UDS.KEYID = 0
1,175,541 ready_for_fw is high
1,175,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,990 UART: [idev] Erasing UDS.KEYID = 0
1,200,291 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,244,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,494 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,188 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,058 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,764 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,836 UART: [ldev] --
1,283,348 UART: [fwproc] Wait for Commands...
1,284,013 UART: [fwproc] Recv command 0x46574c44
1,284,746 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,509 >>> mbox cmd response: success
2,795,739 UART: [afmc] ++
2,795,907 UART: [afmc] CDI.KEYID = 6
2,796,270 UART: [afmc] SUBJECT.KEYID = 7
2,796,696 UART: [afmc] AUTHORITY.KEYID = 5
2,832,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,246 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,965 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,858 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,565 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,390 UART: [afmc] --
2,875,399 UART: [cold-reset] --
2,876,247 UART: [state] Locking Datavault
2,877,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,984 UART: [state] Locking ICCM
2,878,442 UART: [exit] Launching FMC @ 0x40000130
2,883,771 UART:
2,883,787 UART: Running Caliptra FMC ...
2,884,195 UART:
2,884,338 UART: [state] CFI Enabled
2,895,073 UART: [fht] FMC Alias Private Key: 7
3,002,996 UART: [art] Extend RT PCRs Done
3,003,424 UART: [art] Lock RT PCRs Done
3,005,206 UART: [art] Populate DV Done
3,013,202 UART: [fht] FMC Alias Private Key: 7
3,014,214 UART: [art] Derive CDI
3,014,494 UART: [art] Store in in slot 0x4
3,099,941 UART: [art] Derive Key Pair
3,100,301 UART: [art] Store priv key in slot 0x5
3,113,189 UART: [art] Derive Key Pair - Done
3,127,993 UART: [art] Signing Cert with AUTHO
3,128,473 UART: RITY.KEYID = 7
3,143,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,560 UART: [art] PUB.X = 2920968B17D3C6FC136C889618EE2A38C3F5DC1BBEE94826C41AD1AC900CC627F475364690251CF04EB97C228B110E3C
3,151,328 UART: [art] PUB.Y = A570313E294DE27BB5C12CDFB11B9B09F8CFFAD07242FB567DE9FCD6118669509384BF370377D3153C6F149891D52351
3,158,274 UART: [art] SIG.R = 785237FE2CDE3FB2807FC2523BB0DDB60C62FE2B0650B7E2681B613152143BF9896D9AEF6A0EA0CB235E9E6376EB146C
3,165,047 UART: [art] SIG.S = 7D463238114FF5642F004A3E3E7EE5A060238C2671E98F3531AE029FEF18D57CF849CB88EC95E789FC28971A98492592
3,188,721 UART: Caliptra RT
3,189,066 UART: [state] CFI Enabled
3,296,624 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,380 UART:
3,297,396 UART: Running Caliptra ROM ...
3,297,804 UART:
3,297,946 UART: [state] CFI Enabled
3,300,871 UART: [state] LifecycleState = Production
3,301,479 UART: [state] DebugLocked = Yes
3,302,155 UART: [state] Starting the WD Timer 40000000 cycles
3,303,790 UART: [kat] SHA2-256
4,107,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,469 UART: [kat] ++
4,111,621 UART: [kat] sha1
4,115,817 UART: [kat] SHA2-256
4,117,757 UART: [kat] SHA2-384
4,120,516 UART: [kat] SHA2-512-ACC
4,122,417 UART: [kat] ECC-384
4,132,138 UART: [kat] HMAC-384Kdf
4,136,588 UART: [kat] LMS
4,384,900 UART: [kat] --
4,385,668 UART: [warm-reset] ++
4,386,431 UART: [warm-reset] --
4,387,246 UART: [state] Locking Datavault
4,387,904 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,508 UART: [state] Locking ICCM
4,389,036 UART: [exit] Launching FMC @ 0x40000130
4,394,365 UART:
4,394,381 UART: Running Caliptra FMC ...
4,394,789 UART:
4,394,932 UART: [state] CFI Enabled
4,396,103 UART: [aliasrt :skip pcr extension
4,396,576 UART: [art] Extend RT PCRs Done
4,397,004 UART: [art] Lock RT PCRs Done
4,398,147 UART: [art] Populate DV Done
4,406,291 UART: [fht] FMC Alias Private Key: 7
4,407,237 UART: [art] Derive CDI
4,407,517 UART: [art] Store in in slot 0x4
4,493,110 UART: [art] Derive Key Pair
4,493,470 UART: [art] Store priv key in slot 0x5
4,507,372 UART: [art] Derive Key Pair - Done
4,521,880 UART: [art] Signing Cert with AUTHO
4,522,360 UART: RITY.KEYID = 7
4,537,452 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,217 UART: [art] PUB.X = 2920968B17D3C6FC136C889618EE2A38C3F5DC1BBEE94826C41AD1AC900CC627F475364690251CF04EB97C228B110E3C
4,544,985 UART: [art] PUB.Y = A570313E294DE27BB5C12CDFB11B9B09F8CFFAD07242FB567DE9FCD6118669509384BF370377D3153C6F149891D52351
4,551,931 UART: [art] SIG.R = 785237FE2CDE3FB2807FC2523BB0DDB60C62FE2B0650B7E2681B613152143BF9896D9AEF6A0EA0CB235E9E6376EB146C
4,558,704 UART: [art] SIG.S = 7D463238114FF5642F004A3E3E7EE5A060238C2671E98F3531AE029FEF18D57CF849CB88EC95E789FC28971A98492592
4,581,860 UART: Caliptra RT
4,582,205 UART: [state] CFI Enabled
4,861,649 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Production
85,601 UART: [state] DebugLocked = Yes
86,155 UART: [state] Starting the WD Timer 40000000 cycles
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,552 UART: [kat] LMS
1,168,864 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 ready_for_fw is high
1,174,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,198,900 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,250 UART: [ldev] Erasing FE.KEYID = 1
1,241,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,149 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,843 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,713 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,419 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,457 UART: [ldev] --
1,280,891 UART: [fwproc] Wait for Commands...
1,281,692 UART: [fwproc] Recv command 0x46574c44
1,282,425 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,628,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,638 >>> mbox cmd response: success
2,794,836 UART: [afmc] ++
2,795,004 UART: [afmc] CDI.KEYID = 6
2,795,367 UART: [afmc] SUBJECT.KEYID = 7
2,795,793 UART: [afmc] AUTHORITY.KEYID = 5
2,832,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,393 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,112 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,005 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,712 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,471 UART: [afmc] --
2,875,524 UART: [cold-reset] --
2,876,324 UART: [state] Locking Datavault
2,877,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,413 UART: [state] Locking ICCM
2,879,051 UART: [exit] Launching FMC @ 0x40000130
2,884,380 UART:
2,884,396 UART: Running Caliptra FMC ...
2,884,804 UART:
2,884,858 UART: [state] CFI Enabled
2,895,053 UART: [fht] FMC Alias Private Key: 7
3,003,072 UART: [art] Extend RT PCRs Done
3,003,500 UART: [art] Lock RT PCRs Done
3,005,028 UART: [art] Populate DV Done
3,013,272 UART: [fht] FMC Alias Private Key: 7
3,014,386 UART: [art] Derive CDI
3,014,666 UART: [art] Store in in slot 0x4
3,100,369 UART: [art] Derive Key Pair
3,100,729 UART: [art] Store priv key in slot 0x5
3,114,215 UART: [art] Derive Key Pair - Done
3,128,865 UART: [art] Signing Cert with AUTHO
3,129,345 UART: RITY.KEYID = 7
3,144,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,420 UART: [art] PUB.X = E64795CD6B583ACAB7845200DB332477766B3BCCAF2915919203A9F1258AA51C87146332EE724200453AC064ACE25110
3,152,137 UART: [art] PUB.Y = 8905B960A103CC6EF4DB520FACED5DD9502A50207A27059F2C129EF0C0A179F4DF52A6DD69C1E19E62132612DD2732DC
3,159,085 UART: [art] SIG.R = A76FCB7AA8471E9FC78E33A4D31862490B7794B9C44FB7B9BE30B172A66D22830A20A1D13F97F2AA79AC788579E226D8
3,165,855 UART: [art] SIG.S = 6277864D1022AD88D917295205357D3F450C31FF4B977B83B30FCEB3E00A8A78B9401FA21E46A510326FAA95C2714625
3,189,554 UART: Caliptra RT
3,189,807 UART: [state] CFI Enabled
3,297,128 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,884 UART:
3,297,900 UART: Running Caliptra ROM ...
3,298,308 UART:
3,298,363 UART: [state] CFI Enabled
3,300,936 UART: [state] LifecycleState = Production
3,301,544 UART: [state] DebugLocked = Yes
3,302,114 UART: [state] Starting the WD Timer 40000000 cycles
3,303,713 UART: [kat] SHA2-256
4,107,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,392 UART: [kat] ++
4,111,544 UART: [kat] sha1
4,115,716 UART: [kat] SHA2-256
4,117,656 UART: [kat] SHA2-384
4,120,461 UART: [kat] SHA2-512-ACC
4,122,362 UART: [kat] ECC-384
4,132,023 UART: [kat] HMAC-384Kdf
4,136,391 UART: [kat] LMS
4,384,703 UART: [kat] --
4,385,259 UART: [warm-reset] ++
4,386,050 UART: [warm-reset] --
4,386,859 UART: [state] Locking Datavault
4,387,739 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,343 UART: [state] Locking ICCM
4,388,949 UART: [exit] Launching FMC @ 0x40000130
4,394,278 UART:
4,394,294 UART: Running Caliptra FMC ...
4,394,702 UART:
4,394,756 UART: [state] CFI Enabled
4,396,107 UART: [aliasrt :skip pcr extension
4,396,580 UART: [art] Extend RT PCRs Done
4,397,008 UART: [art] Lock RT PCRs Done
4,398,469 UART: [art] Populate DV Done
4,406,727 UART: [fht] FMC Alias Private Key: 7
4,407,791 UART: [art] Derive CDI
4,408,071 UART: [art] Store in in slot 0x4
4,493,698 UART: [art] Derive Key Pair
4,494,058 UART: [art] Store priv key in slot 0x5
4,506,660 UART: [art] Derive Key Pair - Done
4,521,654 UART: [art] Signing Cert with AUTHO
4,522,134 UART: RITY.KEYID = 7
4,536,960 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,725 UART: [art] PUB.X = E64795CD6B583ACAB7845200DB332477766B3BCCAF2915919203A9F1258AA51C87146332EE724200453AC064ACE25110
4,544,442 UART: [art] PUB.Y = 8905B960A103CC6EF4DB520FACED5DD9502A50207A27059F2C129EF0C0A179F4DF52A6DD69C1E19E62132612DD2732DC
4,551,390 UART: [art] SIG.R = A76FCB7AA8471E9FC78E33A4D31862490B7794B9C44FB7B9BE30B172A66D22830A20A1D13F97F2AA79AC788579E226D8
4,558,160 UART: [art] SIG.S = 6277864D1022AD88D917295205357D3F450C31FF4B977B83B30FCEB3E00A8A78B9401FA21E46A510326FAA95C2714625
4,582,159 UART: Caliptra RT
4,582,412 UART: [state] CFI Enabled
4,865,869 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Production
85,893 UART: [state] DebugLocked = Yes
86,541 UART: [state] Starting the WD Timer 40000000 cycles
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,115 UART: [kat] SHA2-256
902,055 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,172 UART: [fht] FHT @ 0x50003400
1,173,826 UART: [idev] ++
1,173,994 UART: [idev] CDI.KEYID = 6
1,174,355 UART: [idev] SUBJECT.KEYID = 7
1,174,780 UART: [idev] UDS.KEYID = 0
1,175,126 ready_for_fw is high
1,175,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,637 UART: [idev] Erasing UDS.KEYID = 0
1,199,228 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,660 UART: [ldev] Erasing FE.KEYID = 1
1,241,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,145 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,839 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,709 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,415 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,505 UART: [ldev] --
1,280,943 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x46574c44
1,282,391 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,082 >>> mbox cmd response: success
2,795,230 UART: [afmc] ++
2,795,398 UART: [afmc] CDI.KEYID = 6
2,795,761 UART: [afmc] SUBJECT.KEYID = 7
2,796,187 UART: [afmc] AUTHORITY.KEYID = 5
2,830,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,135 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,854 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,747 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,454 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,105 UART: [afmc] --
2,874,226 UART: [cold-reset] --
2,875,092 UART: [state] Locking Datavault
2,876,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,735 UART: [state] Locking ICCM
2,877,223 UART: [exit] Launching FMC @ 0x40000130
2,882,552 UART:
2,882,568 UART: Running Caliptra FMC ...
2,882,976 UART:
2,883,030 UART: [state] CFI Enabled
2,893,257 UART: [fht] FMC Alias Private Key: 7
3,000,958 UART: [art] Extend RT PCRs Done
3,001,386 UART: [art] Lock RT PCRs Done
3,002,690 UART: [art] Populate DV Done
3,010,850 UART: [fht] FMC Alias Private Key: 7
3,011,988 UART: [art] Derive CDI
3,012,268 UART: [art] Store in in slot 0x4
3,098,321 UART: [art] Derive Key Pair
3,098,681 UART: [art] Store priv key in slot 0x5
3,111,279 UART: [art] Derive Key Pair - Done
3,126,455 UART: [art] Signing Cert with AUTHO
3,126,935 UART: RITY.KEYID = 7
3,142,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,344 UART: [art] PUB.X = CF6BCF969120FF498FF503C5FCA745F0EC80F949BDBDADE87EDB9F082B3235BD98C92A8B37A1CDF67F0E2D2FE3889852
3,150,129 UART: [art] PUB.Y = 3B700C405053F2C1B6C2AADF0E5049DA1B9E32B0AEB189F0B9EE9CCE1FAA50116BA26313F4894E9C9798CF5DAEF4489F
3,157,093 UART: [art] SIG.R = B4EF4061E4B0F7F4607F43D498DC9E7637BA6D1801634AA376DF4CFBD3F6E3E605C4D4E5A5505562D7CFFC48C91B78BF
3,163,873 UART: [art] SIG.S = 56053D0FC33FA7DB38C664250227E34B1A774B76B269C7E8E244828075CF93883CCAA11229868FC1E6E3B5F0315193AB
3,187,743 UART: Caliptra RT
3,187,996 UART: [state] CFI Enabled
3,294,209 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,294,965 UART:
3,294,981 UART: Running Caliptra ROM ...
3,295,389 UART:
3,295,444 UART: [state] CFI Enabled
3,298,145 UART: [state] LifecycleState = Production
3,298,753 UART: [state] DebugLocked = Yes
3,299,475 UART: [state] Starting the WD Timer 40000000 cycles
3,300,990 UART: [kat] SHA2-256
4,104,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,108,669 UART: [kat] ++
4,108,821 UART: [kat] sha1
4,113,217 UART: [kat] SHA2-256
4,115,157 UART: [kat] SHA2-384
4,117,958 UART: [kat] SHA2-512-ACC
4,119,859 UART: [kat] ECC-384
4,129,088 UART: [kat] HMAC-384Kdf
4,133,540 UART: [kat] LMS
4,381,852 UART: [kat] --
4,382,766 UART: [warm-reset] ++
4,383,873 UART: [warm-reset] --
4,384,568 UART: [state] Locking Datavault
4,385,408 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,012 UART: [state] Locking ICCM
4,386,598 UART: [exit] Launching FMC @ 0x40000130
4,391,927 UART:
4,391,943 UART: Running Caliptra FMC ...
4,392,351 UART:
4,392,405 UART: [state] CFI Enabled
4,393,702 UART: [aliasrt :skip pcr extension
4,394,175 UART: [art] Extend RT PCRs Done
4,394,603 UART: [art] Lock RT PCRs Done
4,395,820 UART: [art] Populate DV Done
4,404,134 UART: [fht] FMC Alias Private Key: 7
4,405,176 UART: [art] Derive CDI
4,405,456 UART: [art] Store in in slot 0x4
4,490,943 UART: [art] Derive Key Pair
4,491,303 UART: [art] Store priv key in slot 0x5
4,504,101 UART: [art] Derive Key Pair - Done
4,518,729 UART: [art] Signing Cert with AUTHO
4,519,209 UART: RITY.KEYID = 7
4,534,377 UART: [art] Erasing AUTHORITY.KEYID = 7
4,535,142 UART: [art] PUB.X = CF6BCF969120FF498FF503C5FCA745F0EC80F949BDBDADE87EDB9F082B3235BD98C92A8B37A1CDF67F0E2D2FE3889852
4,541,927 UART: [art] PUB.Y = 3B700C405053F2C1B6C2AADF0E5049DA1B9E32B0AEB189F0B9EE9CCE1FAA50116BA26313F4894E9C9798CF5DAEF4489F
4,548,891 UART: [art] SIG.R = B4EF4061E4B0F7F4607F43D498DC9E7637BA6D1801634AA376DF4CFBD3F6E3E605C4D4E5A5505562D7CFFC48C91B78BF
4,555,671 UART: [art] SIG.S = 56053D0FC33FA7DB38C664250227E34B1A774B76B269C7E8E244828075CF93883CCAA11229868FC1E6E3B5F0315193AB
4,578,991 UART: Caliptra RT
4,579,244 UART: [state] CFI Enabled
4,856,527 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Production
86,050 UART: [state] DebugLocked = Yes
86,662 UART: [state] Starting the WD Timer 40000000 cycles
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,023 UART: [kat] SHA2-512-ACC
906,924 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,171 UART: [fht] FHT @ 0x50003400
1,173,947 UART: [idev] ++
1,174,115 UART: [idev] CDI.KEYID = 6
1,174,476 UART: [idev] SUBJECT.KEYID = 7
1,174,901 UART: [idev] UDS.KEYID = 0
1,175,247 ready_for_fw is high
1,175,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,874 UART: [idev] Erasing UDS.KEYID = 0
1,199,281 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,251 UART: [ldev] ++
1,209,419 UART: [ldev] CDI.KEYID = 6
1,209,783 UART: [ldev] SUBJECT.KEYID = 5
1,210,210 UART: [ldev] AUTHORITY.KEYID = 7
1,210,673 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,414 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,284 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,990 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,018 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,151 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,699 >>> mbox cmd response: success
2,795,855 UART: [afmc] ++
2,796,023 UART: [afmc] CDI.KEYID = 6
2,796,386 UART: [afmc] SUBJECT.KEYID = 7
2,796,812 UART: [afmc] AUTHORITY.KEYID = 5
2,832,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,556 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,275 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,168 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,875 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,564 UART: [afmc] --
2,875,667 UART: [cold-reset] --
2,876,559 UART: [state] Locking Datavault
2,877,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,148 UART: [state] Locking ICCM
2,878,678 UART: [exit] Launching FMC @ 0x40000130
2,884,007 UART:
2,884,023 UART: Running Caliptra FMC ...
2,884,431 UART:
2,884,574 UART: [state] CFI Enabled
2,894,905 UART: [fht] FMC Alias Private Key: 7
3,003,076 UART: [art] Extend RT PCRs Done
3,003,504 UART: [art] Lock RT PCRs Done
3,004,908 UART: [art] Populate DV Done
3,013,004 UART: [fht] FMC Alias Private Key: 7
3,014,004 UART: [art] Derive CDI
3,014,284 UART: [art] Store in in slot 0x4
3,100,023 UART: [art] Derive Key Pair
3,100,383 UART: [art] Store priv key in slot 0x5
3,113,301 UART: [art] Derive Key Pair - Done
3,127,872 UART: [art] Signing Cert with AUTHO
3,128,352 UART: RITY.KEYID = 7
3,143,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,711 UART: [art] PUB.X = E3384A36E2A7096AAD576C6194FF5BBBFFD0B99783777AA29596C1205D4A61CFD381B12C5F597663571E05E18FA049C1
3,151,479 UART: [art] PUB.Y = B8C9B6D552C874A1ACABB93979A7CC002AB70069AB5FBC27D562EA5DFF277C62740A76559CDDF1E0B0E3DAD4FE708835
3,158,402 UART: [art] SIG.R = E028487E14E3F6AE4C2F85EACE1E759AF7F110005E61B44D2B34167126F7F4A5A664BBD24F53B5DED4ACE77E62668F19
3,165,162 UART: [art] SIG.S = A631F8C55C7A662167DD70FFE82F4A9B643923BBBD5EBD7BE741CC941DAE16DB880686F336C24614AB72140D46B7462D
3,188,507 UART: Caliptra RT
3,188,852 UART: [state] CFI Enabled
3,297,119 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,875 UART:
3,297,891 UART: Running Caliptra ROM ...
3,298,299 UART:
3,298,441 UART: [state] CFI Enabled
3,301,222 UART: [state] LifecycleState = Production
3,301,830 UART: [state] DebugLocked = Yes
3,302,402 UART: [state] Starting the WD Timer 40000000 cycles
3,304,059 UART: [kat] SHA2-256
4,107,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,738 UART: [kat] ++
4,111,890 UART: [kat] sha1
4,116,026 UART: [kat] SHA2-256
4,117,966 UART: [kat] SHA2-384
4,120,743 UART: [kat] SHA2-512-ACC
4,122,644 UART: [kat] ECC-384
4,132,715 UART: [kat] HMAC-384Kdf
4,137,299 UART: [kat] LMS
4,385,611 UART: [kat] --
4,386,381 UART: [warm-reset] ++
4,387,348 UART: [warm-reset] --
4,388,199 UART: [state] Locking Datavault
4,388,953 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,557 UART: [state] Locking ICCM
4,390,025 UART: [exit] Launching FMC @ 0x40000130
4,395,354 UART:
4,395,370 UART: Running Caliptra FMC ...
4,395,778 UART:
4,395,921 UART: [state] CFI Enabled
4,397,178 UART: [aliasrt :skip pcr extension
4,397,651 UART: [art] Extend RT PCRs Done
4,398,079 UART: [art] Lock RT PCRs Done
4,399,154 UART: [art] Populate DV Done
4,407,166 UART: [fht] FMC Alias Private Key: 7
4,408,122 UART: [art] Derive CDI
4,408,402 UART: [art] Store in in slot 0x4
4,494,057 UART: [art] Derive Key Pair
4,494,417 UART: [art] Store priv key in slot 0x5
4,507,373 UART: [art] Derive Key Pair - Done
4,522,198 UART: [art] Signing Cert with AUTHO
4,522,678 UART: RITY.KEYID = 7
4,538,188 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,953 UART: [art] PUB.X = E3384A36E2A7096AAD576C6194FF5BBBFFD0B99783777AA29596C1205D4A61CFD381B12C5F597663571E05E18FA049C1
4,545,721 UART: [art] PUB.Y = B8C9B6D552C874A1ACABB93979A7CC002AB70069AB5FBC27D562EA5DFF277C62740A76559CDDF1E0B0E3DAD4FE708835
4,552,644 UART: [art] SIG.R = E028487E14E3F6AE4C2F85EACE1E759AF7F110005E61B44D2B34167126F7F4A5A664BBD24F53B5DED4ACE77E62668F19
4,559,404 UART: [art] SIG.S = A631F8C55C7A662167DD70FFE82F4A9B643923BBBD5EBD7BE741CC941DAE16DB880686F336C24614AB72140D46B7462D
4,582,943 UART: Caliptra RT
4,583,288 UART: [state] CFI Enabled
4,867,751 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Production
85,562 UART: [state] DebugLocked = Yes
86,318 UART: [state] Starting the WD Timer 40000000 cycles
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,174,079 ready_for_fw is high
1,174,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,242 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,208,002 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,976 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,846 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,552 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,760 UART: [ldev] --
1,282,024 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,628,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,235 >>> mbox cmd response: success
2,794,447 UART: [afmc] ++
2,794,615 UART: [afmc] CDI.KEYID = 6
2,794,978 UART: [afmc] SUBJECT.KEYID = 7
2,795,404 UART: [afmc] AUTHORITY.KEYID = 5
2,830,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,046 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,765 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,658 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,365 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,342 UART: [afmc] --
2,874,385 UART: [cold-reset] --
2,875,165 UART: [state] Locking Datavault
2,876,176 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,780 UART: [state] Locking ICCM
2,877,316 UART: [exit] Launching FMC @ 0x40000130
2,882,645 UART:
2,882,661 UART: Running Caliptra FMC ...
2,883,069 UART:
2,883,212 UART: [state] CFI Enabled
2,894,109 UART: [fht] FMC Alias Private Key: 7
3,001,482 UART: [art] Extend RT PCRs Done
3,001,910 UART: [art] Lock RT PCRs Done
3,003,484 UART: [art] Populate DV Done
3,011,642 UART: [fht] FMC Alias Private Key: 7
3,012,746 UART: [art] Derive CDI
3,013,026 UART: [art] Store in in slot 0x4
3,098,347 UART: [art] Derive Key Pair
3,098,707 UART: [art] Store priv key in slot 0x5
3,112,001 UART: [art] Derive Key Pair - Done
3,127,089 UART: [art] Signing Cert with AUTHO
3,127,569 UART: RITY.KEYID = 7
3,142,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,268 UART: [art] PUB.X = 7937A639B19ECE640ED0BC541FF5631B24515EE8520832024671313EC24C4FB60B213C82A37CD064D3C174676477A580
3,150,018 UART: [art] PUB.Y = 18D3236CDC10466503D19A46327097BD1927A44BE87BFC9332FE86374CCCE6D2FF26388601EA3354A5AF001BB258E4E2
3,156,942 UART: [art] SIG.R = EFD6BF8137B47A9FBA5EA34E60A54A0CFEB9D6BFC300288DAD0C1D013F3721E0EC295645BF29C1F572A7E5DCEE932DF4
3,163,707 UART: [art] SIG.S = 7D0CF9B51A6DEEA92BE664AAF5203BB9AA68787D213560ED02D875D6C0E3F9A29240B59EB76FB0EEB02A88382FB3DE12
3,187,348 UART: Caliptra RT
3,187,693 UART: [state] CFI Enabled
3,294,818 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,295,574 UART:
3,295,590 UART: Running Caliptra ROM ...
3,295,998 UART:
3,296,140 UART: [state] CFI Enabled
3,298,671 UART: [state] LifecycleState = Production
3,299,279 UART: [state] DebugLocked = Yes
3,299,941 UART: [state] Starting the WD Timer 40000000 cycles
3,301,436 UART: [kat] SHA2-256
4,104,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,109,115 UART: [kat] ++
4,109,267 UART: [kat] sha1
4,113,471 UART: [kat] SHA2-256
4,115,411 UART: [kat] SHA2-384
4,118,090 UART: [kat] SHA2-512-ACC
4,119,991 UART: [kat] ECC-384
4,129,630 UART: [kat] HMAC-384Kdf
4,134,344 UART: [kat] LMS
4,382,656 UART: [kat] --
4,383,562 UART: [warm-reset] ++
4,384,235 UART: [warm-reset] --
4,385,016 UART: [state] Locking Datavault
4,385,930 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,534 UART: [state] Locking ICCM
4,387,024 UART: [exit] Launching FMC @ 0x40000130
4,392,353 UART:
4,392,369 UART: Running Caliptra FMC ...
4,392,777 UART:
4,392,920 UART: [state] CFI Enabled
4,394,353 UART: [aliasrt :skip pcr extension
4,394,826 UART: [art] Extend RT PCRs Done
4,395,254 UART: [art] Lock RT PCRs Done
4,396,939 UART: [art] Populate DV Done
4,405,131 UART: [fht] FMC Alias Private Key: 7
4,406,229 UART: [art] Derive CDI
4,406,509 UART: [art] Store in in slot 0x4
4,492,124 UART: [art] Derive Key Pair
4,492,484 UART: [art] Store priv key in slot 0x5
4,506,016 UART: [art] Derive Key Pair - Done
4,520,708 UART: [art] Signing Cert with AUTHO
4,521,188 UART: RITY.KEYID = 7
4,536,980 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,745 UART: [art] PUB.X = 7937A639B19ECE640ED0BC541FF5631B24515EE8520832024671313EC24C4FB60B213C82A37CD064D3C174676477A580
4,544,495 UART: [art] PUB.Y = 18D3236CDC10466503D19A46327097BD1927A44BE87BFC9332FE86374CCCE6D2FF26388601EA3354A5AF001BB258E4E2
4,551,419 UART: [art] SIG.R = EFD6BF8137B47A9FBA5EA34E60A54A0CFEB9D6BFC300288DAD0C1D013F3721E0EC295645BF29C1F572A7E5DCEE932DF4
4,558,184 UART: [art] SIG.S = 7D0CF9B51A6DEEA92BE664AAF5203BB9AA68787D213560ED02D875D6C0E3F9A29240B59EB76FB0EEB02A88382FB3DE12
4,581,523 UART: Caliptra RT
4,581,868 UART: [state] CFI Enabled
4,864,497 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
191,699 UART:
192,058 UART: Running Caliptra ROM ...
193,238 UART:
193,386 UART: [state] CFI Enabled
264,928 UART: [state] LifecycleState = Unprovisioned
267,330 UART: [state] DebugLocked = Yes
270,148 UART: [state] Starting the WD Timer 1000000 cycles
275,665 UART: [kat] SHA2-256
457,603 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,134 UART: [kat] ++
469,691 UART: [kat] sha1
481,455 UART: [kat] SHA2-256
484,471 UART: [kat] SHA2-384
489,957 UART: [kat] SHA2-512-ACC
492,565 UART: [kat] ECC-384
1,274,213 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D12 ra=0x00008CFA error_internal_intr_r=00000040
1,281,982 UART: WDT Expired
1,282,560 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D12 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C5E ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
191,836 UART:
192,210 UART: Running Caliptra ROM ...
193,393 UART:
602,834 UART: [state] CFI Enabled
612,827 UART: [state] LifecycleState = Unprovisioned
615,255 UART: [state] DebugLocked = Yes
616,780 UART: [state] Starting the WD Timer 1000000 cycles
622,074 UART: [kat] SHA2-256
804,081 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,616 UART: [kat] ++
816,219 UART: [kat] sha1
825,531 UART: [kat] SHA2-256
828,580 UART: [kat] SHA2-384
834,705 UART: [kat] SHA2-512-ACC
837,308 UART: [kat] ECC-384
1,620,810 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,628,454 UART: WDT Expired
1,629,020 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C54 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
191,766 UART:
192,134 UART: Running Caliptra ROM ...
193,321 UART:
193,477 UART: [state] CFI Enabled
263,523 UART: [state] LifecycleState = Unprovisioned
265,416 UART: [state] DebugLocked = Yes
267,160 UART: [state] Starting the WD Timer 1000000 cycles
271,646 UART: [kat] SHA2-256
450,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,354 UART: [kat] ++
462,905 UART: [kat] sha1
473,218 UART: [kat] SHA2-256
476,272 UART: [kat] SHA2-384
482,903 UART: [kat] SHA2-512-ACC
485,890 UART: [kat] ECC-384
1,270,718 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,277,677 UART: WDT Expired
1,278,247 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008064 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
191,802 UART:
192,180 UART: Running Caliptra ROM ...
193,317 UART:
603,033 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
618,977 UART: [state] DebugLocked = Yes
620,351 UART: [state] Starting the WD Timer 1000000 cycles
624,951 UART: [kat] SHA2-256
804,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,676 UART: [kat] ++
816,218 UART: [kat] sha1
826,665 UART: [kat] SHA2-256
829,723 UART: [kat] SHA2-384
836,338 UART: [kat] SHA2-512-ACC
839,308 UART: [kat] ECC-384
1,623,907 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
1,630,891 UART: WDT Expired
1,631,457 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
7,236 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008062 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
191,908 UART:
192,272 UART: Running Caliptra ROM ...
193,460 UART:
193,610 UART: [state] CFI Enabled
262,254 UART: [state] LifecycleState = Unprovisioned
264,157 UART: [state] DebugLocked = Yes
266,815 UART: [state] Starting the WD Timer 1000000 cycles
270,548 UART: [kat] SHA2-256
449,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,268 UART: [kat] ++
461,819 UART: [kat] sha1
472,908 UART: [kat] SHA2-256
475,965 UART: [kat] SHA2-384
480,756 UART: [kat] SHA2-512-ACC
483,690 UART: [kat] ECC-384
1,270,380 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,277,363 UART: WDT Expired
1,277,937 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
191,886 UART:
192,267 UART: Running Caliptra ROM ...
193,454 UART:
603,106 UART: [state] CFI Enabled
616,968 UART: [state] LifecycleState = Unprovisioned
618,834 UART: [state] DebugLocked = Yes
621,642 UART: [state] Starting the WD Timer 1000000 cycles
626,801 UART: [kat] SHA2-256
805,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,494 UART: [kat] ++
818,039 UART: [kat] sha1
830,060 UART: [kat] SHA2-256
833,061 UART: [kat] SHA2-384
839,139 UART: [kat] SHA2-512-ACC
842,121 UART: [kat] ECC-384
1,625,219 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,632,223 UART: WDT Expired
1,632,793 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000806C ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = Yes
86,789 UART: [state] Starting the WD Timer 1000000 cycles
88,344 UART: [kat] SHA2-256
891,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,023 UART: [kat] ++
896,175 UART: [kat] sha1
900,411 UART: [kat] SHA2-256
902,351 UART: [kat] SHA2-384
905,176 UART: [kat] SHA2-512-ACC
907,077 UART: [kat] ECC-384
917,098 UART: [kat] HMAC-384Kdf
921,730 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,102 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
1,090,543 UART: WDT Expired
1,090,752 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,644 UART: [state] DebugLocked = Yes
86,272 UART: [state] Starting the WD Timer 1000000 cycles
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,585 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,026 UART: WDT Expired
1,090,235 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000797A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = Yes
86,225 UART: [state] Starting the WD Timer 1000000 cycles
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
915,610 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,538 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000813A ra=0x00008150 error_internal_intr_r=00000040
1,089,979 UART: WDT Expired
1,090,188 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000813A ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000788C ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,076 UART: [state] LifecycleState = Unprovisioned
86,732 UART: [state] DebugLocked = Yes
87,476 UART: [state] Starting the WD Timer 1000000 cycles
88,871 UART: [kat] SHA2-256
892,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,550 UART: [kat] ++
896,702 UART: [kat] sha1
901,052 UART: [kat] SHA2-256
902,992 UART: [kat] SHA2-384
905,835 UART: [kat] SHA2-512-ACC
907,736 UART: [kat] ECC-384
917,427 UART: [kat] HMAC-384Kdf
922,079 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,789 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079CC ra=0x00008150 error_internal_intr_r=00000040
1,091,232 UART: WDT Expired
1,091,441 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079CC ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007944 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = Yes
86,211 UART: [state] Starting the WD Timer 1000000 cycles
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,821 UART: [kat] SHA2-256
901,761 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,394 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,524 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
1,089,963 UART: WDT Expired
1,090,172 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079F8 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,852 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = Yes
87,076 UART: [state] Starting the WD Timer 1000000 cycles
88,671 UART: [kat] SHA2-256
892,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,350 UART: [kat] ++
896,502 UART: [kat] sha1
900,792 UART: [kat] SHA2-256
902,732 UART: [kat] SHA2-384
905,477 UART: [kat] SHA2-512-ACC
907,378 UART: [kat] ECC-384
917,063 UART: [kat] HMAC-384Kdf
921,869 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,389 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000793C ra=0x00008150 error_internal_intr_r=00000040
1,090,830 UART: WDT Expired
1,091,039 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000793C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000786C ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,511 UART:
191,879 UART: Running Caliptra ROM ...
193,106 UART:
193,260 UART: [state] CFI Enabled
263,621 UART: [state] LifecycleState = Unprovisioned
266,036 UART: [state] DebugLocked = Yes
268,823 UART: [state] Starting the WD Timer 40000000 cycles
274,195 UART: [kat] SHA2-256
456,162 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,670 UART: [kat] ++
468,303 UART: [kat] sha1
479,275 UART: [kat] SHA2-256
482,299 UART: [kat] SHA2-384
487,725 UART: [kat] SHA2-512-ACC
490,330 UART: [kat] ECC-384
3,775,650 UART: [kat] HMAC-384Kdf
3,801,717 UART: [kat] LMS
4,874,903 UART: [kat] --
4,879,756 UART: [cold-reset] ++
4,881,932 UART: [fht] FHT @ 0x50003400
4,893,067 UART: [idev] ++
4,893,741 UART: [idev] CDI.KEYID = 6
4,894,959 UART: [idev] SUBJECT.KEYID = 7
4,896,120 UART: [idev] UDS.KEYID = 0
4,899,301 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,040,156 UART: [idev] Erasing UDS.KEYID = 0
8,241,597 UART: [idev] Sha1 KeyId Algorithm
8,263,851 UART: [idev] --
8,268,494 UART: [ldev] ++
8,269,119 UART: [ldev] CDI.KEYID = 6
8,270,303 UART: [ldev] SUBJECT.KEYID = 5
8,271,455 UART: [ldev] AUTHORITY.KEYID = 7
8,272,679 UART: [ldev] FE.KEYID = 1
8,316,729 UART: [ldev] Erasing FE.KEYID = 1
11,655,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,390 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,979,703 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,995,693 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,011,811 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,033,125 UART: [ldev] --
14,037,315 UART: [fwproc] Wait for Commands...
14,039,508 UART: [fwproc] Recv command 0x46574c44
14,041,780 UART: [fwproc] Recv'd Img size: 111324 bytes
18,074,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,148,242 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,208,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,523,673 >>> mbox cmd response: success
18,526,944 UART: [afmc] ++
18,527,559 UART: [afmc] CDI.KEYID = 6
18,528,798 UART: [afmc] SUBJECT.KEYID = 7
18,529,965 UART: [afmc] AUTHORITY.KEYID = 5
21,903,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,201,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,204,190 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,220,365 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,236,496 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,252,568 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,274,218 UART: [afmc] --
24,277,942 UART: [cold-reset] --
24,281,251 UART: [state] Locking Datavault
24,286,026 UART: [state] Locking PCR0, PCR1 and PCR31
24,287,702 UART: [state] Locking ICCM
24,290,713 UART: [exit] Launching FMC @ 0x40000000
24,299,345 UART:
24,299,594 UART: Running Caliptra FMC ...
24,300,733 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
4,796,559 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,322,466 >>> mbox cmd response: success
24,022,932 UART:
24,023,349 UART: Running Caliptra FMC ...
24,024,542 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,855 UART:
192,245 UART: Running Caliptra ROM ...
193,437 UART:
602,842 UART: [state] CFI Enabled
613,631 UART: [state] LifecycleState = Unprovisioned
616,010 UART: [state] DebugLocked = Yes
618,684 UART: [state] Starting the WD Timer 40000000 cycles
624,922 UART: [kat] SHA2-256
806,917 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,453 UART: [kat] ++
818,966 UART: [kat] sha1
828,679 UART: [kat] SHA2-256
831,699 UART: [kat] SHA2-384
837,638 UART: [kat] SHA2-512-ACC
840,245 UART: [kat] ECC-384
4,096,883 UART: [kat] HMAC-384Kdf
4,109,331 UART: [kat] LMS
5,182,526 UART: [kat] --
5,185,694 UART: [cold-reset] ++
5,188,120 UART: [fht] FHT @ 0x50003400
5,200,015 UART: [idev] ++
5,200,685 UART: [idev] CDI.KEYID = 6
5,201,821 UART: [idev] SUBJECT.KEYID = 7
5,203,322 UART: [idev] UDS.KEYID = 0
5,206,717 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
5,346,849 UART: [idev] Erasing UDS.KEYID = 0
8,492,239 UART: [idev] Sha1 KeyId Algorithm
8,514,077 UART: [idev] --
8,518,921 UART: [ldev] ++
8,519,493 UART: [ldev] CDI.KEYID = 6
8,520,650 UART: [ldev] SUBJECT.KEYID = 5
8,521,862 UART: [ldev] AUTHORITY.KEYID = 7
8,523,008 UART: [ldev] FE.KEYID = 1
8,534,277 UART: [ldev] Erasing FE.KEYID = 1
11,826,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,236 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,553 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,556 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,166,628 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,101 UART: [ldev] --
14,191,941 UART: [fwproc] Wait for Commands...
14,195,003 UART: [fwproc] Recv command 0x46574c44
14,197,330 UART: [fwproc] Recv'd Img size: 111324 bytes
18,239,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,313,057 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,373,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,690,010 >>> mbox cmd response: success
18,695,019 UART: [afmc] ++
18,695,636 UART: [afmc] CDI.KEYID = 6
18,696,801 UART: [afmc] SUBJECT.KEYID = 7
18,697,952 UART: [afmc] AUTHORITY.KEYID = 5
22,014,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,308,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,310,482 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,326,734 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,342,762 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,358,891 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,381,685 UART: [afmc] --
24,385,291 UART: [cold-reset] --
24,388,062 UART: [state] Locking Datavault
24,394,443 UART: [state] Locking PCR0, PCR1 and PCR31
24,396,113 UART: [state] Locking ICCM
24,398,188 UART: [exit] Launching FMC @ 0x40000000
24,406,820 UART:
24,407,071 UART: Running Caliptra FMC ...
24,408,215 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
5,102,111 <<< Executing mbox cmd 0x46574c44 (111324 bytes) from SoC
18,492,834 >>> mbox cmd response: success
24,135,359 UART:
24,135,824 UART: Running Caliptra FMC ...
24,136,997 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
191,666 UART:
192,045 UART: Running Caliptra ROM ...
193,146 UART:
193,283 UART: [state] CFI Enabled
261,327 UART: [state] LifecycleState = Unprovisioned
263,239 UART: [state] DebugLocked = Yes
265,928 UART: [state] Starting the WD Timer 40000000 cycles
271,545 UART: [kat] SHA2-256
450,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,252 UART: [kat] ++
462,811 UART: [kat] sha1
472,946 UART: [kat] SHA2-256
475,991 UART: [kat] SHA2-384
482,857 UART: [kat] SHA2-512-ACC
485,824 UART: [kat] ECC-384
2,946,180 UART: [kat] HMAC-384Kdf
2,971,207 UART: [kat] LMS
3,500,714 UART: [kat] --
3,504,556 UART: [cold-reset] ++
3,506,296 UART: [fht] FHT @ 0x50003400
3,516,827 UART: [idev] ++
3,517,389 UART: [idev] CDI.KEYID = 6
3,518,302 UART: [idev] SUBJECT.KEYID = 7
3,519,507 UART: [idev] UDS.KEYID = 0
3,522,611 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,663,173 UART: [idev] Erasing UDS.KEYID = 0
6,025,317 UART: [idev] Sha1 KeyId Algorithm
6,047,629 UART: [idev] --
6,050,240 UART: [ldev] ++
6,050,821 UART: [ldev] CDI.KEYID = 6
6,051,731 UART: [ldev] SUBJECT.KEYID = 5
6,052,951 UART: [ldev] AUTHORITY.KEYID = 7
6,054,189 UART: [ldev] FE.KEYID = 1
6,098,774 UART: [ldev] Erasing FE.KEYID = 1
8,605,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,150 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,136 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,010 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,979 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,632 UART: [ldev] --
10,414,415 UART: [fwproc] Wait for Commands...
10,416,193 UART: [fwproc] Recv command 0x46574c44
10,418,240 UART: [fwproc] Recv'd Img size: 111668 bytes
13,793,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,940 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,927,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,244,361 >>> mbox cmd response: success
14,249,209 UART: [afmc] ++
14,249,821 UART: [afmc] CDI.KEYID = 6
14,250,791 UART: [afmc] SUBJECT.KEYID = 7
14,251,928 UART: [afmc] AUTHORITY.KEYID = 5
16,786,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,141 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,529,337 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,545,308 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,561,177 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,584,000 UART: [afmc] --
18,587,029 UART: [cold-reset] --
18,591,397 UART: [state] Locking Datavault
18,597,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,587 UART: [state] Locking ICCM
18,600,837 UART: [exit] Launching FMC @ 0x40000000
18,609,202 UART:
18,609,454 UART: Running Caliptra FMC ...
18,610,594 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,386,479 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,006,690 >>> mbox cmd response: success
18,303,387 UART:
18,303,771 UART: Running Caliptra FMC ...
18,305,025 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
191,835 UART:
192,239 UART: Running Caliptra ROM ...
193,361 UART:
602,871 UART: [state] CFI Enabled
615,595 UART: [state] LifecycleState = Unprovisioned
617,487 UART: [state] DebugLocked = Yes
619,157 UART: [state] Starting the WD Timer 40000000 cycles
623,653 UART: [kat] SHA2-256
802,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,401 UART: [kat] ++
814,900 UART: [kat] sha1
826,730 UART: [kat] SHA2-256
829,721 UART: [kat] SHA2-384
835,507 UART: [kat] SHA2-512-ACC
838,471 UART: [kat] ECC-384
3,283,095 UART: [kat] HMAC-384Kdf
3,296,414 UART: [kat] LMS
3,825,953 UART: [kat] --
3,830,258 UART: [cold-reset] ++
3,831,152 UART: [fht] FHT @ 0x50003400
3,841,927 UART: [idev] ++
3,842,487 UART: [idev] CDI.KEYID = 6
3,843,495 UART: [idev] SUBJECT.KEYID = 7
3,844,644 UART: [idev] UDS.KEYID = 0
3,847,733 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,988,261 UART: [idev] Erasing UDS.KEYID = 0
6,316,587 UART: [idev] Sha1 KeyId Algorithm
6,339,462 UART: [idev] --
6,343,531 UART: [ldev] ++
6,344,107 UART: [ldev] CDI.KEYID = 6
6,344,986 UART: [ldev] SUBJECT.KEYID = 5
6,346,196 UART: [ldev] AUTHORITY.KEYID = 7
6,347,483 UART: [ldev] FE.KEYID = 1
6,358,963 UART: [ldev] Erasing FE.KEYID = 1
8,830,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,987 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,991 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,808 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,227 UART: [ldev] --
10,622,211 UART: [fwproc] Wait for Commands...
10,624,655 UART: [fwproc] Recv command 0x46574c44
10,626,744 UART: [fwproc] Recv'd Img size: 111668 bytes
13,990,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,062,220 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,122,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,439,032 >>> mbox cmd response: success
14,442,733 UART: [afmc] ++
14,443,344 UART: [afmc] CDI.KEYID = 6
14,444,366 UART: [afmc] SUBJECT.KEYID = 7
14,445,492 UART: [afmc] AUTHORITY.KEYID = 5
16,944,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,663,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,665,272 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,681,463 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,697,364 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,713,271 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,735,424 UART: [afmc] --
18,738,591 UART: [cold-reset] --
18,742,908 UART: [state] Locking Datavault
18,747,706 UART: [state] Locking PCR0, PCR1 and PCR31
18,749,377 UART: [state] Locking ICCM
18,752,072 UART: [exit] Launching FMC @ 0x40000000
18,760,425 UART:
18,760,684 UART: Running Caliptra FMC ...
18,761,821 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,697,840 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,228,861 >>> mbox cmd response: success
18,481,476 UART:
18,481,859 UART: Running Caliptra FMC ...
18,483,030 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
191,707 UART:
192,074 UART: Running Caliptra ROM ...
193,226 UART:
193,375 UART: [state] CFI Enabled
262,126 UART: [state] LifecycleState = Unprovisioned
264,044 UART: [state] DebugLocked = Yes
265,304 UART: [state] Starting the WD Timer 40000000 cycles
270,121 UART: [kat] SHA2-256
449,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,833 UART: [kat] ++
461,401 UART: [kat] sha1
472,395 UART: [kat] SHA2-256
475,427 UART: [kat] SHA2-384
481,617 UART: [kat] SHA2-512-ACC
484,542 UART: [kat] ECC-384
2,946,804 UART: [kat] HMAC-384Kdf
2,971,011 UART: [kat] LMS
3,500,488 UART: [kat] --
3,505,744 UART: [cold-reset] ++
3,507,972 UART: [fht] FHT @ 0x50003400
3,518,242 UART: [idev] ++
3,518,805 UART: [idev] CDI.KEYID = 6
3,519,711 UART: [idev] SUBJECT.KEYID = 7
3,520,915 UART: [idev] UDS.KEYID = 0
3,523,963 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,664,642 UART: [idev] Erasing UDS.KEYID = 0
6,026,652 UART: [idev] Sha1 KeyId Algorithm
6,050,027 UART: [idev] --
6,055,277 UART: [ldev] ++
6,055,851 UART: [ldev] CDI.KEYID = 6
6,056,761 UART: [ldev] SUBJECT.KEYID = 5
6,058,181 UART: [ldev] AUTHORITY.KEYID = 7
6,059,300 UART: [ldev] FE.KEYID = 1
6,100,222 UART: [ldev] Erasing FE.KEYID = 1
8,604,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,806 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,801 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,628 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,602 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,354 UART: [ldev] --
10,412,650 UART: [fwproc] Wait for Commands...
10,415,293 UART: [fwproc] Recv command 0x46574c44
10,417,391 UART: [fwproc] Recv'd Img size: 111668 bytes
13,782,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,849,484 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,909,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,226,546 >>> mbox cmd response: success
14,231,600 UART: [afmc] ++
14,232,217 UART: [afmc] CDI.KEYID = 6
14,233,178 UART: [afmc] SUBJECT.KEYID = 7
14,234,316 UART: [afmc] AUTHORITY.KEYID = 5
16,764,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,882 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,506,093 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,522,027 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,538,026 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,560,805 UART: [afmc] --
18,564,631 UART: [cold-reset] --
18,567,428 UART: [state] Locking Datavault
18,571,404 UART: [state] Locking PCR0, PCR1 and PCR31
18,573,142 UART: [state] Locking ICCM
18,574,525 UART: [exit] Launching FMC @ 0x40000000
18,582,881 UART:
18,583,135 UART: Running Caliptra FMC ...
18,584,271 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,382,468 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,033,013 >>> mbox cmd response: success
18,319,020 UART:
18,319,407 UART: Running Caliptra FMC ...
18,320,543 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,023 UART:
192,397 UART: Running Caliptra ROM ...
193,519 UART:
603,256 UART: [state] CFI Enabled
616,035 UART: [state] LifecycleState = Unprovisioned
617,867 UART: [state] DebugLocked = Yes
620,400 UART: [state] Starting the WD Timer 40000000 cycles
625,055 UART: [kat] SHA2-256
804,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,760 UART: [kat] ++
816,229 UART: [kat] sha1
826,575 UART: [kat] SHA2-256
829,606 UART: [kat] SHA2-384
835,031 UART: [kat] SHA2-512-ACC
837,971 UART: [kat] ECC-384
3,279,233 UART: [kat] HMAC-384Kdf
3,292,563 UART: [kat] LMS
3,822,072 UART: [kat] --
3,825,157 UART: [cold-reset] ++
3,826,044 UART: [fht] FHT @ 0x50003400
3,837,155 UART: [idev] ++
3,837,719 UART: [idev] CDI.KEYID = 6
3,838,676 UART: [idev] SUBJECT.KEYID = 7
3,839,825 UART: [idev] UDS.KEYID = 0
3,842,913 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
3,983,392 UART: [idev] Erasing UDS.KEYID = 0
6,313,400 UART: [idev] Sha1 KeyId Algorithm
6,336,045 UART: [idev] --
6,340,962 UART: [ldev] ++
6,341,528 UART: [ldev] CDI.KEYID = 6
6,342,456 UART: [ldev] SUBJECT.KEYID = 5
6,343,613 UART: [ldev] AUTHORITY.KEYID = 7
6,344,896 UART: [ldev] FE.KEYID = 1
6,354,273 UART: [ldev] Erasing FE.KEYID = 1
8,828,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,221 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,228 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,053 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,013 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,544 UART: [ldev] --
10,620,122 UART: [fwproc] Wait for Commands...
10,622,433 UART: [fwproc] Recv command 0x46574c44
10,624,522 UART: [fwproc] Recv'd Img size: 111668 bytes
13,989,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,063,911 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,124,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,441,951 >>> mbox cmd response: success
14,445,911 UART: [afmc] ++
14,446,516 UART: [afmc] CDI.KEYID = 6
14,447,471 UART: [afmc] SUBJECT.KEYID = 7
14,448,604 UART: [afmc] AUTHORITY.KEYID = 5
16,946,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,664,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,666,725 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,682,971 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,698,871 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,714,758 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,738,867 UART: [afmc] --
18,742,199 UART: [cold-reset] --
18,744,665 UART: [state] Locking Datavault
18,748,347 UART: [state] Locking PCR0, PCR1 and PCR31
18,750,008 UART: [state] Locking ICCM
18,752,267 UART: [exit] Launching FMC @ 0x40000000
18,760,631 UART:
18,760,878 UART: Running Caliptra FMC ...
18,762,226 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,697,882 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
14,237,272 >>> mbox cmd response: success
18,485,957 UART:
18,486,346 UART: Running Caliptra FMC ...
18,487,536 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,757 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = Yes
86,083 UART: [state] Starting the WD Timer 40000000 cycles
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,674 UART: [ldev] ++
1,208,842 UART: [ldev] CDI.KEYID = 6
1,209,206 UART: [ldev] SUBJECT.KEYID = 5
1,209,633 UART: [ldev] AUTHORITY.KEYID = 7
1,210,096 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,240,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,093 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,963 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,669 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,891 UART: [ldev] --
1,280,315 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 111668 bytes
2,547,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,226 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,476 >>> mbox cmd response: success
2,737,554 UART: [afmc] ++
2,737,722 UART: [afmc] CDI.KEYID = 6
2,738,085 UART: [afmc] SUBJECT.KEYID = 7
2,738,511 UART: [afmc] AUTHORITY.KEYID = 5
2,773,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,790,872 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,796,585 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,802,456 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,808,166 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,816,190 UART: [afmc] --
2,817,109 UART: [cold-reset] --
2,818,005 UART: [state] Locking Datavault
2,819,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,834 UART: [state] Locking ICCM
2,820,264 UART: [exit] Launching FMC @ 0x40000000
2,825,561 UART:
2,825,577 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,521 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,988 >>> mbox cmd response: success
2,649,180 UART:
2,649,196 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = Yes
86,720 UART: [state] Starting the WD Timer 40000000 cycles
88,315 UART: [kat] SHA2-256
891,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,994 UART: [kat] ++
896,146 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,415 UART: [idev] ++
1,173,583 UART: [idev] CDI.KEYID = 6
1,173,944 UART: [idev] SUBJECT.KEYID = 7
1,174,369 UART: [idev] UDS.KEYID = 0
1,174,715 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,688 UART: [idev] Erasing UDS.KEYID = 0
1,199,447 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,242,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,702 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,396 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,266 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,972 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,006 UART: [ldev] --
1,281,520 UART: [fwproc] Wait for Commands...
1,282,291 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,945 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,739,167 >>> mbox cmd response: success
2,740,423 UART: [afmc] ++
2,740,591 UART: [afmc] CDI.KEYID = 6
2,740,954 UART: [afmc] SUBJECT.KEYID = 7
2,741,380 UART: [afmc] AUTHORITY.KEYID = 5
2,777,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,515 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,800,228 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,806,099 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,811,809 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,819,669 UART: [afmc] --
2,820,550 UART: [cold-reset] --
2,821,534 UART: [state] Locking Datavault
2,822,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,917 UART: [state] Locking ICCM
2,823,427 UART: [exit] Launching FMC @ 0x40000000
2,828,724 UART:
2,828,740 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,848 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,221 >>> mbox cmd response: success
2,648,777 UART:
2,648,793 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,851 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = Yes
86,085 UART: [state] Starting the WD Timer 40000000 cycles
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,173,040 UART: [idev] ++
1,173,208 UART: [idev] CDI.KEYID = 6
1,173,569 UART: [idev] SUBJECT.KEYID = 7
1,173,994 UART: [idev] UDS.KEYID = 0
1,174,340 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,118 UART: [idev] Sha1 KeyId Algorithm
1,207,035 UART: [idev] --
1,208,030 UART: [ldev] ++
1,208,198 UART: [ldev] CDI.KEYID = 6
1,208,562 UART: [ldev] SUBJECT.KEYID = 5
1,208,989 UART: [ldev] AUTHORITY.KEYID = 7
1,209,452 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,240,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,327 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,021 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,891 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,597 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,699 UART: [ldev] --
1,280,077 UART: [fwproc] Wait for Commands...
1,280,900 UART: [fwproc] Recv command 0x46574c44
1,281,633 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,586 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,640 >>> mbox cmd response: success
2,737,776 UART: [afmc] ++
2,737,944 UART: [afmc] CDI.KEYID = 6
2,738,307 UART: [afmc] SUBJECT.KEYID = 7
2,738,733 UART: [afmc] AUTHORITY.KEYID = 5
2,773,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,142 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,796,855 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,802,726 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,808,436 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,816,094 UART: [afmc] --
2,817,103 UART: [cold-reset] --
2,817,953 UART: [state] Locking Datavault
2,819,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,726 UART: [state] Locking ICCM
2,820,316 UART: [exit] Launching FMC @ 0x40000000
2,825,613 UART:
2,825,629 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,762 >>> mbox cmd response: success
2,649,482 UART:
2,649,498 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = Yes
86,760 UART: [state] Starting the WD Timer 40000000 cycles
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,723 UART: [kat] HMAC-384Kdf
921,243 UART: [kat] LMS
1,169,555 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,531 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,092 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,786 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,656 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,362 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,288 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,419 UART: [fwproc] Recv command 0x46574c44
1,283,152 UART: [fwproc] Recv'd Img size: 111668 bytes
2,549,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,894 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,737,970 >>> mbox cmd response: success
2,739,178 UART: [afmc] ++
2,739,346 UART: [afmc] CDI.KEYID = 6
2,739,709 UART: [afmc] SUBJECT.KEYID = 7
2,740,135 UART: [afmc] AUTHORITY.KEYID = 5
2,776,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,448 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,799,161 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,805,032 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,810,742 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,818,690 UART: [afmc] --
2,819,809 UART: [cold-reset] --
2,820,735 UART: [state] Locking Datavault
2,822,110 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,714 UART: [state] Locking ICCM
2,823,166 UART: [exit] Launching FMC @ 0x40000000
2,828,463 UART:
2,828,479 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,968 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,586,593 >>> mbox cmd response: success
2,649,113 UART:
2,649,129 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,791 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = Yes
86,133 UART: [state] Starting the WD Timer 40000000 cycles
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
915,462 UART: [kat] HMAC-384Kdf
919,918 UART: [kat] LMS
1,168,230 UART: [kat] --
1,169,193 UART: [cold-reset] ++
1,169,688 UART: [fht] FHT @ 0x50003400
1,172,334 UART: [idev] ++
1,172,502 UART: [idev] CDI.KEYID = 6
1,172,863 UART: [idev] SUBJECT.KEYID = 7
1,173,288 UART: [idev] UDS.KEYID = 0
1,173,634 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,180,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,256 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,732 UART: [ldev] Erasing FE.KEYID = 1
1,240,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,817 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,511 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,381 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,087 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,339 UART: [ldev] --
1,279,633 UART: [fwproc] Wait for Commands...
1,280,250 UART: [fwproc] Recv command 0x46574c44
1,280,983 UART: [fwproc] Recv'd Img size: 111668 bytes
2,548,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,096 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,600,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,736,164 >>> mbox cmd response: success
2,737,424 UART: [afmc] ++
2,737,592 UART: [afmc] CDI.KEYID = 6
2,737,955 UART: [afmc] SUBJECT.KEYID = 7
2,738,381 UART: [afmc] AUTHORITY.KEYID = 5
2,773,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,156 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,796,869 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,802,740 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,808,450 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,816,170 UART: [afmc] --
2,817,289 UART: [cold-reset] --
2,817,877 UART: [state] Locking Datavault
2,819,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,819,676 UART: [state] Locking ICCM
2,820,294 UART: [exit] Launching FMC @ 0x40000000
2,825,591 UART:
2,825,607 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,381 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,587,952 >>> mbox cmd response: success
2,649,604 UART:
2,649,620 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = Yes
86,574 UART: [state] Starting the WD Timer 40000000 cycles
88,043 UART: [kat] SHA2-256
891,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,722 UART: [kat] ++
895,874 UART: [kat] sha1
900,288 UART: [kat] SHA2-256
902,228 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,652 UART: [cold-reset] ++
1,171,175 UART: [fht] FHT @ 0x50003400
1,173,845 UART: [idev] ++
1,174,013 UART: [idev] CDI.KEYID = 6
1,174,374 UART: [idev] SUBJECT.KEYID = 7
1,174,799 UART: [idev] UDS.KEYID = 0
1,175,145 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,910 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,243,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,244 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,938 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,808 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,514 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,438 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,585 UART: [fwproc] Recv command 0x46574c44
1,284,318 UART: [fwproc] Recv'd Img size: 111668 bytes
2,551,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,157 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,740,169 >>> mbox cmd response: success
2,741,197 UART: [afmc] ++
2,741,365 UART: [afmc] CDI.KEYID = 6
2,741,728 UART: [afmc] SUBJECT.KEYID = 7
2,742,154 UART: [afmc] AUTHORITY.KEYID = 5
2,777,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,205 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,800,918 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,806,789 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,812,499 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,820,417 UART: [afmc] --
2,821,438 UART: [cold-reset] --
2,822,324 UART: [state] Locking Datavault
2,823,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,193 UART: [state] Locking ICCM
2,824,859 UART: [exit] Launching FMC @ 0x40000000
2,830,156 UART:
2,830,172 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 <<< Executing mbox cmd 0x46574c44 (111668 bytes) from SoC
2,590,307 >>> mbox cmd response: success
2,653,459 UART:
2,653,475 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,037 UART:
192,422 UART: Running Caliptra ROM ...
193,599 UART:
193,751 UART: [state] CFI Enabled
265,720 UART: [state] LifecycleState = Unprovisioned
268,117 UART: [state] DebugLocked = No
269,877 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,557 UART:
192,928 UART: Running Caliptra ROM ...
194,107 UART:
603,727 UART: [state] CFI Enabled
613,716 UART: [state] LifecycleState = Unprovisioned
616,061 UART: [state] DebugLocked = No
617,812 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,287 UART:
192,646 UART: Running Caliptra ROM ...
193,836 UART:
193,988 UART: [state] CFI Enabled
261,993 UART: [state] LifecycleState = Unprovisioned
263,879 UART: [state] DebugLocked = No
265,258 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,366 UART:
192,763 UART: Running Caliptra ROM ...
193,961 UART:
603,721 UART: [state] CFI Enabled
615,336 UART: [state] LifecycleState = Unprovisioned
617,221 UART: [state] DebugLocked = No
618,592 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,310 UART:
192,684 UART: Running Caliptra ROM ...
193,877 UART:
194,032 UART: [state] CFI Enabled
258,287 UART: [state] LifecycleState = Unprovisioned
260,203 UART: [state] DebugLocked = No
261,588 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,535 UART:
192,933 UART: Running Caliptra ROM ...
194,123 UART:
603,663 UART: [state] CFI Enabled
619,604 UART: [state] LifecycleState = Unprovisioned
621,446 UART: [state] DebugLocked = No
623,638 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,915 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,250 UART:
192,623 UART: Running Caliptra ROM ...
193,852 UART:
194,005 UART: [state] CFI Enabled
261,742 UART: [state] LifecycleState = Unprovisioned
264,092 UART: [state] DebugLocked = No
266,501 UART: [state] WD Timer not started. Device not locked for debugging
271,044 UART: [kat] SHA2-256
452,963 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,476 UART: [kat] ++
465,062 UART: [kat] sha1
474,799 UART: [kat] SHA2-256
477,862 UART: [kat] SHA2-384
484,111 UART: [kat] SHA2-512-ACC
486,716 UART: [kat] ECC-384
3,770,875 UART: [kat] HMAC-384Kdf
3,798,342 UART: [kat] LMS
4,871,472 UART: [kat] --
4,877,289 UART: [cold-reset] ++
4,878,959 UART: [fht] FHT @ 0x50003400
4,890,482 UART: [idev] ++
4,891,155 UART: [idev] CDI.KEYID = 6
4,892,390 UART: [idev] SUBJECT.KEYID = 7
4,893,493 UART: [idev] UDS.KEYID = 0
4,925,589 UART: [idev] Erasing UDS.KEYID = 0
8,236,837 UART: [idev] Sha1 KeyId Algorithm
8,256,676 UART: [idev] CSR upload begun
8,262,094 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,568,733 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,585,065 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,601,133 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,617,122 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,641,736 UART: [idev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
10,787,816 UART: [idev] CSR uploaded
10,802,941 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,803,395 UART: [idev] --
10,806,593 UART: [ldev] ++
10,807,161 UART: [ldev] CDI.KEYID = 6
10,808,043 UART: [ldev] SUBJECT.KEYID = 5
10,809,275 UART: [ldev] AUTHORITY.KEYID = 7
10,810,505 UART: [ldev] FE.KEYID = 1
10,851,354 UART: [ldev] Erasing FE.KEYID = 1
14,189,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,498,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,514,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,530,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,546,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,565,308 UART: [ldev] --
16,569,180 UART: [fwproc] Wait for Commands...
16,571,493 UART: [fwproc] Recv command 0x49444352
16,586,963 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
10,478,424 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,161,869 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,470 UART:
192,864 UART: Running Caliptra ROM ...
194,011 UART:
603,653 UART: [state] CFI Enabled
616,662 UART: [state] LifecycleState = Unprovisioned
619,054 UART: [state] DebugLocked = No
621,622 UART: [state] WD Timer not started. Device not locked for debugging
626,480 UART: [kat] SHA2-256
808,476 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,988 UART: [kat] ++
820,579 UART: [kat] sha1
831,516 UART: [kat] SHA2-256
834,514 UART: [kat] SHA2-384
839,565 UART: [kat] SHA2-512-ACC
842,163 UART: [kat] ECC-384
4,099,892 UART: [kat] HMAC-384Kdf
4,112,053 UART: [kat] LMS
5,185,221 UART: [kat] --
5,190,849 UART: [cold-reset] ++
5,193,374 UART: [fht] FHT @ 0x50003400
5,203,750 UART: [idev] ++
5,204,437 UART: [idev] CDI.KEYID = 6
5,205,592 UART: [idev] SUBJECT.KEYID = 7
5,207,069 UART: [idev] UDS.KEYID = 0
5,222,053 UART: [idev] Erasing UDS.KEYID = 0
8,496,362 UART: [idev] Sha1 KeyId Algorithm
8,516,022 UART: [idev] CSR upload begun
8,521,498 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,814,172 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,830,528 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,846,644 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,862,626 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,887,218 UART: [idev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
11,033,244 UART: [idev] CSR uploaded
11,048,400 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,048,887 UART: [idev] --
11,051,809 UART: [ldev] ++
11,052,391 UART: [ldev] CDI.KEYID = 6
11,053,354 UART: [ldev] SUBJECT.KEYID = 5
11,054,531 UART: [ldev] AUTHORITY.KEYID = 7
11,055,706 UART: [ldev] FE.KEYID = 1
11,065,351 UART: [ldev] Erasing FE.KEYID = 1
14,355,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,646,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,663,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,679,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,695,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,714,591 UART: [ldev] --
16,718,500 UART: [fwproc] Wait for Commands...
16,720,814 UART: [fwproc] Recv command 0x49444352
16,736,253 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
10,725,248 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,341,675 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,337 UART:
192,705 UART: Running Caliptra ROM ...
193,928 UART:
194,079 UART: [state] CFI Enabled
264,242 UART: [state] LifecycleState = Unprovisioned
266,151 UART: [state] DebugLocked = No
268,395 UART: [state] WD Timer not started. Device not locked for debugging
271,517 UART: [kat] SHA2-256
450,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,200 UART: [kat] ++
462,648 UART: [kat] sha1
475,250 UART: [kat] SHA2-256
478,313 UART: [kat] SHA2-384
484,392 UART: [kat] SHA2-512-ACC
487,343 UART: [kat] ECC-384
2,943,666 UART: [kat] HMAC-384Kdf
2,969,563 UART: [kat] LMS
3,499,025 UART: [kat] --
3,502,693 UART: [cold-reset] ++
3,504,571 UART: [fht] FHT @ 0x50003400
3,515,060 UART: [idev] ++
3,515,626 UART: [idev] CDI.KEYID = 6
3,516,642 UART: [idev] SUBJECT.KEYID = 7
3,517,752 UART: [idev] UDS.KEYID = 0
3,542,376 UART: [idev] Erasing UDS.KEYID = 0
6,024,432 UART: [idev] Sha1 KeyId Algorithm
6,045,728 UART: [idev] CSR upload begun
6,050,445 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,543 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,795,584 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,540 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,457 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,851,244 UART: [idev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
7,996,148 UART: [idev] CSR uploaded
8,012,275 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,012,764 UART: [idev] --
8,017,207 UART: [ldev] ++
8,017,775 UART: [ldev] CDI.KEYID = 6
8,018,685 UART: [ldev] SUBJECT.KEYID = 5
8,019,918 UART: [ldev] AUTHORITY.KEYID = 7
8,021,099 UART: [ldev] FE.KEYID = 1
8,060,504 UART: [ldev] Erasing FE.KEYID = 1
10,566,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,302,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,318,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,334,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,350,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,371,972 UART: [ldev] --
12,377,071 UART: [fwproc] Wait for Commands...
12,378,860 UART: [fwproc] Recv command 0x49444352
12,394,035 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
7,664,563 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,962,500 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,335 UART:
192,724 UART: Running Caliptra ROM ...
193,872 UART:
603,825 UART: [state] CFI Enabled
616,336 UART: [state] LifecycleState = Unprovisioned
618,178 UART: [state] DebugLocked = No
620,631 UART: [state] WD Timer not started. Device not locked for debugging
625,269 UART: [kat] SHA2-256
804,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,958 UART: [kat] ++
816,421 UART: [kat] sha1
827,081 UART: [kat] SHA2-256
830,085 UART: [kat] SHA2-384
837,571 UART: [kat] SHA2-512-ACC
840,509 UART: [kat] ECC-384
3,282,484 UART: [kat] HMAC-384Kdf
3,295,896 UART: [kat] LMS
3,825,363 UART: [kat] --
3,829,029 UART: [cold-reset] ++
3,830,793 UART: [fht] FHT @ 0x50003400
3,842,141 UART: [idev] ++
3,842,710 UART: [idev] CDI.KEYID = 6
3,843,618 UART: [idev] SUBJECT.KEYID = 7
3,844,833 UART: [idev] UDS.KEYID = 0
3,861,345 UART: [idev] Erasing UDS.KEYID = 0
6,319,580 UART: [idev] Sha1 KeyId Algorithm
6,340,935 UART: [idev] CSR upload begun
6,345,648 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,062,949 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,079,012 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,094,978 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,110,817 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,134,638 UART: [idev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
8,279,768 UART: [idev] CSR uploaded
8,295,921 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,296,385 UART: [idev] --
8,300,449 UART: [ldev] ++
8,301,014 UART: [ldev] CDI.KEYID = 6
8,301,925 UART: [ldev] SUBJECT.KEYID = 5
8,303,106 UART: [ldev] AUTHORITY.KEYID = 7
8,304,337 UART: [ldev] FE.KEYID = 1
8,315,845 UART: [ldev] Erasing FE.KEYID = 1
10,787,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,508,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,524,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,540,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,556,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,577,160 UART: [ldev] --
12,582,470 UART: [fwproc] Wait for Commands...
12,585,161 UART: [fwproc] Recv command 0x49444352
12,600,325 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
7,941,360 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,170,252 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,282 UART:
192,652 UART: Running Caliptra ROM ...
193,787 UART:
193,929 UART: [state] CFI Enabled
261,806 UART: [state] LifecycleState = Unprovisioned
263,711 UART: [state] DebugLocked = No
265,925 UART: [state] WD Timer not started. Device not locked for debugging
268,991 UART: [kat] SHA2-256
448,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,699 UART: [kat] ++
460,151 UART: [kat] sha1
471,782 UART: [kat] SHA2-256
474,785 UART: [kat] SHA2-384
480,814 UART: [kat] SHA2-512-ACC
483,765 UART: [kat] ECC-384
2,946,327 UART: [kat] HMAC-384Kdf
2,969,531 UART: [kat] LMS
3,498,976 UART: [kat] --
3,501,783 UART: [cold-reset] ++
3,503,231 UART: [fht] FHT @ 0x50003400
3,513,995 UART: [idev] ++
3,514,565 UART: [idev] CDI.KEYID = 6
3,515,447 UART: [idev] SUBJECT.KEYID = 7
3,516,662 UART: [idev] UDS.KEYID = 0
3,540,689 UART: [idev] Erasing UDS.KEYID = 0
6,024,768 UART: [idev] Sha1 KeyId Algorithm
6,045,900 UART: [idev] CSR upload begun
6,050,572 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,274 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,378 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,276 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,186 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,849,970 UART: [idev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
7,995,108 UART: [idev] CSR uploaded
8,011,190 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,011,625 UART: [idev] --
8,014,230 UART: [ldev] ++
8,014,812 UART: [ldev] CDI.KEYID = 6
8,015,739 UART: [ldev] SUBJECT.KEYID = 5
8,016,973 UART: [ldev] AUTHORITY.KEYID = 7
8,018,086 UART: [ldev] FE.KEYID = 1
8,062,141 UART: [ldev] Erasing FE.KEYID = 1
10,564,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,281,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,297,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,313,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,328,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,349,301 UART: [ldev] --
12,354,567 UART: [fwproc] Wait for Commands...
12,356,126 UART: [fwproc] Recv command 0x49444352
12,371,301 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
7,685,567 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,984,931 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,659 UART:
193,035 UART: Running Caliptra ROM ...
194,259 UART:
603,753 UART: [state] CFI Enabled
620,325 UART: [state] LifecycleState = Unprovisioned
622,153 UART: [state] DebugLocked = No
624,768 UART: [state] WD Timer not started. Device not locked for debugging
628,597 UART: [kat] SHA2-256
806,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,270 UART: [kat] ++
818,800 UART: [kat] sha1
829,703 UART: [kat] SHA2-256
832,711 UART: [kat] SHA2-384
837,821 UART: [kat] SHA2-512-ACC
840,810 UART: [kat] ECC-384
3,279,844 UART: [kat] HMAC-384Kdf
3,292,882 UART: [kat] LMS
3,822,348 UART: [kat] --
3,826,477 UART: [cold-reset] ++
3,827,622 UART: [fht] FHT @ 0x50003400
3,839,093 UART: [idev] ++
3,839,658 UART: [idev] CDI.KEYID = 6
3,840,566 UART: [idev] SUBJECT.KEYID = 7
3,841,782 UART: [idev] UDS.KEYID = 0
3,857,700 UART: [idev] Erasing UDS.KEYID = 0
6,317,403 UART: [idev] Sha1 KeyId Algorithm
6,336,882 UART: [idev] CSR upload begun
6,341,616 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,056,950 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,073,012 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,088,971 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,104,812 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,128,623 UART: [idev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
8,273,724 UART: [idev] CSR uploaded
8,289,846 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,290,286 UART: [idev] --
8,293,750 UART: [ldev] ++
8,294,313 UART: [ldev] CDI.KEYID = 6
8,295,226 UART: [ldev] SUBJECT.KEYID = 5
8,296,398 UART: [ldev] AUTHORITY.KEYID = 7
8,297,630 UART: [ldev] FE.KEYID = 1
8,306,740 UART: [ldev] Erasing FE.KEYID = 1
10,779,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,496,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,512,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,528,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,543,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,564,026 UART: [ldev] --
12,568,552 UART: [fwproc] Wait for Commands...
12,570,540 UART: [fwproc] Recv command 0x49444352
12,585,709 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
7,931,617 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,160,947 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,449 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,117 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] CSR upload begun
1,208,996 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,813 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,521 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,406 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,112 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,541 UART: [idev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
1,297,038 UART: [idev] CSR uploaded
1,300,083 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,252 UART: [idev] --
1,301,269 UART: [ldev] ++
1,301,437 UART: [ldev] CDI.KEYID = 6
1,301,801 UART: [ldev] SUBJECT.KEYID = 5
1,302,228 UART: [ldev] AUTHORITY.KEYID = 7
1,302,691 UART: [ldev] FE.KEYID = 1
1,307,645 UART: [ldev] Erasing FE.KEYID = 1
1,334,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,229 UART: [ldev] --
1,373,605 UART: [fwproc] Wait for Commands...
1,374,372 UART: [fwproc] Recv command 0x49444352
1,379,501 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,956 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,157,910 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
916,323 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,618 UART: [idev] Sha1 KeyId Algorithm
1,208,014 UART: [idev] CSR upload begun
1,209,793 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,580 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,288 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,173 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,879 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,308 UART: [idev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
1,297,805 UART: [idev] CSR uploaded
1,300,850 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,019 UART: [idev] --
1,302,118 UART: [ldev] ++
1,302,286 UART: [ldev] CDI.KEYID = 6
1,302,650 UART: [ldev] SUBJECT.KEYID = 5
1,303,077 UART: [ldev] AUTHORITY.KEYID = 7
1,303,540 UART: [ldev] FE.KEYID = 1
1,308,852 UART: [ldev] Erasing FE.KEYID = 1
1,334,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,366 UART: [ldev] --
1,373,856 UART: [fwproc] Wait for Commands...
1,374,453 UART: [fwproc] Recv command 0x49444352
1,379,582 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,347 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,157,627 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,512 UART: [state] LifecycleState = Unprovisioned
85,167 UART: [state] DebugLocked = No
85,863 UART: [state] WD Timer not started. Device not locked for debugging
87,084 UART: [kat] SHA2-256
890,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,763 UART: [kat] ++
894,915 UART: [kat] sha1
898,945 UART: [kat] SHA2-256
900,885 UART: [kat] SHA2-384
903,450 UART: [kat] SHA2-512-ACC
905,351 UART: [kat] ECC-384
915,028 UART: [kat] HMAC-384Kdf
919,562 UART: [kat] LMS
1,167,874 UART: [kat] --
1,168,481 UART: [cold-reset] ++
1,168,809 UART: [fht] FHT @ 0x50003400
1,171,441 UART: [idev] ++
1,171,609 UART: [idev] CDI.KEYID = 6
1,171,970 UART: [idev] SUBJECT.KEYID = 7
1,172,395 UART: [idev] UDS.KEYID = 0
1,180,587 UART: [idev] Erasing UDS.KEYID = 0
1,197,831 UART: [idev] Sha1 KeyId Algorithm
1,206,289 UART: [idev] CSR upload begun
1,208,068 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,723 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,431 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,316 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,022 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,451 UART: [idev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
1,295,948 UART: [idev] CSR uploaded
1,298,993 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,162 UART: [idev] --
1,300,115 UART: [ldev] ++
1,300,283 UART: [ldev] CDI.KEYID = 6
1,300,647 UART: [ldev] SUBJECT.KEYID = 5
1,301,074 UART: [ldev] AUTHORITY.KEYID = 7
1,301,537 UART: [ldev] FE.KEYID = 1
1,306,943 UART: [ldev] Erasing FE.KEYID = 1
1,333,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,645 UART: [ldev] --
1,372,981 UART: [fwproc] Wait for Commands...
1,373,578 UART: [fwproc] Recv command 0x49444352
1,378,707 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,804 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,694 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,886 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,200,136 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] CSR upload begun
1,210,275 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,730 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,438 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,323 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,029 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,458 UART: [idev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
1,297,955 UART: [idev] CSR uploaded
1,301,000 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,169 UART: [idev] --
1,302,214 UART: [ldev] ++
1,302,382 UART: [ldev] CDI.KEYID = 6
1,302,746 UART: [ldev] SUBJECT.KEYID = 5
1,303,173 UART: [ldev] AUTHORITY.KEYID = 7
1,303,636 UART: [ldev] FE.KEYID = 1
1,308,808 UART: [ldev] Erasing FE.KEYID = 1
1,335,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,358 UART: [ldev] --
1,374,658 UART: [fwproc] Wait for Commands...
1,375,325 UART: [fwproc] Recv command 0x49444352
1,380,454 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,179 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,605 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,317 UART: [kat] SHA2-256
901,257 UART: [kat] SHA2-384
904,042 UART: [kat] SHA2-512-ACC
905,943 UART: [kat] ECC-384
915,466 UART: [kat] HMAC-384Kdf
920,098 UART: [kat] LMS
1,168,410 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,181,589 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] CSR upload begun
1,208,680 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,305 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,013 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,898 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,604 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,033 UART: [idev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
1,296,530 UART: [idev] CSR uploaded
1,299,575 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,744 UART: [idev] --
1,300,911 UART: [ldev] ++
1,301,079 UART: [ldev] CDI.KEYID = 6
1,301,443 UART: [ldev] SUBJECT.KEYID = 5
1,301,870 UART: [ldev] AUTHORITY.KEYID = 7
1,302,333 UART: [ldev] FE.KEYID = 1
1,307,815 UART: [ldev] Erasing FE.KEYID = 1
1,333,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,513 UART: [ldev] --
1,372,941 UART: [fwproc] Wait for Commands...
1,373,574 UART: [fwproc] Recv command 0x49444352
1,378,703 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,430 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,156,924 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,704 UART: [idev] ++
1,173,872 UART: [idev] CDI.KEYID = 6
1,174,233 UART: [idev] SUBJECT.KEYID = 7
1,174,658 UART: [idev] UDS.KEYID = 0
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,324 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] CSR upload begun
1,210,467 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,768 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,476 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,361 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,067 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,496 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,993 UART: [idev] CSR uploaded
1,301,038 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,207 UART: [idev] --
1,302,140 UART: [ldev] ++
1,302,308 UART: [ldev] CDI.KEYID = 6
1,302,672 UART: [ldev] SUBJECT.KEYID = 5
1,303,099 UART: [ldev] AUTHORITY.KEYID = 7
1,303,562 UART: [ldev] FE.KEYID = 1
1,308,842 UART: [ldev] Erasing FE.KEYID = 1
1,335,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,112 UART: [ldev] --
1,374,544 UART: [fwproc] Wait for Commands...
1,375,263 UART: [fwproc] Recv command 0x49444352
1,380,392 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,059 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,727 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,142 UART:
192,544 UART: Running Caliptra ROM ...
193,666 UART:
193,814 UART: [state] CFI Enabled
261,640 UART: [state] LifecycleState = Unprovisioned
264,031 UART: [state] DebugLocked = No
265,384 UART: [state] WD Timer not started. Device not locked for debugging
270,580 UART: [kat] SHA2-256
452,533 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,059 UART: [kat] ++
464,510 UART: [kat] sha1
476,490 UART: [kat] SHA2-256
479,505 UART: [kat] SHA2-384
483,910 UART: [kat] SHA2-512-ACC
486,519 UART: [kat] ECC-384
3,775,070 UART: [kat] HMAC-384Kdf
3,793,317 UART: [kat] LMS
4,866,510 UART: [kat] --
4,871,494 UART: [cold-reset] ++
4,873,265 UART: [fht] FHT @ 0x50003400
4,884,731 UART: [idev] ++
4,885,399 UART: [idev] CDI.KEYID = 6
4,886,557 UART: [idev] SUBJECT.KEYID = 7
4,887,767 UART: [idev] UDS.KEYID = 0
4,888,722 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
4,919,410 UART: [idev] Erasing UDS.KEYID = 0
8,233,480 UART: [idev] Sha1 KeyId Algorithm
8,254,983 UART: [idev] --
8,259,688 UART: [ldev] ++
8,260,257 UART: [ldev] CDI.KEYID = 6
8,261,492 UART: [ldev] SUBJECT.KEYID = 5
8,262,663 UART: [ldev] AUTHORITY.KEYID = 7
8,263,793 UART: [ldev] FE.KEYID = 1
8,308,092 UART: [ldev] Erasing FE.KEYID = 1
11,643,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,969,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,985,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,001,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,021,515 UART: [ldev] --
14,026,184 UART: [fwproc] Wait for Commands...
14,028,118 UART: [fwproc] Recv command 0x49444352
14,034,924 UART: ROM Fatal Error: 0x0102000A
14,038,082 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
4,782,992 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
13,853,593 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,456 UART:
192,835 UART: Running Caliptra ROM ...
194,052 UART:
603,422 UART: [state] CFI Enabled
616,923 UART: [state] LifecycleState = Unprovisioned
619,298 UART: [state] DebugLocked = No
620,510 UART: [state] WD Timer not started. Device not locked for debugging
623,579 UART: [kat] SHA2-256
805,510 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,067 UART: [kat] ++
817,596 UART: [kat] sha1
828,199 UART: [kat] SHA2-256
831,197 UART: [kat] SHA2-384
837,401 UART: [kat] SHA2-512-ACC
840,017 UART: [kat] ECC-384
4,094,912 UART: [kat] HMAC-384Kdf
4,106,222 UART: [kat] LMS
5,179,352 UART: [kat] --
5,185,319 UART: [cold-reset] ++
5,187,309 UART: [fht] FHT @ 0x50003400
5,198,770 UART: [idev] ++
5,199,479 UART: [idev] CDI.KEYID = 6
5,200,728 UART: [idev] SUBJECT.KEYID = 7
5,202,171 UART: [idev] UDS.KEYID = 0
5,203,430 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
5,222,134 UART: [idev] Erasing UDS.KEYID = 0
8,494,923 UART: [idev] Sha1 KeyId Algorithm
8,516,064 UART: [idev] --
8,520,114 UART: [ldev] ++
8,520,701 UART: [ldev] CDI.KEYID = 6
8,521,936 UART: [ldev] SUBJECT.KEYID = 5
8,523,363 UART: [ldev] AUTHORITY.KEYID = 7
8,524,915 UART: [ldev] FE.KEYID = 1
8,535,935 UART: [ldev] Erasing FE.KEYID = 1
11,825,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,496 UART: [ldev] --
14,189,357 UART: [fwproc] Wait for Commands...
14,192,150 UART: [fwproc] Recv command 0x49444352
14,198,617 UART: ROM Fatal Error: 0x0102000A
14,201,978 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
5,098,451 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
14,026,457 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,089 UART:
192,474 UART: Running Caliptra ROM ...
193,603 UART:
193,746 UART: [state] CFI Enabled
264,027 UART: [state] LifecycleState = Unprovisioned
265,901 UART: [state] DebugLocked = No
268,535 UART: [state] WD Timer not started. Device not locked for debugging
272,256 UART: [kat] SHA2-256
451,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,948 UART: [kat] ++
463,486 UART: [kat] sha1
474,690 UART: [kat] SHA2-256
477,702 UART: [kat] SHA2-384
484,377 UART: [kat] SHA2-512-ACC
487,308 UART: [kat] ECC-384
2,949,654 UART: [kat] HMAC-384Kdf
2,969,899 UART: [kat] LMS
3,499,400 UART: [kat] --
3,502,417 UART: [cold-reset] ++
3,503,912 UART: [fht] FHT @ 0x50003400
3,515,751 UART: [idev] ++
3,516,322 UART: [idev] CDI.KEYID = 6
3,517,200 UART: [idev] SUBJECT.KEYID = 7
3,518,413 UART: [idev] UDS.KEYID = 0
3,519,465 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,541,760 UART: [idev] Erasing UDS.KEYID = 0
6,024,883 UART: [idev] Sha1 KeyId Algorithm
6,048,814 UART: [idev] --
6,052,279 UART: [ldev] ++
6,053,017 UART: [ldev] CDI.KEYID = 6
6,054,010 UART: [ldev] SUBJECT.KEYID = 5
6,055,123 UART: [ldev] AUTHORITY.KEYID = 7
6,056,322 UART: [ldev] FE.KEYID = 1
6,097,597 UART: [ldev] Erasing FE.KEYID = 1
8,601,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,531 UART: [ldev] --
10,413,743 UART: [fwproc] Wait for Commands...
10,416,716 UART: [fwproc] Recv command 0x49444352
10,421,519 UART: ROM Fatal Error: 0x0102000A
10,424,618 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,359,944 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,185,071 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
192,501 UART:
192,880 UART: Running Caliptra ROM ...
193,996 UART:
603,689 UART: [state] CFI Enabled
619,629 UART: [state] LifecycleState = Unprovisioned
621,513 UART: [state] DebugLocked = No
623,699 UART: [state] WD Timer not started. Device not locked for debugging
628,293 UART: [kat] SHA2-256
807,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,951 UART: [kat] ++
819,480 UART: [kat] sha1
831,388 UART: [kat] SHA2-256
834,384 UART: [kat] SHA2-384
840,404 UART: [kat] SHA2-512-ACC
843,384 UART: [kat] ECC-384
3,283,609 UART: [kat] HMAC-384Kdf
3,296,064 UART: [kat] LMS
3,825,579 UART: [kat] --
3,829,884 UART: [cold-reset] ++
3,832,457 UART: [fht] FHT @ 0x50003400
3,843,383 UART: [idev] ++
3,843,983 UART: [idev] CDI.KEYID = 6
3,844,896 UART: [idev] SUBJECT.KEYID = 7
3,846,130 UART: [idev] UDS.KEYID = 0
3,847,115 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,862,115 UART: [idev] Erasing UDS.KEYID = 0
6,318,728 UART: [idev] Sha1 KeyId Algorithm
6,341,553 UART: [idev] --
6,346,403 UART: [ldev] ++
6,346,969 UART: [ldev] CDI.KEYID = 6
6,347,876 UART: [ldev] SUBJECT.KEYID = 5
6,349,032 UART: [ldev] AUTHORITY.KEYID = 7
6,350,320 UART: [ldev] FE.KEYID = 1
6,360,372 UART: [ldev] Erasing FE.KEYID = 1
8,833,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,140 UART: [ldev] --
10,622,423 UART: [fwproc] Wait for Commands...
10,624,959 UART: [fwproc] Recv command 0x49444352
10,630,677 UART: ROM Fatal Error: 0x0102000A
10,633,766 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,698,735 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,415,826 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,283 UART:
192,645 UART: Running Caliptra ROM ...
193,851 UART:
194,024 UART: [state] CFI Enabled
261,434 UART: [state] LifecycleState = Unprovisioned
263,364 UART: [state] DebugLocked = No
265,632 UART: [state] WD Timer not started. Device not locked for debugging
269,563 UART: [kat] SHA2-256
448,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,232 UART: [kat] ++
460,698 UART: [kat] sha1
472,813 UART: [kat] SHA2-256
475,879 UART: [kat] SHA2-384
481,925 UART: [kat] SHA2-512-ACC
484,899 UART: [kat] ECC-384
2,947,356 UART: [kat] HMAC-384Kdf
2,970,151 UART: [kat] LMS
3,499,608 UART: [kat] --
3,503,224 UART: [cold-reset] ++
3,504,125 UART: [fht] FHT @ 0x50003400
3,515,748 UART: [idev] ++
3,516,322 UART: [idev] CDI.KEYID = 6
3,517,305 UART: [idev] SUBJECT.KEYID = 7
3,518,556 UART: [idev] UDS.KEYID = 0
3,519,549 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,541,863 UART: [idev] Erasing UDS.KEYID = 0
6,025,642 UART: [idev] Sha1 KeyId Algorithm
6,048,238 UART: [idev] --
6,053,099 UART: [ldev] ++
6,053,676 UART: [ldev] CDI.KEYID = 6
6,054,560 UART: [ldev] SUBJECT.KEYID = 5
6,055,780 UART: [ldev] AUTHORITY.KEYID = 7
6,057,020 UART: [ldev] FE.KEYID = 1
6,098,816 UART: [ldev] Erasing FE.KEYID = 1
8,602,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,229 UART: [ldev] --
10,412,804 UART: [fwproc] Wait for Commands...
10,414,361 UART: [fwproc] Recv command 0x49444352
10,419,722 UART: ROM Fatal Error: 0x0102000A
10,422,820 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,358,756 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,211,789 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
192,571 UART:
193,084 UART: Running Caliptra ROM ...
194,264 UART:
603,698 UART: [state] CFI Enabled
616,826 UART: [state] LifecycleState = Unprovisioned
618,751 UART: [state] DebugLocked = No
620,771 UART: [state] WD Timer not started. Device not locked for debugging
624,004 UART: [kat] SHA2-256
803,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,723 UART: [kat] ++
815,167 UART: [kat] sha1
826,042 UART: [kat] SHA2-256
829,052 UART: [kat] SHA2-384
835,460 UART: [kat] SHA2-512-ACC
838,441 UART: [kat] ECC-384
3,279,594 UART: [kat] HMAC-384Kdf
3,291,282 UART: [kat] LMS
3,820,761 UART: [kat] --
3,824,010 UART: [cold-reset] ++
3,826,371 UART: [fht] FHT @ 0x50003400
3,835,669 UART: [idev] ++
3,836,229 UART: [idev] CDI.KEYID = 6
3,837,151 UART: [idev] SUBJECT.KEYID = 7
3,838,360 UART: [idev] UDS.KEYID = 0
3,839,345 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,854,099 UART: [idev] Erasing UDS.KEYID = 0
6,311,931 UART: [idev] Sha1 KeyId Algorithm
6,333,867 UART: [idev] --
6,338,236 UART: [ldev] ++
6,338,806 UART: [ldev] CDI.KEYID = 6
6,339,712 UART: [ldev] SUBJECT.KEYID = 5
6,340,873 UART: [ldev] AUTHORITY.KEYID = 7
6,342,100 UART: [ldev] FE.KEYID = 1
6,351,021 UART: [ldev] Erasing FE.KEYID = 1
8,825,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,533 UART: [ldev] --
10,616,837 UART: [fwproc] Wait for Commands...
10,619,320 UART: [fwproc] Recv command 0x49444352
10,625,413 UART: ROM Fatal Error: 0x0102000A
10,628,508 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,699,861 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,418,687 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,714 UART: [kat] LMS
1,169,026 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,839 UART: [idev] Erasing UDS.KEYID = 0
1,200,009 UART: [idev] Sha1 KeyId Algorithm
1,208,839 UART: [idev] --
1,209,740 UART: [ldev] ++
1,209,908 UART: [ldev] CDI.KEYID = 6
1,210,272 UART: [ldev] SUBJECT.KEYID = 5
1,210,699 UART: [ldev] AUTHORITY.KEYID = 7
1,211,162 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,242,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x49444352
1,283,571 UART: ROM Fatal Error: 0x0102000A
1,284,732 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,722 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,804 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,382 UART: [kat] SHA2-256
902,322 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
916,899 UART: [kat] HMAC-384Kdf
921,569 UART: [kat] LMS
1,169,881 UART: [kat] --
1,170,828 UART: [cold-reset] ++
1,171,348 UART: [fht] FHT @ 0x50003400
1,174,102 UART: [idev] ++
1,174,270 UART: [idev] CDI.KEYID = 6
1,174,631 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,175,402 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,292 UART: [idev] Erasing UDS.KEYID = 0
1,200,644 UART: [idev] Sha1 KeyId Algorithm
1,209,326 UART: [idev] --
1,210,367 UART: [ldev] ++
1,210,535 UART: [ldev] CDI.KEYID = 6
1,210,899 UART: [ldev] SUBJECT.KEYID = 5
1,211,326 UART: [ldev] AUTHORITY.KEYID = 7
1,211,789 UART: [ldev] FE.KEYID = 1
1,217,267 UART: [ldev] Erasing FE.KEYID = 1
1,243,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,569 UART: [ldev] --
1,282,903 UART: [fwproc] Wait for Commands...
1,283,716 UART: [fwproc] Recv command 0x49444352
1,285,354 UART: ROM Fatal Error: 0x0102000A
1,286,515 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,523 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,519 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
905,086 UART: [kat] SHA2-512-ACC
906,987 UART: [kat] ECC-384
916,960 UART: [kat] HMAC-384Kdf
921,472 UART: [kat] LMS
1,169,784 UART: [kat] --
1,170,579 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,174,911 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,299 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,664 UART: [ldev] ++
1,209,832 UART: [ldev] CDI.KEYID = 6
1,210,196 UART: [ldev] SUBJECT.KEYID = 5
1,210,623 UART: [ldev] AUTHORITY.KEYID = 7
1,211,086 UART: [ldev] FE.KEYID = 1
1,216,374 UART: [ldev] Erasing FE.KEYID = 1
1,242,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,208 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,239 UART: [fwproc] Recv command 0x49444352
1,283,689 UART: ROM Fatal Error: 0x0102000A
1,284,850 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,500 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,998 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,783 UART: [kat] LMS
1,169,095 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,174,468 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,583 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x49444352
1,284,254 UART: ROM Fatal Error: 0x0102000A
1,285,415 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,633 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,467 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
890,746 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,875 UART: [kat] ++
895,027 UART: [kat] sha1
899,049 UART: [kat] SHA2-256
900,989 UART: [kat] SHA2-384
903,714 UART: [kat] SHA2-512-ACC
905,615 UART: [kat] ECC-384
914,882 UART: [kat] HMAC-384Kdf
919,508 UART: [kat] LMS
1,167,820 UART: [kat] --
1,168,789 UART: [cold-reset] ++
1,169,353 UART: [fht] FHT @ 0x50003400
1,171,815 UART: [idev] ++
1,171,983 UART: [idev] CDI.KEYID = 6
1,172,344 UART: [idev] SUBJECT.KEYID = 7
1,172,769 UART: [idev] UDS.KEYID = 0
1,173,115 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,180,557 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,208,076 UART: [ldev] ++
1,208,244 UART: [ldev] CDI.KEYID = 6
1,208,608 UART: [ldev] SUBJECT.KEYID = 5
1,209,035 UART: [ldev] AUTHORITY.KEYID = 7
1,209,498 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,330 UART: [ldev] --
1,279,672 UART: [fwproc] Wait for Commands...
1,280,481 UART: [fwproc] Recv command 0x49444352
1,282,283 UART: ROM Fatal Error: 0x0102000A
1,283,444 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,136,920 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,528 UART: [kat] SHA2-256
902,468 UART: [kat] SHA2-384
905,277 UART: [kat] SHA2-512-ACC
907,178 UART: [kat] ECC-384
917,173 UART: [kat] HMAC-384Kdf
921,745 UART: [kat] LMS
1,170,057 UART: [kat] --
1,170,904 UART: [cold-reset] ++
1,171,408 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,175,440 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,183,088 UART: [idev] Erasing UDS.KEYID = 0
1,200,372 UART: [idev] Sha1 KeyId Algorithm
1,209,282 UART: [idev] --
1,210,219 UART: [ldev] ++
1,210,387 UART: [ldev] CDI.KEYID = 6
1,210,751 UART: [ldev] SUBJECT.KEYID = 5
1,211,178 UART: [ldev] AUTHORITY.KEYID = 7
1,211,641 UART: [ldev] FE.KEYID = 1
1,216,979 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,263 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x49444352
1,284,854 UART: ROM Fatal Error: 0x0102000A
1,286,015 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,381 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,849 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,185 UART:
192,570 UART: Running Caliptra ROM ...
193,698 UART:
193,864 UART: [state] CFI Enabled
263,695 UART: [state] LifecycleState = Unprovisioned
265,689 UART: [state] DebugLocked = No
268,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,309 UART: [kat] SHA2-256
442,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,538 UART: [kat] ++
454,016 UART: [kat] sha1
465,042 UART: [kat] SHA2-256
467,767 UART: [kat] SHA2-384
474,108 UART: [kat] SHA2-512-ACC
476,475 UART: [kat] ECC-384
2,766,202 UART: [kat] HMAC-384Kdf
2,777,875 UART: [kat] LMS
3,968,201 UART: [kat] --
3,971,156 UART: [cold-reset] ++
3,972,688 UART: [fht] Storing FHT @ 0x50003400
3,983,677 UART: [idev] ++
3,984,241 UART: [idev] CDI.KEYID = 6
3,985,150 UART: [idev] SUBJECT.KEYID = 7
3,986,393 UART: [idev] UDS.KEYID = 0
3,987,395 ready_for_fw is high
3,987,592 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,130,698 UART: [idev] Erasing UDS.KEYID = 0
7,318,656 UART: [idev] Using Sha1 for KeyId Algorithm
7,339,704 UART: [idev] --
7,343,644 UART: [ldev] ++
7,344,209 UART: [ldev] CDI.KEYID = 6
7,345,227 UART: [ldev] SUBJECT.KEYID = 5
7,346,386 UART: [ldev] AUTHORITY.KEYID = 7
7,347,670 UART: [ldev] FE.KEYID = 1
7,391,973 UART: [ldev] Erasing FE.KEYID = 1
10,725,075 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,680 UART: [ldev] --
13,099,169 UART: [fwproc] Waiting for Commands...
13,101,264 UART: [fwproc] Received command 0x46574c44
13,103,499 UART: [fwproc] Received Image of size 113760 bytes
17,158,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,473 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,371 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,621,656 >>> mbox cmd response: success
17,625,588 UART: [afmc] ++
17,626,185 UART: [afmc] CDI.KEYID = 6
17,627,096 UART: [afmc] SUBJECT.KEYID = 7
17,628,333 UART: [afmc] AUTHORITY.KEYID = 5
20,984,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,964 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,358 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,195 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,655 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,169 UART: [afmc] --
23,358,305 UART: [cold-reset] --
23,361,569 UART: [state] Locking Datavault
23,366,977 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,736 UART: [state] Locking ICCM
23,370,831 UART: [exit] Launching FMC @ 0x40000130
23,379,215 UART:
23,379,460 UART: Running Caliptra FMC ...
23,380,559 UART:
23,380,737 UART: [state] CFI Enabled
23,447,942 UART: [fht] FMC Alias Private Key: 7
25,786,367 UART: [art] Extend RT PCRs Done
25,787,581 UART: [art] Lock RT PCRs Done
25,789,311 UART: [art] Populate DV Done
25,794,778 UART: [fht] FMC Alias Private Key: 7
25,796,472 UART: [art] Derive CDI
25,797,284 UART: [art] Store in in slot 0x4
25,856,388 UART: [art] Derive Key Pair
25,857,428 UART: [art] Store priv key in slot 0x5
29,150,510 UART: [art] Derive Key Pair - Done
29,163,511 UART: [art] Signing Cert with AUTHO
29,164,817 UART: RITY.KEYID = 7
31,450,942 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,583 UART: [art] PUB.X = 5CEC51BF8918A2A84F7AE925E52A6B7AA1EA05267723AEAF95A6D67938F1F16ABAF685C1119730732566A624AA0AA25D
31,459,720 UART: [art] PUB.Y = 6B6FF4F384206EA6AD78AFB5416F885820953F7688FCCFAE3D2BCE6BBE8A9EB3EA83FAB717C7A0006E1F5EE79C5C63F5
31,466,972 UART: [art] SIG.R = 461F656FDA0FBDA6D57CCAADF2FB4571DFBF6F50C59EFCFA4D6E34810891876D529679594F21B6C5039D80145A1DB5DE
31,474,418 UART: [art] SIG.S = 5ED03A2C127FC99CEA03659D84447588E2BD0C92EC716A9F21970F19577A77CB1F5294A9C00F60C8165A067C1D06766C
32,779,314 UART: Caliptra RT
32,780,031 UART: [state] CFI Enabled
32,940,078 UART: [rt] RT listening for mailbox commands...
32,942,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,097,758 UART: [rt]cmd =0x41544d4e, len=14344
38,398,255 >>> mbox cmd response data (8 bytes)
38,398,857 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,429,705 UART: [rt]cmd =0x41545348, len=116
38,449,755 >>> mbox cmd response data (12 bytes)
40,505,311 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,650,078 UART:
40,650,454 UART: Running Caliptra ROM ...
40,651,543 UART:
40,651,710 UART: [state] CFI Enabled
40,717,726 UART: [state] LifecycleState = Unprovisioned
40,719,642 UART: [state] DebugLocked = No
40,721,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,727,359 UART: [kat] SHA2-256
40,897,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,907,537 UART: [kat] ++
40,907,996 UART: [kat] sha1
40,918,232 UART: [kat] SHA2-256
40,920,914 UART: [kat] SHA2-384
40,927,119 UART: [kat] SHA2-512-ACC
40,929,466 UART: [kat] ECC-384
43,225,060 UART: [kat] HMAC-384Kdf
43,254,097 UART: [kat] LMS
44,444,421 UART: [kat] --
44,450,359 UART: [update-reset] ++
48,585,994 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,590,002 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,970,988 >>> mbox cmd response: success
48,975,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,976,576 UART: [update-reset] Copying MAN_2 To MAN_1
48,993,916 UART: [update-reset Success] --
48,998,973 UART: [state] Locking Datavault
49,003,036 UART: [state] Locking PCR0, PCR1 and PCR31
49,004,765 UART: [state] Locking ICCM
49,007,162 UART: [exit] Launching FMC @ 0x40000130
49,015,560 UART:
49,015,804 UART: Running Caliptra FMC ...
49,016,837 UART:
49,016,985 UART: [state] CFI Enabled
49,111,718 UART: [art] Extend RT PCRs Done
49,112,908 UART: [art] Lock RT PCRs Done
49,114,605 UART: [art] Populate DV Done
49,120,309 UART: [fht] FMC Alias Private Key: 7
49,121,857 UART: [art] Derive CDI
49,122,621 UART: [art] Store in in slot 0x4
49,180,866 UART: [art] Derive Key Pair
49,181,912 UART: [art] Store priv key in slot 0x5
52,474,975 UART: [art] Derive Key Pair - Done
52,487,869 UART: [art] Signing Cert with AUTHO
52,489,190 UART: RITY.KEYID = 7
54,776,844 UART: [art] Erasing AUTHORITY.KEYID = 7
54,778,348 UART: [art] PUB.X = 45B8B14351023E4F00FEA3A59BEE82ECC98788D90A4544353B5DDBD84FFF88237B46C9DD2132A19AF50C29D72C341D8E
54,785,591 UART: [art] PUB.Y = 187725B10FF8B9B7855FBCDEF154207A32417CB26F2E331FD95BE5542EA4AC372277AD0746C004D172F9842F4F5BA1F1
54,792,870 UART: [art] SIG.R = D46E2BE062E895F013D1D6EB46AC4502DEBB352A57E406C9FE71D67DAB922AA45205C2CFDB39F1298BCA940D074CFB21
54,800,309 UART: [art] SIG.S = F29CF01FB13CB44279756161F7EE4F3BA7293D2CFEA31B71DC3EF21487E9D58E2ABC97E11A9D2D3B98CAED65C001F7EF
56,105,640 UART: Caliptra RT
56,106,359 UART: [state] CFI Enabled
56,438,720 UART: [rt] RT listening for mailbox commands...
56,470,463 UART: [rt]cmd =0x41545348, len=116
56,491,009 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,784,383 ready_for_fw is high
3,784,830 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,864,328 >>> mbox cmd response: success
23,545,957 UART:
23,546,348 UART: Running Caliptra FMC ...
23,547,486 UART:
23,547,649 UART: [state] CFI Enabled
23,616,632 UART: [fht] FMC Alias Private Key: 7
25,954,742 UART: [art] Extend RT PCRs Done
25,956,009 UART: [art] Lock RT PCRs Done
25,958,001 UART: [art] Populate DV Done
25,963,411 UART: [fht] FMC Alias Private Key: 7
25,964,900 UART: [art] Derive CDI
25,965,664 UART: [art] Store in in slot 0x4
26,025,543 UART: [art] Derive Key Pair
26,026,560 UART: [art] Store priv key in slot 0x5
29,319,348 UART: [art] Derive Key Pair - Done
29,332,092 UART: [art] Signing Cert with AUTHO
29,333,434 UART: RITY.KEYID = 7
31,619,895 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,400 UART: [art] PUB.X = 53D5A6833A62A5DDD3030F7511AD2FAA7493A44DE5145CECA8B30C5FC10CCF0AF895E47BDE780E82C6E24F48497557F6
31,628,662 UART: [art] PUB.Y = F82DD52D26394A6B0FF7EC9445FE41E22BED6CB1D3BDC6CC0755E4C37762D4DCCC38F1F017A208966C5346541438B332
31,635,922 UART: [art] SIG.R = 6DA56D0488C0823AFD51521E5F1EEB1C3A11C4F9267FDF3F6D32A344ECC48BBD6C9874BEE7762530B5F32C4D4C60FC2E
31,643,326 UART: [art] SIG.S = B76248E67A0AB7FB1357C82D5CFB945DA30A305C4ED9ADD4ADCD842283F575B0FCD80924825F3DB1891E8B6B64D19BA3
32,949,143 UART: Caliptra RT
32,949,856 UART: [state] CFI Enabled
33,110,876 UART: [rt] RT listening for mailbox commands...
33,113,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,268,815 UART: [rt]cmd =0x41544d4e, len=14344
38,568,977 >>> mbox cmd response data (8 bytes)
38,569,650 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,600,222 UART: [rt]cmd =0x41545348, len=116
38,620,458 >>> mbox cmd response data (12 bytes)
40,673,255 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,369,611 >>> mbox cmd response: success
49,370,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,403,823 UART:
49,404,122 UART: Running Caliptra FMC ...
49,405,160 UART:
49,405,311 UART: [state] CFI Enabled
49,502,165 UART: [art] Extend RT PCRs Done
49,503,364 UART: [art] Lock RT PCRs Done
49,504,590 UART: [art] Populate DV Done
49,510,115 UART: [fht] FMC Alias Private Key: 7
49,511,618 UART: [art] Derive CDI
49,512,353 UART: [art] Store in in slot 0x4
49,571,306 UART: [art] Derive Key Pair
49,572,348 UART: [art] Store priv key in slot 0x5
52,864,824 UART: [art] Derive Key Pair - Done
52,878,032 UART: [art] Signing Cert with AUTHO
52,879,336 UART: RITY.KEYID = 7
55,166,283 UART: [art] Erasing AUTHORITY.KEYID = 7
55,167,935 UART: [art] PUB.X = 61B40EF64FAC8300F62E334F21A210593355EAAA5482CA36AC1BEE1B9128B5BB93FC37967A6468BAD2BA4CB23F7DB4A1
55,175,086 UART: [art] PUB.Y = 70CE204279196E8E27914506D396D887C85520AC2CFBF032DBB1E01FC836215861760F91F206D411BB02147BD973CFF3
55,182,333 UART: [art] SIG.R = 34FBFB86048C1C900880B5B2A5E6691E1D115E7D20F90F84BF6BD040C77DA4D01CAFAE31FB859057F8B01DE3217C3339
55,189,735 UART: [art] SIG.S = FF18230101C6CB29EC576B0C59C61CAA8A3BE216B47791B00CD90DAD2766D5149E436E0AC76297764263154D82423CF5
56,495,569 UART: Caliptra RT
56,496,290 UART: [state] CFI Enabled
56,822,482 UART: [rt] RT listening for mailbox commands...
56,854,600 UART: [rt]cmd =0x41545348, len=116
56,874,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,433 writing to cptra_bootfsm_go
193,657 UART:
194,038 UART: Running Caliptra ROM ...
195,266 UART:
604,855 UART: [state] CFI Enabled
615,702 UART: [state] LifecycleState = Unprovisioned
617,648 UART: [state] DebugLocked = No
620,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,376 UART: [kat] SHA2-256
795,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,663 UART: [kat] ++
806,144 UART: [kat] sha1
816,391 UART: [kat] SHA2-256
819,118 UART: [kat] SHA2-384
825,169 UART: [kat] SHA2-512-ACC
827,476 UART: [kat] ECC-384
3,110,743 UART: [kat] HMAC-384Kdf
3,122,677 UART: [kat] LMS
4,312,805 UART: [kat] --
4,317,453 UART: [cold-reset] ++
4,319,593 UART: [fht] Storing FHT @ 0x50003400
4,330,705 UART: [idev] ++
4,331,261 UART: [idev] CDI.KEYID = 6
4,332,285 UART: [idev] SUBJECT.KEYID = 7
4,333,455 UART: [idev] UDS.KEYID = 0
4,334,481 ready_for_fw is high
4,334,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,682 UART: [idev] Erasing UDS.KEYID = 0
7,623,692 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,928 UART: [idev] --
7,648,918 UART: [ldev] ++
7,649,509 UART: [ldev] CDI.KEYID = 6
7,650,419 UART: [ldev] SUBJECT.KEYID = 5
7,651,627 UART: [ldev] AUTHORITY.KEYID = 7
7,652,908 UART: [ldev] FE.KEYID = 1
7,663,278 UART: [ldev] Erasing FE.KEYID = 1
10,952,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,867 UART: [ldev] --
13,311,172 UART: [fwproc] Waiting for Commands...
13,314,455 UART: [fwproc] Received command 0x46574c44
13,316,685 UART: [fwproc] Received Image of size 113760 bytes
17,363,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,135 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,702 >>> mbox cmd response: success
17,830,613 UART: [afmc] ++
17,831,204 UART: [afmc] CDI.KEYID = 6
17,832,167 UART: [afmc] SUBJECT.KEYID = 7
17,833,378 UART: [afmc] AUTHORITY.KEYID = 5
21,151,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,358 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,613 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,981 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,826 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,328 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,149 UART: [afmc] --
23,515,848 UART: [cold-reset] --
23,520,679 UART: [state] Locking Datavault
23,526,250 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,024 UART: [state] Locking ICCM
23,530,444 UART: [exit] Launching FMC @ 0x40000130
23,538,786 UART:
23,539,019 UART: Running Caliptra FMC ...
23,540,118 UART:
23,540,277 UART: [state] CFI Enabled
23,548,424 UART: [fht] FMC Alias Private Key: 7
25,879,837 UART: [art] Extend RT PCRs Done
25,881,063 UART: [art] Lock RT PCRs Done
25,882,771 UART: [art] Populate DV Done
25,888,238 UART: [fht] FMC Alias Private Key: 7
25,889,878 UART: [art] Derive CDI
25,890,688 UART: [art] Store in in slot 0x4
25,933,437 UART: [art] Derive Key Pair
25,934,434 UART: [art] Store priv key in slot 0x5
29,176,638 UART: [art] Derive Key Pair - Done
29,189,542 UART: [art] Signing Cert with AUTHO
29,190,849 UART: RITY.KEYID = 7
31,470,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,168 UART: [art] PUB.X = 092F1DB47D5ACA97C27AD707160742A58C19016DDEBF31F99E9267B6DB1BCB326AA063195208BF172DA4AF240FD10C38
31,479,461 UART: [art] PUB.Y = 409E6FAC397DB8EA8483C8B93B072D80823C10F05D1B59C354AFAE048D12A0D28BE8F88CF560EBB97B61118BFB6ECBB5
31,486,671 UART: [art] SIG.R = 9B85D33B0F340645B2302581713C4D58A7777192C990C3C024D84B3D66E2292593F6DBB7E6413B1136CB253481F34C0E
31,494,041 UART: [art] SIG.S = EAEB713DAC0B96FA9C2E52EF2AEEB3239C01DA1262B2DA7696A1381086173907227698418570EBE5D4D0673DA3027C2E
32,799,160 UART: Caliptra RT
32,799,869 UART: [state] CFI Enabled
32,917,434 UART: [rt] RT listening for mailbox commands...
32,919,801 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,075,033 UART: [rt]cmd =0x41544d4e, len=14344
38,374,787 >>> mbox cmd response data (8 bytes)
38,375,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,406,701 UART: [rt]cmd =0x41545348, len=116
38,427,069 >>> mbox cmd response data (12 bytes)
40,483,498 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,628,345 UART:
40,628,710 UART: Running Caliptra ROM ...
40,629,841 UART:
40,630,004 UART: [state] CFI Enabled
40,641,200 UART: [state] LifecycleState = Unprovisioned
40,643,095 UART: [state] DebugLocked = No
40,645,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,650,303 UART: [kat] SHA2-256
40,819,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,830,497 UART: [kat] ++
40,831,018 UART: [kat] sha1
40,842,607 UART: [kat] SHA2-256
40,845,291 UART: [kat] SHA2-384
40,850,648 UART: [kat] SHA2-512-ACC
40,853,052 UART: [kat] ECC-384
43,136,036 UART: [kat] HMAC-384Kdf
43,149,293 UART: [kat] LMS
44,339,354 UART: [kat] --
44,345,142 UART: [update-reset] ++
48,477,340 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,481,668 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,862,631 >>> mbox cmd response: success
48,867,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,867,948 UART: [update-reset] Copying MAN_2 To MAN_1
48,886,565 UART: [update-reset Success] --
48,892,151 UART: [state] Locking Datavault
48,896,106 UART: [state] Locking PCR0, PCR1 and PCR31
48,897,803 UART: [state] Locking ICCM
48,899,080 UART: [exit] Launching FMC @ 0x40000130
48,907,477 UART:
48,907,707 UART: Running Caliptra FMC ...
48,908,803 UART:
48,908,960 UART: [state] CFI Enabled
48,952,894 UART: [art] Extend RT PCRs Done
48,954,089 UART: [art] Lock RT PCRs Done
48,955,595 UART: [art] Populate DV Done
48,960,894 UART: [fht] FMC Alias Private Key: 7
48,962,437 UART: [art] Derive CDI
48,963,271 UART: [art] Store in in slot 0x4
49,005,636 UART: [art] Derive Key Pair
49,006,691 UART: [art] Store priv key in slot 0x5
52,249,112 UART: [art] Derive Key Pair - Done
52,262,325 UART: [art] Signing Cert with AUTHO
52,263,631 UART: RITY.KEYID = 7
54,543,280 UART: [art] Erasing AUTHORITY.KEYID = 7
54,544,791 UART: [art] PUB.X = A873087556B138408CEDF5A91B9A16A42A7674AFAFFA6FDB3C4CF91877A5D165713744237914328E3284DA2330D157AC
54,552,063 UART: [art] PUB.Y = FC9D90953906FDD9EB9B9B9571BC94667415F4F457B10FB99283CD7FAC65CED1CC1DB63C29DCA5B0F4D8791CA10E00F0
54,559,262 UART: [art] SIG.R = 7C35DBA3095EC7CA44AA087D8F652D94465E764F3A008C25C0DB33743F8A20362E64D7764B80484EE91C68AE328CDF63
54,566,670 UART: [art] SIG.S = 474A6C71481D7E2FFDF91C44D5145D6B1D529CB59BD812420A90663D0325FEBCDAC2BBC948C9000D811865F3BCEBD45A
55,871,436 UART: Caliptra RT
55,872,152 UART: [state] CFI Enabled
56,160,636 UART: [rt] RT listening for mailbox commands...
56,192,594 UART: [rt]cmd =0x41545348, len=116
56,212,919 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,306 writing to cptra_bootfsm_go
4,130,634 ready_for_fw is high
4,131,021 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,071,885 >>> mbox cmd response: success
23,717,072 UART:
23,717,502 UART: Running Caliptra FMC ...
23,718,615 UART:
23,718,771 UART: [state] CFI Enabled
23,726,957 UART: [fht] FMC Alias Private Key: 7
26,057,743 UART: [art] Extend RT PCRs Done
26,058,990 UART: [art] Lock RT PCRs Done
26,060,859 UART: [art] Populate DV Done
26,066,321 UART: [fht] FMC Alias Private Key: 7
26,068,023 UART: [art] Derive CDI
26,068,838 UART: [art] Store in in slot 0x4
26,111,377 UART: [art] Derive Key Pair
26,112,373 UART: [art] Store priv key in slot 0x5
29,354,900 UART: [art] Derive Key Pair - Done
29,367,905 UART: [art] Signing Cert with AUTHO
29,369,207 UART: RITY.KEYID = 7
31,648,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,127 UART: [art] PUB.X = 02D1296E7AD8226E761480CDE62DD37DAF1F121CC04C122F204544BE37225ACE913BC5C6B33EC13FB78D6428A1D4ECC3
31,657,351 UART: [art] PUB.Y = F2F3A353C1DC4529654571FE803883BB422AD7397C7810B9DF24C905DCFBB6309169FD04AC2033EB1B7FA57927952D18
31,664,576 UART: [art] SIG.R = ADDBA7AD236793CD81C87D81AC281187C94933E57FFDEE33A04F9A5B256AF2E5925E7BBE1C1571A0C29A1001580E3B9A
31,671,957 UART: [art] SIG.S = 84782E2875B3B153A8738CEC1D8610FCA347B5FC7B47FDCF4711BDB71B0F8B1F91AEE17C844A13D61E1191F34F4F5675
32,977,036 UART: Caliptra RT
32,977,776 UART: [state] CFI Enabled
33,095,521 UART: [rt] RT listening for mailbox commands...
33,097,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,253,392 UART: [rt]cmd =0x41544d4e, len=14344
38,553,596 >>> mbox cmd response data (8 bytes)
38,554,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,585,022 UART: [rt]cmd =0x41545348, len=116
38,604,076 >>> mbox cmd response data (12 bytes)
40,657,358 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,306,296 >>> mbox cmd response: success
49,306,992 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,340,385 UART:
49,340,710 UART: Running Caliptra FMC ...
49,341,834 UART:
49,341,993 UART: [state] CFI Enabled
49,386,011 UART: [art] Extend RT PCRs Done
49,387,167 UART: [art] Lock RT PCRs Done
49,388,721 UART: [art] Populate DV Done
49,394,290 UART: [fht] FMC Alias Private Key: 7
49,395,767 UART: [art] Derive CDI
49,396,537 UART: [art] Store in in slot 0x4
49,439,418 UART: [art] Derive Key Pair
49,440,464 UART: [art] Store priv key in slot 0x5
52,682,413 UART: [art] Derive Key Pair - Done
52,695,305 UART: [art] Signing Cert with AUTHO
52,696,612 UART: RITY.KEYID = 7
54,976,212 UART: [art] Erasing AUTHORITY.KEYID = 7
54,977,751 UART: [art] PUB.X = C02C3FD9D108AC1193348CF59697C692A38FA9DBBC55CA5AD7989417C37193F7AB496F1BC28BB19A5BAD1EFE91C15C6A
54,984,984 UART: [art] PUB.Y = 4AA6EC88961AB0EDC7C2F69DE95A39747940E4B5F9354E5179A616CD3B8EF557B583BE9053748BAB63BF6BFF71A532BC
54,992,196 UART: [art] SIG.R = BC056A0D41EBB35C8037055DF20EDF90696B4E809F075B7E3AA71936416E0BC1D45F2A3DFB8B0551A6DED400EA69D9ED
54,999,574 UART: [art] SIG.S = E23703C184F7F37DD9D32262D968EBDBC3AD2BD2CCBCC50B91C6366E1A64E02A8829FE6D32D51F0AFCA5D3D27BE36BF5
56,304,432 UART: Caliptra RT
56,305,142 UART: [state] CFI Enabled
56,591,622 UART: [rt] RT listening for mailbox commands...
56,623,738 UART: [rt]cmd =0x41545348, len=116
56,643,721 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,823 writing to cptra_bootfsm_go
192,969 UART:
193,349 UART: Running Caliptra ROM ...
194,567 UART:
194,721 UART: [state] CFI Enabled
267,217 UART: [state] LifecycleState = Unprovisioned
269,130 UART: [state] DebugLocked = No
270,588 UART: [state] WD Timer not started. Device not locked for debugging
274,263 UART: [kat] SHA2-256
453,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,953 UART: [kat] ++
465,400 UART: [kat] sha1
477,542 UART: [kat] SHA2-256
480,538 UART: [kat] SHA2-384
486,530 UART: [kat] SHA2-512-ACC
489,483 UART: [kat] ECC-384
2,949,328 UART: [kat] HMAC-384Kdf
2,973,148 UART: [kat] LMS
3,502,619 UART: [kat] --
3,506,402 UART: [cold-reset] ++
3,507,618 UART: [fht] FHT @ 0x50003400
3,517,097 UART: [idev] ++
3,517,657 UART: [idev] CDI.KEYID = 6
3,518,685 UART: [idev] SUBJECT.KEYID = 7
3,519,783 UART: [idev] UDS.KEYID = 0
3,520,720 ready_for_fw is high
3,520,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,403 UART: [idev] Erasing UDS.KEYID = 0
6,026,731 UART: [idev] Sha1 KeyId Algorithm
6,049,197 UART: [idev] --
6,052,631 UART: [ldev] ++
6,053,227 UART: [ldev] CDI.KEYID = 6
6,054,111 UART: [ldev] SUBJECT.KEYID = 5
6,055,320 UART: [ldev] AUTHORITY.KEYID = 7
6,056,503 UART: [ldev] FE.KEYID = 1
6,101,010 UART: [ldev] Erasing FE.KEYID = 1
8,602,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,210 UART: [ldev] --
10,413,815 UART: [fwproc] Wait for Commands...
10,416,819 UART: [fwproc] Recv command 0x46574c44
10,418,853 UART: [fwproc] Recv'd Img size: 114084 bytes
13,812,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,330 >>> mbox cmd response: success
14,280,108 UART: [afmc] ++
14,280,714 UART: [afmc] CDI.KEYID = 6
14,281,625 UART: [afmc] SUBJECT.KEYID = 7
14,282,875 UART: [afmc] AUTHORITY.KEYID = 5
16,805,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,436 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,679 UART: [afmc] --
18,607,115 UART: [cold-reset] --
18,610,762 UART: [state] Locking Datavault
18,616,658 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,378 UART: [state] Locking ICCM
18,619,447 UART: [exit] Launching FMC @ 0x40000130
18,627,857 UART:
18,628,089 UART: Running Caliptra FMC ...
18,629,189 UART:
18,629,354 UART: [state] CFI Enabled
18,691,072 UART: [fht] FMC Alias Private Key: 7
20,454,451 UART: [art] Extend RT PCRs Done
20,455,664 UART: [art] Lock RT PCRs Done
20,457,532 UART: [art] Populate DV Done
20,462,993 UART: [fht] FMC Alias Private Key: 7
20,464,523 UART: [art] Derive CDI
20,465,255 UART: [art] Store in in slot 0x4
20,523,586 UART: [art] Derive Key Pair
20,524,624 UART: [art] Store priv key in slot 0x5
22,987,303 UART: [art] Derive Key Pair - Done
22,999,824 UART: [art] Signing Cert with AUTHO
23,001,122 UART: RITY.KEYID = 7
24,712,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,857 UART: [art] PUB.X = F3E9EA2EA33E78D611E824038B7B0830566EDD99EF000C1F0DC928AEBB4CE661E65F36E7113B554D14F8B148F2F56343
24,721,099 UART: [art] PUB.Y = 7C1906BACF91550C5D41775AAD971CB02443D5A4FC4D51D05038F03CA2340186F631D60D0926C42922F19FB89F1FE68C
24,728,376 UART: [art] SIG.R = E6E9414064FC0181A873F2009223A4A7727AC79A64467861A15A93440952D0B2F2E0F38B0EAAE65BF046197D8CECCB42
24,735,735 UART: [art] SIG.S = C380CED3B0CAEF9F42ECF3A27698F149C54B3DF8F3FD46D46373DC3F2551B959AC0015D24226917D4115781649B96B8C
25,714,098 UART: Caliptra RT
25,714,798 UART: [state] CFI Enabled
25,881,424 UART: [rt] RT listening for mailbox commands...
25,883,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,039,079 UART: [rt]cmd =0x41544d4e, len=14344
30,034,794 >>> mbox cmd response data (8 bytes)
30,035,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,065,974 UART: [rt]cmd =0x41545348, len=116
30,085,703 >>> mbox cmd response data (12 bytes)
32,139,748 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,284,994 UART:
32,285,374 UART: Running Caliptra ROM ...
32,286,420 UART:
32,286,572 UART: [state] CFI Enabled
32,360,853 UART: [state] LifecycleState = Unprovisioned
32,362,853 UART: [state] DebugLocked = No
32,364,866 UART: [state] WD Timer not started. Device not locked for debugging
32,367,803 UART: [kat] SHA2-256
32,546,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,558,519 UART: [kat] ++
32,558,974 UART: [kat] sha1
32,569,875 UART: [kat] SHA2-256
32,572,892 UART: [kat] SHA2-384
32,578,548 UART: [kat] SHA2-512-ACC
32,581,481 UART: [kat] ECC-384
35,044,539 UART: [kat] HMAC-384Kdf
35,056,778 UART: [kat] LMS
35,586,254 UART: [kat] --
35,591,232 UART: [update-reset] ++
39,021,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,025,541 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,407,616 >>> mbox cmd response: success
39,408,048 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,408,486 UART: [update-reset] Copying MAN_2 To MAN_1
39,430,534 UART: [update-reset Success] --
39,435,578 UART: [state] Locking Datavault
39,439,962 UART: [state] Locking PCR0, PCR1 and PCR31
39,441,624 UART: [state] Locking ICCM
39,443,369 UART: [exit] Launching FMC @ 0x40000130
39,451,829 UART:
39,452,059 UART: Running Caliptra FMC ...
39,453,158 UART:
39,453,314 UART: [state] CFI Enabled
39,546,857 UART: [art] Extend RT PCRs Done
39,548,046 UART: [art] Lock RT PCRs Done
39,549,874 UART: [art] Populate DV Done
39,555,607 UART: [fht] FMC Alias Private Key: 7
39,557,296 UART: [art] Derive CDI
39,558,107 UART: [art] Store in in slot 0x4
39,616,537 UART: [art] Derive Key Pair
39,617,638 UART: [art] Store priv key in slot 0x5
42,079,937 UART: [art] Derive Key Pair - Done
42,093,117 UART: [art] Signing Cert with AUTHO
42,094,466 UART: RITY.KEYID = 7
43,809,855 UART: [art] Erasing AUTHORITY.KEYID = 7
43,811,993 UART: [art] PUB.X = 9B04D5B7488631CFC90A2B8C230AA665A5E6A398093F30053B574D647C9408415BD8596291A1332C5B8F992B757659EE
43,818,656 UART: [art] PUB.Y = 2B6BFE065E0BDF44EE76A4C09CD8EC9DF1D8D50035F04B7E4F7B503FA741A9993762841BA146B88356CE6A5A49AD57E2
43,825,873 UART: [art] SIG.R = AEBCC6E20BD760674043CD6AFF5453AFF2D206AA2A1DFDD63059A3071D93C71C864A4187583EAA694B8E453070EF8A03
43,833,304 UART: [art] SIG.S = 66F1834D47279342E0A0433D62612BEB9796CB918E91ADA260E032E011185F7E763FE16BAB93D5D9E8A86336F41D1156
44,812,026 UART: Caliptra RT
44,813,355 UART: [state] CFI Enabled
45,157,689 UART: [rt] RT listening for mailbox commands...
45,189,507 UART: [rt]cmd =0x41545348, len=116
45,209,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,059 writing to cptra_bootfsm_go
3,380,615 ready_for_fw is high
3,380,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,090,211 >>> mbox cmd response: success
18,385,000 UART:
18,385,399 UART: Running Caliptra FMC ...
18,386,506 UART:
18,386,657 UART: [state] CFI Enabled
18,451,562 UART: [fht] FMC Alias Private Key: 7
20,215,975 UART: [art] Extend RT PCRs Done
20,217,199 UART: [art] Lock RT PCRs Done
20,218,691 UART: [art] Populate DV Done
20,224,210 UART: [fht] FMC Alias Private Key: 7
20,225,785 UART: [art] Derive CDI
20,226,603 UART: [art] Store in in slot 0x4
20,283,884 UART: [art] Derive Key Pair
20,284,889 UART: [art] Store priv key in slot 0x5
22,747,288 UART: [art] Derive Key Pair - Done
22,760,442 UART: [art] Signing Cert with AUTHO
22,761,738 UART: RITY.KEYID = 7
24,473,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,804 UART: [art] PUB.X = 1EE175035EEF718C5E01D254304DD21C18B49C972D381416CC5C9D4E05F639284F5F9BED33A63FFDF178273722B79078
24,482,042 UART: [art] PUB.Y = 02619AA54A6C2E0D0970D85B644A9F6A068E7DFCBAD68785C4F035B0646E1AC282F88B39A75178E3789A86B93B7DBD0C
24,489,291 UART: [art] SIG.R = 670E7E90947FC09CFD60C9428286FD31275797DE45C9FC3246BC2A4F127A6DB921A0101EC8D85A47B0C70080A4185235
24,496,655 UART: [art] SIG.S = C9AA486F95C2F7DA259D093FC885CEAF7383E07F59251489660EA32EFB5B4F9C98E1D05CD585D83F2B442860425948C9
25,475,741 UART: Caliptra RT
25,476,455 UART: [state] CFI Enabled
25,641,251 UART: [rt] RT listening for mailbox commands...
25,643,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,799,270 UART: [rt]cmd =0x41544d4e, len=14344
29,794,875 >>> mbox cmd response data (8 bytes)
29,795,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,826,461 UART: [rt]cmd =0x41545348, len=116
29,845,550 >>> mbox cmd response data (12 bytes)
31,901,282 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
39,021,741 >>> mbox cmd response: success
39,022,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,054,507 UART:
39,054,842 UART: Running Caliptra FMC ...
39,055,970 UART:
39,056,140 UART: [state] CFI Enabled
39,154,216 UART: [art] Extend RT PCRs Done
39,155,413 UART: [art] Lock RT PCRs Done
39,157,050 UART: [art] Populate DV Done
39,162,625 UART: [fht] FMC Alias Private Key: 7
39,164,159 UART: [art] Derive CDI
39,164,973 UART: [art] Store in in slot 0x4
39,223,233 UART: [art] Derive Key Pair
39,224,271 UART: [art] Store priv key in slot 0x5
41,687,093 UART: [art] Derive Key Pair - Done
41,699,825 UART: [art] Signing Cert with AUTHO
41,701,123 UART: RITY.KEYID = 7
43,412,216 UART: [art] Erasing AUTHORITY.KEYID = 7
43,413,737 UART: [art] PUB.X = 142A8ABC4F473D1C7155B956331C4C7E428A59D56B9CD544D07C3B821DCC65171A4B03AF1C2C8DCA11D67A451DBB29F9
43,421,008 UART: [art] PUB.Y = 0D4429506531E733D198CB6C6B47F6F2D63EB87266B514D06BCADC5EB13855F8E849E9B9CBA3A122ADB41CDC1AFE37A3
43,428,268 UART: [art] SIG.R = 04D7C27D73CFA49F39FDB18EEC9C8B4D9F491B37D0B7ECCC1571E2B20BD7D35E1D2FE70A8696BCA9E31C51C6A6534720
43,435,712 UART: [art] SIG.S = 28B618BD85D65A3149EDFBF19F72815E7F518FD19C368AE8284FDAE785C9EFDF5398B2C78E8097D3E0B728FDCAA773A4
44,415,175 UART: Caliptra RT
44,415,883 UART: [state] CFI Enabled
44,748,523 UART: [rt] RT listening for mailbox commands...
44,780,425 UART: [rt]cmd =0x41545348, len=116
44,800,807 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,317 writing to cptra_bootfsm_go
193,548 UART:
193,911 UART: Running Caliptra ROM ...
195,041 UART:
604,687 UART: [state] CFI Enabled
615,110 UART: [state] LifecycleState = Unprovisioned
616,998 UART: [state] DebugLocked = No
618,395 UART: [state] WD Timer not started. Device not locked for debugging
621,287 UART: [kat] SHA2-256
800,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,960 UART: [kat] ++
812,411 UART: [kat] sha1
824,206 UART: [kat] SHA2-256
827,219 UART: [kat] SHA2-384
833,498 UART: [kat] SHA2-512-ACC
836,436 UART: [kat] ECC-384
3,278,237 UART: [kat] HMAC-384Kdf
3,290,895 UART: [kat] LMS
3,820,382 UART: [kat] --
3,824,311 UART: [cold-reset] ++
3,825,538 UART: [fht] FHT @ 0x50003400
3,836,292 UART: [idev] ++
3,836,898 UART: [idev] CDI.KEYID = 6
3,837,804 UART: [idev] SUBJECT.KEYID = 7
3,838,984 UART: [idev] UDS.KEYID = 0
3,839,982 ready_for_fw is high
3,840,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,983,287 UART: [idev] Erasing UDS.KEYID = 0
6,308,099 UART: [idev] Sha1 KeyId Algorithm
6,331,574 UART: [idev] --
6,335,905 UART: [ldev] ++
6,336,479 UART: [ldev] CDI.KEYID = 6
6,337,390 UART: [ldev] SUBJECT.KEYID = 5
6,338,545 UART: [ldev] AUTHORITY.KEYID = 7
6,339,835 UART: [ldev] FE.KEYID = 1
6,349,294 UART: [ldev] Erasing FE.KEYID = 1
8,824,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,751 UART: [ldev] --
10,616,076 UART: [fwproc] Wait for Commands...
10,618,611 UART: [fwproc] Recv command 0x46574c44
10,620,705 UART: [fwproc] Recv'd Img size: 114084 bytes
14,013,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,474,154 >>> mbox cmd response: success
14,477,956 UART: [afmc] ++
14,478,555 UART: [afmc] CDI.KEYID = 6
14,479,472 UART: [afmc] SUBJECT.KEYID = 7
14,480,635 UART: [afmc] AUTHORITY.KEYID = 5
16,977,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,808 UART: [afmc] --
18,773,929 UART: [cold-reset] --
18,777,904 UART: [state] Locking Datavault
18,783,856 UART: [state] Locking PCR0, PCR1 and PCR31
18,785,505 UART: [state] Locking ICCM
18,786,683 UART: [exit] Launching FMC @ 0x40000130
18,795,137 UART:
18,795,417 UART: Running Caliptra FMC ...
18,796,534 UART:
18,796,696 UART: [state] CFI Enabled
18,804,639 UART: [fht] FMC Alias Private Key: 7
20,561,866 UART: [art] Extend RT PCRs Done
20,563,138 UART: [art] Lock RT PCRs Done
20,564,902 UART: [art] Populate DV Done
20,570,426 UART: [fht] FMC Alias Private Key: 7
20,571,978 UART: [art] Derive CDI
20,572,746 UART: [art] Store in in slot 0x4
20,615,342 UART: [art] Derive Key Pair
20,616,347 UART: [art] Store priv key in slot 0x5
23,042,595 UART: [art] Derive Key Pair - Done
23,055,655 UART: [art] Signing Cert with AUTHO
23,056,966 UART: RITY.KEYID = 7
24,762,660 UART: [art] Erasing AUTHORITY.KEYID = 7
24,764,164 UART: [art] PUB.X = EC4DAE98A10227D7183521DACEFAA13DC18BAD456DC21D1BFA35A113D8DD1F7B9DE8DBD2676E4D6CAF81092BA7472358
24,771,488 UART: [art] PUB.Y = 7AB24EDB67D463CD06783854D23F0DF64A7461F3097B79D35EA294A423D042A9ECE1BFEBB227C0577FC2090F2C7CE64B
24,778,750 UART: [art] SIG.R = 19A556EB17F473AC99C91CA215E5A6C80B90F66B4101FEB485E259FD2C5ACEE7A7EFEA86E0DFDEEFE7D60CC558256895
24,786,184 UART: [art] SIG.S = EEF169AB3C0E9FAB485583B10BA1B37C07B2F96650976C9A6E0E40F844E37BA3901BE7E224C4B1C583C55739E29E2DB5
25,765,516 UART: Caliptra RT
25,766,250 UART: [state] CFI Enabled
25,883,259 UART: [rt] RT listening for mailbox commands...
25,885,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,040,907 UART: [rt]cmd =0x41544d4e, len=14344
30,036,398 >>> mbox cmd response data (8 bytes)
30,037,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,067,682 UART: [rt]cmd =0x41545348, len=116
30,087,396 >>> mbox cmd response data (12 bytes)
32,139,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,285,120 UART:
32,285,499 UART: Running Caliptra ROM ...
32,286,552 UART:
32,286,736 UART: [state] CFI Enabled
32,302,635 UART: [state] LifecycleState = Unprovisioned
32,304,487 UART: [state] DebugLocked = No
32,306,816 UART: [state] WD Timer not started. Device not locked for debugging
32,309,791 UART: [kat] SHA2-256
32,488,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,500,555 UART: [kat] ++
32,501,016 UART: [kat] sha1
32,513,739 UART: [kat] SHA2-256
32,516,809 UART: [kat] SHA2-384
32,522,954 UART: [kat] SHA2-512-ACC
32,525,907 UART: [kat] ECC-384
34,968,241 UART: [kat] HMAC-384Kdf
34,981,009 UART: [kat] LMS
35,510,521 UART: [kat] --
35,515,783 UART: [update-reset] ++
38,942,877 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,945,501 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,327,529 >>> mbox cmd response: success
39,327,984 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,329,229 UART: [update-reset] Copying MAN_2 To MAN_1
39,351,564 UART: [update-reset Success] --
39,357,670 UART: [state] Locking Datavault
39,359,957 UART: [state] Locking PCR0, PCR1 and PCR31
39,361,666 UART: [state] Locking ICCM
39,363,604 UART: [exit] Launching FMC @ 0x40000130
39,372,052 UART:
39,372,290 UART: Running Caliptra FMC ...
39,373,391 UART:
39,373,549 UART: [state] CFI Enabled
39,418,096 UART: [art] Extend RT PCRs Done
39,419,241 UART: [art] Lock RT PCRs Done
39,420,652 UART: [art] Populate DV Done
39,426,328 UART: [fht] FMC Alias Private Key: 7
39,427,977 UART: [art] Derive CDI
39,428,790 UART: [art] Store in in slot 0x4
39,471,391 UART: [art] Derive Key Pair
39,472,464 UART: [art] Store priv key in slot 0x5
41,899,010 UART: [art] Derive Key Pair - Done
41,912,054 UART: [art] Signing Cert with AUTHO
41,913,382 UART: RITY.KEYID = 7
43,618,723 UART: [art] Erasing AUTHORITY.KEYID = 7
43,620,228 UART: [art] PUB.X = EA5365B240300087E2590E7F4E9023D12575130FFF632FE20D5FEB2AB6D369F4ED1F5A495A45D1A65F3682800F91AB3A
43,627,498 UART: [art] PUB.Y = 3CCAFAAAB5918A2F3FF5685B9350FD8E795D417930D9243ED76F1D2B083177F915D93D611177B11FC384740BEB039D4A
43,634,753 UART: [art] SIG.R = EAE61CA23AA4698FA2B5928B56FAED2A6E66DB5314B8D1577E0D5EE6D10678C848A1182ACA7B7A1EBA6633675C0D9192
43,642,134 UART: [art] SIG.S = 13AB243E7D41EAD70CD3183F2138B0E1803E6BCD3430AB39491F33381DA4EA2F6A78976E6B5AB314ED0BE78A125E9AF1
44,620,959 UART: Caliptra RT
44,621,667 UART: [state] CFI Enabled
44,908,071 UART: [rt] RT listening for mailbox commands...
44,939,711 UART: [rt]cmd =0x41545348, len=116
44,959,446 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,458 writing to cptra_bootfsm_go
3,697,513 ready_for_fw is high
3,697,926 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,633 >>> mbox cmd response: success
18,516,123 UART:
18,516,550 UART: Running Caliptra FMC ...
18,517,756 UART:
18,517,932 UART: [state] CFI Enabled
18,526,047 UART: [fht] FMC Alias Private Key: 7
20,283,169 UART: [art] Extend RT PCRs Done
20,284,390 UART: [art] Lock RT PCRs Done
20,286,137 UART: [art] Populate DV Done
20,291,428 UART: [fht] FMC Alias Private Key: 7
20,293,042 UART: [art] Derive CDI
20,293,873 UART: [art] Store in in slot 0x4
20,336,257 UART: [art] Derive Key Pair
20,337,258 UART: [art] Store priv key in slot 0x5
22,763,770 UART: [art] Derive Key Pair - Done
22,776,721 UART: [art] Signing Cert with AUTHO
22,778,067 UART: RITY.KEYID = 7
24,483,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,828 UART: [art] PUB.X = 49588C4ED552929CA075F2DEE6DAEA7B68C1F7805030FB5F5178E291472FE1569829B174034FBE97CE5FAF11EC6AE420
24,492,114 UART: [art] PUB.Y = F07348FF83EB2CEB59B74AEEC83E18C295D3245AB8E75A91D55DC917AB6400A3E83FFB66B883AD81256C748E9F482C31
24,499,347 UART: [art] SIG.R = AED9751F7AD57B8A15230B7D060B26F363429B9AE55280A032F3AA8189E3CB062815DEA6DE0FA8DFA6928154643281D6
24,506,779 UART: [art] SIG.S = 4E32718035CD5ED0E3838DE2CF85A890059896FFB3C094C19BAE5C93D8F5831347D5702893E93226EA33F577AECB62BE
25,486,222 UART: Caliptra RT
25,486,940 UART: [state] CFI Enabled
25,604,096 UART: [rt] RT listening for mailbox commands...
25,606,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,761,628 UART: [rt]cmd =0x41544d4e, len=14344
29,758,056 >>> mbox cmd response data (8 bytes)
29,758,648 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,789,332 UART: [rt]cmd =0x41545348, len=116
29,809,528 >>> mbox cmd response data (12 bytes)
31,863,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,912,556 >>> mbox cmd response: success
38,913,186 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,949,992 UART:
38,950,317 UART: Running Caliptra FMC ...
38,951,450 UART:
38,951,610 UART: [state] CFI Enabled
38,995,186 UART: [art] Extend RT PCRs Done
38,996,343 UART: [art] Lock RT PCRs Done
38,997,697 UART: [art] Populate DV Done
39,002,943 UART: [fht] FMC Alias Private Key: 7
39,004,544 UART: [art] Derive CDI
39,005,367 UART: [art] Store in in slot 0x4
39,047,373 UART: [art] Derive Key Pair
39,048,388 UART: [art] Store priv key in slot 0x5
41,475,174 UART: [art] Derive Key Pair - Done
41,488,326 UART: [art] Signing Cert with AUTHO
41,489,666 UART: RITY.KEYID = 7
43,195,351 UART: [art] Erasing AUTHORITY.KEYID = 7
43,196,865 UART: [art] PUB.X = 993153419864C6400F9DCE0615D2A954F9EC93C967C2CABA9D2138D622734EA710AB8826FEE0D5F15CC6FC4C8AED2286
43,204,086 UART: [art] PUB.Y = 5B8CFCAA3BC1862082749830784146D42D9DCA9EC09077989152933E27CE3860289A59D5322A14EF89B2EF5C79B7D771
43,211,349 UART: [art] SIG.R = E06B71C04D764FA60A7F3E8FDCFF51B41EF4E6D242EE25880E1086274C86105BE5672E17139A0C3F4990D6D6719ED90D
43,218,718 UART: [art] SIG.S = AEABB99F461F55F1CA54CFEF233DC08EF707EDB1CBF176A8E68106270ADC0010541ED527B084CA6CACAC9D9F6646EED8
44,197,534 UART: Caliptra RT
44,198,251 UART: [state] CFI Enabled
44,483,850 UART: [rt] RT listening for mailbox commands...
44,515,708 UART: [rt]cmd =0x41545348, len=116
44,535,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
192,919 UART:
193,318 UART: Running Caliptra ROM ...
194,498 UART:
194,644 UART: [state] CFI Enabled
265,011 UART: [state] LifecycleState = Unprovisioned
267,435 UART: [state] DebugLocked = No
268,813 UART: [state] WD Timer not started. Device not locked for debugging
272,792 UART: [kat] SHA2-256
462,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,454 UART: [kat] ++
473,898 UART: [kat] sha1
484,506 UART: [kat] SHA2-256
487,585 UART: [kat] SHA2-384
493,502 UART: [kat] SHA2-512-ACC
496,085 UART: [kat] ECC-384
2,952,121 UART: [kat] HMAC-384Kdf
2,973,020 UART: [kat] LMS
3,504,761 UART: [kat] --
3,508,512 UART: [cold-reset] ++
3,509,592 UART: [fht] FHT @ 0x50003400
3,522,341 UART: [idev] ++
3,523,046 UART: [idev] CDI.KEYID = 6
3,524,031 UART: [idev] SUBJECT.KEYID = 7
3,525,204 UART: [idev] UDS.KEYID = 0
3,526,126 ready_for_fw is high
3,526,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,780 UART: [idev] Erasing UDS.KEYID = 0
6,032,381 UART: [idev] Sha1 KeyId Algorithm
6,055,241 UART: [idev] --
6,059,429 UART: [ldev] ++
6,060,118 UART: [ldev] CDI.KEYID = 6
6,061,030 UART: [ldev] SUBJECT.KEYID = 5
6,062,190 UART: [ldev] AUTHORITY.KEYID = 7
6,063,418 UART: [ldev] FE.KEYID = 1
6,101,286 UART: [ldev] Erasing FE.KEYID = 1
8,608,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,557 UART: [ldev] --
10,416,168 UART: [fwproc] Wait for Commands...
10,417,637 UART: [fwproc] Recv command 0x46574c44
10,419,640 UART: [fwproc] Recv'd Img size: 114084 bytes
13,856,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,591 >>> mbox cmd response: success
14,594,757 UART: [afmc] ++
14,595,466 UART: [afmc] CDI.KEYID = 6
14,596,654 UART: [afmc] SUBJECT.KEYID = 7
14,598,153 UART: [afmc] AUTHORITY.KEYID = 5
17,129,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,983 UART: [afmc] --
18,929,727 UART: [cold-reset] --
18,934,753 UART: [state] Locking Datavault
18,942,234 UART: [state] Locking PCR0, PCR1 and PCR31
18,944,389 UART: [state] Locking ICCM
18,947,139 UART: [exit] Launching FMC @ 0x40000130
18,955,783 UART:
18,956,014 UART: Running Caliptra FMC ...
18,957,117 UART:
18,957,289 UART: [state] CFI Enabled
19,012,300 UART: [fht] FMC Alias Private Key: 7
20,776,709 UART: [art] Extend RT PCRs Done
20,777,933 UART: [art] Lock RT PCRs Done
20,779,449 UART: [art] Populate DV Done
20,784,753 UART: [fht] FMC Alias Private Key: 7
20,786,392 UART: [art] Derive CDI
20,787,207 UART: [art] Store in in slot 0x4
20,845,427 UART: [art] Derive Key Pair
20,846,483 UART: [art] Store priv key in slot 0x5
23,309,095 UART: [art] Derive Key Pair - Done
23,322,474 UART: [art] Signing Cert with AUTHO
23,323,769 UART: RITY.KEYID = 7
25,035,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,872 UART: [art] PUB.X = 847A8CC891A2B7FAAE999426CF6157387CB91F0CA67B614613D7495648858625B8BBD8017301AB42BCA7D132A0E5F08C
25,044,083 UART: [art] PUB.Y = 0E19A6DFFE2193ACE69BDE1A2F8205C2F6D7F9CC1098A782B0D954153D99A0C4859466D3DABDBC369FD4685CDB91A93E
25,051,402 UART: [art] SIG.R = 7AAC6F6FC5F87CBEB623ABE6F8CE53D2F41F93AE6B6823EFA5EE287B94DF65BDFA246302A4A8096B66EC00AA36252B6D
25,058,819 UART: [art] SIG.S = 00ABF3B43966992D31B5568F1831B9D81F8E42A4F10D670FB4DF2F3395EB962A38225446DA274FC641ED223E2CF73AAA
26,037,750 UART: Caliptra RT
26,038,468 UART: [state] CFI Enabled
26,204,312 UART: [rt] RT listening for mailbox commands...
26,206,862 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,362,077 UART: [rt]cmd =0x41544d4e, len=14344
30,357,639 >>> mbox cmd response data (8 bytes)
30,358,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,388,912 UART: [rt]cmd =0x41545348, len=116
30,408,432 >>> mbox cmd response data (12 bytes)
32,471,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,616,449 UART:
32,616,812 UART: Running Caliptra ROM ...
32,617,948 UART:
32,618,123 UART: [state] CFI Enabled
32,688,497 UART: [state] LifecycleState = Unprovisioned
32,690,546 UART: [state] DebugLocked = No
32,692,467 UART: [state] WD Timer not started. Device not locked for debugging
32,696,404 UART: [kat] SHA2-256
32,886,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,897,055 UART: [kat] ++
32,897,596 UART: [kat] sha1
32,908,596 UART: [kat] SHA2-256
32,911,623 UART: [kat] SHA2-384
32,917,179 UART: [kat] SHA2-512-ACC
32,919,763 UART: [kat] ECC-384
35,373,813 UART: [kat] HMAC-384Kdf
35,397,189 UART: [kat] LMS
35,928,756 UART: [kat] --
35,933,148 UART: [update-reset] ++
39,396,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,398,712 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
40,004,778 >>> mbox cmd response: success
40,009,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,010,131 UART: [update-reset] Copying MAN_2 To MAN_1
40,044,707 UART: [update-reset Success] --
40,048,013 UART: [state] Locking Datavault
40,051,570 UART: [state] Locking PCR0, PCR1 and PCR31
40,053,784 UART: [state] Locking ICCM
40,055,653 UART: [exit] Launching FMC @ 0x40000130
40,064,292 UART:
40,064,523 UART: Running Caliptra FMC ...
40,065,559 UART:
40,065,706 UART: [state] CFI Enabled
40,164,580 UART: [art] Extend RT PCRs Done
40,165,775 UART: [art] Lock RT PCRs Done
40,167,381 UART: [art] Populate DV Done
40,172,732 UART: [fht] FMC Alias Private Key: 7
40,174,328 UART: [art] Derive CDI
40,175,143 UART: [art] Store in in slot 0x4
40,233,752 UART: [art] Derive Key Pair
40,234,868 UART: [art] Store priv key in slot 0x5
42,697,453 UART: [art] Derive Key Pair - Done
42,710,341 UART: [art] Signing Cert with AUTHO
42,711,645 UART: RITY.KEYID = 7
44,422,899 UART: [art] Erasing AUTHORITY.KEYID = 7
44,424,410 UART: [art] PUB.X = 24C9740B724FED6096E73FC7D3EEA2EA321AD55C2B89ACBBE3B40A77D9F9DFF2146A6EDED4EAFABBF1AB368215FDF03C
44,431,695 UART: [art] PUB.Y = 5A2C36C5B2BAB5B9A3CB2051482C6BEE76F4E633FC4707FB1492C8AAB3CCE09B19C1974C11EDF4347FF999E11E5A1DD7
44,438,952 UART: [art] SIG.R = 1F8884B32C2814AF258A78B64A70B246379DC87F5992916034BC0200DFD45EBA4CA85F7D71556E6578D2A3CD6CC9BF89
44,446,398 UART: [art] SIG.S = A3A8A6C205289720CADC76AAB5F6A214529DAC47DD9D24A28BCCA52C7412AB50470396E2F054C09D25FB0066B26BD572
45,425,173 UART: Caliptra RT
45,425,862 UART: [state] CFI Enabled
45,763,272 UART: [rt] RT listening for mailbox commands...
45,795,015 UART: [rt]cmd =0x41545348, len=116
45,814,968 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
3,438,202 ready_for_fw is high
3,438,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,705,052 >>> mbox cmd response: success
18,982,802 UART:
18,983,219 UART: Running Caliptra FMC ...
18,984,330 UART:
18,984,483 UART: [state] CFI Enabled
19,051,130 UART: [fht] FMC Alias Private Key: 7
20,815,003 UART: [art] Extend RT PCRs Done
20,816,236 UART: [art] Lock RT PCRs Done
20,817,949 UART: [art] Populate DV Done
20,823,259 UART: [fht] FMC Alias Private Key: 7
20,824,957 UART: [art] Derive CDI
20,825,691 UART: [art] Store in in slot 0x4
20,882,387 UART: [art] Derive Key Pair
20,883,435 UART: [art] Store priv key in slot 0x5
23,346,319 UART: [art] Derive Key Pair - Done
23,359,103 UART: [art] Signing Cert with AUTHO
23,360,410 UART: RITY.KEYID = 7
25,070,690 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,202 UART: [art] PUB.X = 88710B4F4CBA0E062074B47F19457201B25CA32783D09875363C5CCA7DE3EA0E75A0F8E90413268A51610C7695185978
25,079,474 UART: [art] PUB.Y = 06FE32B832D3A7D84BA590034CC5F391CB391A2CC2416C73BD2347A50CB2C43B836A51BCD9231947138F472565E7D0B3
25,086,681 UART: [art] SIG.R = B5E02AB76987EE57D1A3D59B7AE28F6CE594C92278452B1B16F1E9A304429CF8E2C7BBFB18532297DB1628DC23A897D6
25,094,053 UART: [art] SIG.S = A5EA02BD1FBE2EC260B566D06E40E80970840EC2B68DA84E2EA2679AD9D29303DF2399D59C4FBCA4683FF837BFFE28ED
26,073,014 UART: Caliptra RT
26,073,732 UART: [state] CFI Enabled
26,237,876 UART: [rt] RT listening for mailbox commands...
26,240,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,395,678 UART: [rt]cmd =0x41544d4e, len=14344
30,391,202 >>> mbox cmd response data (8 bytes)
30,391,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,422,358 UART: [rt]cmd =0x41545348, len=116
30,441,593 >>> mbox cmd response data (12 bytes)
32,495,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,302,146 >>> mbox cmd response: success
40,302,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,334,646 UART:
40,334,943 UART: Running Caliptra FMC ...
40,336,063 UART:
40,336,230 UART: [state] CFI Enabled
40,430,567 UART: [art] Extend RT PCRs Done
40,431,769 UART: [art] Lock RT PCRs Done
40,433,355 UART: [art] Populate DV Done
40,439,050 UART: [fht] FMC Alias Private Key: 7
40,440,746 UART: [art] Derive CDI
40,441,572 UART: [art] Store in in slot 0x4
40,500,310 UART: [art] Derive Key Pair
40,501,308 UART: [art] Store priv key in slot 0x5
42,963,738 UART: [art] Derive Key Pair - Done
42,976,853 UART: [art] Signing Cert with AUTHO
42,978,157 UART: RITY.KEYID = 7
44,689,621 UART: [art] Erasing AUTHORITY.KEYID = 7
44,691,133 UART: [art] PUB.X = 677DCCDA87F5301964BF3AC88E83CAB4E5A9BFCE295492D2CACFCB0B41D53DC8FEF33885A8EDD7DD402F59633DA64221
44,698,435 UART: [art] PUB.Y = 1BC92237213C8429B26AFF06214D6631CC24C7EE998BEEA289F2A2A656D94A7082DD6F5AFE08A4B1484BAF9403235362
44,705,679 UART: [art] SIG.R = F38953125F3BAA24DC241B2454F570C8881466FDB995821A5FDCF007CDBDDFE2D22E824E406D92C283C250C1ECF6FED1
44,713,110 UART: [art] SIG.S = 73A9AE3B6F6B61E977254261C3D8B9D3F5EB14D83262F9B588EA1E9920E92B327270D1FACE24318F1A4DD3287C21FC50
45,692,306 UART: Caliptra RT
45,693,005 UART: [state] CFI Enabled
46,029,351 UART: [rt] RT listening for mailbox commands...
46,061,358 UART: [rt]cmd =0x41545348, len=116
46,080,975 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,440 writing to cptra_bootfsm_go
193,729 UART:
194,111 UART: Running Caliptra ROM ...
195,331 UART:
604,788 UART: [state] CFI Enabled
617,620 UART: [state] LifecycleState = Unprovisioned
619,998 UART: [state] DebugLocked = No
622,101 UART: [state] WD Timer not started. Device not locked for debugging
626,488 UART: [kat] SHA2-256
816,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,164 UART: [kat] ++
827,773 UART: [kat] sha1
839,578 UART: [kat] SHA2-256
842,578 UART: [kat] SHA2-384
848,425 UART: [kat] SHA2-512-ACC
851,018 UART: [kat] ECC-384
3,292,602 UART: [kat] HMAC-384Kdf
3,306,923 UART: [kat] LMS
3,838,766 UART: [kat] --
3,844,182 UART: [cold-reset] ++
3,845,329 UART: [fht] FHT @ 0x50003400
3,857,799 UART: [idev] ++
3,858,508 UART: [idev] CDI.KEYID = 6
3,859,402 UART: [idev] SUBJECT.KEYID = 7
3,860,652 UART: [idev] UDS.KEYID = 0
3,861,582 ready_for_fw is high
3,861,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,010 UART: [idev] Erasing UDS.KEYID = 0
6,337,051 UART: [idev] Sha1 KeyId Algorithm
6,359,425 UART: [idev] --
6,364,126 UART: [ldev] ++
6,364,816 UART: [ldev] CDI.KEYID = 6
6,365,727 UART: [ldev] SUBJECT.KEYID = 5
6,366,963 UART: [ldev] AUTHORITY.KEYID = 7
6,368,143 UART: [ldev] FE.KEYID = 1
6,380,572 UART: [ldev] Erasing FE.KEYID = 1
8,862,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,940 UART: [ldev] --
10,651,716 UART: [fwproc] Wait for Commands...
10,653,176 UART: [fwproc] Recv command 0x46574c44
10,655,488 UART: [fwproc] Recv'd Img size: 114084 bytes
14,102,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,824 >>> mbox cmd response: success
14,842,709 UART: [afmc] ++
14,843,422 UART: [afmc] CDI.KEYID = 6
14,844,668 UART: [afmc] SUBJECT.KEYID = 7
14,846,112 UART: [afmc] AUTHORITY.KEYID = 5
17,353,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,612 UART: [afmc] --
19,149,439 UART: [cold-reset] --
19,153,640 UART: [state] Locking Datavault
19,160,306 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,462 UART: [state] Locking ICCM
19,164,403 UART: [exit] Launching FMC @ 0x40000130
19,173,059 UART:
19,173,299 UART: Running Caliptra FMC ...
19,174,406 UART:
19,174,582 UART: [state] CFI Enabled
19,182,473 UART: [fht] FMC Alias Private Key: 7
20,939,335 UART: [art] Extend RT PCRs Done
20,940,549 UART: [art] Lock RT PCRs Done
20,942,036 UART: [art] Populate DV Done
20,947,340 UART: [fht] FMC Alias Private Key: 7
20,948,882 UART: [art] Derive CDI
20,949,701 UART: [art] Store in in slot 0x4
20,992,453 UART: [art] Derive Key Pair
20,993,489 UART: [art] Store priv key in slot 0x5
23,420,180 UART: [art] Derive Key Pair - Done
23,432,845 UART: [art] Signing Cert with AUTHO
23,434,144 UART: RITY.KEYID = 7
25,139,464 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,976 UART: [art] PUB.X = 78D2E3B163036C7C5FC3CEE1C798A6CB8003FF5F0B3D0881E8F828F51DAF70F67F1E236C6560974E17D609BB27A0E821
25,148,251 UART: [art] PUB.Y = 0C16DD79876D0E9F1558544888102F586889237B2BF94B7FB029AF294EB168AEF99A1BB259CEC292E0DACD84645C6C12
25,155,517 UART: [art] SIG.R = 91AB12571D9FDEF482678DA269BD448CED87F69066A751D9CFD20AEF988BC408BCC6369AD6A4825391A80478A675C086
25,162,935 UART: [art] SIG.S = E570F14F69C406C3A93A991F16D45ECFD66A04C28FF8FC1D89C4A8D684B47DAE51634358EA7FB00BDC231618BC129267
26,142,070 UART: Caliptra RT
26,142,775 UART: [state] CFI Enabled
26,259,519 UART: [rt] RT listening for mailbox commands...
26,261,904 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,416,986 UART: [rt]cmd =0x41544d4e, len=14344
30,412,650 >>> mbox cmd response data (8 bytes)
30,413,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,444,437 UART: [rt]cmd =0x41545348, len=116
30,464,481 >>> mbox cmd response data (12 bytes)
32,520,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,665,853 UART:
32,666,233 UART: Running Caliptra ROM ...
32,667,368 UART:
32,667,538 UART: [state] CFI Enabled
32,684,240 UART: [state] LifecycleState = Unprovisioned
32,686,084 UART: [state] DebugLocked = No
32,688,500 UART: [state] WD Timer not started. Device not locked for debugging
32,692,991 UART: [kat] SHA2-256
32,882,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,893,655 UART: [kat] ++
32,894,260 UART: [kat] sha1
32,904,780 UART: [kat] SHA2-256
32,907,768 UART: [kat] SHA2-384
32,913,658 UART: [kat] SHA2-512-ACC
32,916,242 UART: [kat] ECC-384
35,357,461 UART: [kat] HMAC-384Kdf
35,369,434 UART: [kat] LMS
35,901,022 UART: [kat] --
35,905,553 UART: [update-reset] ++
39,365,736 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,369,884 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,975,932 >>> mbox cmd response: success
39,980,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,981,257 UART: [update-reset] Copying MAN_2 To MAN_1
40,014,880 UART: [update-reset Success] --
40,019,449 UART: [state] Locking Datavault
40,023,113 UART: [state] Locking PCR0, PCR1 and PCR31
40,025,281 UART: [state] Locking ICCM
40,026,631 UART: [exit] Launching FMC @ 0x40000130
40,035,317 UART:
40,035,558 UART: Running Caliptra FMC ...
40,036,662 UART:
40,036,823 UART: [state] CFI Enabled
40,080,892 UART: [art] Extend RT PCRs Done
40,082,043 UART: [art] Lock RT PCRs Done
40,083,495 UART: [art] Populate DV Done
40,088,839 UART: [fht] FMC Alias Private Key: 7
40,090,530 UART: [art] Derive CDI
40,091,358 UART: [art] Store in in slot 0x4
40,133,830 UART: [art] Derive Key Pair
40,135,055 UART: [art] Store priv key in slot 0x5
42,561,734 UART: [art] Derive Key Pair - Done
42,574,470 UART: [art] Signing Cert with AUTHO
42,575,805 UART: RITY.KEYID = 7
44,281,124 UART: [art] Erasing AUTHORITY.KEYID = 7
44,282,649 UART: [art] PUB.X = 3C2FAFF2C0F827DE796B1DEC567D7C5EA10163A387A8904D0C77287CF4C7E660F226BD4E2DDC641A3F393A202F08B1E1
44,289,925 UART: [art] PUB.Y = 98C3F37002976A4550B7D1D1DE90B7C1E4AB221C128E2067821002BEBDEC3E015D27FDF8A7B18FB837F8A8E588CC58E0
44,297,181 UART: [art] SIG.R = 877AE3B962BE2D8DFDB2E5E88B4FE48286D38B1386B85FBEFF52B725AEAF5466CFB80CE01511A24CEAC059A01DCB4879
44,304,609 UART: [art] SIG.S = 60FC1D677E9924E0A79EA53A745F000AD77485B5E22F9C2B106198CDF93D13F196DFC24753EDAB12BC637ED7C44F78D3
45,283,529 UART: Caliptra RT
45,284,235 UART: [state] CFI Enabled
45,570,465 UART: [rt] RT listening for mailbox commands...
45,602,632 UART: [rt]cmd =0x41545348, len=116
45,622,709 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,354 writing to cptra_bootfsm_go
3,756,574 ready_for_fw is high
3,757,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,960,970 >>> mbox cmd response: success
19,213,461 UART:
19,213,852 UART: Running Caliptra FMC ...
19,215,056 UART:
19,215,228 UART: [state] CFI Enabled
19,223,002 UART: [fht] FMC Alias Private Key: 7
20,980,163 UART: [art] Extend RT PCRs Done
20,981,383 UART: [art] Lock RT PCRs Done
20,983,232 UART: [art] Populate DV Done
20,988,913 UART: [fht] FMC Alias Private Key: 7
20,990,456 UART: [art] Derive CDI
20,991,275 UART: [art] Store in in slot 0x4
21,033,457 UART: [art] Derive Key Pair
21,034,469 UART: [art] Store priv key in slot 0x5
23,461,406 UART: [art] Derive Key Pair - Done
23,475,036 UART: [art] Signing Cert with AUTHO
23,476,351 UART: RITY.KEYID = 7
25,181,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,172 UART: [art] PUB.X = 92E22605EF7FAD4F53C537F4184ADFE093ACEE6354CA94DBE35853AD8E66E20B322C3D8BDCB5EFC073C2D81933F34A31
25,190,470 UART: [art] PUB.Y = BFA1474AAA01D2BF04DF43206265BB084DD97C49556A02777447A6EE4047702508378A0D97D0B738C1BF3DF96D0EBE38
25,197,741 UART: [art] SIG.R = 6A398C4538BDD068547F5F0CB32C452031134896B3A4D3B53975D295D5279DE737DBF6DC3D0B7DF8FBBBB2F61CA2CFC6
25,205,130 UART: [art] SIG.S = 6832BB7B3EA0ECE56617B56D3762A9AD08388532ED50CCD4537987971FA981A5EA6AE38E971B5B083E7C73B5667F8F60
26,183,670 UART: Caliptra RT
26,184,387 UART: [state] CFI Enabled
26,301,352 UART: [rt] RT listening for mailbox commands...
26,303,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,458,793 UART: [rt]cmd =0x41544d4e, len=14344
30,454,346 >>> mbox cmd response data (8 bytes)
30,454,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,485,704 UART: [rt]cmd =0x41545348, len=116
30,505,389 >>> mbox cmd response data (12 bytes)
32,560,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,282,583 >>> mbox cmd response: success
40,283,178 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,318,366 UART:
40,318,672 UART: Running Caliptra FMC ...
40,319,801 UART:
40,319,968 UART: [state] CFI Enabled
40,363,702 UART: [art] Extend RT PCRs Done
40,364,899 UART: [art] Lock RT PCRs Done
40,366,380 UART: [art] Populate DV Done
40,371,956 UART: [fht] FMC Alias Private Key: 7
40,373,444 UART: [art] Derive CDI
40,374,216 UART: [art] Store in in slot 0x4
40,416,657 UART: [art] Derive Key Pair
40,417,696 UART: [art] Store priv key in slot 0x5
42,844,772 UART: [art] Derive Key Pair - Done
42,857,675 UART: [art] Signing Cert with AUTHO
42,858,989 UART: RITY.KEYID = 7
44,564,192 UART: [art] Erasing AUTHORITY.KEYID = 7
44,565,837 UART: [art] PUB.X = A568358E3019C9E06D9A60A01191A81CC3B75E80F77093A3AEF14D9095156909EC607DC1AACE1E8FC61F5A9E3A7B5AF4
44,572,956 UART: [art] PUB.Y = DF32CCCB6B995285E6ABD2C79DBA6E7EF2337E41260BF42DC20AADC43119BDE49D8ACCD3B788E1781A0704753E7161F7
44,580,230 UART: [art] SIG.R = 494D24436269714D78BCE5C5654683220CB289C1C0BA9EC28ED016028A2D15E6A6FD2BD8D42359A8DDF288480B35FDF6
44,587,615 UART: [art] SIG.S = 77A0653DC88EA276F331BBAF0683D3F89110C59F5AFA17BA1B41C027EA39AD3356C18592C851E222B948B3377556981B
45,565,925 UART: Caliptra RT
45,566,625 UART: [state] CFI Enabled
45,851,492 UART: [rt] RT listening for mailbox commands...
45,883,447 UART: [rt]cmd =0x41545348, len=116
45,903,626 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,357 UART: [kat] SHA2-256
881,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,403 UART: [kat] ++
885,555 UART: [kat] sha1
889,717 UART: [kat] SHA2-256
891,655 UART: [kat] SHA2-384
894,552 UART: [kat] SHA2-512-ACC
896,453 UART: [kat] ECC-384
901,766 UART: [kat] HMAC-384Kdf
906,284 UART: [kat] LMS
1,474,480 UART: [kat] --
1,475,381 UART: [cold-reset] ++
1,475,861 UART: [fht] Storing FHT @ 0x50003400
1,478,686 UART: [idev] ++
1,478,854 UART: [idev] CDI.KEYID = 6
1,479,214 UART: [idev] SUBJECT.KEYID = 7
1,479,638 UART: [idev] UDS.KEYID = 0
1,479,983 ready_for_fw is high
1,479,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,856 UART: [idev] --
1,513,889 UART: [ldev] ++
1,514,057 UART: [ldev] CDI.KEYID = 6
1,514,420 UART: [ldev] SUBJECT.KEYID = 5
1,514,846 UART: [ldev] AUTHORITY.KEYID = 7
1,515,309 UART: [ldev] FE.KEYID = 1
1,520,509 UART: [ldev] Erasing FE.KEYID = 1
1,546,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,658 UART: [ldev] --
1,584,949 UART: [fwproc] Waiting for Commands...
1,585,704 UART: [fwproc] Received command 0x46574c44
1,586,495 UART: [fwproc] Received Image of size 114084 bytes
2,881,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,227 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,116 >>> mbox cmd response: success
3,074,194 UART: [afmc] ++
3,074,362 UART: [afmc] CDI.KEYID = 6
3,074,724 UART: [afmc] SUBJECT.KEYID = 7
3,075,149 UART: [afmc] AUTHORITY.KEYID = 5
3,109,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,689 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,379 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,294 UART: [afmc] --
3,153,414 UART: [cold-reset] --
3,154,468 UART: [state] Locking Datavault
3,155,651 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,255 UART: [state] Locking ICCM
3,156,831 UART: [exit] Launching FMC @ 0x40000130
3,162,160 UART:
3,162,176 UART: Running Caliptra FMC ...
3,162,584 UART:
3,162,638 UART: [state] CFI Enabled
3,172,923 UART: [fht] FMC Alias Private Key: 7
3,281,336 UART: [art] Extend RT PCRs Done
3,281,764 UART: [art] Lock RT PCRs Done
3,283,442 UART: [art] Populate DV Done
3,291,747 UART: [fht] FMC Alias Private Key: 7
3,292,695 UART: [art] Derive CDI
3,292,975 UART: [art] Store in in slot 0x4
3,378,636 UART: [art] Derive Key Pair
3,378,996 UART: [art] Store priv key in slot 0x5
3,392,340 UART: [art] Derive Key Pair - Done
3,407,247 UART: [art] Signing Cert with AUTHO
3,407,727 UART: RITY.KEYID = 7
3,422,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,310 UART: [art] PUB.X = 880D338C041874CF37FC6AAC1BABDCA2C84E522A997AD082E0A9BEAC392FCC67B9A6D8C322FC269324563D90B30D958F
3,430,087 UART: [art] PUB.Y = 761E5D837B5A99196D2B988040CA3D2D74734D4E5742A44FEED71BC223A73118C5CA6FB4F026D44257AEE0495680FFB0
3,437,041 UART: [art] SIG.R = 073455D0B57BDA16FF4CB06D80C3F8C3654892901EE4E37AE9F59449F0644FD1952A4140F4BB45D288D2CD090A7D86E4
3,443,806 UART: [art] SIG.S = 7904D2232700808937136CB006CB03FF4872704272FE7B37479D1E8EE7D7E8DE52AE22977125C562503F039285EE9304
3,467,850 UART: Caliptra RT
3,468,103 UART: [state] CFI Enabled
3,575,823 UART: [rt] RT listening for mailbox commands...
3,576,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,593 UART: [rt]cmd =0x41544d4e, len=14344
4,009,643 >>> mbox cmd response data (8 bytes)
4,009,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,913 UART: [rt]cmd =0x41545348, len=116
4,061,280 >>> mbox cmd response data (12 bytes)
4,061,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,062,105 UART:
4,062,121 UART: Running Caliptra ROM ...
4,062,529 UART:
4,062,583 UART: [state] CFI Enabled
4,065,231 UART: [state] LifecycleState = Unprovisioned
4,065,886 UART: [state] DebugLocked = No
4,066,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,068,053 UART: [kat] SHA2-256
4,861,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,866,099 UART: [kat] ++
4,866,251 UART: [kat] sha1
4,870,447 UART: [kat] SHA2-256
4,872,385 UART: [kat] SHA2-384
4,875,162 UART: [kat] SHA2-512-ACC
4,877,062 UART: [kat] ECC-384
4,882,913 UART: [kat] HMAC-384Kdf
4,887,683 UART: [kat] LMS
5,455,879 UART: [kat] --
5,456,718 UART: [update-reset] ++
6,788,978 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,790,186 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,939,690 >>> mbox cmd response: success
6,939,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,939,881 UART: [update-reset] Copying MAN_2 To MAN_1
6,947,895 UART: [update-reset Success] --
6,948,894 UART: [state] Locking Datavault
6,949,600 UART: [state] Locking PCR0, PCR1 and PCR31
6,950,204 UART: [state] Locking ICCM
6,950,844 UART: [exit] Launching FMC @ 0x40000130
6,956,173 UART:
6,956,189 UART: Running Caliptra FMC ...
6,956,597 UART:
6,956,651 UART: [state] CFI Enabled
7,046,260 UART: [art] Extend RT PCRs Done
7,046,688 UART: [art] Lock RT PCRs Done
7,047,747 UART: [art] Populate DV Done
7,056,150 UART: [fht] FMC Alias Private Key: 7
7,057,114 UART: [art] Derive CDI
7,057,394 UART: [art] Store in in slot 0x4
7,142,777 UART: [art] Derive Key Pair
7,143,137 UART: [art] Store priv key in slot 0x5
7,156,091 UART: [art] Derive Key Pair - Done
7,171,226 UART: [art] Signing Cert with AUTHO
7,171,706 UART: RITY.KEYID = 7
7,186,838 UART: [art] Erasing AUTHORITY.KEYID = 7
7,187,603 UART: [art] PUB.X = E634CA448FA3AF18973C72C88739957F0C332D54EE86519B158D06DE05F43BD5CE4BE282191C1EBD29BDF91E8BE682C8
7,194,374 UART: [art] PUB.Y = CEC293E844981FF8405820B12241282E20C71F53430840C9D668D044EADBEA3323EA3CA09F976C7E7AEE402CE353506B
7,201,323 UART: [art] SIG.R = DEBA1C2328484097EF506D3E6DC888863A176FCD20D42F861EC778B21A28744FFBCEC9CE482AAB81579A133ECCDBA495
7,208,109 UART: [art] SIG.S = D4C8BB3D8788B51DE92050EDD404A265FA8F5C705F28C66098502CFB27AC5C9D58504C7EED6A1F7782BC8B96DE279B2B
7,231,265 UART: Caliptra RT
7,231,518 UART: [state] CFI Enabled
7,513,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,544,577 UART: [rt]cmd =0x41545348, len=116
7,567,246 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 ready_for_fw is high
1,362,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,650 >>> mbox cmd response: success
2,986,662 UART:
2,986,678 UART: Running Caliptra FMC ...
2,987,086 UART:
2,987,140 UART: [state] CFI Enabled
2,997,835 UART: [fht] FMC Alias Private Key: 7
3,105,640 UART: [art] Extend RT PCRs Done
3,106,068 UART: [art] Lock RT PCRs Done
3,107,430 UART: [art] Populate DV Done
3,115,511 UART: [fht] FMC Alias Private Key: 7
3,116,443 UART: [art] Derive CDI
3,116,723 UART: [art] Store in in slot 0x4
3,202,756 UART: [art] Derive Key Pair
3,203,116 UART: [art] Store priv key in slot 0x5
3,216,012 UART: [art] Derive Key Pair - Done
3,230,910 UART: [art] Signing Cert with AUTHO
3,231,390 UART: RITY.KEYID = 7
3,246,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,999 UART: [art] PUB.X = 5A0BDA4DAC93218241D85D93B01AE5591A6E3CAF238F2E1C40D3CA71BBEB2B45E49E8E072D461DB4182DD9833894536D
3,253,775 UART: [art] PUB.Y = 7DE7D1F5B946130F4A77A9FF450277FCBB88F41D5E86BF8E532D08853CF8C58F08E21933C36A3ED1A69A827494F25699
3,260,717 UART: [art] SIG.R = 0CA2AE45A7F116DC6FB8C71352002FA46405E004CDC04427363F5F4F36C014EE608E00010E39D71FD82742A862364EC2
3,267,428 UART: [art] SIG.S = 3F5491BC0FE24ABD7695F6526224FCCC05D63B32ACB19FE2439F9ED29992A440E52BC43C981A60797E92F07FE6852724
3,291,553 UART: Caliptra RT
3,291,806 UART: [state] CFI Enabled
3,399,128 UART: [rt] RT listening for mailbox commands...
3,399,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,008 UART: [rt]cmd =0x41544d4e, len=14344
3,832,864 >>> mbox cmd response data (8 bytes)
3,832,865 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,908 UART: [rt]cmd =0x41545348, len=116
3,884,783 >>> mbox cmd response data (12 bytes)
3,884,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,642,521 >>> mbox cmd response: success
6,642,521 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,655,990 UART:
6,656,006 UART: Running Caliptra FMC ...
6,656,414 UART:
6,656,468 UART: [state] CFI Enabled
6,745,609 UART: [art] Extend RT PCRs Done
6,746,037 UART: [art] Lock RT PCRs Done
6,747,268 UART: [art] Populate DV Done
6,755,401 UART: [fht] FMC Alias Private Key: 7
6,756,543 UART: [art] Derive CDI
6,756,823 UART: [art] Store in in slot 0x4
6,842,308 UART: [art] Derive Key Pair
6,842,668 UART: [art] Store priv key in slot 0x5
6,855,914 UART: [art] Derive Key Pair - Done
6,870,956 UART: [art] Signing Cert with AUTHO
6,871,436 UART: RITY.KEYID = 7
6,886,986 UART: [art] Erasing AUTHORITY.KEYID = 7
6,887,751 UART: [art] PUB.X = A9215C8167633A6113F9E74512F56901F0EE97D03F114708843BAA91AE7964908AAB38C7D2F503ABF2294AD116E6491C
6,894,508 UART: [art] PUB.Y = C92A1D426C98F6BDA1455AC5D582CB316C10A2C74428B5855B1A02F0BA4075F4B55FE9579CFA215DF0A96574770790E9
6,901,456 UART: [art] SIG.R = 40F91334DCB6CB300A882A181BC8F2B89A0B7C5DEFF40FD579B3FBE6FB55C97AF90BCD2860481C51C7577FFD064D04E9
6,908,226 UART: [art] SIG.S = 9783CBE299DEE0C004926BFD2956CD42CC3DCDA230774D40CB36E1A5165E8DE9E9300D28A6F757EFF51D64F3319D3311
6,932,451 UART: Caliptra RT
6,932,704 UART: [state] CFI Enabled
7,212,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,243,748 UART: [rt]cmd =0x41545348, len=116
7,264,717 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,852 UART: [kat] SHA2-256
882,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,898 UART: [kat] ++
887,050 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,893 UART: [kat] SHA2-512-ACC
897,794 UART: [kat] ECC-384
903,371 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,990 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 ready_for_fw is high
1,481,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,657 UART: [idev] Erasing UDS.KEYID = 0
1,505,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,989 UART: [idev] --
1,514,982 UART: [ldev] ++
1,515,150 UART: [ldev] CDI.KEYID = 6
1,515,513 UART: [ldev] SUBJECT.KEYID = 5
1,515,939 UART: [ldev] AUTHORITY.KEYID = 7
1,516,402 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,914 UART: [fwproc] Waiting for Commands...
1,587,541 UART: [fwproc] Received command 0x46574c44
1,588,332 UART: [fwproc] Received Image of size 114084 bytes
2,883,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,239 >>> mbox cmd response: success
3,077,349 UART: [afmc] ++
3,077,517 UART: [afmc] CDI.KEYID = 6
3,077,879 UART: [afmc] SUBJECT.KEYID = 7
3,078,304 UART: [afmc] AUTHORITY.KEYID = 5
3,112,973 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,317 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,097 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,710 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,400 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,375 UART: [afmc] --
3,156,459 UART: [cold-reset] --
3,157,157 UART: [state] Locking Datavault
3,158,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,080 UART: [state] Locking ICCM
3,159,568 UART: [exit] Launching FMC @ 0x40000130
3,164,897 UART:
3,164,913 UART: Running Caliptra FMC ...
3,165,321 UART:
3,165,464 UART: [state] CFI Enabled
3,175,683 UART: [fht] FMC Alias Private Key: 7
3,283,672 UART: [art] Extend RT PCRs Done
3,284,100 UART: [art] Lock RT PCRs Done
3,285,714 UART: [art] Populate DV Done
3,294,135 UART: [fht] FMC Alias Private Key: 7
3,295,197 UART: [art] Derive CDI
3,295,477 UART: [art] Store in in slot 0x4
3,381,354 UART: [art] Derive Key Pair
3,381,714 UART: [art] Store priv key in slot 0x5
3,394,972 UART: [art] Derive Key Pair - Done
3,409,689 UART: [art] Signing Cert with AUTHO
3,410,169 UART: RITY.KEYID = 7
3,425,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,448 UART: [art] PUB.X = CD2AA60EE9C9F9F5F53C5DADBE3A03CBE4A814744A5279E89E77561B7896D971774321D018DA8FE43D576698E666C974
3,433,218 UART: [art] PUB.Y = 2C96E1A495B155E3765821737B212FD850375AC1A4B71CDC48060D9FE6E0996F1661026256EBDBA2626B70F1B9DB1E36
3,440,159 UART: [art] SIG.R = AD8423714B2A52CF9B49C194B2FAA48F0E14DE61F0CBA253505F0181BDA0B96757CA40BB3A85F264737D8F0D8D5DA098
3,446,932 UART: [art] SIG.S = E73AECFED07DF1C8D1C8ED8A6BB35E2F5E6898ABDF7A6E2CA217EEA232C6A9A2A8027C2A0EAC410B742721D7144CB6C0
3,470,280 UART: Caliptra RT
3,470,625 UART: [state] CFI Enabled
3,579,453 UART: [rt] RT listening for mailbox commands...
3,580,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,111 UART: [rt]cmd =0x41544d4e, len=14344
4,013,299 >>> mbox cmd response data (8 bytes)
4,013,300 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,235 UART: [rt]cmd =0x41545348, len=116
4,065,102 >>> mbox cmd response data (12 bytes)
4,065,103 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,613 UART:
4,065,629 UART: Running Caliptra ROM ...
4,066,037 UART:
4,066,178 UART: [state] CFI Enabled
4,068,642 UART: [state] LifecycleState = Unprovisioned
4,069,297 UART: [state] DebugLocked = No
4,069,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,071,594 UART: [kat] SHA2-256
4,865,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,869,640 UART: [kat] ++
4,869,792 UART: [kat] sha1
4,873,806 UART: [kat] SHA2-256
4,875,744 UART: [kat] SHA2-384
4,878,567 UART: [kat] SHA2-512-ACC
4,880,467 UART: [kat] ECC-384
4,885,912 UART: [kat] HMAC-384Kdf
4,890,606 UART: [kat] LMS
5,458,802 UART: [kat] --
5,459,437 UART: [update-reset] ++
6,791,629 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,792,869 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,942,373 >>> mbox cmd response: success
6,942,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,942,644 UART: [update-reset] Copying MAN_2 To MAN_1
6,950,658 UART: [update-reset Success] --
6,951,853 UART: [state] Locking Datavault
6,952,583 UART: [state] Locking PCR0, PCR1 and PCR31
6,953,187 UART: [state] Locking ICCM
6,953,763 UART: [exit] Launching FMC @ 0x40000130
6,959,092 UART:
6,959,108 UART: Running Caliptra FMC ...
6,959,516 UART:
6,959,659 UART: [state] CFI Enabled
7,048,934 UART: [art] Extend RT PCRs Done
7,049,362 UART: [art] Lock RT PCRs Done
7,050,831 UART: [art] Populate DV Done
7,058,794 UART: [fht] FMC Alias Private Key: 7
7,059,942 UART: [art] Derive CDI
7,060,222 UART: [art] Store in in slot 0x4
7,145,925 UART: [art] Derive Key Pair
7,146,285 UART: [art] Store priv key in slot 0x5
7,159,233 UART: [art] Derive Key Pair - Done
7,174,144 UART: [art] Signing Cert with AUTHO
7,174,624 UART: RITY.KEYID = 7
7,190,322 UART: [art] Erasing AUTHORITY.KEYID = 7
7,191,087 UART: [art] PUB.X = B3F0206B69E0FD4D4664ED8437831079FE70FF8A35813B93361B28D0F60E6006E14CDF4878378C51BBDC833F024E3365
7,197,846 UART: [art] PUB.Y = 74FF79A0F5A1C3A35F74EDF0BC8FB357319C6BCD06233938618FF770B88B4BC3A7A25E34E17316D1C6305EC53F8D1B72
7,204,803 UART: [art] SIG.R = ADC99E4DFE0DD9283206A8DF016A02B3169EE0E8BAFAC0442624D83751452B96E0DF58A6DEDE5E23203844A99B499024
7,211,569 UART: [art] SIG.S = 21D3454243102CE23FBEE80A91E5710E80C97C1A6D20FC47483ECCBDF1ED7B61B72AB49B01167349E89D61C2005B4BE5
7,235,367 UART: Caliptra RT
7,235,712 UART: [state] CFI Enabled
7,517,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,548,412 UART: [rt]cmd =0x41545348, len=116
7,570,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 ready_for_fw is high
1,362,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,005 >>> mbox cmd response: success
2,986,909 UART:
2,986,925 UART: Running Caliptra FMC ...
2,987,333 UART:
2,987,476 UART: [state] CFI Enabled
2,998,059 UART: [fht] FMC Alias Private Key: 7
3,105,632 UART: [art] Extend RT PCRs Done
3,106,060 UART: [art] Lock RT PCRs Done
3,107,734 UART: [art] Populate DV Done
3,115,865 UART: [fht] FMC Alias Private Key: 7
3,116,971 UART: [art] Derive CDI
3,117,251 UART: [art] Store in in slot 0x4
3,203,064 UART: [art] Derive Key Pair
3,203,424 UART: [art] Store priv key in slot 0x5
3,216,696 UART: [art] Derive Key Pair - Done
3,231,554 UART: [art] Signing Cert with AUTHO
3,232,034 UART: RITY.KEYID = 7
3,247,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,325 UART: [art] PUB.X = B09B5248EF3DE3DD79C02435FB64E278C963F6910171CCB3B22B7EABC01D631A123740DDC446B8B341DDD33D34EA4F4B
3,255,106 UART: [art] PUB.Y = 416135A53BDB7CA76188744966A058AF6CA8162458EB7AC581801A7FC3BCCE7AB0EC0A9F6C708E424F39000113EAFAB0
3,262,038 UART: [art] SIG.R = 439011CD290C5C6914A867E75DAA73D77FDE7AC009B2E3C3AD61F1A421CFE72E41B5251A90DCAEA45A7B06209F284432
3,268,809 UART: [art] SIG.S = 637AD565A6BE677A06D05D3EE79E7CF133EFF5055CDA0B05EE4EB759FE565EDCEA4533A8E9E8876A8DD19D244905A2BC
3,293,097 UART: Caliptra RT
3,293,442 UART: [state] CFI Enabled
3,401,082 UART: [rt] RT listening for mailbox commands...
3,401,752 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,796 UART: [rt]cmd =0x41544d4e, len=14344
3,834,570 >>> mbox cmd response data (8 bytes)
3,834,571 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,724 UART: [rt]cmd =0x41545348, len=116
3,886,273 >>> mbox cmd response data (12 bytes)
3,886,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,718 >>> mbox cmd response: success
6,645,718 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,658,843 UART:
6,658,859 UART: Running Caliptra FMC ...
6,659,267 UART:
6,659,410 UART: [state] CFI Enabled
6,748,555 UART: [art] Extend RT PCRs Done
6,748,983 UART: [art] Lock RT PCRs Done
6,750,164 UART: [art] Populate DV Done
6,758,535 UART: [fht] FMC Alias Private Key: 7
6,759,611 UART: [art] Derive CDI
6,759,891 UART: [art] Store in in slot 0x4
6,845,548 UART: [art] Derive Key Pair
6,845,908 UART: [art] Store priv key in slot 0x5
6,859,064 UART: [art] Derive Key Pair - Done
6,873,820 UART: [art] Signing Cert with AUTHO
6,874,300 UART: RITY.KEYID = 7
6,889,252 UART: [art] Erasing AUTHORITY.KEYID = 7
6,890,017 UART: [art] PUB.X = 5ED42B288F729E6474A7911BF065F634EBFCFF1AD83D8DBE98DD468A552D0AEE19FF613E8B87325F1BE680A054F4B8DD
6,896,802 UART: [art] PUB.Y = 678D5543A1E61AFF659BD309A4E2EB45D0AB8CD119981FCCF114BB1271DB6B4048EDCF2AEAD35A19A1AF3F2CA855A326
6,903,771 UART: [art] SIG.R = AC741A1525F369805BBFC0DFB19129843292733D42035A58554C05FAAFF6C0E1E9B34C7080EC550AC242775C8DB9F1A6
6,910,536 UART: [art] SIG.S = 4CE2CA53BA4405132A362911F129EC111AF7A7E4CBAE77C0053BA6F0CDBE33596E43BF69D4FBE4137D092CD410C0DDC5
6,934,600 UART: Caliptra RT
6,934,945 UART: [state] CFI Enabled
7,214,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,245,547 UART: [rt]cmd =0x41545348, len=116
7,266,882 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
918,016 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,285 UART: [fht] FHT @ 0x50003400
1,175,142 UART: [idev] ++
1,175,310 UART: [idev] CDI.KEYID = 6
1,175,670 UART: [idev] SUBJECT.KEYID = 7
1,176,094 UART: [idev] UDS.KEYID = 0
1,176,439 ready_for_fw is high
1,176,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,968 UART: [ldev] SUBJECT.KEYID = 5
1,211,394 UART: [ldev] AUTHORITY.KEYID = 7
1,211,857 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,071 UART: [ldev] --
1,282,390 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,707 >>> mbox cmd response: success
2,771,823 UART: [afmc] ++
2,771,991 UART: [afmc] CDI.KEYID = 6
2,772,353 UART: [afmc] SUBJECT.KEYID = 7
2,772,778 UART: [afmc] AUTHORITY.KEYID = 5
2,808,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,470 UART: [afmc] --
2,851,354 UART: [cold-reset] --
2,852,174 UART: [state] Locking Datavault
2,853,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,099 UART: [state] Locking ICCM
2,854,533 UART: [exit] Launching FMC @ 0x40000130
2,859,862 UART:
2,859,878 UART: Running Caliptra FMC ...
2,860,286 UART:
2,860,340 UART: [state] CFI Enabled
2,870,733 UART: [fht] FMC Alias Private Key: 7
2,978,838 UART: [art] Extend RT PCRs Done
2,979,266 UART: [art] Lock RT PCRs Done
2,980,568 UART: [art] Populate DV Done
2,988,749 UART: [fht] FMC Alias Private Key: 7
2,989,913 UART: [art] Derive CDI
2,990,193 UART: [art] Store in in slot 0x4
3,075,662 UART: [art] Derive Key Pair
3,076,022 UART: [art] Store priv key in slot 0x5
3,089,236 UART: [art] Derive Key Pair - Done
3,104,091 UART: [art] Signing Cert with AUTHO
3,104,571 UART: RITY.KEYID = 7
3,120,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,974 UART: [art] PUB.X = E3AB333FF742F1F97FBA16E7A3805D622425E50EB9D8254C6B719458051EAC0F7E4C753AE5F21F06399714FE437F2C8D
3,127,738 UART: [art] PUB.Y = CB097DE6DE04BA38B73CFBB25B0DD863A1C423AB20DF8C601792919AB6206E6E27BD0EAECD59BE08DF93A46F715E6811
3,134,693 UART: [art] SIG.R = 6453581BBAF341AEACD7F38E2FB39660416BFAC1D4FFD1BA17E5ADB3B17D40B48B20DA88D7AF040A138DA1511E9185F2
3,141,477 UART: [art] SIG.S = 646E12F2B70A7009E0860EC9D966621C5CD1903E55E1230226CB7CC38FFB802E6FC3F694A274971E20706EB8D7E78015
3,165,504 UART: Caliptra RT
3,165,757 UART: [state] CFI Enabled
3,274,034 UART: [rt] RT listening for mailbox commands...
3,274,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,788 UART: [rt]cmd =0x41544d4e, len=14344
3,707,718 >>> mbox cmd response data (8 bytes)
3,707,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,978 UART: [rt]cmd =0x41545348, len=116
3,760,113 >>> mbox cmd response data (12 bytes)
3,760,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,801 UART:
3,760,817 UART: Running Caliptra ROM ...
3,761,225 UART:
3,761,280 UART: [state] CFI Enabled
3,763,976 UART: [state] LifecycleState = Unprovisioned
3,764,631 UART: [state] DebugLocked = No
3,765,297 UART: [state] WD Timer not started. Device not locked for debugging
3,766,647 UART: [kat] SHA2-256
4,572,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,576,422 UART: [kat] ++
4,576,574 UART: [kat] sha1
4,580,716 UART: [kat] SHA2-256
4,582,656 UART: [kat] SHA2-384
4,585,489 UART: [kat] SHA2-512-ACC
4,587,389 UART: [kat] ECC-384
4,597,170 UART: [kat] HMAC-384Kdf
4,601,740 UART: [kat] LMS
4,850,068 UART: [kat] --
4,850,770 UART: [update-reset] ++
6,160,314 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,161,481 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,310,933 >>> mbox cmd response: success
6,310,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,311,104 UART: [update-reset] Copying MAN_2 To MAN_1
6,319,118 UART: [update-reset Success] --
6,320,089 UART: [state] Locking Datavault
6,320,765 UART: [state] Locking PCR0, PCR1 and PCR31
6,321,369 UART: [state] Locking ICCM
6,321,879 UART: [exit] Launching FMC @ 0x40000130
6,327,208 UART:
6,327,224 UART: Running Caliptra FMC ...
6,327,632 UART:
6,327,686 UART: [state] CFI Enabled
6,416,669 UART: [art] Extend RT PCRs Done
6,417,097 UART: [art] Lock RT PCRs Done
6,418,534 UART: [art] Populate DV Done
6,426,901 UART: [fht] FMC Alias Private Key: 7
6,427,879 UART: [art] Derive CDI
6,428,159 UART: [art] Store in in slot 0x4
6,514,192 UART: [art] Derive Key Pair
6,514,552 UART: [art] Store priv key in slot 0x5
6,527,836 UART: [art] Derive Key Pair - Done
6,542,432 UART: [art] Signing Cert with AUTHO
6,542,912 UART: RITY.KEYID = 7
6,557,778 UART: [art] Erasing AUTHORITY.KEYID = 7
6,558,543 UART: [art] PUB.X = BB9C9BA59AD81C21FBE2F7D670607275244AB1A55E62160249E015237DE62670A199FF9F05EA8F4FEB2389DDE522C524
6,565,313 UART: [art] PUB.Y = BE8D24FAAABC83279E1086B0E359681335CA8418E4440BABAB5AD5025A96240B339153E2AE6C7210BFED11CF6F640D86
6,572,261 UART: [art] SIG.R = 32E4B8954AD3C67B0F7DBC75586756E59546F3FF09EE9D480B08392BF442202ACE0AF3AC97C94D40978A2C9C8FCFEE07
6,579,025 UART: [art] SIG.S = 4E179B959EBA7674F39A9FCE640244A0B959C25E95E00B01DF6F7439CEB7B0C35E9845FFDBC5DCCA8A0D0FC64D8A1CD8
6,602,391 UART: Caliptra RT
6,602,644 UART: [state] CFI Enabled
6,880,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,596 UART: [rt]cmd =0x41545348, len=116
6,932,879 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,062,117 ready_for_fw is high
1,062,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,072 >>> mbox cmd response: success
2,686,900 UART:
2,686,916 UART: Running Caliptra FMC ...
2,687,324 UART:
2,687,378 UART: [state] CFI Enabled
2,697,561 UART: [fht] FMC Alias Private Key: 7
2,805,804 UART: [art] Extend RT PCRs Done
2,806,232 UART: [art] Lock RT PCRs Done
2,807,658 UART: [art] Populate DV Done
2,815,879 UART: [fht] FMC Alias Private Key: 7
2,817,025 UART: [art] Derive CDI
2,817,305 UART: [art] Store in in slot 0x4
2,902,752 UART: [art] Derive Key Pair
2,903,112 UART: [art] Store priv key in slot 0x5
2,916,428 UART: [art] Derive Key Pair - Done
2,931,304 UART: [art] Signing Cert with AUTHO
2,931,784 UART: RITY.KEYID = 7
2,946,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,579 UART: [art] PUB.X = 349B547059FDB90FCBA81F398BF99C48B5D9C25C289C53A39FF09B4642C2DCFC5CDA52B0DAC2C6CA041456ED5CB87754
2,954,361 UART: [art] PUB.Y = FCBCF40D1C2D286DC89ADF320265B39F6AED914CAA8128025C21ED6B1CE1F250999674097E25B513F07EC7B8D33B7103
2,961,306 UART: [art] SIG.R = 9AFE691403360B6DDFEAC40C226E9DBA06A6F59841BB01D72A2F9AD004BC01F2D32570CB0C594BEA36844B6B10D22662
2,968,064 UART: [art] SIG.S = 34A9155674093E7C83CA442584EB7685D2A12A682C72612AE242D823EC9E39C15C00127BECA70C72359ACA35938FBA5A
2,992,191 UART: Caliptra RT
2,992,444 UART: [state] CFI Enabled
3,100,141 UART: [rt] RT listening for mailbox commands...
3,100,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,977 UART: [rt]cmd =0x41544d4e, len=14344
3,534,675 >>> mbox cmd response data (8 bytes)
3,534,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,731 UART: [rt]cmd =0x41545348, len=116
3,587,014 >>> mbox cmd response data (12 bytes)
3,587,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,059 >>> mbox cmd response: success
6,021,059 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,034,331 UART:
6,034,347 UART: Running Caliptra FMC ...
6,034,755 UART:
6,034,809 UART: [state] CFI Enabled
6,124,144 UART: [art] Extend RT PCRs Done
6,124,572 UART: [art] Lock RT PCRs Done
6,125,979 UART: [art] Populate DV Done
6,134,140 UART: [fht] FMC Alias Private Key: 7
6,135,288 UART: [art] Derive CDI
6,135,568 UART: [art] Store in in slot 0x4
6,221,437 UART: [art] Derive Key Pair
6,221,797 UART: [art] Store priv key in slot 0x5
6,234,591 UART: [art] Derive Key Pair - Done
6,249,431 UART: [art] Signing Cert with AUTHO
6,249,911 UART: RITY.KEYID = 7
6,265,025 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,790 UART: [art] PUB.X = 35EED3C8F32FA75714F99A57D7D116237AE0A47225F3267A0864B87FBF1BBE228F3227094DEDBE2149BA5492E2453D35
6,272,558 UART: [art] PUB.Y = E359B4E2C121916ADB294961EA3ACD929BB88DAA5CD7E4D71D74E735BBB0F8D0257E9D5D7D17AE18CC22F0F80CFDC43E
6,279,529 UART: [art] SIG.R = 028AB2EAF567DB55F07B8398BE31CA86D67959AE805E3121BAF263F26ADED9B29F00F28AB069BA0BDA5C9F72F4698222
6,286,285 UART: [art] SIG.S = DB3D3B7BDEDE23F57B4BE84D608CF33BA74DB0B868887C9B6708B267DDF392387A4DEFD4990993E1A8E8429351339FFF
6,310,632 UART: Caliptra RT
6,310,885 UART: [state] CFI Enabled
6,591,124 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,622,093 UART: [rt]cmd =0x41545348, len=116
6,643,996 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
893,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,310 UART: [kat] ++
897,462 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
917,781 UART: [kat] HMAC-384Kdf
922,401 UART: [kat] LMS
1,170,729 UART: [kat] --
1,171,912 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,495 UART: [idev] Erasing UDS.KEYID = 0
1,201,768 UART: [idev] Sha1 KeyId Algorithm
1,210,148 UART: [idev] --
1,211,172 UART: [ldev] ++
1,211,340 UART: [ldev] CDI.KEYID = 6
1,211,703 UART: [ldev] SUBJECT.KEYID = 5
1,212,129 UART: [ldev] AUTHORITY.KEYID = 7
1,212,592 UART: [ldev] FE.KEYID = 1
1,217,874 UART: [ldev] Erasing FE.KEYID = 1
1,244,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,298 UART: [ldev] --
1,283,673 UART: [fwproc] Wait for Commands...
1,284,405 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,062 >>> mbox cmd response: success
2,772,112 UART: [afmc] ++
2,772,280 UART: [afmc] CDI.KEYID = 6
2,772,642 UART: [afmc] SUBJECT.KEYID = 7
2,773,067 UART: [afmc] AUTHORITY.KEYID = 5
2,808,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,693 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,583 UART: [afmc] --
2,851,615 UART: [cold-reset] --
2,852,497 UART: [state] Locking Datavault
2,853,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,264 UART: [state] Locking ICCM
2,854,814 UART: [exit] Launching FMC @ 0x40000130
2,860,143 UART:
2,860,159 UART: Running Caliptra FMC ...
2,860,567 UART:
2,860,710 UART: [state] CFI Enabled
2,870,897 UART: [fht] FMC Alias Private Key: 7
2,978,942 UART: [art] Extend RT PCRs Done
2,979,370 UART: [art] Lock RT PCRs Done
2,980,896 UART: [art] Populate DV Done
2,989,273 UART: [fht] FMC Alias Private Key: 7
2,990,405 UART: [art] Derive CDI
2,990,685 UART: [art] Store in in slot 0x4
3,076,354 UART: [art] Derive Key Pair
3,076,714 UART: [art] Store priv key in slot 0x5
3,090,960 UART: [art] Derive Key Pair - Done
3,105,810 UART: [art] Signing Cert with AUTHO
3,106,290 UART: RITY.KEYID = 7
3,121,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,217 UART: [art] PUB.X = 48983F19DDEC36BEF6F4FA6A120ED25288CDCA496785C6926242716A0A03BBBB2717C7ACF3234BD8B1CF05873AB2FC62
3,128,989 UART: [art] PUB.Y = EB766126BA3E38D0E8D5883712BFC847A8F08D67423E4E5C728CDD1FFE308011822127050C1E9BD18969F4FE008EC25C
3,135,915 UART: [art] SIG.R = 6C8C8AD4E3BACCCDC2B6F80171BA6F22F8857CEC9F48313566EFB6243F6099DB8C423270024F56393A1C429E92BEC22C
3,142,691 UART: [art] SIG.S = 396FB6F167ADCE29F6D45B31DFB72C84CF37D819C671EF69B823C9CABA2A1FF939A79F4E1C1A358E09493E18370C17A3
3,166,450 UART: Caliptra RT
3,166,795 UART: [state] CFI Enabled
3,274,766 UART: [rt] RT listening for mailbox commands...
3,275,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,274 UART: [rt]cmd =0x41544d4e, len=14344
3,708,148 >>> mbox cmd response data (8 bytes)
3,708,149 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,306 UART: [rt]cmd =0x41545348, len=116
3,760,947 >>> mbox cmd response data (12 bytes)
3,760,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,851 UART:
3,761,867 UART: Running Caliptra ROM ...
3,762,275 UART:
3,762,417 UART: [state] CFI Enabled
3,765,373 UART: [state] LifecycleState = Unprovisioned
3,766,028 UART: [state] DebugLocked = No
3,766,636 UART: [state] WD Timer not started. Device not locked for debugging
3,767,984 UART: [kat] SHA2-256
4,573,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,577,759 UART: [kat] ++
4,577,911 UART: [kat] sha1
4,582,205 UART: [kat] SHA2-256
4,584,145 UART: [kat] SHA2-384
4,586,938 UART: [kat] SHA2-512-ACC
4,588,838 UART: [kat] ECC-384
4,598,825 UART: [kat] HMAC-384Kdf
4,603,515 UART: [kat] LMS
4,851,843 UART: [kat] --
4,852,825 UART: [update-reset] ++
6,161,731 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,162,886 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,312,338 >>> mbox cmd response: success
6,312,338 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,312,653 UART: [update-reset] Copying MAN_2 To MAN_1
6,320,667 UART: [update-reset Success] --
6,321,542 UART: [state] Locking Datavault
6,322,278 UART: [state] Locking PCR0, PCR1 and PCR31
6,322,882 UART: [state] Locking ICCM
6,323,340 UART: [exit] Launching FMC @ 0x40000130
6,328,669 UART:
6,328,685 UART: Running Caliptra FMC ...
6,329,093 UART:
6,329,236 UART: [state] CFI Enabled
6,418,223 UART: [art] Extend RT PCRs Done
6,418,651 UART: [art] Lock RT PCRs Done
6,419,890 UART: [art] Populate DV Done
6,428,075 UART: [fht] FMC Alias Private Key: 7
6,429,249 UART: [art] Derive CDI
6,429,529 UART: [art] Store in in slot 0x4
6,515,268 UART: [art] Derive Key Pair
6,515,628 UART: [art] Store priv key in slot 0x5
6,529,166 UART: [art] Derive Key Pair - Done
6,543,911 UART: [art] Signing Cert with AUTHO
6,544,391 UART: RITY.KEYID = 7
6,559,933 UART: [art] Erasing AUTHORITY.KEYID = 7
6,560,698 UART: [art] PUB.X = 4BD4D53121AFDFC1638F1BA44166EBBE885AD68EC69967506AB165BC4ED3901CFA225057C97797BF564C4C645640C823
6,567,474 UART: [art] PUB.Y = C608462C787084E62C4B641A7E5191BF0222919A8C2C3721328C87228207C063E088960697A93117201B48643C3073C4
6,574,388 UART: [art] SIG.R = A598D27767425199478F09239091C64A1590C7DBA1B206AC5AFD1D834CE34F20B6BE5C0B13230FF5F47590990D5FB8BC
6,581,145 UART: [art] SIG.S = C96A3297F03D6477F84C7143F1B8FB69ADC4ED6D2AFEE7E19AEDDEF4E4D0D236A8A0D8505C2302846D48EA3DF1AF7444
6,604,881 UART: Caliptra RT
6,605,226 UART: [state] CFI Enabled
6,885,426 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,916,181 UART: [rt]cmd =0x41545348, len=116
6,938,030 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 ready_for_fw is high
1,060,452 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,626,049 >>> mbox cmd response: success
2,687,959 UART:
2,687,975 UART: Running Caliptra FMC ...
2,688,383 UART:
2,688,526 UART: [state] CFI Enabled
2,699,053 UART: [fht] FMC Alias Private Key: 7
2,806,478 UART: [art] Extend RT PCRs Done
2,806,906 UART: [art] Lock RT PCRs Done
2,808,422 UART: [art] Populate DV Done
2,816,697 UART: [fht] FMC Alias Private Key: 7
2,817,669 UART: [art] Derive CDI
2,817,949 UART: [art] Store in in slot 0x4
2,903,524 UART: [art] Derive Key Pair
2,903,884 UART: [art] Store priv key in slot 0x5
2,916,866 UART: [art] Derive Key Pair - Done
2,931,383 UART: [art] Signing Cert with AUTHO
2,931,863 UART: RITY.KEYID = 7
2,946,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,738 UART: [art] PUB.X = B6F02583504A89D5E5F5AE654309B3F8A404AAB110593A24D9C4D21027452353FE251DE9887FFBC28394349D9425618E
2,954,496 UART: [art] PUB.Y = 9DCCBD21A07B62E06107A5B361AA695B3A9806854D810C1B50029D655F84250DD52A763403826A6DF0130888ED81411C
2,961,419 UART: [art] SIG.R = 3FA92C1FDAFA3B2AF25C77839CB980670C27B38059E726FF33D03A9B86FACB9EF121F3A8FCB10CA709BB067C62383CCD
2,968,197 UART: [art] SIG.S = 8A0912E3DD6EF0315F890FCF3B7EB1D0FD5339CA794F5CEF152AF7B88DE13360688A2F59B3D7BADC0C519E083FC9D745
2,992,058 UART: Caliptra RT
2,992,403 UART: [state] CFI Enabled
3,101,462 UART: [rt] RT listening for mailbox commands...
3,102,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,170 UART: [rt]cmd =0x41544d4e, len=14344
3,534,902 >>> mbox cmd response data (8 bytes)
3,534,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,818 UART: [rt]cmd =0x41545348, len=116
3,587,071 >>> mbox cmd response data (12 bytes)
3,587,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,020,925 >>> mbox cmd response: success
6,020,925 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,034,431 UART:
6,034,447 UART: Running Caliptra FMC ...
6,034,855 UART:
6,034,998 UART: [state] CFI Enabled
6,124,387 UART: [art] Extend RT PCRs Done
6,124,815 UART: [art] Lock RT PCRs Done
6,126,212 UART: [art] Populate DV Done
6,134,263 UART: [fht] FMC Alias Private Key: 7
6,135,325 UART: [art] Derive CDI
6,135,605 UART: [art] Store in in slot 0x4
6,221,120 UART: [art] Derive Key Pair
6,221,480 UART: [art] Store priv key in slot 0x5
6,234,582 UART: [art] Derive Key Pair - Done
6,249,307 UART: [art] Signing Cert with AUTHO
6,249,787 UART: RITY.KEYID = 7
6,264,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,684 UART: [art] PUB.X = FF632D2C72EB4D0EF92A84B6EAB6A3173584A556719C067C8C231EA47A0E8C7202C97C124664B65F70B494D5CE2FD593
6,272,448 UART: [art] PUB.Y = FC3E72886269D7B1D6DBB6BA59B04D402E5E6E2F23A405818DBBFE3AB65EC30673C7C4198E51F90565E106D224E9A55C
6,279,396 UART: [art] SIG.R = 5C1713B0500EBC6EEC1E185333B19A91DD69EE25D09A15E105EB4BCA00E4C21BF83ED99FBBBE8E18E8EB1979751285F5
6,286,154 UART: [art] SIG.S = 6AC4070D9300C26484B7FEF78F386B536ADDF0C4A41F0E30DFAB4751B7B7C7C3E42B50EA7E659FAB2C5C5A0A85F7D8D6
6,309,795 UART: Caliptra RT
6,310,140 UART: [state] CFI Enabled
6,591,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,622,224 UART: [rt]cmd =0x41545348, len=116
6,644,245 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,488 UART: [kat] LMS
1,168,800 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,174,755 ready_for_fw is high
1,174,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,319 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,428 UART: [ldev] ++
1,209,596 UART: [ldev] CDI.KEYID = 6
1,209,960 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,216,290 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,251 >>> mbox cmd response: success
2,771,432 UART: [afmc] ++
2,771,600 UART: [afmc] CDI.KEYID = 6
2,771,963 UART: [afmc] SUBJECT.KEYID = 7
2,772,389 UART: [afmc] AUTHORITY.KEYID = 5
2,808,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,097 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,715 UART: [afmc] --
2,851,835 UART: [cold-reset] --
2,852,835 UART: [state] Locking Datavault
2,854,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,632 UART: [state] Locking ICCM
2,855,218 UART: [exit] Launching FMC @ 0x40000130
2,860,547 UART:
2,860,563 UART: Running Caliptra FMC ...
2,860,971 UART:
2,861,025 UART: [state] CFI Enabled
2,871,310 UART: [fht] FMC Alias Private Key: 7
2,979,173 UART: [art] Extend RT PCRs Done
2,979,601 UART: [art] Lock RT PCRs Done
2,981,177 UART: [art] Populate DV Done
2,989,636 UART: [fht] FMC Alias Private Key: 7
2,990,742 UART: [art] Derive CDI
2,991,022 UART: [art] Store in in slot 0x4
3,076,809 UART: [art] Derive Key Pair
3,077,169 UART: [art] Store priv key in slot 0x5
3,090,383 UART: [art] Derive Key Pair - Done
3,105,107 UART: [art] Signing Cert with AUTHO
3,105,587 UART: RITY.KEYID = 7
3,121,033 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,798 UART: [art] PUB.X = EB6FF32729BAC486A297FE0793ACEF933759F4236276B7DA9CF82E0967DDFE8827177EB600C90A8BB5356D6C4661E55E
3,128,545 UART: [art] PUB.Y = A08918FA1FBAD6C121C1471FA3072098EECBDD9681A8CD301AC24C0200CCF3E4768FBF4F29711DDF0F0AB48A839D2D0D
3,135,478 UART: [art] SIG.R = 8A686E761EA3F385BE5EE422CE6E6AE90BE881D013974F56FFA26278450F99E90AAD2440F72E154E1D33774A29783952
3,142,239 UART: [art] SIG.S = 13C6397290F25DF149A1457636CEF302A1C8257CD8F729F6379B4FDC8DBF98680D0024D388C9E0641B2195EBA59C11FE
3,166,322 UART: Caliptra RT
3,166,575 UART: [state] CFI Enabled
3,273,774 UART: [rt] RT listening for mailbox commands...
3,274,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,134 UART: [rt]cmd =0x41544d4e, len=14344
3,707,098 >>> mbox cmd response data (8 bytes)
3,707,099 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,102 UART: [rt]cmd =0x41545348, len=116
3,758,885 >>> mbox cmd response data (12 bytes)
3,758,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,753 UART:
3,759,769 UART: Running Caliptra ROM ...
3,760,177 UART:
3,760,232 UART: [state] CFI Enabled
3,762,700 UART: [state] LifecycleState = Unprovisioned
3,763,355 UART: [state] DebugLocked = No
3,763,863 UART: [state] WD Timer not started. Device not locked for debugging
3,765,121 UART: [kat] SHA2-256
4,568,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,572,800 UART: [kat] ++
4,572,952 UART: [kat] sha1
4,576,958 UART: [kat] SHA2-256
4,578,898 UART: [kat] SHA2-384
4,581,617 UART: [kat] SHA2-512-ACC
4,583,517 UART: [kat] ECC-384
4,593,438 UART: [kat] HMAC-384Kdf
4,598,216 UART: [kat] LMS
4,846,528 UART: [kat] --
4,847,130 UART: [update-reset] ++
6,156,739 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,157,744 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,307,196 >>> mbox cmd response: success
6,307,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,307,497 UART: [update-reset] Copying MAN_2 To MAN_1
6,315,511 UART: [update-reset Success] --
6,316,314 UART: [state] Locking Datavault
6,317,006 UART: [state] Locking PCR0, PCR1 and PCR31
6,317,610 UART: [state] Locking ICCM
6,318,046 UART: [exit] Launching FMC @ 0x40000130
6,323,375 UART:
6,323,391 UART: Running Caliptra FMC ...
6,323,799 UART:
6,323,853 UART: [state] CFI Enabled
6,412,946 UART: [art] Extend RT PCRs Done
6,413,374 UART: [art] Lock RT PCRs Done
6,414,601 UART: [art] Populate DV Done
6,422,862 UART: [fht] FMC Alias Private Key: 7
6,423,996 UART: [art] Derive CDI
6,424,276 UART: [art] Store in in slot 0x4
6,509,887 UART: [art] Derive Key Pair
6,510,247 UART: [art] Store priv key in slot 0x5
6,523,221 UART: [art] Derive Key Pair - Done
6,538,208 UART: [art] Signing Cert with AUTHO
6,538,688 UART: RITY.KEYID = 7
6,553,926 UART: [art] Erasing AUTHORITY.KEYID = 7
6,554,691 UART: [art] PUB.X = 3B778A66928AEED98388E6CCEFB4AA908C8B4E4D242249ECCFD7FC0356F486E0A1D0AB303C655302504B1240CAF48B7B
6,561,469 UART: [art] PUB.Y = E8F60A7C07A9C87F359DD6910363B301441DA1AD6784EDBB8420C8805D62630AA8F56A1AA884B7E70A7AB0C768F40EAF
6,568,408 UART: [art] SIG.R = 636A60EF14623E775E2B7F110A961945AEA07DB34735C93A75C94F72023760A36570CEBCD2F67CE1F228E85A0AEBCCEC
6,575,179 UART: [art] SIG.S = BC8D41EE0B69C1CCB0B5D917928506770384DCFC7D58B8E997E8AF746356A1997A7B931BB0C125CE4E76A75BC021433E
6,599,187 UART: Caliptra RT
6,599,440 UART: [state] CFI Enabled
6,878,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,909,154 UART: [rt]cmd =0x41545348, len=116
6,931,411 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,818 ready_for_fw is high
1,055,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,023 >>> mbox cmd response: success
2,679,749 UART:
2,679,765 UART: Running Caliptra FMC ...
2,680,173 UART:
2,680,227 UART: [state] CFI Enabled
2,690,864 UART: [fht] FMC Alias Private Key: 7
2,798,955 UART: [art] Extend RT PCRs Done
2,799,383 UART: [art] Lock RT PCRs Done
2,800,837 UART: [art] Populate DV Done
2,809,050 UART: [fht] FMC Alias Private Key: 7
2,810,144 UART: [art] Derive CDI
2,810,424 UART: [art] Store in in slot 0x4
2,896,485 UART: [art] Derive Key Pair
2,896,845 UART: [art] Store priv key in slot 0x5
2,909,177 UART: [art] Derive Key Pair - Done
2,924,402 UART: [art] Signing Cert with AUTHO
2,924,882 UART: RITY.KEYID = 7
2,940,864 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,629 UART: [art] PUB.X = F57853594973E6034953AE5B908ED2761476E8DEE7029F51DEC45E99E6F3D422FE3DFF1AE044A8E804E37BF745DA79E8
2,948,396 UART: [art] PUB.Y = B2B3BB5A397882326697FDA7F488A5D3D4C4BC4C741471D696880469F1723D585F16B66BB447CB7BEB5C02771B745FFC
2,955,344 UART: [art] SIG.R = 4C5E3D1EFEEA3FA61A370B0E32E4C5ED52A9701BBD386FECFEDCA6954A47B326A9A8E2C0E725CD09D3D9F123E6C432F7
2,962,131 UART: [art] SIG.S = CB568854C6B84003102A1B4D15E3A39FB5F3A4E3869BDF19D91D99317FBB648FC4FEF11D73AF241C720F95E8C69B1B22
2,985,984 UART: Caliptra RT
2,986,237 UART: [state] CFI Enabled
3,095,002 UART: [rt] RT listening for mailbox commands...
3,095,672 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,582 UART: [rt]cmd =0x41544d4e, len=14344
3,528,242 >>> mbox cmd response data (8 bytes)
3,528,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,352 UART: [rt]cmd =0x41545348, len=116
3,580,101 >>> mbox cmd response data (12 bytes)
3,580,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,717 >>> mbox cmd response: success
6,011,717 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,025,063 UART:
6,025,079 UART: Running Caliptra FMC ...
6,025,487 UART:
6,025,541 UART: [state] CFI Enabled
6,113,864 UART: [art] Extend RT PCRs Done
6,114,292 UART: [art] Lock RT PCRs Done
6,115,563 UART: [art] Populate DV Done
6,123,866 UART: [fht] FMC Alias Private Key: 7
6,124,802 UART: [art] Derive CDI
6,125,082 UART: [art] Store in in slot 0x4
6,210,795 UART: [art] Derive Key Pair
6,211,155 UART: [art] Store priv key in slot 0x5
6,224,559 UART: [art] Derive Key Pair - Done
6,239,283 UART: [art] Signing Cert with AUTHO
6,239,763 UART: RITY.KEYID = 7
6,254,847 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,612 UART: [art] PUB.X = B30C06AC48D768AFDB76E32F22991B0EFC9DED01E2BA02F8B309B7D64EE8FCA6A6231C7652E7BFDE1DA18BBEC8E05CC8
6,262,394 UART: [art] PUB.Y = C00C4C16EF1D6687F648E8B27015BF023B73CC4EA0CAA1E7326F183F4872D9DD1459C7EC242FC566EDD6C2E9E5426837
6,269,348 UART: [art] SIG.R = E919BAB1BFC5C68762FDA2E01D814612442035566D65A0893B1CB263BD2DB89C63332018282475AE1B3370E5B8BD5668
6,276,116 UART: [art] SIG.S = FDAF71028B4D682FF0D7537A0144374C90124A559514EB522EC6817E14A643ABBE88409DE88EA85CD5D76975978DE84F
6,300,087 UART: Caliptra RT
6,300,340 UART: [state] CFI Enabled
6,579,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,717 UART: [rt]cmd =0x41545348, len=116
6,632,736 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,038 UART: [idev] ++
1,173,206 UART: [idev] CDI.KEYID = 6
1,173,567 UART: [idev] SUBJECT.KEYID = 7
1,173,992 UART: [idev] UDS.KEYID = 0
1,174,338 ready_for_fw is high
1,174,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,758 UART: [idev] Erasing UDS.KEYID = 0
1,198,556 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,473 UART: [ldev] ++
1,208,641 UART: [ldev] CDI.KEYID = 6
1,209,005 UART: [ldev] SUBJECT.KEYID = 5
1,209,432 UART: [ldev] AUTHORITY.KEYID = 7
1,209,895 UART: [ldev] FE.KEYID = 1
1,215,067 UART: [ldev] Erasing FE.KEYID = 1
1,241,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,237 UART: [ldev] --
1,280,573 UART: [fwproc] Wait for Commands...
1,281,180 UART: [fwproc] Recv command 0x46574c44
1,281,913 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,592 >>> mbox cmd response: success
2,768,647 UART: [afmc] ++
2,768,815 UART: [afmc] CDI.KEYID = 6
2,769,178 UART: [afmc] SUBJECT.KEYID = 7
2,769,604 UART: [afmc] AUTHORITY.KEYID = 5
2,805,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,824 UART: [afmc] --
2,848,762 UART: [cold-reset] --
2,849,426 UART: [state] Locking Datavault
2,850,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,197 UART: [state] Locking ICCM
2,851,819 UART: [exit] Launching FMC @ 0x40000130
2,857,148 UART:
2,857,164 UART: Running Caliptra FMC ...
2,857,572 UART:
2,857,715 UART: [state] CFI Enabled
2,868,396 UART: [fht] FMC Alias Private Key: 7
2,976,341 UART: [art] Extend RT PCRs Done
2,976,769 UART: [art] Lock RT PCRs Done
2,978,313 UART: [art] Populate DV Done
2,986,378 UART: [fht] FMC Alias Private Key: 7
2,987,506 UART: [art] Derive CDI
2,987,786 UART: [art] Store in in slot 0x4
3,073,493 UART: [art] Derive Key Pair
3,073,853 UART: [art] Store priv key in slot 0x5
3,086,955 UART: [art] Derive Key Pair - Done
3,101,758 UART: [art] Signing Cert with AUTHO
3,102,238 UART: RITY.KEYID = 7
3,118,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,895 UART: [art] PUB.X = 4EAFAF77C366F8B842A31A813B31EE1FC5F76F75FB1310837CC4B19708A735E37267E4A7FE6A768A7DA57DC43A36AAD6
3,125,676 UART: [art] PUB.Y = 0BEAFE7EB8ADBD2ABEC2BD58238C3554FAA5A1019E14BFC5EC18B26BB2F8C7E817CEFF7674CFE9454C23B910ABB70D88
3,132,649 UART: [art] SIG.R = A75963F1B2AB2847F137366E6DADD47A55A2CD25008E66163490C54825E53641065872C4366EABDD8858BD6516B7BFDC
3,139,394 UART: [art] SIG.S = 191EBA7C8679AABB4A2E5AB7A6FAA58D35024C404ED65ADF3EDCB2197F434E444783114FAD083370971F3DAC2AA01F9E
3,163,029 UART: Caliptra RT
3,163,374 UART: [state] CFI Enabled
3,270,223 UART: [rt] RT listening for mailbox commands...
3,270,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,873 UART: [rt]cmd =0x41544d4e, len=14344
3,703,713 >>> mbox cmd response data (8 bytes)
3,703,714 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,605 UART: [rt]cmd =0x41545348, len=116
3,755,732 >>> mbox cmd response data (12 bytes)
3,755,733 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,776 UART:
3,756,792 UART: Running Caliptra ROM ...
3,757,200 UART:
3,757,342 UART: [state] CFI Enabled
3,759,972 UART: [state] LifecycleState = Unprovisioned
3,760,627 UART: [state] DebugLocked = No
3,761,161 UART: [state] WD Timer not started. Device not locked for debugging
3,762,501 UART: [kat] SHA2-256
4,566,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,570,180 UART: [kat] ++
4,570,332 UART: [kat] sha1
4,574,616 UART: [kat] SHA2-256
4,576,556 UART: [kat] SHA2-384
4,579,487 UART: [kat] SHA2-512-ACC
4,581,387 UART: [kat] ECC-384
4,590,904 UART: [kat] HMAC-384Kdf
4,595,332 UART: [kat] LMS
4,843,644 UART: [kat] --
4,844,408 UART: [update-reset] ++
6,153,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,154,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,304,100 >>> mbox cmd response: success
6,304,100 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,304,439 UART: [update-reset] Copying MAN_2 To MAN_1
6,312,453 UART: [update-reset Success] --
6,313,676 UART: [state] Locking Datavault
6,314,476 UART: [state] Locking PCR0, PCR1 and PCR31
6,315,080 UART: [state] Locking ICCM
6,315,506 UART: [exit] Launching FMC @ 0x40000130
6,320,835 UART:
6,320,851 UART: Running Caliptra FMC ...
6,321,259 UART:
6,321,402 UART: [state] CFI Enabled
6,410,101 UART: [art] Extend RT PCRs Done
6,410,529 UART: [art] Lock RT PCRs Done
6,411,654 UART: [art] Populate DV Done
6,419,847 UART: [fht] FMC Alias Private Key: 7
6,420,875 UART: [art] Derive CDI
6,421,155 UART: [art] Store in in slot 0x4
6,507,246 UART: [art] Derive Key Pair
6,507,606 UART: [art] Store priv key in slot 0x5
6,521,348 UART: [art] Derive Key Pair - Done
6,535,726 UART: [art] Signing Cert with AUTHO
6,536,206 UART: RITY.KEYID = 7
6,551,504 UART: [art] Erasing AUTHORITY.KEYID = 7
6,552,269 UART: [art] PUB.X = 32FCE86FF19B2225BEE9827AB5D712318EE41B9247A444E5F113E52F29D2C99D9B7FA90BDB5B074688187A76FE42FEA4
6,559,043 UART: [art] PUB.Y = A6FEE6F2EE47259ECDE7C633CBEBEEA9F55454BFD5E3513D23986EA14C72053612036AC4806D96D6C24E5EA81AA3C045
6,566,003 UART: [art] SIG.R = 2E57B5374B84AB47BCA38FAF559F259A227FA5C985EAA5D2752531161CF522CC243201B48F8324FCCCDA59CE1E320137
6,572,775 UART: [art] SIG.S = A488A748BEDC7A0F9961C4FC290F6AD794AAEF493A63A0B7FF1EBEC9E8B462253D8C70EC761263FF4FC6A0F5114A87E7
6,595,928 UART: Caliptra RT
6,596,273 UART: [state] CFI Enabled
6,876,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,907,707 UART: [rt]cmd =0x41545348, len=116
6,929,596 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,527 ready_for_fw is high
1,057,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,854 >>> mbox cmd response: success
2,683,538 UART:
2,683,554 UART: Running Caliptra FMC ...
2,683,962 UART:
2,684,105 UART: [state] CFI Enabled
2,694,538 UART: [fht] FMC Alias Private Key: 7
2,801,941 UART: [art] Extend RT PCRs Done
2,802,369 UART: [art] Lock RT PCRs Done
2,803,925 UART: [art] Populate DV Done
2,812,342 UART: [fht] FMC Alias Private Key: 7
2,813,510 UART: [art] Derive CDI
2,813,790 UART: [art] Store in in slot 0x4
2,899,667 UART: [art] Derive Key Pair
2,900,027 UART: [art] Store priv key in slot 0x5
2,913,689 UART: [art] Derive Key Pair - Done
2,928,271 UART: [art] Signing Cert with AUTHO
2,928,751 UART: RITY.KEYID = 7
2,943,871 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,636 UART: [art] PUB.X = F075FE61E2B7839C43EFFAE339EBAC7C06646DA341AFECC961F183B480249DB29690F7A5FD7BBD0627F050BBC142541E
2,951,416 UART: [art] PUB.Y = D30793BEBABC8D4A3CA4326D0358662D35A207884871523F0D395B3F16F86D744111686D6C0EE5D99ED9EBC28E08644D
2,958,350 UART: [art] SIG.R = D3318416570F450146D8993C8F63F8CC7D328F4D7C03C496183A88137B179BABEB68CDD42BA496BED5B39E9B91158D73
2,965,113 UART: [art] SIG.S = 76EB07EF5C513FE4E9507F2FF66D82A22FD0DE865B5A6B388ADBF288133C02F2E1507538DAD8E8E8BFEC644C94FCB223
2,989,372 UART: Caliptra RT
2,989,717 UART: [state] CFI Enabled
3,097,344 UART: [rt] RT listening for mailbox commands...
3,098,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,224 UART: [rt]cmd =0x41544d4e, len=14344
3,531,148 >>> mbox cmd response data (8 bytes)
3,531,149 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,988 UART: [rt]cmd =0x41545348, len=116
3,583,517 >>> mbox cmd response data (12 bytes)
3,583,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,700 >>> mbox cmd response: success
6,013,700 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,026,988 UART:
6,027,004 UART: Running Caliptra FMC ...
6,027,412 UART:
6,027,555 UART: [state] CFI Enabled
6,116,876 UART: [art] Extend RT PCRs Done
6,117,304 UART: [art] Lock RT PCRs Done
6,118,389 UART: [art] Populate DV Done
6,126,566 UART: [fht] FMC Alias Private Key: 7
6,127,538 UART: [art] Derive CDI
6,127,818 UART: [art] Store in in slot 0x4
6,213,547 UART: [art] Derive Key Pair
6,213,907 UART: [art] Store priv key in slot 0x5
6,227,145 UART: [art] Derive Key Pair - Done
6,241,697 UART: [art] Signing Cert with AUTHO
6,242,177 UART: RITY.KEYID = 7
6,257,037 UART: [art] Erasing AUTHORITY.KEYID = 7
6,257,802 UART: [art] PUB.X = C4307FC77D03AE6E95E71ED0DBD86752901792ED3DE304A7302C4ED109668D691C22F4131C4ECE9E496C7DED274595E7
6,264,569 UART: [art] PUB.Y = 4018FEF8B8845CBFDA322DD8F92C3C8AC9CD1955E93833F0083BD2126E21C644F7BDFC61A76A3E2C3A9AFA039C6ABDCB
6,271,537 UART: [art] SIG.R = C1F5447716DD489F15ED23A53EB49B1DFCF2A1D383EE6EAFFBBE4CD13B9B0D639BB463CF25BEEF3A48FCCB05474F512C
6,278,331 UART: [art] SIG.S = 76F82721A0B82457AFE38AEB68F5BD0FE3A5801FEB95A15A1DF3550ECBA4F2C76995CE9F9D13F074CFCDAE56278C95B2
6,302,380 UART: Caliptra RT
6,302,725 UART: [state] CFI Enabled
6,588,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,619,607 UART: [rt]cmd =0x41545348, len=116
6,642,598 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,035 UART:
192,408 UART: Running Caliptra ROM ...
193,534 UART:
193,678 UART: [state] CFI Enabled
263,222 UART: [state] LifecycleState = Unprovisioned
265,137 UART: [state] DebugLocked = No
266,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,307 UART: [kat] SHA2-256
440,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,515 UART: [kat] ++
451,965 UART: [kat] sha1
464,540 UART: [kat] SHA2-256
467,263 UART: [kat] SHA2-384
473,610 UART: [kat] SHA2-512-ACC
475,994 UART: [kat] ECC-384
2,767,841 UART: [kat] HMAC-384Kdf
2,800,246 UART: [kat] LMS
3,990,532 UART: [kat] --
3,995,110 UART: [cold-reset] ++
3,997,398 UART: [fht] Storing FHT @ 0x50003400
4,009,173 UART: [idev] ++
4,009,778 UART: [idev] CDI.KEYID = 6
4,010,679 UART: [idev] SUBJECT.KEYID = 7
4,011,929 UART: [idev] UDS.KEYID = 0
4,012,883 ready_for_fw is high
4,013,087 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,088 UART: [idev] Erasing UDS.KEYID = 0
7,347,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,817 UART: [idev] --
7,373,000 UART: [ldev] ++
7,373,600 UART: [ldev] CDI.KEYID = 6
7,374,531 UART: [ldev] SUBJECT.KEYID = 5
7,375,742 UART: [ldev] AUTHORITY.KEYID = 7
7,376,973 UART: [ldev] FE.KEYID = 1
7,424,290 UART: [ldev] Erasing FE.KEYID = 1
10,759,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,676 UART: [ldev] --
13,139,308 UART: [fwproc] Waiting for Commands...
13,141,241 UART: [fwproc] Received command 0x46574c44
13,143,422 UART: [fwproc] Received Image of size 113760 bytes
17,190,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,645 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,568 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,653,280 >>> mbox cmd response: success
17,657,692 UART: [afmc] ++
17,658,284 UART: [afmc] CDI.KEYID = 6
17,659,308 UART: [afmc] SUBJECT.KEYID = 7
17,660,472 UART: [afmc] AUTHORITY.KEYID = 5
21,030,837 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,235 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,631 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,483 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,948 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,024 UART: [afmc] --
23,400,133 UART: [cold-reset] --
23,403,342 UART: [state] Locking Datavault
23,409,396 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,175 UART: [state] Locking ICCM
23,413,843 UART: [exit] Launching FMC @ 0x40000130
23,422,238 UART:
23,422,472 UART: Running Caliptra FMC ...
23,423,576 UART:
23,423,736 UART: [state] CFI Enabled
23,488,685 UART: [fht] FMC Alias Private Key: 7
25,826,805 UART: [art] Extend RT PCRs Done
25,828,020 UART: [art] Lock RT PCRs Done
25,830,052 UART: [art] Populate DV Done
25,835,514 UART: [fht] FMC Alias Private Key: 7
25,837,102 UART: [art] Derive CDI
25,837,840 UART: [art] Store in in slot 0x4
25,897,035 UART: [art] Derive Key Pair
25,898,072 UART: [art] Store priv key in slot 0x5
29,191,385 UART: [art] Derive Key Pair - Done
29,204,236 UART: [art] Signing Cert with AUTHO
29,205,547 UART: RITY.KEYID = 7
31,492,846 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,355 UART: [art] PUB.X = CC4D9352DF85212E00666CE75B781E5482DAD2BDF533D152E120B4B8714E1C0D6940377C3EE41202148B4C8A5CA84133
31,501,596 UART: [art] PUB.Y = D4245A08A8FC2DAE74589935826919F64EDA33B44944FA2DE77B186EC47EF5956CE4464D9D0392D61AC1AEFF37365E62
31,508,833 UART: [art] SIG.R = 4D661623197483001007A0492A243B3A5770CF7EBD0A52A614982285AC968C86588F2DF5787CDF542E7CA1253FA93FB5
31,516,228 UART: [art] SIG.S = 45F99D8999D71DE4AB13B8801F7C70788204B26499B5D89EAB844E9A313F0F5CB33273547EC82E3A8F41B7BE11603120
32,821,468 UART: Caliptra RT
32,822,178 UART: [state] CFI Enabled
32,982,333 UART: [rt] RT listening for mailbox commands...
32,984,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,140,317 UART: [rt]cmd =0x41544d4e, len=14344
38,441,198 >>> mbox cmd response data (8 bytes)
38,441,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,472,516 UART: [rt]cmd =0x41545348, len=116
38,475,039 >>> mbox cmd response data (12 bytes)
40,534,802 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,679,292 UART:
40,679,661 UART: Running Caliptra ROM ...
40,680,716 UART:
40,680,867 UART: [state] CFI Enabled
40,752,955 UART: [state] LifecycleState = Unprovisioned
40,754,856 UART: [state] DebugLocked = No
40,757,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,761,289 UART: [kat] SHA2-256
40,931,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,941,505 UART: [kat] ++
40,942,014 UART: [kat] sha1
40,951,665 UART: [kat] SHA2-256
40,954,365 UART: [kat] SHA2-384
40,960,405 UART: [kat] SHA2-512-ACC
40,962,811 UART: [kat] ECC-384
43,254,222 UART: [kat] HMAC-384Kdf
43,267,046 UART: [kat] LMS
44,457,364 UART: [kat] --
44,461,431 UART: [update-reset] ++
48,593,373 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,597,652 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,978,621 >>> mbox cmd response: success
48,983,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,983,842 UART: [update-reset] Copying MAN_2 To MAN_1
49,002,798 UART: [update-reset Success] --
49,005,696 UART: [state] Locking Datavault
49,008,950 UART: [state] Locking PCR0, PCR1 and PCR31
49,010,709 UART: [state] Locking ICCM
49,013,052 UART: [exit] Launching FMC @ 0x40000130
49,021,446 UART:
49,021,683 UART: Running Caliptra FMC ...
49,022,737 UART:
49,022,895 UART: [state] CFI Enabled
49,123,574 UART: [art] Extend RT PCRs Done
49,124,764 UART: [art] Lock RT PCRs Done
49,126,139 UART: [art] Populate DV Done
49,131,642 UART: [fht] FMC Alias Private Key: 7
49,133,230 UART: [art] Derive CDI
49,133,992 UART: [art] Store in in slot 0x4
49,192,907 UART: [art] Derive Key Pair
49,193,912 UART: [art] Store priv key in slot 0x5
52,486,539 UART: [art] Derive Key Pair - Done
52,499,655 UART: [art] Signing Cert with AUTHO
52,500,988 UART: RITY.KEYID = 7
54,788,541 UART: [art] Erasing AUTHORITY.KEYID = 7
54,790,043 UART: [art] PUB.X = F8B142D89FF8A11E45FA2154EE519B90DAFB6CAE00527E575A178467B9BB5812048FA929331FB7DC486476E1ABAD337C
54,797,295 UART: [art] PUB.Y = C334D0C5214FA3820A72B2D346E2F46266F3CC63B42216F54FF23AD88AA1941EC25DC33974F156740176FECB34222EB8
54,804,527 UART: [art] SIG.R = 99D156FE641E7497F92EFE2143310CB100819D79D9317B60A2CDBB4CFC911189638BD0F611EBD615E53E9B0F5959C164
54,811,946 UART: [art] SIG.S = 95426185C4103051152A0AC28159A6937C788B554B252E94844C964863E14274E11D70554DDD9F06843CC476E71D5A28
56,117,333 UART: Caliptra RT
56,118,048 UART: [state] CFI Enabled
56,444,831 UART: [rt] RT listening for mailbox commands...
56,476,678 UART: [rt]cmd =0x41545348, len=116
56,479,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,784,790 ready_for_fw is high
3,785,302 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,861,003 >>> mbox cmd response: success
23,541,746 UART:
23,542,141 UART: Running Caliptra FMC ...
23,543,274 UART:
23,543,430 UART: [state] CFI Enabled
23,606,124 UART: [fht] FMC Alias Private Key: 7
25,944,210 UART: [art] Extend RT PCRs Done
25,945,438 UART: [art] Lock RT PCRs Done
25,946,932 UART: [art] Populate DV Done
25,952,399 UART: [fht] FMC Alias Private Key: 7
25,953,944 UART: [art] Derive CDI
25,954,681 UART: [art] Store in in slot 0x4
26,014,921 UART: [art] Derive Key Pair
26,015,968 UART: [art] Store priv key in slot 0x5
29,308,675 UART: [art] Derive Key Pair - Done
29,321,994 UART: [art] Signing Cert with AUTHO
29,323,291 UART: RITY.KEYID = 7
31,611,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,612,698 UART: [art] PUB.X = 75C4C6AEC46AFAEC542876F50450A74398D3A7C8DF1DA943244AD402865F2E51809634420FC08249AB6E7124D5ABA700
31,619,926 UART: [art] PUB.Y = 5B9E3EE764A46FE0F12EF5BF6C08C803EF1A9E87112FE6B22D0AD50C8C952E8421ABC1B3028B7C93350ED63CE1C9495D
31,627,193 UART: [art] SIG.R = C48ACF08FEF6A77BB8DBBADA792A19DFD198660DD09506E16D11E95FF53777CA04919FECA2E1E7738CEE991007F7234E
31,634,583 UART: [art] SIG.S = 7EDE7F27F43010FA704B81D4DB27FA5DFC791405146F20B0F8854BC3C06BCC31F204A92BD29EE36B7C681A98B04A88C4
32,940,283 UART: Caliptra RT
32,941,002 UART: [state] CFI Enabled
33,100,129 UART: [rt] RT listening for mailbox commands...
33,102,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,257,966 UART: [rt]cmd =0x41544d4e, len=14344
38,558,741 >>> mbox cmd response data (8 bytes)
38,559,324 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,590,106 UART: [rt]cmd =0x41545348, len=116
38,592,256 >>> mbox cmd response data (12 bytes)
40,644,913 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,385,857 >>> mbox cmd response: success
49,386,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,419,490 UART:
49,419,793 UART: Running Caliptra FMC ...
49,420,914 UART:
49,421,076 UART: [state] CFI Enabled
49,511,126 UART: [art] Extend RT PCRs Done
49,512,325 UART: [art] Lock RT PCRs Done
49,513,784 UART: [art] Populate DV Done
49,519,462 UART: [fht] FMC Alias Private Key: 7
49,521,048 UART: [art] Derive CDI
49,521,862 UART: [art] Store in in slot 0x4
49,580,391 UART: [art] Derive Key Pair
49,581,382 UART: [art] Store priv key in slot 0x5
52,874,528 UART: [art] Derive Key Pair - Done
52,887,595 UART: [art] Signing Cert with AUTHO
52,888,901 UART: RITY.KEYID = 7
55,175,883 UART: [art] Erasing AUTHORITY.KEYID = 7
55,177,389 UART: [art] PUB.X = FDB3CFB363526F7C5E70739BE76A757D68E11CCEA990790C570D423A57AD60E9DC8F79C5FB607292F68872F70CB64DDC
55,184,667 UART: [art] PUB.Y = 467A9BFBF427970D324F49F621241BA0DF57A6B1ECCDFC68BF17EE9F9EE1207EBC0549F280888904B5874DF423EE9573
55,191,864 UART: [art] SIG.R = 3592E81B8AD337B6C60EB90DBF87AC4E0A2ACFD16D6854E0170A61629792A5BEEA88978D54A5A86390086E32681CDADC
55,199,256 UART: [art] SIG.S = 6D3CF0476393C3A25146387F0C953078116CD422079B9BB193F170A7A6322E5336145814C7640EAC2F9D34AC8150BB82
56,504,406 UART: Caliptra RT
56,505,116 UART: [state] CFI Enabled
56,840,907 UART: [rt] RT listening for mailbox commands...
56,872,852 UART: [rt]cmd =0x41545348, len=116
56,875,047 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,864 writing to cptra_bootfsm_go
192,994 UART:
193,355 UART: Running Caliptra ROM ...
194,466 UART:
604,347 UART: [state] CFI Enabled
620,654 UART: [state] LifecycleState = Unprovisioned
622,632 UART: [state] DebugLocked = No
624,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,076 UART: [kat] SHA2-256
798,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,402 UART: [kat] ++
809,857 UART: [kat] sha1
819,940 UART: [kat] SHA2-256
822,582 UART: [kat] SHA2-384
828,643 UART: [kat] SHA2-512-ACC
831,004 UART: [kat] ECC-384
3,115,985 UART: [kat] HMAC-384Kdf
3,127,000 UART: [kat] LMS
4,317,110 UART: [kat] --
4,320,986 UART: [cold-reset] ++
4,322,355 UART: [fht] Storing FHT @ 0x50003400
4,334,338 UART: [idev] ++
4,334,977 UART: [idev] CDI.KEYID = 6
4,335,881 UART: [idev] SUBJECT.KEYID = 7
4,337,124 UART: [idev] UDS.KEYID = 0
4,338,089 ready_for_fw is high
4,338,288 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,130 UART: [idev] Erasing UDS.KEYID = 0
7,621,925 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,975 UART: [idev] --
7,649,668 UART: [ldev] ++
7,650,232 UART: [ldev] CDI.KEYID = 6
7,651,189 UART: [ldev] SUBJECT.KEYID = 5
7,652,395 UART: [ldev] AUTHORITY.KEYID = 7
7,653,678 UART: [ldev] FE.KEYID = 1
7,664,485 UART: [ldev] Erasing FE.KEYID = 1
10,954,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,990 UART: [ldev] --
13,313,958 UART: [fwproc] Waiting for Commands...
13,316,264 UART: [fwproc] Received command 0x46574c44
13,318,496 UART: [fwproc] Received Image of size 113760 bytes
17,367,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,962 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,396 >>> mbox cmd response: success
17,828,637 UART: [afmc] ++
17,829,236 UART: [afmc] CDI.KEYID = 6
17,830,144 UART: [afmc] SUBJECT.KEYID = 7
17,831,417 UART: [afmc] AUTHORITY.KEYID = 5
21,145,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,351 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,739 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,549 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,016 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,410 UART: [afmc] --
23,512,824 UART: [cold-reset] --
23,516,200 UART: [state] Locking Datavault
23,521,236 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,935 UART: [state] Locking ICCM
23,524,573 UART: [exit] Launching FMC @ 0x40000130
23,532,972 UART:
23,533,204 UART: Running Caliptra FMC ...
23,534,227 UART:
23,534,369 UART: [state] CFI Enabled
23,542,336 UART: [fht] FMC Alias Private Key: 7
25,873,106 UART: [art] Extend RT PCRs Done
25,874,328 UART: [art] Lock RT PCRs Done
25,876,249 UART: [art] Populate DV Done
25,881,727 UART: [fht] FMC Alias Private Key: 7
25,883,431 UART: [art] Derive CDI
25,884,162 UART: [art] Store in in slot 0x4
25,926,918 UART: [art] Derive Key Pair
25,927,960 UART: [art] Store priv key in slot 0x5
29,170,536 UART: [art] Derive Key Pair - Done
29,183,741 UART: [art] Signing Cert with AUTHO
29,185,082 UART: RITY.KEYID = 7
31,464,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,012 UART: [art] PUB.X = 508E812A1E347907F25743887FCAF2419A65D382E9B820EADEF7133B1F88EF0A6F0C0ACB2C62E589AC4EF4C85762A8E3
31,473,284 UART: [art] PUB.Y = 898CA32371CC28C47150BE9D7B0BF7DBECE32F2239F9D03C5F9D4BB3D4AD0BA2CB4D688EBFF1424E8D233C8EEF1A9A89
31,480,532 UART: [art] SIG.R = 523366211A122EC1B1DB7DB82E548737665D69966B39C448596942CC18E6872DDEE1736A5C77E6CA5344304855E2A32A
31,487,905 UART: [art] SIG.S = D2AD8EF881ECDD78A0CA4CCEB512F67EAA22D37B37C89F7ED2586833724C02AA0B051AA3E32F310884E0AE0D6C952A7F
32,793,346 UART: Caliptra RT
32,794,066 UART: [state] CFI Enabled
32,910,136 UART: [rt] RT listening for mailbox commands...
32,912,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,067,724 UART: [rt]cmd =0x41544d4e, len=14344
38,367,973 >>> mbox cmd response data (8 bytes)
38,369,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,400,041 UART: [rt]cmd =0x41545348, len=116
38,402,513 >>> mbox cmd response data (12 bytes)
40,456,973 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,601,747 UART:
40,602,146 UART: Running Caliptra ROM ...
40,603,199 UART:
40,603,407 UART: [state] CFI Enabled
40,614,561 UART: [state] LifecycleState = Unprovisioned
40,616,465 UART: [state] DebugLocked = No
40,618,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,623,289 UART: [kat] SHA2-256
40,793,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,803,547 UART: [kat] ++
40,804,000 UART: [kat] sha1
40,814,831 UART: [kat] SHA2-256
40,817,569 UART: [kat] SHA2-384
40,823,608 UART: [kat] SHA2-512-ACC
40,825,954 UART: [kat] ECC-384
43,108,382 UART: [kat] HMAC-384Kdf
43,120,137 UART: [kat] LMS
44,310,199 UART: [kat] --
44,315,326 UART: [update-reset] ++
48,450,153 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,453,532 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,834,568 >>> mbox cmd response: success
48,839,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,839,909 UART: [update-reset] Copying MAN_2 To MAN_1
48,857,575 UART: [update-reset Success] --
48,861,000 UART: [state] Locking Datavault
48,863,246 UART: [state] Locking PCR0, PCR1 and PCR31
48,865,014 UART: [state] Locking ICCM
48,867,273 UART: [exit] Launching FMC @ 0x40000130
48,875,731 UART:
48,875,966 UART: Running Caliptra FMC ...
48,877,065 UART:
48,877,245 UART: [state] CFI Enabled
48,921,418 UART: [art] Extend RT PCRs Done
48,922,559 UART: [art] Lock RT PCRs Done
48,923,947 UART: [art] Populate DV Done
48,929,312 UART: [fht] FMC Alias Private Key: 7
48,930,900 UART: [art] Derive CDI
48,931,710 UART: [art] Store in in slot 0x4
48,974,026 UART: [art] Derive Key Pair
48,975,101 UART: [art] Store priv key in slot 0x5
52,216,738 UART: [art] Derive Key Pair - Done
52,229,817 UART: [art] Signing Cert with AUTHO
52,231,131 UART: RITY.KEYID = 7
54,510,743 UART: [art] Erasing AUTHORITY.KEYID = 7
54,512,261 UART: [art] PUB.X = 9FA38183967A12317309162D800868664078F8AFBFDB08C486114518BB716A9975AA0BE03336A4975A8CAB31C02AF84A
54,519,460 UART: [art] PUB.Y = 0C54C890606A6D165EB766EFE9E04AED34FA8D3BEE2A3242DE69ADAA341D8D2496AF8C80023BD867AA284DAE92532796
54,526,709 UART: [art] SIG.R = 166656F9C53293974F31C9419ABF417F265EDAB76BB58F3F27ADE19B74BACE2A1BCCAADFF7869F9466F16B93A1111EC0
54,534,147 UART: [art] SIG.S = 877593F97574FEAEEE7B8FE8C1C164946D45BC80DA474FD18E38871A74FE0C1B1D663DAD91A7C2262BC5E2D0C541B9B8
55,839,283 UART: Caliptra RT
55,840,002 UART: [state] CFI Enabled
56,128,120 UART: [rt] RT listening for mailbox commands...
56,160,174 UART: [rt]cmd =0x41545348, len=116
56,162,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
4,129,817 ready_for_fw is high
4,130,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,077,454 >>> mbox cmd response: success
23,716,385 UART:
23,716,783 UART: Running Caliptra FMC ...
23,717,908 UART:
23,718,071 UART: [state] CFI Enabled
23,725,624 UART: [fht] FMC Alias Private Key: 7
26,056,488 UART: [art] Extend RT PCRs Done
26,057,725 UART: [art] Lock RT PCRs Done
26,059,301 UART: [art] Populate DV Done
26,064,499 UART: [fht] FMC Alias Private Key: 7
26,066,104 UART: [art] Derive CDI
26,066,918 UART: [art] Store in in slot 0x4
26,109,940 UART: [art] Derive Key Pair
26,110,974 UART: [art] Store priv key in slot 0x5
29,353,088 UART: [art] Derive Key Pair - Done
29,366,102 UART: [art] Signing Cert with AUTHO
29,367,426 UART: RITY.KEYID = 7
31,646,786 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,298 UART: [art] PUB.X = 0F4BAF234FB04ED85AB5F3D21395B1D7056E493C925449E662DA90B7DE17F23E270765FA2EB1E3BDBC086D7D5ED7E09F
31,655,581 UART: [art] PUB.Y = E9571135245DE59236A70CF4DF222EE11589251568BB19FE280ADA3AF06177FED0366F07C9D2DE338A55809EBA1B082C
31,662,819 UART: [art] SIG.R = 6369382C0E0CCF816DF2845CAC49F9FE8DC8CAA9876FBAAC30856C002B68F38771151DE17DD92EE8189A21419E32CCF0
31,670,209 UART: [art] SIG.S = 54930DDCE7683543EA08F8005A5626FD7CCFCA6DB5E636D79C47CFCBAE2E03445DFE525CCABB850C4D87C859307F095E
32,975,090 UART: Caliptra RT
32,975,810 UART: [state] CFI Enabled
33,092,818 UART: [rt] RT listening for mailbox commands...
33,095,193 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,250,677 UART: [rt]cmd =0x41544d4e, len=14344
38,551,894 >>> mbox cmd response data (8 bytes)
38,552,481 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,583,218 UART: [rt]cmd =0x41545348, len=116
38,585,720 >>> mbox cmd response data (12 bytes)
40,639,178 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,285,211 >>> mbox cmd response: success
49,285,771 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,322,745 UART:
49,323,072 UART: Running Caliptra FMC ...
49,324,204 UART:
49,324,363 UART: [state] CFI Enabled
49,369,119 UART: [art] Extend RT PCRs Done
49,370,284 UART: [art] Lock RT PCRs Done
49,371,944 UART: [art] Populate DV Done
49,377,261 UART: [fht] FMC Alias Private Key: 7
49,378,787 UART: [art] Derive CDI
49,379,578 UART: [art] Store in in slot 0x4
49,422,067 UART: [art] Derive Key Pair
49,423,068 UART: [art] Store priv key in slot 0x5
52,665,001 UART: [art] Derive Key Pair - Done
52,677,956 UART: [art] Signing Cert with AUTHO
52,679,265 UART: RITY.KEYID = 7
54,959,476 UART: [art] Erasing AUTHORITY.KEYID = 7
54,960,978 UART: [art] PUB.X = C99DC282689FCD5D057E693125A0A5C682FCCB1A67DED05B240E2722F01C8559B372455E952B6A843207711D85C9C27F
54,968,213 UART: [art] PUB.Y = 70BD65115EDF35701FF26D7F53F6F57C2363E2E0F37453164786B25C26F3B992855B0B9B63A515769209134C54EB9D0C
54,975,466 UART: [art] SIG.R = 430FF9425C97EBD70CB10B8BB3300EC86D6D73C11FFCE9F31D67281CAFC4F9F9591696955CA0F5C7E5B7ED42BD0FED9B
54,982,868 UART: [art] SIG.S = 64B057D479E116D94E3C51E9959B73D0C341422997CFF0C4DA85710420F21933119938FA3205999AD7E9298E583EE81A
56,288,281 UART: Caliptra RT
56,288,979 UART: [state] CFI Enabled
56,578,205 UART: [rt] RT listening for mailbox commands...
56,610,110 UART: [rt]cmd =0x41545348, len=116
56,612,302 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,467 UART:
192,826 UART: Running Caliptra ROM ...
194,025 UART:
194,186 UART: [state] CFI Enabled
265,964 UART: [state] LifecycleState = Unprovisioned
267,754 UART: [state] DebugLocked = No
269,349 UART: [state] WD Timer not started. Device not locked for debugging
272,145 UART: [kat] SHA2-256
451,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,847 UART: [kat] ++
463,368 UART: [kat] sha1
474,812 UART: [kat] SHA2-256
477,888 UART: [kat] SHA2-384
483,587 UART: [kat] SHA2-512-ACC
486,518 UART: [kat] ECC-384
2,948,945 UART: [kat] HMAC-384Kdf
2,971,134 UART: [kat] LMS
3,500,597 UART: [kat] --
3,505,589 UART: [cold-reset] ++
3,507,590 UART: [fht] FHT @ 0x50003400
3,519,131 UART: [idev] ++
3,519,697 UART: [idev] CDI.KEYID = 6
3,520,603 UART: [idev] SUBJECT.KEYID = 7
3,521,771 UART: [idev] UDS.KEYID = 0
3,522,711 ready_for_fw is high
3,522,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,486 UART: [idev] Erasing UDS.KEYID = 0
6,026,860 UART: [idev] Sha1 KeyId Algorithm
6,049,933 UART: [idev] --
6,053,130 UART: [ldev] ++
6,053,709 UART: [ldev] CDI.KEYID = 6
6,054,618 UART: [ldev] SUBJECT.KEYID = 5
6,055,775 UART: [ldev] AUTHORITY.KEYID = 7
6,057,054 UART: [ldev] FE.KEYID = 1
6,100,700 UART: [ldev] Erasing FE.KEYID = 1
8,601,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,720 UART: [ldev] --
10,391,546 UART: [fwproc] Wait for Commands...
10,394,288 UART: [fwproc] Recv command 0x46574c44
10,396,377 UART: [fwproc] Recv'd Img size: 114084 bytes
13,793,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,075 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,254,797 >>> mbox cmd response: success
14,258,355 UART: [afmc] ++
14,258,940 UART: [afmc] CDI.KEYID = 6
14,259,850 UART: [afmc] SUBJECT.KEYID = 7
14,261,004 UART: [afmc] AUTHORITY.KEYID = 5
16,783,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,242 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,277 UART: [afmc] --
18,583,216 UART: [cold-reset] --
18,588,257 UART: [state] Locking Datavault
18,592,263 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,929 UART: [state] Locking ICCM
18,595,055 UART: [exit] Launching FMC @ 0x40000130
18,603,456 UART:
18,603,687 UART: Running Caliptra FMC ...
18,604,781 UART:
18,604,936 UART: [state] CFI Enabled
18,665,881 UART: [fht] FMC Alias Private Key: 7
20,430,026 UART: [art] Extend RT PCRs Done
20,431,247 UART: [art] Lock RT PCRs Done
20,433,025 UART: [art] Populate DV Done
20,438,453 UART: [fht] FMC Alias Private Key: 7
20,440,158 UART: [art] Derive CDI
20,440,971 UART: [art] Store in in slot 0x4
20,499,211 UART: [art] Derive Key Pair
20,500,206 UART: [art] Store priv key in slot 0x5
22,962,697 UART: [art] Derive Key Pair - Done
22,975,915 UART: [art] Signing Cert with AUTHO
22,977,221 UART: RITY.KEYID = 7
24,689,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,633 UART: [art] PUB.X = 61E965DC3810841B25610A6F8B4A7CF7CB13FBE93ECEFFCBF442E66FFEA9A8C34494B82ED20249EC45A6FDFC8AAD8D53
24,697,929 UART: [art] PUB.Y = B49876C7E15ED13261D142206A245FB77FEFD300C8904A879C4877645D04F83F708D04F4CBDC934D85B51F43AF58A0E3
24,705,182 UART: [art] SIG.R = FE9870166C9B02533F6CAA8DA522AE785A5794F21D7AC387339FA8B509AB6502171F4E370E566AC5F9C5858118610BAC
24,712,543 UART: [art] SIG.S = 9D1CBBDB6993399014754E9AFCD14CB6E793E494DF53A30054CA46D70D2B1950AEC804650C88D4483AEB32D4512403EA
25,692,072 UART: Caliptra RT
25,692,791 UART: [state] CFI Enabled
25,857,528 UART: [rt] RT listening for mailbox commands...
25,860,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,015,698 UART: [rt]cmd =0x41544d4e, len=14344
30,010,533 >>> mbox cmd response data (8 bytes)
30,011,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,041,752 UART: [rt]cmd =0x41545348, len=116
30,043,986 >>> mbox cmd response data (12 bytes)
32,095,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,240,375 UART:
32,240,762 UART: Running Caliptra ROM ...
32,241,815 UART:
32,241,965 UART: [state] CFI Enabled
32,301,791 UART: [state] LifecycleState = Unprovisioned
32,303,644 UART: [state] DebugLocked = No
32,304,843 UART: [state] WD Timer not started. Device not locked for debugging
32,307,900 UART: [kat] SHA2-256
32,487,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,498,576 UART: [kat] ++
32,499,030 UART: [kat] sha1
32,510,507 UART: [kat] SHA2-256
32,513,559 UART: [kat] SHA2-384
32,519,651 UART: [kat] SHA2-512-ACC
32,522,599 UART: [kat] ECC-384
34,985,414 UART: [kat] HMAC-384Kdf
35,006,121 UART: [kat] LMS
35,535,582 UART: [kat] --
35,539,537 UART: [update-reset] ++
38,968,988 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,971,986 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,354,024 >>> mbox cmd response: success
39,354,476 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,355,784 UART: [update-reset] Copying MAN_2 To MAN_1
39,378,113 UART: [update-reset Success] --
39,382,345 UART: [state] Locking Datavault
39,384,294 UART: [state] Locking PCR0, PCR1 and PCR31
39,385,935 UART: [state] Locking ICCM
39,388,025 UART: [exit] Launching FMC @ 0x40000130
39,396,435 UART:
39,396,683 UART: Running Caliptra FMC ...
39,397,719 UART:
39,397,867 UART: [state] CFI Enabled
39,496,655 UART: [art] Extend RT PCRs Done
39,497,839 UART: [art] Lock RT PCRs Done
39,499,204 UART: [art] Populate DV Done
39,504,612 UART: [fht] FMC Alias Private Key: 7
39,506,219 UART: [art] Derive CDI
39,507,029 UART: [art] Store in in slot 0x4
39,565,667 UART: [art] Derive Key Pair
39,566,747 UART: [art] Store priv key in slot 0x5
42,029,223 UART: [art] Derive Key Pair - Done
42,042,552 UART: [art] Signing Cert with AUTHO
42,043,864 UART: RITY.KEYID = 7
43,754,439 UART: [art] Erasing AUTHORITY.KEYID = 7
43,755,946 UART: [art] PUB.X = CAB40FB9E5878C9D02CEE1907731148425D5D0EFAC6B9BE58A2F2F2A116E2DF4A9F6BE93EC066CE33E72B68913CDAC2E
43,763,229 UART: [art] PUB.Y = B48AD93A1729D8EA0D3BD68F37A3CB9C4788C180FE577A3D3958DA69800C099538839585B9A3332EAD6558F445EBD9C8
43,770,502 UART: [art] SIG.R = 190763106F10E4F01E7D34F89B1A42FCE78D42E9A18E4DDB06FBEC3AFC1A61DE61E63C5E68E1C6C1DBB3138B7B66B3BB
43,777,911 UART: [art] SIG.S = B33BA5F37C9F2B2447830680218E9FFC60C5032DC4AC6A55E97B6E6947A191A888374C8A74BF60304AC12D875E903D48
44,756,777 UART: Caliptra RT
44,757,466 UART: [state] CFI Enabled
45,091,925 UART: [rt] RT listening for mailbox commands...
45,123,827 UART: [rt]cmd =0x41545348, len=116
45,126,033 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
3,380,563 ready_for_fw is high
3,381,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,086,028 >>> mbox cmd response: success
18,388,502 UART:
18,388,961 UART: Running Caliptra FMC ...
18,390,069 UART:
18,390,231 UART: [state] CFI Enabled
18,452,654 UART: [fht] FMC Alias Private Key: 7
20,216,889 UART: [art] Extend RT PCRs Done
20,218,101 UART: [art] Lock RT PCRs Done
20,219,642 UART: [art] Populate DV Done
20,225,204 UART: [fht] FMC Alias Private Key: 7
20,226,902 UART: [art] Derive CDI
20,227,640 UART: [art] Store in in slot 0x4
20,284,894 UART: [art] Derive Key Pair
20,285,936 UART: [art] Store priv key in slot 0x5
22,748,935 UART: [art] Derive Key Pair - Done
22,761,937 UART: [art] Signing Cert with AUTHO
22,763,276 UART: RITY.KEYID = 7
24,473,891 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,401 UART: [art] PUB.X = 9EC74BA60F9AA4BCC13E166E8AC6B3FF99BB4EED3E0C49E94487015236A16FC8296747AA91D65D48AC870509CD8A27E3
24,482,699 UART: [art] PUB.Y = B958FA64B3B7BA9F26C56A8A7EC2D99E17FBDCCBDDE033070943AEC47D41A68CF5A8B8C6DF83CED356E17D90D6C03DFA
24,490,001 UART: [art] SIG.R = 2189763C55B90EC344DC3B8E513219536CFBE2C475B7D7D6824FF5C290E244679367F021BFADCEAFB0B6A8702ADB52C7
24,497,372 UART: [art] SIG.S = 9156FD4262AE9341DCA8AF9563DE17956DD94DC0377A20052B91B3024FDDEB31B379C01991A5F90B0C9FCA0D5A30F908
25,475,920 UART: Caliptra RT
25,476,645 UART: [state] CFI Enabled
25,642,466 UART: [rt] RT listening for mailbox commands...
25,644,927 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,800,397 UART: [rt]cmd =0x41544d4e, len=14344
29,796,032 >>> mbox cmd response data (8 bytes)
29,796,641 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,827,264 UART: [rt]cmd =0x41545348, len=116
29,829,362 >>> mbox cmd response data (12 bytes)
31,883,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
39,005,168 >>> mbox cmd response: success
39,005,786 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,038,374 UART:
39,038,677 UART: Running Caliptra FMC ...
39,039,718 UART:
39,039,873 UART: [state] CFI Enabled
39,135,977 UART: [art] Extend RT PCRs Done
39,137,171 UART: [art] Lock RT PCRs Done
39,138,578 UART: [art] Populate DV Done
39,144,096 UART: [fht] FMC Alias Private Key: 7
39,145,739 UART: [art] Derive CDI
39,146,552 UART: [art] Store in in slot 0x4
39,205,096 UART: [art] Derive Key Pair
39,206,145 UART: [art] Store priv key in slot 0x5
41,668,353 UART: [art] Derive Key Pair - Done
41,681,360 UART: [art] Signing Cert with AUTHO
41,682,673 UART: RITY.KEYID = 7
43,394,511 UART: [art] Erasing AUTHORITY.KEYID = 7
43,396,033 UART: [art] PUB.X = CEB274E1C6D32318849E4ECCD3B4CBDF507AA58175B49A012D0CAA6ECBB838551E0D123CC78732EFA62FDBC670E3EF00
43,403,305 UART: [art] PUB.Y = 4A6AA5732F1CCC28DBDBCBE283A3713FDEE807C48CFBB2311BA97B1CEAB8AB8F1F2779F19808AE0F2828F783CE70EAFF
43,410,575 UART: [art] SIG.R = 7E95C777F6ECCF5ACFEA8B9DB04A91C6141686C92F62E68F05082C40BD441DE16AEAFFDBC0DA15EFBDB5919ADCBA66C1
43,418,055 UART: [art] SIG.S = 845F43B5B82EFF2573C0618117509A43DDAD352A269A198F6E6D16D06952D68D22F636990F37D29B360E0F6E9970164A
44,396,530 UART: Caliptra RT
44,397,225 UART: [state] CFI Enabled
44,736,256 UART: [rt] RT listening for mailbox commands...
44,768,092 UART: [rt]cmd =0x41545348, len=116
44,770,469 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,885 writing to cptra_bootfsm_go
192,998 UART:
193,356 UART: Running Caliptra ROM ...
194,483 UART:
604,172 UART: [state] CFI Enabled
616,286 UART: [state] LifecycleState = Unprovisioned
618,098 UART: [state] DebugLocked = No
619,350 UART: [state] WD Timer not started. Device not locked for debugging
623,803 UART: [kat] SHA2-256
802,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,515 UART: [kat] ++
815,058 UART: [kat] sha1
826,653 UART: [kat] SHA2-256
829,669 UART: [kat] SHA2-384
835,448 UART: [kat] SHA2-512-ACC
838,389 UART: [kat] ECC-384
3,280,084 UART: [kat] HMAC-384Kdf
3,294,032 UART: [kat] LMS
3,823,581 UART: [kat] --
3,827,818 UART: [cold-reset] ++
3,829,210 UART: [fht] FHT @ 0x50003400
3,841,329 UART: [idev] ++
3,841,896 UART: [idev] CDI.KEYID = 6
3,842,880 UART: [idev] SUBJECT.KEYID = 7
3,844,056 UART: [idev] UDS.KEYID = 0
3,845,157 ready_for_fw is high
3,845,357 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,488 UART: [idev] Erasing UDS.KEYID = 0
6,316,384 UART: [idev] Sha1 KeyId Algorithm
6,340,457 UART: [idev] --
6,343,884 UART: [ldev] ++
6,344,469 UART: [ldev] CDI.KEYID = 6
6,345,354 UART: [ldev] SUBJECT.KEYID = 5
6,346,480 UART: [ldev] AUTHORITY.KEYID = 7
6,347,819 UART: [ldev] FE.KEYID = 1
6,358,383 UART: [ldev] Erasing FE.KEYID = 1
8,834,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,290 UART: [ldev] --
10,623,590 UART: [fwproc] Wait for Commands...
10,625,789 UART: [fwproc] Recv command 0x46574c44
10,627,879 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,485,641 >>> mbox cmd response: success
14,489,149 UART: [afmc] ++
14,489,744 UART: [afmc] CDI.KEYID = 6
14,490,812 UART: [afmc] SUBJECT.KEYID = 7
14,491,944 UART: [afmc] AUTHORITY.KEYID = 5
16,990,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,492 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,268 UART: [afmc] --
18,784,626 UART: [cold-reset] --
18,789,952 UART: [state] Locking Datavault
18,796,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,258 UART: [state] Locking ICCM
18,799,390 UART: [exit] Launching FMC @ 0x40000130
18,807,798 UART:
18,808,066 UART: Running Caliptra FMC ...
18,809,175 UART:
18,809,354 UART: [state] CFI Enabled
18,817,191 UART: [fht] FMC Alias Private Key: 7
20,574,174 UART: [art] Extend RT PCRs Done
20,575,387 UART: [art] Lock RT PCRs Done
20,576,662 UART: [art] Populate DV Done
20,582,130 UART: [fht] FMC Alias Private Key: 7
20,583,723 UART: [art] Derive CDI
20,584,539 UART: [art] Store in in slot 0x4
20,627,353 UART: [art] Derive Key Pair
20,628,357 UART: [art] Store priv key in slot 0x5
23,054,776 UART: [art] Derive Key Pair - Done
23,067,986 UART: [art] Signing Cert with AUTHO
23,069,293 UART: RITY.KEYID = 7
24,774,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,302 UART: [art] PUB.X = 2112EDB21BE5FDDB8C30FA37D083F98CB07766EEFD6D6793DBBDAECFE376228BD0A0CD17215F1FF80303EDED09118B62
24,783,634 UART: [art] PUB.Y = 4B8585170F785157CACC8917B54360B729B2A4C8DCA40A2C0E0965A8E27D4F1EC9AE5A3D4E5ACD44F4CED261A966B9CF
24,790,850 UART: [art] SIG.R = 80845FF1AA8C11A7AF618D24F341274AA1032EB3E1F0AF2B09105910D701D94B225326BE59A8F95FCFEE23EC5DE3AACB
24,798,280 UART: [art] SIG.S = 9A21590D5E857B0BFEB3233A2BEA7DBFF059F89C9BDD4022E1B04BB12CD931369B3D3E935F357E1F288F82130DDF0369
25,777,807 UART: Caliptra RT
25,778,511 UART: [state] CFI Enabled
25,896,181 UART: [rt] RT listening for mailbox commands...
25,898,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,053,822 UART: [rt]cmd =0x41544d4e, len=14344
30,049,485 >>> mbox cmd response data (8 bytes)
30,050,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,080,937 UART: [rt]cmd =0x41545348, len=116
30,083,305 >>> mbox cmd response data (12 bytes)
32,137,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,282,449 UART:
32,282,822 UART: Running Caliptra ROM ...
32,283,914 UART:
32,284,075 UART: [state] CFI Enabled
32,299,306 UART: [state] LifecycleState = Unprovisioned
32,301,146 UART: [state] DebugLocked = No
32,302,424 UART: [state] WD Timer not started. Device not locked for debugging
32,306,120 UART: [kat] SHA2-256
32,485,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,496,920 UART: [kat] ++
32,497,463 UART: [kat] sha1
32,508,029 UART: [kat] SHA2-256
32,511,041 UART: [kat] SHA2-384
32,516,116 UART: [kat] SHA2-512-ACC
32,519,057 UART: [kat] ECC-384
34,959,640 UART: [kat] HMAC-384Kdf
34,973,055 UART: [kat] LMS
35,502,568 UART: [kat] --
35,504,978 UART: [update-reset] ++
38,931,385 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,935,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,317,648 >>> mbox cmd response: success
39,318,072 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,319,641 UART: [update-reset] Copying MAN_2 To MAN_1
39,341,968 UART: [update-reset Success] --
39,345,875 UART: [state] Locking Datavault
39,350,422 UART: [state] Locking PCR0, PCR1 and PCR31
39,352,072 UART: [state] Locking ICCM
39,354,278 UART: [exit] Launching FMC @ 0x40000130
39,362,674 UART:
39,362,915 UART: Running Caliptra FMC ...
39,364,018 UART:
39,364,202 UART: [state] CFI Enabled
39,408,052 UART: [art] Extend RT PCRs Done
39,409,202 UART: [art] Lock RT PCRs Done
39,410,542 UART: [art] Populate DV Done
39,416,226 UART: [fht] FMC Alias Private Key: 7
39,417,761 UART: [art] Derive CDI
39,418,527 UART: [art] Store in in slot 0x4
39,461,032 UART: [art] Derive Key Pair
39,462,145 UART: [art] Store priv key in slot 0x5
41,888,549 UART: [art] Derive Key Pair - Done
41,901,611 UART: [art] Signing Cert with AUTHO
41,902,916 UART: RITY.KEYID = 7
43,608,531 UART: [art] Erasing AUTHORITY.KEYID = 7
43,610,042 UART: [art] PUB.X = E58C467A735B528F98715003D03296C7561069F63343DED88584542F49636229395ADF56EF29E7DEAA81E701886B98CE
43,617,253 UART: [art] PUB.Y = 6D4A101E5F80C37D180D0776CB758682BFE0581C3CFF4D6B267CBBC39D573F8296F41EA961B9DA739CA3216AF515381E
43,624,505 UART: [art] SIG.R = 499668CD74E4F6CF2641EFA248B5AF4A6385F358239273DB75FE67334BD6AF71A0A060C15341491FCF81FEE0DDA22054
43,631,952 UART: [art] SIG.S = 1DDCD728AB9142B5523C985E0E656DD6C2C7612C8AC10A33BFA20B97FB188B77CB3487981EE1329169E5FA8718B64048
44,611,387 UART: Caliptra RT
44,612,108 UART: [state] CFI Enabled
44,898,117 UART: [rt] RT listening for mailbox commands...
44,930,126 UART: [rt]cmd =0x41545348, len=116
44,932,698 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,891 writing to cptra_bootfsm_go
3,697,563 ready_for_fw is high
3,698,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,086 >>> mbox cmd response: success
18,522,050 UART:
18,522,452 UART: Running Caliptra FMC ...
18,523,599 UART:
18,523,764 UART: [state] CFI Enabled
18,531,585 UART: [fht] FMC Alias Private Key: 7
20,288,438 UART: [art] Extend RT PCRs Done
20,289,654 UART: [art] Lock RT PCRs Done
20,291,233 UART: [art] Populate DV Done
20,296,798 UART: [fht] FMC Alias Private Key: 7
20,298,337 UART: [art] Derive CDI
20,299,157 UART: [art] Store in in slot 0x4
20,341,482 UART: [art] Derive Key Pair
20,342,484 UART: [art] Store priv key in slot 0x5
22,769,226 UART: [art] Derive Key Pair - Done
22,782,058 UART: [art] Signing Cert with AUTHO
22,783,373 UART: RITY.KEYID = 7
24,488,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,434 UART: [art] PUB.X = 59A0216B22DE1419B3CB4CBFE69F4A9ECF41E19655271DDF8B36019B16E88F6279119F35FC323B83E5EE10E2B131069B
24,497,714 UART: [art] PUB.Y = C9EC80C3C5D724C4DCC674D244984F20D13B327CC69887928B99EE7516E1C667173A505524E91EE5E6ADCB53BE749E7F
24,504,956 UART: [art] SIG.R = 0007408BB2200EEF21A26AB3275A3D7F390BDC82448B88DF3E04A4D65919E17B16A0E8FD3424AB327D44B5947EA81A38
24,512,371 UART: [art] SIG.S = B987F9C5823F97B75CCAE19571BF7B592B0EDD6BE4520A0C74CEB80B3698FBE71233CD264EC88C825561A7BCD654C1D0
25,491,224 UART: Caliptra RT
25,491,933 UART: [state] CFI Enabled
25,610,560 UART: [rt] RT listening for mailbox commands...
25,612,944 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,768,393 UART: [rt]cmd =0x41544d4e, len=14344
29,764,407 >>> mbox cmd response data (8 bytes)
29,764,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,795,555 UART: [rt]cmd =0x41545348, len=116
29,797,643 >>> mbox cmd response data (12 bytes)
31,853,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,892,684 >>> mbox cmd response: success
38,893,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,927,000 UART:
38,927,344 UART: Running Caliptra FMC ...
38,928,477 UART:
38,928,638 UART: [state] CFI Enabled
38,972,925 UART: [art] Extend RT PCRs Done
38,974,073 UART: [art] Lock RT PCRs Done
38,975,476 UART: [art] Populate DV Done
38,980,725 UART: [fht] FMC Alias Private Key: 7
38,982,229 UART: [art] Derive CDI
38,983,049 UART: [art] Store in in slot 0x4
39,025,334 UART: [art] Derive Key Pair
39,026,379 UART: [art] Store priv key in slot 0x5
41,453,227 UART: [art] Derive Key Pair - Done
41,466,273 UART: [art] Signing Cert with AUTHO
41,467,587 UART: RITY.KEYID = 7
43,173,222 UART: [art] Erasing AUTHORITY.KEYID = 7
43,174,742 UART: [art] PUB.X = 361180941C2F0E2671F1081B79BCE93B0CE6AE193C2B7B49EBF0089789C44147BC7EB80D64A03C4A15A966CBB1686499
43,182,023 UART: [art] PUB.Y = 7BAA41413751556B5CC4C017871DF261E8E103C97269B0A869187A2C0DFBB622096407B851D2F024E7D8D5D96CBE9381
43,189,238 UART: [art] SIG.R = 440123A3910280F82EA8ED422828F143794B580D2450BD3B11AB2A8207A53114FC997FB962179406E625BE4A64572F57
43,196,557 UART: [art] SIG.S = 32330F96887894BDE12A8D6389F4F0CDDBC4A37803B310F362F5E55B0DC6E83B66FBB5C975BAB30FCC853775711B9528
44,175,862 UART: Caliptra RT
44,176,574 UART: [state] CFI Enabled
44,464,309 UART: [rt] RT listening for mailbox commands...
44,496,324 UART: [rt]cmd =0x41545348, len=116
44,498,646 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,581 writing to cptra_bootfsm_go
192,650 UART:
193,015 UART: Running Caliptra ROM ...
194,227 UART:
194,379 UART: [state] CFI Enabled
261,295 UART: [state] LifecycleState = Unprovisioned
263,720 UART: [state] DebugLocked = No
264,901 UART: [state] WD Timer not started. Device not locked for debugging
268,507 UART: [kat] SHA2-256
458,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,194 UART: [kat] ++
469,676 UART: [kat] sha1
481,184 UART: [kat] SHA2-256
484,187 UART: [kat] SHA2-384
490,741 UART: [kat] SHA2-512-ACC
493,327 UART: [kat] ECC-384
2,946,123 UART: [kat] HMAC-384Kdf
2,970,028 UART: [kat] LMS
3,501,798 UART: [kat] --
3,507,513 UART: [cold-reset] ++
3,508,978 UART: [fht] FHT @ 0x50003400
3,521,329 UART: [idev] ++
3,521,966 UART: [idev] CDI.KEYID = 6
3,522,992 UART: [idev] SUBJECT.KEYID = 7
3,524,160 UART: [idev] UDS.KEYID = 0
3,525,091 ready_for_fw is high
3,525,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,948 UART: [idev] Erasing UDS.KEYID = 0
6,027,700 UART: [idev] Sha1 KeyId Algorithm
6,049,117 UART: [idev] --
6,054,296 UART: [ldev] ++
6,054,980 UART: [ldev] CDI.KEYID = 6
6,055,910 UART: [ldev] SUBJECT.KEYID = 5
6,057,068 UART: [ldev] AUTHORITY.KEYID = 7
6,058,300 UART: [ldev] FE.KEYID = 1
6,106,247 UART: [ldev] Erasing FE.KEYID = 1
8,614,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,724 UART: [ldev] --
10,420,899 UART: [fwproc] Wait for Commands...
10,422,393 UART: [fwproc] Recv command 0x46574c44
10,424,377 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,336 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,597,774 >>> mbox cmd response: success
14,601,180 UART: [afmc] ++
14,601,894 UART: [afmc] CDI.KEYID = 6
14,603,014 UART: [afmc] SUBJECT.KEYID = 7
14,604,565 UART: [afmc] AUTHORITY.KEYID = 5
17,135,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,858,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,860,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,875,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,890,726 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,905,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,930,149 UART: [afmc] --
18,934,114 UART: [cold-reset] --
18,939,277 UART: [state] Locking Datavault
18,944,589 UART: [state] Locking PCR0, PCR1 and PCR31
18,946,742 UART: [state] Locking ICCM
18,949,715 UART: [exit] Launching FMC @ 0x40000130
18,958,370 UART:
18,958,609 UART: Running Caliptra FMC ...
18,959,709 UART:
18,959,865 UART: [state] CFI Enabled
19,015,435 UART: [fht] FMC Alias Private Key: 7
20,780,401 UART: [art] Extend RT PCRs Done
20,781,617 UART: [art] Lock RT PCRs Done
20,783,596 UART: [art] Populate DV Done
20,789,122 UART: [fht] FMC Alias Private Key: 7
20,790,757 UART: [art] Derive CDI
20,791,512 UART: [art] Store in in slot 0x4
20,848,607 UART: [art] Derive Key Pair
20,849,602 UART: [art] Store priv key in slot 0x5
23,312,167 UART: [art] Derive Key Pair - Done
23,324,835 UART: [art] Signing Cert with AUTHO
23,326,139 UART: RITY.KEYID = 7
25,038,114 UART: [art] Erasing AUTHORITY.KEYID = 7
25,040,314 UART: [art] PUB.X = F793A9696DC6A823C41C71425C35DBD670D739F64192AB085F52F36011A0662C626C39EDBB7AFF1D386AA8C365D94421
25,046,875 UART: [art] PUB.Y = 8B2996E720C1311B49CA77249D28EB6551CA8A704AAB7E6AB32F15540CD735366EB716E7FF01CD22BB43B9DA76A8B99A
25,054,138 UART: [art] SIG.R = FE18C3F053FCB124F4A57DE77C5299C5292934F4483217FF22314357C0E354AED9A9CB75FF6E851C3E6894C827E25A2A
25,061,550 UART: [art] SIG.S = A0BD5314C9B005397904B5201302F0510778A9E39279AF01360FAE4AC0E477F28494B2B5B0FE6BD8D12259A5E5113382
26,040,317 UART: Caliptra RT
26,041,621 UART: [state] CFI Enabled
26,219,873 UART: [rt] RT listening for mailbox commands...
26,223,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,378,705 UART: [rt]cmd =0x41544d4e, len=14344
30,374,244 >>> mbox cmd response data (8 bytes)
30,375,470 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,406,313 UART: [rt]cmd =0x41545348, len=116
30,408,513 >>> mbox cmd response data (12 bytes)
32,463,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,608,454 UART:
32,608,828 UART: Running Caliptra ROM ...
32,609,911 UART:
32,610,068 UART: [state] CFI Enabled
32,665,958 UART: [state] LifecycleState = Unprovisioned
32,668,069 UART: [state] DebugLocked = No
32,670,433 UART: [state] WD Timer not started. Device not locked for debugging
32,675,164 UART: [kat] SHA2-256
32,865,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,875,790 UART: [kat] ++
32,876,279 UART: [kat] sha1
32,888,088 UART: [kat] SHA2-256
32,891,068 UART: [kat] SHA2-384
32,897,602 UART: [kat] SHA2-512-ACC
32,900,231 UART: [kat] ECC-384
35,350,739 UART: [kat] HMAC-384Kdf
35,372,884 UART: [kat] LMS
35,904,444 UART: [kat] --
35,906,937 UART: [update-reset] ++
39,358,931 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,361,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,967,753 >>> mbox cmd response: success
39,972,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,973,094 UART: [update-reset] Copying MAN_2 To MAN_1
40,006,489 UART: [update-reset Success] --
40,009,429 UART: [state] Locking Datavault
40,012,880 UART: [state] Locking PCR0, PCR1 and PCR31
40,015,057 UART: [state] Locking ICCM
40,017,294 UART: [exit] Launching FMC @ 0x40000130
40,025,940 UART:
40,026,175 UART: Running Caliptra FMC ...
40,027,278 UART:
40,027,433 UART: [state] CFI Enabled
40,120,154 UART: [art] Extend RT PCRs Done
40,121,348 UART: [art] Lock RT PCRs Done
40,122,858 UART: [art] Populate DV Done
40,128,257 UART: [fht] FMC Alias Private Key: 7
40,129,947 UART: [art] Derive CDI
40,130,760 UART: [art] Store in in slot 0x4
40,189,476 UART: [art] Derive Key Pair
40,190,589 UART: [art] Store priv key in slot 0x5
42,653,600 UART: [art] Derive Key Pair - Done
42,666,443 UART: [art] Signing Cert with AUTHO
42,667,745 UART: RITY.KEYID = 7
44,379,194 UART: [art] Erasing AUTHORITY.KEYID = 7
44,380,691 UART: [art] PUB.X = 8A98D9DBB9BD26B497691DEDA6BF5FCDFB193069686B5CFBBED4E5F3646357EF3834DE0074EDEF5B8A55082CA844DAE6
44,388,067 UART: [art] PUB.Y = B41A3BC7CDCB8BDCEAC33D50C20247AF5E7B31618C2C4E877016C7689CA5E7FED2392FB0FF7BC6065395E6AE7F5E7138
44,395,284 UART: [art] SIG.R = E17947C108F58D8A7B0F3CD8649A3D90B00E305C243CB042FA1F317861821FF2DA394EAC0729350886B3F28DFDACAC83
44,402,720 UART: [art] SIG.S = 28507DCDD292D6050BAF8BD5AAC2D8A59AC84C5577C7A2ECDF7E93399A8BECFA38DCFC7A171CE56E7FB4E7A458EED0CD
45,381,889 UART: Caliptra RT
45,382,583 UART: [state] CFI Enabled
45,716,820 UART: [rt] RT listening for mailbox commands...
45,748,643 UART: [rt]cmd =0x41545348, len=116
45,750,926 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,416,549 ready_for_fw is high
3,417,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,715,972 >>> mbox cmd response: success
19,013,085 UART:
19,013,467 UART: Running Caliptra FMC ...
19,014,658 UART:
19,014,830 UART: [state] CFI Enabled
19,080,649 UART: [fht] FMC Alias Private Key: 7
20,844,346 UART: [art] Extend RT PCRs Done
20,845,553 UART: [art] Lock RT PCRs Done
20,847,089 UART: [art] Populate DV Done
20,852,771 UART: [fht] FMC Alias Private Key: 7
20,854,414 UART: [art] Derive CDI
20,855,224 UART: [art] Store in in slot 0x4
20,912,857 UART: [art] Derive Key Pair
20,913,854 UART: [art] Store priv key in slot 0x5
23,377,040 UART: [art] Derive Key Pair - Done
23,389,985 UART: [art] Signing Cert with AUTHO
23,391,288 UART: RITY.KEYID = 7
25,103,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,104,836 UART: [art] PUB.X = 3A008B92BD469E4F96AE55F4EA06D54973CA740D37725915D3A0A6EDDB4BA0260E94BC44EB8AC99E947E73FDC6477E3B
25,112,092 UART: [art] PUB.Y = 83C6600B93D3B1809185F194DE589A837D58097DE5E03274036440818934CCBB01735D0692FFAC41E50119E9EB088D8D
25,119,332 UART: [art] SIG.R = 0AC922EEDF546800937FBEA10473D75D85D2939B48B4BC115198AD4DDF4A9278F7A92010F30382965B608F71EE0C5C50
25,126,711 UART: [art] SIG.S = 40DC027EA1A1E3974B63F42519D9E136C5D85429880E1F20C0FDF030BBA20FA60B61D487FDB019B73078DBC4C21D010E
26,105,562 UART: Caliptra RT
26,106,273 UART: [state] CFI Enabled
26,270,872 UART: [rt] RT listening for mailbox commands...
26,273,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,428,879 UART: [rt]cmd =0x41544d4e, len=14344
30,424,478 >>> mbox cmd response data (8 bytes)
30,425,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,455,896 UART: [rt]cmd =0x41545348, len=116
30,458,187 >>> mbox cmd response data (12 bytes)
32,512,238 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,319,333 >>> mbox cmd response: success
40,319,900 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,354,921 UART:
40,355,219 UART: Running Caliptra FMC ...
40,356,339 UART:
40,356,492 UART: [state] CFI Enabled
40,445,830 UART: [art] Extend RT PCRs Done
40,447,022 UART: [art] Lock RT PCRs Done
40,448,216 UART: [art] Populate DV Done
40,453,617 UART: [fht] FMC Alias Private Key: 7
40,455,321 UART: [art] Derive CDI
40,456,134 UART: [art] Store in in slot 0x4
40,515,250 UART: [art] Derive Key Pair
40,516,241 UART: [art] Store priv key in slot 0x5
42,978,934 UART: [art] Derive Key Pair - Done
42,992,046 UART: [art] Signing Cert with AUTHO
42,993,354 UART: RITY.KEYID = 7
44,704,520 UART: [art] Erasing AUTHORITY.KEYID = 7
44,706,040 UART: [art] PUB.X = B7616A551C2F25D58657598BA5D314C90AC17C3339CF5A3CBF4520C1188D2AA780608125F33FFB0264FD98AF40B8867C
44,713,266 UART: [art] PUB.Y = 1511B62F9A5E2E3F52758EEEE5257338F4EC4112BC4081942917427ED341290F1812F6C6907C263C8783393F62DF82F9
44,720,481 UART: [art] SIG.R = 51809F785E48A50F1DC2DF3DB6F5C4B871445D9C1C572D6C7284AA85B9AF6E073740F6A6AB2FA13FF466CF8470DE6185
44,727,875 UART: [art] SIG.S = CC08DF6B2635A0772D5F5A962125DEC406CEC138AAC3404152A315D0CA01E1345567A25F8205DF19E4EED0D2E573499B
45,706,881 UART: Caliptra RT
45,707,590 UART: [state] CFI Enabled
46,042,032 UART: [rt] RT listening for mailbox commands...
46,073,956 UART: [rt]cmd =0x41545348, len=116
46,076,585 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
192,863 UART:
193,228 UART: Running Caliptra ROM ...
194,388 UART:
603,917 UART: [state] CFI Enabled
618,327 UART: [state] LifecycleState = Unprovisioned
620,722 UART: [state] DebugLocked = No
622,831 UART: [state] WD Timer not started. Device not locked for debugging
627,570 UART: [kat] SHA2-256
817,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,197 UART: [kat] ++
828,804 UART: [kat] sha1
838,550 UART: [kat] SHA2-256
841,558 UART: [kat] SHA2-384
846,770 UART: [kat] SHA2-512-ACC
849,304 UART: [kat] ECC-384
3,292,247 UART: [kat] HMAC-384Kdf
3,304,979 UART: [kat] LMS
3,836,785 UART: [kat] --
3,841,793 UART: [cold-reset] ++
3,844,159 UART: [fht] FHT @ 0x50003400
3,854,873 UART: [idev] ++
3,855,594 UART: [idev] CDI.KEYID = 6
3,856,632 UART: [idev] SUBJECT.KEYID = 7
3,857,740 UART: [idev] UDS.KEYID = 0
3,858,664 ready_for_fw is high
3,858,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,179 UART: [idev] Erasing UDS.KEYID = 0
6,338,468 UART: [idev] Sha1 KeyId Algorithm
6,360,340 UART: [idev] --
6,364,924 UART: [ldev] ++
6,365,608 UART: [ldev] CDI.KEYID = 6
6,366,520 UART: [ldev] SUBJECT.KEYID = 5
6,367,732 UART: [ldev] AUTHORITY.KEYID = 7
6,369,120 UART: [ldev] FE.KEYID = 1
6,381,509 UART: [ldev] Erasing FE.KEYID = 1
8,860,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,583 UART: [ldev] --
10,650,710 UART: [fwproc] Wait for Commands...
10,652,855 UART: [fwproc] Recv command 0x46574c44
10,655,108 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,367 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,830,673 >>> mbox cmd response: success
14,834,020 UART: [afmc] ++
14,834,739 UART: [afmc] CDI.KEYID = 6
14,835,933 UART: [afmc] SUBJECT.KEYID = 7
14,837,374 UART: [afmc] AUTHORITY.KEYID = 5
17,339,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,262 UART: [afmc] --
19,136,861 UART: [cold-reset] --
19,140,300 UART: [state] Locking Datavault
19,146,270 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,442 UART: [state] Locking ICCM
19,149,936 UART: [exit] Launching FMC @ 0x40000130
19,158,578 UART:
19,158,819 UART: Running Caliptra FMC ...
19,159,930 UART:
19,160,091 UART: [state] CFI Enabled
19,168,553 UART: [fht] FMC Alias Private Key: 7
20,925,403 UART: [art] Extend RT PCRs Done
20,926,626 UART: [art] Lock RT PCRs Done
20,928,562 UART: [art] Populate DV Done
20,934,079 UART: [fht] FMC Alias Private Key: 7
20,935,742 UART: [art] Derive CDI
20,936,564 UART: [art] Store in in slot 0x4
20,979,160 UART: [art] Derive Key Pair
20,980,155 UART: [art] Store priv key in slot 0x5
23,407,613 UART: [art] Derive Key Pair - Done
23,420,295 UART: [art] Signing Cert with AUTHO
23,421,608 UART: RITY.KEYID = 7
25,127,274 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,770 UART: [art] PUB.X = C19A455391F653CF21604B0036401E85B9CAD38BFAEE0D4CDA767B8D895E9FF813AB7D831C46D91FBCE15488D2936593
25,136,040 UART: [art] PUB.Y = 4B7F92B8E1AA31429111C23011D65040ECD3AF51FAF1B54A0966056162E4DAB418A4726AA8349B80DE756B0CC315B12E
25,143,301 UART: [art] SIG.R = D7DD8E8CB5F805450F4ACEFB7DCB6C196641FC43C2AA950D54DFEE478B0017AD0DC0AD813E7A847853F8E895C98D9B1E
25,150,745 UART: [art] SIG.S = CF74CED3D57F5AD93981FDD5255F2324D7BC298237FEE6EC5263A92E1E01AA7A5B72216EDC89562CE08031B7C4894302
26,129,935 UART: Caliptra RT
26,130,637 UART: [state] CFI Enabled
26,248,023 UART: [rt] RT listening for mailbox commands...
26,250,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,405,637 UART: [rt]cmd =0x41544d4e, len=14344
30,401,715 >>> mbox cmd response data (8 bytes)
30,402,312 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,432,986 UART: [rt]cmd =0x41545348, len=116
30,435,249 >>> mbox cmd response data (12 bytes)
32,492,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,637,027 UART:
32,637,416 UART: Running Caliptra ROM ...
32,638,469 UART:
32,638,679 UART: [state] CFI Enabled
32,651,985 UART: [state] LifecycleState = Unprovisioned
32,653,892 UART: [state] DebugLocked = No
32,655,411 UART: [state] WD Timer not started. Device not locked for debugging
32,659,904 UART: [kat] SHA2-256
32,849,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,860,554 UART: [kat] ++
32,861,159 UART: [kat] sha1
32,873,619 UART: [kat] SHA2-256
32,876,646 UART: [kat] SHA2-384
32,883,128 UART: [kat] SHA2-512-ACC
32,885,709 UART: [kat] ECC-384
35,325,281 UART: [kat] HMAC-384Kdf
35,338,860 UART: [kat] LMS
35,870,489 UART: [kat] --
35,876,275 UART: [update-reset] ++
39,335,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,339,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,945,492 >>> mbox cmd response: success
39,950,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,950,807 UART: [update-reset] Copying MAN_2 To MAN_1
39,983,411 UART: [update-reset Success] --
39,988,456 UART: [state] Locking Datavault
39,991,678 UART: [state] Locking PCR0, PCR1 and PCR31
39,993,832 UART: [state] Locking ICCM
39,995,361 UART: [exit] Launching FMC @ 0x40000130
40,003,994 UART:
40,004,239 UART: Running Caliptra FMC ...
40,005,351 UART:
40,005,517 UART: [state] CFI Enabled
40,048,924 UART: [art] Extend RT PCRs Done
40,050,117 UART: [art] Lock RT PCRs Done
40,051,798 UART: [art] Populate DV Done
40,057,314 UART: [fht] FMC Alias Private Key: 7
40,058,906 UART: [art] Derive CDI
40,059,723 UART: [art] Store in in slot 0x4
40,102,482 UART: [art] Derive Key Pair
40,103,553 UART: [art] Store priv key in slot 0x5
42,530,760 UART: [art] Derive Key Pair - Done
42,543,657 UART: [art] Signing Cert with AUTHO
42,544,968 UART: RITY.KEYID = 7
44,250,252 UART: [art] Erasing AUTHORITY.KEYID = 7
44,251,765 UART: [art] PUB.X = DBAAC9FF37D8DE814C4A6D6E8DA19289A5EEF171CDA89BA8620201ADCDEEFF83CEE963087F4B7FF75E4E4BD8B2A16DC5
44,259,048 UART: [art] PUB.Y = D6E8D166822DFA1AB5142BA12C8040297D23FFA412A403FF0957A7988F41BD85185FA7E882A5AA190A70F355631FE9D7
44,266,314 UART: [art] SIG.R = 0362088CADE22CC43BE12354F798E96EA38B7D6931391AF895E0867ED853AE4AB2807BF718FE6BB42153EB039E6E5F2F
44,273,687 UART: [art] SIG.S = 7B8580FC33F9BC34A27B86EA61402BA1442D6711DA280C0306CDFB25BFDF2BFFA354348975BC5BF7C8983B3104C1DE37
45,252,949 UART: Caliptra RT
45,253,638 UART: [state] CFI Enabled
45,542,515 UART: [rt] RT listening for mailbox commands...
45,574,545 UART: [rt]cmd =0x41545348, len=116
45,576,925 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
3,756,100 ready_for_fw is high
3,756,738 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,367 >>> mbox cmd response: success
19,204,228 UART:
19,204,658 UART: Running Caliptra FMC ...
19,205,799 UART:
19,205,987 UART: [state] CFI Enabled
19,213,840 UART: [fht] FMC Alias Private Key: 7
20,971,546 UART: [art] Extend RT PCRs Done
20,972,785 UART: [art] Lock RT PCRs Done
20,974,442 UART: [art] Populate DV Done
20,979,854 UART: [fht] FMC Alias Private Key: 7
20,981,461 UART: [art] Derive CDI
20,982,285 UART: [art] Store in in slot 0x4
21,024,519 UART: [art] Derive Key Pair
21,025,569 UART: [art] Store priv key in slot 0x5
23,452,047 UART: [art] Derive Key Pair - Done
23,464,881 UART: [art] Signing Cert with AUTHO
23,466,180 UART: RITY.KEYID = 7
25,171,282 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,786 UART: [art] PUB.X = 4E495FB0A89D8F9032866035069AA583A831DF209395B8A6AEF36D170ADA496D9DF3D8EDB86F0FEC455344D5A928D784
25,180,031 UART: [art] PUB.Y = 7F1013D2A1DB375306A0357B1D40D33957CA91E17AEC293CA21C21A2BFC4828452E6809D214BF690B3F8A7CD505BC9E3
25,187,303 UART: [art] SIG.R = B6AEB891CAA8D579CAEC3686B8362148A2028123FA5E4FF17D5AFF9219D8A8B27F5EC1F8167154CC61517BDD8AA91487
25,194,703 UART: [art] SIG.S = 44CA04D2AEEA62F92B2DAE0BA319EF72FA237F468D0CEFDEC890ACBA06F298C7104292A811DE1BE2AAF3A89EEB9E4946
26,173,193 UART: Caliptra RT
26,173,908 UART: [state] CFI Enabled
26,291,325 UART: [rt] RT listening for mailbox commands...
26,293,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,448,934 UART: [rt]cmd =0x41544d4e, len=14344
30,444,537 >>> mbox cmd response data (8 bytes)
30,445,112 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,475,887 UART: [rt]cmd =0x41545348, len=116
30,478,038 >>> mbox cmd response data (12 bytes)
32,539,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,271,553 >>> mbox cmd response: success
40,272,098 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,306,134 UART:
40,306,426 UART: Running Caliptra FMC ...
40,307,553 UART:
40,307,716 UART: [state] CFI Enabled
40,351,629 UART: [art] Extend RT PCRs Done
40,352,825 UART: [art] Lock RT PCRs Done
40,354,078 UART: [art] Populate DV Done
40,359,450 UART: [fht] FMC Alias Private Key: 7
40,360,988 UART: [art] Derive CDI
40,361,807 UART: [art] Store in in slot 0x4
40,404,459 UART: [art] Derive Key Pair
40,405,459 UART: [art] Store priv key in slot 0x5
42,832,743 UART: [art] Derive Key Pair - Done
42,845,855 UART: [art] Signing Cert with AUTHO
42,847,165 UART: RITY.KEYID = 7
44,553,236 UART: [art] Erasing AUTHORITY.KEYID = 7
44,554,740 UART: [art] PUB.X = B66DAD61D00D4910B8BEC6D8B88674D17B04BFC1CEA2A42DBE897D554E1D3AABF4912168F6C0D301301E0D497C82C389
44,561,978 UART: [art] PUB.Y = ECA362482C3A4F69E8C175396CA46AF36E14AF37F8C8CF03752155C88B33E2C94DD53D6CC00D558630C30ECC2779A8EB
44,569,249 UART: [art] SIG.R = 28E45CBB4E48800F2C563E6BBA8950366F8BFE3F643FFAC06A71715A2B585465B2E2C361BBCE660E282588FD230EF6D2
44,576,631 UART: [art] SIG.S = B2F8D7797BCC25CD61B798893F80360511FA49E744ABDF25ADB03822C4416D771C649C96D14353B5FB2C009520E8B28E
45,555,514 UART: Caliptra RT
45,556,202 UART: [state] CFI Enabled
45,843,954 UART: [rt] RT listening for mailbox commands...
45,875,742 UART: [rt]cmd =0x41545348, len=116
45,878,126 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,341 UART: [kat] SHA2-256
882,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,387 UART: [kat] ++
886,539 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,511 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 ready_for_fw is high
1,480,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,394 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,926 UART: [idev] --
1,514,771 UART: [ldev] ++
1,514,939 UART: [ldev] CDI.KEYID = 6
1,515,302 UART: [ldev] SUBJECT.KEYID = 5
1,515,728 UART: [ldev] AUTHORITY.KEYID = 7
1,516,191 UART: [ldev] FE.KEYID = 1
1,521,141 UART: [ldev] Erasing FE.KEYID = 1
1,546,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,804 UART: [ldev] --
1,585,143 UART: [fwproc] Waiting for Commands...
1,585,772 UART: [fwproc] Received command 0x46574c44
1,586,563 UART: [fwproc] Received Image of size 114084 bytes
2,882,527 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,341 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,110 >>> mbox cmd response: success
3,075,362 UART: [afmc] ++
3,075,530 UART: [afmc] CDI.KEYID = 6
3,075,892 UART: [afmc] SUBJECT.KEYID = 7
3,076,317 UART: [afmc] AUTHORITY.KEYID = 5
3,111,708 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,852 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,465 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,155 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,246 UART: [afmc] --
3,155,372 UART: [cold-reset] --
3,155,986 UART: [state] Locking Datavault
3,157,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,827 UART: [state] Locking ICCM
3,158,487 UART: [exit] Launching FMC @ 0x40000130
3,163,816 UART:
3,163,832 UART: Running Caliptra FMC ...
3,164,240 UART:
3,164,294 UART: [state] CFI Enabled
3,174,625 UART: [fht] FMC Alias Private Key: 7
3,282,646 UART: [art] Extend RT PCRs Done
3,283,074 UART: [art] Lock RT PCRs Done
3,284,820 UART: [art] Populate DV Done
3,292,855 UART: [fht] FMC Alias Private Key: 7
3,293,929 UART: [art] Derive CDI
3,294,209 UART: [art] Store in in slot 0x4
3,379,952 UART: [art] Derive Key Pair
3,380,312 UART: [art] Store priv key in slot 0x5
3,393,292 UART: [art] Derive Key Pair - Done
3,408,139 UART: [art] Signing Cert with AUTHO
3,408,619 UART: RITY.KEYID = 7
3,423,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,728 UART: [art] PUB.X = 49A2F5816B74EB2ED5F6975B6A6C17BBD44DCFE8D556BFA4722DA28B4965D3C3FA8E3180FBAEB22A6F7053C86E5C61EF
3,431,520 UART: [art] PUB.Y = 833F67DE5031098F6C7D27A9EA5457AF86A28A18DC6E543748FD964D35533C69FEE7B20DEDF537C08616F3A554030435
3,438,458 UART: [art] SIG.R = E46FA0BBE8A07C61B96DD2867C66B875F218C9D6117E1E0637B2CD43E62F6FA8029DE0045A92E71732C3B03116BD25C2
3,445,225 UART: [art] SIG.S = 80CBECFEE47B817E2CBB5B7EBAB952683A4EB65F8336956872216E95C045DE5F697220622341B067A1C39ED5F9C57BFA
3,469,262 UART: Caliptra RT
3,469,515 UART: [state] CFI Enabled
3,577,909 UART: [rt] RT listening for mailbox commands...
3,578,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,491 UART: [rt]cmd =0x41544d4e, len=14344
4,011,201 >>> mbox cmd response data (8 bytes)
4,011,202 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,107 UART: [rt]cmd =0x41545348, len=116
4,042,844 >>> mbox cmd response data (12 bytes)
4,042,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,687 UART:
4,043,703 UART: Running Caliptra ROM ...
4,044,111 UART:
4,044,165 UART: [state] CFI Enabled
4,047,103 UART: [state] LifecycleState = Unprovisioned
4,047,758 UART: [state] DebugLocked = No
4,048,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,049,963 UART: [kat] SHA2-256
4,843,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,848,009 UART: [kat] ++
4,848,161 UART: [kat] sha1
4,852,391 UART: [kat] SHA2-256
4,854,329 UART: [kat] SHA2-384
4,857,138 UART: [kat] SHA2-512-ACC
4,859,038 UART: [kat] ECC-384
4,864,669 UART: [kat] HMAC-384Kdf
4,869,345 UART: [kat] LMS
5,437,541 UART: [kat] --
5,438,544 UART: [update-reset] ++
6,769,834 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,770,874 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,920,378 >>> mbox cmd response: success
6,920,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,920,509 UART: [update-reset] Copying MAN_2 To MAN_1
6,928,523 UART: [update-reset Success] --
6,929,576 UART: [state] Locking Datavault
6,930,476 UART: [state] Locking PCR0, PCR1 and PCR31
6,931,080 UART: [state] Locking ICCM
6,931,538 UART: [exit] Launching FMC @ 0x40000130
6,936,867 UART:
6,936,883 UART: Running Caliptra FMC ...
6,937,291 UART:
6,937,345 UART: [state] CFI Enabled
7,026,106 UART: [art] Extend RT PCRs Done
7,026,534 UART: [art] Lock RT PCRs Done
7,027,923 UART: [art] Populate DV Done
7,036,080 UART: [fht] FMC Alias Private Key: 7
7,037,068 UART: [art] Derive CDI
7,037,348 UART: [art] Store in in slot 0x4
7,123,107 UART: [art] Derive Key Pair
7,123,467 UART: [art] Store priv key in slot 0x5
7,135,975 UART: [art] Derive Key Pair - Done
7,150,362 UART: [art] Signing Cert with AUTHO
7,150,842 UART: RITY.KEYID = 7
7,165,860 UART: [art] Erasing AUTHORITY.KEYID = 7
7,166,625 UART: [art] PUB.X = EC926270D39A8758D4A35880E5B35654D56B05F8DBEA4CC73BBF0A872B9A7FA529CC6C1316A257CDEFBCC6D42E3D48DC
7,173,409 UART: [art] PUB.Y = 598439D75CFE3950DAF350F2273DF4103A99FBC24646F3E8E3BB6382563F9DDF69A2163620CAE60D00E455F634DD3D72
7,180,338 UART: [art] SIG.R = 76918E7D81545565FCD02D8F8351B1E3B8E9A941AA8F1152F127551C7A99C8D982FEE10CC332E4CD3DC1C74EFB2DD278
7,187,115 UART: [art] SIG.S = A61FF37385F9C786B212107820687E5F0608E45C336366B414B011261A7CC6D6EEDCC74563AA2CB111121E17F2AA5218
7,210,964 UART: Caliptra RT
7,211,217 UART: [state] CFI Enabled
7,493,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,523,935 UART: [rt]cmd =0x41545348, len=116
7,525,728 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 ready_for_fw is high
1,362,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,922 >>> mbox cmd response: success
2,987,034 UART:
2,987,050 UART: Running Caliptra FMC ...
2,987,458 UART:
2,987,512 UART: [state] CFI Enabled
2,998,063 UART: [fht] FMC Alias Private Key: 7
3,105,176 UART: [art] Extend RT PCRs Done
3,105,604 UART: [art] Lock RT PCRs Done
3,106,994 UART: [art] Populate DV Done
3,115,189 UART: [fht] FMC Alias Private Key: 7
3,116,235 UART: [art] Derive CDI
3,116,515 UART: [art] Store in in slot 0x4
3,202,068 UART: [art] Derive Key Pair
3,202,428 UART: [art] Store priv key in slot 0x5
3,215,286 UART: [art] Derive Key Pair - Done
3,229,759 UART: [art] Signing Cert with AUTHO
3,230,239 UART: RITY.KEYID = 7
3,245,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,004 UART: [art] PUB.X = 735703E86884CB9C99525B507CDD476DC4F2E4A32179244C9EECE653358E1CD45D2D3987A2D0702EEEF5CE571843128D
3,252,773 UART: [art] PUB.Y = 6649D0B2D892E719791324A0DE39C5FE2944D2CE755AAF27AB6D963A5E1EA9FE964AFD435A1444A2857B11BF4A90211A
3,259,731 UART: [art] SIG.R = 2BE54B74A9B3C60F2073658CCB6ED7D8F84F1A42DCE45DB0C16F767363183ABBB30045AC7F92A8FD2FA2F54FFDCFB81D
3,266,500 UART: [art] SIG.S = E0A31C7E4C3BC178A416938A7DEBBE9833F2EE0E77A1A339E7FA0A1B9D03A46302079D5AB7BB1DCC56B5260392F6B3A8
3,289,759 UART: Caliptra RT
3,290,012 UART: [state] CFI Enabled
3,398,053 UART: [rt] RT listening for mailbox commands...
3,398,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,927 UART: [rt]cmd =0x41544d4e, len=14344
3,831,669 >>> mbox cmd response data (8 bytes)
3,831,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,761 UART: [rt]cmd =0x41545348, len=116
3,863,388 >>> mbox cmd response data (12 bytes)
3,863,389 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,621,128 >>> mbox cmd response: success
6,621,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,634,777 UART:
6,634,793 UART: Running Caliptra FMC ...
6,635,201 UART:
6,635,255 UART: [state] CFI Enabled
6,724,004 UART: [art] Extend RT PCRs Done
6,724,432 UART: [art] Lock RT PCRs Done
6,726,003 UART: [art] Populate DV Done
6,734,454 UART: [fht] FMC Alias Private Key: 7
6,735,398 UART: [art] Derive CDI
6,735,678 UART: [art] Store in in slot 0x4
6,821,059 UART: [art] Derive Key Pair
6,821,419 UART: [art] Store priv key in slot 0x5
6,834,767 UART: [art] Derive Key Pair - Done
6,849,736 UART: [art] Signing Cert with AUTHO
6,850,216 UART: RITY.KEYID = 7
6,865,638 UART: [art] Erasing AUTHORITY.KEYID = 7
6,866,403 UART: [art] PUB.X = 752B0C1E8F998B83219AE32152112C18EEE7188E8F48686DA839E0ADC2A40D46658CF0B121ED8BE8603F85C1E2BEA5DA
6,873,177 UART: [art] PUB.Y = 81D1FA2861B7E441212894ECF914C85A8DAC467E5B46E7D4F943F62022DA9B000A99F683123F82F86690255DC7244D4F
6,880,100 UART: [art] SIG.R = 414266F1479CAC54E6E4212C716B421A1121AD8881FA2BAF6CE1A0CA4AD9C626B29C0DF442E6CD913F311A61D144A729
6,886,875 UART: [art] SIG.S = 67E4DD8008A73438C427824F752BC180BC7BCC7118B23B4DB0CEDDF150F7E6AAAF67CEFB36A021FD2A4CDAE298DBC2DA
6,910,737 UART: Caliptra RT
6,910,990 UART: [state] CFI Enabled
7,197,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,228,043 UART: [rt]cmd =0x41545348, len=116
7,229,632 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,299 UART: [kat] SHA2-512-ACC
897,200 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,075 UART: [idev] ++
1,480,243 UART: [idev] CDI.KEYID = 6
1,480,603 UART: [idev] SUBJECT.KEYID = 7
1,481,027 UART: [idev] UDS.KEYID = 0
1,481,372 ready_for_fw is high
1,481,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,181 UART: [idev] Erasing UDS.KEYID = 0
1,506,089 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,911 UART: [idev] --
1,515,818 UART: [ldev] ++
1,515,986 UART: [ldev] CDI.KEYID = 6
1,516,349 UART: [ldev] SUBJECT.KEYID = 5
1,516,775 UART: [ldev] AUTHORITY.KEYID = 7
1,517,238 UART: [ldev] FE.KEYID = 1
1,522,760 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,183 UART: [ldev] --
1,587,504 UART: [fwproc] Waiting for Commands...
1,588,301 UART: [fwproc] Received command 0x46574c44
1,589,092 UART: [fwproc] Received Image of size 114084 bytes
2,884,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,987 >>> mbox cmd response: success
3,078,201 UART: [afmc] ++
3,078,369 UART: [afmc] CDI.KEYID = 6
3,078,731 UART: [afmc] SUBJECT.KEYID = 7
3,079,156 UART: [afmc] AUTHORITY.KEYID = 5
3,114,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,271 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,664 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,354 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,391 UART: [afmc] --
3,157,419 UART: [cold-reset] --
3,158,421 UART: [state] Locking Datavault
3,159,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,096 UART: [state] Locking ICCM
3,160,576 UART: [exit] Launching FMC @ 0x40000130
3,165,905 UART:
3,165,921 UART: Running Caliptra FMC ...
3,166,329 UART:
3,166,472 UART: [state] CFI Enabled
3,177,049 UART: [fht] FMC Alias Private Key: 7
3,285,136 UART: [art] Extend RT PCRs Done
3,285,564 UART: [art] Lock RT PCRs Done
3,287,226 UART: [art] Populate DV Done
3,295,515 UART: [fht] FMC Alias Private Key: 7
3,296,623 UART: [art] Derive CDI
3,296,903 UART: [art] Store in in slot 0x4
3,382,902 UART: [art] Derive Key Pair
3,383,262 UART: [art] Store priv key in slot 0x5
3,396,648 UART: [art] Derive Key Pair - Done
3,411,245 UART: [art] Signing Cert with AUTHO
3,411,725 UART: RITY.KEYID = 7
3,427,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,774 UART: [art] PUB.X = 4945CC3DD1FEFFC0A095FEAA69F4406E7ABAB95D341ECE1E7C1322844D07F0ACBD3A7F5636AA6ECDBC11999B60885515
3,434,563 UART: [art] PUB.Y = 9D8830E3B66F6DA0EFE2F33BCE1D9EC63380E3358E34D58994250D1044C96511E12563662D3260B9DD0F705B48E1E404
3,441,502 UART: [art] SIG.R = 23CD5ABC51DB35AD12BC1E2908C0BF0B5DA563CD47FAE52319FDA4320AC8A91171D5D7B0FCF498164E0C87FA6C0468B3
3,448,277 UART: [art] SIG.S = 7A4746BD58779E76584D9379CAFEF30FEDE942B9D8E7B9D3DDFDB00A3460C5CA1966D343D3A468035FE541CEB65B639F
3,471,985 UART: Caliptra RT
3,472,330 UART: [state] CFI Enabled
3,581,012 UART: [rt] RT listening for mailbox commands...
3,581,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,636 UART: [rt]cmd =0x41544d4e, len=14344
4,014,284 >>> mbox cmd response data (8 bytes)
4,014,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,520 UART: [rt]cmd =0x41545348, len=116
4,046,187 >>> mbox cmd response data (12 bytes)
4,046,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,996 UART:
4,047,012 UART: Running Caliptra ROM ...
4,047,420 UART:
4,047,561 UART: [state] CFI Enabled
4,050,543 UART: [state] LifecycleState = Unprovisioned
4,051,198 UART: [state] DebugLocked = No
4,051,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,053,519 UART: [kat] SHA2-256
4,847,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,851,565 UART: [kat] ++
4,851,717 UART: [kat] sha1
4,855,889 UART: [kat] SHA2-256
4,857,827 UART: [kat] SHA2-384
4,860,650 UART: [kat] SHA2-512-ACC
4,862,550 UART: [kat] ECC-384
4,868,111 UART: [kat] HMAC-384Kdf
4,872,581 UART: [kat] LMS
5,440,777 UART: [kat] --
5,441,340 UART: [update-reset] ++
6,772,156 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,773,344 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,922,848 >>> mbox cmd response: success
6,922,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,923,069 UART: [update-reset] Copying MAN_2 To MAN_1
6,931,083 UART: [update-reset Success] --
6,932,290 UART: [state] Locking Datavault
6,933,152 UART: [state] Locking PCR0, PCR1 and PCR31
6,933,756 UART: [state] Locking ICCM
6,934,408 UART: [exit] Launching FMC @ 0x40000130
6,939,737 UART:
6,939,753 UART: Running Caliptra FMC ...
6,940,161 UART:
6,940,304 UART: [state] CFI Enabled
7,029,267 UART: [art] Extend RT PCRs Done
7,029,695 UART: [art] Lock RT PCRs Done
7,031,030 UART: [art] Populate DV Done
7,039,207 UART: [fht] FMC Alias Private Key: 7
7,040,215 UART: [art] Derive CDI
7,040,495 UART: [art] Store in in slot 0x4
7,126,138 UART: [art] Derive Key Pair
7,126,498 UART: [art] Store priv key in slot 0x5
7,139,274 UART: [art] Derive Key Pair - Done
7,154,266 UART: [art] Signing Cert with AUTHO
7,154,746 UART: RITY.KEYID = 7
7,170,052 UART: [art] Erasing AUTHORITY.KEYID = 7
7,170,817 UART: [art] PUB.X = ACE1EE7CF39024161025F812114462E467011DE5B391E2B0CBAE3E564EE39F363C64AFB75184A601403DDF11EFE52510
7,177,585 UART: [art] PUB.Y = F22B08ADB7E93A55DBF114B5DDFB6DC7808C0A686F5D7A118B82595CEB817519882C7A682FC28EF521EAF1C4F54F943B
7,184,545 UART: [art] SIG.R = CD8558E43A850F8668BDA8C38F2C616E663BFD01A9FE1676A320221D53954BC35A9BD97FC8DACAA347EA152C3965130B
7,191,316 UART: [art] SIG.S = 1495A0E322D6397821DFFB799327B6AD56C3C4EC5AEDBD3D12F5AA2CCEEECF872D43CC2D0AB684D511FDCBD66DA9D265
7,214,852 UART: Caliptra RT
7,215,197 UART: [state] CFI Enabled
7,495,492 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,526,363 UART: [rt]cmd =0x41545348, len=116
7,528,320 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,318 ready_for_fw is high
1,362,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,605 >>> mbox cmd response: success
2,985,663 UART:
2,985,679 UART: Running Caliptra FMC ...
2,986,087 UART:
2,986,230 UART: [state] CFI Enabled
2,997,077 UART: [fht] FMC Alias Private Key: 7
3,105,592 UART: [art] Extend RT PCRs Done
3,106,020 UART: [art] Lock RT PCRs Done
3,107,436 UART: [art] Populate DV Done
3,115,739 UART: [fht] FMC Alias Private Key: 7
3,116,873 UART: [art] Derive CDI
3,117,153 UART: [art] Store in in slot 0x4
3,202,966 UART: [art] Derive Key Pair
3,203,326 UART: [art] Store priv key in slot 0x5
3,216,266 UART: [art] Derive Key Pair - Done
3,231,285 UART: [art] Signing Cert with AUTHO
3,231,765 UART: RITY.KEYID = 7
3,247,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,946 UART: [art] PUB.X = 043199AB6F270AF8E944D5FCC940A9E21D502E142223E05D75B056F9FBEA5CE3A1488B062262DCCE1A28894B8AEFB2D8
3,254,719 UART: [art] PUB.Y = FFC161495B94711650A01C0F0FEA09DADDF3C38CB235DDE04C6DE69C9595C2C814C773694B011BAB0C21A5E6F2C6E7C6
3,261,670 UART: [art] SIG.R = 2143F1BA66C0E428C8D218D9E8BD85F2C3EB45CA58858C3B3AAE38B67BCA193EE11DA2F8E18329E92D22C0AB3ED24912
3,268,456 UART: [art] SIG.S = EB469A0FBF44738760AE7675EA1E9A2408808410B90E7EB524A46E0F0CB424FBEF36B60A91D43093A4AB22F90A23D87B
3,292,534 UART: Caliptra RT
3,292,879 UART: [state] CFI Enabled
3,401,360 UART: [rt] RT listening for mailbox commands...
3,402,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,284 UART: [rt]cmd =0x41544d4e, len=14344
3,835,940 >>> mbox cmd response data (8 bytes)
3,835,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,094 UART: [rt]cmd =0x41545348, len=116
3,867,715 >>> mbox cmd response data (12 bytes)
3,867,716 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,625,806 >>> mbox cmd response: success
6,625,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,638,971 UART:
6,638,987 UART: Running Caliptra FMC ...
6,639,395 UART:
6,639,538 UART: [state] CFI Enabled
6,728,751 UART: [art] Extend RT PCRs Done
6,729,179 UART: [art] Lock RT PCRs Done
6,730,450 UART: [art] Populate DV Done
6,738,813 UART: [fht] FMC Alias Private Key: 7
6,739,751 UART: [art] Derive CDI
6,740,031 UART: [art] Store in in slot 0x4
6,825,794 UART: [art] Derive Key Pair
6,826,154 UART: [art] Store priv key in slot 0x5
6,839,714 UART: [art] Derive Key Pair - Done
6,854,622 UART: [art] Signing Cert with AUTHO
6,855,102 UART: RITY.KEYID = 7
6,870,308 UART: [art] Erasing AUTHORITY.KEYID = 7
6,871,073 UART: [art] PUB.X = CBC8B32CC3389EFA9E3319B12F8DE4201E1B900300B6CC582ABB0C90BD9649A4C07B0B1937D282B4F36EEDBF0AA9EFB4
6,877,831 UART: [art] PUB.Y = 72334D598C404402003562B6D279D0F5C58D5DC59E20C39E8A4A25960FA3A8B9FC4DDB24E4B3559A1B112F80A6538DBA
6,884,757 UART: [art] SIG.R = 4168D5F50852EDB840559307FFB95C00E6D5654FCE7E354AF203B3971FE82A04A5D1BBC88F63EE9971F266B9BC6BAEDD
6,891,507 UART: [art] SIG.S = 471382CF5F30F90F67F2233A19E4279B8A1F407B5369277ECDFF8BD76AF125E7C39E5A8FCF2879BEB5293737F98F3AA4
6,915,247 UART: Caliptra RT
6,915,592 UART: [state] CFI Enabled
7,194,056 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,224,801 UART: [rt]cmd =0x41545348, len=116
7,226,348 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,967 UART: [cold-reset] ++
1,172,421 UART: [fht] FHT @ 0x50003400
1,175,214 UART: [idev] ++
1,175,382 UART: [idev] CDI.KEYID = 6
1,175,742 UART: [idev] SUBJECT.KEYID = 7
1,176,166 UART: [idev] UDS.KEYID = 0
1,176,511 ready_for_fw is high
1,176,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,102 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,217,059 UART: [ldev] Erasing FE.KEYID = 1
1,243,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,283,012 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,337 >>> mbox cmd response: success
2,773,377 UART: [afmc] ++
2,773,545 UART: [afmc] CDI.KEYID = 6
2,773,907 UART: [afmc] SUBJECT.KEYID = 7
2,774,332 UART: [afmc] AUTHORITY.KEYID = 5
2,809,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,348 UART: [afmc] --
2,852,412 UART: [cold-reset] --
2,853,364 UART: [state] Locking Datavault
2,854,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,115 UART: [state] Locking ICCM
2,855,673 UART: [exit] Launching FMC @ 0x40000130
2,861,002 UART:
2,861,018 UART: Running Caliptra FMC ...
2,861,426 UART:
2,861,480 UART: [state] CFI Enabled
2,872,149 UART: [fht] FMC Alias Private Key: 7
2,980,026 UART: [art] Extend RT PCRs Done
2,980,454 UART: [art] Lock RT PCRs Done
2,981,966 UART: [art] Populate DV Done
2,990,211 UART: [fht] FMC Alias Private Key: 7
2,991,187 UART: [art] Derive CDI
2,991,467 UART: [art] Store in in slot 0x4
3,076,998 UART: [art] Derive Key Pair
3,077,358 UART: [art] Store priv key in slot 0x5
3,091,024 UART: [art] Derive Key Pair - Done
3,106,051 UART: [art] Signing Cert with AUTHO
3,106,531 UART: RITY.KEYID = 7
3,121,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,174 UART: [art] PUB.X = 791F462CA3EA98D2F3CA029D7DC2D88B02F0FC04525B26465840EAB854D3F7F08DA4BEB8700F791C0D4533C32213F977
3,128,935 UART: [art] PUB.Y = 412063714B71F0ACEE8B00FE80A4E62FCF84AFCAC6B481411FBBA6E7E625EF7C03A11901E7D81CF14B4EE96996C0BA9F
3,135,877 UART: [art] SIG.R = 6FC0B71706334508A07D8C65E8C5A4D8891ABE1DDC857AED98C4E2FBC5EB6ECBE7251D05BFE8686E1252E157C0257E2D
3,142,654 UART: [art] SIG.S = B23D82FE43AD1AE4CA2AC700973F648221716C147CE081601861002B5BBD2CC1623EB83F335DDB4B4D8715D4085BB270
3,166,540 UART: Caliptra RT
3,166,793 UART: [state] CFI Enabled
3,274,560 UART: [rt] RT listening for mailbox commands...
3,275,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,226 UART: [rt]cmd =0x41544d4e, len=14344
3,707,928 >>> mbox cmd response data (8 bytes)
3,707,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,792 UART: [rt]cmd =0x41545348, len=116
3,739,867 >>> mbox cmd response data (12 bytes)
3,739,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,629 UART:
3,740,645 UART: Running Caliptra ROM ...
3,741,053 UART:
3,741,108 UART: [state] CFI Enabled
3,743,742 UART: [state] LifecycleState = Unprovisioned
3,744,397 UART: [state] DebugLocked = No
3,744,997 UART: [state] WD Timer not started. Device not locked for debugging
3,746,241 UART: [kat] SHA2-256
4,551,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,556,016 UART: [kat] ++
4,556,168 UART: [kat] sha1
4,560,548 UART: [kat] SHA2-256
4,562,488 UART: [kat] SHA2-384
4,565,169 UART: [kat] SHA2-512-ACC
4,567,069 UART: [kat] ECC-384
4,576,522 UART: [kat] HMAC-384Kdf
4,581,350 UART: [kat] LMS
4,829,678 UART: [kat] --
4,830,620 UART: [update-reset] ++
6,139,568 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,140,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,290,089 >>> mbox cmd response: success
6,290,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,290,312 UART: [update-reset] Copying MAN_2 To MAN_1
6,298,326 UART: [update-reset Success] --
6,299,345 UART: [state] Locking Datavault
6,300,115 UART: [state] Locking PCR0, PCR1 and PCR31
6,300,719 UART: [state] Locking ICCM
6,301,367 UART: [exit] Launching FMC @ 0x40000130
6,306,696 UART:
6,306,712 UART: Running Caliptra FMC ...
6,307,120 UART:
6,307,174 UART: [state] CFI Enabled
6,396,483 UART: [art] Extend RT PCRs Done
6,396,911 UART: [art] Lock RT PCRs Done
6,398,290 UART: [art] Populate DV Done
6,406,815 UART: [fht] FMC Alias Private Key: 7
6,407,827 UART: [art] Derive CDI
6,408,107 UART: [art] Store in in slot 0x4
6,493,658 UART: [art] Derive Key Pair
6,494,018 UART: [art] Store priv key in slot 0x5
6,507,420 UART: [art] Derive Key Pair - Done
6,522,010 UART: [art] Signing Cert with AUTHO
6,522,490 UART: RITY.KEYID = 7
6,537,218 UART: [art] Erasing AUTHORITY.KEYID = 7
6,537,983 UART: [art] PUB.X = EF9E110AC27A5E9765BD06A78D461E1E2A068FD5BE3D45F370269193CDDB337FB3BA69954031854F1172DA4DB695F2C1
6,544,752 UART: [art] PUB.Y = 074B62007F6A158B96DD5D5B6A8B716F13BC1622A338A76E3D6C3CB64BA5B446D249ADF7DAD17985B751965DCC849D96
6,551,685 UART: [art] SIG.R = 7496BE531F3CEFE07CF7CD54225489303B619CF8B3FB765B56C5C37D8DF1ADB7E0E422741327DE89E4CEEF3F9482AB4F
6,558,471 UART: [art] SIG.S = BAD8AF72B93F74ED159836A188BEF5D2FB7225CBCC4FE385C584A7BD05C13CE2D7F0744C5D49382D46E2FC6D90A19650
6,582,205 UART: Caliptra RT
6,582,458 UART: [state] CFI Enabled
6,865,221 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,896,166 UART: [rt]cmd =0x41545348, len=116
6,897,937 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,251 ready_for_fw is high
1,060,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,594 >>> mbox cmd response: success
2,683,978 UART:
2,683,994 UART: Running Caliptra FMC ...
2,684,402 UART:
2,684,456 UART: [state] CFI Enabled
2,694,727 UART: [fht] FMC Alias Private Key: 7
2,803,534 UART: [art] Extend RT PCRs Done
2,803,962 UART: [art] Lock RT PCRs Done
2,805,032 UART: [art] Populate DV Done
2,813,519 UART: [fht] FMC Alias Private Key: 7
2,814,655 UART: [art] Derive CDI
2,814,935 UART: [art] Store in in slot 0x4
2,900,254 UART: [art] Derive Key Pair
2,900,614 UART: [art] Store priv key in slot 0x5
2,913,860 UART: [art] Derive Key Pair - Done
2,928,586 UART: [art] Signing Cert with AUTHO
2,929,066 UART: RITY.KEYID = 7
2,944,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,039 UART: [art] PUB.X = CD7F5962E286025A0D2E4B78020223EE31C897FF9A111741879C396A3F13610405B5ADF54DCBAF78E537F83DFD2D86C8
2,951,795 UART: [art] PUB.Y = E3D3AD3F1A2A97C5E66CA0AD33161D5A2195DC44166159694EB49060E27343137D69EA8464C15D2FE81548A261C7FC69
2,958,745 UART: [art] SIG.R = 3BB856EDBF7AAA3D34327CC875CEB168ECA753EF7A29671092C32929D76666F0D4C14E41E7202EFFBE151D0BC2B94DD1
2,965,528 UART: [art] SIG.S = CB910D9700C72D7A2FADAFA39DD99BEBCA729B00DFA1B85383B909262115CB6FEFF4E27D48E6A39702E81170C36F9627
2,989,048 UART: Caliptra RT
2,989,301 UART: [state] CFI Enabled
3,097,782 UART: [rt] RT listening for mailbox commands...
3,098,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,330 UART: [rt]cmd =0x41544d4e, len=14344
3,531,006 >>> mbox cmd response data (8 bytes)
3,531,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,922 UART: [rt]cmd =0x41545348, len=116
3,562,643 >>> mbox cmd response data (12 bytes)
3,562,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,154 >>> mbox cmd response: success
5,997,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,010,376 UART:
6,010,392 UART: Running Caliptra FMC ...
6,010,800 UART:
6,010,854 UART: [state] CFI Enabled
6,099,631 UART: [art] Extend RT PCRs Done
6,100,059 UART: [art] Lock RT PCRs Done
6,101,050 UART: [art] Populate DV Done
6,109,307 UART: [fht] FMC Alias Private Key: 7
6,110,241 UART: [art] Derive CDI
6,110,521 UART: [art] Store in in slot 0x4
6,196,170 UART: [art] Derive Key Pair
6,196,530 UART: [art] Store priv key in slot 0x5
6,210,126 UART: [art] Derive Key Pair - Done
6,224,891 UART: [art] Signing Cert with AUTHO
6,225,371 UART: RITY.KEYID = 7
6,240,389 UART: [art] Erasing AUTHORITY.KEYID = 7
6,241,154 UART: [art] PUB.X = 75B841054D2935A82AF2475C336EE67FC32F5C305AE5E16AC9F69EC3E42F85A8E8A5A6624752738C116FD4A9D407FA26
6,247,922 UART: [art] PUB.Y = F6C9CAA1D1440C995DF423380C893C7C6EE078270BE3AA326F60DC5DF7C69DBAD2A41CF101C5B78F39FFBBD6666C59F5
6,254,880 UART: [art] SIG.R = 50811C8B401D9731B5DC3C904226A2ABA1E808DA5F441AF6645EA16BD9C36AE8AEB1A607AD8CD1A1EAC625833CD0818A
6,261,660 UART: [art] SIG.S = D668D152F3C1B2E03E50D6F4892C18693BE09974DDA05BE92F82C816EEB7357DDE2462D6952A31AB9EF7A442D8AC0213
6,285,644 UART: Caliptra RT
6,285,897 UART: [state] CFI Enabled
6,573,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,604,433 UART: [rt]cmd =0x41545348, len=116
6,606,088 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,836 UART: [kat] SHA2-256
903,776 UART: [kat] SHA2-384
906,429 UART: [kat] SHA2-512-ACC
908,330 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,368 UART: [fht] FHT @ 0x50003400
1,175,001 UART: [idev] ++
1,175,169 UART: [idev] CDI.KEYID = 6
1,175,529 UART: [idev] SUBJECT.KEYID = 7
1,175,953 UART: [idev] UDS.KEYID = 0
1,176,298 ready_for_fw is high
1,176,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,093 UART: [idev] Erasing UDS.KEYID = 0
1,201,430 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,344 UART: [ldev] Erasing FE.KEYID = 1
1,243,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,926 UART: [ldev] --
1,283,405 UART: [fwproc] Wait for Commands...
1,284,077 UART: [fwproc] Recv command 0x46574c44
1,284,805 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,238 >>> mbox cmd response: success
2,772,408 UART: [afmc] ++
2,772,576 UART: [afmc] CDI.KEYID = 6
2,772,938 UART: [afmc] SUBJECT.KEYID = 7
2,773,363 UART: [afmc] AUTHORITY.KEYID = 5
2,808,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,806 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,417 UART: [afmc] --
2,852,479 UART: [cold-reset] --
2,853,409 UART: [state] Locking Datavault
2,854,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,040 UART: [state] Locking ICCM
2,855,558 UART: [exit] Launching FMC @ 0x40000130
2,860,887 UART:
2,860,903 UART: Running Caliptra FMC ...
2,861,311 UART:
2,861,454 UART: [state] CFI Enabled
2,872,031 UART: [fht] FMC Alias Private Key: 7
2,979,992 UART: [art] Extend RT PCRs Done
2,980,420 UART: [art] Lock RT PCRs Done
2,981,714 UART: [art] Populate DV Done
2,990,149 UART: [fht] FMC Alias Private Key: 7
2,991,261 UART: [art] Derive CDI
2,991,541 UART: [art] Store in in slot 0x4
3,077,560 UART: [art] Derive Key Pair
3,077,920 UART: [art] Store priv key in slot 0x5
3,091,058 UART: [art] Derive Key Pair - Done
3,105,804 UART: [art] Signing Cert with AUTHO
3,106,284 UART: RITY.KEYID = 7
3,121,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,895 UART: [art] PUB.X = 26DE751FB44583BEDEE8EDCCD1CE49D6221957CD4B31E23CC5FBF2BD484D312C8060D36D8439FF76F902009ECC9372F5
3,128,656 UART: [art] PUB.Y = 9D9B6DA994FC04211738B3AC8D9DF9F4B06036FC56FACD997765340A8C6C651334EE2F96134F49F5969FAC3F01ABEEEA
3,135,611 UART: [art] SIG.R = 3983B7A7BE5442F1D730F0892BD8C349CD318D91F1830BB8DCD06DE4E58C0A831BD9789C267A6F489C159166D38D94E1
3,142,379 UART: [art] SIG.S = 715A7BEB48A4D60C30936F473DD6BAEEF970CA028025F14881D1F0FD8267DAECA127E5E7517E460D1195F986F47C4E6A
3,165,235 UART: Caliptra RT
3,165,580 UART: [state] CFI Enabled
3,273,419 UART: [rt] RT listening for mailbox commands...
3,274,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,151 UART: [rt]cmd =0x41544d4e, len=14344
3,706,891 >>> mbox cmd response data (8 bytes)
3,706,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,823 UART: [rt]cmd =0x41545348, len=116
3,738,576 >>> mbox cmd response data (12 bytes)
3,738,577 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,384 UART:
3,739,400 UART: Running Caliptra ROM ...
3,739,808 UART:
3,739,950 UART: [state] CFI Enabled
3,742,858 UART: [state] LifecycleState = Unprovisioned
3,743,513 UART: [state] DebugLocked = No
3,744,031 UART: [state] WD Timer not started. Device not locked for debugging
3,745,205 UART: [kat] SHA2-256
4,550,855 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,554,980 UART: [kat] ++
4,555,132 UART: [kat] sha1
4,559,288 UART: [kat] SHA2-256
4,561,228 UART: [kat] SHA2-384
4,564,099 UART: [kat] SHA2-512-ACC
4,565,999 UART: [kat] ECC-384
4,576,084 UART: [kat] HMAC-384Kdf
4,580,512 UART: [kat] LMS
4,828,840 UART: [kat] --
4,829,408 UART: [update-reset] ++
6,138,828 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,140,019 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,289,471 >>> mbox cmd response: success
6,289,471 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,289,814 UART: [update-reset] Copying MAN_2 To MAN_1
6,297,828 UART: [update-reset Success] --
6,298,923 UART: [state] Locking Datavault
6,299,525 UART: [state] Locking PCR0, PCR1 and PCR31
6,300,129 UART: [state] Locking ICCM
6,300,739 UART: [exit] Launching FMC @ 0x40000130
6,306,068 UART:
6,306,084 UART: Running Caliptra FMC ...
6,306,492 UART:
6,306,635 UART: [state] CFI Enabled
6,395,892 UART: [art] Extend RT PCRs Done
6,396,320 UART: [art] Lock RT PCRs Done
6,397,867 UART: [art] Populate DV Done
6,406,268 UART: [fht] FMC Alias Private Key: 7
6,407,270 UART: [art] Derive CDI
6,407,550 UART: [art] Store in in slot 0x4
6,493,493 UART: [art] Derive Key Pair
6,493,853 UART: [art] Store priv key in slot 0x5
6,507,439 UART: [art] Derive Key Pair - Done
6,521,884 UART: [art] Signing Cert with AUTHO
6,522,364 UART: RITY.KEYID = 7
6,537,392 UART: [art] Erasing AUTHORITY.KEYID = 7
6,538,157 UART: [art] PUB.X = 5710C13A4B8862B4C092F79725CC62E53FBEB76A5085C148BD69095676AAA30E237FC81AB1A8164C9763C262F9BC04DF
6,544,922 UART: [art] PUB.Y = F7A04E08D989E75C8A49E07A00EC16BDDCD7D8F7DB797306E0AB9EA3AB6F546EB63977EC817978D62A6EE64814864DD4
6,551,858 UART: [art] SIG.R = DA086FCF65766BA344B0B3BC4720DE3F768F9B6DE2726B908DA8BA95BED20612E2664866CE9F9C8A3419AADFE9965D15
6,558,636 UART: [art] SIG.S = 9D1247D774CD16D5F15AB055BF2595E4E7235F71D8D64606A8AFF003048AFAB25E129F62401AC45723B8DB6FF7A04D35
6,582,456 UART: Caliptra RT
6,582,801 UART: [state] CFI Enabled
6,868,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,899,218 UART: [rt]cmd =0x41545348, len=116
6,901,291 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 ready_for_fw is high
1,060,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,626,473 >>> mbox cmd response: success
2,689,329 UART:
2,689,345 UART: Running Caliptra FMC ...
2,689,753 UART:
2,689,896 UART: [state] CFI Enabled
2,700,539 UART: [fht] FMC Alias Private Key: 7
2,808,346 UART: [art] Extend RT PCRs Done
2,808,774 UART: [art] Lock RT PCRs Done
2,810,330 UART: [art] Populate DV Done
2,818,197 UART: [fht] FMC Alias Private Key: 7
2,819,321 UART: [art] Derive CDI
2,819,601 UART: [art] Store in in slot 0x4
2,905,372 UART: [art] Derive Key Pair
2,905,732 UART: [art] Store priv key in slot 0x5
2,919,392 UART: [art] Derive Key Pair - Done
2,934,405 UART: [art] Signing Cert with AUTHO
2,934,885 UART: RITY.KEYID = 7
2,950,297 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,062 UART: [art] PUB.X = 1A012B0DBD499A7488CE3290F45B255360A18BFBE42CAA8CC6D9E840A9EFCB55010993E8AC9605A94A027CF119C0F2B5
2,957,826 UART: [art] PUB.Y = 0AE0F4A68720EDC1ACB31869838FDD38F0749488774273151824CC718C86ACDBFCBCF541462AF9C6B2BF3B8A77DD5BC2
2,964,787 UART: [art] SIG.R = D857E074F11147B7D11BD6C938543F362EF95097229A61F909B279FB6B008D4AEBC7932090C0C04ED31F00DD9EA5CF4B
2,971,516 UART: [art] SIG.S = B263555891F0282CE445967C383E9FD89DB6B091C2FD71F544E01A491AC82640BF02C849EC2F12941839340889018FFD
2,994,924 UART: Caliptra RT
2,995,269 UART: [state] CFI Enabled
3,104,097 UART: [rt] RT listening for mailbox commands...
3,104,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,603 UART: [rt]cmd =0x41544d4e, len=14344
3,537,465 >>> mbox cmd response data (8 bytes)
3,537,466 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,743 UART: [rt]cmd =0x41545348, len=116
3,569,734 >>> mbox cmd response data (12 bytes)
3,569,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,040 >>> mbox cmd response: success
6,004,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,017,454 UART:
6,017,470 UART: Running Caliptra FMC ...
6,017,878 UART:
6,018,021 UART: [state] CFI Enabled
6,107,222 UART: [art] Extend RT PCRs Done
6,107,650 UART: [art] Lock RT PCRs Done
6,108,797 UART: [art] Populate DV Done
6,117,224 UART: [fht] FMC Alias Private Key: 7
6,118,360 UART: [art] Derive CDI
6,118,640 UART: [art] Store in in slot 0x4
6,204,493 UART: [art] Derive Key Pair
6,204,853 UART: [art] Store priv key in slot 0x5
6,217,819 UART: [art] Derive Key Pair - Done
6,232,943 UART: [art] Signing Cert with AUTHO
6,233,423 UART: RITY.KEYID = 7
6,248,795 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,560 UART: [art] PUB.X = 381F111ED3A0AB164E38CDE075E329459B5AF3E7648664644772B212B98A994BB937C3DEE6AE7AFDFCDF482AD619167A
6,256,340 UART: [art] PUB.Y = 2BF6C366B6DEED484EE2A6E6AE9D7313310A529E22F70EA2E0CBEA4FA1D528703FF25E5869DFF5A625AA6153AC5AD635
6,263,304 UART: [art] SIG.R = 355E322C9C1BA6A548ECB58480030F65FDCEC533D4E19DDDF965CE51953EBEFEB65E0DA6BADBC87FE1611ACD5E1DC126
6,270,093 UART: [art] SIG.S = 5A1899ED4B89D57F1A26C007BFD3CF885C35270FDF4D89F7646605EFCAC7B8DD85F2B3F3336F57CC965E1C0A93D12F5A
6,293,300 UART: Caliptra RT
6,293,645 UART: [state] CFI Enabled
6,579,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,203 UART: [rt]cmd =0x41545348, len=116
6,612,258 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,610 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = No
85,773 UART: [state] WD Timer not started. Device not locked for debugging
87,068 UART: [kat] SHA2-256
890,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,747 UART: [kat] ++
894,899 UART: [kat] sha1
899,223 UART: [kat] SHA2-256
901,163 UART: [kat] SHA2-384
903,790 UART: [kat] SHA2-512-ACC
905,691 UART: [kat] ECC-384
915,724 UART: [kat] HMAC-384Kdf
920,252 UART: [kat] LMS
1,168,564 UART: [kat] --
1,169,089 UART: [cold-reset] ++
1,169,459 UART: [fht] FHT @ 0x50003400
1,172,095 UART: [idev] ++
1,172,263 UART: [idev] CDI.KEYID = 6
1,172,624 UART: [idev] SUBJECT.KEYID = 7
1,173,049 UART: [idev] UDS.KEYID = 0
1,173,395 ready_for_fw is high
1,173,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,247 UART: [idev] Erasing UDS.KEYID = 0
1,198,173 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,920 UART: [ldev] --
1,280,258 UART: [fwproc] Wait for Commands...
1,280,879 UART: [fwproc] Recv command 0x46574c44
1,281,612 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,351 >>> mbox cmd response: success
2,768,614 UART: [afmc] ++
2,768,782 UART: [afmc] CDI.KEYID = 6
2,769,145 UART: [afmc] SUBJECT.KEYID = 7
2,769,571 UART: [afmc] AUTHORITY.KEYID = 5
2,805,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,789 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,508 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,261 UART: [afmc] --
2,848,237 UART: [cold-reset] --
2,848,839 UART: [state] Locking Datavault
2,850,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,710 UART: [state] Locking ICCM
2,851,252 UART: [exit] Launching FMC @ 0x40000130
2,856,581 UART:
2,856,597 UART: Running Caliptra FMC ...
2,857,005 UART:
2,857,059 UART: [state] CFI Enabled
2,867,402 UART: [fht] FMC Alias Private Key: 7
2,975,365 UART: [art] Extend RT PCRs Done
2,975,793 UART: [art] Lock RT PCRs Done
2,977,097 UART: [art] Populate DV Done
2,985,086 UART: [fht] FMC Alias Private Key: 7
2,986,234 UART: [art] Derive CDI
2,986,514 UART: [art] Store in in slot 0x4
3,072,403 UART: [art] Derive Key Pair
3,072,763 UART: [art] Store priv key in slot 0x5
3,085,929 UART: [art] Derive Key Pair - Done
3,100,809 UART: [art] Signing Cert with AUTHO
3,101,289 UART: RITY.KEYID = 7
3,116,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,956 UART: [art] PUB.X = 934364BC73C8303B1E2BD05833F290CBB5258658F8081753CBA26C59A2DCECFED0AAB9F61ED5BE548FC69E0DE06A1920
3,123,734 UART: [art] PUB.Y = D6A821501AD9620138540EE362FC5CE56FA5C279C5E08551F67A1917B2C6EA861E897A17B1F396824677C54BD5322194
3,130,672 UART: [art] SIG.R = 50E301BD00ACEB35FA966C37542F520782DC20B6E2CB7B5CC810512CC5662DC9445088F6D7ECC8FB123531A27322C618
3,137,418 UART: [art] SIG.S = BBCDA2950191018D2518A1B59CCFAB55B376F87017DAD17EEA8FAD0476E638AC4BE148A0A2E03F4C3F86BBF67E82C01A
3,161,092 UART: Caliptra RT
3,161,345 UART: [state] CFI Enabled
3,268,844 UART: [rt] RT listening for mailbox commands...
3,269,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,704 UART: [rt]cmd =0x41544d4e, len=14344
3,701,698 >>> mbox cmd response data (8 bytes)
3,701,699 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,731,654 UART: [rt]cmd =0x41545348, len=116
3,733,467 >>> mbox cmd response data (12 bytes)
3,733,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,307 UART:
3,734,323 UART: Running Caliptra ROM ...
3,734,731 UART:
3,734,786 UART: [state] CFI Enabled
3,737,480 UART: [state] LifecycleState = Unprovisioned
3,738,135 UART: [state] DebugLocked = No
3,738,707 UART: [state] WD Timer not started. Device not locked for debugging
3,739,861 UART: [kat] SHA2-256
4,543,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,547,540 UART: [kat] ++
4,547,692 UART: [kat] sha1
4,551,764 UART: [kat] SHA2-256
4,553,704 UART: [kat] SHA2-384
4,556,383 UART: [kat] SHA2-512-ACC
4,558,283 UART: [kat] ECC-384
4,568,138 UART: [kat] HMAC-384Kdf
4,572,698 UART: [kat] LMS
4,821,010 UART: [kat] --
4,822,074 UART: [update-reset] ++
6,131,679 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,132,862 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,282,314 >>> mbox cmd response: success
6,282,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,282,609 UART: [update-reset] Copying MAN_2 To MAN_1
6,290,623 UART: [update-reset Success] --
6,291,632 UART: [state] Locking Datavault
6,292,554 UART: [state] Locking PCR0, PCR1 and PCR31
6,293,158 UART: [state] Locking ICCM
6,293,634 UART: [exit] Launching FMC @ 0x40000130
6,298,963 UART:
6,298,979 UART: Running Caliptra FMC ...
6,299,387 UART:
6,299,441 UART: [state] CFI Enabled
6,388,586 UART: [art] Extend RT PCRs Done
6,389,014 UART: [art] Lock RT PCRs Done
6,390,313 UART: [art] Populate DV Done
6,398,698 UART: [fht] FMC Alias Private Key: 7
6,399,718 UART: [art] Derive CDI
6,399,998 UART: [art] Store in in slot 0x4
6,485,371 UART: [art] Derive Key Pair
6,485,731 UART: [art] Store priv key in slot 0x5
6,498,539 UART: [art] Derive Key Pair - Done
6,513,006 UART: [art] Signing Cert with AUTHO
6,513,486 UART: RITY.KEYID = 7
6,528,774 UART: [art] Erasing AUTHORITY.KEYID = 7
6,529,539 UART: [art] PUB.X = 92123C2589881AFD9D008D77307C34A1F82E38972B63B0B005408E69403BAEBD4A061CA1762EC2E3A2C8DEF11BE294EC
6,536,287 UART: [art] PUB.Y = 86A27E5C4E339E297F467D16B427F0DECB992AC17CFCED19DF61F8A820C6F715D90EF5DCFF9797CA528217D8B0A8B72D
6,543,252 UART: [art] SIG.R = 4B527EDC64A5F8553F4BE7D38D4746CB47206DE2287C6C5199C42ABF139E37988E0ACAF48A2E2B6612C2635D51265597
6,550,021 UART: [art] SIG.S = A40C55B6DBEB1F189C667E9DA13BC8B819EC09AFEF41FAC9C87CF45D7813B27FBFC7B75ADF29D7019F244C9CAFF19EE8
6,573,465 UART: Caliptra RT
6,573,718 UART: [state] CFI Enabled
6,853,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,884,360 UART: [rt]cmd =0x41545348, len=116
6,886,033 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,924 ready_for_fw is high
1,056,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,307 >>> mbox cmd response: success
2,680,509 UART:
2,680,525 UART: Running Caliptra FMC ...
2,680,933 UART:
2,680,987 UART: [state] CFI Enabled
2,691,418 UART: [fht] FMC Alias Private Key: 7
2,799,647 UART: [art] Extend RT PCRs Done
2,800,075 UART: [art] Lock RT PCRs Done
2,801,893 UART: [art] Populate DV Done
2,810,260 UART: [fht] FMC Alias Private Key: 7
2,811,432 UART: [art] Derive CDI
2,811,712 UART: [art] Store in in slot 0x4
2,896,909 UART: [art] Derive Key Pair
2,897,269 UART: [art] Store priv key in slot 0x5
2,909,975 UART: [art] Derive Key Pair - Done
2,924,535 UART: [art] Signing Cert with AUTHO
2,925,015 UART: RITY.KEYID = 7
2,940,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,802 UART: [art] PUB.X = 3765C8D350A4E5CF279625F6CAFA7D7DFB735CE196B884623771727EE519BBA79678E5D965ECCC045D09F997D924376C
2,947,570 UART: [art] PUB.Y = F087597A334717BC970759A83734E575A4D5733EE35A6C7C47F6CC5DF9E6690601D3464FB1B1BC4582A80C43FBD5F801
2,954,505 UART: [art] SIG.R = 4A5FE82A524EEC4277B79C6F45FB39E77512587A69F2E27F243CD41AD3BAC3C20C3D6FD82040A6A84062D537BA06BB18
2,961,279 UART: [art] SIG.S = 56FBB44C3F0BB36609ED67AE2BBA6CB29F52B24252E9CEEC52729B73175EADDCD653CFF712EC78B2B7237D9C9180E18A
2,985,004 UART: Caliptra RT
2,985,257 UART: [state] CFI Enabled
3,093,356 UART: [rt] RT listening for mailbox commands...
3,094,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,050 UART: [rt]cmd =0x41544d4e, len=14344
3,527,150 >>> mbox cmd response data (8 bytes)
3,527,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,128 UART: [rt]cmd =0x41545348, len=116
3,559,069 >>> mbox cmd response data (12 bytes)
3,559,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,989,869 >>> mbox cmd response: success
5,989,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,003,255 UART:
6,003,271 UART: Running Caliptra FMC ...
6,003,679 UART:
6,003,733 UART: [state] CFI Enabled
6,093,454 UART: [art] Extend RT PCRs Done
6,093,882 UART: [art] Lock RT PCRs Done
6,095,063 UART: [art] Populate DV Done
6,103,540 UART: [fht] FMC Alias Private Key: 7
6,104,550 UART: [art] Derive CDI
6,104,830 UART: [art] Store in in slot 0x4
6,190,255 UART: [art] Derive Key Pair
6,190,615 UART: [art] Store priv key in slot 0x5
6,203,449 UART: [art] Derive Key Pair - Done
6,218,428 UART: [art] Signing Cert with AUTHO
6,218,908 UART: RITY.KEYID = 7
6,234,244 UART: [art] Erasing AUTHORITY.KEYID = 7
6,235,009 UART: [art] PUB.X = 53FDDEFF406697B165E6A24A581F2C1A087EAF93E54A6772F0E9EA95D26224E9F6C89B2FC5362F95E1583DA2409EFE52
6,241,786 UART: [art] PUB.Y = 2E383CC1DAF13DC6F371372CE2FFDB6DD3843C60A30218C0898E4239AEBACD914DF376E5F5A55E901350A80E2BBCB19E
6,248,748 UART: [art] SIG.R = 48B5B675B5F73FDCBDBF5F8E2781625D824B34F8497A9DDA9A2BFEAB1CF213622A4D136E21963E00A44FB0754FF8B20E
6,255,509 UART: [art] SIG.S = 61D2CC850155E342E1138085A89C1A22358B5FAEA72A18ACE71B0BBBD1C7CA535760DE2484856D7BB5DB5B0D9E07109A
6,279,782 UART: Caliptra RT
6,280,035 UART: [state] CFI Enabled
6,560,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,591,051 UART: [rt]cmd =0x41545348, len=116
6,592,920 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,169,654 UART: [cold-reset] ++
1,170,066 UART: [fht] FHT @ 0x50003400
1,172,602 UART: [idev] ++
1,172,770 UART: [idev] CDI.KEYID = 6
1,173,131 UART: [idev] SUBJECT.KEYID = 7
1,173,556 UART: [idev] UDS.KEYID = 0
1,173,902 ready_for_fw is high
1,173,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,550 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,322 >>> mbox cmd response: success
2,770,423 UART: [afmc] ++
2,770,591 UART: [afmc] CDI.KEYID = 6
2,770,954 UART: [afmc] SUBJECT.KEYID = 7
2,771,380 UART: [afmc] AUTHORITY.KEYID = 5
2,807,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,376 UART: [afmc] --
2,850,426 UART: [cold-reset] --
2,851,522 UART: [state] Locking Datavault
2,852,819 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,423 UART: [state] Locking ICCM
2,853,977 UART: [exit] Launching FMC @ 0x40000130
2,859,306 UART:
2,859,322 UART: Running Caliptra FMC ...
2,859,730 UART:
2,859,873 UART: [state] CFI Enabled
2,870,286 UART: [fht] FMC Alias Private Key: 7
2,978,305 UART: [art] Extend RT PCRs Done
2,978,733 UART: [art] Lock RT PCRs Done
2,980,387 UART: [art] Populate DV Done
2,988,390 UART: [fht] FMC Alias Private Key: 7
2,989,456 UART: [art] Derive CDI
2,989,736 UART: [art] Store in in slot 0x4
3,075,379 UART: [art] Derive Key Pair
3,075,739 UART: [art] Store priv key in slot 0x5
3,089,421 UART: [art] Derive Key Pair - Done
3,104,229 UART: [art] Signing Cert with AUTHO
3,104,709 UART: RITY.KEYID = 7
3,120,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,788 UART: [art] PUB.X = 77BF3BFDC33BBB7B19B64CDB6304CCB197F908AFAF843D965BD4AA9D46B0A94BA9746E9BAF404C05A7B887907CF8EC47
3,127,573 UART: [art] PUB.Y = 720AFE9E3905305037C8064CDF5E195EF7A52E2E7592DA82576D77AA8F777DFA7BEFB1BE5EB35CE660EAE6910FE876E2
3,134,527 UART: [art] SIG.R = 080D72FD817DC8E76799E7A91EAFB0BEA34967718ED2F530398CE2B5ED19B2E2E1FF3007A1F283AFFF35857B06809E38
3,141,295 UART: [art] SIG.S = 759797C869B9154923318ECAD97C39CEAFC3EEE6A90CC8439BB4E1DFDFEE5AC1C9F9C291A3B211B9BAA870C0A9729D63
3,164,445 UART: Caliptra RT
3,164,790 UART: [state] CFI Enabled
3,272,341 UART: [rt] RT listening for mailbox commands...
3,273,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,067 UART: [rt]cmd =0x41544d4e, len=14344
3,706,047 >>> mbox cmd response data (8 bytes)
3,706,048 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,059 UART: [rt]cmd =0x41545348, len=116
3,737,614 >>> mbox cmd response data (12 bytes)
3,737,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,388 UART:
3,738,404 UART: Running Caliptra ROM ...
3,738,812 UART:
3,738,954 UART: [state] CFI Enabled
3,741,578 UART: [state] LifecycleState = Unprovisioned
3,742,233 UART: [state] DebugLocked = No
3,742,943 UART: [state] WD Timer not started. Device not locked for debugging
3,744,097 UART: [kat] SHA2-256
4,547,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,551,776 UART: [kat] ++
4,551,928 UART: [kat] sha1
4,556,208 UART: [kat] SHA2-256
4,558,148 UART: [kat] SHA2-384
4,560,725 UART: [kat] SHA2-512-ACC
4,562,625 UART: [kat] ECC-384
4,572,728 UART: [kat] HMAC-384Kdf
4,577,338 UART: [kat] LMS
4,825,650 UART: [kat] --
4,826,456 UART: [update-reset] ++
6,137,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,138,370 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,287,822 >>> mbox cmd response: success
6,287,822 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,288,165 UART: [update-reset] Copying MAN_2 To MAN_1
6,296,179 UART: [update-reset Success] --
6,297,056 UART: [state] Locking Datavault
6,297,954 UART: [state] Locking PCR0, PCR1 and PCR31
6,298,558 UART: [state] Locking ICCM
6,299,178 UART: [exit] Launching FMC @ 0x40000130
6,304,507 UART:
6,304,523 UART: Running Caliptra FMC ...
6,304,931 UART:
6,305,074 UART: [state] CFI Enabled
6,393,915 UART: [art] Extend RT PCRs Done
6,394,343 UART: [art] Lock RT PCRs Done
6,395,982 UART: [art] Populate DV Done
6,404,029 UART: [fht] FMC Alias Private Key: 7
6,405,045 UART: [art] Derive CDI
6,405,325 UART: [art] Store in in slot 0x4
6,491,116 UART: [art] Derive Key Pair
6,491,476 UART: [art] Store priv key in slot 0x5
6,505,094 UART: [art] Derive Key Pair - Done
6,519,968 UART: [art] Signing Cert with AUTHO
6,520,448 UART: RITY.KEYID = 7
6,535,856 UART: [art] Erasing AUTHORITY.KEYID = 7
6,536,621 UART: [art] PUB.X = E9A341508C167A6D463929D5B5EF6223221A641051D9B5895CE59B6BD2E91B0A14588AF31AE1CD912637587DDA6FF586
6,543,388 UART: [art] PUB.Y = 1CA0B1F777CB54F66D71D718E2621647E53E5153230D567D2952E198090E91FE9775C52AEF7FE27BC7F73E57B952266E
6,550,327 UART: [art] SIG.R = 54A8168BE60736285EF4F7FB9E057F7FCC19AA1BB4BC55A92221B372EDEAD4C9B04989E0DBEDE37153C3149DD4EA1C55
6,557,109 UART: [art] SIG.S = 77D48278079797D76AC5E15662A58E3BFABF9BEEDECDD7B92784670D99585B248BB2FBEEAEC760AD84D95DAA5E3DD8E6
6,581,014 UART: Caliptra RT
6,581,359 UART: [state] CFI Enabled
6,861,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,893,143 UART: [rt]cmd =0x41545348, len=116
6,895,234 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,925 ready_for_fw is high
1,056,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,454 >>> mbox cmd response: success
2,682,292 UART:
2,682,308 UART: Running Caliptra FMC ...
2,682,716 UART:
2,682,859 UART: [state] CFI Enabled
2,693,464 UART: [fht] FMC Alias Private Key: 7
2,801,585 UART: [art] Extend RT PCRs Done
2,802,013 UART: [art] Lock RT PCRs Done
2,803,239 UART: [art] Populate DV Done
2,811,364 UART: [fht] FMC Alias Private Key: 7
2,812,404 UART: [art] Derive CDI
2,812,684 UART: [art] Store in in slot 0x4
2,898,373 UART: [art] Derive Key Pair
2,898,733 UART: [art] Store priv key in slot 0x5
2,911,663 UART: [art] Derive Key Pair - Done
2,926,658 UART: [art] Signing Cert with AUTHO
2,927,138 UART: RITY.KEYID = 7
2,942,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,361 UART: [art] PUB.X = E51FFBA915E800CBFC2CB05D3696EE4FB87A7FAA074943391033446285B5037B7200A763F262F13ECE1B8F08F1EA8046
2,950,084 UART: [art] PUB.Y = 62ECFFB1C1B2F01DCFEB596A68211FAE10537F09F60D848C555766F04950620981F1B6CA033DD1781B9EBC234AAE7215
2,957,030 UART: [art] SIG.R = ADE8EFEFA3F70F59CDC7A2163BB03A854E4B8D77FF7FFD3B22E4229C67C63793AC57792EB2253AA1284C0C9F88DCDB0F
2,963,815 UART: [art] SIG.S = 38B7CA09550152D918F71A779F83BE44B7CD95FC648BDA8D62B019BC5CA03404889F7E7AF0B1A5051974C77329A1511A
2,987,958 UART: Caliptra RT
2,988,303 UART: [state] CFI Enabled
3,095,402 UART: [rt] RT listening for mailbox commands...
3,096,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,150 UART: [rt]cmd =0x41544d4e, len=14344
3,529,602 >>> mbox cmd response data (8 bytes)
3,529,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,872 UART: [rt]cmd =0x41545348, len=116
3,561,865 >>> mbox cmd response data (12 bytes)
3,561,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,991,292 >>> mbox cmd response: success
5,991,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,004,808 UART:
6,004,824 UART: Running Caliptra FMC ...
6,005,232 UART:
6,005,375 UART: [state] CFI Enabled
6,094,916 UART: [art] Extend RT PCRs Done
6,095,344 UART: [art] Lock RT PCRs Done
6,096,589 UART: [art] Populate DV Done
6,104,652 UART: [fht] FMC Alias Private Key: 7
6,105,628 UART: [art] Derive CDI
6,105,908 UART: [art] Store in in slot 0x4
6,191,409 UART: [art] Derive Key Pair
6,191,769 UART: [art] Store priv key in slot 0x5
6,205,701 UART: [art] Derive Key Pair - Done
6,220,407 UART: [art] Signing Cert with AUTHO
6,220,887 UART: RITY.KEYID = 7
6,235,867 UART: [art] Erasing AUTHORITY.KEYID = 7
6,236,632 UART: [art] PUB.X = 04CF0C2166CB3787254642C2BE2FC76890C4AF3365568EBF9D3C7D20C6C6AA1F379212612932A663775B95B51F4D6BCF
6,243,398 UART: [art] PUB.Y = CADB93208024552BD63148D6465400119235F4C57C8BAC5BCF0CA76B43D4961B57FBF8A3CB931A07D980F9A775B200BC
6,250,304 UART: [art] SIG.R = 634FD42730C9E2F18A33ACDB1FECA2CA5810D9AE6D0529BAAD9AB73028A705F4FFDEC6F60A9FDBC94E59962DF19A8D84
6,257,091 UART: [art] SIG.S = 566A8EB9719EFA25752EA1CE342DC262D9FDAB8C612A1A33303E6B7AEEC280C830092A2457C6C43693CEEF58FF79D28B
6,281,275 UART: Caliptra RT
6,281,620 UART: [state] CFI Enabled
6,563,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,594,596 UART: [rt]cmd =0x41545348, len=116
6,596,629 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,387 UART:
192,743 UART: Running Caliptra ROM ...
193,951 UART:
194,108 UART: [state] CFI Enabled
263,962 UART: [state] LifecycleState = Unprovisioned
265,878 UART: [state] DebugLocked = No
268,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,145 UART: [kat] SHA2-256
443,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,309 UART: [kat] ++
454,785 UART: [kat] sha1
464,952 UART: [kat] SHA2-256
467,678 UART: [kat] SHA2-384
474,687 UART: [kat] SHA2-512-ACC
477,026 UART: [kat] ECC-384
2,767,790 UART: [kat] HMAC-384Kdf
2,780,244 UART: [kat] LMS
3,970,545 UART: [kat] --
3,976,196 UART: [cold-reset] ++
3,977,277 UART: [fht] Storing FHT @ 0x50003400
3,988,403 UART: [idev] ++
3,988,968 UART: [idev] CDI.KEYID = 6
3,990,018 UART: [idev] SUBJECT.KEYID = 7
3,991,201 UART: [idev] UDS.KEYID = 0
3,992,206 ready_for_fw is high
3,992,397 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,468 UART: [idev] Erasing UDS.KEYID = 0
7,328,003 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,565 UART: [idev] --
7,352,065 UART: [ldev] ++
7,352,638 UART: [ldev] CDI.KEYID = 6
7,353,607 UART: [ldev] SUBJECT.KEYID = 5
7,354,915 UART: [ldev] AUTHORITY.KEYID = 7
7,356,101 UART: [ldev] FE.KEYID = 1
7,401,127 UART: [ldev] Erasing FE.KEYID = 1
10,735,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,852 UART: [ldev] --
13,092,824 UART: [fwproc] Waiting for Commands...
13,095,569 UART: [fwproc] Received command 0x46574c44
13,097,756 UART: [fwproc] Received Image of size 113760 bytes
17,139,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,216,490 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,602,142 >>> mbox cmd response: success
17,607,047 UART: [afmc] ++
17,607,646 UART: [afmc] CDI.KEYID = 6
17,608,664 UART: [afmc] SUBJECT.KEYID = 7
17,609,821 UART: [afmc] AUTHORITY.KEYID = 5
20,965,097 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,266,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,269,270 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,283,708 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,298,511 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,312,910 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,334,165 UART: [afmc] --
23,337,336 UART: [cold-reset] --
23,339,844 UART: [state] Locking Datavault
23,344,982 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,678 UART: [state] Locking ICCM
23,348,183 UART: [exit] Launching FMC @ 0x40000130
23,356,586 UART:
23,356,872 UART: Running Caliptra FMC ...
23,357,984 UART:
23,358,160 UART: [state] CFI Enabled
23,428,809 UART: [fht] FMC Alias Private Key: 7
25,766,810 UART: [art] Extend RT PCRs Done
25,768,051 UART: [art] Lock RT PCRs Done
25,769,871 UART: [art] Populate DV Done
25,775,389 UART: [fht] FMC Alias Private Key: 7
25,777,087 UART: [art] Derive CDI
25,777,828 UART: [art] Store in in slot 0x4
25,837,136 UART: [art] Derive Key Pair
25,838,170 UART: [art] Store priv key in slot 0x5
29,131,397 UART: [art] Derive Key Pair - Done
29,144,233 UART: [art] Signing Cert with AUTHO
29,145,537 UART: RITY.KEYID = 7
31,432,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,433,707 UART: [art] PUB.X = 187AB6EB4D1D3F84C3F63A72C652EE15EA9E963D5F0A1B2784A47AACC77261CFBB2AAC0865D6793931CB9B7683B91545
31,440,970 UART: [art] PUB.Y = 9285FD8CA4DB04DAFAED7066AD30CF46CB83C6746C8A535F20927CABB49E1D8321FC0DF246FC0919C413AFB849559F1D
31,448,209 UART: [art] SIG.R = E0B49153246E85AD8EF93885D0C1C875833A89A96130F4D05A324A59741AFA2FCF4D267200D70E7C23332684BD4AE07F
31,455,560 UART: [art] SIG.S = 2B5C25222BD079AAEF43D2E0FEA1D0E0524E4E955B394B64F929137AE6F5910E532E63B0E43CBE49F94D3B1F01C7A7CD
32,761,542 UART: Caliptra RT
32,762,244 UART: [state] CFI Enabled
32,922,966 UART: [rt] RT listening for mailbox commands...
32,925,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,080,596 UART: [rt]cmd =0x41544d4e, len=14344
38,380,707 >>> mbox cmd response data (8 bytes)
38,381,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,412,227 UART: [rt]cmd =0x41545348, len=116
38,432,764 >>> mbox cmd response data (12 bytes)
38,433,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,464,583 UART: [rt]cmd =0x41545348, len=116
38,466,673 >>> mbox cmd response data (12 bytes)
40,520,619 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,665,914 UART:
40,666,311 UART: Running Caliptra ROM ...
40,667,453 UART:
40,667,626 UART: [state] CFI Enabled
40,729,390 UART: [state] LifecycleState = Unprovisioned
40,731,333 UART: [state] DebugLocked = No
40,732,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,738,162 UART: [kat] SHA2-256
40,907,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,918,352 UART: [kat] ++
40,918,810 UART: [kat] sha1
40,931,318 UART: [kat] SHA2-256
40,933,964 UART: [kat] SHA2-384
40,939,575 UART: [kat] SHA2-512-ACC
40,941,920 UART: [kat] ECC-384
43,236,128 UART: [kat] HMAC-384Kdf
43,268,707 UART: [kat] LMS
44,459,047 UART: [kat] --
44,464,414 UART: [update-reset] ++
48,598,574 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,602,035 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,983,017 >>> mbox cmd response: success
48,987,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,988,185 UART: [update-reset] Copying MAN_2 To MAN_1
49,005,778 UART: [update-reset Success] --
49,010,297 UART: [state] Locking Datavault
49,014,308 UART: [state] Locking PCR0, PCR1 and PCR31
49,016,085 UART: [state] Locking ICCM
49,017,109 UART: [exit] Launching FMC @ 0x40000130
49,025,561 UART:
49,025,808 UART: Running Caliptra FMC ...
49,026,912 UART:
49,027,076 UART: [state] CFI Enabled
49,126,187 UART: [art] Extend RT PCRs Done
49,127,388 UART: [art] Lock RT PCRs Done
49,128,843 UART: [art] Populate DV Done
49,134,475 UART: [fht] FMC Alias Private Key: 7
49,136,117 UART: [art] Derive CDI
49,136,928 UART: [art] Store in in slot 0x4
49,195,234 UART: [art] Derive Key Pair
49,196,277 UART: [art] Store priv key in slot 0x5
52,488,874 UART: [art] Derive Key Pair - Done
52,501,989 UART: [art] Signing Cert with AUTHO
52,503,313 UART: RITY.KEYID = 7
54,791,426 UART: [art] Erasing AUTHORITY.KEYID = 7
54,792,945 UART: [art] PUB.X = 061227D6B1F0B2CCA04CB1D48078DBB8CB19AC271B9C9F4BA606215298F99E707149A112E997F2A83A4D9F6B82DA1D32
54,800,166 UART: [art] PUB.Y = 606064E163E952948AEB0117D34C8E11E7DC1126DFB5E37F95F0C53DB05AC3B66431BE9CA837BC143539C971AF80E1BA
54,807,399 UART: [art] SIG.R = 631125077A529DAFE14F501D819ABD57F6333F0E612C598B80083D150CE521F1192FC7E14B88975FFBEEC2D18402B198
54,814,794 UART: [art] SIG.S = C83053E7C9C763EA27C320575848B3C39DCCD754422BE85A82CAC0A7847D1D99C467F5B089C57152C6658C9105C3D460
56,119,791 UART: Caliptra RT
56,120,509 UART: [state] CFI Enabled
56,452,152 UART: [rt] RT listening for mailbox commands...
56,484,059 UART: [rt]cmd =0x41545348, len=116
56,504,533 >>> mbox cmd response data (12 bytes)
56,505,395 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,536,178 UART: [rt]cmd =0x41545348, len=116
56,538,537 >>> mbox cmd response data (12 bytes)
60,564,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,720,235 UART: [rt]cmd =0x41544d4e, len=14344
66,020,876 >>> mbox cmd response data (8 bytes)
66,021,409 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,052,249 UART: [rt]cmd =0x41545348, len=116
66,071,682 >>> mbox cmd response data (12 bytes)
66,072,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,102,559 UART: [rt]cmd =0x41545348, len=116
66,104,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,782,960 ready_for_fw is high
3,783,350 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,849,599 >>> mbox cmd response: success
23,543,553 UART:
23,544,279 UART: Running Caliptra FMC ...
23,545,416 UART:
23,545,576 UART: [state] CFI Enabled
23,615,356 UART: [fht] FMC Alias Private Key: 7
25,953,482 UART: [art] Extend RT PCRs Done
25,954,710 UART: [art] Lock RT PCRs Done
25,956,285 UART: [art] Populate DV Done
25,961,478 UART: [fht] FMC Alias Private Key: 7
25,963,143 UART: [art] Derive CDI
25,963,961 UART: [art] Store in in slot 0x4
26,023,989 UART: [art] Derive Key Pair
26,025,037 UART: [art] Store priv key in slot 0x5
29,318,246 UART: [art] Derive Key Pair - Done
29,331,336 UART: [art] Signing Cert with AUTHO
29,332,686 UART: RITY.KEYID = 7
31,619,288 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,800 UART: [art] PUB.X = 1A36C11A9DCA0387473A3B6BCC19E43F1F16AEB4BB17545E309C0C3B7333DD6D63CFC26B2E922C06A62B048A052502BF
31,628,015 UART: [art] PUB.Y = D440ADEDFE03199F202088E834660523B3B5480175A28A9526673AD0325799F630CF78075E37D7178D4315918258D456
31,635,247 UART: [art] SIG.R = 4E69576CAD01893789282AF1A0D5004A013466CF7C2E0033FA767CF6849D29C5111EB206877678EDC06A86B58071E54F
31,642,558 UART: [art] SIG.S = 3F4B9F4E9BE942157035B1750F1BCE046B8B47FCC96B35D58A792410D76A94630A945E08FC8E955C6D7BE4CD90B7928B
32,948,098 UART: Caliptra RT
32,948,817 UART: [state] CFI Enabled
33,109,180 UART: [rt] RT listening for mailbox commands...
33,111,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,266,818 UART: [rt]cmd =0x41544d4e, len=14344
38,567,596 >>> mbox cmd response data (8 bytes)
38,568,238 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,598,917 UART: [rt]cmd =0x41545348, len=116
38,619,412 >>> mbox cmd response data (12 bytes)
38,620,772 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,651,567 UART: [rt]cmd =0x41545348, len=116
38,653,995 >>> mbox cmd response data (12 bytes)
40,707,191 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,418,249 >>> mbox cmd response: success
49,418,901 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,449,343 UART:
49,449,649 UART: Running Caliptra FMC ...
49,450,865 UART:
49,451,033 UART: [state] CFI Enabled
49,558,749 UART: [art] Extend RT PCRs Done
49,559,953 UART: [art] Lock RT PCRs Done
49,561,226 UART: [art] Populate DV Done
49,566,473 UART: [fht] FMC Alias Private Key: 7
49,568,116 UART: [art] Derive CDI
49,568,931 UART: [art] Store in in slot 0x4
49,627,405 UART: [art] Derive Key Pair
49,628,469 UART: [art] Store priv key in slot 0x5
52,912,683 UART: [art] Derive Key Pair - Done
52,925,353 UART: [art] Signing Cert with AUTHO
52,926,648 UART: RITY.KEYID = 7
55,214,134 UART: [art] Erasing AUTHORITY.KEYID = 7
55,215,637 UART: [art] PUB.X = 23FEE53215162C63BF96FCBAD914DA3E98D54121E860D14FD4FCD75CBA993F9EFC28CE7208C5B00F407A499AB7EBE14B
55,222,896 UART: [art] PUB.Y = 009D84A2CC9DAF55E54F79A5D01008958A016691C42D71FAA96D7572C4A5664809E14C4E6D182276B6893C08D968B607
55,230,143 UART: [art] SIG.R = E974BED345D332784703DF1BDF2959B355A186E7ADBC1027F7D1D90029945F2534A00D6B526E162CB26F1A2F210430F4
55,237,483 UART: [art] SIG.S = 57BF39EF0C51B14FC415E113EFC4389CE1618C82351CA4C730BFB878E7DE67EA757F3A2933A3DE3BC07277242E9ED260
56,542,398 UART: Caliptra RT
56,543,113 UART: [state] CFI Enabled
56,874,920 UART: [rt] RT listening for mailbox commands...
56,906,607 UART: [rt]cmd =0x41545348, len=116
56,927,426 >>> mbox cmd response data (12 bytes)
56,928,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,958,997 UART: [rt]cmd =0x41545348, len=116
56,961,408 >>> mbox cmd response data (12 bytes)
60,987,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,142,828 UART: [rt]cmd =0x41544d4e, len=14344
66,443,490 >>> mbox cmd response data (8 bytes)
66,444,028 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,474,822 UART: [rt]cmd =0x41545348, len=116
66,494,281 >>> mbox cmd response data (12 bytes)
66,494,705 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,525,198 UART: [rt]cmd =0x41545348, len=116
66,527,435 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,926 writing to cptra_bootfsm_go
193,041 UART:
193,407 UART: Running Caliptra ROM ...
194,523 UART:
604,353 UART: [state] CFI Enabled
617,724 UART: [state] LifecycleState = Unprovisioned
619,688 UART: [state] DebugLocked = No
622,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,931 UART: [kat] SHA2-256
796,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,250 UART: [kat] ++
807,777 UART: [kat] sha1
818,365 UART: [kat] SHA2-256
821,075 UART: [kat] SHA2-384
825,992 UART: [kat] SHA2-512-ACC
828,362 UART: [kat] ECC-384
3,115,149 UART: [kat] HMAC-384Kdf
3,127,172 UART: [kat] LMS
4,317,269 UART: [kat] --
4,323,342 UART: [cold-reset] ++
4,324,584 UART: [fht] Storing FHT @ 0x50003400
4,336,910 UART: [idev] ++
4,337,481 UART: [idev] CDI.KEYID = 6
4,338,393 UART: [idev] SUBJECT.KEYID = 7
4,339,632 UART: [idev] UDS.KEYID = 0
4,340,640 ready_for_fw is high
4,340,840 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,703 UART: [idev] Erasing UDS.KEYID = 0
7,630,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,899 UART: [idev] --
7,657,404 UART: [ldev] ++
7,657,977 UART: [ldev] CDI.KEYID = 6
7,658,937 UART: [ldev] SUBJECT.KEYID = 5
7,660,143 UART: [ldev] AUTHORITY.KEYID = 7
7,661,423 UART: [ldev] FE.KEYID = 1
7,674,330 UART: [ldev] Erasing FE.KEYID = 1
10,959,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,598 UART: [ldev] --
13,320,530 UART: [fwproc] Waiting for Commands...
13,322,775 UART: [fwproc] Received command 0x46574c44
13,324,960 UART: [fwproc] Received Image of size 113760 bytes
17,372,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,081 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,832,798 >>> mbox cmd response: success
17,837,766 UART: [afmc] ++
17,838,355 UART: [afmc] CDI.KEYID = 6
17,839,319 UART: [afmc] SUBJECT.KEYID = 7
17,840,551 UART: [afmc] AUTHORITY.KEYID = 5
21,160,194 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,121 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,461 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,320 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,771 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,480 UART: [afmc] --
23,527,397 UART: [cold-reset] --
23,531,903 UART: [state] Locking Datavault
23,536,337 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,097 UART: [state] Locking ICCM
23,540,788 UART: [exit] Launching FMC @ 0x40000130
23,549,188 UART:
23,549,420 UART: Running Caliptra FMC ...
23,550,522 UART:
23,550,700 UART: [state] CFI Enabled
23,559,080 UART: [fht] FMC Alias Private Key: 7
25,889,975 UART: [art] Extend RT PCRs Done
25,891,420 UART: [art] Lock RT PCRs Done
25,892,534 UART: [art] Populate DV Done
25,897,891 UART: [fht] FMC Alias Private Key: 7
25,899,589 UART: [art] Derive CDI
25,900,404 UART: [art] Store in in slot 0x4
25,942,572 UART: [art] Derive Key Pair
25,943,572 UART: [art] Store priv key in slot 0x5
29,185,836 UART: [art] Derive Key Pair - Done
29,198,718 UART: [art] Signing Cert with AUTHO
29,200,027 UART: RITY.KEYID = 7
31,479,628 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,139 UART: [art] PUB.X = DF3297ED50A861D624FC5404C2F22031C6E5639BD0533158E0D4A03736393C766F10A564E6981B4B99158850C5B55E95
31,488,367 UART: [art] PUB.Y = 76406E32DDA8B293A8540DDC5E2B9A1B6156C9E79D2FD0A3F045B788A667076616468E239B7749AD51D7855E17E8991E
31,495,620 UART: [art] SIG.R = 6D04E0D81852BBAE84B5B0CABE8BA1933D9DF0694A179742F6F10F8DD041E4A846F084AD710CBCE57DAB48A9AAD76E29
31,503,006 UART: [art] SIG.S = C207C7E5FD2E2988B34C669A541EDB37CF6336E071A0C0240E9E2CC6E01FE43E6AA6E041F2283F50A90CAB85BC011FCD
32,808,314 UART: Caliptra RT
32,809,000 UART: [state] CFI Enabled
32,926,430 UART: [rt] RT listening for mailbox commands...
32,928,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,084,143 UART: [rt]cmd =0x41544d4e, len=14344
38,384,413 >>> mbox cmd response data (8 bytes)
38,385,018 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,415,696 UART: [rt]cmd =0x41545348, len=116
38,436,477 >>> mbox cmd response data (12 bytes)
38,437,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,468,421 UART: [rt]cmd =0x41545348, len=116
38,470,651 >>> mbox cmd response data (12 bytes)
40,527,087 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,671,812 UART:
40,672,178 UART: Running Caliptra ROM ...
40,673,230 UART:
40,673,433 UART: [state] CFI Enabled
40,687,384 UART: [state] LifecycleState = Unprovisioned
40,689,268 UART: [state] DebugLocked = No
40,690,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,695,591 UART: [kat] SHA2-256
40,865,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,875,850 UART: [kat] ++
40,876,298 UART: [kat] sha1
40,887,341 UART: [kat] SHA2-256
40,890,053 UART: [kat] SHA2-384
40,896,585 UART: [kat] SHA2-512-ACC
40,898,987 UART: [kat] ECC-384
43,183,895 UART: [kat] HMAC-384Kdf
43,196,026 UART: [kat] LMS
44,386,111 UART: [kat] --
44,390,335 UART: [update-reset] ++
48,532,245 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,535,538 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,916,547 >>> mbox cmd response: success
48,921,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,921,909 UART: [update-reset] Copying MAN_2 To MAN_1
48,940,121 UART: [update-reset Success] --
48,943,967 UART: [state] Locking Datavault
48,946,688 UART: [state] Locking PCR0, PCR1 and PCR31
48,948,394 UART: [state] Locking ICCM
48,950,594 UART: [exit] Launching FMC @ 0x40000130
48,958,986 UART:
48,959,222 UART: Running Caliptra FMC ...
48,960,261 UART:
48,960,404 UART: [state] CFI Enabled
49,004,253 UART: [art] Extend RT PCRs Done
49,005,400 UART: [art] Lock RT PCRs Done
49,007,158 UART: [art] Populate DV Done
49,012,945 UART: [fht] FMC Alias Private Key: 7
49,014,479 UART: [art] Derive CDI
49,015,215 UART: [art] Store in in slot 0x4
49,058,023 UART: [art] Derive Key Pair
49,059,044 UART: [art] Store priv key in slot 0x5
52,301,781 UART: [art] Derive Key Pair - Done
52,315,164 UART: [art] Signing Cert with AUTHO
52,316,474 UART: RITY.KEYID = 7
54,595,688 UART: [art] Erasing AUTHORITY.KEYID = 7
54,597,192 UART: [art] PUB.X = 813008A201D852452B77C97C40AF6BF838168F12F58C2AD492CCEA29D6AFAFECBB69F9B16FC01DE7165B4D5B45070BF1
54,604,453 UART: [art] PUB.Y = BEBE710654878B62B24108DB49649C4223486254B79FDFC7AD3D0C1864EA42B640DDE1DA2C362FB8C8B8BA8B7344EF3B
54,611,706 UART: [art] SIG.R = CC7708AF04DDEF3B441EE603BB6679E9BF82F3B9A522273B4E96456E38C04A768895E4DF0BB4115420268EF18BF89B28
54,619,093 UART: [art] SIG.S = CFAD490004B529E0E770AEA4E32DD22F78D7D82D73EFABFCD7E7ABF6A6A31F2EF3AA16FF377C2EA7099A0351A6819325
55,924,271 UART: Caliptra RT
55,924,984 UART: [state] CFI Enabled
56,213,798 UART: [rt] RT listening for mailbox commands...
56,245,601 UART: [rt]cmd =0x41545348, len=116
56,264,689 >>> mbox cmd response data (12 bytes)
56,265,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,296,379 UART: [rt]cmd =0x41545348, len=116
56,298,574 >>> mbox cmd response data (12 bytes)
60,329,202 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,484,832 UART: [rt]cmd =0x41544d4e, len=14344
65,785,537 >>> mbox cmd response data (8 bytes)
65,786,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,816,998 UART: [rt]cmd =0x41545348, len=116
65,837,430 >>> mbox cmd response data (12 bytes)
65,837,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
65,868,567 UART: [rt]cmd =0x41545348, len=116
65,870,648 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
4,133,574 ready_for_fw is high
4,133,988 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,078,488 >>> mbox cmd response: success
23,712,976 UART:
23,713,353 UART: Running Caliptra FMC ...
23,714,453 UART:
23,714,601 UART: [state] CFI Enabled
23,722,365 UART: [fht] FMC Alias Private Key: 7
26,053,667 UART: [art] Extend RT PCRs Done
26,054,902 UART: [art] Lock RT PCRs Done
26,056,182 UART: [art] Populate DV Done
26,061,710 UART: [fht] FMC Alias Private Key: 7
26,063,250 UART: [art] Derive CDI
26,063,982 UART: [art] Store in in slot 0x4
26,106,571 UART: [art] Derive Key Pair
26,107,568 UART: [art] Store priv key in slot 0x5
29,349,844 UART: [art] Derive Key Pair - Done
29,362,739 UART: [art] Signing Cert with AUTHO
29,364,043 UART: RITY.KEYID = 7
31,643,157 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,662 UART: [art] PUB.X = 51A3E784ED68CA2429467444C558A20037E1D622350CFC45302BEF3BB636FC24759D1EF1584226AECF618F0794C21ED9
31,651,898 UART: [art] PUB.Y = D37DD2EDBE471D1887301BFCC966F714ED4AF699DCA340FC666D4AE5B6EEC0FBF9C3EB98D4A97604BCC865CF8BE98B85
31,659,205 UART: [art] SIG.R = 5274547701C07A21071009B304DAE559FFA3288B38B4780493CE37DA468A7699707333C078E7BE6625BE3D47F7F4E3BD
31,666,588 UART: [art] SIG.S = CCA4B0E8590F1FAFCCA3B1F677D720524130FC7E610D4399ED9286C173CF2081C6201AA86FF3A6CDCCAE80E12F9D0634
32,971,603 UART: Caliptra RT
32,972,292 UART: [state] CFI Enabled
33,090,591 UART: [rt] RT listening for mailbox commands...
33,093,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,248,522 UART: [rt]cmd =0x41544d4e, len=14344
38,548,723 >>> mbox cmd response data (8 bytes)
38,549,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,579,807 UART: [rt]cmd =0x41545348, len=116
38,599,462 >>> mbox cmd response data (12 bytes)
38,600,649 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,631,331 UART: [rt]cmd =0x41545348, len=116
38,633,699 >>> mbox cmd response data (12 bytes)
40,687,296 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,325,952 >>> mbox cmd response: success
49,326,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,360,094 UART:
49,360,391 UART: Running Caliptra FMC ...
49,361,592 UART:
49,361,753 UART: [state] CFI Enabled
49,406,006 UART: [art] Extend RT PCRs Done
49,407,208 UART: [art] Lock RT PCRs Done
49,408,884 UART: [art] Populate DV Done
49,414,400 UART: [fht] FMC Alias Private Key: 7
49,416,053 UART: [art] Derive CDI
49,416,868 UART: [art] Store in in slot 0x4
49,459,199 UART: [art] Derive Key Pair
49,460,196 UART: [art] Store priv key in slot 0x5
52,702,041 UART: [art] Derive Key Pair - Done
52,715,110 UART: [art] Signing Cert with AUTHO
52,716,418 UART: RITY.KEYID = 7
54,995,944 UART: [art] Erasing AUTHORITY.KEYID = 7
54,997,454 UART: [art] PUB.X = 891BB3379DB51D03D19C88C15F13A4C2CFE8FE85AE7381303BDE2409A43618C5350BCCB26CB3844843B03912C7B23DFC
55,004,673 UART: [art] PUB.Y = 6DEB19B5AF4E1DD2B1FC3F140737E6F627F93969FE0FBC6156C7B2A4A482F0A4FCA10633B78D1CA5035289B70668EF43
55,011,952 UART: [art] SIG.R = 1BB9B4758E79E2F703716365D7D3A627C0DA6FD57EF05F5C73E87131D671B45DA0FBD7034B272C8C51EBA1D4AA519CFB
55,019,334 UART: [art] SIG.S = E738B8DE25D69496CB0FFE4D7F42AB1A9E918F5C61A88E3AE09CC7A48E247EDFF428ADBB7492D77CBBA8473D975D0AF2
56,324,228 UART: Caliptra RT
56,324,935 UART: [state] CFI Enabled
56,615,918 UART: [rt] RT listening for mailbox commands...
56,647,768 UART: [rt]cmd =0x41545348, len=116
56,667,618 >>> mbox cmd response data (12 bytes)
56,668,482 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,699,177 UART: [rt]cmd =0x41545348, len=116
56,701,462 >>> mbox cmd response data (12 bytes)
60,731,917 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,887,503 UART: [rt]cmd =0x41544d4e, len=14344
66,187,450 >>> mbox cmd response data (8 bytes)
66,187,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,218,566 UART: [rt]cmd =0x41545348, len=116
66,238,300 >>> mbox cmd response data (12 bytes)
66,238,743 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,269,345 UART: [rt]cmd =0x41545348, len=116
66,271,373 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
192,673 UART:
193,047 UART: Running Caliptra ROM ...
194,215 UART:
194,365 UART: [state] CFI Enabled
265,580 UART: [state] LifecycleState = Unprovisioned
267,444 UART: [state] DebugLocked = No
269,393 UART: [state] WD Timer not started. Device not locked for debugging
273,857 UART: [kat] SHA2-256
452,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,507 UART: [kat] ++
465,030 UART: [kat] sha1
477,472 UART: [kat] SHA2-256
480,547 UART: [kat] SHA2-384
486,174 UART: [kat] SHA2-512-ACC
489,107 UART: [kat] ECC-384
2,946,853 UART: [kat] HMAC-384Kdf
2,971,688 UART: [kat] LMS
3,501,140 UART: [kat] --
3,506,375 UART: [cold-reset] ++
3,508,234 UART: [fht] FHT @ 0x50003400
3,519,274 UART: [idev] ++
3,519,834 UART: [idev] CDI.KEYID = 6
3,520,744 UART: [idev] SUBJECT.KEYID = 7
3,521,913 UART: [idev] UDS.KEYID = 0
3,522,952 ready_for_fw is high
3,523,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,711 UART: [idev] Erasing UDS.KEYID = 0
6,027,309 UART: [idev] Sha1 KeyId Algorithm
6,051,305 UART: [idev] --
6,055,703 UART: [ldev] ++
6,056,282 UART: [ldev] CDI.KEYID = 6
6,057,195 UART: [ldev] SUBJECT.KEYID = 5
6,058,375 UART: [ldev] AUTHORITY.KEYID = 7
6,059,607 UART: [ldev] FE.KEYID = 1
6,100,679 UART: [ldev] Erasing FE.KEYID = 1
8,605,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,244 UART: [ldev] --
10,412,502 UART: [fwproc] Wait for Commands...
10,415,100 UART: [fwproc] Recv command 0x46574c44
10,417,141 UART: [fwproc] Recv'd Img size: 114084 bytes
13,808,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,265,735 >>> mbox cmd response: success
14,270,794 UART: [afmc] ++
14,271,412 UART: [afmc] CDI.KEYID = 6
14,272,327 UART: [afmc] SUBJECT.KEYID = 7
14,273,429 UART: [afmc] AUTHORITY.KEYID = 5
16,804,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,231 UART: [afmc] --
18,604,316 UART: [cold-reset] --
18,607,735 UART: [state] Locking Datavault
18,612,764 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,460 UART: [state] Locking ICCM
18,615,746 UART: [exit] Launching FMC @ 0x40000130
18,624,122 UART:
18,624,361 UART: Running Caliptra FMC ...
18,625,461 UART:
18,625,622 UART: [state] CFI Enabled
18,689,004 UART: [fht] FMC Alias Private Key: 7
20,453,418 UART: [art] Extend RT PCRs Done
20,454,634 UART: [art] Lock RT PCRs Done
20,456,226 UART: [art] Populate DV Done
20,461,634 UART: [fht] FMC Alias Private Key: 7
20,463,332 UART: [art] Derive CDI
20,464,140 UART: [art] Store in in slot 0x4
20,521,657 UART: [art] Derive Key Pair
20,522,692 UART: [art] Store priv key in slot 0x5
22,985,468 UART: [art] Derive Key Pair - Done
22,998,356 UART: [art] Signing Cert with AUTHO
22,999,691 UART: RITY.KEYID = 7
24,711,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,800 UART: [art] PUB.X = FF8D118A5CB17AE4ABB2B4636C147EB3E7BD1D4B464F95B43FD6570E5E810BC685F91FFEC5869F704B268C33B9650B00
24,720,107 UART: [art] PUB.Y = 7C174EA530EF9322BC76E807B9892822218E10FF36398664405A6B8E911475018F1A2DB4527CFFAF55AEBE32DF6E3322
24,727,321 UART: [art] SIG.R = 812CAB090A37BD2E29765B3442C0BA6FD1AC9C2BA3BE998C3BE9AA57A1CD227B9A49FD8CAF356A04E64008934603CF7C
24,734,764 UART: [art] SIG.S = 5BAB10FBB222E7E3E13B7A45D52860A6C52FD022906C4031271D164A564766A2BC1714145C53E0F873852C23439016EB
25,713,699 UART: Caliptra RT
25,714,384 UART: [state] CFI Enabled
25,878,226 UART: [rt] RT listening for mailbox commands...
25,880,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,035,953 UART: [rt]cmd =0x41544d4e, len=14344
30,031,679 >>> mbox cmd response data (8 bytes)
30,032,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,062,890 UART: [rt]cmd =0x41545348, len=116
30,083,083 >>> mbox cmd response data (12 bytes)
30,084,274 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,114,928 UART: [rt]cmd =0x41545348, len=116
30,117,297 >>> mbox cmd response data (12 bytes)
32,169,980 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,315,205 UART:
32,315,588 UART: Running Caliptra ROM ...
32,316,634 UART:
32,316,795 UART: [state] CFI Enabled
32,387,787 UART: [state] LifecycleState = Unprovisioned
32,389,662 UART: [state] DebugLocked = No
32,391,639 UART: [state] WD Timer not started. Device not locked for debugging
32,394,857 UART: [kat] SHA2-256
32,574,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,585,565 UART: [kat] ++
32,586,040 UART: [kat] sha1
32,597,472 UART: [kat] SHA2-256
32,600,471 UART: [kat] SHA2-384
32,606,734 UART: [kat] SHA2-512-ACC
32,609,678 UART: [kat] ECC-384
35,072,644 UART: [kat] HMAC-384Kdf
35,095,097 UART: [kat] LMS
35,624,511 UART: [kat] --
35,629,471 UART: [update-reset] ++
39,050,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,053,227 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,435,300 >>> mbox cmd response: success
39,435,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,436,683 UART: [update-reset] Copying MAN_2 To MAN_1
39,459,019 UART: [update-reset Success] --
39,462,176 UART: [state] Locking Datavault
39,466,313 UART: [state] Locking PCR0, PCR1 and PCR31
39,467,960 UART: [state] Locking ICCM
39,469,514 UART: [exit] Launching FMC @ 0x40000130
39,477,962 UART:
39,478,208 UART: Running Caliptra FMC ...
39,479,312 UART:
39,479,470 UART: [state] CFI Enabled
39,586,455 UART: [art] Extend RT PCRs Done
39,587,632 UART: [art] Lock RT PCRs Done
39,589,186 UART: [art] Populate DV Done
39,594,912 UART: [fht] FMC Alias Private Key: 7
39,596,387 UART: [art] Derive CDI
39,597,146 UART: [art] Store in in slot 0x4
39,656,062 UART: [art] Derive Key Pair
39,657,103 UART: [art] Store priv key in slot 0x5
42,119,793 UART: [art] Derive Key Pair - Done
42,132,981 UART: [art] Signing Cert with AUTHO
42,134,296 UART: RITY.KEYID = 7
43,845,390 UART: [art] Erasing AUTHORITY.KEYID = 7
43,846,899 UART: [art] PUB.X = 217B5851C36FF41C92DCF7244D7FCB182D8E6AEE428F02A82D8B84B7FB1387C99885EC2E45F368034EC3782B8873FC84
43,854,134 UART: [art] PUB.Y = 60462F1551FCC059EE392B6891CC2F3FE7985B452C3D74F99C2934568E96DD642F343346C00132577DAABB382ECB7264
43,861,400 UART: [art] SIG.R = DD86845176E10049DB0C109521F337D0F9B53D6503FE8E6F6D651928C4A403E99CD3614D7E1E696B0BAEDFAC2C6A38EC
43,868,764 UART: [art] SIG.S = AAE88951A783871651D846D3DE37A348247A8975041FF25A50A35AEB292ADA0FC3A1B53894896C39FFEBF5E3EA163426
44,847,193 UART: Caliptra RT
44,847,904 UART: [state] CFI Enabled
45,186,170 UART: [rt] RT listening for mailbox commands...
45,218,234 UART: [rt]cmd =0x41545348, len=116
45,239,152 >>> mbox cmd response data (12 bytes)
45,240,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,270,749 UART: [rt]cmd =0x41545348, len=116
45,273,063 >>> mbox cmd response data (12 bytes)
49,295,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,451,378 UART: [rt]cmd =0x41544d4e, len=14344
53,446,598 >>> mbox cmd response data (8 bytes)
53,447,151 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,477,951 UART: [rt]cmd =0x41545348, len=116
53,498,602 >>> mbox cmd response data (12 bytes)
53,499,031 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,529,685 UART: [rt]cmd =0x41545348, len=116
53,531,602 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
3,360,277 ready_for_fw is high
3,360,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,064,654 >>> mbox cmd response: success
18,344,232 UART:
18,344,623 UART: Running Caliptra FMC ...
18,345,810 UART:
18,345,972 UART: [state] CFI Enabled
18,408,076 UART: [fht] FMC Alias Private Key: 7
20,172,407 UART: [art] Extend RT PCRs Done
20,173,632 UART: [art] Lock RT PCRs Done
20,175,158 UART: [art] Populate DV Done
20,180,652 UART: [fht] FMC Alias Private Key: 7
20,182,306 UART: [art] Derive CDI
20,183,121 UART: [art] Store in in slot 0x4
20,240,745 UART: [art] Derive Key Pair
20,241,755 UART: [art] Store priv key in slot 0x5
22,704,963 UART: [art] Derive Key Pair - Done
22,717,852 UART: [art] Signing Cert with AUTHO
22,719,150 UART: RITY.KEYID = 7
24,430,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,011 UART: [art] PUB.X = 4E52DD5D4271CDDCDBFC8D99ADE82AF820AF4445C032EB3A5710F43BDFE026A8BC7C4391A50185899759F644CA3F1052
24,439,300 UART: [art] PUB.Y = D72492DE7C78F71261DAF7C0BD82DB6160188EE0C117C113E8420612EF47650E9265C0CF7C16E87287F0DA1F0C8A8072
24,446,556 UART: [art] SIG.R = 5A35BFB9791997A5FB6AC8826028F92706FFE117912878399D03F7D78F1404E24B8EF7044F6F3C6B6D9D0B435868B209
24,453,923 UART: [art] SIG.S = B555E0C81702BDE0B3777A5875B6944D81266CC2716461F66314FC54368856653607C06B618682D4C9CEA25066FA5154
25,433,188 UART: Caliptra RT
25,433,895 UART: [state] CFI Enabled
25,598,695 UART: [rt] RT listening for mailbox commands...
25,601,094 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,756,648 UART: [rt]cmd =0x41544d4e, len=14344
29,752,590 >>> mbox cmd response data (8 bytes)
29,753,209 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,784,024 UART: [rt]cmd =0x41545348, len=116
29,803,117 >>> mbox cmd response data (12 bytes)
29,804,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,835,334 UART: [rt]cmd =0x41545348, len=116
29,837,855 >>> mbox cmd response data (12 bytes)
31,890,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
39,025,009 >>> mbox cmd response: success
39,025,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,059,864 UART:
39,060,201 UART: Running Caliptra FMC ...
39,061,419 UART:
39,061,600 UART: [state] CFI Enabled
39,153,613 UART: [art] Extend RT PCRs Done
39,154,797 UART: [art] Lock RT PCRs Done
39,155,985 UART: [art] Populate DV Done
39,161,602 UART: [fht] FMC Alias Private Key: 7
39,163,186 UART: [art] Derive CDI
39,163,990 UART: [art] Store in in slot 0x4
39,223,047 UART: [art] Derive Key Pair
39,224,085 UART: [art] Store priv key in slot 0x5
41,687,432 UART: [art] Derive Key Pair - Done
41,700,156 UART: [art] Signing Cert with AUTHO
41,701,491 UART: RITY.KEYID = 7
43,411,927 UART: [art] Erasing AUTHORITY.KEYID = 7
43,413,419 UART: [art] PUB.X = 6FFE0C2E1C27A8D2C267B4E7EBC1F0A258E20671E104B3B36593AF3C1A536F47762505F694CF32A5FA01B9ACEEB7C583
43,420,699 UART: [art] PUB.Y = 1CED36083FBDFF498D17C6E6178738D4418C8E4ED15BD275EA042330F9935B1E831586686F9F1B3642BCDACE7E7E9DF6
43,427,975 UART: [art] SIG.R = 995C4EB9F2233F29C09E5F98ED01C31C8F52848EA8DDD696B4E2E385347DDDC12F127FC6AC66A8E714DC0BD2EA683C68
43,435,390 UART: [art] SIG.S = BF28545359304CE4BB707544069ADBBF67C7697A9ECF879A8D60351D2769A53120EA6CC428564D0AAA620AA5D15D7798
44,414,531 UART: Caliptra RT
44,415,243 UART: [state] CFI Enabled
44,750,168 UART: [rt] RT listening for mailbox commands...
44,781,908 UART: [rt]cmd =0x41545348, len=116
44,801,649 >>> mbox cmd response data (12 bytes)
44,802,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,833,450 UART: [rt]cmd =0x41545348, len=116
44,835,688 >>> mbox cmd response data (12 bytes)
48,859,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,015,058 UART: [rt]cmd =0x41544d4e, len=14344
53,010,676 >>> mbox cmd response data (8 bytes)
53,011,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,042,163 UART: [rt]cmd =0x41545348, len=116
53,061,760 >>> mbox cmd response data (12 bytes)
53,062,222 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,092,936 UART: [rt]cmd =0x41545348, len=116
53,095,040 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
193,151 UART:
193,520 UART: Running Caliptra ROM ...
194,715 UART:
604,446 UART: [state] CFI Enabled
618,786 UART: [state] LifecycleState = Unprovisioned
620,626 UART: [state] DebugLocked = No
623,358 UART: [state] WD Timer not started. Device not locked for debugging
626,743 UART: [kat] SHA2-256
805,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,419 UART: [kat] ++
817,864 UART: [kat] sha1
829,734 UART: [kat] SHA2-256
832,742 UART: [kat] SHA2-384
839,102 UART: [kat] SHA2-512-ACC
842,040 UART: [kat] ECC-384
3,284,327 UART: [kat] HMAC-384Kdf
3,296,824 UART: [kat] LMS
3,826,310 UART: [kat] --
3,832,464 UART: [cold-reset] ++
3,834,618 UART: [fht] FHT @ 0x50003400
3,846,235 UART: [idev] ++
3,846,804 UART: [idev] CDI.KEYID = 6
3,847,691 UART: [idev] SUBJECT.KEYID = 7
3,848,814 UART: [idev] UDS.KEYID = 0
3,849,799 ready_for_fw is high
3,850,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,366 UART: [idev] Erasing UDS.KEYID = 0
6,317,497 UART: [idev] Sha1 KeyId Algorithm
6,341,370 UART: [idev] --
6,345,980 UART: [ldev] ++
6,346,561 UART: [ldev] CDI.KEYID = 6
6,347,470 UART: [ldev] SUBJECT.KEYID = 5
6,348,679 UART: [ldev] AUTHORITY.KEYID = 7
6,349,912 UART: [ldev] FE.KEYID = 1
6,361,640 UART: [ldev] Erasing FE.KEYID = 1
8,835,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,651 UART: [ldev] --
10,625,958 UART: [fwproc] Wait for Commands...
10,627,794 UART: [fwproc] Recv command 0x46574c44
10,629,892 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,487,392 >>> mbox cmd response: success
14,492,432 UART: [afmc] ++
14,493,031 UART: [afmc] CDI.KEYID = 6
14,493,923 UART: [afmc] SUBJECT.KEYID = 7
14,495,146 UART: [afmc] AUTHORITY.KEYID = 5
16,994,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,203 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,531 UART: [afmc] --
18,790,710 UART: [cold-reset] --
18,794,678 UART: [state] Locking Datavault
18,801,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,956 UART: [state] Locking ICCM
18,804,568 UART: [exit] Launching FMC @ 0x40000130
18,812,967 UART:
18,813,206 UART: Running Caliptra FMC ...
18,814,311 UART:
18,814,470 UART: [state] CFI Enabled
18,822,514 UART: [fht] FMC Alias Private Key: 7
20,578,929 UART: [art] Extend RT PCRs Done
20,580,147 UART: [art] Lock RT PCRs Done
20,581,536 UART: [art] Populate DV Done
20,586,738 UART: [fht] FMC Alias Private Key: 7
20,588,385 UART: [art] Derive CDI
20,589,122 UART: [art] Store in in slot 0x4
20,632,036 UART: [art] Derive Key Pair
20,633,078 UART: [art] Store priv key in slot 0x5
23,059,549 UART: [art] Derive Key Pair - Done
23,072,762 UART: [art] Signing Cert with AUTHO
23,074,072 UART: RITY.KEYID = 7
24,779,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,286 UART: [art] PUB.X = ABBD4B063E94F8C0F4C45F07020137E2C5477DD5DA250AA41F4DB8931EF20B4B67BA6AE60E615C39A7790DDA3752781C
24,788,612 UART: [art] PUB.Y = FFD44048FC630C33097AD3A47B4D65EE4DFFF9D6AE9AFE41BB3BAE70C5818D12BE7E3AA071D98CC991FDED15D0BA7392
24,795,863 UART: [art] SIG.R = 1971875F0E9176F7F5F90257F0A080168992D2C0BEB2CEFAAF56611436C78C12C800B287C8DE677B4DDA2A3E6EF2BB31
24,803,289 UART: [art] SIG.S = F65071E27B3721585C7DF6D983BBECAF3AB20075F7E9142B98A23466563B7C7E9DDB5E1A43E587B18EB02CEC2B5B856A
25,782,385 UART: Caliptra RT
25,783,072 UART: [state] CFI Enabled
25,899,919 UART: [rt] RT listening for mailbox commands...
25,902,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,057,554 UART: [rt]cmd =0x41544d4e, len=14344
30,053,040 >>> mbox cmd response data (8 bytes)
30,053,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,084,376 UART: [rt]cmd =0x41545348, len=116
30,103,913 >>> mbox cmd response data (12 bytes)
30,105,231 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,135,802 UART: [rt]cmd =0x41545348, len=116
30,138,345 >>> mbox cmd response data (12 bytes)
32,191,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,336,445 UART:
32,337,127 UART: Running Caliptra ROM ...
32,338,189 UART:
32,338,341 UART: [state] CFI Enabled
32,350,954 UART: [state] LifecycleState = Unprovisioned
32,352,800 UART: [state] DebugLocked = No
32,355,224 UART: [state] WD Timer not started. Device not locked for debugging
32,359,160 UART: [kat] SHA2-256
32,538,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,549,891 UART: [kat] ++
32,550,349 UART: [kat] sha1
32,560,202 UART: [kat] SHA2-256
32,563,228 UART: [kat] SHA2-384
32,569,597 UART: [kat] SHA2-512-ACC
32,572,542 UART: [kat] ECC-384
35,015,221 UART: [kat] HMAC-384Kdf
35,027,541 UART: [kat] LMS
35,557,011 UART: [kat] --
35,562,349 UART: [update-reset] ++
38,984,012 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,987,964 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,370,026 >>> mbox cmd response: success
39,370,549 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,371,452 UART: [update-reset] Copying MAN_2 To MAN_1
39,393,790 UART: [update-reset Success] --
39,398,672 UART: [state] Locking Datavault
39,401,062 UART: [state] Locking PCR0, PCR1 and PCR31
39,402,767 UART: [state] Locking ICCM
39,404,273 UART: [exit] Launching FMC @ 0x40000130
39,412,725 UART:
39,412,964 UART: Running Caliptra FMC ...
39,414,066 UART:
39,414,225 UART: [state] CFI Enabled
39,458,027 UART: [art] Extend RT PCRs Done
39,459,210 UART: [art] Lock RT PCRs Done
39,460,587 UART: [art] Populate DV Done
39,466,043 UART: [fht] FMC Alias Private Key: 7
39,467,581 UART: [art] Derive CDI
39,468,397 UART: [art] Store in in slot 0x4
39,510,989 UART: [art] Derive Key Pair
39,512,028 UART: [art] Store priv key in slot 0x5
41,938,664 UART: [art] Derive Key Pair - Done
41,951,649 UART: [art] Signing Cert with AUTHO
41,952,954 UART: RITY.KEYID = 7
43,658,229 UART: [art] Erasing AUTHORITY.KEYID = 7
43,659,863 UART: [art] PUB.X = 3CE442634CFDED73730ACA653A013FD38050F8185865ECED31B925E14D152C173D532222DF9E11AB4C994AD88155787A
43,667,021 UART: [art] PUB.Y = 474D0264CFF64E0D295848AC779CA88DA043466C81B559E9036FA54B602D2BD98943057887AD14034ADE520C48D78BE3
43,674,289 UART: [art] SIG.R = A8D723A06EC54E1DAB84E02112C62E7576D7DB0D0D97A4E0EA06F31C4E1CD413A86C17B42C26897E788E12F86F4C6753
43,681,660 UART: [art] SIG.S = C06A6BCE60D8B51E93DDFF94A9633D9B81D26C47791C0E0315902AE6D821678EF6103CE3D54F50314B041BF04FFAE843
44,660,370 UART: Caliptra RT
44,661,058 UART: [state] CFI Enabled
44,949,645 UART: [rt] RT listening for mailbox commands...
44,981,381 UART: [rt]cmd =0x41545348, len=116
45,001,399 >>> mbox cmd response data (12 bytes)
45,002,493 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,033,469 UART: [rt]cmd =0x41545348, len=116
45,035,365 >>> mbox cmd response data (12 bytes)
49,062,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,218,145 UART: [rt]cmd =0x41544d4e, len=14344
53,213,757 >>> mbox cmd response data (8 bytes)
53,214,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,244,891 UART: [rt]cmd =0x41545348, len=116
53,264,824 >>> mbox cmd response data (12 bytes)
53,265,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,295,787 UART: [rt]cmd =0x41545348, len=116
53,298,086 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,847 writing to cptra_bootfsm_go
3,698,574 ready_for_fw is high
3,699,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,836 >>> mbox cmd response: success
18,513,919 UART:
18,514,316 UART: Running Caliptra FMC ...
18,515,424 UART:
18,515,579 UART: [state] CFI Enabled
18,523,720 UART: [fht] FMC Alias Private Key: 7
20,280,861 UART: [art] Extend RT PCRs Done
20,282,078 UART: [art] Lock RT PCRs Done
20,283,519 UART: [art] Populate DV Done
20,288,700 UART: [fht] FMC Alias Private Key: 7
20,290,145 UART: [art] Derive CDI
20,290,886 UART: [art] Store in in slot 0x4
20,333,482 UART: [art] Derive Key Pair
20,334,479 UART: [art] Store priv key in slot 0x5
22,761,204 UART: [art] Derive Key Pair - Done
22,774,423 UART: [art] Signing Cert with AUTHO
22,775,729 UART: RITY.KEYID = 7
24,481,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,784 UART: [art] PUB.X = 32DD6D052B4971D087F74C767519D76633C71084D1EFFCD3A6B7157684F89D4E6275E42C1F0005979D47B23D27E395E8
24,490,010 UART: [art] PUB.Y = B51B1EC82B8C69085510712CEAA48811275898F8AF2305345258B0C1EDBCC4D6B9A67C0A6F3859223A06E594CE4C26FE
24,497,251 UART: [art] SIG.R = 8ECDD63ADF6423EDE23209C338FB0EA424538247130317629F1F9C79561A79F69C708DE7A1C0BCAB402DEB1C2E00573A
24,504,649 UART: [art] SIG.S = 08126740CBD3A85821952BCC9927360BC062A308771ECD898B089AD47DA35B6B4EC0886045C493D580238471DF363E7A
25,483,387 UART: Caliptra RT
25,484,076 UART: [state] CFI Enabled
25,601,930 UART: [rt] RT listening for mailbox commands...
25,604,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,759,515 UART: [rt]cmd =0x41544d4e, len=14344
29,755,250 >>> mbox cmd response data (8 bytes)
29,755,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,786,274 UART: [rt]cmd =0x41545348, len=116
29,806,043 >>> mbox cmd response data (12 bytes)
29,807,270 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,837,935 UART: [rt]cmd =0x41545348, len=116
29,840,262 >>> mbox cmd response data (12 bytes)
31,894,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,941,598 >>> mbox cmd response: success
38,942,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,974,698 UART:
38,975,000 UART: Running Caliptra FMC ...
38,976,212 UART:
38,976,375 UART: [state] CFI Enabled
39,020,411 UART: [art] Extend RT PCRs Done
39,021,609 UART: [art] Lock RT PCRs Done
39,023,238 UART: [art] Populate DV Done
39,028,596 UART: [fht] FMC Alias Private Key: 7
39,030,138 UART: [art] Derive CDI
39,030,921 UART: [art] Store in in slot 0x4
39,073,729 UART: [art] Derive Key Pair
39,074,738 UART: [art] Store priv key in slot 0x5
41,501,508 UART: [art] Derive Key Pair - Done
41,514,407 UART: [art] Signing Cert with AUTHO
41,515,722 UART: RITY.KEYID = 7
43,221,291 UART: [art] Erasing AUTHORITY.KEYID = 7
43,222,813 UART: [art] PUB.X = 8A8EE7C9EC62497C7B2F874BA29363F4223E600324E2C63411EC6FD8C13277E4818020D0D8A96E293E61E8F9E3895E27
43,230,041 UART: [art] PUB.Y = 83E888DF0EA617FB09BA33F3CAB139203D7FDE55D08CCC65BFE13425489D0C53261886F03D73A106B2A07A0FB6001331
43,237,305 UART: [art] SIG.R = ED6EAB687DCF3A58603840B0BED218943AF1B7B27E77C3367B904C3D8F0E04791EA570E134CE13F0FC16601A4C6049D3
43,244,713 UART: [art] SIG.S = 9453DB9225FFD2A2B297E2761C87A09AD4ECF4F53ACF92252F360649DBA02E79DF38836F6C91E3F77912441C364691FF
44,223,719 UART: Caliptra RT
44,224,403 UART: [state] CFI Enabled
44,513,192 UART: [rt] RT listening for mailbox commands...
44,545,061 UART: [rt]cmd =0x41545348, len=116
44,565,809 >>> mbox cmd response data (12 bytes)
44,566,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,597,571 UART: [rt]cmd =0x41545348, len=116
44,599,738 >>> mbox cmd response data (12 bytes)
48,627,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
48,783,392 UART: [rt]cmd =0x41544d4e, len=14344
52,778,739 >>> mbox cmd response data (8 bytes)
52,779,300 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,809,928 UART: [rt]cmd =0x41545348, len=116
52,829,637 >>> mbox cmd response data (12 bytes)
52,830,068 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,860,750 UART: [rt]cmd =0x41545348, len=116
52,863,361 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,642 UART:
192,994 UART: Running Caliptra ROM ...
194,187 UART:
194,342 UART: [state] CFI Enabled
262,960 UART: [state] LifecycleState = Unprovisioned
265,353 UART: [state] DebugLocked = No
267,388 UART: [state] WD Timer not started. Device not locked for debugging
272,717 UART: [kat] SHA2-256
462,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,350 UART: [kat] ++
473,799 UART: [kat] sha1
484,884 UART: [kat] SHA2-256
487,959 UART: [kat] SHA2-384
493,088 UART: [kat] SHA2-512-ACC
495,668 UART: [kat] ECC-384
2,947,851 UART: [kat] HMAC-384Kdf
2,972,754 UART: [kat] LMS
3,504,562 UART: [kat] --
3,508,111 UART: [cold-reset] ++
3,510,220 UART: [fht] FHT @ 0x50003400
3,521,344 UART: [idev] ++
3,522,056 UART: [idev] CDI.KEYID = 6
3,522,970 UART: [idev] SUBJECT.KEYID = 7
3,524,143 UART: [idev] UDS.KEYID = 0
3,525,185 ready_for_fw is high
3,525,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,849 UART: [idev] Erasing UDS.KEYID = 0
6,031,176 UART: [idev] Sha1 KeyId Algorithm
6,054,792 UART: [idev] --
6,059,917 UART: [ldev] ++
6,060,595 UART: [ldev] CDI.KEYID = 6
6,061,505 UART: [ldev] SUBJECT.KEYID = 5
6,062,682 UART: [ldev] AUTHORITY.KEYID = 7
6,063,915 UART: [ldev] FE.KEYID = 1
6,101,193 UART: [ldev] Erasing FE.KEYID = 1
8,604,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,584 UART: [ldev] --
10,416,442 UART: [fwproc] Wait for Commands...
10,418,324 UART: [fwproc] Recv command 0x46574c44
10,420,636 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,413 >>> mbox cmd response: success
14,600,593 UART: [afmc] ++
14,601,299 UART: [afmc] CDI.KEYID = 6
14,602,491 UART: [afmc] SUBJECT.KEYID = 7
14,603,934 UART: [afmc] AUTHORITY.KEYID = 5
17,150,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,143 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,350 UART: [afmc] --
18,967,413 UART: [cold-reset] --
18,970,749 UART: [state] Locking Datavault
18,977,261 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,419 UART: [state] Locking ICCM
18,982,302 UART: [exit] Launching FMC @ 0x40000130
18,990,964 UART:
18,991,198 UART: Running Caliptra FMC ...
18,992,296 UART:
18,992,450 UART: [state] CFI Enabled
19,051,022 UART: [fht] FMC Alias Private Key: 7
20,814,714 UART: [art] Extend RT PCRs Done
20,815,948 UART: [art] Lock RT PCRs Done
20,817,604 UART: [art] Populate DV Done
20,823,235 UART: [fht] FMC Alias Private Key: 7
20,824,822 UART: [art] Derive CDI
20,825,555 UART: [art] Store in in slot 0x4
20,883,728 UART: [art] Derive Key Pair
20,884,770 UART: [art] Store priv key in slot 0x5
23,347,294 UART: [art] Derive Key Pair - Done
23,360,560 UART: [art] Signing Cert with AUTHO
23,361,866 UART: RITY.KEYID = 7
25,073,209 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,718 UART: [art] PUB.X = DFA3BAED4D10EAF50A14924EB7349D457C252C997F0F2CA871014598AA6C55702D5655E7E5BED71E9E79FCBBCE2C9EE7
25,082,000 UART: [art] PUB.Y = F60BB59BA3160667C6B51B973CF1C7B4A118D8E0A937433868971A87B6FFF4B60E66993FBC2F4B85B63A0403F15E87E1
25,089,259 UART: [art] SIG.R = 56E39FCD06BD4AA16CC1B429B65F9958F9F2768259634670C72EF9F81A55EBF364C1A092FE8370F20D3A60E786450DD6
25,096,640 UART: [art] SIG.S = B8F2B85A6508BAF8A42F9B78A0EFCCA9FF791DDAF169E1069C50F2C2A3D1FB5287159173469E22E2B76D143E8E950068
26,074,692 UART: Caliptra RT
26,075,409 UART: [state] CFI Enabled
26,239,839 UART: [rt] RT listening for mailbox commands...
26,242,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,397,616 UART: [rt]cmd =0x41544d4e, len=14344
30,393,658 >>> mbox cmd response data (8 bytes)
30,394,245 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,425,031 UART: [rt]cmd =0x41545348, len=116
30,444,460 >>> mbox cmd response data (12 bytes)
30,445,464 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,476,328 UART: [rt]cmd =0x41545348, len=116
30,478,793 >>> mbox cmd response data (12 bytes)
32,533,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,678,301 UART:
32,678,660 UART: Running Caliptra ROM ...
32,679,788 UART:
32,679,955 UART: [state] CFI Enabled
32,749,751 UART: [state] LifecycleState = Unprovisioned
32,751,807 UART: [state] DebugLocked = No
32,754,220 UART: [state] WD Timer not started. Device not locked for debugging
32,758,566 UART: [kat] SHA2-256
32,948,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,959,168 UART: [kat] ++
32,959,669 UART: [kat] sha1
32,971,425 UART: [kat] SHA2-256
32,974,448 UART: [kat] SHA2-384
32,980,331 UART: [kat] SHA2-512-ACC
32,982,967 UART: [kat] ECC-384
35,434,220 UART: [kat] HMAC-384Kdf
35,458,133 UART: [kat] LMS
35,989,670 UART: [kat] --
35,994,280 UART: [update-reset] ++
39,453,584 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,456,288 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
40,062,352 >>> mbox cmd response: success
40,067,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,068,261 UART: [update-reset] Copying MAN_2 To MAN_1
40,100,710 UART: [update-reset Success] --
40,104,133 UART: [state] Locking Datavault
40,109,129 UART: [state] Locking PCR0, PCR1 and PCR31
40,111,292 UART: [state] Locking ICCM
40,113,123 UART: [exit] Launching FMC @ 0x40000130
40,121,805 UART:
40,122,037 UART: Running Caliptra FMC ...
40,123,139 UART:
40,123,295 UART: [state] CFI Enabled
40,226,153 UART: [art] Extend RT PCRs Done
40,227,346 UART: [art] Lock RT PCRs Done
40,228,912 UART: [art] Populate DV Done
40,234,316 UART: [fht] FMC Alias Private Key: 7
40,235,824 UART: [art] Derive CDI
40,236,592 UART: [art] Store in in slot 0x4
40,294,983 UART: [art] Derive Key Pair
40,295,983 UART: [art] Store priv key in slot 0x5
42,758,913 UART: [art] Derive Key Pair - Done
42,772,084 UART: [art] Signing Cert with AUTHO
42,773,394 UART: RITY.KEYID = 7
44,484,864 UART: [art] Erasing AUTHORITY.KEYID = 7
44,486,354 UART: [art] PUB.X = 1A734E5818DE1628D29751B0F0BD4C017F32B908561EA165BE72BDD37CD991607F9469EF6A0337B6A498428C83B754B6
44,493,641 UART: [art] PUB.Y = 3200A4FCDC0C06A544AB5264FCAD4D443D496D0250137A040113CEF499020883C881D8375CF539ACE1F0ED92DD6E1222
44,500,887 UART: [art] SIG.R = 5B757363ABD1E7B0F43756F06AFAE2E7CDFC9072E1202FFCFCEDB3545EC63AFC5E0DB6256D28CCDE528425011435A930
44,508,311 UART: [art] SIG.S = A91C4428CF9EA98007950ADDA458F61CC6A6FD7595213C6A624AA0248FA3CEE9BB392A39CC04BC5DB67E63EEBCB1001D
45,487,016 UART: Caliptra RT
45,487,736 UART: [state] CFI Enabled
45,823,183 UART: [rt] RT listening for mailbox commands...
45,855,281 UART: [rt]cmd =0x41545348, len=116
45,875,318 >>> mbox cmd response data (12 bytes)
45,876,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,907,249 UART: [rt]cmd =0x41545348, len=116
45,909,209 >>> mbox cmd response data (12 bytes)
49,933,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,088,612 UART: [rt]cmd =0x41544d4e, len=14344
54,084,039 >>> mbox cmd response data (8 bytes)
54,084,585 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,115,476 UART: [rt]cmd =0x41545348, len=116
54,135,454 >>> mbox cmd response data (12 bytes)
54,135,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,166,850 UART: [rt]cmd =0x41545348, len=116
54,169,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,438,835 ready_for_fw is high
3,439,238 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,726,480 >>> mbox cmd response: success
19,015,530 UART:
19,015,926 UART: Running Caliptra FMC ...
19,017,112 UART:
19,017,276 UART: [state] CFI Enabled
19,083,515 UART: [fht] FMC Alias Private Key: 7
20,846,459 UART: [art] Extend RT PCRs Done
20,847,675 UART: [art] Lock RT PCRs Done
20,849,159 UART: [art] Populate DV Done
20,854,618 UART: [fht] FMC Alias Private Key: 7
20,856,316 UART: [art] Derive CDI
20,857,127 UART: [art] Store in in slot 0x4
20,915,503 UART: [art] Derive Key Pair
20,916,577 UART: [art] Store priv key in slot 0x5
23,378,934 UART: [art] Derive Key Pair - Done
23,392,281 UART: [art] Signing Cert with AUTHO
23,393,589 UART: RITY.KEYID = 7
25,105,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,106,770 UART: [art] PUB.X = BCE0E8ED2A1FFEE73399709B1468886ED18CDF90E113424A7C8FA122C1846A8AF38DF7256CF99639EB3C223823811276
25,114,069 UART: [art] PUB.Y = E14388AA68769A21BC772F0C02ACD77264D2CBFAA47E63BD0E8E683A97A323F4571521DFBEA0553EEAA1FA4AF1EBAF60
25,121,317 UART: [art] SIG.R = 1DC00B59159C84402730B8357A27B0072124145DD05A171180936B8736222699F2AC7AD39647542FB051A103FF41C7E9
25,128,703 UART: [art] SIG.S = F2B1FB27EB4253131BA5D872DE014E4681A4976F059A1FA511627C19B9A508FA6A1284380735A69FBE19B2E52EAEB046
26,107,735 UART: Caliptra RT
26,108,449 UART: [state] CFI Enabled
26,273,055 UART: [rt] RT listening for mailbox commands...
26,275,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,430,775 UART: [rt]cmd =0x41544d4e, len=14344
30,426,569 >>> mbox cmd response data (8 bytes)
30,427,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,457,788 UART: [rt]cmd =0x41545348, len=116
30,477,982 >>> mbox cmd response data (12 bytes)
30,479,270 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,510,355 UART: [rt]cmd =0x41545348, len=116
30,512,537 >>> mbox cmd response data (12 bytes)
32,563,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,382,796 >>> mbox cmd response: success
40,383,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,419,005 UART:
40,419,339 UART: Running Caliptra FMC ...
40,420,555 UART:
40,420,740 UART: [state] CFI Enabled
40,509,760 UART: [art] Extend RT PCRs Done
40,510,952 UART: [art] Lock RT PCRs Done
40,512,299 UART: [art] Populate DV Done
40,517,809 UART: [fht] FMC Alias Private Key: 7
40,519,454 UART: [art] Derive CDI
40,520,262 UART: [art] Store in in slot 0x4
40,579,219 UART: [art] Derive Key Pair
40,580,251 UART: [art] Store priv key in slot 0x5
43,043,727 UART: [art] Derive Key Pair - Done
43,056,843 UART: [art] Signing Cert with AUTHO
43,058,156 UART: RITY.KEYID = 7
44,769,184 UART: [art] Erasing AUTHORITY.KEYID = 7
44,770,683 UART: [art] PUB.X = DB6F1CB57C924B9D1785354EBB6E96162999B162075D45C7768246FEC5D6BDA44B3027E6A3FB289096B90C7D802D69E3
44,777,912 UART: [art] PUB.Y = F1413CC2B61752AEEB6D2B4B439FB9B6CB7CCEA3E376516B83C914124946896694FF719BA4C84A6FE9322B0FE4243ABB
44,785,185 UART: [art] SIG.R = CD5E60B339D7E83AAE73A464C3E341F9F01F16F39E4BBC4E6095889626B6DCEB8798E102BF3166069B716179315D8071
44,792,579 UART: [art] SIG.S = C17C0EF289E42F8AB23AE4DB9D1D2CEBF22AE015FCE385B65C82FA89EFB66B68EDC1CEE5FDF8E3A2F53C0676C6EEE56D
45,771,450 UART: Caliptra RT
45,772,182 UART: [state] CFI Enabled
46,104,470 UART: [rt] RT listening for mailbox commands...
46,136,488 UART: [rt]cmd =0x41545348, len=116
46,156,285 >>> mbox cmd response data (12 bytes)
46,157,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,187,938 UART: [rt]cmd =0x41545348, len=116
46,190,282 >>> mbox cmd response data (12 bytes)
50,215,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,371,077 UART: [rt]cmd =0x41544d4e, len=14344
54,366,272 >>> mbox cmd response data (8 bytes)
54,366,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,397,759 UART: [rt]cmd =0x41545348, len=116
54,417,740 >>> mbox cmd response data (12 bytes)
54,418,165 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,448,701 UART: [rt]cmd =0x41545348, len=116
54,451,258 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
193,179 UART:
193,545 UART: Running Caliptra ROM ...
194,655 UART:
604,321 UART: [state] CFI Enabled
615,727 UART: [state] LifecycleState = Unprovisioned
618,112 UART: [state] DebugLocked = No
620,837 UART: [state] WD Timer not started. Device not locked for debugging
625,853 UART: [kat] SHA2-256
815,748 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,499 UART: [kat] ++
827,021 UART: [kat] sha1
838,680 UART: [kat] SHA2-256
841,701 UART: [kat] SHA2-384
848,551 UART: [kat] SHA2-512-ACC
851,138 UART: [kat] ECC-384
3,293,691 UART: [kat] HMAC-384Kdf
3,306,439 UART: [kat] LMS
3,838,281 UART: [kat] --
3,843,791 UART: [cold-reset] ++
3,845,014 UART: [fht] FHT @ 0x50003400
3,856,138 UART: [idev] ++
3,856,843 UART: [idev] CDI.KEYID = 6
3,857,722 UART: [idev] SUBJECT.KEYID = 7
3,858,965 UART: [idev] UDS.KEYID = 0
3,859,870 ready_for_fw is high
3,860,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,379 UART: [idev] Erasing UDS.KEYID = 0
6,336,141 UART: [idev] Sha1 KeyId Algorithm
6,359,260 UART: [idev] --
6,363,960 UART: [ldev] ++
6,364,697 UART: [ldev] CDI.KEYID = 6
6,365,606 UART: [ldev] SUBJECT.KEYID = 5
6,366,763 UART: [ldev] AUTHORITY.KEYID = 7
6,367,993 UART: [ldev] FE.KEYID = 1
6,378,638 UART: [ldev] Erasing FE.KEYID = 1
8,857,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,567 UART: [ldev] --
10,651,502 UART: [fwproc] Wait for Commands...
10,653,501 UART: [fwproc] Recv command 0x46574c44
10,655,756 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,855 >>> mbox cmd response: success
14,842,919 UART: [afmc] ++
14,843,629 UART: [afmc] CDI.KEYID = 6
14,844,741 UART: [afmc] SUBJECT.KEYID = 7
14,846,296 UART: [afmc] AUTHORITY.KEYID = 5
17,349,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,632 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,778 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,660 UART: [afmc] --
19,145,204 UART: [cold-reset] --
19,149,407 UART: [state] Locking Datavault
19,156,878 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,084 UART: [state] Locking ICCM
19,161,599 UART: [exit] Launching FMC @ 0x40000130
19,170,278 UART:
19,170,523 UART: Running Caliptra FMC ...
19,171,629 UART:
19,171,788 UART: [state] CFI Enabled
19,180,006 UART: [fht] FMC Alias Private Key: 7
20,937,218 UART: [art] Extend RT PCRs Done
20,938,438 UART: [art] Lock RT PCRs Done
20,939,875 UART: [art] Populate DV Done
20,945,189 UART: [fht] FMC Alias Private Key: 7
20,946,745 UART: [art] Derive CDI
20,947,486 UART: [art] Store in in slot 0x4
20,990,347 UART: [art] Derive Key Pair
20,991,346 UART: [art] Store priv key in slot 0x5
23,417,847 UART: [art] Derive Key Pair - Done
23,430,691 UART: [art] Signing Cert with AUTHO
23,432,006 UART: RITY.KEYID = 7
25,137,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,011 UART: [art] PUB.X = 33E984D8949CABDBAB407059AF1EC9F95C3A9B0C330098D3A44FD022977A3D22EDBC070102DF83884CAFA3A9CD14DE06
25,146,298 UART: [art] PUB.Y = 79C54C978D16B33CCB9431857FAAD9B53D919A89118F8159E0E2A5D16B03B733FA2D439B7C3FA4DF7F1E186CCA77C9AA
25,153,563 UART: [art] SIG.R = 993940144CAA6868C29A27C2F878C6F729277B07C809D385B56491CF9811E4BD43B2EFAD349AE73B16FC3C1DBA216266
25,160,933 UART: [art] SIG.S = 30BFC8D8ED0DD276EF3A25F59D2CAC6A4F0E93B372A44380DE4A46F8B0D3F7BD6BE7103E71D65644F1F7A0D616EF28BC
26,138,547 UART: Caliptra RT
26,139,266 UART: [state] CFI Enabled
26,257,134 UART: [rt] RT listening for mailbox commands...
26,259,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,414,733 UART: [rt]cmd =0x41544d4e, len=14344
30,410,395 >>> mbox cmd response data (8 bytes)
30,411,058 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,441,846 UART: [rt]cmd =0x41545348, len=116
30,461,171 >>> mbox cmd response data (12 bytes)
30,462,424 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,493,214 UART: [rt]cmd =0x41545348, len=116
30,495,424 >>> mbox cmd response data (12 bytes)
32,551,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,696,630 UART:
32,697,000 UART: Running Caliptra ROM ...
32,698,082 UART:
32,698,237 UART: [state] CFI Enabled
32,715,160 UART: [state] LifecycleState = Unprovisioned
32,717,066 UART: [state] DebugLocked = No
32,719,961 UART: [state] WD Timer not started. Device not locked for debugging
32,724,761 UART: [kat] SHA2-256
32,914,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,925,404 UART: [kat] ++
32,925,893 UART: [kat] sha1
32,938,336 UART: [kat] SHA2-256
32,941,312 UART: [kat] SHA2-384
32,947,211 UART: [kat] SHA2-512-ACC
32,949,801 UART: [kat] ECC-384
35,390,398 UART: [kat] HMAC-384Kdf
35,404,000 UART: [kat] LMS
35,935,570 UART: [kat] --
35,940,289 UART: [update-reset] ++
39,397,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,401,490 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
40,007,555 >>> mbox cmd response: success
40,012,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,012,921 UART: [update-reset] Copying MAN_2 To MAN_1
40,046,247 UART: [update-reset Success] --
40,051,582 UART: [state] Locking Datavault
40,056,146 UART: [state] Locking PCR0, PCR1 and PCR31
40,058,408 UART: [state] Locking ICCM
40,060,441 UART: [exit] Launching FMC @ 0x40000130
40,069,075 UART:
40,069,335 UART: Running Caliptra FMC ...
40,070,364 UART:
40,070,517 UART: [state] CFI Enabled
40,114,855 UART: [art] Extend RT PCRs Done
40,116,005 UART: [art] Lock RT PCRs Done
40,117,404 UART: [art] Populate DV Done
40,122,908 UART: [fht] FMC Alias Private Key: 7
40,124,430 UART: [art] Derive CDI
40,125,209 UART: [art] Store in in slot 0x4
40,168,387 UART: [art] Derive Key Pair
40,169,464 UART: [art] Store priv key in slot 0x5
42,595,816 UART: [art] Derive Key Pair - Done
42,609,077 UART: [art] Signing Cert with AUTHO
42,610,384 UART: RITY.KEYID = 7
44,316,133 UART: [art] Erasing AUTHORITY.KEYID = 7
44,317,651 UART: [art] PUB.X = 6DD1C279469ECDDFD7A91B218DBDF652F81EBE060EE632F31C207AC42248CB562EB8C8738F9C68739F33AE1C255CAB16
44,324,958 UART: [art] PUB.Y = CE3C3ECEDBF68C34BA21440BF4369C1E3736ECD63945E9AA22EED5151497F3D8718915CB65FEC703A6ECC825336D4027
44,332,171 UART: [art] SIG.R = C08C101DFBFE98A622445E01B37CFA122BDA98419AD9D68949B351690B9896E1D815C0E36213E48D21479325B335022E
44,339,592 UART: [art] SIG.S = F2C8D7DC927ED8335494DE070159CFD365D75F42E9689CB3E285A7819A1E9C9D6E41D0F601D1F1E11E54EADF2DB7207E
45,318,735 UART: Caliptra RT
45,319,427 UART: [state] CFI Enabled
45,607,037 UART: [rt] RT listening for mailbox commands...
45,638,967 UART: [rt]cmd =0x41545348, len=116
45,659,788 >>> mbox cmd response data (12 bytes)
45,660,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,691,707 UART: [rt]cmd =0x41545348, len=116
45,693,866 >>> mbox cmd response data (12 bytes)
49,719,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,874,735 UART: [rt]cmd =0x41544d4e, len=14344
53,870,534 >>> mbox cmd response data (8 bytes)
53,871,073 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,901,813 UART: [rt]cmd =0x41545348, len=116
53,922,591 >>> mbox cmd response data (12 bytes)
53,923,026 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,953,791 UART: [rt]cmd =0x41545348, len=116
53,955,985 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
3,755,499 ready_for_fw is high
3,755,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,643 >>> mbox cmd response: success
19,207,798 UART:
19,208,197 UART: Running Caliptra FMC ...
19,209,395 UART:
19,209,563 UART: [state] CFI Enabled
19,217,060 UART: [fht] FMC Alias Private Key: 7
20,973,046 UART: [art] Extend RT PCRs Done
20,974,279 UART: [art] Lock RT PCRs Done
20,975,907 UART: [art] Populate DV Done
20,981,159 UART: [fht] FMC Alias Private Key: 7
20,982,703 UART: [art] Derive CDI
20,983,519 UART: [art] Store in in slot 0x4
21,026,115 UART: [art] Derive Key Pair
21,027,114 UART: [art] Store priv key in slot 0x5
23,453,968 UART: [art] Derive Key Pair - Done
23,466,747 UART: [art] Signing Cert with AUTHO
23,468,065 UART: RITY.KEYID = 7
25,173,566 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,069 UART: [art] PUB.X = C1EE31E8043A824499E01BDBE832B2E0F9495560C62043DFD01BB5F07D015FCE98B4E4577FBC26F5E14D7E6A099B8439
25,182,348 UART: [art] PUB.Y = 9B9CF17876640F1848AC265179757689D28EB3D84971CDE8E9822DCD8691943A99957907CFF0C1BA3A94CC935BC38488
25,189,603 UART: [art] SIG.R = 50C21FB51D57494D55E3FEC54C5BF5F9B5808CD7D77A02B87F66297040AB47D3199946B8AEE83407F506DB33AA1FA500
25,196,977 UART: [art] SIG.S = 8D6E6A7D9F03640C7BB82480F82D1B3075FFCD03659A0F9E3695E417C990FEE437F618A7568C6432DC92987BEA839C76
26,175,671 UART: Caliptra RT
26,176,377 UART: [state] CFI Enabled
26,293,170 UART: [rt] RT listening for mailbox commands...
26,295,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,451,447 UART: [rt]cmd =0x41544d4e, len=14344
30,446,903 >>> mbox cmd response data (8 bytes)
30,447,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,478,209 UART: [rt]cmd =0x41545348, len=116
30,497,520 >>> mbox cmd response data (12 bytes)
30,498,660 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,529,230 UART: [rt]cmd =0x41545348, len=116
30,531,507 >>> mbox cmd response data (12 bytes)
32,584,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,309,119 >>> mbox cmd response: success
40,309,896 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,342,792 UART:
40,343,123 UART: Running Caliptra FMC ...
40,344,371 UART:
40,344,550 UART: [state] CFI Enabled
40,388,200 UART: [art] Extend RT PCRs Done
40,389,352 UART: [art] Lock RT PCRs Done
40,390,763 UART: [art] Populate DV Done
40,396,294 UART: [fht] FMC Alias Private Key: 7
40,397,892 UART: [art] Derive CDI
40,398,636 UART: [art] Store in in slot 0x4
40,441,339 UART: [art] Derive Key Pair
40,442,340 UART: [art] Store priv key in slot 0x5
42,868,763 UART: [art] Derive Key Pair - Done
42,882,037 UART: [art] Signing Cert with AUTHO
42,883,379 UART: RITY.KEYID = 7
44,588,786 UART: [art] Erasing AUTHORITY.KEYID = 7
44,590,291 UART: [art] PUB.X = 32C0727A405CA053C621C782EAE939A4B55E9A4A85F563B8C95776EB11EC3E9F55F1DF744C58B1DB35C887BF8DAB9043
44,597,585 UART: [art] PUB.Y = 35A6DD3FA901012366458FA6CAB1059FD7F3EB64B55C6FEE25C0B99327BEC7F886277F00D580CA11CD8CD3BCCB5EFF89
44,604,867 UART: [art] SIG.R = 7F882FC5A4D864DA6777E14DECF0991363B6F33F6748E9B7A3945A0BD40F10108640441C86CE66988279E82BCB9251DD
44,612,254 UART: [art] SIG.S = C36C4BD47228552E67FA913C08F0B6E0363709390D0A4E65C65BED55F2C5D66353161A6EDFBAFDE375A5A1D422556A29
45,590,965 UART: Caliptra RT
45,591,675 UART: [state] CFI Enabled
45,878,328 UART: [rt] RT listening for mailbox commands...
45,910,253 UART: [rt]cmd =0x41545348, len=116
45,930,075 >>> mbox cmd response data (12 bytes)
45,931,080 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,961,707 UART: [rt]cmd =0x41545348, len=116
45,963,537 >>> mbox cmd response data (12 bytes)
49,998,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,153,832 UART: [rt]cmd =0x41544d4e, len=14344
54,149,278 >>> mbox cmd response data (8 bytes)
54,149,826 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,180,785 UART: [rt]cmd =0x41545348, len=116
54,200,414 >>> mbox cmd response data (12 bytes)
54,200,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,231,621 UART: [rt]cmd =0x41545348, len=116
54,233,902 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,231 UART: [kat] SHA2-256
892,169 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,616 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,291 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,702 UART: [idev] Erasing UDS.KEYID = 0
1,505,432 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,515,067 UART: [ldev] ++
1,515,235 UART: [ldev] CDI.KEYID = 6
1,515,598 UART: [ldev] SUBJECT.KEYID = 5
1,516,024 UART: [ldev] AUTHORITY.KEYID = 7
1,516,487 UART: [ldev] FE.KEYID = 1
1,521,749 UART: [ldev] Erasing FE.KEYID = 1
1,547,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,380 UART: [ldev] --
1,586,785 UART: [fwproc] Waiting for Commands...
1,587,646 UART: [fwproc] Received command 0x46574c44
1,588,437 UART: [fwproc] Received Image of size 114084 bytes
2,882,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,884 >>> mbox cmd response: success
3,076,088 UART: [afmc] ++
3,076,256 UART: [afmc] CDI.KEYID = 6
3,076,618 UART: [afmc] SUBJECT.KEYID = 7
3,077,043 UART: [afmc] AUTHORITY.KEYID = 5
3,112,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,449 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,139 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,128 UART: [afmc] --
3,156,140 UART: [cold-reset] --
3,156,898 UART: [state] Locking Datavault
3,157,945 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,549 UART: [state] Locking ICCM
3,159,155 UART: [exit] Launching FMC @ 0x40000130
3,164,484 UART:
3,164,500 UART: Running Caliptra FMC ...
3,164,908 UART:
3,164,962 UART: [state] CFI Enabled
3,175,605 UART: [fht] FMC Alias Private Key: 7
3,282,956 UART: [art] Extend RT PCRs Done
3,283,384 UART: [art] Lock RT PCRs Done
3,285,022 UART: [art] Populate DV Done
3,293,235 UART: [fht] FMC Alias Private Key: 7
3,294,343 UART: [art] Derive CDI
3,294,623 UART: [art] Store in in slot 0x4
3,379,896 UART: [art] Derive Key Pair
3,380,256 UART: [art] Store priv key in slot 0x5
3,393,402 UART: [art] Derive Key Pair - Done
3,408,319 UART: [art] Signing Cert with AUTHO
3,408,799 UART: RITY.KEYID = 7
3,424,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,920 UART: [art] PUB.X = 83D711566B9132235325FD04EB7B14083740E07E956AE3B3F117D75CD91E5C97FD7AD23E8A25914E358B344A9CF9635D
3,431,682 UART: [art] PUB.Y = 92318BDD9461FC577E612396D679E247060A2662C90968A04B72DB7D1E3E2ED923068D51E04626022E54835A97533C43
3,438,603 UART: [art] SIG.R = 8BD7DD661F1283EB0FD675967E6160A8FA5F4338B223CB65C11CC20CD4C493FC9225B43480FADE0A306F05ACCD7103CB
3,445,372 UART: [art] SIG.S = DE08DC945BFD508E2594C4CFEA66F25022411047F0995A0364A69B9B21942FD356FCD541FCD8FBCA2799ACC15DCBC3B5
3,469,295 UART: Caliptra RT
3,469,548 UART: [state] CFI Enabled
3,578,300 UART: [rt] RT listening for mailbox commands...
3,578,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,196 UART: [rt]cmd =0x41544d4e, len=14344
4,012,172 >>> mbox cmd response data (8 bytes)
4,012,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,954 UART: [rt]cmd =0x41545348, len=116
4,064,005 >>> mbox cmd response data (12 bytes)
4,064,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,961 UART: [rt]cmd =0x41545348, len=116
4,095,774 >>> mbox cmd response data (12 bytes)
4,095,775 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,737 UART:
4,096,753 UART: Running Caliptra ROM ...
4,097,161 UART:
4,097,215 UART: [state] CFI Enabled
4,099,757 UART: [state] LifecycleState = Unprovisioned
4,100,412 UART: [state] DebugLocked = No
4,100,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,102,453 UART: [kat] SHA2-256
4,896,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,900,499 UART: [kat] ++
4,900,651 UART: [kat] sha1
4,904,811 UART: [kat] SHA2-256
4,906,749 UART: [kat] SHA2-384
4,909,504 UART: [kat] SHA2-512-ACC
4,911,404 UART: [kat] ECC-384
4,916,847 UART: [kat] HMAC-384Kdf
4,921,547 UART: [kat] LMS
5,489,743 UART: [kat] --
5,490,526 UART: [update-reset] ++
6,823,052 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,824,094 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,973,598 >>> mbox cmd response: success
6,973,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,973,767 UART: [update-reset] Copying MAN_2 To MAN_1
6,981,781 UART: [update-reset Success] --
6,982,894 UART: [state] Locking Datavault
6,983,646 UART: [state] Locking PCR0, PCR1 and PCR31
6,984,250 UART: [state] Locking ICCM
6,984,818 UART: [exit] Launching FMC @ 0x40000130
6,990,147 UART:
6,990,163 UART: Running Caliptra FMC ...
6,990,571 UART:
6,990,625 UART: [state] CFI Enabled
7,080,250 UART: [art] Extend RT PCRs Done
7,080,678 UART: [art] Lock RT PCRs Done
7,082,123 UART: [art] Populate DV Done
7,090,260 UART: [fht] FMC Alias Private Key: 7
7,091,284 UART: [art] Derive CDI
7,091,564 UART: [art] Store in in slot 0x4
7,176,897 UART: [art] Derive Key Pair
7,177,257 UART: [art] Store priv key in slot 0x5
7,190,447 UART: [art] Derive Key Pair - Done
7,205,319 UART: [art] Signing Cert with AUTHO
7,205,799 UART: RITY.KEYID = 7
7,220,803 UART: [art] Erasing AUTHORITY.KEYID = 7
7,221,568 UART: [art] PUB.X = 1AA5FC156FC74EDF8C0581460EC7FA767A8299D8F38E26D459E8373EB4752DEA05A259A1FA0C9C44B2ABF62D60C4CAA7
7,228,344 UART: [art] PUB.Y = 22ABECAC29108EFA27C461C65C1B5134C5A1BB682998AD29176ACCD537E1C08E014B3729AB208DACB0A293EF43582BB8
7,235,305 UART: [art] SIG.R = 15C2E7D34FB3220B6425B9423FA8758BCAB80A79BF75ADBF7700B1C69630440F6E4DA2B02C271364E121E11E32894EBF
7,242,050 UART: [art] SIG.S = 4556E172E2A6814FB919D962A0B27303D291DFAA7EF16EB58C41C3C6BDF9D8458E7B1ED43E8C10E3F54E923F68BFBC3F
7,265,816 UART: Caliptra RT
7,266,069 UART: [state] CFI Enabled
7,547,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,578,220 UART: [rt]cmd =0x41545348, len=116
7,600,309 >>> mbox cmd response data (12 bytes)
7,600,310 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,630,493 UART: [rt]cmd =0x41545348, len=116
7,632,298 >>> mbox cmd response data (12 bytes)
7,632,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,754,700 UART: [rt]cmd =0x41544d4e, len=14344
8,064,688 >>> mbox cmd response data (8 bytes)
8,064,689 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,094,988 UART: [rt]cmd =0x41545348, len=116
8,117,051 >>> mbox cmd response data (12 bytes)
8,117,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,146,963 UART: [rt]cmd =0x41545348, len=116
8,148,807 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,117 ready_for_fw is high
1,362,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,284 >>> mbox cmd response: success
2,986,302 UART:
2,986,318 UART: Running Caliptra FMC ...
2,986,726 UART:
2,986,780 UART: [state] CFI Enabled
2,997,071 UART: [fht] FMC Alias Private Key: 7
3,105,112 UART: [art] Extend RT PCRs Done
3,105,540 UART: [art] Lock RT PCRs Done
3,106,990 UART: [art] Populate DV Done
3,115,273 UART: [fht] FMC Alias Private Key: 7
3,116,221 UART: [art] Derive CDI
3,116,501 UART: [art] Store in in slot 0x4
3,202,238 UART: [art] Derive Key Pair
3,202,598 UART: [art] Store priv key in slot 0x5
3,215,704 UART: [art] Derive Key Pair - Done
3,230,543 UART: [art] Signing Cert with AUTHO
3,231,023 UART: RITY.KEYID = 7
3,245,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,742 UART: [art] PUB.X = FCFE9D1770453BD6F95B3890AB1DEC83C6231B26D14753D3B07FF62E9195A6E73A170A5AC7C1798CFD4A160D66F1C666
3,253,516 UART: [art] PUB.Y = 9E9E98AFD454EC92850CC9B36FFE81EDBD76B903A94CD7E4B078C4A6019B92EE179E696D84A12CF6A03AEDDEDE01F8FD
3,260,480 UART: [art] SIG.R = 66EBC797898C9822DFB8580604A9BC2DF6B38AC03D2F41158558074802E786F7E0CF4D423BF9CA9E2E7AFB6130DB35E8
3,267,246 UART: [art] SIG.S = 9BAB2BCBF71A500DAFFC43BF20109981D67E181CD7918B1FB366F07DAFE3B65A77B2CFC2B226C3026BADF9832E4D86F7
3,291,287 UART: Caliptra RT
3,291,540 UART: [state] CFI Enabled
3,398,729 UART: [rt] RT listening for mailbox commands...
3,399,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,569 UART: [rt]cmd =0x41544d4e, len=14344
3,832,351 >>> mbox cmd response data (8 bytes)
3,832,352 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,251 UART: [rt]cmd =0x41545348, len=116
3,883,128 >>> mbox cmd response data (12 bytes)
3,883,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,120 UART: [rt]cmd =0x41545348, len=116
3,914,795 >>> mbox cmd response data (12 bytes)
3,914,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,673,373 >>> mbox cmd response: success
6,673,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,686,712 UART:
6,686,728 UART: Running Caliptra FMC ...
6,687,136 UART:
6,687,190 UART: [state] CFI Enabled
6,775,953 UART: [art] Extend RT PCRs Done
6,776,381 UART: [art] Lock RT PCRs Done
6,777,754 UART: [art] Populate DV Done
6,786,051 UART: [fht] FMC Alias Private Key: 7
6,787,151 UART: [art] Derive CDI
6,787,431 UART: [art] Store in in slot 0x4
6,873,398 UART: [art] Derive Key Pair
6,873,758 UART: [art] Store priv key in slot 0x5
6,887,000 UART: [art] Derive Key Pair - Done
6,901,768 UART: [art] Signing Cert with AUTHO
6,902,248 UART: RITY.KEYID = 7
6,917,362 UART: [art] Erasing AUTHORITY.KEYID = 7
6,918,127 UART: [art] PUB.X = 0357161407241E957BC3AC596A8F9108CB4100F4F62D20F376B95D982E10948ABF74A10E0236A0701DD67D5452BAF842
6,924,854 UART: [art] PUB.Y = 30DC33E1732D0A78A310C8EA1E713C5CBEFB56D6D4D012B4BBF92D411A2C76AD717D19A3B5C6B11C84C423387FC7BE6C
6,931,819 UART: [art] SIG.R = 6AF01FB6A0700C4EC9CC900D7C39D9129910C947D864BC252DB175C968E956ED91F7CFA2B4A0C18F8FF074C2551755C2
6,938,591 UART: [art] SIG.S = 6BB01CCCBA509D88C9D0B9198F2422FC26E4EDEBD72C871FBD2BC09A864753F59FECD3F2DDB4CBDAFAC9CC06485CAEEC
6,962,095 UART: Caliptra RT
6,962,348 UART: [state] CFI Enabled
7,247,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,278,377 UART: [rt]cmd =0x41545348, len=116
7,299,916 >>> mbox cmd response data (12 bytes)
7,299,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,329,984 UART: [rt]cmd =0x41545348, len=116
7,332,013 >>> mbox cmd response data (12 bytes)
7,332,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,454,699 UART: [rt]cmd =0x41544d4e, len=14344
7,764,427 >>> mbox cmd response data (8 bytes)
7,764,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,794,525 UART: [rt]cmd =0x41545348, len=116
7,816,232 >>> mbox cmd response data (12 bytes)
7,816,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,846,310 UART: [rt]cmd =0x41545348, len=116
7,848,034 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,978 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,221 UART: [idev] ++
1,480,389 UART: [idev] CDI.KEYID = 6
1,480,749 UART: [idev] SUBJECT.KEYID = 7
1,481,173 UART: [idev] UDS.KEYID = 0
1,481,518 ready_for_fw is high
1,481,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,857 UART: [idev] --
1,514,770 UART: [ldev] ++
1,514,938 UART: [ldev] CDI.KEYID = 6
1,515,301 UART: [ldev] SUBJECT.KEYID = 5
1,515,727 UART: [ldev] AUTHORITY.KEYID = 7
1,516,190 UART: [ldev] FE.KEYID = 1
1,521,300 UART: [ldev] Erasing FE.KEYID = 1
1,546,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,697 UART: [ldev] --
1,586,076 UART: [fwproc] Waiting for Commands...
1,586,731 UART: [fwproc] Received command 0x46574c44
1,587,522 UART: [fwproc] Received Image of size 114084 bytes
2,882,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,087 >>> mbox cmd response: success
3,076,339 UART: [afmc] ++
3,076,507 UART: [afmc] CDI.KEYID = 6
3,076,869 UART: [afmc] SUBJECT.KEYID = 7
3,077,294 UART: [afmc] AUTHORITY.KEYID = 5
3,111,945 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,051 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,444 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,134 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,015 UART: [afmc] --
3,155,075 UART: [cold-reset] --
3,155,999 UART: [state] Locking Datavault
3,156,926 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,530 UART: [state] Locking ICCM
3,157,984 UART: [exit] Launching FMC @ 0x40000130
3,163,313 UART:
3,163,329 UART: Running Caliptra FMC ...
3,163,737 UART:
3,163,880 UART: [state] CFI Enabled
3,174,221 UART: [fht] FMC Alias Private Key: 7
3,282,364 UART: [art] Extend RT PCRs Done
3,282,792 UART: [art] Lock RT PCRs Done
3,284,360 UART: [art] Populate DV Done
3,292,239 UART: [fht] FMC Alias Private Key: 7
3,293,399 UART: [art] Derive CDI
3,293,679 UART: [art] Store in in slot 0x4
3,379,470 UART: [art] Derive Key Pair
3,379,830 UART: [art] Store priv key in slot 0x5
3,393,454 UART: [art] Derive Key Pair - Done
3,408,085 UART: [art] Signing Cert with AUTHO
3,408,565 UART: RITY.KEYID = 7
3,423,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,694 UART: [art] PUB.X = E52C128285DBEE191EF512A6A57FEE6C94ECC584CFBC4BB86A875A1C42F1BA665B2D6A832443664297BE9FE47C51914A
3,431,478 UART: [art] PUB.Y = 24FE5EC353C01D9295BB482C157B76651EFF90933A1D1129E6B7285073EF3770D718B5571F6EA683BC5164B8911F9093
3,438,422 UART: [art] SIG.R = 9A2B8EE1EB3B0E7572BF6CA7E02DEADD2F2DBECC87464B894E36FD8ACFE8D4C1A78FCAD3A789D45D614447DB2030CA08
3,445,216 UART: [art] SIG.S = 4B6E827CF378415CF5377CD4008E3EDA15F7D9D747E8B5AD549C56684A79C508C14CEE1E8F3FEC6E1993EF470EF686D3
3,468,769 UART: Caliptra RT
3,469,114 UART: [state] CFI Enabled
3,577,233 UART: [rt] RT listening for mailbox commands...
3,577,903 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,939 UART: [rt]cmd =0x41544d4e, len=14344
4,010,403 >>> mbox cmd response data (8 bytes)
4,010,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,407 UART: [rt]cmd =0x41545348, len=116
4,061,506 >>> mbox cmd response data (12 bytes)
4,061,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,372 UART: [rt]cmd =0x41545348, len=116
4,093,067 >>> mbox cmd response data (12 bytes)
4,093,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,832 UART:
4,093,848 UART: Running Caliptra ROM ...
4,094,256 UART:
4,094,397 UART: [state] CFI Enabled
4,097,167 UART: [state] LifecycleState = Unprovisioned
4,097,822 UART: [state] DebugLocked = No
4,098,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,100,119 UART: [kat] SHA2-256
4,894,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,898,165 UART: [kat] ++
4,898,317 UART: [kat] sha1
4,902,637 UART: [kat] SHA2-256
4,904,575 UART: [kat] SHA2-384
4,907,494 UART: [kat] SHA2-512-ACC
4,909,394 UART: [kat] ECC-384
4,914,915 UART: [kat] HMAC-384Kdf
4,919,341 UART: [kat] LMS
5,487,537 UART: [kat] --
5,488,392 UART: [update-reset] ++
6,819,886 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,820,942 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,970,446 >>> mbox cmd response: success
6,970,446 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,970,791 UART: [update-reset] Copying MAN_2 To MAN_1
6,978,805 UART: [update-reset Success] --
6,979,582 UART: [state] Locking Datavault
6,980,488 UART: [state] Locking PCR0, PCR1 and PCR31
6,981,092 UART: [state] Locking ICCM
6,981,700 UART: [exit] Launching FMC @ 0x40000130
6,987,029 UART:
6,987,045 UART: Running Caliptra FMC ...
6,987,453 UART:
6,987,596 UART: [state] CFI Enabled
7,077,151 UART: [art] Extend RT PCRs Done
7,077,579 UART: [art] Lock RT PCRs Done
7,078,932 UART: [art] Populate DV Done
7,087,289 UART: [fht] FMC Alias Private Key: 7
7,088,455 UART: [art] Derive CDI
7,088,735 UART: [art] Store in in slot 0x4
7,174,548 UART: [art] Derive Key Pair
7,174,908 UART: [art] Store priv key in slot 0x5
7,187,606 UART: [art] Derive Key Pair - Done
7,202,381 UART: [art] Signing Cert with AUTHO
7,202,861 UART: RITY.KEYID = 7
7,218,455 UART: [art] Erasing AUTHORITY.KEYID = 7
7,219,220 UART: [art] PUB.X = 24DC03D932B85A72A3DB05811D2B099FE73166FE5E6CC705F73C8B2CB8F460BA4922357D73E9B9AF076A196F82F76586
7,225,979 UART: [art] PUB.Y = BBB15C11641356C040176BB624F229148910D0EB74673DFCB596F7B0A0CD620BB22870E4F1CA96D6A0221D891722CF28
7,232,926 UART: [art] SIG.R = 85CBDDA89637C95CD46E32FFA136EBB7B65DD60191308ECF26A34FADB5196F46B27E68E1EE3C9D2926F0A891A6C9DBD1
7,239,713 UART: [art] SIG.S = 05FA9D241EEE2DA7AED3C4FB4FD443255ED16A4E29F652F39A484ABFBC4C84BA50EA44DF2BE6B1EA53CA5A6807692449
7,263,824 UART: Caliptra RT
7,264,169 UART: [state] CFI Enabled
7,541,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,572,987 UART: [rt]cmd =0x41545348, len=116
7,594,916 >>> mbox cmd response data (12 bytes)
7,594,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,625,194 UART: [rt]cmd =0x41545348, len=116
7,627,205 >>> mbox cmd response data (12 bytes)
7,627,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,749,983 UART: [rt]cmd =0x41544d4e, len=14344
8,059,953 >>> mbox cmd response data (8 bytes)
8,059,954 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,090,043 UART: [rt]cmd =0x41545348, len=116
8,112,210 >>> mbox cmd response data (12 bytes)
8,112,211 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,142,330 UART: [rt]cmd =0x41545348, len=116
8,143,952 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,360 ready_for_fw is high
1,362,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,737 >>> mbox cmd response: success
2,983,727 UART:
2,983,743 UART: Running Caliptra FMC ...
2,984,151 UART:
2,984,294 UART: [state] CFI Enabled
2,994,889 UART: [fht] FMC Alias Private Key: 7
3,103,212 UART: [art] Extend RT PCRs Done
3,103,640 UART: [art] Lock RT PCRs Done
3,105,032 UART: [art] Populate DV Done
3,113,219 UART: [fht] FMC Alias Private Key: 7
3,114,225 UART: [art] Derive CDI
3,114,505 UART: [art] Store in in slot 0x4
3,200,746 UART: [art] Derive Key Pair
3,201,106 UART: [art] Store priv key in slot 0x5
3,214,304 UART: [art] Derive Key Pair - Done
3,228,899 UART: [art] Signing Cert with AUTHO
3,229,379 UART: RITY.KEYID = 7
3,244,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,482 UART: [art] PUB.X = AD21C37DF5499C3D36773F4A7C655C1921A16DD85287142389F88B86D3D40BDC3F884747362DA1E31925327B386B6B6B
3,252,245 UART: [art] PUB.Y = F8DA69E00B5C23DFD1C4E35E6D4FFAF5D7626B2BA679AC4500841A6F001AFDD599DE82AFF1C311BC7DF4E81CD8925865
3,259,170 UART: [art] SIG.R = 3805A8513C2CCB851BF8B28F7D32CF88F8C11853E24463E36102886E1FBF3F6C9039A744D167B003F982E82D22D3C3F7
3,265,931 UART: [art] SIG.S = BDFE725EADCE3879C4D80E585655772E95179031167B16C427D1C198F42BE06FA653B04B2B039591DF7C7D2541361929
3,289,738 UART: Caliptra RT
3,290,083 UART: [state] CFI Enabled
3,397,492 UART: [rt] RT listening for mailbox commands...
3,398,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,024 UART: [rt]cmd =0x41544d4e, len=14344
3,830,386 >>> mbox cmd response data (8 bytes)
3,830,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,560 UART: [rt]cmd =0x41545348, len=116
3,881,713 >>> mbox cmd response data (12 bytes)
3,881,714 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,735 UART: [rt]cmd =0x41545348, len=116
3,913,308 >>> mbox cmd response data (12 bytes)
3,913,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,671,565 >>> mbox cmd response: success
6,671,565 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,685,018 UART:
6,685,034 UART: Running Caliptra FMC ...
6,685,442 UART:
6,685,585 UART: [state] CFI Enabled
6,774,946 UART: [art] Extend RT PCRs Done
6,775,374 UART: [art] Lock RT PCRs Done
6,776,531 UART: [art] Populate DV Done
6,784,862 UART: [fht] FMC Alias Private Key: 7
6,785,838 UART: [art] Derive CDI
6,786,118 UART: [art] Store in in slot 0x4
6,871,843 UART: [art] Derive Key Pair
6,872,203 UART: [art] Store priv key in slot 0x5
6,885,281 UART: [art] Derive Key Pair - Done
6,899,763 UART: [art] Signing Cert with AUTHO
6,900,243 UART: RITY.KEYID = 7
6,915,287 UART: [art] Erasing AUTHORITY.KEYID = 7
6,916,052 UART: [art] PUB.X = 179324A49B9838186122FC29296C3556741CB5CF932CF99FF3A1079FC38B896EDB864D5842D2F4E8812362F2E68418AB
6,922,813 UART: [art] PUB.Y = 696024F26948A1373AEA1BB38A4BE7B7F66DBF338C8FF2DE9BD5CA62D90FC0DCF2058278E878ABF6E475056C0FF4664C
6,929,767 UART: [art] SIG.R = D9FF777499A0322DC29A590B34FD5E36A27800350504894B628DF1684B373DDA246C9DD1AEC8001C8804B21B5C0E44E4
6,936,478 UART: [art] SIG.S = 8767447F7F85FAB7DA01E33019C49FA00B333BFC670F0753832E3BDA4660322C3437F5EC1DD1996D3C40E26F114DAE53
6,960,007 UART: Caliptra RT
6,960,352 UART: [state] CFI Enabled
7,242,456 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,273,273 UART: [rt]cmd =0x41545348, len=116
7,295,356 >>> mbox cmd response data (12 bytes)
7,295,357 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,325,562 UART: [rt]cmd =0x41545348, len=116
7,327,063 >>> mbox cmd response data (12 bytes)
7,327,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,449,639 UART: [rt]cmd =0x41544d4e, len=14344
7,759,577 >>> mbox cmd response data (8 bytes)
7,759,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,789,729 UART: [rt]cmd =0x41545348, len=116
7,812,080 >>> mbox cmd response data (12 bytes)
7,812,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,842,232 UART: [rt]cmd =0x41545348, len=116
7,844,070 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,153 UART: [kat] SHA2-256
904,093 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,890 UART: [kat] HMAC-384Kdf
923,426 UART: [kat] LMS
1,171,754 UART: [kat] --
1,172,669 UART: [cold-reset] ++
1,173,115 UART: [fht] FHT @ 0x50003400
1,175,938 UART: [idev] ++
1,176,106 UART: [idev] CDI.KEYID = 6
1,176,466 UART: [idev] SUBJECT.KEYID = 7
1,176,890 UART: [idev] UDS.KEYID = 0
1,177,235 ready_for_fw is high
1,177,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,734 UART: [idev] Erasing UDS.KEYID = 0
1,202,469 UART: [idev] Sha1 KeyId Algorithm
1,210,855 UART: [idev] --
1,211,879 UART: [ldev] ++
1,212,047 UART: [ldev] CDI.KEYID = 6
1,212,410 UART: [ldev] SUBJECT.KEYID = 5
1,212,836 UART: [ldev] AUTHORITY.KEYID = 7
1,213,299 UART: [ldev] FE.KEYID = 1
1,218,611 UART: [ldev] Erasing FE.KEYID = 1
1,245,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,685 UART: [ldev] --
1,283,998 UART: [fwproc] Wait for Commands...
1,284,692 UART: [fwproc] Recv command 0x46574c44
1,285,420 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,947 >>> mbox cmd response: success
2,775,025 UART: [afmc] ++
2,775,193 UART: [afmc] CDI.KEYID = 6
2,775,555 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,746 UART: [afmc] --
2,854,696 UART: [cold-reset] --
2,855,480 UART: [state] Locking Datavault
2,856,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,169 UART: [state] Locking ICCM
2,857,807 UART: [exit] Launching FMC @ 0x40000130
2,863,136 UART:
2,863,152 UART: Running Caliptra FMC ...
2,863,560 UART:
2,863,614 UART: [state] CFI Enabled
2,874,141 UART: [fht] FMC Alias Private Key: 7
2,981,750 UART: [art] Extend RT PCRs Done
2,982,178 UART: [art] Lock RT PCRs Done
2,983,546 UART: [art] Populate DV Done
2,991,761 UART: [fht] FMC Alias Private Key: 7
2,992,757 UART: [art] Derive CDI
2,993,037 UART: [art] Store in in slot 0x4
3,078,666 UART: [art] Derive Key Pair
3,079,026 UART: [art] Store priv key in slot 0x5
3,092,302 UART: [art] Derive Key Pair - Done
3,107,217 UART: [art] Signing Cert with AUTHO
3,107,697 UART: RITY.KEYID = 7
3,122,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,756 UART: [art] PUB.X = 3AAB08D875A319696D65945FC81C6CFEF0C462D9880342261818B15DFDC8812F5FC15F12283055B4FE555461EF056986
3,130,513 UART: [art] PUB.Y = C29CAAEAED8562D780C626416DD2E94B151A094379A040D4B84B9CF47D9CF1A6A6816783F3D800B2AF6D6A4525BAE274
3,137,448 UART: [art] SIG.R = 5B4DB652BCEF5069CC7A38372866784A265FFC77F09A7FD9C9E26121F5FDA779465BBED7993E142FC1888B602666AABD
3,144,228 UART: [art] SIG.S = 953DF4D87DA2265714A96C56C6EF64B1A93E453054375AEC1BEEB22B53BCE31F4E8CD3680D11661DBE7DE2DA402EF493
3,167,510 UART: Caliptra RT
3,167,763 UART: [state] CFI Enabled
3,275,130 UART: [rt] RT listening for mailbox commands...
3,275,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,978 UART: [rt]cmd =0x41544d4e, len=14344
3,708,496 >>> mbox cmd response data (8 bytes)
3,708,497 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,744 UART: [rt]cmd =0x41545348, len=116
3,760,519 >>> mbox cmd response data (12 bytes)
3,760,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,697 UART: [rt]cmd =0x41545348, len=116
3,792,328 >>> mbox cmd response data (12 bytes)
3,792,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,098 UART:
3,793,114 UART: Running Caliptra ROM ...
3,793,522 UART:
3,793,577 UART: [state] CFI Enabled
3,796,425 UART: [state] LifecycleState = Unprovisioned
3,797,080 UART: [state] DebugLocked = No
3,797,640 UART: [state] WD Timer not started. Device not locked for debugging
3,798,758 UART: [kat] SHA2-256
4,604,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,608,533 UART: [kat] ++
4,608,685 UART: [kat] sha1
4,612,921 UART: [kat] SHA2-256
4,614,861 UART: [kat] SHA2-384
4,617,378 UART: [kat] SHA2-512-ACC
4,619,278 UART: [kat] ECC-384
4,629,187 UART: [kat] HMAC-384Kdf
4,633,987 UART: [kat] LMS
4,882,315 UART: [kat] --
4,883,149 UART: [update-reset] ++
6,194,017 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,195,092 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,344,544 >>> mbox cmd response: success
6,344,544 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,344,839 UART: [update-reset] Copying MAN_2 To MAN_1
6,352,853 UART: [update-reset Success] --
6,353,714 UART: [state] Locking Datavault
6,354,424 UART: [state] Locking PCR0, PCR1 and PCR31
6,355,028 UART: [state] Locking ICCM
6,355,450 UART: [exit] Launching FMC @ 0x40000130
6,360,779 UART:
6,360,795 UART: Running Caliptra FMC ...
6,361,203 UART:
6,361,257 UART: [state] CFI Enabled
6,450,902 UART: [art] Extend RT PCRs Done
6,451,330 UART: [art] Lock RT PCRs Done
6,452,611 UART: [art] Populate DV Done
6,460,912 UART: [fht] FMC Alias Private Key: 7
6,461,994 UART: [art] Derive CDI
6,462,274 UART: [art] Store in in slot 0x4
6,547,995 UART: [art] Derive Key Pair
6,548,355 UART: [art] Store priv key in slot 0x5
6,561,359 UART: [art] Derive Key Pair - Done
6,576,081 UART: [art] Signing Cert with AUTHO
6,576,561 UART: RITY.KEYID = 7
6,591,647 UART: [art] Erasing AUTHORITY.KEYID = 7
6,592,412 UART: [art] PUB.X = 4281C42D6A27698A6B8C445F6F8123D665863E3B0C7C81B94719C9D470832798269E8BF9704649B84081FCB9FB33368C
6,599,169 UART: [art] PUB.Y = E8ADF3F53DDDDBAFD7ADABDFE25FC74DE90AE647AB3804E5FB0E13E40FD6210081818E8C405BF6D2BA0ED251C47888C0
6,606,112 UART: [art] SIG.R = BFFD35889497489B8A30585EC8038896995791514F21D1953CD448BE4C5CF319792B835BD77FEFE8DD11305F8EFE3ABA
6,612,883 UART: [art] SIG.S = 7DE670C224DDE3BCBDD26DA5DE5111B68ED510620DC7624573D734D44FF56B4B7A5ABEAE7EBEAFF352B75145177DA3DE
6,636,755 UART: Caliptra RT
6,637,008 UART: [state] CFI Enabled
6,911,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,942,622 UART: [rt]cmd =0x41545348, len=116
6,963,861 >>> mbox cmd response data (12 bytes)
6,963,862 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,994,143 UART: [rt]cmd =0x41545348, len=116
6,995,864 >>> mbox cmd response data (12 bytes)
6,995,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,118,424 UART: [rt]cmd =0x41544d4e, len=14344
7,428,172 >>> mbox cmd response data (8 bytes)
7,428,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,458,234 UART: [rt]cmd =0x41545348, len=116
7,480,039 >>> mbox cmd response data (12 bytes)
7,480,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,509,931 UART: [rt]cmd =0x41545348, len=116
7,511,593 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,545 ready_for_fw is high
1,059,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,092 >>> mbox cmd response: success
2,685,064 UART:
2,685,080 UART: Running Caliptra FMC ...
2,685,488 UART:
2,685,542 UART: [state] CFI Enabled
2,695,845 UART: [fht] FMC Alias Private Key: 7
2,803,412 UART: [art] Extend RT PCRs Done
2,803,840 UART: [art] Lock RT PCRs Done
2,805,530 UART: [art] Populate DV Done
2,813,643 UART: [fht] FMC Alias Private Key: 7
2,814,575 UART: [art] Derive CDI
2,814,855 UART: [art] Store in in slot 0x4
2,900,344 UART: [art] Derive Key Pair
2,900,704 UART: [art] Store priv key in slot 0x5
2,914,286 UART: [art] Derive Key Pair - Done
2,929,412 UART: [art] Signing Cert with AUTHO
2,929,892 UART: RITY.KEYID = 7
2,944,486 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,251 UART: [art] PUB.X = 856FF4979B38BE54A5DD28F0D9CEFF5DCBC11A7DF6575AA8A8BE4699A9430A5207D7D8B3B14B963C60D2425177B3E0D3
2,952,029 UART: [art] PUB.Y = 55A2DEA74790240E1949E784D716EFD4F1B28A8D5A2100C7C067A60F0CED9C04C3173C4200E178A04D4458ACD046D375
2,958,925 UART: [art] SIG.R = 28926EDFBB27ECC10F3F40405DBEA30834CA1F37046BD8F360115898FF8EF0785DADDA93CD435750D2B14E3FE7B2E91E
2,965,702 UART: [art] SIG.S = 4EC313B96BC614FB61E74A410953BE8AAC9A20DCCE8C71AC646EF7E005E24CF5D46D6B9888B5842A9FBB07F6B8B08ED9
2,989,514 UART: Caliptra RT
2,989,767 UART: [state] CFI Enabled
3,096,574 UART: [rt] RT listening for mailbox commands...
3,097,244 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,142 UART: [rt]cmd =0x41544d4e, len=14344
3,530,396 >>> mbox cmd response data (8 bytes)
3,530,397 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,450 UART: [rt]cmd =0x41545348, len=116
3,582,945 >>> mbox cmd response data (12 bytes)
3,582,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,187 UART: [rt]cmd =0x41545348, len=116
3,614,990 >>> mbox cmd response data (12 bytes)
3,614,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,195 >>> mbox cmd response: success
6,047,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,060,869 UART:
6,060,885 UART: Running Caliptra FMC ...
6,061,293 UART:
6,061,347 UART: [state] CFI Enabled
6,150,512 UART: [art] Extend RT PCRs Done
6,150,940 UART: [art] Lock RT PCRs Done
6,152,039 UART: [art] Populate DV Done
6,160,420 UART: [fht] FMC Alias Private Key: 7
6,161,366 UART: [art] Derive CDI
6,161,646 UART: [art] Store in in slot 0x4
6,247,505 UART: [art] Derive Key Pair
6,247,865 UART: [art] Store priv key in slot 0x5
6,261,325 UART: [art] Derive Key Pair - Done
6,276,166 UART: [art] Signing Cert with AUTHO
6,276,646 UART: RITY.KEYID = 7
6,291,822 UART: [art] Erasing AUTHORITY.KEYID = 7
6,292,587 UART: [art] PUB.X = D53ED3E654302228699A049F35EBA2791484CC18FA82B937713DB85269DF80531B9603F72FD3065CAE9D8D6478CFE6CD
6,299,350 UART: [art] PUB.Y = 49622C4E699070CFD6F92D207D922844B3948016C675459A32E01F519819EEFF6B341BCEB1DF38C3407A4A5509094ED0
6,306,290 UART: [art] SIG.R = CD8277ABA1087872FA057FC944458B06DC562A4B64D9388688D6CAF48A29A2CED2006BE29AE90BA7E9AA0DF2BDAB49CE
6,313,043 UART: [art] SIG.S = 3F9A88BDA539ED953BCFE8E10AEA70AD3F304AB0450E6BE4CC0DCD7D93B296BD85D39989E93CACDBC515D4348207E1B7
6,336,612 UART: Caliptra RT
6,336,865 UART: [state] CFI Enabled
6,623,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,654,489 UART: [rt]cmd =0x41545348, len=116
6,676,534 >>> mbox cmd response data (12 bytes)
6,676,535 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,706,782 UART: [rt]cmd =0x41545348, len=116
6,708,541 >>> mbox cmd response data (12 bytes)
6,708,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,831,245 UART: [rt]cmd =0x41544d4e, len=14344
7,140,925 >>> mbox cmd response data (8 bytes)
7,140,926 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,171,125 UART: [rt]cmd =0x41545348, len=116
7,193,352 >>> mbox cmd response data (12 bytes)
7,193,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,223,406 UART: [rt]cmd =0x41545348, len=116
7,225,114 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,965 UART: [kat] HMAC-384Kdf
923,573 UART: [kat] LMS
1,171,901 UART: [kat] --
1,172,886 UART: [cold-reset] ++
1,173,352 UART: [fht] FHT @ 0x50003400
1,176,123 UART: [idev] ++
1,176,291 UART: [idev] CDI.KEYID = 6
1,176,651 UART: [idev] SUBJECT.KEYID = 7
1,177,075 UART: [idev] UDS.KEYID = 0
1,177,420 ready_for_fw is high
1,177,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,202,046 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,682 UART: [ldev] ++
1,211,850 UART: [ldev] CDI.KEYID = 6
1,212,213 UART: [ldev] SUBJECT.KEYID = 5
1,212,639 UART: [ldev] AUTHORITY.KEYID = 7
1,213,102 UART: [ldev] FE.KEYID = 1
1,218,012 UART: [ldev] Erasing FE.KEYID = 1
1,243,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,324 UART: [ldev] --
1,283,605 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,001 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,470 >>> mbox cmd response: success
2,773,552 UART: [afmc] ++
2,773,720 UART: [afmc] CDI.KEYID = 6
2,774,082 UART: [afmc] SUBJECT.KEYID = 7
2,774,507 UART: [afmc] AUTHORITY.KEYID = 5
2,810,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,330 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,049 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,991 UART: [afmc] --
2,853,869 UART: [cold-reset] --
2,854,637 UART: [state] Locking Datavault
2,855,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,282 UART: [state] Locking ICCM
2,856,950 UART: [exit] Launching FMC @ 0x40000130
2,862,279 UART:
2,862,295 UART: Running Caliptra FMC ...
2,862,703 UART:
2,862,846 UART: [state] CFI Enabled
2,873,461 UART: [fht] FMC Alias Private Key: 7
2,981,558 UART: [art] Extend RT PCRs Done
2,981,986 UART: [art] Lock RT PCRs Done
2,983,346 UART: [art] Populate DV Done
2,991,625 UART: [fht] FMC Alias Private Key: 7
2,992,609 UART: [art] Derive CDI
2,992,889 UART: [art] Store in in slot 0x4
3,078,908 UART: [art] Derive Key Pair
3,079,268 UART: [art] Store priv key in slot 0x5
3,092,552 UART: [art] Derive Key Pair - Done
3,107,345 UART: [art] Signing Cert with AUTHO
3,107,825 UART: RITY.KEYID = 7
3,122,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,522 UART: [art] PUB.X = B43E13D9C9DC89CF8E1A8E7401CF035C2F51108F5D13F12AB62917DCC2647864B0D05145A85BB105B9DC9FC85BD9F192
3,130,293 UART: [art] PUB.Y = 9509441819251ED2BED261622CEA258E303E7C8A907CFA1746BD8761CAD258D888105F47120B8B49A3708808C2905778
3,137,224 UART: [art] SIG.R = C2EE432C503466BF0B2C3457DC6FC11EFABD76FA27453ECCB5136DE60CFB4F7889A87D5A8B937EF384AC0BE9D68C28DA
3,144,009 UART: [art] SIG.S = C43AC12C0622982313B9D43237C1F031CDBE8E12605A1F285896A5C5BD54E79732C7866F2809F4F389914EF289434885
3,167,814 UART: Caliptra RT
3,168,159 UART: [state] CFI Enabled
3,275,833 UART: [rt] RT listening for mailbox commands...
3,276,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,689 UART: [rt]cmd =0x41544d4e, len=14344
3,709,907 >>> mbox cmd response data (8 bytes)
3,709,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,689 UART: [rt]cmd =0x41545348, len=116
3,760,860 >>> mbox cmd response data (12 bytes)
3,760,861 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,836 UART: [rt]cmd =0x41545348, len=116
3,792,479 >>> mbox cmd response data (12 bytes)
3,792,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,135 UART:
3,793,151 UART: Running Caliptra ROM ...
3,793,559 UART:
3,793,701 UART: [state] CFI Enabled
3,796,441 UART: [state] LifecycleState = Unprovisioned
3,797,096 UART: [state] DebugLocked = No
3,797,658 UART: [state] WD Timer not started. Device not locked for debugging
3,798,934 UART: [kat] SHA2-256
4,604,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,608,709 UART: [kat] ++
4,608,861 UART: [kat] sha1
4,613,163 UART: [kat] SHA2-256
4,615,103 UART: [kat] SHA2-384
4,617,812 UART: [kat] SHA2-512-ACC
4,619,712 UART: [kat] ECC-384
4,629,829 UART: [kat] HMAC-384Kdf
4,634,507 UART: [kat] LMS
4,882,835 UART: [kat] --
4,883,475 UART: [update-reset] ++
6,193,689 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,194,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,344,242 >>> mbox cmd response: success
6,344,242 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,344,493 UART: [update-reset] Copying MAN_2 To MAN_1
6,352,507 UART: [update-reset Success] --
6,353,254 UART: [state] Locking Datavault
6,353,878 UART: [state] Locking PCR0, PCR1 and PCR31
6,354,482 UART: [state] Locking ICCM
6,354,958 UART: [exit] Launching FMC @ 0x40000130
6,360,287 UART:
6,360,303 UART: Running Caliptra FMC ...
6,360,711 UART:
6,360,854 UART: [state] CFI Enabled
6,450,041 UART: [art] Extend RT PCRs Done
6,450,469 UART: [art] Lock RT PCRs Done
6,451,742 UART: [art] Populate DV Done
6,459,871 UART: [fht] FMC Alias Private Key: 7
6,460,823 UART: [art] Derive CDI
6,461,103 UART: [art] Store in in slot 0x4
6,546,926 UART: [art] Derive Key Pair
6,547,286 UART: [art] Store priv key in slot 0x5
6,560,742 UART: [art] Derive Key Pair - Done
6,575,250 UART: [art] Signing Cert with AUTHO
6,575,730 UART: RITY.KEYID = 7
6,590,938 UART: [art] Erasing AUTHORITY.KEYID = 7
6,591,703 UART: [art] PUB.X = 05DC06F49DF96D8D1019058B66E021F752B6AED38DBF6FE85B95A7ECCD201644250D350EB35B658823DD6DE60895247E
6,598,461 UART: [art] PUB.Y = 7F0F3915A9C53767E42CF66F7556A3F0B7383A563D2236CEC680C858BFFF746F79838CACE5F64F09DC237E5DA4E7EA8C
6,605,417 UART: [art] SIG.R = 61AFEA945DC3158DC8DFB7078941FF3C545897165D54305CCB85F281806975701171A2C821A7D7D17A43D58EA1870D08
6,612,174 UART: [art] SIG.S = F606668062E11C1BD21D2477337247F108797309C88B7C6DCECD3A892B0F762C8DFA7059652D197B364CABCC3757BEC8
6,636,149 UART: Caliptra RT
6,636,494 UART: [state] CFI Enabled
6,921,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,952,712 UART: [rt]cmd =0x41545348, len=116
6,975,009 >>> mbox cmd response data (12 bytes)
6,975,010 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,005,295 UART: [rt]cmd =0x41545348, len=116
7,007,174 >>> mbox cmd response data (12 bytes)
7,007,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,129,760 UART: [rt]cmd =0x41544d4e, len=14344
7,440,122 >>> mbox cmd response data (8 bytes)
7,440,123 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,470,332 UART: [rt]cmd =0x41545348, len=116
7,491,829 >>> mbox cmd response data (12 bytes)
7,491,830 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,521,821 UART: [rt]cmd =0x41545348, len=116
7,523,771 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,760 ready_for_fw is high
1,060,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,665 >>> mbox cmd response: success
2,688,715 UART:
2,688,731 UART: Running Caliptra FMC ...
2,689,139 UART:
2,689,282 UART: [state] CFI Enabled
2,699,751 UART: [fht] FMC Alias Private Key: 7
2,807,646 UART: [art] Extend RT PCRs Done
2,808,074 UART: [art] Lock RT PCRs Done
2,809,576 UART: [art] Populate DV Done
2,817,777 UART: [fht] FMC Alias Private Key: 7
2,818,719 UART: [art] Derive CDI
2,818,999 UART: [art] Store in in slot 0x4
2,904,954 UART: [art] Derive Key Pair
2,905,314 UART: [art] Store priv key in slot 0x5
2,918,688 UART: [art] Derive Key Pair - Done
2,933,496 UART: [art] Signing Cert with AUTHO
2,933,976 UART: RITY.KEYID = 7
2,949,746 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,511 UART: [art] PUB.X = 47F24EDFEF074DA611D8DD84C9585B83CBC1ECCB82B2CC5E27C7BDC6138F4B9B86779A26C153A05556C529267C8BB062
2,957,292 UART: [art] PUB.Y = 4CD528F7AB88C5DF3172A8ADD35D36207CB69189AB470B5D24F062F89A7B16713B46E9C6188FF3D8596B2D95C1996733
2,964,241 UART: [art] SIG.R = C5A357D89F62A9F63ECC1F2B884B6F08A7BC0E0DF6CA3DEF381C1769B60FE156B8B686FA34502219FBDCDDE5D0166A4C
2,971,021 UART: [art] SIG.S = 23CFA3EC1F1F4A328C9E093416881B8465E089E092B96308FD27E0DBD8819B9AF93D545B2BF147BD6BCFB89174DE4657
2,994,682 UART: Caliptra RT
2,995,027 UART: [state] CFI Enabled
3,102,602 UART: [rt] RT listening for mailbox commands...
3,103,272 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,326 UART: [rt]cmd =0x41544d4e, len=14344
3,536,544 >>> mbox cmd response data (8 bytes)
3,536,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,502 UART: [rt]cmd =0x41545348, len=116
3,587,961 >>> mbox cmd response data (12 bytes)
3,587,962 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,943 UART: [rt]cmd =0x41545348, len=116
3,619,584 >>> mbox cmd response data (12 bytes)
3,619,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,102 >>> mbox cmd response: success
6,054,102 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,067,420 UART:
6,067,436 UART: Running Caliptra FMC ...
6,067,844 UART:
6,067,987 UART: [state] CFI Enabled
6,157,054 UART: [art] Extend RT PCRs Done
6,157,482 UART: [art] Lock RT PCRs Done
6,158,653 UART: [art] Populate DV Done
6,166,840 UART: [fht] FMC Alias Private Key: 7
6,167,788 UART: [art] Derive CDI
6,168,068 UART: [art] Store in in slot 0x4
6,253,741 UART: [art] Derive Key Pair
6,254,101 UART: [art] Store priv key in slot 0x5
6,267,127 UART: [art] Derive Key Pair - Done
6,281,921 UART: [art] Signing Cert with AUTHO
6,282,401 UART: RITY.KEYID = 7
6,297,949 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,714 UART: [art] PUB.X = 01DC258CD4132410548FA551F82BB9BC6A16B277D303C3AC24E73F874673FDC9F9F30F21FCB6714425E580068DBB2A78
6,305,476 UART: [art] PUB.Y = 928DDE965047A2EC16CD662049CD06F64C14B404F4774F4C38AEB1E70B852E68CD654979985C2332DD3CD08FCD7FEA5A
6,312,427 UART: [art] SIG.R = 8C09FBC509696E0FF16F39DEBE86D2859C186BACA94AF6451162941B25BE5A54F9118A3FBB47C1E3B9A0B3DA2D103444
6,319,200 UART: [art] SIG.S = 733650B879AE5ABCAEAD28EA1CC5C08FF0043329B4A0207DA318CCF4F5C526594C4CDC8164F9A93C94E9D1A52D7BA13A
6,342,432 UART: Caliptra RT
6,342,777 UART: [state] CFI Enabled
6,623,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,654,011 UART: [rt]cmd =0x41545348, len=116
6,676,228 >>> mbox cmd response data (12 bytes)
6,676,229 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,706,508 UART: [rt]cmd =0x41545348, len=116
6,708,441 >>> mbox cmd response data (12 bytes)
6,708,442 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,831,021 UART: [rt]cmd =0x41544d4e, len=14344
7,140,791 >>> mbox cmd response data (8 bytes)
7,140,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,171,047 UART: [rt]cmd =0x41545348, len=116
7,192,386 >>> mbox cmd response data (12 bytes)
7,192,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,222,416 UART: [rt]cmd =0x41545348, len=116
7,224,332 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,796 UART: [kat] SHA2-512-ACC
906,697 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 ready_for_fw is high
1,174,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,244 UART: [ldev] --
1,280,666 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,255 >>> mbox cmd response: success
2,770,358 UART: [afmc] ++
2,770,526 UART: [afmc] CDI.KEYID = 6
2,770,889 UART: [afmc] SUBJECT.KEYID = 7
2,771,315 UART: [afmc] AUTHORITY.KEYID = 5
2,806,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,397 UART: [afmc] --
2,849,529 UART: [cold-reset] --
2,850,477 UART: [state] Locking Datavault
2,851,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,152 UART: [state] Locking ICCM
2,852,678 UART: [exit] Launching FMC @ 0x40000130
2,858,007 UART:
2,858,023 UART: Running Caliptra FMC ...
2,858,431 UART:
2,858,485 UART: [state] CFI Enabled
2,868,790 UART: [fht] FMC Alias Private Key: 7
2,976,653 UART: [art] Extend RT PCRs Done
2,977,081 UART: [art] Lock RT PCRs Done
2,978,343 UART: [art] Populate DV Done
2,986,818 UART: [fht] FMC Alias Private Key: 7
2,987,978 UART: [art] Derive CDI
2,988,258 UART: [art] Store in in slot 0x4
3,073,745 UART: [art] Derive Key Pair
3,074,105 UART: [art] Store priv key in slot 0x5
3,087,417 UART: [art] Derive Key Pair - Done
3,102,151 UART: [art] Signing Cert with AUTHO
3,102,631 UART: RITY.KEYID = 7
3,117,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,322 UART: [art] PUB.X = C90D495F50A9AD362687617205AB055E7069FA6B8C7F458F70C03AC94943F00581DD0B2296566AF841AF0793ADAAEC28
3,125,076 UART: [art] PUB.Y = 43985EBA8B5FB42BC6F2890B2A6BB149542453DE0B73239EF045C055FC5EC40C1DDA3A7EBF78FEB47F7500F1A0726E14
3,132,009 UART: [art] SIG.R = BA348931398274F1AA7B68C539D9092F87BE562E66FC4B274A2A6F7DCE204C647DE1923EFC0ABFD7D6FA48D5B124AF64
3,138,787 UART: [art] SIG.S = A8A3873D14C0B65381F169565FD0A8BDF130921AACB58C817EBA2ABC6E7275603C5C305DE97669FB11535A189C1D53E6
3,162,652 UART: Caliptra RT
3,162,905 UART: [state] CFI Enabled
3,270,849 UART: [rt] RT listening for mailbox commands...
3,271,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,703 UART: [rt]cmd =0x41544d4e, len=14344
3,703,965 >>> mbox cmd response data (8 bytes)
3,703,966 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,011 UART: [rt]cmd =0x41545348, len=116
3,756,106 >>> mbox cmd response data (12 bytes)
3,756,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,026 UART: [rt]cmd =0x41545348, len=116
3,787,831 >>> mbox cmd response data (12 bytes)
3,787,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,641 UART:
3,788,657 UART: Running Caliptra ROM ...
3,789,065 UART:
3,789,120 UART: [state] CFI Enabled
3,791,728 UART: [state] LifecycleState = Unprovisioned
3,792,383 UART: [state] DebugLocked = No
3,793,009 UART: [state] WD Timer not started. Device not locked for debugging
3,794,137 UART: [kat] SHA2-256
4,597,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,601,816 UART: [kat] ++
4,601,968 UART: [kat] sha1
4,606,112 UART: [kat] SHA2-256
4,608,052 UART: [kat] SHA2-384
4,610,711 UART: [kat] SHA2-512-ACC
4,612,611 UART: [kat] ECC-384
4,622,216 UART: [kat] HMAC-384Kdf
4,626,932 UART: [kat] LMS
4,875,244 UART: [kat] --
4,875,926 UART: [update-reset] ++
6,185,631 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,186,844 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,336,296 >>> mbox cmd response: success
6,336,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,336,511 UART: [update-reset] Copying MAN_2 To MAN_1
6,344,525 UART: [update-reset Success] --
6,345,494 UART: [state] Locking Datavault
6,346,296 UART: [state] Locking PCR0, PCR1 and PCR31
6,346,900 UART: [state] Locking ICCM
6,347,474 UART: [exit] Launching FMC @ 0x40000130
6,352,803 UART:
6,352,819 UART: Running Caliptra FMC ...
6,353,227 UART:
6,353,281 UART: [state] CFI Enabled
6,441,878 UART: [art] Extend RT PCRs Done
6,442,306 UART: [art] Lock RT PCRs Done
6,443,509 UART: [art] Populate DV Done
6,451,558 UART: [fht] FMC Alias Private Key: 7
6,452,734 UART: [art] Derive CDI
6,453,014 UART: [art] Store in in slot 0x4
6,538,951 UART: [art] Derive Key Pair
6,539,311 UART: [art] Store priv key in slot 0x5
6,551,825 UART: [art] Derive Key Pair - Done
6,566,629 UART: [art] Signing Cert with AUTHO
6,567,109 UART: RITY.KEYID = 7
6,582,383 UART: [art] Erasing AUTHORITY.KEYID = 7
6,583,148 UART: [art] PUB.X = FBF5F11DBD5E370E028B4484AB19682915D389637B908F0E07E9184E68233B183D286BB22F683AE059EA4868A1674EF6
6,589,904 UART: [art] PUB.Y = AEC0DBB28C0C1A8230C4E5F9270178E0E5A0E57AEB547BDC0F0DB06FF391D60DDE175CADFD4019E43DBAC5F8AAF096AA
6,596,871 UART: [art] SIG.R = A88AEF434D215C0484AC0E294A85CD43A333D9BD53A61A22E2E50F2634C4D2D520EA30DD17ECA00AF9A1CB73E09368BD
6,603,645 UART: [art] SIG.S = 90F98D56E5BF35ED4A0A7439C5AE2FE3ADC52821046E64D6BECFC8C91BAA0BE5683B6F3897398CD510AD08E3EB8E90E3
6,627,504 UART: Caliptra RT
6,627,757 UART: [state] CFI Enabled
6,908,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,939,586 UART: [rt]cmd =0x41545348, len=116
6,961,687 >>> mbox cmd response data (12 bytes)
6,961,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,991,639 UART: [rt]cmd =0x41545348, len=116
6,993,198 >>> mbox cmd response data (12 bytes)
6,993,199 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,115,676 UART: [rt]cmd =0x41544d4e, len=14344
7,425,352 >>> mbox cmd response data (8 bytes)
7,425,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,455,722 UART: [rt]cmd =0x41545348, len=116
7,477,217 >>> mbox cmd response data (12 bytes)
7,477,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,507,411 UART: [rt]cmd =0x41545348, len=116
7,509,083 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,511 >>> mbox cmd response: success
2,680,517 UART:
2,680,533 UART: Running Caliptra FMC ...
2,680,941 UART:
2,680,995 UART: [state] CFI Enabled
2,691,620 UART: [fht] FMC Alias Private Key: 7
2,799,503 UART: [art] Extend RT PCRs Done
2,799,931 UART: [art] Lock RT PCRs Done
2,801,423 UART: [art] Populate DV Done
2,809,522 UART: [fht] FMC Alias Private Key: 7
2,810,460 UART: [art] Derive CDI
2,810,740 UART: [art] Store in in slot 0x4
2,896,353 UART: [art] Derive Key Pair
2,896,713 UART: [art] Store priv key in slot 0x5
2,909,713 UART: [art] Derive Key Pair - Done
2,924,529 UART: [art] Signing Cert with AUTHO
2,925,009 UART: RITY.KEYID = 7
2,940,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,994 UART: [art] PUB.X = 8A39EB7072A3919E5E917BF6ED7BD3D325811E97F4C231E9FDC5E7162FF2FDEAD78B7BBDDEB9D530A57C72527ABEE9ED
2,947,790 UART: [art] PUB.Y = 409219586094AE2D925D5EAD0A648A093B29B6115E7E931BFD4AC85D26C2B4EC86E6293FA096F8A881F7763401F596AB
2,954,733 UART: [art] SIG.R = 4EC1F229E6BB19A6B670CAF4AC3CF703114184C54EF155BB131E3C26ABFAF22F8B1D831B6139DF74BA1F0D56F920C39A
2,961,515 UART: [art] SIG.S = 00EB1441A9D1AE518D497A858923F53254DD018DD102CD319D1AAA0646E360F3046C12A0AAD0C95C7DD0C25B2F4CB15A
2,985,454 UART: Caliptra RT
2,985,707 UART: [state] CFI Enabled
3,093,587 UART: [rt] RT listening for mailbox commands...
3,094,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,631 UART: [rt]cmd =0x41544d4e, len=14344
3,527,841 >>> mbox cmd response data (8 bytes)
3,527,842 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,147 UART: [rt]cmd =0x41545348, len=116
3,580,026 >>> mbox cmd response data (12 bytes)
3,580,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,192 UART: [rt]cmd =0x41545348, len=116
3,612,009 >>> mbox cmd response data (12 bytes)
3,612,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,041,087 >>> mbox cmd response: success
6,041,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,054,393 UART:
6,054,409 UART: Running Caliptra FMC ...
6,054,817 UART:
6,054,871 UART: [state] CFI Enabled
6,143,968 UART: [art] Extend RT PCRs Done
6,144,396 UART: [art] Lock RT PCRs Done
6,145,723 UART: [art] Populate DV Done
6,153,754 UART: [fht] FMC Alias Private Key: 7
6,154,926 UART: [art] Derive CDI
6,155,206 UART: [art] Store in in slot 0x4
6,240,865 UART: [art] Derive Key Pair
6,241,225 UART: [art] Store priv key in slot 0x5
6,254,323 UART: [art] Derive Key Pair - Done
6,269,172 UART: [art] Signing Cert with AUTHO
6,269,652 UART: RITY.KEYID = 7
6,285,148 UART: [art] Erasing AUTHORITY.KEYID = 7
6,285,913 UART: [art] PUB.X = 51B3940BF854772FC2D8937C6F212781AA4584E98FA69716F40FD1EBC4DD8AB7FBAE5BF244051E60320E73CA50A574A5
6,292,679 UART: [art] PUB.Y = BEEA25988AB722B28D822CFC3E87283977CB1FC7FECE29FB7A65DC690A1E1EB5A65E20D57D2CD45E592DC9D5EA4D0BF6
6,299,649 UART: [art] SIG.R = 58AE79DFB20EF6152BE7CE392E950464128884483CAF6F652FF84C9D20B198FCC77E8449CAA2E005735CF4C6367F5C44
6,306,416 UART: [art] SIG.S = F6D18A8849E8600AA5EEF7320D4B348569F927AE28084E8F456CBEDFAB5705D26E5F84829F9A091678BBAC1C899D7DF8
6,330,626 UART: Caliptra RT
6,330,879 UART: [state] CFI Enabled
6,606,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,636,879 UART: [rt]cmd =0x41545348, len=116
6,658,104 >>> mbox cmd response data (12 bytes)
6,658,105 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,688,174 UART: [rt]cmd =0x41545348, len=116
6,690,137 >>> mbox cmd response data (12 bytes)
6,690,138 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,812,639 UART: [rt]cmd =0x41544d4e, len=14344
7,122,077 >>> mbox cmd response data (8 bytes)
7,122,078 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,151,933 UART: [rt]cmd =0x41545348, len=116
7,174,330 >>> mbox cmd response data (12 bytes)
7,174,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,204,618 UART: [rt]cmd =0x41545348, len=116
7,206,628 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,812 UART: [cold-reset] ++
1,170,284 UART: [fht] FHT @ 0x50003400
1,172,906 UART: [idev] ++
1,173,074 UART: [idev] CDI.KEYID = 6
1,173,435 UART: [idev] SUBJECT.KEYID = 7
1,173,860 UART: [idev] UDS.KEYID = 0
1,174,206 ready_for_fw is high
1,174,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,306 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,747 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,990 >>> mbox cmd response: success
2,773,151 UART: [afmc] ++
2,773,319 UART: [afmc] CDI.KEYID = 6
2,773,682 UART: [afmc] SUBJECT.KEYID = 7
2,774,108 UART: [afmc] AUTHORITY.KEYID = 5
2,809,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,902 UART: [afmc] --
2,852,936 UART: [cold-reset] --
2,853,768 UART: [state] Locking Datavault
2,854,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,487 UART: [state] Locking ICCM
2,855,969 UART: [exit] Launching FMC @ 0x40000130
2,861,298 UART:
2,861,314 UART: Running Caliptra FMC ...
2,861,722 UART:
2,861,865 UART: [state] CFI Enabled
2,872,282 UART: [fht] FMC Alias Private Key: 7
2,980,057 UART: [art] Extend RT PCRs Done
2,980,485 UART: [art] Lock RT PCRs Done
2,982,123 UART: [art] Populate DV Done
2,990,264 UART: [fht] FMC Alias Private Key: 7
2,991,260 UART: [art] Derive CDI
2,991,540 UART: [art] Store in in slot 0x4
3,077,107 UART: [art] Derive Key Pair
3,077,467 UART: [art] Store priv key in slot 0x5
3,091,089 UART: [art] Derive Key Pair - Done
3,105,674 UART: [art] Signing Cert with AUTHO
3,106,154 UART: RITY.KEYID = 7
3,121,566 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,331 UART: [art] PUB.X = 43FC9FC32A70DC7645E2B0C4DD9BC92503DD6035DAA8B728A80BAF45733DC8431E874F390E3B59410324F3A4A5F1896F
3,129,097 UART: [art] PUB.Y = 3089E929D17A11B6B3F7972BF876D3444665F2064BACD078ADD945A016FC1AC0A0BE5E3095179CA97798C45AC243416C
3,136,046 UART: [art] SIG.R = 49669AC4AAFE3204E8BF13DFBE1AD9ED93914DAA860AC47BDE98D64FA940A8261319D33B893AFF9D4D661993DBE47D4F
3,142,830 UART: [art] SIG.S = 6285FD12915186E527EF340F8A9127561836BCF9E5A2FDB525C230A55016BB4FAEF136E6BFEB977F8D157916E2C1F1F9
3,166,632 UART: Caliptra RT
3,166,977 UART: [state] CFI Enabled
3,275,978 UART: [rt] RT listening for mailbox commands...
3,276,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,750 UART: [rt]cmd =0x41544d4e, len=14344
3,709,674 >>> mbox cmd response data (8 bytes)
3,709,675 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,790 UART: [rt]cmd =0x41545348, len=116
3,762,091 >>> mbox cmd response data (12 bytes)
3,762,092 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,127 UART: [rt]cmd =0x41545348, len=116
3,793,994 >>> mbox cmd response data (12 bytes)
3,793,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,790 UART:
3,794,806 UART: Running Caliptra ROM ...
3,795,214 UART:
3,795,356 UART: [state] CFI Enabled
3,798,038 UART: [state] LifecycleState = Unprovisioned
3,798,693 UART: [state] DebugLocked = No
3,799,229 UART: [state] WD Timer not started. Device not locked for debugging
3,800,415 UART: [kat] SHA2-256
4,603,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,608,094 UART: [kat] ++
4,608,246 UART: [kat] sha1
4,612,326 UART: [kat] SHA2-256
4,614,266 UART: [kat] SHA2-384
4,616,933 UART: [kat] SHA2-512-ACC
4,618,833 UART: [kat] ECC-384
4,628,342 UART: [kat] HMAC-384Kdf
4,633,038 UART: [kat] LMS
4,881,350 UART: [kat] --
4,882,452 UART: [update-reset] ++
6,190,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,192,076 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,341,528 >>> mbox cmd response: success
6,341,528 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,341,703 UART: [update-reset] Copying MAN_2 To MAN_1
6,349,717 UART: [update-reset Success] --
6,350,784 UART: [state] Locking Datavault
6,351,510 UART: [state] Locking PCR0, PCR1 and PCR31
6,352,114 UART: [state] Locking ICCM
6,352,700 UART: [exit] Launching FMC @ 0x40000130
6,358,029 UART:
6,358,045 UART: Running Caliptra FMC ...
6,358,453 UART:
6,358,596 UART: [state] CFI Enabled
6,447,903 UART: [art] Extend RT PCRs Done
6,448,331 UART: [art] Lock RT PCRs Done
6,449,532 UART: [art] Populate DV Done
6,457,583 UART: [fht] FMC Alias Private Key: 7
6,458,717 UART: [art] Derive CDI
6,458,997 UART: [art] Store in in slot 0x4
6,544,938 UART: [art] Derive Key Pair
6,545,298 UART: [art] Store priv key in slot 0x5
6,559,318 UART: [art] Derive Key Pair - Done
6,574,392 UART: [art] Signing Cert with AUTHO
6,574,872 UART: RITY.KEYID = 7
6,589,190 UART: [art] Erasing AUTHORITY.KEYID = 7
6,589,955 UART: [art] PUB.X = F3F68E32A35B65E8C210C9CDDA984BED656BCECF39B89D3901268FD6D4D07E0253CA2F125C49015BD2A79875928FF05F
6,596,728 UART: [art] PUB.Y = 9CA1D85AE2A47AE5B8B783DAF34D40D4D6EF6B0E61CE3E704A551E708C1E215E688FEA50E260A41C82F3F2B1C320B8A5
6,603,693 UART: [art] SIG.R = 5A85B2BC12DBC43ED15F8017A584FD210E5350032C040338A31620707D6DEEAAB46371251338935C6D554014FB195039
6,610,443 UART: [art] SIG.S = 82536B65736C53675317B89E7C399FC659B405683DF7A0D42C051D4418418F8021D60A55A95731DC847F78B7C26C2EFF
6,634,545 UART: Caliptra RT
6,634,890 UART: [state] CFI Enabled
6,916,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,947,442 UART: [rt]cmd =0x41545348, len=116
6,969,133 >>> mbox cmd response data (12 bytes)
6,969,134 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,999,107 UART: [rt]cmd =0x41545348, len=116
7,000,758 >>> mbox cmd response data (12 bytes)
7,000,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,123,436 UART: [rt]cmd =0x41544d4e, len=14344
7,433,876 >>> mbox cmd response data (8 bytes)
7,433,877 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,464,134 UART: [rt]cmd =0x41545348, len=116
7,486,455 >>> mbox cmd response data (12 bytes)
7,486,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,516,425 UART: [rt]cmd =0x41545348, len=116
7,517,957 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,061 ready_for_fw is high
1,056,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,810 >>> mbox cmd response: success
2,681,512 UART:
2,681,528 UART: Running Caliptra FMC ...
2,681,936 UART:
2,682,079 UART: [state] CFI Enabled
2,693,052 UART: [fht] FMC Alias Private Key: 7
2,800,885 UART: [art] Extend RT PCRs Done
2,801,313 UART: [art] Lock RT PCRs Done
2,802,497 UART: [art] Populate DV Done
2,810,442 UART: [fht] FMC Alias Private Key: 7
2,811,426 UART: [art] Derive CDI
2,811,706 UART: [art] Store in in slot 0x4
2,897,655 UART: [art] Derive Key Pair
2,898,015 UART: [art] Store priv key in slot 0x5
2,911,025 UART: [art] Derive Key Pair - Done
2,925,917 UART: [art] Signing Cert with AUTHO
2,926,397 UART: RITY.KEYID = 7
2,941,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,640 UART: [art] PUB.X = D5A820E58F756EF0E6E6C5A186345692D8FF079B8E19AA222C6C087FF4EA747DD67EDE27097B4F668118DA00355763F5
2,949,383 UART: [art] PUB.Y = F9889CCD9075AEC6C81E533975577519F3FE4E3DC52F56E2C4CCF510AB748DFB9685CF0524E419F023A071AB3EBBF5CE
2,956,346 UART: [art] SIG.R = 31480F79F03F932C9979265043F4D44DCE75B76895399A326A71D0C24CFD89461E7363918D628CF0ADB72D3CD4FDF035
2,963,111 UART: [art] SIG.S = DC53846DB445C36E818EEC38DF9D208271EB1A45D42C8334A2FBBF76197AFFC0315B7934AE703E32872990A84283BE0A
2,986,511 UART: Caliptra RT
2,986,856 UART: [state] CFI Enabled
3,094,825 UART: [rt] RT listening for mailbox commands...
3,095,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,353 UART: [rt]cmd =0x41544d4e, len=14344
3,528,025 >>> mbox cmd response data (8 bytes)
3,528,026 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,073 UART: [rt]cmd =0x41545348, len=116
3,580,134 >>> mbox cmd response data (12 bytes)
3,580,135 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,434 UART: [rt]cmd =0x41545348, len=116
3,612,167 >>> mbox cmd response data (12 bytes)
3,612,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,464 >>> mbox cmd response: success
6,044,464 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,057,654 UART:
6,057,670 UART: Running Caliptra FMC ...
6,058,078 UART:
6,058,221 UART: [state] CFI Enabled
6,147,600 UART: [art] Extend RT PCRs Done
6,148,028 UART: [art] Lock RT PCRs Done
6,149,241 UART: [art] Populate DV Done
6,157,582 UART: [fht] FMC Alias Private Key: 7
6,158,726 UART: [art] Derive CDI
6,159,006 UART: [art] Store in in slot 0x4
6,244,695 UART: [art] Derive Key Pair
6,245,055 UART: [art] Store priv key in slot 0x5
6,258,195 UART: [art] Derive Key Pair - Done
6,273,313 UART: [art] Signing Cert with AUTHO
6,273,793 UART: RITY.KEYID = 7
6,289,241 UART: [art] Erasing AUTHORITY.KEYID = 7
6,290,006 UART: [art] PUB.X = E997C88033E83166628E6238BEDF8F850A66DA74D3BACFE911E0801B7E7B4E2AE47F37AE43028BAD776A988DD8C7479E
6,296,780 UART: [art] PUB.Y = 417A70C3A526FB69D7DF483F0AF26C5EC4A9AC26E762CDC931DA332FCB7477B0A54455601DB55E3841E9A2A6EFA4399F
6,303,741 UART: [art] SIG.R = 1F7BAF112D2889736F8536A8BEAB6F90299EA39459352D12450D5600E25FA85F4FB98BEBE7A44BA7F723858E7FC5DA1B
6,310,496 UART: [art] SIG.S = 2D504F0C4A327EFFE80CC47958EBC6B666D5910A541CC9A92F74F2B92F8140E697DFB6096CBBA60FE39A5BA8B7708270
6,333,942 UART: Caliptra RT
6,334,287 UART: [state] CFI Enabled
6,614,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,769 UART: [rt]cmd =0x41545348, len=116
6,666,740 >>> mbox cmd response data (12 bytes)
6,666,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,696,824 UART: [rt]cmd =0x41545348, len=116
6,698,311 >>> mbox cmd response data (12 bytes)
6,698,312 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,820,659 UART: [rt]cmd =0x41544d4e, len=14344
7,129,945 >>> mbox cmd response data (8 bytes)
7,129,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,160,053 UART: [rt]cmd =0x41545348, len=116
7,181,014 >>> mbox cmd response data (12 bytes)
7,181,015 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,211,290 UART: [rt]cmd =0x41545348, len=116
7,212,892 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,077 UART:
192,477 UART: Running Caliptra ROM ...
193,599 UART:
193,742 UART: [state] CFI Enabled
263,985 UART: [state] LifecycleState = Unprovisioned
265,996 UART: [state] DebugLocked = No
267,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,380 UART: [kat] SHA2-256
442,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,642 UART: [kat] ++
453,090 UART: [kat] sha1
464,605 UART: [kat] SHA2-256
467,333 UART: [kat] SHA2-384
472,827 UART: [kat] SHA2-512-ACC
475,197 UART: [kat] ECC-384
2,769,904 UART: [kat] HMAC-384Kdf
2,801,489 UART: [kat] LMS
3,991,796 UART: [kat] --
3,996,664 UART: [cold-reset] ++
3,997,747 UART: [fht] Storing FHT @ 0x50003400
4,008,471 UART: [idev] ++
4,009,080 UART: [idev] CDI.KEYID = 6
4,010,011 UART: [idev] SUBJECT.KEYID = 7
4,011,195 UART: [idev] UDS.KEYID = 0
4,012,236 ready_for_fw is high
4,012,432 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,411 UART: [idev] Erasing UDS.KEYID = 0
7,348,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,671 UART: [idev] --
7,374,802 UART: [ldev] ++
7,375,382 UART: [ldev] CDI.KEYID = 6
7,376,369 UART: [ldev] SUBJECT.KEYID = 5
7,377,531 UART: [ldev] AUTHORITY.KEYID = 7
7,378,814 UART: [ldev] FE.KEYID = 1
7,423,704 UART: [ldev] Erasing FE.KEYID = 1
10,756,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,062 UART: [ldev] --
13,137,803 UART: [fwproc] Waiting for Commands...
13,140,760 UART: [fwproc] Received command 0x46574c44
13,142,992 UART: [fwproc] Received Image of size 113760 bytes
17,200,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,411 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,350,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,666,336 >>> mbox cmd response: success
17,670,702 UART: [afmc] ++
17,671,325 UART: [afmc] CDI.KEYID = 6
17,672,245 UART: [afmc] SUBJECT.KEYID = 7
17,673,456 UART: [afmc] AUTHORITY.KEYID = 5
21,049,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,576 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,366,011 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,380,800 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,395,251 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,417,792 UART: [afmc] --
23,421,870 UART: [cold-reset] --
23,426,747 UART: [state] Locking Datavault
23,431,937 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,641 UART: [state] Locking ICCM
23,435,193 UART: [exit] Launching FMC @ 0x40000130
23,443,762 UART:
23,444,043 UART: Running Caliptra FMC ...
23,445,073 UART:
23,445,224 UART: [state] CFI Enabled
23,508,206 UART: [fht] FMC Alias Private Key: 7
25,846,091 UART: [art] Extend RT PCRs Done
25,847,321 UART: [art] Lock RT PCRs Done
25,848,843 UART: [art] Populate DV Done
25,854,360 UART: [fht] FMC Alias Private Key: 7
25,855,891 UART: [art] Derive CDI
25,856,702 UART: [art] Store in in slot 0x4
25,915,955 UART: [art] Derive Key Pair
25,916,953 UART: [art] Store priv key in slot 0x5
29,209,683 UART: [art] Derive Key Pair - Done
29,222,719 UART: [art] Signing Cert with AUTHO
29,224,048 UART: RITY.KEYID = 7
31,511,185 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,695 UART: [art] PUB.X = 80D290A615347A7CFA2C8B1125CE0A0CD7B781E6D4CBE3741868CB9DEDA8505A3570E76310A71A5889F8F4D8328753CE
31,519,937 UART: [art] PUB.Y = B0D22098D69017E7FF065EB6AF9F5F9B98AB3CE973174B57DB1447748F0F6AA757BFEFE977C1CEB41FD20C95DD6B5F24
31,527,203 UART: [art] SIG.R = 529150879BB52139CBD6298CF95721A0E1A4C615D947579DF7EABAEBE212E46983FAA7BBA149929EA90F74BB863CE8E6
31,534,604 UART: [art] SIG.S = EB9CA35C100AA2AFAEC65753A03DB254F22991DBDE610BB9CF6CC8DE4C39622547FD0126F83865D694168AF90511FBBC
32,839,231 UART: Caliptra RT
32,839,947 UART: [state] CFI Enabled
33,000,562 UART: [rt] RT listening for mailbox commands...
37,027,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,183,146 UART: [rt]cmd =0x41544d4e, len=14344
42,484,168 >>> mbox cmd response data (8 bytes)
42,484,740 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,515,580 UART: [rt]cmd =0x41545348, len=116
42,535,391 >>> mbox cmd response data (12 bytes)
44,590,093 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
44,734,775 UART:
44,735,142 UART: Running Caliptra ROM ...
44,736,277 UART:
44,736,455 UART: [state] CFI Enabled
44,814,953 UART: [state] LifecycleState = Unprovisioned
44,816,904 UART: [state] DebugLocked = No
44,819,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,825,094 UART: [kat] SHA2-256
44,994,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,005,322 UART: [kat] ++
45,005,788 UART: [kat] sha1
45,017,834 UART: [kat] SHA2-256
45,020,489 UART: [kat] SHA2-384
45,024,862 UART: [kat] SHA2-512-ACC
45,027,268 UART: [kat] ECC-384
47,316,682 UART: [kat] HMAC-384Kdf
47,347,710 UART: [kat] LMS
48,538,024 UART: [kat] --
48,543,312 UART: [update-reset] ++
52,682,500 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,685,907 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
53,066,902 >>> mbox cmd response: success
53,071,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,072,013 UART: [update-reset] Copying MAN_2 To MAN_1
53,090,931 UART: [update-reset Success] --
53,093,877 UART: [state] Locking Datavault
53,097,624 UART: [state] Locking PCR0, PCR1 and PCR31
53,099,383 UART: [state] Locking ICCM
53,100,539 UART: [exit] Launching FMC @ 0x40000130
53,108,984 UART:
53,109,223 UART: Running Caliptra FMC ...
53,110,250 UART:
53,110,395 UART: [state] CFI Enabled
53,205,145 UART: [art] Extend RT PCRs Done
53,206,347 UART: [art] Lock RT PCRs Done
53,207,672 UART: [art] Populate DV Done
53,213,173 UART: [fht] FMC Alias Private Key: 7
53,214,834 UART: [art] Derive CDI
53,215,654 UART: [art] Store in in slot 0x4
53,274,096 UART: [art] Derive Key Pair
53,275,101 UART: [art] Store priv key in slot 0x5
56,568,067 UART: [art] Derive Key Pair - Done
56,580,914 UART: [art] Signing Cert with AUTHO
56,582,214 UART: RITY.KEYID = 7
58,870,268 UART: [art] Erasing AUTHORITY.KEYID = 7
58,871,777 UART: [art] PUB.X = BCFFA89CC733277DF107EFF474E785AA6286814F2217DBC008BFAE9A225287E522AC5D45128156BE0CFE5290D3F631E8
58,879,020 UART: [art] PUB.Y = 313A27F7FF392814DEB6DE23C6235E574BE64243ED88299C151075A174FA35E060D47296FC4697F05A6CE043F17EE0E0
58,886,227 UART: [art] SIG.R = B90FCAD0015E6C403B74E6DD6FC30F1A8BF433F4E727EA92953DF4DC00C06BA37E9B8F90DCD5A19EC7A3F98C83250C22
58,893,653 UART: [art] SIG.S = 6C6AC315ACBA7A024908E2F171A3731E5925B78BC121B3EF5509994BB12BA45FE5DC7F99E332F04D52556CEBCA97B918
60,198,640 UART: Caliptra RT
60,199,362 UART: [state] CFI Enabled
60,530,508 UART: [rt] RT listening for mailbox commands...
60,562,248 UART: [rt]cmd =0x41545348, len=116
60,582,793 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,786,123 ready_for_fw is high
3,786,522 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,863,809 >>> mbox cmd response: success
23,557,106 UART:
23,557,499 UART: Running Caliptra FMC ...
23,558,699 UART:
23,558,868 UART: [state] CFI Enabled
23,627,288 UART: [fht] FMC Alias Private Key: 7
25,965,084 UART: [art] Extend RT PCRs Done
25,966,315 UART: [art] Lock RT PCRs Done
25,967,845 UART: [art] Populate DV Done
25,972,929 UART: [fht] FMC Alias Private Key: 7
25,974,627 UART: [art] Derive CDI
25,975,442 UART: [art] Store in in slot 0x4
26,035,649 UART: [art] Derive Key Pair
26,036,700 UART: [art] Store priv key in slot 0x5
29,329,749 UART: [art] Derive Key Pair - Done
29,342,859 UART: [art] Signing Cert with AUTHO
29,344,159 UART: RITY.KEYID = 7
31,631,949 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,458 UART: [art] PUB.X = A230110BDC1A7058CF0319A306FB10E0B209CC9EB516EAB7D6E066D6C8499327A95679FBB6A05D36B1CEA44378A8E10E
31,640,731 UART: [art] PUB.Y = 6F10CDBD25F141C4F02830939C395259DCB50A2B481AB1DB48E030112A637FA7901451B4A7A637C4BC4E60B7262084E7
31,647,917 UART: [art] SIG.R = 6C7F91E35504F4D7F6A86B879925D07331A2830E0F28A42D7AACA85480F1F853F0CD1434191C26BE4A9316F8A50CF71B
31,655,328 UART: [art] SIG.S = 2A1F6972C852065D5EC574B8B6183A32F3F77ECD94B38CB54B3F3A6016947CFD416ED7935789A3F5459E6A50C0C3F06A
32,960,143 UART: Caliptra RT
32,960,864 UART: [state] CFI Enabled
33,123,335 UART: [rt] RT listening for mailbox commands...
37,148,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,304,523 UART: [rt]cmd =0x41544d4e, len=14344
42,605,359 >>> mbox cmd response data (8 bytes)
42,606,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,637,043 UART: [rt]cmd =0x41545348, len=116
42,656,783 >>> mbox cmd response data (12 bytes)
44,716,605 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
53,450,569 >>> mbox cmd response: success
53,455,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,484,229 UART:
53,484,560 UART: Running Caliptra FMC ...
53,485,681 UART:
53,485,853 UART: [state] CFI Enabled
53,583,726 UART: [art] Extend RT PCRs Done
53,584,931 UART: [art] Lock RT PCRs Done
53,586,335 UART: [art] Populate DV Done
53,591,850 UART: [fht] FMC Alias Private Key: 7
53,593,518 UART: [art] Derive CDI
53,594,335 UART: [art] Store in in slot 0x4
53,652,528 UART: [art] Derive Key Pair
53,653,578 UART: [art] Store priv key in slot 0x5
56,946,508 UART: [art] Derive Key Pair - Done
56,959,459 UART: [art] Signing Cert with AUTHO
56,960,765 UART: RITY.KEYID = 7
59,248,123 UART: [art] Erasing AUTHORITY.KEYID = 7
59,249,638 UART: [art] PUB.X = C03D4BB71E690C135F2A7429E4E46953F9B8BEC31E5E31A29793958FD27F1569AD8AFA1E2C06FF0B3B682F6C1940A2AE
59,256,931 UART: [art] PUB.Y = A324584585D320742CDC77BC1A7908A27B3EC008731C6BFB732D13BDD032034837E49129E23C80E94CB78BFE60387239
59,264,120 UART: [art] SIG.R = 4CDB0562237C447EA13548F4AB6E8A98DEB9C816732423A9B509C0243AF6B3682C1DBFDAB89E60F67CDD1494CBE03326
59,271,519 UART: [art] SIG.S = D22ABDDD368449674AEB091272CAECB36C84166A0F830B31E14A1A7F452B8D59EB9F4879C56F4889D759882F3A29934E
60,577,038 UART: Caliptra RT
60,577,735 UART: [state] CFI Enabled
60,909,278 UART: [rt] RT listening for mailbox commands...
60,941,092 UART: [rt]cmd =0x41545348, len=116
60,960,347 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
192,986 UART:
193,351 UART: Running Caliptra ROM ...
194,541 UART:
604,210 UART: [state] CFI Enabled
620,665 UART: [state] LifecycleState = Unprovisioned
622,646 UART: [state] DebugLocked = No
624,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,323 UART: [kat] SHA2-256
798,023 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,616 UART: [kat] ++
809,057 UART: [kat] sha1
818,721 UART: [kat] SHA2-256
821,438 UART: [kat] SHA2-384
828,150 UART: [kat] SHA2-512-ACC
830,512 UART: [kat] ECC-384
3,115,091 UART: [kat] HMAC-384Kdf
3,126,690 UART: [kat] LMS
4,316,750 UART: [kat] --
4,322,189 UART: [cold-reset] ++
4,324,774 UART: [fht] Storing FHT @ 0x50003400
4,336,108 UART: [idev] ++
4,336,665 UART: [idev] CDI.KEYID = 6
4,337,611 UART: [idev] SUBJECT.KEYID = 7
4,338,849 UART: [idev] UDS.KEYID = 0
4,339,795 ready_for_fw is high
4,339,984 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,833 UART: [idev] Erasing UDS.KEYID = 0
7,621,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,747 UART: [idev] --
7,647,167 UART: [ldev] ++
7,647,743 UART: [ldev] CDI.KEYID = 6
7,648,708 UART: [ldev] SUBJECT.KEYID = 5
7,649,913 UART: [ldev] AUTHORITY.KEYID = 7
7,651,136 UART: [ldev] FE.KEYID = 1
7,664,553 UART: [ldev] Erasing FE.KEYID = 1
10,950,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,430 UART: [ldev] --
13,309,954 UART: [fwproc] Waiting for Commands...
13,312,419 UART: [fwproc] Received command 0x46574c44
13,314,647 UART: [fwproc] Received Image of size 113760 bytes
17,359,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,504 >>> mbox cmd response: success
17,822,431 UART: [afmc] ++
17,823,050 UART: [afmc] CDI.KEYID = 6
17,823,961 UART: [afmc] SUBJECT.KEYID = 7
17,825,183 UART: [afmc] AUTHORITY.KEYID = 5
21,139,424 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,447 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,829 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,625 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,097 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,858 UART: [afmc] --
23,508,781 UART: [cold-reset] --
23,512,695 UART: [state] Locking Datavault
23,516,446 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,201 UART: [state] Locking ICCM
23,520,512 UART: [exit] Launching FMC @ 0x40000130
23,528,903 UART:
23,529,134 UART: Running Caliptra FMC ...
23,530,233 UART:
23,530,395 UART: [state] CFI Enabled
23,538,576 UART: [fht] FMC Alias Private Key: 7
25,869,728 UART: [art] Extend RT PCRs Done
25,870,950 UART: [art] Lock RT PCRs Done
25,872,246 UART: [art] Populate DV Done
25,877,652 UART: [fht] FMC Alias Private Key: 7
25,879,187 UART: [art] Derive CDI
25,879,997 UART: [art] Store in in slot 0x4
25,922,511 UART: [art] Derive Key Pair
25,923,573 UART: [art] Store priv key in slot 0x5
29,164,993 UART: [art] Derive Key Pair - Done
29,177,767 UART: [art] Signing Cert with AUTHO
29,179,106 UART: RITY.KEYID = 7
31,458,395 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,902 UART: [art] PUB.X = 58FC712BD67A7AD6EE1C84DDCD93CC2D1357F8968382133681EEE804390128C3681AE13FBA7D57E8983AB8BFFF0CCCD9
31,467,175 UART: [art] PUB.Y = 5BB386EDBE4CC16C7B6FE8FDC68D081B9B9D82FDC077E4C4C928D9732F791384A1483C822193CFE4200A4C3FB56E5C8E
31,474,428 UART: [art] SIG.R = 1F6EEE2C013C410AD869E6CDE5ABC88D65045EE5233F61BB13AF4D72F2C8BB0C3D992DDE12BE894CC5BD7560617B178B
31,481,859 UART: [art] SIG.S = 102597DFE1B2BC816CD66EE19CD69A71356383B31399F5D017F79C6C37C198C74751DC2A40D17C9A8CF11E7A98AF3868
32,787,010 UART: Caliptra RT
32,787,731 UART: [state] CFI Enabled
32,905,489 UART: [rt] RT listening for mailbox commands...
36,931,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,087,058 UART: [rt]cmd =0x41544d4e, len=14344
42,387,778 >>> mbox cmd response data (8 bytes)
42,388,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,419,160 UART: [rt]cmd =0x41545348, len=116
42,438,990 >>> mbox cmd response data (12 bytes)
44,493,660 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
44,638,994 UART:
44,639,378 UART: Running Caliptra ROM ...
44,640,429 UART:
44,640,632 UART: [state] CFI Enabled
44,653,396 UART: [state] LifecycleState = Unprovisioned
44,655,346 UART: [state] DebugLocked = No
44,657,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,663,160 UART: [kat] SHA2-256
44,832,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,843,397 UART: [kat] ++
44,843,850 UART: [kat] sha1
44,855,395 UART: [kat] SHA2-256
44,858,122 UART: [kat] SHA2-384
44,863,465 UART: [kat] SHA2-512-ACC
44,865,860 UART: [kat] ECC-384
47,151,021 UART: [kat] HMAC-384Kdf
47,163,846 UART: [kat] LMS
48,353,929 UART: [kat] --
48,358,415 UART: [update-reset] ++
52,498,481 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,501,509 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
52,882,512 >>> mbox cmd response: success
52,887,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,887,785 UART: [update-reset] Copying MAN_2 To MAN_1
52,905,822 UART: [update-reset Success] --
52,910,925 UART: [state] Locking Datavault
52,914,182 UART: [state] Locking PCR0, PCR1 and PCR31
52,915,881 UART: [state] Locking ICCM
52,918,215 UART: [exit] Launching FMC @ 0x40000130
52,926,655 UART:
52,926,884 UART: Running Caliptra FMC ...
52,927,902 UART:
52,928,045 UART: [state] CFI Enabled
52,972,143 UART: [art] Extend RT PCRs Done
52,973,360 UART: [art] Lock RT PCRs Done
52,974,900 UART: [art] Populate DV Done
52,980,101 UART: [fht] FMC Alias Private Key: 7
52,981,715 UART: [art] Derive CDI
52,982,529 UART: [art] Store in in slot 0x4
53,024,891 UART: [art] Derive Key Pair
53,025,945 UART: [art] Store priv key in slot 0x5
56,268,364 UART: [art] Derive Key Pair - Done
56,281,532 UART: [art] Signing Cert with AUTHO
56,282,830 UART: RITY.KEYID = 7
58,562,069 UART: [art] Erasing AUTHORITY.KEYID = 7
58,563,582 UART: [art] PUB.X = BC30795C4E6B1FD2348BF9B05DBEEC2B64D56EB6EDC8865ED253C83B7220B7FD64FEE02B8D9480065F4316A7110AEC48
58,570,852 UART: [art] PUB.Y = 3C044EBBA67F5B832867B71FA851517D7C4E1C7160D91DA3DF8F9C57CCABC8269CE2005C9E27B5BF3BCFE11EF181F893
58,578,114 UART: [art] SIG.R = F2B6BFCE0012A2642C467F08203CE2FEEB28571A6EC88AD9EA3E63AB666790EEDF42893F338E57C4BE74BE768AC6D6FA
58,585,528 UART: [art] SIG.S = D91DD69DDD50240F289AB9884E55340E131561BB0A953FE9465BF61D6C0BFAA761A546F56A56AF6F14826118881A2C16
59,890,549 UART: Caliptra RT
59,891,268 UART: [state] CFI Enabled
60,183,358 UART: [rt] RT listening for mailbox commands...
60,215,122 UART: [rt]cmd =0x41545348, len=116
60,234,726 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
4,124,766 ready_for_fw is high
4,125,226 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,049,109 >>> mbox cmd response: success
23,691,308 UART:
23,691,695 UART: Running Caliptra FMC ...
23,692,836 UART:
23,692,995 UART: [state] CFI Enabled
23,700,789 UART: [fht] FMC Alias Private Key: 7
26,031,663 UART: [art] Extend RT PCRs Done
26,032,893 UART: [art] Lock RT PCRs Done
26,034,416 UART: [art] Populate DV Done
26,040,050 UART: [fht] FMC Alias Private Key: 7
26,041,757 UART: [art] Derive CDI
26,042,578 UART: [art] Store in in slot 0x4
26,085,017 UART: [art] Derive Key Pair
26,086,019 UART: [art] Store priv key in slot 0x5
29,328,233 UART: [art] Derive Key Pair - Done
29,341,672 UART: [art] Signing Cert with AUTHO
29,342,972 UART: RITY.KEYID = 7
31,622,349 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,859 UART: [art] PUB.X = AFDD5F1F6BD3B4ED2965197B66FB5B4AD0AAB4601014EB220391E99CB59519BD4DBDA58BB2E4F69D8070EA5DF3816E3D
31,631,199 UART: [art] PUB.Y = F4A8597755AD56D2F85E2933FDA2607B337935CB8229EA69FA78FE7E39EFFAC37A760E9089B8354243632BCF1193CE6F
31,638,391 UART: [art] SIG.R = 19D6BCB149D98EE1AEC47487CF2A8879F50AB55FE5BA6983261413224C3D654AAB3836354D53AEB42CBA549CC7C029A5
31,645,780 UART: [art] SIG.S = 4BA825BB7830E645F95112F38CD2AF315CEE58B896A390D999BF812B5E90518F1F7FEC37CCEE5A01B674479800CDDA30
32,951,069 UART: Caliptra RT
32,951,783 UART: [state] CFI Enabled
33,069,956 UART: [rt] RT listening for mailbox commands...
37,102,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,258,107 UART: [rt]cmd =0x41544d4e, len=14344
42,558,285 >>> mbox cmd response data (8 bytes)
42,558,871 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,589,300 UART: [rt]cmd =0x41545348, len=116
42,609,635 >>> mbox cmd response data (12 bytes)
44,666,391 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
53,317,612 >>> mbox cmd response: success
53,322,340 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,353,883 UART:
53,354,189 UART: Running Caliptra FMC ...
53,355,306 UART:
53,355,467 UART: [state] CFI Enabled
53,399,846 UART: [art] Extend RT PCRs Done
53,401,036 UART: [art] Lock RT PCRs Done
53,402,601 UART: [art] Populate DV Done
53,408,382 UART: [fht] FMC Alias Private Key: 7
53,409,990 UART: [art] Derive CDI
53,410,803 UART: [art] Store in in slot 0x4
53,453,605 UART: [art] Derive Key Pair
53,454,605 UART: [art] Store priv key in slot 0x5
56,696,944 UART: [art] Derive Key Pair - Done
56,709,904 UART: [art] Signing Cert with AUTHO
56,711,211 UART: RITY.KEYID = 7
58,990,677 UART: [art] Erasing AUTHORITY.KEYID = 7
58,992,198 UART: [art] PUB.X = 54108170A24230B4BFD256D32AC40CE0B94EAEE9D67D5506A90E79EF9C672CB4A738BAEAEDF2DCAB443A1D02E72F894F
58,999,432 UART: [art] PUB.Y = FB70F3C9895F9B4740F0BA2DB125D8FFE0591E8413A4BC9027E582B8AC347ABC88CD37B9DEDF43D33483F0728853E4A6
59,006,656 UART: [art] SIG.R = FDCBC4BF1921F8BF7E01E77765DDB28BC3C1766A9DEF52E0859D2E9CCCFCA5EE55B3875D624514CC9CB43192D7595B3F
59,014,099 UART: [art] SIG.S = 8096717EA8862616E585A93817AC3EC2AEE1B446855CD907B758C621380750BFCB2A90844452432FEE9E3E225070AADB
60,319,512 UART: Caliptra RT
60,320,231 UART: [state] CFI Enabled
60,608,674 UART: [rt] RT listening for mailbox commands...
60,640,589 UART: [rt]cmd =0x41545348, len=116
60,660,946 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,496 writing to cptra_bootfsm_go
192,707 UART:
193,091 UART: Running Caliptra ROM ...
194,241 UART:
194,388 UART: [state] CFI Enabled
265,631 UART: [state] LifecycleState = Unprovisioned
267,541 UART: [state] DebugLocked = No
269,366 UART: [state] WD Timer not started. Device not locked for debugging
273,970 UART: [kat] SHA2-256
453,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,672 UART: [kat] ++
465,201 UART: [kat] sha1
477,568 UART: [kat] SHA2-256
480,582 UART: [kat] SHA2-384
486,638 UART: [kat] SHA2-512-ACC
489,628 UART: [kat] ECC-384
2,950,036 UART: [kat] HMAC-384Kdf
2,972,330 UART: [kat] LMS
3,501,762 UART: [kat] --
3,505,694 UART: [cold-reset] ++
3,507,124 UART: [fht] FHT @ 0x50003400
3,517,390 UART: [idev] ++
3,517,958 UART: [idev] CDI.KEYID = 6
3,518,837 UART: [idev] SUBJECT.KEYID = 7
3,520,074 UART: [idev] UDS.KEYID = 0
3,520,973 ready_for_fw is high
3,521,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,646 UART: [idev] Erasing UDS.KEYID = 0
6,027,370 UART: [idev] Sha1 KeyId Algorithm
6,050,231 UART: [idev] --
6,054,272 UART: [ldev] ++
6,054,871 UART: [ldev] CDI.KEYID = 6
6,055,802 UART: [ldev] SUBJECT.KEYID = 5
6,056,901 UART: [ldev] AUTHORITY.KEYID = 7
6,058,186 UART: [ldev] FE.KEYID = 1
6,101,418 UART: [ldev] Erasing FE.KEYID = 1
8,604,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,016 UART: [ldev] --
10,414,937 UART: [fwproc] Wait for Commands...
10,417,257 UART: [fwproc] Recv command 0x46574c44
10,419,347 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,289 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,533 >>> mbox cmd response: success
14,278,540 UART: [afmc] ++
14,279,161 UART: [afmc] CDI.KEYID = 6
14,280,075 UART: [afmc] SUBJECT.KEYID = 7
14,281,233 UART: [afmc] AUTHORITY.KEYID = 5
16,812,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,536 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,284 UART: [afmc] --
18,610,736 UART: [cold-reset] --
18,616,479 UART: [state] Locking Datavault
18,620,860 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,576 UART: [state] Locking ICCM
18,625,053 UART: [exit] Launching FMC @ 0x40000130
18,633,512 UART:
18,633,742 UART: Running Caliptra FMC ...
18,634,841 UART:
18,634,999 UART: [state] CFI Enabled
18,693,469 UART: [fht] FMC Alias Private Key: 7
20,457,753 UART: [art] Extend RT PCRs Done
20,458,973 UART: [art] Lock RT PCRs Done
20,460,461 UART: [art] Populate DV Done
20,465,766 UART: [fht] FMC Alias Private Key: 7
20,467,241 UART: [art] Derive CDI
20,467,973 UART: [art] Store in in slot 0x4
20,526,694 UART: [art] Derive Key Pair
20,527,736 UART: [art] Store priv key in slot 0x5
22,990,357 UART: [art] Derive Key Pair - Done
23,003,533 UART: [art] Signing Cert with AUTHO
23,004,847 UART: RITY.KEYID = 7
24,716,159 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,665 UART: [art] PUB.X = 4F05BF4808498E87EB65E9FBCB0FF496FD5F53ABD74C81B62D01FF9885A39D65FC87BD8CC27435C1E6A31F05E61A91BF
24,724,951 UART: [art] PUB.Y = 96BC9137D3C1D05EC7CF960E3DAD6FD89453FB8AE7541BD293F10F3E3438986E289A88CA90840913C6A4D0F81EF9BB22
24,732,213 UART: [art] SIG.R = BFE50887D70458CCAD0E72ADDC3302ECA03B225FDA5CA2B5CA1CB1A79375E79D65F1626CE915F672416D983FEE369E20
24,739,651 UART: [art] SIG.S = E14BE402A32D10A5EA99E201C9DD18923F26522A70F5BA69B490CA65910E61A341CA3C0848BAB2724ACE44B26A7EF8E6
25,718,254 UART: Caliptra RT
25,718,952 UART: [state] CFI Enabled
25,884,769 UART: [rt] RT listening for mailbox commands...
29,909,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,064,805 UART: [rt]cmd =0x41544d4e, len=14344
34,060,829 >>> mbox cmd response data (8 bytes)
34,061,438 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,092,242 UART: [rt]cmd =0x41545348, len=116
34,111,766 >>> mbox cmd response data (12 bytes)
36,164,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,310,325 UART:
36,310,733 UART: Running Caliptra ROM ...
36,311,814 UART:
36,311,975 UART: [state] CFI Enabled
36,384,425 UART: [state] LifecycleState = Unprovisioned
36,386,315 UART: [state] DebugLocked = No
36,387,866 UART: [state] WD Timer not started. Device not locked for debugging
36,392,372 UART: [kat] SHA2-256
36,571,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,583,060 UART: [kat] ++
36,583,518 UART: [kat] sha1
36,593,611 UART: [kat] SHA2-256
36,596,628 UART: [kat] SHA2-384
36,602,661 UART: [kat] SHA2-512-ACC
36,605,598 UART: [kat] ECC-384
39,067,017 UART: [kat] HMAC-384Kdf
39,090,700 UART: [kat] LMS
39,620,108 UART: [kat] --
39,625,930 UART: [update-reset] ++
43,046,780 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,049,807 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
43,431,869 >>> mbox cmd response: success
43,432,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,433,749 UART: [update-reset] Copying MAN_2 To MAN_1
43,456,088 UART: [update-reset Success] --
43,459,707 UART: [state] Locking Datavault
43,463,989 UART: [state] Locking PCR0, PCR1 and PCR31
43,465,649 UART: [state] Locking ICCM
43,468,175 UART: [exit] Launching FMC @ 0x40000130
43,476,618 UART:
43,476,847 UART: Running Caliptra FMC ...
43,477,945 UART:
43,478,101 UART: [state] CFI Enabled
43,583,353 UART: [art] Extend RT PCRs Done
43,584,529 UART: [art] Lock RT PCRs Done
43,586,087 UART: [art] Populate DV Done
43,591,496 UART: [fht] FMC Alias Private Key: 7
43,593,198 UART: [art] Derive CDI
43,594,010 UART: [art] Store in in slot 0x4
43,652,913 UART: [art] Derive Key Pair
43,654,093 UART: [art] Store priv key in slot 0x5
46,116,568 UART: [art] Derive Key Pair - Done
46,129,359 UART: [art] Signing Cert with AUTHO
46,130,693 UART: RITY.KEYID = 7
47,841,438 UART: [art] Erasing AUTHORITY.KEYID = 7
47,842,947 UART: [art] PUB.X = 3E8ED1070C48F0AB607FB6FEFC45F10FAFD2E78AAB06745FEBBF7F14EB25329A444098949E95141030863A684BAC591F
47,850,226 UART: [art] PUB.Y = 3902228DBDD45AEC641CAB7C96C43C1C0A08A3F63E9B66D6E9349676D44C77F02755CD9A22F9074E757B083A16139016
47,857,453 UART: [art] SIG.R = 63A952389E200178B64D2D55F40CC3DB901A8BEFF06168F5B430708B846A77CEC6611ABFC5E47577F31E22A17ED0A21B
47,864,845 UART: [art] SIG.S = 5F0B7089D492EA8D70F66E2E662B9AFCCF289BFA6D96C673CE0CBB16F5CEA050907973DB9235C76B2D801227ABE447A8
48,843,821 UART: Caliptra RT
48,844,531 UART: [state] CFI Enabled
49,184,029 UART: [rt] RT listening for mailbox commands...
49,215,930 UART: [rt]cmd =0x41545348, len=116
49,235,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
3,380,235 ready_for_fw is high
3,380,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,087,941 >>> mbox cmd response: success
18,388,073 UART:
18,388,500 UART: Running Caliptra FMC ...
18,389,612 UART:
18,389,764 UART: [state] CFI Enabled
18,456,594 UART: [fht] FMC Alias Private Key: 7
20,220,389 UART: [art] Extend RT PCRs Done
20,221,615 UART: [art] Lock RT PCRs Done
20,223,321 UART: [art] Populate DV Done
20,228,742 UART: [fht] FMC Alias Private Key: 7
20,230,228 UART: [art] Derive CDI
20,230,981 UART: [art] Store in in slot 0x4
20,289,272 UART: [art] Derive Key Pair
20,290,314 UART: [art] Store priv key in slot 0x5
22,753,457 UART: [art] Derive Key Pair - Done
22,766,407 UART: [art] Signing Cert with AUTHO
22,767,714 UART: RITY.KEYID = 7
24,479,438 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,942 UART: [art] PUB.X = 8E5A926590652D078FDF1B1082B6980085E9806044075E445CB6413B584027BCF56C7A18DBAC615359B8CB13DE41E29E
24,488,186 UART: [art] PUB.Y = F04B8124E4269A683F2A983051386F97EBDDF5F34E77292900169CE59A92DA30FA5DDF0DFB83BC35634B6710E4B4C3E6
24,495,401 UART: [art] SIG.R = 76DA6E9CF8479EA34C455FEE30157F88E8053C65A632764327CD926D9885ED4AA57C7FF8E25A6E4BBB76BDA37058F491
24,502,857 UART: [art] SIG.S = 578D78446CABA1B268AFFE360D36207D5E6A4A7F7DEC0586FC50B43450FBCEDE35E6896CF6C52EFD94B7EA0E3007D20E
25,481,824 UART: Caliptra RT
25,482,532 UART: [state] CFI Enabled
25,647,858 UART: [rt] RT listening for mailbox commands...
29,676,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,832,046 UART: [rt]cmd =0x41544d4e, len=14344
33,828,325 >>> mbox cmd response data (8 bytes)
33,828,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,859,654 UART: [rt]cmd =0x41545348, len=116
33,879,321 >>> mbox cmd response data (12 bytes)
35,931,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
43,058,794 >>> mbox cmd response: success
43,059,419 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,095,020 UART:
43,095,358 UART: Running Caliptra FMC ...
43,096,433 UART:
43,096,587 UART: [state] CFI Enabled
43,190,692 UART: [art] Extend RT PCRs Done
43,191,876 UART: [art] Lock RT PCRs Done
43,193,487 UART: [art] Populate DV Done
43,199,160 UART: [fht] FMC Alias Private Key: 7
43,200,796 UART: [art] Derive CDI
43,201,608 UART: [art] Store in in slot 0x4
43,259,605 UART: [art] Derive Key Pair
43,260,640 UART: [art] Store priv key in slot 0x5
45,723,787 UART: [art] Derive Key Pair - Done
45,736,741 UART: [art] Signing Cert with AUTHO
45,738,047 UART: RITY.KEYID = 7
47,449,887 UART: [art] Erasing AUTHORITY.KEYID = 7
47,451,394 UART: [art] PUB.X = 3A157C8E7DF585B865F5C92D5313051B77E18203584356BC52E01F46753997F6DC07DC85591B0C7D4CFC37065A8C55BC
47,458,626 UART: [art] PUB.Y = CB02D7FE7167814E9D34196BA07200A746FB074604E14F8B623914351F5CF6982E9AE26F40A16162B257F5DDF4CF921B
47,465,891 UART: [art] SIG.R = BAB80CCE0328DD7C76C18C168D99FF92443F02F7D1ED9F8B5158DE70359F34415631FFD90C81641335224A735176E25C
47,473,405 UART: [art] SIG.S = C908BA76AA15C0D5902B21AE3578705180D7D33DEF32C27349AB92B6445C11E22A234ACC8F60B31F363771F388998E39
48,452,912 UART: Caliptra RT
48,453,600 UART: [state] CFI Enabled
48,788,411 UART: [rt] RT listening for mailbox commands...
48,820,067 UART: [rt]cmd =0x41545348, len=116
48,839,656 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
192,981 UART:
193,369 UART: Running Caliptra ROM ...
194,507 UART:
604,012 UART: [state] CFI Enabled
621,299 UART: [state] LifecycleState = Unprovisioned
623,182 UART: [state] DebugLocked = No
625,288 UART: [state] WD Timer not started. Device not locked for debugging
628,715 UART: [kat] SHA2-256
807,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,394 UART: [kat] ++
819,937 UART: [kat] sha1
830,821 UART: [kat] SHA2-256
833,827 UART: [kat] SHA2-384
839,320 UART: [kat] SHA2-512-ACC
842,262 UART: [kat] ECC-384
3,282,872 UART: [kat] HMAC-384Kdf
3,296,537 UART: [kat] LMS
3,826,008 UART: [kat] --
3,829,889 UART: [cold-reset] ++
3,831,616 UART: [fht] FHT @ 0x50003400
3,841,960 UART: [idev] ++
3,842,526 UART: [idev] CDI.KEYID = 6
3,843,519 UART: [idev] SUBJECT.KEYID = 7
3,844,715 UART: [idev] UDS.KEYID = 0
3,845,643 ready_for_fw is high
3,845,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,113 UART: [idev] Erasing UDS.KEYID = 0
6,313,605 UART: [idev] Sha1 KeyId Algorithm
6,335,261 UART: [idev] --
6,338,210 UART: [ldev] ++
6,338,819 UART: [ldev] CDI.KEYID = 6
6,339,736 UART: [ldev] SUBJECT.KEYID = 5
6,340,843 UART: [ldev] AUTHORITY.KEYID = 7
6,342,135 UART: [ldev] FE.KEYID = 1
6,353,162 UART: [ldev] Erasing FE.KEYID = 1
8,830,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,174 UART: [ldev] --
10,620,901 UART: [fwproc] Wait for Commands...
10,622,674 UART: [fwproc] Recv command 0x46574c44
10,624,768 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,495,584 >>> mbox cmd response: success
14,500,200 UART: [afmc] ++
14,500,834 UART: [afmc] CDI.KEYID = 6
14,501,752 UART: [afmc] SUBJECT.KEYID = 7
14,502,865 UART: [afmc] AUTHORITY.KEYID = 5
17,002,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,804 UART: [afmc] --
18,797,839 UART: [cold-reset] --
18,801,374 UART: [state] Locking Datavault
18,807,704 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,353 UART: [state] Locking ICCM
18,812,096 UART: [exit] Launching FMC @ 0x40000130
18,820,560 UART:
18,820,837 UART: Running Caliptra FMC ...
18,821,950 UART:
18,822,112 UART: [state] CFI Enabled
18,829,837 UART: [fht] FMC Alias Private Key: 7
20,586,705 UART: [art] Extend RT PCRs Done
20,587,939 UART: [art] Lock RT PCRs Done
20,589,991 UART: [art] Populate DV Done
20,595,460 UART: [fht] FMC Alias Private Key: 7
20,596,903 UART: [art] Derive CDI
20,597,636 UART: [art] Store in in slot 0x4
20,640,329 UART: [art] Derive Key Pair
20,641,325 UART: [art] Store priv key in slot 0x5
23,067,833 UART: [art] Derive Key Pair - Done
23,080,883 UART: [art] Signing Cert with AUTHO
23,082,188 UART: RITY.KEYID = 7
24,787,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,641 UART: [art] PUB.X = 948682AA9EBE01B6987208885F10D5F22D0C5FA5C893F06543A7F1D1CFAE5B87729391CBB3953B4C34505503581F306F
24,795,914 UART: [art] PUB.Y = 16E29158E79CAD4C9A6862AA79B3B9749A755005669EACF4138322C08E6724D2E5DC65137981EAD997B2160F04D86746
24,803,117 UART: [art] SIG.R = 41B4250AA370749E8981A684629736981927F01442006C3ACE54FD1217B69D8E5ED359B3BE39ABCE43D399B4E8E81F67
24,810,494 UART: [art] SIG.S = C596AB16CE2CBF2FCE596DADD6BE3690BFD8AA6155CC5F47AA14AD58BAC94179299DB6FE17D80DCFADE6AC2A6E52A4BE
25,789,975 UART: Caliptra RT
25,790,667 UART: [state] CFI Enabled
25,908,177 UART: [rt] RT listening for mailbox commands...
29,934,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,090,545 UART: [rt]cmd =0x41544d4e, len=14344
34,086,441 >>> mbox cmd response data (8 bytes)
34,087,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,117,841 UART: [rt]cmd =0x41545348, len=116
34,136,284 >>> mbox cmd response data (12 bytes)
36,189,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,334,680 UART:
36,335,054 UART: Running Caliptra ROM ...
36,336,116 UART:
36,336,269 UART: [state] CFI Enabled
36,350,936 UART: [state] LifecycleState = Unprovisioned
36,352,798 UART: [state] DebugLocked = No
36,355,672 UART: [state] WD Timer not started. Device not locked for debugging
36,360,331 UART: [kat] SHA2-256
36,539,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,551,069 UART: [kat] ++
36,551,528 UART: [kat] sha1
36,563,977 UART: [kat] SHA2-256
36,566,990 UART: [kat] SHA2-384
36,572,551 UART: [kat] SHA2-512-ACC
36,575,544 UART: [kat] ECC-384
39,017,074 UART: [kat] HMAC-384Kdf
39,029,481 UART: [kat] LMS
39,559,008 UART: [kat] --
39,563,981 UART: [update-reset] ++
42,990,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,994,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
43,376,356 >>> mbox cmd response: success
43,376,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,377,560 UART: [update-reset] Copying MAN_2 To MAN_1
43,399,897 UART: [update-reset Success] --
43,405,486 UART: [state] Locking Datavault
43,408,257 UART: [state] Locking PCR0, PCR1 and PCR31
43,409,958 UART: [state] Locking ICCM
43,411,410 UART: [exit] Launching FMC @ 0x40000130
43,419,859 UART:
43,420,097 UART: Running Caliptra FMC ...
43,421,208 UART:
43,421,365 UART: [state] CFI Enabled
43,465,328 UART: [art] Extend RT PCRs Done
43,466,514 UART: [art] Lock RT PCRs Done
43,467,865 UART: [art] Populate DV Done
43,473,325 UART: [fht] FMC Alias Private Key: 7
43,474,859 UART: [art] Derive CDI
43,475,603 UART: [art] Store in in slot 0x4
43,518,544 UART: [art] Derive Key Pair
43,519,694 UART: [art] Store priv key in slot 0x5
45,946,589 UART: [art] Derive Key Pair - Done
45,959,323 UART: [art] Signing Cert with AUTHO
45,960,628 UART: RITY.KEYID = 7
47,665,844 UART: [art] Erasing AUTHORITY.KEYID = 7
47,667,349 UART: [art] PUB.X = 8DB0754D66BA01B7AD60B8D468D9EE66C248F5ADF56253408713FD6A0CE53B8759232C2A115B21B82DBF379AA01E17E4
47,674,678 UART: [art] PUB.Y = 6458415A69E2D40607064362789C7CD1F7B037EB84E20F66D30C709AB9A2A8BF8E679807CA489FBC304921CB51C6D388
47,681,888 UART: [art] SIG.R = CC1A30081C99448933FD54A45875392AB4407ACF767200550DC06FB97FF045060F6FD9DEAB90E8726DA4D207C1DA4A22
47,689,260 UART: [art] SIG.S = 660E9DD6E694E74B0357DDFBF5D39FDDBBD2DE198856F0C7F57EE263238CFD022FDD1B32EE64D191CDAA0F6A9475B4C0
48,668,017 UART: Caliptra RT
48,668,712 UART: [state] CFI Enabled
48,958,327 UART: [rt] RT listening for mailbox commands...
48,990,336 UART: [rt]cmd =0x41545348, len=116
49,010,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,856 writing to cptra_bootfsm_go
3,698,259 ready_for_fw is high
3,698,694 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,068 >>> mbox cmd response: success
18,522,149 UART:
18,522,526 UART: Running Caliptra FMC ...
18,523,634 UART:
18,523,789 UART: [state] CFI Enabled
18,531,840 UART: [fht] FMC Alias Private Key: 7
20,289,237 UART: [art] Extend RT PCRs Done
20,290,461 UART: [art] Lock RT PCRs Done
20,292,250 UART: [art] Populate DV Done
20,297,766 UART: [fht] FMC Alias Private Key: 7
20,299,263 UART: [art] Derive CDI
20,300,033 UART: [art] Store in in slot 0x4
20,342,848 UART: [art] Derive Key Pair
20,343,853 UART: [art] Store priv key in slot 0x5
22,770,742 UART: [art] Derive Key Pair - Done
22,784,032 UART: [art] Signing Cert with AUTHO
22,785,343 UART: RITY.KEYID = 7
24,490,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,328 UART: [art] PUB.X = 6CD42D9FCB08379D39514BB416CB71934DC97CC49ECBCBDAB077AE5B646AEE944E8CF6B01486AA3E224975CFC96789EA
24,499,602 UART: [art] PUB.Y = 8D71B384CD362DD2D2280B7639C16BC453568957BE608C21AA682A89F115E2FFDDFC21EE34027610ECD9607F2FC91F2B
24,506,883 UART: [art] SIG.R = E82261534477DE012A453D55951430733291E95D9DDD1C53567E82B02D4E08A203DC41443CF68CF42963204B227DD021
24,514,260 UART: [art] SIG.S = 64FD8FEFCC49547EF53DC52A6C2BD0D1BD0031A402FA814219532B436A7E9957E0A3A173EF65CE9B9540FEECC49BE08F
25,493,701 UART: Caliptra RT
25,494,404 UART: [state] CFI Enabled
25,611,519 UART: [rt] RT listening for mailbox commands...
29,644,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,800,313 UART: [rt]cmd =0x41544d4e, len=14344
33,796,042 >>> mbox cmd response data (8 bytes)
33,796,610 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,827,463 UART: [rt]cmd =0x41545348, len=116
33,846,983 >>> mbox cmd response data (12 bytes)
35,899,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
42,947,598 >>> mbox cmd response: success
42,948,225 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,980,374 UART:
42,980,675 UART: Running Caliptra FMC ...
42,981,714 UART:
42,981,890 UART: [state] CFI Enabled
43,025,818 UART: [art] Extend RT PCRs Done
43,027,021 UART: [art] Lock RT PCRs Done
43,028,620 UART: [art] Populate DV Done
43,034,137 UART: [fht] FMC Alias Private Key: 7
43,035,735 UART: [art] Derive CDI
43,036,552 UART: [art] Store in in slot 0x4
43,079,149 UART: [art] Derive Key Pair
43,080,156 UART: [art] Store priv key in slot 0x5
45,507,307 UART: [art] Derive Key Pair - Done
45,520,368 UART: [art] Signing Cert with AUTHO
45,521,675 UART: RITY.KEYID = 7
47,227,186 UART: [art] Erasing AUTHORITY.KEYID = 7
47,228,702 UART: [art] PUB.X = 9BA8662FF09EDE5CA480BF9F0FA1B2228AB68B364971449DE53C65F59895A09DE17E0963841346CA22501C28C4A1AFC0
47,235,931 UART: [art] PUB.Y = 7A9826D0AE51BF56AC2DD9FEE64A6C459178C0590388E6ECA68A6FC1A93C8E613FC5691EBF458D4ADE5A86A0C6BF0461
47,243,201 UART: [art] SIG.R = BD1CBC9FA1B237251ED90073B1B58125E7D96DFAEE80FE9906975FBDB5850BC25641454F2A668B28EF176D52B469C10B
47,250,642 UART: [art] SIG.S = 3663284D1D1C9DC902A9A0F1458DC3C9CE3FBD27176EA2CE0232FBBBD838D82C46AB136B840B266ED295CD76B7BC1FF0
48,229,386 UART: Caliptra RT
48,230,088 UART: [state] CFI Enabled
48,520,250 UART: [rt] RT listening for mailbox commands...
48,552,031 UART: [rt]cmd =0x41545348, len=116
48,572,176 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,375 UART:
192,749 UART: Running Caliptra ROM ...
193,937 UART:
194,091 UART: [state] CFI Enabled
265,588 UART: [state] LifecycleState = Unprovisioned
268,011 UART: [state] DebugLocked = No
269,848 UART: [state] WD Timer not started. Device not locked for debugging
273,755 UART: [kat] SHA2-256
463,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,416 UART: [kat] ++
474,865 UART: [kat] sha1
485,412 UART: [kat] SHA2-256
488,390 UART: [kat] SHA2-384
495,379 UART: [kat] SHA2-512-ACC
497,959 UART: [kat] ECC-384
2,949,363 UART: [kat] HMAC-384Kdf
2,973,969 UART: [kat] LMS
3,505,741 UART: [kat] --
3,511,258 UART: [cold-reset] ++
3,512,196 UART: [fht] FHT @ 0x50003400
3,523,743 UART: [idev] ++
3,524,447 UART: [idev] CDI.KEYID = 6
3,525,543 UART: [idev] SUBJECT.KEYID = 7
3,526,668 UART: [idev] UDS.KEYID = 0
3,527,571 ready_for_fw is high
3,527,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,249 UART: [idev] Erasing UDS.KEYID = 0
6,033,749 UART: [idev] Sha1 KeyId Algorithm
6,056,888 UART: [idev] --
6,061,855 UART: [ldev] ++
6,062,532 UART: [ldev] CDI.KEYID = 6
6,063,499 UART: [ldev] SUBJECT.KEYID = 5
6,064,658 UART: [ldev] AUTHORITY.KEYID = 7
6,065,894 UART: [ldev] FE.KEYID = 1
6,104,046 UART: [ldev] Erasing FE.KEYID = 1
8,610,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,395 UART: [ldev] --
10,418,641 UART: [fwproc] Wait for Commands...
10,420,756 UART: [fwproc] Recv command 0x46574c44
10,423,060 UART: [fwproc] Recv'd Img size: 114084 bytes
13,868,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,609,190 >>> mbox cmd response: success
14,613,544 UART: [afmc] ++
14,614,285 UART: [afmc] CDI.KEYID = 6
14,615,483 UART: [afmc] SUBJECT.KEYID = 7
14,616,924 UART: [afmc] AUTHORITY.KEYID = 5
17,155,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,286 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,696 UART: [afmc] --
18,951,582 UART: [cold-reset] --
18,954,423 UART: [state] Locking Datavault
18,962,168 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,579 UART: [state] Locking ICCM
18,966,557 UART: [exit] Launching FMC @ 0x40000130
18,975,197 UART:
18,975,435 UART: Running Caliptra FMC ...
18,976,482 UART:
18,976,630 UART: [state] CFI Enabled
19,035,802 UART: [fht] FMC Alias Private Key: 7
20,799,270 UART: [art] Extend RT PCRs Done
20,800,512 UART: [art] Lock RT PCRs Done
20,802,164 UART: [art] Populate DV Done
20,807,580 UART: [fht] FMC Alias Private Key: 7
20,809,162 UART: [art] Derive CDI
20,809,902 UART: [art] Store in in slot 0x4
20,868,286 UART: [art] Derive Key Pair
20,869,289 UART: [art] Store priv key in slot 0x5
23,332,347 UART: [art] Derive Key Pair - Done
23,345,618 UART: [art] Signing Cert with AUTHO
23,346,925 UART: RITY.KEYID = 7
25,058,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,641 UART: [art] PUB.X = 676C43604EEBC839D33848AEC8647BDC29AA7ADCEAA40AF52CA7F304BEC91F29CBB74D1C33CB62E7F7FB11BBE6122773
25,066,970 UART: [art] PUB.Y = 2D8FBE1B8F975853020B89B9C89FF565582E4BE9EC758400EA9BF92A5B49C492FF409C62EF2C626CC8F23D884D1ACDF0
25,074,236 UART: [art] SIG.R = 7540481048B884409A698BAC7F8970DA8CD5FD60A04FCF33B205890C648E7B6833E7BB7BA85A1965F662BD38F5A178CE
25,081,608 UART: [art] SIG.S = F1CE8CCCFFDA3F74937CFF7648626BC3A96433A28941E6D182CE931985971F35601777A7E455D49FB1D8E80270091AA9
26,060,765 UART: Caliptra RT
26,061,498 UART: [state] CFI Enabled
26,227,105 UART: [rt] RT listening for mailbox commands...
30,259,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,414,966 UART: [rt]cmd =0x41544d4e, len=14344
34,410,696 >>> mbox cmd response data (8 bytes)
34,411,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,442,021 UART: [rt]cmd =0x41545348, len=116
34,461,354 >>> mbox cmd response data (12 bytes)
36,515,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,660,042 UART:
36,660,412 UART: Running Caliptra ROM ...
36,661,484 UART:
36,661,641 UART: [state] CFI Enabled
36,723,404 UART: [state] LifecycleState = Unprovisioned
36,725,516 UART: [state] DebugLocked = No
36,727,151 UART: [state] WD Timer not started. Device not locked for debugging
36,731,562 UART: [kat] SHA2-256
36,921,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,932,182 UART: [kat] ++
36,932,637 UART: [kat] sha1
36,944,127 UART: [kat] SHA2-256
36,947,149 UART: [kat] SHA2-384
36,954,492 UART: [kat] SHA2-512-ACC
36,957,078 UART: [kat] ECC-384
39,405,140 UART: [kat] HMAC-384Kdf
39,427,006 UART: [kat] LMS
39,958,590 UART: [kat] --
39,961,580 UART: [update-reset] ++
43,415,180 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,419,425 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
44,025,501 >>> mbox cmd response: success
44,030,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,030,705 UART: [update-reset] Copying MAN_2 To MAN_1
44,064,927 UART: [update-reset Success] --
44,069,378 UART: [state] Locking Datavault
44,073,401 UART: [state] Locking PCR0, PCR1 and PCR31
44,075,561 UART: [state] Locking ICCM
44,077,069 UART: [exit] Launching FMC @ 0x40000130
44,085,746 UART:
44,086,055 UART: Running Caliptra FMC ...
44,087,093 UART:
44,087,246 UART: [state] CFI Enabled
44,173,318 UART: [art] Extend RT PCRs Done
44,174,513 UART: [art] Lock RT PCRs Done
44,176,055 UART: [art] Populate DV Done
44,181,463 UART: [fht] FMC Alias Private Key: 7
44,183,099 UART: [art] Derive CDI
44,183,839 UART: [art] Store in in slot 0x4
44,242,740 UART: [art] Derive Key Pair
44,244,152 UART: [art] Store priv key in slot 0x5
46,706,635 UART: [art] Derive Key Pair - Done
46,719,375 UART: [art] Signing Cert with AUTHO
46,720,675 UART: RITY.KEYID = 7
48,432,057 UART: [art] Erasing AUTHORITY.KEYID = 7
48,433,574 UART: [art] PUB.X = 56C2C13BA420B81F3C25691B7BAEA126ADEF561D001C68140B7630F86B6380BEB84146652E495EA86ECFE2CEC9B6C582
48,440,874 UART: [art] PUB.Y = 81C808D5C900F43A4CC4E4E6A26BA48B1AFCBF568D39505AD6B6CF72B3232A92EA65E0139217FB9D36B954ECEA4CCD01
48,448,073 UART: [art] SIG.R = D9D27963D0A2B8B87AEECB8619561143F8ED3D49D0D499044629A1D764AF9CEE59103C9A7138B43043507AD58F8D0EFC
48,455,451 UART: [art] SIG.S = 588EFFBFE8B71C0EF2E8A48EA6DFB2D3C600A08C4AB222148B03B31912EA04C6B8014FAEA056D5207899C2E69A0D0C9C
49,434,450 UART: Caliptra RT
49,435,162 UART: [state] CFI Enabled
49,771,452 UART: [rt] RT listening for mailbox commands...
49,803,592 UART: [rt]cmd =0x41545348, len=116
49,823,007 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,435,365 ready_for_fw is high
3,435,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,745,021 >>> mbox cmd response: success
19,037,616 UART:
19,038,023 UART: Running Caliptra FMC ...
19,039,148 UART:
19,039,306 UART: [state] CFI Enabled
19,106,233 UART: [fht] FMC Alias Private Key: 7
20,869,569 UART: [art] Extend RT PCRs Done
20,870,798 UART: [art] Lock RT PCRs Done
20,872,233 UART: [art] Populate DV Done
20,877,503 UART: [fht] FMC Alias Private Key: 7
20,879,241 UART: [art] Derive CDI
20,879,984 UART: [art] Store in in slot 0x4
20,938,917 UART: [art] Derive Key Pair
20,939,918 UART: [art] Store priv key in slot 0x5
23,403,221 UART: [art] Derive Key Pair - Done
23,415,954 UART: [art] Signing Cert with AUTHO
23,417,256 UART: RITY.KEYID = 7
25,129,043 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,543 UART: [art] PUB.X = D410C62A789208CB9DBF6D674A908D88B6BA2A1D884711B65ADCBACE79165DD9182706AAA2B8A0C1C21F52241ABF0204
25,137,795 UART: [art] PUB.Y = 1F1C20B7EB03A261FAFC79DBC25E3345F6CEE0551C4D17B524C7B0B8C752CE42A2029BCE2FBDB9AEEE075E43252AB58F
25,145,117 UART: [art] SIG.R = 1E58B1C1B1542416DF5123C5CE7F9F58D39F1575C9443FEADB3AF50CDB1AF1AEDC4A862ED0269163CF006B0C69428DF0
25,152,492 UART: [art] SIG.S = 95C97BC398E8E983FAABB8F5E22E49FD2BC3D1963860189B5890CB28BD90FA756A5E7A7C1D64E5FC433D5C4AE18CC7D7
26,131,432 UART: Caliptra RT
26,132,146 UART: [state] CFI Enabled
26,298,179 UART: [rt] RT listening for mailbox commands...
30,323,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,479,378 UART: [rt]cmd =0x41544d4e, len=14344
34,475,040 >>> mbox cmd response data (8 bytes)
34,475,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,506,303 UART: [rt]cmd =0x41545348, len=116
34,525,366 >>> mbox cmd response data (12 bytes)
36,579,861 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
44,394,059 >>> mbox cmd response: success
44,399,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,428,128 UART:
44,428,432 UART: Running Caliptra FMC ...
44,429,545 UART:
44,429,708 UART: [state] CFI Enabled
44,522,095 UART: [art] Extend RT PCRs Done
44,523,294 UART: [art] Lock RT PCRs Done
44,524,746 UART: [art] Populate DV Done
44,530,422 UART: [fht] FMC Alias Private Key: 7
44,532,135 UART: [art] Derive CDI
44,532,947 UART: [art] Store in in slot 0x4
44,591,290 UART: [art] Derive Key Pair
44,592,335 UART: [art] Store priv key in slot 0x5
47,054,912 UART: [art] Derive Key Pair - Done
47,068,030 UART: [art] Signing Cert with AUTHO
47,069,342 UART: RITY.KEYID = 7
48,779,803 UART: [art] Erasing AUTHORITY.KEYID = 7
48,781,322 UART: [art] PUB.X = 01FA4CD0A71058F8EFE78503B22812AB43FDEC99539380DA9CA4EF4809A2989BA67DBC98CDF501778D570B55BF78FE02
48,788,553 UART: [art] PUB.Y = E5BC64625CA08331D5A2BECA077764B78ACC68AF30BD0786D00D693A5400AFD0FA5DFFFDA81FB6E08A0D7D0FB578B33A
48,795,806 UART: [art] SIG.R = BE10DDF48BC2846633574B6372282E17F826459B2579DB069DC87389F60C00434A4D6AE8CFECDD106D627A123029BFA9
48,803,202 UART: [art] SIG.S = 629AA92342E5DD0EA7B7E30B5C6DB0F4A9F11CB717FF29EF11438C04B2967D2650D9E905F0A37D6170C450EA79FB0897
49,782,440 UART: Caliptra RT
49,783,147 UART: [state] CFI Enabled
50,119,690 UART: [rt] RT listening for mailbox commands...
50,151,322 UART: [rt]cmd =0x41545348, len=116
50,171,186 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,585 writing to cptra_bootfsm_go
192,755 UART:
193,144 UART: Running Caliptra ROM ...
194,341 UART:
604,050 UART: [state] CFI Enabled
615,952 UART: [state] LifecycleState = Unprovisioned
618,327 UART: [state] DebugLocked = No
620,273 UART: [state] WD Timer not started. Device not locked for debugging
624,167 UART: [kat] SHA2-256
814,029 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,839 UART: [kat] ++
825,398 UART: [kat] sha1
837,193 UART: [kat] SHA2-256
840,187 UART: [kat] SHA2-384
846,338 UART: [kat] SHA2-512-ACC
848,924 UART: [kat] ECC-384
3,291,769 UART: [kat] HMAC-384Kdf
3,304,291 UART: [kat] LMS
3,836,106 UART: [kat] --
3,841,115 UART: [cold-reset] ++
3,843,267 UART: [fht] FHT @ 0x50003400
3,854,176 UART: [idev] ++
3,854,882 UART: [idev] CDI.KEYID = 6
3,855,833 UART: [idev] SUBJECT.KEYID = 7
3,857,002 UART: [idev] UDS.KEYID = 0
3,857,912 ready_for_fw is high
3,858,116 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,470 UART: [idev] Erasing UDS.KEYID = 0
6,329,810 UART: [idev] Sha1 KeyId Algorithm
6,352,504 UART: [idev] --
6,357,584 UART: [ldev] ++
6,358,307 UART: [ldev] CDI.KEYID = 6
6,359,197 UART: [ldev] SUBJECT.KEYID = 5
6,360,409 UART: [ldev] AUTHORITY.KEYID = 7
6,361,558 UART: [ldev] FE.KEYID = 1
6,373,980 UART: [ldev] Erasing FE.KEYID = 1
8,851,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,058 UART: [ldev] --
10,644,276 UART: [fwproc] Wait for Commands...
10,646,852 UART: [fwproc] Recv command 0x46574c44
10,649,105 UART: [fwproc] Recv'd Img size: 114084 bytes
14,086,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,205 >>> mbox cmd response: success
14,826,502 UART: [afmc] ++
14,827,250 UART: [afmc] CDI.KEYID = 6
14,828,368 UART: [afmc] SUBJECT.KEYID = 7
14,829,865 UART: [afmc] AUTHORITY.KEYID = 5
17,331,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,880 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,316 UART: [afmc] --
19,130,723 UART: [cold-reset] --
19,134,324 UART: [state] Locking Datavault
19,139,692 UART: [state] Locking PCR0, PCR1 and PCR31
19,141,899 UART: [state] Locking ICCM
19,144,001 UART: [exit] Launching FMC @ 0x40000130
19,152,689 UART:
19,152,958 UART: Running Caliptra FMC ...
19,154,067 UART:
19,154,235 UART: [state] CFI Enabled
19,162,196 UART: [fht] FMC Alias Private Key: 7
20,918,930 UART: [art] Extend RT PCRs Done
20,920,145 UART: [art] Lock RT PCRs Done
20,921,689 UART: [art] Populate DV Done
20,927,045 UART: [fht] FMC Alias Private Key: 7
20,928,639 UART: [art] Derive CDI
20,929,380 UART: [art] Store in in slot 0x4
20,972,187 UART: [art] Derive Key Pair
20,973,188 UART: [art] Store priv key in slot 0x5
23,399,676 UART: [art] Derive Key Pair - Done
23,412,776 UART: [art] Signing Cert with AUTHO
23,414,084 UART: RITY.KEYID = 7
25,119,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,913 UART: [art] PUB.X = 7CFEDECC4CF67E4E83A40769BCEDC453B60095D744AB50FD4A54B4B684743757162E00753264B776E5166B67E02C0961
25,128,085 UART: [art] PUB.Y = 374410F1BBA3DA15D496FA4AD5B1973CFB121BE814A865066DC125FF466A668122E4549A7D7D58A6E11946D962FF3560
25,135,400 UART: [art] SIG.R = 7B755E949274105102D647F2EFED61B3AF3561D150771C67C33B8DBE31F399553E232527E61CE6AA90090C89F3D94B13
25,142,716 UART: [art] SIG.S = F790F5EBE2F4F6E0CEAAC30E936161C61D9B39CE98AE3A0041B2946606A0492ACD24824348D74A11042257D7BCE1B22C
26,121,945 UART: Caliptra RT
26,122,664 UART: [state] CFI Enabled
26,239,434 UART: [rt] RT listening for mailbox commands...
30,269,147 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,424,651 UART: [rt]cmd =0x41544d4e, len=14344
34,420,459 >>> mbox cmd response data (8 bytes)
34,421,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,451,932 UART: [rt]cmd =0x41545348, len=116
34,471,506 >>> mbox cmd response data (12 bytes)
36,527,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,672,357 UART:
36,672,778 UART: Running Caliptra ROM ...
36,673,836 UART:
36,673,997 UART: [state] CFI Enabled
36,690,543 UART: [state] LifecycleState = Unprovisioned
36,692,431 UART: [state] DebugLocked = No
36,694,791 UART: [state] WD Timer not started. Device not locked for debugging
36,699,004 UART: [kat] SHA2-256
36,888,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,899,668 UART: [kat] ++
36,900,264 UART: [kat] sha1
36,911,540 UART: [kat] SHA2-256
36,914,564 UART: [kat] SHA2-384
36,921,393 UART: [kat] SHA2-512-ACC
36,924,012 UART: [kat] ECC-384
39,362,641 UART: [kat] HMAC-384Kdf
39,376,726 UART: [kat] LMS
39,908,342 UART: [kat] --
39,911,806 UART: [update-reset] ++
43,375,984 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,378,714 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
43,984,789 >>> mbox cmd response: success
43,989,439 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,990,032 UART: [update-reset] Copying MAN_2 To MAN_1
44,022,962 UART: [update-reset Success] --
44,027,828 UART: [state] Locking Datavault
44,030,995 UART: [state] Locking PCR0, PCR1 and PCR31
44,033,151 UART: [state] Locking ICCM
44,034,777 UART: [exit] Launching FMC @ 0x40000130
44,043,444 UART:
44,043,744 UART: Running Caliptra FMC ...
44,044,777 UART:
44,044,928 UART: [state] CFI Enabled
44,088,844 UART: [art] Extend RT PCRs Done
44,090,000 UART: [art] Lock RT PCRs Done
44,091,514 UART: [art] Populate DV Done
44,096,979 UART: [fht] FMC Alias Private Key: 7
44,098,733 UART: [art] Derive CDI
44,099,552 UART: [art] Store in in slot 0x4
44,141,873 UART: [art] Derive Key Pair
44,143,061 UART: [art] Store priv key in slot 0x5
46,569,753 UART: [art] Derive Key Pair - Done
46,582,763 UART: [art] Signing Cert with AUTHO
46,584,081 UART: RITY.KEYID = 7
48,289,715 UART: [art] Erasing AUTHORITY.KEYID = 7
48,291,223 UART: [art] PUB.X = 06EAB7CFE0775B07472E7D5404B3370735C4EB8B614738F7E5C44DF9DC2745E42F0F12866149BCAC0DFB06F7F5C74CFF
48,298,449 UART: [art] PUB.Y = F8A016E41DE6425AF3A0074A9B437D8A2E221FD0D26624BF2DFC9B1EBB92637D8D29A5FE48D185A1095AD378A41A5FAB
48,305,754 UART: [art] SIG.R = E8805A675E678978397693B6A7411BF8A16E23A12D64637FEC285F27857F4343BC2B6385AD7196917D0CA6C380A28BE5
48,313,120 UART: [art] SIG.S = 9542C848FEBE591414F383770F0A02281A0BB68717B574FE5ABF4086688653776274FB4875F5762E9DD445292C8FC957
49,292,122 UART: Caliptra RT
49,292,821 UART: [state] CFI Enabled
49,577,251 UART: [rt] RT listening for mailbox commands...
49,609,333 UART: [rt]cmd =0x41545348, len=116
49,628,378 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
3,755,357 ready_for_fw is high
3,756,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,950,853 >>> mbox cmd response: success
19,209,279 UART:
19,209,665 UART: Running Caliptra FMC ...
19,210,870 UART:
19,211,048 UART: [state] CFI Enabled
19,218,606 UART: [fht] FMC Alias Private Key: 7
20,975,365 UART: [art] Extend RT PCRs Done
20,976,595 UART: [art] Lock RT PCRs Done
20,978,285 UART: [art] Populate DV Done
20,983,450 UART: [fht] FMC Alias Private Key: 7
20,985,006 UART: [art] Derive CDI
20,985,837 UART: [art] Store in in slot 0x4
21,028,224 UART: [art] Derive Key Pair
21,029,237 UART: [art] Store priv key in slot 0x5
23,456,239 UART: [art] Derive Key Pair - Done
23,469,569 UART: [art] Signing Cert with AUTHO
23,470,919 UART: RITY.KEYID = 7
25,176,952 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,465 UART: [art] PUB.X = 03C1271A7AD65675D901376D21BE9E705102FF8079E0C3C5DE9A5D9D6BA72AFBD7F1B71383F26975B555A58A8B3CC39C
25,185,725 UART: [art] PUB.Y = 83996296C12E722337F2EB633F010F80C18D0B7AC4ADA037AD515C6D5C9C2AEA9035FFA895D5539BCAF87B5EB2ACAC34
25,193,008 UART: [art] SIG.R = AFA2FD84BED572A9D391BD08B6A88CF2544C86ACF032E21E063459F39306C2CF484538D6A31176D4473AE41AFE1D57BB
25,200,408 UART: [art] SIG.S = 9BAD9D1CA85190D9BE00682401BF7D7A21B80152908AE5C1E07B6F06D2974A3A2697E4FE9F340DE16B024920ED7E1D4E
26,179,325 UART: Caliptra RT
26,180,045 UART: [state] CFI Enabled
26,297,009 UART: [rt] RT listening for mailbox commands...
30,334,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,490,232 UART: [rt]cmd =0x41544d4e, len=14344
34,486,109 >>> mbox cmd response data (8 bytes)
34,486,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,517,514 UART: [rt]cmd =0x41545348, len=116
34,537,419 >>> mbox cmd response data (12 bytes)
36,599,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
44,323,583 >>> mbox cmd response: success
44,328,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,359,640 UART:
44,359,984 UART: Running Caliptra FMC ...
44,361,030 UART:
44,361,196 UART: [state] CFI Enabled
44,405,131 UART: [art] Extend RT PCRs Done
44,406,298 UART: [art] Lock RT PCRs Done
44,407,868 UART: [art] Populate DV Done
44,413,283 UART: [fht] FMC Alias Private Key: 7
44,414,992 UART: [art] Derive CDI
44,415,813 UART: [art] Store in in slot 0x4
44,458,620 UART: [art] Derive Key Pair
44,459,680 UART: [art] Store priv key in slot 0x5
46,886,380 UART: [art] Derive Key Pair - Done
46,899,391 UART: [art] Signing Cert with AUTHO
46,900,760 UART: RITY.KEYID = 7
48,605,880 UART: [art] Erasing AUTHORITY.KEYID = 7
48,607,375 UART: [art] PUB.X = EFA8A5D4DAABB6F3CD7A19CAEE1150A294A1B83E0FECD1B3C26291E00A06626D891CC96444356077FB3CBFF7B5F84AA5
48,614,731 UART: [art] PUB.Y = 0B5B0B2012717F3EA6B77F1B11A717DF03B3747660D8F4F424CA4B611DEBB5E0F94CAF9D6600FFE3A6DA4216845E0F6D
48,621,950 UART: [art] SIG.R = 3C499AE3E2EE4EDB03F0D734143FEF459557F40ABF08A16BE3DAA988A8C40178C2C07900F911A90F24AE0778C83F3BAD
48,629,339 UART: [art] SIG.S = 2E13C4F3C63CA16E11126EB968E6F214A345BA10FEA3E2C33EBD8AB2A7CB994E8B43DBDB55B6D1AF04E846758F8F3A29
49,608,575 UART: Caliptra RT
49,609,287 UART: [state] CFI Enabled
49,892,968 UART: [rt] RT listening for mailbox commands...
49,924,828 UART: [rt]cmd =0x41545348, len=116
49,944,840 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,625 UART: [kat] SHA2-256
881,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,671 UART: [kat] ++
885,823 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,254 UART: [kat] LMS
1,475,450 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,603 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 ready_for_fw is high
1,480,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,042 UART: [idev] Erasing UDS.KEYID = 0
1,504,908 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,721 UART: [ldev] ++
1,514,889 UART: [ldev] CDI.KEYID = 6
1,515,252 UART: [ldev] SUBJECT.KEYID = 5
1,515,678 UART: [ldev] AUTHORITY.KEYID = 7
1,516,141 UART: [ldev] FE.KEYID = 1
1,521,313 UART: [ldev] Erasing FE.KEYID = 1
1,546,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,106 UART: [ldev] --
1,586,397 UART: [fwproc] Waiting for Commands...
1,587,086 UART: [fwproc] Received command 0x46574c44
1,587,877 UART: [fwproc] Received Image of size 114084 bytes
2,883,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,316 >>> mbox cmd response: success
3,076,536 UART: [afmc] ++
3,076,704 UART: [afmc] CDI.KEYID = 6
3,077,066 UART: [afmc] SUBJECT.KEYID = 7
3,077,491 UART: [afmc] AUTHORITY.KEYID = 5
3,112,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,222 UART: [afmc] --
3,156,350 UART: [cold-reset] --
3,157,268 UART: [state] Locking Datavault
3,158,569 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,173 UART: [state] Locking ICCM
3,159,803 UART: [exit] Launching FMC @ 0x40000130
3,165,132 UART:
3,165,148 UART: Running Caliptra FMC ...
3,165,556 UART:
3,165,610 UART: [state] CFI Enabled
3,175,943 UART: [fht] FMC Alias Private Key: 7
3,284,006 UART: [art] Extend RT PCRs Done
3,284,434 UART: [art] Lock RT PCRs Done
3,286,084 UART: [art] Populate DV Done
3,294,013 UART: [fht] FMC Alias Private Key: 7
3,295,055 UART: [art] Derive CDI
3,295,335 UART: [art] Store in in slot 0x4
3,380,740 UART: [art] Derive Key Pair
3,381,100 UART: [art] Store priv key in slot 0x5
3,393,978 UART: [art] Derive Key Pair - Done
3,408,965 UART: [art] Signing Cert with AUTHO
3,409,445 UART: RITY.KEYID = 7
3,424,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,526 UART: [art] PUB.X = 813C6E8B300DA95685DD10036265C2B1B98517378EA65B68B92F1E63ED44661E49F6662B46173BBF00FC4CC05B22274B
3,432,266 UART: [art] PUB.Y = 1C97FE732F6E1B0AEF4F41E76C617C92F5F6770AE81BCED3CE0660D1C50D373C44F1FCC1849B1E8465429B3857A987E7
3,439,214 UART: [art] SIG.R = F4835F5CFDED0EE59F5E56ED600975463A342161A172BE91334A817CA46220A9760DC9D9EC05A172DA6F3EB6A4B6B19A
3,445,982 UART: [art] SIG.S = 7AE6426E5BF1D9E3CDA8500A3FBB09E9DF6F5FFAFE3C5576D72A65B6DBDDF32356A675D66FFD9A839E54FF716C383D5D
3,469,867 UART: Caliptra RT
3,470,120 UART: [state] CFI Enabled
3,576,995 UART: [rt] RT listening for mailbox commands...
3,577,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,775 UART: [rt]cmd =0x41544d4e, len=14344
4,011,178 >>> mbox cmd response data (8 bytes)
4,011,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,382 UART: [rt]cmd =0x41545348, len=116
4,062,907 >>> mbox cmd response data (12 bytes)
4,062,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,894 UART:
4,063,910 UART: Running Caliptra ROM ...
4,064,318 UART:
4,064,372 UART: [state] CFI Enabled
4,067,196 UART: [state] LifecycleState = Unprovisioned
4,067,851 UART: [state] DebugLocked = No
4,068,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,070,118 UART: [kat] SHA2-256
4,864,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,868,164 UART: [kat] ++
4,868,316 UART: [kat] sha1
4,872,694 UART: [kat] SHA2-256
4,874,632 UART: [kat] SHA2-384
4,877,193 UART: [kat] SHA2-512-ACC
4,879,093 UART: [kat] ECC-384
4,884,600 UART: [kat] HMAC-384Kdf
4,889,184 UART: [kat] LMS
5,457,380 UART: [kat] --
5,458,255 UART: [update-reset] ++
6,789,243 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,790,499 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,940,003 >>> mbox cmd response: success
6,940,003 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,940,188 UART: [update-reset] Copying MAN_2 To MAN_1
6,948,202 UART: [update-reset Success] --
6,949,295 UART: [state] Locking Datavault
6,949,853 UART: [state] Locking PCR0, PCR1 and PCR31
6,950,457 UART: [state] Locking ICCM
6,950,961 UART: [exit] Launching FMC @ 0x40000130
6,956,290 UART:
6,956,306 UART: Running Caliptra FMC ...
6,956,714 UART:
6,956,768 UART: [state] CFI Enabled
7,045,675 UART: [art] Extend RT PCRs Done
7,046,103 UART: [art] Lock RT PCRs Done
7,047,526 UART: [art] Populate DV Done
7,055,827 UART: [fht] FMC Alias Private Key: 7
7,056,791 UART: [art] Derive CDI
7,057,071 UART: [art] Store in in slot 0x4
7,142,804 UART: [art] Derive Key Pair
7,143,164 UART: [art] Store priv key in slot 0x5
7,155,766 UART: [art] Derive Key Pair - Done
7,170,510 UART: [art] Signing Cert with AUTHO
7,170,990 UART: RITY.KEYID = 7
7,186,336 UART: [art] Erasing AUTHORITY.KEYID = 7
7,187,101 UART: [art] PUB.X = CF5B007CA27F0F4834538A351C3CDA4A940BEA42046FD513349C7C4901FEE441F7CF079BD8FB441B78D73BF31A273BE1
7,193,846 UART: [art] PUB.Y = 642E9F97E38FA8316105F320CEC76F70BF30CDCFE562F72B3C53E81700A27F857F650112FE494DEC8EAA7712956BFA17
7,200,776 UART: [art] SIG.R = 30C001FFD6589E602315ACE000FD5D75817F2828ADEA5552D0B09850F6DA77C584AAA41C33D16BBB9AE236F50A684D62
7,207,526 UART: [art] SIG.S = E4FA784F0A740DBB2695B813661D94478E0B9D89067519D83BACCC89940476774368B106AF3ED9452A3E9C001CEBE862
7,231,565 UART: Caliptra RT
7,231,818 UART: [state] CFI Enabled
7,512,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,542,912 UART: [rt]cmd =0x41545348, len=116
7,564,729 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 ready_for_fw is high
1,362,547 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,992 >>> mbox cmd response: success
2,985,436 UART:
2,985,452 UART: Running Caliptra FMC ...
2,985,860 UART:
2,985,914 UART: [state] CFI Enabled
2,996,187 UART: [fht] FMC Alias Private Key: 7
3,104,664 UART: [art] Extend RT PCRs Done
3,105,092 UART: [art] Lock RT PCRs Done
3,106,724 UART: [art] Populate DV Done
3,115,065 UART: [fht] FMC Alias Private Key: 7
3,116,229 UART: [art] Derive CDI
3,116,509 UART: [art] Store in in slot 0x4
3,202,278 UART: [art] Derive Key Pair
3,202,638 UART: [art] Store priv key in slot 0x5
3,215,970 UART: [art] Derive Key Pair - Done
3,230,919 UART: [art] Signing Cert with AUTHO
3,231,399 UART: RITY.KEYID = 7
3,246,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,180 UART: [art] PUB.X = B0394CC1FB0C591FBE43F5D0D467278D7EEDCBF6B52F369DA1AA9C940DFAED6BF5CD2DB3F858849C2B244EB5468C9D7B
3,253,972 UART: [art] PUB.Y = 7066A6EF76CF6963EEEA9B64E4BDAD57A59D8F3FF5F3EE727CA8508485D829E3428C7ABDDDD1C4D01A2D4DB1769CB0D5
3,260,946 UART: [art] SIG.R = 85C941712EE777945851BC7CAD555EE7F036F964758562AEBD00778261332F0E357AD7FAC0EB25C56ECB2ACF0FA1C2C1
3,267,698 UART: [art] SIG.S = E256F1EF368571AD86C5EBA3D1D8680F42CDC2368C7984DD62FBD65382D0B9037E0915BADBDC37F60EF8945B46A200FA
3,290,943 UART: Caliptra RT
3,291,196 UART: [state] CFI Enabled
3,399,582 UART: [rt] RT listening for mailbox commands...
3,400,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,274 UART: [rt]cmd =0x41544d4e, len=14344
3,833,273 >>> mbox cmd response data (8 bytes)
3,833,274 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,227 UART: [rt]cmd =0x41545348, len=116
3,884,982 >>> mbox cmd response data (12 bytes)
3,884,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,192 >>> mbox cmd response: success
6,644,192 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,657,649 UART:
6,657,665 UART: Running Caliptra FMC ...
6,658,073 UART:
6,658,127 UART: [state] CFI Enabled
6,746,820 UART: [art] Extend RT PCRs Done
6,747,248 UART: [art] Lock RT PCRs Done
6,748,425 UART: [art] Populate DV Done
6,756,800 UART: [fht] FMC Alias Private Key: 7
6,757,748 UART: [art] Derive CDI
6,758,028 UART: [art] Store in in slot 0x4
6,843,219 UART: [art] Derive Key Pair
6,843,579 UART: [art] Store priv key in slot 0x5
6,856,781 UART: [art] Derive Key Pair - Done
6,871,595 UART: [art] Signing Cert with AUTHO
6,872,075 UART: RITY.KEYID = 7
6,887,225 UART: [art] Erasing AUTHORITY.KEYID = 7
6,887,990 UART: [art] PUB.X = 1DA5EC2E458B88579BE50BA2B3B999CD8B935B0F917CCF9A980D61E3937BB96D68AFC67AF80ACDAF2141C3A6D0FC9CF7
6,894,772 UART: [art] PUB.Y = 29A6C5C0E0B0E1634A490FAB635E397E448DC65265E1032EEA30EE25447FF43497F59AD89D901A6CA03A73DA17632B1D
6,901,722 UART: [art] SIG.R = 8843A1FEAF9F1D5C4FDD37D63E3BBA810CB06BB1DC76B57263E722C483338487734D5563988D6722C5FEC16CE6096033
6,908,490 UART: [art] SIG.S = 85BA9BCE864C87713D0A9DD70137017F643749977E85A7BEA5C07F7F86C8881BFE8D2D430BA79AA86509ED502EF5F76A
6,932,716 UART: Caliptra RT
6,932,969 UART: [state] CFI Enabled
7,215,531 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,246,358 UART: [rt]cmd =0x41545348, len=116
7,267,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,794 UART: [kat] SHA2-256
892,732 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
902,951 UART: [kat] HMAC-384Kdf
907,633 UART: [kat] LMS
1,475,829 UART: [kat] --
1,476,764 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,479,999 UART: [idev] ++
1,480,167 UART: [idev] CDI.KEYID = 6
1,480,527 UART: [idev] SUBJECT.KEYID = 7
1,480,951 UART: [idev] UDS.KEYID = 0
1,481,296 ready_for_fw is high
1,481,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,679 UART: [idev] Erasing UDS.KEYID = 0
1,505,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,825 UART: [idev] --
1,514,888 UART: [ldev] ++
1,515,056 UART: [ldev] CDI.KEYID = 6
1,515,419 UART: [ldev] SUBJECT.KEYID = 5
1,515,845 UART: [ldev] AUTHORITY.KEYID = 7
1,516,308 UART: [ldev] FE.KEYID = 1
1,521,564 UART: [ldev] Erasing FE.KEYID = 1
1,546,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,379 UART: [ldev] --
1,585,860 UART: [fwproc] Waiting for Commands...
1,586,691 UART: [fwproc] Received command 0x46574c44
1,587,482 UART: [fwproc] Received Image of size 114084 bytes
2,881,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,630 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,543 >>> mbox cmd response: success
3,075,643 UART: [afmc] ++
3,075,811 UART: [afmc] CDI.KEYID = 6
3,076,173 UART: [afmc] SUBJECT.KEYID = 7
3,076,598 UART: [afmc] AUTHORITY.KEYID = 5
3,111,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,431 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,939 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,824 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,514 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,377 UART: [afmc] --
3,155,271 UART: [cold-reset] --
3,156,441 UART: [state] Locking Datavault
3,157,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,088 UART: [state] Locking ICCM
3,158,668 UART: [exit] Launching FMC @ 0x40000130
3,163,997 UART:
3,164,013 UART: Running Caliptra FMC ...
3,164,421 UART:
3,164,564 UART: [state] CFI Enabled
3,175,171 UART: [fht] FMC Alias Private Key: 7
3,282,716 UART: [art] Extend RT PCRs Done
3,283,144 UART: [art] Lock RT PCRs Done
3,284,668 UART: [art] Populate DV Done
3,293,081 UART: [fht] FMC Alias Private Key: 7
3,294,215 UART: [art] Derive CDI
3,294,495 UART: [art] Store in in slot 0x4
3,380,180 UART: [art] Derive Key Pair
3,380,540 UART: [art] Store priv key in slot 0x5
3,394,226 UART: [art] Derive Key Pair - Done
3,408,853 UART: [art] Signing Cert with AUTHO
3,409,333 UART: RITY.KEYID = 7
3,424,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,490 UART: [art] PUB.X = 7015457817812F373224712C92A3B8458AFFEAAC624B2B4E8051ABC20779FF60D0988485F9DB4BC0F365CAF7B1ADE2B7
3,432,263 UART: [art] PUB.Y = F4D24C7F581A9F7EAC0ECF55682F16E4269A1D2081EC8556F8F3890F99FF9847ED5157BD13243081F1AE6B5B05CE52B9
3,439,212 UART: [art] SIG.R = 281C2E8DFB431FB07F965CA4F1E4F2A98A0D71BB637797A6A5563B7F9D7F6DEE2D8A6D36F451336C8E01EF3702CCCAA8
3,445,991 UART: [art] SIG.S = A5DB82904A7B2341360B4FDCEEC73045E5B94B00D885254C033350AA3AD2C4D772BD018664F7AD30C3070D289A788909
3,469,280 UART: Caliptra RT
3,469,625 UART: [state] CFI Enabled
3,576,928 UART: [rt] RT listening for mailbox commands...
3,577,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,548 UART: [rt]cmd =0x41544d4e, len=14344
4,010,821 >>> mbox cmd response data (8 bytes)
4,010,822 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,937 UART: [rt]cmd =0x41545348, len=116
4,062,414 >>> mbox cmd response data (12 bytes)
4,062,415 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,265 UART:
4,063,281 UART: Running Caliptra ROM ...
4,063,689 UART:
4,063,830 UART: [state] CFI Enabled
4,066,766 UART: [state] LifecycleState = Unprovisioned
4,067,421 UART: [state] DebugLocked = No
4,068,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,069,736 UART: [kat] SHA2-256
4,863,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,867,782 UART: [kat] ++
4,867,934 UART: [kat] sha1
4,872,272 UART: [kat] SHA2-256
4,874,210 UART: [kat] SHA2-384
4,877,001 UART: [kat] SHA2-512-ACC
4,878,901 UART: [kat] ECC-384
4,884,408 UART: [kat] HMAC-384Kdf
4,888,964 UART: [kat] LMS
5,457,160 UART: [kat] --
5,458,147 UART: [update-reset] ++
6,789,275 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,790,491 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,939,995 >>> mbox cmd response: success
6,939,995 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,940,112 UART: [update-reset] Copying MAN_2 To MAN_1
6,948,126 UART: [update-reset Success] --
6,949,209 UART: [state] Locking Datavault
6,950,039 UART: [state] Locking PCR0, PCR1 and PCR31
6,950,643 UART: [state] Locking ICCM
6,951,187 UART: [exit] Launching FMC @ 0x40000130
6,956,516 UART:
6,956,532 UART: Running Caliptra FMC ...
6,956,940 UART:
6,957,083 UART: [state] CFI Enabled
7,046,238 UART: [art] Extend RT PCRs Done
7,046,666 UART: [art] Lock RT PCRs Done
7,048,005 UART: [art] Populate DV Done
7,056,058 UART: [fht] FMC Alias Private Key: 7
7,057,070 UART: [art] Derive CDI
7,057,350 UART: [art] Store in in slot 0x4
7,142,909 UART: [art] Derive Key Pair
7,143,269 UART: [art] Store priv key in slot 0x5
7,157,019 UART: [art] Derive Key Pair - Done
7,171,968 UART: [art] Signing Cert with AUTHO
7,172,448 UART: RITY.KEYID = 7
7,187,270 UART: [art] Erasing AUTHORITY.KEYID = 7
7,188,035 UART: [art] PUB.X = 2934BFB914D868D6C31C79077C14357FA9AE22F9B7031EFDF3FEE6680072396169F877EBBB0FBEA6568A9AB100813CE1
7,194,760 UART: [art] PUB.Y = CEB6DAA9A616D17EEA92AEE10BFEF7610D1A43634160750AC61CE46043E42CB46A6545B0A15C212C59DEFE095A57875C
7,201,712 UART: [art] SIG.R = 26214B9A6BE91A4E3B89351E2ADC214F050F28A096DEC3C6D7221D3D4DA79F09D53B23A3853FE0D73393755EEC77C748
7,208,479 UART: [art] SIG.S = 5509A730E8E0E9A58D7925ECB0328E60283181F40F3B8CA8D1C77955C0A10868E685174614D8A4342867D7A337CFB24C
7,232,125 UART: Caliptra RT
7,232,470 UART: [state] CFI Enabled
7,512,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,543,425 UART: [rt]cmd =0x41545348, len=116
7,564,534 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 ready_for_fw is high
1,362,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,055 >>> mbox cmd response: success
2,985,845 UART:
2,985,861 UART: Running Caliptra FMC ...
2,986,269 UART:
2,986,412 UART: [state] CFI Enabled
2,997,149 UART: [fht] FMC Alias Private Key: 7
3,104,956 UART: [art] Extend RT PCRs Done
3,105,384 UART: [art] Lock RT PCRs Done
3,106,976 UART: [art] Populate DV Done
3,114,981 UART: [fht] FMC Alias Private Key: 7
3,116,121 UART: [art] Derive CDI
3,116,401 UART: [art] Store in in slot 0x4
3,202,054 UART: [art] Derive Key Pair
3,202,414 UART: [art] Store priv key in slot 0x5
3,214,962 UART: [art] Derive Key Pair - Done
3,230,085 UART: [art] Signing Cert with AUTHO
3,230,565 UART: RITY.KEYID = 7
3,245,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,326 UART: [art] PUB.X = 10A7013AD7D38B8774EF54477E52A46694C23A3805313FB69AAB3077B8D1CF0F9E2DA0DE10D0B0DD3CB83F5D176035A6
3,253,095 UART: [art] PUB.Y = 58A6B2FB60F88A0F462BC6E65577F85D71BB6DEB75725F50A7772AEE89218A5CD555DEE62EB3E5153753B6A1691D4193
3,260,048 UART: [art] SIG.R = 9E9E724E01451D05FAF0E364F8AB90175BE4F6926AF4D49491C96CE1AD99203F183BE0EB102F326139137C96E8FF91D0
3,266,816 UART: [art] SIG.S = C93EAA1BF5E3AA1DE261596C3ED0BB08737BC3C0E9A75BEFA1507AF7B80F670C165C400FE96BA4BB343D73137D8F6C6B
3,290,647 UART: Caliptra RT
3,290,992 UART: [state] CFI Enabled
3,399,540 UART: [rt] RT listening for mailbox commands...
3,400,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,430 UART: [rt]cmd =0x41544d4e, len=14344
3,833,113 >>> mbox cmd response data (8 bytes)
3,833,114 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,309 UART: [rt]cmd =0x41545348, len=116
3,885,394 >>> mbox cmd response data (12 bytes)
3,885,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,969 >>> mbox cmd response: success
6,645,969 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,659,008 UART:
6,659,024 UART: Running Caliptra FMC ...
6,659,432 UART:
6,659,575 UART: [state] CFI Enabled
6,748,804 UART: [art] Extend RT PCRs Done
6,749,232 UART: [art] Lock RT PCRs Done
6,750,657 UART: [art] Populate DV Done
6,758,850 UART: [fht] FMC Alias Private Key: 7
6,759,874 UART: [art] Derive CDI
6,760,154 UART: [art] Store in in slot 0x4
6,845,919 UART: [art] Derive Key Pair
6,846,279 UART: [art] Store priv key in slot 0x5
6,859,553 UART: [art] Derive Key Pair - Done
6,874,216 UART: [art] Signing Cert with AUTHO
6,874,696 UART: RITY.KEYID = 7
6,889,900 UART: [art] Erasing AUTHORITY.KEYID = 7
6,890,665 UART: [art] PUB.X = EACAD0DF6DC5DBC7C0EFE83D7D2A47AE0742BBDC81EED2513E63EDA10A1A84D2A7BF7D1ADA9EF47F60698279746CE2A7
6,897,463 UART: [art] PUB.Y = 8AE8DDC914B43833992078D43AD5E58376D5E15E06689DEDAC6016EEBD3041C6B74C0190E766CD37B886A1506B5906D3
6,904,406 UART: [art] SIG.R = 2AF79BB776D0EFD0684167F8F069DE55CEAC302CE04028D85350762E852623AC39C8F77BABBC6020CFC6B4F007119FFF
6,911,185 UART: [art] SIG.S = 541710259D047DE8EC7144F6F1B087B95025EF14ED18779113E5DF5CAEC0D4F5D41BB85B0096BC0D6EB638170ACA99B9
6,935,429 UART: Caliptra RT
6,935,774 UART: [state] CFI Enabled
7,218,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,250,081 UART: [rt]cmd =0x41545348, len=116
7,272,128 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
893,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,603 UART: [kat] ++
897,755 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,910 UART: [kat] SHA2-512-ACC
908,811 UART: [kat] ECC-384
918,876 UART: [kat] HMAC-384Kdf
923,338 UART: [kat] LMS
1,171,666 UART: [kat] --
1,172,499 UART: [cold-reset] ++
1,172,933 UART: [fht] FHT @ 0x50003400
1,175,506 UART: [idev] ++
1,175,674 UART: [idev] CDI.KEYID = 6
1,176,034 UART: [idev] SUBJECT.KEYID = 7
1,176,458 UART: [idev] UDS.KEYID = 0
1,176,803 ready_for_fw is high
1,176,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,378 UART: [idev] Erasing UDS.KEYID = 0
1,201,159 UART: [idev] Sha1 KeyId Algorithm
1,209,421 UART: [idev] --
1,210,473 UART: [ldev] ++
1,210,641 UART: [ldev] CDI.KEYID = 6
1,211,004 UART: [ldev] SUBJECT.KEYID = 5
1,211,430 UART: [ldev] AUTHORITY.KEYID = 7
1,211,893 UART: [ldev] FE.KEYID = 1
1,216,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,093 >>> mbox cmd response: success
2,772,345 UART: [afmc] ++
2,772,513 UART: [afmc] CDI.KEYID = 6
2,772,875 UART: [afmc] SUBJECT.KEYID = 7
2,773,300 UART: [afmc] AUTHORITY.KEYID = 5
2,808,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,610 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,914 UART: [afmc] --
2,851,914 UART: [cold-reset] --
2,852,754 UART: [state] Locking Datavault
2,854,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,757 UART: [state] Locking ICCM
2,855,353 UART: [exit] Launching FMC @ 0x40000130
2,860,682 UART:
2,860,698 UART: Running Caliptra FMC ...
2,861,106 UART:
2,861,160 UART: [state] CFI Enabled
2,871,427 UART: [fht] FMC Alias Private Key: 7
2,979,182 UART: [art] Extend RT PCRs Done
2,979,610 UART: [art] Lock RT PCRs Done
2,980,906 UART: [art] Populate DV Done
2,989,119 UART: [fht] FMC Alias Private Key: 7
2,990,073 UART: [art] Derive CDI
2,990,353 UART: [art] Store in in slot 0x4
3,076,010 UART: [art] Derive Key Pair
3,076,370 UART: [art] Store priv key in slot 0x5
3,088,950 UART: [art] Derive Key Pair - Done
3,103,778 UART: [art] Signing Cert with AUTHO
3,104,258 UART: RITY.KEYID = 7
3,119,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,445 UART: [art] PUB.X = FDBC1E38CF44FBA11CB0227621136735ED30B00CFB97545F0475F1C24BDC2E1F258ED73EA5E8F59FCCB8B3D095C1307E
3,127,227 UART: [art] PUB.Y = 4BC834887B92968B01FAD9D8058E5409C3140CC3E5E12019C5AFC1DF95EB3D333A48BF88E14DCF41EB01C2AFDFE3B3D8
3,134,180 UART: [art] SIG.R = 06DA40F90ED9FEBCA73F161259831EE509965B9FB33F5AD0DDA50EAD79E4602F7DBFFF4633A97B0AA79412153AD61DFD
3,140,955 UART: [art] SIG.S = E34EF5A3453348E8E1E7EEE92C773AB3AA99F929192796908850BEF0FBDC0E4E6602F13D60C4726CF6168DF56809F3D5
3,164,769 UART: Caliptra RT
3,165,022 UART: [state] CFI Enabled
3,273,007 UART: [rt] RT listening for mailbox commands...
3,273,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,679 UART: [rt]cmd =0x41544d4e, len=14344
3,706,262 >>> mbox cmd response data (8 bytes)
3,706,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,260 UART: [rt]cmd =0x41545348, len=116
3,757,617 >>> mbox cmd response data (12 bytes)
3,757,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,357 UART:
3,758,373 UART: Running Caliptra ROM ...
3,758,781 UART:
3,758,836 UART: [state] CFI Enabled
3,761,544 UART: [state] LifecycleState = Unprovisioned
3,762,199 UART: [state] DebugLocked = No
3,762,823 UART: [state] WD Timer not started. Device not locked for debugging
3,764,041 UART: [kat] SHA2-256
4,569,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,573,816 UART: [kat] ++
4,573,968 UART: [kat] sha1
4,578,176 UART: [kat] SHA2-256
4,580,116 UART: [kat] SHA2-384
4,582,697 UART: [kat] SHA2-512-ACC
4,584,597 UART: [kat] ECC-384
4,594,734 UART: [kat] HMAC-384Kdf
4,599,486 UART: [kat] LMS
4,847,814 UART: [kat] --
4,848,572 UART: [update-reset] ++
6,158,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,159,281 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,308,733 >>> mbox cmd response: success
6,308,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,308,916 UART: [update-reset] Copying MAN_2 To MAN_1
6,316,930 UART: [update-reset Success] --
6,317,837 UART: [state] Locking Datavault
6,318,663 UART: [state] Locking PCR0, PCR1 and PCR31
6,319,267 UART: [state] Locking ICCM
6,319,781 UART: [exit] Launching FMC @ 0x40000130
6,325,110 UART:
6,325,126 UART: Running Caliptra FMC ...
6,325,534 UART:
6,325,588 UART: [state] CFI Enabled
6,414,677 UART: [art] Extend RT PCRs Done
6,415,105 UART: [art] Lock RT PCRs Done
6,416,196 UART: [art] Populate DV Done
6,424,421 UART: [fht] FMC Alias Private Key: 7
6,425,495 UART: [art] Derive CDI
6,425,775 UART: [art] Store in in slot 0x4
6,511,432 UART: [art] Derive Key Pair
6,511,792 UART: [art] Store priv key in slot 0x5
6,525,068 UART: [art] Derive Key Pair - Done
6,539,798 UART: [art] Signing Cert with AUTHO
6,540,278 UART: RITY.KEYID = 7
6,555,470 UART: [art] Erasing AUTHORITY.KEYID = 7
6,556,235 UART: [art] PUB.X = 375F8692F82EFB628A896A21ECB18C243842D7E969D1737FB539CE08FD6D919FCD9326ADBCCC983D700F41E182587DC3
6,563,007 UART: [art] PUB.Y = 8744B763DCDC62629A535317321B3D251F19A9CCAB760A682173797B35CED2E00268C1ED58713A743CE3FB92B1510879
6,569,944 UART: [art] SIG.R = F93D0420DAF2C40B5E13800D50ED66B71B3A2FD352439D439EED0AAA44C8184B60F2CA6AAE8115AF044B76646C7DA8AC
6,576,715 UART: [art] SIG.S = 2437DE32074C908B85D113B5AA41A93213ECB7640943FDAB697A3AAE3243E8D285B0BAA1CD5EDD94B58D77DA6294242D
6,600,912 UART: Caliptra RT
6,601,165 UART: [state] CFI Enabled
6,880,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,911,145 UART: [rt]cmd =0x41545348, len=116
6,932,850 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 ready_for_fw is high
1,060,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,798 >>> mbox cmd response: success
2,686,200 UART:
2,686,216 UART: Running Caliptra FMC ...
2,686,624 UART:
2,686,678 UART: [state] CFI Enabled
2,696,945 UART: [fht] FMC Alias Private Key: 7
2,805,134 UART: [art] Extend RT PCRs Done
2,805,562 UART: [art] Lock RT PCRs Done
2,807,138 UART: [art] Populate DV Done
2,815,379 UART: [fht] FMC Alias Private Key: 7
2,816,473 UART: [art] Derive CDI
2,816,753 UART: [art] Store in in slot 0x4
2,902,402 UART: [art] Derive Key Pair
2,902,762 UART: [art] Store priv key in slot 0x5
2,915,204 UART: [art] Derive Key Pair - Done
2,930,265 UART: [art] Signing Cert with AUTHO
2,930,745 UART: RITY.KEYID = 7
2,945,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,760 UART: [art] PUB.X = F9431679308D271128953EC67042557BE0723D1DA36A6D7516D0DF2A756FA65E1CD7250DE659134B3DB3E5ABB0F89BAB
2,953,531 UART: [art] PUB.Y = 2146552EFBAA7310BB21CB082EBD66B249CB457C25655AA02800F60C9F117667F5A2F2610D49C028A077DFB976118DAD
2,960,454 UART: [art] SIG.R = ED5C37BBFB6A3604DC50567EA68D2AD42A0F4595B79295252D594F91573EC83E1EE0673747BC44F28F15E9BCEDDD55D4
2,967,230 UART: [art] SIG.S = 6A48C7609497B18749E751519C5493E6824392FB8019665F15C06FB195CE62EC241A6E8D663B43BA7793E8D6505572D1
2,991,461 UART: Caliptra RT
2,991,714 UART: [state] CFI Enabled
3,098,723 UART: [rt] RT listening for mailbox commands...
3,099,393 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,541 UART: [rt]cmd =0x41544d4e, len=14344
3,531,994 >>> mbox cmd response data (8 bytes)
3,531,995 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,902 UART: [rt]cmd =0x41545348, len=116
3,583,039 >>> mbox cmd response data (12 bytes)
3,583,040 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,017,594 >>> mbox cmd response: success
6,017,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,031,102 UART:
6,031,118 UART: Running Caliptra FMC ...
6,031,526 UART:
6,031,580 UART: [state] CFI Enabled
6,120,751 UART: [art] Extend RT PCRs Done
6,121,179 UART: [art] Lock RT PCRs Done
6,122,520 UART: [art] Populate DV Done
6,130,899 UART: [fht] FMC Alias Private Key: 7
6,131,857 UART: [art] Derive CDI
6,132,137 UART: [art] Store in in slot 0x4
6,217,950 UART: [art] Derive Key Pair
6,218,310 UART: [art] Store priv key in slot 0x5
6,231,652 UART: [art] Derive Key Pair - Done
6,246,323 UART: [art] Signing Cert with AUTHO
6,246,803 UART: RITY.KEYID = 7
6,262,245 UART: [art] Erasing AUTHORITY.KEYID = 7
6,263,010 UART: [art] PUB.X = 694D84A3CF0CD07F9A141C7FB96B1248AA2D3C1A02CCD463A6A4B7A18B77E58712F1487D8E6EB41FBC5E164C2CB78C29
6,269,790 UART: [art] PUB.Y = D5B0843811BC76A4C2289D4A3D43C9D0742AEA13CA861B1BF16285509CFAD3585D1DA7A5A3AC74BB2A7A38B8531F3980
6,276,750 UART: [art] SIG.R = A0CC8A541156EBD874B036EBD57B14C6F13CB868C815801F8014798276DD9AFBE7779479C23023815228160F565CE206
6,283,508 UART: [art] SIG.S = B76C37B820F310574F17844B5683AB10C17CF38FF14BA2C0026D2C42A45CF9E5876901225AC52C8340B411F17617620F
6,307,444 UART: Caliptra RT
6,307,697 UART: [state] CFI Enabled
6,589,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,166 UART: [rt]cmd =0x41545348, len=116
6,641,645 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,368 UART: [kat] SHA2-256
904,308 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,361 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,171,970 UART: [cold-reset] ++
1,172,404 UART: [fht] FHT @ 0x50003400
1,174,999 UART: [idev] ++
1,175,167 UART: [idev] CDI.KEYID = 6
1,175,527 UART: [idev] SUBJECT.KEYID = 7
1,175,951 UART: [idev] UDS.KEYID = 0
1,176,296 ready_for_fw is high
1,176,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,861 UART: [idev] Erasing UDS.KEYID = 0
1,200,698 UART: [idev] Sha1 KeyId Algorithm
1,209,076 UART: [idev] --
1,210,082 UART: [ldev] ++
1,210,250 UART: [ldev] CDI.KEYID = 6
1,210,613 UART: [ldev] SUBJECT.KEYID = 5
1,211,039 UART: [ldev] AUTHORITY.KEYID = 7
1,211,502 UART: [ldev] FE.KEYID = 1
1,216,898 UART: [ldev] Erasing FE.KEYID = 1
1,242,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,795 UART: [fwproc] Wait for Commands...
1,282,449 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,389 >>> mbox cmd response: success
2,771,453 UART: [afmc] ++
2,771,621 UART: [afmc] CDI.KEYID = 6
2,771,983 UART: [afmc] SUBJECT.KEYID = 7
2,772,408 UART: [afmc] AUTHORITY.KEYID = 5
2,808,027 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,715 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,200 UART: [afmc] --
2,851,312 UART: [cold-reset] --
2,852,312 UART: [state] Locking Datavault
2,853,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,981 UART: [state] Locking ICCM
2,854,559 UART: [exit] Launching FMC @ 0x40000130
2,859,888 UART:
2,859,904 UART: Running Caliptra FMC ...
2,860,312 UART:
2,860,455 UART: [state] CFI Enabled
2,871,062 UART: [fht] FMC Alias Private Key: 7
2,978,447 UART: [art] Extend RT PCRs Done
2,978,875 UART: [art] Lock RT PCRs Done
2,980,627 UART: [art] Populate DV Done
2,988,564 UART: [fht] FMC Alias Private Key: 7
2,989,730 UART: [art] Derive CDI
2,990,010 UART: [art] Store in in slot 0x4
3,075,761 UART: [art] Derive Key Pair
3,076,121 UART: [art] Store priv key in slot 0x5
3,089,237 UART: [art] Derive Key Pair - Done
3,104,292 UART: [art] Signing Cert with AUTHO
3,104,772 UART: RITY.KEYID = 7
3,120,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,791 UART: [art] PUB.X = 96F2CE0B7881645BBF9351C532E61BEDBD31D5AC248591850936D99484E8EB65AEDDE06BD21F972184B2367F6C394351
3,127,557 UART: [art] PUB.Y = E1E6AECC17ADE9697EB801C6A3E79E83CA7F48E8D006CA70D31CA9C84ADDE61EF49A366E7EBD859BD9546EE32DBF1AB1
3,134,531 UART: [art] SIG.R = 6BEEF45D6EC9F21186B975C3CEBCCF855860FFE7E7E83F8E7321F89EB3BD63B2536DA3C1CB6A0BD2282FF3FDBFDC352F
3,141,328 UART: [art] SIG.S = 7EB3DDBAE616C40D6A50A3B3C16BF9F1FAEC358854C15D23982008B725A9BEFC6F3BB6CE12EBF05F583253166A88827D
3,165,099 UART: Caliptra RT
3,165,444 UART: [state] CFI Enabled
3,273,621 UART: [rt] RT listening for mailbox commands...
3,274,291 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,479 UART: [rt]cmd =0x41544d4e, len=14344
3,707,022 >>> mbox cmd response data (8 bytes)
3,707,023 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,246 UART: [rt]cmd =0x41545348, len=116
3,759,393 >>> mbox cmd response data (12 bytes)
3,759,394 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,239 UART:
3,760,255 UART: Running Caliptra ROM ...
3,760,663 UART:
3,760,805 UART: [state] CFI Enabled
3,763,515 UART: [state] LifecycleState = Unprovisioned
3,764,170 UART: [state] DebugLocked = No
3,764,902 UART: [state] WD Timer not started. Device not locked for debugging
3,766,038 UART: [kat] SHA2-256
4,571,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,575,813 UART: [kat] ++
4,575,965 UART: [kat] sha1
4,580,185 UART: [kat] SHA2-256
4,582,125 UART: [kat] SHA2-384
4,584,798 UART: [kat] SHA2-512-ACC
4,586,698 UART: [kat] ECC-384
4,596,661 UART: [kat] HMAC-384Kdf
4,601,143 UART: [kat] LMS
4,849,471 UART: [kat] --
4,850,475 UART: [update-reset] ++
6,160,531 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,161,616 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,311,068 >>> mbox cmd response: success
6,311,068 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,311,355 UART: [update-reset] Copying MAN_2 To MAN_1
6,319,369 UART: [update-reset Success] --
6,320,258 UART: [state] Locking Datavault
6,321,078 UART: [state] Locking PCR0, PCR1 and PCR31
6,321,682 UART: [state] Locking ICCM
6,322,314 UART: [exit] Launching FMC @ 0x40000130
6,327,643 UART:
6,327,659 UART: Running Caliptra FMC ...
6,328,067 UART:
6,328,210 UART: [state] CFI Enabled
6,416,585 UART: [art] Extend RT PCRs Done
6,417,013 UART: [art] Lock RT PCRs Done
6,418,410 UART: [art] Populate DV Done
6,426,619 UART: [fht] FMC Alias Private Key: 7
6,427,575 UART: [art] Derive CDI
6,427,855 UART: [art] Store in in slot 0x4
6,513,500 UART: [art] Derive Key Pair
6,513,860 UART: [art] Store priv key in slot 0x5
6,527,354 UART: [art] Derive Key Pair - Done
6,542,224 UART: [art] Signing Cert with AUTHO
6,542,704 UART: RITY.KEYID = 7
6,557,616 UART: [art] Erasing AUTHORITY.KEYID = 7
6,558,381 UART: [art] PUB.X = A78B0959A766384A1DD64FE7CE88736FAA6259362DD37AB78F2F927B59130FB9E9852DF3F8C1694D175E54FE95E175A5
6,565,149 UART: [art] PUB.Y = 8C1239595C478F075BFEB9EF214BF870DE59B15AB9A09ACE587F8E52D907330A245638B76968852FB615F65DC554A8A2
6,572,092 UART: [art] SIG.R = B69BE6DCCDF17CA01A1F9D9BE00483CA20FBD311A0C576A5E25F7BA1D16DD964282ED678AC249E504377DFDB91AE6EF8
6,578,883 UART: [art] SIG.S = A7BD07A8EF4FB5E44B2ADE28E43E4F5CB1E6EB3BB266BE5FEE47B5F70AC6C4A367D7B9A2E3E7F891BDF57F0A53AEE59E
6,602,901 UART: Caliptra RT
6,603,246 UART: [state] CFI Enabled
6,884,170 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,915,005 UART: [rt]cmd =0x41545348, len=116
6,936,832 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,482 ready_for_fw is high
1,060,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,867 >>> mbox cmd response: success
2,685,783 UART:
2,685,799 UART: Running Caliptra FMC ...
2,686,207 UART:
2,686,350 UART: [state] CFI Enabled
2,696,895 UART: [fht] FMC Alias Private Key: 7
2,804,530 UART: [art] Extend RT PCRs Done
2,804,958 UART: [art] Lock RT PCRs Done
2,806,538 UART: [art] Populate DV Done
2,814,795 UART: [fht] FMC Alias Private Key: 7
2,815,811 UART: [art] Derive CDI
2,816,091 UART: [art] Store in in slot 0x4
2,901,588 UART: [art] Derive Key Pair
2,901,948 UART: [art] Store priv key in slot 0x5
2,915,152 UART: [art] Derive Key Pair - Done
2,929,874 UART: [art] Signing Cert with AUTHO
2,930,354 UART: RITY.KEYID = 7
2,945,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,283 UART: [art] PUB.X = 2FF750F03CD08F13225D5ADD513FE66880FDC4EA00019AD38D74FAE154A32004D9245A83690F9D4AB9AB8ED1C7AD3E48
2,953,036 UART: [art] PUB.Y = A501241031D11FA09CE20A672832CB4C3C4BD9B57E3195026EEBA824B9A0207BE9082A8AC0AE7F0A1BC1E7868CCA4012
2,959,981 UART: [art] SIG.R = 5377344910B46210944F8098B663DEB5B9754838F8A26AA1A8B05FDBA38CBB2FEFD88D82365DF09594EFCF5095B5B514
2,966,755 UART: [art] SIG.S = F93999B96EAF5F8FEEA5E798CFE009323FC38BBCE18DA1D91209D279C908529AB20027226115FD3B745A1E574426E7E3
2,990,231 UART: Caliptra RT
2,990,576 UART: [state] CFI Enabled
3,099,481 UART: [rt] RT listening for mailbox commands...
3,100,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,359 UART: [rt]cmd =0x41544d4e, len=14344
3,533,352 >>> mbox cmd response data (8 bytes)
3,533,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,374 UART: [rt]cmd =0x41545348, len=116
3,585,041 >>> mbox cmd response data (12 bytes)
3,585,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,019,343 >>> mbox cmd response: success
6,019,343 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,032,453 UART:
6,032,469 UART: Running Caliptra FMC ...
6,032,877 UART:
6,033,020 UART: [state] CFI Enabled
6,121,673 UART: [art] Extend RT PCRs Done
6,122,101 UART: [art] Lock RT PCRs Done
6,123,192 UART: [art] Populate DV Done
6,131,361 UART: [fht] FMC Alias Private Key: 7
6,132,475 UART: [art] Derive CDI
6,132,755 UART: [art] Store in in slot 0x4
6,218,240 UART: [art] Derive Key Pair
6,218,600 UART: [art] Store priv key in slot 0x5
6,231,900 UART: [art] Derive Key Pair - Done
6,246,739 UART: [art] Signing Cert with AUTHO
6,247,219 UART: RITY.KEYID = 7
6,262,277 UART: [art] Erasing AUTHORITY.KEYID = 7
6,263,042 UART: [art] PUB.X = 81F9F16E2E2C12570A5357D37796DE3481A11D8B510CCC8368CD8A12263B6AD11DD6EAEE0541A97D8517E60ADC026D84
6,269,803 UART: [art] PUB.Y = 88A39B4D7BBE9B52DB87075BE221EE0B209865FDFF0D0DF0CED80413DE38957F095F7C1C558F5C99FECECFF1978D074C
6,276,752 UART: [art] SIG.R = 5AF7C889892F094C064FF35A1EC0881EAAE82CC089512E6F50B8C5F8681E10B4399640012C271DD564399EB3EFED86BE
6,283,519 UART: [art] SIG.S = 7B4A328F4A7426687E1D66C41693ABEF5BEBE09B48DC4E51286A60CBFB763C98C1C9A6D222874C17561F233A1C85EF79
6,307,466 UART: Caliptra RT
6,307,811 UART: [state] CFI Enabled
6,589,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,621,093 UART: [rt]cmd =0x41545348, len=116
6,642,540 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,530 UART: [state] LifecycleState = Unprovisioned
85,185 UART: [state] DebugLocked = No
85,777 UART: [state] WD Timer not started. Device not locked for debugging
87,002 UART: [kat] SHA2-256
890,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,681 UART: [kat] ++
894,833 UART: [kat] sha1
899,137 UART: [kat] SHA2-256
901,077 UART: [kat] SHA2-384
903,738 UART: [kat] SHA2-512-ACC
905,639 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,176 UART: [kat] LMS
1,168,488 UART: [kat] --
1,169,365 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,381 UART: [idev] ++
1,172,549 UART: [idev] CDI.KEYID = 6
1,172,910 UART: [idev] SUBJECT.KEYID = 7
1,173,335 UART: [idev] UDS.KEYID = 0
1,173,681 ready_for_fw is high
1,173,681 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,198,171 UART: [idev] Sha1 KeyId Algorithm
1,207,011 UART: [idev] --
1,207,934 UART: [ldev] ++
1,208,102 UART: [ldev] CDI.KEYID = 6
1,208,466 UART: [ldev] SUBJECT.KEYID = 5
1,208,893 UART: [ldev] AUTHORITY.KEYID = 7
1,209,356 UART: [ldev] FE.KEYID = 1
1,214,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,526 UART: [ldev] --
1,279,996 UART: [fwproc] Wait for Commands...
1,280,689 UART: [fwproc] Recv command 0x46574c44
1,281,422 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,469 >>> mbox cmd response: success
2,768,568 UART: [afmc] ++
2,768,736 UART: [afmc] CDI.KEYID = 6
2,769,099 UART: [afmc] SUBJECT.KEYID = 7
2,769,525 UART: [afmc] AUTHORITY.KEYID = 5
2,805,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,020 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,253 UART: [afmc] --
2,848,151 UART: [cold-reset] --
2,848,887 UART: [state] Locking Datavault
2,850,142 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,746 UART: [state] Locking ICCM
2,851,356 UART: [exit] Launching FMC @ 0x40000130
2,856,685 UART:
2,856,701 UART: Running Caliptra FMC ...
2,857,109 UART:
2,857,163 UART: [state] CFI Enabled
2,867,614 UART: [fht] FMC Alias Private Key: 7
2,976,051 UART: [art] Extend RT PCRs Done
2,976,479 UART: [art] Lock RT PCRs Done
2,977,863 UART: [art] Populate DV Done
2,985,760 UART: [fht] FMC Alias Private Key: 7
2,986,712 UART: [art] Derive CDI
2,986,992 UART: [art] Store in in slot 0x4
3,072,419 UART: [art] Derive Key Pair
3,072,779 UART: [art] Store priv key in slot 0x5
3,086,145 UART: [art] Derive Key Pair - Done
3,101,086 UART: [art] Signing Cert with AUTHO
3,101,566 UART: RITY.KEYID = 7
3,117,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,805 UART: [art] PUB.X = F22C869ED589A71B610C25810097C6EDA0BACC62FD6138A302854DB56C2A18AC6638DCE3B5F6840742F0ABF5F49461A7
3,124,552 UART: [art] PUB.Y = 9F093ACED59D2F40054F816446E89D2CBDDB6528C7B86924930F8742CC8094F2838286628A5C977DF579D3393BD1B56C
3,131,491 UART: [art] SIG.R = B5B373541A02DA8B45C246C66774B808A9187E8EFB79121164E79773708C2E57DDB4968F7FEC6D313ADAB5D1A7556032
3,138,255 UART: [art] SIG.S = 613F62C82C6683DF1D0C23079F3A58D1BDEA10FDAFF18AA21F684A086F56356FD889FC81F0322FE29B8CFE6A2F2E9E5E
3,162,073 UART: Caliptra RT
3,162,326 UART: [state] CFI Enabled
3,270,517 UART: [rt] RT listening for mailbox commands...
3,271,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,339 UART: [rt]cmd =0x41544d4e, len=14344
3,704,352 >>> mbox cmd response data (8 bytes)
3,704,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,542 UART: [rt]cmd =0x41545348, len=116
3,755,233 >>> mbox cmd response data (12 bytes)
3,755,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,941 UART:
3,755,957 UART: Running Caliptra ROM ...
3,756,365 UART:
3,756,420 UART: [state] CFI Enabled
3,759,094 UART: [state] LifecycleState = Unprovisioned
3,759,749 UART: [state] DebugLocked = No
3,760,293 UART: [state] WD Timer not started. Device not locked for debugging
3,761,519 UART: [kat] SHA2-256
4,565,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,569,198 UART: [kat] ++
4,569,350 UART: [kat] sha1
4,573,754 UART: [kat] SHA2-256
4,575,694 UART: [kat] SHA2-384
4,578,353 UART: [kat] SHA2-512-ACC
4,580,253 UART: [kat] ECC-384
4,589,786 UART: [kat] HMAC-384Kdf
4,594,310 UART: [kat] LMS
4,842,622 UART: [kat] --
4,843,344 UART: [update-reset] ++
6,152,991 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,154,074 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,303,526 >>> mbox cmd response: success
6,303,526 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,303,735 UART: [update-reset] Copying MAN_2 To MAN_1
6,311,749 UART: [update-reset Success] --
6,312,762 UART: [state] Locking Datavault
6,313,612 UART: [state] Locking PCR0, PCR1 and PCR31
6,314,216 UART: [state] Locking ICCM
6,314,780 UART: [exit] Launching FMC @ 0x40000130
6,320,109 UART:
6,320,125 UART: Running Caliptra FMC ...
6,320,533 UART:
6,320,587 UART: [state] CFI Enabled
6,409,448 UART: [art] Extend RT PCRs Done
6,409,876 UART: [art] Lock RT PCRs Done
6,411,103 UART: [art] Populate DV Done
6,419,622 UART: [fht] FMC Alias Private Key: 7
6,420,760 UART: [art] Derive CDI
6,421,040 UART: [art] Store in in slot 0x4
6,507,101 UART: [art] Derive Key Pair
6,507,461 UART: [art] Store priv key in slot 0x5
6,521,377 UART: [art] Derive Key Pair - Done
6,536,163 UART: [art] Signing Cert with AUTHO
6,536,643 UART: RITY.KEYID = 7
6,551,851 UART: [art] Erasing AUTHORITY.KEYID = 7
6,552,616 UART: [art] PUB.X = 9FFCE310B357FDB70F751EDFE028AC978B8F7C105A6CDD38417ECBF2115834E77942B28E7B7D99EE84C5AFF48B104ED1
6,559,401 UART: [art] PUB.Y = CBB24DB2D15FD3388D48EBFB64C099E34D5CFDE656D6151D6D17209AD0018CD30D0537D7B6AE4081D9AF099399F5D119
6,566,351 UART: [art] SIG.R = 8E3A04C17E851D1AA293A3D9E6FC33309CD2F5B0A5E579C74A03055127C815CA5DD47998B9FE2342ECD106AD56975D24
6,573,115 UART: [art] SIG.S = 4B68A5DFE806CE85DA8562B524AA6B0C5DF718D94183A984C8DD94D0A95DE9383EE3DE7349BFC5309483D33606AC7B8A
6,596,739 UART: Caliptra RT
6,596,992 UART: [state] CFI Enabled
6,877,769 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,726 UART: [rt]cmd =0x41545348, len=116
6,929,749 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,206 ready_for_fw is high
1,055,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,871 >>> mbox cmd response: success
2,680,343 UART:
2,680,359 UART: Running Caliptra FMC ...
2,680,767 UART:
2,680,821 UART: [state] CFI Enabled
2,691,382 UART: [fht] FMC Alias Private Key: 7
2,799,723 UART: [art] Extend RT PCRs Done
2,800,151 UART: [art] Lock RT PCRs Done
2,801,667 UART: [art] Populate DV Done
2,809,814 UART: [fht] FMC Alias Private Key: 7
2,810,768 UART: [art] Derive CDI
2,811,048 UART: [art] Store in in slot 0x4
2,896,737 UART: [art] Derive Key Pair
2,897,097 UART: [art] Store priv key in slot 0x5
2,910,301 UART: [art] Derive Key Pair - Done
2,925,172 UART: [art] Signing Cert with AUTHO
2,925,652 UART: RITY.KEYID = 7
2,940,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,067 UART: [art] PUB.X = 65985B5C824875F25AFE43F52421F927C35464353158D2C821672C513E0BFB52033E9658B7BC1C6E606206E01B18294B
2,947,816 UART: [art] PUB.Y = DA84DC7CD2CE35F290519EB485C60BB60F1FFF220FEBB53EA11F94B265DC60C66E57B6FC41CDD717F63EAE28C3816B08
2,954,776 UART: [art] SIG.R = 9368B147E842AF96EF45881B723D3A034110646EA810C53B6B93FAB318DC0C8CC9887ABFFFA85E52C438D105B734F1F2
2,961,543 UART: [art] SIG.S = 7F78EFEF86859E0793463E04FA881298E7AC69EC48B40756F2F7BF99A3D95D759592780EADC67A64ED1614D51484646B
2,985,496 UART: Caliptra RT
2,985,749 UART: [state] CFI Enabled
3,093,360 UART: [rt] RT listening for mailbox commands...
3,094,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,008 UART: [rt]cmd =0x41544d4e, len=14344
3,527,353 >>> mbox cmd response data (8 bytes)
3,527,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,443 UART: [rt]cmd =0x41545348, len=116
3,577,992 >>> mbox cmd response data (12 bytes)
3,577,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,046 >>> mbox cmd response: success
6,008,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,021,614 UART:
6,021,630 UART: Running Caliptra FMC ...
6,022,038 UART:
6,022,092 UART: [state] CFI Enabled
6,110,923 UART: [art] Extend RT PCRs Done
6,111,351 UART: [art] Lock RT PCRs Done
6,112,480 UART: [art] Populate DV Done
6,120,631 UART: [fht] FMC Alias Private Key: 7
6,121,579 UART: [art] Derive CDI
6,121,859 UART: [art] Store in in slot 0x4
6,207,288 UART: [art] Derive Key Pair
6,207,648 UART: [art] Store priv key in slot 0x5
6,220,410 UART: [art] Derive Key Pair - Done
6,234,891 UART: [art] Signing Cert with AUTHO
6,235,371 UART: RITY.KEYID = 7
6,249,817 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,582 UART: [art] PUB.X = 726F87E47B68E9DA9A3577767094F82FCA7463959047F37494D237682996237D3BBD776331D9662B606041FC823673AB
6,257,336 UART: [art] PUB.Y = 3AE8C2454EA0831CFB522509E069B632F7F8E138238203B9F597E0DB5109541887FDF874763B0FDC0ED683B5986BA3AE
6,264,273 UART: [art] SIG.R = 7C1584257ED7804CB34E4E16EA0EC8EA72E30E9373B44D6F0C47F930376A65CE2F9486CF82F1847D9C7B1CF2A8EA33CC
6,271,046 UART: [art] SIG.S = 387B37BBCCB5B694FA4AD6F96813DD839D815195A605402566FCD96FD2E00325BA6464F724DF149D49DDE6DFF3DE02F1
6,294,984 UART: Caliptra RT
6,295,237 UART: [state] CFI Enabled
6,576,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,607,449 UART: [rt]cmd =0x41545348, len=116
6,629,190 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
891,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,090 UART: [kat] ++
896,242 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,171 UART: [kat] SHA2-512-ACC
907,072 UART: [kat] ECC-384
917,499 UART: [kat] HMAC-384Kdf
922,075 UART: [kat] LMS
1,170,387 UART: [kat] --
1,171,328 UART: [cold-reset] ++
1,171,750 UART: [fht] FHT @ 0x50003400
1,174,510 UART: [idev] ++
1,174,678 UART: [idev] CDI.KEYID = 6
1,175,039 UART: [idev] SUBJECT.KEYID = 7
1,175,464 UART: [idev] UDS.KEYID = 0
1,175,810 ready_for_fw is high
1,175,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,088 UART: [idev] Sha1 KeyId Algorithm
1,209,132 UART: [idev] --
1,210,285 UART: [ldev] ++
1,210,453 UART: [ldev] CDI.KEYID = 6
1,210,817 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,497 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x46574c44
1,284,291 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,778 >>> mbox cmd response: success
2,772,817 UART: [afmc] ++
2,772,985 UART: [afmc] CDI.KEYID = 6
2,773,348 UART: [afmc] SUBJECT.KEYID = 7
2,773,774 UART: [afmc] AUTHORITY.KEYID = 5
2,809,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,862 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,581 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,478 UART: [afmc] --
2,852,468 UART: [cold-reset] --
2,853,284 UART: [state] Locking Datavault
2,854,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,381 UART: [state] Locking ICCM
2,855,821 UART: [exit] Launching FMC @ 0x40000130
2,861,150 UART:
2,861,166 UART: Running Caliptra FMC ...
2,861,574 UART:
2,861,717 UART: [state] CFI Enabled
2,872,354 UART: [fht] FMC Alias Private Key: 7
2,980,941 UART: [art] Extend RT PCRs Done
2,981,369 UART: [art] Lock RT PCRs Done
2,982,909 UART: [art] Populate DV Done
2,991,126 UART: [fht] FMC Alias Private Key: 7
2,992,194 UART: [art] Derive CDI
2,992,474 UART: [art] Store in in slot 0x4
3,078,221 UART: [art] Derive Key Pair
3,078,581 UART: [art] Store priv key in slot 0x5
3,092,401 UART: [art] Derive Key Pair - Done
3,106,809 UART: [art] Signing Cert with AUTHO
3,107,289 UART: RITY.KEYID = 7
3,122,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,332 UART: [art] PUB.X = 75877DE1CC45D0E5C2429D47C6889CE8899A7CB692662D06E9239C520D55F3D9CA89709682B24821FF57DEEF10E03865
3,130,094 UART: [art] PUB.Y = E3E93FE28806E17B67F76BA91791BAF95FADF46220EB8751564B0EEA9A63EC5C4FDB462DAAC8DCBAF6A76662972254B5
3,137,056 UART: [art] SIG.R = D48EC410C564B1589B627AED8F90CEB323E019D7B6F64A9128843A48684C73C91CED03A0743E072E5917F1DBE0BE2BC7
3,143,828 UART: [art] SIG.S = E870AA1D7704B1F27900146E142A879E3AC5EBAC8A6B2FECCB43A046CFB34A8F484C8C12047C6B0EB897689DC20DA12E
3,167,359 UART: Caliptra RT
3,167,704 UART: [state] CFI Enabled
3,275,542 UART: [rt] RT listening for mailbox commands...
3,276,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,108 UART: [rt]cmd =0x41544d4e, len=14344
3,708,507 >>> mbox cmd response data (8 bytes)
3,708,508 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,595 UART: [rt]cmd =0x41545348, len=116
3,760,126 >>> mbox cmd response data (12 bytes)
3,760,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,918 UART:
3,760,934 UART: Running Caliptra ROM ...
3,761,342 UART:
3,761,484 UART: [state] CFI Enabled
3,763,904 UART: [state] LifecycleState = Unprovisioned
3,764,559 UART: [state] DebugLocked = No
3,765,225 UART: [state] WD Timer not started. Device not locked for debugging
3,766,509 UART: [kat] SHA2-256
4,570,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,188 UART: [kat] ++
4,574,340 UART: [kat] sha1
4,578,582 UART: [kat] SHA2-256
4,580,522 UART: [kat] SHA2-384
4,583,353 UART: [kat] SHA2-512-ACC
4,585,253 UART: [kat] ECC-384
4,595,022 UART: [kat] HMAC-384Kdf
4,599,544 UART: [kat] LMS
4,847,856 UART: [kat] --
4,848,930 UART: [update-reset] ++
6,158,849 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,159,894 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,309,346 >>> mbox cmd response: success
6,309,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,309,703 UART: [update-reset] Copying MAN_2 To MAN_1
6,317,717 UART: [update-reset Success] --
6,318,852 UART: [state] Locking Datavault
6,319,672 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,276 UART: [state] Locking ICCM
6,320,876 UART: [exit] Launching FMC @ 0x40000130
6,326,205 UART:
6,326,221 UART: Running Caliptra FMC ...
6,326,629 UART:
6,326,772 UART: [state] CFI Enabled
6,415,697 UART: [art] Extend RT PCRs Done
6,416,125 UART: [art] Lock RT PCRs Done
6,416,934 UART: [art] Populate DV Done
6,425,103 UART: [fht] FMC Alias Private Key: 7
6,426,139 UART: [art] Derive CDI
6,426,419 UART: [art] Store in in slot 0x4
6,511,954 UART: [art] Derive Key Pair
6,512,314 UART: [art] Store priv key in slot 0x5
6,525,846 UART: [art] Derive Key Pair - Done
6,540,605 UART: [art] Signing Cert with AUTHO
6,541,085 UART: RITY.KEYID = 7
6,556,765 UART: [art] Erasing AUTHORITY.KEYID = 7
6,557,530 UART: [art] PUB.X = D6CA8BAAD6FAB7F436506A0A73D2A1B1CDEC7B715C8879E5C3F76BD6050950B2B68C06D64099517E78A0C7BF0CF1D706
6,564,298 UART: [art] PUB.Y = 6B1C32859606445898D1FB775DA45F96150428FAB6C8827BC65517C40916AD62B236D66D9916F3399FDDBC100FB221E7
6,571,232 UART: [art] SIG.R = 2212BA82F4ACCAD9DF9A06611A74C35B37D36D3CB81F65E421C3257BC50F9C3F326D6896E246C42CBF86F7A8234E0070
6,577,982 UART: [art] SIG.S = BC24F570A113EA9B380B00FAE9365DF003E02F6621665CBE9466C9816E5B525D17CCFFCDE5B0EE77FFE765E331B618E6
6,601,779 UART: Caliptra RT
6,602,124 UART: [state] CFI Enabled
6,881,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,912,750 UART: [rt]cmd =0x41545348, len=116
6,934,087 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,239 ready_for_fw is high
1,057,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,776 >>> mbox cmd response: success
2,682,568 UART:
2,682,584 UART: Running Caliptra FMC ...
2,682,992 UART:
2,683,135 UART: [state] CFI Enabled
2,693,880 UART: [fht] FMC Alias Private Key: 7
2,801,775 UART: [art] Extend RT PCRs Done
2,802,203 UART: [art] Lock RT PCRs Done
2,803,623 UART: [art] Populate DV Done
2,811,766 UART: [fht] FMC Alias Private Key: 7
2,812,860 UART: [art] Derive CDI
2,813,140 UART: [art] Store in in slot 0x4
2,898,311 UART: [art] Derive Key Pair
2,898,671 UART: [art] Store priv key in slot 0x5
2,911,937 UART: [art] Derive Key Pair - Done
2,926,509 UART: [art] Signing Cert with AUTHO
2,926,989 UART: RITY.KEYID = 7
2,942,129 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,894 UART: [art] PUB.X = 3FBAF1AB6CD37055C01920AD7073F5A39205E87B26F2334453B7CCA8FF4D27D14E1B3B462AF02F99DCC8D97AE065C58F
2,949,675 UART: [art] PUB.Y = 0C6D329E7D254AB2C235981781997703A44B19C846E58BDD909E1670DFC5BF324B077B9D8B7B79D2C765FC92D0F91148
2,956,616 UART: [art] SIG.R = 0CB2BE09204A3E72769ABF2B7B998FFC76283F499C8C2250E73E285BDC341A54369055D0AB22AA95DE3FE4F2FDB2BC49
2,963,394 UART: [art] SIG.S = E13102C4293FE05F3835FDA5F620D6B45CB41FA9706821CF07C48E1FB640D0164334EDAE82212577FC0F2755D3B3519B
2,987,544 UART: Caliptra RT
2,987,889 UART: [state] CFI Enabled
3,095,394 UART: [rt] RT listening for mailbox commands...
3,096,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,100 UART: [rt]cmd =0x41544d4e, len=14344
3,529,563 >>> mbox cmd response data (8 bytes)
3,529,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,577 UART: [rt]cmd =0x41545348, len=116
3,580,610 >>> mbox cmd response data (12 bytes)
3,580,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,009,449 >>> mbox cmd response: success
6,009,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,022,827 UART:
6,022,843 UART: Running Caliptra FMC ...
6,023,251 UART:
6,023,394 UART: [state] CFI Enabled
6,112,801 UART: [art] Extend RT PCRs Done
6,113,229 UART: [art] Lock RT PCRs Done
6,114,516 UART: [art] Populate DV Done
6,122,747 UART: [fht] FMC Alias Private Key: 7
6,123,901 UART: [art] Derive CDI
6,124,181 UART: [art] Store in in slot 0x4
6,209,732 UART: [art] Derive Key Pair
6,210,092 UART: [art] Store priv key in slot 0x5
6,223,408 UART: [art] Derive Key Pair - Done
6,238,466 UART: [art] Signing Cert with AUTHO
6,238,946 UART: RITY.KEYID = 7
6,254,242 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,007 UART: [art] PUB.X = 75503D7A46F1C1E242AE74B418E8BA0A945E667DE622A08C5F6B9ADEBD6DE0D2D6D61B4EE9B0AEBE0CE779F351723D59
6,261,791 UART: [art] PUB.Y = 3B4FAB3C92C2333BF23946C52E1FE8E3DCDD05043B5938F0E981ECAEDCFB8E906336B89EC22BBAE1EB905A017C6B47E4
6,268,754 UART: [art] SIG.R = D9C81C5665ABD230257F3C05FCB35304AD5393684790D7CBED070FD179655885A635413EC5820E95251221B18F1E5877
6,275,501 UART: [art] SIG.S = E12269E1D0CEE26C9774BAE1012ACE2450742BF52762431C3B6EC477915A8638D5738E25A06A409EEC789E38E4C72D10
6,299,655 UART: Caliptra RT
6,300,000 UART: [state] CFI Enabled
6,582,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,805 UART: [rt]cmd =0x41545348, len=116
6,635,082 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,227 UART:
192,585 UART: Running Caliptra ROM ...
193,786 UART:
193,940 UART: [state] CFI Enabled
261,717 UART: [state] LifecycleState = Unprovisioned
263,704 UART: [state] DebugLocked = No
265,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,450 UART: [kat] SHA2-256
440,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,684 UART: [kat] ++
451,179 UART: [kat] sha1
461,699 UART: [kat] SHA2-256
464,348 UART: [kat] SHA2-384
470,320 UART: [kat] SHA2-512-ACC
472,732 UART: [kat] ECC-384
2,767,304 UART: [kat] HMAC-384Kdf
2,799,645 UART: [kat] LMS
3,989,951 UART: [kat] --
3,992,425 UART: [cold-reset] ++
3,994,219 UART: [fht] Storing FHT @ 0x50003400
4,005,554 UART: [idev] ++
4,006,119 UART: [idev] CDI.KEYID = 6
4,007,014 UART: [idev] SUBJECT.KEYID = 7
4,008,261 UART: [idev] UDS.KEYID = 0
4,009,208 ready_for_fw is high
4,009,408 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,563 UART: [idev] Erasing UDS.KEYID = 0
7,345,599 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,324 UART: [idev] --
7,370,261 UART: [ldev] ++
7,370,844 UART: [ldev] CDI.KEYID = 6
7,371,864 UART: [ldev] SUBJECT.KEYID = 5
7,373,020 UART: [ldev] AUTHORITY.KEYID = 7
7,374,305 UART: [ldev] FE.KEYID = 1
7,421,843 UART: [ldev] Erasing FE.KEYID = 1
10,756,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,328 UART: [ldev] --
13,136,839 UART: [fwproc] Waiting for Commands...
13,139,050 UART: [fwproc] Received command 0x46574c44
13,141,240 UART: [fwproc] Received Image of size 113760 bytes
17,192,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,473 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,651,586 >>> mbox cmd response: success
17,656,357 UART: [afmc] ++
17,656,958 UART: [afmc] CDI.KEYID = 6
17,657,982 UART: [afmc] SUBJECT.KEYID = 7
17,659,145 UART: [afmc] AUTHORITY.KEYID = 5
21,035,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,973 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,395 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,218 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,690 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,091 UART: [afmc] --
23,399,121 UART: [cold-reset] --
23,401,203 UART: [state] Locking Datavault
23,406,306 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,071 UART: [state] Locking ICCM
23,410,073 UART: [exit] Launching FMC @ 0x40000130
23,418,478 UART:
23,418,717 UART: Running Caliptra FMC ...
23,419,821 UART:
23,419,984 UART: [state] CFI Enabled
23,489,817 UART: [fht] FMC Alias Private Key: 7
25,828,591 UART: [art] Extend RT PCRs Done
25,829,942 UART: [art] Lock RT PCRs Done
25,831,568 UART: [art] Populate DV Done
25,837,034 UART: [fht] FMC Alias Private Key: 7
25,838,739 UART: [art] Derive CDI
25,839,553 UART: [art] Store in in slot 0x4
25,899,039 UART: [art] Derive Key Pair
25,900,044 UART: [art] Store priv key in slot 0x5
29,193,088 UART: [art] Derive Key Pair - Done
29,206,251 UART: [art] Signing Cert with AUTHO
29,207,555 UART: RITY.KEYID = 7
31,494,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,404 UART: [art] PUB.X = 6BDAB90F329CCB11A1F2B40C82ED815D2577D49608832CDED3E025C74A355648FE17733EA2BEE2E981468D4889D8A949
31,503,711 UART: [art] PUB.Y = 018F1721C9622D48ADCE8AE236ADEDDB382CC5B0FD0BA6470AFA03498CB3BAB45107F72238195FDA2F21967AFDE96CA9
31,510,979 UART: [art] SIG.R = E638BF141AAC2FD597D53C501F92BA6EE73C63534569586DE55AD9288BCE9DF8F52C17ED084385D51C3BCC3EFF2B50E3
31,518,324 UART: [art] SIG.S = 31726663EB46E33E909B22A40FD66B8035C401709F0BD004D526E1165BD7EBEA84A5A71094A659ED93FBDC52DC9E3B9E
32,823,551 UART: Caliptra RT
32,824,242 UART: [state] CFI Enabled
32,985,300 UART: [rt] RT listening for mailbox commands...
32,987,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,143,191 UART: [rt]cmd =0x41544d4e, len=14344
38,443,329 >>> mbox cmd response data (8 bytes)
38,443,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,474,839 UART: [rt]cmd =0x41545348, len=116
38,477,098 >>> mbox cmd response data (12 bytes)
40,532,025 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,676,934 UART:
40,677,299 UART: Running Caliptra ROM ...
40,678,359 UART:
40,678,511 UART: [state] CFI Enabled
40,755,760 UART: [state] LifecycleState = Unprovisioned
40,757,701 UART: [state] DebugLocked = No
40,760,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,765,168 UART: [kat] SHA2-256
40,934,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,945,356 UART: [kat] ++
40,945,815 UART: [kat] sha1
40,956,866 UART: [kat] SHA2-256
40,959,597 UART: [kat] SHA2-384
40,964,563 UART: [kat] SHA2-512-ACC
40,966,968 UART: [kat] ECC-384
43,257,854 UART: [kat] HMAC-384Kdf
43,290,977 UART: [kat] LMS
44,481,305 UART: [kat] --
44,486,991 UART: [update-reset] ++
48,625,115 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,628,908 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
49,009,887 >>> mbox cmd response: success
49,014,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,015,181 UART: [update-reset] Copying MAN_2 To MAN_1
49,033,573 UART: [update-reset Success] --
49,038,777 UART: [state] Locking Datavault
49,041,662 UART: [state] Locking PCR0, PCR1 and PCR31
49,043,368 UART: [state] Locking ICCM
49,044,769 UART: [exit] Launching FMC @ 0x40000130
49,053,171 UART:
49,053,411 UART: Running Caliptra FMC ...
49,054,517 UART:
49,054,677 UART: [state] CFI Enabled
49,147,989 UART: [art] Extend RT PCRs Done
49,149,184 UART: [art] Lock RT PCRs Done
49,150,803 UART: [art] Populate DV Done
49,156,055 UART: [fht] FMC Alias Private Key: 7
49,157,730 UART: [art] Derive CDI
49,158,546 UART: [art] Store in in slot 0x4
49,217,231 UART: [art] Derive Key Pair
49,218,280 UART: [art] Store priv key in slot 0x5
52,510,751 UART: [art] Derive Key Pair - Done
52,523,538 UART: [art] Signing Cert with AUTHO
52,524,850 UART: RITY.KEYID = 7
54,812,667 UART: [art] Erasing AUTHORITY.KEYID = 7
54,814,184 UART: [art] PUB.X = D34026333E4764B51596946136D9BD97084B26AC64389CBC0A5F4C3BEBCE2FD44AE34B6ABF0957679066A4C915C7C4CB
54,821,431 UART: [art] PUB.Y = 9E85598241BC9C49FEB83F89428250F674931C9EA14BD5714D20893B4A928BC5F00C650C6E60015A6A1EBE70B540DFA8
54,828,665 UART: [art] SIG.R = 7568909402AB49A1384863FF331507EBDC87D8FD3254F479B84DEF73DC551F71F4A9ED490BDD32F6331DC835415A8E46
54,836,052 UART: [art] SIG.S = F43AFABECE87FBDAD30E1ADC81860079F2D1A4BFFF817C045B1DC681CD5D84F3C96F8AC01419A3F4F2AFB4F323D09C48
56,140,664 UART: Caliptra RT
56,141,392 UART: [state] CFI Enabled
56,476,617 UART: [rt] RT listening for mailbox commands...
56,508,439 UART: [rt]cmd =0x41545348, len=116
56,510,385 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,784,101 ready_for_fw is high
3,784,503 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,865,321 >>> mbox cmd response: success
23,563,505 UART:
23,563,886 UART: Running Caliptra FMC ...
23,565,022 UART:
23,565,188 UART: [state] CFI Enabled
23,632,414 UART: [fht] FMC Alias Private Key: 7
25,970,625 UART: [art] Extend RT PCRs Done
25,971,890 UART: [art] Lock RT PCRs Done
25,973,341 UART: [art] Populate DV Done
25,978,933 UART: [fht] FMC Alias Private Key: 7
25,980,474 UART: [art] Derive CDI
25,981,213 UART: [art] Store in in slot 0x4
26,041,179 UART: [art] Derive Key Pair
26,042,228 UART: [art] Store priv key in slot 0x5
29,335,121 UART: [art] Derive Key Pair - Done
29,348,222 UART: [art] Signing Cert with AUTHO
29,349,518 UART: RITY.KEYID = 7
31,636,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,224 UART: [art] PUB.X = 496B5EFCFA69246C46B5DCC535182FD7BC87E9141BE6B58D99D17EB8D46834195EDF757CF8986F420D8F52FF2ADC9205
31,645,497 UART: [art] PUB.Y = 64C5B5A1858347E7D3853876A0A0CC8DD5EF5478CAB3DFF4BF19D7264A8437070FA2FDA3A27DD86FF5C4280A8B5FDCF6
31,652,757 UART: [art] SIG.R = D4F30737651B1E42CE8190A1DD74CE2710A0B62622920C995C12F1792525409868F6686168A0781D3AA1AFF4685916F9
31,660,111 UART: [art] SIG.S = 7C8A38660FF56BD0F272E88691056DE1166C9EBB612D0334319072A1A49265C5B78C3CDEC70137E9B853550A4E6DCAFC
32,966,402 UART: Caliptra RT
32,967,127 UART: [state] CFI Enabled
33,147,929 UART: [rt] RT listening for mailbox commands...
33,150,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,305,683 UART: [rt]cmd =0x41544d4e, len=14344
38,606,290 >>> mbox cmd response data (8 bytes)
38,606,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,637,408 UART: [rt]cmd =0x41545348, len=116
38,639,445 >>> mbox cmd response data (12 bytes)
40,694,354 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,427,664 >>> mbox cmd response: success
49,428,208 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,463,274 UART:
49,463,608 UART: Running Caliptra FMC ...
49,464,701 UART:
49,464,856 UART: [state] CFI Enabled
49,561,841 UART: [art] Extend RT PCRs Done
49,563,039 UART: [art] Lock RT PCRs Done
49,564,501 UART: [art] Populate DV Done
49,569,854 UART: [fht] FMC Alias Private Key: 7
49,571,506 UART: [art] Derive CDI
49,572,324 UART: [art] Store in in slot 0x4
49,630,824 UART: [art] Derive Key Pair
49,631,874 UART: [art] Store priv key in slot 0x5
52,924,926 UART: [art] Derive Key Pair - Done
52,937,654 UART: [art] Signing Cert with AUTHO
52,938,957 UART: RITY.KEYID = 7
55,226,940 UART: [art] Erasing AUTHORITY.KEYID = 7
55,228,449 UART: [art] PUB.X = FE737BEE0714AA3887DC6F5BEC5F8A8D301B75431AFED729DBFAF24FA78598ED3C2EDC568FD7072A5F71C5940DB7AF81
55,235,722 UART: [art] PUB.Y = CEA3850956B0B57C5D02A3D5371B54DB9F9DEF37BFBA832E634FBA37F96CF469553440D232C95005D229069E3A55B8AA
55,242,931 UART: [art] SIG.R = 7210066E5CCD72B6EC4D2AB9EAE1341940F50C48DF18A574C5AA61DEFB359C2806A17E9B3B353174146825895D55322C
55,250,328 UART: [art] SIG.S = D3EDE28653AB3624F5D0835E4C26E5B6C15810C83F6E4209C5EBCB066A8E53C784B1A2C3E7F67810F80F2125943F5ECC
56,555,950 UART: Caliptra RT
56,556,665 UART: [state] CFI Enabled
56,889,122 UART: [rt] RT listening for mailbox commands...
56,921,216 UART: [rt]cmd =0x41545348, len=116
56,923,409 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
192,953 UART:
193,398 UART: Running Caliptra ROM ...
194,559 UART:
603,988 UART: [state] CFI Enabled
620,947 UART: [state] LifecycleState = Unprovisioned
622,935 UART: [state] DebugLocked = No
625,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,187 UART: [kat] SHA2-256
799,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,546 UART: [kat] ++
811,027 UART: [kat] sha1
821,833 UART: [kat] SHA2-256
824,494 UART: [kat] SHA2-384
830,764 UART: [kat] SHA2-512-ACC
833,127 UART: [kat] ECC-384
3,117,787 UART: [kat] HMAC-384Kdf
3,128,952 UART: [kat] LMS
4,319,065 UART: [kat] --
4,322,716 UART: [cold-reset] ++
4,324,359 UART: [fht] Storing FHT @ 0x50003400
4,336,117 UART: [idev] ++
4,336,694 UART: [idev] CDI.KEYID = 6
4,337,723 UART: [idev] SUBJECT.KEYID = 7
4,338,898 UART: [idev] UDS.KEYID = 0
4,339,843 ready_for_fw is high
4,340,058 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,001 UART: [idev] Erasing UDS.KEYID = 0
7,629,652 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,640 UART: [idev] --
7,657,310 UART: [ldev] ++
7,657,886 UART: [ldev] CDI.KEYID = 6
7,658,845 UART: [ldev] SUBJECT.KEYID = 5
7,660,056 UART: [ldev] AUTHORITY.KEYID = 7
7,661,338 UART: [ldev] FE.KEYID = 1
7,671,058 UART: [ldev] Erasing FE.KEYID = 1
10,960,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,109 UART: [ldev] --
13,322,577 UART: [fwproc] Waiting for Commands...
13,324,225 UART: [fwproc] Received command 0x46574c44
13,326,451 UART: [fwproc] Received Image of size 113760 bytes
17,367,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,335 >>> mbox cmd response: success
17,834,732 UART: [afmc] ++
17,835,331 UART: [afmc] CDI.KEYID = 6
17,836,241 UART: [afmc] SUBJECT.KEYID = 7
17,837,511 UART: [afmc] AUTHORITY.KEYID = 5
21,156,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,207 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,580 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,417 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,929 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,420 UART: [afmc] --
23,521,362 UART: [cold-reset] --
23,524,848 UART: [state] Locking Datavault
23,529,932 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,686 UART: [state] Locking ICCM
23,534,048 UART: [exit] Launching FMC @ 0x40000130
23,542,450 UART:
23,542,684 UART: Running Caliptra FMC ...
23,543,786 UART:
23,543,945 UART: [state] CFI Enabled
23,552,287 UART: [fht] FMC Alias Private Key: 7
25,882,835 UART: [art] Extend RT PCRs Done
25,884,055 UART: [art] Lock RT PCRs Done
25,885,627 UART: [art] Populate DV Done
25,891,235 UART: [fht] FMC Alias Private Key: 7
25,892,927 UART: [art] Derive CDI
25,893,747 UART: [art] Store in in slot 0x4
25,936,501 UART: [art] Derive Key Pair
25,937,499 UART: [art] Store priv key in slot 0x5
29,180,269 UART: [art] Derive Key Pair - Done
29,193,430 UART: [art] Signing Cert with AUTHO
29,194,734 UART: RITY.KEYID = 7
31,474,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,825 UART: [art] PUB.X = 90F37D50C218CAF4F92A4AA70D360F38A75E0FD0F249383EB8154CC552D787579D8F69409C1ACECBE8B9A3A537AB1A78
31,483,098 UART: [art] PUB.Y = EEAF97597C1C48DE81D3E42A6529EA63AC0463B6455AE837135DEB6D7F91D9E57F44D69B1A689340D8C667DC1217799E
31,490,449 UART: [art] SIG.R = EB2BBA1066C97F2EB99D26B7ED14DC19C5AC176185D9678EF0A3B390CB0AFFCE86D9DC62FCE632644779480B109B0419
31,497,737 UART: [art] SIG.S = 3C162AA8C546E99AE4B315460DA243A12942D9BBE6FDFB54FF17FAA09973FC6C370D67E67D5EA8764C3883E57C4E1ED2
32,803,305 UART: Caliptra RT
32,804,014 UART: [state] CFI Enabled
32,921,627 UART: [rt] RT listening for mailbox commands...
32,924,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,079,429 UART: [rt]cmd =0x41544d4e, len=14344
38,380,133 >>> mbox cmd response data (8 bytes)
38,380,783 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,411,363 UART: [rt]cmd =0x41545348, len=116
38,413,298 >>> mbox cmd response data (12 bytes)
40,467,523 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,612,905 UART:
40,613,312 UART: Running Caliptra ROM ...
40,614,452 UART:
40,614,617 UART: [state] CFI Enabled
40,629,368 UART: [state] LifecycleState = Unprovisioned
40,631,268 UART: [state] DebugLocked = No
40,633,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,639,623 UART: [kat] SHA2-256
40,809,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,819,913 UART: [kat] ++
40,820,449 UART: [kat] sha1
40,831,173 UART: [kat] SHA2-256
40,833,914 UART: [kat] SHA2-384
40,840,376 UART: [kat] SHA2-512-ACC
40,842,772 UART: [kat] ECC-384
43,126,963 UART: [kat] HMAC-384Kdf
43,139,787 UART: [kat] LMS
44,329,880 UART: [kat] --
44,335,393 UART: [update-reset] ++
48,475,002 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,479,442 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
48,860,399 >>> mbox cmd response: success
48,865,130 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,865,728 UART: [update-reset] Copying MAN_2 To MAN_1
48,884,129 UART: [update-reset Success] --
48,890,255 UART: [state] Locking Datavault
48,894,098 UART: [state] Locking PCR0, PCR1 and PCR31
48,895,911 UART: [state] Locking ICCM
48,897,122 UART: [exit] Launching FMC @ 0x40000130
48,905,593 UART:
48,905,837 UART: Running Caliptra FMC ...
48,906,864 UART:
48,907,009 UART: [state] CFI Enabled
48,950,893 UART: [art] Extend RT PCRs Done
48,952,082 UART: [art] Lock RT PCRs Done
48,953,757 UART: [art] Populate DV Done
48,959,220 UART: [fht] FMC Alias Private Key: 7
48,960,706 UART: [art] Derive CDI
48,961,467 UART: [art] Store in in slot 0x4
49,004,050 UART: [art] Derive Key Pair
49,005,058 UART: [art] Store priv key in slot 0x5
52,246,783 UART: [art] Derive Key Pair - Done
52,260,220 UART: [art] Signing Cert with AUTHO
52,261,527 UART: RITY.KEYID = 7
54,541,311 UART: [art] Erasing AUTHORITY.KEYID = 7
54,542,841 UART: [art] PUB.X = F71D7388F1929900400C1A8FC7CBD585C35B6BD09DBBAB523FD11CCF564CEEFF6259FDC81759F3B0B74AC04519201B9E
54,550,117 UART: [art] PUB.Y = ADEB6CCD591280FD19BF07469CD597FC142D6CC13FA54DE403487D373FEBC4DFE50AB8E10C093AAD1AF0EB06FD12C6A2
54,557,365 UART: [art] SIG.R = 1824941F3556347A09BC406DF142215D9D3FE1B1D11CC0598E0F1BE0AFE4CD82A34D446EECA79C1A3A744821304B1E2C
54,564,780 UART: [art] SIG.S = 6ED411D66860059765554A608EC3294F251B61E2F2B06F10FE4E51B4BC7042969B2C832B82A65E9ECFF5C78B27342CAD
55,869,592 UART: Caliptra RT
55,870,321 UART: [state] CFI Enabled
56,159,387 UART: [rt] RT listening for mailbox commands...
56,191,075 UART: [rt]cmd =0x41545348, len=116
56,193,048 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,720 writing to cptra_bootfsm_go
4,127,543 ready_for_fw is high
4,128,087 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,046,339 >>> mbox cmd response: success
23,678,566 UART:
23,678,972 UART: Running Caliptra FMC ...
23,680,108 UART:
23,680,297 UART: [state] CFI Enabled
23,688,180 UART: [fht] FMC Alias Private Key: 7
26,018,117 UART: [art] Extend RT PCRs Done
26,019,351 UART: [art] Lock RT PCRs Done
26,021,195 UART: [art] Populate DV Done
26,026,766 UART: [fht] FMC Alias Private Key: 7
26,028,476 UART: [art] Derive CDI
26,029,290 UART: [art] Store in in slot 0x4
26,071,940 UART: [art] Derive Key Pair
26,072,940 UART: [art] Store priv key in slot 0x5
29,315,017 UART: [art] Derive Key Pair - Done
29,328,084 UART: [art] Signing Cert with AUTHO
29,329,390 UART: RITY.KEYID = 7
31,608,677 UART: [art] Erasing AUTHORITY.KEYID = 7
31,610,192 UART: [art] PUB.X = 815789694C8B565BF022A02D4AD1073386D594F95E9393903AC9B6A543ECBB2CA746F04D0370F4F11EE5D5D914D86537
31,617,413 UART: [art] PUB.Y = E00F681E23BE55AE07A0B546E8372A425E2CEBC6E676874A557C65B660F85A45EEE72366FE59B65E6E38C0F4778187BA
31,624,661 UART: [art] SIG.R = 145D07C11CDBF39228382D7CC8F9282851A06E01060AFE203CAE3E64C769B3FA593E7B3B106142A9CC3E9379A7229686
31,631,995 UART: [art] SIG.S = 935360BE18EC89CAC5E95F7A95AE3E2222090332BACC7CB0F8AD1B4173A98B0F4471A9CE6D7D8CC33CB171ADA5B67EC5
32,937,229 UART: Caliptra RT
32,937,940 UART: [state] CFI Enabled
33,056,482 UART: [rt] RT listening for mailbox commands...
33,058,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,213,983 UART: [rt]cmd =0x41544d4e, len=14344
38,514,877 >>> mbox cmd response data (8 bytes)
38,515,473 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,546,367 UART: [rt]cmd =0x41545348, len=116
38,548,517 >>> mbox cmd response data (12 bytes)
40,601,346 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
49,247,903 >>> mbox cmd response: success
49,248,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,283,672 UART:
49,284,001 UART: Running Caliptra FMC ...
49,285,052 UART:
49,285,202 UART: [state] CFI Enabled
49,329,206 UART: [art] Extend RT PCRs Done
49,330,362 UART: [art] Lock RT PCRs Done
49,332,160 UART: [art] Populate DV Done
49,337,777 UART: [fht] FMC Alias Private Key: 7
49,339,525 UART: [art] Derive CDI
49,340,253 UART: [art] Store in in slot 0x4
49,383,293 UART: [art] Derive Key Pair
49,384,331 UART: [art] Store priv key in slot 0x5
52,626,096 UART: [art] Derive Key Pair - Done
52,639,366 UART: [art] Signing Cert with AUTHO
52,640,705 UART: RITY.KEYID = 7
54,919,883 UART: [art] Erasing AUTHORITY.KEYID = 7
54,921,398 UART: [art] PUB.X = 002FC7D04EE32FC6A24163086DCB31A8F71F2692E5E935D28CFA84F62465F39AD92A26ED470149EA4BE26D50D273234B
54,928,610 UART: [art] PUB.Y = E7E9149B893C798ABC2F79405B06C18C24923FF73132AC5ABAB3AF42CA0B059E9292B8DBE8D11333E218DB660E1C897C
54,935,872 UART: [art] SIG.R = ACC1ACE0830D748CE25ACD7C73B50FDB1F9A084CF97E39776B2EBEA309348574A0ACBE38E71E2E5BA22FCA3B85E46241
54,943,305 UART: [art] SIG.S = 8F69A9CC8640685D85A0E1BDBB902EAD3CC07F833092C661EC732077367FD2ED5759B3DCFE741921A7AED1B320A1AFAD
56,249,050 UART: Caliptra RT
56,249,753 UART: [state] CFI Enabled
56,540,882 UART: [rt] RT listening for mailbox commands...
56,572,557 UART: [rt]cmd =0x41545348, len=116
56,574,668 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,494 UART:
192,974 UART: Running Caliptra ROM ...
194,159 UART:
194,307 UART: [state] CFI Enabled
263,812 UART: [state] LifecycleState = Unprovisioned
265,662 UART: [state] DebugLocked = No
268,475 UART: [state] WD Timer not started. Device not locked for debugging
272,431 UART: [kat] SHA2-256
451,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,136 UART: [kat] ++
463,581 UART: [kat] sha1
475,158 UART: [kat] SHA2-256
478,165 UART: [kat] SHA2-384
483,868 UART: [kat] SHA2-512-ACC
486,866 UART: [kat] ECC-384
2,951,057 UART: [kat] HMAC-384Kdf
2,970,833 UART: [kat] LMS
3,500,277 UART: [kat] --
3,504,857 UART: [cold-reset] ++
3,507,139 UART: [fht] FHT @ 0x50003400
3,518,318 UART: [idev] ++
3,518,875 UART: [idev] CDI.KEYID = 6
3,519,824 UART: [idev] SUBJECT.KEYID = 7
3,521,060 UART: [idev] UDS.KEYID = 0
3,521,982 ready_for_fw is high
3,522,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,976 UART: [idev] Erasing UDS.KEYID = 0
6,026,826 UART: [idev] Sha1 KeyId Algorithm
6,050,429 UART: [idev] --
6,055,381 UART: [ldev] ++
6,055,958 UART: [ldev] CDI.KEYID = 6
6,056,878 UART: [ldev] SUBJECT.KEYID = 5
6,058,056 UART: [ldev] AUTHORITY.KEYID = 7
6,059,290 UART: [ldev] FE.KEYID = 1
6,100,883 UART: [ldev] Erasing FE.KEYID = 1
8,603,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,040 UART: [ldev] --
10,414,314 UART: [fwproc] Wait for Commands...
10,415,965 UART: [fwproc] Recv command 0x46574c44
10,418,053 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,248 >>> mbox cmd response: success
14,283,948 UART: [afmc] ++
14,284,546 UART: [afmc] CDI.KEYID = 6
14,285,457 UART: [afmc] SUBJECT.KEYID = 7
14,286,610 UART: [afmc] AUTHORITY.KEYID = 5
16,827,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,954 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,988 UART: [afmc] --
18,632,075 UART: [cold-reset] --
18,635,892 UART: [state] Locking Datavault
18,641,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,040 UART: [state] Locking ICCM
18,644,252 UART: [exit] Launching FMC @ 0x40000130
18,652,646 UART:
18,652,885 UART: Running Caliptra FMC ...
18,653,985 UART:
18,654,144 UART: [state] CFI Enabled
18,714,233 UART: [fht] FMC Alias Private Key: 7
20,477,967 UART: [art] Extend RT PCRs Done
20,479,173 UART: [art] Lock RT PCRs Done
20,480,958 UART: [art] Populate DV Done
20,486,492 UART: [fht] FMC Alias Private Key: 7
20,488,136 UART: [art] Derive CDI
20,488,948 UART: [art] Store in in slot 0x4
20,547,397 UART: [art] Derive Key Pair
20,548,426 UART: [art] Store priv key in slot 0x5
23,010,901 UART: [art] Derive Key Pair - Done
23,023,683 UART: [art] Signing Cert with AUTHO
23,024,982 UART: RITY.KEYID = 7
24,737,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,513 UART: [art] PUB.X = 80CD5106F4897CF8648471CA325E9B1A17A6803105990FE3A5D3F85AD93E343D2E14652BBEAF80975441C0219F319C90
24,745,720 UART: [art] PUB.Y = 8A6C325A6F9D6BBF9C665C7A52C17949419E01AEE50B49074A1B9D3FB1C754DF7B3A05648AB3754A53C4D8A7814A7F50
24,753,023 UART: [art] SIG.R = C66A54C0429E6D14381F8149513951CE6C1352B1D9B226D01101DFFAB4C1F34C15F618CEC9DF241E85A7675940228CE7
24,760,385 UART: [art] SIG.S = ACA77B7D0141CF426B635D1419C5FC5E66DF5E603477FF48CA54367762893B99AF8839FBF6057E70151CA94E692E2CD1
25,739,026 UART: Caliptra RT
25,739,716 UART: [state] CFI Enabled
25,904,653 UART: [rt] RT listening for mailbox commands...
25,907,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,062,534 UART: [rt]cmd =0x41544d4e, len=14344
30,058,410 >>> mbox cmd response data (8 bytes)
30,059,013 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,089,694 UART: [rt]cmd =0x41545348, len=116
30,091,685 >>> mbox cmd response data (12 bytes)
32,144,587 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,289,422 UART:
32,289,972 UART: Running Caliptra ROM ...
32,291,126 UART:
32,291,298 UART: [state] CFI Enabled
32,346,340 UART: [state] LifecycleState = Unprovisioned
32,348,204 UART: [state] DebugLocked = No
32,351,043 UART: [state] WD Timer not started. Device not locked for debugging
32,354,523 UART: [kat] SHA2-256
32,533,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,545,202 UART: [kat] ++
32,545,748 UART: [kat] sha1
32,556,687 UART: [kat] SHA2-256
32,559,700 UART: [kat] SHA2-384
32,565,406 UART: [kat] SHA2-512-ACC
32,568,396 UART: [kat] ECC-384
35,036,365 UART: [kat] HMAC-384Kdf
35,055,445 UART: [kat] LMS
35,584,918 UART: [kat] --
35,588,983 UART: [update-reset] ++
39,008,402 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,010,956 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,392,988 >>> mbox cmd response: success
39,393,423 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,393,910 UART: [update-reset] Copying MAN_2 To MAN_1
39,416,204 UART: [update-reset Success] --
39,420,315 UART: [state] Locking Datavault
39,423,357 UART: [state] Locking PCR0, PCR1 and PCR31
39,425,056 UART: [state] Locking ICCM
39,426,584 UART: [exit] Launching FMC @ 0x40000130
39,435,039 UART:
39,435,278 UART: Running Caliptra FMC ...
39,436,379 UART:
39,436,534 UART: [state] CFI Enabled
39,524,537 UART: [art] Extend RT PCRs Done
39,525,716 UART: [art] Lock RT PCRs Done
39,526,953 UART: [art] Populate DV Done
39,532,731 UART: [fht] FMC Alias Private Key: 7
39,534,387 UART: [art] Derive CDI
39,535,196 UART: [art] Store in in slot 0x4
39,593,506 UART: [art] Derive Key Pair
39,594,598 UART: [art] Store priv key in slot 0x5
42,058,167 UART: [art] Derive Key Pair - Done
42,071,111 UART: [art] Signing Cert with AUTHO
42,072,416 UART: RITY.KEYID = 7
43,783,068 UART: [art] Erasing AUTHORITY.KEYID = 7
43,784,581 UART: [art] PUB.X = CD6277F92114BF87799271E8E3EB31958938C1DEA4899485FA2AEE06EEAD47521FB592ECB5FA8A84DDBF97AC1951F6C3
43,791,873 UART: [art] PUB.Y = 0CD7E6DE803D17C41FE06D28DCAE7442CFF7A04D782F7129E75B5B21F60F0DB888A6DD9E767288B336F0BE9A1763E668
43,799,143 UART: [art] SIG.R = AF6B673BF67106663DE4ED048616300FE6054909118C8E1F630FF5E5202151FEDA945C01252B876299E20BB6C4A6EC07
43,806,502 UART: [art] SIG.S = 6A2444C7645310FEF05946188EA01738EED720124D8503CF1BA921770632161A33601F839C451E3E872226779645DF4A
44,785,578 UART: Caliptra RT
44,786,272 UART: [state] CFI Enabled
45,115,198 UART: [rt] RT listening for mailbox commands...
45,147,011 UART: [rt]cmd =0x41545348, len=116
45,149,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
3,383,760 ready_for_fw is high
3,384,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,082,548 >>> mbox cmd response: success
18,363,550 UART:
18,363,935 UART: Running Caliptra FMC ...
18,365,127 UART:
18,365,314 UART: [state] CFI Enabled
18,432,076 UART: [fht] FMC Alias Private Key: 7
20,195,450 UART: [art] Extend RT PCRs Done
20,196,832 UART: [art] Lock RT PCRs Done
20,198,194 UART: [art] Populate DV Done
20,203,696 UART: [fht] FMC Alias Private Key: 7
20,205,298 UART: [art] Derive CDI
20,206,121 UART: [art] Store in in slot 0x4
20,264,506 UART: [art] Derive Key Pair
20,265,498 UART: [art] Store priv key in slot 0x5
22,728,245 UART: [art] Derive Key Pair - Done
22,740,980 UART: [art] Signing Cert with AUTHO
22,742,289 UART: RITY.KEYID = 7
24,453,845 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,351 UART: [art] PUB.X = 01232700015A34E6BC517EA0D5C46B80C73679098140255A18E3EA01E21F5572686D91B99B1F22B49FFA7570211169A0
24,462,575 UART: [art] PUB.Y = 9DC3D4C26EBC93DE9EE09781E3499B41ECA18EAFFBB6D7BB75EF6DA6947AB13EE791A94F4B0F91649D3E86F9C866BC01
24,469,898 UART: [art] SIG.R = C322403BBC41457870ADF2B85FFDF133ACA558D858C751B264D3C50D0D589365B65512B1A2710EF9CCB29EC1F04D23DB
24,477,262 UART: [art] SIG.S = C79E26C7A429726AEFE76D6676168A287FD7A0E3481DF7E80C388642E2B477E77419FF456E554E2E12189FF682938E38
25,456,098 UART: Caliptra RT
25,456,789 UART: [state] CFI Enabled
25,622,019 UART: [rt] RT listening for mailbox commands...
25,624,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,779,940 UART: [rt]cmd =0x41544d4e, len=14344
29,775,974 >>> mbox cmd response data (8 bytes)
29,776,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,807,256 UART: [rt]cmd =0x41545348, len=116
29,809,549 >>> mbox cmd response data (12 bytes)
31,867,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
39,008,989 >>> mbox cmd response: success
39,009,544 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,046,069 UART:
39,046,378 UART: Running Caliptra FMC ...
39,047,503 UART:
39,047,668 UART: [state] CFI Enabled
39,135,454 UART: [art] Extend RT PCRs Done
39,136,651 UART: [art] Lock RT PCRs Done
39,138,210 UART: [art] Populate DV Done
39,143,670 UART: [fht] FMC Alias Private Key: 7
39,145,265 UART: [art] Derive CDI
39,146,080 UART: [art] Store in in slot 0x4
39,204,936 UART: [art] Derive Key Pair
39,205,980 UART: [art] Store priv key in slot 0x5
41,668,297 UART: [art] Derive Key Pair - Done
41,681,091 UART: [art] Signing Cert with AUTHO
41,682,427 UART: RITY.KEYID = 7
43,394,836 UART: [art] Erasing AUTHORITY.KEYID = 7
43,396,494 UART: [art] PUB.X = E2D7385C0B3C82A9CF889A2B5A3F7616F9A3CE837A8CD0F18ED3154AA858F0D87125C57A783214EEAD140277F46868CA
43,403,624 UART: [art] PUB.Y = 5649E7CB0AE1EEDF33D7059C02CF97AF627484BC645627F3FA275161DDEF51B714A19A8A98437ED3E622D7E0557320F1
43,410,900 UART: [art] SIG.R = 4B7FB2DFEA5CCECCC41B75ED9C1DA90461B4C8B3198B6DE314A99F4D8042516FC5A7DBD698E8C922278B86C2C788A137
43,418,317 UART: [art] SIG.S = EF0E46D1D91691BE97EEE477746941DC229F511FA1E40FB5978B6CA81FCBD08F4C99F1FB83F23A9CC13B0485BDCEF78B
44,397,074 UART: Caliptra RT
44,397,771 UART: [state] CFI Enabled
44,732,326 UART: [rt] RT listening for mailbox commands...
44,764,267 UART: [rt]cmd =0x41545348, len=116
44,766,540 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,018 writing to cptra_bootfsm_go
194,288 UART:
194,674 UART: Running Caliptra ROM ...
195,800 UART:
605,324 UART: [state] CFI Enabled
618,563 UART: [state] LifecycleState = Unprovisioned
620,448 UART: [state] DebugLocked = No
622,466 UART: [state] WD Timer not started. Device not locked for debugging
625,844 UART: [kat] SHA2-256
804,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,529 UART: [kat] ++
816,976 UART: [kat] sha1
828,838 UART: [kat] SHA2-256
831,856 UART: [kat] SHA2-384
839,347 UART: [kat] SHA2-512-ACC
842,287 UART: [kat] ECC-384
3,283,663 UART: [kat] HMAC-384Kdf
3,297,163 UART: [kat] LMS
3,826,622 UART: [kat] --
3,832,758 UART: [cold-reset] ++
3,834,407 UART: [fht] FHT @ 0x50003400
3,845,898 UART: [idev] ++
3,846,512 UART: [idev] CDI.KEYID = 6
3,847,429 UART: [idev] SUBJECT.KEYID = 7
3,848,607 UART: [idev] UDS.KEYID = 0
3,849,532 ready_for_fw is high
3,849,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,974 UART: [idev] Erasing UDS.KEYID = 0
6,324,005 UART: [idev] Sha1 KeyId Algorithm
6,347,183 UART: [idev] --
6,351,013 UART: [ldev] ++
6,351,586 UART: [ldev] CDI.KEYID = 6
6,352,496 UART: [ldev] SUBJECT.KEYID = 5
6,353,725 UART: [ldev] AUTHORITY.KEYID = 7
6,354,962 UART: [ldev] FE.KEYID = 1
6,364,798 UART: [ldev] Erasing FE.KEYID = 1
8,842,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,220 UART: [ldev] --
10,631,975 UART: [fwproc] Wait for Commands...
10,633,478 UART: [fwproc] Recv command 0x46574c44
10,635,577 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,492,564 >>> mbox cmd response: success
14,497,061 UART: [afmc] ++
14,497,673 UART: [afmc] CDI.KEYID = 6
14,498,588 UART: [afmc] SUBJECT.KEYID = 7
14,499,752 UART: [afmc] AUTHORITY.KEYID = 5
16,998,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,155 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,022 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,201 UART: [afmc] --
18,795,211 UART: [cold-reset] --
18,798,537 UART: [state] Locking Datavault
18,803,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,205 UART: [state] Locking ICCM
18,806,255 UART: [exit] Launching FMC @ 0x40000130
18,814,690 UART:
18,814,930 UART: Running Caliptra FMC ...
18,816,036 UART:
18,816,194 UART: [state] CFI Enabled
18,824,783 UART: [fht] FMC Alias Private Key: 7
20,581,499 UART: [art] Extend RT PCRs Done
20,582,727 UART: [art] Lock RT PCRs Done
20,584,676 UART: [art] Populate DV Done
20,589,929 UART: [fht] FMC Alias Private Key: 7
20,591,524 UART: [art] Derive CDI
20,592,340 UART: [art] Store in in slot 0x4
20,634,835 UART: [art] Derive Key Pair
20,635,834 UART: [art] Store priv key in slot 0x5
23,062,680 UART: [art] Derive Key Pair - Done
23,075,521 UART: [art] Signing Cert with AUTHO
23,076,832 UART: RITY.KEYID = 7
24,782,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,301 UART: [art] PUB.X = 8B14974A35FAA4D9B2429D9DE518533EA3D9832077992F1CF62ED03014F9413876E21635869B2D20F73D58AE77099FB4
24,791,577 UART: [art] PUB.Y = A2A70C2AA976935A6C665C05F00333B21A555D23B324E92C0E0DCA2C829D50D08D1E5E6C0D1D7DA331797CEEAD140B16
24,798,845 UART: [art] SIG.R = EBD6B493E8ACBBB60283060527B3FD64F3EF54071A076CC66A91D361121F375476C40E0858AD3664E50B53441550ED58
24,806,218 UART: [art] SIG.S = 1DE244E78C4D8414BF4D5923DAD4157D4C870764A39FC0637711E14971E3C4DDA36286F8BFAFFA6B92F4F3D5DEDD85BD
25,785,500 UART: Caliptra RT
25,786,212 UART: [state] CFI Enabled
25,903,006 UART: [rt] RT listening for mailbox commands...
25,905,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,022 UART: [rt]cmd =0x41544d4e, len=14344
30,056,744 >>> mbox cmd response data (8 bytes)
30,057,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,088,199 UART: [rt]cmd =0x41545348, len=116
30,090,386 >>> mbox cmd response data (12 bytes)
32,144,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,289,416 UART:
32,289,791 UART: Running Caliptra ROM ...
32,290,923 UART:
32,291,093 UART: [state] CFI Enabled
32,305,203 UART: [state] LifecycleState = Unprovisioned
32,307,049 UART: [state] DebugLocked = No
32,308,329 UART: [state] WD Timer not started. Device not locked for debugging
32,312,296 UART: [kat] SHA2-256
32,491,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,503,009 UART: [kat] ++
32,503,473 UART: [kat] sha1
32,514,791 UART: [kat] SHA2-256
32,517,813 UART: [kat] SHA2-384
32,525,117 UART: [kat] SHA2-512-ACC
32,528,063 UART: [kat] ECC-384
34,970,392 UART: [kat] HMAC-384Kdf
34,983,273 UART: [kat] LMS
35,512,788 UART: [kat] --
35,516,558 UART: [update-reset] ++
38,939,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,942,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,324,533 >>> mbox cmd response: success
39,324,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,326,478 UART: [update-reset] Copying MAN_2 To MAN_1
39,348,821 UART: [update-reset Success] --
39,351,120 UART: [state] Locking Datavault
39,352,699 UART: [state] Locking PCR0, PCR1 and PCR31
39,354,346 UART: [state] Locking ICCM
39,355,362 UART: [exit] Launching FMC @ 0x40000130
39,363,788 UART:
39,364,068 UART: Running Caliptra FMC ...
39,365,184 UART:
39,365,345 UART: [state] CFI Enabled
39,409,629 UART: [art] Extend RT PCRs Done
39,410,778 UART: [art] Lock RT PCRs Done
39,412,444 UART: [art] Populate DV Done
39,418,011 UART: [fht] FMC Alias Private Key: 7
39,419,655 UART: [art] Derive CDI
39,420,467 UART: [art] Store in in slot 0x4
39,462,789 UART: [art] Derive Key Pair
39,463,890 UART: [art] Store priv key in slot 0x5
41,890,730 UART: [art] Derive Key Pair - Done
41,903,964 UART: [art] Signing Cert with AUTHO
41,905,272 UART: RITY.KEYID = 7
43,610,508 UART: [art] Erasing AUTHORITY.KEYID = 7
43,612,022 UART: [art] PUB.X = EA2B393775B7BE043D908F2921AEC3A94AE4DA0B626C770B5A5126D404AB2D3276DE8C568BE5C8DD3EC61795EE051108
43,619,292 UART: [art] PUB.Y = DD9A0FBCA173E0308F61B0B42B8E0B819AC9EAD3BFC2E0D47D2D791E08C2539551E3CF643F2B1BCAE680DC4C69E8BCD0
43,626,556 UART: [art] SIG.R = 8110964C0F0FEF9BD4A65802D6F038408E8E0092690FFA6264DA95F23C3CA07A4E0A5ABD117E3AA6A8D634A41DC5EF15
43,633,925 UART: [art] SIG.S = 2E43C29723A77D28E93355A98CBC14405A189F31CB5B9223AD54EF9545DE0FA982F0C4FCE53A1DAF2D345D9A42D7FB88
44,612,480 UART: Caliptra RT
44,613,197 UART: [state] CFI Enabled
44,898,447 UART: [rt] RT listening for mailbox commands...
44,930,568 UART: [rt]cmd =0x41545348, len=116
44,933,190 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,882 writing to cptra_bootfsm_go
3,695,449 ready_for_fw is high
3,696,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,263,283 >>> mbox cmd response: success
18,513,399 UART:
18,513,806 UART: Running Caliptra FMC ...
18,514,943 UART:
18,515,107 UART: [state] CFI Enabled
18,522,900 UART: [fht] FMC Alias Private Key: 7
20,280,285 UART: [art] Extend RT PCRs Done
20,281,498 UART: [art] Lock RT PCRs Done
20,282,775 UART: [art] Populate DV Done
20,288,076 UART: [fht] FMC Alias Private Key: 7
20,289,543 UART: [art] Derive CDI
20,290,305 UART: [art] Store in in slot 0x4
20,333,070 UART: [art] Derive Key Pair
20,334,116 UART: [art] Store priv key in slot 0x5
22,760,253 UART: [art] Derive Key Pair - Done
22,773,262 UART: [art] Signing Cert with AUTHO
22,774,563 UART: RITY.KEYID = 7
24,479,661 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,169 UART: [art] PUB.X = B5F420B714AFA1F4884D35B4FFDBAB3CBB0E65BB003E6D0AD2F8AC9D2BBD9482CA4A588926C4CE6528B46CC7F4061ED0
24,488,469 UART: [art] PUB.Y = 77CE78EDE95B51CBE3F2B4D10B9295613606983D755F595B47BC6639BD9679D3F78F36903B9BA1E7E40724AFDFDC17B4
24,495,713 UART: [art] SIG.R = BB07FBC40EB8F93B1F1388C397BCC781A6EE445764398B2F7E4003D1C1387DC2B75771BC38F5F5C1AE92F5912A1E0DD1
24,503,089 UART: [art] SIG.S = 21F89461DB8C0DEB13204657C83F90FC64953EF822D89350CF0A007EF72FFD637C648E1B928DCFADE9CFA9B4C702A70A
25,481,914 UART: Caliptra RT
25,482,623 UART: [state] CFI Enabled
25,599,587 UART: [rt] RT listening for mailbox commands...
25,601,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,757,451 UART: [rt]cmd =0x41544d4e, len=14344
29,753,140 >>> mbox cmd response data (8 bytes)
29,753,741 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,784,425 UART: [rt]cmd =0x41545348, len=116
29,786,550 >>> mbox cmd response data (12 bytes)
31,841,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,874,825 >>> mbox cmd response: success
38,875,423 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,909,595 UART:
38,909,921 UART: Running Caliptra FMC ...
38,911,050 UART:
38,911,217 UART: [state] CFI Enabled
38,955,193 UART: [art] Extend RT PCRs Done
38,956,353 UART: [art] Lock RT PCRs Done
38,957,965 UART: [art] Populate DV Done
38,963,479 UART: [fht] FMC Alias Private Key: 7
38,965,122 UART: [art] Derive CDI
38,966,162 UART: [art] Store in in slot 0x4
39,008,449 UART: [art] Derive Key Pair
39,009,461 UART: [art] Store priv key in slot 0x5
41,436,594 UART: [art] Derive Key Pair - Done
41,449,533 UART: [art] Signing Cert with AUTHO
41,450,867 UART: RITY.KEYID = 7
43,156,111 UART: [art] Erasing AUTHORITY.KEYID = 7
43,157,614 UART: [art] PUB.X = B36050579A1F2CF51D29E9E280B04F4F5E0671056B652BF007B04098F1E6FE17BF54F70124FFB858838F06974E763374
43,164,836 UART: [art] PUB.Y = 97DD022FBC70A625E354A1A065B6710E43CD45F792801EF802DB748FD3F8CF58927C62852B7A32B796A6C36769759765
43,172,101 UART: [art] SIG.R = 57A374ABC74BCA637D6873F778F6DE11E383CDCBA0AF393A3ECE268FBD7A0B75EBEBD184ABD045233FB42B3122C8D71D
43,179,521 UART: [art] SIG.S = 1803AF8B951E18A7611E9F15FD690CB9A802102A239278755545CC4241B7E9740CEF359AED26508AF033A45BD4D6CC4A
44,158,841 UART: Caliptra RT
44,159,549 UART: [state] CFI Enabled
44,449,549 UART: [rt] RT listening for mailbox commands...
44,481,343 UART: [rt]cmd =0x41545348, len=116
44,483,532 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,424 UART:
192,832 UART: Running Caliptra ROM ...
193,958 UART:
194,102 UART: [state] CFI Enabled
264,479 UART: [state] LifecycleState = Unprovisioned
267,023 UART: [state] DebugLocked = No
269,146 UART: [state] WD Timer not started. Device not locked for debugging
273,484 UART: [kat] SHA2-256
463,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,151 UART: [kat] ++
474,597 UART: [kat] sha1
485,826 UART: [kat] SHA2-256
488,838 UART: [kat] SHA2-384
495,752 UART: [kat] SHA2-512-ACC
498,337 UART: [kat] ECC-384
2,949,185 UART: [kat] HMAC-384Kdf
2,973,585 UART: [kat] LMS
3,505,388 UART: [kat] --
3,511,034 UART: [cold-reset] ++
3,511,977 UART: [fht] FHT @ 0x50003400
3,524,088 UART: [idev] ++
3,524,807 UART: [idev] CDI.KEYID = 6
3,525,728 UART: [idev] SUBJECT.KEYID = 7
3,526,974 UART: [idev] UDS.KEYID = 0
3,527,895 ready_for_fw is high
3,528,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,598 UART: [idev] Erasing UDS.KEYID = 0
6,030,686 UART: [idev] Sha1 KeyId Algorithm
6,053,068 UART: [idev] --
6,057,720 UART: [ldev] ++
6,058,403 UART: [ldev] CDI.KEYID = 6
6,059,315 UART: [ldev] SUBJECT.KEYID = 5
6,060,523 UART: [ldev] AUTHORITY.KEYID = 7
6,061,721 UART: [ldev] FE.KEYID = 1
6,101,058 UART: [ldev] Erasing FE.KEYID = 1
8,606,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,546 UART: [ldev] --
10,415,609 UART: [fwproc] Wait for Commands...
10,417,695 UART: [fwproc] Recv command 0x46574c44
10,420,001 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,113 >>> mbox cmd response: success
14,599,934 UART: [afmc] ++
14,600,671 UART: [afmc] CDI.KEYID = 6
14,601,863 UART: [afmc] SUBJECT.KEYID = 7
14,603,306 UART: [afmc] AUTHORITY.KEYID = 5
17,129,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,006 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,201 UART: [afmc] --
18,927,408 UART: [cold-reset] --
18,931,344 UART: [state] Locking Datavault
18,936,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,228 UART: [state] Locking ICCM
18,939,746 UART: [exit] Launching FMC @ 0x40000130
18,948,376 UART:
18,948,626 UART: Running Caliptra FMC ...
18,949,728 UART:
18,949,885 UART: [state] CFI Enabled
19,010,797 UART: [fht] FMC Alias Private Key: 7
20,775,405 UART: [art] Extend RT PCRs Done
20,776,622 UART: [art] Lock RT PCRs Done
20,778,610 UART: [art] Populate DV Done
20,783,805 UART: [fht] FMC Alias Private Key: 7
20,785,561 UART: [art] Derive CDI
20,786,295 UART: [art] Store in in slot 0x4
20,843,601 UART: [art] Derive Key Pair
20,844,645 UART: [art] Store priv key in slot 0x5
23,307,783 UART: [art] Derive Key Pair - Done
23,320,684 UART: [art] Signing Cert with AUTHO
23,321,994 UART: RITY.KEYID = 7
25,033,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,733 UART: [art] PUB.X = AA8D842D10BF9C7D3A73877A167CEF07121CC877625EB5802B516AE99A2494A0CA3041AC9C436F49BE079EAFD2F3FCD1
25,041,999 UART: [art] PUB.Y = D1634218F3AE3305B66AFAD57FCA499202C71AC400B27816B3A99EFC56246E5C887C54BF87F3B53AF99CC29FF81CC327
25,049,300 UART: [art] SIG.R = 70F4B0B10002A383BE5C00C9173F651A1BEF15E8D2758F3B94A0E7245776A6F54ED2B1B02028F9316DD0AFE69F6658D7
25,056,623 UART: [art] SIG.S = 54C027579BFC468C0506A9AA0E1EE65A8073E870875646AA9342657D61A3F757289D2E2162FC22E57A0742AFD65124D1
26,035,396 UART: Caliptra RT
26,036,118 UART: [state] CFI Enabled
26,214,556 UART: [rt] RT listening for mailbox commands...
26,216,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,372,286 UART: [rt]cmd =0x41544d4e, len=14344
30,368,249 >>> mbox cmd response data (8 bytes)
30,368,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,399,639 UART: [rt]cmd =0x41545348, len=116
30,401,789 >>> mbox cmd response data (12 bytes)
32,456,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,601,258 UART:
32,601,653 UART: Running Caliptra ROM ...
32,602,786 UART:
32,602,957 UART: [state] CFI Enabled
32,655,839 UART: [state] LifecycleState = Unprovisioned
32,657,906 UART: [state] DebugLocked = No
32,660,368 UART: [state] WD Timer not started. Device not locked for debugging
32,664,391 UART: [kat] SHA2-256
32,854,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,865,037 UART: [kat] ++
32,865,524 UART: [kat] sha1
32,876,632 UART: [kat] SHA2-256
32,879,663 UART: [kat] SHA2-384
32,886,649 UART: [kat] SHA2-512-ACC
32,889,235 UART: [kat] ECC-384
35,341,099 UART: [kat] HMAC-384Kdf
35,364,515 UART: [kat] LMS
35,896,113 UART: [kat] --
35,899,747 UART: [update-reset] ++
39,354,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,357,234 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,963,299 >>> mbox cmd response: success
39,968,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,968,959 UART: [update-reset] Copying MAN_2 To MAN_1
40,001,599 UART: [update-reset Success] --
40,005,110 UART: [state] Locking Datavault
40,009,205 UART: [state] Locking PCR0, PCR1 and PCR31
40,011,380 UART: [state] Locking ICCM
40,013,681 UART: [exit] Launching FMC @ 0x40000130
40,022,327 UART:
40,022,559 UART: Running Caliptra FMC ...
40,023,658 UART:
40,023,811 UART: [state] CFI Enabled
40,125,392 UART: [art] Extend RT PCRs Done
40,126,605 UART: [art] Lock RT PCRs Done
40,128,040 UART: [art] Populate DV Done
40,133,831 UART: [fht] FMC Alias Private Key: 7
40,135,577 UART: [art] Derive CDI
40,136,392 UART: [art] Store in in slot 0x4
40,193,928 UART: [art] Derive Key Pair
40,195,062 UART: [art] Store priv key in slot 0x5
42,657,652 UART: [art] Derive Key Pair - Done
42,670,727 UART: [art] Signing Cert with AUTHO
42,672,061 UART: RITY.KEYID = 7
44,383,441 UART: [art] Erasing AUTHORITY.KEYID = 7
44,385,213 UART: [art] PUB.X = ACAE5EE5CD10406686B22D0656473871CDB9DF20FE4E75F83F594C08C833065B7D81B04B3904A6B8EB214639BC042B61
44,392,220 UART: [art] PUB.Y = 27F5B3BBC0125C21C60C47859D284EBB7667AFE9ED6C7BD79D951765AF6411D2DCC6F7B64B4CFA51875A1B4AEA34A14E
44,399,483 UART: [art] SIG.R = 50FCF93E702E92A6B7666968A8704261A9736BBA93349D43C55A1C6CD949D803912C76CF75BDAF0AC7C39692AC79AC6C
44,406,912 UART: [art] SIG.S = 2169A4F17A73E7467A28F5A32F61ED54A3372A215832C696F6D397478176133534F7D1036AC60DFDE8B8308E2617D6D4
45,385,786 UART: Caliptra RT
45,386,476 UART: [state] CFI Enabled
45,725,143 UART: [rt] RT listening for mailbox commands...
45,757,006 UART: [rt]cmd =0x41545348, len=116
45,759,097 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,437,806 ready_for_fw is high
3,438,186 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,743,806 >>> mbox cmd response: success
19,025,059 UART:
19,025,463 UART: Running Caliptra FMC ...
19,026,648 UART:
19,026,815 UART: [state] CFI Enabled
19,090,883 UART: [fht] FMC Alias Private Key: 7
20,855,270 UART: [art] Extend RT PCRs Done
20,856,495 UART: [art] Lock RT PCRs Done
20,858,415 UART: [art] Populate DV Done
20,863,781 UART: [fht] FMC Alias Private Key: 7
20,865,431 UART: [art] Derive CDI
20,866,246 UART: [art] Store in in slot 0x4
20,923,712 UART: [art] Derive Key Pair
20,924,713 UART: [art] Store priv key in slot 0x5
23,387,765 UART: [art] Derive Key Pair - Done
23,400,826 UART: [art] Signing Cert with AUTHO
23,402,132 UART: RITY.KEYID = 7
25,114,145 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,658 UART: [art] PUB.X = 4CDBE0040B1D29D194A7B1853FDDF9F3493022B4DAFDC6AB41072AB1B860B79C44E78F5B0065C61C65CC7DA487E66038
25,122,952 UART: [art] PUB.Y = 733010752F74584B08A962811BE8A25A029AB8A729B15D5AA0A80689D1116A8704210D39F680BAC69B054E1F6898EBB5
25,130,140 UART: [art] SIG.R = B7AC230C7F4B2FBCBA64A0BAD334155DAD455EEB15C03E122650632C159C0A012B7EE9633B5E1265D9947712ACB72D4B
25,137,582 UART: [art] SIG.S = 6935FC9EB627340C92A3F0C862952C1380819C11CB22740623AD166A42552F69BC1FEB4CD0944FB383975EB4A933AC68
26,117,085 UART: Caliptra RT
26,117,798 UART: [state] CFI Enabled
26,282,300 UART: [rt] RT listening for mailbox commands...
26,284,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,440,297 UART: [rt]cmd =0x41544d4e, len=14344
30,436,385 >>> mbox cmd response data (8 bytes)
30,437,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,467,884 UART: [rt]cmd =0x41545348, len=116
30,470,069 >>> mbox cmd response data (12 bytes)
32,523,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,319,621 >>> mbox cmd response: success
40,320,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,356,351 UART:
40,356,663 UART: Running Caliptra FMC ...
40,357,785 UART:
40,357,938 UART: [state] CFI Enabled
40,454,839 UART: [art] Extend RT PCRs Done
40,456,046 UART: [art] Lock RT PCRs Done
40,457,403 UART: [art] Populate DV Done
40,462,810 UART: [fht] FMC Alias Private Key: 7
40,464,398 UART: [art] Derive CDI
40,465,207 UART: [art] Store in in slot 0x4
40,524,159 UART: [art] Derive Key Pair
40,525,160 UART: [art] Store priv key in slot 0x5
42,987,877 UART: [art] Derive Key Pair - Done
43,000,717 UART: [art] Signing Cert with AUTHO
43,002,028 UART: RITY.KEYID = 7
44,714,049 UART: [art] Erasing AUTHORITY.KEYID = 7
44,715,577 UART: [art] PUB.X = 21B63E4F897D4C053EB01D323BCB86633A7AE6BE7635C0C93D04DD422D5FDA700C9CCAFC6E6A9CFF9B91B3740A55582C
44,722,815 UART: [art] PUB.Y = 2DF44AE917A273CF654D7BEE0B6C699CE66C2ED0437FB5C98060BA58F6FCBC61D99E83853CD96773219CB9B7146BA972
44,730,080 UART: [art] SIG.R = E12294CABD0D56E5C1AEF558C450436BFCAAA5B4920F5EA77CD2FEBC7D51A0DC455CEF295CCB5D30F5CCB6997A6C4C6B
44,737,535 UART: [art] SIG.S = 4BAE8EB247BDBEC3350D04D0A892A810AE04B313EBA81347B358D394CE222A6BD883DF2173D612FBBE85DEA58DA91E00
45,716,366 UART: Caliptra RT
45,717,079 UART: [state] CFI Enabled
46,051,660 UART: [rt] RT listening for mailbox commands...
46,083,690 UART: [rt]cmd =0x41545348, len=116
46,086,029 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,738 writing to cptra_bootfsm_go
193,027 UART:
193,392 UART: Running Caliptra ROM ...
194,532 UART:
604,394 UART: [state] CFI Enabled
618,071 UART: [state] LifecycleState = Unprovisioned
620,452 UART: [state] DebugLocked = No
623,188 UART: [state] WD Timer not started. Device not locked for debugging
628,286 UART: [kat] SHA2-256
818,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,979 UART: [kat] ++
829,583 UART: [kat] sha1
841,527 UART: [kat] SHA2-256
844,528 UART: [kat] SHA2-384
851,580 UART: [kat] SHA2-512-ACC
854,172 UART: [kat] ECC-384
3,296,727 UART: [kat] HMAC-384Kdf
3,310,485 UART: [kat] LMS
3,842,291 UART: [kat] --
3,846,877 UART: [cold-reset] ++
3,849,099 UART: [fht] FHT @ 0x50003400
3,861,025 UART: [idev] ++
3,861,776 UART: [idev] CDI.KEYID = 6
3,862,695 UART: [idev] SUBJECT.KEYID = 7
3,863,875 UART: [idev] UDS.KEYID = 0
3,864,804 ready_for_fw is high
3,865,037 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,317 UART: [idev] Erasing UDS.KEYID = 0
6,340,041 UART: [idev] Sha1 KeyId Algorithm
6,363,716 UART: [idev] --
6,367,934 UART: [ldev] ++
6,368,669 UART: [ldev] CDI.KEYID = 6
6,369,603 UART: [ldev] SUBJECT.KEYID = 5
6,370,779 UART: [ldev] AUTHORITY.KEYID = 7
6,371,962 UART: [ldev] FE.KEYID = 1
6,382,983 UART: [ldev] Erasing FE.KEYID = 1
8,860,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,273 UART: [ldev] --
10,654,156 UART: [fwproc] Wait for Commands...
10,657,217 UART: [fwproc] Recv command 0x46574c44
10,659,568 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,825,057 >>> mbox cmd response: success
14,829,076 UART: [afmc] ++
14,829,793 UART: [afmc] CDI.KEYID = 6
14,830,986 UART: [afmc] SUBJECT.KEYID = 7
14,832,432 UART: [afmc] AUTHORITY.KEYID = 5
17,332,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,309 UART: [afmc] --
19,128,587 UART: [cold-reset] --
19,131,266 UART: [state] Locking Datavault
19,138,037 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,229 UART: [state] Locking ICCM
19,143,124 UART: [exit] Launching FMC @ 0x40000130
19,151,772 UART:
19,152,009 UART: Running Caliptra FMC ...
19,153,117 UART:
19,153,276 UART: [state] CFI Enabled
19,161,269 UART: [fht] FMC Alias Private Key: 7
20,917,912 UART: [art] Extend RT PCRs Done
20,919,162 UART: [art] Lock RT PCRs Done
20,920,658 UART: [art] Populate DV Done
20,926,024 UART: [fht] FMC Alias Private Key: 7
20,927,731 UART: [art] Derive CDI
20,928,493 UART: [art] Store in in slot 0x4
20,971,364 UART: [art] Derive Key Pair
20,972,366 UART: [art] Store priv key in slot 0x5
23,399,168 UART: [art] Derive Key Pair - Done
23,412,374 UART: [art] Signing Cert with AUTHO
23,413,679 UART: RITY.KEYID = 7
25,119,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,881 UART: [art] PUB.X = 130687186CDDF099C1B2660A1E97FE8A954D7C7C7F68A9E0686E1462BD70C5138EB02CE9034BEA1A690F1447C077C704
25,128,158 UART: [art] PUB.Y = 24F7F47B321AB74284D80E1247EDD55ABC98BF1792802C0AA8E8F730F7307D9BEAA7FAE26FEAB39912001140F4642C64
25,135,424 UART: [art] SIG.R = 555217FDDA34E96712A477B9C2BF745F1F6C30F548851CA681D8E82A9D3DC3154CEDD541A93F7C513975406DC22BB3DF
25,142,821 UART: [art] SIG.S = BB841072E6ADEBBF07A5FF19A2890D364C4010B3B09441FBE0930C3A199BD4D464D5542D98F51FD39ECE2DFB314FF1EB
26,122,119 UART: Caliptra RT
26,122,820 UART: [state] CFI Enabled
26,240,258 UART: [rt] RT listening for mailbox commands...
26,242,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,398,278 UART: [rt]cmd =0x41544d4e, len=14344
30,393,970 >>> mbox cmd response data (8 bytes)
30,394,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,425,386 UART: [rt]cmd =0x41545348, len=116
30,427,461 >>> mbox cmd response data (12 bytes)
32,484,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
32,629,694 UART:
32,630,084 UART: Running Caliptra ROM ...
32,631,144 UART:
32,631,352 UART: [state] CFI Enabled
32,645,956 UART: [state] LifecycleState = Unprovisioned
32,647,859 UART: [state] DebugLocked = No
32,649,780 UART: [state] WD Timer not started. Device not locked for debugging
32,655,086 UART: [kat] SHA2-256
32,844,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,855,747 UART: [kat] ++
32,856,239 UART: [kat] sha1
32,868,155 UART: [kat] SHA2-256
32,871,200 UART: [kat] SHA2-384
32,876,289 UART: [kat] SHA2-512-ACC
32,878,868 UART: [kat] ECC-384
35,322,832 UART: [kat] HMAC-384Kdf
35,335,878 UART: [kat] LMS
35,867,483 UART: [kat] --
35,870,668 UART: [update-reset] ++
39,328,193 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,330,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
39,936,961 >>> mbox cmd response: success
39,941,933 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,942,524 UART: [update-reset] Copying MAN_2 To MAN_1
39,976,124 UART: [update-reset Success] --
39,980,760 UART: [state] Locking Datavault
39,984,356 UART: [state] Locking PCR0, PCR1 and PCR31
39,986,510 UART: [state] Locking ICCM
39,989,315 UART: [exit] Launching FMC @ 0x40000130
39,997,998 UART:
39,998,239 UART: Running Caliptra FMC ...
39,999,342 UART:
39,999,504 UART: [state] CFI Enabled
40,043,198 UART: [art] Extend RT PCRs Done
40,044,392 UART: [art] Lock RT PCRs Done
40,045,852 UART: [art] Populate DV Done
40,051,369 UART: [fht] FMC Alias Private Key: 7
40,053,016 UART: [art] Derive CDI
40,053,840 UART: [art] Store in in slot 0x4
40,096,217 UART: [art] Derive Key Pair
40,097,310 UART: [art] Store priv key in slot 0x5
42,523,274 UART: [art] Derive Key Pair - Done
42,536,117 UART: [art] Signing Cert with AUTHO
42,537,419 UART: RITY.KEYID = 7
44,243,348 UART: [art] Erasing AUTHORITY.KEYID = 7
44,244,856 UART: [art] PUB.X = FEC8715B32812D37BEE9CBE4B32BE16145782173DF6F977452C7E1317D7DEB857E026F31F9DEF824DDA2ADA8721626B5
44,252,131 UART: [art] PUB.Y = 47493C7B93D9F31D0EEDCE1080BA037C661993402D03F66B31E07795D035874D36119AE250E8C54945000B1681C8F329
44,259,313 UART: [art] SIG.R = B631E4EBAC0DDA1FED6E52D9F0CBF0D952EF727723AC503FA8D2746916CFA07659FA755B6DA0DC2ECACB7C05538EE0D1
44,266,734 UART: [art] SIG.S = 5115CC018340A339DD8ED99974896CFCD7E51738BE3FE77D5729E7C7BA9C6FC8988A13EA477A2DC93BA9963EFD79BD36
45,245,639 UART: Caliptra RT
45,246,347 UART: [state] CFI Enabled
45,533,384 UART: [rt] RT listening for mailbox commands...
45,565,335 UART: [rt]cmd =0x41545348, len=116
45,567,824 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,778 writing to cptra_bootfsm_go
3,756,148 ready_for_fw is high
3,756,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,225 >>> mbox cmd response: success
19,201,514 UART:
19,201,924 UART: Running Caliptra FMC ...
19,203,074 UART:
19,203,242 UART: [state] CFI Enabled
19,211,285 UART: [fht] FMC Alias Private Key: 7
20,968,711 UART: [art] Extend RT PCRs Done
20,969,928 UART: [art] Lock RT PCRs Done
20,971,743 UART: [art] Populate DV Done
20,977,058 UART: [fht] FMC Alias Private Key: 7
20,978,718 UART: [art] Derive CDI
20,979,480 UART: [art] Store in in slot 0x4
21,021,971 UART: [art] Derive Key Pair
21,022,977 UART: [art] Store priv key in slot 0x5
23,450,458 UART: [art] Derive Key Pair - Done
23,463,089 UART: [art] Signing Cert with AUTHO
23,464,403 UART: RITY.KEYID = 7
25,170,058 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,543 UART: [art] PUB.X = 1DF143A79B4BB0172487C533CB653DEAC27D11A888A734182FC09ACEC9D4B86ABB65A77796BAAA8405DE432E6B4A03DA
25,178,832 UART: [art] PUB.Y = 5168354A0E936944E02EE23B49EB582270D4103FB738E7F59FACD676968DAEA0104E3F255FA31B1C21A0F44064480C29
25,186,093 UART: [art] SIG.R = 2211F98AB5EE982E564D93EA08DFBBE643620F793981B3072B9DD4CA94C8E4A62AFE52C07E59B3396604A8153BCFB4F2
25,193,517 UART: [art] SIG.S = 90FAD4F0E3A2F40511D5AAC74B15EC124CCBC36DC1825620EB7DA144B3E23268EDE03CB5B4F499B56C52AB4170C59371
26,172,894 UART: Caliptra RT
26,173,609 UART: [state] CFI Enabled
26,291,269 UART: [rt] RT listening for mailbox commands...
26,293,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,449,070 UART: [rt]cmd =0x41544d4e, len=14344
30,443,802 >>> mbox cmd response data (8 bytes)
30,444,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,474,937 UART: [rt]cmd =0x41545348, len=116
30,476,954 >>> mbox cmd response data (12 bytes)
32,530,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
40,256,998 >>> mbox cmd response: success
40,257,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,292,420 UART:
40,292,717 UART: Running Caliptra FMC ...
40,293,849 UART:
40,294,031 UART: [state] CFI Enabled
40,338,424 UART: [art] Extend RT PCRs Done
40,339,626 UART: [art] Lock RT PCRs Done
40,341,148 UART: [art] Populate DV Done
40,346,727 UART: [fht] FMC Alias Private Key: 7
40,348,373 UART: [art] Derive CDI
40,349,192 UART: [art] Store in in slot 0x4
40,391,942 UART: [art] Derive Key Pair
40,392,969 UART: [art] Store priv key in slot 0x5
42,819,103 UART: [art] Derive Key Pair - Done
42,832,044 UART: [art] Signing Cert with AUTHO
42,833,351 UART: RITY.KEYID = 7
44,539,140 UART: [art] Erasing AUTHORITY.KEYID = 7
44,540,652 UART: [art] PUB.X = FAB137771747CEDF395B13E2860E66293A16D523F42EF51CE0CF87F3832924B10CB2A47F902A77B502CBDFA060CC70B9
44,547,925 UART: [art] PUB.Y = C6EC48905AF05F2D65C56F5AADAB43111D788E7C48E3EE6B9E157A8A7E3C5D12BB85AA356C6BC0AB288BA33D63E9F50C
44,555,233 UART: [art] SIG.R = C573813E3C0A6349939F8A217878793E1C4DEEFDE94B3F0370319AF475CDF1887AE431C7E1191D093BAF8EF033FE5052
44,562,593 UART: [art] SIG.S = E313AB3F809C0C2DB55FB7E1E4DDE03A58ADD6F4E18E87BD720CF728208ECDABAF2D46071ECB8F94E867418E05F5754D
45,541,452 UART: Caliptra RT
45,542,141 UART: [state] CFI Enabled
45,831,637 UART: [rt] RT listening for mailbox commands...
45,863,659 UART: [rt]cmd =0x41545348, len=116
45,865,585 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
902,860 UART: [kat] HMAC-384Kdf
907,488 UART: [kat] LMS
1,475,684 UART: [kat] --
1,476,535 UART: [cold-reset] ++
1,476,867 UART: [fht] Storing FHT @ 0x50003400
1,479,738 UART: [idev] ++
1,479,906 UART: [idev] CDI.KEYID = 6
1,480,266 UART: [idev] SUBJECT.KEYID = 7
1,480,690 UART: [idev] UDS.KEYID = 0
1,481,035 ready_for_fw is high
1,481,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,156 UART: [idev] --
1,515,321 UART: [ldev] ++
1,515,489 UART: [ldev] CDI.KEYID = 6
1,515,852 UART: [ldev] SUBJECT.KEYID = 5
1,516,278 UART: [ldev] AUTHORITY.KEYID = 7
1,516,741 UART: [ldev] FE.KEYID = 1
1,521,961 UART: [ldev] Erasing FE.KEYID = 1
1,547,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,778 UART: [ldev] --
1,587,039 UART: [fwproc] Waiting for Commands...
1,587,902 UART: [fwproc] Received command 0x46574c44
1,588,693 UART: [fwproc] Received Image of size 114084 bytes
2,883,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,250 >>> mbox cmd response: success
3,077,272 UART: [afmc] ++
3,077,440 UART: [afmc] CDI.KEYID = 6
3,077,802 UART: [afmc] SUBJECT.KEYID = 7
3,078,227 UART: [afmc] AUTHORITY.KEYID = 5
3,113,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,183 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,873 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,646 UART: [afmc] --
3,155,658 UART: [cold-reset] --
3,156,576 UART: [state] Locking Datavault
3,158,017 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,621 UART: [state] Locking ICCM
3,159,213 UART: [exit] Launching FMC @ 0x40000130
3,164,542 UART:
3,164,558 UART: Running Caliptra FMC ...
3,164,966 UART:
3,165,020 UART: [state] CFI Enabled
3,175,291 UART: [fht] FMC Alias Private Key: 7
3,282,762 UART: [art] Extend RT PCRs Done
3,283,190 UART: [art] Lock RT PCRs Done
3,284,790 UART: [art] Populate DV Done
3,293,115 UART: [fht] FMC Alias Private Key: 7
3,294,249 UART: [art] Derive CDI
3,294,529 UART: [art] Store in in slot 0x4
3,380,142 UART: [art] Derive Key Pair
3,380,502 UART: [art] Store priv key in slot 0x5
3,393,868 UART: [art] Derive Key Pair - Done
3,408,836 UART: [art] Signing Cert with AUTHO
3,409,316 UART: RITY.KEYID = 7
3,424,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,223 UART: [art] PUB.X = F8B14C403B88BAF3C0FEAE2DA93A761AB28BEE0C0A8E3A4741949B060271C3E47D041C4FB39FEE794DCB9DDDB315169B
3,432,000 UART: [art] PUB.Y = 3B1304751ABA5D3A7AF16F5508B72D89DA4A1F650A032DCBFC54BCEAD94B235C929F24EF848EBFC5F666F7C7D37D710A
3,438,955 UART: [art] SIG.R = 3791C044E4FE5392F4C8C7ABB184FBB627AF18BAE08B0BB0AF54509FD4E4D1AD1CA6D7EA8B7FABFFF544C6FD4921CD40
3,445,752 UART: [art] SIG.S = B453C9095B20EC77F5533555443BC4D975CD63A0D6FB60C99C30665ED04C89C474E911E20728F5B6D0CF59CB56A6226B
3,469,623 UART: Caliptra RT
3,469,876 UART: [state] CFI Enabled
3,577,791 UART: [rt] RT listening for mailbox commands...
3,578,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,719 UART: [rt]cmd =0x41544d4e, len=14344
4,012,291 >>> mbox cmd response data (8 bytes)
4,012,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,277 UART: [rt]cmd =0x41545348, len=116
4,044,062 >>> mbox cmd response data (12 bytes)
4,044,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,793 UART:
4,044,809 UART: Running Caliptra ROM ...
4,045,217 UART:
4,045,271 UART: [state] CFI Enabled
4,047,573 UART: [state] LifecycleState = Unprovisioned
4,048,228 UART: [state] DebugLocked = No
4,048,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,050,551 UART: [kat] SHA2-256
4,844,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,848,597 UART: [kat] ++
4,848,749 UART: [kat] sha1
4,853,033 UART: [kat] SHA2-256
4,854,971 UART: [kat] SHA2-384
4,857,508 UART: [kat] SHA2-512-ACC
4,859,408 UART: [kat] ECC-384
4,864,999 UART: [kat] HMAC-384Kdf
4,869,471 UART: [kat] LMS
5,437,667 UART: [kat] --
5,438,708 UART: [update-reset] ++
6,770,222 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,771,490 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,920,994 >>> mbox cmd response: success
6,920,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,921,255 UART: [update-reset] Copying MAN_2 To MAN_1
6,929,269 UART: [update-reset Success] --
6,930,374 UART: [state] Locking Datavault
6,931,026 UART: [state] Locking PCR0, PCR1 and PCR31
6,931,630 UART: [state] Locking ICCM
6,932,154 UART: [exit] Launching FMC @ 0x40000130
6,937,483 UART:
6,937,499 UART: Running Caliptra FMC ...
6,937,907 UART:
6,937,961 UART: [state] CFI Enabled
7,026,982 UART: [art] Extend RT PCRs Done
7,027,410 UART: [art] Lock RT PCRs Done
7,028,441 UART: [art] Populate DV Done
7,036,654 UART: [fht] FMC Alias Private Key: 7
7,037,684 UART: [art] Derive CDI
7,037,964 UART: [art] Store in in slot 0x4
7,123,791 UART: [art] Derive Key Pair
7,124,151 UART: [art] Store priv key in slot 0x5
7,137,135 UART: [art] Derive Key Pair - Done
7,152,050 UART: [art] Signing Cert with AUTHO
7,152,530 UART: RITY.KEYID = 7
7,168,052 UART: [art] Erasing AUTHORITY.KEYID = 7
7,168,817 UART: [art] PUB.X = 7E5523DB802CF13E19AAB3355BF3C4DF2A3C05406FC17ED98814DCE134E545A1C7FBBD4AB8865A9D6F2EC26DD5E5FF99
7,175,606 UART: [art] PUB.Y = EF344A155F7A1327D46FFFEF474953116CAB53A40577B995801E9DF247EC668C74156B04928EB14BE42222ADA48F9DBB
7,182,556 UART: [art] SIG.R = D08C1ECFC4C1E7D7583266D96D934CD3144CF243AAB68AF7A6AF0312484D60A40F81C2EB5DB3E6E431393D83A19D060A
7,189,326 UART: [art] SIG.S = 5BB81C480EAD4BDE0DBE32FCA969F50303823C78CF9EE8581BA57E49DCAE2D4ABD00E5A5D3670558BF3DD88214E23358
7,213,542 UART: Caliptra RT
7,213,795 UART: [state] CFI Enabled
7,498,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,529,673 UART: [rt]cmd =0x41545348, len=116
7,531,488 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 ready_for_fw is high
1,362,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,102 >>> mbox cmd response: success
2,987,166 UART:
2,987,182 UART: Running Caliptra FMC ...
2,987,590 UART:
2,987,644 UART: [state] CFI Enabled
2,998,147 UART: [fht] FMC Alias Private Key: 7
3,105,728 UART: [art] Extend RT PCRs Done
3,106,156 UART: [art] Lock RT PCRs Done
3,107,584 UART: [art] Populate DV Done
3,115,853 UART: [fht] FMC Alias Private Key: 7
3,116,989 UART: [art] Derive CDI
3,117,269 UART: [art] Store in in slot 0x4
3,202,890 UART: [art] Derive Key Pair
3,203,250 UART: [art] Store priv key in slot 0x5
3,216,202 UART: [art] Derive Key Pair - Done
3,231,049 UART: [art] Signing Cert with AUTHO
3,231,529 UART: RITY.KEYID = 7
3,246,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,304 UART: [art] PUB.X = B6AF415435BA3C7368EF46A9D8D185C88F1985F51DFCFD503EBB1DB92258776E2DCB9E3C14F574AF80D61C1495D650CB
3,254,088 UART: [art] PUB.Y = 6A056AB3F6D52C92340A6104B97FFF0E77B9AF072C4E28BC3F7445438A4661BB0329E3F1CCFAA96BD2021614A34EE2A2
3,261,027 UART: [art] SIG.R = D2F8F6BF70D5D5930526B85E23984897550F83979E055E622E7C85A5B093000812BE4D03FA19F1F34651D28223130219
3,267,743 UART: [art] SIG.S = 215A2DA333F70B1F860DA0348FA1FD0A37F83276178D1CE21712AEAB0ED4467284D8AE308687B6AE845F5C625A7D53CE
3,291,946 UART: Caliptra RT
3,292,199 UART: [state] CFI Enabled
3,400,386 UART: [rt] RT listening for mailbox commands...
3,401,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,048 UART: [rt]cmd =0x41544d4e, len=14344
3,833,894 >>> mbox cmd response data (8 bytes)
3,833,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,934 UART: [rt]cmd =0x41545348, len=116
3,865,527 >>> mbox cmd response data (12 bytes)
3,865,528 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,623,847 >>> mbox cmd response: success
6,623,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,637,524 UART:
6,637,540 UART: Running Caliptra FMC ...
6,637,948 UART:
6,638,002 UART: [state] CFI Enabled
6,727,001 UART: [art] Extend RT PCRs Done
6,727,429 UART: [art] Lock RT PCRs Done
6,728,534 UART: [art] Populate DV Done
6,736,837 UART: [fht] FMC Alias Private Key: 7
6,737,859 UART: [art] Derive CDI
6,738,139 UART: [art] Store in in slot 0x4
6,823,818 UART: [art] Derive Key Pair
6,824,178 UART: [art] Store priv key in slot 0x5
6,837,388 UART: [art] Derive Key Pair - Done
6,852,274 UART: [art] Signing Cert with AUTHO
6,852,754 UART: RITY.KEYID = 7
6,868,168 UART: [art] Erasing AUTHORITY.KEYID = 7
6,868,933 UART: [art] PUB.X = 4824A3A8095D5B7C76E983691993AEEE79C3197843E147657D206644F57F8B933E1C247FC37D2D6C3495E350036ABD6A
6,875,691 UART: [art] PUB.Y = 689909B565D32D58F2A9846BA4266FCF3E2EB5389724CC00AE8B1244CE01AA546430CFD98B0CE3387E6AEE5C67A49181
6,882,616 UART: [art] SIG.R = 007F044392D0E476B707C7D37CC06ADBC9502AE934F63366F55A2C38D454DEA6D7EF75344F5C70C0083C4B2D6E4CE4B6
6,889,363 UART: [art] SIG.S = 7CDEED8FB983142A94F24704C64182D555F82D81FEAC487672E00E0BD570AA65B8F4B076D7AAD59FC0BA1A410D51DBF0
6,912,998 UART: Caliptra RT
6,913,251 UART: [state] CFI Enabled
7,197,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,227,871 UART: [rt]cmd =0x41545348, len=116
7,229,690 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,062 UART: [kat] SHA2-256
881,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,108 UART: [kat] ++
886,260 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,207 UART: [kat] SHA2-512-ACC
897,108 UART: [kat] ECC-384
902,543 UART: [kat] HMAC-384Kdf
907,391 UART: [kat] LMS
1,475,587 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 ready_for_fw is high
1,481,028 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,705 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,807 UART: [idev] --
1,514,946 UART: [ldev] ++
1,515,114 UART: [ldev] CDI.KEYID = 6
1,515,477 UART: [ldev] SUBJECT.KEYID = 5
1,515,903 UART: [ldev] AUTHORITY.KEYID = 7
1,516,366 UART: [ldev] FE.KEYID = 1
1,521,758 UART: [ldev] Erasing FE.KEYID = 1
1,547,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,321 UART: [ldev] --
1,586,700 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 114084 bytes
2,884,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,407 >>> mbox cmd response: success
3,077,453 UART: [afmc] ++
3,077,621 UART: [afmc] CDI.KEYID = 6
3,077,983 UART: [afmc] SUBJECT.KEYID = 7
3,078,408 UART: [afmc] AUTHORITY.KEYID = 5
3,113,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,741 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,626 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,316 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,075 UART: [afmc] --
3,156,989 UART: [cold-reset] --
3,157,575 UART: [state] Locking Datavault
3,158,722 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,326 UART: [state] Locking ICCM
3,159,954 UART: [exit] Launching FMC @ 0x40000130
3,165,283 UART:
3,165,299 UART: Running Caliptra FMC ...
3,165,707 UART:
3,165,850 UART: [state] CFI Enabled
3,176,269 UART: [fht] FMC Alias Private Key: 7
3,284,664 UART: [art] Extend RT PCRs Done
3,285,092 UART: [art] Lock RT PCRs Done
3,286,908 UART: [art] Populate DV Done
3,295,247 UART: [fht] FMC Alias Private Key: 7
3,296,373 UART: [art] Derive CDI
3,296,653 UART: [art] Store in in slot 0x4
3,382,514 UART: [art] Derive Key Pair
3,382,874 UART: [art] Store priv key in slot 0x5
3,396,374 UART: [art] Derive Key Pair - Done
3,411,222 UART: [art] Signing Cert with AUTHO
3,411,702 UART: RITY.KEYID = 7
3,426,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,597 UART: [art] PUB.X = F229911AF9B265DB340AFD620428CC2BDEA54D0D2E969827F3021BB5741768552FD0FDC83F08C803561CF52741BE44DE
3,434,355 UART: [art] PUB.Y = 1B44F06C141A5317342C5E5291AE688B5B9681B563C7CB4191ECA83B9DBC03AAABD5A0D1AC1E0C057A94F6809D1A06D8
3,441,305 UART: [art] SIG.R = 29D4D4765CD81F9CD3B6FD9BA00458E159667CBE985A15A581E60F0DAD3F30B084107F198FD639F38FB938FC81F3B478
3,448,074 UART: [art] SIG.S = 7F56E87EDC6F84CA7CF4FA55F92E5B13A132C50DCDFA5AB6CF87DC4BAC1262219C596647F0A0B25CA71893970D4954E0
3,472,251 UART: Caliptra RT
3,472,596 UART: [state] CFI Enabled
3,580,218 UART: [rt] RT listening for mailbox commands...
3,580,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,884 UART: [rt]cmd =0x41544d4e, len=14344
4,013,296 >>> mbox cmd response data (8 bytes)
4,013,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,544 UART: [rt]cmd =0x41545348, len=116
4,045,339 >>> mbox cmd response data (12 bytes)
4,045,340 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,050 UART:
4,046,066 UART: Running Caliptra ROM ...
4,046,474 UART:
4,046,615 UART: [state] CFI Enabled
4,049,899 UART: [state] LifecycleState = Unprovisioned
4,050,554 UART: [state] DebugLocked = No
4,051,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,052,719 UART: [kat] SHA2-256
4,846,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,850,765 UART: [kat] ++
4,850,917 UART: [kat] sha1
4,855,151 UART: [kat] SHA2-256
4,857,089 UART: [kat] SHA2-384
4,859,844 UART: [kat] SHA2-512-ACC
4,861,744 UART: [kat] ECC-384
4,867,257 UART: [kat] HMAC-384Kdf
4,871,935 UART: [kat] LMS
5,440,131 UART: [kat] --
5,441,250 UART: [update-reset] ++
6,772,774 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,774,036 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,923,540 >>> mbox cmd response: success
6,923,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,923,687 UART: [update-reset] Copying MAN_2 To MAN_1
6,931,701 UART: [update-reset Success] --
6,932,716 UART: [state] Locking Datavault
6,933,546 UART: [state] Locking PCR0, PCR1 and PCR31
6,934,150 UART: [state] Locking ICCM
6,934,636 UART: [exit] Launching FMC @ 0x40000130
6,939,965 UART:
6,939,981 UART: Running Caliptra FMC ...
6,940,389 UART:
6,940,532 UART: [state] CFI Enabled
7,029,245 UART: [art] Extend RT PCRs Done
7,029,673 UART: [art] Lock RT PCRs Done
7,030,880 UART: [art] Populate DV Done
7,038,973 UART: [fht] FMC Alias Private Key: 7
7,039,989 UART: [art] Derive CDI
7,040,269 UART: [art] Store in in slot 0x4
7,125,910 UART: [art] Derive Key Pair
7,126,270 UART: [art] Store priv key in slot 0x5
7,140,238 UART: [art] Derive Key Pair - Done
7,155,054 UART: [art] Signing Cert with AUTHO
7,155,534 UART: RITY.KEYID = 7
7,170,854 UART: [art] Erasing AUTHORITY.KEYID = 7
7,171,619 UART: [art] PUB.X = 6C099A8D47C4157D05CAD7EB37E580BCE31D5A4CE371F7E15304ADD5BB67F19466B2738FE1D67A336689743B3B2017E9
7,178,386 UART: [art] PUB.Y = 0855972714838C8613D67AE1719330348DD118BD7A182EA002BB5D4822B02E2DCD26A8F20E83AD861214A075947BF6F4
7,185,321 UART: [art] SIG.R = 6AD81B0BA4F59470D5D4AC1BD532ED28A26C58437E03D2E7EE61E1676EFFC8A0D4DD7D2CD151F67B32CF10247B83E909
7,192,098 UART: [art] SIG.S = 544AEDD8E95FE3F99DF4235636BC89129C89E14DFA8E13073D739A00C45CAFD93D0A496789A507B54456B58DAE0F64A6
7,216,729 UART: Caliptra RT
7,217,074 UART: [state] CFI Enabled
7,502,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,533,303 UART: [rt]cmd =0x41545348, len=116
7,535,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,676 ready_for_fw is high
1,362,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,605 >>> mbox cmd response: success
2,986,369 UART:
2,986,385 UART: Running Caliptra FMC ...
2,986,793 UART:
2,986,936 UART: [state] CFI Enabled
2,997,601 UART: [fht] FMC Alias Private Key: 7
3,105,560 UART: [art] Extend RT PCRs Done
3,105,988 UART: [art] Lock RT PCRs Done
3,107,546 UART: [art] Populate DV Done
3,115,991 UART: [fht] FMC Alias Private Key: 7
3,117,025 UART: [art] Derive CDI
3,117,305 UART: [art] Store in in slot 0x4
3,202,736 UART: [art] Derive Key Pair
3,203,096 UART: [art] Store priv key in slot 0x5
3,216,704 UART: [art] Derive Key Pair - Done
3,231,745 UART: [art] Signing Cert with AUTHO
3,232,225 UART: RITY.KEYID = 7
3,247,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,096 UART: [art] PUB.X = 660F69187D8360DA2179778CA7BAD15635F14CD17CAD2E2B0804DD4DECCC4700F6A28E73546AE4D3C9BE6E79F51E42A2
3,254,847 UART: [art] PUB.Y = BF8C87DE9FF52D33B919170775A867FE90A1C2B4C13CAD3721EAAF0F758A667990863AF9B5144DF039B745F0B2079E6D
3,261,796 UART: [art] SIG.R = 0FD71BF415491B3F4FF5BF71C07A207F849CB693CAF5203A413505B1BC05964C8A126FFA67418412E03B23AE147A31EC
3,268,563 UART: [art] SIG.S = 74E831D6264682EB3F124689B393DC89408D7354DF21444806958D9226A0591713E75430B8E3A3B82528A16611F522C4
3,292,325 UART: Caliptra RT
3,292,670 UART: [state] CFI Enabled
3,400,808 UART: [rt] RT listening for mailbox commands...
3,401,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,268 UART: [rt]cmd =0x41544d4e, len=14344
3,834,646 >>> mbox cmd response data (8 bytes)
3,834,647 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,902 UART: [rt]cmd =0x41545348, len=116
3,866,725 >>> mbox cmd response data (12 bytes)
3,866,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,625,592 >>> mbox cmd response: success
6,625,592 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,639,191 UART:
6,639,207 UART: Running Caliptra FMC ...
6,639,615 UART:
6,639,758 UART: [state] CFI Enabled
6,728,899 UART: [art] Extend RT PCRs Done
6,729,327 UART: [art] Lock RT PCRs Done
6,730,530 UART: [art] Populate DV Done
6,738,785 UART: [fht] FMC Alias Private Key: 7
6,739,959 UART: [art] Derive CDI
6,740,239 UART: [art] Store in in slot 0x4
6,825,328 UART: [art] Derive Key Pair
6,825,688 UART: [art] Store priv key in slot 0x5
6,838,774 UART: [art] Derive Key Pair - Done
6,853,451 UART: [art] Signing Cert with AUTHO
6,853,931 UART: RITY.KEYID = 7
6,869,075 UART: [art] Erasing AUTHORITY.KEYID = 7
6,869,840 UART: [art] PUB.X = 8087B541ADA28E7611F735B1B62FBC852377F69A91C3C3A9C36396C92890EF865B04010DEED30AAE6DC8B7FE483E9A36
6,876,606 UART: [art] PUB.Y = 3E05038A250A4C92E5C2D7BEC43DC557A20858E13E843758E831FC363ABB120C1469BFD0EEA094BC32329F1884D46DB3
6,883,547 UART: [art] SIG.R = B6FA311C649F47CD48061D0E4F2D87208ED2965A0B009A79B7EB320249B44D081B62B3B127C7E0A935DC9FBCCD2867BA
6,890,290 UART: [art] SIG.S = B306E556FB7EF4192969A53DAB658BD5030BE747372D02A6FB489607EB42F8FFFDD8F7DEE055992C1A0702E6386FAD55
6,914,160 UART: Caliptra RT
6,914,505 UART: [state] CFI Enabled
7,196,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,227,374 UART: [rt]cmd =0x41545348, len=116
7,229,321 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,670 UART: [kat] SHA2-512-ACC
908,571 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,171,995 UART: [cold-reset] ++
1,172,491 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,342 UART: [idev] Erasing UDS.KEYID = 0
1,201,331 UART: [idev] Sha1 KeyId Algorithm
1,209,869 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,037 UART: [ldev] --
1,283,432 UART: [fwproc] Wait for Commands...
1,284,160 UART: [fwproc] Recv command 0x46574c44
1,284,888 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,555 >>> mbox cmd response: success
2,773,801 UART: [afmc] ++
2,773,969 UART: [afmc] CDI.KEYID = 6
2,774,331 UART: [afmc] SUBJECT.KEYID = 7
2,774,756 UART: [afmc] AUTHORITY.KEYID = 5
2,809,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,890 UART: [afmc] --
2,852,914 UART: [cold-reset] --
2,853,832 UART: [state] Locking Datavault
2,854,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,371 UART: [state] Locking ICCM
2,856,031 UART: [exit] Launching FMC @ 0x40000130
2,861,360 UART:
2,861,376 UART: Running Caliptra FMC ...
2,861,784 UART:
2,861,838 UART: [state] CFI Enabled
2,872,499 UART: [fht] FMC Alias Private Key: 7
2,980,084 UART: [art] Extend RT PCRs Done
2,980,512 UART: [art] Lock RT PCRs Done
2,982,176 UART: [art] Populate DV Done
2,990,481 UART: [fht] FMC Alias Private Key: 7
2,991,543 UART: [art] Derive CDI
2,991,823 UART: [art] Store in in slot 0x4
3,077,286 UART: [art] Derive Key Pair
3,077,646 UART: [art] Store priv key in slot 0x5
3,091,018 UART: [art] Derive Key Pair - Done
3,105,918 UART: [art] Signing Cert with AUTHO
3,106,398 UART: RITY.KEYID = 7
3,121,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,563 UART: [art] PUB.X = B55B2A657BDA7ACC49BC4839E5D0780C0DD22AE72B6E3648D479E0A71C6B15C30F0A1FCC3964290AF2995936D59F0C85
3,129,325 UART: [art] PUB.Y = 31DE8F0B45BFA1C46DC3D19C211789577494BEF630A65395F6C04AF719A0C7B95A9208DD9560002CE577CE717821E055
3,136,247 UART: [art] SIG.R = 6F053B5210D7119C9CD98CA7D46153D69D87A33DB22398F288CF60EC4C4E8B55C8B0A70BBF75BAEFF67AF5698C2A5638
3,143,023 UART: [art] SIG.S = 142DB5FFA0F7F8A616319A7F71F7EA3DBC96BD9031FB5D97109C6262CAC1A0A7761A5AB215A8D5D751ADB71EA0E39BA4
3,167,180 UART: Caliptra RT
3,167,433 UART: [state] CFI Enabled
3,275,254 UART: [rt] RT listening for mailbox commands...
3,275,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,254 UART: [rt]cmd =0x41544d4e, len=14344
3,709,348 >>> mbox cmd response data (8 bytes)
3,709,349 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,652 UART: [rt]cmd =0x41545348, len=116
3,741,469 >>> mbox cmd response data (12 bytes)
3,741,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,281 UART:
3,742,297 UART: Running Caliptra ROM ...
3,742,705 UART:
3,742,760 UART: [state] CFI Enabled
3,745,326 UART: [state] LifecycleState = Unprovisioned
3,745,981 UART: [state] DebugLocked = No
3,746,511 UART: [state] WD Timer not started. Device not locked for debugging
3,747,771 UART: [kat] SHA2-256
4,553,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,557,546 UART: [kat] ++
4,557,698 UART: [kat] sha1
4,561,996 UART: [kat] SHA2-256
4,563,936 UART: [kat] SHA2-384
4,566,661 UART: [kat] SHA2-512-ACC
4,568,561 UART: [kat] ECC-384
4,578,114 UART: [kat] HMAC-384Kdf
4,582,652 UART: [kat] LMS
4,830,980 UART: [kat] --
4,831,828 UART: [update-reset] ++
6,141,712 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,142,823 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,292,275 >>> mbox cmd response: success
6,292,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,292,530 UART: [update-reset] Copying MAN_2 To MAN_1
6,300,544 UART: [update-reset Success] --
6,301,659 UART: [state] Locking Datavault
6,302,629 UART: [state] Locking PCR0, PCR1 and PCR31
6,303,233 UART: [state] Locking ICCM
6,303,869 UART: [exit] Launching FMC @ 0x40000130
6,309,198 UART:
6,309,214 UART: Running Caliptra FMC ...
6,309,622 UART:
6,309,676 UART: [state] CFI Enabled
6,398,885 UART: [art] Extend RT PCRs Done
6,399,313 UART: [art] Lock RT PCRs Done
6,400,500 UART: [art] Populate DV Done
6,408,755 UART: [fht] FMC Alias Private Key: 7
6,409,911 UART: [art] Derive CDI
6,410,191 UART: [art] Store in in slot 0x4
6,495,678 UART: [art] Derive Key Pair
6,496,038 UART: [art] Store priv key in slot 0x5
6,508,844 UART: [art] Derive Key Pair - Done
6,523,707 UART: [art] Signing Cert with AUTHO
6,524,187 UART: RITY.KEYID = 7
6,539,461 UART: [art] Erasing AUTHORITY.KEYID = 7
6,540,226 UART: [art] PUB.X = 2C680D05094849A4B7EB298EC9C5B04A8AB657C147755A4374E869D754987CE98D301FC797ECDA84525803BEF5260B5C
6,546,981 UART: [art] PUB.Y = 2405B810FE68A0CC0AFAC0CD65A890AEFD9C7BA4137C62ABEC10F70BEC789DA73B90AF82048C12AE0C6EB32C6599760E
6,553,935 UART: [art] SIG.R = 71989BF13A41C8884B6871205376C4ABAD3681AFE47085765566EAEB2A744A3C2F7988F5127240D255F5900E40A2A91E
6,560,696 UART: [art] SIG.S = 2DFAD92E526361DC70CE1E7731926AC61F52FEE5E1DDBB97FAE9C2C357FDCEDA09542C4FD5C5A5EE1695DA8B83287298
6,584,148 UART: Caliptra RT
6,584,401 UART: [state] CFI Enabled
6,863,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,894,609 UART: [rt]cmd =0x41545348, len=116
6,896,058 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 ready_for_fw is high
1,059,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,312 >>> mbox cmd response: success
2,684,320 UART:
2,684,336 UART: Running Caliptra FMC ...
2,684,744 UART:
2,684,798 UART: [state] CFI Enabled
2,695,349 UART: [fht] FMC Alias Private Key: 7
2,802,680 UART: [art] Extend RT PCRs Done
2,803,108 UART: [art] Lock RT PCRs Done
2,804,778 UART: [art] Populate DV Done
2,813,081 UART: [fht] FMC Alias Private Key: 7
2,814,155 UART: [art] Derive CDI
2,814,435 UART: [art] Store in in slot 0x4
2,900,462 UART: [art] Derive Key Pair
2,900,822 UART: [art] Store priv key in slot 0x5
2,913,540 UART: [art] Derive Key Pair - Done
2,928,158 UART: [art] Signing Cert with AUTHO
2,928,638 UART: RITY.KEYID = 7
2,943,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,333 UART: [art] PUB.X = FA184A667CDE4D480C7245444674A5022F62D829127B5E085554795EDADE7ED5288694352E17DF5DABE0C72532B9261B
2,951,092 UART: [art] PUB.Y = EDD241DB70CF9991D4EB0205EA42FA27350AAFF3EA1A620D613C42851B9B6EDBD82498DF65BB29E7873A05C6EEFEFF7B
2,958,051 UART: [art] SIG.R = 35104F42AFB1368A545EBC74BD60FE78D59E3A7DB6F2246872487B8DAB0DBC46246CDC80F3FA036FD146B4D076993A45
2,964,825 UART: [art] SIG.S = 3A53195EE1084A3902144A046543613C0D060910192C2760359146453DF77E1AC32DAC848F2A789299D8BA5718D88E76
2,988,026 UART: Caliptra RT
2,988,279 UART: [state] CFI Enabled
3,096,474 UART: [rt] RT listening for mailbox commands...
3,097,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,270 UART: [rt]cmd =0x41544d4e, len=14344
3,529,904 >>> mbox cmd response data (8 bytes)
3,529,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,120 UART: [rt]cmd =0x41545348, len=116
3,561,909 >>> mbox cmd response data (12 bytes)
3,561,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,995,422 >>> mbox cmd response: success
5,995,422 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,008,780 UART:
6,008,796 UART: Running Caliptra FMC ...
6,009,204 UART:
6,009,258 UART: [state] CFI Enabled
6,098,553 UART: [art] Extend RT PCRs Done
6,098,981 UART: [art] Lock RT PCRs Done
6,100,522 UART: [art] Populate DV Done
6,108,853 UART: [fht] FMC Alias Private Key: 7
6,109,887 UART: [art] Derive CDI
6,110,167 UART: [art] Store in in slot 0x4
6,195,652 UART: [art] Derive Key Pair
6,196,012 UART: [art] Store priv key in slot 0x5
6,209,178 UART: [art] Derive Key Pair - Done
6,223,821 UART: [art] Signing Cert with AUTHO
6,224,301 UART: RITY.KEYID = 7
6,239,755 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,520 UART: [art] PUB.X = BFC82531EA8572A03408873CF01ACB366CACCE4F99D73DF9CD2ED8697617833B070E0B0B368236ECCCC34AE9CBBF1535
6,247,291 UART: [art] PUB.Y = F4657848EAF4C0B93E186941AA4C528451D9C2DC521A0FA8F65B7A0D0B8022437B29F4E66C77B94AE5F453DD55F9D701
6,254,235 UART: [art] SIG.R = FEAF79D3C8EE8B3DEACBC98591EC5DAA6A70209E27BE18A4026F25D22CCFA3FFC206481AC1632A07D69B7150403875FD
6,261,016 UART: [art] SIG.S = E855246D4FCEC562A6389B762122D9F3A5E4C6932F8DBDFBC453DCE432BAB889EDE92B9723EDE094E8DE331390466047
6,284,667 UART: Caliptra RT
6,284,920 UART: [state] CFI Enabled
6,570,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,601,197 UART: [rt]cmd =0x41545348, len=116
6,602,930 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,785 UART: [kat] SHA2-512-ACC
908,686 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,324 UART: [cold-reset] ++
1,172,778 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,052 UART: [idev] Sha1 KeyId Algorithm
1,209,338 UART: [idev] --
1,210,354 UART: [ldev] ++
1,210,522 UART: [ldev] CDI.KEYID = 6
1,210,885 UART: [ldev] SUBJECT.KEYID = 5
1,211,311 UART: [ldev] AUTHORITY.KEYID = 7
1,211,774 UART: [ldev] FE.KEYID = 1
1,216,886 UART: [ldev] Erasing FE.KEYID = 1
1,243,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,216 UART: [ldev] --
1,282,497 UART: [fwproc] Wait for Commands...
1,283,191 UART: [fwproc] Recv command 0x46574c44
1,283,919 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,056 >>> mbox cmd response: success
2,771,178 UART: [afmc] ++
2,771,346 UART: [afmc] CDI.KEYID = 6
2,771,708 UART: [afmc] SUBJECT.KEYID = 7
2,772,133 UART: [afmc] AUTHORITY.KEYID = 5
2,806,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,311 UART: [afmc] --
2,850,375 UART: [cold-reset] --
2,851,107 UART: [state] Locking Datavault
2,852,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,166 UART: [state] Locking ICCM
2,853,700 UART: [exit] Launching FMC @ 0x40000130
2,859,029 UART:
2,859,045 UART: Running Caliptra FMC ...
2,859,453 UART:
2,859,596 UART: [state] CFI Enabled
2,870,235 UART: [fht] FMC Alias Private Key: 7
2,978,162 UART: [art] Extend RT PCRs Done
2,978,590 UART: [art] Lock RT PCRs Done
2,979,910 UART: [art] Populate DV Done
2,987,999 UART: [fht] FMC Alias Private Key: 7
2,989,155 UART: [art] Derive CDI
2,989,435 UART: [art] Store in in slot 0x4
3,074,408 UART: [art] Derive Key Pair
3,074,768 UART: [art] Store priv key in slot 0x5
3,088,468 UART: [art] Derive Key Pair - Done
3,102,973 UART: [art] Signing Cert with AUTHO
3,103,453 UART: RITY.KEYID = 7
3,118,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,386 UART: [art] PUB.X = 2427E1D04E67A69F7D2171F5813CB3EF389866C6E892C538FCCE9176CC786976088915FE8D9363ADA52B2C4B4C64A9D5
3,126,155 UART: [art] PUB.Y = F9FA9199413CFDAA7099CBEB0FCE36075767574911C5977F737E9AEF69EDD56D8E744D9A56C123D67FAB64B85FFA5F85
3,133,113 UART: [art] SIG.R = 1D5C39DB4421E70C90BE4D021FCD11B912250E98F1F47B1DF9D1868413CAD3E858B0DC673C242A18E32F431C3EF3F1CA
3,139,886 UART: [art] SIG.S = BF53FB139F321EC1AD39C3F608421A71041E5309E44A67CEA62D7491D65E80A06CB81045CAF1C06D64B10F215CB39C9B
3,163,481 UART: Caliptra RT
3,163,826 UART: [state] CFI Enabled
3,271,589 UART: [rt] RT listening for mailbox commands...
3,272,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,111 UART: [rt]cmd =0x41544d4e, len=14344
3,705,071 >>> mbox cmd response data (8 bytes)
3,705,072 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,965 UART: [rt]cmd =0x41545348, len=116
3,736,594 >>> mbox cmd response data (12 bytes)
3,736,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,418 UART:
3,737,434 UART: Running Caliptra ROM ...
3,737,842 UART:
3,737,984 UART: [state] CFI Enabled
3,740,658 UART: [state] LifecycleState = Unprovisioned
3,741,313 UART: [state] DebugLocked = No
3,741,801 UART: [state] WD Timer not started. Device not locked for debugging
3,743,023 UART: [kat] SHA2-256
4,548,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,552,798 UART: [kat] ++
4,552,950 UART: [kat] sha1
4,557,286 UART: [kat] SHA2-256
4,559,226 UART: [kat] SHA2-384
4,561,889 UART: [kat] SHA2-512-ACC
4,563,789 UART: [kat] ECC-384
4,573,364 UART: [kat] HMAC-384Kdf
4,578,114 UART: [kat] LMS
4,826,442 UART: [kat] --
4,827,498 UART: [update-reset] ++
6,136,316 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,137,303 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,286,755 >>> mbox cmd response: success
6,286,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,287,004 UART: [update-reset] Copying MAN_2 To MAN_1
6,295,018 UART: [update-reset Success] --
6,295,913 UART: [state] Locking Datavault
6,296,693 UART: [state] Locking PCR0, PCR1 and PCR31
6,297,297 UART: [state] Locking ICCM
6,297,837 UART: [exit] Launching FMC @ 0x40000130
6,303,166 UART:
6,303,182 UART: Running Caliptra FMC ...
6,303,590 UART:
6,303,733 UART: [state] CFI Enabled
6,393,280 UART: [art] Extend RT PCRs Done
6,393,708 UART: [art] Lock RT PCRs Done
6,395,197 UART: [art] Populate DV Done
6,403,578 UART: [fht] FMC Alias Private Key: 7
6,404,708 UART: [art] Derive CDI
6,404,988 UART: [art] Store in in slot 0x4
6,490,849 UART: [art] Derive Key Pair
6,491,209 UART: [art] Store priv key in slot 0x5
6,504,257 UART: [art] Derive Key Pair - Done
6,518,932 UART: [art] Signing Cert with AUTHO
6,519,412 UART: RITY.KEYID = 7
6,534,622 UART: [art] Erasing AUTHORITY.KEYID = 7
6,535,387 UART: [art] PUB.X = 04255961A6EA36C884210C1E90B23078CE9CCEEDB8D87186E9D43BB864E642BF8B890345A6B0AFB6D02FE0A58FC38169
6,542,156 UART: [art] PUB.Y = A91EFA9B2C4302EBC0ED58597C4995EBA6510878BBB3CCB6CAB0AFFE1F343EA99DA33B0FD7D3E857E58D067E361E8E91
6,549,118 UART: [art] SIG.R = 82E97A3C2F08584B15CAABE4035CE845B6C04655B6A5DFC45FAC67F54CE104C7C4D2CBD580DB9CCA3751C059FB0DEC66
6,555,898 UART: [art] SIG.S = CC1B182BDA6A3D0FE13D5430DD28C287D3A9BF8CFD989713D001736881CD837E38BB96FD9E58374B16E368ABD4CE70DD
6,579,773 UART: Caliptra RT
6,580,118 UART: [state] CFI Enabled
6,861,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,892,195 UART: [rt]cmd =0x41545348, len=116
6,893,932 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,914 ready_for_fw is high
1,061,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,051 >>> mbox cmd response: success
2,686,815 UART:
2,686,831 UART: Running Caliptra FMC ...
2,687,239 UART:
2,687,382 UART: [state] CFI Enabled
2,697,837 UART: [fht] FMC Alias Private Key: 7
2,805,716 UART: [art] Extend RT PCRs Done
2,806,144 UART: [art] Lock RT PCRs Done
2,807,840 UART: [art] Populate DV Done
2,816,021 UART: [fht] FMC Alias Private Key: 7
2,817,075 UART: [art] Derive CDI
2,817,355 UART: [art] Store in in slot 0x4
2,902,972 UART: [art] Derive Key Pair
2,903,332 UART: [art] Store priv key in slot 0x5
2,916,972 UART: [art] Derive Key Pair - Done
2,932,021 UART: [art] Signing Cert with AUTHO
2,932,501 UART: RITY.KEYID = 7
2,947,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,292 UART: [art] PUB.X = FB5FE7E9DC2453AAE6EF79505D3D5D571C3FEB2E33A669E407339B68716F8AE4A764CB4B9F7A86D13D5C097903A165EB
2,955,067 UART: [art] PUB.Y = 187907D518002D4A23B35A9920C8FE8B21F9C4C9A0B1CE1914BEA89BFE8CBB6B2D34507E73457B673D91AA606DE883F4
2,962,000 UART: [art] SIG.R = 46A7C945AA5BBFBBB0FE1D9173802F7F9F80595A5328E6617530EAA7E496E6D0A803A47934CDD1BC306C4935E8790438
2,968,768 UART: [art] SIG.S = BE445534FD4E75384DA1722CA0E5A3B0C2C772A52EED80E2692C3486E02650316647361B00D5AF3A0F2B10ACCF6EDB33
2,992,520 UART: Caliptra RT
2,992,865 UART: [state] CFI Enabled
3,100,508 UART: [rt] RT listening for mailbox commands...
3,101,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,288 UART: [rt]cmd =0x41544d4e, len=14344
3,533,838 >>> mbox cmd response data (8 bytes)
3,533,839 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,992 UART: [rt]cmd =0x41545348, len=116
3,565,937 >>> mbox cmd response data (12 bytes)
3,565,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,735 >>> mbox cmd response: success
6,000,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,014,077 UART:
6,014,093 UART: Running Caliptra FMC ...
6,014,501 UART:
6,014,644 UART: [state] CFI Enabled
6,103,765 UART: [art] Extend RT PCRs Done
6,104,193 UART: [art] Lock RT PCRs Done
6,105,738 UART: [art] Populate DV Done
6,114,159 UART: [fht] FMC Alias Private Key: 7
6,115,217 UART: [art] Derive CDI
6,115,497 UART: [art] Store in in slot 0x4
6,201,602 UART: [art] Derive Key Pair
6,201,962 UART: [art] Store priv key in slot 0x5
6,216,028 UART: [art] Derive Key Pair - Done
6,230,600 UART: [art] Signing Cert with AUTHO
6,231,080 UART: RITY.KEYID = 7
6,246,418 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,183 UART: [art] PUB.X = 87407DD350FCFDEB179625BCD17315B3E730F73433CFDFBC9F85C6950BC92287A6875D08477A6BA1BCACCD524AA9FEBE
6,253,967 UART: [art] PUB.Y = E51671C1AC0FD317C32295D7FE2B62C31AE12BCFBE881E1A07F375EFEBBFD0C6CB2B5643D5CD9665C312909F80A86D1F
6,260,931 UART: [art] SIG.R = D2B922B1A3B73C0595213329C7428EAFB13A9406456D520FBB5EDAF5425AB545F64EB53C2B2946B1E0AF03D6A84E6D0C
6,267,696 UART: [art] SIG.S = 51021B5C0D10B11CA965920B0BD4FD91E238128E742F8773808D958A637C9B5D91D13539AA9B3FC567203698CF5AC082
6,291,303 UART: Caliptra RT
6,291,648 UART: [state] CFI Enabled
6,574,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,605,702 UART: [rt]cmd =0x41545348, len=116
6,607,495 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,169,993 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,972 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,900 UART: [ldev] --
1,281,202 UART: [fwproc] Wait for Commands...
1,281,921 UART: [fwproc] Recv command 0x46574c44
1,282,654 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,021 >>> mbox cmd response: success
2,768,088 UART: [afmc] ++
2,768,256 UART: [afmc] CDI.KEYID = 6
2,768,619 UART: [afmc] SUBJECT.KEYID = 7
2,769,045 UART: [afmc] AUTHORITY.KEYID = 5
2,803,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,826,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,821 UART: [afmc] --
2,846,795 UART: [cold-reset] --
2,847,797 UART: [state] Locking Datavault
2,848,940 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,544 UART: [state] Locking ICCM
2,850,094 UART: [exit] Launching FMC @ 0x40000130
2,855,423 UART:
2,855,439 UART: Running Caliptra FMC ...
2,855,847 UART:
2,855,901 UART: [state] CFI Enabled
2,866,452 UART: [fht] FMC Alias Private Key: 7
2,974,447 UART: [art] Extend RT PCRs Done
2,974,875 UART: [art] Lock RT PCRs Done
2,976,389 UART: [art] Populate DV Done
2,984,530 UART: [fht] FMC Alias Private Key: 7
2,985,652 UART: [art] Derive CDI
2,985,932 UART: [art] Store in in slot 0x4
3,071,191 UART: [art] Derive Key Pair
3,071,551 UART: [art] Store priv key in slot 0x5
3,084,499 UART: [art] Derive Key Pair - Done
3,099,292 UART: [art] Signing Cert with AUTHO
3,099,772 UART: RITY.KEYID = 7
3,115,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,841 UART: [art] PUB.X = 635D2799A08AF7461644AAD0317DBE99C2132AE55F150F03DC88AA3F192C05C28BB81A16EB5A72330AEA093ABAA1E18F
3,122,608 UART: [art] PUB.Y = DBAA47C81A828D2DE6CBFC9674050883DA6C75D26AF1959717A8F1A4718EEE3AD687639967E7F2B4CA37291D9EAABC4B
3,129,568 UART: [art] SIG.R = FFA89E9169BDE01209FA8DFAD31FBB38A823CB33DBBE4185FA5215A0BD8A09D7DDEB12FCDA6C0DB121E96DF138515C05
3,136,354 UART: [art] SIG.S = 21988B951DE3AC63862C91F41373B9950550A2591F61A53D7B48DC55574D2ECDF008214F4D93939D8CAFC93BD0152432
3,160,131 UART: Caliptra RT
3,160,384 UART: [state] CFI Enabled
3,268,319 UART: [rt] RT listening for mailbox commands...
3,268,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,995 UART: [rt]cmd =0x41544d4e, len=14344
3,702,251 >>> mbox cmd response data (8 bytes)
3,702,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,307 UART: [rt]cmd =0x41545348, len=116
3,734,082 >>> mbox cmd response data (12 bytes)
3,734,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,730 UART:
3,734,746 UART: Running Caliptra ROM ...
3,735,154 UART:
3,735,209 UART: [state] CFI Enabled
3,737,625 UART: [state] LifecycleState = Unprovisioned
3,738,280 UART: [state] DebugLocked = No
3,738,830 UART: [state] WD Timer not started. Device not locked for debugging
3,739,964 UART: [kat] SHA2-256
4,543,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,547,643 UART: [kat] ++
4,547,795 UART: [kat] sha1
4,551,995 UART: [kat] SHA2-256
4,553,935 UART: [kat] SHA2-384
4,556,476 UART: [kat] SHA2-512-ACC
4,558,376 UART: [kat] ECC-384
4,568,293 UART: [kat] HMAC-384Kdf
4,572,683 UART: [kat] LMS
4,820,995 UART: [kat] --
4,821,879 UART: [update-reset] ++
6,131,344 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,132,525 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,281,977 >>> mbox cmd response: success
6,281,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,282,298 UART: [update-reset] Copying MAN_2 To MAN_1
6,290,312 UART: [update-reset Success] --
6,291,341 UART: [state] Locking Datavault
6,292,209 UART: [state] Locking PCR0, PCR1 and PCR31
6,292,813 UART: [state] Locking ICCM
6,293,391 UART: [exit] Launching FMC @ 0x40000130
6,298,720 UART:
6,298,736 UART: Running Caliptra FMC ...
6,299,144 UART:
6,299,198 UART: [state] CFI Enabled
6,388,087 UART: [art] Extend RT PCRs Done
6,388,515 UART: [art] Lock RT PCRs Done
6,389,742 UART: [art] Populate DV Done
6,397,989 UART: [fht] FMC Alias Private Key: 7
6,398,947 UART: [art] Derive CDI
6,399,227 UART: [art] Store in in slot 0x4
6,484,300 UART: [art] Derive Key Pair
6,484,660 UART: [art] Store priv key in slot 0x5
6,498,202 UART: [art] Derive Key Pair - Done
6,513,127 UART: [art] Signing Cert with AUTHO
6,513,607 UART: RITY.KEYID = 7
6,528,951 UART: [art] Erasing AUTHORITY.KEYID = 7
6,529,716 UART: [art] PUB.X = CF2492178114AEC458D5291791CB148CA499849F57B3F1A3CBEFFC0380EA9157ADBDD21A1E438BC035D0B2AA7AA78B11
6,536,497 UART: [art] PUB.Y = F2123BB0D0900F6E0671B1E48F007762DC4D88A28B0931D170FB4FF78E26C9BE4A7319E67F39A26226478AE8FF18F6A6
6,543,420 UART: [art] SIG.R = F453E844D9604548EE819D088EB325A74B1C6E247EFF086C27C8BCC7F20CC11C2FC8914D314E4ACDEC6DD1FC3F9E0472
6,550,194 UART: [art] SIG.S = 7A25C7DA094F985C00544A06E0EEECFF474BA63A27A776044E0901E2FF509ABAFCD2DA23EDE88B82489BF064988C6838
6,574,140 UART: Caliptra RT
6,574,393 UART: [state] CFI Enabled
6,857,558 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,888,391 UART: [rt]cmd =0x41545348, len=116
6,890,302 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,226 ready_for_fw is high
1,056,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,801 >>> mbox cmd response: success
2,682,571 UART:
2,682,587 UART: Running Caliptra FMC ...
2,682,995 UART:
2,683,049 UART: [state] CFI Enabled
2,693,344 UART: [fht] FMC Alias Private Key: 7
2,801,515 UART: [art] Extend RT PCRs Done
2,801,943 UART: [art] Lock RT PCRs Done
2,803,781 UART: [art] Populate DV Done
2,811,862 UART: [fht] FMC Alias Private Key: 7
2,812,812 UART: [art] Derive CDI
2,813,092 UART: [art] Store in in slot 0x4
2,898,977 UART: [art] Derive Key Pair
2,899,337 UART: [art] Store priv key in slot 0x5
2,912,627 UART: [art] Derive Key Pair - Done
2,927,070 UART: [art] Signing Cert with AUTHO
2,927,550 UART: RITY.KEYID = 7
2,943,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,897 UART: [art] PUB.X = F8FC929D901666C7F3872BC3F69EFC1B4EA66E6EBD7A0DB32C96348D7200F7C1DE29273D7A0F9A7D503135D573D533E8
2,950,649 UART: [art] PUB.Y = 5F443875A2B589E709590880E6C08CBEF7E55EB0CB4646816C74D07E9598188C2A4795A97F1E4EC39609C90BC8D9A742
2,957,585 UART: [art] SIG.R = 8EAB23933B7D8B51CDD1FE16064BA5B3AADF907391DE774552E110CDD79E4B905C8271EB1BED836AF84456CA6628A848
2,964,364 UART: [art] SIG.S = 5CDAA5C56B6AA1BC56891C9B8B9B1872A58BE78771C06A42E5C447331FD4234C470749F9F928E70378EF1CE4F8A8F36E
2,987,901 UART: Caliptra RT
2,988,154 UART: [state] CFI Enabled
3,094,559 UART: [rt] RT listening for mailbox commands...
3,095,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,003 UART: [rt]cmd =0x41544d4e, len=14344
3,528,019 >>> mbox cmd response data (8 bytes)
3,528,020 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,017 UART: [rt]cmd =0x41545348, len=116
3,559,902 >>> mbox cmd response data (12 bytes)
3,559,903 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,702 >>> mbox cmd response: success
5,990,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,004,250 UART:
6,004,266 UART: Running Caliptra FMC ...
6,004,674 UART:
6,004,728 UART: [state] CFI Enabled
6,094,313 UART: [art] Extend RT PCRs Done
6,094,741 UART: [art] Lock RT PCRs Done
6,095,794 UART: [art] Populate DV Done
6,103,965 UART: [fht] FMC Alias Private Key: 7
6,104,899 UART: [art] Derive CDI
6,105,179 UART: [art] Store in in slot 0x4
6,190,682 UART: [art] Derive Key Pair
6,191,042 UART: [art] Store priv key in slot 0x5
6,203,910 UART: [art] Derive Key Pair - Done
6,218,581 UART: [art] Signing Cert with AUTHO
6,219,061 UART: RITY.KEYID = 7
6,234,189 UART: [art] Erasing AUTHORITY.KEYID = 7
6,234,954 UART: [art] PUB.X = 50B5001F7D1D1E3BE07CA4D768F335F686F39EA504DB14948C47D29C2F3156B7291D1E909B61A29DBF59D2260446F097
6,241,696 UART: [art] PUB.Y = 01E4CA062B68E276D2C47C7981F6E42915F6D08D1114EADAEA6B951BB13811C72AC1E9BF4552C03ACC0B856020CDA817
6,248,647 UART: [art] SIG.R = 425FE875EC4D776D7E55356206982E989455E97DEFB5B70FD70C547C2797E41B19696666415D7C17E8BE199385660819
6,255,393 UART: [art] SIG.S = B480E7F2B4B7B03CE26FC86371B589E4B8B171A0718F1EED5A53FC9848601D5F99F52A9B64644ABA4AFDA4BD44605608
6,279,771 UART: Caliptra RT
6,280,024 UART: [state] CFI Enabled
6,562,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,593,082 UART: [rt]cmd =0x41545348, len=116
6,594,743 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,581 UART: [state] LifecycleState = Unprovisioned
85,236 UART: [state] DebugLocked = No
85,874 UART: [state] WD Timer not started. Device not locked for debugging
87,075 UART: [kat] SHA2-256
890,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,754 UART: [kat] ++
894,906 UART: [kat] sha1
899,102 UART: [kat] SHA2-256
901,042 UART: [kat] SHA2-384
903,651 UART: [kat] SHA2-512-ACC
905,552 UART: [kat] ECC-384
915,369 UART: [kat] HMAC-384Kdf
920,051 UART: [kat] LMS
1,168,363 UART: [kat] --
1,169,002 UART: [cold-reset] ++
1,169,540 UART: [fht] FHT @ 0x50003400
1,172,224 UART: [idev] ++
1,172,392 UART: [idev] CDI.KEYID = 6
1,172,753 UART: [idev] SUBJECT.KEYID = 7
1,173,178 UART: [idev] UDS.KEYID = 0
1,173,524 ready_for_fw is high
1,173,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,626 UART: [idev] Erasing UDS.KEYID = 0
1,198,116 UART: [idev] Sha1 KeyId Algorithm
1,206,864 UART: [idev] --
1,208,035 UART: [ldev] ++
1,208,203 UART: [ldev] CDI.KEYID = 6
1,208,567 UART: [ldev] SUBJECT.KEYID = 5
1,208,994 UART: [ldev] AUTHORITY.KEYID = 7
1,209,457 UART: [ldev] FE.KEYID = 1
1,214,577 UART: [ldev] Erasing FE.KEYID = 1
1,241,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,253 UART: [ldev] --
1,280,551 UART: [fwproc] Wait for Commands...
1,281,202 UART: [fwproc] Recv command 0x46574c44
1,281,935 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,426 >>> mbox cmd response: success
2,768,477 UART: [afmc] ++
2,768,645 UART: [afmc] CDI.KEYID = 6
2,769,008 UART: [afmc] SUBJECT.KEYID = 7
2,769,434 UART: [afmc] AUTHORITY.KEYID = 5
2,805,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,656 UART: [afmc] --
2,848,600 UART: [cold-reset] --
2,849,388 UART: [state] Locking Datavault
2,850,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,265 UART: [state] Locking ICCM
2,851,939 UART: [exit] Launching FMC @ 0x40000130
2,857,268 UART:
2,857,284 UART: Running Caliptra FMC ...
2,857,692 UART:
2,857,835 UART: [state] CFI Enabled
2,868,422 UART: [fht] FMC Alias Private Key: 7
2,976,267 UART: [art] Extend RT PCRs Done
2,976,695 UART: [art] Lock RT PCRs Done
2,978,233 UART: [art] Populate DV Done
2,986,468 UART: [fht] FMC Alias Private Key: 7
2,987,444 UART: [art] Derive CDI
2,987,724 UART: [art] Store in in slot 0x4
3,073,775 UART: [art] Derive Key Pair
3,074,135 UART: [art] Store priv key in slot 0x5
3,087,537 UART: [art] Derive Key Pair - Done
3,102,413 UART: [art] Signing Cert with AUTHO
3,102,893 UART: RITY.KEYID = 7
3,118,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,534 UART: [art] PUB.X = 56A61D4067A193D1316663D1542A8818780FB68AFBA65F8304EEF7F3681B68D9E543C2FA1E115CCEB86A13A209DBC4A6
3,126,301 UART: [art] PUB.Y = 5A3824382DF55D9986C5FD0D29E8545523B183E51E67887F2A25DC0785A4B07582086C0429031A55153114E680323CB2
3,133,220 UART: [art] SIG.R = 27E2A42EEDED0C11598AF07D94987A5BF70EA27C176E016BFC844051E1AC584EEAFCB181E7035169991740F6F992234F
3,139,984 UART: [art] SIG.S = 92B038348C1BF9D138D7F0A7218526598C6FE7F49003F13F42FDE2CDE8C902563ED20155F64B061D2C0A746F1FE71E7A
3,163,916 UART: Caliptra RT
3,164,261 UART: [state] CFI Enabled
3,272,568 UART: [rt] RT listening for mailbox commands...
3,273,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,178 UART: [rt]cmd =0x41544d4e, len=14344
3,706,420 >>> mbox cmd response data (8 bytes)
3,706,421 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,616 UART: [rt]cmd =0x41545348, len=116
3,738,413 >>> mbox cmd response data (12 bytes)
3,738,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,155 UART:
3,739,171 UART: Running Caliptra ROM ...
3,739,579 UART:
3,739,721 UART: [state] CFI Enabled
3,742,749 UART: [state] LifecycleState = Unprovisioned
3,743,404 UART: [state] DebugLocked = No
3,743,910 UART: [state] WD Timer not started. Device not locked for debugging
3,745,174 UART: [kat] SHA2-256
4,548,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,552,853 UART: [kat] ++
4,553,005 UART: [kat] sha1
4,557,215 UART: [kat] SHA2-256
4,559,155 UART: [kat] SHA2-384
4,561,770 UART: [kat] SHA2-512-ACC
4,563,670 UART: [kat] ECC-384
4,573,287 UART: [kat] HMAC-384Kdf
4,578,017 UART: [kat] LMS
4,826,329 UART: [kat] --
4,827,087 UART: [update-reset] ++
6,135,722 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,136,719 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
6,286,171 >>> mbox cmd response: success
6,286,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,286,400 UART: [update-reset] Copying MAN_2 To MAN_1
6,294,414 UART: [update-reset Success] --
6,295,275 UART: [state] Locking Datavault
6,295,879 UART: [state] Locking PCR0, PCR1 and PCR31
6,296,483 UART: [state] Locking ICCM
6,297,013 UART: [exit] Launching FMC @ 0x40000130
6,302,342 UART:
6,302,358 UART: Running Caliptra FMC ...
6,302,766 UART:
6,302,909 UART: [state] CFI Enabled
6,391,498 UART: [art] Extend RT PCRs Done
6,391,926 UART: [art] Lock RT PCRs Done
6,392,891 UART: [art] Populate DV Done
6,400,932 UART: [fht] FMC Alias Private Key: 7
6,401,942 UART: [art] Derive CDI
6,402,222 UART: [art] Store in in slot 0x4
6,487,833 UART: [art] Derive Key Pair
6,488,193 UART: [art] Store priv key in slot 0x5
6,501,917 UART: [art] Derive Key Pair - Done
6,516,376 UART: [art] Signing Cert with AUTHO
6,516,856 UART: RITY.KEYID = 7
6,531,650 UART: [art] Erasing AUTHORITY.KEYID = 7
6,532,415 UART: [art] PUB.X = 2B3E0588C04D690A04B46CA08E65E361035A20C086C92494FA24B2C2074B0D328B3088FA09413D08892680C7E82B3489
6,539,151 UART: [art] PUB.Y = 86677DEB244418463446FE86E50658A142C0B7A25154A3BDCCDBE421E8D477CEF532D32BE7699664A99864764EBED8CB
6,546,102 UART: [art] SIG.R = 73709B23C5F2548DC77A868AA8AB1099EA3D931A70225523E1CD257BD4C12F5A63922C32E730E32F7A1EA0AF09EB4E1D
6,552,877 UART: [art] SIG.S = 9DC9B9ACFC0B2C85AF93BFD7C6AE9BA789C83C0753DE803B74BB1CA9FA504681334C80BD006E8A26088BB8F88213038D
6,576,982 UART: Caliptra RT
6,577,327 UART: [state] CFI Enabled
6,859,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,890,065 UART: [rt]cmd =0x41545348, len=116
6,891,848 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,105 ready_for_fw is high
1,056,105 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,594 >>> mbox cmd response: success
2,680,608 UART:
2,680,624 UART: Running Caliptra FMC ...
2,681,032 UART:
2,681,175 UART: [state] CFI Enabled
2,691,730 UART: [fht] FMC Alias Private Key: 7
2,799,457 UART: [art] Extend RT PCRs Done
2,799,885 UART: [art] Lock RT PCRs Done
2,801,303 UART: [art] Populate DV Done
2,809,440 UART: [fht] FMC Alias Private Key: 7
2,810,440 UART: [art] Derive CDI
2,810,720 UART: [art] Store in in slot 0x4
2,896,719 UART: [art] Derive Key Pair
2,897,079 UART: [art] Store priv key in slot 0x5
2,910,533 UART: [art] Derive Key Pair - Done
2,925,054 UART: [art] Signing Cert with AUTHO
2,925,534 UART: RITY.KEYID = 7
2,940,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,719 UART: [art] PUB.X = 22A1212765DB837275FB9C2D741B0061EFBF419CEE524C6AD27D86D4067534ADCC38846E0C69C6F75869912B80D08D38
2,948,461 UART: [art] PUB.Y = E5D7411E630FF627F9E6E8BB8340C32C93759D558781A641081810240F7DE0381E95E8C9384AA4D1220ADBD4EDEA7B1B
2,955,403 UART: [art] SIG.R = 807E12AD319185D35E32EB244C40CE96534AA80E73614D82B93DFC3D98030BE36912B35E141F3F7BA0D2E6A4D8150173
2,962,161 UART: [art] SIG.S = 0EE19111D60E2ED87835BF91F99DA8862868D649C2E5DA0293D5F51E693A9D496D2351F10C61E859DACA6BC1940F9D13
2,986,125 UART: Caliptra RT
2,986,470 UART: [state] CFI Enabled
3,094,229 UART: [rt] RT listening for mailbox commands...
3,094,899 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,703 UART: [rt]cmd =0x41544d4e, len=14344
3,527,823 >>> mbox cmd response data (8 bytes)
3,527,824 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,849 UART: [rt]cmd =0x41545348, len=116
3,559,654 >>> mbox cmd response data (12 bytes)
3,559,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,891 >>> mbox cmd response: success
5,990,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,003,935 UART:
6,003,951 UART: Running Caliptra FMC ...
6,004,359 UART:
6,004,502 UART: [state] CFI Enabled
6,094,221 UART: [art] Extend RT PCRs Done
6,094,649 UART: [art] Lock RT PCRs Done
6,096,086 UART: [art] Populate DV Done
6,104,195 UART: [fht] FMC Alias Private Key: 7
6,105,349 UART: [art] Derive CDI
6,105,629 UART: [art] Store in in slot 0x4
6,191,338 UART: [art] Derive Key Pair
6,191,698 UART: [art] Store priv key in slot 0x5
6,205,368 UART: [art] Derive Key Pair - Done
6,220,111 UART: [art] Signing Cert with AUTHO
6,220,591 UART: RITY.KEYID = 7
6,235,635 UART: [art] Erasing AUTHORITY.KEYID = 7
6,236,400 UART: [art] PUB.X = E6A99F8EA8D721EFF229F185BAA5FEB4C0F142F8042DD1EDEC45F2BCF7D081FF673978F17A5D6F9935EAEB361AAD48C9
6,243,193 UART: [art] PUB.Y = 8D14D15D0D0B577815C0B26C718D88CF465EFB92F0687BC338C68A8A38D0B58F49B9D3175AB9CDFF528506E0E9D43B0A
6,250,141 UART: [art] SIG.R = A00FF6648F428A5C6087969FF4CE06E8A47BEC6631C9798926E1B0E0D964A73563A52CF4FAC1E88D61250E329DE73649
6,256,904 UART: [art] SIG.S = 8A8D5C90319D697CA6580CFB9980B74052874FCC1EFE11093051F2A3E1276ED082F65C390B9250A0FDC4133D08BA72A1
6,280,525 UART: Caliptra RT
6,280,870 UART: [state] CFI Enabled
6,562,198 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,592,835 UART: [rt]cmd =0x41545348, len=116
6,594,696 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,325 UART:
192,686 UART: Running Caliptra ROM ...
193,880 UART:
194,032 UART: [state] CFI Enabled
261,233 UART: [state] LifecycleState = Unprovisioned
263,206 UART: [state] DebugLocked = No
265,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,737 UART: [kat] SHA2-256
440,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,935 UART: [kat] ++
451,540 UART: [kat] sha1
461,117 UART: [kat] SHA2-256
463,812 UART: [kat] SHA2-384
468,879 UART: [kat] SHA2-512-ACC
471,256 UART: [kat] ECC-384
2,766,854 UART: [kat] HMAC-384Kdf
2,778,630 UART: [kat] LMS
3,968,914 UART: [kat] --
3,972,586 UART: [cold-reset] ++
3,975,078 UART: [fht] Storing FHT @ 0x50003400
3,985,720 UART: [idev] ++
3,986,288 UART: [idev] CDI.KEYID = 6
3,987,319 UART: [idev] SUBJECT.KEYID = 7
3,988,493 UART: [idev] UDS.KEYID = 0
3,989,593 ready_for_fw is high
3,989,809 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,132,834 UART: [idev] Erasing UDS.KEYID = 0
7,326,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,766 UART: [idev] --
7,352,163 UART: [ldev] ++
7,352,735 UART: [ldev] CDI.KEYID = 6
7,353,699 UART: [ldev] SUBJECT.KEYID = 5
7,354,910 UART: [ldev] AUTHORITY.KEYID = 7
7,356,063 UART: [ldev] FE.KEYID = 1
7,400,493 UART: [ldev] Erasing FE.KEYID = 1
10,730,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,489 UART: [ldev] --
13,095,152 UART: [fwproc] Waiting for Commands...
13,097,932 UART: [fwproc] Received command 0x46574c44
13,100,123 UART: [fwproc] Received Image of size 113760 bytes
17,156,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,615,406 >>> mbox cmd response: success
17,619,319 UART: [afmc] ++
17,619,931 UART: [afmc] CDI.KEYID = 6
17,620,955 UART: [afmc] SUBJECT.KEYID = 7
17,622,120 UART: [afmc] AUTHORITY.KEYID = 5
20,987,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,350 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,771 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,601 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,093 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,677 UART: [afmc] --
23,358,735 UART: [cold-reset] --
23,363,459 UART: [state] Locking Datavault
23,369,244 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,947 UART: [state] Locking ICCM
23,372,578 UART: [exit] Launching FMC @ 0x40000130
23,380,917 UART:
23,381,152 UART: Running Caliptra FMC ...
23,382,252 UART:
23,382,415 UART: [state] CFI Enabled
23,449,980 UART: [fht] FMC Alias Private Key: 7
25,788,460 UART: [art] Extend RT PCRs Done
25,789,673 UART: [art] Lock RT PCRs Done
25,791,570 UART: [art] Populate DV Done
25,797,029 UART: [fht] FMC Alias Private Key: 7
25,798,567 UART: [art] Derive CDI
25,799,381 UART: [art] Store in in slot 0x4
25,858,149 UART: [art] Derive Key Pair
25,859,184 UART: [art] Store priv key in slot 0x5
29,151,706 UART: [art] Derive Key Pair - Done
29,164,534 UART: [art] Signing Cert with AUTHO
29,165,853 UART: RITY.KEYID = 7
31,453,884 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,387 UART: [art] PUB.X = 6D523FC6DF24E6B039D62301E7B8D6B0EE0F7C477C610AF3BBF95BAD556A80684E43D17AACDC6CB3DDD246302D212904
31,462,684 UART: [art] PUB.Y = 1A8BB709311785B8342570FC20E2AD7A4CDEFFAD93A0122DD85DED37E0E10F7C68721EAE4655A768F3FCF8DC4469AF57
31,469,960 UART: [art] SIG.R = 0031DBDC16E314ED7C63D400A24AD7E285CE3E592B7E4575DD6B90D4A57AFCCCCB239E8B5F4259C88641E3264C894774
31,477,289 UART: [art] SIG.S = ED197F5822DFF682AB93D1DCECB6114B25042B7BF18C098EFD03F663BBB62D4FB3BF8F32320A72B8230C7B1D85512FF1
32,782,915 UART: Caliptra RT
32,783,619 UART: [state] CFI Enabled
32,963,810 UART: [rt] RT listening for mailbox commands...
32,966,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,997,542 UART: [rt]cmd =0x41545348, len=116
32,999,645 >>> mbox cmd response data (12 bytes)
35,050,632 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,151,034 UART:
35,151,389 UART: Running Caliptra ROM ...
35,152,565 UART:
35,152,738 UART: [state] CFI Enabled
35,208,028 UART: [state] LifecycleState = Unprovisioned
35,209,978 UART: [state] DebugLocked = No
35,211,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,217,139 UART: [kat] SHA2-256
35,386,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,397,319 UART: [kat] ++
35,397,806 UART: [kat] sha1
35,408,967 UART: [kat] SHA2-256
35,411,661 UART: [kat] SHA2-384
35,417,863 UART: [kat] SHA2-512-ACC
35,420,245 UART: [kat] ECC-384
37,710,380 UART: [kat] HMAC-384Kdf
37,721,860 UART: [kat] LMS
38,912,182 UART: [kat] --
38,915,680 UART: [update-reset] ++
42,619,317 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,622,780 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,880,306 >>> mbox cmd response: success
42,880,652 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,882,180 UART: [update-reset] Copying MAN_2 To MAN_1
42,904,612 UART: [update-reset Success] --
42,909,967 UART: [state] Locking Datavault
42,913,162 UART: [state] Locking PCR0, PCR1 and PCR31
42,914,922 UART: [state] Locking ICCM
42,916,101 UART: [exit] Launching FMC @ 0x40000130
42,924,550 UART:
42,924,781 UART: Running Caliptra FMC ...
42,925,901 UART:
42,926,062 UART: [state] CFI Enabled
43,024,437 UART: [art] Extend RT PCRs Done
43,025,620 UART: [art] Lock RT PCRs Done
43,026,859 UART: [art] Populate DV Done
43,032,317 UART: [fht] FMC Alias Private Key: 7
43,033,920 UART: [art] Derive CDI
43,034,736 UART: [art] Store in in slot 0x4
43,093,749 UART: [art] Derive Key Pair
43,094,784 UART: [art] Store priv key in slot 0x5
46,388,254 UART: [art] Derive Key Pair - Done
46,401,316 UART: [art] Signing Cert with AUTHO
46,402,630 UART: RITY.KEYID = 7
48,690,221 UART: [art] Erasing AUTHORITY.KEYID = 7
48,691,730 UART: [art] PUB.X = 5A33490953BD62CAEFC9BD7C405248A59941A51610CF52E01CC39445A7A67894D127A83C7414FB189B699517DED61421
48,698,938 UART: [art] PUB.Y = 7232229703D24F00CF85590403AA89CDC4E35EE0306E87730232AC146DFCA2E9A22A1136BE49E9E26A2BC278F6EA2B40
48,706,199 UART: [art] SIG.R = 90681EC150F02E04DC774D41D1313E2C4623E21672E9A1D6EA6C3AC68733674B96CCD50B6F55BB752A51DCCE5ED61185
48,713,596 UART: [art] SIG.S = 0C9736FC9AF0EAD8ABC55D788566FC560C6CDC37580E23147B90FE31CE6D22DDE19B02FEE07BCC558DF7353DC6451F7C
50,018,243 UART: mbox::rt_entry...
50,019,215 UART: ____ _ _ _ ____ _____
50,021,203 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,023,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,025,154 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,027,093 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,029,034 UART: |_|
50,029,850 UART:
50,313,528 UART: [rt] Runtime listening for mailbox commands...
50,315,646 >>> mbox cmd response data (48 bytes)
50,316,231 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,318,554 >>> mbox cmd response data (48 bytes)
50,319,420 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,332,011 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,782,116 ready_for_fw is high
3,782,747 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,850,911 >>> mbox cmd response: success
23,546,605 UART:
23,547,000 UART: Running Caliptra FMC ...
23,548,118 UART:
23,548,277 UART: [state] CFI Enabled
23,617,155 UART: [fht] FMC Alias Private Key: 7
25,955,558 UART: [art] Extend RT PCRs Done
25,956,783 UART: [art] Lock RT PCRs Done
25,958,607 UART: [art] Populate DV Done
25,963,968 UART: [fht] FMC Alias Private Key: 7
25,965,561 UART: [art] Derive CDI
25,966,300 UART: [art] Store in in slot 0x4
26,026,691 UART: [art] Derive Key Pair
26,027,741 UART: [art] Store priv key in slot 0x5
29,320,422 UART: [art] Derive Key Pair - Done
29,333,169 UART: [art] Signing Cert with AUTHO
29,334,513 UART: RITY.KEYID = 7
31,622,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,256 UART: [art] PUB.X = 6F5D0D277D3B00E0293871DB3C46C2F949EBFF1E042BA30FFD944DEACA8E20AEECD22415773B3E8D3101120D5DFD5C65
31,631,515 UART: [art] PUB.Y = 904E05445125484D2FA323EB22C67833F21D108181388851F4ADDDE1931ACA81F7FF5A64DF82817C8F553145689DDBEE
31,638,763 UART: [art] SIG.R = 587D757BAA777DB610D833C279CF6817E424647A3DF841F802EE2EEBF39B5AE8BB9015EDFD7A603E41864E0B6D07E328
31,646,164 UART: [art] SIG.S = AF2498BD320582379254E98B5A652E25FA1FDAC2AD586860503F1CD37DA19D891452FB60283225607B0A6DDD9CAA078E
32,951,059 UART: Caliptra RT
32,951,783 UART: [state] CFI Enabled
33,112,695 UART: [rt] RT listening for mailbox commands...
33,115,034 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,146,234 UART: [rt]cmd =0x41545348, len=116
33,148,504 >>> mbox cmd response data (12 bytes)
35,199,986 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,153,615 >>> mbox cmd response: success
43,154,106 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,187,834 UART:
43,188,160 UART: Running Caliptra FMC ...
43,189,204 UART:
43,189,354 UART: [state] CFI Enabled
43,279,768 UART: [art] Extend RT PCRs Done
43,280,960 UART: [art] Lock RT PCRs Done
43,282,427 UART: [art] Populate DV Done
43,288,004 UART: [fht] FMC Alias Private Key: 7
43,289,765 UART: [art] Derive CDI
43,290,505 UART: [art] Store in in slot 0x4
43,349,375 UART: [art] Derive Key Pair
43,350,421 UART: [art] Store priv key in slot 0x5
46,643,146 UART: [art] Derive Key Pair - Done
46,656,033 UART: [art] Signing Cert with AUTHO
46,657,346 UART: RITY.KEYID = 7
48,943,979 UART: [art] Erasing AUTHORITY.KEYID = 7
48,945,486 UART: [art] PUB.X = F1CA567C0825957B20F1FCD566630B92FAB74D345AEBA6A5DA192BE1B391D725F773E166790B95644674E152DDAADE9F
48,952,742 UART: [art] PUB.Y = DC7BB852CE83BA1BE0280C8E9FDC888DC1C246E0D28A7DB3C90B63FE32171562E814E00D99ADE2CDB4136A1FDDB1BC5E
48,960,027 UART: [art] SIG.R = 33A6AFA5F7FD5A8CC8ECFC41477CA0112BCB1C479B0BF65899297A2A571DB0E9081A15A140BC9CF7299D3DAB86CDC87D
48,967,426 UART: [art] SIG.S = 4A0556D2D2801559883DC89DA7ABC72522606E0DD90769699974C4B21ED89DE5BD1AAA898976B8B67FE77B80EAE8AD8E
50,272,167 UART: mbox::rt_entry...
50,273,132 UART: ____ _ _ _ ____ _____
50,275,064 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,277,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,278,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,280,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,282,742 UART: |_|
50,283,625 UART:
50,567,198 UART: [rt] Runtime listening for mailbox commands...
50,569,341 >>> mbox cmd response data (48 bytes)
50,569,900 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,572,223 >>> mbox cmd response data (48 bytes)
50,573,085 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,585,637 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
192,899 UART:
193,274 UART: Running Caliptra ROM ...
194,416 UART:
604,175 UART: [state] CFI Enabled
620,055 UART: [state] LifecycleState = Unprovisioned
621,936 UART: [state] DebugLocked = No
624,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,013 UART: [kat] SHA2-256
798,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,246 UART: [kat] ++
809,793 UART: [kat] sha1
820,874 UART: [kat] SHA2-256
823,587 UART: [kat] SHA2-384
829,639 UART: [kat] SHA2-512-ACC
832,007 UART: [kat] ECC-384
3,116,707 UART: [kat] HMAC-384Kdf
3,127,265 UART: [kat] LMS
4,317,370 UART: [kat] --
4,321,879 UART: [cold-reset] ++
4,323,666 UART: [fht] Storing FHT @ 0x50003400
4,335,848 UART: [idev] ++
4,336,414 UART: [idev] CDI.KEYID = 6
4,337,293 UART: [idev] SUBJECT.KEYID = 7
4,338,603 UART: [idev] UDS.KEYID = 0
4,339,632 ready_for_fw is high
4,339,851 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,834 UART: [idev] Erasing UDS.KEYID = 0
7,625,636 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,790 UART: [idev] --
7,651,714 UART: [ldev] ++
7,652,288 UART: [ldev] CDI.KEYID = 6
7,653,251 UART: [ldev] SUBJECT.KEYID = 5
7,654,456 UART: [ldev] AUTHORITY.KEYID = 7
7,655,733 UART: [ldev] FE.KEYID = 1
7,666,911 UART: [ldev] Erasing FE.KEYID = 1
10,957,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,700 UART: [ldev] --
13,320,263 UART: [fwproc] Waiting for Commands...
13,322,998 UART: [fwproc] Received command 0x46574c44
13,325,187 UART: [fwproc] Received Image of size 113760 bytes
17,371,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,834,715 >>> mbox cmd response: success
17,838,321 UART: [afmc] ++
17,838,921 UART: [afmc] CDI.KEYID = 6
17,839,827 UART: [afmc] SUBJECT.KEYID = 7
17,841,099 UART: [afmc] AUTHORITY.KEYID = 5
21,159,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,396 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,707 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,079 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,897 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,346 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,046 UART: [afmc] --
23,524,242 UART: [cold-reset] --
23,527,071 UART: [state] Locking Datavault
23,533,721 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,418 UART: [state] Locking ICCM
23,536,862 UART: [exit] Launching FMC @ 0x40000130
23,545,264 UART:
23,545,503 UART: Running Caliptra FMC ...
23,546,603 UART:
23,546,757 UART: [state] CFI Enabled
23,555,177 UART: [fht] FMC Alias Private Key: 7
25,885,913 UART: [art] Extend RT PCRs Done
25,887,129 UART: [art] Lock RT PCRs Done
25,888,882 UART: [art] Populate DV Done
25,894,016 UART: [fht] FMC Alias Private Key: 7
25,895,604 UART: [art] Derive CDI
25,896,354 UART: [art] Store in in slot 0x4
25,939,156 UART: [art] Derive Key Pair
25,940,153 UART: [art] Store priv key in slot 0x5
29,183,137 UART: [art] Derive Key Pair - Done
29,196,073 UART: [art] Signing Cert with AUTHO
29,197,372 UART: RITY.KEYID = 7
31,476,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,383 UART: [art] PUB.X = 8D1057E765269857A9A8A4C1DB0AD65EEC9155C8369EB291CF12DBF1F6D6FF74412E4674141480E9FDAA57577213E792
31,485,447 UART: [art] PUB.Y = 98FC77882E649080B2B180509BA19D7269D5581182FD0DD787B88A23FE1405FECA2B03560988439C46FC62FE800584C8
31,492,651 UART: [art] SIG.R = 0A72B40337B144E2E3936453708DE5EF663BF11B47100690D2C3280F5193654B715D0AB350ADC7AD15B52D83E7DA05FA
31,500,014 UART: [art] SIG.S = DFBF40D6C730C74D54A28EA22BEC028EFC21B5A05AB0D860399628DA5ED50DD68424B173664B6192F91DF90A20DB2252
32,804,857 UART: Caliptra RT
32,805,554 UART: [state] CFI Enabled
32,923,702 UART: [rt] RT listening for mailbox commands...
32,926,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,956,920 UART: [rt]cmd =0x41545348, len=116
32,959,197 >>> mbox cmd response data (12 bytes)
35,009,199 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,109,869 UART:
35,110,215 UART: Running Caliptra ROM ...
35,111,255 UART:
35,111,464 UART: [state] CFI Enabled
35,126,435 UART: [state] LifecycleState = Unprovisioned
35,128,329 UART: [state] DebugLocked = No
35,130,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,135,737 UART: [kat] SHA2-256
35,305,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,315,979 UART: [kat] ++
35,316,449 UART: [kat] sha1
35,326,217 UART: [kat] SHA2-256
35,328,960 UART: [kat] SHA2-384
35,335,491 UART: [kat] SHA2-512-ACC
35,337,890 UART: [kat] ECC-384
37,624,236 UART: [kat] HMAC-384Kdf
37,636,701 UART: [kat] LMS
38,826,770 UART: [kat] --
38,830,919 UART: [update-reset] ++
42,530,259 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,534,258 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,791,834 >>> mbox cmd response: success
42,792,207 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,793,249 UART: [update-reset] Copying MAN_2 To MAN_1
42,815,680 UART: [update-reset Success] --
42,819,909 UART: [state] Locking Datavault
42,822,795 UART: [state] Locking PCR0, PCR1 and PCR31
42,824,553 UART: [state] Locking ICCM
42,825,889 UART: [exit] Launching FMC @ 0x40000130
42,834,337 UART:
42,834,575 UART: Running Caliptra FMC ...
42,835,674 UART:
42,835,828 UART: [state] CFI Enabled
42,879,683 UART: [art] Extend RT PCRs Done
42,880,871 UART: [art] Lock RT PCRs Done
42,882,212 UART: [art] Populate DV Done
42,887,449 UART: [fht] FMC Alias Private Key: 7
42,889,108 UART: [art] Derive CDI
42,889,922 UART: [art] Store in in slot 0x4
42,932,762 UART: [art] Derive Key Pair
42,933,788 UART: [art] Store priv key in slot 0x5
46,175,769 UART: [art] Derive Key Pair - Done
46,188,947 UART: [art] Signing Cert with AUTHO
46,190,256 UART: RITY.KEYID = 7
48,469,698 UART: [art] Erasing AUTHORITY.KEYID = 7
48,471,207 UART: [art] PUB.X = 43A38804CA96E22C1F544AA580A4266D124B6EDC955A7008767A9490B16D1377999DB17C1241F2B854D9E05150EB4EE6
48,478,485 UART: [art] PUB.Y = A699C0CBF83E282E30ADDC2D38F81792B2F8BF847DFD524EC862A6990E912FF8639F5BAB49680FB53B6E4DAFD1DBED26
48,485,737 UART: [art] SIG.R = 2C935DBF46DE9C6076D06BB0B4F47C916C1820ED321368E9F34B23AA27935AC2772E9E4AC7273029E877CB35458F3F31
48,493,092 UART: [art] SIG.S = 488CDAC5855883B60378268929F2930C902C68BD7D5E33BFCA04A9ADA47C9AFBB1ED7B8F1BFAF56987A6BE83B6B6710C
49,797,372 UART: mbox::rt_entry...
49,798,564 UART: ____ _ _ _ ____ _____
49,800,568 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,802,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,804,420 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,806,338 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,808,213 UART: |_|
49,809,093 UART:
50,094,219 UART: [rt] Runtime listening for mailbox commands...
50,096,372 >>> mbox cmd response data (48 bytes)
50,096,981 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,099,300 >>> mbox cmd response data (48 bytes)
50,100,162 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,112,702 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
4,128,974 ready_for_fw is high
4,129,556 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,774 >>> mbox cmd response: success
23,711,359 UART:
23,711,761 UART: Running Caliptra FMC ...
23,712,877 UART:
23,713,026 UART: [state] CFI Enabled
23,721,300 UART: [fht] FMC Alias Private Key: 7
26,052,202 UART: [art] Extend RT PCRs Done
26,053,449 UART: [art] Lock RT PCRs Done
26,055,264 UART: [art] Populate DV Done
26,060,365 UART: [fht] FMC Alias Private Key: 7
26,061,855 UART: [art] Derive CDI
26,062,592 UART: [art] Store in in slot 0x4
26,105,251 UART: [art] Derive Key Pair
26,106,290 UART: [art] Store priv key in slot 0x5
29,347,907 UART: [art] Derive Key Pair - Done
29,361,008 UART: [art] Signing Cert with AUTHO
29,362,312 UART: RITY.KEYID = 7
31,641,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,364 UART: [art] PUB.X = 020F096C24AC0318B13995F67CD14E3501E5CF29D2951D772CCE9E8D7F1613C64409D4C9C1D2CE3E043B7D299D884DAA
31,650,609 UART: [art] PUB.Y = 7EC989FACB0CBF5A477D7E4430624E1AA42106C07C75B679BA15871DF21F003D4997ADB2E348D05CE013993E8E70E6AA
31,657,846 UART: [art] SIG.R = 90B1482CE00FBEF7EE0AAE3B234A9303705ECDAA22B2D7CF85803100AD06E6DFE1F52661FACF2667B9944CFD108010F4
31,665,236 UART: [art] SIG.S = 031D164E2ED689B56E04571245E79A6DEE71DFE315DE48527F7FEF11C60CBEED498D6C82C432B46784D69DDCF4766406
32,970,419 UART: Caliptra RT
32,971,153 UART: [state] CFI Enabled
33,088,332 UART: [rt] RT listening for mailbox commands...
33,090,697 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,121,391 UART: [rt]cmd =0x41545348, len=116
33,123,549 >>> mbox cmd response data (12 bytes)
35,179,659 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,062,041 >>> mbox cmd response: success
43,062,559 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,098,604 UART:
43,098,898 UART: Running Caliptra FMC ...
43,099,934 UART:
43,100,084 UART: [state] CFI Enabled
43,143,705 UART: [art] Extend RT PCRs Done
43,144,897 UART: [art] Lock RT PCRs Done
43,146,455 UART: [art] Populate DV Done
43,152,033 UART: [fht] FMC Alias Private Key: 7
43,153,575 UART: [art] Derive CDI
43,154,307 UART: [art] Store in in slot 0x4
43,197,063 UART: [art] Derive Key Pair
43,198,061 UART: [art] Store priv key in slot 0x5
46,440,363 UART: [art] Derive Key Pair - Done
46,453,639 UART: [art] Signing Cert with AUTHO
46,454,941 UART: RITY.KEYID = 7
48,734,271 UART: [art] Erasing AUTHORITY.KEYID = 7
48,735,782 UART: [art] PUB.X = 8A4621CAF58B4C6A58411B89C1C06A03CEF0F258538B68473B2AF95D75B631E92E673281D43C2160AEBA584D1DB041F3
48,743,009 UART: [art] PUB.Y = 50AEE92B0BFFC41D4EFC37A7F33865C57C1D8943AE7B8A1F25AF543B5E6A197ABA2510C31196AEB6CA02C53F510D527D
48,750,237 UART: [art] SIG.R = 07EFED3BC34AC3E2A65BA515DBA5EEA5CF318FD9BEFF484BCB0892FAAFA85BFFBCFE49289200C44BEE54F46BAAD38005
48,757,666 UART: [art] SIG.S = C78FF64B29035F3028FA0ABF8005BA52DB3C992E0FE6207BD3669C86276932518737FCB1C7CD50B6BC524B8685D4C279
50,061,895 UART: mbox::rt_entry...
50,062,868 UART: ____ _ _ _ ____ _____
50,064,801 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,066,807 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,068,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,070,602 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,072,456 UART: |_|
50,073,280 UART:
50,357,651 UART: [rt] Runtime listening for mailbox commands...
50,359,809 >>> mbox cmd response data (48 bytes)
50,360,393 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,362,710 >>> mbox cmd response data (48 bytes)
50,363,568 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,376,114 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,642 UART:
193,016 UART: Running Caliptra ROM ...
194,225 UART:
194,377 UART: [state] CFI Enabled
265,523 UART: [state] LifecycleState = Unprovisioned
267,441 UART: [state] DebugLocked = No
270,329 UART: [state] WD Timer not started. Device not locked for debugging
274,859 UART: [kat] SHA2-256
454,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,596 UART: [kat] ++
466,129 UART: [kat] sha1
477,175 UART: [kat] SHA2-256
480,164 UART: [kat] SHA2-384
487,083 UART: [kat] SHA2-512-ACC
490,032 UART: [kat] ECC-384
2,948,624 UART: [kat] HMAC-384Kdf
2,972,005 UART: [kat] LMS
3,501,460 UART: [kat] --
3,505,615 UART: [cold-reset] ++
3,508,057 UART: [fht] FHT @ 0x50003400
3,518,276 UART: [idev] ++
3,518,879 UART: [idev] CDI.KEYID = 6
3,519,786 UART: [idev] SUBJECT.KEYID = 7
3,520,959 UART: [idev] UDS.KEYID = 0
3,521,882 ready_for_fw is high
3,522,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,462 UART: [idev] Erasing UDS.KEYID = 0
6,028,614 UART: [idev] Sha1 KeyId Algorithm
6,051,737 UART: [idev] --
6,055,188 UART: [ldev] ++
6,055,757 UART: [ldev] CDI.KEYID = 6
6,056,817 UART: [ldev] SUBJECT.KEYID = 5
6,057,938 UART: [ldev] AUTHORITY.KEYID = 7
6,059,113 UART: [ldev] FE.KEYID = 1
6,099,904 UART: [ldev] Erasing FE.KEYID = 1
8,602,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,520 UART: [ldev] --
10,391,977 UART: [fwproc] Wait for Commands...
10,395,025 UART: [fwproc] Recv command 0x46574c44
10,397,125 UART: [fwproc] Recv'd Img size: 114084 bytes
13,796,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,381 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,257,139 >>> mbox cmd response: success
14,261,556 UART: [afmc] ++
14,262,153 UART: [afmc] CDI.KEYID = 6
14,263,063 UART: [afmc] SUBJECT.KEYID = 7
14,264,220 UART: [afmc] AUTHORITY.KEYID = 5
16,810,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,725 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,204 UART: [afmc] --
18,608,662 UART: [cold-reset] --
18,611,974 UART: [state] Locking Datavault
18,617,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,342 UART: [state] Locking ICCM
18,621,919 UART: [exit] Launching FMC @ 0x40000130
18,630,339 UART:
18,630,757 UART: Running Caliptra FMC ...
18,631,893 UART:
18,632,057 UART: [state] CFI Enabled
18,692,258 UART: [fht] FMC Alias Private Key: 7
20,455,855 UART: [art] Extend RT PCRs Done
20,457,075 UART: [art] Lock RT PCRs Done
20,458,675 UART: [art] Populate DV Done
20,464,029 UART: [fht] FMC Alias Private Key: 7
20,465,616 UART: [art] Derive CDI
20,466,421 UART: [art] Store in in slot 0x4
20,524,489 UART: [art] Derive Key Pair
20,525,526 UART: [art] Store priv key in slot 0x5
22,988,566 UART: [art] Derive Key Pair - Done
23,001,560 UART: [art] Signing Cert with AUTHO
23,002,859 UART: RITY.KEYID = 7
24,714,780 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,284 UART: [art] PUB.X = 18E0A4758906C667F9567BD87256746F757ABE69EB9EFAF1D96A64B5FDB809D79A0592F9DE1C6E633E4E272A5B41A708
24,723,546 UART: [art] PUB.Y = 81ED7D193311A81763C8FEC1FEE40B9AE02EDB1A4D49002B5903E746176B195BC8E5DCFBAFD637114FACB23CE889B695
24,730,817 UART: [art] SIG.R = FB3DD8E02D3E2F89E906913B441E3ED7243F79A53CBAA30908B66BCAD39C2D2F2167D97C3E40B602B026F9D43FA328F5
24,738,178 UART: [art] SIG.S = 64A5BD8C0DB40CC1C028431341A3E45E2F5F9788B8139BA69F50066C05694709F257A439F954757DE343A1B5ABF7B38D
25,716,971 UART: Caliptra RT
25,717,670 UART: [state] CFI Enabled
25,882,901 UART: [rt] RT listening for mailbox commands...
25,885,011 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,916,332 UART: [rt]cmd =0x41545348, len=116
25,918,571 >>> mbox cmd response data (12 bytes)
27,967,658 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,068,046 UART:
28,068,417 UART: Running Caliptra ROM ...
28,069,544 UART:
28,069,712 UART: [state] CFI Enabled
28,123,612 UART: [state] LifecycleState = Unprovisioned
28,125,522 UART: [state] DebugLocked = No
28,127,396 UART: [state] WD Timer not started. Device not locked for debugging
28,131,523 UART: [kat] SHA2-256
28,310,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,322,187 UART: [kat] ++
28,322,725 UART: [kat] sha1
28,332,912 UART: [kat] SHA2-256
28,335,910 UART: [kat] SHA2-384
28,341,952 UART: [kat] SHA2-512-ACC
28,344,891 UART: [kat] ECC-384
30,792,012 UART: [kat] HMAC-384Kdf
30,812,251 UART: [kat] LMS
31,341,674 UART: [kat] --
31,346,796 UART: [update-reset] ++
34,334,195 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,337,299 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,594,612 >>> mbox cmd response: success
34,594,983 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,596,449 UART: [update-reset] Copying MAN_2 To MAN_1
34,618,778 UART: [update-reset Success] --
34,623,547 UART: [state] Locking Datavault
34,626,901 UART: [state] Locking PCR0, PCR1 and PCR31
34,628,604 UART: [state] Locking ICCM
34,630,802 UART: [exit] Launching FMC @ 0x40000130
34,639,126 UART:
34,639,362 UART: Running Caliptra FMC ...
34,640,458 UART:
34,640,634 UART: [state] CFI Enabled
34,727,367 UART: [art] Extend RT PCRs Done
34,728,553 UART: [art] Lock RT PCRs Done
34,730,273 UART: [art] Populate DV Done
34,735,727 UART: [fht] FMC Alias Private Key: 7
34,737,414 UART: [art] Derive CDI
34,738,225 UART: [art] Store in in slot 0x4
34,796,683 UART: [art] Derive Key Pair
34,797,729 UART: [art] Store priv key in slot 0x5
37,260,643 UART: [art] Derive Key Pair - Done
37,273,398 UART: [art] Signing Cert with AUTHO
37,274,742 UART: RITY.KEYID = 7
38,986,481 UART: [art] Erasing AUTHORITY.KEYID = 7
38,987,988 UART: [art] PUB.X = 3F32D7480867394E28E8F6E4389F855379889FFD0753BBD818923613B2A2285AE2095E386039DC1BD45CF1934482BEC6
38,995,224 UART: [art] PUB.Y = 73803D4CAA91F79F2FD75280E6E9AD8DDCDC0CB0C23AFD5A8B737302F05C868359E42EFF690F83E5679ED3D24BE610F7
39,002,488 UART: [art] SIG.R = 4F23C0A2A9B48950E9F1B85F992F2B819E11B4D46C088ABA053278173C0F97CF00F4051791C686A96FFEDFA0B6B0A2CB
39,009,871 UART: [art] SIG.S = DC4FBEDABC24196AC36E6393F82F09E8243B4F3B4EBD7562EA647C719B2ACC7BD8335FB39767349123C4AACC2078B466
39,987,676 UART: mbox::rt_entry...
39,988,631 UART: ____ _ _ _ ____ _____
39,990,560 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,992,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,994,708 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,996,634 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,998,557 UART: |_|
39,999,389 UART:
40,288,291 UART: [rt] Runtime listening for mailbox commands...
40,290,433 >>> mbox cmd response data (48 bytes)
40,291,017 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,293,334 >>> mbox cmd response data (48 bytes)
40,294,193 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,306,731 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,360,741 ready_for_fw is high
3,361,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,043,629 >>> mbox cmd response: success
18,323,058 UART:
18,323,474 UART: Running Caliptra FMC ...
18,324,603 UART:
18,324,754 UART: [state] CFI Enabled
18,388,545 UART: [fht] FMC Alias Private Key: 7
20,152,108 UART: [art] Extend RT PCRs Done
20,153,327 UART: [art] Lock RT PCRs Done
20,154,656 UART: [art] Populate DV Done
20,159,860 UART: [fht] FMC Alias Private Key: 7
20,161,456 UART: [art] Derive CDI
20,162,203 UART: [art] Store in in slot 0x4
20,221,256 UART: [art] Derive Key Pair
20,222,302 UART: [art] Store priv key in slot 0x5
22,685,239 UART: [art] Derive Key Pair - Done
22,698,066 UART: [art] Signing Cert with AUTHO
22,699,562 UART: RITY.KEYID = 7
24,410,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,488 UART: [art] PUB.X = 26257BE8144814DFED37CED24506198A2BD20D88258897844C0FA523E044210EC35B7A8D29B98182EA0AFADFAFF42543
24,419,739 UART: [art] PUB.Y = A1B024B615C703B7459B5B23469D2475D309FBB669639B25065D9B1C2A15C8DE909800C00E19EE906D99DDB92D8EC80F
24,426,942 UART: [art] SIG.R = 58E5D375397FED45A377C614B50F9F0137FFF4A536D744EBF9286FC497132593E43D7E73953BFBBD65335837620AC5F2
24,434,307 UART: [art] SIG.S = B427EBBE7F154199C35A50364C8F55ED6E41972997673B6CD4979644588FC66EC9AEDABCC9E914EE34486D729D0A0E20
25,413,354 UART: Caliptra RT
25,414,074 UART: [state] CFI Enabled
25,580,002 UART: [rt] RT listening for mailbox commands...
25,582,335 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,613,728 UART: [rt]cmd =0x41545348, len=116
25,616,107 >>> mbox cmd response data (12 bytes)
27,665,539 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,184,189 >>> mbox cmd response: success
34,184,661 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,218,509 UART:
34,218,983 UART: Running Caliptra FMC ...
34,220,052 UART:
34,220,212 UART: [state] CFI Enabled
34,316,399 UART: [art] Extend RT PCRs Done
34,317,587 UART: [art] Lock RT PCRs Done
34,318,966 UART: [art] Populate DV Done
34,324,274 UART: [fht] FMC Alias Private Key: 7
34,325,972 UART: [art] Derive CDI
34,326,706 UART: [art] Store in in slot 0x4
34,385,346 UART: [art] Derive Key Pair
34,386,386 UART: [art] Store priv key in slot 0x5
36,849,484 UART: [art] Derive Key Pair - Done
36,862,421 UART: [art] Signing Cert with AUTHO
36,863,748 UART: RITY.KEYID = 7
38,575,098 UART: [art] Erasing AUTHORITY.KEYID = 7
38,576,625 UART: [art] PUB.X = 21F3605AEAF8304A6FFA255020F44A8DAE8280FE95457168494D89D093A413D73F9168FCAA60780D3F3BFFD91F926B3E
38,583,859 UART: [art] PUB.Y = 0374CF844A461F7A8A892B1875384B0BDA672F65C5EE2034326F4CE01FD79808D4378B2647DAE228FA26642BA6A0456A
38,591,070 UART: [art] SIG.R = 0D81C0292879386034DAFBD70D6344EDA3F4E2661CF478494056810726D5B34CF49479E4056B1EF103AD546DEE25AD77
38,598,442 UART: [art] SIG.S = C191A6C27352B20A93C1BF8A020AE21596A20B95E4C6380801A53D36A822EBC080A600C692B79B8080AD743F4D596188
39,576,767 UART: mbox::rt_entry...
39,577,708 UART: ____ _ _ _ ____ _____
39,579,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,581,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,583,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,585,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,587,453 UART: |_|
39,588,333 UART:
39,872,332 UART: [rt] Runtime listening for mailbox commands...
39,874,483 >>> mbox cmd response data (48 bytes)
39,875,044 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,877,361 >>> mbox cmd response data (48 bytes)
39,878,234 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,890,772 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
192,934 UART:
193,325 UART: Running Caliptra ROM ...
194,470 UART:
604,019 UART: [state] CFI Enabled
619,981 UART: [state] LifecycleState = Unprovisioned
621,860 UART: [state] DebugLocked = No
624,187 UART: [state] WD Timer not started. Device not locked for debugging
627,262 UART: [kat] SHA2-256
806,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,949 UART: [kat] ++
818,492 UART: [kat] sha1
830,651 UART: [kat] SHA2-256
833,656 UART: [kat] SHA2-384
840,287 UART: [kat] SHA2-512-ACC
843,221 UART: [kat] ECC-384
3,286,665 UART: [kat] HMAC-384Kdf
3,298,126 UART: [kat] LMS
3,827,623 UART: [kat] --
3,833,050 UART: [cold-reset] ++
3,834,779 UART: [fht] FHT @ 0x50003400
3,846,183 UART: [idev] ++
3,846,746 UART: [idev] CDI.KEYID = 6
3,847,657 UART: [idev] SUBJECT.KEYID = 7
3,849,060 UART: [idev] UDS.KEYID = 0
3,850,060 ready_for_fw is high
3,850,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,477 UART: [idev] Erasing UDS.KEYID = 0
6,314,844 UART: [idev] Sha1 KeyId Algorithm
6,337,497 UART: [idev] --
6,341,405 UART: [ldev] ++
6,341,984 UART: [ldev] CDI.KEYID = 6
6,342,900 UART: [ldev] SUBJECT.KEYID = 5
6,344,055 UART: [ldev] AUTHORITY.KEYID = 7
6,345,292 UART: [ldev] FE.KEYID = 1
6,357,176 UART: [ldev] Erasing FE.KEYID = 1
8,828,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,741 UART: [ldev] --
10,618,683 UART: [fwproc] Wait for Commands...
10,621,264 UART: [fwproc] Recv command 0x46574c44
10,623,357 UART: [fwproc] Recv'd Img size: 114084 bytes
14,027,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,743 >>> mbox cmd response: success
14,487,455 UART: [afmc] ++
14,488,051 UART: [afmc] CDI.KEYID = 6
14,489,135 UART: [afmc] SUBJECT.KEYID = 7
14,490,261 UART: [afmc] AUTHORITY.KEYID = 5
16,990,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,678 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,540 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,321 UART: [afmc] --
18,785,214 UART: [cold-reset] --
18,788,696 UART: [state] Locking Datavault
18,794,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,186 UART: [state] Locking ICCM
18,798,767 UART: [exit] Launching FMC @ 0x40000130
18,807,161 UART:
18,807,404 UART: Running Caliptra FMC ...
18,808,508 UART:
18,808,667 UART: [state] CFI Enabled
18,817,031 UART: [fht] FMC Alias Private Key: 7
20,573,326 UART: [art] Extend RT PCRs Done
20,574,545 UART: [art] Lock RT PCRs Done
20,576,111 UART: [art] Populate DV Done
20,581,364 UART: [fht] FMC Alias Private Key: 7
20,582,962 UART: [art] Derive CDI
20,583,781 UART: [art] Store in in slot 0x4
20,626,649 UART: [art] Derive Key Pair
20,627,650 UART: [art] Store priv key in slot 0x5
23,053,967 UART: [art] Derive Key Pair - Done
23,066,910 UART: [art] Signing Cert with AUTHO
23,068,225 UART: RITY.KEYID = 7
24,773,349 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,849 UART: [art] PUB.X = B0238A43A0B611B2EA0A657B3393797750E0D968991656DA3ECF8CBAE23DD288895B828DF64CC97C300128EC5460C891
24,782,121 UART: [art] PUB.Y = 9DB32ACE95876BA7E35BCC4ECD899B8652659BE2EC4FC754AB771D4CEA69C4B6AD9A58ABFF750B1E9E7E2F0502346BFB
24,789,430 UART: [art] SIG.R = 1011CEA6B88F302D80B82EB232777C8D963919656256BCEA3BC72CBFFA52A611208033D386702B0572F5D4425936BE1B
24,796,794 UART: [art] SIG.S = D99345DA6B656E002DBAEAC678C55A7E74E0D3A5405723B8B62140C4D1E82DDCCC94A3D415FBB45AF9BE26DD0CA3C1ED
25,775,723 UART: Caliptra RT
25,776,436 UART: [state] CFI Enabled
25,893,998 UART: [rt] RT listening for mailbox commands...
25,896,348 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,927,199 UART: [rt]cmd =0x41545348, len=116
25,929,685 >>> mbox cmd response data (12 bytes)
27,979,808 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,080,373 UART:
28,080,732 UART: Running Caliptra ROM ...
28,081,872 UART:
28,082,042 UART: [state] CFI Enabled
28,094,026 UART: [state] LifecycleState = Unprovisioned
28,095,882 UART: [state] DebugLocked = No
28,097,396 UART: [state] WD Timer not started. Device not locked for debugging
28,101,490 UART: [kat] SHA2-256
28,280,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,292,239 UART: [kat] ++
28,292,784 UART: [kat] sha1
28,304,701 UART: [kat] SHA2-256
28,307,711 UART: [kat] SHA2-384
28,312,461 UART: [kat] SHA2-512-ACC
28,315,400 UART: [kat] ECC-384
30,759,074 UART: [kat] HMAC-384Kdf
30,770,974 UART: [kat] LMS
31,300,474 UART: [kat] --
31,304,350 UART: [update-reset] ++
34,297,147 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,299,830 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,557,182 >>> mbox cmd response: success
34,557,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,557,842 UART: [update-reset] Copying MAN_2 To MAN_1
34,580,115 UART: [update-reset Success] --
34,582,928 UART: [state] Locking Datavault
34,586,890 UART: [state] Locking PCR0, PCR1 and PCR31
34,588,538 UART: [state] Locking ICCM
34,590,475 UART: [exit] Launching FMC @ 0x40000130
34,598,929 UART:
34,599,174 UART: Running Caliptra FMC ...
34,600,280 UART:
34,600,443 UART: [state] CFI Enabled
34,644,828 UART: [art] Extend RT PCRs Done
34,645,975 UART: [art] Lock RT PCRs Done
34,647,418 UART: [art] Populate DV Done
34,653,037 UART: [fht] FMC Alias Private Key: 7
34,654,613 UART: [art] Derive CDI
34,655,436 UART: [art] Store in in slot 0x4
34,698,265 UART: [art] Derive Key Pair
34,699,268 UART: [art] Store priv key in slot 0x5
37,126,618 UART: [art] Derive Key Pair - Done
37,139,650 UART: [art] Signing Cert with AUTHO
37,140,991 UART: RITY.KEYID = 7
38,846,304 UART: [art] Erasing AUTHORITY.KEYID = 7
38,847,815 UART: [art] PUB.X = D22352560DE81810A14D1ECD8BF90A871FBC12509A99A7D956304073353E6AB1274543093C1EBE675486402C06BD032D
38,855,034 UART: [art] PUB.Y = C8C5D29118F4711EB04E771026EBF26FBE4A42AF23FFA411EB6D37E6EE074285F80230D4ECE96BA5B5B0B415CF8FB97A
38,862,290 UART: [art] SIG.R = 6C7E42725FC305C130A07D221F2233651DC53DE12CB337944C0E7337C62133E0FFBE347F14351BD642CE37683C2E56B2
38,869,707 UART: [art] SIG.S = E8C8398E207951364D08A1A204EB816372DB2E0DC7C8B21D7F9D4AD732EF03F0DD8125A0E31D8C8AD17CA48E7569ED21
39,848,493 UART: mbox::rt_entry...
39,849,619 UART: ____ _ _ _ ____ _____
39,851,614 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,853,622 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,855,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,857,484 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,859,431 UART: |_|
39,860,267 UART:
40,144,271 UART: [rt] Runtime listening for mailbox commands...
40,146,423 >>> mbox cmd response data (48 bytes)
40,147,034 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,149,383 >>> mbox cmd response data (48 bytes)
40,150,307 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,162,884 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,695,633 ready_for_fw is high
3,696,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,280,039 >>> mbox cmd response: success
18,529,673 UART:
18,530,070 UART: Running Caliptra FMC ...
18,531,209 UART:
18,531,378 UART: [state] CFI Enabled
18,539,332 UART: [fht] FMC Alias Private Key: 7
20,296,020 UART: [art] Extend RT PCRs Done
20,297,258 UART: [art] Lock RT PCRs Done
20,298,933 UART: [art] Populate DV Done
20,304,514 UART: [fht] FMC Alias Private Key: 7
20,306,005 UART: [art] Derive CDI
20,306,749 UART: [art] Store in in slot 0x4
20,349,395 UART: [art] Derive Key Pair
20,350,438 UART: [art] Store priv key in slot 0x5
22,776,801 UART: [art] Derive Key Pair - Done
22,789,796 UART: [art] Signing Cert with AUTHO
22,791,288 UART: RITY.KEYID = 7
24,496,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,888 UART: [art] PUB.X = 4D9A462B2E48C9A7E9BF40729FA48AE1D34D1DC3F39D4B3FBA669385D70067DBF0868D18BE55873F44648FD83F84C9B0
24,505,167 UART: [art] PUB.Y = 019A8496A9B4DA379215F006EE1A9DE8EBDAE378080BD81B29F4D50D537B63222F0E96DA64A48E141076AB4EF29F68D2
24,512,411 UART: [art] SIG.R = 819F546E499A61BD8259DDD25268FB179FC4711EC1FF0F17C82244AB43F0E8E819E32204190A95C964E5A8A220355266
24,519,787 UART: [art] SIG.S = EC3DA9EC014F813B0AC721B45E27EF5058B6A4233EBA9FC49F6D755AEEB9597A157815F1D26F3BDDE6CB10E868B810CA
25,498,955 UART: Caliptra RT
25,499,656 UART: [state] CFI Enabled
25,616,589 UART: [rt] RT listening for mailbox commands...
25,618,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,649,539 UART: [rt]cmd =0x41545348, len=116
25,651,747 >>> mbox cmd response data (12 bytes)
27,701,346 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,139,259 >>> mbox cmd response: success
34,139,856 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,175,323 UART:
34,175,651 UART: Running Caliptra FMC ...
34,176,691 UART:
34,176,845 UART: [state] CFI Enabled
34,220,764 UART: [art] Extend RT PCRs Done
34,221,938 UART: [art] Lock RT PCRs Done
34,223,473 UART: [art] Populate DV Done
34,229,049 UART: [fht] FMC Alias Private Key: 7
34,230,706 UART: [art] Derive CDI
34,231,477 UART: [art] Store in in slot 0x4
34,274,193 UART: [art] Derive Key Pair
34,275,200 UART: [art] Store priv key in slot 0x5
36,701,868 UART: [art] Derive Key Pair - Done
36,714,869 UART: [art] Signing Cert with AUTHO
36,716,201 UART: RITY.KEYID = 7
38,421,842 UART: [art] Erasing AUTHORITY.KEYID = 7
38,423,346 UART: [art] PUB.X = 6164614A0409CF48419E5D83E3651A3D86865C747B70E25A6E4CE3E286EBDB485742729C56267BA71D35658916703B1A
38,430,568 UART: [art] PUB.Y = 34DE3A1C6284DAFA9A096C5154EBF2D8B177FDBBA7C87EC705A6999F1C72A412B6AC3818B7A32D3E0E411432E58B8132
38,437,844 UART: [art] SIG.R = 5A0876439D6D5A66C0966D2C556C6B80009E1CEA77DCE7DF7DF545BAA1B756D3B367D2B2CF762D85D9A530FAFCC91966
38,445,263 UART: [art] SIG.S = 836374F292D72D7B4BD08174C300811D3CC121915C397D5707E8A0EA5CD3E50CFAFE15B6799BABA912B07F2110EE633B
39,423,663 UART: mbox::rt_entry...
39,424,627 UART: ____ _ _ _ ____ _____
39,426,611 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,428,618 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,430,754 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,432,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,434,652 UART: |_|
39,435,646 UART:
39,719,700 UART: [rt] Runtime listening for mailbox commands...
39,721,841 >>> mbox cmd response data (48 bytes)
39,722,439 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,724,763 >>> mbox cmd response data (48 bytes)
39,725,648 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,738,197 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
192,601 UART:
192,968 UART: Running Caliptra ROM ...
194,172 UART:
194,322 UART: [state] CFI Enabled
262,826 UART: [state] LifecycleState = Unprovisioned
265,615 UART: [state] DebugLocked = No
266,731 UART: [state] WD Timer not started. Device not locked for debugging
270,711 UART: [kat] SHA2-256
460,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,364 UART: [kat] ++
471,837 UART: [kat] sha1
482,710 UART: [kat] SHA2-256
485,785 UART: [kat] SHA2-384
491,274 UART: [kat] SHA2-512-ACC
493,794 UART: [kat] ECC-384
2,946,864 UART: [kat] HMAC-384Kdf
2,972,034 UART: [kat] LMS
3,503,795 UART: [kat] --
3,507,648 UART: [cold-reset] ++
3,509,362 UART: [fht] FHT @ 0x50003400
3,522,178 UART: [idev] ++
3,522,809 UART: [idev] CDI.KEYID = 6
3,523,834 UART: [idev] SUBJECT.KEYID = 7
3,525,002 UART: [idev] UDS.KEYID = 0
3,525,931 ready_for_fw is high
3,526,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,618 UART: [idev] Erasing UDS.KEYID = 0
6,028,240 UART: [idev] Sha1 KeyId Algorithm
6,051,423 UART: [idev] --
6,055,798 UART: [ldev] ++
6,056,551 UART: [ldev] CDI.KEYID = 6
6,057,464 UART: [ldev] SUBJECT.KEYID = 5
6,058,626 UART: [ldev] AUTHORITY.KEYID = 7
6,059,802 UART: [ldev] FE.KEYID = 1
6,100,103 UART: [ldev] Erasing FE.KEYID = 1
8,604,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,280 UART: [ldev] --
10,414,578 UART: [fwproc] Wait for Commands...
10,416,879 UART: [fwproc] Recv command 0x46574c44
10,419,182 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,343 >>> mbox cmd response: success
14,606,722 UART: [afmc] ++
14,607,440 UART: [afmc] CDI.KEYID = 6
14,608,631 UART: [afmc] SUBJECT.KEYID = 7
14,610,067 UART: [afmc] AUTHORITY.KEYID = 5
17,148,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,142 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,207 UART: [afmc] --
18,947,612 UART: [cold-reset] --
18,951,961 UART: [state] Locking Datavault
18,956,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,212 UART: [state] Locking ICCM
18,961,016 UART: [exit] Launching FMC @ 0x40000130
18,969,666 UART:
18,969,895 UART: Running Caliptra FMC ...
18,970,990 UART:
18,971,146 UART: [state] CFI Enabled
19,028,965 UART: [fht] FMC Alias Private Key: 7
20,793,197 UART: [art] Extend RT PCRs Done
20,794,419 UART: [art] Lock RT PCRs Done
20,796,267 UART: [art] Populate DV Done
20,801,786 UART: [fht] FMC Alias Private Key: 7
20,803,479 UART: [art] Derive CDI
20,804,287 UART: [art] Store in in slot 0x4
20,861,857 UART: [art] Derive Key Pair
20,862,893 UART: [art] Store priv key in slot 0x5
23,325,578 UART: [art] Derive Key Pair - Done
23,338,430 UART: [art] Signing Cert with AUTHO
23,339,726 UART: RITY.KEYID = 7
25,051,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,127 UART: [art] PUB.X = 96CEB5B4B5E9B7C016D3393ABD6FD08265055DBC4EB36ADE1157A14F5551D721B2CA965CC42A7A39940F04A48E493CEA
25,060,391 UART: [art] PUB.Y = 4275FE9CC217D00E96158B4EF56B4E24C03A117ECB5AA9FC8C4428F591C9E26BCE668CEBB736FFE9411BD30F2C100975
25,067,685 UART: [art] SIG.R = A4E797FEEB9FD422C117778360827445CEEB8E25A3C82B89ACD184404637465AA40B806F2AC4C652392D01447A9DC98A
25,075,065 UART: [art] SIG.S = 3A8F3D197CE59C054D508DD7A689160371FEBC9BB537467ADB028DD33C483D06014EB14209968B3A8C89197865BFE7B9
26,053,757 UART: Caliptra RT
26,054,446 UART: [state] CFI Enabled
26,220,104 UART: [rt] RT listening for mailbox commands...
26,222,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,253,821 UART: [rt]cmd =0x41545348, len=116
26,256,069 >>> mbox cmd response data (12 bytes)
28,306,630 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,407,242 UART:
28,407,586 UART: Running Caliptra ROM ...
28,408,815 UART:
28,408,978 UART: [state] CFI Enabled
28,482,963 UART: [state] LifecycleState = Unprovisioned
28,485,029 UART: [state] DebugLocked = No
28,486,859 UART: [state] WD Timer not started. Device not locked for debugging
28,491,482 UART: [kat] SHA2-256
28,681,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,692,128 UART: [kat] ++
28,692,638 UART: [kat] sha1
28,703,688 UART: [kat] SHA2-256
28,706,708 UART: [kat] SHA2-384
28,713,614 UART: [kat] SHA2-512-ACC
28,716,212 UART: [kat] ECC-384
31,170,050 UART: [kat] HMAC-384Kdf
31,192,221 UART: [kat] LMS
31,723,788 UART: [kat] --
31,729,291 UART: [update-reset] ++
34,757,630 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,761,077 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,153,397 >>> mbox cmd response: success
35,153,772 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,154,976 UART: [update-reset] Copying MAN_2 To MAN_1
35,192,556 UART: [update-reset Success] --
35,196,731 UART: [state] Locking Datavault
35,201,560 UART: [state] Locking PCR0, PCR1 and PCR31
35,203,715 UART: [state] Locking ICCM
35,206,403 UART: [exit] Launching FMC @ 0x40000130
35,215,083 UART:
35,215,343 UART: Running Caliptra FMC ...
35,216,448 UART:
35,216,601 UART: [state] CFI Enabled
35,319,456 UART: [art] Extend RT PCRs Done
35,320,637 UART: [art] Lock RT PCRs Done
35,322,038 UART: [art] Populate DV Done
35,327,656 UART: [fht] FMC Alias Private Key: 7
35,329,400 UART: [art] Derive CDI
35,330,206 UART: [art] Store in in slot 0x4
35,388,458 UART: [art] Derive Key Pair
35,389,488 UART: [art] Store priv key in slot 0x5
37,852,218 UART: [art] Derive Key Pair - Done
37,864,786 UART: [art] Signing Cert with AUTHO
37,866,120 UART: RITY.KEYID = 7
39,577,874 UART: [art] Erasing AUTHORITY.KEYID = 7
39,579,374 UART: [art] PUB.X = A417FE2F70981C2DEC22F27B728E8C8AB483D27ACFB1D891CB5BEFA41B30BFC71628D4C628E835B9BB5EC978EC29E7BB
39,586,665 UART: [art] PUB.Y = E00D744A5EE0AD85EBEF33689101C544F806E5176EBC1DFD6D4ACDE800924450C9664D1149F18C590A3B524351ACFC71
39,593,911 UART: [art] SIG.R = B1D3219F8BE2CE020CF5E177E3973B6D43FC95A32D491AE4D6C269B10C700FD0C37F6BB8E6C21A8716AA9D32F16703A6
39,601,331 UART: [art] SIG.S = 7556EF6AC46E598C0325083E9C4EEA64C20EA6E3780831CD97768D13CA7E04E3B18FDB49904A31C5E0E315ABEC4BEA7C
40,579,801 UART: mbox::rt_entry...
40,580,744 UART: ____ _ _ _ ____ _____
40,582,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,584,941 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,586,924 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,588,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,590,801 UART: |_|
40,591,602 UART:
40,877,581 UART: [rt] Runtime listening for mailbox commands...
40,879,745 >>> mbox cmd response data (48 bytes)
40,880,318 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,882,633 >>> mbox cmd response data (48 bytes)
40,883,483 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,896,045 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
3,437,017 ready_for_fw is high
3,437,394 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,745,403 >>> mbox cmd response: success
19,022,487 UART:
19,022,911 UART: Running Caliptra FMC ...
19,024,062 UART:
19,024,225 UART: [state] CFI Enabled
19,089,913 UART: [fht] FMC Alias Private Key: 7
20,853,874 UART: [art] Extend RT PCRs Done
20,855,091 UART: [art] Lock RT PCRs Done
20,856,611 UART: [art] Populate DV Done
20,862,194 UART: [fht] FMC Alias Private Key: 7
20,863,892 UART: [art] Derive CDI
20,864,702 UART: [art] Store in in slot 0x4
20,922,457 UART: [art] Derive Key Pair
20,923,494 UART: [art] Store priv key in slot 0x5
23,386,428 UART: [art] Derive Key Pair - Done
23,399,900 UART: [art] Signing Cert with AUTHO
23,401,193 UART: RITY.KEYID = 7
25,112,355 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,872 UART: [art] PUB.X = E8BBDFA98817FA8FC74231B3F638BD7021E5D7E21032A1B9527CB04076B98F28915DBC044D613F187C6D6B44AFECE6C2
25,121,120 UART: [art] PUB.Y = E17950DFF1A75CD006A2285A77E499460FFF373371E86A37A42BE6411FAED30977EED8F7C01BB1198276613662022A90
25,128,392 UART: [art] SIG.R = 97EF28A16744A2D46C5E9A6178612134537A987CCE86D79759796A90C0A04E80FB63B2C1D4EB5775C15A819C91595ADE
25,135,746 UART: [art] SIG.S = EE4446B095967618A085175E38B0F964FE1A8978E86DC892F784887BA0D24761F52352DAF3A5A4049854E4E733B4BF5A
26,115,084 UART: Caliptra RT
26,115,779 UART: [state] CFI Enabled
26,280,197 UART: [rt] RT listening for mailbox commands...
26,282,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,314,016 UART: [rt]cmd =0x41545348, len=116
26,316,194 >>> mbox cmd response data (12 bytes)
28,365,412 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,356,273 >>> mbox cmd response: success
35,356,754 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,391,982 UART:
35,392,280 UART: Running Caliptra FMC ...
35,393,390 UART:
35,393,542 UART: [state] CFI Enabled
35,486,180 UART: [art] Extend RT PCRs Done
35,487,376 UART: [art] Lock RT PCRs Done
35,488,718 UART: [art] Populate DV Done
35,494,127 UART: [fht] FMC Alias Private Key: 7
35,495,658 UART: [art] Derive CDI
35,496,472 UART: [art] Store in in slot 0x4
35,554,952 UART: [art] Derive Key Pair
35,555,990 UART: [art] Store priv key in slot 0x5
38,018,897 UART: [art] Derive Key Pair - Done
38,031,949 UART: [art] Signing Cert with AUTHO
38,033,254 UART: RITY.KEYID = 7
39,745,116 UART: [art] Erasing AUTHORITY.KEYID = 7
39,746,615 UART: [art] PUB.X = 91772185A523B16989E95F68BE01BAA0DB88225136ED659B9298DB802E7A7E24AD64C33687D876D3FC78E16A996CFB64
39,753,927 UART: [art] PUB.Y = 75279D9AFAC65FFC24DE1DC0B13CADAD94157DD27DA8539227F776C0D4FF4044FDE977CDD44067CB57005570D05C68AD
39,761,153 UART: [art] SIG.R = 4432985E683EB36AFF76784E95BA1DA6C912947FD0749812284C27C594F73175DED1011E1D431222487A0212542E1E32
39,768,530 UART: [art] SIG.S = 5A90E200395EB58276866A9CF48D9F6FD14B5BE282FD0E15C79234B191D297C6BE3EF7A89237477AC7673098A556166C
40,747,492 UART: mbox::rt_entry...
40,748,437 UART: ____ _ _ _ ____ _____
40,750,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,752,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,754,408 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,756,272 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,758,193 UART: |_|
40,758,997 UART:
41,047,986 UART: [rt] Runtime listening for mailbox commands...
41,050,128 >>> mbox cmd response data (48 bytes)
41,050,696 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,053,034 >>> mbox cmd response data (48 bytes)
41,053,925 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,066,464 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,702 writing to cptra_bootfsm_go
193,019 UART:
193,402 UART: Running Caliptra ROM ...
194,559 UART:
604,141 UART: [state] CFI Enabled
619,493 UART: [state] LifecycleState = Unprovisioned
621,865 UART: [state] DebugLocked = No
624,530 UART: [state] WD Timer not started. Device not locked for debugging
629,877 UART: [kat] SHA2-256
819,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,499 UART: [kat] ++
831,103 UART: [kat] sha1
841,201 UART: [kat] SHA2-256
844,207 UART: [kat] SHA2-384
850,126 UART: [kat] SHA2-512-ACC
852,778 UART: [kat] ECC-384
3,294,565 UART: [kat] HMAC-384Kdf
3,307,167 UART: [kat] LMS
3,838,962 UART: [kat] --
3,842,535 UART: [cold-reset] ++
3,845,035 UART: [fht] FHT @ 0x50003400
3,856,371 UART: [idev] ++
3,857,091 UART: [idev] CDI.KEYID = 6
3,858,005 UART: [idev] SUBJECT.KEYID = 7
3,859,284 UART: [idev] UDS.KEYID = 0
3,860,212 ready_for_fw is high
3,860,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,669 UART: [idev] Erasing UDS.KEYID = 0
6,335,231 UART: [idev] Sha1 KeyId Algorithm
6,356,405 UART: [idev] --
6,362,337 UART: [ldev] ++
6,363,021 UART: [ldev] CDI.KEYID = 6
6,363,906 UART: [ldev] SUBJECT.KEYID = 5
6,365,115 UART: [ldev] AUTHORITY.KEYID = 7
6,366,353 UART: [ldev] FE.KEYID = 1
6,378,378 UART: [ldev] Erasing FE.KEYID = 1
8,856,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,997 UART: [ldev] --
10,648,165 UART: [fwproc] Wait for Commands...
10,651,403 UART: [fwproc] Recv command 0x46574c44
10,653,663 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,831,087 >>> mbox cmd response: success
14,834,358 UART: [afmc] ++
14,835,062 UART: [afmc] CDI.KEYID = 6
14,836,261 UART: [afmc] SUBJECT.KEYID = 7
14,837,705 UART: [afmc] AUTHORITY.KEYID = 5
17,339,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,763 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,366 UART: [afmc] --
19,136,649 UART: [cold-reset] --
19,140,735 UART: [state] Locking Datavault
19,146,696 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,847 UART: [state] Locking ICCM
19,151,272 UART: [exit] Launching FMC @ 0x40000130
19,159,899 UART:
19,160,139 UART: Running Caliptra FMC ...
19,161,245 UART:
19,161,404 UART: [state] CFI Enabled
19,169,342 UART: [fht] FMC Alias Private Key: 7
20,925,758 UART: [art] Extend RT PCRs Done
20,926,977 UART: [art] Lock RT PCRs Done
20,928,653 UART: [art] Populate DV Done
20,934,012 UART: [fht] FMC Alias Private Key: 7
20,935,550 UART: [art] Derive CDI
20,936,284 UART: [art] Store in in slot 0x4
20,979,143 UART: [art] Derive Key Pair
20,980,187 UART: [art] Store priv key in slot 0x5
23,407,261 UART: [art] Derive Key Pair - Done
23,419,940 UART: [art] Signing Cert with AUTHO
23,421,247 UART: RITY.KEYID = 7
25,126,515 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,026 UART: [art] PUB.X = 5154BBBD5AFB2D32B8B402BD19D38E8A984320E6D95FA1FBDD09CB7A33E84B8A94B46985435140EF652DA5CB8E6A068D
25,135,308 UART: [art] PUB.Y = 46EB3D08268FCD175D30E6EABC3A0560E7E053FFE9354C0723CDA4AF9A61A10095F5BE17F8DE3CC55808BDC59F7795BA
25,142,578 UART: [art] SIG.R = B0FA72D017EC24F3A3B3D89AEB70D60C72CBCF7070D354C6557D3C9F9D6402E4C1DA210BFD00355878D2ED025413F6C8
25,149,948 UART: [art] SIG.S = 66EEFAF8779181D3ECF0C8FB34116284632F5A0016A63F739AFD375C6F9663ED7C9AC5CE2748ED944FC84FDCF02A9A70
26,129,055 UART: Caliptra RT
26,129,767 UART: [state] CFI Enabled
26,247,187 UART: [rt] RT listening for mailbox commands...
26,249,589 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,280,511 UART: [rt]cmd =0x41545348, len=116
26,282,611 >>> mbox cmd response data (12 bytes)
28,332,925 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,433,109 UART:
28,433,483 UART: Running Caliptra ROM ...
28,434,618 UART:
28,434,794 UART: [state] CFI Enabled
28,449,444 UART: [state] LifecycleState = Unprovisioned
28,451,279 UART: [state] DebugLocked = No
28,453,824 UART: [state] WD Timer not started. Device not locked for debugging
28,458,379 UART: [kat] SHA2-256
28,648,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,659,047 UART: [kat] ++
28,659,539 UART: [kat] sha1
28,670,213 UART: [kat] SHA2-256
28,673,241 UART: [kat] SHA2-384
28,678,799 UART: [kat] SHA2-512-ACC
28,681,374 UART: [kat] ECC-384
31,122,164 UART: [kat] HMAC-384Kdf
31,134,137 UART: [kat] LMS
31,665,748 UART: [kat] --
31,670,440 UART: [update-reset] ++
34,693,466 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,696,527 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,088,863 >>> mbox cmd response: success
35,089,230 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,090,395 UART: [update-reset] Copying MAN_2 To MAN_1
35,127,974 UART: [update-reset Success] --
35,132,849 UART: [state] Locking Datavault
35,135,691 UART: [state] Locking PCR0, PCR1 and PCR31
35,137,845 UART: [state] Locking ICCM
35,139,441 UART: [exit] Launching FMC @ 0x40000130
35,148,115 UART:
35,148,357 UART: Running Caliptra FMC ...
35,149,392 UART:
35,149,539 UART: [state] CFI Enabled
35,193,442 UART: [art] Extend RT PCRs Done
35,194,776 UART: [art] Lock RT PCRs Done
35,196,149 UART: [art] Populate DV Done
35,201,664 UART: [fht] FMC Alias Private Key: 7
35,203,200 UART: [art] Derive CDI
35,203,931 UART: [art] Store in in slot 0x4
35,246,268 UART: [art] Derive Key Pair
35,247,271 UART: [art] Store priv key in slot 0x5
37,674,227 UART: [art] Derive Key Pair - Done
37,687,349 UART: [art] Signing Cert with AUTHO
37,688,655 UART: RITY.KEYID = 7
39,393,837 UART: [art] Erasing AUTHORITY.KEYID = 7
39,395,350 UART: [art] PUB.X = 74AA8138705CB007192E3202369C03E0F4ED03A90F599235D02BD3184DDA0B40446C242B2DA1D8D5A326AF906096B67D
39,402,571 UART: [art] PUB.Y = 45221AF0A99412BF61214BD89643970DBC3B5A738E2F5A08D642FD332EE28329255A75F71136F0833C8944FE502D3CF7
39,409,829 UART: [art] SIG.R = 8C2934E20D772A5834C9D2508898AF6505A2EE4B2152836421595777422B976E557F4D877717C370A9ED74774A66D82A
39,417,131 UART: [art] SIG.S = A91DBB03E14B8D71F2F5F8C4FAF65C9A647A5498E2996BB1C165DC8D7F3F930B2F1BD1A7C168F2ABF835CC61CC5813D8
40,395,514 UART: mbox::rt_entry...
40,396,483 UART: ____ _ _ _ ____ _____
40,398,470 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,400,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,402,416 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,404,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,406,295 UART: |_|
40,407,130 UART:
40,690,167 UART: [rt] Runtime listening for mailbox commands...
40,692,288 >>> mbox cmd response data (48 bytes)
40,692,873 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,695,222 >>> mbox cmd response data (48 bytes)
40,696,090 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,708,644 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
3,757,903 ready_for_fw is high
3,758,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,944,190 >>> mbox cmd response: success
19,192,685 UART:
19,193,130 UART: Running Caliptra FMC ...
19,194,259 UART:
19,194,422 UART: [state] CFI Enabled
19,202,540 UART: [fht] FMC Alias Private Key: 7
20,959,975 UART: [art] Extend RT PCRs Done
20,961,214 UART: [art] Lock RT PCRs Done
20,962,701 UART: [art] Populate DV Done
20,968,185 UART: [fht] FMC Alias Private Key: 7
20,969,734 UART: [art] Derive CDI
20,970,475 UART: [art] Store in in slot 0x4
21,012,910 UART: [art] Derive Key Pair
21,013,918 UART: [art] Store priv key in slot 0x5
23,440,687 UART: [art] Derive Key Pair - Done
23,453,953 UART: [art] Signing Cert with AUTHO
23,455,267 UART: RITY.KEYID = 7
25,160,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,981 UART: [art] PUB.X = 2BC4F4A176C5EFAEE9F5CAB2B012C49B4C86E0262BDD6B1A887AFCE181A2429EF4BF0CC55722065825B36F14A1CB6A4E
25,169,282 UART: [art] PUB.Y = 8487FDE2CEFA39EFF358C9DAB4DB5420AA63A47DB619C7A6BB211196B5BF98E982A4A836C5441E569D2CB8412FAD784B
25,176,537 UART: [art] SIG.R = 6D4B4C16100DF7C5FE2F829DACB7C395A9A5135C0C59E4E515968DCF4D9656032848B3CDD23173EDF29C9BCCDB2406E8
25,183,990 UART: [art] SIG.S = C9E4E14125929F018A7F78B240BB72F45BC63E4876DB0582A1C98E19A13617D2B1809793838F0F129D077BB9F8E89BAF
26,163,021 UART: Caliptra RT
26,163,748 UART: [state] CFI Enabled
26,281,462 UART: [rt] RT listening for mailbox commands...
26,283,826 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,314,738 UART: [rt]cmd =0x41545348, len=116
26,316,978 >>> mbox cmd response data (12 bytes)
28,367,232 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,281,282 >>> mbox cmd response: success
35,281,742 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,316,055 UART:
35,316,353 UART: Running Caliptra FMC ...
35,317,391 UART:
35,317,540 UART: [state] CFI Enabled
35,361,838 UART: [art] Extend RT PCRs Done
35,363,024 UART: [art] Lock RT PCRs Done
35,364,547 UART: [art] Populate DV Done
35,369,857 UART: [fht] FMC Alias Private Key: 7
35,371,400 UART: [art] Derive CDI
35,372,136 UART: [art] Store in in slot 0x4
35,414,890 UART: [art] Derive Key Pair
35,415,937 UART: [art] Store priv key in slot 0x5
37,842,852 UART: [art] Derive Key Pair - Done
37,856,132 UART: [art] Signing Cert with AUTHO
37,857,444 UART: RITY.KEYID = 7
39,562,930 UART: [art] Erasing AUTHORITY.KEYID = 7
39,564,435 UART: [art] PUB.X = F81AE019A04E80D82342AD919CAE4056F7C1019EA6E417364A436FE97C426613AA1C3B719E4CE6337BAB03E1174861A5
39,571,672 UART: [art] PUB.Y = 848DC9C9079ED0AC055BEF830B92A9A3728D2CF9D77EF3E483CFD7B88021CF9DC21398519A122331776CF63B0A964988
39,578,976 UART: [art] SIG.R = A6CEB376ECF233AEDD98A4D046A92F3EE659A34DFB55B6E30D76D9D9BE772F0DC12B469F6D772F92B5CA515C9C1F1656
39,586,372 UART: [art] SIG.S = 6E5EA13DA5B2B373CAE11F9B3E8BABD1D63397D35D4B1231CAE88C42C83A721474EBCE49682EAE407F7961033310C683
40,564,868 UART: mbox::rt_entry...
40,565,830 UART: ____ _ _ _ ____ _____
40,567,764 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,569,776 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,571,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,573,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,575,450 UART: |_|
40,576,334 UART:
40,858,300 UART: [rt] Runtime listening for mailbox commands...
40,860,499 >>> mbox cmd response data (48 bytes)
40,861,073 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,863,407 >>> mbox cmd response data (48 bytes)
40,864,263 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,876,813 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,420 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 ready_for_fw is high
1,480,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,968 UART: [idev] --
1,515,033 UART: [ldev] ++
1,515,201 UART: [ldev] CDI.KEYID = 6
1,515,564 UART: [ldev] SUBJECT.KEYID = 5
1,515,990 UART: [ldev] AUTHORITY.KEYID = 7
1,516,453 UART: [ldev] FE.KEYID = 1
1,521,777 UART: [ldev] Erasing FE.KEYID = 1
1,547,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,812 UART: [ldev] --
1,587,291 UART: [fwproc] Waiting for Commands...
1,588,144 UART: [fwproc] Received command 0x46574c44
1,588,935 UART: [fwproc] Received Image of size 114084 bytes
2,883,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,455 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,807 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,204 >>> mbox cmd response: success
3,077,256 UART: [afmc] ++
3,077,424 UART: [afmc] CDI.KEYID = 6
3,077,786 UART: [afmc] SUBJECT.KEYID = 7
3,078,211 UART: [afmc] AUTHORITY.KEYID = 5
3,113,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,496 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,889 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,579 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,448 UART: [afmc] --
3,156,478 UART: [cold-reset] --
3,157,270 UART: [state] Locking Datavault
3,158,607 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,211 UART: [state] Locking ICCM
3,159,645 UART: [exit] Launching FMC @ 0x40000130
3,164,974 UART:
3,164,990 UART: Running Caliptra FMC ...
3,165,398 UART:
3,165,452 UART: [state] CFI Enabled
3,175,781 UART: [fht] FMC Alias Private Key: 7
3,283,134 UART: [art] Extend RT PCRs Done
3,283,562 UART: [art] Lock RT PCRs Done
3,284,926 UART: [art] Populate DV Done
3,293,263 UART: [fht] FMC Alias Private Key: 7
3,294,213 UART: [art] Derive CDI
3,294,493 UART: [art] Store in in slot 0x4
3,379,576 UART: [art] Derive Key Pair
3,379,936 UART: [art] Store priv key in slot 0x5
3,393,246 UART: [art] Derive Key Pair - Done
3,408,072 UART: [art] Signing Cert with AUTHO
3,408,552 UART: RITY.KEYID = 7
3,423,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,731 UART: [art] PUB.X = D7E2D283C5BF79F8729B026F7F16401A934ED9E786FE420E69CEC0E68079E6E9F7F5C67583AA6606DF1680BA7AF39824
3,431,498 UART: [art] PUB.Y = CE14649435801E1A487DA136D7C17E7F13AAED8240844C7829F9B134986FCA1BCC6DB5535D0E4B34554BEC67A54658D2
3,438,449 UART: [art] SIG.R = 690CC26F9A18DAE81D782F07059B428ACC14CA4720772FB3482E905B67791659D61CEB1353132896C74D7157B1FFA302
3,445,203 UART: [art] SIG.S = CF4D89C8A8A14C96D48283CD53E301E349D73BF25FDF4A79F78D5CED87AB6273228BA97064BBD8E21C4B70876ED7A285
3,469,125 UART: Caliptra RT
3,469,378 UART: [state] CFI Enabled
3,577,279 UART: [rt] RT listening for mailbox commands...
3,577,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,627 UART: [rt]cmd =0x41545348, len=116
3,610,294 >>> mbox cmd response data (12 bytes)
3,610,295 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,205 UART:
3,611,221 UART: Running Caliptra ROM ...
3,611,629 UART:
3,611,683 UART: [state] CFI Enabled
3,614,247 UART: [state] LifecycleState = Unprovisioned
3,614,902 UART: [state] DebugLocked = No
3,615,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,147 UART: [kat] SHA2-256
4,411,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,415,193 UART: [kat] ++
4,415,345 UART: [kat] sha1
4,419,487 UART: [kat] SHA2-256
4,421,425 UART: [kat] SHA2-384
4,424,316 UART: [kat] SHA2-512-ACC
4,426,216 UART: [kat] ECC-384
4,431,575 UART: [kat] HMAC-384Kdf
4,436,175 UART: [kat] LMS
5,004,371 UART: [kat] --
5,005,066 UART: [update-reset] ++
5,928,746 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,929,994 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,026,056 >>> mbox cmd response: success
6,026,056 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,026,335 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,349 UART: [update-reset Success] --
6,035,418 UART: [state] Locking Datavault
6,036,270 UART: [state] Locking PCR0, PCR1 and PCR31
6,036,874 UART: [state] Locking ICCM
6,037,348 UART: [exit] Launching FMC @ 0x40000130
6,042,677 UART:
6,042,693 UART: Running Caliptra FMC ...
6,043,101 UART:
6,043,155 UART: [state] CFI Enabled
6,131,852 UART: [art] Extend RT PCRs Done
6,132,280 UART: [art] Lock RT PCRs Done
6,133,667 UART: [art] Populate DV Done
6,141,938 UART: [fht] FMC Alias Private Key: 7
6,143,080 UART: [art] Derive CDI
6,143,360 UART: [art] Store in in slot 0x4
6,228,901 UART: [art] Derive Key Pair
6,229,261 UART: [art] Store priv key in slot 0x5
6,242,321 UART: [art] Derive Key Pair - Done
6,257,149 UART: [art] Signing Cert with AUTHO
6,257,629 UART: RITY.KEYID = 7
6,272,979 UART: [art] Erasing AUTHORITY.KEYID = 7
6,273,744 UART: [art] PUB.X = A5608ADBCBD71D763C75DF42B40634DB0D4F1BFE3A38D47475CEFCD835403DE9D970A03B7BCBBDF955081D868C9683C1
6,280,523 UART: [art] PUB.Y = AC5C809D2521457B62D7CAF3DEF845178EFEF801A1AC385A0CE72660737CAD6747F1134AF71320721C6FC8BB5C1E2715
6,287,475 UART: [art] SIG.R = 3F10E8F2792DB83F602D7594097F20DB3D4CCBC6ED74825916E1FDD9FF922D52477F13285851E9330E5C49CE0AB2B22C
6,294,242 UART: [art] SIG.S = C636AD617740632C09FD0EAAC13970A84EE7A325953CC33BDDD49838563F3A9AF3B1BBF991CF2D046F0A9DCE526684E8
6,317,865 UART: mbox::rt_entry...
6,318,237 UART: ____ _ _ _ ____ _____
6,319,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,319,821 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,320,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,321,357 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,322,125 UART: |_|
6,322,437 UART:
6,602,301 UART: [rt] Runtime listening for mailbox commands...
6,603,491 >>> mbox cmd response data (48 bytes)
6,603,492 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,606,275 >>> mbox cmd response data (48 bytes)
6,606,276 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,619,214 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,885 ready_for_fw is high
1,361,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,844 >>> mbox cmd response: success
2,985,744 UART:
2,985,760 UART: Running Caliptra FMC ...
2,986,168 UART:
2,986,222 UART: [state] CFI Enabled
2,996,689 UART: [fht] FMC Alias Private Key: 7
3,104,300 UART: [art] Extend RT PCRs Done
3,104,728 UART: [art] Lock RT PCRs Done
3,106,508 UART: [art] Populate DV Done
3,115,019 UART: [fht] FMC Alias Private Key: 7
3,116,181 UART: [art] Derive CDI
3,116,461 UART: [art] Store in in slot 0x4
3,202,196 UART: [art] Derive Key Pair
3,202,556 UART: [art] Store priv key in slot 0x5
3,216,636 UART: [art] Derive Key Pair - Done
3,231,490 UART: [art] Signing Cert with AUTHO
3,231,970 UART: RITY.KEYID = 7
3,247,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,121 UART: [art] PUB.X = BC418F7D551B6BE26B2B3B00E13BA0097F7B40243B21218DAA5C8E54D4EEA932A8E4FFAF012FA0C793EF78614D59D38A
3,254,879 UART: [art] PUB.Y = E10F8E0A5B32A29F50B2786B80CE15A3D321D359E66679664905A34AE4C5233146B16E16B842963A1FF327133332F9BC
3,261,814 UART: [art] SIG.R = 4D40CB6E8D1AFB1EAF55A840044F8548A253E9CFD0F098B429FAD8CAB94AED6E2761E11F980241A721D5F85FAC2A45C2
3,268,596 UART: [art] SIG.S = C25E6701BC74F9595EA5A561C329B7688D7BE4FD1B7793A646E1B830A17252AB82C3E9CB528F585ACAACDCFA63C5FBF4
3,292,864 UART: Caliptra RT
3,293,117 UART: [state] CFI Enabled
3,402,048 UART: [rt] RT listening for mailbox commands...
3,402,718 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,076 UART: [rt]cmd =0x41545348, len=116
3,434,743 >>> mbox cmd response data (12 bytes)
3,434,744 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,731,927 >>> mbox cmd response: success
5,731,927 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,745,088 UART:
5,745,104 UART: Running Caliptra FMC ...
5,745,512 UART:
5,745,566 UART: [state] CFI Enabled
5,835,089 UART: [art] Extend RT PCRs Done
5,835,517 UART: [art] Lock RT PCRs Done
5,836,874 UART: [art] Populate DV Done
5,845,029 UART: [fht] FMC Alias Private Key: 7
5,846,039 UART: [art] Derive CDI
5,846,319 UART: [art] Store in in slot 0x4
5,932,082 UART: [art] Derive Key Pair
5,932,442 UART: [art] Store priv key in slot 0x5
5,945,602 UART: [art] Derive Key Pair - Done
5,960,676 UART: [art] Signing Cert with AUTHO
5,961,156 UART: RITY.KEYID = 7
5,976,240 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,005 UART: [art] PUB.X = 30382E23E8E22FF7728F61096F138961DE050A6784BD9FF604FE0C798DD6B9D6D68273A4063290820DAAA718DA4B919B
5,983,754 UART: [art] PUB.Y = 4F3B7CC370360DC2C4B6405C5E3953574233FBCEFAD83EBC2DF98DD5F878DE024B9DECB13448E2C0B389123297FBFAC5
5,990,716 UART: [art] SIG.R = B8FAC6A507F196539089DFBD61CC9C48608E6A652DE4ADA23973CC532F025C3C58D933B127D3444F5788FD6AC71872B4
5,997,486 UART: [art] SIG.S = 095817EAA2163F68060CE4B6EF021843A383EB58092BCE35A4E610F8F661832B710B807E9C5D19AD4C4EF9A25E7AD796
6,021,949 UART: mbox::rt_entry...
6,022,321 UART: ____ _ _ _ ____ _____
6,023,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,209 UART: |_|
6,026,521 UART:
6,303,285 UART: [rt] Runtime listening for mailbox commands...
6,304,475 >>> mbox cmd response data (48 bytes)
6,304,476 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,307,259 >>> mbox cmd response data (48 bytes)
6,307,260 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,320,198 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,394 UART: [kat] SHA2-256
882,325 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,440 UART: [kat] ++
886,592 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
903,175 UART: [kat] HMAC-384Kdf
907,711 UART: [kat] LMS
1,475,907 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,964 UART: [fht] Storing FHT @ 0x50003400
1,479,609 UART: [idev] ++
1,479,777 UART: [idev] CDI.KEYID = 6
1,480,137 UART: [idev] SUBJECT.KEYID = 7
1,480,561 UART: [idev] UDS.KEYID = 0
1,480,906 ready_for_fw is high
1,480,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,483 UART: [idev] Erasing UDS.KEYID = 0
1,505,291 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,851 UART: [idev] --
1,515,052 UART: [ldev] ++
1,515,220 UART: [ldev] CDI.KEYID = 6
1,515,583 UART: [ldev] SUBJECT.KEYID = 5
1,516,009 UART: [ldev] AUTHORITY.KEYID = 7
1,516,472 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,427 UART: [ldev] --
1,586,730 UART: [fwproc] Waiting for Commands...
1,587,373 UART: [fwproc] Received command 0x46574c44
1,588,164 UART: [fwproc] Received Image of size 114084 bytes
2,882,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,047 >>> mbox cmd response: success
3,075,123 UART: [afmc] ++
3,075,291 UART: [afmc] CDI.KEYID = 6
3,075,653 UART: [afmc] SUBJECT.KEYID = 7
3,076,078 UART: [afmc] AUTHORITY.KEYID = 5
3,111,527 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,031 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,424 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,114 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,971 UART: [afmc] --
3,154,977 UART: [cold-reset] --
3,155,793 UART: [state] Locking Datavault
3,156,872 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,476 UART: [state] Locking ICCM
3,158,008 UART: [exit] Launching FMC @ 0x40000130
3,163,337 UART:
3,163,353 UART: Running Caliptra FMC ...
3,163,761 UART:
3,163,904 UART: [state] CFI Enabled
3,174,683 UART: [fht] FMC Alias Private Key: 7
3,282,710 UART: [art] Extend RT PCRs Done
3,283,138 UART: [art] Lock RT PCRs Done
3,284,740 UART: [art] Populate DV Done
3,292,783 UART: [fht] FMC Alias Private Key: 7
3,293,821 UART: [art] Derive CDI
3,294,101 UART: [art] Store in in slot 0x4
3,379,696 UART: [art] Derive Key Pair
3,380,056 UART: [art] Store priv key in slot 0x5
3,392,830 UART: [art] Derive Key Pair - Done
3,407,441 UART: [art] Signing Cert with AUTHO
3,407,921 UART: RITY.KEYID = 7
3,422,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,646 UART: [art] PUB.X = 4324140A408D6E57A8F7158D0A14EE4B4A7E6A098B5249CE4FA0292F65488BFE62AC34BDC914469999DB079AF26CB590
3,430,408 UART: [art] PUB.Y = FBF7D987F6038397C5279A58B0789195F12119CA10BB68DA45F8E9277B84F6C3B3CB05367CC6919929AA95C8DD234844
3,437,350 UART: [art] SIG.R = 4CBD9B66A17AE60A7808BEF86380E5E9340428DF4C12D893F5195E9E18C716246D8D250C1E2AEDB34CFB133D8F0CAD57
3,444,117 UART: [art] SIG.S = E94103039DCAFDBF3DE0DAFAD5D9ED55A1B150F861ACAF9168EE8817F34BBFD536DFD8C78374F0B0D8D05750B469D277
3,467,244 UART: Caliptra RT
3,467,589 UART: [state] CFI Enabled
3,576,736 UART: [rt] RT listening for mailbox commands...
3,577,406 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,882 UART: [rt]cmd =0x41545348, len=116
3,609,673 >>> mbox cmd response data (12 bytes)
3,609,674 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,464 UART:
3,610,480 UART: Running Caliptra ROM ...
3,610,888 UART:
3,611,029 UART: [state] CFI Enabled
3,614,163 UART: [state] LifecycleState = Unprovisioned
3,614,818 UART: [state] DebugLocked = No
3,615,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,123 UART: [kat] SHA2-256
4,411,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,415,169 UART: [kat] ++
4,415,321 UART: [kat] sha1
4,419,699 UART: [kat] SHA2-256
4,421,637 UART: [kat] SHA2-384
4,424,336 UART: [kat] SHA2-512-ACC
4,426,236 UART: [kat] ECC-384
4,432,019 UART: [kat] HMAC-384Kdf
4,436,653 UART: [kat] LMS
5,004,849 UART: [kat] --
5,005,910 UART: [update-reset] ++
5,931,936 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,933,148 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,029,210 >>> mbox cmd response: success
6,029,210 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,029,469 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,483 UART: [update-reset Success] --
6,038,522 UART: [state] Locking Datavault
6,039,130 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,734 UART: [state] Locking ICCM
6,040,408 UART: [exit] Launching FMC @ 0x40000130
6,045,737 UART:
6,045,753 UART: Running Caliptra FMC ...
6,046,161 UART:
6,046,304 UART: [state] CFI Enabled
6,135,499 UART: [art] Extend RT PCRs Done
6,135,927 UART: [art] Lock RT PCRs Done
6,137,232 UART: [art] Populate DV Done
6,145,487 UART: [fht] FMC Alias Private Key: 7
6,146,555 UART: [art] Derive CDI
6,146,835 UART: [art] Store in in slot 0x4
6,232,756 UART: [art] Derive Key Pair
6,233,116 UART: [art] Store priv key in slot 0x5
6,246,390 UART: [art] Derive Key Pair - Done
6,261,104 UART: [art] Signing Cert with AUTHO
6,261,584 UART: RITY.KEYID = 7
6,276,856 UART: [art] Erasing AUTHORITY.KEYID = 7
6,277,621 UART: [art] PUB.X = 879F92C27DE964A70B54A3F331F474769C4FB42B620DB8DF1A4AB072D2A5D0DA63D39488522AD2EC3D1C29CC38EA5C7B
6,284,399 UART: [art] PUB.Y = 012E2CF4179AA0E1180BCF652376347D542D15812E752C28287E982A1F62671396DEE80450CD693627A4066B5890803B
6,291,323 UART: [art] SIG.R = 340B0C2C354A830072881C59CAC58815D0D9BC705546EE9155DE4C85D13244089AE362D10AD3133128790DA8FDB3B995
6,298,052 UART: [art] SIG.S = 8AFC927899DD21457D1DF62CB0AB8B9970F5B8A189855BA076CE7030BC3C0ACD4BB70C35721E2775370BA24E9B71810B
6,321,735 UART: mbox::rt_entry...
6,322,107 UART: ____ _ _ _ ____ _____
6,322,891 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,323,691 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,324,459 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,325,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,325,995 UART: |_|
6,326,307 UART:
6,605,983 UART: [rt] Runtime listening for mailbox commands...
6,607,173 >>> mbox cmd response data (48 bytes)
6,607,174 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,609,957 >>> mbox cmd response data (48 bytes)
6,609,958 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,622,896 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,966 ready_for_fw is high
1,362,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,345 >>> mbox cmd response: success
2,986,835 UART:
2,986,851 UART: Running Caliptra FMC ...
2,987,259 UART:
2,987,402 UART: [state] CFI Enabled
2,997,839 UART: [fht] FMC Alias Private Key: 7
3,106,282 UART: [art] Extend RT PCRs Done
3,106,710 UART: [art] Lock RT PCRs Done
3,108,148 UART: [art] Populate DV Done
3,116,589 UART: [fht] FMC Alias Private Key: 7
3,117,645 UART: [art] Derive CDI
3,117,925 UART: [art] Store in in slot 0x4
3,203,432 UART: [art] Derive Key Pair
3,203,792 UART: [art] Store priv key in slot 0x5
3,217,012 UART: [art] Derive Key Pair - Done
3,231,863 UART: [art] Signing Cert with AUTHO
3,232,343 UART: RITY.KEYID = 7
3,247,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,902 UART: [art] PUB.X = 14CBCE5DDD60249D2FAFA51FAFEC334C536C05338B310AF6620B9337BA3B52EBE1E2890C630B3AC32B8C28AB5B45AEA9
3,254,679 UART: [art] PUB.Y = 7515E188AA137F4AC8F6610A26A766AD0ADE71D0C7FB38AA5E2FD19A071B65DBC2B7BE68F9F02B787724CBFB2CEDA23E
3,261,644 UART: [art] SIG.R = C41CE23AC2B751170EEEA4FFFFECB21925592744C9031CCFD5AD47CCADBC26602F505089D66E0E1C26390BE229A652AD
3,268,420 UART: [art] SIG.S = ACF2227B42C18318DE6DB8A3CABB87880CDCC2BA8B1919EA4E38BE3E7D16EBE76FDC4785FE7A2ED90A1BF47E4F9E37C6
3,292,277 UART: Caliptra RT
3,292,622 UART: [state] CFI Enabled
3,401,380 UART: [rt] RT listening for mailbox commands...
3,402,050 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,830 UART: [rt]cmd =0x41545348, len=116
3,434,829 >>> mbox cmd response data (12 bytes)
3,434,830 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,676 >>> mbox cmd response: success
5,732,676 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,746,521 UART:
5,746,537 UART: Running Caliptra FMC ...
5,746,945 UART:
5,747,088 UART: [state] CFI Enabled
5,836,849 UART: [art] Extend RT PCRs Done
5,837,277 UART: [art] Lock RT PCRs Done
5,838,380 UART: [art] Populate DV Done
5,846,497 UART: [fht] FMC Alias Private Key: 7
5,847,545 UART: [art] Derive CDI
5,847,825 UART: [art] Store in in slot 0x4
5,933,178 UART: [art] Derive Key Pair
5,933,538 UART: [art] Store priv key in slot 0x5
5,946,402 UART: [art] Derive Key Pair - Done
5,961,411 UART: [art] Signing Cert with AUTHO
5,961,891 UART: RITY.KEYID = 7
5,976,947 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,712 UART: [art] PUB.X = 080F5CD3F9167A760B7EBCE8822F27DCC3D9069F854356E2CD3CE5C3EF3C984C342E5AD131EC6947AFEB7B9CEED1C036
5,984,490 UART: [art] PUB.Y = BACC540BDC5AC2F4757A859D73255C363BDDBA560A1C1947F5211203917A25E6423D557C806EADAA6AC29D7E52744479
5,991,437 UART: [art] SIG.R = FCB6E26270956EF782F147C487E61F8AE53CEE38264D5F06D8994B89D2DEEB2FB35A95657D0D0825E8E6F9ED343354C7
5,998,206 UART: [art] SIG.S = 4958F35A045EB05ED4FC8DCBC59878A6344C04E5780E32235911FB7F39911A51330D37A4CB822EB2CCD7D7399136EFE6
6,021,393 UART: mbox::rt_entry...
6,021,765 UART: ____ _ _ _ ____ _____
6,022,549 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,024,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,025,653 UART: |_|
6,025,965 UART:
6,312,643 UART: [rt] Runtime listening for mailbox commands...
6,313,833 >>> mbox cmd response data (48 bytes)
6,313,834 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,316,617 >>> mbox cmd response data (48 bytes)
6,316,618 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,329,556 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,917 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,149 UART: [kat] SHA2-256
904,089 UART: [kat] SHA2-384
906,952 UART: [kat] SHA2-512-ACC
908,853 UART: [kat] ECC-384
918,842 UART: [kat] HMAC-384Kdf
923,296 UART: [kat] LMS
1,171,624 UART: [kat] --
1,172,279 UART: [cold-reset] ++
1,172,653 UART: [fht] FHT @ 0x50003400
1,175,412 UART: [idev] ++
1,175,580 UART: [idev] CDI.KEYID = 6
1,175,940 UART: [idev] SUBJECT.KEYID = 7
1,176,364 UART: [idev] UDS.KEYID = 0
1,176,709 ready_for_fw is high
1,176,709 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,936 UART: [ldev] SUBJECT.KEYID = 5
1,211,362 UART: [ldev] AUTHORITY.KEYID = 7
1,211,825 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,214 UART: [fwproc] Recv command 0x46574c44
1,283,942 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,248 >>> mbox cmd response: success
2,771,348 UART: [afmc] ++
2,771,516 UART: [afmc] CDI.KEYID = 6
2,771,878 UART: [afmc] SUBJECT.KEYID = 7
2,772,303 UART: [afmc] AUTHORITY.KEYID = 5
2,807,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,747 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,397 UART: [afmc] --
2,851,415 UART: [cold-reset] --
2,851,905 UART: [state] Locking Datavault
2,853,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,644 UART: [state] Locking ICCM
2,854,184 UART: [exit] Launching FMC @ 0x40000130
2,859,513 UART:
2,859,529 UART: Running Caliptra FMC ...
2,859,937 UART:
2,859,991 UART: [state] CFI Enabled
2,870,700 UART: [fht] FMC Alias Private Key: 7
2,978,407 UART: [art] Extend RT PCRs Done
2,978,835 UART: [art] Lock RT PCRs Done
2,980,175 UART: [art] Populate DV Done
2,988,344 UART: [fht] FMC Alias Private Key: 7
2,989,366 UART: [art] Derive CDI
2,989,646 UART: [art] Store in in slot 0x4
3,074,933 UART: [art] Derive Key Pair
3,075,293 UART: [art] Store priv key in slot 0x5
3,088,583 UART: [art] Derive Key Pair - Done
3,103,397 UART: [art] Signing Cert with AUTHO
3,103,877 UART: RITY.KEYID = 7
3,119,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,892 UART: [art] PUB.X = 6C72A0EE8B436E74A28D3B2A3FD403EB64DE7AF16A64D95C1B2BE9EFF521C48477044A3A1340D2C0C2DD7EB2F4886896
3,126,670 UART: [art] PUB.Y = 54EF6FB01C5E7DDB5E398AC6ACD059E41E63DF8E42F015AC948C51CE74E2F9845553CDFAA6BC4B8969340DF84F239227
3,133,633 UART: [art] SIG.R = 2C6898382ED5C58B7EF86ED139F5437D7678B0FF8727A3D2D5D0603729EB11F2BC22F1536375003D4A6EB613DA85418D
3,140,381 UART: [art] SIG.S = EFEB7EB266BFA3D9D62D97D15BD951905AC0BA396EDE36255AF166435BBA7883D199964BAE97B2ADFD3064582EBAE5D9
3,164,638 UART: Caliptra RT
3,164,891 UART: [state] CFI Enabled
3,272,594 UART: [rt] RT listening for mailbox commands...
3,273,264 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,720 UART: [rt]cmd =0x41545348, len=116
3,305,613 >>> mbox cmd response data (12 bytes)
3,305,614 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,475 UART:
3,306,491 UART: Running Caliptra ROM ...
3,306,899 UART:
3,306,954 UART: [state] CFI Enabled
3,309,908 UART: [state] LifecycleState = Unprovisioned
3,310,563 UART: [state] DebugLocked = No
3,311,143 UART: [state] WD Timer not started. Device not locked for debugging
3,312,287 UART: [kat] SHA2-256
4,117,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,122,062 UART: [kat] ++
4,122,214 UART: [kat] sha1
4,126,672 UART: [kat] SHA2-256
4,128,612 UART: [kat] SHA2-384
4,131,551 UART: [kat] SHA2-512-ACC
4,133,451 UART: [kat] ECC-384
4,142,698 UART: [kat] HMAC-384Kdf
4,147,464 UART: [kat] LMS
4,395,792 UART: [kat] --
4,396,364 UART: [update-reset] ++
5,298,088 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,299,269 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,395,279 >>> mbox cmd response: success
5,395,279 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,395,428 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,442 UART: [update-reset Success] --
5,404,513 UART: [state] Locking Datavault
5,405,445 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,049 UART: [state] Locking ICCM
5,406,589 UART: [exit] Launching FMC @ 0x40000130
5,411,918 UART:
5,411,934 UART: Running Caliptra FMC ...
5,412,342 UART:
5,412,396 UART: [state] CFI Enabled
5,501,421 UART: [art] Extend RT PCRs Done
5,501,849 UART: [art] Lock RT PCRs Done
5,503,468 UART: [art] Populate DV Done
5,511,519 UART: [fht] FMC Alias Private Key: 7
5,512,477 UART: [art] Derive CDI
5,512,757 UART: [art] Store in in slot 0x4
5,598,744 UART: [art] Derive Key Pair
5,599,104 UART: [art] Store priv key in slot 0x5
5,612,362 UART: [art] Derive Key Pair - Done
5,626,945 UART: [art] Signing Cert with AUTHO
5,627,425 UART: RITY.KEYID = 7
5,642,397 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,162 UART: [art] PUB.X = 4852510E50AA39E3D083ED0EAAEC07844B8BD716359E154E7AA481CA062C136C5EE29F685AA1EAA0CAFE98E17A0A6339
5,649,931 UART: [art] PUB.Y = 9AFEC85B39CF1DAD16747FB6A21B80FE5758103484B6BF79AB4168827D3CDFAF9048136766999B82604355F60B760E3A
5,656,877 UART: [art] SIG.R = C52F0DC071359D92320731858B122DE2C3238B9416B9096257EF48704C5B6D574A388A3E4CDD7DAF14EDAF041BF66FD4
5,663,639 UART: [art] SIG.S = E66D0DEE6241A7C7DE43A13323B4D9DA21E4D72320E300313DC0C9C9A7459C7AFD5D6799D5D591ED79C357ACD0D9ADB9
5,687,737 UART: mbox::rt_entry...
5,688,109 UART: ____ _ _ _ ____ _____
5,688,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,689,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,690,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,691,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,691,997 UART: |_|
5,692,309 UART:
5,976,184 UART: [rt] Runtime listening for mailbox commands...
5,977,374 >>> mbox cmd response data (48 bytes)
5,977,375 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,980,158 >>> mbox cmd response data (48 bytes)
5,980,159 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,993,097 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,471 ready_for_fw is high
1,059,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,410 >>> mbox cmd response: success
2,682,542 UART:
2,682,558 UART: Running Caliptra FMC ...
2,682,966 UART:
2,683,020 UART: [state] CFI Enabled
2,693,521 UART: [fht] FMC Alias Private Key: 7
2,801,432 UART: [art] Extend RT PCRs Done
2,801,860 UART: [art] Lock RT PCRs Done
2,803,448 UART: [art] Populate DV Done
2,811,691 UART: [fht] FMC Alias Private Key: 7
2,812,833 UART: [art] Derive CDI
2,813,113 UART: [art] Store in in slot 0x4
2,898,154 UART: [art] Derive Key Pair
2,898,514 UART: [art] Store priv key in slot 0x5
2,911,102 UART: [art] Derive Key Pair - Done
2,925,841 UART: [art] Signing Cert with AUTHO
2,926,321 UART: RITY.KEYID = 7
2,941,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,052 UART: [art] PUB.X = 5B8238FF711D33979FC03B04112245F0DAF1807AD27F42E16E3FEC22C14703A551913B7B015910FCB7F032779023C049
2,948,807 UART: [art] PUB.Y = 61023C6DAB227A7B3C982F632C3123EA949639452404ECDFE271C90D60379412A9545DB2148EBC16A12BF6F250BDCA25
2,955,750 UART: [art] SIG.R = 67A20BA482F66111A6ED0140CEEB963002F2CCFBD70F923BA841C43448568C57E22170E4AC06D4A0D0328E379487A068
2,962,505 UART: [art] SIG.S = 26276DB23073A95E6E7C3214E2228429D5282119ADBBE1F61A5A489ABC3CBD9059D9EB02DB4169A48DD4840ABB39DB08
2,985,929 UART: Caliptra RT
2,986,182 UART: [state] CFI Enabled
3,093,583 UART: [rt] RT listening for mailbox commands...
3,094,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,627 UART: [rt]cmd =0x41545348, len=116
3,126,550 >>> mbox cmd response data (12 bytes)
3,126,551 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,100,739 >>> mbox cmd response: success
5,100,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,113,837 UART:
5,113,853 UART: Running Caliptra FMC ...
5,114,261 UART:
5,114,315 UART: [state] CFI Enabled
5,204,060 UART: [art] Extend RT PCRs Done
5,204,488 UART: [art] Lock RT PCRs Done
5,205,629 UART: [art] Populate DV Done
5,213,604 UART: [fht] FMC Alias Private Key: 7
5,214,586 UART: [art] Derive CDI
5,214,866 UART: [art] Store in in slot 0x4
5,300,757 UART: [art] Derive Key Pair
5,301,117 UART: [art] Store priv key in slot 0x5
5,314,367 UART: [art] Derive Key Pair - Done
5,329,085 UART: [art] Signing Cert with AUTHO
5,329,565 UART: RITY.KEYID = 7
5,344,665 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,430 UART: [art] PUB.X = FD47CBD9C2F5E8972AD59F4D056DCE4E7E47DC55DCF76F4339E9B8EDC085956F05E02FDFC15E166518C2D724A8B98B2A
5,352,214 UART: [art] PUB.Y = 3551CFC564063BE90694059F974050314558DFCD793A32B3D4A1E64394CEB12A3D0F02C538C2419D58DD2052F143597E
5,359,143 UART: [art] SIG.R = DCE3FFDE64B4CD8DBC0A9B1A063268019367C76B038B95FC0FCF3C1EDEC4473223D0DDBEDE3C271462DA58F6305BA6CD
5,365,924 UART: [art] SIG.S = 8CEFD7F2C980E3EDA48A1C99B61ABDD0D60F9D2F43AB5F17295D5D3CBA6410B32DCC33EAFB52780153F5A05ED09CD977
5,389,527 UART: mbox::rt_entry...
5,389,899 UART: ____ _ _ _ ____ _____
5,390,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,391,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,392,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,393,787 UART: |_|
5,394,099 UART:
5,672,118 UART: [rt] Runtime listening for mailbox commands...
5,673,308 >>> mbox cmd response data (48 bytes)
5,673,309 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,676,092 >>> mbox cmd response data (48 bytes)
5,676,093 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,689,031 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,835 UART: [kat] SHA2-512-ACC
908,736 UART: [kat] ECC-384
918,243 UART: [kat] HMAC-384Kdf
922,887 UART: [kat] LMS
1,171,215 UART: [kat] --
1,171,686 UART: [cold-reset] ++
1,172,228 UART: [fht] FHT @ 0x50003400
1,175,023 UART: [idev] ++
1,175,191 UART: [idev] CDI.KEYID = 6
1,175,551 UART: [idev] SUBJECT.KEYID = 7
1,175,975 UART: [idev] UDS.KEYID = 0
1,176,320 ready_for_fw is high
1,176,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,959 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,776 UART: [idev] --
1,210,704 UART: [ldev] ++
1,210,872 UART: [ldev] CDI.KEYID = 6
1,211,235 UART: [ldev] SUBJECT.KEYID = 5
1,211,661 UART: [ldev] AUTHORITY.KEYID = 7
1,212,124 UART: [ldev] FE.KEYID = 1
1,217,592 UART: [ldev] Erasing FE.KEYID = 1
1,243,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,728 UART: [ldev] --
1,283,237 UART: [fwproc] Wait for Commands...
1,283,887 UART: [fwproc] Recv command 0x46574c44
1,284,615 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,303 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,704 >>> mbox cmd response: success
2,771,756 UART: [afmc] ++
2,771,924 UART: [afmc] CDI.KEYID = 6
2,772,286 UART: [afmc] SUBJECT.KEYID = 7
2,772,711 UART: [afmc] AUTHORITY.KEYID = 5
2,808,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,061 UART: [afmc] --
2,852,069 UART: [cold-reset] --
2,852,909 UART: [state] Locking Datavault
2,854,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,844 UART: [state] Locking ICCM
2,855,292 UART: [exit] Launching FMC @ 0x40000130
2,860,621 UART:
2,860,637 UART: Running Caliptra FMC ...
2,861,045 UART:
2,861,188 UART: [state] CFI Enabled
2,871,971 UART: [fht] FMC Alias Private Key: 7
2,979,676 UART: [art] Extend RT PCRs Done
2,980,104 UART: [art] Lock RT PCRs Done
2,981,780 UART: [art] Populate DV Done
2,990,175 UART: [fht] FMC Alias Private Key: 7
2,991,293 UART: [art] Derive CDI
2,991,573 UART: [art] Store in in slot 0x4
3,076,952 UART: [art] Derive Key Pair
3,077,312 UART: [art] Store priv key in slot 0x5
3,090,242 UART: [art] Derive Key Pair - Done
3,104,857 UART: [art] Signing Cert with AUTHO
3,105,337 UART: RITY.KEYID = 7
3,120,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,408 UART: [art] PUB.X = 24404EC07509820E07207C9623DBBBEFCF32DFA22E1EFDF8F35E7FEAC9AF2C2857A5136E585932A267B243E6142F0AE6
3,128,178 UART: [art] PUB.Y = 663F39D62B83870DAC2AC42C4FE90AB7699C627F6CB2A17E3FAC83DD8FF9EDFBDFD65829FA33F3CAC3DB1CC53553F832
3,135,148 UART: [art] SIG.R = 303EC250C10D0631A77F7C5F1B13E5AFD568D8AE09DE34B227AB1368A38C270BEC6CF92B80618F5B1B9118C6E3D463D6
3,141,916 UART: [art] SIG.S = 05B90A229EF126C7082F7AC64CA3F0D8DD3101CB0B88940D5DF11F6A8A5C271872B25B45A6FDBB87FFA1400E34D641F0
3,165,872 UART: Caliptra RT
3,166,217 UART: [state] CFI Enabled
3,274,260 UART: [rt] RT listening for mailbox commands...
3,274,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,294 UART: [rt]cmd =0x41545348, len=116
3,306,859 >>> mbox cmd response data (12 bytes)
3,306,860 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,833 UART:
3,307,849 UART: Running Caliptra ROM ...
3,308,257 UART:
3,308,399 UART: [state] CFI Enabled
3,311,147 UART: [state] LifecycleState = Unprovisioned
3,311,802 UART: [state] DebugLocked = No
3,312,408 UART: [state] WD Timer not started. Device not locked for debugging
3,313,526 UART: [kat] SHA2-256
4,119,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,123,301 UART: [kat] ++
4,123,453 UART: [kat] sha1
4,127,773 UART: [kat] SHA2-256
4,129,713 UART: [kat] SHA2-384
4,132,604 UART: [kat] SHA2-512-ACC
4,134,504 UART: [kat] ECC-384
4,144,373 UART: [kat] HMAC-384Kdf
4,149,059 UART: [kat] LMS
4,397,387 UART: [kat] --
4,398,045 UART: [update-reset] ++
5,298,201 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,299,240 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,395,250 >>> mbox cmd response: success
5,395,250 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,395,559 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,573 UART: [update-reset Success] --
5,404,850 UART: [state] Locking Datavault
5,405,640 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,244 UART: [state] Locking ICCM
5,406,836 UART: [exit] Launching FMC @ 0x40000130
5,412,165 UART:
5,412,181 UART: Running Caliptra FMC ...
5,412,589 UART:
5,412,732 UART: [state] CFI Enabled
5,501,589 UART: [art] Extend RT PCRs Done
5,502,017 UART: [art] Lock RT PCRs Done
5,503,416 UART: [art] Populate DV Done
5,511,747 UART: [fht] FMC Alias Private Key: 7
5,512,767 UART: [art] Derive CDI
5,513,047 UART: [art] Store in in slot 0x4
5,598,958 UART: [art] Derive Key Pair
5,599,318 UART: [art] Store priv key in slot 0x5
5,613,004 UART: [art] Derive Key Pair - Done
5,627,673 UART: [art] Signing Cert with AUTHO
5,628,153 UART: RITY.KEYID = 7
5,642,839 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,604 UART: [art] PUB.X = 566E8FC069F481D3094168B625E71DF80E6E0100504762ED2EE5FC485706E3EBBDC39611D2C191CFDBB9B4C924AC0238
5,650,343 UART: [art] PUB.Y = 785E6DEB246BF77E1A410FDA4E309534F3717850B83B9D1717B308AD1D1D9728202C59322077BBA1AC1E291FC70E85B5
5,657,286 UART: [art] SIG.R = F45C99985BB379B92F3F293B5DE7AC54D0451967E6FBCA9053AA776BF0CCA7C66770EB6034DB32E9CA52A704B04C2C0C
5,664,064 UART: [art] SIG.S = C0B15870016F9E797D1C5CA302E19B28DBA61957661EDA624E28C17B807B9813F060DCF0FF91B01C577A81D362B14AF1
5,687,559 UART: mbox::rt_entry...
5,687,931 UART: ____ _ _ _ ____ _____
5,688,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,689,515 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,690,283 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,691,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,691,819 UART: |_|
5,692,131 UART:
5,974,538 UART: [rt] Runtime listening for mailbox commands...
5,975,728 >>> mbox cmd response data (48 bytes)
5,975,729 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,978,512 >>> mbox cmd response data (48 bytes)
5,978,513 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,991,451 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,320 ready_for_fw is high
1,061,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,863 >>> mbox cmd response: success
2,687,183 UART:
2,687,199 UART: Running Caliptra FMC ...
2,687,607 UART:
2,687,750 UART: [state] CFI Enabled
2,698,411 UART: [fht] FMC Alias Private Key: 7
2,806,628 UART: [art] Extend RT PCRs Done
2,807,056 UART: [art] Lock RT PCRs Done
2,809,002 UART: [art] Populate DV Done
2,817,229 UART: [fht] FMC Alias Private Key: 7
2,818,315 UART: [art] Derive CDI
2,818,595 UART: [art] Store in in slot 0x4
2,904,200 UART: [art] Derive Key Pair
2,904,560 UART: [art] Store priv key in slot 0x5
2,917,170 UART: [art] Derive Key Pair - Done
2,931,887 UART: [art] Signing Cert with AUTHO
2,932,367 UART: RITY.KEYID = 7
2,947,791 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,556 UART: [art] PUB.X = A092EBE9EBF66111C6A98CF9B0FE766B485DB0CB57DCE454ED912C939054C302AF0B898378D5E123A81B7C309B129CAF
2,955,334 UART: [art] PUB.Y = 8CB56D5A420243E8DACEAE47A458183B13859C95C9A34F544DE7CDDE35CE42CC72EC4662C4B43EC939816CBBDB39BE8D
2,962,301 UART: [art] SIG.R = B5FCA95EAF6E6FEC0E0D13D8F92EB83B0C1CCE1DD622B171123D4521A3FE83792A47599AB843FF630283D0569D66C7DF
2,969,075 UART: [art] SIG.S = B4C3684F688769036307190E7A0D3644B462EA1664FBD7ED27333D3E811B197A9A4EFDC9C1ED39A9183E3169E62180AD
2,992,952 UART: Caliptra RT
2,993,297 UART: [state] CFI Enabled
3,101,177 UART: [rt] RT listening for mailbox commands...
3,101,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,139 UART: [rt]cmd =0x41545348, len=116
3,133,838 >>> mbox cmd response data (12 bytes)
3,133,839 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,107,430 >>> mbox cmd response: success
5,107,430 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,120,296 UART:
5,120,312 UART: Running Caliptra FMC ...
5,120,720 UART:
5,120,863 UART: [state] CFI Enabled
5,210,030 UART: [art] Extend RT PCRs Done
5,210,458 UART: [art] Lock RT PCRs Done
5,211,791 UART: [art] Populate DV Done
5,219,990 UART: [fht] FMC Alias Private Key: 7
5,220,994 UART: [art] Derive CDI
5,221,274 UART: [art] Store in in slot 0x4
5,306,933 UART: [art] Derive Key Pair
5,307,293 UART: [art] Store priv key in slot 0x5
5,321,045 UART: [art] Derive Key Pair - Done
5,336,047 UART: [art] Signing Cert with AUTHO
5,336,527 UART: RITY.KEYID = 7
5,351,595 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,360 UART: [art] PUB.X = E34842510C6FC4D9DF0361E27058CEBB628CBC8EE2CB2D53434204F46FAADAD9A9380BD036E51D8CF2EAD6F835E34C23
5,359,136 UART: [art] PUB.Y = 15F3BD5E4B748FF8A578FC7593DF83F475B6D3A1EE35C173100B61B5FEB9BC65311FDBA861E56374004A5B17FF1E39CE
5,366,075 UART: [art] SIG.R = 94C9D78C3B0F25A2F534628B633FBF6249434149F5E29196B0897588220E7A7C86149FC48D68056AA60CA6D5D6CD32F5
5,372,829 UART: [art] SIG.S = 16BA140847C44E84C5B32DD0C74BAE93E90BF7C0E4C3C1A09B9B1D4D8D297482C31343CFBD15FE9CEEA5CAC57CB0B240
5,396,038 UART: mbox::rt_entry...
5,396,410 UART: ____ _ _ _ ____ _____
5,397,194 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,397,994 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,398,762 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,399,530 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,400,298 UART: |_|
5,400,610 UART:
5,683,500 UART: [rt] Runtime listening for mailbox commands...
5,684,690 >>> mbox cmd response data (48 bytes)
5,684,691 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,687,474 >>> mbox cmd response data (48 bytes)
5,687,475 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,700,413 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
85,913 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
890,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,919 UART: [kat] ++
895,071 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,898 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 ready_for_fw is high
1,174,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,363 UART: [idev] Sha1 KeyId Algorithm
1,208,109 UART: [idev] --
1,209,186 UART: [ldev] ++
1,209,354 UART: [ldev] CDI.KEYID = 6
1,209,718 UART: [ldev] SUBJECT.KEYID = 5
1,210,145 UART: [ldev] AUTHORITY.KEYID = 7
1,210,608 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,242,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,134 UART: [ldev] --
1,281,622 UART: [fwproc] Wait for Commands...
1,282,383 UART: [fwproc] Recv command 0x46574c44
1,283,116 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,587 >>> mbox cmd response: success
2,771,856 UART: [afmc] ++
2,772,024 UART: [afmc] CDI.KEYID = 6
2,772,387 UART: [afmc] SUBJECT.KEYID = 7
2,772,813 UART: [afmc] AUTHORITY.KEYID = 5
2,808,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,561 UART: [afmc] --
2,851,679 UART: [cold-reset] --
2,852,363 UART: [state] Locking Datavault
2,853,416 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,020 UART: [state] Locking ICCM
2,854,554 UART: [exit] Launching FMC @ 0x40000130
2,859,883 UART:
2,859,899 UART: Running Caliptra FMC ...
2,860,307 UART:
2,860,361 UART: [state] CFI Enabled
2,871,004 UART: [fht] FMC Alias Private Key: 7
2,978,727 UART: [art] Extend RT PCRs Done
2,979,155 UART: [art] Lock RT PCRs Done
2,980,921 UART: [art] Populate DV Done
2,989,174 UART: [fht] FMC Alias Private Key: 7
2,990,136 UART: [art] Derive CDI
2,990,416 UART: [art] Store in in slot 0x4
3,075,935 UART: [art] Derive Key Pair
3,076,295 UART: [art] Store priv key in slot 0x5
3,089,585 UART: [art] Derive Key Pair - Done
3,104,384 UART: [art] Signing Cert with AUTHO
3,104,864 UART: RITY.KEYID = 7
3,120,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,947 UART: [art] PUB.X = CD47CD96F8276C5FF5756B343973A222EB11A7E4890A6A87404A9E23C73E2FD7333E629EC597F31008D7DD82D64D8407
3,127,708 UART: [art] PUB.Y = 81D35C24A3EFA9F36A07640331E0EC5B4889D34350258E04DFF2AF6BFC7A7F8D346075D614DEB27B80D9ED24324E56D6
3,134,657 UART: [art] SIG.R = 8687855F3D07DC99F89F1C973F09D2C4F74671F39C34985807BF56226FB9FCC95DFEE57FF0333AA0DEC1A1F028FE1DC4
3,141,430 UART: [art] SIG.S = 3F0608DEC843E9EA503E07F4F789761425A039D3F5996C5EE6ED5C7ED316F969CF28EC23528F0500F1466BA8A2413823
3,164,917 UART: Caliptra RT
3,165,170 UART: [state] CFI Enabled
3,272,633 UART: [rt] RT listening for mailbox commands...
3,273,303 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,633 UART: [rt]cmd =0x41545348, len=116
3,305,566 >>> mbox cmd response data (12 bytes)
3,305,567 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,334 UART:
3,306,350 UART: Running Caliptra ROM ...
3,306,758 UART:
3,306,813 UART: [state] CFI Enabled
3,309,783 UART: [state] LifecycleState = Unprovisioned
3,310,438 UART: [state] DebugLocked = No
3,311,028 UART: [state] WD Timer not started. Device not locked for debugging
3,312,362 UART: [kat] SHA2-256
4,115,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,041 UART: [kat] ++
4,120,193 UART: [kat] sha1
4,124,419 UART: [kat] SHA2-256
4,126,359 UART: [kat] SHA2-384
4,129,188 UART: [kat] SHA2-512-ACC
4,131,088 UART: [kat] ECC-384
4,140,999 UART: [kat] HMAC-384Kdf
4,145,597 UART: [kat] LMS
4,393,909 UART: [kat] --
4,394,863 UART: [update-reset] ++
5,295,716 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,296,781 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,392,791 >>> mbox cmd response: success
5,392,791 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,393,066 UART: [update-reset] Copying MAN_2 To MAN_1
5,401,080 UART: [update-reset Success] --
5,402,083 UART: [state] Locking Datavault
5,402,797 UART: [state] Locking PCR0, PCR1 and PCR31
5,403,401 UART: [state] Locking ICCM
5,404,039 UART: [exit] Launching FMC @ 0x40000130
5,409,368 UART:
5,409,384 UART: Running Caliptra FMC ...
5,409,792 UART:
5,409,846 UART: [state] CFI Enabled
5,499,433 UART: [art] Extend RT PCRs Done
5,499,861 UART: [art] Lock RT PCRs Done
5,500,800 UART: [art] Populate DV Done
5,509,167 UART: [fht] FMC Alias Private Key: 7
5,510,281 UART: [art] Derive CDI
5,510,561 UART: [art] Store in in slot 0x4
5,595,768 UART: [art] Derive Key Pair
5,596,128 UART: [art] Store priv key in slot 0x5
5,609,278 UART: [art] Derive Key Pair - Done
5,624,168 UART: [art] Signing Cert with AUTHO
5,624,648 UART: RITY.KEYID = 7
5,639,894 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,659 UART: [art] PUB.X = 6AB4E0428CAC19ABFE2AEED215BDF6128A1CEB34A14AA57CCB2F970A4494844EE873FB1F945F8C8D83CE89A1B735FA36
5,647,450 UART: [art] PUB.Y = C327CEAA7A30831A3A53B1C5048E293F567CFC01314E26AF9ACE5B7B86F91C365E8DB3768FDEEA2DB65379E78491C3E9
5,654,408 UART: [art] SIG.R = E400D1AE7A8C1BD34A3665445958FF85559A46A3C4424D20D95CA0372230646B38D2F274D16BD628116A4B3FFDDBE259
5,661,158 UART: [art] SIG.S = CE304379F7F491E3C271C3075A1A8DC59BDF23676183082B8DEA6EDFC384E2333165E19651213AF5D091FAB6337D2350
5,685,225 UART: mbox::rt_entry...
5,685,597 UART: ____ _ _ _ ____ _____
5,686,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,687,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,687,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,688,717 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,689,485 UART: |_|
5,689,797 UART:
5,970,618 UART: [rt] Runtime listening for mailbox commands...
5,971,808 >>> mbox cmd response data (48 bytes)
5,971,809 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,974,592 >>> mbox cmd response data (48 bytes)
5,974,593 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,987,531 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,128 ready_for_fw is high
1,056,128 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,145 >>> mbox cmd response: success
2,681,673 UART:
2,681,689 UART: Running Caliptra FMC ...
2,682,097 UART:
2,682,151 UART: [state] CFI Enabled
2,692,268 UART: [fht] FMC Alias Private Key: 7
2,800,227 UART: [art] Extend RT PCRs Done
2,800,655 UART: [art] Lock RT PCRs Done
2,802,235 UART: [art] Populate DV Done
2,810,382 UART: [fht] FMC Alias Private Key: 7
2,811,468 UART: [art] Derive CDI
2,811,748 UART: [art] Store in in slot 0x4
2,897,375 UART: [art] Derive Key Pair
2,897,735 UART: [art] Store priv key in slot 0x5
2,911,181 UART: [art] Derive Key Pair - Done
2,925,573 UART: [art] Signing Cert with AUTHO
2,926,053 UART: RITY.KEYID = 7
2,941,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,926 UART: [art] PUB.X = DD69975A056D717C9260AD4B1E2B2FAF0030403766A343B56CB6794A7ADC059E1A362E9586B59DB5F2607A69BE5617EF
2,948,672 UART: [art] PUB.Y = 7F00B021BBCAB66EA25486EF8EB07775432B3FA5079C8B4935E2F45B89B38E64CB6DE283671D76B847F16D67E6BF83F3
2,955,605 UART: [art] SIG.R = 013EF00D87605E9594C56CDCBC8BCE19C06B3BC77F039CB29D6E938159E7B4317257001C29A51F1A224D1430A1A89E2B
2,962,348 UART: [art] SIG.S = 5543BE98119EA6320F28DFC8FA82473360929BAC7902AA089BE9B0CDE77A36CF40AEB86B329DC61DC330923B12AF3364
2,986,634 UART: Caliptra RT
2,986,887 UART: [state] CFI Enabled
3,094,412 UART: [rt] RT listening for mailbox commands...
3,095,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,826 UART: [rt]cmd =0x41545348, len=116
3,127,405 >>> mbox cmd response data (12 bytes)
3,127,406 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,263 >>> mbox cmd response: success
5,097,263 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,110,503 UART:
5,110,519 UART: Running Caliptra FMC ...
5,110,927 UART:
5,110,981 UART: [state] CFI Enabled
5,199,864 UART: [art] Extend RT PCRs Done
5,200,292 UART: [art] Lock RT PCRs Done
5,201,599 UART: [art] Populate DV Done
5,210,096 UART: [fht] FMC Alias Private Key: 7
5,211,178 UART: [art] Derive CDI
5,211,458 UART: [art] Store in in slot 0x4
5,297,155 UART: [art] Derive Key Pair
5,297,515 UART: [art] Store priv key in slot 0x5
5,310,789 UART: [art] Derive Key Pair - Done
5,325,618 UART: [art] Signing Cert with AUTHO
5,326,098 UART: RITY.KEYID = 7
5,341,228 UART: [art] Erasing AUTHORITY.KEYID = 7
5,341,993 UART: [art] PUB.X = 34BDDC1784BA7B9A0C4162DE2D87D2324E6F7CC3618B184AAD24200D1F12A3AF6E183B180FA45BD1E2BE7552E62E29DD
5,348,770 UART: [art] PUB.Y = 296F77F78DB971E2FD0E5F07531E7811D18FAA8ED6D9583C5A1816EFD70FA714A4B626E953772D0009204712CB47CE81
5,355,688 UART: [art] SIG.R = 83A1989063DAD11D4F65A022A2FBCB4C2E4470AD05D368EA3420E41518A010E03137EE6E3146C4988107C8FCF8307DAF
5,362,456 UART: [art] SIG.S = B666E999D0B00F03F79BF7216140E929501A2C3E13B75F28FF2A26B0ACCA611018D4CEA89578365E8AE55EE594A5E695
5,385,623 UART: mbox::rt_entry...
5,385,995 UART: ____ _ _ _ ____ _____
5,386,779 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,387,579 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,388,347 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,389,115 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,389,883 UART: |_|
5,390,195 UART:
5,671,958 UART: [rt] Runtime listening for mailbox commands...
5,673,148 >>> mbox cmd response data (48 bytes)
5,673,149 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,675,932 >>> mbox cmd response data (48 bytes)
5,675,933 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,688,871 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,260 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,174,158 ready_for_fw is high
1,174,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,199,536 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,167 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,845 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,932 >>> mbox cmd response: success
2,770,137 UART: [afmc] ++
2,770,305 UART: [afmc] CDI.KEYID = 6
2,770,668 UART: [afmc] SUBJECT.KEYID = 7
2,771,094 UART: [afmc] AUTHORITY.KEYID = 5
2,807,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,804 UART: [afmc] --
2,850,910 UART: [cold-reset] --
2,851,898 UART: [state] Locking Datavault
2,853,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,865 UART: [state] Locking ICCM
2,854,295 UART: [exit] Launching FMC @ 0x40000130
2,859,624 UART:
2,859,640 UART: Running Caliptra FMC ...
2,860,048 UART:
2,860,191 UART: [state] CFI Enabled
2,871,174 UART: [fht] FMC Alias Private Key: 7
2,978,443 UART: [art] Extend RT PCRs Done
2,978,871 UART: [art] Lock RT PCRs Done
2,980,395 UART: [art] Populate DV Done
2,988,770 UART: [fht] FMC Alias Private Key: 7
2,989,704 UART: [art] Derive CDI
2,989,984 UART: [art] Store in in slot 0x4
3,075,633 UART: [art] Derive Key Pair
3,075,993 UART: [art] Store priv key in slot 0x5
3,089,655 UART: [art] Derive Key Pair - Done
3,104,630 UART: [art] Signing Cert with AUTHO
3,105,110 UART: RITY.KEYID = 7
3,120,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,783 UART: [art] PUB.X = 539C89908FF8CCE9A9A692AD33718E02F7061A940BC59C5FA4B0DAED1A37F60A4623EFFAC27376009B73BD7C80CBE1D9
3,127,535 UART: [art] PUB.Y = 9E93A7A0ED4E92C6207B2AE73E237DDF0733883431B14368F42F842DDC23F13863FF0CFAE358EA8EF42C1C4B2BCE5F2D
3,134,495 UART: [art] SIG.R = 7F4C860745E6455B6C1F799E4DE808140BAAFB0ACC4ED9DFDCFA444555C9C60749D52926D935A20FAF451406801B2A6F
3,141,254 UART: [art] SIG.S = CAF6516238CB2BCE86777AA4CE83005765F28728AB082908FC61630530FB238E42B4C3E05E03085D5B6B6ACF7B5430A2
3,164,748 UART: Caliptra RT
3,165,093 UART: [state] CFI Enabled
3,272,970 UART: [rt] RT listening for mailbox commands...
3,273,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,134 UART: [rt]cmd =0x41545348, len=116
3,305,923 >>> mbox cmd response data (12 bytes)
3,305,924 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,659 UART:
3,306,675 UART: Running Caliptra ROM ...
3,307,083 UART:
3,307,225 UART: [state] CFI Enabled
3,310,275 UART: [state] LifecycleState = Unprovisioned
3,310,930 UART: [state] DebugLocked = No
3,311,420 UART: [state] WD Timer not started. Device not locked for debugging
3,312,758 UART: [kat] SHA2-256
4,116,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,437 UART: [kat] ++
4,120,589 UART: [kat] sha1
4,124,879 UART: [kat] SHA2-256
4,126,819 UART: [kat] SHA2-384
4,129,696 UART: [kat] SHA2-512-ACC
4,131,596 UART: [kat] ECC-384
4,141,243 UART: [kat] HMAC-384Kdf
4,146,049 UART: [kat] LMS
4,394,361 UART: [kat] --
4,395,281 UART: [update-reset] ++
5,297,154 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,298,337 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,394,347 >>> mbox cmd response: success
5,394,347 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,394,524 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,538 UART: [update-reset Success] --
5,403,663 UART: [state] Locking Datavault
5,404,299 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,903 UART: [state] Locking ICCM
5,405,505 UART: [exit] Launching FMC @ 0x40000130
5,410,834 UART:
5,410,850 UART: Running Caliptra FMC ...
5,411,258 UART:
5,411,401 UART: [state] CFI Enabled
5,500,976 UART: [art] Extend RT PCRs Done
5,501,404 UART: [art] Lock RT PCRs Done
5,502,565 UART: [art] Populate DV Done
5,510,776 UART: [fht] FMC Alias Private Key: 7
5,511,742 UART: [art] Derive CDI
5,512,022 UART: [art] Store in in slot 0x4
5,597,403 UART: [art] Derive Key Pair
5,597,763 UART: [art] Store priv key in slot 0x5
5,611,283 UART: [art] Derive Key Pair - Done
5,625,773 UART: [art] Signing Cert with AUTHO
5,626,253 UART: RITY.KEYID = 7
5,641,281 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,046 UART: [art] PUB.X = D42B42A5F447282A8F24DF2F53F096CF1AF80EA4EF356A49D9025E4F7393E60564964F937C4C84BBD94D42B2BFBD316B
5,648,817 UART: [art] PUB.Y = CE30D155649C6720E8BE6D9976A954F5AEAEAE7AC69E0B2DC76F4B262A7EC35DBBBD19D131B0EC6AD913235BCB53C691
5,655,786 UART: [art] SIG.R = A340BF5FD6351BDBAA167D83CD9719D107DC2F3C9CE5F554A14E88916F2A5B846226A74AA09FF525D104E571CFED49A7
5,662,564 UART: [art] SIG.S = 8A67DC39743C649F99048CE99026E79BC0298E807DEA3C3A14B13C2DEB4336B110824F5D3121E5374C0A14E76BC8DECC
5,686,529 UART: mbox::rt_entry...
5,686,901 UART: ____ _ _ _ ____ _____
5,687,685 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,485 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,253 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,021 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,690,789 UART: |_|
5,691,101 UART:
5,969,074 UART: [rt] Runtime listening for mailbox commands...
5,970,264 >>> mbox cmd response data (48 bytes)
5,970,265 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,973,048 >>> mbox cmd response data (48 bytes)
5,973,049 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,985,987 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,239 ready_for_fw is high
1,056,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,894 >>> mbox cmd response: success
2,683,340 UART:
2,683,356 UART: Running Caliptra FMC ...
2,683,764 UART:
2,683,907 UART: [state] CFI Enabled
2,694,160 UART: [fht] FMC Alias Private Key: 7
2,801,713 UART: [art] Extend RT PCRs Done
2,802,141 UART: [art] Lock RT PCRs Done
2,803,843 UART: [art] Populate DV Done
2,811,990 UART: [fht] FMC Alias Private Key: 7
2,813,010 UART: [art] Derive CDI
2,813,290 UART: [art] Store in in slot 0x4
2,898,855 UART: [art] Derive Key Pair
2,899,215 UART: [art] Store priv key in slot 0x5
2,912,527 UART: [art] Derive Key Pair - Done
2,927,501 UART: [art] Signing Cert with AUTHO
2,927,981 UART: RITY.KEYID = 7
2,942,941 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,706 UART: [art] PUB.X = 85A91FDB0BD539438E4B8841829CC67B5FC74C6FECDB1AB1C23364177D0F712C2B4475A7CB8DA8E1848D1849FFEE647C
2,950,484 UART: [art] PUB.Y = E296B3100573A3EDCAFF1C24EF736281A18A1603CA257A3693F6B2BDE0108A6A4B04E4C9C05110AEAB18DD7DFB5D81C0
2,957,441 UART: [art] SIG.R = 8D7A6F4360ADBCF41598A1E0380E90AD422246BD667B0AC3883D93104AD519A10C57BDEDAADF50937EFE494139C55A99
2,964,212 UART: [art] SIG.S = 4053ADC89FB00744C193E38877A4DC4083D712E0DDB4B997FDC68E6CB843A5CA5C4AC338F5ACAD29B3900EAD1C3B3946
2,987,753 UART: Caliptra RT
2,988,098 UART: [state] CFI Enabled
3,095,875 UART: [rt] RT listening for mailbox commands...
3,096,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,971 UART: [rt]cmd =0x41545348, len=116
3,128,782 >>> mbox cmd response data (12 bytes)
3,128,783 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,085 >>> mbox cmd response: success
5,097,085 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,110,443 UART:
5,110,459 UART: Running Caliptra FMC ...
5,110,867 UART:
5,111,010 UART: [state] CFI Enabled
5,199,883 UART: [art] Extend RT PCRs Done
5,200,311 UART: [art] Lock RT PCRs Done
5,201,750 UART: [art] Populate DV Done
5,210,111 UART: [fht] FMC Alias Private Key: 7
5,211,175 UART: [art] Derive CDI
5,211,455 UART: [art] Store in in slot 0x4
5,296,936 UART: [art] Derive Key Pair
5,297,296 UART: [art] Store priv key in slot 0x5
5,310,660 UART: [art] Derive Key Pair - Done
5,325,517 UART: [art] Signing Cert with AUTHO
5,325,997 UART: RITY.KEYID = 7
5,341,655 UART: [art] Erasing AUTHORITY.KEYID = 7
5,342,420 UART: [art] PUB.X = 19AFFBF12755B32059E99E74749B36FCC5D1941BF57F684EB51C08A164511E8FEDC46B3494310A98830B8CC983866CF9
5,349,183 UART: [art] PUB.Y = E004810910689BCAA1BFEAE7DEAA422129B06E593CB6F2D1755A16E540E5BDB88F154A4C4EC68E016DDE57299D7F4005
5,356,133 UART: [art] SIG.R = D0B46E345C39578167D0890D243CFA648A79956A8AC08CF698D52033C68FCC16444ECAF216398C80EC05BB1DA700BA0A
5,362,878 UART: [art] SIG.S = 71DE71D2E15C3A67D47A40AA9BCE7295EF3AD622AA2C47A3483761E053966BB8F671BA80BB4A927F16F5C4D4385CE1D0
5,386,159 UART: mbox::rt_entry...
5,386,531 UART: ____ _ _ _ ____ _____
5,387,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,388,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,388,883 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,389,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,390,419 UART: |_|
5,390,731 UART:
5,669,129 UART: [rt] Runtime listening for mailbox commands...
5,670,319 >>> mbox cmd response data (48 bytes)
5,670,320 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,673,103 >>> mbox cmd response data (48 bytes)
5,673,104 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,686,042 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,288 UART:
192,642 UART: Running Caliptra ROM ...
193,826 UART:
193,982 UART: [state] CFI Enabled
263,160 UART: [state] LifecycleState = Unprovisioned
265,089 UART: [state] DebugLocked = No
266,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,277 UART: [kat] SHA2-256
442,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,491 UART: [kat] ++
453,025 UART: [kat] sha1
463,838 UART: [kat] SHA2-256
466,557 UART: [kat] SHA2-384
472,201 UART: [kat] SHA2-512-ACC
474,580 UART: [kat] ECC-384
2,767,405 UART: [kat] HMAC-384Kdf
2,798,649 UART: [kat] LMS
3,988,948 UART: [kat] --
3,992,824 UART: [cold-reset] ++
3,994,264 UART: [fht] Storing FHT @ 0x50003400
4,004,113 UART: [idev] ++
4,004,682 UART: [idev] CDI.KEYID = 6
4,005,610 UART: [idev] SUBJECT.KEYID = 7
4,006,857 UART: [idev] UDS.KEYID = 0
4,007,861 ready_for_fw is high
4,008,060 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,151,160 UART: [idev] Erasing UDS.KEYID = 0
7,345,011 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,549 UART: [idev] --
7,370,331 UART: [ldev] ++
7,370,911 UART: [ldev] CDI.KEYID = 6
7,371,984 UART: [ldev] SUBJECT.KEYID = 5
7,373,111 UART: [ldev] AUTHORITY.KEYID = 7
7,374,342 UART: [ldev] FE.KEYID = 1
7,421,226 UART: [ldev] Erasing FE.KEYID = 1
10,757,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,508 UART: [ldev] --
13,135,395 UART: [fwproc] Waiting for Commands...
13,138,621 UART: [fwproc] Received command 0x46574c44
13,140,802 UART: [fwproc] Received Image of size 113760 bytes
17,187,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,875 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,648,098 >>> mbox cmd response: success
17,652,573 UART: [afmc] ++
17,653,174 UART: [afmc] CDI.KEYID = 6
17,654,090 UART: [afmc] SUBJECT.KEYID = 7
17,655,362 UART: [afmc] AUTHORITY.KEYID = 5
21,010,703 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,841 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,157 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,527 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,370 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,832 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,886 UART: [afmc] --
23,380,755 UART: [cold-reset] --
23,384,398 UART: [state] Locking Datavault
23,391,106 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,864 UART: [state] Locking ICCM
23,395,612 UART: [exit] Launching FMC @ 0x40000130
23,403,970 UART:
23,404,208 UART: Running Caliptra FMC ...
23,405,311 UART:
23,405,468 UART: [state] CFI Enabled
23,470,266 UART: [fht] FMC Alias Private Key: 7
25,808,737 UART: [art] Extend RT PCRs Done
25,809,959 UART: [art] Lock RT PCRs Done
25,811,639 UART: [art] Populate DV Done
25,816,991 UART: [fht] FMC Alias Private Key: 7
25,818,522 UART: [art] Derive CDI
25,819,334 UART: [art] Store in in slot 0x4
25,878,808 UART: [art] Derive Key Pair
25,879,850 UART: [art] Store priv key in slot 0x5
29,172,295 UART: [art] Derive Key Pair - Done
29,185,181 UART: [art] Signing Cert with AUTHO
29,186,515 UART: RITY.KEYID = 7
31,474,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,243 UART: [art] PUB.X = 79C0F084A4B3166E16DF3C6D55912968A08E6BDBA4E38D8D5B3175E60CA6BD6C44FBE1E3CF4559AC95831448C588E6FC
31,483,433 UART: [art] PUB.Y = 21D09C66CF103AB322B2BCEC0544C16321596E29455B87AAFB9022D2927196A189F9557AF4E6E2EAB26CC3A646C0E535
31,490,722 UART: [art] SIG.R = DB4EEDFF069AA09DEDB2D1A83215F19561C63F9E474E1C7DE71582C5F477F840E81D2A5178DE2EADE7CE93C07F556DDD
31,498,104 UART: [art] SIG.S = 5D538E485EA03674EAD6B9872BB51F5C6F6BFEFA2E39C922AC7DE179EF22BDE5951F098B5A8BC3E8229AEDF305DA847C
32,803,476 UART: Caliptra RT
32,804,190 UART: [state] CFI Enabled
32,965,296 UART: [rt] RT listening for mailbox commands...
36,987,115 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,142,656 UART: [rt]cmd =0x41544d4e, len=14344
42,443,159 >>> mbox cmd response data (8 bytes)
42,443,750 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,474,598 UART: [rt]cmd =0x41545348, len=116
42,476,890 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,806,082 ready_for_fw is high
3,806,469 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,891,299 >>> mbox cmd response: success
23,587,775 UART:
23,588,209 UART: Running Caliptra FMC ...
23,589,333 UART:
23,589,489 UART: [state] CFI Enabled
23,655,932 UART: [fht] FMC Alias Private Key: 7
25,993,541 UART: [art] Extend RT PCRs Done
25,994,770 UART: [art] Lock RT PCRs Done
25,996,545 UART: [art] Populate DV Done
26,001,906 UART: [fht] FMC Alias Private Key: 7
26,003,415 UART: [art] Derive CDI
26,004,156 UART: [art] Store in in slot 0x4
26,063,914 UART: [art] Derive Key Pair
26,064,953 UART: [art] Store priv key in slot 0x5
29,357,898 UART: [art] Derive Key Pair - Done
29,370,842 UART: [art] Signing Cert with AUTHO
29,372,138 UART: RITY.KEYID = 7
31,660,015 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,525 UART: [art] PUB.X = CF4160D8C6C200426557965A64F2F31D222FB0477B5FEC3FD2F6F49AFF198401BB866B1B6815E59F01D0857C9D07C82B
31,668,792 UART: [art] PUB.Y = D4D17D59660488B313BD5BFDE8D190CD0A7A405CC313A7A977861EB20CDADABDBE98A75059A04203616B41FEBA0AB419
31,676,041 UART: [art] SIG.R = E69E7E1C6F000D8BDB0E66F8D9C07C670F948EBE03ECFEF9F8C4115AF8A8BF6398B8D1D45DC100495E109B085ABC4720
31,683,437 UART: [art] SIG.S = 2D77889039B3A5798A2379E2420C66220A2DADC26C68F7E5B34B21956D5FC56DFA8148BF0983F0452C2D8DFE06DEFB83
32,988,094 UART: Caliptra RT
32,988,809 UART: [state] CFI Enabled
33,152,089 UART: [rt] RT listening for mailbox commands...
37,173,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,329,486 UART: [rt]cmd =0x41544d4e, len=14344
42,630,269 >>> mbox cmd response data (8 bytes)
42,630,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,661,536 UART: [rt]cmd =0x41545348, len=116
42,663,631 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,648 writing to cptra_bootfsm_go
192,885 UART:
193,271 UART: Running Caliptra ROM ...
194,464 UART:
604,105 UART: [state] CFI Enabled
618,909 UART: [state] LifecycleState = Unprovisioned
620,853 UART: [state] DebugLocked = No
622,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,088 UART: [kat] SHA2-256
797,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,342 UART: [kat] ++
808,811 UART: [kat] sha1
819,041 UART: [kat] SHA2-256
821,769 UART: [kat] SHA2-384
826,501 UART: [kat] SHA2-512-ACC
828,905 UART: [kat] ECC-384
3,114,380 UART: [kat] HMAC-384Kdf
3,125,904 UART: [kat] LMS
4,316,025 UART: [kat] --
4,320,908 UART: [cold-reset] ++
4,322,914 UART: [fht] Storing FHT @ 0x50003400
4,334,246 UART: [idev] ++
4,334,808 UART: [idev] CDI.KEYID = 6
4,335,781 UART: [idev] SUBJECT.KEYID = 7
4,337,019 UART: [idev] UDS.KEYID = 0
4,338,023 ready_for_fw is high
4,338,225 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,127 UART: [idev] Erasing UDS.KEYID = 0
7,620,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,086 UART: [idev] --
7,647,824 UART: [ldev] ++
7,648,404 UART: [ldev] CDI.KEYID = 6
7,649,420 UART: [ldev] SUBJECT.KEYID = 5
7,650,583 UART: [ldev] AUTHORITY.KEYID = 7
7,651,810 UART: [ldev] FE.KEYID = 1
7,663,264 UART: [ldev] Erasing FE.KEYID = 1
10,954,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,624 UART: [ldev] --
13,315,004 UART: [fwproc] Waiting for Commands...
13,317,924 UART: [fwproc] Received command 0x46574c44
13,320,102 UART: [fwproc] Received Image of size 113760 bytes
17,369,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,831,902 >>> mbox cmd response: success
17,836,511 UART: [afmc] ++
17,837,101 UART: [afmc] CDI.KEYID = 6
17,838,062 UART: [afmc] SUBJECT.KEYID = 7
17,839,274 UART: [afmc] AUTHORITY.KEYID = 5
21,154,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,881 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,305 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,118 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,467 UART: [afmc] --
23,522,084 UART: [cold-reset] --
23,526,158 UART: [state] Locking Datavault
23,531,783 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,534 UART: [state] Locking ICCM
23,535,353 UART: [exit] Launching FMC @ 0x40000130
23,543,754 UART:
23,544,031 UART: Running Caliptra FMC ...
23,545,143 UART:
23,545,298 UART: [state] CFI Enabled
23,553,408 UART: [fht] FMC Alias Private Key: 7
25,884,762 UART: [art] Extend RT PCRs Done
25,885,984 UART: [art] Lock RT PCRs Done
25,887,712 UART: [art] Populate DV Done
25,893,249 UART: [fht] FMC Alias Private Key: 7
25,894,948 UART: [art] Derive CDI
25,895,760 UART: [art] Store in in slot 0x4
25,938,304 UART: [art] Derive Key Pair
25,939,301 UART: [art] Store priv key in slot 0x5
29,180,815 UART: [art] Derive Key Pair - Done
29,193,984 UART: [art] Signing Cert with AUTHO
29,195,291 UART: RITY.KEYID = 7
31,474,520 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,060 UART: [art] PUB.X = 800CD232268560F0B32A8F58808756834E2FC10F40E4D54D514823AC1A5F2A42DA1D151DE8CB6893B2D137DDC330B8DA
31,483,279 UART: [art] PUB.Y = E4FF0C72999604099CC600B3FA16993361E8857B3462BC029E33CE08D67AF897234A9AD8B707A324AAD978DB80D08BD6
31,490,531 UART: [art] SIG.R = 32F7535247A4745B060103902B413C53059FA6EE3EFBB3CD879436584E4AE883918B9956EB8D8FAF04A6BFD99D0F4A85
31,497,897 UART: [art] SIG.S = B081D58C5CCC5F46CF2C72FF9674755007442BC4FD9F0ED7FCED5B75658A0A195B998615B982DED3AB5AD048D3966E8B
32,803,043 UART: Caliptra RT
32,803,756 UART: [state] CFI Enabled
32,921,975 UART: [rt] RT listening for mailbox commands...
36,949,944 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,105,594 UART: [rt]cmd =0x41544d4e, len=14344
42,405,933 >>> mbox cmd response data (8 bytes)
42,406,548 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,437,142 UART: [rt]cmd =0x41545348, len=116
42,439,004 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
4,129,043 ready_for_fw is high
4,129,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,060,882 >>> mbox cmd response: success
23,705,390 UART:
23,705,801 UART: Running Caliptra FMC ...
23,707,004 UART:
23,707,173 UART: [state] CFI Enabled
23,715,166 UART: [fht] FMC Alias Private Key: 7
26,046,943 UART: [art] Extend RT PCRs Done
26,048,171 UART: [art] Lock RT PCRs Done
26,049,752 UART: [art] Populate DV Done
26,055,330 UART: [fht] FMC Alias Private Key: 7
26,056,974 UART: [art] Derive CDI
26,057,800 UART: [art] Store in in slot 0x4
26,100,449 UART: [art] Derive Key Pair
26,101,448 UART: [art] Store priv key in slot 0x5
29,343,443 UART: [art] Derive Key Pair - Done
29,356,280 UART: [art] Signing Cert with AUTHO
29,357,589 UART: RITY.KEYID = 7
31,637,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,878 UART: [art] PUB.X = ED5DFB0FE8B1297355759FC7077DBD9B0DAEF310160EA056091F42915C1ED248ADFBD2F80E2DE0905D2224DB90AB6801
31,645,890 UART: [art] PUB.Y = 2856CF505A95663C3F05947553A8408EE962F2960F3BCA48D9C3132E4250E5A3979ED0E7EE6578D83FE2CE7001059835
31,653,136 UART: [art] SIG.R = E65E40FFA2E7ADFCA40922C07D820969D44E731661A0157BBAC2E21E578B762223C1E345381B7B2D539CB71832BD1231
31,660,491 UART: [art] SIG.S = E3A13F33548B6CB5AA41DF7E01F6302A343C8CA8A6AA38DBF09E2361DC2223C48BA3E3FA4BAE9DF875E96FB78D1E973D
32,965,581 UART: Caliptra RT
32,966,305 UART: [state] CFI Enabled
33,082,717 UART: [rt] RT listening for mailbox commands...
37,115,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,271,342 UART: [rt]cmd =0x41544d4e, len=14344
42,571,458 >>> mbox cmd response data (8 bytes)
42,572,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,602,836 UART: [rt]cmd =0x41545348, len=116
42,605,042 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,541 writing to cptra_bootfsm_go
192,613 UART:
192,990 UART: Running Caliptra ROM ...
194,098 UART:
194,244 UART: [state] CFI Enabled
263,919 UART: [state] LifecycleState = Unprovisioned
265,775 UART: [state] DebugLocked = No
267,290 UART: [state] WD Timer not started. Device not locked for debugging
271,333 UART: [kat] SHA2-256
450,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,069 UART: [kat] ++
462,605 UART: [kat] sha1
473,840 UART: [kat] SHA2-256
476,854 UART: [kat] SHA2-384
483,051 UART: [kat] SHA2-512-ACC
485,994 UART: [kat] ECC-384
2,945,827 UART: [kat] HMAC-384Kdf
2,969,798 UART: [kat] LMS
3,499,260 UART: [kat] --
3,503,632 UART: [cold-reset] ++
3,504,647 UART: [fht] FHT @ 0x50003400
3,515,970 UART: [idev] ++
3,516,529 UART: [idev] CDI.KEYID = 6
3,517,506 UART: [idev] SUBJECT.KEYID = 7
3,518,675 UART: [idev] UDS.KEYID = 0
3,519,594 ready_for_fw is high
3,519,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,229 UART: [idev] Erasing UDS.KEYID = 0
6,024,150 UART: [idev] Sha1 KeyId Algorithm
6,046,219 UART: [idev] --
6,049,735 UART: [ldev] ++
6,050,303 UART: [ldev] CDI.KEYID = 6
6,051,188 UART: [ldev] SUBJECT.KEYID = 5
6,052,392 UART: [ldev] AUTHORITY.KEYID = 7
6,053,678 UART: [ldev] FE.KEYID = 1
6,098,181 UART: [ldev] Erasing FE.KEYID = 1
8,599,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,816 UART: [ldev] --
10,409,645 UART: [fwproc] Wait for Commands...
10,411,464 UART: [fwproc] Recv command 0x46574c44
10,413,546 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,143 >>> mbox cmd response: success
14,274,792 UART: [afmc] ++
14,275,385 UART: [afmc] CDI.KEYID = 6
14,276,293 UART: [afmc] SUBJECT.KEYID = 7
14,277,388 UART: [afmc] AUTHORITY.KEYID = 5
16,805,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,783 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,975 UART: [afmc] --
18,607,110 UART: [cold-reset] --
18,610,876 UART: [state] Locking Datavault
18,617,311 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,045 UART: [state] Locking ICCM
18,621,263 UART: [exit] Launching FMC @ 0x40000130
18,629,670 UART:
18,629,905 UART: Running Caliptra FMC ...
18,631,006 UART:
18,631,168 UART: [state] CFI Enabled
18,689,305 UART: [fht] FMC Alias Private Key: 7
20,454,104 UART: [art] Extend RT PCRs Done
20,455,318 UART: [art] Lock RT PCRs Done
20,457,017 UART: [art] Populate DV Done
20,462,459 UART: [fht] FMC Alias Private Key: 7
20,464,057 UART: [art] Derive CDI
20,464,824 UART: [art] Store in in slot 0x4
20,522,075 UART: [art] Derive Key Pair
20,523,097 UART: [art] Store priv key in slot 0x5
22,986,298 UART: [art] Derive Key Pair - Done
22,999,341 UART: [art] Signing Cert with AUTHO
23,000,635 UART: RITY.KEYID = 7
24,712,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,939 UART: [art] PUB.X = 0D35AD2AD9B0BC4128EF5A92A22350D54EE1A2BC9AB0EE7C474DF57D89E1C942B1CF566362A8A56B1EF63010D2A34DF1
24,721,208 UART: [art] PUB.Y = D93D1885B9245D511DAD8B72A65EC6E903711ECDD744669E5A4FCE29E5BB0186A7123660AF06B0A6BA1C1B074346B232
24,728,514 UART: [art] SIG.R = A45E48F1C6012D6D7FC53CCB4668E41BA821F39E93B34F7E5B5F0FA89009A914CE90A9D38706607FC5E403EDBEAB7633
24,735,924 UART: [art] SIG.S = 6C6A900383642F747C6AFF0B818C1B5834E2401FA5DC238A57E563E883A1A3BFF3A587BE7356604543E28F7DC609F478
25,714,606 UART: Caliptra RT
25,715,305 UART: [state] CFI Enabled
25,881,820 UART: [rt] RT listening for mailbox commands...
29,902,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,058,074 UART: [rt]cmd =0x41544d4e, len=14344
34,054,132 >>> mbox cmd response data (8 bytes)
34,054,892 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,085,372 UART: [rt]cmd =0x41545348, len=116
34,087,522 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
3,377,877 ready_for_fw is high
3,378,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,061,125 >>> mbox cmd response: success
18,343,657 UART:
18,344,059 UART: Running Caliptra FMC ...
18,345,175 UART:
18,345,328 UART: [state] CFI Enabled
18,408,989 UART: [fht] FMC Alias Private Key: 7
20,173,250 UART: [art] Extend RT PCRs Done
20,174,474 UART: [art] Lock RT PCRs Done
20,176,505 UART: [art] Populate DV Done
20,181,913 UART: [fht] FMC Alias Private Key: 7
20,183,451 UART: [art] Derive CDI
20,184,181 UART: [art] Store in in slot 0x4
20,241,510 UART: [art] Derive Key Pair
20,242,551 UART: [art] Store priv key in slot 0x5
22,705,468 UART: [art] Derive Key Pair - Done
22,718,637 UART: [art] Signing Cert with AUTHO
22,719,971 UART: RITY.KEYID = 7
24,431,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,623 UART: [art] PUB.X = 9A32D0588324E5A51B3015D47B1DA18386EEB69C2466441E122C003206899F6E71B593360622A225BF7DB6A7DE388BA0
24,439,839 UART: [art] PUB.Y = 89E28AFEE8D516481D9941F0C2868D01A2AB3B22CDF39ED30A4CCE9B1114B0F4715064C21D64A6E4C3160B10987C4173
24,447,140 UART: [art] SIG.R = 0A7C439F62E82FC7B58323707C00FBEE20FF2F2B4926ACFF2744347ED8C5DACCF67D6CF5CDF10CBCE92F47A6CE0592C4
24,454,505 UART: [art] SIG.S = D2E80EC4C37B3A5F46787C5EDF9851D272425990FE12D471296860DBE823A679ED65B9C62894B40CBBE5F4AFC7AC2A16
25,433,531 UART: Caliptra RT
25,434,235 UART: [state] CFI Enabled
25,598,112 UART: [rt] RT listening for mailbox commands...
29,625,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,780,823 UART: [rt]cmd =0x41544d4e, len=14344
33,776,232 >>> mbox cmd response data (8 bytes)
33,776,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,807,653 UART: [rt]cmd =0x41545348, len=116
33,809,541 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,957 writing to cptra_bootfsm_go
193,086 UART:
193,463 UART: Running Caliptra ROM ...
194,653 UART:
604,413 UART: [state] CFI Enabled
618,424 UART: [state] LifecycleState = Unprovisioned
620,437 UART: [state] DebugLocked = No
622,458 UART: [state] WD Timer not started. Device not locked for debugging
626,852 UART: [kat] SHA2-256
806,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,602 UART: [kat] ++
818,051 UART: [kat] sha1
829,919 UART: [kat] SHA2-256
832,931 UART: [kat] SHA2-384
838,708 UART: [kat] SHA2-512-ACC
841,646 UART: [kat] ECC-384
3,283,677 UART: [kat] HMAC-384Kdf
3,296,773 UART: [kat] LMS
3,826,255 UART: [kat] --
3,830,906 UART: [cold-reset] ++
3,833,351 UART: [fht] FHT @ 0x50003400
3,843,765 UART: [idev] ++
3,844,329 UART: [idev] CDI.KEYID = 6
3,845,212 UART: [idev] SUBJECT.KEYID = 7
3,846,456 UART: [idev] UDS.KEYID = 0
3,847,393 ready_for_fw is high
3,847,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,947 UART: [idev] Erasing UDS.KEYID = 0
6,317,471 UART: [idev] Sha1 KeyId Algorithm
6,339,232 UART: [idev] --
6,342,458 UART: [ldev] ++
6,343,031 UART: [ldev] CDI.KEYID = 6
6,343,963 UART: [ldev] SUBJECT.KEYID = 5
6,345,121 UART: [ldev] AUTHORITY.KEYID = 7
6,346,352 UART: [ldev] FE.KEYID = 1
6,358,022 UART: [ldev] Erasing FE.KEYID = 1
8,829,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,812 UART: [ldev] --
10,617,619 UART: [fwproc] Wait for Commands...
10,620,369 UART: [fwproc] Recv command 0x46574c44
10,622,500 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,445 >>> mbox cmd response: success
14,490,585 UART: [afmc] ++
14,491,185 UART: [afmc] CDI.KEYID = 6
14,492,101 UART: [afmc] SUBJECT.KEYID = 7
14,493,259 UART: [afmc] AUTHORITY.KEYID = 5
17,000,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,083 UART: [afmc] --
18,799,803 UART: [cold-reset] --
18,804,322 UART: [state] Locking Datavault
18,807,855 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,506 UART: [state] Locking ICCM
18,812,104 UART: [exit] Launching FMC @ 0x40000130
18,820,564 UART:
18,820,801 UART: Running Caliptra FMC ...
18,821,902 UART:
18,822,061 UART: [state] CFI Enabled
18,830,382 UART: [fht] FMC Alias Private Key: 7
20,587,068 UART: [art] Extend RT PCRs Done
20,588,289 UART: [art] Lock RT PCRs Done
20,589,592 UART: [art] Populate DV Done
20,594,954 UART: [fht] FMC Alias Private Key: 7
20,596,498 UART: [art] Derive CDI
20,597,318 UART: [art] Store in in slot 0x4
20,640,031 UART: [art] Derive Key Pair
20,641,080 UART: [art] Store priv key in slot 0x5
23,068,006 UART: [art] Derive Key Pair - Done
23,081,178 UART: [art] Signing Cert with AUTHO
23,082,510 UART: RITY.KEYID = 7
24,788,041 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,551 UART: [art] PUB.X = B4315801394A7F314F86D1E912A2FBA17155EF1D45FCE4B6F47564235226CF3A4FFCE75851A9A63349C43A0AC8EB9BBD
24,796,817 UART: [art] PUB.Y = 60AF7171069918F2F286519D68EB6A16AD3600F9CCAC1C399974986A4318B307FE8AD7335C311F5A6D44DFF2B0A6FE17
24,804,082 UART: [art] SIG.R = 4CC11EAEC6AAEDF5DAA88F64D7DB7AB691144E93BEA5DA0472B3D5ED72D2F375769B2648A34146E5FE4E98F6FA16E2A5
24,811,511 UART: [art] SIG.S = 2DC9C988BEE306403E389CBAD22265FECD5458414C169F670BD5575966F6B90CF84BE59530CED696B8C69FE839BFC57D
25,790,871 UART: Caliptra RT
25,791,561 UART: [state] CFI Enabled
25,909,013 UART: [rt] RT listening for mailbox commands...
29,933,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,088,592 UART: [rt]cmd =0x41544d4e, len=14344
34,084,186 >>> mbox cmd response data (8 bytes)
34,084,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,115,688 UART: [rt]cmd =0x41545348, len=116
34,118,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,771 writing to cptra_bootfsm_go
3,703,312 ready_for_fw is high
3,703,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,753 >>> mbox cmd response: success
18,531,864 UART:
18,532,277 UART: Running Caliptra FMC ...
18,533,471 UART:
18,533,645 UART: [state] CFI Enabled
18,541,380 UART: [fht] FMC Alias Private Key: 7
20,297,660 UART: [art] Extend RT PCRs Done
20,298,884 UART: [art] Lock RT PCRs Done
20,300,731 UART: [art] Populate DV Done
20,306,263 UART: [fht] FMC Alias Private Key: 7
20,307,917 UART: [art] Derive CDI
20,308,738 UART: [art] Store in in slot 0x4
20,351,524 UART: [art] Derive Key Pair
20,352,567 UART: [art] Store priv key in slot 0x5
22,779,051 UART: [art] Derive Key Pair - Done
22,792,055 UART: [art] Signing Cert with AUTHO
22,793,376 UART: RITY.KEYID = 7
24,498,906 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,419 UART: [art] PUB.X = 1A5B891B33D1675C271D3C30315042602AB6F470E2164B5FCFD500193B81E407E513D7D8666EAED703206360145BAA22
24,507,657 UART: [art] PUB.Y = D2566C858A56C103DE9FB1739617CC813A46464C824D1796E27AA687AB52B7ABB82607A6CBF76BC32278FCFE9CB4CBE1
24,514,887 UART: [art] SIG.R = 8DB60F10024EC0D48CD40FBCFB7BB08F368B25F85224220680810AB3B58A4730BD8AEB15CB0766CE671D3C33F9428D28
24,522,311 UART: [art] SIG.S = 78518EAED2CEEB4C3F61FD53C875FAD4093075D40DB9585C6F4D5FEFF04762B8F1AA1E771C172EBF325E03830BF85BD2
25,500,384 UART: Caliptra RT
25,501,099 UART: [state] CFI Enabled
25,619,141 UART: [rt] RT listening for mailbox commands...
29,642,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,798,294 UART: [rt]cmd =0x41544d4e, len=14344
33,794,744 >>> mbox cmd response data (8 bytes)
33,795,361 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,826,093 UART: [rt]cmd =0x41545348, len=116
33,828,412 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,451 UART:
192,840 UART: Running Caliptra ROM ...
193,949 UART:
194,089 UART: [state] CFI Enabled
264,969 UART: [state] LifecycleState = Unprovisioned
267,347 UART: [state] DebugLocked = No
269,893 UART: [state] WD Timer not started. Device not locked for debugging
274,834 UART: [kat] SHA2-256
464,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,448 UART: [kat] ++
475,894 UART: [kat] sha1
487,474 UART: [kat] SHA2-256
490,484 UART: [kat] SHA2-384
495,619 UART: [kat] SHA2-512-ACC
498,197 UART: [kat] ECC-384
2,948,023 UART: [kat] HMAC-384Kdf
2,972,695 UART: [kat] LMS
3,504,515 UART: [kat] --
3,509,924 UART: [cold-reset] ++
3,510,999 UART: [fht] FHT @ 0x50003400
3,523,980 UART: [idev] ++
3,524,686 UART: [idev] CDI.KEYID = 6
3,525,606 UART: [idev] SUBJECT.KEYID = 7
3,526,846 UART: [idev] UDS.KEYID = 0
3,527,765 ready_for_fw is high
3,527,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,951 UART: [idev] Erasing UDS.KEYID = 0
6,050,833 UART: [idev] Sha1 KeyId Algorithm
6,073,466 UART: [idev] --
6,077,735 UART: [ldev] ++
6,078,416 UART: [ldev] CDI.KEYID = 6
6,079,329 UART: [ldev] SUBJECT.KEYID = 5
6,080,485 UART: [ldev] AUTHORITY.KEYID = 7
6,081,715 UART: [ldev] FE.KEYID = 1
6,122,886 UART: [ldev] Erasing FE.KEYID = 1
8,631,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,674 UART: [ldev] --
10,433,929 UART: [fwproc] Wait for Commands...
10,437,164 UART: [fwproc] Recv command 0x46574c44
10,439,480 UART: [fwproc] Recv'd Img size: 114084 bytes
13,890,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,969,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,085,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,627,030 >>> mbox cmd response: success
14,631,370 UART: [afmc] ++
14,632,079 UART: [afmc] CDI.KEYID = 6
14,633,327 UART: [afmc] SUBJECT.KEYID = 7
14,634,764 UART: [afmc] AUTHORITY.KEYID = 5
17,173,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,073 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,430 UART: [afmc] --
18,969,134 UART: [cold-reset] --
18,973,650 UART: [state] Locking Datavault
18,980,480 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,635 UART: [state] Locking ICCM
18,984,633 UART: [exit] Launching FMC @ 0x40000130
18,993,285 UART:
18,993,558 UART: Running Caliptra FMC ...
18,994,596 UART:
18,994,743 UART: [state] CFI Enabled
19,051,344 UART: [fht] FMC Alias Private Key: 7
20,815,856 UART: [art] Extend RT PCRs Done
20,817,063 UART: [art] Lock RT PCRs Done
20,818,415 UART: [art] Populate DV Done
20,823,772 UART: [fht] FMC Alias Private Key: 7
20,825,359 UART: [art] Derive CDI
20,826,169 UART: [art] Store in in slot 0x4
20,884,051 UART: [art] Derive Key Pair
20,885,116 UART: [art] Store priv key in slot 0x5
23,348,413 UART: [art] Derive Key Pair - Done
23,361,569 UART: [art] Signing Cert with AUTHO
23,362,861 UART: RITY.KEYID = 7
25,073,642 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,151 UART: [art] PUB.X = 356D29786E4A220907FBB390B22EEE311F48A4B7EF372C189F74450823BA070704A7D93A9CBF843A944E7421FD160060
25,082,359 UART: [art] PUB.Y = E293DF45B9C8BB9FBF645F0087562579BEC9BB7EE428E49CB93EF6EF3E818863FD3CEFBB47714F99F3A0CED4FEB3CCAC
25,089,665 UART: [art] SIG.R = 47D37E009902109B13AF0DF0B2EF3F39A12861C5A1ED607318D602A309B9F605A997132F8F92C0E7F6254DD32077A4BD
25,097,045 UART: [art] SIG.S = 2F14B47CD10C45EE36C122B50BEB2F0F643AE74D01528E6EF4489C51535D3DF5557A7C882F5663EC7ADF6ED7A77AB64F
26,075,367 UART: Caliptra RT
26,076,059 UART: [state] CFI Enabled
26,241,553 UART: [rt] RT listening for mailbox commands...
30,263,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,419,400 UART: [rt]cmd =0x41544d4e, len=14344
34,414,787 >>> mbox cmd response data (8 bytes)
34,415,374 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,446,064 UART: [rt]cmd =0x41545348, len=116
34,448,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,437,559 ready_for_fw is high
3,437,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,987 >>> mbox cmd response: success
19,024,982 UART:
19,025,382 UART: Running Caliptra FMC ...
19,026,579 UART:
19,026,758 UART: [state] CFI Enabled
19,093,579 UART: [fht] FMC Alias Private Key: 7
20,857,854 UART: [art] Extend RT PCRs Done
20,859,074 UART: [art] Lock RT PCRs Done
20,860,920 UART: [art] Populate DV Done
20,866,438 UART: [fht] FMC Alias Private Key: 7
20,868,177 UART: [art] Derive CDI
20,869,003 UART: [art] Store in in slot 0x4
20,926,104 UART: [art] Derive Key Pair
20,927,096 UART: [art] Store priv key in slot 0x5
23,389,877 UART: [art] Derive Key Pair - Done
23,402,669 UART: [art] Signing Cert with AUTHO
23,403,972 UART: RITY.KEYID = 7
25,115,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,564 UART: [art] PUB.X = 62A9BC2B2B8B137A57FC3CC0D0DA12DB71210E126A5EB8A3559B85B0DE2D8FCE6444F37E5FF166B4D34B377C99CE4AD7
25,123,852 UART: [art] PUB.Y = 6FA92F5089F6E89089393171A283F1E3C153E5C677B431570E98BCBEF1F9E26C8E9D8AF55D0786026D006024280691C8
25,131,072 UART: [art] SIG.R = 700BF2AF982C4BECBA1994F25F1EE7D7248CB71B9D368C8CE12B4F64A843E493C22E18B73BE6F05965527F532E3ADD26
25,138,459 UART: [art] SIG.S = 7CCA4B76CBB665FB25D56F81B25A86199B6AF21632A0EAE8FD8BE161B400E6877F2AB7896C9C71727679CAC1F13C4FF0
26,117,068 UART: Caliptra RT
26,117,779 UART: [state] CFI Enabled
26,280,751 UART: [rt] RT listening for mailbox commands...
30,302,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,458,663 UART: [rt]cmd =0x41544d4e, len=14344
34,453,837 >>> mbox cmd response data (8 bytes)
34,454,425 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,484,893 UART: [rt]cmd =0x41545348, len=116
34,486,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,743 writing to cptra_bootfsm_go
192,865 UART:
193,287 UART: Running Caliptra ROM ...
194,496 UART:
603,945 UART: [state] CFI Enabled
616,956 UART: [state] LifecycleState = Unprovisioned
619,332 UART: [state] DebugLocked = No
622,073 UART: [state] WD Timer not started. Device not locked for debugging
627,325 UART: [kat] SHA2-256
817,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,020 UART: [kat] ++
828,630 UART: [kat] sha1
838,537 UART: [kat] SHA2-256
841,583 UART: [kat] SHA2-384
847,881 UART: [kat] SHA2-512-ACC
850,469 UART: [kat] ECC-384
3,292,976 UART: [kat] HMAC-384Kdf
3,305,349 UART: [kat] LMS
3,837,203 UART: [kat] --
3,842,638 UART: [cold-reset] ++
3,844,290 UART: [fht] FHT @ 0x50003400
3,856,977 UART: [idev] ++
3,857,688 UART: [idev] CDI.KEYID = 6
3,858,720 UART: [idev] SUBJECT.KEYID = 7
3,859,823 UART: [idev] UDS.KEYID = 0
3,860,761 ready_for_fw is high
3,860,961 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,298 UART: [idev] Erasing UDS.KEYID = 0
6,334,565 UART: [idev] Sha1 KeyId Algorithm
6,356,548 UART: [idev] --
6,360,862 UART: [ldev] ++
6,361,440 UART: [ldev] CDI.KEYID = 6
6,362,351 UART: [ldev] SUBJECT.KEYID = 5
6,363,511 UART: [ldev] AUTHORITY.KEYID = 7
6,364,744 UART: [ldev] FE.KEYID = 1
6,376,253 UART: [ldev] Erasing FE.KEYID = 1
8,855,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,742 UART: [ldev] --
10,651,095 UART: [fwproc] Wait for Commands...
10,653,845 UART: [fwproc] Recv command 0x46574c44
10,656,166 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,827,804 >>> mbox cmd response: success
14,832,733 UART: [afmc] ++
14,833,354 UART: [afmc] CDI.KEYID = 6
14,834,499 UART: [afmc] SUBJECT.KEYID = 7
14,835,944 UART: [afmc] AUTHORITY.KEYID = 5
17,338,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,291 UART: [afmc] --
19,136,357 UART: [cold-reset] --
19,141,202 UART: [state] Locking Datavault
19,146,101 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,265 UART: [state] Locking ICCM
19,150,373 UART: [exit] Launching FMC @ 0x40000130
19,159,035 UART:
19,159,293 UART: Running Caliptra FMC ...
19,160,396 UART:
19,160,557 UART: [state] CFI Enabled
19,168,396 UART: [fht] FMC Alias Private Key: 7
20,925,763 UART: [art] Extend RT PCRs Done
20,926,984 UART: [art] Lock RT PCRs Done
20,929,064 UART: [art] Populate DV Done
20,934,320 UART: [fht] FMC Alias Private Key: 7
20,935,860 UART: [art] Derive CDI
20,936,591 UART: [art] Store in in slot 0x4
20,979,069 UART: [art] Derive Key Pair
20,980,071 UART: [art] Store priv key in slot 0x5
23,407,290 UART: [art] Derive Key Pair - Done
23,420,471 UART: [art] Signing Cert with AUTHO
23,421,778 UART: RITY.KEYID = 7
25,127,545 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,050 UART: [art] PUB.X = ED36B377BB930C2458AEF2BC06A029903C9CBD8FB4704A490A392381C49191CD413D6BF41A20B6C990F627B9EAB74E8A
25,136,323 UART: [art] PUB.Y = 5A98ACB500FEE0D409EC85E24EB8F08CCBD31CE8491FD540B7A58526420BAA3B7AAE1E5C80772C7BF69FDEA865CF33A9
25,143,578 UART: [art] SIG.R = 39418A5A4EAB4F13DAB3F348AB1518EC024C34A4DD38A8649D91CF84E940CB7B39428FA1252057CBD8E0B81573B8D5AB
25,151,006 UART: [art] SIG.S = 654D8A99BC93BA27F1AB1488C3F8D201E120E8C4E9670F3BA1C42C6D6BB3E630B64A563B75EE9D293657A39589A5699C
26,129,638 UART: Caliptra RT
26,130,332 UART: [state] CFI Enabled
26,248,081 UART: [rt] RT listening for mailbox commands...
30,269,400 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,425,400 UART: [rt]cmd =0x41544d4e, len=14344
34,420,969 >>> mbox cmd response data (8 bytes)
34,421,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,452,293 UART: [rt]cmd =0x41545348, len=116
34,454,504 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,755,117 ready_for_fw is high
3,755,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,964,682 >>> mbox cmd response: success
19,217,705 UART:
19,218,093 UART: Running Caliptra FMC ...
19,219,301 UART:
19,219,470 UART: [state] CFI Enabled
19,227,144 UART: [fht] FMC Alias Private Key: 7
20,984,431 UART: [art] Extend RT PCRs Done
20,985,660 UART: [art] Lock RT PCRs Done
20,987,342 UART: [art] Populate DV Done
20,992,771 UART: [fht] FMC Alias Private Key: 7
20,994,266 UART: [art] Derive CDI
20,995,109 UART: [art] Store in in slot 0x4
21,037,611 UART: [art] Derive Key Pair
21,038,654 UART: [art] Store priv key in slot 0x5
23,465,448 UART: [art] Derive Key Pair - Done
23,478,340 UART: [art] Signing Cert with AUTHO
23,479,654 UART: RITY.KEYID = 7
25,185,069 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,143 UART: [art] PUB.X = 6C3E782F5EBDB9D77FEEFF987292C2EB7F760F3CAC9B26AFB799D755A251D591C8641AE936C666954E8150B2B3E42FFB
25,193,839 UART: [art] PUB.Y = C4EA80864AEC1922124A99667B03682BD1E1A9A712A9F218C0821CBE6C5BC43C4C135411325E5A5F919646D30B207BA5
25,201,082 UART: [art] SIG.R = D6FBF17DBBE8B3753D33CD4E7027D714BA1466F84AEB97D6194BF1C14FA59D3F10FD79834603E86B69B443D11F6F7D78
25,208,476 UART: [art] SIG.S = 10E522F33220717FB4CE82AB60D6A6AB8296C8D9CED7F8B2EA96D1EB1022B04C1799BE21A9E3ED88556371338B42C1B1
26,188,281 UART: Caliptra RT
26,188,979 UART: [state] CFI Enabled
26,306,441 UART: [rt] RT listening for mailbox commands...
30,328,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,484,100 UART: [rt]cmd =0x41544d4e, len=14344
34,479,475 >>> mbox cmd response data (8 bytes)
34,480,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,510,670 UART: [rt]cmd =0x41545348, len=116
34,512,994 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,242 UART: [kat] SHA2-512-ACC
897,143 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,713 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 ready_for_fw is high
1,480,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,505,096 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,897 UART: [ldev] ++
1,515,065 UART: [ldev] CDI.KEYID = 6
1,515,428 UART: [ldev] SUBJECT.KEYID = 5
1,515,854 UART: [ldev] AUTHORITY.KEYID = 7
1,516,317 UART: [ldev] FE.KEYID = 1
1,521,365 UART: [ldev] Erasing FE.KEYID = 1
1,546,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,887 UART: [fwproc] Waiting for Commands...
1,586,506 UART: [fwproc] Received command 0x46574c44
1,587,297 UART: [fwproc] Received Image of size 114084 bytes
2,882,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,755 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,354 >>> mbox cmd response: success
3,076,518 UART: [afmc] ++
3,076,686 UART: [afmc] CDI.KEYID = 6
3,077,048 UART: [afmc] SUBJECT.KEYID = 7
3,077,473 UART: [afmc] AUTHORITY.KEYID = 5
3,112,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,617 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,307 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,058 UART: [afmc] --
3,156,092 UART: [cold-reset] --
3,157,194 UART: [state] Locking Datavault
3,158,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,099 UART: [state] Locking ICCM
3,159,651 UART: [exit] Launching FMC @ 0x40000130
3,164,980 UART:
3,164,996 UART: Running Caliptra FMC ...
3,165,404 UART:
3,165,458 UART: [state] CFI Enabled
3,176,061 UART: [fht] FMC Alias Private Key: 7
3,283,822 UART: [art] Extend RT PCRs Done
3,284,250 UART: [art] Lock RT PCRs Done
3,285,964 UART: [art] Populate DV Done
3,294,225 UART: [fht] FMC Alias Private Key: 7
3,295,189 UART: [art] Derive CDI
3,295,469 UART: [art] Store in in slot 0x4
3,381,146 UART: [art] Derive Key Pair
3,381,506 UART: [art] Store priv key in slot 0x5
3,394,798 UART: [art] Derive Key Pair - Done
3,409,248 UART: [art] Signing Cert with AUTHO
3,409,728 UART: RITY.KEYID = 7
3,425,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,793 UART: [art] PUB.X = 888ACEBAEB683F582E98ACDD48850320525589489F1C4D7A9802EBACB0B8611511E117CAB163DE62EA4E3AE6AC882811
3,432,567 UART: [art] PUB.Y = AE0DB8AB8E9317D7D82F9DFF0058F5F20EE7C997A71885B10F7845B743E9CFE9EAA168EAE43684D7B22F0DC231B7D995
3,439,499 UART: [art] SIG.R = 5D80BA2CC9E830D0BCA3A1BE39A0658658592F99E2D4435B8FD355B72499F0C0DAB772FBA677D8BD0E60D4BE83991C27
3,446,278 UART: [art] SIG.S = 9F4B353946784BEFB76727039418E6B4260B8ECB32935F584AF07F14C1C1950AD367E5F3930875B7D3DF36223B1EC27C
3,469,785 UART: Caliptra RT
3,470,038 UART: [state] CFI Enabled
3,577,949 UART: [rt] RT listening for mailbox commands...
3,578,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,727 UART: [rt]cmd =0x41544d4e, len=14344
4,011,616 >>> mbox cmd response data (8 bytes)
4,011,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,608 UART: [rt]cmd =0x41545348, len=116
4,043,510 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,299 ready_for_fw is high
1,362,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,172 >>> mbox cmd response: success
2,985,532 UART:
2,985,548 UART: Running Caliptra FMC ...
2,985,956 UART:
2,986,010 UART: [state] CFI Enabled
2,996,703 UART: [fht] FMC Alias Private Key: 7
3,105,148 UART: [art] Extend RT PCRs Done
3,105,576 UART: [art] Lock RT PCRs Done
3,107,062 UART: [art] Populate DV Done
3,115,447 UART: [fht] FMC Alias Private Key: 7
3,116,565 UART: [art] Derive CDI
3,116,845 UART: [art] Store in in slot 0x4
3,202,322 UART: [art] Derive Key Pair
3,202,682 UART: [art] Store priv key in slot 0x5
3,215,510 UART: [art] Derive Key Pair - Done
3,230,660 UART: [art] Signing Cert with AUTHO
3,231,140 UART: RITY.KEYID = 7
3,246,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,021 UART: [art] PUB.X = 83377F5197C650F2326DFE0FC62F7986A278E3AC017874C647AE5ABA234BD99255F089B58B454723F94D0F732E489600
3,253,754 UART: [art] PUB.Y = 3E52CCFCCABEDC595BB6AA376720D947C4E22859E671358C62E66FA8BA3942311D87E9567608025890C9AE82AB27B4BA
3,260,706 UART: [art] SIG.R = FB836C9B9E013AA57A827B30BC0BB23239F096DB6A4EA98ED6CA7DA6647BE7D636D9BDE250FC6285142DFE93ACB5AC54
3,267,492 UART: [art] SIG.S = B93B94B2A6CEF9EB84E8A81C0E22334035D28D7847B33BBC8B4BE3DC96B9863EC54D0410F85D9EB02F42B74B47EACE58
3,291,163 UART: Caliptra RT
3,291,416 UART: [state] CFI Enabled
3,399,170 UART: [rt] RT listening for mailbox commands...
3,399,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,756 UART: [rt]cmd =0x41544d4e, len=14344
3,833,189 >>> mbox cmd response data (8 bytes)
3,833,190 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,295 UART: [rt]cmd =0x41545348, len=116
3,864,947 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,313 UART: [kat] HMAC-384Kdf
907,913 UART: [kat] LMS
1,476,109 UART: [kat] --
1,476,844 UART: [cold-reset] ++
1,477,234 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 ready_for_fw is high
1,481,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,947 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,834 UART: [ldev] ++
1,515,002 UART: [ldev] CDI.KEYID = 6
1,515,365 UART: [ldev] SUBJECT.KEYID = 5
1,515,791 UART: [ldev] AUTHORITY.KEYID = 7
1,516,254 UART: [ldev] FE.KEYID = 1
1,521,552 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,219 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,205 UART: [fwproc] Received command 0x46574c44
1,587,996 UART: [fwproc] Received Image of size 114084 bytes
2,881,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,574 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,936,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,323 >>> mbox cmd response: success
3,073,441 UART: [afmc] ++
3,073,609 UART: [afmc] CDI.KEYID = 6
3,073,971 UART: [afmc] SUBJECT.KEYID = 7
3,074,396 UART: [afmc] AUTHORITY.KEYID = 5
3,109,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,131,965 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,137,850 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,540 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,427 UART: [afmc] --
3,152,483 UART: [cold-reset] --
3,153,241 UART: [state] Locking Datavault
3,154,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,110 UART: [state] Locking ICCM
3,155,558 UART: [exit] Launching FMC @ 0x40000130
3,160,887 UART:
3,160,903 UART: Running Caliptra FMC ...
3,161,311 UART:
3,161,454 UART: [state] CFI Enabled
3,172,513 UART: [fht] FMC Alias Private Key: 7
3,280,412 UART: [art] Extend RT PCRs Done
3,280,840 UART: [art] Lock RT PCRs Done
3,282,104 UART: [art] Populate DV Done
3,290,357 UART: [fht] FMC Alias Private Key: 7
3,291,361 UART: [art] Derive CDI
3,291,641 UART: [art] Store in in slot 0x4
3,377,406 UART: [art] Derive Key Pair
3,377,766 UART: [art] Store priv key in slot 0x5
3,391,006 UART: [art] Derive Key Pair - Done
3,406,187 UART: [art] Signing Cert with AUTHO
3,406,667 UART: RITY.KEYID = 7
3,422,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,052 UART: [art] PUB.X = EF5BC8AAE2467A7CCD660B936FBB0926A5E0AF8087D70F23CE6959C1CF7C8F81730AF71817D000CB744F00DD74085CC3
3,429,777 UART: [art] PUB.Y = EA8FFBF89DECEB3764CFF35BFDCD86AB523D3815AA6083019EC77B9A6A96CE82778878420C986DA71A87F33CB3D23175
3,436,737 UART: [art] SIG.R = A3642C2A69724715E8E65F943AA64E1BD58E69B08AE63B0721601D701E2B09478A0F18E2C3A2305D5CB4E4CCA349EE88
3,443,502 UART: [art] SIG.S = 844842902AD71711477D985F6E3BD008039B95F46CBA93622901CC7734391C8E575C9F1D7833B783EF49234E1F18F95E
3,466,546 UART: Caliptra RT
3,466,891 UART: [state] CFI Enabled
3,575,421 UART: [rt] RT listening for mailbox commands...
3,576,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,191 UART: [rt]cmd =0x41544d4e, len=14344
4,009,242 >>> mbox cmd response data (8 bytes)
4,009,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,430 UART: [rt]cmd =0x41545348, len=116
4,041,076 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 ready_for_fw is high
1,362,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,767 >>> mbox cmd response: success
2,985,075 UART:
2,985,091 UART: Running Caliptra FMC ...
2,985,499 UART:
2,985,642 UART: [state] CFI Enabled
2,996,249 UART: [fht] FMC Alias Private Key: 7
3,104,380 UART: [art] Extend RT PCRs Done
3,104,808 UART: [art] Lock RT PCRs Done
3,106,202 UART: [art] Populate DV Done
3,114,643 UART: [fht] FMC Alias Private Key: 7
3,115,799 UART: [art] Derive CDI
3,116,079 UART: [art] Store in in slot 0x4
3,201,832 UART: [art] Derive Key Pair
3,202,192 UART: [art] Store priv key in slot 0x5
3,215,842 UART: [art] Derive Key Pair - Done
3,230,688 UART: [art] Signing Cert with AUTHO
3,231,168 UART: RITY.KEYID = 7
3,246,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,385 UART: [art] PUB.X = 377C76A235E4A0AB78E5F36FA1847FE0E202C6151B780EEE5E38FB8FB43602FE7714010DE4B5D63EB4553526872553FC
3,254,144 UART: [art] PUB.Y = 87116DE0B2144F98B58E8335C7D445AAB19656C0C874B00B6252233B0943BF649867516DE9FABCBC26AA84BF803A7161
3,261,088 UART: [art] SIG.R = B7ED8D1B1EC6BE61B5EDAEDB0F0DAE15147C2A8AF4E2BF4E2B5BEB393005F3F80A287FDC6002C99834AC0DE4C7ABCFE1
3,267,876 UART: [art] SIG.S = 076F141FBA0E682CF2E4668578115D6DF980391CB2130477E462FF28A8ADD5CBE889558BF4C06A0F095A527AB2636969
3,291,760 UART: Caliptra RT
3,292,105 UART: [state] CFI Enabled
3,400,920 UART: [rt] RT listening for mailbox commands...
3,401,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,558 UART: [rt]cmd =0x41544d4e, len=14344
3,834,327 >>> mbox cmd response data (8 bytes)
3,834,328 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,189 UART: [rt]cmd =0x41545348, len=116
3,865,875 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,741 UART: [kat] SHA2-256
903,681 UART: [kat] SHA2-384
906,630 UART: [kat] SHA2-512-ACC
908,531 UART: [kat] ECC-384
918,422 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,173 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,176,473 ready_for_fw is high
1,176,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,566 UART: [idev] Erasing UDS.KEYID = 0
1,201,031 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,551 UART: [ldev] ++
1,210,719 UART: [ldev] CDI.KEYID = 6
1,211,082 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,244,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,145 UART: [ldev] --
1,283,516 UART: [fwproc] Wait for Commands...
1,284,288 UART: [fwproc] Recv command 0x46574c44
1,285,016 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,407 >>> mbox cmd response: success
2,773,489 UART: [afmc] ++
2,773,657 UART: [afmc] CDI.KEYID = 6
2,774,019 UART: [afmc] SUBJECT.KEYID = 7
2,774,444 UART: [afmc] AUTHORITY.KEYID = 5
2,810,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,570 UART: [afmc] --
2,853,630 UART: [cold-reset] --
2,854,276 UART: [state] Locking Datavault
2,855,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,119 UART: [state] Locking ICCM
2,856,785 UART: [exit] Launching FMC @ 0x40000130
2,862,114 UART:
2,862,130 UART: Running Caliptra FMC ...
2,862,538 UART:
2,862,592 UART: [state] CFI Enabled
2,873,041 UART: [fht] FMC Alias Private Key: 7
2,981,732 UART: [art] Extend RT PCRs Done
2,982,160 UART: [art] Lock RT PCRs Done
2,983,908 UART: [art] Populate DV Done
2,992,057 UART: [fht] FMC Alias Private Key: 7
2,993,217 UART: [art] Derive CDI
2,993,497 UART: [art] Store in in slot 0x4
3,079,208 UART: [art] Derive Key Pair
3,079,568 UART: [art] Store priv key in slot 0x5
3,092,566 UART: [art] Derive Key Pair - Done
3,106,936 UART: [art] Signing Cert with AUTHO
3,107,416 UART: RITY.KEYID = 7
3,122,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,857 UART: [art] PUB.X = EA92E350C6B0986224B30810F2D220CD262885729DAF2F3F5C933F86E8F4EB1CCF591A3E4D9C8A3FB74FEBA0FCA8CA4E
3,129,644 UART: [art] PUB.Y = 4DB3C9098B7FD6FCBAC3E53751D5D1431D33F1B29780AECD7651D8CFF1FCCBF769C2DAAFFB7F4EB827B5EEED2BE04E87
3,136,625 UART: [art] SIG.R = 5838A0792F46DF6A44CD638F9103966731EB30CB2B47E951736D1036B5613B50F1D43E0AD1E4576DC47DA245CB9AA1A7
3,143,391 UART: [art] SIG.S = 841745CCC3C69B16D0EC7506C5FE539BFC4A1E3151F003C1B0D42C8B050454283466EA32376B9B21DDC419CEAB53EB02
3,167,331 UART: Caliptra RT
3,167,584 UART: [state] CFI Enabled
3,274,537 UART: [rt] RT listening for mailbox commands...
3,275,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,441 UART: [rt]cmd =0x41544d4e, len=14344
3,708,228 >>> mbox cmd response data (8 bytes)
3,708,229 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,228 UART: [rt]cmd =0x41545348, len=116
3,739,940 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 ready_for_fw is high
1,060,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,252 >>> mbox cmd response: success
2,685,112 UART:
2,685,128 UART: Running Caliptra FMC ...
2,685,536 UART:
2,685,590 UART: [state] CFI Enabled
2,696,275 UART: [fht] FMC Alias Private Key: 7
2,804,404 UART: [art] Extend RT PCRs Done
2,804,832 UART: [art] Lock RT PCRs Done
2,806,432 UART: [art] Populate DV Done
2,814,753 UART: [fht] FMC Alias Private Key: 7
2,815,743 UART: [art] Derive CDI
2,816,023 UART: [art] Store in in slot 0x4
2,901,402 UART: [art] Derive Key Pair
2,901,762 UART: [art] Store priv key in slot 0x5
2,914,610 UART: [art] Derive Key Pair - Done
2,929,496 UART: [art] Signing Cert with AUTHO
2,929,976 UART: RITY.KEYID = 7
2,945,542 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,307 UART: [art] PUB.X = CBF97029F35ADB718AB17E309CC9B2C91EF18B7359E6F5207FC6031E7DAC78348EB0A071BB8726F792B50EAEAAEE361E
2,953,089 UART: [art] PUB.Y = 27AAA3EC1D225CEB38A178A64D9B638716DA9582075943321854A9082BECDB11ED76A8C15ACDCEAD83155B6E3CC004B9
2,960,042 UART: [art] SIG.R = 92B827E18A3319E4A4DCC3EE596E5ECEEE575B84A0009A281E1FB26E2D71571B715F96A58E191A28A4E56F842F09AB41
2,966,795 UART: [art] SIG.S = E9E88054199B743025555C0A256D9927A5A94208D13D9A0F527238F25DFFADCA2C7E1C12BF5639E854F6BE02BBA16D44
2,990,292 UART: Caliptra RT
2,990,545 UART: [state] CFI Enabled
3,097,945 UART: [rt] RT listening for mailbox commands...
3,098,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,791 UART: [rt]cmd =0x41544d4e, len=14344
3,531,524 >>> mbox cmd response data (8 bytes)
3,531,525 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,462 UART: [rt]cmd =0x41545348, len=116
3,563,114 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,389 UART: [kat] HMAC-384Kdf
923,051 UART: [kat] LMS
1,171,379 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,556 UART: [fht] FHT @ 0x50003400
1,175,229 UART: [idev] ++
1,175,397 UART: [idev] CDI.KEYID = 6
1,175,757 UART: [idev] SUBJECT.KEYID = 7
1,176,181 UART: [idev] UDS.KEYID = 0
1,176,526 ready_for_fw is high
1,176,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,831 UART: [idev] Erasing UDS.KEYID = 0
1,200,548 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,066 UART: [ldev] ++
1,210,234 UART: [ldev] CDI.KEYID = 6
1,210,597 UART: [ldev] SUBJECT.KEYID = 5
1,211,023 UART: [ldev] AUTHORITY.KEYID = 7
1,211,486 UART: [ldev] FE.KEYID = 1
1,216,682 UART: [ldev] Erasing FE.KEYID = 1
1,243,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,330 UART: [ldev] --
1,282,725 UART: [fwproc] Wait for Commands...
1,283,355 UART: [fwproc] Recv command 0x46574c44
1,284,083 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,326 >>> mbox cmd response: success
2,771,480 UART: [afmc] ++
2,771,648 UART: [afmc] CDI.KEYID = 6
2,772,010 UART: [afmc] SUBJECT.KEYID = 7
2,772,435 UART: [afmc] AUTHORITY.KEYID = 5
2,807,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,775 UART: [afmc] --
2,850,733 UART: [cold-reset] --
2,851,313 UART: [state] Locking Datavault
2,852,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,150 UART: [state] Locking ICCM
2,853,764 UART: [exit] Launching FMC @ 0x40000130
2,859,093 UART:
2,859,109 UART: Running Caliptra FMC ...
2,859,517 UART:
2,859,660 UART: [state] CFI Enabled
2,870,393 UART: [fht] FMC Alias Private Key: 7
2,977,990 UART: [art] Extend RT PCRs Done
2,978,418 UART: [art] Lock RT PCRs Done
2,979,958 UART: [art] Populate DV Done
2,988,161 UART: [fht] FMC Alias Private Key: 7
2,989,335 UART: [art] Derive CDI
2,989,615 UART: [art] Store in in slot 0x4
3,075,452 UART: [art] Derive Key Pair
3,075,812 UART: [art] Store priv key in slot 0x5
3,088,894 UART: [art] Derive Key Pair - Done
3,103,761 UART: [art] Signing Cert with AUTHO
3,104,241 UART: RITY.KEYID = 7
3,119,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,938 UART: [art] PUB.X = DCF6981563D61FA246777D255DC8AE76E0BE4BAF3CDC8EE16840E2448E75AF1406449D54507F916210F382C1135D21AB
3,126,709 UART: [art] PUB.Y = 82AD95F7873C2849C2BFAFFBA6C85803E6CBDC2E31026AA383FDF6B15DE0C28EC5339BDEF05BCE05AB41644604F9CFF6
3,133,671 UART: [art] SIG.R = 6549C46A7756681673F92084AEE0B19AA7C30AEC7F74AF370A67E426261314F15E734C41AD4376C2024985527070022B
3,140,417 UART: [art] SIG.S = A0982A2D45B1C936BEDBD1E11C1325C2AA0070F196A93D09751A301D1E8A8D331D812F12F69D4D3260A290EE835C0815
3,164,300 UART: Caliptra RT
3,164,645 UART: [state] CFI Enabled
3,273,148 UART: [rt] RT listening for mailbox commands...
3,273,818 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,656 UART: [rt]cmd =0x41544d4e, len=14344
3,706,683 >>> mbox cmd response data (8 bytes)
3,706,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,913 UART: [rt]cmd =0x41545348, len=116
3,738,681 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,500 ready_for_fw is high
1,060,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,979 >>> mbox cmd response: success
2,684,083 UART:
2,684,099 UART: Running Caliptra FMC ...
2,684,507 UART:
2,684,650 UART: [state] CFI Enabled
2,695,171 UART: [fht] FMC Alias Private Key: 7
2,803,230 UART: [art] Extend RT PCRs Done
2,803,658 UART: [art] Lock RT PCRs Done
2,805,214 UART: [art] Populate DV Done
2,813,255 UART: [fht] FMC Alias Private Key: 7
2,814,417 UART: [art] Derive CDI
2,814,697 UART: [art] Store in in slot 0x4
2,900,876 UART: [art] Derive Key Pair
2,901,236 UART: [art] Store priv key in slot 0x5
2,914,856 UART: [art] Derive Key Pair - Done
2,929,824 UART: [art] Signing Cert with AUTHO
2,930,304 UART: RITY.KEYID = 7
2,945,410 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,175 UART: [art] PUB.X = 739F646D95045F8AD3A3E10BE07493F5F1EEA45BE5E5D4F5DB90B099FF6B31EA901196D3F896A1D00B57F45A34E9A29A
2,952,948 UART: [art] PUB.Y = 954AA6FF8FF2960EF9745B1579CB9D9969702A70518E81925376B1BC6ACD5B35F00D45A496F15B70C8A2A564E82A9567
2,959,892 UART: [art] SIG.R = 4A5CC4E8C6DEB21642190779E1CCF59E5ECFC1819250D18BE150AF7968F4912CF2743C4249162E0974F494A4EB1783CC
2,966,660 UART: [art] SIG.S = FC196A83AF36E03BE3097E5786FD1CB70624F713CF09C590E84B33E48A4199FF598BEBAC0B7AAA8F73B433BCBC852669
2,990,359 UART: Caliptra RT
2,990,704 UART: [state] CFI Enabled
3,098,313 UART: [rt] RT listening for mailbox commands...
3,098,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,995 UART: [rt]cmd =0x41544d4e, len=14344
3,531,810 >>> mbox cmd response data (8 bytes)
3,531,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,862 UART: [rt]cmd =0x41545348, len=116
3,563,642 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 ready_for_fw is high
1,173,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,223 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,240,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,279,974 UART: [fwproc] Wait for Commands...
1,280,647 UART: [fwproc] Recv command 0x46574c44
1,281,380 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,935 >>> mbox cmd response: success
2,769,132 UART: [afmc] ++
2,769,300 UART: [afmc] CDI.KEYID = 6
2,769,663 UART: [afmc] SUBJECT.KEYID = 7
2,770,089 UART: [afmc] AUTHORITY.KEYID = 5
2,805,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,406 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,289 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,801 UART: [afmc] --
2,848,711 UART: [cold-reset] --
2,849,437 UART: [state] Locking Datavault
2,850,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,160 UART: [state] Locking ICCM
2,851,608 UART: [exit] Launching FMC @ 0x40000130
2,856,937 UART:
2,856,953 UART: Running Caliptra FMC ...
2,857,361 UART:
2,857,415 UART: [state] CFI Enabled
2,868,234 UART: [fht] FMC Alias Private Key: 7
2,975,991 UART: [art] Extend RT PCRs Done
2,976,419 UART: [art] Lock RT PCRs Done
2,977,703 UART: [art] Populate DV Done
2,986,130 UART: [fht] FMC Alias Private Key: 7
2,987,074 UART: [art] Derive CDI
2,987,354 UART: [art] Store in in slot 0x4
3,072,981 UART: [art] Derive Key Pair
3,073,341 UART: [art] Store priv key in slot 0x5
3,086,557 UART: [art] Derive Key Pair - Done
3,101,166 UART: [art] Signing Cert with AUTHO
3,101,646 UART: RITY.KEYID = 7
3,116,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,279 UART: [art] PUB.X = BA91374A1CB49392E50C64EF598502DAD60CD7ACE8290EBA66464037061D76C5A30DA77D6FB84F4127435A1BC592C746
3,124,035 UART: [art] PUB.Y = F0C4C158BA8B4D88071B4829D7BF31E732CED1884F6E36A52D61642996E4747F0EDA938FE67AED2BAA60607B0DB1B238
3,130,986 UART: [art] SIG.R = 71855BC3658F8551170C299DC6F121CBBE931FA284834DEB734EF0FCA5D85CBA9A8382D94F8E47F7375A4EA44082CE0B
3,137,760 UART: [art] SIG.S = 8DDB5773612A40246A274F115B9AF18E04F3995D1E5C3B5EEABA543654A3F0AA974940D7CF0632E26DD781C76E37A2A8
3,161,353 UART: Caliptra RT
3,161,606 UART: [state] CFI Enabled
3,268,767 UART: [rt] RT listening for mailbox commands...
3,269,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,145 UART: [rt]cmd =0x41544d4e, len=14344
3,702,808 >>> mbox cmd response data (8 bytes)
3,702,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,648 UART: [rt]cmd =0x41545348, len=116
3,734,140 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 ready_for_fw is high
1,055,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,501 >>> mbox cmd response: success
2,679,697 UART:
2,679,713 UART: Running Caliptra FMC ...
2,680,121 UART:
2,680,175 UART: [state] CFI Enabled
2,690,760 UART: [fht] FMC Alias Private Key: 7
2,798,781 UART: [art] Extend RT PCRs Done
2,799,209 UART: [art] Lock RT PCRs Done
2,800,745 UART: [art] Populate DV Done
2,808,968 UART: [fht] FMC Alias Private Key: 7
2,810,092 UART: [art] Derive CDI
2,810,372 UART: [art] Store in in slot 0x4
2,896,071 UART: [art] Derive Key Pair
2,896,431 UART: [art] Store priv key in slot 0x5
2,909,531 UART: [art] Derive Key Pair - Done
2,924,432 UART: [art] Signing Cert with AUTHO
2,924,912 UART: RITY.KEYID = 7
2,940,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,299 UART: [art] PUB.X = A7DDEEB601BE0F3751A7924A019FB69B734086B0C90D74F9DE83010B1E3E266C4E69227E4D51698150BFD7D839FB020C
2,948,051 UART: [art] PUB.Y = EEA019A6EB27BC01375542772C47B2A80CA822751A304F59413EA4FD2D46102B6B394AD472C9E5F1E6D8FCD5816CD98F
2,955,003 UART: [art] SIG.R = C571ABB72BD48A8E8F7F9ADEC318440BAEF79BBE4607CD2D78349139D4264DB200455DEFCFB515C37FED462923FEF131
2,961,763 UART: [art] SIG.S = 6AA133FC36A727D3748878E8A68182FEF7450F41F6357AA15BE764907516EB43BAFD84FF0DFA93806CB5030B9BA72DF3
2,984,854 UART: Caliptra RT
2,985,107 UART: [state] CFI Enabled
3,093,080 UART: [rt] RT listening for mailbox commands...
3,093,750 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,878 UART: [rt]cmd =0x41544d4e, len=14344
3,526,455 >>> mbox cmd response data (8 bytes)
3,526,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,583 UART: [rt]cmd =0x41545348, len=116
3,558,329 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,990 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,198,874 UART: [idev] Sha1 KeyId Algorithm
1,207,660 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,071 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,124 >>> mbox cmd response: success
2,771,291 UART: [afmc] ++
2,771,459 UART: [afmc] CDI.KEYID = 6
2,771,822 UART: [afmc] SUBJECT.KEYID = 7
2,772,248 UART: [afmc] AUTHORITY.KEYID = 5
2,808,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,700 UART: [afmc] --
2,851,686 UART: [cold-reset] --
2,852,244 UART: [state] Locking Datavault
2,853,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,939 UART: [state] Locking ICCM
2,854,393 UART: [exit] Launching FMC @ 0x40000130
2,859,722 UART:
2,859,738 UART: Running Caliptra FMC ...
2,860,146 UART:
2,860,289 UART: [state] CFI Enabled
2,870,986 UART: [fht] FMC Alias Private Key: 7
2,979,297 UART: [art] Extend RT PCRs Done
2,979,725 UART: [art] Lock RT PCRs Done
2,981,193 UART: [art] Populate DV Done
2,989,266 UART: [fht] FMC Alias Private Key: 7
2,990,288 UART: [art] Derive CDI
2,990,568 UART: [art] Store in in slot 0x4
3,076,423 UART: [art] Derive Key Pair
3,076,783 UART: [art] Store priv key in slot 0x5
3,090,513 UART: [art] Derive Key Pair - Done
3,105,034 UART: [art] Signing Cert with AUTHO
3,105,514 UART: RITY.KEYID = 7
3,120,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,223 UART: [art] PUB.X = D3C3E5CC88EEAA15B8942F86AC61CC648583CE0F924C245D6406028436CC0934244E3E62EEB895B2835F81E3F0F49857
3,127,983 UART: [art] PUB.Y = CC86C8E5436A0FDF32F9390EDC4699A90244C3E0A61FC79EE73AA77DBE05B1A3BCC99941DACAB37B025E1231B3D64EAA
3,134,940 UART: [art] SIG.R = 653D6E2ECEC5E40F72458BF12B517079C2ADA8BB1D367C5AD93517A372EEECA3D4EB04F8D5F6FC736E62344B898D645A
3,141,720 UART: [art] SIG.S = A9E90A6D13D7C573B4765753A7EA6A61188A0926E8A5C272F9121FB8B63F8E105CE92469A6CE06F9D04A6D02C8A9EAFB
3,164,643 UART: Caliptra RT
3,164,988 UART: [state] CFI Enabled
3,272,931 UART: [rt] RT listening for mailbox commands...
3,273,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,581 UART: [rt]cmd =0x41544d4e, len=14344
3,706,864 >>> mbox cmd response data (8 bytes)
3,706,865 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,062 UART: [rt]cmd =0x41545348, len=116
3,738,922 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,909 ready_for_fw is high
1,056,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,796 >>> mbox cmd response: success
2,682,670 UART:
2,682,686 UART: Running Caliptra FMC ...
2,683,094 UART:
2,683,237 UART: [state] CFI Enabled
2,694,076 UART: [fht] FMC Alias Private Key: 7
2,801,843 UART: [art] Extend RT PCRs Done
2,802,271 UART: [art] Lock RT PCRs Done
2,804,087 UART: [art] Populate DV Done
2,812,358 UART: [fht] FMC Alias Private Key: 7
2,813,380 UART: [art] Derive CDI
2,813,660 UART: [art] Store in in slot 0x4
2,899,267 UART: [art] Derive Key Pair
2,899,627 UART: [art] Store priv key in slot 0x5
2,912,669 UART: [art] Derive Key Pair - Done
2,927,296 UART: [art] Signing Cert with AUTHO
2,927,776 UART: RITY.KEYID = 7
2,943,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,059 UART: [art] PUB.X = E1AB625D162E063D19CBFFB1791EF9A6535EB791937A8691CE5B3951F6EB10B191E074C2350A24279FFBDF49F4C4E763
2,950,831 UART: [art] PUB.Y = 329D161DA94490455A4FB50B8E59220C11DB0A3FCFB2224BD52C489DD06D91D6D599BF37DA3976A7B2B8E0294003520B
2,957,770 UART: [art] SIG.R = 99DBDCA4B08AD4737FFE2001FC0398D3B03286E884A3AD871575AB13F83074EDA09A731DC529DD2C55FD386B8AC772FA
2,964,548 UART: [art] SIG.S = FD81A69FC1D54DF6A3F25F0F62C755A5B6A08B6378D587A55F008DB89CCA76BEC559EB1242879C1EFCE7BDC26CF37482
2,988,368 UART: Caliptra RT
2,988,713 UART: [state] CFI Enabled
3,096,755 UART: [rt] RT listening for mailbox commands...
3,097,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,329 UART: [rt]cmd =0x41544d4e, len=14344
3,530,382 >>> mbox cmd response data (8 bytes)
3,530,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,408 UART: [rt]cmd =0x41545348, len=116
3,562,244 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,108 UART:
192,482 UART: Running Caliptra ROM ...
193,666 UART:
193,822 UART: [state] CFI Enabled
263,255 UART: [state] LifecycleState = Unprovisioned
265,238 UART: [state] DebugLocked = No
266,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,570 UART: [kat] SHA2-256
440,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,834 UART: [kat] ++
451,365 UART: [kat] sha1
462,174 UART: [kat] SHA2-256
464,900 UART: [kat] SHA2-384
470,530 UART: [kat] SHA2-512-ACC
472,897 UART: [kat] ECC-384
2,767,786 UART: [kat] HMAC-384Kdf
2,780,305 UART: [kat] LMS
3,970,633 UART: [kat] --
3,975,142 UART: [cold-reset] ++
3,976,722 UART: [fht] Storing FHT @ 0x50003400
3,988,083 UART: [idev] ++
3,988,661 UART: [idev] CDI.KEYID = 6
3,989,572 UART: [idev] SUBJECT.KEYID = 7
3,990,819 UART: [idev] UDS.KEYID = 0
3,991,856 ready_for_fw is high
3,992,057 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,150 UART: [idev] Erasing UDS.KEYID = 0
7,326,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,414 UART: [idev] --
7,352,892 UART: [ldev] ++
7,353,512 UART: [ldev] CDI.KEYID = 6
7,354,457 UART: [ldev] SUBJECT.KEYID = 5
7,355,666 UART: [ldev] AUTHORITY.KEYID = 7
7,356,953 UART: [ldev] FE.KEYID = 1
7,401,769 UART: [ldev] Erasing FE.KEYID = 1
10,734,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,957 UART: [ldev] --
13,092,953 UART: [fwproc] Waiting for Commands...
13,096,070 UART: [fwproc] Received command 0x46574c44
13,098,254 UART: [fwproc] Received Image of size 113760 bytes
17,135,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,215,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,284,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,599,652 >>> mbox cmd response: success
17,603,308 UART: [afmc] ++
17,603,908 UART: [afmc] CDI.KEYID = 6
17,604,824 UART: [afmc] SUBJECT.KEYID = 7
17,606,145 UART: [afmc] AUTHORITY.KEYID = 5
20,963,781 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,265,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,267,720 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,282,141 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,297,004 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,311,408 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,466 UART: [afmc] --
23,335,594 UART: [cold-reset] --
23,339,291 UART: [state] Locking Datavault
23,344,703 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,456 UART: [state] Locking ICCM
23,348,714 UART: [exit] Launching FMC @ 0x40000130
23,357,111 UART:
23,357,347 UART: Running Caliptra FMC ...
23,358,445 UART:
23,358,605 UART: [state] CFI Enabled
23,425,808 UART: [fht] FMC Alias Private Key: 7
25,763,540 UART: [art] Extend RT PCRs Done
25,764,760 UART: [art] Lock RT PCRs Done
25,766,483 UART: [art] Populate DV Done
25,771,747 UART: [fht] FMC Alias Private Key: 7
25,773,405 UART: [art] Derive CDI
25,774,220 UART: [art] Store in in slot 0x4
25,835,799 UART: [art] Derive Key Pair
25,836,797 UART: [art] Store priv key in slot 0x5
29,129,941 UART: [art] Derive Key Pair - Done
29,142,987 UART: [art] Signing Cert with AUTHO
29,144,285 UART: RITY.KEYID = 7
31,430,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,432,307 UART: [art] PUB.X = 7D605CFFE41A072C68619D53A8D4BA0FD8103F61B04403D1AAA5D4E0F77F80CFDC000BAC7D868512158DEB63C43777CF
31,439,558 UART: [art] PUB.Y = 9DD57E7FA248648B34A1423A36FCF3A63ED2F12AF171ECFAF4176D4283FD261CCE8590C4E39696C49C8488283CE979A8
31,446,808 UART: [art] SIG.R = 4A560A8AC3F8ACFA59919B2ED1798072B64FFE10BF05E52CD19C662D030DC12F60541026812B56A2A7A74DEDCB0FF806
31,454,226 UART: [art] SIG.S = C31EC37735C7B6C30ED50B7A7D719C9F12966ABBB3BCF33FB1347C8D8E90B0E510D107D715F806AE8537A621B9F7C961
32,759,357 UART: Caliptra RT
32,760,065 UART: [state] CFI Enabled
32,922,747 UART: [rt] RT listening for mailbox commands...
36,944,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,099,652 UART: [rt]cmd =0x41544d4e, len=14344
42,400,151 >>> mbox cmd response data (8 bytes)
42,400,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,431,395 UART: [rt]cmd =0x41545348, len=116
42,433,787 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,784,015 ready_for_fw is high
3,784,791 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,848,403 >>> mbox cmd response: success
23,546,783 UART:
23,547,195 UART: Running Caliptra FMC ...
23,548,306 UART:
23,548,458 UART: [state] CFI Enabled
23,617,554 UART: [fht] FMC Alias Private Key: 7
25,955,385 UART: [art] Extend RT PCRs Done
25,956,607 UART: [art] Lock RT PCRs Done
25,958,370 UART: [art] Populate DV Done
25,963,529 UART: [fht] FMC Alias Private Key: 7
25,965,177 UART: [art] Derive CDI
25,965,917 UART: [art] Store in in slot 0x4
26,026,519 UART: [art] Derive Key Pair
26,027,563 UART: [art] Store priv key in slot 0x5
29,320,510 UART: [art] Derive Key Pair - Done
29,333,390 UART: [art] Signing Cert with AUTHO
29,334,721 UART: RITY.KEYID = 7
31,623,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,542 UART: [art] PUB.X = 2F055B20AA800DA52884EC752D122716C9D676B47409A3B14EC11DB376145FC27EDE8C5A19D8AD7D5D136185B129721E
31,631,805 UART: [art] PUB.Y = 60F2538ADD28BD66BA4DC995E1440F78D1B80079598C49A6E2D0FA7F2FADA2314EC01813D39058A7292E8879D52F2F5B
31,639,054 UART: [art] SIG.R = 1CB6F086699554D15FBA784F933931F44E1FB4AC423CF2A6B66A506C11AB764512D2E03C121DA7A1CB49536024C6C86F
31,646,411 UART: [art] SIG.S = 2291BEBF994EA7DF94B25364F49AC70C36393F8F8241F432ABB08D399200321794489CB443C80CC9C1F099A282E16A08
32,951,517 UART: Caliptra RT
32,952,233 UART: [state] CFI Enabled
33,113,778 UART: [rt] RT listening for mailbox commands...
37,136,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,292,443 UART: [rt]cmd =0x41544d4e, len=14344
42,593,151 >>> mbox cmd response data (8 bytes)
42,593,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,624,520 UART: [rt]cmd =0x41545348, len=116
42,626,818 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
192,869 UART:
193,246 UART: Running Caliptra ROM ...
194,368 UART:
604,124 UART: [state] CFI Enabled
617,083 UART: [state] LifecycleState = Unprovisioned
618,949 UART: [state] DebugLocked = No
620,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,404 UART: [kat] SHA2-256
795,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,712 UART: [kat] ++
806,153 UART: [kat] sha1
817,532 UART: [kat] SHA2-256
820,295 UART: [kat] SHA2-384
825,366 UART: [kat] SHA2-512-ACC
827,734 UART: [kat] ECC-384
3,113,228 UART: [kat] HMAC-384Kdf
3,125,464 UART: [kat] LMS
4,315,599 UART: [kat] --
4,319,928 UART: [cold-reset] ++
4,321,573 UART: [fht] Storing FHT @ 0x50003400
4,332,051 UART: [idev] ++
4,332,619 UART: [idev] CDI.KEYID = 6
4,333,646 UART: [idev] SUBJECT.KEYID = 7
4,334,816 UART: [idev] UDS.KEYID = 0
4,335,839 ready_for_fw is high
4,336,062 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,014 UART: [idev] Erasing UDS.KEYID = 0
7,620,781 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,292 UART: [idev] --
7,648,904 UART: [ldev] ++
7,649,467 UART: [ldev] CDI.KEYID = 6
7,650,444 UART: [ldev] SUBJECT.KEYID = 5
7,651,653 UART: [ldev] AUTHORITY.KEYID = 7
7,652,880 UART: [ldev] FE.KEYID = 1
7,662,495 UART: [ldev] Erasing FE.KEYID = 1
10,952,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,094 UART: [ldev] --
13,311,209 UART: [fwproc] Waiting for Commands...
13,314,540 UART: [fwproc] Received command 0x46574c44
13,316,714 UART: [fwproc] Received Image of size 113760 bytes
17,361,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,633 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,087 >>> mbox cmd response: success
17,821,951 UART: [afmc] ++
17,822,608 UART: [afmc] CDI.KEYID = 6
17,823,490 UART: [afmc] SUBJECT.KEYID = 7
17,824,759 UART: [afmc] AUTHORITY.KEYID = 5
21,141,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,529 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,910 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,741 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,226 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,795 UART: [afmc] --
23,507,812 UART: [cold-reset] --
23,510,096 UART: [state] Locking Datavault
23,514,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,906 UART: [state] Locking ICCM
23,517,944 UART: [exit] Launching FMC @ 0x40000130
23,526,341 UART:
23,526,580 UART: Running Caliptra FMC ...
23,527,600 UART:
23,527,746 UART: [state] CFI Enabled
23,536,061 UART: [fht] FMC Alias Private Key: 7
25,867,214 UART: [art] Extend RT PCRs Done
25,868,426 UART: [art] Lock RT PCRs Done
25,870,449 UART: [art] Populate DV Done
25,875,535 UART: [fht] FMC Alias Private Key: 7
25,877,132 UART: [art] Derive CDI
25,877,947 UART: [art] Store in in slot 0x4
25,920,050 UART: [art] Derive Key Pair
25,921,054 UART: [art] Store priv key in slot 0x5
29,163,034 UART: [art] Derive Key Pair - Done
29,176,192 UART: [art] Signing Cert with AUTHO
29,177,511 UART: RITY.KEYID = 7
31,456,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,359 UART: [art] PUB.X = 238784A51382FCD40F467DBA22C34699C25588B26757DB018FEC62025715F6044C812DA3132C62DAC1F9D485B1528449
31,465,462 UART: [art] PUB.Y = 6DFA26028E6F57B3B8CEECEE845F9B76420BD469967FEC5827E44854B3980579A275F073397866EB8E17C04DCB1F61F0
31,472,714 UART: [art] SIG.R = C8FD89CDAC3C9FFDFF3095313B5F12E7C158A68CD33CADBB5E748DBE5240CFFF4D070EC1A294F447C3BBB57037012B9E
31,480,137 UART: [art] SIG.S = A777A6DC11F06E52F1F3307C03A39E8FDFCB91E78ABA004C6EE724A4C3C082240660C0DF6D3F5F71A19FFF060348B898
32,784,797 UART: Caliptra RT
32,785,495 UART: [state] CFI Enabled
32,903,328 UART: [rt] RT listening for mailbox commands...
36,925,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,080,356 UART: [rt]cmd =0x41544d4e, len=14344
42,380,579 >>> mbox cmd response data (8 bytes)
42,381,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,411,861 UART: [rt]cmd =0x41545348, len=116
42,413,896 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
4,126,175 ready_for_fw is high
4,126,597 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,056,122 >>> mbox cmd response: success
23,696,024 UART:
23,696,426 UART: Running Caliptra FMC ...
23,697,575 UART:
23,697,736 UART: [state] CFI Enabled
23,705,422 UART: [fht] FMC Alias Private Key: 7
26,035,769 UART: [art] Extend RT PCRs Done
26,036,992 UART: [art] Lock RT PCRs Done
26,038,457 UART: [art] Populate DV Done
26,044,263 UART: [fht] FMC Alias Private Key: 7
26,045,915 UART: [art] Derive CDI
26,046,734 UART: [art] Store in in slot 0x4
26,089,601 UART: [art] Derive Key Pair
26,090,623 UART: [art] Store priv key in slot 0x5
29,332,644 UART: [art] Derive Key Pair - Done
29,345,584 UART: [art] Signing Cert with AUTHO
29,346,887 UART: RITY.KEYID = 7
31,626,693 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,198 UART: [art] PUB.X = A1D24C5E1FA0248F0BFA928A385E59B553C97DBAB77DEE6A1645CDF22AB1707B0D401B5A1C5B8792A6E730BD4DDEE543
31,635,491 UART: [art] PUB.Y = 7E363EBF41D29139FBD05357147885B3A7F64FA6D64AA9ACF2B0E69EFEE9E4A4DE114DF684B24D45ED1C0BCF765FEF7D
31,642,794 UART: [art] SIG.R = 5711A2EFD798DB1CCB2825A3433EC711AFDDDB28E7842685C0667CD6534AE3269AAE08C5B53A48CC518EF2C2A35C58FF
31,650,135 UART: [art] SIG.S = CEBA15A8363CBFFADC76B4002768F347D4C0F29FE70CF1E963AF2CD220CA67B19CFA0669DFD476E446C329063554EFB6
32,954,961 UART: Caliptra RT
32,955,660 UART: [state] CFI Enabled
33,072,619 UART: [rt] RT listening for mailbox commands...
37,096,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,252,000 UART: [rt]cmd =0x41544d4e, len=14344
42,552,215 >>> mbox cmd response data (8 bytes)
42,552,796 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,583,396 UART: [rt]cmd =0x41545348, len=116
42,585,631 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,388 UART:
192,755 UART: Running Caliptra ROM ...
193,894 UART:
194,040 UART: [state] CFI Enabled
268,098 UART: [state] LifecycleState = Unprovisioned
270,026 UART: [state] DebugLocked = No
271,851 UART: [state] WD Timer not started. Device not locked for debugging
274,889 UART: [kat] SHA2-256
454,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,592 UART: [kat] ++
466,114 UART: [kat] sha1
475,855 UART: [kat] SHA2-256
478,855 UART: [kat] SHA2-384
484,338 UART: [kat] SHA2-512-ACC
487,286 UART: [kat] ECC-384
2,948,501 UART: [kat] HMAC-384Kdf
2,963,400 UART: [kat] LMS
3,492,896 UART: [kat] --
3,496,899 UART: [cold-reset] ++
3,498,683 UART: [fht] FHT @ 0x50003400
3,511,004 UART: [idev] ++
3,511,577 UART: [idev] CDI.KEYID = 6
3,512,493 UART: [idev] SUBJECT.KEYID = 7
3,513,662 UART: [idev] UDS.KEYID = 0
3,514,702 ready_for_fw is high
3,514,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,658,463 UART: [idev] Erasing UDS.KEYID = 0
6,018,902 UART: [idev] Sha1 KeyId Algorithm
6,041,430 UART: [idev] --
6,046,053 UART: [ldev] ++
6,046,651 UART: [ldev] CDI.KEYID = 6
6,047,565 UART: [ldev] SUBJECT.KEYID = 5
6,048,665 UART: [ldev] AUTHORITY.KEYID = 7
6,049,952 UART: [ldev] FE.KEYID = 1
6,093,968 UART: [ldev] Erasing FE.KEYID = 1
8,596,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,477 UART: [ldev] --
10,399,730 UART: [fwproc] Wait for Commands...
10,401,704 UART: [fwproc] Recv command 0x46574c44
10,403,784 UART: [fwproc] Recv'd Img size: 114084 bytes
13,804,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,260,999 >>> mbox cmd response: success
14,266,119 UART: [afmc] ++
14,266,745 UART: [afmc] CDI.KEYID = 6
14,267,634 UART: [afmc] SUBJECT.KEYID = 7
14,268,846 UART: [afmc] AUTHORITY.KEYID = 5
16,803,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,042 UART: [afmc] --
18,601,804 UART: [cold-reset] --
18,606,206 UART: [state] Locking Datavault
18,610,470 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,197 UART: [state] Locking ICCM
18,614,403 UART: [exit] Launching FMC @ 0x40000130
18,622,798 UART:
18,623,029 UART: Running Caliptra FMC ...
18,624,128 UART:
18,624,285 UART: [state] CFI Enabled
18,686,423 UART: [fht] FMC Alias Private Key: 7
20,450,331 UART: [art] Extend RT PCRs Done
20,451,555 UART: [art] Lock RT PCRs Done
20,453,288 UART: [art] Populate DV Done
20,458,863 UART: [fht] FMC Alias Private Key: 7
20,460,559 UART: [art] Derive CDI
20,461,368 UART: [art] Store in in slot 0x4
20,518,813 UART: [art] Derive Key Pair
20,519,844 UART: [art] Store priv key in slot 0x5
22,983,820 UART: [art] Derive Key Pair - Done
22,996,670 UART: [art] Signing Cert with AUTHO
22,997,975 UART: RITY.KEYID = 7
24,709,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,063 UART: [art] PUB.X = 17FC5AD8528358CE97815564B639B28CA981AF720B27C3597E2D5439652BDC810DE0BA9E3232BA9DAAC333F91F34C176
24,718,345 UART: [art] PUB.Y = A8F2AC7D93AAD941F6AD5CC8BEBC0967D981076571C0D9DDADDBFC72656D1B56D02D4F61F1E2551038EEAEB1E29F8510
24,725,662 UART: [art] SIG.R = 681A99F169842F87D118D461D849F9CBB27F44AEC327499356291D42387B1B50FB7B5A84AD68DA91A1FCDA9814B4464F
24,733,047 UART: [art] SIG.S = DE7C12FC96A37E61744B18EB0AAE903FC1C98A5424E89BBF416C9B70890F5D3FBBB8B3D659AAB2733E8F8635F3BFF53F
25,711,531 UART: Caliptra RT
25,712,229 UART: [state] CFI Enabled
25,876,953 UART: [rt] RT listening for mailbox commands...
29,898,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,053,916 UART: [rt]cmd =0x41544d4e, len=14344
34,049,594 >>> mbox cmd response data (8 bytes)
34,050,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,080,912 UART: [rt]cmd =0x41545348, len=116
34,083,238 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,384,969 ready_for_fw is high
3,385,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,095,352 >>> mbox cmd response: success
18,384,726 UART:
18,385,134 UART: Running Caliptra FMC ...
18,386,284 UART:
18,386,444 UART: [state] CFI Enabled
18,456,015 UART: [fht] FMC Alias Private Key: 7
20,219,967 UART: [art] Extend RT PCRs Done
20,221,213 UART: [art] Lock RT PCRs Done
20,223,114 UART: [art] Populate DV Done
20,228,262 UART: [fht] FMC Alias Private Key: 7
20,229,810 UART: [art] Derive CDI
20,230,576 UART: [art] Store in in slot 0x4
20,288,294 UART: [art] Derive Key Pair
20,289,329 UART: [art] Store priv key in slot 0x5
22,752,494 UART: [art] Derive Key Pair - Done
22,765,556 UART: [art] Signing Cert with AUTHO
22,766,866 UART: RITY.KEYID = 7
24,477,919 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,410 UART: [art] PUB.X = A626011586AE08DFB39B305C283D20FDED1B384FAAD0138129B8AC9899123CA2ABBDC14426FE51590FFD7E73D9C6556E
24,486,711 UART: [art] PUB.Y = F435F8525CE3896570122DCC58E5394DF7EF1125211325C450C16B4D3B52A46E732424039B36C964E339AA5907A073DB
24,493,902 UART: [art] SIG.R = 3F098AD36F5026F6D862D03953D438C41A99B572E3A82B25A51D7A4B681A4987160056B57007A3A6A92BD17D212B5682
24,501,269 UART: [art] SIG.S = EE3895E345303F7C49680D22C3A6E6F5146D1528A405D9A414FB67B0C42C440CED12D02CCCF34927BD514B470203BDB7
25,480,169 UART: Caliptra RT
25,480,906 UART: [state] CFI Enabled
25,645,849 UART: [rt] RT listening for mailbox commands...
29,668,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,824,316 UART: [rt]cmd =0x41544d4e, len=14344
33,820,465 >>> mbox cmd response data (8 bytes)
33,821,048 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,851,950 UART: [rt]cmd =0x41545348, len=116
33,854,217 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,596 writing to cptra_bootfsm_go
193,987 UART:
194,354 UART: Running Caliptra ROM ...
195,549 UART:
604,997 UART: [state] CFI Enabled
619,293 UART: [state] LifecycleState = Unprovisioned
621,169 UART: [state] DebugLocked = No
622,626 UART: [state] WD Timer not started. Device not locked for debugging
626,375 UART: [kat] SHA2-256
805,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,054 UART: [kat] ++
817,588 UART: [kat] sha1
828,753 UART: [kat] SHA2-256
831,758 UART: [kat] SHA2-384
838,241 UART: [kat] SHA2-512-ACC
841,185 UART: [kat] ECC-384
3,286,106 UART: [kat] HMAC-384Kdf
3,298,004 UART: [kat] LMS
3,827,505 UART: [kat] --
3,832,424 UART: [cold-reset] ++
3,834,213 UART: [fht] FHT @ 0x50003400
3,845,282 UART: [idev] ++
3,845,885 UART: [idev] CDI.KEYID = 6
3,846,806 UART: [idev] SUBJECT.KEYID = 7
3,847,976 UART: [idev] UDS.KEYID = 0
3,848,900 ready_for_fw is high
3,849,095 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,260 UART: [idev] Erasing UDS.KEYID = 0
6,316,357 UART: [idev] Sha1 KeyId Algorithm
6,339,489 UART: [idev] --
6,344,429 UART: [ldev] ++
6,345,012 UART: [ldev] CDI.KEYID = 6
6,345,933 UART: [ldev] SUBJECT.KEYID = 5
6,347,110 UART: [ldev] AUTHORITY.KEYID = 7
6,348,345 UART: [ldev] FE.KEYID = 1
6,356,509 UART: [ldev] Erasing FE.KEYID = 1
8,829,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,178 UART: [ldev] --
10,620,685 UART: [fwproc] Wait for Commands...
10,623,807 UART: [fwproc] Recv command 0x46574c44
10,625,859 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,497,064 >>> mbox cmd response: success
14,500,614 UART: [afmc] ++
14,501,217 UART: [afmc] CDI.KEYID = 6
14,502,134 UART: [afmc] SUBJECT.KEYID = 7
14,503,295 UART: [afmc] AUTHORITY.KEYID = 5
17,000,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,726 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,543 UART: [afmc] --
18,797,364 UART: [cold-reset] --
18,801,447 UART: [state] Locking Datavault
18,806,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,332 UART: [state] Locking ICCM
18,809,951 UART: [exit] Launching FMC @ 0x40000130
18,818,378 UART:
18,818,625 UART: Running Caliptra FMC ...
18,819,728 UART:
18,819,891 UART: [state] CFI Enabled
18,827,938 UART: [fht] FMC Alias Private Key: 7
20,584,846 UART: [art] Extend RT PCRs Done
20,586,055 UART: [art] Lock RT PCRs Done
20,587,741 UART: [art] Populate DV Done
20,593,042 UART: [fht] FMC Alias Private Key: 7
20,594,540 UART: [art] Derive CDI
20,595,304 UART: [art] Store in in slot 0x4
20,637,902 UART: [art] Derive Key Pair
20,638,905 UART: [art] Store priv key in slot 0x5
23,065,840 UART: [art] Derive Key Pair - Done
23,078,951 UART: [art] Signing Cert with AUTHO
23,080,260 UART: RITY.KEYID = 7
24,785,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,294 UART: [art] PUB.X = 42E56541DDCA18DDB727782580F6F7F3CE18C6379123ED752BC4ACE2C26D174EC105F1AC2AF245CD6AA63FF2C105F69D
24,794,572 UART: [art] PUB.Y = 8374F817A9B598EA4E070F08DD1722901B670B67B1BA57D463876C1B4BDD6FF264F2B4CE93675B13C8C0E6D1246DEDC3
24,801,833 UART: [art] SIG.R = 619B41D58E9C7DA82D85E921122659F3FA8F65D8163D2AD044156F284260BF1EC2763669AC68C0A196E8546426FEF7B0
24,809,260 UART: [art] SIG.S = 35E0A9B663FF74F2A7C739CA741590A90D43134D5B59A0F8C3318EB1F0B93E5169278F395A90A1BFFA0053CF94C1E4F0
25,788,033 UART: Caliptra RT
25,788,742 UART: [state] CFI Enabled
25,906,210 UART: [rt] RT listening for mailbox commands...
29,928,109 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,083,626 UART: [rt]cmd =0x41544d4e, len=14344
34,079,003 >>> mbox cmd response data (8 bytes)
34,079,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,110,474 UART: [rt]cmd =0x41545348, len=116
34,112,811 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
3,695,569 ready_for_fw is high
3,695,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,430 >>> mbox cmd response: success
18,517,047 UART:
18,517,440 UART: Running Caliptra FMC ...
18,518,641 UART:
18,518,809 UART: [state] CFI Enabled
18,526,223 UART: [fht] FMC Alias Private Key: 7
20,283,264 UART: [art] Extend RT PCRs Done
20,284,476 UART: [art] Lock RT PCRs Done
20,286,323 UART: [art] Populate DV Done
20,291,536 UART: [fht] FMC Alias Private Key: 7
20,293,192 UART: [art] Derive CDI
20,294,016 UART: [art] Store in in slot 0x4
20,336,686 UART: [art] Derive Key Pair
20,337,767 UART: [art] Store priv key in slot 0x5
22,764,237 UART: [art] Derive Key Pair - Done
22,777,121 UART: [art] Signing Cert with AUTHO
22,778,426 UART: RITY.KEYID = 7
24,484,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,589 UART: [art] PUB.X = AA7E4F89D2F3DC50F9EFB1458B46CA88A6F2ECCF1A87BB73CB49FBF1354ACD15A37EB60CE0B0A0661239F2D7375639F5
24,492,883 UART: [art] PUB.Y = 09AB90C975502C04234B985D2B066CE01B63ADE83805D4218747621E85F656BD53858402A1F1109E9F118249A0026D97
24,500,110 UART: [art] SIG.R = 3D2D35EF4C4C2981EF9325C57A83D4A27AE2DB1417911879C34EB908F06DD24D3C6BD3B32CB9FF1ADE5AF8C8E44E2A4F
24,507,485 UART: [art] SIG.S = DDECCF4569BA3E41DB874B24FAC3679CFA704CE2AAE8F2CCA3CB9359321732AF9113F9D4230C26367DBE28C2996B396D
25,486,602 UART: Caliptra RT
25,487,311 UART: [state] CFI Enabled
25,604,161 UART: [rt] RT listening for mailbox commands...
29,627,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,782,986 UART: [rt]cmd =0x41544d4e, len=14344
33,778,685 >>> mbox cmd response data (8 bytes)
33,779,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,810,029 UART: [rt]cmd =0x41545348, len=116
33,812,245 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,349 UART:
192,722 UART: Running Caliptra ROM ...
193,825 UART:
193,988 UART: [state] CFI Enabled
264,726 UART: [state] LifecycleState = Unprovisioned
267,089 UART: [state] DebugLocked = No
268,405 UART: [state] WD Timer not started. Device not locked for debugging
272,455 UART: [kat] SHA2-256
462,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,070 UART: [kat] ++
473,522 UART: [kat] sha1
485,675 UART: [kat] SHA2-256
488,688 UART: [kat] SHA2-384
495,242 UART: [kat] SHA2-512-ACC
497,818 UART: [kat] ECC-384
2,948,952 UART: [kat] HMAC-384Kdf
2,971,351 UART: [kat] LMS
3,503,123 UART: [kat] --
3,507,403 UART: [cold-reset] ++
3,508,493 UART: [fht] FHT @ 0x50003400
3,520,733 UART: [idev] ++
3,521,450 UART: [idev] CDI.KEYID = 6
3,522,365 UART: [idev] SUBJECT.KEYID = 7
3,523,542 UART: [idev] UDS.KEYID = 0
3,524,586 ready_for_fw is high
3,524,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,088 UART: [idev] Erasing UDS.KEYID = 0
6,029,578 UART: [idev] Sha1 KeyId Algorithm
6,051,623 UART: [idev] --
6,056,156 UART: [ldev] ++
6,056,832 UART: [ldev] CDI.KEYID = 6
6,057,769 UART: [ldev] SUBJECT.KEYID = 5
6,058,923 UART: [ldev] AUTHORITY.KEYID = 7
6,060,156 UART: [ldev] FE.KEYID = 1
6,098,649 UART: [ldev] Erasing FE.KEYID = 1
8,601,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,674 UART: [ldev] --
10,411,170 UART: [fwproc] Wait for Commands...
10,413,312 UART: [fwproc] Recv command 0x46574c44
10,415,615 UART: [fwproc] Recv'd Img size: 114084 bytes
13,854,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,586,751 >>> mbox cmd response: success
14,590,142 UART: [afmc] ++
14,590,854 UART: [afmc] CDI.KEYID = 6
14,592,043 UART: [afmc] SUBJECT.KEYID = 7
14,593,558 UART: [afmc] AUTHORITY.KEYID = 5
17,118,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,842,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,844,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,859,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,874,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,889,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,912,742 UART: [afmc] --
18,917,031 UART: [cold-reset] --
18,922,250 UART: [state] Locking Datavault
18,928,002 UART: [state] Locking PCR0, PCR1 and PCR31
18,930,159 UART: [state] Locking ICCM
18,932,789 UART: [exit] Launching FMC @ 0x40000130
18,941,470 UART:
18,941,708 UART: Running Caliptra FMC ...
18,942,811 UART:
18,942,985 UART: [state] CFI Enabled
19,000,328 UART: [fht] FMC Alias Private Key: 7
20,763,918 UART: [art] Extend RT PCRs Done
20,765,133 UART: [art] Lock RT PCRs Done
20,766,677 UART: [art] Populate DV Done
20,772,081 UART: [fht] FMC Alias Private Key: 7
20,773,669 UART: [art] Derive CDI
20,774,407 UART: [art] Store in in slot 0x4
20,832,957 UART: [art] Derive Key Pair
20,833,990 UART: [art] Store priv key in slot 0x5
23,297,107 UART: [art] Derive Key Pair - Done
23,310,154 UART: [art] Signing Cert with AUTHO
23,311,454 UART: RITY.KEYID = 7
25,022,644 UART: [art] Erasing AUTHORITY.KEYID = 7
25,024,158 UART: [art] PUB.X = 10FC0C1EDDC20BD2152C1373A7A850FC4883515185840087907FE0D4C37F71E5673AE6079ECADD6C63756D31A0430BD6
25,031,425 UART: [art] PUB.Y = 5C1024ACC20AAEDCED6397D4847227972E17E2BE0BB350C34C79E2060B24BA0B07D8795905B762B7AECE3FCFFB1F0357
25,038,645 UART: [art] SIG.R = 617EA66B4B14C769B313241D707F5E85E0AD8FC9ACB1A9CADFB97BD0A09ED2B81A1547C9F624363B08B87DC556E050DC
25,046,089 UART: [art] SIG.S = 4CCA620FCA059798B87D9F38D11AFF997EE73E9A721456B9A917F6453FBD4A3A604BBD7E73091667797362562B7FEF15
26,025,358 UART: Caliptra RT
26,026,069 UART: [state] CFI Enabled
26,189,649 UART: [rt] RT listening for mailbox commands...
30,213,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,369,785 UART: [rt]cmd =0x41544d4e, len=14344
34,365,385 >>> mbox cmd response data (8 bytes)
34,365,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,396,554 UART: [rt]cmd =0x41545348, len=116
34,398,794 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
3,438,025 ready_for_fw is high
3,438,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,730,293 >>> mbox cmd response: success
19,026,112 UART:
19,026,536 UART: Running Caliptra FMC ...
19,027,653 UART:
19,027,810 UART: [state] CFI Enabled
19,091,818 UART: [fht] FMC Alias Private Key: 7
20,855,915 UART: [art] Extend RT PCRs Done
20,857,136 UART: [art] Lock RT PCRs Done
20,859,006 UART: [art] Populate DV Done
20,864,073 UART: [fht] FMC Alias Private Key: 7
20,865,730 UART: [art] Derive CDI
20,866,543 UART: [art] Store in in slot 0x4
20,925,212 UART: [art] Derive Key Pair
20,926,248 UART: [art] Store priv key in slot 0x5
23,388,720 UART: [art] Derive Key Pair - Done
23,401,876 UART: [art] Signing Cert with AUTHO
23,403,179 UART: RITY.KEYID = 7
25,114,359 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,855 UART: [art] PUB.X = E70E1FB2764BAE4A9AC71EAEE7680D3EBA53F05EE1F5DB8FD6448EBEBA7EEB60F0A835D995F15B62644F3EE55F92463C
25,123,161 UART: [art] PUB.Y = 2B048E0C55BEAA6EB813773228E7FF1FE1E4B672ED719DC090AC0438DA6AF8E9EA13F30705C0E78FB57236CB7E0BCFA9
25,130,405 UART: [art] SIG.R = 50D293685C7C04C83654858371D64E2DEE8D6B900AE80480B034FD24A6A6201BA654308FF6D839CD2AEA55EF0D03B29C
25,137,849 UART: [art] SIG.S = 1187F14F9E639865715E339243E1D72A896C1CB4DA68C40DCD0E4709FB7234BC790C1B1628AC7BAE75B5E25E5F2A2BEE
26,116,682 UART: Caliptra RT
26,117,389 UART: [state] CFI Enabled
26,281,975 UART: [rt] RT listening for mailbox commands...
30,304,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,460,199 UART: [rt]cmd =0x41544d4e, len=14344
34,455,707 >>> mbox cmd response data (8 bytes)
34,456,280 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,486,927 UART: [rt]cmd =0x41545348, len=116
34,489,174 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,779 writing to cptra_bootfsm_go
194,038 UART:
194,402 UART: Running Caliptra ROM ...
195,623 UART:
605,060 UART: [state] CFI Enabled
618,792 UART: [state] LifecycleState = Unprovisioned
621,163 UART: [state] DebugLocked = No
623,892 UART: [state] WD Timer not started. Device not locked for debugging
627,945 UART: [kat] SHA2-256
817,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,608 UART: [kat] ++
829,132 UART: [kat] sha1
839,864 UART: [kat] SHA2-256
842,863 UART: [kat] SHA2-384
849,989 UART: [kat] SHA2-512-ACC
852,569 UART: [kat] ECC-384
3,294,550 UART: [kat] HMAC-384Kdf
3,306,865 UART: [kat] LMS
3,838,685 UART: [kat] --
3,844,067 UART: [cold-reset] ++
3,845,543 UART: [fht] FHT @ 0x50003400
3,857,888 UART: [idev] ++
3,858,598 UART: [idev] CDI.KEYID = 6
3,859,551 UART: [idev] SUBJECT.KEYID = 7
3,860,742 UART: [idev] UDS.KEYID = 0
3,861,646 ready_for_fw is high
3,861,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,104 UART: [idev] Erasing UDS.KEYID = 0
6,334,757 UART: [idev] Sha1 KeyId Algorithm
6,355,748 UART: [idev] --
6,360,183 UART: [ldev] ++
6,360,872 UART: [ldev] CDI.KEYID = 6
6,361,758 UART: [ldev] SUBJECT.KEYID = 5
6,362,976 UART: [ldev] AUTHORITY.KEYID = 7
6,364,208 UART: [ldev] FE.KEYID = 1
6,375,692 UART: [ldev] Erasing FE.KEYID = 1
8,855,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,009 UART: [ldev] --
10,646,643 UART: [fwproc] Wait for Commands...
10,648,688 UART: [fwproc] Recv command 0x46574c44
10,651,003 UART: [fwproc] Recv'd Img size: 114084 bytes
14,092,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,105 >>> mbox cmd response: success
14,832,193 UART: [afmc] ++
14,832,905 UART: [afmc] CDI.KEYID = 6
14,834,158 UART: [afmc] SUBJECT.KEYID = 7
14,835,607 UART: [afmc] AUTHORITY.KEYID = 5
17,339,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,268 UART: [afmc] --
19,136,071 UART: [cold-reset] --
19,141,025 UART: [state] Locking Datavault
19,145,157 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,306 UART: [state] Locking ICCM
19,150,218 UART: [exit] Launching FMC @ 0x40000130
19,158,904 UART:
19,159,140 UART: Running Caliptra FMC ...
19,160,243 UART:
19,160,402 UART: [state] CFI Enabled
19,168,504 UART: [fht] FMC Alias Private Key: 7
20,925,954 UART: [art] Extend RT PCRs Done
20,927,170 UART: [art] Lock RT PCRs Done
20,929,029 UART: [art] Populate DV Done
20,934,297 UART: [fht] FMC Alias Private Key: 7
20,935,837 UART: [art] Derive CDI
20,936,576 UART: [art] Store in in slot 0x4
20,979,222 UART: [art] Derive Key Pair
20,980,254 UART: [art] Store priv key in slot 0x5
23,406,724 UART: [art] Derive Key Pair - Done
23,419,407 UART: [art] Signing Cert with AUTHO
23,420,717 UART: RITY.KEYID = 7
25,125,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,355 UART: [art] PUB.X = BACDFB1A524FD2A1E1BE9D3477F51DA32461D920A9FEBA45F94CAF8977059E6FEB9413A8FB473E78DB02286B2D1C1E1A
25,134,696 UART: [art] PUB.Y = 7F42B72F2F8CA6BE68EF2875D7AE8F14FF818A9F1532E662768F1C4B3051836404506C3FA3E0F1DCAAFE3EFD5D45752B
25,141,959 UART: [art] SIG.R = F9E79E4A0D5D85A9ACB1D020409D701D6FCC78F00931F22A5CEE3DF02816627F4B8391A7D62234D8B98322FF38A49D78
25,149,385 UART: [art] SIG.S = AD9926877B20B663CC40D80BDFB2FFA6D360F09C6283A85FD281D5AD313A1640DB66D4C15F297DB42811E83B55EF36BA
26,128,537 UART: Caliptra RT
26,129,229 UART: [state] CFI Enabled
26,246,543 UART: [rt] RT listening for mailbox commands...
30,274,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,430,237 UART: [rt]cmd =0x41544d4e, len=14344
34,425,986 >>> mbox cmd response data (8 bytes)
34,426,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,457,196 UART: [rt]cmd =0x41545348, len=116
34,459,511 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,831 writing to cptra_bootfsm_go
3,758,735 ready_for_fw is high
3,759,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,958,073 >>> mbox cmd response: success
19,218,213 UART:
19,218,636 UART: Running Caliptra FMC ...
19,219,778 UART:
19,219,945 UART: [state] CFI Enabled
19,228,178 UART: [fht] FMC Alias Private Key: 7
20,985,399 UART: [art] Extend RT PCRs Done
20,986,632 UART: [art] Lock RT PCRs Done
20,988,800 UART: [art] Populate DV Done
20,994,332 UART: [fht] FMC Alias Private Key: 7
20,995,984 UART: [art] Derive CDI
20,996,821 UART: [art] Store in in slot 0x4
21,039,110 UART: [art] Derive Key Pair
21,040,158 UART: [art] Store priv key in slot 0x5
23,466,847 UART: [art] Derive Key Pair - Done
23,480,002 UART: [art] Signing Cert with AUTHO
23,481,313 UART: RITY.KEYID = 7
25,186,957 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,460 UART: [art] PUB.X = CF357A254C08AF62320B7131F1AE1ECB9C79890C77707D6AE3C84A006522A9F2EC8DA2B57B7A3B164E51B22CA059FDE6
25,195,762 UART: [art] PUB.Y = E270F9926D091F8F79F7D4829BADF1AC30F4EE2E8AB130BB5C7C81BBB9B0E5760C5B87F3E55B31B4FA556F4E1320DB13
25,203,051 UART: [art] SIG.R = 201D9CBD730F8BCA0A180E939313BBAC895EF5AF3E43366EC2EA75707EF600A6F77D8516F6B001DCBA982579416EC603
25,210,445 UART: [art] SIG.S = EF97BA6DB548009DA83E6EDB72FF4968AAF6353438F36C3806E2F19C447D433F71E336D9702CF9A261F3816C236C9EB8
26,189,054 UART: Caliptra RT
26,189,770 UART: [state] CFI Enabled
26,306,475 UART: [rt] RT listening for mailbox commands...
30,335,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,490,517 UART: [rt]cmd =0x41544d4e, len=14344
34,486,331 >>> mbox cmd response data (8 bytes)
34,486,899 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,517,413 UART: [rt]cmd =0x41545348, len=116
34,519,891 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,201 UART: [kat] SHA2-256
892,139 UART: [kat] SHA2-384
894,914 UART: [kat] SHA2-512-ACC
896,815 UART: [kat] ECC-384
902,076 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,591 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,954 UART: [idev] Erasing UDS.KEYID = 0
1,504,598 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,135 UART: [ldev] ++
1,514,303 UART: [ldev] CDI.KEYID = 6
1,514,666 UART: [ldev] SUBJECT.KEYID = 5
1,515,092 UART: [ldev] AUTHORITY.KEYID = 7
1,515,555 UART: [ldev] FE.KEYID = 1
1,520,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,362 UART: [ldev] --
1,585,705 UART: [fwproc] Waiting for Commands...
1,586,450 UART: [fwproc] Received command 0x46574c44
1,587,241 UART: [fwproc] Received Image of size 114084 bytes
2,883,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,187 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,972 >>> mbox cmd response: success
3,077,182 UART: [afmc] ++
3,077,350 UART: [afmc] CDI.KEYID = 6
3,077,712 UART: [afmc] SUBJECT.KEYID = 7
3,078,137 UART: [afmc] AUTHORITY.KEYID = 5
3,113,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,588 UART: [afmc] --
3,156,626 UART: [cold-reset] --
3,157,514 UART: [state] Locking Datavault
3,158,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,457 UART: [state] Locking ICCM
3,159,917 UART: [exit] Launching FMC @ 0x40000130
3,165,246 UART:
3,165,262 UART: Running Caliptra FMC ...
3,165,670 UART:
3,165,724 UART: [state] CFI Enabled
3,176,461 UART: [fht] FMC Alias Private Key: 7
3,284,178 UART: [art] Extend RT PCRs Done
3,284,606 UART: [art] Lock RT PCRs Done
3,286,048 UART: [art] Populate DV Done
3,294,295 UART: [fht] FMC Alias Private Key: 7
3,295,325 UART: [art] Derive CDI
3,295,605 UART: [art] Store in in slot 0x4
3,381,250 UART: [art] Derive Key Pair
3,381,610 UART: [art] Store priv key in slot 0x5
3,394,794 UART: [art] Derive Key Pair - Done
3,409,339 UART: [art] Signing Cert with AUTHO
3,409,819 UART: RITY.KEYID = 7
3,424,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,414 UART: [art] PUB.X = E2AE1FBCC4D98D457B006997009314DB6B10AA7C3752BBFD506180A7A9288D3372B057C18C0BC616DE17B28298F2C046
3,432,141 UART: [art] PUB.Y = AAC591A1B056E25603948E12356946CE4C6FF039A61638085704AB2A5CC92DE02BA3EB958A615820B1DCDA237553796E
3,439,082 UART: [art] SIG.R = 190B61A2F1E1D7D82FCB4FAEFE6192163294DBEC94A76F297BFB18029D69C214CBD71043DF7CF2DF32F4785A82618740
3,445,856 UART: [art] SIG.S = 42277E8A13FFA134DCE7A823B947E9E674641FCB3A7E9BB750D4DF4518DE108F0B2D3D6F5A0F7990BA05A23EFE5F4EEF
3,469,240 UART: Caliptra RT
3,469,493 UART: [state] CFI Enabled
3,578,117 UART: [rt] RT listening for mailbox commands...
3,578,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,773 UART: [rt]cmd =0x41544d4e, len=14344
4,011,516 >>> mbox cmd response data (8 bytes)
4,011,517 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,614 UART: [rt]cmd =0x41545348, len=116
4,043,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,621 ready_for_fw is high
1,362,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,160 >>> mbox cmd response: success
2,985,762 UART:
2,985,778 UART: Running Caliptra FMC ...
2,986,186 UART:
2,986,240 UART: [state] CFI Enabled
2,997,233 UART: [fht] FMC Alias Private Key: 7
3,104,918 UART: [art] Extend RT PCRs Done
3,105,346 UART: [art] Lock RT PCRs Done
3,106,742 UART: [art] Populate DV Done
3,115,091 UART: [fht] FMC Alias Private Key: 7
3,116,135 UART: [art] Derive CDI
3,116,415 UART: [art] Store in in slot 0x4
3,201,698 UART: [art] Derive Key Pair
3,202,058 UART: [art] Store priv key in slot 0x5
3,214,962 UART: [art] Derive Key Pair - Done
3,229,957 UART: [art] Signing Cert with AUTHO
3,230,437 UART: RITY.KEYID = 7
3,246,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,946 UART: [art] PUB.X = 24F2BEC4E831F6090E569D33E383F3372EE13EBF60132920EB2EFD601CA6484CB6DFC4DCBDB3ACCF3221509A33B10C7A
3,253,725 UART: [art] PUB.Y = 40951F6ED428932396A2E95EB1CE526F3277C7CF707713E32454DE6A22568C9F2218E52C1D31664CC88268CDA74F250B
3,260,668 UART: [art] SIG.R = 541D9CBC2D95407955770214FA407F8846F930E1D4112A9314A70D7777BA4A8B3E8B1697A03F6B82C2C32BE16B3FDDA8
3,267,434 UART: [art] SIG.S = 12BC7CDC6D032D073E5EDEDD673987E9FCB52CEE20C400D3F4038651C6AB6E6EA665D388204B720F6729C706E060F65A
3,291,068 UART: Caliptra RT
3,291,321 UART: [state] CFI Enabled
3,399,399 UART: [rt] RT listening for mailbox commands...
3,400,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,221 UART: [rt]cmd =0x41544d4e, len=14344
3,832,752 >>> mbox cmd response data (8 bytes)
3,832,753 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,802 UART: [rt]cmd =0x41545348, len=116
3,864,693 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,781 UART: [state] LifecycleState = Unprovisioned
85,436 UART: [state] DebugLocked = No
85,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,530 UART: [kat] SHA2-256
881,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,576 UART: [kat] ++
885,728 UART: [kat] sha1
890,108 UART: [kat] SHA2-256
892,046 UART: [kat] SHA2-384
894,721 UART: [kat] SHA2-512-ACC
896,622 UART: [kat] ECC-384
902,249 UART: [kat] HMAC-384Kdf
907,031 UART: [kat] LMS
1,475,227 UART: [kat] --
1,476,106 UART: [cold-reset] ++
1,476,454 UART: [fht] Storing FHT @ 0x50003400
1,479,435 UART: [idev] ++
1,479,603 UART: [idev] CDI.KEYID = 6
1,479,963 UART: [idev] SUBJECT.KEYID = 7
1,480,387 UART: [idev] UDS.KEYID = 0
1,480,732 ready_for_fw is high
1,480,732 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,495 UART: [idev] Erasing UDS.KEYID = 0
1,504,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,265 UART: [idev] --
1,514,374 UART: [ldev] ++
1,514,542 UART: [ldev] CDI.KEYID = 6
1,514,905 UART: [ldev] SUBJECT.KEYID = 5
1,515,331 UART: [ldev] AUTHORITY.KEYID = 7
1,515,794 UART: [ldev] FE.KEYID = 1
1,520,970 UART: [ldev] Erasing FE.KEYID = 1
1,546,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,927 UART: [ldev] --
1,586,322 UART: [fwproc] Waiting for Commands...
1,587,129 UART: [fwproc] Received command 0x46574c44
1,587,920 UART: [fwproc] Received Image of size 114084 bytes
2,882,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,030 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,925 >>> mbox cmd response: success
3,076,147 UART: [afmc] ++
3,076,315 UART: [afmc] CDI.KEYID = 6
3,076,677 UART: [afmc] SUBJECT.KEYID = 7
3,077,102 UART: [afmc] AUTHORITY.KEYID = 5
3,111,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,399 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,792 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,482 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,377 UART: [afmc] --
3,155,299 UART: [cold-reset] --
3,156,409 UART: [state] Locking Datavault
3,158,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,620 UART: [state] Locking ICCM
3,159,188 UART: [exit] Launching FMC @ 0x40000130
3,164,517 UART:
3,164,533 UART: Running Caliptra FMC ...
3,164,941 UART:
3,165,084 UART: [state] CFI Enabled
3,175,607 UART: [fht] FMC Alias Private Key: 7
3,284,054 UART: [art] Extend RT PCRs Done
3,284,482 UART: [art] Lock RT PCRs Done
3,285,946 UART: [art] Populate DV Done
3,294,181 UART: [fht] FMC Alias Private Key: 7
3,295,195 UART: [art] Derive CDI
3,295,475 UART: [art] Store in in slot 0x4
3,381,608 UART: [art] Derive Key Pair
3,381,968 UART: [art] Store priv key in slot 0x5
3,395,768 UART: [art] Derive Key Pair - Done
3,410,108 UART: [art] Signing Cert with AUTHO
3,410,588 UART: RITY.KEYID = 7
3,425,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,733 UART: [art] PUB.X = 53411C3E4DD1459D2160986D32564551CDF77E47E94C2EACE241805DD028A97137FDFA23B94384C651F9AD6BDA1CCC02
3,433,506 UART: [art] PUB.Y = 2102C0E50CB41E0507243C14AE03E250E884E9E0F329CBE1503104F0DBDE013FB8E5468706283E20F374E8E650306DB5
3,440,430 UART: [art] SIG.R = 1D3E6EDBFA41F2F74E0DDFCE8C273FAA5C5EE4CB46F679F5EE7ECBF9FA61BFF9272CC97E287F34560ECC3EC0F344CDD1
3,447,232 UART: [art] SIG.S = F0D07F1B8AAEA026FAA983F14E642E32E49CC453118D7EF737D02C1D5B330DAB193AAA8504575FA60E4556D63D3FB067
3,470,992 UART: Caliptra RT
3,471,337 UART: [state] CFI Enabled
3,578,880 UART: [rt] RT listening for mailbox commands...
3,579,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,890 UART: [rt]cmd =0x41544d4e, len=14344
4,012,639 >>> mbox cmd response data (8 bytes)
4,012,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,647 UART: [rt]cmd =0x41545348, len=116
4,044,504 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 ready_for_fw is high
1,362,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,061 >>> mbox cmd response: success
2,987,451 UART:
2,987,467 UART: Running Caliptra FMC ...
2,987,875 UART:
2,988,018 UART: [state] CFI Enabled
2,998,687 UART: [fht] FMC Alias Private Key: 7
3,106,420 UART: [art] Extend RT PCRs Done
3,106,848 UART: [art] Lock RT PCRs Done
3,108,418 UART: [art] Populate DV Done
3,116,685 UART: [fht] FMC Alias Private Key: 7
3,117,719 UART: [art] Derive CDI
3,117,999 UART: [art] Store in in slot 0x4
3,203,536 UART: [art] Derive Key Pair
3,203,896 UART: [art] Store priv key in slot 0x5
3,217,690 UART: [art] Derive Key Pair - Done
3,232,511 UART: [art] Signing Cert with AUTHO
3,232,991 UART: RITY.KEYID = 7
3,248,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,414 UART: [art] PUB.X = 80B3AAC66B675508F366BFB5FD40FF4323461142851124B246E50DBF3A11E3303D425F537258F474C5F52EDD92AEB317
3,256,178 UART: [art] PUB.Y = 6F8CE3213D54EE77EC065C4A97A5A8E0E7F74F70839464E153DECB98AD25D4C335A6DE1C478A369754EAEAFF50025496
3,263,132 UART: [art] SIG.R = 05B01C5132F5F1D27D415DB34E99072C10CF3B5DA21E2FE3E81447856D13C47094186915AFE258C45DD014A280D354DF
3,269,896 UART: [art] SIG.S = 623DCF9D3AA5922EBF3E70C61314A633E7041D58CCF637A9A9AD715FDED8655F9A81EF92D443B5F4CA313DDB6EBE61AA
3,293,796 UART: Caliptra RT
3,294,141 UART: [state] CFI Enabled
3,403,145 UART: [rt] RT listening for mailbox commands...
3,403,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,899 UART: [rt]cmd =0x41544d4e, len=14344
3,837,068 >>> mbox cmd response data (8 bytes)
3,837,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,160 UART: [rt]cmd =0x41545348, len=116
3,868,989 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,488 UART: [kat] LMS
1,170,816 UART: [kat] --
1,171,735 UART: [cold-reset] ++
1,172,249 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 ready_for_fw is high
1,176,107 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,201,093 UART: [idev] Sha1 KeyId Algorithm
1,209,517 UART: [idev] --
1,210,403 UART: [ldev] ++
1,210,571 UART: [ldev] CDI.KEYID = 6
1,210,934 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,948 UART: [fwproc] Wait for Commands...
1,283,644 UART: [fwproc] Recv command 0x46574c44
1,284,372 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,235 >>> mbox cmd response: success
2,773,353 UART: [afmc] ++
2,773,521 UART: [afmc] CDI.KEYID = 6
2,773,883 UART: [afmc] SUBJECT.KEYID = 7
2,774,308 UART: [afmc] AUTHORITY.KEYID = 5
2,809,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,329 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,048 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,974 UART: [afmc] --
2,852,972 UART: [cold-reset] --
2,853,656 UART: [state] Locking Datavault
2,854,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,401 UART: [state] Locking ICCM
2,855,959 UART: [exit] Launching FMC @ 0x40000130
2,861,288 UART:
2,861,304 UART: Running Caliptra FMC ...
2,861,712 UART:
2,861,766 UART: [state] CFI Enabled
2,871,995 UART: [fht] FMC Alias Private Key: 7
2,979,420 UART: [art] Extend RT PCRs Done
2,979,848 UART: [art] Lock RT PCRs Done
2,980,984 UART: [art] Populate DV Done
2,989,381 UART: [fht] FMC Alias Private Key: 7
2,990,555 UART: [art] Derive CDI
2,990,835 UART: [art] Store in in slot 0x4
3,076,630 UART: [art] Derive Key Pair
3,076,990 UART: [art] Store priv key in slot 0x5
3,090,390 UART: [art] Derive Key Pair - Done
3,104,985 UART: [art] Signing Cert with AUTHO
3,105,465 UART: RITY.KEYID = 7
3,120,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,614 UART: [art] PUB.X = 85EEA97C6F2FB8DDA2F26BA45FC0234136F7D1250ED2175A3BD0308486EB04B3282F3F2D1B89FC27AE29329A71BE197F
3,128,390 UART: [art] PUB.Y = 847FD442C4A8C9FFFE1F3554BF699231376419A143D581FFCE15A203BC62129C446A612233947EE987FD1CA2A22A166D
3,135,339 UART: [art] SIG.R = DFB2C9AAA5E6D588B80745397EE28BC572C8E3F9351700A2F8FE9D4B35BB61B377FA1B988E56C23E356D3A2E2E53BE40
3,142,098 UART: [art] SIG.S = 4E31D6408A35C98524E7248AF377852F651135AF201963E86F339A04CF2FF38525200D64D451B23504B0A25E83E7E3AA
3,165,738 UART: Caliptra RT
3,165,991 UART: [state] CFI Enabled
3,274,366 UART: [rt] RT listening for mailbox commands...
3,275,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,998 UART: [rt]cmd =0x41544d4e, len=14344
3,708,337 >>> mbox cmd response data (8 bytes)
3,708,338 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,193 UART: [rt]cmd =0x41545348, len=116
3,740,322 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,595 ready_for_fw is high
1,059,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,738 >>> mbox cmd response: success
2,683,818 UART:
2,683,834 UART: Running Caliptra FMC ...
2,684,242 UART:
2,684,296 UART: [state] CFI Enabled
2,694,825 UART: [fht] FMC Alias Private Key: 7
2,802,640 UART: [art] Extend RT PCRs Done
2,803,068 UART: [art] Lock RT PCRs Done
2,804,886 UART: [art] Populate DV Done
2,813,001 UART: [fht] FMC Alias Private Key: 7
2,814,009 UART: [art] Derive CDI
2,814,289 UART: [art] Store in in slot 0x4
2,899,858 UART: [art] Derive Key Pair
2,900,218 UART: [art] Store priv key in slot 0x5
2,913,124 UART: [art] Derive Key Pair - Done
2,928,124 UART: [art] Signing Cert with AUTHO
2,928,604 UART: RITY.KEYID = 7
2,943,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,593 UART: [art] PUB.X = 29F5BE18146A4A3EEF3FFA9306430829CD1BABE868EBE1B26706EEE7AF8E9B1E548529B1FCF103C489245E197831A20A
2,951,360 UART: [art] PUB.Y = 4A356FE1FA7DC00875012523ABC6C1FA68E78FEF9BB19F7D8F6A3B6B288C1A1BC0B39C342D9359BCE53894573109C9D4
2,958,313 UART: [art] SIG.R = D6D9C3714EA73271FF4CDFC9609DF71E7A1032716894E39EE747D8923B7B6C3E166C4077713DF5CFF1AB47A167CF3F02
2,965,088 UART: [art] SIG.S = 0D35386305CC0D7FF4CCF87F47FA7EEF075BDE30CA98C881D6182E2380DD69735E33CB096AACBA3F1955EFB496BF61C6
2,988,978 UART: Caliptra RT
2,989,231 UART: [state] CFI Enabled
3,096,624 UART: [rt] RT listening for mailbox commands...
3,097,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,614 UART: [rt]cmd =0x41544d4e, len=14344
3,530,557 >>> mbox cmd response data (8 bytes)
3,530,558 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,769 UART: [rt]cmd =0x41545348, len=116
3,562,804 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,835 UART: [kat] HMAC-384Kdf
923,541 UART: [kat] LMS
1,171,869 UART: [kat] --
1,172,696 UART: [cold-reset] ++
1,173,178 UART: [fht] FHT @ 0x50003400
1,175,777 UART: [idev] ++
1,175,945 UART: [idev] CDI.KEYID = 6
1,176,305 UART: [idev] SUBJECT.KEYID = 7
1,176,729 UART: [idev] UDS.KEYID = 0
1,177,074 ready_for_fw is high
1,177,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,124 UART: [ldev] ++
1,211,292 UART: [ldev] CDI.KEYID = 6
1,211,655 UART: [ldev] SUBJECT.KEYID = 5
1,212,081 UART: [ldev] AUTHORITY.KEYID = 7
1,212,544 UART: [ldev] FE.KEYID = 1
1,217,888 UART: [ldev] Erasing FE.KEYID = 1
1,243,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,005 UART: [fwproc] Wait for Commands...
1,283,683 UART: [fwproc] Recv command 0x46574c44
1,284,411 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,514 >>> mbox cmd response: success
2,771,762 UART: [afmc] ++
2,771,930 UART: [afmc] CDI.KEYID = 6
2,772,292 UART: [afmc] SUBJECT.KEYID = 7
2,772,717 UART: [afmc] AUTHORITY.KEYID = 5
2,808,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,147 UART: [afmc] --
2,852,199 UART: [cold-reset] --
2,853,129 UART: [state] Locking Datavault
2,854,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,018 UART: [state] Locking ICCM
2,855,554 UART: [exit] Launching FMC @ 0x40000130
2,860,883 UART:
2,860,899 UART: Running Caliptra FMC ...
2,861,307 UART:
2,861,450 UART: [state] CFI Enabled
2,872,337 UART: [fht] FMC Alias Private Key: 7
2,980,180 UART: [art] Extend RT PCRs Done
2,980,608 UART: [art] Lock RT PCRs Done
2,982,296 UART: [art] Populate DV Done
2,990,553 UART: [fht] FMC Alias Private Key: 7
2,991,621 UART: [art] Derive CDI
2,991,901 UART: [art] Store in in slot 0x4
3,077,800 UART: [art] Derive Key Pair
3,078,160 UART: [art] Store priv key in slot 0x5
3,092,006 UART: [art] Derive Key Pair - Done
3,106,708 UART: [art] Signing Cert with AUTHO
3,107,188 UART: RITY.KEYID = 7
3,122,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,989 UART: [art] PUB.X = 403A6D5FEE22B71C89592895FF2BBF52AA48D72BF55EB17B51277A69F0C70A6DB332BAB9E87E2C252770B6597DC9210A
3,129,763 UART: [art] PUB.Y = E68A8FFD49E2CF040364832C52F3CB881805B2E6F2BD6E4DC45990A80D95C510F30CEA8CEE9D287676B0A7B8231EE460
3,136,708 UART: [art] SIG.R = 96F4AD44CFE8B712DF8A537BFCBB095E11E8419D0B767461B853E84C4C7C2515B7833379EF2D26D61219778FEB05BA67
3,143,475 UART: [art] SIG.S = BCF88CC45EFF03D88C3E93B37877B8D5A04D2F0600F801F3D9693CD0CD2DFD5E92E2113CDA03AF2B2F59E49CCCAD3DD2
3,167,622 UART: Caliptra RT
3,167,967 UART: [state] CFI Enabled
3,276,433 UART: [rt] RT listening for mailbox commands...
3,277,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,081 UART: [rt]cmd =0x41544d4e, len=14344
3,710,120 >>> mbox cmd response data (8 bytes)
3,710,121 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,226 UART: [rt]cmd =0x41545348, len=116
3,742,141 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,784 ready_for_fw is high
1,059,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,729 >>> mbox cmd response: success
2,683,819 UART:
2,683,835 UART: Running Caliptra FMC ...
2,684,243 UART:
2,684,386 UART: [state] CFI Enabled
2,694,859 UART: [fht] FMC Alias Private Key: 7
2,802,462 UART: [art] Extend RT PCRs Done
2,802,890 UART: [art] Lock RT PCRs Done
2,804,550 UART: [art] Populate DV Done
2,812,615 UART: [fht] FMC Alias Private Key: 7
2,813,727 UART: [art] Derive CDI
2,814,007 UART: [art] Store in in slot 0x4
2,899,602 UART: [art] Derive Key Pair
2,899,962 UART: [art] Store priv key in slot 0x5
2,912,944 UART: [art] Derive Key Pair - Done
2,927,614 UART: [art] Signing Cert with AUTHO
2,928,094 UART: RITY.KEYID = 7
2,943,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,985 UART: [art] PUB.X = 9B2594BA5D60744277AC0932EA8A50581361EDA2A3CA579855CA33A82A749EE7BA0B8CC7C1296F8276C981D0918F09AB
2,950,750 UART: [art] PUB.Y = C9196D5DD1C2DE4E3122193490705AFB233B3C09AAF876220E59262CDB996A9C3FE6717C492797B7D7C66EF0864E8D4E
2,957,698 UART: [art] SIG.R = CD16BD91AFED1636FBB30C1770BA6BE463DE2B94B9FA2B92E1BE53A201FE1F2348874920D88C12627FFD27854399D56C
2,964,474 UART: [art] SIG.S = 55E5BF9485977805508D287E0E8796631F6DF90E4289C75AA81D6956B5B664F18F30C3E780E3F377A0D6CC07FCF1F6F1
2,988,169 UART: Caliptra RT
2,988,514 UART: [state] CFI Enabled
3,096,287 UART: [rt] RT listening for mailbox commands...
3,096,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,927 UART: [rt]cmd =0x41544d4e, len=14344
3,529,734 >>> mbox cmd response data (8 bytes)
3,529,735 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,856 UART: [rt]cmd =0x41545348, len=116
3,561,561 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,173,947 ready_for_fw is high
1,173,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,576 UART: [ldev] ++
1,208,744 UART: [ldev] CDI.KEYID = 6
1,209,108 UART: [ldev] SUBJECT.KEYID = 5
1,209,535 UART: [ldev] AUTHORITY.KEYID = 7
1,209,998 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,241,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,310 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,425 UART: [fwproc] Recv command 0x46574c44
1,282,158 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,483 >>> mbox cmd response: success
2,769,586 UART: [afmc] ++
2,769,754 UART: [afmc] CDI.KEYID = 6
2,770,117 UART: [afmc] SUBJECT.KEYID = 7
2,770,543 UART: [afmc] AUTHORITY.KEYID = 5
2,806,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,907 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,303 UART: [afmc] --
2,849,369 UART: [cold-reset] --
2,850,225 UART: [state] Locking Datavault
2,851,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,140 UART: [state] Locking ICCM
2,852,580 UART: [exit] Launching FMC @ 0x40000130
2,857,909 UART:
2,857,925 UART: Running Caliptra FMC ...
2,858,333 UART:
2,858,387 UART: [state] CFI Enabled
2,868,822 UART: [fht] FMC Alias Private Key: 7
2,976,935 UART: [art] Extend RT PCRs Done
2,977,363 UART: [art] Lock RT PCRs Done
2,978,891 UART: [art] Populate DV Done
2,986,982 UART: [fht] FMC Alias Private Key: 7
2,988,026 UART: [art] Derive CDI
2,988,306 UART: [art] Store in in slot 0x4
3,074,213 UART: [art] Derive Key Pair
3,074,573 UART: [art] Store priv key in slot 0x5
3,088,291 UART: [art] Derive Key Pair - Done
3,103,093 UART: [art] Signing Cert with AUTHO
3,103,573 UART: RITY.KEYID = 7
3,118,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,696 UART: [art] PUB.X = 9F772BBEDC8FCCD80D9E662AB8255747BBD144933F6C8D0EBE57ACE7D5D74C0143A75BA7460A47BF4AB6CFB25D72CAA6
3,126,480 UART: [art] PUB.Y = D499FA2D8A3D8D726BDB3041950742F33B43DB665DAD49877F0159F83C0325A81524DF274599B8C12F4DA1C700FC4BE0
3,133,403 UART: [art] SIG.R = EAF660751DF39BCDEE272AE503B5719C8B466FA40DB83474FE32E305ECEE74F0394F7B17E6160C643E2922AC6FD60F7C
3,140,172 UART: [art] SIG.S = D1074D3D7C85C5C13169A486A4B3A0046312D2D125AD58CF3EF3300FDEC7BE9933C0E50356615ED99D842FDCF2223393
3,163,501 UART: Caliptra RT
3,163,754 UART: [state] CFI Enabled
3,272,158 UART: [rt] RT listening for mailbox commands...
3,272,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,894 UART: [rt]cmd =0x41544d4e, len=14344
3,706,511 >>> mbox cmd response data (8 bytes)
3,706,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,513 UART: [rt]cmd =0x41545348, len=116
3,738,370 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,226 ready_for_fw is high
1,055,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,357 >>> mbox cmd response: success
2,679,277 UART:
2,679,293 UART: Running Caliptra FMC ...
2,679,701 UART:
2,679,755 UART: [state] CFI Enabled
2,690,364 UART: [fht] FMC Alias Private Key: 7
2,797,895 UART: [art] Extend RT PCRs Done
2,798,323 UART: [art] Lock RT PCRs Done
2,799,911 UART: [art] Populate DV Done
2,808,228 UART: [fht] FMC Alias Private Key: 7
2,809,198 UART: [art] Derive CDI
2,809,478 UART: [art] Store in in slot 0x4
2,894,969 UART: [art] Derive Key Pair
2,895,329 UART: [art] Store priv key in slot 0x5
2,908,541 UART: [art] Derive Key Pair - Done
2,923,313 UART: [art] Signing Cert with AUTHO
2,923,793 UART: RITY.KEYID = 7
2,939,141 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,906 UART: [art] PUB.X = 05CAA038999893FE936014EB166BC7BF990CA3ABBD21B9C53249A3B32C72890590FAC83B9DB31F38BCD408167664B274
2,946,668 UART: [art] PUB.Y = 46BBEE808814B21280068DD662EAA06A5C52E235964F28244C13B5A601C4590495A36319E445DE5E551F38999F859537
2,953,597 UART: [art] SIG.R = 4ADB12D0241498D6BB5DFC3392B01A616ABA84353A0CF1926A44AEB54C98F605BE07CB872C0C2265FCB067558860EF1E
2,960,365 UART: [art] SIG.S = 2DB2B6AD146CD5B9C830CDF2A6925B5F16E13AAFCC8218A947A84C3FB0F7B474343A41D63964C4DD79911057F3E1AA90
2,984,536 UART: Caliptra RT
2,984,789 UART: [state] CFI Enabled
3,092,096 UART: [rt] RT listening for mailbox commands...
3,092,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,196 UART: [rt]cmd =0x41544d4e, len=14344
3,526,369 >>> mbox cmd response data (8 bytes)
3,526,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,591 UART: [rt]cmd =0x41545348, len=116
3,558,472 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,317 UART: [kat] LMS
1,169,629 UART: [kat] --
1,170,838 UART: [cold-reset] ++
1,171,362 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
1,175,288 ready_for_fw is high
1,175,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,402 >>> mbox cmd response: success
2,770,655 UART: [afmc] ++
2,770,823 UART: [afmc] CDI.KEYID = 6
2,771,186 UART: [afmc] SUBJECT.KEYID = 7
2,771,612 UART: [afmc] AUTHORITY.KEYID = 5
2,807,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,693 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,320 UART: [afmc] --
2,850,272 UART: [cold-reset] --
2,851,038 UART: [state] Locking Datavault
2,852,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,965 UART: [state] Locking ICCM
2,853,493 UART: [exit] Launching FMC @ 0x40000130
2,858,822 UART:
2,858,838 UART: Running Caliptra FMC ...
2,859,246 UART:
2,859,389 UART: [state] CFI Enabled
2,870,014 UART: [fht] FMC Alias Private Key: 7
2,977,873 UART: [art] Extend RT PCRs Done
2,978,301 UART: [art] Lock RT PCRs Done
2,979,993 UART: [art] Populate DV Done
2,988,178 UART: [fht] FMC Alias Private Key: 7
2,989,360 UART: [art] Derive CDI
2,989,640 UART: [art] Store in in slot 0x4
3,075,227 UART: [art] Derive Key Pair
3,075,587 UART: [art] Store priv key in slot 0x5
3,089,583 UART: [art] Derive Key Pair - Done
3,103,979 UART: [art] Signing Cert with AUTHO
3,104,459 UART: RITY.KEYID = 7
3,119,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,472 UART: [art] PUB.X = 98F49440494BA7E7B70F2ED38F002A47E047E413B51DEB2644BB95F4C89E8E01DDE93785E409A5AF9B903B13BD0BF470
3,127,216 UART: [art] PUB.Y = D350B3774C1BA5D03523DD7CF21CD1736F380FAB01200367023CF9511D5C603419F21A8EFD9702A39CB04B2FCE13B074
3,134,155 UART: [art] SIG.R = 6FBADC38C9AC32A0E8F04EF8315C00C9F31E77EB2A643DC22BFE73C1E7165649A6A9A228BE5FA69C19165A94E7C91D6A
3,140,921 UART: [art] SIG.S = DFE0CF2DF99160F7E912556CB2F5AE3D507B7CC3632D514AD7B3874E5247D00F523076E48F157C729C13206FD0AFAB23
3,164,099 UART: Caliptra RT
3,164,444 UART: [state] CFI Enabled
3,271,677 UART: [rt] RT listening for mailbox commands...
3,272,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,663 UART: [rt]cmd =0x41544d4e, len=14344
3,706,144 >>> mbox cmd response data (8 bytes)
3,706,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,482 UART: [rt]cmd =0x41545348, len=116
3,738,267 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,057 ready_for_fw is high
1,056,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,138 >>> mbox cmd response: success
2,680,246 UART:
2,680,262 UART: Running Caliptra FMC ...
2,680,670 UART:
2,680,813 UART: [state] CFI Enabled
2,691,336 UART: [fht] FMC Alias Private Key: 7
2,799,737 UART: [art] Extend RT PCRs Done
2,800,165 UART: [art] Lock RT PCRs Done
2,801,897 UART: [art] Populate DV Done
2,810,256 UART: [fht] FMC Alias Private Key: 7
2,811,234 UART: [art] Derive CDI
2,811,514 UART: [art] Store in in slot 0x4
2,897,221 UART: [art] Derive Key Pair
2,897,581 UART: [art] Store priv key in slot 0x5
2,910,987 UART: [art] Derive Key Pair - Done
2,925,541 UART: [art] Signing Cert with AUTHO
2,926,021 UART: RITY.KEYID = 7
2,941,047 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,812 UART: [art] PUB.X = 043508B7EE682A7F8CA1EBD9A1FA7950EF1D6F843169B8D7B3CE19786297F774DC271E16D18D3CE895F80EC0D25EF7F1
2,948,585 UART: [art] PUB.Y = 0AF79245FAD17448966BCDA97F280E4F1488BBE85E792305BCBAE7AFEAA17BC9D9E0C31DA6D7FEB875B40B70F6DED98C
2,955,549 UART: [art] SIG.R = 6676F2FAC6816A30AE799D62DCA845FB54A7A5DF48E028684ACE5F00083C2A2837770CAEED537DFBAB72D591638B7714
2,962,301 UART: [art] SIG.S = 5E2DB8495FADFD32CE99B03DB5D3F31CEFBE8831320198CE0B34412FFCF7AE348873B0EE7A4FD3A2851466664C9CD1BD
2,986,286 UART: Caliptra RT
2,986,631 UART: [state] CFI Enabled
3,093,830 UART: [rt] RT listening for mailbox commands...
3,094,500 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,262 UART: [rt]cmd =0x41544d4e, len=14344
3,526,971 >>> mbox cmd response data (8 bytes)
3,526,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,925 UART: [rt]cmd =0x41545348, len=116
3,558,608 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,262 UART:
192,652 UART: Running Caliptra ROM ...
193,846 UART:
194,001 UART: [state] CFI Enabled
266,960 UART: [state] LifecycleState = Unprovisioned
268,938 UART: [state] DebugLocked = No
271,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,106 UART: [kat] SHA2-256
446,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,320 UART: [kat] ++
457,809 UART: [kat] sha1
467,619 UART: [kat] SHA2-256
470,254 UART: [kat] SHA2-384
477,219 UART: [kat] SHA2-512-ACC
479,598 UART: [kat] ECC-384
2,766,972 UART: [kat] HMAC-384Kdf
2,798,494 UART: [kat] LMS
3,988,793 UART: [kat] --
3,991,602 UART: [cold-reset] ++
3,994,114 UART: [fht] Storing FHT @ 0x50003400
4,005,462 UART: [idev] ++
4,006,034 UART: [idev] CDI.KEYID = 6
4,006,950 UART: [idev] SUBJECT.KEYID = 7
4,008,203 UART: [idev] UDS.KEYID = 0
4,009,249 ready_for_fw is high
4,009,447 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,549 UART: [idev] Erasing UDS.KEYID = 0
7,343,912 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,602 UART: [idev] --
7,370,596 UART: [ldev] ++
7,371,179 UART: [ldev] CDI.KEYID = 6
7,372,146 UART: [ldev] SUBJECT.KEYID = 5
7,373,362 UART: [ldev] AUTHORITY.KEYID = 7
7,374,614 UART: [ldev] FE.KEYID = 1
7,421,665 UART: [ldev] Erasing FE.KEYID = 1
10,753,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,941 UART: [ldev] --
13,115,517 UART: [fwproc] Waiting for Commands...
13,117,302 UART: [fwproc] Received command 0x46574c44
13,119,487 UART: [fwproc] Received Image of size 113760 bytes
17,167,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,624,134 >>> mbox cmd response: success
17,628,165 UART: [afmc] ++
17,628,790 UART: [afmc] CDI.KEYID = 6
17,629,706 UART: [afmc] SUBJECT.KEYID = 7
17,630,925 UART: [afmc] AUTHORITY.KEYID = 5
21,007,705 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,843 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,256 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,092 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,532 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,161 UART: [afmc] --
23,378,490 UART: [cold-reset] --
23,382,186 UART: [state] Locking Datavault
23,386,566 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,262 UART: [state] Locking ICCM
23,390,087 UART: [exit] Launching FMC @ 0x40000130
23,398,486 UART:
23,398,738 UART: Running Caliptra FMC ...
23,399,841 UART:
23,400,000 UART: [state] CFI Enabled
23,465,318 UART: [fht] FMC Alias Private Key: 7
25,802,521 UART: [art] Extend RT PCRs Done
25,803,743 UART: [art] Lock RT PCRs Done
25,805,529 UART: [art] Populate DV Done
25,811,104 UART: [fht] FMC Alias Private Key: 7
25,812,856 UART: [art] Derive CDI
25,813,671 UART: [art] Store in in slot 0x4
25,873,519 UART: [art] Derive Key Pair
25,874,557 UART: [art] Store priv key in slot 0x5
29,167,770 UART: [art] Derive Key Pair - Done
29,180,604 UART: [art] Signing Cert with AUTHO
29,181,914 UART: RITY.KEYID = 7
31,469,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,680 UART: [art] PUB.X = C51DDCB042117F9D8986C5CB00782FAF651F3A937E445940DC0B790B09BC64D86C80DB1CCE943AE2ADFAE1A91F163079
31,477,926 UART: [art] PUB.Y = B02799C70D03231244554B178E9BFC1D182A2B1D71B4C4CCFC8CCD9433632FB0A83CFB93F688F50303184A44CCB93421
31,485,206 UART: [art] SIG.R = A68A507CCA7DC51E0E63F219C9EC1461827B3E96FE963F9085BDED6FDD3B9C177750A3E66F5F33811FB83FEE8BFA69C7
31,492,603 UART: [art] SIG.S = 1A8C7B87450AC1E78AB704881EA8C47F4C097BF6D026FE0297ECAA9213087150C13855483A988B5FB6BF5C6220B387F1
32,797,257 UART: Caliptra RT
32,797,983 UART: [state] CFI Enabled
32,960,349 UART: [rt] RT listening for mailbox commands...
36,982,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,138,414 UART: [rt]cmd =0x41544d4e, len=14344
42,439,133 >>> mbox cmd response data (8 bytes)
42,439,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,470,532 UART: [rt]cmd =0x41545348, len=116
42,472,559 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,786,109 ready_for_fw is high
3,786,505 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,822,795 >>> mbox cmd response: success
23,508,563 UART:
23,508,961 UART: Running Caliptra FMC ...
23,510,170 UART:
23,510,342 UART: [state] CFI Enabled
23,577,631 UART: [fht] FMC Alias Private Key: 7
25,915,660 UART: [art] Extend RT PCRs Done
25,916,918 UART: [art] Lock RT PCRs Done
25,918,675 UART: [art] Populate DV Done
25,924,263 UART: [fht] FMC Alias Private Key: 7
25,925,751 UART: [art] Derive CDI
25,926,518 UART: [art] Store in in slot 0x4
25,986,350 UART: [art] Derive Key Pair
25,987,355 UART: [art] Store priv key in slot 0x5
29,280,215 UART: [art] Derive Key Pair - Done
29,293,412 UART: [art] Signing Cert with AUTHO
29,294,765 UART: RITY.KEYID = 7
31,582,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,584,277 UART: [art] PUB.X = 341F09F9E2FFBA7D581383C72D0D4093580D0B0F5062DAA5CCB4115AE2AF52A423A20C089C0EC7B880B005C66F8CDB62
31,591,593 UART: [art] PUB.Y = 81ACDC90E9E292918D8E077B65DECC0B3E5F7D8DFC9DD7459035BBCFB98503646546C03E3DF476EDD861C64C074B9FD1
31,598,820 UART: [art] SIG.R = B32B2A95EB5499754B13E2E9E5E80123A0AD2F593416EAA08936CC81863143CD75462FE11AD20122812984B741BB4813
31,606,172 UART: [art] SIG.S = B42A963083BFDC2447589C9B1D399E82D7B8916A73578934961EE5902A353364B924A8E93C05E70C3A07B56D26B365D9
32,910,483 UART: Caliptra RT
32,911,195 UART: [state] CFI Enabled
33,073,785 UART: [rt] RT listening for mailbox commands...
37,097,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,253,032 UART: [rt]cmd =0x41544d4e, len=14344
42,552,917 >>> mbox cmd response data (8 bytes)
42,553,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,584,289 UART: [rt]cmd =0x41545348, len=116
42,586,795 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
192,867 UART:
193,245 UART: Running Caliptra ROM ...
194,379 UART:
603,955 UART: [state] CFI Enabled
616,263 UART: [state] LifecycleState = Unprovisioned
618,208 UART: [state] DebugLocked = No
620,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,873 UART: [kat] SHA2-256
794,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,178 UART: [kat] ++
805,646 UART: [kat] sha1
815,590 UART: [kat] SHA2-256
818,303 UART: [kat] SHA2-384
824,381 UART: [kat] SHA2-512-ACC
826,741 UART: [kat] ECC-384
3,110,622 UART: [kat] HMAC-384Kdf
3,122,855 UART: [kat] LMS
4,312,955 UART: [kat] --
4,317,746 UART: [cold-reset] ++
4,318,826 UART: [fht] Storing FHT @ 0x50003400
4,330,091 UART: [idev] ++
4,330,720 UART: [idev] CDI.KEYID = 6
4,331,614 UART: [idev] SUBJECT.KEYID = 7
4,332,771 UART: [idev] UDS.KEYID = 0
4,333,776 ready_for_fw is high
4,333,962 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,831 UART: [idev] Erasing UDS.KEYID = 0
7,625,353 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,416 UART: [idev] --
7,649,485 UART: [ldev] ++
7,650,071 UART: [ldev] CDI.KEYID = 6
7,651,009 UART: [ldev] SUBJECT.KEYID = 5
7,652,218 UART: [ldev] AUTHORITY.KEYID = 7
7,653,500 UART: [ldev] FE.KEYID = 1
7,665,683 UART: [ldev] Erasing FE.KEYID = 1
10,954,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,761 UART: [ldev] --
13,313,922 UART: [fwproc] Waiting for Commands...
13,316,497 UART: [fwproc] Received command 0x46574c44
13,318,669 UART: [fwproc] Received Image of size 113760 bytes
17,366,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,801 >>> mbox cmd response: success
17,830,162 UART: [afmc] ++
17,830,814 UART: [afmc] CDI.KEYID = 6
17,831,721 UART: [afmc] SUBJECT.KEYID = 7
17,832,935 UART: [afmc] AUTHORITY.KEYID = 5
21,149,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,407 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,662 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,034 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,873 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,300 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,510 UART: [afmc] --
23,514,075 UART: [cold-reset] --
23,517,664 UART: [state] Locking Datavault
23,523,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,947 UART: [state] Locking ICCM
23,526,279 UART: [exit] Launching FMC @ 0x40000130
23,534,617 UART:
23,534,846 UART: Running Caliptra FMC ...
23,535,943 UART:
23,536,098 UART: [state] CFI Enabled
23,544,095 UART: [fht] FMC Alias Private Key: 7
25,875,058 UART: [art] Extend RT PCRs Done
25,876,285 UART: [art] Lock RT PCRs Done
25,878,126 UART: [art] Populate DV Done
25,883,487 UART: [fht] FMC Alias Private Key: 7
25,885,126 UART: [art] Derive CDI
25,885,935 UART: [art] Store in in slot 0x4
25,928,249 UART: [art] Derive Key Pair
25,929,243 UART: [art] Store priv key in slot 0x5
29,171,444 UART: [art] Derive Key Pair - Done
29,184,561 UART: [art] Signing Cert with AUTHO
29,185,871 UART: RITY.KEYID = 7
31,465,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,176 UART: [art] PUB.X = E16B2040CABEE42E3744A6E5A220849628FB6498055243F1BF3D6AFD03F664A15339996198342A9118B7A127E5FC1A76
31,474,394 UART: [art] PUB.Y = 74112D38B9B479AFDC265D72271B139FB61E884CDEAC92510A4A06D44868E96FAA85DFE02C6946EA868696F490B9A560
31,481,649 UART: [art] SIG.R = E0A8EB5950A086294F795C3EBE5D309FEE99C59D0E8E5B46486F478689439D7E3185C1C6245544E7A19A002C1CAD7C46
31,488,959 UART: [art] SIG.S = 0CC210D82399A1157257F6309A0A065F4DB45FAB21222454D7109739B464449414CA13481FD6ACB7AAB4D2296DCE3CA8
32,794,200 UART: Caliptra RT
32,794,899 UART: [state] CFI Enabled
32,911,646 UART: [rt] RT listening for mailbox commands...
36,933,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,089,326 UART: [rt]cmd =0x41544d4e, len=14344
42,389,664 >>> mbox cmd response data (8 bytes)
42,390,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,421,177 UART: [rt]cmd =0x41545348, len=116
42,423,201 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,896 writing to cptra_bootfsm_go
4,124,284 ready_for_fw is high
4,124,711 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,411 >>> mbox cmd response: success
23,701,552 UART:
23,701,936 UART: Running Caliptra FMC ...
23,703,031 UART:
23,703,184 UART: [state] CFI Enabled
23,710,801 UART: [fht] FMC Alias Private Key: 7
26,041,628 UART: [art] Extend RT PCRs Done
26,042,852 UART: [art] Lock RT PCRs Done
26,044,460 UART: [art] Populate DV Done
26,049,875 UART: [fht] FMC Alias Private Key: 7
26,051,580 UART: [art] Derive CDI
26,052,320 UART: [art] Store in in slot 0x4
26,095,191 UART: [art] Derive Key Pair
26,096,237 UART: [art] Store priv key in slot 0x5
29,338,580 UART: [art] Derive Key Pair - Done
29,351,587 UART: [art] Signing Cert with AUTHO
29,352,892 UART: RITY.KEYID = 7
31,632,354 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,866 UART: [art] PUB.X = 05CD0D0E8C283E4F3DBFC6478FD61E3ACFB3BAFF69A4987656FE5C8E7C78DB52077C1C43D23E952D051D29FF5E501DF3
31,641,131 UART: [art] PUB.Y = 0EA76B5B03282D708AE2CBA615282AC349A9C6BA6F4E9ACE59D0941A18752B3213DADCC6CC24839BA12B81E7EB46E390
31,648,346 UART: [art] SIG.R = 396423E1D0CC900C7A5AF703EBC832DF81592465A1452ADBC305D19940C4BDEEF920A9FA1EF5675A054891B3E7558BC6
31,655,737 UART: [art] SIG.S = 32DC0BFA1397BEDA6DB7289596E71E4FD53CB3D09ADFE70A803377D598BA29D2EB84E2610EE372A7877297A314810C82
32,960,849 UART: Caliptra RT
32,961,584 UART: [state] CFI Enabled
33,079,864 UART: [rt] RT listening for mailbox commands...
37,107,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,263,052 UART: [rt]cmd =0x41544d4e, len=14344
42,563,463 >>> mbox cmd response data (8 bytes)
42,564,051 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,594,696 UART: [rt]cmd =0x41545348, len=116
42,597,068 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,528 UART:
192,898 UART: Running Caliptra ROM ...
193,991 UART:
194,133 UART: [state] CFI Enabled
262,962 UART: [state] LifecycleState = Unprovisioned
264,870 UART: [state] DebugLocked = No
266,180 UART: [state] WD Timer not started. Device not locked for debugging
270,719 UART: [kat] SHA2-256
449,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,471 UART: [kat] ++
462,016 UART: [kat] sha1
473,933 UART: [kat] SHA2-256
477,012 UART: [kat] SHA2-384
482,307 UART: [kat] SHA2-512-ACC
485,244 UART: [kat] ECC-384
2,946,976 UART: [kat] HMAC-384Kdf
2,969,421 UART: [kat] LMS
3,498,866 UART: [kat] --
3,504,204 UART: [cold-reset] ++
3,505,487 UART: [fht] FHT @ 0x50003400
3,516,904 UART: [idev] ++
3,517,504 UART: [idev] CDI.KEYID = 6
3,518,390 UART: [idev] SUBJECT.KEYID = 7
3,519,564 UART: [idev] UDS.KEYID = 0
3,520,610 ready_for_fw is high
3,520,802 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,101 UART: [idev] Erasing UDS.KEYID = 0
6,025,600 UART: [idev] Sha1 KeyId Algorithm
6,048,621 UART: [idev] --
6,052,993 UART: [ldev] ++
6,053,566 UART: [ldev] CDI.KEYID = 6
6,054,452 UART: [ldev] SUBJECT.KEYID = 5
6,055,662 UART: [ldev] AUTHORITY.KEYID = 7
6,056,947 UART: [ldev] FE.KEYID = 1
6,099,281 UART: [ldev] Erasing FE.KEYID = 1
8,602,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,981 UART: [ldev] --
10,408,950 UART: [fwproc] Wait for Commands...
10,412,174 UART: [fwproc] Recv command 0x46574c44
10,414,206 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,268,969 >>> mbox cmd response: success
14,273,654 UART: [afmc] ++
14,274,249 UART: [afmc] CDI.KEYID = 6
14,275,126 UART: [afmc] SUBJECT.KEYID = 7
14,276,342 UART: [afmc] AUTHORITY.KEYID = 5
16,804,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,246 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,858 UART: [afmc] --
18,607,193 UART: [cold-reset] --
18,610,624 UART: [state] Locking Datavault
18,615,216 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,909 UART: [state] Locking ICCM
18,618,864 UART: [exit] Launching FMC @ 0x40000130
18,627,309 UART:
18,627,573 UART: Running Caliptra FMC ...
18,628,602 UART:
18,628,747 UART: [state] CFI Enabled
18,688,446 UART: [fht] FMC Alias Private Key: 7
20,452,383 UART: [art] Extend RT PCRs Done
20,453,603 UART: [art] Lock RT PCRs Done
20,455,527 UART: [art] Populate DV Done
20,461,143 UART: [fht] FMC Alias Private Key: 7
20,462,783 UART: [art] Derive CDI
20,463,516 UART: [art] Store in in slot 0x4
20,520,710 UART: [art] Derive Key Pair
20,521,765 UART: [art] Store priv key in slot 0x5
22,984,692 UART: [art] Derive Key Pair - Done
22,997,523 UART: [art] Signing Cert with AUTHO
22,998,815 UART: RITY.KEYID = 7
24,710,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,236 UART: [art] PUB.X = 5618FCFC82A62BA0D54FA7579FC945C845CE7DDBAC75DFACFD0357A978C902314CF8611FDBCDDC1EB3F628D46D4B28DD
24,719,574 UART: [art] PUB.Y = 8C54A27B063A9B07B283CF6F9FD3F1A6EF5ED2A6548520F6A6A55A1DD7065FE2E2F52AE6DEFAA92EADBDEAF9ED3D9449
24,726,838 UART: [art] SIG.R = 02E79437466CD018BD2A08623173104033BF4FFF8B39E3A99CA6A6C14ADA3FF460D8D13F7C81950B8350FF58EA2FB263
24,734,210 UART: [art] SIG.S = A7192A582912C37EDE9D39D6D8534FD4823D3A85341A53365DC2078A910705F9541263C88B3D38E959BBF5C98B056E65
25,712,689 UART: Caliptra RT
25,713,401 UART: [state] CFI Enabled
25,878,835 UART: [rt] RT listening for mailbox commands...
29,900,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,055,867 UART: [rt]cmd =0x41544d4e, len=14344
34,051,650 >>> mbox cmd response data (8 bytes)
34,052,281 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,082,947 UART: [rt]cmd =0x41545348, len=116
34,084,977 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
3,361,885 ready_for_fw is high
3,362,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,048,685 >>> mbox cmd response: success
18,345,482 UART:
18,345,876 UART: Running Caliptra FMC ...
18,347,064 UART:
18,347,232 UART: [state] CFI Enabled
18,412,517 UART: [fht] FMC Alias Private Key: 7
20,175,310 UART: [art] Extend RT PCRs Done
20,176,521 UART: [art] Lock RT PCRs Done
20,177,873 UART: [art] Populate DV Done
20,183,170 UART: [fht] FMC Alias Private Key: 7
20,184,755 UART: [art] Derive CDI
20,185,564 UART: [art] Store in in slot 0x4
20,244,984 UART: [art] Derive Key Pair
20,246,020 UART: [art] Store priv key in slot 0x5
22,710,257 UART: [art] Derive Key Pair - Done
22,723,151 UART: [art] Signing Cert with AUTHO
22,724,454 UART: RITY.KEYID = 7
24,435,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,960 UART: [art] PUB.X = 94BE17A82D7E6CEB337181E2CA4A95EA4EA294BABCA03D6219516C7A47E878E56B61EAABF0B11E320E269F0DC1822BEF
24,444,280 UART: [art] PUB.Y = 4D721D64389E2CF60A5F19249DF198F74A5A0C0D10A5243BEEC6E8650D3482BB39EA0FA1837D87D60AD5ECC20C6F2168
24,451,581 UART: [art] SIG.R = 6D520F2062731D89E4CB75CD9499B8065679E28BF7FA92DF32341C3CA539EF5D47FACB41EFCB8D0CDA246F8E1750A5D9
24,458,953 UART: [art] SIG.S = BE85F95CF20DF716385ED4E5B74011672AFDBD04CA03B5E2470E817C1F4EF9A671B6275ACF8F8D31CFF6D86AE4F70B68
25,437,762 UART: Caliptra RT
25,438,467 UART: [state] CFI Enabled
25,604,127 UART: [rt] RT listening for mailbox commands...
29,633,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,789,270 UART: [rt]cmd =0x41544d4e, len=14344
33,785,660 >>> mbox cmd response data (8 bytes)
33,786,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,816,989 UART: [rt]cmd =0x41545348, len=116
33,819,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,918 writing to cptra_bootfsm_go
193,046 UART:
193,451 UART: Running Caliptra ROM ...
194,660 UART:
604,255 UART: [state] CFI Enabled
619,726 UART: [state] LifecycleState = Unprovisioned
621,602 UART: [state] DebugLocked = No
623,422 UART: [state] WD Timer not started. Device not locked for debugging
626,820 UART: [kat] SHA2-256
805,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,494 UART: [kat] ++
817,941 UART: [kat] sha1
829,803 UART: [kat] SHA2-256
832,805 UART: [kat] SHA2-384
839,073 UART: [kat] SHA2-512-ACC
842,042 UART: [kat] ECC-384
3,284,672 UART: [kat] HMAC-384Kdf
3,297,120 UART: [kat] LMS
3,826,650 UART: [kat] --
3,831,855 UART: [cold-reset] ++
3,833,272 UART: [fht] FHT @ 0x50003400
3,845,017 UART: [idev] ++
3,845,599 UART: [idev] CDI.KEYID = 6
3,846,486 UART: [idev] SUBJECT.KEYID = 7
3,847,660 UART: [idev] UDS.KEYID = 0
3,848,657 ready_for_fw is high
3,848,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,170 UART: [idev] Erasing UDS.KEYID = 0
6,318,815 UART: [idev] Sha1 KeyId Algorithm
6,341,238 UART: [idev] --
6,345,235 UART: [ldev] ++
6,345,806 UART: [ldev] CDI.KEYID = 6
6,346,688 UART: [ldev] SUBJECT.KEYID = 5
6,347,899 UART: [ldev] AUTHORITY.KEYID = 7
6,349,210 UART: [ldev] FE.KEYID = 1
6,357,996 UART: [ldev] Erasing FE.KEYID = 1
8,833,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,853 UART: [ldev] --
10,622,836 UART: [fwproc] Wait for Commands...
10,624,824 UART: [fwproc] Recv command 0x46574c44
10,626,863 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,775 >>> mbox cmd response: success
14,496,524 UART: [afmc] ++
14,497,135 UART: [afmc] CDI.KEYID = 6
14,498,027 UART: [afmc] SUBJECT.KEYID = 7
14,499,193 UART: [afmc] AUTHORITY.KEYID = 5
16,999,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,719 UART: [afmc] --
18,796,805 UART: [cold-reset] --
18,799,156 UART: [state] Locking Datavault
18,803,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,624 UART: [state] Locking ICCM
18,807,569 UART: [exit] Launching FMC @ 0x40000130
18,815,978 UART:
18,816,241 UART: Running Caliptra FMC ...
18,817,348 UART:
18,817,506 UART: [state] CFI Enabled
18,825,667 UART: [fht] FMC Alias Private Key: 7
20,583,035 UART: [art] Extend RT PCRs Done
20,584,263 UART: [art] Lock RT PCRs Done
20,586,191 UART: [art] Populate DV Done
20,591,555 UART: [fht] FMC Alias Private Key: 7
20,593,157 UART: [art] Derive CDI
20,593,899 UART: [art] Store in in slot 0x4
20,636,602 UART: [art] Derive Key Pair
20,637,644 UART: [art] Store priv key in slot 0x5
23,064,072 UART: [art] Derive Key Pair - Done
23,077,175 UART: [art] Signing Cert with AUTHO
23,078,483 UART: RITY.KEYID = 7
24,783,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,460 UART: [art] PUB.X = 5CA0B5FC2CAE2AD71794656B3078DB7B3F2557B662ED49964C3313039F2765B957AB7CB9C78A7D3AA3A30CF186D63432
24,792,735 UART: [art] PUB.Y = 993CAD6C4E9E6D2DF9A875DE70B35F793BFC223D2DE078DFAFD6FB241087D77A7A25C84AE047C1551E6112DF9D82BF48
24,799,991 UART: [art] SIG.R = 34959130AAAF30023E0EC85195512FF2596B9B2919389064AA3D0EE209131E8905705028C179B6E894958E0D0F213760
24,807,318 UART: [art] SIG.S = 786B7E58169C24559CDA8BC284D519DEA60C7412B7BF51EF79F3B9A43EF7DA01401059E9110C25FE8E010C997366B448
25,786,425 UART: Caliptra RT
25,787,137 UART: [state] CFI Enabled
25,903,462 UART: [rt] RT listening for mailbox commands...
29,932,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,087,986 UART: [rt]cmd =0x41544d4e, len=14344
34,083,422 >>> mbox cmd response data (8 bytes)
34,084,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,114,892 UART: [rt]cmd =0x41545348, len=116
34,117,107 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,700,476 ready_for_fw is high
3,700,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,746 >>> mbox cmd response: success
18,526,665 UART:
18,527,081 UART: Running Caliptra FMC ...
18,528,211 UART:
18,528,367 UART: [state] CFI Enabled
18,536,372 UART: [fht] FMC Alias Private Key: 7
20,293,105 UART: [art] Extend RT PCRs Done
20,294,320 UART: [art] Lock RT PCRs Done
20,295,810 UART: [art] Populate DV Done
20,301,327 UART: [fht] FMC Alias Private Key: 7
20,302,979 UART: [art] Derive CDI
20,303,719 UART: [art] Store in in slot 0x4
20,345,883 UART: [art] Derive Key Pair
20,346,920 UART: [art] Store priv key in slot 0x5
22,773,600 UART: [art] Derive Key Pair - Done
22,786,331 UART: [art] Signing Cert with AUTHO
22,787,641 UART: RITY.KEYID = 7
24,492,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,193 UART: [art] PUB.X = 6C582395A1A25A91DFFC3C9C4331C8AF271994C363BC93F1DBC012641D78EACDB64AA0C7DC3A1833BDC8B885BF2675A0
24,501,332 UART: [art] PUB.Y = F947E1B07310BFAC9F7DF37A71EBDCFC50EB61E07ECCE6BAC2ACF1D748B35AE9155F68F1989C9100CA68A3430812DC7A
24,508,575 UART: [art] SIG.R = 8C3ACAA87DA7EF4427594C958F6069F9532A4AA39B77420ACBDBA1A74DF2754459105958326A56BD8EBA19B2DF15CA83
24,516,001 UART: [art] SIG.S = 0D46EA25B6F9B79F2F40C04D5BFAE704C3657B2D974E17C1FFA4C5FD8C9616B492913E781AA84DD556757BCFC852A0D4
25,494,612 UART: Caliptra RT
25,495,327 UART: [state] CFI Enabled
25,611,692 UART: [rt] RT listening for mailbox commands...
29,634,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,790,393 UART: [rt]cmd =0x41544d4e, len=14344
33,785,427 >>> mbox cmd response data (8 bytes)
33,786,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,816,933 UART: [rt]cmd =0x41545348, len=116
33,819,090 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,233 writing to cptra_bootfsm_go
193,470 UART:
193,849 UART: Running Caliptra ROM ...
194,965 UART:
195,111 UART: [state] CFI Enabled
262,905 UART: [state] LifecycleState = Unprovisioned
265,325 UART: [state] DebugLocked = No
267,000 UART: [state] WD Timer not started. Device not locked for debugging
272,406 UART: [kat] SHA2-256
462,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,043 UART: [kat] ++
473,525 UART: [kat] sha1
485,035 UART: [kat] SHA2-256
488,055 UART: [kat] SHA2-384
495,433 UART: [kat] SHA2-512-ACC
498,028 UART: [kat] ECC-384
2,948,743 UART: [kat] HMAC-384Kdf
2,973,933 UART: [kat] LMS
3,505,735 UART: [kat] --
3,509,444 UART: [cold-reset] ++
3,511,871 UART: [fht] FHT @ 0x50003400
3,522,856 UART: [idev] ++
3,523,541 UART: [idev] CDI.KEYID = 6
3,524,450 UART: [idev] SUBJECT.KEYID = 7
3,525,566 UART: [idev] UDS.KEYID = 0
3,526,614 ready_for_fw is high
3,526,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,166 UART: [idev] Erasing UDS.KEYID = 0
6,029,132 UART: [idev] Sha1 KeyId Algorithm
6,051,175 UART: [idev] --
6,056,797 UART: [ldev] ++
6,057,481 UART: [ldev] CDI.KEYID = 6
6,058,381 UART: [ldev] SUBJECT.KEYID = 5
6,059,592 UART: [ldev] AUTHORITY.KEYID = 7
6,060,817 UART: [ldev] FE.KEYID = 1
6,102,150 UART: [ldev] Erasing FE.KEYID = 1
8,609,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,555 UART: [ldev] --
10,411,639 UART: [fwproc] Wait for Commands...
10,414,113 UART: [fwproc] Recv command 0x46574c44
10,416,378 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,996 >>> mbox cmd response: success
14,606,929 UART: [afmc] ++
14,607,642 UART: [afmc] CDI.KEYID = 6
14,608,832 UART: [afmc] SUBJECT.KEYID = 7
14,610,326 UART: [afmc] AUTHORITY.KEYID = 5
17,153,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,518 UART: [afmc] --
18,951,354 UART: [cold-reset] --
18,956,470 UART: [state] Locking Datavault
18,962,184 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,340 UART: [state] Locking ICCM
18,966,395 UART: [exit] Launching FMC @ 0x40000130
18,975,038 UART:
18,975,280 UART: Running Caliptra FMC ...
18,976,375 UART:
18,976,532 UART: [state] CFI Enabled
19,033,695 UART: [fht] FMC Alias Private Key: 7
20,797,765 UART: [art] Extend RT PCRs Done
20,798,990 UART: [art] Lock RT PCRs Done
20,800,396 UART: [art] Populate DV Done
20,806,077 UART: [fht] FMC Alias Private Key: 7
20,807,602 UART: [art] Derive CDI
20,808,367 UART: [art] Store in in slot 0x4
20,866,592 UART: [art] Derive Key Pair
20,867,591 UART: [art] Store priv key in slot 0x5
23,330,447 UART: [art] Derive Key Pair - Done
23,343,827 UART: [art] Signing Cert with AUTHO
23,345,134 UART: RITY.KEYID = 7
25,056,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,159 UART: [art] PUB.X = C429DD084F55DF3111CD32C2EB3A3A7A091F3BFA6D4A0CAA03C951CAEAD6AFF74BF8181B9800DD51DDA34D27CDCCAC93
25,065,444 UART: [art] PUB.Y = FE479018B05931F015B546EA4CA3A9EF69F75B99C7F118E87081C7221C0D01FF422B7C297A07BF79FB9C9BA30EC790D9
25,072,691 UART: [art] SIG.R = 8028E086815EEE02D6BCB2917E0C60A59138F8BA47D582B4A04A868E6242CDB25166C3C8A065A4A2BED89753C884D262
25,080,074 UART: [art] SIG.S = 538C7399CA359F897A623A440C06992D376B05328442EE85EDFBF2D752477591CB919D7850FE46B8DDB8423842621AD5
26,059,837 UART: Caliptra RT
26,060,559 UART: [state] CFI Enabled
26,224,071 UART: [rt] RT listening for mailbox commands...
30,251,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,406,698 UART: [rt]cmd =0x41544d4e, len=14344
34,402,616 >>> mbox cmd response data (8 bytes)
34,403,206 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,433,879 UART: [rt]cmd =0x41545348, len=116
34,436,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,438,777 ready_for_fw is high
3,439,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,739,540 >>> mbox cmd response: success
19,026,535 UART:
19,026,930 UART: Running Caliptra FMC ...
19,028,123 UART:
19,028,292 UART: [state] CFI Enabled
19,096,248 UART: [fht] FMC Alias Private Key: 7
20,860,042 UART: [art] Extend RT PCRs Done
20,861,282 UART: [art] Lock RT PCRs Done
20,863,098 UART: [art] Populate DV Done
20,868,409 UART: [fht] FMC Alias Private Key: 7
20,869,945 UART: [art] Derive CDI
20,870,706 UART: [art] Store in in slot 0x4
20,928,502 UART: [art] Derive Key Pair
20,929,545 UART: [art] Store priv key in slot 0x5
23,391,710 UART: [art] Derive Key Pair - Done
23,404,765 UART: [art] Signing Cert with AUTHO
23,406,073 UART: RITY.KEYID = 7
25,118,616 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,137 UART: [art] PUB.X = BD670012D25888AC852E1E85680A59BEBBC8A8A8DDA45F11400C83BC6F2A7B6CB0DC9A8C34AAB191E6459FAF3C9DDBA0
25,127,383 UART: [art] PUB.Y = C62C364A3904404FD0208A3167DD11150B5DAC5E197CB49BAB3FD073693F660C7F59ED3424C4EB914499AA33A9A94E4C
25,134,615 UART: [art] SIG.R = 5E6B1EEB2C29915664669C4F634419DF9A2545419C30BD617EA04507DAA6EAFD43672E9E1A607F7C0BA9F427B797A9CE
25,141,990 UART: [art] SIG.S = EB6BEECD3E1622661A84B5C6B540B44B64E8D62A44B56BAD49E6D03386B48C65AB8A9B16F3D7894F1F90999D2352B904
26,120,730 UART: Caliptra RT
26,121,422 UART: [state] CFI Enabled
26,285,608 UART: [rt] RT listening for mailbox commands...
30,306,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,462,487 UART: [rt]cmd =0x41544d4e, len=14344
34,458,044 >>> mbox cmd response data (8 bytes)
34,458,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,489,312 UART: [rt]cmd =0x41545348, len=116
34,491,687 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,847 writing to cptra_bootfsm_go
192,982 UART:
193,355 UART: Running Caliptra ROM ...
194,559 UART:
604,182 UART: [state] CFI Enabled
619,982 UART: [state] LifecycleState = Unprovisioned
622,365 UART: [state] DebugLocked = No
623,899 UART: [state] WD Timer not started. Device not locked for debugging
629,076 UART: [kat] SHA2-256
818,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,790 UART: [kat] ++
830,268 UART: [kat] sha1
841,231 UART: [kat] SHA2-256
844,214 UART: [kat] SHA2-384
850,711 UART: [kat] SHA2-512-ACC
853,298 UART: [kat] ECC-384
3,296,103 UART: [kat] HMAC-384Kdf
3,308,561 UART: [kat] LMS
3,840,373 UART: [kat] --
3,846,246 UART: [cold-reset] ++
3,848,402 UART: [fht] FHT @ 0x50003400
3,858,956 UART: [idev] ++
3,859,674 UART: [idev] CDI.KEYID = 6
3,860,585 UART: [idev] SUBJECT.KEYID = 7
3,861,834 UART: [idev] UDS.KEYID = 0
3,862,762 ready_for_fw is high
3,862,958 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,680 UART: [idev] Erasing UDS.KEYID = 0
6,338,755 UART: [idev] Sha1 KeyId Algorithm
6,361,869 UART: [idev] --
6,366,924 UART: [ldev] ++
6,367,615 UART: [ldev] CDI.KEYID = 6
6,368,546 UART: [ldev] SUBJECT.KEYID = 5
6,369,709 UART: [ldev] AUTHORITY.KEYID = 7
6,370,942 UART: [ldev] FE.KEYID = 1
6,381,889 UART: [ldev] Erasing FE.KEYID = 1
8,861,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,450 UART: [ldev] --
10,651,199 UART: [fwproc] Wait for Commands...
10,653,569 UART: [fwproc] Recv command 0x46574c44
10,655,882 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,835,920 >>> mbox cmd response: success
14,839,677 UART: [afmc] ++
14,840,391 UART: [afmc] CDI.KEYID = 6
14,841,563 UART: [afmc] SUBJECT.KEYID = 7
14,843,059 UART: [afmc] AUTHORITY.KEYID = 5
17,346,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,213 UART: [afmc] --
19,147,029 UART: [cold-reset] --
19,150,641 UART: [state] Locking Datavault
19,155,856 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,048 UART: [state] Locking ICCM
19,159,374 UART: [exit] Launching FMC @ 0x40000130
19,168,013 UART:
19,168,263 UART: Running Caliptra FMC ...
19,169,367 UART:
19,169,530 UART: [state] CFI Enabled
19,177,470 UART: [fht] FMC Alias Private Key: 7
20,934,154 UART: [art] Extend RT PCRs Done
20,935,373 UART: [art] Lock RT PCRs Done
20,937,273 UART: [art] Populate DV Done
20,942,253 UART: [fht] FMC Alias Private Key: 7
20,943,900 UART: [art] Derive CDI
20,944,722 UART: [art] Store in in slot 0x4
20,987,386 UART: [art] Derive Key Pair
20,988,387 UART: [art] Store priv key in slot 0x5
23,415,008 UART: [art] Derive Key Pair - Done
23,427,852 UART: [art] Signing Cert with AUTHO
23,429,189 UART: RITY.KEYID = 7
25,134,222 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,741 UART: [art] PUB.X = 6C69C5C0E67A28316D9A96A07335808662BB75F85D9B94D539ECE1C1EFF1662375F8714646441E9EAA93B675748076EF
25,142,966 UART: [art] PUB.Y = D784E57FB9545986776A0C85B40B2D088C54E05196D0FCC21A831C4ECFA697657BC308CFB871E6D5F58FDF6D5D2F5C13
25,150,227 UART: [art] SIG.R = 58B8F5031D8A3CE5CED597B7AF28ECBEAF0E5F75F9782051BE04F420A30D39792DCD200C58D3969DE4728BF49F9899A1
25,157,682 UART: [art] SIG.S = 556A3F67D69572F7543E305E8E3A52F7B165D39E584748B7DBAEFFA648FC93677122D481E3284858F8720C9F179ED9D3
26,136,809 UART: Caliptra RT
26,137,498 UART: [state] CFI Enabled
26,255,254 UART: [rt] RT listening for mailbox commands...
30,278,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,434,181 UART: [rt]cmd =0x41544d4e, len=14344
34,429,972 >>> mbox cmd response data (8 bytes)
34,430,560 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,461,339 UART: [rt]cmd =0x41545348, len=116
34,463,630 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,750,227 ready_for_fw is high
3,750,626 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,943,157 >>> mbox cmd response: success
19,194,504 UART:
19,194,928 UART: Running Caliptra FMC ...
19,196,068 UART:
19,196,229 UART: [state] CFI Enabled
19,203,875 UART: [fht] FMC Alias Private Key: 7
20,960,557 UART: [art] Extend RT PCRs Done
20,961,772 UART: [art] Lock RT PCRs Done
20,963,397 UART: [art] Populate DV Done
20,968,565 UART: [fht] FMC Alias Private Key: 7
20,970,167 UART: [art] Derive CDI
20,970,989 UART: [art] Store in in slot 0x4
21,013,761 UART: [art] Derive Key Pair
21,014,802 UART: [art] Store priv key in slot 0x5
23,442,208 UART: [art] Derive Key Pair - Done
23,454,992 UART: [art] Signing Cert with AUTHO
23,456,311 UART: RITY.KEYID = 7
25,161,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,192 UART: [art] PUB.X = CE7A9CDBC8FE17E73A3D8EA081CAC574142661777FF9DDDE84253FA003BF0F3809B95809D3B1450797956D0975EBBF81
25,170,441 UART: [art] PUB.Y = 0C77837BBD051FB5D5FDBDF3E0D6C535F1F367413D476A446F0502E9091FD68BA2A9D0CA590B3A654B71052A1305FB24
25,177,673 UART: [art] SIG.R = 9EA1F11FE4AE481B37ECDE94923D098D1930B65097167DE93C672D8A52480949CBFA0CED944CB607A182DFE7A1263DB4
25,185,068 UART: [art] SIG.S = 1B7CC526BC041D6F1F8D0EC52DBE550A05675BF5F9628514E19096E721A4DA8E4D7E6F78D320796AD0BAC55A60CB0DA4
26,164,371 UART: Caliptra RT
26,165,062 UART: [state] CFI Enabled
26,281,066 UART: [rt] RT listening for mailbox commands...
30,309,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,464,877 UART: [rt]cmd =0x41544d4e, len=14344
34,460,172 >>> mbox cmd response data (8 bytes)
34,460,744 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,491,419 UART: [rt]cmd =0x41545348, len=116
34,493,579 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,951 UART: [kat] SHA2-256
881,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,997 UART: [kat] ++
886,149 UART: [kat] sha1
890,295 UART: [kat] SHA2-256
892,233 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,150 UART: [idev] ++
1,479,318 UART: [idev] CDI.KEYID = 6
1,479,678 UART: [idev] SUBJECT.KEYID = 7
1,480,102 UART: [idev] UDS.KEYID = 0
1,480,447 ready_for_fw is high
1,480,447 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,684 UART: [idev] Erasing UDS.KEYID = 0
1,503,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,708 UART: [idev] --
1,513,683 UART: [ldev] ++
1,513,851 UART: [ldev] CDI.KEYID = 6
1,514,214 UART: [ldev] SUBJECT.KEYID = 5
1,514,640 UART: [ldev] AUTHORITY.KEYID = 7
1,515,103 UART: [ldev] FE.KEYID = 1
1,520,515 UART: [ldev] Erasing FE.KEYID = 1
1,546,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,234 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,342 UART: [fwproc] Received command 0x46574c44
1,587,133 UART: [fwproc] Received Image of size 114084 bytes
2,882,809 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,275 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,627 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,102 >>> mbox cmd response: success
3,075,280 UART: [afmc] ++
3,075,448 UART: [afmc] CDI.KEYID = 6
3,075,810 UART: [afmc] SUBJECT.KEYID = 7
3,076,235 UART: [afmc] AUTHORITY.KEYID = 5
3,111,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,237 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,927 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,954 UART: [afmc] --
3,154,836 UART: [cold-reset] --
3,155,938 UART: [state] Locking Datavault
3,156,913 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,517 UART: [state] Locking ICCM
3,157,937 UART: [exit] Launching FMC @ 0x40000130
3,163,266 UART:
3,163,282 UART: Running Caliptra FMC ...
3,163,690 UART:
3,163,744 UART: [state] CFI Enabled
3,174,161 UART: [fht] FMC Alias Private Key: 7
3,281,664 UART: [art] Extend RT PCRs Done
3,282,092 UART: [art] Lock RT PCRs Done
3,283,330 UART: [art] Populate DV Done
3,291,433 UART: [fht] FMC Alias Private Key: 7
3,292,489 UART: [art] Derive CDI
3,292,769 UART: [art] Store in in slot 0x4
3,378,824 UART: [art] Derive Key Pair
3,379,184 UART: [art] Store priv key in slot 0x5
3,392,634 UART: [art] Derive Key Pair - Done
3,407,937 UART: [art] Signing Cert with AUTHO
3,408,417 UART: RITY.KEYID = 7
3,423,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,246 UART: [art] PUB.X = D5FA494A4EF4D4653257D847618857E571525C71BB294C7C856CBCAFE1427334A8C380BD4762B0C1AFB931F7E7D40AA8
3,431,019 UART: [art] PUB.Y = BCD2DB6D8A2B17A6722B86BD110F609A7C50DF6CFC2D08F2D3509464E4CCBC00C68046BCA87C9A253337364B665EF4EB
3,437,957 UART: [art] SIG.R = E08586AC716D2ACE37B21926F9252F197A068332B8B9FA2573BC6503292C675B7D8E06F8E430A200D8A1D33D329C0D9F
3,444,693 UART: [art] SIG.S = EA5223FC9A54472BACB13895251284EBC8193E99B0F7C4C0CEC188832949BC017D09D20963C1D1FCE64D1CD1CD9801FF
3,468,338 UART: Caliptra RT
3,468,591 UART: [state] CFI Enabled
3,576,255 UART: [rt] RT listening for mailbox commands...
3,576,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,755 UART: [rt]cmd =0x41544d4e, len=14344
4,009,186 >>> mbox cmd response data (8 bytes)
4,009,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,212 UART: [rt]cmd =0x41545348, len=116
4,040,925 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 ready_for_fw is high
1,362,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,742 >>> mbox cmd response: success
2,986,450 UART:
2,986,466 UART: Running Caliptra FMC ...
2,986,874 UART:
2,986,928 UART: [state] CFI Enabled
2,997,487 UART: [fht] FMC Alias Private Key: 7
3,105,520 UART: [art] Extend RT PCRs Done
3,105,948 UART: [art] Lock RT PCRs Done
3,107,296 UART: [art] Populate DV Done
3,115,437 UART: [fht] FMC Alias Private Key: 7
3,116,453 UART: [art] Derive CDI
3,116,733 UART: [art] Store in in slot 0x4
3,202,744 UART: [art] Derive Key Pair
3,203,104 UART: [art] Store priv key in slot 0x5
3,217,110 UART: [art] Derive Key Pair - Done
3,231,884 UART: [art] Signing Cert with AUTHO
3,232,364 UART: RITY.KEYID = 7
3,247,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,871 UART: [art] PUB.X = 7A8CE10F3BD354A5CB6990D1C253DB15458689F786B36829C905307170944C24D5ADCDBC9A317A1522733A8E8124A78A
3,254,633 UART: [art] PUB.Y = B89710043EFCB998F7C720DAE0C703781C221CD230CD9E6123C508B3AA2DCAA7EA18831162908936E4E87E3EE42AD9F4
3,261,582 UART: [art] SIG.R = A05302F82F06B6A345998510BD542D6CEA645D4CC6119FCC3A9136B407C5961BACEA20FDF165EA100F581189B7ED508F
3,268,348 UART: [art] SIG.S = 93753BE398D1D37CB616345E2294257CEC9B8D6F9BF123ED872A1BADEE237B840D5515AB022BAE689A594B7D5172C7B8
3,291,999 UART: Caliptra RT
3,292,252 UART: [state] CFI Enabled
3,400,628 UART: [rt] RT listening for mailbox commands...
3,401,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,184 UART: [rt]cmd =0x41544d4e, len=14344
3,833,673 >>> mbox cmd response data (8 bytes)
3,833,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,075 UART: [rt]cmd =0x41545348, len=116
3,865,934 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,896 UART: [kat] SHA2-256
881,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,942 UART: [kat] ++
886,094 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
894,813 UART: [kat] SHA2-512-ACC
896,714 UART: [kat] ECC-384
902,373 UART: [kat] HMAC-384Kdf
907,129 UART: [kat] LMS
1,475,325 UART: [kat] --
1,476,408 UART: [cold-reset] ++
1,476,844 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,481,080 ready_for_fw is high
1,481,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,959 UART: [idev] Erasing UDS.KEYID = 0
1,506,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,065 UART: [idev] --
1,516,278 UART: [ldev] ++
1,516,446 UART: [ldev] CDI.KEYID = 6
1,516,809 UART: [ldev] SUBJECT.KEYID = 5
1,517,235 UART: [ldev] AUTHORITY.KEYID = 7
1,517,698 UART: [ldev] FE.KEYID = 1
1,522,770 UART: [ldev] Erasing FE.KEYID = 1
1,547,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,213 UART: [ldev] --
1,587,718 UART: [fwproc] Waiting for Commands...
1,588,479 UART: [fwproc] Received command 0x46574c44
1,589,270 UART: [fwproc] Received Image of size 114084 bytes
2,883,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,774 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,593 >>> mbox cmd response: success
3,076,795 UART: [afmc] ++
3,076,963 UART: [afmc] CDI.KEYID = 6
3,077,325 UART: [afmc] SUBJECT.KEYID = 7
3,077,750 UART: [afmc] AUTHORITY.KEYID = 5
3,113,105 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,682 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,372 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,093 UART: [afmc] --
3,156,059 UART: [cold-reset] --
3,157,029 UART: [state] Locking Datavault
3,158,300 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,904 UART: [state] Locking ICCM
3,159,350 UART: [exit] Launching FMC @ 0x40000130
3,164,679 UART:
3,164,695 UART: Running Caliptra FMC ...
3,165,103 UART:
3,165,246 UART: [state] CFI Enabled
3,175,895 UART: [fht] FMC Alias Private Key: 7
3,283,422 UART: [art] Extend RT PCRs Done
3,283,850 UART: [art] Lock RT PCRs Done
3,285,382 UART: [art] Populate DV Done
3,293,301 UART: [fht] FMC Alias Private Key: 7
3,294,285 UART: [art] Derive CDI
3,294,565 UART: [art] Store in in slot 0x4
3,380,006 UART: [art] Derive Key Pair
3,380,366 UART: [art] Store priv key in slot 0x5
3,394,172 UART: [art] Derive Key Pair - Done
3,408,726 UART: [art] Signing Cert with AUTHO
3,409,206 UART: RITY.KEYID = 7
3,424,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,439 UART: [art] PUB.X = 1149AD3EF7DF7376EF243547336861B513B7166C878F9FB0BBFEF102EFC16F3F42995C8C62FCE4CF6DEEB7705943D43E
3,432,218 UART: [art] PUB.Y = 41812EF2FE9AB665BA9478AF88DA2D774CD51F234E324CC2D529AB5AC9B93AE159F6E0F76A083E341D6C672854C39A97
3,439,175 UART: [art] SIG.R = 2F500F72AE566D85ABE07142DCF3C3332ACFC531C0F971003C30BC775F0559CC6E6FC1F2D22C33DE4E2032DDED7E0AF6
3,445,932 UART: [art] SIG.S = FDFEC461C12007B88D35FD58F2F485350DA6F4BED58AFFA1B0980AC66EAD3899559C46F709CE8FFEEB0C20074648B1A1
3,469,817 UART: Caliptra RT
3,470,162 UART: [state] CFI Enabled
3,579,113 UART: [rt] RT listening for mailbox commands...
3,579,783 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,819 UART: [rt]cmd =0x41544d4e, len=14344
4,013,018 >>> mbox cmd response data (8 bytes)
4,013,019 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,882 UART: [rt]cmd =0x41545348, len=116
4,044,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,915 >>> mbox cmd response: success
2,986,169 UART:
2,986,185 UART: Running Caliptra FMC ...
2,986,593 UART:
2,986,736 UART: [state] CFI Enabled
2,996,965 UART: [fht] FMC Alias Private Key: 7
3,104,614 UART: [art] Extend RT PCRs Done
3,105,042 UART: [art] Lock RT PCRs Done
3,106,506 UART: [art] Populate DV Done
3,114,381 UART: [fht] FMC Alias Private Key: 7
3,115,523 UART: [art] Derive CDI
3,115,803 UART: [art] Store in in slot 0x4
3,201,680 UART: [art] Derive Key Pair
3,202,040 UART: [art] Store priv key in slot 0x5
3,215,334 UART: [art] Derive Key Pair - Done
3,230,174 UART: [art] Signing Cert with AUTHO
3,230,654 UART: RITY.KEYID = 7
3,245,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,693 UART: [art] PUB.X = C7CD8A715A53A2E9ECEA40D43B9D158EEF8C7E9DF6FF5E26BBBB20A645EC55B9A5A498A1DC257885A3AE5868D06EA1D2
3,253,489 UART: [art] PUB.Y = 203A9C2D053E78FDEB3A44851DFFAC655CE3EC3C280415F2B7A76BC450BD14063A7C4B80AC85C579035FCFCA65E5E36D
3,260,445 UART: [art] SIG.R = B8095A5849B0E5BE79E809C49DEFBAE663D3BF61994D5167D286BE13208A4E326EA4DF8F385C60825BCA288A4C4FE87F
3,267,221 UART: [art] SIG.S = 4F409507B890D4792D36364D5DFF11158B170C21D56A6FE3ACF87F36FD5A4A747E3756B022C34AF1C8C196308A5CC2B3
3,291,248 UART: Caliptra RT
3,291,593 UART: [state] CFI Enabled
3,399,476 UART: [rt] RT listening for mailbox commands...
3,400,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,208 UART: [rt]cmd =0x41544d4e, len=14344
3,833,101 >>> mbox cmd response data (8 bytes)
3,833,102 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,319 UART: [rt]cmd =0x41545348, len=116
3,865,196 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
893,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,411 UART: [kat] ++
897,563 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,720 UART: [kat] SHA2-512-ACC
908,621 UART: [kat] ECC-384
918,248 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,179 UART: [cold-reset] ++
1,172,691 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 ready_for_fw is high
1,176,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,627 UART: [idev] Sha1 KeyId Algorithm
1,210,205 UART: [idev] --
1,211,243 UART: [ldev] ++
1,211,411 UART: [ldev] CDI.KEYID = 6
1,211,774 UART: [ldev] SUBJECT.KEYID = 5
1,212,200 UART: [ldev] AUTHORITY.KEYID = 7
1,212,663 UART: [ldev] FE.KEYID = 1
1,217,715 UART: [ldev] Erasing FE.KEYID = 1
1,243,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,280 UART: [fwproc] Wait for Commands...
1,283,966 UART: [fwproc] Recv command 0x46574c44
1,284,694 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,287 >>> mbox cmd response: success
2,773,411 UART: [afmc] ++
2,773,579 UART: [afmc] CDI.KEYID = 6
2,773,941 UART: [afmc] SUBJECT.KEYID = 7
2,774,366 UART: [afmc] AUTHORITY.KEYID = 5
2,810,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,799 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,518 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,396 UART: [afmc] --
2,853,462 UART: [cold-reset] --
2,854,320 UART: [state] Locking Datavault
2,855,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,097 UART: [state] Locking ICCM
2,856,653 UART: [exit] Launching FMC @ 0x40000130
2,861,982 UART:
2,861,998 UART: Running Caliptra FMC ...
2,862,406 UART:
2,862,460 UART: [state] CFI Enabled
2,872,927 UART: [fht] FMC Alias Private Key: 7
2,981,194 UART: [art] Extend RT PCRs Done
2,981,622 UART: [art] Lock RT PCRs Done
2,983,380 UART: [art] Populate DV Done
2,991,651 UART: [fht] FMC Alias Private Key: 7
2,992,579 UART: [art] Derive CDI
2,992,859 UART: [art] Store in in slot 0x4
3,078,022 UART: [art] Derive Key Pair
3,078,382 UART: [art] Store priv key in slot 0x5
3,091,860 UART: [art] Derive Key Pair - Done
3,106,788 UART: [art] Signing Cert with AUTHO
3,107,268 UART: RITY.KEYID = 7
3,122,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,967 UART: [art] PUB.X = A7ACACBDEFB4A89945140E8790D20D1A33348BC184E48C4EAD1604D71EC477C6F4B5721E2EC4283BA3B2C338AF96DB80
3,129,744 UART: [art] PUB.Y = 99B133EEAB46762A05AC46C2E036C31DF925FA60D7C3386C4E6CC45FFD03D5C7E7982018675AE51163C8AD3623292AC0
3,136,694 UART: [art] SIG.R = FABC7E692E37779BB21C687239691CAEC39EDB937EA6F5E16BDD4741A9FF681B655BD58A7EF2B88F11DC8698135009EF
3,143,475 UART: [art] SIG.S = 1A54797E3B47DF9014DB091D1C7C07125B5277B1E929CAB4D08713707DD8235A411B04A1B8814382B1302A615A08A425
3,166,790 UART: Caliptra RT
3,167,043 UART: [state] CFI Enabled
3,274,476 UART: [rt] RT listening for mailbox commands...
3,275,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,982 UART: [rt]cmd =0x41544d4e, len=14344
3,707,835 >>> mbox cmd response data (8 bytes)
3,707,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,731 UART: [rt]cmd =0x41545348, len=116
3,739,286 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,377 ready_for_fw is high
1,060,377 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,406 >>> mbox cmd response: success
2,687,182 UART:
2,687,198 UART: Running Caliptra FMC ...
2,687,606 UART:
2,687,660 UART: [state] CFI Enabled
2,698,017 UART: [fht] FMC Alias Private Key: 7
2,806,066 UART: [art] Extend RT PCRs Done
2,806,494 UART: [art] Lock RT PCRs Done
2,808,140 UART: [art] Populate DV Done
2,816,631 UART: [fht] FMC Alias Private Key: 7
2,817,621 UART: [art] Derive CDI
2,817,901 UART: [art] Store in in slot 0x4
2,903,414 UART: [art] Derive Key Pair
2,903,774 UART: [art] Store priv key in slot 0x5
2,917,106 UART: [art] Derive Key Pair - Done
2,931,816 UART: [art] Signing Cert with AUTHO
2,932,296 UART: RITY.KEYID = 7
2,947,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,421 UART: [art] PUB.X = 055CBCE5CF342837430998B2646FC77DDB9936CA27531C97B79C525EA8D1740BD65D99318825327BA4F98FC9B274ABF0
2,955,184 UART: [art] PUB.Y = E746A28CEB6EAEAF4FE4F30E47E62A3E2463FF6DDEF4814CE3973B5DC08FD2B543B148C4D5EEE65893A00E0D320EF5CC
2,962,148 UART: [art] SIG.R = 1667389CA0682B5F821254486D47BEEB1A5A0C21415C3BE5D603ACB6E1F8397823F8ED0B13221AF27C8E257AF3B99FC5
2,968,915 UART: [art] SIG.S = 446E867BF41022716D1D530CF7C6242E73282CAF674E444148DB5C91B013A88B1DC79F2012160C0FA9B4F50D64259E02
2,992,821 UART: Caliptra RT
2,993,074 UART: [state] CFI Enabled
3,101,323 UART: [rt] RT listening for mailbox commands...
3,101,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,857 UART: [rt]cmd =0x41544d4e, len=14344
3,534,634 >>> mbox cmd response data (8 bytes)
3,534,635 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,806 UART: [rt]cmd =0x41545348, len=116
3,566,641 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,602 UART: [kat] SHA2-256
904,542 UART: [kat] SHA2-384
907,211 UART: [kat] SHA2-512-ACC
909,112 UART: [kat] ECC-384
919,125 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,894 UART: [cold-reset] ++
1,173,390 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,635 UART: [idev] Erasing UDS.KEYID = 0
1,201,920 UART: [idev] Sha1 KeyId Algorithm
1,210,428 UART: [idev] --
1,211,308 UART: [ldev] ++
1,211,476 UART: [ldev] CDI.KEYID = 6
1,211,839 UART: [ldev] SUBJECT.KEYID = 5
1,212,265 UART: [ldev] AUTHORITY.KEYID = 7
1,212,728 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,712 UART: [ldev] --
1,284,059 UART: [fwproc] Wait for Commands...
1,284,767 UART: [fwproc] Recv command 0x46574c44
1,285,495 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,095 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,432 >>> mbox cmd response: success
2,774,686 UART: [afmc] ++
2,774,854 UART: [afmc] CDI.KEYID = 6
2,775,216 UART: [afmc] SUBJECT.KEYID = 7
2,775,641 UART: [afmc] AUTHORITY.KEYID = 5
2,811,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,137 UART: [afmc] --
2,855,209 UART: [cold-reset] --
2,856,083 UART: [state] Locking Datavault
2,857,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,822 UART: [state] Locking ICCM
2,858,302 UART: [exit] Launching FMC @ 0x40000130
2,863,631 UART:
2,863,647 UART: Running Caliptra FMC ...
2,864,055 UART:
2,864,198 UART: [state] CFI Enabled
2,874,823 UART: [fht] FMC Alias Private Key: 7
2,982,832 UART: [art] Extend RT PCRs Done
2,983,260 UART: [art] Lock RT PCRs Done
2,984,668 UART: [art] Populate DV Done
2,992,881 UART: [fht] FMC Alias Private Key: 7
2,993,991 UART: [art] Derive CDI
2,994,271 UART: [art] Store in in slot 0x4
3,079,822 UART: [art] Derive Key Pair
3,080,182 UART: [art] Store priv key in slot 0x5
3,093,618 UART: [art] Derive Key Pair - Done
3,108,485 UART: [art] Signing Cert with AUTHO
3,108,965 UART: RITY.KEYID = 7
3,124,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,472 UART: [art] PUB.X = 2F9810B59E482C6E9D88071C24C55C01D2157A11ED5442ADE9C517E25C49F0F34C1CFF5942C07E158BB0BCAD0114C171
3,132,239 UART: [art] PUB.Y = 666F115E9B3281BC32FEE09502F9B12D418FDFC5BD5C0B822CABEDBA046F73919565D1A98440583B5C196130B0DAC02A
3,139,190 UART: [art] SIG.R = 5CAC172522BEEF6C9B4590023C88DAD2846A0A06FE30F05EDF153C17EFA65D8FDBCD1A271BCABE970422764F65987A0F
3,145,963 UART: [art] SIG.S = 40E002615E38F0980E54018BA6C7E82B60C7B0B9929E90773606CEBDFA13361D3BD7028C38B2A9310CD756152FCED75B
3,170,178 UART: Caliptra RT
3,170,523 UART: [state] CFI Enabled
3,278,186 UART: [rt] RT listening for mailbox commands...
3,278,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,338 UART: [rt]cmd =0x41544d4e, len=14344
3,712,159 >>> mbox cmd response data (8 bytes)
3,712,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,345 UART: [rt]cmd =0x41545348, len=116
3,743,962 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 ready_for_fw is high
1,060,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,565 >>> mbox cmd response: success
2,687,059 UART:
2,687,075 UART: Running Caliptra FMC ...
2,687,483 UART:
2,687,626 UART: [state] CFI Enabled
2,698,009 UART: [fht] FMC Alias Private Key: 7
2,806,530 UART: [art] Extend RT PCRs Done
2,806,958 UART: [art] Lock RT PCRs Done
2,808,516 UART: [art] Populate DV Done
2,816,847 UART: [fht] FMC Alias Private Key: 7
2,818,025 UART: [art] Derive CDI
2,818,305 UART: [art] Store in in slot 0x4
2,903,882 UART: [art] Derive Key Pair
2,904,242 UART: [art] Store priv key in slot 0x5
2,917,392 UART: [art] Derive Key Pair - Done
2,931,927 UART: [art] Signing Cert with AUTHO
2,932,407 UART: RITY.KEYID = 7
2,947,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,396 UART: [art] PUB.X = 68E762F0BB1AAB1441845DA1E619261B61F7F15C6A778BD53179C016DE7DA11D6DDD07E74D635DB2C973B98AED70E3E6
2,955,175 UART: [art] PUB.Y = DC93A38228354196860D90CF695F8097EDEBABC46E385152BDBD15CF9EFF5CE62570F98A4B0407B90F8F257912590CBE
2,962,118 UART: [art] SIG.R = 4DCE88D0CB932EF4DD8C219E9F1F7851DD1595E21A0072CACD9011D48477241C4469C741E347203192C9F82F99BCFCE7
2,968,872 UART: [art] SIG.S = BF0BBD22778737B53BB03B0E96CCD8E9F375015B1E8AC7D1B0EB820B0F693E0A5F29C85C5272D430B341D05E03D69A2E
2,992,428 UART: Caliptra RT
2,992,773 UART: [state] CFI Enabled
3,100,980 UART: [rt] RT listening for mailbox commands...
3,101,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,374 UART: [rt]cmd =0x41544d4e, len=14344
3,534,989 >>> mbox cmd response data (8 bytes)
3,534,990 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,075 UART: [rt]cmd =0x41545348, len=116
3,566,550 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
891,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,174,507 ready_for_fw is high
1,174,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,213 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,937 UART: [fwproc] Recv command 0x46574c44
1,282,670 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,995 >>> mbox cmd response: success
2,770,082 UART: [afmc] ++
2,770,250 UART: [afmc] CDI.KEYID = 6
2,770,613 UART: [afmc] SUBJECT.KEYID = 7
2,771,039 UART: [afmc] AUTHORITY.KEYID = 5
2,806,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,195 UART: [afmc] --
2,849,127 UART: [cold-reset] --
2,849,885 UART: [state] Locking Datavault
2,851,098 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,702 UART: [state] Locking ICCM
2,852,184 UART: [exit] Launching FMC @ 0x40000130
2,857,513 UART:
2,857,529 UART: Running Caliptra FMC ...
2,857,937 UART:
2,857,991 UART: [state] CFI Enabled
2,868,526 UART: [fht] FMC Alias Private Key: 7
2,976,469 UART: [art] Extend RT PCRs Done
2,976,897 UART: [art] Lock RT PCRs Done
2,978,589 UART: [art] Populate DV Done
2,986,956 UART: [fht] FMC Alias Private Key: 7
2,988,056 UART: [art] Derive CDI
2,988,336 UART: [art] Store in in slot 0x4
3,074,021 UART: [art] Derive Key Pair
3,074,381 UART: [art] Store priv key in slot 0x5
3,087,109 UART: [art] Derive Key Pair - Done
3,101,590 UART: [art] Signing Cert with AUTHO
3,102,070 UART: RITY.KEYID = 7
3,117,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,899 UART: [art] PUB.X = 45B3EE71DC725176ADCFD82AE6A6C0517FDBC41DD6578A583C4B3BEADAEED072239200BB2536C17206AC39466D33E958
3,124,658 UART: [art] PUB.Y = 9C219B5EE121FD66D435525D410D83E3816DC96FF7F642CD5C3077DEAB48799304F5A518646F867FBD45893492AEB6FC
3,131,606 UART: [art] SIG.R = 8AF96506850B42E58761DE29467E82CDDC7DDF3548CEACBE6406E90F0D7D6FF92B147A09DB6261C604BB4B24DC88A2DB
3,138,371 UART: [art] SIG.S = A8C2376FA3ABBA2A1A87AA6895D2EE99082B742C35EAE8DFFFD37A9DBFF2D80391430C2DEB036A847FE13D71CF4E0481
3,161,953 UART: Caliptra RT
3,162,206 UART: [state] CFI Enabled
3,270,646 UART: [rt] RT listening for mailbox commands...
3,271,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,232 UART: [rt]cmd =0x41544d4e, len=14344
3,704,431 >>> mbox cmd response data (8 bytes)
3,704,432 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,263 UART: [rt]cmd =0x41545348, len=116
3,735,886 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 ready_for_fw is high
1,056,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,519 >>> mbox cmd response: success
2,679,633 UART:
2,679,649 UART: Running Caliptra FMC ...
2,680,057 UART:
2,680,111 UART: [state] CFI Enabled
2,690,432 UART: [fht] FMC Alias Private Key: 7
2,798,051 UART: [art] Extend RT PCRs Done
2,798,479 UART: [art] Lock RT PCRs Done
2,800,059 UART: [art] Populate DV Done
2,808,302 UART: [fht] FMC Alias Private Key: 7
2,809,448 UART: [art] Derive CDI
2,809,728 UART: [art] Store in in slot 0x4
2,895,483 UART: [art] Derive Key Pair
2,895,843 UART: [art] Store priv key in slot 0x5
2,908,591 UART: [art] Derive Key Pair - Done
2,923,442 UART: [art] Signing Cert with AUTHO
2,923,922 UART: RITY.KEYID = 7
2,939,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,813 UART: [art] PUB.X = D2613CD9E2FCDE36E34AC3FE98AC7090D78CEFBBA6521235240701DFE0C32CC3C05F515EB814B4F2F4BBB6C1BCC7FE7F
2,946,605 UART: [art] PUB.Y = AB6BA8A301A23B1BD9C723064CF90CEC2FE54A3CBC377BCDAE6682838995F2F23BE4113252A2383DFA2E5DF5BD4E0E58
2,953,563 UART: [art] SIG.R = A5E4160CFAB2E158118FBAE911836B4E83CF25FA679A6DC545683FA897B71647D2DB82ECF96B95FF76DC667328DB7D48
2,960,342 UART: [art] SIG.S = 0D48F0648CB9F1B8796FF9A963A770BD10B8316A95D4827CEA7C053FE0F425726300D4B0355C156C912F119310728802
2,984,134 UART: Caliptra RT
2,984,387 UART: [state] CFI Enabled
3,091,764 UART: [rt] RT listening for mailbox commands...
3,092,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,262 UART: [rt]cmd =0x41544d4e, len=14344
3,525,665 >>> mbox cmd response data (8 bytes)
3,525,666 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,925 UART: [rt]cmd =0x41545348, len=116
3,557,672 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,979 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,570 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,490 UART: [idev] ++
1,172,658 UART: [idev] CDI.KEYID = 6
1,173,019 UART: [idev] SUBJECT.KEYID = 7
1,173,444 UART: [idev] UDS.KEYID = 0
1,173,790 ready_for_fw is high
1,173,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,334 UART: [idev] Erasing UDS.KEYID = 0
1,197,854 UART: [idev] Sha1 KeyId Algorithm
1,206,736 UART: [idev] --
1,207,665 UART: [ldev] ++
1,207,833 UART: [ldev] CDI.KEYID = 6
1,208,197 UART: [ldev] SUBJECT.KEYID = 5
1,208,624 UART: [ldev] AUTHORITY.KEYID = 7
1,209,087 UART: [ldev] FE.KEYID = 1
1,214,269 UART: [ldev] Erasing FE.KEYID = 1
1,241,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,041 UART: [ldev] --
1,280,491 UART: [fwproc] Wait for Commands...
1,281,280 UART: [fwproc] Recv command 0x46574c44
1,282,013 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,952 >>> mbox cmd response: success
2,769,163 UART: [afmc] ++
2,769,331 UART: [afmc] CDI.KEYID = 6
2,769,694 UART: [afmc] SUBJECT.KEYID = 7
2,770,120 UART: [afmc] AUTHORITY.KEYID = 5
2,806,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,564 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,283 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,112 UART: [afmc] --
2,850,014 UART: [cold-reset] --
2,850,756 UART: [state] Locking Datavault
2,851,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,449 UART: [state] Locking ICCM
2,853,001 UART: [exit] Launching FMC @ 0x40000130
2,858,330 UART:
2,858,346 UART: Running Caliptra FMC ...
2,858,754 UART:
2,858,897 UART: [state] CFI Enabled
2,869,476 UART: [fht] FMC Alias Private Key: 7
2,976,723 UART: [art] Extend RT PCRs Done
2,977,151 UART: [art] Lock RT PCRs Done
2,978,807 UART: [art] Populate DV Done
2,986,788 UART: [fht] FMC Alias Private Key: 7
2,987,956 UART: [art] Derive CDI
2,988,236 UART: [art] Store in in slot 0x4
3,073,949 UART: [art] Derive Key Pair
3,074,309 UART: [art] Store priv key in slot 0x5
3,087,821 UART: [art] Derive Key Pair - Done
3,102,666 UART: [art] Signing Cert with AUTHO
3,103,146 UART: RITY.KEYID = 7
3,118,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,349 UART: [art] PUB.X = 726DA4714A26F9CA1ED2CA337AED51A1DE9FD99C8DC362D2D2A22B1D766DADE0F2901861225E0B7180AE818BC1FCAA5E
3,126,138 UART: [art] PUB.Y = 72F95DACDDA3EE231E8FE1809936F91E299AFDD8279CBB68F38CD635C047FF04BB71B9149C1EA5477A78612360ADDE83
3,133,099 UART: [art] SIG.R = A3EA569E0AFCB4AF79C037BCD757D9488AEE0EC86C7AE99E36D25B527A62C0CD686BB7655A3943B474BD81D8CE62C00F
3,139,880 UART: [art] SIG.S = 13BB7EBE99DBE99A32436F76BB6C3825A02A06498F959B1A974146B14FD0D404323F2D0B7420D273A06443DF00E4E95B
3,163,690 UART: Caliptra RT
3,164,035 UART: [state] CFI Enabled
3,272,920 UART: [rt] RT listening for mailbox commands...
3,273,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,822 UART: [rt]cmd =0x41544d4e, len=14344
3,706,865 >>> mbox cmd response data (8 bytes)
3,706,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,711 UART: [rt]cmd =0x41545348, len=116
3,738,416 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,213 ready_for_fw is high
1,056,213 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,888 >>> mbox cmd response: success
2,681,950 UART:
2,681,966 UART: Running Caliptra FMC ...
2,682,374 UART:
2,682,517 UART: [state] CFI Enabled
2,692,884 UART: [fht] FMC Alias Private Key: 7
2,800,339 UART: [art] Extend RT PCRs Done
2,800,767 UART: [art] Lock RT PCRs Done
2,802,183 UART: [art] Populate DV Done
2,810,632 UART: [fht] FMC Alias Private Key: 7
2,811,576 UART: [art] Derive CDI
2,811,856 UART: [art] Store in in slot 0x4
2,897,485 UART: [art] Derive Key Pair
2,897,845 UART: [art] Store priv key in slot 0x5
2,911,851 UART: [art] Derive Key Pair - Done
2,926,187 UART: [art] Signing Cert with AUTHO
2,926,667 UART: RITY.KEYID = 7
2,941,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,302 UART: [art] PUB.X = D7A0B651A8D126B4B5ACFFB455BA046086C1FD02A6464B67F969929CA75585713E36934711F5D09C75FDAA1B79A04508
2,949,065 UART: [art] PUB.Y = 53376D93F0ADB9A7C39B03A190012BD0559901264B05EFDE5356F19B488D842A9666F7A2ADAE10334E7C778F7914E3A9
2,956,003 UART: [art] SIG.R = 2C04BBF5059C7D7B4EB6505DA28103D1CB42214002A8C61B3DCC030FBF32F61C711B7976122E78AF7B264C917167B97F
2,962,759 UART: [art] SIG.S = 03C3053220C45C8F71D94CBC5935497BE7A643C2E434C5C8DCE6F6981494F00C0BD8ACC348F93EAE4225072F4880C3BD
2,986,497 UART: Caliptra RT
2,986,842 UART: [state] CFI Enabled
3,094,665 UART: [rt] RT listening for mailbox commands...
3,095,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,119 UART: [rt]cmd =0x41544d4e, len=14344
3,528,172 >>> mbox cmd response data (8 bytes)
3,528,173 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,308 UART: [rt]cmd =0x41545348, len=116
3,559,891 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,022 UART:
192,401 UART: Running Caliptra ROM ...
193,536 UART:
193,687 UART: [state] CFI Enabled
266,669 UART: [state] LifecycleState = Unprovisioned
268,677 UART: [state] DebugLocked = No
271,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,847 UART: [kat] SHA2-256
445,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,051 UART: [kat] ++
456,530 UART: [kat] sha1
466,696 UART: [kat] SHA2-256
469,343 UART: [kat] SHA2-384
475,682 UART: [kat] SHA2-512-ACC
478,050 UART: [kat] ECC-384
2,768,654 UART: [kat] HMAC-384Kdf
2,781,836 UART: [kat] LMS
3,972,090 UART: [kat] --
3,974,807 UART: [cold-reset] ++
3,976,452 UART: [fht] Storing FHT @ 0x50003400
3,987,644 UART: [idev] ++
3,988,206 UART: [idev] CDI.KEYID = 6
3,989,161 UART: [idev] SUBJECT.KEYID = 7
3,990,399 UART: [idev] UDS.KEYID = 0
3,991,341 ready_for_fw is high
3,991,525 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,609 UART: [idev] Erasing UDS.KEYID = 0
7,329,218 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,706 UART: [idev] --
7,356,002 UART: [ldev] ++
7,356,577 UART: [ldev] CDI.KEYID = 6
7,357,548 UART: [ldev] SUBJECT.KEYID = 5
7,358,777 UART: [ldev] AUTHORITY.KEYID = 7
7,360,007 UART: [ldev] FE.KEYID = 1
7,403,509 UART: [ldev] Erasing FE.KEYID = 1
10,737,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,630 UART: [ldev] --
13,121,008 UART: [fwproc] Waiting for Commands...
13,124,079 UART: [fwproc] Received command 0x46574c44
13,126,264 UART: [fwproc] Received Image of size 113760 bytes
17,169,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,332 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,626,248 >>> mbox cmd response: success
17,630,367 UART: [afmc] ++
17,630,964 UART: [afmc] CDI.KEYID = 6
17,631,982 UART: [afmc] SUBJECT.KEYID = 7
17,633,144 UART: [afmc] AUTHORITY.KEYID = 5
20,989,555 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,597 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,857 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,296 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,090 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,552 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,445 UART: [afmc] --
23,359,033 UART: [cold-reset] --
23,361,867 UART: [state] Locking Datavault
23,367,114 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,872 UART: [state] Locking ICCM
23,370,645 UART: [exit] Launching FMC @ 0x40000130
23,379,021 UART:
23,379,317 UART: Running Caliptra FMC ...
23,380,431 UART:
23,380,603 UART: [state] CFI Enabled
23,447,236 UART: [fht] FMC Alias Private Key: 7
25,785,439 UART: [art] Extend RT PCRs Done
25,786,655 UART: [art] Lock RT PCRs Done
25,788,390 UART: [art] Populate DV Done
25,794,012 UART: [fht] FMC Alias Private Key: 7
25,795,715 UART: [art] Derive CDI
25,796,525 UART: [art] Store in in slot 0x4
25,855,724 UART: [art] Derive Key Pair
25,856,716 UART: [art] Store priv key in slot 0x5
29,149,749 UART: [art] Derive Key Pair - Done
29,162,860 UART: [art] Signing Cert with AUTHO
29,164,167 UART: RITY.KEYID = 7
31,450,583 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,098 UART: [art] PUB.X = 26511BB695EBFD7E33AE3EBF59C773D0215F8987CE1D02CC9C743D4E2414DF2E09E23439218AC7B8F2D01DDDFE2265F5
31,459,386 UART: [art] PUB.Y = 70FC2E34E98BD0E724D8E7524257A28201AC41B7DB96B056A5FA26D563E27CC5B2880B375948467D28C2A33BB29B13B4
31,466,579 UART: [art] SIG.R = 3AE49DBC24E995414D59BF8F3B9369AF5ADF1DE5C014C799613BEC66BED41877475EB442C12D749A22FBCB2C697CC90A
31,473,973 UART: [art] SIG.S = 3CE7FF064C400F05D0853F7946680905625EB24345C2378C0683DB00AB1A482652B4B16D1F499E890F01F05982AB52CA
32,779,446 UART: Caliptra RT
32,780,165 UART: [state] CFI Enabled
32,939,339 UART: [rt] RT listening for mailbox commands...
36,967,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,123,304 UART: [rt]cmd =0x41544d4e, len=14344
42,423,897 >>> mbox cmd response data (8 bytes)
42,425,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,455,817 UART: [rt]cmd =0x41545348, len=116
42,474,888 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,051 UART:
192,419 UART: Running Caliptra ROM ...
193,589 UART:
193,742 UART: [state] CFI Enabled
263,638 UART: [state] LifecycleState = Unprovisioned
265,622 UART: [state] DebugLocked = No
267,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,163 UART: [kat] SHA2-256
441,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,387 UART: [kat] ++
452,877 UART: [kat] sha1
465,456 UART: [kat] SHA2-256
468,182 UART: [kat] SHA2-384
474,449 UART: [kat] SHA2-512-ACC
476,814 UART: [kat] ECC-384
2,767,835 UART: [kat] HMAC-384Kdf
2,798,886 UART: [kat] LMS
3,989,149 UART: [kat] --
3,995,369 UART: [cold-reset] ++
3,997,800 UART: [fht] Storing FHT @ 0x50003400
4,010,128 UART: [idev] ++
4,010,702 UART: [idev] CDI.KEYID = 6
4,011,694 UART: [idev] SUBJECT.KEYID = 7
4,012,941 UART: [idev] UDS.KEYID = 0
4,014,045 ready_for_fw is high
4,014,251 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,341 UART: [idev] Erasing UDS.KEYID = 0
7,342,610 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,366 UART: [idev] --
7,367,871 UART: [ldev] ++
7,368,441 UART: [ldev] CDI.KEYID = 6
7,369,378 UART: [ldev] SUBJECT.KEYID = 5
7,370,636 UART: [ldev] AUTHORITY.KEYID = 7
7,371,788 UART: [ldev] FE.KEYID = 1
7,400,443 UART: [ldev] Erasing FE.KEYID = 1
10,733,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,337 UART: [ldev] --
13,113,679 UART: [fwproc] Waiting for Commands...
13,116,366 UART: [fwproc] Received command 0x46574c44
13,118,544 UART: [fwproc] Received Image of size 113760 bytes
17,165,306 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,205 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,626,030 >>> mbox cmd response: success
17,630,290 UART: [afmc] ++
17,630,945 UART: [afmc] CDI.KEYID = 6
17,631,862 UART: [afmc] SUBJECT.KEYID = 7
17,632,971 UART: [afmc] AUTHORITY.KEYID = 5
21,002,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,068 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,355 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,728 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,566 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,015 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,369,296 UART: [afmc] --
23,372,410 UART: [cold-reset] --
23,376,439 UART: [state] Locking Datavault
23,381,687 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,592 UART: [state] Locking ICCM
23,384,916 UART: [exit] Launching FMC @ 0x40000130
23,393,277 UART:
23,393,514 UART: Running Caliptra FMC ...
23,394,613 UART:
23,394,774 UART: [state] CFI Enabled
23,463,576 UART: [fht] FMC Alias Private Key: 7
25,801,890 UART: [art] Extend RT PCRs Done
25,803,112 UART: [art] Lock RT PCRs Done
25,804,738 UART: [art] Populate DV Done
25,810,202 UART: [fht] FMC Alias Private Key: 7
25,811,791 UART: [art] Derive CDI
25,812,602 UART: [art] Store in in slot 0x4
25,871,695 UART: [art] Derive Key Pair
25,872,729 UART: [art] Store priv key in slot 0x5
29,165,621 UART: [art] Derive Key Pair - Done
29,179,215 UART: [art] Signing Cert with AUTHO
29,180,521 UART: RITY.KEYID = 7
31,466,297 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,806 UART: [art] PUB.X = A10D6862CC1D6ED7BE08A59221F0121028ADC197E435EF95F72EBE88FE06866DF93003BC1D7B3D47A94B3D1452299882
31,474,995 UART: [art] PUB.Y = F3FCDF8FF5BA548C65EF102A287F40F6A64B86A8624F448A314F35FCCF10101432F9721B742AA6C82E32DD4ADEF02C71
31,482,286 UART: [art] SIG.R = 7F202E2D2D1E86E53CD2914464E6351BFA731FCC8DE40C28FFC33B08DC39B47C90E760AED4C9974C84C4F7D7DE7D332A
31,489,698 UART: [art] SIG.S = 1339A4B70E374FDDD2ED86862D116EC4662E1A205ACDD7C871259F0799C1472FC088EE532D5C0C9A0D85ABF315C893FD
32,794,587 UART: Caliptra RT
32,795,275 UART: [state] CFI Enabled
32,955,844 UART: [rt] RT listening for mailbox commands...
32,958,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,113,554 UART: [rt]cmd =0x41544d4e, len=14344
38,414,201 >>> mbox cmd response data (8 bytes)
38,414,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,445,652 UART: [rt]cmd =0x41545348, len=116
38,448,051 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
3,790,702 ready_for_fw is high
3,791,463 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,623 >>> mbox cmd response: success
23,549,344 UART:
23,549,757 UART: Running Caliptra FMC ...
23,550,902 UART:
23,551,070 UART: [state] CFI Enabled
23,619,838 UART: [fht] FMC Alias Private Key: 7
25,956,977 UART: [art] Extend RT PCRs Done
25,958,234 UART: [art] Lock RT PCRs Done
25,959,894 UART: [art] Populate DV Done
25,965,633 UART: [fht] FMC Alias Private Key: 7
25,967,137 UART: [art] Derive CDI
25,967,872 UART: [art] Store in in slot 0x4
26,027,732 UART: [art] Derive Key Pair
26,028,775 UART: [art] Store priv key in slot 0x5
29,321,846 UART: [art] Derive Key Pair - Done
29,335,000 UART: [art] Signing Cert with AUTHO
29,336,317 UART: RITY.KEYID = 7
31,622,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,080 UART: [art] PUB.X = 20251644E00F1A3D9EB3A549840A37E60C4419F38843A0848165A73A6B2C3D50177C3BA480FB3BD67E473CB2A4F7FFAA
31,631,289 UART: [art] PUB.Y = C7B284F2044E65F123F93DCFFC1FEF470EA73A5526D273C4100509C68023AE3B66474D0ED20EC53530073959F8302666
31,638,571 UART: [art] SIG.R = 02DF3DB6581CAEAA50B4386818D5113E8140FFE42C9377FB3ED2786865C674EB7FCCC104B0AAA6D7AD56B7A846A33D1A
31,645,939 UART: [art] SIG.S = 5AD6FBFC11A31EA4E19A47F9C65FB1B27516F002D772EEC5E9018B41A3FE5EA44A4947941C1464FE5258EFB9B19CE20F
32,950,453 UART: Caliptra RT
32,951,167 UART: [state] CFI Enabled
33,112,947 UART: [rt] RT listening for mailbox commands...
37,142,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,297,539 UART: [rt]cmd =0x41544d4e, len=14344
42,598,074 >>> mbox cmd response data (8 bytes)
42,598,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,629,460 UART: [rt]cmd =0x41545348, len=116
42,649,826 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,807,227 ready_for_fw is high
3,807,676 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,859,655 >>> mbox cmd response: success
23,547,021 UART:
23,547,425 UART: Running Caliptra FMC ...
23,548,573 UART:
23,548,738 UART: [state] CFI Enabled
23,614,355 UART: [fht] FMC Alias Private Key: 7
25,952,695 UART: [art] Extend RT PCRs Done
25,953,925 UART: [art] Lock RT PCRs Done
25,955,445 UART: [art] Populate DV Done
25,960,952 UART: [fht] FMC Alias Private Key: 7
25,962,657 UART: [art] Derive CDI
25,963,419 UART: [art] Store in in slot 0x4
26,022,899 UART: [art] Derive Key Pair
26,023,936 UART: [art] Store priv key in slot 0x5
29,316,566 UART: [art] Derive Key Pair - Done
29,329,564 UART: [art] Signing Cert with AUTHO
29,330,869 UART: RITY.KEYID = 7
31,618,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,755 UART: [art] PUB.X = 9F98758A21A289C53BB5492719C129069B788316BB21562D42E2AAD30998DB0F10CE76D9AF7B6F123DFE6D467C3AF5EA
31,627,023 UART: [art] PUB.Y = 347BD7EB8887564121F5209F8F6C97825B9A865AF5D5E2D113D2536EC05B453EFE60D99878689B4F3E4A36011E233BA9
31,634,249 UART: [art] SIG.R = 9040CF7DBCA3598303FF28D1F333FB94894623E2391B7220537FFC9089EE8531C4A9CC7454737F926DEA2672013CCFD7
31,641,603 UART: [art] SIG.S = 9BF144D5AEE3836F8F199E86FEDB4EC109C2721BAC2BA843B0A87D6D4FCB7148787971E47992BD19B210A0CF36498B04
32,947,224 UART: Caliptra RT
32,947,915 UART: [state] CFI Enabled
33,109,854 UART: [rt] RT listening for mailbox commands...
33,112,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,803 UART: [rt]cmd =0x41544d4e, len=14344
38,567,896 >>> mbox cmd response data (8 bytes)
38,568,481 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,598,993 UART: [rt]cmd =0x41545348, len=116
38,601,419 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
192,935 UART:
193,302 UART: Running Caliptra ROM ...
194,491 UART:
603,984 UART: [state] CFI Enabled
616,227 UART: [state] LifecycleState = Unprovisioned
618,106 UART: [state] DebugLocked = No
620,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,752 UART: [kat] SHA2-256
795,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,019 UART: [kat] ++
806,500 UART: [kat] sha1
818,432 UART: [kat] SHA2-256
821,152 UART: [kat] SHA2-384
827,635 UART: [kat] SHA2-512-ACC
829,970 UART: [kat] ECC-384
3,115,790 UART: [kat] HMAC-384Kdf
3,127,944 UART: [kat] LMS
4,318,070 UART: [kat] --
4,323,695 UART: [cold-reset] ++
4,324,920 UART: [fht] Storing FHT @ 0x50003400
4,335,893 UART: [idev] ++
4,336,453 UART: [idev] CDI.KEYID = 6
4,337,424 UART: [idev] SUBJECT.KEYID = 7
4,338,658 UART: [idev] UDS.KEYID = 0
4,339,761 ready_for_fw is high
4,339,990 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,958 UART: [idev] Erasing UDS.KEYID = 0
7,627,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,422 UART: [idev] --
7,653,359 UART: [ldev] ++
7,653,923 UART: [ldev] CDI.KEYID = 6
7,654,881 UART: [ldev] SUBJECT.KEYID = 5
7,656,083 UART: [ldev] AUTHORITY.KEYID = 7
7,657,368 UART: [ldev] FE.KEYID = 1
7,665,744 UART: [ldev] Erasing FE.KEYID = 1
10,954,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,649 UART: [ldev] --
13,315,038 UART: [fwproc] Waiting for Commands...
13,316,984 UART: [fwproc] Received command 0x46574c44
13,319,167 UART: [fwproc] Received Image of size 113760 bytes
17,366,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,639 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,567 >>> mbox cmd response: success
17,833,345 UART: [afmc] ++
17,833,944 UART: [afmc] CDI.KEYID = 6
17,834,852 UART: [afmc] SUBJECT.KEYID = 7
17,836,119 UART: [afmc] AUTHORITY.KEYID = 5
21,154,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,996 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,251 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,680 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,469 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,922 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,206 UART: [afmc] --
23,522,496 UART: [cold-reset] --
23,526,300 UART: [state] Locking Datavault
23,532,677 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,438 UART: [state] Locking ICCM
23,536,747 UART: [exit] Launching FMC @ 0x40000130
23,545,134 UART:
23,545,366 UART: Running Caliptra FMC ...
23,546,465 UART:
23,546,617 UART: [state] CFI Enabled
23,554,718 UART: [fht] FMC Alias Private Key: 7
25,885,244 UART: [art] Extend RT PCRs Done
25,886,477 UART: [art] Lock RT PCRs Done
25,887,939 UART: [art] Populate DV Done
25,893,153 UART: [fht] FMC Alias Private Key: 7
25,894,744 UART: [art] Derive CDI
25,895,552 UART: [art] Store in in slot 0x4
25,938,411 UART: [art] Derive Key Pair
25,939,405 UART: [art] Store priv key in slot 0x5
29,181,448 UART: [art] Derive Key Pair - Done
29,194,776 UART: [art] Signing Cert with AUTHO
29,196,085 UART: RITY.KEYID = 7
31,475,329 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,841 UART: [art] PUB.X = 2E5EFEFACF81B3FB7F995B9AE315F53FD54CF70ABD0F0322440540AF0AEDD761FFEBE1D03054E2C396DB2A3EAB2E89AC
31,484,106 UART: [art] PUB.Y = ECD1E6F52CD1728B45229DB3CBF40B4608C3FF39EC150C1E799B06BF174444D63BB0820293B1E407F97672AFE70C81C6
31,491,360 UART: [art] SIG.R = 4E082F80C2FF92DCE92A32243B348693A4C0E93655320F4B759CC1BB00268A51114E14F3B8090170CB5741DB958D34CC
31,498,726 UART: [art] SIG.S = 9F5692419C28A19592A873597111B2E83EBF93B1A6F0B1037914E43134CAD1B27F2F1B01DFB2DBF953B71DA6CE32DA50
32,803,738 UART: Caliptra RT
32,804,445 UART: [state] CFI Enabled
32,921,797 UART: [rt] RT listening for mailbox commands...
36,956,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,112,275 UART: [rt]cmd =0x41544d4e, len=14344
42,412,671 >>> mbox cmd response data (8 bytes)
42,413,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,443,846 UART: [rt]cmd =0x41545348, len=116
42,463,633 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,512 UART:
192,864 UART: Running Caliptra ROM ...
194,040 UART:
603,569 UART: [state] CFI Enabled
618,457 UART: [state] LifecycleState = Unprovisioned
620,440 UART: [state] DebugLocked = No
621,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,975 UART: [kat] SHA2-256
796,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,274 UART: [kat] ++
807,723 UART: [kat] sha1
818,023 UART: [kat] SHA2-256
820,681 UART: [kat] SHA2-384
826,168 UART: [kat] SHA2-512-ACC
828,529 UART: [kat] ECC-384
3,112,610 UART: [kat] HMAC-384Kdf
3,123,562 UART: [kat] LMS
4,313,713 UART: [kat] --
4,317,383 UART: [cold-reset] ++
4,318,964 UART: [fht] Storing FHT @ 0x50003400
4,329,232 UART: [idev] ++
4,329,792 UART: [idev] CDI.KEYID = 6
4,330,818 UART: [idev] SUBJECT.KEYID = 7
4,331,985 UART: [idev] UDS.KEYID = 0
4,333,002 ready_for_fw is high
4,333,196 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,075 UART: [idev] Erasing UDS.KEYID = 0
7,618,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,741 UART: [idev] --
7,645,645 UART: [ldev] ++
7,646,209 UART: [ldev] CDI.KEYID = 6
7,647,187 UART: [ldev] SUBJECT.KEYID = 5
7,648,401 UART: [ldev] AUTHORITY.KEYID = 7
7,649,630 UART: [ldev] FE.KEYID = 1
7,661,641 UART: [ldev] Erasing FE.KEYID = 1
10,949,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,647 UART: [ldev] --
13,307,741 UART: [fwproc] Waiting for Commands...
13,310,094 UART: [fwproc] Received command 0x46574c44
13,312,287 UART: [fwproc] Received Image of size 113760 bytes
17,359,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,822,290 >>> mbox cmd response: success
17,826,660 UART: [afmc] ++
17,827,316 UART: [afmc] CDI.KEYID = 6
17,828,206 UART: [afmc] SUBJECT.KEYID = 7
17,829,221 UART: [afmc] AUTHORITY.KEYID = 5
21,140,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,153 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,451,533 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,334 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,799 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,236 UART: [afmc] --
23,507,243 UART: [cold-reset] --
23,510,084 UART: [state] Locking Datavault
23,514,904 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,598 UART: [state] Locking ICCM
23,518,418 UART: [exit] Launching FMC @ 0x40000130
23,526,815 UART:
23,527,054 UART: Running Caliptra FMC ...
23,528,157 UART:
23,528,309 UART: [state] CFI Enabled
23,536,569 UART: [fht] FMC Alias Private Key: 7
25,867,447 UART: [art] Extend RT PCRs Done
25,868,667 UART: [art] Lock RT PCRs Done
25,870,319 UART: [art] Populate DV Done
25,875,676 UART: [fht] FMC Alias Private Key: 7
25,877,264 UART: [art] Derive CDI
25,877,991 UART: [art] Store in in slot 0x4
25,920,666 UART: [art] Derive Key Pair
25,921,703 UART: [art] Store priv key in slot 0x5
29,163,851 UART: [art] Derive Key Pair - Done
29,176,857 UART: [art] Signing Cert with AUTHO
29,178,186 UART: RITY.KEYID = 7
31,457,724 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,233 UART: [art] PUB.X = 15164A7E7F8A9ED004374AE8145478A993FC432F4CB58BB6099D8E275950216EA8496E8EB70C5257A63BE0C68453A73B
31,466,454 UART: [art] PUB.Y = 9032994B773A83A56AEF5087B95851274C8D4A04D4E8F00F843E339328781FA316888AE9CB04286322B744EB57F100CA
31,473,663 UART: [art] SIG.R = 9AD819BE6CD48F82607B976337B701F87E61E7F977E1602120D1B6D9C049779FEFE3B62593126C8A2E4DBC0435F61315
31,481,023 UART: [art] SIG.S = C772128C66B4C012BEAA34FC8269C979DA65CF6360029DD26421E74E884E7499D293EC4501CF552BBB23676A4ECD6BC5
32,786,052 UART: Caliptra RT
32,786,814 UART: [state] CFI Enabled
32,904,543 UART: [rt] RT listening for mailbox commands...
32,906,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,062,218 UART: [rt]cmd =0x41544d4e, len=14344
38,363,479 >>> mbox cmd response data (8 bytes)
38,364,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,394,940 UART: [rt]cmd =0x41545348, len=116
38,397,396 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
4,126,556 ready_for_fw is high
4,127,008 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,074,648 >>> mbox cmd response: success
23,715,249 UART:
23,715,674 UART: Running Caliptra FMC ...
23,716,778 UART:
23,716,924 UART: [state] CFI Enabled
23,725,096 UART: [fht] FMC Alias Private Key: 7
26,055,912 UART: [art] Extend RT PCRs Done
26,057,147 UART: [art] Lock RT PCRs Done
26,058,530 UART: [art] Populate DV Done
26,064,219 UART: [fht] FMC Alias Private Key: 7
26,065,763 UART: [art] Derive CDI
26,066,603 UART: [art] Store in in slot 0x4
26,109,581 UART: [art] Derive Key Pair
26,110,626 UART: [art] Store priv key in slot 0x5
29,352,327 UART: [art] Derive Key Pair - Done
29,365,374 UART: [art] Signing Cert with AUTHO
29,366,675 UART: RITY.KEYID = 7
31,645,925 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,433 UART: [art] PUB.X = 119446DAAFD435AD0117E177695B68B9FE957016D2A1D689B665F85617A8FD704F72370A04CC209BFB77C6D8438C82FD
31,654,674 UART: [art] PUB.Y = 4D5C02FCDA7C23A059B3FA0E15AEBA564AA8AB9F71E307E9427361552EA3300E28854506D25339EC4C3227D45EB4D7BE
31,661,924 UART: [art] SIG.R = E5B2CE167E7CFF5EF36D6145EB5FD092AFC4A573A76AA3C480D85A05221987115696FE28AFC8DB9C02783A2631C1CCC5
31,669,314 UART: [art] SIG.S = 248A5F1C2BE1D529A47D1697B88447A98802DFC3A1711CF2747CAA813CF775C0714A51B6961D94B254AC4B55DB6405CE
32,974,348 UART: Caliptra RT
32,975,063 UART: [state] CFI Enabled
33,093,050 UART: [rt] RT listening for mailbox commands...
37,126,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,281,629 UART: [rt]cmd =0x41544d4e, len=14344
42,582,374 >>> mbox cmd response data (8 bytes)
42,582,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,613,521 UART: [rt]cmd =0x41545348, len=116
42,633,546 >>> mbox cmd response data (12 bytes)
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,131,341 ready_for_fw is high
4,131,726 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,896 >>> mbox cmd response: success
23,714,700 UART:
23,715,149 UART: Running Caliptra FMC ...
23,716,260 UART:
23,716,413 UART: [state] CFI Enabled
23,724,386 UART: [fht] FMC Alias Private Key: 7
26,055,299 UART: [art] Extend RT PCRs Done
26,056,527 UART: [art] Lock RT PCRs Done
26,058,219 UART: [art] Populate DV Done
26,063,797 UART: [fht] FMC Alias Private Key: 7
26,065,393 UART: [art] Derive CDI
26,066,207 UART: [art] Store in in slot 0x4
26,108,505 UART: [art] Derive Key Pair
26,109,700 UART: [art] Store priv key in slot 0x5
29,351,864 UART: [art] Derive Key Pair - Done
29,364,821 UART: [art] Signing Cert with AUTHO
29,366,118 UART: RITY.KEYID = 7
31,645,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,070 UART: [art] PUB.X = 0FCD715784D6BF20892F3073ABDCA3B5C24A8395A08D1C02BAFF5B6BC6CF137B2E206CC3FB820B5211E6C377D75544E9
31,654,312 UART: [art] PUB.Y = 1BF8F65F6F6D64A89658E6113A895EE98697B322087913D691FD91EA6339F201053886B3CBF7EC3C05E8581C06D43D35
31,661,565 UART: [art] SIG.R = 32F0C03EE8E989EAFD9DACFFF80A8AC023BFE548CF5326F076C384885B80668C7B9AFCE7E4BA1433AA8A9DA4E9CFEF15
31,668,981 UART: [art] SIG.S = A47B75C21B9766F0D717CBEA9E68BA89419301113715985B6ED7C5C772D50CCECB646EC76D4A060FAF1093AF4DDE72C5
32,973,422 UART: Caliptra RT
32,974,137 UART: [state] CFI Enabled
33,092,326 UART: [rt] RT listening for mailbox commands...
33,094,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,249,963 UART: [rt]cmd =0x41544d4e, len=14344
38,550,552 >>> mbox cmd response data (8 bytes)
38,551,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,582,185 UART: [rt]cmd =0x41545348, len=116
38,584,720 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
192,590 UART:
192,990 UART: Running Caliptra ROM ...
194,191 UART:
194,349 UART: [state] CFI Enabled
263,713 UART: [state] LifecycleState = Unprovisioned
265,569 UART: [state] DebugLocked = No
267,655 UART: [state] WD Timer not started. Device not locked for debugging
270,720 UART: [kat] SHA2-256
449,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,442 UART: [kat] ++
461,893 UART: [kat] sha1
472,906 UART: [kat] SHA2-256
475,911 UART: [kat] SHA2-384
483,453 UART: [kat] SHA2-512-ACC
486,458 UART: [kat] ECC-384
2,947,387 UART: [kat] HMAC-384Kdf
2,972,620 UART: [kat] LMS
3,502,037 UART: [kat] --
3,505,330 UART: [cold-reset] ++
3,507,256 UART: [fht] FHT @ 0x50003400
3,519,223 UART: [idev] ++
3,519,779 UART: [idev] CDI.KEYID = 6
3,520,769 UART: [idev] SUBJECT.KEYID = 7
3,521,939 UART: [idev] UDS.KEYID = 0
3,522,859 ready_for_fw is high
3,523,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,563 UART: [idev] Erasing UDS.KEYID = 0
6,024,150 UART: [idev] Sha1 KeyId Algorithm
6,047,327 UART: [idev] --
6,051,628 UART: [ldev] ++
6,052,205 UART: [ldev] CDI.KEYID = 6
6,053,118 UART: [ldev] SUBJECT.KEYID = 5
6,054,278 UART: [ldev] AUTHORITY.KEYID = 7
6,055,583 UART: [ldev] FE.KEYID = 1
6,101,011 UART: [ldev] Erasing FE.KEYID = 1
8,603,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,509 UART: [ldev] --
10,413,984 UART: [fwproc] Wait for Commands...
10,416,181 UART: [fwproc] Recv command 0x46574c44
10,418,265 UART: [fwproc] Recv'd Img size: 114084 bytes
13,818,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,274,771 >>> mbox cmd response: success
14,279,427 UART: [afmc] ++
14,280,048 UART: [afmc] CDI.KEYID = 6
14,280,965 UART: [afmc] SUBJECT.KEYID = 7
14,282,125 UART: [afmc] AUTHORITY.KEYID = 5
16,803,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,155 UART: [afmc] --
18,608,560 UART: [cold-reset] --
18,612,897 UART: [state] Locking Datavault
18,619,539 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,243 UART: [state] Locking ICCM
18,622,611 UART: [exit] Launching FMC @ 0x40000130
18,630,998 UART:
18,631,244 UART: Running Caliptra FMC ...
18,632,343 UART:
18,632,497 UART: [state] CFI Enabled
18,689,233 UART: [fht] FMC Alias Private Key: 7
20,453,518 UART: [art] Extend RT PCRs Done
20,454,749 UART: [art] Lock RT PCRs Done
20,456,241 UART: [art] Populate DV Done
20,461,759 UART: [fht] FMC Alias Private Key: 7
20,463,401 UART: [art] Derive CDI
20,464,214 UART: [art] Store in in slot 0x4
20,522,442 UART: [art] Derive Key Pair
20,523,475 UART: [art] Store priv key in slot 0x5
22,986,542 UART: [art] Derive Key Pair - Done
22,999,043 UART: [art] Signing Cert with AUTHO
23,000,344 UART: RITY.KEYID = 7
24,712,477 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,980 UART: [art] PUB.X = B6A7A7E11DAE108E6A005697F8A6F61090B482DD478A7F7651A449030059DE7B7ABBBBE3D59E4CECEBAB73C6CA0360A7
24,721,259 UART: [art] PUB.Y = 2B225D9F5D352919DAC023BAA9C7F3133D591F69F7DC1CB9F28EFFF531656496DE37188537AA4CE771487659AD6D1DC6
24,728,504 UART: [art] SIG.R = 15E1CAE37C55DAC265F075C47E43584914FE0BBA62EEAA754554450223B9892CB6B76DF137C1EBEEE642C28BD312AC98
24,735,914 UART: [art] SIG.S = 61D834F164FAE96A9FFD5E7CBE0EDC124F26B1D8936E7586E70925709F1AFA7E9993B8B75CBBF381FA4328D2C3A154F4
25,714,638 UART: Caliptra RT
25,715,348 UART: [state] CFI Enabled
25,880,623 UART: [rt] RT listening for mailbox commands...
29,908,292 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,063,723 UART: [rt]cmd =0x41544d4e, len=14344
34,059,505 >>> mbox cmd response data (8 bytes)
34,060,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,090,936 UART: [rt]cmd =0x41545348, len=116
34,110,973 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
192,002 UART:
192,379 UART: Running Caliptra ROM ...
193,498 UART:
193,663 UART: [state] CFI Enabled
262,458 UART: [state] LifecycleState = Unprovisioned
264,359 UART: [state] DebugLocked = No
266,674 UART: [state] WD Timer not started. Device not locked for debugging
271,213 UART: [kat] SHA2-256
450,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,895 UART: [kat] ++
462,420 UART: [kat] sha1
472,586 UART: [kat] SHA2-256
475,593 UART: [kat] SHA2-384
482,925 UART: [kat] SHA2-512-ACC
485,852 UART: [kat] ECC-384
2,946,442 UART: [kat] HMAC-384Kdf
2,969,407 UART: [kat] LMS
3,498,863 UART: [kat] --
3,503,801 UART: [cold-reset] ++
3,506,318 UART: [fht] FHT @ 0x50003400
3,517,224 UART: [idev] ++
3,517,781 UART: [idev] CDI.KEYID = 6
3,518,730 UART: [idev] SUBJECT.KEYID = 7
3,519,898 UART: [idev] UDS.KEYID = 0
3,520,868 ready_for_fw is high
3,521,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,538 UART: [idev] Erasing UDS.KEYID = 0
6,025,257 UART: [idev] Sha1 KeyId Algorithm
6,047,032 UART: [idev] --
6,051,660 UART: [ldev] ++
6,052,247 UART: [ldev] CDI.KEYID = 6
6,053,137 UART: [ldev] SUBJECT.KEYID = 5
6,054,350 UART: [ldev] AUTHORITY.KEYID = 7
6,055,583 UART: [ldev] FE.KEYID = 1
6,098,300 UART: [ldev] Erasing FE.KEYID = 1
8,601,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,446 UART: [ldev] --
10,389,265 UART: [fwproc] Wait for Commands...
10,391,413 UART: [fwproc] Recv command 0x46574c44
10,393,502 UART: [fwproc] Recv'd Img size: 114084 bytes
13,796,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,252,585 >>> mbox cmd response: success
14,257,627 UART: [afmc] ++
14,258,278 UART: [afmc] CDI.KEYID = 6
14,259,197 UART: [afmc] SUBJECT.KEYID = 7
14,260,354 UART: [afmc] AUTHORITY.KEYID = 5
16,803,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,353 UART: [afmc] --
18,606,845 UART: [cold-reset] --
18,611,768 UART: [state] Locking Datavault
18,618,529 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,234 UART: [state] Locking ICCM
18,622,831 UART: [exit] Launching FMC @ 0x40000130
18,631,229 UART:
18,631,473 UART: Running Caliptra FMC ...
18,632,570 UART:
18,632,726 UART: [state] CFI Enabled
18,686,051 UART: [fht] FMC Alias Private Key: 7
20,449,978 UART: [art] Extend RT PCRs Done
20,451,199 UART: [art] Lock RT PCRs Done
20,452,961 UART: [art] Populate DV Done
20,458,420 UART: [fht] FMC Alias Private Key: 7
20,459,952 UART: [art] Derive CDI
20,460,682 UART: [art] Store in in slot 0x4
20,518,686 UART: [art] Derive Key Pair
20,519,682 UART: [art] Store priv key in slot 0x5
22,982,272 UART: [art] Derive Key Pair - Done
22,995,317 UART: [art] Signing Cert with AUTHO
22,996,641 UART: RITY.KEYID = 7
24,708,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,725 UART: [art] PUB.X = FF0F3B2B47B19D74301D32B12145DEB04646457655DC65DDF563B1979C04A1C31AFA4A438ABA095899538101BA9D53B0
24,716,986 UART: [art] PUB.Y = 5C981C867623C0FAF024B3C321277CB4C8EF898E474E8EEDB6C2EF540B198BC787CBA6E2DBEE80F30701DA4581459F55
24,724,306 UART: [art] SIG.R = 93E918EAA37EE897D943FF4B641858732FD249874D1D2E85109154900F0E5E29147E51D9CE04FD5C60A89137D51926E0
24,731,681 UART: [art] SIG.S = DC57D3A06340703C55F854B22D9B82873ECE17A1E37D303759D9F993DD340711CBFBAEF7066A69733CC61A14F8F8E7A1
25,710,217 UART: Caliptra RT
25,710,907 UART: [state] CFI Enabled
25,875,632 UART: [rt] RT listening for mailbox commands...
25,878,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,033,455 UART: [rt]cmd =0x41544d4e, len=14344
30,029,203 >>> mbox cmd response data (8 bytes)
30,029,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,060,326 UART: [rt]cmd =0x41545348, len=116
30,062,342 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,379,054 ready_for_fw is high
3,379,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,085,371 >>> mbox cmd response: success
18,366,678 UART:
18,367,086 UART: Running Caliptra FMC ...
18,368,198 UART:
18,368,350 UART: [state] CFI Enabled
18,433,794 UART: [fht] FMC Alias Private Key: 7
20,197,424 UART: [art] Extend RT PCRs Done
20,198,652 UART: [art] Lock RT PCRs Done
20,200,251 UART: [art] Populate DV Done
20,205,658 UART: [fht] FMC Alias Private Key: 7
20,207,300 UART: [art] Derive CDI
20,208,032 UART: [art] Store in in slot 0x4
20,266,370 UART: [art] Derive Key Pair
20,267,411 UART: [art] Store priv key in slot 0x5
22,729,832 UART: [art] Derive Key Pair - Done
22,742,728 UART: [art] Signing Cert with AUTHO
22,744,029 UART: RITY.KEYID = 7
24,456,519 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,025 UART: [art] PUB.X = 13D4B3C59F9CE117C936F56B050405E4E6951EFF94BCEA66A65D357ECC29330CF6C71AB0005CD322DF9310DCDFB16C99
24,465,318 UART: [art] PUB.Y = 4A370D971EC924B466B89C7E05DF9D62F8D3EB6C1BC32ECC0C774B4771E40B11CBD0DD8EF266C6F368545C8842EFF1F7
24,472,597 UART: [art] SIG.R = F3423A45BAB77DCED4B2BE3EAA60E99446C8AB361C2658514CBD69B1CFBF535A9C3B5A605DBE0015399836237830D83C
24,480,009 UART: [art] SIG.S = C830316142944BEAA600A95FE50DE59EFC46952B7C8C488CB9F94DA26BCB8377BF3EE0216138FF049B1F0309876EA45A
25,458,680 UART: Caliptra RT
25,459,397 UART: [state] CFI Enabled
25,623,961 UART: [rt] RT listening for mailbox commands...
29,654,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,810,255 UART: [rt]cmd =0x41544d4e, len=14344
33,806,075 >>> mbox cmd response data (8 bytes)
33,806,760 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,837,680 UART: [rt]cmd =0x41545348, len=116
33,858,121 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,381,950 ready_for_fw is high
3,382,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,065,075 >>> mbox cmd response: success
18,340,993 UART:
18,341,415 UART: Running Caliptra FMC ...
18,342,635 UART:
18,342,804 UART: [state] CFI Enabled
18,406,360 UART: [fht] FMC Alias Private Key: 7
20,170,897 UART: [art] Extend RT PCRs Done
20,172,123 UART: [art] Lock RT PCRs Done
20,173,752 UART: [art] Populate DV Done
20,179,434 UART: [fht] FMC Alias Private Key: 7
20,181,129 UART: [art] Derive CDI
20,181,941 UART: [art] Store in in slot 0x4
20,239,093 UART: [art] Derive Key Pair
20,240,139 UART: [art] Store priv key in slot 0x5
22,703,120 UART: [art] Derive Key Pair - Done
22,716,012 UART: [art] Signing Cert with AUTHO
22,717,341 UART: RITY.KEYID = 7
24,429,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,802 UART: [art] PUB.X = F0035E4DB84D3F499E7BCB2B93C8418D02B47675E0EDC3EFC9045CFC70FD8F6BC086EFF016C1B938B4DD0DDDDFE8CE71
24,438,138 UART: [art] PUB.Y = BFB668CF24106ADD7A8D05E334ACDAA46B6421EF9CF53450537E1F85423AAFB0E09E0D5172EE232C2863D56A74E600AF
24,445,334 UART: [art] SIG.R = 5173BFEB09F4C3B30EC24CD5E9C9544A7973EC43BE1D9D294E49F1AF3E7F548217EA26CDD770EAEA45EFC3525DFED6B4
24,452,777 UART: [art] SIG.S = B4D4FA61ED3A4466FC6D8852CE087ED8F281B69EF2FCADB2A062EF3FBBE693525C61CDE19E454B4CE9F677AF72857885
25,431,706 UART: Caliptra RT
25,432,411 UART: [state] CFI Enabled
25,597,159 UART: [rt] RT listening for mailbox commands...
25,599,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,755,108 UART: [rt]cmd =0x41544d4e, len=14344
29,750,568 >>> mbox cmd response data (8 bytes)
29,751,156 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,781,932 UART: [rt]cmd =0x41545348, len=116
29,784,347 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,967 writing to cptra_bootfsm_go
193,132 UART:
193,497 UART: Running Caliptra ROM ...
194,618 UART:
604,465 UART: [state] CFI Enabled
620,719 UART: [state] LifecycleState = Unprovisioned
622,639 UART: [state] DebugLocked = No
624,184 UART: [state] WD Timer not started. Device not locked for debugging
628,454 UART: [kat] SHA2-256
807,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,137 UART: [kat] ++
819,667 UART: [kat] sha1
831,398 UART: [kat] SHA2-256
834,470 UART: [kat] SHA2-384
841,246 UART: [kat] SHA2-512-ACC
844,255 UART: [kat] ECC-384
3,286,291 UART: [kat] HMAC-384Kdf
3,299,418 UART: [kat] LMS
3,828,870 UART: [kat] --
3,833,407 UART: [cold-reset] ++
3,835,061 UART: [fht] FHT @ 0x50003400
3,846,192 UART: [idev] ++
3,846,758 UART: [idev] CDI.KEYID = 6
3,847,669 UART: [idev] SUBJECT.KEYID = 7
3,848,845 UART: [idev] UDS.KEYID = 0
3,849,772 ready_for_fw is high
3,849,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,353 UART: [idev] Erasing UDS.KEYID = 0
6,322,794 UART: [idev] Sha1 KeyId Algorithm
6,345,046 UART: [idev] --
6,349,097 UART: [ldev] ++
6,349,677 UART: [ldev] CDI.KEYID = 6
6,350,587 UART: [ldev] SUBJECT.KEYID = 5
6,351,746 UART: [ldev] AUTHORITY.KEYID = 7
6,353,036 UART: [ldev] FE.KEYID = 1
6,364,194 UART: [ldev] Erasing FE.KEYID = 1
8,837,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,854 UART: [ldev] --
10,625,724 UART: [fwproc] Wait for Commands...
10,627,445 UART: [fwproc] Recv command 0x46574c44
10,629,551 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,936 >>> mbox cmd response: success
14,492,647 UART: [afmc] ++
14,493,244 UART: [afmc] CDI.KEYID = 6
14,494,176 UART: [afmc] SUBJECT.KEYID = 7
14,495,342 UART: [afmc] AUTHORITY.KEYID = 5
16,993,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,425 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,465 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,822 UART: [afmc] --
18,788,105 UART: [cold-reset] --
18,791,875 UART: [state] Locking Datavault
18,796,418 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,068 UART: [state] Locking ICCM
18,800,655 UART: [exit] Launching FMC @ 0x40000130
18,809,059 UART:
18,809,309 UART: Running Caliptra FMC ...
18,810,434 UART:
18,810,592 UART: [state] CFI Enabled
18,818,479 UART: [fht] FMC Alias Private Key: 7
20,575,322 UART: [art] Extend RT PCRs Done
20,576,573 UART: [art] Lock RT PCRs Done
20,577,880 UART: [art] Populate DV Done
20,583,346 UART: [fht] FMC Alias Private Key: 7
20,584,836 UART: [art] Derive CDI
20,585,604 UART: [art] Store in in slot 0x4
20,628,315 UART: [art] Derive Key Pair
20,629,352 UART: [art] Store priv key in slot 0x5
23,056,601 UART: [art] Derive Key Pair - Done
23,069,713 UART: [art] Signing Cert with AUTHO
23,071,032 UART: RITY.KEYID = 7
24,776,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,128 UART: [art] PUB.X = C73A4D0094401DE7D7EE30E693E58F37D12591A4C269C598CA19BB9F86ECA8AABCC484C2159F048E93E233A934F0A1DB
24,785,258 UART: [art] PUB.Y = 5B214AFA47CF882AC53E5EF90E57D0FB88317428F997C5B0FD476699DA7A9B6299FF47C9BA616144935E9A1DC7018483
24,792,524 UART: [art] SIG.R = EFA0E05C0220063A40CC1D4B3250A3DEF6A37FAB1907A09C14BC2EE103ADB962E46CD1E44566D9FA87474D30C9B4965E
24,799,945 UART: [art] SIG.S = FEC5A3C26072CEC69606DD74B0E1AD71E134C9322D3EC6776552A6A56BD3A5A88E1DDDA672563CE065436B3ACDF39610
25,779,151 UART: Caliptra RT
25,779,855 UART: [state] CFI Enabled
25,897,684 UART: [rt] RT listening for mailbox commands...
29,927,259 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,082,577 UART: [rt]cmd =0x41544d4e, len=14344
34,078,993 >>> mbox cmd response data (8 bytes)
34,079,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,110,281 UART: [rt]cmd =0x41545348, len=116
34,130,144 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
192,527 UART:
192,896 UART: Running Caliptra ROM ...
193,989 UART:
603,564 UART: [state] CFI Enabled
618,809 UART: [state] LifecycleState = Unprovisioned
620,681 UART: [state] DebugLocked = No
623,492 UART: [state] WD Timer not started. Device not locked for debugging
626,725 UART: [kat] SHA2-256
805,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,434 UART: [kat] ++
817,964 UART: [kat] sha1
827,852 UART: [kat] SHA2-256
830,860 UART: [kat] SHA2-384
836,160 UART: [kat] SHA2-512-ACC
839,084 UART: [kat] ECC-384
3,283,105 UART: [kat] HMAC-384Kdf
3,295,615 UART: [kat] LMS
3,825,060 UART: [kat] --
3,829,484 UART: [cold-reset] ++
3,831,557 UART: [fht] FHT @ 0x50003400
3,842,406 UART: [idev] ++
3,843,010 UART: [idev] CDI.KEYID = 6
3,843,904 UART: [idev] SUBJECT.KEYID = 7
3,845,077 UART: [idev] UDS.KEYID = 0
3,845,980 ready_for_fw is high
3,846,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,468 UART: [idev] Erasing UDS.KEYID = 0
6,321,758 UART: [idev] Sha1 KeyId Algorithm
6,343,950 UART: [idev] --
6,348,105 UART: [ldev] ++
6,348,678 UART: [ldev] CDI.KEYID = 6
6,349,591 UART: [ldev] SUBJECT.KEYID = 5
6,350,751 UART: [ldev] AUTHORITY.KEYID = 7
6,352,035 UART: [ldev] FE.KEYID = 1
6,362,958 UART: [ldev] Erasing FE.KEYID = 1
8,834,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,731 UART: [ldev] --
10,625,138 UART: [fwproc] Wait for Commands...
10,627,939 UART: [fwproc] Recv command 0x46574c44
10,629,978 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,547 >>> mbox cmd response: success
14,488,093 UART: [afmc] ++
14,488,751 UART: [afmc] CDI.KEYID = 6
14,489,742 UART: [afmc] SUBJECT.KEYID = 7
14,490,853 UART: [afmc] AUTHORITY.KEYID = 5
16,989,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,048 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,790 UART: [afmc] --
18,788,041 UART: [cold-reset] --
18,791,208 UART: [state] Locking Datavault
18,797,324 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,041 UART: [state] Locking ICCM
18,801,326 UART: [exit] Launching FMC @ 0x40000130
18,809,725 UART:
18,809,964 UART: Running Caliptra FMC ...
18,811,069 UART:
18,811,230 UART: [state] CFI Enabled
18,818,956 UART: [fht] FMC Alias Private Key: 7
20,575,610 UART: [art] Extend RT PCRs Done
20,576,832 UART: [art] Lock RT PCRs Done
20,578,459 UART: [art] Populate DV Done
20,583,763 UART: [fht] FMC Alias Private Key: 7
20,585,252 UART: [art] Derive CDI
20,586,012 UART: [art] Store in in slot 0x4
20,628,713 UART: [art] Derive Key Pair
20,629,750 UART: [art] Store priv key in slot 0x5
23,056,309 UART: [art] Derive Key Pair - Done
23,069,461 UART: [art] Signing Cert with AUTHO
23,070,786 UART: RITY.KEYID = 7
24,775,969 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,480 UART: [art] PUB.X = 331D26CFCAF51B660844D01CFC80CBED089E61AE4A95B96DCDE091674AD46E74ADA9F928C2A4D0F0C2669A4AA0CBB94F
24,784,759 UART: [art] PUB.Y = 72EFB214E52724A7A94DF64C88D47E4D04B0457F653A56E57EC85D4A1C06F4E4ADD004C16CC2D4B1622DA099AB7233E4
24,792,021 UART: [art] SIG.R = FD0DD3A45A2FD9C21BCC3EC96037D426D92E68287125664B7BE55B5E54BC2569DB28D5AF7562690F3878DA419AA409F1
24,799,458 UART: [art] SIG.S = F4F7FAB6733CDBB396F73224C8DB3C69CED15EAAC94DB8F2C2BA1947F35CE39C50AC6922BB0B91AB57F839F19D56D0FD
25,778,431 UART: Caliptra RT
25,779,142 UART: [state] CFI Enabled
25,895,629 UART: [rt] RT listening for mailbox commands...
25,898,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,053,574 UART: [rt]cmd =0x41544d4e, len=14344
30,049,161 >>> mbox cmd response data (8 bytes)
30,049,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,080,753 UART: [rt]cmd =0x41545348, len=116
30,082,849 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
3,694,742 ready_for_fw is high
3,695,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,282,908 >>> mbox cmd response: success
18,532,270 UART:
18,532,661 UART: Running Caliptra FMC ...
18,533,852 UART:
18,534,025 UART: [state] CFI Enabled
18,541,884 UART: [fht] FMC Alias Private Key: 7
20,298,586 UART: [art] Extend RT PCRs Done
20,299,815 UART: [art] Lock RT PCRs Done
20,301,454 UART: [art] Populate DV Done
20,306,816 UART: [fht] FMC Alias Private Key: 7
20,308,426 UART: [art] Derive CDI
20,309,249 UART: [art] Store in in slot 0x4
20,352,016 UART: [art] Derive Key Pair
20,353,064 UART: [art] Store priv key in slot 0x5
22,779,797 UART: [art] Derive Key Pair - Done
22,793,332 UART: [art] Signing Cert with AUTHO
22,794,635 UART: RITY.KEYID = 7
24,500,417 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,921 UART: [art] PUB.X = 9D5A5D778E954D86F393EB883155870510C9213E34AF8CD057247696426C63443EF7F6461FBB58559FD5D1FA9E7F8133
24,509,160 UART: [art] PUB.Y = C4FF936FDDF2BD1E65A8C8284D226F661718553970A325EB8177DC3C06CF57F472B729A0F1FE879CAB627EC7A2AE690F
24,516,437 UART: [art] SIG.R = 2DA8E4F440C1E9EC83B86712EC111011B18D4501D22E94B7B1A7DB839BE8CC56745CAEF43C9DE6E9B897B05E1CFE7408
24,523,835 UART: [art] SIG.S = C6195437FA26B2038FC05F59E61A24F03A4518C72A652C1D548E3CAD43D6533483C25B2001901C55EA58C917E730F67D
25,502,655 UART: Caliptra RT
25,503,354 UART: [state] CFI Enabled
25,620,631 UART: [rt] RT listening for mailbox commands...
29,653,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,808,704 UART: [rt]cmd =0x41544d4e, len=14344
33,804,327 >>> mbox cmd response data (8 bytes)
33,804,918 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,835,868 UART: [rt]cmd =0x41545348, len=116
33,855,899 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,697,067 ready_for_fw is high
3,697,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,256,799 >>> mbox cmd response: success
18,505,235 UART:
18,505,647 UART: Running Caliptra FMC ...
18,506,859 UART:
18,507,035 UART: [state] CFI Enabled
18,514,872 UART: [fht] FMC Alias Private Key: 7
20,272,356 UART: [art] Extend RT PCRs Done
20,273,585 UART: [art] Lock RT PCRs Done
20,275,335 UART: [art] Populate DV Done
20,280,752 UART: [fht] FMC Alias Private Key: 7
20,282,404 UART: [art] Derive CDI
20,283,240 UART: [art] Store in in slot 0x4
20,325,638 UART: [art] Derive Key Pair
20,326,688 UART: [art] Store priv key in slot 0x5
22,753,424 UART: [art] Derive Key Pair - Done
22,766,120 UART: [art] Signing Cert with AUTHO
22,767,442 UART: RITY.KEYID = 7
24,473,105 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,612 UART: [art] PUB.X = 77FDC89BAC4C62EA28ACCB3F68C4C9676A9F7E990AE407166984594120A61BFAF8BF6B95D7B09FFD86D6E387C33547D5
24,481,905 UART: [art] PUB.Y = 6467E7B4CFC7AEF11C772169FF282F847FE100FA0DB14C855D9A4D9BA4B97B44D353FB515E1F5BBE102D14796EC9F4DA
24,489,141 UART: [art] SIG.R = D44E0FFCA7C6830301FE78EFBD03260122B323B57DF7F63DC7FEE4CECEDBEDBC3C89874D9CC6E57C7F8F964D92457090
24,496,564 UART: [art] SIG.S = CE4CC611D44282502B27788728F2750854E9738C66EE4338E18125726B380B74ECA0B8C7EEE95A44F39C30D58AE3822B
25,475,509 UART: Caliptra RT
25,476,211 UART: [state] CFI Enabled
25,594,045 UART: [rt] RT listening for mailbox commands...
25,596,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,752,007 UART: [rt]cmd =0x41544d4e, len=14344
29,747,458 >>> mbox cmd response data (8 bytes)
29,748,036 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,778,727 UART: [rt]cmd =0x41545348, len=116
29,781,018 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,498 UART:
192,875 UART: Running Caliptra ROM ...
194,079 UART:
194,237 UART: [state] CFI Enabled
265,742 UART: [state] LifecycleState = Unprovisioned
268,165 UART: [state] DebugLocked = No
270,690 UART: [state] WD Timer not started. Device not locked for debugging
274,799 UART: [kat] SHA2-256
464,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,488 UART: [kat] ++
476,000 UART: [kat] sha1
486,834 UART: [kat] SHA2-256
489,915 UART: [kat] SHA2-384
495,262 UART: [kat] SHA2-512-ACC
497,850 UART: [kat] ECC-384
2,946,276 UART: [kat] HMAC-384Kdf
2,971,159 UART: [kat] LMS
3,502,912 UART: [kat] --
3,506,838 UART: [cold-reset] ++
3,508,696 UART: [fht] FHT @ 0x50003400
3,521,229 UART: [idev] ++
3,521,936 UART: [idev] CDI.KEYID = 6
3,522,854 UART: [idev] SUBJECT.KEYID = 7
3,524,091 UART: [idev] UDS.KEYID = 0
3,525,172 ready_for_fw is high
3,525,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,965 UART: [idev] Erasing UDS.KEYID = 0
6,028,249 UART: [idev] Sha1 KeyId Algorithm
6,052,049 UART: [idev] --
6,057,301 UART: [ldev] ++
6,057,987 UART: [ldev] CDI.KEYID = 6
6,058,913 UART: [ldev] SUBJECT.KEYID = 5
6,060,073 UART: [ldev] AUTHORITY.KEYID = 7
6,061,306 UART: [ldev] FE.KEYID = 1
6,098,815 UART: [ldev] Erasing FE.KEYID = 1
8,604,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,719 UART: [ldev] --
10,412,567 UART: [fwproc] Wait for Commands...
10,414,843 UART: [fwproc] Recv command 0x46574c44
10,417,097 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,743 >>> mbox cmd response: success
14,597,982 UART: [afmc] ++
14,598,693 UART: [afmc] CDI.KEYID = 6
14,599,886 UART: [afmc] SUBJECT.KEYID = 7
14,601,328 UART: [afmc] AUTHORITY.KEYID = 5
17,129,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,558 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,081 UART: [afmc] --
18,927,166 UART: [cold-reset] --
18,932,067 UART: [state] Locking Datavault
18,938,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,366 UART: [state] Locking ICCM
18,942,100 UART: [exit] Launching FMC @ 0x40000130
18,950,782 UART:
18,951,035 UART: Running Caliptra FMC ...
18,952,143 UART:
18,952,300 UART: [state] CFI Enabled
19,007,951 UART: [fht] FMC Alias Private Key: 7
20,772,103 UART: [art] Extend RT PCRs Done
20,773,330 UART: [art] Lock RT PCRs Done
20,775,331 UART: [art] Populate DV Done
20,780,792 UART: [fht] FMC Alias Private Key: 7
20,782,419 UART: [art] Derive CDI
20,783,208 UART: [art] Store in in slot 0x4
20,841,712 UART: [art] Derive Key Pair
20,842,715 UART: [art] Store priv key in slot 0x5
23,305,484 UART: [art] Derive Key Pair - Done
23,318,269 UART: [art] Signing Cert with AUTHO
23,319,577 UART: RITY.KEYID = 7
25,031,381 UART: [art] Erasing AUTHORITY.KEYID = 7
25,032,896 UART: [art] PUB.X = 965B7E624F84F818ED3E1956D1BD4D89CD5BD00B735A59939F7033370CFB7147780FDE4D4461264F4024A79DF06CBB13
25,040,119 UART: [art] PUB.Y = 2C17D882A53B2F93A7D68122613F8FE3C6EBC568693EBFE91BF53B6550FB547A8C9548972BF55C9DD6996953C9D80ABD
25,047,433 UART: [art] SIG.R = D95183DE87C42AAA4AB7FF14FCCA10D5FB9C440F2FD3C941E62C294F742076FC85A419B7566B8F1EFDBFBEB1EF537F84
25,054,814 UART: [art] SIG.S = 02B3B35FE8E81781C7C369893281F54D31A513F5823095B4AB297F31D9B0BDD6494791A5FFDCA2A8DCC3F16CF0569C9D
26,033,607 UART: Caliptra RT
26,034,300 UART: [state] CFI Enabled
26,200,007 UART: [rt] RT listening for mailbox commands...
30,227,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,383,195 UART: [rt]cmd =0x41544d4e, len=14344
34,379,558 >>> mbox cmd response data (8 bytes)
34,380,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,410,724 UART: [rt]cmd =0x41545348, len=116
34,430,462 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,125 UART:
192,501 UART: Running Caliptra ROM ...
193,689 UART:
193,844 UART: [state] CFI Enabled
264,482 UART: [state] LifecycleState = Unprovisioned
266,885 UART: [state] DebugLocked = No
269,198 UART: [state] WD Timer not started. Device not locked for debugging
274,525 UART: [kat] SHA2-256
464,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,166 UART: [kat] ++
475,613 UART: [kat] sha1
486,841 UART: [kat] SHA2-256
489,841 UART: [kat] SHA2-384
495,696 UART: [kat] SHA2-512-ACC
498,273 UART: [kat] ECC-384
2,946,366 UART: [kat] HMAC-384Kdf
2,971,345 UART: [kat] LMS
3,503,104 UART: [kat] --
3,507,610 UART: [cold-reset] ++
3,508,755 UART: [fht] FHT @ 0x50003400
3,521,017 UART: [idev] ++
3,521,653 UART: [idev] CDI.KEYID = 6
3,522,632 UART: [idev] SUBJECT.KEYID = 7
3,523,869 UART: [idev] UDS.KEYID = 0
3,524,794 ready_for_fw is high
3,524,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,472 UART: [idev] Erasing UDS.KEYID = 0
6,028,408 UART: [idev] Sha1 KeyId Algorithm
6,052,012 UART: [idev] --
6,057,988 UART: [ldev] ++
6,058,680 UART: [ldev] CDI.KEYID = 6
6,059,590 UART: [ldev] SUBJECT.KEYID = 5
6,060,751 UART: [ldev] AUTHORITY.KEYID = 7
6,061,979 UART: [ldev] FE.KEYID = 1
6,101,428 UART: [ldev] Erasing FE.KEYID = 1
8,608,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,813 UART: [ldev] --
10,414,970 UART: [fwproc] Wait for Commands...
10,416,950 UART: [fwproc] Recv command 0x46574c44
10,419,208 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,169 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,604,145 >>> mbox cmd response: success
14,608,654 UART: [afmc] ++
14,609,373 UART: [afmc] CDI.KEYID = 6
14,610,572 UART: [afmc] SUBJECT.KEYID = 7
14,612,015 UART: [afmc] AUTHORITY.KEYID = 5
17,146,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,165 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,362 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,794 UART: [afmc] --
18,948,280 UART: [cold-reset] --
18,952,308 UART: [state] Locking Datavault
18,958,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,940 UART: [state] Locking ICCM
18,962,288 UART: [exit] Launching FMC @ 0x40000130
18,970,977 UART:
18,971,216 UART: Running Caliptra FMC ...
18,972,315 UART:
18,972,470 UART: [state] CFI Enabled
19,032,771 UART: [fht] FMC Alias Private Key: 7
20,796,432 UART: [art] Extend RT PCRs Done
20,797,655 UART: [art] Lock RT PCRs Done
20,799,226 UART: [art] Populate DV Done
20,804,584 UART: [fht] FMC Alias Private Key: 7
20,806,223 UART: [art] Derive CDI
20,807,035 UART: [art] Store in in slot 0x4
20,865,326 UART: [art] Derive Key Pair
20,866,367 UART: [art] Store priv key in slot 0x5
23,328,925 UART: [art] Derive Key Pair - Done
23,342,007 UART: [art] Signing Cert with AUTHO
23,343,313 UART: RITY.KEYID = 7
25,054,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,112 UART: [art] PUB.X = 13DDAC4C0B983CC1A5E7034089C94EA6025961547D99946635D2585C5F4D712B1C9F126BACBAF50BCF745FAEB3108369
25,063,370 UART: [art] PUB.Y = 825E9F63ACA22032EDF5E4A3C9CD22851AF18884608F45BB2AF060B24603E7527EB10FB09D76D634B98E05B5E4385BD3
25,070,633 UART: [art] SIG.R = 245ACEFD455E0AB08AAA819762C40304BBFC4BC55B102BA4641462DE764933614D270C64500DF5FBAE4C6984DCE71B94
25,078,203 UART: [art] SIG.S = 286983505A3DACDEA8C82FAF805463BCE739FEEE8E1B3F57997094BF4ADB9CB841F9130915F433835282E027BFA87A52
26,057,538 UART: Caliptra RT
26,058,250 UART: [state] CFI Enabled
26,223,920 UART: [rt] RT listening for mailbox commands...
26,226,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,664 UART: [rt]cmd =0x41544d4e, len=14344
30,376,919 >>> mbox cmd response data (8 bytes)
30,377,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,408,326 UART: [rt]cmd =0x41545348, len=116
30,410,310 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,437,510 ready_for_fw is high
3,438,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,734,616 >>> mbox cmd response: success
19,023,795 UART:
19,024,216 UART: Running Caliptra FMC ...
19,025,409 UART:
19,025,576 UART: [state] CFI Enabled
19,093,044 UART: [fht] FMC Alias Private Key: 7
20,857,206 UART: [art] Extend RT PCRs Done
20,858,420 UART: [art] Lock RT PCRs Done
20,860,043 UART: [art] Populate DV Done
20,865,396 UART: [fht] FMC Alias Private Key: 7
20,867,036 UART: [art] Derive CDI
20,867,847 UART: [art] Store in in slot 0x4
20,925,710 UART: [art] Derive Key Pair
20,926,740 UART: [art] Store priv key in slot 0x5
23,389,721 UART: [art] Derive Key Pair - Done
23,402,555 UART: [art] Signing Cert with AUTHO
23,403,852 UART: RITY.KEYID = 7
25,115,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,515 UART: [art] PUB.X = 86D9E71D6B3B67B40597E60A2E1DDCA1F347A2BDDE3740C571212D591A2FAF1BD303871E9405E5EB515B9444EBE9DBD1
25,124,731 UART: [art] PUB.Y = 025A3DB1878335F63F3E58A83838FFECAD8AD206314C9F0247E3A2C827E2BFB4B0575A0504E1F708EADD1465C0862D77
25,131,977 UART: [art] SIG.R = 5D6D867C09ED85364B19618E0949F1BFD2C9AEE60DBE5CB113BCAA31171A25987653F1912007033D525931C7BAA3FE5D
25,139,354 UART: [art] SIG.S = C357E8B0F10061F37B7D6D03194FAD8DF26C46CC7F22AEAEDCF4B9FD668FD9CB64686DDE1E36DA9867FE6AE876296327
26,118,591 UART: Caliptra RT
26,119,304 UART: [state] CFI Enabled
26,285,151 UART: [rt] RT listening for mailbox commands...
30,313,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,468,631 UART: [rt]cmd =0x41544d4e, len=14344
34,463,902 >>> mbox cmd response data (8 bytes)
34,464,493 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,495,188 UART: [rt]cmd =0x41545348, len=116
34,514,597 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,434,715 ready_for_fw is high
3,435,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,147 >>> mbox cmd response: success
19,021,246 UART:
19,021,684 UART: Running Caliptra FMC ...
19,022,894 UART:
19,023,061 UART: [state] CFI Enabled
19,089,285 UART: [fht] FMC Alias Private Key: 7
20,853,035 UART: [art] Extend RT PCRs Done
20,854,267 UART: [art] Lock RT PCRs Done
20,856,163 UART: [art] Populate DV Done
20,861,812 UART: [fht] FMC Alias Private Key: 7
20,863,468 UART: [art] Derive CDI
20,864,283 UART: [art] Store in in slot 0x4
20,921,600 UART: [art] Derive Key Pair
20,922,645 UART: [art] Store priv key in slot 0x5
23,385,249 UART: [art] Derive Key Pair - Done
23,398,085 UART: [art] Signing Cert with AUTHO
23,399,424 UART: RITY.KEYID = 7
25,111,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,638 UART: [art] PUB.X = 658E65EAE79057B91E9221D3886759A682AB68FF62A6F5F26A28396A9F788C557A629C0D6B94260BD209BA0E2E1C8FF7
25,119,920 UART: [art] PUB.Y = 785B80BC85EDDECFFE47E85DE624371BCCAE9E881BE4A24C62C2F2B0CAD554A575755C437D44F202D65B1B42867F2488
25,127,166 UART: [art] SIG.R = C71AC0A9D33079C4500692DECE4149A64A68A69E2A27379E398982EBE73A9D71C5B3FF77E1A56D45F0EE13B544222F90
25,134,575 UART: [art] SIG.S = 8FBC435DFF0A8BD250C7B991B4997329766E5FEAF3EFAC3C9050C920209A9431E859188AFAC652ADD8B02E3A3E133360
26,113,716 UART: Caliptra RT
26,114,414 UART: [state] CFI Enabled
26,279,599 UART: [rt] RT listening for mailbox commands...
26,282,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,437,161 UART: [rt]cmd =0x41544d4e, len=14344
30,433,251 >>> mbox cmd response data (8 bytes)
30,433,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,464,408 UART: [rt]cmd =0x41545348, len=116
30,466,906 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
192,992 UART:
193,374 UART: Running Caliptra ROM ...
194,577 UART:
604,079 UART: [state] CFI Enabled
618,315 UART: [state] LifecycleState = Unprovisioned
620,685 UART: [state] DebugLocked = No
622,000 UART: [state] WD Timer not started. Device not locked for debugging
626,336 UART: [kat] SHA2-256
816,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,035 UART: [kat] ++
827,514 UART: [kat] sha1
838,957 UART: [kat] SHA2-256
841,979 UART: [kat] SHA2-384
848,403 UART: [kat] SHA2-512-ACC
850,990 UART: [kat] ECC-384
3,289,884 UART: [kat] HMAC-384Kdf
3,302,318 UART: [kat] LMS
3,834,130 UART: [kat] --
3,838,196 UART: [cold-reset] ++
3,840,626 UART: [fht] FHT @ 0x50003400
3,852,174 UART: [idev] ++
3,852,890 UART: [idev] CDI.KEYID = 6
3,853,776 UART: [idev] SUBJECT.KEYID = 7
3,855,017 UART: [idev] UDS.KEYID = 0
3,855,923 ready_for_fw is high
3,856,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,495 UART: [idev] Erasing UDS.KEYID = 0
6,329,085 UART: [idev] Sha1 KeyId Algorithm
6,352,263 UART: [idev] --
6,356,910 UART: [ldev] ++
6,357,599 UART: [ldev] CDI.KEYID = 6
6,358,530 UART: [ldev] SUBJECT.KEYID = 5
6,359,691 UART: [ldev] AUTHORITY.KEYID = 7
6,360,924 UART: [ldev] FE.KEYID = 1
6,370,468 UART: [ldev] Erasing FE.KEYID = 1
8,850,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,361 UART: [ldev] --
10,639,963 UART: [fwproc] Wait for Commands...
10,642,493 UART: [fwproc] Recv command 0x46574c44
10,644,806 UART: [fwproc] Recv'd Img size: 114084 bytes
14,089,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,984 >>> mbox cmd response: success
14,827,920 UART: [afmc] ++
14,828,633 UART: [afmc] CDI.KEYID = 6
14,829,824 UART: [afmc] SUBJECT.KEYID = 7
14,831,266 UART: [afmc] AUTHORITY.KEYID = 5
17,336,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,802 UART: [afmc] --
19,135,735 UART: [cold-reset] --
19,138,848 UART: [state] Locking Datavault
19,143,568 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,719 UART: [state] Locking ICCM
19,147,407 UART: [exit] Launching FMC @ 0x40000130
19,156,093 UART:
19,156,333 UART: Running Caliptra FMC ...
19,157,434 UART:
19,157,593 UART: [state] CFI Enabled
19,165,641 UART: [fht] FMC Alias Private Key: 7
20,921,802 UART: [art] Extend RT PCRs Done
20,923,021 UART: [art] Lock RT PCRs Done
20,924,946 UART: [art] Populate DV Done
20,930,086 UART: [fht] FMC Alias Private Key: 7
20,931,571 UART: [art] Derive CDI
20,932,332 UART: [art] Store in in slot 0x4
20,974,760 UART: [art] Derive Key Pair
20,975,809 UART: [art] Store priv key in slot 0x5
23,402,507 UART: [art] Derive Key Pair - Done
23,415,286 UART: [art] Signing Cert with AUTHO
23,416,603 UART: RITY.KEYID = 7
25,121,925 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,432 UART: [art] PUB.X = 1943DC5C36B272A9DFA0990633CE1728F3B959A55F3DD17704392487C25EE33BA722AA5B5CDC492C7A5C7D50DFB363CB
25,130,708 UART: [art] PUB.Y = 97F092C4DA53522F397A4C121F6FAF82400A291C5B94CC5DD53837CEDF5C4DAAF26F0B9AA3C4674A6B3B72A96FD5D42D
25,137,966 UART: [art] SIG.R = 37ED070FBB0F3B366435BF9993773A9FCC2224A63BE3D5498909EBCFF09E72F01FA44223469F1BDA68E78268DC155208
25,145,382 UART: [art] SIG.S = 1C3909B3272D7E6CBC7F37A46E7B1D5F2BA8D3D9C1BC0044FC9CD89706A6CDA1D72A8468EDACFA6B152E7C4CD5928E76
26,124,033 UART: Caliptra RT
26,124,748 UART: [state] CFI Enabled
26,241,950 UART: [rt] RT listening for mailbox commands...
30,271,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,427,015 UART: [rt]cmd =0x41544d4e, len=14344
34,422,847 >>> mbox cmd response data (8 bytes)
34,423,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,454,211 UART: [rt]cmd =0x41545348, len=116
34,473,602 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
192,581 UART:
192,956 UART: Running Caliptra ROM ...
194,050 UART:
603,608 UART: [state] CFI Enabled
618,286 UART: [state] LifecycleState = Unprovisioned
620,722 UART: [state] DebugLocked = No
622,348 UART: [state] WD Timer not started. Device not locked for debugging
627,376 UART: [kat] SHA2-256
817,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,987 UART: [kat] ++
828,540 UART: [kat] sha1
840,408 UART: [kat] SHA2-256
843,417 UART: [kat] SHA2-384
848,129 UART: [kat] SHA2-512-ACC
850,719 UART: [kat] ECC-384
3,291,348 UART: [kat] HMAC-384Kdf
3,304,784 UART: [kat] LMS
3,836,556 UART: [kat] --
3,841,601 UART: [cold-reset] ++
3,843,177 UART: [fht] FHT @ 0x50003400
3,855,890 UART: [idev] ++
3,856,578 UART: [idev] CDI.KEYID = 6
3,857,516 UART: [idev] SUBJECT.KEYID = 7
3,858,695 UART: [idev] UDS.KEYID = 0
3,859,620 ready_for_fw is high
3,859,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,103 UART: [idev] Erasing UDS.KEYID = 0
6,332,259 UART: [idev] Sha1 KeyId Algorithm
6,355,919 UART: [idev] --
6,360,554 UART: [ldev] ++
6,361,245 UART: [ldev] CDI.KEYID = 6
6,362,312 UART: [ldev] SUBJECT.KEYID = 5
6,363,420 UART: [ldev] AUTHORITY.KEYID = 7
6,364,601 UART: [ldev] FE.KEYID = 1
6,375,790 UART: [ldev] Erasing FE.KEYID = 1
8,846,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,047 UART: [ldev] --
10,635,642 UART: [fwproc] Wait for Commands...
10,637,951 UART: [fwproc] Recv command 0x46574c44
10,640,204 UART: [fwproc] Recv'd Img size: 114084 bytes
14,084,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,330 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,826,981 >>> mbox cmd response: success
14,831,699 UART: [afmc] ++
14,832,472 UART: [afmc] CDI.KEYID = 6
14,833,699 UART: [afmc] SUBJECT.KEYID = 7
14,835,090 UART: [afmc] AUTHORITY.KEYID = 5
17,340,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,866 UART: [afmc] --
19,137,259 UART: [cold-reset] --
19,142,876 UART: [state] Locking Datavault
19,147,979 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,129 UART: [state] Locking ICCM
19,152,450 UART: [exit] Launching FMC @ 0x40000130
19,161,133 UART:
19,161,380 UART: Running Caliptra FMC ...
19,162,504 UART:
19,162,667 UART: [state] CFI Enabled
19,170,451 UART: [fht] FMC Alias Private Key: 7
20,926,709 UART: [art] Extend RT PCRs Done
20,927,923 UART: [art] Lock RT PCRs Done
20,929,333 UART: [art] Populate DV Done
20,934,861 UART: [fht] FMC Alias Private Key: 7
20,936,402 UART: [art] Derive CDI
20,937,221 UART: [art] Store in in slot 0x4
20,979,714 UART: [art] Derive Key Pair
20,980,758 UART: [art] Store priv key in slot 0x5
23,407,227 UART: [art] Derive Key Pair - Done
23,420,222 UART: [art] Signing Cert with AUTHO
23,421,527 UART: RITY.KEYID = 7
25,126,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,306 UART: [art] PUB.X = 5AA78B97EBC99F51BCC78C7E74A43A7261F9CB9B99C3CF1AFAD64C727532651D08269A7E667698035AE91FDD2F561682
25,135,611 UART: [art] PUB.Y = A30A5AD3DF07A9B44AC389DFA11CEDEC37A5644DC336519AEB8866BBFF6A4D8C128E5849AB549BDE574ECB63A03C8388
25,142,877 UART: [art] SIG.R = 8FC0EAC53C2F194DD0D4DF11BD80F3F4ADAF60DB28F3C118B8F8FE96F31E93BC3C34317D3591695FE933EECEEE0F5535
25,150,301 UART: [art] SIG.S = 8EB39D380FD93BA209BE7AE0B3F6BC09B824F8211563AC2F65CF5A8D17C632E6183CB2CB63E7A9CD57D38CDBD4D18497
26,129,351 UART: Caliptra RT
26,130,043 UART: [state] CFI Enabled
26,246,203 UART: [rt] RT listening for mailbox commands...
26,248,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,404,029 UART: [rt]cmd =0x41544d4e, len=14344
30,400,092 >>> mbox cmd response data (8 bytes)
30,400,705 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,431,446 UART: [rt]cmd =0x41545348, len=116
30,433,734 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,759,934 ready_for_fw is high
3,760,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,540 >>> mbox cmd response: success
19,205,318 UART:
19,205,712 UART: Running Caliptra FMC ...
19,206,918 UART:
19,207,091 UART: [state] CFI Enabled
19,214,987 UART: [fht] FMC Alias Private Key: 7
20,972,580 UART: [art] Extend RT PCRs Done
20,973,809 UART: [art] Lock RT PCRs Done
20,975,498 UART: [art] Populate DV Done
20,981,081 UART: [fht] FMC Alias Private Key: 7
20,982,741 UART: [art] Derive CDI
20,983,562 UART: [art] Store in in slot 0x4
21,026,270 UART: [art] Derive Key Pair
21,027,316 UART: [art] Store priv key in slot 0x5
23,452,942 UART: [art] Derive Key Pair - Done
23,465,774 UART: [art] Signing Cert with AUTHO
23,467,086 UART: RITY.KEYID = 7
25,172,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,813 UART: [art] PUB.X = BDAD9E30F9C729D1D126FD80BE2A4309D19ACF7F7881E4AAC4D237FE69A5A9BB89064CD801E3C1864616EF26DDA9CDA4
25,181,063 UART: [art] PUB.Y = 03A8190DBB5B4985FDABE68227F203D7C29A6830737D6E19C8F9654DBAFC2506687BC5C85C5DF3173815EE8A6B932CAC
25,188,347 UART: [art] SIG.R = 8DD8AAAADA78603061B1B1E7CE0DD35A04B5E30E5871E71AE8CF4277177A48DE657AD855B63783AEC2544879A4F3C517
25,195,742 UART: [art] SIG.S = E124189A083DDA80047FD9F3015E405CADEA6A5AF2C67DCBA23EA1A814A447A4A564DC86CF83E07B1BDA5CFD662E70DD
26,174,176 UART: Caliptra RT
26,174,869 UART: [state] CFI Enabled
26,292,750 UART: [rt] RT listening for mailbox commands...
30,321,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,476,852 UART: [rt]cmd =0x41544d4e, len=14344
34,471,862 >>> mbox cmd response data (8 bytes)
34,472,455 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,503,400 UART: [rt]cmd =0x41545348, len=116
34,523,867 >>> mbox cmd response data (12 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,756,040 ready_for_fw is high
3,756,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,453 >>> mbox cmd response: success
19,204,911 UART:
19,205,332 UART: Running Caliptra FMC ...
19,206,551 UART:
19,206,726 UART: [state] CFI Enabled
19,214,644 UART: [fht] FMC Alias Private Key: 7
20,970,993 UART: [art] Extend RT PCRs Done
20,972,238 UART: [art] Lock RT PCRs Done
20,973,603 UART: [art] Populate DV Done
20,978,961 UART: [fht] FMC Alias Private Key: 7
20,980,571 UART: [art] Derive CDI
20,981,394 UART: [art] Store in in slot 0x4
21,023,790 UART: [art] Derive Key Pair
21,024,840 UART: [art] Store priv key in slot 0x5
23,452,130 UART: [art] Derive Key Pair - Done
23,464,863 UART: [art] Signing Cert with AUTHO
23,466,171 UART: RITY.KEYID = 7
25,171,653 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,162 UART: [art] PUB.X = 4D6C9C1D612EFC7119785C71AF567B9E7B5541D74A3043E1E28632841648A30DDFC2A1BE9B7C21844707325AAC0DFF5D
25,180,423 UART: [art] PUB.Y = 47A75A6D1431F346F7BCDF312A00274CFF65E3C1A95FA445FA35C265F552A9C7C5673B4F4FB9D64E84EC4C696BC5FB05
25,187,690 UART: [art] SIG.R = 2C0C4C467CDFD7C27894CFAA525C009F5B6371B1BC83086FF44134E8D9F064FC8D9DAD94F85C522CFC4AF72C1A483E9F
25,195,033 UART: [art] SIG.S = D7B232BE25B3D1BE40EF48E2758A648F22F44392EDB538757C9E1E32F9EDA1C21C36911B2CD867D45201AFE509133342
26,173,287 UART: Caliptra RT
26,174,013 UART: [state] CFI Enabled
26,290,864 UART: [rt] RT listening for mailbox commands...
26,293,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,449,009 UART: [rt]cmd =0x41544d4e, len=14344
30,444,530 >>> mbox cmd response data (8 bytes)
30,445,113 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,475,955 UART: [rt]cmd =0x41545348, len=116
30,478,515 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,281 UART: [kat] SHA2-256
892,219 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
907,170 UART: [kat] LMS
1,475,366 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 ready_for_fw is high
1,480,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,192 UART: [idev] --
1,515,307 UART: [ldev] ++
1,515,475 UART: [ldev] CDI.KEYID = 6
1,515,838 UART: [ldev] SUBJECT.KEYID = 5
1,516,264 UART: [ldev] AUTHORITY.KEYID = 7
1,516,727 UART: [ldev] FE.KEYID = 1
1,521,997 UART: [ldev] Erasing FE.KEYID = 1
1,547,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,084 UART: [ldev] --
1,586,465 UART: [fwproc] Waiting for Commands...
1,587,292 UART: [fwproc] Received command 0x46574c44
1,588,083 UART: [fwproc] Received Image of size 114084 bytes
2,882,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,052 >>> mbox cmd response: success
3,076,180 UART: [afmc] ++
3,076,348 UART: [afmc] CDI.KEYID = 6
3,076,710 UART: [afmc] SUBJECT.KEYID = 7
3,077,135 UART: [afmc] AUTHORITY.KEYID = 5
3,112,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,201 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,891 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,818 UART: [afmc] --
3,155,808 UART: [cold-reset] --
3,156,824 UART: [state] Locking Datavault
3,158,347 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,951 UART: [state] Locking ICCM
3,159,389 UART: [exit] Launching FMC @ 0x40000130
3,164,718 UART:
3,164,734 UART: Running Caliptra FMC ...
3,165,142 UART:
3,165,196 UART: [state] CFI Enabled
3,175,857 UART: [fht] FMC Alias Private Key: 7
3,283,676 UART: [art] Extend RT PCRs Done
3,284,104 UART: [art] Lock RT PCRs Done
3,285,568 UART: [art] Populate DV Done
3,294,199 UART: [fht] FMC Alias Private Key: 7
3,295,365 UART: [art] Derive CDI
3,295,645 UART: [art] Store in in slot 0x4
3,381,094 UART: [art] Derive Key Pair
3,381,454 UART: [art] Store priv key in slot 0x5
3,393,908 UART: [art] Derive Key Pair - Done
3,408,510 UART: [art] Signing Cert with AUTHO
3,408,990 UART: RITY.KEYID = 7
3,423,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,745 UART: [art] PUB.X = 5D5F95421CDAAB82FA490DB523A8AD61B361B2511A9EACB988AA58C26645A88BC19C3AAF42A182A4BAB1A8F692346B65
3,431,528 UART: [art] PUB.Y = 3CB61301E495692B1806D7A46CE9748DD238821305582EFF508A60A4E04955416C8A877780E0431C9E618ED33D7882D8
3,438,457 UART: [art] SIG.R = B12A603A277DB3CCF4BBAB3C0682DA7D199A040618273F58DC29D9E100D8D1F6A002CF023A0D8F614218209E54A7F379
3,445,193 UART: [art] SIG.S = CA3127C630F54095D60FBBB414AB8F10FA2C80ADA3F4AA5BDD044F85391486CF054FE78F0B1B5FFD619BAAE637733535
3,468,762 UART: Caliptra RT
3,469,015 UART: [state] CFI Enabled
3,577,813 UART: [rt] RT listening for mailbox commands...
3,578,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,599 UART: [rt]cmd =0x41544d4e, len=14344
4,011,290 >>> mbox cmd response data (8 bytes)
4,011,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,266 UART: [rt]cmd =0x41545348, len=116
4,064,101 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,417 UART: [kat] SHA2-256
882,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,463 UART: [kat] ++
886,615 UART: [kat] sha1
890,847 UART: [kat] SHA2-256
892,785 UART: [kat] SHA2-384
895,654 UART: [kat] SHA2-512-ACC
897,555 UART: [kat] ECC-384
903,306 UART: [kat] HMAC-384Kdf
907,762 UART: [kat] LMS
1,475,958 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,145 UART: [fht] Storing FHT @ 0x50003400
1,479,888 UART: [idev] ++
1,480,056 UART: [idev] CDI.KEYID = 6
1,480,416 UART: [idev] SUBJECT.KEYID = 7
1,480,840 UART: [idev] UDS.KEYID = 0
1,481,185 ready_for_fw is high
1,481,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,890 UART: [idev] Erasing UDS.KEYID = 0
1,505,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,431 UART: [ldev] Erasing FE.KEYID = 1
1,547,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,688 UART: [ldev] --
1,585,993 UART: [fwproc] Waiting for Commands...
1,586,840 UART: [fwproc] Received command 0x46574c44
1,587,631 UART: [fwproc] Received Image of size 114084 bytes
2,882,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,042 >>> mbox cmd response: success
3,076,238 UART: [afmc] ++
3,076,406 UART: [afmc] CDI.KEYID = 6
3,076,768 UART: [afmc] SUBJECT.KEYID = 7
3,077,193 UART: [afmc] AUTHORITY.KEYID = 5
3,112,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,201 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,891 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,902 UART: [afmc] --
3,156,016 UART: [cold-reset] --
3,156,680 UART: [state] Locking Datavault
3,157,771 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,375 UART: [state] Locking ICCM
3,158,883 UART: [exit] Launching FMC @ 0x40000130
3,164,212 UART:
3,164,228 UART: Running Caliptra FMC ...
3,164,636 UART:
3,164,690 UART: [state] CFI Enabled
3,175,125 UART: [fht] FMC Alias Private Key: 7
3,283,226 UART: [art] Extend RT PCRs Done
3,283,654 UART: [art] Lock RT PCRs Done
3,285,068 UART: [art] Populate DV Done
3,293,367 UART: [fht] FMC Alias Private Key: 7
3,294,295 UART: [art] Derive CDI
3,294,575 UART: [art] Store in in slot 0x4
3,380,092 UART: [art] Derive Key Pair
3,380,452 UART: [art] Store priv key in slot 0x5
3,393,138 UART: [art] Derive Key Pair - Done
3,408,280 UART: [art] Signing Cert with AUTHO
3,408,760 UART: RITY.KEYID = 7
3,424,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,927 UART: [art] PUB.X = 1BF2278C31BFC3AB914A164F204C1D8F13F444882AFDD6204C02D2520A430CCE31A5090A59A4D95C150EBD26AF016A49
3,431,684 UART: [art] PUB.Y = 500561C8347FD75A27FB076E771D4BE9E6BE75116C3817602E17CD200D6C907D76617BEBAF817A7EADC002D27860089B
3,438,621 UART: [art] SIG.R = 38CBE12E2129C3FE66345D6268E803D6D1D9FD5FC763B7B7A34FDF4AE69E44D74D636DFE63FD96B055C53194EDF7CA39
3,445,404 UART: [art] SIG.S = 7794762537DDB450E39F093F1516475EA6ACD4A936ECE793398E85DB8FA9D2CE470CC1EAA3F5186E5678AAF208768886
3,468,978 UART: Caliptra RT
3,469,231 UART: [state] CFI Enabled
3,577,785 UART: [rt] RT listening for mailbox commands...
3,578,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,529 UART: [rt]cmd =0x41544d4e, len=14344
4,011,357 >>> mbox cmd response data (8 bytes)
4,011,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,273 UART: [rt]cmd =0x41545348, len=116
4,043,130 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 ready_for_fw is high
1,362,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,506 >>> mbox cmd response: success
2,982,552 UART:
2,982,568 UART: Running Caliptra FMC ...
2,982,976 UART:
2,983,030 UART: [state] CFI Enabled
2,993,651 UART: [fht] FMC Alias Private Key: 7
3,101,538 UART: [art] Extend RT PCRs Done
3,101,966 UART: [art] Lock RT PCRs Done
3,103,298 UART: [art] Populate DV Done
3,111,333 UART: [fht] FMC Alias Private Key: 7
3,112,397 UART: [art] Derive CDI
3,112,677 UART: [art] Store in in slot 0x4
3,198,476 UART: [art] Derive Key Pair
3,198,836 UART: [art] Store priv key in slot 0x5
3,211,702 UART: [art] Derive Key Pair - Done
3,226,617 UART: [art] Signing Cert with AUTHO
3,227,097 UART: RITY.KEYID = 7
3,242,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,243,442 UART: [art] PUB.X = 741B786C447E852F59E6601FD8360A766E990FC2D3A682495B1B1416B3F0F11689C64A0B8984398F1ED8AB20A6126F94
3,250,197 UART: [art] PUB.Y = F89A42E9DB7FA6F3F6EDD68A933D9D35B434821D9AE460C066CD3C632D8C4EF37828FE717CD6B36ED4550AEF7E7B8364
3,257,160 UART: [art] SIG.R = 405FD88A6C64FB0C49BE68E2F1037F8E6D772C1387D083C039509DFDCBB15B0FFF114D71E392149745C229B6D47D777A
3,263,927 UART: [art] SIG.S = 858F0BCBE9B0A1253D29B307360EA90DA0D11D487F587FE7CA9B94012AE525B40B92CED44AD50CAA4AD8C089F81AD8B9
3,288,113 UART: Caliptra RT
3,288,366 UART: [state] CFI Enabled
3,396,281 UART: [rt] RT listening for mailbox commands...
3,396,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,113 UART: [rt]cmd =0x41544d4e, len=14344
3,830,248 >>> mbox cmd response data (8 bytes)
3,830,249 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,198 UART: [rt]cmd =0x41545348, len=116
3,882,529 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,021 ready_for_fw is high
1,362,021 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,306 >>> mbox cmd response: success
2,983,534 UART:
2,983,550 UART: Running Caliptra FMC ...
2,983,958 UART:
2,984,012 UART: [state] CFI Enabled
2,994,615 UART: [fht] FMC Alias Private Key: 7
3,103,014 UART: [art] Extend RT PCRs Done
3,103,442 UART: [art] Lock RT PCRs Done
3,105,326 UART: [art] Populate DV Done
3,113,505 UART: [fht] FMC Alias Private Key: 7
3,114,523 UART: [art] Derive CDI
3,114,803 UART: [art] Store in in slot 0x4
3,200,600 UART: [art] Derive Key Pair
3,200,960 UART: [art] Store priv key in slot 0x5
3,214,308 UART: [art] Derive Key Pair - Done
3,229,010 UART: [art] Signing Cert with AUTHO
3,229,490 UART: RITY.KEYID = 7
3,245,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,765 UART: [art] PUB.X = F6A3FF2B370DDB0AB4D0CA0F792E3598CB25BC887C7B9C518DEA5FF21EC2AD1A44493C887347E8B2B437DEB579E77166
3,252,544 UART: [art] PUB.Y = EE09C071EDE7E3511BAFC308428CDFBCEEAA35022DA4812CAB0842B7757DC16E79670CD77E20FE2D4443BCD125A99DC2
3,259,499 UART: [art] SIG.R = 60AE922A18D52A2625CB346BD05849FBEA167DFEA7684D2D4E8150DCE72A3F89C9D9C07D967408F71F9B9CEB02815BED
3,266,277 UART: [art] SIG.S = 96AF02BC69F03DFCD3CD4CD88A5DF1E542EA83AE43069546E355BD299E00EFF02C5EF571B92FBB36AAB94FB2072F8741
3,289,867 UART: Caliptra RT
3,290,120 UART: [state] CFI Enabled
3,397,889 UART: [rt] RT listening for mailbox commands...
3,398,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,839 UART: [rt]cmd =0x41544d4e, len=14344
3,831,519 >>> mbox cmd response data (8 bytes)
3,831,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,625 UART: [rt]cmd =0x41545348, len=116
3,863,294 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,863 UART: [kat] HMAC-384Kdf
907,493 UART: [kat] LMS
1,475,689 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,178 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 ready_for_fw is high
1,481,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,893 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,381 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,521,852 UART: [ldev] Erasing FE.KEYID = 1
1,546,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,881 UART: [ldev] --
1,586,268 UART: [fwproc] Waiting for Commands...
1,586,981 UART: [fwproc] Received command 0x46574c44
1,587,772 UART: [fwproc] Received Image of size 114084 bytes
2,882,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,052 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,827 >>> mbox cmd response: success
3,076,029 UART: [afmc] ++
3,076,197 UART: [afmc] CDI.KEYID = 6
3,076,559 UART: [afmc] SUBJECT.KEYID = 7
3,076,984 UART: [afmc] AUTHORITY.KEYID = 5
3,111,899 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,178 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,868 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,627 UART: [afmc] --
3,154,657 UART: [cold-reset] --
3,155,787 UART: [state] Locking Datavault
3,156,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,458 UART: [state] Locking ICCM
3,158,124 UART: [exit] Launching FMC @ 0x40000130
3,163,453 UART:
3,163,469 UART: Running Caliptra FMC ...
3,163,877 UART:
3,164,020 UART: [state] CFI Enabled
3,174,713 UART: [fht] FMC Alias Private Key: 7
3,282,400 UART: [art] Extend RT PCRs Done
3,282,828 UART: [art] Lock RT PCRs Done
3,284,350 UART: [art] Populate DV Done
3,292,513 UART: [fht] FMC Alias Private Key: 7
3,293,469 UART: [art] Derive CDI
3,293,749 UART: [art] Store in in slot 0x4
3,379,274 UART: [art] Derive Key Pair
3,379,634 UART: [art] Store priv key in slot 0x5
3,393,006 UART: [art] Derive Key Pair - Done
3,407,776 UART: [art] Signing Cert with AUTHO
3,408,256 UART: RITY.KEYID = 7
3,423,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,235 UART: [art] PUB.X = EA39D3E5706655E6E93D2E382CE159FDEE2803CBA7AED913F254A7878DFCE5CC1F4EC659AEAD87BA52FF27196D120AB4
3,431,021 UART: [art] PUB.Y = 253D4FA761DC6E0275B10B73E819DD4652D7A835249E1C150A7C2E0EE19B82D3808521A4141D1B7381C6710397AECBD3
3,437,956 UART: [art] SIG.R = 7E1C43E17737E6B572FAA2FE22D7AA089A5D1CB02040202A30E90D0DA5EAF6ADC932837BE2CEC69C1D257938AEC70FE6
3,444,732 UART: [art] SIG.S = 03353F96AFF10CEFF3C6E0BF9F2FE3104F6472205689D446E876204EC628F0E7F01CE57A7EF129EDCF4049106BD7135E
3,468,467 UART: Caliptra RT
3,468,812 UART: [state] CFI Enabled
3,577,996 UART: [rt] RT listening for mailbox commands...
3,578,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,814 UART: [rt]cmd =0x41544d4e, len=14344
4,011,317 >>> mbox cmd response data (8 bytes)
4,011,318 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,319 UART: [rt]cmd =0x41545348, len=116
4,063,474 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,246 UART: [kat] SHA2-256
882,177 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,292 UART: [kat] ++
886,444 UART: [kat] sha1
890,622 UART: [kat] SHA2-256
892,560 UART: [kat] SHA2-384
895,259 UART: [kat] SHA2-512-ACC
897,160 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,710 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,171 UART: [idev] ++
1,480,339 UART: [idev] CDI.KEYID = 6
1,480,699 UART: [idev] SUBJECT.KEYID = 7
1,481,123 UART: [idev] UDS.KEYID = 0
1,481,468 ready_for_fw is high
1,481,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,271 UART: [idev] Erasing UDS.KEYID = 0
1,505,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,328 UART: [ldev] ++
1,515,496 UART: [ldev] CDI.KEYID = 6
1,515,859 UART: [ldev] SUBJECT.KEYID = 5
1,516,285 UART: [ldev] AUTHORITY.KEYID = 7
1,516,748 UART: [ldev] FE.KEYID = 1
1,522,064 UART: [ldev] Erasing FE.KEYID = 1
1,547,543 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,905 UART: [ldev] --
1,587,272 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46574c44
1,588,848 UART: [fwproc] Received Image of size 114084 bytes
2,885,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,274 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,078,035 >>> mbox cmd response: success
3,079,227 UART: [afmc] ++
3,079,395 UART: [afmc] CDI.KEYID = 6
3,079,757 UART: [afmc] SUBJECT.KEYID = 7
3,080,182 UART: [afmc] AUTHORITY.KEYID = 5
3,115,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,930 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,620 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,339 UART: [afmc] --
3,158,277 UART: [cold-reset] --
3,159,149 UART: [state] Locking Datavault
3,160,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,944 UART: [state] Locking ICCM
3,161,612 UART: [exit] Launching FMC @ 0x40000130
3,166,941 UART:
3,166,957 UART: Running Caliptra FMC ...
3,167,365 UART:
3,167,508 UART: [state] CFI Enabled
3,177,787 UART: [fht] FMC Alias Private Key: 7
3,285,974 UART: [art] Extend RT PCRs Done
3,286,402 UART: [art] Lock RT PCRs Done
3,288,036 UART: [art] Populate DV Done
3,296,505 UART: [fht] FMC Alias Private Key: 7
3,297,643 UART: [art] Derive CDI
3,297,923 UART: [art] Store in in slot 0x4
3,383,574 UART: [art] Derive Key Pair
3,383,934 UART: [art] Store priv key in slot 0x5
3,397,708 UART: [art] Derive Key Pair - Done
3,412,570 UART: [art] Signing Cert with AUTHO
3,413,050 UART: RITY.KEYID = 7
3,427,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,591 UART: [art] PUB.X = 9C5256DB8A89577499B4B001D19FFFA70FCACEC80F00B8D14B4D5B2852BFF96F3A8290584BD84C67DF9FAD0031471FBA
3,435,324 UART: [art] PUB.Y = 36F8752FFCD3D47CB643B0FBAECE3B8CB57BAE7047082C20CDD92C8FECBEDBE26F2F126A49FE2F4B72A3DAA745DC7FCC
3,442,309 UART: [art] SIG.R = A433FAE935A3C0EF2450F58C85629289127B6B961D8EF73CA076FE18E5531F29B1C00B184A7D39443E1728560890EA83
3,449,069 UART: [art] SIG.S = 3141F49758410C6631106556198CA12019437C0912DC38E7F9CB3FD5CDA3CED14DAE85957FE7D25EBE93ED1BAC6C7E50
3,473,022 UART: Caliptra RT
3,473,367 UART: [state] CFI Enabled
3,581,394 UART: [rt] RT listening for mailbox commands...
3,582,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,102 UART: [rt]cmd =0x41544d4e, len=14344
4,014,766 >>> mbox cmd response data (8 bytes)
4,014,767 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,840 UART: [rt]cmd =0x41545348, len=116
4,046,835 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,478 ready_for_fw is high
1,363,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,781 >>> mbox cmd response: success
2,985,691 UART:
2,985,707 UART: Running Caliptra FMC ...
2,986,115 UART:
2,986,258 UART: [state] CFI Enabled
2,997,097 UART: [fht] FMC Alias Private Key: 7
3,104,566 UART: [art] Extend RT PCRs Done
3,104,994 UART: [art] Lock RT PCRs Done
3,106,330 UART: [art] Populate DV Done
3,114,845 UART: [fht] FMC Alias Private Key: 7
3,115,825 UART: [art] Derive CDI
3,116,105 UART: [art] Store in in slot 0x4
3,201,654 UART: [art] Derive Key Pair
3,202,014 UART: [art] Store priv key in slot 0x5
3,215,652 UART: [art] Derive Key Pair - Done
3,230,489 UART: [art] Signing Cert with AUTHO
3,230,969 UART: RITY.KEYID = 7
3,246,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,254 UART: [art] PUB.X = 77F00DAA368BB9686D60D67AB7B852E0C70DC91ED87001B31B5CC4EDD69389E6828DE70F100B4F55F8046589EDAA40E4
3,254,016 UART: [art] PUB.Y = C7E9674EFAFD26CCAD183F8C1C052C87712BF546D887090CBADE016F38418A013DFE9811A4AA3424667EC7271A129228
3,260,957 UART: [art] SIG.R = C359D65ECB505CF1FD7003A677A03D2B468816B666F391C3CB8BBD62B5AB9E35A7E318984A3FC877C1E48DDF56C61543
3,267,734 UART: [art] SIG.S = D42085000B57422404F6AF9B086ECFCAF2B696D15947C1ABE9385FA8F9E5CE9A93A020D255247994AD75AC9FFD708137
3,290,552 UART: Caliptra RT
3,290,897 UART: [state] CFI Enabled
3,399,795 UART: [rt] RT listening for mailbox commands...
3,400,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,603 UART: [rt]cmd =0x41544d4e, len=14344
3,833,588 >>> mbox cmd response data (8 bytes)
3,833,589 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,582 UART: [rt]cmd =0x41545348, len=116
3,885,573 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,009 >>> mbox cmd response: success
2,987,517 UART:
2,987,533 UART: Running Caliptra FMC ...
2,987,941 UART:
2,988,084 UART: [state] CFI Enabled
2,998,845 UART: [fht] FMC Alias Private Key: 7
3,107,158 UART: [art] Extend RT PCRs Done
3,107,586 UART: [art] Lock RT PCRs Done
3,109,276 UART: [art] Populate DV Done
3,117,645 UART: [fht] FMC Alias Private Key: 7
3,118,633 UART: [art] Derive CDI
3,118,913 UART: [art] Store in in slot 0x4
3,204,626 UART: [art] Derive Key Pair
3,204,986 UART: [art] Store priv key in slot 0x5
3,218,468 UART: [art] Derive Key Pair - Done
3,233,293 UART: [art] Signing Cert with AUTHO
3,233,773 UART: RITY.KEYID = 7
3,249,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,860 UART: [art] PUB.X = 4E0F2E981CAA97046E8E22CE5BC0A0AEFA27CF40DA95980BFD0B5FFEC51F93F2180E60DC7051B9A9564E0D55435B7197
3,256,628 UART: [art] PUB.Y = 95950B41A33E2D1B13EBDF14D160743D68CE15527E0542AFE645448E503F714E252A05BFD0682EF1DCAE4313961007FB
3,263,568 UART: [art] SIG.R = D17ECAD685BECD1CCA1F42B8A72EBCFC2C9D03029B771BC36CDE2564626C8D82B5BB8B06A967F8F0AE831028EF0F6877
3,270,348 UART: [art] SIG.S = 1D193E5B1C3338A43ECD74CC6AC302217FF64DD0FE100E7C864CB51BF9A87C28A307052AB77DC52080B53B4FB5BFA082
3,294,423 UART: Caliptra RT
3,294,768 UART: [state] CFI Enabled
3,402,823 UART: [rt] RT listening for mailbox commands...
3,403,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,749 UART: [rt]cmd =0x41544d4e, len=14344
3,836,681 >>> mbox cmd response data (8 bytes)
3,836,682 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,781 UART: [rt]cmd =0x41545348, len=116
3,868,368 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
893,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,693 UART: [kat] ++
897,845 UART: [kat] sha1
902,049 UART: [kat] SHA2-256
903,989 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,634 UART: [kat] LMS
1,170,962 UART: [kat] --
1,171,901 UART: [cold-reset] ++
1,172,367 UART: [fht] FHT @ 0x50003400
1,175,116 UART: [idev] ++
1,175,284 UART: [idev] CDI.KEYID = 6
1,175,644 UART: [idev] SUBJECT.KEYID = 7
1,176,068 UART: [idev] UDS.KEYID = 0
1,176,413 ready_for_fw is high
1,176,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,408 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,783 >>> mbox cmd response: success
2,772,873 UART: [afmc] ++
2,773,041 UART: [afmc] CDI.KEYID = 6
2,773,403 UART: [afmc] SUBJECT.KEYID = 7
2,773,828 UART: [afmc] AUTHORITY.KEYID = 5
2,808,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,601 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,320 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,086 UART: [afmc] --
2,852,082 UART: [cold-reset] --
2,852,846 UART: [state] Locking Datavault
2,854,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,769 UART: [state] Locking ICCM
2,855,353 UART: [exit] Launching FMC @ 0x40000130
2,860,682 UART:
2,860,698 UART: Running Caliptra FMC ...
2,861,106 UART:
2,861,160 UART: [state] CFI Enabled
2,871,683 UART: [fht] FMC Alias Private Key: 7
2,979,848 UART: [art] Extend RT PCRs Done
2,980,276 UART: [art] Lock RT PCRs Done
2,981,850 UART: [art] Populate DV Done
2,990,189 UART: [fht] FMC Alias Private Key: 7
2,991,133 UART: [art] Derive CDI
2,991,413 UART: [art] Store in in slot 0x4
3,077,364 UART: [art] Derive Key Pair
3,077,724 UART: [art] Store priv key in slot 0x5
3,090,594 UART: [art] Derive Key Pair - Done
3,105,235 UART: [art] Signing Cert with AUTHO
3,105,715 UART: RITY.KEYID = 7
3,120,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,530 UART: [art] PUB.X = 07C72913800D37DB8092EEEF9358320F108A8461D407959D5BF2C796B86BAA44E164509DED34E515F3F6DEF95BFB7034
3,128,290 UART: [art] PUB.Y = 5ACFDC6E253A42CFB30C77615CB7E08B949698C52A6A355996179D06BDA74958720BBFEA5A77C0755082D1E9C47BC8F8
3,135,239 UART: [art] SIG.R = 202C390C89BC28E3BC9676DC7D89606E1FC7C217F69814913B695892340F784692DBB830FFC4E67192FE6D52E71C671F
3,142,001 UART: [art] SIG.S = A0D4BB60170ADD69D6AC60226C58F499A49105E02AA085D2AA856FE823F04AA9D43F6D73CACD5C3655C4C5935E3BE669
3,165,928 UART: Caliptra RT
3,166,181 UART: [state] CFI Enabled
3,274,294 UART: [rt] RT listening for mailbox commands...
3,274,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,256 UART: [rt]cmd =0x41544d4e, len=14344
3,708,479 >>> mbox cmd response data (8 bytes)
3,708,480 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,497 UART: [rt]cmd =0x41545348, len=116
3,760,784 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
893,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,313 UART: [kat] ++
897,465 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,224 UART: [kat] LMS
1,170,552 UART: [kat] --
1,171,353 UART: [cold-reset] ++
1,171,849 UART: [fht] FHT @ 0x50003400
1,174,682 UART: [idev] ++
1,174,850 UART: [idev] CDI.KEYID = 6
1,175,210 UART: [idev] SUBJECT.KEYID = 7
1,175,634 UART: [idev] UDS.KEYID = 0
1,175,979 ready_for_fw is high
1,175,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,376 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,690 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,246 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,656 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,559 >>> mbox cmd response: success
2,769,667 UART: [afmc] ++
2,769,835 UART: [afmc] CDI.KEYID = 6
2,770,197 UART: [afmc] SUBJECT.KEYID = 7
2,770,622 UART: [afmc] AUTHORITY.KEYID = 5
2,805,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,116 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,729 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,070 UART: [afmc] --
2,849,140 UART: [cold-reset] --
2,850,094 UART: [state] Locking Datavault
2,851,367 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,971 UART: [state] Locking ICCM
2,852,505 UART: [exit] Launching FMC @ 0x40000130
2,857,834 UART:
2,857,850 UART: Running Caliptra FMC ...
2,858,258 UART:
2,858,312 UART: [state] CFI Enabled
2,868,803 UART: [fht] FMC Alias Private Key: 7
2,976,878 UART: [art] Extend RT PCRs Done
2,977,306 UART: [art] Lock RT PCRs Done
2,979,030 UART: [art] Populate DV Done
2,987,283 UART: [fht] FMC Alias Private Key: 7
2,988,385 UART: [art] Derive CDI
2,988,665 UART: [art] Store in in slot 0x4
3,074,212 UART: [art] Derive Key Pair
3,074,572 UART: [art] Store priv key in slot 0x5
3,088,242 UART: [art] Derive Key Pair - Done
3,103,325 UART: [art] Signing Cert with AUTHO
3,103,805 UART: RITY.KEYID = 7
3,118,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,662 UART: [art] PUB.X = 9BF30126802527D17B73E31302E4EDA065BB6D971BBEE75E864E8D5B193CB537AABF81A13FE8693783C1391DF0132658
3,126,428 UART: [art] PUB.Y = E97A26B877CB0EF5CD2F6DB6A8B80422D306038ED3F1BD7E38FB7B5C214997E00A5392CF5F726BE64315559FCBBF89CF
3,133,379 UART: [art] SIG.R = E366518D36FBC2BCB13315CD008CAA02B5555ACEF95641181F1440742790D0A35C68BB0BA9EDA06CCE01A0699E147F54
3,140,126 UART: [art] SIG.S = 98BA227498F455B4A8F13D780A5CCB37A9625EB0D9581282BF90472F6836ED78A16D8295B54655C9BBA2539F3C8AF62B
3,164,000 UART: Caliptra RT
3,164,253 UART: [state] CFI Enabled
3,272,143 UART: [rt] RT listening for mailbox commands...
3,272,813 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,611 UART: [rt]cmd =0x41544d4e, len=14344
3,705,777 >>> mbox cmd response data (8 bytes)
3,705,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,135 UART: [rt]cmd =0x41545348, len=116
3,738,062 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,238 >>> mbox cmd response: success
2,684,238 UART:
2,684,254 UART: Running Caliptra FMC ...
2,684,662 UART:
2,684,716 UART: [state] CFI Enabled
2,695,345 UART: [fht] FMC Alias Private Key: 7
2,802,580 UART: [art] Extend RT PCRs Done
2,803,008 UART: [art] Lock RT PCRs Done
2,804,716 UART: [art] Populate DV Done
2,812,879 UART: [fht] FMC Alias Private Key: 7
2,813,971 UART: [art] Derive CDI
2,814,251 UART: [art] Store in in slot 0x4
2,899,818 UART: [art] Derive Key Pair
2,900,178 UART: [art] Store priv key in slot 0x5
2,913,382 UART: [art] Derive Key Pair - Done
2,928,347 UART: [art] Signing Cert with AUTHO
2,928,827 UART: RITY.KEYID = 7
2,943,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,634 UART: [art] PUB.X = 4A5B1E695ACA82EC7437E45427EC1923B2CC6BC4AAC2BAD9DB1597C26CAF4BE64DF5D9BCD2FAA0B234B2CBF2DC1B9683
2,951,436 UART: [art] PUB.Y = 395AE2A3CE79E580F9109FF9E038C49DDC795F75CBA23FEACF505B6638C2555C54551446BB66FD011E67A8A6937CC3EB
2,958,395 UART: [art] SIG.R = D239158146B757F0E09BDA67048889838ABA7FDC5E5BFA838D0C0D6283849B52C88827FAE2F189372A3A9B96D381A6CF
2,965,160 UART: [art] SIG.S = DEC34EFA893FA9CD42F4769D74AE0AC5B535CC1580D0A84013F1ABE89CDF112747A96981DEE6A487F9AC4DAA6E242B41
2,989,434 UART: Caliptra RT
2,989,687 UART: [state] CFI Enabled
3,097,027 UART: [rt] RT listening for mailbox commands...
3,097,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,669 UART: [rt]cmd =0x41544d4e, len=14344
3,529,986 >>> mbox cmd response data (8 bytes)
3,529,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,170 UART: [rt]cmd =0x41545348, len=116
3,582,323 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 ready_for_fw is high
1,060,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,680 >>> mbox cmd response: success
2,683,912 UART:
2,683,928 UART: Running Caliptra FMC ...
2,684,336 UART:
2,684,390 UART: [state] CFI Enabled
2,694,769 UART: [fht] FMC Alias Private Key: 7
2,803,052 UART: [art] Extend RT PCRs Done
2,803,480 UART: [art] Lock RT PCRs Done
2,804,986 UART: [art] Populate DV Done
2,813,303 UART: [fht] FMC Alias Private Key: 7
2,814,377 UART: [art] Derive CDI
2,814,657 UART: [art] Store in in slot 0x4
2,900,106 UART: [art] Derive Key Pair
2,900,466 UART: [art] Store priv key in slot 0x5
2,914,112 UART: [art] Derive Key Pair - Done
2,928,819 UART: [art] Signing Cert with AUTHO
2,929,299 UART: RITY.KEYID = 7
2,944,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,020 UART: [art] PUB.X = 5E22645EC72D6C133C8395E564FED8AC3AC459DF8E0A058C899BDDC95C0B85BA552F61E167DCD00A12511218B3242F13
2,951,786 UART: [art] PUB.Y = FDC985ABEA98A464F35FCA69175677DBAD5945A36B4515EF7398B03B33D134B257F9A32891DC5E7740547DA3582CC682
2,958,740 UART: [art] SIG.R = 680C4BD07831C4D830B81205A2F40A88C9A4553548D1DE86B6AAF082346B2E54858EEC92CD740E129F2795F5D2C4A4A8
2,965,500 UART: [art] SIG.S = 92483ECF9DA9751424646E7F46E8B875952D3080E5BCE27D4742F7F768C2392B7C72E5B7D308C2091BB5FF392AA6B2C0
2,988,981 UART: Caliptra RT
2,989,234 UART: [state] CFI Enabled
3,096,943 UART: [rt] RT listening for mailbox commands...
3,097,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,669 UART: [rt]cmd =0x41544d4e, len=14344
3,530,325 >>> mbox cmd response data (8 bytes)
3,530,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,305 UART: [rt]cmd =0x41545348, len=116
3,562,386 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,492 UART: [kat] SHA2-256
904,432 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
918,817 UART: [kat] HMAC-384Kdf
923,637 UART: [kat] LMS
1,171,965 UART: [kat] --
1,172,946 UART: [cold-reset] ++
1,173,356 UART: [fht] FHT @ 0x50003400
1,175,927 UART: [idev] ++
1,176,095 UART: [idev] CDI.KEYID = 6
1,176,455 UART: [idev] SUBJECT.KEYID = 7
1,176,879 UART: [idev] UDS.KEYID = 0
1,177,224 ready_for_fw is high
1,177,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,541 UART: [idev] Erasing UDS.KEYID = 0
1,201,544 UART: [idev] Sha1 KeyId Algorithm
1,210,042 UART: [idev] --
1,211,038 UART: [ldev] ++
1,211,206 UART: [ldev] CDI.KEYID = 6
1,211,569 UART: [ldev] SUBJECT.KEYID = 5
1,211,995 UART: [ldev] AUTHORITY.KEYID = 7
1,212,458 UART: [ldev] FE.KEYID = 1
1,217,614 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,160 UART: [ldev] --
1,283,493 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,963 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,936 >>> mbox cmd response: success
2,773,150 UART: [afmc] ++
2,773,318 UART: [afmc] CDI.KEYID = 6
2,773,680 UART: [afmc] SUBJECT.KEYID = 7
2,774,105 UART: [afmc] AUTHORITY.KEYID = 5
2,809,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,785 UART: [afmc] --
2,852,689 UART: [cold-reset] --
2,853,657 UART: [state] Locking Datavault
2,854,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,540 UART: [state] Locking ICCM
2,856,038 UART: [exit] Launching FMC @ 0x40000130
2,861,367 UART:
2,861,383 UART: Running Caliptra FMC ...
2,861,791 UART:
2,861,934 UART: [state] CFI Enabled
2,872,541 UART: [fht] FMC Alias Private Key: 7
2,980,182 UART: [art] Extend RT PCRs Done
2,980,610 UART: [art] Lock RT PCRs Done
2,982,390 UART: [art] Populate DV Done
2,990,737 UART: [fht] FMC Alias Private Key: 7
2,991,877 UART: [art] Derive CDI
2,992,157 UART: [art] Store in in slot 0x4
3,077,912 UART: [art] Derive Key Pair
3,078,272 UART: [art] Store priv key in slot 0x5
3,091,660 UART: [art] Derive Key Pair - Done
3,106,898 UART: [art] Signing Cert with AUTHO
3,107,378 UART: RITY.KEYID = 7
3,122,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,383 UART: [art] PUB.X = 92330855C380167158F7676FF184F2A02706AEC6A829C654DCD2B6B40F60B613CA9F62352F48F2F83004BA92B5094D65
3,130,132 UART: [art] PUB.Y = 98294C0636968BB5DFABFEF54355020B57010C5D4B9CFEB6963FB487979385856CC88EA6467448E224E55836A8E4BDB8
3,137,067 UART: [art] SIG.R = 82B23C26CE80BCC883AA1465683B5B840B41750ABA2124B1DA7B5551D18434702B2BBCFB9A9432EDA46AEE77E1ECF8DA
3,143,847 UART: [art] SIG.S = 945CC6FA44F29553B88EE9443E587E1326987670308337A14184402D3E372EE414638A18DF80431027EC2C10A9C25D4F
3,167,358 UART: Caliptra RT
3,167,703 UART: [state] CFI Enabled
3,275,089 UART: [rt] RT listening for mailbox commands...
3,275,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,815 UART: [rt]cmd =0x41544d4e, len=14344
3,708,954 >>> mbox cmd response data (8 bytes)
3,708,955 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,982 UART: [rt]cmd =0x41545348, len=116
3,760,217 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
901,904 UART: [kat] SHA2-256
903,844 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,717 UART: [kat] LMS
1,171,045 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,381 UART: [idev] ++
1,175,549 UART: [idev] CDI.KEYID = 6
1,175,909 UART: [idev] SUBJECT.KEYID = 7
1,176,333 UART: [idev] UDS.KEYID = 0
1,176,678 ready_for_fw is high
1,176,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,289 UART: [idev] Erasing UDS.KEYID = 0
1,201,414 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,442 UART: [ldev] Erasing FE.KEYID = 1
1,243,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,092 UART: [ldev] --
1,282,463 UART: [fwproc] Wait for Commands...
1,283,087 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,964 >>> mbox cmd response: success
2,771,156 UART: [afmc] ++
2,771,324 UART: [afmc] CDI.KEYID = 6
2,771,686 UART: [afmc] SUBJECT.KEYID = 7
2,772,111 UART: [afmc] AUTHORITY.KEYID = 5
2,807,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,613 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,903 UART: [afmc] --
2,850,945 UART: [cold-reset] --
2,851,757 UART: [state] Locking Datavault
2,852,976 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,580 UART: [state] Locking ICCM
2,854,030 UART: [exit] Launching FMC @ 0x40000130
2,859,359 UART:
2,859,375 UART: Running Caliptra FMC ...
2,859,783 UART:
2,859,926 UART: [state] CFI Enabled
2,870,421 UART: [fht] FMC Alias Private Key: 7
2,979,044 UART: [art] Extend RT PCRs Done
2,979,472 UART: [art] Lock RT PCRs Done
2,980,986 UART: [art] Populate DV Done
2,989,329 UART: [fht] FMC Alias Private Key: 7
2,990,429 UART: [art] Derive CDI
2,990,709 UART: [art] Store in in slot 0x4
3,076,430 UART: [art] Derive Key Pair
3,076,790 UART: [art] Store priv key in slot 0x5
3,090,968 UART: [art] Derive Key Pair - Done
3,105,931 UART: [art] Signing Cert with AUTHO
3,106,411 UART: RITY.KEYID = 7
3,121,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,142 UART: [art] PUB.X = 63CCA0B6A4AAB7F66DAD111720E921D8D109624F24FCBC0635F7386DEAE71CAFCBD013FF20A60068A157AFED126A543E
3,128,904 UART: [art] PUB.Y = 8498EFBCFCB204A3D04A55A34F6C1755B01FEEDB3017169C5768318DD0D81A6E4DF8675218F6620C91C2AAB85B40A7FE
3,135,860 UART: [art] SIG.R = 98583A8A3851227B54C47A9164E647DFCB4B79C3F0F78BEB619BE3BF7833FF92B9388C227B6B2E18E5C51F3BE12DDF2B
3,142,642 UART: [art] SIG.S = 341D089B019D5EE39B0EBA59532F0145669257A8C3511105D7ADC5ECBA0E25FB746B1CEE5340CD47A1C50048FB1460FA
3,165,623 UART: Caliptra RT
3,165,968 UART: [state] CFI Enabled
3,273,423 UART: [rt] RT listening for mailbox commands...
3,274,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,087 UART: [rt]cmd =0x41544d4e, len=14344
3,707,379 >>> mbox cmd response data (8 bytes)
3,707,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,579 UART: [rt]cmd =0x41545348, len=116
3,739,560 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,988 ready_for_fw is high
1,059,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,415 >>> mbox cmd response: success
2,685,891 UART:
2,685,907 UART: Running Caliptra FMC ...
2,686,315 UART:
2,686,458 UART: [state] CFI Enabled
2,697,287 UART: [fht] FMC Alias Private Key: 7
2,805,286 UART: [art] Extend RT PCRs Done
2,805,714 UART: [art] Lock RT PCRs Done
2,807,398 UART: [art] Populate DV Done
2,815,445 UART: [fht] FMC Alias Private Key: 7
2,816,415 UART: [art] Derive CDI
2,816,695 UART: [art] Store in in slot 0x4
2,902,392 UART: [art] Derive Key Pair
2,902,752 UART: [art] Store priv key in slot 0x5
2,916,196 UART: [art] Derive Key Pair - Done
2,930,916 UART: [art] Signing Cert with AUTHO
2,931,396 UART: RITY.KEYID = 7
2,946,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,487 UART: [art] PUB.X = 333CA7D16239840F796D2A796AE1BDA2CF89A536DC0020878C8E250F30A267F0EF623FCE797EED2F1443BC176B7A4B57
2,954,237 UART: [art] PUB.Y = 9C39FF0A87E5BA76FC3E11B142E4F49F16992BEE28C1CD6746C06A207524E79FA8A842C9A569F0D6524BCD9F33E560C3
2,961,194 UART: [art] SIG.R = 6AFA3DCA14796B8C2E0E68589925C4D63F809F9779B36D9BFA6BDDE43356EDB1E5FD98A8C7C87D0F0BADEC27CCF965A0
2,967,979 UART: [art] SIG.S = 1A8883F7528C45D56BACE892F23609E8859CF784C17893F964147EEF13B217AA68E24086ABD424BB7C854D9C444AA586
2,991,779 UART: Caliptra RT
2,992,124 UART: [state] CFI Enabled
3,099,973 UART: [rt] RT listening for mailbox commands...
3,100,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,603 UART: [rt]cmd =0x41544d4e, len=14344
3,533,546 >>> mbox cmd response data (8 bytes)
3,533,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,676 UART: [rt]cmd =0x41545348, len=116
3,585,161 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,438 ready_for_fw is high
1,060,438 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,383 >>> mbox cmd response: success
2,682,219 UART:
2,682,235 UART: Running Caliptra FMC ...
2,682,643 UART:
2,682,786 UART: [state] CFI Enabled
2,693,285 UART: [fht] FMC Alias Private Key: 7
2,801,034 UART: [art] Extend RT PCRs Done
2,801,462 UART: [art] Lock RT PCRs Done
2,803,152 UART: [art] Populate DV Done
2,811,523 UART: [fht] FMC Alias Private Key: 7
2,812,505 UART: [art] Derive CDI
2,812,785 UART: [art] Store in in slot 0x4
2,898,632 UART: [art] Derive Key Pair
2,898,992 UART: [art] Store priv key in slot 0x5
2,912,548 UART: [art] Derive Key Pair - Done
2,927,459 UART: [art] Signing Cert with AUTHO
2,927,939 UART: RITY.KEYID = 7
2,942,935 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,700 UART: [art] PUB.X = A39BDCB4D7ABC4B3ED4F5C96EC6EB69143E696FC444500FB9B5E57145529BFF2C549615B9288012F3705878AFF3409BC
2,950,449 UART: [art] PUB.Y = E2E9E55322DA550850877971373CE693CD0E95B1915A99C054EBBB668B2DB8E9FF5BA19ABF0A4FB53B23B95D1D3D5995
2,957,400 UART: [art] SIG.R = 7A8CB666377B1286A66A2A2CEE4B4AB001C7BDCC5F16E8E16D90C43FCB9AE9257268C844EE11B850292106D5A4C5A056
2,964,174 UART: [art] SIG.S = 1E9188844C3E57164B3577BDDCCEC1C441D268DD9E98AC7213578BB377CF7D844B8AEDA8EDBA9116C46C7CBF1150FB51
2,987,765 UART: Caliptra RT
2,988,110 UART: [state] CFI Enabled
3,096,323 UART: [rt] RT listening for mailbox commands...
3,096,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,869 UART: [rt]cmd =0x41544d4e, len=14344
3,529,901 >>> mbox cmd response data (8 bytes)
3,529,902 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,863 UART: [rt]cmd =0x41545348, len=116
3,561,774 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,877 UART: [state] WD Timer not started. Device not locked for debugging
88,232 UART: [kat] SHA2-256
891,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,911 UART: [kat] ++
896,063 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,916 UART: [kat] SHA2-512-ACC
906,817 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,976 UART: [kat] LMS
1,169,288 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,174,675 ready_for_fw is high
1,174,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,497 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,453 UART: [idev] --
1,209,304 UART: [ldev] ++
1,209,472 UART: [ldev] CDI.KEYID = 6
1,209,836 UART: [ldev] SUBJECT.KEYID = 5
1,210,263 UART: [ldev] AUTHORITY.KEYID = 7
1,210,726 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,241,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,326 UART: [ldev] --
1,280,828 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x46574c44
1,282,310 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,075 >>> mbox cmd response: success
2,769,278 UART: [afmc] ++
2,769,446 UART: [afmc] CDI.KEYID = 6
2,769,809 UART: [afmc] SUBJECT.KEYID = 7
2,770,235 UART: [afmc] AUTHORITY.KEYID = 5
2,805,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,811 UART: [afmc] --
2,848,747 UART: [cold-reset] --
2,849,557 UART: [state] Locking Datavault
2,850,668 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,272 UART: [state] Locking ICCM
2,851,844 UART: [exit] Launching FMC @ 0x40000130
2,857,173 UART:
2,857,189 UART: Running Caliptra FMC ...
2,857,597 UART:
2,857,651 UART: [state] CFI Enabled
2,868,422 UART: [fht] FMC Alias Private Key: 7
2,976,511 UART: [art] Extend RT PCRs Done
2,976,939 UART: [art] Lock RT PCRs Done
2,978,539 UART: [art] Populate DV Done
2,986,940 UART: [fht] FMC Alias Private Key: 7
2,988,094 UART: [art] Derive CDI
2,988,374 UART: [art] Store in in slot 0x4
3,073,845 UART: [art] Derive Key Pair
3,074,205 UART: [art] Store priv key in slot 0x5
3,087,139 UART: [art] Derive Key Pair - Done
3,101,864 UART: [art] Signing Cert with AUTHO
3,102,344 UART: RITY.KEYID = 7
3,117,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,521 UART: [art] PUB.X = A6F480F76A1CD9AF545E559AA02F51527E26B6908EB6990542DCAD2D9F1F22C4060875591A35D230E074F6F03EC6D169
3,125,284 UART: [art] PUB.Y = 88EEC627F0157BAA47C51436FE6C3B8F56C2B8FCDD69425F74C3D0608D3D6060E34C098817457FC7B4B2796400B289D2
3,132,211 UART: [art] SIG.R = DEA2992840ADAD8C0F1DEC7716528777A02E507CE8C7EFF467A23586D14EC34C676FB8275C55858714AA97D4EF72FAE9
3,138,988 UART: [art] SIG.S = 11C6EDADE12A051AF7E205A77C028A9D02E7DCDB1DB329CE504304517123D64FC76059740BCC396BCB5D6A6B7D2BEBE7
3,162,763 UART: Caliptra RT
3,163,016 UART: [state] CFI Enabled
3,270,715 UART: [rt] RT listening for mailbox commands...
3,271,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,541 UART: [rt]cmd =0x41544d4e, len=14344
3,704,638 >>> mbox cmd response data (8 bytes)
3,704,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,832 UART: [rt]cmd =0x41545348, len=116
3,758,617 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,174,227 ready_for_fw is high
1,174,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,215,530 UART: [ldev] Erasing FE.KEYID = 1
1,241,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,642 UART: [ldev] --
1,281,138 UART: [fwproc] Wait for Commands...
1,281,801 UART: [fwproc] Recv command 0x46574c44
1,282,534 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,097 >>> mbox cmd response: success
2,770,124 UART: [afmc] ++
2,770,292 UART: [afmc] CDI.KEYID = 6
2,770,655 UART: [afmc] SUBJECT.KEYID = 7
2,771,081 UART: [afmc] AUTHORITY.KEYID = 5
2,807,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,529 UART: [afmc] --
2,850,649 UART: [cold-reset] --
2,851,515 UART: [state] Locking Datavault
2,852,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,084 UART: [state] Locking ICCM
2,853,550 UART: [exit] Launching FMC @ 0x40000130
2,858,879 UART:
2,858,895 UART: Running Caliptra FMC ...
2,859,303 UART:
2,859,357 UART: [state] CFI Enabled
2,869,432 UART: [fht] FMC Alias Private Key: 7
2,977,291 UART: [art] Extend RT PCRs Done
2,977,719 UART: [art] Lock RT PCRs Done
2,979,291 UART: [art] Populate DV Done
2,987,732 UART: [fht] FMC Alias Private Key: 7
2,988,822 UART: [art] Derive CDI
2,989,102 UART: [art] Store in in slot 0x4
3,074,669 UART: [art] Derive Key Pair
3,075,029 UART: [art] Store priv key in slot 0x5
3,088,837 UART: [art] Derive Key Pair - Done
3,103,641 UART: [art] Signing Cert with AUTHO
3,104,121 UART: RITY.KEYID = 7
3,119,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,880 UART: [art] PUB.X = FAFF2BDF1CDA8D4FAFDBBBA2E3307A56879BF2715B37A32A28BBC3F7A5F76ECD7A825FEF5B3D43D0210439DA6B08CC44
3,126,676 UART: [art] PUB.Y = 38C68C50E451DBC1CDE967BB3F8B8F162CC0F94C73FC1F61FE947C4C9BCCB889C5EFE0CF3169586970F9EC613442C52E
3,133,644 UART: [art] SIG.R = 15F3FFE7A02C2EE153D90663971E87CA0A58A900755C66DA68094102F73559C626590B53D4D54CBEB7C1EC12E78D7B70
3,140,379 UART: [art] SIG.S = 1755CE628EFC1F2E63A234D2073C47F80188E2A11255BD10E3BDAEF8926A5739C142794E547EE0EEF547EF1C89C69782
3,164,280 UART: Caliptra RT
3,164,533 UART: [state] CFI Enabled
3,272,572 UART: [rt] RT listening for mailbox commands...
3,273,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,376 UART: [rt]cmd =0x41544d4e, len=14344
3,705,942 >>> mbox cmd response data (8 bytes)
3,705,943 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,140 UART: [rt]cmd =0x41545348, len=116
3,738,155 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,530 ready_for_fw is high
1,056,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,977 >>> mbox cmd response: success
2,681,621 UART:
2,681,637 UART: Running Caliptra FMC ...
2,682,045 UART:
2,682,099 UART: [state] CFI Enabled
2,692,774 UART: [fht] FMC Alias Private Key: 7
2,800,879 UART: [art] Extend RT PCRs Done
2,801,307 UART: [art] Lock RT PCRs Done
2,802,593 UART: [art] Populate DV Done
2,811,058 UART: [fht] FMC Alias Private Key: 7
2,812,162 UART: [art] Derive CDI
2,812,442 UART: [art] Store in in slot 0x4
2,897,741 UART: [art] Derive Key Pair
2,898,101 UART: [art] Store priv key in slot 0x5
2,910,783 UART: [art] Derive Key Pair - Done
2,925,684 UART: [art] Signing Cert with AUTHO
2,926,164 UART: RITY.KEYID = 7
2,941,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,801 UART: [art] PUB.X = E9856814E052883CE4B50A8976D6694AF9BC2D4BBA58D903D43496583D92D66108162D67B214224EA41DC8189CB62D3B
2,948,558 UART: [art] PUB.Y = EB68C223AD3860900B418E6B3D2012AD58D511DE4ACE6770787E59FDE4851A207B93E69D4F3F1845E60C0DD6950E3E88
2,955,500 UART: [art] SIG.R = E205D954D6CC5D71E7FBB4288EC2F6AD1BA0FE05A1A49C536E5D1B19C1EDC7C8429069AA9D2BAB4B27C801899F52C29A
2,962,281 UART: [art] SIG.S = 8773AC9DB5609CD17F4FBBB36E4320FB92F9C02A9E63720C972D05A464E5C050D111F0797AC07A3E24B1D57B431B4B91
2,985,694 UART: Caliptra RT
2,985,947 UART: [state] CFI Enabled
3,092,763 UART: [rt] RT listening for mailbox commands...
3,093,433 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,665 UART: [rt]cmd =0x41544d4e, len=14344
3,526,346 >>> mbox cmd response data (8 bytes)
3,526,347 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,318 UART: [rt]cmd =0x41545348, len=116
3,578,157 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,764 ready_for_fw is high
1,054,764 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,935 >>> mbox cmd response: success
2,680,693 UART:
2,680,709 UART: Running Caliptra FMC ...
2,681,117 UART:
2,681,171 UART: [state] CFI Enabled
2,691,462 UART: [fht] FMC Alias Private Key: 7
2,799,105 UART: [art] Extend RT PCRs Done
2,799,533 UART: [art] Lock RT PCRs Done
2,801,063 UART: [art] Populate DV Done
2,809,356 UART: [fht] FMC Alias Private Key: 7
2,810,420 UART: [art] Derive CDI
2,810,700 UART: [art] Store in in slot 0x4
2,896,203 UART: [art] Derive Key Pair
2,896,563 UART: [art] Store priv key in slot 0x5
2,909,495 UART: [art] Derive Key Pair - Done
2,924,378 UART: [art] Signing Cert with AUTHO
2,924,858 UART: RITY.KEYID = 7
2,939,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,757 UART: [art] PUB.X = C8A4473F3CC308D439436952CCA34D0E034CE72C5CE5BB72CCF4B75272453DC8D00CAC4D1F5D834B9AAB77F7216EB031
2,947,529 UART: [art] PUB.Y = 338AEF400072BCF6F99F17145DAB30D93A25BC734B79E1977F0277BE185D750E57C32DA4CAE0E362D937CDFE6DACBE1B
2,954,469 UART: [art] SIG.R = 81803054BE4507F95C2633386B180EE2CC0CD1253F45FB8C840700FFD278FE17812C047314DB1E645FB9E3DD78D751AD
2,961,204 UART: [art] SIG.S = 49A3A1B1E780ECA2A79D89204613F34AAA1993AFB37CC5EA76D87678F53AF79D530FD5A03EACA4F18C29EDEC8DA7CAB8
2,984,702 UART: Caliptra RT
2,984,955 UART: [state] CFI Enabled
3,092,196 UART: [rt] RT listening for mailbox commands...
3,092,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,782 UART: [rt]cmd =0x41544d4e, len=14344
3,525,840 >>> mbox cmd response data (8 bytes)
3,525,841 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,792 UART: [rt]cmd =0x41545348, len=116
3,557,831 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 ready_for_fw is high
1,174,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,198,890 UART: [idev] Sha1 KeyId Algorithm
1,207,642 UART: [idev] --
1,208,629 UART: [ldev] ++
1,208,797 UART: [ldev] CDI.KEYID = 6
1,209,161 UART: [ldev] SUBJECT.KEYID = 5
1,209,588 UART: [ldev] AUTHORITY.KEYID = 7
1,210,051 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,905 UART: [ldev] --
1,281,251 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,002 >>> mbox cmd response: success
2,769,175 UART: [afmc] ++
2,769,343 UART: [afmc] CDI.KEYID = 6
2,769,706 UART: [afmc] SUBJECT.KEYID = 7
2,770,132 UART: [afmc] AUTHORITY.KEYID = 5
2,805,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,952 UART: [afmc] --
2,848,934 UART: [cold-reset] --
2,849,710 UART: [state] Locking Datavault
2,851,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,733 UART: [state] Locking ICCM
2,852,173 UART: [exit] Launching FMC @ 0x40000130
2,857,502 UART:
2,857,518 UART: Running Caliptra FMC ...
2,857,926 UART:
2,858,069 UART: [state] CFI Enabled
2,868,338 UART: [fht] FMC Alias Private Key: 7
2,976,655 UART: [art] Extend RT PCRs Done
2,977,083 UART: [art] Lock RT PCRs Done
2,978,651 UART: [art] Populate DV Done
2,986,844 UART: [fht] FMC Alias Private Key: 7
2,987,792 UART: [art] Derive CDI
2,988,072 UART: [art] Store in in slot 0x4
3,073,697 UART: [art] Derive Key Pair
3,074,057 UART: [art] Store priv key in slot 0x5
3,087,407 UART: [art] Derive Key Pair - Done
3,102,127 UART: [art] Signing Cert with AUTHO
3,102,607 UART: RITY.KEYID = 7
3,117,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,420 UART: [art] PUB.X = 66A0CB93023FD2E53D47D73D551163972B6B426C57B26715679F35E81B4F9DC6FF00245444FB55EC32265D2D15083230
3,125,154 UART: [art] PUB.Y = 741E0CA307DD131CE70A26EB60D83DAF32C341F1FE9D5A94414D79B399E416FC52A30696A9C7D1C439BB391F4BF398A0
3,132,102 UART: [art] SIG.R = 36EB453E9C840577074EF11B0DDC3C2ACCBC4D6CB9E1463FB4C656784E3EC96A720EE19762E7DDE7247B265A4F5D0B04
3,138,868 UART: [art] SIG.S = 912C94D0199B9C3CF8DDA3AE8319CA4C8804CDE8E2DB09C2A3167CDD322A6A3239A219BBE5BDEE84762AEF693180841D
3,163,249 UART: Caliptra RT
3,163,594 UART: [state] CFI Enabled
3,271,753 UART: [rt] RT listening for mailbox commands...
3,272,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,827 UART: [rt]cmd =0x41544d4e, len=14344
3,705,508 >>> mbox cmd response data (8 bytes)
3,705,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,736 UART: [rt]cmd =0x41545348, len=116
3,757,417 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
921,117 UART: [kat] LMS
1,169,429 UART: [kat] --
1,170,014 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,174,230 ready_for_fw is high
1,174,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,198,592 UART: [idev] Sha1 KeyId Algorithm
1,207,428 UART: [idev] --
1,208,603 UART: [ldev] ++
1,208,771 UART: [ldev] CDI.KEYID = 6
1,209,135 UART: [ldev] SUBJECT.KEYID = 5
1,209,562 UART: [ldev] AUTHORITY.KEYID = 7
1,210,025 UART: [ldev] FE.KEYID = 1
1,215,345 UART: [ldev] Erasing FE.KEYID = 1
1,241,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,967 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,170 >>> mbox cmd response: success
2,770,221 UART: [afmc] ++
2,770,389 UART: [afmc] CDI.KEYID = 6
2,770,752 UART: [afmc] SUBJECT.KEYID = 7
2,771,178 UART: [afmc] AUTHORITY.KEYID = 5
2,806,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,168 UART: [afmc] --
2,850,280 UART: [cold-reset] --
2,851,126 UART: [state] Locking Datavault
2,852,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,679 UART: [state] Locking ICCM
2,853,237 UART: [exit] Launching FMC @ 0x40000130
2,858,566 UART:
2,858,582 UART: Running Caliptra FMC ...
2,858,990 UART:
2,859,133 UART: [state] CFI Enabled
2,869,796 UART: [fht] FMC Alias Private Key: 7
2,977,765 UART: [art] Extend RT PCRs Done
2,978,193 UART: [art] Lock RT PCRs Done
2,979,755 UART: [art] Populate DV Done
2,988,054 UART: [fht] FMC Alias Private Key: 7
2,988,984 UART: [art] Derive CDI
2,989,264 UART: [art] Store in in slot 0x4
3,075,093 UART: [art] Derive Key Pair
3,075,453 UART: [art] Store priv key in slot 0x5
3,088,203 UART: [art] Derive Key Pair - Done
3,103,129 UART: [art] Signing Cert with AUTHO
3,103,609 UART: RITY.KEYID = 7
3,118,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,268 UART: [art] PUB.X = 3E7E64C398142A46A90650332791530D006E252021CF36F50A8361FF361A271EF03D6A035B4ADEE2D45253E2457FD152
3,125,996 UART: [art] PUB.Y = 46F34EBE81AFC95E6E7D05EB0837DA239872A12FE8EE16C6CB8D2EED01695224E6090C3CDD9440EB167644D6CE1FCA24
3,132,947 UART: [art] SIG.R = BA3493D95F99EC0D57EAD899736E614C5DEC96E4BD58E54C88C15918CD1D1A3F7086D7B20A06D83B19B349B48309481F
3,139,711 UART: [art] SIG.S = 9685D5F422718256425D02F4ABAC15161A0C35D48B9BAE3DCCC7155F7618136225868472C00053E59B5D25556ED9C53B
3,163,648 UART: Caliptra RT
3,163,993 UART: [state] CFI Enabled
3,272,539 UART: [rt] RT listening for mailbox commands...
3,273,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,141 UART: [rt]cmd =0x41544d4e, len=14344
3,705,707 >>> mbox cmd response data (8 bytes)
3,705,708 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,837 UART: [rt]cmd =0x41545348, len=116
3,737,788 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,239 ready_for_fw is high
1,055,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,274 >>> mbox cmd response: success
2,680,812 UART:
2,680,828 UART: Running Caliptra FMC ...
2,681,236 UART:
2,681,379 UART: [state] CFI Enabled
2,692,046 UART: [fht] FMC Alias Private Key: 7
2,800,389 UART: [art] Extend RT PCRs Done
2,800,817 UART: [art] Lock RT PCRs Done
2,802,357 UART: [art] Populate DV Done
2,810,736 UART: [fht] FMC Alias Private Key: 7
2,811,788 UART: [art] Derive CDI
2,812,068 UART: [art] Store in in slot 0x4
2,897,973 UART: [art] Derive Key Pair
2,898,333 UART: [art] Store priv key in slot 0x5
2,912,023 UART: [art] Derive Key Pair - Done
2,926,541 UART: [art] Signing Cert with AUTHO
2,927,021 UART: RITY.KEYID = 7
2,942,327 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,092 UART: [art] PUB.X = B7A3F6ECAA70867CF763C32D28439F26592B9F4C583067E9CFAE7E773C88ED71BEC229BE404D618D26DF59592E4CE7F7
2,949,874 UART: [art] PUB.Y = FCC9E9EC7FFA8A2E325CC793D09ACE1666E4EE4B8EF90ECFFBB61A1C61B328DD123B15CAAADEA843FDF3212CDCA916A7
2,956,859 UART: [art] SIG.R = BE95B6AEA82AE50C958A10B6E267BD5A00F0B2510CBE2B74E22C3F1E7D41230D954070633B12A3EAA36C5BBA3865D51E
2,963,612 UART: [art] SIG.S = 805613BEEFA7249B3A2992BF35BE80655BF0E891BC9867F15D9E85D41CAA3382C78DD72B4C26D2A949FFF4A5B48DCCA2
2,987,701 UART: Caliptra RT
2,988,046 UART: [state] CFI Enabled
3,095,544 UART: [rt] RT listening for mailbox commands...
3,096,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,208 UART: [rt]cmd =0x41544d4e, len=14344
3,529,001 >>> mbox cmd response data (8 bytes)
3,529,002 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,089 UART: [rt]cmd =0x41545348, len=116
3,580,852 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,111 ready_for_fw is high
1,057,111 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,268 >>> mbox cmd response: success
2,682,160 UART:
2,682,176 UART: Running Caliptra FMC ...
2,682,584 UART:
2,682,727 UART: [state] CFI Enabled
2,693,134 UART: [fht] FMC Alias Private Key: 7
2,801,331 UART: [art] Extend RT PCRs Done
2,801,759 UART: [art] Lock RT PCRs Done
2,803,543 UART: [art] Populate DV Done
2,811,566 UART: [fht] FMC Alias Private Key: 7
2,812,702 UART: [art] Derive CDI
2,812,982 UART: [art] Store in in slot 0x4
2,898,949 UART: [art] Derive Key Pair
2,899,309 UART: [art] Store priv key in slot 0x5
2,913,043 UART: [art] Derive Key Pair - Done
2,928,060 UART: [art] Signing Cert with AUTHO
2,928,540 UART: RITY.KEYID = 7
2,944,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,961 UART: [art] PUB.X = BC5583CB614F3832481C27B109F05B8772702AAADC36AA834B7C14C044800E467A8A5772F0D7AABB4140927D6417287A
2,951,723 UART: [art] PUB.Y = E4591FAE04945C3D4D84EDEBBE4E1A85C43E90B9625F198FE4D79F75BDB1A733F04BB7312DBD72FE98EF1DF9EACCD055
2,958,696 UART: [art] SIG.R = A8114C1B11393F751A7E421ECD57D1D0CCD3E1182F9FFA53EDD5C929B1F974E8B073869305009B1B941FA42DC7B5855B
2,965,449 UART: [art] SIG.S = 1F5EB0AA6659B2798BC94A859E9F4328DB5DB4154FF20FE5634CC783841AC38D07D7EDAE31B9180B8622F650A27E4C11
2,989,231 UART: Caliptra RT
2,989,576 UART: [state] CFI Enabled
3,097,223 UART: [rt] RT listening for mailbox commands...
3,097,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,031 UART: [rt]cmd =0x41544d4e, len=14344
3,530,691 >>> mbox cmd response data (8 bytes)
3,530,692 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,807 UART: [rt]cmd =0x41545348, len=116
3,562,664 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,404 writing to cptra_bootfsm_go
193,640 UART:
193,998 UART: Running Caliptra ROM ...
195,093 UART:
195,241 UART: [state] CFI Enabled
268,109 UART: [state] LifecycleState = Unprovisioned
270,087 UART: [state] DebugLocked = No
271,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,568 UART: [kat] SHA2-256
446,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,823 UART: [kat] ++
457,271 UART: [kat] sha1
468,350 UART: [kat] SHA2-256
471,003 UART: [kat] SHA2-384
475,720 UART: [kat] SHA2-512-ACC
478,090 UART: [kat] ECC-384
2,769,053 UART: [kat] HMAC-384Kdf
2,802,699 UART: [kat] LMS
3,993,010 UART: [kat] --
3,996,084 UART: [cold-reset] ++
3,997,165 UART: [fht] Storing FHT @ 0x50003400
4,009,441 UART: [idev] ++
4,010,057 UART: [idev] CDI.KEYID = 6
4,010,954 UART: [idev] SUBJECT.KEYID = 7
4,012,224 UART: [idev] UDS.KEYID = 0
4,013,266 ready_for_fw is high
4,013,464 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,412 UART: [idev] Erasing UDS.KEYID = 0
7,346,434 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,237 UART: [idev] --
7,372,312 UART: [ldev] ++
7,372,944 UART: [ldev] CDI.KEYID = 6
7,373,866 UART: [ldev] SUBJECT.KEYID = 5
7,375,077 UART: [ldev] AUTHORITY.KEYID = 7
7,376,368 UART: [ldev] FE.KEYID = 1
7,425,684 UART: [ldev] Erasing FE.KEYID = 1
10,756,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,864 UART: [ldev] --
13,118,321 UART: [fwproc] Waiting for Commands...
13,121,440 UART: [fwproc] Received command 0x46574c44
13,123,714 UART: [fwproc] Received Image of size 113760 bytes
17,173,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,635,741 >>> mbox cmd response: success
17,640,375 UART: [afmc] ++
17,640,975 UART: [afmc] CDI.KEYID = 6
17,641,891 UART: [afmc] SUBJECT.KEYID = 7
17,643,158 UART: [afmc] AUTHORITY.KEYID = 5
21,012,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,427 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,867 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,694 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,094 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,269 UART: [afmc] --
23,382,138 UART: [cold-reset] --
23,385,727 UART: [state] Locking Datavault
23,390,215 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,916 UART: [state] Locking ICCM
23,393,315 UART: [exit] Launching FMC @ 0x40000130
23,401,708 UART:
23,401,940 UART: Running Caliptra FMC ...
23,403,042 UART:
23,403,211 UART: [state] CFI Enabled
23,469,228 UART: [fht] FMC Alias Private Key: 7
25,807,543 UART: [art] Extend RT PCRs Done
25,808,771 UART: [art] Lock RT PCRs Done
25,810,445 UART: [art] Populate DV Done
25,815,749 UART: [fht] FMC Alias Private Key: 7
25,817,393 UART: [art] Derive CDI
25,818,201 UART: [art] Store in in slot 0x4
25,863,003 UART: [art] Derive Key Pair
25,864,046 UART: [art] Store priv key in slot 0x5
29,156,928 UART: [art] Derive Key Pair - Done
29,169,813 UART: [art] Signing Cert with AUTHO
29,171,113 UART: RITY.KEYID = 7
31,458,824 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,335 UART: [art] PUB.X = C185601464B7018A34B2F7C54256973006807E52D8E4BB7B560F845ADEF4A38AB15164EF881460923CA6E13A6441E143
31,467,526 UART: [art] PUB.Y = 124102077504C3A4D2B12CCF1D282BE750892D3D43902121AD08C1FD1166F2608ECF973D1D29E59E398F90CFFC3F9283
31,474,753 UART: [art] SIG.R = 96C0188F7040CE957CE563DFA08E7C9C2A8272575BF4367E77F41676056E723048EB2BC40A5B2831D3E960EDAAAA30D6
31,482,144 UART: [art] SIG.S = 5FA468A532A47FD2B455AB512A3E886D1F15905B477A5A4F003224251BEC4AB9532696F832D3EF1216BAA8B7D40B0C86
32,787,323 UART: Caliptra RT
32,788,033 UART: [state] CFI Enabled
32,947,705 UART: [rt] RT listening for mailbox commands...
36,989,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,145,216 UART: [rt]cmd =0x41544d4e, len=14344
42,445,903 >>> mbox cmd response data (8 bytes)
42,446,654 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,477,247 UART: [rt]cmd =0x41545348, len=116
42,497,138 >>> mbox cmd response data (12 bytes)
44,543,809 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
44,644,246 UART:
44,644,610 UART: Running Caliptra ROM ...
44,645,742 UART:
44,645,908 UART: [state] CFI Enabled
44,703,622 UART: [state] LifecycleState = Unprovisioned
44,705,519 UART: [state] DebugLocked = No
44,707,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,712,617 UART: [kat] SHA2-256
44,882,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,892,836 UART: [kat] ++
44,893,302 UART: [kat] sha1
44,903,487 UART: [kat] SHA2-256
44,906,231 UART: [kat] SHA2-384
44,911,620 UART: [kat] SHA2-512-ACC
44,914,020 UART: [kat] ECC-384
47,206,072 UART: [kat] HMAC-384Kdf
47,237,792 UART: [kat] LMS
48,428,108 UART: [kat] --
48,433,022 UART: [update-reset] ++
52,137,835 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,141,535 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
52,399,085 >>> mbox cmd response: success
52,399,460 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,400,299 UART: [update-reset] Copying MAN_2 To MAN_1
52,422,684 UART: [update-reset Success] --
52,429,224 UART: [state] Locking Datavault
52,433,779 UART: [state] Locking PCR0, PCR1 and PCR31
52,435,543 UART: [state] Locking ICCM
52,437,224 UART: [exit] Launching FMC @ 0x40000130
52,445,621 UART:
52,445,858 UART: Running Caliptra FMC ...
52,446,959 UART:
52,447,116 UART: [state] CFI Enabled
52,539,569 UART: [art] Extend RT PCRs Done
52,540,754 UART: [art] Lock RT PCRs Done
52,542,102 UART: [art] Populate DV Done
52,547,574 UART: [fht] FMC Alias Private Key: 7
52,549,169 UART: [art] Derive CDI
52,549,986 UART: [art] Store in in slot 0x4
52,608,731 UART: [art] Derive Key Pair
52,609,771 UART: [art] Store priv key in slot 0x5
55,902,318 UART: [art] Derive Key Pair - Done
55,915,102 UART: [art] Signing Cert with AUTHO
55,916,415 UART: RITY.KEYID = 7
58,202,709 UART: [art] Erasing AUTHORITY.KEYID = 7
58,204,240 UART: [art] PUB.X = 05F23B60581D345F99FBB0FFEEF6538880250AED63727D5792EE8D8AC3008908DBFBE6755ABEDD3324136E5FE5F34714
58,211,484 UART: [art] PUB.Y = 094B9D49EDB75CBBDA04B4642719CA8E329C81BF661C0805CF86EC1D4DBE84438711B59A300C2C811CDFAC0FBA6C57C3
58,218,763 UART: [art] SIG.R = 6D81AF4B0BB0FD18BE8FF5D350407D5E687AD40D94518566D67A5C518235FE2D52AF51AAF0AF2E84B4026D5735E33DB7
58,226,156 UART: [art] SIG.S = 92CA6BDE0222083A5F495906E01AADE9C9228D1BB98541062B7BAB5FB0DB3D87EE2F30CFAB6CDDB822072058A1C01312
59,530,649 UART: mbox::rt_entry...
59,531,620 UART: ____ _ _ _ ____ _____
59,533,606 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,535,630 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,537,562 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,539,491 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,541,419 UART: |_|
59,542,229 UART:
59,830,558 UART: [rt] Runtime listening for mailbox commands...
59,832,698 >>> mbox cmd response data (48 bytes)
59,833,293 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,835,650 >>> mbox cmd response data (48 bytes)
59,836,548 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,850,438 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,803,121 ready_for_fw is high
3,803,687 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,883,854 >>> mbox cmd response: success
23,584,927 UART:
23,585,356 UART: Running Caliptra FMC ...
23,586,481 UART:
23,586,635 UART: [state] CFI Enabled
23,655,389 UART: [fht] FMC Alias Private Key: 7
25,993,237 UART: [art] Extend RT PCRs Done
25,994,463 UART: [art] Lock RT PCRs Done
25,995,948 UART: [art] Populate DV Done
26,001,315 UART: [fht] FMC Alias Private Key: 7
26,002,846 UART: [art] Derive CDI
26,003,593 UART: [art] Store in in slot 0x4
26,063,016 UART: [art] Derive Key Pair
26,064,024 UART: [art] Store priv key in slot 0x5
29,357,125 UART: [art] Derive Key Pair - Done
29,370,174 UART: [art] Signing Cert with AUTHO
29,371,515 UART: RITY.KEYID = 7
31,659,110 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,639 UART: [art] PUB.X = 9AD1FB88DED8B19D136CD470D00A53C79B31ED31BFA02A17CC71749C6870EEFF33F41841F6214E4FF407D71D9CB8C9A1
31,667,860 UART: [art] PUB.Y = 77E602DED2A37A77B5E3BCC890A158722869CE0BF05A9C57A4560212ADEB856E48EB48C312EC4AFBD30ED52BFE48C6AB
31,675,164 UART: [art] SIG.R = ECBC3A5FA04A7CC31029CCAC1CC120D3C8FD62146509961AA679F1CC6F56E841A86A0DB33F1AECF8E7F14DA545667FE0
31,682,554 UART: [art] SIG.S = F870D8934C7C951F4039B4445474D1F2FD3A76EF1C0630930E304832FBE43DB7FB415F6C34F328B4B7D569E3B3D37EB8
32,988,092 UART: Caliptra RT
32,988,802 UART: [state] CFI Enabled
33,150,298 UART: [rt] RT listening for mailbox commands...
37,185,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,341,638 UART: [rt]cmd =0x41544d4e, len=14344
42,642,433 >>> mbox cmd response data (8 bytes)
42,643,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,673,902 UART: [rt]cmd =0x41545348, len=116
42,693,614 >>> mbox cmd response data (12 bytes)
44,740,837 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,707,910 >>> mbox cmd response: success
52,708,425 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,741,522 UART:
52,741,847 UART: Running Caliptra FMC ...
52,742,892 UART:
52,743,043 UART: [state] CFI Enabled
52,848,116 UART: [art] Extend RT PCRs Done
52,849,307 UART: [art] Lock RT PCRs Done
52,850,685 UART: [art] Populate DV Done
52,856,253 UART: [fht] FMC Alias Private Key: 7
52,857,789 UART: [art] Derive CDI
52,858,522 UART: [art] Store in in slot 0x4
52,917,029 UART: [art] Derive Key Pair
52,918,086 UART: [art] Store priv key in slot 0x5
56,211,162 UART: [art] Derive Key Pair - Done
56,224,120 UART: [art] Signing Cert with AUTHO
56,225,432 UART: RITY.KEYID = 7
58,513,135 UART: [art] Erasing AUTHORITY.KEYID = 7
58,514,652 UART: [art] PUB.X = 70BBCFA06FD1A69CA02FF91F2DD0887DBA695FAC5D2E6081BD291F0F1446FF6B24BECA991DF0A8F21F9E76ECE1ABE48E
58,521,908 UART: [art] PUB.Y = A06975C31B6BD2D12EAA7548E48B4C68B10EBD15188B4649EC019129218686B07CE721DA7AB3D635A5E138D428E790B5
58,529,140 UART: [art] SIG.R = A7B8A9710F7B8DBB356381E1A1FB2ACC6B20308D02134E228D901FD506A291A6D2E4B57BF0B94579924B718A6C00F8C7
58,536,553 UART: [art] SIG.S = 7888E159463F59974BDFD27EE12AC48114BD0BB720A2A6FE51E0F85C5147AD0C8E3513E0BDC9B1EEC1A30AF16C475D04
59,841,172 UART: mbox::rt_entry...
59,842,130 UART: ____ _ _ _ ____ _____
59,844,060 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,846,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,847,927 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,849,845 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,851,786 UART: |_|
59,852,592 UART:
60,137,409 UART: [rt] Runtime listening for mailbox commands...
60,139,585 >>> mbox cmd response data (48 bytes)
60,140,145 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,142,457 >>> mbox cmd response data (48 bytes)
60,143,346 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,157,239 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
192,899 UART:
193,262 UART: Running Caliptra ROM ...
194,440 UART:
603,940 UART: [state] CFI Enabled
619,664 UART: [state] LifecycleState = Unprovisioned
621,606 UART: [state] DebugLocked = No
624,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,032 UART: [kat] SHA2-256
798,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,285 UART: [kat] ++
809,752 UART: [kat] sha1
819,487 UART: [kat] SHA2-256
822,207 UART: [kat] SHA2-384
827,414 UART: [kat] SHA2-512-ACC
829,774 UART: [kat] ECC-384
3,111,732 UART: [kat] HMAC-384Kdf
3,123,994 UART: [kat] LMS
4,314,108 UART: [kat] --
4,318,081 UART: [cold-reset] ++
4,319,330 UART: [fht] Storing FHT @ 0x50003400
4,331,675 UART: [idev] ++
4,332,235 UART: [idev] CDI.KEYID = 6
4,333,141 UART: [idev] SUBJECT.KEYID = 7
4,334,381 UART: [idev] UDS.KEYID = 0
4,335,462 ready_for_fw is high
4,335,685 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,293 UART: [idev] Erasing UDS.KEYID = 0
7,623,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,171 UART: [idev] --
7,649,274 UART: [ldev] ++
7,649,842 UART: [ldev] CDI.KEYID = 6
7,650,857 UART: [ldev] SUBJECT.KEYID = 5
7,652,010 UART: [ldev] AUTHORITY.KEYID = 7
7,653,242 UART: [ldev] FE.KEYID = 1
7,664,585 UART: [ldev] Erasing FE.KEYID = 1
10,955,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,231 UART: [ldev] --
13,317,838 UART: [fwproc] Waiting for Commands...
13,319,737 UART: [fwproc] Received command 0x46574c44
13,321,921 UART: [fwproc] Received Image of size 113760 bytes
17,372,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,832,414 >>> mbox cmd response: success
17,837,259 UART: [afmc] ++
17,837,873 UART: [afmc] CDI.KEYID = 6
17,838,781 UART: [afmc] SUBJECT.KEYID = 7
17,840,051 UART: [afmc] AUTHORITY.KEYID = 5
21,153,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,762 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,126 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,927 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,397 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,641 UART: [afmc] --
23,517,866 UART: [cold-reset] --
23,521,871 UART: [state] Locking Datavault
23,526,909 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,607 UART: [state] Locking ICCM
23,531,238 UART: [exit] Launching FMC @ 0x40000130
23,539,634 UART:
23,539,870 UART: Running Caliptra FMC ...
23,540,968 UART:
23,541,125 UART: [state] CFI Enabled
23,549,304 UART: [fht] FMC Alias Private Key: 7
25,880,644 UART: [art] Extend RT PCRs Done
25,881,872 UART: [art] Lock RT PCRs Done
25,883,316 UART: [art] Populate DV Done
25,888,673 UART: [fht] FMC Alias Private Key: 7
25,890,263 UART: [art] Derive CDI
25,891,018 UART: [art] Store in in slot 0x4
25,933,349 UART: [art] Derive Key Pair
25,934,392 UART: [art] Store priv key in slot 0x5
29,176,982 UART: [art] Derive Key Pair - Done
29,190,083 UART: [art] Signing Cert with AUTHO
29,191,387 UART: RITY.KEYID = 7
31,471,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,670 UART: [art] PUB.X = D99F44C15065161D85190AD5F1AE04939E0277A34FBBA5A65BD13246B18691ED2D825D0BD273E1336B6DAD60BB44DE0D
31,479,949 UART: [art] PUB.Y = 5CDD7D3778B51177FE7D69F924BD79368A28F4F9AD7353F2D40FDA1D925C8972E4629D1D24ED312F57B3E0FC137D917A
31,487,205 UART: [art] SIG.R = 7877732497FCD7318D852F8EFE496529DAC1B34CBAF008F3D9E4BD56F9C7BF30BCA9D4EF88BC89299F64CF46D5919401
31,494,562 UART: [art] SIG.S = 4E735D3BB5AD2DF2808530255CD8E5CA2D6EEA8800B609923E1D6DA0218D04B9641EF094089BA8214752252599BC4004
32,799,698 UART: Caliptra RT
32,800,411 UART: [state] CFI Enabled
32,918,868 UART: [rt] RT listening for mailbox commands...
36,955,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,111,190 UART: [rt]cmd =0x41544d4e, len=14344
42,411,796 >>> mbox cmd response data (8 bytes)
42,412,564 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,443,202 UART: [rt]cmd =0x41545348, len=116
42,462,688 >>> mbox cmd response data (12 bytes)
44,517,277 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
44,617,899 UART:
44,618,247 UART: Running Caliptra ROM ...
44,619,380 UART:
44,619,563 UART: [state] CFI Enabled
44,633,508 UART: [state] LifecycleState = Unprovisioned
44,635,408 UART: [state] DebugLocked = No
44,637,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,642,167 UART: [kat] SHA2-256
44,811,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,822,399 UART: [kat] ++
44,822,942 UART: [kat] sha1
44,834,044 UART: [kat] SHA2-256
44,836,782 UART: [kat] SHA2-384
44,842,014 UART: [kat] SHA2-512-ACC
44,844,361 UART: [kat] ECC-384
47,128,141 UART: [kat] HMAC-384Kdf
47,139,879 UART: [kat] LMS
48,329,976 UART: [kat] --
48,332,571 UART: [update-reset] ++
52,046,622 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,050,244 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
52,307,807 >>> mbox cmd response: success
52,308,174 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,308,963 UART: [update-reset] Copying MAN_2 To MAN_1
52,331,401 UART: [update-reset Success] --
52,335,720 UART: [state] Locking Datavault
52,338,699 UART: [state] Locking PCR0, PCR1 and PCR31
52,340,454 UART: [state] Locking ICCM
52,342,059 UART: [exit] Launching FMC @ 0x40000130
52,350,460 UART:
52,350,693 UART: Running Caliptra FMC ...
52,351,788 UART:
52,351,939 UART: [state] CFI Enabled
52,396,322 UART: [art] Extend RT PCRs Done
52,397,660 UART: [art] Lock RT PCRs Done
52,398,899 UART: [art] Populate DV Done
52,404,531 UART: [fht] FMC Alias Private Key: 7
52,406,019 UART: [art] Derive CDI
52,406,777 UART: [art] Store in in slot 0x4
52,449,547 UART: [art] Derive Key Pair
52,450,548 UART: [art] Store priv key in slot 0x5
55,692,538 UART: [art] Derive Key Pair - Done
55,705,329 UART: [art] Signing Cert with AUTHO
55,706,638 UART: RITY.KEYID = 7
57,986,031 UART: [art] Erasing AUTHORITY.KEYID = 7
57,987,542 UART: [art] PUB.X = 8F089E0FB4C64DA295013CD3ED0108030ACEC63D9904C7FB5BB932130367AA441BA9BAE80A6ABF4F36652BBBA189623A
57,994,802 UART: [art] PUB.Y = 9058466D35F3B1698178F05AA503A63621B3A0A125B3EE018748952725A0DAB066EF8C00AF46E141776D4ED320F01DE3
58,002,032 UART: [art] SIG.R = FD263A9A719DEF57779E04F5F533031C195FAB617D752CD5EF8BD3DA41E7B6467B4BB5E33D1C20F0BFDF2374AE74C7CB
58,009,422 UART: [art] SIG.S = 5CA071EDDE08633CA9697E513D3DC5C270E294A9208F31DDA763DBC23DE0306EDEA6A4560F8C404F8687DE487FF77FCF
59,313,961 UART: mbox::rt_entry...
59,314,926 UART: ____ _ _ _ ____ _____
59,316,911 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,318,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,320,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,322,764 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,324,712 UART: |_|
59,325,547 UART:
59,612,753 UART: [rt] Runtime listening for mailbox commands...
59,614,919 >>> mbox cmd response data (48 bytes)
59,615,496 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,617,810 >>> mbox cmd response data (48 bytes)
59,618,704 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,632,627 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
4,128,112 ready_for_fw is high
4,128,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,067,953 >>> mbox cmd response: success
23,708,796 UART:
23,709,197 UART: Running Caliptra FMC ...
23,710,297 UART:
23,710,454 UART: [state] CFI Enabled
23,718,423 UART: [fht] FMC Alias Private Key: 7
26,049,329 UART: [art] Extend RT PCRs Done
26,050,562 UART: [art] Lock RT PCRs Done
26,051,892 UART: [art] Populate DV Done
26,057,612 UART: [fht] FMC Alias Private Key: 7
26,059,105 UART: [art] Derive CDI
26,059,866 UART: [art] Store in in slot 0x4
26,102,145 UART: [art] Derive Key Pair
26,103,146 UART: [art] Store priv key in slot 0x5
29,345,493 UART: [art] Derive Key Pair - Done
29,358,389 UART: [art] Signing Cert with AUTHO
29,359,689 UART: RITY.KEYID = 7
31,639,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,961 UART: [art] PUB.X = 213171A93E7E265036E96941477844E4142906DB2120A168D29C5B0721A57369FC4B486A4A81A6A46AC96B2FF339FA01
31,648,015 UART: [art] PUB.Y = 78FC635EA518BBC3B0E860514537E0A91B3291DF62477DFB5AC127E9D1EA8A57519E37411B35B2982DDA4EC03819F0ED
31,655,248 UART: [art] SIG.R = 6E19BA70B5F7F7CB3B8869405627C55105DD43BA3A8306260107262D8D3B48CEAA2DA4D0512E63A675F5B37E3BFCABCB
31,662,636 UART: [art] SIG.S = E79FDB6CC0555EEB7A99E781B7838D76A4619EE3A0D1AACE525B61B156067F7BCD7F4BBF9BD5BCB36ECC9717816F58F1
32,967,529 UART: Caliptra RT
32,968,254 UART: [state] CFI Enabled
33,085,626 UART: [rt] RT listening for mailbox commands...
37,129,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,284,858 UART: [rt]cmd =0x41544d4e, len=14344
42,585,759 >>> mbox cmd response data (8 bytes)
42,586,646 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,617,417 UART: [rt]cmd =0x41545348, len=116
42,636,785 >>> mbox cmd response data (12 bytes)
44,683,167 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,569,612 >>> mbox cmd response: success
52,570,115 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,603,300 UART:
52,603,617 UART: Running Caliptra FMC ...
52,604,675 UART:
52,604,820 UART: [state] CFI Enabled
52,649,208 UART: [art] Extend RT PCRs Done
52,650,361 UART: [art] Lock RT PCRs Done
52,651,619 UART: [art] Populate DV Done
52,657,025 UART: [fht] FMC Alias Private Key: 7
52,658,669 UART: [art] Derive CDI
52,659,402 UART: [art] Store in in slot 0x4
52,702,324 UART: [art] Derive Key Pair
52,703,365 UART: [art] Store priv key in slot 0x5
55,946,067 UART: [art] Derive Key Pair - Done
55,958,801 UART: [art] Signing Cert with AUTHO
55,960,299 UART: RITY.KEYID = 7
58,239,378 UART: [art] Erasing AUTHORITY.KEYID = 7
58,240,891 UART: [art] PUB.X = 0648D3FD95A593049BFB189A9B78AAFB81A764BE7788411C0B033FCCE348A3231B7CB201D2E7BCB838413B1E505B3A4D
58,248,194 UART: [art] PUB.Y = CF922A16A0F0B92A36A442424CE1A365B9AA91B59B13A4D2D6911A9FFCAC62F0B2B33C58BE48F3736B71C3645E6BA660
58,255,434 UART: [art] SIG.R = 7CEEA31A420782ACB081B578696FBE8D545EC35D277B52B0B93CE2A27C24C194FC17CA41E85516A1ADCFD3EB1C390B2C
58,262,827 UART: [art] SIG.S = D03F48FCF1A9DDB56991E156B3B85001834F7EDDCD8F3A60410D059728D01091444D77FDC8E19B858D7EA5282029D51B
59,567,734 UART: mbox::rt_entry...
59,568,695 UART: ____ _ _ _ ____ _____
59,570,629 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,572,634 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,574,486 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,576,408 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,578,360 UART: |_|
59,579,162 UART:
59,863,347 UART: [rt] Runtime listening for mailbox commands...
59,865,483 >>> mbox cmd response data (48 bytes)
59,866,051 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,868,364 >>> mbox cmd response data (48 bytes)
59,869,239 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,883,091 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
192,610 UART:
192,994 UART: Running Caliptra ROM ...
194,197 UART:
194,346 UART: [state] CFI Enabled
261,037 UART: [state] LifecycleState = Unprovisioned
262,898 UART: [state] DebugLocked = No
264,643 UART: [state] WD Timer not started. Device not locked for debugging
268,834 UART: [kat] SHA2-256
447,972 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,512 UART: [kat] ++
460,052 UART: [kat] sha1
471,433 UART: [kat] SHA2-256
474,439 UART: [kat] SHA2-384
479,997 UART: [kat] SHA2-512-ACC
482,996 UART: [kat] ECC-384
2,929,185 UART: [kat] HMAC-384Kdf
2,951,059 UART: [kat] LMS
3,480,557 UART: [kat] --
3,486,348 UART: [cold-reset] ++
3,487,429 UART: [fht] FHT @ 0x50003400
3,499,133 UART: [idev] ++
3,499,734 UART: [idev] CDI.KEYID = 6
3,500,616 UART: [idev] SUBJECT.KEYID = 7
3,501,859 UART: [idev] UDS.KEYID = 0
3,502,761 ready_for_fw is high
3,502,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,646,293 UART: [idev] Erasing UDS.KEYID = 0
6,005,246 UART: [idev] Sha1 KeyId Algorithm
6,028,377 UART: [idev] --
6,032,425 UART: [ldev] ++
6,032,992 UART: [ldev] CDI.KEYID = 6
6,033,925 UART: [ldev] SUBJECT.KEYID = 5
6,035,107 UART: [ldev] AUTHORITY.KEYID = 7
6,036,350 UART: [ldev] FE.KEYID = 1
6,081,058 UART: [ldev] Erasing FE.KEYID = 1
8,585,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,822 UART: [ldev] --
10,395,718 UART: [fwproc] Wait for Commands...
10,397,647 UART: [fwproc] Recv command 0x46574c44
10,399,676 UART: [fwproc] Recv'd Img size: 114084 bytes
13,797,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,752 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,258,651 >>> mbox cmd response: success
14,262,318 UART: [afmc] ++
14,262,905 UART: [afmc] CDI.KEYID = 6
14,263,819 UART: [afmc] SUBJECT.KEYID = 7
14,264,976 UART: [afmc] AUTHORITY.KEYID = 5
16,791,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,514,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,516,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,532,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,548,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,564,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,586,331 UART: [afmc] --
18,589,979 UART: [cold-reset] --
18,593,833 UART: [state] Locking Datavault
18,598,914 UART: [state] Locking PCR0, PCR1 and PCR31
18,600,555 UART: [state] Locking ICCM
18,603,317 UART: [exit] Launching FMC @ 0x40000130
18,611,777 UART:
18,612,015 UART: Running Caliptra FMC ...
18,613,243 UART:
18,613,407 UART: [state] CFI Enabled
18,673,618 UART: [fht] FMC Alias Private Key: 7
20,437,985 UART: [art] Extend RT PCRs Done
20,439,200 UART: [art] Lock RT PCRs Done
20,441,174 UART: [art] Populate DV Done
20,446,634 UART: [fht] FMC Alias Private Key: 7
20,448,276 UART: [art] Derive CDI
20,449,083 UART: [art] Store in in slot 0x4
20,506,226 UART: [art] Derive Key Pair
20,507,269 UART: [art] Store priv key in slot 0x5
22,970,460 UART: [art] Derive Key Pair - Done
22,983,842 UART: [art] Signing Cert with AUTHO
22,985,160 UART: RITY.KEYID = 7
24,696,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,384 UART: [art] PUB.X = BFF0EE3F8F1E6689A5028CC5F09C967992507E3C05209041EC9826214FA26BA712B266DC344A4522C71382F88D93D169
24,705,616 UART: [art] PUB.Y = 476AEB0774571D2CFA437A381A49648D390D54A19D3C8D2D09995E089AF27626A1D6046CA0830E6150E7340921EE0ABE
24,712,843 UART: [art] SIG.R = 2E4A9FE0A05640DDD84DB560AA253A4FA867FEC9E637C2EEB9BE696B8A92B576301B86E3469CEF891FF8E6DD3E09EBD1
24,720,275 UART: [art] SIG.S = 8A89F5AF0C4B6398384EF7ADB63A36ABA994F729011D61479008A7F8C0ED4C77CC9D772CEF4B9A977E66454B2BEE6148
25,699,715 UART: Caliptra RT
25,700,416 UART: [state] CFI Enabled
25,864,185 UART: [rt] RT listening for mailbox commands...
29,899,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,055,304 UART: [rt]cmd =0x41544d4e, len=14344
34,051,112 >>> mbox cmd response data (8 bytes)
34,051,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,082,331 UART: [rt]cmd =0x41545348, len=116
34,101,861 >>> mbox cmd response data (12 bytes)
36,147,767 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
36,247,985 UART:
36,248,367 UART: Running Caliptra ROM ...
36,249,419 UART:
36,249,569 UART: [state] CFI Enabled
36,318,738 UART: [state] LifecycleState = Unprovisioned
36,320,652 UART: [state] DebugLocked = No
36,322,228 UART: [state] WD Timer not started. Device not locked for debugging
36,325,753 UART: [kat] SHA2-256
36,504,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,516,439 UART: [kat] ++
36,516,893 UART: [kat] sha1
36,527,881 UART: [kat] SHA2-256
36,530,918 UART: [kat] SHA2-384
36,537,486 UART: [kat] SHA2-512-ACC
36,540,413 UART: [kat] ECC-384
39,007,946 UART: [kat] HMAC-384Kdf
39,028,372 UART: [kat] LMS
39,557,841 UART: [kat] --
39,560,806 UART: [update-reset] ++
42,554,291 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,557,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
42,815,007 >>> mbox cmd response: success
42,815,389 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,816,422 UART: [update-reset] Copying MAN_2 To MAN_1
42,838,755 UART: [update-reset Success] --
42,842,768 UART: [state] Locking Datavault
42,845,585 UART: [state] Locking PCR0, PCR1 and PCR31
42,847,223 UART: [state] Locking ICCM
42,849,608 UART: [exit] Launching FMC @ 0x40000130
42,858,032 UART:
42,858,316 UART: Running Caliptra FMC ...
42,859,426 UART:
42,859,587 UART: [state] CFI Enabled
42,966,411 UART: [art] Extend RT PCRs Done
42,967,600 UART: [art] Lock RT PCRs Done
42,969,161 UART: [art] Populate DV Done
42,974,888 UART: [fht] FMC Alias Private Key: 7
42,976,481 UART: [art] Derive CDI
42,977,292 UART: [art] Store in in slot 0x4
43,035,982 UART: [art] Derive Key Pair
43,037,167 UART: [art] Store priv key in slot 0x5
45,499,778 UART: [art] Derive Key Pair - Done
45,512,933 UART: [art] Signing Cert with AUTHO
45,514,240 UART: RITY.KEYID = 7
47,225,049 UART: [art] Erasing AUTHORITY.KEYID = 7
47,226,563 UART: [art] PUB.X = 48AE44C6E4B2F5F0F111A5531FB6996A2FD8E3775783D7AE558E94B7C5623F9010EEF7FFB93438726B9DB42591E25049
47,233,795 UART: [art] PUB.Y = CB143E102EA1EBF0CE15F4AE2EA5DB2FED0CDC860CE09CB9759D100784F613444D758E18F6AA0DD84CF0B5717501B122
47,241,067 UART: [art] SIG.R = F22F7F956C6329856FB13038279D1F78B617CF045951CE92386C057F7111891F4D9E0D4BE69E93EAF6B94F613B628400
47,248,442 UART: [art] SIG.S = D0FD3AA55D0BEC8812A6C396E8A85558FC623B08FDF2344D6E52F7E83BC539B0B0CD60F14FCF773096853B7A01418A5A
48,226,459 UART: mbox::rt_entry...
48,227,401 UART: ____ _ _ _ ____ _____
48,229,499 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,231,502 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,233,355 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,235,274 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,237,151 UART: |_|
48,238,027 UART:
48,522,472 UART: [rt] Runtime listening for mailbox commands...
48,524,645 >>> mbox cmd response data (48 bytes)
48,525,213 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,527,544 >>> mbox cmd response data (48 bytes)
48,528,443 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,542,299 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
3,381,949 ready_for_fw is high
3,382,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,034,825 >>> mbox cmd response: success
18,316,782 UART:
18,317,182 UART: Running Caliptra FMC ...
18,318,375 UART:
18,318,556 UART: [state] CFI Enabled
18,389,042 UART: [fht] FMC Alias Private Key: 7
20,152,542 UART: [art] Extend RT PCRs Done
20,153,759 UART: [art] Lock RT PCRs Done
20,155,387 UART: [art] Populate DV Done
20,160,900 UART: [fht] FMC Alias Private Key: 7
20,162,495 UART: [art] Derive CDI
20,163,309 UART: [art] Store in in slot 0x4
20,221,878 UART: [art] Derive Key Pair
20,222,913 UART: [art] Store priv key in slot 0x5
22,685,783 UART: [art] Derive Key Pair - Done
22,698,355 UART: [art] Signing Cert with AUTHO
22,699,659 UART: RITY.KEYID = 7
24,411,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,455 UART: [art] PUB.X = DC67754EC22D3146E64546B1F461FD8F7479FE7E66D0DCEFBCADBC1A7362AAAAD4F714411725CFE874D870587F96BD49
24,420,752 UART: [art] PUB.Y = 7CFCFAABAD444C86226D3E0D5D37FF6E1FB6E90B46FB1A9215E7D898079CFD83211F04CF14EDA67A03A2A9D1D83A51C1
24,428,023 UART: [art] SIG.R = 63F1FD87D028F4317998FB5EEB9C58B2C5C878A943C2579AD82F273E40764E7FE11F9967F6B47DC102FB43DCE2C1862A
24,435,415 UART: [art] SIG.S = 9521E882A9A94FFCE28CA42ECC833A50AD8B580151CAD71EE8F626652BC3C78BED8654AC9D9873AD97EFCC2A717FA56B
25,414,125 UART: Caliptra RT
25,414,830 UART: [state] CFI Enabled
25,580,712 UART: [rt] RT listening for mailbox commands...
29,623,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,779,458 UART: [rt]cmd =0x41544d4e, len=14344
33,774,791 >>> mbox cmd response data (8 bytes)
33,775,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,806,273 UART: [rt]cmd =0x41545348, len=116
33,826,305 >>> mbox cmd response data (12 bytes)
35,874,140 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,386,119 >>> mbox cmd response: success
42,386,621 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,421,045 UART:
42,421,376 UART: Running Caliptra FMC ...
42,422,501 UART:
42,422,659 UART: [state] CFI Enabled
42,524,785 UART: [art] Extend RT PCRs Done
42,525,975 UART: [art] Lock RT PCRs Done
42,527,428 UART: [art] Populate DV Done
42,532,723 UART: [fht] FMC Alias Private Key: 7
42,534,360 UART: [art] Derive CDI
42,535,166 UART: [art] Store in in slot 0x4
42,593,424 UART: [art] Derive Key Pair
42,594,455 UART: [art] Store priv key in slot 0x5
45,057,376 UART: [art] Derive Key Pair - Done
45,070,560 UART: [art] Signing Cert with AUTHO
45,071,884 UART: RITY.KEYID = 7
46,782,750 UART: [art] Erasing AUTHORITY.KEYID = 7
46,784,247 UART: [art] PUB.X = 2C75F7DDF197787DF29AF339BE75BA524191C5E86FA4F57EC838586B6E74C26B0754B9133C94F45712E2BA0B56D2AA42
46,791,478 UART: [art] PUB.Y = C01A45541255AE834B015F6891EBC78AA130F0512E77BE4C01E234C8349183C24C2F5DF776A79B1EF0DA1CDC87A28177
46,798,727 UART: [art] SIG.R = 8D35962F4353DF4E866ECD0EED2590E1F36288A9D1515CFE1B17308169BAE067A12FC9F089C73626F483F1324E6940B6
46,806,148 UART: [art] SIG.S = ADE894005C8F68A283D870343F4ABF55D5DD2AA735598E116827CAED162D51AA69480E94DBC1631070F938BBAB47F0F9
47,785,089 UART: mbox::rt_entry...
47,786,055 UART: ____ _ _ _ ____ _____
47,788,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,790,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,791,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,793,930 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,795,827 UART: |_|
47,796,660 UART:
48,077,589 UART: [rt] Runtime listening for mailbox commands...
48,079,711 >>> mbox cmd response data (48 bytes)
48,080,313 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,082,633 >>> mbox cmd response data (48 bytes)
48,083,530 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,097,387 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
193,050 UART:
193,433 UART: Running Caliptra ROM ...
194,570 UART:
604,044 UART: [state] CFI Enabled
616,293 UART: [state] LifecycleState = Unprovisioned
618,183 UART: [state] DebugLocked = No
620,428 UART: [state] WD Timer not started. Device not locked for debugging
623,758 UART: [kat] SHA2-256
802,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,512 UART: [kat] ++
815,042 UART: [kat] sha1
826,160 UART: [kat] SHA2-256
829,129 UART: [kat] SHA2-384
836,544 UART: [kat] SHA2-512-ACC
839,554 UART: [kat] ECC-384
3,278,928 UART: [kat] HMAC-384Kdf
3,290,957 UART: [kat] LMS
3,820,429 UART: [kat] --
3,824,001 UART: [cold-reset] ++
3,825,029 UART: [fht] FHT @ 0x50003400
3,836,165 UART: [idev] ++
3,836,731 UART: [idev] CDI.KEYID = 6
3,837,762 UART: [idev] SUBJECT.KEYID = 7
3,838,870 UART: [idev] UDS.KEYID = 0
3,839,794 ready_for_fw is high
3,839,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,983,450 UART: [idev] Erasing UDS.KEYID = 0
6,312,909 UART: [idev] Sha1 KeyId Algorithm
6,335,912 UART: [idev] --
6,339,473 UART: [ldev] ++
6,340,045 UART: [ldev] CDI.KEYID = 6
6,341,068 UART: [ldev] SUBJECT.KEYID = 5
6,342,179 UART: [ldev] AUTHORITY.KEYID = 7
6,343,409 UART: [ldev] FE.KEYID = 1
6,353,198 UART: [ldev] Erasing FE.KEYID = 1
8,828,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,549 UART: [ldev] --
10,620,412 UART: [fwproc] Wait for Commands...
10,622,298 UART: [fwproc] Recv command 0x46574c44
10,624,395 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,479,075 >>> mbox cmd response: success
14,484,071 UART: [afmc] ++
14,484,669 UART: [afmc] CDI.KEYID = 6
14,485,583 UART: [afmc] SUBJECT.KEYID = 7
14,486,766 UART: [afmc] AUTHORITY.KEYID = 5
16,991,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,633 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,151 UART: [afmc] --
18,787,802 UART: [cold-reset] --
18,790,525 UART: [state] Locking Datavault
18,795,016 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,722 UART: [state] Locking ICCM
18,798,146 UART: [exit] Launching FMC @ 0x40000130
18,806,553 UART:
18,806,792 UART: Running Caliptra FMC ...
18,807,894 UART:
18,808,075 UART: [state] CFI Enabled
18,816,299 UART: [fht] FMC Alias Private Key: 7
20,573,345 UART: [art] Extend RT PCRs Done
20,574,569 UART: [art] Lock RT PCRs Done
20,576,192 UART: [art] Populate DV Done
20,581,660 UART: [fht] FMC Alias Private Key: 7
20,583,149 UART: [art] Derive CDI
20,583,912 UART: [art] Store in in slot 0x4
20,626,325 UART: [art] Derive Key Pair
20,627,340 UART: [art] Store priv key in slot 0x5
23,053,557 UART: [art] Derive Key Pair - Done
23,066,329 UART: [art] Signing Cert with AUTHO
23,067,666 UART: RITY.KEYID = 7
24,772,821 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,316 UART: [art] PUB.X = 3A3750D57EEF904AE36D2DE75334593AD891366EC444B4BF68F9FE9982127D29206298E6B2FF35D9E2A031BC537A96DF
24,781,604 UART: [art] PUB.Y = 50DBD387994BE414DB0B6DF31501C7400B04B50E16A9F323A6723654A687F03A823EA9963C6BD58ED4F237E5137C1FDC
24,788,831 UART: [art] SIG.R = 729C2C365202DE5B09AE548DE75794690961CAA80C82BFD501E390CE2CC0A75FB34F5315F838DD8E4CBD6F29EB1C04D5
24,796,251 UART: [art] SIG.S = A90F8D1F56F6CAC9DE849B9064EE7DCB58F2B22255708EC686544D346390F5C613A38361B605FFC25A75EE250AA79287
25,775,304 UART: Caliptra RT
25,776,005 UART: [state] CFI Enabled
25,892,715 UART: [rt] RT listening for mailbox commands...
29,929,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,084,649 UART: [rt]cmd =0x41544d4e, len=14344
34,080,185 >>> mbox cmd response data (8 bytes)
34,080,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,111,715 UART: [rt]cmd =0x41545348, len=116
34,131,455 >>> mbox cmd response data (12 bytes)
36,177,839 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
36,278,030 UART:
36,278,417 UART: Running Caliptra ROM ...
36,279,551 UART:
36,279,723 UART: [state] CFI Enabled
36,295,394 UART: [state] LifecycleState = Unprovisioned
36,297,248 UART: [state] DebugLocked = No
36,299,354 UART: [state] WD Timer not started. Device not locked for debugging
36,302,938 UART: [kat] SHA2-256
36,482,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,493,696 UART: [kat] ++
36,494,159 UART: [kat] sha1
36,505,001 UART: [kat] SHA2-256
36,508,017 UART: [kat] SHA2-384
36,515,046 UART: [kat] SHA2-512-ACC
36,517,994 UART: [kat] ECC-384
38,960,523 UART: [kat] HMAC-384Kdf
38,973,728 UART: [kat] LMS
39,503,185 UART: [kat] --
39,506,912 UART: [update-reset] ++
42,501,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,505,325 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
42,762,666 >>> mbox cmd response: success
42,763,038 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,764,569 UART: [update-reset] Copying MAN_2 To MAN_1
42,786,895 UART: [update-reset Success] --
42,791,228 UART: [state] Locking Datavault
42,794,001 UART: [state] Locking PCR0, PCR1 and PCR31
42,795,716 UART: [state] Locking ICCM
42,796,949 UART: [exit] Launching FMC @ 0x40000130
42,805,403 UART:
42,805,638 UART: Running Caliptra FMC ...
42,806,743 UART:
42,806,920 UART: [state] CFI Enabled
42,851,000 UART: [art] Extend RT PCRs Done
42,852,195 UART: [art] Lock RT PCRs Done
42,853,731 UART: [art] Populate DV Done
42,859,359 UART: [fht] FMC Alias Private Key: 7
42,861,003 UART: [art] Derive CDI
42,861,743 UART: [art] Store in in slot 0x4
42,904,339 UART: [art] Derive Key Pair
42,905,674 UART: [art] Store priv key in slot 0x5
45,331,938 UART: [art] Derive Key Pair - Done
45,345,040 UART: [art] Signing Cert with AUTHO
45,346,343 UART: RITY.KEYID = 7
47,051,991 UART: [art] Erasing AUTHORITY.KEYID = 7
47,053,511 UART: [art] PUB.X = 46358BAEC5CA2E7F27BFC7DB7055D6D2646D501626F3B2E3FE4F768AB629CF4E740BEAB497B4083C4489BB29B9DE698E
47,060,785 UART: [art] PUB.Y = 0F955EC8C10A5648776A49D21E4204AD8443133CAE14F06708C7D48B1934BE4174DA090D37EF3BA854C7F6D33B37AB57
47,068,021 UART: [art] SIG.R = 6A6561CBD7EFB4783DFBD74019C5F709A8B6BA5CA2CDF6D9F92273A020F2173F266D1423661F037A5221DF12CE051425
47,075,430 UART: [art] SIG.S = CD6EC3F40C459C5EED2B938B8F59442643D3AFD94FFFE3BF285C677A194B9602F80BD9F754E6BFB0D008276D784EB390
48,054,376 UART: mbox::rt_entry...
48,055,329 UART: ____ _ _ _ ____ _____
48,057,319 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,059,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,061,262 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,063,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,065,122 UART: |_|
48,065,935 UART:
48,350,590 UART: [rt] Runtime listening for mailbox commands...
48,352,759 >>> mbox cmd response data (48 bytes)
48,353,342 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,355,654 >>> mbox cmd response data (48 bytes)
48,356,556 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,370,394 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,018 writing to cptra_bootfsm_go
3,696,962 ready_for_fw is high
3,697,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,437 >>> mbox cmd response: success
18,516,460 UART:
18,516,863 UART: Running Caliptra FMC ...
18,517,998 UART:
18,518,154 UART: [state] CFI Enabled
18,526,265 UART: [fht] FMC Alias Private Key: 7
20,282,792 UART: [art] Extend RT PCRs Done
20,284,018 UART: [art] Lock RT PCRs Done
20,285,780 UART: [art] Populate DV Done
20,290,975 UART: [fht] FMC Alias Private Key: 7
20,292,474 UART: [art] Derive CDI
20,293,391 UART: [art] Store in in slot 0x4
20,335,566 UART: [art] Derive Key Pair
20,336,576 UART: [art] Store priv key in slot 0x5
22,763,076 UART: [art] Derive Key Pair - Done
22,776,245 UART: [art] Signing Cert with AUTHO
22,777,582 UART: RITY.KEYID = 7
24,482,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,445 UART: [art] PUB.X = D31A23ABB0952FDA7C75E5A6DEB8873B7D3C13B6D71F026C8E55238F7FBCFFE86AB1C083481D117A427FEAD9B8976066
24,491,740 UART: [art] PUB.Y = BF84642CDF0B1BA304A438C9E57966F0AF9AF394A2B7A9417803FD0D6BB371EBFC4201DC261EE7D2FAEBF67D53AF5356
24,498,982 UART: [art] SIG.R = AFA3E1A028431BD72828438A6AA5DABEF3B40EC4324C8DF80866A2E661E4DA39F89087874F6CAAACA5986F6CC0B95A5F
24,506,415 UART: [art] SIG.S = 458FEE9B01B8BC72652DFCA58E2FDF4DB5D64FDA9BF19A5D3069E236A9037628926AA5037898EE2D2B37CE1323AB3926
25,485,629 UART: Caliptra RT
25,486,334 UART: [state] CFI Enabled
25,603,972 UART: [rt] RT listening for mailbox commands...
29,645,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,801,992 UART: [rt]cmd =0x41544d4e, len=14344
33,797,693 >>> mbox cmd response data (8 bytes)
33,798,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,829,184 UART: [rt]cmd =0x41545348, len=116
33,848,402 >>> mbox cmd response data (12 bytes)
35,894,469 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,330,957 >>> mbox cmd response: success
42,331,531 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,366,237 UART:
42,366,533 UART: Running Caliptra FMC ...
42,367,658 UART:
42,367,821 UART: [state] CFI Enabled
42,411,890 UART: [art] Extend RT PCRs Done
42,413,093 UART: [art] Lock RT PCRs Done
42,414,454 UART: [art] Populate DV Done
42,419,866 UART: [fht] FMC Alias Private Key: 7
42,421,349 UART: [art] Derive CDI
42,422,164 UART: [art] Store in in slot 0x4
42,464,659 UART: [art] Derive Key Pair
42,465,699 UART: [art] Store priv key in slot 0x5
44,893,378 UART: [art] Derive Key Pair - Done
44,906,560 UART: [art] Signing Cert with AUTHO
44,907,866 UART: RITY.KEYID = 7
46,613,096 UART: [art] Erasing AUTHORITY.KEYID = 7
46,614,614 UART: [art] PUB.X = E3CDBDE8B7A4F1BAAF631CAE386A09D946F06DD5FFBB1E5D330A4C32A8198640B6CA20ED58DE9B5B2BA394E3133EF130
46,621,891 UART: [art] PUB.Y = CE6B6DD844F435D472B27C2891C0D8BFC26BA6D5FCE52F151E154A6FC6BE4CA99AA65151952560F3938C6D56290ECE35
46,629,163 UART: [art] SIG.R = B6FA35B045C5BF0D26ADE32418E30098F12E45D734B009D639B123CD34FE0FC14A33F9A62C9C6792D67285AC7B639411
46,636,529 UART: [art] SIG.S = 559B9E14321356AFD4509E3F5A4C593B35AEAF39A6B1720934EE18935C9F0EC1536689E257F086203CE355C0CBD0F19B
47,614,777 UART: mbox::rt_entry...
47,615,731 UART: ____ _ _ _ ____ _____
47,617,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,619,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,621,664 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,623,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,625,589 UART: |_|
47,626,491 UART:
47,910,127 UART: [rt] Runtime listening for mailbox commands...
47,912,266 >>> mbox cmd response data (48 bytes)
47,912,854 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
47,915,382 >>> mbox cmd response data (48 bytes)
47,916,294 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
47,930,169 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,346 UART:
192,704 UART: Running Caliptra ROM ...
193,865 UART:
194,019 UART: [state] CFI Enabled
263,955 UART: [state] LifecycleState = Unprovisioned
266,362 UART: [state] DebugLocked = No
268,253 UART: [state] WD Timer not started. Device not locked for debugging
273,082 UART: [kat] SHA2-256
462,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,778 UART: [kat] ++
474,228 UART: [kat] sha1
484,816 UART: [kat] SHA2-256
487,824 UART: [kat] SHA2-384
493,325 UART: [kat] SHA2-512-ACC
495,904 UART: [kat] ECC-384
2,949,347 UART: [kat] HMAC-384Kdf
2,971,472 UART: [kat] LMS
3,503,220 UART: [kat] --
3,507,876 UART: [cold-reset] ++
3,510,091 UART: [fht] FHT @ 0x50003400
3,521,070 UART: [idev] ++
3,521,774 UART: [idev] CDI.KEYID = 6
3,522,721 UART: [idev] SUBJECT.KEYID = 7
3,523,965 UART: [idev] UDS.KEYID = 0
3,524,862 ready_for_fw is high
3,525,051 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,536 UART: [idev] Erasing UDS.KEYID = 0
6,025,728 UART: [idev] Sha1 KeyId Algorithm
6,047,142 UART: [idev] --
6,051,826 UART: [ldev] ++
6,052,511 UART: [ldev] CDI.KEYID = 6
6,053,398 UART: [ldev] SUBJECT.KEYID = 5
6,054,569 UART: [ldev] AUTHORITY.KEYID = 7
6,055,719 UART: [ldev] FE.KEYID = 1
6,100,166 UART: [ldev] Erasing FE.KEYID = 1
8,610,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,137 UART: [ldev] --
10,415,429 UART: [fwproc] Wait for Commands...
10,416,924 UART: [fwproc] Recv command 0x46574c44
10,418,902 UART: [fwproc] Recv'd Img size: 114084 bytes
13,862,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,597,521 >>> mbox cmd response: success
14,601,047 UART: [afmc] ++
14,601,760 UART: [afmc] CDI.KEYID = 6
14,603,019 UART: [afmc] SUBJECT.KEYID = 7
14,604,410 UART: [afmc] AUTHORITY.KEYID = 5
17,150,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,287 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,938 UART: [afmc] --
18,966,830 UART: [cold-reset] --
18,971,503 UART: [state] Locking Datavault
18,978,766 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,920 UART: [state] Locking ICCM
18,982,805 UART: [exit] Launching FMC @ 0x40000130
18,991,441 UART:
18,991,671 UART: Running Caliptra FMC ...
18,992,787 UART:
18,992,948 UART: [state] CFI Enabled
19,050,503 UART: [fht] FMC Alias Private Key: 7
20,814,553 UART: [art] Extend RT PCRs Done
20,815,778 UART: [art] Lock RT PCRs Done
20,817,517 UART: [art] Populate DV Done
20,822,986 UART: [fht] FMC Alias Private Key: 7
20,824,569 UART: [art] Derive CDI
20,825,377 UART: [art] Store in in slot 0x4
20,882,905 UART: [art] Derive Key Pair
20,883,944 UART: [art] Store priv key in slot 0x5
23,346,604 UART: [art] Derive Key Pair - Done
23,359,496 UART: [art] Signing Cert with AUTHO
23,360,792 UART: RITY.KEYID = 7
25,072,666 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,189 UART: [art] PUB.X = C8A08018EC2E8096BF275E7C0661D43D3A39E8C3BB2C05A6C99B3416BBBA31D53C4878CBF72B4DC76113912083E72809
25,081,426 UART: [art] PUB.Y = 28964FEB6752BA5390A2F96E2030E4FCE8FCD9D199FC0D4E7357088E5527CB23C643BF2DA188AA313BA19B86D2054735
25,088,672 UART: [art] SIG.R = D3436166E49E2E70528DE2290952432091B77D79527582544D104733B54F3D89A8D2021ADE3195B26D8996A573A916C5
25,096,008 UART: [art] SIG.S = 41441F1C9470510705A514F3D3605171D05649FB620A0EBB326F675E6149294B9E7B18E7D8329929CD7F77D0482CE50A
26,075,028 UART: Caliptra RT
26,075,745 UART: [state] CFI Enabled
26,239,511 UART: [rt] RT listening for mailbox commands...
30,274,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,430,691 UART: [rt]cmd =0x41544d4e, len=14344
34,426,100 >>> mbox cmd response data (8 bytes)
34,426,867 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,457,569 UART: [rt]cmd =0x41545348, len=116
34,476,935 >>> mbox cmd response data (12 bytes)
36,523,167 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
36,623,953 UART:
36,624,333 UART: Running Caliptra ROM ...
36,625,383 UART:
36,625,537 UART: [state] CFI Enabled
36,689,744 UART: [state] LifecycleState = Unprovisioned
36,691,799 UART: [state] DebugLocked = No
36,693,757 UART: [state] WD Timer not started. Device not locked for debugging
36,697,847 UART: [kat] SHA2-256
36,887,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,898,461 UART: [kat] ++
36,898,939 UART: [kat] sha1
36,911,122 UART: [kat] SHA2-256
36,914,140 UART: [kat] SHA2-384
36,920,025 UART: [kat] SHA2-512-ACC
36,922,604 UART: [kat] ECC-384
39,375,216 UART: [kat] HMAC-384Kdf
39,399,010 UART: [kat] LMS
39,930,598 UART: [kat] --
39,935,898 UART: [update-reset] ++
42,957,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,960,202 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
43,352,540 >>> mbox cmd response: success
43,352,898 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,353,718 UART: [update-reset] Copying MAN_2 To MAN_1
43,391,256 UART: [update-reset Success] --
43,394,836 UART: [state] Locking Datavault
43,399,519 UART: [state] Locking PCR0, PCR1 and PCR31
43,401,675 UART: [state] Locking ICCM
43,403,702 UART: [exit] Launching FMC @ 0x40000130
43,412,370 UART:
43,412,613 UART: Running Caliptra FMC ...
43,413,670 UART:
43,413,821 UART: [state] CFI Enabled
43,503,692 UART: [art] Extend RT PCRs Done
43,504,872 UART: [art] Lock RT PCRs Done
43,506,140 UART: [art] Populate DV Done
43,511,601 UART: [fht] FMC Alias Private Key: 7
43,513,346 UART: [art] Derive CDI
43,514,155 UART: [art] Store in in slot 0x4
43,572,617 UART: [art] Derive Key Pair
43,573,817 UART: [art] Store priv key in slot 0x5
46,036,401 UART: [art] Derive Key Pair - Done
46,049,300 UART: [art] Signing Cert with AUTHO
46,050,636 UART: RITY.KEYID = 7
47,761,393 UART: [art] Erasing AUTHORITY.KEYID = 7
47,762,896 UART: [art] PUB.X = 9C598218BA3A98FF3A92421EED8B5FC2E74303FD26FC012F35D6E3EA4FB01C087773E6B9EC7A88E840A83237107EAEDF
47,770,163 UART: [art] PUB.Y = 5927BA917238C9C3AB283ED62755651205A0BAE7FC22E3B7CAB8A423774D9ED3107E32EB4E914E26B3BD41D3C5FB86A8
47,777,430 UART: [art] SIG.R = 337CAD2358FF452E5DB6E2EDC6233349A8CCC3B11DAF322F1AC211BC58BD7AC5BF284536E9151C550015B220978B6D07
47,784,838 UART: [art] SIG.S = 7B3C43BE2F388A2A3C3E0E19409FBA1F482AADC8296CF5B20CD359B0EC50984740317EF70A727F70DD43F5BD47244771
48,763,071 UART: mbox::rt_entry...
48,764,176 UART: ____ _ _ _ ____ _____
48,766,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,768,167 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,770,093 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,772,020 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,773,948 UART: |_|
48,774,928 UART:
49,058,632 UART: [rt] Runtime listening for mailbox commands...
49,060,757 >>> mbox cmd response data (48 bytes)
49,061,334 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,063,656 >>> mbox cmd response data (48 bytes)
49,064,547 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,078,390 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
3,415,939 ready_for_fw is high
3,416,322 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,711,523 >>> mbox cmd response: success
19,004,006 UART:
19,004,402 UART: Running Caliptra FMC ...
19,005,620 UART:
19,005,794 UART: [state] CFI Enabled
19,073,862 UART: [fht] FMC Alias Private Key: 7
20,838,765 UART: [art] Extend RT PCRs Done
20,839,979 UART: [art] Lock RT PCRs Done
20,841,605 UART: [art] Populate DV Done
20,847,017 UART: [fht] FMC Alias Private Key: 7
20,848,609 UART: [art] Derive CDI
20,849,418 UART: [art] Store in in slot 0x4
20,906,783 UART: [art] Derive Key Pair
20,907,816 UART: [art] Store priv key in slot 0x5
23,370,969 UART: [art] Derive Key Pair - Done
23,384,246 UART: [art] Signing Cert with AUTHO
23,385,551 UART: RITY.KEYID = 7
25,096,785 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,301 UART: [art] PUB.X = B8B4DC4167ADC8355B9A3320B3C5DC59A848A608E9A100D177C70DED9ACDB77EC403EA28CF2FE22B77FFE6F4E4AE1A42
25,105,640 UART: [art] PUB.Y = 7B861290A947CA5C3452B37408C78DB05E30F7F284F47F3B97036A55BA545D5ECABE3AF9DF76FE2E910397A16AE8C91F
25,112,883 UART: [art] SIG.R = 8E1A8B7944994252F17D933BF122A0150BE6AAF01E2D181972FED79A550A8500CB36850DF5E146DE69CB1106C2A6E8DC
25,120,236 UART: [art] SIG.S = A5B21FF9B31A99312DD98F753DEDF21382BF4D5439ACE97A250EC18AACED34BCB8F05F57BD05C4F8EC26199851CAA2EF
26,098,954 UART: Caliptra RT
26,099,643 UART: [state] CFI Enabled
26,263,457 UART: [rt] RT listening for mailbox commands...
30,302,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,457,946 UART: [rt]cmd =0x41544d4e, len=14344
34,453,574 >>> mbox cmd response data (8 bytes)
34,454,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,485,223 UART: [rt]cmd =0x41545348, len=116
34,505,505 >>> mbox cmd response data (12 bytes)
36,551,596 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
43,564,277 >>> mbox cmd response: success
43,564,770 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,601,194 UART:
43,601,529 UART: Running Caliptra FMC ...
43,602,569 UART:
43,602,717 UART: [state] CFI Enabled
43,702,372 UART: [art] Extend RT PCRs Done
43,703,569 UART: [art] Lock RT PCRs Done
43,705,218 UART: [art] Populate DV Done
43,710,673 UART: [fht] FMC Alias Private Key: 7
43,712,376 UART: [art] Derive CDI
43,713,109 UART: [art] Store in in slot 0x4
43,770,501 UART: [art] Derive Key Pair
43,771,538 UART: [art] Store priv key in slot 0x5
46,234,452 UART: [art] Derive Key Pair - Done
46,247,169 UART: [art] Signing Cert with AUTHO
46,248,472 UART: RITY.KEYID = 7
47,959,543 UART: [art] Erasing AUTHORITY.KEYID = 7
47,961,050 UART: [art] PUB.X = C2860542750CF80F9E2F3861AF9EE621CB156B0987DDED5A62828178A42A24CD145394C3030A9FF632E3174F06F73C6F
47,968,263 UART: [art] PUB.Y = F459697C3A2EC264DED0FA12A903F3A2683C7453A12027B0970AACEC41AFBFB786F394C46CAD77E9F7C48B3308795775
47,975,578 UART: [art] SIG.R = 83139C6FD8EC1471B899E0AEB8FAABF71797BA858169217D9D7F43DE892F7CBB7E6A124F2E331830E17B08AAF5A71E23
47,982,921 UART: [art] SIG.S = ED8FC19C07DA0E3ECF5C812B763FFF19D00C5839C881B1339FAC703C18550ED94799B0B8560758912BF481671DD38C00
48,960,868 UART: mbox::rt_entry...
48,961,809 UART: ____ _ _ _ ____ _____
48,963,787 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,965,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,967,710 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,969,639 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,971,590 UART: |_|
48,972,389 UART:
49,255,534 UART: [rt] Runtime listening for mailbox commands...
49,257,729 >>> mbox cmd response data (48 bytes)
49,258,289 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,260,596 >>> mbox cmd response data (48 bytes)
49,261,496 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,275,347 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,814 writing to cptra_bootfsm_go
194,103 UART:
194,475 UART: Running Caliptra ROM ...
195,576 UART:
605,227 UART: [state] CFI Enabled
618,743 UART: [state] LifecycleState = Unprovisioned
621,105 UART: [state] DebugLocked = No
622,841 UART: [state] WD Timer not started. Device not locked for debugging
627,513 UART: [kat] SHA2-256
817,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,205 UART: [kat] ++
828,728 UART: [kat] sha1
841,448 UART: [kat] SHA2-256
844,456 UART: [kat] SHA2-384
849,738 UART: [kat] SHA2-512-ACC
852,320 UART: [kat] ECC-384
3,296,420 UART: [kat] HMAC-384Kdf
3,309,578 UART: [kat] LMS
3,841,483 UART: [kat] --
3,846,144 UART: [cold-reset] ++
3,847,159 UART: [fht] FHT @ 0x50003400
3,858,349 UART: [idev] ++
3,859,065 UART: [idev] CDI.KEYID = 6
3,859,978 UART: [idev] SUBJECT.KEYID = 7
3,861,226 UART: [idev] UDS.KEYID = 0
3,862,151 ready_for_fw is high
3,862,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,636 UART: [idev] Erasing UDS.KEYID = 0
6,338,150 UART: [idev] Sha1 KeyId Algorithm
6,360,894 UART: [idev] --
6,366,779 UART: [ldev] ++
6,367,462 UART: [ldev] CDI.KEYID = 6
6,368,346 UART: [ldev] SUBJECT.KEYID = 5
6,369,558 UART: [ldev] AUTHORITY.KEYID = 7
6,370,681 UART: [ldev] FE.KEYID = 1
6,383,159 UART: [ldev] Erasing FE.KEYID = 1
8,863,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,229 UART: [ldev] --
10,655,826 UART: [fwproc] Wait for Commands...
10,658,358 UART: [fwproc] Recv command 0x46574c44
10,660,612 UART: [fwproc] Recv'd Img size: 114084 bytes
14,109,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,842,808 >>> mbox cmd response: success
14,847,148 UART: [afmc] ++
14,847,856 UART: [afmc] CDI.KEYID = 6
14,849,053 UART: [afmc] SUBJECT.KEYID = 7
14,850,551 UART: [afmc] AUTHORITY.KEYID = 5
17,355,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,936 UART: [afmc] --
19,153,019 UART: [cold-reset] --
19,157,054 UART: [state] Locking Datavault
19,161,992 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,152 UART: [state] Locking ICCM
19,166,933 UART: [exit] Launching FMC @ 0x40000130
19,175,621 UART:
19,175,858 UART: Running Caliptra FMC ...
19,176,960 UART:
19,177,117 UART: [state] CFI Enabled
19,185,166 UART: [fht] FMC Alias Private Key: 7
20,942,436 UART: [art] Extend RT PCRs Done
20,943,655 UART: [art] Lock RT PCRs Done
20,945,257 UART: [art] Populate DV Done
20,950,661 UART: [fht] FMC Alias Private Key: 7
20,952,221 UART: [art] Derive CDI
20,952,956 UART: [art] Store in in slot 0x4
20,995,604 UART: [art] Derive Key Pair
20,996,642 UART: [art] Store priv key in slot 0x5
23,423,649 UART: [art] Derive Key Pair - Done
23,436,482 UART: [art] Signing Cert with AUTHO
23,437,788 UART: RITY.KEYID = 7
25,142,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,383 UART: [art] PUB.X = 6992B51094D1F7E88CB2997B65E6C21CAC1632D11679BE2C408F6C685C594E2028ACB406BBF06EC627B7A0D0DAD09E46
25,151,660 UART: [art] PUB.Y = 495FF70F01E7803901FDC882EE8AED802CE67B6320A8707E96DD588985B07AF4F2DC4972811ABACB94FB5C1E6CC602E9
25,158,919 UART: [art] SIG.R = 18894537366878D2213BB9F36C9F0C1A5990ECA5989BDC97DB2BE73E0949626120F42A95BD07E20CE6B33BBF37DB9EB5
25,166,335 UART: [art] SIG.S = 7CFE2D8EFC174760BE1CDC01E5C163883F10BC3E44FA86AB70CD880988522D86FE7FA6A250AF7D3E8730BC7521581A77
26,145,125 UART: Caliptra RT
26,145,813 UART: [state] CFI Enabled
26,263,105 UART: [rt] RT listening for mailbox commands...
30,295,995 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,451,573 UART: [rt]cmd =0x41544d4e, len=14344
34,447,650 >>> mbox cmd response data (8 bytes)
34,448,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,478,868 UART: [rt]cmd =0x41545348, len=116
34,498,112 >>> mbox cmd response data (12 bytes)
36,545,602 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
36,646,154 UART:
36,646,536 UART: Running Caliptra ROM ...
36,647,590 UART:
36,647,801 UART: [state] CFI Enabled
36,656,195 UART: [state] LifecycleState = Unprovisioned
36,658,101 UART: [state] DebugLocked = No
36,660,799 UART: [state] WD Timer not started. Device not locked for debugging
36,664,847 UART: [kat] SHA2-256
36,854,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,865,487 UART: [kat] ++
36,866,095 UART: [kat] sha1
36,877,643 UART: [kat] SHA2-256
36,880,659 UART: [kat] SHA2-384
36,886,676 UART: [kat] SHA2-512-ACC
36,889,273 UART: [kat] ECC-384
39,328,657 UART: [kat] HMAC-384Kdf
39,342,677 UART: [kat] LMS
39,874,288 UART: [kat] --
39,879,474 UART: [update-reset] ++
42,896,058 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,898,726 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
43,291,002 >>> mbox cmd response: success
43,291,399 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,292,324 UART: [update-reset] Copying MAN_2 To MAN_1
43,329,909 UART: [update-reset Success] --
43,333,130 UART: [state] Locking Datavault
43,337,688 UART: [state] Locking PCR0, PCR1 and PCR31
43,339,898 UART: [state] Locking ICCM
43,342,484 UART: [exit] Launching FMC @ 0x40000130
43,351,171 UART:
43,351,411 UART: Running Caliptra FMC ...
43,352,516 UART:
43,352,675 UART: [state] CFI Enabled
43,396,802 UART: [art] Extend RT PCRs Done
43,397,984 UART: [art] Lock RT PCRs Done
43,399,388 UART: [art] Populate DV Done
43,405,068 UART: [fht] FMC Alias Private Key: 7
43,406,771 UART: [art] Derive CDI
43,407,605 UART: [art] Store in in slot 0x4
43,450,317 UART: [art] Derive Key Pair
43,451,472 UART: [art] Store priv key in slot 0x5
45,878,099 UART: [art] Derive Key Pair - Done
45,890,825 UART: [art] Signing Cert with AUTHO
45,892,126 UART: RITY.KEYID = 7
47,597,959 UART: [art] Erasing AUTHORITY.KEYID = 7
47,599,468 UART: [art] PUB.X = 1939A8B7F0F22CF0D8F8546A728A797F22D2E0DB5D7645E7109552491D4909A95B08DD289CD9F4D55D73A2C9AC4A1F6C
47,606,718 UART: [art] PUB.Y = 17998735CCB5A3028093A0AFA69753CAC2204D23A9A9EECC307604245A1B54BC15CC7D008373EF922E84C8B3A104E61A
47,613,930 UART: [art] SIG.R = 280387836C960D5E0614FDA4C117234B71D7DD95702F18D88F8CA65ECA051AFE0655E0B8B5C645C8E60597DE2D9642E8
47,621,301 UART: [art] SIG.S = DAA290EC39976C2DCCEE73019B759721AB6CF8C8B4B4845950F4743017B42AAF72E04165191C54EB8D692B8E37A9AE4E
48,600,127 UART: mbox::rt_entry...
48,601,074 UART: ____ _ _ _ ____ _____
48,603,063 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,605,081 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,607,032 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,608,991 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,610,847 UART: |_|
48,611,732 UART:
48,893,924 UART: [rt] Runtime listening for mailbox commands...
48,896,088 >>> mbox cmd response data (48 bytes)
48,896,696 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,899,017 >>> mbox cmd response data (48 bytes)
48,899,907 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,913,951 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
3,757,647 ready_for_fw is high
3,758,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,937,031 >>> mbox cmd response: success
19,189,406 UART:
19,189,792 UART: Running Caliptra FMC ...
19,190,893 UART:
19,191,050 UART: [state] CFI Enabled
19,198,636 UART: [fht] FMC Alias Private Key: 7
20,954,924 UART: [art] Extend RT PCRs Done
20,956,148 UART: [art] Lock RT PCRs Done
20,957,930 UART: [art] Populate DV Done
20,963,567 UART: [fht] FMC Alias Private Key: 7
20,965,133 UART: [art] Derive CDI
20,966,076 UART: [art] Store in in slot 0x4
21,008,594 UART: [art] Derive Key Pair
21,009,609 UART: [art] Store priv key in slot 0x5
23,436,536 UART: [art] Derive Key Pair - Done
23,449,477 UART: [art] Signing Cert with AUTHO
23,450,813 UART: RITY.KEYID = 7
25,156,380 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,888 UART: [art] PUB.X = D47F32578CBE6F2F1F0B7D6803EF6B8589FB06243DA2168C0E32A1B28FC2D4A2AD91086098DE38C0AD3C1892617FDBFC
25,165,185 UART: [art] PUB.Y = F6327BD0468C5EF9AD2C71DF929C9C7F8E85572CE139B83E81C10E65FCC75D804D1DCB7A7D82376D5DBC554D4F115757
25,172,439 UART: [art] SIG.R = 5A382E9A0C84F74BC25B78AFD4588C626219571A54609399E2D80ED480F3F96B24A358A778512ECDF071E696E120F611
25,179,808 UART: [art] SIG.S = 1DFD39BCDD84C03C3EBBA071D07539FB8E0C7DD94424786C51473E3C20512FBC51F4BB7E6331A8B9849F6D189E29A53D
26,158,566 UART: Caliptra RT
26,159,276 UART: [state] CFI Enabled
26,276,356 UART: [rt] RT listening for mailbox commands...
30,316,500 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,472,087 UART: [rt]cmd =0x41544d4e, len=14344
34,467,311 >>> mbox cmd response data (8 bytes)
34,468,037 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,498,807 UART: [rt]cmd =0x41545348, len=116
34,518,603 >>> mbox cmd response data (12 bytes)
36,564,893 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
43,493,141 >>> mbox cmd response: success
43,493,642 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,527,911 UART:
43,528,234 UART: Running Caliptra FMC ...
43,529,364 UART:
43,529,530 UART: [state] CFI Enabled
43,573,982 UART: [art] Extend RT PCRs Done
43,575,134 UART: [art] Lock RT PCRs Done
43,576,644 UART: [art] Populate DV Done
43,581,890 UART: [fht] FMC Alias Private Key: 7
43,583,535 UART: [art] Derive CDI
43,584,349 UART: [art] Store in in slot 0x4
43,626,840 UART: [art] Derive Key Pair
43,627,874 UART: [art] Store priv key in slot 0x5
46,054,292 UART: [art] Derive Key Pair - Done
46,067,381 UART: [art] Signing Cert with AUTHO
46,068,695 UART: RITY.KEYID = 7
47,773,924 UART: [art] Erasing AUTHORITY.KEYID = 7
47,775,430 UART: [art] PUB.X = 51FC3501B7E0732B239B58263B49E532E0C4AD587647D528AEBAEAC1FC44B689550B5C3389EA56F2F1E81557CD04BFA7
47,782,678 UART: [art] PUB.Y = 424A30DBC887479D8866E1B676CE54C12C73E58C74620C92B16A60D7B2E85ABA154F85370598C91315C7B1BCF088FB74
47,789,957 UART: [art] SIG.R = E6224B83EF9335E8131BAAD6F0066C6B73A0C8FE2C5504D0DCF78D033B50C2F678180FEA89B9E24F3E3ED2402C649AE0
47,797,336 UART: [art] SIG.S = E7CCC94940D249249A61A7A5A58189EC3D214AEDA77E96C405E3B37D375D22FB321826A4BB9D0F997B7EF5ACCED78A9B
48,775,851 UART: mbox::rt_entry...
48,776,807 UART: ____ _ _ _ ____ _____
48,778,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,780,808 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,782,748 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,784,682 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,786,624 UART: |_|
48,787,424 UART:
49,072,793 UART: [rt] Runtime listening for mailbox commands...
49,074,976 >>> mbox cmd response data (48 bytes)
49,075,606 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,077,930 >>> mbox cmd response data (48 bytes)
49,078,838 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,092,679 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,652 UART: [kat] HMAC-384Kdf
907,176 UART: [kat] LMS
1,475,372 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,773 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 ready_for_fw is high
1,480,927 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,146 UART: [idev] Erasing UDS.KEYID = 0
1,504,500 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,042 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,520,683 UART: [ldev] Erasing FE.KEYID = 1
1,546,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,082 UART: [ldev] --
1,585,397 UART: [fwproc] Waiting for Commands...
1,586,026 UART: [fwproc] Received command 0x46574c44
1,586,817 UART: [fwproc] Received Image of size 114084 bytes
2,881,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,524 >>> mbox cmd response: success
3,075,718 UART: [afmc] ++
3,075,886 UART: [afmc] CDI.KEYID = 6
3,076,248 UART: [afmc] SUBJECT.KEYID = 7
3,076,673 UART: [afmc] AUTHORITY.KEYID = 5
3,111,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,497 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,187 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,148 UART: [afmc] --
3,155,074 UART: [cold-reset] --
3,155,952 UART: [state] Locking Datavault
3,157,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,879 UART: [state] Locking ICCM
3,158,303 UART: [exit] Launching FMC @ 0x40000130
3,163,632 UART:
3,163,648 UART: Running Caliptra FMC ...
3,164,056 UART:
3,164,110 UART: [state] CFI Enabled
3,174,633 UART: [fht] FMC Alias Private Key: 7
3,282,346 UART: [art] Extend RT PCRs Done
3,282,774 UART: [art] Lock RT PCRs Done
3,284,432 UART: [art] Populate DV Done
3,292,575 UART: [fht] FMC Alias Private Key: 7
3,293,543 UART: [art] Derive CDI
3,293,823 UART: [art] Store in in slot 0x4
3,379,614 UART: [art] Derive Key Pair
3,379,974 UART: [art] Store priv key in slot 0x5
3,392,414 UART: [art] Derive Key Pair - Done
3,406,846 UART: [art] Signing Cert with AUTHO
3,407,326 UART: RITY.KEYID = 7
3,422,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,273 UART: [art] PUB.X = A9F96C6EF651B9A272CC2B285209F67ACA25C0BE614B9C05262AD83222B318AFE37C4945DDDCFF742AB9B53721220B08
3,430,041 UART: [art] PUB.Y = 0C4E9602683FDB08F0E1B3F320EF167655678F82D0ECC0D72EB229B842AB7BA56BA4FEB7C7E905D1919AE55FF65E6361
3,436,991 UART: [art] SIG.R = 0B0F835CDC0D3227674B849B10342A6B02A1A45F35BCEC239D81AAB7DD1A21FD9EB9AFE632552F995822B2958D65266B
3,443,757 UART: [art] SIG.S = DEDA8C4507696D756C6B99BA37F9667E37B62E10188808D442B331137A963F56B9E9C7BB8DE31270351135340984BD8E
3,467,949 UART: Caliptra RT
3,468,202 UART: [state] CFI Enabled
3,576,727 UART: [rt] RT listening for mailbox commands...
3,577,397 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,593 UART: [rt]cmd =0x41544d4e, len=14344
4,010,116 >>> mbox cmd response data (8 bytes)
4,010,117 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,282 UART: [rt]cmd =0x41545348, len=116
4,062,125 >>> mbox cmd response data (12 bytes)
4,062,126 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,062,762 UART:
4,062,778 UART: Running Caliptra ROM ...
4,063,186 UART:
4,063,240 UART: [state] CFI Enabled
4,065,716 UART: [state] LifecycleState = Unprovisioned
4,066,371 UART: [state] DebugLocked = No
4,067,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,068,592 UART: [kat] SHA2-256
4,862,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,866,638 UART: [kat] ++
4,866,790 UART: [kat] sha1
4,871,014 UART: [kat] SHA2-256
4,872,952 UART: [kat] SHA2-384
4,875,591 UART: [kat] SHA2-512-ACC
4,877,491 UART: [kat] ECC-384
4,883,092 UART: [kat] HMAC-384Kdf
4,887,698 UART: [kat] LMS
5,455,894 UART: [kat] --
5,456,947 UART: [update-reset] ++
6,380,801 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,382,003 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,478,065 >>> mbox cmd response: success
6,478,065 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,478,388 UART: [update-reset] Copying MAN_2 To MAN_1
6,486,402 UART: [update-reset Success] --
6,487,557 UART: [state] Locking Datavault
6,488,245 UART: [state] Locking PCR0, PCR1 and PCR31
6,488,849 UART: [state] Locking ICCM
6,489,321 UART: [exit] Launching FMC @ 0x40000130
6,494,650 UART:
6,494,666 UART: Running Caliptra FMC ...
6,495,074 UART:
6,495,128 UART: [state] CFI Enabled
6,584,253 UART: [art] Extend RT PCRs Done
6,584,681 UART: [art] Lock RT PCRs Done
6,585,960 UART: [art] Populate DV Done
6,594,201 UART: [fht] FMC Alias Private Key: 7
6,595,161 UART: [art] Derive CDI
6,595,441 UART: [art] Store in in slot 0x4
6,680,946 UART: [art] Derive Key Pair
6,681,306 UART: [art] Store priv key in slot 0x5
6,693,752 UART: [art] Derive Key Pair - Done
6,708,313 UART: [art] Signing Cert with AUTHO
6,708,793 UART: RITY.KEYID = 7
6,723,967 UART: [art] Erasing AUTHORITY.KEYID = 7
6,724,732 UART: [art] PUB.X = AE0F0AD70646D2F0BF0FC4101B048EC91EA73AE514C269811B53C25900038F18D3E733BBEBA183CBF41D9C1AD2E30E76
6,731,473 UART: [art] PUB.Y = 6D43148D9C19CC9CA136E10DEF414694D25FCE4A3AAC5611B2F1DFFE15A4B674BC57A7F4F010A8DC884763D204C6E8CF
6,738,435 UART: [art] SIG.R = 74A5C2452FCF1E4A8C0111AEEDDABBFD53CEFF42F1F6F0AC183A53266AB9941D6D9903C179BB30A809C9C4F8455DB791
6,745,216 UART: [art] SIG.S = 8086B7EA9CF56FAB691B788644ED49B2B0D0B8B165A733492D4EDBF9824F7CC1B7BBCAC99188DF5614BAF2BD7E1835C8
6,768,741 UART: mbox::rt_entry...
6,769,113 UART: ____ _ _ _ ____ _____
6,769,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,770,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,771,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,772,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,773,001 UART: |_|
6,773,313 UART:
7,053,689 UART: [rt] Runtime listening for mailbox commands...
7,054,879 >>> mbox cmd response data (48 bytes)
7,054,880 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,057,663 >>> mbox cmd response data (48 bytes)
7,057,664 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,072,801 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,745 ready_for_fw is high
1,361,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,582 >>> mbox cmd response: success
2,985,198 UART:
2,985,214 UART: Running Caliptra FMC ...
2,985,622 UART:
2,985,676 UART: [state] CFI Enabled
2,996,445 UART: [fht] FMC Alias Private Key: 7
3,104,494 UART: [art] Extend RT PCRs Done
3,104,922 UART: [art] Lock RT PCRs Done
3,106,384 UART: [art] Populate DV Done
3,114,727 UART: [fht] FMC Alias Private Key: 7
3,115,851 UART: [art] Derive CDI
3,116,131 UART: [art] Store in in slot 0x4
3,201,534 UART: [art] Derive Key Pair
3,201,894 UART: [art] Store priv key in slot 0x5
3,215,460 UART: [art] Derive Key Pair - Done
3,230,199 UART: [art] Signing Cert with AUTHO
3,230,679 UART: RITY.KEYID = 7
3,245,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,268 UART: [art] PUB.X = 53F4653F31DA4228700FE5E90B73AF66C423321998B835DB843886C86F200B85BB225FAF54FAC32F4F551BA3CE70494A
3,253,031 UART: [art] PUB.Y = E9BCC642F239AA5B5B47EBF1FAC9B1A8DE60E96D99F07B9D3441D363CE62B03A585DCB8A0CC8D923CE4B8C06CEB839DA
3,260,003 UART: [art] SIG.R = 9DFFD5E3C1F177EB2B1C9B19CB606CEC9D0DDD90ACDBA6708BC841ADD99A55663097641A5D5867ADDBFD9FCBFEE4205F
3,266,802 UART: [art] SIG.S = F24F2C520286BA2972B240F3C964D150902A183ADEC4030145185C09623C5D352A797F26F277D4495620C2348319E9F6
3,290,179 UART: Caliptra RT
3,290,432 UART: [state] CFI Enabled
3,398,782 UART: [rt] RT listening for mailbox commands...
3,399,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,288 UART: [rt]cmd =0x41544d4e, len=14344
3,832,555 >>> mbox cmd response data (8 bytes)
3,832,556 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,505 UART: [rt]cmd =0x41545348, len=116
3,884,454 >>> mbox cmd response data (12 bytes)
3,884,455 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,182,424 >>> mbox cmd response: success
6,182,424 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,196,127 UART:
6,196,143 UART: Running Caliptra FMC ...
6,196,551 UART:
6,196,605 UART: [state] CFI Enabled
6,285,478 UART: [art] Extend RT PCRs Done
6,285,906 UART: [art] Lock RT PCRs Done
6,287,157 UART: [art] Populate DV Done
6,295,338 UART: [fht] FMC Alias Private Key: 7
6,296,516 UART: [art] Derive CDI
6,296,796 UART: [art] Store in in slot 0x4
6,382,389 UART: [art] Derive Key Pair
6,382,749 UART: [art] Store priv key in slot 0x5
6,396,005 UART: [art] Derive Key Pair - Done
6,410,663 UART: [art] Signing Cert with AUTHO
6,411,143 UART: RITY.KEYID = 7
6,426,113 UART: [art] Erasing AUTHORITY.KEYID = 7
6,426,878 UART: [art] PUB.X = B2050E57DF43A937270587DDFF1BC6397A4880B68A0A2F4B2E402D520B11B31E4C6E124F58C009921DE3763B4225A025
6,433,628 UART: [art] PUB.Y = E47BDD046B7D8B0BFEB9E2841BDDC2ED3E71F7F0CE32B73D57361FAE0116979E88130D9186E1B75E67BEC38CD586D6E3
6,440,584 UART: [art] SIG.R = FCBB23C1CFB7544CD5CF0D472A27BA703BEC12F654958EA8A9E971B909DAFC1854DA55604FE8F0D65E54F6E68430C686
6,447,364 UART: [art] SIG.S = DD36C5462B9DA960B0272F3C98E7637FC77B555F4675810945847577611826E52DD610DA048741278DAD29F9E214C0A9
6,470,355 UART: mbox::rt_entry...
6,470,727 UART: ____ _ _ _ ____ _____
6,471,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,472,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,473,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,473,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,474,615 UART: |_|
6,474,927 UART:
6,755,772 UART: [rt] Runtime listening for mailbox commands...
6,756,962 >>> mbox cmd response data (48 bytes)
6,756,963 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,759,746 >>> mbox cmd response data (48 bytes)
6,759,747 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,774,884 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,155 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,776 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 ready_for_fw is high
1,481,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,515 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,114 UART: [ldev] ++
1,515,282 UART: [ldev] CDI.KEYID = 6
1,515,645 UART: [ldev] SUBJECT.KEYID = 5
1,516,071 UART: [ldev] AUTHORITY.KEYID = 7
1,516,534 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,243 UART: [ldev] --
1,586,598 UART: [fwproc] Waiting for Commands...
1,587,429 UART: [fwproc] Received command 0x46574c44
1,588,220 UART: [fwproc] Received Image of size 114084 bytes
2,883,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,404 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,197 >>> mbox cmd response: success
3,077,261 UART: [afmc] ++
3,077,429 UART: [afmc] CDI.KEYID = 6
3,077,791 UART: [afmc] SUBJECT.KEYID = 7
3,078,216 UART: [afmc] AUTHORITY.KEYID = 5
3,113,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,010 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,700 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,633 UART: [afmc] --
3,156,639 UART: [cold-reset] --
3,157,619 UART: [state] Locking Datavault
3,158,674 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,278 UART: [state] Locking ICCM
3,159,896 UART: [exit] Launching FMC @ 0x40000130
3,165,225 UART:
3,165,241 UART: Running Caliptra FMC ...
3,165,649 UART:
3,165,792 UART: [state] CFI Enabled
3,176,401 UART: [fht] FMC Alias Private Key: 7
3,284,220 UART: [art] Extend RT PCRs Done
3,284,648 UART: [art] Lock RT PCRs Done
3,286,116 UART: [art] Populate DV Done
3,294,073 UART: [fht] FMC Alias Private Key: 7
3,295,019 UART: [art] Derive CDI
3,295,299 UART: [art] Store in in slot 0x4
3,380,880 UART: [art] Derive Key Pair
3,381,240 UART: [art] Store priv key in slot 0x5
3,394,702 UART: [art] Derive Key Pair - Done
3,409,725 UART: [art] Signing Cert with AUTHO
3,410,205 UART: RITY.KEYID = 7
3,425,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,396 UART: [art] PUB.X = 009F750CD8D785E841D532752C3C9049097E5FCDD390F9FB9326C3436B9BB12AFB14F4DD695831F03A96391B243CD380
3,433,138 UART: [art] PUB.Y = C03BDFE78485C3B40CAC369C44678A98D85B3B5E9EF56FBD1E28C183C418C3496604A520A921892EAD317C96846AD7D4
3,440,088 UART: [art] SIG.R = 8FF1DAC82846467F0E3A1B2D69D2E8DD87AD89A9947BC4874E8AA610F6FA300957CE51B27FED0F173FF3820F483A8D77
3,446,858 UART: [art] SIG.S = 9D671EF62576BF5D96A673D24B181F24975ECDBDD0C2271CA4CD7440104B2EC3C9918E590EB6C23878AC1CEE575FB09D
3,470,922 UART: Caliptra RT
3,471,267 UART: [state] CFI Enabled
3,580,525 UART: [rt] RT listening for mailbox commands...
3,581,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,323 UART: [rt]cmd =0x41544d4e, len=14344
4,014,664 >>> mbox cmd response data (8 bytes)
4,014,665 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,658 UART: [rt]cmd =0x41545348, len=116
4,066,379 >>> mbox cmd response data (12 bytes)
4,066,380 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,092 UART:
4,067,108 UART: Running Caliptra ROM ...
4,067,516 UART:
4,067,657 UART: [state] CFI Enabled
4,070,793 UART: [state] LifecycleState = Unprovisioned
4,071,448 UART: [state] DebugLocked = No
4,071,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,073,505 UART: [kat] SHA2-256
4,867,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,871,551 UART: [kat] ++
4,871,703 UART: [kat] sha1
4,875,865 UART: [kat] SHA2-256
4,877,803 UART: [kat] SHA2-384
4,880,472 UART: [kat] SHA2-512-ACC
4,882,372 UART: [kat] ECC-384
4,888,339 UART: [kat] HMAC-384Kdf
4,892,981 UART: [kat] LMS
5,461,177 UART: [kat] --
5,462,150 UART: [update-reset] ++
6,386,198 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,387,336 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,483,398 >>> mbox cmd response: success
6,483,398 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,483,559 UART: [update-reset] Copying MAN_2 To MAN_1
6,491,573 UART: [update-reset Success] --
6,492,650 UART: [state] Locking Datavault
6,493,408 UART: [state] Locking PCR0, PCR1 and PCR31
6,494,012 UART: [state] Locking ICCM
6,494,540 UART: [exit] Launching FMC @ 0x40000130
6,499,869 UART:
6,499,885 UART: Running Caliptra FMC ...
6,500,293 UART:
6,500,436 UART: [state] CFI Enabled
6,588,751 UART: [art] Extend RT PCRs Done
6,589,179 UART: [art] Lock RT PCRs Done
6,590,412 UART: [art] Populate DV Done
6,598,415 UART: [fht] FMC Alias Private Key: 7
6,599,457 UART: [art] Derive CDI
6,599,737 UART: [art] Store in in slot 0x4
6,685,062 UART: [art] Derive Key Pair
6,685,422 UART: [art] Store priv key in slot 0x5
6,698,438 UART: [art] Derive Key Pair - Done
6,713,445 UART: [art] Signing Cert with AUTHO
6,713,925 UART: RITY.KEYID = 7
6,729,449 UART: [art] Erasing AUTHORITY.KEYID = 7
6,730,214 UART: [art] PUB.X = AFCC65C002127A081FC92A9E239978BCB7A574CB993A977CDDE8B8930D2E3C702865B5DE37EF999A5E19DEF68F74F40C
6,736,986 UART: [art] PUB.Y = D971D8DC0DB87437AD5D05691595E7800BEDC3FB7EE518953D2E4A2F7B5690B21F31009916206D3673076F4E34803E4B
6,743,900 UART: [art] SIG.R = 6D91C25872572A1C30713ECCEBABEE7F580EA64F4A5F6AEC1230A3569F5901034D761D9248B6BA0B94E5CB7ECAD99696
6,750,670 UART: [art] SIG.S = 632ABF4AC9F16B5819383375F640990C8F4B786150B7CD2F5752024F7F32EAF730BF9A75DA194B5F5116E95E58015A18
6,774,606 UART: mbox::rt_entry...
6,774,978 UART: ____ _ _ _ ____ _____
6,775,762 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,776,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,777,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,778,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,778,866 UART: |_|
6,779,178 UART:
7,058,365 UART: [rt] Runtime listening for mailbox commands...
7,059,555 >>> mbox cmd response data (48 bytes)
7,059,556 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,062,339 >>> mbox cmd response data (48 bytes)
7,062,340 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,077,477 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 ready_for_fw is high
1,363,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,285 >>> mbox cmd response: success
2,988,747 UART:
2,988,763 UART: Running Caliptra FMC ...
2,989,171 UART:
2,989,314 UART: [state] CFI Enabled
2,999,631 UART: [fht] FMC Alias Private Key: 7
3,108,022 UART: [art] Extend RT PCRs Done
3,108,450 UART: [art] Lock RT PCRs Done
3,110,040 UART: [art] Populate DV Done
3,118,241 UART: [fht] FMC Alias Private Key: 7
3,119,285 UART: [art] Derive CDI
3,119,565 UART: [art] Store in in slot 0x4
3,205,322 UART: [art] Derive Key Pair
3,205,682 UART: [art] Store priv key in slot 0x5
3,219,064 UART: [art] Derive Key Pair - Done
3,233,850 UART: [art] Signing Cert with AUTHO
3,234,330 UART: RITY.KEYID = 7
3,249,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,583 UART: [art] PUB.X = CCD4BE44F259C7592F81E914E74D55D26D6FC5356E3050E64CDB217DDB816C75C0EF340214B2E76E398CFAA6EAF6C840
3,257,364 UART: [art] PUB.Y = B9E55F99201AD56F1256D15068F77D5D29AA0AEAF187D6C8B844C0428B84338D816193AAF4C63397B75A97631E6B4B05
3,264,308 UART: [art] SIG.R = 3C35D11FC4C196F56BF795F88F5375322EFB5F84DBB5AA56FFCB3260FE1A1361BD7BC63271C342C55CC4EB69178D586B
3,271,092 UART: [art] SIG.S = 3FB13E422E290ACA05541E51A3810C57CA7C61D9CF9A3AD5546456847D15F94D3470AEA2F840C1764E36FC16609C8AC7
3,294,944 UART: Caliptra RT
3,295,289 UART: [state] CFI Enabled
3,402,801 UART: [rt] RT listening for mailbox commands...
3,403,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,955 UART: [rt]cmd =0x41544d4e, len=14344
3,836,736 >>> mbox cmd response data (8 bytes)
3,836,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,766 UART: [rt]cmd =0x41545348, len=116
3,888,205 >>> mbox cmd response data (12 bytes)
3,888,206 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,874 >>> mbox cmd response: success
6,185,874 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,199,335 UART:
6,199,351 UART: Running Caliptra FMC ...
6,199,759 UART:
6,199,902 UART: [state] CFI Enabled
6,289,143 UART: [art] Extend RT PCRs Done
6,289,571 UART: [art] Lock RT PCRs Done
6,290,904 UART: [art] Populate DV Done
6,299,089 UART: [fht] FMC Alias Private Key: 7
6,300,131 UART: [art] Derive CDI
6,300,411 UART: [art] Store in in slot 0x4
6,385,894 UART: [art] Derive Key Pair
6,386,254 UART: [art] Store priv key in slot 0x5
6,399,618 UART: [art] Derive Key Pair - Done
6,414,553 UART: [art] Signing Cert with AUTHO
6,415,033 UART: RITY.KEYID = 7
6,430,579 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,344 UART: [art] PUB.X = E008AC512DC70229A7272F5381F7E987B4C91FEB79F31F66FEF3FAC14EE09C9D31D16CB2357939A569D34B5BED47307F
6,438,118 UART: [art] PUB.Y = BA4BC7C70493B5A45B52E0D5DFEBEB3859515FDC0C4F985D4DD3D8EF8F5CAAC60BBC1F722B827B2C3F71D11BA56D7CF8
6,445,089 UART: [art] SIG.R = 9336C49BFFDF818F6F32825140FAB9096F7D28FF2A601720A285ADD4D98CEDFE812D48BBD611305B69C88D319309F76C
6,451,861 UART: [art] SIG.S = 8F3A906608FC40F7F7878E2281DB9FF88B8ED44595A51FFD24E3AF58D932B4599B7039FC6F0AC339CD01120977C9D9C2
6,475,408 UART: mbox::rt_entry...
6,475,780 UART: ____ _ _ _ ____ _____
6,476,564 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,477,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,478,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,478,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,479,668 UART: |_|
6,479,980 UART:
6,760,455 UART: [rt] Runtime listening for mailbox commands...
6,761,645 >>> mbox cmd response data (48 bytes)
6,761,646 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,764,429 >>> mbox cmd response data (48 bytes)
6,764,430 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,779,567 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,806 UART: [kat] SHA2-512-ACC
908,707 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 ready_for_fw is high
1,176,003 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,466 UART: [idev] Erasing UDS.KEYID = 0
1,200,455 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,103 UART: [ldev] ++
1,210,271 UART: [ldev] CDI.KEYID = 6
1,210,634 UART: [ldev] SUBJECT.KEYID = 5
1,211,060 UART: [ldev] AUTHORITY.KEYID = 7
1,211,523 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,282 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,867 >>> mbox cmd response: success
2,772,051 UART: [afmc] ++
2,772,219 UART: [afmc] CDI.KEYID = 6
2,772,581 UART: [afmc] SUBJECT.KEYID = 7
2,773,006 UART: [afmc] AUTHORITY.KEYID = 5
2,808,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,055 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,634 UART: [afmc] --
2,851,756 UART: [cold-reset] --
2,852,590 UART: [state] Locking Datavault
2,853,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,387 UART: [state] Locking ICCM
2,854,985 UART: [exit] Launching FMC @ 0x40000130
2,860,314 UART:
2,860,330 UART: Running Caliptra FMC ...
2,860,738 UART:
2,860,792 UART: [state] CFI Enabled
2,871,333 UART: [fht] FMC Alias Private Key: 7
2,978,782 UART: [art] Extend RT PCRs Done
2,979,210 UART: [art] Lock RT PCRs Done
2,980,570 UART: [art] Populate DV Done
2,989,047 UART: [fht] FMC Alias Private Key: 7
2,990,067 UART: [art] Derive CDI
2,990,347 UART: [art] Store in in slot 0x4
3,076,018 UART: [art] Derive Key Pair
3,076,378 UART: [art] Store priv key in slot 0x5
3,090,286 UART: [art] Derive Key Pair - Done
3,104,953 UART: [art] Signing Cert with AUTHO
3,105,433 UART: RITY.KEYID = 7
3,120,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,268 UART: [art] PUB.X = 6F47D641BEDD5DDA67E3C8F62FF39BAC73F16A3736AAA5619F483848864D259A573B1CB70DA707AAD830E6D24591E8E0
3,128,044 UART: [art] PUB.Y = D8A276B259411D62347C895463C1BCE515096588874DD7B9197CC1B6121E119161DFD696300F22697DA8F9FB17B4D65A
3,134,982 UART: [art] SIG.R = 5C097B90384D554D417D8ACF1B6815B1D24BAFA18CB9EF1D334A8984BAA5AA73BA93CD1A48BC5E10EB852E258B6CDC16
3,141,769 UART: [art] SIG.S = 7784AC166AFCDB66BF18A9D4E1288C114BBD6112869011E98E5A6CA9D2FB639FFE5808F8EF65A175FF8A6C16BFCC4D66
3,165,765 UART: Caliptra RT
3,166,018 UART: [state] CFI Enabled
3,273,591 UART: [rt] RT listening for mailbox commands...
3,274,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,503 UART: [rt]cmd =0x41544d4e, len=14344
3,706,992 >>> mbox cmd response data (8 bytes)
3,706,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,908 UART: [rt]cmd =0x41545348, len=116
3,758,995 >>> mbox cmd response data (12 bytes)
3,758,996 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,925 UART:
3,759,941 UART: Running Caliptra ROM ...
3,760,349 UART:
3,760,404 UART: [state] CFI Enabled
3,762,646 UART: [state] LifecycleState = Unprovisioned
3,763,301 UART: [state] DebugLocked = No
3,763,839 UART: [state] WD Timer not started. Device not locked for debugging
3,764,951 UART: [kat] SHA2-256
4,570,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,574,726 UART: [kat] ++
4,574,878 UART: [kat] sha1
4,579,184 UART: [kat] SHA2-256
4,581,124 UART: [kat] SHA2-384
4,583,903 UART: [kat] SHA2-512-ACC
4,585,803 UART: [kat] ECC-384
4,595,476 UART: [kat] HMAC-384Kdf
4,599,910 UART: [kat] LMS
4,848,238 UART: [kat] --
4,849,276 UART: [update-reset] ++
5,750,548 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,751,543 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,847,553 >>> mbox cmd response: success
5,847,553 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,847,860 UART: [update-reset] Copying MAN_2 To MAN_1
5,855,874 UART: [update-reset Success] --
5,856,931 UART: [state] Locking Datavault
5,857,693 UART: [state] Locking PCR0, PCR1 and PCR31
5,858,297 UART: [state] Locking ICCM
5,858,741 UART: [exit] Launching FMC @ 0x40000130
5,864,070 UART:
5,864,086 UART: Running Caliptra FMC ...
5,864,494 UART:
5,864,548 UART: [state] CFI Enabled
5,953,375 UART: [art] Extend RT PCRs Done
5,953,803 UART: [art] Lock RT PCRs Done
5,955,034 UART: [art] Populate DV Done
5,963,317 UART: [fht] FMC Alias Private Key: 7
5,964,379 UART: [art] Derive CDI
5,964,659 UART: [art] Store in in slot 0x4
6,050,560 UART: [art] Derive Key Pair
6,050,920 UART: [art] Store priv key in slot 0x5
6,064,114 UART: [art] Derive Key Pair - Done
6,079,071 UART: [art] Signing Cert with AUTHO
6,079,551 UART: RITY.KEYID = 7
6,094,409 UART: [art] Erasing AUTHORITY.KEYID = 7
6,095,174 UART: [art] PUB.X = 2040164C0DC39C70F8D7D60C1AF88AFB2268AC282F953BAE203A62A8A9F4847E8B42A4D24A25AB0F7430C4C639EF941A
6,101,945 UART: [art] PUB.Y = 3E2DFE80E8DB5437B96A37A1701FF78C92F9FAD0DF59FBF5C7A8E6DD7CCB1E811B646BE1B54329283041DD3D02D105A1
6,108,907 UART: [art] SIG.R = F61D69D2E287339BE51D799899F5DDB73F9BF453682D395069D7F7169CF326D60CB079F5B7C0E9D5C628320087DAF460
6,115,652 UART: [art] SIG.S = 240C8AF1BD4C4ED1BBE2AA1992BB9E123E6F5BF3954715E439EEC3400EFCC1F0CA2C594D1E6B6BAE5C1E7DC07E2DAD58
6,139,025 UART: mbox::rt_entry...
6,139,397 UART: ____ _ _ _ ____ _____
6,140,181 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,140,981 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,141,749 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,142,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,143,285 UART: |_|
6,143,597 UART:
6,419,033 UART: [rt] Runtime listening for mailbox commands...
6,420,223 >>> mbox cmd response data (48 bytes)
6,420,224 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,423,007 >>> mbox cmd response data (48 bytes)
6,423,008 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,438,145 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,279 ready_for_fw is high
1,059,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,892 >>> mbox cmd response: success
2,685,940 UART:
2,685,956 UART: Running Caliptra FMC ...
2,686,364 UART:
2,686,418 UART: [state] CFI Enabled
2,696,749 UART: [fht] FMC Alias Private Key: 7
2,804,668 UART: [art] Extend RT PCRs Done
2,805,096 UART: [art] Lock RT PCRs Done
2,806,644 UART: [art] Populate DV Done
2,814,917 UART: [fht] FMC Alias Private Key: 7
2,816,053 UART: [art] Derive CDI
2,816,333 UART: [art] Store in in slot 0x4
2,901,592 UART: [art] Derive Key Pair
2,901,952 UART: [art] Store priv key in slot 0x5
2,914,676 UART: [art] Derive Key Pair - Done
2,929,419 UART: [art] Signing Cert with AUTHO
2,929,899 UART: RITY.KEYID = 7
2,945,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,866 UART: [art] PUB.X = 24C6B73E271CB26C30A032C7A861D34B9E4C93B33CFB291BF20869E05D91C9F87422E69986B6B3CBB060DE6336C05D3E
2,952,639 UART: [art] PUB.Y = 2BA8500656FF8AF6378198A9ED432E55BC91510AD00CBABD8FDC99A610BE422D61196A4078AC130E1151B9F50E58BA2A
2,959,584 UART: [art] SIG.R = 762BAA9356B0A24A491AC7446C2439AF30CD2C25C17E69F8147D1A4AFF148E9938CBBCE9E03593B0A531DD2725175134
2,966,358 UART: [art] SIG.S = 345C9343BAD2F58A3CC0AF5E04A9CB6B6C99682A29EBC82FE26EA03F35568533E1167DE9500914D1F1124C99902BE056
2,989,859 UART: Caliptra RT
2,990,112 UART: [state] CFI Enabled
3,097,837 UART: [rt] RT listening for mailbox commands...
3,098,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,589 UART: [rt]cmd =0x41544d4e, len=14344
3,530,986 >>> mbox cmd response data (8 bytes)
3,530,987 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,192 UART: [rt]cmd =0x41545348, len=116
3,583,899 >>> mbox cmd response data (12 bytes)
3,583,900 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,556,804 >>> mbox cmd response: success
5,556,804 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,570,184 UART:
5,570,200 UART: Running Caliptra FMC ...
5,570,608 UART:
5,570,662 UART: [state] CFI Enabled
5,659,921 UART: [art] Extend RT PCRs Done
5,660,349 UART: [art] Lock RT PCRs Done
5,661,648 UART: [art] Populate DV Done
5,670,053 UART: [fht] FMC Alias Private Key: 7
5,670,985 UART: [art] Derive CDI
5,671,265 UART: [art] Store in in slot 0x4
5,756,398 UART: [art] Derive Key Pair
5,756,758 UART: [art] Store priv key in slot 0x5
5,769,662 UART: [art] Derive Key Pair - Done
5,784,415 UART: [art] Signing Cert with AUTHO
5,784,895 UART: RITY.KEYID = 7
5,800,013 UART: [art] Erasing AUTHORITY.KEYID = 7
5,800,778 UART: [art] PUB.X = 7E8EA4339C7A8E994683ED706A41BD3FEE6CE66F77E6C7405C0EF7C7F17EECF1241B848B0C5ED7C851D76234DDFAC054
5,807,560 UART: [art] PUB.Y = F40262BE1833FD7F305A256B5F77A2B70300A372B575ED81AF8612FC3FE8628CFE19334B5303C474D3535C146CED4B66
5,814,481 UART: [art] SIG.R = 5C0653FEB13FE5AE75F83A5CEC136873D5082E3E4B411E821A4C1960D3A031A0CB1E47A873F2F875AAB91E434B3378FA
5,821,255 UART: [art] SIG.S = D86407560B7287DD996106267BCC2CE7FA528B790D6D392FD7A07B51E04739DD9988732C44AB6C99ADE15317FF14EE6D
5,844,436 UART: mbox::rt_entry...
5,844,808 UART: ____ _ _ _ ____ _____
5,845,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,846,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,847,160 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,847,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,848,696 UART: |_|
5,849,008 UART:
6,128,748 UART: [rt] Runtime listening for mailbox commands...
6,129,938 >>> mbox cmd response data (48 bytes)
6,129,939 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,132,722 >>> mbox cmd response data (48 bytes)
6,132,723 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,147,860 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,398 UART: [kat] SHA2-256
904,338 UART: [kat] SHA2-384
907,133 UART: [kat] SHA2-512-ACC
909,034 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,525 UART: [kat] LMS
1,171,853 UART: [kat] --
1,172,560 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,857 UART: [idev] ++
1,176,025 UART: [idev] CDI.KEYID = 6
1,176,385 UART: [idev] SUBJECT.KEYID = 7
1,176,809 UART: [idev] UDS.KEYID = 0
1,177,154 ready_for_fw is high
1,177,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,355 UART: [idev] Erasing UDS.KEYID = 0
1,201,554 UART: [idev] Sha1 KeyId Algorithm
1,210,076 UART: [idev] --
1,211,110 UART: [ldev] ++
1,211,278 UART: [ldev] CDI.KEYID = 6
1,211,641 UART: [ldev] SUBJECT.KEYID = 5
1,212,067 UART: [ldev] AUTHORITY.KEYID = 7
1,212,530 UART: [ldev] FE.KEYID = 1
1,217,820 UART: [ldev] Erasing FE.KEYID = 1
1,244,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,287 UART: [fwproc] Recv command 0x46574c44
1,285,015 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,530 >>> mbox cmd response: success
2,773,602 UART: [afmc] ++
2,773,770 UART: [afmc] CDI.KEYID = 6
2,774,132 UART: [afmc] SUBJECT.KEYID = 7
2,774,557 UART: [afmc] AUTHORITY.KEYID = 5
2,810,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,779 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,417 UART: [afmc] --
2,853,415 UART: [cold-reset] --
2,854,089 UART: [state] Locking Datavault
2,855,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,778 UART: [state] Locking ICCM
2,856,210 UART: [exit] Launching FMC @ 0x40000130
2,861,539 UART:
2,861,555 UART: Running Caliptra FMC ...
2,861,963 UART:
2,862,106 UART: [state] CFI Enabled
2,872,847 UART: [fht] FMC Alias Private Key: 7
2,980,884 UART: [art] Extend RT PCRs Done
2,981,312 UART: [art] Lock RT PCRs Done
2,982,920 UART: [art] Populate DV Done
2,991,187 UART: [fht] FMC Alias Private Key: 7
2,992,129 UART: [art] Derive CDI
2,992,409 UART: [art] Store in in slot 0x4
3,077,622 UART: [art] Derive Key Pair
3,077,982 UART: [art] Store priv key in slot 0x5
3,091,440 UART: [art] Derive Key Pair - Done
3,106,277 UART: [art] Signing Cert with AUTHO
3,106,757 UART: RITY.KEYID = 7
3,121,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,628 UART: [art] PUB.X = CEC26F37BF86F4046BBE53AC6E89E99471C98662D6BD7EE338178D8F9BFEC3327FA2789C26E1F40C29E0A0C0A60F5F61
3,129,403 UART: [art] PUB.Y = 76208A346318F4FF25CF629F7636C5CC37F046D3CF8EB4DEDE89EF3280C686BB4B68FE482A3E6F5F878B7BA7150D19EE
3,136,364 UART: [art] SIG.R = 559F9F757F79D6A9FCED07411DC39A72063D889232454C59AD3A84120DC7756CC30C1104EF79D864EF3658598EFEB303
3,143,116 UART: [art] SIG.S = B9A00B2A05CB16BD5768C5F4F92D1F8CF7209E0FB96878A10E36997AFEB8B27BCF99B1A9608D615A4125F6C7C9B355A4
3,166,993 UART: Caliptra RT
3,167,338 UART: [state] CFI Enabled
3,274,161 UART: [rt] RT listening for mailbox commands...
3,274,831 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,711 UART: [rt]cmd =0x41544d4e, len=14344
3,707,558 >>> mbox cmd response data (8 bytes)
3,707,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,730 UART: [rt]cmd =0x41545348, len=116
3,759,807 >>> mbox cmd response data (12 bytes)
3,759,808 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,439 UART:
3,760,455 UART: Running Caliptra ROM ...
3,760,863 UART:
3,761,005 UART: [state] CFI Enabled
3,763,783 UART: [state] LifecycleState = Unprovisioned
3,764,438 UART: [state] DebugLocked = No
3,765,084 UART: [state] WD Timer not started. Device not locked for debugging
3,766,434 UART: [kat] SHA2-256
4,572,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,576,209 UART: [kat] ++
4,576,361 UART: [kat] sha1
4,580,423 UART: [kat] SHA2-256
4,582,363 UART: [kat] SHA2-384
4,585,184 UART: [kat] SHA2-512-ACC
4,587,084 UART: [kat] ECC-384
4,596,927 UART: [kat] HMAC-384Kdf
4,601,759 UART: [kat] LMS
4,850,087 UART: [kat] --
4,851,173 UART: [update-reset] ++
5,753,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,754,964 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,850,974 >>> mbox cmd response: success
5,850,974 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,851,295 UART: [update-reset] Copying MAN_2 To MAN_1
5,859,309 UART: [update-reset Success] --
5,860,162 UART: [state] Locking Datavault
5,860,866 UART: [state] Locking PCR0, PCR1 and PCR31
5,861,470 UART: [state] Locking ICCM
5,862,064 UART: [exit] Launching FMC @ 0x40000130
5,867,393 UART:
5,867,409 UART: Running Caliptra FMC ...
5,867,817 UART:
5,867,960 UART: [state] CFI Enabled
5,957,061 UART: [art] Extend RT PCRs Done
5,957,489 UART: [art] Lock RT PCRs Done
5,958,946 UART: [art] Populate DV Done
5,967,343 UART: [fht] FMC Alias Private Key: 7
5,968,385 UART: [art] Derive CDI
5,968,665 UART: [art] Store in in slot 0x4
6,054,506 UART: [art] Derive Key Pair
6,054,866 UART: [art] Store priv key in slot 0x5
6,068,098 UART: [art] Derive Key Pair - Done
6,083,006 UART: [art] Signing Cert with AUTHO
6,083,486 UART: RITY.KEYID = 7
6,098,176 UART: [art] Erasing AUTHORITY.KEYID = 7
6,098,941 UART: [art] PUB.X = 5D46D1827A5E38817D7943C823E5ACCE4A9E8E14F3F1243C88B7EC07A85113D0FABC5791BDE9F49BF83BD419A979CA94
6,105,720 UART: [art] PUB.Y = 2BC60C8EAEE89D8E243C0E8DB09E6F07FC20B6C17D2BA09F6B1D5C599731A7A2A4E97DC75C246EFA73426512503D07C3
6,112,672 UART: [art] SIG.R = 6BF0C5AC7AD3446EA399F571E224DAAE7C23D777604365DF7385DF4CEE5E5DF4A3B7450A886F975D822EE44ED8695C0B
6,119,450 UART: [art] SIG.S = EA898441D52D8B94838F79DAE37EE3C14E3BF8D0F3AF8C3EC7332D4E42E6880404AC56EB9D798A5E80EE1C9C6BD31A7C
6,143,631 UART: mbox::rt_entry...
6,144,003 UART: ____ _ _ _ ____ _____
6,144,787 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,145,587 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,146,355 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,147,123 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,147,891 UART: |_|
6,148,203 UART:
6,422,817 UART: [rt] Runtime listening for mailbox commands...
6,424,007 >>> mbox cmd response data (48 bytes)
6,424,008 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,426,791 >>> mbox cmd response data (48 bytes)
6,426,792 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,441,929 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 ready_for_fw is high
1,060,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,405 >>> mbox cmd response: success
2,687,391 UART:
2,687,407 UART: Running Caliptra FMC ...
2,687,815 UART:
2,687,958 UART: [state] CFI Enabled
2,698,695 UART: [fht] FMC Alias Private Key: 7
2,806,882 UART: [art] Extend RT PCRs Done
2,807,310 UART: [art] Lock RT PCRs Done
2,808,870 UART: [art] Populate DV Done
2,817,237 UART: [fht] FMC Alias Private Key: 7
2,818,233 UART: [art] Derive CDI
2,818,513 UART: [art] Store in in slot 0x4
2,904,180 UART: [art] Derive Key Pair
2,904,540 UART: [art] Store priv key in slot 0x5
2,917,664 UART: [art] Derive Key Pair - Done
2,932,502 UART: [art] Signing Cert with AUTHO
2,932,982 UART: RITY.KEYID = 7
2,948,714 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,479 UART: [art] PUB.X = 556A4585B07445E2F4613799F1AD273A1B10E726CDDD8AE021E94176D9FB58D15F45DE5AE000D1DC04CC719D1B05137F
2,956,227 UART: [art] PUB.Y = CE6453034C5FFEE1C8524AB64FCE90A1FE9E191A95321FC1649447DF3D45784C5E80076E3B7A7FD3B184B8ACE513C4EE
2,963,185 UART: [art] SIG.R = A8FAE2936E9E785ED9EBF10AA4819ABBCFA672F0907917B9F2FEF6C3C2D5EC07F4E71F2D300735FBEFB63565C34FF0FF
2,969,972 UART: [art] SIG.S = 769C59A4102A82DE94F3B44B30E39260B2451D297F3769904B12C070B604A510E4DAEAD658930F0EE21713CF42C18F20
2,994,232 UART: Caliptra RT
2,994,577 UART: [state] CFI Enabled
3,102,024 UART: [rt] RT listening for mailbox commands...
3,102,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,986 UART: [rt]cmd =0x41544d4e, len=14344
3,535,505 >>> mbox cmd response data (8 bytes)
3,535,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,707 UART: [rt]cmd =0x41545348, len=116
3,586,864 >>> mbox cmd response data (12 bytes)
3,586,865 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,559,160 >>> mbox cmd response: success
5,559,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,572,478 UART:
5,572,494 UART: Running Caliptra FMC ...
5,572,902 UART:
5,573,045 UART: [state] CFI Enabled
5,661,922 UART: [art] Extend RT PCRs Done
5,662,350 UART: [art] Lock RT PCRs Done
5,663,677 UART: [art] Populate DV Done
5,671,826 UART: [fht] FMC Alias Private Key: 7
5,672,948 UART: [art] Derive CDI
5,673,228 UART: [art] Store in in slot 0x4
5,759,259 UART: [art] Derive Key Pair
5,759,619 UART: [art] Store priv key in slot 0x5
5,773,149 UART: [art] Derive Key Pair - Done
5,787,933 UART: [art] Signing Cert with AUTHO
5,788,413 UART: RITY.KEYID = 7
5,803,653 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,418 UART: [art] PUB.X = 054A89A148145F2763EDDF6A5E5CF3C199E9273B03958E9F733064D21AEEB24839C009A023C3AAABB0581C65592910B3
5,811,179 UART: [art] PUB.Y = DA0E865C9881302E24286AE58454F732F2E74F573FBFACDF33607EBC9D9E46240C02FAB967002BF46925DA6EA4B54950
5,818,104 UART: [art] SIG.R = 3C72C7E35D1C596D9A49C9C4754D386AFD5FCD7FBBC1BFB48B1786D06397CFFFBACEB998C144FC2349C6A68F5FA423BA
5,824,900 UART: [art] SIG.S = 91D26E2ADC4369FB49D42F26BD59AAE3E8F6CEEA3DB9FED2FD2E44314A5935C03C50214AFB2741EBB55F2E35275947F7
5,848,383 UART: mbox::rt_entry...
5,848,755 UART: ____ _ _ _ ____ _____
5,849,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,850,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,851,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,851,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,852,643 UART: |_|
5,852,955 UART:
6,137,359 UART: [rt] Runtime listening for mailbox commands...
6,138,549 >>> mbox cmd response data (48 bytes)
6,138,550 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,141,333 >>> mbox cmd response data (48 bytes)
6,141,334 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,156,471 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,551 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 ready_for_fw is high
1,174,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,041 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,671 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,280,920 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,233 >>> mbox cmd response: success
2,768,296 UART: [afmc] ++
2,768,464 UART: [afmc] CDI.KEYID = 6
2,768,827 UART: [afmc] SUBJECT.KEYID = 7
2,769,253 UART: [afmc] AUTHORITY.KEYID = 5
2,804,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,119 UART: [afmc] --
2,848,223 UART: [cold-reset] --
2,849,163 UART: [state] Locking Datavault
2,850,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,800 UART: [state] Locking ICCM
2,851,334 UART: [exit] Launching FMC @ 0x40000130
2,856,663 UART:
2,856,679 UART: Running Caliptra FMC ...
2,857,087 UART:
2,857,141 UART: [state] CFI Enabled
2,867,514 UART: [fht] FMC Alias Private Key: 7
2,975,585 UART: [art] Extend RT PCRs Done
2,976,013 UART: [art] Lock RT PCRs Done
2,977,225 UART: [art] Populate DV Done
2,985,386 UART: [fht] FMC Alias Private Key: 7
2,986,354 UART: [art] Derive CDI
2,986,634 UART: [art] Store in in slot 0x4
3,072,537 UART: [art] Derive Key Pair
3,072,897 UART: [art] Store priv key in slot 0x5
3,085,913 UART: [art] Derive Key Pair - Done
3,100,621 UART: [art] Signing Cert with AUTHO
3,101,101 UART: RITY.KEYID = 7
3,116,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,768 UART: [art] PUB.X = 3BF6CA534F74F44FA616FA2ECFCDA38B1B19FC205B5FC1F5E8611B9B2D69D0C6C115C9C0F69AEE9ECF2761DC86466112
3,123,560 UART: [art] PUB.Y = 993BB6D0B38CD36CC3DDF184F051A8C709D41B37124C0650BB5B656023E52D257C50F5597A9AD04642D91D95669E8576
3,130,502 UART: [art] SIG.R = E45A58CC6C239895338B29498F20093DD4A692879A9810ECB6DBB42B3312EA9DFD21A7C71F40908F96E7DE582BCB5D0A
3,137,274 UART: [art] SIG.S = A0E630E71E2D7AC24AECF025AD6892EC112AB7C760468B6A73BB245C19F2F815E22EDAF78D1A2E509019E3396C0472E0
3,161,334 UART: Caliptra RT
3,161,587 UART: [state] CFI Enabled
3,268,609 UART: [rt] RT listening for mailbox commands...
3,269,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,471 UART: [rt]cmd =0x41544d4e, len=14344
3,702,632 >>> mbox cmd response data (8 bytes)
3,702,633 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,744 UART: [rt]cmd =0x41545348, len=116
3,754,463 >>> mbox cmd response data (12 bytes)
3,754,464 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,203 UART:
3,755,219 UART: Running Caliptra ROM ...
3,755,627 UART:
3,755,682 UART: [state] CFI Enabled
3,758,308 UART: [state] LifecycleState = Unprovisioned
3,758,963 UART: [state] DebugLocked = No
3,759,501 UART: [state] WD Timer not started. Device not locked for debugging
3,760,681 UART: [kat] SHA2-256
4,564,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,568,360 UART: [kat] ++
4,568,512 UART: [kat] sha1
4,572,594 UART: [kat] SHA2-256
4,574,534 UART: [kat] SHA2-384
4,577,219 UART: [kat] SHA2-512-ACC
4,579,119 UART: [kat] ECC-384
4,588,708 UART: [kat] HMAC-384Kdf
4,593,470 UART: [kat] LMS
4,841,782 UART: [kat] --
4,842,670 UART: [update-reset] ++
5,744,063 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,745,130 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,841,140 >>> mbox cmd response: success
5,841,140 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,841,285 UART: [update-reset] Copying MAN_2 To MAN_1
5,849,299 UART: [update-reset Success] --
5,850,176 UART: [state] Locking Datavault
5,850,966 UART: [state] Locking PCR0, PCR1 and PCR31
5,851,570 UART: [state] Locking ICCM
5,852,106 UART: [exit] Launching FMC @ 0x40000130
5,857,435 UART:
5,857,451 UART: Running Caliptra FMC ...
5,857,859 UART:
5,857,913 UART: [state] CFI Enabled
5,946,638 UART: [art] Extend RT PCRs Done
5,947,066 UART: [art] Lock RT PCRs Done
5,948,301 UART: [art] Populate DV Done
5,956,730 UART: [fht] FMC Alias Private Key: 7
5,957,826 UART: [art] Derive CDI
5,958,106 UART: [art] Store in in slot 0x4
6,043,707 UART: [art] Derive Key Pair
6,044,067 UART: [art] Store priv key in slot 0x5
6,057,591 UART: [art] Derive Key Pair - Done
6,072,546 UART: [art] Signing Cert with AUTHO
6,073,026 UART: RITY.KEYID = 7
6,088,350 UART: [art] Erasing AUTHORITY.KEYID = 7
6,089,115 UART: [art] PUB.X = 73F73AB88C9D2883882D90E5E5CBDEB9FE97E08C5A82FBBC40C7CF6D010978D08E1867BB6598460E85A0CF55E7D37593
6,095,886 UART: [art] PUB.Y = 488DF7A0142AE8E6E64ECB352FF6E468F7772875F88FABC541476B965C55C9668B425115F46A81997CC32D5511AC6140
6,102,834 UART: [art] SIG.R = 9A40CC8F2082911CAFE62E95B38A9659C346D11E84721ACB7E82041373175775C93C7D9AA0ED98EDF796EC51B55A01FB
6,109,604 UART: [art] SIG.S = 7E3341946EE952C032F32D7C6019E965EB6695F5462B730A689B0248ECF9A9556B6C9B08667988170468050A180D40D1
6,133,320 UART: mbox::rt_entry...
6,133,692 UART: ____ _ _ _ ____ _____
6,134,476 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,135,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,136,044 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,136,812 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,137,580 UART: |_|
6,137,892 UART:
6,414,780 UART: [rt] Runtime listening for mailbox commands...
6,415,970 >>> mbox cmd response data (48 bytes)
6,415,971 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,418,754 >>> mbox cmd response data (48 bytes)
6,418,755 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,433,892 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,288 ready_for_fw is high
1,056,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,907 >>> mbox cmd response: success
2,679,653 UART:
2,679,669 UART: Running Caliptra FMC ...
2,680,077 UART:
2,680,131 UART: [state] CFI Enabled
2,690,642 UART: [fht] FMC Alias Private Key: 7
2,799,133 UART: [art] Extend RT PCRs Done
2,799,561 UART: [art] Lock RT PCRs Done
2,801,407 UART: [art] Populate DV Done
2,809,744 UART: [fht] FMC Alias Private Key: 7
2,810,722 UART: [art] Derive CDI
2,811,002 UART: [art] Store in in slot 0x4
2,896,843 UART: [art] Derive Key Pair
2,897,203 UART: [art] Store priv key in slot 0x5
2,910,121 UART: [art] Derive Key Pair - Done
2,925,102 UART: [art] Signing Cert with AUTHO
2,925,582 UART: RITY.KEYID = 7
2,940,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,135 UART: [art] PUB.X = B48BBDA2871D8E32AE451CAD71439CEFB3FCD8CBEC3E878D83F9EEFE3ACA03CCA05B184596E3D7A4FC23419B19CBE83A
2,947,934 UART: [art] PUB.Y = 13F1FF858CAE02380B11CCABD66FFAAB611F024C1CE1DC9ECD68406B4EE5B684CC79417AD3F008E0C1502D6E5DF5D1A3
2,954,896 UART: [art] SIG.R = 55E8B20A8F4099711FFFA62D4C29CBABCDE0A59E49E3E704BB962FBF3DE498A8EE825D20FD2525BAF91ED0E3AFA776E3
2,961,686 UART: [art] SIG.S = 962CD11C2BFEE2F881D6679EA14EA3903274C31867C89FF649A96AED903A2AA8791F821F4455BEBA07AFCE1C35504DC2
2,985,300 UART: Caliptra RT
2,985,553 UART: [state] CFI Enabled
3,093,330 UART: [rt] RT listening for mailbox commands...
3,094,000 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,910 UART: [rt]cmd =0x41544d4e, len=14344
3,526,611 >>> mbox cmd response data (8 bytes)
3,526,612 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,593 UART: [rt]cmd =0x41545348, len=116
3,576,974 >>> mbox cmd response data (12 bytes)
3,576,975 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,545,780 >>> mbox cmd response: success
5,545,780 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,558,898 UART:
5,558,914 UART: Running Caliptra FMC ...
5,559,322 UART:
5,559,376 UART: [state] CFI Enabled
5,647,893 UART: [art] Extend RT PCRs Done
5,648,321 UART: [art] Lock RT PCRs Done
5,649,688 UART: [art] Populate DV Done
5,658,089 UART: [fht] FMC Alias Private Key: 7
5,659,053 UART: [art] Derive CDI
5,659,333 UART: [art] Store in in slot 0x4
5,745,136 UART: [art] Derive Key Pair
5,745,496 UART: [art] Store priv key in slot 0x5
5,758,398 UART: [art] Derive Key Pair - Done
5,773,056 UART: [art] Signing Cert with AUTHO
5,773,536 UART: RITY.KEYID = 7
5,788,560 UART: [art] Erasing AUTHORITY.KEYID = 7
5,789,325 UART: [art] PUB.X = 6928F43FEA36BE2EFD81B386C3EE2CA052190716EB3E8EE4F51A9B69378750E7BF08ACBB5CDEF5D799896362DDA26D2A
5,796,107 UART: [art] PUB.Y = A73F4D7D45DDEBCAC701E423057B0E9899106911D16FDE361B8B4F4E51FECB001CF5C2658E616ED62019C98ECBEE06F7
5,803,039 UART: [art] SIG.R = 67F4B932762E319CE033F2FC34DECB2763C1346D35001B734ECAD3FFF91BD0989627A1616E998A99ED854DBD57B7EDA4
5,809,797 UART: [art] SIG.S = 883FC419A99595BA1658F104631AD460A46556B7F4AAB2F07C86D0E01DF1DB42F73A02C82608350BCB886183C32BF34D
5,833,868 UART: mbox::rt_entry...
5,834,240 UART: ____ _ _ _ ____ _____
5,835,024 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,835,824 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,836,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,837,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,838,128 UART: |_|
5,838,440 UART:
6,118,136 UART: [rt] Runtime listening for mailbox commands...
6,119,326 >>> mbox cmd response data (48 bytes)
6,119,327 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,122,110 >>> mbox cmd response data (48 bytes)
6,122,111 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,137,248 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,027 UART: [state] LifecycleState = Unprovisioned
86,682 UART: [state] DebugLocked = No
87,250 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,118 UART: [kat] ++
896,270 UART: [kat] sha1
900,608 UART: [kat] SHA2-256
902,548 UART: [kat] SHA2-384
905,109 UART: [kat] SHA2-512-ACC
907,010 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,018 UART: [fht] FHT @ 0x50003400
1,173,794 UART: [idev] ++
1,173,962 UART: [idev] CDI.KEYID = 6
1,174,323 UART: [idev] SUBJECT.KEYID = 7
1,174,748 UART: [idev] UDS.KEYID = 0
1,175,094 ready_for_fw is high
1,175,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,852 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,393 UART: [ldev] Erasing FE.KEYID = 1
1,242,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,430 UART: [fwproc] Recv command 0x46574c44
1,283,163 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,572 >>> mbox cmd response: success
2,771,587 UART: [afmc] ++
2,771,755 UART: [afmc] CDI.KEYID = 6
2,772,118 UART: [afmc] SUBJECT.KEYID = 7
2,772,544 UART: [afmc] AUTHORITY.KEYID = 5
2,808,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,790 UART: [afmc] --
2,851,784 UART: [cold-reset] --
2,852,792 UART: [state] Locking Datavault
2,853,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,567 UART: [state] Locking ICCM
2,855,031 UART: [exit] Launching FMC @ 0x40000130
2,860,360 UART:
2,860,376 UART: Running Caliptra FMC ...
2,860,784 UART:
2,860,927 UART: [state] CFI Enabled
2,871,418 UART: [fht] FMC Alias Private Key: 7
2,979,545 UART: [art] Extend RT PCRs Done
2,979,973 UART: [art] Lock RT PCRs Done
2,981,527 UART: [art] Populate DV Done
2,989,790 UART: [fht] FMC Alias Private Key: 7
2,990,752 UART: [art] Derive CDI
2,991,032 UART: [art] Store in in slot 0x4
3,076,899 UART: [art] Derive Key Pair
3,077,259 UART: [art] Store priv key in slot 0x5
3,090,495 UART: [art] Derive Key Pair - Done
3,105,159 UART: [art] Signing Cert with AUTHO
3,105,639 UART: RITY.KEYID = 7
3,120,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,250 UART: [art] PUB.X = 1531FB77DA1354654097A85DDA5F1FF4251AF5D73530C6449576F2BC3E373E24F9B7195285B707AD3781F460F23115F9
3,128,011 UART: [art] PUB.Y = C02D72D7EB7A7D44B965BBF77424219AA077B89434BD6EF5461B150D15C83DFB62CA14FD3A86CBF6B62509054B580CF9
3,134,959 UART: [art] SIG.R = 4DBA70A60284B04940F4C85FD227204AFCB0ABD25BE06FE9FD01052041CAC4EEFDE19D995C220C5279F120BFAD77416C
3,141,733 UART: [art] SIG.S = C499338C7AA4BF31E6B2E3E674C0D5EAE891A693C92843C5C618E9ACFD72E9A52E51D58F2FADACA5953AB00E8100B3D9
3,165,737 UART: Caliptra RT
3,166,082 UART: [state] CFI Enabled
3,274,169 UART: [rt] RT listening for mailbox commands...
3,274,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,847 UART: [rt]cmd =0x41544d4e, len=14344
3,707,662 >>> mbox cmd response data (8 bytes)
3,707,663 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,660 UART: [rt]cmd =0x41545348, len=116
3,759,365 >>> mbox cmd response data (12 bytes)
3,759,366 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,135 UART:
3,760,151 UART: Running Caliptra ROM ...
3,760,559 UART:
3,760,701 UART: [state] CFI Enabled
3,763,247 UART: [state] LifecycleState = Unprovisioned
3,763,902 UART: [state] DebugLocked = No
3,764,402 UART: [state] WD Timer not started. Device not locked for debugging
3,765,670 UART: [kat] SHA2-256
4,569,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,573,349 UART: [kat] ++
4,573,501 UART: [kat] sha1
4,577,873 UART: [kat] SHA2-256
4,579,813 UART: [kat] SHA2-384
4,582,614 UART: [kat] SHA2-512-ACC
4,584,514 UART: [kat] ECC-384
4,594,879 UART: [kat] HMAC-384Kdf
4,599,571 UART: [kat] LMS
4,847,883 UART: [kat] --
4,848,593 UART: [update-reset] ++
5,750,098 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,751,267 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,847,277 >>> mbox cmd response: success
5,847,277 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,847,486 UART: [update-reset] Copying MAN_2 To MAN_1
5,855,500 UART: [update-reset Success] --
5,856,525 UART: [state] Locking Datavault
5,857,253 UART: [state] Locking PCR0, PCR1 and PCR31
5,857,857 UART: [state] Locking ICCM
5,858,453 UART: [exit] Launching FMC @ 0x40000130
5,863,782 UART:
5,863,798 UART: Running Caliptra FMC ...
5,864,206 UART:
5,864,349 UART: [state] CFI Enabled
5,953,484 UART: [art] Extend RT PCRs Done
5,953,912 UART: [art] Lock RT PCRs Done
5,955,015 UART: [art] Populate DV Done
5,963,062 UART: [fht] FMC Alias Private Key: 7
5,964,102 UART: [art] Derive CDI
5,964,382 UART: [art] Store in in slot 0x4
6,049,807 UART: [art] Derive Key Pair
6,050,167 UART: [art] Store priv key in slot 0x5
6,063,197 UART: [art] Derive Key Pair - Done
6,078,295 UART: [art] Signing Cert with AUTHO
6,078,775 UART: RITY.KEYID = 7
6,093,899 UART: [art] Erasing AUTHORITY.KEYID = 7
6,094,664 UART: [art] PUB.X = 6F2FFB0DCA5BF6DD101EE51637769C4AA4CD2039158A3760B683B577F9A2E94964674CBC9F2FBFD92FFD6C49300B9582
6,101,440 UART: [art] PUB.Y = D20D9F7BBCD673664DADD2C5B1FC2EA0C3D642044D072158F226E88268E3896BA2989630AE6AE9B8A6D6CF2283FE0591
6,108,388 UART: [art] SIG.R = A954581E7AD07045C3B34D0DED101956B86B75DEF03D18B33D4AFC130B66CED3584EB9A68A960D97088FEBB16B7A6077
6,115,156 UART: [art] SIG.S = 3793D81871F321E9A15A7199A418B1E873082C438844999640522EEF7C14C2D58023B1553699533F336ABE30BDA9178E
6,139,010 UART: mbox::rt_entry...
6,139,382 UART: ____ _ _ _ ____ _____
6,140,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,140,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,141,734 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,142,502 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,143,270 UART: |_|
6,143,582 UART:
6,425,650 UART: [rt] Runtime listening for mailbox commands...
6,426,840 >>> mbox cmd response data (48 bytes)
6,426,841 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,429,624 >>> mbox cmd response data (48 bytes)
6,429,625 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,444,762 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,201 ready_for_fw is high
1,057,201 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,063 >>> mbox cmd response: success
2,683,851 UART:
2,683,867 UART: Running Caliptra FMC ...
2,684,275 UART:
2,684,418 UART: [state] CFI Enabled
2,695,129 UART: [fht] FMC Alias Private Key: 7
2,802,804 UART: [art] Extend RT PCRs Done
2,803,232 UART: [art] Lock RT PCRs Done
2,804,632 UART: [art] Populate DV Done
2,812,755 UART: [fht] FMC Alias Private Key: 7
2,813,741 UART: [art] Derive CDI
2,814,021 UART: [art] Store in in slot 0x4
2,899,636 UART: [art] Derive Key Pair
2,899,996 UART: [art] Store priv key in slot 0x5
2,913,300 UART: [art] Derive Key Pair - Done
2,927,807 UART: [art] Signing Cert with AUTHO
2,928,287 UART: RITY.KEYID = 7
2,943,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,074 UART: [art] PUB.X = 1FF3FBF19A6C2413A87D6A1D43CA277CD9905546AC6121C0CD9A17D6B1A6AAB4C78D126229233F3B08AAF0E0423A97C3
2,950,853 UART: [art] PUB.Y = 621443B654D27AB5A97A9F4205522E61C0644EDE49CEC93D0DD3A7D60563C3A1F479531648DE93CC56ED1943C73D82DD
2,957,798 UART: [art] SIG.R = C464A6BF9192306F56439B99F2619E383AF113FBF1338D81B18497B08654015D22EDF1EF3D03321ADF3A4E5FECF08D82
2,964,566 UART: [art] SIG.S = F6CD1F8A170B66007BC147F8274300025C570A69FDDD0FEFBDD99F886A977DB883AB598D35B524EEC22D791C2756E570
2,988,813 UART: Caliptra RT
2,989,158 UART: [state] CFI Enabled
3,096,416 UART: [rt] RT listening for mailbox commands...
3,097,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,062 UART: [rt]cmd =0x41544d4e, len=14344
3,529,639 >>> mbox cmd response data (8 bytes)
3,529,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,553 UART: [rt]cmd =0x41545348, len=116
3,581,676 >>> mbox cmd response data (12 bytes)
3,581,677 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,550,871 >>> mbox cmd response: success
5,550,871 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,564,161 UART:
5,564,177 UART: Running Caliptra FMC ...
5,564,585 UART:
5,564,728 UART: [state] CFI Enabled
5,653,895 UART: [art] Extend RT PCRs Done
5,654,323 UART: [art] Lock RT PCRs Done
5,655,430 UART: [art] Populate DV Done
5,663,567 UART: [fht] FMC Alias Private Key: 7
5,664,551 UART: [art] Derive CDI
5,664,831 UART: [art] Store in in slot 0x4
5,750,738 UART: [art] Derive Key Pair
5,751,098 UART: [art] Store priv key in slot 0x5
5,764,246 UART: [art] Derive Key Pair - Done
5,779,210 UART: [art] Signing Cert with AUTHO
5,779,690 UART: RITY.KEYID = 7
5,794,876 UART: [art] Erasing AUTHORITY.KEYID = 7
5,795,641 UART: [art] PUB.X = 05544DDDF50478C54ED6FE3D2E49E8A3FFE35F9AE750C7DCAA53A9839249BA019295102B2D368CD55CE99E8FF895D709
5,802,411 UART: [art] PUB.Y = CB54EA5A93A37EF00FA5C46D61052025A8F195A3AE6547B136EDA69273B3A3F9D7F286DE418263A17A4E3D177EEFA727
5,809,365 UART: [art] SIG.R = ED80B094FED15EEA020B75FF3052E357B5892EB24803F8C57527E6EC70ED10A54CD3A597F1C4BD66784AD1544723393F
5,816,132 UART: [art] SIG.S = 2BFA0B90D6B6F15C62013423209D2255AA2D1CA6BFD803B1A1B88D8AC951CA7823F3CD2CBA4C2FFEF23F76B4146709E7
5,840,401 UART: mbox::rt_entry...
5,840,773 UART: ____ _ _ _ ____ _____
5,841,557 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,842,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,843,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,843,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,844,661 UART: |_|
5,844,973 UART:
6,129,593 UART: [rt] Runtime listening for mailbox commands...
6,130,783 >>> mbox cmd response data (48 bytes)
6,130,784 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,133,567 >>> mbox cmd response data (48 bytes)
6,133,568 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,148,705 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,119 UART:
192,504 UART: Running Caliptra ROM ...
193,642 UART:
193,797 UART: [state] CFI Enabled
264,418 UART: [state] LifecycleState = Unprovisioned
266,262 UART: [state] DebugLocked = No
269,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,936 UART: [kat] SHA2-256
444,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,169 UART: [kat] ++
455,644 UART: [kat] sha1
466,164 UART: [kat] SHA2-256
468,913 UART: [kat] SHA2-384
473,271 UART: [kat] SHA2-512-ACC
475,641 UART: [kat] ECC-384
2,769,094 UART: [kat] HMAC-384Kdf
2,800,762 UART: [kat] LMS
3,991,104 UART: [kat] --
3,995,987 UART: [cold-reset] ++
3,997,568 UART: [fht] Storing FHT @ 0x50003400
4,010,331 UART: [idev] ++
4,010,907 UART: [idev] CDI.KEYID = 6
4,011,829 UART: [idev] SUBJECT.KEYID = 7
4,013,081 UART: [idev] UDS.KEYID = 0
4,014,157 ready_for_fw is high
4,014,385 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,570 UART: [idev] Erasing UDS.KEYID = 0
7,346,029 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,750 UART: [idev] --
7,371,528 UART: [ldev] ++
7,372,151 UART: [ldev] CDI.KEYID = 6
7,373,116 UART: [ldev] SUBJECT.KEYID = 5
7,374,274 UART: [ldev] AUTHORITY.KEYID = 7
7,375,559 UART: [ldev] FE.KEYID = 1
7,402,858 UART: [ldev] Erasing FE.KEYID = 1
10,735,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,555 UART: [ldev] --
13,096,175 UART: [fwproc] Waiting for Commands...
13,098,383 UART: [fwproc] Received command 0x46574c44
13,100,565 UART: [fwproc] Received Image of size 113760 bytes
17,145,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,215,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,284,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,600,952 >>> mbox cmd response: success
17,605,474 UART: [afmc] ++
17,606,069 UART: [afmc] CDI.KEYID = 6
17,606,988 UART: [afmc] SUBJECT.KEYID = 7
17,608,204 UART: [afmc] AUTHORITY.KEYID = 5
20,965,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,268,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,270,738 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,285,160 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,300,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,314,431 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,337,154 UART: [afmc] --
23,340,209 UART: [cold-reset] --
23,344,850 UART: [state] Locking Datavault
23,350,207 UART: [state] Locking PCR0, PCR1 and PCR31
23,351,967 UART: [state] Locking ICCM
23,353,416 UART: [exit] Launching FMC @ 0x40000130
23,361,812 UART:
23,362,055 UART: Running Caliptra FMC ...
23,363,164 UART:
23,363,329 UART: [state] CFI Enabled
23,429,681 UART: [fht] FMC Alias Private Key: 7
25,768,720 UART: [art] Extend RT PCRs Done
25,769,931 UART: [art] Lock RT PCRs Done
25,771,225 UART: [art] Populate DV Done
25,776,428 UART: [fht] FMC Alias Private Key: 7
25,777,967 UART: [art] Derive CDI
25,778,782 UART: [art] Store in in slot 0x4
25,838,149 UART: [art] Derive Key Pair
25,839,210 UART: [art] Store priv key in slot 0x5
29,132,281 UART: [art] Derive Key Pair - Done
29,145,214 UART: [art] Signing Cert with AUTHO
29,146,542 UART: RITY.KEYID = 7
31,434,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,436,133 UART: [art] PUB.X = AA164E9DA3DBBC7F773CD337C7B89C784128ACDC43D21F7826CD706748CCFD15FD2B3BC87C5829CCA863E2D098E43F18
31,443,453 UART: [art] PUB.Y = 22C062E9A68D481DA8F205F213E36AC2CEABD7E8692777DC848FB3DCEF12591AAC3F781D45880EF4631480AB00BBA9C8
31,450,629 UART: [art] SIG.R = 98EB39F7F44B538BFFBBA406809E879B05125230180BB8C8F834362892ABCD10C34AE2F899A9CC581765DF0076FFE899
31,458,026 UART: [art] SIG.S = FDF8855BE166F626BEEDD16F2557D17C091B158B9BAE02378DF29D45BA70776125D5644401F225182995D6C29E905E84
32,762,690 UART: Caliptra RT
32,763,402 UART: [state] CFI Enabled
32,925,975 UART: [rt] RT listening for mailbox commands...
36,947,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,103,121 UART: [rt]cmd =0x41544d4e, len=14344
42,404,054 >>> mbox cmd response data (8 bytes)
42,404,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,435,462 UART: [rt]cmd =0x41545348, len=116
42,454,769 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,786,401 ready_for_fw is high
3,786,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,866,105 >>> mbox cmd response: success
23,566,602 UART:
23,566,992 UART: Running Caliptra FMC ...
23,568,121 UART:
23,568,280 UART: [state] CFI Enabled
23,635,835 UART: [fht] FMC Alias Private Key: 7
25,974,326 UART: [art] Extend RT PCRs Done
25,975,540 UART: [art] Lock RT PCRs Done
25,977,270 UART: [art] Populate DV Done
25,982,795 UART: [fht] FMC Alias Private Key: 7
25,984,284 UART: [art] Derive CDI
25,985,047 UART: [art] Store in in slot 0x4
26,044,399 UART: [art] Derive Key Pair
26,045,459 UART: [art] Store priv key in slot 0x5
29,338,293 UART: [art] Derive Key Pair - Done
29,351,020 UART: [art] Signing Cert with AUTHO
29,352,344 UART: RITY.KEYID = 7
31,639,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,123 UART: [art] PUB.X = 4EE67A65CD671EF35C22AB97E208557C0E786B23DFBDB38D426EA4F4F211C1CBB4F0ECA25B1401337DA7F5A25B7124FF
31,648,387 UART: [art] PUB.Y = F12B65DA62BF6BC4B5A385B6182BA3C49556E5E8E06D5B34380DCD7C8A99F8B0B7D39911433CF4216C37B857CE38BD3F
31,655,628 UART: [art] SIG.R = F40E8BB2004991BE33A17A836A3984A4CEF5CB9E6FD4799B399194467C23F4DC5304EE9BD748B7C3383B7946207D5B30
31,662,983 UART: [art] SIG.S = 1C183D7DFEE64906E11B843DEDADD2760EE287F9581CA2849012E3123DDFB4F093C018F35141348CF070BBD055D787E3
32,968,631 UART: Caliptra RT
32,969,327 UART: [state] CFI Enabled
33,129,951 UART: [rt] RT listening for mailbox commands...
37,152,068 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,307,448 UART: [rt]cmd =0x41544d4e, len=14344
42,608,164 >>> mbox cmd response data (8 bytes)
42,608,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,639,563 UART: [rt]cmd =0x41545348, len=116
42,658,300 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,787 writing to cptra_bootfsm_go
193,025 UART:
193,387 UART: Running Caliptra ROM ...
194,571 UART:
604,249 UART: [state] CFI Enabled
619,661 UART: [state] LifecycleState = Unprovisioned
621,590 UART: [state] DebugLocked = No
623,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,263 UART: [kat] SHA2-256
799,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,531 UART: [kat] ++
810,057 UART: [kat] sha1
821,438 UART: [kat] SHA2-256
824,185 UART: [kat] SHA2-384
829,889 UART: [kat] SHA2-512-ACC
832,253 UART: [kat] ECC-384
3,116,195 UART: [kat] HMAC-384Kdf
3,128,587 UART: [kat] LMS
4,318,689 UART: [kat] --
4,323,549 UART: [cold-reset] ++
4,325,482 UART: [fht] Storing FHT @ 0x50003400
4,336,601 UART: [idev] ++
4,337,159 UART: [idev] CDI.KEYID = 6
4,338,041 UART: [idev] SUBJECT.KEYID = 7
4,339,352 UART: [idev] UDS.KEYID = 0
4,340,330 ready_for_fw is high
4,340,534 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,464 UART: [idev] Erasing UDS.KEYID = 0
7,625,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,305 UART: [idev] --
7,650,653 UART: [ldev] ++
7,651,218 UART: [ldev] CDI.KEYID = 6
7,652,230 UART: [ldev] SUBJECT.KEYID = 5
7,653,380 UART: [ldev] AUTHORITY.KEYID = 7
7,654,862 UART: [ldev] FE.KEYID = 1
7,668,220 UART: [ldev] Erasing FE.KEYID = 1
10,958,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,575 UART: [ldev] --
13,321,098 UART: [fwproc] Waiting for Commands...
13,324,326 UART: [fwproc] Received command 0x46574c44
13,326,558 UART: [fwproc] Received Image of size 113760 bytes
17,372,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,033 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,672 >>> mbox cmd response: success
17,841,399 UART: [afmc] ++
17,841,988 UART: [afmc] CDI.KEYID = 6
17,842,871 UART: [afmc] SUBJECT.KEYID = 7
17,844,139 UART: [afmc] AUTHORITY.KEYID = 5
21,159,527 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,218 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,583 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,432 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,943 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,336 UART: [afmc] --
23,525,200 UART: [cold-reset] --
23,527,186 UART: [state] Locking Datavault
23,533,945 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,708 UART: [state] Locking ICCM
23,538,447 UART: [exit] Launching FMC @ 0x40000130
23,546,845 UART:
23,547,079 UART: Running Caliptra FMC ...
23,548,180 UART:
23,548,334 UART: [state] CFI Enabled
23,556,403 UART: [fht] FMC Alias Private Key: 7
25,886,840 UART: [art] Extend RT PCRs Done
25,888,067 UART: [art] Lock RT PCRs Done
25,889,716 UART: [art] Populate DV Done
25,895,180 UART: [fht] FMC Alias Private Key: 7
25,896,698 UART: [art] Derive CDI
25,897,433 UART: [art] Store in in slot 0x4
25,940,296 UART: [art] Derive Key Pair
25,941,312 UART: [art] Store priv key in slot 0x5
29,182,869 UART: [art] Derive Key Pair - Done
29,196,027 UART: [art] Signing Cert with AUTHO
29,197,334 UART: RITY.KEYID = 7
31,476,686 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,191 UART: [art] PUB.X = B858D832D438BB50D44592AA20A2CB9AB29BCD797241C81126402CD357E953C3207907C210C5C564E95E2FC90015AF05
31,485,402 UART: [art] PUB.Y = D33AEF55A97BB5D4027AA9863F9D6AF19CAAD9A44753BE6D809E501238DC00E0DEE28125AD3FCC98BB984234E384B4DB
31,492,659 UART: [art] SIG.R = B2060638807DEBD72FF40204EEDB83839E0669C354850E551F02D8DEA51991BF93091A273286026A9AAD59067A230735
31,500,052 UART: [art] SIG.S = DC25188C2D092419F2B47FDFA6BFD5EF46079357D04783C3C45EA95196E7534E1D7D9BFD13DF96D549A74FDAEA707674
32,805,363 UART: Caliptra RT
32,806,078 UART: [state] CFI Enabled
32,923,690 UART: [rt] RT listening for mailbox commands...
36,966,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,121,881 UART: [rt]cmd =0x41544d4e, len=14344
42,422,515 >>> mbox cmd response data (8 bytes)
42,423,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,454,499 UART: [rt]cmd =0x41545348, len=116
42,474,392 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
4,125,759 ready_for_fw is high
4,126,361 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,152 >>> mbox cmd response: success
23,711,742 UART:
23,712,125 UART: Running Caliptra FMC ...
23,713,313 UART:
23,713,479 UART: [state] CFI Enabled
23,721,260 UART: [fht] FMC Alias Private Key: 7
26,052,377 UART: [art] Extend RT PCRs Done
26,053,625 UART: [art] Lock RT PCRs Done
26,055,318 UART: [art] Populate DV Done
26,060,686 UART: [fht] FMC Alias Private Key: 7
26,062,278 UART: [art] Derive CDI
26,063,010 UART: [art] Store in in slot 0x4
26,105,988 UART: [art] Derive Key Pair
26,107,028 UART: [art] Store priv key in slot 0x5
29,349,099 UART: [art] Derive Key Pair - Done
29,362,212 UART: [art] Signing Cert with AUTHO
29,363,518 UART: RITY.KEYID = 7
31,642,871 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,371 UART: [art] PUB.X = DA947551178C3B35B4383C78776D6B7A2917545D1118CB35B4F7C2064F09D27FA4AD701801DAA5477950DCCE291CE161
31,651,584 UART: [art] PUB.Y = 016920E7C1A20FEB797CC978BCE6941F233EE2551C679960B3B19E35564793984827BED2B6AEBEB08DD478674A17E218
31,658,811 UART: [art] SIG.R = 0E2FA6409454602AC2327B3CB1783FDFE0457A0834C206EAE4F2BED83A3EF8E09D90EC2394CE9DA86F833E04E503BBCC
31,666,196 UART: [art] SIG.S = 427A6311C38498CCCC3FEBAF93279186C28A0E5F6A2979B7AB6371CBD3D3887B7A5164AAB02E5CBE03C1B1AC6B750B54
32,971,477 UART: Caliptra RT
32,972,196 UART: [state] CFI Enabled
33,088,680 UART: [rt] RT listening for mailbox commands...
37,112,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,956 UART: [rt]cmd =0x41544d4e, len=14344
42,568,416 >>> mbox cmd response data (8 bytes)
42,569,035 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,599,682 UART: [rt]cmd =0x41545348, len=116
42,619,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,591 UART:
192,970 UART: Running Caliptra ROM ...
194,169 UART:
194,318 UART: [state] CFI Enabled
263,171 UART: [state] LifecycleState = Unprovisioned
265,016 UART: [state] DebugLocked = No
266,647 UART: [state] WD Timer not started. Device not locked for debugging
270,254 UART: [kat] SHA2-256
449,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,989 UART: [kat] ++
461,516 UART: [kat] sha1
472,822 UART: [kat] SHA2-256
475,816 UART: [kat] SHA2-384
481,651 UART: [kat] SHA2-512-ACC
484,581 UART: [kat] ECC-384
2,949,450 UART: [kat] HMAC-384Kdf
2,972,975 UART: [kat] LMS
3,502,386 UART: [kat] --
3,506,234 UART: [cold-reset] ++
3,507,874 UART: [fht] FHT @ 0x50003400
3,519,419 UART: [idev] ++
3,519,986 UART: [idev] CDI.KEYID = 6
3,520,955 UART: [idev] SUBJECT.KEYID = 7
3,522,122 UART: [idev] UDS.KEYID = 0
3,523,019 ready_for_fw is high
3,523,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,714 UART: [idev] Erasing UDS.KEYID = 0
6,026,412 UART: [idev] Sha1 KeyId Algorithm
6,048,603 UART: [idev] --
6,053,193 UART: [ldev] ++
6,053,800 UART: [ldev] CDI.KEYID = 6
6,054,711 UART: [ldev] SUBJECT.KEYID = 5
6,055,817 UART: [ldev] AUTHORITY.KEYID = 7
6,057,048 UART: [ldev] FE.KEYID = 1
6,092,755 UART: [ldev] Erasing FE.KEYID = 1
8,598,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,535 UART: [ldev] --
10,406,254 UART: [fwproc] Wait for Commands...
10,408,072 UART: [fwproc] Recv command 0x46574c44
10,410,162 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,283,195 >>> mbox cmd response: success
14,287,352 UART: [afmc] ++
14,287,948 UART: [afmc] CDI.KEYID = 6
14,288,854 UART: [afmc] SUBJECT.KEYID = 7
14,290,014 UART: [afmc] AUTHORITY.KEYID = 5
16,833,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,757 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,635 UART: [afmc] --
18,634,184 UART: [cold-reset] --
18,637,718 UART: [state] Locking Datavault
18,643,400 UART: [state] Locking PCR0, PCR1 and PCR31
18,645,099 UART: [state] Locking ICCM
18,646,438 UART: [exit] Launching FMC @ 0x40000130
18,654,884 UART:
18,655,114 UART: Running Caliptra FMC ...
18,656,211 UART:
18,656,366 UART: [state] CFI Enabled
18,714,945 UART: [fht] FMC Alias Private Key: 7
20,479,631 UART: [art] Extend RT PCRs Done
20,480,867 UART: [art] Lock RT PCRs Done
20,482,385 UART: [art] Populate DV Done
20,487,746 UART: [fht] FMC Alias Private Key: 7
20,489,335 UART: [art] Derive CDI
20,490,153 UART: [art] Store in in slot 0x4
20,548,072 UART: [art] Derive Key Pair
20,549,113 UART: [art] Store priv key in slot 0x5
23,011,750 UART: [art] Derive Key Pair - Done
23,024,372 UART: [art] Signing Cert with AUTHO
23,025,676 UART: RITY.KEYID = 7
24,737,495 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,995 UART: [art] PUB.X = C1EC5759480D166BDAA261828E8B282E3A25A69628DF55EA8E7E8BB80405A58A09DB05A576695DFEC9284EB2F31BB113
24,746,277 UART: [art] PUB.Y = F252FB25BE437324C4919A83D6BF45D3B38FCF1952702A8EA7C0BC3EC6101EF08EF11084B198B15AA23BE17BDEFDCDEA
24,753,577 UART: [art] SIG.R = 0AB9F70F72FDCA055D2DF55D754390B8EDBB1CD36FC93F69D2AB0EE34E331E1F5A6A38D151F58750EBD3598B19851807
24,760,934 UART: [art] SIG.S = 8EB252D3EBA436B3273A6F2865BF817F475657352E3B7DE4B57E9DF9BE272610544220B4E779B3110F0F7CC5E874D339
25,739,092 UART: Caliptra RT
25,739,815 UART: [state] CFI Enabled
25,906,340 UART: [rt] RT listening for mailbox commands...
29,926,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,081,840 UART: [rt]cmd =0x41544d4e, len=14344
34,077,486 >>> mbox cmd response data (8 bytes)
34,078,069 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,108,705 UART: [rt]cmd =0x41545348, len=116
34,128,091 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
3,381,161 ready_for_fw is high
3,381,548 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,180 >>> mbox cmd response: success
18,342,301 UART:
18,342,700 UART: Running Caliptra FMC ...
18,343,807 UART:
18,343,957 UART: [state] CFI Enabled
18,408,737 UART: [fht] FMC Alias Private Key: 7
20,173,070 UART: [art] Extend RT PCRs Done
20,174,305 UART: [art] Lock RT PCRs Done
20,175,900 UART: [art] Populate DV Done
20,181,310 UART: [fht] FMC Alias Private Key: 7
20,183,008 UART: [art] Derive CDI
20,183,750 UART: [art] Store in in slot 0x4
20,240,577 UART: [art] Derive Key Pair
20,241,615 UART: [art] Store priv key in slot 0x5
22,704,542 UART: [art] Derive Key Pair - Done
22,717,538 UART: [art] Signing Cert with AUTHO
22,718,835 UART: RITY.KEYID = 7
24,432,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,587 UART: [art] PUB.X = 78CA2A6EED36E7257E71B7B70E5D29696F6E961645604C5FCFAAD83DDB96F9463BB5AC1FAF9CCBD24FA51525EECBCF1F
24,440,859 UART: [art] PUB.Y = C2FE4225312D4FB9ADFD68F2FDD95AE05F00077BAA68A33DA0FCAD89E390A0D1CB00166064059E32DF128F09AE3EF409
24,448,167 UART: [art] SIG.R = B84ECAF9EE3A9B9D593807342B5CD1711ED46280C2B4E62754D5A15603CF75ACA267A963696631F61B8BAE460CE8A289
24,455,548 UART: [art] SIG.S = 78F47954E8DD4A4CFEEF4039F760DFF5A7591EAD524EE7E19712D4444A5C59ACBACBC7E93CBFE9998F56333F8C2DEF8E
25,434,641 UART: Caliptra RT
25,435,343 UART: [state] CFI Enabled
25,598,994 UART: [rt] RT listening for mailbox commands...
29,637,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,792,618 UART: [rt]cmd =0x41544d4e, len=14344
33,787,831 >>> mbox cmd response data (8 bytes)
33,788,463 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,819,163 UART: [rt]cmd =0x41545348, len=116
33,838,360 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,794 writing to cptra_bootfsm_go
193,025 UART:
193,573 UART: Running Caliptra ROM ...
194,701 UART:
604,070 UART: [state] CFI Enabled
615,618 UART: [state] LifecycleState = Unprovisioned
617,428 UART: [state] DebugLocked = No
618,680 UART: [state] WD Timer not started. Device not locked for debugging
621,650 UART: [kat] SHA2-256
800,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,299 UART: [kat] ++
812,830 UART: [kat] sha1
823,569 UART: [kat] SHA2-256
826,580 UART: [kat] SHA2-384
831,293 UART: [kat] SHA2-512-ACC
834,255 UART: [kat] ECC-384
3,275,117 UART: [kat] HMAC-384Kdf
3,286,492 UART: [kat] LMS
3,815,958 UART: [kat] --
3,821,801 UART: [cold-reset] ++
3,823,453 UART: [fht] FHT @ 0x50003400
3,835,865 UART: [idev] ++
3,836,434 UART: [idev] CDI.KEYID = 6
3,837,346 UART: [idev] SUBJECT.KEYID = 7
3,838,519 UART: [idev] UDS.KEYID = 0
3,839,466 ready_for_fw is high
3,839,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,938 UART: [idev] Erasing UDS.KEYID = 0
6,311,070 UART: [idev] Sha1 KeyId Algorithm
6,334,904 UART: [idev] --
6,337,498 UART: [ldev] ++
6,338,075 UART: [ldev] CDI.KEYID = 6
6,338,993 UART: [ldev] SUBJECT.KEYID = 5
6,340,157 UART: [ldev] AUTHORITY.KEYID = 7
6,341,390 UART: [ldev] FE.KEYID = 1
6,353,121 UART: [ldev] Erasing FE.KEYID = 1
8,822,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,255 UART: [ldev] --
10,611,347 UART: [fwproc] Wait for Commands...
10,613,340 UART: [fwproc] Recv command 0x46574c44
10,615,439 UART: [fwproc] Recv'd Img size: 114084 bytes
14,011,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,086,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,155,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,472,631 >>> mbox cmd response: success
14,476,372 UART: [afmc] ++
14,476,979 UART: [afmc] CDI.KEYID = 6
14,477,894 UART: [afmc] SUBJECT.KEYID = 7
14,479,057 UART: [afmc] AUTHORITY.KEYID = 5
16,982,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,490 UART: [afmc] --
18,780,043 UART: [cold-reset] --
18,783,206 UART: [state] Locking Datavault
18,787,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,453 UART: [state] Locking ICCM
18,790,752 UART: [exit] Launching FMC @ 0x40000130
18,799,160 UART:
18,799,400 UART: Running Caliptra FMC ...
18,800,504 UART:
18,800,664 UART: [state] CFI Enabled
18,808,930 UART: [fht] FMC Alias Private Key: 7
20,565,781 UART: [art] Extend RT PCRs Done
20,567,004 UART: [art] Lock RT PCRs Done
20,568,862 UART: [art] Populate DV Done
20,574,188 UART: [fht] FMC Alias Private Key: 7
20,575,841 UART: [art] Derive CDI
20,576,659 UART: [art] Store in in slot 0x4
20,619,205 UART: [art] Derive Key Pair
20,620,246 UART: [art] Store priv key in slot 0x5
23,046,781 UART: [art] Derive Key Pair - Done
23,059,787 UART: [art] Signing Cert with AUTHO
23,061,091 UART: RITY.KEYID = 7
24,766,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,097 UART: [art] PUB.X = 982526A857A7A7E6D35F46FBAE9697870A0D6F609DE856A45A583D904BE23E34E9E75FE7D24DDF9AC7B0556E70B96225
24,775,373 UART: [art] PUB.Y = 21BA0AFEA630462CEAAB23138DE99FBA45434B6AB0A61702C6E40EDD1B8886DF54C1A0993EBBF1F6A36963DCCB204B35
24,782,688 UART: [art] SIG.R = 82D4D214BFE01EDA48C392ACA2734167ADF4C93E1153DCDE6DE409D0DC473D9C10449580F5C10DB144751BF0F7170FD7
24,790,116 UART: [art] SIG.S = 57CDCAE8972BCF633CBE05E862BD31A4D9B3B7CFB852F20DB600189BDB3F46C1738F5AD92D6F890D2A0E68694FB0A43D
25,769,281 UART: Caliptra RT
25,769,994 UART: [state] CFI Enabled
25,886,313 UART: [rt] RT listening for mailbox commands...
29,909,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,065,244 UART: [rt]cmd =0x41544d4e, len=14344
34,061,302 >>> mbox cmd response data (8 bytes)
34,061,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,092,733 UART: [rt]cmd =0x41545348, len=116
34,112,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,699,719 ready_for_fw is high
3,700,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,974 >>> mbox cmd response: success
18,521,876 UART:
18,522,303 UART: Running Caliptra FMC ...
18,523,618 UART:
18,523,792 UART: [state] CFI Enabled
18,531,190 UART: [fht] FMC Alias Private Key: 7
20,287,907 UART: [art] Extend RT PCRs Done
20,289,138 UART: [art] Lock RT PCRs Done
20,290,874 UART: [art] Populate DV Done
20,296,238 UART: [fht] FMC Alias Private Key: 7
20,297,837 UART: [art] Derive CDI
20,298,660 UART: [art] Store in in slot 0x4
20,341,096 UART: [art] Derive Key Pair
20,342,103 UART: [art] Store priv key in slot 0x5
22,768,907 UART: [art] Derive Key Pair - Done
22,781,527 UART: [art] Signing Cert with AUTHO
22,782,833 UART: RITY.KEYID = 7
24,488,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,867 UART: [art] PUB.X = BB16FA06D6DAA1339EFD62E9A9FB815D737EB7E69D77BB400075EFADA291E5E43F82D2AF3948774B745D6F2E3CF0E0F4
24,497,196 UART: [art] PUB.Y = B5D22252E152682449F334985EEC1D99928255017125F457C6FDBE4F432D72AE4B4BE84175D3880B02CCB338D467815B
24,504,430 UART: [art] SIG.R = ED50379D87C2B95F7F8C42ECC817A441CF435FAD50E828232D949BAD8DCDE3F72B891D84A6AA6713631C2E0CBA5EE135
24,511,834 UART: [art] SIG.S = 163FB079A249E05D76705C5E3EB56C34890746F7C536F97786A3D0ACFD2B996A2EC05396F459FD23A01E807C69197A92
25,490,775 UART: Caliptra RT
25,491,482 UART: [state] CFI Enabled
25,609,372 UART: [rt] RT listening for mailbox commands...
29,637,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,792,622 UART: [rt]cmd =0x41544d4e, len=14344
33,787,959 >>> mbox cmd response data (8 bytes)
33,788,559 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,819,318 UART: [rt]cmd =0x41545348, len=116
33,838,377 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,565 UART:
192,963 UART: Running Caliptra ROM ...
194,174 UART:
194,350 UART: [state] CFI Enabled
267,438 UART: [state] LifecycleState = Unprovisioned
269,846 UART: [state] DebugLocked = No
271,303 UART: [state] WD Timer not started. Device not locked for debugging
275,488 UART: [kat] SHA2-256
465,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,134 UART: [kat] ++
476,626 UART: [kat] sha1
487,503 UART: [kat] SHA2-256
490,517 UART: [kat] SHA2-384
498,068 UART: [kat] SHA2-512-ACC
500,652 UART: [kat] ECC-384
2,949,700 UART: [kat] HMAC-384Kdf
2,971,315 UART: [kat] LMS
3,503,053 UART: [kat] --
3,508,050 UART: [cold-reset] ++
3,509,644 UART: [fht] FHT @ 0x50003400
3,520,909 UART: [idev] ++
3,521,620 UART: [idev] CDI.KEYID = 6
3,522,569 UART: [idev] SUBJECT.KEYID = 7
3,523,737 UART: [idev] UDS.KEYID = 0
3,524,730 ready_for_fw is high
3,524,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,402 UART: [idev] Erasing UDS.KEYID = 0
6,029,034 UART: [idev] Sha1 KeyId Algorithm
6,050,549 UART: [idev] --
6,054,326 UART: [ldev] ++
6,055,004 UART: [ldev] CDI.KEYID = 6
6,055,890 UART: [ldev] SUBJECT.KEYID = 5
6,057,099 UART: [ldev] AUTHORITY.KEYID = 7
6,058,333 UART: [ldev] FE.KEYID = 1
6,099,368 UART: [ldev] Erasing FE.KEYID = 1
8,604,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,987 UART: [ldev] --
10,415,051 UART: [fwproc] Wait for Commands...
10,416,548 UART: [fwproc] Recv command 0x46574c44
10,418,435 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,604,719 >>> mbox cmd response: success
14,608,889 UART: [afmc] ++
14,609,598 UART: [afmc] CDI.KEYID = 6
14,610,711 UART: [afmc] SUBJECT.KEYID = 7
14,612,280 UART: [afmc] AUTHORITY.KEYID = 5
17,148,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,444 UART: [afmc] --
18,947,704 UART: [cold-reset] --
18,951,084 UART: [state] Locking Datavault
18,956,889 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,052 UART: [state] Locking ICCM
18,960,892 UART: [exit] Launching FMC @ 0x40000130
18,969,529 UART:
18,969,760 UART: Running Caliptra FMC ...
18,970,858 UART:
18,971,035 UART: [state] CFI Enabled
19,030,459 UART: [fht] FMC Alias Private Key: 7
20,794,702 UART: [art] Extend RT PCRs Done
20,795,912 UART: [art] Lock RT PCRs Done
20,797,780 UART: [art] Populate DV Done
20,803,297 UART: [fht] FMC Alias Private Key: 7
20,804,890 UART: [art] Derive CDI
20,805,699 UART: [art] Store in in slot 0x4
20,863,324 UART: [art] Derive Key Pair
20,864,394 UART: [art] Store priv key in slot 0x5
23,327,137 UART: [art] Derive Key Pair - Done
23,339,862 UART: [art] Signing Cert with AUTHO
23,341,162 UART: RITY.KEYID = 7
25,053,226 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,733 UART: [art] PUB.X = 9048F43C5F8810A30BC7F4B1D68BCBA25FCA66DE6091C52B678144B93DC2834630F6E6A4F3A949D1F890C7BB8E45FE41
25,062,034 UART: [art] PUB.Y = C9B0D9AC14662B7BA6B93B9E01BFD7B4AA1463E4A15071BD9D8F19FF120F06B2D1271289E5B9013F7E355DC07935EF9D
25,069,319 UART: [art] SIG.R = E55434208E111441DCDA3CA19BA3B7CC7192C9494AD05DED2C01D4B13F1CB5B44FC792E02BEE5C177B602BE9BB29A0A1
25,076,700 UART: [art] SIG.S = 369D81E5713EFBEF89D824B04D5E5650FB44C689F6386DC0973B1CFEDD4F03C158096CEDF7E006C2373744EF338BD95E
26,056,027 UART: Caliptra RT
26,056,726 UART: [state] CFI Enabled
26,221,338 UART: [rt] RT listening for mailbox commands...
30,242,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,397,902 UART: [rt]cmd =0x41544d4e, len=14344
34,393,254 >>> mbox cmd response data (8 bytes)
34,393,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,424,716 UART: [rt]cmd =0x41545348, len=116
34,444,672 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,440,001 ready_for_fw is high
3,440,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,732,124 >>> mbox cmd response: success
19,037,622 UART:
19,038,001 UART: Running Caliptra FMC ...
19,039,167 UART:
19,039,333 UART: [state] CFI Enabled
19,104,108 UART: [fht] FMC Alias Private Key: 7
20,868,596 UART: [art] Extend RT PCRs Done
20,869,818 UART: [art] Lock RT PCRs Done
20,871,337 UART: [art] Populate DV Done
20,876,705 UART: [fht] FMC Alias Private Key: 7
20,878,356 UART: [art] Derive CDI
20,879,093 UART: [art] Store in in slot 0x4
20,936,900 UART: [art] Derive Key Pair
20,937,941 UART: [art] Store priv key in slot 0x5
23,401,295 UART: [art] Derive Key Pair - Done
23,414,025 UART: [art] Signing Cert with AUTHO
23,415,337 UART: RITY.KEYID = 7
25,127,004 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,521 UART: [art] PUB.X = 014906AEFB14488D83B954D330FC3CE8AF9F2699592B7D46BCE0DA2E55CAEA5529D2DB95609E80B31BA720721FDF02FC
25,135,811 UART: [art] PUB.Y = 04F76F76DC0BABAD1201B5692F2B7610B9970B3BBFAD1609C35CD97E2A4764E6E20E6C7086E2B42FB098425A26D5F259
25,143,067 UART: [art] SIG.R = 7B6D021BE83DADD2D5B31DB6E67472704AEE11FE3035B1208729CC56B866761C30B355C5AB112F86E9E1E2E772FD1EAD
25,150,426 UART: [art] SIG.S = 02EB425996E465B91C838015F24F12F340264A0D773456BCE30DA44149BDA3F98BCEF61FDD95A0C750FF2CAB0506B70A
26,129,353 UART: Caliptra RT
26,130,040 UART: [state] CFI Enabled
26,294,668 UART: [rt] RT listening for mailbox commands...
30,323,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,478,990 UART: [rt]cmd =0x41544d4e, len=14344
34,475,106 >>> mbox cmd response data (8 bytes)
34,475,685 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,506,319 UART: [rt]cmd =0x41545348, len=116
34,525,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
193,068 UART:
193,438 UART: Running Caliptra ROM ...
194,648 UART:
604,039 UART: [state] CFI Enabled
618,766 UART: [state] LifecycleState = Unprovisioned
621,179 UART: [state] DebugLocked = No
622,348 UART: [state] WD Timer not started. Device not locked for debugging
626,666 UART: [kat] SHA2-256
816,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,381 UART: [kat] ++
827,831 UART: [kat] sha1
838,863 UART: [kat] SHA2-256
841,877 UART: [kat] SHA2-384
847,227 UART: [kat] SHA2-512-ACC
849,811 UART: [kat] ECC-384
3,290,509 UART: [kat] HMAC-384Kdf
3,304,887 UART: [kat] LMS
3,836,671 UART: [kat] --
3,842,535 UART: [cold-reset] ++
3,844,074 UART: [fht] FHT @ 0x50003400
3,855,409 UART: [idev] ++
3,856,119 UART: [idev] CDI.KEYID = 6
3,857,147 UART: [idev] SUBJECT.KEYID = 7
3,858,249 UART: [idev] UDS.KEYID = 0
3,859,180 ready_for_fw is high
3,859,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,674 UART: [idev] Erasing UDS.KEYID = 0
6,332,622 UART: [idev] Sha1 KeyId Algorithm
6,356,498 UART: [idev] --
6,360,121 UART: [ldev] ++
6,360,698 UART: [ldev] CDI.KEYID = 6
6,361,612 UART: [ldev] SUBJECT.KEYID = 5
6,362,766 UART: [ldev] AUTHORITY.KEYID = 7
6,364,051 UART: [ldev] FE.KEYID = 1
6,377,267 UART: [ldev] Erasing FE.KEYID = 1
8,857,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,492 UART: [ldev] --
10,649,334 UART: [fwproc] Wait for Commands...
10,651,222 UART: [fwproc] Recv command 0x46574c44
10,653,558 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,837,764 >>> mbox cmd response: success
14,841,244 UART: [afmc] ++
14,841,947 UART: [afmc] CDI.KEYID = 6
14,843,198 UART: [afmc] SUBJECT.KEYID = 7
14,844,641 UART: [afmc] AUTHORITY.KEYID = 5
17,348,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,058 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,593 UART: [afmc] --
19,142,682 UART: [cold-reset] --
19,147,206 UART: [state] Locking Datavault
19,152,471 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,680 UART: [state] Locking ICCM
19,156,867 UART: [exit] Launching FMC @ 0x40000130
19,165,543 UART:
19,165,777 UART: Running Caliptra FMC ...
19,166,801 UART:
19,166,946 UART: [state] CFI Enabled
19,174,885 UART: [fht] FMC Alias Private Key: 7
20,931,779 UART: [art] Extend RT PCRs Done
20,932,992 UART: [art] Lock RT PCRs Done
20,934,967 UART: [art] Populate DV Done
20,940,328 UART: [fht] FMC Alias Private Key: 7
20,941,975 UART: [art] Derive CDI
20,942,714 UART: [art] Store in in slot 0x4
20,985,114 UART: [art] Derive Key Pair
20,986,160 UART: [art] Store priv key in slot 0x5
23,413,044 UART: [art] Derive Key Pair - Done
23,425,890 UART: [art] Signing Cert with AUTHO
23,427,197 UART: RITY.KEYID = 7
25,132,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,118 UART: [art] PUB.X = 1A56DE470F0C9041973C522689A3F8C6941803366C69EF4D31EBE9DB41F38D156913E29C428D88AD7470D378994BE474
25,141,391 UART: [art] PUB.Y = 206D90CC6547939A9F34A4197CCB9A50703267B9DEE26EAB1EB95DFF9C025D35712C13424E7DBE39201003B95885E820
25,148,657 UART: [art] SIG.R = 64C044B5405252F898DE45D4A4620CE7BFA96A98966A39FAFFB4C630CDD3471C3A3F026E6FCF5BFEED172A1103B95319
25,156,025 UART: [art] SIG.S = 757351296F2B269744A65FE32FF424784A60A2830DF6850FD09703E21384FECD948A060389CA548960C2AABD324EEE32
26,135,240 UART: Caliptra RT
26,135,959 UART: [state] CFI Enabled
26,253,648 UART: [rt] RT listening for mailbox commands...
30,284,235 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,439,738 UART: [rt]cmd =0x41544d4e, len=14344
34,434,968 >>> mbox cmd response data (8 bytes)
34,435,568 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,466,515 UART: [rt]cmd =0x41545348, len=116
34,486,020 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
3,753,650 ready_for_fw is high
3,754,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,944,009 >>> mbox cmd response: success
19,195,809 UART:
19,196,205 UART: Running Caliptra FMC ...
19,197,316 UART:
19,197,466 UART: [state] CFI Enabled
19,205,158 UART: [fht] FMC Alias Private Key: 7
20,962,185 UART: [art] Extend RT PCRs Done
20,963,411 UART: [art] Lock RT PCRs Done
20,965,012 UART: [art] Populate DV Done
20,970,543 UART: [fht] FMC Alias Private Key: 7
20,972,249 UART: [art] Derive CDI
20,973,066 UART: [art] Store in in slot 0x4
21,015,994 UART: [art] Derive Key Pair
21,017,042 UART: [art] Store priv key in slot 0x5
23,443,302 UART: [art] Derive Key Pair - Done
23,455,920 UART: [art] Signing Cert with AUTHO
23,457,232 UART: RITY.KEYID = 7
25,163,174 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,681 UART: [art] PUB.X = 71763E6DEBF2204D4FFA0CE0858006D440B71B834F6BF31DD0923DB7B90B7ECB9ECEF341F8597C642FE915C3EB8356BC
25,171,961 UART: [art] PUB.Y = C1BDB1D345991B8A6A9BFD701DF8CFCF139B8F35DAF7AB4F2CEC2543BAA7BFAFF52A0BAA932521FD3EF0DB72BD3FE3E1
25,179,251 UART: [art] SIG.R = E7080FBFC445CE8AA1CD2E29A95F8D4EA623BF4BB34BDD9F4A5F3C9032C20C8B682AB6C34867F8265A91B360784A40A4
25,186,642 UART: [art] SIG.S = 3E1EE8230B4ACC63643A076A05F56C12F21DFADE32BCDB33AD8C9265A6452BC9C61EA036044F3034AD1761C483294D8D
26,166,164 UART: Caliptra RT
26,166,882 UART: [state] CFI Enabled
26,283,897 UART: [rt] RT listening for mailbox commands...
30,310,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,465,985 UART: [rt]cmd =0x41544d4e, len=14344
34,461,820 >>> mbox cmd response data (8 bytes)
34,462,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,493,232 UART: [rt]cmd =0x41545348, len=116
34,513,101 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,581 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,253 UART: [kat] SHA2-256
882,184 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,299 UART: [kat] ++
886,451 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,486 UART: [kat] SHA2-512-ACC
897,387 UART: [kat] ECC-384
903,100 UART: [kat] HMAC-384Kdf
907,680 UART: [kat] LMS
1,475,876 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,191 UART: [fht] Storing FHT @ 0x50003400
1,480,116 UART: [idev] ++
1,480,284 UART: [idev] CDI.KEYID = 6
1,480,644 UART: [idev] SUBJECT.KEYID = 7
1,481,068 UART: [idev] UDS.KEYID = 0
1,481,413 ready_for_fw is high
1,481,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,122 UART: [idev] Erasing UDS.KEYID = 0
1,505,070 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,953 UART: [ldev] ++
1,515,121 UART: [ldev] CDI.KEYID = 6
1,515,484 UART: [ldev] SUBJECT.KEYID = 5
1,515,910 UART: [ldev] AUTHORITY.KEYID = 7
1,516,373 UART: [ldev] FE.KEYID = 1
1,521,607 UART: [ldev] Erasing FE.KEYID = 1
1,547,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,320 UART: [ldev] --
1,586,793 UART: [fwproc] Waiting for Commands...
1,587,512 UART: [fwproc] Received command 0x46574c44
1,588,303 UART: [fwproc] Received Image of size 114084 bytes
2,884,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,542 >>> mbox cmd response: success
3,077,552 UART: [afmc] ++
3,077,720 UART: [afmc] CDI.KEYID = 6
3,078,082 UART: [afmc] SUBJECT.KEYID = 7
3,078,507 UART: [afmc] AUTHORITY.KEYID = 5
3,113,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,672 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,065 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,755 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,516 UART: [afmc] --
3,156,402 UART: [cold-reset] --
3,157,340 UART: [state] Locking Datavault
3,158,863 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,467 UART: [state] Locking ICCM
3,159,995 UART: [exit] Launching FMC @ 0x40000130
3,165,324 UART:
3,165,340 UART: Running Caliptra FMC ...
3,165,748 UART:
3,165,802 UART: [state] CFI Enabled
3,176,087 UART: [fht] FMC Alias Private Key: 7
3,284,498 UART: [art] Extend RT PCRs Done
3,284,926 UART: [art] Lock RT PCRs Done
3,286,566 UART: [art] Populate DV Done
3,294,931 UART: [fht] FMC Alias Private Key: 7
3,296,095 UART: [art] Derive CDI
3,296,375 UART: [art] Store in in slot 0x4
3,381,990 UART: [art] Derive Key Pair
3,382,350 UART: [art] Store priv key in slot 0x5
3,395,922 UART: [art] Derive Key Pair - Done
3,410,906 UART: [art] Signing Cert with AUTHO
3,411,386 UART: RITY.KEYID = 7
3,427,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,777 UART: [art] PUB.X = 333F5C4D84254E4C06DD5EEA3732F4FF685F00FA89E807A9D2D0279F1365847616C0BF5FFB3F324B5279E81BE14192C3
3,434,523 UART: [art] PUB.Y = 05C9C381A4E5F9B266C91D5C2BCBFCB273E1E0A52260E375C1DF28FD600E13E4A714FD264ADF00DE29E7E0A77815E4A6
3,441,461 UART: [art] SIG.R = DF46C4787D404DAC308C2AC26FABD38D94C2917A094097AB0ABD082BCDADB36D9B71A4643D943CC477044E83F8F64748
3,448,231 UART: [art] SIG.S = B87B0ACA09B4B2C728B28B6585339835BE7EB8BAB3A194455EB9AC39D5014DA539E1BE94DA390A58870949C59C0E1AF0
3,472,472 UART: Caliptra RT
3,472,725 UART: [state] CFI Enabled
3,580,563 UART: [rt] RT listening for mailbox commands...
3,581,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,261 UART: [rt]cmd =0x41544d4e, len=14344
4,014,190 >>> mbox cmd response data (8 bytes)
4,014,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,308 UART: [rt]cmd =0x41545348, len=116
4,065,857 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,383 ready_for_fw is high
1,362,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,586 >>> mbox cmd response: success
2,986,916 UART:
2,986,932 UART: Running Caliptra FMC ...
2,987,340 UART:
2,987,394 UART: [state] CFI Enabled
2,998,019 UART: [fht] FMC Alias Private Key: 7
3,106,056 UART: [art] Extend RT PCRs Done
3,106,484 UART: [art] Lock RT PCRs Done
3,107,912 UART: [art] Populate DV Done
3,116,103 UART: [fht] FMC Alias Private Key: 7
3,117,215 UART: [art] Derive CDI
3,117,495 UART: [art] Store in in slot 0x4
3,203,006 UART: [art] Derive Key Pair
3,203,366 UART: [art] Store priv key in slot 0x5
3,216,654 UART: [art] Derive Key Pair - Done
3,231,267 UART: [art] Signing Cert with AUTHO
3,231,747 UART: RITY.KEYID = 7
3,246,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,542 UART: [art] PUB.X = DDDDDF958AA7711E22A9DD490FE7B498D1207D2B06AA720DAB5155EFB88124232E39443061E2F719E7CA2A0022709FBA
3,254,291 UART: [art] PUB.Y = CF252C17D4211F2B93012B9AB4F5BDE9E80CF7941C6B0D7E5E7862AFB282A14FC089A4D54806F43D9C06D84D588D4771
3,261,234 UART: [art] SIG.R = C5CBDE5EFC4B7F62B0A5660D254B880140E7C95F64414DDD90FFA542BAC02D22C5734CF727D549CFF5D1C6D0BAA56E58
3,268,018 UART: [art] SIG.S = 2D15AC11D102DA81E91062BA68B925ECD059625E2A01C8769568C4B6D63D63534A13D64302FF3057930C39F48FA609F1
3,291,916 UART: Caliptra RT
3,292,169 UART: [state] CFI Enabled
3,399,370 UART: [rt] RT listening for mailbox commands...
3,400,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,902 UART: [rt]cmd =0x41544d4e, len=14344
3,832,623 >>> mbox cmd response data (8 bytes)
3,832,624 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,779 UART: [rt]cmd =0x41545348, len=116
3,884,328 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,616 UART: [kat] SHA2-256
882,547 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,662 UART: [kat] ++
886,814 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,683 UART: [kat] SHA2-512-ACC
897,584 UART: [kat] ECC-384
902,657 UART: [kat] HMAC-384Kdf
907,215 UART: [kat] LMS
1,475,411 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,528 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 ready_for_fw is high
1,480,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,098 UART: [ldev] ++
1,515,266 UART: [ldev] CDI.KEYID = 6
1,515,629 UART: [ldev] SUBJECT.KEYID = 5
1,516,055 UART: [ldev] AUTHORITY.KEYID = 7
1,516,518 UART: [ldev] FE.KEYID = 1
1,521,732 UART: [ldev] Erasing FE.KEYID = 1
1,547,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,177 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 114084 bytes
2,883,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,930 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,709 >>> mbox cmd response: success
3,076,905 UART: [afmc] ++
3,077,073 UART: [afmc] CDI.KEYID = 6
3,077,435 UART: [afmc] SUBJECT.KEYID = 7
3,077,860 UART: [afmc] AUTHORITY.KEYID = 5
3,112,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,259 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,652 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,342 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,257 UART: [afmc] --
3,156,157 UART: [cold-reset] --
3,156,921 UART: [state] Locking Datavault
3,158,030 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,634 UART: [state] Locking ICCM
3,159,140 UART: [exit] Launching FMC @ 0x40000130
3,164,469 UART:
3,164,485 UART: Running Caliptra FMC ...
3,164,893 UART:
3,165,036 UART: [state] CFI Enabled
3,175,689 UART: [fht] FMC Alias Private Key: 7
3,283,808 UART: [art] Extend RT PCRs Done
3,284,236 UART: [art] Lock RT PCRs Done
3,285,640 UART: [art] Populate DV Done
3,293,719 UART: [fht] FMC Alias Private Key: 7
3,294,681 UART: [art] Derive CDI
3,294,961 UART: [art] Store in in slot 0x4
3,380,818 UART: [art] Derive Key Pair
3,381,178 UART: [art] Store priv key in slot 0x5
3,394,602 UART: [art] Derive Key Pair - Done
3,409,429 UART: [art] Signing Cert with AUTHO
3,409,909 UART: RITY.KEYID = 7
3,425,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,400 UART: [art] PUB.X = 21546F45CBEA4728F90E4B0148FD5CA6005F29591EB4B2F3A79546269D19A2A2F1127060DA3448107D8027084F7E1849
3,433,131 UART: [art] PUB.Y = 497E878BC7A1AAC062C7EF332B5919C8055C138B71E25B3CC66DB98912645E9A7E9474B63CCAE9A6BBB6ADB20C53C71D
3,440,089 UART: [art] SIG.R = 5515699E9467EECF74CC6F52EDCAB943AADBDBA58BF555EF28CD1F0D83C280B76091B64FD5067D051E2D1BBA3A55851E
3,446,870 UART: [art] SIG.S = AC808A1BF33B98B64FC4EB0179C879E504D7A49B13F5A12AFAF989C7D381185DFE8D88E3EA17B54552511FA24719DF17
3,471,271 UART: Caliptra RT
3,471,616 UART: [state] CFI Enabled
3,580,257 UART: [rt] RT listening for mailbox commands...
3,580,927 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,311 UART: [rt]cmd =0x41544d4e, len=14344
4,014,226 >>> mbox cmd response data (8 bytes)
4,014,227 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,294 UART: [rt]cmd =0x41545348, len=116
4,065,623 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,794 ready_for_fw is high
1,362,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,991 >>> mbox cmd response: success
2,985,831 UART:
2,985,847 UART: Running Caliptra FMC ...
2,986,255 UART:
2,986,398 UART: [state] CFI Enabled
2,997,247 UART: [fht] FMC Alias Private Key: 7
3,105,366 UART: [art] Extend RT PCRs Done
3,105,794 UART: [art] Lock RT PCRs Done
3,106,876 UART: [art] Populate DV Done
3,115,191 UART: [fht] FMC Alias Private Key: 7
3,116,235 UART: [art] Derive CDI
3,116,515 UART: [art] Store in in slot 0x4
3,202,214 UART: [art] Derive Key Pair
3,202,574 UART: [art] Store priv key in slot 0x5
3,215,920 UART: [art] Derive Key Pair - Done
3,230,314 UART: [art] Signing Cert with AUTHO
3,230,794 UART: RITY.KEYID = 7
3,245,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,461 UART: [art] PUB.X = 1981F95B8858DFC97A69A4022C88FD1679427AF11D77C8CBA57ACC64FFBB1C488919ECD0037439209A1021E843AF6703
3,253,224 UART: [art] PUB.Y = 59F8814FE6CEFA770D46A67473531D52257D9F7C2566C902CF6277A4E68F6F4B1A884CF827852870FD056B2B4F4E396F
3,260,165 UART: [art] SIG.R = FAA32D57733506295E42FB9DD62DF9AAC504104FF43B58319EFD6E4E300D1D2F7BB7C165417BC05276F30737DDCE8C0D
3,266,932 UART: [art] SIG.S = 1E72274D97D72DFAAEFEB5E5689468F93799ACD6634FB6FF7BDC98C528BFE82E0803674F9A9FAB1965B0DCD8E962AFD5
3,290,885 UART: Caliptra RT
3,291,230 UART: [state] CFI Enabled
3,399,387 UART: [rt] RT listening for mailbox commands...
3,400,057 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,377 UART: [rt]cmd =0x41544d4e, len=14344
3,833,352 >>> mbox cmd response data (8 bytes)
3,833,353 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,412 UART: [rt]cmd =0x41545348, len=116
3,884,965 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
893,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,211 UART: [kat] ++
897,363 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
917,906 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,287 UART: [cold-reset] ++
1,171,683 UART: [fht] FHT @ 0x50003400
1,174,406 UART: [idev] ++
1,174,574 UART: [idev] CDI.KEYID = 6
1,174,934 UART: [idev] SUBJECT.KEYID = 7
1,175,358 UART: [idev] UDS.KEYID = 0
1,175,703 ready_for_fw is high
1,175,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,252 UART: [idev] Erasing UDS.KEYID = 0
1,199,961 UART: [idev] Sha1 KeyId Algorithm
1,208,335 UART: [idev] --
1,209,421 UART: [ldev] ++
1,209,589 UART: [ldev] CDI.KEYID = 6
1,209,952 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,215,675 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,495 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,182 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,371 >>> mbox cmd response: success
2,770,589 UART: [afmc] ++
2,770,757 UART: [afmc] CDI.KEYID = 6
2,771,119 UART: [afmc] SUBJECT.KEYID = 7
2,771,544 UART: [afmc] AUTHORITY.KEYID = 5
2,807,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,382 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,267 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,986 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,016 UART: [afmc] --
2,850,960 UART: [cold-reset] --
2,852,058 UART: [state] Locking Datavault
2,853,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,713 UART: [state] Locking ICCM
2,854,325 UART: [exit] Launching FMC @ 0x40000130
2,859,654 UART:
2,859,670 UART: Running Caliptra FMC ...
2,860,078 UART:
2,860,132 UART: [state] CFI Enabled
2,870,833 UART: [fht] FMC Alias Private Key: 7
2,977,774 UART: [art] Extend RT PCRs Done
2,978,202 UART: [art] Lock RT PCRs Done
2,980,050 UART: [art] Populate DV Done
2,988,269 UART: [fht] FMC Alias Private Key: 7
2,989,379 UART: [art] Derive CDI
2,989,659 UART: [art] Store in in slot 0x4
3,075,476 UART: [art] Derive Key Pair
3,075,836 UART: [art] Store priv key in slot 0x5
3,088,772 UART: [art] Derive Key Pair - Done
3,103,376 UART: [art] Signing Cert with AUTHO
3,103,856 UART: RITY.KEYID = 7
3,119,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,929 UART: [art] PUB.X = 64A39816BB9C13D8C45FE4648ADA7199B602785F6A1E3F13FCFFC1077904AFC64C11B22CC80A0701FB8DB4512F2AEF80
3,126,693 UART: [art] PUB.Y = 5D3B7E15B651894894C5E9D8649C976C03A9454CC71D531D6CFA37070A98C0A3C9DA587E375FAFE09D35E0E2A9579A09
3,133,635 UART: [art] SIG.R = 9B3D6D3A8063ADDA4D77E88ABB1C2A49F76924AA5245B2636A358BB7A580CBA26A8A057B7CD6298225C1B24302C3D5FE
3,140,411 UART: [art] SIG.S = 8F3A9C76F720C959C5AA0A35615A173D84BA57B3DFBEA6893FDFAE33CA6664AB1604C39428DE6382C33AD62C750E832E
3,164,175 UART: Caliptra RT
3,164,428 UART: [state] CFI Enabled
3,272,664 UART: [rt] RT listening for mailbox commands...
3,273,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,632 UART: [rt]cmd =0x41544d4e, len=14344
3,706,485 >>> mbox cmd response data (8 bytes)
3,706,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,591 UART: [rt]cmd =0x41545348, len=116
3,758,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 ready_for_fw is high
1,060,143 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,500 >>> mbox cmd response: success
2,684,392 UART:
2,684,408 UART: Running Caliptra FMC ...
2,684,816 UART:
2,684,870 UART: [state] CFI Enabled
2,695,211 UART: [fht] FMC Alias Private Key: 7
2,802,682 UART: [art] Extend RT PCRs Done
2,803,110 UART: [art] Lock RT PCRs Done
2,804,594 UART: [art] Populate DV Done
2,812,495 UART: [fht] FMC Alias Private Key: 7
2,813,475 UART: [art] Derive CDI
2,813,755 UART: [art] Store in in slot 0x4
2,899,610 UART: [art] Derive Key Pair
2,899,970 UART: [art] Store priv key in slot 0x5
2,912,732 UART: [art] Derive Key Pair - Done
2,927,453 UART: [art] Signing Cert with AUTHO
2,927,933 UART: RITY.KEYID = 7
2,943,241 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,006 UART: [art] PUB.X = 08EE52C3B8C6AD1BB7EF8B0BC047F83BDC57D30891F838F8F8F4AC963ABF4F8ED8698435D9D2C9C4BDB3E4ABB232ED35
2,950,793 UART: [art] PUB.Y = 6F04E45968513BCC76CD46719AD7C168947644A9936E029E7E9991F3199C54691D3145ED5FAAF430B0766ECCADFA9088
2,957,737 UART: [art] SIG.R = 5228BBEC24E694A4A5DE8D0E64B9F0C24B6AA7C61F1E23BB5C6E17E81AED0E45AF0E226671C638E350FB264F714FDDC7
2,964,518 UART: [art] SIG.S = D4C9FA66C9C0DC0B268D5A5F472FA8406ECDC786561B31D8431C97390614454BB671E78CB81F1F386C3CABEC648CE216
2,989,021 UART: Caliptra RT
2,989,274 UART: [state] CFI Enabled
3,097,625 UART: [rt] RT listening for mailbox commands...
3,098,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,167 UART: [rt]cmd =0x41544d4e, len=14344
3,531,372 >>> mbox cmd response data (8 bytes)
3,531,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,296 UART: [rt]cmd =0x41545348, len=116
3,582,097 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
893,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,670 UART: [kat] ++
897,822 UART: [kat] sha1
902,024 UART: [kat] SHA2-256
903,964 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,108 UART: [cold-reset] ++
1,172,460 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 ready_for_fw is high
1,176,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,107 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,210,928 UART: [ldev] ++
1,211,096 UART: [ldev] CDI.KEYID = 6
1,211,459 UART: [ldev] SUBJECT.KEYID = 5
1,211,885 UART: [ldev] AUTHORITY.KEYID = 7
1,212,348 UART: [ldev] FE.KEYID = 1
1,217,456 UART: [ldev] Erasing FE.KEYID = 1
1,244,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,446 UART: [ldev] --
1,283,919 UART: [fwproc] Wait for Commands...
1,284,643 UART: [fwproc] Recv command 0x46574c44
1,285,371 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,526 >>> mbox cmd response: success
2,772,694 UART: [afmc] ++
2,772,862 UART: [afmc] CDI.KEYID = 6
2,773,224 UART: [afmc] SUBJECT.KEYID = 7
2,773,649 UART: [afmc] AUTHORITY.KEYID = 5
2,809,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,876 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,443 UART: [afmc] --
2,852,529 UART: [cold-reset] --
2,853,567 UART: [state] Locking Datavault
2,854,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,550 UART: [state] Locking ICCM
2,855,996 UART: [exit] Launching FMC @ 0x40000130
2,861,325 UART:
2,861,341 UART: Running Caliptra FMC ...
2,861,749 UART:
2,861,892 UART: [state] CFI Enabled
2,872,653 UART: [fht] FMC Alias Private Key: 7
2,980,628 UART: [art] Extend RT PCRs Done
2,981,056 UART: [art] Lock RT PCRs Done
2,982,564 UART: [art] Populate DV Done
2,990,617 UART: [fht] FMC Alias Private Key: 7
2,991,713 UART: [art] Derive CDI
2,991,993 UART: [art] Store in in slot 0x4
3,077,214 UART: [art] Derive Key Pair
3,077,574 UART: [art] Store priv key in slot 0x5
3,090,770 UART: [art] Derive Key Pair - Done
3,105,842 UART: [art] Signing Cert with AUTHO
3,106,322 UART: RITY.KEYID = 7
3,121,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,905 UART: [art] PUB.X = A296C44B3E1E75052DBE1C4A3573113BE7F95C38CC45718CDC93F8385EF6E0D8E1E58C96A25CAF4D5CDA0C07ECF095EE
3,128,686 UART: [art] PUB.Y = D99AA591B01A2BF3917C7B195BABEA89F89B1135D520E5103B72BC7E883907C4E755443489EC93E83E46C216705446AB
3,135,633 UART: [art] SIG.R = AA2293009A48510FB2606DDEB4E380AC29CC7F9EE0EF111F776AAABD55E6C85F94EAE6B87BD04080A2C9E79B525AD61D
3,142,398 UART: [art] SIG.S = 8AB1204A02C428E5FD4F6C0FB98072B48DF80EA7FAF1445F5EA8B7F815056C6560F55337067C7E9CD355D6FFD47D8305
3,165,525 UART: Caliptra RT
3,165,870 UART: [state] CFI Enabled
3,273,338 UART: [rt] RT listening for mailbox commands...
3,274,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,184 UART: [rt]cmd =0x41544d4e, len=14344
3,706,767 >>> mbox cmd response data (8 bytes)
3,706,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,675 UART: [rt]cmd =0x41545348, len=116
3,757,728 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,016 ready_for_fw is high
1,060,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,046 >>> mbox cmd response: success
2,685,620 UART:
2,685,636 UART: Running Caliptra FMC ...
2,686,044 UART:
2,686,187 UART: [state] CFI Enabled
2,696,650 UART: [fht] FMC Alias Private Key: 7
2,804,817 UART: [art] Extend RT PCRs Done
2,805,245 UART: [art] Lock RT PCRs Done
2,806,557 UART: [art] Populate DV Done
2,814,670 UART: [fht] FMC Alias Private Key: 7
2,815,692 UART: [art] Derive CDI
2,815,972 UART: [art] Store in in slot 0x4
2,902,155 UART: [art] Derive Key Pair
2,902,515 UART: [art] Store priv key in slot 0x5
2,915,279 UART: [art] Derive Key Pair - Done
2,930,311 UART: [art] Signing Cert with AUTHO
2,930,791 UART: RITY.KEYID = 7
2,946,519 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,284 UART: [art] PUB.X = 1C8DEFC824A550689825AAAB40AACD986CC8D6A1863AFB58FE962CF444874E9C49FE8053C655D16CB5D5F7A4B0E9234B
2,954,070 UART: [art] PUB.Y = 26A52ADF4A64DBFB348454EA4EB717DD0332198A8E816882BFC0A429CB661163A7D1630B501235D80C321BF7193251F3
2,961,011 UART: [art] SIG.R = 682C9F068715506D8371A51968F7A49A8BF3EE2C72D29E3B42EE252BDFBFAD08A1FE121A46CD970C2C81B335AEEF3E80
2,967,786 UART: [art] SIG.S = 79580E8C8562B4EA46AF7DA5F810EE580CE063A74441B071861110F3A948AEF35658A39C6B5C88F81BBC925B0E01AF42
2,991,595 UART: Caliptra RT
2,991,940 UART: [state] CFI Enabled
3,100,031 UART: [rt] RT listening for mailbox commands...
3,100,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,777 UART: [rt]cmd =0x41544d4e, len=14344
3,533,726 >>> mbox cmd response data (8 bytes)
3,533,727 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,762 UART: [rt]cmd =0x41545348, len=116
3,585,883 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,703 UART: [kat] SHA2-256
901,643 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 ready_for_fw is high
1,174,361 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,233 UART: [idev] --
1,209,262 UART: [ldev] ++
1,209,430 UART: [ldev] CDI.KEYID = 6
1,209,794 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,215,790 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,556 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,691 UART: [fwproc] Recv command 0x46574c44
1,283,424 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,241 >>> mbox cmd response: success
2,771,348 UART: [afmc] ++
2,771,516 UART: [afmc] CDI.KEYID = 6
2,771,879 UART: [afmc] SUBJECT.KEYID = 7
2,772,305 UART: [afmc] AUTHORITY.KEYID = 5
2,808,112 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,080 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,531 UART: [afmc] --
2,851,463 UART: [cold-reset] --
2,852,093 UART: [state] Locking Datavault
2,853,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,912 UART: [state] Locking ICCM
2,854,432 UART: [exit] Launching FMC @ 0x40000130
2,859,761 UART:
2,859,777 UART: Running Caliptra FMC ...
2,860,185 UART:
2,860,239 UART: [state] CFI Enabled
2,870,934 UART: [fht] FMC Alias Private Key: 7
2,978,903 UART: [art] Extend RT PCRs Done
2,979,331 UART: [art] Lock RT PCRs Done
2,980,653 UART: [art] Populate DV Done
2,988,858 UART: [fht] FMC Alias Private Key: 7
2,990,008 UART: [art] Derive CDI
2,990,288 UART: [art] Store in in slot 0x4
3,075,703 UART: [art] Derive Key Pair
3,076,063 UART: [art] Store priv key in slot 0x5
3,089,827 UART: [art] Derive Key Pair - Done
3,104,836 UART: [art] Signing Cert with AUTHO
3,105,316 UART: RITY.KEYID = 7
3,120,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,087 UART: [art] PUB.X = 0BEF567E417840D584580B87CD9CCD8C8C889479EDF2C651FE51E959091E7D908D13FF9642FDF7E311EBA4BD4FE3435C
3,127,860 UART: [art] PUB.Y = 27FEA422FB183CDD1DE4827FB8A498E53A175F71495A2D085842418B2F694C233EA5D351AAB8EFD6C99EF52CCB4327EC
3,134,821 UART: [art] SIG.R = 8E89C8759D5D07E11301A6D86EB937BF0593CA9294AF9854EAACA382202A7A9B5E0C8682439883D9E8D05A36CB67B4A8
3,141,583 UART: [art] SIG.S = D88C67507DCFB1C5809D1C4D27A9554A7BC7E851329D1D4BD7CA715827F9AE3AEEE3AD24694ECAA93EBDF8FFB0E53214
3,165,526 UART: Caliptra RT
3,165,779 UART: [state] CFI Enabled
3,274,055 UART: [rt] RT listening for mailbox commands...
3,274,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,913 UART: [rt]cmd =0x41544d4e, len=14344
3,708,260 >>> mbox cmd response data (8 bytes)
3,708,261 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,294 UART: [rt]cmd =0x41545348, len=116
3,759,475 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,608 ready_for_fw is high
1,055,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,899 >>> mbox cmd response: success
2,680,679 UART:
2,680,695 UART: Running Caliptra FMC ...
2,681,103 UART:
2,681,157 UART: [state] CFI Enabled
2,691,550 UART: [fht] FMC Alias Private Key: 7
2,799,599 UART: [art] Extend RT PCRs Done
2,800,027 UART: [art] Lock RT PCRs Done
2,801,513 UART: [art] Populate DV Done
2,809,718 UART: [fht] FMC Alias Private Key: 7
2,810,648 UART: [art] Derive CDI
2,810,928 UART: [art] Store in in slot 0x4
2,896,501 UART: [art] Derive Key Pair
2,896,861 UART: [art] Store priv key in slot 0x5
2,910,259 UART: [art] Derive Key Pair - Done
2,924,945 UART: [art] Signing Cert with AUTHO
2,925,425 UART: RITY.KEYID = 7
2,940,627 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,392 UART: [art] PUB.X = F71C236C67C2DA8F74E9916FE4E939B6F20FBADA93363169A8D5012202C51FFDA2E422863C248140E0E7C31C0C7B48E8
2,948,156 UART: [art] PUB.Y = 66C811BBCD74E9BA06B88FA67EE899B61C1B91EF7A008B83553AECBAB0EDCCDACE7391896A29EE9A062C3CED3C8C58FB
2,955,108 UART: [art] SIG.R = 83E5259B59E9FC5D31365C48D3ECFBEC67128EF9D3DE74218B32766856EE055A11E5CDD0669C18E3B21966D13BACFB54
2,961,885 UART: [art] SIG.S = 8182C24FF76110C91710A61A93263378621956CAE3F2502F1FB4C09D9DBE87451686981C344DEE4F29BA2074B4502B30
2,986,258 UART: Caliptra RT
2,986,511 UART: [state] CFI Enabled
3,094,313 UART: [rt] RT listening for mailbox commands...
3,094,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,181 UART: [rt]cmd =0x41544d4e, len=14344
3,528,596 >>> mbox cmd response data (8 bytes)
3,528,597 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,530 UART: [rt]cmd =0x41545348, len=116
3,580,229 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,242 UART: [idev] ++
1,173,410 UART: [idev] CDI.KEYID = 6
1,173,771 UART: [idev] SUBJECT.KEYID = 7
1,174,196 UART: [idev] UDS.KEYID = 0
1,174,542 ready_for_fw is high
1,174,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,113 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,156 >>> mbox cmd response: success
2,769,383 UART: [afmc] ++
2,769,551 UART: [afmc] CDI.KEYID = 6
2,769,914 UART: [afmc] SUBJECT.KEYID = 7
2,770,340 UART: [afmc] AUTHORITY.KEYID = 5
2,805,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,888 UART: [afmc] --
2,848,958 UART: [cold-reset] --
2,849,810 UART: [state] Locking Datavault
2,851,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,667 UART: [state] Locking ICCM
2,852,331 UART: [exit] Launching FMC @ 0x40000130
2,857,660 UART:
2,857,676 UART: Running Caliptra FMC ...
2,858,084 UART:
2,858,227 UART: [state] CFI Enabled
2,868,920 UART: [fht] FMC Alias Private Key: 7
2,977,087 UART: [art] Extend RT PCRs Done
2,977,515 UART: [art] Lock RT PCRs Done
2,978,749 UART: [art] Populate DV Done
2,987,060 UART: [fht] FMC Alias Private Key: 7
2,988,240 UART: [art] Derive CDI
2,988,520 UART: [art] Store in in slot 0x4
3,074,363 UART: [art] Derive Key Pair
3,074,723 UART: [art] Store priv key in slot 0x5
3,088,271 UART: [art] Derive Key Pair - Done
3,103,002 UART: [art] Signing Cert with AUTHO
3,103,482 UART: RITY.KEYID = 7
3,118,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,503 UART: [art] PUB.X = 28968F266236F86AA8A631C6CF63F6B8FAD86EA2CAB479F96AE74F55D4289C612FB1415F9518D45038BC0086A82C26CB
3,126,257 UART: [art] PUB.Y = 3426D6C9059F11E099A3289256A380A708A96110098CCB5B0CE2F6A95E24D3C5E4D7EF1DD33EC37879C234012068FE7E
3,133,192 UART: [art] SIG.R = 43F7B9EF09725BF6986B3152D4138BE494E09129CACF4501ED48D14D94B97E5DB25F4664810457B87D8F64F6294C1314
3,139,949 UART: [art] SIG.S = BDA6964C4CF9597213219632E8F8EFE903247BA85F39A8E933FEE788997B8D899976304263FAD6F15D5C2C3D938F6CEC
3,163,607 UART: Caliptra RT
3,163,952 UART: [state] CFI Enabled
3,271,793 UART: [rt] RT listening for mailbox commands...
3,272,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,369 UART: [rt]cmd =0x41544d4e, len=14344
3,705,262 >>> mbox cmd response data (8 bytes)
3,705,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,210 UART: [rt]cmd =0x41545348, len=116
3,756,361 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,997 ready_for_fw is high
1,055,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,226 >>> mbox cmd response: success
2,681,892 UART:
2,681,908 UART: Running Caliptra FMC ...
2,682,316 UART:
2,682,459 UART: [state] CFI Enabled
2,692,958 UART: [fht] FMC Alias Private Key: 7
2,800,995 UART: [art] Extend RT PCRs Done
2,801,423 UART: [art] Lock RT PCRs Done
2,803,203 UART: [art] Populate DV Done
2,811,484 UART: [fht] FMC Alias Private Key: 7
2,812,456 UART: [art] Derive CDI
2,812,736 UART: [art] Store in in slot 0x4
2,898,303 UART: [art] Derive Key Pair
2,898,663 UART: [art] Store priv key in slot 0x5
2,911,697 UART: [art] Derive Key Pair - Done
2,926,145 UART: [art] Signing Cert with AUTHO
2,926,625 UART: RITY.KEYID = 7
2,941,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,458 UART: [art] PUB.X = 4D9832EE3BDA949389E0A6BC13E46BB47E565E3C6DA7B6E6B77B6155769C628A8EA5B3F9D91FA81382049BB9555F909D
2,949,233 UART: [art] PUB.Y = 199644E5090FA2F0DDAF88413330E1BFBD010F12FE58D2BDF7CF841DF6202E8306A087A420930BC621086C03DA404012
2,956,161 UART: [art] SIG.R = 8F5E17D9F82F45E2FE919C6933F31CBB6F48C38B445A147B8A03418557695AE41CFB9B26A632CE7238262A5CF2EA9CA9
2,962,936 UART: [art] SIG.S = 6C386371970CB21541ACB3ACE15E0DDFFCD7ABA1C2F06D3D984813E817402951923A06D74A4B83AF4B86B4F5F9CB5EA2
2,987,098 UART: Caliptra RT
2,987,443 UART: [state] CFI Enabled
3,095,040 UART: [rt] RT listening for mailbox commands...
3,095,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,622 UART: [rt]cmd =0x41544d4e, len=14344
3,528,627 >>> mbox cmd response data (8 bytes)
3,528,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,777 UART: [rt]cmd =0x41545348, len=116
3,580,412 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,121 UART:
192,490 UART: Running Caliptra ROM ...
193,603 UART:
193,747 UART: [state] CFI Enabled
265,384 UART: [state] LifecycleState = Unprovisioned
267,377 UART: [state] DebugLocked = No
270,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,458 UART: [kat] SHA2-256
445,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,666 UART: [kat] ++
456,189 UART: [kat] sha1
466,705 UART: [kat] SHA2-256
469,420 UART: [kat] SHA2-384
475,764 UART: [kat] SHA2-512-ACC
478,129 UART: [kat] ECC-384
2,765,792 UART: [kat] HMAC-384Kdf
2,779,735 UART: [kat] LMS
3,970,000 UART: [kat] --
3,973,798 UART: [cold-reset] ++
3,975,957 UART: [fht] Storing FHT @ 0x50003400
3,986,652 UART: [idev] ++
3,987,232 UART: [idev] CDI.KEYID = 6
3,988,120 UART: [idev] SUBJECT.KEYID = 7
3,989,319 UART: [idev] UDS.KEYID = 0
3,990,345 ready_for_fw is high
3,990,542 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,698 UART: [idev] Erasing UDS.KEYID = 0
7,324,609 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,461 UART: [idev] --
7,350,968 UART: [ldev] ++
7,351,732 UART: [ldev] CDI.KEYID = 6
7,352,649 UART: [ldev] SUBJECT.KEYID = 5
7,353,783 UART: [ldev] AUTHORITY.KEYID = 7
7,355,044 UART: [ldev] FE.KEYID = 1
7,400,725 UART: [ldev] Erasing FE.KEYID = 1
10,735,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,606 UART: [ldev] --
13,116,703 UART: [fwproc] Waiting for Commands...
13,118,619 UART: [fwproc] Received command 0x46574c44
13,120,807 UART: [fwproc] Received Image of size 113760 bytes
17,168,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,629,814 >>> mbox cmd response: success
17,634,451 UART: [afmc] ++
17,635,052 UART: [afmc] CDI.KEYID = 6
17,635,967 UART: [afmc] SUBJECT.KEYID = 7
17,637,186 UART: [afmc] AUTHORITY.KEYID = 5
21,008,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,949 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,215 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,602 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,452 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,862 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,973 UART: [afmc] --
23,378,383 UART: [cold-reset] --
23,382,675 UART: [state] Locking Datavault
23,385,434 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,188 UART: [state] Locking ICCM
23,389,857 UART: [exit] Launching FMC @ 0x40000130
23,398,246 UART:
23,398,482 UART: Running Caliptra FMC ...
23,399,578 UART:
23,399,735 UART: [state] CFI Enabled
23,466,900 UART: [fht] FMC Alias Private Key: 7
25,805,303 UART: [art] Extend RT PCRs Done
25,806,538 UART: [art] Lock RT PCRs Done
25,808,247 UART: [art] Populate DV Done
25,813,604 UART: [fht] FMC Alias Private Key: 7
25,815,137 UART: [art] Derive CDI
25,815,871 UART: [art] Store in in slot 0x4
25,875,557 UART: [art] Derive Key Pair
25,876,554 UART: [art] Store priv key in slot 0x5
29,169,882 UART: [art] Derive Key Pair - Done
29,183,203 UART: [art] Signing Cert with AUTHO
29,184,508 UART: RITY.KEYID = 7
31,471,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,188 UART: [art] PUB.X = 351576104125B3C46DB5C5E25E13B64765DA32079A504A52300C16F12AF89522F499EBABA3D47A70D68E013BD8833DED
31,480,432 UART: [art] PUB.Y = 5C2CBC6C6B3A6B22514656D25F299C7E219E83EE96F7AE03B64C01D9374B1606A2EAF6398BAE80DF94CBFD2C99F9D134
31,487,699 UART: [art] SIG.R = 01F131C59EE40AA7C7281CE93B0AFAF5DEE492CF12DDBBD7D33850394E4A34D428E8FAF3909D1AF8C8DA8C530B7112BD
31,495,105 UART: [art] SIG.S = 5501E847F030CE7BEA4881E32EA9C6B6A90CDEA9BA4331AA6986ABF89C16449A71FE773870030EAE8194B34D15416AD4
32,800,437 UART: Caliptra RT
32,801,144 UART: [state] CFI Enabled
32,961,793 UART: [rt] RT listening for mailbox commands...
32,964,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,119,656 UART: [rt]cmd =0x41544d4e, len=14344
38,420,362 >>> mbox cmd response data (8 bytes)
38,420,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,451,680 UART: [rt]cmd =0x41545348, len=116
38,471,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,801,506 ready_for_fw is high
3,801,906 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,868,811 >>> mbox cmd response: success
23,564,135 UART:
23,564,535 UART: Running Caliptra FMC ...
23,565,828 UART:
23,565,993 UART: [state] CFI Enabled
23,615,894 UART: [fht] FMC Alias Private Key: 7
25,954,166 UART: [art] Extend RT PCRs Done
25,955,395 UART: [art] Lock RT PCRs Done
25,956,968 UART: [art] Populate DV Done
25,962,322 UART: [fht] FMC Alias Private Key: 7
25,963,913 UART: [art] Derive CDI
25,964,728 UART: [art] Store in in slot 0x4
26,025,181 UART: [art] Derive Key Pair
26,026,248 UART: [art] Store priv key in slot 0x5
29,319,193 UART: [art] Derive Key Pair - Done
29,331,821 UART: [art] Signing Cert with AUTHO
29,333,131 UART: RITY.KEYID = 7
31,620,971 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,485 UART: [art] PUB.X = 87E95E1F3AA1AA879620F809920D6601F10C4C996AB2295B3167DFC71C160D9B62411F9A0699C0534269D82E7D6B42F5
31,629,686 UART: [art] PUB.Y = F8E751C17EB081BF311136AB24283990AF6F287F29D027E7322DB01C0DCCD0832105891BF5075DB3C1F55988D9C69006
31,636,909 UART: [art] SIG.R = 567540FDA306C87E1D20895CBB4A37921453ADFE617A5D14563CB140A9BC7B648404E4CB6517011DD01255BD1DB25528
31,644,253 UART: [art] SIG.S = 4A24CE90391276AA4376BBCD2737BD22C1107F65BF75A639CC6D874ECFDB82B1AFC9C9841C931902547D1517890A089F
32,949,589 UART: Caliptra RT
32,950,298 UART: [state] CFI Enabled
33,110,628 UART: [rt] RT listening for mailbox commands...
33,113,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,268,450 UART: [rt]cmd =0x41544d4e, len=14344
38,568,899 >>> mbox cmd response data (8 bytes)
38,569,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,600,109 UART: [rt]cmd =0x41545348, len=116
38,619,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
192,855 UART:
193,234 UART: Running Caliptra ROM ...
194,641 UART:
604,172 UART: [state] CFI Enabled
617,696 UART: [state] LifecycleState = Unprovisioned
619,631 UART: [state] DebugLocked = No
621,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,580 UART: [kat] SHA2-256
795,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,897 UART: [kat] ++
806,422 UART: [kat] sha1
816,799 UART: [kat] SHA2-256
819,519 UART: [kat] SHA2-384
825,716 UART: [kat] SHA2-512-ACC
828,078 UART: [kat] ECC-384
3,109,531 UART: [kat] HMAC-384Kdf
3,121,923 UART: [kat] LMS
4,312,019 UART: [kat] --
4,315,082 UART: [cold-reset] ++
4,317,458 UART: [fht] Storing FHT @ 0x50003400
4,329,794 UART: [idev] ++
4,330,358 UART: [idev] CDI.KEYID = 6
4,331,266 UART: [idev] SUBJECT.KEYID = 7
4,332,505 UART: [idev] UDS.KEYID = 0
4,333,497 ready_for_fw is high
4,333,716 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,703 UART: [idev] Erasing UDS.KEYID = 0
7,620,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,722 UART: [idev] --
7,645,653 UART: [ldev] ++
7,646,233 UART: [ldev] CDI.KEYID = 6
7,647,141 UART: [ldev] SUBJECT.KEYID = 5
7,648,422 UART: [ldev] AUTHORITY.KEYID = 7
7,649,645 UART: [ldev] FE.KEYID = 1
7,659,472 UART: [ldev] Erasing FE.KEYID = 1
10,947,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,718 UART: [ldev] --
13,307,489 UART: [fwproc] Waiting for Commands...
13,309,738 UART: [fwproc] Received command 0x46574c44
13,311,910 UART: [fwproc] Received Image of size 113760 bytes
17,362,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,287 >>> mbox cmd response: success
17,832,284 UART: [afmc] ++
17,832,880 UART: [afmc] CDI.KEYID = 6
17,833,758 UART: [afmc] SUBJECT.KEYID = 7
17,835,026 UART: [afmc] AUTHORITY.KEYID = 5
21,147,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,287 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,661 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,501 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,923 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,208 UART: [afmc] --
23,516,849 UART: [cold-reset] --
23,520,267 UART: [state] Locking Datavault
23,525,941 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,643 UART: [state] Locking ICCM
23,529,976 UART: [exit] Launching FMC @ 0x40000130
23,538,385 UART:
23,538,617 UART: Running Caliptra FMC ...
23,539,712 UART:
23,539,864 UART: [state] CFI Enabled
23,548,095 UART: [fht] FMC Alias Private Key: 7
25,879,478 UART: [art] Extend RT PCRs Done
25,880,699 UART: [art] Lock RT PCRs Done
25,882,052 UART: [art] Populate DV Done
25,887,357 UART: [fht] FMC Alias Private Key: 7
25,889,056 UART: [art] Derive CDI
25,889,868 UART: [art] Store in in slot 0x4
25,932,832 UART: [art] Derive Key Pair
25,933,824 UART: [art] Store priv key in slot 0x5
29,175,785 UART: [art] Derive Key Pair - Done
29,188,732 UART: [art] Signing Cert with AUTHO
29,190,039 UART: RITY.KEYID = 7
31,469,277 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,784 UART: [art] PUB.X = 19C52D1638F71A1A22882DDF08DBD08C338CDCD6FF3536632AE3E5BC93C173320A4326205AA7AF9D0592BCC51B1DCFCB
31,478,081 UART: [art] PUB.Y = 1474AF683F1818E959C4DD8E262E0D9D7C1DA8047038B98DF820B26D230E605AEBC24EAA2C4321EB2C9DDCFCD9CC6752
31,485,300 UART: [art] SIG.R = 04A5B8B7883F22451C6777D21F1B8CCCC668995D9F46D149585E28F91B0F1D22AA405BE2DD760BC93BF964E01EE7F28B
31,492,666 UART: [art] SIG.S = 117D5E5A356E85BD401CCF9F119F334B876DBB761E70EFFB5A98525947621BB4A81DA4D6B54DE3D308C61057124FBCDE
32,797,914 UART: Caliptra RT
32,798,621 UART: [state] CFI Enabled
32,916,065 UART: [rt] RT listening for mailbox commands...
32,918,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,073,926 UART: [rt]cmd =0x41544d4e, len=14344
38,374,212 >>> mbox cmd response data (8 bytes)
38,374,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,539 UART: [rt]cmd =0x41545348, len=116
38,425,665 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
4,125,909 ready_for_fw is high
4,126,516 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,834 >>> mbox cmd response: success
23,709,684 UART:
23,710,092 UART: Running Caliptra FMC ...
23,711,190 UART:
23,711,341 UART: [state] CFI Enabled
23,719,322 UART: [fht] FMC Alias Private Key: 7
26,050,753 UART: [art] Extend RT PCRs Done
26,051,984 UART: [art] Lock RT PCRs Done
26,053,692 UART: [art] Populate DV Done
26,059,101 UART: [fht] FMC Alias Private Key: 7
26,060,598 UART: [art] Derive CDI
26,061,366 UART: [art] Store in in slot 0x4
26,104,070 UART: [art] Derive Key Pair
26,105,072 UART: [art] Store priv key in slot 0x5
29,347,275 UART: [art] Derive Key Pair - Done
29,360,057 UART: [art] Signing Cert with AUTHO
29,361,357 UART: RITY.KEYID = 7
31,640,855 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,359 UART: [art] PUB.X = 6BBBF9024FBEE513107FFCCD7CDE6E842E50B4279E68E2C80E5969FB14C2E2C4577A21C2F1A810C57C70B1A44B81CBED
31,649,635 UART: [art] PUB.Y = 232F39B12D230B5DB0B29C78FF1A96D4027C671DC4BE6EADF3453AA34AB653E3B91C55C03DDF6947E2B0786531F73D96
31,656,882 UART: [art] SIG.R = 7B441B405060BCA991FE55565717C9565011AEEC96CF84DFC520B34F529F9795B0C0DF3A1FC14F223017731A35E5B431
31,664,255 UART: [art] SIG.S = F9BBD62544634110CE776B422D71B6F97BC65228393253ED055A718A84D7E6666D8D9FB20EDFDD14FE329391DDEE35D0
32,969,256 UART: Caliptra RT
32,969,963 UART: [state] CFI Enabled
33,088,388 UART: [rt] RT listening for mailbox commands...
33,090,779 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,245,869 UART: [rt]cmd =0x41544d4e, len=14344
38,546,139 >>> mbox cmd response data (8 bytes)
38,546,717 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,577,335 UART: [rt]cmd =0x41545348, len=116
38,597,031 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
192,445 UART:
192,807 UART: Running Caliptra ROM ...
193,915 UART:
194,061 UART: [state] CFI Enabled
268,239 UART: [state] LifecycleState = Unprovisioned
270,162 UART: [state] DebugLocked = No
271,772 UART: [state] WD Timer not started. Device not locked for debugging
276,227 UART: [kat] SHA2-256
455,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,909 UART: [kat] ++
467,354 UART: [kat] sha1
478,223 UART: [kat] SHA2-256
481,218 UART: [kat] SHA2-384
487,626 UART: [kat] SHA2-512-ACC
490,560 UART: [kat] ECC-384
2,947,825 UART: [kat] HMAC-384Kdf
2,972,940 UART: [kat] LMS
3,502,426 UART: [kat] --
3,506,780 UART: [cold-reset] ++
3,509,063 UART: [fht] FHT @ 0x50003400
3,519,756 UART: [idev] ++
3,520,316 UART: [idev] CDI.KEYID = 6
3,521,322 UART: [idev] SUBJECT.KEYID = 7
3,522,495 UART: [idev] UDS.KEYID = 0
3,523,418 ready_for_fw is high
3,523,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,195 UART: [idev] Erasing UDS.KEYID = 0
6,028,556 UART: [idev] Sha1 KeyId Algorithm
6,051,634 UART: [idev] --
6,055,301 UART: [ldev] ++
6,055,870 UART: [ldev] CDI.KEYID = 6
6,056,752 UART: [ldev] SUBJECT.KEYID = 5
6,057,968 UART: [ldev] AUTHORITY.KEYID = 7
6,059,254 UART: [ldev] FE.KEYID = 1
6,100,986 UART: [ldev] Erasing FE.KEYID = 1
8,604,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,122 UART: [ldev] --
10,412,456 UART: [fwproc] Wait for Commands...
10,414,161 UART: [fwproc] Recv command 0x46574c44
10,416,197 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,281,658 >>> mbox cmd response: success
14,286,596 UART: [afmc] ++
14,287,194 UART: [afmc] CDI.KEYID = 6
14,288,111 UART: [afmc] SUBJECT.KEYID = 7
14,289,269 UART: [afmc] AUTHORITY.KEYID = 5
16,826,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,511 UART: [afmc] --
18,625,941 UART: [cold-reset] --
18,630,883 UART: [state] Locking Datavault
18,637,096 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,797 UART: [state] Locking ICCM
18,640,838 UART: [exit] Launching FMC @ 0x40000130
18,649,240 UART:
18,649,474 UART: Running Caliptra FMC ...
18,650,570 UART:
18,650,728 UART: [state] CFI Enabled
18,708,222 UART: [fht] FMC Alias Private Key: 7
20,471,953 UART: [art] Extend RT PCRs Done
20,473,183 UART: [art] Lock RT PCRs Done
20,474,913 UART: [art] Populate DV Done
20,480,001 UART: [fht] FMC Alias Private Key: 7
20,481,596 UART: [art] Derive CDI
20,482,404 UART: [art] Store in in slot 0x4
20,540,248 UART: [art] Derive Key Pair
20,541,287 UART: [art] Store priv key in slot 0x5
23,003,369 UART: [art] Derive Key Pair - Done
23,016,319 UART: [art] Signing Cert with AUTHO
23,017,620 UART: RITY.KEYID = 7
24,728,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,341 UART: [art] PUB.X = AF0D9E4F0D1B13B2B3581D2CA2C1CC27231432DA4E163AE3CFA491F4CDFCF2519EE1D0C404BE22FCA1E9481704376C9C
24,737,666 UART: [art] PUB.Y = ACED23A2712646F802CECEBC25D973E614F63B682B6D2EE9235221DD8A4161245D027C18720CA09AEB0AA7C2A33CF0B3
24,744,916 UART: [art] SIG.R = BA223614F76CC9034EE5CA83041BF771238826C30A1F9F5FF5B1AE86E694DF64BC16286C4A59E445C9E6BA1049684006
24,752,302 UART: [art] SIG.S = AB187E973D51CD055FCA750BE09B452B2AE2D0313D38E2C43A9EF5CCBBA704DAC4B00FE4747E54F2565700DFA2778CBA
25,730,640 UART: Caliptra RT
25,731,363 UART: [state] CFI Enabled
25,895,775 UART: [rt] RT listening for mailbox commands...
25,898,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,053,260 UART: [rt]cmd =0x41544d4e, len=14344
30,049,147 >>> mbox cmd response data (8 bytes)
30,049,807 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,080,592 UART: [rt]cmd =0x41545348, len=116
30,099,976 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
3,360,651 ready_for_fw is high
3,361,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,060,007 >>> mbox cmd response: success
18,342,628 UART:
18,343,011 UART: Running Caliptra FMC ...
18,344,203 UART:
18,344,370 UART: [state] CFI Enabled
18,411,391 UART: [fht] FMC Alias Private Key: 7
20,175,501 UART: [art] Extend RT PCRs Done
20,176,729 UART: [art] Lock RT PCRs Done
20,178,032 UART: [art] Populate DV Done
20,183,488 UART: [fht] FMC Alias Private Key: 7
20,185,131 UART: [art] Derive CDI
20,185,961 UART: [art] Store in in slot 0x4
20,244,093 UART: [art] Derive Key Pair
20,245,132 UART: [art] Store priv key in slot 0x5
22,708,518 UART: [art] Derive Key Pair - Done
22,721,414 UART: [art] Signing Cert with AUTHO
22,722,733 UART: RITY.KEYID = 7
24,438,179 UART: [art] Erasing AUTHORITY.KEYID = 7
24,440,246 UART: [art] PUB.X = A8E50FCF6E76C5D98BE88E1C2277EA0A99313EB25C2723F8EA84CF2B4C8E31398F0302E600AA0F1824E467780EF7AA51
24,446,988 UART: [art] PUB.Y = 035C747077B6276FB05F1ECD27AF50ABA4D0EACDB9344BE2F8EFE96DB89653F86436CA66F81B3E2533EC37110A94FAEC
24,454,212 UART: [art] SIG.R = 6F0F68635B632B6E94DCAA12ED3174FDF25DE9E6932E2335658B17BEE7E0A29C5D0D2233D44524BC7C4100761E6D42CD
24,461,625 UART: [art] SIG.S = F002434AAEC6C394C83B0662A534EC1FAA59FEDFC3A599483BE6183C39045A002D266A159FDF878621198858ED600C85
25,440,500 UART: Caliptra RT
25,441,883 UART: [state] CFI Enabled
25,612,808 UART: [rt] RT listening for mailbox commands...
25,615,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,771,994 UART: [rt]cmd =0x41544d4e, len=14344
29,767,932 >>> mbox cmd response data (8 bytes)
29,769,055 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,799,677 UART: [rt]cmd =0x41545348, len=116
29,819,658 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,921 writing to cptra_bootfsm_go
193,046 UART:
193,417 UART: Running Caliptra ROM ...
194,531 UART:
604,042 UART: [state] CFI Enabled
614,391 UART: [state] LifecycleState = Unprovisioned
616,304 UART: [state] DebugLocked = No
617,687 UART: [state] WD Timer not started. Device not locked for debugging
621,924 UART: [kat] SHA2-256
801,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,616 UART: [kat] ++
813,069 UART: [kat] sha1
823,876 UART: [kat] SHA2-256
826,888 UART: [kat] SHA2-384
832,667 UART: [kat] SHA2-512-ACC
835,606 UART: [kat] ECC-384
3,276,566 UART: [kat] HMAC-384Kdf
3,288,888 UART: [kat] LMS
3,818,396 UART: [kat] --
3,823,035 UART: [cold-reset] ++
3,824,476 UART: [fht] FHT @ 0x50003400
3,836,303 UART: [idev] ++
3,836,868 UART: [idev] CDI.KEYID = 6
3,837,776 UART: [idev] SUBJECT.KEYID = 7
3,838,950 UART: [idev] UDS.KEYID = 0
3,839,999 ready_for_fw is high
3,840,205 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,983,468 UART: [idev] Erasing UDS.KEYID = 0
6,305,635 UART: [idev] Sha1 KeyId Algorithm
6,328,853 UART: [idev] --
6,332,794 UART: [ldev] ++
6,333,370 UART: [ldev] CDI.KEYID = 6
6,334,283 UART: [ldev] SUBJECT.KEYID = 5
6,335,458 UART: [ldev] AUTHORITY.KEYID = 7
6,336,696 UART: [ldev] FE.KEYID = 1
6,346,097 UART: [ldev] Erasing FE.KEYID = 1
8,818,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,604,721 UART: [ldev] --
10,608,953 UART: [fwproc] Wait for Commands...
10,611,677 UART: [fwproc] Recv command 0x46574c44
10,613,773 UART: [fwproc] Recv'd Img size: 114084 bytes
14,012,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,154,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,472,070 >>> mbox cmd response: success
14,476,056 UART: [afmc] ++
14,476,661 UART: [afmc] CDI.KEYID = 6
14,477,546 UART: [afmc] SUBJECT.KEYID = 7
14,478,766 UART: [afmc] AUTHORITY.KEYID = 5
16,977,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,697,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,699,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,284 UART: [afmc] --
18,773,700 UART: [cold-reset] --
18,779,144 UART: [state] Locking Datavault
18,786,824 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,529 UART: [state] Locking ICCM
18,790,844 UART: [exit] Launching FMC @ 0x40000130
18,799,266 UART:
18,799,516 UART: Running Caliptra FMC ...
18,800,621 UART:
18,800,779 UART: [state] CFI Enabled
18,808,985 UART: [fht] FMC Alias Private Key: 7
20,565,524 UART: [art] Extend RT PCRs Done
20,566,745 UART: [art] Lock RT PCRs Done
20,568,311 UART: [art] Populate DV Done
20,573,671 UART: [fht] FMC Alias Private Key: 7
20,575,155 UART: [art] Derive CDI
20,575,919 UART: [art] Store in in slot 0x4
20,618,349 UART: [art] Derive Key Pair
20,619,390 UART: [art] Store priv key in slot 0x5
23,045,961 UART: [art] Derive Key Pair - Done
23,059,176 UART: [art] Signing Cert with AUTHO
23,060,486 UART: RITY.KEYID = 7
24,765,714 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,333 UART: [art] PUB.X = 8E3366C08157AFD7C67AE8AC0F8E70C0EDBBF24DCC67B3C6E09D9F79A3EB26B45C3E52FD8CD06E7078AE1226B5EADF03
24,774,504 UART: [art] PUB.Y = 29F60EF3F08178CEAC0A6E665C54378E0C0531C9CBF387B8983984FCE9C233F00F57AEA34C13C7859C6024230E44178D
24,781,767 UART: [art] SIG.R = C3D70EEF77205BAAF4129A2B0DBE3D1CD72A505FEBAE50669CE0E1D3E537D9426B370A0FF32B1754C3A278522B650A9C
24,789,137 UART: [art] SIG.S = B77BFA299AB276F943CDE11D671338DDADF1289F3180F2E32C5C14A41C06A54F3F65FF88B2B67F6073ED5C933807308F
25,768,279 UART: Caliptra RT
25,768,986 UART: [state] CFI Enabled
25,885,631 UART: [rt] RT listening for mailbox commands...
25,888,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,043,511 UART: [rt]cmd =0x41544d4e, len=14344
30,039,615 >>> mbox cmd response data (8 bytes)
30,040,220 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,070,962 UART: [rt]cmd =0x41545348, len=116
30,091,661 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
3,696,814 ready_for_fw is high
3,697,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,859 >>> mbox cmd response: success
18,521,224 UART:
18,521,623 UART: Running Caliptra FMC ...
18,522,722 UART:
18,522,879 UART: [state] CFI Enabled
18,530,761 UART: [fht] FMC Alias Private Key: 7
20,287,821 UART: [art] Extend RT PCRs Done
20,289,043 UART: [art] Lock RT PCRs Done
20,290,756 UART: [art] Populate DV Done
20,296,210 UART: [fht] FMC Alias Private Key: 7
20,297,917 UART: [art] Derive CDI
20,298,736 UART: [art] Store in in slot 0x4
20,341,150 UART: [art] Derive Key Pair
20,342,189 UART: [art] Store priv key in slot 0x5
22,768,936 UART: [art] Derive Key Pair - Done
22,781,935 UART: [art] Signing Cert with AUTHO
22,783,262 UART: RITY.KEYID = 7
24,488,978 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,489 UART: [art] PUB.X = 60714F342383235B07E619AE9D49A0D52EB7DF1DE681E88E8D1D4F8424E70AD5B42104D3399CA2B23C8D12C1533D325A
24,497,770 UART: [art] PUB.Y = 9A71B25C2E64BEB65C08E0BA6AF284DFEEDC3062FF10F1FE1F67A654C51DC686206FD468309E47AD79732CBD2DBBB7CA
24,505,051 UART: [art] SIG.R = 45BE6E3B4CFF571A8B373BAE1887310D80EF5F48AABF2B47D6EDA2CD585CB6EF65C565C3CDEA8002C7F2118A78A4E40A
24,512,484 UART: [art] SIG.S = 25417237B25E254C579AA3AB53CAAD4EDDFA73168AF090880A1198E1A26AC16703C77178E97582D6B8043AD3C08B9158
25,490,894 UART: Caliptra RT
25,491,587 UART: [state] CFI Enabled
25,608,444 UART: [rt] RT listening for mailbox commands...
25,610,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,766,381 UART: [rt]cmd =0x41544d4e, len=14344
29,761,861 >>> mbox cmd response data (8 bytes)
29,762,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,792,999 UART: [rt]cmd =0x41545348, len=116
29,813,619 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,519 writing to cptra_bootfsm_go
192,712 UART:
193,084 UART: Running Caliptra ROM ...
194,299 UART:
194,453 UART: [state] CFI Enabled
264,498 UART: [state] LifecycleState = Unprovisioned
266,940 UART: [state] DebugLocked = No
268,617 UART: [state] WD Timer not started. Device not locked for debugging
272,373 UART: [kat] SHA2-256
462,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,777 UART: [kat] ++
473,252 UART: [kat] sha1
485,263 UART: [kat] SHA2-256
488,347 UART: [kat] SHA2-384
494,689 UART: [kat] SHA2-512-ACC
497,266 UART: [kat] ECC-384
2,945,340 UART: [kat] HMAC-384Kdf
2,970,370 UART: [kat] LMS
3,502,188 UART: [kat] --
3,507,689 UART: [cold-reset] ++
3,510,327 UART: [fht] FHT @ 0x50003400
3,521,941 UART: [idev] ++
3,522,672 UART: [idev] CDI.KEYID = 6
3,523,581 UART: [idev] SUBJECT.KEYID = 7
3,524,825 UART: [idev] UDS.KEYID = 0
3,525,748 ready_for_fw is high
3,525,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,538 UART: [idev] Erasing UDS.KEYID = 0
6,026,568 UART: [idev] Sha1 KeyId Algorithm
6,048,984 UART: [idev] --
6,053,669 UART: [ldev] ++
6,054,403 UART: [ldev] CDI.KEYID = 6
6,055,320 UART: [ldev] SUBJECT.KEYID = 5
6,056,484 UART: [ldev] AUTHORITY.KEYID = 7
6,057,717 UART: [ldev] FE.KEYID = 1
6,099,309 UART: [ldev] Erasing FE.KEYID = 1
8,606,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,785 UART: [ldev] --
10,413,210 UART: [fwproc] Wait for Commands...
10,415,457 UART: [fwproc] Recv command 0x46574c44
10,417,761 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,026 >>> mbox cmd response: success
14,598,698 UART: [afmc] ++
14,599,406 UART: [afmc] CDI.KEYID = 6
14,600,593 UART: [afmc] SUBJECT.KEYID = 7
14,602,036 UART: [afmc] AUTHORITY.KEYID = 5
17,126,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,983 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,809 UART: [afmc] --
18,925,668 UART: [cold-reset] --
18,929,697 UART: [state] Locking Datavault
18,933,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,991 UART: [state] Locking ICCM
18,937,942 UART: [exit] Launching FMC @ 0x40000130
18,946,636 UART:
18,946,863 UART: Running Caliptra FMC ...
18,947,958 UART:
18,948,112 UART: [state] CFI Enabled
19,010,252 UART: [fht] FMC Alias Private Key: 7
20,774,120 UART: [art] Extend RT PCRs Done
20,775,334 UART: [art] Lock RT PCRs Done
20,776,827 UART: [art] Populate DV Done
20,782,354 UART: [fht] FMC Alias Private Key: 7
20,783,943 UART: [art] Derive CDI
20,784,753 UART: [art] Store in in slot 0x4
20,842,650 UART: [art] Derive Key Pair
20,843,645 UART: [art] Store priv key in slot 0x5
23,306,628 UART: [art] Derive Key Pair - Done
23,319,839 UART: [art] Signing Cert with AUTHO
23,321,142 UART: RITY.KEYID = 7
25,032,166 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,673 UART: [art] PUB.X = 77050924E8E069ADFD5144155C065D7E47DA0F6164EA8DA51285E158981922BE4CC5593A14BC7C6FEC69D420122CCDF2
25,040,940 UART: [art] PUB.Y = E4347EB04CDC1EC5D90C6D3F92EF6712AD6925416792ACE98C7A2B796E9211F9D4780323C5E810C7DA18A197D5DBC3A6
25,048,188 UART: [art] SIG.R = FEE3BE3A30EE4F3E9012CB460B2B561C29F56F8CF25ACBB91E286C025C1E85A4676DF813EF2E48DC3ED1EE0D51A689BA
25,055,612 UART: [art] SIG.S = EA581EE93904BC480DB6307045EAB66E149232E0DF595122D1EB2047581FBA83258DF760A7B1129AFA265BA828E988F4
26,034,564 UART: Caliptra RT
26,035,313 UART: [state] CFI Enabled
26,199,743 UART: [rt] RT listening for mailbox commands...
26,202,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,357,573 UART: [rt]cmd =0x41544d4e, len=14344
30,353,370 >>> mbox cmd response data (8 bytes)
30,353,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,384,763 UART: [rt]cmd =0x41545348, len=116
30,404,922 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,437,686 ready_for_fw is high
3,438,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,713,965 >>> mbox cmd response: success
19,028,745 UART:
19,029,133 UART: Running Caliptra FMC ...
19,030,260 UART:
19,030,417 UART: [state] CFI Enabled
19,096,330 UART: [fht] FMC Alias Private Key: 7
20,860,725 UART: [art] Extend RT PCRs Done
20,861,994 UART: [art] Lock RT PCRs Done
20,863,700 UART: [art] Populate DV Done
20,868,915 UART: [fht] FMC Alias Private Key: 7
20,870,562 UART: [art] Derive CDI
20,871,379 UART: [art] Store in in slot 0x4
20,928,952 UART: [art] Derive Key Pair
20,929,999 UART: [art] Store priv key in slot 0x5
23,392,824 UART: [art] Derive Key Pair - Done
23,405,924 UART: [art] Signing Cert with AUTHO
23,407,265 UART: RITY.KEYID = 7
25,119,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,243 UART: [art] PUB.X = 451D97D89DE189442287CAD0FF0E82555FB4191028A9CAFBC6AAE8923F228D11A4FD7BCADFCF46CB79494F6491FCAADB
25,128,570 UART: [art] PUB.Y = 34F52FA279534E4321467862A221B41B734838A0924839B04ED88F76D365CDC15BC663FC37E5693413C07EAB8811C4FF
25,135,769 UART: [art] SIG.R = 5C26F688DA9D429F78F05E3A2CB241727CE6268907675360624AC7DC3CE703F2C84ACE08FB5E41AC23A4952908F33CFB
25,143,206 UART: [art] SIG.S = CF6A0D75F98DDD665D508997EC4C75F5C293E7B63FF8142D5FDF3CDAC1972AEBC3BDA87742B5C65933EC5326300F81AD
26,122,219 UART: Caliptra RT
26,122,942 UART: [state] CFI Enabled
26,289,114 UART: [rt] RT listening for mailbox commands...
26,291,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,446,875 UART: [rt]cmd =0x41544d4e, len=14344
30,443,142 >>> mbox cmd response data (8 bytes)
30,443,876 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,474,557 UART: [rt]cmd =0x41545348, len=116
30,495,020 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,938 writing to cptra_bootfsm_go
193,045 UART:
193,414 UART: Running Caliptra ROM ...
194,533 UART:
604,407 UART: [state] CFI Enabled
617,095 UART: [state] LifecycleState = Unprovisioned
619,456 UART: [state] DebugLocked = No
621,355 UART: [state] WD Timer not started. Device not locked for debugging
625,129 UART: [kat] SHA2-256
814,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,573 UART: [kat] ++
826,180 UART: [kat] sha1
838,053 UART: [kat] SHA2-256
841,062 UART: [kat] SHA2-384
847,700 UART: [kat] SHA2-512-ACC
850,350 UART: [kat] ECC-384
3,295,351 UART: [kat] HMAC-384Kdf
3,309,232 UART: [kat] LMS
3,841,088 UART: [kat] --
3,845,101 UART: [cold-reset] ++
3,846,967 UART: [fht] FHT @ 0x50003400
3,857,236 UART: [idev] ++
3,857,944 UART: [idev] CDI.KEYID = 6
3,858,976 UART: [idev] SUBJECT.KEYID = 7
3,860,108 UART: [idev] UDS.KEYID = 0
3,861,033 ready_for_fw is high
3,861,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,503 UART: [idev] Erasing UDS.KEYID = 0
6,339,022 UART: [idev] Sha1 KeyId Algorithm
6,361,774 UART: [idev] --
6,366,098 UART: [ldev] ++
6,366,781 UART: [ldev] CDI.KEYID = 6
6,367,689 UART: [ldev] SUBJECT.KEYID = 5
6,368,902 UART: [ldev] AUTHORITY.KEYID = 7
6,370,084 UART: [ldev] FE.KEYID = 1
6,381,310 UART: [ldev] Erasing FE.KEYID = 1
8,856,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,421 UART: [ldev] --
10,646,370 UART: [fwproc] Wait for Commands...
10,648,625 UART: [fwproc] Recv command 0x46574c44
10,650,933 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,829,324 >>> mbox cmd response: success
14,834,034 UART: [afmc] ++
14,834,749 UART: [afmc] CDI.KEYID = 6
14,835,997 UART: [afmc] SUBJECT.KEYID = 7
14,837,437 UART: [afmc] AUTHORITY.KEYID = 5
17,342,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,560 UART: [afmc] --
19,139,058 UART: [cold-reset] --
19,145,040 UART: [state] Locking Datavault
19,149,602 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,759 UART: [state] Locking ICCM
19,154,243 UART: [exit] Launching FMC @ 0x40000130
19,162,925 UART:
19,163,165 UART: Running Caliptra FMC ...
19,164,268 UART:
19,164,433 UART: [state] CFI Enabled
19,172,595 UART: [fht] FMC Alias Private Key: 7
20,929,945 UART: [art] Extend RT PCRs Done
20,931,153 UART: [art] Lock RT PCRs Done
20,932,848 UART: [art] Populate DV Done
20,938,207 UART: [fht] FMC Alias Private Key: 7
20,940,149 UART: [art] Derive CDI
20,940,903 UART: [art] Store in in slot 0x4
20,983,281 UART: [art] Derive Key Pair
20,984,290 UART: [art] Store priv key in slot 0x5
23,410,891 UART: [art] Derive Key Pair - Done
23,423,834 UART: [art] Signing Cert with AUTHO
23,425,167 UART: RITY.KEYID = 7
25,131,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,619 UART: [art] PUB.X = 7A0A3EFDD7780EB8CF15A6BF19B7365AA8EE84D9AFA52F4EA247C0D24042C5BBDDF44EB7ED2CA44A668391CC80BD7FEE
25,139,942 UART: [art] PUB.Y = 3046FF75C6A521685A636AE7B662D6C3AE05C5EF82A853029F1AC1A5ED75A9BBFE6E31F5AE3EC50866397DD39F293C81
25,147,254 UART: [art] SIG.R = A8B773E273B6D6C0D3797BB5782D42499F388C4D383565065C7223E1FB917763E619891DFBF1EC1EB0EF97B893B6BB0E
25,154,633 UART: [art] SIG.S = FD4159438108346D0E6FFF1C2A9DA67C7CF82C31C1A8D4A8DC716E0814674A02D17A7F39B419FDFC794C771FDE5D444B
26,133,648 UART: Caliptra RT
26,134,361 UART: [state] CFI Enabled
26,250,381 UART: [rt] RT listening for mailbox commands...
26,252,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,407,970 UART: [rt]cmd =0x41544d4e, len=14344
30,403,033 >>> mbox cmd response data (8 bytes)
30,403,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,434,020 UART: [rt]cmd =0x41545348, len=116
30,454,643 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
3,757,276 ready_for_fw is high
3,757,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,450 >>> mbox cmd response: success
19,207,444 UART:
19,207,833 UART: Running Caliptra FMC ...
19,208,971 UART:
19,209,132 UART: [state] CFI Enabled
19,216,983 UART: [fht] FMC Alias Private Key: 7
20,973,401 UART: [art] Extend RT PCRs Done
20,974,632 UART: [art] Lock RT PCRs Done
20,976,210 UART: [art] Populate DV Done
20,981,675 UART: [fht] FMC Alias Private Key: 7
20,983,328 UART: [art] Derive CDI
20,984,145 UART: [art] Store in in slot 0x4
21,027,174 UART: [art] Derive Key Pair
21,028,188 UART: [art] Store priv key in slot 0x5
23,455,048 UART: [art] Derive Key Pair - Done
23,468,371 UART: [art] Signing Cert with AUTHO
23,469,684 UART: RITY.KEYID = 7
25,175,456 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,975 UART: [art] PUB.X = C0DD52FD39E70E8A52BE005EEAAF3290541CC29F11789FFF9A8D08887C0A39EAF25B40AD842184C945827A5AE7149934
25,184,235 UART: [art] PUB.Y = D083CB87A66A91859A490A507D3F17DE27CA09758E96052A751186F0BE52F83E8F696EF5EC6DD426579C3DE3648A144D
25,191,439 UART: [art] SIG.R = EE2E5D66162D2B654AC34C5CDE328D049923972B7392B3B99B0630E261D23B6C88174F9AE1AD539AD165AB53A721FDC5
25,198,830 UART: [art] SIG.S = F90DA1E13F86E91CC60FBE7467A0705DCB6F2A802034B2992C2C5F1BE167E8492108F5C8B76CE41B1A9D7C7177273DB8
26,177,865 UART: Caliptra RT
26,178,573 UART: [state] CFI Enabled
26,295,907 UART: [rt] RT listening for mailbox commands...
26,298,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,453,611 UART: [rt]cmd =0x41544d4e, len=14344
30,448,984 >>> mbox cmd response data (8 bytes)
30,449,578 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,480,366 UART: [rt]cmd =0x41545348, len=116
30,499,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,415 UART: [cold-reset] ++
1,476,791 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,632 UART: [idev] --
1,514,655 UART: [ldev] ++
1,514,823 UART: [ldev] CDI.KEYID = 6
1,515,186 UART: [ldev] SUBJECT.KEYID = 5
1,515,612 UART: [ldev] AUTHORITY.KEYID = 7
1,516,075 UART: [ldev] FE.KEYID = 1
1,521,237 UART: [ldev] Erasing FE.KEYID = 1
1,546,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,492 UART: [ldev] --
1,585,803 UART: [fwproc] Waiting for Commands...
1,586,448 UART: [fwproc] Received command 0x46574c44
1,587,239 UART: [fwproc] Received Image of size 114084 bytes
2,882,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,919 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,350 >>> mbox cmd response: success
3,075,486 UART: [afmc] ++
3,075,654 UART: [afmc] CDI.KEYID = 6
3,076,016 UART: [afmc] SUBJECT.KEYID = 7
3,076,441 UART: [afmc] AUTHORITY.KEYID = 5
3,111,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,145 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,835 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,874 UART: [afmc] --
3,154,936 UART: [cold-reset] --
3,155,688 UART: [state] Locking Datavault
3,156,737 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,341 UART: [state] Locking ICCM
3,158,007 UART: [exit] Launching FMC @ 0x40000130
3,163,336 UART:
3,163,352 UART: Running Caliptra FMC ...
3,163,760 UART:
3,163,814 UART: [state] CFI Enabled
3,174,667 UART: [fht] FMC Alias Private Key: 7
3,282,640 UART: [art] Extend RT PCRs Done
3,283,068 UART: [art] Lock RT PCRs Done
3,284,460 UART: [art] Populate DV Done
3,292,817 UART: [fht] FMC Alias Private Key: 7
3,293,921 UART: [art] Derive CDI
3,294,201 UART: [art] Store in in slot 0x4
3,379,866 UART: [art] Derive Key Pair
3,380,226 UART: [art] Store priv key in slot 0x5
3,393,754 UART: [art] Derive Key Pair - Done
3,408,605 UART: [art] Signing Cert with AUTHO
3,409,085 UART: RITY.KEYID = 7
3,424,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,958 UART: [art] PUB.X = A05285488B5D7881018FCBEF26672705C6F591B249BEEDC4E067B9F802B21D3078C87DC9893AA3FE4B6DE1139ECA9AFE
3,431,731 UART: [art] PUB.Y = 9B9BE0193C7BFDDCB4DEA2844858517CBFB3987F83D6708F7053CC2620D8127F1054DE2BEEFF6C953FF6ED27D8A80A35
3,438,694 UART: [art] SIG.R = 6A6E3726F3D4A1C0A5E7828EA4973697DE9C3CD00F5170D96CA2EAECC9ACFCC4F47F59938165C4D1963C9E37BF67E782
3,445,475 UART: [art] SIG.S = F21330381FE6FE6ED05A13FDA9C369624695FA179FE97C6168E5C24799148B7263D67E447D8D45EC60A7D5EA4EE88930
3,468,910 UART: Caliptra RT
3,469,163 UART: [state] CFI Enabled
3,578,140 UART: [rt] RT listening for mailbox commands...
3,578,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,802 UART: [rt]cmd =0x41544d4e, len=14344
4,011,364 >>> mbox cmd response data (8 bytes)
4,011,365 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,400 UART: [rt]cmd =0x41545348, len=116
4,062,671 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 ready_for_fw is high
1,362,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,936 >>> mbox cmd response: success
2,986,392 UART:
2,986,408 UART: Running Caliptra FMC ...
2,986,816 UART:
2,986,870 UART: [state] CFI Enabled
2,997,503 UART: [fht] FMC Alias Private Key: 7
3,105,514 UART: [art] Extend RT PCRs Done
3,105,942 UART: [art] Lock RT PCRs Done
3,107,290 UART: [art] Populate DV Done
3,115,353 UART: [fht] FMC Alias Private Key: 7
3,116,435 UART: [art] Derive CDI
3,116,715 UART: [art] Store in in slot 0x4
3,202,458 UART: [art] Derive Key Pair
3,202,818 UART: [art] Store priv key in slot 0x5
3,216,320 UART: [art] Derive Key Pair - Done
3,231,039 UART: [art] Signing Cert with AUTHO
3,231,519 UART: RITY.KEYID = 7
3,246,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,648 UART: [art] PUB.X = CE17DD931703623C44AB286B9F6A3013A944F7B938F3CFB0CB4FB0E9EEE1B1E3BD6F0583A529B7F183DFF629C2A6CF0D
3,254,429 UART: [art] PUB.Y = A26BC02CF0804462064BC73838AE32EBE4AE68F85AEF6411E2FF3E81E84BAA713026000DB562E66E99691F1BA2AFDBD2
3,261,365 UART: [art] SIG.R = 1F59211854D265DE9FFF0204EA772D7338EBC38E4F51009F0CA9C5F1CC0CCA14C32245B68C94D7C581F1B465B503B4BF
3,268,108 UART: [art] SIG.S = 3ED0405EAB8A9B9A7F7256D26DFD1F7306A48117FE8E816B6BB97DA5C4441DD12C0F86C29510EEC2974B145E13424002
3,291,854 UART: Caliptra RT
3,292,107 UART: [state] CFI Enabled
3,401,673 UART: [rt] RT listening for mailbox commands...
3,402,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,391 UART: [rt]cmd =0x41544d4e, len=14344
3,835,125 >>> mbox cmd response data (8 bytes)
3,835,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,247 UART: [rt]cmd =0x41545348, len=116
3,887,688 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
902,635 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,446 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 ready_for_fw is high
1,480,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,357 UART: [idev] --
1,515,632 UART: [ldev] ++
1,515,800 UART: [ldev] CDI.KEYID = 6
1,516,163 UART: [ldev] SUBJECT.KEYID = 5
1,516,589 UART: [ldev] AUTHORITY.KEYID = 7
1,517,052 UART: [ldev] FE.KEYID = 1
1,522,334 UART: [ldev] Erasing FE.KEYID = 1
1,547,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,694 UART: [fwproc] Waiting for Commands...
1,587,491 UART: [fwproc] Received command 0x46574c44
1,588,282 UART: [fwproc] Received Image of size 114084 bytes
2,883,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,881 >>> mbox cmd response: success
3,077,981 UART: [afmc] ++
3,078,149 UART: [afmc] CDI.KEYID = 6
3,078,511 UART: [afmc] SUBJECT.KEYID = 7
3,078,936 UART: [afmc] AUTHORITY.KEYID = 5
3,114,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,956 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,646 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,475 UART: [afmc] --
3,157,603 UART: [cold-reset] --
3,158,623 UART: [state] Locking Datavault
3,159,960 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,564 UART: [state] Locking ICCM
3,161,040 UART: [exit] Launching FMC @ 0x40000130
3,166,369 UART:
3,166,385 UART: Running Caliptra FMC ...
3,166,793 UART:
3,166,936 UART: [state] CFI Enabled
3,177,625 UART: [fht] FMC Alias Private Key: 7
3,285,138 UART: [art] Extend RT PCRs Done
3,285,566 UART: [art] Lock RT PCRs Done
3,287,228 UART: [art] Populate DV Done
3,295,505 UART: [fht] FMC Alias Private Key: 7
3,296,459 UART: [art] Derive CDI
3,296,739 UART: [art] Store in in slot 0x4
3,382,336 UART: [art] Derive Key Pair
3,382,696 UART: [art] Store priv key in slot 0x5
3,395,456 UART: [art] Derive Key Pair - Done
3,410,200 UART: [art] Signing Cert with AUTHO
3,410,680 UART: RITY.KEYID = 7
3,425,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,565 UART: [art] PUB.X = 8E1F651CB684FA0ADA300D0C539BFFD774AF967091CB5F02896E921D9712A2034922DAA004C9F42946F36E7CDE1C89BF
3,433,327 UART: [art] PUB.Y = 84D4CEA42321258D2820C762828F1725437B09C5B7BFC4C7E0090425AD5341709BD6843330603686D653B3237D250CFA
3,440,253 UART: [art] SIG.R = C13C3C3D45851D3D80E6FF099D755A64A4EA5A8352CA45C1BC427E8AF68B7ECDE82ECA0BBE062BF7721456DFF1685393
3,447,030 UART: [art] SIG.S = 39F849D7C08510A27361BF5CA90A4C3A58C7A4B7BE9F6CEE5EEF323063DC796BBE982E70F381EF1D174EBED1EAC5C418
3,470,446 UART: Caliptra RT
3,470,791 UART: [state] CFI Enabled
3,579,302 UART: [rt] RT listening for mailbox commands...
3,579,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,928 UART: [rt]cmd =0x41544d4e, len=14344
4,013,308 >>> mbox cmd response data (8 bytes)
4,013,309 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,208 UART: [rt]cmd =0x41545348, len=116
4,064,777 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,243 >>> mbox cmd response: success
2,987,931 UART:
2,987,947 UART: Running Caliptra FMC ...
2,988,355 UART:
2,988,498 UART: [state] CFI Enabled
2,999,107 UART: [fht] FMC Alias Private Key: 7
3,107,542 UART: [art] Extend RT PCRs Done
3,107,970 UART: [art] Lock RT PCRs Done
3,109,472 UART: [art] Populate DV Done
3,117,625 UART: [fht] FMC Alias Private Key: 7
3,118,739 UART: [art] Derive CDI
3,119,019 UART: [art] Store in in slot 0x4
3,204,626 UART: [art] Derive Key Pair
3,204,986 UART: [art] Store priv key in slot 0x5
3,218,298 UART: [art] Derive Key Pair - Done
3,232,939 UART: [art] Signing Cert with AUTHO
3,233,419 UART: RITY.KEYID = 7
3,248,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,256 UART: [art] PUB.X = 4769A3DA0F657E560214BDB4688A6FB9285EC181CFCDD3418FDAD1EBC30898096A9527BC7267D45A35D05C563B6A42FA
3,256,024 UART: [art] PUB.Y = 9FC24C1DEA24C54446F81E85349F52B76A25083DFD5286C2CCB803CDBAEE27597295B31070EC46F0FEBDE92D0AE2EB6C
3,262,983 UART: [art] SIG.R = 40F3A7614163BB275130C7CC955ED591D5FD1F59F364BAFEAF0921D9B501AC910A121E4FC67338AE0BC0EE713BC76779
3,269,751 UART: [art] SIG.S = F9C760367974307C86251D9F2326AF3BF16B2C922EA96A8211807822C271AA1DC53C8B516BD3F58012AD58F75B038215
3,293,985 UART: Caliptra RT
3,294,330 UART: [state] CFI Enabled
3,401,815 UART: [rt] RT listening for mailbox commands...
3,402,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,529 UART: [rt]cmd =0x41544d4e, len=14344
3,835,363 >>> mbox cmd response data (8 bytes)
3,835,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,401 UART: [rt]cmd =0x41545348, len=116
3,886,872 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
892,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,973 UART: [kat] ++
897,125 UART: [kat] sha1
901,445 UART: [kat] SHA2-256
903,385 UART: [kat] SHA2-384
906,086 UART: [kat] SHA2-512-ACC
907,987 UART: [kat] ECC-384
917,870 UART: [kat] HMAC-384Kdf
922,248 UART: [kat] LMS
1,170,576 UART: [kat] --
1,171,653 UART: [cold-reset] ++
1,171,999 UART: [fht] FHT @ 0x50003400
1,174,836 UART: [idev] ++
1,175,004 UART: [idev] CDI.KEYID = 6
1,175,364 UART: [idev] SUBJECT.KEYID = 7
1,175,788 UART: [idev] UDS.KEYID = 0
1,176,133 ready_for_fw is high
1,176,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,953 UART: [idev] Sha1 KeyId Algorithm
1,209,567 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,244,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,849 UART: [ldev] --
1,283,120 UART: [fwproc] Wait for Commands...
1,283,802 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,907 >>> mbox cmd response: success
2,772,031 UART: [afmc] ++
2,772,199 UART: [afmc] CDI.KEYID = 6
2,772,561 UART: [afmc] SUBJECT.KEYID = 7
2,772,986 UART: [afmc] AUTHORITY.KEYID = 5
2,808,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,544 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,682 UART: [afmc] --
2,851,564 UART: [cold-reset] --
2,852,580 UART: [state] Locking Datavault
2,853,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,401 UART: [state] Locking ICCM
2,854,979 UART: [exit] Launching FMC @ 0x40000130
2,860,308 UART:
2,860,324 UART: Running Caliptra FMC ...
2,860,732 UART:
2,860,786 UART: [state] CFI Enabled
2,871,051 UART: [fht] FMC Alias Private Key: 7
2,978,946 UART: [art] Extend RT PCRs Done
2,979,374 UART: [art] Lock RT PCRs Done
2,980,794 UART: [art] Populate DV Done
2,989,063 UART: [fht] FMC Alias Private Key: 7
2,990,121 UART: [art] Derive CDI
2,990,401 UART: [art] Store in in slot 0x4
3,075,856 UART: [art] Derive Key Pair
3,076,216 UART: [art] Store priv key in slot 0x5
3,088,578 UART: [art] Derive Key Pair - Done
3,103,629 UART: [art] Signing Cert with AUTHO
3,104,109 UART: RITY.KEYID = 7
3,119,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,826 UART: [art] PUB.X = 9B68907C9ECEF6F96D5DAA96B9FEAFA151BD13F9DBDB08000719E35A6AB07CC501873BBD478924C1305519F7763C8F57
3,126,577 UART: [art] PUB.Y = 3999F48C260B2C0E63038E430A21588703678636E214C257B30FA5FA504FB221C73D45C6DA0BDC67BC20823AA97F5391
3,133,502 UART: [art] SIG.R = DFF8ED280293839D596F66784845323E27C178824D88E3DF2AA2DA85B93B01C73ABD8568340BAA952A377F7DC3AF811E
3,140,267 UART: [art] SIG.S = 57F5C890E088802482A9BB6A300F6CAB07603AF31FD0509B0D4080C0048DF65513DC2BC438167CF63F780C1927D9CF0B
3,164,360 UART: Caliptra RT
3,164,613 UART: [state] CFI Enabled
3,272,248 UART: [rt] RT listening for mailbox commands...
3,272,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,844 UART: [rt]cmd =0x41544d4e, len=14344
3,706,002 >>> mbox cmd response data (8 bytes)
3,706,003 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,188 UART: [rt]cmd =0x41545348, len=116
3,757,583 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,423 ready_for_fw is high
1,060,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,186 >>> mbox cmd response: success
2,686,298 UART:
2,686,314 UART: Running Caliptra FMC ...
2,686,722 UART:
2,686,776 UART: [state] CFI Enabled
2,697,157 UART: [fht] FMC Alias Private Key: 7
2,804,970 UART: [art] Extend RT PCRs Done
2,805,398 UART: [art] Lock RT PCRs Done
2,807,080 UART: [art] Populate DV Done
2,815,257 UART: [fht] FMC Alias Private Key: 7
2,816,311 UART: [art] Derive CDI
2,816,591 UART: [art] Store in in slot 0x4
2,902,308 UART: [art] Derive Key Pair
2,902,668 UART: [art] Store priv key in slot 0x5
2,915,880 UART: [art] Derive Key Pair - Done
2,930,648 UART: [art] Signing Cert with AUTHO
2,931,128 UART: RITY.KEYID = 7
2,946,606 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,371 UART: [art] PUB.X = 4CEA003D0C166082EF638F741010C3486945F8BC84ECBAE897A0D1E7C67BAA3084AF70903DA47A5C3A0A94C76B625A1D
2,954,123 UART: [art] PUB.Y = DE3190BE3432EB3B4C0D5801D2BB9E62E85A7D5D58AE1D7161C023CEA373D7416309C936CD3BA5DB48ACFDFC51277508
2,961,075 UART: [art] SIG.R = 3E652D6494664956614E760EE37FC13E5311BFBB5B09D9B60D4C368D3405D2145A0FAB4FE7FC553A14D95ECB5A3B7AD9
2,967,840 UART: [art] SIG.S = 8836D6B2A84319C8F535B6F3F132B7C27747BCDDF7EC000F34709F76FC6DE9C9943964821B05713A23BC7C47C0BF1FCF
2,991,343 UART: Caliptra RT
2,991,596 UART: [state] CFI Enabled
3,099,559 UART: [rt] RT listening for mailbox commands...
3,100,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,091 UART: [rt]cmd =0x41544d4e, len=14344
3,532,151 >>> mbox cmd response data (8 bytes)
3,532,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,161 UART: [rt]cmd =0x41545348, len=116
3,583,834 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,489 UART: [kat] SHA2-512-ACC
908,390 UART: [kat] ECC-384
918,271 UART: [kat] HMAC-384Kdf
922,935 UART: [kat] LMS
1,171,263 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,754 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 ready_for_fw is high
1,176,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,303 UART: [idev] Erasing UDS.KEYID = 0
1,201,802 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,530 UART: [ldev] ++
1,211,698 UART: [ldev] CDI.KEYID = 6
1,212,061 UART: [ldev] SUBJECT.KEYID = 5
1,212,487 UART: [ldev] AUTHORITY.KEYID = 7
1,212,950 UART: [ldev] FE.KEYID = 1
1,218,126 UART: [ldev] Erasing FE.KEYID = 1
1,244,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,638 UART: [ldev] --
1,284,131 UART: [fwproc] Wait for Commands...
1,284,933 UART: [fwproc] Recv command 0x46574c44
1,285,661 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,966 >>> mbox cmd response: success
2,773,076 UART: [afmc] ++
2,773,244 UART: [afmc] CDI.KEYID = 6
2,773,606 UART: [afmc] SUBJECT.KEYID = 7
2,774,031 UART: [afmc] AUTHORITY.KEYID = 5
2,809,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,981 UART: [afmc] --
2,853,021 UART: [cold-reset] --
2,853,913 UART: [state] Locking Datavault
2,855,270 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,874 UART: [state] Locking ICCM
2,856,392 UART: [exit] Launching FMC @ 0x40000130
2,861,721 UART:
2,861,737 UART: Running Caliptra FMC ...
2,862,145 UART:
2,862,288 UART: [state] CFI Enabled
2,873,235 UART: [fht] FMC Alias Private Key: 7
2,981,372 UART: [art] Extend RT PCRs Done
2,981,800 UART: [art] Lock RT PCRs Done
2,983,368 UART: [art] Populate DV Done
2,991,561 UART: [fht] FMC Alias Private Key: 7
2,992,499 UART: [art] Derive CDI
2,992,779 UART: [art] Store in in slot 0x4
3,078,892 UART: [art] Derive Key Pair
3,079,252 UART: [art] Store priv key in slot 0x5
3,092,300 UART: [art] Derive Key Pair - Done
3,107,208 UART: [art] Signing Cert with AUTHO
3,107,688 UART: RITY.KEYID = 7
3,122,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,119 UART: [art] PUB.X = 791B8A539D212F2E6D1B49FAD82303CDCAC29F5855558F740E07F30434981B86E589450106E6CF8212D1FF27DCDE2EDE
3,129,877 UART: [art] PUB.Y = 5E270AC84BBDE3B1EB33D9852B938F0ACAAAB7787D6E0ABE7699D1CCF5A8346F4EF6FCB0FEDED985A5BBF8F15E2B1D78
3,136,852 UART: [art] SIG.R = 25E7BD7E199D7F8FD280623080104B7D441F245A413AA3B1223C7100A78E2FF021AB4D39EC1D4F39FC0D5957F49D495F
3,143,601 UART: [art] SIG.S = 8B03E9BD26F698C1B74FAD5D25556C84C09CAAB23050AF10309CCF86924F83037821CCC9DA60BA9F144B80691022A784
3,167,638 UART: Caliptra RT
3,167,983 UART: [state] CFI Enabled
3,275,134 UART: [rt] RT listening for mailbox commands...
3,275,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,958 UART: [rt]cmd =0x41544d4e, len=14344
3,708,790 >>> mbox cmd response data (8 bytes)
3,708,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,836 UART: [rt]cmd =0x41545348, len=116
3,760,353 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,928 ready_for_fw is high
1,059,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,683 >>> mbox cmd response: success
2,685,815 UART:
2,685,831 UART: Running Caliptra FMC ...
2,686,239 UART:
2,686,382 UART: [state] CFI Enabled
2,696,921 UART: [fht] FMC Alias Private Key: 7
2,804,628 UART: [art] Extend RT PCRs Done
2,805,056 UART: [art] Lock RT PCRs Done
2,806,714 UART: [art] Populate DV Done
2,815,067 UART: [fht] FMC Alias Private Key: 7
2,816,249 UART: [art] Derive CDI
2,816,529 UART: [art] Store in in slot 0x4
2,902,020 UART: [art] Derive Key Pair
2,902,380 UART: [art] Store priv key in slot 0x5
2,915,668 UART: [art] Derive Key Pair - Done
2,930,462 UART: [art] Signing Cert with AUTHO
2,930,942 UART: RITY.KEYID = 7
2,946,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,019 UART: [art] PUB.X = 7654D167A93119EEC40DDA42BDB856C390C280D3DF2DF8D789A419389AF66E03EF3079230BA0CFFB1DC65D418AFB0A03
2,953,788 UART: [art] PUB.Y = B27596C7C61CF946A94AAD28D4F9B63113D31A44E27A9BE2F6E27FAA06FD23AEA0ED3DF5309FA1C8B204FCA788E862E6
2,960,752 UART: [art] SIG.R = ACD46636DCD357F914B3923186479913B6E626116BC096D1F8C3236BAA1EA5F191913D095CAB94095D66BF152D343DF6
2,967,516 UART: [art] SIG.S = 21B66A999A6D4B8F243644D0385890275A6D6AA8E605543690B9543E2B72DFAC6082329BBAF23B8A4406527C22F162A1
2,991,389 UART: Caliptra RT
2,991,734 UART: [state] CFI Enabled
3,100,219 UART: [rt] RT listening for mailbox commands...
3,100,889 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,783 UART: [rt]cmd =0x41544d4e, len=14344
3,533,825 >>> mbox cmd response data (8 bytes)
3,533,826 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,947 UART: [rt]cmd =0x41545348, len=116
3,586,034 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,891 UART: [kat] ++
895,043 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,028 UART: [kat] SHA2-512-ACC
905,929 UART: [kat] ECC-384
915,210 UART: [kat] HMAC-384Kdf
919,628 UART: [kat] LMS
1,167,940 UART: [kat] --
1,168,881 UART: [cold-reset] ++
1,169,387 UART: [fht] FHT @ 0x50003400
1,171,985 UART: [idev] ++
1,172,153 UART: [idev] CDI.KEYID = 6
1,172,514 UART: [idev] SUBJECT.KEYID = 7
1,172,939 UART: [idev] UDS.KEYID = 0
1,173,285 ready_for_fw is high
1,173,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,651 UART: [idev] Erasing UDS.KEYID = 0
1,197,781 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,768 UART: [ldev] ++
1,207,936 UART: [ldev] CDI.KEYID = 6
1,208,300 UART: [ldev] SUBJECT.KEYID = 5
1,208,727 UART: [ldev] AUTHORITY.KEYID = 7
1,209,190 UART: [ldev] FE.KEYID = 1
1,214,568 UART: [ldev] Erasing FE.KEYID = 1
1,240,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,602 UART: [ldev] --
1,279,980 UART: [fwproc] Wait for Commands...
1,280,565 UART: [fwproc] Recv command 0x46574c44
1,281,298 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,791 >>> mbox cmd response: success
2,769,044 UART: [afmc] ++
2,769,212 UART: [afmc] CDI.KEYID = 6
2,769,575 UART: [afmc] SUBJECT.KEYID = 7
2,770,001 UART: [afmc] AUTHORITY.KEYID = 5
2,805,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,467 UART: [afmc] --
2,848,453 UART: [cold-reset] --
2,849,267 UART: [state] Locking Datavault
2,850,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,154 UART: [state] Locking ICCM
2,851,648 UART: [exit] Launching FMC @ 0x40000130
2,856,977 UART:
2,856,993 UART: Running Caliptra FMC ...
2,857,401 UART:
2,857,455 UART: [state] CFI Enabled
2,867,948 UART: [fht] FMC Alias Private Key: 7
2,976,677 UART: [art] Extend RT PCRs Done
2,977,105 UART: [art] Lock RT PCRs Done
2,978,597 UART: [art] Populate DV Done
2,986,712 UART: [fht] FMC Alias Private Key: 7
2,987,876 UART: [art] Derive CDI
2,988,156 UART: [art] Store in in slot 0x4
3,074,103 UART: [art] Derive Key Pair
3,074,463 UART: [art] Store priv key in slot 0x5
3,088,359 UART: [art] Derive Key Pair - Done
3,103,158 UART: [art] Signing Cert with AUTHO
3,103,638 UART: RITY.KEYID = 7
3,119,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,205 UART: [art] PUB.X = 8A214D10C360C3F5A927BF2500DE6001E3095FCE6846B05FC4F8E40FD469671B0914E00C633C3639C27FA28AE3C61246
3,126,938 UART: [art] PUB.Y = 89C6F15BC9F40E9E1740DDA92318C7A5D69D5EC8F23CFDBA45B1FE0F0BEDB87DB778E8A0BA6420FC724E369142BD470B
3,133,898 UART: [art] SIG.R = 7ACED769196571026329122A667A165DA2CC81929292AC2969F1B7455179D708E8E64093FD72F6FD88E391E402B76862
3,140,647 UART: [art] SIG.S = 1215BFBC2403E2E615F41696B03F06CEB3ACF4270EDADF4E60A3A88F665AE32714E6B2E487AA45FB1601A47051B748E5
3,164,262 UART: Caliptra RT
3,164,515 UART: [state] CFI Enabled
3,273,288 UART: [rt] RT listening for mailbox commands...
3,273,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,132 UART: [rt]cmd =0x41544d4e, len=14344
3,706,752 >>> mbox cmd response data (8 bytes)
3,706,753 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,772 UART: [rt]cmd =0x41545348, len=116
3,758,935 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,576 ready_for_fw is high
1,055,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,295 >>> mbox cmd response: success
2,680,799 UART:
2,680,815 UART: Running Caliptra FMC ...
2,681,223 UART:
2,681,277 UART: [state] CFI Enabled
2,691,834 UART: [fht] FMC Alias Private Key: 7
2,799,785 UART: [art] Extend RT PCRs Done
2,800,213 UART: [art] Lock RT PCRs Done
2,801,661 UART: [art] Populate DV Done
2,809,736 UART: [fht] FMC Alias Private Key: 7
2,810,690 UART: [art] Derive CDI
2,810,970 UART: [art] Store in in slot 0x4
2,896,605 UART: [art] Derive Key Pair
2,896,965 UART: [art] Store priv key in slot 0x5
2,910,577 UART: [art] Derive Key Pair - Done
2,925,506 UART: [art] Signing Cert with AUTHO
2,925,986 UART: RITY.KEYID = 7
2,941,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,777 UART: [art] PUB.X = 5BC4E3EF8B67515BE4ACCBD10B4CF4450E0BE4445FDF98036B42CBF9E5AC6D4B6945B8A0BF52218A53E08D406A3D9099
2,948,553 UART: [art] PUB.Y = B52FD26DDAB265DC7162D1019BA8E45CE58F7F29D0F01B83BBF4A63F1559FA57CD70828C0F1533270A589533094CACFD
2,955,503 UART: [art] SIG.R = 87DC151B587E5C247A3002C3A59CF24BE9D832FBF6BFC7940E5CE6D0BCEDB5283B2EC590FD1614A14AC9A65B2B25034C
2,962,282 UART: [art] SIG.S = F41E78B416167B2413516F6B61C017A19C91A8EDFC6862EA90B8CE30B66DB5DFC9732674652448AE9A190C632D8032D7
2,986,244 UART: Caliptra RT
2,986,497 UART: [state] CFI Enabled
3,094,185 UART: [rt] RT listening for mailbox commands...
3,094,855 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,119 UART: [rt]cmd =0x41544d4e, len=14344
3,527,695 >>> mbox cmd response data (8 bytes)
3,527,696 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,693 UART: [rt]cmd =0x41545348, len=116
3,579,778 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 ready_for_fw is high
1,174,344 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,398 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,219 UART: [ldev] ++
1,209,387 UART: [ldev] CDI.KEYID = 6
1,209,751 UART: [ldev] SUBJECT.KEYID = 5
1,210,178 UART: [ldev] AUTHORITY.KEYID = 7
1,210,641 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,503 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,796 >>> mbox cmd response: success
2,770,891 UART: [afmc] ++
2,771,059 UART: [afmc] CDI.KEYID = 6
2,771,422 UART: [afmc] SUBJECT.KEYID = 7
2,771,848 UART: [afmc] AUTHORITY.KEYID = 5
2,807,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,314 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,033 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,868 UART: [afmc] --
2,850,872 UART: [cold-reset] --
2,851,664 UART: [state] Locking Datavault
2,852,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,397 UART: [state] Locking ICCM
2,854,061 UART: [exit] Launching FMC @ 0x40000130
2,859,390 UART:
2,859,406 UART: Running Caliptra FMC ...
2,859,814 UART:
2,859,957 UART: [state] CFI Enabled
2,870,572 UART: [fht] FMC Alias Private Key: 7
2,978,557 UART: [art] Extend RT PCRs Done
2,978,985 UART: [art] Lock RT PCRs Done
2,980,717 UART: [art] Populate DV Done
2,989,014 UART: [fht] FMC Alias Private Key: 7
2,990,046 UART: [art] Derive CDI
2,990,326 UART: [art] Store in in slot 0x4
3,076,273 UART: [art] Derive Key Pair
3,076,633 UART: [art] Store priv key in slot 0x5
3,089,833 UART: [art] Derive Key Pair - Done
3,104,656 UART: [art] Signing Cert with AUTHO
3,105,136 UART: RITY.KEYID = 7
3,120,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,097 UART: [art] PUB.X = 0D39137AA7C4A00971301D8FE47B504F71B7DD37141CF2B7A3EAF598F03654079A93E5E623DC2FBF7D0705B238C8F690
3,127,856 UART: [art] PUB.Y = 4F09A2F690E95736F395EABE3B25D9EA0F5AFFCD6BF0475EEEC382799CEF834AE0D3B438FF7DB8A22B913ACB0CD82931
3,134,821 UART: [art] SIG.R = 2FFD29FC88F0EAB2EFE2AD6A80A4FA87C76FC5D816E40F07107BD77F08B3E232CFE2E9D603840CC78F0489D8C2BEDA11
3,141,597 UART: [art] SIG.S = C4F03B2A834B9582B373F59474FA385D3593C6E7994C4863AE06BC082896E1AF93EBB277F0608BB01730E36FC3A7A291
3,165,552 UART: Caliptra RT
3,165,897 UART: [state] CFI Enabled
3,273,304 UART: [rt] RT listening for mailbox commands...
3,273,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,692 UART: [rt]cmd =0x41544d4e, len=14344
3,707,118 >>> mbox cmd response data (8 bytes)
3,707,119 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,168 UART: [rt]cmd =0x41545348, len=116
3,759,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,827 ready_for_fw is high
1,055,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,724 >>> mbox cmd response: success
2,681,876 UART:
2,681,892 UART: Running Caliptra FMC ...
2,682,300 UART:
2,682,443 UART: [state] CFI Enabled
2,693,030 UART: [fht] FMC Alias Private Key: 7
2,800,949 UART: [art] Extend RT PCRs Done
2,801,377 UART: [art] Lock RT PCRs Done
2,802,829 UART: [art] Populate DV Done
2,811,186 UART: [fht] FMC Alias Private Key: 7
2,812,148 UART: [art] Derive CDI
2,812,428 UART: [art] Store in in slot 0x4
2,897,991 UART: [art] Derive Key Pair
2,898,351 UART: [art] Store priv key in slot 0x5
2,911,585 UART: [art] Derive Key Pair - Done
2,926,185 UART: [art] Signing Cert with AUTHO
2,926,665 UART: RITY.KEYID = 7
2,942,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,824 UART: [art] PUB.X = 405ABF9B8D8B93B29ABD4FE83012BD051EBAF95DE70AC231358DCA93505AA3604CABB6AD5EACA3916E0C1B26F61706B5
2,949,604 UART: [art] PUB.Y = 646FD5701D9731134D5D9DA573B32E53D665149C879C3056807DBE881FE75112008E25E71A60701985B97DC808E92A82
2,956,517 UART: [art] SIG.R = 10BE55AF4CE09D2430737FAF14C852F0A436A88866EE542A4C0033289D89A95C67EAEF751B5E5CD92FEF76A288E1A6C0
2,963,275 UART: [art] SIG.S = 1A85C42E2515654F665119276BD3C246B93C70C1DD720D27C905AC416F2E8B10EE55C4CF841F2CB52C9F1ECE95C91134
2,987,782 UART: Caliptra RT
2,988,127 UART: [state] CFI Enabled
3,096,736 UART: [rt] RT listening for mailbox commands...
3,097,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,366 UART: [rt]cmd =0x41544d4e, len=14344
3,529,786 >>> mbox cmd response data (8 bytes)
3,529,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,850 UART: [rt]cmd =0x41545348, len=116
3,581,191 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,268 UART:
192,634 UART: Running Caliptra ROM ...
193,840 UART:
193,996 UART: [state] CFI Enabled
263,988 UART: [state] LifecycleState = Unprovisioned
265,958 UART: [state] DebugLocked = No
267,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,623 UART: [kat] SHA2-256
442,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,822 UART: [kat] ++
453,275 UART: [kat] sha1
464,079 UART: [kat] SHA2-256
466,813 UART: [kat] SHA2-384
472,876 UART: [kat] SHA2-512-ACC
475,238 UART: [kat] ECC-384
2,767,958 UART: [kat] HMAC-384Kdf
2,800,592 UART: [kat] LMS
3,990,865 UART: [kat] --
3,997,284 UART: [cold-reset] ++
3,998,721 UART: [fht] Storing FHT @ 0x50003400
4,009,212 UART: [idev] ++
4,009,788 UART: [idev] CDI.KEYID = 6
4,010,679 UART: [idev] SUBJECT.KEYID = 7
4,011,924 UART: [idev] UDS.KEYID = 0
4,013,011 ready_for_fw is high
4,013,232 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,313 UART: [idev] Erasing UDS.KEYID = 0
7,348,782 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,158 UART: [idev] --
7,373,616 UART: [ldev] ++
7,374,186 UART: [ldev] CDI.KEYID = 6
7,375,120 UART: [ldev] SUBJECT.KEYID = 5
7,376,329 UART: [ldev] AUTHORITY.KEYID = 7
7,377,614 UART: [ldev] FE.KEYID = 1
7,424,262 UART: [ldev] Erasing FE.KEYID = 1
10,753,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,013 UART: [ldev] --
13,117,053 UART: [fwproc] Waiting for Commands...
13,118,715 UART: [fwproc] Received command 0x46574c44
13,120,895 UART: [fwproc] Received Image of size 113760 bytes
17,167,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,633,293 >>> mbox cmd response: success
17,637,120 UART: [afmc] ++
17,637,718 UART: [afmc] CDI.KEYID = 6
17,638,628 UART: [afmc] SUBJECT.KEYID = 7
17,639,905 UART: [afmc] AUTHORITY.KEYID = 5
21,011,616 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,916 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,374 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,159 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,636 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,374 UART: [afmc] --
23,381,668 UART: [cold-reset] --
23,385,472 UART: [state] Locking Datavault
23,390,723 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,477 UART: [state] Locking ICCM
23,393,820 UART: [exit] Launching FMC @ 0x40000130
23,402,216 UART:
23,402,450 UART: Running Caliptra FMC ...
23,403,501 UART:
23,403,652 UART: [state] CFI Enabled
23,472,781 UART: [fht] FMC Alias Private Key: 7
25,810,676 UART: [art] Extend RT PCRs Done
25,811,905 UART: [art] Lock RT PCRs Done
25,813,694 UART: [art] Populate DV Done
25,819,162 UART: [fht] FMC Alias Private Key: 7
25,820,671 UART: [art] Derive CDI
25,821,435 UART: [art] Store in in slot 0x4
25,881,448 UART: [art] Derive Key Pair
25,882,447 UART: [art] Store priv key in slot 0x5
29,175,212 UART: [art] Derive Key Pair - Done
29,188,375 UART: [art] Signing Cert with AUTHO
29,189,676 UART: RITY.KEYID = 7
31,477,509 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,011 UART: [art] PUB.X = 6E840DF9F18574A69B1CC767F18597F4470D2DF7E982947C3E10B11FF94D85E3E0E878EFD775D49AA03E6F85E72B5917
31,486,449 UART: [art] PUB.Y = 49A122E808E74291F96966690677BC0546B5A60D4B642D2D6B28876906E6A9560FED2F0E2BBAA371F9A5FD8FD2430500
31,493,476 UART: [art] SIG.R = 37493DCD42C88EA23F7652F13A73F14F03AF83D6738330D9CD191328964CA7B4BD0676388D2848FBB24EC05C8E5D430F
31,500,869 UART: [art] SIG.S = 8029529DB26FC6EAD3E025399C2099ACB6239B642FF51393A672F6E85565ED21A6244D20DFC62609C26598045746E4CB
32,806,057 UART: Caliptra RT
32,806,775 UART: [state] CFI Enabled
32,968,267 UART: [rt] RT listening for mailbox commands...
32,970,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,126,126 UART: [rt]cmd =0x41544d4e, len=14344
38,426,964 >>> mbox cmd response data (8 bytes)
38,427,566 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,458,253 UART: [rt]cmd =0x41545348, len=116
38,478,846 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,783,541 ready_for_fw is high
3,783,953 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,820,749 >>> mbox cmd response: success
23,522,665 UART:
23,523,061 UART: Running Caliptra FMC ...
23,524,260 UART:
23,524,429 UART: [state] CFI Enabled
23,593,439 UART: [fht] FMC Alias Private Key: 7
25,931,549 UART: [art] Extend RT PCRs Done
25,932,770 UART: [art] Lock RT PCRs Done
25,934,344 UART: [art] Populate DV Done
25,939,705 UART: [fht] FMC Alias Private Key: 7
25,941,268 UART: [art] Derive CDI
25,942,083 UART: [art] Store in in slot 0x4
26,002,228 UART: [art] Derive Key Pair
26,003,295 UART: [art] Store priv key in slot 0x5
29,296,062 UART: [art] Derive Key Pair - Done
29,309,273 UART: [art] Signing Cert with AUTHO
29,310,605 UART: RITY.KEYID = 7
31,597,335 UART: [art] Erasing AUTHORITY.KEYID = 7
31,598,843 UART: [art] PUB.X = B4066857D401B73E46982A77B331DD29766EAD9DADF23EF22D2844B56BF2C17C46A6E6128A3348B7A861D2E8AFFD8704
31,606,042 UART: [art] PUB.Y = 98930817EC449DAD3FF87ECF5A34BB091C7E20FA6FBE3AA7DBEA2803A8FAEDA05FC09C3D0BFF9AB30FBA6CB80476527C
31,613,366 UART: [art] SIG.R = CE1029D3736F544F85F04993DFE3B3D8AD7057D3F35CC8E808D82F3AAE3A672F0654F90E68B9DB442A691EEB6F1B5E49
31,620,725 UART: [art] SIG.S = 742EE8F2DD504883450AA452B53BFE62D7E75D3DC1A31B4E2AB24EB5329728EFCFB00E952C0785C7A264836534FFFC3B
32,925,514 UART: Caliptra RT
32,926,226 UART: [state] CFI Enabled
33,086,577 UART: [rt] RT listening for mailbox commands...
33,088,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,244,261 UART: [rt]cmd =0x41544d4e, len=14344
38,544,932 >>> mbox cmd response data (8 bytes)
38,545,503 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,576,334 UART: [rt]cmd =0x41545348, len=116
38,595,721 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
193,075 UART:
193,468 UART: Running Caliptra ROM ...
194,617 UART:
604,199 UART: [state] CFI Enabled
617,886 UART: [state] LifecycleState = Unprovisioned
619,832 UART: [state] DebugLocked = No
621,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,275 UART: [kat] SHA2-256
797,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,715 UART: [kat] ++
808,375 UART: [kat] sha1
818,974 UART: [kat] SHA2-256
821,627 UART: [kat] SHA2-384
826,617 UART: [kat] SHA2-512-ACC
828,977 UART: [kat] ECC-384
3,113,320 UART: [kat] HMAC-384Kdf
3,124,981 UART: [kat] LMS
4,315,117 UART: [kat] --
4,319,705 UART: [cold-reset] ++
4,321,707 UART: [fht] Storing FHT @ 0x50003400
4,333,767 UART: [idev] ++
4,334,365 UART: [idev] CDI.KEYID = 6
4,335,247 UART: [idev] SUBJECT.KEYID = 7
4,336,560 UART: [idev] UDS.KEYID = 0
4,337,527 ready_for_fw is high
4,337,721 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,820 UART: [idev] Erasing UDS.KEYID = 0
7,625,622 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,590 UART: [idev] --
7,651,791 UART: [ldev] ++
7,652,408 UART: [ldev] CDI.KEYID = 6
7,653,336 UART: [ldev] SUBJECT.KEYID = 5
7,654,536 UART: [ldev] AUTHORITY.KEYID = 7
7,655,814 UART: [ldev] FE.KEYID = 1
7,667,453 UART: [ldev] Erasing FE.KEYID = 1
10,955,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,737 UART: [ldev] --
13,314,458 UART: [fwproc] Waiting for Commands...
13,316,879 UART: [fwproc] Received command 0x46574c44
13,319,054 UART: [fwproc] Received Image of size 113760 bytes
17,371,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,962 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,651 >>> mbox cmd response: success
17,835,469 UART: [afmc] ++
17,836,066 UART: [afmc] CDI.KEYID = 6
17,836,981 UART: [afmc] SUBJECT.KEYID = 7
17,838,250 UART: [afmc] AUTHORITY.KEYID = 5
21,155,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,770 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,145 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,954 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,379 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,235 UART: [afmc] --
23,520,691 UART: [cold-reset] --
23,524,225 UART: [state] Locking Datavault
23,529,961 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,764 UART: [state] Locking ICCM
23,534,188 UART: [exit] Launching FMC @ 0x40000130
23,542,585 UART:
23,542,817 UART: Running Caliptra FMC ...
23,543,912 UART:
23,544,066 UART: [state] CFI Enabled
23,552,166 UART: [fht] FMC Alias Private Key: 7
25,882,670 UART: [art] Extend RT PCRs Done
25,883,889 UART: [art] Lock RT PCRs Done
25,885,462 UART: [art] Populate DV Done
25,891,050 UART: [fht] FMC Alias Private Key: 7
25,892,691 UART: [art] Derive CDI
25,893,501 UART: [art] Store in in slot 0x4
25,936,296 UART: [art] Derive Key Pair
25,937,327 UART: [art] Store priv key in slot 0x5
29,179,514 UART: [art] Derive Key Pair - Done
29,192,568 UART: [art] Signing Cert with AUTHO
29,193,872 UART: RITY.KEYID = 7
31,472,956 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,463 UART: [art] PUB.X = 7C7C2E7C7B07800051C886E0248EE661F980E4346CFAF9E575FAA87217F8E49A46DE1E5E78F95C99D6DC3C84AE168BFE
31,481,692 UART: [art] PUB.Y = 9202EEA0989948F686E981D8957DB0A8A09880BA9BFF2B8D38AE8AA98DEEF5A4EFC81FAD95CAE4CCDAC955D2A8A1130F
31,489,001 UART: [art] SIG.R = 4B78CAD740F865F63C62A08C5A172837B2B0733A7372A6C5055EB0B6919A8B8207EECF51D96F5CDFECBF97364E60812B
31,496,371 UART: [art] SIG.S = 3CEEC660E0173C88D259B05B43C489A37537B73A99B701E306FBAABE867DD2ECBB53CC94DC4CE1FC5DF57A149216A09E
32,801,698 UART: Caliptra RT
32,802,397 UART: [state] CFI Enabled
32,920,714 UART: [rt] RT listening for mailbox commands...
32,923,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,078,596 UART: [rt]cmd =0x41544d4e, len=14344
38,378,781 >>> mbox cmd response data (8 bytes)
38,379,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,410,244 UART: [rt]cmd =0x41545348, len=116
38,430,509 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
4,134,515 ready_for_fw is high
4,134,891 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,645 >>> mbox cmd response: success
23,708,115 UART:
23,708,496 UART: Running Caliptra FMC ...
23,709,586 UART:
23,709,735 UART: [state] CFI Enabled
23,717,499 UART: [fht] FMC Alias Private Key: 7
26,048,272 UART: [art] Extend RT PCRs Done
26,049,500 UART: [art] Lock RT PCRs Done
26,051,314 UART: [art] Populate DV Done
26,056,538 UART: [fht] FMC Alias Private Key: 7
26,058,081 UART: [art] Derive CDI
26,058,923 UART: [art] Store in in slot 0x4
26,101,424 UART: [art] Derive Key Pair
26,102,467 UART: [art] Store priv key in slot 0x5
29,344,387 UART: [art] Derive Key Pair - Done
29,357,338 UART: [art] Signing Cert with AUTHO
29,358,830 UART: RITY.KEYID = 7
31,638,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,785 UART: [art] PUB.X = E651C6A12F376593E85B486331C44E08954F8E90F4B968E503E20B004E4437ECC8E9B028CBE786549DC48A9AA0A9FCC1
31,646,978 UART: [art] PUB.Y = 8E329EAB52F225BB02C88EC617A878516E22BCECD97CB5D72835E4CF724EC694E18A258C48A90C6051EFFBC5333A59A5
31,654,282 UART: [art] SIG.R = 791850A1D4627D3C5F9F49CCED548782CBB39D99509F1139A216C5611F8A402790F73727AAACFB656962CDFA11228AFB
31,661,673 UART: [art] SIG.S = 04723C7FE18457360CCB07D52120CE78CCD6D5167FDFD14982A363066284591EEA832015C8209FAB466716167A9A9D7A
32,966,587 UART: Caliptra RT
32,967,295 UART: [state] CFI Enabled
33,085,004 UART: [rt] RT listening for mailbox commands...
33,087,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,243,201 UART: [rt]cmd =0x41544d4e, len=14344
38,544,339 >>> mbox cmd response data (8 bytes)
38,544,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,575,564 UART: [rt]cmd =0x41545348, len=116
38,595,896 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
192,643 UART:
193,015 UART: Running Caliptra ROM ...
194,233 UART:
194,389 UART: [state] CFI Enabled
264,107 UART: [state] LifecycleState = Unprovisioned
265,968 UART: [state] DebugLocked = No
267,913 UART: [state] WD Timer not started. Device not locked for debugging
271,716 UART: [kat] SHA2-256
450,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,395 UART: [kat] ++
462,924 UART: [kat] sha1
474,206 UART: [kat] SHA2-256
477,213 UART: [kat] SHA2-384
483,267 UART: [kat] SHA2-512-ACC
486,265 UART: [kat] ECC-384
2,951,004 UART: [kat] HMAC-384Kdf
2,972,127 UART: [kat] LMS
3,501,627 UART: [kat] --
3,506,134 UART: [cold-reset] ++
3,508,490 UART: [fht] FHT @ 0x50003400
3,518,754 UART: [idev] ++
3,519,324 UART: [idev] CDI.KEYID = 6
3,520,233 UART: [idev] SUBJECT.KEYID = 7
3,521,404 UART: [idev] UDS.KEYID = 0
3,522,447 ready_for_fw is high
3,522,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,119 UART: [idev] Erasing UDS.KEYID = 0
6,027,266 UART: [idev] Sha1 KeyId Algorithm
6,051,256 UART: [idev] --
6,053,766 UART: [ldev] ++
6,054,349 UART: [ldev] CDI.KEYID = 6
6,055,452 UART: [ldev] SUBJECT.KEYID = 5
6,056,559 UART: [ldev] AUTHORITY.KEYID = 7
6,057,731 UART: [ldev] FE.KEYID = 1
6,098,887 UART: [ldev] Erasing FE.KEYID = 1
8,606,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,318 UART: [ldev] --
10,410,821 UART: [fwproc] Wait for Commands...
10,413,554 UART: [fwproc] Recv command 0x46574c44
10,415,645 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,268,205 >>> mbox cmd response: success
14,272,277 UART: [afmc] ++
14,273,059 UART: [afmc] CDI.KEYID = 6
14,273,979 UART: [afmc] SUBJECT.KEYID = 7
14,275,018 UART: [afmc] AUTHORITY.KEYID = 5
16,805,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,167 UART: [afmc] --
18,605,467 UART: [cold-reset] --
18,611,324 UART: [state] Locking Datavault
18,616,514 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,153 UART: [state] Locking ICCM
18,619,890 UART: [exit] Launching FMC @ 0x40000130
18,628,291 UART:
18,628,521 UART: Running Caliptra FMC ...
18,629,616 UART:
18,629,775 UART: [state] CFI Enabled
18,687,753 UART: [fht] FMC Alias Private Key: 7
20,452,431 UART: [art] Extend RT PCRs Done
20,453,648 UART: [art] Lock RT PCRs Done
20,455,426 UART: [art] Populate DV Done
20,460,506 UART: [fht] FMC Alias Private Key: 7
20,462,154 UART: [art] Derive CDI
20,462,961 UART: [art] Store in in slot 0x4
20,521,344 UART: [art] Derive Key Pair
20,522,370 UART: [art] Store priv key in slot 0x5
22,985,678 UART: [art] Derive Key Pair - Done
22,998,551 UART: [art] Signing Cert with AUTHO
22,999,899 UART: RITY.KEYID = 7
24,711,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,787 UART: [art] PUB.X = 8AB057F561942BBDD3B16BCD0EB157BB573567430AB1ACE1468E4A7E416B6C2C2755367543272C8B0C62298D6E3548F1
24,720,058 UART: [art] PUB.Y = 9BDCF5DDFB636446B3E736D60C6E3BEF1241DFF218C2239E64C41F1E08473BBF07831AA63D3A543EF04BFF72DB6C553F
24,727,379 UART: [art] SIG.R = 6DEE1324235D95BAD692E13BF7A86A0E0B1C24333444C17C48F4877F247359CBC5CE6382C6CD4358CA360AED5687D6B2
24,734,734 UART: [art] SIG.S = 0D6BB57087C84899A4941696F620F22823DF64E556AFAEE38981FA16783761018A40848B40FFB4C91BFFAAC5C8A6CF8C
25,713,678 UART: Caliptra RT
25,714,358 UART: [state] CFI Enabled
25,879,251 UART: [rt] RT listening for mailbox commands...
25,881,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,036,993 UART: [rt]cmd =0x41544d4e, len=14344
30,032,478 >>> mbox cmd response data (8 bytes)
30,033,223 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,063,859 UART: [rt]cmd =0x41545348, len=116
30,084,202 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
3,358,893 ready_for_fw is high
3,359,494 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,047,217 >>> mbox cmd response: success
18,347,714 UART:
18,348,115 UART: Running Caliptra FMC ...
18,349,311 UART:
18,349,492 UART: [state] CFI Enabled
18,412,291 UART: [fht] FMC Alias Private Key: 7
20,176,069 UART: [art] Extend RT PCRs Done
20,177,301 UART: [art] Lock RT PCRs Done
20,179,252 UART: [art] Populate DV Done
20,184,878 UART: [fht] FMC Alias Private Key: 7
20,186,400 UART: [art] Derive CDI
20,187,169 UART: [art] Store in in slot 0x4
20,245,338 UART: [art] Derive Key Pair
20,246,340 UART: [art] Store priv key in slot 0x5
22,709,029 UART: [art] Derive Key Pair - Done
22,722,142 UART: [art] Signing Cert with AUTHO
22,723,452 UART: RITY.KEYID = 7
24,435,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,493 UART: [art] PUB.X = AA86A31C8DA977CF0CBAFAEC90859B69F1AE4AFEE6D7DC7EFC53B80DDB4837122A386B222BEF47EDEB1D8371F7212927
24,444,776 UART: [art] PUB.Y = D689C2423DF63329B64B736AD255809E7AD388E4941A70BA795646346DCBDB7B2EBB091436A583A630FFE59E411F15F4
24,452,015 UART: [art] SIG.R = 4497B74491B96BEED86BC833715B2699471F790EAF3F9111677D75481C54C4C37E086A207A23ABC9E5AF2360FA12B13F
24,459,388 UART: [art] SIG.S = EC2405AC38B1EDE2FE1D5512AE54C618096FB6E7592803B97CE3D1D963981E111D3A291B89F08AE58F676E60561CA48A
25,437,718 UART: Caliptra RT
25,438,427 UART: [state] CFI Enabled
25,604,090 UART: [rt] RT listening for mailbox commands...
25,606,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,762,100 UART: [rt]cmd =0x41544d4e, len=14344
29,757,905 >>> mbox cmd response data (8 bytes)
29,758,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,789,159 UART: [rt]cmd =0x41545348, len=116
29,809,810 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,002 writing to cptra_bootfsm_go
193,271 UART:
193,636 UART: Running Caliptra ROM ...
194,843 UART:
604,531 UART: [state] CFI Enabled
620,216 UART: [state] LifecycleState = Unprovisioned
622,106 UART: [state] DebugLocked = No
624,199 UART: [state] WD Timer not started. Device not locked for debugging
627,306 UART: [kat] SHA2-256
806,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,000 UART: [kat] ++
818,454 UART: [kat] sha1
830,812 UART: [kat] SHA2-256
833,821 UART: [kat] SHA2-384
839,885 UART: [kat] SHA2-512-ACC
842,897 UART: [kat] ECC-384
3,284,675 UART: [kat] HMAC-384Kdf
3,297,105 UART: [kat] LMS
3,826,552 UART: [kat] --
3,829,788 UART: [cold-reset] ++
3,830,658 UART: [fht] FHT @ 0x50003400
3,841,423 UART: [idev] ++
3,842,015 UART: [idev] CDI.KEYID = 6
3,842,942 UART: [idev] SUBJECT.KEYID = 7
3,844,113 UART: [idev] UDS.KEYID = 0
3,845,039 ready_for_fw is high
3,845,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,661 UART: [idev] Erasing UDS.KEYID = 0
6,315,700 UART: [idev] Sha1 KeyId Algorithm
6,338,765 UART: [idev] --
6,343,353 UART: [ldev] ++
6,343,925 UART: [ldev] CDI.KEYID = 6
6,344,810 UART: [ldev] SUBJECT.KEYID = 5
6,346,024 UART: [ldev] AUTHORITY.KEYID = 7
6,347,181 UART: [ldev] FE.KEYID = 1
6,358,873 UART: [ldev] Erasing FE.KEYID = 1
8,834,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,774 UART: [ldev] --
10,624,616 UART: [fwproc] Wait for Commands...
10,627,690 UART: [fwproc] Recv command 0x46574c44
10,629,731 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,247 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,003 >>> mbox cmd response: success
14,491,485 UART: [afmc] ++
14,492,081 UART: [afmc] CDI.KEYID = 6
14,492,968 UART: [afmc] SUBJECT.KEYID = 7
14,494,258 UART: [afmc] AUTHORITY.KEYID = 5
16,993,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,156 UART: [afmc] --
18,787,251 UART: [cold-reset] --
18,790,698 UART: [state] Locking Datavault
18,796,002 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,709 UART: [state] Locking ICCM
18,799,614 UART: [exit] Launching FMC @ 0x40000130
18,808,073 UART:
18,808,312 UART: Running Caliptra FMC ...
18,809,338 UART:
18,809,488 UART: [state] CFI Enabled
18,818,292 UART: [fht] FMC Alias Private Key: 7
20,575,635 UART: [art] Extend RT PCRs Done
20,576,847 UART: [art] Lock RT PCRs Done
20,578,707 UART: [art] Populate DV Done
20,584,010 UART: [fht] FMC Alias Private Key: 7
20,585,607 UART: [art] Derive CDI
20,586,348 UART: [art] Store in in slot 0x4
20,628,723 UART: [art] Derive Key Pair
20,629,760 UART: [art] Store priv key in slot 0x5
23,056,179 UART: [art] Derive Key Pair - Done
23,069,227 UART: [art] Signing Cert with AUTHO
23,070,538 UART: RITY.KEYID = 7
24,775,754 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,260 UART: [art] PUB.X = D95F6CE53C8B98B1D383F9A8F88B58D820C64176FA4D49D7A89982D7FC4D721BEA82586A453E7964E31DF8503E095252
24,784,548 UART: [art] PUB.Y = 7DD3CE6636B797EC532CC007FDC003FEA93CCC90F47E4489FF7E8225E75F75CD005FFCDF6E7F8D8B675C80172F710CCB
24,791,828 UART: [art] SIG.R = A6A2D1CF5F50F2400D4A69AB64B66A5EF624A76D11B7ED4F53EC4E1B98285C1D708321D926CBA37AB466DAD11D5A9C86
24,799,201 UART: [art] SIG.S = 00B8AFD1ED37C1CE6C0589C261A89C14CA5E2CF78049E599893CA23FBC6248462CFCE361904A36E973CF3F60875AC079
25,778,130 UART: Caliptra RT
25,778,831 UART: [state] CFI Enabled
25,896,264 UART: [rt] RT listening for mailbox commands...
25,898,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,054,333 UART: [rt]cmd =0x41544d4e, len=14344
30,049,481 >>> mbox cmd response data (8 bytes)
30,050,060 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,080,898 UART: [rt]cmd =0x41545348, len=116
30,101,002 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,072 writing to cptra_bootfsm_go
3,693,278 ready_for_fw is high
3,693,829 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,417 >>> mbox cmd response: success
18,502,259 UART:
18,502,684 UART: Running Caliptra FMC ...
18,503,889 UART:
18,504,075 UART: [state] CFI Enabled
18,511,485 UART: [fht] FMC Alias Private Key: 7
20,268,098 UART: [art] Extend RT PCRs Done
20,269,333 UART: [art] Lock RT PCRs Done
20,270,967 UART: [art] Populate DV Done
20,276,267 UART: [fht] FMC Alias Private Key: 7
20,277,919 UART: [art] Derive CDI
20,278,739 UART: [art] Store in in slot 0x4
20,321,187 UART: [art] Derive Key Pair
20,322,238 UART: [art] Store priv key in slot 0x5
22,749,341 UART: [art] Derive Key Pair - Done
22,762,235 UART: [art] Signing Cert with AUTHO
22,763,551 UART: RITY.KEYID = 7
24,469,160 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,692 UART: [art] PUB.X = 5ABB77B7429F6FBD0ACDE9EA5A2C0A4A75D9F9D47D3B891E86654B8EFCA93BC933C25C68B4C14FFB58F27D160BE2E027
24,477,985 UART: [art] PUB.Y = CFD8CA778F83E9F497058B6FBB95B1AFF5BB9C4ECBB27A1DA6BBD56144A7E481A77128EED799534FD53F501FD52BCF9B
24,485,277 UART: [art] SIG.R = 8C6345E109B9401A5A9A86BD737F108636D806806C378A45AB05F7688D1773742D8E40E2CA3BD360B5A33DC483B0BCF8
24,492,647 UART: [art] SIG.S = 7FA7C34103A3C925CD2620D5B3C866EEA50CD56C29C49D3A35722D5B9A9DA425802F48B7423539C5D967A9AC0938F5D8
25,471,969 UART: Caliptra RT
25,472,663 UART: [state] CFI Enabled
25,589,418 UART: [rt] RT listening for mailbox commands...
25,592,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,747,383 UART: [rt]cmd =0x41544d4e, len=14344
29,742,904 >>> mbox cmd response data (8 bytes)
29,743,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,774,108 UART: [rt]cmd =0x41545348, len=116
29,793,918 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,458 UART:
192,831 UART: Running Caliptra ROM ...
194,045 UART:
194,199 UART: [state] CFI Enabled
265,613 UART: [state] LifecycleState = Unprovisioned
268,023 UART: [state] DebugLocked = No
270,343 UART: [state] WD Timer not started. Device not locked for debugging
275,248 UART: [kat] SHA2-256
465,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,893 UART: [kat] ++
476,382 UART: [kat] sha1
486,918 UART: [kat] SHA2-256
489,932 UART: [kat] SHA2-384
495,354 UART: [kat] SHA2-512-ACC
497,934 UART: [kat] ECC-384
2,948,153 UART: [kat] HMAC-384Kdf
2,972,063 UART: [kat] LMS
3,503,888 UART: [kat] --
3,509,113 UART: [cold-reset] ++
3,510,404 UART: [fht] FHT @ 0x50003400
3,521,522 UART: [idev] ++
3,522,146 UART: [idev] CDI.KEYID = 6
3,523,093 UART: [idev] SUBJECT.KEYID = 7
3,524,337 UART: [idev] UDS.KEYID = 0
3,525,262 ready_for_fw is high
3,525,450 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,085 UART: [idev] Erasing UDS.KEYID = 0
6,028,761 UART: [idev] Sha1 KeyId Algorithm
6,051,322 UART: [idev] --
6,056,110 UART: [ldev] ++
6,056,857 UART: [ldev] CDI.KEYID = 6
6,057,776 UART: [ldev] SUBJECT.KEYID = 5
6,058,938 UART: [ldev] AUTHORITY.KEYID = 7
6,060,121 UART: [ldev] FE.KEYID = 1
6,100,042 UART: [ldev] Erasing FE.KEYID = 1
8,606,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,799 UART: [ldev] --
10,413,356 UART: [fwproc] Wait for Commands...
10,414,905 UART: [fwproc] Recv command 0x46574c44
10,417,176 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,630 >>> mbox cmd response: success
14,605,350 UART: [afmc] ++
14,606,070 UART: [afmc] CDI.KEYID = 6
14,607,318 UART: [afmc] SUBJECT.KEYID = 7
14,608,758 UART: [afmc] AUTHORITY.KEYID = 5
17,150,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,094 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,911 UART: [afmc] --
18,949,661 UART: [cold-reset] --
18,953,149 UART: [state] Locking Datavault
18,957,593 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,757 UART: [state] Locking ICCM
18,962,598 UART: [exit] Launching FMC @ 0x40000130
18,971,235 UART:
18,971,464 UART: Running Caliptra FMC ...
18,972,563 UART:
18,972,716 UART: [state] CFI Enabled
19,034,275 UART: [fht] FMC Alias Private Key: 7
20,798,014 UART: [art] Extend RT PCRs Done
20,799,228 UART: [art] Lock RT PCRs Done
20,800,750 UART: [art] Populate DV Done
20,806,047 UART: [fht] FMC Alias Private Key: 7
20,807,646 UART: [art] Derive CDI
20,808,456 UART: [art] Store in in slot 0x4
20,867,566 UART: [art] Derive Key Pair
20,868,605 UART: [art] Store priv key in slot 0x5
23,331,296 UART: [art] Derive Key Pair - Done
23,344,504 UART: [art] Signing Cert with AUTHO
23,345,811 UART: RITY.KEYID = 7
25,056,924 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,433 UART: [art] PUB.X = 71F3AF412866F08BDEDB2F28EBB46D6933D9F1623F8F30104D61BF473F051DE8D58588ABEC486C6C951F83CE6829AC88
25,065,705 UART: [art] PUB.Y = 286DD6889CDE2DDF6ED5FB77E73596DB821F36CE6EF5E52FA50287F1D4810556B4C05E06CA99A3397B1C8DE41D9E9487
25,073,004 UART: [art] SIG.R = FA8E55ABBC5044CEFC6B60664914A89F1536362D09602736C549CA19293A8085FBB9DD9EB8CDA0F6FD51867FD15C78F7
25,080,413 UART: [art] SIG.S = E059DF73BF1D90692374CFBC8F11C1779DD55E7FBB7CD6E467A755BEC0000233695945E545A5717A003072A1E73113D9
26,059,437 UART: Caliptra RT
26,060,156 UART: [state] CFI Enabled
26,224,255 UART: [rt] RT listening for mailbox commands...
26,226,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,894 UART: [rt]cmd =0x41544d4e, len=14344
30,377,666 >>> mbox cmd response data (8 bytes)
30,378,289 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,408,910 UART: [rt]cmd =0x41545348, len=116
30,428,507 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,440,943 ready_for_fw is high
3,441,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,726,630 >>> mbox cmd response: success
19,006,138 UART:
19,006,535 UART: Running Caliptra FMC ...
19,007,682 UART:
19,007,849 UART: [state] CFI Enabled
19,075,564 UART: [fht] FMC Alias Private Key: 7
20,839,839 UART: [art] Extend RT PCRs Done
20,841,071 UART: [art] Lock RT PCRs Done
20,842,729 UART: [art] Populate DV Done
20,848,409 UART: [fht] FMC Alias Private Key: 7
20,850,053 UART: [art] Derive CDI
20,850,868 UART: [art] Store in in slot 0x4
20,908,598 UART: [art] Derive Key Pair
20,909,646 UART: [art] Store priv key in slot 0x5
23,372,368 UART: [art] Derive Key Pair - Done
23,385,478 UART: [art] Signing Cert with AUTHO
23,386,776 UART: RITY.KEYID = 7
25,098,760 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,276 UART: [art] PUB.X = 6D0291869659866D62F6DF39B139E31581FAED7565857BB5F9114A719EBEBD58777397BA563C2C223521F099010BA67D
25,107,505 UART: [art] PUB.Y = 32401FE6A26467ABDEE71C5AA703B7815619B3D90EBD8FFABE0B108295CBE79C5BAF9A47ADAD823D5539396277131DEA
25,114,765 UART: [art] SIG.R = 9EB4B6FE10E561AA0E18EA8551150D2A2CF5431119DC531D1C4F8A59FF7993741009AEC1E207109969AD83C5C7F5C0BB
25,122,142 UART: [art] SIG.S = 11B112C6F305D80171B596BC0914BF42194BE28E8308CEA2765BA2D394B545A2DEE0B2802B3AE3D0EE2BFF770253DEBF
26,100,448 UART: Caliptra RT
26,101,172 UART: [state] CFI Enabled
26,267,598 UART: [rt] RT listening for mailbox commands...
26,270,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,425,235 UART: [rt]cmd =0x41544d4e, len=14344
30,421,439 >>> mbox cmd response data (8 bytes)
30,422,024 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,452,877 UART: [rt]cmd =0x41545348, len=116
30,472,668 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,872 writing to cptra_bootfsm_go
192,964 UART:
193,330 UART: Running Caliptra ROM ...
194,533 UART:
604,054 UART: [state] CFI Enabled
615,240 UART: [state] LifecycleState = Unprovisioned
617,596 UART: [state] DebugLocked = No
620,049 UART: [state] WD Timer not started. Device not locked for debugging
624,036 UART: [kat] SHA2-256
813,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,706 UART: [kat] ++
825,310 UART: [kat] sha1
836,119 UART: [kat] SHA2-256
839,139 UART: [kat] SHA2-384
844,847 UART: [kat] SHA2-512-ACC
847,432 UART: [kat] ECC-384
3,287,978 UART: [kat] HMAC-384Kdf
3,301,845 UART: [kat] LMS
3,833,673 UART: [kat] --
3,840,528 UART: [cold-reset] ++
3,842,960 UART: [fht] FHT @ 0x50003400
3,853,520 UART: [idev] ++
3,854,167 UART: [idev] CDI.KEYID = 6
3,855,122 UART: [idev] SUBJECT.KEYID = 7
3,856,392 UART: [idev] UDS.KEYID = 0
3,857,508 ready_for_fw is high
3,857,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,979 UART: [idev] Erasing UDS.KEYID = 0
6,333,097 UART: [idev] Sha1 KeyId Algorithm
6,356,171 UART: [idev] --
6,361,520 UART: [ldev] ++
6,362,207 UART: [ldev] CDI.KEYID = 6
6,363,127 UART: [ldev] SUBJECT.KEYID = 5
6,364,293 UART: [ldev] AUTHORITY.KEYID = 7
6,365,524 UART: [ldev] FE.KEYID = 1
6,376,006 UART: [ldev] Erasing FE.KEYID = 1
8,849,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,267 UART: [ldev] --
10,641,464 UART: [fwproc] Wait for Commands...
10,643,998 UART: [fwproc] Recv command 0x46574c44
10,646,314 UART: [fwproc] Recv'd Img size: 114084 bytes
14,092,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,824,719 >>> mbox cmd response: success
14,828,393 UART: [afmc] ++
14,829,107 UART: [afmc] CDI.KEYID = 6
14,830,304 UART: [afmc] SUBJECT.KEYID = 7
14,831,747 UART: [afmc] AUTHORITY.KEYID = 5
17,336,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,129,157 UART: [afmc] --
19,133,255 UART: [cold-reset] --
19,138,208 UART: [state] Locking Datavault
19,143,526 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,691 UART: [state] Locking ICCM
19,147,103 UART: [exit] Launching FMC @ 0x40000130
19,155,790 UART:
19,156,029 UART: Running Caliptra FMC ...
19,157,138 UART:
19,157,299 UART: [state] CFI Enabled
19,165,564 UART: [fht] FMC Alias Private Key: 7
20,922,444 UART: [art] Extend RT PCRs Done
20,923,670 UART: [art] Lock RT PCRs Done
20,925,425 UART: [art] Populate DV Done
20,931,017 UART: [fht] FMC Alias Private Key: 7
20,932,511 UART: [art] Derive CDI
20,933,270 UART: [art] Store in in slot 0x4
20,975,921 UART: [art] Derive Key Pair
20,976,962 UART: [art] Store priv key in slot 0x5
23,403,446 UART: [art] Derive Key Pair - Done
23,416,282 UART: [art] Signing Cert with AUTHO
23,417,591 UART: RITY.KEYID = 7
25,122,533 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,584 UART: [art] PUB.X = 56328662200B1BDC2E5D96ABF574B898A59D1E17B90ED47AD71ADB7619201D8D59ADA8CD482309B945B6A5FF14272A50
25,131,322 UART: [art] PUB.Y = B99151D9DD5CC9FCB99AFEACA983EF199AC013DA74F3DA44DAB6BDE0BF3DC4520FF15A0145ED75AE5546C09879227FC2
25,138,593 UART: [art] SIG.R = 0EFCC9B37732F8BB9DA378796D6B408AC594FF5E9781765EBC6EE4BB847702680B744E20634882B3083F4B4939066912
25,145,959 UART: [art] SIG.S = AE9E7B01A97F6642598A47077ADB7FCD59EDAEA7CB23CBB33AB998EA84C4379265CEC55DF054E1C47A4FCA5D52F9D845
26,124,880 UART: Caliptra RT
26,125,587 UART: [state] CFI Enabled
26,242,585 UART: [rt] RT listening for mailbox commands...
26,245,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,400,450 UART: [rt]cmd =0x41544d4e, len=14344
30,395,906 >>> mbox cmd response data (8 bytes)
30,397,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,427,864 UART: [rt]cmd =0x41545348, len=116
30,447,803 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
3,758,914 ready_for_fw is high
3,759,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,968,678 >>> mbox cmd response: success
19,220,552 UART:
19,221,081 UART: Running Caliptra FMC ...
19,222,201 UART:
19,222,366 UART: [state] CFI Enabled
19,230,148 UART: [fht] FMC Alias Private Key: 7
20,986,824 UART: [art] Extend RT PCRs Done
20,988,053 UART: [art] Lock RT PCRs Done
20,989,799 UART: [art] Populate DV Done
20,995,326 UART: [fht] FMC Alias Private Key: 7
20,996,929 UART: [art] Derive CDI
20,997,750 UART: [art] Store in in slot 0x4
21,040,367 UART: [art] Derive Key Pair
21,041,416 UART: [art] Store priv key in slot 0x5
23,468,332 UART: [art] Derive Key Pair - Done
23,481,109 UART: [art] Signing Cert with AUTHO
23,482,412 UART: RITY.KEYID = 7
25,188,252 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,757 UART: [art] PUB.X = 4393D6ABAFC76280D5F701F00761B84ED0868746159C7F91379E5C3CE4F352CB76A3083BAF2A2E5F71A893FCEC5401D3
25,197,013 UART: [art] PUB.Y = 72E471B57BEDE4478AFD48593A8049A7F074654EE5A6BAE3026D90E06ECACC90E5EDC069D4FB0550EB076F2544FC65A3
25,204,283 UART: [art] SIG.R = 15A70FB8B7BD20080B8C0BCD2F7ED6B51C2613161430E314BA2118F0B87EEA95A57E78F63BE8E64136F26BAE061925A3
25,211,677 UART: [art] SIG.S = 4C56963E045370A7469BF79C7E950909498EE9438446836939EB3B07D0609CF1D0E583EF75EC5CEF5C5D43313DD30874
26,190,710 UART: Caliptra RT
26,191,403 UART: [state] CFI Enabled
26,309,751 UART: [rt] RT listening for mailbox commands...
26,312,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,467,976 UART: [rt]cmd =0x41544d4e, len=14344
30,463,592 >>> mbox cmd response data (8 bytes)
30,464,215 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,495,007 UART: [rt]cmd =0x41545348, len=116
30,514,859 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,692 UART: [kat] HMAC-384Kdf
907,286 UART: [kat] LMS
1,475,482 UART: [kat] --
1,476,343 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,735 ready_for_fw is high
1,480,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,505,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,094 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,665 UART: [ldev] Erasing FE.KEYID = 1
1,546,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,686 UART: [ldev] --
1,585,999 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 114084 bytes
2,882,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,650 >>> mbox cmd response: success
3,076,684 UART: [afmc] ++
3,076,852 UART: [afmc] CDI.KEYID = 6
3,077,214 UART: [afmc] SUBJECT.KEYID = 7
3,077,639 UART: [afmc] AUTHORITY.KEYID = 5
3,112,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,347 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,037 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,054 UART: [afmc] --
3,156,082 UART: [cold-reset] --
3,156,852 UART: [state] Locking Datavault
3,158,091 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,695 UART: [state] Locking ICCM
3,159,365 UART: [exit] Launching FMC @ 0x40000130
3,164,694 UART:
3,164,710 UART: Running Caliptra FMC ...
3,165,118 UART:
3,165,172 UART: [state] CFI Enabled
3,175,415 UART: [fht] FMC Alias Private Key: 7
3,283,620 UART: [art] Extend RT PCRs Done
3,284,048 UART: [art] Lock RT PCRs Done
3,285,662 UART: [art] Populate DV Done
3,294,157 UART: [fht] FMC Alias Private Key: 7
3,295,323 UART: [art] Derive CDI
3,295,603 UART: [art] Store in in slot 0x4
3,380,924 UART: [art] Derive Key Pair
3,381,284 UART: [art] Store priv key in slot 0x5
3,394,626 UART: [art] Derive Key Pair - Done
3,409,222 UART: [art] Signing Cert with AUTHO
3,409,702 UART: RITY.KEYID = 7
3,425,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,993 UART: [art] PUB.X = 0E74B04109DF2FA1951875301B7CC83A06C229525625C13BE6149CA3A8F4E5A9074C348BD2FA81F715698EB5A26BA013
3,432,751 UART: [art] PUB.Y = E0CADB8F7708613D590018EB36343552DCBEBC5A82958166FB4271093582246B3D75C9E13AED4B1CF4B3E75DA710E12A
3,439,679 UART: [art] SIG.R = 2C865F853E39C1C074E58736C64D7ADEA4AB1B6841B23C1557ECA9BD22A5DFCE5C9635F06E70DEB345BD44A2A393F3D8
3,446,465 UART: [art] SIG.S = 2D627B1A8B39F32726B08842E1CDF52AC29D298532D31C1C25C0ABE65B7152FD09DA720750ABABADDCDA471CBBDBA4A3
3,470,416 UART: Caliptra RT
3,470,669 UART: [state] CFI Enabled
3,577,981 UART: [rt] RT listening for mailbox commands...
3,578,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,923 UART: [rt]cmd =0x41544d4e, len=14344
4,011,637 >>> mbox cmd response data (8 bytes)
4,011,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,763 UART: [rt]cmd =0x41545348, len=116
4,064,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 ready_for_fw is high
1,362,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,010 >>> mbox cmd response: success
2,984,684 UART:
2,984,700 UART: Running Caliptra FMC ...
2,985,108 UART:
2,985,162 UART: [state] CFI Enabled
2,995,529 UART: [fht] FMC Alias Private Key: 7
3,103,602 UART: [art] Extend RT PCRs Done
3,104,030 UART: [art] Lock RT PCRs Done
3,105,458 UART: [art] Populate DV Done
3,113,805 UART: [fht] FMC Alias Private Key: 7
3,114,869 UART: [art] Derive CDI
3,115,149 UART: [art] Store in in slot 0x4
3,200,992 UART: [art] Derive Key Pair
3,201,352 UART: [art] Store priv key in slot 0x5
3,214,312 UART: [art] Derive Key Pair - Done
3,228,916 UART: [art] Signing Cert with AUTHO
3,229,396 UART: RITY.KEYID = 7
3,244,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,009 UART: [art] PUB.X = 7592D1058EF178A86DB572327EC786A5F4EC2EA25E21CC14229C8576C462E5E0E31E723C63C91B41A3FE8E633A0883AF
3,251,777 UART: [art] PUB.Y = BE334FD5533F7E5CF5682EBC7203DC351B7166774110499FE28FAFCB6903DF57CB994CC43D74EF965799A5F733A7670B
3,258,724 UART: [art] SIG.R = AB10E775CA72C5C09756B1EE473CC77D0DC7010BE8610E35D4919A87FBCF9D7CE7DAF6A5A93E70F5BB0D6522A5E9A819
3,265,497 UART: [art] SIG.S = 1A4AD247464588613675080ADC317671AE3EE9BCBD218871C0D80AC7166C84ECB11D366F35E684EE5BBD7C83818E9ECF
3,289,223 UART: Caliptra RT
3,289,476 UART: [state] CFI Enabled
3,396,907 UART: [rt] RT listening for mailbox commands...
3,397,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,565 UART: [rt]cmd =0x41544d4e, len=14344
3,830,259 >>> mbox cmd response data (8 bytes)
3,830,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,193 UART: [rt]cmd =0x41545348, len=116
3,882,162 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
903,155 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 ready_for_fw is high
1,481,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,356 UART: [ldev] ++
1,515,524 UART: [ldev] CDI.KEYID = 6
1,515,887 UART: [ldev] SUBJECT.KEYID = 5
1,516,313 UART: [ldev] AUTHORITY.KEYID = 7
1,516,776 UART: [ldev] FE.KEYID = 1
1,521,696 UART: [ldev] Erasing FE.KEYID = 1
1,547,149 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,063 UART: [ldev] --
1,586,418 UART: [fwproc] Waiting for Commands...
1,587,285 UART: [fwproc] Received command 0x46574c44
1,588,076 UART: [fwproc] Received Image of size 114084 bytes
2,883,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,551 >>> mbox cmd response: success
3,076,565 UART: [afmc] ++
3,076,733 UART: [afmc] CDI.KEYID = 6
3,077,095 UART: [afmc] SUBJECT.KEYID = 7
3,077,520 UART: [afmc] AUTHORITY.KEYID = 5
3,113,003 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,861 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,474 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,164 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,105 UART: [afmc] --
3,156,033 UART: [cold-reset] --
3,156,815 UART: [state] Locking Datavault
3,158,250 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,854 UART: [state] Locking ICCM
3,159,412 UART: [exit] Launching FMC @ 0x40000130
3,164,741 UART:
3,164,757 UART: Running Caliptra FMC ...
3,165,165 UART:
3,165,308 UART: [state] CFI Enabled
3,176,189 UART: [fht] FMC Alias Private Key: 7
3,283,758 UART: [art] Extend RT PCRs Done
3,284,186 UART: [art] Lock RT PCRs Done
3,285,388 UART: [art] Populate DV Done
3,293,819 UART: [fht] FMC Alias Private Key: 7
3,294,975 UART: [art] Derive CDI
3,295,255 UART: [art] Store in in slot 0x4
3,380,670 UART: [art] Derive Key Pair
3,381,030 UART: [art] Store priv key in slot 0x5
3,394,802 UART: [art] Derive Key Pair - Done
3,409,608 UART: [art] Signing Cert with AUTHO
3,410,088 UART: RITY.KEYID = 7
3,425,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,179 UART: [art] PUB.X = E9E99C8E17388AAC4E14C480D3C1FA2CD04561F45F3AADEC0183B53B8BC1EA0C72B45ED7ED04B39944A4898441BB7060
3,432,954 UART: [art] PUB.Y = 7F3AA7274F597195E7F69F9F8EF7B444CE4B51D1C25B69903B012026F7E982044C7BBB2B9849BB7D56D8A66E9DA75EA8
3,439,906 UART: [art] SIG.R = 884C469A82433AFD94D873D06D60AFAC05D101E3A32E31F4DA0F54DB0F7EEADF1B33D192B203E79D644F3BF878719FC7
3,446,675 UART: [art] SIG.S = 064443D21B7B6DF1613CD70863FB6549832C65E0CAC57B2FB305216FFD2E257B11B7A610CB5E3078D51F204DC7C9811E
3,470,163 UART: Caliptra RT
3,470,508 UART: [state] CFI Enabled
3,579,163 UART: [rt] RT listening for mailbox commands...
3,579,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,955 UART: [rt]cmd =0x41544d4e, len=14344
4,012,123 >>> mbox cmd response data (8 bytes)
4,012,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,193 UART: [rt]cmd =0x41545348, len=116
4,064,132 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,114 ready_for_fw is high
1,362,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,725 >>> mbox cmd response: success
2,985,707 UART:
2,985,723 UART: Running Caliptra FMC ...
2,986,131 UART:
2,986,274 UART: [state] CFI Enabled
2,996,851 UART: [fht] FMC Alias Private Key: 7
3,104,780 UART: [art] Extend RT PCRs Done
3,105,208 UART: [art] Lock RT PCRs Done
3,106,686 UART: [art] Populate DV Done
3,115,165 UART: [fht] FMC Alias Private Key: 7
3,116,315 UART: [art] Derive CDI
3,116,595 UART: [art] Store in in slot 0x4
3,201,942 UART: [art] Derive Key Pair
3,202,302 UART: [art] Store priv key in slot 0x5
3,215,480 UART: [art] Derive Key Pair - Done
3,230,429 UART: [art] Signing Cert with AUTHO
3,230,909 UART: RITY.KEYID = 7
3,246,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,158 UART: [art] PUB.X = 903B1D87A4BE406B41D13DCA1DA1284E1AAFF527504517F5C7D7464FB4CAD2C9507ACE65D69E92F22FE5F14D9B78ECE0
3,253,946 UART: [art] PUB.Y = DAC2DEB95FB8FBB1F18203B92A7C9F845CE45FD8265DE035C6683F0E7C210EEBF95733BAD3D16E0832997CDBF8BF5008
3,260,901 UART: [art] SIG.R = 8EC7F535A7701BBDD0C3B72098561150B78DC2CE6608365365B4F35B6C0B02F5718D6243BFF2B0605277D9BA47700EB8
3,267,659 UART: [art] SIG.S = DB7DDBCD68817030B530676C6C95F27D6617C60A4A8FDB487DC2EEEBF1B79C22DCACAF505744D2261EA314DDCD70EDE7
3,291,465 UART: Caliptra RT
3,291,810 UART: [state] CFI Enabled
3,401,310 UART: [rt] RT listening for mailbox commands...
3,401,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,078 UART: [rt]cmd =0x41544d4e, len=14344
3,835,140 >>> mbox cmd response data (8 bytes)
3,835,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,250 UART: [rt]cmd =0x41545348, len=116
3,887,279 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,488 UART: [state] LifecycleState = Unprovisioned
85,143 UART: [state] DebugLocked = No
85,703 UART: [state] WD Timer not started. Device not locked for debugging
86,998 UART: [kat] SHA2-256
892,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,773 UART: [kat] ++
896,925 UART: [kat] sha1
901,097 UART: [kat] SHA2-256
903,037 UART: [kat] SHA2-384
905,674 UART: [kat] SHA2-512-ACC
907,575 UART: [kat] ECC-384
917,130 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,934 UART: [kat] --
1,170,739 UART: [cold-reset] ++
1,171,313 UART: [fht] FHT @ 0x50003400
1,174,076 UART: [idev] ++
1,174,244 UART: [idev] CDI.KEYID = 6
1,174,604 UART: [idev] SUBJECT.KEYID = 7
1,175,028 UART: [idev] UDS.KEYID = 0
1,175,373 ready_for_fw is high
1,175,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,197 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,403 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,012 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,263 >>> mbox cmd response: success
2,772,283 UART: [afmc] ++
2,772,451 UART: [afmc] CDI.KEYID = 6
2,772,813 UART: [afmc] SUBJECT.KEYID = 7
2,773,238 UART: [afmc] AUTHORITY.KEYID = 5
2,808,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,062 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,675 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,394 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,158 UART: [afmc] --
2,852,260 UART: [cold-reset] --
2,853,088 UART: [state] Locking Datavault
2,854,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,957 UART: [state] Locking ICCM
2,855,405 UART: [exit] Launching FMC @ 0x40000130
2,860,734 UART:
2,860,750 UART: Running Caliptra FMC ...
2,861,158 UART:
2,861,212 UART: [state] CFI Enabled
2,871,669 UART: [fht] FMC Alias Private Key: 7
2,979,216 UART: [art] Extend RT PCRs Done
2,979,644 UART: [art] Lock RT PCRs Done
2,981,094 UART: [art] Populate DV Done
2,989,151 UART: [fht] FMC Alias Private Key: 7
2,990,287 UART: [art] Derive CDI
2,990,567 UART: [art] Store in in slot 0x4
3,076,178 UART: [art] Derive Key Pair
3,076,538 UART: [art] Store priv key in slot 0x5
3,089,726 UART: [art] Derive Key Pair - Done
3,104,487 UART: [art] Signing Cert with AUTHO
3,104,967 UART: RITY.KEYID = 7
3,120,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,960 UART: [art] PUB.X = C77D55AD1AFF98942DFDCA0F12188E71989CF875A4A2F574A9F3FAF4A6D6FF5D5935322838F242B70A67AA248EEF90B3
3,127,738 UART: [art] PUB.Y = 5BF37489E3E79C354871E7C2D5C06BD6B17077302D65FEECCD0D3ABC20600210085E56FA1D4D24FF700E877885EF39AC
3,134,684 UART: [art] SIG.R = 59C0610F1C0CF7737783B083771BC4C297A3ABB94E09C414FD9BD437D07889E755696560CC8CECA1B483EED7EA12B3F8
3,141,453 UART: [art] SIG.S = CC14FC05534B89C381A3CEE9D5EECFF2E21E2E47EBA815E55F2657B8884D60B80B471D9B3587CC4A25D8B1F1DCB92C73
3,164,836 UART: Caliptra RT
3,165,089 UART: [state] CFI Enabled
3,273,034 UART: [rt] RT listening for mailbox commands...
3,273,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,966 UART: [rt]cmd =0x41544d4e, len=14344
3,706,854 >>> mbox cmd response data (8 bytes)
3,706,855 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,820 UART: [rt]cmd =0x41545348, len=116
3,758,313 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,536 >>> mbox cmd response: success
2,686,376 UART:
2,686,392 UART: Running Caliptra FMC ...
2,686,800 UART:
2,686,854 UART: [state] CFI Enabled
2,697,207 UART: [fht] FMC Alias Private Key: 7
2,805,184 UART: [art] Extend RT PCRs Done
2,805,612 UART: [art] Lock RT PCRs Done
2,807,392 UART: [art] Populate DV Done
2,815,587 UART: [fht] FMC Alias Private Key: 7
2,816,717 UART: [art] Derive CDI
2,816,997 UART: [art] Store in in slot 0x4
2,902,358 UART: [art] Derive Key Pair
2,902,718 UART: [art] Store priv key in slot 0x5
2,915,710 UART: [art] Derive Key Pair - Done
2,930,427 UART: [art] Signing Cert with AUTHO
2,930,907 UART: RITY.KEYID = 7
2,946,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,778 UART: [art] PUB.X = 0CA7EF18B4D4498C60062887F97A21039F150B65566296C9EA4DF20FBEB927704C495E17D8DE1D51F9921C0C968FE319
2,953,530 UART: [art] PUB.Y = 98881D23EA3BF2471FD8B9CEF91F3AD569BFA689182BF3EA03F6AAC4357FCF1D87300EA3B8046FD9A32999147E56C02B
2,960,485 UART: [art] SIG.R = 020334AF0A9353275215E8DF27197E189BB2C6BD172A76BCD50FE2C3408BE5733FC9DDA14977B37F47DAA1D25FD90643
2,967,246 UART: [art] SIG.S = 27CF04DDFE21B0115B702A395142E9D5AAE3FC13CD46F5E80D5390F47EA613F93A08005FB997EDA603D472113EBD8438
2,990,897 UART: Caliptra RT
2,991,150 UART: [state] CFI Enabled
3,098,753 UART: [rt] RT listening for mailbox commands...
3,099,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,467 UART: [rt]cmd =0x41544d4e, len=14344
3,532,009 >>> mbox cmd response data (8 bytes)
3,532,010 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,077 UART: [rt]cmd =0x41545348, len=116
3,583,252 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,475 UART: [kat] SHA2-512-ACC
908,376 UART: [kat] ECC-384
917,973 UART: [kat] HMAC-384Kdf
922,401 UART: [kat] LMS
1,170,729 UART: [kat] --
1,171,836 UART: [cold-reset] ++
1,172,166 UART: [fht] FHT @ 0x50003400
1,174,645 UART: [idev] ++
1,174,813 UART: [idev] CDI.KEYID = 6
1,175,173 UART: [idev] SUBJECT.KEYID = 7
1,175,597 UART: [idev] UDS.KEYID = 0
1,175,942 ready_for_fw is high
1,175,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,409 UART: [idev] Erasing UDS.KEYID = 0
1,200,832 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,286 UART: [ldev] ++
1,210,454 UART: [ldev] CDI.KEYID = 6
1,210,817 UART: [ldev] SUBJECT.KEYID = 5
1,211,243 UART: [ldev] AUTHORITY.KEYID = 7
1,211,706 UART: [ldev] FE.KEYID = 1
1,216,960 UART: [ldev] Erasing FE.KEYID = 1
1,243,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,608 UART: [ldev] --
1,282,975 UART: [fwproc] Wait for Commands...
1,283,681 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,557 >>> mbox cmd response: success
2,771,757 UART: [afmc] ++
2,771,925 UART: [afmc] CDI.KEYID = 6
2,772,287 UART: [afmc] SUBJECT.KEYID = 7
2,772,712 UART: [afmc] AUTHORITY.KEYID = 5
2,808,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,516 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,634 UART: [afmc] --
2,851,588 UART: [cold-reset] --
2,852,434 UART: [state] Locking Datavault
2,853,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,379 UART: [state] Locking ICCM
2,854,999 UART: [exit] Launching FMC @ 0x40000130
2,860,328 UART:
2,860,344 UART: Running Caliptra FMC ...
2,860,752 UART:
2,860,895 UART: [state] CFI Enabled
2,871,412 UART: [fht] FMC Alias Private Key: 7
2,979,119 UART: [art] Extend RT PCRs Done
2,979,547 UART: [art] Lock RT PCRs Done
2,981,475 UART: [art] Populate DV Done
2,989,528 UART: [fht] FMC Alias Private Key: 7
2,990,648 UART: [art] Derive CDI
2,990,928 UART: [art] Store in in slot 0x4
3,076,613 UART: [art] Derive Key Pair
3,076,973 UART: [art] Store priv key in slot 0x5
3,090,091 UART: [art] Derive Key Pair - Done
3,105,211 UART: [art] Signing Cert with AUTHO
3,105,691 UART: RITY.KEYID = 7
3,121,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,888 UART: [art] PUB.X = 926C471AFD80F34FA527E89AD6B829E00E9466B46D4CE596771022F8D3C4020493447DBF695A4A55688D554672550DD0
3,128,640 UART: [art] PUB.Y = 72AB42B57B062D79C14AA1452CF78F1C99E634F7DA38CC2A63B49128F50625B334727BA6895FA3D16A4632B706DC6EB9
3,135,585 UART: [art] SIG.R = D614E9FE4E9F2002C534E012651A88E38F074B2FCFE18FB3146B3BCC27706DD9B417801C29012304E065316715A58C3F
3,142,341 UART: [art] SIG.S = 4E8D40D2EC024A991D90330E134AA4B706F1C45D34837402A585175AD4EE0FB47E25B2DAE16C9A60D2EBFBF8EB9709F1
3,166,382 UART: Caliptra RT
3,166,727 UART: [state] CFI Enabled
3,274,308 UART: [rt] RT listening for mailbox commands...
3,274,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,990 UART: [rt]cmd =0x41544d4e, len=14344
3,708,126 >>> mbox cmd response data (8 bytes)
3,708,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,402 UART: [rt]cmd =0x41545348, len=116
3,759,483 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,764 ready_for_fw is high
1,060,764 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,909 >>> mbox cmd response: success
2,687,393 UART:
2,687,409 UART: Running Caliptra FMC ...
2,687,817 UART:
2,687,960 UART: [state] CFI Enabled
2,698,925 UART: [fht] FMC Alias Private Key: 7
2,807,022 UART: [art] Extend RT PCRs Done
2,807,450 UART: [art] Lock RT PCRs Done
2,809,190 UART: [art] Populate DV Done
2,817,555 UART: [fht] FMC Alias Private Key: 7
2,818,501 UART: [art] Derive CDI
2,818,781 UART: [art] Store in in slot 0x4
2,904,224 UART: [art] Derive Key Pair
2,904,584 UART: [art] Store priv key in slot 0x5
2,918,008 UART: [art] Derive Key Pair - Done
2,932,460 UART: [art] Signing Cert with AUTHO
2,932,940 UART: RITY.KEYID = 7
2,948,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,279 UART: [art] PUB.X = 85AD76447473C0F2AB3C4069F8975E3C135336974DE0A43150E2AAE68B07225E41288DB79750652513DE2D501EAD7087
2,956,038 UART: [art] PUB.Y = B58624EBBFEF016B45BB3B50C2B525EB17D23C94118FB1AD95D13225EE76BEA60A7D08578B563900614EF4E0C42E17B2
2,962,967 UART: [art] SIG.R = 6619D6FBE55099C88C2AADBBC346270F741BB932E710EA2FFE9CE8DD1C28C6C2DBCA0ED75269938E608D92AC822C3CF7
2,969,751 UART: [art] SIG.S = FC85B3A5E2723AF16558442B8C22D904AF07E35729A6E886DC376DF5524FF6EE6D1A60425028563612DEA53E67892070
2,993,792 UART: Caliptra RT
2,994,137 UART: [state] CFI Enabled
3,102,484 UART: [rt] RT listening for mailbox commands...
3,103,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,012 UART: [rt]cmd =0x41544d4e, len=14344
3,535,504 >>> mbox cmd response data (8 bytes)
3,535,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,404 UART: [rt]cmd =0x41545348, len=116
3,587,295 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
891,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,919 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,722 UART: [ldev] Erasing FE.KEYID = 1
1,242,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,050 UART: [ldev] --
1,282,442 UART: [fwproc] Wait for Commands...
1,283,101 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,813 >>> mbox cmd response: success
2,772,080 UART: [afmc] ++
2,772,248 UART: [afmc] CDI.KEYID = 6
2,772,611 UART: [afmc] SUBJECT.KEYID = 7
2,773,037 UART: [afmc] AUTHORITY.KEYID = 5
2,808,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,599 UART: [afmc] --
2,851,689 UART: [cold-reset] --
2,852,339 UART: [state] Locking Datavault
2,853,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,980 UART: [state] Locking ICCM
2,854,472 UART: [exit] Launching FMC @ 0x40000130
2,859,801 UART:
2,859,817 UART: Running Caliptra FMC ...
2,860,225 UART:
2,860,279 UART: [state] CFI Enabled
2,870,930 UART: [fht] FMC Alias Private Key: 7
2,978,727 UART: [art] Extend RT PCRs Done
2,979,155 UART: [art] Lock RT PCRs Done
2,980,821 UART: [art] Populate DV Done
2,988,984 UART: [fht] FMC Alias Private Key: 7
2,990,090 UART: [art] Derive CDI
2,990,370 UART: [art] Store in in slot 0x4
3,075,679 UART: [art] Derive Key Pair
3,076,039 UART: [art] Store priv key in slot 0x5
3,089,425 UART: [art] Derive Key Pair - Done
3,104,532 UART: [art] Signing Cert with AUTHO
3,105,012 UART: RITY.KEYID = 7
3,120,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,021 UART: [art] PUB.X = 0CC3569533337352CD81610988B018D663F891BE0A33055AFE53953D08604166430DFE722D171F1929EFFFC2B08BC386
3,127,765 UART: [art] PUB.Y = 8DC4C831756E7695AE6310AEC8B93E38A1F7CCC0FB826301CA2257AA58CC9D98DD8644D4454C586ED8FBADD05C36FE67
3,134,728 UART: [art] SIG.R = AAFD38ECA676E3348774C3ECBDFB99D99C756FB6C10027F80E2A7948BAADB9948189F77E4C507E2169ACE4F0D68ECFD0
3,141,493 UART: [art] SIG.S = 2AEF1C616B442749415D6AF4251EFF34BB7A4D3D09AAA535485795A2F61D3B2C9ECFCBE9F6802D86D00FDE5E9D041AA2
3,164,889 UART: Caliptra RT
3,165,142 UART: [state] CFI Enabled
3,272,385 UART: [rt] RT listening for mailbox commands...
3,273,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,191 UART: [rt]cmd =0x41544d4e, len=14344
3,706,495 >>> mbox cmd response data (8 bytes)
3,706,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,655 UART: [rt]cmd =0x41545348, len=116
3,758,780 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,148 ready_for_fw is high
1,056,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,787 >>> mbox cmd response: success
2,681,647 UART:
2,681,663 UART: Running Caliptra FMC ...
2,682,071 UART:
2,682,125 UART: [state] CFI Enabled
2,692,866 UART: [fht] FMC Alias Private Key: 7
2,801,523 UART: [art] Extend RT PCRs Done
2,801,951 UART: [art] Lock RT PCRs Done
2,803,673 UART: [art] Populate DV Done
2,811,762 UART: [fht] FMC Alias Private Key: 7
2,812,738 UART: [art] Derive CDI
2,813,018 UART: [art] Store in in slot 0x4
2,898,627 UART: [art] Derive Key Pair
2,898,987 UART: [art] Store priv key in slot 0x5
2,912,733 UART: [art] Derive Key Pair - Done
2,927,544 UART: [art] Signing Cert with AUTHO
2,928,024 UART: RITY.KEYID = 7
2,943,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,957 UART: [art] PUB.X = 8BFFA4A0909EC7AEDFA10699E3B62AD0318AB858888C277C031D659622F04E37B11A654DEE2E76F9075F4A82FD34B07F
2,950,728 UART: [art] PUB.Y = 36D4E71261C51659CF44D97188B5936BB45793B6448CD359C2B9CC4E1B2B9573B924AA77C8C1C2BE8E282F9A4F23EB0B
2,957,681 UART: [art] SIG.R = 93EE56AEDDF5D9BCFC608A219B5CF0F66B0B7F0EB4EC9E1C99385996085EC365D45CBB70430C3DF5D053C6C0BFF9EBAC
2,964,467 UART: [art] SIG.S = CAD0F100B452D4354B399199A99570B0E485E93B224D458E5611360EF9666A787EF41AB8052583DE43BF9E6DD163E0EA
2,987,958 UART: Caliptra RT
2,988,211 UART: [state] CFI Enabled
3,096,537 UART: [rt] RT listening for mailbox commands...
3,097,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,243 UART: [rt]cmd =0x41544d4e, len=14344
3,530,283 >>> mbox cmd response data (8 bytes)
3,530,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,545 UART: [rt]cmd =0x41545348, len=116
3,582,206 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,975 UART: [state] LifecycleState = Unprovisioned
86,630 UART: [state] DebugLocked = No
87,236 UART: [state] WD Timer not started. Device not locked for debugging
88,365 UART: [kat] SHA2-256
891,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,044 UART: [kat] ++
896,196 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,631 UART: [kat] LMS
1,169,943 UART: [kat] --
1,170,892 UART: [cold-reset] ++
1,171,384 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,669 UART: [idev] SUBJECT.KEYID = 7
1,175,094 UART: [idev] UDS.KEYID = 0
1,175,440 ready_for_fw is high
1,175,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,022 UART: [idev] Sha1 KeyId Algorithm
1,208,914 UART: [idev] --
1,209,959 UART: [ldev] ++
1,210,127 UART: [ldev] CDI.KEYID = 6
1,210,491 UART: [ldev] SUBJECT.KEYID = 5
1,210,918 UART: [ldev] AUTHORITY.KEYID = 7
1,211,381 UART: [ldev] FE.KEYID = 1
1,216,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,451 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,646 UART: [fwproc] Recv command 0x46574c44
1,283,379 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,740 >>> mbox cmd response: success
2,771,785 UART: [afmc] ++
2,771,953 UART: [afmc] CDI.KEYID = 6
2,772,316 UART: [afmc] SUBJECT.KEYID = 7
2,772,742 UART: [afmc] AUTHORITY.KEYID = 5
2,808,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,630 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,272 UART: [afmc] --
2,852,346 UART: [cold-reset] --
2,853,014 UART: [state] Locking Datavault
2,854,275 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,879 UART: [state] Locking ICCM
2,855,511 UART: [exit] Launching FMC @ 0x40000130
2,860,840 UART:
2,860,856 UART: Running Caliptra FMC ...
2,861,264 UART:
2,861,407 UART: [state] CFI Enabled
2,872,208 UART: [fht] FMC Alias Private Key: 7
2,980,783 UART: [art] Extend RT PCRs Done
2,981,211 UART: [art] Lock RT PCRs Done
2,982,933 UART: [art] Populate DV Done
2,991,300 UART: [fht] FMC Alias Private Key: 7
2,992,356 UART: [art] Derive CDI
2,992,636 UART: [art] Store in in slot 0x4
3,078,257 UART: [art] Derive Key Pair
3,078,617 UART: [art] Store priv key in slot 0x5
3,092,559 UART: [art] Derive Key Pair - Done
3,107,259 UART: [art] Signing Cert with AUTHO
3,107,739 UART: RITY.KEYID = 7
3,122,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,650 UART: [art] PUB.X = F65A50B9A87E9307B8762B40EAF5F43116C3D1C7F221147E7826607B5D670010DF0F98762ED688E6FDE80D8F41AB1451
3,130,389 UART: [art] PUB.Y = F3CF8F59F2000D6F0D312B32CF12DDEC7B33E0133A0333E1305DE59971A3E01AEC4AF6CD63D734DF029D4DF6A6C8112C
3,137,321 UART: [art] SIG.R = CD472D35A62FE5945E9D553510EEAE58F955EAC0E2783FDBF1823EFB9878B31F278CC0199D01009FD9A2E7F7CF589F1E
3,144,080 UART: [art] SIG.S = 0638AAA585DC5C4E474C4D5D973562827B745A3F02BCE8C14DB918056304943AE9740A4CCDC277813AE1DC8DD9DF9D79
3,167,998 UART: Caliptra RT
3,168,343 UART: [state] CFI Enabled
3,277,252 UART: [rt] RT listening for mailbox commands...
3,277,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,112 UART: [rt]cmd =0x41544d4e, len=14344
3,710,712 >>> mbox cmd response data (8 bytes)
3,710,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,772 UART: [rt]cmd =0x41545348, len=116
3,762,763 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,755 ready_for_fw is high
1,055,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,896 >>> mbox cmd response: success
2,680,442 UART:
2,680,458 UART: Running Caliptra FMC ...
2,680,866 UART:
2,681,009 UART: [state] CFI Enabled
2,691,806 UART: [fht] FMC Alias Private Key: 7
2,800,163 UART: [art] Extend RT PCRs Done
2,800,591 UART: [art] Lock RT PCRs Done
2,802,265 UART: [art] Populate DV Done
2,810,452 UART: [fht] FMC Alias Private Key: 7
2,811,550 UART: [art] Derive CDI
2,811,830 UART: [art] Store in in slot 0x4
2,897,361 UART: [art] Derive Key Pair
2,897,721 UART: [art] Store priv key in slot 0x5
2,911,279 UART: [art] Derive Key Pair - Done
2,925,833 UART: [art] Signing Cert with AUTHO
2,926,313 UART: RITY.KEYID = 7
2,941,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,096 UART: [art] PUB.X = 712610463E7B45597CD5FC824C8C8FC88A57E745B385DF1958D0A277DB9FFC444F97D496C13AA22404D8E1783D287819
2,948,861 UART: [art] PUB.Y = 00943F99D1ECB89C12721E9D9B58E6862AF53C25E342F3077BD3AED84899EF2F2DC3BA6C36148407EA42A4FB6623A04B
2,955,791 UART: [art] SIG.R = 15E9ACB0D83FA492DEBAE2CAA21EB1ACAA9EB63782C7D8D6BD912C8B4CCC5941B5699DDBADD08F6252B773542A39F14B
2,962,589 UART: [art] SIG.S = 056EA382F8C88A5286EC679DB5788B67F314A37CD3EC84365D16E2D77FE3A74938C3150E1EC635067E9B2F2BB9FDB8C5
2,986,235 UART: Caliptra RT
2,986,580 UART: [state] CFI Enabled
3,095,025 UART: [rt] RT listening for mailbox commands...
3,095,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,863 UART: [rt]cmd =0x41544d4e, len=14344
3,528,359 >>> mbox cmd response data (8 bytes)
3,528,360 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,465 UART: [rt]cmd =0x41545348, len=116
3,579,994 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,067 UART:
192,439 UART: Running Caliptra ROM ...
193,573 UART:
193,725 UART: [state] CFI Enabled
264,398 UART: [state] LifecycleState = Unprovisioned
266,236 UART: [state] DebugLocked = No
268,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,430 UART: [kat] SHA2-256
442,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,604 UART: [kat] ++
453,055 UART: [kat] sha1
464,103 UART: [kat] SHA2-256
466,767 UART: [kat] SHA2-384
472,902 UART: [kat] SHA2-512-ACC
475,267 UART: [kat] ECC-384
2,767,492 UART: [kat] HMAC-384Kdf
2,800,700 UART: [kat] LMS
3,990,950 UART: [kat] --
3,993,474 UART: [cold-reset] ++
3,995,269 UART: [fht] Storing FHT @ 0x50003400
4,006,818 UART: [idev] ++
4,007,386 UART: [idev] CDI.KEYID = 6
4,008,271 UART: [idev] SUBJECT.KEYID = 7
4,009,516 UART: [idev] UDS.KEYID = 0
4,010,501 ready_for_fw is high
4,010,691 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,050,948 UART: [idev] Erasing UDS.KEYID = 0
7,347,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,802 UART: [idev] --
7,372,560 UART: [ldev] ++
7,373,131 UART: [ldev] CDI.KEYID = 6
7,374,070 UART: [ldev] SUBJECT.KEYID = 5
7,375,223 UART: [ldev] AUTHORITY.KEYID = 7
7,376,555 UART: [ldev] FE.KEYID = 1
7,422,022 UART: [ldev] Erasing FE.KEYID = 1
10,753,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,100 UART: [ldev] --
13,113,041 UART: [fwproc] Waiting for Commands...
13,114,930 UART: [fwproc] Received command 0x46574c44
13,117,113 UART: [fwproc] Received Image of size 31676 bytes
16,155,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,230,081 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,298,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,327,050 >>> mbox cmd response: success
16,330,775 UART: [afmc] ++
16,331,388 UART: [afmc] CDI.KEYID = 6
16,332,323 UART: [afmc] SUBJECT.KEYID = 7
16,333,566 UART: [afmc] AUTHORITY.KEYID = 5
19,692,511 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,996,562 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,998,804 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,013,198 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,028,019 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,042,512 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,063,590 UART: [afmc] --
22,068,270 UART: [cold-reset] --
22,070,544 UART: [state] Locking Datavault
22,075,989 UART: [state] Locking PCR0, PCR1 and PCR31
22,077,735 UART: [state] Locking ICCM
22,078,747 UART: [exit] Launching FMC @ 0x40000130
22,087,132 UART:
22,087,395 UART: Running Caliptra FMC ...
22,088,543 UART:
22,088,705 UART: [state] CFI Enabled
22,154,907 UART: [fht] FMC Alias Private Key: 7
24,493,099 UART: [art] Extend RT PCRs Done
24,494,366 UART: [art] Lock RT PCRs Done
24,496,211 UART: [art] Populate DV Done
24,501,727 UART: [fht] FMC Alias Private Key: 7
24,503,242 UART: [art] Derive CDI
24,504,090 UART: [art] Store in in slot 0x4
24,563,416 UART: [art] Derive Key Pair
24,564,462 UART: [art] Store priv key in slot 0x5
27,857,899 UART: [art] Derive Key Pair - Done
27,870,911 UART: [art] Signing Cert with AUTHO
27,872,277 UART: RITY.KEYID = 7
30,159,589 UART: [art] Erasing AUTHORITY.KEYID = 7
30,161,145 UART: [art] PUB.X = BFC54D67975C5A2B9484EB0507F2532CE834044B72C201763AE14A54C737550F67FCD4680917FEF7A5E6ACCF18B1DEA5
30,168,376 UART: [art] PUB.Y = 14FCC06C93140334A5B22DDCAC4F2F9FD4F232C4E498D55500E088A0114CFBAD9071F8684FEE2812676A56CE910826F3
30,175,601 UART: [art] SIG.R = 318CB73CFBB36C7ADD39F3FAA1BF2F89E04F6E1B57BE07D4A3A65B41A783F0F1047BE546DFFEE6242C709E7EB1119B41
30,183,031 UART: [art] SIG.S = 7A568434ADADB8D0D35F3A4173BC50D6FFAF014C25271FDAF65A21BBE4A4BEA2DF7BEDBB650BC00DDB44261461FD954A
31,488,102 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,782,569 ready_for_fw is high
3,783,161 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,155,178 >>> mbox cmd response: success
21,841,283 UART:
21,841,668 UART: Running Caliptra FMC ...
21,842,874 UART:
21,843,039 UART: [state] CFI Enabled
21,909,342 UART: [fht] FMC Alias Private Key: 7
24,246,663 UART: [art] Extend RT PCRs Done
24,247,936 UART: [art] Lock RT PCRs Done
24,249,175 UART: [art] Populate DV Done
24,254,708 UART: [fht] FMC Alias Private Key: 7
24,256,177 UART: [art] Derive CDI
24,256,979 UART: [art] Store in in slot 0x4
24,317,572 UART: [art] Derive Key Pair
24,318,663 UART: [art] Store priv key in slot 0x5
27,611,159 UART: [art] Derive Key Pair - Done
27,624,365 UART: [art] Signing Cert with AUTHO
27,625,718 UART: RITY.KEYID = 7
29,912,904 UART: [art] Erasing AUTHORITY.KEYID = 7
29,914,475 UART: [art] PUB.X = C85577DC4620B35F6692A8C12223160E5031536B6B7A35B9FCD38A6F26DAF4D4C82D4425689F1FBCA226B55DF96DC122
29,921,716 UART: [art] PUB.Y = 86832BCE4462D4FCCA268953605E1C9F5F70D1A66C71CE747E6630F1F6E67085BE0FB9E70470861794F2DC4D7CC7421D
29,928,956 UART: [art] SIG.R = 4B81A349E843CC9F441EB43CDEB8F80708ABEF917008D366E2CA87D12224CDD11111EC87AB764E3C28B32F62A9201779
29,936,278 UART: [art] SIG.S = AA814A05DCB7DA5FF8FBEE3A00B9B8EE0C25C4908CBA06032CBC43574703B7C1F58A8A1FFEE2B8F337E44EEDEC423963
31,241,341 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,893 UART:
193,257 UART: Running Caliptra ROM ...
194,442 UART:
604,142 UART: [state] CFI Enabled
616,688 UART: [state] LifecycleState = Unprovisioned
618,624 UART: [state] DebugLocked = No
620,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,719 UART: [kat] SHA2-256
795,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,029 UART: [kat] ++
806,561 UART: [kat] sha1
817,009 UART: [kat] SHA2-256
819,740 UART: [kat] SHA2-384
825,476 UART: [kat] SHA2-512-ACC
827,858 UART: [kat] ECC-384
3,111,559 UART: [kat] HMAC-384Kdf
3,122,600 UART: [kat] LMS
4,312,738 UART: [kat] --
4,316,522 UART: [cold-reset] ++
4,319,161 UART: [fht] Storing FHT @ 0x50003400
4,330,563 UART: [idev] ++
4,331,121 UART: [idev] CDI.KEYID = 6
4,332,105 UART: [idev] SUBJECT.KEYID = 7
4,333,347 UART: [idev] UDS.KEYID = 0
4,334,315 ready_for_fw is high
4,334,511 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,374,631 UART: [idev] Erasing UDS.KEYID = 0
7,629,297 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,958 UART: [idev] --
7,654,929 UART: [ldev] ++
7,655,554 UART: [ldev] CDI.KEYID = 6
7,656,452 UART: [ldev] SUBJECT.KEYID = 5
7,657,723 UART: [ldev] AUTHORITY.KEYID = 7
7,658,952 UART: [ldev] FE.KEYID = 1
7,668,849 UART: [ldev] Erasing FE.KEYID = 1
10,958,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,772 UART: [ldev] --
13,318,823 UART: [fwproc] Waiting for Commands...
13,320,911 UART: [fwproc] Received command 0x46574c44
13,323,141 UART: [fwproc] Received Image of size 31676 bytes
16,374,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,451,143 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,520,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,548,678 >>> mbox cmd response: success
16,552,701 UART: [afmc] ++
16,553,319 UART: [afmc] CDI.KEYID = 6
16,554,302 UART: [afmc] SUBJECT.KEYID = 7
16,555,450 UART: [afmc] AUTHORITY.KEYID = 5
19,872,449 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,169,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,171,765 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,186,198 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,200,965 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,215,435 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,235,926 UART: [afmc] --
22,239,499 UART: [cold-reset] --
22,242,411 UART: [state] Locking Datavault
22,247,927 UART: [state] Locking PCR0, PCR1 and PCR31
22,249,673 UART: [state] Locking ICCM
22,251,399 UART: [exit] Launching FMC @ 0x40000130
22,259,850 UART:
22,260,088 UART: Running Caliptra FMC ...
22,261,439 UART:
22,261,612 UART: [state] CFI Enabled
22,269,368 UART: [fht] FMC Alias Private Key: 7
24,599,608 UART: [art] Extend RT PCRs Done
24,600,873 UART: [art] Lock RT PCRs Done
24,602,426 UART: [art] Populate DV Done
24,607,537 UART: [fht] FMC Alias Private Key: 7
24,609,118 UART: [art] Derive CDI
24,609,962 UART: [art] Store in in slot 0x4
24,652,175 UART: [art] Derive Key Pair
24,653,204 UART: [art] Store priv key in slot 0x5
27,895,327 UART: [art] Derive Key Pair - Done
27,908,387 UART: [art] Signing Cert with AUTHO
27,909,746 UART: RITY.KEYID = 7
30,189,037 UART: [art] Erasing AUTHORITY.KEYID = 7
30,190,601 UART: [art] PUB.X = F7A0A3C83E968E1F0D4EBAD6D6B89E2E7586CB1E4BA387444B44CC764EA3928181E066978D490F56D37361E218FA8458
30,197,817 UART: [art] PUB.Y = 51C3F8D4C037936B8D42568D3FA3D6E6627E8C14073FA502D7410A5B33FC208B40C2F6871C824348A5CD283F63762606
30,205,037 UART: [art] SIG.R = 5665FB7ED7E33D974331CED3FC67E265A8268D39D240038D3502F6EA883FDE4BFB46D561CEDE29D4B2400388157D07BB
30,212,449 UART: [art] SIG.S = 885EE4B6830C7CCB50026D616C4C7906522CC7A3805CD78114504CCD6158BF42EE9982243D6FF84FDA03B3E588218848
31,516,896 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
4,130,156 ready_for_fw is high
4,130,559 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,410,167 >>> mbox cmd response: success
22,053,543 UART:
22,053,945 UART: Running Caliptra FMC ...
22,055,096 UART:
22,055,264 UART: [state] CFI Enabled
22,063,191 UART: [fht] FMC Alias Private Key: 7
24,394,353 UART: [art] Extend RT PCRs Done
24,395,628 UART: [art] Lock RT PCRs Done
24,397,409 UART: [art] Populate DV Done
24,403,012 UART: [fht] FMC Alias Private Key: 7
24,404,613 UART: [art] Derive CDI
24,405,473 UART: [art] Store in in slot 0x4
24,448,367 UART: [art] Derive Key Pair
24,449,463 UART: [art] Store priv key in slot 0x5
27,691,096 UART: [art] Derive Key Pair - Done
27,704,123 UART: [art] Signing Cert with AUTHO
27,705,467 UART: RITY.KEYID = 7
29,984,706 UART: [art] Erasing AUTHORITY.KEYID = 7
29,986,273 UART: [art] PUB.X = 3AFF028C675CF851366ABFC51987308AB224D1B40E4927BE7E4D462FE0D0F3A3E263E9695903D3E78B0DB1DF0889B893
29,993,502 UART: [art] PUB.Y = ED829C00887CBFFA1F91A5EC6C101FCA5E2821B1C6B3B0204C756EE36ADDF8A79664D5FB1B6376800B6A648C56378566
30,000,732 UART: [art] SIG.R = 060FDDC7C4E0853A4409848C658D89FC53438662F5A9ECCA914073811B13713EF4913BF97002F2D0C139A40AF6259068
30,008,175 UART: [art] SIG.S = 8642DC188389948074702D0E64274F99EE7F1A590A48446C4112DBB9E1E6C03D3A72AF2A6510A3BDC0B2277DFE3E11FC
31,312,647 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,471 UART:
192,851 UART: Running Caliptra ROM ...
193,944 UART:
194,088 UART: [state] CFI Enabled
266,425 UART: [state] LifecycleState = Unprovisioned
268,328 UART: [state] DebugLocked = No
269,562 UART: [state] WD Timer not started. Device not locked for debugging
272,882 UART: [kat] SHA2-256
451,993 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,566 UART: [kat] ++
464,111 UART: [kat] sha1
475,274 UART: [kat] SHA2-256
478,283 UART: [kat] SHA2-384
484,407 UART: [kat] SHA2-512-ACC
487,334 UART: [kat] ECC-384
2,949,426 UART: [kat] HMAC-384Kdf
2,973,611 UART: [kat] LMS
3,503,066 UART: [kat] --
3,507,201 UART: [cold-reset] ++
3,509,058 UART: [fht] FHT @ 0x50003400
3,521,098 UART: [idev] ++
3,521,665 UART: [idev] CDI.KEYID = 6
3,522,587 UART: [idev] SUBJECT.KEYID = 7
3,523,757 UART: [idev] UDS.KEYID = 0
3,524,676 ready_for_fw is high
3,524,863 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,565,114 UART: [idev] Erasing UDS.KEYID = 0
6,030,905 UART: [idev] Sha1 KeyId Algorithm
6,053,789 UART: [idev] --
6,057,014 UART: [ldev] ++
6,057,594 UART: [ldev] CDI.KEYID = 6
6,058,486 UART: [ldev] SUBJECT.KEYID = 5
6,059,651 UART: [ldev] AUTHORITY.KEYID = 7
6,060,939 UART: [ldev] FE.KEYID = 1
6,102,881 UART: [ldev] Erasing FE.KEYID = 1
8,607,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,071 UART: [ldev] --
10,417,387 UART: [fwproc] Wait for Commands...
10,420,473 UART: [fwproc] Recv command 0x46574c44
10,422,560 UART: [fwproc] Recv'd Img size: 31656 bytes
12,819,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,884,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,953,535 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,981,926 >>> mbox cmd response: success
12,986,495 UART: [afmc] ++
12,987,121 UART: [afmc] CDI.KEYID = 6
12,988,102 UART: [afmc] SUBJECT.KEYID = 7
12,989,245 UART: [afmc] AUTHORITY.KEYID = 5
15,531,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,272,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,274,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,290,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,306,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,322,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,344,894 UART: [afmc] --
17,348,675 UART: [cold-reset] --
17,352,393 UART: [state] Locking Datavault
17,357,593 UART: [state] Locking PCR0, PCR1 and PCR31
17,359,274 UART: [state] Locking ICCM
17,360,987 UART: [exit] Launching FMC @ 0x40000130
17,369,361 UART:
17,369,606 UART: Running Caliptra FMC ...
17,370,743 UART:
17,370,906 UART: [state] CFI Enabled
17,432,022 UART: [fht] FMC Alias Private Key: 7
19,196,018 UART: [art] Extend RT PCRs Done
19,197,279 UART: [art] Lock RT PCRs Done
19,198,812 UART: [art] Populate DV Done
19,203,985 UART: [fht] FMC Alias Private Key: 7
19,205,642 UART: [art] Derive CDI
19,206,427 UART: [art] Store in in slot 0x4
19,264,790 UART: [art] Derive Key Pair
19,265,857 UART: [art] Store priv key in slot 0x5
21,728,911 UART: [art] Derive Key Pair - Done
21,741,561 UART: [art] Signing Cert with AUTHO
21,742,902 UART: RITY.KEYID = 7
23,454,762 UART: [art] Erasing AUTHORITY.KEYID = 7
23,456,317 UART: [art] PUB.X = 3D56D0076B134C9E7EEB04B4C5D9B5B8A86989EB1FED2FA1009DC4215A342DF6F8286F5CCF9EBA5674680706AB3803FC
23,463,541 UART: [art] PUB.Y = 166F60C621EBDAFDD1E5EDAEB7626B4F4858EAB51B0DF8B8BC0B84303862D2E3C6858015FB2377168398644592926F34
23,470,853 UART: [art] SIG.R = 76A4806475D01FF66360190FB240C5454A95F4BD18F55AD1D907BE6AC46FDA138745ACFAFAA4FB0478CAF88A36CFCA25
23,478,284 UART: [art] SIG.S = 9C076FE7AE8BA82B8C96B77223ADB8A577ABC5933641C6BD89C0B2DA23E168DF6BDA9268E4951EC592DD9BA18C1E829D
24,456,892 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
3,383,399 ready_for_fw is high
3,383,796 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,771,031 >>> mbox cmd response: success
17,058,429 UART:
17,058,831 UART: Running Caliptra FMC ...
17,059,946 UART:
17,060,103 UART: [state] CFI Enabled
17,130,463 UART: [fht] FMC Alias Private Key: 7
18,894,236 UART: [art] Extend RT PCRs Done
18,895,501 UART: [art] Lock RT PCRs Done
18,896,935 UART: [art] Populate DV Done
18,902,466 UART: [fht] FMC Alias Private Key: 7
18,904,059 UART: [art] Derive CDI
18,904,933 UART: [art] Store in in slot 0x4
18,963,341 UART: [art] Derive Key Pair
18,964,439 UART: [art] Store priv key in slot 0x5
21,427,337 UART: [art] Derive Key Pair - Done
21,440,451 UART: [art] Signing Cert with AUTHO
21,441,819 UART: RITY.KEYID = 7
23,153,680 UART: [art] Erasing AUTHORITY.KEYID = 7
23,155,231 UART: [art] PUB.X = 67EFF994D2788D0B8076AB9D8BAC38BBF2710DCE64853E73BBE7167FEADE9A1EDD1B6C5463E6377842DC3AD1CC26A153
23,162,458 UART: [art] PUB.Y = 28C2DBF41A925F89F0A6745AFD31AB04FD85E2743A8F34F9351408310627AE8180FFCCB8B426FD7793F9CB817E0F57C9
23,169,771 UART: [art] SIG.R = 471E494B285F66B61F40176DBB11401F948BDAE0563CB6953116AC191DD94B0892C2EAA3E463160CECAB622BFE47BE43
23,177,173 UART: [art] SIG.S = 05A86916538B4DA5946179A6C51DD985D4F16899A88AE769F0D8D954D6EDAE02C0DB8CCCDEC81CBDEBA5E68BF9B0C8B3
24,155,881 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,999 writing to cptra_bootfsm_go
193,131 UART:
193,494 UART: Running Caliptra ROM ...
194,595 UART:
604,185 UART: [state] CFI Enabled
617,578 UART: [state] LifecycleState = Unprovisioned
619,480 UART: [state] DebugLocked = No
621,929 UART: [state] WD Timer not started. Device not locked for debugging
625,636 UART: [kat] SHA2-256
804,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,359 UART: [kat] ++
816,809 UART: [kat] sha1
828,674 UART: [kat] SHA2-256
831,755 UART: [kat] SHA2-384
837,608 UART: [kat] SHA2-512-ACC
840,546 UART: [kat] ECC-384
3,280,685 UART: [kat] HMAC-384Kdf
3,294,561 UART: [kat] LMS
3,824,099 UART: [kat] --
3,828,311 UART: [cold-reset] ++
3,830,252 UART: [fht] FHT @ 0x50003400
3,841,802 UART: [idev] ++
3,842,370 UART: [idev] CDI.KEYID = 6
3,843,287 UART: [idev] SUBJECT.KEYID = 7
3,844,478 UART: [idev] UDS.KEYID = 0
3,845,461 ready_for_fw is high
3,845,665 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,885,558 UART: [idev] Erasing UDS.KEYID = 0
6,317,844 UART: [idev] Sha1 KeyId Algorithm
6,340,241 UART: [idev] --
6,344,999 UART: [ldev] ++
6,345,593 UART: [ldev] CDI.KEYID = 6
6,346,483 UART: [ldev] SUBJECT.KEYID = 5
6,347,705 UART: [ldev] AUTHORITY.KEYID = 7
6,348,943 UART: [ldev] FE.KEYID = 1
6,360,192 UART: [ldev] Erasing FE.KEYID = 1
8,835,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,778 UART: [ldev] --
10,627,682 UART: [fwproc] Wait for Commands...
10,630,264 UART: [fwproc] Recv command 0x46574c44
10,632,304 UART: [fwproc] Recv'd Img size: 31656 bytes
13,027,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,100,805 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,169,613 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,197,452 >>> mbox cmd response: success
13,202,247 UART: [afmc] ++
13,202,877 UART: [afmc] CDI.KEYID = 6
13,203,829 UART: [afmc] SUBJECT.KEYID = 7
13,204,979 UART: [afmc] AUTHORITY.KEYID = 5
15,705,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,425,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,427,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,443,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,459,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,475,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,498,541 UART: [afmc] --
17,501,621 UART: [cold-reset] --
17,505,434 UART: [state] Locking Datavault
17,509,135 UART: [state] Locking PCR0, PCR1 and PCR31
17,510,824 UART: [state] Locking ICCM
17,513,524 UART: [exit] Launching FMC @ 0x40000130
17,521,926 UART:
17,522,189 UART: Running Caliptra FMC ...
17,523,335 UART:
17,523,502 UART: [state] CFI Enabled
17,531,573 UART: [fht] FMC Alias Private Key: 7
19,288,318 UART: [art] Extend RT PCRs Done
19,289,579 UART: [art] Lock RT PCRs Done
19,291,134 UART: [art] Populate DV Done
19,296,472 UART: [fht] FMC Alias Private Key: 7
19,298,068 UART: [art] Derive CDI
19,298,842 UART: [art] Store in in slot 0x4
19,341,642 UART: [art] Derive Key Pair
19,342,734 UART: [art] Store priv key in slot 0x5
21,769,388 UART: [art] Derive Key Pair - Done
21,782,664 UART: [art] Signing Cert with AUTHO
21,784,012 UART: RITY.KEYID = 7
23,489,502 UART: [art] Erasing AUTHORITY.KEYID = 7
23,491,077 UART: [art] PUB.X = 3E41EF9F3855FDABBD6456224CB147AC1F208D17F0A5F19730086CCDF7C22DC93978B059CD2ED85C2BFAD87F9743B307
23,498,383 UART: [art] PUB.Y = A90FB2A7B2CAC34ABB1C471A4C3560DFBB1AA083F5B3F98DF92F01D0A4635BB047FB46AAE8CE6F2DAA301C62DC2860B8
23,505,645 UART: [art] SIG.R = A0FECF0039C36D545BF08BFF2DF629E71869E20A1D30DE4244BB155589AC62A7C4B02A44C3E7E06C9BFA201E6383957D
23,513,060 UART: [art] SIG.S = 71432FB2264023144A6E4D5372EF5BD8607C8F0AB65BC8C16B97E96902B4CAF0CF8537A4ABF6F19989678B29554264A7
24,491,023 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,698,723 ready_for_fw is high
3,699,355 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,960,776 >>> mbox cmd response: success
17,216,733 UART:
17,217,123 UART: Running Caliptra FMC ...
17,218,227 UART:
17,218,380 UART: [state] CFI Enabled
17,226,133 UART: [fht] FMC Alias Private Key: 7
18,983,359 UART: [art] Extend RT PCRs Done
18,984,654 UART: [art] Lock RT PCRs Done
18,986,207 UART: [art] Populate DV Done
18,991,606 UART: [fht] FMC Alias Private Key: 7
18,993,214 UART: [art] Derive CDI
18,993,990 UART: [art] Store in in slot 0x4
19,036,520 UART: [art] Derive Key Pair
19,037,620 UART: [art] Store priv key in slot 0x5
21,464,567 UART: [art] Derive Key Pair - Done
21,477,285 UART: [art] Signing Cert with AUTHO
21,478,624 UART: RITY.KEYID = 7
23,184,184 UART: [art] Erasing AUTHORITY.KEYID = 7
23,185,760 UART: [art] PUB.X = F76AC785F618D4B215D9E6EFCB7F64B980003488F82DF055F2CA2B9701FB988ABC08D3D99FDE376C518F52C6E6AC2288
23,192,990 UART: [art] PUB.Y = 1CDF11C8594FA43CEFD4704B820DE2E1EE9306F9D870ECF79A3805D97553C1C62BDA59351D3E0034E9FEC2000B7BFD5E
23,200,220 UART: [art] SIG.R = 77D2EF4471C3F65DB2CD07EC96E10309D3303C658CAE2C7A728F8F6E435B9AD1BAD1BD3F208863479F7344E1330A3FCC
23,207,638 UART: [art] SIG.S = 1D95D03EDBF8873701E158019B89C19772DF1EDBB98C20DC3F6E4C16CE83A04AD3CE5C100BFB187CEA8A0D4826F3CD41
24,186,192 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,551 UART:
192,913 UART: Running Caliptra ROM ...
194,103 UART:
194,254 UART: [state] CFI Enabled
262,234 UART: [state] LifecycleState = Unprovisioned
264,583 UART: [state] DebugLocked = No
265,971 UART: [state] WD Timer not started. Device not locked for debugging
270,156 UART: [kat] SHA2-256
460,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,868 UART: [kat] ++
471,336 UART: [kat] sha1
482,208 UART: [kat] SHA2-256
485,226 UART: [kat] SHA2-384
491,071 UART: [kat] SHA2-512-ACC
493,675 UART: [kat] ECC-384
2,946,125 UART: [kat] HMAC-384Kdf
2,971,512 UART: [kat] LMS
3,503,313 UART: [kat] --
3,507,622 UART: [cold-reset] ++
3,510,049 UART: [fht] FHT @ 0x50003400
3,520,391 UART: [idev] ++
3,521,035 UART: [idev] CDI.KEYID = 6
3,522,069 UART: [idev] SUBJECT.KEYID = 7
3,523,240 UART: [idev] UDS.KEYID = 0
3,524,167 ready_for_fw is high
3,524,359 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,564,438 UART: [idev] Erasing UDS.KEYID = 0
6,029,686 UART: [idev] Sha1 KeyId Algorithm
6,052,250 UART: [idev] --
6,056,554 UART: [ldev] ++
6,057,259 UART: [ldev] CDI.KEYID = 6
6,058,197 UART: [ldev] SUBJECT.KEYID = 5
6,059,358 UART: [ldev] AUTHORITY.KEYID = 7
6,060,589 UART: [ldev] FE.KEYID = 1
6,100,075 UART: [ldev] Erasing FE.KEYID = 1
8,604,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,880 UART: [ldev] --
10,412,784 UART: [fwproc] Wait for Commands...
10,414,552 UART: [fwproc] Recv command 0x46574c44
10,416,855 UART: [fwproc] Recv'd Img size: 31656 bytes
12,844,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,917,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,033,239 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,078,756 >>> mbox cmd response: success
13,083,383 UART: [afmc] ++
13,084,004 UART: [afmc] CDI.KEYID = 6
13,085,250 UART: [afmc] SUBJECT.KEYID = 7
13,086,874 UART: [afmc] AUTHORITY.KEYID = 5
15,614,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,358,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,359,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,375,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,390,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,405,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,429,416 UART: [afmc] --
17,432,733 UART: [cold-reset] --
17,435,806 UART: [state] Locking Datavault
17,440,480 UART: [state] Locking PCR0, PCR1 and PCR31
17,442,691 UART: [state] Locking ICCM
17,444,642 UART: [exit] Launching FMC @ 0x40000130
17,453,315 UART:
17,453,553 UART: Running Caliptra FMC ...
17,454,697 UART:
17,454,854 UART: [state] CFI Enabled
17,515,670 UART: [fht] FMC Alias Private Key: 7
19,279,219 UART: [art] Extend RT PCRs Done
19,280,496 UART: [art] Lock RT PCRs Done
19,282,265 UART: [art] Populate DV Done
19,287,512 UART: [fht] FMC Alias Private Key: 7
19,289,179 UART: [art] Derive CDI
19,289,955 UART: [art] Store in in slot 0x4
19,348,360 UART: [art] Derive Key Pair
19,349,459 UART: [art] Store priv key in slot 0x5
21,812,058 UART: [art] Derive Key Pair - Done
21,825,015 UART: [art] Signing Cert with AUTHO
21,826,358 UART: RITY.KEYID = 7
23,538,503 UART: [art] Erasing AUTHORITY.KEYID = 7
23,540,077 UART: [art] PUB.X = D557DB7D0EC50202A4B520E051EB3066147C8704D7C287F3077CE4C31179EEF3502FA4C65894DB3EA29D2571CA0B8C53
23,547,304 UART: [art] PUB.Y = 41E90B67C5EC2F4CDC03318FBA248E126BE55D97D9C9D63EBA16BB1AE8E2F7E0DE8EBB38407BE3A4869035B07665F990
23,554,647 UART: [art] SIG.R = 2D336E338F6D37AB9ADC57C17DACA3236D37561C508ACC7804EF561584039374535DDD36D8E7BF1FF36D6B58A715608C
23,561,965 UART: [art] SIG.S = E3064ED8AD95E45C865A3DA9349BFFE37E2C30C32D05B5A54E8558EB080E4BEA0136A4E7D6495893758E12AECFD363F6
24,540,270 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,440,200 ready_for_fw is high
3,440,600 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,964,696 >>> mbox cmd response: success
17,250,615 UART:
17,251,359 UART: Running Caliptra FMC ...
17,252,485 UART:
17,252,639 UART: [state] CFI Enabled
17,315,794 UART: [fht] FMC Alias Private Key: 7
19,079,452 UART: [art] Extend RT PCRs Done
19,080,732 UART: [art] Lock RT PCRs Done
19,082,184 UART: [art] Populate DV Done
19,087,662 UART: [fht] FMC Alias Private Key: 7
19,089,261 UART: [art] Derive CDI
19,090,116 UART: [art] Store in in slot 0x4
19,148,392 UART: [art] Derive Key Pair
19,149,486 UART: [art] Store priv key in slot 0x5
21,612,235 UART: [art] Derive Key Pair - Done
21,625,436 UART: [art] Signing Cert with AUTHO
21,626,799 UART: RITY.KEYID = 7
23,337,785 UART: [art] Erasing AUTHORITY.KEYID = 7
23,339,348 UART: [art] PUB.X = 0A0C9911F1EF7814FB62828DD3EDBC0966EB2DD6BA42895EFBF1FF9B472EB0C00F758F38ABA31FEC32B7B939C14A20DE
23,346,584 UART: [art] PUB.Y = 3619BFCF99CE58E0BEE2E80432C4FD2F3CEE2301E03C7E86C256493B6A60ACC5145D8892A387D9B49FC3EE84A9EA8D6F
23,353,811 UART: [art] SIG.R = E33422BA5B78B3694EC7F2CC3DDC920C66DA4CA4AF4EC85FC45701668F87AC30433BFD054BC955872A598C16F7DA62B3
23,361,304 UART: [art] SIG.S = 691616919AA8E6710CE672C9F7F068ACC866E686A6AF9718C8B5102F6A4DF78E74B3518BC79AE1483A7B5B510B1CF0D4
24,339,271 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
194,055 UART:
194,445 UART: Running Caliptra ROM ...
195,550 UART:
605,266 UART: [state] CFI Enabled
619,921 UART: [state] LifecycleState = Unprovisioned
622,285 UART: [state] DebugLocked = No
624,019 UART: [state] WD Timer not started. Device not locked for debugging
628,199 UART: [kat] SHA2-256
818,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,918 UART: [kat] ++
829,361 UART: [kat] sha1
842,221 UART: [kat] SHA2-256
845,175 UART: [kat] SHA2-384
851,669 UART: [kat] SHA2-512-ACC
854,254 UART: [kat] ECC-384
3,298,082 UART: [kat] HMAC-384Kdf
3,310,469 UART: [kat] LMS
3,842,317 UART: [kat] --
3,845,908 UART: [cold-reset] ++
3,848,081 UART: [fht] FHT @ 0x50003400
3,859,285 UART: [idev] ++
3,859,934 UART: [idev] CDI.KEYID = 6
3,860,972 UART: [idev] SUBJECT.KEYID = 7
3,862,079 UART: [idev] UDS.KEYID = 0
3,863,013 ready_for_fw is high
3,863,204 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,903,125 UART: [idev] Erasing UDS.KEYID = 0
6,340,495 UART: [idev] Sha1 KeyId Algorithm
6,362,922 UART: [idev] --
6,367,726 UART: [ldev] ++
6,368,458 UART: [ldev] CDI.KEYID = 6
6,369,370 UART: [ldev] SUBJECT.KEYID = 5
6,370,528 UART: [ldev] AUTHORITY.KEYID = 7
6,371,757 UART: [ldev] FE.KEYID = 1
6,382,612 UART: [ldev] Erasing FE.KEYID = 1
8,863,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,559 UART: [ldev] --
10,657,271 UART: [fwproc] Wait for Commands...
10,659,201 UART: [fwproc] Recv command 0x46574c44
10,661,514 UART: [fwproc] Recv'd Img size: 31656 bytes
13,085,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,170,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,286,556 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,332,507 >>> mbox cmd response: success
13,336,224 UART: [afmc] ++
13,336,859 UART: [afmc] CDI.KEYID = 6
13,338,106 UART: [afmc] SUBJECT.KEYID = 7
13,339,519 UART: [afmc] AUTHORITY.KEYID = 5
15,842,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,566,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,568,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,583,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,598,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,613,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,638,099 UART: [afmc] --
17,641,085 UART: [cold-reset] --
17,644,457 UART: [state] Locking Datavault
17,650,033 UART: [state] Locking PCR0, PCR1 and PCR31
17,652,233 UART: [state] Locking ICCM
17,654,807 UART: [exit] Launching FMC @ 0x40000130
17,663,468 UART:
17,663,719 UART: Running Caliptra FMC ...
17,664,787 UART:
17,664,937 UART: [state] CFI Enabled
17,672,967 UART: [fht] FMC Alias Private Key: 7
19,430,630 UART: [art] Extend RT PCRs Done
19,431,888 UART: [art] Lock RT PCRs Done
19,433,874 UART: [art] Populate DV Done
19,439,188 UART: [fht] FMC Alias Private Key: 7
19,440,795 UART: [art] Derive CDI
19,441,651 UART: [art] Store in in slot 0x4
19,484,028 UART: [art] Derive Key Pair
19,485,129 UART: [art] Store priv key in slot 0x5
21,911,570 UART: [art] Derive Key Pair - Done
21,924,784 UART: [art] Signing Cert with AUTHO
21,926,152 UART: RITY.KEYID = 7
23,631,590 UART: [art] Erasing AUTHORITY.KEYID = 7
23,633,144 UART: [art] PUB.X = 6EE68B96811714A41AC338980FE620AB4F7A8FEC3AA4925D2C1DA25FB5DC0DA2396D59B7AEDE6019C13CBD32C271DA43
23,640,365 UART: [art] PUB.Y = FF76CC2561FE3ADE0A589BD821129A756884B284AEDC9735685D1C2B5F1C3A9163707A5CBA673511913652D5ECAE5842
23,647,688 UART: [art] SIG.R = E9101D8766660B362D37DC50875FF2E2E189ABB4AFE93CF642B2003507EE47C603D078B5149E77252C865A2E62E8B0A1
23,655,012 UART: [art] SIG.S = C9A1DA66EC621348B769A3F12855DD40CB2517C6C22428B8AF3BCFF27180B82B6AA7FE9974D42AD0AD371E2F03E3C9F0
24,634,343 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
3,757,567 ready_for_fw is high
3,757,975 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,177,541 >>> mbox cmd response: success
17,429,205 UART:
17,429,626 UART: Running Caliptra FMC ...
17,430,752 UART:
17,430,907 UART: [state] CFI Enabled
17,438,808 UART: [fht] FMC Alias Private Key: 7
19,195,904 UART: [art] Extend RT PCRs Done
19,197,189 UART: [art] Lock RT PCRs Done
19,199,018 UART: [art] Populate DV Done
19,204,144 UART: [fht] FMC Alias Private Key: 7
19,205,741 UART: [art] Derive CDI
19,206,516 UART: [art] Store in in slot 0x4
19,249,357 UART: [art] Derive Key Pair
19,250,408 UART: [art] Store priv key in slot 0x5
21,677,426 UART: [art] Derive Key Pair - Done
21,690,248 UART: [art] Signing Cert with AUTHO
21,691,638 UART: RITY.KEYID = 7
23,397,008 UART: [art] Erasing AUTHORITY.KEYID = 7
23,398,577 UART: [art] PUB.X = 64EF0BC97B8045429FD3F4FB7B90ED049BC9F56FA70FABF1F654C30651B0D7F990AD0EC6BDE84DC866CC88D6244F6AA6
23,405,808 UART: [art] PUB.Y = A56E61F7A4016AEAB9C8479F490CBE0E3123B1DF11D4AE22A17793761A1CF046FE17DB7D7D69C804FCCDDD17723ABECC
23,413,040 UART: [art] SIG.R = BD3C6A9E3B7BDECF1153AF7F2F11EE09262F3D003082E79442C707101367F4E96B76CD99812A17AD37D20263B763B303
23,420,449 UART: [art] SIG.S = 642594C3BCADA83BC42AC97FF4386C33DFD911DCDD1E802F415D0C5953D9B9972375C7C97BB997ACE38B7A1D215DBF2A
24,398,729 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,307 UART: [kat] SHA2-256
892,245 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,739 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,479,948 UART: [idev] ++
1,480,116 UART: [idev] CDI.KEYID = 6
1,480,476 UART: [idev] SUBJECT.KEYID = 7
1,480,900 UART: [idev] UDS.KEYID = 0
1,481,245 ready_for_fw is high
1,481,245 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,758 UART: [idev] Erasing UDS.KEYID = 0
1,505,112 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,916 UART: [idev] --
1,515,047 UART: [ldev] ++
1,515,215 UART: [ldev] CDI.KEYID = 6
1,515,578 UART: [ldev] SUBJECT.KEYID = 5
1,516,004 UART: [ldev] AUTHORITY.KEYID = 7
1,516,467 UART: [ldev] FE.KEYID = 1
1,521,615 UART: [ldev] Erasing FE.KEYID = 1
1,546,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,090 UART: [ldev] --
1,586,577 UART: [fwproc] Waiting for Commands...
1,587,260 UART: [fwproc] Received command 0x46574c44
1,588,051 UART: [fwproc] Received Image of size 31656 bytes
1,937,504 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,210 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,441 >>> mbox cmd response: success
2,007,565 UART: [afmc] ++
2,007,733 UART: [afmc] CDI.KEYID = 6
2,008,095 UART: [afmc] SUBJECT.KEYID = 7
2,008,520 UART: [afmc] AUTHORITY.KEYID = 5
2,043,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,533 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,071,926 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,616 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,565 UART: [afmc] --
2,086,505 UART: [cold-reset] --
2,087,531 UART: [state] Locking Datavault
2,088,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,288 UART: [state] Locking ICCM
2,089,942 UART: [exit] Launching FMC @ 0x40000130
2,095,271 UART:
2,095,287 UART: Running Caliptra FMC ...
2,095,695 UART:
2,095,749 UART: [state] CFI Enabled
2,106,370 UART: [fht] FMC Alias Private Key: 7
2,214,763 UART: [art] Extend RT PCRs Done
2,215,191 UART: [art] Lock RT PCRs Done
2,216,969 UART: [art] Populate DV Done
2,225,218 UART: [fht] FMC Alias Private Key: 7
2,226,312 UART: [art] Derive CDI
2,226,592 UART: [art] Store in in slot 0x4
2,312,015 UART: [art] Derive Key Pair
2,312,375 UART: [art] Store priv key in slot 0x5
2,325,455 UART: [art] Derive Key Pair - Done
2,340,249 UART: [art] Signing Cert with AUTHO
2,340,729 UART: RITY.KEYID = 7
2,355,985 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,750 UART: [art] PUB.X = BCEF306E4915DC1087DA48E276D5F3D880C1736D4308D37542DBEB473AB93E5B875A28EA8492026AE9476A5F5747F6BA
2,363,520 UART: [art] PUB.Y = 19796887DB86E37DF0A8E58BC052322D65DF96CF4BD6831F4F3989499EAB6FB76EE234F185C0A17149A7BFBCA932B04B
2,370,480 UART: [art] SIG.R = 21CCFABECA6A8053E1001107AB893FFB75A19BA289B37FD8FD7D5B18D5F5FAA3D2DFA68EBB03BCFE11E1978A786CA696
2,377,250 UART: [art] SIG.S = D76D5D85098E127A83F0171D81DA0AB90F51027D26A3511EF35A6C1C5895F850ACEECD531C301992FF05EAE696546F94
2,401,197 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,063 ready_for_fw is high
1,363,063 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,361 >>> mbox cmd response: success
1,917,005 UART:
1,917,021 UART: Running Caliptra FMC ...
1,917,429 UART:
1,917,483 UART: [state] CFI Enabled
1,928,068 UART: [fht] FMC Alias Private Key: 7
2,035,629 UART: [art] Extend RT PCRs Done
2,036,057 UART: [art] Lock RT PCRs Done
2,037,463 UART: [art] Populate DV Done
2,045,756 UART: [fht] FMC Alias Private Key: 7
2,046,912 UART: [art] Derive CDI
2,047,192 UART: [art] Store in in slot 0x4
2,132,307 UART: [art] Derive Key Pair
2,132,667 UART: [art] Store priv key in slot 0x5
2,145,721 UART: [art] Derive Key Pair - Done
2,160,383 UART: [art] Signing Cert with AUTHO
2,160,863 UART: RITY.KEYID = 7
2,175,871 UART: [art] Erasing AUTHORITY.KEYID = 7
2,176,636 UART: [art] PUB.X = 9E0271E5EBF459D97CE6341E2B7452B89EB467200D344CA7D2D552FC19DA6AD7BE3EB1C00779DF2A79A3DEA068AA39E0
2,183,413 UART: [art] PUB.Y = 803B04A2D3C04DF6E08DB535547C47EC7CF6EA5D3EDFCE5C7DBF5EB7083D5C0BD4BF83026B4967CAF6C8C94F5D958C8E
2,190,377 UART: [art] SIG.R = 45D69D8FE2F393BCD15DB2D7EA7B3E90942DDED85441A905A7F90ACE43D82CC14C4373CA042630F666E1572FC2E506F3
2,197,147 UART: [art] SIG.S = D0DC1D8D3D34A7759FD8AEEB49BE589931BAC7FDF3EBAA2A256FB81796668BC1763C934AED125869E1394A3F2CBA4E0D
2,220,708 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,876 UART: [kat] SHA2-256
892,814 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,003 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,516 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,553 UART: [idev] ++
1,479,721 UART: [idev] CDI.KEYID = 6
1,480,081 UART: [idev] SUBJECT.KEYID = 7
1,480,505 UART: [idev] UDS.KEYID = 0
1,480,850 ready_for_fw is high
1,480,850 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,225 UART: [idev] Erasing UDS.KEYID = 0
1,505,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,732 UART: [ldev] ++
1,514,900 UART: [ldev] CDI.KEYID = 6
1,515,263 UART: [ldev] SUBJECT.KEYID = 5
1,515,689 UART: [ldev] AUTHORITY.KEYID = 7
1,516,152 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,107 UART: [ldev] --
1,586,586 UART: [fwproc] Waiting for Commands...
1,587,353 UART: [fwproc] Received command 0x46574c44
1,588,144 UART: [fwproc] Received Image of size 31656 bytes
1,939,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,661 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,997,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,008,714 >>> mbox cmd response: success
2,009,726 UART: [afmc] ++
2,009,894 UART: [afmc] CDI.KEYID = 6
2,010,256 UART: [afmc] SUBJECT.KEYID = 7
2,010,681 UART: [afmc] AUTHORITY.KEYID = 5
2,046,078 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,459 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,149 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,912 UART: [afmc] --
2,088,824 UART: [cold-reset] --
2,089,686 UART: [state] Locking Datavault
2,090,919 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,523 UART: [state] Locking ICCM
2,092,133 UART: [exit] Launching FMC @ 0x40000130
2,097,462 UART:
2,097,478 UART: Running Caliptra FMC ...
2,097,886 UART:
2,098,029 UART: [state] CFI Enabled
2,108,450 UART: [fht] FMC Alias Private Key: 7
2,216,585 UART: [art] Extend RT PCRs Done
2,217,013 UART: [art] Lock RT PCRs Done
2,218,455 UART: [art] Populate DV Done
2,226,578 UART: [fht] FMC Alias Private Key: 7
2,227,618 UART: [art] Derive CDI
2,227,898 UART: [art] Store in in slot 0x4
2,313,539 UART: [art] Derive Key Pair
2,313,899 UART: [art] Store priv key in slot 0x5
2,327,231 UART: [art] Derive Key Pair - Done
2,342,162 UART: [art] Signing Cert with AUTHO
2,342,642 UART: RITY.KEYID = 7
2,357,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,541 UART: [art] PUB.X = BF6B83D4990095A3387B04211CE73449107E1B72552FD74D923E00EB9530E16C58929D425BB161737CF8F1429BFF4882
2,365,256 UART: [art] PUB.Y = 268B385E71516975F74D9806A071516B17A8E04FA9401F5D9FEFDE63444BCA904E0EFDF906EA48E1416CACB59A8A4852
2,372,203 UART: [art] SIG.R = 0C77D932A672EB8BEA14F62F2BDFB8D85C60263F905390FB792B574ABE813630396E777210C674E0B65608094DE4A81B
2,378,964 UART: [art] SIG.S = 6558C61623134C6C321CBB1DCE3B2F1A26B939872CE398FC6745AB27BD644621539A7CA5998617D760183231049B54E8
2,402,831 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 ready_for_fw is high
1,362,716 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,006 >>> mbox cmd response: success
1,919,842 UART:
1,919,858 UART: Running Caliptra FMC ...
1,920,266 UART:
1,920,409 UART: [state] CFI Enabled
1,931,164 UART: [fht] FMC Alias Private Key: 7
2,038,553 UART: [art] Extend RT PCRs Done
2,038,981 UART: [art] Lock RT PCRs Done
2,040,523 UART: [art] Populate DV Done
2,048,854 UART: [fht] FMC Alias Private Key: 7
2,049,798 UART: [art] Derive CDI
2,050,078 UART: [art] Store in in slot 0x4
2,135,653 UART: [art] Derive Key Pair
2,136,013 UART: [art] Store priv key in slot 0x5
2,150,055 UART: [art] Derive Key Pair - Done
2,164,870 UART: [art] Signing Cert with AUTHO
2,165,350 UART: RITY.KEYID = 7
2,180,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,429 UART: [art] PUB.X = 41FC6073B952DB8930C9C14915C0C29F036E2F535D2A7F8EF814A1A4532725B6D39BF0A2AFD98C5CBAA0DC2580F73E32
2,188,206 UART: [art] PUB.Y = C31C7C664456DDF319920E69C57AD65C14E2AE25C0675055209AA69CB6B54BDC03254A09E4348ACC69FF4808F616FDA0
2,195,150 UART: [art] SIG.R = 4FC470357B17C2B735CF8754C046462C618F487E416CAC2E0E8FD43263A818EA5EDB9B9B0FE57A63E6F903AAFFF8D8EC
2,201,927 UART: [art] SIG.S = 184AEABA4093100CB8A2E7149471607B37D36E489376DDAE8EFB2F16AE3FCE5374C01CBD2152A24DC5B227A513A75D6E
2,226,178 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
917,932 UART: [kat] HMAC-384Kdf
922,622 UART: [kat] LMS
1,170,950 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 ready_for_fw is high
1,176,423 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,829 UART: [idev] --
1,210,893 UART: [ldev] ++
1,211,061 UART: [ldev] CDI.KEYID = 6
1,211,424 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,478 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,883 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,698 >>> mbox cmd response: success
1,703,934 UART: [afmc] ++
1,704,102 UART: [afmc] CDI.KEYID = 6
1,704,464 UART: [afmc] SUBJECT.KEYID = 7
1,704,889 UART: [afmc] AUTHORITY.KEYID = 5
1,740,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,153 UART: [afmc] --
1,784,249 UART: [cold-reset] --
1,785,143 UART: [state] Locking Datavault
1,786,414 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,018 UART: [state] Locking ICCM
1,787,546 UART: [exit] Launching FMC @ 0x40000130
1,792,875 UART:
1,792,891 UART: Running Caliptra FMC ...
1,793,299 UART:
1,793,353 UART: [state] CFI Enabled
1,803,654 UART: [fht] FMC Alias Private Key: 7
1,911,487 UART: [art] Extend RT PCRs Done
1,911,915 UART: [art] Lock RT PCRs Done
1,913,477 UART: [art] Populate DV Done
1,922,018 UART: [fht] FMC Alias Private Key: 7
1,923,172 UART: [art] Derive CDI
1,923,452 UART: [art] Store in in slot 0x4
2,009,365 UART: [art] Derive Key Pair
2,009,725 UART: [art] Store priv key in slot 0x5
2,022,677 UART: [art] Derive Key Pair - Done
2,037,473 UART: [art] Signing Cert with AUTHO
2,037,953 UART: RITY.KEYID = 7
2,052,725 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,490 UART: [art] PUB.X = 3F6D56D91D5A6BB6F0489D6F6F74A7D8C2B6BCB651423CAB1EE90D349C0D8ABE17E2EA66E7187299752488AF7934676D
2,060,264 UART: [art] PUB.Y = E25716DB088A0C8D0EA23B896182AFB2ECECACD4708C7DDACAFC821C3BC8C7FCBB7155E05EBB0F7A9A5DB88CD71060E5
2,067,234 UART: [art] SIG.R = 64662E98CFA2460339A244CB207C26F50AA6A0D461119D77C96AF8A4B48E82EB332D3F60E7822072CE9CDCCA7CD8A70F
2,074,005 UART: [art] SIG.S = F0CED16541C9F68D4CD8FC0C37578255F7BEFE864344572783EFBD11450F43F884497075CF1D53BBDB3BA2401C14773A
2,098,265 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,655 ready_for_fw is high
1,060,655 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,135 >>> mbox cmd response: success
1,616,313 UART:
1,616,329 UART: Running Caliptra FMC ...
1,616,737 UART:
1,616,791 UART: [state] CFI Enabled
1,627,426 UART: [fht] FMC Alias Private Key: 7
1,734,727 UART: [art] Extend RT PCRs Done
1,735,155 UART: [art] Lock RT PCRs Done
1,736,753 UART: [art] Populate DV Done
1,745,220 UART: [fht] FMC Alias Private Key: 7
1,746,226 UART: [art] Derive CDI
1,746,506 UART: [art] Store in in slot 0x4
1,831,635 UART: [art] Derive Key Pair
1,831,995 UART: [art] Store priv key in slot 0x5
1,845,189 UART: [art] Derive Key Pair - Done
1,859,756 UART: [art] Signing Cert with AUTHO
1,860,236 UART: RITY.KEYID = 7
1,875,898 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,663 UART: [art] PUB.X = 248550B842AD88C3FEB5AC3A1E4C2A11E9B50B5CA433E76238EF8EFD96D1F3A1D4036E07FA335554BB5A9FBA167C1DF3
1,883,442 UART: [art] PUB.Y = EA9A239DB905A3FF034B1CF0A4085247D7F31424DDA03F1CD7E982530844E3E68E783249E8C6943DE23AFB5BE94BC4A0
1,890,390 UART: [art] SIG.R = E05060C0D9F3DB5DC1B893A394F704716E37E42687BFEDDA0A86C19B4EBD7F85FAE3DE53C77716A223CC3F1AF7EC744B
1,897,174 UART: [art] SIG.S = 4EF5C0C8D98EB65C1C675EF57DBDE5B32E73CFC4C3CCADC557881567C05059253519056CC826BC39F6F66620380D4B2E
1,920,980 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,376 UART: [kat] SHA2-256
904,316 UART: [kat] SHA2-384
907,147 UART: [kat] SHA2-512-ACC
909,048 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,212 UART: [cold-reset] ++
1,172,760 UART: [fht] FHT @ 0x50003400
1,175,609 UART: [idev] ++
1,175,777 UART: [idev] CDI.KEYID = 6
1,176,137 UART: [idev] SUBJECT.KEYID = 7
1,176,561 UART: [idev] UDS.KEYID = 0
1,176,906 ready_for_fw is high
1,176,906 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,611 UART: [idev] Erasing UDS.KEYID = 0
1,201,622 UART: [idev] Sha1 KeyId Algorithm
1,210,076 UART: [idev] --
1,211,092 UART: [ldev] ++
1,211,260 UART: [ldev] CDI.KEYID = 6
1,211,623 UART: [ldev] SUBJECT.KEYID = 5
1,212,049 UART: [ldev] AUTHORITY.KEYID = 7
1,212,512 UART: [ldev] FE.KEYID = 1
1,217,830 UART: [ldev] Erasing FE.KEYID = 1
1,244,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,248 UART: [ldev] --
1,283,643 UART: [fwproc] Wait for Commands...
1,284,353 UART: [fwproc] Recv command 0x46574c44
1,285,081 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,546 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,349 >>> mbox cmd response: success
1,705,371 UART: [afmc] ++
1,705,539 UART: [afmc] CDI.KEYID = 6
1,705,901 UART: [afmc] SUBJECT.KEYID = 7
1,706,326 UART: [afmc] AUTHORITY.KEYID = 5
1,742,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,460 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,771,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,777,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,800 UART: [afmc] --
1,785,716 UART: [cold-reset] --
1,786,372 UART: [state] Locking Datavault
1,787,465 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,069 UART: [state] Locking ICCM
1,788,605 UART: [exit] Launching FMC @ 0x40000130
1,793,934 UART:
1,793,950 UART: Running Caliptra FMC ...
1,794,358 UART:
1,794,501 UART: [state] CFI Enabled
1,805,194 UART: [fht] FMC Alias Private Key: 7
1,912,643 UART: [art] Extend RT PCRs Done
1,913,071 UART: [art] Lock RT PCRs Done
1,914,953 UART: [art] Populate DV Done
1,923,316 UART: [fht] FMC Alias Private Key: 7
1,924,440 UART: [art] Derive CDI
1,924,720 UART: [art] Store in in slot 0x4
2,009,975 UART: [art] Derive Key Pair
2,010,335 UART: [art] Store priv key in slot 0x5
2,023,397 UART: [art] Derive Key Pair - Done
2,037,922 UART: [art] Signing Cert with AUTHO
2,038,402 UART: RITY.KEYID = 7
2,053,474 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,239 UART: [art] PUB.X = D7CE8A717CF5A0D55E46F35E1EDD607F636EC6AEA1337B86A7965018E97FFE6C63C60BE1F0A6CA1CA42C32EC8A1D12F5
2,061,028 UART: [art] PUB.Y = EF1605505109235EF2BC29E97F0DC9F9625C012CD22449881D52662225D8368622073E32076C355036E07367CB8FA152
2,067,944 UART: [art] SIG.R = B62301AEDAF9138A0E50CABFD395FCFE198327E872ADF2A13493696FF73B14922C55F7D6C4E476C78A6E7B4DEC55A4B8
2,074,724 UART: [art] SIG.S = 3479B9D52C1B4FCC68625CBBAE9489D490EB7D61FA5C79E161548C2DC1641E74BDDB96E346788FCB1A371C6FE8A3A4F9
2,098,114 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,132 ready_for_fw is high
1,060,132 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,336 >>> mbox cmd response: success
1,617,794 UART:
1,617,810 UART: Running Caliptra FMC ...
1,618,218 UART:
1,618,361 UART: [state] CFI Enabled
1,629,080 UART: [fht] FMC Alias Private Key: 7
1,736,599 UART: [art] Extend RT PCRs Done
1,737,027 UART: [art] Lock RT PCRs Done
1,738,761 UART: [art] Populate DV Done
1,746,892 UART: [fht] FMC Alias Private Key: 7
1,747,942 UART: [art] Derive CDI
1,748,222 UART: [art] Store in in slot 0x4
1,833,841 UART: [art] Derive Key Pair
1,834,201 UART: [art] Store priv key in slot 0x5
1,846,959 UART: [art] Derive Key Pair - Done
1,861,651 UART: [art] Signing Cert with AUTHO
1,862,131 UART: RITY.KEYID = 7
1,877,469 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,234 UART: [art] PUB.X = AE1981C6FB468255FF4D55E5E1DFBAA293A548EE0FA81BE4A0F8BA6DDB33EBF6389C7B98DB81CFFC7C2CD8AE655FC0A0
1,885,035 UART: [art] PUB.Y = 3E318FF67744D8D277813FB7FAF8B7FA054ABB3D46E888DBFACFC26C0FC88BDEE848DCAC2CF23C808AB751642B063CA1
1,892,002 UART: [art] SIG.R = D8BDA1B422382424A11BD5893BFAA6A0E02A9EF41B940478F79C446112E4B35DF293F80FDB5BD81DA475A855E5BECA92
1,898,780 UART: [art] SIG.S = 116FF803014085CBDB58A85741709ADA3FEE101EB754AB34ECBD594F82898AC3A6340EED6C8BE33716AFFEE92BDE1F3B
1,922,321 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,174,303 ready_for_fw is high
1,174,303 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,131 UART: [idev] --
1,208,164 UART: [ldev] ++
1,208,332 UART: [ldev] CDI.KEYID = 6
1,208,696 UART: [ldev] SUBJECT.KEYID = 5
1,209,123 UART: [ldev] AUTHORITY.KEYID = 7
1,209,586 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,648 UART: [fwproc] Wait for Commands...
1,281,329 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,496 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,342 >>> mbox cmd response: success
1,701,365 UART: [afmc] ++
1,701,533 UART: [afmc] CDI.KEYID = 6
1,701,896 UART: [afmc] SUBJECT.KEYID = 7
1,702,322 UART: [afmc] AUTHORITY.KEYID = 5
1,737,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,753,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,754,698 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,310 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,029 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,779,944 UART: [afmc] --
1,780,866 UART: [cold-reset] --
1,781,564 UART: [state] Locking Datavault
1,782,625 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,229 UART: [state] Locking ICCM
1,783,677 UART: [exit] Launching FMC @ 0x40000130
1,789,006 UART:
1,789,022 UART: Running Caliptra FMC ...
1,789,430 UART:
1,789,484 UART: [state] CFI Enabled
1,800,397 UART: [fht] FMC Alias Private Key: 7
1,908,130 UART: [art] Extend RT PCRs Done
1,908,558 UART: [art] Lock RT PCRs Done
1,910,454 UART: [art] Populate DV Done
1,918,541 UART: [fht] FMC Alias Private Key: 7
1,919,643 UART: [art] Derive CDI
1,919,923 UART: [art] Store in in slot 0x4
2,005,602 UART: [art] Derive Key Pair
2,005,962 UART: [art] Store priv key in slot 0x5
2,019,150 UART: [art] Derive Key Pair - Done
2,034,276 UART: [art] Signing Cert with AUTHO
2,034,756 UART: RITY.KEYID = 7
2,049,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,050,711 UART: [art] PUB.X = 7E3BDCF357331A14C44470CA77CA553829E0BD418DB331167EBB50B5301DAA0C6078DA0A5DA50FC776B4D5EC98501419
2,057,480 UART: [art] PUB.Y = C4C7F31FFD4E2D04163E2A78C62817DF7FF3A5054B594901DC436BB909683F23C23D98A1FA4F6096DD273990183735C7
2,064,418 UART: [art] SIG.R = 7BF9DF898F3C46DDC673C15A41A7340029ED54DB49926FAAEFF30678A7DF34018BEA39911BD6FA903409F3475C1623CE
2,071,167 UART: [art] SIG.S = C34EEDEE294A57924DF934AAC11BAE4428896ED63F9868708F71674678660D423EF1C96D46D0BB425C6F94FF80853B42
2,094,626 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,572 ready_for_fw is high
1,056,572 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,898 >>> mbox cmd response: success
1,614,084 UART:
1,614,100 UART: Running Caliptra FMC ...
1,614,508 UART:
1,614,562 UART: [state] CFI Enabled
1,624,831 UART: [fht] FMC Alias Private Key: 7
1,732,464 UART: [art] Extend RT PCRs Done
1,732,892 UART: [art] Lock RT PCRs Done
1,734,332 UART: [art] Populate DV Done
1,742,355 UART: [fht] FMC Alias Private Key: 7
1,743,355 UART: [art] Derive CDI
1,743,635 UART: [art] Store in in slot 0x4
1,828,944 UART: [art] Derive Key Pair
1,829,304 UART: [art] Store priv key in slot 0x5
1,842,288 UART: [art] Derive Key Pair - Done
1,857,157 UART: [art] Signing Cert with AUTHO
1,857,637 UART: RITY.KEYID = 7
1,872,947 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,712 UART: [art] PUB.X = B42A6036431D008B4A0FB7AC22E4CE95EA7BC8F067A0829799BEA6F58B6F20EC16343F75D5EDCDC3553B56498AB565DC
1,880,471 UART: [art] PUB.Y = 420A6EAED127D3F98563D17CD70F14D0A093CB46129CD8317AABDF582B73D79267BF2AF5CF30059EC4357E52CE725764
1,887,420 UART: [art] SIG.R = 679D44C319507D4B5D4C313D371696229D602A9E74DE08B9F810486C57AE0A4023D4F103B0CA43324E4540C10EA49192
1,894,170 UART: [art] SIG.S = C9C26995344BD5ACE76124EA0034A3E8B62B82C93897F4E55FA63FC10607CFE4F3F71E445098D6365EF33629702CEC08
1,917,825 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,815 UART: [kat] SHA2-512-ACC
906,716 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,253 UART: [ldev] --
1,281,587 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,545 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,393 >>> mbox cmd response: success
1,702,550 UART: [afmc] ++
1,702,718 UART: [afmc] CDI.KEYID = 6
1,703,081 UART: [afmc] SUBJECT.KEYID = 7
1,703,507 UART: [afmc] AUTHORITY.KEYID = 5
1,738,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,633 UART: [afmc] --
1,781,733 UART: [cold-reset] --
1,782,511 UART: [state] Locking Datavault
1,783,836 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,440 UART: [state] Locking ICCM
1,785,092 UART: [exit] Launching FMC @ 0x40000130
1,790,421 UART:
1,790,437 UART: Running Caliptra FMC ...
1,790,845 UART:
1,790,988 UART: [state] CFI Enabled
1,801,611 UART: [fht] FMC Alias Private Key: 7
1,909,700 UART: [art] Extend RT PCRs Done
1,910,128 UART: [art] Lock RT PCRs Done
1,911,976 UART: [art] Populate DV Done
1,920,009 UART: [fht] FMC Alias Private Key: 7
1,921,179 UART: [art] Derive CDI
1,921,459 UART: [art] Store in in slot 0x4
2,007,370 UART: [art] Derive Key Pair
2,007,730 UART: [art] Store priv key in slot 0x5
2,021,372 UART: [art] Derive Key Pair - Done
2,036,440 UART: [art] Signing Cert with AUTHO
2,036,920 UART: RITY.KEYID = 7
2,052,736 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,501 UART: [art] PUB.X = 281F53D51294D0F34152E366CF2E7E8A4C38433253FCD175E501E9BBBD932A99347CF10CB5AB3B5901A38809843CF43B
2,060,261 UART: [art] PUB.Y = 6AA43472D203D4D49DC608CD5253606205837D5851623FD0FCEC8EE98DD7BFA1B992D3929DA4FC773543F4817566C379
2,067,202 UART: [art] SIG.R = 03E03F130EB8F0605673D7BDEF78F16E71272552FC95518BBA99B991ACD999FF88FC23D2998BD9F3084641EFF582E549
2,073,967 UART: [art] SIG.S = D8860955C8A0BFC30081C7C9D703BF21253A048E06352F5DB9AA461FA33A66B206AB0CAC88C60B71BD553305293EF215
2,097,953 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,175 ready_for_fw is high
1,057,175 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,901 >>> mbox cmd response: success
1,613,965 UART:
1,613,981 UART: Running Caliptra FMC ...
1,614,389 UART:
1,614,532 UART: [state] CFI Enabled
1,625,341 UART: [fht] FMC Alias Private Key: 7
1,733,078 UART: [art] Extend RT PCRs Done
1,733,506 UART: [art] Lock RT PCRs Done
1,735,138 UART: [art] Populate DV Done
1,743,607 UART: [fht] FMC Alias Private Key: 7
1,744,765 UART: [art] Derive CDI
1,745,045 UART: [art] Store in in slot 0x4
1,830,966 UART: [art] Derive Key Pair
1,831,326 UART: [art] Store priv key in slot 0x5
1,844,688 UART: [art] Derive Key Pair - Done
1,859,377 UART: [art] Signing Cert with AUTHO
1,859,857 UART: RITY.KEYID = 7
1,875,277 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,042 UART: [art] PUB.X = 028D452D207D0CA5E4FFC59D5F0B8F8D890216A0C70DFB6FC21C759D53FC5E72E68638B3DF908F30518EBE1AF00B9BB6
1,882,810 UART: [art] PUB.Y = 4F6E45FB03738953119D7EDDCE94DCDF604F807554747F633367046B6DF4AA3710BF0023F5E1A6C3B42B7FFDEA2C7C65
1,889,742 UART: [art] SIG.R = 15D59C458EF387B4D322B5778A26AD3325B91146867C9F4A023A8EC928B0467598F2BC6A0F985C3F72469B5427F009F6
1,896,497 UART: [art] SIG.S = 061C7E029FB11990851D57B2F12877086960A8C4F0FCFC12CE7056B7203E864EC1169043B1640B783B678273BB9930F7
1,920,217 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
191,984 UART:
192,367 UART: Running Caliptra ROM ...
193,453 UART:
193,598 UART: [state] CFI Enabled
262,293 UART: [state] LifecycleState = Unprovisioned
264,288 UART: [state] DebugLocked = No
266,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,746 UART: [kat] SHA2-256
441,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,940 UART: [kat] ++
452,388 UART: [kat] sha1
463,831 UART: [kat] SHA2-256
466,566 UART: [kat] SHA2-384
471,421 UART: [kat] SHA2-512-ACC
473,790 UART: [kat] ECC-384
2,766,215 UART: [kat] HMAC-384Kdf
2,799,261 UART: [kat] LMS
3,989,525 UART: [kat] --
3,993,092 UART: [cold-reset] ++
3,994,111 UART: [fht] Storing FHT @ 0x50003400
4,006,620 UART: [idev] ++
4,007,194 UART: [idev] CDI.KEYID = 6
4,008,089 UART: [idev] SUBJECT.KEYID = 7
4,009,340 UART: [idev] UDS.KEYID = 0
4,010,315 ready_for_fw is high
4,010,519 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,109,566 UART: [idev] Erasing UDS.KEYID = 0
7,347,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,209 UART: [idev] --
7,372,535 UART: [ldev] ++
7,373,106 UART: [ldev] CDI.KEYID = 6
7,374,121 UART: [ldev] SUBJECT.KEYID = 5
7,375,476 UART: [ldev] AUTHORITY.KEYID = 7
7,376,683 UART: [ldev] FE.KEYID = 1
7,420,218 UART: [ldev] Erasing FE.KEYID = 1
10,754,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,862 UART: [ldev] --
13,115,452 UART: [fwproc] Waiting for Commands...
13,118,786 UART: [fwproc] Received command 0x46574c44
13,120,970 UART: [fwproc] Received Image of size 78492 bytes
16,731,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,807,827 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,876,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,069,777 >>> mbox cmd response: success
17,070,246 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,074,583 UART: [afmc] ++
17,075,175 UART: [afmc] CDI.KEYID = 6
17,076,063 UART: [afmc] SUBJECT.KEYID = 7
17,077,335 UART: [afmc] AUTHORITY.KEYID = 5
20,432,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,732,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,734,795 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,749,241 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,764,030 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,778,481 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,799,780 UART: [afmc] --
22,803,506 UART: [cold-reset] --
22,808,127 UART: [state] Locking Datavault
22,813,434 UART: [state] Locking PCR0, PCR1 and PCR31
22,815,137 UART: [state] Locking ICCM
22,817,187 UART: [exit] Launching FMC @ 0x40000130
22,825,546 UART:
22,825,783 UART: Running Caliptra FMC ...
22,826,885 UART:
22,827,041 UART: [state] CFI Enabled
22,893,147 UART: [fht] FMC Alias Private Key: 7
25,231,663 UART: [art] Extend RT PCRs Done
25,232,894 UART: [art] Lock RT PCRs Done
25,234,843 UART: [art] Populate DV Done
25,240,251 UART: [fht] FMC Alias Private Key: 7
25,241,784 UART: [art] Derive CDI
25,242,545 UART: [art] Store in in slot 0x4
25,301,476 UART: [art] Derive Key Pair
25,302,517 UART: [art] Store priv key in slot 0x5
28,595,351 UART: [art] Derive Key Pair - Done
28,608,136 UART: [art] Signing Cert with AUTHO
28,609,436 UART: RITY.KEYID = 7
30,897,436 UART: [art] Erasing AUTHORITY.KEYID = 7
30,898,950 UART: [art] PUB.X = F8A893AD3D1DD2EE9872DEDF310DA2031DCDA210EB2E8F50120DBC873DC23618E74A5420CEFC49157E871E3E5B4DE0F8
30,906,199 UART: [art] PUB.Y = 049C955D713EB47453C63261BDCBFC48A1A00569876F98B8E75FE7365D720B8AE6010B72BF129074B09887FFD13E9DBE
30,913,430 UART: [art] SIG.R = 773AFEF4E3052C50139F762577516E813EBD956BD5520FE9911A5953B8AF12C0A78D3621DC346A992ABC6C85020FDEE5
30,920,817 UART: [art] SIG.S = 1CA0DD20D90FF7831DDF9C66B9CBFD9715A40A0A741A371600E197F83C4AFCE87D2DDB6C773FC47AA2B97AD05810BF44
32,226,185 UART: mbox::rt_entry...
32,227,147 UART: ____ _ _ _ ____ _____
32,229,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,231,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,233,066 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,234,997 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,236,943 UART: |_|
32,237,788 UART:
32,351,799 UART: [rt] Runtime listening for mailbox commands...
32,353,919 >>> mbox cmd response data (48 bytes)
32,354,533 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,356,953 >>> mbox cmd response data (48 bytes)
32,357,795 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,370,421 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,805,416 ready_for_fw is high
3,805,874 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,133,003 >>> mbox cmd response: success
17,133,556 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,824,431 UART:
22,824,828 UART: Running Caliptra FMC ...
22,825,924 UART:
22,826,078 UART: [state] CFI Enabled
22,892,427 UART: [fht] FMC Alias Private Key: 7
25,230,539 UART: [art] Extend RT PCRs Done
25,231,766 UART: [art] Lock RT PCRs Done
25,233,273 UART: [art] Populate DV Done
25,238,633 UART: [fht] FMC Alias Private Key: 7
25,240,244 UART: [art] Derive CDI
25,241,000 UART: [art] Store in in slot 0x4
25,300,408 UART: [art] Derive Key Pair
25,301,434 UART: [art] Store priv key in slot 0x5
28,594,417 UART: [art] Derive Key Pair - Done
28,607,362 UART: [art] Signing Cert with AUTHO
28,608,700 UART: RITY.KEYID = 7
30,895,510 UART: [art] Erasing AUTHORITY.KEYID = 7
30,897,021 UART: [art] PUB.X = F2CEF469F2B4D738BEC3600FFD1BAFB867DCC84E43995C33264EACFFAC1D26F337D7C1CEA4631CD36CB98B30A9C1CE82
30,904,344 UART: [art] PUB.Y = B5D64D6D3517FF9888B03C504CC41C6686D5A4A3DD3C13E93DCC8622033B281CE6B4B2555143D91CFB42758C64E4502B
30,911,586 UART: [art] SIG.R = 265916580898824DFF0C1391F788223FB39A3AA2355E63B54FD2F1FCA66933CB3F90E56842E10C388E3313C1C5237DDB
30,918,941 UART: [art] SIG.S = 94BC1DBA8D9A25BCBC53F299013A40CE45D1ADDCED7FE538F92D4D3093A46353AA7643CA9D8359908755A07AD411C7AD
32,223,619 UART: mbox::rt_entry...
32,224,581 UART: ____ _ _ _ ____ _____
32,226,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,228,579 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,230,512 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,232,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,234,401 UART: |_|
32,235,255 UART:
32,348,336 UART: [rt] Runtime listening for mailbox commands...
32,350,505 >>> mbox cmd response data (48 bytes)
32,351,095 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,353,516 >>> mbox cmd response data (48 bytes)
32,354,350 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,366,908 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,587 writing to cptra_bootfsm_go
192,654 UART:
193,042 UART: Running Caliptra ROM ...
194,248 UART:
603,821 UART: [state] CFI Enabled
617,436 UART: [state] LifecycleState = Unprovisioned
619,406 UART: [state] DebugLocked = No
622,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,440 UART: [kat] SHA2-256
797,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,685 UART: [kat] ++
808,167 UART: [kat] sha1
819,180 UART: [kat] SHA2-256
821,835 UART: [kat] SHA2-384
827,108 UART: [kat] SHA2-512-ACC
829,468 UART: [kat] ECC-384
3,114,261 UART: [kat] HMAC-384Kdf
3,126,958 UART: [kat] LMS
4,317,090 UART: [kat] --
4,320,847 UART: [cold-reset] ++
4,322,150 UART: [fht] Storing FHT @ 0x50003400
4,333,838 UART: [idev] ++
4,334,392 UART: [idev] CDI.KEYID = 6
4,335,347 UART: [idev] SUBJECT.KEYID = 7
4,336,586 UART: [idev] UDS.KEYID = 0
4,337,609 ready_for_fw is high
4,337,827 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,436,575 UART: [idev] Erasing UDS.KEYID = 0
7,620,966 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,757 UART: [idev] --
7,646,997 UART: [ldev] ++
7,647,562 UART: [ldev] CDI.KEYID = 6
7,648,496 UART: [ldev] SUBJECT.KEYID = 5
7,649,853 UART: [ldev] AUTHORITY.KEYID = 7
7,651,067 UART: [ldev] FE.KEYID = 1
7,662,776 UART: [ldev] Erasing FE.KEYID = 1
10,948,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,739 UART: [ldev] --
13,308,401 UART: [fwproc] Waiting for Commands...
13,311,187 UART: [fwproc] Received command 0x46574c44
13,313,359 UART: [fwproc] Received Image of size 78492 bytes
16,932,733 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,011,059 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,079,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,271,683 >>> mbox cmd response: success
17,272,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,276,201 UART: [afmc] ++
17,276,784 UART: [afmc] CDI.KEYID = 6
17,277,692 UART: [afmc] SUBJECT.KEYID = 7
17,278,958 UART: [afmc] AUTHORITY.KEYID = 5
20,591,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,888,994 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,891,253 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,905,636 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,920,453 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,934,900 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,955,966 UART: [afmc] --
22,959,830 UART: [cold-reset] --
22,963,962 UART: [state] Locking Datavault
22,968,029 UART: [state] Locking PCR0, PCR1 and PCR31
22,969,787 UART: [state] Locking ICCM
22,971,151 UART: [exit] Launching FMC @ 0x40000130
22,979,506 UART:
22,979,743 UART: Running Caliptra FMC ...
22,980,842 UART:
22,980,995 UART: [state] CFI Enabled
22,988,981 UART: [fht] FMC Alias Private Key: 7
25,319,813 UART: [art] Extend RT PCRs Done
25,321,040 UART: [art] Lock RT PCRs Done
25,322,641 UART: [art] Populate DV Done
25,328,051 UART: [fht] FMC Alias Private Key: 7
25,329,641 UART: [art] Derive CDI
25,330,389 UART: [art] Store in in slot 0x4
25,372,622 UART: [art] Derive Key Pair
25,373,619 UART: [art] Store priv key in slot 0x5
28,615,680 UART: [art] Derive Key Pair - Done
28,628,686 UART: [art] Signing Cert with AUTHO
28,629,997 UART: RITY.KEYID = 7
30,909,354 UART: [art] Erasing AUTHORITY.KEYID = 7
30,910,861 UART: [art] PUB.X = 8F04A50CD109D489531C6C89CA51CAE011CB7E8B7ECAEA26258C2B1F622F13063F44E24F02A5E6FA1CB5874B4219F0A7
30,918,077 UART: [art] PUB.Y = 85F8A13F2058C2989C4CB514F1F3594252434AD39D864327C7BB2EE383CC84E96FA64FBEE7A8520411B73076DE178CE5
30,925,341 UART: [art] SIG.R = 90CEF823DA1E9DC79FC0F0A5510BDA60F9E8D5572C5B94303946F3AB149E16694B759E405E609F50B42D76256D117AD7
30,932,746 UART: [art] SIG.S = E63D18EC10F9094053C179ADFFFB8D8B2896D8744D69A60231C466457ADC2E4F4F36064D924FC5B19F2140ABC0AD3A15
32,237,429 UART: mbox::rt_entry...
32,238,382 UART: ____ _ _ _ ____ _____
32,240,362 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,242,283 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,244,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,246,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,248,064 UART: |_|
32,248,870 UART:
32,362,633 UART: [rt] Runtime listening for mailbox commands...
32,364,745 >>> mbox cmd response data (48 bytes)
32,365,411 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,367,759 >>> mbox cmd response data (48 bytes)
32,368,609 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,381,181 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
4,123,577 ready_for_fw is high
4,124,192 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,346,551 >>> mbox cmd response: success
17,347,170 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,990,231 UART:
22,990,627 UART: Running Caliptra FMC ...
22,991,921 UART:
22,992,081 UART: [state] CFI Enabled
22,999,965 UART: [fht] FMC Alias Private Key: 7
25,330,311 UART: [art] Extend RT PCRs Done
25,331,549 UART: [art] Lock RT PCRs Done
25,333,178 UART: [art] Populate DV Done
25,338,536 UART: [fht] FMC Alias Private Key: 7
25,340,080 UART: [art] Derive CDI
25,340,900 UART: [art] Store in in slot 0x4
25,383,557 UART: [art] Derive Key Pair
25,384,603 UART: [art] Store priv key in slot 0x5
28,626,926 UART: [art] Derive Key Pair - Done
28,640,043 UART: [art] Signing Cert with AUTHO
28,641,368 UART: RITY.KEYID = 7
30,921,030 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,539 UART: [art] PUB.X = 6D67D1764C0A45100CD2ECC92D252E94BCE069019F6520057BC3C7EC00838B83D804C58C12C44677C2EF3731DEB1D4CD
30,929,768 UART: [art] PUB.Y = 0827C4DFCA8782EA91450452B50FA31F1A01E4B551E2DD92EFB73F9A22A5E7CBFAB001D44EA624AACB068621260752A1
30,937,015 UART: [art] SIG.R = B66284AEC861F2CA6AC1E36660E0EE2E9EB39330A0D25A9B01A895F653D529A600E30F399A41C873D0530D88BBB5616B
30,944,404 UART: [art] SIG.S = 250975D925CE4343184EA26D678B9D47260DBE2C51A2F3DBF5C68BC3F9A930EFC3E48B60C76AFDF09420B9BC94E0F214
32,249,080 UART: mbox::rt_entry...
32,250,042 UART: ____ _ _ _ ____ _____
32,252,026 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,254,033 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,964 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,258,123 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,260,063 UART: |_|
32,261,056 UART:
32,374,600 UART: [rt] Runtime listening for mailbox commands...
32,376,738 >>> mbox cmd response data (48 bytes)
32,377,364 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,379,718 >>> mbox cmd response data (48 bytes)
32,380,578 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,393,173 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,429 UART:
192,797 UART: Running Caliptra ROM ...
193,958 UART:
194,112 UART: [state] CFI Enabled
265,182 UART: [state] LifecycleState = Unprovisioned
267,091 UART: [state] DebugLocked = No
268,421 UART: [state] WD Timer not started. Device not locked for debugging
272,455 UART: [kat] SHA2-256
451,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,151 UART: [kat] ++
463,689 UART: [kat] sha1
474,709 UART: [kat] SHA2-256
477,709 UART: [kat] SHA2-384
484,400 UART: [kat] SHA2-512-ACC
487,329 UART: [kat] ECC-384
2,948,049 UART: [kat] HMAC-384Kdf
2,972,148 UART: [kat] LMS
3,501,566 UART: [kat] --
3,507,642 UART: [cold-reset] ++
3,508,795 UART: [fht] FHT @ 0x50003400
3,519,203 UART: [idev] ++
3,519,772 UART: [idev] CDI.KEYID = 6
3,520,679 UART: [idev] SUBJECT.KEYID = 7
3,521,919 UART: [idev] UDS.KEYID = 0
3,522,841 ready_for_fw is high
3,523,030 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,621,810 UART: [idev] Erasing UDS.KEYID = 0
6,030,169 UART: [idev] Sha1 KeyId Algorithm
6,053,019 UART: [idev] --
6,056,350 UART: [ldev] ++
6,056,934 UART: [ldev] CDI.KEYID = 6
6,057,817 UART: [ldev] SUBJECT.KEYID = 5
6,059,034 UART: [ldev] AUTHORITY.KEYID = 7
6,060,293 UART: [ldev] FE.KEYID = 1
6,099,286 UART: [ldev] Erasing FE.KEYID = 1
8,600,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,946 UART: [ldev] --
10,392,857 UART: [fwproc] Wait for Commands...
10,395,269 UART: [fwproc] Recv command 0x46574c44
10,397,327 UART: [fwproc] Recv'd Img size: 78456 bytes
13,361,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,430,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,499,209 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,692,236 >>> mbox cmd response: success
13,692,701 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,696,389 UART: [afmc] ++
13,697,002 UART: [afmc] CDI.KEYID = 6
13,697,921 UART: [afmc] SUBJECT.KEYID = 7
13,699,079 UART: [afmc] AUTHORITY.KEYID = 5
16,231,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,952,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,954,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,970,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,986,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,002,428 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,025,320 UART: [afmc] --
18,028,959 UART: [cold-reset] --
18,032,609 UART: [state] Locking Datavault
18,038,554 UART: [state] Locking PCR0, PCR1 and PCR31
18,040,196 UART: [state] Locking ICCM
18,041,565 UART: [exit] Launching FMC @ 0x40000130
18,049,998 UART:
18,050,268 UART: Running Caliptra FMC ...
18,051,296 UART:
18,051,445 UART: [state] CFI Enabled
18,111,535 UART: [fht] FMC Alias Private Key: 7
19,875,852 UART: [art] Extend RT PCRs Done
19,877,068 UART: [art] Lock RT PCRs Done
19,878,342 UART: [art] Populate DV Done
19,883,529 UART: [fht] FMC Alias Private Key: 7
19,885,289 UART: [art] Derive CDI
19,886,030 UART: [art] Store in in slot 0x4
19,944,180 UART: [art] Derive Key Pair
19,945,178 UART: [art] Store priv key in slot 0x5
22,407,975 UART: [art] Derive Key Pair - Done
22,420,964 UART: [art] Signing Cert with AUTHO
22,422,256 UART: RITY.KEYID = 7
24,133,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,135,192 UART: [art] PUB.X = 3B9064E26AFE2F6C0EFE70D718634E8BFACA98F405B3D3467C130E0F1555136468F3F8BCF2F2471E802934D52EBFF23F
24,142,473 UART: [art] PUB.Y = AADBECB396B57FF07958A160F0D5A3B0338B56B01D8B815786541C77E1E70857CC72B46D0F6E26836E9EABE6712EA474
24,149,726 UART: [art] SIG.R = DB2B2F35F0679B2D3D01CEFC6F3312418620E06B10DBAA7498A212FDF2E7120A69168B9FE534775716F550F25051642F
24,157,096 UART: [art] SIG.S = E9796B2CDE9EF20AC611329E06B394353E85C943697E360EE1338C8F92C89D0A45369E9ACFEEA777F67B945B97CA58D5
25,135,136 UART: mbox::rt_entry...
25,136,097 UART: ____ _ _ _ ____ _____
25,138,077 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,140,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,142,005 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,143,937 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,145,863 UART: |_|
25,146,695 UART:
25,259,309 UART: [rt] Runtime listening for mailbox commands...
25,261,485 >>> mbox cmd response data (48 bytes)
25,262,073 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,264,474 >>> mbox cmd response data (48 bytes)
25,265,342 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,277,887 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
3,383,309 ready_for_fw is high
3,384,087 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,502,754 >>> mbox cmd response: success
13,503,444 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,789,656 UART:
17,790,076 UART: Running Caliptra FMC ...
17,791,217 UART:
17,791,373 UART: [state] CFI Enabled
17,858,845 UART: [fht] FMC Alias Private Key: 7
19,623,073 UART: [art] Extend RT PCRs Done
19,624,292 UART: [art] Lock RT PCRs Done
19,626,130 UART: [art] Populate DV Done
19,631,443 UART: [fht] FMC Alias Private Key: 7
19,632,982 UART: [art] Derive CDI
19,633,744 UART: [art] Store in in slot 0x4
19,691,520 UART: [art] Derive Key Pair
19,692,584 UART: [art] Store priv key in slot 0x5
22,155,817 UART: [art] Derive Key Pair - Done
22,168,845 UART: [art] Signing Cert with AUTHO
22,170,170 UART: RITY.KEYID = 7
23,880,979 UART: [art] Erasing AUTHORITY.KEYID = 7
23,882,486 UART: [art] PUB.X = 4A70804AA44B6F6344ABDF0B5813BC0C77D0B7165778BAED95852333528859E9A73B58EE82E057E060A95ABBBA4C373C
23,889,774 UART: [art] PUB.Y = FCF389A164FC8EA14EAC702AC43E9E723A434D33C18726E5B7FB67F8804B27FFB95B1CF680166FFCF3C69AD999748E42
23,897,056 UART: [art] SIG.R = 19A88C95D69ABB2A1B4A7DEBE5BC8E79F58098B1068E048A4284E2B0BFFF2371E78EE6B030DE90C3F4A92136DC02C8A3
23,904,422 UART: [art] SIG.S = 3F13B58827BD19E67C9092F207CFEC270E73CFDD6EEC03A850E2DACE6C99A8AC032EB9755C56F2FAA475FD1C921C9B1E
24,882,413 UART: mbox::rt_entry...
24,883,376 UART: ____ _ _ _ ____ _____
24,885,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,887,571 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,889,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,891,455 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,893,382 UART: |_|
24,894,209 UART:
25,007,213 UART: [rt] Runtime listening for mailbox commands...
25,009,397 >>> mbox cmd response data (48 bytes)
25,010,013 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,012,338 >>> mbox cmd response data (48 bytes)
25,013,195 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,025,746 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
192,955 UART:
193,346 UART: Running Caliptra ROM ...
195,251 UART:
604,206 UART: [state] CFI Enabled
615,390 UART: [state] LifecycleState = Unprovisioned
617,269 UART: [state] DebugLocked = No
619,302 UART: [state] WD Timer not started. Device not locked for debugging
622,914 UART: [kat] SHA2-256
802,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,613 UART: [kat] ++
814,061 UART: [kat] sha1
825,859 UART: [kat] SHA2-256
828,860 UART: [kat] SHA2-384
834,076 UART: [kat] SHA2-512-ACC
837,077 UART: [kat] ECC-384
3,280,214 UART: [kat] HMAC-384Kdf
3,292,525 UART: [kat] LMS
3,822,009 UART: [kat] --
3,824,666 UART: [cold-reset] ++
3,826,385 UART: [fht] FHT @ 0x50003400
3,836,371 UART: [idev] ++
3,836,937 UART: [idev] CDI.KEYID = 6
3,837,975 UART: [idev] SUBJECT.KEYID = 7
3,839,082 UART: [idev] UDS.KEYID = 0
3,840,011 ready_for_fw is high
3,840,212 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,938,818 UART: [idev] Erasing UDS.KEYID = 0
6,313,169 UART: [idev] Sha1 KeyId Algorithm
6,335,909 UART: [idev] --
6,341,146 UART: [ldev] ++
6,341,718 UART: [ldev] CDI.KEYID = 6
6,342,627 UART: [ldev] SUBJECT.KEYID = 5
6,343,844 UART: [ldev] AUTHORITY.KEYID = 7
6,345,098 UART: [ldev] FE.KEYID = 1
6,357,477 UART: [ldev] Erasing FE.KEYID = 1
8,833,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,761 UART: [ldev] --
10,626,603 UART: [fwproc] Wait for Commands...
10,628,481 UART: [fwproc] Recv command 0x46574c44
10,630,575 UART: [fwproc] Recv'd Img size: 78456 bytes
13,591,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,660,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,729,432 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,922,619 >>> mbox cmd response: success
13,923,104 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,926,491 UART: [afmc] ++
13,927,080 UART: [afmc] CDI.KEYID = 6
13,927,969 UART: [afmc] SUBJECT.KEYID = 7
13,929,186 UART: [afmc] AUTHORITY.KEYID = 5
16,428,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,150,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,152,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,168,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,184,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,200,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,222,443 UART: [afmc] --
18,225,772 UART: [cold-reset] --
18,228,123 UART: [state] Locking Datavault
18,233,695 UART: [state] Locking PCR0, PCR1 and PCR31
18,235,348 UART: [state] Locking ICCM
18,238,092 UART: [exit] Launching FMC @ 0x40000130
18,246,508 UART:
18,246,745 UART: Running Caliptra FMC ...
18,247,849 UART:
18,248,014 UART: [state] CFI Enabled
18,256,118 UART: [fht] FMC Alias Private Key: 7
20,013,142 UART: [art] Extend RT PCRs Done
20,014,373 UART: [art] Lock RT PCRs Done
20,016,219 UART: [art] Populate DV Done
20,021,584 UART: [fht] FMC Alias Private Key: 7
20,023,234 UART: [art] Derive CDI
20,024,055 UART: [art] Store in in slot 0x4
20,066,863 UART: [art] Derive Key Pair
20,068,014 UART: [art] Store priv key in slot 0x5
22,494,100 UART: [art] Derive Key Pair - Done
22,507,640 UART: [art] Signing Cert with AUTHO
22,508,941 UART: RITY.KEYID = 7
24,214,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,216,085 UART: [art] PUB.X = C176F5751E0D63C3311AE4BBB15EBB6168D38D9076D3F8401CB05B7291B9AE43E03DE739280E2BDF977881CC75A5F92F
24,223,305 UART: [art] PUB.Y = 80C83284E5AE8AA6BBBEC72DD639CD77FBFD62B48B5A3184769AFDA77A0577B4DDF137ACDF7562A218BA4B044C952CA0
24,230,612 UART: [art] SIG.R = B2B9B4B39934AAE3C382071816BA7F7B2FA90C2D63D40415E7BC04C0E046C9A66580474312EACCB6F3BCC894F7B4F9E5
24,238,026 UART: [art] SIG.S = 7AF99AFC7A3611DB09C8664BBC7BBDB7D7E4EB3FC6C25E104A8B556B6FB8E84A3F47271EBD3B2A9386D70D8A5E2D05C4
25,216,259 UART: mbox::rt_entry...
25,217,220 UART: ____ _ _ _ ____ _____
25,219,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,221,152 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,223,005 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,224,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,226,981 UART: |_|
25,227,792 UART:
25,341,277 UART: [rt] Runtime listening for mailbox commands...
25,343,396 >>> mbox cmd response data (48 bytes)
25,344,042 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,346,394 >>> mbox cmd response data (48 bytes)
25,347,254 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,359,802 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
3,691,954 ready_for_fw is high
3,692,449 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,694,549 >>> mbox cmd response: success
13,695,292 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,952,262 UART:
17,952,676 UART: Running Caliptra FMC ...
17,953,839 UART:
17,954,006 UART: [state] CFI Enabled
17,962,059 UART: [fht] FMC Alias Private Key: 7
19,718,372 UART: [art] Extend RT PCRs Done
19,719,627 UART: [art] Lock RT PCRs Done
19,721,258 UART: [art] Populate DV Done
19,726,903 UART: [fht] FMC Alias Private Key: 7
19,728,449 UART: [art] Derive CDI
19,729,190 UART: [art] Store in in slot 0x4
19,771,582 UART: [art] Derive Key Pair
19,772,626 UART: [art] Store priv key in slot 0x5
22,199,318 UART: [art] Derive Key Pair - Done
22,212,225 UART: [art] Signing Cert with AUTHO
22,213,539 UART: RITY.KEYID = 7
23,919,244 UART: [art] Erasing AUTHORITY.KEYID = 7
23,920,749 UART: [art] PUB.X = 36F6816B5942D462D9DC015FF3DA3DFD02BD897EDBBB0D0D56AAF38CD8849B3EB669C53A601B08EAD76CEE696510E0B4
23,928,018 UART: [art] PUB.Y = FA7F503E0C7103B911074931D39F55C83B28350D840AB8E4627C299A45B982502AF89BB9EBD00C17E7E54E06CDD45DFC
23,935,284 UART: [art] SIG.R = 1D2B8FB0DD730CF14A30898C43C14160F4EA50810B34FEE98C7DA4E169111DB022CD2FD8B7E6E8E94E0468D837816D74
23,942,671 UART: [art] SIG.S = B678D1B730728BC9ED62ED95174F6B2AEE2D5BC6DFF473E50DEDA6826F53189F2C726F3743CF1602DA7A32B22A4662F1
24,921,125 UART: mbox::rt_entry...
24,922,088 UART: ____ _ _ _ ____ _____
24,924,077 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,926,095 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,928,033 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,930,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,931,951 UART: |_|
24,932,761 UART:
25,046,100 UART: [rt] Runtime listening for mailbox commands...
25,048,232 >>> mbox cmd response data (48 bytes)
25,048,852 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,051,193 >>> mbox cmd response data (48 bytes)
25,052,092 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,064,649 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,596 UART:
192,973 UART: Running Caliptra ROM ...
194,081 UART:
194,226 UART: [state] CFI Enabled
263,739 UART: [state] LifecycleState = Unprovisioned
266,097 UART: [state] DebugLocked = No
267,414 UART: [state] WD Timer not started. Device not locked for debugging
272,525 UART: [kat] SHA2-256
462,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,153 UART: [kat] ++
473,604 UART: [kat] sha1
484,617 UART: [kat] SHA2-256
487,623 UART: [kat] SHA2-384
493,826 UART: [kat] SHA2-512-ACC
496,433 UART: [kat] ECC-384
2,946,219 UART: [kat] HMAC-384Kdf
2,969,400 UART: [kat] LMS
3,501,206 UART: [kat] --
3,504,563 UART: [cold-reset] ++
3,507,057 UART: [fht] FHT @ 0x50003400
3,519,172 UART: [idev] ++
3,519,808 UART: [idev] CDI.KEYID = 6
3,520,760 UART: [idev] SUBJECT.KEYID = 7
3,522,001 UART: [idev] UDS.KEYID = 0
3,522,901 ready_for_fw is high
3,523,083 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,622,035 UART: [idev] Erasing UDS.KEYID = 0
6,023,693 UART: [idev] Sha1 KeyId Algorithm
6,046,171 UART: [idev] --
6,051,299 UART: [ldev] ++
6,052,056 UART: [ldev] CDI.KEYID = 6
6,052,945 UART: [ldev] SUBJECT.KEYID = 5
6,054,101 UART: [ldev] AUTHORITY.KEYID = 7
6,055,328 UART: [ldev] FE.KEYID = 1
6,097,654 UART: [ldev] Erasing FE.KEYID = 1
8,604,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,599 UART: [ldev] --
10,410,692 UART: [fwproc] Wait for Commands...
10,413,002 UART: [fwproc] Recv command 0x46574c44
10,415,257 UART: [fwproc] Recv'd Img size: 78456 bytes
13,417,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,497,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,614,149 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,941,709 >>> mbox cmd response: success
13,942,166 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,945,829 UART: [afmc] ++
13,946,534 UART: [afmc] CDI.KEYID = 6
13,947,644 UART: [afmc] SUBJECT.KEYID = 7
13,949,195 UART: [afmc] AUTHORITY.KEYID = 5
16,485,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,227,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,228,997 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,244,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,259,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,274,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,298,009 UART: [afmc] --
18,301,453 UART: [cold-reset] --
18,306,456 UART: [state] Locking Datavault
18,310,713 UART: [state] Locking PCR0, PCR1 and PCR31
18,312,867 UART: [state] Locking ICCM
18,315,072 UART: [exit] Launching FMC @ 0x40000130
18,323,712 UART:
18,323,942 UART: Running Caliptra FMC ...
18,325,040 UART:
18,325,201 UART: [state] CFI Enabled
18,384,837 UART: [fht] FMC Alias Private Key: 7
20,148,161 UART: [art] Extend RT PCRs Done
20,149,393 UART: [art] Lock RT PCRs Done
20,151,103 UART: [art] Populate DV Done
20,156,677 UART: [fht] FMC Alias Private Key: 7
20,158,369 UART: [art] Derive CDI
20,159,105 UART: [art] Store in in slot 0x4
20,217,631 UART: [art] Derive Key Pair
20,218,669 UART: [art] Store priv key in slot 0x5
22,681,817 UART: [art] Derive Key Pair - Done
22,694,437 UART: [art] Signing Cert with AUTHO
22,695,734 UART: RITY.KEYID = 7
24,408,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,409,631 UART: [art] PUB.X = 08DD63FE8833BF1B661C7B4C403A664719173085D3ACC39D31A8FDB643263FD77BC22D4F283E199A6BA44FC1BD8C68A2
24,416,895 UART: [art] PUB.Y = 7B98C0F0FC7A97BB09592AAD7A5F237E4EAADA26070666637A27D6D8E9A0841966593EFDF53CBA78E70112D50B443B95
24,424,180 UART: [art] SIG.R = 7DA0034FE2E77C047806F4AEDCEE9E27474323D415F26C1776276E39B1E1083E1310E5D96656605296C4B6F95C8B70D5
24,431,551 UART: [art] SIG.S = BBC0538EEA435BB92B4DD4025871B12F4B6A2D8778E831E4028D8E853FBB12EC7F48DECA1AC760E1EFF56205E7077771
25,409,606 UART: mbox::rt_entry...
25,410,575 UART: ____ _ _ _ ____ _____
25,412,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,414,505 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,416,429 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,418,353 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,420,278 UART: |_|
25,421,269 UART:
25,534,486 UART: [rt] Runtime listening for mailbox commands...
25,536,604 >>> mbox cmd response data (48 bytes)
25,537,204 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,539,521 >>> mbox cmd response data (48 bytes)
25,540,547 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,553,117 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,440,986 ready_for_fw is high
3,441,407 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,972,813 >>> mbox cmd response: success
13,973,371 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,257,888 UART:
18,258,277 UART: Running Caliptra FMC ...
18,259,401 UART:
18,259,560 UART: [state] CFI Enabled
18,325,333 UART: [fht] FMC Alias Private Key: 7
20,089,195 UART: [art] Extend RT PCRs Done
20,090,424 UART: [art] Lock RT PCRs Done
20,091,941 UART: [art] Populate DV Done
20,097,249 UART: [fht] FMC Alias Private Key: 7
20,098,838 UART: [art] Derive CDI
20,099,584 UART: [art] Store in in slot 0x4
20,157,412 UART: [art] Derive Key Pair
20,158,415 UART: [art] Store priv key in slot 0x5
22,620,550 UART: [art] Derive Key Pair - Done
22,633,554 UART: [art] Signing Cert with AUTHO
22,634,856 UART: RITY.KEYID = 7
24,346,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,348,108 UART: [art] PUB.X = 7F51681BC2CBB1C8F19D0B1EB59C561972741A8F628E2F6CE8D080BDFCE4ECF2D3AE49402CAB09387625A372A04A431C
24,355,379 UART: [art] PUB.Y = 20CBEEC966A44B54F97842E76D13244D49C2FA79D1BE76C5B377F50719EB31D4ED26DB2F07ACBF33E27793291F9B1793
24,362,666 UART: [art] SIG.R = AAB90E401C9B349F985F253310064DA9249620A82CEEF8E4F88927E3D1972BAE8171B56EC6A84CA33BAE981B65A31421
24,370,070 UART: [art] SIG.S = 08286A284A8A83A11EE2AE2378415E413F9440AB0FA315EA95B30027657A308C77EB5D6B0F228E8AE48C8DC42E7C7F46
25,348,348 UART: mbox::rt_entry...
25,349,307 UART: ____ _ _ _ ____ _____
25,351,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,353,238 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,355,116 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,357,080 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,358,937 UART: |_|
25,359,763 UART:
25,473,823 UART: [rt] Runtime listening for mailbox commands...
25,475,999 >>> mbox cmd response data (48 bytes)
25,476,598 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,478,944 >>> mbox cmd response data (48 bytes)
25,479,793 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,492,331 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,756 writing to cptra_bootfsm_go
192,851 UART:
193,525 UART: Running Caliptra ROM ...
194,648 UART:
603,941 UART: [state] CFI Enabled
615,190 UART: [state] LifecycleState = Unprovisioned
617,560 UART: [state] DebugLocked = No
619,738 UART: [state] WD Timer not started. Device not locked for debugging
624,843 UART: [kat] SHA2-256
814,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,461 UART: [kat] ++
826,069 UART: [kat] sha1
838,349 UART: [kat] SHA2-256
841,401 UART: [kat] SHA2-384
847,190 UART: [kat] SHA2-512-ACC
849,776 UART: [kat] ECC-384
3,288,977 UART: [kat] HMAC-384Kdf
3,301,788 UART: [kat] LMS
3,833,607 UART: [kat] --
3,838,949 UART: [cold-reset] ++
3,840,172 UART: [fht] FHT @ 0x50003400
3,852,009 UART: [idev] ++
3,852,734 UART: [idev] CDI.KEYID = 6
3,853,618 UART: [idev] SUBJECT.KEYID = 7
3,854,809 UART: [idev] UDS.KEYID = 0
3,855,800 ready_for_fw is high
3,855,995 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,954,746 UART: [idev] Erasing UDS.KEYID = 0
6,336,630 UART: [idev] Sha1 KeyId Algorithm
6,359,260 UART: [idev] --
6,362,636 UART: [ldev] ++
6,363,383 UART: [ldev] CDI.KEYID = 6
6,364,266 UART: [ldev] SUBJECT.KEYID = 5
6,365,364 UART: [ldev] AUTHORITY.KEYID = 7
6,366,645 UART: [ldev] FE.KEYID = 1
6,379,157 UART: [ldev] Erasing FE.KEYID = 1
8,856,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,656 UART: [ldev] --
10,646,973 UART: [fwproc] Wait for Commands...
10,649,549 UART: [fwproc] Recv command 0x46574c44
10,651,878 UART: [fwproc] Recv'd Img size: 78456 bytes
13,664,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,740,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,856,796 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,183,963 >>> mbox cmd response: success
14,184,425 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,188,552 UART: [afmc] ++
14,189,252 UART: [afmc] CDI.KEYID = 6
14,190,505 UART: [afmc] SUBJECT.KEYID = 7
14,191,953 UART: [afmc] AUTHORITY.KEYID = 5
16,693,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,416,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,418,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,433,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,448,834 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,463,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,488,582 UART: [afmc] --
18,492,348 UART: [cold-reset] --
18,497,132 UART: [state] Locking Datavault
18,503,580 UART: [state] Locking PCR0, PCR1 and PCR31
18,505,786 UART: [state] Locking ICCM
18,507,030 UART: [exit] Launching FMC @ 0x40000130
18,515,718 UART:
18,515,992 UART: Running Caliptra FMC ...
18,517,106 UART:
18,517,274 UART: [state] CFI Enabled
18,525,541 UART: [fht] FMC Alias Private Key: 7
20,282,993 UART: [art] Extend RT PCRs Done
20,284,210 UART: [art] Lock RT PCRs Done
20,286,103 UART: [art] Populate DV Done
20,291,782 UART: [fht] FMC Alias Private Key: 7
20,293,331 UART: [art] Derive CDI
20,294,165 UART: [art] Store in in slot 0x4
20,336,760 UART: [art] Derive Key Pair
20,337,759 UART: [art] Store priv key in slot 0x5
22,764,915 UART: [art] Derive Key Pair - Done
22,777,650 UART: [art] Signing Cert with AUTHO
22,778,958 UART: RITY.KEYID = 7
24,484,577 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,085 UART: [art] PUB.X = 06A1D1D4720848D56077F4824E36B469C477B6FE88B64F4D3CBAA20092147913BBCDBEEE0EA4CF16636576DDB06027CE
24,493,311 UART: [art] PUB.Y = 5104C9DC6AE7DF7C4B72835104C1D4FC8927225D515380B3A9B0C6326DAC6F10F459BE2589744F6E6C953057EE6EABEF
24,500,616 UART: [art] SIG.R = 8F133AECC79FF067434477C902BCB5E7F95FAB66AF988F32B360F0E76C6C5275610385A2E11405298F3651FE4F28A9B8
24,507,990 UART: [art] SIG.S = F1CEC4CBA4ABFCEC22CEA312A296FE1A4455C73D34407C46E6FEF78A12205EFF6198979A244BAD26B7F2094D1E7397EF
25,487,060 UART: mbox::rt_entry...
25,488,032 UART: ____ _ _ _ ____ _____
25,489,940 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,491,956 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,493,894 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,495,845 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,497,777 UART: |_|
25,498,609 UART:
25,611,521 UART: [rt] Runtime listening for mailbox commands...
25,613,629 >>> mbox cmd response data (48 bytes)
25,614,234 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,616,587 >>> mbox cmd response data (48 bytes)
25,617,442 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,629,988 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
3,756,251 ready_for_fw is high
3,756,651 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,189,283 >>> mbox cmd response: success
14,189,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,437,199 UART:
18,437,632 UART: Running Caliptra FMC ...
18,438,735 UART:
18,438,892 UART: [state] CFI Enabled
18,446,839 UART: [fht] FMC Alias Private Key: 7
20,203,278 UART: [art] Extend RT PCRs Done
20,204,518 UART: [art] Lock RT PCRs Done
20,206,609 UART: [art] Populate DV Done
20,212,132 UART: [fht] FMC Alias Private Key: 7
20,213,782 UART: [art] Derive CDI
20,214,519 UART: [art] Store in in slot 0x4
20,257,161 UART: [art] Derive Key Pair
20,258,167 UART: [art] Store priv key in slot 0x5
22,685,631 UART: [art] Derive Key Pair - Done
22,698,873 UART: [art] Signing Cert with AUTHO
22,700,190 UART: RITY.KEYID = 7
24,405,445 UART: [art] Erasing AUTHORITY.KEYID = 7
24,406,931 UART: [art] PUB.X = 2C052F92DCCEA37811F79B67B61274FEE0E4BBC0F4484146671474520A86181DF5E5D522763563F7974ECED70616552C
24,414,217 UART: [art] PUB.Y = 08C7E14E6E3ED72339B4908C242A0550E6A62EBCC49DECD269B564772E27FBC46D07D3667CE3352F22376FA839DEFC09
24,421,436 UART: [art] SIG.R = 4C110453EB9C46360CEF967861D4063A39FD0850B96B89C1682F1A0DADE9A78F0E057FD56A2E030F717566B4B37F92BD
24,428,819 UART: [art] SIG.S = 288B8F502DED8787F901166C8C1AC85132BFFB96F563A1701C72B7DCF84A3018DA4277D22FC5F33D9E614741F316C5F0
25,407,478 UART: mbox::rt_entry...
25,408,449 UART: ____ _ _ _ ____ _____
25,410,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,412,389 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,414,245 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,416,204 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,418,091 UART: |_|
25,418,982 UART:
25,531,934 UART: [rt] Runtime listening for mailbox commands...
25,534,110 >>> mbox cmd response data (48 bytes)
25,534,726 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,537,051 >>> mbox cmd response data (48 bytes)
25,537,868 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,550,414 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,068 UART: [kat] LMS
1,475,264 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,671 UART: [fht] Storing FHT @ 0x50003400
1,479,492 UART: [idev] ++
1,479,660 UART: [idev] CDI.KEYID = 6
1,480,020 UART: [idev] SUBJECT.KEYID = 7
1,480,444 UART: [idev] UDS.KEYID = 0
1,480,789 ready_for_fw is high
1,480,789 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,092 UART: [idev] Erasing UDS.KEYID = 0
1,503,994 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,628 UART: [idev] --
1,513,651 UART: [ldev] ++
1,513,819 UART: [ldev] CDI.KEYID = 6
1,514,182 UART: [ldev] SUBJECT.KEYID = 5
1,514,608 UART: [ldev] AUTHORITY.KEYID = 7
1,515,071 UART: [ldev] FE.KEYID = 1
1,520,249 UART: [ldev] Erasing FE.KEYID = 1
1,545,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,410 UART: [ldev] --
1,584,865 UART: [fwproc] Waiting for Commands...
1,585,732 UART: [fwproc] Received command 0x46574c44
1,586,523 UART: [fwproc] Received Image of size 78456 bytes
2,474,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,302 >>> mbox cmd response: success
2,614,302 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,615,538 UART: [afmc] ++
2,615,706 UART: [afmc] CDI.KEYID = 6
2,616,068 UART: [afmc] SUBJECT.KEYID = 7
2,616,493 UART: [afmc] AUTHORITY.KEYID = 5
2,651,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,963 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,653 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,538 UART: [afmc] --
2,694,578 UART: [cold-reset] --
2,695,608 UART: [state] Locking Datavault
2,696,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,219 UART: [state] Locking ICCM
2,697,883 UART: [exit] Launching FMC @ 0x40000130
2,703,212 UART:
2,703,228 UART: Running Caliptra FMC ...
2,703,636 UART:
2,703,690 UART: [state] CFI Enabled
2,713,865 UART: [fht] FMC Alias Private Key: 7
2,821,384 UART: [art] Extend RT PCRs Done
2,821,812 UART: [art] Lock RT PCRs Done
2,823,066 UART: [art] Populate DV Done
2,831,377 UART: [fht] FMC Alias Private Key: 7
2,832,545 UART: [art] Derive CDI
2,832,825 UART: [art] Store in in slot 0x4
2,918,752 UART: [art] Derive Key Pair
2,919,112 UART: [art] Store priv key in slot 0x5
2,932,338 UART: [art] Derive Key Pair - Done
2,946,906 UART: [art] Signing Cert with AUTHO
2,947,386 UART: RITY.KEYID = 7
2,962,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,565 UART: [art] PUB.X = A9CB92274C6C3DFC6C5127F9AA29F9915EC8C14FC0DF39C2A017C97C4C01E4534CA53E4F91DFE4EECD63826A9C3BDF00
2,970,332 UART: [art] PUB.Y = 24C50E5712F90C1D6695DE25F8A3DD561306BE80824F248AB39F966791E83AA6428358B8853DC2436610372977246828
2,977,257 UART: [art] SIG.R = 9CD1A8E17B2D49E3BC177726718C340FC50817A636550EE8D13776CC58085B98733EFBFEA965467588E42E2DB2088B65
2,984,010 UART: [art] SIG.S = 98FB4C26E963267F99EECCECA1DF7BB0EF9CEF6BFFA347707894A8314D2BB0596A12E19A59A2699259E5EAEFB74D5203
3,007,492 UART: mbox::rt_entry...
3,007,864 UART: ____ _ _ _ ____ _____
3,008,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,216 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,752 UART: |_|
3,012,064 UART:
3,118,431 UART: [rt] Runtime listening for mailbox commands...
3,119,612 >>> mbox cmd response data (48 bytes)
3,119,613 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,122,396 >>> mbox cmd response data (48 bytes)
3,122,397 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,135,335 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,345 ready_for_fw is high
1,362,345 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,464,378 >>> mbox cmd response: success
2,464,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,526,128 UART:
2,526,144 UART: Running Caliptra FMC ...
2,526,552 UART:
2,526,606 UART: [state] CFI Enabled
2,537,269 UART: [fht] FMC Alias Private Key: 7
2,645,748 UART: [art] Extend RT PCRs Done
2,646,176 UART: [art] Lock RT PCRs Done
2,647,678 UART: [art] Populate DV Done
2,656,141 UART: [fht] FMC Alias Private Key: 7
2,657,263 UART: [art] Derive CDI
2,657,543 UART: [art] Store in in slot 0x4
2,743,036 UART: [art] Derive Key Pair
2,743,396 UART: [art] Store priv key in slot 0x5
2,756,128 UART: [art] Derive Key Pair - Done
2,771,023 UART: [art] Signing Cert with AUTHO
2,771,503 UART: RITY.KEYID = 7
2,786,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,170 UART: [art] PUB.X = 61EFB5BA9D3316F07F6677A027E908F9D6E369A23DA850FBE82A402AD1030D488C668C8B9DA8221AD26B076DFFAE9F06
2,793,937 UART: [art] PUB.Y = 332E088638AE500CB3F12F311463F6601C8BB1A576CC593259F6C2231C140E9244161585937D1E9D821433D8E10ED3EF
2,800,867 UART: [art] SIG.R = 6C02DA43D21BE303DBD4453DAB66D8C4B0D776B223992993497E02EEB850E32E8D554AC798CD3C82E59F6D5429A88C9C
2,807,636 UART: [art] SIG.S = B07E36B94929F6E3B64C88CBBF26CE9FC9162998A9A04BF3C8C5861E84A3F5EF3FA76FE4F8AFEB981CCF0AD1D84D8F1E
2,831,434 UART: mbox::rt_entry...
2,831,806 UART: ____ _ _ _ ____ _____
2,832,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,694 UART: |_|
2,836,006 UART:
2,942,078 UART: [rt] Runtime listening for mailbox commands...
2,943,259 >>> mbox cmd response data (48 bytes)
2,943,260 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,946,043 >>> mbox cmd response data (48 bytes)
2,946,044 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,958,982 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
891,042 UART: [kat] SHA2-256
892,980 UART: [kat] SHA2-384
895,753 UART: [kat] SHA2-512-ACC
897,654 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
908,137 UART: [kat] LMS
1,476,333 UART: [kat] --
1,477,154 UART: [cold-reset] ++
1,477,652 UART: [fht] Storing FHT @ 0x50003400
1,480,449 UART: [idev] ++
1,480,617 UART: [idev] CDI.KEYID = 6
1,480,977 UART: [idev] SUBJECT.KEYID = 7
1,481,401 UART: [idev] UDS.KEYID = 0
1,481,746 ready_for_fw is high
1,481,746 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,489,315 UART: [idev] Erasing UDS.KEYID = 0
1,505,625 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,121 UART: [idev] --
1,515,170 UART: [ldev] ++
1,515,338 UART: [ldev] CDI.KEYID = 6
1,515,701 UART: [ldev] SUBJECT.KEYID = 5
1,516,127 UART: [ldev] AUTHORITY.KEYID = 7
1,516,590 UART: [ldev] FE.KEYID = 1
1,521,942 UART: [ldev] Erasing FE.KEYID = 1
1,547,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,489 UART: [ldev] --
1,586,964 UART: [fwproc] Waiting for Commands...
1,587,671 UART: [fwproc] Received command 0x46574c44
1,588,462 UART: [fwproc] Received Image of size 78456 bytes
2,475,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,490 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,842 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,613,915 >>> mbox cmd response: success
2,613,915 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,615,029 UART: [afmc] ++
2,615,197 UART: [afmc] CDI.KEYID = 6
2,615,559 UART: [afmc] SUBJECT.KEYID = 7
2,615,984 UART: [afmc] AUTHORITY.KEYID = 5
2,651,163 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,648 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,338 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,075 UART: [afmc] --
2,694,173 UART: [cold-reset] --
2,694,789 UART: [state] Locking Datavault
2,695,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,558 UART: [state] Locking ICCM
2,697,122 UART: [exit] Launching FMC @ 0x40000130
2,702,451 UART:
2,702,467 UART: Running Caliptra FMC ...
2,702,875 UART:
2,703,018 UART: [state] CFI Enabled
2,713,441 UART: [fht] FMC Alias Private Key: 7
2,821,410 UART: [art] Extend RT PCRs Done
2,821,838 UART: [art] Lock RT PCRs Done
2,823,160 UART: [art] Populate DV Done
2,831,301 UART: [fht] FMC Alias Private Key: 7
2,832,413 UART: [art] Derive CDI
2,832,693 UART: [art] Store in in slot 0x4
2,918,236 UART: [art] Derive Key Pair
2,918,596 UART: [art] Store priv key in slot 0x5
2,931,684 UART: [art] Derive Key Pair - Done
2,946,526 UART: [art] Signing Cert with AUTHO
2,947,006 UART: RITY.KEYID = 7
2,961,790 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,555 UART: [art] PUB.X = 3F7D73B913AAC198576F062AB32134D9184912659559B8B10ACAB9BCD458946024C634A5387E54C5B440EB0AE28D3DD4
2,969,316 UART: [art] PUB.Y = EFA188B8505AE2F4761D46DA27830DE8183F5994C7102E73709617A6F41A8866B95A018D6E4449D5460320381678617D
2,976,243 UART: [art] SIG.R = FCB951F31DB4D8D31B09BAE48FF88AA2D2117A7703D348898EEC8B008B5F6AA1D860A8CCAC057131F7C8F66B2F09659C
2,982,995 UART: [art] SIG.S = DBC93415A86B92EFC7B324AC2E094191D3DECCE105AC5E6DBE170A7356CE863FDBE516A1ED02ECFAE833B3E36F6D2FAB
3,006,988 UART: mbox::rt_entry...
3,007,360 UART: ____ _ _ _ ____ _____
3,008,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,248 UART: |_|
3,011,560 UART:
3,118,131 UART: [rt] Runtime listening for mailbox commands...
3,119,312 >>> mbox cmd response data (48 bytes)
3,119,313 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,122,096 >>> mbox cmd response data (48 bytes)
3,122,097 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,135,035 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 ready_for_fw is high
1,362,710 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,464,609 >>> mbox cmd response: success
2,464,609 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,525,975 UART:
2,525,991 UART: Running Caliptra FMC ...
2,526,399 UART:
2,526,542 UART: [state] CFI Enabled
2,537,259 UART: [fht] FMC Alias Private Key: 7
2,645,116 UART: [art] Extend RT PCRs Done
2,645,544 UART: [art] Lock RT PCRs Done
2,647,088 UART: [art] Populate DV Done
2,655,427 UART: [fht] FMC Alias Private Key: 7
2,656,565 UART: [art] Derive CDI
2,656,845 UART: [art] Store in in slot 0x4
2,742,624 UART: [art] Derive Key Pair
2,742,984 UART: [art] Store priv key in slot 0x5
2,756,872 UART: [art] Derive Key Pair - Done
2,771,593 UART: [art] Signing Cert with AUTHO
2,772,073 UART: RITY.KEYID = 7
2,786,955 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,720 UART: [art] PUB.X = 48D29E4F4B49FD47FDD3C49700C6B82864A1A575CC8EA4F8DC8852541DCFED2B1357B982BFC228C7721CE7B0FCF5BAC5
2,794,488 UART: [art] PUB.Y = 8E0782E10F24E2D9CB3B2AF96A5CF93B860C887F32425F74B62B389EF0791DBF490FD2A60DFE0893C107A8CD4242C58D
2,801,427 UART: [art] SIG.R = F71885CEBC0BC92CADB7F14BA1A79A74025EE1D64642CBB32DF5FDCEE3C7127E6EB7A66E1AE798536F1D9DCB5B7C7A2E
2,808,221 UART: [art] SIG.S = C59B56184AEA0E16BFF2485ED7E8E7FA674DBF166AAC139581FB9CE50D8634B02CF6F9EADF9E250A095970B67C29D457
2,831,612 UART: mbox::rt_entry...
2,831,984 UART: ____ _ _ _ ____ _____
2,832,768 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,336 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,104 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,872 UART: |_|
2,836,184 UART:
2,944,305 UART: [rt] Runtime listening for mailbox commands...
2,945,486 >>> mbox cmd response data (48 bytes)
2,945,487 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,948,270 >>> mbox cmd response data (48 bytes)
2,948,271 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,961,209 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,230 UART: [kat] SHA2-512-ACC
908,131 UART: [kat] ECC-384
917,672 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,535 UART: [cold-reset] ++
1,172,043 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 ready_for_fw is high
1,176,001 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,702 UART: [idev] Erasing UDS.KEYID = 0
1,200,447 UART: [idev] Sha1 KeyId Algorithm
1,208,869 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,472 UART: [ldev] SUBJECT.KEYID = 5
1,210,898 UART: [ldev] AUTHORITY.KEYID = 7
1,211,361 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,906 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,404 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,134 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,193 >>> mbox cmd response: success
2,308,193 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,309,451 UART: [afmc] ++
2,309,619 UART: [afmc] CDI.KEYID = 6
2,309,981 UART: [afmc] SUBJECT.KEYID = 7
2,310,406 UART: [afmc] AUTHORITY.KEYID = 5
2,346,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,466 UART: [afmc] --
2,389,446 UART: [cold-reset] --
2,390,388 UART: [state] Locking Datavault
2,391,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,949 UART: [state] Locking ICCM
2,392,519 UART: [exit] Launching FMC @ 0x40000130
2,397,848 UART:
2,397,864 UART: Running Caliptra FMC ...
2,398,272 UART:
2,398,326 UART: [state] CFI Enabled
2,408,779 UART: [fht] FMC Alias Private Key: 7
2,515,712 UART: [art] Extend RT PCRs Done
2,516,140 UART: [art] Lock RT PCRs Done
2,517,744 UART: [art] Populate DV Done
2,525,813 UART: [fht] FMC Alias Private Key: 7
2,526,771 UART: [art] Derive CDI
2,527,051 UART: [art] Store in in slot 0x4
2,612,596 UART: [art] Derive Key Pair
2,612,956 UART: [art] Store priv key in slot 0x5
2,626,092 UART: [art] Derive Key Pair - Done
2,640,736 UART: [art] Signing Cert with AUTHO
2,641,216 UART: RITY.KEYID = 7
2,656,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,659 UART: [art] PUB.X = A6F771AC7604E950A02C43C0291650AC0CE9C102F3F236C6E5EEDB2DD1EA566037133852756ADD730D962CA8D0353878
2,664,419 UART: [art] PUB.Y = 79E0D99CD72A48D367CEC7AA65A42383D93865D636F2FD60E417D7365941694C9AEF40E558E403F28C63BFF9FFEED8EE
2,671,378 UART: [art] SIG.R = DC0E1765ACF53FFF24F25EF689C3E9856C0325538D4D05C6B63263AAB7723DEF7830074EA3271B879984552D692DC1B9
2,678,138 UART: [art] SIG.S = 0E672C514A3CA8298D3AB88CD54B96AD4B7C146653086035EFE9B88AC4A2615C3506C954B8A5D564D96092F09E787E8D
2,702,138 UART: mbox::rt_entry...
2,702,510 UART: ____ _ _ _ ____ _____
2,703,294 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,862 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,630 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,398 UART: |_|
2,706,710 UART:
2,813,398 UART: [rt] Runtime listening for mailbox commands...
2,814,579 >>> mbox cmd response data (48 bytes)
2,814,580 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,817,363 >>> mbox cmd response data (48 bytes)
2,817,364 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,830,302 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,591 ready_for_fw is high
1,060,591 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,160,548 >>> mbox cmd response: success
2,160,548 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,222,414 UART:
2,222,430 UART: Running Caliptra FMC ...
2,222,838 UART:
2,222,892 UART: [state] CFI Enabled
2,233,559 UART: [fht] FMC Alias Private Key: 7
2,342,264 UART: [art] Extend RT PCRs Done
2,342,692 UART: [art] Lock RT PCRs Done
2,344,144 UART: [art] Populate DV Done
2,352,569 UART: [fht] FMC Alias Private Key: 7
2,353,593 UART: [art] Derive CDI
2,353,873 UART: [art] Store in in slot 0x4
2,439,098 UART: [art] Derive Key Pair
2,439,458 UART: [art] Store priv key in slot 0x5
2,452,480 UART: [art] Derive Key Pair - Done
2,466,962 UART: [art] Signing Cert with AUTHO
2,467,442 UART: RITY.KEYID = 7
2,482,408 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,173 UART: [art] PUB.X = 30B55A424C0E4252B741925C3CFB4C677E8403457DB1F7A5B79A8BBEAD4D757F3DB26CD3C2AF90DDFD1FEECD6256759F
2,489,957 UART: [art] PUB.Y = B6FE3AF05AD6ED54043CEB00935CF77300685224A12833744B4DC632C9B06D89FAD7CD534D7A475A841B78A3B6B3AADC
2,496,872 UART: [art] SIG.R = 1072FC6E031082AA83716554206B9D8576DB529E840F5DA767C0699524E4C2032049A46A459BC24F49B4B018568DCD18
2,503,623 UART: [art] SIG.S = ABFB13B263A80D4DDACF53CBD484BFD3BE8B2B47C3DC0C09AD58D003A8A21EDFC186022BCBE0CE84A2E484434B0ED66B
2,527,126 UART: mbox::rt_entry...
2,527,498 UART: ____ _ _ _ ____ _____
2,528,282 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,082 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,850 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,618 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,386 UART: |_|
2,531,698 UART:
2,638,490 UART: [rt] Runtime listening for mailbox commands...
2,639,671 >>> mbox cmd response data (48 bytes)
2,639,672 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,642,455 >>> mbox cmd response data (48 bytes)
2,642,456 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,655,394 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
907,149 UART: [kat] SHA2-512-ACC
909,050 UART: [kat] ECC-384
919,049 UART: [kat] HMAC-384Kdf
923,635 UART: [kat] LMS
1,171,963 UART: [kat] --
1,173,012 UART: [cold-reset] ++
1,173,364 UART: [fht] FHT @ 0x50003400
1,176,047 UART: [idev] ++
1,176,215 UART: [idev] CDI.KEYID = 6
1,176,575 UART: [idev] SUBJECT.KEYID = 7
1,176,999 UART: [idev] UDS.KEYID = 0
1,177,344 ready_for_fw is high
1,177,344 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,951 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,464 UART: [idev] --
1,211,752 UART: [ldev] ++
1,211,920 UART: [ldev] CDI.KEYID = 6
1,212,283 UART: [ldev] SUBJECT.KEYID = 5
1,212,709 UART: [ldev] AUTHORITY.KEYID = 7
1,213,172 UART: [ldev] FE.KEYID = 1
1,218,544 UART: [ldev] Erasing FE.KEYID = 1
1,244,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,148 UART: [ldev] --
1,284,447 UART: [fwproc] Wait for Commands...
1,285,083 UART: [fwproc] Recv command 0x46574c44
1,285,811 UART: [fwproc] Recv'd Img size: 78456 bytes
2,173,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,757 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,311,780 >>> mbox cmd response: success
2,311,780 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,312,870 UART: [afmc] ++
2,313,038 UART: [afmc] CDI.KEYID = 6
2,313,400 UART: [afmc] SUBJECT.KEYID = 7
2,313,825 UART: [afmc] AUTHORITY.KEYID = 5
2,349,264 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,561 UART: [afmc] --
2,392,559 UART: [cold-reset] --
2,393,563 UART: [state] Locking Datavault
2,394,800 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,404 UART: [state] Locking ICCM
2,395,826 UART: [exit] Launching FMC @ 0x40000130
2,401,155 UART:
2,401,171 UART: Running Caliptra FMC ...
2,401,579 UART:
2,401,722 UART: [state] CFI Enabled
2,412,203 UART: [fht] FMC Alias Private Key: 7
2,520,436 UART: [art] Extend RT PCRs Done
2,520,864 UART: [art] Lock RT PCRs Done
2,522,296 UART: [art] Populate DV Done
2,530,553 UART: [fht] FMC Alias Private Key: 7
2,531,565 UART: [art] Derive CDI
2,531,845 UART: [art] Store in in slot 0x4
2,617,692 UART: [art] Derive Key Pair
2,618,052 UART: [art] Store priv key in slot 0x5
2,631,534 UART: [art] Derive Key Pair - Done
2,646,264 UART: [art] Signing Cert with AUTHO
2,646,744 UART: RITY.KEYID = 7
2,661,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,579 UART: [art] PUB.X = BFC25ED98C192B0396B5A6CA064CBF08D1757A969AC426A5700B561D938A91A94AC483EAD252AF00D9C42ABFA6BFCDAD
2,669,337 UART: [art] PUB.Y = C18FB05C0CBEF390BFD4185463C24A09C7DDD7C3070ABA88E4212FD3827D14831172B97C2AB7FBEF42F5AB108A9C8272
2,676,289 UART: [art] SIG.R = 616F6AB05BEA118F481E1F33E78106C426A81BAEC7C7713C92E0338D1BD033A0F9C182A6197EA091ABD74545AB7F8A70
2,683,064 UART: [art] SIG.S = A1E68E7D15BA8BEAD1B6A7E3EE49FA286BC9A0705BFDB8A3EFABD82C8D4D9765480EFC1AD12BBE533BF702F11BC16B18
2,706,393 UART: mbox::rt_entry...
2,706,765 UART: ____ _ _ _ ____ _____
2,707,549 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,653 UART: |_|
2,710,965 UART:
2,817,221 UART: [rt] Runtime listening for mailbox commands...
2,818,402 >>> mbox cmd response data (48 bytes)
2,818,403 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,821,186 >>> mbox cmd response data (48 bytes)
2,821,187 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,834,125 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,284 ready_for_fw is high
1,060,284 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,161,949 >>> mbox cmd response: success
2,161,949 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,867 UART:
2,223,883 UART: Running Caliptra FMC ...
2,224,291 UART:
2,224,434 UART: [state] CFI Enabled
2,234,749 UART: [fht] FMC Alias Private Key: 7
2,342,624 UART: [art] Extend RT PCRs Done
2,343,052 UART: [art] Lock RT PCRs Done
2,344,696 UART: [art] Populate DV Done
2,352,941 UART: [fht] FMC Alias Private Key: 7
2,353,957 UART: [art] Derive CDI
2,354,237 UART: [art] Store in in slot 0x4
2,440,182 UART: [art] Derive Key Pair
2,440,542 UART: [art] Store priv key in slot 0x5
2,453,950 UART: [art] Derive Key Pair - Done
2,468,604 UART: [art] Signing Cert with AUTHO
2,469,084 UART: RITY.KEYID = 7
2,484,140 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,905 UART: [art] PUB.X = E25E56B833E536D0F2F0F6310320C91466DF9113740B944C6DC0DD92B2B8F03A4FF5F271F5648AE0E37E264F73FF2547
2,491,671 UART: [art] PUB.Y = 3C74A59A30D4660682E64CCB9B96097547AD1DDF29AA7C758602E8D40EA39DB56785615E03A60A11CE97FB5C1BC9B0F5
2,498,611 UART: [art] SIG.R = 69D850A6D57A28A95F8DF450BBA259F3DC9DFAA2AB5102022513A81F89AC26F24872314CFEC67577C1478FFDDB7928DA
2,505,387 UART: [art] SIG.S = 45313C689966842E1FCABB8B8609308433D7B79EF0ACEF3DD867E4FA632758CB47B0AAEAAADF6A14612D93414C40ED24
2,529,011 UART: mbox::rt_entry...
2,529,383 UART: ____ _ _ _ ____ _____
2,530,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,967 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,503 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,271 UART: |_|
2,533,583 UART:
2,641,529 UART: [rt] Runtime listening for mailbox commands...
2,642,710 >>> mbox cmd response data (48 bytes)
2,642,711 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,645,494 >>> mbox cmd response data (48 bytes)
2,645,495 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,658,433 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,174,515 ready_for_fw is high
1,174,515 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,945 UART: [idev] Erasing UDS.KEYID = 0
1,198,567 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 78456 bytes
2,169,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,273 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,279 >>> mbox cmd response: success
2,308,279 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,309,538 UART: [afmc] ++
2,309,706 UART: [afmc] CDI.KEYID = 6
2,310,069 UART: [afmc] SUBJECT.KEYID = 7
2,310,495 UART: [afmc] AUTHORITY.KEYID = 5
2,345,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,984 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,229 UART: [afmc] --
2,388,109 UART: [cold-reset] --
2,388,939 UART: [state] Locking Datavault
2,389,896 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,500 UART: [state] Locking ICCM
2,391,126 UART: [exit] Launching FMC @ 0x40000130
2,396,455 UART:
2,396,471 UART: Running Caliptra FMC ...
2,396,879 UART:
2,396,933 UART: [state] CFI Enabled
2,407,266 UART: [fht] FMC Alias Private Key: 7
2,514,877 UART: [art] Extend RT PCRs Done
2,515,305 UART: [art] Lock RT PCRs Done
2,516,957 UART: [art] Populate DV Done
2,525,028 UART: [fht] FMC Alias Private Key: 7
2,526,076 UART: [art] Derive CDI
2,526,356 UART: [art] Store in in slot 0x4
2,611,909 UART: [art] Derive Key Pair
2,612,269 UART: [art] Store priv key in slot 0x5
2,625,441 UART: [art] Derive Key Pair - Done
2,640,605 UART: [art] Signing Cert with AUTHO
2,641,085 UART: RITY.KEYID = 7
2,656,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,256 UART: [art] PUB.X = C2B83D985563F818CF7FEBE5FE525DF77AB77229BE8C023289F7D6B60CA7416D59EC022D9CD103B6A8CA99321BF4C614
2,664,026 UART: [art] PUB.Y = 8098D0EAB14DC9F5BBA2C99CD13A997EC6B856792867CE943CD73B7E7EB81B4AD97E74879D99F0C9FD8C300D31128803
2,670,980 UART: [art] SIG.R = 19E666B7862E2AC378667F58E54A37831E53A1DFECEA7EC40B118B4074B88069E51126DF53CA2DE64CE4F6332377BB79
2,677,751 UART: [art] SIG.S = C810963862496CAA59CCE27F0FA3BEC6984DFE6A03FCA69B024B6DB3701211C15CECCF06175E28812D6C1CA838B6B179
2,701,282 UART: mbox::rt_entry...
2,701,654 UART: ____ _ _ _ ____ _____
2,702,438 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,703,238 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,704,774 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,705,542 UART: |_|
2,705,854 UART:
2,812,624 UART: [rt] Runtime listening for mailbox commands...
2,813,805 >>> mbox cmd response data (48 bytes)
2,813,806 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,816,589 >>> mbox cmd response data (48 bytes)
2,816,590 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,829,528 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,632 ready_for_fw is high
1,056,632 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,160,597 >>> mbox cmd response: success
2,160,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,222,495 UART:
2,222,511 UART: Running Caliptra FMC ...
2,222,919 UART:
2,222,973 UART: [state] CFI Enabled
2,233,352 UART: [fht] FMC Alias Private Key: 7
2,341,065 UART: [art] Extend RT PCRs Done
2,341,493 UART: [art] Lock RT PCRs Done
2,342,609 UART: [art] Populate DV Done
2,350,868 UART: [fht] FMC Alias Private Key: 7
2,352,010 UART: [art] Derive CDI
2,352,290 UART: [art] Store in in slot 0x4
2,437,945 UART: [art] Derive Key Pair
2,438,305 UART: [art] Store priv key in slot 0x5
2,451,643 UART: [art] Derive Key Pair - Done
2,466,212 UART: [art] Signing Cert with AUTHO
2,466,692 UART: RITY.KEYID = 7
2,482,468 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,233 UART: [art] PUB.X = 6D40C923A8122F3760CA21CDD976A0D940C8FDE4E2E2A179B83A39C3A9198428E01DB831D4A24EA44BD150BFE9FDD3D0
2,490,017 UART: [art] PUB.Y = 1A9D1486497EC6128453D8E72DA31C4DCE31AA8EF3D11017E7F7B371D4919BACF39FFD335BAF7E02D4864A1C90428D97
2,496,974 UART: [art] SIG.R = C407AEDCD0BE47001C493AA8891EB6FCF26ECFF67214451B796FEFC4925E2352FCB7BEBB73551FDAB4F96139DE15AFA9
2,503,743 UART: [art] SIG.S = B173111A8AE772A2EE7252512B742E7341D9BEDC6D31152CAF7D0E053CB762FC4D1124BD729E1CCCAEA518B83DEEF905
2,527,823 UART: mbox::rt_entry...
2,528,195 UART: ____ _ _ _ ____ _____
2,528,979 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,779 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,547 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,315 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,083 UART: |_|
2,532,395 UART:
2,638,132 UART: [rt] Runtime listening for mailbox commands...
2,639,313 >>> mbox cmd response data (48 bytes)
2,639,314 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,642,097 >>> mbox cmd response data (48 bytes)
2,642,098 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,655,036 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,118 UART: [state] WD Timer not started. Device not locked for debugging
88,445 UART: [kat] SHA2-256
891,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,124 UART: [kat] ++
896,276 UART: [kat] sha1
900,540 UART: [kat] SHA2-256
902,480 UART: [kat] SHA2-384
905,329 UART: [kat] SHA2-512-ACC
907,230 UART: [kat] ECC-384
917,131 UART: [kat] HMAC-384Kdf
921,833 UART: [kat] LMS
1,170,145 UART: [kat] --
1,171,034 UART: [cold-reset] ++
1,171,604 UART: [fht] FHT @ 0x50003400
1,174,280 UART: [idev] ++
1,174,448 UART: [idev] CDI.KEYID = 6
1,174,809 UART: [idev] SUBJECT.KEYID = 7
1,175,234 UART: [idev] UDS.KEYID = 0
1,175,580 ready_for_fw is high
1,175,580 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,566 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,131 UART: [ldev] SUBJECT.KEYID = 5
1,211,558 UART: [ldev] AUTHORITY.KEYID = 7
1,212,021 UART: [ldev] FE.KEYID = 1
1,217,493 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,622 UART: [fwproc] Recv command 0x46574c44
1,284,355 UART: [fwproc] Recv'd Img size: 78456 bytes
2,172,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,468 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,478 >>> mbox cmd response: success
2,310,478 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,311,677 UART: [afmc] ++
2,311,845 UART: [afmc] CDI.KEYID = 6
2,312,208 UART: [afmc] SUBJECT.KEYID = 7
2,312,634 UART: [afmc] AUTHORITY.KEYID = 5
2,348,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,605 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,930 UART: [afmc] --
2,391,812 UART: [cold-reset] --
2,392,690 UART: [state] Locking Datavault
2,393,985 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,589 UART: [state] Locking ICCM
2,395,033 UART: [exit] Launching FMC @ 0x40000130
2,400,362 UART:
2,400,378 UART: Running Caliptra FMC ...
2,400,786 UART:
2,400,929 UART: [state] CFI Enabled
2,411,254 UART: [fht] FMC Alias Private Key: 7
2,519,511 UART: [art] Extend RT PCRs Done
2,519,939 UART: [art] Lock RT PCRs Done
2,521,651 UART: [art] Populate DV Done
2,530,072 UART: [fht] FMC Alias Private Key: 7
2,531,048 UART: [art] Derive CDI
2,531,328 UART: [art] Store in in slot 0x4
2,617,065 UART: [art] Derive Key Pair
2,617,425 UART: [art] Store priv key in slot 0x5
2,631,365 UART: [art] Derive Key Pair - Done
2,646,208 UART: [art] Signing Cert with AUTHO
2,646,688 UART: RITY.KEYID = 7
2,661,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,301 UART: [art] PUB.X = 980003C81514E5A9BFE1A228FC5884DFF24748F7B12529511BA6CC5D3622C772A1811AF564A17DFC0D37363954971A33
2,669,039 UART: [art] PUB.Y = DA2D4A0C60926B3FEE3157B8FD4896E540BAD12D8978A938F8ACFEA4A429321F711ED93CDD1ADAAAA43FE253F0D184FA
2,676,010 UART: [art] SIG.R = 8DD76F1502D5BC502400B29226CE9E8CA7B660CED49B24A1B0650104F81AB4CCFEAC9BCE6C4722CDA7AA5CAD17221046
2,682,767 UART: [art] SIG.S = F35DB0D9A26F684BE770658864FD61769466400C1D3D867AE6F8082D7786D216A53CDA9DBD751EE675AFACD228B58BFA
2,706,770 UART: mbox::rt_entry...
2,707,142 UART: ____ _ _ _ ____ _____
2,707,926 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,262 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,030 UART: |_|
2,711,342 UART:
2,818,877 UART: [rt] Runtime listening for mailbox commands...
2,820,058 >>> mbox cmd response data (48 bytes)
2,820,059 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,842 >>> mbox cmd response data (48 bytes)
2,822,843 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,781 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 ready_for_fw is high
1,056,387 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,952 >>> mbox cmd response: success
2,158,952 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,220,534 UART:
2,220,550 UART: Running Caliptra FMC ...
2,220,958 UART:
2,221,101 UART: [state] CFI Enabled
2,231,394 UART: [fht] FMC Alias Private Key: 7
2,339,013 UART: [art] Extend RT PCRs Done
2,339,441 UART: [art] Lock RT PCRs Done
2,340,843 UART: [art] Populate DV Done
2,348,808 UART: [fht] FMC Alias Private Key: 7
2,349,804 UART: [art] Derive CDI
2,350,084 UART: [art] Store in in slot 0x4
2,435,755 UART: [art] Derive Key Pair
2,436,115 UART: [art] Store priv key in slot 0x5
2,449,729 UART: [art] Derive Key Pair - Done
2,464,697 UART: [art] Signing Cert with AUTHO
2,465,177 UART: RITY.KEYID = 7
2,479,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,640 UART: [art] PUB.X = 54195B9510070F29B92F4F6FDCCA64E03A7B38F0B063698602E77ED5D9EA6AE668256119013526CF9F68AB6B3EE1BE0A
2,487,401 UART: [art] PUB.Y = BFBA38327DAA4F4A4610C36F04AB7E4FA57E53B51A5CC50397DC7E5C3E9C1E433344173B2C11BB4F4616C1D0151466BB
2,494,357 UART: [art] SIG.R = 58F0BB2987C45689ED2793B12792B750C38DF5B5339D1F888902D7FA5C51244A010C594362B8E5D65691B41D5C0D6360
2,501,107 UART: [art] SIG.S = EFA166514D771A4D4965D8A2D0EED08992F776A1EDD9EF4860F95D5684944373C510F74B9F223A74383B66DD656E6F41
2,524,956 UART: mbox::rt_entry...
2,525,328 UART: ____ _ _ _ ____ _____
2,526,112 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,680 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,216 UART: |_|
2,529,528 UART:
2,637,020 UART: [rt] Runtime listening for mailbox commands...
2,638,201 >>> mbox cmd response data (48 bytes)
2,638,202 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,640,985 >>> mbox cmd response data (48 bytes)
2,640,986 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,653,924 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,061 UART:
192,435 UART: Running Caliptra ROM ...
193,627 UART:
193,806 UART: [state] CFI Enabled
262,783 UART: [state] LifecycleState = Unprovisioned
264,772 UART: [state] DebugLocked = No
266,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,179 UART: [kat] SHA2-256
439,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,412 UART: [kat] ++
450,912 UART: [kat] sha1
461,220 UART: [kat] SHA2-256
463,907 UART: [kat] SHA2-384
469,935 UART: [kat] SHA2-512-ACC
472,311 UART: [kat] ECC-384
2,767,433 UART: [kat] HMAC-384Kdf
2,798,570 UART: [kat] LMS
3,988,865 UART: [kat] --
3,994,133 UART: [cold-reset] ++
3,996,439 UART: [fht] Storing FHT @ 0x50003400
4,008,419 UART: [idev] ++
4,009,068 UART: [idev] CDI.KEYID = 6
4,010,141 UART: [idev] SUBJECT.KEYID = 7
4,011,248 UART: [idev] UDS.KEYID = 0
4,012,299 ready_for_fw is high
4,012,494 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,956 UART: [idev] Erasing UDS.KEYID = 0
7,343,523 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,163 UART: [idev] --
7,370,072 UART: [ldev] ++
7,370,644 UART: [ldev] CDI.KEYID = 6
7,371,661 UART: [ldev] SUBJECT.KEYID = 5
7,372,819 UART: [ldev] AUTHORITY.KEYID = 7
7,374,105 UART: [ldev] FE.KEYID = 1
7,420,752 UART: [ldev] Erasing FE.KEYID = 1
10,754,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,115 UART: [ldev] --
13,136,437 UART: [fwproc] Waiting for Commands...
13,138,963 UART: [fwproc] Received command 0x46574c44
13,141,146 UART: [fwproc] Received Image of size 113760 bytes
17,190,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,557 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,649,517 >>> mbox cmd response: success
17,653,958 UART: [afmc] ++
17,654,551 UART: [afmc] CDI.KEYID = 6
17,655,530 UART: [afmc] SUBJECT.KEYID = 7
17,656,769 UART: [afmc] AUTHORITY.KEYID = 5
21,027,787 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,152 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,524 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,342 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,810 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,462 UART: [afmc] --
23,397,188 UART: [cold-reset] --
23,400,020 UART: [state] Locking Datavault
23,406,404 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,108 UART: [state] Locking ICCM
23,410,094 UART: [exit] Launching FMC @ 0x40000130
23,418,493 UART:
23,418,727 UART: Running Caliptra FMC ...
23,419,828 UART:
23,420,010 UART: [state] CFI Enabled
23,486,740 UART: [fht] FMC Alias Private Key: 7
25,824,963 UART: [art] Extend RT PCRs Done
25,826,184 UART: [art] Lock RT PCRs Done
25,827,859 UART: [art] Populate DV Done
25,833,321 UART: [fht] FMC Alias Private Key: 7
25,834,967 UART: [art] Derive CDI
25,835,784 UART: [art] Store in in slot 0x4
25,895,262 UART: [art] Derive Key Pair
25,896,261 UART: [art] Store priv key in slot 0x5
29,188,806 UART: [art] Derive Key Pair - Done
29,202,138 UART: [art] Signing Cert with AUTHO
29,203,446 UART: RITY.KEYID = 7
31,491,504 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,021 UART: [art] PUB.X = 81BAABCA74CA334E928B480299C1E7EE22A43E1B1878ADF62B4484F1FBEBA4EFB3FBF65FC876B99992BA33A55568AB3F
31,500,273 UART: [art] PUB.Y = F1BF4E5016C5003B866E4AE7C93859FC6E7C5343073D60DE0C78E21369D5D42B17EEA2F9999779C5D0288991FB7AE88B
31,507,504 UART: [art] SIG.R = D455BC2B84C86907F8566CA68D772127F33D51A04E86596CFD9E20BFAEB44EB2F2E043DD00411383891F804A27D4F025
31,514,854 UART: [art] SIG.S = 1A57D5F75585C2E8CC40A4A42FBE74C5B942F3D2C31FA96AD34349775F6A292A30E3BC4FE7591A7BD6D999C48E116CF9
32,820,416 UART: Caliptra RT
32,821,115 UART: [state] CFI Enabled
32,981,146 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,805,124 ready_for_fw is high
3,805,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,883,136 >>> mbox cmd response: success
23,571,423 UART:
23,571,810 UART: Running Caliptra FMC ...
23,573,010 UART:
23,573,215 UART: [state] CFI Enabled
23,638,552 UART: [fht] FMC Alias Private Key: 7
25,976,568 UART: [art] Extend RT PCRs Done
25,977,836 UART: [art] Lock RT PCRs Done
25,979,494 UART: [art] Populate DV Done
25,985,021 UART: [fht] FMC Alias Private Key: 7
25,986,619 UART: [art] Derive CDI
25,987,434 UART: [art] Store in in slot 0x4
26,047,192 UART: [art] Derive Key Pair
26,048,231 UART: [art] Store priv key in slot 0x5
29,340,745 UART: [art] Derive Key Pair - Done
29,354,128 UART: [art] Signing Cert with AUTHO
29,355,433 UART: RITY.KEYID = 7
31,643,080 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,582 UART: [art] PUB.X = C6B3F4606E47EE6C42AF1983540DCF9469DA27344A5A1EA50C381484CBB70BCBD2B2EF73EE273B170601E09948A92DD2
31,651,835 UART: [art] PUB.Y = 49FD9BB9285EBD13ACCA1CF90A32228290C431057C8899B9FED202DC53564EE35948E5D069CE5EE060903791E1535A27
31,659,097 UART: [art] SIG.R = 68CCCE2E2042E521610C3BABCD19F274383226F842243C24BEC0309450BED38B5D3095728EB1DE564D80160C0026BCC8
31,666,445 UART: [art] SIG.S = 10CA1875CBA3308B6017E35C1EBB915D78097CBEACDBB783ED4F1BB5D267A09C631AA65C973B457A6F8F705DCC74A335
32,971,907 UART: Caliptra RT
32,972,627 UART: [state] CFI Enabled
33,132,785 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,758 writing to cptra_bootfsm_go
192,887 UART:
193,270 UART: Running Caliptra ROM ...
194,428 UART:
604,217 UART: [state] CFI Enabled
617,527 UART: [state] LifecycleState = Unprovisioned
619,468 UART: [state] DebugLocked = No
622,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,253 UART: [kat] SHA2-256
796,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,518 UART: [kat] ++
807,964 UART: [kat] sha1
817,967 UART: [kat] SHA2-256
820,621 UART: [kat] SHA2-384
826,609 UART: [kat] SHA2-512-ACC
828,972 UART: [kat] ECC-384
3,114,615 UART: [kat] HMAC-384Kdf
3,125,710 UART: [kat] LMS
4,315,808 UART: [kat] --
4,319,640 UART: [cold-reset] ++
4,322,145 UART: [fht] Storing FHT @ 0x50003400
4,333,429 UART: [idev] ++
4,334,032 UART: [idev] CDI.KEYID = 6
4,334,947 UART: [idev] SUBJECT.KEYID = 7
4,336,189 UART: [idev] UDS.KEYID = 0
4,337,222 ready_for_fw is high
4,337,417 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,137 UART: [idev] Erasing UDS.KEYID = 0
7,625,192 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,800 UART: [idev] --
7,650,820 UART: [ldev] ++
7,651,396 UART: [ldev] CDI.KEYID = 6
7,652,357 UART: [ldev] SUBJECT.KEYID = 5
7,653,562 UART: [ldev] AUTHORITY.KEYID = 7
7,654,843 UART: [ldev] FE.KEYID = 1
7,665,606 UART: [ldev] Erasing FE.KEYID = 1
10,953,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,720 UART: [ldev] --
13,311,736 UART: [fwproc] Waiting for Commands...
13,314,364 UART: [fwproc] Received command 0x46574c44
13,316,544 UART: [fwproc] Received Image of size 113760 bytes
17,374,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,427 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,839,255 >>> mbox cmd response: success
17,844,276 UART: [afmc] ++
17,844,930 UART: [afmc] CDI.KEYID = 6
17,845,855 UART: [afmc] SUBJECT.KEYID = 7
17,847,072 UART: [afmc] AUTHORITY.KEYID = 5
21,158,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,048 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,431 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,228 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,666 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,572 UART: [afmc] --
23,526,590 UART: [cold-reset] --
23,531,893 UART: [state] Locking Datavault
23,538,697 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,462 UART: [state] Locking ICCM
23,541,934 UART: [exit] Launching FMC @ 0x40000130
23,550,331 UART:
23,550,563 UART: Running Caliptra FMC ...
23,551,679 UART:
23,551,834 UART: [state] CFI Enabled
23,560,038 UART: [fht] FMC Alias Private Key: 7
25,890,854 UART: [art] Extend RT PCRs Done
25,892,205 UART: [art] Lock RT PCRs Done
25,893,865 UART: [art] Populate DV Done
25,899,327 UART: [fht] FMC Alias Private Key: 7
25,900,978 UART: [art] Derive CDI
25,901,740 UART: [art] Store in in slot 0x4
25,944,131 UART: [art] Derive Key Pair
25,945,172 UART: [art] Store priv key in slot 0x5
29,187,335 UART: [art] Derive Key Pair - Done
29,200,102 UART: [art] Signing Cert with AUTHO
29,201,418 UART: RITY.KEYID = 7
31,480,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,436 UART: [art] PUB.X = E9123CABFE64FDFCE786C0DADA478EE3E68482A9B68DD1842DAFFA9019D2B49C377F07CF82179B29E5E646595FAD8122
31,489,731 UART: [art] PUB.Y = 93E9F2A25928C81C8DDC5D46F3B9E139779E5830E5ADC2559060F49D5A41ED70E356CA898B8E5F529506AA2DA4A90CD9
31,496,933 UART: [art] SIG.R = B0EDAD0F6D4D28FF4A590FC2BF2B7A7216150FD345F63A8741E0543F25A1DC7D72D7EB2462783BE10CA1CA8F53FAEC2B
31,504,364 UART: [art] SIG.S = AFB39ACE7F2FCFCDA19AA87E47821365E348277BA4CE0BFD4DEC8611314D9BD5E11A124D344C2DD05BE40F631E21D3AF
32,809,285 UART: Caliptra RT
32,810,005 UART: [state] CFI Enabled
32,927,941 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,682 writing to cptra_bootfsm_go
4,128,966 ready_for_fw is high
4,129,382 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,066,042 >>> mbox cmd response: success
23,705,944 UART:
23,706,340 UART: Running Caliptra FMC ...
23,707,445 UART:
23,707,593 UART: [state] CFI Enabled
23,715,645 UART: [fht] FMC Alias Private Key: 7
26,046,002 UART: [art] Extend RT PCRs Done
26,047,371 UART: [art] Lock RT PCRs Done
26,048,694 UART: [art] Populate DV Done
26,054,119 UART: [fht] FMC Alias Private Key: 7
26,055,617 UART: [art] Derive CDI
26,056,390 UART: [art] Store in in slot 0x4
26,098,770 UART: [art] Derive Key Pair
26,099,771 UART: [art] Store priv key in slot 0x5
29,342,136 UART: [art] Derive Key Pair - Done
29,355,095 UART: [art] Signing Cert with AUTHO
29,356,402 UART: RITY.KEYID = 7
31,635,284 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,794 UART: [art] PUB.X = B3CAB573EB795AD6489514C451F6DD19A025A0A4B298580810ECCD7F9494D30D0E5A6EE885A9079C59C8FE831F3E9B43
31,644,038 UART: [art] PUB.Y = DEEBDDE605E141F9FDF7DBCBEB9EBF4968591E6F7F0CF114AF4787528C80E879365B8D78F5C288A8228BB647D7D410A8
31,651,295 UART: [art] SIG.R = 2AD19DFA1F532B77FC32171A4DD67C8C2F9810F740CF872627DEA4014E0EE3665EFFECA21FD6DDB1656CACA91E469563
31,658,688 UART: [art] SIG.S = F4410606793F8E8D4F5CF343671EFB55D1B186A72ACB90F7E03E8037FC96506257D38A04C02E592913CD0B44DA28B8CA
32,964,461 UART: Caliptra RT
32,965,161 UART: [state] CFI Enabled
33,082,991 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,462 UART:
192,840 UART: Running Caliptra ROM ...
194,026 UART:
194,188 UART: [state] CFI Enabled
263,235 UART: [state] LifecycleState = Unprovisioned
265,155 UART: [state] DebugLocked = No
266,478 UART: [state] WD Timer not started. Device not locked for debugging
270,026 UART: [kat] SHA2-256
449,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,717 UART: [kat] ++
461,246 UART: [kat] sha1
471,981 UART: [kat] SHA2-256
475,004 UART: [kat] SHA2-384
482,060 UART: [kat] SHA2-512-ACC
484,994 UART: [kat] ECC-384
2,948,162 UART: [kat] HMAC-384Kdf
2,973,201 UART: [kat] LMS
3,502,595 UART: [kat] --
3,508,103 UART: [cold-reset] ++
3,509,044 UART: [fht] FHT @ 0x50003400
3,521,020 UART: [idev] ++
3,521,583 UART: [idev] CDI.KEYID = 6
3,522,493 UART: [idev] SUBJECT.KEYID = 7
3,523,661 UART: [idev] UDS.KEYID = 0
3,524,583 ready_for_fw is high
3,524,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,262 UART: [idev] Erasing UDS.KEYID = 0
6,027,976 UART: [idev] Sha1 KeyId Algorithm
6,051,188 UART: [idev] --
6,055,242 UART: [ldev] ++
6,055,820 UART: [ldev] CDI.KEYID = 6
6,056,731 UART: [ldev] SUBJECT.KEYID = 5
6,057,887 UART: [ldev] AUTHORITY.KEYID = 7
6,059,116 UART: [ldev] FE.KEYID = 1
6,100,178 UART: [ldev] Erasing FE.KEYID = 1
8,605,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,287 UART: [ldev] --
10,411,363 UART: [fwproc] Wait for Commands...
10,414,155 UART: [fwproc] Recv command 0x46574c44
10,416,248 UART: [fwproc] Recv'd Img size: 114084 bytes
13,821,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,278,313 >>> mbox cmd response: success
14,281,725 UART: [afmc] ++
14,282,319 UART: [afmc] CDI.KEYID = 6
14,283,225 UART: [afmc] SUBJECT.KEYID = 7
14,284,383 UART: [afmc] AUTHORITY.KEYID = 5
16,808,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,173 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,503 UART: [afmc] --
18,609,009 UART: [cold-reset] --
18,612,568 UART: [state] Locking Datavault
18,619,385 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,026 UART: [state] Locking ICCM
18,623,823 UART: [exit] Launching FMC @ 0x40000130
18,632,220 UART:
18,632,451 UART: Running Caliptra FMC ...
18,633,546 UART:
18,633,703 UART: [state] CFI Enabled
18,688,215 UART: [fht] FMC Alias Private Key: 7
20,452,469 UART: [art] Extend RT PCRs Done
20,453,689 UART: [art] Lock RT PCRs Done
20,455,147 UART: [art] Populate DV Done
20,460,503 UART: [fht] FMC Alias Private Key: 7
20,462,200 UART: [art] Derive CDI
20,463,010 UART: [art] Store in in slot 0x4
20,520,543 UART: [art] Derive Key Pair
20,521,600 UART: [art] Store priv key in slot 0x5
22,984,030 UART: [art] Derive Key Pair - Done
22,997,183 UART: [art] Signing Cert with AUTHO
22,998,489 UART: RITY.KEYID = 7
24,710,710 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,224 UART: [art] PUB.X = 00E4630C70E512C0829392060A97726558D19234476E315F74E6EEBDCE8CAF9FE147F3EE94594ED00CE6F97B72C0EFDB
24,719,463 UART: [art] PUB.Y = DCCD0FD979BB15D104D589599CAD7B77694A140FF06B951B73400324461ECA24559E531862CC634C951B2D498A58F1B5
24,726,706 UART: [art] SIG.R = F17D12F01A6B5B6DB4196726029BE737F427CE1E615B75D4218D6775F1C2B1D1880A4E4F0D198F0B389F25BEAFF43265
24,734,087 UART: [art] SIG.S = 8BF1CC71111FA8A053E1FCFD3FA6E0B83AE8F35CEE5FD211B78B2FB473A3605E94A044A107EAF15E7763D529F86AE8C6
25,712,480 UART: Caliptra RT
25,713,175 UART: [state] CFI Enabled
25,878,772 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,360,379 ready_for_fw is high
3,360,764 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,719 >>> mbox cmd response: success
18,344,033 UART:
18,344,419 UART: Running Caliptra FMC ...
18,345,612 UART:
18,345,775 UART: [state] CFI Enabled
18,411,883 UART: [fht] FMC Alias Private Key: 7
20,175,410 UART: [art] Extend RT PCRs Done
20,176,635 UART: [art] Lock RT PCRs Done
20,178,154 UART: [art] Populate DV Done
20,183,624 UART: [fht] FMC Alias Private Key: 7
20,185,109 UART: [art] Derive CDI
20,185,873 UART: [art] Store in in slot 0x4
20,245,390 UART: [art] Derive Key Pair
20,246,381 UART: [art] Store priv key in slot 0x5
22,709,572 UART: [art] Derive Key Pair - Done
22,722,519 UART: [art] Signing Cert with AUTHO
22,723,817 UART: RITY.KEYID = 7
24,434,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,312 UART: [art] PUB.X = 275B1CD9C3A49765510CFAB53BE182799B4A041A95FA3E9F72C3BE310BC7865503B081D40F6198858ED049A0DF383A19
24,443,551 UART: [art] PUB.Y = 05A59C5FF4FBBB6D6848EDC124E95E83418B42756F2C5A9E435542EDFC4F6D90C2CCF1738E662B39AE5C8C76AC531C5F
24,450,801 UART: [art] SIG.R = DD8F8A32DFE5706BE837E3CDC948D8053AB02B3DA3623E62398B109BCC14B806031127F3984902313665250FB3A0999E
24,458,170 UART: [art] SIG.S = CE4F2B61483F6A08C243F86C287EE68A674C0610F4A53A609B35CAD865AFFA115A0DA76F8BFBAECC965848B079CB7033
25,437,007 UART: Caliptra RT
25,437,729 UART: [state] CFI Enabled
25,602,313 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,720 writing to cptra_bootfsm_go
194,023 UART:
194,399 UART: Running Caliptra ROM ...
195,603 UART:
604,945 UART: [state] CFI Enabled
616,829 UART: [state] LifecycleState = Unprovisioned
618,703 UART: [state] DebugLocked = No
621,298 UART: [state] WD Timer not started. Device not locked for debugging
624,849 UART: [kat] SHA2-256
803,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,575 UART: [kat] ++
816,106 UART: [kat] sha1
827,053 UART: [kat] SHA2-256
830,065 UART: [kat] SHA2-384
837,053 UART: [kat] SHA2-512-ACC
839,993 UART: [kat] ECC-384
3,282,502 UART: [kat] HMAC-384Kdf
3,294,356 UART: [kat] LMS
3,823,818 UART: [kat] --
3,828,000 UART: [cold-reset] ++
3,829,373 UART: [fht] FHT @ 0x50003400
3,840,620 UART: [idev] ++
3,841,260 UART: [idev] CDI.KEYID = 6
3,842,197 UART: [idev] SUBJECT.KEYID = 7
3,843,301 UART: [idev] UDS.KEYID = 0
3,844,223 ready_for_fw is high
3,844,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,649 UART: [idev] Erasing UDS.KEYID = 0
6,315,797 UART: [idev] Sha1 KeyId Algorithm
6,339,977 UART: [idev] --
6,344,714 UART: [ldev] ++
6,345,298 UART: [ldev] CDI.KEYID = 6
6,346,364 UART: [ldev] SUBJECT.KEYID = 5
6,347,470 UART: [ldev] AUTHORITY.KEYID = 7
6,348,649 UART: [ldev] FE.KEYID = 1
6,360,668 UART: [ldev] Erasing FE.KEYID = 1
8,836,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,278 UART: [ldev] --
10,627,388 UART: [fwproc] Wait for Commands...
10,629,974 UART: [fwproc] Recv command 0x46574c44
10,632,071 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,494,979 >>> mbox cmd response: success
14,499,386 UART: [afmc] ++
14,499,984 UART: [afmc] CDI.KEYID = 6
14,500,926 UART: [afmc] SUBJECT.KEYID = 7
14,502,094 UART: [afmc] AUTHORITY.KEYID = 5
17,002,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,854 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,652 UART: [afmc] --
18,797,055 UART: [cold-reset] --
18,800,217 UART: [state] Locking Datavault
18,805,566 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,227 UART: [state] Locking ICCM
18,808,465 UART: [exit] Launching FMC @ 0x40000130
18,816,866 UART:
18,817,107 UART: Running Caliptra FMC ...
18,818,228 UART:
18,818,391 UART: [state] CFI Enabled
18,826,547 UART: [fht] FMC Alias Private Key: 7
20,583,812 UART: [art] Extend RT PCRs Done
20,585,033 UART: [art] Lock RT PCRs Done
20,586,767 UART: [art] Populate DV Done
20,591,967 UART: [fht] FMC Alias Private Key: 7
20,593,564 UART: [art] Derive CDI
20,594,386 UART: [art] Store in in slot 0x4
20,637,093 UART: [art] Derive Key Pair
20,638,095 UART: [art] Store priv key in slot 0x5
23,065,087 UART: [art] Derive Key Pair - Done
23,078,094 UART: [art] Signing Cert with AUTHO
23,079,404 UART: RITY.KEYID = 7
24,784,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,383 UART: [art] PUB.X = E5B2CE9BCD23E1BE981D23C4FD366B8852EB1CB528BC78AE2FB95425B737E58C2E6E4861B12C525B2E07AA544FBD1708
24,793,684 UART: [art] PUB.Y = EEE96EC2D5BB689EFE525457F7D39D49CDCCE6F1C62540AF33BB9C92BF80DBFC14CC74A451B4A3A7F28D41EC709539C0
24,801,033 UART: [art] SIG.R = C15463908608074D9A84E40389E75FFA730E5813813C4011D0A7E845085590054CDAD4B893835E09CE028533EA24FC5A
24,808,356 UART: [art] SIG.S = A23C07C13D8D81039541C5A3ED653238A9A3D13606E1FFBF9E7EEED6E876D4417BC0C20089953DFF2E33B257AA87FCBB
25,787,504 UART: Caliptra RT
25,788,194 UART: [state] CFI Enabled
25,905,656 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,916 writing to cptra_bootfsm_go
3,695,634 ready_for_fw is high
3,696,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,144 >>> mbox cmd response: success
18,517,808 UART:
18,518,238 UART: Running Caliptra FMC ...
18,519,349 UART:
18,519,513 UART: [state] CFI Enabled
18,527,518 UART: [fht] FMC Alias Private Key: 7
20,284,299 UART: [art] Extend RT PCRs Done
20,285,550 UART: [art] Lock RT PCRs Done
20,287,100 UART: [art] Populate DV Done
20,292,455 UART: [fht] FMC Alias Private Key: 7
20,294,104 UART: [art] Derive CDI
20,294,847 UART: [art] Store in in slot 0x4
20,337,769 UART: [art] Derive Key Pair
20,338,770 UART: [art] Store priv key in slot 0x5
22,765,960 UART: [art] Derive Key Pair - Done
22,778,576 UART: [art] Signing Cert with AUTHO
22,779,912 UART: RITY.KEYID = 7
24,485,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,936 UART: [art] PUB.X = 4489FF0EE5CCED7D414B5D98208661351B2EBAF0F0E3327AD652BC86A39158C250843E8C6838BBFA3B3C2F361B955572
24,494,214 UART: [art] PUB.Y = 2F0C4463E6CC958F0FB9B6FA98338E23A276E061391418C7AD9CA7F59AFCEC854D1133D21095C64A6FA203F99A6A3F0D
24,501,450 UART: [art] SIG.R = 757A53A4D5C2AA2D4BE5CA3E35AFF8BA17AECA652563D45E79373E72BF59D73FBB135920F0D406277533655F168CC97C
24,508,883 UART: [art] SIG.S = D79577E4D164EB0A38E8DF7EAE62554E3008687DB8C337E7164F3149F3BD1F2097D43784CB5D248AF56AE0136560AC77
25,487,831 UART: Caliptra RT
25,488,556 UART: [state] CFI Enabled
25,606,493 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,403 UART:
192,779 UART: Running Caliptra ROM ...
193,880 UART:
194,023 UART: [state] CFI Enabled
267,401 UART: [state] LifecycleState = Unprovisioned
269,846 UART: [state] DebugLocked = No
272,292 UART: [state] WD Timer not started. Device not locked for debugging
276,488 UART: [kat] SHA2-256
466,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,127 UART: [kat] ++
477,572 UART: [kat] sha1
488,301 UART: [kat] SHA2-256
491,300 UART: [kat] SHA2-384
495,807 UART: [kat] SHA2-512-ACC
498,391 UART: [kat] ECC-384
2,948,400 UART: [kat] HMAC-384Kdf
2,972,208 UART: [kat] LMS
3,504,005 UART: [kat] --
3,509,925 UART: [cold-reset] ++
3,512,218 UART: [fht] FHT @ 0x50003400
3,522,701 UART: [idev] ++
3,523,422 UART: [idev] CDI.KEYID = 6
3,524,340 UART: [idev] SUBJECT.KEYID = 7
3,525,585 UART: [idev] UDS.KEYID = 0
3,526,511 ready_for_fw is high
3,526,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,278 UART: [idev] Erasing UDS.KEYID = 0
6,027,798 UART: [idev] Sha1 KeyId Algorithm
6,050,125 UART: [idev] --
6,055,524 UART: [ldev] ++
6,056,203 UART: [ldev] CDI.KEYID = 6
6,057,141 UART: [ldev] SUBJECT.KEYID = 5
6,058,300 UART: [ldev] AUTHORITY.KEYID = 7
6,059,531 UART: [ldev] FE.KEYID = 1
6,098,823 UART: [ldev] Erasing FE.KEYID = 1
8,608,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,070 UART: [ldev] --
10,413,081 UART: [fwproc] Wait for Commands...
10,415,264 UART: [fwproc] Recv command 0x46574c44
10,417,573 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,631 >>> mbox cmd response: success
14,599,561 UART: [afmc] ++
14,600,278 UART: [afmc] CDI.KEYID = 6
14,601,441 UART: [afmc] SUBJECT.KEYID = 7
14,602,931 UART: [afmc] AUTHORITY.KEYID = 5
17,148,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,554 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,775 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,279 UART: [afmc] --
18,945,177 UART: [cold-reset] --
18,947,965 UART: [state] Locking Datavault
18,953,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,539 UART: [state] Locking ICCM
18,957,315 UART: [exit] Launching FMC @ 0x40000130
18,965,950 UART:
18,966,184 UART: Running Caliptra FMC ...
18,967,214 UART:
18,967,360 UART: [state] CFI Enabled
19,030,639 UART: [fht] FMC Alias Private Key: 7
20,794,059 UART: [art] Extend RT PCRs Done
20,795,281 UART: [art] Lock RT PCRs Done
20,796,963 UART: [art] Populate DV Done
20,802,048 UART: [fht] FMC Alias Private Key: 7
20,803,581 UART: [art] Derive CDI
20,804,339 UART: [art] Store in in slot 0x4
20,864,142 UART: [art] Derive Key Pair
20,865,179 UART: [art] Store priv key in slot 0x5
23,328,133 UART: [art] Derive Key Pair - Done
23,340,804 UART: [art] Signing Cert with AUTHO
23,342,100 UART: RITY.KEYID = 7
25,054,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,764 UART: [art] PUB.X = D8AFD493DCF31C3085525E9957CAEE4C7F1022F5F335F9651E20BFFCCD57D5E231E52FDBAFAB1C72089D8872974E27C5
25,063,028 UART: [art] PUB.Y = 61A7986B66DBAB2ABFF5CD9933B8532623C56B4FB006C76C402EE520DB97717D7B4C273AE4760776F6F10E6D4ADD604A
25,070,344 UART: [art] SIG.R = 45096952EC5053EC8E4B2D5F6153976851ECE7DC7DA0BDF7F3CED6C80AE7EE33483C4B6A27D23A549E10025FF5D2290C
25,077,706 UART: [art] SIG.S = 113260BD75530BAB1DC22D66C101AE1EC82EFEC2E1A3F5570962BBF0CB0FAA44094164E513B513F48FC5CCA098BE9B6B
26,056,810 UART: Caliptra RT
26,057,523 UART: [state] CFI Enabled
26,221,902 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
3,430,304 ready_for_fw is high
3,430,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,729,421 >>> mbox cmd response: success
19,018,814 UART:
19,019,224 UART: Running Caliptra FMC ...
19,020,346 UART:
19,020,500 UART: [state] CFI Enabled
19,084,792 UART: [fht] FMC Alias Private Key: 7
20,848,516 UART: [art] Extend RT PCRs Done
20,849,741 UART: [art] Lock RT PCRs Done
20,851,571 UART: [art] Populate DV Done
20,856,927 UART: [fht] FMC Alias Private Key: 7
20,858,520 UART: [art] Derive CDI
20,859,330 UART: [art] Store in in slot 0x4
20,917,291 UART: [art] Derive Key Pair
20,918,334 UART: [art] Store priv key in slot 0x5
23,380,858 UART: [art] Derive Key Pair - Done
23,394,025 UART: [art] Signing Cert with AUTHO
23,395,334 UART: RITY.KEYID = 7
25,106,617 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,130 UART: [art] PUB.X = 8D28809D043B8F8C3C5FEFD7CACB44BD23CD40DA810EE808C4DCCC7D028BA3E6024157B2084C886C8DB6EBC943B42AB1
25,115,416 UART: [art] PUB.Y = 37C91469B7DD7CFD260FABBE36E7471A9F32FE223940D7925E45D5C7C288D6AB4D80F50468D8E1AFED3BEA0A320E9596
25,122,694 UART: [art] SIG.R = CC67FF5E73E5A4928E69618C4F5C573464966E06F786E92988BE223F983B246CDFC6DB0CEFC91F888ED99D0C99BE4A72
25,130,042 UART: [art] SIG.S = 1F0C7311C29174020666CD1FE66769A4C0BBB0B2253E9CAD18AA0B6E7AA70258F9959C52EB2C7C13602665286C46E92B
26,109,070 UART: Caliptra RT
26,109,783 UART: [state] CFI Enabled
26,273,765 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,701 writing to cptra_bootfsm_go
192,936 UART:
193,303 UART: Running Caliptra ROM ...
194,408 UART:
604,276 UART: [state] CFI Enabled
615,739 UART: [state] LifecycleState = Unprovisioned
618,123 UART: [state] DebugLocked = No
620,386 UART: [state] WD Timer not started. Device not locked for debugging
625,492 UART: [kat] SHA2-256
815,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,167 UART: [kat] ++
826,617 UART: [kat] sha1
836,922 UART: [kat] SHA2-256
839,921 UART: [kat] SHA2-384
845,275 UART: [kat] SHA2-512-ACC
847,854 UART: [kat] ECC-384
3,290,983 UART: [kat] HMAC-384Kdf
3,304,789 UART: [kat] LMS
3,836,634 UART: [kat] --
3,839,727 UART: [cold-reset] ++
3,842,087 UART: [fht] FHT @ 0x50003400
3,854,561 UART: [idev] ++
3,855,269 UART: [idev] CDI.KEYID = 6
3,856,242 UART: [idev] SUBJECT.KEYID = 7
3,857,414 UART: [idev] UDS.KEYID = 0
3,858,521 ready_for_fw is high
3,858,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,849 UART: [idev] Erasing UDS.KEYID = 0
6,341,689 UART: [idev] Sha1 KeyId Algorithm
6,364,056 UART: [idev] --
6,368,755 UART: [ldev] ++
6,369,433 UART: [ldev] CDI.KEYID = 6
6,370,316 UART: [ldev] SUBJECT.KEYID = 5
6,371,523 UART: [ldev] AUTHORITY.KEYID = 7
6,372,759 UART: [ldev] FE.KEYID = 1
6,382,810 UART: [ldev] Erasing FE.KEYID = 1
8,856,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,787 UART: [ldev] --
10,650,155 UART: [fwproc] Wait for Commands...
10,652,902 UART: [fwproc] Recv command 0x46574c44
10,655,213 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,830,062 >>> mbox cmd response: success
14,834,940 UART: [afmc] ++
14,835,646 UART: [afmc] CDI.KEYID = 6
14,836,819 UART: [afmc] SUBJECT.KEYID = 7
14,838,309 UART: [afmc] AUTHORITY.KEYID = 5
17,344,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,184 UART: [afmc] --
19,142,176 UART: [cold-reset] --
19,146,373 UART: [state] Locking Datavault
19,151,314 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,535 UART: [state] Locking ICCM
19,156,176 UART: [exit] Launching FMC @ 0x40000130
19,164,862 UART:
19,165,105 UART: Running Caliptra FMC ...
19,166,206 UART:
19,166,371 UART: [state] CFI Enabled
19,174,093 UART: [fht] FMC Alias Private Key: 7
20,931,196 UART: [art] Extend RT PCRs Done
20,932,437 UART: [art] Lock RT PCRs Done
20,934,015 UART: [art] Populate DV Done
20,939,378 UART: [fht] FMC Alias Private Key: 7
20,941,078 UART: [art] Derive CDI
20,941,821 UART: [art] Store in in slot 0x4
20,984,793 UART: [art] Derive Key Pair
20,985,831 UART: [art] Store priv key in slot 0x5
23,412,906 UART: [art] Derive Key Pair - Done
23,425,902 UART: [art] Signing Cert with AUTHO
23,427,208 UART: RITY.KEYID = 7
25,132,240 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,743 UART: [art] PUB.X = 64B5C92AF2447ED16998D1766204F8E9FF36B35E38299E91F82C704BCCDBB5808F77B33B4921DE21D1CD2AB8B392B68A
25,141,045 UART: [art] PUB.Y = 1DD6D82E53D8DFF37757F61AB17684AFBEE77C219926748652BDCE0B6B821DA7564E6767BECECA5C00CD04C2446899E4
25,148,267 UART: [art] SIG.R = 2B8F1F6B6462EDD072321EBF2076A55FF81237FEBBA4A3D96D20D668F669151EF110398EE87485857BD8D15D14FE9806
25,155,636 UART: [art] SIG.S = A36E0F7341857521DEE689CC4DF4E90603CA5FA6BB74BDAF88C3FDF23FD088E60ED5E3C08EEE23E4C661282F08D4B9B0
26,134,473 UART: Caliptra RT
26,135,176 UART: [state] CFI Enabled
26,251,857 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,709 writing to cptra_bootfsm_go
3,751,250 ready_for_fw is high
3,751,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,942,670 >>> mbox cmd response: success
19,193,800 UART:
19,194,186 UART: Running Caliptra FMC ...
19,195,389 UART:
19,195,563 UART: [state] CFI Enabled
19,203,098 UART: [fht] FMC Alias Private Key: 7
20,960,126 UART: [art] Extend RT PCRs Done
20,961,357 UART: [art] Lock RT PCRs Done
20,963,205 UART: [art] Populate DV Done
20,968,575 UART: [fht] FMC Alias Private Key: 7
20,970,281 UART: [art] Derive CDI
20,971,106 UART: [art] Store in in slot 0x4
21,013,337 UART: [art] Derive Key Pair
21,014,380 UART: [art] Store priv key in slot 0x5
23,440,725 UART: [art] Derive Key Pair - Done
23,453,785 UART: [art] Signing Cert with AUTHO
23,455,105 UART: RITY.KEYID = 7
25,160,600 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,113 UART: [art] PUB.X = AD9BCA57ECA0F3EBE3633888653E71C686A4AF716DD387F6BDE9B86750BA5C4F5EF93262623C995827F89325E693FC8A
25,169,359 UART: [art] PUB.Y = B31F9B563B14C250F7C9AA8B2371CE06226AD2F794885F237371719CB42FB330B14458AE06EAD38B7C86BECB7BD19211
25,176,587 UART: [art] SIG.R = 323D7EE4730242C3402B04EC92A50028507EA26D2A6F1C88E84F22646F12DD41B43570F327672DDE6B7175E2F75A60C6
25,183,992 UART: [art] SIG.S = 131465775733AB3470FDF3CCEBD438EFE7BFB6316512E513C353D7EFD35D10E1F5AE8C6A17387DC7DADD848959453053
26,162,878 UART: Caliptra RT
26,163,587 UART: [state] CFI Enabled
26,280,121 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,237 UART: [kat] SHA2-256
882,168 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,283 UART: [kat] ++
886,435 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,220 UART: [kat] SHA2-512-ACC
897,121 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,481,151 ready_for_fw is high
1,481,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,196 UART: [idev] Erasing UDS.KEYID = 0
1,505,442 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,059 UART: [ldev] ++
1,515,227 UART: [ldev] CDI.KEYID = 6
1,515,590 UART: [ldev] SUBJECT.KEYID = 5
1,516,016 UART: [ldev] AUTHORITY.KEYID = 7
1,516,479 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,966 UART: [ldev] --
1,585,473 UART: [fwproc] Waiting for Commands...
1,586,278 UART: [fwproc] Received command 0x46574c44
1,587,069 UART: [fwproc] Received Image of size 114084 bytes
2,882,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,314 >>> mbox cmd response: success
3,074,384 UART: [afmc] ++
3,074,552 UART: [afmc] CDI.KEYID = 6
3,074,914 UART: [afmc] SUBJECT.KEYID = 7
3,075,339 UART: [afmc] AUTHORITY.KEYID = 5
3,109,010 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,131,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,137,883 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,573 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,358 UART: [afmc] --
3,152,484 UART: [cold-reset] --
3,153,410 UART: [state] Locking Datavault
3,154,451 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,055 UART: [state] Locking ICCM
3,155,507 UART: [exit] Launching FMC @ 0x40000130
3,160,836 UART:
3,160,852 UART: Running Caliptra FMC ...
3,161,260 UART:
3,161,314 UART: [state] CFI Enabled
3,171,867 UART: [fht] FMC Alias Private Key: 7
3,280,016 UART: [art] Extend RT PCRs Done
3,280,444 UART: [art] Lock RT PCRs Done
3,281,986 UART: [art] Populate DV Done
3,290,335 UART: [fht] FMC Alias Private Key: 7
3,291,339 UART: [art] Derive CDI
3,291,619 UART: [art] Store in in slot 0x4
3,376,928 UART: [art] Derive Key Pair
3,377,288 UART: [art] Store priv key in slot 0x5
3,390,338 UART: [art] Derive Key Pair - Done
3,405,124 UART: [art] Signing Cert with AUTHO
3,405,604 UART: RITY.KEYID = 7
3,420,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,421,269 UART: [art] PUB.X = 27E8965DD3668E44D7F776E535DB77E97DEB59C61FB90D5231A97137FF4874C5A52622BD72C7706987746F12461E6F31
3,428,030 UART: [art] PUB.Y = BA007260F040078740FA189186905F54E5ECA60C42CF9D78F087453F5F34803D1B545DD0D4D5C840B83C284A27A61BF9
3,434,950 UART: [art] SIG.R = AF81064B8CCD1C3984038ACA13C26D65F0EB8E7F61F83A16A472552FB92011BAFD09BA2E2D7DE5D3D7F47FDA8BD35A6B
3,441,733 UART: [art] SIG.S = B420C474E48CF6A94E4A60DC333878D8D0B0AB8FC8759B42FE22E0E2DD2867E6FEDF27A3CE75C4284FE999831E4399D4
3,465,760 UART: Caliptra RT
3,466,013 UART: [state] CFI Enabled
3,573,349 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,445 ready_for_fw is high
1,362,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,666 >>> mbox cmd response: success
2,984,318 UART:
2,984,334 UART: Running Caliptra FMC ...
2,984,742 UART:
2,984,796 UART: [state] CFI Enabled
2,995,169 UART: [fht] FMC Alias Private Key: 7
3,102,938 UART: [art] Extend RT PCRs Done
3,103,366 UART: [art] Lock RT PCRs Done
3,104,830 UART: [art] Populate DV Done
3,113,251 UART: [fht] FMC Alias Private Key: 7
3,114,409 UART: [art] Derive CDI
3,114,689 UART: [art] Store in in slot 0x4
3,200,414 UART: [art] Derive Key Pair
3,200,774 UART: [art] Store priv key in slot 0x5
3,213,884 UART: [art] Derive Key Pair - Done
3,228,545 UART: [art] Signing Cert with AUTHO
3,229,025 UART: RITY.KEYID = 7
3,244,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,830 UART: [art] PUB.X = E3954129D344C4E9AD99B81DDAF5C4558E9EF5AE8338BE3FBB9F86DDA1D94B6E419DBEE39BECED9389927EBF9DA6601E
3,251,626 UART: [art] PUB.Y = 2C52A34D3A4F6CA5C7E78F6C662CE40B2BEF14121B79E56FA97F0661AA1F0D9615993F1C44A7267C834E5728B64FDA4B
3,258,577 UART: [art] SIG.R = 431770E094EAE4003AFAEE4F05189599783BE1949297677B3EF1BD112AB224395BD7836A148ED143BE312B6FD44CAB8C
3,265,326 UART: [art] SIG.S = 2B65EC4DD727227B9813662B9736448FF525CC8B80E5C63F71707EFD62AAB39737124401F38355BF36754215002F4472
3,289,010 UART: Caliptra RT
3,289,263 UART: [state] CFI Enabled
3,397,613 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,936 UART: [kat] SHA2-256
881,867 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,982 UART: [kat] ++
886,134 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,037 UART: [kat] SHA2-512-ACC
896,938 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,320 UART: [cold-reset] ++
1,476,788 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 ready_for_fw is high
1,480,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,997 UART: [idev] Erasing UDS.KEYID = 0
1,505,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,897 UART: [idev] --
1,514,858 UART: [ldev] ++
1,515,026 UART: [ldev] CDI.KEYID = 6
1,515,389 UART: [ldev] SUBJECT.KEYID = 5
1,515,815 UART: [ldev] AUTHORITY.KEYID = 7
1,516,278 UART: [ldev] FE.KEYID = 1
1,521,684 UART: [ldev] Erasing FE.KEYID = 1
1,546,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,709 UART: [ldev] --
1,586,070 UART: [fwproc] Waiting for Commands...
1,586,835 UART: [fwproc] Received command 0x46574c44
1,587,626 UART: [fwproc] Received Image of size 114084 bytes
2,882,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,689 >>> mbox cmd response: success
3,075,877 UART: [afmc] ++
3,076,045 UART: [afmc] CDI.KEYID = 6
3,076,407 UART: [afmc] SUBJECT.KEYID = 7
3,076,832 UART: [afmc] AUTHORITY.KEYID = 5
3,111,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,727 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,507 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,120 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,810 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,673 UART: [afmc] --
3,154,663 UART: [cold-reset] --
3,155,385 UART: [state] Locking Datavault
3,156,632 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,236 UART: [state] Locking ICCM
3,157,700 UART: [exit] Launching FMC @ 0x40000130
3,163,029 UART:
3,163,045 UART: Running Caliptra FMC ...
3,163,453 UART:
3,163,596 UART: [state] CFI Enabled
3,173,977 UART: [fht] FMC Alias Private Key: 7
3,281,074 UART: [art] Extend RT PCRs Done
3,281,502 UART: [art] Lock RT PCRs Done
3,283,364 UART: [art] Populate DV Done
3,291,733 UART: [fht] FMC Alias Private Key: 7
3,292,689 UART: [art] Derive CDI
3,292,969 UART: [art] Store in in slot 0x4
3,378,804 UART: [art] Derive Key Pair
3,379,164 UART: [art] Store priv key in slot 0x5
3,392,712 UART: [art] Derive Key Pair - Done
3,407,158 UART: [art] Signing Cert with AUTHO
3,407,638 UART: RITY.KEYID = 7
3,423,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,877 UART: [art] PUB.X = 7B28D4A7AFA5D9CC98CCAFC20C5381149A2FC3D9302A8377DD7AC1E506A1321B0BFE5962044BCA74AE777E3C82FA3B2E
3,430,655 UART: [art] PUB.Y = EAF03A414144C2CA36B061BFB513417C3946B4CA7B12113DB0D95C2258DCEDDDB80B7ECD3B6AD231D4E01DB14FAEBFE1
3,437,628 UART: [art] SIG.R = C575A04B698F65B30092534A710E515220A77BAB64960DB55002649D555740A21039C5F93B13D84C480DE11A96CF550A
3,444,351 UART: [art] SIG.S = 0CB418DB7A51D6FAD788F6987F65D787B12F2E19CF6EA2AE3939BFC56638C52D780F770E5B97B76EFC2D38FD701BD81D
3,468,329 UART: Caliptra RT
3,468,674 UART: [state] CFI Enabled
3,577,023 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,115 >>> mbox cmd response: success
2,984,829 UART:
2,984,845 UART: Running Caliptra FMC ...
2,985,253 UART:
2,985,396 UART: [state] CFI Enabled
2,996,139 UART: [fht] FMC Alias Private Key: 7
3,104,112 UART: [art] Extend RT PCRs Done
3,104,540 UART: [art] Lock RT PCRs Done
3,106,364 UART: [art] Populate DV Done
3,114,557 UART: [fht] FMC Alias Private Key: 7
3,115,611 UART: [art] Derive CDI
3,115,891 UART: [art] Store in in slot 0x4
3,201,830 UART: [art] Derive Key Pair
3,202,190 UART: [art] Store priv key in slot 0x5
3,215,698 UART: [art] Derive Key Pair - Done
3,230,636 UART: [art] Signing Cert with AUTHO
3,231,116 UART: RITY.KEYID = 7
3,246,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,267 UART: [art] PUB.X = 55E2436A628BCF61DD0D9AA8B49A2BCBE2AAB46DD8001447F7CB2867566A86A2FF3FBF859DA37877CACC467919BCA499
3,254,030 UART: [art] PUB.Y = E63AEAD36F7F662F3B10EB1FB980FF86EB68C44F37164DA1C55284E5574AD747E27AD2F6FB171793843D4E986CD4B8F6
3,260,992 UART: [art] SIG.R = 9F6F535D00937D01B0FD1CCED94DEE57E067CA7BE971083F54F60F1FAE4134B63753F934E7D1D3B57E1169B9C2D4AF19
3,267,743 UART: [art] SIG.S = 6FB4CDAFBC560CD56BF8594C610EC01573319E3D89B9A12342AAB73235A880C8D4F1B610F089B3B67CAC9E2A579BBC03
3,291,431 UART: Caliptra RT
3,291,776 UART: [state] CFI Enabled
3,400,203 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
902,021 UART: [kat] SHA2-256
903,961 UART: [kat] SHA2-384
906,840 UART: [kat] SHA2-512-ACC
908,741 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,228 UART: [idev] ++
1,175,396 UART: [idev] CDI.KEYID = 6
1,175,756 UART: [idev] SUBJECT.KEYID = 7
1,176,180 UART: [idev] UDS.KEYID = 0
1,176,525 ready_for_fw is high
1,176,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,253 UART: [idev] Sha1 KeyId Algorithm
1,208,579 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,281,964 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,308 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,079 >>> mbox cmd response: success
2,772,283 UART: [afmc] ++
2,772,451 UART: [afmc] CDI.KEYID = 6
2,772,813 UART: [afmc] SUBJECT.KEYID = 7
2,773,238 UART: [afmc] AUTHORITY.KEYID = 5
2,808,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,806 UART: [afmc] --
2,851,772 UART: [cold-reset] --
2,852,364 UART: [state] Locking Datavault
2,853,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,375 UART: [state] Locking ICCM
2,854,947 UART: [exit] Launching FMC @ 0x40000130
2,860,276 UART:
2,860,292 UART: Running Caliptra FMC ...
2,860,700 UART:
2,860,754 UART: [state] CFI Enabled
2,870,977 UART: [fht] FMC Alias Private Key: 7
2,979,132 UART: [art] Extend RT PCRs Done
2,979,560 UART: [art] Lock RT PCRs Done
2,981,038 UART: [art] Populate DV Done
2,989,263 UART: [fht] FMC Alias Private Key: 7
2,990,437 UART: [art] Derive CDI
2,990,717 UART: [art] Store in in slot 0x4
3,076,054 UART: [art] Derive Key Pair
3,076,414 UART: [art] Store priv key in slot 0x5
3,089,376 UART: [art] Derive Key Pair - Done
3,103,892 UART: [art] Signing Cert with AUTHO
3,104,372 UART: RITY.KEYID = 7
3,119,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,193 UART: [art] PUB.X = 97E1D057FC6CDCD7DC42903150540AE1F6EB1B468A1E61B9ED6E013A19243CB7E5D057FFCF168390A6BB7A622359061A
3,126,964 UART: [art] PUB.Y = 41ECD62F6FE1F905C3A98D8FE9B578F7CF6DCFB8BE95D79DFB04FDD7D46C22839626C8FF885AE39A89C34F160BE7B8BA
3,133,931 UART: [art] SIG.R = AA8E5C2019408CBCFC3A6D61F4A64D39A29DB1A0E31B9A79CC54493E6458CD2FF65BE325FD692CCEB3A3F9996B0B93C6
3,140,718 UART: [art] SIG.S = 90E832F3A9E9DF254335F815A6BFB6C3893F786BB593E99598B794D7004680641929BAD2610AEE2CD2265B82A68C003C
3,164,364 UART: Caliptra RT
3,164,617 UART: [state] CFI Enabled
3,272,691 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,379 ready_for_fw is high
1,060,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,220 >>> mbox cmd response: success
2,686,990 UART:
2,687,006 UART: Running Caliptra FMC ...
2,687,414 UART:
2,687,468 UART: [state] CFI Enabled
2,698,017 UART: [fht] FMC Alias Private Key: 7
2,806,874 UART: [art] Extend RT PCRs Done
2,807,302 UART: [art] Lock RT PCRs Done
2,808,798 UART: [art] Populate DV Done
2,817,183 UART: [fht] FMC Alias Private Key: 7
2,818,261 UART: [art] Derive CDI
2,818,541 UART: [art] Store in in slot 0x4
2,904,054 UART: [art] Derive Key Pair
2,904,414 UART: [art] Store priv key in slot 0x5
2,917,178 UART: [art] Derive Key Pair - Done
2,931,982 UART: [art] Signing Cert with AUTHO
2,932,462 UART: RITY.KEYID = 7
2,947,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,217 UART: [art] PUB.X = 572FFEFFAAB0D46625C2E2B11C9A08DC30D17B97B3C3C41898721AC430556EAEBA524DD75681BFF914A397D8D248E475
2,954,996 UART: [art] PUB.Y = 811FEC1A620E819C3E40BDA51C1A7FF0047A66813814ED6B377FC0335105DC9FF2D05DFD99DFDE6C9F58363354E952BC
2,961,949 UART: [art] SIG.R = 554176E603899EB99523FBB7479F63509F6F72BE5710358BF4CF4BE555CC5329121281A8B334B71AA3B6B64ED5DEDC89
2,968,718 UART: [art] SIG.S = 8389DBFA8FCE8C064ADD99869D5C5C0DA385402EE16477C9E9EAC9F7A12EC5AA36BB98C3AFFA9B427FCEFAB9F8B738E6
2,992,877 UART: Caliptra RT
2,993,130 UART: [state] CFI Enabled
3,100,975 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,237 UART: [idev] ++
1,175,405 UART: [idev] CDI.KEYID = 6
1,175,765 UART: [idev] SUBJECT.KEYID = 7
1,176,189 UART: [idev] UDS.KEYID = 0
1,176,534 ready_for_fw is high
1,176,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,185 UART: [idev] Erasing UDS.KEYID = 0
1,201,716 UART: [idev] Sha1 KeyId Algorithm
1,210,148 UART: [idev] --
1,211,168 UART: [ldev] ++
1,211,336 UART: [ldev] CDI.KEYID = 6
1,211,699 UART: [ldev] SUBJECT.KEYID = 5
1,212,125 UART: [ldev] AUTHORITY.KEYID = 7
1,212,588 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,362 UART: [ldev] --
1,283,671 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,122 >>> mbox cmd response: success
2,772,258 UART: [afmc] ++
2,772,426 UART: [afmc] CDI.KEYID = 6
2,772,788 UART: [afmc] SUBJECT.KEYID = 7
2,773,213 UART: [afmc] AUTHORITY.KEYID = 5
2,809,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,725 UART: [afmc] --
2,852,809 UART: [cold-reset] --
2,853,633 UART: [state] Locking Datavault
2,854,998 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,602 UART: [state] Locking ICCM
2,856,192 UART: [exit] Launching FMC @ 0x40000130
2,861,521 UART:
2,861,537 UART: Running Caliptra FMC ...
2,861,945 UART:
2,862,088 UART: [state] CFI Enabled
2,872,707 UART: [fht] FMC Alias Private Key: 7
2,980,984 UART: [art] Extend RT PCRs Done
2,981,412 UART: [art] Lock RT PCRs Done
2,982,866 UART: [art] Populate DV Done
2,991,035 UART: [fht] FMC Alias Private Key: 7
2,992,027 UART: [art] Derive CDI
2,992,307 UART: [art] Store in in slot 0x4
3,078,088 UART: [art] Derive Key Pair
3,078,448 UART: [art] Store priv key in slot 0x5
3,091,982 UART: [art] Derive Key Pair - Done
3,106,575 UART: [art] Signing Cert with AUTHO
3,107,055 UART: RITY.KEYID = 7
3,122,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,930 UART: [art] PUB.X = 21F55A9973B12CCA56A512CF375AFAF231474D8A5296CBC736B6495127D3213CCCC7ACAA72830D1E0EE5B932923E3F97
3,129,702 UART: [art] PUB.Y = 9E58C8A0046A154399012FA1EA900A02C0291CC95C5E34ADB73BC394A6234BBCCB683F70EAFAF4DF87FDE3B9C0EE933E
3,136,660 UART: [art] SIG.R = 56DDB8DF890FF0D0CAA45E48B9847255E9CEA2230FAC288B3906C4F98B12067E354678A8341D83A233952BF281E4A691
3,143,420 UART: [art] SIG.S = C755AD2B2BC285F72D8836EB55DB2D78CE18D261F2ECD5FD1AE59855A1A1F00A33250D7FF82C7BE260F01C3BC4B507A4
3,167,284 UART: Caliptra RT
3,167,629 UART: [state] CFI Enabled
3,275,750 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,336 ready_for_fw is high
1,061,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,175 >>> mbox cmd response: success
2,685,557 UART:
2,685,573 UART: Running Caliptra FMC ...
2,685,981 UART:
2,686,124 UART: [state] CFI Enabled
2,696,983 UART: [fht] FMC Alias Private Key: 7
2,804,238 UART: [art] Extend RT PCRs Done
2,804,666 UART: [art] Lock RT PCRs Done
2,806,462 UART: [art] Populate DV Done
2,814,609 UART: [fht] FMC Alias Private Key: 7
2,815,765 UART: [art] Derive CDI
2,816,045 UART: [art] Store in in slot 0x4
2,902,156 UART: [art] Derive Key Pair
2,902,516 UART: [art] Store priv key in slot 0x5
2,916,206 UART: [art] Derive Key Pair - Done
2,930,910 UART: [art] Signing Cert with AUTHO
2,931,390 UART: RITY.KEYID = 7
2,946,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,115 UART: [art] PUB.X = 0C6926D95A72C32368F9FC5D5CF5D27A33064BE4340F8586CD1E73F1ABB9403176A18AE567A611ECB424C82904E5561E
2,953,875 UART: [art] PUB.Y = 807CA3F2B4ADB48FDB114087CAD7B0EDCCD317477C5C0AE9A1A8EA8A6E1FF02B602518B73384F0401DD3F4C5C085DE65
2,960,842 UART: [art] SIG.R = 1ED26DD87A2E1B193591423B7291183226BED03312FB0AE15CD8ACA2A7D2C5F04FA5E9780F66561311A7531377144E64
2,967,604 UART: [art] SIG.S = 8B995DC2316EB228FB26DB265CA20A502BB8D7C27BDB92E8058D44A0B01E81519ED980DB37FEFE8B155D73CE0E97AD29
2,991,546 UART: Caliptra RT
2,991,891 UART: [state] CFI Enabled
3,099,530 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,889 UART: [kat] ++
895,041 UART: [kat] sha1
899,165 UART: [kat] SHA2-256
901,105 UART: [kat] SHA2-384
904,078 UART: [kat] SHA2-512-ACC
905,979 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,585 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,173,965 ready_for_fw is high
1,173,965 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,571 UART: [idev] Sha1 KeyId Algorithm
1,207,517 UART: [idev] --
1,208,466 UART: [ldev] ++
1,208,634 UART: [ldev] CDI.KEYID = 6
1,208,998 UART: [ldev] SUBJECT.KEYID = 5
1,209,425 UART: [ldev] AUTHORITY.KEYID = 7
1,209,888 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,702 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x46574c44
1,282,044 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,411 >>> mbox cmd response: success
2,770,542 UART: [afmc] ++
2,770,710 UART: [afmc] CDI.KEYID = 6
2,771,073 UART: [afmc] SUBJECT.KEYID = 7
2,771,499 UART: [afmc] AUTHORITY.KEYID = 5
2,806,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,973 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,719 UART: [afmc] --
2,850,851 UART: [cold-reset] --
2,851,631 UART: [state] Locking Datavault
2,852,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,584 UART: [state] Locking ICCM
2,854,156 UART: [exit] Launching FMC @ 0x40000130
2,859,485 UART:
2,859,501 UART: Running Caliptra FMC ...
2,859,909 UART:
2,859,963 UART: [state] CFI Enabled
2,870,740 UART: [fht] FMC Alias Private Key: 7
2,979,055 UART: [art] Extend RT PCRs Done
2,979,483 UART: [art] Lock RT PCRs Done
2,980,579 UART: [art] Populate DV Done
2,988,736 UART: [fht] FMC Alias Private Key: 7
2,989,906 UART: [art] Derive CDI
2,990,186 UART: [art] Store in in slot 0x4
3,076,017 UART: [art] Derive Key Pair
3,076,377 UART: [art] Store priv key in slot 0x5
3,089,181 UART: [art] Derive Key Pair - Done
3,103,779 UART: [art] Signing Cert with AUTHO
3,104,259 UART: RITY.KEYID = 7
3,119,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,922 UART: [art] PUB.X = 592CEAECF475283E8A497177FA96B245F785B19F45A2721BF8B38B2FFCBDF9C919F9AA61B5273911C54CF5DC9FC0887E
3,126,706 UART: [art] PUB.Y = 93607FC2350CE53FC1A66395D3A9964D9ACD4D9E0E345D096356B6DB6CE7DC56F863E69BD07511A69FBA80CB07C75BED
3,133,658 UART: [art] SIG.R = 0D60BCBF6B6DF27934D5AD6085F0E0BAB80798C9057ACEF35CA4E14EB4A4A514C45AE1E3E20524A476E450B3A15A945F
3,140,432 UART: [art] SIG.S = AEDC75972366EEA93EC72122516B35A48FD66AF94CDB4B0895ED8E3E65945A3D5CC829A0D1914D27443CD34E081D7D9E
3,164,337 UART: Caliptra RT
3,164,590 UART: [state] CFI Enabled
3,272,127 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,846 ready_for_fw is high
1,055,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,297 >>> mbox cmd response: success
2,682,149 UART:
2,682,165 UART: Running Caliptra FMC ...
2,682,573 UART:
2,682,627 UART: [state] CFI Enabled
2,693,278 UART: [fht] FMC Alias Private Key: 7
2,800,401 UART: [art] Extend RT PCRs Done
2,800,829 UART: [art] Lock RT PCRs Done
2,802,277 UART: [art] Populate DV Done
2,810,452 UART: [fht] FMC Alias Private Key: 7
2,811,416 UART: [art] Derive CDI
2,811,696 UART: [art] Store in in slot 0x4
2,897,323 UART: [art] Derive Key Pair
2,897,683 UART: [art] Store priv key in slot 0x5
2,911,217 UART: [art] Derive Key Pair - Done
2,926,170 UART: [art] Signing Cert with AUTHO
2,926,650 UART: RITY.KEYID = 7
2,941,504 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,269 UART: [art] PUB.X = D4BCB09BA3FE8C19D10F9DB7285FD81358834D371D4A9F17E9C07F2CEFC582B2EF42D3808580FCEB92BA10FE3AC09F38
2,949,056 UART: [art] PUB.Y = EF553FA732DFDE340E99C01C22EF64DD06153973D118D3E1F822D727806962B918B5D3CB989050A56D05976E7F0DB958
2,955,994 UART: [art] SIG.R = 5B4F955D68BF9AAB410905EEFA7FD2650E704B3AEB3D9B91A5895203CE8EA55F2F39B2877553FA272A4D2D1AB074EA8A
2,962,768 UART: [art] SIG.S = 061089FB6253425AA0B93AF4D1B71F80ABCC6D88EA12FC02CC41DBCDB16AC13C7707591E8D0FF4AC53AA1A2AABC7FE43
2,986,783 UART: Caliptra RT
2,987,036 UART: [state] CFI Enabled
3,094,183 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,341 UART: [kat] LMS
1,169,653 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,175,146 ready_for_fw is high
1,175,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,209,280 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,364 UART: [ldev] AUTHORITY.KEYID = 7
1,211,827 UART: [ldev] FE.KEYID = 1
1,217,101 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,505 UART: [ldev] --
1,282,911 UART: [fwproc] Wait for Commands...
1,283,542 UART: [fwproc] Recv command 0x46574c44
1,284,275 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,958 >>> mbox cmd response: success
2,772,113 UART: [afmc] ++
2,772,281 UART: [afmc] CDI.KEYID = 6
2,772,644 UART: [afmc] SUBJECT.KEYID = 7
2,773,070 UART: [afmc] AUTHORITY.KEYID = 5
2,808,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,366 UART: [afmc] --
2,851,336 UART: [cold-reset] --
2,852,308 UART: [state] Locking Datavault
2,853,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,017 UART: [state] Locking ICCM
2,854,613 UART: [exit] Launching FMC @ 0x40000130
2,859,942 UART:
2,859,958 UART: Running Caliptra FMC ...
2,860,366 UART:
2,860,509 UART: [state] CFI Enabled
2,870,994 UART: [fht] FMC Alias Private Key: 7
2,978,635 UART: [art] Extend RT PCRs Done
2,979,063 UART: [art] Lock RT PCRs Done
2,980,567 UART: [art] Populate DV Done
2,988,970 UART: [fht] FMC Alias Private Key: 7
2,990,112 UART: [art] Derive CDI
2,990,392 UART: [art] Store in in slot 0x4
3,076,233 UART: [art] Derive Key Pair
3,076,593 UART: [art] Store priv key in slot 0x5
3,090,113 UART: [art] Derive Key Pair - Done
3,105,090 UART: [art] Signing Cert with AUTHO
3,105,570 UART: RITY.KEYID = 7
3,121,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,901 UART: [art] PUB.X = 866CE50CDA949B4090AB1BA8CACF11371FE72D272B46B027592848449E93717A4093CC0CC2B5F95E961E6433667469D7
3,128,663 UART: [art] PUB.Y = 58B60FE2E3F7C3825BAA3524881B2A574D9D26CA32D61B0218D7D90A99DA095F5526CB515BB262AC2983EDD12B96E3C0
3,135,609 UART: [art] SIG.R = 3D923F6C49CD8B35D2B24D816CCA164CB5892B9C10EA9FF149C205D347F6277C917A6DBA064C6B4C901BFD0F5E1ACF7A
3,142,388 UART: [art] SIG.S = 72D6A1EC3AC9D49C4BA3DE26AB5F67C3019944A23D4E8D8A1523090350F54FAF0A5BB51097FC05CFCD14D963547910EC
3,166,150 UART: Caliptra RT
3,166,495 UART: [state] CFI Enabled
3,273,992 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,049 ready_for_fw is high
1,056,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,688 >>> mbox cmd response: success
2,681,200 UART:
2,681,216 UART: Running Caliptra FMC ...
2,681,624 UART:
2,681,767 UART: [state] CFI Enabled
2,692,738 UART: [fht] FMC Alias Private Key: 7
2,800,815 UART: [art] Extend RT PCRs Done
2,801,243 UART: [art] Lock RT PCRs Done
2,802,881 UART: [art] Populate DV Done
2,811,152 UART: [fht] FMC Alias Private Key: 7
2,812,134 UART: [art] Derive CDI
2,812,414 UART: [art] Store in in slot 0x4
2,897,759 UART: [art] Derive Key Pair
2,898,119 UART: [art] Store priv key in slot 0x5
2,912,027 UART: [art] Derive Key Pair - Done
2,926,447 UART: [art] Signing Cert with AUTHO
2,926,927 UART: RITY.KEYID = 7
2,941,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,440 UART: [art] PUB.X = 4E48539FF2D7C10048141A860B7FC387E033CB5E7040FFE35F09F1F1DABB72A24606F9FC919D33639C6E793E87E7F2F2
2,949,185 UART: [art] PUB.Y = 077104C87B83EF4CD32DD353081050DCC7AB50D3E12EB3617F3E7696EA011F9652679E8E5D8145295A36F4A93E1AADCD
2,956,129 UART: [art] SIG.R = AF5CEAE9244696EBBB323C460BAB824EE2212F7A56907ABD0C6482E1FF5B4C0F6EABFB373A580267D3A6920F83E6FA8F
2,962,904 UART: [art] SIG.S = A1CA547E27715FBEBAAE23AF4EA8AFC688ADE7D191C00F1DA53D47800F2926B7005470558980E2D2D830B80E42579822
2,986,702 UART: Caliptra RT
2,987,047 UART: [state] CFI Enabled
3,094,813 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,209,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,210,888 UART:
2,211,153 UART: Running Caliptra ROM ...
2,212,229 UART:
2,212,386 UART: [state] CFI Enabled
2,213,296 UART: [state] LifecycleState = Unprovisioned
2,214,952 UART: [state] DebugLocked = No
2,216,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,219,378 UART: [kat] SHA2-256
2,220,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,223,056 UART: [kat] ++
2,223,516 UART: [kat] sha1
2,224,033 UART: [kat] SHA2-256
2,224,775 UART: [kat] SHA2-384
2,225,466 UART: [kat] SHA2-512-ACC
2,226,352 UART: [kat] ECC-384
2,764,401 UART: [kat] HMAC-384Kdf
2,776,573 UART: [kat] LMS
3,966,833 UART: [kat] --
3,973,003 UART: [cold-reset] ++
3,975,384 UART: [fht] Storing FHT @ 0x50003400
3,986,810 UART: [idev] ++
3,987,428 UART: [idev] CDI.KEYID = 6
3,988,342 UART: [idev] SUBJECT.KEYID = 7
3,989,610 UART: [idev] UDS.KEYID = 0
4,010,078 UART: [idev] Erasing UDS.KEYID = 0
7,323,557 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,268 UART: [idev] --
7,348,584 UART: [ldev] ++
7,349,219 UART: [ldev] CDI.KEYID = 6
7,350,157 UART: [ldev] SUBJECT.KEYID = 5
7,351,375 UART: [ldev] AUTHORITY.KEYID = 7
7,352,613 UART: [ldev] FE.KEYID = 1
7,398,465 UART: [ldev] Erasing FE.KEYID = 1
10,733,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,557 UART: [ldev] --
13,112,177 UART: [fwproc] Waiting for Commands...
13,115,201 UART: [fwproc] Received command 0x4d454153
13,124,094 >>> mbox cmd response data (12 bytes)
13,126,714 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
13,227,110 UART: [fwproc] Received command 0x46574c44
13,229,371 UART: [fwproc] Received Image of size 78492 bytes
16,851,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,928,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,997,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,189,605 >>> mbox cmd response: success
17,193,204 UART: [afmc] ++
17,193,797 UART: [afmc] CDI.KEYID = 6
17,194,739 UART: [afmc] SUBJECT.KEYID = 7
17,195,948 UART: [afmc] AUTHORITY.KEYID = 5
20,554,400 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,856,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,858,620 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,872,994 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,887,830 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,902,267 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,923,757 UART: [afmc] --
22,928,260 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,928,651 UART: [cold-reset] --
22,930,496 UART: [state] Locking Datavault
22,937,153 UART: [state] Locking PCR0, PCR1 and PCR31
22,938,908 UART: [state] Locking ICCM
22,941,626 UART: [exit] Launching FMC @ 0x40000130
22,950,009 UART:
22,950,252 UART: Running Caliptra FMC ...
22,951,288 UART:
22,951,435 UART: [state] CFI Enabled
23,015,284 UART: [fht] FMC Alias Private Key: 7
25,353,456 UART: [art] Extend RT PCRs Done
25,354,685 UART: [art] Lock RT PCRs Done
25,356,121 UART: [art] Populate DV Done
25,361,533 UART: [fht] FMC Alias Private Key: 7
25,363,238 UART: [art] Derive CDI
25,363,976 UART: [art] Store in in slot 0x4
25,424,241 UART: [art] Derive Key Pair
25,425,281 UART: [art] Store priv key in slot 0x5
28,718,262 UART: [art] Derive Key Pair - Done
28,731,259 UART: [art] Signing Cert with AUTHO
28,732,564 UART: RITY.KEYID = 7
31,020,502 UART: [art] Erasing AUTHORITY.KEYID = 7
31,022,003 UART: [art] PUB.X = 3CAF74C33950B8B07F68DC8A95FF89AE53DBBB6033B771104D362E970A9AF740ACFE8D93B5C0867D95F98DB8CDF1D066
31,029,302 UART: [art] PUB.Y = CE7B24675D1B217E2847D262766A586539FF4E93E42E16D685A72F33B98CF738E3468774A9D1DC58DF680E11679B923D
31,036,530 UART: [art] SIG.R = DE3A9530C610A1ACC67DB742E789A289EDD25547B7F82C6E4CA8BDB55628B75FFA7B653DAB84726D5C0B3EC5DCE041D7
31,043,922 UART: [art] SIG.S = B9380CCE1AB736A12B15F7CBE0F467CE5BA672770A18A2A12F848A0D28DD6C2FE1DA6996A4C283DAD16B6EF15BC4468B
32,348,701 UART: mbox::rt_entry...
32,349,666 UART: ____ _ _ _ ____ _____
32,351,599 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,353,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,355,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,357,466 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,359,412 UART: |_|
32,360,246 UART:
32,485,057 UART: [rt] Runtime listening for mailbox commands...
32,487,235 >>> mbox cmd response data (48 bytes)
32,487,774 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,490,101 >>> mbox cmd response data (48 bytes)
32,490,978 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,504,903 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,208,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,842,210 >>> mbox cmd response data (12 bytes)
12,844,798 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,247,161 >>> mbox cmd response: success
22,921,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,936,625 UART:
22,936,946 UART: Running Caliptra FMC ...
22,938,024 UART:
22,938,188 UART: [state] CFI Enabled
23,007,820 UART: [fht] FMC Alias Private Key: 7
25,345,259 UART: [art] Extend RT PCRs Done
25,346,482 UART: [art] Lock RT PCRs Done
25,348,354 UART: [art] Populate DV Done
25,353,712 UART: [fht] FMC Alias Private Key: 7
25,355,254 UART: [art] Derive CDI
25,355,989 UART: [art] Store in in slot 0x4
25,416,295 UART: [art] Derive Key Pair
25,417,356 UART: [art] Store priv key in slot 0x5
28,710,183 UART: [art] Derive Key Pair - Done
28,723,287 UART: [art] Signing Cert with AUTHO
28,724,597 UART: RITY.KEYID = 7
31,011,768 UART: [art] Erasing AUTHORITY.KEYID = 7
31,013,276 UART: [art] PUB.X = 6F6EE09FC5F85D7590D93CC723A7A15CD42F875753279BBC54EB9D77790F90A1BA7CF44B5F61C056BDE786A42A712104
31,020,539 UART: [art] PUB.Y = 05BA1401C71D2D00A51E86A67F3FFAA75A85267C055A9B7ABFF960A1A8D9EE1DE96520A6AD2A33D55348AA2502EEB017
31,027,809 UART: [art] SIG.R = E86F17D8458218FFF7D070FD83927792994D22F69842A7A527B01FA5F443E736A7BCD650E8756D5F5A289D7B807A4E92
31,035,155 UART: [art] SIG.S = 96C4695A1B5E004BB44937C5C8B16CE25DFF15A106FFF0C2C4D18B2B5C97F1A4C0A589E266AC83F6157CEF513B967AF4
32,340,001 UART: mbox::rt_entry...
32,340,964 UART: ____ _ _ _ ____ _____
32,342,899 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,344,907 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,346,765 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,348,750 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,350,636 UART: |_|
32,351,459 UART:
32,476,798 UART: [rt] Runtime listening for mailbox commands...
32,478,959 >>> mbox cmd response data (48 bytes)
32,479,524 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,481,840 >>> mbox cmd response data (48 bytes)
32,482,720 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,496,620 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
2,211,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,212,558 UART:
2,212,831 UART: Running Caliptra ROM ...
2,213,904 UART:
2,214,051 UART: [state] CFI Enabled
2,214,941 UART: [state] LifecycleState = Unprovisioned
2,216,587 UART: [state] DebugLocked = No
2,217,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,220,913 UART: [kat] SHA2-256
2,221,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,224,570 UART: [kat] ++
2,225,013 UART: [kat] sha1
2,225,523 UART: [kat] SHA2-256
2,226,173 UART: [kat] SHA2-384
2,226,822 UART: [kat] SHA2-512-ACC
2,227,652 UART: [kat] ECC-384
3,117,001 UART: [kat] HMAC-384Kdf
3,128,543 UART: [kat] LMS
4,318,669 UART: [kat] --
4,323,670 UART: [cold-reset] ++
4,326,253 UART: [fht] Storing FHT @ 0x50003400
4,337,467 UART: [idev] ++
4,338,029 UART: [idev] CDI.KEYID = 6
4,338,964 UART: [idev] SUBJECT.KEYID = 7
4,340,231 UART: [idev] UDS.KEYID = 0
4,355,368 UART: [idev] Erasing UDS.KEYID = 0
7,626,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,470 UART: [idev] --
7,651,737 UART: [ldev] ++
7,652,352 UART: [ldev] CDI.KEYID = 6
7,653,333 UART: [ldev] SUBJECT.KEYID = 5
7,654,488 UART: [ldev] AUTHORITY.KEYID = 7
7,655,779 UART: [ldev] FE.KEYID = 1
7,667,611 UART: [ldev] Erasing FE.KEYID = 1
10,957,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,798 UART: [ldev] --
13,315,460 UART: [fwproc] Waiting for Commands...
13,317,934 UART: [fwproc] Received command 0x4d454153
13,326,822 >>> mbox cmd response data (12 bytes)
13,329,701 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
13,428,952 UART: [fwproc] Received command 0x46574c44
13,431,213 UART: [fwproc] Received Image of size 78492 bytes
17,048,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,126,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,194,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,388,300 >>> mbox cmd response: success
17,392,839 UART: [afmc] ++
17,393,437 UART: [afmc] CDI.KEYID = 6
17,394,351 UART: [afmc] SUBJECT.KEYID = 7
17,395,570 UART: [afmc] AUTHORITY.KEYID = 5
20,708,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,001,248 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,003,518 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,017,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,032,759 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,047,182 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,068,160 UART: [afmc] --
23,071,595 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,071,952 UART: [cold-reset] --
23,076,868 UART: [state] Locking Datavault
23,082,718 UART: [state] Locking PCR0, PCR1 and PCR31
23,084,423 UART: [state] Locking ICCM
23,085,616 UART: [exit] Launching FMC @ 0x40000130
23,094,042 UART:
23,094,327 UART: Running Caliptra FMC ...
23,095,440 UART:
23,095,600 UART: [state] CFI Enabled
23,103,811 UART: [fht] FMC Alias Private Key: 7
25,434,658 UART: [art] Extend RT PCRs Done
25,435,882 UART: [art] Lock RT PCRs Done
25,437,129 UART: [art] Populate DV Done
25,442,755 UART: [fht] FMC Alias Private Key: 7
25,444,460 UART: [art] Derive CDI
25,445,272 UART: [art] Store in in slot 0x4
25,487,596 UART: [art] Derive Key Pair
25,488,593 UART: [art] Store priv key in slot 0x5
28,730,204 UART: [art] Derive Key Pair - Done
28,743,417 UART: [art] Signing Cert with AUTHO
28,744,746 UART: RITY.KEYID = 7
31,023,887 UART: [art] Erasing AUTHORITY.KEYID = 7
31,025,399 UART: [art] PUB.X = FF4788AE788696EDE60AC2D08D606CF7A540487E2AA08FEBFDC205DC10B06DF484F199C93F57E444FBA3745EF5F86F6E
31,032,666 UART: [art] PUB.Y = 6BB2E061B0C83F297E2B3C4FEFDD875557BFBE9AC3296138737A9A0280C310B6BFC0A10AD97A24ED3E36E3F666B4A516
31,039,916 UART: [art] SIG.R = B91BDAE985925F0C8914C5EFAE0AC6A6F29804409E066324A5F3F55407C88677C55373F2FE2335DC531A98C89A3096E1
31,047,284 UART: [art] SIG.S = 8BAE519061BB5A7EAF9D94C9DBAD57777EDFE7FBFF2E986E17D096B07F78072FEDD6948F3DB605037286A702B91344E7
32,352,591 UART: mbox::rt_entry...
32,353,567 UART: ____ _ _ _ ____ _____
32,355,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,357,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,359,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,361,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,363,321 UART: |_|
32,364,126 UART:
32,488,666 UART: [rt] Runtime listening for mailbox commands...
32,490,837 >>> mbox cmd response data (48 bytes)
32,491,427 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,493,749 >>> mbox cmd response data (48 bytes)
32,494,630 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,508,530 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
2,210,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,051,813 >>> mbox cmd response data (12 bytes)
13,055,014 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,456,188 >>> mbox cmd response: success
23,085,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,100,243 UART:
23,100,569 UART: Running Caliptra FMC ...
23,101,734 UART:
23,101,925 UART: [state] CFI Enabled
23,109,788 UART: [fht] FMC Alias Private Key: 7
25,440,646 UART: [art] Extend RT PCRs Done
25,441,876 UART: [art] Lock RT PCRs Done
25,443,291 UART: [art] Populate DV Done
25,448,929 UART: [fht] FMC Alias Private Key: 7
25,450,634 UART: [art] Derive CDI
25,451,662 UART: [art] Store in in slot 0x4
25,493,756 UART: [art] Derive Key Pair
25,494,766 UART: [art] Store priv key in slot 0x5
28,736,688 UART: [art] Derive Key Pair - Done
28,749,750 UART: [art] Signing Cert with AUTHO
28,751,054 UART: RITY.KEYID = 7
31,030,829 UART: [art] Erasing AUTHORITY.KEYID = 7
31,032,349 UART: [art] PUB.X = F51E291118CADBA26121A9FF5CFC41CBDC82D64CD796BAFAB971EC205285683B73803288132CD09B331B27DD1BD59F5F
31,039,568 UART: [art] PUB.Y = 2244993095ADA27D1D9B0A9DB12A0EE213689E60E57ACF3D9B7F790D5C104ED0E35EADFF88A3F8EE57B06A3C0E276689
31,046,814 UART: [art] SIG.R = D41E5EAD9457034F2166EB94054C2C97C9A1FD2E5A917A1097E4D15537BC54A7F23990DFD339FCE016CF4F90DC121C4F
31,054,244 UART: [art] SIG.S = EA89CBC3CF6FC320946E02557BB9FAC83B8C1F693852C194A420C9910E5CAFD7A2E107553BDE75D7DC4D5FEE35E1FF39
32,359,240 UART: mbox::rt_entry...
32,360,197 UART: ____ _ _ _ ____ _____
32,362,131 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,364,136 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,366,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,368,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,369,988 UART: |_|
32,370,789 UART:
32,496,068 UART: [rt] Runtime listening for mailbox commands...
32,498,180 >>> mbox cmd response data (48 bytes)
32,498,748 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,501,107 >>> mbox cmd response data (48 bytes)
32,501,992 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,515,891 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,204,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,206,006 UART:
2,206,270 UART: Running Caliptra ROM ...
2,207,436 UART:
2,207,592 UART: [state] CFI Enabled
2,208,489 UART: [state] LifecycleState = Unprovisioned
2,210,153 UART: [state] DebugLocked = No
2,211,213 UART: [state] WD Timer not started. Device not locked for debugging
2,213,715 UART: [kat] SHA2-256
2,214,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,405 UART: [kat] ++
2,217,886 UART: [kat] sha1
2,218,402 UART: [kat] SHA2-256
2,219,060 UART: [kat] SHA2-384
2,219,723 UART: [kat] SHA2-512-ACC
2,220,549 UART: [kat] ECC-384
2,947,085 UART: [kat] HMAC-384Kdf
2,969,898 UART: [kat] LMS
3,499,342 UART: [kat] --
3,504,880 UART: [cold-reset] ++
3,507,139 UART: [fht] FHT @ 0x50003400
3,519,466 UART: [idev] ++
3,520,030 UART: [idev] CDI.KEYID = 6
3,520,916 UART: [idev] SUBJECT.KEYID = 7
3,522,126 UART: [idev] UDS.KEYID = 0
3,542,494 UART: [idev] Erasing UDS.KEYID = 0
6,022,585 UART: [idev] Sha1 KeyId Algorithm
6,045,013 UART: [idev] --
6,048,845 UART: [ldev] ++
6,049,414 UART: [ldev] CDI.KEYID = 6
6,050,299 UART: [ldev] SUBJECT.KEYID = 5
6,051,511 UART: [ldev] AUTHORITY.KEYID = 7
6,052,740 UART: [ldev] FE.KEYID = 1
6,098,397 UART: [ldev] Erasing FE.KEYID = 1
8,600,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,962 UART: [ldev] --
10,413,499 UART: [fwproc] Wait for Commands...
10,415,639 UART: [fwproc] Recv command 0x4d454153
10,424,125 >>> mbox cmd response data (12 bytes)
10,426,764 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
10,526,189 UART: [fwproc] Recv command 0x46574c44
10,528,362 UART: [fwproc] Recv'd Img size: 78456 bytes
13,490,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,562,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,631,217 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,822,878 >>> mbox cmd response: success
13,826,739 UART: [afmc] ++
13,827,342 UART: [afmc] CDI.KEYID = 6
13,828,254 UART: [afmc] SUBJECT.KEYID = 7
13,829,410 UART: [afmc] AUTHORITY.KEYID = 5
16,357,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,083,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,085,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,100,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,116,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,132,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,155,867 UART: [afmc] --
18,159,896 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,160,257 UART: [cold-reset] --
18,163,555 UART: [state] Locking Datavault
18,167,662 UART: [state] Locking PCR0, PCR1 and PCR31
18,169,362 UART: [state] Locking ICCM
18,171,161 UART: [exit] Launching FMC @ 0x40000130
18,179,575 UART:
18,179,827 UART: Running Caliptra FMC ...
18,180,932 UART:
18,181,095 UART: [state] CFI Enabled
18,240,664 UART: [fht] FMC Alias Private Key: 7
20,004,514 UART: [art] Extend RT PCRs Done
20,005,752 UART: [art] Lock RT PCRs Done
20,007,380 UART: [art] Populate DV Done
20,012,965 UART: [fht] FMC Alias Private Key: 7
20,014,539 UART: [art] Derive CDI
20,015,311 UART: [art] Store in in slot 0x4
20,073,030 UART: [art] Derive Key Pair
20,074,034 UART: [art] Store priv key in slot 0x5
22,537,100 UART: [art] Derive Key Pair - Done
22,550,258 UART: [art] Signing Cert with AUTHO
22,551,561 UART: RITY.KEYID = 7
24,262,699 UART: [art] Erasing AUTHORITY.KEYID = 7
24,264,207 UART: [art] PUB.X = 57CE877EF700110EC395881BDBE967E2DF4725997E9C373742FB661ADD8AB200B213081512D65DC0DED82102F477E4F3
24,271,381 UART: [art] PUB.Y = 61DC8C93E4D608D91E9D156A4DDAEB8DFC4E929D641CAD918D3A505DCEF4135334D4F5CAC6B144D67CE841577FDC2166
24,278,698 UART: [art] SIG.R = 2E306A6E8402C3C1EFA3CF857B8ACE4133C40FD975EDDD7B3D58A885623A9C8E9821302F26885315D6E751D803936B80
24,286,107 UART: [art] SIG.S = 2D02DB557DAB65DAFFE13AE7B1F6186A6DE881888689DE97B85CB461C6C5B444B1C70315D6EAE279F2117BE08E987EB4
25,264,666 UART: mbox::rt_entry...
25,265,632 UART: ____ _ _ _ ____ _____
25,267,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,269,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,271,603 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,273,465 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,275,391 UART: |_|
25,276,199 UART:
25,400,034 UART: [rt] Runtime listening for mailbox commands...
25,402,201 >>> mbox cmd response data (48 bytes)
25,402,768 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,405,099 >>> mbox cmd response data (48 bytes)
25,406,002 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,419,849 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
2,209,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,183,863 >>> mbox cmd response data (12 bytes)
10,186,136 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,582,415 >>> mbox cmd response: success
17,858,717 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,875,628 UART:
17,875,951 UART: Running Caliptra FMC ...
17,877,105 UART:
17,877,269 UART: [state] CFI Enabled
17,941,868 UART: [fht] FMC Alias Private Key: 7
19,706,142 UART: [art] Extend RT PCRs Done
19,707,362 UART: [art] Lock RT PCRs Done
19,709,060 UART: [art] Populate DV Done
19,714,484 UART: [fht] FMC Alias Private Key: 7
19,716,018 UART: [art] Derive CDI
19,716,756 UART: [art] Store in in slot 0x4
19,774,955 UART: [art] Derive Key Pair
19,776,005 UART: [art] Store priv key in slot 0x5
22,238,668 UART: [art] Derive Key Pair - Done
22,251,666 UART: [art] Signing Cert with AUTHO
22,252,957 UART: RITY.KEYID = 7
23,965,520 UART: [art] Erasing AUTHORITY.KEYID = 7
23,967,078 UART: [art] PUB.X = 7DDC0176781084B578557B22B8666F586E957BCF15E09CA189E7490A203157E262ECFDE78638341059A9AF8991680D82
23,974,262 UART: [art] PUB.Y = 8FC0FCF2D58B098BAFC825198930E5182646298DBB99BE3CD0D515FF7DC029F8FBE8E1D00B86A0F04F2B816CB6BB4A17
23,981,562 UART: [art] SIG.R = 6CAA9F4E50FE7994EC773B00D9BD72DC443513139FDB074C6AE32FE073CC9F5E52144E4AA60177E63FCA386825C02E76
23,988,938 UART: [art] SIG.S = BD877DD6A5FAC6EB35D4F9AFB42EF4E0F8F0AF694655DA8A67DBC9B391E3A17982FCC90E00E92E6C0E5F92E13B037C20
24,967,528 UART: mbox::rt_entry...
24,968,498 UART: ____ _ _ _ ____ _____
24,970,427 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,972,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,974,328 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,976,316 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,978,174 UART: |_|
24,978,995 UART:
25,105,003 UART: [rt] Runtime listening for mailbox commands...
25,107,182 >>> mbox cmd response data (48 bytes)
25,107,766 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,110,085 >>> mbox cmd response data (48 bytes)
25,110,980 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,124,823 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
2,211,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,351 UART:
2,213,611 UART: Running Caliptra ROM ...
2,214,676 UART:
2,214,831 UART: [state] CFI Enabled
2,215,728 UART: [state] LifecycleState = Unprovisioned
2,217,395 UART: [state] DebugLocked = No
2,218,430 UART: [state] WD Timer not started. Device not locked for debugging
2,220,901 UART: [kat] SHA2-256
2,221,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,224,572 UART: [kat] ++
2,225,026 UART: [kat] sha1
2,225,541 UART: [kat] SHA2-256
2,226,199 UART: [kat] SHA2-384
2,226,858 UART: [kat] SHA2-512-ACC
2,227,690 UART: [kat] ECC-384
3,287,054 UART: [kat] HMAC-384Kdf
3,300,140 UART: [kat] LMS
3,829,614 UART: [kat] --
3,832,634 UART: [cold-reset] ++
3,834,191 UART: [fht] FHT @ 0x50003400
3,844,739 UART: [idev] ++
3,845,302 UART: [idev] CDI.KEYID = 6
3,846,180 UART: [idev] SUBJECT.KEYID = 7
3,847,393 UART: [idev] UDS.KEYID = 0
3,863,909 UART: [idev] Erasing UDS.KEYID = 0
6,320,200 UART: [idev] Sha1 KeyId Algorithm
6,342,407 UART: [idev] --
6,346,943 UART: [ldev] ++
6,347,514 UART: [ldev] CDI.KEYID = 6
6,348,402 UART: [ldev] SUBJECT.KEYID = 5
6,349,618 UART: [ldev] AUTHORITY.KEYID = 7
6,350,856 UART: [ldev] FE.KEYID = 1
6,361,602 UART: [ldev] Erasing FE.KEYID = 1
8,837,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,047 UART: [ldev] --
10,627,947 UART: [fwproc] Wait for Commands...
10,630,274 UART: [fwproc] Recv command 0x4d454153
10,638,805 >>> mbox cmd response data (12 bytes)
10,641,510 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
10,740,985 UART: [fwproc] Recv command 0x46574c44
10,743,109 UART: [fwproc] Recv'd Img size: 78456 bytes
13,714,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,791,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,859,774 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,051,388 >>> mbox cmd response: success
14,054,996 UART: [afmc] ++
14,055,595 UART: [afmc] CDI.KEYID = 6
14,056,512 UART: [afmc] SUBJECT.KEYID = 7
14,057,679 UART: [afmc] AUTHORITY.KEYID = 5
16,558,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,277,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,279,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,295,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,311,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,327,435 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,349,224 UART: [afmc] --
18,353,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,353,745 UART: [cold-reset] --
18,355,157 UART: [state] Locking Datavault
18,359,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,360,948 UART: [state] Locking ICCM
18,362,803 UART: [exit] Launching FMC @ 0x40000130
18,371,259 UART:
18,371,519 UART: Running Caliptra FMC ...
18,372,624 UART:
18,372,785 UART: [state] CFI Enabled
18,380,456 UART: [fht] FMC Alias Private Key: 7
20,137,012 UART: [art] Extend RT PCRs Done
20,138,233 UART: [art] Lock RT PCRs Done
20,139,992 UART: [art] Populate DV Done
20,145,187 UART: [fht] FMC Alias Private Key: 7
20,146,780 UART: [art] Derive CDI
20,147,520 UART: [art] Store in in slot 0x4
20,190,492 UART: [art] Derive Key Pair
20,191,492 UART: [art] Store priv key in slot 0x5
22,618,364 UART: [art] Derive Key Pair - Done
22,631,428 UART: [art] Signing Cert with AUTHO
22,632,744 UART: RITY.KEYID = 7
24,338,295 UART: [art] Erasing AUTHORITY.KEYID = 7
24,339,810 UART: [art] PUB.X = 77A0D4C5751604FEB2E51EA16659E67688D4AAD12909B5898DC93B32ABBAA458140F1F1CA96E1CA0591C7FD82D583F20
24,347,087 UART: [art] PUB.Y = 15D99E745DD5C0E0701A005126F969B10B05A1051D77C7929598DEB766DA38F7F9C79862E02D9CCFA4E7E4EEE5F75267
24,354,290 UART: [art] SIG.R = 68A23031B7783B2E305E2FA903D4EC418B627930BEA608F4E0C15FB08A54A7D17A65F5BD48D893B0B40A8FE435338BBF
24,361,702 UART: [art] SIG.S = A3A39224A3DD7E09AB9CEF31265C3AC04D9046F6E82CC5F8FEDAFDFBB032F89F4A6C7B86CCFC13EAB9E386D91CE9677E
25,339,752 UART: mbox::rt_entry...
25,340,706 UART: ____ _ _ _ ____ _____
25,342,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,344,637 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,346,495 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,348,421 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,350,279 UART: |_|
25,351,162 UART:
25,475,950 UART: [rt] Runtime listening for mailbox commands...
25,478,078 >>> mbox cmd response data (48 bytes)
25,478,649 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,480,961 >>> mbox cmd response data (48 bytes)
25,481,866 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,495,734 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,814 writing to cptra_bootfsm_go
2,218,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,418,842 >>> mbox cmd response data (12 bytes)
10,420,781 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,827,383 >>> mbox cmd response: success
18,058,802 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,076,425 UART:
18,076,758 UART: Running Caliptra FMC ...
18,077,837 UART:
18,077,991 UART: [state] CFI Enabled
18,085,971 UART: [fht] FMC Alias Private Key: 7
19,843,306 UART: [art] Extend RT PCRs Done
19,844,528 UART: [art] Lock RT PCRs Done
19,845,856 UART: [art] Populate DV Done
19,851,109 UART: [fht] FMC Alias Private Key: 7
19,852,815 UART: [art] Derive CDI
19,853,632 UART: [art] Store in in slot 0x4
19,896,551 UART: [art] Derive Key Pair
19,897,551 UART: [art] Store priv key in slot 0x5
22,324,674 UART: [art] Derive Key Pair - Done
22,338,005 UART: [art] Signing Cert with AUTHO
22,339,312 UART: RITY.KEYID = 7
24,045,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,046,613 UART: [art] PUB.X = 1B42D6219BCF971B27CFCB6D7A8BA06632C0E256C155D5134CD052FEFC457CF30E78944D9C5B7A98C964541453639F99
24,053,892 UART: [art] PUB.Y = 8AFF4BE763CE3463070E0BE1537DD6D9B5C4049C83DAB4D395E0C999505F5BCB907E1EB19CB6614D6437E63034C26606
24,061,156 UART: [art] SIG.R = 45223FE685D350C318BAA9562A9E167C43361A90B79C7E533E59836F1EA71EA42BB89ADD2E74DC2EA4976CC42C08A10F
24,068,554 UART: [art] SIG.S = A1AB811AF7613C87F720C3CF4AC80632A60CBF1D444FDE989CAE449276FE87D3AEE8E306762839967D34F2907B3AFFE0
25,046,731 UART: mbox::rt_entry...
25,047,697 UART: ____ _ _ _ ____ _____
25,049,684 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,051,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,053,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,055,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,057,567 UART: |_|
25,058,379 UART:
25,182,739 UART: [rt] Runtime listening for mailbox commands...
25,184,903 >>> mbox cmd response data (48 bytes)
25,185,429 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,187,742 >>> mbox cmd response data (48 bytes)
25,188,638 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,202,487 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,212,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,864 UART:
2,214,128 UART: Running Caliptra ROM ...
2,215,233 UART:
2,215,385 UART: [state] CFI Enabled
2,216,312 UART: [state] LifecycleState = Unprovisioned
2,217,871 UART: [state] DebugLocked = No
2,218,907 UART: [state] WD Timer not started. Device not locked for debugging
2,221,405 UART: [kat] SHA2-256
2,222,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,225,111 UART: [kat] ++
2,225,560 UART: [kat] sha1
2,226,111 UART: [kat] SHA2-256
2,226,770 UART: [kat] SHA2-384
2,227,426 UART: [kat] SHA2-512-ACC
2,228,270 UART: [kat] ECC-384
2,947,787 UART: [kat] HMAC-384Kdf
2,972,806 UART: [kat] LMS
3,504,548 UART: [kat] --
3,508,570 UART: [cold-reset] ++
3,510,985 UART: [fht] FHT @ 0x50003400
3,522,134 UART: [idev] ++
3,522,804 UART: [idev] CDI.KEYID = 6
3,523,888 UART: [idev] SUBJECT.KEYID = 7
3,524,989 UART: [idev] UDS.KEYID = 0
3,545,781 UART: [idev] Erasing UDS.KEYID = 0
6,030,790 UART: [idev] Sha1 KeyId Algorithm
6,053,453 UART: [idev] --
6,057,020 UART: [ldev] ++
6,057,702 UART: [ldev] CDI.KEYID = 6
6,058,592 UART: [ldev] SUBJECT.KEYID = 5
6,059,805 UART: [ldev] AUTHORITY.KEYID = 7
6,060,980 UART: [ldev] FE.KEYID = 1
6,103,967 UART: [ldev] Erasing FE.KEYID = 1
8,610,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,457 UART: [ldev] --
10,415,680 UART: [fwproc] Wait for Commands...
10,418,630 UART: [fwproc] Recv command 0x4d454153
10,428,368 >>> mbox cmd response data (12 bytes)
10,431,098 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
10,531,017 UART: [fwproc] Recv command 0x46574c44
10,533,032 UART: [fwproc] Recv'd Img size: 78456 bytes
13,531,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,611,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,727,532 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,054,600 >>> mbox cmd response: success
14,059,192 UART: [afmc] ++
14,059,895 UART: [afmc] CDI.KEYID = 6
14,061,059 UART: [afmc] SUBJECT.KEYID = 7
14,062,554 UART: [afmc] AUTHORITY.KEYID = 5
16,600,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,342,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,344,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,359,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,374,393 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,389,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,413,884 UART: [afmc] --
18,417,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,417,869 UART: [cold-reset] --
18,420,682 UART: [state] Locking Datavault
18,426,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,429,186 UART: [state] Locking ICCM
18,432,167 UART: [exit] Launching FMC @ 0x40000130
18,440,801 UART:
18,441,038 UART: Running Caliptra FMC ...
18,442,135 UART:
18,442,289 UART: [state] CFI Enabled
18,499,719 UART: [fht] FMC Alias Private Key: 7
20,263,804 UART: [art] Extend RT PCRs Done
20,265,027 UART: [art] Lock RT PCRs Done
20,266,611 UART: [art] Populate DV Done
20,272,127 UART: [fht] FMC Alias Private Key: 7
20,273,658 UART: [art] Derive CDI
20,274,472 UART: [art] Store in in slot 0x4
20,333,913 UART: [art] Derive Key Pair
20,334,947 UART: [art] Store priv key in slot 0x5
22,797,620 UART: [art] Derive Key Pair - Done
22,810,678 UART: [art] Signing Cert with AUTHO
22,812,135 UART: RITY.KEYID = 7
24,523,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,524,863 UART: [art] PUB.X = DF7967C43659549766318541104CA732BE2669E07060F607C3C18FE6FC8147861C9E371D52CEABCDC8F00CC52E623CA2
24,532,132 UART: [art] PUB.Y = 8E641CCB582589F0B9064B57DD3542A957F3D2C61D177B28C7BDCA9817AE7D2BE34881C934D6C0179A6A5062BB811925
24,539,385 UART: [art] SIG.R = 0DF8072F207EB5F498A30FD19C2702AB441EC4E13E76B9F9A39BD05817C07303FA48683EFEB83073EBC617122E525043
24,546,755 UART: [art] SIG.S = A4F18E925858745AE3084E65E380A7471FDBD534C197F4DA72A766649A9CD203100B94112A39475E7FC49F43250C838C
25,525,542 UART: mbox::rt_entry...
25,526,510 UART: ____ _ _ _ ____ _____
25,528,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,530,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,532,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,534,567 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,536,490 UART: |_|
25,537,297 UART:
25,662,784 UART: [rt] Runtime listening for mailbox commands...
25,664,934 >>> mbox cmd response data (48 bytes)
25,665,525 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,667,846 >>> mbox cmd response data (48 bytes)
25,668,720 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,682,596 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,207,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,247,598 >>> mbox cmd response data (12 bytes)
10,250,853 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,074,746 >>> mbox cmd response: success
18,344,545 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,356,554 UART:
18,356,927 UART: Running Caliptra FMC ...
18,358,086 UART:
18,358,258 UART: [state] CFI Enabled
18,427,752 UART: [fht] FMC Alias Private Key: 7
20,192,193 UART: [art] Extend RT PCRs Done
20,193,416 UART: [art] Lock RT PCRs Done
20,194,936 UART: [art] Populate DV Done
20,200,180 UART: [fht] FMC Alias Private Key: 7
20,201,660 UART: [art] Derive CDI
20,202,421 UART: [art] Store in in slot 0x4
20,260,784 UART: [art] Derive Key Pair
20,261,776 UART: [art] Store priv key in slot 0x5
22,724,634 UART: [art] Derive Key Pair - Done
22,737,422 UART: [art] Signing Cert with AUTHO
22,738,713 UART: RITY.KEYID = 7
24,450,597 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,102 UART: [art] PUB.X = 44A2DA504E1A0269BF34AE541AF038039DB73A9BFBD52A2EF5275CE73027CACDBDA1FF0A0E1B4578B2704EFFF355D82E
24,459,439 UART: [art] PUB.Y = ABB2E2D1D07420E44E68BB4297D6E2867F022AA7E09B9E57751522AF1D23AD71DCFE679CCB8DD062FC99E59E252B94C2
24,466,682 UART: [art] SIG.R = 85A220CE8566D11771BA17EBD81A7B35C80D515AB0DE496A4F86CEB9AE600378501CE295E22B938463CC1574ECBA4907
24,474,083 UART: [art] SIG.S = C59D62CC70E4A7EBF3B0969695C599620C66A85645772AFCBE4E591449F971A2523952DBCBF8917B540E2DA0E59B8EB3
25,453,151 UART: mbox::rt_entry...
25,454,120 UART: ____ _ _ _ ____ _____
25,456,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,458,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,460,042 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,462,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,463,965 UART: |_|
25,464,773 UART:
25,589,049 UART: [rt] Runtime listening for mailbox commands...
25,591,172 >>> mbox cmd response data (48 bytes)
25,591,726 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,594,076 >>> mbox cmd response data (48 bytes)
25,594,962 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,609,000 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,585 writing to cptra_bootfsm_go
2,219,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,220,378 UART:
2,220,626 UART: Running Caliptra ROM ...
2,221,693 UART:
2,221,847 UART: [state] CFI Enabled
2,222,732 UART: [state] LifecycleState = Unprovisioned
2,224,392 UART: [state] DebugLocked = No
2,225,519 UART: [state] WD Timer not started. Device not locked for debugging
2,227,992 UART: [kat] SHA2-256
2,228,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,231,672 UART: [kat] ++
2,232,130 UART: [kat] sha1
2,232,649 UART: [kat] SHA2-256
2,233,390 UART: [kat] SHA2-384
2,234,059 UART: [kat] SHA2-512-ACC
2,234,860 UART: [kat] ECC-384
3,290,944 UART: [kat] HMAC-384Kdf
3,304,862 UART: [kat] LMS
3,836,668 UART: [kat] --
3,841,217 UART: [cold-reset] ++
3,843,261 UART: [fht] FHT @ 0x50003400
3,855,272 UART: [idev] ++
3,855,997 UART: [idev] CDI.KEYID = 6
3,856,924 UART: [idev] SUBJECT.KEYID = 7
3,858,086 UART: [idev] UDS.KEYID = 0
3,878,173 UART: [idev] Erasing UDS.KEYID = 0
6,335,604 UART: [idev] Sha1 KeyId Algorithm
6,358,469 UART: [idev] --
6,362,094 UART: [ldev] ++
6,362,671 UART: [ldev] CDI.KEYID = 6
6,363,584 UART: [ldev] SUBJECT.KEYID = 5
6,364,741 UART: [ldev] AUTHORITY.KEYID = 7
6,366,000 UART: [ldev] FE.KEYID = 1
6,376,651 UART: [ldev] Erasing FE.KEYID = 1
8,858,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,906 UART: [ldev] --
10,652,988 UART: [fwproc] Wait for Commands...
10,655,846 UART: [fwproc] Recv command 0x4d454153
10,665,592 >>> mbox cmd response data (12 bytes)
10,668,265 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
10,768,496 UART: [fwproc] Recv command 0x46574c44
10,770,510 UART: [fwproc] Recv'd Img size: 78456 bytes
13,777,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,860,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,976,940 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,304,039 >>> mbox cmd response: success
14,308,396 UART: [afmc] ++
14,309,101 UART: [afmc] CDI.KEYID = 6
14,310,295 UART: [afmc] SUBJECT.KEYID = 7
14,311,737 UART: [afmc] AUTHORITY.KEYID = 5
16,818,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,543,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,574,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,589,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,613,199 UART: [afmc] --
18,616,749 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,617,111 UART: [cold-reset] --
18,618,956 UART: [state] Locking Datavault
18,624,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,627,093 UART: [state] Locking ICCM
18,629,307 UART: [exit] Launching FMC @ 0x40000130
18,637,985 UART:
18,638,231 UART: Running Caliptra FMC ...
18,639,336 UART:
18,639,500 UART: [state] CFI Enabled
18,647,708 UART: [fht] FMC Alias Private Key: 7
20,404,572 UART: [art] Extend RT PCRs Done
20,405,789 UART: [art] Lock RT PCRs Done
20,407,307 UART: [art] Populate DV Done
20,412,609 UART: [fht] FMC Alias Private Key: 7
20,414,240 UART: [art] Derive CDI
20,415,068 UART: [art] Store in in slot 0x4
20,458,102 UART: [art] Derive Key Pair
20,459,102 UART: [art] Store priv key in slot 0x5
22,885,755 UART: [art] Derive Key Pair - Done
22,898,770 UART: [art] Signing Cert with AUTHO
22,900,103 UART: RITY.KEYID = 7
24,605,420 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,929 UART: [art] PUB.X = E591EA34DFD27D0858423C2F32F5056CE67EB8DFE930A8D37E40880C852B7AA72871416A4445C843BFC0FC8298789ECE
24,614,209 UART: [art] PUB.Y = 6259C51BD184A14C55792BD266965F0D42944AF4F997FBA25CCD33E9817F8D7315846A40448448FFE79FE4FFD01A4097
24,621,410 UART: [art] SIG.R = 5EEEDCEFE014DA4EEF8B63BDB6907F9E81B632E9D7010E01E50CA7382CBC26EA0B4990F8DB05E6088470D461DD806C43
24,628,829 UART: [art] SIG.S = D75B0D8E99DD2F8B20E2EC264921610DDCBCFC68CB282C55E1F944E3745578AF9AD0C4779A0EED109391C15CDB9ABBD4
25,606,969 UART: mbox::rt_entry...
25,607,927 UART: ____ _ _ _ ____ _____
25,609,857 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,611,859 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,613,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,615,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,617,793 UART: |_|
25,618,677 UART:
25,744,238 UART: [rt] Runtime listening for mailbox commands...
25,746,347 >>> mbox cmd response data (48 bytes)
25,746,893 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,749,203 >>> mbox cmd response data (48 bytes)
25,750,102 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,763,944 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
2,211,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,683 >>> mbox cmd response data (12 bytes)
10,479,771 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,301,824 >>> mbox cmd response: success
18,535,828 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,551,514 UART:
18,551,858 UART: Running Caliptra FMC ...
18,553,022 UART:
18,553,197 UART: [state] CFI Enabled
18,561,458 UART: [fht] FMC Alias Private Key: 7
20,318,140 UART: [art] Extend RT PCRs Done
20,319,358 UART: [art] Lock RT PCRs Done
20,321,317 UART: [art] Populate DV Done
20,326,937 UART: [fht] FMC Alias Private Key: 7
20,328,667 UART: [art] Derive CDI
20,329,488 UART: [art] Store in in slot 0x4
20,371,817 UART: [art] Derive Key Pair
20,372,823 UART: [art] Store priv key in slot 0x5
22,799,608 UART: [art] Derive Key Pair - Done
22,812,710 UART: [art] Signing Cert with AUTHO
22,814,014 UART: RITY.KEYID = 7
24,519,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,520,910 UART: [art] PUB.X = C98B83287667D17FAF07E18911301B807ECF393AF045D133D687D429BB24ECD0F6DB2BC92BD8C151973494EB9A01FD60
24,528,145 UART: [art] PUB.Y = 8F99F1A910478F72A635A4BE0C1B1E4628CE0CEBBEE4AF4102898754AE367716CA78915C754918D163708B12F129D83C
24,535,389 UART: [art] SIG.R = A3BDF10378680BE2BA75DB0CF48217432B61CF5359477E80A5990016EB9110AE32125438631CE835F31541EAD5D39BCA
24,542,788 UART: [art] SIG.S = 46350FF8BD8175A82A097D0EBF012D378C733BBCB22A6FBFEE3D573F5A3478ADFF6B1C70CE04EB0F1764CA5A0187EACC
25,521,439 UART: mbox::rt_entry...
25,522,392 UART: ____ _ _ _ ____ _____
25,524,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,526,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,528,203 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,530,190 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,532,077 UART: |_|
25,532,909 UART:
25,658,506 UART: [rt] Runtime listening for mailbox commands...
25,660,668 >>> mbox cmd response data (48 bytes)
25,661,268 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,663,593 >>> mbox cmd response data (48 bytes)
25,664,484 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,678,332 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,473 UART: [kat] SHA2-256
882,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,519 UART: [kat] ++
886,671 UART: [kat] sha1
890,899 UART: [kat] SHA2-256
892,837 UART: [kat] SHA2-384
895,736 UART: [kat] SHA2-512-ACC
897,637 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,854 UART: [idev] ++
1,480,022 UART: [idev] CDI.KEYID = 6
1,480,382 UART: [idev] SUBJECT.KEYID = 7
1,480,806 UART: [idev] UDS.KEYID = 0
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,504,546 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,514,129 UART: [ldev] ++
1,514,297 UART: [ldev] CDI.KEYID = 6
1,514,660 UART: [ldev] SUBJECT.KEYID = 5
1,515,086 UART: [ldev] AUTHORITY.KEYID = 7
1,515,549 UART: [ldev] FE.KEYID = 1
1,520,621 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,910 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,830 UART: [fwproc] Received command 0x4d454153
1,589,894 >>> mbox cmd response data (12 bytes)
1,589,895 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,590,077 UART: [fwproc] Received command 0x46574c44
1,590,868 UART: [fwproc] Received Image of size 78456 bytes
2,478,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,916 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,534,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,616,299 >>> mbox cmd response: success
2,617,507 UART: [afmc] ++
2,617,675 UART: [afmc] CDI.KEYID = 6
2,618,037 UART: [afmc] SUBJECT.KEYID = 7
2,618,462 UART: [afmc] AUTHORITY.KEYID = 5
2,653,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,670,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,670,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,676,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,682,506 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,688,196 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,931 UART: [afmc] --
2,696,851 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,696,873 UART: [cold-reset] --
2,697,675 UART: [state] Locking Datavault
2,698,876 UART: [state] Locking PCR0, PCR1 and PCR31
2,699,480 UART: [state] Locking ICCM
2,699,964 UART: [exit] Launching FMC @ 0x40000130
2,705,293 UART:
2,705,309 UART: Running Caliptra FMC ...
2,705,717 UART:
2,705,771 UART: [state] CFI Enabled
2,716,312 UART: [fht] FMC Alias Private Key: 7
2,823,995 UART: [art] Extend RT PCRs Done
2,824,423 UART: [art] Lock RT PCRs Done
2,825,739 UART: [art] Populate DV Done
2,834,256 UART: [fht] FMC Alias Private Key: 7
2,835,342 UART: [art] Derive CDI
2,835,622 UART: [art] Store in in slot 0x4
2,921,495 UART: [art] Derive Key Pair
2,921,855 UART: [art] Store priv key in slot 0x5
2,934,293 UART: [art] Derive Key Pair - Done
2,949,151 UART: [art] Signing Cert with AUTHO
2,949,631 UART: RITY.KEYID = 7
2,964,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,688 UART: [art] PUB.X = A0311E2D4CE8BE22F994BA8FC78188AD62DEF02FC830FCC08B12E227E48B7372136A52A1D76B5F9BF92D704E2C374E09
2,972,467 UART: [art] PUB.Y = 0F33295B4AAEE64CE5A85AF9EF554265A9602CB7B57F2F8F34A51E401EFE836DF5C891FC56D060A5367AA2F01CA218D0
2,979,428 UART: [art] SIG.R = 7689D36C2AE59896CA36493D8B8794106BB55A3E8A4FD6A4A8CB4358F62DEBEB38193BEB5CC100992FBE6D49DE412204
2,986,183 UART: [art] SIG.S = C395CE8A31DB25AB4FC867B5A4415F37CFEC2A3F1C5CDF9ADAACBFC68FB3D8A9EFBA913C2A1DA3EC4934B63F4C8BA9E1
3,010,234 UART: mbox::rt_entry...
3,010,606 UART: ____ _ _ _ ____ _____
3,011,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,190 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,958 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,494 UART: |_|
3,014,806 UART:
3,133,465 UART: [rt] Runtime listening for mailbox commands...
3,134,646 >>> mbox cmd response data (48 bytes)
3,134,647 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,137,430 >>> mbox cmd response data (48 bytes)
3,137,431 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,152,568 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,537 >>> mbox cmd response data (12 bytes)
1,444,538 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,466,607 >>> mbox cmd response: success
2,521,950 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,528,233 UART:
2,528,249 UART: Running Caliptra FMC ...
2,528,657 UART:
2,528,711 UART: [state] CFI Enabled
2,539,368 UART: [fht] FMC Alias Private Key: 7
2,647,411 UART: [art] Extend RT PCRs Done
2,647,839 UART: [art] Lock RT PCRs Done
2,649,151 UART: [art] Populate DV Done
2,657,638 UART: [fht] FMC Alias Private Key: 7
2,658,572 UART: [art] Derive CDI
2,658,852 UART: [art] Store in in slot 0x4
2,744,821 UART: [art] Derive Key Pair
2,745,181 UART: [art] Store priv key in slot 0x5
2,758,179 UART: [art] Derive Key Pair - Done
2,772,678 UART: [art] Signing Cert with AUTHO
2,773,158 UART: RITY.KEYID = 7
2,788,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,697 UART: [art] PUB.X = 5A737873F3E77ADB25F4959DA8C07B451E74C6D6186B887CA7A56AE2A283A01D898D8B0FF2A4D1048FA3CEE3B8936D71
2,796,471 UART: [art] PUB.Y = 1396A566AED1C33042BAAA88E97DF4E21BD633A065346DC931022F978D32C4C4DA103FF02D23CDB8803B8ECCAAFD5F74
2,803,434 UART: [art] SIG.R = 1234EB230FE74AA30BD1BEEE315A405F78AE88B20133D9F18FCA950276F4A5C9673955BB2AB605EE1B847C4DA9B48EF6
2,810,203 UART: [art] SIG.S = FDBA081DD79D5FF321CB02AF53AEE59AF85A416E28D809D4B6035C40D9E79C256B58336617E0D77D7E75CCF1EC7F17FE
2,833,872 UART: mbox::rt_entry...
2,834,244 UART: ____ _ _ _ ____ _____
2,835,028 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,828 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,596 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,364 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,132 UART: |_|
2,838,444 UART:
2,958,243 UART: [rt] Runtime listening for mailbox commands...
2,959,424 >>> mbox cmd response data (48 bytes)
2,959,425 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,962,208 >>> mbox cmd response data (48 bytes)
2,962,209 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,977,346 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,016 UART: [kat] SHA2-256
881,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,062 UART: [kat] ++
886,214 UART: [kat] sha1
890,412 UART: [kat] SHA2-256
892,350 UART: [kat] SHA2-384
895,077 UART: [kat] SHA2-512-ACC
896,978 UART: [kat] ECC-384
902,729 UART: [kat] HMAC-384Kdf
907,343 UART: [kat] LMS
1,475,539 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,928 UART: [fht] Storing FHT @ 0x50003400
1,479,743 UART: [idev] ++
1,479,911 UART: [idev] CDI.KEYID = 6
1,480,271 UART: [idev] SUBJECT.KEYID = 7
1,480,695 UART: [idev] UDS.KEYID = 0
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,029 UART: [idev] --
1,515,048 UART: [ldev] ++
1,515,216 UART: [ldev] CDI.KEYID = 6
1,515,579 UART: [ldev] SUBJECT.KEYID = 5
1,516,005 UART: [ldev] AUTHORITY.KEYID = 7
1,516,468 UART: [ldev] FE.KEYID = 1
1,521,636 UART: [ldev] Erasing FE.KEYID = 1
1,546,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,597 UART: [ldev] --
1,585,998 UART: [fwproc] Waiting for Commands...
1,586,695 UART: [fwproc] Received command 0x4d454153
1,590,759 >>> mbox cmd response data (12 bytes)
1,590,760 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,590,826 UART: [fwproc] Received command 0x46574c44
1,591,617 UART: [fwproc] Received Image of size 78456 bytes
2,478,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,506,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,536,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,618,028 >>> mbox cmd response: success
2,619,256 UART: [afmc] ++
2,619,424 UART: [afmc] CDI.KEYID = 6
2,619,786 UART: [afmc] SUBJECT.KEYID = 7
2,620,211 UART: [afmc] AUTHORITY.KEYID = 5
2,655,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,671,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,672,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,678,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,684,357 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,690,047 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,697,850 UART: [afmc] --
2,698,746 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,698,768 UART: [cold-reset] --
2,699,646 UART: [state] Locking Datavault
2,700,709 UART: [state] Locking PCR0, PCR1 and PCR31
2,701,313 UART: [state] Locking ICCM
2,701,833 UART: [exit] Launching FMC @ 0x40000130
2,707,162 UART:
2,707,178 UART: Running Caliptra FMC ...
2,707,586 UART:
2,707,729 UART: [state] CFI Enabled
2,718,466 UART: [fht] FMC Alias Private Key: 7
2,827,189 UART: [art] Extend RT PCRs Done
2,827,617 UART: [art] Lock RT PCRs Done
2,829,209 UART: [art] Populate DV Done
2,837,656 UART: [fht] FMC Alias Private Key: 7
2,838,830 UART: [art] Derive CDI
2,839,110 UART: [art] Store in in slot 0x4
2,924,939 UART: [art] Derive Key Pair
2,925,299 UART: [art] Store priv key in slot 0x5
2,938,777 UART: [art] Derive Key Pair - Done
2,953,419 UART: [art] Signing Cert with AUTHO
2,953,899 UART: RITY.KEYID = 7
2,969,093 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,858 UART: [art] PUB.X = D7BF2F17E8B182A55EDC990EBC9D76AD6C96DC33AB901E904B6E195BF0736CCE61D6AB560747D3EAA214FC554549AA59
2,976,640 UART: [art] PUB.Y = A7C76C39E3A8BF782BDF01C06233E0D6B2497E3E36CE1A36EC1BCD76B10FC84FE6DC81D389AA8A94B5705A1CAF22868F
2,983,604 UART: [art] SIG.R = 246CE93DB8C64D4FDAF90864809BB3A1910B890ADC297C1A29D76A6C3481E8C710A19DF43B10E75B98D43A5CBCF9E5FE
2,990,381 UART: [art] SIG.S = 909FE2DF38D1A04118A0B285EBEF9A2A7CF02C639A87B09A3CB72526C82303DECA42A9D297943A76B76DFC973660842F
3,014,277 UART: mbox::rt_entry...
3,014,649 UART: ____ _ _ _ ____ _____
3,015,433 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,233 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,001 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,537 UART: |_|
3,018,849 UART:
3,137,754 UART: [rt] Runtime listening for mailbox commands...
3,138,935 >>> mbox cmd response data (48 bytes)
3,138,936 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,141,719 >>> mbox cmd response data (48 bytes)
3,141,720 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,156,857 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,658 >>> mbox cmd response data (12 bytes)
1,443,659 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,464,630 >>> mbox cmd response: success
2,519,715 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,526,308 UART:
2,526,324 UART: Running Caliptra FMC ...
2,526,732 UART:
2,526,875 UART: [state] CFI Enabled
2,537,796 UART: [fht] FMC Alias Private Key: 7
2,646,517 UART: [art] Extend RT PCRs Done
2,646,945 UART: [art] Lock RT PCRs Done
2,648,629 UART: [art] Populate DV Done
2,656,996 UART: [fht] FMC Alias Private Key: 7
2,658,012 UART: [art] Derive CDI
2,658,292 UART: [art] Store in in slot 0x4
2,743,855 UART: [art] Derive Key Pair
2,744,215 UART: [art] Store priv key in slot 0x5
2,757,327 UART: [art] Derive Key Pair - Done
2,772,111 UART: [art] Signing Cert with AUTHO
2,772,591 UART: RITY.KEYID = 7
2,787,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,436 UART: [art] PUB.X = B831F3DDA0809AA5DB3BCC125D3D606F9AF08F32EF69B42EA37B2455D13B4CDAEDDB35F5B5884A664EEB9790A46B6A41
2,795,228 UART: [art] PUB.Y = 9D55D5D5C2AC253EB6A83BF230CA599F47F4CD38C732D651D83BA1B8662DE0078AFFB44E256E86BEAC1D10FB1D41DF13
2,802,195 UART: [art] SIG.R = B20724DFD49BA00BA74CD88F93F9417AFCC3E48AF46DBFDAD037C11FB317B589D5229A5B1F975222D95F8D9A1FF675ED
2,808,979 UART: [art] SIG.S = 3ECBE98B032CBE8C05633747A45A1C18E38FF61F5288B758ECAE241884896BCD2A78A682E7DD0C015924316B427FF9C9
2,832,012 UART: mbox::rt_entry...
2,832,384 UART: ____ _ _ _ ____ _____
2,833,168 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,968 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,736 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,504 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,272 UART: |_|
2,836,584 UART:
2,955,181 UART: [rt] Runtime listening for mailbox commands...
2,956,362 >>> mbox cmd response data (48 bytes)
2,956,363 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,959,146 >>> mbox cmd response data (48 bytes)
2,959,147 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,974,284 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
893,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,411 UART: [kat] ++
897,563 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,456 UART: [kat] SHA2-512-ACC
908,357 UART: [kat] ECC-384
918,238 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,787 UART: [cold-reset] ++
1,172,349 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,184,356 UART: [idev] Erasing UDS.KEYID = 0
1,201,563 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,211,139 UART: [ldev] ++
1,211,307 UART: [ldev] CDI.KEYID = 6
1,211,670 UART: [ldev] SUBJECT.KEYID = 5
1,212,096 UART: [ldev] AUTHORITY.KEYID = 7
1,212,559 UART: [ldev] FE.KEYID = 1
1,217,751 UART: [ldev] Erasing FE.KEYID = 1
1,244,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,613 UART: [ldev] --
1,283,072 UART: [fwproc] Wait for Commands...
1,283,660 UART: [fwproc] Recv command 0x4d454153
1,287,669 >>> mbox cmd response data (12 bytes)
1,287,670 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,287,915 UART: [fwproc] Recv command 0x46574c44
1,288,643 UART: [fwproc] Recv'd Img size: 78456 bytes
2,175,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,755 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,312,652 >>> mbox cmd response: success
2,313,824 UART: [afmc] ++
2,313,992 UART: [afmc] CDI.KEYID = 6
2,314,354 UART: [afmc] SUBJECT.KEYID = 7
2,314,779 UART: [afmc] AUTHORITY.KEYID = 5
2,350,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,473 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,805 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,547 UART: [afmc] --
2,393,521 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,393,543 UART: [cold-reset] --
2,394,373 UART: [state] Locking Datavault
2,395,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,064 UART: [state] Locking ICCM
2,396,672 UART: [exit] Launching FMC @ 0x40000130
2,402,001 UART:
2,402,017 UART: Running Caliptra FMC ...
2,402,425 UART:
2,402,479 UART: [state] CFI Enabled
2,412,666 UART: [fht] FMC Alias Private Key: 7
2,520,979 UART: [art] Extend RT PCRs Done
2,521,407 UART: [art] Lock RT PCRs Done
2,522,735 UART: [art] Populate DV Done
2,531,066 UART: [fht] FMC Alias Private Key: 7
2,532,134 UART: [art] Derive CDI
2,532,414 UART: [art] Store in in slot 0x4
2,617,921 UART: [art] Derive Key Pair
2,618,281 UART: [art] Store priv key in slot 0x5
2,631,213 UART: [art] Derive Key Pair - Done
2,645,835 UART: [art] Signing Cert with AUTHO
2,646,315 UART: RITY.KEYID = 7
2,661,323 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,088 UART: [art] PUB.X = DC5B46ABACD2B68A6BB1514C6700999EA06F3720FA0184E4FCD61326EFA568A47A19B8FFB9B52A6520066573E425365A
2,668,838 UART: [art] PUB.Y = 0A43CACDD9E18980DFB7D681CD0CA9B33886156832C82BD6AA9CB39AE4EB3B9949796FDB6EAE65A7DF6F69F13C8FAF53
2,675,806 UART: [art] SIG.R = 277D39C9E16031999DC6BAF118847455762D281D1291FFFFECDDCC1C514A974DE9562C43E8D27DCEFCB32EF4DFE7AF22
2,682,594 UART: [art] SIG.S = 4087279BC6E7EC2FAB92A15FF6CDB67B89B4808F449732B15BD5A574253BBFEFD91AC4A9DC2EDC6B25111F23F7384A51
2,706,267 UART: mbox::rt_entry...
2,706,639 UART: ____ _ _ _ ____ _____
2,707,423 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,223 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,991 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,759 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,527 UART: |_|
2,710,839 UART:
2,830,926 UART: [rt] Runtime listening for mailbox commands...
2,832,107 >>> mbox cmd response data (48 bytes)
2,832,108 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,834,891 >>> mbox cmd response data (48 bytes)
2,834,892 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,029 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,789 >>> mbox cmd response data (12 bytes)
1,143,790 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,165,479 >>> mbox cmd response: success
2,222,574 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,873 UART:
2,228,889 UART: Running Caliptra FMC ...
2,229,297 UART:
2,229,351 UART: [state] CFI Enabled
2,239,832 UART: [fht] FMC Alias Private Key: 7
2,347,625 UART: [art] Extend RT PCRs Done
2,348,053 UART: [art] Lock RT PCRs Done
2,349,381 UART: [art] Populate DV Done
2,357,770 UART: [fht] FMC Alias Private Key: 7
2,358,744 UART: [art] Derive CDI
2,359,024 UART: [art] Store in in slot 0x4
2,444,875 UART: [art] Derive Key Pair
2,445,235 UART: [art] Store priv key in slot 0x5
2,458,153 UART: [art] Derive Key Pair - Done
2,473,149 UART: [art] Signing Cert with AUTHO
2,473,629 UART: RITY.KEYID = 7
2,489,003 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,768 UART: [art] PUB.X = B91D8ECC4EA743DCCFC58B3AC20EFAA916F6858D5A974F6C1F0E2C344C82E5E6684E10ECBD3CCB2893F8E6CE8370C690
2,496,556 UART: [art] PUB.Y = 974DFCEC8938C39B42633E474BA797F2BAE22B1651993B4B8E98C989D46C02BD4006438BF93483EB7A28BC14C156CCA4
2,503,506 UART: [art] SIG.R = 61E54DA7CFE624F74ABD334852E2F479C251AED3DF7AD0109FC064A24259E733ED211E3F44C29F890A36FFE10F4A1F80
2,510,282 UART: [art] SIG.S = C04FD83F9FB808F4221135AC2930C53EA50E06006FD7F93E12B124D8A39E788ACC45FB816C4217030CEF2D0BF0B41494
2,533,741 UART: mbox::rt_entry...
2,534,113 UART: ____ _ _ _ ____ _____
2,534,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,697 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,233 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,001 UART: |_|
2,538,313 UART:
2,656,360 UART: [rt] Runtime listening for mailbox commands...
2,657,541 >>> mbox cmd response data (48 bytes)
2,657,542 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,660,325 >>> mbox cmd response data (48 bytes)
2,660,326 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,675,463 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,364 UART: [kat] SHA2-256
904,304 UART: [kat] SHA2-384
907,125 UART: [kat] SHA2-512-ACC
909,026 UART: [kat] ECC-384
918,667 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,316 UART: [cold-reset] ++
1,172,736 UART: [fht] FHT @ 0x50003400
1,175,321 UART: [idev] ++
1,175,489 UART: [idev] CDI.KEYID = 6
1,175,849 UART: [idev] SUBJECT.KEYID = 7
1,176,273 UART: [idev] UDS.KEYID = 0
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,008 UART: [idev] --
1,211,062 UART: [ldev] ++
1,211,230 UART: [ldev] CDI.KEYID = 6
1,211,593 UART: [ldev] SUBJECT.KEYID = 5
1,212,019 UART: [ldev] AUTHORITY.KEYID = 7
1,212,482 UART: [ldev] FE.KEYID = 1
1,217,802 UART: [ldev] Erasing FE.KEYID = 1
1,244,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,364 UART: [ldev] --
1,283,803 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x4d454153
1,288,394 >>> mbox cmd response data (12 bytes)
1,288,395 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,288,694 UART: [fwproc] Recv command 0x46574c44
1,289,422 UART: [fwproc] Recv'd Img size: 78456 bytes
2,177,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,204,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,233,753 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,315,756 >>> mbox cmd response: success
2,316,766 UART: [afmc] ++
2,316,934 UART: [afmc] CDI.KEYID = 6
2,317,296 UART: [afmc] SUBJECT.KEYID = 7
2,317,721 UART: [afmc] AUTHORITY.KEYID = 5
2,353,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,369,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,370,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,376,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,382,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,387,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,395,931 UART: [afmc] --
2,397,003 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,397,025 UART: [cold-reset] --
2,397,975 UART: [state] Locking Datavault
2,399,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,660 UART: [state] Locking ICCM
2,400,088 UART: [exit] Launching FMC @ 0x40000130
2,405,417 UART:
2,405,433 UART: Running Caliptra FMC ...
2,405,841 UART:
2,405,984 UART: [state] CFI Enabled
2,416,571 UART: [fht] FMC Alias Private Key: 7
2,524,436 UART: [art] Extend RT PCRs Done
2,524,864 UART: [art] Lock RT PCRs Done
2,526,210 UART: [art] Populate DV Done
2,534,675 UART: [fht] FMC Alias Private Key: 7
2,535,685 UART: [art] Derive CDI
2,535,965 UART: [art] Store in in slot 0x4
2,621,632 UART: [art] Derive Key Pair
2,621,992 UART: [art] Store priv key in slot 0x5
2,635,406 UART: [art] Derive Key Pair - Done
2,650,387 UART: [art] Signing Cert with AUTHO
2,650,867 UART: RITY.KEYID = 7
2,666,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,667,098 UART: [art] PUB.X = 4DF9D6557C0F32D6B16A0E2224D1BD431724B0E47355855DC3B729AB14D73D4C71F65C17DC3AE70C302492912B4B7C06
2,673,858 UART: [art] PUB.Y = 62C15C962AB2F82508CF99EE449907F8F450B9C5AEAA8BE8494F692ACF6348BBB52CB89A764F7A906807401919EFE4D7
2,680,807 UART: [art] SIG.R = 08249198DBADEC3D6A7E6426A6CD5ECA88F24CAAAEF27BEC277882DE17B4F0A76C5A872101CA73968A7971B8CEADE75C
2,687,593 UART: [art] SIG.S = 4028A4CA65279A420ABB3E95D7062577BE03257A59C4AC67DBEEE0270376A7C701E71E304F5B2D0D1EBAC2678D21C5C6
2,710,940 UART: mbox::rt_entry...
2,711,312 UART: ____ _ _ _ ____ _____
2,712,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,712,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,713,664 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,714,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,715,200 UART: |_|
2,715,512 UART:
2,834,061 UART: [rt] Runtime listening for mailbox commands...
2,835,242 >>> mbox cmd response data (48 bytes)
2,835,243 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,838,026 >>> mbox cmd response data (48 bytes)
2,838,027 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,853,164 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,460 >>> mbox cmd response data (12 bytes)
1,143,461 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,164,750 >>> mbox cmd response: success
2,221,083 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,180 UART:
2,227,196 UART: Running Caliptra FMC ...
2,227,604 UART:
2,227,747 UART: [state] CFI Enabled
2,237,930 UART: [fht] FMC Alias Private Key: 7
2,346,023 UART: [art] Extend RT PCRs Done
2,346,451 UART: [art] Lock RT PCRs Done
2,348,081 UART: [art] Populate DV Done
2,356,444 UART: [fht] FMC Alias Private Key: 7
2,357,378 UART: [art] Derive CDI
2,357,658 UART: [art] Store in in slot 0x4
2,443,343 UART: [art] Derive Key Pair
2,443,703 UART: [art] Store priv key in slot 0x5
2,457,105 UART: [art] Derive Key Pair - Done
2,472,075 UART: [art] Signing Cert with AUTHO
2,472,555 UART: RITY.KEYID = 7
2,488,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,842 UART: [art] PUB.X = 3ED9AD34B5CD64D48726BD31133FB8E2BDA3AB8FEB6AE42C76B69395AAA56F3E27B4001E1AA80B6A6751F8B13394EDD7
2,495,607 UART: [art] PUB.Y = ADD7AD65CF1D1FEAD7E20E9727C423CB158E685B97D9659A4772311956CDDD60E92E66472CE4CC60A542CE3D9C7D19D8
2,502,568 UART: [art] SIG.R = 2CFB716DF8BC17C0314D007DB1B99F3FD1CF873CF0724DAE2B15ECB6F0F6580A7019E91C5074F4DC1C30A98345FC5179
2,509,327 UART: [art] SIG.S = B7E4E90A913ACA2E48F6C5DD069669803C356EB6B92776F09223A7E887413DC2CC080F8928F5FA87B4A41B4A7EDE04F5
2,533,483 UART: mbox::rt_entry...
2,533,855 UART: ____ _ _ _ ____ _____
2,534,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,439 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,743 UART: |_|
2,538,055 UART:
2,657,112 UART: [rt] Runtime listening for mailbox commands...
2,658,293 >>> mbox cmd response data (48 bytes)
2,658,294 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,661,077 >>> mbox cmd response data (48 bytes)
2,661,078 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,676,215 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,533 UART: [cold-reset] ++
1,170,989 UART: [fht] FHT @ 0x50003400
1,173,593 UART: [idev] ++
1,173,761 UART: [idev] CDI.KEYID = 6
1,174,122 UART: [idev] SUBJECT.KEYID = 7
1,174,547 UART: [idev] UDS.KEYID = 0
1,182,759 UART: [idev] Erasing UDS.KEYID = 0
1,199,951 UART: [idev] Sha1 KeyId Algorithm
1,208,831 UART: [idev] --
1,209,976 UART: [ldev] ++
1,210,144 UART: [ldev] CDI.KEYID = 6
1,210,508 UART: [ldev] SUBJECT.KEYID = 5
1,210,935 UART: [ldev] AUTHORITY.KEYID = 7
1,211,398 UART: [ldev] FE.KEYID = 1
1,216,344 UART: [ldev] Erasing FE.KEYID = 1
1,242,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,648 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x4d454153
1,286,830 >>> mbox cmd response data (12 bytes)
1,286,831 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,286,954 UART: [fwproc] Recv command 0x46574c44
1,287,687 UART: [fwproc] Recv'd Img size: 78456 bytes
2,174,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,206 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,313,200 >>> mbox cmd response: success
2,314,423 UART: [afmc] ++
2,314,591 UART: [afmc] CDI.KEYID = 6
2,314,954 UART: [afmc] SUBJECT.KEYID = 7
2,315,380 UART: [afmc] AUTHORITY.KEYID = 5
2,351,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,795 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,602 UART: [afmc] --
2,394,632 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,394,654 UART: [cold-reset] --
2,395,182 UART: [state] Locking Datavault
2,396,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,833 UART: [state] Locking ICCM
2,397,255 UART: [exit] Launching FMC @ 0x40000130
2,402,584 UART:
2,402,600 UART: Running Caliptra FMC ...
2,403,008 UART:
2,403,062 UART: [state] CFI Enabled
2,413,767 UART: [fht] FMC Alias Private Key: 7
2,522,066 UART: [art] Extend RT PCRs Done
2,522,494 UART: [art] Lock RT PCRs Done
2,524,242 UART: [art] Populate DV Done
2,532,311 UART: [fht] FMC Alias Private Key: 7
2,533,251 UART: [art] Derive CDI
2,533,531 UART: [art] Store in in slot 0x4
2,619,346 UART: [art] Derive Key Pair
2,619,706 UART: [art] Store priv key in slot 0x5
2,632,744 UART: [art] Derive Key Pair - Done
2,647,464 UART: [art] Signing Cert with AUTHO
2,647,944 UART: RITY.KEYID = 7
2,663,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,989 UART: [art] PUB.X = 4B8537BA24C32DFCFF3884CB5ACC13BC1C8646E879C29574867FEC210D69BAF1CA04D64D7C9C92040B10A9BF406C935B
2,670,761 UART: [art] PUB.Y = BC06A5C9AF9F336E794CAAE897F197C9C810C9B55056B67815E5F362EF660074DAF778676E74D5BF5C7FBA1B3E800364
2,677,691 UART: [art] SIG.R = DF80A2E727BAAB6B19688EB5B343576A1120CD486976200ABAF92E0785704C6B3236AB0FB69F03484C141ECF3846E3D5
2,684,453 UART: [art] SIG.S = 9B6519108E0A1240337520243076C0F35C0A79F6AF34E7A56EA81215F05EE29D052270A65E35FE993772328B3FC5402A
2,708,435 UART: mbox::rt_entry...
2,708,807 UART: ____ _ _ _ ____ _____
2,709,591 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,391 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,159 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,927 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,695 UART: |_|
2,713,007 UART:
2,831,583 UART: [rt] Runtime listening for mailbox commands...
2,832,764 >>> mbox cmd response data (48 bytes)
2,832,765 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,548 >>> mbox cmd response data (48 bytes)
2,835,549 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,686 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,758 >>> mbox cmd response data (12 bytes)
1,137,759 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,160,413 >>> mbox cmd response: success
2,216,300 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,222,607 UART:
2,222,623 UART: Running Caliptra FMC ...
2,223,031 UART:
2,223,085 UART: [state] CFI Enabled
2,233,812 UART: [fht] FMC Alias Private Key: 7
2,341,435 UART: [art] Extend RT PCRs Done
2,341,863 UART: [art] Lock RT PCRs Done
2,343,289 UART: [art] Populate DV Done
2,351,524 UART: [fht] FMC Alias Private Key: 7
2,352,608 UART: [art] Derive CDI
2,352,888 UART: [art] Store in in slot 0x4
2,438,231 UART: [art] Derive Key Pair
2,438,591 UART: [art] Store priv key in slot 0x5
2,451,917 UART: [art] Derive Key Pair - Done
2,466,484 UART: [art] Signing Cert with AUTHO
2,466,964 UART: RITY.KEYID = 7
2,481,972 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,737 UART: [art] PUB.X = C18D8D7925DE9793110B5F279F2FC1A8626F3E0D00B99810969D83C3A59B999FDEA534C6BCA72C6E311FEB46EEF893DB
2,489,491 UART: [art] PUB.Y = 63CF20239E25C364B93C76327A4E4D46435EF2F57D1AE6600E08BD8656B53EA6380F625A29973EF59D69226458C99011
2,496,424 UART: [art] SIG.R = A1BE0AFD96B4FD66DAFD5CEB3F37584881986CF474A6A041DFE1E5EBFC8D53D4F3DE2293D534AD2EABE8451BC10B0F43
2,503,213 UART: [art] SIG.S = CD0B84C2AFFC06298B4A7056301D8542D4F4E3C653F92D4FEAE73439E3F3D9270EBE1C6EB3E49BCD30193C1EB171BD99
2,527,375 UART: mbox::rt_entry...
2,527,747 UART: ____ _ _ _ ____ _____
2,528,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,635 UART: |_|
2,531,947 UART:
2,650,259 UART: [rt] Runtime listening for mailbox commands...
2,651,440 >>> mbox cmd response data (48 bytes)
2,651,441 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,654,224 >>> mbox cmd response data (48 bytes)
2,654,225 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,669,362 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,474 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,438 UART: [idev] ++
1,172,606 UART: [idev] CDI.KEYID = 6
1,172,967 UART: [idev] SUBJECT.KEYID = 7
1,173,392 UART: [idev] UDS.KEYID = 0
1,181,600 UART: [idev] Erasing UDS.KEYID = 0
1,198,926 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,987 UART: [ldev] ++
1,209,155 UART: [ldev] CDI.KEYID = 6
1,209,519 UART: [ldev] SUBJECT.KEYID = 5
1,209,946 UART: [ldev] AUTHORITY.KEYID = 7
1,210,409 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,241,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,001 UART: [ldev] --
1,280,411 UART: [fwproc] Wait for Commands...
1,281,156 UART: [fwproc] Recv command 0x4d454153
1,285,183 >>> mbox cmd response data (12 bytes)
1,285,184 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,285,423 UART: [fwproc] Recv command 0x46574c44
1,286,156 UART: [fwproc] Recv'd Img size: 78456 bytes
2,174,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,179 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,313,281 >>> mbox cmd response: success
2,314,536 UART: [afmc] ++
2,314,704 UART: [afmc] CDI.KEYID = 6
2,315,067 UART: [afmc] SUBJECT.KEYID = 7
2,315,493 UART: [afmc] AUTHORITY.KEYID = 5
2,351,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,591 UART: [afmc] --
2,394,631 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,394,653 UART: [cold-reset] --
2,395,491 UART: [state] Locking Datavault
2,396,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,130 UART: [state] Locking ICCM
2,397,760 UART: [exit] Launching FMC @ 0x40000130
2,403,089 UART:
2,403,105 UART: Running Caliptra FMC ...
2,403,513 UART:
2,403,656 UART: [state] CFI Enabled
2,414,147 UART: [fht] FMC Alias Private Key: 7
2,522,356 UART: [art] Extend RT PCRs Done
2,522,784 UART: [art] Lock RT PCRs Done
2,524,510 UART: [art] Populate DV Done
2,532,755 UART: [fht] FMC Alias Private Key: 7
2,533,873 UART: [art] Derive CDI
2,534,153 UART: [art] Store in in slot 0x4
2,619,872 UART: [art] Derive Key Pair
2,620,232 UART: [art] Store priv key in slot 0x5
2,633,418 UART: [art] Derive Key Pair - Done
2,648,084 UART: [art] Signing Cert with AUTHO
2,648,564 UART: RITY.KEYID = 7
2,663,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,664,469 UART: [art] PUB.X = 9D8C9BC4D4293AA4B9CD30AE52FAA04A6ADC5224B3D6E612B00C0EB318A84D8A3B9952CBFA9247E6B52B220E57B9E604
2,671,245 UART: [art] PUB.Y = AAFEE5EFD629BAD93697CB2913B47367F3F122CDCB7FA9F32D4E21BC58B60CFF575C77150877DB6B2CD3FAD6E439DA83
2,678,213 UART: [art] SIG.R = 64303E6256ADCD3282656CF91EBFF967EB37D2A99B111CE59153072E7237997B7F9DD6238C1B0A5888F0D46DDADC26FE
2,684,985 UART: [art] SIG.S = 02218F6CD681C988E4CE4D4B03FF14CF9E33BF7EE2849A1CE225D63DE8D667EC8C9A21D93F6B3EA679CB1AC28FA3A393
2,708,976 UART: mbox::rt_entry...
2,709,348 UART: ____ _ _ _ ____ _____
2,710,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,711,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,712,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,713,236 UART: |_|
2,713,548 UART:
2,831,413 UART: [rt] Runtime listening for mailbox commands...
2,832,594 >>> mbox cmd response data (48 bytes)
2,832,595 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,378 >>> mbox cmd response data (48 bytes)
2,835,379 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,850,516 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,103 >>> mbox cmd response data (12 bytes)
1,140,104 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,161,766 >>> mbox cmd response: success
2,217,535 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,344 UART:
2,223,360 UART: Running Caliptra FMC ...
2,223,768 UART:
2,223,911 UART: [state] CFI Enabled
2,234,366 UART: [fht] FMC Alias Private Key: 7
2,342,081 UART: [art] Extend RT PCRs Done
2,342,509 UART: [art] Lock RT PCRs Done
2,344,035 UART: [art] Populate DV Done
2,352,266 UART: [fht] FMC Alias Private Key: 7
2,353,248 UART: [art] Derive CDI
2,353,528 UART: [art] Store in in slot 0x4
2,439,387 UART: [art] Derive Key Pair
2,439,747 UART: [art] Store priv key in slot 0x5
2,452,819 UART: [art] Derive Key Pair - Done
2,467,298 UART: [art] Signing Cert with AUTHO
2,467,778 UART: RITY.KEYID = 7
2,482,682 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,447 UART: [art] PUB.X = 94E020147C2C9EDEE24466EA4E86B6C44181C1ABDCB935BD4D1D896F1B5AC3DE0B1876C9858EECE40CF0DD60658178C1
2,490,227 UART: [art] PUB.Y = DAE8A165FAF5CE59BFF2A0D5B9F45AA68F0B005EC3BFDEFC0FC3E6D9641E3BC29F92401C8810D9D1A192C3B0B955C253
2,497,175 UART: [art] SIG.R = 3D2B5BB64CF429AFE1B3EAE0E65FC5F8BA046F5DC52D4E00FEBCD8CB6B5FB3F9D78338055545A08B85580F6CDDB240EF
2,503,942 UART: [art] SIG.S = 58852A8F67536530811E87C5AA9BDD0FC11C22A83B6E4271334BA353B968B593E83F5BB2DB20F5E1C539E448E20A608C
2,527,635 UART: mbox::rt_entry...
2,528,007 UART: ____ _ _ _ ____ _____
2,528,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,359 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,127 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,895 UART: |_|
2,532,207 UART:
2,651,992 UART: [rt] Runtime listening for mailbox commands...
2,653,173 >>> mbox cmd response data (48 bytes)
2,653,174 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,655,957 >>> mbox cmd response data (48 bytes)
2,655,958 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,671,095 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,092 UART:
192,476 UART: Running Caliptra ROM ...
193,579 UART:
193,726 UART: [state] CFI Enabled
263,492 UART: [state] LifecycleState = Unprovisioned
265,405 UART: [state] DebugLocked = No
267,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,939 UART: [kat] SHA2-256
441,653 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,194 UART: [kat] ++
452,644 UART: [kat] sha1
464,690 UART: [kat] SHA2-256
467,396 UART: [kat] SHA2-384
474,315 UART: [kat] SHA2-512-ACC
476,682 UART: [kat] ECC-384
2,767,182 UART: [kat] HMAC-384Kdf
2,797,923 UART: [kat] LMS
3,988,228 UART: [kat] --
3,991,688 UART: [cold-reset] ++
3,993,058 UART: [fht] Storing FHT @ 0x50003400
4,004,480 UART: [idev] ++
4,005,049 UART: [idev] CDI.KEYID = 6
4,005,942 UART: [idev] SUBJECT.KEYID = 7
4,007,184 UART: [idev] UDS.KEYID = 0
4,008,146 ready_for_fw is high
4,008,360 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,048,670 UART: [idev] Erasing UDS.KEYID = 0
7,347,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,207 UART: [idev] --
7,373,495 UART: [ldev] ++
7,374,118 UART: [ldev] CDI.KEYID = 6
7,375,032 UART: [ldev] SUBJECT.KEYID = 5
7,376,252 UART: [ldev] AUTHORITY.KEYID = 7
7,377,543 UART: [ldev] FE.KEYID = 1
7,419,293 UART: [ldev] Erasing FE.KEYID = 1
10,753,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,886 UART: [ldev] --
13,135,275 UART: [fwproc] Waiting for Commands...
13,137,106 UART: [fwproc] Received command 0x46574c44
13,139,289 UART: [fwproc] Received Image of size 31852 bytes
16,179,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,255,015 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,323,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,353,711 >>> mbox cmd response: success
16,358,292 UART: [afmc] ++
16,358,902 UART: [afmc] CDI.KEYID = 6
16,359,831 UART: [afmc] SUBJECT.KEYID = 7
16,361,097 UART: [afmc] AUTHORITY.KEYID = 5
19,725,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,022,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,024,941 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,039,326 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,054,195 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,068,698 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,089,741 UART: [afmc] --
22,093,607 UART: [cold-reset] --
22,096,532 UART: [state] Locking Datavault
22,100,648 UART: [state] Locking PCR0, PCR1 and PCR31
22,102,340 UART: [state] Locking ICCM
22,103,600 UART: [exit] Launching FMC @ 0x40000130
22,112,038 UART:
22,112,293 UART: Running Caliptra FMC ...
22,113,435 UART:
22,113,606 UART: [state] CFI Enabled
22,165,191 UART: [fht] FMC Alias Private Key: 7
24,502,970 UART: [art] Extend RT PCRs Done
24,504,243 UART: [art] Lock RT PCRs Done
24,506,125 UART: [art] Populate DV Done
24,511,638 UART: [fht] FMC Alias Private Key: 7
24,513,169 UART: [art] Derive CDI
24,513,935 UART: [art] Store in in slot 0x4
24,573,419 UART: [art] Derive Key Pair
24,574,493 UART: [art] Store priv key in slot 0x5
27,867,215 UART: [art] Derive Key Pair - Done
27,880,001 UART: [art] Signing Cert with AUTHO
27,881,350 UART: RITY.KEYID = 7
30,169,133 UART: [art] Erasing AUTHORITY.KEYID = 7
30,170,692 UART: [art] PUB.X = CAC2D976C8BDC2968AF381E12EB3E0CDD711E9CBC10C9DE530665355661A8644BEB05B86846921588B9C916D746E6460
30,177,926 UART: [art] PUB.Y = D9766CB912213CE3810DF18FBBBD9DD462BA9FB3C2275FFD75F20B29BDD87310B594400271FD126B25666361232C502E
30,185,166 UART: [art] SIG.R = FE54C3D79D28A2A596611960209D1443A96539CA16CD43BEED16BBBBC8D23A34A5123026D8877A1BEF246D80A7CB8EAD
30,192,574 UART: [art] SIG.S = F66C9EDA5DDC52C5BF86A8391C86550F7F94B03B48922C86D6E80C3FA155F9BF34B8C26CBA3353E24C8B52B79FC85245
31,497,240 UART: persistent_rt::test_persistent_data_layout...[ok]
31,499,514 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,771,970 ready_for_fw is high
3,772,352 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,178,073 >>> mbox cmd response: success
21,870,691 UART:
21,871,095 UART: Running Caliptra FMC ...
21,872,314 UART:
21,872,487 UART: [state] CFI Enabled
21,940,395 UART: [fht] FMC Alias Private Key: 7
24,277,494 UART: [art] Extend RT PCRs Done
24,278,769 UART: [art] Lock RT PCRs Done
24,280,554 UART: [art] Populate DV Done
24,285,896 UART: [fht] FMC Alias Private Key: 7
24,287,503 UART: [art] Derive CDI
24,288,354 UART: [art] Store in in slot 0x4
24,348,998 UART: [art] Derive Key Pair
24,350,042 UART: [art] Store priv key in slot 0x5
27,642,335 UART: [art] Derive Key Pair - Done
27,655,257 UART: [art] Signing Cert with AUTHO
27,656,600 UART: RITY.KEYID = 7
29,955,548 UART: [art] Erasing AUTHORITY.KEYID = 7
29,957,103 UART: [art] PUB.X = 813699481BED8F388C568E091E0066555929B958A061F1209A89F9C5C498989D3DC84C83460BAF890FEE60799B903A58
29,964,379 UART: [art] PUB.Y = E1749D909BA91E05D4A1FF015A1CC28AE80831040C5EA77661D73D9D5EA5FEE96773024510E7905D52526F3865D59D99
29,971,537 UART: [art] SIG.R = AE30B921C15438101CE9A10B6425B164289F69484B525CB258E3001034139299EB890E656F2A4A052883469BB8C7C90C
29,978,857 UART: [art] SIG.S = D1FA8D185FF4160B015FF346B497DBC6502BA331831C12B03E9606B4642C88516709583567769F6B9680F6FCC4461207
31,283,610 UART: persistent_rt::test_persistent_data_layout...[ok]
31,285,873 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
193,131 UART:
193,484 UART: Running Caliptra ROM ...
194,672 UART:
604,441 UART: [state] CFI Enabled
619,604 UART: [state] LifecycleState = Unprovisioned
621,544 UART: [state] DebugLocked = No
622,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,661 UART: [kat] SHA2-256
797,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,937 UART: [kat] ++
808,465 UART: [kat] sha1
818,985 UART: [kat] SHA2-256
821,696 UART: [kat] SHA2-384
826,893 UART: [kat] SHA2-512-ACC
829,265 UART: [kat] ECC-384
3,112,090 UART: [kat] HMAC-384Kdf
3,124,496 UART: [kat] LMS
4,314,590 UART: [kat] --
4,319,252 UART: [cold-reset] ++
4,321,616 UART: [fht] Storing FHT @ 0x50003400
4,333,869 UART: [idev] ++
4,334,436 UART: [idev] CDI.KEYID = 6
4,335,418 UART: [idev] SUBJECT.KEYID = 7
4,336,659 UART: [idev] UDS.KEYID = 0
4,337,634 ready_for_fw is high
4,337,825 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,377,974 UART: [idev] Erasing UDS.KEYID = 0
7,625,368 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,682 UART: [idev] --
7,652,188 UART: [ldev] ++
7,652,757 UART: [ldev] CDI.KEYID = 6
7,653,767 UART: [ldev] SUBJECT.KEYID = 5
7,654,944 UART: [ldev] AUTHORITY.KEYID = 7
7,656,173 UART: [ldev] FE.KEYID = 1
7,666,922 UART: [ldev] Erasing FE.KEYID = 1
10,955,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,389 UART: [ldev] --
13,316,027 UART: [fwproc] Waiting for Commands...
13,317,792 UART: [fwproc] Received command 0x46574c44
13,320,028 UART: [fwproc] Received Image of size 31852 bytes
16,373,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,448,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,517,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,546,601 >>> mbox cmd response: success
16,550,153 UART: [afmc] ++
16,550,795 UART: [afmc] CDI.KEYID = 6
16,551,729 UART: [afmc] SUBJECT.KEYID = 7
16,552,997 UART: [afmc] AUTHORITY.KEYID = 5
19,868,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,163,521 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,165,823 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,180,177 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,195,032 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,209,464 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,230,588 UART: [afmc] --
22,234,892 UART: [cold-reset] --
22,238,296 UART: [state] Locking Datavault
22,244,069 UART: [state] Locking PCR0, PCR1 and PCR31
22,245,824 UART: [state] Locking ICCM
22,247,854 UART: [exit] Launching FMC @ 0x40000130
22,256,294 UART:
22,256,537 UART: Running Caliptra FMC ...
22,257,674 UART:
22,257,832 UART: [state] CFI Enabled
22,266,202 UART: [fht] FMC Alias Private Key: 7
24,597,537 UART: [art] Extend RT PCRs Done
24,598,811 UART: [art] Lock RT PCRs Done
24,600,661 UART: [art] Populate DV Done
24,605,968 UART: [fht] FMC Alias Private Key: 7
24,607,484 UART: [art] Derive CDI
24,608,272 UART: [art] Store in in slot 0x4
24,650,812 UART: [art] Derive Key Pair
24,651,893 UART: [art] Store priv key in slot 0x5
27,893,691 UART: [art] Derive Key Pair - Done
27,907,035 UART: [art] Signing Cert with AUTHO
27,908,582 UART: RITY.KEYID = 7
30,187,405 UART: [art] Erasing AUTHORITY.KEYID = 7
30,188,964 UART: [art] PUB.X = 765A49A63635AE72312AFE42805EED08B9F45C275AAAD6DE4F424C932575DD41E080A520854D81897E8EEBF73105642F
30,196,185 UART: [art] PUB.Y = FDF9FCB5CEF5CDE1D751CBAE3A83D08E31D7AE8A15653F1410D3537024D3E3D4205FC07E59C2FC3AC1B5896EF2F46A01
30,203,406 UART: [art] SIG.R = AF25786D4DACFC8C511D169FB970F427B29AC8D19D50E7B988AD2D1064D7C63273817B43438A87B934E8EF734E1DBC4B
30,210,816 UART: [art] SIG.S = 3DC32E05B3949977F2FD2B5F8624245B1EEB82327C1CAAB4A2A9762F2DBD5987989365470FD7A07CCD5C8F5380A04493
31,515,515 UART: persistent_rt::test_persistent_data_layout...[ok]
31,517,784 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
4,125,050 ready_for_fw is high
4,125,469 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,399,601 >>> mbox cmd response: success
22,046,950 UART:
22,047,351 UART: Running Caliptra FMC ...
22,048,474 UART:
22,048,628 UART: [state] CFI Enabled
22,056,581 UART: [fht] FMC Alias Private Key: 7
24,387,278 UART: [art] Extend RT PCRs Done
24,388,554 UART: [art] Lock RT PCRs Done
24,389,926 UART: [art] Populate DV Done
24,395,387 UART: [fht] FMC Alias Private Key: 7
24,397,057 UART: [art] Derive CDI
24,397,920 UART: [art] Store in in slot 0x4
24,440,102 UART: [art] Derive Key Pair
24,441,215 UART: [art] Store priv key in slot 0x5
27,682,977 UART: [art] Derive Key Pair - Done
27,696,478 UART: [art] Signing Cert with AUTHO
27,697,859 UART: RITY.KEYID = 7
29,976,980 UART: [art] Erasing AUTHORITY.KEYID = 7
29,978,541 UART: [art] PUB.X = 5ADA7B1717BACE6FDBF930398FD7E572B931FA16EB9F4EBAB41E63E88FF3D18FAEC27BA98C71AF4521F9D40281EA153F
29,985,766 UART: [art] PUB.Y = DFDCB8CD7CFA4D0D39AAEA29AE4F9A66547A3E4ADC03437425E0A6710C9BB2961211BDF489D871AF97D86A3D5192A42F
29,992,989 UART: [art] SIG.R = 2D36887959BA6BCD0CE1BB7D84856D248BFEE83EC355116108BED7DB7C92F1229BE340CA7EA8CCA85519C63960BFFE67
30,000,400 UART: [art] SIG.S = 78E21A42D273BF0247A3C3FE4E9CEB0704D9498DC4FCD47B2F8DF702E8481EA3560E4CF27D9366E5262E16981D92E204
31,304,496 UART: persistent_rt::test_persistent_data_layout...[ok]
31,306,762 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,525 UART:
192,908 UART: Running Caliptra ROM ...
194,105 UART:
194,264 UART: [state] CFI Enabled
263,219 UART: [state] LifecycleState = Unprovisioned
265,059 UART: [state] DebugLocked = No
267,097 UART: [state] WD Timer not started. Device not locked for debugging
270,137 UART: [kat] SHA2-256
449,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,786 UART: [kat] ++
461,316 UART: [kat] sha1
472,783 UART: [kat] SHA2-256
475,855 UART: [kat] SHA2-384
483,122 UART: [kat] SHA2-512-ACC
486,052 UART: [kat] ECC-384
2,947,931 UART: [kat] HMAC-384Kdf
2,971,896 UART: [kat] LMS
3,501,381 UART: [kat] --
3,504,383 UART: [cold-reset] ++
3,505,175 UART: [fht] FHT @ 0x50003400
3,516,223 UART: [idev] ++
3,516,794 UART: [idev] CDI.KEYID = 6
3,517,680 UART: [idev] SUBJECT.KEYID = 7
3,518,923 UART: [idev] UDS.KEYID = 0
3,519,843 ready_for_fw is high
3,520,028 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,560,302 UART: [idev] Erasing UDS.KEYID = 0
6,025,677 UART: [idev] Sha1 KeyId Algorithm
6,049,812 UART: [idev] --
6,052,832 UART: [ldev] ++
6,053,417 UART: [ldev] CDI.KEYID = 6
6,054,306 UART: [ldev] SUBJECT.KEYID = 5
6,055,467 UART: [ldev] AUTHORITY.KEYID = 7
6,056,753 UART: [ldev] FE.KEYID = 1
6,101,348 UART: [ldev] Erasing FE.KEYID = 1
8,603,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,326 UART: [ldev] --
10,414,639 UART: [fwproc] Wait for Commands...
10,416,139 UART: [fwproc] Recv command 0x46574c44
10,418,251 UART: [fwproc] Recv'd Img size: 31832 bytes
12,820,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,893,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,962,250 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
12,992,046 >>> mbox cmd response: success
12,995,845 UART: [afmc] ++
12,996,473 UART: [afmc] CDI.KEYID = 6
12,997,406 UART: [afmc] SUBJECT.KEYID = 7
12,998,565 UART: [afmc] AUTHORITY.KEYID = 5
15,528,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,253,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,255,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,271,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,287,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,303,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,325,454 UART: [afmc] --
17,330,112 UART: [cold-reset] --
17,334,704 UART: [state] Locking Datavault
17,339,786 UART: [state] Locking PCR0, PCR1 and PCR31
17,341,460 UART: [state] Locking ICCM
17,342,854 UART: [exit] Launching FMC @ 0x40000130
17,351,245 UART:
17,351,493 UART: Running Caliptra FMC ...
17,352,630 UART:
17,352,797 UART: [state] CFI Enabled
17,410,171 UART: [fht] FMC Alias Private Key: 7
19,173,993 UART: [art] Extend RT PCRs Done
19,175,254 UART: [art] Lock RT PCRs Done
19,177,146 UART: [art] Populate DV Done
19,182,653 UART: [fht] FMC Alias Private Key: 7
19,184,241 UART: [art] Derive CDI
19,185,087 UART: [art] Store in in slot 0x4
19,243,187 UART: [art] Derive Key Pair
19,244,219 UART: [art] Store priv key in slot 0x5
21,706,865 UART: [art] Derive Key Pair - Done
21,719,711 UART: [art] Signing Cert with AUTHO
21,721,051 UART: RITY.KEYID = 7
23,432,429 UART: [art] Erasing AUTHORITY.KEYID = 7
23,433,987 UART: [art] PUB.X = 6DFF085C5A5B2CD1753586B3B860CF55F89664165C7E4609699ACB6B1F3F57A92CE74BB6A8E1DBEA9302D5D7D0EC6810
23,441,215 UART: [art] PUB.Y = CF71EAAD890824A55CE8E4451F0EAF33F13C16DF8C88347C0B996600447A9B4516A832A28B9DF2E8BBE393FE1A83F87B
23,448,526 UART: [art] SIG.R = 63D9CC4F4895AE7F4D97C9DF75906DBFB89EBE4ADE72ECB2FE93D80B3E0A02C4D8FBC49D424E52D69621FDCF369B4614
23,455,930 UART: [art] SIG.S = C879576333646FFA1FD8960A7B0721016EDBDFFD6A98A1BB93E0A8D6C16D169D409F170814EFB144C0D40E6E08FC5EBB
24,434,388 UART: persistent_rt::test_persistent_data_layout...[ok]
24,436,627 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
3,363,046 ready_for_fw is high
3,363,534 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,750,545 >>> mbox cmd response: success
17,049,240 UART:
17,049,647 UART: Running Caliptra FMC ...
17,050,848 UART:
17,051,023 UART: [state] CFI Enabled
17,114,038 UART: [fht] FMC Alias Private Key: 7
18,877,758 UART: [art] Extend RT PCRs Done
18,879,029 UART: [art] Lock RT PCRs Done
18,880,758 UART: [art] Populate DV Done
18,886,086 UART: [fht] FMC Alias Private Key: 7
18,887,623 UART: [art] Derive CDI
18,888,424 UART: [art] Store in in slot 0x4
18,946,904 UART: [art] Derive Key Pair
18,947,984 UART: [art] Store priv key in slot 0x5
21,410,502 UART: [art] Derive Key Pair - Done
21,423,364 UART: [art] Signing Cert with AUTHO
21,424,716 UART: RITY.KEYID = 7
23,136,826 UART: [art] Erasing AUTHORITY.KEYID = 7
23,138,387 UART: [art] PUB.X = FDABF7564C300C5593ACE7C8F1C23D4F8992F19B4DAAB947D2FDE0DAAD64C1F13379D8CFD722162EF389D80F292C2645
23,145,614 UART: [art] PUB.Y = 94940F058C62B033A296B679A2A33CBB875FB345F0229AA53958FCB41E38372401FA0CCFBEF7DCFCA6A9E0953ABC1904
23,152,931 UART: [art] SIG.R = 64054CBC71589EFD01CD54683F596955C5A11B843DBC5BA268CF780CCF226A7AD390F27E1B9DBD369983B1C621AC6956
23,160,348 UART: [art] SIG.S = C39D4B20613C56C0C1D5E89B9519D6717DC1ABA86DD5929805949AE187DEC207BBDC684F69A990163ACCDE43620B0E55
24,139,271 UART: persistent_rt::test_persistent_data_layout...[ok]
24,141,541 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
192,971 UART:
193,355 UART: Running Caliptra ROM ...
194,494 UART:
603,995 UART: [state] CFI Enabled
617,154 UART: [state] LifecycleState = Unprovisioned
619,021 UART: [state] DebugLocked = No
620,695 UART: [state] WD Timer not started. Device not locked for debugging
623,681 UART: [kat] SHA2-256
802,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,376 UART: [kat] ++
814,922 UART: [kat] sha1
826,875 UART: [kat] SHA2-256
829,889 UART: [kat] SHA2-384
836,100 UART: [kat] SHA2-512-ACC
839,034 UART: [kat] ECC-384
3,283,024 UART: [kat] HMAC-384Kdf
3,295,344 UART: [kat] LMS
3,824,854 UART: [kat] --
3,830,193 UART: [cold-reset] ++
3,831,559 UART: [fht] FHT @ 0x50003400
3,841,400 UART: [idev] ++
3,841,973 UART: [idev] CDI.KEYID = 6
3,842,856 UART: [idev] SUBJECT.KEYID = 7
3,844,051 UART: [idev] UDS.KEYID = 0
3,845,137 ready_for_fw is high
3,845,348 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,886,071 UART: [idev] Erasing UDS.KEYID = 0
6,317,878 UART: [idev] Sha1 KeyId Algorithm
6,340,832 UART: [idev] --
6,344,151 UART: [ldev] ++
6,344,726 UART: [ldev] CDI.KEYID = 6
6,345,611 UART: [ldev] SUBJECT.KEYID = 5
6,346,817 UART: [ldev] AUTHORITY.KEYID = 7
6,348,043 UART: [ldev] FE.KEYID = 1
6,360,958 UART: [ldev] Erasing FE.KEYID = 1
8,836,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,440 UART: [ldev] --
10,627,058 UART: [fwproc] Wait for Commands...
10,629,857 UART: [fwproc] Recv command 0x46574c44
10,631,951 UART: [fwproc] Recv'd Img size: 31832 bytes
13,027,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,103,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,172,088 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,201,683 >>> mbox cmd response: success
13,205,466 UART: [afmc] ++
13,206,084 UART: [afmc] CDI.KEYID = 6
13,207,076 UART: [afmc] SUBJECT.KEYID = 7
13,208,368 UART: [afmc] AUTHORITY.KEYID = 5
15,706,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,423,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,425,697 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,441,542 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,457,535 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,473,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,495,469 UART: [afmc] --
17,499,676 UART: [cold-reset] --
17,504,160 UART: [state] Locking Datavault
17,509,234 UART: [state] Locking PCR0, PCR1 and PCR31
17,510,917 UART: [state] Locking ICCM
17,512,020 UART: [exit] Launching FMC @ 0x40000130
17,520,417 UART:
17,520,668 UART: Running Caliptra FMC ...
17,521,806 UART:
17,521,973 UART: [state] CFI Enabled
17,529,899 UART: [fht] FMC Alias Private Key: 7
19,286,619 UART: [art] Extend RT PCRs Done
19,288,013 UART: [art] Lock RT PCRs Done
19,289,155 UART: [art] Populate DV Done
19,294,880 UART: [fht] FMC Alias Private Key: 7
19,296,401 UART: [art] Derive CDI
19,297,203 UART: [art] Store in in slot 0x4
19,340,033 UART: [art] Derive Key Pair
19,341,071 UART: [art] Store priv key in slot 0x5
21,767,814 UART: [art] Derive Key Pair - Done
21,781,073 UART: [art] Signing Cert with AUTHO
21,782,407 UART: RITY.KEYID = 7
23,487,850 UART: [art] Erasing AUTHORITY.KEYID = 7
23,489,406 UART: [art] PUB.X = 023B7D213BECE596D8AB172BE69C9198B97E8B39FBCBC6E9E2E56F86E8FB9EE7F6570364F4FA0C102F8532485198A8FF
23,496,734 UART: [art] PUB.Y = 2514A2184B9E9BCB5103C5FF6FF773D108D935BB68E8C6C05C86B4374169E900AE15438497F58E990E789C385D9AB853
23,503,871 UART: [art] SIG.R = 2A30D58C76346B850A21D8F7DB8BF851CAEB2030D72EC240FD5C1673150AECE01B6B1FED86A68F36B6837A87C464357E
23,511,283 UART: [art] SIG.S = A31B626C5B3AFE39BCA1522E11812D205EB9929C3AD4E4F72F4CDB75F40201D2B92FE6BE0070389C119864A76F6C962A
24,489,814 UART: persistent_rt::test_persistent_data_layout...[ok]
24,492,056 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,846 writing to cptra_bootfsm_go
3,690,715 ready_for_fw is high
3,691,319 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,964,439 >>> mbox cmd response: success
17,215,687 UART:
17,216,086 UART: Running Caliptra FMC ...
17,217,282 UART:
17,217,455 UART: [state] CFI Enabled
17,225,228 UART: [fht] FMC Alias Private Key: 7
18,982,363 UART: [art] Extend RT PCRs Done
18,983,652 UART: [art] Lock RT PCRs Done
18,985,309 UART: [art] Populate DV Done
18,991,004 UART: [fht] FMC Alias Private Key: 7
18,992,519 UART: [art] Derive CDI
18,993,350 UART: [art] Store in in slot 0x4
19,035,440 UART: [art] Derive Key Pair
19,036,490 UART: [art] Store priv key in slot 0x5
21,463,274 UART: [art] Derive Key Pair - Done
21,476,010 UART: [art] Signing Cert with AUTHO
21,477,388 UART: RITY.KEYID = 7
23,182,714 UART: [art] Erasing AUTHORITY.KEYID = 7
23,184,278 UART: [art] PUB.X = 720BB883552B000A1924581E0BC0509366C17CC9BC09F0A2591CA9225AE849B5DBBEC782CE07BE1F37CD961AE16779B4
23,191,500 UART: [art] PUB.Y = 6A20126F24E098FB442C8ECC2B733FA2AA86327B638348D04F0053E487AD36D4A366509FB162AAEE88D6B8B393123F36
23,198,740 UART: [art] SIG.R = 36D5E07BD014F679B0ECED1FB698E037F229E80D654B119D01E8675C0E3AEBCCEF055185E6EFFE5AA91F5840E65EC943
23,206,147 UART: [art] SIG.S = 2F6DF319BF7DBB0BD8E0EF41B226A4DA5D605C14AC3B587FDD23D23FB28E01F6D4C93B65AC5309E69279A1BAEC15C635
24,183,917 UART: persistent_rt::test_persistent_data_layout...[ok]
24,186,184 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,426 UART:
192,791 UART: Running Caliptra ROM ...
193,971 UART:
194,120 UART: [state] CFI Enabled
265,775 UART: [state] LifecycleState = Unprovisioned
268,187 UART: [state] DebugLocked = No
269,513 UART: [state] WD Timer not started. Device not locked for debugging
274,425 UART: [kat] SHA2-256
464,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,094 UART: [kat] ++
475,576 UART: [kat] sha1
486,098 UART: [kat] SHA2-256
489,116 UART: [kat] SHA2-384
495,602 UART: [kat] SHA2-512-ACC
498,177 UART: [kat] ECC-384
2,949,443 UART: [kat] HMAC-384Kdf
2,971,781 UART: [kat] LMS
3,503,578 UART: [kat] --
3,508,802 UART: [cold-reset] ++
3,510,377 UART: [fht] FHT @ 0x50003400
3,521,002 UART: [idev] ++
3,521,719 UART: [idev] CDI.KEYID = 6
3,522,668 UART: [idev] SUBJECT.KEYID = 7
3,523,850 UART: [idev] UDS.KEYID = 0
3,524,781 ready_for_fw is high
3,524,970 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,565,415 UART: [idev] Erasing UDS.KEYID = 0
6,026,364 UART: [idev] Sha1 KeyId Algorithm
6,048,412 UART: [idev] --
6,053,300 UART: [ldev] ++
6,053,996 UART: [ldev] CDI.KEYID = 6
6,054,917 UART: [ldev] SUBJECT.KEYID = 5
6,056,076 UART: [ldev] AUTHORITY.KEYID = 7
6,057,251 UART: [ldev] FE.KEYID = 1
6,102,086 UART: [ldev] Erasing FE.KEYID = 1
8,607,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,798 UART: [ldev] --
10,415,787 UART: [fwproc] Wait for Commands...
10,418,254 UART: [fwproc] Recv command 0x46574c44
10,420,565 UART: [fwproc] Recv'd Img size: 31832 bytes
12,845,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,927,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,044,093 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,091,106 >>> mbox cmd response: success
13,095,403 UART: [afmc] ++
13,096,108 UART: [afmc] CDI.KEYID = 6
13,097,230 UART: [afmc] SUBJECT.KEYID = 7
13,098,724 UART: [afmc] AUTHORITY.KEYID = 5
15,635,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,358,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,360,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,375,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,390,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,405,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,430,442 UART: [afmc] --
17,434,370 UART: [cold-reset] --
17,437,781 UART: [state] Locking Datavault
17,443,208 UART: [state] Locking PCR0, PCR1 and PCR31
17,445,406 UART: [state] Locking ICCM
17,447,148 UART: [exit] Launching FMC @ 0x40000130
17,455,788 UART:
17,456,025 UART: Running Caliptra FMC ...
17,457,169 UART:
17,457,332 UART: [state] CFI Enabled
17,510,473 UART: [fht] FMC Alias Private Key: 7
19,274,221 UART: [art] Extend RT PCRs Done
19,275,479 UART: [art] Lock RT PCRs Done
19,276,797 UART: [art] Populate DV Done
19,282,121 UART: [fht] FMC Alias Private Key: 7
19,283,714 UART: [art] Derive CDI
19,284,563 UART: [art] Store in in slot 0x4
19,342,895 UART: [art] Derive Key Pair
19,343,972 UART: [art] Store priv key in slot 0x5
21,806,602 UART: [art] Derive Key Pair - Done
21,819,719 UART: [art] Signing Cert with AUTHO
21,821,050 UART: RITY.KEYID = 7
23,532,334 UART: [art] Erasing AUTHORITY.KEYID = 7
23,533,896 UART: [art] PUB.X = 16A0328D450DE35E54445C929C735792F94BD0903DE7AE31CF7E043547E6FF41C0C2B49C3675F34B49A0916FEB907B28
23,541,128 UART: [art] PUB.Y = D962820BF0340CC6085296475093591CFC5245450F2B05831A4F562D7E7E893E64E26D290C90009BAF3D869E4DADA4E7
23,548,363 UART: [art] SIG.R = FFC78C509D24AA0B2FBD94E2D0903722B656FC74BD18DE3396830A32BDB5709125647C38FFF45FA517D6264137DA84EE
23,555,703 UART: [art] SIG.S = 21F48F524CD63AEA2100821E4B04BAE0495D62EE0B898C85FF4809E0F8D4C338FCDC343190DCB59C4EA83EFB78DE095A
24,534,569 UART: persistent_rt::test_persistent_data_layout...[ok]
24,536,831 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,429,773 ready_for_fw is high
3,430,182 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,977,692 >>> mbox cmd response: success
17,264,846 UART:
17,265,239 UART: Running Caliptra FMC ...
17,266,371 UART:
17,266,533 UART: [state] CFI Enabled
17,333,376 UART: [fht] FMC Alias Private Key: 7
19,097,494 UART: [art] Extend RT PCRs Done
19,098,770 UART: [art] Lock RT PCRs Done
19,100,138 UART: [art] Populate DV Done
19,105,265 UART: [fht] FMC Alias Private Key: 7
19,106,946 UART: [art] Derive CDI
19,107,799 UART: [art] Store in in slot 0x4
19,166,243 UART: [art] Derive Key Pair
19,167,280 UART: [art] Store priv key in slot 0x5
21,630,524 UART: [art] Derive Key Pair - Done
21,643,397 UART: [art] Signing Cert with AUTHO
21,644,740 UART: RITY.KEYID = 7
23,355,697 UART: [art] Erasing AUTHORITY.KEYID = 7
23,357,274 UART: [art] PUB.X = 1EE9C1D8DD51C663BC642C294DF2AB637E3667D45868F218235F7BC24BDABE1D8BDD866F164DE8BB309E358BF248B29C
23,364,414 UART: [art] PUB.Y = 0A8C9FA0127A9ACF2AA15B72E2368755212D30A1E2FB6E9F99DC6EB3585AA78C283789A2DE5FF0A216A7109D007A3B3B
23,371,746 UART: [art] SIG.R = 29A6C5DADE72A1AE9DEE69F9CD7B9B55525F721CD96644F8CB8A008E7C150D6345B579A14C6FDCAD960928FA38ED345C
23,379,158 UART: [art] SIG.S = 8E28423854EB1FA389D54B4906F83C75BD18A5F4F374A048B0BE1CD31D6A4916F724427B16A3A6C1F5E064B5C949179A
24,357,724 UART: persistent_rt::test_persistent_data_layout...[ok]
24,359,975 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,923 writing to cptra_bootfsm_go
193,207 UART:
193,565 UART: Running Caliptra ROM ...
194,773 UART:
604,518 UART: [state] CFI Enabled
617,061 UART: [state] LifecycleState = Unprovisioned
619,498 UART: [state] DebugLocked = No
621,684 UART: [state] WD Timer not started. Device not locked for debugging
626,932 UART: [kat] SHA2-256
816,845 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,603 UART: [kat] ++
828,232 UART: [kat] sha1
839,189 UART: [kat] SHA2-256
842,198 UART: [kat] SHA2-384
847,270 UART: [kat] SHA2-512-ACC
849,856 UART: [kat] ECC-384
3,291,082 UART: [kat] HMAC-384Kdf
3,304,947 UART: [kat] LMS
3,836,755 UART: [kat] --
3,842,169 UART: [cold-reset] ++
3,843,317 UART: [fht] FHT @ 0x50003400
3,855,528 UART: [idev] ++
3,856,237 UART: [idev] CDI.KEYID = 6
3,857,121 UART: [idev] SUBJECT.KEYID = 7
3,858,365 UART: [idev] UDS.KEYID = 0
3,859,266 ready_for_fw is high
3,859,463 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,899,791 UART: [idev] Erasing UDS.KEYID = 0
6,335,723 UART: [idev] Sha1 KeyId Algorithm
6,359,589 UART: [idev] --
6,363,093 UART: [ldev] ++
6,363,775 UART: [ldev] CDI.KEYID = 6
6,364,689 UART: [ldev] SUBJECT.KEYID = 5
6,365,845 UART: [ldev] AUTHORITY.KEYID = 7
6,367,075 UART: [ldev] FE.KEYID = 1
6,378,968 UART: [ldev] Erasing FE.KEYID = 1
8,854,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,732 UART: [ldev] --
10,644,648 UART: [fwproc] Wait for Commands...
10,647,041 UART: [fwproc] Recv command 0x46574c44
10,649,306 UART: [fwproc] Recv'd Img size: 31832 bytes
13,084,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,166,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,282,183 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,329,768 >>> mbox cmd response: success
13,334,162 UART: [afmc] ++
13,334,783 UART: [afmc] CDI.KEYID = 6
13,336,064 UART: [afmc] SUBJECT.KEYID = 7
13,337,636 UART: [afmc] AUTHORITY.KEYID = 5
15,839,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,561,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,563,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,578,262 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,593,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,608,399 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,632,084 UART: [afmc] --
17,636,500 UART: [cold-reset] --
17,642,267 UART: [state] Locking Datavault
17,647,055 UART: [state] Locking PCR0, PCR1 and PCR31
17,649,263 UART: [state] Locking ICCM
17,652,041 UART: [exit] Launching FMC @ 0x40000130
17,660,719 UART:
17,661,005 UART: Running Caliptra FMC ...
17,662,162 UART:
17,662,329 UART: [state] CFI Enabled
17,670,228 UART: [fht] FMC Alias Private Key: 7
19,427,408 UART: [art] Extend RT PCRs Done
19,428,651 UART: [art] Lock RT PCRs Done
19,430,390 UART: [art] Populate DV Done
19,435,909 UART: [fht] FMC Alias Private Key: 7
19,437,432 UART: [art] Derive CDI
19,438,248 UART: [art] Store in in slot 0x4
19,481,219 UART: [art] Derive Key Pair
19,482,261 UART: [art] Store priv key in slot 0x5
21,909,374 UART: [art] Derive Key Pair - Done
21,922,165 UART: [art] Signing Cert with AUTHO
21,923,503 UART: RITY.KEYID = 7
23,629,138 UART: [art] Erasing AUTHORITY.KEYID = 7
23,630,680 UART: [art] PUB.X = CA3D9B63CF251508E048F6C42D81E71E75934FF7097BA7BF3B14C1F83F3D8AE6E89DE940B05881BB3A38BB5DD8FF8011
23,637,900 UART: [art] PUB.Y = 3781D57A0DD31FBB9854E8ABCDB125A9F0F8D5BD1F43FF272FB6B05DE15FD1B34B0858A7FD89CFE9FFBA0975037268E0
23,645,220 UART: [art] SIG.R = 71F0288A9FC79680883D754E1B066799DC4F6BAA5166D3B89CF957AE0E96A6EDC927C9F78AD37D71AACB6A81C2716354
23,652,620 UART: [art] SIG.S = F0F0E97F2C519213C0B1DF6EBACD5CDF8DA00A3E5BD2818A498F31AB9810F6480C1C2B25A8387296C81B218B6FA839E6
24,630,741 UART: persistent_rt::test_persistent_data_layout...[ok]
24,632,995 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
3,755,180 ready_for_fw is high
3,755,582 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
13,188,448 >>> mbox cmd response: success
17,441,664 UART:
17,442,074 UART: Running Caliptra FMC ...
17,443,191 UART:
17,443,347 UART: [state] CFI Enabled
17,451,397 UART: [fht] FMC Alias Private Key: 7
19,208,107 UART: [art] Extend RT PCRs Done
19,209,384 UART: [art] Lock RT PCRs Done
19,211,080 UART: [art] Populate DV Done
19,216,406 UART: [fht] FMC Alias Private Key: 7
19,217,869 UART: [art] Derive CDI
19,218,643 UART: [art] Store in in slot 0x4
19,261,039 UART: [art] Derive Key Pair
19,262,129 UART: [art] Store priv key in slot 0x5
21,688,816 UART: [art] Derive Key Pair - Done
21,701,806 UART: [art] Signing Cert with AUTHO
21,703,161 UART: RITY.KEYID = 7
23,408,536 UART: [art] Erasing AUTHORITY.KEYID = 7
23,410,098 UART: [art] PUB.X = D8E2076F0CC30C64817B2C1D6AC53738728E40CD836FACE04E73CE4F7D230E368301B0DC52B157F04AD663B3E058DDFB
23,417,329 UART: [art] PUB.Y = E3F263629C1C3BDADC23A63C325B63A973E632EBB6060A9962C1A2D66B445EB97BD39AF9719C5CBA1A7A80D2031CF742
23,424,563 UART: [art] SIG.R = AE1F4D5F95126FB0A4E8B76146DE6B36EADD7A643BFA930DFEFA6A7B042733A3976361192817B3B558018F4DF635A192
23,431,978 UART: [art] SIG.S = 9F2D8A00A509ACC257173FEBEFF8CD283B29C93225F0D73B73CE79EF87CC1EBC0D83EC997F7175C780399D251F72598E
24,410,524 UART: persistent_rt::test_persistent_data_layout...[ok]
24,412,803 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,900 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 ready_for_fw is high
1,481,107 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,489,098 UART: [idev] Erasing UDS.KEYID = 0
1,505,280 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,818 UART: [idev] --
1,514,641 UART: [ldev] ++
1,514,809 UART: [ldev] CDI.KEYID = 6
1,515,172 UART: [ldev] SUBJECT.KEYID = 5
1,515,598 UART: [ldev] AUTHORITY.KEYID = 7
1,516,061 UART: [ldev] FE.KEYID = 1
1,521,147 UART: [ldev] Erasing FE.KEYID = 1
1,546,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,768 UART: [ldev] --
1,585,045 UART: [fwproc] Waiting for Commands...
1,585,704 UART: [fwproc] Received command 0x46574c44
1,586,495 UART: [fwproc] Received Image of size 31832 bytes
1,938,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,007,163 >>> mbox cmd response: success
2,008,387 UART: [afmc] ++
2,008,555 UART: [afmc] CDI.KEYID = 6
2,008,917 UART: [afmc] SUBJECT.KEYID = 7
2,009,342 UART: [afmc] AUTHORITY.KEYID = 5
2,044,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,127 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,012 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,702 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,607 UART: [afmc] --
2,087,589 UART: [cold-reset] --
2,088,575 UART: [state] Locking Datavault
2,089,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,428 UART: [state] Locking ICCM
2,090,868 UART: [exit] Launching FMC @ 0x40000130
2,096,197 UART:
2,096,213 UART: Running Caliptra FMC ...
2,096,621 UART:
2,096,675 UART: [state] CFI Enabled
2,106,716 UART: [fht] FMC Alias Private Key: 7
2,215,091 UART: [art] Extend RT PCRs Done
2,215,519 UART: [art] Lock RT PCRs Done
2,217,215 UART: [art] Populate DV Done
2,225,468 UART: [fht] FMC Alias Private Key: 7
2,226,466 UART: [art] Derive CDI
2,226,746 UART: [art] Store in in slot 0x4
2,312,553 UART: [art] Derive Key Pair
2,312,913 UART: [art] Store priv key in slot 0x5
2,326,431 UART: [art] Derive Key Pair - Done
2,341,384 UART: [art] Signing Cert with AUTHO
2,341,864 UART: RITY.KEYID = 7
2,356,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,497 UART: [art] PUB.X = 4A32A8F35D9AAB4DD9D2644C0F742A8EC388699040FCDFC8AD7164E18BEFB7C1D4182BA089E4A591531FBAD07513E175
2,364,278 UART: [art] PUB.Y = C02942927A1611EF7DF27773D93C16F77C8E19E42A8B8691C33C38867D57208C3214DCD326BEA7F2530E233453C7F778
2,371,219 UART: [art] SIG.R = A21C54C159C5506443D66DC4A08CDCB99D1D3788155CA7CAA5FACEEE67AE5595D0C71AC0AE9DC60792BD8BE9A8169ADC
2,378,010 UART: [art] SIG.S = 61B987E766563589CBA88C99B3217046178BDD38B487F449573953EABAAC58E15BA4EBE1BFE68CD2D07B6FED25E5E74F
2,401,700 UART: persistent_rt::test_persistent_data_layout...[ok]
2,402,943 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 ready_for_fw is high
1,362,873 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,858,051 >>> mbox cmd response: success
1,920,409 UART:
1,920,425 UART: Running Caliptra FMC ...
1,920,833 UART:
1,920,887 UART: [state] CFI Enabled
1,931,582 UART: [fht] FMC Alias Private Key: 7
2,039,109 UART: [art] Extend RT PCRs Done
2,039,537 UART: [art] Lock RT PCRs Done
2,041,115 UART: [art] Populate DV Done
2,049,300 UART: [fht] FMC Alias Private Key: 7
2,050,260 UART: [art] Derive CDI
2,050,540 UART: [art] Store in in slot 0x4
2,136,263 UART: [art] Derive Key Pair
2,136,623 UART: [art] Store priv key in slot 0x5
2,149,551 UART: [art] Derive Key Pair - Done
2,164,396 UART: [art] Signing Cert with AUTHO
2,164,876 UART: RITY.KEYID = 7
2,180,178 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,943 UART: [art] PUB.X = 85C6FE4C6B7811416B326DF48A0391F866E086DCD1E058F1FB56AA4910D7E4BE11D457CD05CF15891EC4013DBEE6419F
2,187,714 UART: [art] PUB.Y = 9620BE483996F113E5D3477A6A353265B644F043905F9CF68A0C027856CA4F33F2B6FA240D9BAC7C4867A8DE71D85AC0
2,194,657 UART: [art] SIG.R = 15C2CBA4830394A2F7EFBD72B64FA1808E0020851642FC710641564C70E56617A1562687615BDC18D4497863280A3961
2,201,382 UART: [art] SIG.S = 1AE95B898E8813F96B8D898B2C8825BCD8A6EA735E6E0838A4AD2E237CCC2C207B401666BCAE9EEEF2DFCE757D91B372
2,225,365 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,608 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,836 UART: [kat] SHA2-256
881,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,882 UART: [kat] ++
886,034 UART: [kat] sha1
890,228 UART: [kat] SHA2-256
892,166 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,409 UART: [kat] HMAC-384Kdf
906,947 UART: [kat] LMS
1,475,143 UART: [kat] --
1,476,148 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,477 UART: [idev] ++
1,479,645 UART: [idev] CDI.KEYID = 6
1,480,005 UART: [idev] SUBJECT.KEYID = 7
1,480,429 UART: [idev] UDS.KEYID = 0
1,480,774 ready_for_fw is high
1,480,774 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,528 UART: [ldev] Erasing FE.KEYID = 1
1,546,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,769 UART: [ldev] --
1,586,108 UART: [fwproc] Waiting for Commands...
1,586,819 UART: [fwproc] Received command 0x46574c44
1,587,610 UART: [fwproc] Received Image of size 31832 bytes
1,941,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,998,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,010,056 >>> mbox cmd response: success
2,011,084 UART: [afmc] ++
2,011,252 UART: [afmc] CDI.KEYID = 6
2,011,614 UART: [afmc] SUBJECT.KEYID = 7
2,012,039 UART: [afmc] AUTHORITY.KEYID = 5
2,046,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,062,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,063,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,305 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,080,995 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,088,886 UART: [afmc] --
2,089,980 UART: [cold-reset] --
2,090,804 UART: [state] Locking Datavault
2,091,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,092,379 UART: [state] Locking ICCM
2,092,855 UART: [exit] Launching FMC @ 0x40000130
2,098,184 UART:
2,098,200 UART: Running Caliptra FMC ...
2,098,608 UART:
2,098,751 UART: [state] CFI Enabled
2,109,514 UART: [fht] FMC Alias Private Key: 7
2,217,937 UART: [art] Extend RT PCRs Done
2,218,365 UART: [art] Lock RT PCRs Done
2,219,807 UART: [art] Populate DV Done
2,228,224 UART: [fht] FMC Alias Private Key: 7
2,229,224 UART: [art] Derive CDI
2,229,504 UART: [art] Store in in slot 0x4
2,315,383 UART: [art] Derive Key Pair
2,315,743 UART: [art] Store priv key in slot 0x5
2,328,825 UART: [art] Derive Key Pair - Done
2,343,614 UART: [art] Signing Cert with AUTHO
2,344,094 UART: RITY.KEYID = 7
2,359,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,360,089 UART: [art] PUB.X = E6C2AFEE7980504BF38C02F3D6FEB67C65C796E8D0BE5786D98384F5EE1AC592B6CB19F9E6ABD60D4A5C4261C39A9BC3
2,366,873 UART: [art] PUB.Y = D3E4BB96F79BBD783CB6539AD682A186DF2058D323C28B16471F577E7930D2AC08A4735C55E2E5A5083406FCECC1518B
2,373,820 UART: [art] SIG.R = 419154367614399BDD848B2313C9B7CCF61D2D04F1F57B736D891A5740BBDF2178CB62330B697BE344AA53BD7AB53A1B
2,380,588 UART: [art] SIG.S = BDC3B979F468D88394A880660060C429F832A7D39567C8A1E8E139522BB2516C73F9F5025AB31BD27566C6ABA2FE17EC
2,404,571 UART: persistent_rt::test_persistent_data_layout...[ok]
2,405,814 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 ready_for_fw is high
1,362,760 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,857,684 >>> mbox cmd response: success
1,919,932 UART:
1,919,948 UART: Running Caliptra FMC ...
1,920,356 UART:
1,920,499 UART: [state] CFI Enabled
1,931,144 UART: [fht] FMC Alias Private Key: 7
2,038,729 UART: [art] Extend RT PCRs Done
2,039,157 UART: [art] Lock RT PCRs Done
2,040,871 UART: [art] Populate DV Done
2,049,332 UART: [fht] FMC Alias Private Key: 7
2,050,364 UART: [art] Derive CDI
2,050,644 UART: [art] Store in in slot 0x4
2,136,091 UART: [art] Derive Key Pair
2,136,451 UART: [art] Store priv key in slot 0x5
2,150,099 UART: [art] Derive Key Pair - Done
2,164,652 UART: [art] Signing Cert with AUTHO
2,165,132 UART: RITY.KEYID = 7
2,180,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,357 UART: [art] PUB.X = 1EF2BD2C59ED8AEBE62BF95BE9506061331007F116C40BCD4F0530AADDA39A48D1EE3AFE1F023E9C91A49697EE777FD2
2,188,135 UART: [art] PUB.Y = 0FA852D2643BF185C7851CF707192DB1595F8DBC1F9B8DB06997B93A46E4D61A73A030A18E71CA8FB67A1131A201B51A
2,195,082 UART: [art] SIG.R = B9FB9B452B1A87B1C97DCCA3A51C4D50D9CDC39DE98A7F0345045A0F87268F30C4134828956F2EFACACA8CDEFEBE5028
2,201,865 UART: [art] SIG.S = 83A8CC59573B1E441918B105915BA6779BF985D6E78A1DCA6F174C5874E184C0CCBF85CBB6166EDFA7A3F41504A52407
2,225,474 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,717 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,306 UART: [kat] SHA2-512-ACC
908,207 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,744 UART: [kat] LMS
1,171,072 UART: [kat] --
1,171,737 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,806 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,542 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,960 UART: [fwproc] Wait for Commands...
1,282,536 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 31832 bytes
1,636,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,663,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,401 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,704,558 >>> mbox cmd response: success
1,705,698 UART: [afmc] ++
1,705,866 UART: [afmc] CDI.KEYID = 6
1,706,228 UART: [afmc] SUBJECT.KEYID = 7
1,706,653 UART: [afmc] AUTHORITY.KEYID = 5
1,742,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,485 UART: [afmc] --
1,785,463 UART: [cold-reset] --
1,786,419 UART: [state] Locking Datavault
1,787,586 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,190 UART: [state] Locking ICCM
1,788,680 UART: [exit] Launching FMC @ 0x40000130
1,794,009 UART:
1,794,025 UART: Running Caliptra FMC ...
1,794,433 UART:
1,794,487 UART: [state] CFI Enabled
1,805,124 UART: [fht] FMC Alias Private Key: 7
1,913,005 UART: [art] Extend RT PCRs Done
1,913,433 UART: [art] Lock RT PCRs Done
1,914,821 UART: [art] Populate DV Done
1,923,314 UART: [fht] FMC Alias Private Key: 7
1,924,250 UART: [art] Derive CDI
1,924,530 UART: [art] Store in in slot 0x4
2,010,389 UART: [art] Derive Key Pair
2,010,749 UART: [art] Store priv key in slot 0x5
2,023,125 UART: [art] Derive Key Pair - Done
2,038,125 UART: [art] Signing Cert with AUTHO
2,038,605 UART: RITY.KEYID = 7
2,053,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,678 UART: [art] PUB.X = 66E880AFBCA5146039A40E9B56D63F4AC17FFAA4F700FD1B693E85B02709725FEA70A1FB9240971649C8A91C8092145B
2,061,424 UART: [art] PUB.Y = 429CF19FD411E9951EBD3E1E2667865FC86F416AAB63A449D4944100E98E61ED7001800D6A9B120DAABC1F1F821BFF34
2,068,351 UART: [art] SIG.R = 3C825EA47EA44534525ED7E4C7C00DFF6657EDC0C617F96437188F2C7648A405B681FB99EC93BF84E2D366066143EA56
2,075,114 UART: [art] SIG.S = EB74FA5008840A5AF974907F10BA62AF8743322D410319DAF666B73E9F46DB79312D4310DF59966E399B174C2B3A30ED
2,099,135 UART: persistent_rt::test_persistent_data_layout...[ok]
2,100,378 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 ready_for_fw is high
1,060,427 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,557,747 >>> mbox cmd response: success
1,620,129 UART:
1,620,145 UART: Running Caliptra FMC ...
1,620,553 UART:
1,620,607 UART: [state] CFI Enabled
1,631,046 UART: [fht] FMC Alias Private Key: 7
1,738,763 UART: [art] Extend RT PCRs Done
1,739,191 UART: [art] Lock RT PCRs Done
1,740,637 UART: [art] Populate DV Done
1,748,752 UART: [fht] FMC Alias Private Key: 7
1,749,874 UART: [art] Derive CDI
1,750,154 UART: [art] Store in in slot 0x4
1,836,135 UART: [art] Derive Key Pair
1,836,495 UART: [art] Store priv key in slot 0x5
1,850,003 UART: [art] Derive Key Pair - Done
1,865,057 UART: [art] Signing Cert with AUTHO
1,865,537 UART: RITY.KEYID = 7
1,881,013 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,778 UART: [art] PUB.X = 6052431149058D9FE089F79F3E000A20F871657851565663DD778A9BC51453B65609942E40191580DB9BC7487DD203ED
1,888,498 UART: [art] PUB.Y = DF771D47B77A3863CEDD5D3E8245BE667C18A99DA8FB186C3DD310990693FEE94F03CDE322095A5A208839A240B076B5
1,895,445 UART: [art] SIG.R = 8526AFA39F85ABD15EDFD00847FE04AE718C58DE8B716302C27BDE67ED8A258D8B84128A3681706C85A62AA37447F3B7
1,902,214 UART: [art] SIG.S = 981F7A74BE7FDF3EEF520AA7069BEDC4A7EDFA100EBCA80A1FA707E0A6225557267E22C99247368725BFF1320256B67E
1,925,898 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,141 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
893,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,994 UART: [kat] ++
898,146 UART: [kat] sha1
902,194 UART: [kat] SHA2-256
904,134 UART: [kat] SHA2-384
907,099 UART: [kat] SHA2-512-ACC
909,000 UART: [kat] ECC-384
919,413 UART: [kat] HMAC-384Kdf
924,009 UART: [kat] LMS
1,172,337 UART: [kat] --
1,173,310 UART: [cold-reset] ++
1,173,778 UART: [fht] FHT @ 0x50003400
1,176,477 UART: [idev] ++
1,176,645 UART: [idev] CDI.KEYID = 6
1,177,005 UART: [idev] SUBJECT.KEYID = 7
1,177,429 UART: [idev] UDS.KEYID = 0
1,177,774 ready_for_fw is high
1,177,774 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,185,217 UART: [idev] Erasing UDS.KEYID = 0
1,202,162 UART: [idev] Sha1 KeyId Algorithm
1,210,432 UART: [idev] --
1,211,612 UART: [ldev] ++
1,211,780 UART: [ldev] CDI.KEYID = 6
1,212,143 UART: [ldev] SUBJECT.KEYID = 5
1,212,569 UART: [ldev] AUTHORITY.KEYID = 7
1,213,032 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,244,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,246 UART: [ldev] --
1,283,513 UART: [fwproc] Wait for Commands...
1,284,143 UART: [fwproc] Recv command 0x46574c44
1,284,871 UART: [fwproc] Recv'd Img size: 31832 bytes
1,637,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,694,262 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,706,207 >>> mbox cmd response: success
1,707,283 UART: [afmc] ++
1,707,451 UART: [afmc] CDI.KEYID = 6
1,707,813 UART: [afmc] SUBJECT.KEYID = 7
1,708,238 UART: [afmc] AUTHORITY.KEYID = 5
1,743,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,734 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,248 UART: [afmc] --
1,787,268 UART: [cold-reset] --
1,788,244 UART: [state] Locking Datavault
1,789,263 UART: [state] Locking PCR0, PCR1 and PCR31
1,789,867 UART: [state] Locking ICCM
1,790,373 UART: [exit] Launching FMC @ 0x40000130
1,795,702 UART:
1,795,718 UART: Running Caliptra FMC ...
1,796,126 UART:
1,796,269 UART: [state] CFI Enabled
1,807,126 UART: [fht] FMC Alias Private Key: 7
1,915,339 UART: [art] Extend RT PCRs Done
1,915,767 UART: [art] Lock RT PCRs Done
1,917,217 UART: [art] Populate DV Done
1,925,154 UART: [fht] FMC Alias Private Key: 7
1,926,098 UART: [art] Derive CDI
1,926,378 UART: [art] Store in in slot 0x4
2,012,125 UART: [art] Derive Key Pair
2,012,485 UART: [art] Store priv key in slot 0x5
2,025,963 UART: [art] Derive Key Pair - Done
2,040,789 UART: [art] Signing Cert with AUTHO
2,041,269 UART: RITY.KEYID = 7
2,056,993 UART: [art] Erasing AUTHORITY.KEYID = 7
2,057,758 UART: [art] PUB.X = E44EE6CC66C8642938C187222D94EBBCF5820B38BF598A24A54CE9D161A0B7B537AA91447528404E802D7EB1AE9AE533
2,064,531 UART: [art] PUB.Y = 8FBC221C8EAB255EE88D6D1041F8FA484B714A04480E22D62FD6D51433377C33F5E3AFB630F3872CC42F3CE212E32AF2
2,071,485 UART: [art] SIG.R = 525A1F43C7B9FA93929DFB9D88652DBCFC39850DC4CD386755E7B38D19414CF88209CE26067428CC65E1243B356F5212
2,078,246 UART: [art] SIG.S = 1B666161836A40FF8F6CD570E0C96803DAB3D26A2C132C3F2B74FBAAC8F5D6D4F2C1AEEEEA38DA706D102ECA5F2F0676
2,101,944 UART: persistent_rt::test_persistent_data_layout...[ok]
2,103,187 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 ready_for_fw is high
1,060,538 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,557,732 >>> mbox cmd response: success
1,619,178 UART:
1,619,194 UART: Running Caliptra FMC ...
1,619,602 UART:
1,619,745 UART: [state] CFI Enabled
1,630,258 UART: [fht] FMC Alias Private Key: 7
1,738,629 UART: [art] Extend RT PCRs Done
1,739,057 UART: [art] Lock RT PCRs Done
1,740,759 UART: [art] Populate DV Done
1,749,050 UART: [fht] FMC Alias Private Key: 7
1,750,154 UART: [art] Derive CDI
1,750,434 UART: [art] Store in in slot 0x4
1,836,137 UART: [art] Derive Key Pair
1,836,497 UART: [art] Store priv key in slot 0x5
1,849,805 UART: [art] Derive Key Pair - Done
1,864,549 UART: [art] Signing Cert with AUTHO
1,865,029 UART: RITY.KEYID = 7
1,879,765 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,530 UART: [art] PUB.X = 011AA2F4057033747B4B5011DC5E0BC77C9249005C333002DB2DC7C3AD5283109CA02484263DFF5680B2E729FBC7F29D
1,887,266 UART: [art] PUB.Y = 92214BBFF7A963822C530CC20BE881398A0AFFB40BAB536A9CCC4468507C982F78C7C79DE4ED370032B46136409F7DC0
1,894,188 UART: [art] SIG.R = 1AC3F5616A48897EACDB09E47142366D54070834DD843247C32528DE0A21A4C98EBF46752DCD05D06E24192065F6FCE9
1,900,943 UART: [art] SIG.S = E2CF9EBE6FA1259A701990011A3D7A114308159C16F485812638BF46271A72490FE3EC8D73F5AC5F9D71AB81D5A25E2A
1,924,442 UART: persistent_rt::test_persistent_data_layout...[ok]
1,925,685 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,538 UART: [kat] HMAC-384Kdf
920,340 UART: [kat] LMS
1,168,652 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,625 UART: [idev] ++
1,172,793 UART: [idev] CDI.KEYID = 6
1,173,154 UART: [idev] SUBJECT.KEYID = 7
1,173,579 UART: [idev] UDS.KEYID = 0
1,173,925 ready_for_fw is high
1,173,925 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,957 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,368 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,742 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 31832 bytes
1,632,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,506 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,701,444 >>> mbox cmd response: success
1,702,621 UART: [afmc] ++
1,702,789 UART: [afmc] CDI.KEYID = 6
1,703,152 UART: [afmc] SUBJECT.KEYID = 7
1,703,578 UART: [afmc] AUTHORITY.KEYID = 5
1,739,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,888 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,456 UART: [afmc] --
1,782,368 UART: [cold-reset] --
1,783,074 UART: [state] Locking Datavault
1,784,221 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,825 UART: [state] Locking ICCM
1,785,413 UART: [exit] Launching FMC @ 0x40000130
1,790,742 UART:
1,790,758 UART: Running Caliptra FMC ...
1,791,166 UART:
1,791,220 UART: [state] CFI Enabled
1,801,817 UART: [fht] FMC Alias Private Key: 7
1,909,406 UART: [art] Extend RT PCRs Done
1,909,834 UART: [art] Lock RT PCRs Done
1,911,376 UART: [art] Populate DV Done
1,919,715 UART: [fht] FMC Alias Private Key: 7
1,920,727 UART: [art] Derive CDI
1,921,007 UART: [art] Store in in slot 0x4
2,006,508 UART: [art] Derive Key Pair
2,006,868 UART: [art] Store priv key in slot 0x5
2,020,096 UART: [art] Derive Key Pair - Done
2,034,958 UART: [art] Signing Cert with AUTHO
2,035,438 UART: RITY.KEYID = 7
2,050,686 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,451 UART: [art] PUB.X = E53A6C174BCCBDFC94723B0F2746CBE323D37DDBAA1BC034A253A09E528A56460FF12C716BF21096D69052348836D3D1
2,058,223 UART: [art] PUB.Y = 1EC8A8C661C42D0576634108024F2418BE60B954AAB319D62252B8AD5AA4DDA7BD7DEF74E60DD4EE5E88E915D71115FD
2,065,173 UART: [art] SIG.R = 7BE204AECC25D2FB52309A606AC94AF7BE034CF507235055817115124C6469B02B25842A095BF35E2A9FC99A7FC44F69
2,071,933 UART: [art] SIG.S = 8F6589F3AD0CF23C70BAA7B258AFE5934435B500B806767003F5AE944376DD263D9FF8EA129B18197616E7A1CE6411E0
2,095,232 UART: persistent_rt::test_persistent_data_layout...[ok]
2,096,475 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,338 ready_for_fw is high
1,055,338 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,553,316 >>> mbox cmd response: success
1,616,612 UART:
1,616,628 UART: Running Caliptra FMC ...
1,617,036 UART:
1,617,090 UART: [state] CFI Enabled
1,627,509 UART: [fht] FMC Alias Private Key: 7
1,735,678 UART: [art] Extend RT PCRs Done
1,736,106 UART: [art] Lock RT PCRs Done
1,737,518 UART: [art] Populate DV Done
1,745,937 UART: [fht] FMC Alias Private Key: 7
1,747,105 UART: [art] Derive CDI
1,747,385 UART: [art] Store in in slot 0x4
1,832,660 UART: [art] Derive Key Pair
1,833,020 UART: [art] Store priv key in slot 0x5
1,845,670 UART: [art] Derive Key Pair - Done
1,860,480 UART: [art] Signing Cert with AUTHO
1,860,960 UART: RITY.KEYID = 7
1,876,042 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,807 UART: [art] PUB.X = 019659577F4EC944A075D8A5E6111E3D87B35D8F0F6DFBDD7B5C87F2AB37D00E161B91755CEB4DD87A7E2B749FE690FF
1,883,582 UART: [art] PUB.Y = B17FF6C8F1233F37014AA9A587BA23AFAE64726BA4228D3AC46D8F17D2FD5C58EE93C65457DA2F79260B57BADBFC98E1
1,890,544 UART: [art] SIG.R = F178F95DD508F5CF6B08C6CF83B3F15B4FCEDABB1554E1C5AFF1B01A7497376C8DCB953D1233A66BAEBF6A238389B45B
1,897,330 UART: [art] SIG.S = A7ED3292DE04F7CC0AB0895B785732C621C0960A7A283D54A1C446DE9D3001556D35D636E4B06BBDD442D92261E26F58
1,920,972 UART: persistent_rt::test_persistent_data_layout...[ok]
1,922,215 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,456 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,418 UART: [idev] ++
1,172,586 UART: [idev] CDI.KEYID = 6
1,172,947 UART: [idev] SUBJECT.KEYID = 7
1,173,372 UART: [idev] UDS.KEYID = 0
1,173,718 ready_for_fw is high
1,173,718 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,181,124 UART: [idev] Erasing UDS.KEYID = 0
1,198,140 UART: [idev] Sha1 KeyId Algorithm
1,206,922 UART: [idev] --
1,207,949 UART: [ldev] ++
1,208,117 UART: [ldev] CDI.KEYID = 6
1,208,481 UART: [ldev] SUBJECT.KEYID = 5
1,208,908 UART: [ldev] AUTHORITY.KEYID = 7
1,209,371 UART: [ldev] FE.KEYID = 1
1,214,915 UART: [ldev] Erasing FE.KEYID = 1
1,241,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,153 UART: [ldev] --
1,280,539 UART: [fwproc] Wait for Commands...
1,281,268 UART: [fwproc] Recv command 0x46574c44
1,282,001 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,620 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,929 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,701,929 >>> mbox cmd response: success
1,703,194 UART: [afmc] ++
1,703,362 UART: [afmc] CDI.KEYID = 6
1,703,725 UART: [afmc] SUBJECT.KEYID = 7
1,704,151 UART: [afmc] AUTHORITY.KEYID = 5
1,739,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,077 UART: [afmc] --
1,783,187 UART: [cold-reset] --
1,784,087 UART: [state] Locking Datavault
1,785,270 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,874 UART: [state] Locking ICCM
1,786,362 UART: [exit] Launching FMC @ 0x40000130
1,791,691 UART:
1,791,707 UART: Running Caliptra FMC ...
1,792,115 UART:
1,792,258 UART: [state] CFI Enabled
1,802,611 UART: [fht] FMC Alias Private Key: 7
1,910,578 UART: [art] Extend RT PCRs Done
1,911,006 UART: [art] Lock RT PCRs Done
1,912,550 UART: [art] Populate DV Done
1,920,573 UART: [fht] FMC Alias Private Key: 7
1,921,755 UART: [art] Derive CDI
1,922,035 UART: [art] Store in in slot 0x4
2,007,432 UART: [art] Derive Key Pair
2,007,792 UART: [art] Store priv key in slot 0x5
2,020,718 UART: [art] Derive Key Pair - Done
2,035,535 UART: [art] Signing Cert with AUTHO
2,036,015 UART: RITY.KEYID = 7
2,051,327 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,092 UART: [art] PUB.X = 6B285B93EEF76A159D0CEC7A1CC06E62A57680FCC6B5BB2CA04DB963C9E566FA5F1589DABB4BB8E2B7CD3DB6E0D34D33
2,058,887 UART: [art] PUB.Y = 3FFB92A67D8BCFE73AE1F4B0BAB1FE503E4FF162BC242D4A8273013C24D94B8F94A4CFB616420389ACBC0E5EACA8A17F
2,065,854 UART: [art] SIG.R = 471C6ACF58E0A539CC4951129D1A1018F328B28237A9EBC8F12532839C3A8E6AA63FB22124AE3EECDE4FD2F24A1FF313
2,072,636 UART: [art] SIG.S = 6D917ECB7E452D730964848D0B1C25E1D052BB72D645CAD2F94080061DA0AE50CC30B674399A3CA69315D15B2A658190
2,096,655 UART: persistent_rt::test_persistent_data_layout...[ok]
2,097,898 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,207 ready_for_fw is high
1,056,207 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,556,537 >>> mbox cmd response: success
1,619,439 UART:
1,619,455 UART: Running Caliptra FMC ...
1,619,863 UART:
1,620,006 UART: [state] CFI Enabled
1,631,147 UART: [fht] FMC Alias Private Key: 7
1,738,958 UART: [art] Extend RT PCRs Done
1,739,386 UART: [art] Lock RT PCRs Done
1,741,276 UART: [art] Populate DV Done
1,749,493 UART: [fht] FMC Alias Private Key: 7
1,750,585 UART: [art] Derive CDI
1,750,865 UART: [art] Store in in slot 0x4
1,836,322 UART: [art] Derive Key Pair
1,836,682 UART: [art] Store priv key in slot 0x5
1,850,634 UART: [art] Derive Key Pair - Done
1,865,785 UART: [art] Signing Cert with AUTHO
1,866,265 UART: RITY.KEYID = 7
1,881,445 UART: [art] Erasing AUTHORITY.KEYID = 7
1,882,210 UART: [art] PUB.X = 4B27F0D7E797363B250AA7175C4DAE421302D13EC2856883F1169EEE9EFD8887FE5473853736E2EEDD68896C675B4226
1,888,972 UART: [art] PUB.Y = CEFA4E48D69E0E6300706705816D0BB41C4331DD9A0F78C9DCC6009946272229A3BA8D3D2F47149A479D7A36CD8D9BD3
1,895,872 UART: [art] SIG.R = 83BC90C58486721158588E77FBEE2D4BD9F6F36D42FB57A37CE0A9E347018F150DEF112630BC58153A3799E8AE29234E
1,902,638 UART: [art] SIG.S = 6042F8F98A14FD0B09465A23BACE12F7A2024B3C05DF499245146F5DB1EB6A7F08A5DAF76027365BE4BE57576104A66C
1,926,010 UART: persistent_rt::test_persistent_data_layout...[ok]
1,927,253 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,201 UART:
192,574 UART: Running Caliptra ROM ...
193,754 UART:
193,911 UART: [state] CFI Enabled
264,035 UART: [state] LifecycleState = Unprovisioned
266,025 UART: [state] DebugLocked = No
267,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,330 UART: [kat] SHA2-256
443,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,536 UART: [kat] ++
453,980 UART: [kat] sha1
463,572 UART: [kat] SHA2-256
466,226 UART: [kat] SHA2-384
473,070 UART: [kat] SHA2-512-ACC
475,440 UART: [kat] ECC-384
2,766,854 UART: [kat] HMAC-384Kdf
2,778,733 UART: [kat] LMS
3,969,053 UART: [kat] --
3,975,608 UART: [cold-reset] ++
3,978,037 UART: [fht] Storing FHT @ 0x50003400
3,988,611 UART: [idev] ++
3,989,185 UART: [idev] CDI.KEYID = 6
3,990,100 UART: [idev] SUBJECT.KEYID = 7
3,991,344 UART: [idev] UDS.KEYID = 0
3,992,385 ready_for_fw is high
3,992,588 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,009 UART: [idev] Erasing UDS.KEYID = 0
7,325,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,645 UART: [idev] --
7,352,124 UART: [ldev] ++
7,352,687 UART: [ldev] CDI.KEYID = 6
7,353,635 UART: [ldev] SUBJECT.KEYID = 5
7,354,896 UART: [ldev] AUTHORITY.KEYID = 7
7,356,050 UART: [ldev] FE.KEYID = 1
7,401,180 UART: [ldev] Erasing FE.KEYID = 1
10,733,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,531 UART: [ldev] --
13,114,684 UART: [fwproc] Waiting for Commands...
13,117,422 UART: [fwproc] Received command 0x46574c44
13,119,602 UART: [fwproc] Received Image of size 113760 bytes
17,174,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,633,502 >>> mbox cmd response: success
17,637,618 UART: [afmc] ++
17,638,215 UART: [afmc] CDI.KEYID = 6
17,639,097 UART: [afmc] SUBJECT.KEYID = 7
17,640,366 UART: [afmc] AUTHORITY.KEYID = 5
21,003,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,417 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,783 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,614 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,065 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,848 UART: [afmc] --
23,378,314 UART: [cold-reset] --
23,381,800 UART: [state] Locking Datavault
23,386,346 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,095 UART: [state] Locking ICCM
23,390,818 UART: [exit] Launching FMC @ 0x40000130
23,399,206 UART:
23,399,435 UART: Running Caliptra FMC ...
23,400,462 UART:
23,400,609 UART: [state] CFI Enabled
23,464,457 UART: [fht] FMC Alias Private Key: 7
25,802,798 UART: [art] Extend RT PCRs Done
25,804,022 UART: [art] Lock RT PCRs Done
25,805,785 UART: [art] Populate DV Done
25,810,924 UART: [fht] FMC Alias Private Key: 7
25,812,621 UART: [art] Derive CDI
25,813,358 UART: [art] Store in in slot 0x4
25,872,725 UART: [art] Derive Key Pair
25,873,769 UART: [art] Store priv key in slot 0x5
29,166,047 UART: [art] Derive Key Pair - Done
29,179,430 UART: [art] Signing Cert with AUTHO
29,180,738 UART: RITY.KEYID = 7
31,467,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,192 UART: [art] PUB.X = D9278957D3502E4E305C985574C8D7CBC89CE202C0C24830AD663905D558DA5077FDB53E8CCF83323C8D48A78FA7B733
31,476,381 UART: [art] PUB.Y = A73DA37A145C002223D2872B841736D068D61CED72F339B5A6F18AA1A6622959B0C9FD12D110568293D01C4D64FB53CE
31,483,617 UART: [art] SIG.R = 7AFEF88CF32F5E27265F5FDE4A60561F61856C846D173270261D8E51713096F35424E13DE7BD3807F2D6CCC2EA87862D
31,491,027 UART: [art] SIG.S = 3EF6E837DAD3BF04EBFC5E0FA01D02A29FACAA3FD4ACE44DF4B533B217E5018BA6620DFB97C0AE03058FD9B6F772C0EB
32,796,476 UART: Caliptra RT
32,797,181 UART: [state] CFI Enabled
32,956,997 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,805,968 ready_for_fw is high
3,806,691 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,863,056 >>> mbox cmd response: success
23,547,912 UART:
23,548,303 UART: Running Caliptra FMC ...
23,549,519 UART:
23,549,691 UART: [state] CFI Enabled
23,615,316 UART: [fht] FMC Alias Private Key: 7
25,953,250 UART: [art] Extend RT PCRs Done
25,954,479 UART: [art] Lock RT PCRs Done
25,955,893 UART: [art] Populate DV Done
25,961,100 UART: [fht] FMC Alias Private Key: 7
25,962,648 UART: [art] Derive CDI
25,963,415 UART: [art] Store in in slot 0x4
26,023,868 UART: [art] Derive Key Pair
26,024,913 UART: [art] Store priv key in slot 0x5
29,317,314 UART: [art] Derive Key Pair - Done
29,330,251 UART: [art] Signing Cert with AUTHO
29,331,578 UART: RITY.KEYID = 7
31,618,245 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,756 UART: [art] PUB.X = C1C88BDAD41EBF8F06AEE849B068F012FE6111C5153F8D7B3C973519A4C912A711C44894E464818436601C369AF18A15
31,626,994 UART: [art] PUB.Y = 40750DCDBA385EAAE5E3D4F6F13F44250CD2B5794EE38EC00D87B907D59F84C24A729B40D7E309A3C89D57AAA6B1587D
31,634,246 UART: [art] SIG.R = 1CE0AB6A7D32DC43DA16D7417E91C454C454FA9B4D13D0A9916A80C8837468FF480EA4D28D0C95121115B01247E7C935
31,641,598 UART: [art] SIG.S = 838B377D6EA56AA24D1B0C79A9F966B235AF58577361C5E126F30314602895EF198DB59CDCAF7BDADDB5E610CE77ED23
32,947,298 UART: Caliptra RT
32,948,009 UART: [state] CFI Enabled
33,107,454 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
192,833 UART:
193,207 UART: Running Caliptra ROM ...
194,509 UART:
603,914 UART: [state] CFI Enabled
614,943 UART: [state] LifecycleState = Unprovisioned
616,876 UART: [state] DebugLocked = No
619,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,039 UART: [kat] SHA2-256
793,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,350 UART: [kat] ++
804,820 UART: [kat] sha1
816,432 UART: [kat] SHA2-256
819,130 UART: [kat] SHA2-384
825,480 UART: [kat] SHA2-512-ACC
827,844 UART: [kat] ECC-384
3,111,808 UART: [kat] HMAC-384Kdf
3,124,113 UART: [kat] LMS
4,314,232 UART: [kat] --
4,317,825 UART: [cold-reset] ++
4,318,907 UART: [fht] Storing FHT @ 0x50003400
4,330,184 UART: [idev] ++
4,330,783 UART: [idev] CDI.KEYID = 6
4,331,692 UART: [idev] SUBJECT.KEYID = 7
4,332,935 UART: [idev] UDS.KEYID = 0
4,333,973 ready_for_fw is high
4,334,172 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,099 UART: [idev] Erasing UDS.KEYID = 0
7,620,447 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,874 UART: [idev] --
7,645,115 UART: [ldev] ++
7,645,687 UART: [ldev] CDI.KEYID = 6
7,646,657 UART: [ldev] SUBJECT.KEYID = 5
7,647,866 UART: [ldev] AUTHORITY.KEYID = 7
7,649,093 UART: [ldev] FE.KEYID = 1
7,662,975 UART: [ldev] Erasing FE.KEYID = 1
10,948,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,018 UART: [ldev] --
13,309,566 UART: [fwproc] Waiting for Commands...
13,311,987 UART: [fwproc] Received command 0x46574c44
13,314,241 UART: [fwproc] Received Image of size 113760 bytes
17,363,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,825,328 >>> mbox cmd response: success
17,829,073 UART: [afmc] ++
17,829,671 UART: [afmc] CDI.KEYID = 6
17,830,691 UART: [afmc] SUBJECT.KEYID = 7
17,831,848 UART: [afmc] AUTHORITY.KEYID = 5
21,143,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,196 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,610 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,390 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,830 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,028 UART: [afmc] --
23,509,027 UART: [cold-reset] --
23,512,243 UART: [state] Locking Datavault
23,517,814 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,570 UART: [state] Locking ICCM
23,520,853 UART: [exit] Launching FMC @ 0x40000130
23,529,257 UART:
23,529,529 UART: Running Caliptra FMC ...
23,530,639 UART:
23,530,804 UART: [state] CFI Enabled
23,538,805 UART: [fht] FMC Alias Private Key: 7
25,869,344 UART: [art] Extend RT PCRs Done
25,870,567 UART: [art] Lock RT PCRs Done
25,872,426 UART: [art] Populate DV Done
25,877,669 UART: [fht] FMC Alias Private Key: 7
25,879,201 UART: [art] Derive CDI
25,879,931 UART: [art] Store in in slot 0x4
25,922,806 UART: [art] Derive Key Pair
25,923,810 UART: [art] Store priv key in slot 0x5
29,166,222 UART: [art] Derive Key Pair - Done
29,179,165 UART: [art] Signing Cert with AUTHO
29,180,467 UART: RITY.KEYID = 7
31,459,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,392 UART: [art] PUB.X = E7B3E7F9413D166BEC56E202E2D2E8844E5BD2F70A9FCE49BC3776ED530B6A78C6F2E3AC6F826DAA0618B54416483586
31,468,662 UART: [art] PUB.Y = BB38C389FC8DD9366D91727959A38E2313163DCB712E6FB3F57D9174927B6FACBC5E7A0E61E2ED730741CF2154142169
31,475,861 UART: [art] SIG.R = 9BDA39C527D0BF489BCC6FD6E81C83F2E6C9E05070012925C0147D9CD0C99456E75BB058873E57DE5F1D84A0C5341723
31,483,225 UART: [art] SIG.S = E79EEE8DD8E3F89071657FB5C1D3332D4D13D674B7794597E3FE33596A6AED831B8D3D8DABA1768DB62C6B7B8A09A079
32,788,976 UART: Caliptra RT
32,789,676 UART: [state] CFI Enabled
32,907,983 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
4,131,606 ready_for_fw is high
4,132,008 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,516 >>> mbox cmd response: success
23,705,913 UART:
23,706,303 UART: Running Caliptra FMC ...
23,707,400 UART:
23,707,547 UART: [state] CFI Enabled
23,715,667 UART: [fht] FMC Alias Private Key: 7
26,045,771 UART: [art] Extend RT PCRs Done
26,047,000 UART: [art] Lock RT PCRs Done
26,048,611 UART: [art] Populate DV Done
26,053,721 UART: [fht] FMC Alias Private Key: 7
26,055,376 UART: [art] Derive CDI
26,056,190 UART: [art] Store in in slot 0x4
26,098,963 UART: [art] Derive Key Pair
26,100,005 UART: [art] Store priv key in slot 0x5
29,341,742 UART: [art] Derive Key Pair - Done
29,354,687 UART: [art] Signing Cert with AUTHO
29,356,001 UART: RITY.KEYID = 7
31,635,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,046 UART: [art] PUB.X = 0ACCCE03FAB03D37F3B5DFAA672C9237712C7DC18D8FCF7C0ECA40C0AA11925F9ADC7C3F0B382B7E848568DFB1239D63
31,644,294 UART: [art] PUB.Y = 30FA456C5423886963421A5C3C415B02B4C16787F5D76A8A7C9D4067066374879B27EEADD84ECC4342C0C6252CF8EFC4
31,651,522 UART: [art] SIG.R = 4033A4762C7A6BB8EA66227AAB86ECB3C42FC56D9C46E5F7C9002ECAC9E1D51792F2331F4EB5107E4FF048A9110C1AA5
31,658,961 UART: [art] SIG.S = 0CA070B509EABF8F26A8E729AA38E5C4D54CAA25B08E8ADB78A64CE02F7D12799BE574BF1BE4063287E388A1F681D6F1
32,964,947 UART: Caliptra RT
32,965,660 UART: [state] CFI Enabled
33,083,854 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,529 writing to cptra_bootfsm_go
193,590 UART:
193,967 UART: Running Caliptra ROM ...
195,165 UART:
195,330 UART: [state] CFI Enabled
265,754 UART: [state] LifecycleState = Unprovisioned
267,656 UART: [state] DebugLocked = No
269,615 UART: [state] WD Timer not started. Device not locked for debugging
274,156 UART: [kat] SHA2-256
453,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,884 UART: [kat] ++
465,437 UART: [kat] sha1
476,672 UART: [kat] SHA2-256
479,742 UART: [kat] SHA2-384
486,108 UART: [kat] SHA2-512-ACC
489,066 UART: [kat] ECC-384
2,949,560 UART: [kat] HMAC-384Kdf
2,973,809 UART: [kat] LMS
3,503,238 UART: [kat] --
3,507,869 UART: [cold-reset] ++
3,510,152 UART: [fht] FHT @ 0x50003400
3,521,634 UART: [idev] ++
3,522,234 UART: [idev] CDI.KEYID = 6
3,523,147 UART: [idev] SUBJECT.KEYID = 7
3,524,320 UART: [idev] UDS.KEYID = 0
3,525,245 ready_for_fw is high
3,525,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,786 UART: [idev] Erasing UDS.KEYID = 0
6,029,695 UART: [idev] Sha1 KeyId Algorithm
6,051,264 UART: [idev] --
6,054,989 UART: [ldev] ++
6,055,557 UART: [ldev] CDI.KEYID = 6
6,056,482 UART: [ldev] SUBJECT.KEYID = 5
6,057,645 UART: [ldev] AUTHORITY.KEYID = 7
6,058,876 UART: [ldev] FE.KEYID = 1
6,101,876 UART: [ldev] Erasing FE.KEYID = 1
8,603,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,892 UART: [ldev] --
10,395,201 UART: [fwproc] Wait for Commands...
10,397,520 UART: [fwproc] Recv command 0x46574c44
10,399,608 UART: [fwproc] Recv'd Img size: 114084 bytes
13,797,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,253,156 >>> mbox cmd response: success
14,257,456 UART: [afmc] ++
14,258,047 UART: [afmc] CDI.KEYID = 6
14,258,958 UART: [afmc] SUBJECT.KEYID = 7
14,260,121 UART: [afmc] AUTHORITY.KEYID = 5
16,787,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,530,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,546,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,562,115 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,585,082 UART: [afmc] --
18,588,096 UART: [cold-reset] --
18,592,178 UART: [state] Locking Datavault
18,597,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,598,685 UART: [state] Locking ICCM
18,600,077 UART: [exit] Launching FMC @ 0x40000130
18,608,487 UART:
18,608,723 UART: Running Caliptra FMC ...
18,609,818 UART:
18,609,976 UART: [state] CFI Enabled
18,669,266 UART: [fht] FMC Alias Private Key: 7
20,432,959 UART: [art] Extend RT PCRs Done
20,434,181 UART: [art] Lock RT PCRs Done
20,435,965 UART: [art] Populate DV Done
20,441,430 UART: [fht] FMC Alias Private Key: 7
20,443,125 UART: [art] Derive CDI
20,443,955 UART: [art] Store in in slot 0x4
20,501,443 UART: [art] Derive Key Pair
20,502,482 UART: [art] Store priv key in slot 0x5
22,965,307 UART: [art] Derive Key Pair - Done
22,978,472 UART: [art] Signing Cert with AUTHO
22,979,770 UART: RITY.KEYID = 7
24,690,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,456 UART: [art] PUB.X = C6A7EB4843697A8AE1D2AD0BAE36BB65342C0C6CAF90D4F727706B76A808D0836061B7E0BC830EDED2ABB4EFE47CDBDF
24,699,726 UART: [art] PUB.Y = 08A099701B209D03CC4CF693B65A96C0B6803AA952CD3FC166A192B32360950D60825D2FAC97F198648357636D99A44D
24,707,009 UART: [art] SIG.R = 1D4A3B78FCEA0F8986689FBF5B603FB4A998304A53CEEB01ADD2945915226DA675C5BE022538BE6DF89CA52CD8923DC5
24,714,379 UART: [art] SIG.S = 8FB9EF4EDD998D4D65DB08E61CFD473828D6F01028E32CAF7B40F7F9EE8770A9A8E2D15FB03487530557901F9428C0E2
25,693,461 UART: Caliptra RT
25,694,173 UART: [state] CFI Enabled
25,858,699 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,360,854 ready_for_fw is high
3,361,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,036,615 >>> mbox cmd response: success
18,328,412 UART:
18,329,248 UART: Running Caliptra FMC ...
18,330,372 UART:
18,330,528 UART: [state] CFI Enabled
18,395,569 UART: [fht] FMC Alias Private Key: 7
20,160,057 UART: [art] Extend RT PCRs Done
20,161,288 UART: [art] Lock RT PCRs Done
20,163,032 UART: [art] Populate DV Done
20,168,621 UART: [fht] FMC Alias Private Key: 7
20,170,203 UART: [art] Derive CDI
20,170,974 UART: [art] Store in in slot 0x4
20,228,117 UART: [art] Derive Key Pair
20,229,117 UART: [art] Store priv key in slot 0x5
22,692,619 UART: [art] Derive Key Pair - Done
22,705,458 UART: [art] Signing Cert with AUTHO
22,706,763 UART: RITY.KEYID = 7
24,417,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,419,129 UART: [art] PUB.X = 95151F1E79E3D9E88C457AB161D50242F5EA55DC1C9F96FC8945A02041E683E7DF8F2CB3448406D85AB5B7D90884DB03
24,426,401 UART: [art] PUB.Y = C5084F53E17ADD7857DE5F6CC2698AF1DDE67B8632D1CD1194C193C9AD138C0E61831A7ED7EA920AD717087A660C8DEC
24,433,699 UART: [art] SIG.R = C37A37B425ACDCCBFD7082E67B639C9730CCD6C49FB27F81A99BBC6C0EF67718594379B50C77BC136ACFCD9816B010F8
24,441,069 UART: [art] SIG.S = 0E6BFC20EEE3D7B27B7935ADE3A15F8D9135BBF81DB5B65DA39EEFCFDA78E35201BC18BE5F7B8B4409B6A132E1E82F8C
25,420,268 UART: Caliptra RT
25,420,972 UART: [state] CFI Enabled
25,585,233 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,908 writing to cptra_bootfsm_go
193,016 UART:
193,401 UART: Running Caliptra ROM ...
194,592 UART:
603,950 UART: [state] CFI Enabled
620,965 UART: [state] LifecycleState = Unprovisioned
622,876 UART: [state] DebugLocked = No
624,626 UART: [state] WD Timer not started. Device not locked for debugging
628,179 UART: [kat] SHA2-256
807,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,885 UART: [kat] ++
819,428 UART: [kat] sha1
829,602 UART: [kat] SHA2-256
832,692 UART: [kat] SHA2-384
838,119 UART: [kat] SHA2-512-ACC
841,127 UART: [kat] ECC-384
3,282,890 UART: [kat] HMAC-384Kdf
3,294,504 UART: [kat] LMS
3,824,044 UART: [kat] --
3,828,400 UART: [cold-reset] ++
3,830,262 UART: [fht] FHT @ 0x50003400
3,840,459 UART: [idev] ++
3,841,025 UART: [idev] CDI.KEYID = 6
3,841,942 UART: [idev] SUBJECT.KEYID = 7
3,843,117 UART: [idev] UDS.KEYID = 0
3,844,185 ready_for_fw is high
3,844,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,673 UART: [idev] Erasing UDS.KEYID = 0
6,309,755 UART: [idev] Sha1 KeyId Algorithm
6,333,472 UART: [idev] --
6,336,770 UART: [ldev] ++
6,337,344 UART: [ldev] CDI.KEYID = 6
6,338,258 UART: [ldev] SUBJECT.KEYID = 5
6,339,418 UART: [ldev] AUTHORITY.KEYID = 7
6,340,645 UART: [ldev] FE.KEYID = 1
6,350,915 UART: [ldev] Erasing FE.KEYID = 1
8,825,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,427 UART: [ldev] --
10,613,426 UART: [fwproc] Wait for Commands...
10,616,480 UART: [fwproc] Recv command 0x46574c44
10,618,582 UART: [fwproc] Recv'd Img size: 114084 bytes
14,013,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,089,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,158,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,987 >>> mbox cmd response: success
14,480,936 UART: [afmc] ++
14,481,531 UART: [afmc] CDI.KEYID = 6
14,482,420 UART: [afmc] SUBJECT.KEYID = 7
14,483,582 UART: [afmc] AUTHORITY.KEYID = 5
16,980,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,700,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,717,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,733,930 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,749,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,059 UART: [afmc] --
18,775,453 UART: [cold-reset] --
18,777,571 UART: [state] Locking Datavault
18,782,663 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,371 UART: [state] Locking ICCM
18,786,845 UART: [exit] Launching FMC @ 0x40000130
18,795,302 UART:
18,795,539 UART: Running Caliptra FMC ...
18,796,644 UART:
18,796,803 UART: [state] CFI Enabled
18,804,800 UART: [fht] FMC Alias Private Key: 7
20,561,687 UART: [art] Extend RT PCRs Done
20,562,912 UART: [art] Lock RT PCRs Done
20,564,408 UART: [art] Populate DV Done
20,569,787 UART: [fht] FMC Alias Private Key: 7
20,571,391 UART: [art] Derive CDI
20,572,211 UART: [art] Store in in slot 0x4
20,615,037 UART: [art] Derive Key Pair
20,616,072 UART: [art] Store priv key in slot 0x5
23,043,040 UART: [art] Derive Key Pair - Done
23,056,472 UART: [art] Signing Cert with AUTHO
23,057,784 UART: RITY.KEYID = 7
24,763,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,764,788 UART: [art] PUB.X = FBE408F54C9FA3BA7690BF9E0CDD0F52F9ED0DD3C97204281A5D748DFC72BA85042E2E795BD0CD1D3CE7C06084198349
24,772,117 UART: [art] PUB.Y = 1839C9424983B259169B1EE9CC5CD1A015BFEA0EC00FAB34A4888237FB06D61BCDC0CE240B705854A799E6F7B93A59B5
24,779,415 UART: [art] SIG.R = 83D417726B58446A50C6CF1149F9121E8CAE09BF93B71680E804DAE550F7650509C288839415D43E967186560FFCD3A4
24,786,746 UART: [art] SIG.S = E57C89418BF2E81D88CACFA856D0E70B559101DA78FFA87E03C1A55E14F6EE426AC45D38A6FCF539A126193943DAEAFF
25,765,471 UART: Caliptra RT
25,766,177 UART: [state] CFI Enabled
25,883,061 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
3,697,285 ready_for_fw is high
3,697,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,263,116 >>> mbox cmd response: success
18,507,253 UART:
18,507,654 UART: Running Caliptra FMC ...
18,508,859 UART:
18,509,030 UART: [state] CFI Enabled
18,516,384 UART: [fht] FMC Alias Private Key: 7
20,273,094 UART: [art] Extend RT PCRs Done
20,274,318 UART: [art] Lock RT PCRs Done
20,275,896 UART: [art] Populate DV Done
20,281,257 UART: [fht] FMC Alias Private Key: 7
20,282,909 UART: [art] Derive CDI
20,283,749 UART: [art] Store in in slot 0x4
20,326,190 UART: [art] Derive Key Pair
20,327,227 UART: [art] Store priv key in slot 0x5
22,753,500 UART: [art] Derive Key Pair - Done
22,766,763 UART: [art] Signing Cert with AUTHO
22,768,077 UART: RITY.KEYID = 7
24,473,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,825 UART: [art] PUB.X = A6DF32CFE74EFEF29F53EE807E4F45F08092BDE4070CC8A64236E7DAAE89115B4FE08B7BA1E5A2346BDC0C9006312CFA
24,482,219 UART: [art] PUB.Y = 68D9D56A46ADACEB6A9352402BA4391D3008BC18B4213F9D00419F7F2AEA63FEF779EFC250248D533531C3DAF7A54E10
24,489,417 UART: [art] SIG.R = 49495FB7F23B163EB895681048B7E8603E6C193A34930B1B41DCFDAE01210840A138C14646A77F723AC5897F7A57572E
24,496,791 UART: [art] SIG.S = A0D8A7C625A8D4BC64910C9977B92C76D644456F8C3B170E630A1EAC65206FF3A34C9931CDF4FDAAE12ED9C7809EA47E
25,475,249 UART: Caliptra RT
25,475,967 UART: [state] CFI Enabled
25,594,597 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,540 writing to cptra_bootfsm_go
193,776 UART:
194,150 UART: Running Caliptra ROM ...
195,357 UART:
195,511 UART: [state] CFI Enabled
263,838 UART: [state] LifecycleState = Unprovisioned
266,283 UART: [state] DebugLocked = No
268,241 UART: [state] WD Timer not started. Device not locked for debugging
273,427 UART: [kat] SHA2-256
463,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,084 UART: [kat] ++
474,537 UART: [kat] sha1
485,218 UART: [kat] SHA2-256
488,204 UART: [kat] SHA2-384
493,492 UART: [kat] SHA2-512-ACC
496,075 UART: [kat] ECC-384
2,947,805 UART: [kat] HMAC-384Kdf
2,972,627 UART: [kat] LMS
3,504,420 UART: [kat] --
3,508,831 UART: [cold-reset] ++
3,511,110 UART: [fht] FHT @ 0x50003400
3,523,593 UART: [idev] ++
3,524,265 UART: [idev] CDI.KEYID = 6
3,525,300 UART: [idev] SUBJECT.KEYID = 7
3,526,413 UART: [idev] UDS.KEYID = 0
3,527,347 ready_for_fw is high
3,527,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,879 UART: [idev] Erasing UDS.KEYID = 0
6,026,866 UART: [idev] Sha1 KeyId Algorithm
6,047,731 UART: [idev] --
6,052,377 UART: [ldev] ++
6,053,054 UART: [ldev] CDI.KEYID = 6
6,053,972 UART: [ldev] SUBJECT.KEYID = 5
6,055,186 UART: [ldev] AUTHORITY.KEYID = 7
6,056,367 UART: [ldev] FE.KEYID = 1
6,101,038 UART: [ldev] Erasing FE.KEYID = 1
8,606,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,019 UART: [ldev] --
10,414,084 UART: [fwproc] Wait for Commands...
10,416,184 UART: [fwproc] Recv command 0x46574c44
10,418,438 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,495 >>> mbox cmd response: success
14,602,068 UART: [afmc] ++
14,602,787 UART: [afmc] CDI.KEYID = 6
14,604,033 UART: [afmc] SUBJECT.KEYID = 7
14,605,480 UART: [afmc] AUTHORITY.KEYID = 5
17,145,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,886,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,888,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,903,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,918,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,933,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,034 UART: [afmc] --
18,962,060 UART: [cold-reset] --
18,967,817 UART: [state] Locking Datavault
18,972,228 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,387 UART: [state] Locking ICCM
18,977,137 UART: [exit] Launching FMC @ 0x40000130
18,985,770 UART:
18,986,007 UART: Running Caliptra FMC ...
18,987,114 UART:
18,987,274 UART: [state] CFI Enabled
19,045,148 UART: [fht] FMC Alias Private Key: 7
20,809,311 UART: [art] Extend RT PCRs Done
20,810,516 UART: [art] Lock RT PCRs Done
20,812,143 UART: [art] Populate DV Done
20,817,768 UART: [fht] FMC Alias Private Key: 7
20,819,479 UART: [art] Derive CDI
20,820,294 UART: [art] Store in in slot 0x4
20,877,873 UART: [art] Derive Key Pair
20,878,868 UART: [art] Store priv key in slot 0x5
23,342,055 UART: [art] Derive Key Pair - Done
23,355,332 UART: [art] Signing Cert with AUTHO
23,356,632 UART: RITY.KEYID = 7
25,067,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,415 UART: [art] PUB.X = CECBFFBBECC94DEB75C8E98B274224C315E96A7BA0FB3EADE3A0DEE93C102C0CF566BB6EA4A8A01717E30C21B3716F86
25,076,692 UART: [art] PUB.Y = AD06E84CABC28A6F4A15BF7642F5A2D1E25CA98460DF8B223AC0ADBDC88D2BE62608180B37B7C0DB7EFEEB33D08EB766
25,084,004 UART: [art] SIG.R = C6D776191F8B2B71623204F15263FD4749726787D2B99D085762D8C87D7F1D507B537C299EF7452EC2A576988D044D37
25,091,378 UART: [art] SIG.S = 5E2F24196BF89D6563908C19A7C65193572F42D7126C411768AD53F5678181940BF401807F6382E1CF7316BAEEC6A369
26,069,933 UART: Caliptra RT
26,070,632 UART: [state] CFI Enabled
26,236,197 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,439,718 ready_for_fw is high
3,440,125 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,726,128 >>> mbox cmd response: success
19,021,996 UART:
19,022,417 UART: Running Caliptra FMC ...
19,023,541 UART:
19,023,695 UART: [state] CFI Enabled
19,092,072 UART: [fht] FMC Alias Private Key: 7
20,856,045 UART: [art] Extend RT PCRs Done
20,857,293 UART: [art] Lock RT PCRs Done
20,858,787 UART: [art] Populate DV Done
20,864,162 UART: [fht] FMC Alias Private Key: 7
20,865,868 UART: [art] Derive CDI
20,866,682 UART: [art] Store in in slot 0x4
20,925,121 UART: [art] Derive Key Pair
20,926,117 UART: [art] Store priv key in slot 0x5
23,389,212 UART: [art] Derive Key Pair - Done
23,401,945 UART: [art] Signing Cert with AUTHO
23,403,246 UART: RITY.KEYID = 7
25,115,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,804 UART: [art] PUB.X = FCD40B696045D2701AB052C47825CB0F565FB001460EBFD8486A495009B643F3222C11FD2777FB3BF71CE16B2A2005B5
25,124,043 UART: [art] PUB.Y = 21CE489553C91753B67C3E9A5C7F34B045A31F1F24E55629BE5F0CC45ECDB22D9206483F4E3ED30CD7C5C2CFBD4C8DAD
25,131,293 UART: [art] SIG.R = D4BAF7C763CC53857A31E7F848316684708050ECF36AF1F647DA9EAE7529B263000C337FCAF17C40491FA022C56C491B
25,138,676 UART: [art] SIG.S = 9008E39874D9C163ED9E84585C2176921FA4E4A4D41BD1844CF6F65299C4D2022E93D6FD44B555C677B4D3FD33094D77
26,117,541 UART: Caliptra RT
26,118,271 UART: [state] CFI Enabled
26,283,229 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,787 writing to cptra_bootfsm_go
193,005 UART:
193,395 UART: Running Caliptra ROM ...
194,501 UART:
604,370 UART: [state] CFI Enabled
617,893 UART: [state] LifecycleState = Unprovisioned
620,270 UART: [state] DebugLocked = No
622,711 UART: [state] WD Timer not started. Device not locked for debugging
626,526 UART: [kat] SHA2-256
816,225 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,981 UART: [kat] ++
827,529 UART: [kat] sha1
840,177 UART: [kat] SHA2-256
843,195 UART: [kat] SHA2-384
850,040 UART: [kat] SHA2-512-ACC
852,630 UART: [kat] ECC-384
3,297,604 UART: [kat] HMAC-384Kdf
3,311,039 UART: [kat] LMS
3,842,845 UART: [kat] --
3,847,633 UART: [cold-reset] ++
3,850,231 UART: [fht] FHT @ 0x50003400
3,862,070 UART: [idev] ++
3,862,712 UART: [idev] CDI.KEYID = 6
3,863,700 UART: [idev] SUBJECT.KEYID = 7
3,864,875 UART: [idev] UDS.KEYID = 0
3,865,800 ready_for_fw is high
3,865,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,009,294 UART: [idev] Erasing UDS.KEYID = 0
6,341,585 UART: [idev] Sha1 KeyId Algorithm
6,363,674 UART: [idev] --
6,368,857 UART: [ldev] ++
6,369,541 UART: [ldev] CDI.KEYID = 6
6,370,505 UART: [ldev] SUBJECT.KEYID = 5
6,371,660 UART: [ldev] AUTHORITY.KEYID = 7
6,372,898 UART: [ldev] FE.KEYID = 1
6,384,890 UART: [ldev] Erasing FE.KEYID = 1
8,859,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,037 UART: [ldev] --
10,649,416 UART: [fwproc] Wait for Commands...
10,651,246 UART: [fwproc] Recv command 0x46574c44
10,653,513 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,208 >>> mbox cmd response: success
14,842,311 UART: [afmc] ++
14,843,025 UART: [afmc] CDI.KEYID = 6
14,844,285 UART: [afmc] SUBJECT.KEYID = 7
14,845,731 UART: [afmc] AUTHORITY.KEYID = 5
17,348,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,634 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,424 UART: [afmc] --
19,144,276 UART: [cold-reset] --
19,147,934 UART: [state] Locking Datavault
19,152,719 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,871 UART: [state] Locking ICCM
19,157,462 UART: [exit] Launching FMC @ 0x40000130
19,166,144 UART:
19,166,382 UART: Running Caliptra FMC ...
19,167,487 UART:
19,167,646 UART: [state] CFI Enabled
19,175,263 UART: [fht] FMC Alias Private Key: 7
20,931,482 UART: [art] Extend RT PCRs Done
20,932,698 UART: [art] Lock RT PCRs Done
20,934,461 UART: [art] Populate DV Done
20,939,924 UART: [fht] FMC Alias Private Key: 7
20,941,679 UART: [art] Derive CDI
20,942,437 UART: [art] Store in in slot 0x4
20,984,873 UART: [art] Derive Key Pair
20,985,915 UART: [art] Store priv key in slot 0x5
23,412,474 UART: [art] Derive Key Pair - Done
23,425,416 UART: [art] Signing Cert with AUTHO
23,426,728 UART: RITY.KEYID = 7
25,132,627 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,134 UART: [art] PUB.X = 2A95E37792D262EF544C70D918487AC3F4BCF447E7537E1FADA407EBE56944CB55DC33ECE9A55E7F878D56D417F7FEC3
25,141,410 UART: [art] PUB.Y = 6A0B25AFE566E6E31FB730646E1A66CAB0CA153B252CD4FF4FF25DF86205A5119A3DF92439532E2D192189FE0618779C
25,148,681 UART: [art] SIG.R = 08FF4C7B255D3288FECC612D11869B344DEA9B2C8F25902248B06AF29AAFA6A358273D9FD54D55002470E711AB1EE568
25,156,050 UART: [art] SIG.S = B5240DA6D1EF3094D6C757C645D3E13F934D5DE1D69499EFA70D303B22D735CBFB6925BE728FB9DDB31386C038DCD703
26,135,315 UART: Caliptra RT
26,136,022 UART: [state] CFI Enabled
26,253,584 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
3,755,468 ready_for_fw is high
3,755,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,948,808 >>> mbox cmd response: success
19,203,272 UART:
19,203,673 UART: Running Caliptra FMC ...
19,204,872 UART:
19,205,043 UART: [state] CFI Enabled
19,213,110 UART: [fht] FMC Alias Private Key: 7
20,970,050 UART: [art] Extend RT PCRs Done
20,971,266 UART: [art] Lock RT PCRs Done
20,972,792 UART: [art] Populate DV Done
20,978,365 UART: [fht] FMC Alias Private Key: 7
20,980,017 UART: [art] Derive CDI
20,980,837 UART: [art] Store in in slot 0x4
21,023,106 UART: [art] Derive Key Pair
21,024,180 UART: [art] Store priv key in slot 0x5
23,450,772 UART: [art] Derive Key Pair - Done
23,463,765 UART: [art] Signing Cert with AUTHO
23,465,078 UART: RITY.KEYID = 7
25,170,480 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,983 UART: [art] PUB.X = 6CDDAB09665AD67F14D3978FC8A1A4A3D24C04E22F1D2E9F657F601DB83A8D8C6FE3110BAC7384223A88F48B02FB4469
25,179,234 UART: [art] PUB.Y = 199B9BD68213D661857E03E7BF33D3D4D84F5969F50C75CD45902D92B6D404A9A03FF7C9E60EC7B0EFC9337D47069845
25,186,443 UART: [art] SIG.R = AEF269EA800C2F3405CC83F82418F132141DE8B881DD7A3C092A3C366865C384B8F1A4AF56003E36AD9905FA35C8F8FF
25,193,833 UART: [art] SIG.S = 7AC2EAB5AFF1633D1A611CCEB692C722F7B73393D88E46469FBAF4ECDB97DD9E1CBBF0585920F457B47661858F891B6D
26,172,565 UART: Caliptra RT
26,173,556 UART: [state] CFI Enabled
26,291,094 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,950 UART: [kat] HMAC-384Kdf
907,506 UART: [kat] LMS
1,475,702 UART: [kat] --
1,476,423 UART: [cold-reset] ++
1,476,911 UART: [fht] Storing FHT @ 0x50003400
1,479,686 UART: [idev] ++
1,479,854 UART: [idev] CDI.KEYID = 6
1,480,214 UART: [idev] SUBJECT.KEYID = 7
1,480,638 UART: [idev] UDS.KEYID = 0
1,480,983 ready_for_fw is high
1,480,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,826 UART: [idev] Erasing UDS.KEYID = 0
1,505,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,134 UART: [idev] --
1,515,281 UART: [ldev] ++
1,515,449 UART: [ldev] CDI.KEYID = 6
1,515,812 UART: [ldev] SUBJECT.KEYID = 5
1,516,238 UART: [ldev] AUTHORITY.KEYID = 7
1,516,701 UART: [ldev] FE.KEYID = 1
1,521,897 UART: [ldev] Erasing FE.KEYID = 1
1,547,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,484 UART: [ldev] --
1,586,861 UART: [fwproc] Waiting for Commands...
1,587,700 UART: [fwproc] Received command 0x46574c44
1,588,491 UART: [fwproc] Received Image of size 114084 bytes
2,883,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,926 >>> mbox cmd response: success
3,076,988 UART: [afmc] ++
3,077,156 UART: [afmc] CDI.KEYID = 6
3,077,518 UART: [afmc] SUBJECT.KEYID = 7
3,077,943 UART: [afmc] AUTHORITY.KEYID = 5
3,113,160 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,767 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,457 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,142 UART: [afmc] --
3,156,038 UART: [cold-reset] --
3,156,958 UART: [state] Locking Datavault
3,158,011 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,615 UART: [state] Locking ICCM
3,159,145 UART: [exit] Launching FMC @ 0x40000130
3,164,474 UART:
3,164,490 UART: Running Caliptra FMC ...
3,164,898 UART:
3,164,952 UART: [state] CFI Enabled
3,175,471 UART: [fht] FMC Alias Private Key: 7
3,283,824 UART: [art] Extend RT PCRs Done
3,284,252 UART: [art] Lock RT PCRs Done
3,285,304 UART: [art] Populate DV Done
3,293,635 UART: [fht] FMC Alias Private Key: 7
3,294,817 UART: [art] Derive CDI
3,295,097 UART: [art] Store in in slot 0x4
3,381,242 UART: [art] Derive Key Pair
3,381,602 UART: [art] Store priv key in slot 0x5
3,394,322 UART: [art] Derive Key Pair - Done
3,409,187 UART: [art] Signing Cert with AUTHO
3,409,667 UART: RITY.KEYID = 7
3,425,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,114 UART: [art] PUB.X = CE88F26456452032E36F1F39F78AD43C90B6B0738527C2CA7DAB6B149F1F92546D390BF240714D14B495BB0E5DD8A22D
3,432,882 UART: [art] PUB.Y = 10B83215A1A5D1BC33814831019957A02CE5DDF9290DB1DC69F2951EFB7E0A1E9B09195891CDB676AB59CC416618B377
3,439,822 UART: [art] SIG.R = 98B935F5BFB2068CB656D47D3C8718AA75D743B732ED5D30E8D2AB02BFDA28A2F49E9BDCA74E3D8BD823271C266DFB98
3,446,604 UART: [art] SIG.S = A6BB8A0CB63BAF09400B58C1718275966431A25ADDF24EC9828421848446B25B65A2E2ED29DC5343BB8CE078F05232D7
3,470,010 UART: Caliptra RT
3,470,263 UART: [state] CFI Enabled
3,578,707 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,369 ready_for_fw is high
1,362,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,526 >>> mbox cmd response: success
2,985,758 UART:
2,985,774 UART: Running Caliptra FMC ...
2,986,182 UART:
2,986,236 UART: [state] CFI Enabled
2,996,651 UART: [fht] FMC Alias Private Key: 7
3,104,388 UART: [art] Extend RT PCRs Done
3,104,816 UART: [art] Lock RT PCRs Done
3,106,436 UART: [art] Populate DV Done
3,114,601 UART: [fht] FMC Alias Private Key: 7
3,115,767 UART: [art] Derive CDI
3,116,047 UART: [art] Store in in slot 0x4
3,201,728 UART: [art] Derive Key Pair
3,202,088 UART: [art] Store priv key in slot 0x5
3,215,118 UART: [art] Derive Key Pair - Done
3,229,991 UART: [art] Signing Cert with AUTHO
3,230,471 UART: RITY.KEYID = 7
3,245,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,178 UART: [art] PUB.X = 6D44869A25167FD14BA262466387C16E294B1373151F43F84651F7DE28DB1612E9F6E160B9BB082701821BB8D73B2986
3,252,932 UART: [art] PUB.Y = 5279A06D60DCCC68DC4B20F530C60C85F87302BFBB27A5A900E7475620E2CB8B85D77F1E16788B7F7EFBFEA13F719C8B
3,259,868 UART: [art] SIG.R = 1D25EFEDEEF9F2783A851DF7B9249E970D7AFADF18E7E65D1465F6FB8ABDD8BB2F5A7B8C50A3E79B8DC68472C4214659
3,266,657 UART: [art] SIG.S = CFFA0825F53FE446D9E917E39AEB0E988D9F98AE7EE5509398FDFEA7C39A6A3D8448AA2459D75DA706B5BB4E9ED4E725
3,290,519 UART: Caliptra RT
3,290,772 UART: [state] CFI Enabled
3,400,045 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,732 UART: [kat] SHA2-256
892,670 UART: [kat] SHA2-384
895,561 UART: [kat] SHA2-512-ACC
897,462 UART: [kat] ECC-384
903,077 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 ready_for_fw is high
1,481,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,644 UART: [ldev] ++
1,514,812 UART: [ldev] CDI.KEYID = 6
1,515,175 UART: [ldev] SUBJECT.KEYID = 5
1,515,601 UART: [ldev] AUTHORITY.KEYID = 7
1,516,064 UART: [ldev] FE.KEYID = 1
1,521,122 UART: [ldev] Erasing FE.KEYID = 1
1,547,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,065 UART: [ldev] --
1,586,416 UART: [fwproc] Waiting for Commands...
1,587,131 UART: [fwproc] Received command 0x46574c44
1,587,922 UART: [fwproc] Received Image of size 114084 bytes
2,882,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,129 >>> mbox cmd response: success
3,076,195 UART: [afmc] ++
3,076,363 UART: [afmc] CDI.KEYID = 6
3,076,725 UART: [afmc] SUBJECT.KEYID = 7
3,077,150 UART: [afmc] AUTHORITY.KEYID = 5
3,112,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,683 UART: [afmc] --
3,155,771 UART: [cold-reset] --
3,156,521 UART: [state] Locking Datavault
3,157,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,320 UART: [state] Locking ICCM
3,158,898 UART: [exit] Launching FMC @ 0x40000130
3,164,227 UART:
3,164,243 UART: Running Caliptra FMC ...
3,164,651 UART:
3,164,794 UART: [state] CFI Enabled
3,175,541 UART: [fht] FMC Alias Private Key: 7
3,284,454 UART: [art] Extend RT PCRs Done
3,284,882 UART: [art] Lock RT PCRs Done
3,286,326 UART: [art] Populate DV Done
3,294,561 UART: [fht] FMC Alias Private Key: 7
3,295,741 UART: [art] Derive CDI
3,296,021 UART: [art] Store in in slot 0x4
3,382,220 UART: [art] Derive Key Pair
3,382,580 UART: [art] Store priv key in slot 0x5
3,395,912 UART: [art] Derive Key Pair - Done
3,410,544 UART: [art] Signing Cert with AUTHO
3,411,024 UART: RITY.KEYID = 7
3,426,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,883 UART: [art] PUB.X = 14F7703AF0D246DB819D228D92207D36DFAFBACEF682566FD7871CB6A06EB0A2FD2B29D92E99933386E9FE1EAE499F07
3,433,664 UART: [art] PUB.Y = BDAB3CFA1D589B69293AEFD5D6E55BDDC0DF0DB46DCC3474E8AAC77BFBC58E30027BA33D57DA22A774A6E730FE5372F9
3,440,638 UART: [art] SIG.R = 9E394B09B0A6C6AC614896D4ECA9CE7FC520C7481C453639056AD853652627A338B860F845598C64B7F1D3444DA6ECF1
3,447,402 UART: [art] SIG.S = 0513563C49104EB077BAE2E6BA2E7EFF2432E2D3AEF0599BF5719F5482FB85F4966AE548ED422EA21C559546C768BB41
3,471,570 UART: Caliptra RT
3,471,915 UART: [state] CFI Enabled
3,580,836 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,346 ready_for_fw is high
1,363,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,109 >>> mbox cmd response: success
2,987,553 UART:
2,987,569 UART: Running Caliptra FMC ...
2,987,977 UART:
2,988,120 UART: [state] CFI Enabled
2,998,833 UART: [fht] FMC Alias Private Key: 7
3,106,634 UART: [art] Extend RT PCRs Done
3,107,062 UART: [art] Lock RT PCRs Done
3,108,566 UART: [art] Populate DV Done
3,116,613 UART: [fht] FMC Alias Private Key: 7
3,117,613 UART: [art] Derive CDI
3,117,893 UART: [art] Store in in slot 0x4
3,203,944 UART: [art] Derive Key Pair
3,204,304 UART: [art] Store priv key in slot 0x5
3,218,102 UART: [art] Derive Key Pair - Done
3,232,710 UART: [art] Signing Cert with AUTHO
3,233,190 UART: RITY.KEYID = 7
3,248,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,183 UART: [art] PUB.X = 36E2568E0FFD834CF204AD2605C0A2032546E59EC3A67A49511197433925C8348F9643B523011916B883127FA152CF56
3,255,924 UART: [art] PUB.Y = 692C55D040BEB741C36F8F080DD4711ED7D6338DA6C7FF9250E57A9CD7182BEB4689E3762EFB3E41E129B31D3BA4030E
3,262,872 UART: [art] SIG.R = EFFB76094795964E6AECB565A0843835348D4C35D92337289CEE7D579E631477787859CF73CFCFD2ABE2289C2E7CD365
3,269,641 UART: [art] SIG.S = 298AFFA83C7E0D701BAF6C6E7CEFDC76187CC2D6304897C341066A08283D9C95E6279580CE6DCDDD4E5024EE6B89BC24
3,293,603 UART: Caliptra RT
3,293,948 UART: [state] CFI Enabled
3,402,395 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,724 UART: [kat] SHA2-512-ACC
908,625 UART: [kat] ECC-384
918,662 UART: [kat] HMAC-384Kdf
923,200 UART: [kat] LMS
1,171,528 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,849 UART: [fht] FHT @ 0x50003400
1,175,526 UART: [idev] ++
1,175,694 UART: [idev] CDI.KEYID = 6
1,176,054 UART: [idev] SUBJECT.KEYID = 7
1,176,478 UART: [idev] UDS.KEYID = 0
1,176,823 ready_for_fw is high
1,176,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,570 UART: [idev] Erasing UDS.KEYID = 0
1,201,679 UART: [idev] Sha1 KeyId Algorithm
1,210,073 UART: [idev] --
1,211,063 UART: [ldev] ++
1,211,231 UART: [ldev] CDI.KEYID = 6
1,211,594 UART: [ldev] SUBJECT.KEYID = 5
1,212,020 UART: [ldev] AUTHORITY.KEYID = 7
1,212,483 UART: [ldev] FE.KEYID = 1
1,217,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,365 >>> mbox cmd response: success
2,772,419 UART: [afmc] ++
2,772,587 UART: [afmc] CDI.KEYID = 6
2,772,949 UART: [afmc] SUBJECT.KEYID = 7
2,773,374 UART: [afmc] AUTHORITY.KEYID = 5
2,808,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,248 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,526 UART: [afmc] --
2,851,600 UART: [cold-reset] --
2,852,332 UART: [state] Locking Datavault
2,853,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,167 UART: [state] Locking ICCM
2,854,631 UART: [exit] Launching FMC @ 0x40000130
2,859,960 UART:
2,859,976 UART: Running Caliptra FMC ...
2,860,384 UART:
2,860,438 UART: [state] CFI Enabled
2,870,755 UART: [fht] FMC Alias Private Key: 7
2,978,870 UART: [art] Extend RT PCRs Done
2,979,298 UART: [art] Lock RT PCRs Done
2,980,812 UART: [art] Populate DV Done
2,989,031 UART: [fht] FMC Alias Private Key: 7
2,990,037 UART: [art] Derive CDI
2,990,317 UART: [art] Store in in slot 0x4
3,075,834 UART: [art] Derive Key Pair
3,076,194 UART: [art] Store priv key in slot 0x5
3,089,444 UART: [art] Derive Key Pair - Done
3,104,198 UART: [art] Signing Cert with AUTHO
3,104,678 UART: RITY.KEYID = 7
3,119,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,381 UART: [art] PUB.X = BE3AB1EB9F6298133CB335DBA305B5D1F7D4DAE639D9F2E2AA012B52772DBD433C6BB9EBDD5C300CEE7062D04D144536
3,127,162 UART: [art] PUB.Y = 9C73AA5FB692BE6551DA7E8EF6B3343DFBD40D27ADE74F0CA1E726ED779C11AAA90DBB7C536C9797931BD3378A53C1D4
3,134,123 UART: [art] SIG.R = 97F9884CE5D9467CAFE9563169E796B3805A38E3D5F1123A9FC47924DF1DFC3B19A47A973B9F4CB6755AB1F300FFD42E
3,140,881 UART: [art] SIG.S = 7E8C30F57F6655C9EB2930A9CFB2FADE245B14AA36AE5CFB51D6516EF43310FDADDA7A07C0AAA6519846AF9EDA322D2D
3,165,435 UART: Caliptra RT
3,165,688 UART: [state] CFI Enabled
3,273,345 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,553 ready_for_fw is high
1,059,553 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,632 >>> mbox cmd response: success
2,683,752 UART:
2,683,768 UART: Running Caliptra FMC ...
2,684,176 UART:
2,684,230 UART: [state] CFI Enabled
2,694,991 UART: [fht] FMC Alias Private Key: 7
2,802,954 UART: [art] Extend RT PCRs Done
2,803,382 UART: [art] Lock RT PCRs Done
2,804,730 UART: [art] Populate DV Done
2,812,761 UART: [fht] FMC Alias Private Key: 7
2,813,855 UART: [art] Derive CDI
2,814,135 UART: [art] Store in in slot 0x4
2,899,604 UART: [art] Derive Key Pair
2,899,964 UART: [art] Store priv key in slot 0x5
2,913,102 UART: [art] Derive Key Pair - Done
2,927,980 UART: [art] Signing Cert with AUTHO
2,928,460 UART: RITY.KEYID = 7
2,944,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,953 UART: [art] PUB.X = E02271F296FEB9A1FE80F0E5896399726EB615F72694C16C192D81210A92C58CB9F62BEFD6263C7C1034AC187C5C23E8
2,951,722 UART: [art] PUB.Y = 70DA400E801975B7E96E77E9D97F3AC656268222CD410F84AD5FEA69D5CC63C73E1B0230B088F1CAC4777DB681611DB3
2,958,669 UART: [art] SIG.R = D9AB00E1741390E5997DB204558C6F2BA5038751135E65E6D07DF45CA4C3D4CDBA38489DC4D4108088DCE1ACC0C657B2
2,965,419 UART: [art] SIG.S = 225CF52E9DA5E562D30E31A631026CD94D0C7E62CC642AE31429D408D005D8A62E79302B39955F1F36CC3A9EF98DF949
2,989,613 UART: Caliptra RT
2,989,866 UART: [state] CFI Enabled
3,097,537 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
893,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,342 UART: [kat] ++
897,494 UART: [kat] sha1
901,678 UART: [kat] SHA2-256
903,618 UART: [kat] SHA2-384
906,473 UART: [kat] SHA2-512-ACC
908,374 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,822 UART: [fht] FHT @ 0x50003400
1,175,369 UART: [idev] ++
1,175,537 UART: [idev] CDI.KEYID = 6
1,175,897 UART: [idev] SUBJECT.KEYID = 7
1,176,321 UART: [idev] UDS.KEYID = 0
1,176,666 ready_for_fw is high
1,176,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,059 UART: [idev] Erasing UDS.KEYID = 0
1,201,194 UART: [idev] Sha1 KeyId Algorithm
1,209,556 UART: [idev] --
1,210,796 UART: [ldev] ++
1,210,964 UART: [ldev] CDI.KEYID = 6
1,211,327 UART: [ldev] SUBJECT.KEYID = 5
1,211,753 UART: [ldev] AUTHORITY.KEYID = 7
1,212,216 UART: [ldev] FE.KEYID = 1
1,217,450 UART: [ldev] Erasing FE.KEYID = 1
1,243,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,900 UART: [ldev] --
1,283,355 UART: [fwproc] Wait for Commands...
1,284,067 UART: [fwproc] Recv command 0x46574c44
1,284,795 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,818 >>> mbox cmd response: success
2,773,998 UART: [afmc] ++
2,774,166 UART: [afmc] CDI.KEYID = 6
2,774,528 UART: [afmc] SUBJECT.KEYID = 7
2,774,953 UART: [afmc] AUTHORITY.KEYID = 5
2,810,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,861 UART: [afmc] --
2,853,993 UART: [cold-reset] --
2,854,913 UART: [state] Locking Datavault
2,856,482 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,086 UART: [state] Locking ICCM
2,857,706 UART: [exit] Launching FMC @ 0x40000130
2,863,035 UART:
2,863,051 UART: Running Caliptra FMC ...
2,863,459 UART:
2,863,602 UART: [state] CFI Enabled
2,874,143 UART: [fht] FMC Alias Private Key: 7
2,982,266 UART: [art] Extend RT PCRs Done
2,982,694 UART: [art] Lock RT PCRs Done
2,984,354 UART: [art] Populate DV Done
2,992,719 UART: [fht] FMC Alias Private Key: 7
2,993,711 UART: [art] Derive CDI
2,993,991 UART: [art] Store in in slot 0x4
3,079,664 UART: [art] Derive Key Pair
3,080,024 UART: [art] Store priv key in slot 0x5
3,093,558 UART: [art] Derive Key Pair - Done
3,108,262 UART: [art] Signing Cert with AUTHO
3,108,742 UART: RITY.KEYID = 7
3,123,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,615 UART: [art] PUB.X = F568D1B410DBE4CD2D32597D034D4A72B2E49E89AAD03B4EE87CC18DDC6C22D596BECAD7F26CED6DC4A62A69DC3716CC
3,131,410 UART: [art] PUB.Y = EAF110CE6E8C7BEBDE9C6AF0A6F47385401C3D079D1318253BD93406174273FFCDD089D91F2033919486C44FD573780D
3,138,355 UART: [art] SIG.R = 34390FB0EB8596269883D9F6B4AD1915F3E55086EAE7CC68F2C47EBE9462849AA3A86780CEA7A2DC88E7889C10C9548A
3,145,128 UART: [art] SIG.S = 3A11D587A3EED5DDB475645887974FD300E38815BF2DB0DF0977AF83EB81D8CD3052700E97E3EF64F495EC5475995608
3,169,730 UART: Caliptra RT
3,170,075 UART: [state] CFI Enabled
3,277,658 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 ready_for_fw is high
1,060,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,201 >>> mbox cmd response: success
2,686,529 UART:
2,686,545 UART: Running Caliptra FMC ...
2,686,953 UART:
2,687,096 UART: [state] CFI Enabled
2,697,799 UART: [fht] FMC Alias Private Key: 7
2,806,080 UART: [art] Extend RT PCRs Done
2,806,508 UART: [art] Lock RT PCRs Done
2,808,296 UART: [art] Populate DV Done
2,816,619 UART: [fht] FMC Alias Private Key: 7
2,817,727 UART: [art] Derive CDI
2,818,007 UART: [art] Store in in slot 0x4
2,903,330 UART: [art] Derive Key Pair
2,903,690 UART: [art] Store priv key in slot 0x5
2,916,684 UART: [art] Derive Key Pair - Done
2,931,551 UART: [art] Signing Cert with AUTHO
2,932,031 UART: RITY.KEYID = 7
2,946,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,580 UART: [art] PUB.X = A3F78D1AB25C3B0A341C7F2E5130730E058EFE14CCC90ED91B8DB2DA4920331AB84CD0283C2E3D1EE410FB9AE2230A2A
2,954,353 UART: [art] PUB.Y = 63A2AC92F5C5FF1DD86DB2C1E03A9C66456B4964DFB75BC1E832A9C906403A8B62054BF38F2AECAACB4497BC5DED4101
2,961,314 UART: [art] SIG.R = E962C39F060B4A72F4E8F55582B2BE6B13CE7A9620E55BD55F07010C403FB4BF5E40C6982B384B5860FB54B198FF1D31
2,968,075 UART: [art] SIG.S = 4160F4BDAADCCD60C8CE332D5C26BFB6498B1E66A5CAEBE3059CB8219C1B37944C4386360DB50F68A5417CFB07593E9F
2,992,024 UART: Caliptra RT
2,992,369 UART: [state] CFI Enabled
3,099,932 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,489 UART: [idev] Sha1 KeyId Algorithm
1,207,423 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,474 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,399 UART: [fwproc] Recv command 0x46574c44
1,282,132 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,833 >>> mbox cmd response: success
2,770,898 UART: [afmc] ++
2,771,066 UART: [afmc] CDI.KEYID = 6
2,771,429 UART: [afmc] SUBJECT.KEYID = 7
2,771,855 UART: [afmc] AUTHORITY.KEYID = 5
2,807,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,811 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,359 UART: [afmc] --
2,850,459 UART: [cold-reset] --
2,851,225 UART: [state] Locking Datavault
2,852,458 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,062 UART: [state] Locking ICCM
2,853,622 UART: [exit] Launching FMC @ 0x40000130
2,858,951 UART:
2,858,967 UART: Running Caliptra FMC ...
2,859,375 UART:
2,859,429 UART: [state] CFI Enabled
2,869,902 UART: [fht] FMC Alias Private Key: 7
2,977,141 UART: [art] Extend RT PCRs Done
2,977,569 UART: [art] Lock RT PCRs Done
2,978,993 UART: [art] Populate DV Done
2,987,416 UART: [fht] FMC Alias Private Key: 7
2,988,502 UART: [art] Derive CDI
2,988,782 UART: [art] Store in in slot 0x4
3,074,363 UART: [art] Derive Key Pair
3,074,723 UART: [art] Store priv key in slot 0x5
3,087,991 UART: [art] Derive Key Pair - Done
3,103,152 UART: [art] Signing Cert with AUTHO
3,103,632 UART: RITY.KEYID = 7
3,118,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,307 UART: [art] PUB.X = A1BACF7C2D57A52FF9AA175F94342496F91CEC7383BC852F5DD6A37557B6C181B6B274DD88522874A8B98A81BBD3AB65
3,126,089 UART: [art] PUB.Y = DF3E44FDA40B2B4462CDACC87F6E2163BDD6BCCB2638069996666C9C42C05569146751D81AA70B2D7A23686DA875135C
3,133,036 UART: [art] SIG.R = 893C454049D7C8B413AD78E795B57F77A44646F755D6DA33ACF72591B4C154DBEED5A438C4A41E1CE43548205B30C829
3,139,808 UART: [art] SIG.S = D701137E1C16CE8BA815DD600331848E296B14564C9687019F81AA6DA030B7590EFE27973175E8574D92A30962D9488A
3,163,594 UART: Caliptra RT
3,163,847 UART: [state] CFI Enabled
3,270,667 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,318 ready_for_fw is high
1,055,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,549 >>> mbox cmd response: success
2,680,041 UART:
2,680,057 UART: Running Caliptra FMC ...
2,680,465 UART:
2,680,519 UART: [state] CFI Enabled
2,691,088 UART: [fht] FMC Alias Private Key: 7
2,799,581 UART: [art] Extend RT PCRs Done
2,800,009 UART: [art] Lock RT PCRs Done
2,801,539 UART: [art] Populate DV Done
2,809,792 UART: [fht] FMC Alias Private Key: 7
2,810,916 UART: [art] Derive CDI
2,811,196 UART: [art] Store in in slot 0x4
2,896,613 UART: [art] Derive Key Pair
2,896,973 UART: [art] Store priv key in slot 0x5
2,909,785 UART: [art] Derive Key Pair - Done
2,924,265 UART: [art] Signing Cert with AUTHO
2,924,745 UART: RITY.KEYID = 7
2,939,955 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,720 UART: [art] PUB.X = 8415A51E71E25B685B1EB8FD570DDD14E510ECB886F0748C06A89E5103F877D28174594A2AD3D89BC844C0E29BFF6F60
2,947,487 UART: [art] PUB.Y = A99E92D85C21EAE9D10F69FD24C3DD109E5C53AD13FA97464798E2D91F134FFA4B90B81C4D05CF1E17F0122CD4AF2BD7
2,954,449 UART: [art] SIG.R = 7606C776517FAD4F3B6C1825709A475BCAC10ED42A38E55E948FC12F3DF363D631D9C13FF457F3BB00F39F84F652102C
2,961,197 UART: [art] SIG.S = 5F72CBC42EE03025556AF5DECBA0CA2D9F6B124C52EC6508550924F4928646AADBEAA0D641BC521F5F6690DE8981E15F
2,984,922 UART: Caliptra RT
2,985,175 UART: [state] CFI Enabled
3,091,916 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,976 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 ready_for_fw is high
1,174,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,732 UART: [idev] --
1,208,807 UART: [ldev] ++
1,208,975 UART: [ldev] CDI.KEYID = 6
1,209,339 UART: [ldev] SUBJECT.KEYID = 5
1,209,766 UART: [ldev] AUTHORITY.KEYID = 7
1,210,229 UART: [ldev] FE.KEYID = 1
1,215,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,980 >>> mbox cmd response: success
2,771,081 UART: [afmc] ++
2,771,249 UART: [afmc] CDI.KEYID = 6
2,771,612 UART: [afmc] SUBJECT.KEYID = 7
2,772,038 UART: [afmc] AUTHORITY.KEYID = 5
2,807,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,678 UART: [afmc] --
2,850,800 UART: [cold-reset] --
2,851,650 UART: [state] Locking Datavault
2,852,911 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,515 UART: [state] Locking ICCM
2,853,959 UART: [exit] Launching FMC @ 0x40000130
2,859,288 UART:
2,859,304 UART: Running Caliptra FMC ...
2,859,712 UART:
2,859,855 UART: [state] CFI Enabled
2,870,582 UART: [fht] FMC Alias Private Key: 7
2,979,111 UART: [art] Extend RT PCRs Done
2,979,539 UART: [art] Lock RT PCRs Done
2,981,111 UART: [art] Populate DV Done
2,989,440 UART: [fht] FMC Alias Private Key: 7
2,990,430 UART: [art] Derive CDI
2,990,710 UART: [art] Store in in slot 0x4
3,076,597 UART: [art] Derive Key Pair
3,076,957 UART: [art] Store priv key in slot 0x5
3,090,371 UART: [art] Derive Key Pair - Done
3,105,221 UART: [art] Signing Cert with AUTHO
3,105,701 UART: RITY.KEYID = 7
3,120,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,516 UART: [art] PUB.X = EEE8113C2ABEA1DD6D18C7B889FBCD01F535B45BB8B18897F9C0AD4323A39BDB5279C5C4D5FEA166D9242DD22E1EC23A
3,128,307 UART: [art] PUB.Y = FA3898C692211C637FB77B4E2D5E2EE1F927FDCFAEFD33EF3E72023339082BC8A0B533D1C753C3BCFF8E9FCB43F515CC
3,135,273 UART: [art] SIG.R = 26C3A95235E5FD089595FC0654002E3FE18BF35D71333BD2FC8EB858036C60622FE28FA0A9B31825295286347FDD1EBC
3,142,014 UART: [art] SIG.S = BDABA17D74C2956DDE573C8A24A5142E9A51C2B6004267D156C2F97885E7E4A8DC371490DEAE952E57E388B206F8DA44
3,166,022 UART: Caliptra RT
3,166,367 UART: [state] CFI Enabled
3,274,628 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,591 ready_for_fw is high
1,055,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,110 >>> mbox cmd response: success
2,681,180 UART:
2,681,196 UART: Running Caliptra FMC ...
2,681,604 UART:
2,681,747 UART: [state] CFI Enabled
2,692,386 UART: [fht] FMC Alias Private Key: 7
2,800,455 UART: [art] Extend RT PCRs Done
2,800,883 UART: [art] Lock RT PCRs Done
2,802,325 UART: [art] Populate DV Done
2,810,890 UART: [fht] FMC Alias Private Key: 7
2,812,038 UART: [art] Derive CDI
2,812,318 UART: [art] Store in in slot 0x4
2,898,325 UART: [art] Derive Key Pair
2,898,685 UART: [art] Store priv key in slot 0x5
2,912,245 UART: [art] Derive Key Pair - Done
2,927,058 UART: [art] Signing Cert with AUTHO
2,927,538 UART: RITY.KEYID = 7
2,943,060 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,825 UART: [art] PUB.X = 39CCD2C880F8622270B6D916248B5B07570DC6BAFBD7D614CFE82D4B0F354FB161B02F766F914EA3AB0325DFCB2751C9
2,950,595 UART: [art] PUB.Y = 1DED6845AC8BB8A881AD5953D12232819FFB4EC18B99C798AA959E89B067A207E2A8E7FFAC07A53EB8749E029E16E040
2,957,546 UART: [art] SIG.R = 296DE51989122E79E841D368F941EED95751E50015EA0B1193C266C13370BDCBCAA6E51BF5FA17AC46D59AADDE55983D
2,964,301 UART: [art] SIG.S = ECF5E2A435CB9A3A52ADB8BA4D12978DEEB846BDFE56C07827B7408F3A652879655BE4916FFBBFCD9740EEDF95464BCD
2,987,740 UART: Caliptra RT
2,988,085 UART: [state] CFI Enabled
3,094,612 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
Truncated 1348011 bytes from beginning
UART: [art] Extend RT PCRs Done
3,631,658,511 UART: [art] Lock RT PCRs Done
3,631,659,969 UART: [art] Populate DV Done
3,631,665,163 UART: [fht] FMC Alias Private Key: 7
3,631,666,707 UART: [art] Derive CDI
3,631,667,526 UART: [art] Store in in slot 0x4
3,631,726,392 UART: [art] Derive Key Pair
3,631,727,434 UART: [art] Store priv key in slot 0x5
3,635,020,390 UART: [art] Derive Key Pair - Done
3,635,033,216 UART: [art] Signing Cert with AUTHO
3,635,034,528 UART: RITY.KEYID = 7
3,637,322,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,637,323,858 UART: [art] PUB.X = 44DD2595C56A4BBCAA10E4A093CA43F57794624B43E43B68EF5260BC98C456AF4CD8165963501AF2EE5FB6BA946AADFC
3,637,331,102 UART: [art] PUB.Y = 97745C72095ADFB4A2B448C5A1288604E78F3E67698BC141F14101E36E6EAFCA14F0E3E348B795F00A9251669502C0C0
3,637,338,328 UART: [art] SIG.R = 303B4FE5AB491C50BAB8986BF4F8E0E17B2CF9E77FBE072619CC354866ED41742E78547D5406880B6EF9B311DBEC10C3
3,637,345,725 UART: [art] SIG.S = 7516D153093957B6F37E859D3EC664A35432A16297FA73C272C26A9AE849DD7886D734F919985457B22DA78688F5A64B
3,638,651,086 UART: Caliptra RT
3,638,651,814 UART: [state] CFI Enabled
3,638,989,107 UART: [rt] RT listening for mailbox commands...
3,638,990,985 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,639,134,873 UART:
3,639,135,180 UART: Running Caliptra ROM ...
3,639,136,218 UART:
3,639,136,371 UART: [state] CFI Enabled
3,639,199,795 UART: [state] LifecycleState = Unprovisioned
3,639,201,708 UART: [state] DebugLocked = No
3,639,203,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,639,207,691 UART: [kat] SHA2-256
3,639,377,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,639,387,841 UART: [kat] ++
3,639,388,299 UART: [kat] sha1
3,639,399,999 UART: [kat] SHA2-256
3,639,402,693 UART: [kat] SHA2-384
3,639,407,651 UART: [kat] SHA2-512-ACC
3,639,410,054 UART: [kat] ECC-384
3,641,704,714 UART: [kat] HMAC-384Kdf
3,641,735,034 UART: [kat] LMS
3,642,925,354 UART: [kat] --
3,642,930,545 UART: [update-reset] ++
3,647,063,696 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,647,066,554 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,647,447,489 >>> mbox cmd response: success
3,647,448,083 UART: [update-reset] Copying MAN_2 To MAN_1
3,647,470,514 UART: [update-reset Success] --
3,647,474,816 UART: [state] Locking Datavault
3,647,476,842 UART: [state] Locking PCR0, PCR1 and PCR31
3,647,478,553 UART: [state] Locking ICCM
3,647,481,329 UART: [exit] Launching FMC @ 0x40000130
3,647,489,773 UART:
3,647,490,009 UART: Running Caliptra FMC ...
3,647,491,046 UART:
3,647,491,199 UART: [state] CFI Enabled
3,647,592,599 UART: [art] Extend RT PCRs Done
3,647,593,786 UART: [art] Lock RT PCRs Done
3,647,595,001 UART: [art] Populate DV Done
3,647,600,635 UART: [fht] FMC Alias Private Key: 7
3,647,602,289 UART: [art] Derive CDI
3,647,603,131 UART: [art] Store in in slot 0x4
3,647,661,361 UART: [art] Derive Key Pair
3,647,662,401 UART: [art] Store priv key in slot 0x5
3,650,955,035 UART: [art] Derive Key Pair - Done
3,650,967,872 UART: [art] Signing Cert with AUTHO
3,650,969,351 UART: RITY.KEYID = 7
3,653,256,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,653,258,032 UART: [art] PUB.X = C5DF88B1D81E2A07FF25299C6A671A21599671A16B7FFF18898071C059682DF52E1CF22CC297558B3352BE4FFD49DBC2
3,653,265,294 UART: [art] PUB.Y = B6F40D4D836CBE0156B132240EA7022412930847BC7F0004B8A71561E69908621E29CE9A8E3C2355AF61B8837B256FCE
3,653,272,477 UART: [art] SIG.R = 64102D9E2C8BA452E2A59128E1F9CE7F56B90104A353F16E46D7A22C26D81F5B7BFF06B3C88381E8F03D76F340DC19F8
3,653,279,874 UART: [art] SIG.S = EBE072DAFD98BD8F65C95FAAFA9DAA0C257432EAEAC43DBA81981A1150673731F709DCAE9ADB74F12B74C8CCFB302E0A
3,654,585,102 UART: Caliptra RT
3,654,585,830 UART: [state] CFI Enabled
3,654,920,840 UART: [rt] RT listening for mailbox commands...
3,654,922,727 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,655,066,452 UART:
3,655,066,790 UART: Running Caliptra ROM ...
3,655,067,922 UART:
3,655,068,093 UART: [state] CFI Enabled
3,655,133,574 UART: [state] LifecycleState = Unprovisioned
3,655,135,508 UART: [state] DebugLocked = No
3,655,137,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,655,143,523 UART: [kat] SHA2-256
3,655,313,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,655,323,728 UART: [kat] ++
3,655,324,218 UART: [kat] sha1
3,655,334,841 UART: [kat] SHA2-256
3,655,337,536 UART: [kat] SHA2-384
3,655,343,417 UART: [kat] SHA2-512-ACC
3,655,345,766 UART: [kat] ECC-384
3,657,635,242 UART: [kat] HMAC-384Kdf
3,657,646,607 UART: [kat] LMS
3,658,836,909 UART: [kat] --
3,658,842,320 UART: [update-reset] ++
3,662,978,170 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,662,981,793 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,663,362,757 >>> mbox cmd response: success
3,663,364,116 UART: [update-reset] Copying MAN_2 To MAN_1
3,663,386,558 UART: [update-reset Success] --
3,663,391,585 UART: [state] Locking Datavault
3,663,394,962 UART: [state] Locking PCR0, PCR1 and PCR31
3,663,396,723 UART: [state] Locking ICCM
3,663,397,744 UART: [exit] Launching FMC @ 0x40000130
3,663,406,195 UART:
3,663,406,433 UART: Running Caliptra FMC ...
3,663,407,534 UART:
3,663,407,708 UART: [state] CFI Enabled
3,663,503,320 UART: [art] Extend RT PCRs Done
3,663,504,523 UART: [art] Lock RT PCRs Done
3,663,506,197 UART: [art] Populate DV Done
3,663,511,770 UART: [fht] FMC Alias Private Key: 7
3,663,513,362 UART: [art] Derive CDI
3,663,514,178 UART: [art] Store in in slot 0x4
3,663,571,973 UART: [art] Derive Key Pair
3,663,573,011 UART: [art] Store priv key in slot 0x5
3,666,865,710 UART: [art] Derive Key Pair - Done
3,666,878,552 UART: [art] Signing Cert with AUTHO
3,666,879,863 UART: RITY.KEYID = 7
3,669,167,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,169,468 UART: [art] PUB.X = 44DD2595C56A4BBCAA10E4A093CA43F57794624B43E43B68EF5260BC98C456AF4CD8165963501AF2EE5FB6BA946AADFC
3,669,176,715 UART: [art] PUB.Y = 97745C72095ADFB4A2B448C5A1288604E78F3E67698BC141F14101E36E6EAFCA14F0E3E348B795F00A9251669502C0C0
3,669,183,958 UART: [art] SIG.R = 303B4FE5AB491C50BAB8986BF4F8E0E17B2CF9E77FBE072619CC354866ED41742E78547D5406880B6EF9B311DBEC10C3
3,669,191,355 UART: [art] SIG.S = 7516D153093957B6F37E859D3EC664A35432A16297FA73C272C26A9AE849DD7886D734F919985457B22DA78688F5A64B
3,670,496,044 UART: Caliptra RT
3,670,496,769 UART: [state] CFI Enabled
3,670,834,821 UART: [rt] RT listening for mailbox commands...
3,670,836,719 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,670,980,453 UART:
3,670,980,757 UART: Running Caliptra ROM ...
3,670,981,880 UART:
3,670,982,039 UART: [state] CFI Enabled
3,671,047,396 UART: [state] LifecycleState = Unprovisioned
3,671,049,431 UART: [state] DebugLocked = No
3,671,050,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,671,055,401 UART: [kat] SHA2-256
3,671,225,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,671,235,555 UART: [kat] ++
3,671,236,041 UART: [kat] sha1
3,671,247,529 UART: [kat] SHA2-256
3,671,250,217 UART: [kat] SHA2-384
3,671,256,922 UART: [kat] SHA2-512-ACC
3,671,259,283 UART: [kat] ECC-384
3,673,551,035 UART: [kat] HMAC-384Kdf
3,673,582,111 UART: [kat] LMS
3,674,772,431 UART: [kat] --
3,674,776,227 UART: [update-reset] ++
3,678,917,221 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,678,920,884 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,679,301,876 >>> mbox cmd response: success
3,679,303,687 UART: [update-reset] Copying MAN_2 To MAN_1
3,679,326,091 UART: [update-reset Success] --
3,679,329,037 UART: [state] Locking Datavault
3,679,332,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,679,333,910 UART: [state] Locking ICCM
3,679,335,688 UART: [exit] Launching FMC @ 0x40000130
3,679,344,088 UART:
3,679,344,349 UART: Running Caliptra FMC ...
3,679,345,456 UART:
3,679,345,620 UART: [state] CFI Enabled
3,679,437,786 UART: [art] Extend RT PCRs Done
3,679,438,970 UART: [art] Lock RT PCRs Done
3,679,440,531 UART: [art] Populate DV Done
3,679,445,990 UART: [fht] FMC Alias Private Key: 7
3,679,447,523 UART: [art] Derive CDI
3,679,448,340 UART: [art] Store in in slot 0x4
3,679,506,549 UART: [art] Derive Key Pair
3,679,507,564 UART: [art] Store priv key in slot 0x5
3,682,800,338 UART: [art] Derive Key Pair - Done
3,682,813,594 UART: [art] Signing Cert with AUTHO
3,682,814,929 UART: RITY.KEYID = 7
3,685,101,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,685,102,985 UART: [art] PUB.X = C5DF88B1D81E2A07FF25299C6A671A21599671A16B7FFF18898071C059682DF52E1CF22CC297558B3352BE4FFD49DBC2
3,685,110,247 UART: [art] PUB.Y = B6F40D4D836CBE0156B132240EA7022412930847BC7F0004B8A71561E69908621E29CE9A8E3C2355AF61B8837B256FCE
3,685,117,481 UART: [art] SIG.R = 64102D9E2C8BA452E2A59128E1F9CE7F56B90104A353F16E46D7A22C26D81F5B7BFF06B3C88381E8F03D76F340DC19F8
3,685,124,882 UART: [art] SIG.S = EBE072DAFD98BD8F65C95FAAFA9DAA0C257432EAEAC43DBA81981A1150673731F709DCAE9ADB74F12B74C8CCFB302E0A
3,686,430,496 UART: Caliptra RT
3,686,431,208 UART: [state] CFI Enabled
3,686,781,962 UART: [rt] RT listening for mailbox commands...
3,686,783,836 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,686,927,677 UART:
3,686,927,990 UART: Running Caliptra ROM ...
3,686,929,113 UART:
3,686,929,280 UART: [state] CFI Enabled
3,686,998,101 UART: [state] LifecycleState = Unprovisioned
3,687,000,036 UART: [state] DebugLocked = No
3,687,002,953 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,687,008,354 UART: [kat] SHA2-256
3,687,178,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,687,188,536 UART: [kat] ++
3,687,189,078 UART: [kat] sha1
3,687,199,656 UART: [kat] SHA2-256
3,687,202,303 UART: [kat] SHA2-384
3,687,207,918 UART: [kat] SHA2-512-ACC
3,687,210,317 UART: [kat] ECC-384
3,689,501,569 UART: [kat] HMAC-384Kdf
3,689,534,199 UART: [kat] LMS
3,690,724,532 UART: [kat] --
3,690,729,478 UART: [update-reset] ++
3,694,866,644 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,694,870,297 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,695,251,280 >>> mbox cmd response: success
3,695,251,931 UART: [update-reset] Copying MAN_2 To MAN_1
3,695,274,324 UART: [update-reset Success] --
3,695,277,698 UART: [state] Locking Datavault
3,695,280,540 UART: [state] Locking PCR0, PCR1 and PCR31
3,695,282,299 UART: [state] Locking ICCM
3,695,283,424 UART: [exit] Launching FMC @ 0x40000130
3,695,291,879 UART:
3,695,292,164 UART: Running Caliptra FMC ...
3,695,293,277 UART:
3,695,293,443 UART: [state] CFI Enabled
3,695,388,089 UART: [art] Extend RT PCRs Done
3,695,389,281 UART: [art] Lock RT PCRs Done
3,695,390,410 UART: [art] Populate DV Done
3,695,395,825 UART: [fht] FMC Alias Private Key: 7
3,695,397,588 UART: [art] Derive CDI
3,695,398,414 UART: [art] Store in in slot 0x4
3,695,457,458 UART: [art] Derive Key Pair
3,695,458,494 UART: [art] Store priv key in slot 0x5
3,698,750,894 UART: [art] Derive Key Pair - Done
3,698,764,466 UART: [art] Signing Cert with AUTHO
3,698,765,775 UART: RITY.KEYID = 7
3,701,051,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,701,053,402 UART: [art] PUB.X = 44DD2595C56A4BBCAA10E4A093CA43F57794624B43E43B68EF5260BC98C456AF4CD8165963501AF2EE5FB6BA946AADFC
3,701,060,670 UART: [art] PUB.Y = 97745C72095ADFB4A2B448C5A1288604E78F3E67698BC141F14101E36E6EAFCA14F0E3E348B795F00A9251669502C0C0
3,701,067,916 UART: [art] SIG.R = 303B4FE5AB491C50BAB8986BF4F8E0E17B2CF9E77FBE072619CC354866ED41742E78547D5406880B6EF9B311DBEC10C3
3,701,075,317 UART: [art] SIG.S = 7516D153093957B6F37E859D3EC664A35432A16297FA73C272C26A9AE849DD7886D734F919985457B22DA78688F5A64B
3,702,380,712 UART: Caliptra RT
3,702,381,426 UART: [state] CFI Enabled
3,702,709,530 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 400.20s
Truncated 716391 bytes from beginning
2B763845B947D1B32713B158AE44114
3,699,444,520 UART: [art] SIG.R = EEA6BF15F8D78E4B42113CE7C7DBA971FC2192BABC0E06D233F2D9443381F0798597208B801B667B211B493A280BF47E
3,699,451,877 UART: [art] SIG.S = 511AFACE3851A434EFB05437AB39927049C10A641E3116197D829D6FB0D9F62B3703DF88E2B43CA7E9BB132C9262AED1
3,700,757,324 UART: Caliptra RT
3,700,758,039 UART: [state] CFI Enabled
3,701,089,070 UART: [rt] RT listening for mailbox commands...
3,701,090,951 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,709,828,548 >>> mbox cmd response: success
3,709,865,304 UART:
3,709,865,578 UART: Running Caliptra FMC ...
3,709,866,616 UART:
3,709,866,769 UART: [state] CFI Enabled
3,709,955,323 UART: [art] Extend RT PCRs Done
3,709,956,511 UART: [art] Lock RT PCRs Done
3,709,957,954 UART: [art] Populate DV Done
3,709,963,442 UART: [fht] FMC Alias Private Key: 7
3,709,964,991 UART: [art] Derive CDI
3,709,965,740 UART: [art] Store in in slot 0x4
3,710,023,438 UART: [art] Derive Key Pair
3,710,024,450 UART: [art] Store priv key in slot 0x5
3,713,317,726 UART: [art] Derive Key Pair - Done
3,713,330,794 UART: [art] Signing Cert with AUTHO
3,713,332,139 UART: RITY.KEYID = 7
3,715,619,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,715,621,090 UART: [art] PUB.X = C67AD9A15DF1B4E8085EECC319AE6BDF18363D6C87874A94C1B68C00F8979E452E2543D36C892D58A821EEEB114396EF
3,715,628,340 UART: [art] PUB.Y = A1E69585F1C18A9F30B13B1AAB1D4478B87EE7F63E14BD13877CE2AAF8ED82720DD494BB66F6EE8E169B37CDF74BA1BE
3,715,635,607 UART: [art] SIG.R = 84F925FEA8AF513732E7524D6C602DAE336E680DA32F37EED605A7571A5E8E0BAD59880671FF24684A66B1D796F9611A
3,715,643,007 UART: [art] SIG.S = 002AFC06D858EC1D57F716D58D21B6A572C95EE2F6E96780D262856C6712D947290B0CDC273C41106712972105C83309
3,716,948,506 UART: Caliptra RT
3,716,949,225 UART: [state] CFI Enabled
3,717,281,106 UART: [rt] RT listening for mailbox commands...
3,717,283,004 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,726,018,890 >>> mbox cmd response: success
3,726,055,869 UART:
3,726,056,181 UART: Running Caliptra FMC ...
3,726,057,310 UART:
3,726,057,486 UART: [state] CFI Enabled
3,726,144,200 UART: [art] Extend RT PCRs Done
3,726,145,390 UART: [art] Lock RT PCRs Done
3,726,147,011 UART: [art] Populate DV Done
3,726,152,320 UART: [fht] FMC Alias Private Key: 7
3,726,153,963 UART: [art] Derive CDI
3,726,154,782 UART: [art] Store in in slot 0x4
3,726,212,967 UART: [art] Derive Key Pair
3,726,214,011 UART: [art] Store priv key in slot 0x5
3,729,506,397 UART: [art] Derive Key Pair - Done
3,729,519,471 UART: [art] Signing Cert with AUTHO
3,729,520,807 UART: RITY.KEYID = 7
3,731,807,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,808,964 UART: [art] PUB.X = 4C862B65035038E43221307D0B92CEFE2A4E9D4B525AFA0FD66394244D7EA76DA4D25BCFAE3BECB0A8BE62250AB6891D
3,731,816,237 UART: [art] PUB.Y = 1429596C7ACAFD5AFA2C836234FF890614943DE9D80FE1EC6C3C421D7C9664ED42B763845B947D1B32713B158AE44114
3,731,823,439 UART: [art] SIG.R = EEA6BF15F8D78E4B42113CE7C7DBA971FC2192BABC0E06D233F2D9443381F0798597208B801B667B211B493A280BF47E
3,731,830,846 UART: [art] SIG.S = 511AFACE3851A434EFB05437AB39927049C10A641E3116197D829D6FB0D9F62B3703DF88E2B43CA7E9BB132C9262AED1
3,733,136,476 UART: Caliptra RT
3,733,137,205 UART: [state] CFI Enabled
3,733,470,441 UART: [rt] RT listening for mailbox commands...
3,733,472,312 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,742,186,695 >>> mbox cmd response: success
3,742,219,354 UART:
3,742,219,660 UART: Running Caliptra FMC ...
3,742,220,703 UART:
3,742,220,860 UART: [state] CFI Enabled
3,742,312,540 UART: [art] Extend RT PCRs Done
3,742,313,753 UART: [art] Lock RT PCRs Done
3,742,315,350 UART: [art] Populate DV Done
3,742,320,815 UART: [fht] FMC Alias Private Key: 7
3,742,322,459 UART: [art] Derive CDI
3,742,323,198 UART: [art] Store in in slot 0x4
3,742,381,316 UART: [art] Derive Key Pair
3,742,382,359 UART: [art] Store priv key in slot 0x5
3,745,674,951 UART: [art] Derive Key Pair - Done
3,745,688,056 UART: [art] Signing Cert with AUTHO
3,745,689,381 UART: RITY.KEYID = 7
3,747,977,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,747,978,633 UART: [art] PUB.X = C67AD9A15DF1B4E8085EECC319AE6BDF18363D6C87874A94C1B68C00F8979E452E2543D36C892D58A821EEEB114396EF
3,747,985,851 UART: [art] PUB.Y = A1E69585F1C18A9F30B13B1AAB1D4478B87EE7F63E14BD13877CE2AAF8ED82720DD494BB66F6EE8E169B37CDF74BA1BE
3,747,993,151 UART: [art] SIG.R = 84F925FEA8AF513732E7524D6C602DAE336E680DA32F37EED605A7571A5E8E0BAD59880671FF24684A66B1D796F9611A
3,748,000,549 UART: [art] SIG.S = 002AFC06D858EC1D57F716D58D21B6A572C95EE2F6E96780D262856C6712D947290B0CDC273C41106712972105C83309
3,749,305,708 UART: Caliptra RT
3,749,306,449 UART: [state] CFI Enabled
3,749,644,246 UART: [rt] RT listening for mailbox commands...
3,749,646,143 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,758,378,440 >>> mbox cmd response: success
3,758,415,794 UART:
3,758,416,075 UART: Running Caliptra FMC ...
3,758,417,116 UART:
3,758,417,270 UART: [state] CFI Enabled
3,758,522,171 UART: [art] Extend RT PCRs Done
3,758,523,371 UART: [art] Lock RT PCRs Done
3,758,524,859 UART: [art] Populate DV Done
3,758,530,486 UART: [fht] FMC Alias Private Key: 7
3,758,532,135 UART: [art] Derive CDI
3,758,532,876 UART: [art] Store in in slot 0x4
3,758,591,812 UART: [art] Derive Key Pair
3,758,592,818 UART: [art] Store priv key in slot 0x5
3,761,885,075 UART: [art] Derive Key Pair - Done
3,761,898,075 UART: [art] Signing Cert with AUTHO
3,761,899,388 UART: RITY.KEYID = 7
3,764,186,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,764,188,234 UART: [art] PUB.X = 4C862B65035038E43221307D0B92CEFE2A4E9D4B525AFA0FD66394244D7EA76DA4D25BCFAE3BECB0A8BE62250AB6891D
3,764,195,499 UART: [art] PUB.Y = 1429596C7ACAFD5AFA2C836234FF890614943DE9D80FE1EC6C3C421D7C9664ED42B763845B947D1B32713B158AE44114
3,764,202,719 UART: [art] SIG.R = EEA6BF15F8D78E4B42113CE7C7DBA971FC2192BABC0E06D233F2D9443381F0798597208B801B667B211B493A280BF47E
3,764,210,130 UART: [art] SIG.S = 511AFACE3851A434EFB05437AB39927049C10A641E3116197D829D6FB0D9F62B3703DF88E2B43CA7E9BB132C9262AED1
3,765,515,218 UART: Caliptra RT
3,765,515,909 UART: [state] CFI Enabled
3,765,845,300 UART: [rt] RT listening for mailbox commands...
3,765,847,170 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,774,586,835 >>> mbox cmd response: success
3,774,622,406 UART:
3,774,622,711 UART: Running Caliptra FMC ...
3,774,623,839 UART:
3,774,624,022 UART: [state] CFI Enabled
3,774,712,624 UART: [art] Extend RT PCRs Done
3,774,713,816 UART: [art] Lock RT PCRs Done
3,774,715,388 UART: [art] Populate DV Done
3,774,720,962 UART: [fht] FMC Alias Private Key: 7
3,774,722,608 UART: [art] Derive CDI
3,774,723,426 UART: [art] Store in in slot 0x4
3,774,781,604 UART: [art] Derive Key Pair
3,774,782,645 UART: [art] Store priv key in slot 0x5
3,778,075,387 UART: [art] Derive Key Pair - Done
3,778,088,276 UART: [art] Signing Cert with AUTHO
3,778,089,584 UART: RITY.KEYID = 7
3,780,377,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,780,378,945 UART: [art] PUB.X = C67AD9A15DF1B4E8085EECC319AE6BDF18363D6C87874A94C1B68C00F8979E452E2543D36C892D58A821EEEB114396EF
3,780,386,211 UART: [art] PUB.Y = A1E69585F1C18A9F30B13B1AAB1D4478B87EE7F63E14BD13877CE2AAF8ED82720DD494BB66F6EE8E169B37CDF74BA1BE
3,780,393,513 UART: [art] SIG.R = 84F925FEA8AF513732E7524D6C602DAE336E680DA32F37EED605A7571A5E8E0BAD59880671FF24684A66B1D796F9611A
3,780,400,880 UART: [art] SIG.S = 002AFC06D858EC1D57F716D58D21B6A572C95EE2F6E96780D262856C6712D947290B0CDC273C41106712972105C83309
3,781,706,476 UART: Caliptra RT
3,781,707,191 UART: [state] CFI Enabled
3,782,050,000 UART: [rt] RT listening for mailbox commands...
3,782,051,886 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,790,770,623 >>> mbox cmd response: success
3,790,806,209 UART:
3,790,806,515 UART: Running Caliptra FMC ...
3,790,807,633 UART:
3,790,807,796 UART: [state] CFI Enabled
3,790,903,141 UART: [art] Extend RT PCRs Done
3,790,904,341 UART: [art] Lock RT PCRs Done
3,790,906,074 UART: [art] Populate DV Done
3,790,911,715 UART: [fht] FMC Alias Private Key: 7
3,790,913,365 UART: [art] Derive CDI
3,790,914,186 UART: [art] Store in in slot 0x4
3,790,972,721 UART: [art] Derive Key Pair
3,790,973,767 UART: [art] Store priv key in slot 0x5
3,794,266,178 UART: [art] Derive Key Pair - Done
3,794,279,192 UART: [art] Signing Cert with AUTHO
3,794,280,688 UART: RITY.KEYID = 7
3,796,567,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,796,568,622 UART: [art] PUB.X = 4C862B65035038E43221307D0B92CEFE2A4E9D4B525AFA0FD66394244D7EA76DA4D25BCFAE3BECB0A8BE62250AB6891D
3,796,575,835 UART: [art] PUB.Y = 1429596C7ACAFD5AFA2C836234FF890614943DE9D80FE1EC6C3C421D7C9664ED42B763845B947D1B32713B158AE44114
3,796,583,086 UART: [art] SIG.R = EEA6BF15F8D78E4B42113CE7C7DBA971FC2192BABC0E06D233F2D9443381F0798597208B801B667B211B493A280BF47E
3,796,590,460 UART: [art] SIG.S = 511AFACE3851A434EFB05437AB39927049C10A641E3116197D829D6FB0D9F62B3703DF88E2B43CA7E9BB132C9262AED1
3,797,896,635 UART: Caliptra RT
3,797,897,351 UART: [state] CFI Enabled
3,798,246,443 UART: [rt] RT listening for mailbox commands...
3,798,248,322 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,806,989,865 >>> mbox cmd response: success
3,807,027,173 UART:
3,807,027,503 UART: Running Caliptra FMC ...
3,807,028,553 UART:
3,807,028,713 UART: [state] CFI Enabled
3,807,133,713 UART: [art] Extend RT PCRs Done
3,807,134,900 UART: [art] Lock RT PCRs Done
3,807,136,277 UART: [art] Populate DV Done
3,807,141,800 UART: [fht] FMC Alias Private Key: 7
3,807,143,282 UART: [art] Derive CDI
3,807,144,021 UART: [art] Store in in slot 0x4
3,807,203,011 UART: [art] Derive Key Pair
3,807,204,061 UART: [art] Store priv key in slot 0x5
3,810,497,075 UART: [art] Derive Key Pair - Done
3,810,509,932 UART: [art] Signing Cert with AUTHO
3,810,511,249 UART: RITY.KEYID = 7
3,812,799,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,812,800,915 UART: [art] PUB.X = C67AD9A15DF1B4E8085EECC319AE6BDF18363D6C87874A94C1B68C00F8979E452E2543D36C892D58A821EEEB114396EF
3,812,808,148 UART: [art] PUB.Y = A1E69585F1C18A9F30B13B1AAB1D4478B87EE7F63E14BD13877CE2AAF8ED82720DD494BB66F6EE8E169B37CDF74BA1BE
3,812,815,399 UART: [art] SIG.R = 84F925FEA8AF513732E7524D6C602DAE336E680DA32F37EED605A7571A5E8E0BAD59880671FF24684A66B1D796F9611A
3,812,822,801 UART: [art] SIG.S = 002AFC06D858EC1D57F716D58D21B6A572C95EE2F6E96780D262856C6712D947290B0CDC273C41106712972105C83309
3,814,127,975 UART: Caliptra RT
3,814,128,695 UART: [state] CFI Enabled
3,814,461,676 UART: [rt] RT listening for mailbox commands...
3,814,463,552 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,823,193,388 >>> mbox cmd response: success
3,823,227,396 UART:
3,823,227,671 UART: Running Caliptra FMC ...
3,823,228,794 UART:
3,823,228,960 UART: [state] CFI Enabled
3,823,322,878 UART: [art] Extend RT PCRs Done
3,823,324,080 UART: [art] Lock RT PCRs Done
3,823,325,757 UART: [art] Populate DV Done
3,823,331,280 UART: [fht] FMC Alias Private Key: 7
3,823,332,942 UART: [art] Derive CDI
3,823,333,765 UART: [art] Store in in slot 0x4
3,823,392,492 UART: [art] Derive Key Pair
3,823,393,497 UART: [art] Store priv key in slot 0x5
3,826,686,115 UART: [art] Derive Key Pair - Done
3,826,698,900 UART: [art] Signing Cert with AUTHO
3,826,700,208 UART: RITY.KEYID = 7
3,828,987,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,828,988,876 UART: [art] PUB.X = 4C862B65035038E43221307D0B92CEFE2A4E9D4B525AFA0FD66394244D7EA76DA4D25BCFAE3BECB0A8BE62250AB6891D
3,828,996,101 UART: [art] PUB.Y = 1429596C7ACAFD5AFA2C836234FF890614943DE9D80FE1EC6C3C421D7C9664ED42B763845B947D1B32713B158AE44114
3,829,003,368 UART: [art] SIG.R = EEA6BF15F8D78E4B42113CE7C7DBA971FC2192BABC0E06D233F2D9443381F0798597208B801B667B211B493A280BF47E
3,829,010,754 UART: [art] SIG.S = 511AFACE3851A434EFB05437AB39927049C10A641E3116197D829D6FB0D9F62B3703DF88E2B43CA7E9BB132C9262AED1
3,830,316,115 UART: Caliptra RT
3,830,316,816 UART: [state] CFI Enabled
3,830,647,677 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 406.60s
Truncated 1347769 bytes from beginning
UART: [art] Extend RT PCRs Done
3,518,011,148 UART: [art] Lock RT PCRs Done
3,518,012,761 UART: [art] Populate DV Done
3,518,017,960 UART: [fht] FMC Alias Private Key: 7
3,518,019,651 UART: [art] Derive CDI
3,518,020,474 UART: [art] Store in in slot 0x4
3,518,063,400 UART: [art] Derive Key Pair
3,518,064,402 UART: [art] Store priv key in slot 0x5
3,521,306,410 UART: [art] Derive Key Pair - Done
3,521,319,468 UART: [art] Signing Cert with AUTHO
3,521,320,779 UART: RITY.KEYID = 7
3,523,600,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,601,918 UART: [art] PUB.X = 029DB3FB940364EB31F74AD55BE8E996AF5838119E7E9EC5CC9A519A6FB0D118FD2BF3591AB7A202F01C4D103A030E27
3,523,609,190 UART: [art] PUB.Y = 6B9ED92AA0950A28478922109E6049BA8B7AF0A9131AB157627ECE645C9EEFDCB33DADF31CBED28798E1B76081F92738
3,523,616,568 UART: [art] SIG.R = 185B662215F8831138A5E1A27538990504ACFF9E78C67E4984496EF22615D09D3CC1369D8E832EA93295A089CF3ECE84
3,523,623,811 UART: [art] SIG.S = 37C84F9CBEB7A17C7C73ADFA3B2D1482026B8DFA6EED2219C933E472B5020E6081A1515973EB5547E72E52D620B6E6C0
3,524,929,332 UART: Caliptra RT
3,524,930,060 UART: [state] CFI Enabled
3,525,219,228 UART: [rt] RT listening for mailbox commands...
3,525,221,104 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,525,364,735 UART:
3,525,365,036 UART: Running Caliptra ROM ...
3,525,366,159 UART:
3,525,366,380 UART: [state] CFI Enabled
3,525,381,277 UART: [state] LifecycleState = Unprovisioned
3,525,383,226 UART: [state] DebugLocked = No
3,525,384,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,525,389,839 UART: [kat] SHA2-256
3,525,559,567 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,525,570,057 UART: [kat] ++
3,525,570,541 UART: [kat] sha1
3,525,582,882 UART: [kat] SHA2-256
3,525,585,624 UART: [kat] SHA2-384
3,525,592,762 UART: [kat] SHA2-512-ACC
3,525,595,174 UART: [kat] ECC-384
3,527,877,171 UART: [kat] HMAC-384Kdf
3,527,889,124 UART: [kat] LMS
3,529,079,215 UART: [kat] --
3,529,084,149 UART: [update-reset] ++
3,533,225,638 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,533,228,877 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,533,609,884 >>> mbox cmd response: success
3,533,610,754 UART: [update-reset] Copying MAN_2 To MAN_1
3,533,633,207 UART: [update-reset Success] --
3,533,637,538 UART: [state] Locking Datavault
3,533,639,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,533,641,483 UART: [state] Locking ICCM
3,533,644,148 UART: [exit] Launching FMC @ 0x40000130
3,533,652,604 UART:
3,533,652,860 UART: Running Caliptra FMC ...
3,533,653,963 UART:
3,533,654,121 UART: [state] CFI Enabled
3,533,697,927 UART: [art] Extend RT PCRs Done
3,533,699,112 UART: [art] Lock RT PCRs Done
3,533,700,462 UART: [art] Populate DV Done
3,533,705,930 UART: [fht] FMC Alias Private Key: 7
3,533,707,627 UART: [art] Derive CDI
3,533,708,361 UART: [art] Store in in slot 0x4
3,533,751,166 UART: [art] Derive Key Pair
3,533,752,164 UART: [art] Store priv key in slot 0x5
3,536,994,438 UART: [art] Derive Key Pair - Done
3,537,007,489 UART: [art] Signing Cert with AUTHO
3,537,008,799 UART: RITY.KEYID = 7
3,539,288,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,539,289,949 UART: [art] PUB.X = 791B5B57B8E6A46E78A30E1F33681DBE350C1C04C88342BB0B831F3DDF838E0B23ED414AC1A8D802D48AA6676400FD1D
3,539,297,527 UART: [art] PUB.Y = 925C9ABF1B76D9D7B9651EC0059123C99D62C4CCBFB9AA154F349BF87E2562097398F374E7997AD1CA8272F79A84C7EA
3,539,304,421 UART: [art] SIG.R = BDD899CC37AE1ED0B3AC595783F2BF1E28D8828E0EBA4B771D702C8F41C7EADB09705922D344EF9B63B31B953C60A023
3,539,311,847 UART: [art] SIG.S = B34640F25CA610C34D1238038A7CDEBDFECE0ECA46726E579446BB11F561F50969837DBADF7B3DFAFCDB7E08694395E4
3,540,616,859 UART: Caliptra RT
3,540,617,568 UART: [state] CFI Enabled
3,540,904,099 UART: [rt] RT listening for mailbox commands...
3,540,905,979 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,541,049,748 UART:
3,541,050,043 UART: Running Caliptra ROM ...
3,541,051,168 UART:
3,541,051,387 UART: [state] CFI Enabled
3,541,066,901 UART: [state] LifecycleState = Unprovisioned
3,541,068,830 UART: [state] DebugLocked = No
3,541,070,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,541,075,394 UART: [kat] SHA2-256
3,541,245,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,541,255,624 UART: [kat] ++
3,541,256,165 UART: [kat] sha1
3,541,265,546 UART: [kat] SHA2-256
3,541,268,237 UART: [kat] SHA2-384
3,541,273,626 UART: [kat] SHA2-512-ACC
3,541,276,027 UART: [kat] ECC-384
3,543,559,447 UART: [kat] HMAC-384Kdf
3,543,572,208 UART: [kat] LMS
3,544,762,261 UART: [kat] --
3,544,766,794 UART: [update-reset] ++
3,548,896,645 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,548,900,646 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,549,281,637 >>> mbox cmd response: success
3,549,282,886 UART: [update-reset] Copying MAN_2 To MAN_1
3,549,305,304 UART: [update-reset Success] --
3,549,309,778 UART: [state] Locking Datavault
3,549,313,162 UART: [state] Locking PCR0, PCR1 and PCR31
3,549,314,921 UART: [state] Locking ICCM
3,549,317,395 UART: [exit] Launching FMC @ 0x40000130
3,549,325,795 UART:
3,549,326,029 UART: Running Caliptra FMC ...
3,549,327,133 UART:
3,549,327,291 UART: [state] CFI Enabled
3,549,371,193 UART: [art] Extend RT PCRs Done
3,549,372,335 UART: [art] Lock RT PCRs Done
3,549,373,402 UART: [art] Populate DV Done
3,549,379,081 UART: [fht] FMC Alias Private Key: 7
3,549,380,823 UART: [art] Derive CDI
3,549,381,642 UART: [art] Store in in slot 0x4
3,549,424,450 UART: [art] Derive Key Pair
3,549,425,451 UART: [art] Store priv key in slot 0x5
3,552,667,857 UART: [art] Derive Key Pair - Done
3,552,680,827 UART: [art] Signing Cert with AUTHO
3,552,682,132 UART: RITY.KEYID = 7
3,554,961,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,963,408 UART: [art] PUB.X = 029DB3FB940364EB31F74AD55BE8E996AF5838119E7E9EC5CC9A519A6FB0D118FD2BF3591AB7A202F01C4D103A030E27
3,554,970,636 UART: [art] PUB.Y = 6B9ED92AA0950A28478922109E6049BA8B7AF0A9131AB157627ECE645C9EEFDCB33DADF31CBED28798E1B76081F92738
3,554,977,927 UART: [art] SIG.R = 185B662215F8831138A5E1A27538990504ACFF9E78C67E4984496EF22615D09D3CC1369D8E832EA93295A089CF3ECE84
3,554,985,246 UART: [art] SIG.S = 37C84F9CBEB7A17C7C73ADFA3B2D1482026B8DFA6EED2219C933E472B5020E6081A1515973EB5547E72E52D620B6E6C0
3,556,290,157 UART: Caliptra RT
3,556,290,881 UART: [state] CFI Enabled
3,556,579,581 UART: [rt] RT listening for mailbox commands...
3,556,581,453 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,556,725,513 UART:
3,556,725,810 UART: Running Caliptra ROM ...
3,556,726,936 UART:
3,556,727,153 UART: [state] CFI Enabled
3,556,743,254 UART: [state] LifecycleState = Unprovisioned
3,556,745,209 UART: [state] DebugLocked = No
3,556,746,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,556,751,740 UART: [kat] SHA2-256
3,556,921,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,556,931,994 UART: [kat] ++
3,556,932,451 UART: [kat] sha1
3,556,943,602 UART: [kat] SHA2-256
3,556,946,345 UART: [kat] SHA2-384
3,556,952,599 UART: [kat] SHA2-512-ACC
3,556,954,945 UART: [kat] ECC-384
3,559,238,215 UART: [kat] HMAC-384Kdf
3,559,249,428 UART: [kat] LMS
3,560,439,523 UART: [kat] --
3,560,444,507 UART: [update-reset] ++
3,564,585,919 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,564,589,647 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,564,970,622 >>> mbox cmd response: success
3,564,972,304 UART: [update-reset] Copying MAN_2 To MAN_1
3,564,994,744 UART: [update-reset Success] --
3,564,997,126 UART: [state] Locking Datavault
3,565,000,135 UART: [state] Locking PCR0, PCR1 and PCR31
3,565,001,859 UART: [state] Locking ICCM
3,565,003,531 UART: [exit] Launching FMC @ 0x40000130
3,565,011,936 UART:
3,565,012,172 UART: Running Caliptra FMC ...
3,565,013,277 UART:
3,565,013,439 UART: [state] CFI Enabled
3,565,058,521 UART: [art] Extend RT PCRs Done
3,565,059,714 UART: [art] Lock RT PCRs Done
3,565,061,241 UART: [art] Populate DV Done
3,565,066,548 UART: [fht] FMC Alias Private Key: 7
3,565,068,085 UART: [art] Derive CDI
3,565,068,922 UART: [art] Store in in slot 0x4
3,565,111,786 UART: [art] Derive Key Pair
3,565,112,789 UART: [art] Store priv key in slot 0x5
3,568,355,210 UART: [art] Derive Key Pair - Done
3,568,368,374 UART: [art] Signing Cert with AUTHO
3,568,369,671 UART: RITY.KEYID = 7
3,570,649,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,650,960 UART: [art] PUB.X = 791B5B57B8E6A46E78A30E1F33681DBE350C1C04C88342BB0B831F3DDF838E0B23ED414AC1A8D802D48AA6676400FD1D
3,570,658,242 UART: [art] PUB.Y = 925C9ABF1B76D9D7B9651EC0059123C99D62C4CCBFB9AA154F349BF87E2562097398F374E7997AD1CA8272F79A84C7EA
3,570,665,464 UART: [art] SIG.R = BDD899CC37AE1ED0B3AC595783F2BF1E28D8828E0EBA4B771D702C8F41C7EADB09705922D344EF9B63B31B953C60A023
3,570,672,883 UART: [art] SIG.S = B34640F25CA610C34D1238038A7CDEBDFECE0ECA46726E579446BB11F561F50969837DBADF7B3DFAFCDB7E08694395E4
3,571,977,863 UART: Caliptra RT
3,571,978,557 UART: [state] CFI Enabled
3,572,268,837 UART: [rt] RT listening for mailbox commands...
3,572,270,712 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,572,414,460 UART:
3,572,414,779 UART: Running Caliptra ROM ...
3,572,415,898 UART:
3,572,416,054 UART: [state] CFI Enabled
3,572,430,424 UART: [state] LifecycleState = Unprovisioned
3,572,432,333 UART: [state] DebugLocked = No
3,572,435,284 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,572,439,490 UART: [kat] SHA2-256
3,572,609,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,572,619,730 UART: [kat] ++
3,572,620,186 UART: [kat] sha1
3,572,631,447 UART: [kat] SHA2-256
3,572,634,145 UART: [kat] SHA2-384
3,572,640,516 UART: [kat] SHA2-512-ACC
3,572,642,862 UART: [kat] ECC-384
3,574,929,334 UART: [kat] HMAC-384Kdf
3,574,940,699 UART: [kat] LMS
3,576,130,789 UART: [kat] --
3,576,133,547 UART: [update-reset] ++
3,580,263,820 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,580,267,989 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
3,580,648,996 >>> mbox cmd response: success
3,580,649,485 UART: [update-reset] Copying MAN_2 To MAN_1
3,580,671,877 UART: [update-reset Success] --
3,580,676,629 UART: [state] Locking Datavault
3,580,678,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,580,680,253 UART: [state] Locking ICCM
3,580,681,807 UART: [exit] Launching FMC @ 0x40000130
3,580,690,201 UART:
3,580,690,436 UART: Running Caliptra FMC ...
3,580,691,533 UART:
3,580,691,692 UART: [state] CFI Enabled
3,580,735,813 UART: [art] Extend RT PCRs Done
3,580,737,172 UART: [art] Lock RT PCRs Done
3,580,738,473 UART: [art] Populate DV Done
3,580,744,216 UART: [fht] FMC Alias Private Key: 7
3,580,745,914 UART: [art] Derive CDI
3,580,746,673 UART: [art] Store in in slot 0x4
3,580,789,533 UART: [art] Derive Key Pair
3,580,790,533 UART: [art] Store priv key in slot 0x5
3,584,032,943 UART: [art] Derive Key Pair - Done
3,584,045,680 UART: [art] Signing Cert with AUTHO
3,584,046,994 UART: RITY.KEYID = 7
3,586,326,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,586,327,952 UART: [art] PUB.X = 029DB3FB940364EB31F74AD55BE8E996AF5838119E7E9EC5CC9A519A6FB0D118FD2BF3591AB7A202F01C4D103A030E27
3,586,335,227 UART: [art] PUB.Y = 6B9ED92AA0950A28478922109E6049BA8B7AF0A9131AB157627ECE645C9EEFDCB33DADF31CBED28798E1B76081F92738
3,586,342,480 UART: [art] SIG.R = 185B662215F8831138A5E1A27538990504ACFF9E78C67E4984496EF22615D09D3CC1369D8E832EA93295A089CF3ECE84
3,586,349,869 UART: [art] SIG.S = 37C84F9CBEB7A17C7C73ADFA3B2D1482026B8DFA6EED2219C933E472B5020E6081A1515973EB5547E72E52D620B6E6C0
3,587,655,243 UART: Caliptra RT
3,587,655,980 UART: [state] CFI Enabled
3,587,949,734 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 394.46s
Truncated 716351 bytes from beginning
E07B6DAE39BCF432BA08190EC474B20
3,631,272,822 UART: [art] SIG.R = E33000690A53B81FE67749C2C8848F779D81EA53C33E2BBF4C2074A35350DA02756FF64AC19AFAF13C2BB9736D2E3E02
3,631,280,183 UART: [art] SIG.S = DA5DC9C28D1C8C78659C3D2BB0024991788BEE258144793A614D7A2E0201C2D4566014C0A9F4886E32C9FC39DD8FE687
3,632,585,340 UART: Caliptra RT
3,632,586,039 UART: [state] CFI Enabled
3,632,878,792 UART: [rt] RT listening for mailbox commands...
3,632,880,670 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,641,527,128 >>> mbox cmd response: success
3,641,561,183 UART:
3,641,561,489 UART: Running Caliptra FMC ...
3,641,562,554 UART:
3,641,562,705 UART: [state] CFI Enabled
3,641,606,501 UART: [art] Extend RT PCRs Done
3,641,607,648 UART: [art] Lock RT PCRs Done
3,641,609,262 UART: [art] Populate DV Done
3,641,614,798 UART: [fht] FMC Alias Private Key: 7
3,641,616,331 UART: [art] Derive CDI
3,641,617,077 UART: [art] Store in in slot 0x4
3,641,659,684 UART: [art] Derive Key Pair
3,641,660,683 UART: [art] Store priv key in slot 0x5
3,644,902,358 UART: [art] Derive Key Pair - Done
3,644,915,352 UART: [art] Signing Cert with AUTHO
3,644,916,663 UART: RITY.KEYID = 7
3,647,196,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,197,592 UART: [art] PUB.X = 55116C185B981DB823FBD3A46CAAA1804302B52F3878C7F3ECA13F645ADA19CCADA6C1F969C5269058907F38E5D7B690
3,647,204,837 UART: [art] PUB.Y = 87F3C046F2200CE49D7B4621CDB52B596697A9BB3927B86EF98DDB571E69CEF2995A3778AF69C35B36984D8033989B64
3,647,212,066 UART: [art] SIG.R = AA466BE7D0DABDCE14CDA8A33EB955FE995C92D85EA057089AB214370AB0D74EA1E5710912B41D64748A7C9661800DA0
3,647,219,515 UART: [art] SIG.S = 84A283821C86E476050494A2637DEBAA66143867DA14F50754EF759F4865D84C7BAFF6AC753F99579AB72898B01AB32E
3,648,524,924 UART: Caliptra RT
3,648,525,640 UART: [state] CFI Enabled
3,648,818,180 UART: [rt] RT listening for mailbox commands...
3,648,820,079 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,658,021,882 >>> mbox cmd response: success
3,658,056,663 UART:
3,658,056,945 UART: Running Caliptra FMC ...
3,658,058,066 UART:
3,658,058,236 UART: [state] CFI Enabled
3,658,102,541 UART: [art] Extend RT PCRs Done
3,658,103,732 UART: [art] Lock RT PCRs Done
3,658,105,080 UART: [art] Populate DV Done
3,658,110,448 UART: [fht] FMC Alias Private Key: 7
3,658,112,040 UART: [art] Derive CDI
3,658,112,808 UART: [art] Store in in slot 0x4
3,658,155,619 UART: [art] Derive Key Pair
3,658,156,621 UART: [art] Store priv key in slot 0x5
3,661,398,899 UART: [art] Derive Key Pair - Done
3,661,412,117 UART: [art] Signing Cert with AUTHO
3,661,413,446 UART: RITY.KEYID = 7
3,663,692,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,694,072 UART: [art] PUB.X = 6E76CB3E042C02997086958D7225F453D300E1D9BF2DCC63012165B27753E0F1EC6F4A7BB7505523771DA88B427D01C6
3,663,701,345 UART: [art] PUB.Y = 65B308D5C19CDE3D121AB72453827DF5E0B2F82955451BF471081AC2564755204E07B6DAE39BCF432BA08190EC474B20
3,663,708,588 UART: [art] SIG.R = E33000690A53B81FE67749C2C8848F779D81EA53C33E2BBF4C2074A35350DA02756FF64AC19AFAF13C2BB9736D2E3E02
3,663,715,954 UART: [art] SIG.S = DA5DC9C28D1C8C78659C3D2BB0024991788BEE258144793A614D7A2E0201C2D4566014C0A9F4886E32C9FC39DD8FE687
3,665,020,578 UART: Caliptra RT
3,665,021,302 UART: [state] CFI Enabled
3,665,312,721 UART: [rt] RT listening for mailbox commands...
3,665,314,600 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,673,960,267 >>> mbox cmd response: success
3,673,994,873 UART:
3,673,995,147 UART: Running Caliptra FMC ...
3,673,996,202 UART:
3,673,996,351 UART: [state] CFI Enabled
3,674,040,424 UART: [art] Extend RT PCRs Done
3,674,041,639 UART: [art] Lock RT PCRs Done
3,674,042,839 UART: [art] Populate DV Done
3,674,048,145 UART: [fht] FMC Alias Private Key: 7
3,674,049,632 UART: [art] Derive CDI
3,674,050,372 UART: [art] Store in in slot 0x4
3,674,093,186 UART: [art] Derive Key Pair
3,674,094,194 UART: [art] Store priv key in slot 0x5
3,677,335,986 UART: [art] Derive Key Pair - Done
3,677,348,989 UART: [art] Signing Cert with AUTHO
3,677,350,301 UART: RITY.KEYID = 7
3,679,629,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,631,201 UART: [art] PUB.X = 55116C185B981DB823FBD3A46CAAA1804302B52F3878C7F3ECA13F645ADA19CCADA6C1F969C5269058907F38E5D7B690
3,679,638,397 UART: [art] PUB.Y = 87F3C046F2200CE49D7B4621CDB52B596697A9BB3927B86EF98DDB571E69CEF2995A3778AF69C35B36984D8033989B64
3,679,645,620 UART: [art] SIG.R = AA466BE7D0DABDCE14CDA8A33EB955FE995C92D85EA057089AB214370AB0D74EA1E5710912B41D64748A7C9661800DA0
3,679,653,001 UART: [art] SIG.S = 84A283821C86E476050494A2637DEBAA66143867DA14F50754EF759F4865D84C7BAFF6AC753F99579AB72898B01AB32E
3,680,958,077 UART: Caliptra RT
3,680,958,808 UART: [state] CFI Enabled
3,681,247,361 UART: [rt] RT listening for mailbox commands...
3,681,249,239 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,689,901,398 >>> mbox cmd response: success
3,689,936,588 UART:
3,689,936,890 UART: Running Caliptra FMC ...
3,689,937,925 UART:
3,689,938,072 UART: [state] CFI Enabled
3,689,982,265 UART: [art] Extend RT PCRs Done
3,689,983,411 UART: [art] Lock RT PCRs Done
3,689,984,886 UART: [art] Populate DV Done
3,689,990,291 UART: [fht] FMC Alias Private Key: 7
3,689,991,773 UART: [art] Derive CDI
3,689,992,503 UART: [art] Store in in slot 0x4
3,690,035,631 UART: [art] Derive Key Pair
3,690,036,677 UART: [art] Store priv key in slot 0x5
3,693,278,650 UART: [art] Derive Key Pair - Done
3,693,291,496 UART: [art] Signing Cert with AUTHO
3,693,292,808 UART: RITY.KEYID = 7
3,695,572,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,695,573,607 UART: [art] PUB.X = 6E76CB3E042C02997086958D7225F453D300E1D9BF2DCC63012165B27753E0F1EC6F4A7BB7505523771DA88B427D01C6
3,695,580,824 UART: [art] PUB.Y = 65B308D5C19CDE3D121AB72453827DF5E0B2F82955451BF471081AC2564755204E07B6DAE39BCF432BA08190EC474B20
3,695,588,101 UART: [art] SIG.R = E33000690A53B81FE67749C2C8848F779D81EA53C33E2BBF4C2074A35350DA02756FF64AC19AFAF13C2BB9736D2E3E02
3,695,595,461 UART: [art] SIG.S = DA5DC9C28D1C8C78659C3D2BB0024991788BEE258144793A614D7A2E0201C2D4566014C0A9F4886E32C9FC39DD8FE687
3,696,900,784 UART: Caliptra RT
3,696,901,484 UART: [state] CFI Enabled
3,697,191,833 UART: [rt] RT listening for mailbox commands...
3,697,193,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,705,850,465 >>> mbox cmd response: success
3,705,882,906 UART:
3,705,883,229 UART: Running Caliptra FMC ...
3,705,884,352 UART:
3,705,884,531 UART: [state] CFI Enabled
3,705,928,983 UART: [art] Extend RT PCRs Done
3,705,930,131 UART: [art] Lock RT PCRs Done
3,705,931,794 UART: [art] Populate DV Done
3,705,937,262 UART: [fht] FMC Alias Private Key: 7
3,705,938,905 UART: [art] Derive CDI
3,705,939,671 UART: [art] Store in in slot 0x4
3,705,982,012 UART: [art] Derive Key Pair
3,705,983,023 UART: [art] Store priv key in slot 0x5
3,709,224,709 UART: [art] Derive Key Pair - Done
3,709,237,545 UART: [art] Signing Cert with AUTHO
3,709,238,847 UART: RITY.KEYID = 7
3,711,518,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,711,519,636 UART: [art] PUB.X = 55116C185B981DB823FBD3A46CAAA1804302B52F3878C7F3ECA13F645ADA19CCADA6C1F969C5269058907F38E5D7B690
3,711,526,876 UART: [art] PUB.Y = 87F3C046F2200CE49D7B4621CDB52B596697A9BB3927B86EF98DDB571E69CEF2995A3778AF69C35B36984D8033989B64
3,711,534,105 UART: [art] SIG.R = AA466BE7D0DABDCE14CDA8A33EB955FE995C92D85EA057089AB214370AB0D74EA1E5710912B41D64748A7C9661800DA0
3,711,541,582 UART: [art] SIG.S = 84A283821C86E476050494A2637DEBAA66143867DA14F50754EF759F4865D84C7BAFF6AC753F99579AB72898B01AB32E
3,712,845,840 UART: Caliptra RT
3,712,846,552 UART: [state] CFI Enabled
3,713,137,245 UART: [rt] RT listening for mailbox commands...
3,713,139,123 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,721,789,044 >>> mbox cmd response: success
3,721,821,327 UART:
3,721,821,599 UART: Running Caliptra FMC ...
3,721,822,713 UART:
3,721,822,872 UART: [state] CFI Enabled
3,721,866,842 UART: [art] Extend RT PCRs Done
3,721,868,027 UART: [art] Lock RT PCRs Done
3,721,869,326 UART: [art] Populate DV Done
3,721,875,004 UART: [fht] FMC Alias Private Key: 7
3,721,876,623 UART: [art] Derive CDI
3,721,877,445 UART: [art] Store in in slot 0x4
3,721,920,279 UART: [art] Derive Key Pair
3,721,921,282 UART: [art] Store priv key in slot 0x5
3,725,163,618 UART: [art] Derive Key Pair - Done
3,725,176,300 UART: [art] Signing Cert with AUTHO
3,725,177,602 UART: RITY.KEYID = 7
3,727,457,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,458,638 UART: [art] PUB.X = 6E76CB3E042C02997086958D7225F453D300E1D9BF2DCC63012165B27753E0F1EC6F4A7BB7505523771DA88B427D01C6
3,727,465,873 UART: [art] PUB.Y = 65B308D5C19CDE3D121AB72453827DF5E0B2F82955451BF471081AC2564755204E07B6DAE39BCF432BA08190EC474B20
3,727,473,158 UART: [art] SIG.R = E33000690A53B81FE67749C2C8848F779D81EA53C33E2BBF4C2074A35350DA02756FF64AC19AFAF13C2BB9736D2E3E02
3,727,480,487 UART: [art] SIG.S = DA5DC9C28D1C8C78659C3D2BB0024991788BEE258144793A614D7A2E0201C2D4566014C0A9F4886E32C9FC39DD8FE687
3,728,785,732 UART: Caliptra RT
3,728,786,449 UART: [state] CFI Enabled
3,729,075,060 UART: [rt] RT listening for mailbox commands...
3,729,076,955 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,738,259,447 >>> mbox cmd response: success
3,738,295,509 UART:
3,738,295,809 UART: Running Caliptra FMC ...
3,738,296,844 UART:
3,738,296,992 UART: [state] CFI Enabled
3,738,341,070 UART: [art] Extend RT PCRs Done
3,738,342,270 UART: [art] Lock RT PCRs Done
3,738,343,647 UART: [art] Populate DV Done
3,738,349,276 UART: [fht] FMC Alias Private Key: 7
3,738,350,919 UART: [art] Derive CDI
3,738,351,654 UART: [art] Store in in slot 0x4
3,738,394,674 UART: [art] Derive Key Pair
3,738,395,674 UART: [art] Store priv key in slot 0x5
3,741,637,984 UART: [art] Derive Key Pair - Done
3,741,650,882 UART: [art] Signing Cert with AUTHO
3,741,652,195 UART: RITY.KEYID = 7
3,743,931,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,743,932,907 UART: [art] PUB.X = 55116C185B981DB823FBD3A46CAAA1804302B52F3878C7F3ECA13F645ADA19CCADA6C1F969C5269058907F38E5D7B690
3,743,940,195 UART: [art] PUB.Y = 87F3C046F2200CE49D7B4621CDB52B596697A9BB3927B86EF98DDB571E69CEF2995A3778AF69C35B36984D8033989B64
3,743,947,377 UART: [art] SIG.R = AA466BE7D0DABDCE14CDA8A33EB955FE995C92D85EA057089AB214370AB0D74EA1E5710912B41D64748A7C9661800DA0
3,743,954,759 UART: [art] SIG.S = 84A283821C86E476050494A2637DEBAA66143867DA14F50754EF759F4865D84C7BAFF6AC753F99579AB72898B01AB32E
3,745,259,717 UART: Caliptra RT
3,745,260,409 UART: [state] CFI Enabled
3,745,550,013 UART: [rt] RT listening for mailbox commands...
3,745,551,916 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,754,189,442 >>> mbox cmd response: success
3,754,225,613 UART:
3,754,225,890 UART: Running Caliptra FMC ...
3,754,227,003 UART:
3,754,227,171 UART: [state] CFI Enabled
3,754,271,224 UART: [art] Extend RT PCRs Done
3,754,272,407 UART: [art] Lock RT PCRs Done
3,754,274,190 UART: [art] Populate DV Done
3,754,279,762 UART: [fht] FMC Alias Private Key: 7
3,754,281,369 UART: [art] Derive CDI
3,754,282,188 UART: [art] Store in in slot 0x4
3,754,324,677 UART: [art] Derive Key Pair
3,754,325,678 UART: [art] Store priv key in slot 0x5
3,757,567,859 UART: [art] Derive Key Pair - Done
3,757,581,181 UART: [art] Signing Cert with AUTHO
3,757,582,483 UART: RITY.KEYID = 7
3,759,862,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,759,863,674 UART: [art] PUB.X = 6E76CB3E042C02997086958D7225F453D300E1D9BF2DCC63012165B27753E0F1EC6F4A7BB7505523771DA88B427D01C6
3,759,870,907 UART: [art] PUB.Y = 65B308D5C19CDE3D121AB72453827DF5E0B2F82955451BF471081AC2564755204E07B6DAE39BCF432BA08190EC474B20
3,759,878,191 UART: [art] SIG.R = E33000690A53B81FE67749C2C8848F779D81EA53C33E2BBF4C2074A35350DA02756FF64AC19AFAF13C2BB9736D2E3E02
3,759,885,550 UART: [art] SIG.S = DA5DC9C28D1C8C78659C3D2BB0024991788BEE258144793A614D7A2E0201C2D4566014C0A9F4886E32C9FC39DD8FE687
3,761,190,538 UART: Caliptra RT
3,761,191,595 UART: [state] CFI Enabled
3,761,482,690 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 403.14s
Truncated 1329472 bytes from beginning
RT:
2,176,311,713 UART: Running Caliptra FMC ...
2,176,312,814 UART:
2,176,312,975 UART: [state] CFI Enabled
2,176,406,210 UART: [art] Extend RT PCRs Done
2,176,407,406 UART: [art] Lock RT PCRs Done
2,176,408,972 UART: [art] Populate DV Done
2,176,414,598 UART: [fht] FMC Alias Private Key: 7
2,176,416,295 UART: [art] Derive CDI
2,176,417,108 UART: [art] Store in in slot 0x4
2,176,475,067 UART: [art] Derive Key Pair
2,176,476,115 UART: [art] Store priv key in slot 0x5
2,178,938,753 UART: [art] Derive Key Pair - Done
2,178,951,486 UART: [art] Signing Cert with AUTHO
2,178,952,792 UART: RITY.KEYID = 7
2,180,664,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,666,050 UART: [art] PUB.X = C64D047FFFD32F7D44D93B7CE5AD5F5DF26175A7BA84304A7B05000C44D9545ED459A3FA84E2E4DB69B44BBDB3785A17
2,180,673,291 UART: [art] PUB.Y = A457E4D957D250B1724097D9DBB5E1C579D2A0B616992E68FA436D7DC8648425C8BF06F4690F78FBB30BD2340E4BEDB0
2,180,680,568 UART: [art] SIG.R = BFABC11BB6A97D87D8478817EB79E850A4FD6A5FE6F3A9DA065EBCB4320DE0951258F99B56810709476741AC6985B039
2,180,687,944 UART: [art] SIG.S = B96047DF692D0C542DEEAF88673DE8CFB28C599561C7D7EC13FB6CA851EB5576F47C2DC837F62F240B57FD105B0FE547
2,181,666,888 UART: Caliptra RT
2,181,667,588 UART: [state] CFI Enabled
2,182,000,109 UART: [rt] RT listening for mailbox commands...
2,182,001,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,182,146,744 UART:
2,182,147,067 UART: Running Caliptra ROM ...
2,182,148,115 UART:
2,182,148,268 UART: [state] CFI Enabled
2,182,216,180 UART: [state] LifecycleState = Unprovisioned
2,182,218,068 UART: [state] DebugLocked = No
2,182,219,975 UART: [state] WD Timer not started. Device not locked for debugging
2,182,223,074 UART: [kat] SHA2-256
2,182,402,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,413,789 UART: [kat] ++
2,182,414,260 UART: [kat] sha1
2,182,424,030 UART: [kat] SHA2-256
2,182,427,043 UART: [kat] SHA2-384
2,182,433,685 UART: [kat] SHA2-512-ACC
2,182,436,624 UART: [kat] ECC-384
2,184,881,270 UART: [kat] HMAC-384Kdf
2,184,905,320 UART: [kat] LMS
2,185,434,809 UART: [kat] --
2,185,440,201 UART: [update-reset] ++
2,188,868,574 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,188,872,018 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,189,254,072 >>> mbox cmd response: success
2,189,255,055 UART: [update-reset] Copying MAN_2 To MAN_1
2,189,277,399 UART: [update-reset Success] --
2,189,282,899 UART: [state] Locking Datavault
2,189,285,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,189,287,424 UART: [state] Locking ICCM
2,189,290,092 UART: [exit] Launching FMC @ 0x40000130
2,189,298,489 UART:
2,189,298,721 UART: Running Caliptra FMC ...
2,189,299,819 UART:
2,189,299,976 UART: [state] CFI Enabled
2,189,395,949 UART: [art] Extend RT PCRs Done
2,189,397,142 UART: [art] Lock RT PCRs Done
2,189,398,691 UART: [art] Populate DV Done
2,189,403,990 UART: [fht] FMC Alias Private Key: 7
2,189,405,633 UART: [art] Derive CDI
2,189,406,448 UART: [art] Store in in slot 0x4
2,189,465,169 UART: [art] Derive Key Pair
2,189,466,208 UART: [art] Store priv key in slot 0x5
2,191,929,316 UART: [art] Derive Key Pair - Done
2,191,942,163 UART: [art] Signing Cert with AUTHO
2,191,943,464 UART: RITY.KEYID = 7
2,193,654,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,193,655,776 UART: [art] PUB.X = C8D211FEEE61F5CAC438FAB4BBC8B8F675370D38851037325614A83510478FA54FE1B1FBD6F3FDFACC744A658BAC5C2B
2,193,663,011 UART: [art] PUB.Y = 623B1E9814469AE28884CDC95B23DA8CD337921491FBF710CFABCBE3EB454988572A70406C5CAAC2E7FABB6648506517
2,193,670,290 UART: [art] SIG.R = 56B70A60BFB31D7CC5FE66D988435CB700812E6F2D177E7744894CD4C25BA5E94F48D4E99A39558E84CBFDDAC7C8B1C9
2,193,677,655 UART: [art] SIG.S = B379DB60C27AF933C613CA7FBBA701DDC27A553275D56CA7BC62BAEC27984F83F164E6218FAE719CF8F20063603298CF
2,194,656,565 UART: Caliptra RT
2,194,657,281 UART: [state] CFI Enabled
2,194,992,532 UART: [rt] RT listening for mailbox commands...
2,194,994,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,195,138,719 UART:
2,195,139,025 UART: Running Caliptra ROM ...
2,195,140,067 UART:
2,195,140,223 UART: [state] CFI Enabled
2,195,212,030 UART: [state] LifecycleState = Unprovisioned
2,195,213,919 UART: [state] DebugLocked = No
2,195,216,035 UART: [state] WD Timer not started. Device not locked for debugging
2,195,219,677 UART: [kat] SHA2-256
2,195,398,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,195,410,401 UART: [kat] ++
2,195,410,860 UART: [kat] sha1
2,195,421,205 UART: [kat] SHA2-256
2,195,424,218 UART: [kat] SHA2-384
2,195,430,526 UART: [kat] SHA2-512-ACC
2,195,433,471 UART: [kat] ECC-384
2,197,895,968 UART: [kat] HMAC-384Kdf
2,197,917,804 UART: [kat] LMS
2,198,447,261 UART: [kat] --
2,198,450,769 UART: [update-reset] ++
2,201,881,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,201,885,650 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,202,267,722 >>> mbox cmd response: success
2,202,269,514 UART: [update-reset] Copying MAN_2 To MAN_1
2,202,291,798 UART: [update-reset Success] --
2,202,296,578 UART: [state] Locking Datavault
2,202,300,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,202,302,513 UART: [state] Locking ICCM
2,202,303,585 UART: [exit] Launching FMC @ 0x40000130
2,202,312,037 UART:
2,202,312,277 UART: Running Caliptra FMC ...
2,202,313,378 UART:
2,202,313,540 UART: [state] CFI Enabled
2,202,408,290 UART: [art] Extend RT PCRs Done
2,202,409,482 UART: [art] Lock RT PCRs Done
2,202,410,675 UART: [art] Populate DV Done
2,202,416,245 UART: [fht] FMC Alias Private Key: 7
2,202,417,958 UART: [art] Derive CDI
2,202,418,775 UART: [art] Store in in slot 0x4
2,202,478,087 UART: [art] Derive Key Pair
2,202,479,130 UART: [art] Store priv key in slot 0x5
2,204,942,144 UART: [art] Derive Key Pair - Done
2,204,955,194 UART: [art] Signing Cert with AUTHO
2,204,956,497 UART: RITY.KEYID = 7
2,206,667,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,206,669,491 UART: [art] PUB.X = C64D047FFFD32F7D44D93B7CE5AD5F5DF26175A7BA84304A7B05000C44D9545ED459A3FA84E2E4DB69B44BBDB3785A17
2,206,676,784 UART: [art] PUB.Y = A457E4D957D250B1724097D9DBB5E1C579D2A0B616992E68FA436D7DC8648425C8BF06F4690F78FBB30BD2340E4BEDB0
2,206,684,001 UART: [art] SIG.R = BFABC11BB6A97D87D8478817EB79E850A4FD6A5FE6F3A9DA065EBCB4320DE0951258F99B56810709476741AC6985B039
2,206,691,401 UART: [art] SIG.S = B96047DF692D0C542DEEAF88673DE8CFB28C599561C7D7EC13FB6CA851EB5576F47C2DC837F62F240B57FD105B0FE547
2,207,669,912 UART: Caliptra RT
2,207,670,635 UART: [state] CFI Enabled
2,208,008,895 UART: [rt] RT listening for mailbox commands...
2,208,010,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,208,155,250 UART:
2,208,155,557 UART: Running Caliptra ROM ...
2,208,156,596 UART:
2,208,156,746 UART: [state] CFI Enabled
2,208,224,276 UART: [state] LifecycleState = Unprovisioned
2,208,226,159 UART: [state] DebugLocked = No
2,208,228,926 UART: [state] WD Timer not started. Device not locked for debugging
2,208,232,831 UART: [kat] SHA2-256
2,208,411,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,423,502 UART: [kat] ++
2,208,424,196 UART: [kat] sha1
2,208,433,954 UART: [kat] SHA2-256
2,208,436,981 UART: [kat] SHA2-384
2,208,442,967 UART: [kat] SHA2-512-ACC
2,208,445,905 UART: [kat] ECC-384
2,210,906,102 UART: [kat] HMAC-384Kdf
2,210,931,254 UART: [kat] LMS
2,211,460,661 UART: [kat] --
2,211,467,313 UART: [update-reset] ++
2,214,889,150 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,214,892,321 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,215,274,342 >>> mbox cmd response: success
2,215,275,481 UART: [update-reset] Copying MAN_2 To MAN_1
2,215,297,819 UART: [update-reset Success] --
2,215,303,295 UART: [state] Locking Datavault
2,215,306,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,215,308,503 UART: [state] Locking ICCM
2,215,310,257 UART: [exit] Launching FMC @ 0x40000130
2,215,318,652 UART:
2,215,318,884 UART: Running Caliptra FMC ...
2,215,319,909 UART:
2,215,320,057 UART: [state] CFI Enabled
2,215,421,984 UART: [art] Extend RT PCRs Done
2,215,423,183 UART: [art] Lock RT PCRs Done
2,215,424,670 UART: [art] Populate DV Done
2,215,429,805 UART: [fht] FMC Alias Private Key: 7
2,215,431,390 UART: [art] Derive CDI
2,215,432,129 UART: [art] Store in in slot 0x4
2,215,491,163 UART: [art] Derive Key Pair
2,215,492,205 UART: [art] Store priv key in slot 0x5
2,217,955,523 UART: [art] Derive Key Pair - Done
2,217,968,917 UART: [art] Signing Cert with AUTHO
2,217,970,230 UART: RITY.KEYID = 7
2,219,681,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,219,682,610 UART: [art] PUB.X = C8D211FEEE61F5CAC438FAB4BBC8B8F675370D38851037325614A83510478FA54FE1B1FBD6F3FDFACC744A658BAC5C2B
2,219,689,904 UART: [art] PUB.Y = 623B1E9814469AE28884CDC95B23DA8CD337921491FBF710CFABCBE3EB454988572A70406C5CAAC2E7FABB6648506517
2,219,697,130 UART: [art] SIG.R = 56B70A60BFB31D7CC5FE66D988435CB700812E6F2D177E7744894CD4C25BA5E94F48D4E99A39558E84CBFDDAC7C8B1C9
2,219,704,649 UART: [art] SIG.S = B379DB60C27AF933C613CA7FBBA701DDC27A553275D56CA7BC62BAEC27984F83F164E6218FAE719CF8F20063603298CF
2,220,684,096 UART: Caliptra RT
2,220,684,804 UART: [state] CFI Enabled
2,221,014,677 UART: [rt] RT listening for mailbox commands...
2,221,016,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,221,160,767 UART:
2,221,161,081 UART: Running Caliptra ROM ...
2,221,162,210 UART:
2,221,162,371 UART: [state] CFI Enabled
2,221,236,798 UART: [state] LifecycleState = Unprovisioned
2,221,238,671 UART: [state] DebugLocked = No
2,221,239,947 UART: [state] WD Timer not started. Device not locked for debugging
2,221,243,432 UART: [kat] SHA2-256
2,221,422,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,434,116 UART: [kat] ++
2,221,434,654 UART: [kat] sha1
2,221,444,959 UART: [kat] SHA2-256
2,221,447,982 UART: [kat] SHA2-384
2,221,454,885 UART: [kat] SHA2-512-ACC
2,221,457,833 UART: [kat] ECC-384
2,223,920,146 UART: [kat] HMAC-384Kdf
2,223,942,961 UART: [kat] LMS
2,224,472,376 UART: [kat] --
2,224,476,477 UART: [update-reset] ++
2,227,902,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,227,904,973 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,228,286,967 >>> mbox cmd response: success
2,228,287,945 UART: [update-reset] Copying MAN_2 To MAN_1
2,228,310,288 UART: [update-reset Success] --
2,228,314,951 UART: [state] Locking Datavault
2,228,318,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,228,320,006 UART: [state] Locking ICCM
2,228,322,622 UART: [exit] Launching FMC @ 0x40000130
2,228,331,037 UART:
2,228,331,286 UART: Running Caliptra FMC ...
2,228,332,314 UART:
2,228,332,464 UART: [state] CFI Enabled
2,228,431,882 UART: [art] Extend RT PCRs Done
2,228,433,089 UART: [art] Lock RT PCRs Done
2,228,434,745 UART: [art] Populate DV Done
2,228,440,207 UART: [fht] FMC Alias Private Key: 7
2,228,441,798 UART: [art] Derive CDI
2,228,442,539 UART: [art] Store in in slot 0x4
2,228,501,194 UART: [art] Derive Key Pair
2,228,502,197 UART: [art] Store priv key in slot 0x5
2,230,965,287 UART: [art] Derive Key Pair - Done
2,230,978,286 UART: [art] Signing Cert with AUTHO
2,230,979,590 UART: RITY.KEYID = 7
2,232,690,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,692,267 UART: [art] PUB.X = C64D047FFFD32F7D44D93B7CE5AD5F5DF26175A7BA84304A7B05000C44D9545ED459A3FA84E2E4DB69B44BBDB3785A17
2,232,699,479 UART: [art] PUB.Y = A457E4D957D250B1724097D9DBB5E1C579D2A0B616992E68FA436D7DC8648425C8BF06F4690F78FBB30BD2340E4BEDB0
2,232,706,755 UART: [art] SIG.R = BFABC11BB6A97D87D8478817EB79E850A4FD6A5FE6F3A9DA065EBCB4320DE0951258F99B56810709476741AC6985B039
2,232,714,144 UART: [art] SIG.S = B96047DF692D0C542DEEAF88673DE8CFB28C599561C7D7EC13FB6CA851EB5576F47C2DC837F62F240B57FD105B0FE547
2,233,692,879 UART: Caliptra RT
2,233,693,584 UART: [state] CFI Enabled
2,234,034,088 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 326.77s
Truncated 714793 bytes from beginning
77A7417326253C189E263E0818700F9
2,053,827,996 UART: [art] SIG.R = 57FC63BF271BBD408A824A0E2BE9B6DF453AC433B43256ECA14D74BE5938988C5A9BA3BC7FC4C31D1FAB1DAAEE7E9479
2,053,835,424 UART: [art] SIG.S = BA52F13D34525285CB86557111ACD6D0FD626F0653A6BFCC80C764A224E16D51611BFF1BF213E622A427C5B202420845
2,054,814,417 UART: Caliptra RT
2,054,815,113 UART: [state] CFI Enabled
2,055,147,776 UART: [rt] RT listening for mailbox commands...
2,055,149,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,062,262,987 >>> mbox cmd response: success
2,062,297,691 UART:
2,062,297,971 UART: Running Caliptra FMC ...
2,062,299,009 UART:
2,062,299,167 UART: [state] CFI Enabled
2,062,392,731 UART: [art] Extend RT PCRs Done
2,062,393,935 UART: [art] Lock RT PCRs Done
2,062,395,372 UART: [art] Populate DV Done
2,062,401,074 UART: [fht] FMC Alias Private Key: 7
2,062,402,714 UART: [art] Derive CDI
2,062,403,462 UART: [art] Store in in slot 0x4
2,062,462,286 UART: [art] Derive Key Pair
2,062,463,292 UART: [art] Store priv key in slot 0x5
2,064,926,145 UART: [art] Derive Key Pair - Done
2,064,939,365 UART: [art] Signing Cert with AUTHO
2,064,940,671 UART: RITY.KEYID = 7
2,066,651,625 UART: [art] Erasing AUTHORITY.KEYID = 7
2,066,653,161 UART: [art] PUB.X = B8D5A8CE1728D64DA11E3E486F888FFDC29B3BB15E0221D90F68A66B96A0EBAF59ABBC8A7208B7D860354D22C51EC160
2,066,660,416 UART: [art] PUB.Y = A2F0AEAAACCC775E047199B26A233BDC0ECF5BEC5395A84B1F612A03509BE3B8C6D240650BFD0B5EE15C919612F77E0D
2,066,667,709 UART: [art] SIG.R = 904F58A17622BD1E0FC94BED8325F7879697F790665548F91180BAFDA67B3638286D6237D8E51165D3395C236FE43A47
2,066,675,095 UART: [art] SIG.S = 577E24D69953CA427DC0D90E6C3A4DACE1C599B23E9336E2E4DF13F06DCCD19A9AB6C3FF962D405320F5AB630F750A85
2,067,654,163 UART: Caliptra RT
2,067,654,888 UART: [state] CFI Enabled
2,067,990,576 UART: [rt] RT listening for mailbox commands...
2,067,992,454 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,075,127,817 >>> mbox cmd response: success
2,075,162,699 UART:
2,075,162,978 UART: Running Caliptra FMC ...
2,075,164,017 UART:
2,075,164,173 UART: [state] CFI Enabled
2,075,253,349 UART: [art] Extend RT PCRs Done
2,075,254,536 UART: [art] Lock RT PCRs Done
2,075,255,639 UART: [art] Populate DV Done
2,075,261,231 UART: [fht] FMC Alias Private Key: 7
2,075,262,774 UART: [art] Derive CDI
2,075,263,515 UART: [art] Store in in slot 0x4
2,075,322,662 UART: [art] Derive Key Pair
2,075,323,706 UART: [art] Store priv key in slot 0x5
2,077,786,746 UART: [art] Derive Key Pair - Done
2,077,799,530 UART: [art] Signing Cert with AUTHO
2,077,800,835 UART: RITY.KEYID = 7
2,079,512,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,079,513,912 UART: [art] PUB.X = FC9DC71F545F06FA5E39931ED4FFE1BE6C28723EB11681A936B899DCB345540478395568B6E8E166FBF85A252C9A4CC1
2,079,521,172 UART: [art] PUB.Y = 4D3194B92CAB8DA809F79CC24F35A07A88A2343E86646CD414533B3DC5B7BC3FE77A7417326253C189E263E0818700F9
2,079,528,390 UART: [art] SIG.R = 57FC63BF271BBD408A824A0E2BE9B6DF453AC433B43256ECA14D74BE5938988C5A9BA3BC7FC4C31D1FAB1DAAEE7E9479
2,079,535,830 UART: [art] SIG.S = BA52F13D34525285CB86557111ACD6D0FD626F0653A6BFCC80C764A224E16D51611BFF1BF213E622A427C5B202420845
2,080,514,759 UART: Caliptra RT
2,080,515,476 UART: [state] CFI Enabled
2,080,855,347 UART: [rt] RT listening for mailbox commands...
2,080,857,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,087,991,572 >>> mbox cmd response: success
2,088,026,445 UART:
2,088,026,752 UART: Running Caliptra FMC ...
2,088,027,878 UART:
2,088,028,052 UART: [state] CFI Enabled
2,088,117,203 UART: [art] Extend RT PCRs Done
2,088,118,395 UART: [art] Lock RT PCRs Done
2,088,119,935 UART: [art] Populate DV Done
2,088,125,240 UART: [fht] FMC Alias Private Key: 7
2,088,126,890 UART: [art] Derive CDI
2,088,127,632 UART: [art] Store in in slot 0x4
2,088,186,075 UART: [art] Derive Key Pair
2,088,187,122 UART: [art] Store priv key in slot 0x5
2,090,649,542 UART: [art] Derive Key Pair - Done
2,090,662,386 UART: [art] Signing Cert with AUTHO
2,090,663,722 UART: RITY.KEYID = 7
2,092,376,755 UART: [art] Erasing AUTHORITY.KEYID = 7
2,092,378,258 UART: [art] PUB.X = B8D5A8CE1728D64DA11E3E486F888FFDC29B3BB15E0221D90F68A66B96A0EBAF59ABBC8A7208B7D860354D22C51EC160
2,092,385,547 UART: [art] PUB.Y = A2F0AEAAACCC775E047199B26A233BDC0ECF5BEC5395A84B1F612A03509BE3B8C6D240650BFD0B5EE15C919612F77E0D
2,092,392,861 UART: [art] SIG.R = 904F58A17622BD1E0FC94BED8325F7879697F790665548F91180BAFDA67B3638286D6237D8E51165D3395C236FE43A47
2,092,400,266 UART: [art] SIG.S = 577E24D69953CA427DC0D90E6C3A4DACE1C599B23E9336E2E4DF13F06DCCD19A9AB6C3FF962D405320F5AB630F750A85
2,093,379,653 UART: Caliptra RT
2,093,380,363 UART: [state] CFI Enabled
2,093,716,353 UART: [rt] RT listening for mailbox commands...
2,093,718,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,100,823,320 >>> mbox cmd response: success
2,100,858,151 UART:
2,100,858,432 UART: Running Caliptra FMC ...
2,100,859,549 UART:
2,100,859,718 UART: [state] CFI Enabled
2,100,958,006 UART: [art] Extend RT PCRs Done
2,100,959,230 UART: [art] Lock RT PCRs Done
2,100,960,637 UART: [art] Populate DV Done
2,100,966,165 UART: [fht] FMC Alias Private Key: 7
2,100,967,920 UART: [art] Derive CDI
2,100,968,732 UART: [art] Store in in slot 0x4
2,101,027,716 UART: [art] Derive Key Pair
2,101,028,726 UART: [art] Store priv key in slot 0x5
2,103,491,455 UART: [art] Derive Key Pair - Done
2,103,504,299 UART: [art] Signing Cert with AUTHO
2,103,505,605 UART: RITY.KEYID = 7
2,105,217,282 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,218,799 UART: [art] PUB.X = FC9DC71F545F06FA5E39931ED4FFE1BE6C28723EB11681A936B899DCB345540478395568B6E8E166FBF85A252C9A4CC1
2,105,226,034 UART: [art] PUB.Y = 4D3194B92CAB8DA809F79CC24F35A07A88A2343E86646CD414533B3DC5B7BC3FE77A7417326253C189E263E0818700F9
2,105,233,270 UART: [art] SIG.R = 57FC63BF271BBD408A824A0E2BE9B6DF453AC433B43256ECA14D74BE5938988C5A9BA3BC7FC4C31D1FAB1DAAEE7E9479
2,105,240,715 UART: [art] SIG.S = BA52F13D34525285CB86557111ACD6D0FD626F0653A6BFCC80C764A224E16D51611BFF1BF213E622A427C5B202420845
2,106,219,883 UART: Caliptra RT
2,106,220,597 UART: [state] CFI Enabled
2,106,557,770 UART: [rt] RT listening for mailbox commands...
2,106,559,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,113,700,166 >>> mbox cmd response: success
2,113,735,196 UART:
2,113,735,468 UART: Running Caliptra FMC ...
2,113,736,535 UART:
2,113,736,690 UART: [state] CFI Enabled
2,113,840,782 UART: [art] Extend RT PCRs Done
2,113,841,981 UART: [art] Lock RT PCRs Done
2,113,843,385 UART: [art] Populate DV Done
2,113,848,956 UART: [fht] FMC Alias Private Key: 7
2,113,850,656 UART: [art] Derive CDI
2,113,851,467 UART: [art] Store in in slot 0x4
2,113,909,748 UART: [art] Derive Key Pair
2,113,910,746 UART: [art] Store priv key in slot 0x5
2,116,373,402 UART: [art] Derive Key Pair - Done
2,116,386,731 UART: [art] Signing Cert with AUTHO
2,116,388,035 UART: RITY.KEYID = 7
2,118,099,366 UART: [art] Erasing AUTHORITY.KEYID = 7
2,118,100,880 UART: [art] PUB.X = B8D5A8CE1728D64DA11E3E486F888FFDC29B3BB15E0221D90F68A66B96A0EBAF59ABBC8A7208B7D860354D22C51EC160
2,118,108,185 UART: [art] PUB.Y = A2F0AEAAACCC775E047199B26A233BDC0ECF5BEC5395A84B1F612A03509BE3B8C6D240650BFD0B5EE15C919612F77E0D
2,118,115,457 UART: [art] SIG.R = 904F58A17622BD1E0FC94BED8325F7879697F790665548F91180BAFDA67B3638286D6237D8E51165D3395C236FE43A47
2,118,122,834 UART: [art] SIG.S = 577E24D69953CA427DC0D90E6C3A4DACE1C599B23E9336E2E4DF13F06DCCD19A9AB6C3FF962D405320F5AB630F750A85
2,119,101,320 UART: Caliptra RT
2,119,102,012 UART: [state] CFI Enabled
2,119,439,702 UART: [rt] RT listening for mailbox commands...
2,119,441,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,126,556,652 >>> mbox cmd response: success
2,126,592,373 UART:
2,126,592,677 UART: Running Caliptra FMC ...
2,126,593,800 UART:
2,126,593,982 UART: [state] CFI Enabled
2,126,700,813 UART: [art] Extend RT PCRs Done
2,126,702,000 UART: [art] Lock RT PCRs Done
2,126,703,306 UART: [art] Populate DV Done
2,126,708,673 UART: [fht] FMC Alias Private Key: 7
2,126,710,333 UART: [art] Derive CDI
2,126,711,149 UART: [art] Store in in slot 0x4
2,126,769,337 UART: [art] Derive Key Pair
2,126,770,379 UART: [art] Store priv key in slot 0x5
2,129,233,285 UART: [art] Derive Key Pair - Done
2,129,246,283 UART: [art] Signing Cert with AUTHO
2,129,247,594 UART: RITY.KEYID = 7
2,130,958,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,130,960,228 UART: [art] PUB.X = FC9DC71F545F06FA5E39931ED4FFE1BE6C28723EB11681A936B899DCB345540478395568B6E8E166FBF85A252C9A4CC1
2,130,967,319 UART: [art] PUB.Y = 4D3194B92CAB8DA809F79CC24F35A07A88A2343E86646CD414533B3DC5B7BC3FE77A7417326253C189E263E0818700F9
2,130,974,528 UART: [art] SIG.R = 57FC63BF271BBD408A824A0E2BE9B6DF453AC433B43256ECA14D74BE5938988C5A9BA3BC7FC4C31D1FAB1DAAEE7E9479
2,130,981,983 UART: [art] SIG.S = BA52F13D34525285CB86557111ACD6D0FD626F0653A6BFCC80C764A224E16D51611BFF1BF213E622A427C5B202420845
2,131,961,618 UART: Caliptra RT
2,131,962,326 UART: [state] CFI Enabled
2,132,301,938 UART: [rt] RT listening for mailbox commands...
2,132,303,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,139,436,081 >>> mbox cmd response: success
2,139,470,959 UART:
2,139,471,259 UART: Running Caliptra FMC ...
2,139,472,330 UART:
2,139,472,488 UART: [state] CFI Enabled
2,139,561,312 UART: [art] Extend RT PCRs Done
2,139,562,496 UART: [art] Lock RT PCRs Done
2,139,563,844 UART: [art] Populate DV Done
2,139,569,417 UART: [fht] FMC Alias Private Key: 7
2,139,570,955 UART: [art] Derive CDI
2,139,571,769 UART: [art] Store in in slot 0x4
2,139,630,238 UART: [art] Derive Key Pair
2,139,631,278 UART: [art] Store priv key in slot 0x5
2,142,093,717 UART: [art] Derive Key Pair - Done
2,142,106,670 UART: [art] Signing Cert with AUTHO
2,142,107,975 UART: RITY.KEYID = 7
2,143,819,398 UART: [art] Erasing AUTHORITY.KEYID = 7
2,143,820,904 UART: [art] PUB.X = B8D5A8CE1728D64DA11E3E486F888FFDC29B3BB15E0221D90F68A66B96A0EBAF59ABBC8A7208B7D860354D22C51EC160
2,143,828,172 UART: [art] PUB.Y = A2F0AEAAACCC775E047199B26A233BDC0ECF5BEC5395A84B1F612A03509BE3B8C6D240650BFD0B5EE15C919612F77E0D
2,143,835,442 UART: [art] SIG.R = 904F58A17622BD1E0FC94BED8325F7879697F790665548F91180BAFDA67B3638286D6237D8E51165D3395C236FE43A47
2,143,842,870 UART: [art] SIG.S = 577E24D69953CA427DC0D90E6C3A4DACE1C599B23E9336E2E4DF13F06DCCD19A9AB6C3FF962D405320F5AB630F750A85
2,144,821,879 UART: Caliptra RT
2,144,822,592 UART: [state] CFI Enabled
2,145,159,659 UART: [rt] RT listening for mailbox commands...
2,145,161,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,152,276,244 >>> mbox cmd response: success
2,152,310,804 UART:
2,152,311,092 UART: Running Caliptra FMC ...
2,152,312,139 UART:
2,152,312,292 UART: [state] CFI Enabled
2,152,401,407 UART: [art] Extend RT PCRs Done
2,152,402,597 UART: [art] Lock RT PCRs Done
2,152,404,079 UART: [art] Populate DV Done
2,152,409,597 UART: [fht] FMC Alias Private Key: 7
2,152,411,237 UART: [art] Derive CDI
2,152,411,977 UART: [art] Store in in slot 0x4
2,152,470,043 UART: [art] Derive Key Pair
2,152,471,048 UART: [art] Store priv key in slot 0x5
2,154,934,174 UART: [art] Derive Key Pair - Done
2,154,947,229 UART: [art] Signing Cert with AUTHO
2,154,948,534 UART: RITY.KEYID = 7
2,156,660,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,156,661,699 UART: [art] PUB.X = FC9DC71F545F06FA5E39931ED4FFE1BE6C28723EB11681A936B899DCB345540478395568B6E8E166FBF85A252C9A4CC1
2,156,668,987 UART: [art] PUB.Y = 4D3194B92CAB8DA809F79CC24F35A07A88A2343E86646CD414533B3DC5B7BC3FE77A7417326253C189E263E0818700F9
2,156,676,215 UART: [art] SIG.R = 57FC63BF271BBD408A824A0E2BE9B6DF453AC433B43256ECA14D74BE5938988C5A9BA3BC7FC4C31D1FAB1DAAEE7E9479
2,156,683,634 UART: [art] SIG.S = BA52F13D34525285CB86557111ACD6D0FD626F0653A6BFCC80C764A224E16D51611BFF1BF213E622A427C5B202420845
2,157,662,765 UART: Caliptra RT
2,157,663,482 UART: [state] CFI Enabled
2,157,997,889 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 322.97s
Truncated 1329916 bytes from beginning
RT:
2,358,548,446 UART: Running Caliptra FMC ...
2,358,549,477 UART:
2,358,549,631 UART: [state] CFI Enabled
2,358,594,082 UART: [art] Extend RT PCRs Done
2,358,595,321 UART: [art] Lock RT PCRs Done
2,358,596,817 UART: [art] Populate DV Done
2,358,602,064 UART: [fht] FMC Alias Private Key: 7
2,358,603,720 UART: [art] Derive CDI
2,358,604,489 UART: [art] Store in in slot 0x4
2,358,646,674 UART: [art] Derive Key Pair
2,358,647,679 UART: [art] Store priv key in slot 0x5
2,361,074,398 UART: [art] Derive Key Pair - Done
2,361,087,676 UART: [art] Signing Cert with AUTHO
2,361,088,993 UART: RITY.KEYID = 7
2,362,794,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,796,493 UART: [art] PUB.X = FF3C0F1807796E1C917B1FEBE30086B185A9F476D54FD694E14B267FDD9F25F5907FFBA4B38001C7BC7A5B6BE84C85CC
2,362,803,761 UART: [art] PUB.Y = F825873D09B20C3CE34234A980E80ECFCC1823AB7A598AD8F3613A0A82205EB074E4064D035AFA3ABF5419CC36ECD8AA
2,362,811,025 UART: [art] SIG.R = D353AAEFAEB285F39F64CE0F3A3A14E75C179BD9869565A878355ABBA9DCEAF6803B12CA96EC321AA7F7E0D44301D461
2,362,818,412 UART: [art] SIG.S = 59283710A5498737FB024D7ADD445C7F362DA2137075B60313AFDE9AA9AB00253E22415C9D163D0CCA743BDEFB5777BA
2,363,797,113 UART: Caliptra RT
2,363,797,807 UART: [state] CFI Enabled
2,364,082,124 UART: [rt] RT listening for mailbox commands...
2,364,084,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,364,228,336 UART:
2,364,228,647 UART: Running Caliptra ROM ...
2,364,229,710 UART:
2,364,229,925 UART: [state] CFI Enabled
2,366,109,252 UART: [state] LifecycleState = Unprovisioned
2,366,111,179 UART: [state] DebugLocked = No
2,366,112,797 UART: [state] WD Timer not started. Device not locked for debugging
2,366,115,954 UART: [kat] SHA2-256
2,366,295,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,366,306,743 UART: [kat] ++
2,366,307,210 UART: [kat] sha1
2,366,317,557 UART: [kat] SHA2-256
2,366,320,581 UART: [kat] SHA2-384
2,366,325,546 UART: [kat] SHA2-512-ACC
2,366,328,493 UART: [kat] ECC-384
2,368,767,775 UART: [kat] HMAC-384Kdf
2,368,780,244 UART: [kat] LMS
2,369,309,759 UART: [kat] --
2,369,314,301 UART: [update-reset] ++
2,372,741,186 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,745,330 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,373,127,383 >>> mbox cmd response: success
2,373,129,057 UART: [update-reset] Copying MAN_2 To MAN_1
2,373,151,394 UART: [update-reset Success] --
2,373,157,173 UART: [state] Locking Datavault
2,373,160,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,373,161,818 UART: [state] Locking ICCM
2,373,163,977 UART: [exit] Launching FMC @ 0x40000130
2,373,172,437 UART:
2,373,172,678 UART: Running Caliptra FMC ...
2,373,173,794 UART:
2,373,173,960 UART: [state] CFI Enabled
2,373,217,656 UART: [art] Extend RT PCRs Done
2,373,218,797 UART: [art] Lock RT PCRs Done
2,373,220,110 UART: [art] Populate DV Done
2,373,225,576 UART: [fht] FMC Alias Private Key: 7
2,373,227,220 UART: [art] Derive CDI
2,373,228,050 UART: [art] Store in in slot 0x4
2,373,270,710 UART: [art] Derive Key Pair
2,373,271,717 UART: [art] Store priv key in slot 0x5
2,375,698,820 UART: [art] Derive Key Pair - Done
2,375,712,021 UART: [art] Signing Cert with AUTHO
2,375,713,369 UART: RITY.KEYID = 7
2,377,418,377 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,419,886 UART: [art] PUB.X = 34F740BAD101E04E9A420E2F9A5DABD89556B871E4D8DF889B9BDD5F3B69AB72467AAF433A94644FEB54CA10ED58AE13
2,377,427,165 UART: [art] PUB.Y = CAB29A0043384CEB07C9ED8E6664D5FFDCABE67738DDE60C05E8A73A84C1F3F18F316E3DDFB048ADEA3D1695B8077606
2,377,434,431 UART: [art] SIG.R = 11CD5742589957B6036764570DE78BC82784ACFF1C45E36DFAF9073D3805A0DCDC008207A7B3177D7ACFBD54511DBC73
2,377,441,805 UART: [art] SIG.S = FF34482E5F6DFB6ACD8E4AE5C06BA76A6204DDBFD53D47734542004346840999C8B3F41C7B858FBE090CEC63138C54F8
2,378,420,852 UART: Caliptra RT
2,378,421,544 UART: [state] CFI Enabled
2,378,706,464 UART: [rt] RT listening for mailbox commands...
2,378,708,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,378,852,300 UART:
2,378,852,611 UART: Running Caliptra ROM ...
2,378,853,733 UART:
2,378,853,903 UART: [state] CFI Enabled
2,378,867,141 UART: [state] LifecycleState = Unprovisioned
2,378,868,985 UART: [state] DebugLocked = No
2,378,870,202 UART: [state] WD Timer not started. Device not locked for debugging
2,378,874,381 UART: [kat] SHA2-256
2,379,053,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,379,065,136 UART: [kat] ++
2,379,065,692 UART: [kat] sha1
2,379,076,538 UART: [kat] SHA2-256
2,379,079,554 UART: [kat] SHA2-384
2,379,084,845 UART: [kat] SHA2-512-ACC
2,379,087,757 UART: [kat] ECC-384
2,381,529,503 UART: [kat] HMAC-384Kdf
2,381,542,426 UART: [kat] LMS
2,382,071,963 UART: [kat] --
2,382,075,362 UART: [update-reset] ++
2,385,492,822 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,496,260 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,385,878,299 >>> mbox cmd response: success
2,385,879,707 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,902,043 UART: [update-reset Success] --
2,385,908,070 UART: [state] Locking Datavault
2,385,911,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,912,668 UART: [state] Locking ICCM
2,385,915,123 UART: [exit] Launching FMC @ 0x40000130
2,385,923,583 UART:
2,385,923,824 UART: Running Caliptra FMC ...
2,385,924,873 UART:
2,385,925,028 UART: [state] CFI Enabled
2,385,969,297 UART: [art] Extend RT PCRs Done
2,385,970,602 UART: [art] Lock RT PCRs Done
2,385,971,901 UART: [art] Populate DV Done
2,385,977,644 UART: [fht] FMC Alias Private Key: 7
2,385,979,328 UART: [art] Derive CDI
2,385,980,099 UART: [art] Store in in slot 0x4
2,386,023,031 UART: [art] Derive Key Pair
2,386,024,239 UART: [art] Store priv key in slot 0x5
2,388,450,447 UART: [art] Derive Key Pair - Done
2,388,463,443 UART: [art] Signing Cert with AUTHO
2,388,464,746 UART: RITY.KEYID = 7
2,390,170,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,171,814 UART: [art] PUB.X = FF3C0F1807796E1C917B1FEBE30086B185A9F476D54FD694E14B267FDD9F25F5907FFBA4B38001C7BC7A5B6BE84C85CC
2,390,179,039 UART: [art] PUB.Y = F825873D09B20C3CE34234A980E80ECFCC1823AB7A598AD8F3613A0A82205EB074E4064D035AFA3ABF5419CC36ECD8AA
2,390,186,341 UART: [art] SIG.R = D353AAEFAEB285F39F64CE0F3A3A14E75C179BD9869565A878355ABBA9DCEAF6803B12CA96EC321AA7F7E0D44301D461
2,390,193,796 UART: [art] SIG.S = 59283710A5498737FB024D7ADD445C7F362DA2137075B60313AFDE9AA9AB00253E22415C9D163D0CCA743BDEFB5777BA
2,391,173,231 UART: Caliptra RT
2,391,173,917 UART: [state] CFI Enabled
2,391,463,050 UART: [rt] RT listening for mailbox commands...
2,391,465,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,391,609,411 UART:
2,391,609,715 UART: Running Caliptra ROM ...
2,391,610,786 UART:
2,391,610,993 UART: [state] CFI Enabled
2,391,626,063 UART: [state] LifecycleState = Unprovisioned
2,391,627,945 UART: [state] DebugLocked = No
2,391,629,385 UART: [state] WD Timer not started. Device not locked for debugging
2,391,633,513 UART: [kat] SHA2-256
2,391,812,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,391,824,280 UART: [kat] ++
2,391,824,843 UART: [kat] sha1
2,391,836,281 UART: [kat] SHA2-256
2,391,839,299 UART: [kat] SHA2-384
2,391,846,475 UART: [kat] SHA2-512-ACC
2,391,849,420 UART: [kat] ECC-384
2,394,290,528 UART: [kat] HMAC-384Kdf
2,394,302,481 UART: [kat] LMS
2,394,831,984 UART: [kat] --
2,394,836,787 UART: [update-reset] ++
2,398,256,190 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,259,567 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,398,641,603 >>> mbox cmd response: success
2,398,643,387 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,665,722 UART: [update-reset Success] --
2,398,669,458 UART: [state] Locking Datavault
2,398,671,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,673,161 UART: [state] Locking ICCM
2,398,674,344 UART: [exit] Launching FMC @ 0x40000130
2,398,682,801 UART:
2,398,683,044 UART: Running Caliptra FMC ...
2,398,684,155 UART:
2,398,684,316 UART: [state] CFI Enabled
2,398,728,656 UART: [art] Extend RT PCRs Done
2,398,729,808 UART: [art] Lock RT PCRs Done
2,398,731,152 UART: [art] Populate DV Done
2,398,736,668 UART: [fht] FMC Alias Private Key: 7
2,398,738,105 UART: [art] Derive CDI
2,398,738,870 UART: [art] Store in in slot 0x4
2,398,781,446 UART: [art] Derive Key Pair
2,398,782,483 UART: [art] Store priv key in slot 0x5
2,401,209,488 UART: [art] Derive Key Pair - Done
2,401,222,552 UART: [art] Signing Cert with AUTHO
2,401,224,064 UART: RITY.KEYID = 7
2,402,928,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,930,371 UART: [art] PUB.X = 34F740BAD101E04E9A420E2F9A5DABD89556B871E4D8DF889B9BDD5F3B69AB72467AAF433A94644FEB54CA10ED58AE13
2,402,937,663 UART: [art] PUB.Y = CAB29A0043384CEB07C9ED8E6664D5FFDCABE67738DDE60C05E8A73A84C1F3F18F316E3DDFB048ADEA3D1695B8077606
2,402,944,892 UART: [art] SIG.R = 11CD5742589957B6036764570DE78BC82784ACFF1C45E36DFAF9073D3805A0DCDC008207A7B3177D7ACFBD54511DBC73
2,402,952,266 UART: [art] SIG.S = FF34482E5F6DFB6ACD8E4AE5C06BA76A6204DDBFD53D47734542004346840999C8B3F41C7B858FBE090CEC63138C54F8
2,403,931,224 UART: Caliptra RT
2,403,931,919 UART: [state] CFI Enabled
2,404,220,915 UART: [rt] RT listening for mailbox commands...
2,404,222,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,404,367,131 UART:
2,404,367,445 UART: Running Caliptra ROM ...
2,404,368,579 UART:
2,404,368,747 UART: [state] CFI Enabled
2,406,243,007 UART: [state] LifecycleState = Unprovisioned
2,406,244,933 UART: [state] DebugLocked = No
2,406,246,628 UART: [state] WD Timer not started. Device not locked for debugging
2,406,250,381 UART: [kat] SHA2-256
2,406,429,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,406,441,088 UART: [kat] ++
2,406,441,634 UART: [kat] sha1
2,406,451,669 UART: [kat] SHA2-256
2,406,454,689 UART: [kat] SHA2-384
2,406,460,628 UART: [kat] SHA2-512-ACC
2,406,463,570 UART: [kat] ECC-384
2,408,907,011 UART: [kat] HMAC-384Kdf
2,408,921,107 UART: [kat] LMS
2,409,450,618 UART: [kat] --
2,409,454,443 UART: [update-reset] ++
2,412,882,919 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,886,304 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,413,268,286 >>> mbox cmd response: success
2,413,269,498 UART: [update-reset] Copying MAN_2 To MAN_1
2,413,291,839 UART: [update-reset Success] --
2,413,294,515 UART: [state] Locking Datavault
2,413,296,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,413,298,457 UART: [state] Locking ICCM
2,413,299,590 UART: [exit] Launching FMC @ 0x40000130
2,413,307,991 UART:
2,413,308,269 UART: Running Caliptra FMC ...
2,413,309,388 UART:
2,413,309,552 UART: [state] CFI Enabled
2,413,353,896 UART: [art] Extend RT PCRs Done
2,413,355,044 UART: [art] Lock RT PCRs Done
2,413,356,699 UART: [art] Populate DV Done
2,413,362,215 UART: [fht] FMC Alias Private Key: 7
2,413,363,866 UART: [art] Derive CDI
2,413,364,604 UART: [art] Store in in slot 0x4
2,413,407,278 UART: [art] Derive Key Pair
2,413,408,322 UART: [art] Store priv key in slot 0x5
2,415,835,163 UART: [art] Derive Key Pair - Done
2,415,847,998 UART: [art] Signing Cert with AUTHO
2,415,849,314 UART: RITY.KEYID = 7
2,417,554,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,556,481 UART: [art] PUB.X = FF3C0F1807796E1C917B1FEBE30086B185A9F476D54FD694E14B267FDD9F25F5907FFBA4B38001C7BC7A5B6BE84C85CC
2,417,563,769 UART: [art] PUB.Y = F825873D09B20C3CE34234A980E80ECFCC1823AB7A598AD8F3613A0A82205EB074E4064D035AFA3ABF5419CC36ECD8AA
2,417,571,037 UART: [art] SIG.R = D353AAEFAEB285F39F64CE0F3A3A14E75C179BD9869565A878355ABBA9DCEAF6803B12CA96EC321AA7F7E0D44301D461
2,417,578,469 UART: [art] SIG.S = 59283710A5498737FB024D7ADD445C7F362DA2137075B60313AFDE9AA9AB00253E22415C9D163D0CCA743BDEFB5777BA
2,418,557,557 UART: Caliptra RT
2,418,558,272 UART: [state] CFI Enabled
2,418,848,719 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 336.01s
Truncated 715075 bytes from beginning
2861DD4F0168BB2DB81DD5A160B7419
2,309,136,055 UART: [art] SIG.R = 60B5926667AA945E152128A4A11D0BA789CDBD6351CDB8555CAC0518B80FE154669B0626BBAFE662852DA6327DCD00D2
2,309,143,434 UART: [art] SIG.S = 15012B376FE976CFA4061147081CE4D6BD637734A55998F5AA0B9FAACF0E81300DC5A30F555A56ECA333C3C80A8A2A71
2,310,121,804 UART: Caliptra RT
2,310,122,503 UART: [state] CFI Enabled
2,310,410,451 UART: [rt] RT listening for mailbox commands...
2,310,412,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,317,452,679 >>> mbox cmd response: success
2,317,488,897 UART:
2,317,489,205 UART: Running Caliptra FMC ...
2,317,490,250 UART:
2,317,490,406 UART: [state] CFI Enabled
2,317,534,274 UART: [art] Extend RT PCRs Done
2,317,535,429 UART: [art] Lock RT PCRs Done
2,317,536,585 UART: [art] Populate DV Done
2,317,542,073 UART: [fht] FMC Alias Private Key: 7
2,317,543,613 UART: [art] Derive CDI
2,317,544,352 UART: [art] Store in in slot 0x4
2,317,587,334 UART: [art] Derive Key Pair
2,317,588,380 UART: [art] Store priv key in slot 0x5
2,320,015,158 UART: [art] Derive Key Pair - Done
2,320,028,106 UART: [art] Signing Cert with AUTHO
2,320,029,425 UART: RITY.KEYID = 7
2,321,735,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,736,603 UART: [art] PUB.X = 2CF52E2BF5DDF03ECAA3FF5978112E67935FF25F8585B1EC9463ABC9132E2AE280B64599E5490658A872014D9CF13F3B
2,321,743,855 UART: [art] PUB.Y = 9BF4D0F2D0A6C262A609F360C6BD85A15A13EB8D42A6D529835B2EE322C400ACDD822FD4ED8666501B1EE61C91E2D7CB
2,321,751,135 UART: [art] SIG.R = A11350B7E64F05CE8C8691132E3DF35EB1195F595BC6FDCE6033D825859FE475DF10BB4BA2BDD77612039A3A68338A6D
2,321,758,517 UART: [art] SIG.S = 4889CA48BDD1A2C768693A2D7AA6BA35B8B70CE83DB4A7924D2ADB8868FF70BEBF777AE65BDDCF4038A445608EDD94C6
2,322,737,219 UART: Caliptra RT
2,322,737,928 UART: [state] CFI Enabled
2,323,024,574 UART: [rt] RT listening for mailbox commands...
2,323,026,456 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,332,336,887 >>> mbox cmd response: success
2,332,372,769 UART:
2,332,373,078 UART: Running Caliptra FMC ...
2,332,374,221 UART:
2,332,374,396 UART: [state] CFI Enabled
2,332,418,258 UART: [art] Extend RT PCRs Done
2,332,419,416 UART: [art] Lock RT PCRs Done
2,332,420,999 UART: [art] Populate DV Done
2,332,426,522 UART: [fht] FMC Alias Private Key: 7
2,332,428,129 UART: [art] Derive CDI
2,332,428,951 UART: [art] Store in in slot 0x4
2,332,471,070 UART: [art] Derive Key Pair
2,332,472,120 UART: [art] Store priv key in slot 0x5
2,334,899,152 UART: [art] Derive Key Pair - Done
2,334,912,099 UART: [art] Signing Cert with AUTHO
2,334,913,409 UART: RITY.KEYID = 7
2,336,618,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,620,295 UART: [art] PUB.X = 9922E167C93FEA5BF364AB5E3E860216231C39036C63BDD65AD8790CC6A3C7C874D91CC8519E12E9D0C444FFE7BC8EED
2,336,627,575 UART: [art] PUB.Y = 8DE8940FB315EB785D243F6FC6E05278DEC22F247015F7E08206E65574C6A3A152861DD4F0168BB2DB81DD5A160B7419
2,336,634,838 UART: [art] SIG.R = 60B5926667AA945E152128A4A11D0BA789CDBD6351CDB8555CAC0518B80FE154669B0626BBAFE662852DA6327DCD00D2
2,336,642,222 UART: [art] SIG.S = 15012B376FE976CFA4061147081CE4D6BD637734A55998F5AA0B9FAACF0E81300DC5A30F555A56ECA333C3C80A8A2A71
2,337,621,527 UART: Caliptra RT
2,337,622,233 UART: [state] CFI Enabled
2,337,912,344 UART: [rt] RT listening for mailbox commands...
2,337,914,241 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,344,961,338 >>> mbox cmd response: success
2,344,995,408 UART:
2,344,995,694 UART: Running Caliptra FMC ...
2,344,996,826 UART:
2,344,996,994 UART: [state] CFI Enabled
2,345,041,381 UART: [art] Extend RT PCRs Done
2,345,042,593 UART: [art] Lock RT PCRs Done
2,345,043,852 UART: [art] Populate DV Done
2,345,049,224 UART: [fht] FMC Alias Private Key: 7
2,345,050,725 UART: [art] Derive CDI
2,345,051,504 UART: [art] Store in in slot 0x4
2,345,094,331 UART: [art] Derive Key Pair
2,345,095,378 UART: [art] Store priv key in slot 0x5
2,347,521,952 UART: [art] Derive Key Pair - Done
2,347,534,980 UART: [art] Signing Cert with AUTHO
2,347,536,296 UART: RITY.KEYID = 7
2,349,241,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,243,333 UART: [art] PUB.X = 2CF52E2BF5DDF03ECAA3FF5978112E67935FF25F8585B1EC9463ABC9132E2AE280B64599E5490658A872014D9CF13F3B
2,349,250,580 UART: [art] PUB.Y = 9BF4D0F2D0A6C262A609F360C6BD85A15A13EB8D42A6D529835B2EE322C400ACDD822FD4ED8666501B1EE61C91E2D7CB
2,349,257,854 UART: [art] SIG.R = A11350B7E64F05CE8C8691132E3DF35EB1195F595BC6FDCE6033D825859FE475DF10BB4BA2BDD77612039A3A68338A6D
2,349,265,236 UART: [art] SIG.S = 4889CA48BDD1A2C768693A2D7AA6BA35B8B70CE83DB4A7924D2ADB8868FF70BEBF777AE65BDDCF4038A445608EDD94C6
2,350,244,131 UART: Caliptra RT
2,350,244,839 UART: [state] CFI Enabled
2,350,534,498 UART: [rt] RT listening for mailbox commands...
2,350,536,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,357,576,855 >>> mbox cmd response: success
2,357,610,597 UART:
2,357,610,876 UART: Running Caliptra FMC ...
2,357,611,999 UART:
2,357,612,170 UART: [state] CFI Enabled
2,357,656,386 UART: [art] Extend RT PCRs Done
2,357,657,581 UART: [art] Lock RT PCRs Done
2,357,658,938 UART: [art] Populate DV Done
2,357,664,306 UART: [fht] FMC Alias Private Key: 7
2,357,665,851 UART: [art] Derive CDI
2,357,666,672 UART: [art] Store in in slot 0x4
2,357,709,383 UART: [art] Derive Key Pair
2,357,710,391 UART: [art] Store priv key in slot 0x5
2,360,137,545 UART: [art] Derive Key Pair - Done
2,360,150,764 UART: [art] Signing Cert with AUTHO
2,360,152,083 UART: RITY.KEYID = 7
2,361,857,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,858,968 UART: [art] PUB.X = 9922E167C93FEA5BF364AB5E3E860216231C39036C63BDD65AD8790CC6A3C7C874D91CC8519E12E9D0C444FFE7BC8EED
2,361,866,202 UART: [art] PUB.Y = 8DE8940FB315EB785D243F6FC6E05278DEC22F247015F7E08206E65574C6A3A152861DD4F0168BB2DB81DD5A160B7419
2,361,873,473 UART: [art] SIG.R = 60B5926667AA945E152128A4A11D0BA789CDBD6351CDB8555CAC0518B80FE154669B0626BBAFE662852DA6327DCD00D2
2,361,880,844 UART: [art] SIG.S = 15012B376FE976CFA4061147081CE4D6BD637734A55998F5AA0B9FAACF0E81300DC5A30F555A56ECA333C3C80A8A2A71
2,362,859,679 UART: Caliptra RT
2,362,860,401 UART: [state] CFI Enabled
2,363,144,946 UART: [rt] RT listening for mailbox commands...
2,363,146,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,372,468,866 >>> mbox cmd response: success
2,372,503,634 UART:
2,372,503,912 UART: Running Caliptra FMC ...
2,372,505,038 UART:
2,372,505,209 UART: [state] CFI Enabled
2,372,549,755 UART: [art] Extend RT PCRs Done
2,372,551,021 UART: [art] Lock RT PCRs Done
2,372,552,471 UART: [art] Populate DV Done
2,372,557,726 UART: [fht] FMC Alias Private Key: 7
2,372,559,326 UART: [art] Derive CDI
2,372,560,148 UART: [art] Store in in slot 0x4
2,372,602,974 UART: [art] Derive Key Pair
2,372,603,995 UART: [art] Store priv key in slot 0x5
2,375,030,461 UART: [art] Derive Key Pair - Done
2,375,043,577 UART: [art] Signing Cert with AUTHO
2,375,044,899 UART: RITY.KEYID = 7
2,376,750,724 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,752,230 UART: [art] PUB.X = 2CF52E2BF5DDF03ECAA3FF5978112E67935FF25F8585B1EC9463ABC9132E2AE280B64599E5490658A872014D9CF13F3B
2,376,759,512 UART: [art] PUB.Y = 9BF4D0F2D0A6C262A609F360C6BD85A15A13EB8D42A6D529835B2EE322C400ACDD822FD4ED8666501B1EE61C91E2D7CB
2,376,766,780 UART: [art] SIG.R = A11350B7E64F05CE8C8691132E3DF35EB1195F595BC6FDCE6033D825859FE475DF10BB4BA2BDD77612039A3A68338A6D
2,376,774,236 UART: [art] SIG.S = 4889CA48BDD1A2C768693A2D7AA6BA35B8B70CE83DB4A7924D2ADB8868FF70BEBF777AE65BDDCF4038A445608EDD94C6
2,377,752,929 UART: Caliptra RT
2,377,753,651 UART: [state] CFI Enabled
2,378,042,767 UART: [rt] RT listening for mailbox commands...
2,378,044,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,385,088,863 >>> mbox cmd response: success
2,385,123,870 UART:
2,385,124,201 UART: Running Caliptra FMC ...
2,385,125,352 UART:
2,385,125,526 UART: [state] CFI Enabled
2,385,169,877 UART: [art] Extend RT PCRs Done
2,385,171,072 UART: [art] Lock RT PCRs Done
2,385,172,219 UART: [art] Populate DV Done
2,385,177,684 UART: [fht] FMC Alias Private Key: 7
2,385,179,346 UART: [art] Derive CDI
2,385,180,168 UART: [art] Store in in slot 0x4
2,385,222,606 UART: [art] Derive Key Pair
2,385,223,613 UART: [art] Store priv key in slot 0x5
2,387,650,531 UART: [art] Derive Key Pair - Done
2,387,663,601 UART: [art] Signing Cert with AUTHO
2,387,664,924 UART: RITY.KEYID = 7
2,389,370,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,371,772 UART: [art] PUB.X = 9922E167C93FEA5BF364AB5E3E860216231C39036C63BDD65AD8790CC6A3C7C874D91CC8519E12E9D0C444FFE7BC8EED
2,389,379,054 UART: [art] PUB.Y = 8DE8940FB315EB785D243F6FC6E05278DEC22F247015F7E08206E65574C6A3A152861DD4F0168BB2DB81DD5A160B7419
2,389,386,350 UART: [art] SIG.R = 60B5926667AA945E152128A4A11D0BA789CDBD6351CDB8555CAC0518B80FE154669B0626BBAFE662852DA6327DCD00D2
2,389,393,719 UART: [art] SIG.S = 15012B376FE976CFA4061147081CE4D6BD637734A55998F5AA0B9FAACF0E81300DC5A30F555A56ECA333C3C80A8A2A71
2,390,372,878 UART: Caliptra RT
2,390,373,605 UART: [state] CFI Enabled
2,390,658,991 UART: [rt] RT listening for mailbox commands...
2,390,660,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,397,707,618 >>> mbox cmd response: success
2,397,740,011 UART:
2,397,740,323 UART: Running Caliptra FMC ...
2,397,741,454 UART:
2,397,741,622 UART: [state] CFI Enabled
2,397,785,590 UART: [art] Extend RT PCRs Done
2,397,786,746 UART: [art] Lock RT PCRs Done
2,397,788,259 UART: [art] Populate DV Done
2,397,793,565 UART: [fht] FMC Alias Private Key: 7
2,397,795,226 UART: [art] Derive CDI
2,397,795,990 UART: [art] Store in in slot 0x4
2,397,838,432 UART: [art] Derive Key Pair
2,397,839,478 UART: [art] Store priv key in slot 0x5
2,400,266,441 UART: [art] Derive Key Pair - Done
2,400,279,234 UART: [art] Signing Cert with AUTHO
2,400,280,547 UART: RITY.KEYID = 7
2,401,985,928 UART: [art] Erasing AUTHORITY.KEYID = 7
2,401,987,417 UART: [art] PUB.X = 2CF52E2BF5DDF03ECAA3FF5978112E67935FF25F8585B1EC9463ABC9132E2AE280B64599E5490658A872014D9CF13F3B
2,401,994,691 UART: [art] PUB.Y = 9BF4D0F2D0A6C262A609F360C6BD85A15A13EB8D42A6D529835B2EE322C400ACDD822FD4ED8666501B1EE61C91E2D7CB
2,402,001,949 UART: [art] SIG.R = A11350B7E64F05CE8C8691132E3DF35EB1195F595BC6FDCE6033D825859FE475DF10BB4BA2BDD77612039A3A68338A6D
2,402,009,394 UART: [art] SIG.S = 4889CA48BDD1A2C768693A2D7AA6BA35B8B70CE83DB4A7924D2ADB8868FF70BEBF777AE65BDDCF4038A445608EDD94C6
2,402,988,335 UART: Caliptra RT
2,402,989,058 UART: [state] CFI Enabled
2,403,274,803 UART: [rt] RT listening for mailbox commands...
2,403,276,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,412,591,559 >>> mbox cmd response: success
2,412,627,151 UART:
2,412,627,462 UART: Running Caliptra FMC ...
2,412,628,505 UART:
2,412,628,664 UART: [state] CFI Enabled
2,412,672,798 UART: [art] Extend RT PCRs Done
2,412,673,955 UART: [art] Lock RT PCRs Done
2,412,675,411 UART: [art] Populate DV Done
2,412,680,991 UART: [fht] FMC Alias Private Key: 7
2,412,682,542 UART: [art] Derive CDI
2,412,683,366 UART: [art] Store in in slot 0x4
2,412,726,136 UART: [art] Derive Key Pair
2,412,727,187 UART: [art] Store priv key in slot 0x5
2,415,153,613 UART: [art] Derive Key Pair - Done
2,415,166,668 UART: [art] Signing Cert with AUTHO
2,415,167,977 UART: RITY.KEYID = 7
2,416,873,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,874,861 UART: [art] PUB.X = 9922E167C93FEA5BF364AB5E3E860216231C39036C63BDD65AD8790CC6A3C7C874D91CC8519E12E9D0C444FFE7BC8EED
2,416,882,141 UART: [art] PUB.Y = 8DE8940FB315EB785D243F6FC6E05278DEC22F247015F7E08206E65574C6A3A152861DD4F0168BB2DB81DD5A160B7419
2,416,889,406 UART: [art] SIG.R = 60B5926667AA945E152128A4A11D0BA789CDBD6351CDB8555CAC0518B80FE154669B0626BBAFE662852DA6327DCD00D2
2,416,896,786 UART: [art] SIG.S = 15012B376FE976CFA4061147081CE4D6BD637734A55998F5AA0B9FAACF0E81300DC5A30F555A56ECA333C3C80A8A2A71
2,417,875,259 UART: Caliptra RT
2,417,875,955 UART: [state] CFI Enabled
2,418,160,995 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 335.98s
Truncated 1329796 bytes from beginning
RT:
2,313,996,548 UART: Running Caliptra FMC ...
2,313,997,652 UART:
2,313,997,810 UART: [state] CFI Enabled
2,314,085,627 UART: [art] Extend RT PCRs Done
2,314,086,817 UART: [art] Lock RT PCRs Done
2,314,088,253 UART: [art] Populate DV Done
2,314,093,611 UART: [fht] FMC Alias Private Key: 7
2,314,095,314 UART: [art] Derive CDI
2,314,096,056 UART: [art] Store in in slot 0x4
2,314,154,836 UART: [art] Derive Key Pair
2,314,155,885 UART: [art] Store priv key in slot 0x5
2,316,618,931 UART: [art] Derive Key Pair - Done
2,316,631,682 UART: [art] Signing Cert with AUTHO
2,316,633,021 UART: RITY.KEYID = 7
2,318,344,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,318,346,468 UART: [art] PUB.X = 0D17C367522920942BCB8224D32759CA58072913AD227FC6C2B7DF351894168613D231CD2DAD1E8FC4A4E9585DB89C4F
2,318,353,695 UART: [art] PUB.Y = 58092DDD73C19180776DC48C3F1FCFC72412429BEDD06EE244701A44FE2AFB3305B6127D24A3CF68EB28444A137AEE5F
2,318,360,961 UART: [art] SIG.R = 0F125AFD4A9FD054E5060970A17ABAE37550ADC7FB4D00CC173BB17923D87A1BA65A262F370CEFC013671755527AC6C8
2,318,368,380 UART: [art] SIG.S = C7EDE031554021BE7A67AC4209F846431794376DD219BEBD55C743ECE74C7E57C5B633568E475BC49EE7D972853A9DA6
2,319,347,310 UART: Caliptra RT
2,319,348,007 UART: [state] CFI Enabled
2,319,680,868 UART: [rt] RT listening for mailbox commands...
2,319,682,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,319,827,403 UART:
2,319,827,732 UART: Running Caliptra ROM ...
2,319,828,859 UART:
2,319,829,022 UART: [state] CFI Enabled
2,319,901,782 UART: [state] LifecycleState = Unprovisioned
2,319,903,914 UART: [state] DebugLocked = No
2,319,906,017 UART: [state] WD Timer not started. Device not locked for debugging
2,319,911,335 UART: [kat] SHA2-256
2,320,101,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,320,111,929 UART: [kat] ++
2,320,112,421 UART: [kat] sha1
2,320,124,396 UART: [kat] SHA2-256
2,320,127,428 UART: [kat] SHA2-384
2,320,134,400 UART: [kat] SHA2-512-ACC
2,320,136,977 UART: [kat] ECC-384
2,322,582,137 UART: [kat] HMAC-384Kdf
2,322,606,358 UART: [kat] LMS
2,323,137,928 UART: [kat] --
2,323,143,810 UART: [update-reset] ++
2,326,599,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,326,602,768 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,327,208,841 >>> mbox cmd response: success
2,327,209,977 UART: [update-reset] Copying MAN_2 To MAN_1
2,327,247,512 UART: [update-reset Success] --
2,327,251,046 UART: [state] Locking Datavault
2,327,254,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,327,256,860 UART: [state] Locking ICCM
2,327,258,643 UART: [exit] Launching FMC @ 0x40000130
2,327,267,289 UART:
2,327,267,577 UART: Running Caliptra FMC ...
2,327,268,696 UART:
2,327,268,858 UART: [state] CFI Enabled
2,327,376,055 UART: [art] Extend RT PCRs Done
2,327,377,249 UART: [art] Lock RT PCRs Done
2,327,378,495 UART: [art] Populate DV Done
2,327,383,909 UART: [fht] FMC Alias Private Key: 7
2,327,385,396 UART: [art] Derive CDI
2,327,386,182 UART: [art] Store in in slot 0x4
2,327,445,169 UART: [art] Derive Key Pair
2,327,446,214 UART: [art] Store priv key in slot 0x5
2,329,909,680 UART: [art] Derive Key Pair - Done
2,329,922,728 UART: [art] Signing Cert with AUTHO
2,329,924,029 UART: RITY.KEYID = 7
2,331,635,475 UART: [art] Erasing AUTHORITY.KEYID = 7
2,331,636,987 UART: [art] PUB.X = 81B48F00550C4611FE742B9007EA9FBA9496E2980B694CC128C5AC2B1CE322BA49413E4C704D611B14E6309831CF7916
2,331,644,210 UART: [art] PUB.Y = 68874886BB357071C679CD7B56C77C6791E985AD70D6C303653975DE35DB83EC5F01EB41D872E174978A6554C3EA7F6D
2,331,651,467 UART: [art] SIG.R = ACA1137BD4CCD8EC324779737CB2F2C3BB262DC868579DFDABD9948F49CFF25EAB763E5AAAD679D61A775D02CCE6F6F0
2,331,658,883 UART: [art] SIG.S = 51C1732EEDBA7D97E886F05B1762893C07A31ADB73C99E6E8D31AF0876CAD5A4436AD17FB471075A47FAC69691E66111
2,332,637,586 UART: Caliptra RT
2,332,638,307 UART: [state] CFI Enabled
2,332,974,949 UART: [rt] RT listening for mailbox commands...
2,332,976,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,333,121,183 UART:
2,333,121,513 UART: Running Caliptra ROM ...
2,333,122,553 UART:
2,333,122,704 UART: [state] CFI Enabled
2,333,191,954 UART: [state] LifecycleState = Unprovisioned
2,333,194,067 UART: [state] DebugLocked = No
2,333,196,996 UART: [state] WD Timer not started. Device not locked for debugging
2,333,201,543 UART: [kat] SHA2-256
2,333,391,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,333,402,172 UART: [kat] ++
2,333,402,630 UART: [kat] sha1
2,333,414,382 UART: [kat] SHA2-256
2,333,417,414 UART: [kat] SHA2-384
2,333,422,657 UART: [kat] SHA2-512-ACC
2,333,425,221 UART: [kat] ECC-384
2,335,875,156 UART: [kat] HMAC-384Kdf
2,335,897,745 UART: [kat] LMS
2,336,429,327 UART: [kat] --
2,336,432,678 UART: [update-reset] ++
2,339,889,789 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,339,893,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,340,499,294 >>> mbox cmd response: success
2,340,500,180 UART: [update-reset] Copying MAN_2 To MAN_1
2,340,537,720 UART: [update-reset Success] --
2,340,542,608 UART: [state] Locking Datavault
2,340,546,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,340,548,665 UART: [state] Locking ICCM
2,340,550,620 UART: [exit] Launching FMC @ 0x40000130
2,340,559,316 UART:
2,340,559,549 UART: Running Caliptra FMC ...
2,340,560,580 UART:
2,340,560,728 UART: [state] CFI Enabled
2,340,667,396 UART: [art] Extend RT PCRs Done
2,340,668,607 UART: [art] Lock RT PCRs Done
2,340,669,982 UART: [art] Populate DV Done
2,340,675,338 UART: [fht] FMC Alias Private Key: 7
2,340,676,872 UART: [art] Derive CDI
2,340,677,606 UART: [art] Store in in slot 0x4
2,340,736,594 UART: [art] Derive Key Pair
2,340,737,639 UART: [art] Store priv key in slot 0x5
2,343,201,085 UART: [art] Derive Key Pair - Done
2,343,214,525 UART: [art] Signing Cert with AUTHO
2,343,215,827 UART: RITY.KEYID = 7
2,344,926,401 UART: [art] Erasing AUTHORITY.KEYID = 7
2,344,927,912 UART: [art] PUB.X = 0D17C367522920942BCB8224D32759CA58072913AD227FC6C2B7DF351894168613D231CD2DAD1E8FC4A4E9585DB89C4F
2,344,935,125 UART: [art] PUB.Y = 58092DDD73C19180776DC48C3F1FCFC72412429BEDD06EE244701A44FE2AFB3305B6127D24A3CF68EB28444A137AEE5F
2,344,942,432 UART: [art] SIG.R = 0F125AFD4A9FD054E5060970A17ABAE37550ADC7FB4D00CC173BB17923D87A1BA65A262F370CEFC013671755527AC6C8
2,344,949,844 UART: [art] SIG.S = C7EDE031554021BE7A67AC4209F846431794376DD219BEBD55C743ECE74C7E57C5B633568E475BC49EE7D972853A9DA6
2,345,928,583 UART: Caliptra RT
2,345,929,293 UART: [state] CFI Enabled
2,346,270,185 UART: [rt] RT listening for mailbox commands...
2,346,272,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,346,416,431 UART:
2,346,416,737 UART: Running Caliptra ROM ...
2,346,417,859 UART:
2,346,418,022 UART: [state] CFI Enabled
2,346,484,798 UART: [state] LifecycleState = Unprovisioned
2,346,486,907 UART: [state] DebugLocked = No
2,346,488,070 UART: [state] WD Timer not started. Device not locked for debugging
2,346,491,931 UART: [kat] SHA2-256
2,346,681,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,346,692,523 UART: [kat] ++
2,346,692,982 UART: [kat] sha1
2,346,704,168 UART: [kat] SHA2-256
2,346,707,127 UART: [kat] SHA2-384
2,346,712,668 UART: [kat] SHA2-512-ACC
2,346,715,255 UART: [kat] ECC-384
2,349,167,404 UART: [kat] HMAC-384Kdf
2,349,189,782 UART: [kat] LMS
2,349,721,367 UART: [kat] --
2,349,726,219 UART: [update-reset] ++
2,353,184,805 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,353,188,455 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,353,794,550 >>> mbox cmd response: success
2,353,794,925 UART: [update-reset] Copying MAN_2 To MAN_1
2,353,832,469 UART: [update-reset Success] --
2,353,834,632 UART: [state] Locking Datavault
2,353,838,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,353,840,884 UART: [state] Locking ICCM
2,353,843,670 UART: [exit] Launching FMC @ 0x40000130
2,353,852,362 UART:
2,353,852,614 UART: Running Caliptra FMC ...
2,353,853,642 UART:
2,353,853,792 UART: [state] CFI Enabled
2,353,959,046 UART: [art] Extend RT PCRs Done
2,353,960,238 UART: [art] Lock RT PCRs Done
2,353,961,888 UART: [art] Populate DV Done
2,353,967,412 UART: [fht] FMC Alias Private Key: 7
2,353,969,062 UART: [art] Derive CDI
2,353,969,893 UART: [art] Store in in slot 0x4
2,354,027,691 UART: [art] Derive Key Pair
2,354,028,742 UART: [art] Store priv key in slot 0x5
2,356,491,750 UART: [art] Derive Key Pair - Done
2,356,504,754 UART: [art] Signing Cert with AUTHO
2,356,506,064 UART: RITY.KEYID = 7
2,358,218,007 UART: [art] Erasing AUTHORITY.KEYID = 7
2,358,219,532 UART: [art] PUB.X = 81B48F00550C4611FE742B9007EA9FBA9496E2980B694CC128C5AC2B1CE322BA49413E4C704D611B14E6309831CF7916
2,358,226,824 UART: [art] PUB.Y = 68874886BB357071C679CD7B56C77C6791E985AD70D6C303653975DE35DB83EC5F01EB41D872E174978A6554C3EA7F6D
2,358,233,985 UART: [art] SIG.R = ACA1137BD4CCD8EC324779737CB2F2C3BB262DC868579DFDABD9948F49CFF25EAB763E5AAAD679D61A775D02CCE6F6F0
2,358,241,427 UART: [art] SIG.S = 51C1732EEDBA7D97E886F05B1762893C07A31ADB73C99E6E8D31AF0876CAD5A4436AD17FB471075A47FAC69691E66111
2,359,220,817 UART: Caliptra RT
2,359,221,510 UART: [state] CFI Enabled
2,359,559,299 UART: [rt] RT listening for mailbox commands...
2,359,561,192 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,359,705,655 UART:
2,359,705,972 UART: Running Caliptra ROM ...
2,359,707,096 UART:
2,359,707,267 UART: [state] CFI Enabled
2,359,772,897 UART: [state] LifecycleState = Unprovisioned
2,359,774,971 UART: [state] DebugLocked = No
2,359,777,280 UART: [state] WD Timer not started. Device not locked for debugging
2,359,782,552 UART: [kat] SHA2-256
2,359,972,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,359,983,164 UART: [kat] ++
2,359,983,708 UART: [kat] sha1
2,359,995,259 UART: [kat] SHA2-256
2,359,998,276 UART: [kat] SHA2-384
2,360,003,741 UART: [kat] SHA2-512-ACC
2,360,006,332 UART: [kat] ECC-384
2,362,455,107 UART: [kat] HMAC-384Kdf
2,362,481,645 UART: [kat] LMS
2,363,013,194 UART: [kat] --
2,363,018,428 UART: [update-reset] ++
2,366,480,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,366,484,979 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,367,091,021 >>> mbox cmd response: success
2,367,092,061 UART: [update-reset] Copying MAN_2 To MAN_1
2,367,129,610 UART: [update-reset Success] --
2,367,134,487 UART: [state] Locking Datavault
2,367,137,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,367,140,013 UART: [state] Locking ICCM
2,367,142,936 UART: [exit] Launching FMC @ 0x40000130
2,367,151,629 UART:
2,367,151,864 UART: Running Caliptra FMC ...
2,367,152,964 UART:
2,367,153,124 UART: [state] CFI Enabled
2,367,250,081 UART: [art] Extend RT PCRs Done
2,367,251,288 UART: [art] Lock RT PCRs Done
2,367,252,532 UART: [art] Populate DV Done
2,367,257,835 UART: [fht] FMC Alias Private Key: 7
2,367,259,325 UART: [art] Derive CDI
2,367,260,144 UART: [art] Store in in slot 0x4
2,367,318,977 UART: [art] Derive Key Pair
2,367,320,026 UART: [art] Store priv key in slot 0x5
2,369,782,838 UART: [art] Derive Key Pair - Done
2,369,795,760 UART: [art] Signing Cert with AUTHO
2,369,797,076 UART: RITY.KEYID = 7
2,371,508,986 UART: [art] Erasing AUTHORITY.KEYID = 7
2,371,510,477 UART: [art] PUB.X = 0D17C367522920942BCB8224D32759CA58072913AD227FC6C2B7DF351894168613D231CD2DAD1E8FC4A4E9585DB89C4F
2,371,517,765 UART: [art] PUB.Y = 58092DDD73C19180776DC48C3F1FCFC72412429BEDD06EE244701A44FE2AFB3305B6127D24A3CF68EB28444A137AEE5F
2,371,525,023 UART: [art] SIG.R = 0F125AFD4A9FD054E5060970A17ABAE37550ADC7FB4D00CC173BB17923D87A1BA65A262F370CEFC013671755527AC6C8
2,371,532,403 UART: [art] SIG.S = C7EDE031554021BE7A67AC4209F846431794376DD219BEBD55C743ECE74C7E57C5B633568E475BC49EE7D972853A9DA6
2,372,510,900 UART: Caliptra RT
2,372,511,619 UART: [state] CFI Enabled
2,372,851,451 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 333.72s
Truncated 715175 bytes from beginning
F4D47E7D02091268771560F30C90778
2,393,135,953 UART: [art] SIG.R = 56DA9EE6D85E4A96060A8DE4DAB13EAB73DBCD893F57BD27F0CCC4053FD34BA3F9E3433305EE2ABD819DF797E07052F7
2,393,143,385 UART: [art] SIG.S = 85060662DD7999A72D0884C9BCF4D87FCCD0152B228BFD96AFB876C2C0B2985047F70B71D3A5AA4DFFEAB8FBFE79CA74
2,394,122,914 UART: Caliptra RT
2,394,123,645 UART: [state] CFI Enabled
2,394,460,107 UART: [rt] RT listening for mailbox commands...
2,394,462,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,402,272,371 >>> mbox cmd response: success
2,402,307,300 UART:
2,402,307,609 UART: Running Caliptra FMC ...
2,402,308,731 UART:
2,402,308,892 UART: [state] CFI Enabled
2,402,403,121 UART: [art] Extend RT PCRs Done
2,402,404,308 UART: [art] Lock RT PCRs Done
2,402,405,770 UART: [art] Populate DV Done
2,402,411,340 UART: [fht] FMC Alias Private Key: 7
2,402,412,930 UART: [art] Derive CDI
2,402,413,746 UART: [art] Store in in slot 0x4
2,402,472,298 UART: [art] Derive Key Pair
2,402,473,364 UART: [art] Store priv key in slot 0x5
2,404,936,104 UART: [art] Derive Key Pair - Done
2,404,949,159 UART: [art] Signing Cert with AUTHO
2,404,950,463 UART: RITY.KEYID = 7
2,406,661,233 UART: [art] Erasing AUTHORITY.KEYID = 7
2,406,662,742 UART: [art] PUB.X = 18FA93CDD6885C12B4D24430D1F4046EF59AAB6BEDCC3E9DB57A88C573CC7F803E172FF5F2751C78018473DB65459230
2,406,670,001 UART: [art] PUB.Y = C2E74A5EFE8E3BD112B7DA0EFB3954F0752967B4D8889F1BC432AFD4DD49455115D9F0E83EDE5D5BA5D047C7D8D7BB3E
2,406,677,274 UART: [art] SIG.R = 96114C94658DBB9C31AFC5CD654A6757E044B148A7FF8A8D05ECA4BA26E548FDD2F1E49EBA88B2F11D766B075D44EBD7
2,406,684,921 UART: [art] SIG.S = F5760E8728BA72B29794316043C60AC56F9E2A399DA95DDC57FADF1F88B20C90692E0798099A00E74D29123601982F81
2,407,663,635 UART: Caliptra RT
2,407,664,342 UART: [state] CFI Enabled
2,407,999,909 UART: [rt] RT listening for mailbox commands...
2,408,001,781 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,415,813,118 >>> mbox cmd response: success
2,415,845,555 UART:
2,415,845,826 UART: Running Caliptra FMC ...
2,415,846,968 UART:
2,415,847,137 UART: [state] CFI Enabled
2,415,949,357 UART: [art] Extend RT PCRs Done
2,415,950,534 UART: [art] Lock RT PCRs Done
2,415,951,941 UART: [art] Populate DV Done
2,415,957,622 UART: [fht] FMC Alias Private Key: 7
2,415,959,213 UART: [art] Derive CDI
2,415,960,027 UART: [art] Store in in slot 0x4
2,416,018,538 UART: [art] Derive Key Pair
2,416,019,582 UART: [art] Store priv key in slot 0x5
2,418,482,324 UART: [art] Derive Key Pair - Done
2,418,495,548 UART: [art] Signing Cert with AUTHO
2,418,496,853 UART: RITY.KEYID = 7
2,420,208,038 UART: [art] Erasing AUTHORITY.KEYID = 7
2,420,209,558 UART: [art] PUB.X = 2092E984AA8FCBB6EDB57156D0A3B1ED3ABC1CFD5B44D8A01B52311640DB3726438BE807C7D555DA4A7DB9C07763DB38
2,420,216,856 UART: [art] PUB.Y = C017FB9D2475CA3CF4D1D66C185BC3BD4DBB79C57025DD93E77C3C677E9D67BE6F4D47E7D02091268771560F30C90778
2,420,224,100 UART: [art] SIG.R = 56DA9EE6D85E4A96060A8DE4DAB13EAB73DBCD893F57BD27F0CCC4053FD34BA3F9E3433305EE2ABD819DF797E07052F7
2,420,231,510 UART: [art] SIG.S = 85060662DD7999A72D0884C9BCF4D87FCCD0152B228BFD96AFB876C2C0B2985047F70B71D3A5AA4DFFEAB8FBFE79CA74
2,421,210,230 UART: Caliptra RT
2,421,210,943 UART: [state] CFI Enabled
2,421,542,500 UART: [rt] RT listening for mailbox commands...
2,421,544,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,354,223 >>> mbox cmd response: success
2,429,390,663 UART:
2,429,390,933 UART: Running Caliptra FMC ...
2,429,392,049 UART:
2,429,392,222 UART: [state] CFI Enabled
2,429,496,686 UART: [art] Extend RT PCRs Done
2,429,497,885 UART: [art] Lock RT PCRs Done
2,429,499,289 UART: [art] Populate DV Done
2,429,504,858 UART: [fht] FMC Alias Private Key: 7
2,429,506,556 UART: [art] Derive CDI
2,429,507,386 UART: [art] Store in in slot 0x4
2,429,565,897 UART: [art] Derive Key Pair
2,429,566,936 UART: [art] Store priv key in slot 0x5
2,432,030,910 UART: [art] Derive Key Pair - Done
2,432,044,080 UART: [art] Signing Cert with AUTHO
2,432,045,583 UART: RITY.KEYID = 7
2,433,758,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,433,759,717 UART: [art] PUB.X = 18FA93CDD6885C12B4D24430D1F4046EF59AAB6BEDCC3E9DB57A88C573CC7F803E172FF5F2751C78018473DB65459230
2,433,767,022 UART: [art] PUB.Y = C2E74A5EFE8E3BD112B7DA0EFB3954F0752967B4D8889F1BC432AFD4DD49455115D9F0E83EDE5D5BA5D047C7D8D7BB3E
2,433,774,246 UART: [art] SIG.R = 96114C94658DBB9C31AFC5CD654A6757E044B148A7FF8A8D05ECA4BA26E548FDD2F1E49EBA88B2F11D766B075D44EBD7
2,433,781,681 UART: [art] SIG.S = F5760E8728BA72B29794316043C60AC56F9E2A399DA95DDC57FADF1F88B20C90692E0798099A00E74D29123601982F81
2,434,761,085 UART: Caliptra RT
2,434,761,799 UART: [state] CFI Enabled
2,435,093,673 UART: [rt] RT listening for mailbox commands...
2,435,095,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,442,908,996 >>> mbox cmd response: success
2,442,944,157 UART:
2,442,944,466 UART: Running Caliptra FMC ...
2,442,945,506 UART:
2,442,945,659 UART: [state] CFI Enabled
2,443,043,082 UART: [art] Extend RT PCRs Done
2,443,044,280 UART: [art] Lock RT PCRs Done
2,443,045,719 UART: [art] Populate DV Done
2,443,051,185 UART: [fht] FMC Alias Private Key: 7
2,443,052,830 UART: [art] Derive CDI
2,443,053,573 UART: [art] Store in in slot 0x4
2,443,112,599 UART: [art] Derive Key Pair
2,443,113,640 UART: [art] Store priv key in slot 0x5
2,445,576,541 UART: [art] Derive Key Pair - Done
2,445,589,657 UART: [art] Signing Cert with AUTHO
2,445,590,960 UART: RITY.KEYID = 7
2,447,302,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,447,303,883 UART: [art] PUB.X = 2092E984AA8FCBB6EDB57156D0A3B1ED3ABC1CFD5B44D8A01B52311640DB3726438BE807C7D555DA4A7DB9C07763DB38
2,447,311,172 UART: [art] PUB.Y = C017FB9D2475CA3CF4D1D66C185BC3BD4DBB79C57025DD93E77C3C677E9D67BE6F4D47E7D02091268771560F30C90778
2,447,318,400 UART: [art] SIG.R = 56DA9EE6D85E4A96060A8DE4DAB13EAB73DBCD893F57BD27F0CCC4053FD34BA3F9E3433305EE2ABD819DF797E07052F7
2,447,325,878 UART: [art] SIG.S = 85060662DD7999A72D0884C9BCF4D87FCCD0152B228BFD96AFB876C2C0B2985047F70B71D3A5AA4DFFEAB8FBFE79CA74
2,448,305,097 UART: Caliptra RT
2,448,305,814 UART: [state] CFI Enabled
2,448,641,933 UART: [rt] RT listening for mailbox commands...
2,448,643,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,456,461,066 >>> mbox cmd response: success
2,456,494,499 UART:
2,456,494,775 UART: Running Caliptra FMC ...
2,456,495,895 UART:
2,456,496,056 UART: [state] CFI Enabled
2,456,590,126 UART: [art] Extend RT PCRs Done
2,456,591,318 UART: [art] Lock RT PCRs Done
2,456,592,828 UART: [art] Populate DV Done
2,456,598,147 UART: [fht] FMC Alias Private Key: 7
2,456,599,848 UART: [art] Derive CDI
2,456,600,663 UART: [art] Store in in slot 0x4
2,456,659,443 UART: [art] Derive Key Pair
2,456,660,490 UART: [art] Store priv key in slot 0x5
2,459,123,431 UART: [art] Derive Key Pair - Done
2,459,136,432 UART: [art] Signing Cert with AUTHO
2,459,137,737 UART: RITY.KEYID = 7
2,460,849,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,460,850,744 UART: [art] PUB.X = 18FA93CDD6885C12B4D24430D1F4046EF59AAB6BEDCC3E9DB57A88C573CC7F803E172FF5F2751C78018473DB65459230
2,460,858,038 UART: [art] PUB.Y = C2E74A5EFE8E3BD112B7DA0EFB3954F0752967B4D8889F1BC432AFD4DD49455115D9F0E83EDE5D5BA5D047C7D8D7BB3E
2,460,865,322 UART: [art] SIG.R = 96114C94658DBB9C31AFC5CD654A6757E044B148A7FF8A8D05ECA4BA26E548FDD2F1E49EBA88B2F11D766B075D44EBD7
2,460,872,732 UART: [art] SIG.S = F5760E8728BA72B29794316043C60AC56F9E2A399DA95DDC57FADF1F88B20C90692E0798099A00E74D29123601982F81
2,461,851,454 UART: Caliptra RT
2,461,852,162 UART: [state] CFI Enabled
2,462,188,314 UART: [rt] RT listening for mailbox commands...
2,462,190,209 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,469,998,585 >>> mbox cmd response: success
2,470,033,780 UART:
2,470,034,059 UART: Running Caliptra FMC ...
2,470,035,178 UART:
2,470,035,344 UART: [state] CFI Enabled
2,470,133,160 UART: [art] Extend RT PCRs Done
2,470,134,349 UART: [art] Lock RT PCRs Done
2,470,135,707 UART: [art] Populate DV Done
2,470,141,376 UART: [fht] FMC Alias Private Key: 7
2,470,143,078 UART: [art] Derive CDI
2,470,143,906 UART: [art] Store in in slot 0x4
2,470,202,136 UART: [art] Derive Key Pair
2,470,203,130 UART: [art] Store priv key in slot 0x5
2,472,666,273 UART: [art] Derive Key Pair - Done
2,472,679,268 UART: [art] Signing Cert with AUTHO
2,472,680,587 UART: RITY.KEYID = 7
2,474,391,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,474,393,469 UART: [art] PUB.X = 2092E984AA8FCBB6EDB57156D0A3B1ED3ABC1CFD5B44D8A01B52311640DB3726438BE807C7D555DA4A7DB9C07763DB38
2,474,400,761 UART: [art] PUB.Y = C017FB9D2475CA3CF4D1D66C185BC3BD4DBB79C57025DD93E77C3C677E9D67BE6F4D47E7D02091268771560F30C90778
2,474,408,011 UART: [art] SIG.R = 56DA9EE6D85E4A96060A8DE4DAB13EAB73DBCD893F57BD27F0CCC4053FD34BA3F9E3433305EE2ABD819DF797E07052F7
2,474,415,427 UART: [art] SIG.S = 85060662DD7999A72D0884C9BCF4D87FCCD0152B228BFD96AFB876C2C0B2985047F70B71D3A5AA4DFFEAB8FBFE79CA74
2,475,394,357 UART: Caliptra RT
2,475,395,073 UART: [state] CFI Enabled
2,475,727,608 UART: [rt] RT listening for mailbox commands...
2,475,729,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,483,545,933 >>> mbox cmd response: success
2,483,582,321 UART:
2,483,582,618 UART: Running Caliptra FMC ...
2,483,583,739 UART:
2,483,583,905 UART: [state] CFI Enabled
2,483,676,682 UART: [art] Extend RT PCRs Done
2,483,677,884 UART: [art] Lock RT PCRs Done
2,483,679,451 UART: [art] Populate DV Done
2,483,685,076 UART: [fht] FMC Alias Private Key: 7
2,483,686,780 UART: [art] Derive CDI
2,483,687,591 UART: [art] Store in in slot 0x4
2,483,746,145 UART: [art] Derive Key Pair
2,483,747,182 UART: [art] Store priv key in slot 0x5
2,486,209,614 UART: [art] Derive Key Pair - Done
2,486,222,439 UART: [art] Signing Cert with AUTHO
2,486,223,749 UART: RITY.KEYID = 7
2,487,935,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,936,578 UART: [art] PUB.X = 18FA93CDD6885C12B4D24430D1F4046EF59AAB6BEDCC3E9DB57A88C573CC7F803E172FF5F2751C78018473DB65459230
2,487,943,813 UART: [art] PUB.Y = C2E74A5EFE8E3BD112B7DA0EFB3954F0752967B4D8889F1BC432AFD4DD49455115D9F0E83EDE5D5BA5D047C7D8D7BB3E
2,487,951,090 UART: [art] SIG.R = 96114C94658DBB9C31AFC5CD654A6757E044B148A7FF8A8D05ECA4BA26E548FDD2F1E49EBA88B2F11D766B075D44EBD7
2,487,958,503 UART: [art] SIG.S = F5760E8728BA72B29794316043C60AC56F9E2A399DA95DDC57FADF1F88B20C90692E0798099A00E74D29123601982F81
2,488,937,960 UART: Caliptra RT
2,488,938,680 UART: [state] CFI Enabled
2,489,275,696 UART: [rt] RT listening for mailbox commands...
2,489,277,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,497,091,743 >>> mbox cmd response: success
2,497,124,402 UART:
2,497,124,679 UART: Running Caliptra FMC ...
2,497,125,797 UART:
2,497,125,959 UART: [state] CFI Enabled
2,497,220,822 UART: [art] Extend RT PCRs Done
2,497,222,003 UART: [art] Lock RT PCRs Done
2,497,223,385 UART: [art] Populate DV Done
2,497,228,901 UART: [fht] FMC Alias Private Key: 7
2,497,230,595 UART: [art] Derive CDI
2,497,231,332 UART: [art] Store in in slot 0x4
2,497,289,725 UART: [art] Derive Key Pair
2,497,290,769 UART: [art] Store priv key in slot 0x5
2,499,753,633 UART: [art] Derive Key Pair - Done
2,499,766,200 UART: [art] Signing Cert with AUTHO
2,499,767,510 UART: RITY.KEYID = 7
2,501,479,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,501,480,762 UART: [art] PUB.X = 2092E984AA8FCBB6EDB57156D0A3B1ED3ABC1CFD5B44D8A01B52311640DB3726438BE807C7D555DA4A7DB9C07763DB38
2,501,488,054 UART: [art] PUB.Y = C017FB9D2475CA3CF4D1D66C185BC3BD4DBB79C57025DD93E77C3C677E9D67BE6F4D47E7D02091268771560F30C90778
2,501,495,313 UART: [art] SIG.R = 56DA9EE6D85E4A96060A8DE4DAB13EAB73DBCD893F57BD27F0CCC4053FD34BA3F9E3433305EE2ABD819DF797E07052F7
2,501,502,714 UART: [art] SIG.S = 85060662DD7999A72D0884C9BCF4D87FCCD0152B228BFD96AFB876C2C0B2985047F70B71D3A5AA4DFFEAB8FBFE79CA74
2,502,481,957 UART: Caliptra RT
2,502,482,670 UART: [state] CFI Enabled
2,502,822,640 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 340.21s
Truncated 1329928 bytes from beginning
RT:
2,358,807,523 UART: Running Caliptra FMC ...
2,358,808,642 UART:
2,358,808,807 UART: [state] CFI Enabled
2,358,852,772 UART: [art] Extend RT PCRs Done
2,358,853,923 UART: [art] Lock RT PCRs Done
2,358,855,377 UART: [art] Populate DV Done
2,358,861,062 UART: [fht] FMC Alias Private Key: 7
2,358,862,772 UART: [art] Derive CDI
2,358,863,609 UART: [art] Store in in slot 0x4
2,358,906,376 UART: [art] Derive Key Pair
2,358,907,419 UART: [art] Store priv key in slot 0x5
2,361,333,540 UART: [art] Derive Key Pair - Done
2,361,346,376 UART: [art] Signing Cert with AUTHO
2,361,347,688 UART: RITY.KEYID = 7
2,363,053,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,054,653 UART: [art] PUB.X = 88D214BE0BCA7D2DE40D8D6D2AA2F7BF6867B32375CC9879D82B5261BDF954A265E13EE7BCD19FB5ECD67EAAD3BC5601
2,363,061,938 UART: [art] PUB.Y = 86CC75919F7805747C41F03149C3D9196B9EF412C370CF788D1FA0CA348CB95ABACD875D6F16C2B5F920F6604597CAFC
2,363,069,219 UART: [art] SIG.R = E50E991FF5D66730D383BEA351CA7F05A427530D4A45ED590F7FC32A013E5828707DC59D34DC1FAF5A6E5D6D33BD34B9
2,363,076,603 UART: [art] SIG.S = 019D92693BC853E8F1DC4AAD695EA51B28DE8E7E652E5711DAF0532E83588C9660F64628F557885918D9498EA8F6C8EC
2,364,055,071 UART: Caliptra RT
2,364,055,773 UART: [state] CFI Enabled
2,364,344,413 UART: [rt] RT listening for mailbox commands...
2,364,346,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,364,491,006 UART:
2,364,491,351 UART: Running Caliptra ROM ...
2,364,492,393 UART:
2,364,492,601 UART: [state] CFI Enabled
2,365,462,655 UART: [state] LifecycleState = Unprovisioned
2,365,464,563 UART: [state] DebugLocked = No
2,365,465,854 UART: [state] WD Timer not started. Device not locked for debugging
2,365,470,501 UART: [kat] SHA2-256
2,365,660,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,671,141 UART: [kat] ++
2,365,671,664 UART: [kat] sha1
2,365,683,743 UART: [kat] SHA2-256
2,365,686,752 UART: [kat] SHA2-384
2,365,692,599 UART: [kat] SHA2-512-ACC
2,365,695,173 UART: [kat] ECC-384
2,368,135,024 UART: [kat] HMAC-384Kdf
2,368,146,988 UART: [kat] LMS
2,368,678,587 UART: [kat] --
2,368,681,888 UART: [update-reset] ++
2,372,144,488 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,148,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,372,754,720 >>> mbox cmd response: success
2,372,755,115 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,792,654 UART: [update-reset Success] --
2,372,796,424 UART: [state] Locking Datavault
2,372,799,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,801,585 UART: [state] Locking ICCM
2,372,803,454 UART: [exit] Launching FMC @ 0x40000130
2,372,812,118 UART:
2,372,812,372 UART: Running Caliptra FMC ...
2,372,813,407 UART:
2,372,813,558 UART: [state] CFI Enabled
2,372,857,682 UART: [art] Extend RT PCRs Done
2,372,858,857 UART: [art] Lock RT PCRs Done
2,372,860,016 UART: [art] Populate DV Done
2,372,865,437 UART: [fht] FMC Alias Private Key: 7
2,372,866,982 UART: [art] Derive CDI
2,372,867,722 UART: [art] Store in in slot 0x4
2,372,910,158 UART: [art] Derive Key Pair
2,372,911,202 UART: [art] Store priv key in slot 0x5
2,375,338,133 UART: [art] Derive Key Pair - Done
2,375,351,135 UART: [art] Signing Cert with AUTHO
2,375,352,439 UART: RITY.KEYID = 7
2,377,057,717 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,059,227 UART: [art] PUB.X = 977D8DD1114AC57E39525B8F1EA15AEA0BB23033F07D0CB016970DC75D741B36934701F7C12DDE95881CBE1D8787EBC7
2,377,066,458 UART: [art] PUB.Y = 24E46733C79CC4634C5DA7BE6A5839169E4C3288ED4A06C28BCDC6760488BD21F22F98743A19E9EB7DE179683E885B6D
2,377,073,723 UART: [art] SIG.R = 57727A5D00CB3BB052B469888C0656BA48A96F907E535BBB0421903C1CACB7B9DB11E386292FF97FF2379CDE092DA090
2,377,081,108 UART: [art] SIG.S = D02DD6EF4CE14081333FB28CD41451D94E40C78841118996084FA1927EB2D545BB6088EFCBC6726BCD68E29BC9E0C3FD
2,378,060,614 UART: Caliptra RT
2,378,061,345 UART: [state] CFI Enabled
2,378,351,769 UART: [rt] RT listening for mailbox commands...
2,378,353,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,378,498,030 UART:
2,378,498,337 UART: Running Caliptra ROM ...
2,378,499,376 UART:
2,378,499,691 UART: [state] CFI Enabled
2,378,514,235 UART: [state] LifecycleState = Unprovisioned
2,378,516,123 UART: [state] DebugLocked = No
2,378,517,476 UART: [state] WD Timer not started. Device not locked for debugging
2,378,522,378 UART: [kat] SHA2-256
2,378,712,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,723,035 UART: [kat] ++
2,378,723,565 UART: [kat] sha1
2,378,735,426 UART: [kat] SHA2-256
2,378,738,439 UART: [kat] SHA2-384
2,378,745,592 UART: [kat] SHA2-512-ACC
2,378,748,170 UART: [kat] ECC-384
2,381,189,338 UART: [kat] HMAC-384Kdf
2,381,203,088 UART: [kat] LMS
2,381,734,678 UART: [kat] --
2,381,739,379 UART: [update-reset] ++
2,385,205,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,208,625 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,385,814,676 >>> mbox cmd response: success
2,385,816,102 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,853,671 UART: [update-reset Success] --
2,385,859,516 UART: [state] Locking Datavault
2,385,863,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,865,238 UART: [state] Locking ICCM
2,385,868,055 UART: [exit] Launching FMC @ 0x40000130
2,385,876,693 UART:
2,385,876,953 UART: Running Caliptra FMC ...
2,385,878,064 UART:
2,385,878,233 UART: [state] CFI Enabled
2,385,922,196 UART: [art] Extend RT PCRs Done
2,385,923,353 UART: [art] Lock RT PCRs Done
2,385,924,813 UART: [art] Populate DV Done
2,385,930,450 UART: [fht] FMC Alias Private Key: 7
2,385,932,109 UART: [art] Derive CDI
2,385,932,934 UART: [art] Store in in slot 0x4
2,385,975,748 UART: [art] Derive Key Pair
2,385,976,753 UART: [art] Store priv key in slot 0x5
2,388,403,434 UART: [art] Derive Key Pair - Done
2,388,416,477 UART: [art] Signing Cert with AUTHO
2,388,417,803 UART: RITY.KEYID = 7
2,390,123,199 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,124,713 UART: [art] PUB.X = 88D214BE0BCA7D2DE40D8D6D2AA2F7BF6867B32375CC9879D82B5261BDF954A265E13EE7BCD19FB5ECD67EAAD3BC5601
2,390,132,015 UART: [art] PUB.Y = 86CC75919F7805747C41F03149C3D9196B9EF412C370CF788D1FA0CA348CB95ABACD875D6F16C2B5F920F6604597CAFC
2,390,139,245 UART: [art] SIG.R = E50E991FF5D66730D383BEA351CA7F05A427530D4A45ED590F7FC32A013E5828707DC59D34DC1FAF5A6E5D6D33BD34B9
2,390,146,677 UART: [art] SIG.S = 019D92693BC853E8F1DC4AAD695EA51B28DE8E7E652E5711DAF0532E83588C9660F64628F557885918D9498EA8F6C8EC
2,391,125,768 UART: Caliptra RT
2,391,126,465 UART: [state] CFI Enabled
2,391,416,774 UART: [rt] RT listening for mailbox commands...
2,391,418,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,391,562,994 UART:
2,391,563,302 UART: Running Caliptra ROM ...
2,391,564,343 UART:
2,391,564,606 UART: [state] CFI Enabled
2,391,577,588 UART: [state] LifecycleState = Unprovisioned
2,391,579,424 UART: [state] DebugLocked = No
2,391,582,077 UART: [state] WD Timer not started. Device not locked for debugging
2,391,586,712 UART: [kat] SHA2-256
2,391,776,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,391,787,402 UART: [kat] ++
2,391,787,864 UART: [kat] sha1
2,391,799,296 UART: [kat] SHA2-256
2,391,802,322 UART: [kat] SHA2-384
2,391,809,780 UART: [kat] SHA2-512-ACC
2,391,812,360 UART: [kat] ECC-384
2,394,254,382 UART: [kat] HMAC-384Kdf
2,394,268,337 UART: [kat] LMS
2,394,799,935 UART: [kat] --
2,394,803,714 UART: [update-reset] ++
2,398,262,295 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,266,277 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,398,872,326 >>> mbox cmd response: success
2,398,873,358 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,910,891 UART: [update-reset Success] --
2,398,915,237 UART: [state] Locking Datavault
2,398,920,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,922,476 UART: [state] Locking ICCM
2,398,924,187 UART: [exit] Launching FMC @ 0x40000130
2,398,932,867 UART:
2,398,933,115 UART: Running Caliptra FMC ...
2,398,934,144 UART:
2,398,934,299 UART: [state] CFI Enabled
2,398,977,938 UART: [art] Extend RT PCRs Done
2,398,979,128 UART: [art] Lock RT PCRs Done
2,398,980,560 UART: [art] Populate DV Done
2,398,986,139 UART: [fht] FMC Alias Private Key: 7
2,398,987,733 UART: [art] Derive CDI
2,398,988,481 UART: [art] Store in in slot 0x4
2,399,031,028 UART: [art] Derive Key Pair
2,399,032,040 UART: [art] Store priv key in slot 0x5
2,401,458,751 UART: [art] Derive Key Pair - Done
2,401,472,045 UART: [art] Signing Cert with AUTHO
2,401,473,362 UART: RITY.KEYID = 7
2,403,179,010 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,180,525 UART: [art] PUB.X = 977D8DD1114AC57E39525B8F1EA15AEA0BB23033F07D0CB016970DC75D741B36934701F7C12DDE95881CBE1D8787EBC7
2,403,187,781 UART: [art] PUB.Y = 24E46733C79CC4634C5DA7BE6A5839169E4C3288ED4A06C28BCDC6760488BD21F22F98743A19E9EB7DE179683E885B6D
2,403,195,050 UART: [art] SIG.R = 57727A5D00CB3BB052B469888C0656BA48A96F907E535BBB0421903C1CACB7B9DB11E386292FF97FF2379CDE092DA090
2,403,202,432 UART: [art] SIG.S = D02DD6EF4CE14081333FB28CD41451D94E40C78841118996084FA1927EB2D545BB6088EFCBC6726BCD68E29BC9E0C3FD
2,404,181,735 UART: Caliptra RT
2,404,182,448 UART: [state] CFI Enabled
2,404,474,795 UART: [rt] RT listening for mailbox commands...
2,404,476,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,404,621,049 UART:
2,404,621,370 UART: Running Caliptra ROM ...
2,404,622,497 UART:
2,404,622,663 UART: [state] CFI Enabled
2,405,582,356 UART: [state] LifecycleState = Unprovisioned
2,405,584,265 UART: [state] DebugLocked = No
2,405,586,795 UART: [state] WD Timer not started. Device not locked for debugging
2,405,591,869 UART: [kat] SHA2-256
2,405,781,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,792,520 UART: [kat] ++
2,405,793,036 UART: [kat] sha1
2,405,803,711 UART: [kat] SHA2-256
2,405,806,732 UART: [kat] SHA2-384
2,405,813,707 UART: [kat] SHA2-512-ACC
2,405,816,341 UART: [kat] ECC-384
2,408,260,043 UART: [kat] HMAC-384Kdf
2,408,271,912 UART: [kat] LMS
2,408,803,529 UART: [kat] --
2,408,808,167 UART: [update-reset] ++
2,412,260,254 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,262,834 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
2,412,868,859 >>> mbox cmd response: success
2,412,870,690 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,908,279 UART: [update-reset Success] --
2,412,914,184 UART: [state] Locking Datavault
2,412,918,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,920,594 UART: [state] Locking ICCM
2,412,923,025 UART: [exit] Launching FMC @ 0x40000130
2,412,931,718 UART:
2,412,931,960 UART: Running Caliptra FMC ...
2,412,933,068 UART:
2,412,933,243 UART: [state] CFI Enabled
2,412,976,781 UART: [art] Extend RT PCRs Done
2,412,977,965 UART: [art] Lock RT PCRs Done
2,412,979,268 UART: [art] Populate DV Done
2,412,984,852 UART: [fht] FMC Alias Private Key: 7
2,412,986,556 UART: [art] Derive CDI
2,412,987,399 UART: [art] Store in in slot 0x4
2,413,029,844 UART: [art] Derive Key Pair
2,413,030,856 UART: [art] Store priv key in slot 0x5
2,415,457,886 UART: [art] Derive Key Pair - Done
2,415,470,775 UART: [art] Signing Cert with AUTHO
2,415,472,077 UART: RITY.KEYID = 7
2,417,177,855 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,179,363 UART: [art] PUB.X = 88D214BE0BCA7D2DE40D8D6D2AA2F7BF6867B32375CC9879D82B5261BDF954A265E13EE7BCD19FB5ECD67EAAD3BC5601
2,417,186,647 UART: [art] PUB.Y = 86CC75919F7805747C41F03149C3D9196B9EF412C370CF788D1FA0CA348CB95ABACD875D6F16C2B5F920F6604597CAFC
2,417,193,918 UART: [art] SIG.R = E50E991FF5D66730D383BEA351CA7F05A427530D4A45ED590F7FC32A013E5828707DC59D34DC1FAF5A6E5D6D33BD34B9
2,417,201,290 UART: [art] SIG.S = 019D92693BC853E8F1DC4AAD695EA51B28DE8E7E652E5711DAF0532E83588C9660F64628F557885918D9498EA8F6C8EC
2,418,180,403 UART: Caliptra RT
2,418,181,098 UART: [state] CFI Enabled
2,418,471,826 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 335.99s
Truncated 715093 bytes from beginning
539EF9BEC93F4B210B34A7E3CD3D34B
2,310,260,248 UART: [art] SIG.R = 06B5A677ED8533C405AF80E796207F8E82214142465B02CD4020CA1D6396DE8309DAEFE03E01A600481A8AED233AE868
2,310,267,613 UART: [art] SIG.S = 39B6CCC3372EEC889C57D47BFC40B805F8850A431DA7889605167935295E1D7B2D94048671BEBC630769D505E6FD16E8
2,311,246,763 UART: Caliptra RT
2,311,247,482 UART: [state] CFI Enabled
2,311,533,010 UART: [rt] RT listening for mailbox commands...
2,311,534,912 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,319,270,664 >>> mbox cmd response: success
2,319,305,490 UART:
2,319,305,769 UART: Running Caliptra FMC ...
2,319,306,894 UART:
2,319,307,065 UART: [state] CFI Enabled
2,319,351,426 UART: [art] Extend RT PCRs Done
2,319,352,621 UART: [art] Lock RT PCRs Done
2,319,353,874 UART: [art] Populate DV Done
2,319,359,450 UART: [fht] FMC Alias Private Key: 7
2,319,361,152 UART: [art] Derive CDI
2,319,361,974 UART: [art] Store in in slot 0x4
2,319,404,700 UART: [art] Derive Key Pair
2,319,405,710 UART: [art] Store priv key in slot 0x5
2,321,832,698 UART: [art] Derive Key Pair - Done
2,321,845,591 UART: [art] Signing Cert with AUTHO
2,321,846,905 UART: RITY.KEYID = 7
2,323,552,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,323,554,147 UART: [art] PUB.X = 75B7854A42B318FE76DF3440BFB62A57E2AFD25B0373C6396DE6103779BD6DBBE63191B0E31BCEF4051A997602CD8200
2,323,561,406 UART: [art] PUB.Y = 9CBBEE53EC5B393359F9588DF335B9DA5E9524CC6FB1F23F2748F21AA7E7D53004FD2C23DC45D619A74862C8C984C99A
2,323,568,651 UART: [art] SIG.R = 5466D16C56DDC329066C61717729BDD9AA7933D1717B2E21CFF21C0A645D1394815DE5E0863E712B92AF865A35FFD60B
2,323,576,088 UART: [art] SIG.S = 4D151078892B7630418DC1D4431B229F63C2200732FBFE0345AC0AEFB6932C00C465A0D8C43D6241362EC5094F5F3F43
2,324,554,852 UART: Caliptra RT
2,324,555,548 UART: [state] CFI Enabled
2,324,845,603 UART: [rt] RT listening for mailbox commands...
2,324,847,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,332,764,426 >>> mbox cmd response: success
2,332,798,879 UART:
2,332,799,204 UART: Running Caliptra FMC ...
2,332,800,338 UART:
2,332,800,509 UART: [state] CFI Enabled
2,332,844,753 UART: [art] Extend RT PCRs Done
2,332,845,908 UART: [art] Lock RT PCRs Done
2,332,847,148 UART: [art] Populate DV Done
2,332,852,731 UART: [fht] FMC Alias Private Key: 7
2,332,854,240 UART: [art] Derive CDI
2,332,854,995 UART: [art] Store in in slot 0x4
2,332,897,598 UART: [art] Derive Key Pair
2,332,898,611 UART: [art] Store priv key in slot 0x5
2,335,325,103 UART: [art] Derive Key Pair - Done
2,335,338,426 UART: [art] Signing Cert with AUTHO
2,335,339,762 UART: RITY.KEYID = 7
2,337,044,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,337,046,363 UART: [art] PUB.X = 9054A4C9BC3891B432FBD88833A3176D97261B88BBB5B0AB12DB1FF062A91CB5F586AE144CC7CBD4B61290F0F27B3329
2,337,053,630 UART: [art] PUB.Y = B794EFE38D572FF48FFFF0F76A980B75AF8BF0B93570858C83212C0C59395411E539EF9BEC93F4B210B34A7E3CD3D34B
2,337,060,862 UART: [art] SIG.R = 06B5A677ED8533C405AF80E796207F8E82214142465B02CD4020CA1D6396DE8309DAEFE03E01A600481A8AED233AE868
2,337,068,265 UART: [art] SIG.S = 39B6CCC3372EEC889C57D47BFC40B805F8850A431DA7889605167935295E1D7B2D94048671BEBC630769D505E6FD16E8
2,338,046,942 UART: Caliptra RT
2,338,047,662 UART: [state] CFI Enabled
2,338,336,619 UART: [rt] RT listening for mailbox commands...
2,338,338,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,346,067,292 >>> mbox cmd response: success
2,346,102,283 UART:
2,346,102,557 UART: Running Caliptra FMC ...
2,346,103,677 UART:
2,346,103,842 UART: [state] CFI Enabled
2,346,147,759 UART: [art] Extend RT PCRs Done
2,346,148,952 UART: [art] Lock RT PCRs Done
2,346,150,091 UART: [art] Populate DV Done
2,346,155,350 UART: [fht] FMC Alias Private Key: 7
2,346,156,967 UART: [art] Derive CDI
2,346,157,790 UART: [art] Store in in slot 0x4
2,346,200,230 UART: [art] Derive Key Pair
2,346,201,238 UART: [art] Store priv key in slot 0x5
2,348,628,421 UART: [art] Derive Key Pair - Done
2,348,641,316 UART: [art] Signing Cert with AUTHO
2,348,642,632 UART: RITY.KEYID = 7
2,350,348,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,350,349,647 UART: [art] PUB.X = 75B7854A42B318FE76DF3440BFB62A57E2AFD25B0373C6396DE6103779BD6DBBE63191B0E31BCEF4051A997602CD8200
2,350,356,888 UART: [art] PUB.Y = 9CBBEE53EC5B393359F9588DF335B9DA5E9524CC6FB1F23F2748F21AA7E7D53004FD2C23DC45D619A74862C8C984C99A
2,350,364,182 UART: [art] SIG.R = 5466D16C56DDC329066C61717729BDD9AA7933D1717B2E21CFF21C0A645D1394815DE5E0863E712B92AF865A35FFD60B
2,350,371,522 UART: [art] SIG.S = 4D151078892B7630418DC1D4431B229F63C2200732FBFE0345AC0AEFB6932C00C465A0D8C43D6241362EC5094F5F3F43
2,351,350,745 UART: Caliptra RT
2,351,351,442 UART: [state] CFI Enabled
2,351,641,384 UART: [rt] RT listening for mailbox commands...
2,351,643,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,359,367,964 >>> mbox cmd response: success
2,359,403,215 UART:
2,359,403,493 UART: Running Caliptra FMC ...
2,359,404,615 UART:
2,359,404,782 UART: [state] CFI Enabled
2,359,449,080 UART: [art] Extend RT PCRs Done
2,359,450,281 UART: [art] Lock RT PCRs Done
2,359,451,962 UART: [art] Populate DV Done
2,359,457,164 UART: [fht] FMC Alias Private Key: 7
2,359,458,763 UART: [art] Derive CDI
2,359,459,585 UART: [art] Store in in slot 0x4
2,359,501,915 UART: [art] Derive Key Pair
2,359,502,959 UART: [art] Store priv key in slot 0x5
2,361,929,773 UART: [art] Derive Key Pair - Done
2,361,942,830 UART: [art] Signing Cert with AUTHO
2,361,944,149 UART: RITY.KEYID = 7
2,363,649,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,651,246 UART: [art] PUB.X = 9054A4C9BC3891B432FBD88833A3176D97261B88BBB5B0AB12DB1FF062A91CB5F586AE144CC7CBD4B61290F0F27B3329
2,363,658,565 UART: [art] PUB.Y = B794EFE38D572FF48FFFF0F76A980B75AF8BF0B93570858C83212C0C59395411E539EF9BEC93F4B210B34A7E3CD3D34B
2,363,665,794 UART: [art] SIG.R = 06B5A677ED8533C405AF80E796207F8E82214142465B02CD4020CA1D6396DE8309DAEFE03E01A600481A8AED233AE868
2,363,673,134 UART: [art] SIG.S = 39B6CCC3372EEC889C57D47BFC40B805F8850A431DA7889605167935295E1D7B2D94048671BEBC630769D505E6FD16E8
2,364,652,277 UART: Caliptra RT
2,364,652,970 UART: [state] CFI Enabled
2,364,939,380 UART: [rt] RT listening for mailbox commands...
2,364,941,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,372,896,895 >>> mbox cmd response: success
2,372,929,559 UART:
2,372,929,840 UART: Running Caliptra FMC ...
2,372,930,963 UART:
2,372,931,130 UART: [state] CFI Enabled
2,372,975,434 UART: [art] Extend RT PCRs Done
2,372,976,629 UART: [art] Lock RT PCRs Done
2,372,978,107 UART: [art] Populate DV Done
2,372,983,687 UART: [fht] FMC Alias Private Key: 7
2,372,985,229 UART: [art] Derive CDI
2,372,986,048 UART: [art] Store in in slot 0x4
2,373,028,857 UART: [art] Derive Key Pair
2,373,029,926 UART: [art] Store priv key in slot 0x5
2,375,456,933 UART: [art] Derive Key Pair - Done
2,375,469,932 UART: [art] Signing Cert with AUTHO
2,375,471,248 UART: RITY.KEYID = 7
2,377,176,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,177,751 UART: [art] PUB.X = 75B7854A42B318FE76DF3440BFB62A57E2AFD25B0373C6396DE6103779BD6DBBE63191B0E31BCEF4051A997602CD8200
2,377,185,002 UART: [art] PUB.Y = 9CBBEE53EC5B393359F9588DF335B9DA5E9524CC6FB1F23F2748F21AA7E7D53004FD2C23DC45D619A74862C8C984C99A
2,377,192,294 UART: [art] SIG.R = 5466D16C56DDC329066C61717729BDD9AA7933D1717B2E21CFF21C0A645D1394815DE5E0863E712B92AF865A35FFD60B
2,377,199,684 UART: [art] SIG.S = 4D151078892B7630418DC1D4431B229F63C2200732FBFE0345AC0AEFB6932C00C465A0D8C43D6241362EC5094F5F3F43
2,378,178,527 UART: Caliptra RT
2,378,179,234 UART: [state] CFI Enabled
2,378,472,119 UART: [rt] RT listening for mailbox commands...
2,378,473,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,386,191,601 >>> mbox cmd response: success
2,386,228,111 UART:
2,386,228,425 UART: Running Caliptra FMC ...
2,386,229,553 UART:
2,386,229,723 UART: [state] CFI Enabled
2,386,273,259 UART: [art] Extend RT PCRs Done
2,386,274,415 UART: [art] Lock RT PCRs Done
2,386,275,870 UART: [art] Populate DV Done
2,386,281,560 UART: [fht] FMC Alias Private Key: 7
2,386,283,272 UART: [art] Derive CDI
2,386,284,038 UART: [art] Store in in slot 0x4
2,386,327,041 UART: [art] Derive Key Pair
2,386,328,092 UART: [art] Store priv key in slot 0x5
2,388,754,433 UART: [art] Derive Key Pair - Done
2,388,767,401 UART: [art] Signing Cert with AUTHO
2,388,768,716 UART: RITY.KEYID = 7
2,390,474,198 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,475,716 UART: [art] PUB.X = 9054A4C9BC3891B432FBD88833A3176D97261B88BBB5B0AB12DB1FF062A91CB5F586AE144CC7CBD4B61290F0F27B3329
2,390,483,075 UART: [art] PUB.Y = B794EFE38D572FF48FFFF0F76A980B75AF8BF0B93570858C83212C0C59395411E539EF9BEC93F4B210B34A7E3CD3D34B
2,390,490,313 UART: [art] SIG.R = 06B5A677ED8533C405AF80E796207F8E82214142465B02CD4020CA1D6396DE8309DAEFE03E01A600481A8AED233AE868
2,390,497,667 UART: [art] SIG.S = 39B6CCC3372EEC889C57D47BFC40B805F8850A431DA7889605167935295E1D7B2D94048671BEBC630769D505E6FD16E8
2,391,475,719 UART: Caliptra RT
2,391,476,417 UART: [state] CFI Enabled
2,391,768,760 UART: [rt] RT listening for mailbox commands...
2,391,770,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,399,498,307 >>> mbox cmd response: success
2,399,531,722 UART:
2,399,532,004 UART: Running Caliptra FMC ...
2,399,533,133 UART:
2,399,533,306 UART: [state] CFI Enabled
2,399,577,129 UART: [art] Extend RT PCRs Done
2,399,578,341 UART: [art] Lock RT PCRs Done
2,399,579,972 UART: [art] Populate DV Done
2,399,585,493 UART: [fht] FMC Alias Private Key: 7
2,399,587,145 UART: [art] Derive CDI
2,399,587,967 UART: [art] Store in in slot 0x4
2,399,630,457 UART: [art] Derive Key Pair
2,399,631,465 UART: [art] Store priv key in slot 0x5
2,402,058,080 UART: [art] Derive Key Pair - Done
2,402,070,882 UART: [art] Signing Cert with AUTHO
2,402,072,191 UART: RITY.KEYID = 7
2,403,777,497 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,779,009 UART: [art] PUB.X = 75B7854A42B318FE76DF3440BFB62A57E2AFD25B0373C6396DE6103779BD6DBBE63191B0E31BCEF4051A997602CD8200
2,403,786,294 UART: [art] PUB.Y = 9CBBEE53EC5B393359F9588DF335B9DA5E9524CC6FB1F23F2748F21AA7E7D53004FD2C23DC45D619A74862C8C984C99A
2,403,793,577 UART: [art] SIG.R = 5466D16C56DDC329066C61717729BDD9AA7933D1717B2E21CFF21C0A645D1394815DE5E0863E712B92AF865A35FFD60B
2,403,800,957 UART: [art] SIG.S = 4D151078892B7630418DC1D4431B229F63C2200732FBFE0345AC0AEFB6932C00C465A0D8C43D6241362EC5094F5F3F43
2,404,779,938 UART: Caliptra RT
2,404,780,661 UART: [state] CFI Enabled
2,405,071,310 UART: [rt] RT listening for mailbox commands...
2,405,073,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,413,026,190 >>> mbox cmd response: success
2,413,063,781 UART:
2,413,064,061 UART: Running Caliptra FMC ...
2,413,065,106 UART:
2,413,065,262 UART: [state] CFI Enabled
2,413,109,467 UART: [art] Extend RT PCRs Done
2,413,110,660 UART: [art] Lock RT PCRs Done
2,413,112,100 UART: [art] Populate DV Done
2,413,117,574 UART: [fht] FMC Alias Private Key: 7
2,413,119,170 UART: [art] Derive CDI
2,413,119,908 UART: [art] Store in in slot 0x4
2,413,162,503 UART: [art] Derive Key Pair
2,413,163,526 UART: [art] Store priv key in slot 0x5
2,415,590,700 UART: [art] Derive Key Pair - Done
2,415,603,759 UART: [art] Signing Cert with AUTHO
2,415,605,074 UART: RITY.KEYID = 7
2,417,310,176 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,311,689 UART: [art] PUB.X = 9054A4C9BC3891B432FBD88833A3176D97261B88BBB5B0AB12DB1FF062A91CB5F586AE144CC7CBD4B61290F0F27B3329
2,417,318,986 UART: [art] PUB.Y = B794EFE38D572FF48FFFF0F76A980B75AF8BF0B93570858C83212C0C59395411E539EF9BEC93F4B210B34A7E3CD3D34B
2,417,326,221 UART: [art] SIG.R = 06B5A677ED8533C405AF80E796207F8E82214142465B02CD4020CA1D6396DE8309DAEFE03E01A600481A8AED233AE868
2,417,333,613 UART: [art] SIG.S = 39B6CCC3372EEC889C57D47BFC40B805F8850A431DA7889605167935295E1D7B2D94048671BEBC630769D505E6FD16E8
2,418,312,818 UART: Caliptra RT
2,418,313,513 UART: [state] CFI Enabled
2,418,602,482 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 336.00s
Truncated 1358286 bytes from beginning
5 UART: [art] Store in in slot 0x4
1,715,674,458 UART: [art] Derive Key Pair
1,715,674,818 UART: [art] Store priv key in slot 0x5
1,715,687,950 UART: [art] Derive Key Pair - Done
1,715,702,600 UART: [art] Signing Cert with AUTHO
1,715,703,080 UART: RITY.KEYID = 7
1,715,718,172 UART: [art] Erasing AUTHORITY.KEYID = 7
1,715,718,937 UART: [art] PUB.X = A7B4A1586C057B88131EC7104699BC4484485E6D4FFD166B080DA6A85E7C807C118E571FC49504EE2B7887E41886DDFD
1,715,725,697 UART: [art] PUB.Y = D2E1935A5625AF8ADD7B0507EAC78B6E47ADA79626AEE2FA06587F3731A0FF5389705FA2493BE6541363B3F6D85F43AD
1,715,732,648 UART: [art] SIG.R = 92A59BE67EBBC202A3153107B6154C4B2601A28BE48A8E5CFCD2586107D3231D2C31ECE11CB7D8CCB1A9008DAAAE5444
1,715,739,398 UART: [art] SIG.S = C6260C2D3249484BBA42A67ECD4BA99B91D40ECF458CB0C27A0DFD015B83273FF8683020AD823ADBB3D5C4742175B79D
1,715,762,851 UART: Caliptra RT
1,715,763,104 UART: [state] CFI Enabled
1,716,044,080 UART: [rt] RT listening for mailbox commands...
1,716,044,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,716,045,642 UART:
1,716,045,658 UART: Running Caliptra ROM ...
1,716,046,066 UART:
1,716,046,120 UART: [state] CFI Enabled
1,716,048,616 UART: [state] LifecycleState = Unprovisioned
1,716,049,271 UART: [state] DebugLocked = No
1,716,049,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,716,051,490 UART: [kat] SHA2-256
1,716,845,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,716,849,536 UART: [kat] ++
1,716,849,688 UART: [kat] sha1
1,716,853,922 UART: [kat] SHA2-256
1,716,855,860 UART: [kat] SHA2-384
1,716,858,703 UART: [kat] SHA2-512-ACC
1,716,860,603 UART: [kat] ECC-384
1,716,865,962 UART: [kat] HMAC-384Kdf
1,716,870,616 UART: [kat] LMS
1,717,438,812 UART: [kat] --
1,717,439,505 UART: [update-reset] ++
1,718,771,857 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,718,773,001 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,718,922,505 >>> mbox cmd response: success
1,718,922,802 UART: [update-reset] Copying MAN_2 To MAN_1
1,718,930,816 UART: [update-reset Success] --
1,718,931,951 UART: [state] Locking Datavault
1,718,932,879 UART: [state] Locking PCR0, PCR1 and PCR31
1,718,933,483 UART: [state] Locking ICCM
1,718,933,981 UART: [exit] Launching FMC @ 0x40000130
1,718,939,310 UART:
1,718,939,326 UART: Running Caliptra FMC ...
1,718,939,734 UART:
1,718,939,788 UART: [state] CFI Enabled
1,719,029,091 UART: [art] Extend RT PCRs Done
1,719,029,519 UART: [art] Lock RT PCRs Done
1,719,030,720 UART: [art] Populate DV Done
1,719,038,965 UART: [fht] FMC Alias Private Key: 7
1,719,040,033 UART: [art] Derive CDI
1,719,040,313 UART: [art] Store in in slot 0x4
1,719,125,736 UART: [art] Derive Key Pair
1,719,126,096 UART: [art] Store priv key in slot 0x5
1,719,139,538 UART: [art] Derive Key Pair - Done
1,719,154,321 UART: [art] Signing Cert with AUTHO
1,719,154,801 UART: RITY.KEYID = 7
1,719,170,003 UART: [art] Erasing AUTHORITY.KEYID = 7
1,719,170,768 UART: [art] PUB.X = F3ECFD1CBC0DB33832F7087BC1B1788EA54C22C68321D9F53C4560CF4D5B6EBD1D7B078655930BD7C3C9B1B70F8E9F19
1,719,177,539 UART: [art] PUB.Y = 2CC2B9D5F476F9526A448EC9DE6B0DC537FFA3E79E323CC930E85C160E02B6760EA5B7B5602F907CC99886DD4D3EED12
1,719,184,491 UART: [art] SIG.R = C67FB4011F20C2C50DAC42D4F4EDDCE8983311EC2B09B94AF97D7A155965573BA4A1BC75924AF44FFB161BD6146BB70A
1,719,191,265 UART: [art] SIG.S = 0CAE10CACAB25DA2CC9519CDE0643FFF20AA6CD1A60BA5AE25070A605848E17FC787AE259E24B9330496AE29CD6E4CB4
1,719,215,299 UART: Caliptra RT
1,719,215,552 UART: [state] CFI Enabled
1,719,499,295 UART: [rt] RT listening for mailbox commands...
1,719,499,965 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,719,500,831 UART:
1,719,500,847 UART: Running Caliptra ROM ...
1,719,501,255 UART:
1,719,501,309 UART: [state] CFI Enabled
1,719,504,037 UART: [state] LifecycleState = Unprovisioned
1,719,504,692 UART: [state] DebugLocked = No
1,719,505,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,719,506,941 UART: [kat] SHA2-256
1,720,300,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,720,304,987 UART: [kat] ++
1,720,305,139 UART: [kat] sha1
1,720,309,475 UART: [kat] SHA2-256
1,720,311,413 UART: [kat] SHA2-384
1,720,314,218 UART: [kat] SHA2-512-ACC
1,720,316,118 UART: [kat] ECC-384
1,720,321,545 UART: [kat] HMAC-384Kdf
1,720,326,247 UART: [kat] LMS
1,720,894,443 UART: [kat] --
1,720,895,314 UART: [update-reset] ++
1,722,226,536 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,722,227,676 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,722,377,180 >>> mbox cmd response: success
1,722,377,363 UART: [update-reset] Copying MAN_2 To MAN_1
1,722,385,377 UART: [update-reset Success] --
1,722,386,138 UART: [state] Locking Datavault
1,722,386,926 UART: [state] Locking PCR0, PCR1 and PCR31
1,722,387,530 UART: [state] Locking ICCM
1,722,388,010 UART: [exit] Launching FMC @ 0x40000130
1,722,393,339 UART:
1,722,393,355 UART: Running Caliptra FMC ...
1,722,393,763 UART:
1,722,393,817 UART: [state] CFI Enabled
1,722,482,652 UART: [art] Extend RT PCRs Done
1,722,483,080 UART: [art] Lock RT PCRs Done
1,722,484,253 UART: [art] Populate DV Done
1,722,492,472 UART: [fht] FMC Alias Private Key: 7
1,722,493,610 UART: [art] Derive CDI
1,722,493,890 UART: [art] Store in in slot 0x4
1,722,579,801 UART: [art] Derive Key Pair
1,722,580,161 UART: [art] Store priv key in slot 0x5
1,722,593,295 UART: [art] Derive Key Pair - Done
1,722,608,067 UART: [art] Signing Cert with AUTHO
1,722,608,547 UART: RITY.KEYID = 7
1,722,623,671 UART: [art] Erasing AUTHORITY.KEYID = 7
1,722,624,436 UART: [art] PUB.X = A7B4A1586C057B88131EC7104699BC4484485E6D4FFD166B080DA6A85E7C807C118E571FC49504EE2B7887E41886DDFD
1,722,631,196 UART: [art] PUB.Y = D2E1935A5625AF8ADD7B0507EAC78B6E47ADA79626AEE2FA06587F3731A0FF5389705FA2493BE6541363B3F6D85F43AD
1,722,638,147 UART: [art] SIG.R = 92A59BE67EBBC202A3153107B6154C4B2601A28BE48A8E5CFCD2586107D3231D2C31ECE11CB7D8CCB1A9008DAAAE5444
1,722,644,897 UART: [art] SIG.S = C6260C2D3249484BBA42A67ECD4BA99B91D40ECF458CB0C27A0DFD015B83273FF8683020AD823ADBB3D5C4742175B79D
1,722,668,908 UART: Caliptra RT
1,722,669,161 UART: [state] CFI Enabled
1,722,951,469 UART: [rt] RT listening for mailbox commands...
1,722,952,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,722,952,983 UART:
1,722,952,999 UART: Running Caliptra ROM ...
1,722,953,407 UART:
1,722,953,461 UART: [state] CFI Enabled
1,722,956,055 UART: [state] LifecycleState = Unprovisioned
1,722,956,710 UART: [state] DebugLocked = No
1,722,957,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,722,958,827 UART: [kat] SHA2-256
1,723,752,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,723,756,873 UART: [kat] ++
1,723,757,025 UART: [kat] sha1
1,723,761,303 UART: [kat] SHA2-256
1,723,763,241 UART: [kat] SHA2-384
1,723,765,996 UART: [kat] SHA2-512-ACC
1,723,767,896 UART: [kat] ECC-384
1,723,773,165 UART: [kat] HMAC-384Kdf
1,723,777,743 UART: [kat] LMS
1,724,345,939 UART: [kat] --
1,724,346,954 UART: [update-reset] ++
1,725,678,246 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,725,679,454 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,725,828,958 >>> mbox cmd response: success
1,725,829,217 UART: [update-reset] Copying MAN_2 To MAN_1
1,725,837,231 UART: [update-reset Success] --
1,725,838,192 UART: [state] Locking Datavault
1,725,839,082 UART: [state] Locking PCR0, PCR1 and PCR31
1,725,839,686 UART: [state] Locking ICCM
1,725,840,340 UART: [exit] Launching FMC @ 0x40000130
1,725,845,669 UART:
1,725,845,685 UART: Running Caliptra FMC ...
1,725,846,093 UART:
1,725,846,147 UART: [state] CFI Enabled
1,725,935,132 UART: [art] Extend RT PCRs Done
1,725,935,560 UART: [art] Lock RT PCRs Done
1,725,936,797 UART: [art] Populate DV Done
1,725,944,972 UART: [fht] FMC Alias Private Key: 7
1,725,946,090 UART: [art] Derive CDI
1,725,946,370 UART: [art] Store in in slot 0x4
1,726,032,109 UART: [art] Derive Key Pair
1,726,032,469 UART: [art] Store priv key in slot 0x5
1,726,045,495 UART: [art] Derive Key Pair - Done
1,726,060,418 UART: [art] Signing Cert with AUTHO
1,726,060,898 UART: RITY.KEYID = 7
1,726,076,356 UART: [art] Erasing AUTHORITY.KEYID = 7
1,726,077,121 UART: [art] PUB.X = F3ECFD1CBC0DB33832F7087BC1B1788EA54C22C68321D9F53C4560CF4D5B6EBD1D7B078655930BD7C3C9B1B70F8E9F19
1,726,083,892 UART: [art] PUB.Y = 2CC2B9D5F476F9526A448EC9DE6B0DC537FFA3E79E323CC930E85C160E02B6760EA5B7B5602F907CC99886DD4D3EED12
1,726,090,844 UART: [art] SIG.R = C67FB4011F20C2C50DAC42D4F4EDDCE8983311EC2B09B94AF97D7A155965573BA4A1BC75924AF44FFB161BD6146BB70A
1,726,097,618 UART: [art] SIG.S = 0CAE10CACAB25DA2CC9519CDE0643FFF20AA6CD1A60BA5AE25070A605848E17FC787AE259E24B9330496AE29CD6E4CB4
1,726,120,974 UART: Caliptra RT
1,726,121,227 UART: [state] CFI Enabled
1,726,402,690 UART: [rt] RT listening for mailbox commands...
1,726,403,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,726,404,304 UART:
1,726,404,320 UART: Running Caliptra ROM ...
1,726,404,728 UART:
1,726,404,782 UART: [state] CFI Enabled
1,726,407,302 UART: [state] LifecycleState = Unprovisioned
1,726,407,957 UART: [state] DebugLocked = No
1,726,408,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,726,410,162 UART: [kat] SHA2-256
1,727,204,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,727,208,208 UART: [kat] ++
1,727,208,360 UART: [kat] sha1
1,727,212,590 UART: [kat] SHA2-256
1,727,214,528 UART: [kat] SHA2-384
1,727,217,441 UART: [kat] SHA2-512-ACC
1,727,219,341 UART: [kat] ECC-384
1,727,224,820 UART: [kat] HMAC-384Kdf
1,727,229,350 UART: [kat] LMS
1,727,797,546 UART: [kat] --
1,727,798,411 UART: [update-reset] ++
1,729,129,499 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,729,130,563 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,729,280,067 >>> mbox cmd response: success
1,729,280,296 UART: [update-reset] Copying MAN_2 To MAN_1
1,729,288,310 UART: [update-reset Success] --
1,729,289,443 UART: [state] Locking Datavault
1,729,290,227 UART: [state] Locking PCR0, PCR1 and PCR31
1,729,290,831 UART: [state] Locking ICCM
1,729,291,425 UART: [exit] Launching FMC @ 0x40000130
1,729,296,754 UART:
1,729,296,770 UART: Running Caliptra FMC ...
1,729,297,178 UART:
1,729,297,232 UART: [state] CFI Enabled
1,729,385,823 UART: [art] Extend RT PCRs Done
1,729,386,251 UART: [art] Lock RT PCRs Done
1,729,387,374 UART: [art] Populate DV Done
1,729,395,449 UART: [fht] FMC Alias Private Key: 7
1,729,396,451 UART: [art] Derive CDI
1,729,396,731 UART: [art] Store in in slot 0x4
1,729,482,230 UART: [art] Derive Key Pair
1,729,482,590 UART: [art] Store priv key in slot 0x5
1,729,496,388 UART: [art] Derive Key Pair - Done
1,729,511,336 UART: [art] Signing Cert with AUTHO
1,729,511,816 UART: RITY.KEYID = 7
1,729,526,270 UART: [art] Erasing AUTHORITY.KEYID = 7
1,729,527,035 UART: [art] PUB.X = A7B4A1586C057B88131EC7104699BC4484485E6D4FFD166B080DA6A85E7C807C118E571FC49504EE2B7887E41886DDFD
1,729,533,795 UART: [art] PUB.Y = D2E1935A5625AF8ADD7B0507EAC78B6E47ADA79626AEE2FA06587F3731A0FF5389705FA2493BE6541363B3F6D85F43AD
1,729,540,746 UART: [art] SIG.R = 92A59BE67EBBC202A3153107B6154C4B2601A28BE48A8E5CFCD2586107D3231D2C31ECE11CB7D8CCB1A9008DAAAE5444
1,729,547,496 UART: [art] SIG.S = C6260C2D3249484BBA42A67ECD4BA99B91D40ECF458CB0C27A0DFD015B83273FF8683020AD823ADBB3D5C4742175B79D
1,729,571,151 UART: Caliptra RT
1,729,571,404 UART: [state] CFI Enabled
1,729,853,094 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 340.79s
Truncated 734952 bytes from beginning
7 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,644,910,694 >>> mbox cmd response: success
1,644,924,401 UART:
1,644,924,417 UART: Running Caliptra FMC ...
1,644,924,825 UART:
1,644,924,879 UART: [state] CFI Enabled
1,645,013,714 UART: [art] Extend RT PCRs Done
1,645,014,142 UART: [art] Lock RT PCRs Done
1,645,015,375 UART: [art] Populate DV Done
1,645,023,540 UART: [fht] FMC Alias Private Key: 7
1,645,024,712 UART: [art] Derive CDI
1,645,024,992 UART: [art] Store in in slot 0x4
1,645,110,787 UART: [art] Derive Key Pair
1,645,111,147 UART: [art] Store priv key in slot 0x5
1,645,124,435 UART: [art] Derive Key Pair - Done
1,645,139,500 UART: [art] Signing Cert with AUTHO
1,645,139,980 UART: RITY.KEYID = 7
1,645,155,426 UART: [art] Erasing AUTHORITY.KEYID = 7
1,645,156,191 UART: [art] PUB.X = 038DA23C5D66AFAD0A68BEBC3B03BBCF4789C8418DADB4201E43C7B5AA48D44AF79BB8310C0169E40F71CCD2144CAB54
1,645,162,965 UART: [art] PUB.Y = 8AC9E799690396A8632A18CABF54248AF9CC6BF2F962B4C1ED7C0B33896E1582CA0F671C5E3A4D503A457FEDA219D456
1,645,169,916 UART: [art] SIG.R = 4A7E6B34E0B4B799E9F4C378EF90A5FF61A72429E4CC0360E777D08F152CE6948667EB0E20E9E790B3AAC1682A9D187B
1,645,176,688 UART: [art] SIG.S = 8254C3DA532D9807A9ABD44257E624A755E1949C0594DF102079217A8397112D1C0E3484292C089ED7AF25F7882E888C
1,645,200,563 UART: Caliptra RT
1,645,200,816 UART: [state] CFI Enabled
1,645,485,113 UART: [rt] RT listening for mailbox commands...
1,645,485,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,648,245,830 >>> mbox cmd response: success
1,648,259,427 UART:
1,648,259,443 UART: Running Caliptra FMC ...
1,648,259,851 UART:
1,648,259,905 UART: [state] CFI Enabled
1,648,348,998 UART: [art] Extend RT PCRs Done
1,648,349,426 UART: [art] Lock RT PCRs Done
1,648,350,821 UART: [art] Populate DV Done
1,648,359,228 UART: [fht] FMC Alias Private Key: 7
1,648,360,168 UART: [art] Derive CDI
1,648,360,448 UART: [art] Store in in slot 0x4
1,648,446,001 UART: [art] Derive Key Pair
1,648,446,361 UART: [art] Store priv key in slot 0x5
1,648,459,493 UART: [art] Derive Key Pair - Done
1,648,474,437 UART: [art] Signing Cert with AUTHO
1,648,474,917 UART: RITY.KEYID = 7
1,648,490,001 UART: [art] Erasing AUTHORITY.KEYID = 7
1,648,490,766 UART: [art] PUB.X = 3A07A605BADDFF461B4453B67B78CE3003BA8F87491AC85A1375B264E8BFD544522B16C6E527E4DE1F1ECBA8DE738DDE
1,648,497,545 UART: [art] PUB.Y = D44FA04DB1B4EDEC29A70E3AD30108DD942FA6FDB208D5FBCB48F8734E94A1B8685167F0A33AE961FE1BBF33F50028F8
1,648,504,481 UART: [art] SIG.R = 8FFEB3001348DB98633A61E448B045DE7662EF6D8DAB1278FEB337CD008DE656404D67F9844A6B666E242B36840E2FA4
1,648,511,208 UART: [art] SIG.S = 80F708D30169AE6248E1169949196CF54A7096A30125DF0E56E0D7A3B3E3A03BC38708C81656452884BA6678C1D2585E
1,648,535,256 UART: Caliptra RT
1,648,535,509 UART: [state] CFI Enabled
1,648,818,665 UART: [rt] RT listening for mailbox commands...
1,648,819,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,651,577,238 >>> mbox cmd response: success
1,651,590,617 UART:
1,651,590,633 UART: Running Caliptra FMC ...
1,651,591,041 UART:
1,651,591,095 UART: [state] CFI Enabled
1,651,680,350 UART: [art] Extend RT PCRs Done
1,651,680,778 UART: [art] Lock RT PCRs Done
1,651,681,833 UART: [art] Populate DV Done
1,651,690,110 UART: [fht] FMC Alias Private Key: 7
1,651,691,130 UART: [art] Derive CDI
1,651,691,410 UART: [art] Store in in slot 0x4
1,651,777,055 UART: [art] Derive Key Pair
1,651,777,415 UART: [art] Store priv key in slot 0x5
1,651,790,257 UART: [art] Derive Key Pair - Done
1,651,805,122 UART: [art] Signing Cert with AUTHO
1,651,805,602 UART: RITY.KEYID = 7
1,651,820,764 UART: [art] Erasing AUTHORITY.KEYID = 7
1,651,821,529 UART: [art] PUB.X = 038DA23C5D66AFAD0A68BEBC3B03BBCF4789C8418DADB4201E43C7B5AA48D44AF79BB8310C0169E40F71CCD2144CAB54
1,651,828,303 UART: [art] PUB.Y = 8AC9E799690396A8632A18CABF54248AF9CC6BF2F962B4C1ED7C0B33896E1582CA0F671C5E3A4D503A457FEDA219D456
1,651,835,254 UART: [art] SIG.R = 4A7E6B34E0B4B799E9F4C378EF90A5FF61A72429E4CC0360E777D08F152CE6948667EB0E20E9E790B3AAC1682A9D187B
1,651,842,026 UART: [art] SIG.S = 8254C3DA532D9807A9ABD44257E624A755E1949C0594DF102079217A8397112D1C0E3484292C089ED7AF25F7882E888C
1,651,866,211 UART: Caliptra RT
1,651,866,464 UART: [state] CFI Enabled
1,652,146,751 UART: [rt] RT listening for mailbox commands...
1,652,147,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,654,906,528 >>> mbox cmd response: success
1,654,919,603 UART:
1,654,919,619 UART: Running Caliptra FMC ...
1,654,920,027 UART:
1,654,920,081 UART: [state] CFI Enabled
1,655,009,840 UART: [art] Extend RT PCRs Done
1,655,010,268 UART: [art] Lock RT PCRs Done
1,655,011,471 UART: [art] Populate DV Done
1,655,019,976 UART: [fht] FMC Alias Private Key: 7
1,655,020,916 UART: [art] Derive CDI
1,655,021,196 UART: [art] Store in in slot 0x4
1,655,106,773 UART: [art] Derive Key Pair
1,655,107,133 UART: [art] Store priv key in slot 0x5
1,655,120,943 UART: [art] Derive Key Pair - Done
1,655,135,841 UART: [art] Signing Cert with AUTHO
1,655,136,321 UART: RITY.KEYID = 7
1,655,151,303 UART: [art] Erasing AUTHORITY.KEYID = 7
1,655,152,068 UART: [art] PUB.X = 3A07A605BADDFF461B4453B67B78CE3003BA8F87491AC85A1375B264E8BFD544522B16C6E527E4DE1F1ECBA8DE738DDE
1,655,158,847 UART: [art] PUB.Y = D44FA04DB1B4EDEC29A70E3AD30108DD942FA6FDB208D5FBCB48F8734E94A1B8685167F0A33AE961FE1BBF33F50028F8
1,655,165,783 UART: [art] SIG.R = 8FFEB3001348DB98633A61E448B045DE7662EF6D8DAB1278FEB337CD008DE656404D67F9844A6B666E242B36840E2FA4
1,655,172,510 UART: [art] SIG.S = 80F708D30169AE6248E1169949196CF54A7096A30125DF0E56E0D7A3B3E3A03BC38708C81656452884BA6678C1D2585E
1,655,196,104 UART: Caliptra RT
1,655,196,357 UART: [state] CFI Enabled
1,655,483,305 UART: [rt] RT listening for mailbox commands...
1,655,483,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,658,242,600 >>> mbox cmd response: success
1,658,256,251 UART:
1,658,256,267 UART: Running Caliptra FMC ...
1,658,256,675 UART:
1,658,256,729 UART: [state] CFI Enabled
1,658,345,580 UART: [art] Extend RT PCRs Done
1,658,346,008 UART: [art] Lock RT PCRs Done
1,658,347,175 UART: [art] Populate DV Done
1,658,355,696 UART: [fht] FMC Alias Private Key: 7
1,658,356,776 UART: [art] Derive CDI
1,658,357,056 UART: [art] Store in in slot 0x4
1,658,443,045 UART: [art] Derive Key Pair
1,658,443,405 UART: [art] Store priv key in slot 0x5
1,658,455,899 UART: [art] Derive Key Pair - Done
1,658,470,550 UART: [art] Signing Cert with AUTHO
1,658,471,030 UART: RITY.KEYID = 7
1,658,485,792 UART: [art] Erasing AUTHORITY.KEYID = 7
1,658,486,557 UART: [art] PUB.X = 038DA23C5D66AFAD0A68BEBC3B03BBCF4789C8418DADB4201E43C7B5AA48D44AF79BB8310C0169E40F71CCD2144CAB54
1,658,493,331 UART: [art] PUB.Y = 8AC9E799690396A8632A18CABF54248AF9CC6BF2F962B4C1ED7C0B33896E1582CA0F671C5E3A4D503A457FEDA219D456
1,658,500,282 UART: [art] SIG.R = 4A7E6B34E0B4B799E9F4C378EF90A5FF61A72429E4CC0360E777D08F152CE6948667EB0E20E9E790B3AAC1682A9D187B
1,658,507,054 UART: [art] SIG.S = 8254C3DA532D9807A9ABD44257E624A755E1949C0594DF102079217A8397112D1C0E3484292C089ED7AF25F7882E888C
1,658,530,891 UART: Caliptra RT
1,658,531,144 UART: [state] CFI Enabled
1,658,811,213 UART: [rt] RT listening for mailbox commands...
1,658,811,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,661,571,256 >>> mbox cmd response: success
1,661,584,491 UART:
1,661,584,507 UART: Running Caliptra FMC ...
1,661,584,915 UART:
1,661,584,969 UART: [state] CFI Enabled
1,661,673,284 UART: [art] Extend RT PCRs Done
1,661,673,712 UART: [art] Lock RT PCRs Done
1,661,674,985 UART: [art] Populate DV Done
1,661,683,212 UART: [fht] FMC Alias Private Key: 7
1,661,684,260 UART: [art] Derive CDI
1,661,684,540 UART: [art] Store in in slot 0x4
1,661,770,131 UART: [art] Derive Key Pair
1,661,770,491 UART: [art] Store priv key in slot 0x5
1,661,783,817 UART: [art] Derive Key Pair - Done
1,661,798,547 UART: [art] Signing Cert with AUTHO
1,661,799,027 UART: RITY.KEYID = 7
1,661,814,071 UART: [art] Erasing AUTHORITY.KEYID = 7
1,661,814,836 UART: [art] PUB.X = 3A07A605BADDFF461B4453B67B78CE3003BA8F87491AC85A1375B264E8BFD544522B16C6E527E4DE1F1ECBA8DE738DDE
1,661,821,615 UART: [art] PUB.Y = D44FA04DB1B4EDEC29A70E3AD30108DD942FA6FDB208D5FBCB48F8734E94A1B8685167F0A33AE961FE1BBF33F50028F8
1,661,828,551 UART: [art] SIG.R = 8FFEB3001348DB98633A61E448B045DE7662EF6D8DAB1278FEB337CD008DE656404D67F9844A6B666E242B36840E2FA4
1,661,835,278 UART: [art] SIG.S = 80F708D30169AE6248E1169949196CF54A7096A30125DF0E56E0D7A3B3E3A03BC38708C81656452884BA6678C1D2585E
1,661,858,698 UART: Caliptra RT
1,661,858,951 UART: [state] CFI Enabled
1,662,143,143 UART: [rt] RT listening for mailbox commands...
1,662,143,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,664,902,288 >>> mbox cmd response: success
1,664,915,947 UART:
1,664,915,963 UART: Running Caliptra FMC ...
1,664,916,371 UART:
1,664,916,425 UART: [state] CFI Enabled
1,665,005,394 UART: [art] Extend RT PCRs Done
1,665,005,822 UART: [art] Lock RT PCRs Done
1,665,007,217 UART: [art] Populate DV Done
1,665,015,766 UART: [fht] FMC Alias Private Key: 7
1,665,016,836 UART: [art] Derive CDI
1,665,017,116 UART: [art] Store in in slot 0x4
1,665,102,949 UART: [art] Derive Key Pair
1,665,103,309 UART: [art] Store priv key in slot 0x5
1,665,116,305 UART: [art] Derive Key Pair - Done
1,665,131,114 UART: [art] Signing Cert with AUTHO
1,665,131,594 UART: RITY.KEYID = 7
1,665,146,598 UART: [art] Erasing AUTHORITY.KEYID = 7
1,665,147,363 UART: [art] PUB.X = 038DA23C5D66AFAD0A68BEBC3B03BBCF4789C8418DADB4201E43C7B5AA48D44AF79BB8310C0169E40F71CCD2144CAB54
1,665,154,137 UART: [art] PUB.Y = 8AC9E799690396A8632A18CABF54248AF9CC6BF2F962B4C1ED7C0B33896E1582CA0F671C5E3A4D503A457FEDA219D456
1,665,161,088 UART: [art] SIG.R = 4A7E6B34E0B4B799E9F4C378EF90A5FF61A72429E4CC0360E777D08F152CE6948667EB0E20E9E790B3AAC1682A9D187B
1,665,167,860 UART: [art] SIG.S = 8254C3DA532D9807A9ABD44257E624A755E1949C0594DF102079217A8397112D1C0E3484292C089ED7AF25F7882E888C
1,665,191,147 UART: Caliptra RT
1,665,191,400 UART: [state] CFI Enabled
1,665,468,923 UART: [rt] RT listening for mailbox commands...
1,665,469,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,668,228,066 >>> mbox cmd response: success
1,668,241,155 UART:
1,668,241,171 UART: Running Caliptra FMC ...
1,668,241,579 UART:
1,668,241,633 UART: [state] CFI Enabled
1,668,330,930 UART: [art] Extend RT PCRs Done
1,668,331,358 UART: [art] Lock RT PCRs Done
1,668,332,485 UART: [art] Populate DV Done
1,668,340,542 UART: [fht] FMC Alias Private Key: 7
1,668,341,580 UART: [art] Derive CDI
1,668,341,860 UART: [art] Store in in slot 0x4
1,668,427,365 UART: [art] Derive Key Pair
1,668,427,725 UART: [art] Store priv key in slot 0x5
1,668,440,687 UART: [art] Derive Key Pair - Done
1,668,455,449 UART: [art] Signing Cert with AUTHO
1,668,455,929 UART: RITY.KEYID = 7
1,668,471,617 UART: [art] Erasing AUTHORITY.KEYID = 7
1,668,472,382 UART: [art] PUB.X = 3A07A605BADDFF461B4453B67B78CE3003BA8F87491AC85A1375B264E8BFD544522B16C6E527E4DE1F1ECBA8DE738DDE
1,668,479,161 UART: [art] PUB.Y = D44FA04DB1B4EDEC29A70E3AD30108DD942FA6FDB208D5FBCB48F8734E94A1B8685167F0A33AE961FE1BBF33F50028F8
1,668,486,097 UART: [art] SIG.R = 8FFEB3001348DB98633A61E448B045DE7662EF6D8DAB1278FEB337CD008DE656404D67F9844A6B666E242B36840E2FA4
1,668,492,824 UART: [art] SIG.S = 80F708D30169AE6248E1169949196CF54A7096A30125DF0E56E0D7A3B3E3A03BC38708C81656452884BA6678C1D2585E
1,668,516,578 UART: Caliptra RT
1,668,516,831 UART: [state] CFI Enabled
1,668,801,445 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 328.64s
Truncated 1358286 bytes from beginning
7 UART: [art] Store in in slot 0x4
1,716,367,148 UART: [art] Derive Key Pair
1,716,367,508 UART: [art] Store priv key in slot 0x5
1,716,380,736 UART: [art] Derive Key Pair - Done
1,716,395,678 UART: [art] Signing Cert with AUTHO
1,716,396,158 UART: RITY.KEYID = 7
1,716,411,236 UART: [art] Erasing AUTHORITY.KEYID = 7
1,716,412,001 UART: [art] PUB.X = 7012C3329DB70C8582940E8F6D2CF199AEA3B717BD8A526B61A561E8DCC84DBBB8D6CCE414F20C5050D9D12C2D8997E7
1,716,418,774 UART: [art] PUB.Y = 93C6854ADE3833DFCAEB14DBC2A09E43C0682576F785CB2FB898C6E8908257E4D8D5B174B6DFCB83BF9F983391A6B402
1,716,425,733 UART: [art] SIG.R = F97B50BF3A3A2D8BADA16EC71A6BF6BE99B14FF5161EFC6DCF2D547E2DBD9DC446C7B1E627A9D0E34FF10B2970D70AC5
1,716,432,527 UART: [art] SIG.S = 496BB69E1B046491ACC20822F2E14FADA634A2DDD7B23AA9CD20C5D5CE9B88BA5B365401CAF2888186200CD3FF54805E
1,716,457,142 UART: Caliptra RT
1,716,457,487 UART: [state] CFI Enabled
1,716,739,654 UART: [rt] RT listening for mailbox commands...
1,716,740,324 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,716,741,068 UART:
1,716,741,084 UART: Running Caliptra ROM ...
1,716,741,492 UART:
1,716,741,633 UART: [state] CFI Enabled
1,716,744,453 UART: [state] LifecycleState = Unprovisioned
1,716,745,108 UART: [state] DebugLocked = No
1,716,745,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,716,747,419 UART: [kat] SHA2-256
1,717,541,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,717,545,465 UART: [kat] ++
1,717,545,617 UART: [kat] sha1
1,717,549,781 UART: [kat] SHA2-256
1,717,551,719 UART: [kat] SHA2-384
1,717,554,668 UART: [kat] SHA2-512-ACC
1,717,556,568 UART: [kat] ECC-384
1,717,562,455 UART: [kat] HMAC-384Kdf
1,717,567,113 UART: [kat] LMS
1,718,135,309 UART: [kat] --
1,718,135,982 UART: [update-reset] ++
1,719,466,522 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,719,467,790 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,719,617,294 >>> mbox cmd response: success
1,719,617,557 UART: [update-reset] Copying MAN_2 To MAN_1
1,719,625,571 UART: [update-reset Success] --
1,719,626,746 UART: [state] Locking Datavault
1,719,627,368 UART: [state] Locking PCR0, PCR1 and PCR31
1,719,627,972 UART: [state] Locking ICCM
1,719,628,556 UART: [exit] Launching FMC @ 0x40000130
1,719,633,885 UART:
1,719,633,901 UART: Running Caliptra FMC ...
1,719,634,309 UART:
1,719,634,452 UART: [state] CFI Enabled
1,719,723,657 UART: [art] Extend RT PCRs Done
1,719,724,085 UART: [art] Lock RT PCRs Done
1,719,725,170 UART: [art] Populate DV Done
1,719,733,467 UART: [fht] FMC Alias Private Key: 7
1,719,734,633 UART: [art] Derive CDI
1,719,734,913 UART: [art] Store in in slot 0x4
1,719,820,638 UART: [art] Derive Key Pair
1,719,820,998 UART: [art] Store priv key in slot 0x5
1,719,834,336 UART: [art] Derive Key Pair - Done
1,719,849,135 UART: [art] Signing Cert with AUTHO
1,719,849,615 UART: RITY.KEYID = 7
1,719,864,457 UART: [art] Erasing AUTHORITY.KEYID = 7
1,719,865,222 UART: [art] PUB.X = 1F630D7EAAC25544A3534945E13C3473E05FA9B34520C0AC0F3F5CFB94E26616448E6F7CE116F0CB240462937D44DDB6
1,719,871,987 UART: [art] PUB.Y = 0ED92B11949F2634C2F956D17A92B8D48D267C625E2190755C06D879AAC63BAA556983070A2E60D06EDD2CB6A4719B13
1,719,878,925 UART: [art] SIG.R = DB6AF4152B486B1220345A6619B01026C3C0BA614B56526F85DE2AE4AA0B8DFF91F642A8458A173648070CB429C6AE8D
1,719,885,690 UART: [art] SIG.S = 895F3BE05AE31D58CDD6FFFB828D85EDAE3B3CBEAD408696B8BA6E72EC1BB4A66AAB34B74C8DD6DD9A54B0CA24B676DD
1,719,909,599 UART: Caliptra RT
1,719,909,944 UART: [state] CFI Enabled
1,720,190,774 UART: [rt] RT listening for mailbox commands...
1,720,191,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,720,192,344 UART:
1,720,192,360 UART: Running Caliptra ROM ...
1,720,192,768 UART:
1,720,192,909 UART: [state] CFI Enabled
1,720,195,723 UART: [state] LifecycleState = Unprovisioned
1,720,196,378 UART: [state] DebugLocked = No
1,720,197,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,720,198,719 UART: [kat] SHA2-256
1,720,992,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,720,996,765 UART: [kat] ++
1,720,996,917 UART: [kat] sha1
1,721,000,919 UART: [kat] SHA2-256
1,721,002,857 UART: [kat] SHA2-384
1,721,005,590 UART: [kat] SHA2-512-ACC
1,721,007,490 UART: [kat] ECC-384
1,721,012,849 UART: [kat] HMAC-384Kdf
1,721,017,519 UART: [kat] LMS
1,721,585,715 UART: [kat] --
1,721,586,536 UART: [update-reset] ++
1,722,917,558 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,722,918,696 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,723,068,200 >>> mbox cmd response: success
1,723,068,503 UART: [update-reset] Copying MAN_2 To MAN_1
1,723,076,517 UART: [update-reset Success] --
1,723,077,602 UART: [state] Locking Datavault
1,723,078,384 UART: [state] Locking PCR0, PCR1 and PCR31
1,723,078,988 UART: [state] Locking ICCM
1,723,079,626 UART: [exit] Launching FMC @ 0x40000130
1,723,084,955 UART:
1,723,084,971 UART: Running Caliptra FMC ...
1,723,085,379 UART:
1,723,085,522 UART: [state] CFI Enabled
1,723,174,417 UART: [art] Extend RT PCRs Done
1,723,174,845 UART: [art] Lock RT PCRs Done
1,723,176,170 UART: [art] Populate DV Done
1,723,184,547 UART: [fht] FMC Alias Private Key: 7
1,723,185,493 UART: [art] Derive CDI
1,723,185,773 UART: [art] Store in in slot 0x4
1,723,271,574 UART: [art] Derive Key Pair
1,723,271,934 UART: [art] Store priv key in slot 0x5
1,723,285,358 UART: [art] Derive Key Pair - Done
1,723,300,084 UART: [art] Signing Cert with AUTHO
1,723,300,564 UART: RITY.KEYID = 7
1,723,316,114 UART: [art] Erasing AUTHORITY.KEYID = 7
1,723,316,879 UART: [art] PUB.X = 7012C3329DB70C8582940E8F6D2CF199AEA3B717BD8A526B61A561E8DCC84DBBB8D6CCE414F20C5050D9D12C2D8997E7
1,723,323,652 UART: [art] PUB.Y = 93C6854ADE3833DFCAEB14DBC2A09E43C0682576F785CB2FB898C6E8908257E4D8D5B174B6DFCB83BF9F983391A6B402
1,723,330,611 UART: [art] SIG.R = F97B50BF3A3A2D8BADA16EC71A6BF6BE99B14FF5161EFC6DCF2D547E2DBD9DC446C7B1E627A9D0E34FF10B2970D70AC5
1,723,337,405 UART: [art] SIG.S = 496BB69E1B046491ACC20822F2E14FADA634A2DDD7B23AA9CD20C5D5CE9B88BA5B365401CAF2888186200CD3FF54805E
1,723,361,574 UART: Caliptra RT
1,723,361,919 UART: [state] CFI Enabled
1,723,646,376 UART: [rt] RT listening for mailbox commands...
1,723,647,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,723,648,050 UART:
1,723,648,066 UART: Running Caliptra ROM ...
1,723,648,474 UART:
1,723,648,615 UART: [state] CFI Enabled
1,723,651,557 UART: [state] LifecycleState = Unprovisioned
1,723,652,212 UART: [state] DebugLocked = No
1,723,652,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,723,654,283 UART: [kat] SHA2-256
1,724,448,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,724,452,329 UART: [kat] ++
1,724,452,481 UART: [kat] sha1
1,724,456,599 UART: [kat] SHA2-256
1,724,458,537 UART: [kat] SHA2-384
1,724,461,314 UART: [kat] SHA2-512-ACC
1,724,463,214 UART: [kat] ECC-384
1,724,468,833 UART: [kat] HMAC-384Kdf
1,724,473,511 UART: [kat] LMS
1,725,041,707 UART: [kat] --
1,725,042,490 UART: [update-reset] ++
1,726,372,866 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,726,374,142 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,726,523,646 >>> mbox cmd response: success
1,726,523,787 UART: [update-reset] Copying MAN_2 To MAN_1
1,726,531,801 UART: [update-reset Success] --
1,726,532,596 UART: [state] Locking Datavault
1,726,533,258 UART: [state] Locking PCR0, PCR1 and PCR31
1,726,533,862 UART: [state] Locking ICCM
1,726,534,490 UART: [exit] Launching FMC @ 0x40000130
1,726,539,819 UART:
1,726,539,835 UART: Running Caliptra FMC ...
1,726,540,243 UART:
1,726,540,386 UART: [state] CFI Enabled
1,726,629,543 UART: [art] Extend RT PCRs Done
1,726,629,971 UART: [art] Lock RT PCRs Done
1,726,631,296 UART: [art] Populate DV Done
1,726,639,447 UART: [fht] FMC Alias Private Key: 7
1,726,640,599 UART: [art] Derive CDI
1,726,640,879 UART: [art] Store in in slot 0x4
1,726,726,594 UART: [art] Derive Key Pair
1,726,726,954 UART: [art] Store priv key in slot 0x5
1,726,741,086 UART: [art] Derive Key Pair - Done
1,726,756,331 UART: [art] Signing Cert with AUTHO
1,726,756,811 UART: RITY.KEYID = 7
1,726,771,735 UART: [art] Erasing AUTHORITY.KEYID = 7
1,726,772,500 UART: [art] PUB.X = 1F630D7EAAC25544A3534945E13C3473E05FA9B34520C0AC0F3F5CFB94E26616448E6F7CE116F0CB240462937D44DDB6
1,726,779,265 UART: [art] PUB.Y = 0ED92B11949F2634C2F956D17A92B8D48D267C625E2190755C06D879AAC63BAA556983070A2E60D06EDD2CB6A4719B13
1,726,786,203 UART: [art] SIG.R = DB6AF4152B486B1220345A6619B01026C3C0BA614B56526F85DE2AE4AA0B8DFF91F642A8458A173648070CB429C6AE8D
1,726,792,968 UART: [art] SIG.S = 895F3BE05AE31D58CDD6FFFB828D85EDAE3B3CBEAD408696B8BA6E72EC1BB4A66AAB34B74C8DD6DD9A54B0CA24B676DD
1,726,816,763 UART: Caliptra RT
1,726,817,108 UART: [state] CFI Enabled
1,727,101,080 UART: [rt] RT listening for mailbox commands...
1,727,101,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,727,102,698 UART:
1,727,102,714 UART: Running Caliptra ROM ...
1,727,103,122 UART:
1,727,103,263 UART: [state] CFI Enabled
1,727,105,851 UART: [state] LifecycleState = Unprovisioned
1,727,106,506 UART: [state] DebugLocked = No
1,727,107,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,727,108,927 UART: [kat] SHA2-256
1,727,902,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,727,906,973 UART: [kat] ++
1,727,907,125 UART: [kat] sha1
1,727,911,433 UART: [kat] SHA2-256
1,727,913,371 UART: [kat] SHA2-384
1,727,916,250 UART: [kat] SHA2-512-ACC
1,727,918,150 UART: [kat] ECC-384
1,727,923,873 UART: [kat] HMAC-384Kdf
1,727,928,363 UART: [kat] LMS
1,728,496,559 UART: [kat] --
1,728,497,166 UART: [update-reset] ++
1,729,828,840 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,729,830,050 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
1,729,979,554 >>> mbox cmd response: success
1,729,979,813 UART: [update-reset] Copying MAN_2 To MAN_1
1,729,987,827 UART: [update-reset Success] --
1,729,988,964 UART: [state] Locking Datavault
1,729,989,662 UART: [state] Locking PCR0, PCR1 and PCR31
1,729,990,266 UART: [state] Locking ICCM
1,729,990,934 UART: [exit] Launching FMC @ 0x40000130
1,729,996,263 UART:
1,729,996,279 UART: Running Caliptra FMC ...
1,729,996,687 UART:
1,729,996,830 UART: [state] CFI Enabled
1,730,085,875 UART: [art] Extend RT PCRs Done
1,730,086,303 UART: [art] Lock RT PCRs Done
1,730,087,662 UART: [art] Populate DV Done
1,730,095,877 UART: [fht] FMC Alias Private Key: 7
1,730,096,905 UART: [art] Derive CDI
1,730,097,185 UART: [art] Store in in slot 0x4
1,730,182,664 UART: [art] Derive Key Pair
1,730,183,024 UART: [art] Store priv key in slot 0x5
1,730,196,672 UART: [art] Derive Key Pair - Done
1,730,211,206 UART: [art] Signing Cert with AUTHO
1,730,211,686 UART: RITY.KEYID = 7
1,730,226,846 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,227,611 UART: [art] PUB.X = 7012C3329DB70C8582940E8F6D2CF199AEA3B717BD8A526B61A561E8DCC84DBBB8D6CCE414F20C5050D9D12C2D8997E7
1,730,234,384 UART: [art] PUB.Y = 93C6854ADE3833DFCAEB14DBC2A09E43C0682576F785CB2FB898C6E8908257E4D8D5B174B6DFCB83BF9F983391A6B402
1,730,241,343 UART: [art] SIG.R = F97B50BF3A3A2D8BADA16EC71A6BF6BE99B14FF5161EFC6DCF2D547E2DBD9DC446C7B1E627A9D0E34FF10B2970D70AC5
1,730,248,137 UART: [art] SIG.S = 496BB69E1B046491ACC20822F2E14FADA634A2DDD7B23AA9CD20C5D5CE9B88BA5B365401CAF2888186200CD3FF54805E
1,730,271,380 UART: Caliptra RT
1,730,271,725 UART: [state] CFI Enabled
1,730,555,554 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 341.19s
Truncated 734952 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,645,392,289 >>> mbox cmd response: success
1,645,405,886 UART:
1,645,405,902 UART: Running Caliptra FMC ...
1,645,406,310 UART:
1,645,406,453 UART: [state] CFI Enabled
1,645,495,644 UART: [art] Extend RT PCRs Done
1,645,496,072 UART: [art] Lock RT PCRs Done
1,645,497,163 UART: [art] Populate DV Done
1,645,505,356 UART: [fht] FMC Alias Private Key: 7
1,645,506,466 UART: [art] Derive CDI
1,645,506,746 UART: [art] Store in in slot 0x4
1,645,592,373 UART: [art] Derive Key Pair
1,645,592,733 UART: [art] Store priv key in slot 0x5
1,645,606,193 UART: [art] Derive Key Pair - Done
1,645,621,195 UART: [art] Signing Cert with AUTHO
1,645,621,675 UART: RITY.KEYID = 7
1,645,637,271 UART: [art] Erasing AUTHORITY.KEYID = 7
1,645,638,036 UART: [art] PUB.X = BFBE56254347AB23DCD1D431AEB99902C4FE2E0F1EFFC6202DCA100CCE467DD5EA00996831931B3DA287F06CD4B98680
1,645,644,791 UART: [art] PUB.Y = 412B35C01D48E5866C83B82EA930EE72960440372B3588A3183F35407D5A77A7B59A1FF9EC0369354521FA3B2E998CEA
1,645,651,731 UART: [art] SIG.R = 065D95A8F0AC4BFB0B09900DA37C30C7AC3E637C5E12AA0C3D267D0DC9D1FD9483B282A373F857CFC9CF46F7DB224906
1,645,658,496 UART: [art] SIG.S = 2B75EB0F8F0B1239671C04C90A716A8AA785052EC701DC1F3AF986B061F2B3ADC5D4BDC1546A64D43094C574B7643FFD
1,645,682,535 UART: Caliptra RT
1,645,682,880 UART: [state] CFI Enabled
1,645,966,704 UART: [rt] RT listening for mailbox commands...
1,645,967,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,648,727,188 >>> mbox cmd response: success
1,648,740,187 UART:
1,648,740,203 UART: Running Caliptra FMC ...
1,648,740,611 UART:
1,648,740,754 UART: [state] CFI Enabled
1,648,830,037 UART: [art] Extend RT PCRs Done
1,648,830,465 UART: [art] Lock RT PCRs Done
1,648,831,684 UART: [art] Populate DV Done
1,648,839,799 UART: [fht] FMC Alias Private Key: 7
1,648,840,979 UART: [art] Derive CDI
1,648,841,259 UART: [art] Store in in slot 0x4
1,648,926,974 UART: [art] Derive Key Pair
1,648,927,334 UART: [art] Store priv key in slot 0x5
1,648,940,946 UART: [art] Derive Key Pair - Done
1,648,955,350 UART: [art] Signing Cert with AUTHO
1,648,955,830 UART: RITY.KEYID = 7
1,648,971,130 UART: [art] Erasing AUTHORITY.KEYID = 7
1,648,971,895 UART: [art] PUB.X = 9C97C2ECA75048C28E7B9F381A04725E2AAC8795577D43FB9B4B16967EF8DC168F2168AFA668698FC3479529A7206F31
1,648,978,662 UART: [art] PUB.Y = E193819E40871199E2D235C869B4BB055368C6174BE44F00E8B035CF986393FEBC6CEB6B88B5A3E53D1344438CC20194
1,648,985,582 UART: [art] SIG.R = 0BFE2800C8C79971B415CF5DF9054B41CEAE563399BA375A314F60278C137B02EEFFC62DE66F3A85DA67A72F0799CB39
1,648,992,328 UART: [art] SIG.S = C1B0B77518F12F32879A47379907BFFF1C759FD3EF245AFB4EAC20CFDA5DA62892248D2D5306767B6CA05D0C0B1E04B7
1,649,016,212 UART: Caliptra RT
1,649,016,557 UART: [state] CFI Enabled
1,649,300,812 UART: [rt] RT listening for mailbox commands...
1,649,301,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,652,060,232 >>> mbox cmd response: success
1,652,073,503 UART:
1,652,073,519 UART: Running Caliptra FMC ...
1,652,073,927 UART:
1,652,074,070 UART: [state] CFI Enabled
1,652,163,209 UART: [art] Extend RT PCRs Done
1,652,163,637 UART: [art] Lock RT PCRs Done
1,652,164,990 UART: [art] Populate DV Done
1,652,173,417 UART: [fht] FMC Alias Private Key: 7
1,652,174,381 UART: [art] Derive CDI
1,652,174,661 UART: [art] Store in in slot 0x4
1,652,260,366 UART: [art] Derive Key Pair
1,652,260,726 UART: [art] Store priv key in slot 0x5
1,652,274,130 UART: [art] Derive Key Pair - Done
1,652,289,246 UART: [art] Signing Cert with AUTHO
1,652,289,726 UART: RITY.KEYID = 7
1,652,304,918 UART: [art] Erasing AUTHORITY.KEYID = 7
1,652,305,683 UART: [art] PUB.X = BFBE56254347AB23DCD1D431AEB99902C4FE2E0F1EFFC6202DCA100CCE467DD5EA00996831931B3DA287F06CD4B98680
1,652,312,438 UART: [art] PUB.Y = 412B35C01D48E5866C83B82EA930EE72960440372B3588A3183F35407D5A77A7B59A1FF9EC0369354521FA3B2E998CEA
1,652,319,378 UART: [art] SIG.R = 065D95A8F0AC4BFB0B09900DA37C30C7AC3E637C5E12AA0C3D267D0DC9D1FD9483B282A373F857CFC9CF46F7DB224906
1,652,326,143 UART: [art] SIG.S = 2B75EB0F8F0B1239671C04C90A716A8AA785052EC701DC1F3AF986B061F2B3ADC5D4BDC1546A64D43094C574B7643FFD
1,652,349,958 UART: Caliptra RT
1,652,350,303 UART: [state] CFI Enabled
1,652,635,029 UART: [rt] RT listening for mailbox commands...
1,652,635,699 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,655,395,839 >>> mbox cmd response: success
1,655,409,150 UART:
1,655,409,166 UART: Running Caliptra FMC ...
1,655,409,574 UART:
1,655,409,717 UART: [state] CFI Enabled
1,655,498,790 UART: [art] Extend RT PCRs Done
1,655,499,218 UART: [art] Lock RT PCRs Done
1,655,500,471 UART: [art] Populate DV Done
1,655,508,914 UART: [fht] FMC Alias Private Key: 7
1,655,509,858 UART: [art] Derive CDI
1,655,510,138 UART: [art] Store in in slot 0x4
1,655,595,917 UART: [art] Derive Key Pair
1,655,596,277 UART: [art] Store priv key in slot 0x5
1,655,610,079 UART: [art] Derive Key Pair - Done
1,655,624,651 UART: [art] Signing Cert with AUTHO
1,655,625,131 UART: RITY.KEYID = 7
1,655,640,209 UART: [art] Erasing AUTHORITY.KEYID = 7
1,655,640,974 UART: [art] PUB.X = 9C97C2ECA75048C28E7B9F381A04725E2AAC8795577D43FB9B4B16967EF8DC168F2168AFA668698FC3479529A7206F31
1,655,647,741 UART: [art] PUB.Y = E193819E40871199E2D235C869B4BB055368C6174BE44F00E8B035CF986393FEBC6CEB6B88B5A3E53D1344438CC20194
1,655,654,661 UART: [art] SIG.R = 0BFE2800C8C79971B415CF5DF9054B41CEAE563399BA375A314F60278C137B02EEFFC62DE66F3A85DA67A72F0799CB39
1,655,661,407 UART: [art] SIG.S = C1B0B77518F12F32879A47379907BFFF1C759FD3EF245AFB4EAC20CFDA5DA62892248D2D5306767B6CA05D0C0B1E04B7
1,655,684,977 UART: Caliptra RT
1,655,685,322 UART: [state] CFI Enabled
1,655,968,523 UART: [rt] RT listening for mailbox commands...
1,655,969,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,658,727,121 >>> mbox cmd response: success
1,658,740,220 UART:
1,658,740,236 UART: Running Caliptra FMC ...
1,658,740,644 UART:
1,658,740,787 UART: [state] CFI Enabled
1,658,830,194 UART: [art] Extend RT PCRs Done
1,658,830,622 UART: [art] Lock RT PCRs Done
1,658,831,953 UART: [art] Populate DV Done
1,658,840,318 UART: [fht] FMC Alias Private Key: 7
1,658,841,408 UART: [art] Derive CDI
1,658,841,688 UART: [art] Store in in slot 0x4
1,658,927,529 UART: [art] Derive Key Pair
1,658,927,889 UART: [art] Store priv key in slot 0x5
1,658,941,665 UART: [art] Derive Key Pair - Done
1,658,956,127 UART: [art] Signing Cert with AUTHO
1,658,956,607 UART: RITY.KEYID = 7
1,658,971,305 UART: [art] Erasing AUTHORITY.KEYID = 7
1,658,972,070 UART: [art] PUB.X = BFBE56254347AB23DCD1D431AEB99902C4FE2E0F1EFFC6202DCA100CCE467DD5EA00996831931B3DA287F06CD4B98680
1,658,978,825 UART: [art] PUB.Y = 412B35C01D48E5866C83B82EA930EE72960440372B3588A3183F35407D5A77A7B59A1FF9EC0369354521FA3B2E998CEA
1,658,985,765 UART: [art] SIG.R = 065D95A8F0AC4BFB0B09900DA37C30C7AC3E637C5E12AA0C3D267D0DC9D1FD9483B282A373F857CFC9CF46F7DB224906
1,658,992,530 UART: [art] SIG.S = 2B75EB0F8F0B1239671C04C90A716A8AA785052EC701DC1F3AF986B061F2B3ADC5D4BDC1546A64D43094C574B7643FFD
1,659,016,553 UART: Caliptra RT
1,659,016,898 UART: [state] CFI Enabled
1,659,301,146 UART: [rt] RT listening for mailbox commands...
1,659,301,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,662,061,120 >>> mbox cmd response: success
1,662,074,455 UART:
1,662,074,471 UART: Running Caliptra FMC ...
1,662,074,879 UART:
1,662,075,022 UART: [state] CFI Enabled
1,662,164,427 UART: [art] Extend RT PCRs Done
1,662,164,855 UART: [art] Lock RT PCRs Done
1,662,166,208 UART: [art] Populate DV Done
1,662,174,231 UART: [fht] FMC Alias Private Key: 7
1,662,175,281 UART: [art] Derive CDI
1,662,175,561 UART: [art] Store in in slot 0x4
1,662,261,220 UART: [art] Derive Key Pair
1,662,261,580 UART: [art] Store priv key in slot 0x5
1,662,274,932 UART: [art] Derive Key Pair - Done
1,662,289,980 UART: [art] Signing Cert with AUTHO
1,662,290,460 UART: RITY.KEYID = 7
1,662,305,752 UART: [art] Erasing AUTHORITY.KEYID = 7
1,662,306,517 UART: [art] PUB.X = 9C97C2ECA75048C28E7B9F381A04725E2AAC8795577D43FB9B4B16967EF8DC168F2168AFA668698FC3479529A7206F31
1,662,313,284 UART: [art] PUB.Y = E193819E40871199E2D235C869B4BB055368C6174BE44F00E8B035CF986393FEBC6CEB6B88B5A3E53D1344438CC20194
1,662,320,204 UART: [art] SIG.R = 0BFE2800C8C79971B415CF5DF9054B41CEAE563399BA375A314F60278C137B02EEFFC62DE66F3A85DA67A72F0799CB39
1,662,326,950 UART: [art] SIG.S = C1B0B77518F12F32879A47379907BFFF1C759FD3EF245AFB4EAC20CFDA5DA62892248D2D5306767B6CA05D0C0B1E04B7
1,662,351,348 UART: Caliptra RT
1,662,351,693 UART: [state] CFI Enabled
1,662,634,060 UART: [rt] RT listening for mailbox commands...
1,662,634,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,665,395,358 >>> mbox cmd response: success
1,665,408,941 UART:
1,665,408,957 UART: Running Caliptra FMC ...
1,665,409,365 UART:
1,665,409,508 UART: [state] CFI Enabled
1,665,499,007 UART: [art] Extend RT PCRs Done
1,665,499,435 UART: [art] Lock RT PCRs Done
1,665,500,750 UART: [art] Populate DV Done
1,665,509,085 UART: [fht] FMC Alias Private Key: 7
1,665,510,081 UART: [art] Derive CDI
1,665,510,361 UART: [art] Store in in slot 0x4
1,665,596,222 UART: [art] Derive Key Pair
1,665,596,582 UART: [art] Store priv key in slot 0x5
1,665,609,726 UART: [art] Derive Key Pair - Done
1,665,624,534 UART: [art] Signing Cert with AUTHO
1,665,625,014 UART: RITY.KEYID = 7
1,665,640,148 UART: [art] Erasing AUTHORITY.KEYID = 7
1,665,640,913 UART: [art] PUB.X = BFBE56254347AB23DCD1D431AEB99902C4FE2E0F1EFFC6202DCA100CCE467DD5EA00996831931B3DA287F06CD4B98680
1,665,647,668 UART: [art] PUB.Y = 412B35C01D48E5866C83B82EA930EE72960440372B3588A3183F35407D5A77A7B59A1FF9EC0369354521FA3B2E998CEA
1,665,654,608 UART: [art] SIG.R = 065D95A8F0AC4BFB0B09900DA37C30C7AC3E637C5E12AA0C3D267D0DC9D1FD9483B282A373F857CFC9CF46F7DB224906
1,665,661,373 UART: [art] SIG.S = 2B75EB0F8F0B1239671C04C90A716A8AA785052EC701DC1F3AF986B061F2B3ADC5D4BDC1546A64D43094C574B7643FFD
1,665,685,730 UART: Caliptra RT
1,665,686,075 UART: [state] CFI Enabled
1,665,968,847 UART: [rt] RT listening for mailbox commands...
1,665,969,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,668,729,423 >>> mbox cmd response: success
1,668,742,660 UART:
1,668,742,676 UART: Running Caliptra FMC ...
1,668,743,084 UART:
1,668,743,227 UART: [state] CFI Enabled
1,668,832,362 UART: [art] Extend RT PCRs Done
1,668,832,790 UART: [art] Lock RT PCRs Done
1,668,834,189 UART: [art] Populate DV Done
1,668,842,290 UART: [fht] FMC Alias Private Key: 7
1,668,843,274 UART: [art] Derive CDI
1,668,843,554 UART: [art] Store in in slot 0x4
1,668,928,965 UART: [art] Derive Key Pair
1,668,929,325 UART: [art] Store priv key in slot 0x5
1,668,942,351 UART: [art] Derive Key Pair - Done
1,668,957,091 UART: [art] Signing Cert with AUTHO
1,668,957,571 UART: RITY.KEYID = 7
1,668,972,723 UART: [art] Erasing AUTHORITY.KEYID = 7
1,668,973,488 UART: [art] PUB.X = 9C97C2ECA75048C28E7B9F381A04725E2AAC8795577D43FB9B4B16967EF8DC168F2168AFA668698FC3479529A7206F31
1,668,980,255 UART: [art] PUB.Y = E193819E40871199E2D235C869B4BB055368C6174BE44F00E8B035CF986393FEBC6CEB6B88B5A3E53D1344438CC20194
1,668,987,175 UART: [art] SIG.R = 0BFE2800C8C79971B415CF5DF9054B41CEAE563399BA375A314F60278C137B02EEFFC62DE66F3A85DA67A72F0799CB39
1,668,993,921 UART: [art] SIG.S = C1B0B77518F12F32879A47379907BFFF1C759FD3EF245AFB4EAC20CFDA5DA62892248D2D5306767B6CA05D0C0B1E04B7
1,669,016,953 UART: Caliptra RT
1,669,017,298 UART: [state] CFI Enabled
1,669,298,611 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 330.84s
Truncated 1339531 bytes from beginning
[art] Populate DV Done
1,553,016,679 UART: [fht] FMC Alias Private Key: 7
1,553,017,799 UART: [art] Derive CDI
1,553,018,079 UART: [art] Store in in slot 0x4
1,553,104,066 UART: [art] Derive Key Pair
1,553,104,426 UART: [art] Store priv key in slot 0x5
1,553,117,720 UART: [art] Derive Key Pair - Done
1,553,132,593 UART: [art] Signing Cert with AUTHO
1,553,133,073 UART: RITY.KEYID = 7
1,553,148,211 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,148,976 UART: [art] PUB.X = 1997955A4E7C1289B33905A50B686B209890BB98DF0A87606F03746F5A10866A4EE7F3A8570B1DCC726E21A3B247F276
1,553,155,725 UART: [art] PUB.Y = 0F6788D527089587AABCBC187FAD0355468ABEBA5A0287D24A381BD09C828A3D4D38CD4656F56061F50F7979E7559CB3
1,553,162,664 UART: [art] SIG.R = A77873831CE8443C3FD980DDAD284FD902DA8189DCE996BA74E2DC9191A122FBFE02A888E4CE4943DF5A858374E9CF1A
1,553,169,442 UART: [art] SIG.S = A3833EC545EF791EC97967B2C9F33B4B6353E1D16DE33DF75123020AC2834AD1F03802FFF38649ACC9D751590CEA57D2
1,553,193,153 UART: Caliptra RT
1,553,193,406 UART: [state] CFI Enabled
1,553,471,038 UART: [rt] RT listening for mailbox commands...
1,553,471,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,472,711 UART:
1,553,472,727 UART: Running Caliptra ROM ...
1,553,473,135 UART:
1,553,473,190 UART: [state] CFI Enabled
1,553,475,534 UART: [state] LifecycleState = Unprovisioned
1,553,476,189 UART: [state] DebugLocked = No
1,553,476,691 UART: [state] WD Timer not started. Device not locked for debugging
1,553,477,981 UART: [kat] SHA2-256
1,554,283,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,554,287,756 UART: [kat] ++
1,554,287,908 UART: [kat] sha1
1,554,292,152 UART: [kat] SHA2-256
1,554,294,092 UART: [kat] SHA2-384
1,554,296,721 UART: [kat] SHA2-512-ACC
1,554,298,621 UART: [kat] ECC-384
1,554,308,108 UART: [kat] HMAC-384Kdf
1,554,312,878 UART: [kat] LMS
1,554,561,206 UART: [kat] --
1,554,562,074 UART: [update-reset] ++
1,555,871,806 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,555,872,791 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,556,022,243 >>> mbox cmd response: success
1,556,022,592 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,030,606 UART: [update-reset Success] --
1,556,031,663 UART: [state] Locking Datavault
1,556,032,643 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,033,247 UART: [state] Locking ICCM
1,556,033,873 UART: [exit] Launching FMC @ 0x40000130
1,556,039,202 UART:
1,556,039,218 UART: Running Caliptra FMC ...
1,556,039,626 UART:
1,556,039,680 UART: [state] CFI Enabled
1,556,128,969 UART: [art] Extend RT PCRs Done
1,556,129,397 UART: [art] Lock RT PCRs Done
1,556,130,716 UART: [art] Populate DV Done
1,556,138,885 UART: [fht] FMC Alias Private Key: 7
1,556,140,001 UART: [art] Derive CDI
1,556,140,281 UART: [art] Store in in slot 0x4
1,556,225,960 UART: [art] Derive Key Pair
1,556,226,320 UART: [art] Store priv key in slot 0x5
1,556,239,166 UART: [art] Derive Key Pair - Done
1,556,253,536 UART: [art] Signing Cert with AUTHO
1,556,254,016 UART: RITY.KEYID = 7
1,556,269,314 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,270,079 UART: [art] PUB.X = 6010BEC96ADBF16347E84E9CC2EF23F3B24DA25AEC2BEFB2FAFC88546BD3FC25D8283E1659C30129953635E8ABAFF1A2
1,556,276,868 UART: [art] PUB.Y = 364D852D924CC68943E6A722CDF5979B7F157257C67561C1D60EEA8944586E75FADD189EFF2A5DF8BB7C3CDB01E46B64
1,556,283,822 UART: [art] SIG.R = 3F7DB7C0BA6E210CA745C3483A237B9E36C507CA79C4CCAC25E43EDA053F6A8AE4EAFDECDEF8CE9031B67E93C7BC3A17
1,556,290,613 UART: [art] SIG.S = 36494674221D7B80BF1A6B9C84040B275D63FC8B4ABAA9FEC248D4E8EFC125567C57323005BBBFBFE4B88EBD5504273D
1,556,314,298 UART: Caliptra RT
1,556,314,551 UART: [state] CFI Enabled
1,556,598,374 UART: [rt] RT listening for mailbox commands...
1,556,599,044 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,599,887 UART:
1,556,599,903 UART: Running Caliptra ROM ...
1,556,600,311 UART:
1,556,600,366 UART: [state] CFI Enabled
1,556,603,496 UART: [state] LifecycleState = Unprovisioned
1,556,604,151 UART: [state] DebugLocked = No
1,556,604,825 UART: [state] WD Timer not started. Device not locked for debugging
1,556,606,011 UART: [kat] SHA2-256
1,557,411,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,557,415,786 UART: [kat] ++
1,557,415,938 UART: [kat] sha1
1,557,420,340 UART: [kat] SHA2-256
1,557,422,280 UART: [kat] SHA2-384
1,557,424,973 UART: [kat] SHA2-512-ACC
1,557,426,873 UART: [kat] ECC-384
1,557,436,678 UART: [kat] HMAC-384Kdf
1,557,441,242 UART: [kat] LMS
1,557,689,570 UART: [kat] --
1,557,690,446 UART: [update-reset] ++
1,558,998,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,999,869 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,559,149,321 >>> mbox cmd response: success
1,559,149,666 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,157,680 UART: [update-reset Success] --
1,559,158,377 UART: [state] Locking Datavault
1,559,158,973 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,159,577 UART: [state] Locking ICCM
1,559,160,127 UART: [exit] Launching FMC @ 0x40000130
1,559,165,456 UART:
1,559,165,472 UART: Running Caliptra FMC ...
1,559,165,880 UART:
1,559,165,934 UART: [state] CFI Enabled
1,559,255,879 UART: [art] Extend RT PCRs Done
1,559,256,307 UART: [art] Lock RT PCRs Done
1,559,257,376 UART: [art] Populate DV Done
1,559,265,603 UART: [fht] FMC Alias Private Key: 7
1,559,266,743 UART: [art] Derive CDI
1,559,267,023 UART: [art] Store in in slot 0x4
1,559,352,526 UART: [art] Derive Key Pair
1,559,352,886 UART: [art] Store priv key in slot 0x5
1,559,366,720 UART: [art] Derive Key Pair - Done
1,559,381,389 UART: [art] Signing Cert with AUTHO
1,559,381,869 UART: RITY.KEYID = 7
1,559,396,597 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,397,362 UART: [art] PUB.X = 1997955A4E7C1289B33905A50B686B209890BB98DF0A87606F03746F5A10866A4EE7F3A8570B1DCC726E21A3B247F276
1,559,404,111 UART: [art] PUB.Y = 0F6788D527089587AABCBC187FAD0355468ABEBA5A0287D24A381BD09C828A3D4D38CD4656F56061F50F7979E7559CB3
1,559,411,050 UART: [art] SIG.R = A77873831CE8443C3FD980DDAD284FD902DA8189DCE996BA74E2DC9191A122FBFE02A888E4CE4943DF5A858374E9CF1A
1,559,417,828 UART: [art] SIG.S = A3833EC545EF791EC97967B2C9F33B4B6353E1D16DE33DF75123020AC2834AD1F03802FFF38649ACC9D751590CEA57D2
1,559,441,045 UART: Caliptra RT
1,559,441,298 UART: [state] CFI Enabled
1,559,724,268 UART: [rt] RT listening for mailbox commands...
1,559,724,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,725,891 UART:
1,559,725,907 UART: Running Caliptra ROM ...
1,559,726,315 UART:
1,559,726,370 UART: [state] CFI Enabled
1,559,728,954 UART: [state] LifecycleState = Unprovisioned
1,559,729,609 UART: [state] DebugLocked = No
1,559,730,217 UART: [state] WD Timer not started. Device not locked for debugging
1,559,731,433 UART: [kat] SHA2-256
1,560,537,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,560,541,208 UART: [kat] ++
1,560,541,360 UART: [kat] sha1
1,560,545,466 UART: [kat] SHA2-256
1,560,547,406 UART: [kat] SHA2-384
1,560,550,193 UART: [kat] SHA2-512-ACC
1,560,552,093 UART: [kat] ECC-384
1,560,561,572 UART: [kat] HMAC-384Kdf
1,560,566,052 UART: [kat] LMS
1,560,814,380 UART: [kat] --
1,560,815,364 UART: [update-reset] ++
1,562,124,340 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,125,529 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,562,274,981 >>> mbox cmd response: success
1,562,275,160 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,283,174 UART: [update-reset Success] --
1,562,284,133 UART: [state] Locking Datavault
1,562,285,131 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,285,735 UART: [state] Locking ICCM
1,562,286,277 UART: [exit] Launching FMC @ 0x40000130
1,562,291,606 UART:
1,562,291,622 UART: Running Caliptra FMC ...
1,562,292,030 UART:
1,562,292,084 UART: [state] CFI Enabled
1,562,380,431 UART: [art] Extend RT PCRs Done
1,562,380,859 UART: [art] Lock RT PCRs Done
1,562,382,212 UART: [art] Populate DV Done
1,562,390,417 UART: [fht] FMC Alias Private Key: 7
1,562,391,525 UART: [art] Derive CDI
1,562,391,805 UART: [art] Store in in slot 0x4
1,562,477,608 UART: [art] Derive Key Pair
1,562,477,968 UART: [art] Store priv key in slot 0x5
1,562,490,994 UART: [art] Derive Key Pair - Done
1,562,506,036 UART: [art] Signing Cert with AUTHO
1,562,506,516 UART: RITY.KEYID = 7
1,562,521,958 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,522,723 UART: [art] PUB.X = 6010BEC96ADBF16347E84E9CC2EF23F3B24DA25AEC2BEFB2FAFC88546BD3FC25D8283E1659C30129953635E8ABAFF1A2
1,562,529,512 UART: [art] PUB.Y = 364D852D924CC68943E6A722CDF5979B7F157257C67561C1D60EEA8944586E75FADD189EFF2A5DF8BB7C3CDB01E46B64
1,562,536,466 UART: [art] SIG.R = 3F7DB7C0BA6E210CA745C3483A237B9E36C507CA79C4CCAC25E43EDA053F6A8AE4EAFDECDEF8CE9031B67E93C7BC3A17
1,562,543,257 UART: [art] SIG.S = 36494674221D7B80BF1A6B9C84040B275D63FC8B4ABAA9FEC248D4E8EFC125567C57323005BBBFBFE4B88EBD5504273D
1,562,567,122 UART: Caliptra RT
1,562,567,375 UART: [state] CFI Enabled
1,562,852,436 UART: [rt] RT listening for mailbox commands...
1,562,853,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,854,063 UART:
1,562,854,079 UART: Running Caliptra ROM ...
1,562,854,487 UART:
1,562,854,542 UART: [state] CFI Enabled
1,562,857,080 UART: [state] LifecycleState = Unprovisioned
1,562,857,735 UART: [state] DebugLocked = No
1,562,858,393 UART: [state] WD Timer not started. Device not locked for debugging
1,562,859,653 UART: [kat] SHA2-256
1,563,665,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,563,669,428 UART: [kat] ++
1,563,669,580 UART: [kat] sha1
1,563,673,720 UART: [kat] SHA2-256
1,563,675,660 UART: [kat] SHA2-384
1,563,678,337 UART: [kat] SHA2-512-ACC
1,563,680,237 UART: [kat] ECC-384
1,563,690,224 UART: [kat] HMAC-384Kdf
1,563,694,732 UART: [kat] LMS
1,563,943,060 UART: [kat] --
1,563,944,100 UART: [update-reset] ++
1,565,253,564 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,254,721 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,565,404,173 >>> mbox cmd response: success
1,565,404,444 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,412,458 UART: [update-reset Success] --
1,565,413,583 UART: [state] Locking Datavault
1,565,414,151 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,414,755 UART: [state] Locking ICCM
1,565,415,259 UART: [exit] Launching FMC @ 0x40000130
1,565,420,588 UART:
1,565,420,604 UART: Running Caliptra FMC ...
1,565,421,012 UART:
1,565,421,066 UART: [state] CFI Enabled
1,565,509,839 UART: [art] Extend RT PCRs Done
1,565,510,267 UART: [art] Lock RT PCRs Done
1,565,511,530 UART: [art] Populate DV Done
1,565,519,775 UART: [fht] FMC Alias Private Key: 7
1,565,520,715 UART: [art] Derive CDI
1,565,520,995 UART: [art] Store in in slot 0x4
1,565,606,160 UART: [art] Derive Key Pair
1,565,606,520 UART: [art] Store priv key in slot 0x5
1,565,619,250 UART: [art] Derive Key Pair - Done
1,565,634,187 UART: [art] Signing Cert with AUTHO
1,565,634,667 UART: RITY.KEYID = 7
1,565,649,787 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,650,552 UART: [art] PUB.X = 1997955A4E7C1289B33905A50B686B209890BB98DF0A87606F03746F5A10866A4EE7F3A8570B1DCC726E21A3B247F276
1,565,657,301 UART: [art] PUB.Y = 0F6788D527089587AABCBC187FAD0355468ABEBA5A0287D24A381BD09C828A3D4D38CD4656F56061F50F7979E7559CB3
1,565,664,240 UART: [art] SIG.R = A77873831CE8443C3FD980DDAD284FD902DA8189DCE996BA74E2DC9191A122FBFE02A888E4CE4943DF5A858374E9CF1A
1,565,671,018 UART: [art] SIG.S = A3833EC545EF791EC97967B2C9F33B4B6353E1D16DE33DF75123020AC2834AD1F03802FFF38649ACC9D751590CEA57D2
1,565,694,681 UART: Caliptra RT
1,565,694,934 UART: [state] CFI Enabled
1,565,979,004 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 317.36s
Truncated 733352 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,383,393 >>> mbox cmd response: success
1,484,397,101 UART:
1,484,397,117 UART: Running Caliptra FMC ...
1,484,397,525 UART:
1,484,397,579 UART: [state] CFI Enabled
1,484,486,356 UART: [art] Extend RT PCRs Done
1,484,486,784 UART: [art] Lock RT PCRs Done
1,484,488,345 UART: [art] Populate DV Done
1,484,496,804 UART: [fht] FMC Alias Private Key: 7
1,484,497,920 UART: [art] Derive CDI
1,484,498,200 UART: [art] Store in in slot 0x4
1,484,583,585 UART: [art] Derive Key Pair
1,484,583,945 UART: [art] Store priv key in slot 0x5
1,484,596,545 UART: [art] Derive Key Pair - Done
1,484,611,466 UART: [art] Signing Cert with AUTHO
1,484,611,946 UART: RITY.KEYID = 7
1,484,626,862 UART: [art] Erasing AUTHORITY.KEYID = 7
1,484,627,627 UART: [art] PUB.X = 36A99AFABA27164D6AF12313B1C44D486C427B5A22C1D58F5DC9FCFB22C30514A5311CA099E614D3F62884A4A86276BE
1,484,634,402 UART: [art] PUB.Y = FED18D00B92216E5257203884D3EE29EC8C720B679B7A38A98B3D68C9AF95201F504B31411073E5B71FD8FD6766B83F2
1,484,641,318 UART: [art] SIG.R = 4B2C624B5F928C0099DFB5A37E5C167646A03AFF120155DA915F461FB8867E4DABAB11009DF6D865803777000B1975A5
1,484,648,016 UART: [art] SIG.S = BB19324FF9F71EFABD4E704E4A93E54B8CAFE45FA3C1140CFF42431DE539DAE044EF160C47BAC65A620E51381C71449D
1,484,671,710 UART: Caliptra RT
1,484,671,963 UART: [state] CFI Enabled
1,484,954,172 UART: [rt] RT listening for mailbox commands...
1,484,954,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,389,230 >>> mbox cmd response: success
1,487,402,550 UART:
1,487,402,566 UART: Running Caliptra FMC ...
1,487,402,974 UART:
1,487,403,028 UART: [state] CFI Enabled
1,487,492,295 UART: [art] Extend RT PCRs Done
1,487,492,723 UART: [art] Lock RT PCRs Done
1,487,493,820 UART: [art] Populate DV Done
1,487,502,073 UART: [fht] FMC Alias Private Key: 7
1,487,503,043 UART: [art] Derive CDI
1,487,503,323 UART: [art] Store in in slot 0x4
1,487,589,160 UART: [art] Derive Key Pair
1,487,589,520 UART: [art] Store priv key in slot 0x5
1,487,602,920 UART: [art] Derive Key Pair - Done
1,487,617,625 UART: [art] Signing Cert with AUTHO
1,487,618,105 UART: RITY.KEYID = 7
1,487,633,735 UART: [art] Erasing AUTHORITY.KEYID = 7
1,487,634,500 UART: [art] PUB.X = 5179868F60D63A18F449F684FD300BC7186D95122E7C0905EED4887DAB1C8B8351FD0F5BEE39320F2E922C2E1B3BE28C
1,487,641,261 UART: [art] PUB.Y = CCF1B453EDD8C9879EA99EA646EF850A71A68AD07AB7A802A8A3F91F04923F2B55525960A5897919D45E1FAD418B62DE
1,487,648,212 UART: [art] SIG.R = 33E8FCF033CB17BE404372B4E6F1DFCA204DB54D0C9ADC865FB0F03569BC6513239A918731EDF518B2DF93672043E04A
1,487,654,989 UART: [art] SIG.S = 13F446893866AEB2B19B2F61442DF0796841FD051C30C9B80BD0DA987E518D8701846A70A18ADEA508DAE1B30DCAEAA6
1,487,678,149 UART: Caliptra RT
1,487,678,402 UART: [state] CFI Enabled
1,487,961,067 UART: [rt] RT listening for mailbox commands...
1,487,961,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,396,550 >>> mbox cmd response: success
1,490,409,732 UART:
1,490,409,748 UART: Running Caliptra FMC ...
1,490,410,156 UART:
1,490,410,210 UART: [state] CFI Enabled
1,490,499,661 UART: [art] Extend RT PCRs Done
1,490,500,089 UART: [art] Lock RT PCRs Done
1,490,501,352 UART: [art] Populate DV Done
1,490,509,531 UART: [fht] FMC Alias Private Key: 7
1,490,510,561 UART: [art] Derive CDI
1,490,510,841 UART: [art] Store in in slot 0x4
1,490,596,452 UART: [art] Derive Key Pair
1,490,596,812 UART: [art] Store priv key in slot 0x5
1,490,609,874 UART: [art] Derive Key Pair - Done
1,490,624,885 UART: [art] Signing Cert with AUTHO
1,490,625,365 UART: RITY.KEYID = 7
1,490,640,485 UART: [art] Erasing AUTHORITY.KEYID = 7
1,490,641,250 UART: [art] PUB.X = 36A99AFABA27164D6AF12313B1C44D486C427B5A22C1D58F5DC9FCFB22C30514A5311CA099E614D3F62884A4A86276BE
1,490,648,025 UART: [art] PUB.Y = FED18D00B92216E5257203884D3EE29EC8C720B679B7A38A98B3D68C9AF95201F504B31411073E5B71FD8FD6766B83F2
1,490,654,941 UART: [art] SIG.R = 4B2C624B5F928C0099DFB5A37E5C167646A03AFF120155DA915F461FB8867E4DABAB11009DF6D865803777000B1975A5
1,490,661,639 UART: [art] SIG.S = BB19324FF9F71EFABD4E704E4A93E54B8CAFE45FA3C1140CFF42431DE539DAE044EF160C47BAC65A620E51381C71449D
1,490,685,389 UART: Caliptra RT
1,490,685,642 UART: [state] CFI Enabled
1,490,965,949 UART: [rt] RT listening for mailbox commands...
1,490,966,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,400,595 >>> mbox cmd response: success
1,493,413,739 UART:
1,493,413,755 UART: Running Caliptra FMC ...
1,493,414,163 UART:
1,493,414,217 UART: [state] CFI Enabled
1,493,503,062 UART: [art] Extend RT PCRs Done
1,493,503,490 UART: [art] Lock RT PCRs Done
1,493,504,799 UART: [art] Populate DV Done
1,493,513,010 UART: [fht] FMC Alias Private Key: 7
1,493,513,972 UART: [art] Derive CDI
1,493,514,252 UART: [art] Store in in slot 0x4
1,493,599,693 UART: [art] Derive Key Pair
1,493,600,053 UART: [art] Store priv key in slot 0x5
1,493,612,837 UART: [art] Derive Key Pair - Done
1,493,627,486 UART: [art] Signing Cert with AUTHO
1,493,627,966 UART: RITY.KEYID = 7
1,493,643,226 UART: [art] Erasing AUTHORITY.KEYID = 7
1,493,643,991 UART: [art] PUB.X = 5179868F60D63A18F449F684FD300BC7186D95122E7C0905EED4887DAB1C8B8351FD0F5BEE39320F2E922C2E1B3BE28C
1,493,650,752 UART: [art] PUB.Y = CCF1B453EDD8C9879EA99EA646EF850A71A68AD07AB7A802A8A3F91F04923F2B55525960A5897919D45E1FAD418B62DE
1,493,657,703 UART: [art] SIG.R = 33E8FCF033CB17BE404372B4E6F1DFCA204DB54D0C9ADC865FB0F03569BC6513239A918731EDF518B2DF93672043E04A
1,493,664,480 UART: [art] SIG.S = 13F446893866AEB2B19B2F61442DF0796841FD051C30C9B80BD0DA987E518D8701846A70A18ADEA508DAE1B30DCAEAA6
1,493,688,444 UART: Caliptra RT
1,493,688,697 UART: [state] CFI Enabled
1,493,967,560 UART: [rt] RT listening for mailbox commands...
1,493,968,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,402,967 >>> mbox cmd response: success
1,496,416,367 UART:
1,496,416,383 UART: Running Caliptra FMC ...
1,496,416,791 UART:
1,496,416,845 UART: [state] CFI Enabled
1,496,506,282 UART: [art] Extend RT PCRs Done
1,496,506,710 UART: [art] Lock RT PCRs Done
1,496,508,019 UART: [art] Populate DV Done
1,496,516,402 UART: [fht] FMC Alias Private Key: 7
1,496,517,378 UART: [art] Derive CDI
1,496,517,658 UART: [art] Store in in slot 0x4
1,496,603,531 UART: [art] Derive Key Pair
1,496,603,891 UART: [art] Store priv key in slot 0x5
1,496,616,455 UART: [art] Derive Key Pair - Done
1,496,630,764 UART: [art] Signing Cert with AUTHO
1,496,631,244 UART: RITY.KEYID = 7
1,496,646,070 UART: [art] Erasing AUTHORITY.KEYID = 7
1,496,646,835 UART: [art] PUB.X = 36A99AFABA27164D6AF12313B1C44D486C427B5A22C1D58F5DC9FCFB22C30514A5311CA099E614D3F62884A4A86276BE
1,496,653,610 UART: [art] PUB.Y = FED18D00B92216E5257203884D3EE29EC8C720B679B7A38A98B3D68C9AF95201F504B31411073E5B71FD8FD6766B83F2
1,496,660,526 UART: [art] SIG.R = 4B2C624B5F928C0099DFB5A37E5C167646A03AFF120155DA915F461FB8867E4DABAB11009DF6D865803777000B1975A5
1,496,667,224 UART: [art] SIG.S = BB19324FF9F71EFABD4E704E4A93E54B8CAFE45FA3C1140CFF42431DE539DAE044EF160C47BAC65A620E51381C71449D
1,496,690,920 UART: Caliptra RT
1,496,691,173 UART: [state] CFI Enabled
1,496,975,358 UART: [rt] RT listening for mailbox commands...
1,496,976,028 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,411,500 >>> mbox cmd response: success
1,499,424,774 UART:
1,499,424,790 UART: Running Caliptra FMC ...
1,499,425,198 UART:
1,499,425,252 UART: [state] CFI Enabled
1,499,514,407 UART: [art] Extend RT PCRs Done
1,499,514,835 UART: [art] Lock RT PCRs Done
1,499,516,302 UART: [art] Populate DV Done
1,499,524,597 UART: [fht] FMC Alias Private Key: 7
1,499,525,729 UART: [art] Derive CDI
1,499,526,009 UART: [art] Store in in slot 0x4
1,499,611,822 UART: [art] Derive Key Pair
1,499,612,182 UART: [art] Store priv key in slot 0x5
1,499,624,734 UART: [art] Derive Key Pair - Done
1,499,639,559 UART: [art] Signing Cert with AUTHO
1,499,640,039 UART: RITY.KEYID = 7
1,499,655,151 UART: [art] Erasing AUTHORITY.KEYID = 7
1,499,655,916 UART: [art] PUB.X = 5179868F60D63A18F449F684FD300BC7186D95122E7C0905EED4887DAB1C8B8351FD0F5BEE39320F2E922C2E1B3BE28C
1,499,662,677 UART: [art] PUB.Y = CCF1B453EDD8C9879EA99EA646EF850A71A68AD07AB7A802A8A3F91F04923F2B55525960A5897919D45E1FAD418B62DE
1,499,669,628 UART: [art] SIG.R = 33E8FCF033CB17BE404372B4E6F1DFCA204DB54D0C9ADC865FB0F03569BC6513239A918731EDF518B2DF93672043E04A
1,499,676,405 UART: [art] SIG.S = 13F446893866AEB2B19B2F61442DF0796841FD051C30C9B80BD0DA987E518D8701846A70A18ADEA508DAE1B30DCAEAA6
1,499,699,381 UART: Caliptra RT
1,499,699,634 UART: [state] CFI Enabled
1,499,984,763 UART: [rt] RT listening for mailbox commands...
1,499,985,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,502,420,698 >>> mbox cmd response: success
1,502,434,436 UART:
1,502,434,452 UART: Running Caliptra FMC ...
1,502,434,860 UART:
1,502,434,914 UART: [state] CFI Enabled
1,502,523,975 UART: [art] Extend RT PCRs Done
1,502,524,403 UART: [art] Lock RT PCRs Done
1,502,525,630 UART: [art] Populate DV Done
1,502,533,799 UART: [fht] FMC Alias Private Key: 7
1,502,534,733 UART: [art] Derive CDI
1,502,535,013 UART: [art] Store in in slot 0x4
1,502,620,762 UART: [art] Derive Key Pair
1,502,621,122 UART: [art] Store priv key in slot 0x5
1,502,634,340 UART: [art] Derive Key Pair - Done
1,502,649,385 UART: [art] Signing Cert with AUTHO
1,502,649,865 UART: RITY.KEYID = 7
1,502,664,729 UART: [art] Erasing AUTHORITY.KEYID = 7
1,502,665,494 UART: [art] PUB.X = 36A99AFABA27164D6AF12313B1C44D486C427B5A22C1D58F5DC9FCFB22C30514A5311CA099E614D3F62884A4A86276BE
1,502,672,269 UART: [art] PUB.Y = FED18D00B92216E5257203884D3EE29EC8C720B679B7A38A98B3D68C9AF95201F504B31411073E5B71FD8FD6766B83F2
1,502,679,185 UART: [art] SIG.R = 4B2C624B5F928C0099DFB5A37E5C167646A03AFF120155DA915F461FB8867E4DABAB11009DF6D865803777000B1975A5
1,502,685,883 UART: [art] SIG.S = BB19324FF9F71EFABD4E704E4A93E54B8CAFE45FA3C1140CFF42431DE539DAE044EF160C47BAC65A620E51381C71449D
1,502,709,771 UART: Caliptra RT
1,502,710,024 UART: [state] CFI Enabled
1,502,989,817 UART: [rt] RT listening for mailbox commands...
1,502,990,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,505,424,115 >>> mbox cmd response: success
1,505,437,299 UART:
1,505,437,315 UART: Running Caliptra FMC ...
1,505,437,723 UART:
1,505,437,777 UART: [state] CFI Enabled
1,505,526,714 UART: [art] Extend RT PCRs Done
1,505,527,142 UART: [art] Lock RT PCRs Done
1,505,528,577 UART: [art] Populate DV Done
1,505,536,770 UART: [fht] FMC Alias Private Key: 7
1,505,537,926 UART: [art] Derive CDI
1,505,538,206 UART: [art] Store in in slot 0x4
1,505,624,115 UART: [art] Derive Key Pair
1,505,624,475 UART: [art] Store priv key in slot 0x5
1,505,637,823 UART: [art] Derive Key Pair - Done
1,505,652,818 UART: [art] Signing Cert with AUTHO
1,505,653,298 UART: RITY.KEYID = 7
1,505,668,428 UART: [art] Erasing AUTHORITY.KEYID = 7
1,505,669,193 UART: [art] PUB.X = 5179868F60D63A18F449F684FD300BC7186D95122E7C0905EED4887DAB1C8B8351FD0F5BEE39320F2E922C2E1B3BE28C
1,505,675,954 UART: [art] PUB.Y = CCF1B453EDD8C9879EA99EA646EF850A71A68AD07AB7A802A8A3F91F04923F2B55525960A5897919D45E1FAD418B62DE
1,505,682,905 UART: [art] SIG.R = 33E8FCF033CB17BE404372B4E6F1DFCA204DB54D0C9ADC865FB0F03569BC6513239A918731EDF518B2DF93672043E04A
1,505,689,682 UART: [art] SIG.S = 13F446893866AEB2B19B2F61442DF0796841FD051C30C9B80BD0DA987E518D8701846A70A18ADEA508DAE1B30DCAEAA6
1,505,713,506 UART: Caliptra RT
1,505,713,759 UART: [state] CFI Enabled
1,505,993,972 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 307.39s
Truncated 1339589 bytes from beginning
[art] Populate DV Done
1,553,553,853 UART: [fht] FMC Alias Private Key: 7
1,553,554,967 UART: [art] Derive CDI
1,553,555,247 UART: [art] Store in in slot 0x4
1,553,641,238 UART: [art] Derive Key Pair
1,553,641,598 UART: [art] Store priv key in slot 0x5
1,553,654,556 UART: [art] Derive Key Pair - Done
1,553,669,560 UART: [art] Signing Cert with AUTHO
1,553,670,040 UART: RITY.KEYID = 7
1,553,685,216 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,685,981 UART: [art] PUB.X = 12255C45F12A9711D67034079E3A311A953D4035E5DC1013EF1B25BE7A53788A0A521C47ABB3142C6FCA26EDE9999617
1,553,692,743 UART: [art] PUB.Y = C65AE5C7F2FAC4D28BC58CBD7072203B5B9CB3CF19B18617EFD2568FD4E23C8B54F41541EF8B8A35379CBF7BB4298842
1,553,699,709 UART: [art] SIG.R = 63D5B7D8ED7A1DF413CEFE89A1948673BB0DCAA46CBA8649B40D4B10534D1BD55DFB8F492490AE724B82D47B0732E3B2
1,553,706,486 UART: [art] SIG.S = 99AC5EBDF5300B608242DC5AE4F7D39D5F8209E3160F5A0D338DAF19B0BF5CEFC37CFF36E990D3F2A70AA5FF7D263573
1,553,730,128 UART: Caliptra RT
1,553,730,473 UART: [state] CFI Enabled
1,554,012,074 UART: [rt] RT listening for mailbox commands...
1,554,012,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,013,791 UART:
1,554,013,807 UART: Running Caliptra ROM ...
1,554,014,215 UART:
1,554,014,357 UART: [state] CFI Enabled
1,554,016,983 UART: [state] LifecycleState = Unprovisioned
1,554,017,638 UART: [state] DebugLocked = No
1,554,018,300 UART: [state] WD Timer not started. Device not locked for debugging
1,554,019,584 UART: [kat] SHA2-256
1,554,825,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,554,829,359 UART: [kat] ++
1,554,829,511 UART: [kat] sha1
1,554,833,833 UART: [kat] SHA2-256
1,554,835,773 UART: [kat] SHA2-384
1,554,838,580 UART: [kat] SHA2-512-ACC
1,554,840,480 UART: [kat] ECC-384
1,554,849,991 UART: [kat] HMAC-384Kdf
1,554,854,425 UART: [kat] LMS
1,555,102,753 UART: [kat] --
1,555,103,427 UART: [update-reset] ++
1,556,413,069 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,414,264 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,556,563,716 >>> mbox cmd response: success
1,556,563,915 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,571,929 UART: [update-reset Success] --
1,556,572,848 UART: [state] Locking Datavault
1,556,573,588 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,574,192 UART: [state] Locking ICCM
1,556,574,704 UART: [exit] Launching FMC @ 0x40000130
1,556,580,033 UART:
1,556,580,049 UART: Running Caliptra FMC ...
1,556,580,457 UART:
1,556,580,600 UART: [state] CFI Enabled
1,556,669,927 UART: [art] Extend RT PCRs Done
1,556,670,355 UART: [art] Lock RT PCRs Done
1,556,671,690 UART: [art] Populate DV Done
1,556,679,849 UART: [fht] FMC Alias Private Key: 7
1,556,680,869 UART: [art] Derive CDI
1,556,681,149 UART: [art] Store in in slot 0x4
1,556,766,382 UART: [art] Derive Key Pair
1,556,766,742 UART: [art] Store priv key in slot 0x5
1,556,779,654 UART: [art] Derive Key Pair - Done
1,556,794,523 UART: [art] Signing Cert with AUTHO
1,556,795,003 UART: RITY.KEYID = 7
1,556,810,423 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,811,188 UART: [art] PUB.X = 065D8B9CB2CEA247F4628ED1ABC5991CE47898CE707B2DAEF7E0CA92BB6B08A001E464A42282EF74FCF7F55EEA17175C
1,556,817,969 UART: [art] PUB.Y = A43633B42F041046707B51E58CF9AAFFEA811E4379879BF985E86CF311831D0E3A35946FB1AEC2402C5E9537A872782B
1,556,824,913 UART: [art] SIG.R = B9601D7518FD8A682FE397DF8F74A2137BC94C6B3188E229D57BEE243084F2A59CE3C4B8D19B939B3C1D0F05BC8DFE72
1,556,831,689 UART: [art] SIG.S = 383848C4DC8023A8D9474BEFCD00095D9CDC7BBF1579AB5755AE389D25D7AD1ED16E4936B991648C79086C6A276762A7
1,556,855,310 UART: Caliptra RT
1,556,855,655 UART: [state] CFI Enabled
1,557,141,892 UART: [rt] RT listening for mailbox commands...
1,557,142,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,143,691 UART:
1,557,143,707 UART: Running Caliptra ROM ...
1,557,144,115 UART:
1,557,144,257 UART: [state] CFI Enabled
1,557,147,345 UART: [state] LifecycleState = Unprovisioned
1,557,148,000 UART: [state] DebugLocked = No
1,557,148,612 UART: [state] WD Timer not started. Device not locked for debugging
1,557,149,800 UART: [kat] SHA2-256
1,557,955,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,557,959,575 UART: [kat] ++
1,557,959,727 UART: [kat] sha1
1,557,963,779 UART: [kat] SHA2-256
1,557,965,719 UART: [kat] SHA2-384
1,557,968,276 UART: [kat] SHA2-512-ACC
1,557,970,176 UART: [kat] ECC-384
1,557,979,689 UART: [kat] HMAC-384Kdf
1,557,984,271 UART: [kat] LMS
1,558,232,599 UART: [kat] --
1,558,233,207 UART: [update-reset] ++
1,559,542,141 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,543,236 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,559,692,688 >>> mbox cmd response: success
1,559,693,019 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,701,033 UART: [update-reset Success] --
1,559,702,084 UART: [state] Locking Datavault
1,559,702,918 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,703,522 UART: [state] Locking ICCM
1,559,703,986 UART: [exit] Launching FMC @ 0x40000130
1,559,709,315 UART:
1,559,709,331 UART: Running Caliptra FMC ...
1,559,709,739 UART:
1,559,709,882 UART: [state] CFI Enabled
1,559,798,907 UART: [art] Extend RT PCRs Done
1,559,799,335 UART: [art] Lock RT PCRs Done
1,559,800,788 UART: [art] Populate DV Done
1,559,808,977 UART: [fht] FMC Alias Private Key: 7
1,559,809,943 UART: [art] Derive CDI
1,559,810,223 UART: [art] Store in in slot 0x4
1,559,895,854 UART: [art] Derive Key Pair
1,559,896,214 UART: [art] Store priv key in slot 0x5
1,559,909,186 UART: [art] Derive Key Pair - Done
1,559,923,784 UART: [art] Signing Cert with AUTHO
1,559,924,264 UART: RITY.KEYID = 7
1,559,939,226 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,939,991 UART: [art] PUB.X = 12255C45F12A9711D67034079E3A311A953D4035E5DC1013EF1B25BE7A53788A0A521C47ABB3142C6FCA26EDE9999617
1,559,946,753 UART: [art] PUB.Y = C65AE5C7F2FAC4D28BC58CBD7072203B5B9CB3CF19B18617EFD2568FD4E23C8B54F41541EF8B8A35379CBF7BB4298842
1,559,953,719 UART: [art] SIG.R = 63D5B7D8ED7A1DF413CEFE89A1948673BB0DCAA46CBA8649B40D4B10534D1BD55DFB8F492490AE724B82D47B0732E3B2
1,559,960,496 UART: [art] SIG.S = 99AC5EBDF5300B608242DC5AE4F7D39D5F8209E3160F5A0D338DAF19B0BF5CEFC37CFF36E990D3F2A70AA5FF7D263573
1,559,984,410 UART: Caliptra RT
1,559,984,755 UART: [state] CFI Enabled
1,560,266,744 UART: [rt] RT listening for mailbox commands...
1,560,267,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,268,629 UART:
1,560,268,645 UART: Running Caliptra ROM ...
1,560,269,053 UART:
1,560,269,195 UART: [state] CFI Enabled
1,560,271,691 UART: [state] LifecycleState = Unprovisioned
1,560,272,346 UART: [state] DebugLocked = No
1,560,273,082 UART: [state] WD Timer not started. Device not locked for debugging
1,560,274,400 UART: [kat] SHA2-256
1,561,080,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,561,084,175 UART: [kat] ++
1,561,084,327 UART: [kat] sha1
1,561,088,547 UART: [kat] SHA2-256
1,561,090,487 UART: [kat] SHA2-384
1,561,093,100 UART: [kat] SHA2-512-ACC
1,561,095,000 UART: [kat] ECC-384
1,561,104,731 UART: [kat] HMAC-384Kdf
1,561,109,335 UART: [kat] LMS
1,561,357,663 UART: [kat] --
1,561,358,521 UART: [update-reset] ++
1,562,668,869 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,669,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,562,819,394 >>> mbox cmd response: success
1,562,819,571 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,827,585 UART: [update-reset Success] --
1,562,828,670 UART: [state] Locking Datavault
1,562,829,458 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,830,062 UART: [state] Locking ICCM
1,562,830,502 UART: [exit] Launching FMC @ 0x40000130
1,562,835,831 UART:
1,562,835,847 UART: Running Caliptra FMC ...
1,562,836,255 UART:
1,562,836,398 UART: [state] CFI Enabled
1,562,925,861 UART: [art] Extend RT PCRs Done
1,562,926,289 UART: [art] Lock RT PCRs Done
1,562,927,578 UART: [art] Populate DV Done
1,562,935,687 UART: [fht] FMC Alias Private Key: 7
1,562,936,655 UART: [art] Derive CDI
1,562,936,935 UART: [art] Store in in slot 0x4
1,563,022,468 UART: [art] Derive Key Pair
1,563,022,828 UART: [art] Store priv key in slot 0x5
1,563,035,720 UART: [art] Derive Key Pair - Done
1,563,050,185 UART: [art] Signing Cert with AUTHO
1,563,050,665 UART: RITY.KEYID = 7
1,563,065,443 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,066,208 UART: [art] PUB.X = 065D8B9CB2CEA247F4628ED1ABC5991CE47898CE707B2DAEF7E0CA92BB6B08A001E464A42282EF74FCF7F55EEA17175C
1,563,072,989 UART: [art] PUB.Y = A43633B42F041046707B51E58CF9AAFFEA811E4379879BF985E86CF311831D0E3A35946FB1AEC2402C5E9537A872782B
1,563,079,933 UART: [art] SIG.R = B9601D7518FD8A682FE397DF8F74A2137BC94C6B3188E229D57BEE243084F2A59CE3C4B8D19B939B3C1D0F05BC8DFE72
1,563,086,709 UART: [art] SIG.S = 383848C4DC8023A8D9474BEFCD00095D9CDC7BBF1579AB5755AE389D25D7AD1ED16E4936B991648C79086C6A276762A7
1,563,110,562 UART: Caliptra RT
1,563,110,907 UART: [state] CFI Enabled
1,563,391,630 UART: [rt] RT listening for mailbox commands...
1,563,392,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,393,339 UART:
1,563,393,355 UART: Running Caliptra ROM ...
1,563,393,763 UART:
1,563,393,905 UART: [state] CFI Enabled
1,563,396,235 UART: [state] LifecycleState = Unprovisioned
1,563,396,890 UART: [state] DebugLocked = No
1,563,397,410 UART: [state] WD Timer not started. Device not locked for debugging
1,563,398,692 UART: [kat] SHA2-256
1,564,204,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,564,208,467 UART: [kat] ++
1,564,208,619 UART: [kat] sha1
1,564,212,981 UART: [kat] SHA2-256
1,564,214,921 UART: [kat] SHA2-384
1,564,217,622 UART: [kat] SHA2-512-ACC
1,564,219,522 UART: [kat] ECC-384
1,564,229,009 UART: [kat] HMAC-384Kdf
1,564,233,587 UART: [kat] LMS
1,564,481,915 UART: [kat] --
1,564,482,551 UART: [update-reset] ++
1,565,792,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,793,572 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,565,943,024 >>> mbox cmd response: success
1,565,943,171 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,951,185 UART: [update-reset Success] --
1,565,951,954 UART: [state] Locking Datavault
1,565,952,810 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,953,414 UART: [state] Locking ICCM
1,565,953,874 UART: [exit] Launching FMC @ 0x40000130
1,565,959,203 UART:
1,565,959,219 UART: Running Caliptra FMC ...
1,565,959,627 UART:
1,565,959,770 UART: [state] CFI Enabled
1,566,048,809 UART: [art] Extend RT PCRs Done
1,566,049,237 UART: [art] Lock RT PCRs Done
1,566,050,414 UART: [art] Populate DV Done
1,566,058,507 UART: [fht] FMC Alias Private Key: 7
1,566,059,555 UART: [art] Derive CDI
1,566,059,835 UART: [art] Store in in slot 0x4
1,566,145,764 UART: [art] Derive Key Pair
1,566,146,124 UART: [art] Store priv key in slot 0x5
1,566,159,786 UART: [art] Derive Key Pair - Done
1,566,174,652 UART: [art] Signing Cert with AUTHO
1,566,175,132 UART: RITY.KEYID = 7
1,566,190,106 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,190,871 UART: [art] PUB.X = 12255C45F12A9711D67034079E3A311A953D4035E5DC1013EF1B25BE7A53788A0A521C47ABB3142C6FCA26EDE9999617
1,566,197,633 UART: [art] PUB.Y = C65AE5C7F2FAC4D28BC58CBD7072203B5B9CB3CF19B18617EFD2568FD4E23C8B54F41541EF8B8A35379CBF7BB4298842
1,566,204,599 UART: [art] SIG.R = 63D5B7D8ED7A1DF413CEFE89A1948673BB0DCAA46CBA8649B40D4B10534D1BD55DFB8F492490AE724B82D47B0732E3B2
1,566,211,376 UART: [art] SIG.S = 99AC5EBDF5300B608242DC5AE4F7D39D5F8209E3160F5A0D338DAF19B0BF5CEFC37CFF36E990D3F2A70AA5FF7D263573
1,566,236,128 UART: Caliptra RT
1,566,236,473 UART: [state] CFI Enabled
1,566,519,922 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 327.02s
Truncated 733352 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,484,961,730 >>> mbox cmd response: success
1,484,974,944 UART:
1,484,974,960 UART: Running Caliptra FMC ...
1,484,975,368 UART:
1,484,975,511 UART: [state] CFI Enabled
1,485,064,860 UART: [art] Extend RT PCRs Done
1,485,065,288 UART: [art] Lock RT PCRs Done
1,485,066,709 UART: [art] Populate DV Done
1,485,074,788 UART: [fht] FMC Alias Private Key: 7
1,485,075,764 UART: [art] Derive CDI
1,485,076,044 UART: [art] Store in in slot 0x4
1,485,161,679 UART: [art] Derive Key Pair
1,485,162,039 UART: [art] Store priv key in slot 0x5
1,485,174,675 UART: [art] Derive Key Pair - Done
1,485,189,455 UART: [art] Signing Cert with AUTHO
1,485,189,935 UART: RITY.KEYID = 7
1,485,204,897 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,205,662 UART: [art] PUB.X = 5321C14827FEB810953BAFE94EDC5D2B937EAE0481AD5ABC7A3888C4678E27CFEAE8270F1D11576100B3A25DD467A670
1,485,212,414 UART: [art] PUB.Y = EE1DADA62C708585240C96F42BCB54ADFABA3121D492DD3FE1BA0ADE74A17DB91BC4AABFC66530EECE94B736E189FBF0
1,485,219,390 UART: [art] SIG.R = 99CCD2E64EF9649AEFDC89A0836C8EE7BFC82A87F109F23140AF5C2E32362776CE8DF06D0B811396A6719D6A06B5C595
1,485,226,161 UART: [art] SIG.S = D0402AEBA99D74A4B1628DE769EF10F4DA659AAF7E4AE1F3E0D7F54408A8885F5C35F21446CD3A5E1BEBC0425FF77DF0
1,485,250,507 UART: Caliptra RT
1,485,250,852 UART: [state] CFI Enabled
1,485,531,418 UART: [rt] RT listening for mailbox commands...
1,485,532,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,487,966,769 >>> mbox cmd response: success
1,487,980,099 UART:
1,487,980,115 UART: Running Caliptra FMC ...
1,487,980,523 UART:
1,487,980,666 UART: [state] CFI Enabled
1,488,069,709 UART: [art] Extend RT PCRs Done
1,488,070,137 UART: [art] Lock RT PCRs Done
1,488,071,480 UART: [art] Populate DV Done
1,488,079,473 UART: [fht] FMC Alias Private Key: 7
1,488,080,475 UART: [art] Derive CDI
1,488,080,755 UART: [art] Store in in slot 0x4
1,488,166,258 UART: [art] Derive Key Pair
1,488,166,618 UART: [art] Store priv key in slot 0x5
1,488,180,026 UART: [art] Derive Key Pair - Done
1,488,194,792 UART: [art] Signing Cert with AUTHO
1,488,195,272 UART: RITY.KEYID = 7
1,488,210,022 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,210,787 UART: [art] PUB.X = 2D22E0BC70C392CF42FDC0ABCE44323BF501C83B660DF2D23955F53D163F1A8F9F0315AD788183AF19EF8CC8B5D90BA3
1,488,217,561 UART: [art] PUB.Y = 06B1894CC4E09832F97BF65A10EA1E80743408EC86D1A2F86C2B16C6BE049180E465F0A077806994C170B3327450B297
1,488,224,494 UART: [art] SIG.R = 4C758B492006BE05E2C62D4966DAEFB5F31C1620E9A766CA97195E61FA075A318FE7D2F446B06B9253E631A9BD6C11D5
1,488,231,261 UART: [art] SIG.S = 0FF6340F3CF06482190094D694561A1EE2FFBE46BD3280078F49F5E0F51DAE9FC14613B07014F8F4592B776B23C8E637
1,488,255,343 UART: Caliptra RT
1,488,255,688 UART: [state] CFI Enabled
1,488,536,487 UART: [rt] RT listening for mailbox commands...
1,488,537,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,490,974,528 >>> mbox cmd response: success
1,490,988,176 UART:
1,490,988,192 UART: Running Caliptra FMC ...
1,490,988,600 UART:
1,490,988,743 UART: [state] CFI Enabled
1,491,078,224 UART: [art] Extend RT PCRs Done
1,491,078,652 UART: [art] Lock RT PCRs Done
1,491,079,889 UART: [art] Populate DV Done
1,491,088,132 UART: [fht] FMC Alias Private Key: 7
1,491,089,252 UART: [art] Derive CDI
1,491,089,532 UART: [art] Store in in slot 0x4
1,491,174,915 UART: [art] Derive Key Pair
1,491,175,275 UART: [art] Store priv key in slot 0x5
1,491,188,683 UART: [art] Derive Key Pair - Done
1,491,203,565 UART: [art] Signing Cert with AUTHO
1,491,204,045 UART: RITY.KEYID = 7
1,491,219,533 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,220,298 UART: [art] PUB.X = 5321C14827FEB810953BAFE94EDC5D2B937EAE0481AD5ABC7A3888C4678E27CFEAE8270F1D11576100B3A25DD467A670
1,491,227,050 UART: [art] PUB.Y = EE1DADA62C708585240C96F42BCB54ADFABA3121D492DD3FE1BA0ADE74A17DB91BC4AABFC66530EECE94B736E189FBF0
1,491,234,026 UART: [art] SIG.R = 99CCD2E64EF9649AEFDC89A0836C8EE7BFC82A87F109F23140AF5C2E32362776CE8DF06D0B811396A6719D6A06B5C595
1,491,240,797 UART: [art] SIG.S = D0402AEBA99D74A4B1628DE769EF10F4DA659AAF7E4AE1F3E0D7F54408A8885F5C35F21446CD3A5E1BEBC0425FF77DF0
1,491,264,705 UART: Caliptra RT
1,491,265,050 UART: [state] CFI Enabled
1,491,543,214 UART: [rt] RT listening for mailbox commands...
1,491,543,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,493,978,161 >>> mbox cmd response: success
1,493,991,519 UART:
1,493,991,535 UART: Running Caliptra FMC ...
1,493,991,943 UART:
1,493,992,086 UART: [state] CFI Enabled
1,494,081,325 UART: [art] Extend RT PCRs Done
1,494,081,753 UART: [art] Lock RT PCRs Done
1,494,083,082 UART: [art] Populate DV Done
1,494,091,313 UART: [fht] FMC Alias Private Key: 7
1,494,092,267 UART: [art] Derive CDI
1,494,092,547 UART: [art] Store in in slot 0x4
1,494,177,756 UART: [art] Derive Key Pair
1,494,178,116 UART: [art] Store priv key in slot 0x5
1,494,191,620 UART: [art] Derive Key Pair - Done
1,494,206,536 UART: [art] Signing Cert with AUTHO
1,494,207,016 UART: RITY.KEYID = 7
1,494,222,088 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,222,853 UART: [art] PUB.X = 2D22E0BC70C392CF42FDC0ABCE44323BF501C83B660DF2D23955F53D163F1A8F9F0315AD788183AF19EF8CC8B5D90BA3
1,494,229,627 UART: [art] PUB.Y = 06B1894CC4E09832F97BF65A10EA1E80743408EC86D1A2F86C2B16C6BE049180E465F0A077806994C170B3327450B297
1,494,236,560 UART: [art] SIG.R = 4C758B492006BE05E2C62D4966DAEFB5F31C1620E9A766CA97195E61FA075A318FE7D2F446B06B9253E631A9BD6C11D5
1,494,243,327 UART: [art] SIG.S = 0FF6340F3CF06482190094D694561A1EE2FFBE46BD3280078F49F5E0F51DAE9FC14613B07014F8F4592B776B23C8E637
1,494,267,147 UART: Caliptra RT
1,494,267,492 UART: [state] CFI Enabled
1,494,552,995 UART: [rt] RT listening for mailbox commands...
1,494,553,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,496,988,364 >>> mbox cmd response: success
1,497,001,722 UART:
1,497,001,738 UART: Running Caliptra FMC ...
1,497,002,146 UART:
1,497,002,289 UART: [state] CFI Enabled
1,497,091,592 UART: [art] Extend RT PCRs Done
1,497,092,020 UART: [art] Lock RT PCRs Done
1,497,093,059 UART: [art] Populate DV Done
1,497,101,350 UART: [fht] FMC Alias Private Key: 7
1,497,102,426 UART: [art] Derive CDI
1,497,102,706 UART: [art] Store in in slot 0x4
1,497,188,505 UART: [art] Derive Key Pair
1,497,188,865 UART: [art] Store priv key in slot 0x5
1,497,201,715 UART: [art] Derive Key Pair - Done
1,497,216,677 UART: [art] Signing Cert with AUTHO
1,497,217,157 UART: RITY.KEYID = 7
1,497,232,419 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,233,184 UART: [art] PUB.X = 5321C14827FEB810953BAFE94EDC5D2B937EAE0481AD5ABC7A3888C4678E27CFEAE8270F1D11576100B3A25DD467A670
1,497,239,936 UART: [art] PUB.Y = EE1DADA62C708585240C96F42BCB54ADFABA3121D492DD3FE1BA0ADE74A17DB91BC4AABFC66530EECE94B736E189FBF0
1,497,246,912 UART: [art] SIG.R = 99CCD2E64EF9649AEFDC89A0836C8EE7BFC82A87F109F23140AF5C2E32362776CE8DF06D0B811396A6719D6A06B5C595
1,497,253,683 UART: [art] SIG.S = D0402AEBA99D74A4B1628DE769EF10F4DA659AAF7E4AE1F3E0D7F54408A8885F5C35F21446CD3A5E1BEBC0425FF77DF0
1,497,277,699 UART: Caliptra RT
1,497,278,044 UART: [state] CFI Enabled
1,497,559,102 UART: [rt] RT listening for mailbox commands...
1,497,559,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,499,996,565 >>> mbox cmd response: success
1,500,009,563 UART:
1,500,009,579 UART: Running Caliptra FMC ...
1,500,009,987 UART:
1,500,010,130 UART: [state] CFI Enabled
1,500,098,643 UART: [art] Extend RT PCRs Done
1,500,099,071 UART: [art] Lock RT PCRs Done
1,500,100,432 UART: [art] Populate DV Done
1,500,108,855 UART: [fht] FMC Alias Private Key: 7
1,500,109,825 UART: [art] Derive CDI
1,500,110,105 UART: [art] Store in in slot 0x4
1,500,195,988 UART: [art] Derive Key Pair
1,500,196,348 UART: [art] Store priv key in slot 0x5
1,500,209,390 UART: [art] Derive Key Pair - Done
1,500,224,024 UART: [art] Signing Cert with AUTHO
1,500,224,504 UART: RITY.KEYID = 7
1,500,239,796 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,240,561 UART: [art] PUB.X = 2D22E0BC70C392CF42FDC0ABCE44323BF501C83B660DF2D23955F53D163F1A8F9F0315AD788183AF19EF8CC8B5D90BA3
1,500,247,335 UART: [art] PUB.Y = 06B1894CC4E09832F97BF65A10EA1E80743408EC86D1A2F86C2B16C6BE049180E465F0A077806994C170B3327450B297
1,500,254,268 UART: [art] SIG.R = 4C758B492006BE05E2C62D4966DAEFB5F31C1620E9A766CA97195E61FA075A318FE7D2F446B06B9253E631A9BD6C11D5
1,500,261,035 UART: [art] SIG.S = 0FF6340F3CF06482190094D694561A1EE2FFBE46BD3280078F49F5E0F51DAE9FC14613B07014F8F4592B776B23C8E637
1,500,285,033 UART: Caliptra RT
1,500,285,378 UART: [state] CFI Enabled
1,500,572,883 UART: [rt] RT listening for mailbox commands...
1,500,573,553 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,007,942 >>> mbox cmd response: success
1,503,021,126 UART:
1,503,021,142 UART: Running Caliptra FMC ...
1,503,021,550 UART:
1,503,021,693 UART: [state] CFI Enabled
1,503,111,556 UART: [art] Extend RT PCRs Done
1,503,111,984 UART: [art] Lock RT PCRs Done
1,503,113,115 UART: [art] Populate DV Done
1,503,121,210 UART: [fht] FMC Alias Private Key: 7
1,503,122,340 UART: [art] Derive CDI
1,503,122,620 UART: [art] Store in in slot 0x4
1,503,208,541 UART: [art] Derive Key Pair
1,503,208,901 UART: [art] Store priv key in slot 0x5
1,503,222,349 UART: [art] Derive Key Pair - Done
1,503,237,297 UART: [art] Signing Cert with AUTHO
1,503,237,777 UART: RITY.KEYID = 7
1,503,252,949 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,253,714 UART: [art] PUB.X = 5321C14827FEB810953BAFE94EDC5D2B937EAE0481AD5ABC7A3888C4678E27CFEAE8270F1D11576100B3A25DD467A670
1,503,260,466 UART: [art] PUB.Y = EE1DADA62C708585240C96F42BCB54ADFABA3121D492DD3FE1BA0ADE74A17DB91BC4AABFC66530EECE94B736E189FBF0
1,503,267,442 UART: [art] SIG.R = 99CCD2E64EF9649AEFDC89A0836C8EE7BFC82A87F109F23140AF5C2E32362776CE8DF06D0B811396A6719D6A06B5C595
1,503,274,213 UART: [art] SIG.S = D0402AEBA99D74A4B1628DE769EF10F4DA659AAF7E4AE1F3E0D7F54408A8885F5C35F21446CD3A5E1BEBC0425FF77DF0
1,503,297,921 UART: Caliptra RT
1,503,298,266 UART: [state] CFI Enabled
1,503,577,478 UART: [rt] RT listening for mailbox commands...
1,503,578,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,506,012,453 >>> mbox cmd response: success
1,506,025,753 UART:
1,506,025,769 UART: Running Caliptra FMC ...
1,506,026,177 UART:
1,506,026,320 UART: [state] CFI Enabled
1,506,115,331 UART: [art] Extend RT PCRs Done
1,506,115,759 UART: [art] Lock RT PCRs Done
1,506,116,786 UART: [art] Populate DV Done
1,506,125,095 UART: [fht] FMC Alias Private Key: 7
1,506,126,177 UART: [art] Derive CDI
1,506,126,457 UART: [art] Store in in slot 0x4
1,506,212,190 UART: [art] Derive Key Pair
1,506,212,550 UART: [art] Store priv key in slot 0x5
1,506,225,612 UART: [art] Derive Key Pair - Done
1,506,240,150 UART: [art] Signing Cert with AUTHO
1,506,240,630 UART: RITY.KEYID = 7
1,506,255,830 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,256,595 UART: [art] PUB.X = 2D22E0BC70C392CF42FDC0ABCE44323BF501C83B660DF2D23955F53D163F1A8F9F0315AD788183AF19EF8CC8B5D90BA3
1,506,263,369 UART: [art] PUB.Y = 06B1894CC4E09832F97BF65A10EA1E80743408EC86D1A2F86C2B16C6BE049180E465F0A077806994C170B3327450B297
1,506,270,302 UART: [art] SIG.R = 4C758B492006BE05E2C62D4966DAEFB5F31C1620E9A766CA97195E61FA075A318FE7D2F446B06B9253E631A9BD6C11D5
1,506,277,069 UART: [art] SIG.S = 0FF6340F3CF06482190094D694561A1EE2FFBE46BD3280078F49F5E0F51DAE9FC14613B07014F8F4592B776B23C8E637
1,506,300,863 UART: Caliptra RT
1,506,301,208 UART: [state] CFI Enabled
1,506,584,227 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 314.75s
Truncated 1339511 bytes from beginning
[art] Populate DV Done
1,551,849,703 UART: [fht] FMC Alias Private Key: 7
1,551,850,669 UART: [art] Derive CDI
1,551,850,949 UART: [art] Store in in slot 0x4
1,551,936,620 UART: [art] Derive Key Pair
1,551,936,980 UART: [art] Store priv key in slot 0x5
1,551,949,946 UART: [art] Derive Key Pair - Done
1,551,964,859 UART: [art] Signing Cert with AUTHO
1,551,965,339 UART: RITY.KEYID = 7
1,551,980,555 UART: [art] Erasing AUTHORITY.KEYID = 7
1,551,981,320 UART: [art] PUB.X = 2A279461419E2F2DC16598ECF564A92485AAFF5CCD44AE98E22787E2524CB09592E12E257CF0D18F4A72CAE6A3CD6633
1,551,988,098 UART: [art] PUB.Y = 1328FD2AB19DC22D8D5891800A1C1589AAD574AC86A3EF8D6A8E57673855BAB77E21ED060DF265E5D07DC9662010B38F
1,551,995,047 UART: [art] SIG.R = E35B0AB782DF67187ABE5F9EA062FB5607BA8333DF0B2FC0B4E662EA695965C5103B3EDF20F5E7DEB2425D4718B5EDE2
1,552,001,826 UART: [art] SIG.S = 04146B2DB9A8E540D7DCF1772FA2E5ECA299F3FD9570BA64EF597903D3EB20FFEA554D82914479B9E1A1F8DB3A83561A
1,552,025,679 UART: Caliptra RT
1,552,025,932 UART: [state] CFI Enabled
1,552,312,343 UART: [rt] RT listening for mailbox commands...
1,552,313,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,552,314,116 UART:
1,552,314,132 UART: Running Caliptra ROM ...
1,552,314,540 UART:
1,552,314,595 UART: [state] CFI Enabled
1,552,317,331 UART: [state] LifecycleState = Unprovisioned
1,552,317,986 UART: [state] DebugLocked = No
1,552,318,662 UART: [state] WD Timer not started. Device not locked for debugging
1,552,319,898 UART: [kat] SHA2-256
1,553,123,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,553,127,577 UART: [kat] ++
1,553,127,729 UART: [kat] sha1
1,553,131,905 UART: [kat] SHA2-256
1,553,133,845 UART: [kat] SHA2-384
1,553,136,592 UART: [kat] SHA2-512-ACC
1,553,138,492 UART: [kat] ECC-384
1,553,148,421 UART: [kat] HMAC-384Kdf
1,553,153,155 UART: [kat] LMS
1,553,401,467 UART: [kat] --
1,553,402,361 UART: [update-reset] ++
1,554,711,160 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,554,712,207 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,554,861,659 >>> mbox cmd response: success
1,554,861,898 UART: [update-reset] Copying MAN_2 To MAN_1
1,554,869,912 UART: [update-reset Success] --
1,554,871,181 UART: [state] Locking Datavault
1,554,871,901 UART: [state] Locking PCR0, PCR1 and PCR31
1,554,872,505 UART: [state] Locking ICCM
1,554,872,989 UART: [exit] Launching FMC @ 0x40000130
1,554,878,318 UART:
1,554,878,334 UART: Running Caliptra FMC ...
1,554,878,742 UART:
1,554,878,796 UART: [state] CFI Enabled
1,554,967,971 UART: [art] Extend RT PCRs Done
1,554,968,399 UART: [art] Lock RT PCRs Done
1,554,969,592 UART: [art] Populate DV Done
1,554,977,599 UART: [fht] FMC Alias Private Key: 7
1,554,978,739 UART: [art] Derive CDI
1,554,979,019 UART: [art] Store in in slot 0x4
1,555,064,496 UART: [art] Derive Key Pair
1,555,064,856 UART: [art] Store priv key in slot 0x5
1,555,077,716 UART: [art] Derive Key Pair - Done
1,555,092,626 UART: [art] Signing Cert with AUTHO
1,555,093,106 UART: RITY.KEYID = 7
1,555,108,542 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,109,307 UART: [art] PUB.X = E58010FC183C3572ED1E95EFA77E4560A109C0FC8E927A70D7F7011C08803C6DC91C1DE085B8FA662F46A7928144553E
1,555,116,070 UART: [art] PUB.Y = 9CFE7887BB682B857FFF809CCB675AB69356D85BA300491B9133121673264BC5235FE9E44C21C58992237D2273066A8E
1,555,122,989 UART: [art] SIG.R = 63A9945048F6338B4F36EB3165AD3397ABC1EBB81F2CF7DBD948D2B03950534BE3E984B092AFEF977E491DAAD53844EE
1,555,129,771 UART: [art] SIG.S = 75DA52BD6A889FA01D59A2D9DA8F060D33E247EF8AE227D6394EBD8270FBCC60A612FD9B4A81A6DC0530D77418B95A1D
1,555,153,241 UART: Caliptra RT
1,555,153,494 UART: [state] CFI Enabled
1,555,435,975 UART: [rt] RT listening for mailbox commands...
1,555,436,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,555,437,600 UART:
1,555,437,616 UART: Running Caliptra ROM ...
1,555,438,024 UART:
1,555,438,079 UART: [state] CFI Enabled
1,555,440,649 UART: [state] LifecycleState = Unprovisioned
1,555,441,304 UART: [state] DebugLocked = No
1,555,441,824 UART: [state] WD Timer not started. Device not locked for debugging
1,555,442,984 UART: [kat] SHA2-256
1,556,246,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,556,250,663 UART: [kat] ++
1,556,250,815 UART: [kat] sha1
1,556,254,983 UART: [kat] SHA2-256
1,556,256,923 UART: [kat] SHA2-384
1,556,259,608 UART: [kat] SHA2-512-ACC
1,556,261,508 UART: [kat] ECC-384
1,556,271,497 UART: [kat] HMAC-384Kdf
1,556,276,255 UART: [kat] LMS
1,556,524,567 UART: [kat] --
1,556,525,445 UART: [update-reset] ++
1,557,834,866 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,835,825 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,557,985,277 >>> mbox cmd response: success
1,557,985,438 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,993,452 UART: [update-reset Success] --
1,557,994,377 UART: [state] Locking Datavault
1,557,995,197 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,995,801 UART: [state] Locking ICCM
1,557,996,255 UART: [exit] Launching FMC @ 0x40000130
1,558,001,584 UART:
1,558,001,600 UART: Running Caliptra FMC ...
1,558,002,008 UART:
1,558,002,062 UART: [state] CFI Enabled
1,558,091,051 UART: [art] Extend RT PCRs Done
1,558,091,479 UART: [art] Lock RT PCRs Done
1,558,092,354 UART: [art] Populate DV Done
1,558,100,693 UART: [fht] FMC Alias Private Key: 7
1,558,101,691 UART: [art] Derive CDI
1,558,101,971 UART: [art] Store in in slot 0x4
1,558,187,778 UART: [art] Derive Key Pair
1,558,188,138 UART: [art] Store priv key in slot 0x5
1,558,200,978 UART: [art] Derive Key Pair - Done
1,558,215,955 UART: [art] Signing Cert with AUTHO
1,558,216,435 UART: RITY.KEYID = 7
1,558,231,715 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,232,480 UART: [art] PUB.X = 2A279461419E2F2DC16598ECF564A92485AAFF5CCD44AE98E22787E2524CB09592E12E257CF0D18F4A72CAE6A3CD6633
1,558,239,258 UART: [art] PUB.Y = 1328FD2AB19DC22D8D5891800A1C1589AAD574AC86A3EF8D6A8E57673855BAB77E21ED060DF265E5D07DC9662010B38F
1,558,246,207 UART: [art] SIG.R = E35B0AB782DF67187ABE5F9EA062FB5607BA8333DF0B2FC0B4E662EA695965C5103B3EDF20F5E7DEB2425D4718B5EDE2
1,558,252,986 UART: [art] SIG.S = 04146B2DB9A8E540D7DCF1772FA2E5ECA299F3FD9570BA64EF597903D3EB20FFEA554D82914479B9E1A1F8DB3A83561A
1,558,276,917 UART: Caliptra RT
1,558,277,170 UART: [state] CFI Enabled
1,558,563,081 UART: [rt] RT listening for mailbox commands...
1,558,563,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,558,564,804 UART:
1,558,564,820 UART: Running Caliptra ROM ...
1,558,565,228 UART:
1,558,565,283 UART: [state] CFI Enabled
1,558,567,727 UART: [state] LifecycleState = Unprovisioned
1,558,568,382 UART: [state] DebugLocked = No
1,558,569,078 UART: [state] WD Timer not started. Device not locked for debugging
1,558,570,322 UART: [kat] SHA2-256
1,559,373,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,559,378,001 UART: [kat] ++
1,559,378,153 UART: [kat] sha1
1,559,382,161 UART: [kat] SHA2-256
1,559,384,101 UART: [kat] SHA2-384
1,559,386,974 UART: [kat] SHA2-512-ACC
1,559,388,874 UART: [kat] ECC-384
1,559,398,413 UART: [kat] HMAC-384Kdf
1,559,403,051 UART: [kat] LMS
1,559,651,363 UART: [kat] --
1,559,652,031 UART: [update-reset] ++
1,560,961,946 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,963,121 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,561,112,573 >>> mbox cmd response: success
1,561,112,762 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,120,776 UART: [update-reset Success] --
1,561,121,497 UART: [state] Locking Datavault
1,561,122,377 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,122,981 UART: [state] Locking ICCM
1,561,123,621 UART: [exit] Launching FMC @ 0x40000130
1,561,128,950 UART:
1,561,128,966 UART: Running Caliptra FMC ...
1,561,129,374 UART:
1,561,129,428 UART: [state] CFI Enabled
1,561,218,363 UART: [art] Extend RT PCRs Done
1,561,218,791 UART: [art] Lock RT PCRs Done
1,561,220,222 UART: [art] Populate DV Done
1,561,228,467 UART: [fht] FMC Alias Private Key: 7
1,561,229,415 UART: [art] Derive CDI
1,561,229,695 UART: [art] Store in in slot 0x4
1,561,315,310 UART: [art] Derive Key Pair
1,561,315,670 UART: [art] Store priv key in slot 0x5
1,561,328,528 UART: [art] Derive Key Pair - Done
1,561,343,484 UART: [art] Signing Cert with AUTHO
1,561,343,964 UART: RITY.KEYID = 7
1,561,359,296 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,360,061 UART: [art] PUB.X = E58010FC183C3572ED1E95EFA77E4560A109C0FC8E927A70D7F7011C08803C6DC91C1DE085B8FA662F46A7928144553E
1,561,366,824 UART: [art] PUB.Y = 9CFE7887BB682B857FFF809CCB675AB69356D85BA300491B9133121673264BC5235FE9E44C21C58992237D2273066A8E
1,561,373,743 UART: [art] SIG.R = 63A9945048F6338B4F36EB3165AD3397ABC1EBB81F2CF7DBD948D2B03950534BE3E984B092AFEF977E491DAAD53844EE
1,561,380,525 UART: [art] SIG.S = 75DA52BD6A889FA01D59A2D9DA8F060D33E247EF8AE227D6394EBD8270FBCC60A612FD9B4A81A6DC0530D77418B95A1D
1,561,404,501 UART: Caliptra RT
1,561,404,754 UART: [state] CFI Enabled
1,561,683,627 UART: [rt] RT listening for mailbox commands...
1,561,684,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,685,496 UART:
1,561,685,512 UART: Running Caliptra ROM ...
1,561,685,920 UART:
1,561,685,975 UART: [state] CFI Enabled
1,561,688,655 UART: [state] LifecycleState = Unprovisioned
1,561,689,310 UART: [state] DebugLocked = No
1,561,689,912 UART: [state] WD Timer not started. Device not locked for debugging
1,561,691,220 UART: [kat] SHA2-256
1,562,494,770 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,562,498,899 UART: [kat] ++
1,562,499,051 UART: [kat] sha1
1,562,503,209 UART: [kat] SHA2-256
1,562,505,149 UART: [kat] SHA2-384
1,562,507,888 UART: [kat] SHA2-512-ACC
1,562,509,788 UART: [kat] ECC-384
1,562,519,493 UART: [kat] HMAC-384Kdf
1,562,524,265 UART: [kat] LMS
1,562,772,577 UART: [kat] --
1,562,773,451 UART: [update-reset] ++
1,564,082,958 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,084,111 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,564,233,563 >>> mbox cmd response: success
1,564,233,858 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,241,872 UART: [update-reset Success] --
1,564,242,947 UART: [state] Locking Datavault
1,564,243,705 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,244,309 UART: [state] Locking ICCM
1,564,244,813 UART: [exit] Launching FMC @ 0x40000130
1,564,250,142 UART:
1,564,250,158 UART: Running Caliptra FMC ...
1,564,250,566 UART:
1,564,250,620 UART: [state] CFI Enabled
1,564,339,725 UART: [art] Extend RT PCRs Done
1,564,340,153 UART: [art] Lock RT PCRs Done
1,564,341,516 UART: [art] Populate DV Done
1,564,349,937 UART: [fht] FMC Alias Private Key: 7
1,564,350,937 UART: [art] Derive CDI
1,564,351,217 UART: [art] Store in in slot 0x4
1,564,436,676 UART: [art] Derive Key Pair
1,564,437,036 UART: [art] Store priv key in slot 0x5
1,564,450,190 UART: [art] Derive Key Pair - Done
1,564,465,005 UART: [art] Signing Cert with AUTHO
1,564,465,485 UART: RITY.KEYID = 7
1,564,480,113 UART: [art] Erasing AUTHORITY.KEYID = 7
1,564,480,878 UART: [art] PUB.X = 2A279461419E2F2DC16598ECF564A92485AAFF5CCD44AE98E22787E2524CB09592E12E257CF0D18F4A72CAE6A3CD6633
1,564,487,656 UART: [art] PUB.Y = 1328FD2AB19DC22D8D5891800A1C1589AAD574AC86A3EF8D6A8E57673855BAB77E21ED060DF265E5D07DC9662010B38F
1,564,494,605 UART: [art] SIG.R = E35B0AB782DF67187ABE5F9EA062FB5607BA8333DF0B2FC0B4E662EA695965C5103B3EDF20F5E7DEB2425D4718B5EDE2
1,564,501,384 UART: [art] SIG.S = 04146B2DB9A8E540D7DCF1772FA2E5ECA299F3FD9570BA64EF597903D3EB20FFEA554D82914479B9E1A1F8DB3A83561A
1,564,525,295 UART: Caliptra RT
1,564,525,548 UART: [state] CFI Enabled
1,564,807,745 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 316.35s
Truncated 733302 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,482,206,043 >>> mbox cmd response: success
1,482,219,327 UART:
1,482,219,343 UART: Running Caliptra FMC ...
1,482,219,751 UART:
1,482,219,805 UART: [state] CFI Enabled
1,482,308,722 UART: [art] Extend RT PCRs Done
1,482,309,150 UART: [art] Lock RT PCRs Done
1,482,310,393 UART: [art] Populate DV Done
1,482,318,642 UART: [fht] FMC Alias Private Key: 7
1,482,319,632 UART: [art] Derive CDI
1,482,319,912 UART: [art] Store in in slot 0x4
1,482,405,129 UART: [art] Derive Key Pair
1,482,405,489 UART: [art] Store priv key in slot 0x5
1,482,418,625 UART: [art] Derive Key Pair - Done
1,482,433,147 UART: [art] Signing Cert with AUTHO
1,482,433,627 UART: RITY.KEYID = 7
1,482,449,253 UART: [art] Erasing AUTHORITY.KEYID = 7
1,482,450,018 UART: [art] PUB.X = 3BA67D8B6C06E5E88CC3FA0C3DAB18458DCEFD20D5D10D22BB46CF99BBA70030A4EF10D2ABFFEBE8B8373079E4525D47
1,482,456,783 UART: [art] PUB.Y = 1099B1AFFC1F03243DF44A7609AF4E7C35189B3275930B25F1E1F9BF20DC125A34C63E38EAF1DAEAF6A5E2E5EC2495FF
1,482,463,742 UART: [art] SIG.R = CD25A733532979583BA45D92CA11BD9FE5AC260705FE7F2B2EA0EFAF3D234B6004CE024E755909C844E068251A3F6C3D
1,482,470,505 UART: [art] SIG.S = 199D1310B8993ACB503F55B2D5D3976468EDE395E4DD030E7A40B667CDFFBD80FE7674DDB14C24CA55F7AFBEA4BD959D
1,482,493,648 UART: Caliptra RT
1,482,493,901 UART: [state] CFI Enabled
1,482,775,168 UART: [rt] RT listening for mailbox commands...
1,482,775,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,206,371 >>> mbox cmd response: success
1,485,219,845 UART:
1,485,219,861 UART: Running Caliptra FMC ...
1,485,220,269 UART:
1,485,220,323 UART: [state] CFI Enabled
1,485,309,530 UART: [art] Extend RT PCRs Done
1,485,309,958 UART: [art] Lock RT PCRs Done
1,485,311,263 UART: [art] Populate DV Done
1,485,319,406 UART: [fht] FMC Alias Private Key: 7
1,485,320,448 UART: [art] Derive CDI
1,485,320,728 UART: [art] Store in in slot 0x4
1,485,406,457 UART: [art] Derive Key Pair
1,485,406,817 UART: [art] Store priv key in slot 0x5
1,485,420,185 UART: [art] Derive Key Pair - Done
1,485,434,880 UART: [art] Signing Cert with AUTHO
1,485,435,360 UART: RITY.KEYID = 7
1,485,450,964 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,451,729 UART: [art] PUB.X = 536102E7D9791E7141CCA23DEA3D3612D8470D13568BB4928C77F3CB5DEE9E6EA2FEA1229C85F0BDC232CA3BC8D84DBA
1,485,458,511 UART: [art] PUB.Y = 66E911670340B96864DE29D90ADB4A058F40F6FDD94257A39EC87F62C965948FDE2936510CDD1D08005B703174B1DBBB
1,485,465,426 UART: [art] SIG.R = A716B55989BC20D19A430DC6FE51AA936AC31657AEB68683A7004988FDCEF92F569D030B12F971BFE5E9F64E23498977
1,485,472,169 UART: [art] SIG.S = 89FBB57E240D730897F508E9F538E032A9DBB378F5662B30065CCDA1E0F4F5D9F3C3CE27C5F34B3665CEE363D61EFEE7
1,485,496,200 UART: Caliptra RT
1,485,496,453 UART: [state] CFI Enabled
1,485,780,013 UART: [rt] RT listening for mailbox commands...
1,485,780,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,211,234 >>> mbox cmd response: success
1,488,224,854 UART:
1,488,224,870 UART: Running Caliptra FMC ...
1,488,225,278 UART:
1,488,225,332 UART: [state] CFI Enabled
1,488,314,845 UART: [art] Extend RT PCRs Done
1,488,315,273 UART: [art] Lock RT PCRs Done
1,488,316,550 UART: [art] Populate DV Done
1,488,324,663 UART: [fht] FMC Alias Private Key: 7
1,488,325,735 UART: [art] Derive CDI
1,488,326,015 UART: [art] Store in in slot 0x4
1,488,411,286 UART: [art] Derive Key Pair
1,488,411,646 UART: [art] Store priv key in slot 0x5
1,488,424,330 UART: [art] Derive Key Pair - Done
1,488,439,002 UART: [art] Signing Cert with AUTHO
1,488,439,482 UART: RITY.KEYID = 7
1,488,454,470 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,455,235 UART: [art] PUB.X = 3BA67D8B6C06E5E88CC3FA0C3DAB18458DCEFD20D5D10D22BB46CF99BBA70030A4EF10D2ABFFEBE8B8373079E4525D47
1,488,462,000 UART: [art] PUB.Y = 1099B1AFFC1F03243DF44A7609AF4E7C35189B3275930B25F1E1F9BF20DC125A34C63E38EAF1DAEAF6A5E2E5EC2495FF
1,488,468,959 UART: [art] SIG.R = CD25A733532979583BA45D92CA11BD9FE5AC260705FE7F2B2EA0EFAF3D234B6004CE024E755909C844E068251A3F6C3D
1,488,475,722 UART: [art] SIG.S = 199D1310B8993ACB503F55B2D5D3976468EDE395E4DD030E7A40B667CDFFBD80FE7674DDB14C24CA55F7AFBEA4BD959D
1,488,499,741 UART: Caliptra RT
1,488,499,994 UART: [state] CFI Enabled
1,488,779,759 UART: [rt] RT listening for mailbox commands...
1,488,780,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,210,150 >>> mbox cmd response: success
1,491,223,370 UART:
1,491,223,386 UART: Running Caliptra FMC ...
1,491,223,794 UART:
1,491,223,848 UART: [state] CFI Enabled
1,491,313,021 UART: [art] Extend RT PCRs Done
1,491,313,449 UART: [art] Lock RT PCRs Done
1,491,314,738 UART: [art] Populate DV Done
1,491,322,911 UART: [fht] FMC Alias Private Key: 7
1,491,324,041 UART: [art] Derive CDI
1,491,324,321 UART: [art] Store in in slot 0x4
1,491,410,276 UART: [art] Derive Key Pair
1,491,410,636 UART: [art] Store priv key in slot 0x5
1,491,423,954 UART: [art] Derive Key Pair - Done
1,491,438,779 UART: [art] Signing Cert with AUTHO
1,491,439,259 UART: RITY.KEYID = 7
1,491,453,837 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,454,602 UART: [art] PUB.X = 536102E7D9791E7141CCA23DEA3D3612D8470D13568BB4928C77F3CB5DEE9E6EA2FEA1229C85F0BDC232CA3BC8D84DBA
1,491,461,384 UART: [art] PUB.Y = 66E911670340B96864DE29D90ADB4A058F40F6FDD94257A39EC87F62C965948FDE2936510CDD1D08005B703174B1DBBB
1,491,468,299 UART: [art] SIG.R = A716B55989BC20D19A430DC6FE51AA936AC31657AEB68683A7004988FDCEF92F569D030B12F971BFE5E9F64E23498977
1,491,475,042 UART: [art] SIG.S = 89FBB57E240D730897F508E9F538E032A9DBB378F5662B30065CCDA1E0F4F5D9F3C3CE27C5F34B3665CEE363D61EFEE7
1,491,498,419 UART: Caliptra RT
1,491,498,672 UART: [state] CFI Enabled
1,491,784,842 UART: [rt] RT listening for mailbox commands...
1,491,785,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,215,195 >>> mbox cmd response: success
1,494,228,439 UART:
1,494,228,455 UART: Running Caliptra FMC ...
1,494,228,863 UART:
1,494,228,917 UART: [state] CFI Enabled
1,494,317,910 UART: [art] Extend RT PCRs Done
1,494,318,338 UART: [art] Lock RT PCRs Done
1,494,319,869 UART: [art] Populate DV Done
1,494,327,870 UART: [fht] FMC Alias Private Key: 7
1,494,328,912 UART: [art] Derive CDI
1,494,329,192 UART: [art] Store in in slot 0x4
1,494,414,755 UART: [art] Derive Key Pair
1,494,415,115 UART: [art] Store priv key in slot 0x5
1,494,428,013 UART: [art] Derive Key Pair - Done
1,494,442,459 UART: [art] Signing Cert with AUTHO
1,494,442,939 UART: RITY.KEYID = 7
1,494,458,199 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,458,964 UART: [art] PUB.X = 3BA67D8B6C06E5E88CC3FA0C3DAB18458DCEFD20D5D10D22BB46CF99BBA70030A4EF10D2ABFFEBE8B8373079E4525D47
1,494,465,729 UART: [art] PUB.Y = 1099B1AFFC1F03243DF44A7609AF4E7C35189B3275930B25F1E1F9BF20DC125A34C63E38EAF1DAEAF6A5E2E5EC2495FF
1,494,472,688 UART: [art] SIG.R = CD25A733532979583BA45D92CA11BD9FE5AC260705FE7F2B2EA0EFAF3D234B6004CE024E755909C844E068251A3F6C3D
1,494,479,451 UART: [art] SIG.S = 199D1310B8993ACB503F55B2D5D3976468EDE395E4DD030E7A40B667CDFFBD80FE7674DDB14C24CA55F7AFBEA4BD959D
1,494,503,204 UART: Caliptra RT
1,494,503,457 UART: [state] CFI Enabled
1,494,787,344 UART: [rt] RT listening for mailbox commands...
1,494,788,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,218,257 >>> mbox cmd response: success
1,497,231,493 UART:
1,497,231,509 UART: Running Caliptra FMC ...
1,497,231,917 UART:
1,497,231,971 UART: [state] CFI Enabled
1,497,321,362 UART: [art] Extend RT PCRs Done
1,497,321,790 UART: [art] Lock RT PCRs Done
1,497,323,191 UART: [art] Populate DV Done
1,497,331,602 UART: [fht] FMC Alias Private Key: 7
1,497,332,656 UART: [art] Derive CDI
1,497,332,936 UART: [art] Store in in slot 0x4
1,497,418,819 UART: [art] Derive Key Pair
1,497,419,179 UART: [art] Store priv key in slot 0x5
1,497,431,995 UART: [art] Derive Key Pair - Done
1,497,446,928 UART: [art] Signing Cert with AUTHO
1,497,447,408 UART: RITY.KEYID = 7
1,497,462,478 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,463,243 UART: [art] PUB.X = 536102E7D9791E7141CCA23DEA3D3612D8470D13568BB4928C77F3CB5DEE9E6EA2FEA1229C85F0BDC232CA3BC8D84DBA
1,497,470,025 UART: [art] PUB.Y = 66E911670340B96864DE29D90ADB4A058F40F6FDD94257A39EC87F62C965948FDE2936510CDD1D08005B703174B1DBBB
1,497,476,940 UART: [art] SIG.R = A716B55989BC20D19A430DC6FE51AA936AC31657AEB68683A7004988FDCEF92F569D030B12F971BFE5E9F64E23498977
1,497,483,683 UART: [art] SIG.S = 89FBB57E240D730897F508E9F538E032A9DBB378F5662B30065CCDA1E0F4F5D9F3C3CE27C5F34B3665CEE363D61EFEE7
1,497,507,270 UART: Caliptra RT
1,497,507,523 UART: [state] CFI Enabled
1,497,787,711 UART: [rt] RT listening for mailbox commands...
1,497,788,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,217,844 >>> mbox cmd response: success
1,500,231,146 UART:
1,500,231,162 UART: Running Caliptra FMC ...
1,500,231,570 UART:
1,500,231,624 UART: [state] CFI Enabled
1,500,320,759 UART: [art] Extend RT PCRs Done
1,500,321,187 UART: [art] Lock RT PCRs Done
1,500,322,746 UART: [art] Populate DV Done
1,500,331,089 UART: [fht] FMC Alias Private Key: 7
1,500,332,235 UART: [art] Derive CDI
1,500,332,515 UART: [art] Store in in slot 0x4
1,500,417,810 UART: [art] Derive Key Pair
1,500,418,170 UART: [art] Store priv key in slot 0x5
1,500,431,414 UART: [art] Derive Key Pair - Done
1,500,445,818 UART: [art] Signing Cert with AUTHO
1,500,446,298 UART: RITY.KEYID = 7
1,500,462,038 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,462,803 UART: [art] PUB.X = 3BA67D8B6C06E5E88CC3FA0C3DAB18458DCEFD20D5D10D22BB46CF99BBA70030A4EF10D2ABFFEBE8B8373079E4525D47
1,500,469,568 UART: [art] PUB.Y = 1099B1AFFC1F03243DF44A7609AF4E7C35189B3275930B25F1E1F9BF20DC125A34C63E38EAF1DAEAF6A5E2E5EC2495FF
1,500,476,527 UART: [art] SIG.R = CD25A733532979583BA45D92CA11BD9FE5AC260705FE7F2B2EA0EFAF3D234B6004CE024E755909C844E068251A3F6C3D
1,500,483,290 UART: [art] SIG.S = 199D1310B8993ACB503F55B2D5D3976468EDE395E4DD030E7A40B667CDFFBD80FE7674DDB14C24CA55F7AFBEA4BD959D
1,500,507,121 UART: Caliptra RT
1,500,507,374 UART: [state] CFI Enabled
1,500,788,897 UART: [rt] RT listening for mailbox commands...
1,500,789,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,219,368 >>> mbox cmd response: success
1,503,232,888 UART:
1,503,232,904 UART: Running Caliptra FMC ...
1,503,233,312 UART:
1,503,233,366 UART: [state] CFI Enabled
1,503,322,581 UART: [art] Extend RT PCRs Done
1,503,323,009 UART: [art] Lock RT PCRs Done
1,503,324,296 UART: [art] Populate DV Done
1,503,332,535 UART: [fht] FMC Alias Private Key: 7
1,503,333,469 UART: [art] Derive CDI
1,503,333,749 UART: [art] Store in in slot 0x4
1,503,419,468 UART: [art] Derive Key Pair
1,503,419,828 UART: [art] Store priv key in slot 0x5
1,503,433,508 UART: [art] Derive Key Pair - Done
1,503,448,271 UART: [art] Signing Cert with AUTHO
1,503,448,751 UART: RITY.KEYID = 7
1,503,463,723 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,464,488 UART: [art] PUB.X = 536102E7D9791E7141CCA23DEA3D3612D8470D13568BB4928C77F3CB5DEE9E6EA2FEA1229C85F0BDC232CA3BC8D84DBA
1,503,471,270 UART: [art] PUB.Y = 66E911670340B96864DE29D90ADB4A058F40F6FDD94257A39EC87F62C965948FDE2936510CDD1D08005B703174B1DBBB
1,503,478,185 UART: [art] SIG.R = A716B55989BC20D19A430DC6FE51AA936AC31657AEB68683A7004988FDCEF92F569D030B12F971BFE5E9F64E23498977
1,503,484,928 UART: [art] SIG.S = 89FBB57E240D730897F508E9F538E032A9DBB378F5662B30065CCDA1E0F4F5D9F3C3CE27C5F34B3665CEE363D61EFEE7
1,503,509,175 UART: Caliptra RT
1,503,509,428 UART: [state] CFI Enabled
1,503,790,996 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 311.05s
Truncated 1339511 bytes from beginning
[art] Populate DV Done
1,552,477,352 UART: [fht] FMC Alias Private Key: 7
1,552,478,332 UART: [art] Derive CDI
1,552,478,612 UART: [art] Store in in slot 0x4
1,552,564,527 UART: [art] Derive Key Pair
1,552,564,887 UART: [art] Store priv key in slot 0x5
1,552,578,475 UART: [art] Derive Key Pair - Done
1,552,593,185 UART: [art] Signing Cert with AUTHO
1,552,593,665 UART: RITY.KEYID = 7
1,552,608,923 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,609,688 UART: [art] PUB.X = A6EF4F964934E6BA1F7095AD617EFAA9291BF8B17FF94DF362BEA6A99E7E04839160B435E0F5FFE950EDBED7955312D7
1,552,616,471 UART: [art] PUB.Y = E1867DEB3551A6ACBC663DD9A37FB3F33516274499FEC8E3CAE091B37ADC6D57C4557028B3E7E7CECC0C3D9F2CC6DE70
1,552,623,440 UART: [art] SIG.R = 42A6F80C32EF13E849EFF97FCA67B46285A1D1391EA87A31BDF221C50A8B55E5931BD19AD196DAD7C3304266CC5AB628
1,552,630,216 UART: [art] SIG.S = 9912187AE498F486EA8F3C4B2B711339E6319FC480C846BA122D8EBA89FD0E2A95EBF06C7C9FCA165E488088936C59F1
1,552,654,020 UART: Caliptra RT
1,552,654,365 UART: [state] CFI Enabled
1,552,937,362 UART: [rt] RT listening for mailbox commands...
1,552,938,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,552,938,915 UART:
1,552,938,931 UART: Running Caliptra ROM ...
1,552,939,339 UART:
1,552,939,481 UART: [state] CFI Enabled
1,552,942,351 UART: [state] LifecycleState = Unprovisioned
1,552,943,006 UART: [state] DebugLocked = No
1,552,943,612 UART: [state] WD Timer not started. Device not locked for debugging
1,552,944,796 UART: [kat] SHA2-256
1,553,748,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,553,752,475 UART: [kat] ++
1,553,752,627 UART: [kat] sha1
1,553,756,751 UART: [kat] SHA2-256
1,553,758,691 UART: [kat] SHA2-384
1,553,761,540 UART: [kat] SHA2-512-ACC
1,553,763,440 UART: [kat] ECC-384
1,553,773,365 UART: [kat] HMAC-384Kdf
1,553,778,063 UART: [kat] LMS
1,554,026,375 UART: [kat] --
1,554,027,265 UART: [update-reset] ++
1,555,336,344 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,555,337,477 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,555,486,929 >>> mbox cmd response: success
1,555,487,248 UART: [update-reset] Copying MAN_2 To MAN_1
1,555,495,262 UART: [update-reset Success] --
1,555,496,145 UART: [state] Locking Datavault
1,555,497,019 UART: [state] Locking PCR0, PCR1 and PCR31
1,555,497,623 UART: [state] Locking ICCM
1,555,498,073 UART: [exit] Launching FMC @ 0x40000130
1,555,503,402 UART:
1,555,503,418 UART: Running Caliptra FMC ...
1,555,503,826 UART:
1,555,503,969 UART: [state] CFI Enabled
1,555,592,724 UART: [art] Extend RT PCRs Done
1,555,593,152 UART: [art] Lock RT PCRs Done
1,555,594,343 UART: [art] Populate DV Done
1,555,602,944 UART: [fht] FMC Alias Private Key: 7
1,555,603,938 UART: [art] Derive CDI
1,555,604,218 UART: [art] Store in in slot 0x4
1,555,690,027 UART: [art] Derive Key Pair
1,555,690,387 UART: [art] Store priv key in slot 0x5
1,555,703,967 UART: [art] Derive Key Pair - Done
1,555,718,644 UART: [art] Signing Cert with AUTHO
1,555,719,124 UART: RITY.KEYID = 7
1,555,734,536 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,735,301 UART: [art] PUB.X = B43A72052B237D72D277447B2B74159E77A950786FFC9A2D4AFE60879E5F009CF7E410D5602A235326AF1042F29860BC
1,555,742,042 UART: [art] PUB.Y = 61B28D5D01D05AA19618F11219D61450EE4424B483B7583111A668FF36269D9A325CAD9C5118B78D3B60633F46512F84
1,555,748,979 UART: [art] SIG.R = 1D61EE7C302F69D70ADE48F0A742DF5228E0AD6FBEA9548C7BAB14482E95F620319DF82E6AADAD27E47891CAB65C9A99
1,555,755,764 UART: [art] SIG.S = 7361F368F25100E956438FFB2DFA9A13428874AF21A952FEEA0EA055588E7A8146C6EC4B498DF31A2F85AA0F13619E44
1,555,779,975 UART: Caliptra RT
1,555,780,320 UART: [state] CFI Enabled
1,556,063,977 UART: [rt] RT listening for mailbox commands...
1,556,064,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,065,548 UART:
1,556,065,564 UART: Running Caliptra ROM ...
1,556,065,972 UART:
1,556,066,114 UART: [state] CFI Enabled
1,556,068,416 UART: [state] LifecycleState = Unprovisioned
1,556,069,071 UART: [state] DebugLocked = No
1,556,069,577 UART: [state] WD Timer not started. Device not locked for debugging
1,556,070,725 UART: [kat] SHA2-256
1,556,874,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,556,878,404 UART: [kat] ++
1,556,878,556 UART: [kat] sha1
1,556,882,830 UART: [kat] SHA2-256
1,556,884,770 UART: [kat] SHA2-384
1,556,887,409 UART: [kat] SHA2-512-ACC
1,556,889,309 UART: [kat] ECC-384
1,556,899,416 UART: [kat] HMAC-384Kdf
1,556,903,880 UART: [kat] LMS
1,557,152,192 UART: [kat] --
1,557,153,086 UART: [update-reset] ++
1,558,462,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,463,528 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,558,612,980 >>> mbox cmd response: success
1,558,613,327 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,621,341 UART: [update-reset Success] --
1,558,622,396 UART: [state] Locking Datavault
1,558,623,254 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,623,858 UART: [state] Locking ICCM
1,558,624,432 UART: [exit] Launching FMC @ 0x40000130
1,558,629,761 UART:
1,558,629,777 UART: Running Caliptra FMC ...
1,558,630,185 UART:
1,558,630,328 UART: [state] CFI Enabled
1,558,719,793 UART: [art] Extend RT PCRs Done
1,558,720,221 UART: [art] Lock RT PCRs Done
1,558,721,536 UART: [art] Populate DV Done
1,558,729,793 UART: [fht] FMC Alias Private Key: 7
1,558,730,821 UART: [art] Derive CDI
1,558,731,101 UART: [art] Store in in slot 0x4
1,558,816,858 UART: [art] Derive Key Pair
1,558,817,218 UART: [art] Store priv key in slot 0x5
1,558,830,392 UART: [art] Derive Key Pair - Done
1,558,844,930 UART: [art] Signing Cert with AUTHO
1,558,845,410 UART: RITY.KEYID = 7
1,558,860,400 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,861,165 UART: [art] PUB.X = A6EF4F964934E6BA1F7095AD617EFAA9291BF8B17FF94DF362BEA6A99E7E04839160B435E0F5FFE950EDBED7955312D7
1,558,867,948 UART: [art] PUB.Y = E1867DEB3551A6ACBC663DD9A37FB3F33516274499FEC8E3CAE091B37ADC6D57C4557028B3E7E7CECC0C3D9F2CC6DE70
1,558,874,917 UART: [art] SIG.R = 42A6F80C32EF13E849EFF97FCA67B46285A1D1391EA87A31BDF221C50A8B55E5931BD19AD196DAD7C3304266CC5AB628
1,558,881,693 UART: [art] SIG.S = 9912187AE498F486EA8F3C4B2B711339E6319FC480C846BA122D8EBA89FD0E2A95EBF06C7C9FCA165E488088936C59F1
1,558,905,827 UART: Caliptra RT
1,558,906,172 UART: [state] CFI Enabled
1,559,187,501 UART: [rt] RT listening for mailbox commands...
1,559,188,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,189,192 UART:
1,559,189,208 UART: Running Caliptra ROM ...
1,559,189,616 UART:
1,559,189,758 UART: [state] CFI Enabled
1,559,192,834 UART: [state] LifecycleState = Unprovisioned
1,559,193,489 UART: [state] DebugLocked = No
1,559,194,103 UART: [state] WD Timer not started. Device not locked for debugging
1,559,195,245 UART: [kat] SHA2-256
1,559,998,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,560,002,924 UART: [kat] ++
1,560,003,076 UART: [kat] sha1
1,560,007,126 UART: [kat] SHA2-256
1,560,009,066 UART: [kat] SHA2-384
1,560,011,905 UART: [kat] SHA2-512-ACC
1,560,013,805 UART: [kat] ECC-384
1,560,023,814 UART: [kat] HMAC-384Kdf
1,560,028,260 UART: [kat] LMS
1,560,276,572 UART: [kat] --
1,560,277,320 UART: [update-reset] ++
1,561,585,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,587,002 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,561,736,454 >>> mbox cmd response: success
1,561,736,613 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,744,627 UART: [update-reset Success] --
1,561,745,724 UART: [state] Locking Datavault
1,561,746,578 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,747,182 UART: [state] Locking ICCM
1,561,747,680 UART: [exit] Launching FMC @ 0x40000130
1,561,753,009 UART:
1,561,753,025 UART: Running Caliptra FMC ...
1,561,753,433 UART:
1,561,753,576 UART: [state] CFI Enabled
1,561,842,379 UART: [art] Extend RT PCRs Done
1,561,842,807 UART: [art] Lock RT PCRs Done
1,561,844,076 UART: [art] Populate DV Done
1,561,852,273 UART: [fht] FMC Alias Private Key: 7
1,561,853,263 UART: [art] Derive CDI
1,561,853,543 UART: [art] Store in in slot 0x4
1,561,939,240 UART: [art] Derive Key Pair
1,561,939,600 UART: [art] Store priv key in slot 0x5
1,561,953,024 UART: [art] Derive Key Pair - Done
1,561,967,607 UART: [art] Signing Cert with AUTHO
1,561,968,087 UART: RITY.KEYID = 7
1,561,983,013 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,983,778 UART: [art] PUB.X = B43A72052B237D72D277447B2B74159E77A950786FFC9A2D4AFE60879E5F009CF7E410D5602A235326AF1042F29860BC
1,561,990,519 UART: [art] PUB.Y = 61B28D5D01D05AA19618F11219D61450EE4424B483B7583111A668FF36269D9A325CAD9C5118B78D3B60633F46512F84
1,561,997,456 UART: [art] SIG.R = 1D61EE7C302F69D70ADE48F0A742DF5228E0AD6FBEA9548C7BAB14482E95F620319DF82E6AADAD27E47891CAB65C9A99
1,562,004,241 UART: [art] SIG.S = 7361F368F25100E956438FFB2DFA9A13428874AF21A952FEEA0EA055588E7A8146C6EC4B498DF31A2F85AA0F13619E44
1,562,028,090 UART: Caliptra RT
1,562,028,435 UART: [state] CFI Enabled
1,562,310,372 UART: [rt] RT listening for mailbox commands...
1,562,311,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,312,027 UART:
1,562,312,043 UART: Running Caliptra ROM ...
1,562,312,451 UART:
1,562,312,593 UART: [state] CFI Enabled
1,562,315,625 UART: [state] LifecycleState = Unprovisioned
1,562,316,280 UART: [state] DebugLocked = No
1,562,317,016 UART: [state] WD Timer not started. Device not locked for debugging
1,562,318,152 UART: [kat] SHA2-256
1,563,121,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,563,125,831 UART: [kat] ++
1,563,125,983 UART: [kat] sha1
1,563,130,281 UART: [kat] SHA2-256
1,563,132,221 UART: [kat] SHA2-384
1,563,135,006 UART: [kat] SHA2-512-ACC
1,563,136,906 UART: [kat] ECC-384
1,563,147,015 UART: [kat] HMAC-384Kdf
1,563,151,651 UART: [kat] LMS
1,563,399,963 UART: [kat] --
1,563,400,777 UART: [update-reset] ++
1,564,710,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,711,311 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
1,564,860,763 >>> mbox cmd response: success
1,564,861,016 UART: [update-reset] Copying MAN_2 To MAN_1
1,564,869,030 UART: [update-reset Success] --
1,564,870,157 UART: [state] Locking Datavault
1,564,870,783 UART: [state] Locking PCR0, PCR1 and PCR31
1,564,871,387 UART: [state] Locking ICCM
1,564,872,053 UART: [exit] Launching FMC @ 0x40000130
1,564,877,382 UART:
1,564,877,398 UART: Running Caliptra FMC ...
1,564,877,806 UART:
1,564,877,949 UART: [state] CFI Enabled
1,564,967,182 UART: [art] Extend RT PCRs Done
1,564,967,610 UART: [art] Lock RT PCRs Done
1,564,968,735 UART: [art] Populate DV Done
1,564,976,952 UART: [fht] FMC Alias Private Key: 7
1,564,978,052 UART: [art] Derive CDI
1,564,978,332 UART: [art] Store in in slot 0x4
1,565,064,125 UART: [art] Derive Key Pair
1,565,064,485 UART: [art] Store priv key in slot 0x5
1,565,077,955 UART: [art] Derive Key Pair - Done
1,565,093,025 UART: [art] Signing Cert with AUTHO
1,565,093,505 UART: RITY.KEYID = 7
1,565,108,685 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,109,450 UART: [art] PUB.X = A6EF4F964934E6BA1F7095AD617EFAA9291BF8B17FF94DF362BEA6A99E7E04839160B435E0F5FFE950EDBED7955312D7
1,565,116,233 UART: [art] PUB.Y = E1867DEB3551A6ACBC663DD9A37FB3F33516274499FEC8E3CAE091B37ADC6D57C4557028B3E7E7CECC0C3D9F2CC6DE70
1,565,123,202 UART: [art] SIG.R = 42A6F80C32EF13E849EFF97FCA67B46285A1D1391EA87A31BDF221C50A8B55E5931BD19AD196DAD7C3304266CC5AB628
1,565,129,978 UART: [art] SIG.S = 9912187AE498F486EA8F3C4B2B711339E6319FC480C846BA122D8EBA89FD0E2A95EBF06C7C9FCA165E488088936C59F1
1,565,154,176 UART: Caliptra RT
1,565,154,521 UART: [state] CFI Enabled
1,565,434,040 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 328.19s
Truncated 733302 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,482,856,362 >>> mbox cmd response: success
1,482,869,646 UART:
1,482,869,662 UART: Running Caliptra FMC ...
1,482,870,070 UART:
1,482,870,213 UART: [state] CFI Enabled
1,482,959,004 UART: [art] Extend RT PCRs Done
1,482,959,432 UART: [art] Lock RT PCRs Done
1,482,960,625 UART: [art] Populate DV Done
1,482,968,722 UART: [fht] FMC Alias Private Key: 7
1,482,969,886 UART: [art] Derive CDI
1,482,970,166 UART: [art] Store in in slot 0x4
1,483,055,659 UART: [art] Derive Key Pair
1,483,056,019 UART: [art] Store priv key in slot 0x5
1,483,069,019 UART: [art] Derive Key Pair - Done
1,483,083,957 UART: [art] Signing Cert with AUTHO
1,483,084,437 UART: RITY.KEYID = 7
1,483,099,721 UART: [art] Erasing AUTHORITY.KEYID = 7
1,483,100,486 UART: [art] PUB.X = A6324078C042FEF9C52197943624983FB1321E0FF00B5B3BDA0B92B64AA52991FED6D5631D8A80C505C6F7EE6CE44389
1,483,107,248 UART: [art] PUB.Y = C31B92597C0885DA51218DBE427F7BB2A4A16739226A2DA1DF27479BA298E847266F87B63DE6F070E9753F6C92060D0E
1,483,114,186 UART: [art] SIG.R = 4BAA2A975378CF0688609C709268C2B68B53FB871E7202B32EB21B3CD1022B43E18B1C61C1EF626396BA19082D7C4501
1,483,120,939 UART: [art] SIG.S = 18CEACF0EB8539C94516916076D4A2BC1C369165B969E6760BAE0B88249139398B882688AB659955F0E1E9DC89024D66
1,483,144,893 UART: Caliptra RT
1,483,145,238 UART: [state] CFI Enabled
1,483,433,847 UART: [rt] RT listening for mailbox commands...
1,483,434,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,865,769 >>> mbox cmd response: success
1,485,878,995 UART:
1,485,879,011 UART: Running Caliptra FMC ...
1,485,879,419 UART:
1,485,879,562 UART: [state] CFI Enabled
1,485,968,923 UART: [art] Extend RT PCRs Done
1,485,969,351 UART: [art] Lock RT PCRs Done
1,485,970,420 UART: [art] Populate DV Done
1,485,978,589 UART: [fht] FMC Alias Private Key: 7
1,485,979,575 UART: [art] Derive CDI
1,485,979,855 UART: [art] Store in in slot 0x4
1,486,065,552 UART: [art] Derive Key Pair
1,486,065,912 UART: [art] Store priv key in slot 0x5
1,486,079,466 UART: [art] Derive Key Pair - Done
1,486,094,261 UART: [art] Signing Cert with AUTHO
1,486,094,741 UART: RITY.KEYID = 7
1,486,109,833 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,110,598 UART: [art] PUB.X = 62CF1E66A91F220EAA20B4F1620B3DD7FCE5B4E11B8578D2DE07B30174421F733BE5F3F7B66A8339208EBFE7B98FF37C
1,486,117,370 UART: [art] PUB.Y = 5F69F04101C81F1B38EE509F44AA18208166EEC3F754DB97BFAA12559C702CD873C49076C57CF7AE8C9EDAAC25D40640
1,486,124,324 UART: [art] SIG.R = 7609B9B65F2666570E9B54D1AA1A6A9D12D05FFB535C65F7DE46F27844D3C26844F14084C9F20E7F21B48C08F1ADDDE1
1,486,131,090 UART: [art] SIG.S = 52395575AE128B30C5CCBA3C53A256F542B2306D2999323756F3C71250C8CD46180D78C23B17316075120E0A87E7CBB4
1,486,154,912 UART: Caliptra RT
1,486,155,257 UART: [state] CFI Enabled
1,486,437,212 UART: [rt] RT listening for mailbox commands...
1,486,437,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,867,844 >>> mbox cmd response: success
1,488,881,198 UART:
1,488,881,214 UART: Running Caliptra FMC ...
1,488,881,622 UART:
1,488,881,765 UART: [state] CFI Enabled
1,488,970,708 UART: [art] Extend RT PCRs Done
1,488,971,136 UART: [art] Lock RT PCRs Done
1,488,972,455 UART: [art] Populate DV Done
1,488,980,756 UART: [fht] FMC Alias Private Key: 7
1,488,981,794 UART: [art] Derive CDI
1,488,982,074 UART: [art] Store in in slot 0x4
1,489,067,629 UART: [art] Derive Key Pair
1,489,067,989 UART: [art] Store priv key in slot 0x5
1,489,081,125 UART: [art] Derive Key Pair - Done
1,489,095,599 UART: [art] Signing Cert with AUTHO
1,489,096,079 UART: RITY.KEYID = 7
1,489,110,623 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,111,388 UART: [art] PUB.X = A6324078C042FEF9C52197943624983FB1321E0FF00B5B3BDA0B92B64AA52991FED6D5631D8A80C505C6F7EE6CE44389
1,489,118,150 UART: [art] PUB.Y = C31B92597C0885DA51218DBE427F7BB2A4A16739226A2DA1DF27479BA298E847266F87B63DE6F070E9753F6C92060D0E
1,489,125,088 UART: [art] SIG.R = 4BAA2A975378CF0688609C709268C2B68B53FB871E7202B32EB21B3CD1022B43E18B1C61C1EF626396BA19082D7C4501
1,489,131,841 UART: [art] SIG.S = 18CEACF0EB8539C94516916076D4A2BC1C369165B969E6760BAE0B88249139398B882688AB659955F0E1E9DC89024D66
1,489,155,169 UART: Caliptra RT
1,489,155,514 UART: [state] CFI Enabled
1,489,438,145 UART: [rt] RT listening for mailbox commands...
1,489,438,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,867,153 >>> mbox cmd response: success
1,491,880,637 UART:
1,491,880,653 UART: Running Caliptra FMC ...
1,491,881,061 UART:
1,491,881,204 UART: [state] CFI Enabled
1,491,970,553 UART: [art] Extend RT PCRs Done
1,491,970,981 UART: [art] Lock RT PCRs Done
1,491,972,502 UART: [art] Populate DV Done
1,491,980,681 UART: [fht] FMC Alias Private Key: 7
1,491,981,671 UART: [art] Derive CDI
1,491,981,951 UART: [art] Store in in slot 0x4
1,492,067,694 UART: [art] Derive Key Pair
1,492,068,054 UART: [art] Store priv key in slot 0x5
1,492,081,822 UART: [art] Derive Key Pair - Done
1,492,096,799 UART: [art] Signing Cert with AUTHO
1,492,097,279 UART: RITY.KEYID = 7
1,492,112,283 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,113,048 UART: [art] PUB.X = 62CF1E66A91F220EAA20B4F1620B3DD7FCE5B4E11B8578D2DE07B30174421F733BE5F3F7B66A8339208EBFE7B98FF37C
1,492,119,820 UART: [art] PUB.Y = 5F69F04101C81F1B38EE509F44AA18208166EEC3F754DB97BFAA12559C702CD873C49076C57CF7AE8C9EDAAC25D40640
1,492,126,774 UART: [art] SIG.R = 7609B9B65F2666570E9B54D1AA1A6A9D12D05FFB535C65F7DE46F27844D3C26844F14084C9F20E7F21B48C08F1ADDDE1
1,492,133,540 UART: [art] SIG.S = 52395575AE128B30C5CCBA3C53A256F542B2306D2999323756F3C71250C8CD46180D78C23B17316075120E0A87E7CBB4
1,492,156,696 UART: Caliptra RT
1,492,157,041 UART: [state] CFI Enabled
1,492,436,396 UART: [rt] RT listening for mailbox commands...
1,492,437,066 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,866,800 >>> mbox cmd response: success
1,494,880,492 UART:
1,494,880,508 UART: Running Caliptra FMC ...
1,494,880,916 UART:
1,494,881,059 UART: [state] CFI Enabled
1,494,970,082 UART: [art] Extend RT PCRs Done
1,494,970,510 UART: [art] Lock RT PCRs Done
1,494,971,701 UART: [art] Populate DV Done
1,494,980,172 UART: [fht] FMC Alias Private Key: 7
1,494,981,196 UART: [art] Derive CDI
1,494,981,476 UART: [art] Store in in slot 0x4
1,495,067,335 UART: [art] Derive Key Pair
1,495,067,695 UART: [art] Store priv key in slot 0x5
1,495,081,187 UART: [art] Derive Key Pair - Done
1,495,095,507 UART: [art] Signing Cert with AUTHO
1,495,095,987 UART: RITY.KEYID = 7
1,495,110,933 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,111,698 UART: [art] PUB.X = A6324078C042FEF9C52197943624983FB1321E0FF00B5B3BDA0B92B64AA52991FED6D5631D8A80C505C6F7EE6CE44389
1,495,118,460 UART: [art] PUB.Y = C31B92597C0885DA51218DBE427F7BB2A4A16739226A2DA1DF27479BA298E847266F87B63DE6F070E9753F6C92060D0E
1,495,125,398 UART: [art] SIG.R = 4BAA2A975378CF0688609C709268C2B68B53FB871E7202B32EB21B3CD1022B43E18B1C61C1EF626396BA19082D7C4501
1,495,132,151 UART: [art] SIG.S = 18CEACF0EB8539C94516916076D4A2BC1C369165B969E6760BAE0B88249139398B882688AB659955F0E1E9DC89024D66
1,495,155,499 UART: Caliptra RT
1,495,155,844 UART: [state] CFI Enabled
1,495,436,595 UART: [rt] RT listening for mailbox commands...
1,495,437,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,867,733 >>> mbox cmd response: success
1,497,881,099 UART:
1,497,881,115 UART: Running Caliptra FMC ...
1,497,881,523 UART:
1,497,881,666 UART: [state] CFI Enabled
1,497,971,085 UART: [art] Extend RT PCRs Done
1,497,971,513 UART: [art] Lock RT PCRs Done
1,497,972,650 UART: [art] Populate DV Done
1,497,980,873 UART: [fht] FMC Alias Private Key: 7
1,497,982,043 UART: [art] Derive CDI
1,497,982,323 UART: [art] Store in in slot 0x4
1,498,067,854 UART: [art] Derive Key Pair
1,498,068,214 UART: [art] Store priv key in slot 0x5
1,498,081,622 UART: [art] Derive Key Pair - Done
1,498,096,479 UART: [art] Signing Cert with AUTHO
1,498,096,959 UART: RITY.KEYID = 7
1,498,111,861 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,112,626 UART: [art] PUB.X = 62CF1E66A91F220EAA20B4F1620B3DD7FCE5B4E11B8578D2DE07B30174421F733BE5F3F7B66A8339208EBFE7B98FF37C
1,498,119,398 UART: [art] PUB.Y = 5F69F04101C81F1B38EE509F44AA18208166EEC3F754DB97BFAA12559C702CD873C49076C57CF7AE8C9EDAAC25D40640
1,498,126,352 UART: [art] SIG.R = 7609B9B65F2666570E9B54D1AA1A6A9D12D05FFB535C65F7DE46F27844D3C26844F14084C9F20E7F21B48C08F1ADDDE1
1,498,133,118 UART: [art] SIG.S = 52395575AE128B30C5CCBA3C53A256F542B2306D2999323756F3C71250C8CD46180D78C23B17316075120E0A87E7CBB4
1,498,157,064 UART: Caliptra RT
1,498,157,409 UART: [state] CFI Enabled
1,498,440,092 UART: [rt] RT listening for mailbox commands...
1,498,440,762 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,871,256 >>> mbox cmd response: success
1,500,884,850 UART:
1,500,884,866 UART: Running Caliptra FMC ...
1,500,885,274 UART:
1,500,885,417 UART: [state] CFI Enabled
1,500,974,364 UART: [art] Extend RT PCRs Done
1,500,974,792 UART: [art] Lock RT PCRs Done
1,500,976,097 UART: [art] Populate DV Done
1,500,984,316 UART: [fht] FMC Alias Private Key: 7
1,500,985,360 UART: [art] Derive CDI
1,500,985,640 UART: [art] Store in in slot 0x4
1,501,071,037 UART: [art] Derive Key Pair
1,501,071,397 UART: [art] Store priv key in slot 0x5
1,501,084,951 UART: [art] Derive Key Pair - Done
1,501,099,681 UART: [art] Signing Cert with AUTHO
1,501,100,161 UART: RITY.KEYID = 7
1,501,115,805 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,116,570 UART: [art] PUB.X = A6324078C042FEF9C52197943624983FB1321E0FF00B5B3BDA0B92B64AA52991FED6D5631D8A80C505C6F7EE6CE44389
1,501,123,332 UART: [art] PUB.Y = C31B92597C0885DA51218DBE427F7BB2A4A16739226A2DA1DF27479BA298E847266F87B63DE6F070E9753F6C92060D0E
1,501,130,270 UART: [art] SIG.R = 4BAA2A975378CF0688609C709268C2B68B53FB871E7202B32EB21B3CD1022B43E18B1C61C1EF626396BA19082D7C4501
1,501,137,023 UART: [art] SIG.S = 18CEACF0EB8539C94516916076D4A2BC1C369165B969E6760BAE0B88249139398B882688AB659955F0E1E9DC89024D66
1,501,160,807 UART: Caliptra RT
1,501,161,152 UART: [state] CFI Enabled
1,501,443,701 UART: [rt] RT listening for mailbox commands...
1,501,444,371 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,873,693 >>> mbox cmd response: success
1,503,886,881 UART:
1,503,886,897 UART: Running Caliptra FMC ...
1,503,887,305 UART:
1,503,887,448 UART: [state] CFI Enabled
1,503,977,161 UART: [art] Extend RT PCRs Done
1,503,977,589 UART: [art] Lock RT PCRs Done
1,503,978,828 UART: [art] Populate DV Done
1,503,986,951 UART: [fht] FMC Alias Private Key: 7
1,503,988,079 UART: [art] Derive CDI
1,503,988,359 UART: [art] Store in in slot 0x4
1,504,074,468 UART: [art] Derive Key Pair
1,504,074,828 UART: [art] Store priv key in slot 0x5
1,504,088,416 UART: [art] Derive Key Pair - Done
1,504,103,189 UART: [art] Signing Cert with AUTHO
1,504,103,669 UART: RITY.KEYID = 7
1,504,119,139 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,119,904 UART: [art] PUB.X = 62CF1E66A91F220EAA20B4F1620B3DD7FCE5B4E11B8578D2DE07B30174421F733BE5F3F7B66A8339208EBFE7B98FF37C
1,504,126,676 UART: [art] PUB.Y = 5F69F04101C81F1B38EE509F44AA18208166EEC3F754DB97BFAA12559C702CD873C49076C57CF7AE8C9EDAAC25D40640
1,504,133,630 UART: [art] SIG.R = 7609B9B65F2666570E9B54D1AA1A6A9D12D05FFB535C65F7DE46F27844D3C26844F14084C9F20E7F21B48C08F1ADDDE1
1,504,140,396 UART: [art] SIG.S = 52395575AE128B30C5CCBA3C53A256F542B2306D2999323756F3C71250C8CD46180D78C23B17316075120E0A87E7CBB4
1,504,164,076 UART: Caliptra RT
1,504,164,421 UART: [state] CFI Enabled
1,504,444,244 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 317.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
191,990 UART:
192,365 UART: Running Caliptra ROM ...
193,450 UART:
193,591 UART: [state] CFI Enabled
266,332 UART: [state] LifecycleState = Unprovisioned
268,247 UART: [state] DebugLocked = No
271,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,623 UART: [kat] SHA2-256
446,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,878 UART: [kat] ++
457,330 UART: [kat] sha1
468,557 UART: [kat] SHA2-256
471,273 UART: [kat] SHA2-384
477,211 UART: [kat] SHA2-512-ACC
479,583 UART: [kat] ECC-384
2,766,829 UART: [kat] HMAC-384Kdf
2,778,768 UART: [kat] LMS
3,969,077 UART: [kat] --
3,973,885 UART: [cold-reset] ++
3,975,477 UART: [fht] Storing FHT @ 0x50003400
3,986,537 UART: [idev] ++
3,987,105 UART: [idev] CDI.KEYID = 6
3,988,137 UART: [idev] SUBJECT.KEYID = 7
3,989,317 UART: [idev] UDS.KEYID = 0
3,990,470 ready_for_fw is high
3,990,711 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,894 UART: [idev] Erasing UDS.KEYID = 0
7,326,516 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,538 UART: [idev] --
7,352,340 UART: [ldev] ++
7,352,913 UART: [ldev] CDI.KEYID = 6
7,353,900 UART: [ldev] SUBJECT.KEYID = 5
7,355,110 UART: [ldev] AUTHORITY.KEYID = 7
7,356,339 UART: [ldev] FE.KEYID = 1
7,401,606 UART: [ldev] Erasing FE.KEYID = 1
10,735,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,044 UART: [ldev] --
13,116,015 UART: [fwproc] Waiting for Commands...
13,117,682 UART: [fwproc] Received command 0x46574c44
13,119,873 UART: [fwproc] Received Image of size 113760 bytes
17,175,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,633,919 >>> mbox cmd response: success
17,634,463 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,778,113 UART: [afmc] ++
17,778,762 UART: [afmc] CDI.KEYID = 6
17,779,654 UART: [afmc] SUBJECT.KEYID = 7
17,780,703 UART: [afmc] AUTHORITY.KEYID = 5
21,007,651 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,986 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,353 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,219 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,683 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,403 UART: [afmc] --
23,378,461 UART: [cold-reset] --
23,383,153 UART: [state] Locking Datavault
23,387,321 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,075 UART: [state] Locking ICCM
23,391,631 UART: [exit] Launching FMC @ 0x40000130
23,400,027 UART:
23,400,267 UART: Running Caliptra FMC ...
23,401,366 UART:
23,401,523 UART: [state] CFI Enabled
23,468,173 UART: [fht] FMC Alias Private Key: 7
25,806,386 UART: [art] Extend RT PCRs Done
25,807,613 UART: [art] Lock RT PCRs Done
25,809,282 UART: [art] Populate DV Done
25,814,761 UART: [fht] FMC Alias Private Key: 7
25,816,302 UART: [art] Derive CDI
25,817,038 UART: [art] Store in in slot 0x4
25,877,671 UART: [art] Derive Key Pair
25,878,689 UART: [art] Store priv key in slot 0x5
29,170,909 UART: [art] Derive Key Pair - Done
29,183,803 UART: [art] Signing Cert with AUTHO
29,185,109 UART: RITY.KEYID = 7
31,473,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,741 UART: [art] PUB.X = 4748AA69F413E642A6B7A98C62A8FC0A7D71E66272836619A3220D575C886D1A617AE96F0C7D5893BA02110E90798444
31,481,984 UART: [art] PUB.Y = 22310D48CF81ED5FFFE2EB0DDB8BBF5784167477EA9324D703DC06800EFB8DC494F52E8A542432BC0B7020DAD9FEFF1A
31,489,240 UART: [art] SIG.R = 2F129F6084BBB938C0017F7FE907257E5A7FF6FB63E4135DAA960075D4C3A35CC534ED10B1667942FF0620E826F74BF1
31,496,581 UART: [art] SIG.S = E5D1876E2619FAACB9FB002C9D897E797852482E5F5921985FFC561F00472E51760C4FE6E7375763E11CB13D97F8602B
32,801,893 UART: Caliptra RT
32,802,604 UART: [state] CFI Enabled
32,963,054 UART: [rt] RT listening for mailbox commands...
32,965,917 UART:
32,966,175 UART: Running Caliptra ROM ...
32,967,281 UART:
32,967,440 UART: [state] CFI Enabled
33,028,056 UART: [state] LifecycleState = Unprovisioned
33,029,997 UART: [state] DebugLocked = No
33,031,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,036,982 UART: [kat] SHA2-256
33,206,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,217,180 UART: [kat] ++
33,217,718 UART: [kat] sha1
33,229,477 UART: [kat] SHA2-256
33,232,172 UART: [kat] SHA2-384
33,238,912 UART: [kat] SHA2-512-ACC
33,241,258 UART: [kat] ECC-384
35,532,872 UART: [kat] HMAC-384Kdf
35,564,045 UART: [kat] LMS
36,754,380 UART: [kat] --
36,760,284 UART: [update-reset] ++
40,896,149 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,900,376 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
41,281,337 >>> mbox cmd response: success
41,283,022 UART: [update-reset] Copying MAN_2 To MAN_1
41,305,470 UART: [update-reset Success] --
41,308,834 UART: [state] Locking Datavault
41,312,681 UART: [state] Locking PCR0, PCR1 and PCR31
41,314,382 UART: [state] Locking ICCM
41,315,995 UART: [exit] Launching FMC @ 0x40000130
41,324,447 UART:
41,324,690 UART: Running Caliptra FMC ...
41,325,790 UART:
41,325,947 UART: [state] CFI Enabled
41,419,551 UART: [art] Extend RT PCRs Done
41,420,734 UART: [art] Lock RT PCRs Done
41,422,134 UART: [art] Populate DV Done
41,427,322 UART: [fht] FMC Alias Private Key: 7
41,428,934 UART: [art] Derive CDI
41,429,700 UART: [art] Store in in slot 0x4
41,488,350 UART: [art] Derive Key Pair
41,489,388 UART: [art] Store priv key in slot 0x5
44,782,475 UART: [art] Derive Key Pair - Done
44,795,644 UART: [art] Signing Cert with AUTHO
44,796,944 UART: RITY.KEYID = 7
47,084,567 UART: [art] Erasing AUTHORITY.KEYID = 7
47,086,094 UART: [art] PUB.X = 82932B572AF7CB2A9256FF7DACB094CA79DD79BBB1B49E331FE8DD3E31B4EF4C40EBBC7C16C1E0F0323B99CC44AE72E3
47,093,372 UART: [art] PUB.Y = A1C9B9A5DFE78483510EFE156FF77FC1E8E453473E051755A767824324D5417E2E2F0BB9D344F9E623A60FEFF605AB88
47,100,623 UART: [art] SIG.R = 97280709546BFD930C329FEA004C6C489CA0FD4F38F18D8A90FBF2D65266E1680A4709901AF1AF53AE06743D93FC121D
47,107,960 UART: [art] SIG.S = 97DD5B738260DFC52C38C10F2EA8B9F3E48D9E24681F5207865125893644762D2672BB88A578BAFF5D8102F39BFFA863
48,413,598 UART: Caliptra RT
48,414,295 UART: [state] CFI Enabled
48,741,030 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,807,378 ready_for_fw is high
3,807,913 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,888,616 >>> mbox cmd response: success
17,889,268 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,592,737 UART:
23,593,159 UART: Running Caliptra FMC ...
23,594,282 UART:
23,594,440 UART: [state] CFI Enabled
23,662,410 UART: [fht] FMC Alias Private Key: 7
26,000,434 UART: [art] Extend RT PCRs Done
26,001,662 UART: [art] Lock RT PCRs Done
26,003,081 UART: [art] Populate DV Done
26,008,559 UART: [fht] FMC Alias Private Key: 7
26,010,106 UART: [art] Derive CDI
26,010,929 UART: [art] Store in in slot 0x4
26,070,718 UART: [art] Derive Key Pair
26,071,762 UART: [art] Store priv key in slot 0x5
29,364,630 UART: [art] Derive Key Pair - Done
29,377,736 UART: [art] Signing Cert with AUTHO
29,379,033 UART: RITY.KEYID = 7
31,666,541 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,049 UART: [art] PUB.X = BEF1DD7BC91523FE76354FB12EFE00191E6975EFD6008D1A56574CA3113773569BFBE3AE06DC3B8590E8B0E6A743630C
31,675,256 UART: [art] PUB.Y = E3825E53214544FC9B26F5995E8FDE5A58F503C300F87D84D02DF0817978133AA6A59C8EEF335817BFF5B502FD340AEE
31,682,468 UART: [art] SIG.R = F88B6A80477D22C41C61E5729B254664C4F95C4BF86A8F6DDB5F9C178566F53029BC43DBA7FDB0F79346DF330D61C9AB
31,689,871 UART: [art] SIG.S = 744001C3186E98EDF84933B929FA96F0F87BD5EFCAA3B2D3A56F53D352C23257B7004EF83F4228E01C0D248E007F2291
32,995,586 UART: Caliptra RT
32,996,307 UART: [state] CFI Enabled
33,158,814 UART: [rt] RT listening for mailbox commands...
41,739,874 >>> mbox cmd response: success
41,774,557 UART:
41,774,832 UART: Running Caliptra FMC ...
41,775,949 UART:
41,776,126 UART: [state] CFI Enabled
41,872,852 UART: [art] Extend RT PCRs Done
41,874,033 UART: [art] Lock RT PCRs Done
41,875,432 UART: [art] Populate DV Done
41,880,802 UART: [fht] FMC Alias Private Key: 7
41,882,295 UART: [art] Derive CDI
41,883,057 UART: [art] Store in in slot 0x4
41,942,103 UART: [art] Derive Key Pair
41,943,189 UART: [art] Store priv key in slot 0x5
45,236,737 UART: [art] Derive Key Pair - Done
45,249,792 UART: [art] Signing Cert with AUTHO
45,251,094 UART: RITY.KEYID = 7
47,538,798 UART: [art] Erasing AUTHORITY.KEYID = 7
47,540,300 UART: [art] PUB.X = 681F6215009271D86579F7299FA8EDFD039B4C325A7D7B66940D88F17D94C9630E05D3BA8214C5D929DAAF64BDF848E3
47,547,504 UART: [art] PUB.Y = CBEB6EF7B1A23417BE054568FFC8AA2596B3CF1F185780468B594408D177A18D9ED8635BB9E031F08CC221084CB98E1F
47,554,798 UART: [art] SIG.R = 5DA9A7D12E18CDB782B79B9917CB0387A42C0C37B90567BBB87E7965CAA7DC2F0447E7D2F8F988CA2EA354D4FE19072F
47,562,205 UART: [art] SIG.S = 4E531D1F9AE84DC3EC593575CD50B0596DED4931512CA06AB9BDAD9936F80C9D80407C1E95F3D274B0289F74B137A310
48,868,079 UART: Caliptra RT
48,868,798 UART: [state] CFI Enabled
49,203,912 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,626 writing to cptra_bootfsm_go
192,928 UART:
193,304 UART: Running Caliptra ROM ...
194,414 UART:
604,261 UART: [state] CFI Enabled
617,303 UART: [state] LifecycleState = Unprovisioned
619,266 UART: [state] DebugLocked = No
622,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,869 UART: [kat] SHA2-256
796,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,145 UART: [kat] ++
807,620 UART: [kat] sha1
819,690 UART: [kat] SHA2-256
822,400 UART: [kat] SHA2-384
828,533 UART: [kat] SHA2-512-ACC
830,863 UART: [kat] ECC-384
3,113,642 UART: [kat] HMAC-384Kdf
3,126,402 UART: [kat] LMS
4,316,529 UART: [kat] --
4,321,757 UART: [cold-reset] ++
4,323,832 UART: [fht] Storing FHT @ 0x50003400
4,336,441 UART: [idev] ++
4,337,069 UART: [idev] CDI.KEYID = 6
4,337,976 UART: [idev] SUBJECT.KEYID = 7
4,339,214 UART: [idev] UDS.KEYID = 0
4,340,338 ready_for_fw is high
4,340,577 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,592 UART: [idev] Erasing UDS.KEYID = 0
7,627,758 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,010 UART: [idev] --
7,654,010 UART: [ldev] ++
7,654,578 UART: [ldev] CDI.KEYID = 6
7,655,534 UART: [ldev] SUBJECT.KEYID = 5
7,656,740 UART: [ldev] AUTHORITY.KEYID = 7
7,658,016 UART: [ldev] FE.KEYID = 1
7,666,473 UART: [ldev] Erasing FE.KEYID = 1
10,951,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,675 UART: [ldev] --
13,314,327 UART: [fwproc] Waiting for Commands...
13,317,663 UART: [fwproc] Received command 0x46574c44
13,319,887 UART: [fwproc] Received Image of size 113760 bytes
17,362,899 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,751 >>> mbox cmd response: success
17,827,314 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,970,293 UART: [afmc] ++
17,970,959 UART: [afmc] CDI.KEYID = 6
17,971,849 UART: [afmc] SUBJECT.KEYID = 7
17,972,887 UART: [afmc] AUTHORITY.KEYID = 5
21,147,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,420 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,692 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,099 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,917 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,360 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,905 UART: [afmc] --
23,513,145 UART: [cold-reset] --
23,517,216 UART: [state] Locking Datavault
23,521,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,132 UART: [state] Locking ICCM
23,525,037 UART: [exit] Launching FMC @ 0x40000130
23,533,428 UART:
23,533,675 UART: Running Caliptra FMC ...
23,534,698 UART:
23,534,840 UART: [state] CFI Enabled
23,542,990 UART: [fht] FMC Alias Private Key: 7
25,873,645 UART: [art] Extend RT PCRs Done
25,874,870 UART: [art] Lock RT PCRs Done
25,876,546 UART: [art] Populate DV Done
25,881,958 UART: [fht] FMC Alias Private Key: 7
25,883,550 UART: [art] Derive CDI
25,884,287 UART: [art] Store in in slot 0x4
25,926,766 UART: [art] Derive Key Pair
25,927,758 UART: [art] Store priv key in slot 0x5
29,170,425 UART: [art] Derive Key Pair - Done
29,183,311 UART: [art] Signing Cert with AUTHO
29,184,617 UART: RITY.KEYID = 7
31,464,418 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,076 UART: [art] PUB.X = FD3AC71F9C1E1E99A98920F8955738D1DEF9FAB68CF24970801AFF517084FF2DDDFF6003EFEBF34358039EDBEF210D81
31,473,189 UART: [art] PUB.Y = 16D4B4439CC40C8A0715B99B5ABACC7E0968A681C05498C105FFA9A4A2F7B28F30FA5895FF39980708F8CDC0163C5912
31,480,447 UART: [art] SIG.R = 41789238E139602514E5EBDF3121B37FBAD2A00C1BA953A0AF4DDCE3F840BED8E1AA9B693857F833017B458E8CF41E0D
31,487,813 UART: [art] SIG.S = DD33CB25B0310E5EE555815C26629AAC84637AB467ACED9B283C5976D84B6EA1E817D4A1B525DCA8E049D8AAF43EE4C3
32,792,703 UART: Caliptra RT
32,793,415 UART: [state] CFI Enabled
32,910,707 UART: [rt] RT listening for mailbox commands...
32,913,733 UART:
32,913,981 UART: Running Caliptra ROM ...
32,915,003 UART:
32,915,370 UART: [state] CFI Enabled
32,932,600 UART: [state] LifecycleState = Unprovisioned
32,934,488 UART: [state] DebugLocked = No
32,936,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,941,729 UART: [kat] SHA2-256
33,111,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,121,971 UART: [kat] ++
33,122,509 UART: [kat] sha1
33,133,880 UART: [kat] SHA2-256
33,136,612 UART: [kat] SHA2-384
33,142,643 UART: [kat] SHA2-512-ACC
33,144,986 UART: [kat] ECC-384
35,429,277 UART: [kat] HMAC-384Kdf
35,441,709 UART: [kat] LMS
36,631,743 UART: [kat] --
36,636,393 UART: [update-reset] ++
40,770,390 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,774,335 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
41,155,302 >>> mbox cmd response: success
41,156,619 UART: [update-reset] Copying MAN_2 To MAN_1
41,179,062 UART: [update-reset Success] --
41,182,971 UART: [state] Locking Datavault
41,185,700 UART: [state] Locking PCR0, PCR1 and PCR31
41,187,457 UART: [state] Locking ICCM
41,189,495 UART: [exit] Launching FMC @ 0x40000130
41,197,890 UART:
41,198,129 UART: Running Caliptra FMC ...
41,199,227 UART:
41,199,380 UART: [state] CFI Enabled
41,243,231 UART: [art] Extend RT PCRs Done
41,244,411 UART: [art] Lock RT PCRs Done
41,245,974 UART: [art] Populate DV Done
41,251,434 UART: [fht] FMC Alias Private Key: 7
41,253,126 UART: [art] Derive CDI
41,253,932 UART: [art] Store in in slot 0x4
41,296,557 UART: [art] Derive Key Pair
41,297,559 UART: [art] Store priv key in slot 0x5
44,539,893 UART: [art] Derive Key Pair - Done
44,552,689 UART: [art] Signing Cert with AUTHO
44,553,993 UART: RITY.KEYID = 7
46,834,066 UART: [art] Erasing AUTHORITY.KEYID = 7
46,835,574 UART: [art] PUB.X = 2A7BEFEFE87658665F0A770EF84042C394AC642F7ADA62D320A4D5F25B18CD1EC9B2335314B6F77A552591313CAB05AC
46,842,841 UART: [art] PUB.Y = F25CBF04169BAA79F7BB6192AB16519923C33F30863A33B966F5E0B78D7D1D2F2D74A78B015764BCDBC1D799B97EF407
46,850,097 UART: [art] SIG.R = F21DB4358BD8527EEFA5FDE94B10D347FCA64231AA7F0E7D66CC54C6A78902573B0361710A0C98DE7151025B4A55924C
46,857,481 UART: [art] SIG.S = B760DE984333AE8AA702FCCE28A5EDDAC66BFB8F75F863F50D85212C1079396289EDF8FAD989A61C1403AF987782A385
48,162,955 UART: Caliptra RT
48,163,652 UART: [state] CFI Enabled
48,449,051 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,592 writing to cptra_bootfsm_go
4,129,940 ready_for_fw is high
4,130,335 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,067,619 >>> mbox cmd response: success
18,068,411 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,707,666 UART:
23,708,090 UART: Running Caliptra FMC ...
23,709,194 UART:
23,709,345 UART: [state] CFI Enabled
23,717,418 UART: [fht] FMC Alias Private Key: 7
26,048,399 UART: [art] Extend RT PCRs Done
26,049,624 UART: [art] Lock RT PCRs Done
26,051,364 UART: [art] Populate DV Done
26,057,061 UART: [fht] FMC Alias Private Key: 7
26,058,552 UART: [art] Derive CDI
26,059,313 UART: [art] Store in in slot 0x4
26,101,942 UART: [art] Derive Key Pair
26,102,990 UART: [art] Store priv key in slot 0x5
29,345,217 UART: [art] Derive Key Pair - Done
29,358,003 UART: [art] Signing Cert with AUTHO
29,359,314 UART: RITY.KEYID = 7
31,638,815 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,322 UART: [art] PUB.X = A58F0D893EB62E6073C175166B072985F467192D671A7BE58E6A080E74CE35BAFEC653AB8FF961407F880611EC3880BD
31,647,551 UART: [art] PUB.Y = D7AF368C4F2A96054D08CB5B0B4930B62F1037E3F85E233C36E12893414E3795CDFCF6683785268FF911B30B774961FC
31,654,790 UART: [art] SIG.R = 62432116A03D3367670B65C288721E365FBA4B5ECD1BA4BF2833F15CD1F32C62B786966F1D282C8285CC8F218A295FF4
31,662,125 UART: [art] SIG.S = CEAA592B1658E89332DF571375871D004D3A4D3D3F01632A0B52F229DB6FBB7562C55A721E204146B2637ECBC510DCE2
32,966,564 UART: Caliptra RT
32,967,275 UART: [state] CFI Enabled
33,085,101 UART: [rt] RT listening for mailbox commands...
41,600,745 >>> mbox cmd response: success
41,636,760 UART:
41,637,060 UART: Running Caliptra FMC ...
41,638,205 UART:
41,638,365 UART: [state] CFI Enabled
41,682,115 UART: [art] Extend RT PCRs Done
41,683,476 UART: [art] Lock RT PCRs Done
41,684,675 UART: [art] Populate DV Done
41,690,053 UART: [fht] FMC Alias Private Key: 7
41,691,595 UART: [art] Derive CDI
41,692,407 UART: [art] Store in in slot 0x4
41,734,900 UART: [art] Derive Key Pair
41,735,894 UART: [art] Store priv key in slot 0x5
44,977,930 UART: [art] Derive Key Pair - Done
44,991,049 UART: [art] Signing Cert with AUTHO
44,992,357 UART: RITY.KEYID = 7
47,271,722 UART: [art] Erasing AUTHORITY.KEYID = 7
47,273,232 UART: [art] PUB.X = 6FC879F07BE1B884B1E5C91C7C96C6B568171533C374870C7C1B8EF980470ABCD0E8BA726C42877DEE2BD19A237C1F2C
47,280,465 UART: [art] PUB.Y = AD8F0B2E62A1BD110F82F67B29B904DBC7771C40FF3D28804F4CAB34D500144B1A1C7FE7198E7E0F188A1DB9E666077A
47,287,735 UART: [art] SIG.R = F6F2C886847B6071560DD579168BDA9165134AC6BDA66533BCF7E7159F91DA035EE09738567B9C068B14BC35FC37AF7A
47,295,136 UART: [art] SIG.S = 6CA3A230728F2D765C2B101C388FF9D156C09EF37DC03DBA9A444BFB98B50B6612F970D3E7CFDD5C884B96F6575CD69A
48,600,562 UART: Caliptra RT
48,601,271 UART: [state] CFI Enabled
48,887,972 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,628 writing to cptra_bootfsm_go
192,875 UART:
193,256 UART: Running Caliptra ROM ...
194,440 UART:
194,612 UART: [state] CFI Enabled
257,305 UART: [state] LifecycleState = Unprovisioned
259,185 UART: [state] DebugLocked = No
261,780 UART: [state] WD Timer not started. Device not locked for debugging
265,978 UART: [kat] SHA2-256
445,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,702 UART: [kat] ++
457,228 UART: [kat] sha1
468,064 UART: [kat] SHA2-256
471,033 UART: [kat] SHA2-384
477,025 UART: [kat] SHA2-512-ACC
479,958 UART: [kat] ECC-384
2,941,314 UART: [kat] HMAC-384Kdf
2,966,320 UART: [kat] LMS
3,495,848 UART: [kat] --
3,500,288 UART: [cold-reset] ++
3,502,048 UART: [fht] FHT @ 0x50003400
3,513,181 UART: [idev] ++
3,513,747 UART: [idev] CDI.KEYID = 6
3,514,706 UART: [idev] SUBJECT.KEYID = 7
3,515,872 UART: [idev] UDS.KEYID = 0
3,516,881 ready_for_fw is high
3,517,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,661,434 UART: [idev] Erasing UDS.KEYID = 0
6,018,817 UART: [idev] Sha1 KeyId Algorithm
6,043,134 UART: [idev] --
6,046,804 UART: [ldev] ++
6,047,376 UART: [ldev] CDI.KEYID = 6
6,048,288 UART: [ldev] SUBJECT.KEYID = 5
6,049,499 UART: [ldev] AUTHORITY.KEYID = 7
6,050,729 UART: [ldev] FE.KEYID = 1
6,095,898 UART: [ldev] Erasing FE.KEYID = 1
8,601,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,447 UART: [ldev] --
10,410,627 UART: [fwproc] Wait for Commands...
10,412,776 UART: [fwproc] Recv command 0x46574c44
10,414,863 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,278,308 >>> mbox cmd response: success
14,283,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,427,638 UART: [afmc] ++
14,428,286 UART: [afmc] CDI.KEYID = 6
14,429,373 UART: [afmc] SUBJECT.KEYID = 7
14,430,474 UART: [afmc] AUTHORITY.KEYID = 5
16,825,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,675 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,358 UART: [afmc] --
18,624,606 UART: [cold-reset] --
18,628,528 UART: [state] Locking Datavault
18,633,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,702 UART: [state] Locking ICCM
18,637,907 UART: [exit] Launching FMC @ 0x40000130
18,646,297 UART:
18,646,527 UART: Running Caliptra FMC ...
18,647,625 UART:
18,647,783 UART: [state] CFI Enabled
18,706,841 UART: [fht] FMC Alias Private Key: 7
20,470,309 UART: [art] Extend RT PCRs Done
20,471,533 UART: [art] Lock RT PCRs Done
20,473,397 UART: [art] Populate DV Done
20,478,856 UART: [fht] FMC Alias Private Key: 7
20,480,447 UART: [art] Derive CDI
20,481,260 UART: [art] Store in in slot 0x4
20,538,547 UART: [art] Derive Key Pair
20,539,586 UART: [art] Store priv key in slot 0x5
23,002,292 UART: [art] Derive Key Pair - Done
23,015,423 UART: [art] Signing Cert with AUTHO
23,016,733 UART: RITY.KEYID = 7
24,727,586 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,095 UART: [art] PUB.X = D0AABB50ADB310717B097C687382151D99A0CC1F3495384742DA5FDD904E44D003C93BAAB14AF1C8EB112C5D8C10A7F0
24,736,391 UART: [art] PUB.Y = B23778123877136BF10307A876BE769D0855D1A57F4B84B277356A1BB92AED653A2927A38245852838AF352A0008A2C4
24,743,603 UART: [art] SIG.R = 885A9D669097DDBD60EB67BAFBDBEAD7421B0F49C6034E8C27A935DDF5DA662C7F352068585B55CAAC53998F1ED5EA0E
24,750,977 UART: [art] SIG.S = AA63F250894B3E3749A0A447AD0092A6A181A274003BCD4545EF0750BEC7766E37A8070354EC12BE24128AC37A771CD9
25,729,629 UART: Caliptra RT
25,730,331 UART: [state] CFI Enabled
25,894,664 UART: [rt] RT listening for mailbox commands...
25,897,782 UART:
25,897,943 UART: Running Caliptra ROM ...
25,899,160 UART:
25,899,321 UART: [state] CFI Enabled
25,962,784 UART: [state] LifecycleState = Unprovisioned
25,964,688 UART: [state] DebugLocked = No
25,966,250 UART: [state] WD Timer not started. Device not locked for debugging
25,969,621 UART: [kat] SHA2-256
26,148,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,160,287 UART: [kat] ++
26,160,739 UART: [kat] sha1
26,171,674 UART: [kat] SHA2-256
26,174,734 UART: [kat] SHA2-384
26,181,574 UART: [kat] SHA2-512-ACC
26,184,518 UART: [kat] ECC-384
28,647,133 UART: [kat] HMAC-384Kdf
28,669,239 UART: [kat] LMS
29,198,703 UART: [kat] --
29,203,035 UART: [update-reset] ++
32,628,086 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,631,298 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
33,013,366 >>> mbox cmd response: success
33,014,116 UART: [update-reset] Copying MAN_2 To MAN_1
33,036,469 UART: [update-reset Success] --
33,041,227 UART: [state] Locking Datavault
33,043,622 UART: [state] Locking PCR0, PCR1 and PCR31
33,045,273 UART: [state] Locking ICCM
33,046,503 UART: [exit] Launching FMC @ 0x40000130
33,054,901 UART:
33,055,131 UART: Running Caliptra FMC ...
33,056,231 UART:
33,056,389 UART: [state] CFI Enabled
33,158,936 UART: [art] Extend RT PCRs Done
33,160,122 UART: [art] Lock RT PCRs Done
33,161,739 UART: [art] Populate DV Done
33,167,248 UART: [fht] FMC Alias Private Key: 7
33,168,832 UART: [art] Derive CDI
33,169,644 UART: [art] Store in in slot 0x4
33,227,404 UART: [art] Derive Key Pair
33,228,440 UART: [art] Store priv key in slot 0x5
35,691,353 UART: [art] Derive Key Pair - Done
35,704,656 UART: [art] Signing Cert with AUTHO
35,705,963 UART: RITY.KEYID = 7
37,416,932 UART: [art] Erasing AUTHORITY.KEYID = 7
37,418,571 UART: [art] PUB.X = 3BC6FD21779469A941ACEA5126764CC708F39A13A24A66AC61036C2C9C596044ABB7EC30F4AB412A8A7CEACEEE586BBA
37,425,692 UART: [art] PUB.Y = A7BC01465DFA1997BCD16CE83C5633E34BA8BF85389C65502A000B7D22F33776AAD85566382F41A8DFDFE787F2A485F4
37,432,970 UART: [art] SIG.R = 2ABA320096382D1688CE7D469240DFB4CB868770044F2EA6E1AD95FF3E23F4D8A11897737D95A2F498DC8AC031FCD9D1
37,440,328 UART: [art] SIG.S = 9C7450A1E9AD5D2A19AEC55CA4775C4ACE950CAFC9C23BA3FAA7F480E9B9939FFB67A6A9D3C7C46589EB0BF57AB682CD
38,418,600 UART: Caliptra RT
38,419,318 UART: [state] CFI Enabled
38,757,263 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
3,382,881 ready_for_fw is high
3,383,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,068,549 >>> mbox cmd response: success
14,073,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,367,190 UART:
18,367,614 UART: Running Caliptra FMC ...
18,368,719 UART:
18,368,872 UART: [state] CFI Enabled
18,433,701 UART: [fht] FMC Alias Private Key: 7
20,197,732 UART: [art] Extend RT PCRs Done
20,198,951 UART: [art] Lock RT PCRs Done
20,200,601 UART: [art] Populate DV Done
20,205,898 UART: [fht] FMC Alias Private Key: 7
20,207,486 UART: [art] Derive CDI
20,208,218 UART: [art] Store in in slot 0x4
20,266,751 UART: [art] Derive Key Pair
20,267,809 UART: [art] Store priv key in slot 0x5
22,730,414 UART: [art] Derive Key Pair - Done
22,743,364 UART: [art] Signing Cert with AUTHO
22,744,666 UART: RITY.KEYID = 7
24,456,078 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,588 UART: [art] PUB.X = 33C63B213D811D926C521EF42F7F6EB1373FC7F3C034B7FB2E928C82C706CC7745A6655A6ED8085A209B08EC766E7AE5
24,464,876 UART: [art] PUB.Y = 9347DEC659D7B3C3238F378ED6972C9FFAC8163CC7230BD5FBDF3A010C179DEC788E2485F48344B314148CA5141C9DD6
24,472,167 UART: [art] SIG.R = 01D6371CB3A5B196BFA6C06AABECFC865AFF85CC9FE7971D6705A9902957884BEB80D85B0895CA4DE4D55A229033E696
24,479,740 UART: [art] SIG.S = 83279619E311C19744358D8BB647557A93F9D8924DD804AE4A244C3193AFA94E022D31DDED521D13A1AA462B5739E6AF
25,458,310 UART: Caliptra RT
25,459,007 UART: [state] CFI Enabled
25,626,263 UART: [rt] RT listening for mailbox commands...
32,617,636 >>> mbox cmd response: success
32,653,219 UART:
32,653,514 UART: Running Caliptra FMC ...
32,654,633 UART:
32,654,812 UART: [state] CFI Enabled
32,741,160 UART: [art] Extend RT PCRs Done
32,742,359 UART: [art] Lock RT PCRs Done
32,743,569 UART: [art] Populate DV Done
32,749,175 UART: [fht] FMC Alias Private Key: 7
32,750,877 UART: [art] Derive CDI
32,751,612 UART: [art] Store in in slot 0x4
32,810,726 UART: [art] Derive Key Pair
32,811,763 UART: [art] Store priv key in slot 0x5
35,276,037 UART: [art] Derive Key Pair - Done
35,288,885 UART: [art] Signing Cert with AUTHO
35,290,221 UART: RITY.KEYID = 7
37,000,703 UART: [art] Erasing AUTHORITY.KEYID = 7
37,002,211 UART: [art] PUB.X = 821F3FC7DCC25E6AE522FB7A108C1A95DF336A999B6B01E3DB5CABEB97518EEA1FA67701258AA821C2D3F72A0C46F4DB
37,009,489 UART: [art] PUB.Y = 183DFA9C5C5BA4A67F27AA5F213946C2DFC9D1AAC461912098EC7E1D889E054F972D365C266FE7483CA08ED0F70E0190
37,016,766 UART: [art] SIG.R = 5817106F00A19C33535D18AB47BEE453AFA054C6C01EFB9E9B6D9E61B6F1BB14BBC74308081AB32406BF9A3AF81CE3F9
37,024,204 UART: [art] SIG.S = 91507531237B6370B88188CF9A843B4BF8EFD06D4EBF4BEE5F56D80E086DF2D8D34D0FAD3169C75E53D3BCF5F9F4C474
38,003,015 UART: Caliptra RT
38,003,722 UART: [state] CFI Enabled
38,343,735 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,894 writing to cptra_bootfsm_go
193,162 UART:
193,539 UART: Running Caliptra ROM ...
194,621 UART:
604,378 UART: [state] CFI Enabled
617,176 UART: [state] LifecycleState = Unprovisioned
619,054 UART: [state] DebugLocked = No
622,013 UART: [state] WD Timer not started. Device not locked for debugging
625,498 UART: [kat] SHA2-256
804,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,196 UART: [kat] ++
816,735 UART: [kat] sha1
826,768 UART: [kat] SHA2-256
829,777 UART: [kat] SHA2-384
835,488 UART: [kat] SHA2-512-ACC
838,445 UART: [kat] ECC-384
3,275,499 UART: [kat] HMAC-384Kdf
3,287,740 UART: [kat] LMS
3,817,223 UART: [kat] --
3,821,295 UART: [cold-reset] ++
3,823,156 UART: [fht] FHT @ 0x50003400
3,833,707 UART: [idev] ++
3,834,275 UART: [idev] CDI.KEYID = 6
3,835,309 UART: [idev] SUBJECT.KEYID = 7
3,836,415 UART: [idev] UDS.KEYID = 0
3,837,359 ready_for_fw is high
3,837,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,981,052 UART: [idev] Erasing UDS.KEYID = 0
6,308,099 UART: [idev] Sha1 KeyId Algorithm
6,331,818 UART: [idev] --
6,334,626 UART: [ldev] ++
6,335,221 UART: [ldev] CDI.KEYID = 6
6,336,115 UART: [ldev] SUBJECT.KEYID = 5
6,337,244 UART: [ldev] AUTHORITY.KEYID = 7
6,338,586 UART: [ldev] FE.KEYID = 1
6,348,943 UART: [ldev] Erasing FE.KEYID = 1
8,825,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,497 UART: [ldev] --
10,615,777 UART: [fwproc] Wait for Commands...
10,618,693 UART: [fwproc] Recv command 0x46574c44
10,620,738 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,482,016 >>> mbox cmd response: success
14,486,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,630,703 UART: [afmc] ++
14,631,367 UART: [afmc] CDI.KEYID = 6
14,632,257 UART: [afmc] SUBJECT.KEYID = 7
14,633,310 UART: [afmc] AUTHORITY.KEYID = 5
16,987,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,085 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,405 UART: [afmc] --
18,781,365 UART: [cold-reset] --
18,783,717 UART: [state] Locking Datavault
18,791,392 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,100 UART: [state] Locking ICCM
18,794,253 UART: [exit] Launching FMC @ 0x40000130
18,802,646 UART:
18,802,883 UART: Running Caliptra FMC ...
18,803,987 UART:
18,804,145 UART: [state] CFI Enabled
18,812,757 UART: [fht] FMC Alias Private Key: 7
20,569,864 UART: [art] Extend RT PCRs Done
20,571,085 UART: [art] Lock RT PCRs Done
20,572,636 UART: [art] Populate DV Done
20,578,047 UART: [fht] FMC Alias Private Key: 7
20,579,664 UART: [art] Derive CDI
20,580,402 UART: [art] Store in in slot 0x4
20,622,948 UART: [art] Derive Key Pair
20,623,988 UART: [art] Store priv key in slot 0x5
23,050,342 UART: [art] Derive Key Pair - Done
23,063,179 UART: [art] Signing Cert with AUTHO
23,064,487 UART: RITY.KEYID = 7
24,769,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,478 UART: [art] PUB.X = 807A7996E4466A32DC55590B9E77CAA2C750C838691D4E09262D7D0E3F56AA922A1E8C0CED90446AA5518DD0E2294EB5
24,778,753 UART: [art] PUB.Y = A663A900DE28672974827EBD73149A1C4C3902E48DF718A63E159D4CFB276AAF68CFF947F385178A0C15BE4F458E2664
24,786,014 UART: [art] SIG.R = 40D027D668DE877A44F218FB266A93D25F04E14B9C0D80F22ADB232516386B6BC484BA1DC207910DC18A10E5047E8676
24,793,397 UART: [art] SIG.S = 2E3E76EBC23315A244F33DD44269B4524E9E00A7BE1A34BA2846CFB91464D0965D7D5A004B3F62551DF205897625270C
25,772,147 UART: Caliptra RT
25,772,865 UART: [state] CFI Enabled
25,890,812 UART: [rt] RT listening for mailbox commands...
25,893,822 UART:
25,894,014 UART: Running Caliptra ROM ...
25,895,045 UART:
25,895,362 UART: [state] CFI Enabled
25,911,195 UART: [state] LifecycleState = Unprovisioned
25,913,094 UART: [state] DebugLocked = No
25,915,554 UART: [state] WD Timer not started. Device not locked for debugging
25,918,594 UART: [kat] SHA2-256
26,097,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,109,309 UART: [kat] ++
26,109,850 UART: [kat] sha1
26,121,767 UART: [kat] SHA2-256
26,124,831 UART: [kat] SHA2-384
26,130,079 UART: [kat] SHA2-512-ACC
26,133,031 UART: [kat] ECC-384
28,573,330 UART: [kat] HMAC-384Kdf
28,585,931 UART: [kat] LMS
29,115,443 UART: [kat] --
29,118,675 UART: [update-reset] ++
32,539,332 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,542,974 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
32,925,052 >>> mbox cmd response: success
32,926,318 UART: [update-reset] Copying MAN_2 To MAN_1
32,948,623 UART: [update-reset Success] --
32,952,002 UART: [state] Locking Datavault
32,956,019 UART: [state] Locking PCR0, PCR1 and PCR31
32,957,668 UART: [state] Locking ICCM
32,959,468 UART: [exit] Launching FMC @ 0x40000130
32,967,865 UART:
32,968,106 UART: Running Caliptra FMC ...
32,969,133 UART:
32,969,280 UART: [state] CFI Enabled
33,013,406 UART: [art] Extend RT PCRs Done
33,014,613 UART: [art] Lock RT PCRs Done
33,016,099 UART: [art] Populate DV Done
33,021,675 UART: [fht] FMC Alias Private Key: 7
33,023,319 UART: [art] Derive CDI
33,024,059 UART: [art] Store in in slot 0x4
33,066,765 UART: [art] Derive Key Pair
33,067,770 UART: [art] Store priv key in slot 0x5
35,493,898 UART: [art] Derive Key Pair - Done
35,507,199 UART: [art] Signing Cert with AUTHO
35,508,510 UART: RITY.KEYID = 7
37,213,964 UART: [art] Erasing AUTHORITY.KEYID = 7
37,215,476 UART: [art] PUB.X = 35FEBA1A6CF662E5D61B868389019475DA332E393ACECFF6A0DE50039B5041B4CD6E087C35B72CF45064E5D4815ABEBE
37,222,759 UART: [art] PUB.Y = 45EAA1FD7CCC866FE6E711EDA5B40795C5039851D349AF0918F29FEA1ADE82850591AE37B9F079045F100E8DE809DA5C
37,230,032 UART: [art] SIG.R = 9DD290DE87DC6AA5323725E3C31D2B9BDA2D8D242C71151A871B9F431D61B936821D96F2F3ED89D9960267F49CED42E8
37,237,456 UART: [art] SIG.S = 292A30879A9C3F0537A80BB97DE9D47D71ABF23791016BE6519AD3D4E194226031FFE724CBAD55CFDD2BC7D6AF9C3917
38,216,226 UART: Caliptra RT
38,216,967 UART: [state] CFI Enabled
38,500,302 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,909 writing to cptra_bootfsm_go
3,693,936 ready_for_fw is high
3,694,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,740 >>> mbox cmd response: success
14,276,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,524,524 UART:
18,524,954 UART: Running Caliptra FMC ...
18,526,154 UART:
18,526,349 UART: [state] CFI Enabled
18,534,507 UART: [fht] FMC Alias Private Key: 7
20,291,101 UART: [art] Extend RT PCRs Done
20,292,326 UART: [art] Lock RT PCRs Done
20,294,128 UART: [art] Populate DV Done
20,299,811 UART: [fht] FMC Alias Private Key: 7
20,301,358 UART: [art] Derive CDI
20,302,173 UART: [art] Store in in slot 0x4
20,344,831 UART: [art] Derive Key Pair
20,345,840 UART: [art] Store priv key in slot 0x5
22,772,439 UART: [art] Derive Key Pair - Done
22,785,486 UART: [art] Signing Cert with AUTHO
22,786,794 UART: RITY.KEYID = 7
24,492,293 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,806 UART: [art] PUB.X = 4D6356A59BABC739E763E28C8E277D58A56232A7038CA6E5E662EA9EDE9099921804E908BFC918A760D8E0BB671F234F
24,501,090 UART: [art] PUB.Y = 81977DF1E2BA6E2732157C096F1A5DEBFAEA8B75D7D8BEF935E66A1BF64642EBE40350E1DB3CA879D8680A7E98A69A3F
24,508,385 UART: [art] SIG.R = 9FE7369A647459C5F260AA7ADE6162A24EC036453A1E9F96BFBF07B7FFF13071C8FF1200BF74FBAA90DD0B8AC0169421
24,515,754 UART: [art] SIG.S = D0E576C7A0707294E9F4F9533FDDB05AFC8016D8E5396272124C7CDFA318C25F1BB215E2E37DC53E22C40591D3D8C65C
25,494,775 UART: Caliptra RT
25,495,480 UART: [state] CFI Enabled
25,613,728 UART: [rt] RT listening for mailbox commands...
32,517,986 >>> mbox cmd response: success
32,551,606 UART:
32,551,902 UART: Running Caliptra FMC ...
32,552,940 UART:
32,553,089 UART: [state] CFI Enabled
32,596,683 UART: [art] Extend RT PCRs Done
32,597,831 UART: [art] Lock RT PCRs Done
32,599,254 UART: [art] Populate DV Done
32,604,561 UART: [fht] FMC Alias Private Key: 7
32,606,160 UART: [art] Derive CDI
32,606,901 UART: [art] Store in in slot 0x4
32,649,658 UART: [art] Derive Key Pair
32,650,697 UART: [art] Store priv key in slot 0x5
35,077,988 UART: [art] Derive Key Pair - Done
35,090,987 UART: [art] Signing Cert with AUTHO
35,092,325 UART: RITY.KEYID = 7
36,797,734 UART: [art] Erasing AUTHORITY.KEYID = 7
36,799,287 UART: [art] PUB.X = 732043516BA905A0ED610BC902AADA0C3B42A0CC0324C9BC82B2666EF5686142F0C68283B01F79B90B057B614B1C8511
36,806,552 UART: [art] PUB.Y = 6B885679BCD9D2F52C618D61A6C6B84FD4AE6B7AEC1DA44742791A6A98E7D927A8CE8CD83C21399FB8875FDB879306AA
36,813,773 UART: [art] SIG.R = 8BF37CE893127E05B54308A50A193228FA6CB2C783B053F2C8223E9C2C168544606A6325F528A7984A16843F5413466E
36,821,147 UART: [art] SIG.S = CEE5FBCF7F102BED86E5DC6FD65AEC082CCF7DB800E2665D84042558161C066810078DB7DA0D7392A9BC1A960C1BA2EF
37,799,550 UART: Caliptra RT
37,800,249 UART: [state] CFI Enabled
38,089,967 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,378 UART:
192,759 UART: Running Caliptra ROM ...
193,888 UART:
194,031 UART: [state] CFI Enabled
263,536 UART: [state] LifecycleState = Unprovisioned
265,969 UART: [state] DebugLocked = No
268,071 UART: [state] WD Timer not started. Device not locked for debugging
272,765 UART: [kat] SHA2-256
462,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,469 UART: [kat] ++
473,943 UART: [kat] sha1
485,423 UART: [kat] SHA2-256
488,436 UART: [kat] SHA2-384
494,423 UART: [kat] SHA2-512-ACC
497,073 UART: [kat] ECC-384
2,949,982 UART: [kat] HMAC-384Kdf
2,972,339 UART: [kat] LMS
3,504,101 UART: [kat] --
3,508,849 UART: [cold-reset] ++
3,510,859 UART: [fht] FHT @ 0x50003400
3,521,696 UART: [idev] ++
3,522,333 UART: [idev] CDI.KEYID = 6
3,523,471 UART: [idev] SUBJECT.KEYID = 7
3,524,578 UART: [idev] UDS.KEYID = 0
3,525,516 ready_for_fw is high
3,525,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,356 UART: [idev] Erasing UDS.KEYID = 0
6,028,622 UART: [idev] Sha1 KeyId Algorithm
6,050,908 UART: [idev] --
6,055,691 UART: [ldev] ++
6,056,387 UART: [ldev] CDI.KEYID = 6
6,057,305 UART: [ldev] SUBJECT.KEYID = 5
6,058,430 UART: [ldev] AUTHORITY.KEYID = 7
6,059,684 UART: [ldev] FE.KEYID = 1
6,100,473 UART: [ldev] Erasing FE.KEYID = 1
8,609,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,733 UART: [ldev] --
10,412,993 UART: [fwproc] Wait for Commands...
10,414,543 UART: [fwproc] Recv command 0x46574c44
10,416,879 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,351 >>> mbox cmd response: success
14,596,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,740,990 UART: [afmc] ++
14,741,634 UART: [afmc] CDI.KEYID = 6
14,742,528 UART: [afmc] SUBJECT.KEYID = 7
14,743,579 UART: [afmc] AUTHORITY.KEYID = 5
17,156,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,930 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,672 UART: [afmc] --
18,973,749 UART: [cold-reset] --
18,977,021 UART: [state] Locking Datavault
18,981,474 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,625 UART: [state] Locking ICCM
18,985,651 UART: [exit] Launching FMC @ 0x40000130
18,994,331 UART:
18,994,567 UART: Running Caliptra FMC ...
18,995,592 UART:
18,995,735 UART: [state] CFI Enabled
19,054,480 UART: [fht] FMC Alias Private Key: 7
20,819,261 UART: [art] Extend RT PCRs Done
20,820,482 UART: [art] Lock RT PCRs Done
20,822,508 UART: [art] Populate DV Done
20,828,087 UART: [fht] FMC Alias Private Key: 7
20,829,732 UART: [art] Derive CDI
20,830,562 UART: [art] Store in in slot 0x4
20,887,643 UART: [art] Derive Key Pair
20,888,683 UART: [art] Store priv key in slot 0x5
23,351,136 UART: [art] Derive Key Pair - Done
23,364,348 UART: [art] Signing Cert with AUTHO
23,365,654 UART: RITY.KEYID = 7
25,077,760 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,270 UART: [art] PUB.X = BC5B9ED08877D1D5E7CC87CC92373E1E0F80DBBA9169E3EB8CC37229D2C4C4CF90BA7AF1A8A9881A6A7ED0AB5BC8F275
25,086,549 UART: [art] PUB.Y = A10E3D6088C27EB5BE61007510FC2047E64328EFD21A4776EE382A7B8719E5796F981AED376E5C0F304C27A57E568C4F
25,093,808 UART: [art] SIG.R = DEA7283F9FB5D75A1C83C33EA77D082A955B9401AC666DA0AFDC987E9AA04EE75C1A3439937F2DD83A51ECB779E89720
25,101,190 UART: [art] SIG.S = 950BA280BBF85F029FFA27DB31FDD92380A0711A891A8BB9F9F643E281D99D6204A481E0C1B5ACEC7338A4765355B019
26,080,606 UART: Caliptra RT
26,081,320 UART: [state] CFI Enabled
26,246,145 UART: [rt] RT listening for mailbox commands...
26,249,369 UART:
26,249,620 UART: Running Caliptra ROM ...
26,250,744 UART:
26,250,901 UART: [state] CFI Enabled
26,312,308 UART: [state] LifecycleState = Unprovisioned
26,314,351 UART: [state] DebugLocked = No
26,316,660 UART: [state] WD Timer not started. Device not locked for debugging
26,321,654 UART: [kat] SHA2-256
26,511,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,522,329 UART: [kat] ++
26,522,820 UART: [kat] sha1
26,534,303 UART: [kat] SHA2-256
26,537,308 UART: [kat] SHA2-384
26,543,302 UART: [kat] SHA2-512-ACC
26,545,881 UART: [kat] ECC-384
29,000,302 UART: [kat] HMAC-384Kdf
29,023,709 UART: [kat] LMS
29,555,288 UART: [kat] --
29,559,507 UART: [update-reset] ++
33,021,138 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,024,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
33,630,130 >>> mbox cmd response: success
33,631,056 UART: [update-reset] Copying MAN_2 To MAN_1
33,668,640 UART: [update-reset Success] --
33,672,518 UART: [state] Locking Datavault
33,675,202 UART: [state] Locking PCR0, PCR1 and PCR31
33,677,360 UART: [state] Locking ICCM
33,679,250 UART: [exit] Launching FMC @ 0x40000130
33,687,878 UART:
33,688,107 UART: Running Caliptra FMC ...
33,689,206 UART:
33,689,367 UART: [state] CFI Enabled
33,790,134 UART: [art] Extend RT PCRs Done
33,791,333 UART: [art] Lock RT PCRs Done
33,792,968 UART: [art] Populate DV Done
33,798,321 UART: [fht] FMC Alias Private Key: 7
33,799,916 UART: [art] Derive CDI
33,800,727 UART: [art] Store in in slot 0x4
33,859,554 UART: [art] Derive Key Pair
33,860,586 UART: [art] Store priv key in slot 0x5
36,323,215 UART: [art] Derive Key Pair - Done
36,336,242 UART: [art] Signing Cert with AUTHO
36,337,543 UART: RITY.KEYID = 7
38,049,426 UART: [art] Erasing AUTHORITY.KEYID = 7
38,050,933 UART: [art] PUB.X = 4F107E863E56A19A4F36450946D94652C59909597428F3AB9AED846D6C04B2BA2FFE5AE360FC612C11C48A0796EA80E9
38,058,156 UART: [art] PUB.Y = F191F27E61AA333B285468E6630B93677CE636DC0AA2B8B3B108614C13A6F3B40AE1BE049828D7DBC4760CC928B1C1E0
38,065,419 UART: [art] SIG.R = 412E56B52FE1B0B020BAC0F5A80B819E6EB59A1C71A01ACC8384A98A7CF7EAEBFBD3959D2EB52B68B411502D8FFA6783
38,072,837 UART: [art] SIG.S = B2F9C15BAC14616CE895DAA28849F3CF325AB8159C0E9237A90D9A770608F84781AF3C326D4E4362C61DCFDDE72971B0
39,051,579 UART: Caliptra RT
39,052,292 UART: [state] CFI Enabled
39,385,699 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,439,176 ready_for_fw is high
3,439,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,699,253 >>> mbox cmd response: success
14,699,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,002,432 UART:
19,002,846 UART: Running Caliptra FMC ...
19,004,022 UART:
19,004,190 UART: [state] CFI Enabled
19,073,887 UART: [fht] FMC Alias Private Key: 7
20,837,290 UART: [art] Extend RT PCRs Done
20,838,519 UART: [art] Lock RT PCRs Done
20,840,250 UART: [art] Populate DV Done
20,845,605 UART: [fht] FMC Alias Private Key: 7
20,847,246 UART: [art] Derive CDI
20,848,058 UART: [art] Store in in slot 0x4
20,906,275 UART: [art] Derive Key Pair
20,907,320 UART: [art] Store priv key in slot 0x5
23,370,343 UART: [art] Derive Key Pair - Done
23,383,509 UART: [art] Signing Cert with AUTHO
23,384,833 UART: RITY.KEYID = 7
25,096,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,201 UART: [art] PUB.X = 4905A973D29745026F4C2B072BABF9431A7387F3D0CD6BA1231DF416EB75EEC400BBED570808B50A46448C9373A20115
25,105,304 UART: [art] PUB.Y = 5BB0DFCAF882A8A810F412019B4A5903F6778BF7AB856669E6937D2C1D36AF0A40B59CE4480A40F4C4FFA5E7053F79CC
25,112,526 UART: [art] SIG.R = 9F4F9A8892A868DC4EA5ED3E93D9A9699DE1623655BFAEF0EBAD2BFE73BDD9536055C0712D3C101B127A57CB1616C70D
25,119,971 UART: [art] SIG.S = A7AACF273579F366611AEC67768FE68FD8ED15E03F28C2E5F4E4DB78CBD251EE73F0698F47047584A32BE20C6013D680
26,098,915 UART: Caliptra RT
26,099,641 UART: [state] CFI Enabled
26,263,885 UART: [rt] RT listening for mailbox commands...
33,928,080 >>> mbox cmd response: success
33,963,331 UART:
33,963,607 UART: Running Caliptra FMC ...
33,964,716 UART:
33,964,873 UART: [state] CFI Enabled
34,060,469 UART: [art] Extend RT PCRs Done
34,061,654 UART: [art] Lock RT PCRs Done
34,063,105 UART: [art] Populate DV Done
34,068,705 UART: [fht] FMC Alias Private Key: 7
34,070,354 UART: [art] Derive CDI
34,071,095 UART: [art] Store in in slot 0x4
34,129,812 UART: [art] Derive Key Pair
34,130,810 UART: [art] Store priv key in slot 0x5
36,593,446 UART: [art] Derive Key Pair - Done
36,606,126 UART: [art] Signing Cert with AUTHO
36,607,422 UART: RITY.KEYID = 7
38,318,495 UART: [art] Erasing AUTHORITY.KEYID = 7
38,320,002 UART: [art] PUB.X = 21463F72FD8A7E0903878A7952F1F3FFB74E324D36652B56AC14983AC2931BD08A63D147CF119A14F49FF8149CE83F7A
38,327,260 UART: [art] PUB.Y = 4105723B3658DB55CD9458EDC574C50DF7D5C934C0806BDC51A7B517220D05C36F260F7EF902A87814733370BF71D326
38,334,484 UART: [art] SIG.R = 34FF663D186EC7940C247B4851475508DC18C3BE10EAC1EEDB5BD9922E8F25A2A6E4A53349443ABCD3ABD9F530CF0540
38,341,917 UART: [art] SIG.S = 1322252341D8DA3B21AE62D3AEE6C4C79B6AA660219EE9C58727CF8E03014909487BBB10BC3C9765BF07B9E248B5C74A
39,321,233 UART: Caliptra RT
39,321,946 UART: [state] CFI Enabled
39,658,175 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
193,133 UART:
193,509 UART: Running Caliptra ROM ...
194,699 UART:
604,448 UART: [state] CFI Enabled
618,671 UART: [state] LifecycleState = Unprovisioned
621,095 UART: [state] DebugLocked = No
622,587 UART: [state] WD Timer not started. Device not locked for debugging
627,191 UART: [kat] SHA2-256
817,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,843 UART: [kat] ++
828,451 UART: [kat] sha1
839,830 UART: [kat] SHA2-256
842,840 UART: [kat] SHA2-384
850,249 UART: [kat] SHA2-512-ACC
852,828 UART: [kat] ECC-384
3,297,551 UART: [kat] HMAC-384Kdf
3,310,722 UART: [kat] LMS
3,842,583 UART: [kat] --
3,846,317 UART: [cold-reset] ++
3,848,896 UART: [fht] FHT @ 0x50003400
3,859,181 UART: [idev] ++
3,859,826 UART: [idev] CDI.KEYID = 6
3,860,862 UART: [idev] SUBJECT.KEYID = 7
3,862,040 UART: [idev] UDS.KEYID = 0
3,862,978 ready_for_fw is high
3,863,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,641 UART: [idev] Erasing UDS.KEYID = 0
6,335,773 UART: [idev] Sha1 KeyId Algorithm
6,357,818 UART: [idev] --
6,361,976 UART: [ldev] ++
6,362,658 UART: [ldev] CDI.KEYID = 6
6,363,677 UART: [ldev] SUBJECT.KEYID = 5
6,364,782 UART: [ldev] AUTHORITY.KEYID = 7
6,365,959 UART: [ldev] FE.KEYID = 1
6,374,725 UART: [ldev] Erasing FE.KEYID = 1
8,852,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,562 UART: [ldev] --
10,643,100 UART: [fwproc] Wait for Commands...
10,644,815 UART: [fwproc] Recv command 0x46574c44
10,647,073 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,837,529 >>> mbox cmd response: success
14,838,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,981,346 UART: [afmc] ++
14,981,987 UART: [afmc] CDI.KEYID = 6
14,982,881 UART: [afmc] SUBJECT.KEYID = 7
14,984,010 UART: [afmc] AUTHORITY.KEYID = 5
17,348,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,264 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,565 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,602 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,195 UART: [afmc] --
19,145,498 UART: [cold-reset] --
19,148,889 UART: [state] Locking Datavault
19,152,965 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,119 UART: [state] Locking ICCM
19,157,064 UART: [exit] Launching FMC @ 0x40000130
19,165,752 UART:
19,165,989 UART: Running Caliptra FMC ...
19,167,097 UART:
19,167,283 UART: [state] CFI Enabled
19,175,295 UART: [fht] FMC Alias Private Key: 7
20,931,932 UART: [art] Extend RT PCRs Done
20,933,154 UART: [art] Lock RT PCRs Done
20,934,800 UART: [art] Populate DV Done
20,940,335 UART: [fht] FMC Alias Private Key: 7
20,942,038 UART: [art] Derive CDI
20,942,862 UART: [art] Store in in slot 0x4
20,985,295 UART: [art] Derive Key Pair
20,986,299 UART: [art] Store priv key in slot 0x5
23,412,693 UART: [art] Derive Key Pair - Done
23,425,394 UART: [art] Signing Cert with AUTHO
23,426,708 UART: RITY.KEYID = 7
25,132,103 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,604 UART: [art] PUB.X = A7EC4B6D758719D31E8174A9AFF726D108E50314D990C3770BCA93B3FD668B31CB3685A161DC09EEE6EAB05BFD929ED9
25,140,878 UART: [art] PUB.Y = 1E4A4E2CD1484013BEB36107B8FD5132A6D6015E26B0AC16380F42C4B4028572B80050FB44B384159272342FD1A3EE17
25,148,106 UART: [art] SIG.R = 7E28D1A4C8026C775F4931AD5CBA40328B2A00B5FBAA9C4336CD75268DD486BBA4AD29E38B946316D4726F531CADF5CB
25,155,478 UART: [art] SIG.S = 159D01D8C36B50D6B74309195F5E63BB296A3B6C949C153A65CBDCDCABC08F9FAF4543806EEAF63E4FB8D6FAABFB2D9A
26,134,427 UART: Caliptra RT
26,135,127 UART: [state] CFI Enabled
26,251,642 UART: [rt] RT listening for mailbox commands...
26,254,591 UART:
26,254,760 UART: Running Caliptra ROM ...
26,255,782 UART:
26,256,205 UART: [state] CFI Enabled
26,268,141 UART: [state] LifecycleState = Unprovisioned
26,270,034 UART: [state] DebugLocked = No
26,272,874 UART: [state] WD Timer not started. Device not locked for debugging
26,277,836 UART: [kat] SHA2-256
26,467,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,478,481 UART: [kat] ++
26,478,938 UART: [kat] sha1
26,490,816 UART: [kat] SHA2-256
26,493,790 UART: [kat] SHA2-384
26,498,276 UART: [kat] SHA2-512-ACC
26,500,854 UART: [kat] ECC-384
28,941,511 UART: [kat] HMAC-384Kdf
28,954,708 UART: [kat] LMS
29,486,336 UART: [kat] --
29,490,160 UART: [update-reset] ++
32,942,432 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,945,101 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
33,551,199 >>> mbox cmd response: success
33,552,928 UART: [update-reset] Copying MAN_2 To MAN_1
33,590,464 UART: [update-reset Success] --
33,596,632 UART: [state] Locking Datavault
33,599,970 UART: [state] Locking PCR0, PCR1 and PCR31
33,602,182 UART: [state] Locking ICCM
33,604,687 UART: [exit] Launching FMC @ 0x40000130
33,613,318 UART:
33,613,555 UART: Running Caliptra FMC ...
33,614,580 UART:
33,614,731 UART: [state] CFI Enabled
33,658,800 UART: [art] Extend RT PCRs Done
33,659,983 UART: [art] Lock RT PCRs Done
33,661,528 UART: [art] Populate DV Done
33,667,101 UART: [fht] FMC Alias Private Key: 7
33,668,688 UART: [art] Derive CDI
33,669,425 UART: [art] Store in in slot 0x4
33,711,855 UART: [art] Derive Key Pair
33,712,855 UART: [art] Store priv key in slot 0x5
36,139,728 UART: [art] Derive Key Pair - Done
36,152,560 UART: [art] Signing Cert with AUTHO
36,153,870 UART: RITY.KEYID = 7
37,859,404 UART: [art] Erasing AUTHORITY.KEYID = 7
37,860,910 UART: [art] PUB.X = 2DB4B707650041093D9B767E3CCCC99F3315F0FAC5038002D7571CA088F2B6DB4CCF5F1C18176A32AF23024555A41E26
37,868,187 UART: [art] PUB.Y = 9093BC0EF60F23B772C531ADCDDF6AE67964E48F35DC928CF1C1226D74944C943CBD8A5B7B575AF0EDDA0C5730C759DD
37,875,456 UART: [art] SIG.R = 027A505D374B13F84CD89BE610E832D133DBAD058B9DF806EED3F806A3DAC9C4093471D2DF2FB1E84249E9C7A4D6BB8A
37,882,831 UART: [art] SIG.S = D69B86D399B14AEB55421EE060C32517ED4958A7C5AEFBE1D436333F19E7C388948824986111992B87DD1A060E6B345B
38,861,846 UART: Caliptra RT
38,862,554 UART: [state] CFI Enabled
39,151,866 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
3,755,134 ready_for_fw is high
3,755,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,942,906 >>> mbox cmd response: success
14,943,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,191,933 UART:
19,192,329 UART: Running Caliptra FMC ...
19,193,506 UART:
19,193,672 UART: [state] CFI Enabled
19,201,562 UART: [fht] FMC Alias Private Key: 7
20,958,476 UART: [art] Extend RT PCRs Done
20,959,694 UART: [art] Lock RT PCRs Done
20,961,217 UART: [art] Populate DV Done
20,966,736 UART: [fht] FMC Alias Private Key: 7
20,968,334 UART: [art] Derive CDI
20,969,151 UART: [art] Store in in slot 0x4
21,011,804 UART: [art] Derive Key Pair
21,012,844 UART: [art] Store priv key in slot 0x5
23,439,550 UART: [art] Derive Key Pair - Done
23,452,123 UART: [art] Signing Cert with AUTHO
23,453,424 UART: RITY.KEYID = 7
25,158,673 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,175 UART: [art] PUB.X = C1D1221005EC5E0CCE8FA9C9F8B6A1E991429CF2D0F3621EA2028B4C37A407CA2578EA5601766CB9147BF758DAA8AC61
25,167,429 UART: [art] PUB.Y = 46AF0ABDD81A4B99A8C79BC8C341A0C35A3457ED7ACE7ADEBC264342A8B209215C9862ABB214CDFD8461249279B4A54E
25,174,719 UART: [art] SIG.R = 5C577236BFD6DCD340C8F63E271F3C8638A65291D5928C2A986788832C1518E2B59851E75B40EFF365E3985F8A760F67
25,182,100 UART: [art] SIG.S = 22A2A47F64AFD861778DC5FF3033805A643FE89EEBB6BDF5CC2393D2B066D049B98C9EA51F5470ACF550D5B2A3F2F607
26,160,875 UART: Caliptra RT
26,161,588 UART: [state] CFI Enabled
26,278,887 UART: [rt] RT listening for mailbox commands...
33,877,068 >>> mbox cmd response: success
33,910,903 UART:
33,911,178 UART: Running Caliptra FMC ...
33,912,295 UART:
33,912,461 UART: [state] CFI Enabled
33,956,647 UART: [art] Extend RT PCRs Done
33,957,832 UART: [art] Lock RT PCRs Done
33,959,511 UART: [art] Populate DV Done
33,964,940 UART: [fht] FMC Alias Private Key: 7
33,966,701 UART: [art] Derive CDI
33,967,537 UART: [art] Store in in slot 0x4
34,010,303 UART: [art] Derive Key Pair
34,011,309 UART: [art] Store priv key in slot 0x5
36,437,802 UART: [art] Derive Key Pair - Done
36,450,911 UART: [art] Signing Cert with AUTHO
36,452,216 UART: RITY.KEYID = 7
38,157,332 UART: [art] Erasing AUTHORITY.KEYID = 7
38,158,838 UART: [art] PUB.X = 07CFA530C3791A43F0A3D9C4AB0EEAF04EF87A1EFAE91E85C0C3C065775C271A11DEB8D6109E96E1E57C8D39A0DAB279
38,166,131 UART: [art] PUB.Y = 80BFD5A0A96FB7631C3A0113D5C1F69CE5FC73BDA4B884F1B9DE123952AA25E4B427F5F293DA303DA83B31FAC20998CF
38,173,418 UART: [art] SIG.R = 286454A392FD94DC6EB939ADAEA3E44722828972A80B8C24D0F7755A9A11582DA96B64B7E756FE13F3152540D8E19416
38,180,782 UART: [art] SIG.S = C76FF4FA8C78FF9D45A4A4F0F3E136A21794EC3CBEF1301016D54DD021C581369ED2B7FA583C39F66357715C3E046C69
39,159,724 UART: Caliptra RT
39,160,427 UART: [state] CFI Enabled
39,449,726 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,441 UART: [kat] SHA2-256
892,379 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,359 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,544 UART: [idev] Erasing UDS.KEYID = 0
1,504,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,374 UART: [idev] --
1,514,387 UART: [ldev] ++
1,514,555 UART: [ldev] CDI.KEYID = 6
1,514,918 UART: [ldev] SUBJECT.KEYID = 5
1,515,344 UART: [ldev] AUTHORITY.KEYID = 7
1,515,807 UART: [ldev] FE.KEYID = 1
1,521,201 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,808 UART: [ldev] --
1,586,295 UART: [fwproc] Waiting for Commands...
1,587,030 UART: [fwproc] Received command 0x46574c44
1,587,821 UART: [fwproc] Received Image of size 114084 bytes
2,883,299 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,040 >>> mbox cmd response: success
3,075,040 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,076,232 UART: [afmc] ++
3,076,400 UART: [afmc] CDI.KEYID = 6
3,076,762 UART: [afmc] SUBJECT.KEYID = 7
3,077,187 UART: [afmc] AUTHORITY.KEYID = 5
3,112,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,682 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,567 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,257 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,144 UART: [afmc] --
3,155,056 UART: [cold-reset] --
3,155,864 UART: [state] Locking Datavault
3,157,207 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,811 UART: [state] Locking ICCM
3,158,465 UART: [exit] Launching FMC @ 0x40000130
3,163,794 UART:
3,163,810 UART: Running Caliptra FMC ...
3,164,218 UART:
3,164,272 UART: [state] CFI Enabled
3,174,705 UART: [fht] FMC Alias Private Key: 7
3,282,654 UART: [art] Extend RT PCRs Done
3,283,082 UART: [art] Lock RT PCRs Done
3,284,728 UART: [art] Populate DV Done
3,293,155 UART: [fht] FMC Alias Private Key: 7
3,294,093 UART: [art] Derive CDI
3,294,373 UART: [art] Store in in slot 0x4
3,380,274 UART: [art] Derive Key Pair
3,380,634 UART: [art] Store priv key in slot 0x5
3,394,184 UART: [art] Derive Key Pair - Done
3,409,138 UART: [art] Signing Cert with AUTHO
3,409,618 UART: RITY.KEYID = 7
3,424,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,453 UART: [art] PUB.X = A8787C7F86C43E0054AB3000ED788E4F4DEB2535B271A968045D2F724A4221CC4CED888035D57B95BBB31D976701275C
3,432,173 UART: [art] PUB.Y = 6702345348D2704636CF2EED70D2519689DEB8A664BA92748E94010FF5AFAE31F581B75B251892C1C08CF9F922C917BE
3,439,114 UART: [art] SIG.R = 7E2BFB8E157F25C30D1E1D58E58927BBF87D1A6470BC5D553B59787D2CB1E5C50CDB2B0B4CCB20A3685870F2E525D1CE
3,445,891 UART: [art] SIG.S = 6FDAB369BBF0B8BDDFE171ACB4072A18BE1C0AF4BB3E5A644B2B86BF0E2A9913F22A2FB5E51C381DC7394BC0C79113FE
3,469,229 UART: Caliptra RT
3,469,482 UART: [state] CFI Enabled
3,577,360 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,225 UART:
3,579,241 UART: Running Caliptra ROM ...
3,579,649 UART:
3,579,703 UART: [state] CFI Enabled
3,582,401 UART: [state] LifecycleState = Unprovisioned
3,583,056 UART: [state] DebugLocked = No
3,583,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,585,501 UART: [kat] SHA2-256
4,379,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,547 UART: [kat] ++
4,383,699 UART: [kat] sha1
4,387,803 UART: [kat] SHA2-256
4,389,741 UART: [kat] SHA2-384
4,392,558 UART: [kat] SHA2-512-ACC
4,394,458 UART: [kat] ECC-384
4,399,813 UART: [kat] HMAC-384Kdf
4,404,333 UART: [kat] LMS
4,972,529 UART: [kat] --
4,973,572 UART: [update-reset] ++
6,304,326 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,305,412 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,454,916 >>> mbox cmd response: success
6,455,169 UART: [update-reset] Copying MAN_2 To MAN_1
6,463,183 UART: [update-reset Success] --
6,464,206 UART: [state] Locking Datavault
6,464,976 UART: [state] Locking PCR0, PCR1 and PCR31
6,465,580 UART: [state] Locking ICCM
6,466,140 UART: [exit] Launching FMC @ 0x40000130
6,471,469 UART:
6,471,485 UART: Running Caliptra FMC ...
6,471,893 UART:
6,471,947 UART: [state] CFI Enabled
6,561,280 UART: [art] Extend RT PCRs Done
6,561,708 UART: [art] Lock RT PCRs Done
6,563,095 UART: [art] Populate DV Done
6,571,564 UART: [fht] FMC Alias Private Key: 7
6,572,516 UART: [art] Derive CDI
6,572,796 UART: [art] Store in in slot 0x4
6,658,413 UART: [art] Derive Key Pair
6,658,773 UART: [art] Store priv key in slot 0x5
6,671,917 UART: [art] Derive Key Pair - Done
6,686,999 UART: [art] Signing Cert with AUTHO
6,687,479 UART: RITY.KEYID = 7
6,702,561 UART: [art] Erasing AUTHORITY.KEYID = 7
6,703,326 UART: [art] PUB.X = 2E9F9B367564E062032EAE44A3991BA3D2AE88175334B20E0683DE682328C8757CF7FC380391353644188BF4B3EE7B16
6,710,078 UART: [art] PUB.Y = 1997395E9121C26533AD970A0469F1242A1FEF3D1B6C6AE74A938E9C5EAA582966F0606B6D46EA6933C37ED086D1707E
6,717,022 UART: [art] SIG.R = D296FB183524BC8C923C2AC2DF986B23ABEFD43D8C2686CEA55C088FFA133FFC68064F32B20BA8BA9F3246D2E32EBCF3
6,723,805 UART: [art] SIG.S = 031589E92F07AAB8CEE3A8C24113F24FE54695CAC0336537EB8B773E0339946E44EDC4C5CA9362464BC223BE11B98172
6,747,891 UART: Caliptra RT
6,748,144 UART: [state] CFI Enabled
7,030,881 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 ready_for_fw is high
1,362,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,896 >>> mbox cmd response: success
2,924,896 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,002 UART:
2,986,018 UART: Running Caliptra FMC ...
2,986,426 UART:
2,986,480 UART: [state] CFI Enabled
2,996,991 UART: [fht] FMC Alias Private Key: 7
3,105,000 UART: [art] Extend RT PCRs Done
3,105,428 UART: [art] Lock RT PCRs Done
3,106,812 UART: [art] Populate DV Done
3,115,163 UART: [fht] FMC Alias Private Key: 7
3,116,231 UART: [art] Derive CDI
3,116,511 UART: [art] Store in in slot 0x4
3,202,492 UART: [art] Derive Key Pair
3,202,852 UART: [art] Store priv key in slot 0x5
3,216,410 UART: [art] Derive Key Pair - Done
3,231,324 UART: [art] Signing Cert with AUTHO
3,231,804 UART: RITY.KEYID = 7
3,247,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,819 UART: [art] PUB.X = 716D96794C68E07873DBFFFC1D5B7702503805E7DD8ADB4DDBAAA38E8ED31B443DD9CCE22FAAD294261694A0198B1B2A
3,254,601 UART: [art] PUB.Y = 6260C2EE64CB3A71F4CC0EDFF6A8DA0EE7BA700F8ED1A6FBA66E1FA31F6DF5CE32C2043100185B527747D6C2DC1970E0
3,261,539 UART: [art] SIG.R = 02D823423568E830EF4189009DB8BA384351E7B0007D3BBA2694499FB66D7B95CE490D2265B305FB6A0CCEADA5B2A9CF
3,268,261 UART: [art] SIG.S = E3EAB70AC0DE265230EDDDC57B85795057E98B7CDC301CCC78E8FB3977C4B3822C88F95B0F129FB127EAE47BACB8D3E3
3,291,574 UART: Caliptra RT
3,291,827 UART: [state] CFI Enabled
3,400,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,160,658 >>> mbox cmd response: success
6,174,047 UART:
6,174,063 UART: Running Caliptra FMC ...
6,174,471 UART:
6,174,525 UART: [state] CFI Enabled
6,263,454 UART: [art] Extend RT PCRs Done
6,263,882 UART: [art] Lock RT PCRs Done
6,265,033 UART: [art] Populate DV Done
6,273,442 UART: [fht] FMC Alias Private Key: 7
6,274,480 UART: [art] Derive CDI
6,274,760 UART: [art] Store in in slot 0x4
6,360,393 UART: [art] Derive Key Pair
6,360,753 UART: [art] Store priv key in slot 0x5
6,374,245 UART: [art] Derive Key Pair - Done
6,388,966 UART: [art] Signing Cert with AUTHO
6,389,446 UART: RITY.KEYID = 7
6,404,544 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,309 UART: [art] PUB.X = 0C5CB2F6BA152DB043008D95F4CA8CD3D169051E63D06BD15736C5F3C75F83B61A91D0D2D28E735A1B61A29877B951B3
6,412,057 UART: [art] PUB.Y = EE6909AA432275127F5107C1BD385FB842739938EAA8C452CF92F37B6A2CF7BEADD7241945BC80FA7AB8866B987D688C
6,419,009 UART: [art] SIG.R = 867A352DD19F9C10311B002B9FF54C229412F0D3B858283FBFF7096939A54BE55A6A7E318CC23C75623E20A9940A67E3
6,425,749 UART: [art] SIG.S = 628FE5AB065248642150680CE5EFB9408CA2B3B7CEF0C540F169DF5E5CB1FF718681F824DBFB0A267616BE06CE5F7B33
6,449,152 UART: Caliptra RT
6,449,405 UART: [state] CFI Enabled
6,735,404 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
902,889 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,940 UART: [fht] Storing FHT @ 0x50003400
1,479,601 UART: [idev] ++
1,479,769 UART: [idev] CDI.KEYID = 6
1,480,129 UART: [idev] SUBJECT.KEYID = 7
1,480,553 UART: [idev] UDS.KEYID = 0
1,480,898 ready_for_fw is high
1,480,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,393 UART: [idev] Erasing UDS.KEYID = 0
1,505,421 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,360 UART: [ldev] ++
1,515,528 UART: [ldev] CDI.KEYID = 6
1,515,891 UART: [ldev] SUBJECT.KEYID = 5
1,516,317 UART: [ldev] AUTHORITY.KEYID = 7
1,516,780 UART: [ldev] FE.KEYID = 1
1,522,148 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,699 UART: [ldev] --
1,587,072 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 114084 bytes
2,884,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,080 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,819 >>> mbox cmd response: success
3,075,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,076,931 UART: [afmc] ++
3,077,099 UART: [afmc] CDI.KEYID = 6
3,077,461 UART: [afmc] SUBJECT.KEYID = 7
3,077,886 UART: [afmc] AUTHORITY.KEYID = 5
3,113,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,834 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,524 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,609 UART: [afmc] --
3,156,487 UART: [cold-reset] --
3,157,351 UART: [state] Locking Datavault
3,158,458 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,062 UART: [state] Locking ICCM
3,159,542 UART: [exit] Launching FMC @ 0x40000130
3,164,871 UART:
3,164,887 UART: Running Caliptra FMC ...
3,165,295 UART:
3,165,438 UART: [state] CFI Enabled
3,175,989 UART: [fht] FMC Alias Private Key: 7
3,284,212 UART: [art] Extend RT PCRs Done
3,284,640 UART: [art] Lock RT PCRs Done
3,286,120 UART: [art] Populate DV Done
3,294,479 UART: [fht] FMC Alias Private Key: 7
3,295,459 UART: [art] Derive CDI
3,295,739 UART: [art] Store in in slot 0x4
3,381,440 UART: [art] Derive Key Pair
3,381,800 UART: [art] Store priv key in slot 0x5
3,394,336 UART: [art] Derive Key Pair - Done
3,409,091 UART: [art] Signing Cert with AUTHO
3,409,571 UART: RITY.KEYID = 7
3,424,799 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,564 UART: [art] PUB.X = 61C9BF9DBE71210EAB212B8C23E35D1F4BC53D9B1DBCBE70E3C8843B9B91C9C487F39430A88802FBA7DDE61AC58A0A1D
3,432,347 UART: [art] PUB.Y = 08E2FBBFFB75F011603B9D6B87A2929CEAB5BB00A88176B43CB261C301A0831B4E2C4C73E420EBADE7F388A6D428B511
3,439,283 UART: [art] SIG.R = FC035B9B55AF4F496E5BABD3EDBE271D874BFE252CBF1461C2EE768513D2984086DAD727EB0267FA1D4EA07D1F5E4C96
3,446,067 UART: [art] SIG.S = 48FDDE1A766B9489AB675F5147F125D31A3B0D70F87BC503D8A316221168731F868FADB37E1F9793E2354E33C943E936
3,469,666 UART: Caliptra RT
3,470,011 UART: [state] CFI Enabled
3,578,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,067 UART:
3,581,083 UART: Running Caliptra ROM ...
3,581,491 UART:
3,581,632 UART: [state] CFI Enabled
3,584,606 UART: [state] LifecycleState = Unprovisioned
3,585,261 UART: [state] DebugLocked = No
3,585,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,648 UART: [kat] SHA2-256
4,381,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,694 UART: [kat] ++
4,385,846 UART: [kat] sha1
4,390,040 UART: [kat] SHA2-256
4,391,978 UART: [kat] SHA2-384
4,394,871 UART: [kat] SHA2-512-ACC
4,396,771 UART: [kat] ECC-384
4,402,412 UART: [kat] HMAC-384Kdf
4,407,060 UART: [kat] LMS
4,975,256 UART: [kat] --
4,976,251 UART: [update-reset] ++
6,308,599 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,309,755 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,459,259 >>> mbox cmd response: success
6,459,368 UART: [update-reset] Copying MAN_2 To MAN_1
6,467,382 UART: [update-reset Success] --
6,468,407 UART: [state] Locking Datavault
6,469,059 UART: [state] Locking PCR0, PCR1 and PCR31
6,469,663 UART: [state] Locking ICCM
6,470,127 UART: [exit] Launching FMC @ 0x40000130
6,475,456 UART:
6,475,472 UART: Running Caliptra FMC ...
6,475,880 UART:
6,476,023 UART: [state] CFI Enabled
6,564,680 UART: [art] Extend RT PCRs Done
6,565,108 UART: [art] Lock RT PCRs Done
6,566,317 UART: [art] Populate DV Done
6,574,644 UART: [fht] FMC Alias Private Key: 7
6,575,588 UART: [art] Derive CDI
6,575,868 UART: [art] Store in in slot 0x4
6,661,391 UART: [art] Derive Key Pair
6,661,751 UART: [art] Store priv key in slot 0x5
6,674,923 UART: [art] Derive Key Pair - Done
6,689,899 UART: [art] Signing Cert with AUTHO
6,690,379 UART: RITY.KEYID = 7
6,705,443 UART: [art] Erasing AUTHORITY.KEYID = 7
6,706,208 UART: [art] PUB.X = 1A52BF5D99F7722A757615D938606A648ECBFB88325413BDDDC32E32647B03A0B1E943BF67BE141371D74880AC746F80
6,712,975 UART: [art] PUB.Y = 6C72A0DB51D58DB440223AAED5EEE465603EA629B77771FCB34D8CCEF00914C902E413CEC1326488DBF1E26CC9BBFC3F
6,719,939 UART: [art] SIG.R = 6A777DD059830E3F55BF0314DF1F429C40392435520DB7231418110485EFAB6FC3FC2B314F2A9A54D42EF48607B8B162
6,726,692 UART: [art] SIG.S = A1D7B68C625FF30DB4FE33DD30306C61EB649CAF4CEF536AED21E8D70860B94CF5BC4B3FF6AD45817A37F51D5AAF1EFF
6,750,625 UART: Caliptra RT
6,750,970 UART: [state] CFI Enabled
7,033,905 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,410 ready_for_fw is high
1,363,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,913 >>> mbox cmd response: success
2,926,913 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,988,627 UART:
2,988,643 UART: Running Caliptra FMC ...
2,989,051 UART:
2,989,194 UART: [state] CFI Enabled
2,999,551 UART: [fht] FMC Alias Private Key: 7
3,107,876 UART: [art] Extend RT PCRs Done
3,108,304 UART: [art] Lock RT PCRs Done
3,109,620 UART: [art] Populate DV Done
3,117,781 UART: [fht] FMC Alias Private Key: 7
3,118,881 UART: [art] Derive CDI
3,119,161 UART: [art] Store in in slot 0x4
3,204,822 UART: [art] Derive Key Pair
3,205,182 UART: [art] Store priv key in slot 0x5
3,218,534 UART: [art] Derive Key Pair - Done
3,233,442 UART: [art] Signing Cert with AUTHO
3,233,922 UART: RITY.KEYID = 7
3,249,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,777 UART: [art] PUB.X = D8D5FA98B2D81D2D7F8071E96F4E95224A586269DC468E45A3C71E276956A33042DEFBE31A6E56DFFE432F858FC2A7E9
3,256,557 UART: [art] PUB.Y = 66C1E8CF3F0896D3DC05C02309EF204C3BB69B0BB3EE116D9CD9EFDB4ADE6CDAE87E0A6F5F052C34CB072E2132139F86
3,263,508 UART: [art] SIG.R = 6C713F79370DAB2B08EBDAB3A78416F41C1929F429CF42B03E49F976A6EFC7DB2B47C1550338792B58A3F2DBD159B787
3,270,277 UART: [art] SIG.S = 906AE78EC0364E2838C245D4C31124ED50F0EBAE2F5F0FC42C4E0478861B5DA6C832BD97B247B2455C0BB20D6EA0D936
3,293,776 UART: Caliptra RT
3,294,121 UART: [state] CFI Enabled
3,403,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,163,035 >>> mbox cmd response: success
6,176,340 UART:
6,176,356 UART: Running Caliptra FMC ...
6,176,764 UART:
6,176,907 UART: [state] CFI Enabled
6,266,006 UART: [art] Extend RT PCRs Done
6,266,434 UART: [art] Lock RT PCRs Done
6,267,665 UART: [art] Populate DV Done
6,275,780 UART: [fht] FMC Alias Private Key: 7
6,276,830 UART: [art] Derive CDI
6,277,110 UART: [art] Store in in slot 0x4
6,362,731 UART: [art] Derive Key Pair
6,363,091 UART: [art] Store priv key in slot 0x5
6,376,329 UART: [art] Derive Key Pair - Done
6,391,272 UART: [art] Signing Cert with AUTHO
6,391,752 UART: RITY.KEYID = 7
6,407,134 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,899 UART: [art] PUB.X = 7C4DA66CDE3561A1207091BCA5E49B20672F508552B0D9B2B3E3CA9E8225CB66A3C231DA40B6250D63423825E5F8A452
6,414,668 UART: [art] PUB.Y = 8702396D40D37D1FE9700EC1E5BB5AC27F10B7D51FA9541FEA7FDFA3A2F853A348DFCB111FF74DFD6DF4D9F0EEBD9AE1
6,421,642 UART: [art] SIG.R = 07B1F607E51BFDE3113BCFE6F3474A776DF1350F4F0FC9E7A75DC062FB0777C6439EC778BA98AB0485337F6FB3692814
6,428,402 UART: [art] SIG.S = 1A56B567379391A6FE32ED0DD3A8BBAAE6658562B5FC06518FBF78EC798B8EC42E5A6BBE3855FBABE6056E6797E9FA48
6,452,044 UART: Caliptra RT
6,452,389 UART: [state] CFI Enabled
6,737,291 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,502 UART: [kat] SHA2-512-ACC
908,403 UART: [kat] ECC-384
918,018 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,175,194 UART: [idev] ++
1,175,362 UART: [idev] CDI.KEYID = 6
1,175,722 UART: [idev] SUBJECT.KEYID = 7
1,176,146 UART: [idev] UDS.KEYID = 0
1,176,491 ready_for_fw is high
1,176,491 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,393 UART: [idev] Sha1 KeyId Algorithm
1,209,701 UART: [idev] --
1,210,949 UART: [ldev] ++
1,211,117 UART: [ldev] CDI.KEYID = 6
1,211,480 UART: [ldev] SUBJECT.KEYID = 5
1,211,906 UART: [ldev] AUTHORITY.KEYID = 7
1,212,369 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,761 UART: [ldev] --
1,283,098 UART: [fwproc] Wait for Commands...
1,283,920 UART: [fwproc] Recv command 0x46574c44
1,284,648 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,497 >>> mbox cmd response: success
2,771,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,772,731 UART: [afmc] ++
2,772,899 UART: [afmc] CDI.KEYID = 6
2,773,261 UART: [afmc] SUBJECT.KEYID = 7
2,773,686 UART: [afmc] AUTHORITY.KEYID = 5
2,808,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,936 UART: [afmc] --
2,852,012 UART: [cold-reset] --
2,852,650 UART: [state] Locking Datavault
2,853,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,411 UART: [state] Locking ICCM
2,854,957 UART: [exit] Launching FMC @ 0x40000130
2,860,286 UART:
2,860,302 UART: Running Caliptra FMC ...
2,860,710 UART:
2,860,764 UART: [state] CFI Enabled
2,871,355 UART: [fht] FMC Alias Private Key: 7
2,979,588 UART: [art] Extend RT PCRs Done
2,980,016 UART: [art] Lock RT PCRs Done
2,981,304 UART: [art] Populate DV Done
2,989,525 UART: [fht] FMC Alias Private Key: 7
2,990,575 UART: [art] Derive CDI
2,990,855 UART: [art] Store in in slot 0x4
3,076,536 UART: [art] Derive Key Pair
3,076,896 UART: [art] Store priv key in slot 0x5
3,089,844 UART: [art] Derive Key Pair - Done
3,104,743 UART: [art] Signing Cert with AUTHO
3,105,223 UART: RITY.KEYID = 7
3,120,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,094 UART: [art] PUB.X = 75E2CCD6272C52FA4CA87B2C2E470C6C775FDB2CD3FB0DA7A81EB65EB43FBFF596B54266AD244FA48CEC0320E1C0E357
3,127,879 UART: [art] PUB.Y = 0DCAA4C2381358E5D01F470A5E54B80152CE4192EFB8BACBC1B58F5D7D04CF12E3369BE02CE20E43C715C64F371E4BE1
3,134,830 UART: [art] SIG.R = A797AE5D50D007FD06C4775120200302403AD343CAE11B49216EFB7B2DEB7B774B2D3EFDC20E721EE263409830A3F84B
3,141,591 UART: [art] SIG.S = DE0921EBA16DF1C68EB5E97FFA59DACC61578DC830045F75FDC79913C3BEF047E445BA2B7894CC512FA24E3D27CF9997
3,165,776 UART: Caliptra RT
3,166,029 UART: [state] CFI Enabled
3,272,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,559 UART:
3,274,575 UART: Running Caliptra ROM ...
3,274,983 UART:
3,275,038 UART: [state] CFI Enabled
3,277,768 UART: [state] LifecycleState = Unprovisioned
3,278,423 UART: [state] DebugLocked = No
3,279,065 UART: [state] WD Timer not started. Device not locked for debugging
3,280,363 UART: [kat] SHA2-256
4,086,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,138 UART: [kat] ++
4,090,290 UART: [kat] sha1
4,094,620 UART: [kat] SHA2-256
4,096,560 UART: [kat] SHA2-384
4,099,057 UART: [kat] SHA2-512-ACC
4,100,957 UART: [kat] ECC-384
4,110,464 UART: [kat] HMAC-384Kdf
4,115,256 UART: [kat] LMS
4,363,584 UART: [kat] --
4,364,340 UART: [update-reset] ++
5,673,114 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,674,269 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,823,721 >>> mbox cmd response: success
5,823,836 UART: [update-reset] Copying MAN_2 To MAN_1
5,831,850 UART: [update-reset Success] --
5,832,873 UART: [state] Locking Datavault
5,833,581 UART: [state] Locking PCR0, PCR1 and PCR31
5,834,185 UART: [state] Locking ICCM
5,834,839 UART: [exit] Launching FMC @ 0x40000130
5,840,168 UART:
5,840,184 UART: Running Caliptra FMC ...
5,840,592 UART:
5,840,646 UART: [state] CFI Enabled
5,929,913 UART: [art] Extend RT PCRs Done
5,930,341 UART: [art] Lock RT PCRs Done
5,931,554 UART: [art] Populate DV Done
5,939,835 UART: [fht] FMC Alias Private Key: 7
5,940,929 UART: [art] Derive CDI
5,941,209 UART: [art] Store in in slot 0x4
6,026,918 UART: [art] Derive Key Pair
6,027,278 UART: [art] Store priv key in slot 0x5
6,041,042 UART: [art] Derive Key Pair - Done
6,055,997 UART: [art] Signing Cert with AUTHO
6,056,477 UART: RITY.KEYID = 7
6,071,683 UART: [art] Erasing AUTHORITY.KEYID = 7
6,072,448 UART: [art] PUB.X = 349DAC49B0C27953E0CAF91F8B63AC2CBC3209009083BE8928F14EFB07455BDD73F9C256AA8DB81175D271C95366C33C
6,079,198 UART: [art] PUB.Y = 0E2D32C586546001D9E6E1E74D42C2745660C0BB1AFB868131BBAEFE445EC0E6240E89912AEA9A94620D2AC1C7B26539
6,086,142 UART: [art] SIG.R = 9E4CC9A25D06D9844097C2AA867EF03B7E203F6CC216145ABABC4D2DE35DE0A75349A81895218C2BB98EB1F793607038
6,092,915 UART: [art] SIG.S = CAB038CD577C29B824BC0401B5BB48B59F39BAB5F369F2BA09D5C8C121099D67EF38005678FAB96EC2ED8DEAB4EBDA36
6,116,544 UART: Caliptra RT
6,116,797 UART: [state] CFI Enabled
6,398,687 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,411 ready_for_fw is high
1,060,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,211 >>> mbox cmd response: success
2,623,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,685,667 UART:
2,685,683 UART: Running Caliptra FMC ...
2,686,091 UART:
2,686,145 UART: [state] CFI Enabled
2,696,628 UART: [fht] FMC Alias Private Key: 7
2,804,797 UART: [art] Extend RT PCRs Done
2,805,225 UART: [art] Lock RT PCRs Done
2,806,743 UART: [art] Populate DV Done
2,815,314 UART: [fht] FMC Alias Private Key: 7
2,816,364 UART: [art] Derive CDI
2,816,644 UART: [art] Store in in slot 0x4
2,902,125 UART: [art] Derive Key Pair
2,902,485 UART: [art] Store priv key in slot 0x5
2,915,537 UART: [art] Derive Key Pair - Done
2,930,426 UART: [art] Signing Cert with AUTHO
2,930,906 UART: RITY.KEYID = 7
2,945,962 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,727 UART: [art] PUB.X = EBBCC137AF036D1E1D880D92BF8D82715F5AB568A9887A1CD2301920DFF51D50FA1BAC09FE399823477F68FEE90CE1D8
2,953,501 UART: [art] PUB.Y = 7519FC18CD1EDF3EA11E40ADBA2DB3D70B0CFDB6556FDC8627B7760AB9E9787D1C61AE0092CEBC7509C70548A1CDFDE6
2,960,440 UART: [art] SIG.R = 5A73D2F7CFD0083DA6EEBE51661C198D67CFB3D040D68F121BF1F6DF01807D3A01DB944BCA2164E9BFE8F2D6809CDE73
2,967,221 UART: [art] SIG.S = 91A4A131799F05C11141F1E8ECD11747564E1F6952DFC78551E6D8E4BBBFD436A1C58213AB1831E9133AAFF698DC5246
2,990,847 UART: Caliptra RT
2,991,100 UART: [state] CFI Enabled
3,098,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,102 >>> mbox cmd response: success
5,545,364 UART:
5,545,380 UART: Running Caliptra FMC ...
5,545,788 UART:
5,545,842 UART: [state] CFI Enabled
5,634,989 UART: [art] Extend RT PCRs Done
5,635,417 UART: [art] Lock RT PCRs Done
5,636,794 UART: [art] Populate DV Done
5,644,897 UART: [fht] FMC Alias Private Key: 7
5,645,987 UART: [art] Derive CDI
5,646,267 UART: [art] Store in in slot 0x4
5,731,890 UART: [art] Derive Key Pair
5,732,250 UART: [art] Store priv key in slot 0x5
5,745,174 UART: [art] Derive Key Pair - Done
5,759,878 UART: [art] Signing Cert with AUTHO
5,760,358 UART: RITY.KEYID = 7
5,775,176 UART: [art] Erasing AUTHORITY.KEYID = 7
5,775,941 UART: [art] PUB.X = DC16D727D46FDC6E71DF4054FF2B6874DAEC7489A700329C62FFD7E8B150C6C22375B492AF9CBFAA0E68050BB348EF6E
5,782,698 UART: [art] PUB.Y = 9293AB605928A170E391C85708651DD41CD99A55AFA74FD98BB09D8DC0DEF6771C4BBF9849C0B9E6350D1A64D4E1CB57
5,789,652 UART: [art] SIG.R = AA8886C7DCE1B38B6CEFD54A6844E234592804242D337FB7AA84B1D1077A70452D6EDAF1DB9C32369A12149735B2D616
5,796,420 UART: [art] SIG.S = 0D14482C0D7A8254122B2711FE87BFE4CEAE34F18715EF9F5D0EAB7449911DEA07A48A6068CC898EBE20EFE8F101B33B
5,820,338 UART: Caliptra RT
5,820,591 UART: [state] CFI Enabled
6,103,866 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,707 UART: [kat] SHA2-512-ACC
908,608 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,221 UART: [kat] LMS
1,171,549 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,399 UART: [idev] ++
1,175,567 UART: [idev] CDI.KEYID = 6
1,175,927 UART: [idev] SUBJECT.KEYID = 7
1,176,351 UART: [idev] UDS.KEYID = 0
1,176,696 ready_for_fw is high
1,176,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,876 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,388 UART: [ldev] Erasing FE.KEYID = 1
1,243,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,990 UART: [ldev] --
1,283,433 UART: [fwproc] Wait for Commands...
1,284,199 UART: [fwproc] Recv command 0x46574c44
1,284,927 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,648 >>> mbox cmd response: success
2,770,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,771,782 UART: [afmc] ++
2,771,950 UART: [afmc] CDI.KEYID = 6
2,772,312 UART: [afmc] SUBJECT.KEYID = 7
2,772,737 UART: [afmc] AUTHORITY.KEYID = 5
2,808,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,999 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,097 UART: [afmc] --
2,851,979 UART: [cold-reset] --
2,852,835 UART: [state] Locking Datavault
2,853,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,418 UART: [state] Locking ICCM
2,854,950 UART: [exit] Launching FMC @ 0x40000130
2,860,279 UART:
2,860,295 UART: Running Caliptra FMC ...
2,860,703 UART:
2,860,846 UART: [state] CFI Enabled
2,871,099 UART: [fht] FMC Alias Private Key: 7
2,978,950 UART: [art] Extend RT PCRs Done
2,979,378 UART: [art] Lock RT PCRs Done
2,980,434 UART: [art] Populate DV Done
2,988,519 UART: [fht] FMC Alias Private Key: 7
2,989,553 UART: [art] Derive CDI
2,989,833 UART: [art] Store in in slot 0x4
3,075,152 UART: [art] Derive Key Pair
3,075,512 UART: [art] Store priv key in slot 0x5
3,089,088 UART: [art] Derive Key Pair - Done
3,103,858 UART: [art] Signing Cert with AUTHO
3,104,338 UART: RITY.KEYID = 7
3,119,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,165 UART: [art] PUB.X = 3CFB6D6389A5AD8D3E8FBA595C0808AEED6EFFA45AF6BDAD5A200DB804A7AE8179DAA552DB16C6513A10008DCB55602B
3,126,927 UART: [art] PUB.Y = B867C2D2B7F7D70D4EE80F46335AB997B97324D896DE142AA6E3CDBA221ED8E1B9DBF1EB00F470847C2144E2B66C4C97
3,133,863 UART: [art] SIG.R = B7FF92DB645D11EAD3B8FE55A0FF03FC5B032E4A8FBBD32A2FE02434D7FF1A0569741A69ED82BF70885A6AC42093761C
3,140,642 UART: [art] SIG.S = B29609BC438325B8B5CAB27467096B9DD59DE54B3242A37A4008FA082D49A315D1BAF37337D5037E4AAEBA948D5EF670
3,164,616 UART: Caliptra RT
3,164,961 UART: [state] CFI Enabled
3,273,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,057 UART:
3,275,073 UART: Running Caliptra ROM ...
3,275,481 UART:
3,275,623 UART: [state] CFI Enabled
3,278,625 UART: [state] LifecycleState = Unprovisioned
3,279,280 UART: [state] DebugLocked = No
3,279,994 UART: [state] WD Timer not started. Device not locked for debugging
3,281,270 UART: [kat] SHA2-256
4,086,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,091,045 UART: [kat] ++
4,091,197 UART: [kat] sha1
4,095,337 UART: [kat] SHA2-256
4,097,277 UART: [kat] SHA2-384
4,100,026 UART: [kat] SHA2-512-ACC
4,101,926 UART: [kat] ECC-384
4,111,405 UART: [kat] HMAC-384Kdf
4,115,861 UART: [kat] LMS
4,364,189 UART: [kat] --
4,365,287 UART: [update-reset] ++
5,674,941 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,676,106 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,825,558 >>> mbox cmd response: success
5,825,697 UART: [update-reset] Copying MAN_2 To MAN_1
5,833,711 UART: [update-reset Success] --
5,834,832 UART: [state] Locking Datavault
5,835,470 UART: [state] Locking PCR0, PCR1 and PCR31
5,836,074 UART: [state] Locking ICCM
5,836,610 UART: [exit] Launching FMC @ 0x40000130
5,841,939 UART:
5,841,955 UART: Running Caliptra FMC ...
5,842,363 UART:
5,842,506 UART: [state] CFI Enabled
5,931,717 UART: [art] Extend RT PCRs Done
5,932,145 UART: [art] Lock RT PCRs Done
5,933,394 UART: [art] Populate DV Done
5,941,619 UART: [fht] FMC Alias Private Key: 7
5,942,619 UART: [art] Derive CDI
5,942,899 UART: [art] Store in in slot 0x4
6,028,664 UART: [art] Derive Key Pair
6,029,024 UART: [art] Store priv key in slot 0x5
6,041,978 UART: [art] Derive Key Pair - Done
6,056,649 UART: [art] Signing Cert with AUTHO
6,057,129 UART: RITY.KEYID = 7
6,072,447 UART: [art] Erasing AUTHORITY.KEYID = 7
6,073,212 UART: [art] PUB.X = CBFD509EA5FF279EC78481DF4FF57244391C66C438083E68C1E6A133B50B07E4D398772F25FC2103C0C71118E533E23F
6,079,972 UART: [art] PUB.Y = D4C95E974178DC3BDB4B3505123EA607AD10E011CCA17B40E784D4B156456308189A886C7D7CC180C4836CAB3C0626E7
6,086,912 UART: [art] SIG.R = 06841D728A18236CF6D1C97681473570C317B7F06059ED1AEC42ABA794340DD3D0C5C54552469F7D0FEB2DB5E8815E08
6,093,670 UART: [art] SIG.S = 69EF368C241D89F89D03251CA517B8948198B57EB7043B297FAD379B4EBB5C5366594D552439D15F93A2CDC120888A34
6,117,947 UART: Caliptra RT
6,118,292 UART: [state] CFI Enabled
6,398,165 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 ready_for_fw is high
1,060,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,229 >>> mbox cmd response: success
2,624,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,686,839 UART:
2,686,855 UART: Running Caliptra FMC ...
2,687,263 UART:
2,687,406 UART: [state] CFI Enabled
2,698,047 UART: [fht] FMC Alias Private Key: 7
2,806,438 UART: [art] Extend RT PCRs Done
2,806,866 UART: [art] Lock RT PCRs Done
2,808,550 UART: [art] Populate DV Done
2,817,103 UART: [fht] FMC Alias Private Key: 7
2,818,155 UART: [art] Derive CDI
2,818,435 UART: [art] Store in in slot 0x4
2,903,906 UART: [art] Derive Key Pair
2,904,266 UART: [art] Store priv key in slot 0x5
2,918,342 UART: [art] Derive Key Pair - Done
2,932,899 UART: [art] Signing Cert with AUTHO
2,933,379 UART: RITY.KEYID = 7
2,948,789 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,554 UART: [art] PUB.X = 95F39D1AA1E8F5CE3C7D0495489DD538F10744A534F4441214BC4169DF5AC0A1A15FEB1E6C17928461746CB930A71E7A
2,956,322 UART: [art] PUB.Y = 4FA48FCE5B2EB7EF2314ABA9AA51527BEE3DFDCC74EBF6D5E54C4FCD753C0A64D3C29ADE07DAA2B79E357AE78D3FDBD8
2,963,306 UART: [art] SIG.R = E7C1A5C4C40E1E8A586F98B29B7213AB21B8FA41BB2A340CED968308677B31F7A17174F3EFCAD70FAB6250BCC9BD5FD9
2,970,084 UART: [art] SIG.S = C045789BF6B27BE2C40286882848F2D2562F03A59C50EE0A05A25710928181741AA5A07E2341EBCE5AD229E83B43D136
2,994,217 UART: Caliptra RT
2,994,562 UART: [state] CFI Enabled
3,102,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,537,390 >>> mbox cmd response: success
5,550,766 UART:
5,550,782 UART: Running Caliptra FMC ...
5,551,190 UART:
5,551,333 UART: [state] CFI Enabled
5,640,560 UART: [art] Extend RT PCRs Done
5,640,988 UART: [art] Lock RT PCRs Done
5,642,405 UART: [art] Populate DV Done
5,650,514 UART: [fht] FMC Alias Private Key: 7
5,651,548 UART: [art] Derive CDI
5,651,828 UART: [art] Store in in slot 0x4
5,737,555 UART: [art] Derive Key Pair
5,737,915 UART: [art] Store priv key in slot 0x5
5,751,503 UART: [art] Derive Key Pair - Done
5,765,942 UART: [art] Signing Cert with AUTHO
5,766,422 UART: RITY.KEYID = 7
5,781,912 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,677 UART: [art] PUB.X = 29AB94CBD614108D840C91827FD42966FCC4729B2372CBAE60C99CB50393E003EA9409EF3DE0FBFBC40BF9CDE7C31D5A
5,789,450 UART: [art] PUB.Y = B9B607D745380E4D65FE1790FA9383B39A7CD5A570DD9C468C4338F81721B7799E348CDA07F034223A8B999E0953B798
5,796,384 UART: [art] SIG.R = BF4CBEFD9D31ECDC1B0E8AFF36CA3F66F8E1258A9D2F3D94DCFD35E4FA0D071E9494D412C9895EBF825131C2E2675FBD
5,803,173 UART: [art] SIG.S = 70BF1A9761422132A5C63735B81E966C8977392644328C70563D17DB6D986BDD90EA48910196C43896BC2AAFB27C8A8A
5,826,885 UART: Caliptra RT
5,827,230 UART: [state] CFI Enabled
6,107,155 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,531 UART: [idev] ++
1,172,699 UART: [idev] CDI.KEYID = 6
1,173,060 UART: [idev] SUBJECT.KEYID = 7
1,173,485 UART: [idev] UDS.KEYID = 0
1,173,831 ready_for_fw is high
1,173,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,185 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,178 UART: [fwproc] Wait for Commands...
1,280,917 UART: [fwproc] Recv command 0x46574c44
1,281,650 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,769 >>> mbox cmd response: success
2,768,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,769,844 UART: [afmc] ++
2,770,012 UART: [afmc] CDI.KEYID = 6
2,770,375 UART: [afmc] SUBJECT.KEYID = 7
2,770,801 UART: [afmc] AUTHORITY.KEYID = 5
2,806,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,181 UART: [afmc] --
2,850,309 UART: [cold-reset] --
2,851,087 UART: [state] Locking Datavault
2,852,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,816 UART: [state] Locking ICCM
2,853,490 UART: [exit] Launching FMC @ 0x40000130
2,858,819 UART:
2,858,835 UART: Running Caliptra FMC ...
2,859,243 UART:
2,859,297 UART: [state] CFI Enabled
2,869,618 UART: [fht] FMC Alias Private Key: 7
2,977,307 UART: [art] Extend RT PCRs Done
2,977,735 UART: [art] Lock RT PCRs Done
2,979,233 UART: [art] Populate DV Done
2,987,742 UART: [fht] FMC Alias Private Key: 7
2,988,860 UART: [art] Derive CDI
2,989,140 UART: [art] Store in in slot 0x4
3,074,747 UART: [art] Derive Key Pair
3,075,107 UART: [art] Store priv key in slot 0x5
3,088,605 UART: [art] Derive Key Pair - Done
3,103,248 UART: [art] Signing Cert with AUTHO
3,103,728 UART: RITY.KEYID = 7
3,119,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,129 UART: [art] PUB.X = 5800928646573BC5E519591FF924B31F649BF1F0FF9EB3FC67E2C9BBDA331049BD0C910EF79B897A6200A1E32F4BF704
3,126,852 UART: [art] PUB.Y = 2D285956DAF61137D146477811AA875902CA050D6754B2469EB560F390C4009C7D6820397671D4B973879D56AB16D65C
3,133,757 UART: [art] SIG.R = B54B13EB587F628BE762ADB225016CDBEA65680CB5267E3F8CBABF0621A6A8F3FFA6B564B8184734EE30E49212A23018
3,140,528 UART: [art] SIG.S = 1E218576F5AC8FCE665BDA36E1455AE4DD934F7153DB71FE806119D451FB516B8F718A9C5619B306AA19469283E1A824
3,164,286 UART: Caliptra RT
3,164,539 UART: [state] CFI Enabled
3,272,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,634 UART:
3,274,650 UART: Running Caliptra ROM ...
3,275,058 UART:
3,275,113 UART: [state] CFI Enabled
3,277,757 UART: [state] LifecycleState = Unprovisioned
3,278,412 UART: [state] DebugLocked = No
3,278,962 UART: [state] WD Timer not started. Device not locked for debugging
3,280,276 UART: [kat] SHA2-256
4,083,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,955 UART: [kat] ++
4,088,107 UART: [kat] sha1
4,092,247 UART: [kat] SHA2-256
4,094,187 UART: [kat] SHA2-384
4,096,908 UART: [kat] SHA2-512-ACC
4,098,808 UART: [kat] ECC-384
4,107,955 UART: [kat] HMAC-384Kdf
4,112,535 UART: [kat] LMS
4,360,847 UART: [kat] --
4,361,729 UART: [update-reset] ++
5,670,724 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,671,883 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,821,335 >>> mbox cmd response: success
5,821,668 UART: [update-reset] Copying MAN_2 To MAN_1
5,829,682 UART: [update-reset Success] --
5,830,845 UART: [state] Locking Datavault
5,831,637 UART: [state] Locking PCR0, PCR1 and PCR31
5,832,241 UART: [state] Locking ICCM
5,832,883 UART: [exit] Launching FMC @ 0x40000130
5,838,212 UART:
5,838,228 UART: Running Caliptra FMC ...
5,838,636 UART:
5,838,690 UART: [state] CFI Enabled
5,927,945 UART: [art] Extend RT PCRs Done
5,928,373 UART: [art] Lock RT PCRs Done
5,929,826 UART: [art] Populate DV Done
5,938,023 UART: [fht] FMC Alias Private Key: 7
5,939,075 UART: [art] Derive CDI
5,939,355 UART: [art] Store in in slot 0x4
6,025,112 UART: [art] Derive Key Pair
6,025,472 UART: [art] Store priv key in slot 0x5
6,038,228 UART: [art] Derive Key Pair - Done
6,052,830 UART: [art] Signing Cert with AUTHO
6,053,310 UART: RITY.KEYID = 7
6,068,492 UART: [art] Erasing AUTHORITY.KEYID = 7
6,069,257 UART: [art] PUB.X = A64D0536B474BFA99BA8DC6A6F29825C70D1D93726801E110C38749997CC3D4F0A7CB26C0387316AE1659E49F5450B42
6,076,010 UART: [art] PUB.Y = 84DFA4247C2AB57D42FD0E5BE692B536A44717A845BD0D63497C2963170398FFA4329388BAEC45AD0F81B822180157A2
6,082,945 UART: [art] SIG.R = BB6B82C9EE7D8D5000B46383764C547F2FAD3CDBE2B2AA34BA8D00D56BF14F45A828A4B5F3C81EECDD499CFC1701BDC9
6,089,694 UART: [art] SIG.S = 11F019ECD6CEC3761EB0F7C8239012737F5977275DB1A3013B8AD0A9CDFA12A8F8524F6E07CD6089BC648B92EB147290
6,113,567 UART: Caliptra RT
6,113,820 UART: [state] CFI Enabled
6,396,925 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 ready_for_fw is high
1,055,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,613 >>> mbox cmd response: success
2,619,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,680,871 UART:
2,680,887 UART: Running Caliptra FMC ...
2,681,295 UART:
2,681,349 UART: [state] CFI Enabled
2,691,960 UART: [fht] FMC Alias Private Key: 7
2,800,415 UART: [art] Extend RT PCRs Done
2,800,843 UART: [art] Lock RT PCRs Done
2,802,353 UART: [art] Populate DV Done
2,810,802 UART: [fht] FMC Alias Private Key: 7
2,811,926 UART: [art] Derive CDI
2,812,206 UART: [art] Store in in slot 0x4
2,898,453 UART: [art] Derive Key Pair
2,898,813 UART: [art] Store priv key in slot 0x5
2,911,785 UART: [art] Derive Key Pair - Done
2,926,715 UART: [art] Signing Cert with AUTHO
2,927,195 UART: RITY.KEYID = 7
2,942,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,290 UART: [art] PUB.X = 67F0355BD6EDD38B5A3BAB959AA448191FA171B4F0C57D482F71F315E6E05CDC03A8DDED7629CF1036B800173659AB2E
2,950,047 UART: [art] PUB.Y = AD2BF6263FCC26AFDDC7E835FF82FBB48AB7591860A3799B0F76D57436FEE2E45B24E6816C7FE2832991131D9AA4E1ED
2,957,010 UART: [art] SIG.R = 368E5F06C2E49A9A7351C932F1C35A4675AADB85308DF46DE81A1010E705E91CB50CEC8EB19ED5DCC50132E22BAC5B58
2,963,782 UART: [art] SIG.S = 0B316291B0FE7EC900D81A07313C5C1948A7B3E099456B47EB4640C8449AD84F260C5141F0F4FDC7F1329DA1B6EBF628
2,988,722 UART: Caliptra RT
2,988,975 UART: [state] CFI Enabled
3,096,488 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,527,090 >>> mbox cmd response: success
5,540,358 UART:
5,540,374 UART: Running Caliptra FMC ...
5,540,782 UART:
5,540,836 UART: [state] CFI Enabled
5,629,857 UART: [art] Extend RT PCRs Done
5,630,285 UART: [art] Lock RT PCRs Done
5,631,332 UART: [art] Populate DV Done
5,639,551 UART: [fht] FMC Alias Private Key: 7
5,640,547 UART: [art] Derive CDI
5,640,827 UART: [art] Store in in slot 0x4
5,726,494 UART: [art] Derive Key Pair
5,726,854 UART: [art] Store priv key in slot 0x5
5,739,958 UART: [art] Derive Key Pair - Done
5,754,740 UART: [art] Signing Cert with AUTHO
5,755,220 UART: RITY.KEYID = 7
5,770,418 UART: [art] Erasing AUTHORITY.KEYID = 7
5,771,183 UART: [art] PUB.X = 967FE2E5030FF42FFEC729658AC7D7E453D2C17A207DA280D15825D0BFE2234591B1095C92914FBA7EEDE3F188E8E22A
5,777,954 UART: [art] PUB.Y = 06F6BA279822BC67DC4934A43A8395DCBB08EEDAEF91F047071533883F5DA39E4BB59476C2CD811E47A9FDDD4C9D10BC
5,784,911 UART: [art] SIG.R = 0F6DCCFB4B2229432FE671E9044041DF1E685434A715BDEB62D7C9E521C865D250F290BCBB56D94875C82E92AC08DC28
5,791,680 UART: [art] SIG.S = 155CE9A9B0D54D88FF987F0FB2C1FF3D24AF6B34BD4960524ACA20F5FAC00C3D20C70F2EBD82382ABD63B4480D0722D9
5,815,834 UART: Caliptra RT
5,816,087 UART: [state] CFI Enabled
6,094,324 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 ready_for_fw is high
1,174,276 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,962 UART: [idev] Erasing UDS.KEYID = 0
1,198,800 UART: [idev] Sha1 KeyId Algorithm
1,207,494 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,441 UART: [ldev] Erasing FE.KEYID = 1
1,241,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,280 UART: [fwproc] Recv command 0x46574c44
1,283,013 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,224 >>> mbox cmd response: success
2,769,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,770,357 UART: [afmc] ++
2,770,525 UART: [afmc] CDI.KEYID = 6
2,770,888 UART: [afmc] SUBJECT.KEYID = 7
2,771,314 UART: [afmc] AUTHORITY.KEYID = 5
2,806,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,788 UART: [afmc] --
2,849,908 UART: [cold-reset] --
2,850,664 UART: [state] Locking Datavault
2,851,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,497 UART: [state] Locking ICCM
2,852,955 UART: [exit] Launching FMC @ 0x40000130
2,858,284 UART:
2,858,300 UART: Running Caliptra FMC ...
2,858,708 UART:
2,858,851 UART: [state] CFI Enabled
2,869,084 UART: [fht] FMC Alias Private Key: 7
2,977,263 UART: [art] Extend RT PCRs Done
2,977,691 UART: [art] Lock RT PCRs Done
2,978,713 UART: [art] Populate DV Done
2,986,994 UART: [fht] FMC Alias Private Key: 7
2,988,040 UART: [art] Derive CDI
2,988,320 UART: [art] Store in in slot 0x4
3,074,231 UART: [art] Derive Key Pair
3,074,591 UART: [art] Store priv key in slot 0x5
3,088,309 UART: [art] Derive Key Pair - Done
3,103,415 UART: [art] Signing Cert with AUTHO
3,103,895 UART: RITY.KEYID = 7
3,119,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,218 UART: [art] PUB.X = 3595BFA54D4B3F4BDB9D6560DC8B00F1F4117451D0E0B6DCFC164B79D45421159C2FFBC4E2A5B2B6789597E7BEAD2FFB
3,126,986 UART: [art] PUB.Y = B4481EB1A9755430CE9665C6CF355357F60C61B00C5C085A7F440FFBF8AFC4CAE234233EE5CBE7F723DED47FC58CDC1E
3,133,944 UART: [art] SIG.R = D1FA4706A20106E33E5797048807844D827172F851563AA7755CD6D8AF69E71386568D140557FFE141CA319808E0C03B
3,140,681 UART: [art] SIG.S = D9A0D853B279C88510879BE140A7C9EEF51EAEE210436C11FD9CC096198745C1B1CA13BDD07951E632A6F06C09178222
3,164,495 UART: Caliptra RT
3,164,840 UART: [state] CFI Enabled
3,273,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,352 UART:
3,275,368 UART: Running Caliptra ROM ...
3,275,776 UART:
3,275,918 UART: [state] CFI Enabled
3,279,010 UART: [state] LifecycleState = Unprovisioned
3,279,665 UART: [state] DebugLocked = No
3,280,247 UART: [state] WD Timer not started. Device not locked for debugging
3,281,359 UART: [kat] SHA2-256
4,084,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,038 UART: [kat] ++
4,089,190 UART: [kat] sha1
4,093,534 UART: [kat] SHA2-256
4,095,474 UART: [kat] SHA2-384
4,098,243 UART: [kat] SHA2-512-ACC
4,100,143 UART: [kat] ECC-384
4,110,444 UART: [kat] HMAC-384Kdf
4,115,300 UART: [kat] LMS
4,363,612 UART: [kat] --
4,364,518 UART: [update-reset] ++
5,673,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,674,850 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,824,302 >>> mbox cmd response: success
5,824,529 UART: [update-reset] Copying MAN_2 To MAN_1
5,832,543 UART: [update-reset Success] --
5,833,496 UART: [state] Locking Datavault
5,834,110 UART: [state] Locking PCR0, PCR1 and PCR31
5,834,714 UART: [state] Locking ICCM
5,835,294 UART: [exit] Launching FMC @ 0x40000130
5,840,623 UART:
5,840,639 UART: Running Caliptra FMC ...
5,841,047 UART:
5,841,190 UART: [state] CFI Enabled
5,930,433 UART: [art] Extend RT PCRs Done
5,930,861 UART: [art] Lock RT PCRs Done
5,932,374 UART: [art] Populate DV Done
5,940,519 UART: [fht] FMC Alias Private Key: 7
5,941,675 UART: [art] Derive CDI
5,941,955 UART: [art] Store in in slot 0x4
6,027,588 UART: [art] Derive Key Pair
6,027,948 UART: [art] Store priv key in slot 0x5
6,040,882 UART: [art] Derive Key Pair - Done
6,055,880 UART: [art] Signing Cert with AUTHO
6,056,360 UART: RITY.KEYID = 7
6,071,168 UART: [art] Erasing AUTHORITY.KEYID = 7
6,071,933 UART: [art] PUB.X = 1EEF695E78D4CF3585C09A37B248A654F223561F1962E74188EF6391A4EB0856DEEF0AAA17546AAC8E07A29172F9918C
6,078,698 UART: [art] PUB.Y = F191E7D8047F5CE6A7FC661CA2A0284C4C31EF342348A6D6D2BB7A326315D61F915DBC0C7305A73CF72D773077D9A733
6,085,645 UART: [art] SIG.R = 86BC00D051FC62E2D98E57AFCFE93617C7EA41645FFC808E6A4237B42611CA55BF21846E4F10A5EF9666B8EDF8C5952E
6,092,405 UART: [art] SIG.S = B1C7363BCC9FB7617B90C499353D1E7012F43CE4FD8C50778B0A72A8AB144B67160D60ACD648A94151BB5D6E656C1073
6,116,000 UART: Caliptra RT
6,116,345 UART: [state] CFI Enabled
6,399,889 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,421 ready_for_fw is high
1,056,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,654 >>> mbox cmd response: success
2,618,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,681,654 UART:
2,681,670 UART: Running Caliptra FMC ...
2,682,078 UART:
2,682,221 UART: [state] CFI Enabled
2,692,734 UART: [fht] FMC Alias Private Key: 7
2,800,993 UART: [art] Extend RT PCRs Done
2,801,421 UART: [art] Lock RT PCRs Done
2,803,121 UART: [art] Populate DV Done
2,811,316 UART: [fht] FMC Alias Private Key: 7
2,812,348 UART: [art] Derive CDI
2,812,628 UART: [art] Store in in slot 0x4
2,898,269 UART: [art] Derive Key Pair
2,898,629 UART: [art] Store priv key in slot 0x5
2,911,991 UART: [art] Derive Key Pair - Done
2,926,478 UART: [art] Signing Cert with AUTHO
2,926,958 UART: RITY.KEYID = 7
2,941,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,549 UART: [art] PUB.X = EA4A62A663E8C8993C1FB357C3419DD1446F3442FAC7FCFF9BA4454185C371E214198DBD80505BCE73263F509A095F7E
2,949,322 UART: [art] PUB.Y = EC578F83480CFAA94E19E2BA44863751ABBDA865F02190D1F873C4423B38B70D7755ABA05D0097765CCF46E8B676D240
2,956,248 UART: [art] SIG.R = 47A59D73C0B6B58B02C19115933B9B10A05B875AD58E6D530E664918D01D875F7098B373A4FE9B692FE88F87F6EEEEE9
2,963,016 UART: [art] SIG.S = 8A34A476127E34FF5518B03988F63FDD3624138BA9493404908D99FF86DBF8C9A23818DBCDF9E11A8B970850A776C843
2,987,409 UART: Caliptra RT
2,987,754 UART: [state] CFI Enabled
3,095,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,528,046 >>> mbox cmd response: success
5,541,904 UART:
5,541,920 UART: Running Caliptra FMC ...
5,542,328 UART:
5,542,471 UART: [state] CFI Enabled
5,631,486 UART: [art] Extend RT PCRs Done
5,631,914 UART: [art] Lock RT PCRs Done
5,633,407 UART: [art] Populate DV Done
5,641,768 UART: [fht] FMC Alias Private Key: 7
5,642,874 UART: [art] Derive CDI
5,643,154 UART: [art] Store in in slot 0x4
5,728,761 UART: [art] Derive Key Pair
5,729,121 UART: [art] Store priv key in slot 0x5
5,742,733 UART: [art] Derive Key Pair - Done
5,757,550 UART: [art] Signing Cert with AUTHO
5,758,030 UART: RITY.KEYID = 7
5,773,280 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,045 UART: [art] PUB.X = C538D94D4FBDBC07A109340D59B6A05B7CC2548AF7B43005661912BA9CD9B3A512D720B5014F9DA4C696FB38D2E64548
5,780,806 UART: [art] PUB.Y = 08F5887AA10A8BCE3F161C039984C318F221C8B03F647C04AA2B1B37728EFC4D1367F75C3D5A42843D2CD71E6CF4638F
5,787,750 UART: [art] SIG.R = 4600EF822C7521014857A594D24F6CD5FB1643FAC9FAE2A7C8D6F4267B7FB9945577C5CD68BF1AEEB99C9FFBA8C2C94B
5,794,513 UART: [art] SIG.S = 3203DBE77FE43BAE281FC8DD64F735CB256FA7B1DECB72DD0E035CAA292E37B4A5F783A54B64DA38BAFB4AC82A1E4078
5,817,975 UART: Caliptra RT
5,818,320 UART: [state] CFI Enabled
6,100,397 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,206 UART:
192,570 UART: Running Caliptra ROM ...
193,766 UART:
193,922 UART: [state] CFI Enabled
264,636 UART: [state] LifecycleState = Unprovisioned
266,552 UART: [state] DebugLocked = No
268,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,516 UART: [kat] SHA2-256
443,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,711 UART: [kat] ++
454,192 UART: [kat] sha1
465,281 UART: [kat] SHA2-256
467,955 UART: [kat] SHA2-384
473,453 UART: [kat] SHA2-512-ACC
475,824 UART: [kat] ECC-384
2,766,637 UART: [kat] HMAC-384Kdf
2,799,250 UART: [kat] LMS
3,989,538 UART: [kat] --
3,994,077 UART: [cold-reset] ++
3,995,022 UART: [fht] Storing FHT @ 0x50003400
4,006,298 UART: [idev] ++
4,006,871 UART: [idev] CDI.KEYID = 6
4,007,793 UART: [idev] SUBJECT.KEYID = 7
4,009,041 UART: [idev] UDS.KEYID = 0
4,010,131 ready_for_fw is high
4,010,359 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,517 UART: [idev] Erasing UDS.KEYID = 0
7,342,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,823 UART: [idev] --
7,369,244 UART: [ldev] ++
7,369,869 UART: [ldev] CDI.KEYID = 6
7,370,753 UART: [ldev] SUBJECT.KEYID = 5
7,372,018 UART: [ldev] AUTHORITY.KEYID = 7
7,373,250 UART: [ldev] FE.KEYID = 1
7,420,866 UART: [ldev] Erasing FE.KEYID = 1
10,754,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,590 UART: [ldev] --
13,136,123 UART: [fwproc] Waiting for Commands...
13,138,109 UART: [fwproc] Received command 0x46574c44
13,140,290 UART: [fwproc] Received Image of size 113760 bytes
17,195,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,192 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,345,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,660,780 >>> mbox cmd response: success
17,665,736 UART: [afmc] ++
17,666,332 UART: [afmc] CDI.KEYID = 6
17,667,220 UART: [afmc] SUBJECT.KEYID = 7
17,668,485 UART: [afmc] AUTHORITY.KEYID = 5
21,025,964 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,359 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,728 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,558 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,004 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,475 UART: [afmc] --
23,397,470 UART: [cold-reset] --
23,400,857 UART: [state] Locking Datavault
23,405,553 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,268 UART: [state] Locking ICCM
23,410,096 UART: [exit] Launching FMC @ 0x40000130
23,418,487 UART:
23,418,718 UART: Running Caliptra FMC ...
23,419,754 UART:
23,419,902 UART: [state] CFI Enabled
23,485,319 UART: [fht] FMC Alias Private Key: 7
25,823,259 UART: [art] Extend RT PCRs Done
25,824,485 UART: [art] Lock RT PCRs Done
25,826,083 UART: [art] Populate DV Done
25,831,387 UART: [fht] FMC Alias Private Key: 7
25,833,025 UART: [art] Derive CDI
25,833,761 UART: [art] Store in in slot 0x4
25,893,877 UART: [art] Derive Key Pair
25,894,929 UART: [art] Store priv key in slot 0x5
29,187,392 UART: [art] Derive Key Pair - Done
29,200,172 UART: [art] Signing Cert with AUTHO
29,201,479 UART: RITY.KEYID = 7
31,489,109 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,614 UART: [art] PUB.X = 62EA9069A84985A5D79B3F13EA61DDAECBE3FB878B91C8CEBADAFD1AA15B306910856E61751388E8922E3B5FFC7B6EE6
31,497,850 UART: [art] PUB.Y = 9EB6A56A8D97A8001672B7FCA47B8AE9856719F2A05FDA957FB9420A80F8118FAE5CFF00EF8FD13F58337BA8657EBFC9
31,505,136 UART: [art] SIG.R = E671FCCA9BFE66557279A9ACA147ACB51E88A9D8EA2A79AD0A20B0C569AD77EC07B11BF87257AF704F324D50651B3386
31,512,519 UART: [art] SIG.S = 24F453E3A274777A681265A0A594C195D1D65DF4E29611336CBCD6F9052583637F6050DD10D86AEE9580A0D2CE70E212
32,817,412 UART: Caliptra RT
32,818,127 UART: [state] CFI Enabled
32,981,236 UART: [rt] RT listening for mailbox commands...
32,983,127 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,014,191 UART: [rt]cmd =0x434b4558, len=80
38,765,215 >>> mbox cmd response data (6280 bytes)
38,798,662 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,829,038 UART: [rt]cmd =0x414c544e, len=41
38,831,328 >>> mbox cmd response data (8 bytes)
38,831,912 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,862,305 UART: [rt]cmd =0x434b4558, len=80
44,610,767 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,804,848 ready_for_fw is high
3,805,449 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,870,628 >>> mbox cmd response: success
23,568,215 UART:
23,568,662 UART: Running Caliptra FMC ...
23,569,773 UART:
23,569,926 UART: [state] CFI Enabled
23,639,190 UART: [fht] FMC Alias Private Key: 7
25,976,918 UART: [art] Extend RT PCRs Done
25,978,144 UART: [art] Lock RT PCRs Done
25,979,903 UART: [art] Populate DV Done
25,985,210 UART: [fht] FMC Alias Private Key: 7
25,986,756 UART: [art] Derive CDI
25,987,494 UART: [art] Store in in slot 0x4
26,047,413 UART: [art] Derive Key Pair
26,048,462 UART: [art] Store priv key in slot 0x5
29,341,618 UART: [art] Derive Key Pair - Done
29,354,744 UART: [art] Signing Cert with AUTHO
29,356,049 UART: RITY.KEYID = 7
31,643,675 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,183 UART: [art] PUB.X = 2EE6FE07934945BD01DAD0509B16794FECA8FD3F90B443EE36E3CD4FCB74E6D2ADA002F373FA5AA105E82E5F7E9713F8
31,652,460 UART: [art] PUB.Y = 0EBD547F6A8B141445FD14783C80C38A1396A86C72498ABA108D3EA0A8C2A0292936B9C305FEA80CE0AAA5950F679039
31,659,662 UART: [art] SIG.R = 1AF65B548FA62944D3B1913E2495BFE4E16A2C3A06CC103164017622C3AFC3A792E3BD63FEE87A5F182F489920AF7C36
31,667,066 UART: [art] SIG.S = ED45ED7E90D16C8DE62E5B589B4D871CC6F1FB86FEAAD730F3DF1485C76FF130B1D2943E34CBE9B08A64913677030B27
32,972,356 UART: Caliptra RT
32,973,069 UART: [state] CFI Enabled
33,134,623 UART: [rt] RT listening for mailbox commands...
33,136,501 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,167,670 UART: [rt]cmd =0x434b4558, len=80
38,919,934 >>> mbox cmd response data (6280 bytes)
38,953,356 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,983,761 UART: [rt]cmd =0x414c544e, len=41
38,986,381 >>> mbox cmd response data (8 bytes)
38,986,971 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,017,221 UART: [rt]cmd =0x434b4558, len=80
44,763,608 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,626 writing to cptra_bootfsm_go
192,871 UART:
193,258 UART: Running Caliptra ROM ...
194,440 UART:
603,880 UART: [state] CFI Enabled
617,612 UART: [state] LifecycleState = Unprovisioned
619,560 UART: [state] DebugLocked = No
621,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,649 UART: [kat] SHA2-256
796,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,869 UART: [kat] ++
807,469 UART: [kat] sha1
818,983 UART: [kat] SHA2-256
821,699 UART: [kat] SHA2-384
828,463 UART: [kat] SHA2-512-ACC
830,819 UART: [kat] ECC-384
3,116,311 UART: [kat] HMAC-384Kdf
3,127,549 UART: [kat] LMS
4,317,646 UART: [kat] --
4,320,957 UART: [cold-reset] ++
4,323,174 UART: [fht] Storing FHT @ 0x50003400
4,335,572 UART: [idev] ++
4,336,130 UART: [idev] CDI.KEYID = 6
4,337,008 UART: [idev] SUBJECT.KEYID = 7
4,338,324 UART: [idev] UDS.KEYID = 0
4,339,273 ready_for_fw is high
4,339,461 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,329 UART: [idev] Erasing UDS.KEYID = 0
7,623,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,092 UART: [idev] --
7,649,206 UART: [ldev] ++
7,649,778 UART: [ldev] CDI.KEYID = 6
7,650,750 UART: [ldev] SUBJECT.KEYID = 5
7,651,961 UART: [ldev] AUTHORITY.KEYID = 7
7,653,262 UART: [ldev] FE.KEYID = 1
7,663,634 UART: [ldev] Erasing FE.KEYID = 1
10,950,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,763 UART: [ldev] --
13,314,021 UART: [fwproc] Waiting for Commands...
13,316,598 UART: [fwproc] Received command 0x46574c44
13,318,831 UART: [fwproc] Received Image of size 113760 bytes
17,370,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,831,589 >>> mbox cmd response: success
17,836,548 UART: [afmc] ++
17,837,181 UART: [afmc] CDI.KEYID = 6
17,838,097 UART: [afmc] SUBJECT.KEYID = 7
17,839,320 UART: [afmc] AUTHORITY.KEYID = 5
21,155,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,531 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,944 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,739 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,200 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,746 UART: [afmc] --
23,524,972 UART: [cold-reset] --
23,527,811 UART: [state] Locking Datavault
23,534,734 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,443 UART: [state] Locking ICCM
23,538,268 UART: [exit] Launching FMC @ 0x40000130
23,546,666 UART:
23,546,918 UART: Running Caliptra FMC ...
23,548,018 UART:
23,548,180 UART: [state] CFI Enabled
23,556,680 UART: [fht] FMC Alias Private Key: 7
25,887,537 UART: [art] Extend RT PCRs Done
25,888,755 UART: [art] Lock RT PCRs Done
25,890,320 UART: [art] Populate DV Done
25,895,566 UART: [fht] FMC Alias Private Key: 7
25,897,316 UART: [art] Derive CDI
25,898,125 UART: [art] Store in in slot 0x4
25,940,556 UART: [art] Derive Key Pair
25,941,593 UART: [art] Store priv key in slot 0x5
29,183,466 UART: [art] Derive Key Pair - Done
29,196,236 UART: [art] Signing Cert with AUTHO
29,197,575 UART: RITY.KEYID = 7
31,476,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,520 UART: [art] PUB.X = 99A9AEA346231B745E5CBBCF4D788F8A6CEFE1B1135A99AFD60871DE269FF1ED4CD603C485DF23071C6D4210CB9E067D
31,485,791 UART: [art] PUB.Y = 9AEC4220DBAC7FDB5541A7DB0C2314B0BCF61A46FB0126A036DF13F5620D52C1951CE99162050D6FF1A8D2994EF925C1
31,493,044 UART: [art] SIG.R = CCED8264D55DB371678B9A60003E7ADDBA47EB821B5CF6DECD6437734394A7F2329AEC9A31D53BB670CA39A5AE0CF21E
31,500,463 UART: [art] SIG.S = 06237DF4DDBC9BC2D1F9B4AD50113A5E552B9389D59F40B399132019B536D2291A197313E14CF7A802D10FCB74DE6645
32,805,478 UART: Caliptra RT
32,806,187 UART: [state] CFI Enabled
32,923,028 UART: [rt] RT listening for mailbox commands...
32,924,915 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,955,439 UART: [rt]cmd =0x434b4558, len=80
38,616,018 >>> mbox cmd response data (6280 bytes)
38,650,023 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,680,419 UART: [rt]cmd =0x414c544e, len=41
38,682,756 >>> mbox cmd response data (8 bytes)
38,683,392 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,713,853 UART: [rt]cmd =0x434b4558, len=80
44,372,389 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,639 writing to cptra_bootfsm_go
4,125,379 ready_for_fw is high
4,126,001 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,488 >>> mbox cmd response: success
23,705,536 UART:
23,705,907 UART: Running Caliptra FMC ...
23,707,102 UART:
23,707,267 UART: [state] CFI Enabled
23,715,423 UART: [fht] FMC Alias Private Key: 7
26,046,708 UART: [art] Extend RT PCRs Done
26,047,931 UART: [art] Lock RT PCRs Done
26,049,449 UART: [art] Populate DV Done
26,054,975 UART: [fht] FMC Alias Private Key: 7
26,056,518 UART: [art] Derive CDI
26,057,287 UART: [art] Store in in slot 0x4
26,099,453 UART: [art] Derive Key Pair
26,100,515 UART: [art] Store priv key in slot 0x5
29,343,260 UART: [art] Derive Key Pair - Done
29,356,425 UART: [art] Signing Cert with AUTHO
29,357,726 UART: RITY.KEYID = 7
31,637,362 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,871 UART: [art] PUB.X = 749D1FD33A76D01E9FA2BF81713E881133B4271A96BDE13026744F3FBE2C2F991EFF8EFB4C81DDE0D1307F3DEF71604B
31,646,144 UART: [art] PUB.Y = 285265D69F8EC6EFBBD1F164BCD5DF79DE827DA7386DDFFE0C1E6B1A328E081FEDF57F1E44B6E44DF5FA73CE9F6EE944
31,653,436 UART: [art] SIG.R = 28ECC731AB6E70D2392290114F0505A416C3BEE26B2DB1DC6F4EE51791CAA0E29AC53399BC63F8F8A95B0BBC88DDC2C9
31,660,821 UART: [art] SIG.S = 307E85C5AD1AD270D326EDFDACE7FA9CE67918B9F39BCE24B3EA968C1DE39309DA202E1BF29976AA82CB72E99FE4FFAB
32,965,440 UART: Caliptra RT
32,966,161 UART: [state] CFI Enabled
33,082,683 UART: [rt] RT listening for mailbox commands...
33,084,577 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,114,993 UART: [rt]cmd =0x434b4558, len=80
38,774,155 >>> mbox cmd response data (6280 bytes)
38,808,117 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,838,510 UART: [rt]cmd =0x414c544e, len=41
38,840,907 >>> mbox cmd response data (8 bytes)
38,841,487 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,871,735 UART: [rt]cmd =0x434b4558, len=80
44,531,552 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,320 writing to cptra_bootfsm_go
193,519 UART:
193,881 UART: Running Caliptra ROM ...
195,087 UART:
195,248 UART: [state] CFI Enabled
266,443 UART: [state] LifecycleState = Unprovisioned
268,361 UART: [state] DebugLocked = No
269,896 UART: [state] WD Timer not started. Device not locked for debugging
274,236 UART: [kat] SHA2-256
453,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,952 UART: [kat] ++
465,396 UART: [kat] sha1
476,268 UART: [kat] SHA2-256
479,281 UART: [kat] SHA2-384
485,347 UART: [kat] SHA2-512-ACC
488,325 UART: [kat] ECC-384
2,950,163 UART: [kat] HMAC-384Kdf
2,971,430 UART: [kat] LMS
3,500,873 UART: [kat] --
3,504,370 UART: [cold-reset] ++
3,505,444 UART: [fht] FHT @ 0x50003400
3,516,274 UART: [idev] ++
3,516,846 UART: [idev] CDI.KEYID = 6
3,517,767 UART: [idev] SUBJECT.KEYID = 7
3,518,959 UART: [idev] UDS.KEYID = 0
3,519,888 ready_for_fw is high
3,520,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,639 UART: [idev] Erasing UDS.KEYID = 0
6,027,894 UART: [idev] Sha1 KeyId Algorithm
6,050,268 UART: [idev] --
6,052,644 UART: [ldev] ++
6,053,223 UART: [ldev] CDI.KEYID = 6
6,054,136 UART: [ldev] SUBJECT.KEYID = 5
6,055,292 UART: [ldev] AUTHORITY.KEYID = 7
6,056,524 UART: [ldev] FE.KEYID = 1
6,100,346 UART: [ldev] Erasing FE.KEYID = 1
8,603,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,656 UART: [ldev] --
10,412,848 UART: [fwproc] Wait for Commands...
10,415,274 UART: [fwproc] Recv command 0x46574c44
10,417,310 UART: [fwproc] Recv'd Img size: 114084 bytes
13,810,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,414 >>> mbox cmd response: success
14,275,363 UART: [afmc] ++
14,275,951 UART: [afmc] CDI.KEYID = 6
14,276,865 UART: [afmc] SUBJECT.KEYID = 7
14,277,959 UART: [afmc] AUTHORITY.KEYID = 5
16,803,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,038 UART: [afmc] --
18,606,130 UART: [cold-reset] --
18,608,530 UART: [state] Locking Datavault
18,613,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,129 UART: [state] Locking ICCM
18,617,201 UART: [exit] Launching FMC @ 0x40000130
18,625,597 UART:
18,625,830 UART: Running Caliptra FMC ...
18,626,929 UART:
18,627,084 UART: [state] CFI Enabled
18,689,024 UART: [fht] FMC Alias Private Key: 7
20,452,888 UART: [art] Extend RT PCRs Done
20,454,099 UART: [art] Lock RT PCRs Done
20,455,528 UART: [art] Populate DV Done
20,460,880 UART: [fht] FMC Alias Private Key: 7
20,462,370 UART: [art] Derive CDI
20,463,130 UART: [art] Store in in slot 0x4
20,521,247 UART: [art] Derive Key Pair
20,522,287 UART: [art] Store priv key in slot 0x5
22,985,185 UART: [art] Derive Key Pair - Done
22,998,229 UART: [art] Signing Cert with AUTHO
22,999,531 UART: RITY.KEYID = 7
24,711,340 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,835 UART: [art] PUB.X = 6FB7D197F1F2AF42B373B581AA7C0E1D78EBC952D0E4913CDAE420065603BD33C05DF12CC2F7D422338B26B069486388
24,720,099 UART: [art] PUB.Y = FA2DFAACE442C68F32771A0E7647AC4C653263B5700EC7A9322EB04CF3BC0C2D5BE341EDE03354B3D1242BB0A06386F5
24,727,370 UART: [art] SIG.R = A6A7F2BD552A9BD3D38BE5596DF4316C2AEA0520361A5820DDC2E7A97C0949F67B86924F4B7164D483FF2EF8E2536755
24,734,758 UART: [art] SIG.S = 9E4591CAED1EC56F9DE8EAC1E6F17620D0A4194C42D73D790DDA30EE9096BD4FE426C97C654F147485D60EC60785226A
25,713,969 UART: Caliptra RT
25,714,679 UART: [state] CFI Enabled
25,880,036 UART: [rt] RT listening for mailbox commands...
25,881,944 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,912,951 UART: [rt]cmd =0x434b4558, len=80
30,259,928 >>> mbox cmd response data (6280 bytes)
30,293,500 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,323,817 UART: [rt]cmd =0x414c544e, len=41
30,326,246 >>> mbox cmd response data (8 bytes)
30,326,859 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,357,377 UART: [rt]cmd =0x434b4558, len=80
34,697,013 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
3,367,508 ready_for_fw is high
3,368,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,426 >>> mbox cmd response: success
18,325,668 UART:
18,326,079 UART: Running Caliptra FMC ...
18,327,188 UART:
18,327,341 UART: [state] CFI Enabled
18,393,626 UART: [fht] FMC Alias Private Key: 7
20,157,592 UART: [art] Extend RT PCRs Done
20,158,822 UART: [art] Lock RT PCRs Done
20,160,636 UART: [art] Populate DV Done
20,166,162 UART: [fht] FMC Alias Private Key: 7
20,167,812 UART: [art] Derive CDI
20,168,624 UART: [art] Store in in slot 0x4
20,226,114 UART: [art] Derive Key Pair
20,227,159 UART: [art] Store priv key in slot 0x5
22,690,444 UART: [art] Derive Key Pair - Done
22,703,340 UART: [art] Signing Cert with AUTHO
22,704,649 UART: RITY.KEYID = 7
24,416,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,418,129 UART: [art] PUB.X = C737C32A4085EA4E97F52C1F5187E6AF474E13FBC92A0C0A969D1EB3FD6F4DBCD2A97B940EC5C585E501EF3334235327
24,425,403 UART: [art] PUB.Y = 9671F94E4F5D296B347150D04859B5770735760AD3053C0FCA7D3D808D693472DC50F39C4618F781161860DB3883456A
24,432,617 UART: [art] SIG.R = 2EA6760AF24CA5DD48A9478F52FCC82AA9602C1687F152CFFED1B3DD9C45157313FBA210CD07C3EFFEADDC340288943C
24,440,039 UART: [art] SIG.S = 2B359E413628C9E48C8DA1978BBB398A29DD2844A5AF28D406C47F37D85787C6AB58ECBBC3CDBCFE50DA87E8644F0EAE
25,419,048 UART: Caliptra RT
25,419,768 UART: [state] CFI Enabled
25,583,503 UART: [rt] RT listening for mailbox commands...
25,585,413 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,616,622 UART: [rt]cmd =0x434b4558, len=80
29,962,396 >>> mbox cmd response data (6280 bytes)
29,996,376 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,026,847 UART: [rt]cmd =0x414c544e, len=41
30,029,249 >>> mbox cmd response data (8 bytes)
30,029,831 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,060,122 UART: [rt]cmd =0x434b4558, len=80
34,398,022 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,923 writing to cptra_bootfsm_go
193,003 UART:
193,396 UART: Running Caliptra ROM ...
194,524 UART:
603,938 UART: [state] CFI Enabled
620,720 UART: [state] LifecycleState = Unprovisioned
622,599 UART: [state] DebugLocked = No
625,540 UART: [state] WD Timer not started. Device not locked for debugging
630,102 UART: [kat] SHA2-256
809,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,820 UART: [kat] ++
821,273 UART: [kat] sha1
832,360 UART: [kat] SHA2-256
835,377 UART: [kat] SHA2-384
841,157 UART: [kat] SHA2-512-ACC
844,098 UART: [kat] ECC-384
3,286,427 UART: [kat] HMAC-384Kdf
3,299,240 UART: [kat] LMS
3,828,748 UART: [kat] --
3,832,379 UART: [cold-reset] ++
3,833,529 UART: [fht] FHT @ 0x50003400
3,844,296 UART: [idev] ++
3,844,863 UART: [idev] CDI.KEYID = 6
3,845,842 UART: [idev] SUBJECT.KEYID = 7
3,847,034 UART: [idev] UDS.KEYID = 0
3,847,961 ready_for_fw is high
3,848,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,047 UART: [idev] Erasing UDS.KEYID = 0
6,326,449 UART: [idev] Sha1 KeyId Algorithm
6,350,206 UART: [idev] --
6,354,131 UART: [ldev] ++
6,354,711 UART: [ldev] CDI.KEYID = 6
6,355,631 UART: [ldev] SUBJECT.KEYID = 5
6,356,848 UART: [ldev] AUTHORITY.KEYID = 7
6,358,082 UART: [ldev] FE.KEYID = 1
6,369,412 UART: [ldev] Erasing FE.KEYID = 1
8,844,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,907 UART: [ldev] --
10,635,423 UART: [fwproc] Wait for Commands...
10,637,196 UART: [fwproc] Recv command 0x46574c44
10,639,293 UART: [fwproc] Recv'd Img size: 114084 bytes
14,041,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,503,386 >>> mbox cmd response: success
14,507,141 UART: [afmc] ++
14,507,738 UART: [afmc] CDI.KEYID = 6
14,508,652 UART: [afmc] SUBJECT.KEYID = 7
14,509,815 UART: [afmc] AUTHORITY.KEYID = 5
17,012,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,734,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,314 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,318 UART: [afmc] --
18,810,131 UART: [cold-reset] --
18,813,725 UART: [state] Locking Datavault
18,819,024 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,692 UART: [state] Locking ICCM
18,822,466 UART: [exit] Launching FMC @ 0x40000130
18,830,869 UART:
18,831,119 UART: Running Caliptra FMC ...
18,832,225 UART:
18,832,387 UART: [state] CFI Enabled
18,840,275 UART: [fht] FMC Alias Private Key: 7
20,596,636 UART: [art] Extend RT PCRs Done
20,597,856 UART: [art] Lock RT PCRs Done
20,599,723 UART: [art] Populate DV Done
20,604,978 UART: [fht] FMC Alias Private Key: 7
20,606,572 UART: [art] Derive CDI
20,607,386 UART: [art] Store in in slot 0x4
20,650,256 UART: [art] Derive Key Pair
20,651,263 UART: [art] Store priv key in slot 0x5
23,078,367 UART: [art] Derive Key Pair - Done
23,091,152 UART: [art] Signing Cert with AUTHO
23,092,463 UART: RITY.KEYID = 7
24,798,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,684 UART: [art] PUB.X = 764F28BD0279163E4E7AEEB131D2F85ACC42FAC15A5026A27A8B5734FCAF89CE46E44BCC66A53757A1426C6F8201DD07
24,807,019 UART: [art] PUB.Y = 7864192FBBC648EA80241C8A0D4776E9B5817DD3573FF6A97E7064EE18B44113051FC6EC5D75D2F53C7CC3A478C9CB0C
24,814,280 UART: [art] SIG.R = 32B21F59F84C56A0C9B1BACAE4357D8931D580993DE8FA1C54B7115AA84C4974E6C85208BB8D282B269A56C287899EC3
24,821,710 UART: [art] SIG.S = 9291D8AE2101370E11C13D82EF2CF729C325FD8847828FF28FD204CB26327801EBF9777EBF1E6E2D5E73693397FD2D2E
25,800,499 UART: Caliptra RT
25,801,192 UART: [state] CFI Enabled
25,918,645 UART: [rt] RT listening for mailbox commands...
25,920,537 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,950,784 UART: [rt]cmd =0x434b4558, len=80
30,220,668 >>> mbox cmd response data (6280 bytes)
30,254,847 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,285,134 UART: [rt]cmd =0x414c544e, len=41
30,287,642 >>> mbox cmd response data (8 bytes)
30,288,231 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,318,538 UART: [rt]cmd =0x434b4558, len=80
34,588,920 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
3,700,733 ready_for_fw is high
3,701,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,932 >>> mbox cmd response: success
18,513,354 UART:
18,513,756 UART: Running Caliptra FMC ...
18,514,889 UART:
18,515,062 UART: [state] CFI Enabled
18,522,962 UART: [fht] FMC Alias Private Key: 7
20,280,060 UART: [art] Extend RT PCRs Done
20,281,290 UART: [art] Lock RT PCRs Done
20,282,762 UART: [art] Populate DV Done
20,288,181 UART: [fht] FMC Alias Private Key: 7
20,289,728 UART: [art] Derive CDI
20,290,566 UART: [art] Store in in slot 0x4
20,333,008 UART: [art] Derive Key Pair
20,334,021 UART: [art] Store priv key in slot 0x5
22,760,673 UART: [art] Derive Key Pair - Done
22,773,568 UART: [art] Signing Cert with AUTHO
22,774,880 UART: RITY.KEYID = 7
24,480,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,660 UART: [art] PUB.X = B71B0688824C32DB135E8FDD6FB3CD7EFEE4759FCF1EC506AD7172A4D86C582D9345F96367B3B7283B511CD8BE6CFC17
24,488,939 UART: [art] PUB.Y = 8DDFCD6588145ECD4CC28C5673D736E3590C1BFBD2FD605431D3758352E0838EBF0B33F7E14BE505EC6D63CAB7C98A2C
24,496,225 UART: [art] SIG.R = A99589C1339F9A3A2A00ECEA9F8999251DDC21D2BCEB6220CA09BA6E938AF62F8BF300EB9A584F29F9EE401DE50E7FB3
24,503,594 UART: [art] SIG.S = FA44141C85B4A6985DFD6B834FE0B29139E344F6DB85FE4F43E46B4640481B2D2F41E22C866F81D7DF037B60DC04156C
25,482,699 UART: Caliptra RT
25,483,402 UART: [state] CFI Enabled
25,600,998 UART: [rt] RT listening for mailbox commands...
25,602,882 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,633,606 UART: [rt]cmd =0x434b4558, len=80
29,903,380 >>> mbox cmd response data (6280 bytes)
29,937,463 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
29,967,733 UART: [rt]cmd =0x414c544e, len=41
29,970,161 >>> mbox cmd response data (8 bytes)
29,970,754 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,001,167 UART: [rt]cmd =0x434b4558, len=80
34,271,597 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,328 UART:
192,720 UART: Running Caliptra ROM ...
193,914 UART:
194,309 UART: [state] CFI Enabled
264,617 UART: [state] LifecycleState = Unprovisioned
267,005 UART: [state] DebugLocked = No
268,843 UART: [state] WD Timer not started. Device not locked for debugging
272,890 UART: [kat] SHA2-256
462,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,515 UART: [kat] ++
473,992 UART: [kat] sha1
484,938 UART: [kat] SHA2-256
488,017 UART: [kat] SHA2-384
494,151 UART: [kat] SHA2-512-ACC
496,734 UART: [kat] ECC-384
2,949,084 UART: [kat] HMAC-384Kdf
2,973,172 UART: [kat] LMS
3,504,940 UART: [kat] --
3,511,002 UART: [cold-reset] ++
3,513,175 UART: [fht] FHT @ 0x50003400
3,524,368 UART: [idev] ++
3,525,001 UART: [idev] CDI.KEYID = 6
3,526,032 UART: [idev] SUBJECT.KEYID = 7
3,527,203 UART: [idev] UDS.KEYID = 0
3,528,134 ready_for_fw is high
3,528,342 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,923 UART: [idev] Erasing UDS.KEYID = 0
6,028,254 UART: [idev] Sha1 KeyId Algorithm
6,050,240 UART: [idev] --
6,055,184 UART: [ldev] ++
6,055,927 UART: [ldev] CDI.KEYID = 6
6,056,840 UART: [ldev] SUBJECT.KEYID = 5
6,057,999 UART: [ldev] AUTHORITY.KEYID = 7
6,059,225 UART: [ldev] FE.KEYID = 1
6,102,865 UART: [ldev] Erasing FE.KEYID = 1
8,607,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,277 UART: [ldev] --
10,415,612 UART: [fwproc] Wait for Commands...
10,417,054 UART: [fwproc] Recv command 0x46574c44
10,419,366 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,214 >>> mbox cmd response: success
14,605,799 UART: [afmc] ++
14,606,510 UART: [afmc] CDI.KEYID = 6
14,607,701 UART: [afmc] SUBJECT.KEYID = 7
14,609,155 UART: [afmc] AUTHORITY.KEYID = 5
17,152,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,156 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,913 UART: [afmc] --
18,967,911 UART: [cold-reset] --
18,972,375 UART: [state] Locking Datavault
18,979,851 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,016 UART: [state] Locking ICCM
18,983,798 UART: [exit] Launching FMC @ 0x40000130
18,992,483 UART:
18,992,722 UART: Running Caliptra FMC ...
18,993,822 UART:
18,994,001 UART: [state] CFI Enabled
19,052,316 UART: [fht] FMC Alias Private Key: 7
20,816,217 UART: [art] Extend RT PCRs Done
20,817,424 UART: [art] Lock RT PCRs Done
20,819,311 UART: [art] Populate DV Done
20,824,984 UART: [fht] FMC Alias Private Key: 7
20,826,516 UART: [art] Derive CDI
20,827,320 UART: [art] Store in in slot 0x4
20,884,964 UART: [art] Derive Key Pair
20,886,029 UART: [art] Store priv key in slot 0x5
23,349,121 UART: [art] Derive Key Pair - Done
23,361,794 UART: [art] Signing Cert with AUTHO
23,363,093 UART: RITY.KEYID = 7
25,075,532 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,040 UART: [art] PUB.X = 5153C82B906A829CF80B550F24228C6AF6D70B93A0928103D3329D436D5CBCA3FA3EE1397BF59AC7D5507D89BEA1C911
25,084,321 UART: [art] PUB.Y = 29421AE0BECB099260883EB42A9EB9558CF63D0DFEE6AE43C89957EE930653FB4546B4A13ECAD55D6F70FD55805F6672
25,091,610 UART: [art] SIG.R = D956821825FA720BB83C17E2DF23AED74E7C0FC66872FBF6EC05BB60F3C7CAF807CA32DDCA44CE36D87112E3D1DA877E
25,098,981 UART: [art] SIG.S = C230024A4DB6E7EF87A634D4EA4245F69D90BAD98383127312160CF068738E527B2024BBB7755B1405FB15226154D85D
26,078,021 UART: Caliptra RT
26,078,714 UART: [state] CFI Enabled
26,243,339 UART: [rt] RT listening for mailbox commands...
26,245,235 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,276,226 UART: [rt]cmd =0x434b4558, len=80
30,603,647 >>> mbox cmd response data (6280 bytes)
30,637,171 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,667,174 UART: [rt]cmd =0x414c544e, len=41
30,669,508 >>> mbox cmd response data (8 bytes)
30,670,085 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,700,529 UART: [rt]cmd =0x434b4558, len=80
35,040,879 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,418,566 ready_for_fw is high
3,419,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,705,900 >>> mbox cmd response: success
18,985,609 UART:
18,985,994 UART: Running Caliptra FMC ...
18,987,099 UART:
18,987,256 UART: [state] CFI Enabled
19,051,471 UART: [fht] FMC Alias Private Key: 7
20,815,547 UART: [art] Extend RT PCRs Done
20,816,764 UART: [art] Lock RT PCRs Done
20,818,711 UART: [art] Populate DV Done
20,823,844 UART: [fht] FMC Alias Private Key: 7
20,825,495 UART: [art] Derive CDI
20,826,311 UART: [art] Store in in slot 0x4
20,873,940 UART: [art] Derive Key Pair
20,874,931 UART: [art] Store priv key in slot 0x5
23,338,254 UART: [art] Derive Key Pair - Done
23,351,261 UART: [art] Signing Cert with AUTHO
23,352,564 UART: RITY.KEYID = 7
25,063,839 UART: [art] Erasing AUTHORITY.KEYID = 7
25,065,358 UART: [art] PUB.X = D065587998B687377E1EB82BDA671A5BAD35BCDBAE9D70537CA20AC93C63B80006BABC4C3735E119EF2B58680B04AD5B
25,072,580 UART: [art] PUB.Y = 7ED452B0B98AB122004B50E3F5AAEC64E7125D8257541FD80C8B664106516CF3BFB67B5ADCCCC6705A3ABB93F8064532
25,079,808 UART: [art] SIG.R = 718030F59BA03364FA0F1BCE71460929B8DA6188D7696135BECCE18EFA608E504BAE1C5F366BC10A143A8C010D89A869
25,087,214 UART: [art] SIG.S = 6790DE0D9870C0DCE4BA56E6A245F97FB354AB31A5C2D5DDA9C6AFCF2EB1F121314E7CDBC8ED224C64F26090289E6E7A
26,065,872 UART: Caliptra RT
26,066,569 UART: [state] CFI Enabled
26,231,896 UART: [rt] RT listening for mailbox commands...
26,233,790 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,264,764 UART: [rt]cmd =0x434b4558, len=80
30,610,972 >>> mbox cmd response data (6280 bytes)
30,644,567 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,674,768 UART: [rt]cmd =0x414c544e, len=41
30,677,031 >>> mbox cmd response data (8 bytes)
30,677,619 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,708,083 UART: [rt]cmd =0x434b4558, len=80
35,048,234 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
192,947 UART:
193,321 UART: Running Caliptra ROM ...
194,410 UART:
604,077 UART: [state] CFI Enabled
618,696 UART: [state] LifecycleState = Unprovisioned
621,107 UART: [state] DebugLocked = No
623,860 UART: [state] WD Timer not started. Device not locked for debugging
628,825 UART: [kat] SHA2-256
818,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,503 UART: [kat] ++
830,022 UART: [kat] sha1
840,684 UART: [kat] SHA2-256
843,763 UART: [kat] SHA2-384
849,570 UART: [kat] SHA2-512-ACC
852,186 UART: [kat] ECC-384
3,292,060 UART: [kat] HMAC-384Kdf
3,305,363 UART: [kat] LMS
3,837,182 UART: [kat] --
3,841,133 UART: [cold-reset] ++
3,842,292 UART: [fht] FHT @ 0x50003400
3,853,280 UART: [idev] ++
3,853,990 UART: [idev] CDI.KEYID = 6
3,854,924 UART: [idev] SUBJECT.KEYID = 7
3,856,104 UART: [idev] UDS.KEYID = 0
3,857,031 ready_for_fw is high
3,857,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,517 UART: [idev] Erasing UDS.KEYID = 0
6,330,725 UART: [idev] Sha1 KeyId Algorithm
6,352,665 UART: [idev] --
6,357,421 UART: [ldev] ++
6,358,153 UART: [ldev] CDI.KEYID = 6
6,359,068 UART: [ldev] SUBJECT.KEYID = 5
6,360,230 UART: [ldev] AUTHORITY.KEYID = 7
6,361,459 UART: [ldev] FE.KEYID = 1
6,372,974 UART: [ldev] Erasing FE.KEYID = 1
8,852,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,083 UART: [ldev] --
10,644,465 UART: [fwproc] Wait for Commands...
10,646,076 UART: [fwproc] Recv command 0x46574c44
10,648,338 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,822,387 >>> mbox cmd response: success
14,827,184 UART: [afmc] ++
14,827,894 UART: [afmc] CDI.KEYID = 6
14,829,091 UART: [afmc] SUBJECT.KEYID = 7
14,830,539 UART: [afmc] AUTHORITY.KEYID = 5
17,331,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,071,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,086,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,101,651 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,332 UART: [afmc] --
19,127,608 UART: [cold-reset] --
19,130,884 UART: [state] Locking Datavault
19,137,446 UART: [state] Locking PCR0, PCR1 and PCR31
19,139,598 UART: [state] Locking ICCM
19,141,919 UART: [exit] Launching FMC @ 0x40000130
19,150,554 UART:
19,150,795 UART: Running Caliptra FMC ...
19,151,845 UART:
19,151,996 UART: [state] CFI Enabled
19,160,478 UART: [fht] FMC Alias Private Key: 7
20,917,072 UART: [art] Extend RT PCRs Done
20,918,324 UART: [art] Lock RT PCRs Done
20,919,927 UART: [art] Populate DV Done
20,925,123 UART: [fht] FMC Alias Private Key: 7
20,926,808 UART: [art] Derive CDI
20,927,553 UART: [art] Store in in slot 0x4
20,969,934 UART: [art] Derive Key Pair
20,970,939 UART: [art] Store priv key in slot 0x5
23,397,590 UART: [art] Derive Key Pair - Done
23,410,306 UART: [art] Signing Cert with AUTHO
23,411,643 UART: RITY.KEYID = 7
25,117,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,717 UART: [art] PUB.X = A5B4794843ACE0235A1DF1E0D88A4BCAA28FE5E5D5A9A10216189A79E88F6D5A91BB9D38CCC9F3EE7267169980BD9EB9
25,125,993 UART: [art] PUB.Y = C51B137CA330CF42F6974C3ACFB11C22835B742727632C3FC3995B6D3F8DCD83C39B57FFB4549824ED92ADB54798F0A2
25,133,258 UART: [art] SIG.R = 37F9257853248E7AC88ABC46F635CFD07E93716CD71ED52A133E780E5119C532DD0CDDE321955505C8CA705A8B72166B
25,140,678 UART: [art] SIG.S = B77DC8AC41323D26D484559DB99DD04956917BFFCB9F11ACD6E8EEA774D766C4D9980A7503F0AF7EC22256E862902DE1
26,119,259 UART: Caliptra RT
26,119,969 UART: [state] CFI Enabled
26,237,749 UART: [rt] RT listening for mailbox commands...
26,239,657 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,269,998 UART: [rt]cmd =0x434b4558, len=80
30,540,468 >>> mbox cmd response data (6280 bytes)
30,574,083 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,604,422 UART: [rt]cmd =0x414c544e, len=41
30,606,837 >>> mbox cmd response data (8 bytes)
30,607,358 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,637,657 UART: [rt]cmd =0x434b4558, len=80
34,907,399 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
3,757,587 ready_for_fw is high
3,758,027 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,387 >>> mbox cmd response: success
19,198,749 UART:
19,199,152 UART: Running Caliptra FMC ...
19,200,351 UART:
19,200,524 UART: [state] CFI Enabled
19,208,576 UART: [fht] FMC Alias Private Key: 7
20,965,550 UART: [art] Extend RT PCRs Done
20,966,796 UART: [art] Lock RT PCRs Done
20,968,593 UART: [art] Populate DV Done
20,973,745 UART: [fht] FMC Alias Private Key: 7
20,975,290 UART: [art] Derive CDI
20,976,106 UART: [art] Store in in slot 0x4
21,018,547 UART: [art] Derive Key Pair
21,019,594 UART: [art] Store priv key in slot 0x5
23,446,527 UART: [art] Derive Key Pair - Done
23,459,687 UART: [art] Signing Cert with AUTHO
23,461,000 UART: RITY.KEYID = 7
25,166,635 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,151 UART: [art] PUB.X = C15B4E07D8FC275E1ED85CA9C8D9F41E18870948059A9B65DB1015782F86F5F5F7CE53A19F888F33C068D4D7812C4C7F
25,175,403 UART: [art] PUB.Y = B0191B8EA85C949D9B45420F0C4887E356B88403BAEE7AA739F59F5735DD1FD630AA5F46406BEFE64C3FEC3B3DE2A588
25,182,691 UART: [art] SIG.R = 771E2AD17E04B12D95F44A0BAD7B64B1C4C953EC0335B0F1376905BAC42E9C6CE5A092DAF8E03E3B526BCC75562088CF
25,190,085 UART: [art] SIG.S = 3D4A8DB794D6B2D91E8C6DCFB3DCEBF556350304AB72FCA9215428FBEB362551B7599A538798776A045954E464E30444
26,169,062 UART: Caliptra RT
26,169,790 UART: [state] CFI Enabled
26,287,330 UART: [rt] RT listening for mailbox commands...
26,289,227 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,319,585 UART: [rt]cmd =0x434b4558, len=80
30,589,717 >>> mbox cmd response data (6280 bytes)
30,623,689 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,653,808 UART: [rt]cmd =0x414c544e, len=41
30,656,209 >>> mbox cmd response data (8 bytes)
30,656,761 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,687,258 UART: [rt]cmd =0x434b4558, len=80
34,957,398 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,467 UART: [kat] SHA2-256
881,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,513 UART: [kat] ++
885,665 UART: [kat] sha1
889,703 UART: [kat] SHA2-256
891,641 UART: [kat] SHA2-384
894,334 UART: [kat] SHA2-512-ACC
896,235 UART: [kat] ECC-384
901,946 UART: [kat] HMAC-384Kdf
906,450 UART: [kat] LMS
1,474,646 UART: [kat] --
1,475,685 UART: [cold-reset] ++
1,476,055 UART: [fht] Storing FHT @ 0x50003400
1,478,850 UART: [idev] ++
1,479,018 UART: [idev] CDI.KEYID = 6
1,479,378 UART: [idev] SUBJECT.KEYID = 7
1,479,802 UART: [idev] UDS.KEYID = 0
1,480,147 ready_for_fw is high
1,480,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,766 UART: [idev] Erasing UDS.KEYID = 0
1,504,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,084 UART: [idev] --
1,514,075 UART: [ldev] ++
1,514,243 UART: [ldev] CDI.KEYID = 6
1,514,606 UART: [ldev] SUBJECT.KEYID = 5
1,515,032 UART: [ldev] AUTHORITY.KEYID = 7
1,515,495 UART: [ldev] FE.KEYID = 1
1,520,535 UART: [ldev] Erasing FE.KEYID = 1
1,546,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,140 UART: [ldev] --
1,585,483 UART: [fwproc] Waiting for Commands...
1,586,206 UART: [fwproc] Received command 0x46574c44
1,586,997 UART: [fwproc] Received Image of size 114084 bytes
2,881,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,498 >>> mbox cmd response: success
3,074,510 UART: [afmc] ++
3,074,678 UART: [afmc] CDI.KEYID = 6
3,075,040 UART: [afmc] SUBJECT.KEYID = 7
3,075,465 UART: [afmc] AUTHORITY.KEYID = 5
3,110,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,878 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,271 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,961 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,938 UART: [afmc] --
3,154,006 UART: [cold-reset] --
3,154,910 UART: [state] Locking Datavault
3,156,063 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,667 UART: [state] Locking ICCM
3,157,227 UART: [exit] Launching FMC @ 0x40000130
3,162,556 UART:
3,162,572 UART: Running Caliptra FMC ...
3,162,980 UART:
3,163,034 UART: [state] CFI Enabled
3,173,723 UART: [fht] FMC Alias Private Key: 7
3,282,110 UART: [art] Extend RT PCRs Done
3,282,538 UART: [art] Lock RT PCRs Done
3,284,338 UART: [art] Populate DV Done
3,292,471 UART: [fht] FMC Alias Private Key: 7
3,293,547 UART: [art] Derive CDI
3,293,827 UART: [art] Store in in slot 0x4
3,379,750 UART: [art] Derive Key Pair
3,380,110 UART: [art] Store priv key in slot 0x5
3,393,436 UART: [art] Derive Key Pair - Done
3,408,330 UART: [art] Signing Cert with AUTHO
3,408,810 UART: RITY.KEYID = 7
3,423,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,541 UART: [art] PUB.X = 0854F1B61BBFC21FB65C24DD6B1F0B70D0D11D06A0186C7C958B79122E9F2706D01ABAD4F3F807EA7DFDCE1834212F1A
3,431,312 UART: [art] PUB.Y = 213AC171247D8E19B495420F06AF90E97C89CD99015B76A32BDFFF9DC1559BC2ABE7023D96A8643A3973D219F4F80240
3,438,249 UART: [art] SIG.R = 4210AB3D49865012A76CD73202FF271ADD02CAB88A391A383EC5ED92C973B5A91B6251392D97C78529B10DE982F237B9
3,445,010 UART: [art] SIG.S = DCDF2EB4D1103D3339ABCECEC8C539F4D97713304579027E52CFD21BA85D74A3D494CC4183CB5593B13CF39E50AF0CB7
3,468,545 UART: Caliptra RT
3,468,798 UART: [state] CFI Enabled
3,576,997 UART: [rt] RT listening for mailbox commands...
3,577,667 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,799 UART: [rt]cmd =0x434b4558, len=80
3,776,562 >>> mbox cmd response data (6280 bytes)
3,776,563 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,965 UART: [rt]cmd =0x414c544e, len=41
3,807,742 >>> mbox cmd response data (8 bytes)
3,807,743 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,732 UART: [rt]cmd =0x434b4558, len=80
4,007,229 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 ready_for_fw is high
1,362,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,058 >>> mbox cmd response: success
2,986,662 UART:
2,986,678 UART: Running Caliptra FMC ...
2,987,086 UART:
2,987,140 UART: [state] CFI Enabled
2,997,607 UART: [fht] FMC Alias Private Key: 7
3,105,702 UART: [art] Extend RT PCRs Done
3,106,130 UART: [art] Lock RT PCRs Done
3,107,878 UART: [art] Populate DV Done
3,116,107 UART: [fht] FMC Alias Private Key: 7
3,117,225 UART: [art] Derive CDI
3,117,505 UART: [art] Store in in slot 0x4
3,202,922 UART: [art] Derive Key Pair
3,203,282 UART: [art] Store priv key in slot 0x5
3,216,020 UART: [art] Derive Key Pair - Done
3,230,563 UART: [art] Signing Cert with AUTHO
3,231,043 UART: RITY.KEYID = 7
3,245,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,696 UART: [art] PUB.X = 86AAEF3523BCEF8D667CE20D50C80F9773B1BDAB15D9C641E1EDDDFBF5C718FC636B326BD740D31C92524801B711888A
3,253,473 UART: [art] PUB.Y = A519C60D11F3583D22EC0B2D12B22BF5FC72096425CDE5F668AEC6837F42525230CF58B5B0332FA4825FDB510C4B6A6D
3,260,419 UART: [art] SIG.R = 7E0B4E9065F6E4F5F2E3AB7B81B7770E6605E7D862C41DBB145B000AFB73A473C4C4726B125105AA13126B8EC8E20F64
3,267,155 UART: [art] SIG.S = 5A1753D09C8EBE771207B9549AD3FDA86AE42E4CBBB1B9520DAA891C3FAA57752E007AC80F34035EB9B048ED35169C70
3,290,750 UART: Caliptra RT
3,291,003 UART: [state] CFI Enabled
3,400,101 UART: [rt] RT listening for mailbox commands...
3,400,771 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,959 UART: [rt]cmd =0x434b4558, len=80
3,600,338 >>> mbox cmd response data (6280 bytes)
3,600,339 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,843 UART: [rt]cmd =0x414c544e, len=41
3,631,784 >>> mbox cmd response data (8 bytes)
3,631,785 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,706 UART: [rt]cmd =0x434b4558, len=80
3,831,425 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,477,024 UART: [cold-reset] ++
1,477,470 UART: [fht] Storing FHT @ 0x50003400
1,480,435 UART: [idev] ++
1,480,603 UART: [idev] CDI.KEYID = 6
1,480,963 UART: [idev] SUBJECT.KEYID = 7
1,481,387 UART: [idev] UDS.KEYID = 0
1,481,732 ready_for_fw is high
1,481,732 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,381 UART: [idev] Erasing UDS.KEYID = 0
1,506,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,491 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,521,918 UART: [ldev] Erasing FE.KEYID = 1
1,547,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,415 UART: [ldev] --
1,586,724 UART: [fwproc] Waiting for Commands...
1,587,409 UART: [fwproc] Received command 0x46574c44
1,588,200 UART: [fwproc] Received Image of size 114084 bytes
2,882,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,701 >>> mbox cmd response: success
3,075,845 UART: [afmc] ++
3,076,013 UART: [afmc] CDI.KEYID = 6
3,076,375 UART: [afmc] SUBJECT.KEYID = 7
3,076,800 UART: [afmc] AUTHORITY.KEYID = 5
3,112,693 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,000 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,690 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,641 UART: [afmc] --
3,156,525 UART: [cold-reset] --
3,157,225 UART: [state] Locking Datavault
3,158,328 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,932 UART: [state] Locking ICCM
3,159,354 UART: [exit] Launching FMC @ 0x40000130
3,164,683 UART:
3,164,699 UART: Running Caliptra FMC ...
3,165,107 UART:
3,165,250 UART: [state] CFI Enabled
3,175,521 UART: [fht] FMC Alias Private Key: 7
3,282,788 UART: [art] Extend RT PCRs Done
3,283,216 UART: [art] Lock RT PCRs Done
3,284,492 UART: [art] Populate DV Done
3,292,979 UART: [fht] FMC Alias Private Key: 7
3,294,081 UART: [art] Derive CDI
3,294,361 UART: [art] Store in in slot 0x4
3,380,308 UART: [art] Derive Key Pair
3,380,668 UART: [art] Store priv key in slot 0x5
3,393,762 UART: [art] Derive Key Pair - Done
3,408,079 UART: [art] Signing Cert with AUTHO
3,408,559 UART: RITY.KEYID = 7
3,423,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,408 UART: [art] PUB.X = E4626E3DB9BED145DA013FC9C91651FF023CEF53CCABA6C27AAD5CEFAB733CF6F1DE201CF5A6891C500597D39DA7A9AA
3,431,199 UART: [art] PUB.Y = 20DC3ACD3671FC3756E7527C43592899C021DA3E03F18DC0218FD00C815191C63537C8051A1EB7A4575EBE8C3A78F5D6
3,438,142 UART: [art] SIG.R = 59CE59E46D69D493C1FF9CA6A20771174E2E365E23786A465CC356BD2B8D482EBDDED41A9598A956A710637A57E3D83D
3,444,915 UART: [art] SIG.S = F94C0AF1DB020F34090D899E58FB08DB1F6FD8474098411D1E852C753F49418CF6BA4D9A37E7C897C85CB9A7B476C407
3,468,973 UART: Caliptra RT
3,469,318 UART: [state] CFI Enabled
3,578,257 UART: [rt] RT listening for mailbox commands...
3,578,927 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,113 UART: [rt]cmd =0x434b4558, len=80
3,778,109 >>> mbox cmd response data (6280 bytes)
3,778,110 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,758 UART: [rt]cmd =0x414c544e, len=41
3,809,635 >>> mbox cmd response data (8 bytes)
3,809,636 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,481 UART: [rt]cmd =0x434b4558, len=80
4,007,621 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,396 ready_for_fw is high
1,363,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,097 >>> mbox cmd response: success
2,988,869 UART:
2,988,885 UART: Running Caliptra FMC ...
2,989,293 UART:
2,989,436 UART: [state] CFI Enabled
3,000,027 UART: [fht] FMC Alias Private Key: 7
3,108,466 UART: [art] Extend RT PCRs Done
3,108,894 UART: [art] Lock RT PCRs Done
3,110,422 UART: [art] Populate DV Done
3,118,671 UART: [fht] FMC Alias Private Key: 7
3,119,673 UART: [art] Derive CDI
3,119,953 UART: [art] Store in in slot 0x4
3,205,514 UART: [art] Derive Key Pair
3,205,874 UART: [art] Store priv key in slot 0x5
3,219,828 UART: [art] Derive Key Pair - Done
3,234,699 UART: [art] Signing Cert with AUTHO
3,235,179 UART: RITY.KEYID = 7
3,250,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,126 UART: [art] PUB.X = A76F836FF2C16C3A41974385FA70033DDADAB73ECE7E87A6A27F6C96EEED42410758EC5CC20D6CF0F1D9E0AA42B4CD6A
3,257,911 UART: [art] PUB.Y = 1B56141CB117878D2851FF9777A668C6FE8E1B34C9A3186F025E4BD8032E64D403B02CC5509C4E818DBBC5AAFB717A3F
3,264,860 UART: [art] SIG.R = 58D7A154256DD3877C140AC170FC2B793D1DC69400BBB1F7094181E98258729C0392C19DF4F1B1C53345194FBA152590
3,271,593 UART: [art] SIG.S = 8A4172DED977FBE27ECB2105541F8452168FE22669F884E5E74FB0B91EE5931F3518A263FB60C3F37F67D752B86CA942
3,295,669 UART: Caliptra RT
3,296,014 UART: [state] CFI Enabled
3,404,087 UART: [rt] RT listening for mailbox commands...
3,404,757 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,909 UART: [rt]cmd =0x434b4558, len=80
3,604,019 >>> mbox cmd response data (6280 bytes)
3,604,020 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,530 UART: [rt]cmd =0x414c544e, len=41
3,635,411 >>> mbox cmd response data (8 bytes)
3,635,412 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,297 UART: [rt]cmd =0x434b4558, len=80
3,835,155 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
923,086 UART: [kat] LMS
1,171,414 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,462 UART: [idev] ++
1,175,630 UART: [idev] CDI.KEYID = 6
1,175,990 UART: [idev] SUBJECT.KEYID = 7
1,176,414 UART: [idev] UDS.KEYID = 0
1,176,759 ready_for_fw is high
1,176,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,242 UART: [idev] Erasing UDS.KEYID = 0
1,201,407 UART: [idev] Sha1 KeyId Algorithm
1,209,923 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,536 UART: [ldev] SUBJECT.KEYID = 5
1,211,962 UART: [ldev] AUTHORITY.KEYID = 7
1,212,425 UART: [ldev] FE.KEYID = 1
1,217,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,461 UART: [ldev] --
1,282,932 UART: [fwproc] Wait for Commands...
1,283,756 UART: [fwproc] Recv command 0x46574c44
1,284,484 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,157 >>> mbox cmd response: success
2,772,241 UART: [afmc] ++
2,772,409 UART: [afmc] CDI.KEYID = 6
2,772,771 UART: [afmc] SUBJECT.KEYID = 7
2,773,196 UART: [afmc] AUTHORITY.KEYID = 5
2,809,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,492 UART: [afmc] --
2,852,602 UART: [cold-reset] --
2,853,454 UART: [state] Locking Datavault
2,854,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,087 UART: [state] Locking ICCM
2,855,749 UART: [exit] Launching FMC @ 0x40000130
2,861,078 UART:
2,861,094 UART: Running Caliptra FMC ...
2,861,502 UART:
2,861,556 UART: [state] CFI Enabled
2,871,783 UART: [fht] FMC Alias Private Key: 7
2,979,404 UART: [art] Extend RT PCRs Done
2,979,832 UART: [art] Lock RT PCRs Done
2,981,608 UART: [art] Populate DV Done
2,989,871 UART: [fht] FMC Alias Private Key: 7
2,990,901 UART: [art] Derive CDI
2,991,181 UART: [art] Store in in slot 0x4
3,077,232 UART: [art] Derive Key Pair
3,077,592 UART: [art] Store priv key in slot 0x5
3,090,998 UART: [art] Derive Key Pair - Done
3,105,590 UART: [art] Signing Cert with AUTHO
3,106,070 UART: RITY.KEYID = 7
3,121,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,957 UART: [art] PUB.X = 4D4FC3566EB1DC9E0475E8C0E9293FD03EA30E6BC51692AF4C266FD788B01972E918EF811F30BDEDAC3EC8F947931DE7
3,128,737 UART: [art] PUB.Y = 992F1DC08842D02C47B9121D17B792E02CA1F61A03002032DF37F3222E6B82545363A531A20FC876B91376099E8ED683
3,135,646 UART: [art] SIG.R = 562AFF37D63B0B38A0E03D4021621F52400B855ABE83D968BAF481E99362361F81BF744C8C7BF8CFC245418FE742892A
3,142,412 UART: [art] SIG.S = 14F14B116A90F79646C58FB3995C8DEED7D59608828C2C11BC347452D53E300B24FD15A2179883E0E05A99C70B42DEEA
3,166,712 UART: Caliptra RT
3,166,965 UART: [state] CFI Enabled
3,273,910 UART: [rt] RT listening for mailbox commands...
3,274,580 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,890 UART: [rt]cmd =0x434b4558, len=80
3,473,443 >>> mbox cmd response data (6280 bytes)
3,473,444 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,010 UART: [rt]cmd =0x414c544e, len=41
3,504,857 >>> mbox cmd response data (8 bytes)
3,504,858 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,627 UART: [rt]cmd =0x434b4558, len=80
3,703,960 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,759 ready_for_fw is high
1,060,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,904 >>> mbox cmd response: success
2,686,070 UART:
2,686,086 UART: Running Caliptra FMC ...
2,686,494 UART:
2,686,548 UART: [state] CFI Enabled
2,696,883 UART: [fht] FMC Alias Private Key: 7
2,804,392 UART: [art] Extend RT PCRs Done
2,804,820 UART: [art] Lock RT PCRs Done
2,806,402 UART: [art] Populate DV Done
2,814,651 UART: [fht] FMC Alias Private Key: 7
2,815,637 UART: [art] Derive CDI
2,815,917 UART: [art] Store in in slot 0x4
2,901,256 UART: [art] Derive Key Pair
2,901,616 UART: [art] Store priv key in slot 0x5
2,915,226 UART: [art] Derive Key Pair - Done
2,930,408 UART: [art] Signing Cert with AUTHO
2,930,888 UART: RITY.KEYID = 7
2,945,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,567 UART: [art] PUB.X = DB344F49ED5A3B26F8087AFE47D666719CE239D6C2567354297A99C35EA8798F26287B69E454CC03169DB92A2F74BF29
2,953,331 UART: [art] PUB.Y = EED1EDFD027837111F5EC48AE9BBCCE56FB78A49240001EECC3FC6C4D02A025878610F3C232492D8C1FDE46A71379465
2,960,259 UART: [art] SIG.R = 5FEC6369BDF2A40A1611A65C55013F55BA71B4DABC876A93856D44F13681BF623A052CD02AF074B4478B34A8EA09FCAB
2,967,029 UART: [art] SIG.S = 5EC96574C3CB7261DA2CCFD78DD438DAFE044EDEEBE35D8BCE5C96573BD877385FA9D4ABC00110634D7D5BCC612AC33F
2,990,798 UART: Caliptra RT
2,991,051 UART: [state] CFI Enabled
3,098,860 UART: [rt] RT listening for mailbox commands...
3,099,530 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,932 UART: [rt]cmd =0x434b4558, len=80
3,298,698 >>> mbox cmd response data (6280 bytes)
3,298,699 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,365 UART: [rt]cmd =0x414c544e, len=41
3,330,494 >>> mbox cmd response data (8 bytes)
3,330,495 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,346 UART: [rt]cmd =0x434b4558, len=80
3,528,420 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
893,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,988 UART: [kat] ++
898,140 UART: [kat] sha1
902,502 UART: [kat] SHA2-256
904,442 UART: [kat] SHA2-384
907,111 UART: [kat] SHA2-512-ACC
909,012 UART: [kat] ECC-384
918,713 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,468 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,695 UART: [idev] ++
1,175,863 UART: [idev] CDI.KEYID = 6
1,176,223 UART: [idev] SUBJECT.KEYID = 7
1,176,647 UART: [idev] UDS.KEYID = 0
1,176,992 ready_for_fw is high
1,176,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,837 UART: [idev] Erasing UDS.KEYID = 0
1,202,296 UART: [idev] Sha1 KeyId Algorithm
1,210,852 UART: [idev] --
1,211,818 UART: [ldev] ++
1,211,986 UART: [ldev] CDI.KEYID = 6
1,212,349 UART: [ldev] SUBJECT.KEYID = 5
1,212,775 UART: [ldev] AUTHORITY.KEYID = 7
1,213,238 UART: [ldev] FE.KEYID = 1
1,218,704 UART: [ldev] Erasing FE.KEYID = 1
1,245,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,326 UART: [ldev] --
1,284,817 UART: [fwproc] Wait for Commands...
1,285,537 UART: [fwproc] Recv command 0x46574c44
1,286,265 UART: [fwproc] Recv'd Img size: 114084 bytes
2,582,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,674 >>> mbox cmd response: success
2,774,856 UART: [afmc] ++
2,775,024 UART: [afmc] CDI.KEYID = 6
2,775,386 UART: [afmc] SUBJECT.KEYID = 7
2,775,811 UART: [afmc] AUTHORITY.KEYID = 5
2,811,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,487 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,215 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,819 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,449 UART: [afmc] --
2,854,485 UART: [cold-reset] --
2,855,435 UART: [state] Locking Datavault
2,856,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,478 UART: [state] Locking ICCM
2,858,052 UART: [exit] Launching FMC @ 0x40000130
2,863,381 UART:
2,863,397 UART: Running Caliptra FMC ...
2,863,805 UART:
2,863,948 UART: [state] CFI Enabled
2,874,907 UART: [fht] FMC Alias Private Key: 7
2,982,728 UART: [art] Extend RT PCRs Done
2,983,156 UART: [art] Lock RT PCRs Done
2,984,760 UART: [art] Populate DV Done
2,992,877 UART: [fht] FMC Alias Private Key: 7
2,993,897 UART: [art] Derive CDI
2,994,177 UART: [art] Store in in slot 0x4
3,079,760 UART: [art] Derive Key Pair
3,080,120 UART: [art] Store priv key in slot 0x5
3,093,384 UART: [art] Derive Key Pair - Done
3,108,075 UART: [art] Signing Cert with AUTHO
3,108,555 UART: RITY.KEYID = 7
3,124,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,774 UART: [art] PUB.X = E03B8A79992D01A772909EA9F4B7E44A62021CF13BEDA91BD8193019486034C431291B868880A20991CEEB74FDBCA9C2
3,131,537 UART: [art] PUB.Y = BCD5D149FE972B28353366B1713DE8C3002A30068562DD8E16B579BFBCF2B6CB79D16C74F28E608B8072F7B6B56EE4BD
3,138,472 UART: [art] SIG.R = 8E4BE3BEF00173412DD6F75DA9F8E204E68152C707CF909CBCEE206C4EAA17BA9737FC2D022AD538DB1F783694D191D9
3,145,244 UART: [art] SIG.S = 1122E51E7577116380EF8E9044266E81390F787C2C5DBFB26798B83530C91BF4591767B76C16A28D448C817F48A98E55
3,168,798 UART: Caliptra RT
3,169,143 UART: [state] CFI Enabled
3,276,884 UART: [rt] RT listening for mailbox commands...
3,277,554 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,096 UART: [rt]cmd =0x434b4558, len=80
3,477,466 >>> mbox cmd response data (6280 bytes)
3,477,467 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,359 UART: [rt]cmd =0x414c544e, len=41
3,509,334 >>> mbox cmd response data (8 bytes)
3,509,335 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,416 UART: [rt]cmd =0x434b4558, len=80
3,707,622 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 ready_for_fw is high
1,060,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,077 >>> mbox cmd response: success
2,686,729 UART:
2,686,745 UART: Running Caliptra FMC ...
2,687,153 UART:
2,687,296 UART: [state] CFI Enabled
2,697,847 UART: [fht] FMC Alias Private Key: 7
2,805,550 UART: [art] Extend RT PCRs Done
2,805,978 UART: [art] Lock RT PCRs Done
2,807,522 UART: [art] Populate DV Done
2,815,713 UART: [fht] FMC Alias Private Key: 7
2,816,797 UART: [art] Derive CDI
2,817,077 UART: [art] Store in in slot 0x4
2,902,688 UART: [art] Derive Key Pair
2,903,048 UART: [art] Store priv key in slot 0x5
2,916,486 UART: [art] Derive Key Pair - Done
2,931,560 UART: [art] Signing Cert with AUTHO
2,932,040 UART: RITY.KEYID = 7
2,947,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,577 UART: [art] PUB.X = 99A780F5F5A1EFB02B345D1DD64EE93E0CB359D35D8781DD7426E9E7EEC1C06237887B3815D6570F9BD6BA007FC42800
2,955,305 UART: [art] PUB.Y = 42D453D10442621050B4C479F931A8BF6E3DDE54C48B13A03366D14313CD234594E9D68A179C641D305A7A4B4B6F9CEB
2,962,252 UART: [art] SIG.R = 27D2D7DDEAE296A398127A62557DFC05352519BAF13201B4BE52D720D222B932FEE5699C329F989C6427C71A445C1247
2,969,014 UART: [art] SIG.S = 372FC10B01FDE8220351D7A81A5353D6C1054A102EE935ED150FE09189E29B701F692141ED243C1732E025C714074600
2,993,151 UART: Caliptra RT
2,993,496 UART: [state] CFI Enabled
3,102,463 UART: [rt] RT listening for mailbox commands...
3,103,133 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,405 UART: [rt]cmd =0x434b4558, len=80
3,302,645 >>> mbox cmd response data (6280 bytes)
3,302,646 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,278 UART: [rt]cmd =0x414c544e, len=41
3,334,019 >>> mbox cmd response data (8 bytes)
3,334,020 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,939 UART: [rt]cmd =0x434b4558, len=80
3,532,463 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 ready_for_fw is high
1,174,105 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,577 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,740 UART: [ldev] --
1,280,094 UART: [fwproc] Wait for Commands...
1,280,791 UART: [fwproc] Recv command 0x46574c44
1,281,524 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,395 >>> mbox cmd response: success
2,770,658 UART: [afmc] ++
2,770,826 UART: [afmc] CDI.KEYID = 6
2,771,189 UART: [afmc] SUBJECT.KEYID = 7
2,771,615 UART: [afmc] AUTHORITY.KEYID = 5
2,806,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,143 UART: [afmc] --
2,850,073 UART: [cold-reset] --
2,850,909 UART: [state] Locking Datavault
2,852,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,872 UART: [state] Locking ICCM
2,853,354 UART: [exit] Launching FMC @ 0x40000130
2,858,683 UART:
2,858,699 UART: Running Caliptra FMC ...
2,859,107 UART:
2,859,161 UART: [state] CFI Enabled
2,869,876 UART: [fht] FMC Alias Private Key: 7
2,977,071 UART: [art] Extend RT PCRs Done
2,977,499 UART: [art] Lock RT PCRs Done
2,979,007 UART: [art] Populate DV Done
2,987,132 UART: [fht] FMC Alias Private Key: 7
2,988,288 UART: [art] Derive CDI
2,988,568 UART: [art] Store in in slot 0x4
3,074,345 UART: [art] Derive Key Pair
3,074,705 UART: [art] Store priv key in slot 0x5
3,087,667 UART: [art] Derive Key Pair - Done
3,102,428 UART: [art] Signing Cert with AUTHO
3,102,908 UART: RITY.KEYID = 7
3,117,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,533 UART: [art] PUB.X = 21B370CE09B341F850B8742DDD26B51BB2F10AA40DFA87D1EA0C99D3F94DE5586451EFF18806D672C6E99A0B71F2FF83
3,125,297 UART: [art] PUB.Y = 584231B545F479CA7E1F8043EA653DEE0AD5A99FD5CAB62538B588E92E11C23F947F03A96083B955378001ED84FB147F
3,132,240 UART: [art] SIG.R = F1DCE310CB478F3CA9F2F06A7F80C98AF5DB29A2EC0DF5991C083692107DA26A7CAD6CE8ABAC497E3765E2AC4F08A735
3,139,023 UART: [art] SIG.S = 0150F1FDF203BC23E3808F4C8D56E278C1EFF1AF093D2851616C35207F28368202205C79A6D5171E2D301719923C93FC
3,162,368 UART: Caliptra RT
3,162,621 UART: [state] CFI Enabled
3,270,834 UART: [rt] RT listening for mailbox commands...
3,271,504 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,938 UART: [rt]cmd =0x434b4558, len=80
3,471,434 >>> mbox cmd response data (6280 bytes)
3,471,435 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,955 UART: [rt]cmd =0x414c544e, len=41
3,503,072 >>> mbox cmd response data (8 bytes)
3,503,073 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,822 UART: [rt]cmd =0x434b4558, len=80
3,701,624 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,168 ready_for_fw is high
1,056,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,559 >>> mbox cmd response: success
2,682,583 UART:
2,682,599 UART: Running Caliptra FMC ...
2,683,007 UART:
2,683,061 UART: [state] CFI Enabled
2,693,438 UART: [fht] FMC Alias Private Key: 7
2,801,243 UART: [art] Extend RT PCRs Done
2,801,671 UART: [art] Lock RT PCRs Done
2,803,231 UART: [art] Populate DV Done
2,811,642 UART: [fht] FMC Alias Private Key: 7
2,812,678 UART: [art] Derive CDI
2,812,958 UART: [art] Store in in slot 0x4
2,898,395 UART: [art] Derive Key Pair
2,898,755 UART: [art] Store priv key in slot 0x5
2,911,687 UART: [art] Derive Key Pair - Done
2,926,416 UART: [art] Signing Cert with AUTHO
2,926,896 UART: RITY.KEYID = 7
2,942,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,917 UART: [art] PUB.X = 1AC980B6560997397594AEFCDC1504F2584AC7950C7ECEB061220EBA701848D1A56E4B46E8EBAB1722E8B63A6B273DC8
2,949,683 UART: [art] PUB.Y = 05F4A456AFE695B528BCB7BABBB8531AF794248185702CE48D3BF5327108E1F91D98A2C3E0F5899686D438B89A475464
2,956,627 UART: [art] SIG.R = EB3D498F567CE59F6FBC6107E96689E7FD1AB595BBC0CFC7AD733BE8E534BF4996E39D443D7798F1917F7828F04E8371
2,963,404 UART: [art] SIG.S = 872EBB7221424E8BBCEC0ED8C1195CC5050C8F67FA250C4527D47BA192FCCA1D75A7EF871D33C79EED654C853A9D720A
2,987,300 UART: Caliptra RT
2,987,553 UART: [state] CFI Enabled
3,094,969 UART: [rt] RT listening for mailbox commands...
3,095,639 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,735 UART: [rt]cmd =0x434b4558, len=80
3,294,707 >>> mbox cmd response data (6280 bytes)
3,294,708 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,424 UART: [rt]cmd =0x414c544e, len=41
3,326,395 >>> mbox cmd response data (8 bytes)
3,326,396 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,123 UART: [rt]cmd =0x434b4558, len=80
3,525,073 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,748 UART: [idev] --
1,208,913 UART: [ldev] ++
1,209,081 UART: [ldev] CDI.KEYID = 6
1,209,445 UART: [ldev] SUBJECT.KEYID = 5
1,209,872 UART: [ldev] AUTHORITY.KEYID = 7
1,210,335 UART: [ldev] FE.KEYID = 1
1,215,851 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,738 UART: [fwproc] Recv command 0x46574c44
1,282,471 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,020 >>> mbox cmd response: success
2,770,137 UART: [afmc] ++
2,770,305 UART: [afmc] CDI.KEYID = 6
2,770,668 UART: [afmc] SUBJECT.KEYID = 7
2,771,094 UART: [afmc] AUTHORITY.KEYID = 5
2,807,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,272 UART: [afmc] --
2,850,276 UART: [cold-reset] --
2,851,186 UART: [state] Locking Datavault
2,852,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,319 UART: [state] Locking ICCM
2,853,855 UART: [exit] Launching FMC @ 0x40000130
2,859,184 UART:
2,859,200 UART: Running Caliptra FMC ...
2,859,608 UART:
2,859,751 UART: [state] CFI Enabled
2,870,612 UART: [fht] FMC Alias Private Key: 7
2,978,481 UART: [art] Extend RT PCRs Done
2,978,909 UART: [art] Lock RT PCRs Done
2,980,603 UART: [art] Populate DV Done
2,988,800 UART: [fht] FMC Alias Private Key: 7
2,989,764 UART: [art] Derive CDI
2,990,044 UART: [art] Store in in slot 0x4
3,075,893 UART: [art] Derive Key Pair
3,076,253 UART: [art] Store priv key in slot 0x5
3,089,375 UART: [art] Derive Key Pair - Done
3,104,543 UART: [art] Signing Cert with AUTHO
3,105,023 UART: RITY.KEYID = 7
3,120,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,214 UART: [art] PUB.X = 08364AD397F32B4016F7CB7C87696FEECDB10CE03AF560003B6AF1A731B2DD44AC14A2298DDE635AA5555A0A18BB8CAD
3,127,971 UART: [art] PUB.Y = 05CE3D2436589B949F16EC174A495081D6CE45D717CF0B379BA04483BA96AAD2C5B48E51C017AADB97E39092E79B4826
3,134,919 UART: [art] SIG.R = 18B266EA32E8B107CD4D182E3BFCE6C78BED23DBE7106D45B0205F9CA1AB0628CDC4326A2B50496C2162883D3310941E
3,141,691 UART: [art] SIG.S = 8AF870EE93AC4577E144A23A37F8CB71953D3B2F50D4F4F2CA6B3F4EAE8D9304787E7F12C86091B7EB1F12EB0AB32450
3,165,348 UART: Caliptra RT
3,165,693 UART: [state] CFI Enabled
3,273,562 UART: [rt] RT listening for mailbox commands...
3,274,232 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,316 UART: [rt]cmd =0x434b4558, len=80
3,473,367 >>> mbox cmd response data (6280 bytes)
3,473,368 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,282 UART: [rt]cmd =0x414c544e, len=41
3,505,343 >>> mbox cmd response data (8 bytes)
3,505,344 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,093 UART: [rt]cmd =0x434b4558, len=80
3,703,694 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,991 ready_for_fw is high
1,055,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,574 >>> mbox cmd response: success
2,681,912 UART:
2,681,928 UART: Running Caliptra FMC ...
2,682,336 UART:
2,682,479 UART: [state] CFI Enabled
2,693,202 UART: [fht] FMC Alias Private Key: 7
2,801,119 UART: [art] Extend RT PCRs Done
2,801,547 UART: [art] Lock RT PCRs Done
2,802,887 UART: [art] Populate DV Done
2,811,078 UART: [fht] FMC Alias Private Key: 7
2,812,108 UART: [art] Derive CDI
2,812,388 UART: [art] Store in in slot 0x4
2,897,671 UART: [art] Derive Key Pair
2,898,031 UART: [art] Store priv key in slot 0x5
2,911,279 UART: [art] Derive Key Pair - Done
2,926,025 UART: [art] Signing Cert with AUTHO
2,926,505 UART: RITY.KEYID = 7
2,941,845 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,610 UART: [art] PUB.X = AF6700978EF4862487965F62963F642A292E7EC2825D29B7412E0D2F70A5A26A544823FA65CA2022F484DBCC08DBEB42
2,949,352 UART: [art] PUB.Y = 1B042EE5F2FCB72B1EA67F43FAB77AEC4C6DC113AF71237F0AA9976FCA4FCCAA3ACCDF544FFCE82D90B85E7DE109EA74
2,956,329 UART: [art] SIG.R = BC82C0E220A4CD0D46E10537A7FAA4E31EB870CF0375CC1F1B654ECDF815C9D15600ED0A4828E307E9FA88FF285D37C6
2,963,078 UART: [art] SIG.S = 0A6BB3CEF42F3466C0B1615D65B8548C6339C890DD99A7909A20CCB9E6C986A439C022FD23676612E1A287A5B6B31951
2,987,162 UART: Caliptra RT
2,987,507 UART: [state] CFI Enabled
3,094,884 UART: [rt] RT listening for mailbox commands...
3,095,554 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,894 UART: [rt]cmd =0x434b4558, len=80
3,294,148 >>> mbox cmd response data (6280 bytes)
3,294,149 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,727 UART: [rt]cmd =0x414c544e, len=41
3,325,560 >>> mbox cmd response data (8 bytes)
3,325,561 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,644 UART: [rt]cmd =0x434b4558, len=80
3,524,638 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,261 UART:
192,624 UART: Running Caliptra ROM ...
193,836 UART:
193,992 UART: [state] CFI Enabled
264,950 UART: [state] LifecycleState = Unprovisioned
266,938 UART: [state] DebugLocked = No
268,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,118 UART: [kat] SHA2-256
443,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,344 UART: [kat] ++
454,828 UART: [kat] sha1
465,730 UART: [kat] SHA2-256
468,430 UART: [kat] SHA2-384
473,802 UART: [kat] SHA2-512-ACC
476,171 UART: [kat] ECC-384
2,765,976 UART: [kat] HMAC-384Kdf
2,778,510 UART: [kat] LMS
3,968,857 UART: [kat] --
3,974,178 UART: [cold-reset] ++
3,975,979 UART: [fht] Storing FHT @ 0x50003400
3,986,883 UART: [idev] ++
3,987,463 UART: [idev] CDI.KEYID = 6
3,988,419 UART: [idev] SUBJECT.KEYID = 7
3,989,665 UART: [idev] UDS.KEYID = 0
3,990,620 ready_for_fw is high
3,990,808 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,734 UART: [idev] Erasing UDS.KEYID = 0
7,325,155 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,889 UART: [idev] --
7,352,216 UART: [ldev] ++
7,352,860 UART: [ldev] CDI.KEYID = 6
7,353,748 UART: [ldev] SUBJECT.KEYID = 5
7,355,014 UART: [ldev] AUTHORITY.KEYID = 7
7,356,249 UART: [ldev] FE.KEYID = 1
7,401,036 UART: [ldev] Erasing FE.KEYID = 1
10,733,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,243 UART: [ldev] --
13,094,805 UART: [fwproc] Waiting for Commands...
13,097,348 UART: [fwproc] Received command 0x46574c44
13,099,576 UART: [fwproc] Received Image of size 113760 bytes
17,151,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,228,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,297,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,614,207 >>> mbox cmd response: success
17,618,397 UART: [afmc] ++
17,618,997 UART: [afmc] CDI.KEYID = 6
17,619,934 UART: [afmc] SUBJECT.KEYID = 7
17,621,157 UART: [afmc] AUTHORITY.KEYID = 5
20,986,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,560 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,979 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,815 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,210 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,902 UART: [afmc] --
23,356,318 UART: [cold-reset] --
23,359,589 UART: [state] Locking Datavault
23,365,754 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,508 UART: [state] Locking ICCM
23,369,606 UART: [exit] Launching FMC @ 0x40000130
23,378,001 UART:
23,378,242 UART: Running Caliptra FMC ...
23,379,359 UART:
23,379,524 UART: [state] CFI Enabled
23,446,486 UART: [fht] FMC Alias Private Key: 7
25,784,499 UART: [art] Extend RT PCRs Done
25,785,724 UART: [art] Lock RT PCRs Done
25,787,944 UART: [art] Populate DV Done
25,793,299 UART: [fht] FMC Alias Private Key: 7
25,794,941 UART: [art] Derive CDI
25,795,756 UART: [art] Store in in slot 0x4
25,854,849 UART: [art] Derive Key Pair
25,855,894 UART: [art] Store priv key in slot 0x5
29,148,486 UART: [art] Derive Key Pair - Done
29,161,327 UART: [art] Signing Cert with AUTHO
29,162,636 UART: RITY.KEYID = 7
31,451,407 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,917 UART: [art] PUB.X = DFC65EE409763A7AEA249571B4D31AAA2A0B6D18408291B5C29338B0EDFA8C504BB2F17DD3ADC9D3807E3BA56BAA92EC
31,460,186 UART: [art] PUB.Y = 5C4417EA19B70F845D04AFC0C15C5B6A2D542BC76867C4C098A32F254B8163648A9AEB12143C8A9A49151FD0F412D387
31,467,432 UART: [art] SIG.R = B8C902831C8DA91DEBB94A9EED1400925C83A49677C24708E60B772F420B168B41C8A912346A8968952315B66C22102E
31,474,771 UART: [art] SIG.S = E0C3BFC876F815F78209C1181533580669BD40891181C9FDD0FBCBDC6DBFC09C4B680EF58C877A29C2F49619EB4C6D0B
32,779,887 UART: Caliptra RT
32,780,604 UART: [state] CFI Enabled
32,940,048 UART: [rt] RT listening for mailbox commands...
32,941,927 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,972,756 UART: [rt]cmd =0x414c544e, len=41
32,975,306 >>> mbox cmd response data (8 bytes)
32,976,137 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,006,516 UART: [rt]cmd =0x434b4558, len=80
38,746,542 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,804,187 ready_for_fw is high
3,804,756 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,857,907 >>> mbox cmd response: success
23,542,319 UART:
23,542,722 UART: Running Caliptra FMC ...
23,543,924 UART:
23,544,090 UART: [state] CFI Enabled
23,607,271 UART: [fht] FMC Alias Private Key: 7
25,945,738 UART: [art] Extend RT PCRs Done
25,946,986 UART: [art] Lock RT PCRs Done
25,948,350 UART: [art] Populate DV Done
25,953,819 UART: [fht] FMC Alias Private Key: 7
25,955,451 UART: [art] Derive CDI
25,956,270 UART: [art] Store in in slot 0x4
26,015,695 UART: [art] Derive Key Pair
26,016,705 UART: [art] Store priv key in slot 0x5
29,309,704 UART: [art] Derive Key Pair - Done
29,322,593 UART: [art] Signing Cert with AUTHO
29,323,902 UART: RITY.KEYID = 7
31,610,421 UART: [art] Erasing AUTHORITY.KEYID = 7
31,611,928 UART: [art] PUB.X = 366EB88BFEE5BFBF6E0F63BE61A8DBFF70D40294EC4CA1A6BA143E385EC89B17E6925C7F9CA1A1E70240FEFF627A8EBA
31,619,192 UART: [art] PUB.Y = 86502ACA9C8D5D2B94D32E3DA7423ED2821296EB5C0DCCA85745C1A5BA143D921EE68045B89FABBB1C83A5C2CB86076F
31,626,490 UART: [art] SIG.R = 9922CA1C5AC58EA0B54ED9D5FB23A8905C8AE142E7AD7C8AAA954AECF3B0A4BB84D530BBA0BB302066A82591A37B08C8
31,633,893 UART: [art] SIG.S = 21A4258800D9D979D56A9EE9835225AD7E1D1DF6FCA3AA123AC8F17E0B68DB157B476E3651103DBBBA8C8DB229450F3B
32,939,303 UART: Caliptra RT
32,940,039 UART: [state] CFI Enabled
33,101,382 UART: [rt] RT listening for mailbox commands...
33,103,261 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,133,827 UART: [rt]cmd =0x414c544e, len=41
33,136,158 >>> mbox cmd response data (8 bytes)
33,136,855 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,167,208 UART: [rt]cmd =0x434b4558, len=80
38,907,714 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
192,860 UART:
193,248 UART: Running Caliptra ROM ...
194,437 UART:
604,263 UART: [state] CFI Enabled
618,355 UART: [state] LifecycleState = Unprovisioned
620,223 UART: [state] DebugLocked = No
622,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,906 UART: [kat] SHA2-256
796,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,157 UART: [kat] ++
807,604 UART: [kat] sha1
819,562 UART: [kat] SHA2-256
822,278 UART: [kat] SHA2-384
828,280 UART: [kat] SHA2-512-ACC
830,646 UART: [kat] ECC-384
3,115,166 UART: [kat] HMAC-384Kdf
3,127,126 UART: [kat] LMS
4,317,263 UART: [kat] --
4,322,923 UART: [cold-reset] ++
4,324,150 UART: [fht] Storing FHT @ 0x50003400
4,335,806 UART: [idev] ++
4,336,420 UART: [idev] CDI.KEYID = 6
4,337,335 UART: [idev] SUBJECT.KEYID = 7
4,338,509 UART: [idev] UDS.KEYID = 0
4,339,548 ready_for_fw is high
4,339,750 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,502 UART: [idev] Erasing UDS.KEYID = 0
7,626,028 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,368 UART: [idev] --
7,650,864 UART: [ldev] ++
7,651,433 UART: [ldev] CDI.KEYID = 6
7,652,393 UART: [ldev] SUBJECT.KEYID = 5
7,653,598 UART: [ldev] AUTHORITY.KEYID = 7
7,654,876 UART: [ldev] FE.KEYID = 1
7,666,000 UART: [ldev] Erasing FE.KEYID = 1
10,954,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,338 UART: [ldev] --
13,316,817 UART: [fwproc] Waiting for Commands...
13,318,792 UART: [fwproc] Received command 0x46574c44
13,321,024 UART: [fwproc] Received Image of size 113760 bytes
17,373,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,935 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,835,659 >>> mbox cmd response: success
17,840,053 UART: [afmc] ++
17,840,654 UART: [afmc] CDI.KEYID = 6
17,841,558 UART: [afmc] SUBJECT.KEYID = 7
17,842,828 UART: [afmc] AUTHORITY.KEYID = 5
21,157,165 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,265 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,646 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,434 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,897 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,904 UART: [afmc] --
23,521,714 UART: [cold-reset] --
23,525,966 UART: [state] Locking Datavault
23,533,334 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,134 UART: [state] Locking ICCM
23,537,449 UART: [exit] Launching FMC @ 0x40000130
23,545,846 UART:
23,546,088 UART: Running Caliptra FMC ...
23,547,191 UART:
23,547,345 UART: [state] CFI Enabled
23,555,168 UART: [fht] FMC Alias Private Key: 7
25,886,022 UART: [art] Extend RT PCRs Done
25,887,250 UART: [art] Lock RT PCRs Done
25,888,763 UART: [art] Populate DV Done
25,894,064 UART: [fht] FMC Alias Private Key: 7
25,895,558 UART: [art] Derive CDI
25,896,319 UART: [art] Store in in slot 0x4
25,939,022 UART: [art] Derive Key Pair
25,940,086 UART: [art] Store priv key in slot 0x5
29,182,349 UART: [art] Derive Key Pair - Done
29,195,135 UART: [art] Signing Cert with AUTHO
29,196,441 UART: RITY.KEYID = 7
31,475,753 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,264 UART: [art] PUB.X = 0A35CF85A244CB8FCE9E03AE63D6E5F6B4B4D3C8E87B6616FFCBF0AA6E939FF31180B4C2D4262254C2E5240164BDC1E7
31,484,476 UART: [art] PUB.Y = F85555465E7A3F0A5B857FE25272D21E0566077512C36702DE42732A2656D141E1ACB599FE309FDFD33FA36D4684CC74
31,491,726 UART: [art] SIG.R = 17A7377577A3E61B6CD566576EA38D1B5A09A598CE623C95A40F9896C33D0AC26D1C9F9602B4B37CEA9295348FB283D2
31,499,096 UART: [art] SIG.S = 9D0D8FB3AAB1F4E2A5A647DD7055685F374D5A241D0AB85EB33A8FCF4998799D107DF6ADBF14F5F088E786017ED76F16
32,804,508 UART: Caliptra RT
32,805,210 UART: [state] CFI Enabled
32,923,472 UART: [rt] RT listening for mailbox commands...
32,925,360 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,955,509 UART: [rt]cmd =0x414c544e, len=41
32,957,991 >>> mbox cmd response data (8 bytes)
32,958,917 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,989,505 UART: [rt]cmd =0x434b4558, len=80
38,651,945 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
4,126,281 ready_for_fw is high
4,126,668 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,078,354 >>> mbox cmd response: success
23,716,716 UART:
23,717,105 UART: Running Caliptra FMC ...
23,718,236 UART:
23,718,392 UART: [state] CFI Enabled
23,726,580 UART: [fht] FMC Alias Private Key: 7
26,056,864 UART: [art] Extend RT PCRs Done
26,058,092 UART: [art] Lock RT PCRs Done
26,059,773 UART: [art] Populate DV Done
26,065,299 UART: [fht] FMC Alias Private Key: 7
26,066,788 UART: [art] Derive CDI
26,067,552 UART: [art] Store in in slot 0x4
26,110,371 UART: [art] Derive Key Pair
26,111,413 UART: [art] Store priv key in slot 0x5
29,353,662 UART: [art] Derive Key Pair - Done
29,366,530 UART: [art] Signing Cert with AUTHO
29,367,840 UART: RITY.KEYID = 7
31,647,333 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,839 UART: [art] PUB.X = 86522C939D556326F222767E5C0B2A5D8EF8EE769C0193BA5AA167ABE8799BDC8052CD2A9F04E469E5392C8AB19F52CF
31,656,055 UART: [art] PUB.Y = 33FAB8877FF997326170383499912024BBF3FEC5B90424D97A634D6F04AE542C6C8D533C56135F7479F1C85C0DEE87D5
31,663,296 UART: [art] SIG.R = 3E521C024F9FBAEE5C9A769F61DC1A51CE15C4969EE32E2468BFD702956C9A5F0EAA080BF9E7B0238F72F8BA593C4C5D
31,670,707 UART: [art] SIG.S = 5B2ECE0F2D7A2188395A422A973EAFDC965A12B35820E8BCDD848554DE1154BA82FA3E11FD08889ADE8D9AB88D29B4AB
32,976,111 UART: Caliptra RT
32,976,822 UART: [state] CFI Enabled
33,094,720 UART: [rt] RT listening for mailbox commands...
33,096,605 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,126,866 UART: [rt]cmd =0x414c544e, len=41
33,129,081 >>> mbox cmd response data (8 bytes)
33,130,106 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,160,459 UART: [rt]cmd =0x434b4558, len=80
38,821,968 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,436 UART:
192,837 UART: Running Caliptra ROM ...
193,983 UART:
194,127 UART: [state] CFI Enabled
263,694 UART: [state] LifecycleState = Unprovisioned
265,620 UART: [state] DebugLocked = No
267,665 UART: [state] WD Timer not started. Device not locked for debugging
270,776 UART: [kat] SHA2-256
449,865 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,456 UART: [kat] ++
461,998 UART: [kat] sha1
473,254 UART: [kat] SHA2-256
476,335 UART: [kat] SHA2-384
482,318 UART: [kat] SHA2-512-ACC
485,248 UART: [kat] ECC-384
2,945,180 UART: [kat] HMAC-384Kdf
2,970,637 UART: [kat] LMS
3,500,128 UART: [kat] --
3,505,707 UART: [cold-reset] ++
3,507,133 UART: [fht] FHT @ 0x50003400
3,518,816 UART: [idev] ++
3,519,380 UART: [idev] CDI.KEYID = 6
3,520,335 UART: [idev] SUBJECT.KEYID = 7
3,521,503 UART: [idev] UDS.KEYID = 0
3,522,544 ready_for_fw is high
3,522,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,301 UART: [idev] Erasing UDS.KEYID = 0
6,025,340 UART: [idev] Sha1 KeyId Algorithm
6,047,735 UART: [idev] --
6,051,964 UART: [ldev] ++
6,052,586 UART: [ldev] CDI.KEYID = 6
6,053,480 UART: [ldev] SUBJECT.KEYID = 5
6,054,636 UART: [ldev] AUTHORITY.KEYID = 7
6,055,889 UART: [ldev] FE.KEYID = 1
6,099,495 UART: [ldev] Erasing FE.KEYID = 1
8,604,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,449 UART: [ldev] --
10,409,655 UART: [fwproc] Wait for Commands...
10,412,765 UART: [fwproc] Recv command 0x46574c44
10,414,876 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,274,577 >>> mbox cmd response: success
14,278,322 UART: [afmc] ++
14,278,915 UART: [afmc] CDI.KEYID = 6
14,279,825 UART: [afmc] SUBJECT.KEYID = 7
14,280,979 UART: [afmc] AUTHORITY.KEYID = 5
16,822,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,930 UART: [afmc] --
18,621,949 UART: [cold-reset] --
18,625,967 UART: [state] Locking Datavault
18,631,857 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,508 UART: [state] Locking ICCM
18,635,091 UART: [exit] Launching FMC @ 0x40000130
18,643,544 UART:
18,643,770 UART: Running Caliptra FMC ...
18,644,796 UART:
18,644,942 UART: [state] CFI Enabled
18,704,284 UART: [fht] FMC Alias Private Key: 7
20,467,915 UART: [art] Extend RT PCRs Done
20,469,120 UART: [art] Lock RT PCRs Done
20,471,090 UART: [art] Populate DV Done
20,476,279 UART: [fht] FMC Alias Private Key: 7
20,477,974 UART: [art] Derive CDI
20,478,785 UART: [art] Store in in slot 0x4
20,537,105 UART: [art] Derive Key Pair
20,538,162 UART: [art] Store priv key in slot 0x5
23,000,836 UART: [art] Derive Key Pair - Done
23,013,936 UART: [art] Signing Cert with AUTHO
23,015,267 UART: RITY.KEYID = 7
24,727,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,728,704 UART: [art] PUB.X = 4D623962B532E36E6759921826F03A9022433E7D94A4D9DA55F4B7BCA9B047C31695C10704F33188221236EC2EBA36FB
24,735,918 UART: [art] PUB.Y = 2D7993F663FBBB292F85E10F02E86F0526DB9F99819FF6EA97A1042C91C6A90CDA5ABC8CB3C539CD69D1D4D35F82B4B4
24,743,236 UART: [art] SIG.R = 5EB5555FD71D5F57AE570535B41E32060FD0F754CBA5DFD187A2628A8DC8CAFDEE65540505B7047CE09A50D2797531E2
24,750,613 UART: [art] SIG.S = FD9DDD89C90CAEDB75B2AD152D9E7E8476A7BBCAA9C25465BA38722C5E0662906D7AE56F355295655B3AB725B20C37B1
25,729,826 UART: Caliptra RT
25,730,525 UART: [state] CFI Enabled
25,895,981 UART: [rt] RT listening for mailbox commands...
25,897,880 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,928,305 UART: [rt]cmd =0x414c544e, len=41
25,930,861 >>> mbox cmd response data (8 bytes)
25,931,509 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,961,917 UART: [rt]cmd =0x434b4558, len=80
30,297,109 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,381,903 ready_for_fw is high
3,382,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,091 >>> mbox cmd response: success
18,348,216 UART:
18,348,637 UART: Running Caliptra FMC ...
18,349,849 UART:
18,350,023 UART: [state] CFI Enabled
18,414,193 UART: [fht] FMC Alias Private Key: 7
20,178,505 UART: [art] Extend RT PCRs Done
20,179,736 UART: [art] Lock RT PCRs Done
20,181,477 UART: [art] Populate DV Done
20,187,097 UART: [fht] FMC Alias Private Key: 7
20,188,742 UART: [art] Derive CDI
20,189,550 UART: [art] Store in in slot 0x4
20,247,163 UART: [art] Derive Key Pair
20,248,222 UART: [art] Store priv key in slot 0x5
22,711,089 UART: [art] Derive Key Pair - Done
22,723,980 UART: [art] Signing Cert with AUTHO
22,725,280 UART: RITY.KEYID = 7
24,437,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,654 UART: [art] PUB.X = 8D7E0EC76E2E07D616E41DDF66B32AF05ACF547734BFCD84CFC827DD2A6B2E36B998D4506FE3AE06A8CACA17EEE9ED05
24,445,923 UART: [art] PUB.Y = A1CF5D2CB9BB31C9FD7D3EFEE85B5CC433BA1435828B19404715203D6C96F7B477C45C31ABB3238E0F483C49F7ABD268
24,453,238 UART: [art] SIG.R = 4EE7986BDA8C4BE39A289349141CABDC48DFE5DC9A5664C300E8C9BF68B10D046188E03561925B295527792AB86DA10B
24,460,599 UART: [art] SIG.S = D16CE675D6F00D75B772959DEE5415A2E017F5DFBC8814A059D3E28AD44B909FDD6F1A2F82D34444D4FB8189E0D8D5D0
25,439,760 UART: Caliptra RT
25,440,481 UART: [state] CFI Enabled
25,606,078 UART: [rt] RT listening for mailbox commands...
25,608,117 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,638,788 UART: [rt]cmd =0x414c544e, len=41
25,641,397 >>> mbox cmd response data (8 bytes)
25,642,274 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,672,955 UART: [rt]cmd =0x434b4558, len=80
30,006,687 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
193,046 UART:
193,566 UART: Running Caliptra ROM ...
194,717 UART:
604,064 UART: [state] CFI Enabled
621,072 UART: [state] LifecycleState = Unprovisioned
622,959 UART: [state] DebugLocked = No
625,687 UART: [state] WD Timer not started. Device not locked for debugging
629,029 UART: [kat] SHA2-256
808,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,718 UART: [kat] ++
820,167 UART: [kat] sha1
831,108 UART: [kat] SHA2-256
834,165 UART: [kat] SHA2-384
840,117 UART: [kat] SHA2-512-ACC
843,066 UART: [kat] ECC-384
3,282,515 UART: [kat] HMAC-384Kdf
3,296,191 UART: [kat] LMS
3,825,675 UART: [kat] --
3,830,245 UART: [cold-reset] ++
3,832,321 UART: [fht] FHT @ 0x50003400
3,841,591 UART: [idev] ++
3,842,166 UART: [idev] CDI.KEYID = 6
3,843,092 UART: [idev] SUBJECT.KEYID = 7
3,844,269 UART: [idev] UDS.KEYID = 0
3,845,193 ready_for_fw is high
3,845,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,763 UART: [idev] Erasing UDS.KEYID = 0
6,315,516 UART: [idev] Sha1 KeyId Algorithm
6,338,204 UART: [idev] --
6,341,627 UART: [ldev] ++
6,342,200 UART: [ldev] CDI.KEYID = 6
6,343,116 UART: [ldev] SUBJECT.KEYID = 5
6,344,328 UART: [ldev] AUTHORITY.KEYID = 7
6,345,561 UART: [ldev] FE.KEYID = 1
6,356,529 UART: [ldev] Erasing FE.KEYID = 1
8,831,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,011 UART: [ldev] --
10,623,499 UART: [fwproc] Wait for Commands...
10,626,241 UART: [fwproc] Recv command 0x46574c44
10,628,280 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,497,701 >>> mbox cmd response: success
14,501,860 UART: [afmc] ++
14,502,457 UART: [afmc] CDI.KEYID = 6
14,503,370 UART: [afmc] SUBJECT.KEYID = 7
14,504,533 UART: [afmc] AUTHORITY.KEYID = 5
17,006,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,202 UART: [afmc] --
18,801,554 UART: [cold-reset] --
18,804,390 UART: [state] Locking Datavault
18,809,874 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,588 UART: [state] Locking ICCM
18,812,958 UART: [exit] Launching FMC @ 0x40000130
18,821,357 UART:
18,821,596 UART: Running Caliptra FMC ...
18,822,701 UART:
18,822,861 UART: [state] CFI Enabled
18,830,913 UART: [fht] FMC Alias Private Key: 7
20,588,055 UART: [art] Extend RT PCRs Done
20,589,266 UART: [art] Lock RT PCRs Done
20,591,050 UART: [art] Populate DV Done
20,596,522 UART: [fht] FMC Alias Private Key: 7
20,598,231 UART: [art] Derive CDI
20,599,051 UART: [art] Store in in slot 0x4
20,641,542 UART: [art] Derive Key Pair
20,642,546 UART: [art] Store priv key in slot 0x5
23,069,515 UART: [art] Derive Key Pair - Done
23,082,678 UART: [art] Signing Cert with AUTHO
23,084,016 UART: RITY.KEYID = 7
24,789,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,753 UART: [art] PUB.X = D1B837F0069E07605F6FC237334192CEC8040584353715287FB22CC516E97B545F5214C9BB268FA9C0F9D42D79549AB4
24,797,975 UART: [art] PUB.Y = EAB4C902FE931209D09581892B91FAB4E07F0CA7C46D801D453D0BDD4A6B80F233418D601D205E84C77AD54438C9E0EF
24,805,229 UART: [art] SIG.R = A9346DE0B886F82C66ACE7E55713284A260A4EB3DF8BEDBAA231E1AE7E5FE87D057C24B9B54B8ACF0682A37DF3A9789A
24,812,657 UART: [art] SIG.S = 7ECC2C041F23D74E1DFD08AB77AFD7ACCC4DEB5514F2AFF553D7D9A0316D0AAD50FD23CC754C3C12AA4F6CC66B4EE9D2
25,791,861 UART: Caliptra RT
25,792,567 UART: [state] CFI Enabled
25,909,735 UART: [rt] RT listening for mailbox commands...
25,911,611 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,941,699 UART: [rt]cmd =0x414c544e, len=41
25,944,289 >>> mbox cmd response data (8 bytes)
25,945,267 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,975,510 UART: [rt]cmd =0x434b4558, len=80
30,248,206 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
3,702,186 ready_for_fw is high
3,702,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,279,222 >>> mbox cmd response: success
18,530,651 UART:
18,531,043 UART: Running Caliptra FMC ...
18,532,359 UART:
18,532,530 UART: [state] CFI Enabled
18,540,700 UART: [fht] FMC Alias Private Key: 7
20,297,593 UART: [art] Extend RT PCRs Done
20,298,814 UART: [art] Lock RT PCRs Done
20,300,443 UART: [art] Populate DV Done
20,305,748 UART: [fht] FMC Alias Private Key: 7
20,307,291 UART: [art] Derive CDI
20,308,113 UART: [art] Store in in slot 0x4
20,350,494 UART: [art] Derive Key Pair
20,351,493 UART: [art] Store priv key in slot 0x5
22,778,799 UART: [art] Derive Key Pair - Done
22,792,121 UART: [art] Signing Cert with AUTHO
22,793,431 UART: RITY.KEYID = 7
24,498,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,111 UART: [art] PUB.X = 34D0637539E7C8D9C32BE5DF98F6C5045A8A83EC1B478F3BD433398BA8F74B0398371251920BA8701AB35517B0EBD218
24,507,342 UART: [art] PUB.Y = FA142A669E4138C58DFFC104024DAE902B57D112E8737F56B14D760D5DF8E32E0088F97228A45A4BDA214F5A089D9353
24,514,567 UART: [art] SIG.R = 5C27AE970041F02600809C6475D25B4DF53AD48A5D1E72AAE99CA5A513102ECF5F46C2A82F0A7B9B8C4FC600F26584B5
24,521,889 UART: [art] SIG.S = A02EA322F7AA98CED24AD72A26C69332A412D5E143BD837ABB70D662998AE9D56CC4CB7C7F0D8BAFBAC179617A076D15
25,500,781 UART: Caliptra RT
25,501,490 UART: [state] CFI Enabled
25,618,766 UART: [rt] RT listening for mailbox commands...
25,620,650 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,651,108 UART: [rt]cmd =0x414c544e, len=41
25,653,566 >>> mbox cmd response data (8 bytes)
25,654,306 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,684,587 UART: [rt]cmd =0x434b4558, len=80
29,956,656 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,319 UART:
192,693 UART: Running Caliptra ROM ...
193,788 UART:
193,927 UART: [state] CFI Enabled
260,445 UART: [state] LifecycleState = Unprovisioned
262,808 UART: [state] DebugLocked = No
265,484 UART: [state] WD Timer not started. Device not locked for debugging
269,236 UART: [kat] SHA2-256
459,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,822 UART: [kat] ++
470,270 UART: [kat] sha1
482,563 UART: [kat] SHA2-256
485,566 UART: [kat] SHA2-384
491,618 UART: [kat] SHA2-512-ACC
494,194 UART: [kat] ECC-384
2,949,766 UART: [kat] HMAC-384Kdf
2,971,603 UART: [kat] LMS
3,503,357 UART: [kat] --
3,508,200 UART: [cold-reset] ++
3,510,194 UART: [fht] FHT @ 0x50003400
3,521,660 UART: [idev] ++
3,522,362 UART: [idev] CDI.KEYID = 6
3,523,271 UART: [idev] SUBJECT.KEYID = 7
3,524,514 UART: [idev] UDS.KEYID = 0
3,525,699 ready_for_fw is high
3,525,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,386 UART: [idev] Erasing UDS.KEYID = 0
6,027,043 UART: [idev] Sha1 KeyId Algorithm
6,049,871 UART: [idev] --
6,054,678 UART: [ldev] ++
6,055,357 UART: [ldev] CDI.KEYID = 6
6,056,301 UART: [ldev] SUBJECT.KEYID = 5
6,057,456 UART: [ldev] AUTHORITY.KEYID = 7
6,058,687 UART: [ldev] FE.KEYID = 1
6,101,664 UART: [ldev] Erasing FE.KEYID = 1
8,606,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,665 UART: [ldev] --
10,413,570 UART: [fwproc] Wait for Commands...
10,416,629 UART: [fwproc] Recv command 0x46574c44
10,418,935 UART: [fwproc] Recv'd Img size: 114084 bytes
13,869,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,597,810 >>> mbox cmd response: success
14,602,308 UART: [afmc] ++
14,603,022 UART: [afmc] CDI.KEYID = 6
14,604,213 UART: [afmc] SUBJECT.KEYID = 7
14,605,650 UART: [afmc] AUTHORITY.KEYID = 5
17,150,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,599 UART: [afmc] --
18,969,330 UART: [cold-reset] --
18,972,818 UART: [state] Locking Datavault
18,978,619 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,828 UART: [state] Locking ICCM
18,983,824 UART: [exit] Launching FMC @ 0x40000130
18,992,443 UART:
18,992,685 UART: Running Caliptra FMC ...
18,993,723 UART:
18,993,870 UART: [state] CFI Enabled
19,051,144 UART: [fht] FMC Alias Private Key: 7
20,815,925 UART: [art] Extend RT PCRs Done
20,817,148 UART: [art] Lock RT PCRs Done
20,818,585 UART: [art] Populate DV Done
20,824,157 UART: [fht] FMC Alias Private Key: 7
20,825,743 UART: [art] Derive CDI
20,826,485 UART: [art] Store in in slot 0x4
20,884,659 UART: [art] Derive Key Pair
20,885,650 UART: [art] Store priv key in slot 0x5
23,348,540 UART: [art] Derive Key Pair - Done
23,361,592 UART: [art] Signing Cert with AUTHO
23,362,888 UART: RITY.KEYID = 7
25,074,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,169 UART: [art] PUB.X = 7DAE53AA613872AA4E8C9A0D635413CD7C6D904D61702C7ACC255E987E8698D84CC92D63014FE48C72214A65C3C2CEDC
25,083,437 UART: [art] PUB.Y = 9C2AE97B109ABA22193CAE95508943499D5CB86BF4EB8D6DDCED546B118493548D2DA2C0BB934C234D36BC067A0533FC
25,090,697 UART: [art] SIG.R = 088D05D5315CB756CEF2A1A657DDDBB7E99B0C3118E4409F7C5005EF9D2E19AC4352D050E59332091C63BC51193393A0
25,098,060 UART: [art] SIG.S = AF06AF2638716FFAC7698E538ABC6B5715044244F855EE61D950800D7622580FD0761F5EF364DE5464ACD8B2FE9DB8E5
26,076,472 UART: Caliptra RT
26,077,169 UART: [state] CFI Enabled
26,243,424 UART: [rt] RT listening for mailbox commands...
26,245,309 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,275,992 UART: [rt]cmd =0x414c544e, len=41
26,278,625 >>> mbox cmd response data (8 bytes)
26,279,441 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,310,015 UART: [rt]cmd =0x434b4558, len=80
30,644,790 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,306 writing to cptra_bootfsm_go
3,418,409 ready_for_fw is high
3,418,964 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,707,129 >>> mbox cmd response: success
18,984,170 UART:
18,984,596 UART: Running Caliptra FMC ...
18,985,728 UART:
18,985,887 UART: [state] CFI Enabled
19,053,520 UART: [fht] FMC Alias Private Key: 7
20,818,191 UART: [art] Extend RT PCRs Done
20,819,410 UART: [art] Lock RT PCRs Done
20,821,282 UART: [art] Populate DV Done
20,826,529 UART: [fht] FMC Alias Private Key: 7
20,828,180 UART: [art] Derive CDI
20,828,920 UART: [art] Store in in slot 0x4
20,886,322 UART: [art] Derive Key Pair
20,887,353 UART: [art] Store priv key in slot 0x5
23,350,112 UART: [art] Derive Key Pair - Done
23,363,487 UART: [art] Signing Cert with AUTHO
23,364,826 UART: RITY.KEYID = 7
25,076,466 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,995 UART: [art] PUB.X = 4D7785937FD89AB0251A8E88B8FAC2AC511BBDF945CE1A080A4EED270070DBF89ABC648868E8B2BBB20C7BE9D63BEB62
25,085,265 UART: [art] PUB.Y = D4281F8A6E39A5ABFC1945FE1376A9DBCEBFAC2815074A8A43FE1B54998CCA62842434F54401E2A9468F2A3B3963B513
25,092,519 UART: [art] SIG.R = 5D11CD3D28DF83DA74C24814C7B238139133377D2E6F33ED0477BA315062B45B289544D4DC2CA4826D393F49FA41E03F
25,099,871 UART: [art] SIG.S = 7C18863B0E816435AB563610D61E57E5860C0D64297100FA5DD677FEF84A908F289CC690F4C10DB9CFFEB138D9E0B8A4
26,078,614 UART: Caliptra RT
26,079,333 UART: [state] CFI Enabled
26,245,893 UART: [rt] RT listening for mailbox commands...
26,247,793 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,278,395 UART: [rt]cmd =0x414c544e, len=41
26,280,784 >>> mbox cmd response data (8 bytes)
26,281,653 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,311,903 UART: [rt]cmd =0x434b4558, len=80
30,646,380 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
192,852 UART:
193,229 UART: Running Caliptra ROM ...
194,364 UART:
603,852 UART: [state] CFI Enabled
616,598 UART: [state] LifecycleState = Unprovisioned
618,972 UART: [state] DebugLocked = No
620,581 UART: [state] WD Timer not started. Device not locked for debugging
625,611 UART: [kat] SHA2-256
815,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,292 UART: [kat] ++
826,902 UART: [kat] sha1
838,921 UART: [kat] SHA2-256
841,921 UART: [kat] SHA2-384
848,197 UART: [kat] SHA2-512-ACC
850,790 UART: [kat] ECC-384
3,293,894 UART: [kat] HMAC-384Kdf
3,307,983 UART: [kat] LMS
3,839,822 UART: [kat] --
3,842,276 UART: [cold-reset] ++
3,844,497 UART: [fht] FHT @ 0x50003400
3,855,426 UART: [idev] ++
3,856,102 UART: [idev] CDI.KEYID = 6
3,857,060 UART: [idev] SUBJECT.KEYID = 7
3,858,239 UART: [idev] UDS.KEYID = 0
3,859,148 ready_for_fw is high
3,859,344 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,440 UART: [idev] Erasing UDS.KEYID = 0
6,334,090 UART: [idev] Sha1 KeyId Algorithm
6,356,511 UART: [idev] --
6,362,547 UART: [ldev] ++
6,363,238 UART: [ldev] CDI.KEYID = 6
6,364,153 UART: [ldev] SUBJECT.KEYID = 5
6,365,315 UART: [ldev] AUTHORITY.KEYID = 7
6,366,548 UART: [ldev] FE.KEYID = 1
6,378,514 UART: [ldev] Erasing FE.KEYID = 1
8,851,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,504 UART: [ldev] --
10,644,095 UART: [fwproc] Wait for Commands...
10,647,330 UART: [fwproc] Recv command 0x46574c44
10,649,627 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,276 >>> mbox cmd response: success
14,841,810 UART: [afmc] ++
14,842,534 UART: [afmc] CDI.KEYID = 6
14,843,753 UART: [afmc] SUBJECT.KEYID = 7
14,845,200 UART: [afmc] AUTHORITY.KEYID = 5
17,350,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,662 UART: [afmc] --
19,147,349 UART: [cold-reset] --
19,150,248 UART: [state] Locking Datavault
19,156,696 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,856 UART: [state] Locking ICCM
19,161,445 UART: [exit] Launching FMC @ 0x40000130
19,170,076 UART:
19,170,317 UART: Running Caliptra FMC ...
19,171,439 UART:
19,171,598 UART: [state] CFI Enabled
19,179,484 UART: [fht] FMC Alias Private Key: 7
20,937,264 UART: [art] Extend RT PCRs Done
20,938,482 UART: [art] Lock RT PCRs Done
20,940,004 UART: [art] Populate DV Done
20,945,530 UART: [fht] FMC Alias Private Key: 7
20,947,075 UART: [art] Derive CDI
20,947,895 UART: [art] Store in in slot 0x4
20,990,923 UART: [art] Derive Key Pair
20,991,962 UART: [art] Store priv key in slot 0x5
23,418,598 UART: [art] Derive Key Pair - Done
23,431,380 UART: [art] Signing Cert with AUTHO
23,432,690 UART: RITY.KEYID = 7
25,138,086 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,597 UART: [art] PUB.X = 3AC9C21179C1D62EF9BD73B71CA7EE50ACF214F065F7703199675F5860A04AE637A5B2FA2C596FF0539530DCC70C5818
25,146,894 UART: [art] PUB.Y = FA2AAACEF66EB269E06D309441BC081A195BAF75D3DED614E1E2903A95D002EA53170C7F0C6B1125994E82CABCAA9BCE
25,154,162 UART: [art] SIG.R = 7FF398B31EFBADD9A21CE2A44A463E8E1EF9EEA75554B29AFAAF386F55E43DA9F3DFC0727A308DA17A43378A2F74D224
25,161,590 UART: [art] SIG.S = 51C1716E865B4A304A53212609315AA4213FD3694D96091A630D2A79F10F3EF0BEFEB95F0C01BA8942F438A8255C675E
26,140,394 UART: Caliptra RT
26,141,082 UART: [state] CFI Enabled
26,257,673 UART: [rt] RT listening for mailbox commands...
26,259,560 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,289,656 UART: [rt]cmd =0x414c544e, len=41
26,292,088 >>> mbox cmd response data (8 bytes)
26,293,116 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,323,577 UART: [rt]cmd =0x434b4558, len=80
30,596,057 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
3,752,560 ready_for_fw is high
3,752,968 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,943,301 >>> mbox cmd response: success
19,198,834 UART:
19,199,234 UART: Running Caliptra FMC ...
19,200,344 UART:
19,200,501 UART: [state] CFI Enabled
19,208,526 UART: [fht] FMC Alias Private Key: 7
20,965,347 UART: [art] Extend RT PCRs Done
20,966,577 UART: [art] Lock RT PCRs Done
20,968,394 UART: [art] Populate DV Done
20,973,705 UART: [fht] FMC Alias Private Key: 7
20,975,218 UART: [art] Derive CDI
20,975,961 UART: [art] Store in in slot 0x4
21,018,837 UART: [art] Derive Key Pair
21,019,885 UART: [art] Store priv key in slot 0x5
23,447,134 UART: [art] Derive Key Pair - Done
23,459,814 UART: [art] Signing Cert with AUTHO
23,461,312 UART: RITY.KEYID = 7
25,166,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,917 UART: [art] PUB.X = D248F27AD182DA653FF9B64EF3684FB05D4B86C55C43F4A5C896DD97230CD010257535F4A6DB37A04F870BE3C8007446
25,175,159 UART: [art] PUB.Y = 9DF8A4A310630918F877DEE0211B2ACDCC954A44C5A881EF9EF2F05F6F1FA243D59E5544CBE823082F9BF8EDB8A71128
25,182,445 UART: [art] SIG.R = 6D73D79B3B53FF12B2E003FDEA1784DFEF1D768815BD521EEDFD1D6E691A11D99D884A0710B80E709F88F808504BA069
25,189,847 UART: [art] SIG.S = 1B55694EE78BF322E24F47B19EF87F81A904E4B2C9E08958087CD99ED1AEFB82C66A95796C6DEA0F9CD448174F0A88F7
26,169,141 UART: Caliptra RT
26,169,861 UART: [state] CFI Enabled
26,286,947 UART: [rt] RT listening for mailbox commands...
26,288,840 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,318,898 UART: [rt]cmd =0x414c544e, len=41
26,321,231 >>> mbox cmd response data (8 bytes)
26,322,203 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,352,569 UART: [rt]cmd =0x434b4558, len=80
30,624,547 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
86,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,841 UART: [kat] SHA2-256
881,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,887 UART: [kat] ++
886,039 UART: [kat] sha1
890,085 UART: [kat] SHA2-256
892,023 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,607 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,298 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,158 UART: [idev] --
1,514,349 UART: [ldev] ++
1,514,517 UART: [ldev] CDI.KEYID = 6
1,514,880 UART: [ldev] SUBJECT.KEYID = 5
1,515,306 UART: [ldev] AUTHORITY.KEYID = 7
1,515,769 UART: [ldev] FE.KEYID = 1
1,520,797 UART: [ldev] Erasing FE.KEYID = 1
1,546,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,460 UART: [ldev] --
1,585,937 UART: [fwproc] Waiting for Commands...
1,586,572 UART: [fwproc] Received command 0x46574c44
1,587,363 UART: [fwproc] Received Image of size 114084 bytes
2,882,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,276 >>> mbox cmd response: success
3,076,340 UART: [afmc] ++
3,076,508 UART: [afmc] CDI.KEYID = 6
3,076,870 UART: [afmc] SUBJECT.KEYID = 7
3,077,295 UART: [afmc] AUTHORITY.KEYID = 5
3,112,554 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,144 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,537 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,227 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,140 UART: [afmc] --
3,156,106 UART: [cold-reset] --
3,157,060 UART: [state] Locking Datavault
3,158,449 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,053 UART: [state] Locking ICCM
3,159,605 UART: [exit] Launching FMC @ 0x40000130
3,164,934 UART:
3,164,950 UART: Running Caliptra FMC ...
3,165,358 UART:
3,165,412 UART: [state] CFI Enabled
3,176,113 UART: [fht] FMC Alias Private Key: 7
3,284,384 UART: [art] Extend RT PCRs Done
3,284,812 UART: [art] Lock RT PCRs Done
3,286,024 UART: [art] Populate DV Done
3,294,395 UART: [fht] FMC Alias Private Key: 7
3,295,377 UART: [art] Derive CDI
3,295,657 UART: [art] Store in in slot 0x4
3,381,042 UART: [art] Derive Key Pair
3,381,402 UART: [art] Store priv key in slot 0x5
3,394,124 UART: [art] Derive Key Pair - Done
3,408,766 UART: [art] Signing Cert with AUTHO
3,409,246 UART: RITY.KEYID = 7
3,424,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,255 UART: [art] PUB.X = EF176C48AC35697D984890D65EB04B6BB71149DF43E50CFE84781161207EB1B7411ED92DC4B55EA2D69D532216ED808B
3,432,026 UART: [art] PUB.Y = 2FDAAE56F2BADF30227CAA8C26E6BC52FAE8BB6D1E8E4A7FEC229B69AE512D09A2CE0DEE94D2DAFA6BBF835782400E88
3,439,001 UART: [art] SIG.R = 72B618DF6621EE3C346CCB675A0C489B822E0A497D109F28AB7E39CE4AB1AEF4E908C35FC34690FD074FDA07B6CE3A4F
3,445,774 UART: [art] SIG.S = 2D29856062790690F99FED623F4116C56223002C7830425A1DE3AACE85671D4D10F3B183DD96BD780EBF9E3E5C308BA9
3,469,693 UART: Caliptra RT
3,469,946 UART: [state] CFI Enabled
3,578,660 UART: [rt] RT listening for mailbox commands...
3,579,330 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,133 UART: [rt]cmd =0x414c544e, len=41
3,610,832 >>> mbox cmd response data (8 bytes)
3,610,833 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,624 UART: [rt]cmd =0x434b4558, len=80
3,812,135 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,193 ready_for_fw is high
1,362,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,300 >>> mbox cmd response: success
2,986,036 UART:
2,986,052 UART: Running Caliptra FMC ...
2,986,460 UART:
2,986,514 UART: [state] CFI Enabled
2,996,849 UART: [fht] FMC Alias Private Key: 7
3,104,340 UART: [art] Extend RT PCRs Done
3,104,768 UART: [art] Lock RT PCRs Done
3,106,376 UART: [art] Populate DV Done
3,114,525 UART: [fht] FMC Alias Private Key: 7
3,115,495 UART: [art] Derive CDI
3,115,775 UART: [art] Store in in slot 0x4
3,201,024 UART: [art] Derive Key Pair
3,201,384 UART: [art] Store priv key in slot 0x5
3,214,732 UART: [art] Derive Key Pair - Done
3,229,453 UART: [art] Signing Cert with AUTHO
3,229,933 UART: RITY.KEYID = 7
3,244,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,580 UART: [art] PUB.X = DF0182D7ECB1F0395359129F642F9CE3B92DD70D5AFAEAF7421D10387A8146537FADC847E6A4C5BC8C03A2FFFA30E672
3,252,357 UART: [art] PUB.Y = 55AC9CC4738A41CD3D3C547789F2D1597519BCA2F22777F2C0BDD7B9E906ECBBCFAB36BA4DEAC7CD0A1408AF51C27D4E
3,259,324 UART: [art] SIG.R = 9AE5064D257309634589AD7816B00840E4A9B4D9F283F0A0F6D2D7B471D3D08F3C40B7AFA8E034F17AAAF8EEA6441377
3,266,091 UART: [art] SIG.S = B7B9FF4E393BF7446E0B8401994EB58C65373F59B47C629F727926D98D49C7B1966F6AA4171FF4DB2F5DD0C7F879EC30
3,290,586 UART: Caliptra RT
3,290,839 UART: [state] CFI Enabled
3,398,687 UART: [rt] RT listening for mailbox commands...
3,399,357 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,632 UART: [rt]cmd =0x414c544e, len=41
3,431,603 >>> mbox cmd response data (8 bytes)
3,431,604 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,505 UART: [rt]cmd =0x434b4558, len=80
3,632,143 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,313 UART: [kat] SHA2-512-ACC
897,214 UART: [kat] ECC-384
902,567 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,586 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,506,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,043 UART: [idev] --
1,516,018 UART: [ldev] ++
1,516,186 UART: [ldev] CDI.KEYID = 6
1,516,549 UART: [ldev] SUBJECT.KEYID = 5
1,516,975 UART: [ldev] AUTHORITY.KEYID = 7
1,517,438 UART: [ldev] FE.KEYID = 1
1,522,846 UART: [ldev] Erasing FE.KEYID = 1
1,548,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,419 UART: [ldev] --
1,587,828 UART: [fwproc] Waiting for Commands...
1,588,453 UART: [fwproc] Received command 0x46574c44
1,589,244 UART: [fwproc] Received Image of size 114084 bytes
2,884,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,290 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,885 >>> mbox cmd response: success
3,077,977 UART: [afmc] ++
3,078,145 UART: [afmc] CDI.KEYID = 6
3,078,507 UART: [afmc] SUBJECT.KEYID = 7
3,078,932 UART: [afmc] AUTHORITY.KEYID = 5
3,114,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,894 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,584 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,289 UART: [afmc] --
3,157,185 UART: [cold-reset] --
3,158,085 UART: [state] Locking Datavault
3,159,220 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,824 UART: [state] Locking ICCM
3,160,284 UART: [exit] Launching FMC @ 0x40000130
3,165,613 UART:
3,165,629 UART: Running Caliptra FMC ...
3,166,037 UART:
3,166,180 UART: [state] CFI Enabled
3,176,491 UART: [fht] FMC Alias Private Key: 7
3,284,266 UART: [art] Extend RT PCRs Done
3,284,694 UART: [art] Lock RT PCRs Done
3,286,112 UART: [art] Populate DV Done
3,294,149 UART: [fht] FMC Alias Private Key: 7
3,295,175 UART: [art] Derive CDI
3,295,455 UART: [art] Store in in slot 0x4
3,381,046 UART: [art] Derive Key Pair
3,381,406 UART: [art] Store priv key in slot 0x5
3,394,444 UART: [art] Derive Key Pair - Done
3,409,168 UART: [art] Signing Cert with AUTHO
3,409,648 UART: RITY.KEYID = 7
3,425,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,939 UART: [art] PUB.X = 6338CD9940B736A6541537B240693A8068125BB1CD95121CE824FCA34DDE9CD14C3A830C3B52A9C6A850C6DF679D1874
3,432,706 UART: [art] PUB.Y = EDB3ED54D2611C82356AD2117517E30498462A464B8F0E7BE5A58A8BCC8A0D0F07790B5337185B325264CEB1011D2BC8
3,439,637 UART: [art] SIG.R = 6E68FE62E7547A7BA0D82E11C54D4F29720594D886D96A76506BFDF0FA55B511C4895FB28414B029717F75B3F614F2B5
3,446,404 UART: [art] SIG.S = 6C9B3778EC2BC2826F0A98FCFFC2D13B85A806721DBEEFE8B72D62D13B51C69DCB0B5560ABE70E7F5AE95167FA7417C5
3,469,527 UART: Caliptra RT
3,469,872 UART: [state] CFI Enabled
3,578,524 UART: [rt] RT listening for mailbox commands...
3,579,194 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,455 UART: [rt]cmd =0x414c544e, len=41
3,611,398 >>> mbox cmd response data (8 bytes)
3,611,399 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,196 UART: [rt]cmd =0x434b4558, len=80
3,812,067 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,258 ready_for_fw is high
1,362,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,973 >>> mbox cmd response: success
2,985,821 UART:
2,985,837 UART: Running Caliptra FMC ...
2,986,245 UART:
2,986,388 UART: [state] CFI Enabled
2,997,135 UART: [fht] FMC Alias Private Key: 7
3,105,110 UART: [art] Extend RT PCRs Done
3,105,538 UART: [art] Lock RT PCRs Done
3,106,920 UART: [art] Populate DV Done
3,114,953 UART: [fht] FMC Alias Private Key: 7
3,116,071 UART: [art] Derive CDI
3,116,351 UART: [art] Store in in slot 0x4
3,201,646 UART: [art] Derive Key Pair
3,202,006 UART: [art] Store priv key in slot 0x5
3,214,614 UART: [art] Derive Key Pair - Done
3,229,495 UART: [art] Signing Cert with AUTHO
3,229,975 UART: RITY.KEYID = 7
3,245,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,154 UART: [art] PUB.X = 460C6F2D7C02CEE5732EAFB0244F2822B427354CE873E39847B46F06B25774E021279815654ECDA428C6C420752F6621
3,252,907 UART: [art] PUB.Y = 7DAF2FE238BEE6842CE5DE8B6E96ACE07AA1FD97BCFC1B711C58F39D8F5BCDABEF9549688BCEE57758906A632D87131F
3,259,883 UART: [art] SIG.R = 00DC966AA74E6739C61040228D590C83901713FF010076C3F6D773CEAE8C72B336E27D00FE7C0CB6997222D81CCECA06
3,266,577 UART: [art] SIG.S = 000E53F9F273AC34A3EC4042287E4471818814616C5AA710954285758CC6A83DC6FB6232EC408D94C39FCA485285BA0B
3,290,528 UART: Caliptra RT
3,290,873 UART: [state] CFI Enabled
3,400,130 UART: [rt] RT listening for mailbox commands...
3,400,800 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,911 UART: [rt]cmd =0x414c544e, len=41
3,432,968 >>> mbox cmd response data (8 bytes)
3,432,969 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,756 UART: [rt]cmd =0x434b4558, len=80
3,634,420 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
893,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,125 UART: [kat] ++
897,277 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,171,985 UART: [cold-reset] ++
1,172,527 UART: [fht] FHT @ 0x50003400
1,175,366 UART: [idev] ++
1,175,534 UART: [idev] CDI.KEYID = 6
1,175,894 UART: [idev] SUBJECT.KEYID = 7
1,176,318 UART: [idev] UDS.KEYID = 0
1,176,663 ready_for_fw is high
1,176,663 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,134 UART: [idev] Erasing UDS.KEYID = 0
1,201,065 UART: [idev] Sha1 KeyId Algorithm
1,209,625 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,011 UART: [ldev] Erasing FE.KEYID = 1
1,243,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,202 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,263 >>> mbox cmd response: success
2,772,363 UART: [afmc] ++
2,772,531 UART: [afmc] CDI.KEYID = 6
2,772,893 UART: [afmc] SUBJECT.KEYID = 7
2,773,318 UART: [afmc] AUTHORITY.KEYID = 5
2,809,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,700 UART: [afmc] --
2,852,704 UART: [cold-reset] --
2,853,622 UART: [state] Locking Datavault
2,854,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,251 UART: [state] Locking ICCM
2,855,703 UART: [exit] Launching FMC @ 0x40000130
2,861,032 UART:
2,861,048 UART: Running Caliptra FMC ...
2,861,456 UART:
2,861,510 UART: [state] CFI Enabled
2,871,743 UART: [fht] FMC Alias Private Key: 7
2,979,452 UART: [art] Extend RT PCRs Done
2,979,880 UART: [art] Lock RT PCRs Done
2,981,544 UART: [art] Populate DV Done
2,989,619 UART: [fht] FMC Alias Private Key: 7
2,990,787 UART: [art] Derive CDI
2,991,067 UART: [art] Store in in slot 0x4
3,076,896 UART: [art] Derive Key Pair
3,077,256 UART: [art] Store priv key in slot 0x5
3,090,710 UART: [art] Derive Key Pair - Done
3,105,216 UART: [art] Signing Cert with AUTHO
3,105,696 UART: RITY.KEYID = 7
3,120,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,663 UART: [art] PUB.X = C5E46A6E1DC51CA65448AB3C1147C2D3DB87A7DF8E2C1061A9CADB56C17326408C9B80354BA1667C43E48C97D9756865
3,128,439 UART: [art] PUB.Y = 7BF887A9B555396A1AA7587D39A549DEDB2BA956AA30EA5312FCC99F890BB426B1BFD2E92BF506659F20F096E94F2DCE
3,135,399 UART: [art] SIG.R = 434821A47963E07EB8A6E56A3B626803B1983AE752E4C9D3CCF20E5AEA39A1A04D4B4A0916F8563FFCAB2AA12E0E75D8
3,142,169 UART: [art] SIG.S = 337C4A045E874B9178AF80A6C447A8736A74CEB65BD2D2510317115C6A6845629494AF618B96361E6DE5CC4931679850
3,165,718 UART: Caliptra RT
3,165,971 UART: [state] CFI Enabled
3,273,534 UART: [rt] RT listening for mailbox commands...
3,274,204 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,583 UART: [rt]cmd =0x414c544e, len=41
3,306,596 >>> mbox cmd response data (8 bytes)
3,306,597 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,128 UART: [rt]cmd =0x434b4558, len=80
3,506,938 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,891 ready_for_fw is high
1,060,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,758 >>> mbox cmd response: success
2,685,970 UART:
2,685,986 UART: Running Caliptra FMC ...
2,686,394 UART:
2,686,448 UART: [state] CFI Enabled
2,696,977 UART: [fht] FMC Alias Private Key: 7
2,805,354 UART: [art] Extend RT PCRs Done
2,805,782 UART: [art] Lock RT PCRs Done
2,807,298 UART: [art] Populate DV Done
2,815,511 UART: [fht] FMC Alias Private Key: 7
2,816,515 UART: [art] Derive CDI
2,816,795 UART: [art] Store in in slot 0x4
2,902,490 UART: [art] Derive Key Pair
2,902,850 UART: [art] Store priv key in slot 0x5
2,916,004 UART: [art] Derive Key Pair - Done
2,930,730 UART: [art] Signing Cert with AUTHO
2,931,210 UART: RITY.KEYID = 7
2,946,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,015 UART: [art] PUB.X = CD12DE86F2E3E29750776F6947837321873B8220FE99634FF1D21B8580E515CD6D8C06BBC2F8F5EF91F61004EAFA6A92
2,953,783 UART: [art] PUB.Y = B65A5A0C96AF6EB7823972C15869410621058102B503656837538186BDDC7BF54DF0E14DE99D2669F912FED6FC105453
2,960,712 UART: [art] SIG.R = 0003C617261F888D56613B0DF417909C63856121B88C0CAABBF36A7FF55BACA7B95B6FED8C4D587BC82095979E7FE087
2,967,457 UART: [art] SIG.S = 7D649CD710CCB191C60C970E627594763DAFC9647CB8686494572FDDD6BF0A8468B45935F9A3112AD76D5A857E355013
2,991,805 UART: Caliptra RT
2,992,058 UART: [state] CFI Enabled
3,098,581 UART: [rt] RT listening for mailbox commands...
3,099,251 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,252 UART: [rt]cmd =0x414c544e, len=41
3,131,053 >>> mbox cmd response data (8 bytes)
3,131,054 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,075 UART: [rt]cmd =0x434b4558, len=80
3,332,654 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
893,531 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,656 UART: [kat] ++
897,808 UART: [kat] sha1
902,246 UART: [kat] SHA2-256
904,186 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,931 UART: [kat] HMAC-384Kdf
923,355 UART: [kat] LMS
1,171,683 UART: [kat] --
1,172,634 UART: [cold-reset] ++
1,173,168 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,867 UART: [idev] Erasing UDS.KEYID = 0
1,202,372 UART: [idev] Sha1 KeyId Algorithm
1,210,968 UART: [idev] --
1,211,926 UART: [ldev] ++
1,212,094 UART: [ldev] CDI.KEYID = 6
1,212,457 UART: [ldev] SUBJECT.KEYID = 5
1,212,883 UART: [ldev] AUTHORITY.KEYID = 7
1,213,346 UART: [ldev] FE.KEYID = 1
1,218,776 UART: [ldev] Erasing FE.KEYID = 1
1,245,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,442 UART: [ldev] --
1,284,917 UART: [fwproc] Wait for Commands...
1,285,625 UART: [fwproc] Recv command 0x46574c44
1,286,353 UART: [fwproc] Recv'd Img size: 114084 bytes
2,582,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,774,198 >>> mbox cmd response: success
2,775,260 UART: [afmc] ++
2,775,428 UART: [afmc] CDI.KEYID = 6
2,775,790 UART: [afmc] SUBJECT.KEYID = 7
2,776,215 UART: [afmc] AUTHORITY.KEYID = 5
2,811,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,741 UART: [afmc] --
2,854,763 UART: [cold-reset] --
2,855,425 UART: [state] Locking Datavault
2,856,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,228 UART: [state] Locking ICCM
2,857,664 UART: [exit] Launching FMC @ 0x40000130
2,862,993 UART:
2,863,009 UART: Running Caliptra FMC ...
2,863,417 UART:
2,863,560 UART: [state] CFI Enabled
2,874,741 UART: [fht] FMC Alias Private Key: 7
2,982,068 UART: [art] Extend RT PCRs Done
2,982,496 UART: [art] Lock RT PCRs Done
2,983,860 UART: [art] Populate DV Done
2,992,215 UART: [fht] FMC Alias Private Key: 7
2,993,193 UART: [art] Derive CDI
2,993,473 UART: [art] Store in in slot 0x4
3,079,102 UART: [art] Derive Key Pair
3,079,462 UART: [art] Store priv key in slot 0x5
3,092,918 UART: [art] Derive Key Pair - Done
3,107,805 UART: [art] Signing Cert with AUTHO
3,108,285 UART: RITY.KEYID = 7
3,123,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,114 UART: [art] PUB.X = 848B9E6629E701B40809C00AFC2028965E4A5E412F72EDAA351130B9E0314A377E358FC1EC7C7AD255D5FE8B1C8C34EA
3,130,880 UART: [art] PUB.Y = 2911D315DEF81DBBC7B8A387F4BD011E4C34B3C87C9BBB816CA5A1D91BF6A2C18D4631F5999F57407063E284D54B92B4
3,137,837 UART: [art] SIG.R = 820F88FCC6D923DF4EE71C634D41CC1794DCB01FF71D790E001D5009967245AAA9735761B7CD166E9C6242D82E80E31D
3,144,580 UART: [art] SIG.S = 9568CF2666FC68C079DF5D8F49CD253E1BBC41B9FDAE2D59CB0A7802579BDFC38991A93F3D1022B589EFA7657FED68C5
3,168,699 UART: Caliptra RT
3,169,044 UART: [state] CFI Enabled
3,277,580 UART: [rt] RT listening for mailbox commands...
3,278,250 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,133 UART: [rt]cmd =0x414c544e, len=41
3,310,112 >>> mbox cmd response data (8 bytes)
3,310,113 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,956 UART: [rt]cmd =0x434b4558, len=80
3,510,330 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,080 ready_for_fw is high
1,060,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,889 >>> mbox cmd response: success
2,687,389 UART:
2,687,405 UART: Running Caliptra FMC ...
2,687,813 UART:
2,687,956 UART: [state] CFI Enabled
2,698,745 UART: [fht] FMC Alias Private Key: 7
2,806,502 UART: [art] Extend RT PCRs Done
2,806,930 UART: [art] Lock RT PCRs Done
2,808,476 UART: [art] Populate DV Done
2,816,881 UART: [fht] FMC Alias Private Key: 7
2,818,037 UART: [art] Derive CDI
2,818,317 UART: [art] Store in in slot 0x4
2,904,278 UART: [art] Derive Key Pair
2,904,638 UART: [art] Store priv key in slot 0x5
2,917,982 UART: [art] Derive Key Pair - Done
2,932,700 UART: [art] Signing Cert with AUTHO
2,933,180 UART: RITY.KEYID = 7
2,948,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,403 UART: [art] PUB.X = 9CF79506B3A4148FFEDAAD388A3EFE3F0736B948A8F5AF7C7429B3AA1B80A1D4F54F68AB6AE5B0265A5D4A983B2EAE77
2,956,189 UART: [art] PUB.Y = 709FF019687A2CC55DABA5A619B038BDCC8778A5DE1CB15C3868AB99F0FC4B9D027067E49482B44F68A9B4A300F1D904
2,963,121 UART: [art] SIG.R = 13A7B3B62839B52D5CD958F321F510493F0D2417F8CB2915EC32E1A151F434779ECF9FB14F3C1E353A25C991777EAFF1
2,969,892 UART: [art] SIG.S = 02F949856F6B1E60847979AB644A8979E8B184BFC627C1D5C76C327843357DD5949FBF43F512713A7436FEC117C0416F
2,994,054 UART: Caliptra RT
2,994,399 UART: [state] CFI Enabled
3,102,900 UART: [rt] RT listening for mailbox commands...
3,103,570 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,577 UART: [rt]cmd =0x414c544e, len=41
3,135,496 >>> mbox cmd response data (8 bytes)
3,135,497 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,324 UART: [rt]cmd =0x434b4558, len=80
3,337,884 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,401 UART: [idev] ++
1,173,569 UART: [idev] CDI.KEYID = 6
1,173,930 UART: [idev] SUBJECT.KEYID = 7
1,174,355 UART: [idev] UDS.KEYID = 0
1,174,701 ready_for_fw is high
1,174,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,750 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,758 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,285 >>> mbox cmd response: success
2,770,502 UART: [afmc] ++
2,770,670 UART: [afmc] CDI.KEYID = 6
2,771,033 UART: [afmc] SUBJECT.KEYID = 7
2,771,459 UART: [afmc] AUTHORITY.KEYID = 5
2,807,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,943 UART: [afmc] --
2,850,959 UART: [cold-reset] --
2,851,595 UART: [state] Locking Datavault
2,852,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,422 UART: [state] Locking ICCM
2,854,088 UART: [exit] Launching FMC @ 0x40000130
2,859,417 UART:
2,859,433 UART: Running Caliptra FMC ...
2,859,841 UART:
2,859,895 UART: [state] CFI Enabled
2,870,402 UART: [fht] FMC Alias Private Key: 7
2,978,777 UART: [art] Extend RT PCRs Done
2,979,205 UART: [art] Lock RT PCRs Done
2,980,895 UART: [art] Populate DV Done
2,989,226 UART: [fht] FMC Alias Private Key: 7
2,990,368 UART: [art] Derive CDI
2,990,648 UART: [art] Store in in slot 0x4
3,076,163 UART: [art] Derive Key Pair
3,076,523 UART: [art] Store priv key in slot 0x5
3,088,833 UART: [art] Derive Key Pair - Done
3,103,708 UART: [art] Signing Cert with AUTHO
3,104,188 UART: RITY.KEYID = 7
3,119,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,061 UART: [art] PUB.X = AD75D65F0EE73B7317C4261EF2C63BF51359674A1A8CF2B15FDE8661AB355213CF0DA77D57D9412CE59DDC060C5899DE
3,126,831 UART: [art] PUB.Y = 0DE34A0CAEA0535A1F931091EE6B8D426A2DBC4842E294C209BD5AE2B6299FB849501E139169C46128891CDF9413BD94
3,133,776 UART: [art] SIG.R = E1D80CD3476A439ADE6F090DA75FE827578CD92190130F50366E7E9E5E4F6A33D90AFEB971407FED4E3F31BE0331925F
3,140,536 UART: [art] SIG.S = BB8E79A7671D17294E0130F4E78AB6874E67BDB0C124E676D9AAE5D5909E2D8118E459A8EF4A57B8085FE2395EAB9632
3,164,661 UART: Caliptra RT
3,164,914 UART: [state] CFI Enabled
3,272,568 UART: [rt] RT listening for mailbox commands...
3,273,238 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,373 UART: [rt]cmd =0x414c544e, len=41
3,305,374 >>> mbox cmd response data (8 bytes)
3,305,375 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,048 UART: [rt]cmd =0x434b4558, len=80
3,506,338 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 ready_for_fw is high
1,055,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,199 >>> mbox cmd response: success
2,678,777 UART:
2,678,793 UART: Running Caliptra FMC ...
2,679,201 UART:
2,679,255 UART: [state] CFI Enabled
2,689,676 UART: [fht] FMC Alias Private Key: 7
2,797,749 UART: [art] Extend RT PCRs Done
2,798,177 UART: [art] Lock RT PCRs Done
2,799,905 UART: [art] Populate DV Done
2,807,800 UART: [fht] FMC Alias Private Key: 7
2,808,926 UART: [art] Derive CDI
2,809,206 UART: [art] Store in in slot 0x4
2,894,805 UART: [art] Derive Key Pair
2,895,165 UART: [art] Store priv key in slot 0x5
2,908,077 UART: [art] Derive Key Pair - Done
2,922,219 UART: [art] Signing Cert with AUTHO
2,922,699 UART: RITY.KEYID = 7
2,937,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,442 UART: [art] PUB.X = DE6EE562454FD7E6EF8E4A4AE29C0E3C1698BAD26B1149DF193CA70CA2E37B5C974A74A12470E417E19E6DBE74C6AB65
2,945,224 UART: [art] PUB.Y = 00CD0576CB0B58538CAF31D4DFAC9DBD80F92C34F4B780E747636316872501763B48E01DA4D0435F931A862660875C33
2,952,139 UART: [art] SIG.R = 888C36683D5A50DAB4F39DED97BA2D294C9BB9155826A63CF948D1AF865E96F6436B958DE7165D9AA32BDE2BAE2609B8
2,958,918 UART: [art] SIG.S = C1130B526ABBB62643FB4E6167447A5F4FC70858D1E17EB2B6A57720D19D53FA3643CC5094FF7367F1FECA73692C1E19
2,983,301 UART: Caliptra RT
2,983,554 UART: [state] CFI Enabled
3,091,122 UART: [rt] RT listening for mailbox commands...
3,091,792 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,121,441 UART: [rt]cmd =0x414c544e, len=41
3,123,322 >>> mbox cmd response data (8 bytes)
3,123,323 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,153,078 UART: [rt]cmd =0x434b4558, len=80
3,323,531 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,313 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 ready_for_fw is high
1,174,450 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,965 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,449 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,208 >>> mbox cmd response: success
2,771,277 UART: [afmc] ++
2,771,445 UART: [afmc] CDI.KEYID = 6
2,771,808 UART: [afmc] SUBJECT.KEYID = 7
2,772,234 UART: [afmc] AUTHORITY.KEYID = 5
2,807,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,507 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,390 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,050 UART: [afmc] --
2,850,940 UART: [cold-reset] --
2,851,716 UART: [state] Locking Datavault
2,852,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,549 UART: [state] Locking ICCM
2,854,033 UART: [exit] Launching FMC @ 0x40000130
2,859,362 UART:
2,859,378 UART: Running Caliptra FMC ...
2,859,786 UART:
2,859,929 UART: [state] CFI Enabled
2,870,208 UART: [fht] FMC Alias Private Key: 7
2,978,661 UART: [art] Extend RT PCRs Done
2,979,089 UART: [art] Lock RT PCRs Done
2,980,351 UART: [art] Populate DV Done
2,988,624 UART: [fht] FMC Alias Private Key: 7
2,989,572 UART: [art] Derive CDI
2,989,852 UART: [art] Store in in slot 0x4
3,075,373 UART: [art] Derive Key Pair
3,075,733 UART: [art] Store priv key in slot 0x5
3,088,695 UART: [art] Derive Key Pair - Done
3,103,600 UART: [art] Signing Cert with AUTHO
3,104,080 UART: RITY.KEYID = 7
3,119,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,875 UART: [art] PUB.X = 5A1F46575E215B6CAB4388E6EDAFEF66F2737B2EF72DC6D766D4BAE6D14A760AAB6B7334911971871E13DD1595004B97
3,126,628 UART: [art] PUB.Y = 9B586876651BF31F1B9F5925AA93F667EF0B9776F32D7AE0B08E7A5E2EF9444374AB84A9EC4F5E60521261F95BF41C6B
3,133,581 UART: [art] SIG.R = 373D8E9655835B346C34C89B89C3DAFFADFA5F9A77829DDF8B6E205AF4E78D882D55299C598D230BFCEAAFF09A56EB88
3,140,366 UART: [art] SIG.S = 012789EC790BA749EEE8426BB7886221EB0157CF7EFAD0B54A069BB786D3F9182A2AD2F5E801AB4F1AC88EA0FEE71AF1
3,164,834 UART: Caliptra RT
3,165,179 UART: [state] CFI Enabled
3,273,888 UART: [rt] RT listening for mailbox commands...
3,274,558 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,479 UART: [rt]cmd =0x414c544e, len=41
3,306,308 >>> mbox cmd response data (8 bytes)
3,306,309 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,102 UART: [rt]cmd =0x434b4558, len=80
3,506,627 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,383 ready_for_fw is high
1,055,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,554 >>> mbox cmd response: success
2,681,150 UART:
2,681,166 UART: Running Caliptra FMC ...
2,681,574 UART:
2,681,717 UART: [state] CFI Enabled
2,692,336 UART: [fht] FMC Alias Private Key: 7
2,800,551 UART: [art] Extend RT PCRs Done
2,800,979 UART: [art] Lock RT PCRs Done
2,802,411 UART: [art] Populate DV Done
2,810,638 UART: [fht] FMC Alias Private Key: 7
2,811,644 UART: [art] Derive CDI
2,811,924 UART: [art] Store in in slot 0x4
2,897,941 UART: [art] Derive Key Pair
2,898,301 UART: [art] Store priv key in slot 0x5
2,911,625 UART: [art] Derive Key Pair - Done
2,926,691 UART: [art] Signing Cert with AUTHO
2,927,171 UART: RITY.KEYID = 7
2,942,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,480 UART: [art] PUB.X = A7588F2B99D217A6718765BEB088C1F94CAE65D2B4F6C3709AC7E5A0DD82A5063326D735CD5E45206D4BEF1FA3ACF935
2,950,259 UART: [art] PUB.Y = 9C4D8495944493681BF7A8988099DC28C7D8CCE27404F4C34717D581964E44297E3DC96456EFA5DD72891E0EB5ECA7B8
2,957,203 UART: [art] SIG.R = DF023190EBB705BB2C3689BC30F88B5488BE0ECE67EC7EF2FB2DEFB9B25B6FEB61BC4150F3D9C0C4408268EEB9C89AEF
2,963,992 UART: [art] SIG.S = 7E6D574808073B5F646D6582DAB97900F2459C4F98C0AA477DF58B97DD1761DF5A26504A001A48B09635069BC16CC40D
2,987,817 UART: Caliptra RT
2,988,162 UART: [state] CFI Enabled
3,096,193 UART: [rt] RT listening for mailbox commands...
3,096,863 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,938 UART: [rt]cmd =0x414c544e, len=41
3,128,775 >>> mbox cmd response data (8 bytes)
3,128,776 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,371 UART: [rt]cmd =0x434b4558, len=80
3,330,024 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,040 UART:
192,474 UART: Running Caliptra ROM ...
193,611 UART:
193,760 UART: [state] CFI Enabled
264,600 UART: [state] LifecycleState = Unprovisioned
266,527 UART: [state] DebugLocked = No
269,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,572 UART: [kat] SHA2-256
444,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,765 UART: [kat] ++
455,296 UART: [kat] sha1
466,674 UART: [kat] SHA2-256
469,328 UART: [kat] SHA2-384
475,457 UART: [kat] SHA2-512-ACC
477,821 UART: [kat] ECC-384
2,769,677 UART: [kat] HMAC-384Kdf
2,802,015 UART: [kat] LMS
3,992,370 UART: [kat] --
3,995,309 UART: [cold-reset] ++
3,997,819 UART: [fht] Storing FHT @ 0x50003400
4,008,961 UART: [idev] ++
4,009,533 UART: [idev] CDI.KEYID = 6
4,010,461 UART: [idev] SUBJECT.KEYID = 7
4,011,710 UART: [idev] UDS.KEYID = 0
4,012,776 ready_for_fw is high
4,012,992 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,182 UART: [idev] Erasing UDS.KEYID = 0
7,350,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,715 UART: [idev] --
7,375,812 UART: [ldev] ++
7,376,434 UART: [ldev] CDI.KEYID = 6
7,377,404 UART: [ldev] SUBJECT.KEYID = 5
7,378,638 UART: [ldev] AUTHORITY.KEYID = 7
7,380,218 UART: [ldev] FE.KEYID = 1
7,425,371 UART: [ldev] Erasing FE.KEYID = 1
10,760,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,579 UART: [ldev] --
13,130,604 UART: [fwproc] Waiting for Commands...
13,132,430 UART: [fwproc] Received command 0x46574c44
13,134,671 UART: [fwproc] Received Image of size 113760 bytes
17,186,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,504 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,650,115 >>> mbox cmd response: success
17,654,517 UART: [afmc] ++
17,655,124 UART: [afmc] CDI.KEYID = 6
17,656,036 UART: [afmc] SUBJECT.KEYID = 7
17,657,255 UART: [afmc] AUTHORITY.KEYID = 5
21,025,133 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,123 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,535 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,369 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,770 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,392 UART: [afmc] --
23,397,587 UART: [cold-reset] --
23,402,422 UART: [state] Locking Datavault
23,405,725 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,476 UART: [state] Locking ICCM
23,409,250 UART: [exit] Launching FMC @ 0x40000130
23,417,653 UART:
23,417,890 UART: Running Caliptra FMC ...
23,418,993 UART:
23,419,156 UART: [state] CFI Enabled
23,483,380 UART: [fht] FMC Alias Private Key: 7
25,821,719 UART: [art] Extend RT PCRs Done
25,822,941 UART: [art] Lock RT PCRs Done
25,824,651 UART: [art] Populate DV Done
25,830,223 UART: [fht] FMC Alias Private Key: 7
25,831,764 UART: [art] Derive CDI
25,832,577 UART: [art] Store in in slot 0x4
25,891,776 UART: [art] Derive Key Pair
25,892,813 UART: [art] Store priv key in slot 0x5
29,185,710 UART: [art] Derive Key Pair - Done
29,198,760 UART: [art] Signing Cert with AUTHO
29,200,072 UART: RITY.KEYID = 7
31,487,089 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,616 UART: [art] PUB.X = 48830CFC303B78F92CB32B286D58DAD69CFE417AD51FC532F28AEB85DFA01B209A44101BF16331CC3ABA580EC8B2AC3A
31,495,861 UART: [art] PUB.Y = 987484867D887570123A7A091C6D9FC9A0C3F2E5794A6FFCDFC79ADD2342A8BF4301B967D4CEAB38A97D13EA4B6D3D20
31,503,141 UART: [art] SIG.R = 2CACDE2BA95E507D81F44AB64F17171D3A3C7490A3F8DA379DCB0BE1321B9BAD7988B0CB030900E9B8E4E726F96419E1
31,510,499 UART: [art] SIG.S = 1623833B12F53274E04D3EBA53708F5E4B0C80F948DD787CE049AA5780FBD99DC672857315B4C711040159886D2584FC
32,815,465 UART: Caliptra RT
32,816,190 UART: [state] CFI Enabled
32,977,252 UART: [rt] RT listening for mailbox commands...
32,979,265 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,009,874 UART: [rt]cmd =0x414c544e, len=20
33,011,491 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,785,180 ready_for_fw is high
3,785,713 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,862,617 >>> mbox cmd response: success
23,546,053 UART:
23,546,441 UART: Running Caliptra FMC ...
23,547,589 UART:
23,547,751 UART: [state] CFI Enabled
23,614,000 UART: [fht] FMC Alias Private Key: 7
25,951,967 UART: [art] Extend RT PCRs Done
25,953,191 UART: [art] Lock RT PCRs Done
25,955,415 UART: [art] Populate DV Done
25,960,997 UART: [fht] FMC Alias Private Key: 7
25,962,643 UART: [art] Derive CDI
25,963,476 UART: [art] Store in in slot 0x4
26,022,901 UART: [art] Derive Key Pair
26,023,947 UART: [art] Store priv key in slot 0x5
29,316,823 UART: [art] Derive Key Pair - Done
29,329,718 UART: [art] Signing Cert with AUTHO
29,331,024 UART: RITY.KEYID = 7
31,618,386 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,895 UART: [art] PUB.X = 74872AB56B2E749BFB45507B25F01EFBFD4CBAC4B16C71C6353A05E6BFA759D7D5D2738E9EFD31F7A55AE726B6956463
31,627,157 UART: [art] PUB.Y = 1951DEAA842FB1878925BF90DB28E0C5427BFBBE18F4E85BAFD609EBBEAD8A31E0E05DB60ADB749B6991BFD7F6042731
31,634,415 UART: [art] SIG.R = 3C5184B3380A9BE54BDFC8775F622901DCA84117F2B3D4F4686C5A2E6EBF6E0849615833F272547E0AA730979AC5B2B4
31,641,809 UART: [art] SIG.S = BEC94AF50F22A34F6770E6E431F5890D927C6A33AB0B6683E439489C5EEEA90624699323F2CA1ECFE3D2C457A3E6F9AF
32,946,999 UART: Caliptra RT
32,947,723 UART: [state] CFI Enabled
33,106,850 UART: [rt] RT listening for mailbox commands...
33,108,730 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,139,481 UART: [rt]cmd =0x414c544e, len=20
33,141,269 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
192,954 UART:
193,315 UART: Running Caliptra ROM ...
194,515 UART:
604,341 UART: [state] CFI Enabled
618,148 UART: [state] LifecycleState = Unprovisioned
620,085 UART: [state] DebugLocked = No
622,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,801 UART: [kat] SHA2-256
797,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,098 UART: [kat] ++
808,545 UART: [kat] sha1
818,865 UART: [kat] SHA2-256
821,581 UART: [kat] SHA2-384
828,199 UART: [kat] SHA2-512-ACC
830,559 UART: [kat] ECC-384
3,113,837 UART: [kat] HMAC-384Kdf
3,125,078 UART: [kat] LMS
4,315,227 UART: [kat] --
4,319,658 UART: [cold-reset] ++
4,320,942 UART: [fht] Storing FHT @ 0x50003400
4,332,350 UART: [idev] ++
4,332,914 UART: [idev] CDI.KEYID = 6
4,333,861 UART: [idev] SUBJECT.KEYID = 7
4,335,097 UART: [idev] UDS.KEYID = 0
4,336,049 ready_for_fw is high
4,336,236 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,091 UART: [idev] Erasing UDS.KEYID = 0
7,618,715 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,690 UART: [idev] --
7,644,675 UART: [ldev] ++
7,645,248 UART: [ldev] CDI.KEYID = 6
7,646,209 UART: [ldev] SUBJECT.KEYID = 5
7,647,414 UART: [ldev] AUTHORITY.KEYID = 7
7,648,691 UART: [ldev] FE.KEYID = 1
7,657,820 UART: [ldev] Erasing FE.KEYID = 1
10,943,220 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,251 UART: [ldev] --
13,303,913 UART: [fwproc] Waiting for Commands...
13,306,373 UART: [fwproc] Received command 0x46574c44
13,308,631 UART: [fwproc] Received Image of size 113760 bytes
17,356,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,430,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,498,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,815,783 >>> mbox cmd response: success
17,819,126 UART: [afmc] ++
17,819,727 UART: [afmc] CDI.KEYID = 6
17,820,636 UART: [afmc] SUBJECT.KEYID = 7
17,821,905 UART: [afmc] AUTHORITY.KEYID = 5
21,137,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,435,102 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,449,497 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,464,314 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,729 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,440 UART: [afmc] --
23,503,862 UART: [cold-reset] --
23,509,017 UART: [state] Locking Datavault
23,513,241 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,035 UART: [state] Locking ICCM
23,516,118 UART: [exit] Launching FMC @ 0x40000130
23,524,466 UART:
23,524,710 UART: Running Caliptra FMC ...
23,525,809 UART:
23,525,967 UART: [state] CFI Enabled
23,534,015 UART: [fht] FMC Alias Private Key: 7
25,865,285 UART: [art] Extend RT PCRs Done
25,866,502 UART: [art] Lock RT PCRs Done
25,868,043 UART: [art] Populate DV Done
25,873,616 UART: [fht] FMC Alias Private Key: 7
25,875,149 UART: [art] Derive CDI
25,875,882 UART: [art] Store in in slot 0x4
25,918,061 UART: [art] Derive Key Pair
25,919,103 UART: [art] Store priv key in slot 0x5
29,161,219 UART: [art] Derive Key Pair - Done
29,174,429 UART: [art] Signing Cert with AUTHO
29,175,728 UART: RITY.KEYID = 7
31,454,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,215 UART: [art] PUB.X = 4DB62666DD65E678DD8B52856E219865E58333BD35C27193B429FF8594590904775F0BD69938F77FF0C95BEAA046D08A
31,463,428 UART: [art] PUB.Y = CD56FF5C864EA87AB18D3344AD3B8D03DACE6F01A1CDCF0A210475363518DE8E994F442FA00A2AC00CF331A329383D03
31,470,695 UART: [art] SIG.R = 469E0C569569ED144B3AB938BC55069064AAF0552FB1D5A8A0D9089ADC0A95158FB5540AB6A99D452E3A1E969C51BA97
31,478,056 UART: [art] SIG.S = 377494D916F39695F73C9F2DD7DE0F5233AB73E6B50F75DEA9DCA75DD5EA74A908AC7961E1BCB822D638DF652BC448CA
32,783,191 UART: Caliptra RT
32,783,908 UART: [state] CFI Enabled
32,901,364 UART: [rt] RT listening for mailbox commands...
32,903,243 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,932,986 UART: [rt]cmd =0x414c544e, len=20
32,934,523 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
4,129,909 ready_for_fw is high
4,130,285 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,298 >>> mbox cmd response: success
23,705,810 UART:
23,706,230 UART: Running Caliptra FMC ...
23,707,332 UART:
23,707,481 UART: [state] CFI Enabled
23,715,083 UART: [fht] FMC Alias Private Key: 7
26,045,805 UART: [art] Extend RT PCRs Done
26,047,037 UART: [art] Lock RT PCRs Done
26,049,073 UART: [art] Populate DV Done
26,054,813 UART: [fht] FMC Alias Private Key: 7
26,056,528 UART: [art] Derive CDI
26,057,345 UART: [art] Store in in slot 0x4
26,099,734 UART: [art] Derive Key Pair
26,100,812 UART: [art] Store priv key in slot 0x5
29,343,101 UART: [art] Derive Key Pair - Done
29,355,907 UART: [art] Signing Cert with AUTHO
29,357,214 UART: RITY.KEYID = 7
31,636,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,142 UART: [art] PUB.X = 16CD22DE031C12663169A611FD74692412A3B51954E160731CAC3052EA56C69A12A0FC854F0869E2966BE6F151A5EA83
31,645,379 UART: [art] PUB.Y = 69D7F5698C0D6D5280A7E68EF62DB7CBB41E79BFEFFEC326CA602F2D2164C4AC09982AA22A1C0877C2B716204CBAAAF5
31,652,654 UART: [art] SIG.R = C5A4C866D14AB5AC07334DDC32C5B09046DA3308541959A519307A16297CA1A984120942AF25CFA8404B71457F5F0035
31,660,053 UART: [art] SIG.S = F5E29E685B21CEA653F73A6AB3E0018CDAD2F8BE133473C6F437E6F3A2FB6D82D22C8FE36A7E301023022E0C28DFC3D1
32,964,875 UART: Caliptra RT
32,965,584 UART: [state] CFI Enabled
33,083,837 UART: [rt] RT listening for mailbox commands...
33,085,726 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,115,696 UART: [rt]cmd =0x414c544e, len=20
33,117,348 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,545 UART:
193,082 UART: Running Caliptra ROM ...
194,251 UART:
194,401 UART: [state] CFI Enabled
262,270 UART: [state] LifecycleState = Unprovisioned
264,083 UART: [state] DebugLocked = No
265,483 UART: [state] WD Timer not started. Device not locked for debugging
269,752 UART: [kat] SHA2-256
448,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,447 UART: [kat] ++
460,913 UART: [kat] sha1
471,500 UART: [kat] SHA2-256
474,570 UART: [kat] SHA2-384
480,980 UART: [kat] SHA2-512-ACC
483,909 UART: [kat] ECC-384
2,927,894 UART: [kat] HMAC-384Kdf
2,951,161 UART: [kat] LMS
3,480,650 UART: [kat] --
3,485,069 UART: [cold-reset] ++
3,487,281 UART: [fht] FHT @ 0x50003400
3,498,391 UART: [idev] ++
3,498,953 UART: [idev] CDI.KEYID = 6
3,499,877 UART: [idev] SUBJECT.KEYID = 7
3,501,049 UART: [idev] UDS.KEYID = 0
3,501,972 ready_for_fw is high
3,502,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,645,992 UART: [idev] Erasing UDS.KEYID = 0
6,004,681 UART: [idev] Sha1 KeyId Algorithm
6,028,020 UART: [idev] --
6,031,612 UART: [ldev] ++
6,032,196 UART: [ldev] CDI.KEYID = 6
6,033,130 UART: [ldev] SUBJECT.KEYID = 5
6,034,235 UART: [ldev] AUTHORITY.KEYID = 7
6,035,515 UART: [ldev] FE.KEYID = 1
6,078,832 UART: [ldev] Erasing FE.KEYID = 1
8,582,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,570 UART: [ldev] --
10,390,320 UART: [fwproc] Wait for Commands...
10,393,074 UART: [fwproc] Recv command 0x46574c44
10,395,176 UART: [fwproc] Recv'd Img size: 114084 bytes
13,796,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,254,489 >>> mbox cmd response: success
14,258,449 UART: [afmc] ++
14,259,042 UART: [afmc] CDI.KEYID = 6
14,259,926 UART: [afmc] SUBJECT.KEYID = 7
14,261,133 UART: [afmc] AUTHORITY.KEYID = 5
16,786,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,520 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,522 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,991 UART: [afmc] --
18,584,446 UART: [cold-reset] --
18,587,682 UART: [state] Locking Datavault
18,594,721 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,372 UART: [state] Locking ICCM
18,597,442 UART: [exit] Launching FMC @ 0x40000130
18,605,833 UART:
18,606,065 UART: Running Caliptra FMC ...
18,607,169 UART:
18,607,326 UART: [state] CFI Enabled
18,666,347 UART: [fht] FMC Alias Private Key: 7
20,430,161 UART: [art] Extend RT PCRs Done
20,431,377 UART: [art] Lock RT PCRs Done
20,432,839 UART: [art] Populate DV Done
20,438,244 UART: [fht] FMC Alias Private Key: 7
20,439,842 UART: [art] Derive CDI
20,440,672 UART: [art] Store in in slot 0x4
20,498,088 UART: [art] Derive Key Pair
20,499,081 UART: [art] Store priv key in slot 0x5
22,961,778 UART: [art] Derive Key Pair - Done
22,974,776 UART: [art] Signing Cert with AUTHO
22,976,077 UART: RITY.KEYID = 7
24,687,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,287 UART: [art] PUB.X = FA761CF3F25DD8479626F611C663904B5BA07F347ECBBE4F8C39501D98BD8903D5C322F6F20192E518007BAC185AFE21
24,696,552 UART: [art] PUB.Y = D7DE0E914EE0BACAD332FD8F2DC04EAF422A88231DB5BCD80483C4FFC06AC53744C2D5F8BCCC385E768F8BC564D826E5
24,703,875 UART: [art] SIG.R = 506CBE02CCDFEFAB5C951920764BD717530B711EA53C0035C35F141DBA85857787998A921CB73572D5D4C699D48A70FD
24,711,232 UART: [art] SIG.S = 9C3C2585629F85258046D174C9B0EF6BC45E48410B771AE9EA3F571E80F241EEB5FCE544AC98A5E8B52C4FE68BA94496
25,689,355 UART: Caliptra RT
25,690,066 UART: [state] CFI Enabled
25,855,625 UART: [rt] RT listening for mailbox commands...
25,857,512 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,888,076 UART: [rt]cmd =0x414c544e, len=20
25,889,715 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,360,248 ready_for_fw is high
3,360,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,040,494 >>> mbox cmd response: success
18,325,815 UART:
18,326,225 UART: Running Caliptra FMC ...
18,327,327 UART:
18,327,479 UART: [state] CFI Enabled
18,390,940 UART: [fht] FMC Alias Private Key: 7
20,154,391 UART: [art] Extend RT PCRs Done
20,155,618 UART: [art] Lock RT PCRs Done
20,157,216 UART: [art] Populate DV Done
20,162,841 UART: [fht] FMC Alias Private Key: 7
20,164,542 UART: [art] Derive CDI
20,165,353 UART: [art] Store in in slot 0x4
20,223,149 UART: [art] Derive Key Pair
20,224,181 UART: [art] Store priv key in slot 0x5
22,687,073 UART: [art] Derive Key Pair - Done
22,700,311 UART: [art] Signing Cert with AUTHO
22,701,620 UART: RITY.KEYID = 7
24,412,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,252 UART: [art] PUB.X = C5F35942B01029FED4DC176CEB5D900770629AEAE735D67E6593409AE57A53DDD3DDE4B41644CE5420FEAF286D07AB0A
24,421,498 UART: [art] PUB.Y = 4DDA50C65548BB79D5B193AA903D10CBCB12645216732AC8DC47017556DBD969950C957319100D695191CF67736ACD9C
24,428,725 UART: [art] SIG.R = 06228E2EF119B831EA427772655F1BD2F14719C120032278E86034C3577E0F29464A009F7FCCD282D38D422E07D82C9E
24,436,095 UART: [art] SIG.S = 185CFA59DEE6077BB491AC0FC04A4D016F82C15E986C80243256488CD9D4AD628FFF243F8D4D83088FF4FBDDDED6CB8B
25,415,323 UART: Caliptra RT
25,416,023 UART: [state] CFI Enabled
25,580,328 UART: [rt] RT listening for mailbox commands...
25,582,216 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,612,577 UART: [rt]cmd =0x414c544e, len=20
25,614,233 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,885 writing to cptra_bootfsm_go
192,999 UART:
193,375 UART: Running Caliptra ROM ...
194,566 UART:
603,980 UART: [state] CFI Enabled
617,377 UART: [state] LifecycleState = Unprovisioned
619,261 UART: [state] DebugLocked = No
621,218 UART: [state] WD Timer not started. Device not locked for debugging
625,787 UART: [kat] SHA2-256
804,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,493 UART: [kat] ++
817,027 UART: [kat] sha1
828,057 UART: [kat] SHA2-256
831,066 UART: [kat] SHA2-384
837,554 UART: [kat] SHA2-512-ACC
840,499 UART: [kat] ECC-384
3,279,957 UART: [kat] HMAC-384Kdf
3,293,469 UART: [kat] LMS
3,822,930 UART: [kat] --
3,825,569 UART: [cold-reset] ++
3,826,574 UART: [fht] FHT @ 0x50003400
3,836,982 UART: [idev] ++
3,837,554 UART: [idev] CDI.KEYID = 6
3,838,468 UART: [idev] SUBJECT.KEYID = 7
3,839,660 UART: [idev] UDS.KEYID = 0
3,840,641 ready_for_fw is high
3,840,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,125 UART: [idev] Erasing UDS.KEYID = 0
6,311,604 UART: [idev] Sha1 KeyId Algorithm
6,335,212 UART: [idev] --
6,337,969 UART: [ldev] ++
6,338,541 UART: [ldev] CDI.KEYID = 6
6,339,508 UART: [ldev] SUBJECT.KEYID = 5
6,340,667 UART: [ldev] AUTHORITY.KEYID = 7
6,341,900 UART: [ldev] FE.KEYID = 1
6,352,548 UART: [ldev] Erasing FE.KEYID = 1
8,827,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,916 UART: [ldev] --
10,617,756 UART: [fwproc] Wait for Commands...
10,619,579 UART: [fwproc] Recv command 0x46574c44
10,621,674 UART: [fwproc] Recv'd Img size: 114084 bytes
14,015,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,474,209 >>> mbox cmd response: success
14,478,837 UART: [afmc] ++
14,479,434 UART: [afmc] CDI.KEYID = 6
14,480,349 UART: [afmc] SUBJECT.KEYID = 7
14,481,513 UART: [afmc] AUTHORITY.KEYID = 5
16,977,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,697,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,699,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,430 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,720 UART: [afmc] --
18,774,376 UART: [cold-reset] --
18,777,271 UART: [state] Locking Datavault
18,783,437 UART: [state] Locking PCR0, PCR1 and PCR31
18,785,091 UART: [state] Locking ICCM
18,787,516 UART: [exit] Launching FMC @ 0x40000130
18,795,973 UART:
18,796,210 UART: Running Caliptra FMC ...
18,797,313 UART:
18,797,466 UART: [state] CFI Enabled
18,805,676 UART: [fht] FMC Alias Private Key: 7
20,562,072 UART: [art] Extend RT PCRs Done
20,563,291 UART: [art] Lock RT PCRs Done
20,565,048 UART: [art] Populate DV Done
20,570,469 UART: [fht] FMC Alias Private Key: 7
20,572,183 UART: [art] Derive CDI
20,573,007 UART: [art] Store in in slot 0x4
20,615,669 UART: [art] Derive Key Pair
20,616,711 UART: [art] Store priv key in slot 0x5
23,043,719 UART: [art] Derive Key Pair - Done
23,056,880 UART: [art] Signing Cert with AUTHO
23,058,186 UART: RITY.KEYID = 7
24,763,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,765,493 UART: [art] PUB.X = 936EA8F7128134CE1ECAA41C50E9815B648F4D266242066E6478226E2155FC03BC7CC5A77EA2F2AF4C1CD827045804B4
24,772,770 UART: [art] PUB.Y = D044CA7587B809EA07767E6580C17666B4B930007595BC6091451A8D3F2CBE52C8CC89FBB90D1561A7A5EEEF60CA2CC1
24,780,027 UART: [art] SIG.R = 7B9EEBD8F2BC64F9C06D9172D982BA1368E5230BAB8A4CC71C0D886EADC999E079E0EAFFF998379457DDA3FE7ACE9E9A
24,787,406 UART: [art] SIG.S = DA47CB64D8952B75A5A072751A138E75B5AAC7565D1A7D8E50D9079FC45D59A1B117A87391E1F3778EBACD2D71718D63
25,766,402 UART: Caliptra RT
25,767,122 UART: [state] CFI Enabled
25,885,492 UART: [rt] RT listening for mailbox commands...
25,887,381 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,917,286 UART: [rt]cmd =0x414c544e, len=20
25,918,881 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,862 writing to cptra_bootfsm_go
3,693,212 ready_for_fw is high
3,693,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,151 >>> mbox cmd response: success
18,514,444 UART:
18,514,854 UART: Running Caliptra FMC ...
18,516,051 UART:
18,516,229 UART: [state] CFI Enabled
18,524,060 UART: [fht] FMC Alias Private Key: 7
20,280,641 UART: [art] Extend RT PCRs Done
20,281,877 UART: [art] Lock RT PCRs Done
20,283,352 UART: [art] Populate DV Done
20,288,552 UART: [fht] FMC Alias Private Key: 7
20,290,051 UART: [art] Derive CDI
20,290,818 UART: [art] Store in in slot 0x4
20,333,534 UART: [art] Derive Key Pair
20,334,578 UART: [art] Store priv key in slot 0x5
22,760,888 UART: [art] Derive Key Pair - Done
22,773,694 UART: [art] Signing Cert with AUTHO
22,775,001 UART: RITY.KEYID = 7
24,480,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,316 UART: [art] PUB.X = 1CBF0CF549CFEBE55CAB93EBB10F1E0E06F614050947E574C938A6CBE546656A9A8DF8A2969BDDB46408A6D057B38FF3
24,489,650 UART: [art] PUB.Y = 387610316BD5B4164E67473D50E7A26B3056DCB2764C0043763BE120A2C731A2B0BB6307A4CCF618DACFF7AF487221E2
24,496,882 UART: [art] SIG.R = F3AB92E7D823C7969D97381C3500DB980688039F22926E79937995EAD51A13F40F4CF4913110A0A69A5F779D3EF79275
24,504,257 UART: [art] SIG.S = B2E01F20366586CDDA55D061ED799BA19B81F7EF10D5CF47935CA9B647895AA58F963F0C98B89C3B41A6C1C48D5A46FD
25,482,830 UART: Caliptra RT
25,483,545 UART: [state] CFI Enabled
25,601,002 UART: [rt] RT listening for mailbox commands...
25,602,901 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,632,851 UART: [rt]cmd =0x414c544e, len=20
25,634,557 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,301 writing to cptra_bootfsm_go
193,420 UART:
193,819 UART: Running Caliptra ROM ...
195,018 UART:
195,176 UART: [state] CFI Enabled
263,972 UART: [state] LifecycleState = Unprovisioned
266,397 UART: [state] DebugLocked = No
268,785 UART: [state] WD Timer not started. Device not locked for debugging
273,404 UART: [kat] SHA2-256
463,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,026 UART: [kat] ++
474,496 UART: [kat] sha1
486,152 UART: [kat] SHA2-256
489,146 UART: [kat] SHA2-384
496,706 UART: [kat] SHA2-512-ACC
499,289 UART: [kat] ECC-384
2,949,960 UART: [kat] HMAC-384Kdf
2,972,714 UART: [kat] LMS
3,504,488 UART: [kat] --
3,507,278 UART: [cold-reset] ++
3,508,995 UART: [fht] FHT @ 0x50003400
3,520,609 UART: [idev] ++
3,521,311 UART: [idev] CDI.KEYID = 6
3,522,228 UART: [idev] SUBJECT.KEYID = 7
3,523,471 UART: [idev] UDS.KEYID = 0
3,524,395 ready_for_fw is high
3,524,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,060 UART: [idev] Erasing UDS.KEYID = 0
6,030,879 UART: [idev] Sha1 KeyId Algorithm
6,053,482 UART: [idev] --
6,058,184 UART: [ldev] ++
6,058,866 UART: [ldev] CDI.KEYID = 6
6,059,794 UART: [ldev] SUBJECT.KEYID = 5
6,060,951 UART: [ldev] AUTHORITY.KEYID = 7
6,062,202 UART: [ldev] FE.KEYID = 1
6,102,176 UART: [ldev] Erasing FE.KEYID = 1
8,610,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,886 UART: [ldev] --
10,415,509 UART: [fwproc] Wait for Commands...
10,417,572 UART: [fwproc] Recv command 0x46574c44
10,419,875 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,611 >>> mbox cmd response: success
14,599,700 UART: [afmc] ++
14,600,433 UART: [afmc] CDI.KEYID = 6
14,601,628 UART: [afmc] SUBJECT.KEYID = 7
14,603,071 UART: [afmc] AUTHORITY.KEYID = 5
17,130,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,779 UART: [afmc] --
18,950,535 UART: [cold-reset] --
18,955,530 UART: [state] Locking Datavault
18,961,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,858 UART: [state] Locking ICCM
18,966,297 UART: [exit] Launching FMC @ 0x40000130
18,974,936 UART:
18,975,184 UART: Running Caliptra FMC ...
18,976,279 UART:
18,976,435 UART: [state] CFI Enabled
19,031,545 UART: [fht] FMC Alias Private Key: 7
20,794,780 UART: [art] Extend RT PCRs Done
20,795,991 UART: [art] Lock RT PCRs Done
20,797,938 UART: [art] Populate DV Done
20,803,399 UART: [fht] FMC Alias Private Key: 7
20,804,919 UART: [art] Derive CDI
20,805,685 UART: [art] Store in in slot 0x4
20,862,772 UART: [art] Derive Key Pair
20,863,769 UART: [art] Store priv key in slot 0x5
23,326,318 UART: [art] Derive Key Pair - Done
23,339,374 UART: [art] Signing Cert with AUTHO
23,340,671 UART: RITY.KEYID = 7
25,052,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,638 UART: [art] PUB.X = 18AA8A39AC54D9CB65DEC804D1FB18379C0DBC56FF5A01CA1FC82DC7A76F1D497DF10DC3FE17BC08957D7662A0EDE3D9
25,060,916 UART: [art] PUB.Y = A97686DD7FB187D152A6BBA2C8926AABF2593470568370DF8F065E78B4F6722AFB290043627C2881C18AFEA8711D02DF
25,068,176 UART: [art] SIG.R = BBF4D064AD34A7EFB810E82567F55544AD11C5432C972D9D4AFCCE0764555797B363BECED5C23C525FF5AC46314B04D8
25,075,539 UART: [art] SIG.S = 5711878B3BB7364BF26945FAB22215918EB65264A07A6EF1128FD2A63274363A48D89F9FCEF820295DD5362285D20100
26,055,007 UART: Caliptra RT
26,055,709 UART: [state] CFI Enabled
26,219,077 UART: [rt] RT listening for mailbox commands...
26,220,962 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,251,571 UART: [rt]cmd =0x414c544e, len=20
26,253,177 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
3,438,038 ready_for_fw is high
3,438,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,109 >>> mbox cmd response: success
19,002,198 UART:
19,002,602 UART: Running Caliptra FMC ...
19,003,705 UART:
19,003,859 UART: [state] CFI Enabled
19,068,432 UART: [fht] FMC Alias Private Key: 7
20,832,720 UART: [art] Extend RT PCRs Done
20,833,944 UART: [art] Lock RT PCRs Done
20,835,545 UART: [art] Populate DV Done
20,840,849 UART: [fht] FMC Alias Private Key: 7
20,842,439 UART: [art] Derive CDI
20,843,170 UART: [art] Store in in slot 0x4
20,901,238 UART: [art] Derive Key Pair
20,902,279 UART: [art] Store priv key in slot 0x5
23,365,392 UART: [art] Derive Key Pair - Done
23,378,444 UART: [art] Signing Cert with AUTHO
23,379,740 UART: RITY.KEYID = 7
25,090,246 UART: [art] Erasing AUTHORITY.KEYID = 7
25,091,761 UART: [art] PUB.X = 403707F8DAB5B5A960C20C208EB51249DD33EC02764C643DDAE2BADEC323F00FE93E7B09836F452C3E9D2F5EA436FF31
25,099,052 UART: [art] PUB.Y = 49978424FDDBE4562C01F30DD4D5506967506F7F3BCAFF6E5E62909FFE6A1C085B17A06B5F11564FDD753CF00D991D57
25,106,305 UART: [art] SIG.R = 10301C5A17BC2B5C79BD9D506AAEA720BAF09325288241AFF2AC40AAB0EF868231D42F96999774D96F4E8287E668FA23
25,113,717 UART: [art] SIG.S = 542285BF1E3835B0097887FF0446A396A01F7AC67805897AFA60E81F720897B3179113DCE002D8B9C2AA166B7847BFEC
26,092,529 UART: Caliptra RT
26,093,226 UART: [state] CFI Enabled
26,258,328 UART: [rt] RT listening for mailbox commands...
26,260,245 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,290,694 UART: [rt]cmd =0x414c544e, len=20
26,292,216 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,006 writing to cptra_bootfsm_go
193,098 UART:
193,464 UART: Running Caliptra ROM ...
194,614 UART:
604,233 UART: [state] CFI Enabled
614,209 UART: [state] LifecycleState = Unprovisioned
616,615 UART: [state] DebugLocked = No
618,998 UART: [state] WD Timer not started. Device not locked for debugging
624,108 UART: [kat] SHA2-256
814,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,734 UART: [kat] ++
825,279 UART: [kat] sha1
836,809 UART: [kat] SHA2-256
839,867 UART: [kat] SHA2-384
845,296 UART: [kat] SHA2-512-ACC
847,881 UART: [kat] ECC-384
3,287,669 UART: [kat] HMAC-384Kdf
3,299,990 UART: [kat] LMS
3,831,863 UART: [kat] --
3,835,813 UART: [cold-reset] ++
3,837,817 UART: [fht] FHT @ 0x50003400
3,848,154 UART: [idev] ++
3,848,875 UART: [idev] CDI.KEYID = 6
3,849,761 UART: [idev] SUBJECT.KEYID = 7
3,851,003 UART: [idev] UDS.KEYID = 0
3,851,911 ready_for_fw is high
3,852,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,995,470 UART: [idev] Erasing UDS.KEYID = 0
6,325,840 UART: [idev] Sha1 KeyId Algorithm
6,348,178 UART: [idev] --
6,352,222 UART: [ldev] ++
6,352,920 UART: [ldev] CDI.KEYID = 6
6,353,856 UART: [ldev] SUBJECT.KEYID = 5
6,355,013 UART: [ldev] AUTHORITY.KEYID = 7
6,356,463 UART: [ldev] FE.KEYID = 1
6,367,877 UART: [ldev] Erasing FE.KEYID = 1
8,844,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,114 UART: [ldev] --
10,634,492 UART: [fwproc] Wait for Commands...
10,635,987 UART: [fwproc] Recv command 0x46574c44
10,638,248 UART: [fwproc] Recv'd Img size: 114084 bytes
14,090,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,824,074 >>> mbox cmd response: success
14,828,748 UART: [afmc] ++
14,829,461 UART: [afmc] CDI.KEYID = 6
14,830,652 UART: [afmc] SUBJECT.KEYID = 7
14,832,095 UART: [afmc] AUTHORITY.KEYID = 5
17,333,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,070,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,085,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,100,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,835 UART: [afmc] --
19,127,279 UART: [cold-reset] --
19,132,823 UART: [state] Locking Datavault
19,141,324 UART: [state] Locking PCR0, PCR1 and PCR31
19,143,478 UART: [state] Locking ICCM
19,145,744 UART: [exit] Launching FMC @ 0x40000130
19,154,429 UART:
19,154,664 UART: Running Caliptra FMC ...
19,155,767 UART:
19,155,929 UART: [state] CFI Enabled
19,164,031 UART: [fht] FMC Alias Private Key: 7
20,920,883 UART: [art] Extend RT PCRs Done
20,922,101 UART: [art] Lock RT PCRs Done
20,923,754 UART: [art] Populate DV Done
20,929,169 UART: [fht] FMC Alias Private Key: 7
20,930,876 UART: [art] Derive CDI
20,931,688 UART: [art] Store in in slot 0x4
20,974,009 UART: [art] Derive Key Pair
20,975,013 UART: [art] Store priv key in slot 0x5
23,401,783 UART: [art] Derive Key Pair - Done
23,415,002 UART: [art] Signing Cert with AUTHO
23,416,310 UART: RITY.KEYID = 7
25,121,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,730 UART: [art] PUB.X = F0D74DDA08C4AE7F4DB6F777F279678B7D8328DF7348D0FD5B30970809F175E387067B20672BDDE54D6A8158D0932F83
25,129,999 UART: [art] PUB.Y = C4CC006C0948B93232E9E26E321B46541A2C86D8BCD0C110574028F852DA5D149D71303F290C6964FEA6F11225B4001E
25,137,204 UART: [art] SIG.R = CDB75022EF2BCD569A30C31EFB86512CF676DEABA72D3D74324EFA656090195F8CC898E7277E04F6532663C8F6DC59D0
25,144,634 UART: [art] SIG.S = C6BDE0A0F3045EA34060B271029C214489E443C5DDF0A0C4276B5A8B3EA9B21E1C599DABC5D39A09F0A61285D2E4CA64
26,123,465 UART: Caliptra RT
26,124,150 UART: [state] CFI Enabled
26,241,364 UART: [rt] RT listening for mailbox commands...
26,243,241 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,273,033 UART: [rt]cmd =0x414c544e, len=20
26,274,848 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,604 writing to cptra_bootfsm_go
3,752,999 ready_for_fw is high
3,753,417 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,963,416 >>> mbox cmd response: success
19,216,575 UART:
19,217,473 UART: Running Caliptra FMC ...
19,218,607 UART:
19,218,771 UART: [state] CFI Enabled
19,226,444 UART: [fht] FMC Alias Private Key: 7
20,983,828 UART: [art] Extend RT PCRs Done
20,985,095 UART: [art] Lock RT PCRs Done
20,986,862 UART: [art] Populate DV Done
20,992,400 UART: [fht] FMC Alias Private Key: 7
20,994,006 UART: [art] Derive CDI
20,994,834 UART: [art] Store in in slot 0x4
21,036,965 UART: [art] Derive Key Pair
21,037,975 UART: [art] Store priv key in slot 0x5
23,465,135 UART: [art] Derive Key Pair - Done
23,478,192 UART: [art] Signing Cert with AUTHO
23,479,509 UART: RITY.KEYID = 7
25,185,110 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,623 UART: [art] PUB.X = A027077360CE16B8FF62EB07D92CD7788F9E13E7CAB1B0121B2B8FCAF35A2159DEA97390D10F6B59924CE4DF62D191A5
25,193,877 UART: [art] PUB.Y = 8A8011758E67189218F1B8F5130016958DC2BAFDF78C43DBD232EA5455C6E1C02A5066F8F244C4F8BE595AAFC14CFBB4
25,201,166 UART: [art] SIG.R = C49857CFAA1FD2742AB41C46E50D4722B6C843E61F0B975ABE70CB68387DAC8EC4905AEE9BE30FF729501B2D6A1C2275
25,208,561 UART: [art] SIG.S = B761C278D01D0B41FE6405010CAC78B67AA2C00875422662F3B4F46EB6AA1D9E4010651561B5251177A77E4A22028279
26,187,480 UART: Caliptra RT
26,188,207 UART: [state] CFI Enabled
26,305,403 UART: [rt] RT listening for mailbox commands...
26,307,293 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,337,370 UART: [rt]cmd =0x414c544e, len=20
26,339,239 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
889,919 UART: [kat] SHA2-256
891,857 UART: [kat] SHA2-384
894,694 UART: [kat] SHA2-512-ACC
896,595 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,475,781 UART: [cold-reset] ++
1,476,203 UART: [fht] Storing FHT @ 0x50003400
1,478,880 UART: [idev] ++
1,479,048 UART: [idev] CDI.KEYID = 6
1,479,408 UART: [idev] SUBJECT.KEYID = 7
1,479,832 UART: [idev] UDS.KEYID = 0
1,480,177 ready_for_fw is high
1,480,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,922 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,553 UART: [ldev] ++
1,514,721 UART: [ldev] CDI.KEYID = 6
1,515,084 UART: [ldev] SUBJECT.KEYID = 5
1,515,510 UART: [ldev] AUTHORITY.KEYID = 7
1,515,973 UART: [ldev] FE.KEYID = 1
1,521,067 UART: [ldev] Erasing FE.KEYID = 1
1,547,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,360 UART: [ldev] --
1,586,853 UART: [fwproc] Waiting for Commands...
1,587,720 UART: [fwproc] Received command 0x46574c44
1,588,511 UART: [fwproc] Received Image of size 114084 bytes
2,883,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,220 >>> mbox cmd response: success
3,076,424 UART: [afmc] ++
3,076,592 UART: [afmc] CDI.KEYID = 6
3,076,954 UART: [afmc] SUBJECT.KEYID = 7
3,077,379 UART: [afmc] AUTHORITY.KEYID = 5
3,112,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,790 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,403 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,093 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,840 UART: [afmc] --
3,155,782 UART: [cold-reset] --
3,156,910 UART: [state] Locking Datavault
3,158,081 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,685 UART: [state] Locking ICCM
3,159,241 UART: [exit] Launching FMC @ 0x40000130
3,164,570 UART:
3,164,586 UART: Running Caliptra FMC ...
3,164,994 UART:
3,165,048 UART: [state] CFI Enabled
3,175,815 UART: [fht] FMC Alias Private Key: 7
3,283,470 UART: [art] Extend RT PCRs Done
3,283,898 UART: [art] Lock RT PCRs Done
3,285,570 UART: [art] Populate DV Done
3,293,889 UART: [fht] FMC Alias Private Key: 7
3,295,027 UART: [art] Derive CDI
3,295,307 UART: [art] Store in in slot 0x4
3,381,218 UART: [art] Derive Key Pair
3,381,578 UART: [art] Store priv key in slot 0x5
3,394,256 UART: [art] Derive Key Pair - Done
3,409,117 UART: [art] Signing Cert with AUTHO
3,409,597 UART: RITY.KEYID = 7
3,424,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,118 UART: [art] PUB.X = 4B648DB6BCA8BCE930519F393AD2DBAE8467C13BA2A43CE74B57628D02AB05460EFC3F6673E0CE6592A4A1823259A566
3,431,889 UART: [art] PUB.Y = 01F8477F37CF87F29075B22A337CFF98D1461C44939A85F2BADA2DCB6BC3E34934485B1D3CB1FAB965B57C0FF04BA4E4
3,438,847 UART: [art] SIG.R = C32B58F937BF1B952BD12B581FDABC2283BF8B76FFC423894C5B59C9C7491D868D9A26DEF8D49782A3DD6672F733FED3
3,445,631 UART: [art] SIG.S = 80795A96FD726DD4ED766CB1B5F1C911FC6EC48D7B2B2CB34B0647E423C08322A04F8E80BD0DA6EE215C9C52F2FDE909
3,469,183 UART: Caliptra RT
3,469,436 UART: [state] CFI Enabled
3,577,190 UART: [rt] RT listening for mailbox commands...
3,577,860 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,860 UART: [rt]cmd =0x414c544e, len=20
3,609,138 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,935 ready_for_fw is high
1,361,935 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,608 >>> mbox cmd response: success
2,985,086 UART:
2,985,102 UART: Running Caliptra FMC ...
2,985,510 UART:
2,985,564 UART: [state] CFI Enabled
2,996,361 UART: [fht] FMC Alias Private Key: 7
3,104,302 UART: [art] Extend RT PCRs Done
3,104,730 UART: [art] Lock RT PCRs Done
3,106,194 UART: [art] Populate DV Done
3,114,221 UART: [fht] FMC Alias Private Key: 7
3,115,403 UART: [art] Derive CDI
3,115,683 UART: [art] Store in in slot 0x4
3,201,452 UART: [art] Derive Key Pair
3,201,812 UART: [art] Store priv key in slot 0x5
3,214,576 UART: [art] Derive Key Pair - Done
3,229,441 UART: [art] Signing Cert with AUTHO
3,229,921 UART: RITY.KEYID = 7
3,244,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,732 UART: [art] PUB.X = B9DFEC89B94FBADDCC818577A6958437963386EF8A68175143BE02EF2F4249C7157DDA330556DCEC15A3772219D52F10
3,252,500 UART: [art] PUB.Y = 8650A63F97049AB40A14DFDBE53FBC0D0CEF28EE31FFDA5D2F5871B5D2B8853E6469C85AD6ACA16811CBF9B4A68F4766
3,259,458 UART: [art] SIG.R = D741C168C9C1F813BAC62EE0D3D9325BBDC3749101A59C78D13DFC2020D7D980C378EDAFED6B34692BCCB308EEB1FC73
3,266,242 UART: [art] SIG.S = 53C6476C6CDAC5C3A5819BF74E443AF79EA5FAD67C417EFCDD335DB1A970A71DAB111707BB43FEB5CBDB8731FA446FE7
3,289,590 UART: Caliptra RT
3,289,843 UART: [state] CFI Enabled
3,398,310 UART: [rt] RT listening for mailbox commands...
3,398,980 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,822 UART: [rt]cmd =0x414c544e, len=20
3,430,296 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,772 UART: [kat] SHA2-256
882,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,818 UART: [kat] ++
886,970 UART: [kat] sha1
891,416 UART: [kat] SHA2-256
893,354 UART: [kat] SHA2-384
895,965 UART: [kat] SHA2-512-ACC
897,866 UART: [kat] ECC-384
903,693 UART: [kat] HMAC-384Kdf
908,317 UART: [kat] LMS
1,476,513 UART: [kat] --
1,477,476 UART: [cold-reset] ++
1,477,814 UART: [fht] Storing FHT @ 0x50003400
1,480,631 UART: [idev] ++
1,480,799 UART: [idev] CDI.KEYID = 6
1,481,159 UART: [idev] SUBJECT.KEYID = 7
1,481,583 UART: [idev] UDS.KEYID = 0
1,481,928 ready_for_fw is high
1,481,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,423 UART: [idev] Erasing UDS.KEYID = 0
1,505,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,267 UART: [idev] --
1,515,452 UART: [ldev] ++
1,515,620 UART: [ldev] CDI.KEYID = 6
1,515,983 UART: [ldev] SUBJECT.KEYID = 5
1,516,409 UART: [ldev] AUTHORITY.KEYID = 7
1,516,872 UART: [ldev] FE.KEYID = 1
1,522,194 UART: [ldev] Erasing FE.KEYID = 1
1,547,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,133 UART: [ldev] --
1,586,556 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 114084 bytes
2,882,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,641 >>> mbox cmd response: success
3,075,867 UART: [afmc] ++
3,076,035 UART: [afmc] CDI.KEYID = 6
3,076,397 UART: [afmc] SUBJECT.KEYID = 7
3,076,822 UART: [afmc] AUTHORITY.KEYID = 5
3,111,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,494 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,184 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,285 UART: [afmc] --
3,155,269 UART: [cold-reset] --
3,155,825 UART: [state] Locking Datavault
3,157,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,630 UART: [state] Locking ICCM
3,158,182 UART: [exit] Launching FMC @ 0x40000130
3,163,511 UART:
3,163,527 UART: Running Caliptra FMC ...
3,163,935 UART:
3,164,078 UART: [state] CFI Enabled
3,174,693 UART: [fht] FMC Alias Private Key: 7
3,282,878 UART: [art] Extend RT PCRs Done
3,283,306 UART: [art] Lock RT PCRs Done
3,284,942 UART: [art] Populate DV Done
3,293,031 UART: [fht] FMC Alias Private Key: 7
3,294,069 UART: [art] Derive CDI
3,294,349 UART: [art] Store in in slot 0x4
3,379,982 UART: [art] Derive Key Pair
3,380,342 UART: [art] Store priv key in slot 0x5
3,393,580 UART: [art] Derive Key Pair - Done
3,408,476 UART: [art] Signing Cert with AUTHO
3,408,956 UART: RITY.KEYID = 7
3,424,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,791 UART: [art] PUB.X = 4AC9994AFCE13395248FC958C9A0C16D4D6B6586BC38C9B4778740F2AAE71B4F1B3DAD41D19C4319A90C8DECB2907C13
3,431,570 UART: [art] PUB.Y = 88949303BA1A429779D10EC41D6D4843D57A01BBC122F676D76CD5CFBC9C46E0A249446B4798C7C2AADA6FA22718E608
3,438,514 UART: [art] SIG.R = 47CD9A85287A0AE6323F4419CAE1F3E88F39C14689C7648E3F84E74968BF0C1E92785069ED2213456D6C6B4EB8AA0FE7
3,445,279 UART: [art] SIG.S = 72F1A92CFE7B19BDD1EB19FCEAD116BDBC9A7F73D2EFB3DD9095E311517A692D195532838682707BD5D405A3BE65543A
3,468,533 UART: Caliptra RT
3,468,878 UART: [state] CFI Enabled
3,575,892 UART: [rt] RT listening for mailbox commands...
3,576,562 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,208 UART: [rt]cmd =0x414c544e, len=20
3,607,416 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,086 ready_for_fw is high
1,363,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,981 >>> mbox cmd response: success
2,989,661 UART:
2,989,677 UART: Running Caliptra FMC ...
2,990,085 UART:
2,990,228 UART: [state] CFI Enabled
3,001,241 UART: [fht] FMC Alias Private Key: 7
3,109,852 UART: [art] Extend RT PCRs Done
3,110,280 UART: [art] Lock RT PCRs Done
3,111,798 UART: [art] Populate DV Done
3,120,195 UART: [fht] FMC Alias Private Key: 7
3,121,295 UART: [art] Derive CDI
3,121,575 UART: [art] Store in in slot 0x4
3,207,550 UART: [art] Derive Key Pair
3,207,910 UART: [art] Store priv key in slot 0x5
3,221,088 UART: [art] Derive Key Pair - Done
3,235,807 UART: [art] Signing Cert with AUTHO
3,236,287 UART: RITY.KEYID = 7
3,251,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,436 UART: [art] PUB.X = 8F13A95CC247BDF72939C39497B14CFDB933D9746AA6BE19C514B6E5F0409AD0D924FCA0B5C96490EDD4759C2E4C6C74
3,259,218 UART: [art] PUB.Y = C90DBA2583528A0FE47ED48060597EA0A97591DD643CA9836EFB5E8A3BD949645E50881E8729A5D6327220E3F6BC5303
3,266,159 UART: [art] SIG.R = F8DE3FD91ABD73F1AE9ABA1D52F8038D93261D7827603FE53AA161CE6A58FD78B34ED6A1DE79037CAC4C103857801426
3,272,935 UART: [art] SIG.S = 6AFFA3AFA63AEB21B98D17C1B40BBE1F1CA13310961E8EB37FA6829250926B40FB09481E4F70EDCBAC78C7D8BCD0E98C
3,296,812 UART: Caliptra RT
3,297,157 UART: [state] CFI Enabled
3,404,994 UART: [rt] RT listening for mailbox commands...
3,405,664 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,336 UART: [rt]cmd =0x414c544e, len=20
3,436,438 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,204 UART: [kat] SHA2-512-ACC
908,105 UART: [kat] ECC-384
917,684 UART: [kat] HMAC-384Kdf
922,198 UART: [kat] LMS
1,170,526 UART: [kat] --
1,171,415 UART: [cold-reset] ++
1,171,919 UART: [fht] FHT @ 0x50003400
1,174,524 UART: [idev] ++
1,174,692 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,476 UART: [idev] UDS.KEYID = 0
1,175,821 ready_for_fw is high
1,175,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,643 UART: [idev] Sha1 KeyId Algorithm
1,209,147 UART: [idev] --
1,210,431 UART: [ldev] ++
1,210,599 UART: [ldev] CDI.KEYID = 6
1,210,962 UART: [ldev] SUBJECT.KEYID = 5
1,211,388 UART: [ldev] AUTHORITY.KEYID = 7
1,211,851 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,890 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,261 >>> mbox cmd response: success
2,772,423 UART: [afmc] ++
2,772,591 UART: [afmc] CDI.KEYID = 6
2,772,953 UART: [afmc] SUBJECT.KEYID = 7
2,773,378 UART: [afmc] AUTHORITY.KEYID = 5
2,808,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,126 UART: [afmc] --
2,852,118 UART: [cold-reset] --
2,853,048 UART: [state] Locking Datavault
2,854,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,121 UART: [state] Locking ICCM
2,855,757 UART: [exit] Launching FMC @ 0x40000130
2,861,086 UART:
2,861,102 UART: Running Caliptra FMC ...
2,861,510 UART:
2,861,564 UART: [state] CFI Enabled
2,872,477 UART: [fht] FMC Alias Private Key: 7
2,981,094 UART: [art] Extend RT PCRs Done
2,981,522 UART: [art] Lock RT PCRs Done
2,982,886 UART: [art] Populate DV Done
2,990,961 UART: [fht] FMC Alias Private Key: 7
2,992,127 UART: [art] Derive CDI
2,992,407 UART: [art] Store in in slot 0x4
3,078,300 UART: [art] Derive Key Pair
3,078,660 UART: [art] Store priv key in slot 0x5
3,091,764 UART: [art] Derive Key Pair - Done
3,106,693 UART: [art] Signing Cert with AUTHO
3,107,173 UART: RITY.KEYID = 7
3,122,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,928 UART: [art] PUB.X = DC91C8989816E6D1778B20A43D9AD286DDE5CC02C1E5D90F4077A893D62A116B15A8A8723704AB3A2774C4A2D3BB3ABD
3,129,699 UART: [art] PUB.Y = 661FCC1A15FA70906F43037795BCDB54256D7973A0BFE97DC48CFFD0B333966AFF6F5CB0A575F4F9E3B309960029C013
3,136,629 UART: [art] SIG.R = 98F7154E23B257E2213E0995325DB2B684340881EED3EE8654392FEF669A85D6EE24125DAD3763A9C7EF10CEE8FF6687
3,143,395 UART: [art] SIG.S = 77FA2A6B8306BD07FA4241A0DEFDAA73EB2EA7168E604AD11577D27BDCC81810CC18172CABB276AC5CEDD0F00FE4D52D
3,167,063 UART: Caliptra RT
3,167,316 UART: [state] CFI Enabled
3,274,317 UART: [rt] RT listening for mailbox commands...
3,274,987 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,895 UART: [rt]cmd =0x414c544e, len=20
3,306,093 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 ready_for_fw is high
1,060,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,866 >>> mbox cmd response: success
2,686,310 UART:
2,686,326 UART: Running Caliptra FMC ...
2,686,734 UART:
2,686,788 UART: [state] CFI Enabled
2,697,433 UART: [fht] FMC Alias Private Key: 7
2,805,024 UART: [art] Extend RT PCRs Done
2,805,452 UART: [art] Lock RT PCRs Done
2,807,034 UART: [art] Populate DV Done
2,815,313 UART: [fht] FMC Alias Private Key: 7
2,816,407 UART: [art] Derive CDI
2,816,687 UART: [art] Store in in slot 0x4
2,902,560 UART: [art] Derive Key Pair
2,902,920 UART: [art] Store priv key in slot 0x5
2,916,092 UART: [art] Derive Key Pair - Done
2,930,988 UART: [art] Signing Cert with AUTHO
2,931,468 UART: RITY.KEYID = 7
2,946,704 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,469 UART: [art] PUB.X = 1C5D38D184E886A7656B39FE09F271F45C5B8AC699CE97D466A9DCA732072FCE9E21F15A427353D2A052B87928950800
2,954,206 UART: [art] PUB.Y = F1219C284E97D60C5DD85BEF2136A323E28B616B86E1F44B6013E36B1CFFDAF318E06EBECA73C0BA18774413282CDD54
2,961,165 UART: [art] SIG.R = B8DC0DD7E40114B15CC46C1C5136E134E60D628BD9162E17D9F9E305A464FF7AE8C689B2744D56243232B7B583BFB3C5
2,967,929 UART: [art] SIG.S = 3E7EBA15D72BAAD0CD82B63DC390679A76B605037AC146EE7FDBE2529DBF2E9CF63A4CCB2EC7760B1129A927B461F27D
2,991,471 UART: Caliptra RT
2,991,724 UART: [state] CFI Enabled
3,099,933 UART: [rt] RT listening for mailbox commands...
3,100,603 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,711 UART: [rt]cmd =0x414c544e, len=20
3,132,129 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
907,009 UART: [kat] SHA2-512-ACC
908,910 UART: [kat] ECC-384
918,457 UART: [kat] HMAC-384Kdf
923,229 UART: [kat] LMS
1,171,557 UART: [kat] --
1,172,598 UART: [cold-reset] ++
1,173,168 UART: [fht] FHT @ 0x50003400
1,176,013 UART: [idev] ++
1,176,181 UART: [idev] CDI.KEYID = 6
1,176,541 UART: [idev] SUBJECT.KEYID = 7
1,176,965 UART: [idev] UDS.KEYID = 0
1,177,310 ready_for_fw is high
1,177,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,825 UART: [idev] Erasing UDS.KEYID = 0
1,201,998 UART: [idev] Sha1 KeyId Algorithm
1,210,628 UART: [idev] --
1,211,718 UART: [ldev] ++
1,211,886 UART: [ldev] CDI.KEYID = 6
1,212,249 UART: [ldev] SUBJECT.KEYID = 5
1,212,675 UART: [ldev] AUTHORITY.KEYID = 7
1,213,138 UART: [ldev] FE.KEYID = 1
1,218,550 UART: [ldev] Erasing FE.KEYID = 1
1,245,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,710 UART: [ldev] --
1,285,151 UART: [fwproc] Wait for Commands...
1,285,793 UART: [fwproc] Recv command 0x46574c44
1,286,521 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,774,074 >>> mbox cmd response: success
2,775,282 UART: [afmc] ++
2,775,450 UART: [afmc] CDI.KEYID = 6
2,775,812 UART: [afmc] SUBJECT.KEYID = 7
2,776,237 UART: [afmc] AUTHORITY.KEYID = 5
2,811,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,073 UART: [afmc] --
2,854,103 UART: [cold-reset] --
2,854,941 UART: [state] Locking Datavault
2,856,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,718 UART: [state] Locking ICCM
2,857,250 UART: [exit] Launching FMC @ 0x40000130
2,862,579 UART:
2,862,595 UART: Running Caliptra FMC ...
2,863,003 UART:
2,863,146 UART: [state] CFI Enabled
2,873,725 UART: [fht] FMC Alias Private Key: 7
2,981,388 UART: [art] Extend RT PCRs Done
2,981,816 UART: [art] Lock RT PCRs Done
2,983,218 UART: [art] Populate DV Done
2,991,419 UART: [fht] FMC Alias Private Key: 7
2,992,511 UART: [art] Derive CDI
2,992,791 UART: [art] Store in in slot 0x4
3,078,590 UART: [art] Derive Key Pair
3,078,950 UART: [art] Store priv key in slot 0x5
3,092,284 UART: [art] Derive Key Pair - Done
3,107,279 UART: [art] Signing Cert with AUTHO
3,107,759 UART: RITY.KEYID = 7
3,122,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,762 UART: [art] PUB.X = C1213C958DFDD133E9D5C49335A719B541842EC880AB388661C72762ED90DFF97BA017D8F3282E2007FB48C4E59BBC99
3,130,533 UART: [art] PUB.Y = E863B1A7922A2106EC2A0ABF7B91D7DED54B080D2E83FF45433981FF3EA14B9209BC0AFED53D3D101D302431716F69C3
3,137,475 UART: [art] SIG.R = B2BA0D3C691DFE263CE72CE6D280FA819F5CE47928AB369077EA7D5C927A13960B35E7EFDB18107FFB050E8C9E135ADE
3,144,251 UART: [art] SIG.S = 78FE27285A1EEB381A83E22A36B0D4D98A61555553B4B96F91FE9A26B279F9E8888E181DB918BC6D2DE98DCE1EC3D7E7
3,167,986 UART: Caliptra RT
3,168,331 UART: [state] CFI Enabled
3,277,016 UART: [rt] RT listening for mailbox commands...
3,277,686 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,444 UART: [rt]cmd =0x414c544e, len=20
3,308,786 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 ready_for_fw is high
1,060,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,975 >>> mbox cmd response: success
2,685,587 UART:
2,685,603 UART: Running Caliptra FMC ...
2,686,011 UART:
2,686,154 UART: [state] CFI Enabled
2,696,747 UART: [fht] FMC Alias Private Key: 7
2,804,894 UART: [art] Extend RT PCRs Done
2,805,322 UART: [art] Lock RT PCRs Done
2,806,476 UART: [art] Populate DV Done
2,814,557 UART: [fht] FMC Alias Private Key: 7
2,815,535 UART: [art] Derive CDI
2,815,815 UART: [art] Store in in slot 0x4
2,901,212 UART: [art] Derive Key Pair
2,901,572 UART: [art] Store priv key in slot 0x5
2,914,998 UART: [art] Derive Key Pair - Done
2,929,716 UART: [art] Signing Cert with AUTHO
2,930,196 UART: RITY.KEYID = 7
2,945,100 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,865 UART: [art] PUB.X = 0338EC6B8F2298E4A5EA349E3FC9EB7F7434D164347755A76B0951D17B11ECCD5D016862E0D32052F9706AEFCF3B1B26
2,952,632 UART: [art] PUB.Y = E9B2130982EB60DA50B466A98D5EF98C59898BEFF7D989DB3D725E7E5F0D5AB2C485602FCB9FAB32931C49E24C3A05C2
2,959,587 UART: [art] SIG.R = 354C2C132CC4139EB1BC2C68CEDA0BDAAF443739F3DFE80DA0BC2B7AD62F1536B6FEAA8EF05E6F8AD35B2C319DF08883
2,966,379 UART: [art] SIG.S = 7E55589452009874D509EF74754D58506BB0BBB4B28525003B64A926509EADF75477875079EDEF8E4D2C2517FD6FA2C3
2,990,099 UART: Caliptra RT
2,990,444 UART: [state] CFI Enabled
3,098,311 UART: [rt] RT listening for mailbox commands...
3,098,981 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,099 UART: [rt]cmd =0x414c544e, len=20
3,130,233 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,174,203 ready_for_fw is high
1,174,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,200,005 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,210,100 UART: [ldev] ++
1,210,268 UART: [ldev] CDI.KEYID = 6
1,210,632 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,522 UART: [ldev] Erasing FE.KEYID = 1
1,243,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,282 UART: [ldev] --
1,282,694 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,975 >>> mbox cmd response: success
2,771,080 UART: [afmc] ++
2,771,248 UART: [afmc] CDI.KEYID = 6
2,771,611 UART: [afmc] SUBJECT.KEYID = 7
2,772,037 UART: [afmc] AUTHORITY.KEYID = 5
2,807,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,185 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,667 UART: [afmc] --
2,850,625 UART: [cold-reset] --
2,851,487 UART: [state] Locking Datavault
2,852,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,540 UART: [state] Locking ICCM
2,854,046 UART: [exit] Launching FMC @ 0x40000130
2,859,375 UART:
2,859,391 UART: Running Caliptra FMC ...
2,859,799 UART:
2,859,853 UART: [state] CFI Enabled
2,870,082 UART: [fht] FMC Alias Private Key: 7
2,977,779 UART: [art] Extend RT PCRs Done
2,978,207 UART: [art] Lock RT PCRs Done
2,979,679 UART: [art] Populate DV Done
2,987,872 UART: [fht] FMC Alias Private Key: 7
2,988,808 UART: [art] Derive CDI
2,989,088 UART: [art] Store in in slot 0x4
3,074,755 UART: [art] Derive Key Pair
3,075,115 UART: [art] Store priv key in slot 0x5
3,088,819 UART: [art] Derive Key Pair - Done
3,103,521 UART: [art] Signing Cert with AUTHO
3,104,001 UART: RITY.KEYID = 7
3,118,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,582 UART: [art] PUB.X = 83A9510ECDD7B71156A8F8147D6993E585C9922291887B7CE700E09605FAC3CC55360206410AF0A63C2F7D33ECED2CA2
3,126,317 UART: [art] PUB.Y = 66BC36FAFC67DB97BE70E6059AEDBF59275DEB734F5CE49AE9170D59272FC121470B6C7E220363EC5C6BD377024E3736
3,133,262 UART: [art] SIG.R = B912E4926A6BA1935B024CC37A937E3A7D59A11811A05D1046B4EAE6CF4352A0DF9F3824DB7900B93A787C73E2B0D0B9
3,140,013 UART: [art] SIG.S = BA51599F17CA4D8CA5E11C1C4EB094453B1E8A8ED68B541A976BDF00B823E3E2E46C9B47379DD5306A25BEF8A83BBC6A
3,163,436 UART: Caliptra RT
3,163,689 UART: [state] CFI Enabled
3,271,521 UART: [rt] RT listening for mailbox commands...
3,272,191 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,971 UART: [rt]cmd =0x414c544e, len=20
3,303,149 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,500 ready_for_fw is high
1,056,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,565 >>> mbox cmd response: success
2,679,383 UART:
2,679,399 UART: Running Caliptra FMC ...
2,679,807 UART:
2,679,861 UART: [state] CFI Enabled
2,690,242 UART: [fht] FMC Alias Private Key: 7
2,797,933 UART: [art] Extend RT PCRs Done
2,798,361 UART: [art] Lock RT PCRs Done
2,799,779 UART: [art] Populate DV Done
2,807,872 UART: [fht] FMC Alias Private Key: 7
2,808,954 UART: [art] Derive CDI
2,809,234 UART: [art] Store in in slot 0x4
2,894,469 UART: [art] Derive Key Pair
2,894,829 UART: [art] Store priv key in slot 0x5
2,907,301 UART: [art] Derive Key Pair - Done
2,922,011 UART: [art] Signing Cert with AUTHO
2,922,491 UART: RITY.KEYID = 7
2,937,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,184 UART: [art] PUB.X = 77AC093DDA447159B3FC5F33D6613CE022DC8BB64C4068499CD806A79B2F3E4500F03DFC1411593D6CC520822323EF5D
2,944,930 UART: [art] PUB.Y = 7360DB5D6212EBF70AE079E487BA9F3A0FF76C8082EE3667353E34E9E7FEEE7D57DECA9D2935C7F6C315A415179C1183
2,951,884 UART: [art] SIG.R = 989DB89907DC581AC428C8E986BDB22BD2E4F41F5347D606F5D7F952B05453A4CE1B345E0C8D3F24C17EA2AF13194953
2,958,651 UART: [art] SIG.S = 58BA5653C0B6F49AAB0BAD0F2692814FA3F0AD83C1DEE7EBB0D4D53E849D93973F973BDAF2EA8FF6ACA77471621DD77A
2,982,630 UART: Caliptra RT
2,982,883 UART: [state] CFI Enabled
3,090,736 UART: [rt] RT listening for mailbox commands...
3,091,406 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,121,092 UART: [rt]cmd =0x414c544e, len=20
3,122,402 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,913 UART: [kat] HMAC-384Kdf
921,619 UART: [kat] LMS
1,169,931 UART: [kat] --
1,171,056 UART: [cold-reset] ++
1,171,500 UART: [fht] FHT @ 0x50003400
1,174,092 UART: [idev] ++
1,174,260 UART: [idev] CDI.KEYID = 6
1,174,621 UART: [idev] SUBJECT.KEYID = 7
1,175,046 UART: [idev] UDS.KEYID = 0
1,175,392 ready_for_fw is high
1,175,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,200,654 UART: [idev] Sha1 KeyId Algorithm
1,209,528 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,169 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,071 UART: [ldev] Erasing FE.KEYID = 1
1,243,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,415 UART: [ldev] --
1,282,813 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,179 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,126 >>> mbox cmd response: success
2,771,301 UART: [afmc] ++
2,771,469 UART: [afmc] CDI.KEYID = 6
2,771,832 UART: [afmc] SUBJECT.KEYID = 7
2,772,258 UART: [afmc] AUTHORITY.KEYID = 5
2,808,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,883 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,254 UART: [afmc] --
2,851,188 UART: [cold-reset] --
2,851,932 UART: [state] Locking Datavault
2,853,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,951 UART: [state] Locking ICCM
2,854,413 UART: [exit] Launching FMC @ 0x40000130
2,859,742 UART:
2,859,758 UART: Running Caliptra FMC ...
2,860,166 UART:
2,860,309 UART: [state] CFI Enabled
2,870,880 UART: [fht] FMC Alias Private Key: 7
2,978,673 UART: [art] Extend RT PCRs Done
2,979,101 UART: [art] Lock RT PCRs Done
2,981,011 UART: [art] Populate DV Done
2,989,218 UART: [fht] FMC Alias Private Key: 7
2,990,324 UART: [art] Derive CDI
2,990,604 UART: [art] Store in in slot 0x4
3,076,391 UART: [art] Derive Key Pair
3,076,751 UART: [art] Store priv key in slot 0x5
3,090,031 UART: [art] Derive Key Pair - Done
3,104,814 UART: [art] Signing Cert with AUTHO
3,105,294 UART: RITY.KEYID = 7
3,120,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,205 UART: [art] PUB.X = 1AA857019BC43C9CB552F20D3AF353D8247E0DB88522AEE03D6BD10E1BEDEE5C6B99089052DE6324ACAAAC21787AF2A7
3,127,978 UART: [art] PUB.Y = D9BA7D40218BFACCF12C745FC40192B848332302486BCDD42444BA2BBED53C5FBDE995F0F5B352F984CA189CA3F51372
3,134,936 UART: [art] SIG.R = 05E4BF52BABC0A04B368E6598E19EFC2E92C12173057A353CE9AC271BE7401BD19277F27369412B1B878410D64489A61
3,141,689 UART: [art] SIG.S = 45394AAFDD6B115B431CDC811B5C2737E282A3C108B93DD981C637DD8C9675F5B2A49AD586418F356509A3693E34A251
3,165,408 UART: Caliptra RT
3,165,753 UART: [state] CFI Enabled
3,274,176 UART: [rt] RT listening for mailbox commands...
3,274,846 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,690 UART: [rt]cmd =0x414c544e, len=20
3,306,000 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 ready_for_fw is high
1,056,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,778 >>> mbox cmd response: success
2,682,870 UART:
2,682,886 UART: Running Caliptra FMC ...
2,683,294 UART:
2,683,437 UART: [state] CFI Enabled
2,694,562 UART: [fht] FMC Alias Private Key: 7
2,802,401 UART: [art] Extend RT PCRs Done
2,802,829 UART: [art] Lock RT PCRs Done
2,804,703 UART: [art] Populate DV Done
2,812,998 UART: [fht] FMC Alias Private Key: 7
2,814,176 UART: [art] Derive CDI
2,814,456 UART: [art] Store in in slot 0x4
2,899,861 UART: [art] Derive Key Pair
2,900,221 UART: [art] Store priv key in slot 0x5
2,913,783 UART: [art] Derive Key Pair - Done
2,928,755 UART: [art] Signing Cert with AUTHO
2,929,235 UART: RITY.KEYID = 7
2,944,529 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,294 UART: [art] PUB.X = 0B00983A53E29C3B8E579D52DCBC71F628DBFDD02CFBEF2E0D61821AFE6A66D034926BE6B7287CC65CC4448D9F6FAF9D
2,952,058 UART: [art] PUB.Y = A5948C81744EC94A37CEAB3422AFD31D0FA231A99649A018A88484787BD64085B7B4E9C05CCFB4B1519ACB71D106EC25
2,959,010 UART: [art] SIG.R = C9DCA8F8B40FF023EA6480FC9D2D483AF644A5FC24D3075BD4E271A42A19AFFAD69C70924D083D04507CC8313A8D52E5
2,965,782 UART: [art] SIG.S = 5A71D8228928F1ABE0E6A5D66FBBA62E571DBB47E2BA37204CEC400DE79A209401BC36E8FCBE55C1815D67BF055DF7EB
2,990,002 UART: Caliptra RT
2,990,347 UART: [state] CFI Enabled
3,097,712 UART: [rt] RT listening for mailbox commands...
3,098,382 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,338 UART: [rt]cmd =0x414c544e, len=20
3,129,466 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,553,540 UART: [state] Locking PCR0, PCR1 and PCR31
23,555,294 UART: [state] Locking ICCM
23,557,884 UART: [exit] Launching FMC @ 0x40000130
23,566,283 UART:
23,566,517 UART: Running Caliptra FMC ...
23,567,617 UART:
23,567,771 UART: [state] CFI Enabled
23,635,005 UART: [fht] FMC Alias Private Key: 7
25,973,094 UART: [art] Extend RT PCRs Done
25,974,321 UART: [art] Lock RT PCRs Done
25,975,920 UART: [art] Populate DV Done
25,981,067 UART: [fht] FMC Alias Private Key: 7
25,982,728 UART: [art] Derive CDI
25,983,476 UART: [art] Store in in slot 0x4
26,044,007 UART: [art] Derive Key Pair
26,045,013 UART: [art] Store priv key in slot 0x5
29,337,876 UART: [art] Derive Key Pair - Done
29,350,657 UART: [art] Signing Cert with AUTHO
29,352,003 UART: RITY.KEYID = 7
31,639,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,071 UART: [art] PUB.X = 98F53C0BF08AE88C0AE21E33C492222F52E7CFF56533972A88FE3EC90CFD7855162672456703E9FC021CE86254905704
31,648,266 UART: [art] PUB.Y = A80D5BA2F5FB5EC6DD5934BC1C9C3A191C0945B7624704CCA5BCB90E30A41AEA81BEE27687E9F3420416699ED99E9FCD
31,655,554 UART: [art] SIG.R = BD629FE7697F2E2FE89BA6654CEF10FE0AB0720B282730BC1AD5124F7D714EDFA02439062E1394B161AC37A11AB8510E
31,662,924 UART: [art] SIG.S = 19CCCC6ACE54278498D87F25A6CAFBFA5C9A18DD6CE73ABFF4B3DB7634255BA31BEB8DA83D5EB4C586D2BB31C8983B97
32,968,219 UART: Caliptra RT
32,968,931 UART: [state] CFI Enabled
33,142,555 UART: [rt] RT listening for mailbox commands...
33,174,513 UART: [rt]cmd =0x44504543, len=92
38,928,194 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
190,226 UART:
190,519 UART: Running Caliptra ROM ...
191,630 UART:
191,807 UART: [state] CFI Enabled
253,838 UART: [state] LifecycleState = Unprovisioned
255,772 UART: [state] DebugLocked = No
258,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,063 UART: [kat] SHA2-256
432,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,263 UART: [kat] ++
443,789 UART: [kat] sha1
454,301 UART: [kat] SHA2-256
457,023 UART: [kat] SHA2-384
462,825 UART: [kat] SHA2-512-ACC
465,163 UART: [kat] ECC-384
2,757,193 UART: [kat] HMAC-384Kdf
2,787,199 UART: [kat] LMS
3,977,529 UART: [kat] --
3,981,620 UART: [cold-reset] ++
3,983,616 UART: [fht] Storing FHT @ 0x50003400
3,995,824 UART: [idev] ++
3,996,399 UART: [idev] CDI.KEYID = 6
3,997,310 UART: [idev] SUBJECT.KEYID = 7
3,998,562 UART: [idev] UDS.KEYID = 0
3,999,613 ready_for_fw is high
3,999,812 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,142,814 UART: [idev] Erasing UDS.KEYID = 0
7,333,005 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,806 UART: [idev] --
7,357,724 UART: [ldev] ++
7,358,307 UART: [ldev] CDI.KEYID = 6
7,359,328 UART: [ldev] SUBJECT.KEYID = 5
7,360,492 UART: [ldev] AUTHORITY.KEYID = 7
7,361,726 UART: [ldev] FE.KEYID = 1
7,408,622 UART: [ldev] Erasing FE.KEYID = 1
10,741,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,071,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,086,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,385 UART: [ldev] --
13,124,415 UART: [fwproc] Waiting for Commands...
13,127,704 UART: [fwproc] Received command 0x46574c44
13,129,891 UART: [fwproc] Received Image of size 113760 bytes
17,179,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,637,020 >>> mbox cmd response: success
17,637,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,642,021 UART: [afmc] ++
17,642,611 UART: [afmc] CDI.KEYID = 6
17,643,652 UART: [afmc] SUBJECT.KEYID = 7
17,644,811 UART: [afmc] AUTHORITY.KEYID = 5
21,014,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,313,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,315,844 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,330,260 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,345,071 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,359,529 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,381,059 UART: [afmc] --
23,385,032 UART: [cold-reset] --
23,391,223 UART: [state] Locking Datavault
23,396,263 UART: [state] Locking PCR0, PCR1 and PCR31
23,398,016 UART: [state] Locking ICCM
23,399,789 UART: [exit] Launching FMC @ 0x40000130
23,408,182 UART:
23,408,422 UART: Running Caliptra FMC ...
23,409,542 UART:
23,409,703 UART: [state] CFI Enabled
23,470,313 UART: [fht] FMC Alias Private Key: 7
25,808,811 UART: [art] Extend RT PCRs Done
25,810,030 UART: [art] Lock RT PCRs Done
25,811,848 UART: [art] Populate DV Done
25,817,150 UART: [fht] FMC Alias Private Key: 7
25,818,793 UART: [art] Derive CDI
25,819,533 UART: [art] Store in in slot 0x4
25,878,713 UART: [art] Derive Key Pair
25,879,751 UART: [art] Store priv key in slot 0x5
29,172,458 UART: [art] Derive Key Pair - Done
29,185,123 UART: [art] Signing Cert with AUTHO
29,186,464 UART: RITY.KEYID = 7
31,472,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,442 UART: [art] PUB.X = 98F53C0BF08AE88C0AE21E33C492222F52E7CFF56533972A88FE3EC90CFD7855162672456703E9FC021CE86254905704
31,481,708 UART: [art] PUB.Y = A80D5BA2F5FB5EC6DD5934BC1C9C3A191C0945B7624704CCA5BCB90E30A41AEA81BEE27687E9F3420416699ED99E9FCD
31,488,941 UART: [art] SIG.R = BD629FE7697F2E2FE89BA6654CEF10FE0AB0720B282730BC1AD5124F7D714EDFA02439062E1394B161AC37A11AB8510E
31,496,330 UART: [art] SIG.S = 19CCCC6ACE54278498D87F25A6CAFBFA5C9A18DD6CE73ABFF4B3DB7634255BA31BEB8DA83D5EB4C586D2BB31C8983B97
32,800,921 UART: Caliptra RT
32,801,636 UART: [state] CFI Enabled
32,963,499 UART: [rt] RT listening for mailbox commands...
32,995,671 UART: [rt]cmd =0x4d454153, len=108
33,014,173 >>> mbox cmd response data (12 bytes)
33,014,692 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,045,285 UART: [rt]cmd =0x44504543, len=92
38,803,141 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,049 writing to cptra_bootfsm_go
190,128 UART:
190,433 UART: Running Caliptra ROM ...
191,464 UART:
191,624 UART: [state] CFI Enabled
254,219 UART: [state] LifecycleState = Unprovisioned
256,114 UART: [state] DebugLocked = No
259,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,171 UART: [kat] SHA2-256
432,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,383 UART: [kat] ++
443,827 UART: [kat] sha1
455,908 UART: [kat] SHA2-256
458,561 UART: [kat] SHA2-384
464,553 UART: [kat] SHA2-512-ACC
466,923 UART: [kat] ECC-384
2,753,931 UART: [kat] HMAC-384Kdf
2,767,717 UART: [kat] LMS
3,958,038 UART: [kat] --
3,962,461 UART: [cold-reset] ++
3,963,559 UART: [fht] Storing FHT @ 0x50003400
3,975,400 UART: [idev] ++
3,976,052 UART: [idev] CDI.KEYID = 6
3,976,946 UART: [idev] SUBJECT.KEYID = 7
3,978,190 UART: [idev] UDS.KEYID = 0
3,979,190 ready_for_fw is high
3,979,377 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,122,339 UART: [idev] Erasing UDS.KEYID = 0
7,313,005 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,390 UART: [idev] --
7,338,708 UART: [ldev] ++
7,339,280 UART: [ldev] CDI.KEYID = 6
7,340,299 UART: [ldev] SUBJECT.KEYID = 5
7,341,466 UART: [ldev] AUTHORITY.KEYID = 7
7,342,624 UART: [ldev] FE.KEYID = 1
7,389,315 UART: [ldev] Erasing FE.KEYID = 1
10,720,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,015,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,029,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,044,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,058,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,076,770 UART: [ldev] --
13,082,214 UART: [fwproc] Waiting for Commands...
13,084,808 UART: [fwproc] Received command 0x46574c44
13,087,050 UART: [fwproc] Received Image of size 113760 bytes
17,138,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,211,751 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,596,427 >>> mbox cmd response: success
17,596,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,600,953 UART: [afmc] ++
17,601,533 UART: [afmc] CDI.KEYID = 6
17,602,465 UART: [afmc] SUBJECT.KEYID = 7
17,603,686 UART: [afmc] AUTHORITY.KEYID = 5
20,972,620 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,274,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,276,764 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,291,189 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,306,018 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,320,472 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,340,337 UART: [afmc] --
23,343,607 UART: [cold-reset] --
23,346,061 UART: [state] Locking Datavault
23,353,420 UART: [state] Locking PCR0, PCR1 and PCR31
23,355,183 UART: [state] Locking ICCM
23,356,797 UART: [exit] Launching FMC @ 0x40000130
23,365,192 UART:
23,365,427 UART: Running Caliptra FMC ...
23,366,542 UART:
23,366,702 UART: [state] CFI Enabled
23,434,382 UART: [fht] FMC Alias Private Key: 7
25,771,938 UART: [art] Extend RT PCRs Done
25,773,163 UART: [art] Lock RT PCRs Done
25,774,600 UART: [art] Populate DV Done
25,780,285 UART: [fht] FMC Alias Private Key: 7
25,781,764 UART: [art] Derive CDI
25,782,498 UART: [art] Store in in slot 0x4
25,843,879 UART: [art] Derive Key Pair
25,844,922 UART: [art] Store priv key in slot 0x5
29,137,975 UART: [art] Derive Key Pair - Done
29,150,887 UART: [art] Signing Cert with AUTHO
29,152,238 UART: RITY.KEYID = 7
31,439,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,441,215 UART: [art] PUB.X = 98F53C0BF08AE88C0AE21E33C492222F52E7CFF56533972A88FE3EC90CFD7855162672456703E9FC021CE86254905704
31,448,485 UART: [art] PUB.Y = A80D5BA2F5FB5EC6DD5934BC1C9C3A191C0945B7624704CCA5BCB90E30A41AEA81BEE27687E9F3420416699ED99E9FCD
31,455,719 UART: [art] SIG.R = BD629FE7697F2E2FE89BA6654CEF10FE0AB0720B282730BC1AD5124F7D714EDFA02439062E1394B161AC37A11AB8510E
31,463,102 UART: [art] SIG.S = 19CCCC6ACE54278498D87F25A6CAFBFA5C9A18DD6CE73ABFF4B3DB7634255BA31BEB8DA83D5EB4C586D2BB31C8983B97
32,768,322 UART: Caliptra RT
32,769,027 UART: [state] CFI Enabled
32,929,956 UART: [rt] RT listening for mailbox commands...
32,962,291 UART: [rt]cmd =0x44504543, len=96
32,994,377 >>> mbox cmd response data (56 bytes)
32,995,299 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,025,570 UART: [rt]cmd =0x44504543, len=92
38,792,857 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
4,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,877,320 >>> mbox cmd response data (12 bytes)
12,878,616 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,038,018 >>> mbox cmd response: success
18,038,511 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,736,044 UART:
23,736,455 UART: Running Caliptra FMC ...
23,737,761 UART:
23,737,928 UART: [state] CFI Enabled
23,809,439 UART: [fht] FMC Alias Private Key: 7
26,147,315 UART: [art] Extend RT PCRs Done
26,148,545 UART: [art] Lock RT PCRs Done
26,149,873 UART: [art] Populate DV Done
26,155,509 UART: [fht] FMC Alias Private Key: 7
26,157,047 UART: [art] Derive CDI
26,157,787 UART: [art] Store in in slot 0x4
26,217,008 UART: [art] Derive Key Pair
26,218,011 UART: [art] Store priv key in slot 0x5
29,510,623 UART: [art] Derive Key Pair - Done
29,523,780 UART: [art] Signing Cert with AUTHO
29,525,090 UART: RITY.KEYID = 7
31,811,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,813,228 UART: [art] PUB.X = 8C8C71F042CF854DAF4CB2495D32D28D3E97E05B6D5AB2748F162AA929783DAABE90868809FF580AB29C05E6E74B6ACD
31,820,499 UART: [art] PUB.Y = CC0E4A720401A5EC47FAAD90C1907F6E27EFBE61CE2CE2F6D3027C4932D9D00430086196269495FCD70F8568A5B79BAC
31,827,769 UART: [art] SIG.R = 6F250312A7FEA8E60D1FB0DF035803A1037E900F51565A3671AC077916713FA9F583D4C778C84AB25B9063A565FF4107
31,835,113 UART: [art] SIG.S = C650B9D64C1E4C9A36C9F2710BB2863A537CA263D5479E549CDE4914DFB06AB124C14819DAC975F6E29086EA4CA1CD64
33,140,306 UART: Caliptra RT
33,141,019 UART: [state] CFI Enabled
33,333,930 UART: [rt] RT listening for mailbox commands...
33,365,976 UART: [rt]cmd =0x44504543, len=92
39,120,412 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
3,792,724 ready_for_fw is high
3,793,085 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,856,933 >>> mbox cmd response: success
17,857,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,553,551 UART:
23,553,887 UART: Running Caliptra FMC ...
23,554,932 UART:
23,555,090 UART: [state] CFI Enabled
23,605,327 UART: [fht] FMC Alias Private Key: 7
25,943,588 UART: [art] Extend RT PCRs Done
25,944,814 UART: [art] Lock RT PCRs Done
25,946,225 UART: [art] Populate DV Done
25,951,582 UART: [fht] FMC Alias Private Key: 7
25,953,213 UART: [art] Derive CDI
25,954,038 UART: [art] Store in in slot 0x4
26,012,892 UART: [art] Derive Key Pair
26,013,899 UART: [art] Store priv key in slot 0x5
29,307,160 UART: [art] Derive Key Pair - Done
29,320,101 UART: [art] Signing Cert with AUTHO
29,321,441 UART: RITY.KEYID = 7
31,609,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,610,897 UART: [art] PUB.X = 8C8C71F042CF854DAF4CB2495D32D28D3E97E05B6D5AB2748F162AA929783DAABE90868809FF580AB29C05E6E74B6ACD
31,618,157 UART: [art] PUB.Y = CC0E4A720401A5EC47FAAD90C1907F6E27EFBE61CE2CE2F6D3027C4932D9D00430086196269495FCD70F8568A5B79BAC
31,625,405 UART: [art] SIG.R = 6F250312A7FEA8E60D1FB0DF035803A1037E900F51565A3671AC077916713FA9F583D4C778C84AB25B9063A565FF4107
31,632,787 UART: [art] SIG.S = C650B9D64C1E4C9A36C9F2710BB2863A537CA263D5479E549CDE4914DFB06AB124C14819DAC975F6E29086EA4CA1CD64
32,938,134 UART: Caliptra RT
32,938,849 UART: [state] CFI Enabled
33,099,834 UART: [rt] RT listening for mailbox commands...
33,132,010 UART: [rt]cmd =0x4d454153, len=108
33,151,522 >>> mbox cmd response data (12 bytes)
33,152,059 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,182,698 UART: [rt]cmd =0x44504543, len=92
38,939,572 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,039 writing to cptra_bootfsm_go
3,771,854 ready_for_fw is high
3,772,222 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,849,645 >>> mbox cmd response: success
17,850,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,530,414 UART:
23,530,742 UART: Running Caliptra FMC ...
23,531,831 UART:
23,531,989 UART: [state] CFI Enabled
23,600,848 UART: [fht] FMC Alias Private Key: 7
25,938,984 UART: [art] Extend RT PCRs Done
25,940,349 UART: [art] Lock RT PCRs Done
25,941,883 UART: [art] Populate DV Done
25,947,201 UART: [fht] FMC Alias Private Key: 7
25,948,690 UART: [art] Derive CDI
25,949,453 UART: [art] Store in in slot 0x4
26,012,300 UART: [art] Derive Key Pair
26,013,303 UART: [art] Store priv key in slot 0x5
29,305,640 UART: [art] Derive Key Pair - Done
29,318,585 UART: [art] Signing Cert with AUTHO
29,319,892 UART: RITY.KEYID = 7
31,606,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,608,432 UART: [art] PUB.X = 8C8C71F042CF854DAF4CB2495D32D28D3E97E05B6D5AB2748F162AA929783DAABE90868809FF580AB29C05E6E74B6ACD
31,615,709 UART: [art] PUB.Y = CC0E4A720401A5EC47FAAD90C1907F6E27EFBE61CE2CE2F6D3027C4932D9D00430086196269495FCD70F8568A5B79BAC
31,622,931 UART: [art] SIG.R = 6F250312A7FEA8E60D1FB0DF035803A1037E900F51565A3671AC077916713FA9F583D4C778C84AB25B9063A565FF4107
31,630,342 UART: [art] SIG.S = C650B9D64C1E4C9A36C9F2710BB2863A537CA263D5479E549CDE4914DFB06AB124C14819DAC975F6E29086EA4CA1CD64
32,935,302 UART: Caliptra RT
32,935,991 UART: [state] CFI Enabled
33,097,868 UART: [rt] RT listening for mailbox commands...
33,130,205 UART: [rt]cmd =0x44504543, len=96
33,161,135 >>> mbox cmd response data (56 bytes)
33,161,954 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,192,651 UART: [rt]cmd =0x44504543, len=92
38,960,052 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,685,951 UART: [state] Locking PCR0, PCR1 and PCR31
23,687,704 UART: [state] Locking ICCM
23,689,662 UART: [exit] Launching FMC @ 0x40000130
23,698,049 UART:
23,698,288 UART: Running Caliptra FMC ...
23,699,311 UART:
23,699,456 UART: [state] CFI Enabled
23,708,039 UART: [fht] FMC Alias Private Key: 7
26,039,435 UART: [art] Extend RT PCRs Done
26,040,655 UART: [art] Lock RT PCRs Done
26,042,251 UART: [art] Populate DV Done
26,047,604 UART: [fht] FMC Alias Private Key: 7
26,049,190 UART: [art] Derive CDI
26,049,923 UART: [art] Store in in slot 0x4
26,092,721 UART: [art] Derive Key Pair
26,093,756 UART: [art] Store priv key in slot 0x5
29,336,010 UART: [art] Derive Key Pair - Done
29,349,173 UART: [art] Signing Cert with AUTHO
29,350,468 UART: RITY.KEYID = 7
31,629,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,718 UART: [art] PUB.X = 2A17A65CB3AEE1FAAEDCF539AC780816604613D6465528BE6D45A7A5E73AF4F2AF126C00A9203B5B0026F330AB017D4D
31,638,660 UART: [art] PUB.Y = 0C35DE368C77143E0F7E19B61EC2F4276D3E3641023190B8F0D2B866F1B30C4C85CE4C6E2571CC07433C5E2279F505EF
31,645,921 UART: [art] SIG.R = E52E624E479401E95D43961CD4516CDE0D8D7D75B79A6ECF632CAC937E89A8176AD9841FA780CE586B4249D663661CA3
31,653,279 UART: [art] SIG.S = E736B48A915AB76C50425E561AC9B1A86F3B621B9F3C73D24AFACF90CB5FD6F11AD4C737604DD7DDBEC14154E75F8E44
32,958,563 UART: Caliptra RT
32,959,272 UART: [state] CFI Enabled
33,088,909 UART: [rt] RT listening for mailbox commands...
33,121,116 UART: [rt]cmd =0x44504543, len=92
38,801,601 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,097 writing to cptra_bootfsm_go
190,227 UART:
190,544 UART: Running Caliptra ROM ...
191,569 UART:
1,694,686 UART: [state] CFI Enabled
1,708,779 UART: [state] LifecycleState = Unprovisioned
1,710,725 UART: [state] DebugLocked = No
1,713,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,719,449 UART: [kat] SHA2-256
1,889,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,899,768 UART: [kat] ++
1,900,303 UART: [kat] sha1
1,911,264 UART: [kat] SHA2-256
1,913,919 UART: [kat] SHA2-384
1,919,289 UART: [kat] SHA2-512-ACC
1,921,665 UART: [kat] ECC-384
4,206,464 UART: [kat] HMAC-384Kdf
4,217,061 UART: [kat] LMS
5,407,140 UART: [kat] --
5,409,949 UART: [cold-reset] ++
5,411,812 UART: [fht] Storing FHT @ 0x50003400
5,423,720 UART: [idev] ++
5,424,290 UART: [idev] CDI.KEYID = 6
5,425,325 UART: [idev] SUBJECT.KEYID = 7
5,426,496 UART: [idev] UDS.KEYID = 0
5,427,543 ready_for_fw is high
5,427,743 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,570,563 UART: [idev] Erasing UDS.KEYID = 0
8,712,718 UART: [idev] Using Sha1 for KeyId Algorithm
8,733,717 UART: [idev] --
8,737,867 UART: [ldev] ++
8,738,429 UART: [ldev] CDI.KEYID = 6
8,739,364 UART: [ldev] SUBJECT.KEYID = 5
8,740,626 UART: [ldev] AUTHORITY.KEYID = 7
8,741,796 UART: [ldev] FE.KEYID = 1
8,753,775 UART: [ldev] Erasing FE.KEYID = 1
12,039,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,331,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,345,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,360,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,374,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,395,248 UART: [ldev] --
14,399,758 UART: [fwproc] Waiting for Commands...
14,401,634 UART: [fwproc] Received command 0x46574c44
14,403,818 UART: [fwproc] Received Image of size 113760 bytes
18,458,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,530,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,599,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
18,916,010 >>> mbox cmd response: success
18,917,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,919,636 UART: [afmc] ++
18,920,131 UART: [afmc] CDI.KEYID = 6
18,921,113 UART: [afmc] SUBJECT.KEYID = 7
18,922,400 UART: [afmc] AUTHORITY.KEYID = 5
22,238,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,533,678 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,535,932 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,550,333 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,565,149 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,579,571 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,601,006 UART: [afmc] --
24,604,772 UART: [cold-reset] --
24,608,475 UART: [state] Locking Datavault
24,615,227 UART: [state] Locking PCR0, PCR1 and PCR31
24,616,980 UART: [state] Locking ICCM
24,618,666 UART: [exit] Launching FMC @ 0x40000130
24,627,076 UART:
24,627,319 UART: Running Caliptra FMC ...
24,628,341 UART:
24,628,484 UART: [state] CFI Enabled
24,636,636 UART: [fht] FMC Alias Private Key: 7
26,967,731 UART: [art] Extend RT PCRs Done
26,968,951 UART: [art] Lock RT PCRs Done
26,970,651 UART: [art] Populate DV Done
26,976,054 UART: [fht] FMC Alias Private Key: 7
26,977,756 UART: [art] Derive CDI
26,978,488 UART: [art] Store in in slot 0x4
27,021,294 UART: [art] Derive Key Pair
27,022,335 UART: [art] Store priv key in slot 0x5
30,264,901 UART: [art] Derive Key Pair - Done
30,278,015 UART: [art] Signing Cert with AUTHO
30,279,321 UART: RITY.KEYID = 7
32,558,605 UART: [art] Erasing AUTHORITY.KEYID = 7
32,560,119 UART: [art] PUB.X = 2A17A65CB3AEE1FAAEDCF539AC780816604613D6465528BE6D45A7A5E73AF4F2AF126C00A9203B5B0026F330AB017D4D
32,567,333 UART: [art] PUB.Y = 0C35DE368C77143E0F7E19B61EC2F4276D3E3641023190B8F0D2B866F1B30C4C85CE4C6E2571CC07433C5E2279F505EF
32,574,592 UART: [art] SIG.R = E52E624E479401E95D43961CD4516CDE0D8D7D75B79A6ECF632CAC937E89A8176AD9841FA780CE586B4249D663661CA3
32,582,010 UART: [art] SIG.S = E736B48A915AB76C50425E561AC9B1A86F3B621B9F3C73D24AFACF90CB5FD6F11AD4C737604DD7DDBEC14154E75F8E44
33,887,122 UART: Caliptra RT
33,887,821 UART: [state] CFI Enabled
34,005,039 UART: [rt] RT listening for mailbox commands...
34,037,305 UART: [rt]cmd =0x4d454153, len=108
34,055,884 >>> mbox cmd response data (12 bytes)
34,056,464 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,086,998 UART: [rt]cmd =0x44504543, len=92
39,766,673 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,051 writing to cptra_bootfsm_go
190,186 UART:
190,497 UART: Running Caliptra ROM ...
191,608 UART:
2,016,107 UART: [state] CFI Enabled
2,029,414 UART: [state] LifecycleState = Unprovisioned
2,031,334 UART: [state] DebugLocked = No
2,033,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,037,994 UART: [kat] SHA2-256
2,207,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,218,201 UART: [kat] ++
2,218,687 UART: [kat] sha1
2,231,082 UART: [kat] SHA2-256
2,233,784 UART: [kat] SHA2-384
2,239,290 UART: [kat] SHA2-512-ACC
2,241,675 UART: [kat] ECC-384
4,527,236 UART: [kat] HMAC-384Kdf
4,538,542 UART: [kat] LMS
5,728,679 UART: [kat] --
5,731,195 UART: [cold-reset] ++
5,732,627 UART: [fht] Storing FHT @ 0x50003400
5,745,378 UART: [idev] ++
5,745,948 UART: [idev] CDI.KEYID = 6
5,746,980 UART: [idev] SUBJECT.KEYID = 7
5,748,286 UART: [idev] UDS.KEYID = 0
5,749,224 ready_for_fw is high
5,749,411 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,892,138 UART: [idev] Erasing UDS.KEYID = 0
9,035,516 UART: [idev] Using Sha1 for KeyId Algorithm
9,057,603 UART: [idev] --
9,062,198 UART: [ldev] ++
9,062,823 UART: [ldev] CDI.KEYID = 6
9,063,705 UART: [ldev] SUBJECT.KEYID = 5
9,064,890 UART: [ldev] AUTHORITY.KEYID = 7
9,066,250 UART: [ldev] FE.KEYID = 1
9,079,734 UART: [ldev] Erasing FE.KEYID = 1
12,369,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,664,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,679,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,694,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,708,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,728,086 UART: [ldev] --
14,733,356 UART: [fwproc] Waiting for Commands...
14,735,562 UART: [fwproc] Received command 0x46574c44
14,737,750 UART: [fwproc] Received Image of size 113760 bytes
18,783,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,851,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,920,655 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,236,380 >>> mbox cmd response: success
19,236,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,240,331 UART: [afmc] ++
19,240,904 UART: [afmc] CDI.KEYID = 6
19,241,839 UART: [afmc] SUBJECT.KEYID = 7
19,243,105 UART: [afmc] AUTHORITY.KEYID = 5
22,555,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,848,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,851,019 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,865,429 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,880,252 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,894,705 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,915,681 UART: [afmc] --
24,919,103 UART: [cold-reset] --
24,921,823 UART: [state] Locking Datavault
24,925,823 UART: [state] Locking PCR0, PCR1 and PCR31
24,927,581 UART: [state] Locking ICCM
24,930,213 UART: [exit] Launching FMC @ 0x40000130
24,938,569 UART:
24,938,805 UART: Running Caliptra FMC ...
24,939,898 UART:
24,940,051 UART: [state] CFI Enabled
24,947,933 UART: [fht] FMC Alias Private Key: 7
27,278,207 UART: [art] Extend RT PCRs Done
27,279,427 UART: [art] Lock RT PCRs Done
27,281,001 UART: [art] Populate DV Done
27,286,732 UART: [fht] FMC Alias Private Key: 7
27,288,314 UART: [art] Derive CDI
27,289,120 UART: [art] Store in in slot 0x4
27,332,086 UART: [art] Derive Key Pair
27,333,084 UART: [art] Store priv key in slot 0x5
30,574,845 UART: [art] Derive Key Pair - Done
30,587,739 UART: [art] Signing Cert with AUTHO
30,589,043 UART: RITY.KEYID = 7
32,868,799 UART: [art] Erasing AUTHORITY.KEYID = 7
32,870,296 UART: [art] PUB.X = 2A17A65CB3AEE1FAAEDCF539AC780816604613D6465528BE6D45A7A5E73AF4F2AF126C00A9203B5B0026F330AB017D4D
32,877,517 UART: [art] PUB.Y = 0C35DE368C77143E0F7E19B61EC2F4276D3E3641023190B8F0D2B866F1B30C4C85CE4C6E2571CC07433C5E2279F505EF
32,884,769 UART: [art] SIG.R = E52E624E479401E95D43961CD4516CDE0D8D7D75B79A6ECF632CAC937E89A8176AD9841FA780CE586B4249D663661CA3
32,892,163 UART: [art] SIG.S = E736B48A915AB76C50425E561AC9B1A86F3B621B9F3C73D24AFACF90CB5FD6F11AD4C737604DD7DDBEC14154E75F8E44
34,197,759 UART: Caliptra RT
34,198,474 UART: [state] CFI Enabled
34,315,602 UART: [rt] RT listening for mailbox commands...
34,347,609 UART: [rt]cmd =0x44504543, len=96
34,379,403 >>> mbox cmd response data (56 bytes)
34,380,246 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,411,010 UART: [rt]cmd =0x44504543, len=92
40,090,301 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 6.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
5,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,044,752 >>> mbox cmd response data (12 bytes)
13,045,704 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,214,334 >>> mbox cmd response: success
18,214,794 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,849,585 UART:
23,849,983 UART: Running Caliptra FMC ...
23,851,197 UART:
23,851,357 UART: [state] CFI Enabled
23,859,037 UART: [fht] FMC Alias Private Key: 7
26,189,487 UART: [art] Extend RT PCRs Done
26,190,721 UART: [art] Lock RT PCRs Done
26,192,704 UART: [art] Populate DV Done
26,198,070 UART: [fht] FMC Alias Private Key: 7
26,199,733 UART: [art] Derive CDI
26,200,555 UART: [art] Store in in slot 0x4
26,243,322 UART: [art] Derive Key Pair
26,244,521 UART: [art] Store priv key in slot 0x5
29,486,573 UART: [art] Derive Key Pair - Done
29,499,795 UART: [art] Signing Cert with AUTHO
29,501,096 UART: RITY.KEYID = 7
31,780,774 UART: [art] Erasing AUTHORITY.KEYID = 7
31,782,283 UART: [art] PUB.X = 5E847AC4A0478AC746DCBB2E9BDAE80A471D12143FEE9BCB298CAC19F712D0AC0FA3D2BD8440C3F4E0377D158D0C1424
31,789,566 UART: [art] PUB.Y = 92E4C5969040B5214BA3FD145E22F1ACE67878FC9A91607EA18764F333F214646748CBFFE897CF2E23EDF14387E85C79
31,796,819 UART: [art] SIG.R = B77DF6F2B99ADD4D54CE4846E9D555C875AEC72D46BF68CB5204BB6A803B5D5D53EAA0ACE7EA7CA1B6D7113B8DBBEE98
31,804,253 UART: [art] SIG.S = 3138FDA21CDA3C5B2A913B51315928EC5F1A42A0820C089A9F65D134642D19B3E8CBF1FC72B383CDF46D999D90BF52F2
33,109,614 UART: Caliptra RT
33,110,328 UART: [state] CFI Enabled
33,239,285 UART: [rt] RT listening for mailbox commands...
33,271,295 UART: [rt]cmd =0x44504543, len=92
38,951,226 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,098 writing to cptra_bootfsm_go
5,080,548 ready_for_fw is high
5,080,914 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,015,961 >>> mbox cmd response: success
19,017,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,655,782 UART:
24,656,341 UART: Running Caliptra FMC ...
24,657,390 UART:
24,657,538 UART: [state] CFI Enabled
24,665,580 UART: [fht] FMC Alias Private Key: 7
26,996,066 UART: [art] Extend RT PCRs Done
26,997,307 UART: [art] Lock RT PCRs Done
26,998,965 UART: [art] Populate DV Done
27,004,482 UART: [fht] FMC Alias Private Key: 7
27,006,188 UART: [art] Derive CDI
27,006,925 UART: [art] Store in in slot 0x4
27,049,530 UART: [art] Derive Key Pair
27,050,579 UART: [art] Store priv key in slot 0x5
30,292,512 UART: [art] Derive Key Pair - Done
30,305,765 UART: [art] Signing Cert with AUTHO
30,307,093 UART: RITY.KEYID = 7
32,586,695 UART: [art] Erasing AUTHORITY.KEYID = 7
32,588,204 UART: [art] PUB.X = 5E847AC4A0478AC746DCBB2E9BDAE80A471D12143FEE9BCB298CAC19F712D0AC0FA3D2BD8440C3F4E0377D158D0C1424
32,595,490 UART: [art] PUB.Y = 92E4C5969040B5214BA3FD145E22F1ACE67878FC9A91607EA18764F333F214646748CBFFE897CF2E23EDF14387E85C79
32,602,706 UART: [art] SIG.R = B77DF6F2B99ADD4D54CE4846E9D555C875AEC72D46BF68CB5204BB6A803B5D5D53EAA0ACE7EA7CA1B6D7113B8DBBEE98
32,610,159 UART: [art] SIG.S = 3138FDA21CDA3C5B2A913B51315928EC5F1A42A0820C089A9F65D134642D19B3E8CBF1FC72B383CDF46D999D90BF52F2
33,916,107 UART: Caliptra RT
33,916,810 UART: [state] CFI Enabled
34,035,430 UART: [rt] RT listening for mailbox commands...
34,067,912 UART: [rt]cmd =0x4d454153, len=108
34,087,470 >>> mbox cmd response data (12 bytes)
34,088,062 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,118,551 UART: [rt]cmd =0x44504543, len=92
39,798,763 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,133 writing to cptra_bootfsm_go
5,369,756 ready_for_fw is high
5,370,114 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,302,591 >>> mbox cmd response: success
19,303,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,945,179 UART:
24,945,555 UART: Running Caliptra FMC ...
24,946,810 UART:
24,946,969 UART: [state] CFI Enabled
24,954,692 UART: [fht] FMC Alias Private Key: 7
27,285,591 UART: [art] Extend RT PCRs Done
27,286,818 UART: [art] Lock RT PCRs Done
27,288,609 UART: [art] Populate DV Done
27,294,124 UART: [fht] FMC Alias Private Key: 7
27,295,874 UART: [art] Derive CDI
27,296,681 UART: [art] Store in in slot 0x4
27,338,945 UART: [art] Derive Key Pair
27,339,941 UART: [art] Store priv key in slot 0x5
30,582,355 UART: [art] Derive Key Pair - Done
30,595,472 UART: [art] Signing Cert with AUTHO
30,596,772 UART: RITY.KEYID = 7
32,876,354 UART: [art] Erasing AUTHORITY.KEYID = 7
32,877,881 UART: [art] PUB.X = 5E847AC4A0478AC746DCBB2E9BDAE80A471D12143FEE9BCB298CAC19F712D0AC0FA3D2BD8440C3F4E0377D158D0C1424
32,885,165 UART: [art] PUB.Y = 92E4C5969040B5214BA3FD145E22F1ACE67878FC9A91607EA18764F333F214646748CBFFE897CF2E23EDF14387E85C79
32,892,380 UART: [art] SIG.R = B77DF6F2B99ADD4D54CE4846E9D555C875AEC72D46BF68CB5204BB6A803B5D5D53EAA0ACE7EA7CA1B6D7113B8DBBEE98
32,899,792 UART: [art] SIG.S = 3138FDA21CDA3C5B2A913B51315928EC5F1A42A0820C089A9F65D134642D19B3E8CBF1FC72B383CDF46D999D90BF52F2
34,205,212 UART: Caliptra RT
34,205,912 UART: [state] CFI Enabled
34,323,810 UART: [rt] RT listening for mailbox commands...
34,356,167 UART: [rt]cmd =0x44504543, len=96
34,388,080 >>> mbox cmd response data (56 bytes)
34,388,883 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,419,111 UART: [rt]cmd =0x44504543, len=92
40,099,002 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 6.06s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,734,974 UART: [afmc] --
18,738,840 UART: [cold-reset] --
18,742,771 UART: [state] Locking Datavault
18,749,586 UART: [state] Locking PCR0, PCR1 and PCR31
18,751,228 UART: [state] Locking ICCM
18,752,724 UART: [exit] Launching FMC @ 0x40000130
18,761,189 UART:
18,761,462 UART: Running Caliptra FMC ...
18,762,570 UART:
18,762,730 UART: [state] CFI Enabled
18,821,000 UART: [fht] FMC Alias Private Key: 7
20,584,581 UART: [art] Extend RT PCRs Done
20,585,804 UART: [art] Lock RT PCRs Done
20,587,642 UART: [art] Populate DV Done
20,593,104 UART: [fht] FMC Alias Private Key: 7
20,594,586 UART: [art] Derive CDI
20,595,341 UART: [art] Store in in slot 0x4
20,653,120 UART: [art] Derive Key Pair
20,654,184 UART: [art] Store priv key in slot 0x5
23,116,997 UART: [art] Derive Key Pair - Done
23,130,050 UART: [art] Signing Cert with AUTHO
23,131,352 UART: RITY.KEYID = 7
24,842,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,537 UART: [art] PUB.X = 4889C958E5D608642BD0B1861D556C0885FF9721EC9215FB1A7D62410F4DE3D1D395457C03C5ECC201F2B773B0225E3C
24,850,796 UART: [art] PUB.Y = 7CDA23CD887DFA212B3CC78283A91650CFA19974D8806E25FE97618D0F7BA76E797114F29D6A6466F8D2AC05D2EF5824
24,858,042 UART: [art] SIG.R = 87F7748B02E03B74AC8AE34940653772FA0D960F6C9733648D6CE860C37038FCBB083266D7B4F7C5477DBC376B893A32
24,865,399 UART: [art] SIG.S = 8D196BB89B4EC83EA5BF2010A91D8CA9A384F42A7E7DEF2BFDE338219135DC49B37D79249557DEE0DECEE4CEB956CE75
25,844,286 UART: Caliptra RT
25,844,986 UART: [state] CFI Enabled
26,019,316 UART: [rt] RT listening for mailbox commands...
26,051,697 UART: [rt]cmd =0x44504543, len=92
30,400,670 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,086 writing to cptra_bootfsm_go
190,232 UART:
190,530 UART: Running Caliptra ROM ...
191,642 UART:
191,794 UART: [state] CFI Enabled
250,483 UART: [state] LifecycleState = Unprovisioned
252,343 UART: [state] DebugLocked = No
254,516 UART: [state] WD Timer not started. Device not locked for debugging
258,086 UART: [kat] SHA2-256
437,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
448,834 UART: [kat] ++
449,277 UART: [kat] sha1
459,010 UART: [kat] SHA2-256
462,085 UART: [kat] SHA2-384
468,566 UART: [kat] SHA2-512-ACC
471,509 UART: [kat] ECC-384
2,934,185 UART: [kat] HMAC-384Kdf
2,956,243 UART: [kat] LMS
3,485,669 UART: [kat] --
3,491,721 UART: [cold-reset] ++
3,492,662 UART: [fht] FHT @ 0x50003400
3,503,992 UART: [idev] ++
3,504,551 UART: [idev] CDI.KEYID = 6
3,505,580 UART: [idev] SUBJECT.KEYID = 7
3,506,676 UART: [idev] UDS.KEYID = 0
3,507,720 ready_for_fw is high
3,507,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,651,278 UART: [idev] Erasing UDS.KEYID = 0
6,007,563 UART: [idev] Sha1 KeyId Algorithm
6,031,142 UART: [idev] --
6,034,922 UART: [ldev] ++
6,035,495 UART: [ldev] CDI.KEYID = 6
6,036,404 UART: [ldev] SUBJECT.KEYID = 5
6,037,578 UART: [ldev] AUTHORITY.KEYID = 7
6,038,864 UART: [ldev] FE.KEYID = 1
6,083,589 UART: [ldev] Erasing FE.KEYID = 1
8,585,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,896 UART: [ldev] --
10,396,084 UART: [fwproc] Wait for Commands...
10,397,857 UART: [fwproc] Recv command 0x46574c44
10,399,898 UART: [fwproc] Recv'd Img size: 114084 bytes
13,805,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,619 >>> mbox cmd response: success
14,271,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,274,073 UART: [afmc] ++
14,274,651 UART: [afmc] CDI.KEYID = 6
14,275,532 UART: [afmc] SUBJECT.KEYID = 7
14,276,738 UART: [afmc] AUTHORITY.KEYID = 5
16,813,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,537,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,539,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,555,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,571,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,587,465 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,609,559 UART: [afmc] --
18,613,903 UART: [cold-reset] --
18,617,211 UART: [state] Locking Datavault
18,621,208 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,848 UART: [state] Locking ICCM
18,624,754 UART: [exit] Launching FMC @ 0x40000130
18,633,211 UART:
18,633,452 UART: Running Caliptra FMC ...
18,634,551 UART:
18,634,706 UART: [state] CFI Enabled
18,694,182 UART: [fht] FMC Alias Private Key: 7
20,458,441 UART: [art] Extend RT PCRs Done
20,459,648 UART: [art] Lock RT PCRs Done
20,461,321 UART: [art] Populate DV Done
20,466,563 UART: [fht] FMC Alias Private Key: 7
20,468,197 UART: [art] Derive CDI
20,468,929 UART: [art] Store in in slot 0x4
20,526,961 UART: [art] Derive Key Pair
20,528,000 UART: [art] Store priv key in slot 0x5
22,990,825 UART: [art] Derive Key Pair - Done
23,003,605 UART: [art] Signing Cert with AUTHO
23,004,924 UART: RITY.KEYID = 7
24,716,561 UART: [art] Erasing AUTHORITY.KEYID = 7
24,718,058 UART: [art] PUB.X = 4889C958E5D608642BD0B1861D556C0885FF9721EC9215FB1A7D62410F4DE3D1D395457C03C5ECC201F2B773B0225E3C
24,725,286 UART: [art] PUB.Y = 7CDA23CD887DFA212B3CC78283A91650CFA19974D8806E25FE97618D0F7BA76E797114F29D6A6466F8D2AC05D2EF5824
24,732,577 UART: [art] SIG.R = 87F7748B02E03B74AC8AE34940653772FA0D960F6C9733648D6CE860C37038FCBB083266D7B4F7C5477DBC376B893A32
24,739,964 UART: [art] SIG.S = 8D196BB89B4EC83EA5BF2010A91D8CA9A384F42A7E7DEF2BFDE338219135DC49B37D79249557DEE0DECEE4CEB956CE75
25,719,185 UART: Caliptra RT
25,719,890 UART: [state] CFI Enabled
25,885,199 UART: [rt] RT listening for mailbox commands...
25,917,581 UART: [rt]cmd =0x4d454153, len=108
25,935,481 >>> mbox cmd response data (12 bytes)
25,936,147 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,966,415 UART: [rt]cmd =0x44504543, len=92
30,321,474 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,116 writing to cptra_bootfsm_go
190,279 UART:
190,569 UART: Running Caliptra ROM ...
191,622 UART:
191,761 UART: [state] CFI Enabled
252,447 UART: [state] LifecycleState = Unprovisioned
254,307 UART: [state] DebugLocked = No
256,828 UART: [state] WD Timer not started. Device not locked for debugging
259,828 UART: [kat] SHA2-256
438,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,502 UART: [kat] ++
451,029 UART: [kat] sha1
461,292 UART: [kat] SHA2-256
464,262 UART: [kat] SHA2-384
469,128 UART: [kat] SHA2-512-ACC
472,060 UART: [kat] ECC-384
2,935,940 UART: [kat] HMAC-384Kdf
2,959,583 UART: [kat] LMS
3,489,064 UART: [kat] --
3,492,848 UART: [cold-reset] ++
3,494,918 UART: [fht] FHT @ 0x50003400
3,506,127 UART: [idev] ++
3,506,732 UART: [idev] CDI.KEYID = 6
3,507,643 UART: [idev] SUBJECT.KEYID = 7
3,508,812 UART: [idev] UDS.KEYID = 0
3,509,735 ready_for_fw is high
3,509,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,653,163 UART: [idev] Erasing UDS.KEYID = 0
6,014,038 UART: [idev] Sha1 KeyId Algorithm
6,037,651 UART: [idev] --
6,041,591 UART: [ldev] ++
6,042,161 UART: [ldev] CDI.KEYID = 6
6,043,039 UART: [ldev] SUBJECT.KEYID = 5
6,044,217 UART: [ldev] AUTHORITY.KEYID = 7
6,045,509 UART: [ldev] FE.KEYID = 1
6,087,182 UART: [ldev] Erasing FE.KEYID = 1
8,592,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,963 UART: [ldev] --
10,400,425 UART: [fwproc] Wait for Commands...
10,402,581 UART: [fwproc] Recv command 0x46574c44
10,404,682 UART: [fwproc] Recv'd Img size: 114084 bytes
13,805,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,256,974 >>> mbox cmd response: success
14,257,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,261,576 UART: [afmc] ++
14,262,156 UART: [afmc] CDI.KEYID = 6
14,263,037 UART: [afmc] SUBJECT.KEYID = 7
14,264,254 UART: [afmc] AUTHORITY.KEYID = 5
16,798,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,519,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,521,256 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,537,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,553,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,568,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,591,927 UART: [afmc] --
18,596,053 UART: [cold-reset] --
18,599,043 UART: [state] Locking Datavault
18,605,421 UART: [state] Locking PCR0, PCR1 and PCR31
18,607,073 UART: [state] Locking ICCM
18,608,172 UART: [exit] Launching FMC @ 0x40000130
18,616,571 UART:
18,616,797 UART: Running Caliptra FMC ...
18,618,099 UART:
18,618,275 UART: [state] CFI Enabled
18,678,505 UART: [fht] FMC Alias Private Key: 7
20,442,631 UART: [art] Extend RT PCRs Done
20,443,845 UART: [art] Lock RT PCRs Done
20,445,246 UART: [art] Populate DV Done
20,450,760 UART: [fht] FMC Alias Private Key: 7
20,452,466 UART: [art] Derive CDI
20,453,277 UART: [art] Store in in slot 0x4
20,511,641 UART: [art] Derive Key Pair
20,512,675 UART: [art] Store priv key in slot 0x5
22,975,329 UART: [art] Derive Key Pair - Done
22,988,318 UART: [art] Signing Cert with AUTHO
22,989,635 UART: RITY.KEYID = 7
24,701,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,703,104 UART: [art] PUB.X = 4889C958E5D608642BD0B1861D556C0885FF9721EC9215FB1A7D62410F4DE3D1D395457C03C5ECC201F2B773B0225E3C
24,710,338 UART: [art] PUB.Y = 7CDA23CD887DFA212B3CC78283A91650CFA19974D8806E25FE97618D0F7BA76E797114F29D6A6466F8D2AC05D2EF5824
24,717,599 UART: [art] SIG.R = 87F7748B02E03B74AC8AE34940653772FA0D960F6C9733648D6CE860C37038FCBB083266D7B4F7C5477DBC376B893A32
24,724,953 UART: [art] SIG.S = 8D196BB89B4EC83EA5BF2010A91D8CA9A384F42A7E7DEF2BFDE338219135DC49B37D79249557DEE0DECEE4CEB956CE75
25,703,915 UART: Caliptra RT
25,704,618 UART: [state] CFI Enabled
25,870,975 UART: [rt] RT listening for mailbox commands...
25,902,978 UART: [rt]cmd =0x44504543, len=96
25,933,677 >>> mbox cmd response data (56 bytes)
25,934,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,965,143 UART: [rt]cmd =0x44504543, len=92
30,327,504 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
4,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,183,469 >>> mbox cmd response data (12 bytes)
10,184,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,180,663 >>> mbox cmd response: success
14,181,140 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,488,588 UART:
18,488,978 UART: Running Caliptra FMC ...
18,490,231 UART:
18,490,396 UART: [state] CFI Enabled
18,557,958 UART: [fht] FMC Alias Private Key: 7
20,321,448 UART: [art] Extend RT PCRs Done
20,322,678 UART: [art] Lock RT PCRs Done
20,324,109 UART: [art] Populate DV Done
20,329,477 UART: [fht] FMC Alias Private Key: 7
20,330,966 UART: [art] Derive CDI
20,331,734 UART: [art] Store in in slot 0x4
20,390,599 UART: [art] Derive Key Pair
20,391,636 UART: [art] Store priv key in slot 0x5
22,854,509 UART: [art] Derive Key Pair - Done
22,867,343 UART: [art] Signing Cert with AUTHO
22,868,649 UART: RITY.KEYID = 7
24,580,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,581,994 UART: [art] PUB.X = 98BBCC99DB10AF9A6AB6ED4D9FDCEED8EAA3EFD2AD21C90C8806E01E62A28673018A8AFE62BACB557F04853E5C899200
24,589,315 UART: [art] PUB.Y = 2E753202BF22F0EA3E4F93633E42AD66A9D27405FC09FBEAE4229F410F0BA6D7CE42882E9043E9A0769389D64F0DCF65
24,596,584 UART: [art] SIG.R = 5C717BE4EEE7341DB82E0F16BA094531CC62C2E2A8DB62FED28DE0200AF65505905556B6AB3CDADDF86573DD8D192F3D
24,603,947 UART: [art] SIG.S = 2BB8CC19C4023184B1D38916F35251333BAF33EBBDF32F33C83041B058E62FB6B16C3B2DABBD900874EC3E2009322291
25,582,577 UART: Caliptra RT
25,583,284 UART: [state] CFI Enabled
25,761,378 UART: [rt] RT listening for mailbox commands...
25,793,187 UART: [rt]cmd =0x44504543, len=92
30,142,900 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,110 writing to cptra_bootfsm_go
3,370,531 ready_for_fw is high
3,370,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,075,559 >>> mbox cmd response: success
14,075,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,355,687 UART:
18,356,020 UART: Running Caliptra FMC ...
18,357,095 UART:
18,357,253 UART: [state] CFI Enabled
18,419,152 UART: [fht] FMC Alias Private Key: 7
20,183,388 UART: [art] Extend RT PCRs Done
20,184,609 UART: [art] Lock RT PCRs Done
20,186,036 UART: [art] Populate DV Done
20,191,618 UART: [fht] FMC Alias Private Key: 7
20,193,369 UART: [art] Derive CDI
20,194,181 UART: [art] Store in in slot 0x4
20,252,111 UART: [art] Derive Key Pair
20,253,152 UART: [art] Store priv key in slot 0x5
22,715,255 UART: [art] Derive Key Pair - Done
22,728,412 UART: [art] Signing Cert with AUTHO
22,729,720 UART: RITY.KEYID = 7
24,440,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,442,281 UART: [art] PUB.X = 98BBCC99DB10AF9A6AB6ED4D9FDCEED8EAA3EFD2AD21C90C8806E01E62A28673018A8AFE62BACB557F04853E5C899200
24,449,569 UART: [art] PUB.Y = 2E753202BF22F0EA3E4F93633E42AD66A9D27405FC09FBEAE4229F410F0BA6D7CE42882E9043E9A0769389D64F0DCF65
24,456,868 UART: [art] SIG.R = 5C717BE4EEE7341DB82E0F16BA094531CC62C2E2A8DB62FED28DE0200AF65505905556B6AB3CDADDF86573DD8D192F3D
24,464,310 UART: [art] SIG.S = 2BB8CC19C4023184B1D38916F35251333BAF33EBBDF32F33C83041B058E62FB6B16C3B2DABBD900874EC3E2009322291
25,443,312 UART: Caliptra RT
25,444,002 UART: [state] CFI Enabled
25,608,691 UART: [rt] RT listening for mailbox commands...
25,640,852 UART: [rt]cmd =0x4d454153, len=108
25,658,858 >>> mbox cmd response data (12 bytes)
25,659,369 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,689,890 UART: [rt]cmd =0x44504543, len=92
30,043,916 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,051 writing to cptra_bootfsm_go
3,382,144 ready_for_fw is high
3,382,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,067,436 >>> mbox cmd response: success
14,067,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,365,790 UART:
18,366,120 UART: Running Caliptra FMC ...
18,367,164 UART:
18,367,315 UART: [state] CFI Enabled
18,429,999 UART: [fht] FMC Alias Private Key: 7
20,193,962 UART: [art] Extend RT PCRs Done
20,195,181 UART: [art] Lock RT PCRs Done
20,196,973 UART: [art] Populate DV Done
20,202,548 UART: [fht] FMC Alias Private Key: 7
20,204,246 UART: [art] Derive CDI
20,205,055 UART: [art] Store in in slot 0x4
20,263,108 UART: [art] Derive Key Pair
20,264,140 UART: [art] Store priv key in slot 0x5
22,726,785 UART: [art] Derive Key Pair - Done
22,739,454 UART: [art] Signing Cert with AUTHO
22,740,750 UART: RITY.KEYID = 7
24,453,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,663 UART: [art] PUB.X = 98BBCC99DB10AF9A6AB6ED4D9FDCEED8EAA3EFD2AD21C90C8806E01E62A28673018A8AFE62BACB557F04853E5C899200
24,461,931 UART: [art] PUB.Y = 2E753202BF22F0EA3E4F93633E42AD66A9D27405FC09FBEAE4229F410F0BA6D7CE42882E9043E9A0769389D64F0DCF65
24,469,233 UART: [art] SIG.R = 5C717BE4EEE7341DB82E0F16BA094531CC62C2E2A8DB62FED28DE0200AF65505905556B6AB3CDADDF86573DD8D192F3D
24,476,643 UART: [art] SIG.S = 2BB8CC19C4023184B1D38916F35251333BAF33EBBDF32F33C83041B058E62FB6B16C3B2DABBD900874EC3E2009322291
25,455,845 UART: Caliptra RT
25,456,565 UART: [state] CFI Enabled
25,621,756 UART: [rt] RT listening for mailbox commands...
25,654,035 UART: [rt]cmd =0x44504543, len=96
25,685,677 >>> mbox cmd response data (56 bytes)
25,686,495 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,717,140 UART: [rt]cmd =0x44504543, len=92
30,079,323 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.63s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,991 UART: [afmc] --
18,940,556 UART: [cold-reset] --
18,945,557 UART: [state] Locking Datavault
18,949,402 UART: [state] Locking PCR0, PCR1 and PCR31
18,951,103 UART: [state] Locking ICCM
18,952,256 UART: [exit] Launching FMC @ 0x40000130
18,960,706 UART:
18,960,951 UART: Running Caliptra FMC ...
18,962,054 UART:
18,962,218 UART: [state] CFI Enabled
18,970,105 UART: [fht] FMC Alias Private Key: 7
20,726,613 UART: [art] Extend RT PCRs Done
20,727,842 UART: [art] Lock RT PCRs Done
20,729,435 UART: [art] Populate DV Done
20,735,065 UART: [fht] FMC Alias Private Key: 7
20,736,554 UART: [art] Derive CDI
20,737,321 UART: [art] Store in in slot 0x4
20,780,021 UART: [art] Derive Key Pair
20,781,066 UART: [art] Store priv key in slot 0x5
23,207,738 UART: [art] Derive Key Pair - Done
23,220,792 UART: [art] Signing Cert with AUTHO
23,222,104 UART: RITY.KEYID = 7
24,927,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,928,873 UART: [art] PUB.X = 5D48F0994CA2DBFC440E20EAF875E12E81B51E231360193AECBA295096DB9E99E4F50D2DD23BDB8FE26011A718DE6E70
24,936,148 UART: [art] PUB.Y = 31C722AA5541AD15115DABFA5226E86C44058D8497E185AD5B6B87E417E1B9E31FCDD9329C80E25AE9425CA024293A6B
24,943,404 UART: [art] SIG.R = E183D33E1A6C70631D0305FC502DBBA1EE85AC3B47367976F7F79345B2154973031B73AF65FAC901B568BB5F453957C2
24,950,765 UART: [art] SIG.S = 7303A6D0E0655924F1931127934297AE5B74A8C7EF7E3C654F95321F49C15D3813A934A1180CA70A41CEFCBBF93B4BC1
25,929,815 UART: Caliptra RT
25,930,524 UART: [state] CFI Enabled
26,058,431 UART: [rt] RT listening for mailbox commands...
26,090,607 UART: [rt]cmd =0x44504543, len=92
30,382,859 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,101 writing to cptra_bootfsm_go
190,225 UART:
190,520 UART: Running Caliptra ROM ...
191,635 UART:
10,123,098 UART: [state] CFI Enabled
10,137,123 UART: [state] LifecycleState = Unprovisioned
10,138,976 UART: [state] DebugLocked = No
10,140,806 UART: [state] WD Timer not started. Device not locked for debugging
10,143,748 UART: [kat] SHA2-256
10,322,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,334,441 UART: [kat] ++
10,335,001 UART: [kat] sha1
10,344,855 UART: [kat] SHA2-256
10,347,869 UART: [kat] SHA2-384
10,353,159 UART: [kat] SHA2-512-ACC
10,356,104 UART: [kat] ECC-384
12,795,835 UART: [kat] HMAC-384Kdf
12,807,214 UART: [kat] LMS
13,336,687 UART: [kat] --
13,340,751 UART: [cold-reset] ++
13,341,973 UART: [fht] FHT @ 0x50003400
13,352,882 UART: [idev] ++
13,353,447 UART: [idev] CDI.KEYID = 6
13,354,356 UART: [idev] SUBJECT.KEYID = 7
13,355,601 UART: [idev] UDS.KEYID = 0
13,356,525 ready_for_fw is high
13,356,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,499,925 UART: [idev] Erasing UDS.KEYID = 0
15,828,068 UART: [idev] Sha1 KeyId Algorithm
15,852,541 UART: [idev] --
15,855,749 UART: [ldev] ++
15,856,324 UART: [ldev] CDI.KEYID = 6
15,857,208 UART: [ldev] SUBJECT.KEYID = 5
15,858,418 UART: [ldev] AUTHORITY.KEYID = 7
15,859,651 UART: [ldev] FE.KEYID = 1
15,871,004 UART: [ldev] Erasing FE.KEYID = 1
18,344,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,061,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,077,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,093,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,109,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,130,360 UART: [ldev] --
20,134,878 UART: [fwproc] Wait for Commands...
20,137,894 UART: [fwproc] Recv command 0x46574c44
20,140,010 UART: [fwproc] Recv'd Img size: 114084 bytes
23,536,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,609,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,678,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,995,161 >>> mbox cmd response: success
23,996,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,999,640 UART: [afmc] ++
24,000,227 UART: [afmc] CDI.KEYID = 6
24,001,114 UART: [afmc] SUBJECT.KEYID = 7
24,002,337 UART: [afmc] AUTHORITY.KEYID = 5
26,507,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,227,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,229,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,245,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,261,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,277,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,298,740 UART: [afmc] --
28,303,087 UART: [cold-reset] --
28,306,356 UART: [state] Locking Datavault
28,310,960 UART: [state] Locking PCR0, PCR1 and PCR31
28,312,610 UART: [state] Locking ICCM
28,314,570 UART: [exit] Launching FMC @ 0x40000130
28,323,012 UART:
28,323,251 UART: Running Caliptra FMC ...
28,324,353 UART:
28,324,510 UART: [state] CFI Enabled
28,332,561 UART: [fht] FMC Alias Private Key: 7
30,089,227 UART: [art] Extend RT PCRs Done
30,090,451 UART: [art] Lock RT PCRs Done
30,091,863 UART: [art] Populate DV Done
30,097,413 UART: [fht] FMC Alias Private Key: 7
30,098,964 UART: [art] Derive CDI
30,099,802 UART: [art] Store in in slot 0x4
30,141,973 UART: [art] Derive Key Pair
30,142,974 UART: [art] Store priv key in slot 0x5
32,569,642 UART: [art] Derive Key Pair - Done
32,582,880 UART: [art] Signing Cert with AUTHO
32,584,196 UART: RITY.KEYID = 7
34,289,809 UART: [art] Erasing AUTHORITY.KEYID = 7
34,291,319 UART: [art] PUB.X = 5D48F0994CA2DBFC440E20EAF875E12E81B51E231360193AECBA295096DB9E99E4F50D2DD23BDB8FE26011A718DE6E70
34,298,587 UART: [art] PUB.Y = 31C722AA5541AD15115DABFA5226E86C44058D8497E185AD5B6B87E417E1B9E31FCDD9329C80E25AE9425CA024293A6B
34,305,855 UART: [art] SIG.R = E183D33E1A6C70631D0305FC502DBBA1EE85AC3B47367976F7F79345B2154973031B73AF65FAC901B568BB5F453957C2
34,313,226 UART: [art] SIG.S = 7303A6D0E0655924F1931127934297AE5B74A8C7EF7E3C654F95321F49C15D3813A934A1180CA70A41CEFCBBF93B4BC1
35,292,716 UART: Caliptra RT
35,293,421 UART: [state] CFI Enabled
35,410,859 UART: [rt] RT listening for mailbox commands...
35,443,075 UART: [rt]cmd =0x4d454153, len=108
35,462,064 >>> mbox cmd response data (12 bytes)
35,462,678 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,493,111 UART: [rt]cmd =0x44504543, len=92
39,783,975 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,055 writing to cptra_bootfsm_go
190,197 UART:
190,499 UART: Running Caliptra ROM ...
191,614 UART:
10,433,356 UART: [state] CFI Enabled
10,447,894 UART: [state] LifecycleState = Unprovisioned
10,449,780 UART: [state] DebugLocked = No
10,452,470 UART: [state] WD Timer not started. Device not locked for debugging
10,456,979 UART: [kat] SHA2-256
10,636,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,647,673 UART: [kat] ++
10,648,213 UART: [kat] sha1
10,659,196 UART: [kat] SHA2-256
10,662,216 UART: [kat] SHA2-384
10,668,225 UART: [kat] SHA2-512-ACC
10,671,177 UART: [kat] ECC-384
13,113,484 UART: [kat] HMAC-384Kdf
13,125,357 UART: [kat] LMS
13,654,823 UART: [kat] --
13,658,960 UART: [cold-reset] ++
13,660,537 UART: [fht] FHT @ 0x50003400
13,672,016 UART: [idev] ++
13,672,584 UART: [idev] CDI.KEYID = 6
13,673,468 UART: [idev] SUBJECT.KEYID = 7
13,674,640 UART: [idev] UDS.KEYID = 0
13,675,640 ready_for_fw is high
13,675,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,819,320 UART: [idev] Erasing UDS.KEYID = 0
16,142,485 UART: [idev] Sha1 KeyId Algorithm
16,165,111 UART: [idev] --
16,168,241 UART: [ldev] ++
16,168,845 UART: [ldev] CDI.KEYID = 6
16,169,754 UART: [ldev] SUBJECT.KEYID = 5
16,170,957 UART: [ldev] AUTHORITY.KEYID = 7
16,172,086 UART: [ldev] FE.KEYID = 1
16,183,520 UART: [ldev] Erasing FE.KEYID = 1
18,654,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,374,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,390,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,405,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,421,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,441,793 UART: [ldev] --
20,447,093 UART: [fwproc] Wait for Commands...
20,450,230 UART: [fwproc] Recv command 0x46574c44
20,452,349 UART: [fwproc] Recv'd Img size: 114084 bytes
23,855,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,930,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,998,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
24,315,160 >>> mbox cmd response: success
24,315,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,319,458 UART: [afmc] ++
24,320,047 UART: [afmc] CDI.KEYID = 6
24,320,934 UART: [afmc] SUBJECT.KEYID = 7
24,322,148 UART: [afmc] AUTHORITY.KEYID = 5
26,825,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,546,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,548,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,563,808 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,579,827 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,595,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,617,457 UART: [afmc] --
28,621,987 UART: [cold-reset] --
28,625,102 UART: [state] Locking Datavault
28,630,085 UART: [state] Locking PCR0, PCR1 and PCR31
28,631,734 UART: [state] Locking ICCM
28,634,101 UART: [exit] Launching FMC @ 0x40000130
28,642,504 UART:
28,642,742 UART: Running Caliptra FMC ...
28,643,847 UART:
28,644,009 UART: [state] CFI Enabled
28,652,335 UART: [fht] FMC Alias Private Key: 7
30,408,476 UART: [art] Extend RT PCRs Done
30,409,688 UART: [art] Lock RT PCRs Done
30,411,209 UART: [art] Populate DV Done
30,416,572 UART: [fht] FMC Alias Private Key: 7
30,418,176 UART: [art] Derive CDI
30,419,011 UART: [art] Store in in slot 0x4
30,461,456 UART: [art] Derive Key Pair
30,462,512 UART: [art] Store priv key in slot 0x5
32,889,684 UART: [art] Derive Key Pair - Done
32,903,059 UART: [art] Signing Cert with AUTHO
32,904,365 UART: RITY.KEYID = 7
34,610,036 UART: [art] Erasing AUTHORITY.KEYID = 7
34,611,539 UART: [art] PUB.X = 5D48F0994CA2DBFC440E20EAF875E12E81B51E231360193AECBA295096DB9E99E4F50D2DD23BDB8FE26011A718DE6E70
34,618,865 UART: [art] PUB.Y = 31C722AA5541AD15115DABFA5226E86C44058D8497E185AD5B6B87E417E1B9E31FCDD9329C80E25AE9425CA024293A6B
34,626,120 UART: [art] SIG.R = E183D33E1A6C70631D0305FC502DBBA1EE85AC3B47367976F7F79345B2154973031B73AF65FAC901B568BB5F453957C2
34,633,492 UART: [art] SIG.S = 7303A6D0E0655924F1931127934297AE5B74A8C7EF7E3C654F95321F49C15D3813A934A1180CA70A41CEFCBBF93B4BC1
35,612,443 UART: Caliptra RT
35,613,137 UART: [state] CFI Enabled
35,729,834 UART: [rt] RT listening for mailbox commands...
35,761,896 UART: [rt]cmd =0x44504543, len=96
35,793,856 >>> mbox cmd response data (56 bytes)
35,794,686 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,824,914 UART: [rt]cmd =0x44504543, len=92
40,115,690 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
5,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,420,369 >>> mbox cmd response data (12 bytes)
10,421,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,425,351 >>> mbox cmd response: success
14,425,821 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,678,855 UART:
18,679,238 UART: Running Caliptra FMC ...
18,680,478 UART:
18,680,649 UART: [state] CFI Enabled
18,688,517 UART: [fht] FMC Alias Private Key: 7
20,445,303 UART: [art] Extend RT PCRs Done
20,446,533 UART: [art] Lock RT PCRs Done
20,448,223 UART: [art] Populate DV Done
20,453,859 UART: [fht] FMC Alias Private Key: 7
20,455,466 UART: [art] Derive CDI
20,456,289 UART: [art] Store in in slot 0x4
20,498,842 UART: [art] Derive Key Pair
20,499,897 UART: [art] Store priv key in slot 0x5
22,926,869 UART: [art] Derive Key Pair - Done
22,939,820 UART: [art] Signing Cert with AUTHO
22,941,120 UART: RITY.KEYID = 7
24,646,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,648,245 UART: [art] PUB.X = 647399CCE896431502432747BA82FF9E4604DCEECEDE9D5DFD72FB2D930389BF17CE3FBDC75E99D71CE20A8A1CBF92AC
24,655,516 UART: [art] PUB.Y = C6D75CA8A7CEBB384A0B5B2A33BD95DBCBEEA070403877C48754CA5EA7857B5F8F34C3621BEDB797CE240DD9F08BEF8C
24,662,796 UART: [art] SIG.R = 4CF09646758D7805006D6FDD9699B20F8D9E8E2606DB21FD72D422C39ACA645D658890E8D03ECD251B82C29393BB1A58
24,670,220 UART: [art] SIG.S = 3F825CE5BBEBB231C051404EEE970421C06B7A16A491C94302599F9AC6F0A7D85CED7E3A295AFFCA239D0B8FC863FDEF
25,648,694 UART: Caliptra RT
25,649,415 UART: [state] CFI Enabled
25,776,933 UART: [rt] RT listening for mailbox commands...
25,808,947 UART: [rt]cmd =0x44504543, len=92
30,099,890 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,108 writing to cptra_bootfsm_go
13,499,912 ready_for_fw is high
13,500,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,077,314 >>> mbox cmd response: success
24,078,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,331,952 UART:
28,332,293 UART: Running Caliptra FMC ...
28,333,365 UART:
28,333,525 UART: [state] CFI Enabled
28,341,261 UART: [fht] FMC Alias Private Key: 7
30,098,638 UART: [art] Extend RT PCRs Done
30,100,043 UART: [art] Lock RT PCRs Done
30,101,353 UART: [art] Populate DV Done
30,106,656 UART: [fht] FMC Alias Private Key: 7
30,108,372 UART: [art] Derive CDI
30,109,195 UART: [art] Store in in slot 0x4
30,152,122 UART: [art] Derive Key Pair
30,153,191 UART: [art] Store priv key in slot 0x5
32,579,457 UART: [art] Derive Key Pair - Done
32,592,394 UART: [art] Signing Cert with AUTHO
32,593,700 UART: RITY.KEYID = 7
34,299,200 UART: [art] Erasing AUTHORITY.KEYID = 7
34,300,711 UART: [art] PUB.X = 647399CCE896431502432747BA82FF9E4604DCEECEDE9D5DFD72FB2D930389BF17CE3FBDC75E99D71CE20A8A1CBF92AC
34,308,034 UART: [art] PUB.Y = C6D75CA8A7CEBB384A0B5B2A33BD95DBCBEEA070403877C48754CA5EA7857B5F8F34C3621BEDB797CE240DD9F08BEF8C
34,315,295 UART: [art] SIG.R = 4CF09646758D7805006D6FDD9699B20F8D9E8E2606DB21FD72D422C39ACA645D658890E8D03ECD251B82C29393BB1A58
34,322,718 UART: [art] SIG.S = 3F825CE5BBEBB231C051404EEE970421C06B7A16A491C94302599F9AC6F0A7D85CED7E3A295AFFCA239D0B8FC863FDEF
35,301,759 UART: Caliptra RT
35,302,473 UART: [state] CFI Enabled
35,419,557 UART: [rt] RT listening for mailbox commands...
35,451,622 UART: [rt]cmd =0x4d454153, len=108
35,469,801 >>> mbox cmd response data (12 bytes)
35,470,393 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,500,994 UART: [rt]cmd =0x44504543, len=92
39,791,569 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,121 writing to cptra_bootfsm_go
13,803,984 ready_for_fw is high
13,804,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,374,017 >>> mbox cmd response: success
24,374,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,626,530 UART:
28,626,883 UART: Running Caliptra FMC ...
28,627,961 UART:
28,628,113 UART: [state] CFI Enabled
28,636,609 UART: [fht] FMC Alias Private Key: 7
30,392,928 UART: [art] Extend RT PCRs Done
30,394,340 UART: [art] Lock RT PCRs Done
30,396,129 UART: [art] Populate DV Done
30,401,635 UART: [fht] FMC Alias Private Key: 7
30,403,120 UART: [art] Derive CDI
30,403,894 UART: [art] Store in in slot 0x4
30,446,610 UART: [art] Derive Key Pair
30,447,604 UART: [art] Store priv key in slot 0x5
32,874,522 UART: [art] Derive Key Pair - Done
32,887,637 UART: [art] Signing Cert with AUTHO
32,888,952 UART: RITY.KEYID = 7
34,594,768 UART: [art] Erasing AUTHORITY.KEYID = 7
34,596,266 UART: [art] PUB.X = 647399CCE896431502432747BA82FF9E4604DCEECEDE9D5DFD72FB2D930389BF17CE3FBDC75E99D71CE20A8A1CBF92AC
34,603,595 UART: [art] PUB.Y = C6D75CA8A7CEBB384A0B5B2A33BD95DBCBEEA070403877C48754CA5EA7857B5F8F34C3621BEDB797CE240DD9F08BEF8C
34,610,853 UART: [art] SIG.R = 4CF09646758D7805006D6FDD9699B20F8D9E8E2606DB21FD72D422C39ACA645D658890E8D03ECD251B82C29393BB1A58
34,618,301 UART: [art] SIG.S = 3F825CE5BBEBB231C051404EEE970421C06B7A16A491C94302599F9AC6F0A7D85CED7E3A295AFFCA239D0B8FC863FDEF
35,597,589 UART: Caliptra RT
35,598,298 UART: [state] CFI Enabled
35,714,281 UART: [rt] RT listening for mailbox commands...
35,746,382 UART: [rt]cmd =0x44504543, len=96
35,777,907 >>> mbox cmd response data (56 bytes)
35,778,808 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,809,552 UART: [rt]cmd =0x44504543, len=92
40,100,542 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.62s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,098,927 UART: [afmc] --
19,101,545 UART: [cold-reset] --
19,104,763 UART: [state] Locking Datavault
19,110,617 UART: [state] Locking PCR0, PCR1 and PCR31
19,112,776 UART: [state] Locking ICCM
19,114,746 UART: [exit] Launching FMC @ 0x40000130
19,123,435 UART:
19,123,714 UART: Running Caliptra FMC ...
19,124,750 UART:
19,124,896 UART: [state] CFI Enabled
19,182,362 UART: [fht] FMC Alias Private Key: 7
20,946,289 UART: [art] Extend RT PCRs Done
20,947,516 UART: [art] Lock RT PCRs Done
20,949,132 UART: [art] Populate DV Done
20,954,438 UART: [fht] FMC Alias Private Key: 7
20,956,026 UART: [art] Derive CDI
20,956,837 UART: [art] Store in in slot 0x4
21,014,827 UART: [art] Derive Key Pair
21,015,869 UART: [art] Store priv key in slot 0x5
23,479,225 UART: [art] Derive Key Pair - Done
23,492,172 UART: [art] Signing Cert with AUTHO
23,493,480 UART: RITY.KEYID = 7
25,204,510 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,014 UART: [art] PUB.X = FF057F14493FA386F4E4C5E2401D7EA47E07A2485E83CBA70F9D3066F729846DA79E783B829CDA79441AB3E2E222ABF7
25,213,295 UART: [art] PUB.Y = 3120E68B603D80CF3EA98DD6A4C435C6D057AA4CCC5F2194851F00CDA5166A16883D730303706867AD2119D361B27A75
25,220,545 UART: [art] SIG.R = A1DFFDF4E652B3885E6D2E74903C5CBE1A77A9D076F957008296B5AF4A88F1B247A852293A754F3CC7D427CE35B80E2B
25,227,923 UART: [art] SIG.S = 298AACD66D4935AD487111299B44A4AEB847ADFC34430CD5E5B62FC1A73EB4E9B502EB4E13F8B04990E0AABDA036CDC9
26,206,826 UART: Caliptra RT
26,207,512 UART: [state] CFI Enabled
26,384,232 UART: [rt] RT listening for mailbox commands...
26,416,116 UART: [rt]cmd =0x44504543, len=92
30,763,876 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,111 writing to cptra_bootfsm_go
190,197 UART:
190,490 UART: Running Caliptra ROM ...
191,511 UART:
191,647 UART: [state] CFI Enabled
251,077 UART: [state] LifecycleState = Unprovisioned
253,443 UART: [state] DebugLocked = No
255,899 UART: [state] WD Timer not started. Device not locked for debugging
259,902 UART: [kat] SHA2-256
449,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
460,548 UART: [kat] ++
461,019 UART: [kat] sha1
471,777 UART: [kat] SHA2-256
474,805 UART: [kat] SHA2-384
479,665 UART: [kat] SHA2-512-ACC
482,253 UART: [kat] ECC-384
2,933,443 UART: [kat] HMAC-384Kdf
2,956,893 UART: [kat] LMS
3,488,670 UART: [kat] --
3,493,237 UART: [cold-reset] ++
3,495,533 UART: [fht] FHT @ 0x50003400
3,507,651 UART: [idev] ++
3,508,288 UART: [idev] CDI.KEYID = 6
3,509,271 UART: [idev] SUBJECT.KEYID = 7
3,510,516 UART: [idev] UDS.KEYID = 0
3,511,439 ready_for_fw is high
3,511,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,655,030 UART: [idev] Erasing UDS.KEYID = 0
6,019,078 UART: [idev] Sha1 KeyId Algorithm
6,042,059 UART: [idev] --
6,047,348 UART: [ldev] ++
6,048,028 UART: [ldev] CDI.KEYID = 6
6,048,940 UART: [ldev] SUBJECT.KEYID = 5
6,050,110 UART: [ldev] AUTHORITY.KEYID = 7
6,051,342 UART: [ldev] FE.KEYID = 1
6,086,570 UART: [ldev] Erasing FE.KEYID = 1
8,591,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,578 UART: [ldev] --
10,399,445 UART: [fwproc] Wait for Commands...
10,400,894 UART: [fwproc] Recv command 0x46574c44
10,402,906 UART: [fwproc] Recv'd Img size: 114084 bytes
13,845,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,043,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,584,221 >>> mbox cmd response: success
14,584,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,588,770 UART: [afmc] ++
14,589,460 UART: [afmc] CDI.KEYID = 6
14,590,708 UART: [afmc] SUBJECT.KEYID = 7
14,592,149 UART: [afmc] AUTHORITY.KEYID = 5
17,138,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,881,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,883,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,898,743 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,913,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,928,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,952,134 UART: [afmc] --
18,955,780 UART: [cold-reset] --
18,960,346 UART: [state] Locking Datavault
18,965,718 UART: [state] Locking PCR0, PCR1 and PCR31
18,967,872 UART: [state] Locking ICCM
18,969,378 UART: [exit] Launching FMC @ 0x40000130
18,978,045 UART:
18,978,285 UART: Running Caliptra FMC ...
18,979,317 UART:
18,979,463 UART: [state] CFI Enabled
19,038,388 UART: [fht] FMC Alias Private Key: 7
20,802,667 UART: [art] Extend RT PCRs Done
20,803,880 UART: [art] Lock RT PCRs Done
20,805,857 UART: [art] Populate DV Done
20,811,158 UART: [fht] FMC Alias Private Key: 7
20,812,897 UART: [art] Derive CDI
20,813,735 UART: [art] Store in in slot 0x4
20,870,636 UART: [art] Derive Key Pair
20,871,633 UART: [art] Store priv key in slot 0x5
23,334,072 UART: [art] Derive Key Pair - Done
23,347,500 UART: [art] Signing Cert with AUTHO
23,348,796 UART: RITY.KEYID = 7
25,060,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,061,552 UART: [art] PUB.X = FF057F14493FA386F4E4C5E2401D7EA47E07A2485E83CBA70F9D3066F729846DA79E783B829CDA79441AB3E2E222ABF7
25,068,812 UART: [art] PUB.Y = 3120E68B603D80CF3EA98DD6A4C435C6D057AA4CCC5F2194851F00CDA5166A16883D730303706867AD2119D361B27A75
25,076,080 UART: [art] SIG.R = A1DFFDF4E652B3885E6D2E74903C5CBE1A77A9D076F957008296B5AF4A88F1B247A852293A754F3CC7D427CE35B80E2B
25,083,446 UART: [art] SIG.S = 298AACD66D4935AD487111299B44A4AEB847ADFC34430CD5E5B62FC1A73EB4E9B502EB4E13F8B04990E0AABDA036CDC9
26,062,811 UART: Caliptra RT
26,063,529 UART: [state] CFI Enabled
26,227,981 UART: [rt] RT listening for mailbox commands...
26,260,312 UART: [rt]cmd =0x4d454153, len=108
26,278,626 >>> mbox cmd response data (12 bytes)
26,279,158 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,309,738 UART: [rt]cmd =0x44504543, len=92
30,663,122 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,059 writing to cptra_bootfsm_go
190,119 UART:
190,412 UART: Running Caliptra ROM ...
191,631 UART:
191,781 UART: [state] CFI Enabled
255,804 UART: [state] LifecycleState = Unprovisioned
258,174 UART: [state] DebugLocked = No
259,780 UART: [state] WD Timer not started. Device not locked for debugging
265,062 UART: [kat] SHA2-256
454,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,686 UART: [kat] ++
466,219 UART: [kat] sha1
478,398 UART: [kat] SHA2-256
481,410 UART: [kat] SHA2-384
487,982 UART: [kat] SHA2-512-ACC
490,573 UART: [kat] ECC-384
2,933,831 UART: [kat] HMAC-384Kdf
2,959,352 UART: [kat] LMS
3,491,098 UART: [kat] --
3,494,978 UART: [cold-reset] ++
3,497,058 UART: [fht] FHT @ 0x50003400
3,508,965 UART: [idev] ++
3,509,682 UART: [idev] CDI.KEYID = 6
3,510,589 UART: [idev] SUBJECT.KEYID = 7
3,511,832 UART: [idev] UDS.KEYID = 0
3,512,755 ready_for_fw is high
3,512,939 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,656,682 UART: [idev] Erasing UDS.KEYID = 0
6,018,962 UART: [idev] Sha1 KeyId Algorithm
6,040,976 UART: [idev] --
6,046,625 UART: [ldev] ++
6,047,313 UART: [ldev] CDI.KEYID = 6
6,048,201 UART: [ldev] SUBJECT.KEYID = 5
6,049,417 UART: [ldev] AUTHORITY.KEYID = 7
6,050,597 UART: [ldev] FE.KEYID = 1
6,089,312 UART: [ldev] Erasing FE.KEYID = 1
8,595,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,687 UART: [ldev] --
10,400,894 UART: [fwproc] Wait for Commands...
10,402,349 UART: [fwproc] Recv command 0x46574c44
10,404,644 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,593,005 >>> mbox cmd response: success
14,593,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,597,502 UART: [afmc] ++
14,598,280 UART: [afmc] CDI.KEYID = 6
14,599,339 UART: [afmc] SUBJECT.KEYID = 7
14,600,891 UART: [afmc] AUTHORITY.KEYID = 5
17,135,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,861,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,863,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,878,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,893,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,908,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,931,965 UART: [afmc] --
18,936,050 UART: [cold-reset] --
18,939,176 UART: [state] Locking Datavault
18,945,734 UART: [state] Locking PCR0, PCR1 and PCR31
18,947,889 UART: [state] Locking ICCM
18,950,692 UART: [exit] Launching FMC @ 0x40000130
18,959,372 UART:
18,959,607 UART: Running Caliptra FMC ...
18,960,704 UART:
18,960,861 UART: [state] CFI Enabled
19,018,107 UART: [fht] FMC Alias Private Key: 7
20,782,517 UART: [art] Extend RT PCRs Done
20,783,740 UART: [art] Lock RT PCRs Done
20,785,339 UART: [art] Populate DV Done
20,790,852 UART: [fht] FMC Alias Private Key: 7
20,792,384 UART: [art] Derive CDI
20,793,134 UART: [art] Store in in slot 0x4
20,851,178 UART: [art] Derive Key Pair
20,852,217 UART: [art] Store priv key in slot 0x5
23,315,146 UART: [art] Derive Key Pair - Done
23,327,705 UART: [art] Signing Cert with AUTHO
23,329,041 UART: RITY.KEYID = 7
25,040,501 UART: [art] Erasing AUTHORITY.KEYID = 7
25,042,003 UART: [art] PUB.X = FF057F14493FA386F4E4C5E2401D7EA47E07A2485E83CBA70F9D3066F729846DA79E783B829CDA79441AB3E2E222ABF7
25,049,271 UART: [art] PUB.Y = 3120E68B603D80CF3EA98DD6A4C435C6D057AA4CCC5F2194851F00CDA5166A16883D730303706867AD2119D361B27A75
25,056,518 UART: [art] SIG.R = A1DFFDF4E652B3885E6D2E74903C5CBE1A77A9D076F957008296B5AF4A88F1B247A852293A754F3CC7D427CE35B80E2B
25,063,893 UART: [art] SIG.S = 298AACD66D4935AD487111299B44A4AEB847ADFC34430CD5E5B62FC1A73EB4E9B502EB4E13F8B04990E0AABDA036CDC9
26,043,426 UART: Caliptra RT
26,044,143 UART: [state] CFI Enabled
26,206,874 UART: [rt] RT listening for mailbox commands...
26,239,257 UART: [rt]cmd =0x44504543, len=96
26,270,519 >>> mbox cmd response data (56 bytes)
26,271,406 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,301,734 UART: [rt]cmd =0x44504543, len=92
30,643,474 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,252,660 >>> mbox cmd response data (12 bytes)
10,254,082 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,881,025 >>> mbox cmd response: success
14,881,491 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,173,818 UART:
19,174,217 UART: Running Caliptra FMC ...
19,175,459 UART:
19,175,618 UART: [state] CFI Enabled
19,244,925 UART: [fht] FMC Alias Private Key: 7
21,008,802 UART: [art] Extend RT PCRs Done
21,010,036 UART: [art] Lock RT PCRs Done
21,011,724 UART: [art] Populate DV Done
21,017,259 UART: [fht] FMC Alias Private Key: 7
21,018,745 UART: [art] Derive CDI
21,019,505 UART: [art] Store in in slot 0x4
21,077,509 UART: [art] Derive Key Pair
21,078,554 UART: [art] Store priv key in slot 0x5
23,541,853 UART: [art] Derive Key Pair - Done
23,554,851 UART: [art] Signing Cert with AUTHO
23,556,177 UART: RITY.KEYID = 7
25,268,412 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,934 UART: [art] PUB.X = 2993DAEA4C83FB220DFE2D0165A490F1698EA70B7C55E245DE341DFB23E33BDFC90EA9F9A0FE40E95B2E2128D6A70FEE
25,277,217 UART: [art] PUB.Y = 694D956215D07A5E821CD29B72C71F8C4B0F97188BF39A31245AFAB635E4D570DBC0D4D8DB9EE2E598A7FBF22E2D090B
25,284,452 UART: [art] SIG.R = 030E06FA0D86E0B15CF5C6A4D5C6A4BDCC4CC4CD9A60982D8046ED5E6F4B2AB19AFFFE2DCC633366A0379812C58D9C12
25,291,878 UART: [art] SIG.S = A503A3CB649920659C2F1A1D31AE1F84FE7A1AFBA440557AB3BC80F38E6A35D655D8E44772AFC7E5A54AEBC5874DAA6D
26,270,689 UART: Caliptra RT
26,271,384 UART: [state] CFI Enabled
26,448,509 UART: [rt] RT listening for mailbox commands...
26,480,514 UART: [rt]cmd =0x44504543, len=92
30,829,814 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
3,427,530 ready_for_fw is high
3,427,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,713,641 >>> mbox cmd response: success
14,714,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,993,072 UART:
18,993,407 UART: Running Caliptra FMC ...
18,994,450 UART:
18,994,596 UART: [state] CFI Enabled
19,063,521 UART: [fht] FMC Alias Private Key: 7
20,826,976 UART: [art] Extend RT PCRs Done
20,828,194 UART: [art] Lock RT PCRs Done
20,830,058 UART: [art] Populate DV Done
20,835,525 UART: [fht] FMC Alias Private Key: 7
20,837,052 UART: [art] Derive CDI
20,837,787 UART: [art] Store in in slot 0x4
20,896,369 UART: [art] Derive Key Pair
20,897,409 UART: [art] Store priv key in slot 0x5
23,360,372 UART: [art] Derive Key Pair - Done
23,373,213 UART: [art] Signing Cert with AUTHO
23,374,510 UART: RITY.KEYID = 7
25,086,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,088,246 UART: [art] PUB.X = 2993DAEA4C83FB220DFE2D0165A490F1698EA70B7C55E245DE341DFB23E33BDFC90EA9F9A0FE40E95B2E2128D6A70FEE
25,095,404 UART: [art] PUB.Y = 694D956215D07A5E821CD29B72C71F8C4B0F97188BF39A31245AFAB635E4D570DBC0D4D8DB9EE2E598A7FBF22E2D090B
25,102,693 UART: [art] SIG.R = 030E06FA0D86E0B15CF5C6A4D5C6A4BDCC4CC4CD9A60982D8046ED5E6F4B2AB19AFFFE2DCC633366A0379812C58D9C12
25,110,089 UART: [art] SIG.S = A503A3CB649920659C2F1A1D31AE1F84FE7A1AFBA440557AB3BC80F38E6A35D655D8E44772AFC7E5A54AEBC5874DAA6D
26,089,324 UART: Caliptra RT
26,090,038 UART: [state] CFI Enabled
26,254,540 UART: [rt] RT listening for mailbox commands...
26,286,767 UART: [rt]cmd =0x4d454153, len=108
26,304,864 >>> mbox cmd response data (12 bytes)
26,305,418 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,335,678 UART: [rt]cmd =0x44504543, len=92
30,691,000 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,055 writing to cptra_bootfsm_go
3,425,676 ready_for_fw is high
3,426,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,721,406 >>> mbox cmd response: success
14,721,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,016,400 UART:
19,016,738 UART: Running Caliptra FMC ...
19,017,797 UART:
19,017,949 UART: [state] CFI Enabled
19,085,000 UART: [fht] FMC Alias Private Key: 7
20,848,282 UART: [art] Extend RT PCRs Done
20,849,507 UART: [art] Lock RT PCRs Done
20,851,097 UART: [art] Populate DV Done
20,856,307 UART: [fht] FMC Alias Private Key: 7
20,857,898 UART: [art] Derive CDI
20,858,709 UART: [art] Store in in slot 0x4
20,917,611 UART: [art] Derive Key Pair
20,918,610 UART: [art] Store priv key in slot 0x5
23,381,888 UART: [art] Derive Key Pair - Done
23,394,678 UART: [art] Signing Cert with AUTHO
23,395,975 UART: RITY.KEYID = 7
25,107,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,153 UART: [art] PUB.X = 2993DAEA4C83FB220DFE2D0165A490F1698EA70B7C55E245DE341DFB23E33BDFC90EA9F9A0FE40E95B2E2128D6A70FEE
25,116,465 UART: [art] PUB.Y = 694D956215D07A5E821CD29B72C71F8C4B0F97188BF39A31245AFAB635E4D570DBC0D4D8DB9EE2E598A7FBF22E2D090B
25,123,712 UART: [art] SIG.R = 030E06FA0D86E0B15CF5C6A4D5C6A4BDCC4CC4CD9A60982D8046ED5E6F4B2AB19AFFFE2DCC633366A0379812C58D9C12
25,131,143 UART: [art] SIG.S = A503A3CB649920659C2F1A1D31AE1F84FE7A1AFBA440557AB3BC80F38E6A35D655D8E44772AFC7E5A54AEBC5874DAA6D
26,110,237 UART: Caliptra RT
26,110,956 UART: [state] CFI Enabled
26,276,425 UART: [rt] RT listening for mailbox commands...
26,308,598 UART: [rt]cmd =0x44504543, len=96
26,339,187 >>> mbox cmd response data (56 bytes)
26,340,016 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,370,403 UART: [rt]cmd =0x44504543, len=92
30,734,053 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.73s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,297,655 UART: [afmc] --
19,301,581 UART: [cold-reset] --
19,305,120 UART: [state] Locking Datavault
19,310,251 UART: [state] Locking PCR0, PCR1 and PCR31
19,312,412 UART: [state] Locking ICCM
19,315,035 UART: [exit] Launching FMC @ 0x40000130
19,323,721 UART:
19,323,964 UART: Running Caliptra FMC ...
19,325,012 UART:
19,325,163 UART: [state] CFI Enabled
19,333,427 UART: [fht] FMC Alias Private Key: 7
21,089,882 UART: [art] Extend RT PCRs Done
21,091,116 UART: [art] Lock RT PCRs Done
21,092,700 UART: [art] Populate DV Done
21,098,333 UART: [fht] FMC Alias Private Key: 7
21,099,928 UART: [art] Derive CDI
21,100,747 UART: [art] Store in in slot 0x4
21,143,340 UART: [art] Derive Key Pair
21,144,341 UART: [art] Store priv key in slot 0x5
23,571,297 UART: [art] Derive Key Pair - Done
23,584,452 UART: [art] Signing Cert with AUTHO
23,585,762 UART: RITY.KEYID = 7
25,291,492 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,005 UART: [art] PUB.X = 67053ABC5E553D34892E462D66EBEA79A1387216DC129BF3ED666E95D96A71E2A7F706C3FAED96FA18D7AF534AC149E7
25,300,312 UART: [art] PUB.Y = 890B0FA97243EBAF52CF3706DB602AEC67D3C5254B97C2AF6B4D9FEC5141D652C494737468BEDF3D884A9809617491DF
25,307,550 UART: [art] SIG.R = FD748E105C343F17684E3C16ADB4AA6ABE3DFF4EE33656DC6CE351D90BB4AB3B65843A78879B8ED1D9E17C45224F3A21
25,314,981 UART: [art] SIG.S = CCF5E58BAFB5842C613490094003D686FFED025F344ECA5F5C10DB621624CCFFC46EDA93831AE8127AC429287152DAB3
26,293,823 UART: Caliptra RT
26,294,534 UART: [state] CFI Enabled
26,422,880 UART: [rt] RT listening for mailbox commands...
26,454,810 UART: [rt]cmd =0x44504543, len=92
30,744,566 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,106 writing to cptra_bootfsm_go
190,248 UART:
190,545 UART: Running Caliptra ROM ...
191,664 UART:
9,756,957 UART: [state] CFI Enabled
9,771,038 UART: [state] LifecycleState = Unprovisioned
9,773,047 UART: [state] DebugLocked = No
9,774,619 UART: [state] WD Timer not started. Device not locked for debugging
9,779,001 UART: [kat] SHA2-256
9,968,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,979,666 UART: [kat] ++
9,980,201 UART: [kat] sha1
9,991,870 UART: [kat] SHA2-256
9,994,889 UART: [kat] SHA2-384
9,999,617 UART: [kat] SHA2-512-ACC
10,002,219 UART: [kat] ECC-384
12,446,335 UART: [kat] HMAC-384Kdf
12,459,929 UART: [kat] LMS
12,991,741 UART: [kat] --
12,996,530 UART: [cold-reset] ++
12,998,394 UART: [fht] FHT @ 0x50003400
13,010,592 UART: [idev] ++
13,011,307 UART: [idev] CDI.KEYID = 6
13,012,541 UART: [idev] SUBJECT.KEYID = 7
13,013,579 UART: [idev] UDS.KEYID = 0
13,014,562 ready_for_fw is high
13,014,768 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,157,804 UART: [idev] Erasing UDS.KEYID = 0
15,487,457 UART: [idev] Sha1 KeyId Algorithm
15,508,861 UART: [idev] --
15,513,045 UART: [ldev] ++
15,513,734 UART: [ldev] CDI.KEYID = 6
15,514,615 UART: [ldev] SUBJECT.KEYID = 5
15,515,822 UART: [ldev] AUTHORITY.KEYID = 7
15,517,013 UART: [ldev] FE.KEYID = 1
15,528,930 UART: [ldev] Erasing FE.KEYID = 1
18,009,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,732,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,747,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,762,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,777,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,798,580 UART: [ldev] --
19,803,415 UART: [fwproc] Wait for Commands...
19,805,023 UART: [fwproc] Recv command 0x46574c44
19,807,357 UART: [fwproc] Recv'd Img size: 114084 bytes
23,248,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,321,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,438,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,978,267 >>> mbox cmd response: success
23,979,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,981,983 UART: [afmc] ++
23,982,675 UART: [afmc] CDI.KEYID = 6
23,983,837 UART: [afmc] SUBJECT.KEYID = 7
23,985,381 UART: [afmc] AUTHORITY.KEYID = 5
26,488,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,210,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,212,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,227,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,242,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,257,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,280,904 UART: [afmc] --
28,283,685 UART: [cold-reset] --
28,288,041 UART: [state] Locking Datavault
28,294,237 UART: [state] Locking PCR0, PCR1 and PCR31
28,296,430 UART: [state] Locking ICCM
28,297,864 UART: [exit] Launching FMC @ 0x40000130
28,306,544 UART:
28,306,780 UART: Running Caliptra FMC ...
28,307,884 UART:
28,308,043 UART: [state] CFI Enabled
28,315,931 UART: [fht] FMC Alias Private Key: 7
30,072,663 UART: [art] Extend RT PCRs Done
30,073,889 UART: [art] Lock RT PCRs Done
30,075,488 UART: [art] Populate DV Done
30,080,796 UART: [fht] FMC Alias Private Key: 7
30,082,389 UART: [art] Derive CDI
30,083,128 UART: [art] Store in in slot 0x4
30,125,938 UART: [art] Derive Key Pair
30,126,936 UART: [art] Store priv key in slot 0x5
32,554,134 UART: [art] Derive Key Pair - Done
32,567,348 UART: [art] Signing Cert with AUTHO
32,568,658 UART: RITY.KEYID = 7
34,274,264 UART: [art] Erasing AUTHORITY.KEYID = 7
34,275,766 UART: [art] PUB.X = 67053ABC5E553D34892E462D66EBEA79A1387216DC129BF3ED666E95D96A71E2A7F706C3FAED96FA18D7AF534AC149E7
34,283,092 UART: [art] PUB.Y = 890B0FA97243EBAF52CF3706DB602AEC67D3C5254B97C2AF6B4D9FEC5141D652C494737468BEDF3D884A9809617491DF
34,290,346 UART: [art] SIG.R = FD748E105C343F17684E3C16ADB4AA6ABE3DFF4EE33656DC6CE351D90BB4AB3B65843A78879B8ED1D9E17C45224F3A21
34,297,800 UART: [art] SIG.S = CCF5E58BAFB5842C613490094003D686FFED025F344ECA5F5C10DB621624CCFFC46EDA93831AE8127AC429287152DAB3
35,276,230 UART: Caliptra RT
35,276,947 UART: [state] CFI Enabled
35,394,170 UART: [rt] RT listening for mailbox commands...
35,425,949 UART: [rt]cmd =0x4d454153, len=108
35,444,473 >>> mbox cmd response data (12 bytes)
35,445,061 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,475,592 UART: [rt]cmd =0x44504543, len=92
39,766,208 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,078 writing to cptra_bootfsm_go
190,190 UART:
190,487 UART: Running Caliptra ROM ...
191,546 UART:
10,080,106 UART: [state] CFI Enabled
10,093,492 UART: [state] LifecycleState = Unprovisioned
10,095,861 UART: [state] DebugLocked = No
10,098,624 UART: [state] WD Timer not started. Device not locked for debugging
10,102,593 UART: [kat] SHA2-256
10,292,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,303,302 UART: [kat] ++
10,303,757 UART: [kat] sha1
10,315,847 UART: [kat] SHA2-256
10,318,862 UART: [kat] SHA2-384
10,324,794 UART: [kat] SHA2-512-ACC
10,327,396 UART: [kat] ECC-384
12,769,364 UART: [kat] HMAC-384Kdf
12,782,017 UART: [kat] LMS
13,313,834 UART: [kat] --
13,317,254 UART: [cold-reset] ++
13,319,117 UART: [fht] FHT @ 0x50003400
13,330,881 UART: [idev] ++
13,331,587 UART: [idev] CDI.KEYID = 6
13,332,514 UART: [idev] SUBJECT.KEYID = 7
13,333,692 UART: [idev] UDS.KEYID = 0
13,334,616 ready_for_fw is high
13,334,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,478,378 UART: [idev] Erasing UDS.KEYID = 0
15,806,625 UART: [idev] Sha1 KeyId Algorithm
15,830,081 UART: [idev] --
15,833,752 UART: [ldev] ++
15,834,486 UART: [ldev] CDI.KEYID = 6
15,835,394 UART: [ldev] SUBJECT.KEYID = 5
15,836,551 UART: [ldev] AUTHORITY.KEYID = 7
15,837,794 UART: [ldev] FE.KEYID = 1
15,847,954 UART: [ldev] Erasing FE.KEYID = 1
18,326,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,045,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,060,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,075,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,091,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,112,192 UART: [ldev] --
20,117,579 UART: [fwproc] Wait for Commands...
20,120,826 UART: [fwproc] Recv command 0x46574c44
20,123,101 UART: [fwproc] Recv'd Img size: 114084 bytes
23,574,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,654,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,771,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
24,312,255 >>> mbox cmd response: success
24,312,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,315,839 UART: [afmc] ++
24,316,538 UART: [afmc] CDI.KEYID = 6
24,317,790 UART: [afmc] SUBJECT.KEYID = 7
24,319,234 UART: [afmc] AUTHORITY.KEYID = 5
26,823,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,548,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,550,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,565,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,580,508 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,595,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,618,569 UART: [afmc] --
28,621,782 UART: [cold-reset] --
28,626,457 UART: [state] Locking Datavault
28,633,171 UART: [state] Locking PCR0, PCR1 and PCR31
28,635,325 UART: [state] Locking ICCM
28,637,592 UART: [exit] Launching FMC @ 0x40000130
28,646,274 UART:
28,646,511 UART: Running Caliptra FMC ...
28,647,613 UART:
28,647,772 UART: [state] CFI Enabled
28,656,413 UART: [fht] FMC Alias Private Key: 7
30,413,156 UART: [art] Extend RT PCRs Done
30,414,383 UART: [art] Lock RT PCRs Done
30,416,161 UART: [art] Populate DV Done
30,421,426 UART: [fht] FMC Alias Private Key: 7
30,423,027 UART: [art] Derive CDI
30,423,772 UART: [art] Store in in slot 0x4
30,466,524 UART: [art] Derive Key Pair
30,467,530 UART: [art] Store priv key in slot 0x5
32,894,524 UART: [art] Derive Key Pair - Done
32,907,517 UART: [art] Signing Cert with AUTHO
32,908,856 UART: RITY.KEYID = 7
34,613,958 UART: [art] Erasing AUTHORITY.KEYID = 7
34,615,469 UART: [art] PUB.X = 67053ABC5E553D34892E462D66EBEA79A1387216DC129BF3ED666E95D96A71E2A7F706C3FAED96FA18D7AF534AC149E7
34,622,730 UART: [art] PUB.Y = 890B0FA97243EBAF52CF3706DB602AEC67D3C5254B97C2AF6B4D9FEC5141D652C494737468BEDF3D884A9809617491DF
34,630,051 UART: [art] SIG.R = FD748E105C343F17684E3C16ADB4AA6ABE3DFF4EE33656DC6CE351D90BB4AB3B65843A78879B8ED1D9E17C45224F3A21
34,637,419 UART: [art] SIG.S = CCF5E58BAFB5842C613490094003D686FFED025F344ECA5F5C10DB621624CCFFC46EDA93831AE8127AC429287152DAB3
35,616,371 UART: Caliptra RT
35,617,216 UART: [state] CFI Enabled
35,735,203 UART: [rt] RT listening for mailbox commands...
35,767,261 UART: [rt]cmd =0x44504543, len=96
35,798,722 >>> mbox cmd response data (56 bytes)
35,799,588 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,830,018 UART: [rt]cmd =0x44504543, len=92
40,121,128 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
4,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,472,476 >>> mbox cmd response data (12 bytes)
10,473,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,113,181 >>> mbox cmd response: success
15,113,668 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,372,705 UART:
19,373,105 UART: Running Caliptra FMC ...
19,374,253 UART:
19,374,411 UART: [state] CFI Enabled
19,382,375 UART: [fht] FMC Alias Private Key: 7
21,138,974 UART: [art] Extend RT PCRs Done
21,140,197 UART: [art] Lock RT PCRs Done
21,141,560 UART: [art] Populate DV Done
21,147,102 UART: [fht] FMC Alias Private Key: 7
21,148,807 UART: [art] Derive CDI
21,149,625 UART: [art] Store in in slot 0x4
21,192,186 UART: [art] Derive Key Pair
21,193,233 UART: [art] Store priv key in slot 0x5
23,619,644 UART: [art] Derive Key Pair - Done
23,632,368 UART: [art] Signing Cert with AUTHO
23,633,704 UART: RITY.KEYID = 7
25,339,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,340,613 UART: [art] PUB.X = 96A4859DFDCA3CACD6152D777236B358DE30F158EE987C9C6032151BC5C1200697E7AE934965A82822BC6E10E6C86312
25,347,865 UART: [art] PUB.Y = 9C2348B78C4CF5914C599EC52C4BFD89689E85847CE0534645326A559F90CDDA9B5A0E818D3B688BF20CF0B5C698F024
25,355,085 UART: [art] SIG.R = D03BC5D6641F7B10885EE15C27044DD4D5573BE2D8997A37A90F98764272EB332EFE4C5E1C9C28722066ED61AB47D429
25,362,497 UART: [art] SIG.S = 8BCCAA9748EF61354A1453ABAA8A98850A10E761E82780B3DCAB6B80FDF5FF3CF56744411142F9A27B5D6DE0F1849876
26,341,026 UART: Caliptra RT
26,341,741 UART: [state] CFI Enabled
26,470,112 UART: [rt] RT listening for mailbox commands...
26,501,913 UART: [rt]cmd =0x44504543, len=92
30,792,847 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,085 writing to cptra_bootfsm_go
12,864,161 ready_for_fw is high
12,864,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,046,148 >>> mbox cmd response: success
24,047,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,298,589 UART:
28,298,935 UART: Running Caliptra FMC ...
28,300,006 UART:
28,300,168 UART: [state] CFI Enabled
28,308,181 UART: [fht] FMC Alias Private Key: 7
30,064,607 UART: [art] Extend RT PCRs Done
30,065,837 UART: [art] Lock RT PCRs Done
30,067,683 UART: [art] Populate DV Done
30,072,993 UART: [fht] FMC Alias Private Key: 7
30,074,489 UART: [art] Derive CDI
30,075,227 UART: [art] Store in in slot 0x4
30,118,254 UART: [art] Derive Key Pair
30,119,295 UART: [art] Store priv key in slot 0x5
32,546,335 UART: [art] Derive Key Pair - Done
32,559,065 UART: [art] Signing Cert with AUTHO
32,560,377 UART: RITY.KEYID = 7
34,265,872 UART: [art] Erasing AUTHORITY.KEYID = 7
34,267,392 UART: [art] PUB.X = 96A4859DFDCA3CACD6152D777236B358DE30F158EE987C9C6032151BC5C1200697E7AE934965A82822BC6E10E6C86312
34,274,636 UART: [art] PUB.Y = 9C2348B78C4CF5914C599EC52C4BFD89689E85847CE0534645326A559F90CDDA9B5A0E818D3B688BF20CF0B5C698F024
34,281,911 UART: [art] SIG.R = D03BC5D6641F7B10885EE15C27044DD4D5573BE2D8997A37A90F98764272EB332EFE4C5E1C9C28722066ED61AB47D429
34,289,307 UART: [art] SIG.S = 8BCCAA9748EF61354A1453ABAA8A98850A10E761E82780B3DCAB6B80FDF5FF3CF56744411142F9A27B5D6DE0F1849876
35,268,204 UART: Caliptra RT
35,268,917 UART: [state] CFI Enabled
35,386,360 UART: [rt] RT listening for mailbox commands...
35,418,370 UART: [rt]cmd =0x4d454153, len=108
35,437,466 >>> mbox cmd response data (12 bytes)
35,438,006 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,468,386 UART: [rt]cmd =0x44504543, len=92
39,759,240 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
13,195,602 ready_for_fw is high
13,195,970 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,403,198 >>> mbox cmd response: success
24,403,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,655,927 UART:
28,656,279 UART: Running Caliptra FMC ...
28,657,328 UART:
28,657,485 UART: [state] CFI Enabled
28,665,819 UART: [fht] FMC Alias Private Key: 7
30,423,039 UART: [art] Extend RT PCRs Done
30,424,267 UART: [art] Lock RT PCRs Done
30,426,054 UART: [art] Populate DV Done
30,431,314 UART: [fht] FMC Alias Private Key: 7
30,432,960 UART: [art] Derive CDI
30,433,777 UART: [art] Store in in slot 0x4
30,476,216 UART: [art] Derive Key Pair
30,477,255 UART: [art] Store priv key in slot 0x5
32,904,060 UART: [art] Derive Key Pair - Done
32,916,736 UART: [art] Signing Cert with AUTHO
32,918,046 UART: RITY.KEYID = 7
34,623,118 UART: [art] Erasing AUTHORITY.KEYID = 7
34,624,650 UART: [art] PUB.X = 96A4859DFDCA3CACD6152D777236B358DE30F158EE987C9C6032151BC5C1200697E7AE934965A82822BC6E10E6C86312
34,631,894 UART: [art] PUB.Y = 9C2348B78C4CF5914C599EC52C4BFD89689E85847CE0534645326A559F90CDDA9B5A0E818D3B688BF20CF0B5C698F024
34,639,126 UART: [art] SIG.R = D03BC5D6641F7B10885EE15C27044DD4D5573BE2D8997A37A90F98764272EB332EFE4C5E1C9C28722066ED61AB47D429
34,646,513 UART: [art] SIG.S = 8BCCAA9748EF61354A1453ABAA8A98850A10E761E82780B3DCAB6B80FDF5FF3CF56744411142F9A27B5D6DE0F1849876
35,625,316 UART: Caliptra RT
35,626,008 UART: [state] CFI Enabled
35,743,337 UART: [rt] RT listening for mailbox commands...
35,775,396 UART: [rt]cmd =0x44504543, len=96
35,806,879 >>> mbox cmd response data (56 bytes)
35,807,661 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,838,370 UART: [rt]cmd =0x44504543, len=92
40,129,825 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 5.65s
Truncated 5006 bytes from beginning
5E8584DECB4080DA16FB47B607265F6993575
3,436,437 UART: [art] PUB.Y = 827A76F715C2DA618164A1D5A765DE4415B44FCEC520685857C04BC0DC6FD7EECD8D26314B47D635A5A53949C23A03CE
3,443,392 UART: [art] SIG.R = 3376A0282B6CA08EE73716FE5C7C18A51209C247E129ACFE2A7EC8109F211FC200C3AA4010031F5CBD36B5C0FD4BC734
3,450,144 UART: [art] SIG.S = DD7A3F842AC62246578D93A247363B02EF9AF02396D09846183C3AC218BE1128DC4A369136213B0AB4F03F13A7343D69
3,474,095 UART: Caliptra RT
3,474,348 UART: [state] CFI Enabled
3,594,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,717 UART: [rt]cmd =0x44504543, len=92
3,816,627 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,323 UART: [kat] SHA2-256
892,261 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
902,456 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,676 UART: [idev] ++
1,479,844 UART: [idev] CDI.KEYID = 6
1,480,204 UART: [idev] SUBJECT.KEYID = 7
1,480,628 UART: [idev] UDS.KEYID = 0
1,480,973 ready_for_fw is high
1,480,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,902 UART: [idev] Erasing UDS.KEYID = 0
1,505,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,018 UART: [idev] --
1,514,961 UART: [ldev] ++
1,515,129 UART: [ldev] CDI.KEYID = 6
1,515,492 UART: [ldev] SUBJECT.KEYID = 5
1,515,918 UART: [ldev] AUTHORITY.KEYID = 7
1,516,381 UART: [ldev] FE.KEYID = 1
1,521,563 UART: [ldev] Erasing FE.KEYID = 1
1,547,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,366 UART: [ldev] --
1,586,849 UART: [fwproc] Waiting for Commands...
1,587,594 UART: [fwproc] Received command 0x46574c44
1,588,385 UART: [fwproc] Received Image of size 114084 bytes
2,883,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,099 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,910 >>> mbox cmd response: success
3,075,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,077,090 UART: [afmc] ++
3,077,258 UART: [afmc] CDI.KEYID = 6
3,077,620 UART: [afmc] SUBJECT.KEYID = 7
3,078,045 UART: [afmc] AUTHORITY.KEYID = 5
3,113,880 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,525 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,215 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,018 UART: [afmc] --
3,157,042 UART: [cold-reset] --
3,158,046 UART: [state] Locking Datavault
3,158,897 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,501 UART: [state] Locking ICCM
3,160,061 UART: [exit] Launching FMC @ 0x40000130
3,165,390 UART:
3,165,406 UART: Running Caliptra FMC ...
3,165,814 UART:
3,165,868 UART: [state] CFI Enabled
3,176,283 UART: [fht] FMC Alias Private Key: 7
3,283,860 UART: [art] Extend RT PCRs Done
3,284,288 UART: [art] Lock RT PCRs Done
3,286,180 UART: [art] Populate DV Done
3,294,251 UART: [fht] FMC Alias Private Key: 7
3,295,313 UART: [art] Derive CDI
3,295,593 UART: [art] Store in in slot 0x4
3,381,018 UART: [art] Derive Key Pair
3,381,378 UART: [art] Store priv key in slot 0x5
3,394,070 UART: [art] Derive Key Pair - Done
3,409,084 UART: [art] Signing Cert with AUTHO
3,409,564 UART: RITY.KEYID = 7
3,424,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,527 UART: [art] PUB.X = 7A1F8E9B163CCA1CD1471880415B15D8A2ECBD6740CBB70CBBE1FC2C6EF5E8584DECB4080DA16FB47B607265F6993575
3,432,304 UART: [art] PUB.Y = 827A76F715C2DA618164A1D5A765DE4415B44FCEC520685857C04BC0DC6FD7EECD8D26314B47D635A5A53949C23A03CE
3,439,259 UART: [art] SIG.R = 3376A0282B6CA08EE73716FE5C7C18A51209C247E129ACFE2A7EC8109F211FC200C3AA4010031F5CBD36B5C0FD4BC734
3,446,011 UART: [art] SIG.S = DD7A3F842AC62246578D93A247363B02EF9AF02396D09846183C3AC218BE1128DC4A369136213B0AB4F03F13A7343D69
3,469,440 UART: Caliptra RT
3,469,693 UART: [state] CFI Enabled
3,578,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,778 UART: [rt]cmd =0x4d454153, len=108
3,630,245 >>> mbox cmd response data (12 bytes)
3,630,246 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,155 UART: [rt]cmd =0x44504543, len=92
3,850,637 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,384 UART: [state] LifecycleState = Unprovisioned
85,039 UART: [state] DebugLocked = No
85,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,093 UART: [kat] SHA2-256
881,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,139 UART: [kat] ++
885,291 UART: [kat] sha1
889,511 UART: [kat] SHA2-256
891,449 UART: [kat] SHA2-384
894,118 UART: [kat] SHA2-512-ACC
896,019 UART: [kat] ECC-384
901,562 UART: [kat] HMAC-384Kdf
906,102 UART: [kat] LMS
1,474,298 UART: [kat] --
1,475,319 UART: [cold-reset] ++
1,475,785 UART: [fht] Storing FHT @ 0x50003400
1,478,562 UART: [idev] ++
1,478,730 UART: [idev] CDI.KEYID = 6
1,479,090 UART: [idev] SUBJECT.KEYID = 7
1,479,514 UART: [idev] UDS.KEYID = 0
1,479,859 ready_for_fw is high
1,479,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,392 UART: [idev] Erasing UDS.KEYID = 0
1,503,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,750 UART: [idev] --
1,513,903 UART: [ldev] ++
1,514,071 UART: [ldev] CDI.KEYID = 6
1,514,434 UART: [ldev] SUBJECT.KEYID = 5
1,514,860 UART: [ldev] AUTHORITY.KEYID = 7
1,515,323 UART: [ldev] FE.KEYID = 1
1,520,585 UART: [ldev] Erasing FE.KEYID = 1
1,545,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,126 UART: [ldev] --
1,584,569 UART: [fwproc] Waiting for Commands...
1,585,358 UART: [fwproc] Received command 0x46574c44
1,586,149 UART: [fwproc] Received Image of size 114084 bytes
2,880,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,882 >>> mbox cmd response: success
3,072,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,074,104 UART: [afmc] ++
3,074,272 UART: [afmc] CDI.KEYID = 6
3,074,634 UART: [afmc] SUBJECT.KEYID = 7
3,075,059 UART: [afmc] AUTHORITY.KEYID = 5
3,110,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,155 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,845 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,674 UART: [afmc] --
3,153,702 UART: [cold-reset] --
3,154,768 UART: [state] Locking Datavault
3,155,915 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,519 UART: [state] Locking ICCM
3,157,119 UART: [exit] Launching FMC @ 0x40000130
3,162,448 UART:
3,162,464 UART: Running Caliptra FMC ...
3,162,872 UART:
3,162,926 UART: [state] CFI Enabled
3,173,265 UART: [fht] FMC Alias Private Key: 7
3,281,074 UART: [art] Extend RT PCRs Done
3,281,502 UART: [art] Lock RT PCRs Done
3,282,996 UART: [art] Populate DV Done
3,291,131 UART: [fht] FMC Alias Private Key: 7
3,292,275 UART: [art] Derive CDI
3,292,555 UART: [art] Store in in slot 0x4
3,378,468 UART: [art] Derive Key Pair
3,378,828 UART: [art] Store priv key in slot 0x5
3,391,884 UART: [art] Derive Key Pair - Done
3,406,580 UART: [art] Signing Cert with AUTHO
3,407,060 UART: RITY.KEYID = 7
3,422,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,009 UART: [art] PUB.X = 7A1F8E9B163CCA1CD1471880415B15D8A2ECBD6740CBB70CBBE1FC2C6EF5E8584DECB4080DA16FB47B607265F6993575
3,429,786 UART: [art] PUB.Y = 827A76F715C2DA618164A1D5A765DE4415B44FCEC520685857C04BC0DC6FD7EECD8D26314B47D635A5A53949C23A03CE
3,436,741 UART: [art] SIG.R = 3376A0282B6CA08EE73716FE5C7C18A51209C247E129ACFE2A7EC8109F211FC200C3AA4010031F5CBD36B5C0FD4BC734
3,443,493 UART: [art] SIG.S = DD7A3F842AC62246578D93A247363B02EF9AF02396D09846183C3AC218BE1128DC4A369136213B0AB4F03F13A7343D69
3,467,252 UART: Caliptra RT
3,467,505 UART: [state] CFI Enabled
3,575,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,312 UART: [rt]cmd =0x44504543, len=96
3,639,089 >>> mbox cmd response data (56 bytes)
3,639,090 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,147 UART: [rt]cmd =0x44504543, len=92
3,860,237 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,263 >>> mbox cmd response data (12 bytes)
1,444,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,979 >>> mbox cmd response: success
2,927,979 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,989,629 UART:
2,989,645 UART: Running Caliptra FMC ...
2,990,053 UART:
2,990,107 UART: [state] CFI Enabled
3,000,490 UART: [fht] FMC Alias Private Key: 7
3,108,465 UART: [art] Extend RT PCRs Done
3,108,893 UART: [art] Lock RT PCRs Done
3,110,311 UART: [art] Populate DV Done
3,118,416 UART: [fht] FMC Alias Private Key: 7
3,119,462 UART: [art] Derive CDI
3,119,742 UART: [art] Store in in slot 0x4
3,205,707 UART: [art] Derive Key Pair
3,206,067 UART: [art] Store priv key in slot 0x5
3,219,501 UART: [art] Derive Key Pair - Done
3,234,337 UART: [art] Signing Cert with AUTHO
3,234,817 UART: RITY.KEYID = 7
3,250,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,020 UART: [art] PUB.X = 736B471CA4BFFB52E48FEBB7F2B649C64BC494BA264B09FCB26BFF4E4A12B4F6B38DB943B6D611C03D223B00E47C6ACB
3,257,789 UART: [art] PUB.Y = 2D56B2714F633AC1AEB0E91779A74B4C9BF2D6F189432AA650880EFAA01071C449E213B48FADD90F133869B8B5E27630
3,264,737 UART: [art] SIG.R = F1A7EEC07AD62291DBC592507D19BAB8D5E7103A6E001FA5E9935445E18754908FFBBCEF6446E5330A95E93F09CD96D0
3,271,489 UART: [art] SIG.S = 9FE9CF977225574F0C35F7940DFF36D6E87336903868EB725120B366F9694D2522F6C807DED7206F40E7F46CBE0B27B3
3,295,108 UART: Caliptra RT
3,295,361 UART: [state] CFI Enabled
3,415,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,383 UART: [rt]cmd =0x44504543, len=92
3,637,236 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,511 ready_for_fw is high
1,362,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,742 >>> mbox cmd response: success
2,924,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,986,562 UART:
2,986,578 UART: Running Caliptra FMC ...
2,986,986 UART:
2,987,040 UART: [state] CFI Enabled
2,997,157 UART: [fht] FMC Alias Private Key: 7
3,105,716 UART: [art] Extend RT PCRs Done
3,106,144 UART: [art] Lock RT PCRs Done
3,107,606 UART: [art] Populate DV Done
3,115,729 UART: [fht] FMC Alias Private Key: 7
3,116,759 UART: [art] Derive CDI
3,117,039 UART: [art] Store in in slot 0x4
3,202,384 UART: [art] Derive Key Pair
3,202,744 UART: [art] Store priv key in slot 0x5
3,215,342 UART: [art] Derive Key Pair - Done
3,230,296 UART: [art] Signing Cert with AUTHO
3,230,776 UART: RITY.KEYID = 7
3,245,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,735 UART: [art] PUB.X = 736B471CA4BFFB52E48FEBB7F2B649C64BC494BA264B09FCB26BFF4E4A12B4F6B38DB943B6D611C03D223B00E47C6ACB
3,253,504 UART: [art] PUB.Y = 2D56B2714F633AC1AEB0E91779A74B4C9BF2D6F189432AA650880EFAA01071C449E213B48FADD90F133869B8B5E27630
3,260,452 UART: [art] SIG.R = F1A7EEC07AD62291DBC592507D19BAB8D5E7103A6E001FA5E9935445E18754908FFBBCEF6446E5330A95E93F09CD96D0
3,267,204 UART: [art] SIG.S = 9FE9CF977225574F0C35F7940DFF36D6E87336903868EB725120B366F9694D2522F6C807DED7206F40E7F46CBE0B27B3
3,290,777 UART: Caliptra RT
3,291,030 UART: [state] CFI Enabled
3,399,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,878 UART: [rt]cmd =0x4d454153, len=108
3,451,201 >>> mbox cmd response data (12 bytes)
3,451,202 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,807 UART: [rt]cmd =0x44504543, len=92
3,671,898 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,857 ready_for_fw is high
1,362,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,898 >>> mbox cmd response: success
2,924,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,985,774 UART:
2,985,790 UART: Running Caliptra FMC ...
2,986,198 UART:
2,986,252 UART: [state] CFI Enabled
2,996,643 UART: [fht] FMC Alias Private Key: 7
3,104,398 UART: [art] Extend RT PCRs Done
3,104,826 UART: [art] Lock RT PCRs Done
3,106,442 UART: [art] Populate DV Done
3,114,635 UART: [fht] FMC Alias Private Key: 7
3,115,709 UART: [art] Derive CDI
3,115,989 UART: [art] Store in in slot 0x4
3,201,736 UART: [art] Derive Key Pair
3,202,096 UART: [art] Store priv key in slot 0x5
3,215,458 UART: [art] Derive Key Pair - Done
3,230,282 UART: [art] Signing Cert with AUTHO
3,230,762 UART: RITY.KEYID = 7
3,246,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,329 UART: [art] PUB.X = 736B471CA4BFFB52E48FEBB7F2B649C64BC494BA264B09FCB26BFF4E4A12B4F6B38DB943B6D611C03D223B00E47C6ACB
3,254,098 UART: [art] PUB.Y = 2D56B2714F633AC1AEB0E91779A74B4C9BF2D6F189432AA650880EFAA01071C449E213B48FADD90F133869B8B5E27630
3,261,046 UART: [art] SIG.R = F1A7EEC07AD62291DBC592507D19BAB8D5E7103A6E001FA5E9935445E18754908FFBBCEF6446E5330A95E93F09CD96D0
3,267,798 UART: [art] SIG.S = 9FE9CF977225574F0C35F7940DFF36D6E87336903868EB725120B366F9694D2522F6C807DED7206F40E7F46CBE0B27B3
3,291,507 UART: Caliptra RT
3,291,760 UART: [state] CFI Enabled
3,400,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,428 UART: [rt]cmd =0x44504543, len=96
3,463,725 >>> mbox cmd response data (56 bytes)
3,463,726 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,741 UART: [rt]cmd =0x44504543, len=92
3,685,806 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.83s
Truncated 5006 bytes from beginning
5A35BC3C054C20C0B23A757B8D57D6DE173BE
3,435,563 UART: [art] PUB.Y = 6320CE5322D32D6B959BB0180E5CCA57A6891F77717B85D5D56813D4EB4E95C40202102BBFC80CEBA00969F5D4A7F387
3,442,502 UART: [art] SIG.R = F2F40ED8C338D973D2B29DF9FF781BBE4FF21F25232D7641D7C2EB045EB4EF93AB3B47F30FB3557F63CC392D35A5C894
3,449,279 UART: [art] SIG.S = 1F569EF004D3C218E710FD5CC79D5F11416397EEAB0129535DC5951F63171BB8DFF57CEC6034D2FCD99AC78C02835A10
3,473,449 UART: Caliptra RT
3,473,794 UART: [state] CFI Enabled
3,594,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,915 UART: [rt]cmd =0x44504543, len=92
3,817,785 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
890,972 UART: [kat] SHA2-256
892,910 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,733 UART: [kat] HMAC-384Kdf
908,333 UART: [kat] LMS
1,476,529 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,756 UART: [fht] Storing FHT @ 0x50003400
1,480,481 UART: [idev] ++
1,480,649 UART: [idev] CDI.KEYID = 6
1,481,009 UART: [idev] SUBJECT.KEYID = 7
1,481,433 UART: [idev] UDS.KEYID = 0
1,481,778 ready_for_fw is high
1,481,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,543 UART: [idev] Erasing UDS.KEYID = 0
1,506,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,087 UART: [idev] --
1,516,120 UART: [ldev] ++
1,516,288 UART: [ldev] CDI.KEYID = 6
1,516,651 UART: [ldev] SUBJECT.KEYID = 5
1,517,077 UART: [ldev] AUTHORITY.KEYID = 7
1,517,540 UART: [ldev] FE.KEYID = 1
1,522,860 UART: [ldev] Erasing FE.KEYID = 1
1,548,543 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,969 UART: [ldev] --
1,587,474 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 114084 bytes
2,883,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,506 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,355 >>> mbox cmd response: success
3,076,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,077,517 UART: [afmc] ++
3,077,685 UART: [afmc] CDI.KEYID = 6
3,078,047 UART: [afmc] SUBJECT.KEYID = 7
3,078,472 UART: [afmc] AUTHORITY.KEYID = 5
3,113,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,822 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,512 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,305 UART: [afmc] --
3,156,237 UART: [cold-reset] --
3,156,975 UART: [state] Locking Datavault
3,157,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,592 UART: [state] Locking ICCM
3,159,248 UART: [exit] Launching FMC @ 0x40000130
3,164,577 UART:
3,164,593 UART: Running Caliptra FMC ...
3,165,001 UART:
3,165,144 UART: [state] CFI Enabled
3,175,703 UART: [fht] FMC Alias Private Key: 7
3,283,618 UART: [art] Extend RT PCRs Done
3,284,046 UART: [art] Lock RT PCRs Done
3,285,804 UART: [art] Populate DV Done
3,294,307 UART: [fht] FMC Alias Private Key: 7
3,295,273 UART: [art] Derive CDI
3,295,553 UART: [art] Store in in slot 0x4
3,381,464 UART: [art] Derive Key Pair
3,381,824 UART: [art] Store priv key in slot 0x5
3,395,370 UART: [art] Derive Key Pair - Done
3,410,180 UART: [art] Signing Cert with AUTHO
3,410,660 UART: RITY.KEYID = 7
3,426,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,773 UART: [art] PUB.X = 1F187E8497097677D3D26F5494A01C4AF955A73FEA65D118DC060DA0A6D5A35BC3C054C20C0B23A757B8D57D6DE173BE
3,433,536 UART: [art] PUB.Y = 6320CE5322D32D6B959BB0180E5CCA57A6891F77717B85D5D56813D4EB4E95C40202102BBFC80CEBA00969F5D4A7F387
3,440,475 UART: [art] SIG.R = F2F40ED8C338D973D2B29DF9FF781BBE4FF21F25232D7641D7C2EB045EB4EF93AB3B47F30FB3557F63CC392D35A5C894
3,447,252 UART: [art] SIG.S = 1F569EF004D3C218E710FD5CC79D5F11416397EEAB0129535DC5951F63171BB8DFF57CEC6034D2FCD99AC78C02835A10
3,470,750 UART: Caliptra RT
3,471,095 UART: [state] CFI Enabled
3,578,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,928 UART: [rt]cmd =0x4d454153, len=108
3,629,905 >>> mbox cmd response data (12 bytes)
3,629,906 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,773 UART: [rt]cmd =0x44504543, len=92
3,850,959 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,013 UART: [kat] SHA2-512-ACC
896,914 UART: [kat] ECC-384
902,691 UART: [kat] HMAC-384Kdf
907,203 UART: [kat] LMS
1,475,399 UART: [kat] --
1,476,444 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,451 UART: [idev] ++
1,479,619 UART: [idev] CDI.KEYID = 6
1,479,979 UART: [idev] SUBJECT.KEYID = 7
1,480,403 UART: [idev] UDS.KEYID = 0
1,480,748 ready_for_fw is high
1,480,748 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,935 UART: [idev] --
1,515,228 UART: [ldev] ++
1,515,396 UART: [ldev] CDI.KEYID = 6
1,515,759 UART: [ldev] SUBJECT.KEYID = 5
1,516,185 UART: [ldev] AUTHORITY.KEYID = 7
1,516,648 UART: [ldev] FE.KEYID = 1
1,521,900 UART: [ldev] Erasing FE.KEYID = 1
1,547,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,415 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,681 UART: [fwproc] Received command 0x46574c44
1,588,472 UART: [fwproc] Received Image of size 114084 bytes
2,882,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,072 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,673 >>> mbox cmd response: success
3,076,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,077,721 UART: [afmc] ++
3,077,889 UART: [afmc] CDI.KEYID = 6
3,078,251 UART: [afmc] SUBJECT.KEYID = 7
3,078,676 UART: [afmc] AUTHORITY.KEYID = 5
3,114,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,898 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,588 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,539 UART: [afmc] --
3,157,589 UART: [cold-reset] --
3,158,261 UART: [state] Locking Datavault
3,159,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,974 UART: [state] Locking ICCM
3,160,494 UART: [exit] Launching FMC @ 0x40000130
3,165,823 UART:
3,165,839 UART: Running Caliptra FMC ...
3,166,247 UART:
3,166,390 UART: [state] CFI Enabled
3,177,259 UART: [fht] FMC Alias Private Key: 7
3,285,842 UART: [art] Extend RT PCRs Done
3,286,270 UART: [art] Lock RT PCRs Done
3,287,600 UART: [art] Populate DV Done
3,295,831 UART: [fht] FMC Alias Private Key: 7
3,296,935 UART: [art] Derive CDI
3,297,215 UART: [art] Store in in slot 0x4
3,382,900 UART: [art] Derive Key Pair
3,383,260 UART: [art] Store priv key in slot 0x5
3,396,738 UART: [art] Derive Key Pair - Done
3,411,664 UART: [art] Signing Cert with AUTHO
3,412,144 UART: RITY.KEYID = 7
3,427,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,841 UART: [art] PUB.X = 1F187E8497097677D3D26F5494A01C4AF955A73FEA65D118DC060DA0A6D5A35BC3C054C20C0B23A757B8D57D6DE173BE
3,434,604 UART: [art] PUB.Y = 6320CE5322D32D6B959BB0180E5CCA57A6891F77717B85D5D56813D4EB4E95C40202102BBFC80CEBA00969F5D4A7F387
3,441,543 UART: [art] SIG.R = F2F40ED8C338D973D2B29DF9FF781BBE4FF21F25232D7641D7C2EB045EB4EF93AB3B47F30FB3557F63CC392D35A5C894
3,448,320 UART: [art] SIG.S = 1F569EF004D3C218E710FD5CC79D5F11416397EEAB0129535DC5951F63171BB8DFF57CEC6034D2FCD99AC78C02835A10
3,472,724 UART: Caliptra RT
3,473,069 UART: [state] CFI Enabled
3,581,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,736 UART: [rt]cmd =0x44504543, len=96
3,645,305 >>> mbox cmd response data (56 bytes)
3,645,306 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,675,181 UART: [rt]cmd =0x44504543, len=92
3,865,933 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,447,284 >>> mbox cmd response data (12 bytes)
1,447,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,930,774 >>> mbox cmd response: success
2,930,774 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,984 UART:
2,993,000 UART: Running Caliptra FMC ...
2,993,408 UART:
2,993,551 UART: [state] CFI Enabled
3,003,962 UART: [fht] FMC Alias Private Key: 7
3,112,013 UART: [art] Extend RT PCRs Done
3,112,441 UART: [art] Lock RT PCRs Done
3,113,879 UART: [art] Populate DV Done
3,122,116 UART: [fht] FMC Alias Private Key: 7
3,123,086 UART: [art] Derive CDI
3,123,366 UART: [art] Store in in slot 0x4
3,209,381 UART: [art] Derive Key Pair
3,209,741 UART: [art] Store priv key in slot 0x5
3,223,371 UART: [art] Derive Key Pair - Done
3,238,000 UART: [art] Signing Cert with AUTHO
3,238,480 UART: RITY.KEYID = 7
3,253,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,629 UART: [art] PUB.X = 713CDA13A2BF716543DD9BB713EBACE6BAC882EB5BA20E137851B93C9B0E47FA4CAC6E6E92DDFBEFAA550EC5392A249F
3,261,420 UART: [art] PUB.Y = 174C54610906C9E5D08D95325F4BD10342167CA2CF2911F76DF85DB9D363387CA9ECA39C6820662C08A5A2B4CA442060
3,268,356 UART: [art] SIG.R = A81BFA3F31B7AF863929B13A97FD2C002D52D1B31068E77CBD4F519A868A60320E07950D2126706D16150DD556EB3A86
3,275,092 UART: [art] SIG.S = 7893E279F689B5B9F12DC688924BCF952464A684A6C8F59BE9C036B01C7D47F80E47A26F200A2D854034537482927125
3,298,439 UART: Caliptra RT
3,298,784 UART: [state] CFI Enabled
3,417,797 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,705 UART: [rt]cmd =0x44504543, len=92
3,640,096 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,855 >>> mbox cmd response: success
2,924,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,987,803 UART:
2,987,819 UART: Running Caliptra FMC ...
2,988,227 UART:
2,988,370 UART: [state] CFI Enabled
2,999,045 UART: [fht] FMC Alias Private Key: 7
3,106,944 UART: [art] Extend RT PCRs Done
3,107,372 UART: [art] Lock RT PCRs Done
3,108,864 UART: [art] Populate DV Done
3,117,447 UART: [fht] FMC Alias Private Key: 7
3,118,539 UART: [art] Derive CDI
3,118,819 UART: [art] Store in in slot 0x4
3,204,798 UART: [art] Derive Key Pair
3,205,158 UART: [art] Store priv key in slot 0x5
3,218,716 UART: [art] Derive Key Pair - Done
3,233,411 UART: [art] Signing Cert with AUTHO
3,233,891 UART: RITY.KEYID = 7
3,249,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,846 UART: [art] PUB.X = 713CDA13A2BF716543DD9BB713EBACE6BAC882EB5BA20E137851B93C9B0E47FA4CAC6E6E92DDFBEFAA550EC5392A249F
3,256,637 UART: [art] PUB.Y = 174C54610906C9E5D08D95325F4BD10342167CA2CF2911F76DF85DB9D363387CA9ECA39C6820662C08A5A2B4CA442060
3,263,573 UART: [art] SIG.R = A81BFA3F31B7AF863929B13A97FD2C002D52D1B31068E77CBD4F519A868A60320E07950D2126706D16150DD556EB3A86
3,270,309 UART: [art] SIG.S = 7893E279F689B5B9F12DC688924BCF952464A684A6C8F59BE9C036B01C7D47F80E47A26F200A2D854034537482927125
3,293,922 UART: Caliptra RT
3,294,267 UART: [state] CFI Enabled
3,402,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,592 UART: [rt]cmd =0x4d454153, len=108
3,453,499 >>> mbox cmd response data (12 bytes)
3,453,500 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,389 UART: [rt]cmd =0x44504543, len=92
3,675,976 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,652 ready_for_fw is high
1,363,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,591 >>> mbox cmd response: success
2,925,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,987,431 UART:
2,987,447 UART: Running Caliptra FMC ...
2,987,855 UART:
2,987,998 UART: [state] CFI Enabled
2,999,071 UART: [fht] FMC Alias Private Key: 7
3,106,490 UART: [art] Extend RT PCRs Done
3,106,918 UART: [art] Lock RT PCRs Done
3,108,692 UART: [art] Populate DV Done
3,116,909 UART: [fht] FMC Alias Private Key: 7
3,117,951 UART: [art] Derive CDI
3,118,231 UART: [art] Store in in slot 0x4
3,203,432 UART: [art] Derive Key Pair
3,203,792 UART: [art] Store priv key in slot 0x5
3,216,674 UART: [art] Derive Key Pair - Done
3,231,637 UART: [art] Signing Cert with AUTHO
3,232,117 UART: RITY.KEYID = 7
3,247,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,048 UART: [art] PUB.X = 713CDA13A2BF716543DD9BB713EBACE6BAC882EB5BA20E137851B93C9B0E47FA4CAC6E6E92DDFBEFAA550EC5392A249F
3,254,839 UART: [art] PUB.Y = 174C54610906C9E5D08D95325F4BD10342167CA2CF2911F76DF85DB9D363387CA9ECA39C6820662C08A5A2B4CA442060
3,261,775 UART: [art] SIG.R = A81BFA3F31B7AF863929B13A97FD2C002D52D1B31068E77CBD4F519A868A60320E07950D2126706D16150DD556EB3A86
3,268,511 UART: [art] SIG.S = 7893E279F689B5B9F12DC688924BCF952464A684A6C8F59BE9C036B01C7D47F80E47A26F200A2D854034537482927125
3,292,006 UART: Caliptra RT
3,292,351 UART: [state] CFI Enabled
3,400,560 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,716 UART: [rt]cmd =0x44504543, len=96
3,464,291 >>> mbox cmd response data (56 bytes)
3,464,292 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,277 UART: [rt]cmd =0x44504543, len=92
3,686,070 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.86s
Truncated 4783 bytes from beginning
7
3,126,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,120 UART: [art] PUB.X = 2343998179A101DD0F3B51703B91449445381DE72B8E5AF0D9B7B8FD71E04C1230F0A1C80CEDB75146A242F88070447A
3,133,877 UART: [art] PUB.Y = CA1546644C82521122045400214B78E772686BDF1E7103066C5E36B1370AC666A2D73BBF75941526FB39367100A6F28F
3,140,757 UART: [art] SIG.R = 5527B5209AD83A9E1E98DBF2030BACFD4EBAD517FA6C34012E86DA5DB321191DAA6A91D8C72101B5B215C26909AD8563
3,147,524 UART: [art] SIG.S = 2974DE8435F6A7F1505726BC5B262ECA4CDBA0E5E05F7F0578329CB39143C5C25038923D8890AC6368EDCE3AA4E5C411
3,171,456 UART: Caliptra RT
3,171,709 UART: [state] CFI Enabled
3,291,096 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,366 UART: [rt]cmd =0x44504543, len=92
3,514,289 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,807 UART: [kat] SHA2-256
903,747 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
917,934 UART: [kat] HMAC-384Kdf
922,618 UART: [kat] LMS
1,170,946 UART: [kat] --
1,171,675 UART: [cold-reset] ++
1,172,199 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 ready_for_fw is high
1,176,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,550 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,143 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,748 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,663 UART: [ldev] --
1,283,154 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,905 >>> mbox cmd response: success
2,770,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,149 UART: [afmc] ++
2,772,317 UART: [afmc] CDI.KEYID = 6
2,772,679 UART: [afmc] SUBJECT.KEYID = 7
2,773,104 UART: [afmc] AUTHORITY.KEYID = 5
2,808,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,990 UART: [afmc] --
2,852,046 UART: [cold-reset] --
2,853,062 UART: [state] Locking Datavault
2,854,369 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,973 UART: [state] Locking ICCM
2,855,609 UART: [exit] Launching FMC @ 0x40000130
2,860,938 UART:
2,860,954 UART: Running Caliptra FMC ...
2,861,362 UART:
2,861,416 UART: [state] CFI Enabled
2,872,061 UART: [fht] FMC Alias Private Key: 7
2,980,244 UART: [art] Extend RT PCRs Done
2,980,672 UART: [art] Lock RT PCRs Done
2,981,880 UART: [art] Populate DV Done
2,990,129 UART: [fht] FMC Alias Private Key: 7
2,991,295 UART: [art] Derive CDI
2,991,575 UART: [art] Store in in slot 0x4
3,077,682 UART: [art] Derive Key Pair
3,078,042 UART: [art] Store priv key in slot 0x5
3,091,220 UART: [art] Derive Key Pair - Done
3,106,138 UART: [art] Signing Cert with AUTHO
3,106,618 UART: RITY.KEYID = 7
3,122,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,827 UART: [art] PUB.X = 2343998179A101DD0F3B51703B91449445381DE72B8E5AF0D9B7B8FD71E04C1230F0A1C80CEDB75146A242F88070447A
3,129,584 UART: [art] PUB.Y = CA1546644C82521122045400214B78E772686BDF1E7103066C5E36B1370AC666A2D73BBF75941526FB39367100A6F28F
3,136,464 UART: [art] SIG.R = 5527B5209AD83A9E1E98DBF2030BACFD4EBAD517FA6C34012E86DA5DB321191DAA6A91D8C72101B5B215C26909AD8563
3,143,231 UART: [art] SIG.S = 2974DE8435F6A7F1505726BC5B262ECA4CDBA0E5E05F7F0578329CB39143C5C25038923D8890AC6368EDCE3AA4E5C411
3,166,895 UART: Caliptra RT
3,167,148 UART: [state] CFI Enabled
3,274,603 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,891 UART: [rt]cmd =0x4d454153, len=108
3,326,022 >>> mbox cmd response data (12 bytes)
3,326,023 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,950 UART: [rt]cmd =0x44504543, len=92
3,546,849 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,221 UART: [kat] SHA2-256
904,161 UART: [kat] SHA2-384
906,748 UART: [kat] SHA2-512-ACC
908,649 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,172,009 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 ready_for_fw is high
1,176,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,402 UART: [idev] Erasing UDS.KEYID = 0
1,201,391 UART: [idev] Sha1 KeyId Algorithm
1,209,927 UART: [idev] --
1,210,915 UART: [ldev] ++
1,211,083 UART: [ldev] CDI.KEYID = 6
1,211,446 UART: [ldev] SUBJECT.KEYID = 5
1,211,872 UART: [ldev] AUTHORITY.KEYID = 7
1,212,335 UART: [ldev] FE.KEYID = 1
1,217,609 UART: [ldev] Erasing FE.KEYID = 1
1,244,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,635 UART: [ldev] --
1,282,938 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,017 >>> mbox cmd response: success
2,771,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,239 UART: [afmc] ++
2,772,407 UART: [afmc] CDI.KEYID = 6
2,772,769 UART: [afmc] SUBJECT.KEYID = 7
2,773,194 UART: [afmc] AUTHORITY.KEYID = 5
2,808,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,674 UART: [afmc] --
2,851,788 UART: [cold-reset] --
2,852,382 UART: [state] Locking Datavault
2,853,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,057 UART: [state] Locking ICCM
2,854,693 UART: [exit] Launching FMC @ 0x40000130
2,860,022 UART:
2,860,038 UART: Running Caliptra FMC ...
2,860,446 UART:
2,860,500 UART: [state] CFI Enabled
2,871,079 UART: [fht] FMC Alias Private Key: 7
2,978,422 UART: [art] Extend RT PCRs Done
2,978,850 UART: [art] Lock RT PCRs Done
2,980,398 UART: [art] Populate DV Done
2,988,701 UART: [fht] FMC Alias Private Key: 7
2,989,847 UART: [art] Derive CDI
2,990,127 UART: [art] Store in in slot 0x4
3,075,572 UART: [art] Derive Key Pair
3,075,932 UART: [art] Store priv key in slot 0x5
3,089,620 UART: [art] Derive Key Pair - Done
3,104,260 UART: [art] Signing Cert with AUTHO
3,104,740 UART: RITY.KEYID = 7
3,120,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,979 UART: [art] PUB.X = 2343998179A101DD0F3B51703B91449445381DE72B8E5AF0D9B7B8FD71E04C1230F0A1C80CEDB75146A242F88070447A
3,127,736 UART: [art] PUB.Y = CA1546644C82521122045400214B78E772686BDF1E7103066C5E36B1370AC666A2D73BBF75941526FB39367100A6F28F
3,134,616 UART: [art] SIG.R = 5527B5209AD83A9E1E98DBF2030BACFD4EBAD517FA6C34012E86DA5DB321191DAA6A91D8C72101B5B215C26909AD8563
3,141,383 UART: [art] SIG.S = 2974DE8435F6A7F1505726BC5B262ECA4CDBA0E5E05F7F0578329CB39143C5C25038923D8890AC6368EDCE3AA4E5C411
3,165,043 UART: Caliptra RT
3,165,296 UART: [state] CFI Enabled
3,272,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,807 UART: [rt]cmd =0x44504543, len=96
3,337,532 >>> mbox cmd response data (56 bytes)
3,337,533 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,418 UART: [rt]cmd =0x44504543, len=92
3,559,203 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,815 >>> mbox cmd response data (12 bytes)
1,141,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,693 >>> mbox cmd response: success
2,624,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,753 UART:
2,686,769 UART: Running Caliptra FMC ...
2,687,177 UART:
2,687,231 UART: [state] CFI Enabled
2,697,516 UART: [fht] FMC Alias Private Key: 7
2,805,071 UART: [art] Extend RT PCRs Done
2,805,499 UART: [art] Lock RT PCRs Done
2,807,169 UART: [art] Populate DV Done
2,815,278 UART: [fht] FMC Alias Private Key: 7
2,816,246 UART: [art] Derive CDI
2,816,526 UART: [art] Store in in slot 0x4
2,902,491 UART: [art] Derive Key Pair
2,902,851 UART: [art] Store priv key in slot 0x5
2,915,881 UART: [art] Derive Key Pair - Done
2,930,826 UART: [art] Signing Cert with AUTHO
2,931,306 UART: RITY.KEYID = 7
2,946,230 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,995 UART: [art] PUB.X = 0903309F6D5CADB2834ECD3BCAF94AD4C904C1B853C783712F3C29C6DB08AE8D58EC4DEBD359D164E2DAE6E791132CEE
2,953,775 UART: [art] PUB.Y = 0A7A031ADB39972A016B12A956DEDFFC28C560CCCE0A58FAA9D0F923C15255C8EC64AA4F2900FC2FB9DC3CA16C25A68A
2,960,715 UART: [art] SIG.R = C09B56A0E386781889E5B2262BAA3811C13C68972D92BE5C575E5A430C991236B1AE120000C3607BFF8D27A1B58D7576
2,967,434 UART: [art] SIG.S = AC466F8343EEDF2A62EF1B9C8DE6758B7C89C60D99D539976395658725715A32FEC337F20B4461068A8ACA043D32D0C4
2,991,033 UART: Caliptra RT
2,991,286 UART: [state] CFI Enabled
3,111,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,208 UART: [rt]cmd =0x44504543, len=92
3,334,480 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,539 ready_for_fw is high
1,059,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,922 >>> mbox cmd response: success
2,621,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,683,806 UART:
2,683,822 UART: Running Caliptra FMC ...
2,684,230 UART:
2,684,284 UART: [state] CFI Enabled
2,694,699 UART: [fht] FMC Alias Private Key: 7
2,802,346 UART: [art] Extend RT PCRs Done
2,802,774 UART: [art] Lock RT PCRs Done
2,804,434 UART: [art] Populate DV Done
2,812,631 UART: [fht] FMC Alias Private Key: 7
2,813,767 UART: [art] Derive CDI
2,814,047 UART: [art] Store in in slot 0x4
2,899,624 UART: [art] Derive Key Pair
2,899,984 UART: [art] Store priv key in slot 0x5
2,913,294 UART: [art] Derive Key Pair - Done
2,928,379 UART: [art] Signing Cert with AUTHO
2,928,859 UART: RITY.KEYID = 7
2,944,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,044 UART: [art] PUB.X = 0903309F6D5CADB2834ECD3BCAF94AD4C904C1B853C783712F3C29C6DB08AE8D58EC4DEBD359D164E2DAE6E791132CEE
2,951,824 UART: [art] PUB.Y = 0A7A031ADB39972A016B12A956DEDFFC28C560CCCE0A58FAA9D0F923C15255C8EC64AA4F2900FC2FB9DC3CA16C25A68A
2,958,764 UART: [art] SIG.R = C09B56A0E386781889E5B2262BAA3811C13C68972D92BE5C575E5A430C991236B1AE120000C3607BFF8D27A1B58D7576
2,965,483 UART: [art] SIG.S = AC466F8343EEDF2A62EF1B9C8DE6758B7C89C60D99D539976395658725715A32FEC337F20B4461068A8ACA043D32D0C4
2,989,424 UART: Caliptra RT
2,989,677 UART: [state] CFI Enabled
3,096,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,839 UART: [rt]cmd =0x4d454153, len=108
3,148,802 >>> mbox cmd response data (12 bytes)
3,148,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,752 UART: [rt]cmd =0x44504543, len=92
3,370,116 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,972 >>> mbox cmd response: success
2,622,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,684,666 UART:
2,684,682 UART: Running Caliptra FMC ...
2,685,090 UART:
2,685,144 UART: [state] CFI Enabled
2,695,557 UART: [fht] FMC Alias Private Key: 7
2,803,252 UART: [art] Extend RT PCRs Done
2,803,680 UART: [art] Lock RT PCRs Done
2,805,172 UART: [art] Populate DV Done
2,813,701 UART: [fht] FMC Alias Private Key: 7
2,814,699 UART: [art] Derive CDI
2,814,979 UART: [art] Store in in slot 0x4
2,900,128 UART: [art] Derive Key Pair
2,900,488 UART: [art] Store priv key in slot 0x5
2,913,990 UART: [art] Derive Key Pair - Done
2,928,465 UART: [art] Signing Cert with AUTHO
2,928,945 UART: RITY.KEYID = 7
2,944,387 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,152 UART: [art] PUB.X = 0903309F6D5CADB2834ECD3BCAF94AD4C904C1B853C783712F3C29C6DB08AE8D58EC4DEBD359D164E2DAE6E791132CEE
2,951,932 UART: [art] PUB.Y = 0A7A031ADB39972A016B12A956DEDFFC28C560CCCE0A58FAA9D0F923C15255C8EC64AA4F2900FC2FB9DC3CA16C25A68A
2,958,872 UART: [art] SIG.R = C09B56A0E386781889E5B2262BAA3811C13C68972D92BE5C575E5A430C991236B1AE120000C3607BFF8D27A1B58D7576
2,965,591 UART: [art] SIG.S = AC466F8343EEDF2A62EF1B9C8DE6758B7C89C60D99D539976395658725715A32FEC337F20B4461068A8ACA043D32D0C4
2,988,548 UART: Caliptra RT
2,988,801 UART: [state] CFI Enabled
3,095,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,773 UART: [rt]cmd =0x44504543, len=96
3,159,074 >>> mbox cmd response data (56 bytes)
3,159,075 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,874 UART: [rt]cmd =0x44504543, len=92
3,380,478 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.00s
Truncated 4783 bytes from beginning
7
3,126,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,962 UART: [art] PUB.X = 6DDF85CC14564EB1EC8387BABC96A1BAC83B666B89D934F010D8E2606D8A5BC91D7DD64CD4B840C891FFBCB5C06F2467
3,133,752 UART: [art] PUB.Y = C743ECE969156252CB6ECD11264FF6FC53008C6AC99F56D1AA00BD58966A73CF2E058B4B23F16E3A48B9FE71A62DA183
3,140,667 UART: [art] SIG.R = 405CB9B98E7C011E66B5F3654D1E04B348064BA679ACF333F0598411246CB0308D6162EA0205F135F11D9C484BE294C3
3,147,418 UART: [art] SIG.S = 5977B51D14D38A2005899CF2D49600240E6A94709FED0E1E109BEFB466C6AE639B9CB79A389AAFE0C6D1DD1F731F4A09
3,170,957 UART: Caliptra RT
3,171,302 UART: [state] CFI Enabled
3,291,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,035 UART: [rt]cmd =0x44504543, len=92
3,514,926 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
893,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,356 UART: [kat] ++
897,508 UART: [kat] sha1
901,948 UART: [kat] SHA2-256
903,888 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,425 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,472 UART: [cold-reset] ++
1,172,856 UART: [fht] FHT @ 0x50003400
1,175,601 UART: [idev] ++
1,175,769 UART: [idev] CDI.KEYID = 6
1,176,129 UART: [idev] SUBJECT.KEYID = 7
1,176,553 UART: [idev] UDS.KEYID = 0
1,176,898 ready_for_fw is high
1,176,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,396 UART: [idev] Sha1 KeyId Algorithm
1,209,920 UART: [idev] --
1,210,886 UART: [ldev] ++
1,211,054 UART: [ldev] CDI.KEYID = 6
1,211,417 UART: [ldev] SUBJECT.KEYID = 5
1,211,843 UART: [ldev] AUTHORITY.KEYID = 7
1,212,306 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,825 UART: [fwproc] Wait for Commands...
1,284,549 UART: [fwproc] Recv command 0x46574c44
1,285,277 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,352 >>> mbox cmd response: success
2,771,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,410 UART: [afmc] ++
2,772,578 UART: [afmc] CDI.KEYID = 6
2,772,940 UART: [afmc] SUBJECT.KEYID = 7
2,773,365 UART: [afmc] AUTHORITY.KEYID = 5
2,808,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,809 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,694 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,169 UART: [afmc] --
2,852,207 UART: [cold-reset] --
2,852,991 UART: [state] Locking Datavault
2,854,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,944 UART: [state] Locking ICCM
2,855,544 UART: [exit] Launching FMC @ 0x40000130
2,860,873 UART:
2,860,889 UART: Running Caliptra FMC ...
2,861,297 UART:
2,861,440 UART: [state] CFI Enabled
2,872,477 UART: [fht] FMC Alias Private Key: 7
2,980,570 UART: [art] Extend RT PCRs Done
2,980,998 UART: [art] Lock RT PCRs Done
2,982,450 UART: [art] Populate DV Done
2,990,531 UART: [fht] FMC Alias Private Key: 7
2,991,485 UART: [art] Derive CDI
2,991,765 UART: [art] Store in in slot 0x4
3,077,338 UART: [art] Derive Key Pair
3,077,698 UART: [art] Store priv key in slot 0x5
3,091,242 UART: [art] Derive Key Pair - Done
3,106,052 UART: [art] Signing Cert with AUTHO
3,106,532 UART: RITY.KEYID = 7
3,121,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,483 UART: [art] PUB.X = 6DDF85CC14564EB1EC8387BABC96A1BAC83B666B89D934F010D8E2606D8A5BC91D7DD64CD4B840C891FFBCB5C06F2467
3,129,273 UART: [art] PUB.Y = C743ECE969156252CB6ECD11264FF6FC53008C6AC99F56D1AA00BD58966A73CF2E058B4B23F16E3A48B9FE71A62DA183
3,136,188 UART: [art] SIG.R = 405CB9B98E7C011E66B5F3654D1E04B348064BA679ACF333F0598411246CB0308D6162EA0205F135F11D9C484BE294C3
3,142,939 UART: [art] SIG.S = 5977B51D14D38A2005899CF2D49600240E6A94709FED0E1E109BEFB466C6AE639B9CB79A389AAFE0C6D1DD1F731F4A09
3,166,550 UART: Caliptra RT
3,166,895 UART: [state] CFI Enabled
3,274,634 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,588 UART: [rt]cmd =0x4d454153, len=108
3,326,301 >>> mbox cmd response data (12 bytes)
3,326,302 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,191 UART: [rt]cmd =0x44504543, len=92
3,546,996 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
922,857 UART: [kat] LMS
1,171,185 UART: [kat] --
1,172,016 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 ready_for_fw is high
1,176,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,955 UART: [idev] Erasing UDS.KEYID = 0
1,200,868 UART: [idev] Sha1 KeyId Algorithm
1,209,490 UART: [idev] --
1,210,544 UART: [ldev] ++
1,210,712 UART: [ldev] CDI.KEYID = 6
1,211,075 UART: [ldev] SUBJECT.KEYID = 5
1,211,501 UART: [ldev] AUTHORITY.KEYID = 7
1,211,964 UART: [ldev] FE.KEYID = 1
1,217,186 UART: [ldev] Erasing FE.KEYID = 1
1,243,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,364 UART: [ldev] --
1,282,817 UART: [fwproc] Wait for Commands...
1,283,411 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,568 >>> mbox cmd response: success
2,770,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,771,594 UART: [afmc] ++
2,771,762 UART: [afmc] CDI.KEYID = 6
2,772,124 UART: [afmc] SUBJECT.KEYID = 7
2,772,549 UART: [afmc] AUTHORITY.KEYID = 5
2,809,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,327 UART: [afmc] --
2,852,387 UART: [cold-reset] --
2,853,219 UART: [state] Locking Datavault
2,854,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,066 UART: [state] Locking ICCM
2,855,644 UART: [exit] Launching FMC @ 0x40000130
2,860,973 UART:
2,860,989 UART: Running Caliptra FMC ...
2,861,397 UART:
2,861,540 UART: [state] CFI Enabled
2,872,219 UART: [fht] FMC Alias Private Key: 7
2,979,698 UART: [art] Extend RT PCRs Done
2,980,126 UART: [art] Lock RT PCRs Done
2,981,802 UART: [art] Populate DV Done
2,990,097 UART: [fht] FMC Alias Private Key: 7
2,991,173 UART: [art] Derive CDI
2,991,453 UART: [art] Store in in slot 0x4
3,077,022 UART: [art] Derive Key Pair
3,077,382 UART: [art] Store priv key in slot 0x5
3,090,562 UART: [art] Derive Key Pair - Done
3,105,244 UART: [art] Signing Cert with AUTHO
3,105,724 UART: RITY.KEYID = 7
3,121,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,919 UART: [art] PUB.X = 6DDF85CC14564EB1EC8387BABC96A1BAC83B666B89D934F010D8E2606D8A5BC91D7DD64CD4B840C891FFBCB5C06F2467
3,128,709 UART: [art] PUB.Y = C743ECE969156252CB6ECD11264FF6FC53008C6AC99F56D1AA00BD58966A73CF2E058B4B23F16E3A48B9FE71A62DA183
3,135,624 UART: [art] SIG.R = 405CB9B98E7C011E66B5F3654D1E04B348064BA679ACF333F0598411246CB0308D6162EA0205F135F11D9C484BE294C3
3,142,375 UART: [art] SIG.S = 5977B51D14D38A2005899CF2D49600240E6A94709FED0E1E109BEFB466C6AE639B9CB79A389AAFE0C6D1DD1F731F4A09
3,166,278 UART: Caliptra RT
3,166,623 UART: [state] CFI Enabled
3,274,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,284 UART: [rt]cmd =0x44504543, len=96
3,337,969 >>> mbox cmd response data (56 bytes)
3,337,970 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,963 UART: [rt]cmd =0x44504543, len=92
3,560,192 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,262 >>> mbox cmd response data (12 bytes)
1,145,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,629,216 >>> mbox cmd response: success
2,629,216 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,691,684 UART:
2,691,700 UART: Running Caliptra FMC ...
2,692,108 UART:
2,692,251 UART: [state] CFI Enabled
2,702,882 UART: [fht] FMC Alias Private Key: 7
2,810,745 UART: [art] Extend RT PCRs Done
2,811,173 UART: [art] Lock RT PCRs Done
2,812,733 UART: [art] Populate DV Done
2,821,060 UART: [fht] FMC Alias Private Key: 7
2,822,030 UART: [art] Derive CDI
2,822,310 UART: [art] Store in in slot 0x4
2,907,635 UART: [art] Derive Key Pair
2,907,995 UART: [art] Store priv key in slot 0x5
2,921,441 UART: [art] Derive Key Pair - Done
2,936,438 UART: [art] Signing Cert with AUTHO
2,936,918 UART: RITY.KEYID = 7
2,951,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,641 UART: [art] PUB.X = 207AACBD7B2CAB4FEE2B5A1C6DC565C76AB558DD824BC36DE9D5EAAC8B0516F3A859517B753AAD5EC1E08F347162ABB0
2,959,436 UART: [art] PUB.Y = F385F5A185D921E192409DBC8451C52D3C02A6118B46003CF9C40E87CE1272CD7F6879C0E51032422771942C05168F8A
2,966,347 UART: [art] SIG.R = 5E758C34F6079FDDF24F6353FE038298213D30748D1875E2F7A31D909393B5CF529C87203ED4A8D1E6824299F7F2BDC2
2,973,109 UART: [art] SIG.S = BC934D6BB046E834344DF6DE0AF80A1355D462D334E0A62F59A783A55564D0D483E659D811865100E78C9E212F3381AB
2,996,382 UART: Caliptra RT
2,996,727 UART: [state] CFI Enabled
3,116,206 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,268 UART: [rt]cmd =0x44504543, len=92
3,338,942 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,690 ready_for_fw is high
1,060,690 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,645 >>> mbox cmd response: success
2,625,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,687,691 UART:
2,687,707 UART: Running Caliptra FMC ...
2,688,115 UART:
2,688,258 UART: [state] CFI Enabled
2,698,993 UART: [fht] FMC Alias Private Key: 7
2,806,398 UART: [art] Extend RT PCRs Done
2,806,826 UART: [art] Lock RT PCRs Done
2,808,098 UART: [art] Populate DV Done
2,816,203 UART: [fht] FMC Alias Private Key: 7
2,817,299 UART: [art] Derive CDI
2,817,579 UART: [art] Store in in slot 0x4
2,903,020 UART: [art] Derive Key Pair
2,903,380 UART: [art] Store priv key in slot 0x5
2,916,416 UART: [art] Derive Key Pair - Done
2,931,219 UART: [art] Signing Cert with AUTHO
2,931,699 UART: RITY.KEYID = 7
2,946,885 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,650 UART: [art] PUB.X = 207AACBD7B2CAB4FEE2B5A1C6DC565C76AB558DD824BC36DE9D5EAAC8B0516F3A859517B753AAD5EC1E08F347162ABB0
2,954,445 UART: [art] PUB.Y = F385F5A185D921E192409DBC8451C52D3C02A6118B46003CF9C40E87CE1272CD7F6879C0E51032422771942C05168F8A
2,961,356 UART: [art] SIG.R = 5E758C34F6079FDDF24F6353FE038298213D30748D1875E2F7A31D909393B5CF529C87203ED4A8D1E6824299F7F2BDC2
2,968,118 UART: [art] SIG.S = BC934D6BB046E834344DF6DE0AF80A1355D462D334E0A62F59A783A55564D0D483E659D811865100E78C9E212F3381AB
2,992,523 UART: Caliptra RT
2,992,868 UART: [state] CFI Enabled
3,102,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,055 UART: [rt]cmd =0x4d454153, len=108
3,153,406 >>> mbox cmd response data (12 bytes)
3,153,407 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,316 UART: [rt]cmd =0x44504543, len=92
3,374,086 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,998 ready_for_fw is high
1,060,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,239 >>> mbox cmd response: success
2,623,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,949 UART:
2,685,965 UART: Running Caliptra FMC ...
2,686,373 UART:
2,686,516 UART: [state] CFI Enabled
2,697,041 UART: [fht] FMC Alias Private Key: 7
2,805,216 UART: [art] Extend RT PCRs Done
2,805,644 UART: [art] Lock RT PCRs Done
2,807,276 UART: [art] Populate DV Done
2,815,635 UART: [fht] FMC Alias Private Key: 7
2,816,585 UART: [art] Derive CDI
2,816,865 UART: [art] Store in in slot 0x4
2,902,126 UART: [art] Derive Key Pair
2,902,486 UART: [art] Store priv key in slot 0x5
2,916,012 UART: [art] Derive Key Pair - Done
2,930,663 UART: [art] Signing Cert with AUTHO
2,931,143 UART: RITY.KEYID = 7
2,946,807 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,572 UART: [art] PUB.X = 207AACBD7B2CAB4FEE2B5A1C6DC565C76AB558DD824BC36DE9D5EAAC8B0516F3A859517B753AAD5EC1E08F347162ABB0
2,954,367 UART: [art] PUB.Y = F385F5A185D921E192409DBC8451C52D3C02A6118B46003CF9C40E87CE1272CD7F6879C0E51032422771942C05168F8A
2,961,278 UART: [art] SIG.R = 5E758C34F6079FDDF24F6353FE038298213D30748D1875E2F7A31D909393B5CF529C87203ED4A8D1E6824299F7F2BDC2
2,968,040 UART: [art] SIG.S = BC934D6BB046E834344DF6DE0AF80A1355D462D334E0A62F59A783A55564D0D483E659D811865100E78C9E212F3381AB
2,991,715 UART: Caliptra RT
2,992,060 UART: [state] CFI Enabled
3,099,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,715 UART: [rt]cmd =0x44504543, len=96
3,163,796 >>> mbox cmd response data (56 bytes)
3,163,797 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,992 UART: [rt]cmd =0x44504543, len=92
3,385,590 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.76s
Truncated 4783 bytes from beginning
7
3,123,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,336 UART: [art] PUB.X = BF69823089573D85C0AB32DCFFEAE8FB7B07AD1B7C3959C83316DEECB26D9106E49EF05FD83FC24FC9E1C65853F93B3B
3,131,120 UART: [art] PUB.Y = 7F47F012ADCE70A9BB8308C78E226BF0CE184684C578C36590782ADB727C1EE0D930C011D2C5913E0FEABFC0B66DC42F
3,138,078 UART: [art] SIG.R = 7230AC139B6B90580A5E8915D14DD2E2B9E6EA74AFCED39549D42130F7C635DDB8F23E364ADDB655D4A38D8767506AF9
3,144,855 UART: [art] SIG.S = 90C74A2BF98DB6547C9E9EBE410888DA1F5A5BBC9079414F1C1F04A7A3AE4E5094EC78F2B41464BB956969CE92E71B33
3,168,172 UART: Caliptra RT
3,168,425 UART: [state] CFI Enabled
3,287,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,970 UART: [rt]cmd =0x44504543, len=92
3,509,259 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,700 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
1,169,480 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,174,297 ready_for_fw is high
1,174,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,987 UART: [idev] Erasing UDS.KEYID = 0
1,199,261 UART: [idev] Sha1 KeyId Algorithm
1,208,343 UART: [idev] --
1,209,368 UART: [ldev] ++
1,209,536 UART: [ldev] CDI.KEYID = 6
1,209,900 UART: [ldev] SUBJECT.KEYID = 5
1,210,327 UART: [ldev] AUTHORITY.KEYID = 7
1,210,790 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,242,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,434 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,785 >>> mbox cmd response: success
2,768,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,770,034 UART: [afmc] ++
2,770,202 UART: [afmc] CDI.KEYID = 6
2,770,565 UART: [afmc] SUBJECT.KEYID = 7
2,770,991 UART: [afmc] AUTHORITY.KEYID = 5
2,805,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,341 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,672 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,465 UART: [afmc] --
2,849,393 UART: [cold-reset] --
2,850,303 UART: [state] Locking Datavault
2,851,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,230 UART: [state] Locking ICCM
2,852,884 UART: [exit] Launching FMC @ 0x40000130
2,858,213 UART:
2,858,229 UART: Running Caliptra FMC ...
2,858,637 UART:
2,858,691 UART: [state] CFI Enabled
2,869,512 UART: [fht] FMC Alias Private Key: 7
2,976,803 UART: [art] Extend RT PCRs Done
2,977,231 UART: [art] Lock RT PCRs Done
2,979,057 UART: [art] Populate DV Done
2,987,288 UART: [fht] FMC Alias Private Key: 7
2,988,404 UART: [art] Derive CDI
2,988,684 UART: [art] Store in in slot 0x4
3,074,315 UART: [art] Derive Key Pair
3,074,675 UART: [art] Store priv key in slot 0x5
3,087,911 UART: [art] Derive Key Pair - Done
3,102,790 UART: [art] Signing Cert with AUTHO
3,103,270 UART: RITY.KEYID = 7
3,118,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,151 UART: [art] PUB.X = BF69823089573D85C0AB32DCFFEAE8FB7B07AD1B7C3959C83316DEECB26D9106E49EF05FD83FC24FC9E1C65853F93B3B
3,125,935 UART: [art] PUB.Y = 7F47F012ADCE70A9BB8308C78E226BF0CE184684C578C36590782ADB727C1EE0D930C011D2C5913E0FEABFC0B66DC42F
3,132,893 UART: [art] SIG.R = 7230AC139B6B90580A5E8915D14DD2E2B9E6EA74AFCED39549D42130F7C635DDB8F23E364ADDB655D4A38D8767506AF9
3,139,670 UART: [art] SIG.S = 90C74A2BF98DB6547C9E9EBE410888DA1F5A5BBC9079414F1C1F04A7A3AE4E5094EC78F2B41464BB956969CE92E71B33
3,163,765 UART: Caliptra RT
3,164,018 UART: [state] CFI Enabled
3,271,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,199 UART: [rt]cmd =0x4d454153, len=108
3,323,446 >>> mbox cmd response data (12 bytes)
3,323,447 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,440 UART: [rt]cmd =0x44504543, len=92
3,544,469 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,174,183 ready_for_fw is high
1,174,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,812 UART: [fwproc] Wait for Commands...
1,281,431 UART: [fwproc] Recv command 0x46574c44
1,282,164 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,127 >>> mbox cmd response: success
2,769,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,770,188 UART: [afmc] ++
2,770,356 UART: [afmc] CDI.KEYID = 6
2,770,719 UART: [afmc] SUBJECT.KEYID = 7
2,771,145 UART: [afmc] AUTHORITY.KEYID = 5
2,806,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,041 UART: [afmc] --
2,850,043 UART: [cold-reset] --
2,850,917 UART: [state] Locking Datavault
2,852,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,648 UART: [state] Locking ICCM
2,853,170 UART: [exit] Launching FMC @ 0x40000130
2,858,499 UART:
2,858,515 UART: Running Caliptra FMC ...
2,858,923 UART:
2,858,977 UART: [state] CFI Enabled
2,869,372 UART: [fht] FMC Alias Private Key: 7
2,977,225 UART: [art] Extend RT PCRs Done
2,977,653 UART: [art] Lock RT PCRs Done
2,979,229 UART: [art] Populate DV Done
2,987,576 UART: [fht] FMC Alias Private Key: 7
2,988,520 UART: [art] Derive CDI
2,988,800 UART: [art] Store in in slot 0x4
3,074,541 UART: [art] Derive Key Pair
3,074,901 UART: [art] Store priv key in slot 0x5
3,088,153 UART: [art] Derive Key Pair - Done
3,102,860 UART: [art] Signing Cert with AUTHO
3,103,340 UART: RITY.KEYID = 7
3,118,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,621 UART: [art] PUB.X = BF69823089573D85C0AB32DCFFEAE8FB7B07AD1B7C3959C83316DEECB26D9106E49EF05FD83FC24FC9E1C65853F93B3B
3,126,405 UART: [art] PUB.Y = 7F47F012ADCE70A9BB8308C78E226BF0CE184684C578C36590782ADB727C1EE0D930C011D2C5913E0FEABFC0B66DC42F
3,133,363 UART: [art] SIG.R = 7230AC139B6B90580A5E8915D14DD2E2B9E6EA74AFCED39549D42130F7C635DDB8F23E364ADDB655D4A38D8767506AF9
3,140,140 UART: [art] SIG.S = 90C74A2BF98DB6547C9E9EBE410888DA1F5A5BBC9079414F1C1F04A7A3AE4E5094EC78F2B41464BB956969CE92E71B33
3,163,975 UART: Caliptra RT
3,164,228 UART: [state] CFI Enabled
3,272,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,321 UART: [rt]cmd =0x44504543, len=96
3,336,692 >>> mbox cmd response data (56 bytes)
3,336,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,604 UART: [rt]cmd =0x44504543, len=92
3,556,703 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,702 >>> mbox cmd response data (12 bytes)
1,138,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,691 >>> mbox cmd response: success
2,622,691 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,684,685 UART:
2,684,701 UART: Running Caliptra FMC ...
2,685,109 UART:
2,685,163 UART: [state] CFI Enabled
2,695,372 UART: [fht] FMC Alias Private Key: 7
2,802,719 UART: [art] Extend RT PCRs Done
2,803,147 UART: [art] Lock RT PCRs Done
2,805,005 UART: [art] Populate DV Done
2,813,332 UART: [fht] FMC Alias Private Key: 7
2,814,466 UART: [art] Derive CDI
2,814,746 UART: [art] Store in in slot 0x4
2,900,263 UART: [art] Derive Key Pair
2,900,623 UART: [art] Store priv key in slot 0x5
2,913,881 UART: [art] Derive Key Pair - Done
2,928,966 UART: [art] Signing Cert with AUTHO
2,929,446 UART: RITY.KEYID = 7
2,944,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,077 UART: [art] PUB.X = FFA5E782206D5DB0396C9E7C40198DC095065B7181AD0E3566F8F4EE20D9B9CDFB99A90579FD2324392D27F69C0F0638
2,951,836 UART: [art] PUB.Y = 49C55064B63BDF83971847886A98B4AD4521DF64DBD55F8B2D089208C24933F832A01C0EB95E88EB5159DD3C5AFE4387
2,958,779 UART: [art] SIG.R = 21BF0D958185268393191F5A8B432BC77C92C3CAFF1E7FF2653F7D69D3BFB2697FB52022F8BFBA0FD7D1144E0110BEB4
2,965,552 UART: [art] SIG.S = 4DAFAE867FCF07BFC0BF8B72597A6D4B830A861BE52D7CBD6DFE8684E473ED7F7EDCE65CE85ADEB1CF6821116509E806
2,989,621 UART: Caliptra RT
2,989,874 UART: [state] CFI Enabled
3,110,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,939 UART: [rt]cmd =0x44504543, len=92
3,332,454 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,298 ready_for_fw is high
1,055,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,583 >>> mbox cmd response: success
2,617,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,678,855 UART:
2,678,871 UART: Running Caliptra FMC ...
2,679,279 UART:
2,679,333 UART: [state] CFI Enabled
2,689,862 UART: [fht] FMC Alias Private Key: 7
2,798,133 UART: [art] Extend RT PCRs Done
2,798,561 UART: [art] Lock RT PCRs Done
2,799,977 UART: [art] Populate DV Done
2,808,204 UART: [fht] FMC Alias Private Key: 7
2,809,342 UART: [art] Derive CDI
2,809,622 UART: [art] Store in in slot 0x4
2,895,235 UART: [art] Derive Key Pair
2,895,595 UART: [art] Store priv key in slot 0x5
2,909,005 UART: [art] Derive Key Pair - Done
2,923,858 UART: [art] Signing Cert with AUTHO
2,924,338 UART: RITY.KEYID = 7
2,939,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,113 UART: [art] PUB.X = FFA5E782206D5DB0396C9E7C40198DC095065B7181AD0E3566F8F4EE20D9B9CDFB99A90579FD2324392D27F69C0F0638
2,946,872 UART: [art] PUB.Y = 49C55064B63BDF83971847886A98B4AD4521DF64DBD55F8B2D089208C24933F832A01C0EB95E88EB5159DD3C5AFE4387
2,953,815 UART: [art] SIG.R = 21BF0D958185268393191F5A8B432BC77C92C3CAFF1E7FF2653F7D69D3BFB2697FB52022F8BFBA0FD7D1144E0110BEB4
2,960,588 UART: [art] SIG.S = 4DAFAE867FCF07BFC0BF8B72597A6D4B830A861BE52D7CBD6DFE8684E473ED7F7EDCE65CE85ADEB1CF6821116509E806
2,983,861 UART: Caliptra RT
2,984,114 UART: [state] CFI Enabled
3,092,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,105 UART: [rt]cmd =0x4d454153, len=108
3,144,334 >>> mbox cmd response data (12 bytes)
3,144,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,288 UART: [rt]cmd =0x44504543, len=92
3,365,619 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,514 ready_for_fw is high
1,056,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,187 >>> mbox cmd response: success
2,620,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,682,939 UART:
2,682,955 UART: Running Caliptra FMC ...
2,683,363 UART:
2,683,417 UART: [state] CFI Enabled
2,693,936 UART: [fht] FMC Alias Private Key: 7
2,801,299 UART: [art] Extend RT PCRs Done
2,801,727 UART: [art] Lock RT PCRs Done
2,803,481 UART: [art] Populate DV Done
2,811,964 UART: [fht] FMC Alias Private Key: 7
2,813,004 UART: [art] Derive CDI
2,813,284 UART: [art] Store in in slot 0x4
2,898,975 UART: [art] Derive Key Pair
2,899,335 UART: [art] Store priv key in slot 0x5
2,912,137 UART: [art] Derive Key Pair - Done
2,926,706 UART: [art] Signing Cert with AUTHO
2,927,186 UART: RITY.KEYID = 7
2,942,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,879 UART: [art] PUB.X = FFA5E782206D5DB0396C9E7C40198DC095065B7181AD0E3566F8F4EE20D9B9CDFB99A90579FD2324392D27F69C0F0638
2,949,638 UART: [art] PUB.Y = 49C55064B63BDF83971847886A98B4AD4521DF64DBD55F8B2D089208C24933F832A01C0EB95E88EB5159DD3C5AFE4387
2,956,581 UART: [art] SIG.R = 21BF0D958185268393191F5A8B432BC77C92C3CAFF1E7FF2653F7D69D3BFB2697FB52022F8BFBA0FD7D1144E0110BEB4
2,963,354 UART: [art] SIG.S = 4DAFAE867FCF07BFC0BF8B72597A6D4B830A861BE52D7CBD6DFE8684E473ED7F7EDCE65CE85ADEB1CF6821116509E806
2,987,205 UART: Caliptra RT
2,987,458 UART: [state] CFI Enabled
3,094,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,405 UART: [rt]cmd =0x44504543, len=96
3,157,572 >>> mbox cmd response data (56 bytes)
3,157,573 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,374 UART: [rt]cmd =0x44504543, len=92
3,378,271 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.65s
Truncated 4783 bytes from beginning
7
3,123,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,156 UART: [art] PUB.X = 79C3A0A33370A93FD7EBDA001C00B81C021440C9D322D14E31BFF6DA934F2880D348A952DF3EB5DF4A7F8F4104B532AE
3,130,888 UART: [art] PUB.Y = FE255ED1288524F8715E76EBDBEA2605D77E4F139A6239A811449C8A34628BF6E7B479DDFBF3C952B98723FC076FFE2A
3,137,842 UART: [art] SIG.R = F81BA2BAC436EB247BEDCBFCE4AD8E2375C5CABA4420010287A094F7C1D1414F40F9EBBBF11D8DF379ECA604921D214C
3,144,627 UART: [art] SIG.S = 7C5AF4DA2A00728F65A13D988E0BF11E305CD80FB42E81FD85403BDBA04862F034ABADF13A4DA455F0D88000AB5FFCA8
3,169,076 UART: Caliptra RT
3,169,421 UART: [state] CFI Enabled
3,287,956 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,872 UART: [rt]cmd =0x44504543, len=92
3,510,203 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: [kat] ++
895,806 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,778 UART: [idev] Erasing UDS.KEYID = 0
1,199,958 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,205 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,702 >>> mbox cmd response: success
2,769,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,770,785 UART: [afmc] ++
2,770,953 UART: [afmc] CDI.KEYID = 6
2,771,316 UART: [afmc] SUBJECT.KEYID = 7
2,771,742 UART: [afmc] AUTHORITY.KEYID = 5
2,806,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,918 UART: [afmc] --
2,849,856 UART: [cold-reset] --
2,850,606 UART: [state] Locking Datavault
2,851,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,585 UART: [state] Locking ICCM
2,853,241 UART: [exit] Launching FMC @ 0x40000130
2,858,570 UART:
2,858,586 UART: Running Caliptra FMC ...
2,858,994 UART:
2,859,137 UART: [state] CFI Enabled
2,869,536 UART: [fht] FMC Alias Private Key: 7
2,977,273 UART: [art] Extend RT PCRs Done
2,977,701 UART: [art] Lock RT PCRs Done
2,979,057 UART: [art] Populate DV Done
2,987,530 UART: [fht] FMC Alias Private Key: 7
2,988,676 UART: [art] Derive CDI
2,988,956 UART: [art] Store in in slot 0x4
3,074,727 UART: [art] Derive Key Pair
3,075,087 UART: [art] Store priv key in slot 0x5
3,087,979 UART: [art] Derive Key Pair - Done
3,102,746 UART: [art] Signing Cert with AUTHO
3,103,226 UART: RITY.KEYID = 7
3,118,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,031 UART: [art] PUB.X = 79C3A0A33370A93FD7EBDA001C00B81C021440C9D322D14E31BFF6DA934F2880D348A952DF3EB5DF4A7F8F4104B532AE
3,125,763 UART: [art] PUB.Y = FE255ED1288524F8715E76EBDBEA2605D77E4F139A6239A811449C8A34628BF6E7B479DDFBF3C952B98723FC076FFE2A
3,132,717 UART: [art] SIG.R = F81BA2BAC436EB247BEDCBFCE4AD8E2375C5CABA4420010287A094F7C1D1414F40F9EBBBF11D8DF379ECA604921D214C
3,139,502 UART: [art] SIG.S = 7C5AF4DA2A00728F65A13D988E0BF11E305CD80FB42E81FD85403BDBA04862F034ABADF13A4DA455F0D88000AB5FFCA8
3,163,329 UART: Caliptra RT
3,163,674 UART: [state] CFI Enabled
3,271,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,133 UART: [rt]cmd =0x4d454153, len=108
3,322,982 >>> mbox cmd response data (12 bytes)
3,322,983 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,864 UART: [rt]cmd =0x44504543, len=92
3,544,927 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,974 UART: [kat] ++
896,126 UART: [kat] sha1
900,274 UART: [kat] SHA2-256
902,214 UART: [kat] SHA2-384
905,135 UART: [kat] SHA2-512-ACC
907,036 UART: [kat] ECC-384
916,589 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,842 UART: [idev] ++
1,174,010 UART: [idev] CDI.KEYID = 6
1,174,371 UART: [idev] SUBJECT.KEYID = 7
1,174,796 UART: [idev] UDS.KEYID = 0
1,175,142 ready_for_fw is high
1,175,142 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,420 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,041 UART: [ldev] --
1,282,433 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,863 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,224 >>> mbox cmd response: success
2,771,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,317 UART: [afmc] ++
2,772,485 UART: [afmc] CDI.KEYID = 6
2,772,848 UART: [afmc] SUBJECT.KEYID = 7
2,773,274 UART: [afmc] AUTHORITY.KEYID = 5
2,808,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,999 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,014 UART: [afmc] --
2,853,022 UART: [cold-reset] --
2,853,680 UART: [state] Locking Datavault
2,854,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,363 UART: [state] Locking ICCM
2,856,015 UART: [exit] Launching FMC @ 0x40000130
2,861,344 UART:
2,861,360 UART: Running Caliptra FMC ...
2,861,768 UART:
2,861,911 UART: [state] CFI Enabled
2,872,798 UART: [fht] FMC Alias Private Key: 7
2,981,111 UART: [art] Extend RT PCRs Done
2,981,539 UART: [art] Lock RT PCRs Done
2,982,967 UART: [art] Populate DV Done
2,991,134 UART: [fht] FMC Alias Private Key: 7
2,992,224 UART: [art] Derive CDI
2,992,504 UART: [art] Store in in slot 0x4
3,078,185 UART: [art] Derive Key Pair
3,078,545 UART: [art] Store priv key in slot 0x5
3,091,993 UART: [art] Derive Key Pair - Done
3,107,210 UART: [art] Signing Cert with AUTHO
3,107,690 UART: RITY.KEYID = 7
3,123,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,839 UART: [art] PUB.X = 79C3A0A33370A93FD7EBDA001C00B81C021440C9D322D14E31BFF6DA934F2880D348A952DF3EB5DF4A7F8F4104B532AE
3,130,571 UART: [art] PUB.Y = FE255ED1288524F8715E76EBDBEA2605D77E4F139A6239A811449C8A34628BF6E7B479DDFBF3C952B98723FC076FFE2A
3,137,525 UART: [art] SIG.R = F81BA2BAC436EB247BEDCBFCE4AD8E2375C5CABA4420010287A094F7C1D1414F40F9EBBBF11D8DF379ECA604921D214C
3,144,310 UART: [art] SIG.S = 7C5AF4DA2A00728F65A13D988E0BF11E305CD80FB42E81FD85403BDBA04862F034ABADF13A4DA455F0D88000AB5FFCA8
3,167,739 UART: Caliptra RT
3,168,084 UART: [state] CFI Enabled
3,276,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,433 UART: [rt]cmd =0x44504543, len=96
3,340,694 >>> mbox cmd response data (56 bytes)
3,340,695 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,762 UART: [rt]cmd =0x44504543, len=92
3,562,089 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,813 >>> mbox cmd response data (12 bytes)
1,139,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,094 >>> mbox cmd response: success
2,623,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,416 UART:
2,685,432 UART: Running Caliptra FMC ...
2,685,840 UART:
2,685,983 UART: [state] CFI Enabled
2,696,048 UART: [fht] FMC Alias Private Key: 7
2,804,031 UART: [art] Extend RT PCRs Done
2,804,459 UART: [art] Lock RT PCRs Done
2,805,841 UART: [art] Populate DV Done
2,814,032 UART: [fht] FMC Alias Private Key: 7
2,815,042 UART: [art] Derive CDI
2,815,322 UART: [art] Store in in slot 0x4
2,901,229 UART: [art] Derive Key Pair
2,901,589 UART: [art] Store priv key in slot 0x5
2,914,981 UART: [art] Derive Key Pair - Done
2,930,014 UART: [art] Signing Cert with AUTHO
2,930,494 UART: RITY.KEYID = 7
2,945,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,415 UART: [art] PUB.X = 5F0E7143154AE3A3055AB9014183655CB9EA2C3DEF5168130B487CAFBEE2B2431A1DFFDC75BB2E5646F40925C80D8A09
2,953,174 UART: [art] PUB.Y = 47FC5DD934A86E5A1F2B1542258250FE2FBBED7C7D14AE1D4227C78B96DC0498F58FE3829A560F6020307FA2B92A1890
2,960,124 UART: [art] SIG.R = E9A9403A40954064E1B0463418DC922F84327A972E8F84CE7982138F8C1E9AC51B20F5A32AD3DAB756C3D93FF7188F49
2,966,894 UART: [art] SIG.S = DC363926BCEB508870D669764F12FD74345524EE9964E92B86EE523E35E1F22452FEFCBF10207ACED45708826D9EC6C5
2,990,328 UART: Caliptra RT
2,990,673 UART: [state] CFI Enabled
3,111,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,355 UART: [rt]cmd =0x44504543, len=92
3,334,057 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,551 ready_for_fw is high
1,056,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,968 >>> mbox cmd response: success
2,620,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,682,744 UART:
2,682,760 UART: Running Caliptra FMC ...
2,683,168 UART:
2,683,311 UART: [state] CFI Enabled
2,694,408 UART: [fht] FMC Alias Private Key: 7
2,801,023 UART: [art] Extend RT PCRs Done
2,801,451 UART: [art] Lock RT PCRs Done
2,803,011 UART: [art] Populate DV Done
2,811,182 UART: [fht] FMC Alias Private Key: 7
2,812,230 UART: [art] Derive CDI
2,812,510 UART: [art] Store in in slot 0x4
2,898,217 UART: [art] Derive Key Pair
2,898,577 UART: [art] Store priv key in slot 0x5
2,912,165 UART: [art] Derive Key Pair - Done
2,927,144 UART: [art] Signing Cert with AUTHO
2,927,624 UART: RITY.KEYID = 7
2,942,460 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,225 UART: [art] PUB.X = 5F0E7143154AE3A3055AB9014183655CB9EA2C3DEF5168130B487CAFBEE2B2431A1DFFDC75BB2E5646F40925C80D8A09
2,949,984 UART: [art] PUB.Y = 47FC5DD934A86E5A1F2B1542258250FE2FBBED7C7D14AE1D4227C78B96DC0498F58FE3829A560F6020307FA2B92A1890
2,956,934 UART: [art] SIG.R = E9A9403A40954064E1B0463418DC922F84327A972E8F84CE7982138F8C1E9AC51B20F5A32AD3DAB756C3D93FF7188F49
2,963,704 UART: [art] SIG.S = DC363926BCEB508870D669764F12FD74345524EE9964E92B86EE523E35E1F22452FEFCBF10207ACED45708826D9EC6C5
2,987,308 UART: Caliptra RT
2,987,653 UART: [state] CFI Enabled
3,095,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,509 UART: [rt]cmd =0x4d454153, len=108
3,146,852 >>> mbox cmd response data (12 bytes)
3,146,853 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,176,712 UART: [rt]cmd =0x44504543, len=92
3,368,796 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,787 ready_for_fw is high
1,055,787 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,912 >>> mbox cmd response: success
2,619,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,681,680 UART:
2,681,696 UART: Running Caliptra FMC ...
2,682,104 UART:
2,682,247 UART: [state] CFI Enabled
2,692,770 UART: [fht] FMC Alias Private Key: 7
2,800,805 UART: [art] Extend RT PCRs Done
2,801,233 UART: [art] Lock RT PCRs Done
2,802,531 UART: [art] Populate DV Done
2,810,830 UART: [fht] FMC Alias Private Key: 7
2,811,838 UART: [art] Derive CDI
2,812,118 UART: [art] Store in in slot 0x4
2,897,861 UART: [art] Derive Key Pair
2,898,221 UART: [art] Store priv key in slot 0x5
2,911,175 UART: [art] Derive Key Pair - Done
2,926,124 UART: [art] Signing Cert with AUTHO
2,926,604 UART: RITY.KEYID = 7
2,941,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,565 UART: [art] PUB.X = 5F0E7143154AE3A3055AB9014183655CB9EA2C3DEF5168130B487CAFBEE2B2431A1DFFDC75BB2E5646F40925C80D8A09
2,949,324 UART: [art] PUB.Y = 47FC5DD934A86E5A1F2B1542258250FE2FBBED7C7D14AE1D4227C78B96DC0498F58FE3829A560F6020307FA2B92A1890
2,956,274 UART: [art] SIG.R = E9A9403A40954064E1B0463418DC922F84327A972E8F84CE7982138F8C1E9AC51B20F5A32AD3DAB756C3D93FF7188F49
2,963,044 UART: [art] SIG.S = DC363926BCEB508870D669764F12FD74345524EE9964E92B86EE523E35E1F22452FEFCBF10207ACED45708826D9EC6C5
2,987,438 UART: Caliptra RT
2,987,783 UART: [state] CFI Enabled
3,095,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,625 UART: [rt]cmd =0x44504543, len=96
3,159,126 >>> mbox cmd response data (56 bytes)
3,159,127 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,110 UART: [rt]cmd =0x44504543, len=92
3,380,124 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,181 UART:
192,553 UART: Running Caliptra ROM ...
194,051 UART:
194,220 UART: [state] CFI Enabled
262,874 UART: [state] LifecycleState = Unprovisioned
264,806 UART: [state] DebugLocked = No
266,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,401 UART: [kat] SHA2-256
441,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,569 UART: [kat] ++
452,099 UART: [kat] sha1
461,701 UART: [kat] SHA2-256
464,430 UART: [kat] SHA2-384
469,996 UART: [kat] SHA2-512-ACC
472,312 UART: [kat] ECC-384
2,768,147 UART: [kat] HMAC-384Kdf
2,801,910 UART: [kat] LMS
3,992,216 UART: [kat] --
3,995,928 UART: [cold-reset] ++
3,998,143 UART: [fht] Storing FHT @ 0x50003400
4,007,985 UART: [idev] ++
4,008,554 UART: [idev] CDI.KEYID = 6
4,009,513 UART: [idev] SUBJECT.KEYID = 7
4,010,766 UART: [idev] UDS.KEYID = 0
4,011,719 ready_for_fw is high
4,011,911 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,249 UART: [idev] Erasing UDS.KEYID = 0
7,348,196 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,195 UART: [idev] --
7,374,224 UART: [ldev] ++
7,374,818 UART: [ldev] CDI.KEYID = 6
7,375,839 UART: [ldev] SUBJECT.KEYID = 5
7,376,942 UART: [ldev] AUTHORITY.KEYID = 7
7,378,225 UART: [ldev] FE.KEYID = 1
7,423,777 UART: [ldev] Erasing FE.KEYID = 1
10,759,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,611 UART: [ldev] --
13,136,172 UART: [fwproc] Waiting for Commands...
13,139,237 UART: [fwproc] Received command 0x46574c44
13,141,469 UART: [fwproc] Received Image of size 113760 bytes
17,187,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,208 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,654,902 >>> mbox cmd response: success
17,655,388 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,658,218 UART: [afmc] ++
17,658,802 UART: [afmc] CDI.KEYID = 6
17,659,824 UART: [afmc] SUBJECT.KEYID = 7
17,660,989 UART: [afmc] AUTHORITY.KEYID = 5
21,026,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,525 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,891 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,731 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,187 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,094 UART: [afmc] --
23,400,635 UART: [cold-reset] --
23,404,831 UART: [state] Locking Datavault
23,410,313 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,070 UART: [state] Locking ICCM
23,413,250 UART: [exit] Launching FMC @ 0x40000130
23,421,647 UART:
23,421,891 UART: Running Caliptra FMC ...
23,422,993 UART:
23,423,152 UART: [state] CFI Enabled
23,491,153 UART: [fht] FMC Alias Private Key: 7
25,828,820 UART: [art] Extend RT PCRs Done
25,830,037 UART: [art] Lock RT PCRs Done
25,831,638 UART: [art] Populate DV Done
25,837,151 UART: [fht] FMC Alias Private Key: 7
25,838,630 UART: [art] Derive CDI
25,839,364 UART: [art] Store in in slot 0x4
25,900,268 UART: [art] Derive Key Pair
25,901,304 UART: [art] Store priv key in slot 0x5
29,194,358 UART: [art] Derive Key Pair - Done
29,207,466 UART: [art] Signing Cert with AUTHO
29,208,774 UART: RITY.KEYID = 7
31,496,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,884 UART: [art] PUB.X = E381C9F9B4BCB5ABA89CB1DB3913AA8F480CF008C24E1991F4187FC191977DB061ED9D25FD2B701D6BB45C584B65049E
31,505,128 UART: [art] PUB.Y = A2F4F673D472DCAC1ED325560CA7763242DDBEBBF35AB1C843C7DD136E0AEBE7E4B5F2442352FB5C63F47873E9CF4515
31,512,410 UART: [art] SIG.R = CAB4C067C0FF3EFA4E71E17B2D9FD782B36730EDDD174A676B31F36D455D6729D4891B425A487EC07CCE7478D4C65FA4
31,519,792 UART: [art] SIG.S = EB775814618116A50B38C07ECB39E60154EAD79CBAD9EF53CD08CD25AD34EF4CF9613E90BF50E91069635514DB596168
32,824,849 UART: Caliptra RT
32,825,567 UART: [state] CFI Enabled
32,986,669 UART: [rt] RT listening for mailbox commands...
33,017,974 UART: [rt]cmd =0x43455252, len=4
33,029,367 >>> mbox cmd response data (784 bytes)
33,072,431 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,103,000 UART: [rt]cmd =0x44504543, len=92
38,850,219 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,805,209 ready_for_fw is high
3,805,624 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,885,876 >>> mbox cmd response: success
17,886,684 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,587,150 UART:
23,587,549 UART: Running Caliptra FMC ...
23,588,657 UART:
23,588,811 UART: [state] CFI Enabled
23,659,371 UART: [fht] FMC Alias Private Key: 7
25,996,395 UART: [art] Extend RT PCRs Done
25,997,626 UART: [art] Lock RT PCRs Done
25,999,384 UART: [art] Populate DV Done
26,004,641 UART: [fht] FMC Alias Private Key: 7
26,006,294 UART: [art] Derive CDI
26,007,037 UART: [art] Store in in slot 0x4
26,068,218 UART: [art] Derive Key Pair
26,069,261 UART: [art] Store priv key in slot 0x5
29,362,528 UART: [art] Derive Key Pair - Done
29,375,630 UART: [art] Signing Cert with AUTHO
29,376,981 UART: RITY.KEYID = 7
31,664,022 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,532 UART: [art] PUB.X = 8CC28E6C262DE08B70A364C60CB248E98F2E789D1BDAC583C811417A09031EE7F498F59D70CA91FE4B317036F3AC13A6
31,672,739 UART: [art] PUB.Y = 010523A2AC951DF87288602311D57D76938C31DC292DF6071D691DDB7D1A79AEBAEE5271DD0AF3DDB88D7E6F78351866
31,679,980 UART: [art] SIG.R = D8E37398BA849A9E1D07F51A369A21185A14FE51B8557AEB64CC4C478E1C438AE7152B7E635B52310EBC4D91183E3408
31,687,390 UART: [art] SIG.S = 298BA08130831A9641400584B04E219144DA92FC13F8241E59CD2A25A5B756F352C34B3DA47942EE308FB8BAA6C47B15
32,992,561 UART: Caliptra RT
32,993,259 UART: [state] CFI Enabled
33,155,107 UART: [rt] RT listening for mailbox commands...
33,186,406 UART: [rt]cmd =0x43455252, len=4
33,197,871 >>> mbox cmd response data (783 bytes)
33,242,034 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,272,923 UART: [rt]cmd =0x44504543, len=92
39,039,398 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
193,016 UART:
193,393 UART: Running Caliptra ROM ...
194,544 UART:
604,175 UART: [state] CFI Enabled
618,228 UART: [state] LifecycleState = Unprovisioned
620,126 UART: [state] DebugLocked = No
622,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,553 UART: [kat] SHA2-256
798,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,842 UART: [kat] ++
809,288 UART: [kat] sha1
820,722 UART: [kat] SHA2-256
823,451 UART: [kat] SHA2-384
828,227 UART: [kat] SHA2-512-ACC
830,590 UART: [kat] ECC-384
3,114,441 UART: [kat] HMAC-384Kdf
3,125,741 UART: [kat] LMS
4,315,843 UART: [kat] --
4,321,047 UART: [cold-reset] ++
4,323,049 UART: [fht] Storing FHT @ 0x50003400
4,333,385 UART: [idev] ++
4,333,954 UART: [idev] CDI.KEYID = 6
4,334,910 UART: [idev] SUBJECT.KEYID = 7
4,336,145 UART: [idev] UDS.KEYID = 0
4,337,175 ready_for_fw is high
4,337,384 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,326 UART: [idev] Erasing UDS.KEYID = 0
7,620,877 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,063 UART: [idev] --
7,647,371 UART: [ldev] ++
7,647,983 UART: [ldev] CDI.KEYID = 6
7,648,894 UART: [ldev] SUBJECT.KEYID = 5
7,650,102 UART: [ldev] AUTHORITY.KEYID = 7
7,651,383 UART: [ldev] FE.KEYID = 1
7,663,859 UART: [ldev] Erasing FE.KEYID = 1
10,950,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,537 UART: [ldev] --
13,308,441 UART: [fwproc] Waiting for Commands...
13,311,666 UART: [fwproc] Received command 0x46574c44
13,313,891 UART: [fwproc] Received Image of size 113760 bytes
17,365,874 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,129 >>> mbox cmd response: success
17,826,624 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,830,812 UART: [afmc] ++
17,831,387 UART: [afmc] CDI.KEYID = 6
17,832,319 UART: [afmc] SUBJECT.KEYID = 7
17,833,593 UART: [afmc] AUTHORITY.KEYID = 5
21,149,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,800 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,108 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,457 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,272 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,759 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,615 UART: [afmc] --
23,518,147 UART: [cold-reset] --
23,521,848 UART: [state] Locking Datavault
23,527,423 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,179 UART: [state] Locking ICCM
23,531,431 UART: [exit] Launching FMC @ 0x40000130
23,539,822 UART:
23,540,055 UART: Running Caliptra FMC ...
23,541,158 UART:
23,541,309 UART: [state] CFI Enabled
23,549,092 UART: [fht] FMC Alias Private Key: 7
25,880,029 UART: [art] Extend RT PCRs Done
25,881,259 UART: [art] Lock RT PCRs Done
25,882,983 UART: [art] Populate DV Done
25,888,226 UART: [fht] FMC Alias Private Key: 7
25,889,963 UART: [art] Derive CDI
25,890,784 UART: [art] Store in in slot 0x4
25,933,455 UART: [art] Derive Key Pair
25,934,457 UART: [art] Store priv key in slot 0x5
29,176,711 UART: [art] Derive Key Pair - Done
29,189,756 UART: [art] Signing Cert with AUTHO
29,191,055 UART: RITY.KEYID = 7
31,470,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,840 UART: [art] PUB.X = A6C67DEB91F524F33A6A81A7C7EA431D450F36D8D9C0FECF273A05CA63C9A58A59AD4C629A1DE21AAFEE6F040E7CBA50
31,479,103 UART: [art] PUB.Y = 354B90C989820D92D8AE68C05F06F77ED0451A0280B7A3686C14AEB037FB0B897F6C68CAAAFD5B1E6948DFB359C32FB3
31,486,515 UART: [art] SIG.R = 7575F05FE98849C2AD8E5191E42EC371DA47B304FCCDF348E663214BC423F384AE76FAF0687F5C17DFAEE35E8250408F
31,493,802 UART: [art] SIG.S = 671373CC2CCDDBA2B6A44287FA44E2FB5AE95A93151EB1D4FAE4CB19912B71223B15174C8965306139AFFBC0B0A603D8
32,799,256 UART: Caliptra RT
32,799,971 UART: [state] CFI Enabled
32,917,404 UART: [rt] RT listening for mailbox commands...
32,948,642 UART: [rt]cmd =0x43455252, len=4
32,960,023 >>> mbox cmd response data (782 bytes)
33,002,346 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,033,085 UART: [rt]cmd =0x44504543, len=92
38,707,127 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
4,129,805 ready_for_fw is high
4,130,236 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,057,517 >>> mbox cmd response: success
18,058,298 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,691,755 UART:
23,692,136 UART: Running Caliptra FMC ...
23,693,300 UART:
23,693,459 UART: [state] CFI Enabled
23,701,364 UART: [fht] FMC Alias Private Key: 7
26,032,192 UART: [art] Extend RT PCRs Done
26,033,413 UART: [art] Lock RT PCRs Done
26,035,096 UART: [art] Populate DV Done
26,040,464 UART: [fht] FMC Alias Private Key: 7
26,041,969 UART: [art] Derive CDI
26,042,732 UART: [art] Store in in slot 0x4
26,085,552 UART: [art] Derive Key Pair
26,086,594 UART: [art] Store priv key in slot 0x5
29,328,703 UART: [art] Derive Key Pair - Done
29,341,808 UART: [art] Signing Cert with AUTHO
29,343,112 UART: RITY.KEYID = 7
31,622,421 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,925 UART: [art] PUB.X = A23AF52A97B876997B88D584898A8387E4990A26EBCE9A475044932BF83025AB67153809323692FE65118BC1E1EC6E68
31,631,164 UART: [art] PUB.Y = 7F8EA646C5A9016AAEDCF281546D5F58E3CC5E23A10D1B050F19AA4D08C997702CFC03CB376E4FFDEC81AD92A8F12592
31,638,429 UART: [art] SIG.R = 754012505CE8C005159BF4A4D64CB71895359B547E13241E550AD97AA6EDA3396ED051E38E047920DD5C27D8D2EC44D4
31,645,855 UART: [art] SIG.S = D35D4283EB950928E079F7B32A4A657962245FE9A93484876AE8E6F9142A20AD4CA390761CBE5E34C3EDE027EEEF9C72
32,951,263 UART: Caliptra RT
32,951,962 UART: [state] CFI Enabled
33,069,293 UART: [rt] RT listening for mailbox commands...
33,100,407 UART: [rt]cmd =0x43455252, len=4
33,111,843 >>> mbox cmd response data (783 bytes)
33,154,132 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,184,914 UART: [rt]cmd =0x44504543, len=92
38,859,846 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,489 writing to cptra_bootfsm_go
193,665 UART:
194,032 UART: Running Caliptra ROM ...
195,229 UART:
195,407 UART: [state] CFI Enabled
262,310 UART: [state] LifecycleState = Unprovisioned
264,139 UART: [state] DebugLocked = No
265,736 UART: [state] WD Timer not started. Device not locked for debugging
268,788 UART: [kat] SHA2-256
447,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,499 UART: [kat] ++
460,026 UART: [kat] sha1
471,122 UART: [kat] SHA2-256
474,193 UART: [kat] SHA2-384
480,175 UART: [kat] SHA2-512-ACC
483,144 UART: [kat] ECC-384
2,949,927 UART: [kat] HMAC-384Kdf
2,969,869 UART: [kat] LMS
3,499,311 UART: [kat] --
3,503,731 UART: [cold-reset] ++
3,505,678 UART: [fht] FHT @ 0x50003400
3,517,787 UART: [idev] ++
3,518,345 UART: [idev] CDI.KEYID = 6
3,519,226 UART: [idev] SUBJECT.KEYID = 7
3,520,459 UART: [idev] UDS.KEYID = 0
3,521,385 ready_for_fw is high
3,521,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,052 UART: [idev] Erasing UDS.KEYID = 0
6,026,308 UART: [idev] Sha1 KeyId Algorithm
6,048,897 UART: [idev] --
6,053,222 UART: [ldev] ++
6,053,800 UART: [ldev] CDI.KEYID = 6
6,054,681 UART: [ldev] SUBJECT.KEYID = 5
6,055,891 UART: [ldev] AUTHORITY.KEYID = 7
6,057,178 UART: [ldev] FE.KEYID = 1
6,098,375 UART: [ldev] Erasing FE.KEYID = 1
8,602,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,536 UART: [ldev] --
10,410,671 UART: [fwproc] Wait for Commands...
10,413,678 UART: [fwproc] Recv command 0x46574c44
10,415,758 UART: [fwproc] Recv'd Img size: 114084 bytes
13,813,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,715 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,286 >>> mbox cmd response: success
14,273,794 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,277,908 UART: [afmc] ++
14,278,499 UART: [afmc] CDI.KEYID = 6
14,279,401 UART: [afmc] SUBJECT.KEYID = 7
14,280,498 UART: [afmc] AUTHORITY.KEYID = 5
16,805,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,607 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,938 UART: [afmc] --
18,605,504 UART: [cold-reset] --
18,609,367 UART: [state] Locking Datavault
18,615,795 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,435 UART: [state] Locking ICCM
18,619,252 UART: [exit] Launching FMC @ 0x40000130
18,627,702 UART:
18,627,933 UART: Running Caliptra FMC ...
18,629,048 UART:
18,629,212 UART: [state] CFI Enabled
18,688,099 UART: [fht] FMC Alias Private Key: 7
20,451,024 UART: [art] Extend RT PCRs Done
20,452,247 UART: [art] Lock RT PCRs Done
20,454,119 UART: [art] Populate DV Done
20,459,367 UART: [fht] FMC Alias Private Key: 7
20,461,110 UART: [art] Derive CDI
20,461,842 UART: [art] Store in in slot 0x4
20,519,828 UART: [art] Derive Key Pair
20,520,867 UART: [art] Store priv key in slot 0x5
22,983,913 UART: [art] Derive Key Pair - Done
22,996,615 UART: [art] Signing Cert with AUTHO
22,997,909 UART: RITY.KEYID = 7
24,710,479 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,986 UART: [art] PUB.X = 2CDFC61E1BCCB89CDCEC6777B7C15D756014523708B5AAFA45C1F5302425020660770F7B8B8A22E6749352E830822868
24,719,269 UART: [art] PUB.Y = A6B6CD15D76C66D92AC1D195A9DF6A42BBE039EBE9C2E5BEB14AF8B540AAD181D743856D729B11B7CFD2E68AA99172C9
24,726,525 UART: [art] SIG.R = 7B6B747ABFDA00B1EF9AC0F2370E55B94BA60442562EF8D1516F5469963834C7A8C660F3B44ACD1AB570479E815AF35E
24,733,916 UART: [art] SIG.S = 632D32778A7A64832D695AAFE8F57DB634FFEDB0C6BAEB129934EF03C04A8B44A7836BBC4571FE4C18934E4B73F7393D
25,712,535 UART: Caliptra RT
25,713,253 UART: [state] CFI Enabled
25,879,543 UART: [rt] RT listening for mailbox commands...
25,911,006 UART: [rt]cmd =0x43455252, len=4
25,922,575 >>> mbox cmd response data (782 bytes)
25,966,530 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,997,351 UART: [rt]cmd =0x44504543, len=92
30,357,359 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
3,361,511 ready_for_fw is high
3,362,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,064,538 >>> mbox cmd response: success
14,065,184 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,339,113 UART:
18,339,507 UART: Running Caliptra FMC ...
18,340,609 UART:
18,340,760 UART: [state] CFI Enabled
18,408,728 UART: [fht] FMC Alias Private Key: 7
20,172,015 UART: [art] Extend RT PCRs Done
20,173,242 UART: [art] Lock RT PCRs Done
20,175,264 UART: [art] Populate DV Done
20,180,838 UART: [fht] FMC Alias Private Key: 7
20,182,427 UART: [art] Derive CDI
20,183,242 UART: [art] Store in in slot 0x4
20,241,665 UART: [art] Derive Key Pair
20,242,708 UART: [art] Store priv key in slot 0x5
22,705,407 UART: [art] Derive Key Pair - Done
22,718,507 UART: [art] Signing Cert with AUTHO
22,719,800 UART: RITY.KEYID = 7
24,431,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,855 UART: [art] PUB.X = DEE3ABE01A184DAD0C155097E16327E029F46A04AFA1ECC4E50827B208492A9EE7A6067F21BD3A99AA5A329F7069615F
24,440,124 UART: [art] PUB.Y = 57425944785C0249DBAF28236105053D2FA5EFF6186AB4EFB3E976764007E506D210EBD07A6F7B70B567DAF573C04DAE
24,447,407 UART: [art] SIG.R = C190AD32FDC335EFBEBBF0C0D5D8E4AAB61F5359D15FFF992F9A2D4783942837F390F0E9C8D706598F21793B448F7080
24,454,769 UART: [art] SIG.S = 499EBB5210588F8CC77661EAE4637C4BD5FD2BBC4751CDF191E932C7C858306E0C2631892EF6861FD34F85E37D0EF740
25,433,992 UART: Caliptra RT
25,434,703 UART: [state] CFI Enabled
25,600,833 UART: [rt] RT listening for mailbox commands...
25,632,402 UART: [rt]cmd =0x43455252, len=4
25,643,578 >>> mbox cmd response data (783 bytes)
25,686,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,717,439 UART: [rt]cmd =0x44504543, len=92
30,078,792 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,818 writing to cptra_bootfsm_go
193,054 UART:
193,446 UART: Running Caliptra ROM ...
194,994 UART:
604,231 UART: [state] CFI Enabled
619,252 UART: [state] LifecycleState = Unprovisioned
621,075 UART: [state] DebugLocked = No
623,029 UART: [state] WD Timer not started. Device not locked for debugging
627,068 UART: [kat] SHA2-256
806,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,770 UART: [kat] ++
818,218 UART: [kat] sha1
829,231 UART: [kat] SHA2-256
832,258 UART: [kat] SHA2-384
838,565 UART: [kat] SHA2-512-ACC
841,470 UART: [kat] ECC-384
3,280,785 UART: [kat] HMAC-384Kdf
3,292,520 UART: [kat] LMS
3,821,990 UART: [kat] --
3,826,905 UART: [cold-reset] ++
3,827,846 UART: [fht] FHT @ 0x50003400
3,839,396 UART: [idev] ++
3,839,965 UART: [idev] CDI.KEYID = 6
3,840,874 UART: [idev] SUBJECT.KEYID = 7
3,841,991 UART: [idev] UDS.KEYID = 0
3,842,978 ready_for_fw is high
3,843,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,476 UART: [idev] Erasing UDS.KEYID = 0
6,313,107 UART: [idev] Sha1 KeyId Algorithm
6,336,054 UART: [idev] --
6,339,684 UART: [ldev] ++
6,340,265 UART: [ldev] CDI.KEYID = 6
6,341,177 UART: [ldev] SUBJECT.KEYID = 5
6,342,341 UART: [ldev] AUTHORITY.KEYID = 7
6,343,578 UART: [ldev] FE.KEYID = 1
6,353,918 UART: [ldev] Erasing FE.KEYID = 1
8,831,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,044 UART: [ldev] --
10,620,825 UART: [fwproc] Wait for Commands...
10,623,412 UART: [fwproc] Recv command 0x46574c44
10,625,506 UART: [fwproc] Recv'd Img size: 114084 bytes
14,027,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,110 >>> mbox cmd response: success
14,489,638 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,493,506 UART: [afmc] ++
14,494,084 UART: [afmc] CDI.KEYID = 6
14,494,997 UART: [afmc] SUBJECT.KEYID = 7
14,496,157 UART: [afmc] AUTHORITY.KEYID = 5
16,999,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,472 UART: [afmc] --
18,794,544 UART: [cold-reset] --
18,799,432 UART: [state] Locking Datavault
18,803,280 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,927 UART: [state] Locking ICCM
18,807,403 UART: [exit] Launching FMC @ 0x40000130
18,815,856 UART:
18,816,094 UART: Running Caliptra FMC ...
18,817,200 UART:
18,817,358 UART: [state] CFI Enabled
18,825,622 UART: [fht] FMC Alias Private Key: 7
20,582,817 UART: [art] Extend RT PCRs Done
20,584,033 UART: [art] Lock RT PCRs Done
20,585,529 UART: [art] Populate DV Done
20,591,102 UART: [fht] FMC Alias Private Key: 7
20,592,640 UART: [art] Derive CDI
20,593,402 UART: [art] Store in in slot 0x4
20,636,222 UART: [art] Derive Key Pair
20,637,238 UART: [art] Store priv key in slot 0x5
23,063,366 UART: [art] Derive Key Pair - Done
23,076,035 UART: [art] Signing Cert with AUTHO
23,077,380 UART: RITY.KEYID = 7
24,782,769 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,290 UART: [art] PUB.X = DB73D68E50338287CF44FB9FC05C6B29B622F0FC6D4DFDE172287CAACCC168ADCFD2D9FD92FEF47AFFA9A4E998B5222E
24,791,560 UART: [art] PUB.Y = 4092FF513D8688F640F35F7D9460681BA9E478F0B569DB313B51C52E2604F41CEE103452E1348443829E92451CBA1FEA
24,798,826 UART: [art] SIG.R = F812A7E4BBE04A6A9209E816313BEA0746E28499353F6EC95BE4B44507C3C3CB32E8E1BD7B940351254DC1E7B1EF75F5
24,806,192 UART: [art] SIG.S = 4A1C2CB013FD9D08B2B561353257816CF1735ABFBD5818A66131120C43891992A5492719C36BFC698224F2AA940BBDB5
25,785,557 UART: Caliptra RT
25,786,270 UART: [state] CFI Enabled
25,903,292 UART: [rt] RT listening for mailbox commands...
25,934,701 UART: [rt]cmd =0x43455252, len=4
25,946,056 >>> mbox cmd response data (783 bytes)
25,988,854 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,019,532 UART: [rt]cmd =0x44504543, len=92
30,304,070 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
3,691,088 ready_for_fw is high
3,691,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,207 >>> mbox cmd response: success
14,272,999 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,527,185 UART:
18,527,563 UART: Running Caliptra FMC ...
18,528,707 UART:
18,528,861 UART: [state] CFI Enabled
18,536,648 UART: [fht] FMC Alias Private Key: 7
20,293,995 UART: [art] Extend RT PCRs Done
20,295,229 UART: [art] Lock RT PCRs Done
20,296,908 UART: [art] Populate DV Done
20,302,264 UART: [fht] FMC Alias Private Key: 7
20,303,914 UART: [art] Derive CDI
20,304,732 UART: [art] Store in in slot 0x4
20,347,019 UART: [art] Derive Key Pair
20,348,065 UART: [art] Store priv key in slot 0x5
22,775,113 UART: [art] Derive Key Pair - Done
22,787,582 UART: [art] Signing Cert with AUTHO
22,788,908 UART: RITY.KEYID = 7
24,494,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,615 UART: [art] PUB.X = ADF897DA3B47FD17CA6507ACB733A5F78B18575B689EBC6B26FD1516450140AAFCABA541A109474CA2427A23846924C5
24,502,887 UART: [art] PUB.Y = B45801F7F263C633E73243EC103F2DD3A7C2A2D9A66B4513009FE255C92A3A326354EE43D8A81BC52790627FA0EA1283
24,510,107 UART: [art] SIG.R = 8B126C5702F62101465BDB5C6F362C616DD51F7098B4546795D39DAD372334FF0905ABADD323ECCE6CD141CD18C6781C
24,517,454 UART: [art] SIG.S = C4AAA1B6AFA9DA9C97928F241C3E2986DC85E3562F7469CEB5B46AC3BB778DEC8B524C49B5DC2EA7DF6697698890359C
25,496,300 UART: Caliptra RT
25,497,017 UART: [state] CFI Enabled
25,614,086 UART: [rt] RT listening for mailbox commands...
25,645,561 UART: [rt]cmd =0x43455252, len=4
25,656,917 >>> mbox cmd response data (784 bytes)
25,699,117 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,729,758 UART: [rt]cmd =0x44504543, len=92
30,014,331 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,376 UART:
192,759 UART: Running Caliptra ROM ...
193,954 UART:
194,108 UART: [state] CFI Enabled
264,887 UART: [state] LifecycleState = Unprovisioned
267,268 UART: [state] DebugLocked = No
269,734 UART: [state] WD Timer not started. Device not locked for debugging
274,073 UART: [kat] SHA2-256
463,917 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,728 UART: [kat] ++
475,257 UART: [kat] sha1
484,998 UART: [kat] SHA2-256
488,069 UART: [kat] SHA2-384
492,845 UART: [kat] SHA2-512-ACC
495,434 UART: [kat] ECC-384
2,951,689 UART: [kat] HMAC-384Kdf
2,964,823 UART: [kat] LMS
3,496,593 UART: [kat] --
3,499,545 UART: [cold-reset] ++
3,500,765 UART: [fht] FHT @ 0x50003400
3,512,708 UART: [idev] ++
3,513,345 UART: [idev] CDI.KEYID = 6
3,514,295 UART: [idev] SUBJECT.KEYID = 7
3,515,532 UART: [idev] UDS.KEYID = 0
3,516,432 ready_for_fw is high
3,516,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,660,136 UART: [idev] Erasing UDS.KEYID = 0
6,023,923 UART: [idev] Sha1 KeyId Algorithm
6,046,710 UART: [idev] --
6,051,674 UART: [ldev] ++
6,052,348 UART: [ldev] CDI.KEYID = 6
6,053,245 UART: [ldev] SUBJECT.KEYID = 5
6,054,369 UART: [ldev] AUTHORITY.KEYID = 7
6,055,622 UART: [ldev] FE.KEYID = 1
6,093,297 UART: [ldev] Erasing FE.KEYID = 1
8,600,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,396 UART: [ldev] --
10,405,381 UART: [fwproc] Wait for Commands...
10,407,091 UART: [fwproc] Recv command 0x46574c44
10,409,394 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,745 >>> mbox cmd response: success
14,595,290 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,598,239 UART: [afmc] ++
14,598,935 UART: [afmc] CDI.KEYID = 6
14,600,072 UART: [afmc] SUBJECT.KEYID = 7
14,601,576 UART: [afmc] AUTHORITY.KEYID = 5
17,138,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,882,037 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,223 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,912,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,936,333 UART: [afmc] --
18,940,736 UART: [cold-reset] --
18,944,010 UART: [state] Locking Datavault
18,950,204 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,373 UART: [state] Locking ICCM
18,954,923 UART: [exit] Launching FMC @ 0x40000130
18,963,610 UART:
18,963,840 UART: Running Caliptra FMC ...
18,964,938 UART:
18,965,096 UART: [state] CFI Enabled
19,021,305 UART: [fht] FMC Alias Private Key: 7
20,785,631 UART: [art] Extend RT PCRs Done
20,786,841 UART: [art] Lock RT PCRs Done
20,788,302 UART: [art] Populate DV Done
20,793,713 UART: [fht] FMC Alias Private Key: 7
20,795,426 UART: [art] Derive CDI
20,796,241 UART: [art] Store in in slot 0x4
20,853,808 UART: [art] Derive Key Pair
20,854,854 UART: [art] Store priv key in slot 0x5
23,318,632 UART: [art] Derive Key Pair - Done
23,331,539 UART: [art] Signing Cert with AUTHO
23,332,865 UART: RITY.KEYID = 7
25,043,644 UART: [art] Erasing AUTHORITY.KEYID = 7
25,045,163 UART: [art] PUB.X = 13611DB9EC2EE2983B7FBB77AEACE7613A88F18663CE27190935AA3C1BEE8C7DAAB36E4EC8C1195CCACAD1C4943669C9
25,052,445 UART: [art] PUB.Y = EAD2B1653C1D0FECFA694966B926F4A517FB80566EDA6C2DB77F4F0DB041310A692200C28C1178767DB140A39CB25563
25,059,697 UART: [art] SIG.R = 9B99B2C13A18FAC31F06CCF4C87CD76351E0DC306DFA6422E0BDF4E0C4B4CA2C0DB3BF7727422BF61DE34DA01A7CB1D2
25,067,158 UART: [art] SIG.S = 8811524F49646DA2317F2BA886A00E3042D79CA4379E041BC12D37443EA0324E8598BFCCCFC3478D25A07E39F9F32F1E
26,046,024 UART: Caliptra RT
26,046,718 UART: [state] CFI Enabled
26,210,778 UART: [rt] RT listening for mailbox commands...
26,241,861 UART: [rt]cmd =0x43455252, len=4
26,253,108 >>> mbox cmd response data (784 bytes)
26,297,195 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,328,071 UART: [rt]cmd =0x44504543, len=92
30,668,327 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,439,860 ready_for_fw is high
3,440,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,009 >>> mbox cmd response: success
14,725,057 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,003,358 UART:
19,003,783 UART: Running Caliptra FMC ...
19,004,897 UART:
19,005,055 UART: [state] CFI Enabled
19,072,749 UART: [fht] FMC Alias Private Key: 7
20,836,467 UART: [art] Extend RT PCRs Done
20,837,700 UART: [art] Lock RT PCRs Done
20,839,168 UART: [art] Populate DV Done
20,844,592 UART: [fht] FMC Alias Private Key: 7
20,846,292 UART: [art] Derive CDI
20,847,105 UART: [art] Store in in slot 0x4
20,906,089 UART: [art] Derive Key Pair
20,907,096 UART: [art] Store priv key in slot 0x5
23,369,890 UART: [art] Derive Key Pair - Done
23,383,326 UART: [art] Signing Cert with AUTHO
23,384,629 UART: RITY.KEYID = 7
25,096,233 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,964 UART: [art] PUB.X = 614A237CDB41345B705AB90D3915510359FD869DF85ECB6796B107A71386881B44D277FB5FE9363FED639CD7B9DE03B1
25,104,983 UART: [art] PUB.Y = FFDBA9FA690E0C689ED3ECC9D6B147FBC5DEA3709EBEA2043CFF380294F21A9E864CF21666FD818FE1C859878CCFBC24
25,112,267 UART: [art] SIG.R = E0F83863D4B5E3EF9773B56AF6D6359F3621E84FC59C147B0917F9B88A9954B68BEF4B88DF85515AE540BB2A9B00DF66
25,119,660 UART: [art] SIG.S = B6EA1A8E22A75F1F842A8CB03136762E610437C7DCE7748B0D219995E028FE264D2563F96F6479BEE37E84FCD2B2CC21
26,098,837 UART: Caliptra RT
26,099,543 UART: [state] CFI Enabled
26,263,994 UART: [rt] RT listening for mailbox commands...
26,295,292 UART: [rt]cmd =0x43455252, len=4
26,306,673 >>> mbox cmd response data (784 bytes)
26,350,496 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,381,326 UART: [rt]cmd =0x44504543, len=92
30,743,556 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,788 writing to cptra_bootfsm_go
193,143 UART:
193,527 UART: Running Caliptra ROM ...
194,729 UART:
604,434 UART: [state] CFI Enabled
616,847 UART: [state] LifecycleState = Unprovisioned
619,256 UART: [state] DebugLocked = No
620,656 UART: [state] WD Timer not started. Device not locked for debugging
625,124 UART: [kat] SHA2-256
814,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,763 UART: [kat] ++
826,387 UART: [kat] sha1
837,484 UART: [kat] SHA2-256
840,493 UART: [kat] SHA2-384
847,059 UART: [kat] SHA2-512-ACC
849,651 UART: [kat] ECC-384
3,289,002 UART: [kat] HMAC-384Kdf
3,301,563 UART: [kat] LMS
3,833,431 UART: [kat] --
3,840,846 UART: [cold-reset] ++
3,841,858 UART: [fht] FHT @ 0x50003400
3,852,347 UART: [idev] ++
3,852,987 UART: [idev] CDI.KEYID = 6
3,854,017 UART: [idev] SUBJECT.KEYID = 7
3,855,202 UART: [idev] UDS.KEYID = 0
3,856,149 ready_for_fw is high
3,856,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,742 UART: [idev] Erasing UDS.KEYID = 0
6,330,856 UART: [idev] Sha1 KeyId Algorithm
6,353,864 UART: [idev] --
6,358,446 UART: [ldev] ++
6,359,125 UART: [ldev] CDI.KEYID = 6
6,360,036 UART: [ldev] SUBJECT.KEYID = 5
6,361,198 UART: [ldev] AUTHORITY.KEYID = 7
6,362,427 UART: [ldev] FE.KEYID = 1
6,371,934 UART: [ldev] Erasing FE.KEYID = 1
8,848,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,793 UART: [ldev] --
10,638,701 UART: [fwproc] Wait for Commands...
10,640,384 UART: [fwproc] Recv command 0x46574c44
10,642,699 UART: [fwproc] Recv'd Img size: 114084 bytes
14,084,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,276,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,817,886 >>> mbox cmd response: success
14,818,392 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,822,841 UART: [afmc] ++
14,823,536 UART: [afmc] CDI.KEYID = 6
14,824,641 UART: [afmc] SUBJECT.KEYID = 7
14,826,194 UART: [afmc] AUTHORITY.KEYID = 5
17,324,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,048,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,050,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,065,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,080,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,095,461 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,118,825 UART: [afmc] --
19,122,480 UART: [cold-reset] --
19,126,892 UART: [state] Locking Datavault
19,132,322 UART: [state] Locking PCR0, PCR1 and PCR31
19,134,530 UART: [state] Locking ICCM
19,137,472 UART: [exit] Launching FMC @ 0x40000130
19,146,150 UART:
19,146,391 UART: Running Caliptra FMC ...
19,147,500 UART:
19,147,663 UART: [state] CFI Enabled
19,155,769 UART: [fht] FMC Alias Private Key: 7
20,912,329 UART: [art] Extend RT PCRs Done
20,913,552 UART: [art] Lock RT PCRs Done
20,915,110 UART: [art] Populate DV Done
20,920,305 UART: [fht] FMC Alias Private Key: 7
20,922,024 UART: [art] Derive CDI
20,922,765 UART: [art] Store in in slot 0x4
20,965,635 UART: [art] Derive Key Pair
20,966,679 UART: [art] Store priv key in slot 0x5
23,393,288 UART: [art] Derive Key Pair - Done
23,406,825 UART: [art] Signing Cert with AUTHO
23,408,137 UART: RITY.KEYID = 7
25,113,457 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,966 UART: [art] PUB.X = 3167C4FA5E3903CDDEDE092F15E9E70BC63983BC1D38BAF08AA494B58BB334849594DA223C307DF9FDFE78BEDAB68D6F
25,122,239 UART: [art] PUB.Y = E7ECF787D9158BCDAF1324A832F57F52A8261FB9C1E0199E596F2A4B355B4BDCA796D39D0CEC93A8083B116AE6A4311C
25,129,554 UART: [art] SIG.R = D7CC071DAC47FA69E35C1CEBA0B893523ED91F57B7FE75160010934B2A5A9DF840949B1EABC78D3FC9DC92CDAA75F8A5
25,136,919 UART: [art] SIG.S = 5CACD07550A4B5279A60FE25B6DFEE85C9D68E4DC95ABBFAF898CEF1193AB8FCD6AC34316D81832A4AA37CD206DCA3F3
26,115,854 UART: Caliptra RT
26,116,544 UART: [state] CFI Enabled
26,233,348 UART: [rt] RT listening for mailbox commands...
26,264,599 UART: [rt]cmd =0x43455252, len=4
26,276,189 >>> mbox cmd response data (783 bytes)
26,318,833 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,349,648 UART: [rt]cmd =0x44504543, len=92
30,633,407 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
3,750,394 ready_for_fw is high
3,751,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,935,294 >>> mbox cmd response: success
14,935,928 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,191,121 UART:
19,191,515 UART: Running Caliptra FMC ...
19,192,652 UART:
19,192,810 UART: [state] CFI Enabled
19,200,490 UART: [fht] FMC Alias Private Key: 7
20,957,319 UART: [art] Extend RT PCRs Done
20,958,542 UART: [art] Lock RT PCRs Done
20,960,490 UART: [art] Populate DV Done
20,965,825 UART: [fht] FMC Alias Private Key: 7
20,967,549 UART: [art] Derive CDI
20,968,367 UART: [art] Store in in slot 0x4
21,011,075 UART: [art] Derive Key Pair
21,012,126 UART: [art] Store priv key in slot 0x5
23,438,675 UART: [art] Derive Key Pair - Done
23,451,637 UART: [art] Signing Cert with AUTHO
23,452,946 UART: RITY.KEYID = 7
25,158,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,381 UART: [art] PUB.X = 3B76312183AA9FC3AB419A145DCEAC1DDCA19BCC271B2380D39899FC7572CCF3BC5176AB335582FB90F633788C15A4C1
25,167,610 UART: [art] PUB.Y = 944C610271291CCF65622B633207E49E53E1360906ABFD27EA57FCB4463818B11D2107061772C7C2713A7AE1B5E90BC0
25,174,885 UART: [art] SIG.R = 36D89A29F478F65A6ED52BDF30A075FDDF36CD193988D49E7651241129B0E2D8EF9782BECBECC3DF8465B24601673E96
25,182,250 UART: [art] SIG.S = E0047409FBFDA39112010B1F1DEF762711758A678B27E0B7455E0433894729CEF5CEF124BD0C33FC5679B05C673DEEEF
26,161,288 UART: Caliptra RT
26,162,007 UART: [state] CFI Enabled
26,279,877 UART: [rt] RT listening for mailbox commands...
26,311,077 UART: [rt]cmd =0x43455252, len=4
26,322,725 >>> mbox cmd response data (783 bytes)
26,365,599 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,396,389 UART: [rt]cmd =0x44504543, len=92
30,681,216 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,753 UART: [kat] SHA2-256
892,691 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,279 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 ready_for_fw is high
1,480,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,766 UART: [idev] Erasing UDS.KEYID = 0
1,505,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,946 UART: [idev] --
1,514,845 UART: [ldev] ++
1,515,013 UART: [ldev] CDI.KEYID = 6
1,515,376 UART: [ldev] SUBJECT.KEYID = 5
1,515,802 UART: [ldev] AUTHORITY.KEYID = 7
1,516,265 UART: [ldev] FE.KEYID = 1
1,521,251 UART: [ldev] Erasing FE.KEYID = 1
1,546,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,070 UART: [ldev] --
1,586,511 UART: [fwproc] Waiting for Commands...
1,587,326 UART: [fwproc] Received command 0x46574c44
1,588,117 UART: [fwproc] Received Image of size 114084 bytes
2,883,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,322 >>> mbox cmd response: success
3,076,322 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,077,412 UART: [afmc] ++
3,077,580 UART: [afmc] CDI.KEYID = 6
3,077,942 UART: [afmc] SUBJECT.KEYID = 7
3,078,367 UART: [afmc] AUTHORITY.KEYID = 5
3,112,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,769 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,459 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,480 UART: [afmc] --
3,155,496 UART: [cold-reset] --
3,156,164 UART: [state] Locking Datavault
3,157,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,921 UART: [state] Locking ICCM
3,158,367 UART: [exit] Launching FMC @ 0x40000130
3,163,696 UART:
3,163,712 UART: Running Caliptra FMC ...
3,164,120 UART:
3,164,174 UART: [state] CFI Enabled
3,174,831 UART: [fht] FMC Alias Private Key: 7
3,282,822 UART: [art] Extend RT PCRs Done
3,283,250 UART: [art] Lock RT PCRs Done
3,284,882 UART: [art] Populate DV Done
3,293,113 UART: [fht] FMC Alias Private Key: 7
3,294,197 UART: [art] Derive CDI
3,294,477 UART: [art] Store in in slot 0x4
3,380,232 UART: [art] Derive Key Pair
3,380,592 UART: [art] Store priv key in slot 0x5
3,393,898 UART: [art] Derive Key Pair - Done
3,408,580 UART: [art] Signing Cert with AUTHO
3,409,060 UART: RITY.KEYID = 7
3,424,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,303 UART: [art] PUB.X = D34499DEBFA8F3FE122B4EAF3F1DA4EBF41732E6A8BC54C430B5EE165B90A3BB5BF781AE3B5AA0D46373AFCC0E29EBE7
3,432,102 UART: [art] PUB.Y = 8EDBE0DF0B9B4F0EA890B97FCEED77179AAFE4291FB51B3E4772E953822F57F995AB6E946928BB03079CC494CBE131DE
3,439,058 UART: [art] SIG.R = 0CAB59FDD8E84D33ED6732D5D4E43C88B85B251E32C582DE5D8BA459D4FB9CF62521441CDC885527178AC5B738D6E8E1
3,445,837 UART: [art] SIG.S = C156C54A5610683A3A19F5EA038A40CEE944C6AAC4F9FEC1AE3C077757C6479844D8C60E325B491317249BDB92715DC3
3,470,329 UART: Caliptra RT
3,470,582 UART: [state] CFI Enabled
3,578,079 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,627 UART: [rt]cmd =0x43455252, len=4
3,619,591 >>> mbox cmd response data (783 bytes)
3,619,592 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,741 UART: [rt]cmd =0x44504543, len=92
3,833,222 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,839 ready_for_fw is high
1,362,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,684 >>> mbox cmd response: success
2,925,684 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,848 UART:
2,986,864 UART: Running Caliptra FMC ...
2,987,272 UART:
2,987,326 UART: [state] CFI Enabled
2,997,531 UART: [fht] FMC Alias Private Key: 7
3,106,072 UART: [art] Extend RT PCRs Done
3,106,500 UART: [art] Lock RT PCRs Done
3,107,802 UART: [art] Populate DV Done
3,116,227 UART: [fht] FMC Alias Private Key: 7
3,117,225 UART: [art] Derive CDI
3,117,505 UART: [art] Store in in slot 0x4
3,202,906 UART: [art] Derive Key Pair
3,203,266 UART: [art] Store priv key in slot 0x5
3,216,280 UART: [art] Derive Key Pair - Done
3,230,889 UART: [art] Signing Cert with AUTHO
3,231,369 UART: RITY.KEYID = 7
3,246,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,468 UART: [art] PUB.X = D36206B913000357A05CB12A0CF771D50FFB9924BAA884DBA89191EC9DF678F809E6076E17728E5B6BF3796089923582
3,254,194 UART: [art] PUB.Y = 44DA25076FFA21F34F62E9F6B0BBDDA9711B0053655EFD8DDA1FFA467E54BB3C77A6F1FC08216880455156D659ECF072
3,261,128 UART: [art] SIG.R = 639758A5639D450C9D44205EB7E24645D3FEE8C822B508892236FF9997B2BB9FACB0B25815531D47630E0222616BC5AE
3,267,882 UART: [art] SIG.S = F3D5C904FA8AB938BA903DBE2684574F40BF6B94DC13D1FB8BE3DD565E0ABDA37842A173CBA93F1DCB3F55C7252C6191
3,291,675 UART: Caliptra RT
3,291,928 UART: [state] CFI Enabled
3,401,059 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,635 UART: [rt]cmd =0x43455252, len=4
3,442,625 >>> mbox cmd response data (783 bytes)
3,442,626 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,667 UART: [rt]cmd =0x44504543, len=92
3,656,774 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,608 UART: [kat] SHA2-256
882,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,654 UART: [kat] ++
886,806 UART: [kat] sha1
891,082 UART: [kat] SHA2-256
893,020 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,001 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,640 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,871 UART: [idev] ++
1,480,039 UART: [idev] CDI.KEYID = 6
1,480,399 UART: [idev] SUBJECT.KEYID = 7
1,480,823 UART: [idev] UDS.KEYID = 0
1,481,168 ready_for_fw is high
1,481,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,663 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,302 UART: [ldev] Erasing FE.KEYID = 1
1,548,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,696 UART: [fwproc] Waiting for Commands...
1,588,493 UART: [fwproc] Received command 0x46574c44
1,589,284 UART: [fwproc] Received Image of size 114084 bytes
2,884,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,213 >>> mbox cmd response: success
3,077,213 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,257 UART: [afmc] ++
3,078,425 UART: [afmc] CDI.KEYID = 6
3,078,787 UART: [afmc] SUBJECT.KEYID = 7
3,079,212 UART: [afmc] AUTHORITY.KEYID = 5
3,114,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,933 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,546 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,236 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,231 UART: [afmc] --
3,158,333 UART: [cold-reset] --
3,159,361 UART: [state] Locking Datavault
3,160,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,212 UART: [state] Locking ICCM
3,161,806 UART: [exit] Launching FMC @ 0x40000130
3,167,135 UART:
3,167,151 UART: Running Caliptra FMC ...
3,167,559 UART:
3,167,702 UART: [state] CFI Enabled
3,178,381 UART: [fht] FMC Alias Private Key: 7
3,286,768 UART: [art] Extend RT PCRs Done
3,287,196 UART: [art] Lock RT PCRs Done
3,288,574 UART: [art] Populate DV Done
3,296,731 UART: [fht] FMC Alias Private Key: 7
3,297,725 UART: [art] Derive CDI
3,298,005 UART: [art] Store in in slot 0x4
3,383,822 UART: [art] Derive Key Pair
3,384,182 UART: [art] Store priv key in slot 0x5
3,397,454 UART: [art] Derive Key Pair - Done
3,411,977 UART: [art] Signing Cert with AUTHO
3,412,457 UART: RITY.KEYID = 7
3,427,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,332 UART: [art] PUB.X = 17418CD2CEA21768F2CDA63934BA749550B88BDFC1209274DE5F1E1BEA2EEA4700A04390294298A1C4777D5EDB2A98CB
3,435,090 UART: [art] PUB.Y = 1B7F91F3CC59C25197D44FA79948C24E0B63F97BC59DCB073800DD09CD6D7CAEB541CC46ABC52F62A1945B131122ACB8
3,442,023 UART: [art] SIG.R = 2926EB0E4DC387DD0B375D2072ACF4F6113FF940C093DBB935E270E4DCF3A2B1BD61CE0F75252A00CFF06848A56D7C94
3,448,776 UART: [art] SIG.S = 20E1A2B24DC0502F6BFF9B15E8336B1530B88D7B6FAF316C5FB39C7264E66D6F53EA7CE102C35C82545E563F8CD7E6A1
3,472,394 UART: Caliptra RT
3,472,739 UART: [state] CFI Enabled
3,580,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,293 UART: [rt]cmd =0x43455252, len=4
3,622,203 >>> mbox cmd response data (782 bytes)
3,622,204 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,905 UART: [rt]cmd =0x44504543, len=92
3,836,228 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,678 ready_for_fw is high
1,362,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,499 >>> mbox cmd response: success
2,924,499 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,071 UART:
2,986,087 UART: Running Caliptra FMC ...
2,986,495 UART:
2,986,638 UART: [state] CFI Enabled
2,997,261 UART: [fht] FMC Alias Private Key: 7
3,104,976 UART: [art] Extend RT PCRs Done
3,105,404 UART: [art] Lock RT PCRs Done
3,107,014 UART: [art] Populate DV Done
3,115,115 UART: [fht] FMC Alias Private Key: 7
3,116,157 UART: [art] Derive CDI
3,116,437 UART: [art] Store in in slot 0x4
3,202,206 UART: [art] Derive Key Pair
3,202,566 UART: [art] Store priv key in slot 0x5
3,216,152 UART: [art] Derive Key Pair - Done
3,230,762 UART: [art] Signing Cert with AUTHO
3,231,242 UART: RITY.KEYID = 7
3,246,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,267 UART: [art] PUB.X = D34B2FE457DE30BE0EAD7022067A2DC0628B2738A3854DC75BB79A93CD968C9CA602325581A26817EDFEC6F417741D54
3,254,034 UART: [art] PUB.Y = AFED97E23BBE3971F199DDDA34AF9AD22D15A21B99E30914DBE2DF2259398E5D48082BF556E97AC0D577FA346CEB3A38
3,260,996 UART: [art] SIG.R = D28C70B1889462DF14F6537B1092CB85BC462A6BE1B34BC86C5177050BD7FF6D7CAF3A18C85D9F9C0F32497225512BA8
3,267,763 UART: [art] SIG.S = 111E52D653724AF0CF682B7989F5CC67D953B19B7C82FF60BB248F26A746A41D1C3955E0E8B327C3C1B80D0E4EB15908
3,291,471 UART: Caliptra RT
3,291,816 UART: [state] CFI Enabled
3,400,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,377 UART: [rt]cmd =0x43455252, len=4
3,441,207 >>> mbox cmd response data (783 bytes)
3,441,208 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,277 UART: [rt]cmd =0x44504543, len=92
3,654,222 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
902,219 UART: [kat] SHA2-256
904,159 UART: [kat] SHA2-384
906,838 UART: [kat] SHA2-512-ACC
908,739 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,840 UART: [kat] LMS
1,171,168 UART: [kat] --
1,171,981 UART: [cold-reset] ++
1,172,373 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 ready_for_fw is high
1,176,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,180 UART: [idev] Erasing UDS.KEYID = 0
1,200,981 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,593 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,750 UART: [fwproc] Recv command 0x46574c44
1,284,478 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,659 >>> mbox cmd response: success
2,772,659 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,723 UART: [afmc] ++
2,773,891 UART: [afmc] CDI.KEYID = 6
2,774,253 UART: [afmc] SUBJECT.KEYID = 7
2,774,678 UART: [afmc] AUTHORITY.KEYID = 5
2,810,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,662 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,134 UART: [afmc] --
2,853,024 UART: [cold-reset] --
2,853,700 UART: [state] Locking Datavault
2,855,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,681 UART: [state] Locking ICCM
2,856,353 UART: [exit] Launching FMC @ 0x40000130
2,861,682 UART:
2,861,698 UART: Running Caliptra FMC ...
2,862,106 UART:
2,862,160 UART: [state] CFI Enabled
2,872,469 UART: [fht] FMC Alias Private Key: 7
2,980,058 UART: [art] Extend RT PCRs Done
2,980,486 UART: [art] Lock RT PCRs Done
2,981,772 UART: [art] Populate DV Done
2,989,597 UART: [fht] FMC Alias Private Key: 7
2,990,773 UART: [art] Derive CDI
2,991,053 UART: [art] Store in in slot 0x4
3,076,574 UART: [art] Derive Key Pair
3,076,934 UART: [art] Store priv key in slot 0x5
3,090,018 UART: [art] Derive Key Pair - Done
3,104,962 UART: [art] Signing Cert with AUTHO
3,105,442 UART: RITY.KEYID = 7
3,120,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,979 UART: [art] PUB.X = B941ACCD1473ECFC4BF5C40E13977E07D9E8ED8918EC7831D14768925D7734FA5DD37F9690A36A5ACF660A1B9C353CF1
3,127,752 UART: [art] PUB.Y = 411EC7B173561ADA59901F134464D3C824357A1F8D9202E05A099AC7EB931AD8CB67ED0D7B8B15BBEEA890F078691728
3,134,697 UART: [art] SIG.R = 8B18CB8374A81480948B730CEB809C4435A816DD7D9DE80EFCE9AE8879DC69FEB4F725D6A03A0270CB6CF30C4459B8FC
3,141,469 UART: [art] SIG.S = DEF394BDF5349846BA125602496854DE31196657DB29E64E026E5AE64AFF1118CB7791939232DD2D5B161026F54255C0
3,165,192 UART: Caliptra RT
3,165,445 UART: [state] CFI Enabled
3,272,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,407 UART: [rt]cmd =0x43455252, len=4
3,314,334 >>> mbox cmd response data (784 bytes)
3,314,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,412 UART: [rt]cmd =0x44504543, len=92
3,527,428 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,651 ready_for_fw is high
1,059,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,626 >>> mbox cmd response: success
2,621,626 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,683,098 UART:
2,683,114 UART: Running Caliptra FMC ...
2,683,522 UART:
2,683,576 UART: [state] CFI Enabled
2,693,717 UART: [fht] FMC Alias Private Key: 7
2,801,362 UART: [art] Extend RT PCRs Done
2,801,790 UART: [art] Lock RT PCRs Done
2,803,180 UART: [art] Populate DV Done
2,811,321 UART: [fht] FMC Alias Private Key: 7
2,812,503 UART: [art] Derive CDI
2,812,783 UART: [art] Store in in slot 0x4
2,898,428 UART: [art] Derive Key Pair
2,898,788 UART: [art] Store priv key in slot 0x5
2,912,296 UART: [art] Derive Key Pair - Done
2,926,764 UART: [art] Signing Cert with AUTHO
2,927,244 UART: RITY.KEYID = 7
2,942,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,909 UART: [art] PUB.X = DD870E0D46B013D7EEE4846C27597F3333920998695A9C5DAD6BA416201E5A2EE58B46B294788A159C233B418A597419
2,949,664 UART: [art] PUB.Y = 268EBEEDB5432711FF1A3EFB2E45D58F7884DB06ADF1BAF731F37F6EC1E44B0C5AC026AE0070191E3B9124E8BC250B1B
2,956,603 UART: [art] SIG.R = 0C80855C0309675AC31135AE39A7D6BDC20BB17527389694C8D0D7CAF538D4A8D54F079757DE3E8EA7A636958CC2A230
2,963,360 UART: [art] SIG.S = CB92E0BBF13A733359A5387888C7DB556CDAE90981EF7CAB55275C9D52010B77D5F3B7F19A76E5693BEF50544A3526E4
2,987,506 UART: Caliptra RT
2,987,759 UART: [state] CFI Enabled
3,095,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,394 UART: [rt]cmd =0x43455252, len=4
3,137,170 >>> mbox cmd response data (783 bytes)
3,137,171 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,208 UART: [rt]cmd =0x44504543, len=92
3,349,806 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,721 UART: [kat] LMS
1,171,049 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,374 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 ready_for_fw is high
1,176,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,883 UART: [idev] Erasing UDS.KEYID = 0
1,200,924 UART: [idev] Sha1 KeyId Algorithm
1,209,288 UART: [idev] --
1,210,358 UART: [ldev] ++
1,210,526 UART: [ldev] CDI.KEYID = 6
1,210,889 UART: [ldev] SUBJECT.KEYID = 5
1,211,315 UART: [ldev] AUTHORITY.KEYID = 7
1,211,778 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,242,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,914 UART: [ldev] --
1,282,319 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,463 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,808 >>> mbox cmd response: success
2,770,808 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,772,010 UART: [afmc] ++
2,772,178 UART: [afmc] CDI.KEYID = 6
2,772,540 UART: [afmc] SUBJECT.KEYID = 7
2,772,965 UART: [afmc] AUTHORITY.KEYID = 5
2,808,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,132 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,687 UART: [afmc] --
2,851,619 UART: [cold-reset] --
2,852,405 UART: [state] Locking Datavault
2,853,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,056 UART: [state] Locking ICCM
2,854,518 UART: [exit] Launching FMC @ 0x40000130
2,859,847 UART:
2,859,863 UART: Running Caliptra FMC ...
2,860,271 UART:
2,860,414 UART: [state] CFI Enabled
2,871,035 UART: [fht] FMC Alias Private Key: 7
2,978,956 UART: [art] Extend RT PCRs Done
2,979,384 UART: [art] Lock RT PCRs Done
2,980,936 UART: [art] Populate DV Done
2,989,157 UART: [fht] FMC Alias Private Key: 7
2,990,281 UART: [art] Derive CDI
2,990,561 UART: [art] Store in in slot 0x4
3,076,120 UART: [art] Derive Key Pair
3,076,480 UART: [art] Store priv key in slot 0x5
3,089,478 UART: [art] Derive Key Pair - Done
3,104,046 UART: [art] Signing Cert with AUTHO
3,104,526 UART: RITY.KEYID = 7
3,120,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,911 UART: [art] PUB.X = 08C6C9DEDCA0AF6E20B0524864204E47356073D1F0DC8448DF3866E33957E89E5B2731F9BB136FF8FB43D9D89E271C9A
3,127,684 UART: [art] PUB.Y = DB6D4FCDF33098FFA66A35AAA01CE6216CDA9BF3526AA6D7AD1ADB05C1F2013ACD07BE28A81D20F20FAD248A81665768
3,134,646 UART: [art] SIG.R = 3CB6DA1728911C412C06F5218E551388AB22FB40D18FCC289E654D30C23323084ABB39AA847098DC5DAC84AE98E7901B
3,141,414 UART: [art] SIG.S = A090BDAE216945C09490C8F3AF74F2B4D45DB6C3353D6E10FB16370719F0A4933754FF0E1C69B49D4DF65B92CDBD6844
3,165,165 UART: Caliptra RT
3,165,510 UART: [state] CFI Enabled
3,273,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,385 UART: [rt]cmd =0x43455252, len=4
3,315,325 >>> mbox cmd response data (783 bytes)
3,315,326 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,233 UART: [rt]cmd =0x44504543, len=92
3,529,851 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,926 ready_for_fw is high
1,059,926 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,623 >>> mbox cmd response: success
2,622,623 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,501 UART:
2,684,517 UART: Running Caliptra FMC ...
2,684,925 UART:
2,685,068 UART: [state] CFI Enabled
2,696,079 UART: [fht] FMC Alias Private Key: 7
2,803,960 UART: [art] Extend RT PCRs Done
2,804,388 UART: [art] Lock RT PCRs Done
2,805,642 UART: [art] Populate DV Done
2,814,093 UART: [fht] FMC Alias Private Key: 7
2,815,111 UART: [art] Derive CDI
2,815,391 UART: [art] Store in in slot 0x4
2,901,002 UART: [art] Derive Key Pair
2,901,362 UART: [art] Store priv key in slot 0x5
2,914,676 UART: [art] Derive Key Pair - Done
2,929,612 UART: [art] Signing Cert with AUTHO
2,930,092 UART: RITY.KEYID = 7
2,945,340 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,105 UART: [art] PUB.X = B233938EE25A0B5846BB063E5B3B7193059A99738493987C83709A43D6A1E16C5972DDEA2FC518C8F203085A4CF8EBF3
2,952,860 UART: [art] PUB.Y = 49843C362226503F8B986074A8D832EF9B7C87C9D500C595527E853B0D24C7B41A226038706BD801B566C03CF605A1FD
2,959,771 UART: [art] SIG.R = 4D5B5224C12617D56E74928EAF7663663922A862ECF5B6045637D24C19FCF6D998D0CF409D670EAC0616E0D2B27B2118
2,966,530 UART: [art] SIG.S = 38C69A1930D4732F18E1EC8844AC12043E6E15A5CE065B8CCF29803AD65C87855939C90F9DB07AF8310938E3076BF7BB
2,990,574 UART: Caliptra RT
2,990,919 UART: [state] CFI Enabled
3,099,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,684 UART: [rt]cmd =0x43455252, len=4
3,140,772 >>> mbox cmd response data (782 bytes)
3,140,773 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,810 UART: [rt]cmd =0x44504543, len=92
3,354,227 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,602 UART: [kat] LMS
1,168,914 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,174,303 ready_for_fw is high
1,174,303 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,762 UART: [ldev] Erasing FE.KEYID = 1
1,241,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,830 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,743 >>> mbox cmd response: success
2,768,743 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,769,768 UART: [afmc] ++
2,769,936 UART: [afmc] CDI.KEYID = 6
2,770,299 UART: [afmc] SUBJECT.KEYID = 7
2,770,725 UART: [afmc] AUTHORITY.KEYID = 5
2,806,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,010 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,745 UART: [afmc] --
2,849,783 UART: [cold-reset] --
2,850,685 UART: [state] Locking Datavault
2,851,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,578 UART: [state] Locking ICCM
2,853,162 UART: [exit] Launching FMC @ 0x40000130
2,858,491 UART:
2,858,507 UART: Running Caliptra FMC ...
2,858,915 UART:
2,858,969 UART: [state] CFI Enabled
2,869,288 UART: [fht] FMC Alias Private Key: 7
2,977,645 UART: [art] Extend RT PCRs Done
2,978,073 UART: [art] Lock RT PCRs Done
2,979,499 UART: [art] Populate DV Done
2,987,558 UART: [fht] FMC Alias Private Key: 7
2,988,684 UART: [art] Derive CDI
2,988,964 UART: [art] Store in in slot 0x4
3,074,773 UART: [art] Derive Key Pair
3,075,133 UART: [art] Store priv key in slot 0x5
3,088,265 UART: [art] Derive Key Pair - Done
3,102,860 UART: [art] Signing Cert with AUTHO
3,103,340 UART: RITY.KEYID = 7
3,118,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,461 UART: [art] PUB.X = 3227EC63839A17C793AA5218662EB2228BAB5B4F89AE6DDBEFB5BF51728CCDAF11120B4AED1CF3DD853BA5BBA0A68E4D
3,126,254 UART: [art] PUB.Y = D6057CF753E4102A15B9BC1AE786AB1D016A607F470D80911D28009068072DEB0368361E4B1969910740FD2894432633
3,133,150 UART: [art] SIG.R = C2EF810729FF6C6EE1C45EAEF8B996F553C59D95A09B512523D225E253DE60747039EBA552E8F2DB13D8A055F8B49D7E
3,139,927 UART: [art] SIG.S = 455F5A621F9FF4AC6FCA3C0BFC685ACF9983EB928D182CD735DF3B083F1B0D5CD4741386A362CED5235490149CC3782F
3,163,599 UART: Caliptra RT
3,163,852 UART: [state] CFI Enabled
3,271,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,967 UART: [rt]cmd =0x43455252, len=4
3,312,659 >>> mbox cmd response data (783 bytes)
3,312,660 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,547 UART: [rt]cmd =0x44504543, len=92
3,525,957 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,046 ready_for_fw is high
1,057,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,411 >>> mbox cmd response: success
2,619,411 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,681,781 UART:
2,681,797 UART: Running Caliptra FMC ...
2,682,205 UART:
2,682,259 UART: [state] CFI Enabled
2,692,212 UART: [fht] FMC Alias Private Key: 7
2,800,045 UART: [art] Extend RT PCRs Done
2,800,473 UART: [art] Lock RT PCRs Done
2,802,251 UART: [art] Populate DV Done
2,810,544 UART: [fht] FMC Alias Private Key: 7
2,811,656 UART: [art] Derive CDI
2,811,936 UART: [art] Store in in slot 0x4
2,897,831 UART: [art] Derive Key Pair
2,898,191 UART: [art] Store priv key in slot 0x5
2,911,341 UART: [art] Derive Key Pair - Done
2,926,015 UART: [art] Signing Cert with AUTHO
2,926,495 UART: RITY.KEYID = 7
2,941,841 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,606 UART: [art] PUB.X = 51C354CB290CFEDDC43133CC1DCAF43F8C5FF4D353DAE0AE830A24B197E3E1031DA63877C7115903D033ECF439939208
2,949,371 UART: [art] PUB.Y = 0672DCBB985CB8295E516A304910DBEE2854B3A3277475D19B52860BB51C9DD952631B41E1D834B680CC3BEF6839BFF8
2,956,319 UART: [art] SIG.R = 449B05B16FB7E7EA6A7585159818A605FF0DF212F8AA3031AC02C74A0CA08E6F5EAB6352C1F8028F2CDE6B57F8217778
2,963,079 UART: [art] SIG.S = 01E5F3F27CCE985548FBA64FB130640AAA6D040B1DE82365ABE8187C752B1A589E181D36397B089E4F83D9364E11511A
2,986,859 UART: Caliptra RT
2,987,112 UART: [state] CFI Enabled
3,094,507 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,039 UART: [rt]cmd =0x43455252, len=4
3,135,833 >>> mbox cmd response data (782 bytes)
3,135,834 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,921 UART: [rt]cmd =0x44504543, len=92
3,349,385 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,720 UART: [idev] ++
1,173,888 UART: [idev] CDI.KEYID = 6
1,174,249 UART: [idev] SUBJECT.KEYID = 7
1,174,674 UART: [idev] UDS.KEYID = 0
1,175,020 ready_for_fw is high
1,175,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,208,966 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,829 UART: [ldev] --
1,283,185 UART: [fwproc] Wait for Commands...
1,283,864 UART: [fwproc] Recv command 0x46574c44
1,284,597 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,636 >>> mbox cmd response: success
2,770,636 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,771,655 UART: [afmc] ++
2,771,823 UART: [afmc] CDI.KEYID = 6
2,772,186 UART: [afmc] SUBJECT.KEYID = 7
2,772,612 UART: [afmc] AUTHORITY.KEYID = 5
2,808,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,950 UART: [afmc] --
2,852,032 UART: [cold-reset] --
2,853,042 UART: [state] Locking Datavault
2,854,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,789 UART: [state] Locking ICCM
2,855,357 UART: [exit] Launching FMC @ 0x40000130
2,860,686 UART:
2,860,702 UART: Running Caliptra FMC ...
2,861,110 UART:
2,861,253 UART: [state] CFI Enabled
2,871,656 UART: [fht] FMC Alias Private Key: 7
2,980,249 UART: [art] Extend RT PCRs Done
2,980,677 UART: [art] Lock RT PCRs Done
2,982,513 UART: [art] Populate DV Done
2,990,636 UART: [fht] FMC Alias Private Key: 7
2,991,726 UART: [art] Derive CDI
2,992,006 UART: [art] Store in in slot 0x4
3,077,339 UART: [art] Derive Key Pair
3,077,699 UART: [art] Store priv key in slot 0x5
3,090,371 UART: [art] Derive Key Pair - Done
3,105,347 UART: [art] Signing Cert with AUTHO
3,105,827 UART: RITY.KEYID = 7
3,121,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,770 UART: [art] PUB.X = 40F790E5BC7860F46C7BD4080C919756875A1AD323C0EFD3276FEE563115AD3CE8A3D90136B0B5E648261EADE7F30562
3,128,532 UART: [art] PUB.Y = 261B60626A57AC5B101C7EB6DCC7A5BE3E84778953C7FFACD8987B5D94BFF3D72FA7E33CE3AC5F6FBFCEA9EE80D862C3
3,135,510 UART: [art] SIG.R = 6EFEC927B8D6AB55D2EF239B8565F19F8BD9CA244CADF9743BF86C4B670763746B296938F13623C10CAFBFCADB82B60D
3,142,289 UART: [art] SIG.S = 0F99D80047DF7EA66D0A80DEED3242F6E07789F0B56B4939072C72076DC2FCCFC86FEC4B8C991276F57C9CADE3BB9931
3,166,430 UART: Caliptra RT
3,166,775 UART: [state] CFI Enabled
3,275,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,586 UART: [rt]cmd =0x43455252, len=4
3,316,470 >>> mbox cmd response data (782 bytes)
3,316,471 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,328 UART: [rt]cmd =0x44504543, len=92
3,529,578 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 ready_for_fw is high
1,056,435 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,336 >>> mbox cmd response: success
2,620,336 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,683,036 UART:
2,683,052 UART: Running Caliptra FMC ...
2,683,460 UART:
2,683,603 UART: [state] CFI Enabled
2,694,226 UART: [fht] FMC Alias Private Key: 7
2,802,059 UART: [art] Extend RT PCRs Done
2,802,487 UART: [art] Lock RT PCRs Done
2,804,301 UART: [art] Populate DV Done
2,812,816 UART: [fht] FMC Alias Private Key: 7
2,813,868 UART: [art] Derive CDI
2,814,148 UART: [art] Store in in slot 0x4
2,900,255 UART: [art] Derive Key Pair
2,900,615 UART: [art] Store priv key in slot 0x5
2,913,639 UART: [art] Derive Key Pair - Done
2,928,526 UART: [art] Signing Cert with AUTHO
2,929,006 UART: RITY.KEYID = 7
2,943,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,473 UART: [art] PUB.X = 2FE40402BF0EA3FD6D7E37C0FFB9A3C24301ECE37715BF49D2A5BD6B9B4CAA1BE73E5B3511F40F043F2B2FEE5855D383
2,951,247 UART: [art] PUB.Y = 621C6C54CE78F2F3BD8FFF0637E60110E84B2AFAA37589DFB1B286B1ED316EE4AEF500476E142E63E38780A8C4D67CDB
2,958,185 UART: [art] SIG.R = DEEEBEEF90FC5FB77CD655D6597FB8202C66D16D537D127E4235C617CAF7309D49F4FF1308C805F9E5A6D431D569C423
2,964,961 UART: [art] SIG.S = CE2CBA93ED99D0D18A83AFDFA91525D65725DCA72155888679BED0042B0E00787740E1FE770067505EED3C9032D8A344
2,988,896 UART: Caliptra RT
2,989,241 UART: [state] CFI Enabled
3,097,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,949 UART: [rt]cmd =0x43455252, len=4
3,138,778 >>> mbox cmd response data (784 bytes)
3,138,779 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,780 UART: [rt]cmd =0x44504543, len=92
3,351,980 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,262 UART:
192,616 UART: Running Caliptra ROM ...
193,812 UART:
193,965 UART: [state] CFI Enabled
264,770 UART: [state] LifecycleState = Unprovisioned
266,763 UART: [state] DebugLocked = No
269,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,028 UART: [kat] SHA2-256
443,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,256 UART: [kat] ++
454,751 UART: [kat] sha1
465,802 UART: [kat] SHA2-256
468,500 UART: [kat] SHA2-384
475,845 UART: [kat] SHA2-512-ACC
478,223 UART: [kat] ECC-384
2,766,243 UART: [kat] HMAC-384Kdf
2,799,658 UART: [kat] LMS
3,989,908 UART: [kat] --
3,994,326 UART: [cold-reset] ++
3,995,404 UART: [fht] Storing FHT @ 0x50003400
4,006,191 UART: [idev] ++
4,006,767 UART: [idev] CDI.KEYID = 6
4,007,807 UART: [idev] SUBJECT.KEYID = 7
4,009,008 UART: [idev] UDS.KEYID = 0
4,010,059 ready_for_fw is high
4,010,262 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,331 UART: [idev] Erasing UDS.KEYID = 0
7,346,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,258 UART: [idev] --
7,369,955 UART: [ldev] ++
7,370,528 UART: [ldev] CDI.KEYID = 6
7,371,479 UART: [ldev] SUBJECT.KEYID = 5
7,372,611 UART: [ldev] AUTHORITY.KEYID = 7
7,373,944 UART: [ldev] FE.KEYID = 1
7,420,318 UART: [ldev] Erasing FE.KEYID = 1
10,756,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,919 UART: [ldev] --
13,137,074 UART: [fwproc] Waiting for Commands...
13,140,033 UART: [fwproc] Received command 0x46574c44
13,142,217 UART: [fwproc] Received Image of size 113760 bytes
17,197,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,484 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,657,399 >>> mbox cmd response: success
17,657,923 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,661,031 UART: [afmc] ++
17,661,624 UART: [afmc] CDI.KEYID = 6
17,662,567 UART: [afmc] SUBJECT.KEYID = 7
17,663,840 UART: [afmc] AUTHORITY.KEYID = 5
21,025,206 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,479 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,169 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,975 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,429 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,302 UART: [afmc] --
23,397,062 UART: [cold-reset] --
23,400,759 UART: [state] Locking Datavault
23,407,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,831 UART: [state] Locking ICCM
23,410,548 UART: [exit] Launching FMC @ 0x40000130
23,418,940 UART:
23,419,181 UART: Running Caliptra FMC ...
23,420,279 UART:
23,420,439 UART: [state] CFI Enabled
23,486,216 UART: [fht] FMC Alias Private Key: 7
25,824,280 UART: [art] Extend RT PCRs Done
25,825,704 UART: [art] Lock RT PCRs Done
25,827,236 UART: [art] Populate DV Done
25,832,444 UART: [fht] FMC Alias Private Key: 7
25,834,045 UART: [art] Derive CDI
25,834,862 UART: [art] Store in in slot 0x4
25,894,958 UART: [art] Derive Key Pair
25,895,956 UART: [art] Store priv key in slot 0x5
29,189,212 UART: [art] Derive Key Pair - Done
29,202,162 UART: [art] Signing Cert with AUTHO
29,203,465 UART: RITY.KEYID = 7
31,491,555 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,073 UART: [art] PUB.X = 7E9AF5A4B98337C254263D216C01078817EB0F6E03DB98619C8CE46E3314E32CD46D69795E5EDBD278D34DD360AE6995
31,500,326 UART: [art] PUB.Y = BA1FFB2B5971C1BB4FEB6907D4EA1BF4D1912C2868893B58AE7D7965A16A80B75AD093C13BCA1AEF2E9C58D4BB749FEF
31,507,586 UART: [art] SIG.R = 7B7E16227B79C6A524B557AE840FD91F0A413FA075852C0A4FBCF4E05F595AA9BEE98C91716A05F7A1DFE34EA9A80195
31,514,997 UART: [art] SIG.S = 7C1A2F73703C7FD4970357141EA4BC3A545986C6E098A1FD72DBC29582509897DDD20BC9AF1780C7270CE19B22EED61D
32,820,013 UART: Caliptra RT
32,820,738 UART: [state] CFI Enabled
32,979,792 UART: [rt] RT listening for mailbox commands...
33,010,885 UART: [rt]cmd =0x4c444556, len=4
33,021,922 >>> mbox cmd response data (687 bytes)
33,063,572 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,093,791 UART: [rt]cmd =0x43455246, len=4
33,106,575 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,786,700 ready_for_fw is high
3,787,093 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,869,619 >>> mbox cmd response: success
17,870,418 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,564,984 UART:
23,565,385 UART: Running Caliptra FMC ...
23,566,591 UART:
23,566,762 UART: [state] CFI Enabled
23,637,041 UART: [fht] FMC Alias Private Key: 7
25,974,421 UART: [art] Extend RT PCRs Done
25,975,646 UART: [art] Lock RT PCRs Done
25,977,224 UART: [art] Populate DV Done
25,982,537 UART: [fht] FMC Alias Private Key: 7
25,984,189 UART: [art] Derive CDI
25,985,009 UART: [art] Store in in slot 0x4
26,046,256 UART: [art] Derive Key Pair
26,047,299 UART: [art] Store priv key in slot 0x5
29,339,841 UART: [art] Derive Key Pair - Done
29,352,793 UART: [art] Signing Cert with AUTHO
29,354,104 UART: RITY.KEYID = 7
31,641,608 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,136 UART: [art] PUB.X = 08BE21BF3643A3DC1D83840BDAFA5E85AA8817E51F895E98B7C95C25B4EC36AA82A12C18CFAB40E5322F42DB9E68588E
31,650,393 UART: [art] PUB.Y = 15DE3C491E252DE14173A6C0129758F314D929EF24B7BE116AEB4C8989D21855558707B31385BC4FA2D3736147FF0FD3
31,657,642 UART: [art] SIG.R = B6A7EA0ED95E806CF4E2B289675504AAC1A223BB015F327985C286D5BE3693E51AD5016AD57C66EF696CFE2E1D1FF941
31,665,036 UART: [art] SIG.S = C2CDBA4999C3EA577093E18F90BE6FCEB61677CFBC95551A79410FB2C302856AD83C7301750D210DA16D4EF1643177A6
32,970,133 UART: Caliptra RT
32,970,854 UART: [state] CFI Enabled
33,131,481 UART: [rt] RT listening for mailbox commands...
33,163,002 UART: [rt]cmd =0x4c444556, len=4
33,173,966 >>> mbox cmd response data (687 bytes)
33,215,276 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,245,154 UART: [rt]cmd =0x43455246, len=4
33,258,305 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
193,089 UART:
193,443 UART: Running Caliptra ROM ...
194,640 UART:
604,367 UART: [state] CFI Enabled
615,908 UART: [state] LifecycleState = Unprovisioned
617,774 UART: [state] DebugLocked = No
620,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,538 UART: [kat] SHA2-256
795,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,880 UART: [kat] ++
806,323 UART: [kat] sha1
816,621 UART: [kat] SHA2-256
819,337 UART: [kat] SHA2-384
825,959 UART: [kat] SHA2-512-ACC
828,323 UART: [kat] ECC-384
3,111,610 UART: [kat] HMAC-384Kdf
3,122,935 UART: [kat] LMS
4,313,041 UART: [kat] --
4,316,494 UART: [cold-reset] ++
4,318,854 UART: [fht] Storing FHT @ 0x50003400
4,329,830 UART: [idev] ++
4,330,391 UART: [idev] CDI.KEYID = 6
4,331,415 UART: [idev] SUBJECT.KEYID = 7
4,332,603 UART: [idev] UDS.KEYID = 0
4,333,639 ready_for_fw is high
4,333,838 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,853 UART: [idev] Erasing UDS.KEYID = 0
7,619,938 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,453 UART: [idev] --
7,646,175 UART: [ldev] ++
7,646,746 UART: [ldev] CDI.KEYID = 6
7,647,678 UART: [ldev] SUBJECT.KEYID = 5
7,648,885 UART: [ldev] AUTHORITY.KEYID = 7
7,650,168 UART: [ldev] FE.KEYID = 1
7,661,863 UART: [ldev] Erasing FE.KEYID = 1
10,949,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,256 UART: [ldev] --
13,311,241 UART: [fwproc] Waiting for Commands...
13,314,248 UART: [fwproc] Received command 0x46574c44
13,316,425 UART: [fwproc] Received Image of size 113760 bytes
17,365,921 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,137 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,428 >>> mbox cmd response: success
17,828,931 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,832,023 UART: [afmc] ++
17,832,608 UART: [afmc] CDI.KEYID = 6
17,833,539 UART: [afmc] SUBJECT.KEYID = 7
17,834,803 UART: [afmc] AUTHORITY.KEYID = 5
21,146,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,347 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,617 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,998 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,813 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,248 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,355 UART: [afmc] --
23,512,008 UART: [cold-reset] --
23,517,006 UART: [state] Locking Datavault
23,523,549 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,312 UART: [state] Locking ICCM
23,527,648 UART: [exit] Launching FMC @ 0x40000130
23,536,038 UART:
23,536,268 UART: Running Caliptra FMC ...
23,537,301 UART:
23,537,445 UART: [state] CFI Enabled
23,545,538 UART: [fht] FMC Alias Private Key: 7
25,876,548 UART: [art] Extend RT PCRs Done
25,877,798 UART: [art] Lock RT PCRs Done
25,879,319 UART: [art] Populate DV Done
25,884,681 UART: [fht] FMC Alias Private Key: 7
25,886,164 UART: [art] Derive CDI
25,886,894 UART: [art] Store in in slot 0x4
25,929,591 UART: [art] Derive Key Pair
25,930,623 UART: [art] Store priv key in slot 0x5
29,173,118 UART: [art] Derive Key Pair - Done
29,186,111 UART: [art] Signing Cert with AUTHO
29,187,445 UART: RITY.KEYID = 7
31,466,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,269 UART: [art] PUB.X = D16E1786B6D32A169B267E1662ED3F9DEF9A87C1336D9F10E694E287FE0BD5971385606430652D6B9897432BA650C6EF
31,475,486 UART: [art] PUB.Y = EBE032C2E9C565ABFB2E0A41C5E70C369DF398EFDEFAB4ED7BC942E0BDDA9D17067CAAF3F0FD5131893F4699C5D73ADC
31,482,791 UART: [art] SIG.R = 988ADED0D3B6174FF1661666AC7B2AC22D0A8E7743E80185E879CEF434CAF5DDD36928C77A633BD6819B36A832FA20B2
31,490,147 UART: [art] SIG.S = 22AA05F043CE67DCE604EE3C3BD53AC5EFFB8BF19268B70EE4F854D03AB38A76ED8DE7F361F22B8DECA28102E9678F8C
32,795,747 UART: Caliptra RT
32,796,461 UART: [state] CFI Enabled
32,912,818 UART: [rt] RT listening for mailbox commands...
32,944,276 UART: [rt]cmd =0x4c444556, len=4
32,955,324 >>> mbox cmd response data (687 bytes)
32,996,173 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,026,234 UART: [rt]cmd =0x43455246, len=4
33,039,244 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,570 writing to cptra_bootfsm_go
4,128,083 ready_for_fw is high
4,128,475 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,064,065 >>> mbox cmd response: success
18,064,861 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,702,987 UART:
23,703,384 UART: Running Caliptra FMC ...
23,704,516 UART:
23,704,665 UART: [state] CFI Enabled
23,712,806 UART: [fht] FMC Alias Private Key: 7
26,043,340 UART: [art] Extend RT PCRs Done
26,044,580 UART: [art] Lock RT PCRs Done
26,046,457 UART: [art] Populate DV Done
26,051,549 UART: [fht] FMC Alias Private Key: 7
26,053,200 UART: [art] Derive CDI
26,053,934 UART: [art] Store in in slot 0x4
26,096,835 UART: [art] Derive Key Pair
26,097,882 UART: [art] Store priv key in slot 0x5
29,339,015 UART: [art] Derive Key Pair - Done
29,352,296 UART: [art] Signing Cert with AUTHO
29,353,792 UART: RITY.KEYID = 7
31,632,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,479 UART: [art] PUB.X = 1DA4A6BCC15BCC6385CEAA7BD887C9B3E8BC9BF13D975288FB48D62BC985AA7D7D1F98FD6FB8ED5716BB03FB653ACC3D
31,641,751 UART: [art] PUB.Y = 1F8C45E1CC108C67FFD9E371732CCD71227DC06B34A697A892C9D0F934044F1A440AA186B38FCF5C66166BB27C2754EE
31,649,017 UART: [art] SIG.R = 94CF257B22EBDE3CABAFA24C1DAFB743D0582A22ED8A3AF377D9A6046EB64646262C9BC056176B1D5399AEDAAF2C675F
31,656,435 UART: [art] SIG.S = 0911435B44258F99A6D0639C4081F5890D4D1AF4A3E98882DE3B42E4F320001BBD33D183A771E3F71DC0187309FA1BE2
32,960,979 UART: Caliptra RT
32,961,694 UART: [state] CFI Enabled
33,079,657 UART: [rt] RT listening for mailbox commands...
33,110,913 UART: [rt]cmd =0x4c444556, len=4
33,121,993 >>> mbox cmd response data (687 bytes)
33,163,086 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,193,094 UART: [rt]cmd =0x43455246, len=4
33,206,145 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,460 writing to cptra_bootfsm_go
193,539 UART:
193,901 UART: Running Caliptra ROM ...
195,092 UART:
195,255 UART: [state] CFI Enabled
266,689 UART: [state] LifecycleState = Unprovisioned
268,529 UART: [state] DebugLocked = No
270,137 UART: [state] WD Timer not started. Device not locked for debugging
273,551 UART: [kat] SHA2-256
452,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,207 UART: [kat] ++
464,657 UART: [kat] sha1
476,734 UART: [kat] SHA2-256
479,744 UART: [kat] SHA2-384
486,511 UART: [kat] SHA2-512-ACC
489,459 UART: [kat] ECC-384
2,947,140 UART: [kat] HMAC-384Kdf
2,972,113 UART: [kat] LMS
3,501,545 UART: [kat] --
3,504,854 UART: [cold-reset] ++
3,507,279 UART: [fht] FHT @ 0x50003400
3,518,035 UART: [idev] ++
3,518,605 UART: [idev] CDI.KEYID = 6
3,519,509 UART: [idev] SUBJECT.KEYID = 7
3,520,744 UART: [idev] UDS.KEYID = 0
3,521,643 ready_for_fw is high
3,521,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,166 UART: [idev] Erasing UDS.KEYID = 0
6,027,221 UART: [idev] Sha1 KeyId Algorithm
6,049,188 UART: [idev] --
6,053,495 UART: [ldev] ++
6,054,071 UART: [ldev] CDI.KEYID = 6
6,055,005 UART: [ldev] SUBJECT.KEYID = 5
6,056,086 UART: [ldev] AUTHORITY.KEYID = 7
6,057,372 UART: [ldev] FE.KEYID = 1
6,102,136 UART: [ldev] Erasing FE.KEYID = 1
8,604,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,210 UART: [ldev] --
10,413,669 UART: [fwproc] Wait for Commands...
10,415,309 UART: [fwproc] Recv command 0x46574c44
10,417,367 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,684 >>> mbox cmd response: success
14,274,195 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,277,625 UART: [afmc] ++
14,278,206 UART: [afmc] CDI.KEYID = 6
14,279,114 UART: [afmc] SUBJECT.KEYID = 7
14,280,268 UART: [afmc] AUTHORITY.KEYID = 5
16,800,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,962 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,279 UART: [afmc] --
18,608,928 UART: [cold-reset] --
18,612,507 UART: [state] Locking Datavault
18,619,425 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,064 UART: [state] Locking ICCM
18,623,318 UART: [exit] Launching FMC @ 0x40000130
18,631,762 UART:
18,631,991 UART: Running Caliptra FMC ...
18,633,090 UART:
18,633,252 UART: [state] CFI Enabled
18,690,285 UART: [fht] FMC Alias Private Key: 7
20,454,095 UART: [art] Extend RT PCRs Done
20,455,337 UART: [art] Lock RT PCRs Done
20,456,932 UART: [art] Populate DV Done
20,462,174 UART: [fht] FMC Alias Private Key: 7
20,463,705 UART: [art] Derive CDI
20,464,435 UART: [art] Store in in slot 0x4
20,523,119 UART: [art] Derive Key Pair
20,524,158 UART: [art] Store priv key in slot 0x5
22,987,353 UART: [art] Derive Key Pair - Done
23,000,236 UART: [art] Signing Cert with AUTHO
23,001,542 UART: RITY.KEYID = 7
24,712,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,057 UART: [art] PUB.X = FEF3FB7BF55B610151C62E344BE9B46C6FB64D8D1B7408B4552AD58C205CEE3D45CA0EC2B123FE3A9D17ADB952A7EB18
24,721,399 UART: [art] PUB.Y = 8A8D9EE16604CF1BD8167BB7E8F5F5F59C990C2D398F0638C94BF2834C0B47EED7154CE29DC5055E6B5ED93036E583EF
24,728,657 UART: [art] SIG.R = 6512B04999EADAA4D806F5A1E9BD96D7E8AFAA8780D34F9FC99EF6A89BF6F71C57CFE32D9335DEDB292E1D196397E22A
24,736,013 UART: [art] SIG.S = 147FD7C4E6D44C8CDEB5439ABBCB1050E78A111B3C67CBA44F53AB99587F2C13885CCE1AD81FCA8B5049DF4D34E6A814
25,715,111 UART: Caliptra RT
25,715,834 UART: [state] CFI Enabled
25,879,258 UART: [rt] RT listening for mailbox commands...
25,910,399 UART: [rt]cmd =0x4c444556, len=4
25,921,634 >>> mbox cmd response data (687 bytes)
25,963,052 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,993,136 UART: [rt]cmd =0x43455246, len=4
26,005,818 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,318 writing to cptra_bootfsm_go
3,380,845 ready_for_fw is high
3,381,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,081,950 >>> mbox cmd response: success
14,082,739 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,366,455 UART:
18,366,861 UART: Running Caliptra FMC ...
18,368,021 UART:
18,368,179 UART: [state] CFI Enabled
18,431,762 UART: [fht] FMC Alias Private Key: 7
20,195,881 UART: [art] Extend RT PCRs Done
20,197,106 UART: [art] Lock RT PCRs Done
20,198,453 UART: [art] Populate DV Done
20,204,084 UART: [fht] FMC Alias Private Key: 7
20,205,686 UART: [art] Derive CDI
20,206,505 UART: [art] Store in in slot 0x4
20,264,229 UART: [art] Derive Key Pair
20,265,268 UART: [art] Store priv key in slot 0x5
22,728,719 UART: [art] Derive Key Pair - Done
22,741,341 UART: [art] Signing Cert with AUTHO
22,742,644 UART: RITY.KEYID = 7
24,453,928 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,446 UART: [art] PUB.X = 4784DB310FF7EE142B9C9D17C518ABF0D07B2EE0588699C5CC17C3E57C3CA22F8F74DB2C24FC38F03206735E26D66916
24,462,722 UART: [art] PUB.Y = ED2EAA4F198B91A0122F13323392E4FBFC221621D7E7A3EB3CA7A7CC4A29E69D0AAE55689E01FB55CEAE6362BA34ABEF
24,470,044 UART: [art] SIG.R = 19F08D29C78D287E16DE32DBEF55E1D2DC4B756F2929EE7402C6A62118418295803174F49450D2DD091063250BD34970
24,477,413 UART: [art] SIG.S = C87083A3A856614BDF763060232AFDA1368C45AFB871DF8854AA3728D444A46ED1F96A8E5D15389B924686AE884D6208
25,457,111 UART: Caliptra RT
25,457,814 UART: [state] CFI Enabled
25,623,117 UART: [rt] RT listening for mailbox commands...
25,654,527 UART: [rt]cmd =0x4c444556, len=4
25,665,772 >>> mbox cmd response data (687 bytes)
25,707,556 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,737,552 UART: [rt]cmd =0x43455246, len=4
25,750,294 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,810 writing to cptra_bootfsm_go
193,073 UART:
193,453 UART: Running Caliptra ROM ...
194,561 UART:
604,297 UART: [state] CFI Enabled
619,254 UART: [state] LifecycleState = Unprovisioned
621,147 UART: [state] DebugLocked = No
623,815 UART: [state] WD Timer not started. Device not locked for debugging
627,495 UART: [kat] SHA2-256
806,608 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,190 UART: [kat] ++
818,641 UART: [kat] sha1
829,867 UART: [kat] SHA2-256
832,876 UART: [kat] SHA2-384
839,082 UART: [kat] SHA2-512-ACC
842,039 UART: [kat] ECC-384
3,283,905 UART: [kat] HMAC-384Kdf
3,297,155 UART: [kat] LMS
3,826,590 UART: [kat] --
3,829,943 UART: [cold-reset] ++
3,831,306 UART: [fht] FHT @ 0x50003400
3,841,291 UART: [idev] ++
3,841,866 UART: [idev] CDI.KEYID = 6
3,842,898 UART: [idev] SUBJECT.KEYID = 7
3,844,005 UART: [idev] UDS.KEYID = 0
3,844,959 ready_for_fw is high
3,845,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,512 UART: [idev] Erasing UDS.KEYID = 0
6,318,415 UART: [idev] Sha1 KeyId Algorithm
6,342,016 UART: [idev] --
6,346,744 UART: [ldev] ++
6,347,345 UART: [ldev] CDI.KEYID = 6
6,348,261 UART: [ldev] SUBJECT.KEYID = 5
6,349,417 UART: [ldev] AUTHORITY.KEYID = 7
6,350,646 UART: [ldev] FE.KEYID = 1
6,359,887 UART: [ldev] Erasing FE.KEYID = 1
8,832,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,908 UART: [ldev] --
10,623,178 UART: [fwproc] Wait for Commands...
10,625,108 UART: [fwproc] Recv command 0x46574c44
10,627,197 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,479,986 >>> mbox cmd response: success
14,480,509 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,483,551 UART: [afmc] ++
14,484,144 UART: [afmc] CDI.KEYID = 6
14,485,058 UART: [afmc] SUBJECT.KEYID = 7
14,486,280 UART: [afmc] AUTHORITY.KEYID = 5
16,989,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,694 UART: [afmc] --
18,785,800 UART: [cold-reset] --
18,788,740 UART: [state] Locking Datavault
18,793,954 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,612 UART: [state] Locking ICCM
18,798,089 UART: [exit] Launching FMC @ 0x40000130
18,806,490 UART:
18,806,730 UART: Running Caliptra FMC ...
18,807,834 UART:
18,807,993 UART: [state] CFI Enabled
18,816,312 UART: [fht] FMC Alias Private Key: 7
20,573,700 UART: [art] Extend RT PCRs Done
20,574,923 UART: [art] Lock RT PCRs Done
20,576,832 UART: [art] Populate DV Done
20,582,292 UART: [fht] FMC Alias Private Key: 7
20,583,788 UART: [art] Derive CDI
20,584,554 UART: [art] Store in in slot 0x4
20,626,874 UART: [art] Derive Key Pair
20,627,875 UART: [art] Store priv key in slot 0x5
23,054,962 UART: [art] Derive Key Pair - Done
23,067,962 UART: [art] Signing Cert with AUTHO
23,069,296 UART: RITY.KEYID = 7
24,775,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,678 UART: [art] PUB.X = 5429C966616882698B56A4D1174A22493C745D11B9CB6A2D6427472E12DB1EED05518D53D9CB87F97BE478D996354675
24,783,948 UART: [art] PUB.Y = 0675FAA81E48BD1D6C6CA9A2A125D40D056B5B7547B792EFA360A58458AFCD70E5BEFD2710521D5A3633D7CC27140002
24,791,157 UART: [art] SIG.R = B027E69595B07365359BB42E4EA7C7347D953FD4BF33B822D6B8D6F58332864FCB32B311314151F5D6D0E1E3B1F58EB0
24,798,588 UART: [art] SIG.S = 3B9E4919FBC97EE23657E94562B6FC5B8C2D364C1A318D54058D3674C8413EA157A0132255DD9772607E5465AFE69B8F
25,777,473 UART: Caliptra RT
25,778,185 UART: [state] CFI Enabled
25,895,303 UART: [rt] RT listening for mailbox commands...
25,926,502 UART: [rt]cmd =0x4c444556, len=4
25,937,576 >>> mbox cmd response data (687 bytes)
25,978,877 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,008,659 UART: [rt]cmd =0x43455246, len=4
26,021,546 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
3,700,928 ready_for_fw is high
3,701,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,279,003 >>> mbox cmd response: success
14,279,655 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,530,373 UART:
18,530,775 UART: Running Caliptra FMC ...
18,531,919 UART:
18,532,077 UART: [state] CFI Enabled
18,539,652 UART: [fht] FMC Alias Private Key: 7
20,296,470 UART: [art] Extend RT PCRs Done
20,297,700 UART: [art] Lock RT PCRs Done
20,299,573 UART: [art] Populate DV Done
20,305,097 UART: [fht] FMC Alias Private Key: 7
20,306,595 UART: [art] Derive CDI
20,307,361 UART: [art] Store in in slot 0x4
20,350,309 UART: [art] Derive Key Pair
20,351,358 UART: [art] Store priv key in slot 0x5
22,778,447 UART: [art] Derive Key Pair - Done
22,791,285 UART: [art] Signing Cert with AUTHO
22,792,592 UART: RITY.KEYID = 7
24,497,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,504 UART: [art] PUB.X = 6768C4A68ED07A66E198F0794098A7872E719A2D5BF242C293B83B0DE393EAB11B562A102FC7EBC49B7A3AD6550ACC6A
24,506,730 UART: [art] PUB.Y = 6E851927149C81EC1E55F51A1D1F7D2A8C0C3055D980B04A2F09CA3AB39DA1020FB01748B8160F593C1D4BABD06F1093
24,514,040 UART: [art] SIG.R = C4F1C615E60D8A3D6569480AC590E7811C5668BE258BF43A7C5749BB3DA4FFB7E66CC85A8CCAF1D896856C28DC526ABB
24,521,419 UART: [art] SIG.S = 5C1DB3D61E40659B296293EE27480A2B1D9CA495A50910B877059796CB9C117785333680CA88192E5A422063E1062143
25,499,955 UART: Caliptra RT
25,500,656 UART: [state] CFI Enabled
25,618,169 UART: [rt] RT listening for mailbox commands...
25,649,903 UART: [rt]cmd =0x4c444556, len=4
25,660,965 >>> mbox cmd response data (687 bytes)
25,701,543 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,731,601 UART: [rt]cmd =0x43455246, len=4
25,744,482 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,690 UART:
193,059 UART: Running Caliptra ROM ...
194,264 UART:
194,415 UART: [state] CFI Enabled
263,662 UART: [state] LifecycleState = Unprovisioned
266,104 UART: [state] DebugLocked = No
268,136 UART: [state] WD Timer not started. Device not locked for debugging
272,403 UART: [kat] SHA2-256
462,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,017 UART: [kat] ++
473,511 UART: [kat] sha1
484,899 UART: [kat] SHA2-256
487,943 UART: [kat] SHA2-384
494,087 UART: [kat] SHA2-512-ACC
496,674 UART: [kat] ECC-384
2,948,972 UART: [kat] HMAC-384Kdf
2,972,497 UART: [kat] LMS
3,504,267 UART: [kat] --
3,506,915 UART: [cold-reset] ++
3,508,484 UART: [fht] FHT @ 0x50003400
3,520,905 UART: [idev] ++
3,521,593 UART: [idev] CDI.KEYID = 6
3,522,484 UART: [idev] SUBJECT.KEYID = 7
3,523,731 UART: [idev] UDS.KEYID = 0
3,524,631 ready_for_fw is high
3,524,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,218 UART: [idev] Erasing UDS.KEYID = 0
6,030,568 UART: [idev] Sha1 KeyId Algorithm
6,053,873 UART: [idev] --
6,057,758 UART: [ldev] ++
6,058,438 UART: [ldev] CDI.KEYID = 6
6,059,376 UART: [ldev] SUBJECT.KEYID = 5
6,060,529 UART: [ldev] AUTHORITY.KEYID = 7
6,061,761 UART: [ldev] FE.KEYID = 1
6,101,772 UART: [ldev] Erasing FE.KEYID = 1
8,607,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,604 UART: [ldev] --
10,414,504 UART: [fwproc] Wait for Commands...
10,416,001 UART: [fwproc] Recv command 0x46574c44
10,417,906 UART: [fwproc] Recv'd Img size: 114084 bytes
13,852,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,046,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,588,406 >>> mbox cmd response: success
14,588,924 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,591,694 UART: [afmc] ++
14,592,397 UART: [afmc] CDI.KEYID = 6
14,593,588 UART: [afmc] SUBJECT.KEYID = 7
14,595,027 UART: [afmc] AUTHORITY.KEYID = 5
17,128,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,439 UART: [afmc] --
18,926,870 UART: [cold-reset] --
18,930,414 UART: [state] Locking Datavault
18,936,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,212 UART: [state] Locking ICCM
18,940,523 UART: [exit] Launching FMC @ 0x40000130
18,949,209 UART:
18,949,437 UART: Running Caliptra FMC ...
18,950,531 UART:
18,950,685 UART: [state] CFI Enabled
19,012,124 UART: [fht] FMC Alias Private Key: 7
20,775,968 UART: [art] Extend RT PCRs Done
20,777,188 UART: [art] Lock RT PCRs Done
20,778,813 UART: [art] Populate DV Done
20,784,388 UART: [fht] FMC Alias Private Key: 7
20,785,972 UART: [art] Derive CDI
20,786,780 UART: [art] Store in in slot 0x4
20,844,492 UART: [art] Derive Key Pair
20,845,535 UART: [art] Store priv key in slot 0x5
23,308,817 UART: [art] Derive Key Pair - Done
23,321,809 UART: [art] Signing Cert with AUTHO
23,323,102 UART: RITY.KEYID = 7
25,034,617 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,279 UART: [art] PUB.X = C2CF2A884901AF5FB8B7D862AAE5F51A8EDF10665F02FE92854EADA3A73405E549779342DAF52FE6D9C522EA7E63ACFE
25,043,433 UART: [art] PUB.Y = 4876B5E934B0F4773E627398A93CAA4998DDBA97B80208DAFE060689A33C3C2517FD88616DDC4FCDCC1E8A24D0984666
25,050,691 UART: [art] SIG.R = 81D392C267A04EA0F7D2C1CB8118304963C1F1424F9DC35E64E3D0CA98EC6A8057BEFFE537AEB383E5E618C372B4331B
25,058,135 UART: [art] SIG.S = 29EEC47E41F13D56FBB24CEC92E553B12BA781CA5424EE7FBCBD70A5ED05754A4C4F47EFA43B1F4B7179B8667407630A
26,037,084 UART: Caliptra RT
26,037,799 UART: [state] CFI Enabled
26,202,186 UART: [rt] RT listening for mailbox commands...
26,233,765 UART: [rt]cmd =0x4c444556, len=4
26,244,957 >>> mbox cmd response data (687 bytes)
26,286,212 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,316,209 UART: [rt]cmd =0x43455246, len=4
26,328,935 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,439,257 ready_for_fw is high
3,439,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,735,739 >>> mbox cmd response: success
14,736,396 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,032,697 UART:
19,033,100 UART: Running Caliptra FMC ...
19,034,268 UART:
19,034,426 UART: [state] CFI Enabled
19,095,929 UART: [fht] FMC Alias Private Key: 7
20,859,642 UART: [art] Extend RT PCRs Done
20,860,878 UART: [art] Lock RT PCRs Done
20,862,451 UART: [art] Populate DV Done
20,867,930 UART: [fht] FMC Alias Private Key: 7
20,869,357 UART: [art] Derive CDI
20,870,089 UART: [art] Store in in slot 0x4
20,928,138 UART: [art] Derive Key Pair
20,929,179 UART: [art] Store priv key in slot 0x5
23,391,799 UART: [art] Derive Key Pair - Done
23,404,796 UART: [art] Signing Cert with AUTHO
23,406,101 UART: RITY.KEYID = 7
25,116,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,399 UART: [art] PUB.X = 73FF87A20307D5B18567F0B264AC6CD1AE3C8318F2BBE4FA3658F8E931BD7B9671E96A591D67BE153C47CAA0503984F3
25,125,673 UART: [art] PUB.Y = 94CFB1ACC74E53A4CB14617AC189A1086A936858F575A441B2EA23DE594DC93F2AD9A4BD043E30A33E3826FA2E2938C9
25,132,919 UART: [art] SIG.R = D1B8561D11F2FA92C6BA957C1A4A29FCD25246C8C537005230C5178F59B752194E5B87305A071AD44F862FEC55DEA003
25,140,278 UART: [art] SIG.S = A61DE284937F68E1F6336D93C7EB019AEAB11CD43E05C652054BD72C27A2D35F6C1A5F09D1D1A0CF58774828EA691A1F
26,119,998 UART: Caliptra RT
26,120,728 UART: [state] CFI Enabled
26,284,207 UART: [rt] RT listening for mailbox commands...
26,315,633 UART: [rt]cmd =0x4c444556, len=4
26,326,663 >>> mbox cmd response data (687 bytes)
26,368,143 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,398,337 UART: [rt]cmd =0x43455246, len=4
26,411,080 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,954 UART:
193,341 UART: Running Caliptra ROM ...
194,537 UART:
604,233 UART: [state] CFI Enabled
618,048 UART: [state] LifecycleState = Unprovisioned
620,427 UART: [state] DebugLocked = No
623,025 UART: [state] WD Timer not started. Device not locked for debugging
628,269 UART: [kat] SHA2-256
818,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,931 UART: [kat] ++
829,543 UART: [kat] sha1
841,704 UART: [kat] SHA2-256
844,705 UART: [kat] SHA2-384
849,790 UART: [kat] SHA2-512-ACC
852,383 UART: [kat] ECC-384
3,294,811 UART: [kat] HMAC-384Kdf
3,307,186 UART: [kat] LMS
3,838,985 UART: [kat] --
3,842,979 UART: [cold-reset] ++
3,844,982 UART: [fht] FHT @ 0x50003400
3,857,387 UART: [idev] ++
3,858,026 UART: [idev] CDI.KEYID = 6
3,859,062 UART: [idev] SUBJECT.KEYID = 7
3,860,177 UART: [idev] UDS.KEYID = 0
3,861,099 ready_for_fw is high
3,861,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,834 UART: [idev] Erasing UDS.KEYID = 0
6,341,783 UART: [idev] Sha1 KeyId Algorithm
6,364,090 UART: [idev] --
6,369,730 UART: [ldev] ++
6,370,411 UART: [ldev] CDI.KEYID = 6
6,371,372 UART: [ldev] SUBJECT.KEYID = 5
6,372,526 UART: [ldev] AUTHORITY.KEYID = 7
6,373,756 UART: [ldev] FE.KEYID = 1
6,383,804 UART: [ldev] Erasing FE.KEYID = 1
8,864,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,943 UART: [ldev] --
10,652,217 UART: [fwproc] Wait for Commands...
10,654,742 UART: [fwproc] Recv command 0x46574c44
10,656,995 UART: [fwproc] Recv'd Img size: 114084 bytes
14,105,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,841,455 >>> mbox cmd response: success
14,842,543 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,845,286 UART: [afmc] ++
14,846,012 UART: [afmc] CDI.KEYID = 6
14,847,213 UART: [afmc] SUBJECT.KEYID = 7
14,848,653 UART: [afmc] AUTHORITY.KEYID = 5
17,352,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,165 UART: [afmc] --
19,149,175 UART: [cold-reset] --
19,154,628 UART: [state] Locking Datavault
19,160,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,379 UART: [state] Locking ICCM
19,165,181 UART: [exit] Launching FMC @ 0x40000130
19,173,860 UART:
19,174,096 UART: Running Caliptra FMC ...
19,175,204 UART:
19,175,370 UART: [state] CFI Enabled
19,183,280 UART: [fht] FMC Alias Private Key: 7
20,940,074 UART: [art] Extend RT PCRs Done
20,941,299 UART: [art] Lock RT PCRs Done
20,942,930 UART: [art] Populate DV Done
20,948,448 UART: [fht] FMC Alias Private Key: 7
20,949,984 UART: [art] Derive CDI
20,950,804 UART: [art] Store in in slot 0x4
20,993,134 UART: [art] Derive Key Pair
20,994,196 UART: [art] Store priv key in slot 0x5
23,420,964 UART: [art] Derive Key Pair - Done
23,433,807 UART: [art] Signing Cert with AUTHO
23,435,147 UART: RITY.KEYID = 7
25,140,562 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,054 UART: [art] PUB.X = C8B9DF9571C48B1D7E766A4BAE6CD1017171F8AAF8010D2D24329794BC10626853AB98AF9FC36A5DDAF5ECB1B067B64F
25,149,329 UART: [art] PUB.Y = BDAB1900322EC4EE5638A5B1DE069B977F021F334D6CDEE8D868D730FF7336299996ABF5273D3C47823C88C8245BB7AD
25,156,591 UART: [art] SIG.R = 967E1DC62037434C61A74532EF253267D50D3A30C3C26F410F5A164B3FAC2FD5CD7DFD8E861375BCC18CF7A1753ADBE4
25,163,955 UART: [art] SIG.S = 1FC02EDBA043A64CB324AC1D20EA7B87BA63EFEB29CF6C6ABF08D3424ECE80A2B30E68BEE42F6A8B45EBB638BF049D25
26,142,724 UART: Caliptra RT
26,143,434 UART: [state] CFI Enabled
26,261,472 UART: [rt] RT listening for mailbox commands...
26,292,840 UART: [rt]cmd =0x4c444556, len=4
26,304,039 >>> mbox cmd response data (687 bytes)
26,345,642 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,375,690 UART: [rt]cmd =0x43455246, len=4
26,388,400 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,755,203 ready_for_fw is high
3,755,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,744 >>> mbox cmd response: success
14,950,301 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,196,202 UART:
19,196,590 UART: Running Caliptra FMC ...
19,197,696 UART:
19,197,851 UART: [state] CFI Enabled
19,206,075 UART: [fht] FMC Alias Private Key: 7
20,963,343 UART: [art] Extend RT PCRs Done
20,964,580 UART: [art] Lock RT PCRs Done
20,966,239 UART: [art] Populate DV Done
20,971,930 UART: [fht] FMC Alias Private Key: 7
20,973,588 UART: [art] Derive CDI
20,974,328 UART: [art] Store in in slot 0x4
21,016,709 UART: [art] Derive Key Pair
21,017,754 UART: [art] Store priv key in slot 0x5
23,444,160 UART: [art] Derive Key Pair - Done
23,457,049 UART: [art] Signing Cert with AUTHO
23,458,352 UART: RITY.KEYID = 7
25,163,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,061 UART: [art] PUB.X = ECFA512DB97F06DEFB0A89F561DCA7AA5974327BFE82B7DC11417D9454C60AFAF1322F65E6F57739E4DD831D72EE1082
25,172,354 UART: [art] PUB.Y = 44D5C5176E30008CDF0ABE708D19873A864CCD16BC5D9853A93D03C20A2786093A1931D428C6100F4589932AD60C207A
25,179,558 UART: [art] SIG.R = 99E646787122656157397886644E67CB662BA586FD5F34A33BF0E31346051C56D08E1C34E45D323E1B84CBFE867C235D
25,186,968 UART: [art] SIG.S = 32118CC729CE39630F24780E13E499CE34AEEF636A0670C8C757971D3A8F29ECC782DBABD17499F0DD3ADB0BA4B0D162
26,166,449 UART: Caliptra RT
26,167,165 UART: [state] CFI Enabled
26,284,977 UART: [rt] RT listening for mailbox commands...
26,316,434 UART: [rt]cmd =0x4c444556, len=4
26,327,493 >>> mbox cmd response data (687 bytes)
26,368,540 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,398,731 UART: [rt]cmd =0x43455246, len=4
26,411,576 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,564 UART: [kat] SHA2-512-ACC
897,465 UART: [kat] ECC-384
903,116 UART: [kat] HMAC-384Kdf
907,682 UART: [kat] LMS
1,475,878 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,479,884 UART: [idev] ++
1,480,052 UART: [idev] CDI.KEYID = 6
1,480,412 UART: [idev] SUBJECT.KEYID = 7
1,480,836 UART: [idev] UDS.KEYID = 0
1,481,181 ready_for_fw is high
1,481,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,878 UART: [idev] Erasing UDS.KEYID = 0
1,505,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,628 UART: [idev] --
1,515,629 UART: [ldev] ++
1,515,797 UART: [ldev] CDI.KEYID = 6
1,516,160 UART: [ldev] SUBJECT.KEYID = 5
1,516,586 UART: [ldev] AUTHORITY.KEYID = 7
1,517,049 UART: [ldev] FE.KEYID = 1
1,522,291 UART: [ldev] Erasing FE.KEYID = 1
1,547,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,414 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,762 UART: [fwproc] Received command 0x46574c44
1,587,553 UART: [fwproc] Received Image of size 114084 bytes
2,882,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,290 >>> mbox cmd response: success
3,074,290 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,075,414 UART: [afmc] ++
3,075,582 UART: [afmc] CDI.KEYID = 6
3,075,944 UART: [afmc] SUBJECT.KEYID = 7
3,076,369 UART: [afmc] AUTHORITY.KEYID = 5
3,111,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,330 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,723 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,413 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,338 UART: [afmc] --
3,154,462 UART: [cold-reset] --
3,155,448 UART: [state] Locking Datavault
3,156,657 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,261 UART: [state] Locking ICCM
3,157,869 UART: [exit] Launching FMC @ 0x40000130
3,163,198 UART:
3,163,214 UART: Running Caliptra FMC ...
3,163,622 UART:
3,163,676 UART: [state] CFI Enabled
3,174,301 UART: [fht] FMC Alias Private Key: 7
3,282,424 UART: [art] Extend RT PCRs Done
3,282,852 UART: [art] Lock RT PCRs Done
3,284,308 UART: [art] Populate DV Done
3,292,691 UART: [fht] FMC Alias Private Key: 7
3,293,711 UART: [art] Derive CDI
3,293,991 UART: [art] Store in in slot 0x4
3,379,922 UART: [art] Derive Key Pair
3,380,282 UART: [art] Store priv key in slot 0x5
3,393,416 UART: [art] Derive Key Pair - Done
3,407,757 UART: [art] Signing Cert with AUTHO
3,408,237 UART: RITY.KEYID = 7
3,423,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,908 UART: [art] PUB.X = 15B83B58DB6A4FF4ACF28B8D9B935CB6F0199A8FDA47AF0603D8977A55B1D9FDE2F5ED8B822DB338AB9F37A77DD58FEB
3,430,698 UART: [art] PUB.Y = 1A86F8F7503C68FA5F69E6AFD35E9371284DA80C8B4A818A24A2E75994A713DA9A69C404FB74F6A7C2A4BEB1A8866F90
3,437,652 UART: [art] SIG.R = 45576F49FC8A58F92CB8CBD3EB5D99305395B06C9EB76078C6BF717A6CD4FBD3ACDA450B0D0D4F705A78EDB4CF2172F4
3,444,433 UART: [art] SIG.S = 0A0B6AE9E566E0FE5A1F8B16D4D43A8AF9FE3A3DCC339693BB12BD9A999B4B6A28D23CFCB276EC7B5B12EA9129342816
3,468,020 UART: Caliptra RT
3,468,273 UART: [state] CFI Enabled
3,577,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,905 UART: [rt]cmd =0x4c444556, len=4
3,618,384 >>> mbox cmd response data (687 bytes)
3,618,385 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,828 UART: [rt]cmd =0x43455246, len=4
3,660,057 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,421 ready_for_fw is high
1,362,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,594 >>> mbox cmd response: success
2,924,594 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,985,360 UART:
2,985,376 UART: Running Caliptra FMC ...
2,985,784 UART:
2,985,838 UART: [state] CFI Enabled
2,996,319 UART: [fht] FMC Alias Private Key: 7
3,104,920 UART: [art] Extend RT PCRs Done
3,105,348 UART: [art] Lock RT PCRs Done
3,106,834 UART: [art] Populate DV Done
3,114,901 UART: [fht] FMC Alias Private Key: 7
3,116,069 UART: [art] Derive CDI
3,116,349 UART: [art] Store in in slot 0x4
3,202,210 UART: [art] Derive Key Pair
3,202,570 UART: [art] Store priv key in slot 0x5
3,216,748 UART: [art] Derive Key Pair - Done
3,231,852 UART: [art] Signing Cert with AUTHO
3,232,332 UART: RITY.KEYID = 7
3,247,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,253 UART: [art] PUB.X = 5590FB3EFD574583E0CDF747AF1746B7B973CF45305F03507BD0652AD332A3BAF4B4B3AA5B07BF5144DC0878960E94B8
3,255,019 UART: [art] PUB.Y = AD553B8012BF9F1B1509FBBC905399AE6BB1BDACDBADBE4531EF4D598840C391FEABBE9EB685593C9E9BAFE4520A1400
3,261,967 UART: [art] SIG.R = F6C2B17E541FB80CF19CEF9E69EDD98925AE9F24D2B8D5DC81CAD255620FB2BD35DD54B7E2651D552B85782263649226
3,268,741 UART: [art] SIG.S = 17E7FC0707EA5BE7B7B4DD70655D5077D2CE5C73D8ADDEC9F7D7997853F400A181D73C22427B679C6C43BC9EF3529274
3,292,788 UART: Caliptra RT
3,293,041 UART: [state] CFI Enabled
3,400,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,660 UART: [rt]cmd =0x4c444556, len=4
3,441,071 >>> mbox cmd response data (687 bytes)
3,441,072 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,509 UART: [rt]cmd =0x43455246, len=4
3,482,742 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,312 UART: [fht] Storing FHT @ 0x50003400
1,480,123 UART: [idev] ++
1,480,291 UART: [idev] CDI.KEYID = 6
1,480,651 UART: [idev] SUBJECT.KEYID = 7
1,481,075 UART: [idev] UDS.KEYID = 0
1,481,420 ready_for_fw is high
1,481,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,506,173 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,851 UART: [idev] --
1,515,902 UART: [ldev] ++
1,516,070 UART: [ldev] CDI.KEYID = 6
1,516,433 UART: [ldev] SUBJECT.KEYID = 5
1,516,859 UART: [ldev] AUTHORITY.KEYID = 7
1,517,322 UART: [ldev] FE.KEYID = 1
1,522,554 UART: [ldev] Erasing FE.KEYID = 1
1,548,149 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,624 UART: [fwproc] Waiting for Commands...
1,588,475 UART: [fwproc] Received command 0x46574c44
1,589,266 UART: [fwproc] Received Image of size 114084 bytes
2,883,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,365 >>> mbox cmd response: success
3,076,365 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,077,615 UART: [afmc] ++
3,077,783 UART: [afmc] CDI.KEYID = 6
3,078,145 UART: [afmc] SUBJECT.KEYID = 7
3,078,570 UART: [afmc] AUTHORITY.KEYID = 5
3,114,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,992 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,682 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,599 UART: [afmc] --
3,157,697 UART: [cold-reset] --
3,158,293 UART: [state] Locking Datavault
3,159,700 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,304 UART: [state] Locking ICCM
3,160,948 UART: [exit] Launching FMC @ 0x40000130
3,166,277 UART:
3,166,293 UART: Running Caliptra FMC ...
3,166,701 UART:
3,166,844 UART: [state] CFI Enabled
3,177,493 UART: [fht] FMC Alias Private Key: 7
3,285,542 UART: [art] Extend RT PCRs Done
3,285,970 UART: [art] Lock RT PCRs Done
3,287,738 UART: [art] Populate DV Done
3,296,021 UART: [fht] FMC Alias Private Key: 7
3,297,027 UART: [art] Derive CDI
3,297,307 UART: [art] Store in in slot 0x4
3,383,132 UART: [art] Derive Key Pair
3,383,492 UART: [art] Store priv key in slot 0x5
3,396,654 UART: [art] Derive Key Pair - Done
3,411,453 UART: [art] Signing Cert with AUTHO
3,411,933 UART: RITY.KEYID = 7
3,427,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,812 UART: [art] PUB.X = 033679FF88C51ABD8D15F84D12AF460F1C21E7EBEE56B25F0C794DBBC6B38E31BD206DD333F2B2D30DD0F630475E5FCD
3,434,590 UART: [art] PUB.Y = 34B007B3C96EBD9E938B9F5AF71D7061A553DF97C6E52E582A84C8D3299A3710983787FD1C8396F8004568E7C0F3EAFC
3,441,519 UART: [art] SIG.R = 4FF9F9E546139724A6A59339D2D676BEBB698D8555F950FB7A41CA29AF151E4AD35B73B532F7A5EA377581531C23A6EC
3,448,295 UART: [art] SIG.S = EFCF23EF026BEAB077A3AE45816ECC9D5F66B3B34C53A45B9BA6217B058E85F81B611A38AE2726EBA07761A15336B400
3,472,494 UART: Caliptra RT
3,472,839 UART: [state] CFI Enabled
3,581,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,238 UART: [rt]cmd =0x4c444556, len=4
3,622,729 >>> mbox cmd response data (687 bytes)
3,622,730 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,241 UART: [rt]cmd =0x43455246, len=4
3,664,532 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 ready_for_fw is high
1,362,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,713 >>> mbox cmd response: success
2,924,713 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,985,983 UART:
2,985,999 UART: Running Caliptra FMC ...
2,986,407 UART:
2,986,550 UART: [state] CFI Enabled
2,997,475 UART: [fht] FMC Alias Private Key: 7
3,105,582 UART: [art] Extend RT PCRs Done
3,106,010 UART: [art] Lock RT PCRs Done
3,107,662 UART: [art] Populate DV Done
3,115,791 UART: [fht] FMC Alias Private Key: 7
3,116,965 UART: [art] Derive CDI
3,117,245 UART: [art] Store in in slot 0x4
3,202,828 UART: [art] Derive Key Pair
3,203,188 UART: [art] Store priv key in slot 0x5
3,215,724 UART: [art] Derive Key Pair - Done
3,230,720 UART: [art] Signing Cert with AUTHO
3,231,200 UART: RITY.KEYID = 7
3,246,572 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,337 UART: [art] PUB.X = 60F057B40A67960DDB94512FD0557AC3E87273A4478E68425E08E66EB381D6BA05B51E107009CB997F1EE186C1605B60
3,254,088 UART: [art] PUB.Y = 863FE9975095875CE6710A1B62FFE0B7CB2956B1AAF06112DB0F94C6EE5FE2F24AA549661C9C2304239FF40CBB6E6B59
3,261,036 UART: [art] SIG.R = 69713F74529F029EA38DB36A62A976456CB4E81E1FED8A7D68847FD18862F7EF1AC596903AF82DB8ADBD3DED4B338644
3,267,813 UART: [art] SIG.S = 1FB099D41DB9B5FF0CAA97BA40B608BCAFAA09D0631DA8850154F8CDE71673E3A79FD0AB258FC6C56A145B37A83BCC0F
3,291,681 UART: Caliptra RT
3,292,026 UART: [state] CFI Enabled
3,401,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,530 UART: [rt]cmd =0x4c444556, len=4
3,441,893 >>> mbox cmd response data (687 bytes)
3,441,894 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,275 UART: [rt]cmd =0x43455246, len=4
3,483,692 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
917,924 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,150 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,006 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,243,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,082 UART: [fwproc] Wait for Commands...
1,283,678 UART: [fwproc] Recv command 0x46574c44
1,284,406 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,445 >>> mbox cmd response: success
2,771,445 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,529 UART: [afmc] ++
2,772,697 UART: [afmc] CDI.KEYID = 6
2,773,059 UART: [afmc] SUBJECT.KEYID = 7
2,773,484 UART: [afmc] AUTHORITY.KEYID = 5
2,808,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,952 UART: [afmc] --
2,851,924 UART: [cold-reset] --
2,852,882 UART: [state] Locking Datavault
2,854,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,617 UART: [state] Locking ICCM
2,855,199 UART: [exit] Launching FMC @ 0x40000130
2,860,528 UART:
2,860,544 UART: Running Caliptra FMC ...
2,860,952 UART:
2,861,006 UART: [state] CFI Enabled
2,871,577 UART: [fht] FMC Alias Private Key: 7
2,979,748 UART: [art] Extend RT PCRs Done
2,980,176 UART: [art] Lock RT PCRs Done
2,981,680 UART: [art] Populate DV Done
2,989,817 UART: [fht] FMC Alias Private Key: 7
2,990,759 UART: [art] Derive CDI
2,991,039 UART: [art] Store in in slot 0x4
3,077,036 UART: [art] Derive Key Pair
3,077,396 UART: [art] Store priv key in slot 0x5
3,090,850 UART: [art] Derive Key Pair - Done
3,105,783 UART: [art] Signing Cert with AUTHO
3,106,263 UART: RITY.KEYID = 7
3,121,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,112 UART: [art] PUB.X = 1A51A994A73B916D39D7BACCB544987248E2C8876F9ED156ED84114423E8133AF2A1B29BADD3DC1587D1806ACDE88211
3,128,888 UART: [art] PUB.Y = 55F4BB85E42D392B63676AF32A6D9D3C8571EC4C0936AF9DB7EABD6B77CE5165EDBAC07715983AF2C7D1AC6A8495A6D6
3,135,853 UART: [art] SIG.R = 188813EDC99265D77F94B7ED8B4939583B3F7C1E7BC332D983E8E5D7A26E00760BEE3908C60630837AA8F7A4F2477526
3,142,590 UART: [art] SIG.S = B33B19DBDA9F0127FF9BD12A5BF5346A6267DF23984F152749E67017A39D3EE2BB6BF075EEF665D709A22D6F3CB9D61C
3,166,293 UART: Caliptra RT
3,166,546 UART: [state] CFI Enabled
3,274,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,595 UART: [rt]cmd =0x4c444556, len=4
3,315,070 >>> mbox cmd response data (687 bytes)
3,315,071 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,360 UART: [rt]cmd =0x43455246, len=4
3,356,379 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 ready_for_fw is high
1,060,253 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,492 >>> mbox cmd response: success
2,623,492 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,474 UART:
2,686,490 UART: Running Caliptra FMC ...
2,686,898 UART:
2,686,952 UART: [state] CFI Enabled
2,697,303 UART: [fht] FMC Alias Private Key: 7
2,806,022 UART: [art] Extend RT PCRs Done
2,806,450 UART: [art] Lock RT PCRs Done
2,807,674 UART: [art] Populate DV Done
2,816,011 UART: [fht] FMC Alias Private Key: 7
2,817,099 UART: [art] Derive CDI
2,817,379 UART: [art] Store in in slot 0x4
2,903,286 UART: [art] Derive Key Pair
2,903,646 UART: [art] Store priv key in slot 0x5
2,917,110 UART: [art] Derive Key Pair - Done
2,931,853 UART: [art] Signing Cert with AUTHO
2,932,333 UART: RITY.KEYID = 7
2,947,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,426 UART: [art] PUB.X = DCF89F599392D9AE935F04C782DA803E9756045034C644709BFD914022CBA4EB0D420DA36636198396036457AD2701D8
2,955,170 UART: [art] PUB.Y = DBAEF71E3758D0F4ADE317BB4622FB62ACC2AB85FD875D2B6E658C97436211FC6D967D08AD618A56BD2729CB2768082C
2,962,128 UART: [art] SIG.R = 96768EB3EB058BED7FF896B984DB62042F7F21F196D4E76E37C50B0F2A46B7F09E4D4175DB1C7CA85E5F2C1560977998
2,968,892 UART: [art] SIG.S = BCEE7D9D250822855803C9C5366042D123E4234978B8EAF92B5952960820562E668B058BE5FCFA1613BCAA4A56212D7D
2,992,393 UART: Caliptra RT
2,992,646 UART: [state] CFI Enabled
3,100,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,304 UART: [rt]cmd =0x4c444556, len=4
3,141,567 >>> mbox cmd response data (687 bytes)
3,141,568 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,717 UART: [rt]cmd =0x43455246, len=4
3,182,968 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,736 UART: [kat] SHA2-256
903,676 UART: [kat] SHA2-384
906,497 UART: [kat] SHA2-512-ACC
908,398 UART: [kat] ECC-384
917,871 UART: [kat] HMAC-384Kdf
922,579 UART: [kat] LMS
1,170,907 UART: [kat] --
1,171,670 UART: [cold-reset] ++
1,172,130 UART: [fht] FHT @ 0x50003400
1,174,879 UART: [idev] ++
1,175,047 UART: [idev] CDI.KEYID = 6
1,175,407 UART: [idev] SUBJECT.KEYID = 7
1,175,831 UART: [idev] UDS.KEYID = 0
1,176,176 ready_for_fw is high
1,176,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,699 UART: [idev] Erasing UDS.KEYID = 0
1,201,134 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,152 UART: [ldev] Erasing FE.KEYID = 1
1,244,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,472 UART: [ldev] --
1,283,745 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,972 >>> mbox cmd response: success
2,772,972 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,066 UART: [afmc] ++
2,774,234 UART: [afmc] CDI.KEYID = 6
2,774,596 UART: [afmc] SUBJECT.KEYID = 7
2,775,021 UART: [afmc] AUTHORITY.KEYID = 5
2,811,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,655 UART: [afmc] --
2,854,579 UART: [cold-reset] --
2,855,421 UART: [state] Locking Datavault
2,856,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,044 UART: [state] Locking ICCM
2,857,712 UART: [exit] Launching FMC @ 0x40000130
2,863,041 UART:
2,863,057 UART: Running Caliptra FMC ...
2,863,465 UART:
2,863,608 UART: [state] CFI Enabled
2,874,373 UART: [fht] FMC Alias Private Key: 7
2,982,478 UART: [art] Extend RT PCRs Done
2,982,906 UART: [art] Lock RT PCRs Done
2,984,362 UART: [art] Populate DV Done
2,992,839 UART: [fht] FMC Alias Private Key: 7
2,993,803 UART: [art] Derive CDI
2,994,083 UART: [art] Store in in slot 0x4
3,079,690 UART: [art] Derive Key Pair
3,080,050 UART: [art] Store priv key in slot 0x5
3,093,372 UART: [art] Derive Key Pair - Done
3,107,943 UART: [art] Signing Cert with AUTHO
3,108,423 UART: RITY.KEYID = 7
3,123,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,482 UART: [art] PUB.X = D8538D324F2C81A1809CA786296DAB2331556D90B9D6FCB9ABA17645E6B7B84C38E9561546EED686A868C288A8F0F118
3,131,254 UART: [art] PUB.Y = ADCE2A77469DBAF49ED950119124FB65E4CBA149F683D6C9299D5F3C56B9B5B9DF0E54AFCAED8061B30C641D05D43E4C
3,138,215 UART: [art] SIG.R = 4621A4182B76DD429C3D104B76E511815222F2CE432241088CEA153276B505E4484320D2082274AF24FBCA11DB16E8AA
3,144,970 UART: [art] SIG.S = 061473E675BD98A7875193BC42D2164B142C4D5ED32BDB1FE997E5DB4E7FD25F462FA69D77E6361E3BAEDD211B595C41
3,168,410 UART: Caliptra RT
3,168,755 UART: [state] CFI Enabled
3,276,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,470 UART: [rt]cmd =0x4c444556, len=4
3,317,899 >>> mbox cmd response data (687 bytes)
3,317,900 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,147 UART: [rt]cmd =0x43455246, len=4
3,359,098 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 ready_for_fw is high
1,060,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,061 >>> mbox cmd response: success
2,623,061 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,709 UART:
2,684,725 UART: Running Caliptra FMC ...
2,685,133 UART:
2,685,276 UART: [state] CFI Enabled
2,696,025 UART: [fht] FMC Alias Private Key: 7
2,804,464 UART: [art] Extend RT PCRs Done
2,804,892 UART: [art] Lock RT PCRs Done
2,806,420 UART: [art] Populate DV Done
2,814,333 UART: [fht] FMC Alias Private Key: 7
2,815,277 UART: [art] Derive CDI
2,815,557 UART: [art] Store in in slot 0x4
2,901,344 UART: [art] Derive Key Pair
2,901,704 UART: [art] Store priv key in slot 0x5
2,914,950 UART: [art] Derive Key Pair - Done
2,929,639 UART: [art] Signing Cert with AUTHO
2,930,119 UART: RITY.KEYID = 7
2,945,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,472 UART: [art] PUB.X = 92216E077650624A18640EAF153A818CF0B08555B5805C9938CC4F00E35FBD1FE8A2C4E1C71A89A14874C9701042B951
2,953,208 UART: [art] PUB.Y = 71DB055C1EC8FF893F12372CDF70A34BAF1C38EB26A927EDFCC8FD4AF072E5294F9158D57A4EB6DF62F9FF3B2FA5B367
2,960,179 UART: [art] SIG.R = 934B0013D3D8C851268905E676D4346296EAD421CE8A2DDA0E2A783A256B9C91B74E7E79A73027AC1A0ECD815BEB0C46
2,966,921 UART: [art] SIG.S = 6740A7F02FE85AC8D52FD37470CD098A0A99F446FB553F1E6E038DB290B91CE7451D73B24C31607E8F58EBBF3D851E46
2,991,053 UART: Caliptra RT
2,991,398 UART: [state] CFI Enabled
3,098,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,757 UART: [rt]cmd =0x4c444556, len=4
3,139,118 >>> mbox cmd response data (687 bytes)
3,139,119 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,470 UART: [rt]cmd =0x43455246, len=4
3,180,645 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,919 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,174,205 ready_for_fw is high
1,174,205 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,214,990 UART: [ldev] Erasing FE.KEYID = 1
1,241,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,738 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,785 UART: [fwproc] Recv command 0x46574c44
1,282,518 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,387 >>> mbox cmd response: success
2,769,387 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,770,652 UART: [afmc] ++
2,770,820 UART: [afmc] CDI.KEYID = 6
2,771,183 UART: [afmc] SUBJECT.KEYID = 7
2,771,609 UART: [afmc] AUTHORITY.KEYID = 5
2,806,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,323 UART: [afmc] --
2,850,255 UART: [cold-reset] --
2,851,185 UART: [state] Locking Datavault
2,852,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,974 UART: [state] Locking ICCM
2,853,414 UART: [exit] Launching FMC @ 0x40000130
2,858,743 UART:
2,858,759 UART: Running Caliptra FMC ...
2,859,167 UART:
2,859,221 UART: [state] CFI Enabled
2,869,580 UART: [fht] FMC Alias Private Key: 7
2,977,169 UART: [art] Extend RT PCRs Done
2,977,597 UART: [art] Lock RT PCRs Done
2,979,131 UART: [art] Populate DV Done
2,987,360 UART: [fht] FMC Alias Private Key: 7
2,988,356 UART: [art] Derive CDI
2,988,636 UART: [art] Store in in slot 0x4
3,074,105 UART: [art] Derive Key Pair
3,074,465 UART: [art] Store priv key in slot 0x5
3,087,343 UART: [art] Derive Key Pair - Done
3,101,923 UART: [art] Signing Cert with AUTHO
3,102,403 UART: RITY.KEYID = 7
3,117,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,294 UART: [art] PUB.X = CF6620A3BC26DF41A63B415F739E39958275226889EC5EAA09C9D7B5810662FF56270925AC7E2416E1D04406088C815C
3,125,043 UART: [art] PUB.Y = 813C21AA877F9EED8A5E0EBFFA471AAF6F1D61BBE6877DE8EE6B9A3D70BF46851CCB3B9B64AB7937B899E66263BA7F74
3,132,014 UART: [art] SIG.R = D467307A689F34B16DDA9FC4842927785C46F21B01A1A49A6F89387D7EAAD4AD3F0F4D8D2673AC330DFB261C082BDF8A
3,138,784 UART: [art] SIG.S = 338605304E89945C900C5A198A843207BC2EB1AA40BED90DAAAA3605AA4F78042092B9837655908B8DB0CC54B9C27A06
3,162,648 UART: Caliptra RT
3,162,901 UART: [state] CFI Enabled
3,271,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,844 UART: [rt]cmd =0x4c444556, len=4
3,312,281 >>> mbox cmd response data (687 bytes)
3,312,282 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,739 UART: [rt]cmd =0x43455246, len=4
3,353,666 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,208 ready_for_fw is high
1,056,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,711 >>> mbox cmd response: success
2,618,711 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,681,409 UART:
2,681,425 UART: Running Caliptra FMC ...
2,681,833 UART:
2,681,887 UART: [state] CFI Enabled
2,692,206 UART: [fht] FMC Alias Private Key: 7
2,800,299 UART: [art] Extend RT PCRs Done
2,800,727 UART: [art] Lock RT PCRs Done
2,802,053 UART: [art] Populate DV Done
2,810,496 UART: [fht] FMC Alias Private Key: 7
2,811,508 UART: [art] Derive CDI
2,811,788 UART: [art] Store in in slot 0x4
2,896,939 UART: [art] Derive Key Pair
2,897,299 UART: [art] Store priv key in slot 0x5
2,910,279 UART: [art] Derive Key Pair - Done
2,924,861 UART: [art] Signing Cert with AUTHO
2,925,341 UART: RITY.KEYID = 7
2,940,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,568 UART: [art] PUB.X = 2F8CFFAAE51DD52137458CAF43A919974D18A2F65E154EAF8C1CF752B8A9CBE85145E778537CC6BCEFDC49BCEC59C874
2,948,360 UART: [art] PUB.Y = DF8753101CE632350F7E59CD3406E264EF739B611FDFE13A2D424D620BA50E39E2F88ECB0811A1274606083169112214
2,955,283 UART: [art] SIG.R = 86FA11CFF43A22D83914BC433762AAA51D727CF4CB744C8D898E5D42636AC824EE2AE44B8B58909D5B5161A3C551A783
2,962,059 UART: [art] SIG.S = 50A4AD4A811DAF6DA47A697C72B0830C840E83EF84F8D2A92847EDD4A5FCB67C676B3AD98D01DF3FA11ED9E416DF866C
2,985,921 UART: Caliptra RT
2,986,174 UART: [state] CFI Enabled
3,094,649 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,295 UART: [rt]cmd =0x4c444556, len=4
3,135,620 >>> mbox cmd response data (687 bytes)
3,135,621 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,990 UART: [rt]cmd =0x43455246, len=4
3,176,981 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,589 UART: [kat] SHA2-256
891,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,569 UART: [kat] LMS
1,168,881 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 ready_for_fw is high
1,174,132 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,483 UART: [ldev] ++
1,209,651 UART: [ldev] CDI.KEYID = 6
1,210,015 UART: [ldev] SUBJECT.KEYID = 5
1,210,442 UART: [ldev] AUTHORITY.KEYID = 7
1,210,905 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,798 UART: [fwproc] Recv command 0x46574c44
1,282,531 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,752 >>> mbox cmd response: success
2,769,752 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,770,871 UART: [afmc] ++
2,771,039 UART: [afmc] CDI.KEYID = 6
2,771,402 UART: [afmc] SUBJECT.KEYID = 7
2,771,828 UART: [afmc] AUTHORITY.KEYID = 5
2,807,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,750 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,362 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,081 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,856 UART: [afmc] --
2,850,834 UART: [cold-reset] --
2,851,734 UART: [state] Locking Datavault
2,853,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,665 UART: [state] Locking ICCM
2,854,273 UART: [exit] Launching FMC @ 0x40000130
2,859,602 UART:
2,859,618 UART: Running Caliptra FMC ...
2,860,026 UART:
2,860,169 UART: [state] CFI Enabled
2,870,636 UART: [fht] FMC Alias Private Key: 7
2,978,453 UART: [art] Extend RT PCRs Done
2,978,881 UART: [art] Lock RT PCRs Done
2,980,341 UART: [art] Populate DV Done
2,988,538 UART: [fht] FMC Alias Private Key: 7
2,989,520 UART: [art] Derive CDI
2,989,800 UART: [art] Store in in slot 0x4
3,075,587 UART: [art] Derive Key Pair
3,075,947 UART: [art] Store priv key in slot 0x5
3,088,965 UART: [art] Derive Key Pair - Done
3,104,003 UART: [art] Signing Cert with AUTHO
3,104,483 UART: RITY.KEYID = 7
3,119,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,074 UART: [art] PUB.X = 272CC1EDECF0E9E9E068D8B9D9914906BD8B9FAE8B0E436F709344E76C7178FE8BE11D57E4C0EA4CCD382971BE293654
3,126,852 UART: [art] PUB.Y = A884CDAD556D152D30CD04AF19CAD4E287700C1426CF8B324AD707B9C9AE289130C21F68BEB4FF2301DF28656561F516
3,133,798 UART: [art] SIG.R = 763BC1C337DD54F4817AE4858D4DDE626F86A68CAD46186AE10788E6BA96C3DA9A963258BB3AE178D2B6558AA0EBC7B0
3,140,579 UART: [art] SIG.S = E2796F60CCE13B5E8E14C48C2E2633A4D838C70A8E0C8089F8AE00C28F12E2E966F1D602D15871233B325987CD49E704
3,164,178 UART: Caliptra RT
3,164,523 UART: [state] CFI Enabled
3,271,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,442 UART: [rt]cmd =0x4c444556, len=4
3,312,679 >>> mbox cmd response data (687 bytes)
3,312,680 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,303 UART: [rt]cmd =0x43455246, len=4
3,354,416 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,717 ready_for_fw is high
1,056,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,220 >>> mbox cmd response: success
2,621,220 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,728 UART:
2,683,744 UART: Running Caliptra FMC ...
2,684,152 UART:
2,684,295 UART: [state] CFI Enabled
2,694,782 UART: [fht] FMC Alias Private Key: 7
2,802,357 UART: [art] Extend RT PCRs Done
2,802,785 UART: [art] Lock RT PCRs Done
2,804,723 UART: [art] Populate DV Done
2,812,776 UART: [fht] FMC Alias Private Key: 7
2,813,760 UART: [art] Derive CDI
2,814,040 UART: [art] Store in in slot 0x4
2,899,385 UART: [art] Derive Key Pair
2,899,745 UART: [art] Store priv key in slot 0x5
2,913,021 UART: [art] Derive Key Pair - Done
2,928,001 UART: [art] Signing Cert with AUTHO
2,928,481 UART: RITY.KEYID = 7
2,943,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,710 UART: [art] PUB.X = 45860B61EF931C8F300D98876F615687DFE242AD9BA673FCA1B2145F01F0362934DFE1D1E3311E9E46CEBE3F5DAEFD8C
2,951,485 UART: [art] PUB.Y = BE631B2FB992FBB21E98B596E82EE492647577DC021913C481848A8AF4A89633623E2F5C12D30F64294EBECA379A2244
2,958,429 UART: [art] SIG.R = 202BE74651A617FAB977DEFB8FE7D4624EBCF73E0B32D01A96AEC069AD8E3CDBB6F94EE8C96AC10CF5508A1A4ECBD558
2,965,221 UART: [art] SIG.S = 2B4049F77405F09D8A31C6D56D63907052D0A9A525DA8AC2AD82AE2CAC91E64BDED55FF9291208ABBB677D0923C45091
2,988,909 UART: Caliptra RT
2,989,254 UART: [state] CFI Enabled
3,096,855 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,399 UART: [rt]cmd =0x4c444556, len=4
3,137,890 >>> mbox cmd response data (687 bytes)
3,137,891 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,114 UART: [rt]cmd =0x43455246, len=4
3,179,109 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,296 UART:
192,668 UART: Running Caliptra ROM ...
193,769 UART:
193,914 UART: [state] CFI Enabled
264,066 UART: [state] LifecycleState = Unprovisioned
265,932 UART: [state] DebugLocked = No
268,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,483 UART: [kat] SHA2-256
442,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,677 UART: [kat] ++
453,131 UART: [kat] sha1
465,704 UART: [kat] SHA2-256
468,425 UART: [kat] SHA2-384
474,838 UART: [kat] SHA2-512-ACC
477,207 UART: [kat] ECC-384
2,768,169 UART: [kat] HMAC-384Kdf
2,799,812 UART: [kat] LMS
3,990,066 UART: [kat] --
3,995,274 UART: [cold-reset] ++
3,997,133 UART: [fht] Storing FHT @ 0x50003400
4,009,036 UART: [idev] ++
4,009,618 UART: [idev] CDI.KEYID = 6
4,010,541 UART: [idev] SUBJECT.KEYID = 7
4,011,817 UART: [idev] UDS.KEYID = 0
4,012,878 ready_for_fw is high
4,013,109 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,675 UART: [idev] Erasing UDS.KEYID = 0
7,347,390 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,111 UART: [idev] --
7,373,453 UART: [ldev] ++
7,374,078 UART: [ldev] CDI.KEYID = 6
7,374,993 UART: [ldev] SUBJECT.KEYID = 5
7,376,205 UART: [ldev] AUTHORITY.KEYID = 7
7,377,490 UART: [ldev] FE.KEYID = 1
7,422,155 UART: [ldev] Erasing FE.KEYID = 1
10,753,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,482 UART: [ldev] --
13,117,803 UART: [fwproc] Waiting for Commands...
13,121,030 UART: [fwproc] Received command 0x46574c44
13,123,213 UART: [fwproc] Received Image of size 113760 bytes
17,170,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,545 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,455 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,630,655 >>> mbox cmd response: success
17,631,153 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,635,506 UART: [afmc] ++
17,636,092 UART: [afmc] CDI.KEYID = 6
17,637,124 UART: [afmc] SUBJECT.KEYID = 7
17,638,283 UART: [afmc] AUTHORITY.KEYID = 5
21,001,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,848 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,120 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,511 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,346 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,751 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,043 UART: [afmc] --
23,376,150 UART: [cold-reset] --
23,380,117 UART: [state] Locking Datavault
23,384,605 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,316 UART: [state] Locking ICCM
23,388,121 UART: [exit] Launching FMC @ 0x40000130
23,396,508 UART:
23,396,757 UART: Running Caliptra FMC ...
23,397,859 UART:
23,398,019 UART: [state] CFI Enabled
23,466,404 UART: [fht] FMC Alias Private Key: 7
25,804,892 UART: [art] Extend RT PCRs Done
25,806,133 UART: [art] Lock RT PCRs Done
25,807,893 UART: [art] Populate DV Done
25,813,306 UART: [fht] FMC Alias Private Key: 7
25,814,841 UART: [art] Derive CDI
25,815,654 UART: [art] Store in in slot 0x4
25,875,803 UART: [art] Derive Key Pair
25,876,837 UART: [art] Store priv key in slot 0x5
29,169,404 UART: [art] Derive Key Pair - Done
29,182,184 UART: [art] Signing Cert with AUTHO
29,183,483 UART: RITY.KEYID = 7
31,471,315 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,827 UART: [art] PUB.X = CD8A333AE28952E54FB73B9759075B764532B40995D4D4E6AA724D34FD784DADC43B840E435839229EECDABD4B1CF534
31,480,076 UART: [art] PUB.Y = 10FF08D903D162D710183CDAA9CE70CEE5F9A2960FE38CECB48CF883DB047430304BAF208E2DA7303F0824742390F291
31,487,310 UART: [art] SIG.R = E1D622FD1AB6DD1EDEA83227A96A740A34E68928A26A0F55F6B678577D48B1C710288C62092D88CFD93BAB630D0782E1
31,494,704 UART: [art] SIG.S = 6E5D432B1105684142F93A53E349DC4477C7C6663F6680AD7A866387A1AF734A2826B83178DF502802E4EDF4C48EDE62
32,799,988 UART: Caliptra RT
32,800,706 UART: [state] CFI Enabled
32,962,986 UART: [rt] RT listening for mailbox commands...
32,994,440 UART: [rt]cmd =0x4c444556, len=4
33,005,497 >>> mbox cmd response data (687 bytes)
33,046,975 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,076,964 UART: [rt]cmd =0x43455246, len=4
33,089,966 >>> mbox cmd response data (920 bytes)
33,106,991 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,136,856 UART: [rt]cmd =0x43455252, len=4
33,148,196 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,032 writing to cptra_bootfsm_go
3,806,460 ready_for_fw is high
3,806,854 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,886,734 >>> mbox cmd response: success
17,887,318 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,587,460 UART:
23,587,868 UART: Running Caliptra FMC ...
23,588,967 UART:
23,589,122 UART: [state] CFI Enabled
23,653,869 UART: [fht] FMC Alias Private Key: 7
25,991,949 UART: [art] Extend RT PCRs Done
25,993,173 UART: [art] Lock RT PCRs Done
25,994,901 UART: [art] Populate DV Done
26,000,528 UART: [fht] FMC Alias Private Key: 7
26,002,059 UART: [art] Derive CDI
26,002,809 UART: [art] Store in in slot 0x4
26,061,914 UART: [art] Derive Key Pair
26,062,914 UART: [art] Store priv key in slot 0x5
29,355,161 UART: [art] Derive Key Pair - Done
29,368,370 UART: [art] Signing Cert with AUTHO
29,369,712 UART: RITY.KEYID = 7
31,656,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,039 UART: [art] PUB.X = 4C79FCD68F5A35C90B0B84EF8B313793D64251A5ECE6BBD0BAC825088EF88F1C3E238A1C5A43EC721724F374F2D653A4
31,665,299 UART: [art] PUB.Y = 6C6E4B3402A660704D49F672C7D9C5B0B340CEC2FE4A30B5585CCD40BDDDD2126DFFE87700CEFF76A98CF3D65B025D9B
31,672,592 UART: [art] SIG.R = 2F654F64522B1D3986A59924807C5F864BDF66050A36613155CF538B45A2C115ABAE818431386D3FDC214638DF8133FD
31,679,944 UART: [art] SIG.S = BCE29230625456EDA12E1CC3BC82D6DF5C91148873D4BCF80B444A84178D3CD424BD25B4934DB6D44372FCB0E35D142A
32,984,973 UART: Caliptra RT
32,985,676 UART: [state] CFI Enabled
33,146,622 UART: [rt] RT listening for mailbox commands...
33,178,167 UART: [rt]cmd =0x4c444556, len=4
33,189,309 >>> mbox cmd response data (687 bytes)
33,230,922 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,261,080 UART: [rt]cmd =0x43455246, len=4
33,274,212 >>> mbox cmd response data (920 bytes)
33,291,511 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,321,439 UART: [rt]cmd =0x43455252, len=4
33,332,782 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,568 writing to cptra_bootfsm_go
192,847 UART:
193,207 UART: Running Caliptra ROM ...
194,295 UART:
604,095 UART: [state] CFI Enabled
620,105 UART: [state] LifecycleState = Unprovisioned
622,042 UART: [state] DebugLocked = No
623,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,564 UART: [kat] SHA2-256
797,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,860 UART: [kat] ++
808,387 UART: [kat] sha1
818,978 UART: [kat] SHA2-256
821,693 UART: [kat] SHA2-384
827,678 UART: [kat] SHA2-512-ACC
830,039 UART: [kat] ECC-384
3,114,009 UART: [kat] HMAC-384Kdf
3,125,770 UART: [kat] LMS
4,315,854 UART: [kat] --
4,321,060 UART: [cold-reset] ++
4,322,999 UART: [fht] Storing FHT @ 0x50003400
4,333,265 UART: [idev] ++
4,333,824 UART: [idev] CDI.KEYID = 6
4,334,851 UART: [idev] SUBJECT.KEYID = 7
4,336,027 UART: [idev] UDS.KEYID = 0
4,337,125 ready_for_fw is high
4,337,357 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,309 UART: [idev] Erasing UDS.KEYID = 0
7,620,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,104 UART: [idev] --
7,645,994 UART: [ldev] ++
7,646,578 UART: [ldev] CDI.KEYID = 6
7,647,511 UART: [ldev] SUBJECT.KEYID = 5
7,648,740 UART: [ldev] AUTHORITY.KEYID = 7
7,649,966 UART: [ldev] FE.KEYID = 1
7,661,284 UART: [ldev] Erasing FE.KEYID = 1
10,950,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,484 UART: [ldev] --
13,307,660 UART: [fwproc] Waiting for Commands...
13,310,903 UART: [fwproc] Received command 0x46574c44
13,313,145 UART: [fwproc] Received Image of size 113760 bytes
17,361,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,261 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,526 >>> mbox cmd response: success
17,818,066 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,821,821 UART: [afmc] ++
17,822,420 UART: [afmc] CDI.KEYID = 6
17,823,332 UART: [afmc] SUBJECT.KEYID = 7
17,824,605 UART: [afmc] AUTHORITY.KEYID = 5
21,140,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,433,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,435,419 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,449,815 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,464,636 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,479,126 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,501,618 UART: [afmc] --
23,505,533 UART: [cold-reset] --
23,508,800 UART: [state] Locking Datavault
23,514,582 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,335 UART: [state] Locking ICCM
23,518,822 UART: [exit] Launching FMC @ 0x40000130
23,527,220 UART:
23,527,458 UART: Running Caliptra FMC ...
23,528,557 UART:
23,528,716 UART: [state] CFI Enabled
23,536,635 UART: [fht] FMC Alias Private Key: 7
25,866,804 UART: [art] Extend RT PCRs Done
25,868,024 UART: [art] Lock RT PCRs Done
25,869,753 UART: [art] Populate DV Done
25,875,307 UART: [fht] FMC Alias Private Key: 7
25,876,832 UART: [art] Derive CDI
25,877,566 UART: [art] Store in in slot 0x4
25,920,421 UART: [art] Derive Key Pair
25,921,415 UART: [art] Store priv key in slot 0x5
29,163,259 UART: [art] Derive Key Pair - Done
29,176,262 UART: [art] Signing Cert with AUTHO
29,177,588 UART: RITY.KEYID = 7
31,456,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,127 UART: [art] PUB.X = 96D1D15F70BAA94A3AE7A1660040EF57FD46967662FD201D1AE1EA12B6CAED646B4C2C956219522D16BAC2139C4BC8B2
31,465,396 UART: [art] PUB.Y = D81F83C1D27D10F83B9A9C1F8C8CE4CC6F4A659CA4BAAC265B9D5A04D9B408AD19F90D4FB82C7B1B139C2BD420072FB2
31,472,677 UART: [art] SIG.R = DFDF8C679E94FD215E59D52803970B64CCA6EC6394ECA56C8B27283D546142BD2370366AC4DB7B9EFA5A86D13495736B
31,480,050 UART: [art] SIG.S = A45305016C05B7A2CFEE5130B65B358E12B42F3CED8CCF453EDFBA61E56BE4B6A472AC66A0B80F3572BCFFFA638828BD
32,785,708 UART: Caliptra RT
32,786,420 UART: [state] CFI Enabled
32,903,969 UART: [rt] RT listening for mailbox commands...
32,935,470 UART: [rt]cmd =0x4c444556, len=4
32,946,368 >>> mbox cmd response data (687 bytes)
32,987,636 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,017,685 UART: [rt]cmd =0x43455246, len=4
33,030,523 >>> mbox cmd response data (920 bytes)
33,047,683 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,077,668 UART: [rt]cmd =0x43455252, len=4
33,088,883 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
4,127,394 ready_for_fw is high
4,127,789 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,058,315 >>> mbox cmd response: success
18,058,874 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,701,848 UART:
23,702,225 UART: Running Caliptra FMC ...
23,703,353 UART:
23,703,506 UART: [state] CFI Enabled
23,711,764 UART: [fht] FMC Alias Private Key: 7
26,042,044 UART: [art] Extend RT PCRs Done
26,043,282 UART: [art] Lock RT PCRs Done
26,044,975 UART: [art] Populate DV Done
26,050,444 UART: [fht] FMC Alias Private Key: 7
26,051,986 UART: [art] Derive CDI
26,052,803 UART: [art] Store in in slot 0x4
26,095,093 UART: [art] Derive Key Pair
26,096,097 UART: [art] Store priv key in slot 0x5
29,338,221 UART: [art] Derive Key Pair - Done
29,350,943 UART: [art] Signing Cert with AUTHO
29,352,252 UART: RITY.KEYID = 7
31,632,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,522 UART: [art] PUB.X = 79DDCC276CF1BB639AB9F1372A368DBBCB249A9A9C60E5022F4DD2DDFB82A6B8C406FF66F7169DFD203160780CE9F7DE
31,640,805 UART: [art] PUB.Y = 4BA3EEDE16D1EF533792C8EBB02EF427ADAA9123F10A0FFEF426AB86ED2D214DE23F4E9568A18170D04AFB7D172380FC
31,648,062 UART: [art] SIG.R = BBFBCE14DF96CE753E84742490C95EB79F4467B6BE451EAB0923014419A737CA5C0E8D49A16C17348A6DAFC367F732F5
31,655,448 UART: [art] SIG.S = 315E3C5D0E00EB504A2B27560056D97714A467A62B8083AD942FFDE2D5D77CCB3768B75F226AE43696C1A442DAEC7837
32,960,610 UART: Caliptra RT
32,961,324 UART: [state] CFI Enabled
33,079,431 UART: [rt] RT listening for mailbox commands...
33,110,634 UART: [rt]cmd =0x4c444556, len=4
33,121,824 >>> mbox cmd response data (687 bytes)
33,162,960 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,192,825 UART: [rt]cmd =0x43455246, len=4
33,205,630 >>> mbox cmd response data (920 bytes)
33,222,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,252,716 UART: [rt]cmd =0x43455252, len=4
33,264,081 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
192,634 UART:
192,998 UART: Running Caliptra ROM ...
194,188 UART:
194,347 UART: [state] CFI Enabled
260,911 UART: [state] LifecycleState = Unprovisioned
262,830 UART: [state] DebugLocked = No
264,716 UART: [state] WD Timer not started. Device not locked for debugging
268,040 UART: [kat] SHA2-256
447,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,712 UART: [kat] ++
459,242 UART: [kat] sha1
471,288 UART: [kat] SHA2-256
474,337 UART: [kat] SHA2-384
480,683 UART: [kat] SHA2-512-ACC
483,616 UART: [kat] ECC-384
2,949,859 UART: [kat] HMAC-384Kdf
2,971,758 UART: [kat] LMS
3,501,190 UART: [kat] --
3,506,785 UART: [cold-reset] ++
3,509,357 UART: [fht] FHT @ 0x50003400
3,520,265 UART: [idev] ++
3,520,828 UART: [idev] CDI.KEYID = 6
3,521,728 UART: [idev] SUBJECT.KEYID = 7
3,522,964 UART: [idev] UDS.KEYID = 0
3,523,902 ready_for_fw is high
3,524,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,584 UART: [idev] Erasing UDS.KEYID = 0
6,029,157 UART: [idev] Sha1 KeyId Algorithm
6,053,140 UART: [idev] --
6,055,845 UART: [ldev] ++
6,056,412 UART: [ldev] CDI.KEYID = 6
6,057,352 UART: [ldev] SUBJECT.KEYID = 5
6,058,427 UART: [ldev] AUTHORITY.KEYID = 7
6,059,761 UART: [ldev] FE.KEYID = 1
6,101,828 UART: [ldev] Erasing FE.KEYID = 1
8,610,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,019 UART: [ldev] --
10,417,507 UART: [fwproc] Wait for Commands...
10,419,432 UART: [fwproc] Recv command 0x46574c44
10,421,519 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,111 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,164 >>> mbox cmd response: success
14,280,688 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,285,028 UART: [afmc] ++
14,285,620 UART: [afmc] CDI.KEYID = 6
14,286,534 UART: [afmc] SUBJECT.KEYID = 7
14,287,689 UART: [afmc] AUTHORITY.KEYID = 5
16,813,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,768 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,989 UART: [afmc] --
18,609,415 UART: [cold-reset] --
18,611,436 UART: [state] Locking Datavault
18,616,516 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,157 UART: [state] Locking ICCM
18,620,356 UART: [exit] Launching FMC @ 0x40000130
18,628,796 UART:
18,629,040 UART: Running Caliptra FMC ...
18,630,142 UART:
18,630,300 UART: [state] CFI Enabled
18,692,741 UART: [fht] FMC Alias Private Key: 7
20,456,338 UART: [art] Extend RT PCRs Done
20,457,562 UART: [art] Lock RT PCRs Done
20,459,095 UART: [art] Populate DV Done
20,464,403 UART: [fht] FMC Alias Private Key: 7
20,466,143 UART: [art] Derive CDI
20,466,967 UART: [art] Store in in slot 0x4
20,525,222 UART: [art] Derive Key Pair
20,526,223 UART: [art] Store priv key in slot 0x5
22,989,517 UART: [art] Derive Key Pair - Done
23,002,695 UART: [art] Signing Cert with AUTHO
23,004,000 UART: RITY.KEYID = 7
24,714,574 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,080 UART: [art] PUB.X = 7B2F842C81FE5BDF1F7434F39481CB5D5147B4E5FCAD4549786A48811AA6F795BFF1C63381050B96C85F4A765062D47F
24,723,366 UART: [art] PUB.Y = 42AB65FF81DF17F61188AD0AAE8CAACFBD33C2D4DEC988F40AEF69610391B69358EF6D0C4D9A806FF4DCC2AEF45F3603
24,730,624 UART: [art] SIG.R = C1E1BC0C9E0F73DF36469B7098F1F76CA38E1948F651362348C5FB5F22E36ED9666BE7E83528597F9724322079A4A4C6
24,738,008 UART: [art] SIG.S = C3272CEF8934A3629724CAC509228DB1AF7213445FA7AF3A1EC4298F694247DFE8D633ECC3D8CD45ECC623E71CF67C80
25,716,982 UART: Caliptra RT
25,717,678 UART: [state] CFI Enabled
25,882,581 UART: [rt] RT listening for mailbox commands...
25,914,195 UART: [rt]cmd =0x4c444556, len=4
25,925,470 >>> mbox cmd response data (687 bytes)
25,966,625 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,996,638 UART: [rt]cmd =0x43455246, len=4
26,009,429 >>> mbox cmd response data (887 bytes)
26,026,079 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,055,937 UART: [rt]cmd =0x43455252, len=4
26,067,166 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,375,459 ready_for_fw is high
3,376,037 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,777 >>> mbox cmd response: success
14,064,409 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,360,917 UART:
18,361,310 UART: Running Caliptra FMC ...
18,362,513 UART:
18,362,696 UART: [state] CFI Enabled
18,425,187 UART: [fht] FMC Alias Private Key: 7
20,189,349 UART: [art] Extend RT PCRs Done
20,190,566 UART: [art] Lock RT PCRs Done
20,192,351 UART: [art] Populate DV Done
20,197,697 UART: [fht] FMC Alias Private Key: 7
20,199,244 UART: [art] Derive CDI
20,200,007 UART: [art] Store in in slot 0x4
20,257,900 UART: [art] Derive Key Pair
20,258,947 UART: [art] Store priv key in slot 0x5
22,722,077 UART: [art] Derive Key Pair - Done
22,735,179 UART: [art] Signing Cert with AUTHO
22,736,517 UART: RITY.KEYID = 7
24,447,912 UART: [art] Erasing AUTHORITY.KEYID = 7
24,449,406 UART: [art] PUB.X = F3BC03D2CD2943266F3F52EE2255006B7030FFAB7BCBCCAA7CEA9B15A2AD8A7BBF645114B80C002DB4C9B0C597D6CCBB
24,456,688 UART: [art] PUB.Y = B666D9EC57CC3A3512EF650DE0EC211C2CE4CCDEC57A4DB7DCB43368377FB5FDE39A44816EFE03E0C15AB7FB7996078F
24,463,990 UART: [art] SIG.R = EAC58DCA9E9F4F0BB567F0FB5B9D042AD698EC97BA407854BC98F929715679799698C333A6AA49DF29CBA1F10077C64D
24,471,368 UART: [art] SIG.S = E30BB5770523BCC557F07C998C49A683273171A1CCC6A81ACC177110BE344660F1150936261F35366A8B03AA69F8BD0C
25,450,155 UART: Caliptra RT
25,450,854 UART: [state] CFI Enabled
25,616,338 UART: [rt] RT listening for mailbox commands...
25,647,774 UART: [rt]cmd =0x4c444556, len=4
25,658,974 >>> mbox cmd response data (687 bytes)
25,699,969 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,729,950 UART: [rt]cmd =0x43455246, len=4
25,742,542 >>> mbox cmd response data (887 bytes)
25,759,312 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,789,400 UART: [rt]cmd =0x43455252, len=4
25,800,711 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
192,987 UART:
193,373 UART: Running Caliptra ROM ...
194,569 UART:
604,291 UART: [state] CFI Enabled
618,095 UART: [state] LifecycleState = Unprovisioned
619,977 UART: [state] DebugLocked = No
622,355 UART: [state] WD Timer not started. Device not locked for debugging
625,393 UART: [kat] SHA2-256
804,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,073 UART: [kat] ++
816,610 UART: [kat] sha1
827,489 UART: [kat] SHA2-256
830,560 UART: [kat] SHA2-384
837,186 UART: [kat] SHA2-512-ACC
840,123 UART: [kat] ECC-384
3,280,219 UART: [kat] HMAC-384Kdf
3,291,472 UART: [kat] LMS
3,821,013 UART: [kat] --
3,825,345 UART: [cold-reset] ++
3,826,857 UART: [fht] FHT @ 0x50003400
3,838,001 UART: [idev] ++
3,838,620 UART: [idev] CDI.KEYID = 6
3,839,541 UART: [idev] SUBJECT.KEYID = 7
3,840,646 UART: [idev] UDS.KEYID = 0
3,841,663 ready_for_fw is high
3,841,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,050 UART: [idev] Erasing UDS.KEYID = 0
6,312,335 UART: [idev] Sha1 KeyId Algorithm
6,334,704 UART: [idev] --
6,338,435 UART: [ldev] ++
6,339,006 UART: [ldev] CDI.KEYID = 6
6,339,919 UART: [ldev] SUBJECT.KEYID = 5
6,341,135 UART: [ldev] AUTHORITY.KEYID = 7
6,342,370 UART: [ldev] FE.KEYID = 1
6,355,498 UART: [ldev] Erasing FE.KEYID = 1
8,830,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,688 UART: [ldev] --
10,621,846 UART: [fwproc] Wait for Commands...
10,625,027 UART: [fwproc] Recv command 0x46574c44
10,627,126 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,854 >>> mbox cmd response: success
14,492,369 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,495,265 UART: [afmc] ++
14,495,844 UART: [afmc] CDI.KEYID = 6
14,496,726 UART: [afmc] SUBJECT.KEYID = 7
14,497,939 UART: [afmc] AUTHORITY.KEYID = 5
16,991,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,652 UART: [afmc] --
18,788,654 UART: [cold-reset] --
18,793,708 UART: [state] Locking Datavault
18,798,614 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,318 UART: [state] Locking ICCM
18,802,764 UART: [exit] Launching FMC @ 0x40000130
18,811,220 UART:
18,811,459 UART: Running Caliptra FMC ...
18,812,565 UART:
18,812,725 UART: [state] CFI Enabled
18,820,934 UART: [fht] FMC Alias Private Key: 7
20,578,078 UART: [art] Extend RT PCRs Done
20,579,295 UART: [art] Lock RT PCRs Done
20,581,125 UART: [art] Populate DV Done
20,586,480 UART: [fht] FMC Alias Private Key: 7
20,587,974 UART: [art] Derive CDI
20,588,708 UART: [art] Store in in slot 0x4
20,631,561 UART: [art] Derive Key Pair
20,632,596 UART: [art] Store priv key in slot 0x5
23,059,433 UART: [art] Derive Key Pair - Done
23,072,380 UART: [art] Signing Cert with AUTHO
23,073,686 UART: RITY.KEYID = 7
24,779,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,516 UART: [art] PUB.X = 82567FCC0F37890A704D00491CE2C96DD7D375CBEBC780C50C08DADD106C948A2647A6D85718B4C0043A60F53D10F7E7
24,787,735 UART: [art] PUB.Y = 2794DE6B4B9D0B2F66E2D3A61EC3253DF3D8C9E8780FD1DFD6A79EB3B6F3F37D6E6557F423A5CF2EC2C7622AFE0EF9A8
24,795,017 UART: [art] SIG.R = 6DD43E1D0BB24459F11C7F3F628E33D30A89E53A3F532143706AE82259007D3E613BAE8039B9D8A46F8A53B2BB95F830
24,802,401 UART: [art] SIG.S = 3B537C6979196FE0F513BDA7D9C31DBDA031B385C31FBB01F5936F2BF99F69128E8100ED36DBEE4AFFE93B9F65447772
25,780,761 UART: Caliptra RT
25,781,458 UART: [state] CFI Enabled
25,898,327 UART: [rt] RT listening for mailbox commands...
25,929,709 UART: [rt]cmd =0x4c444556, len=4
25,940,785 >>> mbox cmd response data (687 bytes)
25,981,944 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,011,883 UART: [rt]cmd =0x43455246, len=4
26,024,610 >>> mbox cmd response data (887 bytes)
26,041,338 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,071,217 UART: [rt]cmd =0x43455252, len=4
26,082,534 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,901 writing to cptra_bootfsm_go
3,695,603 ready_for_fw is high
3,696,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,377 >>> mbox cmd response: success
14,269,998 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,520,352 UART:
18,520,741 UART: Running Caliptra FMC ...
18,521,956 UART:
18,522,127 UART: [state] CFI Enabled
18,529,650 UART: [fht] FMC Alias Private Key: 7
20,286,719 UART: [art] Extend RT PCRs Done
20,288,081 UART: [art] Lock RT PCRs Done
20,289,821 UART: [art] Populate DV Done
20,295,561 UART: [fht] FMC Alias Private Key: 7
20,297,157 UART: [art] Derive CDI
20,297,976 UART: [art] Store in in slot 0x4
20,341,006 UART: [art] Derive Key Pair
20,342,019 UART: [art] Store priv key in slot 0x5
22,768,698 UART: [art] Derive Key Pair - Done
22,781,725 UART: [art] Signing Cert with AUTHO
22,783,038 UART: RITY.KEYID = 7
24,488,330 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,845 UART: [art] PUB.X = 5CFACD1E2D530C27C7FC3B2DFB698A0F0C4E1880B562A37C7F0837C36B0864698680E4BC8D2130C353FEC18DECF5936C
24,497,118 UART: [art] PUB.Y = 2A815A3C5C6B2A6332C625098AF8AFFC347854BBBAACA7D6555BCB3AC2F9C338DFEBB0A9D7AFDA8BCF3308DF536773CF
24,504,402 UART: [art] SIG.R = 2EB7C2D87DC7A57DB8D57D24D95697B4F53EE2AC772ADC71A486E89B93D5E78CB970CCDD11C5805DC7819E946137050D
24,511,781 UART: [art] SIG.S = 07546CD6165D9DCEEBC3C29ADAC55557BFD7C80D78E40153AB747F65451EF096899B5E42EDC79CC5F6AAF8B97BF14A10
25,490,584 UART: Caliptra RT
25,491,288 UART: [state] CFI Enabled
25,607,646 UART: [rt] RT listening for mailbox commands...
25,638,843 UART: [rt]cmd =0x4c444556, len=4
25,649,817 >>> mbox cmd response data (687 bytes)
25,690,410 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,720,123 UART: [rt]cmd =0x43455246, len=4
25,732,863 >>> mbox cmd response data (887 bytes)
25,749,683 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,779,445 UART: [rt]cmd =0x43455252, len=4
25,790,836 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,410 UART:
192,779 UART: Running Caliptra ROM ...
193,988 UART:
194,143 UART: [state] CFI Enabled
264,035 UART: [state] LifecycleState = Unprovisioned
266,406 UART: [state] DebugLocked = No
268,651 UART: [state] WD Timer not started. Device not locked for debugging
272,481 UART: [kat] SHA2-256
462,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,126 UART: [kat] ++
473,603 UART: [kat] sha1
484,907 UART: [kat] SHA2-256
487,986 UART: [kat] SHA2-384
493,760 UART: [kat] SHA2-512-ACC
496,329 UART: [kat] ECC-384
2,950,122 UART: [kat] HMAC-384Kdf
2,972,164 UART: [kat] LMS
3,503,933 UART: [kat] --
3,506,810 UART: [cold-reset] ++
3,508,882 UART: [fht] FHT @ 0x50003400
3,520,996 UART: [idev] ++
3,521,702 UART: [idev] CDI.KEYID = 6
3,522,695 UART: [idev] SUBJECT.KEYID = 7
3,523,864 UART: [idev] UDS.KEYID = 0
3,524,786 ready_for_fw is high
3,524,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,465 UART: [idev] Erasing UDS.KEYID = 0
6,026,814 UART: [idev] Sha1 KeyId Algorithm
6,050,861 UART: [idev] --
6,055,667 UART: [ldev] ++
6,056,365 UART: [ldev] CDI.KEYID = 6
6,057,253 UART: [ldev] SUBJECT.KEYID = 5
6,058,468 UART: [ldev] AUTHORITY.KEYID = 7
6,059,604 UART: [ldev] FE.KEYID = 1
6,100,777 UART: [ldev] Erasing FE.KEYID = 1
8,607,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,827 UART: [ldev] --
10,413,461 UART: [fwproc] Wait for Commands...
10,414,953 UART: [fwproc] Recv command 0x46574c44
10,417,322 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,740 >>> mbox cmd response: success
14,591,257 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,594,678 UART: [afmc] ++
14,595,377 UART: [afmc] CDI.KEYID = 6
14,596,622 UART: [afmc] SUBJECT.KEYID = 7
14,598,066 UART: [afmc] AUTHORITY.KEYID = 5
17,131,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,242 UART: [afmc] --
18,949,261 UART: [cold-reset] --
18,953,077 UART: [state] Locking Datavault
18,956,847 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,014 UART: [state] Locking ICCM
18,961,753 UART: [exit] Launching FMC @ 0x40000130
18,970,452 UART:
18,970,685 UART: Running Caliptra FMC ...
18,971,785 UART:
18,971,942 UART: [state] CFI Enabled
19,031,688 UART: [fht] FMC Alias Private Key: 7
20,795,447 UART: [art] Extend RT PCRs Done
20,796,672 UART: [art] Lock RT PCRs Done
20,798,141 UART: [art] Populate DV Done
20,803,388 UART: [fht] FMC Alias Private Key: 7
20,804,869 UART: [art] Derive CDI
20,805,628 UART: [art] Store in in slot 0x4
20,864,318 UART: [art] Derive Key Pair
20,865,361 UART: [art] Store priv key in slot 0x5
23,329,181 UART: [art] Derive Key Pair - Done
23,341,915 UART: [art] Signing Cert with AUTHO
23,343,222 UART: RITY.KEYID = 7
25,054,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,336 UART: [art] PUB.X = 023398D0AF245D480B6EA5E796858CDC1AA8CB2EE32A2D5F7B4F68CD7E3652641A6B718FDDCBD9D0E6E1EDFC783F27FF
25,063,489 UART: [art] PUB.Y = B93B9589C0BBE3E3BD46327EEACC90FBE92A29C6722CC0DA50B29B259E1E58CBD54257D850395857AE091483381349B1
25,070,790 UART: [art] SIG.R = 645FC1EBA64A0F6E5326D192DD52C2D6EF0875E76BD8C58C6532EFD077A2F1EA5EFD49FA266058575A862BC3797295E8
25,078,168 UART: [art] SIG.S = 48154154BE0773F0BBE3F04D1631D97A72E7A83678C6186F1027DDACA3EE8600FB19FB31AB6497C1B7F0E2E2F077E631
26,057,006 UART: Caliptra RT
26,057,724 UART: [state] CFI Enabled
26,223,359 UART: [rt] RT listening for mailbox commands...
26,254,772 UART: [rt]cmd =0x4c444556, len=4
26,265,992 >>> mbox cmd response data (687 bytes)
26,307,047 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,337,144 UART: [rt]cmd =0x43455246, len=4
26,349,875 >>> mbox cmd response data (887 bytes)
26,366,363 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,396,339 UART: [rt]cmd =0x43455252, len=4
26,407,776 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,437,510 ready_for_fw is high
3,438,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,738,237 >>> mbox cmd response: success
14,738,928 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,024,402 UART:
19,024,788 UART: Running Caliptra FMC ...
19,025,917 UART:
19,026,077 UART: [state] CFI Enabled
19,093,342 UART: [fht] FMC Alias Private Key: 7
20,857,489 UART: [art] Extend RT PCRs Done
20,858,718 UART: [art] Lock RT PCRs Done
20,860,174 UART: [art] Populate DV Done
20,865,856 UART: [fht] FMC Alias Private Key: 7
20,867,392 UART: [art] Derive CDI
20,868,150 UART: [art] Store in in slot 0x4
20,926,143 UART: [art] Derive Key Pair
20,927,185 UART: [art] Store priv key in slot 0x5
23,390,442 UART: [art] Derive Key Pair - Done
23,403,918 UART: [art] Signing Cert with AUTHO
23,405,264 UART: RITY.KEYID = 7
25,116,355 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,865 UART: [art] PUB.X = 580FB12A397CD7CB2968CD90E6E748B37FAF6B875434E3DF9C0ED554F4777FD7DF346C45992069C6BFD67ADF9D454F08
25,125,094 UART: [art] PUB.Y = AA2EF8B6A87C096AD809A7169FB62741699F1C1F9B32646FDB767C57432DB5F6E3657A01D8FF82CFE9222CD8B302FD21
25,132,364 UART: [art] SIG.R = 2D7908CEB54891795B27D439E8A833CF32A71946C681B8B8F0EA00B2027EFEF2E225F64AFA31E5D402A3184C9E9AC6E1
25,139,739 UART: [art] SIG.S = D68B06568C02DDAACEE221888B83C548BD4B85C6B1A86ECAA63B5F5C9D87C00578E887C2C9D96DC556FDAA620C1F5328
26,118,360 UART: Caliptra RT
26,119,055 UART: [state] CFI Enabled
26,285,485 UART: [rt] RT listening for mailbox commands...
26,316,874 UART: [rt]cmd =0x4c444556, len=4
26,327,831 >>> mbox cmd response data (687 bytes)
26,369,100 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,399,288 UART: [rt]cmd =0x43455246, len=4
26,412,083 >>> mbox cmd response data (887 bytes)
26,428,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,458,903 UART: [rt]cmd =0x43455252, len=4
26,470,320 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
192,885 UART:
193,256 UART: Running Caliptra ROM ...
194,375 UART:
604,138 UART: [state] CFI Enabled
617,843 UART: [state] LifecycleState = Unprovisioned
620,201 UART: [state] DebugLocked = No
622,663 UART: [state] WD Timer not started. Device not locked for debugging
626,426 UART: [kat] SHA2-256
816,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,111 UART: [kat] ++
827,634 UART: [kat] sha1
839,001 UART: [kat] SHA2-256
841,951 UART: [kat] SHA2-384
847,823 UART: [kat] SHA2-512-ACC
850,439 UART: [kat] ECC-384
3,291,914 UART: [kat] HMAC-384Kdf
3,305,284 UART: [kat] LMS
3,837,081 UART: [kat] --
3,840,528 UART: [cold-reset] ++
3,842,186 UART: [fht] FHT @ 0x50003400
3,852,886 UART: [idev] ++
3,853,625 UART: [idev] CDI.KEYID = 6
3,854,553 UART: [idev] SUBJECT.KEYID = 7
3,855,733 UART: [idev] UDS.KEYID = 0
3,856,658 ready_for_fw is high
3,856,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,149 UART: [idev] Erasing UDS.KEYID = 0
6,330,867 UART: [idev] Sha1 KeyId Algorithm
6,354,482 UART: [idev] --
6,358,321 UART: [ldev] ++
6,359,005 UART: [ldev] CDI.KEYID = 6
6,359,921 UART: [ldev] SUBJECT.KEYID = 5
6,361,084 UART: [ldev] AUTHORITY.KEYID = 7
6,362,319 UART: [ldev] FE.KEYID = 1
6,374,215 UART: [ldev] Erasing FE.KEYID = 1
8,850,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,398 UART: [ldev] --
10,642,480 UART: [fwproc] Wait for Commands...
10,644,360 UART: [fwproc] Recv command 0x46574c44
10,646,671 UART: [fwproc] Recv'd Img size: 114084 bytes
14,086,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,278,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,819,415 >>> mbox cmd response: success
14,819,917 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,822,954 UART: [afmc] ++
14,823,654 UART: [afmc] CDI.KEYID = 6
14,824,851 UART: [afmc] SUBJECT.KEYID = 7
14,826,296 UART: [afmc] AUTHORITY.KEYID = 5
17,328,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,050,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,052,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,067,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,082,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,097,680 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,121,021 UART: [afmc] --
19,124,683 UART: [cold-reset] --
19,127,422 UART: [state] Locking Datavault
19,132,410 UART: [state] Locking PCR0, PCR1 and PCR31
19,134,619 UART: [state] Locking ICCM
19,137,208 UART: [exit] Launching FMC @ 0x40000130
19,145,891 UART:
19,146,131 UART: Running Caliptra FMC ...
19,147,235 UART:
19,147,396 UART: [state] CFI Enabled
19,155,379 UART: [fht] FMC Alias Private Key: 7
20,912,022 UART: [art] Extend RT PCRs Done
20,913,242 UART: [art] Lock RT PCRs Done
20,914,821 UART: [art] Populate DV Done
20,920,455 UART: [fht] FMC Alias Private Key: 7
20,921,995 UART: [art] Derive CDI
20,922,812 UART: [art] Store in in slot 0x4
20,965,357 UART: [art] Derive Key Pair
20,966,401 UART: [art] Store priv key in slot 0x5
23,392,931 UART: [art] Derive Key Pair - Done
23,405,925 UART: [art] Signing Cert with AUTHO
23,407,231 UART: RITY.KEYID = 7
25,112,589 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,106 UART: [art] PUB.X = 0470160E11E8BA9FAC61752D91A8CC0AB30266BAB250E0B49D806CD518110C83FCEAD2A218360A034F6740DAA5373045
25,121,391 UART: [art] PUB.Y = DF479719B4500E21D9ADDA4660BED7EF17C01CFACC9094FFC75D735ED74E4CA7C3DB3095AAB0FE4D7FC10FF89E6305C2
25,128,657 UART: [art] SIG.R = 70B800E1E1F8720FDE7FDD286293BC0F923790730AD1664A0A6217CC8DCAEB355699795EF28E6E0825922E1A18682613
25,136,043 UART: [art] SIG.S = 1453DD056ED78B6E1C6363C75E62455FE5E83FBE5549B597F80A9C58E38DBD6AEF4D24CA2614D667C011C55CA8A8339A
26,115,218 UART: Caliptra RT
26,115,918 UART: [state] CFI Enabled
26,232,838 UART: [rt] RT listening for mailbox commands...
26,264,204 UART: [rt]cmd =0x4c444556, len=4
26,275,341 >>> mbox cmd response data (687 bytes)
26,316,717 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,346,601 UART: [rt]cmd =0x43455246, len=4
26,359,408 >>> mbox cmd response data (887 bytes)
26,377,352 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,407,505 UART: [rt]cmd =0x43455252, len=4
26,418,843 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,668 writing to cptra_bootfsm_go
3,760,589 ready_for_fw is high
3,760,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,956,425 >>> mbox cmd response: success
14,957,058 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,205,468 UART:
19,205,862 UART: Running Caliptra FMC ...
19,206,992 UART:
19,207,152 UART: [state] CFI Enabled
19,215,280 UART: [fht] FMC Alias Private Key: 7
20,972,949 UART: [art] Extend RT PCRs Done
20,974,177 UART: [art] Lock RT PCRs Done
20,976,020 UART: [art] Populate DV Done
20,981,352 UART: [fht] FMC Alias Private Key: 7
20,983,000 UART: [art] Derive CDI
20,983,824 UART: [art] Store in in slot 0x4
21,026,375 UART: [art] Derive Key Pair
21,027,381 UART: [art] Store priv key in slot 0x5
23,453,747 UART: [art] Derive Key Pair - Done
23,466,581 UART: [art] Signing Cert with AUTHO
23,467,883 UART: RITY.KEYID = 7
25,173,261 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,770 UART: [art] PUB.X = 8ADA6620491CF038D89E2A15ACE4BBAFC696AF68AC940F4C76F2A9F8C769D4FD900EBBDE27014C015B711EEA3C2CCE02
25,182,060 UART: [art] PUB.Y = 39CEDE017416F8E7D3610D5CF596DE50D6353B43FAFE13FAB19DE3E909081AF05492DFFD80589DDD88039AAC96E38643
25,189,352 UART: [art] SIG.R = F283A0A43EAA395EFBC3D9702229A8AE91E474DB45A48855543F43674A58CC1C5F34A362D4876ADCCF235EA0BF5E6D12
25,196,743 UART: [art] SIG.S = 6FCD8BAE912FAA11AA59A900BA39018B1F384185EB9F7423C7CEBEEAB13C46FB0941C8396F0DF9BC1060EE78F79BEA58
26,175,724 UART: Caliptra RT
26,176,413 UART: [state] CFI Enabled
26,293,206 UART: [rt] RT listening for mailbox commands...
26,324,737 UART: [rt]cmd =0x4c444556, len=4
26,335,934 >>> mbox cmd response data (687 bytes)
26,376,929 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,407,164 UART: [rt]cmd =0x43455246, len=4
26,419,867 >>> mbox cmd response data (887 bytes)
26,436,723 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,466,697 UART: [rt]cmd =0x43455252, len=4
26,478,037 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,494 UART: [kat] LMS
1,475,690 UART: [kat] --
1,476,669 UART: [cold-reset] ++
1,477,109 UART: [fht] Storing FHT @ 0x50003400
1,479,998 UART: [idev] ++
1,480,166 UART: [idev] CDI.KEYID = 6
1,480,526 UART: [idev] SUBJECT.KEYID = 7
1,480,950 UART: [idev] UDS.KEYID = 0
1,481,295 ready_for_fw is high
1,481,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,900 UART: [idev] Erasing UDS.KEYID = 0
1,506,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,772 UART: [idev] --
1,515,849 UART: [ldev] ++
1,516,017 UART: [ldev] CDI.KEYID = 6
1,516,380 UART: [ldev] SUBJECT.KEYID = 5
1,516,806 UART: [ldev] AUTHORITY.KEYID = 7
1,517,269 UART: [ldev] FE.KEYID = 1
1,522,313 UART: [ldev] Erasing FE.KEYID = 1
1,548,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,106 UART: [ldev] --
1,587,607 UART: [fwproc] Waiting for Commands...
1,588,396 UART: [fwproc] Received command 0x46574c44
1,589,187 UART: [fwproc] Received Image of size 114084 bytes
2,883,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,822 >>> mbox cmd response: success
3,075,822 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,076,880 UART: [afmc] ++
3,077,048 UART: [afmc] CDI.KEYID = 6
3,077,410 UART: [afmc] SUBJECT.KEYID = 7
3,077,835 UART: [afmc] AUTHORITY.KEYID = 5
3,113,280 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,700 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,093 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,783 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,558 UART: [afmc] --
3,156,614 UART: [cold-reset] --
3,157,504 UART: [state] Locking Datavault
3,158,809 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,413 UART: [state] Locking ICCM
3,159,927 UART: [exit] Launching FMC @ 0x40000130
3,165,256 UART:
3,165,272 UART: Running Caliptra FMC ...
3,165,680 UART:
3,165,734 UART: [state] CFI Enabled
3,176,179 UART: [fht] FMC Alias Private Key: 7
3,284,380 UART: [art] Extend RT PCRs Done
3,284,808 UART: [art] Lock RT PCRs Done
3,286,320 UART: [art] Populate DV Done
3,294,593 UART: [fht] FMC Alias Private Key: 7
3,295,743 UART: [art] Derive CDI
3,296,023 UART: [art] Store in in slot 0x4
3,381,684 UART: [art] Derive Key Pair
3,382,044 UART: [art] Store priv key in slot 0x5
3,395,218 UART: [art] Derive Key Pair - Done
3,409,671 UART: [art] Signing Cert with AUTHO
3,410,151 UART: RITY.KEYID = 7
3,424,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,720 UART: [art] PUB.X = B83979FCBD8E6824D50AABD28482E8069874C4125C1075F2B83B92C83638FBDE13ACEF05385558D9E3F166F28616DA71
3,432,483 UART: [art] PUB.Y = 9D78A85B60D0B3C065CD40BCEFA874AC6316CDC88E444D255969BEA893258243C39785E813228A505F84F2C22DAEEA83
3,439,439 UART: [art] SIG.R = 26CDF299D07DC1A59AF06E411620B1C998E0D09CF3BECB6530AC4EF67340368D7B72C716A685F5541293542DF2094A01
3,446,205 UART: [art] SIG.S = 1C5AF953BAC1CAA6EF44E641A898004110754E214E1635DB998B5278F702238AAB62F885341176E03915FDAE4856C95B
3,470,619 UART: Caliptra RT
3,470,872 UART: [state] CFI Enabled
3,579,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,694 UART: [rt]cmd =0x4c444556, len=4
3,620,323 >>> mbox cmd response data (687 bytes)
3,620,324 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,635 UART: [rt]cmd =0x43455246, len=4
3,661,946 >>> mbox cmd response data (920 bytes)
3,661,947 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,250 UART: [rt]cmd =0x43455252, len=4
3,702,124 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,211 ready_for_fw is high
1,362,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,550 >>> mbox cmd response: success
2,924,550 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,985,532 UART:
2,985,548 UART: Running Caliptra FMC ...
2,985,956 UART:
2,986,010 UART: [state] CFI Enabled
2,996,635 UART: [fht] FMC Alias Private Key: 7
3,105,174 UART: [art] Extend RT PCRs Done
3,105,602 UART: [art] Lock RT PCRs Done
3,107,284 UART: [art] Populate DV Done
3,115,407 UART: [fht] FMC Alias Private Key: 7
3,116,521 UART: [art] Derive CDI
3,116,801 UART: [art] Store in in slot 0x4
3,202,406 UART: [art] Derive Key Pair
3,202,766 UART: [art] Store priv key in slot 0x5
3,216,472 UART: [art] Derive Key Pair - Done
3,231,264 UART: [art] Signing Cert with AUTHO
3,231,744 UART: RITY.KEYID = 7
3,247,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,811 UART: [art] PUB.X = DCD178022E85075A469C36F99FD152186592709BF0E4A94288380EB3ADFFD307057DCA2416E054701B7693681C570169
3,254,553 UART: [art] PUB.Y = FC5C3E7CD713C3CA1700BD3ADB98164607CFAA451566922708C5A57C5E3808593C4EE088613B52AE02A407E6480B97BE
3,261,467 UART: [art] SIG.R = 04B3F9BB44847A1A0AA739CEF2FC6C10BA72024878934C9418515DFD4893A640024388F9C789D74DE280F66F20A2315F
3,268,223 UART: [art] SIG.S = F5D00213D6E66A2C1E56491DBD80CEBA010931F5006962047FDB4E4AA75EE0EBCE6BF033C21893D1034B7D9B6742FAA0
3,292,337 UART: Caliptra RT
3,292,590 UART: [state] CFI Enabled
3,400,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,627 UART: [rt]cmd =0x4c444556, len=4
3,441,098 >>> mbox cmd response data (687 bytes)
3,441,099 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,256 UART: [rt]cmd =0x43455246, len=4
3,482,689 >>> mbox cmd response data (920 bytes)
3,482,690 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,987 UART: [rt]cmd =0x43455252, len=4
3,522,931 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,713 UART: [kat] LMS
1,475,909 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 ready_for_fw is high
1,481,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,505,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,547,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,288 UART: [fwproc] Waiting for Commands...
1,586,955 UART: [fwproc] Received command 0x46574c44
1,587,746 UART: [fwproc] Received Image of size 114084 bytes
2,883,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,982 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,885 >>> mbox cmd response: success
3,074,885 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,075,909 UART: [afmc] ++
3,076,077 UART: [afmc] CDI.KEYID = 6
3,076,439 UART: [afmc] SUBJECT.KEYID = 7
3,076,864 UART: [afmc] AUTHORITY.KEYID = 5
3,111,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,058 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,748 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,585 UART: [afmc] --
3,154,585 UART: [cold-reset] --
3,155,297 UART: [state] Locking Datavault
3,156,468 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,072 UART: [state] Locking ICCM
3,157,516 UART: [exit] Launching FMC @ 0x40000130
3,162,845 UART:
3,162,861 UART: Running Caliptra FMC ...
3,163,269 UART:
3,163,412 UART: [state] CFI Enabled
3,174,173 UART: [fht] FMC Alias Private Key: 7
3,282,498 UART: [art] Extend RT PCRs Done
3,282,926 UART: [art] Lock RT PCRs Done
3,284,372 UART: [art] Populate DV Done
3,292,579 UART: [fht] FMC Alias Private Key: 7
3,293,605 UART: [art] Derive CDI
3,293,885 UART: [art] Store in in slot 0x4
3,379,726 UART: [art] Derive Key Pair
3,380,086 UART: [art] Store priv key in slot 0x5
3,393,618 UART: [art] Derive Key Pair - Done
3,408,378 UART: [art] Signing Cert with AUTHO
3,408,858 UART: RITY.KEYID = 7
3,424,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,885 UART: [art] PUB.X = D80EFF8EB7DA64B0DAA818270EF9673D9BF2A1806EDFD32490BE10BAE4DF129967EFA93F4EE56B59420EF2C64D451AC9
3,431,668 UART: [art] PUB.Y = F35798415FBD7C7761ECFA1482EBBE980C8A21ACF3925C01C9E3B07F3856999EC0A0EA857E63096C0342C5412B3B2A2A
3,438,614 UART: [art] SIG.R = 7355467436C30963D05567F68F683AE66E0F0EAEF13E2724AD9E52EC600BFF514BC4E943510FDCCBD11D52BEB137621C
3,445,377 UART: [art] SIG.S = 12D93C54B3462EF4CEE4496F564F288691F67DA8E733186371A59E91991BAEB958206B6A2551E9AA5151F4D177516E64
3,469,646 UART: Caliptra RT
3,469,991 UART: [state] CFI Enabled
3,578,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,967 UART: [rt]cmd =0x4c444556, len=4
3,619,490 >>> mbox cmd response data (687 bytes)
3,619,491 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,906 UART: [rt]cmd =0x43455246, len=4
3,661,143 >>> mbox cmd response data (920 bytes)
3,661,144 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,297 UART: [rt]cmd =0x43455252, len=4
3,701,243 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,614 ready_for_fw is high
1,362,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,699 >>> mbox cmd response: success
2,924,699 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,985,777 UART:
2,985,793 UART: Running Caliptra FMC ...
2,986,201 UART:
2,986,344 UART: [state] CFI Enabled
2,997,115 UART: [fht] FMC Alias Private Key: 7
3,104,952 UART: [art] Extend RT PCRs Done
3,105,380 UART: [art] Lock RT PCRs Done
3,107,164 UART: [art] Populate DV Done
3,115,323 UART: [fht] FMC Alias Private Key: 7
3,116,333 UART: [art] Derive CDI
3,116,613 UART: [art] Store in in slot 0x4
3,202,404 UART: [art] Derive Key Pair
3,202,764 UART: [art] Store priv key in slot 0x5
3,216,042 UART: [art] Derive Key Pair - Done
3,230,792 UART: [art] Signing Cert with AUTHO
3,231,272 UART: RITY.KEYID = 7
3,246,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,881 UART: [art] PUB.X = 7EC20989673267994EAD230D406927F487707CC0742BEFE98441A4F348A51034056F2FDBC8A2EA1DA034B329FFF4731C
3,253,642 UART: [art] PUB.Y = B46FCA279C78A3D15C545131ABD1DE796677734AD09BC2D0563AD17B7618F897EED936AEAAAEF267CC022606A1E56ADE
3,260,602 UART: [art] SIG.R = 19203E30AE66CA545D3607F9A7179DA0DEFC972E57CA176BBA099B35957BA96CC43535D2EC76EFE4714EFD16DD7BD0D5
3,267,382 UART: [art] SIG.S = 5E876AE5CF39B0DD69F72922163ABB2B61CA19846C9971EF2D24F7941ABFBF30B52FB991ECA82B5C707D19E82B6955AF
3,291,631 UART: Caliptra RT
3,291,976 UART: [state] CFI Enabled
3,400,386 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,646 UART: [rt]cmd =0x4c444556, len=4
3,441,087 >>> mbox cmd response data (687 bytes)
3,441,088 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,471 UART: [rt]cmd =0x43455246, len=4
3,482,672 >>> mbox cmd response data (920 bytes)
3,482,673 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,912 UART: [rt]cmd =0x43455252, len=4
3,522,712 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
918,018 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,239 UART: [fht] FHT @ 0x50003400
1,174,782 UART: [idev] ++
1,174,950 UART: [idev] CDI.KEYID = 6
1,175,310 UART: [idev] SUBJECT.KEYID = 7
1,175,734 UART: [idev] UDS.KEYID = 0
1,176,079 ready_for_fw is high
1,176,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,755 UART: [idev] Sha1 KeyId Algorithm
1,209,233 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,614 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,216,971 UART: [ldev] Erasing FE.KEYID = 1
1,242,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,772 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,840 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,187 >>> mbox cmd response: success
2,769,187 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,770,327 UART: [afmc] ++
2,770,495 UART: [afmc] CDI.KEYID = 6
2,770,857 UART: [afmc] SUBJECT.KEYID = 7
2,771,282 UART: [afmc] AUTHORITY.KEYID = 5
2,806,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,626 UART: [afmc] --
2,850,660 UART: [cold-reset] --
2,851,610 UART: [state] Locking Datavault
2,852,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,457 UART: [state] Locking ICCM
2,854,131 UART: [exit] Launching FMC @ 0x40000130
2,859,460 UART:
2,859,476 UART: Running Caliptra FMC ...
2,859,884 UART:
2,859,938 UART: [state] CFI Enabled
2,870,165 UART: [fht] FMC Alias Private Key: 7
2,977,758 UART: [art] Extend RT PCRs Done
2,978,186 UART: [art] Lock RT PCRs Done
2,979,762 UART: [art] Populate DV Done
2,987,869 UART: [fht] FMC Alias Private Key: 7
2,988,989 UART: [art] Derive CDI
2,989,269 UART: [art] Store in in slot 0x4
3,074,852 UART: [art] Derive Key Pair
3,075,212 UART: [art] Store priv key in slot 0x5
3,087,972 UART: [art] Derive Key Pair - Done
3,102,511 UART: [art] Signing Cert with AUTHO
3,102,991 UART: RITY.KEYID = 7
3,118,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,176 UART: [art] PUB.X = 4A241B751FAC03ED6F1D16F6052AAA8F03BB0CB0FBBF8C0F36A9A8D44DDD8F83102C8B4651463D1BFD296301D46AA71E
3,125,948 UART: [art] PUB.Y = 3AA6F0A02266932CB9486C13F45A9B3477E646900220FB3B97B5395C443EB69057E1F156FC075C7E90B24A92C6BB13FF
3,132,892 UART: [art] SIG.R = 4279DAB9A033CA4A88433D21665937A643894FC93CDC252DCA23D4B169567C8119AFB63D8B317DA640A9051D77314A82
3,139,657 UART: [art] SIG.S = 1AA02C54A055CD66245547117D1D852D98EA66762025338D67313E6D378119EBF3F6D1D88530255793DF6E3FD3C55295
3,163,640 UART: Caliptra RT
3,163,893 UART: [state] CFI Enabled
3,271,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,948 UART: [rt]cmd =0x4c444556, len=4
3,312,379 >>> mbox cmd response data (687 bytes)
3,312,380 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,463 UART: [rt]cmd =0x43455246, len=4
3,353,588 >>> mbox cmd response data (887 bytes)
3,353,589 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,118 UART: [rt]cmd =0x43455252, len=4
3,393,884 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 ready_for_fw is high
1,059,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,086 >>> mbox cmd response: success
2,621,086 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,682,580 UART:
2,682,596 UART: Running Caliptra FMC ...
2,683,004 UART:
2,683,058 UART: [state] CFI Enabled
2,693,695 UART: [fht] FMC Alias Private Key: 7
2,801,600 UART: [art] Extend RT PCRs Done
2,802,028 UART: [art] Lock RT PCRs Done
2,803,556 UART: [art] Populate DV Done
2,811,689 UART: [fht] FMC Alias Private Key: 7
2,812,869 UART: [art] Derive CDI
2,813,149 UART: [art] Store in in slot 0x4
2,899,044 UART: [art] Derive Key Pair
2,899,404 UART: [art] Store priv key in slot 0x5
2,913,164 UART: [art] Derive Key Pair - Done
2,927,978 UART: [art] Signing Cert with AUTHO
2,928,458 UART: RITY.KEYID = 7
2,943,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,389 UART: [art] PUB.X = 756DD560AB33BD943FE32BD3D5A691A139F6AD9A2C70227BDBB7DB86A6CE7BF82D2601C21BA03D1EE6CC0C1DE77D4AAF
2,951,181 UART: [art] PUB.Y = B21CB214F465F089F0168F73BFD0C198C63A3D472192B6F19D113B9E232F2A6688002517222DF54E049359A252402944
2,958,094 UART: [art] SIG.R = 48430197CCA0BE198CE82304557C71D61DD6FFF113278354F26156DD61A1F24C481B8317F5EF7B52557E13BCD88A4D60
2,964,858 UART: [art] SIG.S = 46A4A56BB8E8D64BE9CE3C6ECC7FBDA8655B7B74B9BA1DD5B60D1F588307C77D05200E51F96704DC74C58976A1655789
2,989,072 UART: Caliptra RT
2,989,325 UART: [state] CFI Enabled
3,096,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,928 UART: [rt]cmd =0x4c444556, len=4
3,137,487 >>> mbox cmd response data (687 bytes)
3,137,488 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,005 UART: [rt]cmd =0x43455246, len=4
3,179,138 >>> mbox cmd response data (887 bytes)
3,179,139 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,354 UART: [rt]cmd =0x43455252, len=4
3,219,068 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
901,840 UART: [kat] SHA2-256
903,780 UART: [kat] SHA2-384
906,709 UART: [kat] SHA2-512-ACC
908,610 UART: [kat] ECC-384
918,177 UART: [kat] HMAC-384Kdf
922,821 UART: [kat] LMS
1,171,149 UART: [kat] --
1,171,944 UART: [cold-reset] ++
1,172,372 UART: [fht] FHT @ 0x50003400
1,174,945 UART: [idev] ++
1,175,113 UART: [idev] CDI.KEYID = 6
1,175,473 UART: [idev] SUBJECT.KEYID = 7
1,175,897 UART: [idev] UDS.KEYID = 0
1,176,242 ready_for_fw is high
1,176,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,461 UART: [idev] Erasing UDS.KEYID = 0
1,200,506 UART: [idev] Sha1 KeyId Algorithm
1,209,052 UART: [idev] --
1,210,222 UART: [ldev] ++
1,210,390 UART: [ldev] CDI.KEYID = 6
1,210,753 UART: [ldev] SUBJECT.KEYID = 5
1,211,179 UART: [ldev] AUTHORITY.KEYID = 7
1,211,642 UART: [ldev] FE.KEYID = 1
1,216,980 UART: [ldev] Erasing FE.KEYID = 1
1,243,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,858 UART: [ldev] --
1,283,151 UART: [fwproc] Wait for Commands...
1,283,823 UART: [fwproc] Recv command 0x46574c44
1,284,551 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,574 >>> mbox cmd response: success
2,771,574 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,750 UART: [afmc] ++
2,772,918 UART: [afmc] CDI.KEYID = 6
2,773,280 UART: [afmc] SUBJECT.KEYID = 7
2,773,705 UART: [afmc] AUTHORITY.KEYID = 5
2,809,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,337 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,950 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,669 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,479 UART: [afmc] --
2,853,411 UART: [cold-reset] --
2,854,279 UART: [state] Locking Datavault
2,855,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,024 UART: [state] Locking ICCM
2,856,596 UART: [exit] Launching FMC @ 0x40000130
2,861,925 UART:
2,861,941 UART: Running Caliptra FMC ...
2,862,349 UART:
2,862,492 UART: [state] CFI Enabled
2,873,033 UART: [fht] FMC Alias Private Key: 7
2,980,718 UART: [art] Extend RT PCRs Done
2,981,146 UART: [art] Lock RT PCRs Done
2,982,508 UART: [art] Populate DV Done
2,990,681 UART: [fht] FMC Alias Private Key: 7
2,991,705 UART: [art] Derive CDI
2,991,985 UART: [art] Store in in slot 0x4
3,077,578 UART: [art] Derive Key Pair
3,077,938 UART: [art] Store priv key in slot 0x5
3,091,638 UART: [art] Derive Key Pair - Done
3,106,374 UART: [art] Signing Cert with AUTHO
3,106,854 UART: RITY.KEYID = 7
3,121,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,393 UART: [art] PUB.X = 3750681379AE7B1726DA46D88C4E7C2613D0D189A76497DA0B2D2BB7C6600EFBB2C0F8C34C589555D9920E76F40C3E72
3,129,153 UART: [art] PUB.Y = CB4B1C9FD442D70FC011ED7934B7E798732BCB9B840D8528A6BC21736FA2AC8E1D19370D356E023D52215B810C8E425F
3,136,094 UART: [art] SIG.R = 4314851456C3377BA3426101691F7AF32F9B197C3FC797130E07790825ACA7CBF92695C37479EC5FE66FE4996936CF09
3,142,841 UART: [art] SIG.S = 896C012E3FAE55C300048BA9EE851C51D2D048C665D203BC96977E3DFCBD269DC4753FA3583417683CF47F3DDDF37148
3,166,969 UART: Caliptra RT
3,167,314 UART: [state] CFI Enabled
3,276,063 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,329 UART: [rt]cmd =0x4c444556, len=4
3,316,802 >>> mbox cmd response data (687 bytes)
3,316,803 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,074 UART: [rt]cmd =0x43455246, len=4
3,358,165 >>> mbox cmd response data (887 bytes)
3,358,166 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,711 UART: [rt]cmd =0x43455252, len=4
3,398,481 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,480 ready_for_fw is high
1,061,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,941 >>> mbox cmd response: success
2,624,941 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,305 UART:
2,686,321 UART: Running Caliptra FMC ...
2,686,729 UART:
2,686,872 UART: [state] CFI Enabled
2,697,099 UART: [fht] FMC Alias Private Key: 7
2,805,198 UART: [art] Extend RT PCRs Done
2,805,626 UART: [art] Lock RT PCRs Done
2,807,152 UART: [art] Populate DV Done
2,815,531 UART: [fht] FMC Alias Private Key: 7
2,816,531 UART: [art] Derive CDI
2,816,811 UART: [art] Store in in slot 0x4
2,903,030 UART: [art] Derive Key Pair
2,903,390 UART: [art] Store priv key in slot 0x5
2,916,188 UART: [art] Derive Key Pair - Done
2,930,685 UART: [art] Signing Cert with AUTHO
2,931,165 UART: RITY.KEYID = 7
2,946,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,162 UART: [art] PUB.X = 6692100BFA8C0639D9D189B35A9E4675D814C0C3A6658D96A2074D9CE8AFD76A51FB61F6F58B715B7FC89BB01FC08BF0
2,953,933 UART: [art] PUB.Y = CAC5BF98473415A11CB7783F72C9ACD7B176C6BA34F9D90184341C8D04728A4E5390CC973B2B28F75CBB66765D2B65BC
2,960,885 UART: [art] SIG.R = 22C7F4210E4300BD6CF0CA176C4DBFCAD421EBD6443F6B15661B36C1D55292D96E20F1EA50A6B0D21FB736708DA90108
2,967,634 UART: [art] SIG.S = FD51126895027D474AF6855DBF828DF12ECA0273D76B43443C0A0868B84E55471EECC5E9228F13F92D8D8286E6C7CF46
2,991,235 UART: Caliptra RT
2,991,580 UART: [state] CFI Enabled
3,098,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,565 UART: [rt]cmd =0x4c444556, len=4
3,139,962 >>> mbox cmd response data (687 bytes)
3,139,963 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,392 UART: [rt]cmd =0x43455246, len=4
3,181,661 >>> mbox cmd response data (887 bytes)
3,181,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,211,193 UART: [rt]cmd =0x43455252, len=4
3,222,091 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
891,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,207,781 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,208 UART: [ldev] --
1,281,600 UART: [fwproc] Wait for Commands...
1,282,195 UART: [fwproc] Recv command 0x46574c44
1,282,928 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,567 >>> mbox cmd response: success
2,770,567 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,771,722 UART: [afmc] ++
2,771,890 UART: [afmc] CDI.KEYID = 6
2,772,253 UART: [afmc] SUBJECT.KEYID = 7
2,772,679 UART: [afmc] AUTHORITY.KEYID = 5
2,808,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,477 UART: [afmc] --
2,851,607 UART: [cold-reset] --
2,852,561 UART: [state] Locking Datavault
2,854,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,640 UART: [state] Locking ICCM
2,855,218 UART: [exit] Launching FMC @ 0x40000130
2,860,547 UART:
2,860,563 UART: Running Caliptra FMC ...
2,860,971 UART:
2,861,025 UART: [state] CFI Enabled
2,871,450 UART: [fht] FMC Alias Private Key: 7
2,979,239 UART: [art] Extend RT PCRs Done
2,979,667 UART: [art] Lock RT PCRs Done
2,981,263 UART: [art] Populate DV Done
2,989,376 UART: [fht] FMC Alias Private Key: 7
2,990,466 UART: [art] Derive CDI
2,990,746 UART: [art] Store in in slot 0x4
3,076,543 UART: [art] Derive Key Pair
3,076,903 UART: [art] Store priv key in slot 0x5
3,090,213 UART: [art] Derive Key Pair - Done
3,104,975 UART: [art] Signing Cert with AUTHO
3,105,455 UART: RITY.KEYID = 7
3,120,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,342 UART: [art] PUB.X = 38C7D89E18B7AA79AA643F4A2C519356867EF78CABC331601D360F5DFA4ECFA61667C08C904AA8C35DCE27AF9144009B
3,128,099 UART: [art] PUB.Y = 6E108714AA6783EDB1B3F0D31A50AD8EB55838ABFF328CF92D4CB43B68AFD601689733086008918A617B11E76EDBBEA7
3,135,050 UART: [art] SIG.R = 1F28CF63EDF1360767496B32E326A3D0AB31BAC9B7B28B6ADFBCB2736165A2FBA73343E3CDC2BDFBA63AD2CD63573D03
3,141,836 UART: [art] SIG.S = 10E0F37DDC20B2391A440B65DB09B77E6976E2E482CADC3D3CB943E31E1317B4BC5F93035CBD9853AFDB340A26553955
3,166,359 UART: Caliptra RT
3,166,612 UART: [state] CFI Enabled
3,274,285 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,485 UART: [rt]cmd =0x4c444556, len=4
3,314,830 >>> mbox cmd response data (687 bytes)
3,314,831 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,452 UART: [rt]cmd =0x43455246, len=4
3,356,597 >>> mbox cmd response data (887 bytes)
3,356,598 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,987 UART: [rt]cmd =0x43455252, len=4
3,396,797 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,620 ready_for_fw is high
1,055,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,835 >>> mbox cmd response: success
2,618,835 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,680,265 UART:
2,680,281 UART: Running Caliptra FMC ...
2,680,689 UART:
2,680,743 UART: [state] CFI Enabled
2,691,538 UART: [fht] FMC Alias Private Key: 7
2,799,697 UART: [art] Extend RT PCRs Done
2,800,125 UART: [art] Lock RT PCRs Done
2,801,561 UART: [art] Populate DV Done
2,809,472 UART: [fht] FMC Alias Private Key: 7
2,810,642 UART: [art] Derive CDI
2,810,922 UART: [art] Store in in slot 0x4
2,896,305 UART: [art] Derive Key Pair
2,896,665 UART: [art] Store priv key in slot 0x5
2,909,873 UART: [art] Derive Key Pair - Done
2,924,690 UART: [art] Signing Cert with AUTHO
2,925,170 UART: RITY.KEYID = 7
2,940,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,159 UART: [art] PUB.X = 3C05C8D3C4C100918DB2C02ECA91E7C1BB439ACA76A0373DC150E44025F6DD2BE8E52861989A55507F1E8B923A8D8E30
2,947,912 UART: [art] PUB.Y = 38D37857DE341F315B7A9906A1617B96C12E78DC38A43C104E0AD73BDB778D95782DA0A06BB2C477939A08BC75A4F9A3
2,954,857 UART: [art] SIG.R = E57035A43E64A3B56C781344B3CC2C731694963F81A2E7A75D3A7D73114801830D1990DA1F9A388F02B0A7F67A4159EA
2,961,614 UART: [art] SIG.S = A621DE0B000FBAACD029FC8F35F4E7D8B3C51BCD4F88A6F77C1E8FE45E46D0117CFA7D02896324B7CFDAB543AA1F04C8
2,985,203 UART: Caliptra RT
2,985,456 UART: [state] CFI Enabled
3,093,632 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,088 UART: [rt]cmd =0x4c444556, len=4
3,134,565 >>> mbox cmd response data (687 bytes)
3,134,566 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,879 UART: [rt]cmd =0x43455246, len=4
3,175,918 >>> mbox cmd response data (887 bytes)
3,175,919 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,205,166 UART: [rt]cmd =0x43455252, len=4
3,215,853 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,174,546 ready_for_fw is high
1,174,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,454 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,533 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,072 >>> mbox cmd response: success
2,771,072 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,207 UART: [afmc] ++
2,772,375 UART: [afmc] CDI.KEYID = 6
2,772,738 UART: [afmc] SUBJECT.KEYID = 7
2,773,164 UART: [afmc] AUTHORITY.KEYID = 5
2,808,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,302 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,914 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,633 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,492 UART: [afmc] --
2,851,474 UART: [cold-reset] --
2,852,548 UART: [state] Locking Datavault
2,853,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,363 UART: [state] Locking ICCM
2,854,923 UART: [exit] Launching FMC @ 0x40000130
2,860,252 UART:
2,860,268 UART: Running Caliptra FMC ...
2,860,676 UART:
2,860,819 UART: [state] CFI Enabled
2,871,720 UART: [fht] FMC Alias Private Key: 7
2,980,249 UART: [art] Extend RT PCRs Done
2,980,677 UART: [art] Lock RT PCRs Done
2,982,201 UART: [art] Populate DV Done
2,990,446 UART: [fht] FMC Alias Private Key: 7
2,991,576 UART: [art] Derive CDI
2,991,856 UART: [art] Store in in slot 0x4
3,077,559 UART: [art] Derive Key Pair
3,077,919 UART: [art] Store priv key in slot 0x5
3,091,041 UART: [art] Derive Key Pair - Done
3,105,917 UART: [art] Signing Cert with AUTHO
3,106,397 UART: RITY.KEYID = 7
3,121,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,576 UART: [art] PUB.X = 57DD4E96FA8C16186D0907C7891EDD377312214E609A128A3C9C415131D2FDB655DC3EF7375A062304E14AF2E24EF8C6
3,129,336 UART: [art] PUB.Y = F50A8D6B7DAE5A846B7BFC4679B929A3E2AB1F334ED9010F74076AC185F20F6337DD888757AF7B093E4089FFF83F0F5B
3,136,277 UART: [art] SIG.R = 15E7F54BA8959A2F74D502F3F29C11933B4704B1E3217694A261C8911E8A81F2857A018E455C21D01B178FD5CFF88FA1
3,143,036 UART: [art] SIG.S = 029DBA917F1B648CA7BAD214B5F234D017039ED272AC892FFFB94BF2DD9AFE723FF6D1FC824A6218522ADCC523B741EA
3,166,959 UART: Caliptra RT
3,167,304 UART: [state] CFI Enabled
3,275,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,275 UART: [rt]cmd =0x4c444556, len=4
3,316,598 >>> mbox cmd response data (687 bytes)
3,316,599 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,026 UART: [rt]cmd =0x43455246, len=4
3,358,245 >>> mbox cmd response data (887 bytes)
3,358,246 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,513 UART: [rt]cmd =0x43455252, len=4
3,398,305 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,545 ready_for_fw is high
1,056,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,442 >>> mbox cmd response: success
2,619,442 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,681,872 UART:
2,681,888 UART: Running Caliptra FMC ...
2,682,296 UART:
2,682,439 UART: [state] CFI Enabled
2,693,128 UART: [fht] FMC Alias Private Key: 7
2,800,975 UART: [art] Extend RT PCRs Done
2,801,403 UART: [art] Lock RT PCRs Done
2,803,079 UART: [art] Populate DV Done
2,811,296 UART: [fht] FMC Alias Private Key: 7
2,812,392 UART: [art] Derive CDI
2,812,672 UART: [art] Store in in slot 0x4
2,898,241 UART: [art] Derive Key Pair
2,898,601 UART: [art] Store priv key in slot 0x5
2,911,845 UART: [art] Derive Key Pair - Done
2,926,489 UART: [art] Signing Cert with AUTHO
2,926,969 UART: RITY.KEYID = 7
2,941,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,626 UART: [art] PUB.X = B6D44A80704530EC56BE7A0EC210D0C1FF4652F501180479C704AFA3699B7DC1930108E6419949C1261BB8CA54C6FC0F
2,949,377 UART: [art] PUB.Y = C07723EBBA4CAE7F9C7DA0AC488CE5E086FD964809A90B4D407B7E9D4C4B9390B2968FAEFDAA87D5BA0F2994AF8A7567
2,956,340 UART: [art] SIG.R = F44E42DFEBCB54F6167A8D27F52EA771E07D4A147E2EFE63E844C41E44961917B5F9371F3099166C55A95717939E3E45
2,963,110 UART: [art] SIG.S = BE70BE7856EE80A8F7F0C02FE69C58CF12CCE983F0FDE0C25EDF639141AAB48EA9EC6DCC449A49CAF4924DC13AC85365
2,986,613 UART: Caliptra RT
2,986,958 UART: [state] CFI Enabled
3,094,612 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,820 UART: [rt]cmd =0x4c444556, len=4
3,135,331 >>> mbox cmd response data (687 bytes)
3,135,332 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,555 UART: [rt]cmd =0x43455246, len=4
3,176,590 >>> mbox cmd response data (887 bytes)
3,176,591 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,206,054 UART: [rt]cmd =0x43455252, len=4
3,216,781 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,167 UART:
192,543 UART: Running Caliptra ROM ...
193,638 UART:
193,783 UART: [state] CFI Enabled
260,329 UART: [state] LifecycleState = Unprovisioned
262,251 UART: [state] DebugLocked = No
264,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,500 UART: [kat] SHA2-256
439,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,725 UART: [kat] ++
450,174 UART: [kat] sha1
461,937 UART: [kat] SHA2-256
464,649 UART: [kat] SHA2-384
471,076 UART: [kat] SHA2-512-ACC
473,450 UART: [kat] ECC-384
2,765,594 UART: [kat] HMAC-384Kdf
2,798,548 UART: [kat] LMS
3,988,852 UART: [kat] --
3,995,212 UART: [cold-reset] ++
3,997,434 UART: [fht] Storing FHT @ 0x50003400
4,009,129 UART: [idev] ++
4,009,703 UART: [idev] CDI.KEYID = 6
4,010,591 UART: [idev] SUBJECT.KEYID = 7
4,011,907 UART: [idev] UDS.KEYID = 0
4,012,870 ready_for_fw is high
4,013,065 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,148 UART: [idev] Erasing UDS.KEYID = 0
7,347,708 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,684 UART: [idev] --
7,373,493 UART: [ldev] ++
7,374,063 UART: [ldev] CDI.KEYID = 6
7,375,047 UART: [ldev] SUBJECT.KEYID = 5
7,376,281 UART: [ldev] AUTHORITY.KEYID = 7
7,377,517 UART: [ldev] FE.KEYID = 1
7,419,902 UART: [ldev] Erasing FE.KEYID = 1
10,754,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,363 UART: [ldev] --
13,132,551 UART: [fwproc] Waiting for Commands...
13,135,616 UART: [fwproc] Received command 0x46574c44
13,137,796 UART: [fwproc] Received Image of size 113760 bytes
17,191,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,658,943 >>> mbox cmd response: success
18,122,978 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,124,015 UART: [afmc] ++
18,124,572 UART: [afmc] CDI.KEYID = 6
18,125,491 UART: [afmc] SUBJECT.KEYID = 7
18,126,622 UART: [afmc] AUTHORITY.KEYID = 5
21,022,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,007 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,406 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,251 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,653 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,041 UART: [afmc] --
23,398,077 UART: [cold-reset] --
23,401,244 UART: [state] Locking Datavault
23,406,274 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,029 UART: [state] Locking ICCM
23,409,970 UART: [exit] Launching FMC @ 0x40000130
23,418,362 UART:
23,418,619 UART: Running Caliptra FMC ...
23,419,947 UART:
23,420,122 UART: [state] CFI Enabled
23,485,527 UART: [fht] FMC Alias Private Key: 7
25,823,434 UART: [art] Extend RT PCRs Done
25,824,650 UART: [art] Lock RT PCRs Done
25,826,110 UART: [art] Populate DV Done
25,831,520 UART: [fht] FMC Alias Private Key: 7
25,833,273 UART: [art] Derive CDI
25,834,085 UART: [art] Store in in slot 0x4
25,892,991 UART: [art] Derive Key Pair
25,893,996 UART: [art] Store priv key in slot 0x5
29,186,834 UART: [art] Derive Key Pair - Done
29,200,049 UART: [art] Signing Cert with AUTHO
29,201,359 UART: RITY.KEYID = 7
31,487,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,360 UART: [art] PUB.X = 9316E94FAA2DEC3D95F1BFF092410CEA860F4283D2AD188F228D940E93A0D806CEC57334BEA409D98FA68FBBA9AA8BD0
31,496,604 UART: [art] PUB.Y = 6E27EDCED1889BB25B6CED006582825BA28BB219F1276AC27EB7B7B6515BB350E1A1E153A4C6BE4C8FF9808585B5BA18
31,503,866 UART: [art] SIG.R = 789B94FBA3307F61B24C01BD5BF0FE11F20CBF26D9BD15A3822911703E90C7AF0B5C233054D8D65CE52378A516F79765
31,511,267 UART: [art] SIG.S = 6862BAC57698B1E63BA136817BBCD222AA1E952C53EDCA089A15B0D0B38B4CB6646A5980D3EB10509355419DF35DD5F4
32,816,659 UART: Caliptra RT
32,817,377 UART: [state] CFI Enabled
32,975,990 UART: [rt] RT listening for mailbox commands...
33,009,838 UART: [rt]cmd =0x49444543, len=327
33,019,003 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,782,547 ready_for_fw is high
3,783,192 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,818,576 >>> mbox cmd response: success
18,281,766 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,503,941 UART:
23,504,367 UART: Running Caliptra FMC ...
23,505,472 UART:
23,505,634 UART: [state] CFI Enabled
23,570,014 UART: [fht] FMC Alias Private Key: 7
25,908,394 UART: [art] Extend RT PCRs Done
25,909,617 UART: [art] Lock RT PCRs Done
25,911,189 UART: [art] Populate DV Done
25,916,633 UART: [fht] FMC Alias Private Key: 7
25,918,183 UART: [art] Derive CDI
25,918,951 UART: [art] Store in in slot 0x4
25,978,522 UART: [art] Derive Key Pair
25,979,589 UART: [art] Store priv key in slot 0x5
29,271,831 UART: [art] Derive Key Pair - Done
29,284,822 UART: [art] Signing Cert with AUTHO
29,286,124 UART: RITY.KEYID = 7
31,572,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,574,302 UART: [art] PUB.X = B03CE9AB166BDE21D95FF2C15BED1A4ACA4CF0A7DFF53B3D73E07014554ABFC06B756FB81303E2E6B62114593BBD2A25
31,581,559 UART: [art] PUB.Y = 0D36C3BD40CB2503F258838AC17680193AD435EA2B3B167CCE58A6223AEBCAF1FCFDF6A0311B9392E51EAECED3169D6C
31,588,819 UART: [art] SIG.R = A0BE730E14651A5299D72DB38ED57D3788E45586680617B5B3018CE9A1A210D1FF8AAAFC4E3FAE6CD486E4A9F3601B0A
31,596,223 UART: [art] SIG.S = BB035CA8287B3C2ACC8649562EDA573EA110160ED3965D56741E4D7C065BF19E1B94179A80B4803E141EDABC0E576958
32,901,577 UART: Caliptra RT
32,902,295 UART: [state] CFI Enabled
33,063,891 UART: [rt] RT listening for mailbox commands...
33,097,854 UART: [rt]cmd =0x49444543, len=327
33,106,799 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
192,870 UART:
193,234 UART: Running Caliptra ROM ...
194,420 UART:
603,901 UART: [state] CFI Enabled
617,526 UART: [state] LifecycleState = Unprovisioned
619,539 UART: [state] DebugLocked = No
620,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,565 UART: [kat] SHA2-256
796,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,826 UART: [kat] ++
807,268 UART: [kat] sha1
818,444 UART: [kat] SHA2-256
821,174 UART: [kat] SHA2-384
828,310 UART: [kat] SHA2-512-ACC
830,681 UART: [kat] ECC-384
3,114,422 UART: [kat] HMAC-384Kdf
3,126,088 UART: [kat] LMS
4,316,180 UART: [kat] --
4,320,098 UART: [cold-reset] ++
4,321,459 UART: [fht] Storing FHT @ 0x50003400
4,332,517 UART: [idev] ++
4,333,082 UART: [idev] CDI.KEYID = 6
4,334,116 UART: [idev] SUBJECT.KEYID = 7
4,335,292 UART: [idev] UDS.KEYID = 0
4,336,278 ready_for_fw is high
4,336,468 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,330 UART: [idev] Erasing UDS.KEYID = 0
7,622,532 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,486 UART: [idev] --
7,647,104 UART: [ldev] ++
7,647,734 UART: [ldev] CDI.KEYID = 6
7,648,636 UART: [ldev] SUBJECT.KEYID = 5
7,649,898 UART: [ldev] AUTHORITY.KEYID = 7
7,651,389 UART: [ldev] FE.KEYID = 1
7,662,565 UART: [ldev] Erasing FE.KEYID = 1
10,950,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,186 UART: [ldev] --
13,312,119 UART: [fwproc] Waiting for Commands...
13,313,882 UART: [fwproc] Received command 0x46574c44
13,316,059 UART: [fwproc] Received Image of size 113760 bytes
17,362,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,584 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,495 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,821,110 >>> mbox cmd response: success
18,282,630 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,283,738 UART: [afmc] ++
18,284,274 UART: [afmc] CDI.KEYID = 6
18,285,193 UART: [afmc] SUBJECT.KEYID = 7
18,286,213 UART: [afmc] AUTHORITY.KEYID = 5
21,141,336 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,061 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,443 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,263 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,702 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,465 UART: [afmc] --
23,510,157 UART: [cold-reset] --
23,513,588 UART: [state] Locking Datavault
23,518,026 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,733 UART: [state] Locking ICCM
23,522,364 UART: [exit] Launching FMC @ 0x40000130
23,530,778 UART:
23,531,010 UART: Running Caliptra FMC ...
23,532,111 UART:
23,532,264 UART: [state] CFI Enabled
23,540,309 UART: [fht] FMC Alias Private Key: 7
25,871,128 UART: [art] Extend RT PCRs Done
25,872,343 UART: [art] Lock RT PCRs Done
25,873,961 UART: [art] Populate DV Done
25,879,100 UART: [fht] FMC Alias Private Key: 7
25,880,685 UART: [art] Derive CDI
25,881,496 UART: [art] Store in in slot 0x4
25,923,822 UART: [art] Derive Key Pair
25,924,862 UART: [art] Store priv key in slot 0x5
29,166,797 UART: [art] Derive Key Pair - Done
29,179,730 UART: [art] Signing Cert with AUTHO
29,181,067 UART: RITY.KEYID = 7
31,460,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,963 UART: [art] PUB.X = 448D2734083A0943FF8DDDB639D68250D4F805C9181145D898E54DF3807A48AE66D801214CB29E8105C79B20D8ABDF95
31,469,181 UART: [art] PUB.Y = 0FFE3575BA2C191CA2EDB508D95B5315ACDC8FBFB93DB7AB7A2407455EC74B3B9183491EE9F90AA5729B4E2C176119F2
31,476,439 UART: [art] SIG.R = E5C6AE1EDAA1FA22458481E1BBA3242194838856FCD40244AFD648EBCD450D56129B92D6B4BD4C76F73D83EB164001C0
31,483,857 UART: [art] SIG.S = 42164379EF8A2E0AB9823AC1F2D8345E8960507680FDC6840E7307B6D80E9F9955C16A9E245F3DBD13E9747D43BD73CB
32,789,040 UART: Caliptra RT
32,789,766 UART: [state] CFI Enabled
32,907,372 UART: [rt] RT listening for mailbox commands...
32,941,155 UART: [rt]cmd =0x49444543, len=327
32,950,179 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,779 writing to cptra_bootfsm_go
4,125,460 ready_for_fw is high
4,126,064 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,088 >>> mbox cmd response: success
18,526,549 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,710,972 UART:
23,711,367 UART: Running Caliptra FMC ...
23,712,466 UART:
23,712,616 UART: [state] CFI Enabled
23,720,855 UART: [fht] FMC Alias Private Key: 7
26,051,141 UART: [art] Extend RT PCRs Done
26,052,369 UART: [art] Lock RT PCRs Done
26,054,184 UART: [art] Populate DV Done
26,059,653 UART: [fht] FMC Alias Private Key: 7
26,061,142 UART: [art] Derive CDI
26,061,875 UART: [art] Store in in slot 0x4
26,104,576 UART: [art] Derive Key Pair
26,105,616 UART: [art] Store priv key in slot 0x5
29,347,613 UART: [art] Derive Key Pair - Done
29,360,560 UART: [art] Signing Cert with AUTHO
29,361,860 UART: RITY.KEYID = 7
31,640,942 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,450 UART: [art] PUB.X = 57DA24ABE35B6CB35BF17F6ECB0D85719F0284E502C5F77A2B76A7980A7985631AF5E00403EEB94B0A64D0154DE7A9F1
31,649,700 UART: [art] PUB.Y = C3CFA5F126D43B219E8609C379493FD319431FF642539D2641FECE6120831B5795E1EC15D8CD6778B3DD9B96E77EF157
31,656,893 UART: [art] SIG.R = CC3C534FCBFB4E71CC18888A366BF5AFC5668DC0121FCE303068E78ECB6B9F5ACE3696223033EC669D3C74DAF16A3922
31,664,335 UART: [art] SIG.S = 9E70EB2994D395955141FDDEDF0E364647FEE6CB19B4113D4C4AE473729BCE9F81D47DDCCF0B504FBC773628E2ADEEAA
32,969,425 UART: Caliptra RT
32,970,135 UART: [state] CFI Enabled
33,088,140 UART: [rt] RT listening for mailbox commands...
33,121,925 UART: [rt]cmd =0x49444543, len=327
33,130,872 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
192,713 UART:
193,077 UART: Running Caliptra ROM ...
194,290 UART:
194,465 UART: [state] CFI Enabled
264,959 UART: [state] LifecycleState = Unprovisioned
266,824 UART: [state] DebugLocked = No
268,570 UART: [state] WD Timer not started. Device not locked for debugging
271,748 UART: [kat] SHA2-256
450,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,414 UART: [kat] ++
462,863 UART: [kat] sha1
475,224 UART: [kat] SHA2-256
478,223 UART: [kat] SHA2-384
484,789 UART: [kat] SHA2-512-ACC
487,721 UART: [kat] ECC-384
2,946,952 UART: [kat] HMAC-384Kdf
2,970,421 UART: [kat] LMS
3,499,866 UART: [kat] --
3,505,207 UART: [cold-reset] ++
3,507,433 UART: [fht] FHT @ 0x50003400
3,518,145 UART: [idev] ++
3,518,744 UART: [idev] CDI.KEYID = 6
3,519,627 UART: [idev] SUBJECT.KEYID = 7
3,520,754 UART: [idev] UDS.KEYID = 0
3,521,715 ready_for_fw is high
3,521,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,568 UART: [idev] Erasing UDS.KEYID = 0
6,026,371 UART: [idev] Sha1 KeyId Algorithm
6,050,199 UART: [idev] --
6,053,059 UART: [ldev] ++
6,053,632 UART: [ldev] CDI.KEYID = 6
6,054,547 UART: [ldev] SUBJECT.KEYID = 5
6,055,705 UART: [ldev] AUTHORITY.KEYID = 7
6,056,930 UART: [ldev] FE.KEYID = 1
6,098,790 UART: [ldev] Erasing FE.KEYID = 1
8,602,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,284 UART: [ldev] --
10,412,260 UART: [fwproc] Wait for Commands...
10,414,732 UART: [fwproc] Recv command 0x46574c44
10,416,821 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,278,678 >>> mbox cmd response: success
14,739,833 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,740,857 UART: [afmc] ++
14,741,393 UART: [afmc] CDI.KEYID = 6
14,742,272 UART: [afmc] SUBJECT.KEYID = 7
14,743,514 UART: [afmc] AUTHORITY.KEYID = 5
16,827,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,883 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,723 UART: [afmc] --
18,626,986 UART: [cold-reset] --
18,630,567 UART: [state] Locking Datavault
18,638,366 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,053 UART: [state] Locking ICCM
18,642,767 UART: [exit] Launching FMC @ 0x40000130
18,651,222 UART:
18,651,463 UART: Running Caliptra FMC ...
18,652,562 UART:
18,652,720 UART: [state] CFI Enabled
18,707,853 UART: [fht] FMC Alias Private Key: 7
20,471,957 UART: [art] Extend RT PCRs Done
20,473,178 UART: [art] Lock RT PCRs Done
20,474,904 UART: [art] Populate DV Done
20,480,158 UART: [fht] FMC Alias Private Key: 7
20,481,789 UART: [art] Derive CDI
20,482,608 UART: [art] Store in in slot 0x4
20,540,007 UART: [art] Derive Key Pair
20,541,010 UART: [art] Store priv key in slot 0x5
23,003,671 UART: [art] Derive Key Pair - Done
23,016,461 UART: [art] Signing Cert with AUTHO
23,017,763 UART: RITY.KEYID = 7
24,730,002 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,513 UART: [art] PUB.X = 3367E1976F26951AD35F4877F7B0915B2442FE4E5F1E8DE1725CAD2DF30C364902B8D6983CF49D3A91C45212C7C20007
24,738,737 UART: [art] PUB.Y = 71FCE812AA614F97D4E1D5D34D29BDA268FB859DD5459049F34CD5668C74B856EC37D21486E4444801E8ADD48186BA3B
24,745,955 UART: [art] SIG.R = 1ACB6D38F8EBD784628E1F3185DDF6FA53BBDF569C6A3405B90D0B936BF8F0D6CDDB107A5CD7BC229DE1D37878EBD104
24,753,415 UART: [art] SIG.S = 744121D24DC2C57284C889568AF5F4DB91B93EE2709D44B4A8E8EF6128AFCB3E75AA1C8267B181DD70457A04D6AC55DD
25,732,547 UART: Caliptra RT
25,733,254 UART: [state] CFI Enabled
25,896,569 UART: [rt] RT listening for mailbox commands...
25,930,507 UART: [rt]cmd =0x49444543, len=327
25,939,638 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
3,361,791 ready_for_fw is high
3,362,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,019,376 >>> mbox cmd response: success
14,481,521 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,299,570 UART:
18,299,991 UART: Running Caliptra FMC ...
18,301,097 UART:
18,301,260 UART: [state] CFI Enabled
18,366,619 UART: [fht] FMC Alias Private Key: 7
20,131,166 UART: [art] Extend RT PCRs Done
20,132,409 UART: [art] Lock RT PCRs Done
20,134,364 UART: [art] Populate DV Done
20,139,795 UART: [fht] FMC Alias Private Key: 7
20,141,437 UART: [art] Derive CDI
20,142,247 UART: [art] Store in in slot 0x4
20,198,509 UART: [art] Derive Key Pair
20,199,540 UART: [art] Store priv key in slot 0x5
22,662,498 UART: [art] Derive Key Pair - Done
22,675,554 UART: [art] Signing Cert with AUTHO
22,676,852 UART: RITY.KEYID = 7
24,388,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,390,216 UART: [art] PUB.X = 45582955D947CE937F529B22445B394958B0C4FBEE232507219B811CD19A46E26584592A954D693D74D2E8FE550B84C3
24,397,435 UART: [art] PUB.Y = 117FD7DE9B64918BB34AECFA9A6FC7A01709F798B72FA4C01935ED0FBBEFF9C69A0A59A2878EFDFF95E3BB1F7C987F48
24,404,712 UART: [art] SIG.R = 7EEFAA98F71DFC56B23C09E724C763A29E467B570F327E16A4A72D2DD4633628574AA284515FDEBEFEDF2E6B8E68186B
24,412,117 UART: [art] SIG.S = D89F616C81E1E022529CAB5DB77B276A438CB1B138A49F755280FCA54146F87985FB49FED70AC54F5FDB13EC7B81D72C
25,390,889 UART: Caliptra RT
25,391,598 UART: [state] CFI Enabled
25,556,501 UART: [rt] RT listening for mailbox commands...
25,590,239 UART: [rt]cmd =0x49444543, len=327
25,599,229 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
193,110 UART:
193,485 UART: Running Caliptra ROM ...
194,613 UART:
604,108 UART: [state] CFI Enabled
616,274 UART: [state] LifecycleState = Unprovisioned
618,157 UART: [state] DebugLocked = No
620,540 UART: [state] WD Timer not started. Device not locked for debugging
623,374 UART: [kat] SHA2-256
802,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,138 UART: [kat] ++
814,674 UART: [kat] sha1
826,198 UART: [kat] SHA2-256
829,200 UART: [kat] SHA2-384
834,907 UART: [kat] SHA2-512-ACC
837,856 UART: [kat] ECC-384
3,278,416 UART: [kat] HMAC-384Kdf
3,290,729 UART: [kat] LMS
3,820,220 UART: [kat] --
3,824,865 UART: [cold-reset] ++
3,826,090 UART: [fht] FHT @ 0x50003400
3,836,149 UART: [idev] ++
3,836,729 UART: [idev] CDI.KEYID = 6
3,837,646 UART: [idev] SUBJECT.KEYID = 7
3,838,820 UART: [idev] UDS.KEYID = 0
3,839,745 ready_for_fw is high
3,839,958 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,983,253 UART: [idev] Erasing UDS.KEYID = 0
6,310,556 UART: [idev] Sha1 KeyId Algorithm
6,333,893 UART: [idev] --
6,337,217 UART: [ldev] ++
6,337,798 UART: [ldev] CDI.KEYID = 6
6,338,722 UART: [ldev] SUBJECT.KEYID = 5
6,339,881 UART: [ldev] AUTHORITY.KEYID = 7
6,341,115 UART: [ldev] FE.KEYID = 1
6,353,222 UART: [ldev] Erasing FE.KEYID = 1
8,830,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,735 UART: [ldev] --
10,621,887 UART: [fwproc] Wait for Commands...
10,623,603 UART: [fwproc] Recv command 0x46574c44
10,625,708 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,813 >>> mbox cmd response: success
14,950,384 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,951,454 UART: [afmc] ++
14,951,981 UART: [afmc] CDI.KEYID = 6
14,952,897 UART: [afmc] SUBJECT.KEYID = 7
14,953,949 UART: [afmc] AUTHORITY.KEYID = 5
16,994,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,189 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,272 UART: [afmc] --
18,792,141 UART: [cold-reset] --
18,796,704 UART: [state] Locking Datavault
18,802,009 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,675 UART: [state] Locking ICCM
18,805,369 UART: [exit] Launching FMC @ 0x40000130
18,813,808 UART:
18,814,062 UART: Running Caliptra FMC ...
18,815,095 UART:
18,815,244 UART: [state] CFI Enabled
18,823,294 UART: [fht] FMC Alias Private Key: 7
20,579,827 UART: [art] Extend RT PCRs Done
20,581,043 UART: [art] Lock RT PCRs Done
20,582,539 UART: [art] Populate DV Done
20,587,949 UART: [fht] FMC Alias Private Key: 7
20,589,497 UART: [art] Derive CDI
20,590,339 UART: [art] Store in in slot 0x4
20,633,044 UART: [art] Derive Key Pair
20,634,050 UART: [art] Store priv key in slot 0x5
23,060,724 UART: [art] Derive Key Pair - Done
23,073,592 UART: [art] Signing Cert with AUTHO
23,074,899 UART: RITY.KEYID = 7
24,779,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,193 UART: [art] PUB.X = F3A3DD736400C4A1603ABE8E5EA409785518D19D93CD0B947F2F981C23A5667FF6AF4067B7FE637EF80407E6F4239663
24,788,458 UART: [art] PUB.Y = C59E9017AC4C87981CF76F67554D2E681FF5D5A0792FB7897D19FD2CE5DFFFC4D0FD96F8CF62E36EC6D06B80CD2520A9
24,795,765 UART: [art] SIG.R = 1EE70E9FB276D2762A2412B8C14A0E5C68178879C13E35E0E4107E72C701CBD6046DDB87586CB156FED44DD38275F9D1
24,803,137 UART: [art] SIG.S = F5BD332DCC1AA55499DD8EF7D03CF48825ED092169F05F390AD51D8D3584FB24940BDEEEFC31753FEB4DF447C2360374
25,782,395 UART: Caliptra RT
25,783,095 UART: [state] CFI Enabled
25,900,051 UART: [rt] RT listening for mailbox commands...
25,933,642 UART: [rt]cmd =0x49444543, len=327
25,942,773 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,909 writing to cptra_bootfsm_go
3,696,413 ready_for_fw is high
3,696,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,007 >>> mbox cmd response: success
14,725,364 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,512,737 UART:
18,513,155 UART: Running Caliptra FMC ...
18,514,297 UART:
18,514,468 UART: [state] CFI Enabled
18,522,338 UART: [fht] FMC Alias Private Key: 7
20,278,992 UART: [art] Extend RT PCRs Done
20,280,246 UART: [art] Lock RT PCRs Done
20,282,061 UART: [art] Populate DV Done
20,287,413 UART: [fht] FMC Alias Private Key: 7
20,289,021 UART: [art] Derive CDI
20,289,846 UART: [art] Store in in slot 0x4
20,332,774 UART: [art] Derive Key Pair
20,333,817 UART: [art] Store priv key in slot 0x5
22,760,962 UART: [art] Derive Key Pair - Done
22,774,026 UART: [art] Signing Cert with AUTHO
22,775,506 UART: RITY.KEYID = 7
24,481,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,660 UART: [art] PUB.X = 51C328E0C4D3A693D9A88224F2EE348FAD2BFBC706FC0399BA35BF639C694DB6D08EC09658821B50618B993601EB2B39
24,489,978 UART: [art] PUB.Y = BB5874BEDB9E9F11FB64A370A0E19658B9591EFC324AEF2F6F47A34172529A521284618834071E23700605A8F65F5037
24,497,209 UART: [art] SIG.R = E611FBA86A92040475EE5970A9DD85D2381DADB87C8F636BD1B8AC60223E97F291553D0FBE4DBA93FA38CE5A368F6459
24,504,586 UART: [art] SIG.S = 97BE5293A2255B81CA61FC514753AAAC6DA28127FD596B14309206D851BC5873192EB766B35B18E811343A0C04C23758
25,482,925 UART: Caliptra RT
25,483,634 UART: [state] CFI Enabled
25,601,079 UART: [rt] RT listening for mailbox commands...
25,634,766 UART: [rt]cmd =0x49444543, len=327
25,643,869 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,618 UART:
192,993 UART: Running Caliptra ROM ...
194,096 UART:
194,244 UART: [state] CFI Enabled
261,055 UART: [state] LifecycleState = Unprovisioned
263,487 UART: [state] DebugLocked = No
265,080 UART: [state] WD Timer not started. Device not locked for debugging
268,984 UART: [kat] SHA2-256
458,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,579 UART: [kat] ++
470,021 UART: [kat] sha1
481,200 UART: [kat] SHA2-256
484,215 UART: [kat] SHA2-384
489,990 UART: [kat] SHA2-512-ACC
492,569 UART: [kat] ECC-384
2,948,232 UART: [kat] HMAC-384Kdf
2,969,986 UART: [kat] LMS
3,501,736 UART: [kat] --
3,504,834 UART: [cold-reset] ++
3,506,051 UART: [fht] FHT @ 0x50003400
3,517,707 UART: [idev] ++
3,518,346 UART: [idev] CDI.KEYID = 6
3,519,296 UART: [idev] SUBJECT.KEYID = 7
3,520,536 UART: [idev] UDS.KEYID = 0
3,521,433 ready_for_fw is high
3,521,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,086 UART: [idev] Erasing UDS.KEYID = 0
6,028,513 UART: [idev] Sha1 KeyId Algorithm
6,050,437 UART: [idev] --
6,055,227 UART: [ldev] ++
6,055,902 UART: [ldev] CDI.KEYID = 6
6,056,963 UART: [ldev] SUBJECT.KEYID = 5
6,058,247 UART: [ldev] AUTHORITY.KEYID = 7
6,059,439 UART: [ldev] FE.KEYID = 1
6,100,036 UART: [ldev] Erasing FE.KEYID = 1
8,604,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,308 UART: [ldev] --
10,413,675 UART: [fwproc] Wait for Commands...
10,416,909 UART: [fwproc] Recv command 0x46574c44
10,419,178 UART: [fwproc] Recv'd Img size: 114084 bytes
13,866,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,000 >>> mbox cmd response: success
15,062,166 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,063,234 UART: [afmc] ++
15,063,771 UART: [afmc] CDI.KEYID = 6
15,064,653 UART: [afmc] SUBJECT.KEYID = 7
15,065,769 UART: [afmc] AUTHORITY.KEYID = 5
17,148,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,425 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,750 UART: [afmc] --
18,947,462 UART: [cold-reset] --
18,951,196 UART: [state] Locking Datavault
18,956,474 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,631 UART: [state] Locking ICCM
18,961,059 UART: [exit] Launching FMC @ 0x40000130
18,969,753 UART:
18,969,982 UART: Running Caliptra FMC ...
18,971,081 UART:
18,971,244 UART: [state] CFI Enabled
19,030,665 UART: [fht] FMC Alias Private Key: 7
20,794,868 UART: [art] Extend RT PCRs Done
20,796,096 UART: [art] Lock RT PCRs Done
20,797,859 UART: [art] Populate DV Done
20,803,434 UART: [fht] FMC Alias Private Key: 7
20,804,967 UART: [art] Derive CDI
20,805,696 UART: [art] Store in in slot 0x4
20,862,816 UART: [art] Derive Key Pair
20,863,871 UART: [art] Store priv key in slot 0x5
23,326,583 UART: [art] Derive Key Pair - Done
23,339,417 UART: [art] Signing Cert with AUTHO
23,340,745 UART: RITY.KEYID = 7
25,051,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,161 UART: [art] PUB.X = BA3A0B690DE38AFB8B7ADBC9FBB3E81B9BC2F70FFB913E4B2577548C115DBD7FE4E428F80AE54B347E7C99ECFC712777
25,060,476 UART: [art] PUB.Y = 8CBFF56CDC0200F4E1C39B692EB980D81D563DADFDC5EA0CA5152DC78B269BCC56868FCB8165035C18AC6CACB99D3FA6
25,067,727 UART: [art] SIG.R = 9DCD8A2012DA20E2E9B8748DCB0C4225A6C20169A508B831791193B85F948204B1385B8756DF67CD7E34238C41D2497F
25,075,145 UART: [art] SIG.S = 5FEB0DEF328EAECBF93B901BB2D8A248E46CA91E0F984D01AC97F24B897C805B13A954AD564BB5605077C0B68AC1A0A7
26,053,405 UART: Caliptra RT
26,054,112 UART: [state] CFI Enabled
26,219,818 UART: [rt] RT listening for mailbox commands...
26,253,781 UART: [rt]cmd =0x49444543, len=327
26,262,778 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,440,273 ready_for_fw is high
3,440,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,303 >>> mbox cmd response: success
15,182,363 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,018,834 UART:
19,019,254 UART: Running Caliptra FMC ...
19,020,354 UART:
19,020,519 UART: [state] CFI Enabled
19,086,523 UART: [fht] FMC Alias Private Key: 7
20,851,554 UART: [art] Extend RT PCRs Done
20,852,791 UART: [art] Lock RT PCRs Done
20,854,226 UART: [art] Populate DV Done
20,859,729 UART: [fht] FMC Alias Private Key: 7
20,861,320 UART: [art] Derive CDI
20,862,131 UART: [art] Store in in slot 0x4
20,919,160 UART: [art] Derive Key Pair
20,920,204 UART: [art] Store priv key in slot 0x5
23,383,497 UART: [art] Derive Key Pair - Done
23,396,461 UART: [art] Signing Cert with AUTHO
23,397,802 UART: RITY.KEYID = 7
25,108,492 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,003 UART: [art] PUB.X = 26FD40CA2A36CABEDBA39A3609F721F4890271FFF6C823201917BF84773B33103817DCF11312E32E59EA36CA11DC0FA3
25,117,247 UART: [art] PUB.Y = 1AB0F364582703E6A5E265BE118B083B4D807331B5B35CC956E6B717743B457D7800788405022D2EB335C4E32A1A65E0
25,124,488 UART: [art] SIG.R = 9E74942C882DB7366745189996941A2A3B389EFD1756D98B69656D79B20B7B18CC79339570485DA8F896329463DCC087
25,131,835 UART: [art] SIG.S = 141E77EFEEC248067FB12B5A7A0927C974C8A9F3ABE050602425293FEA2E058E1FDC65F1F0A079D67E025E7AE862D656
26,110,610 UART: Caliptra RT
26,111,321 UART: [state] CFI Enabled
26,275,635 UART: [rt] RT listening for mailbox commands...
26,309,419 UART: [rt]cmd =0x49444543, len=327
26,318,248 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,769 writing to cptra_bootfsm_go
192,874 UART:
193,251 UART: Running Caliptra ROM ...
194,461 UART:
604,193 UART: [state] CFI Enabled
615,950 UART: [state] LifecycleState = Unprovisioned
617,971 UART: [state] DebugLocked = No
619,148 UART: [state] WD Timer not started. Device not locked for debugging
623,115 UART: [kat] SHA2-256
812,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,719 UART: [kat] ++
824,326 UART: [kat] sha1
836,624 UART: [kat] SHA2-256
839,653 UART: [kat] SHA2-384
844,511 UART: [kat] SHA2-512-ACC
847,093 UART: [kat] ECC-384
3,286,660 UART: [kat] HMAC-384Kdf
3,299,828 UART: [kat] LMS
3,831,618 UART: [kat] --
3,838,237 UART: [cold-reset] ++
3,839,536 UART: [fht] FHT @ 0x50003400
3,852,446 UART: [idev] ++
3,853,118 UART: [idev] CDI.KEYID = 6
3,854,039 UART: [idev] SUBJECT.KEYID = 7
3,855,302 UART: [idev] UDS.KEYID = 0
3,856,502 ready_for_fw is high
3,856,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,809 UART: [idev] Erasing UDS.KEYID = 0
6,326,856 UART: [idev] Sha1 KeyId Algorithm
6,350,475 UART: [idev] --
6,354,825 UART: [ldev] ++
6,355,514 UART: [ldev] CDI.KEYID = 6
6,356,401 UART: [ldev] SUBJECT.KEYID = 5
6,357,609 UART: [ldev] AUTHORITY.KEYID = 7
6,358,838 UART: [ldev] FE.KEYID = 1
6,369,753 UART: [ldev] Erasing FE.KEYID = 1
8,848,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,234 UART: [ldev] --
10,639,274 UART: [fwproc] Wait for Commands...
10,641,795 UART: [fwproc] Recv command 0x46574c44
10,644,095 UART: [fwproc] Recv'd Img size: 114084 bytes
14,083,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,271,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,812,511 >>> mbox cmd response: success
15,273,732 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,274,799 UART: [afmc] ++
15,275,322 UART: [afmc] CDI.KEYID = 6
15,276,206 UART: [afmc] SUBJECT.KEYID = 7
15,277,324 UART: [afmc] AUTHORITY.KEYID = 5
17,322,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,044,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,046,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,061,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,076,736 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,091,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,116,438 UART: [afmc] --
19,119,988 UART: [cold-reset] --
19,122,562 UART: [state] Locking Datavault
19,127,364 UART: [state] Locking PCR0, PCR1 and PCR31
19,129,575 UART: [state] Locking ICCM
19,131,409 UART: [exit] Launching FMC @ 0x40000130
19,140,081 UART:
19,140,343 UART: Running Caliptra FMC ...
19,141,452 UART:
19,141,618 UART: [state] CFI Enabled
19,149,609 UART: [fht] FMC Alias Private Key: 7
20,907,011 UART: [art] Extend RT PCRs Done
20,908,245 UART: [art] Lock RT PCRs Done
20,909,902 UART: [art] Populate DV Done
20,915,310 UART: [fht] FMC Alias Private Key: 7
20,916,849 UART: [art] Derive CDI
20,917,586 UART: [art] Store in in slot 0x4
20,960,443 UART: [art] Derive Key Pair
20,961,448 UART: [art] Store priv key in slot 0x5
23,388,375 UART: [art] Derive Key Pair - Done
23,401,428 UART: [art] Signing Cert with AUTHO
23,402,744 UART: RITY.KEYID = 7
25,107,667 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,168 UART: [art] PUB.X = 18629D8F8463E1C53459C4DCC247CD6F953A63DA43113C02E25DB5A856E3C96D7619F9415CAD38D78BC755DD55EE036B
25,116,448 UART: [art] PUB.Y = 2BADE23BA5E30E4E67742705577DF2A52CD916972547C37D10E7FA34E4F5D858F74CE14663511D86044B660E1B3DC14A
25,123,711 UART: [art] SIG.R = EBA9ECA3761E26BAA0F1DD2D4F9D594966ED08ED5BA3385D650C1D38535F7E0DFEDC68E07BD40DEC45B745ACF3D31A68
25,131,132 UART: [art] SIG.S = DB565C047ECEE2BE00FF4371D7B7A037DB7C9EB95E8D42EEC665813DF50F831153781CDE050FB628B71B5EAAF66FC529
26,110,659 UART: Caliptra RT
26,111,368 UART: [state] CFI Enabled
26,228,806 UART: [rt] RT listening for mailbox commands...
26,262,792 UART: [rt]cmd =0x49444543, len=327
26,271,762 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
3,755,447 ready_for_fw is high
3,755,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,958,796 >>> mbox cmd response: success
15,419,241 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,202,944 UART:
19,203,358 UART: Running Caliptra FMC ...
19,204,554 UART:
19,204,733 UART: [state] CFI Enabled
19,212,879 UART: [fht] FMC Alias Private Key: 7
20,969,452 UART: [art] Extend RT PCRs Done
20,970,689 UART: [art] Lock RT PCRs Done
20,972,535 UART: [art] Populate DV Done
20,977,984 UART: [fht] FMC Alias Private Key: 7
20,979,476 UART: [art] Derive CDI
20,980,239 UART: [art] Store in in slot 0x4
21,023,287 UART: [art] Derive Key Pair
21,024,300 UART: [art] Store priv key in slot 0x5
23,451,168 UART: [art] Derive Key Pair - Done
23,464,122 UART: [art] Signing Cert with AUTHO
23,465,444 UART: RITY.KEYID = 7
25,171,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,535 UART: [art] PUB.X = 99AC0DBAC406C0F332F580CB63D05CD8E51CB6F93B6623AB5AF05EC5BE5D578F8CD8FB7CFD3F9BD0CF634ADB1B95612D
25,179,869 UART: [art] PUB.Y = 7A1EE407112E4581A38EA7D871AF5CE785FE07649A00E7074FA276FD9EB79D0407C1FE9104BC32B14EA20345E34BBB56
25,187,104 UART: [art] SIG.R = 710616F2EA2E8B45C93A22544ACA5AC9C9F5C4E17077E17EE90393B4C0DC4A38891B3B94FBF39DBB79D13DA658489381
25,194,470 UART: [art] SIG.S = F76867AEF1A15273DF0AEF29AFBB7B9142A7CD46E142EA1F2DFEB0E8C30F18F51CAE1A34A2A9B225902297060A6BC246
26,173,313 UART: Caliptra RT
26,174,005 UART: [state] CFI Enabled
26,290,307 UART: [rt] RT listening for mailbox commands...
26,324,197 UART: [rt]cmd =0x49444543, len=327
26,333,275 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,740 UART: [state] LifecycleState = Unprovisioned
85,395 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,053 UART: [kat] SHA2-256
891,991 UART: [kat] SHA2-384
894,724 UART: [kat] SHA2-512-ACC
896,625 UART: [kat] ECC-384
902,256 UART: [kat] HMAC-384Kdf
906,758 UART: [kat] LMS
1,474,954 UART: [kat] --
1,475,871 UART: [cold-reset] ++
1,476,257 UART: [fht] Storing FHT @ 0x50003400
1,478,974 UART: [idev] ++
1,479,142 UART: [idev] CDI.KEYID = 6
1,479,502 UART: [idev] SUBJECT.KEYID = 7
1,479,926 UART: [idev] UDS.KEYID = 0
1,480,271 ready_for_fw is high
1,480,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,672 UART: [idev] Erasing UDS.KEYID = 0
1,504,568 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,344 UART: [idev] --
1,514,295 UART: [ldev] ++
1,514,463 UART: [ldev] CDI.KEYID = 6
1,514,826 UART: [ldev] SUBJECT.KEYID = 5
1,515,252 UART: [ldev] AUTHORITY.KEYID = 7
1,515,715 UART: [ldev] FE.KEYID = 1
1,520,759 UART: [ldev] Erasing FE.KEYID = 1
1,546,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,022 UART: [ldev] --
1,585,381 UART: [fwproc] Waiting for Commands...
1,586,208 UART: [fwproc] Received command 0x46574c44
1,586,999 UART: [fwproc] Received Image of size 114084 bytes
2,881,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,582 >>> mbox cmd response: success
3,073,582 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,074,842 UART: [afmc] ++
3,075,010 UART: [afmc] CDI.KEYID = 6
3,075,372 UART: [afmc] SUBJECT.KEYID = 7
3,075,797 UART: [afmc] AUTHORITY.KEYID = 5
3,110,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,040 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,433 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,123 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,182 UART: [afmc] --
3,154,124 UART: [cold-reset] --
3,154,864 UART: [state] Locking Datavault
3,156,239 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,843 UART: [state] Locking ICCM
3,157,413 UART: [exit] Launching FMC @ 0x40000130
3,162,742 UART:
3,162,758 UART: Running Caliptra FMC ...
3,163,166 UART:
3,163,220 UART: [state] CFI Enabled
3,174,065 UART: [fht] FMC Alias Private Key: 7
3,282,166 UART: [art] Extend RT PCRs Done
3,282,594 UART: [art] Lock RT PCRs Done
3,284,614 UART: [art] Populate DV Done
3,292,875 UART: [fht] FMC Alias Private Key: 7
3,293,853 UART: [art] Derive CDI
3,294,133 UART: [art] Store in in slot 0x4
3,380,026 UART: [art] Derive Key Pair
3,380,386 UART: [art] Store priv key in slot 0x5
3,392,810 UART: [art] Derive Key Pair - Done
3,407,679 UART: [art] Signing Cert with AUTHO
3,408,159 UART: RITY.KEYID = 7
3,423,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,022 UART: [art] PUB.X = 65A0FF235D7C051C5CA869508BEC67B6FAEBCA09B5F1759EEC628DE72B513B6B5879D2AD5C25AC49D51A11593940718E
3,430,798 UART: [art] PUB.Y = 762F77C34BECA63DF1AAE08B548B0AF4B0B954BCCA4C9DC44650296A0B9B0C100749EACF81BF07929BEFD5575B04BFCF
3,437,754 UART: [art] SIG.R = B68876727A2B7284C56C5D6D05A56C6FA8ADA2E73423D413ADAF36DA88E1EB21787B6D86E743C8954AE91B4789B00F5C
3,444,526 UART: [art] SIG.S = 2E7F7AE09CA18A2DB3D7726EDAED797FF070A9E08C221E2C0A7A315EEEED2B62773AB26F5B5C4AB985CA6AA87D943BA0
3,468,336 UART: Caliptra RT
3,468,589 UART: [state] CFI Enabled
3,576,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,263 UART: [rt]cmd =0x49444543, len=327
3,617,849 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 ready_for_fw is high
1,362,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,954 >>> mbox cmd response: success
2,923,954 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,986,202 UART:
2,986,218 UART: Running Caliptra FMC ...
2,986,626 UART:
2,986,680 UART: [state] CFI Enabled
2,996,995 UART: [fht] FMC Alias Private Key: 7
3,105,820 UART: [art] Extend RT PCRs Done
3,106,248 UART: [art] Lock RT PCRs Done
3,108,088 UART: [art] Populate DV Done
3,116,353 UART: [fht] FMC Alias Private Key: 7
3,117,303 UART: [art] Derive CDI
3,117,583 UART: [art] Store in in slot 0x4
3,203,340 UART: [art] Derive Key Pair
3,203,700 UART: [art] Store priv key in slot 0x5
3,216,778 UART: [art] Derive Key Pair - Done
3,231,145 UART: [art] Signing Cert with AUTHO
3,231,625 UART: RITY.KEYID = 7
3,246,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,652 UART: [art] PUB.X = C17EC85EFAF60CB3CA7BB646FD706598A34CDF2A6F437A2B9CA17D287F5FF2E0066BC949E1377FD04916F033837E7E0E
3,254,429 UART: [art] PUB.Y = 6BDAD8B234CFE3AE3DC2FC39C678CC7D8D0F4752BECAB9A55021886236BAFEB62761E341CF7E02216822FC699EB2FE08
3,261,390 UART: [art] SIG.R = E0A0D512D7E0D39A5BF11EA9D30967992754EB96F5EB4D06A4665E71F9908319B23D3F702433B12009A8BCD30226DBFA
3,268,152 UART: [art] SIG.S = 7292FADEB095A606C6D5F08D3B1C5D69A10006C51457EDE832D281627F4A8AE6F56BA97938E823C955611FB3E3EEBB9C
3,291,811 UART: Caliptra RT
3,292,064 UART: [state] CFI Enabled
3,400,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,098 UART: [rt]cmd =0x49444543, len=327
3,441,614 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,477,002 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 ready_for_fw is high
1,481,096 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,767 UART: [idev] Erasing UDS.KEYID = 0
1,505,521 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,220 UART: [ldev] ++
1,515,388 UART: [ldev] CDI.KEYID = 6
1,515,751 UART: [ldev] SUBJECT.KEYID = 5
1,516,177 UART: [ldev] AUTHORITY.KEYID = 7
1,516,640 UART: [ldev] FE.KEYID = 1
1,521,812 UART: [ldev] Erasing FE.KEYID = 1
1,547,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,539 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 114084 bytes
2,883,614 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,573 >>> mbox cmd response: success
3,076,573 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,077,665 UART: [afmc] ++
3,077,833 UART: [afmc] CDI.KEYID = 6
3,078,195 UART: [afmc] SUBJECT.KEYID = 7
3,078,620 UART: [afmc] AUTHORITY.KEYID = 5
3,113,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,154 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,844 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,891 UART: [afmc] --
3,156,997 UART: [cold-reset] --
3,157,669 UART: [state] Locking Datavault
3,158,914 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,518 UART: [state] Locking ICCM
3,160,102 UART: [exit] Launching FMC @ 0x40000130
3,165,431 UART:
3,165,447 UART: Running Caliptra FMC ...
3,165,855 UART:
3,165,998 UART: [state] CFI Enabled
3,176,791 UART: [fht] FMC Alias Private Key: 7
3,284,802 UART: [art] Extend RT PCRs Done
3,285,230 UART: [art] Lock RT PCRs Done
3,286,532 UART: [art] Populate DV Done
3,294,797 UART: [fht] FMC Alias Private Key: 7
3,295,887 UART: [art] Derive CDI
3,296,167 UART: [art] Store in in slot 0x4
3,381,732 UART: [art] Derive Key Pair
3,382,092 UART: [art] Store priv key in slot 0x5
3,395,786 UART: [art] Derive Key Pair - Done
3,410,462 UART: [art] Signing Cert with AUTHO
3,410,942 UART: RITY.KEYID = 7
3,425,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,683 UART: [art] PUB.X = 28D9CB59B77F48D85913DFD0CD0ADEF345F69AB9BC6726C7D5255DF5AF788A5C4148DD6297DB6B5D8E3ECC833D6CB2EF
3,433,474 UART: [art] PUB.Y = 88CA49B39C09CFB7DF63C8C99ADA44EDBB12A1345C9420BB53082B99540D2147321AD411FD0EC9A3C92E0A5054C1241D
3,440,419 UART: [art] SIG.R = D9DFC4ADC2F2B2974BC92534780D4F5FF7C83F9905C4F7C832A4E26016BBD9FCEB5F078D7EE60E6394278BBA2F20E600
3,447,171 UART: [art] SIG.S = 8711A7C655FC35ED8897D2FBB72552E67D910727B8B9AA1BC68235E5D2E7B0D7358A9B53E8354451E257CFC418E5455F
3,472,001 UART: Caliptra RT
3,472,346 UART: [state] CFI Enabled
3,581,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,497 UART: [rt]cmd =0x49444543, len=327
3,621,803 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 ready_for_fw is high
1,363,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,641 >>> mbox cmd response: success
2,926,641 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,988,591 UART:
2,988,607 UART: Running Caliptra FMC ...
2,989,015 UART:
2,989,158 UART: [state] CFI Enabled
2,999,869 UART: [fht] FMC Alias Private Key: 7
3,107,342 UART: [art] Extend RT PCRs Done
3,107,770 UART: [art] Lock RT PCRs Done
3,109,692 UART: [art] Populate DV Done
3,118,085 UART: [fht] FMC Alias Private Key: 7
3,119,117 UART: [art] Derive CDI
3,119,397 UART: [art] Store in in slot 0x4
3,205,196 UART: [art] Derive Key Pair
3,205,556 UART: [art] Store priv key in slot 0x5
3,219,134 UART: [art] Derive Key Pair - Done
3,233,820 UART: [art] Signing Cert with AUTHO
3,234,300 UART: RITY.KEYID = 7
3,249,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,283 UART: [art] PUB.X = 1E20C1A69E7F3EF333D84DBC7791032E84CA58A01ED60995042633713EB797F5CDFC1A3C19E7171785D2307B3D9EA75A
3,257,048 UART: [art] PUB.Y = 84A8F3C66E92BAAA116F40C5F9B043A4E1662FD4D836D691EBBBC9435EFB909C20CEF0F1873BE6BBB694F7BED09B5582
3,264,018 UART: [art] SIG.R = E9A2C6946F283866E97163DBB7A220600BEBAEF1EEBADFD366D7442F156616179EE6BCE45B01A7B43D6ACAE4C79B2DED
3,270,804 UART: [art] SIG.S = 45732CB0B4E1D3E29D9D878B5A6D2D027BD418ABCBC2D9C3F1AAF42D2007CEAE025DEDF0C01F0A1645105AA554B75A37
3,295,159 UART: Caliptra RT
3,295,504 UART: [state] CFI Enabled
3,404,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,406 UART: [rt]cmd =0x49444543, len=327
3,445,677 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,971 UART: [state] WD Timer not started. Device not locked for debugging
88,204 UART: [kat] SHA2-256
893,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,979 UART: [kat] ++
898,131 UART: [kat] sha1
902,275 UART: [kat] SHA2-256
904,215 UART: [kat] SHA2-384
906,754 UART: [kat] SHA2-512-ACC
908,655 UART: [kat] ECC-384
918,274 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,174,934 UART: [idev] ++
1,175,102 UART: [idev] CDI.KEYID = 6
1,175,462 UART: [idev] SUBJECT.KEYID = 7
1,175,886 UART: [idev] UDS.KEYID = 0
1,176,231 ready_for_fw is high
1,176,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,112 UART: [idev] Erasing UDS.KEYID = 0
1,201,355 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,825 UART: [ldev] ++
1,210,993 UART: [ldev] CDI.KEYID = 6
1,211,356 UART: [ldev] SUBJECT.KEYID = 5
1,211,782 UART: [ldev] AUTHORITY.KEYID = 7
1,212,245 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,505 UART: [ldev] --
1,283,004 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,417 >>> mbox cmd response: success
2,771,417 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,772,657 UART: [afmc] ++
2,772,825 UART: [afmc] CDI.KEYID = 6
2,773,187 UART: [afmc] SUBJECT.KEYID = 7
2,773,612 UART: [afmc] AUTHORITY.KEYID = 5
2,808,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,258 UART: [afmc] --
2,852,358 UART: [cold-reset] --
2,853,010 UART: [state] Locking Datavault
2,854,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,695 UART: [state] Locking ICCM
2,855,359 UART: [exit] Launching FMC @ 0x40000130
2,860,688 UART:
2,860,704 UART: Running Caliptra FMC ...
2,861,112 UART:
2,861,166 UART: [state] CFI Enabled
2,871,369 UART: [fht] FMC Alias Private Key: 7
2,979,622 UART: [art] Extend RT PCRs Done
2,980,050 UART: [art] Lock RT PCRs Done
2,981,588 UART: [art] Populate DV Done
2,989,797 UART: [fht] FMC Alias Private Key: 7
2,990,895 UART: [art] Derive CDI
2,991,175 UART: [art] Store in in slot 0x4
3,076,866 UART: [art] Derive Key Pair
3,077,226 UART: [art] Store priv key in slot 0x5
3,090,426 UART: [art] Derive Key Pair - Done
3,105,017 UART: [art] Signing Cert with AUTHO
3,105,497 UART: RITY.KEYID = 7
3,120,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,436 UART: [art] PUB.X = 8B92BE056C26AA3A2CDF47A00E11FB71AA46E40913091D27BF68362302461143A64139019557EAA14F9148295E2203BB
3,128,179 UART: [art] PUB.Y = 4E486C3A43C847BDF76CBCC5C2ED9DDA1FDD7191D0AF600279EBA5654482F2EFDDBE59D0E02BEAC71E92CC0391AC129D
3,135,151 UART: [art] SIG.R = 40196C684E97A86624639161B2C2FB4A4DEF7154D07BE3B892A40D21E66B21810142BBC44F995043A1C27195C8FCE26B
3,141,913 UART: [art] SIG.S = 46ECBB1FDCF31260C11904C25854C4725D2F4BEABC13EC7050A4A8AC1FF48FB981794D011F53E8AF0F9BA801C30D05DA
3,165,856 UART: Caliptra RT
3,166,109 UART: [state] CFI Enabled
3,274,520 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,209 UART: [rt]cmd =0x49444543, len=327
3,315,631 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,115 ready_for_fw is high
1,060,115 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,552 >>> mbox cmd response: success
2,620,552 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,682,678 UART:
2,682,694 UART: Running Caliptra FMC ...
2,683,102 UART:
2,683,156 UART: [state] CFI Enabled
2,693,301 UART: [fht] FMC Alias Private Key: 7
2,801,482 UART: [art] Extend RT PCRs Done
2,801,910 UART: [art] Lock RT PCRs Done
2,803,450 UART: [art] Populate DV Done
2,811,595 UART: [fht] FMC Alias Private Key: 7
2,812,559 UART: [art] Derive CDI
2,812,839 UART: [art] Store in in slot 0x4
2,898,770 UART: [art] Derive Key Pair
2,899,130 UART: [art] Store priv key in slot 0x5
2,911,808 UART: [art] Derive Key Pair - Done
2,926,781 UART: [art] Signing Cert with AUTHO
2,927,261 UART: RITY.KEYID = 7
2,942,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,774 UART: [art] PUB.X = 55F225DE7BA1778BCFD7C1BE846298D4C70E45BDBE57CA8273E8353572F086534B0A8EC3442DF2BBA211AA8DB9ABF7DA
2,949,558 UART: [art] PUB.Y = 51A914AA95489090256947D38BD9043D02F44D79BD0032A5C190D1214C9C35295A7759BB4C179404CF9EB01BB846F978
2,956,469 UART: [art] SIG.R = B6DDD4FAF94F87F795F332E793559455A4D69B6B990693FB0CC59FC800DD43CC96B6C88932603A2696EA65A1658FF3D1
2,963,217 UART: [art] SIG.S = A5CF8BB6D59C47EC270B88A0268D5BBE9C85403D6C4B2E4B78F45A338715E784DEEF3B80D7C777A1A60D6764C556DA2F
2,986,260 UART: Caliptra RT
2,986,513 UART: [state] CFI Enabled
3,094,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,544 UART: [rt]cmd =0x49444543, len=327
3,134,890 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
893,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,512 UART: [kat] ++
897,664 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,081 UART: [kat] HMAC-384Kdf
922,651 UART: [kat] LMS
1,170,979 UART: [kat] --
1,171,762 UART: [cold-reset] ++
1,172,136 UART: [fht] FHT @ 0x50003400
1,174,711 UART: [idev] ++
1,174,879 UART: [idev] CDI.KEYID = 6
1,175,239 UART: [idev] SUBJECT.KEYID = 7
1,175,663 UART: [idev] UDS.KEYID = 0
1,176,008 ready_for_fw is high
1,176,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,981 UART: [idev] Erasing UDS.KEYID = 0
1,201,252 UART: [idev] Sha1 KeyId Algorithm
1,209,624 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,438 UART: [ldev] Erasing FE.KEYID = 1
1,244,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,286 UART: [ldev] --
1,283,645 UART: [fwproc] Wait for Commands...
1,284,395 UART: [fwproc] Recv command 0x46574c44
1,285,123 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,910 >>> mbox cmd response: success
2,771,910 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,773,110 UART: [afmc] ++
2,773,278 UART: [afmc] CDI.KEYID = 6
2,773,640 UART: [afmc] SUBJECT.KEYID = 7
2,774,065 UART: [afmc] AUTHORITY.KEYID = 5
2,809,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,407 UART: [afmc] --
2,853,327 UART: [cold-reset] --
2,854,337 UART: [state] Locking Datavault
2,855,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,186 UART: [state] Locking ICCM
2,856,678 UART: [exit] Launching FMC @ 0x40000130
2,862,007 UART:
2,862,023 UART: Running Caliptra FMC ...
2,862,431 UART:
2,862,574 UART: [state] CFI Enabled
2,873,245 UART: [fht] FMC Alias Private Key: 7
2,981,434 UART: [art] Extend RT PCRs Done
2,981,862 UART: [art] Lock RT PCRs Done
2,983,202 UART: [art] Populate DV Done
2,991,647 UART: [fht] FMC Alias Private Key: 7
2,992,697 UART: [art] Derive CDI
2,992,977 UART: [art] Store in in slot 0x4
3,078,556 UART: [art] Derive Key Pair
3,078,916 UART: [art] Store priv key in slot 0x5
3,091,946 UART: [art] Derive Key Pair - Done
3,106,962 UART: [art] Signing Cert with AUTHO
3,107,442 UART: RITY.KEYID = 7
3,122,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,505 UART: [art] PUB.X = 391A2320FD4BA8B9CA4D21C97707F70C7F98BE7C997A4CFA823E563F340978A625A36E4FB5273485E8BBE61BB4FAACCC
3,130,282 UART: [art] PUB.Y = FCAC84E6E118931913CE847EEA21E973DE3E3ECF26B2340836A0C85BA5309DAD3F73852A7700A7AE2258BF014B030557
3,137,204 UART: [art] SIG.R = A90840F3EA0429CF8D3A92EB08E500F87FA697F14DD25E1E8922483B7F958B916AB0BAB6CEF5534F670222736A0C7E87
3,143,943 UART: [art] SIG.S = A5CFD53A54DE0E27A52423D75238BFD094688E006CED5F6E1C96AB2D0259D6C6F777F617E7193D33DF6E57C17E4A4B63
3,167,358 UART: Caliptra RT
3,167,703 UART: [state] CFI Enabled
3,275,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,966 UART: [rt]cmd =0x49444543, len=327
3,316,432 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,346 ready_for_fw is high
1,061,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,257 >>> mbox cmd response: success
2,623,257 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,685,629 UART:
2,685,645 UART: Running Caliptra FMC ...
2,686,053 UART:
2,686,196 UART: [state] CFI Enabled
2,696,877 UART: [fht] FMC Alias Private Key: 7
2,805,052 UART: [art] Extend RT PCRs Done
2,805,480 UART: [art] Lock RT PCRs Done
2,807,036 UART: [art] Populate DV Done
2,815,395 UART: [fht] FMC Alias Private Key: 7
2,816,557 UART: [art] Derive CDI
2,816,837 UART: [art] Store in in slot 0x4
2,902,346 UART: [art] Derive Key Pair
2,902,706 UART: [art] Store priv key in slot 0x5
2,916,752 UART: [art] Derive Key Pair - Done
2,931,479 UART: [art] Signing Cert with AUTHO
2,931,959 UART: RITY.KEYID = 7
2,947,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,774 UART: [art] PUB.X = B5F04A2635F4A20C1B2B48B3B781CEC0DAFD4EB074406B7E969C7A153274491DFA3E58BB03DE30070A37B0C6DADCB30B
2,954,547 UART: [art] PUB.Y = 776FA0411F7E682822B304AA3E5A56F3C6E3E2F207882CB657F5E6B637552B4393B33852F61160E87CF380EFE256E45F
2,961,489 UART: [art] SIG.R = 3C4741271ABEFF29E208660CE3DCFCCD48AFBE4D31F496E5E3436D63448F96401ADA7B32CE69F7C96D98255D5FA706A3
2,968,264 UART: [art] SIG.S = 91BEFE73AD13EC9ACD68E45385193685F8C07D26F2B2153FEB5FF17E9F0381B6577AA0DC8A380686788D74D29EEB7AEB
2,992,231 UART: Caliptra RT
2,992,576 UART: [state] CFI Enabled
3,101,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,840 UART: [rt]cmd =0x49444543, len=327
3,142,202 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
1,174,077 ready_for_fw is high
1,174,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,613 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,094 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,925 >>> mbox cmd response: success
2,768,925 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,770,188 UART: [afmc] ++
2,770,356 UART: [afmc] CDI.KEYID = 6
2,770,719 UART: [afmc] SUBJECT.KEYID = 7
2,771,145 UART: [afmc] AUTHORITY.KEYID = 5
2,806,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,607 UART: [afmc] --
2,849,653 UART: [cold-reset] --
2,850,749 UART: [state] Locking Datavault
2,851,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,264 UART: [state] Locking ICCM
2,852,896 UART: [exit] Launching FMC @ 0x40000130
2,858,225 UART:
2,858,241 UART: Running Caliptra FMC ...
2,858,649 UART:
2,858,703 UART: [state] CFI Enabled
2,868,906 UART: [fht] FMC Alias Private Key: 7
2,976,861 UART: [art] Extend RT PCRs Done
2,977,289 UART: [art] Lock RT PCRs Done
2,978,605 UART: [art] Populate DV Done
2,986,870 UART: [fht] FMC Alias Private Key: 7
2,987,984 UART: [art] Derive CDI
2,988,264 UART: [art] Store in in slot 0x4
3,073,781 UART: [art] Derive Key Pair
3,074,141 UART: [art] Store priv key in slot 0x5
3,087,577 UART: [art] Derive Key Pair - Done
3,101,954 UART: [art] Signing Cert with AUTHO
3,102,434 UART: RITY.KEYID = 7
3,117,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,465 UART: [art] PUB.X = DEDB811342FA18D7F738B451013BE00D0A420BF0A48A3F27A5BCB57AA30F59507FBBF575623CF8F12C321A1BD9556E76
3,125,232 UART: [art] PUB.Y = 5295A20C44A0048017F34E21255A6EB2623174B30395FF4CFB9F1A7B2E3502CC7D3E92B9B0AAFDEA77E9EA25A114E01D
3,132,180 UART: [art] SIG.R = 11C031424DBBF4B0B2B52E5171DAB03E6A1579B6B139DB1E35AE1A1B47FEE11D7255382AF42843DDD7900173DEC32EE2
3,138,959 UART: [art] SIG.S = 3009EBC72E03387B0182CE3DE24EFD843B8E606CC6FC572E40A4F1DE5B82B6DCCDBF8D2D78C18A9B097224549CA7CD62
3,163,276 UART: Caliptra RT
3,163,529 UART: [state] CFI Enabled
3,270,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,245 UART: [rt]cmd =0x49444543, len=327
3,311,853 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,742 ready_for_fw is high
1,055,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,957 >>> mbox cmd response: success
2,618,957 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,681,095 UART:
2,681,111 UART: Running Caliptra FMC ...
2,681,519 UART:
2,681,573 UART: [state] CFI Enabled
2,691,636 UART: [fht] FMC Alias Private Key: 7
2,799,751 UART: [art] Extend RT PCRs Done
2,800,179 UART: [art] Lock RT PCRs Done
2,801,535 UART: [art] Populate DV Done
2,809,608 UART: [fht] FMC Alias Private Key: 7
2,810,648 UART: [art] Derive CDI
2,810,928 UART: [art] Store in in slot 0x4
2,896,895 UART: [art] Derive Key Pair
2,897,255 UART: [art] Store priv key in slot 0x5
2,910,389 UART: [art] Derive Key Pair - Done
2,924,755 UART: [art] Signing Cert with AUTHO
2,925,235 UART: RITY.KEYID = 7
2,940,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,934 UART: [art] PUB.X = 93FEF745558130ACC5748F86954E9D450811B3ABCBE42D2FFC38334E6CEF49FF46734F3DED75D80925F84B3C2FB1895B
2,947,708 UART: [art] PUB.Y = 0D2A652DD8BE722836EDF4D479BD409094E80DB27094CCB4A4D98F2AB8317D3F1F89B5CF7C024D20028AFA60C9F59740
2,954,656 UART: [art] SIG.R = DC25589CEC6E75613DFEA6F5A80D66A25D38202953E5A00FC724DF25DEAF7593030BB0FDCE696F2A65976A00FF55B2E0
2,961,406 UART: [art] SIG.S = 446662DC7C46BE013F4645980A16C7134F9C9E26E830C0766D4EA1D36B37FB67F48CD5968FB889DC102B0E6C07177203
2,985,536 UART: Caliptra RT
2,985,789 UART: [state] CFI Enabled
3,093,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,571 UART: [rt]cmd =0x49444543, len=327
3,134,002 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,489 UART: [kat] HMAC-384Kdf
920,121 UART: [kat] LMS
1,168,433 UART: [kat] --
1,169,526 UART: [cold-reset] ++
1,169,964 UART: [fht] FHT @ 0x50003400
1,172,730 UART: [idev] ++
1,172,898 UART: [idev] CDI.KEYID = 6
1,173,259 UART: [idev] SUBJECT.KEYID = 7
1,173,684 UART: [idev] UDS.KEYID = 0
1,174,030 ready_for_fw is high
1,174,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,998 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,344 >>> mbox cmd response: success
2,769,344 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,770,545 UART: [afmc] ++
2,770,713 UART: [afmc] CDI.KEYID = 6
2,771,076 UART: [afmc] SUBJECT.KEYID = 7
2,771,502 UART: [afmc] AUTHORITY.KEYID = 5
2,807,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,327 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,664 UART: [afmc] --
2,850,704 UART: [cold-reset] --
2,851,516 UART: [state] Locking Datavault
2,852,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,511 UART: [state] Locking ICCM
2,854,073 UART: [exit] Launching FMC @ 0x40000130
2,859,402 UART:
2,859,418 UART: Running Caliptra FMC ...
2,859,826 UART:
2,859,969 UART: [state] CFI Enabled
2,870,530 UART: [fht] FMC Alias Private Key: 7
2,978,137 UART: [art] Extend RT PCRs Done
2,978,565 UART: [art] Lock RT PCRs Done
2,980,065 UART: [art] Populate DV Done
2,988,316 UART: [fht] FMC Alias Private Key: 7
2,989,324 UART: [art] Derive CDI
2,989,604 UART: [art] Store in in slot 0x4
3,075,433 UART: [art] Derive Key Pair
3,075,793 UART: [art] Store priv key in slot 0x5
3,089,551 UART: [art] Derive Key Pair - Done
3,104,434 UART: [art] Signing Cert with AUTHO
3,104,914 UART: RITY.KEYID = 7
3,120,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,229 UART: [art] PUB.X = 3D2B70A36F301B4C868083CF75AB63599002F5E08FCA412F75B1C7C7EA63D0EB240A6851F27D0D62E832AF2502B8CC8C
3,127,995 UART: [art] PUB.Y = 8B99637934E40FE929D10E1A38861DCD7DB990C106835035BABFCDDCADA8EC40DC43D63680B6F407733A894A1F036763
3,134,936 UART: [art] SIG.R = C3F3A5226703A63B5DE1533BD43E9A1F43EE4A3C25DC6E280090F5048F49BCEE6732F27B1F13567BB01B24F855F9F7E4
3,141,686 UART: [art] SIG.S = ACBADFF5109BF7C4EBD0F722DB752575A95FC189FB4C11120A86A31A464629E87C916B2319940448F9CD68E3749EB2B3
3,165,447 UART: Caliptra RT
3,165,792 UART: [state] CFI Enabled
3,273,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,361 UART: [rt]cmd =0x49444543, len=327
3,314,645 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,867 ready_for_fw is high
1,056,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,406 >>> mbox cmd response: success
2,621,406 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,684,378 UART:
2,684,394 UART: Running Caliptra FMC ...
2,684,802 UART:
2,684,945 UART: [state] CFI Enabled
2,695,944 UART: [fht] FMC Alias Private Key: 7
2,803,689 UART: [art] Extend RT PCRs Done
2,804,117 UART: [art] Lock RT PCRs Done
2,805,749 UART: [art] Populate DV Done
2,814,056 UART: [fht] FMC Alias Private Key: 7
2,815,158 UART: [art] Derive CDI
2,815,438 UART: [art] Store in in slot 0x4
2,900,787 UART: [art] Derive Key Pair
2,901,147 UART: [art] Store priv key in slot 0x5
2,914,317 UART: [art] Derive Key Pair - Done
2,929,052 UART: [art] Signing Cert with AUTHO
2,929,532 UART: RITY.KEYID = 7
2,944,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,473 UART: [art] PUB.X = D95D0BA8C527768550C7EF01993611B28FEC6419A086B299873EA7133EA3FF640BA2E03A0029297220B84E34E2EEE66F
2,952,212 UART: [art] PUB.Y = 29CBB9E4BDC784126F7410BAD6ED796CC4725FF975C8B8F5C896A15429A836DAD27DD96CF7A6EA77FF7521239B4F4A68
2,959,176 UART: [art] SIG.R = 0F183EE34D469862A072EC78CCA9AFC624636503325334C1A46FBCFB153C1C0C45CEBAB60829C6CADF9D6F75A1BCC1AF
2,965,954 UART: [art] SIG.S = 033CD2BEEAB36D6D46359C443EA4B62D8D76429B853FCC4652DC8EB7C375597205149EE9020F29B3335E50E9A7388040
2,989,987 UART: Caliptra RT
2,990,332 UART: [state] CFI Enabled
3,097,911 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,732 UART: [rt]cmd =0x49444543, len=327
3,139,228 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,061 UART:
192,431 UART: Running Caliptra ROM ...
193,912 UART:
194,067 UART: [state] CFI Enabled
266,924 UART: [state] LifecycleState = Unprovisioned
268,868 UART: [state] DebugLocked = No
270,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,338 UART: [kat] SHA2-256
445,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,581 UART: [kat] ++
456,068 UART: [kat] sha1
466,094 UART: [kat] SHA2-256
468,740 UART: [kat] SHA2-384
474,372 UART: [kat] SHA2-512-ACC
476,755 UART: [kat] ECC-384
2,768,181 UART: [kat] HMAC-384Kdf
2,800,894 UART: [kat] LMS
3,991,188 UART: [kat] --
3,993,851 UART: [cold-reset] ++
3,995,570 UART: [fht] Storing FHT @ 0x50003400
4,006,908 UART: [idev] ++
4,007,476 UART: [idev] CDI.KEYID = 6
4,008,364 UART: [idev] SUBJECT.KEYID = 7
4,009,610 UART: [idev] UDS.KEYID = 0
4,010,603 ready_for_fw is high
4,010,799 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,897 UART: [idev] Erasing UDS.KEYID = 0
7,349,307 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,219 UART: [idev] --
7,375,696 UART: [ldev] ++
7,376,285 UART: [ldev] CDI.KEYID = 6
7,377,301 UART: [ldev] SUBJECT.KEYID = 5
7,378,460 UART: [ldev] AUTHORITY.KEYID = 7
7,379,693 UART: [ldev] FE.KEYID = 1
7,423,297 UART: [ldev] Erasing FE.KEYID = 1
10,751,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,803 UART: [ldev] --
13,117,384 UART: [fwproc] Waiting for Commands...
13,120,554 UART: [fwproc] Received command 0x46574c44
13,122,738 UART: [fwproc] Received Image of size 113760 bytes
17,172,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,521 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,633,850 >>> mbox cmd response: success
17,634,360 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,638,163 UART: [afmc] ++
17,638,775 UART: [afmc] CDI.KEYID = 6
17,639,890 UART: [afmc] SUBJECT.KEYID = 7
17,641,126 UART: [afmc] AUTHORITY.KEYID = 5
21,010,410 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,388 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,831 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,614 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,067 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,317 UART: [afmc] --
23,381,286 UART: [cold-reset] --
23,386,275 UART: [state] Locking Datavault
23,388,889 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,640 UART: [state] Locking ICCM
23,393,473 UART: [exit] Launching FMC @ 0x40000130
23,401,868 UART:
23,402,109 UART: Running Caliptra FMC ...
23,403,139 UART:
23,403,289 UART: [state] CFI Enabled
23,470,481 UART: [fht] FMC Alias Private Key: 7
25,809,124 UART: [art] Extend RT PCRs Done
25,810,377 UART: [art] Lock RT PCRs Done
25,812,257 UART: [art] Populate DV Done
25,817,777 UART: [fht] FMC Alias Private Key: 7
25,819,369 UART: [art] Derive CDI
25,820,108 UART: [art] Store in in slot 0x4
25,879,057 UART: [art] Derive Key Pair
25,880,095 UART: [art] Store priv key in slot 0x5
29,173,312 UART: [art] Derive Key Pair - Done
29,186,129 UART: [art] Signing Cert with AUTHO
29,187,434 UART: RITY.KEYID = 7
31,474,851 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,359 UART: [art] PUB.X = 3D918F800012A0474EB3A8B35B9FEA17687089BEBCF572A882B88571E40CDADED3D66A8A0AB3CADCBC15D55F5CD6AF83
31,483,636 UART: [art] PUB.Y = C3519A8C2CC6B3E01E7AA093695B7174DA9DCC68091D5DCF642F46A1C6BA9D08B786E36F3F2D87C4EF58F9B150FBD0C1
31,490,927 UART: [art] SIG.R = 37B6DD5205AB51734383052C587A8F524855DFF5BA96941E998F72EA8ECEAEF9ED1FEF30576642CC2EBBBC4949383747
31,498,319 UART: [art] SIG.S = DB6A68DA4689AB006C37F90A68DA9DDDB7EC7E6D194EE73F84AF57E7AABF893E3AFF60ED4686E0396E9517A22F198713
32,803,587 UART: Caliptra RT
32,804,312 UART: [state] CFI Enabled
32,964,871 UART: [rt] RT listening for mailbox commands...
32,996,218 UART: [rt]cmd =0x4c444556, len=4
33,007,281 >>> mbox cmd response data (687 bytes)
33,048,980 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,078,982 UART: [rt]cmd =0x49444549, len=4
33,081,951 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,796,573 ready_for_fw is high
3,797,123 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,858,093 >>> mbox cmd response: success
17,858,919 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,557,173 UART:
23,557,546 UART: Running Caliptra FMC ...
23,558,655 UART:
23,558,810 UART: [state] CFI Enabled
23,628,771 UART: [fht] FMC Alias Private Key: 7
25,966,537 UART: [art] Extend RT PCRs Done
25,967,760 UART: [art] Lock RT PCRs Done
25,969,469 UART: [art] Populate DV Done
25,975,039 UART: [fht] FMC Alias Private Key: 7
25,976,689 UART: [art] Derive CDI
25,977,427 UART: [art] Store in in slot 0x4
26,037,519 UART: [art] Derive Key Pair
26,038,587 UART: [art] Store priv key in slot 0x5
29,331,641 UART: [art] Derive Key Pair - Done
29,344,535 UART: [art] Signing Cert with AUTHO
29,345,848 UART: RITY.KEYID = 7
31,633,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,182 UART: [art] PUB.X = 94A49252A7B0061D88BDD1D2B9A8E0DAE3D79EC94CDEC0972DC51796E8BAB93E142C2AC2E83E40C8DD85C344248B8B3C
31,642,471 UART: [art] PUB.Y = EDE3809928A4A2AAD73C239346FD33D068CE265BFBECF33AD9110FE29593281AC8439988D2DCA625442B2C25C2CAFBB7
31,649,734 UART: [art] SIG.R = F4E7AB1F0F3433BC76B0C0F2A0CEF7C369F3B09F1162144ABCA20A4269FA8C5F00C5DF1792124C26D5E8719C6B4526D5
31,657,083 UART: [art] SIG.S = 0E87AA6E932BDF22A4DBA3C4FF9FE099FF685B0FD4E5C0C5820263D9953DA03A6DE5F0F08DD75721F854D3F43852669C
32,962,040 UART: Caliptra RT
32,962,750 UART: [state] CFI Enabled
33,123,586 UART: [rt] RT listening for mailbox commands...
33,154,888 UART: [rt]cmd =0x4c444556, len=4
33,165,974 >>> mbox cmd response data (687 bytes)
33,207,501 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,237,490 UART: [rt]cmd =0x49444549, len=4
33,240,112 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
192,818 UART:
193,176 UART: Running Caliptra ROM ...
194,270 UART:
604,023 UART: [state] CFI Enabled
619,274 UART: [state] LifecycleState = Unprovisioned
621,216 UART: [state] DebugLocked = No
622,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,529 UART: [kat] SHA2-256
797,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,838 UART: [kat] ++
808,282 UART: [kat] sha1
818,765 UART: [kat] SHA2-256
821,487 UART: [kat] SHA2-384
828,038 UART: [kat] SHA2-512-ACC
830,402 UART: [kat] ECC-384
3,112,175 UART: [kat] HMAC-384Kdf
3,123,140 UART: [kat] LMS
4,313,222 UART: [kat] --
4,319,949 UART: [cold-reset] ++
4,322,170 UART: [fht] Storing FHT @ 0x50003400
4,333,571 UART: [idev] ++
4,334,130 UART: [idev] CDI.KEYID = 6
4,335,105 UART: [idev] SUBJECT.KEYID = 7
4,336,347 UART: [idev] UDS.KEYID = 0
4,337,411 ready_for_fw is high
4,337,625 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,968 UART: [idev] Erasing UDS.KEYID = 0
7,625,957 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,755 UART: [idev] --
7,650,993 UART: [ldev] ++
7,651,567 UART: [ldev] CDI.KEYID = 6
7,652,533 UART: [ldev] SUBJECT.KEYID = 5
7,653,759 UART: [ldev] AUTHORITY.KEYID = 7
7,655,040 UART: [ldev] FE.KEYID = 1
7,667,417 UART: [ldev] Erasing FE.KEYID = 1
10,954,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,882 UART: [ldev] --
13,313,116 UART: [fwproc] Waiting for Commands...
13,315,858 UART: [fwproc] Received command 0x46574c44
13,318,086 UART: [fwproc] Received Image of size 113760 bytes
17,363,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,898 >>> mbox cmd response: success
17,831,425 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,834,637 UART: [afmc] ++
17,835,251 UART: [afmc] CDI.KEYID = 6
17,836,128 UART: [afmc] SUBJECT.KEYID = 7
17,837,394 UART: [afmc] AUTHORITY.KEYID = 5
21,154,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,238 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,493 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,895 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,710 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,146 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,136 UART: [afmc] --
23,519,333 UART: [cold-reset] --
23,522,657 UART: [state] Locking Datavault
23,529,305 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,064 UART: [state] Locking ICCM
23,532,743 UART: [exit] Launching FMC @ 0x40000130
23,541,137 UART:
23,541,370 UART: Running Caliptra FMC ...
23,542,468 UART:
23,542,622 UART: [state] CFI Enabled
23,550,718 UART: [fht] FMC Alias Private Key: 7
25,881,174 UART: [art] Extend RT PCRs Done
25,882,391 UART: [art] Lock RT PCRs Done
25,884,117 UART: [art] Populate DV Done
25,889,635 UART: [fht] FMC Alias Private Key: 7
25,891,329 UART: [art] Derive CDI
25,892,141 UART: [art] Store in in slot 0x4
25,934,571 UART: [art] Derive Key Pair
25,935,604 UART: [art] Store priv key in slot 0x5
29,177,357 UART: [art] Derive Key Pair - Done
29,190,452 UART: [art] Signing Cert with AUTHO
29,191,770 UART: RITY.KEYID = 7
31,470,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,488 UART: [art] PUB.X = 659D136B7D3CE2A9BEF6F8D09A3C05CB51B738AB393B54EABFEBF3BAF9F30B3D2B680F7CC2D7488B2E619334F9B14C38
31,479,756 UART: [art] PUB.Y = EFAEF91CE012BFFE1FD30346808042DA9EF76939986FD13B3814ACF45C3E217A3F3F4A2B5400F222435FD53D83563136
31,486,999 UART: [art] SIG.R = E06A3E2D80A8D4A5A3FFD75AC7E9464C12AEC3E64717FF49411B96C75139ABA799290F93F594ECBEE6F0663016F83ADE
31,494,412 UART: [art] SIG.S = 11EC9FF0B282FD9A72F53556EDB8FB86A9DE093D480C8D6D12BB25D8E5A870A3F7A61F5397EEC95C0D912A3962E492EF
32,798,990 UART: Caliptra RT
32,799,704 UART: [state] CFI Enabled
32,917,744 UART: [rt] RT listening for mailbox commands...
32,949,078 UART: [rt]cmd =0x4c444556, len=4
32,960,122 >>> mbox cmd response data (687 bytes)
33,001,143 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,031,086 UART: [rt]cmd =0x49444549, len=4
33,033,906 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
4,129,974 ready_for_fw is high
4,130,479 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,593 >>> mbox cmd response: success
18,070,430 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,707,259 UART:
23,707,642 UART: Running Caliptra FMC ...
23,708,779 UART:
23,708,929 UART: [state] CFI Enabled
23,716,654 UART: [fht] FMC Alias Private Key: 7
26,047,237 UART: [art] Extend RT PCRs Done
26,048,470 UART: [art] Lock RT PCRs Done
26,050,075 UART: [art] Populate DV Done
26,055,543 UART: [fht] FMC Alias Private Key: 7
26,057,139 UART: [art] Derive CDI
26,057,876 UART: [art] Store in in slot 0x4
26,100,593 UART: [art] Derive Key Pair
26,101,593 UART: [art] Store priv key in slot 0x5
29,344,144 UART: [art] Derive Key Pair - Done
29,357,365 UART: [art] Signing Cert with AUTHO
29,358,673 UART: RITY.KEYID = 7
31,638,570 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,074 UART: [art] PUB.X = 06230EC49CEBC19FE4563F774D7D418FF6872ABB27FAED7C5CEE2E380770A88AEC7E5DDD943F51C476E9399542CA9C4B
31,647,355 UART: [art] PUB.Y = 115FCC3CC47BA8AF79D6D93232B72DD71117061E2FA978325CBC0DE4E408C61D4134CF3DDF98BB3743928FEF26459C3D
31,654,614 UART: [art] SIG.R = 72D3944710C76F60B5E3387D75FE79CD45181EDC330179B3D896037722D2457F8045F959BF0AD861A743FA4A37B483F6
31,661,932 UART: [art] SIG.S = 74D501BE4A0422197960F8AB5DC2CC606434B6530A606FCE85D92767BF5A86ADDE457D44C257CF1F3EB957A0C6C9C3F8
32,967,091 UART: Caliptra RT
32,967,819 UART: [state] CFI Enabled
33,085,679 UART: [rt] RT listening for mailbox commands...
33,116,998 UART: [rt]cmd =0x4c444556, len=4
33,128,246 >>> mbox cmd response data (687 bytes)
33,169,456 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,199,541 UART: [rt]cmd =0x49444549, len=4
33,202,348 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,536 UART:
192,918 UART: Running Caliptra ROM ...
194,059 UART:
194,210 UART: [state] CFI Enabled
262,392 UART: [state] LifecycleState = Unprovisioned
264,296 UART: [state] DebugLocked = No
267,104 UART: [state] WD Timer not started. Device not locked for debugging
271,414 UART: [kat] SHA2-256
450,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,138 UART: [kat] ++
462,674 UART: [kat] sha1
473,199 UART: [kat] SHA2-256
476,280 UART: [kat] SHA2-384
483,115 UART: [kat] SHA2-512-ACC
486,114 UART: [kat] ECC-384
2,949,472 UART: [kat] HMAC-384Kdf
2,972,080 UART: [kat] LMS
3,501,522 UART: [kat] --
3,505,817 UART: [cold-reset] ++
3,508,382 UART: [fht] FHT @ 0x50003400
3,520,995 UART: [idev] ++
3,521,553 UART: [idev] CDI.KEYID = 6
3,522,456 UART: [idev] SUBJECT.KEYID = 7
3,523,625 UART: [idev] UDS.KEYID = 0
3,524,667 ready_for_fw is high
3,524,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,365 UART: [idev] Erasing UDS.KEYID = 0
6,028,826 UART: [idev] Sha1 KeyId Algorithm
6,051,149 UART: [idev] --
6,055,667 UART: [ldev] ++
6,056,251 UART: [ldev] CDI.KEYID = 6
6,057,185 UART: [ldev] SUBJECT.KEYID = 5
6,058,341 UART: [ldev] AUTHORITY.KEYID = 7
6,059,567 UART: [ldev] FE.KEYID = 1
6,101,537 UART: [ldev] Erasing FE.KEYID = 1
8,603,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,599 UART: [ldev] --
10,414,322 UART: [fwproc] Wait for Commands...
10,416,623 UART: [fwproc] Recv command 0x46574c44
10,418,706 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,278,862 >>> mbox cmd response: success
14,279,363 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,283,809 UART: [afmc] ++
14,284,390 UART: [afmc] CDI.KEYID = 6
14,285,301 UART: [afmc] SUBJECT.KEYID = 7
14,286,455 UART: [afmc] AUTHORITY.KEYID = 5
16,829,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,970 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,811 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,593 UART: [afmc] --
18,628,868 UART: [cold-reset] --
18,633,758 UART: [state] Locking Datavault
18,639,647 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,359 UART: [state] Locking ICCM
18,643,132 UART: [exit] Launching FMC @ 0x40000130
18,651,585 UART:
18,651,825 UART: Running Caliptra FMC ...
18,652,926 UART:
18,653,083 UART: [state] CFI Enabled
18,710,017 UART: [fht] FMC Alias Private Key: 7
20,474,073 UART: [art] Extend RT PCRs Done
20,475,295 UART: [art] Lock RT PCRs Done
20,476,975 UART: [art] Populate DV Done
20,482,167 UART: [fht] FMC Alias Private Key: 7
20,483,645 UART: [art] Derive CDI
20,484,401 UART: [art] Store in in slot 0x4
20,542,383 UART: [art] Derive Key Pair
20,543,424 UART: [art] Store priv key in slot 0x5
23,006,171 UART: [art] Derive Key Pair - Done
23,019,057 UART: [art] Signing Cert with AUTHO
23,020,384 UART: RITY.KEYID = 7
24,731,365 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,876 UART: [art] PUB.X = BE3FF08B55F4F8E76A1D2DF9D73790A1D4B364B27C01C261F23F2AF6A8AE26376D7DC516286E7D8A88633307B6ECF242
24,740,157 UART: [art] PUB.Y = E951472B876BD5FD202E5B8042199363CEEA751163B6CADCF46B6E0CE51CB1B6DB461D9145812D4C6CE502002C6D734A
24,747,420 UART: [art] SIG.R = 08E7797669286A5793D2167B04F7C26D496D004015567F0F4C39AB52955EF4AE44BC7F6F7CE4C9453924CC08D9D89409
24,754,742 UART: [art] SIG.S = 662F359F977395BF1BCC2D192315DEE75F1F75C54909E5D168A4926541B6E6334344E2234C00473FED6CF90702ECB3B6
25,733,605 UART: Caliptra RT
25,734,305 UART: [state] CFI Enabled
25,898,095 UART: [rt] RT listening for mailbox commands...
25,929,457 UART: [rt]cmd =0x4c444556, len=4
25,940,542 >>> mbox cmd response data (687 bytes)
25,982,069 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,012,344 UART: [rt]cmd =0x49444549, len=4
26,015,174 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
3,380,366 ready_for_fw is high
3,380,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,041 >>> mbox cmd response: success
14,070,747 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,364,185 UART:
18,364,590 UART: Running Caliptra FMC ...
18,365,786 UART:
18,365,948 UART: [state] CFI Enabled
18,432,019 UART: [fht] FMC Alias Private Key: 7
20,195,915 UART: [art] Extend RT PCRs Done
20,197,129 UART: [art] Lock RT PCRs Done
20,199,102 UART: [art] Populate DV Done
20,204,566 UART: [fht] FMC Alias Private Key: 7
20,206,313 UART: [art] Derive CDI
20,207,120 UART: [art] Store in in slot 0x4
20,264,353 UART: [art] Derive Key Pair
20,265,403 UART: [art] Store priv key in slot 0x5
22,728,469 UART: [art] Derive Key Pair - Done
22,741,588 UART: [art] Signing Cert with AUTHO
22,742,890 UART: RITY.KEYID = 7
24,454,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,508 UART: [art] PUB.X = 78FB0CED5D0AB116D63CD27082F3790943D2B6A3C9B0255AC7AB0B9169EA5C24A6F19EAD331D48A2AB555CC14CE97C7D
24,463,436 UART: [art] PUB.Y = 9244556BC62BB5C763F34FE21C89BF3F8B9424B62B7FC945C6EFE21DDD6797D895485CA1088247DF4F9902F76AA9BEBD
24,470,663 UART: [art] SIG.R = 8C085344026E042163713299F16561C9F56C0CF6D6E8CA7E19AFAABFC4505DDCE603176A5775723B74C123FC2F541350
24,478,046 UART: [art] SIG.S = E092F6B47B39FD7BDE0F0147C57A24F09B8BDB98B94C0BB7E66B708476D84964AC02E385170ACCC43EC65D05E16FBB95
25,456,614 UART: Caliptra RT
25,457,314 UART: [state] CFI Enabled
25,622,147 UART: [rt] RT listening for mailbox commands...
25,653,536 UART: [rt]cmd =0x4c444556, len=4
25,664,743 >>> mbox cmd response data (687 bytes)
25,705,348 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,735,151 UART: [rt]cmd =0x49444549, len=4
25,737,733 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
192,961 UART:
193,336 UART: Running Caliptra ROM ...
194,454 UART:
604,026 UART: [state] CFI Enabled
615,772 UART: [state] LifecycleState = Unprovisioned
617,576 UART: [state] DebugLocked = No
619,240 UART: [state] WD Timer not started. Device not locked for debugging
622,136 UART: [kat] SHA2-256
801,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,813 UART: [kat] ++
813,357 UART: [kat] sha1
824,383 UART: [kat] SHA2-256
827,458 UART: [kat] SHA2-384
833,803 UART: [kat] SHA2-512-ACC
836,737 UART: [kat] ECC-384
3,278,168 UART: [kat] HMAC-384Kdf
3,290,263 UART: [kat] LMS
3,819,734 UART: [kat] --
3,823,553 UART: [cold-reset] ++
3,825,492 UART: [fht] FHT @ 0x50003400
3,835,122 UART: [idev] ++
3,835,691 UART: [idev] CDI.KEYID = 6
3,836,600 UART: [idev] SUBJECT.KEYID = 7
3,837,775 UART: [idev] UDS.KEYID = 0
3,838,697 ready_for_fw is high
3,838,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,205 UART: [idev] Erasing UDS.KEYID = 0
6,308,484 UART: [idev] Sha1 KeyId Algorithm
6,330,264 UART: [idev] --
6,333,505 UART: [ldev] ++
6,334,075 UART: [ldev] CDI.KEYID = 6
6,334,996 UART: [ldev] SUBJECT.KEYID = 5
6,336,158 UART: [ldev] AUTHORITY.KEYID = 7
6,337,468 UART: [ldev] FE.KEYID = 1
6,349,523 UART: [ldev] Erasing FE.KEYID = 1
8,825,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,447 UART: [ldev] --
10,618,122 UART: [fwproc] Wait for Commands...
10,620,487 UART: [fwproc] Recv command 0x46574c44
10,622,574 UART: [fwproc] Recv'd Img size: 114084 bytes
14,017,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,743 >>> mbox cmd response: success
14,476,297 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,479,779 UART: [afmc] ++
14,480,384 UART: [afmc] CDI.KEYID = 6
14,481,301 UART: [afmc] SUBJECT.KEYID = 7
14,482,471 UART: [afmc] AUTHORITY.KEYID = 5
16,981,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,771,447 UART: [afmc] --
18,775,701 UART: [cold-reset] --
18,779,182 UART: [state] Locking Datavault
18,784,641 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,287 UART: [state] Locking ICCM
18,788,867 UART: [exit] Launching FMC @ 0x40000130
18,797,262 UART:
18,797,520 UART: Running Caliptra FMC ...
18,798,629 UART:
18,798,789 UART: [state] CFI Enabled
18,806,784 UART: [fht] FMC Alias Private Key: 7
20,563,663 UART: [art] Extend RT PCRs Done
20,564,881 UART: [art] Lock RT PCRs Done
20,566,029 UART: [art] Populate DV Done
20,571,610 UART: [fht] FMC Alias Private Key: 7
20,573,148 UART: [art] Derive CDI
20,573,964 UART: [art] Store in in slot 0x4
20,616,668 UART: [art] Derive Key Pair
20,617,712 UART: [art] Store priv key in slot 0x5
23,044,801 UART: [art] Derive Key Pair - Done
23,057,850 UART: [art] Signing Cert with AUTHO
23,059,156 UART: RITY.KEYID = 7
24,764,870 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,404 UART: [art] PUB.X = 0AA0DC2BE061CE1B40AD57A57CBCF79BB95E37A622B851C5236D334177678500743DD5C434C4216BB9BC39F9BC464EAB
24,773,677 UART: [art] PUB.Y = EBC4F3E58DE6DABFE913732DD42007E466B346D4CBA65B56CBD204050C1A0970CC38E67BE9A0E4D80F8FF41F3596329F
24,780,933 UART: [art] SIG.R = 64D1F33A2424CC2451CC84DB287ED44CCE58973A3192DECA1B0902BE8FA088EDCF40827DFB0AC0905A66634F3FB38CB8
24,788,355 UART: [art] SIG.S = 50F38D03BBF4DED107881886055F350F805E40824DD2A5CD266FF5C2509C39EBA129B6F46A706A0F7462FE74443DFA33
25,767,686 UART: Caliptra RT
25,768,390 UART: [state] CFI Enabled
25,885,030 UART: [rt] RT listening for mailbox commands...
25,916,342 UART: [rt]cmd =0x4c444556, len=4
25,927,370 >>> mbox cmd response data (687 bytes)
25,968,808 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,998,499 UART: [rt]cmd =0x49444549, len=4
26,001,202 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,936 writing to cptra_bootfsm_go
3,697,711 ready_for_fw is high
3,698,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,131 >>> mbox cmd response: success
14,267,893 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,517,280 UART:
18,517,668 UART: Running Caliptra FMC ...
18,518,770 UART:
18,518,920 UART: [state] CFI Enabled
18,526,605 UART: [fht] FMC Alias Private Key: 7
20,283,068 UART: [art] Extend RT PCRs Done
20,284,294 UART: [art] Lock RT PCRs Done
20,285,802 UART: [art] Populate DV Done
20,291,318 UART: [fht] FMC Alias Private Key: 7
20,292,859 UART: [art] Derive CDI
20,293,593 UART: [art] Store in in slot 0x4
20,336,735 UART: [art] Derive Key Pair
20,337,780 UART: [art] Store priv key in slot 0x5
22,764,628 UART: [art] Derive Key Pair - Done
22,777,189 UART: [art] Signing Cert with AUTHO
22,778,500 UART: RITY.KEYID = 7
24,484,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,115 UART: [art] PUB.X = 9B53DA00F84EEADA8DBA2AB1E6BDCC62E0C4AC110B74C2287D5D3C8C822334F6A4DBC2F564619E65D7C70709BC7C8C88
24,493,382 UART: [art] PUB.Y = B8DA24B011AA6A02F7A9FBAA29A8A2E0A78849AAD17FAD52A5DF275819778F9DE93F2CD57831892C257C8E69FB22EE6F
24,500,657 UART: [art] SIG.R = 9DCD8BD9D3AF9FF117A2C139CAA8675ED65E222346536B4621768E633DEC6A6177D0065C1F465DBD43F0CCF727458078
24,508,078 UART: [art] SIG.S = 99857B175ED3D393CF731E69A30CD6A143CCD99D49BA0542BD0203344822635BFD66368DE1E2F334B967D813C49E6875
25,487,288 UART: Caliptra RT
25,488,001 UART: [state] CFI Enabled
25,605,385 UART: [rt] RT listening for mailbox commands...
25,636,855 UART: [rt]cmd =0x4c444556, len=4
25,647,782 >>> mbox cmd response data (687 bytes)
25,688,904 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,719,139 UART: [rt]cmd =0x49444549, len=4
25,721,788 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,569 UART:
192,929 UART: Running Caliptra ROM ...
194,119 UART:
194,271 UART: [state] CFI Enabled
261,033 UART: [state] LifecycleState = Unprovisioned
263,444 UART: [state] DebugLocked = No
266,180 UART: [state] WD Timer not started. Device not locked for debugging
271,647 UART: [kat] SHA2-256
461,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,249 UART: [kat] ++
472,739 UART: [kat] sha1
484,430 UART: [kat] SHA2-256
487,445 UART: [kat] SHA2-384
493,098 UART: [kat] SHA2-512-ACC
495,685 UART: [kat] ECC-384
2,946,114 UART: [kat] HMAC-384Kdf
2,971,156 UART: [kat] LMS
3,502,989 UART: [kat] --
3,508,056 UART: [cold-reset] ++
3,509,488 UART: [fht] FHT @ 0x50003400
3,521,178 UART: [idev] ++
3,521,886 UART: [idev] CDI.KEYID = 6
3,522,794 UART: [idev] SUBJECT.KEYID = 7
3,524,036 UART: [idev] UDS.KEYID = 0
3,524,963 ready_for_fw is high
3,525,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,630 UART: [idev] Erasing UDS.KEYID = 0
6,050,957 UART: [idev] Sha1 KeyId Algorithm
6,073,976 UART: [idev] --
6,079,638 UART: [ldev] ++
6,080,338 UART: [ldev] CDI.KEYID = 6
6,081,259 UART: [ldev] SUBJECT.KEYID = 5
6,082,422 UART: [ldev] AUTHORITY.KEYID = 7
6,083,623 UART: [ldev] FE.KEYID = 1
6,119,161 UART: [ldev] Erasing FE.KEYID = 1
8,623,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,360,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,376,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,391,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,406,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,074 UART: [ldev] --
10,432,499 UART: [fwproc] Wait for Commands...
10,434,800 UART: [fwproc] Recv command 0x46574c44
10,437,105 UART: [fwproc] Recv'd Img size: 114084 bytes
13,888,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,079,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,620,798 >>> mbox cmd response: success
14,621,309 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,625,723 UART: [afmc] ++
14,626,458 UART: [afmc] CDI.KEYID = 6
14,627,651 UART: [afmc] SUBJECT.KEYID = 7
14,629,095 UART: [afmc] AUTHORITY.KEYID = 5
17,172,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,576 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,298 UART: [afmc] --
18,970,165 UART: [cold-reset] --
18,972,914 UART: [state] Locking Datavault
18,978,068 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,229 UART: [state] Locking ICCM
18,982,925 UART: [exit] Launching FMC @ 0x40000130
18,991,565 UART:
18,991,795 UART: Running Caliptra FMC ...
18,992,894 UART:
18,993,053 UART: [state] CFI Enabled
19,052,183 UART: [fht] FMC Alias Private Key: 7
20,816,377 UART: [art] Extend RT PCRs Done
20,817,606 UART: [art] Lock RT PCRs Done
20,819,285 UART: [art] Populate DV Done
20,824,805 UART: [fht] FMC Alias Private Key: 7
20,826,293 UART: [art] Derive CDI
20,827,053 UART: [art] Store in in slot 0x4
20,885,314 UART: [art] Derive Key Pair
20,886,373 UART: [art] Store priv key in slot 0x5
23,349,620 UART: [art] Derive Key Pair - Done
23,362,401 UART: [art] Signing Cert with AUTHO
23,363,705 UART: RITY.KEYID = 7
25,075,653 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,164 UART: [art] PUB.X = 9FCECAF5BF6768B879861BC12716E50417B3842C11DB6E3F08AE7CB605E176E5DEB18242C6B3076077C4E8149521963A
25,084,386 UART: [art] PUB.Y = 2A28ADF21F1A94B783E3E7386352425CB4D7935783DE7DC3A40242C1C0712DBE9B0998AECA3A191BAA8ED452197D51BC
25,091,641 UART: [art] SIG.R = DA5E4A887CBE161D10FDB68569E0711E6567ED919C144BAD70093C849FE7045642EC85140766F1B293ADC963F17BCC6B
25,099,056 UART: [art] SIG.S = 0F2FA44392D55C8168F6725082E79C2B427B7DB2BA465BAE1F85D8A998059031F09133996038F71E4D59C334F8FCC8E3
26,078,224 UART: Caliptra RT
26,078,934 UART: [state] CFI Enabled
26,244,303 UART: [rt] RT listening for mailbox commands...
26,275,666 UART: [rt]cmd =0x4c444556, len=4
26,286,863 >>> mbox cmd response data (687 bytes)
26,328,375 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,358,406 UART: [rt]cmd =0x49444549, len=4
26,361,114 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,439,507 ready_for_fw is high
3,439,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,735,178 >>> mbox cmd response: success
14,736,060 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,050,197 UART:
19,050,591 UART: Running Caliptra FMC ...
19,051,700 UART:
19,051,855 UART: [state] CFI Enabled
19,116,362 UART: [fht] FMC Alias Private Key: 7
20,880,121 UART: [art] Extend RT PCRs Done
20,881,359 UART: [art] Lock RT PCRs Done
20,883,062 UART: [art] Populate DV Done
20,888,705 UART: [fht] FMC Alias Private Key: 7
20,890,262 UART: [art] Derive CDI
20,891,083 UART: [art] Store in in slot 0x4
20,948,276 UART: [art] Derive Key Pair
20,949,315 UART: [art] Store priv key in slot 0x5
23,411,642 UART: [art] Derive Key Pair - Done
23,424,652 UART: [art] Signing Cert with AUTHO
23,425,957 UART: RITY.KEYID = 7
25,137,368 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,870 UART: [art] PUB.X = F2C2B2234B5D63096345AE6423901D8DD6C3F4E04D3AEAE7932A69BE426E6E022FE391D3509B39A7495B6EEC91896962
25,146,142 UART: [art] PUB.Y = 7A7FF68A640FADDFA079DD8C0A7487A5A987723B28BD3F69D88590EE810284D9E1D24866F8D3415AE980CEABEC3E86A5
25,153,387 UART: [art] SIG.R = 147CDC79BAD3F29433C52DE7468AD72A608F13AD6673EC7AAE923C9820A904A71CC49ACB73604E08B506E06546BB6A9A
25,160,804 UART: [art] SIG.S = 6C36378B5E9A2225FAE425115DF9B5DA3A9968466D55105670192302E97FD2FA536E7372BF10DF5639F39F88BCA1455C
26,139,406 UART: Caliptra RT
26,140,093 UART: [state] CFI Enabled
26,304,707 UART: [rt] RT listening for mailbox commands...
26,336,179 UART: [rt]cmd =0x4c444556, len=4
26,347,446 >>> mbox cmd response data (687 bytes)
26,389,339 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,419,333 UART: [rt]cmd =0x49444549, len=4
26,422,080 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,703 writing to cptra_bootfsm_go
192,935 UART:
193,474 UART: Running Caliptra ROM ...
194,599 UART:
604,166 UART: [state] CFI Enabled
619,174 UART: [state] LifecycleState = Unprovisioned
621,552 UART: [state] DebugLocked = No
624,012 UART: [state] WD Timer not started. Device not locked for debugging
628,139 UART: [kat] SHA2-256
818,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,837 UART: [kat] ++
829,381 UART: [kat] sha1
841,970 UART: [kat] SHA2-256
844,976 UART: [kat] SHA2-384
851,674 UART: [kat] SHA2-512-ACC
854,255 UART: [kat] ECC-384
3,295,116 UART: [kat] HMAC-384Kdf
3,307,572 UART: [kat] LMS
3,839,399 UART: [kat] --
3,843,035 UART: [cold-reset] ++
3,843,973 UART: [fht] FHT @ 0x50003400
3,855,112 UART: [idev] ++
3,855,859 UART: [idev] CDI.KEYID = 6
3,856,777 UART: [idev] SUBJECT.KEYID = 7
3,857,952 UART: [idev] UDS.KEYID = 0
3,858,894 ready_for_fw is high
3,859,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,316 UART: [idev] Erasing UDS.KEYID = 0
6,334,431 UART: [idev] Sha1 KeyId Algorithm
6,357,837 UART: [idev] --
6,362,593 UART: [ldev] ++
6,363,280 UART: [ldev] CDI.KEYID = 6
6,364,193 UART: [ldev] SUBJECT.KEYID = 5
6,365,355 UART: [ldev] AUTHORITY.KEYID = 7
6,366,588 UART: [ldev] FE.KEYID = 1
6,377,668 UART: [ldev] Erasing FE.KEYID = 1
8,853,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,976 UART: [ldev] --
10,645,134 UART: [fwproc] Wait for Commands...
10,647,283 UART: [fwproc] Recv command 0x46574c44
10,649,594 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,827,322 >>> mbox cmd response: success
14,827,835 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,831,215 UART: [afmc] ++
14,831,961 UART: [afmc] CDI.KEYID = 6
14,833,150 UART: [afmc] SUBJECT.KEYID = 7
14,834,591 UART: [afmc] AUTHORITY.KEYID = 5
17,340,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,851 UART: [afmc] --
19,136,591 UART: [cold-reset] --
19,141,417 UART: [state] Locking Datavault
19,145,064 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,227 UART: [state] Locking ICCM
19,149,926 UART: [exit] Launching FMC @ 0x40000130
19,158,608 UART:
19,158,846 UART: Running Caliptra FMC ...
19,159,949 UART:
19,160,116 UART: [state] CFI Enabled
19,168,136 UART: [fht] FMC Alias Private Key: 7
20,924,378 UART: [art] Extend RT PCRs Done
20,925,596 UART: [art] Lock RT PCRs Done
20,927,026 UART: [art] Populate DV Done
20,932,239 UART: [fht] FMC Alias Private Key: 7
20,933,836 UART: [art] Derive CDI
20,934,655 UART: [art] Store in in slot 0x4
20,977,308 UART: [art] Derive Key Pair
20,978,344 UART: [art] Store priv key in slot 0x5
23,405,002 UART: [art] Derive Key Pair - Done
23,417,678 UART: [art] Signing Cert with AUTHO
23,418,982 UART: RITY.KEYID = 7
25,124,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,050 UART: [art] PUB.X = C81DA0184BDBD749B679D31AEFF764776C6742A2B3C89A52BBF58BCDE95A8EACC41A878485DF306C09A45BB08EBD9ED2
25,133,327 UART: [art] PUB.Y = 0682A39A0544C24FB19F484B0073520B6DBA8E67C0FBE52482816E2027F8E705025B2C66CE4FAF2F75086E69EB3B8D93
25,140,563 UART: [art] SIG.R = 352D534D99C15796DE6F9BAFA1CB0DC556CD1DE97888508D405DA305FB864F01DC6F3025095FDCB460C88A3A62E2893C
25,147,945 UART: [art] SIG.S = 98DBD70B66E92BC9FB21BFBF520A1015447D88944C743D07691C13553F1E6D3603D839248BA262CC435FA66D00ADB1E2
26,127,135 UART: Caliptra RT
26,127,854 UART: [state] CFI Enabled
26,244,833 UART: [rt] RT listening for mailbox commands...
26,276,458 UART: [rt]cmd =0x4c444556, len=4
26,287,410 >>> mbox cmd response data (687 bytes)
26,328,780 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,358,716 UART: [rt]cmd =0x49444549, len=4
26,361,551 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
3,752,351 ready_for_fw is high
3,752,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,959,006 >>> mbox cmd response: success
14,959,637 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,216,924 UART:
19,217,312 UART: Running Caliptra FMC ...
19,218,502 UART:
19,218,693 UART: [state] CFI Enabled
19,226,544 UART: [fht] FMC Alias Private Key: 7
20,983,005 UART: [art] Extend RT PCRs Done
20,984,247 UART: [art] Lock RT PCRs Done
20,986,122 UART: [art] Populate DV Done
20,991,604 UART: [fht] FMC Alias Private Key: 7
20,993,102 UART: [art] Derive CDI
20,993,870 UART: [art] Store in in slot 0x4
21,035,928 UART: [art] Derive Key Pair
21,036,939 UART: [art] Store priv key in slot 0x5
23,463,885 UART: [art] Derive Key Pair - Done
23,477,208 UART: [art] Signing Cert with AUTHO
23,478,516 UART: RITY.KEYID = 7
25,184,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,589 UART: [art] PUB.X = 3B1604D9B75EFD72355902778C9D8807E95D983F7B360861CB0DD08ED9926DB45BD31630C05217D748E0ACAA46D683F8
25,192,831 UART: [art] PUB.Y = 6A3BBF9612CF7A696CC7595D1C12BB01773CE724A7488248A37E7B853DCCD1CD58DBEE70E2082A902132A56EFE2C4AA3
25,200,121 UART: [art] SIG.R = 77C89495DC01CF3A29175021DFDE7622907B556FC05AEE3D51DFC1190BC8FA7B0EA89F88ECC5ADF719F572FC8F923148
25,207,548 UART: [art] SIG.S = 5DCDFC446144354DC5B2833FAA6F101807390F11A49ADC67AD2C5306945AF0C41DC06721FAEE9F6EB16BAD83331F9BB0
26,187,239 UART: Caliptra RT
26,187,930 UART: [state] CFI Enabled
26,305,584 UART: [rt] RT listening for mailbox commands...
26,336,929 UART: [rt]cmd =0x4c444556, len=4
26,347,882 >>> mbox cmd response data (687 bytes)
26,388,939 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,418,724 UART: [rt]cmd =0x49444549, len=4
26,421,458 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,231 UART: [kat] SHA2-256
882,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,277 UART: [kat] ++
886,429 UART: [kat] sha1
890,781 UART: [kat] SHA2-256
892,719 UART: [kat] SHA2-384
895,690 UART: [kat] SHA2-512-ACC
897,591 UART: [kat] ECC-384
903,012 UART: [kat] HMAC-384Kdf
907,694 UART: [kat] LMS
1,475,890 UART: [kat] --
1,476,861 UART: [cold-reset] ++
1,477,281 UART: [fht] Storing FHT @ 0x50003400
1,479,908 UART: [idev] ++
1,480,076 UART: [idev] CDI.KEYID = 6
1,480,436 UART: [idev] SUBJECT.KEYID = 7
1,480,860 UART: [idev] UDS.KEYID = 0
1,481,205 ready_for_fw is high
1,481,205 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,596 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,370 UART: [idev] --
1,515,581 UART: [ldev] ++
1,515,749 UART: [ldev] CDI.KEYID = 6
1,516,112 UART: [ldev] SUBJECT.KEYID = 5
1,516,538 UART: [ldev] AUTHORITY.KEYID = 7
1,517,001 UART: [ldev] FE.KEYID = 1
1,521,955 UART: [ldev] Erasing FE.KEYID = 1
1,547,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,980 UART: [ldev] --
1,586,255 UART: [fwproc] Waiting for Commands...
1,587,018 UART: [fwproc] Received command 0x46574c44
1,587,809 UART: [fwproc] Received Image of size 114084 bytes
2,883,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,670 >>> mbox cmd response: success
3,075,670 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,076,692 UART: [afmc] ++
3,076,860 UART: [afmc] CDI.KEYID = 6
3,077,222 UART: [afmc] SUBJECT.KEYID = 7
3,077,647 UART: [afmc] AUTHORITY.KEYID = 5
3,112,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,636 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,029 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,719 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,628 UART: [afmc] --
3,155,732 UART: [cold-reset] --
3,156,520 UART: [state] Locking Datavault
3,157,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,183 UART: [state] Locking ICCM
3,158,755 UART: [exit] Launching FMC @ 0x40000130
3,164,084 UART:
3,164,100 UART: Running Caliptra FMC ...
3,164,508 UART:
3,164,562 UART: [state] CFI Enabled
3,175,021 UART: [fht] FMC Alias Private Key: 7
3,282,638 UART: [art] Extend RT PCRs Done
3,283,066 UART: [art] Lock RT PCRs Done
3,284,180 UART: [art] Populate DV Done
3,292,455 UART: [fht] FMC Alias Private Key: 7
3,293,529 UART: [art] Derive CDI
3,293,809 UART: [art] Store in in slot 0x4
3,379,382 UART: [art] Derive Key Pair
3,379,742 UART: [art] Store priv key in slot 0x5
3,392,554 UART: [art] Derive Key Pair - Done
3,407,053 UART: [art] Signing Cert with AUTHO
3,407,533 UART: RITY.KEYID = 7
3,422,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,326 UART: [art] PUB.X = 3FCD0B7E36668EE82AA005270107C92493A1042CCB5744099AC9D9A8076D868A1F41AFB46112F875D09E897BD80FBC88
3,430,074 UART: [art] PUB.Y = 27B9364DCD751BAE05005523E4532F94DF7D78FB2C8E57EBC7C437C51133C3C3E2AA954880062E0D3446AF6A4056F696
3,436,995 UART: [art] SIG.R = 479E26E8873D5E244ADDFB56D0CCD9B0B221F1F32DC91713F6BF40D25C1F152B6F8C1D19D272E05532996575270041C1
3,443,745 UART: [art] SIG.S = 71CAF69B345CD143D7863CEA19B1D84C7932E1AB5F13BFFF552394EB3345A11B4A422E9EFA2060954B558E26002537E5
3,467,234 UART: Caliptra RT
3,467,487 UART: [state] CFI Enabled
3,575,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,767 UART: [rt]cmd =0x4c444556, len=4
3,616,044 >>> mbox cmd response data (687 bytes)
3,616,045 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,430 UART: [rt]cmd =0x49444549, len=4
3,647,547 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,369 ready_for_fw is high
1,362,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,606 >>> mbox cmd response: success
2,923,606 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,985,346 UART:
2,985,362 UART: Running Caliptra FMC ...
2,985,770 UART:
2,985,824 UART: [state] CFI Enabled
2,996,473 UART: [fht] FMC Alias Private Key: 7
3,104,612 UART: [art] Extend RT PCRs Done
3,105,040 UART: [art] Lock RT PCRs Done
3,106,652 UART: [art] Populate DV Done
3,115,189 UART: [fht] FMC Alias Private Key: 7
3,116,193 UART: [art] Derive CDI
3,116,473 UART: [art] Store in in slot 0x4
3,201,912 UART: [art] Derive Key Pair
3,202,272 UART: [art] Store priv key in slot 0x5
3,215,466 UART: [art] Derive Key Pair - Done
3,230,107 UART: [art] Signing Cert with AUTHO
3,230,587 UART: RITY.KEYID = 7
3,245,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,060 UART: [art] PUB.X = DF95027A8DB5083B7DCCE6205EA2E87A894E1562B8114754696EAD4CD3CFFB78D785F54D2C908DC33FC4EA93321F0016
3,252,812 UART: [art] PUB.Y = F83E79E40EA9601050775D9CEE271C16518AB0D0619B3C0BB4B89A6E5B772C219B61B6FF5EACC01E62CDA06CB4783304
3,259,763 UART: [art] SIG.R = C36860F986F71FE2027737EB31E6CFA844353C427EE3ACE025747B05162E83E1A27B6953BA7151D68968713FEB427CF2
3,266,525 UART: [art] SIG.S = 814C0394A41F3A41885BB732C094DC5C47A071824CBDA66C3E3455D5FF5381A42C4B3A8DC9C0B84674E7D5F9E19360AB
3,290,363 UART: Caliptra RT
3,290,616 UART: [state] CFI Enabled
3,398,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,352 UART: [rt]cmd =0x4c444556, len=4
3,439,899 >>> mbox cmd response data (687 bytes)
3,439,900 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,065 UART: [rt]cmd =0x49444549, len=4
3,471,334 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,170 UART: [kat] SHA2-256
882,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,216 UART: [kat] ++
886,368 UART: [kat] sha1
890,518 UART: [kat] SHA2-256
892,456 UART: [kat] SHA2-384
895,173 UART: [kat] SHA2-512-ACC
897,074 UART: [kat] ECC-384
902,829 UART: [kat] HMAC-384Kdf
907,547 UART: [kat] LMS
1,475,743 UART: [kat] --
1,476,714 UART: [cold-reset] ++
1,477,122 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,879 UART: [idev] Erasing UDS.KEYID = 0
1,505,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,802 UART: [ldev] Erasing FE.KEYID = 1
1,547,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,357 UART: [ldev] --
1,586,626 UART: [fwproc] Waiting for Commands...
1,587,271 UART: [fwproc] Received command 0x46574c44
1,588,062 UART: [fwproc] Received Image of size 114084 bytes
2,883,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,434 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,283 >>> mbox cmd response: success
3,076,283 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,077,343 UART: [afmc] ++
3,077,511 UART: [afmc] CDI.KEYID = 6
3,077,873 UART: [afmc] SUBJECT.KEYID = 7
3,078,298 UART: [afmc] AUTHORITY.KEYID = 5
3,113,623 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,204 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,894 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,769 UART: [afmc] --
3,156,803 UART: [cold-reset] --
3,157,715 UART: [state] Locking Datavault
3,158,710 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,314 UART: [state] Locking ICCM
3,159,852 UART: [exit] Launching FMC @ 0x40000130
3,165,181 UART:
3,165,197 UART: Running Caliptra FMC ...
3,165,605 UART:
3,165,748 UART: [state] CFI Enabled
3,175,811 UART: [fht] FMC Alias Private Key: 7
3,282,868 UART: [art] Extend RT PCRs Done
3,283,296 UART: [art] Lock RT PCRs Done
3,284,860 UART: [art] Populate DV Done
3,293,215 UART: [fht] FMC Alias Private Key: 7
3,294,205 UART: [art] Derive CDI
3,294,485 UART: [art] Store in in slot 0x4
3,380,018 UART: [art] Derive Key Pair
3,380,378 UART: [art] Store priv key in slot 0x5
3,393,768 UART: [art] Derive Key Pair - Done
3,408,713 UART: [art] Signing Cert with AUTHO
3,409,193 UART: RITY.KEYID = 7
3,424,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,478 UART: [art] PUB.X = E4F703545E8EF6CFB077267CD9B5809BDF0B0573B7B00624530FCC2329DAF0478070731735E1A54BF186FFEF6796FFAE
3,432,241 UART: [art] PUB.Y = 73E8F92F1A91219B89D7A6AFB91026ACB23A199C46A95E9DB88C13F0C25057319FA27584643B4BE77096A9718ED9BF7F
3,439,195 UART: [art] SIG.R = 9D4462E3426E4ED165515F329035D23F794D7B6786F13CB59C5B65628871668758873B9459A25FF4E4590EC25A1CBAC7
3,445,954 UART: [art] SIG.S = 46D41ED040259E81ABB475718201EE9F954FD5799171A68EFE3895A704B513C4AF9DBC9FA684D25549730EF582D30FCA
3,469,259 UART: Caliptra RT
3,469,604 UART: [state] CFI Enabled
3,578,139 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,499 UART: [rt]cmd =0x4c444556, len=4
3,618,984 >>> mbox cmd response data (687 bytes)
3,618,985 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,056 UART: [rt]cmd =0x49444549, len=4
3,650,293 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,280 ready_for_fw is high
1,362,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,177 >>> mbox cmd response: success
2,923,177 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,984,783 UART:
2,984,799 UART: Running Caliptra FMC ...
2,985,207 UART:
2,985,350 UART: [state] CFI Enabled
2,996,449 UART: [fht] FMC Alias Private Key: 7
3,104,494 UART: [art] Extend RT PCRs Done
3,104,922 UART: [art] Lock RT PCRs Done
3,106,592 UART: [art] Populate DV Done
3,114,919 UART: [fht] FMC Alias Private Key: 7
3,116,041 UART: [art] Derive CDI
3,116,321 UART: [art] Store in in slot 0x4
3,202,284 UART: [art] Derive Key Pair
3,202,644 UART: [art] Store priv key in slot 0x5
3,216,126 UART: [art] Derive Key Pair - Done
3,230,633 UART: [art] Signing Cert with AUTHO
3,231,113 UART: RITY.KEYID = 7
3,246,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,700 UART: [art] PUB.X = 1DC5F3C1D4234B8E5FAA75509D420942EEBC931BDD6D156678575016A10D751167BB3B6AB611882443908168C8117747
3,254,456 UART: [art] PUB.Y = 083840DE020934B1D50F7987D1DEEE1856E4CB71DC1D0F5E4A4600BE09195F7F8AFD3A7064753D0F0F1F288A931EAFD4
3,261,370 UART: [art] SIG.R = A30D2D465F7D57E93AC077A9B2536809BBC7D7E759DA831F8DA775C33A5BA5B17BE8967230FFA110085176B44B670332
3,268,130 UART: [art] SIG.S = B3D52A265D545114D16FB02A657D96587B49E281A08160BF584E762A155C393634ADEA33DA4495211968A845F1AE9D99
3,291,877 UART: Caliptra RT
3,292,222 UART: [state] CFI Enabled
3,399,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,220 UART: [rt]cmd =0x4c444556, len=4
3,440,841 >>> mbox cmd response data (687 bytes)
3,440,842 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,393 UART: [rt]cmd =0x49444549, len=4
3,472,642 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
86,923 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,323 UART: [kat] SHA2-256
904,263 UART: [kat] SHA2-384
907,168 UART: [kat] SHA2-512-ACC
909,069 UART: [kat] ECC-384
918,942 UART: [kat] HMAC-384Kdf
923,426 UART: [kat] LMS
1,171,754 UART: [kat] --
1,172,463 UART: [cold-reset] ++
1,172,807 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,050 UART: [idev] Erasing UDS.KEYID = 0
1,201,891 UART: [idev] Sha1 KeyId Algorithm
1,210,405 UART: [idev] --
1,211,589 UART: [ldev] ++
1,211,757 UART: [ldev] CDI.KEYID = 6
1,212,120 UART: [ldev] SUBJECT.KEYID = 5
1,212,546 UART: [ldev] AUTHORITY.KEYID = 7
1,213,009 UART: [ldev] FE.KEYID = 1
1,218,115 UART: [ldev] Erasing FE.KEYID = 1
1,244,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,007 UART: [ldev] --
1,283,520 UART: [fwproc] Wait for Commands...
1,284,142 UART: [fwproc] Recv command 0x46574c44
1,284,870 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,049 >>> mbox cmd response: success
2,771,049 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,059 UART: [afmc] ++
2,772,227 UART: [afmc] CDI.KEYID = 6
2,772,589 UART: [afmc] SUBJECT.KEYID = 7
2,773,014 UART: [afmc] AUTHORITY.KEYID = 5
2,808,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,553 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,064 UART: [afmc] --
2,851,970 UART: [cold-reset] --
2,852,618 UART: [state] Locking Datavault
2,853,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,517 UART: [state] Locking ICCM
2,855,101 UART: [exit] Launching FMC @ 0x40000130
2,860,430 UART:
2,860,446 UART: Running Caliptra FMC ...
2,860,854 UART:
2,860,908 UART: [state] CFI Enabled
2,871,777 UART: [fht] FMC Alias Private Key: 7
2,979,450 UART: [art] Extend RT PCRs Done
2,979,878 UART: [art] Lock RT PCRs Done
2,981,336 UART: [art] Populate DV Done
2,989,539 UART: [fht] FMC Alias Private Key: 7
2,990,677 UART: [art] Derive CDI
2,990,957 UART: [art] Store in in slot 0x4
3,076,974 UART: [art] Derive Key Pair
3,077,334 UART: [art] Store priv key in slot 0x5
3,090,930 UART: [art] Derive Key Pair - Done
3,105,715 UART: [art] Signing Cert with AUTHO
3,106,195 UART: RITY.KEYID = 7
3,121,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,888 UART: [art] PUB.X = 710197C1E6469F8547FC8FBA4A45488434DFBBB48AE01CF203B87EF37054879889B77490FB8AB114DE1A954340F58594
3,128,650 UART: [art] PUB.Y = 7D9FE788729392B12169F38DD2D9189B7B400D2AFCF4EFFBB85BEEAB873AE25182EEF233E15619C5B9E5AF52FFD869C2
3,135,615 UART: [art] SIG.R = C922D47B4A603874BFBA00F63915B9DF34713D9351AADB3E14A34B9C9DBE91558D93E2F2B00F95FA2A2A0F3E2472C371
3,142,367 UART: [art] SIG.S = F1FBFDEFE072C85A14FFBFD0FD7234B6B0586D8127A19EBE695E7C4DAED679FA27DF2CA194BB668A3CC03040C24FD51B
3,166,174 UART: Caliptra RT
3,166,427 UART: [state] CFI Enabled
3,274,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,925 UART: [rt]cmd =0x4c444556, len=4
3,315,294 >>> mbox cmd response data (687 bytes)
3,315,295 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,668 UART: [rt]cmd =0x49444549, len=4
3,346,955 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,789 ready_for_fw is high
1,059,789 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,398 >>> mbox cmd response: success
2,622,398 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,210 UART:
2,684,226 UART: Running Caliptra FMC ...
2,684,634 UART:
2,684,688 UART: [state] CFI Enabled
2,695,319 UART: [fht] FMC Alias Private Key: 7
2,802,594 UART: [art] Extend RT PCRs Done
2,803,022 UART: [art] Lock RT PCRs Done
2,804,598 UART: [art] Populate DV Done
2,812,921 UART: [fht] FMC Alias Private Key: 7
2,813,915 UART: [art] Derive CDI
2,814,195 UART: [art] Store in in slot 0x4
2,899,882 UART: [art] Derive Key Pair
2,900,242 UART: [art] Store priv key in slot 0x5
2,913,732 UART: [art] Derive Key Pair - Done
2,928,543 UART: [art] Signing Cert with AUTHO
2,929,023 UART: RITY.KEYID = 7
2,944,043 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,808 UART: [art] PUB.X = 515659DA5B8349A78A344145FD689F916BA8ADA64637E5D2C5AE60435788ABDE340E5E7EE08E3D3A26A0FD9F5FAA44CB
2,951,589 UART: [art] PUB.Y = B33245D5CE1BCB529EE99663DF332C084B296A6A0104E27791A8DF14077DCE6E73F289972E79580F463B66B451DE3F42
2,958,524 UART: [art] SIG.R = 24FD7D1008B88A521C2D16FE74DF44A13A89FC2CB891421407CCFA3FA72A2431BBB8FDC4499B11B041DA5DCEE4ECB4C7
2,965,310 UART: [art] SIG.S = F07B8106A261F60998734E8C2AEEA5C76227E5AB76AA72F03026BC51683E12E9FBA2DADEC8741119772948F70A3D5962
2,989,302 UART: Caliptra RT
2,989,555 UART: [state] CFI Enabled
3,097,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,766 UART: [rt]cmd =0x4c444556, len=4
3,138,043 >>> mbox cmd response data (687 bytes)
3,138,044 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,667 UART: [rt]cmd =0x49444549, len=4
3,169,974 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
893,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,670 UART: [kat] ++
897,822 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,787 UART: [kat] SHA2-512-ACC
908,688 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,215 UART: [kat] LMS
1,171,543 UART: [kat] --
1,172,302 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 ready_for_fw is high
1,176,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,200,870 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,624 UART: [ldev] ++
1,210,792 UART: [ldev] CDI.KEYID = 6
1,211,155 UART: [ldev] SUBJECT.KEYID = 5
1,211,581 UART: [ldev] AUTHORITY.KEYID = 7
1,212,044 UART: [ldev] FE.KEYID = 1
1,217,168 UART: [ldev] Erasing FE.KEYID = 1
1,244,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,908 UART: [ldev] --
1,283,321 UART: [fwproc] Wait for Commands...
1,283,911 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,818 >>> mbox cmd response: success
2,771,818 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,864 UART: [afmc] ++
2,773,032 UART: [afmc] CDI.KEYID = 6
2,773,394 UART: [afmc] SUBJECT.KEYID = 7
2,773,819 UART: [afmc] AUTHORITY.KEYID = 5
2,808,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,821 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,706 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,425 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,273 UART: [afmc] --
2,852,307 UART: [cold-reset] --
2,853,069 UART: [state] Locking Datavault
2,854,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,926 UART: [state] Locking ICCM
2,855,552 UART: [exit] Launching FMC @ 0x40000130
2,860,881 UART:
2,860,897 UART: Running Caliptra FMC ...
2,861,305 UART:
2,861,448 UART: [state] CFI Enabled
2,871,909 UART: [fht] FMC Alias Private Key: 7
2,980,468 UART: [art] Extend RT PCRs Done
2,980,896 UART: [art] Lock RT PCRs Done
2,982,488 UART: [art] Populate DV Done
2,990,817 UART: [fht] FMC Alias Private Key: 7
2,991,849 UART: [art] Derive CDI
2,992,129 UART: [art] Store in in slot 0x4
3,078,130 UART: [art] Derive Key Pair
3,078,490 UART: [art] Store priv key in slot 0x5
3,091,932 UART: [art] Derive Key Pair - Done
3,106,513 UART: [art] Signing Cert with AUTHO
3,106,993 UART: RITY.KEYID = 7
3,122,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,154 UART: [art] PUB.X = 0C4282D134AEB64DACB55FA48A0DD603D725426D1ED22B6B3A98C1DFA2A8D6BEB6515AAB816824BD205F7CF980D8C4F1
3,129,935 UART: [art] PUB.Y = 73B93107650F2B350929225AE2BFEE8A88123BFF2977B89878EF83D83E2289C44BA39E1666A05249290EB40821C71AC5
3,136,864 UART: [art] SIG.R = 87C17006250A1455D2A0EF03A656B8F9434AA62526F87597709C89DCBD558FB21DD8B90FC1B0BA3F2F0E7EF49C813B14
3,143,625 UART: [art] SIG.S = E005D1A52F2ED6A3E96ED1482907E9F74C45E5908463F659825D01FD5C5A495376B6CD27291A84DC885BBEB1CD681BB1
3,167,519 UART: Caliptra RT
3,167,864 UART: [state] CFI Enabled
3,275,564 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,996 UART: [rt]cmd =0x4c444556, len=4
3,316,403 >>> mbox cmd response data (687 bytes)
3,316,404 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,727 UART: [rt]cmd =0x49444549, len=4
3,347,958 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,578 ready_for_fw is high
1,060,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,067 >>> mbox cmd response: success
2,625,067 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,719 UART:
2,687,735 UART: Running Caliptra FMC ...
2,688,143 UART:
2,688,286 UART: [state] CFI Enabled
2,698,809 UART: [fht] FMC Alias Private Key: 7
2,807,154 UART: [art] Extend RT PCRs Done
2,807,582 UART: [art] Lock RT PCRs Done
2,809,406 UART: [art] Populate DV Done
2,817,619 UART: [fht] FMC Alias Private Key: 7
2,818,797 UART: [art] Derive CDI
2,819,077 UART: [art] Store in in slot 0x4
2,904,556 UART: [art] Derive Key Pair
2,904,916 UART: [art] Store priv key in slot 0x5
2,918,510 UART: [art] Derive Key Pair - Done
2,933,346 UART: [art] Signing Cert with AUTHO
2,933,826 UART: RITY.KEYID = 7
2,949,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,125 UART: [art] PUB.X = D383A601025DE2334102889C73D0DFEDD01FDE7E3C66C19F7814FE0FD617B408CF96F975BBD13AC8B81C8B8B3CD22961
2,956,892 UART: [art] PUB.Y = 5BB26AA81256CF2269FAF3822CEBDB7D857EF694537522B0CF9B2B01119895465D1B9EB0802ED5BAC2B9A58DE5F2A581
2,963,851 UART: [art] SIG.R = C612B30C97CB1690A131ED6A86461920B37884F685766395BDEBF46FAD9FCE6F9CC20FE65A4D54B70DEB45CCD8EBD9DC
2,970,632 UART: [art] SIG.S = BC982A06D66E1C6D2BFA258205C67DD735B9A6F887DC9EC488057F7A029C6A28A2D9CAF5F76F696DF32B030586248214
2,994,151 UART: Caliptra RT
2,994,496 UART: [state] CFI Enabled
3,102,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,980 UART: [rt]cmd =0x4c444556, len=4
3,143,533 >>> mbox cmd response data (687 bytes)
3,143,534 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,987 UART: [rt]cmd =0x49444549, len=4
3,175,276 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,532 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,576 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,693 UART: [idev] ++
1,173,861 UART: [idev] CDI.KEYID = 6
1,174,222 UART: [idev] SUBJECT.KEYID = 7
1,174,647 UART: [idev] UDS.KEYID = 0
1,174,993 ready_for_fw is high
1,174,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,915 UART: [idev] Sha1 KeyId Algorithm
1,208,811 UART: [idev] --
1,209,972 UART: [ldev] ++
1,210,140 UART: [ldev] CDI.KEYID = 6
1,210,504 UART: [ldev] SUBJECT.KEYID = 5
1,210,931 UART: [ldev] AUTHORITY.KEYID = 7
1,211,394 UART: [ldev] FE.KEYID = 1
1,216,732 UART: [ldev] Erasing FE.KEYID = 1
1,242,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,710 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,570 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,195 >>> mbox cmd response: success
2,771,195 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,252 UART: [afmc] ++
2,772,420 UART: [afmc] CDI.KEYID = 6
2,772,783 UART: [afmc] SUBJECT.KEYID = 7
2,773,209 UART: [afmc] AUTHORITY.KEYID = 5
2,807,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,762 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,265 UART: [afmc] --
2,851,255 UART: [cold-reset] --
2,852,285 UART: [state] Locking Datavault
2,853,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,844 UART: [state] Locking ICCM
2,854,480 UART: [exit] Launching FMC @ 0x40000130
2,859,809 UART:
2,859,825 UART: Running Caliptra FMC ...
2,860,233 UART:
2,860,287 UART: [state] CFI Enabled
2,870,858 UART: [fht] FMC Alias Private Key: 7
2,979,101 UART: [art] Extend RT PCRs Done
2,979,529 UART: [art] Lock RT PCRs Done
2,981,021 UART: [art] Populate DV Done
2,989,344 UART: [fht] FMC Alias Private Key: 7
2,990,418 UART: [art] Derive CDI
2,990,698 UART: [art] Store in in slot 0x4
3,076,095 UART: [art] Derive Key Pair
3,076,455 UART: [art] Store priv key in slot 0x5
3,089,655 UART: [art] Derive Key Pair - Done
3,104,154 UART: [art] Signing Cert with AUTHO
3,104,634 UART: RITY.KEYID = 7
3,119,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,671 UART: [art] PUB.X = B9E6455C3694AA6B579FE89F0BBE0F49D514BE9DA454E2CC0C7FBA9512A81C35F65C188700CF1EC5EE258EFC5B04D11C
3,127,427 UART: [art] PUB.Y = 7584822319218A7409A15ABF4CFA6B6C5F933AD2B42F0D8B29508425757404B194239A1DD57CA89114140FD69A3482D8
3,134,357 UART: [art] SIG.R = AC08465F1FA19DC395D21D98EB7B85656DD74C2D4543C6EB6102A0A8F796EBC1B3089C68D720A6A00844CC14359EA6C4
3,141,123 UART: [art] SIG.S = B49F80872D3E6F4B07F9998B83197DC6CF9BA1D7C26D7D69B61740E6388206796FADB19305A236D0E728768EB69166C7
3,165,325 UART: Caliptra RT
3,165,578 UART: [state] CFI Enabled
3,272,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,404 UART: [rt]cmd =0x4c444556, len=4
3,313,861 >>> mbox cmd response data (687 bytes)
3,313,862 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,223 UART: [rt]cmd =0x49444549, len=4
3,345,436 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,120 ready_for_fw is high
1,055,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,201 >>> mbox cmd response: success
2,618,201 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,679,547 UART:
2,679,563 UART: Running Caliptra FMC ...
2,679,971 UART:
2,680,025 UART: [state] CFI Enabled
2,690,582 UART: [fht] FMC Alias Private Key: 7
2,798,607 UART: [art] Extend RT PCRs Done
2,799,035 UART: [art] Lock RT PCRs Done
2,800,895 UART: [art] Populate DV Done
2,809,126 UART: [fht] FMC Alias Private Key: 7
2,810,156 UART: [art] Derive CDI
2,810,436 UART: [art] Store in in slot 0x4
2,896,295 UART: [art] Derive Key Pair
2,896,655 UART: [art] Store priv key in slot 0x5
2,909,777 UART: [art] Derive Key Pair - Done
2,924,715 UART: [art] Signing Cert with AUTHO
2,925,195 UART: RITY.KEYID = 7
2,940,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,182 UART: [art] PUB.X = 954D94B6AD23F7B1A9B298C8396641B2BC6274FDD67768CEDAAAAE061B7999201FF90280586B8498664CD184C305533D
2,947,943 UART: [art] PUB.Y = 0E768C23D8DBD777BCED64A3D497DCCCAAF122E89F8207B7680806997B30395377119194A6A249303F99F858AE00F9B4
2,954,859 UART: [art] SIG.R = A20956792835EBE8637A11E13D4A8EF1F4EBC7F1F988F322EDBA0BFAFEDFF27D4F165B2C1DA5DDAB4A231FA121DC2FFF
2,961,655 UART: [art] SIG.S = 060345BC1D2F5E2D54109E8848DEDDA632B69E9ADE65D7011E71737D51C18827207BBA06BBD14A12456D679F09B31A19
2,985,089 UART: Caliptra RT
2,985,342 UART: [state] CFI Enabled
3,093,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,825 UART: [rt]cmd =0x4c444556, len=4
3,134,090 >>> mbox cmd response data (687 bytes)
3,134,091 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,478 UART: [rt]cmd =0x49444549, len=4
3,165,635 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,015 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,174,288 ready_for_fw is high
1,174,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,184 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,711 UART: [fwproc] Wait for Commands...
1,282,446 UART: [fwproc] Recv command 0x46574c44
1,283,179 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,168 >>> mbox cmd response: success
2,770,168 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,771,259 UART: [afmc] ++
2,771,427 UART: [afmc] CDI.KEYID = 6
2,771,790 UART: [afmc] SUBJECT.KEYID = 7
2,772,216 UART: [afmc] AUTHORITY.KEYID = 5
2,809,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,498 UART: [afmc] --
2,852,472 UART: [cold-reset] --
2,853,224 UART: [state] Locking Datavault
2,854,235 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,839 UART: [state] Locking ICCM
2,855,485 UART: [exit] Launching FMC @ 0x40000130
2,860,814 UART:
2,860,830 UART: Running Caliptra FMC ...
2,861,238 UART:
2,861,381 UART: [state] CFI Enabled
2,871,622 UART: [fht] FMC Alias Private Key: 7
2,979,553 UART: [art] Extend RT PCRs Done
2,979,981 UART: [art] Lock RT PCRs Done
2,981,339 UART: [art] Populate DV Done
2,989,664 UART: [fht] FMC Alias Private Key: 7
2,990,694 UART: [art] Derive CDI
2,990,974 UART: [art] Store in in slot 0x4
3,076,237 UART: [art] Derive Key Pair
3,076,597 UART: [art] Store priv key in slot 0x5
3,090,099 UART: [art] Derive Key Pair - Done
3,104,883 UART: [art] Signing Cert with AUTHO
3,105,363 UART: RITY.KEYID = 7
3,120,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,330 UART: [art] PUB.X = D1CDFED9ADC1F681F0F02D68CBD912AC22084348E18CB5E8DDD84678ED2CC5A339E56C6A3273E047B72CE707FB11174E
3,128,112 UART: [art] PUB.Y = 1B8E0B528BEF9FE6753BDB5A1EE325F0019B60E4739737D81BF1AA6D6753EC84724E885FDA96ED79C699C86B90338054
3,135,062 UART: [art] SIG.R = 0836FA831D2722279929BA2A6104A2B5E9A5F07C347B26C784094131F802275122F1C25AC3E9F598F3B36F1185827109
3,141,803 UART: [art] SIG.S = 53DADAC03BC1142DD141873C5BC13D8D3C16FB0F3AC6F4C4239354688AD1F8A286CE86968B25AC916D4445B50CC44FC3
3,165,634 UART: Caliptra RT
3,165,979 UART: [state] CFI Enabled
3,273,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,518 UART: [rt]cmd =0x4c444556, len=4
3,315,013 >>> mbox cmd response data (687 bytes)
3,315,014 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,489 UART: [rt]cmd =0x49444549, len=4
3,346,880 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,751 ready_for_fw is high
1,055,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,398 >>> mbox cmd response: success
2,619,398 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,681,762 UART:
2,681,778 UART: Running Caliptra FMC ...
2,682,186 UART:
2,682,329 UART: [state] CFI Enabled
2,693,016 UART: [fht] FMC Alias Private Key: 7
2,799,727 UART: [art] Extend RT PCRs Done
2,800,155 UART: [art] Lock RT PCRs Done
2,801,845 UART: [art] Populate DV Done
2,810,256 UART: [fht] FMC Alias Private Key: 7
2,811,314 UART: [art] Derive CDI
2,811,594 UART: [art] Store in in slot 0x4
2,897,299 UART: [art] Derive Key Pair
2,897,659 UART: [art] Store priv key in slot 0x5
2,910,779 UART: [art] Derive Key Pair - Done
2,925,240 UART: [art] Signing Cert with AUTHO
2,925,720 UART: RITY.KEYID = 7
2,940,626 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,391 UART: [art] PUB.X = B5D7BC20DB7E9B1AD5F5BA96E177B76FEE845A759834C0958499DBDFA29CF7F73280B0013237C24F804A37FCFCDB2411
2,948,172 UART: [art] PUB.Y = 2964D45B0361E4B77EF17939A03F976ECC1C167A8237D02FD2AC09AF505695099236F82B6E354B58C88EA2CC83ED196A
2,955,115 UART: [art] SIG.R = DB4E3382663BAB8FCBF5D22C321F463DC2BED94B133606909AC09D1638DF2977B3AFCB09C477C59B57BE66B465E4909C
2,961,891 UART: [art] SIG.S = CBE42717C008CE48371D51C7B4FACEF739402D3EEB2A239B6E6FD43A3EAF8F51CE976DA5EB8B89BD7E13CA3403678070
2,985,574 UART: Caliptra RT
2,985,919 UART: [state] CFI Enabled
3,093,075 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,421 UART: [rt]cmd =0x4c444556, len=4
3,133,856 >>> mbox cmd response data (687 bytes)
3,133,857 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,210 UART: [rt]cmd =0x49444549, len=4
3,165,529 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,183 UART:
192,572 UART: Running Caliptra ROM ...
193,716 UART:
193,866 UART: [state] CFI Enabled
261,515 UART: [state] LifecycleState = Unprovisioned
263,511 UART: [state] DebugLocked = No
265,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,359 UART: [kat] SHA2-256
439,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,559 UART: [kat] ++
450,033 UART: [kat] sha1
460,936 UART: [kat] SHA2-256
463,596 UART: [kat] SHA2-384
469,160 UART: [kat] SHA2-512-ACC
471,529 UART: [kat] ECC-384
2,760,918 UART: [kat] HMAC-384Kdf
2,772,085 UART: [kat] LMS
3,962,422 UART: [kat] --
3,967,366 UART: [cold-reset] ++
3,969,393 UART: [fht] Storing FHT @ 0x50003400
3,981,580 UART: [idev] ++
3,982,165 UART: [idev] CDI.KEYID = 6
3,983,081 UART: [idev] SUBJECT.KEYID = 7
3,984,331 UART: [idev] UDS.KEYID = 0
3,985,452 ready_for_fw is high
3,985,691 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,128,898 UART: [idev] Erasing UDS.KEYID = 0
7,317,799 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,555 UART: [idev] --
7,344,277 UART: [ldev] ++
7,344,897 UART: [ldev] CDI.KEYID = 6
7,345,812 UART: [ldev] SUBJECT.KEYID = 5
7,347,023 UART: [ldev] AUTHORITY.KEYID = 7
7,348,310 UART: [ldev] FE.KEYID = 1
7,396,565 UART: [ldev] Erasing FE.KEYID = 1
10,727,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,035,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,050,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,058 UART: [ldev] --
13,088,898 UART: [fwproc] Waiting for Commands...
13,090,725 UART: [fwproc] Received command 0x46574c44
13,092,932 UART: [fwproc] Received Image of size 113760 bytes
17,136,905 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,211,810 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,596,195 >>> mbox cmd response: success
17,596,712 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,599,875 UART: [afmc] ++
17,600,458 UART: [afmc] CDI.KEYID = 6
17,601,477 UART: [afmc] SUBJECT.KEYID = 7
17,602,639 UART: [afmc] AUTHORITY.KEYID = 5
20,960,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,259,080 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,261,330 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,275,751 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,290,586 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,305,075 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,327,166 UART: [afmc] --
23,330,654 UART: [cold-reset] --
23,334,085 UART: [state] Locking Datavault
23,337,239 UART: [state] Locking PCR0, PCR1 and PCR31
23,338,954 UART: [state] Locking ICCM
23,340,728 UART: [exit] Launching FMC @ 0x40000130
23,349,128 UART:
23,349,361 UART: Running Caliptra FMC ...
23,350,463 UART:
23,350,630 UART: [state] CFI Enabled
23,419,491 UART: [fht] FMC Alias Private Key: 7
25,757,297 UART: [art] Extend RT PCRs Done
25,758,545 UART: [art] Lock RT PCRs Done
25,760,089 UART: [art] Populate DV Done
25,765,452 UART: [fht] FMC Alias Private Key: 7
25,767,098 UART: [art] Derive CDI
25,767,936 UART: [art] Store in in slot 0x4
25,828,203 UART: [art] Derive Key Pair
25,829,244 UART: [art] Store priv key in slot 0x5
29,121,833 UART: [art] Derive Key Pair - Done
29,134,939 UART: [art] Signing Cert with AUTHO
29,136,246 UART: RITY.KEYID = 7
31,423,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,425,179 UART: [art] PUB.X = AF41EA650EF0886D7B3340D4222489CE853353DA9B52188C3AC0C0593B9C2C923E561EBABADBE7FD684D99BC52AB973B
31,432,422 UART: [art] PUB.Y = A7AD819AD530EB092A7CC89979922BC855BD958A075AF8B8CEF8E5871FA53D6B37285F177392840DB3493DE0E068C4E0
31,439,705 UART: [art] SIG.R = B2F03B937EDA94066F57106AF8961FC8431CC5E13C53D433E592B63D05EFDA0A8DE95B2818FA927FDDA4C0A96A1524D0
31,447,088 UART: [art] SIG.S = B681CCBF86128F4C99709129559392EDCB3C1D4D7A95952948074C94028791C0E5FA7BE98E44994EA796536BAF882577
32,752,355 UART: Caliptra RT
32,753,056 UART: [state] CFI Enabled
32,914,092 UART: [rt] RT listening for mailbox commands...
32,945,180 UART: [rt]cmd =0x43455246, len=4
32,958,047 >>> mbox cmd response data (920 bytes)
33,001,154 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,031,200 UART: [rt]cmd =0x43455252, len=4
33,042,278 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,806,358 ready_for_fw is high
3,806,756 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,846,762 >>> mbox cmd response: success
17,847,401 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,545,109 UART:
23,545,504 UART: Running Caliptra FMC ...
23,546,642 UART:
23,546,803 UART: [state] CFI Enabled
23,616,034 UART: [fht] FMC Alias Private Key: 7
25,953,902 UART: [art] Extend RT PCRs Done
25,955,122 UART: [art] Lock RT PCRs Done
25,956,777 UART: [art] Populate DV Done
25,961,977 UART: [fht] FMC Alias Private Key: 7
25,963,462 UART: [art] Derive CDI
25,964,198 UART: [art] Store in in slot 0x4
26,024,996 UART: [art] Derive Key Pair
26,026,016 UART: [art] Store priv key in slot 0x5
29,318,997 UART: [art] Derive Key Pair - Done
29,331,837 UART: [art] Signing Cert with AUTHO
29,333,147 UART: RITY.KEYID = 7
31,621,126 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,639 UART: [art] PUB.X = D7F2705C52F02CFF57C71453F75D2A0F076D6A2DA9654AD758CBFDFF95BAB8D830C7C9E654C17D032F5110F015FED991
31,630,073 UART: [art] PUB.Y = 311ADC8293BA9E8EB89403478865B6614AC7EC67B8F1E27F32524E646DA580C66CB5CE66A0C25A004E764A14207DA023
31,637,131 UART: [art] SIG.R = AD71E5328B4F11245CB1E60386E1457998C7788C00E88DC16CA3AD08B0987A256C66173DA826D55AA394E8A36F87B916
31,644,481 UART: [art] SIG.S = B3B5587DAAF47D338CA44B8F06B302CEFF20EE7B8A704FBB025F09AF0BC788FE9F83F4D1F92720EA6666609A6173D4FD
32,950,035 UART: Caliptra RT
32,950,748 UART: [state] CFI Enabled
33,110,655 UART: [rt] RT listening for mailbox commands...
33,142,178 UART: [rt]cmd =0x43455246, len=4
33,155,263 >>> mbox cmd response data (920 bytes)
33,198,112 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,228,207 UART: [rt]cmd =0x43455252, len=4
33,239,521 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
192,954 UART:
193,342 UART: Running Caliptra ROM ...
194,542 UART:
604,105 UART: [state] CFI Enabled
615,566 UART: [state] LifecycleState = Unprovisioned
617,496 UART: [state] DebugLocked = No
619,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,870 UART: [kat] SHA2-256
794,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,180 UART: [kat] ++
805,627 UART: [kat] sha1
816,140 UART: [kat] SHA2-256
818,788 UART: [kat] SHA2-384
825,128 UART: [kat] SHA2-512-ACC
827,444 UART: [kat] ECC-384
3,109,778 UART: [kat] HMAC-384Kdf
3,120,741 UART: [kat] LMS
4,310,851 UART: [kat] --
4,313,810 UART: [cold-reset] ++
4,314,822 UART: [fht] Storing FHT @ 0x50003400
4,326,078 UART: [idev] ++
4,326,642 UART: [idev] CDI.KEYID = 6
4,327,675 UART: [idev] SUBJECT.KEYID = 7
4,328,849 UART: [idev] UDS.KEYID = 0
4,329,889 ready_for_fw is high
4,330,090 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,472,994 UART: [idev] Erasing UDS.KEYID = 0
7,616,414 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,186 UART: [idev] --
7,642,101 UART: [ldev] ++
7,642,723 UART: [ldev] CDI.KEYID = 6
7,643,636 UART: [ldev] SUBJECT.KEYID = 5
7,644,847 UART: [ldev] AUTHORITY.KEYID = 7
7,646,148 UART: [ldev] FE.KEYID = 1
7,655,169 UART: [ldev] Erasing FE.KEYID = 1
10,943,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,943 UART: [ldev] --
13,301,818 UART: [fwproc] Waiting for Commands...
13,304,117 UART: [fwproc] Received command 0x46574c44
13,306,291 UART: [fwproc] Received Image of size 113760 bytes
17,354,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,429,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,498,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,813,625 >>> mbox cmd response: success
17,814,184 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,818,003 UART: [afmc] ++
17,818,656 UART: [afmc] CDI.KEYID = 6
17,819,564 UART: [afmc] SUBJECT.KEYID = 7
17,820,778 UART: [afmc] AUTHORITY.KEYID = 5
21,137,607 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,842 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,189 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,059 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,499 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,500,373 UART: [afmc] --
23,504,514 UART: [cold-reset] --
23,507,888 UART: [state] Locking Datavault
23,511,244 UART: [state] Locking PCR0, PCR1 and PCR31
23,513,000 UART: [state] Locking ICCM
23,515,258 UART: [exit] Launching FMC @ 0x40000130
23,523,673 UART:
23,523,916 UART: Running Caliptra FMC ...
23,525,021 UART:
23,525,180 UART: [state] CFI Enabled
23,533,071 UART: [fht] FMC Alias Private Key: 7
25,863,462 UART: [art] Extend RT PCRs Done
25,864,685 UART: [art] Lock RT PCRs Done
25,866,441 UART: [art] Populate DV Done
25,871,665 UART: [fht] FMC Alias Private Key: 7
25,873,208 UART: [art] Derive CDI
25,873,940 UART: [art] Store in in slot 0x4
25,916,902 UART: [art] Derive Key Pair
25,917,893 UART: [art] Store priv key in slot 0x5
29,160,419 UART: [art] Derive Key Pair - Done
29,172,833 UART: [art] Signing Cert with AUTHO
29,174,127 UART: RITY.KEYID = 7
31,453,809 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,317 UART: [art] PUB.X = 30E495C027123AB1850D762AF93CE9C6698ED087831AEB657240C504727031371F5097B630811E7564CC4EB5D2DBE918
31,462,531 UART: [art] PUB.Y = 34DA0B7378D0D16715BB3B274CFA43A9E8D84E7276C99902A41E220A511CB15E9625517474A7C42D50656E9E998DCEC4
31,469,779 UART: [art] SIG.R = 200FAC041BEA473DBC969DD64365C74A9B71AAEF006BCBF40A6E0906356C69BEEB7C6FF4B08303D09960777436B30A47
31,477,155 UART: [art] SIG.S = B835C31A06CF71E14C35949436FD3492C3CD654FDA485426DF67C6A2C65E2DC25888ADDBA566E2D1867572972875D282
32,782,336 UART: Caliptra RT
32,783,034 UART: [state] CFI Enabled
32,901,121 UART: [rt] RT listening for mailbox commands...
32,932,576 UART: [rt]cmd =0x43455246, len=4
32,945,523 >>> mbox cmd response data (920 bytes)
32,988,208 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,018,538 UART: [rt]cmd =0x43455252, len=4
33,030,147 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
4,128,043 ready_for_fw is high
4,128,549 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,045,016 >>> mbox cmd response: success
18,045,637 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,688,129 UART:
23,688,522 UART: Running Caliptra FMC ...
23,689,718 UART:
23,689,897 UART: [state] CFI Enabled
23,697,839 UART: [fht] FMC Alias Private Key: 7
26,028,870 UART: [art] Extend RT PCRs Done
26,030,110 UART: [art] Lock RT PCRs Done
26,031,850 UART: [art] Populate DV Done
26,037,276 UART: [fht] FMC Alias Private Key: 7
26,038,871 UART: [art] Derive CDI
26,039,611 UART: [art] Store in in slot 0x4
26,082,433 UART: [art] Derive Key Pair
26,083,480 UART: [art] Store priv key in slot 0x5
29,325,626 UART: [art] Derive Key Pair - Done
29,338,731 UART: [art] Signing Cert with AUTHO
29,340,065 UART: RITY.KEYID = 7
31,619,525 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,065 UART: [art] PUB.X = 562B5604D7FDC4DD6EABA2199633C8032A7D2F5FA0A86F53A55296352AA8BC8FE1DFEE1022539C8694F47B3539E38154
31,628,243 UART: [art] PUB.Y = 47C023BCF2935D49C22D814E8955EA1A2F7A0E6C4C5DBD858A8376AF696B2F83A7A5DB3C8282DF6108B60C3D653EFA2B
31,635,498 UART: [art] SIG.R = 07100EC8FBF39039C99EA470A806B2D743E1E8ACEED900AE77282AD1BC117CC937CCFF7FCF87998BA502F8B83C656E01
31,642,883 UART: [art] SIG.S = 363FA86DB14886F20240DF88B4DF9A941162B67126C10B3714D466D0A2821A089C5B3F5716556CD5CD8A480D2F7C6A74
32,948,328 UART: Caliptra RT
32,949,040 UART: [state] CFI Enabled
33,066,215 UART: [rt] RT listening for mailbox commands...
33,097,785 UART: [rt]cmd =0x43455246, len=4
33,110,636 >>> mbox cmd response data (920 bytes)
33,152,456 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,182,779 UART: [rt]cmd =0x43455252, len=4
33,194,144 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,608 UART:
192,983 UART: Running Caliptra ROM ...
194,093 UART:
194,236 UART: [state] CFI Enabled
260,968 UART: [state] LifecycleState = Unprovisioned
263,075 UART: [state] DebugLocked = No
265,601 UART: [state] WD Timer not started. Device not locked for debugging
269,853 UART: [kat] SHA2-256
448,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,571 UART: [kat] ++
461,035 UART: [kat] sha1
471,913 UART: [kat] SHA2-256
474,983 UART: [kat] SHA2-384
481,039 UART: [kat] SHA2-512-ACC
483,984 UART: [kat] ECC-384
2,949,923 UART: [kat] HMAC-384Kdf
2,969,980 UART: [kat] LMS
3,499,459 UART: [kat] --
3,503,544 UART: [cold-reset] ++
3,505,832 UART: [fht] FHT @ 0x50003400
3,517,088 UART: [idev] ++
3,517,648 UART: [idev] CDI.KEYID = 6
3,518,569 UART: [idev] SUBJECT.KEYID = 7
3,519,737 UART: [idev] UDS.KEYID = 0
3,520,781 ready_for_fw is high
3,520,970 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,497 UART: [idev] Erasing UDS.KEYID = 0
6,025,953 UART: [idev] Sha1 KeyId Algorithm
6,047,994 UART: [idev] --
6,051,503 UART: [ldev] ++
6,052,071 UART: [ldev] CDI.KEYID = 6
6,052,986 UART: [ldev] SUBJECT.KEYID = 5
6,054,146 UART: [ldev] AUTHORITY.KEYID = 7
6,055,429 UART: [ldev] FE.KEYID = 1
6,099,288 UART: [ldev] Erasing FE.KEYID = 1
8,605,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,357 UART: [ldev] --
10,412,968 UART: [fwproc] Wait for Commands...
10,416,045 UART: [fwproc] Recv command 0x46574c44
10,418,137 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,836 >>> mbox cmd response: success
14,274,319 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,278,923 UART: [afmc] ++
14,279,514 UART: [afmc] CDI.KEYID = 6
14,280,429 UART: [afmc] SUBJECT.KEYID = 7
14,281,587 UART: [afmc] AUTHORITY.KEYID = 5
16,810,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,198 UART: [afmc] --
18,629,659 UART: [cold-reset] --
18,634,112 UART: [state] Locking Datavault
18,639,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,332 UART: [state] Locking ICCM
18,642,455 UART: [exit] Launching FMC @ 0x40000130
18,650,846 UART:
18,651,075 UART: Running Caliptra FMC ...
18,652,176 UART:
18,652,327 UART: [state] CFI Enabled
18,712,764 UART: [fht] FMC Alias Private Key: 7
20,476,496 UART: [art] Extend RT PCRs Done
20,477,709 UART: [art] Lock RT PCRs Done
20,479,063 UART: [art] Populate DV Done
20,484,314 UART: [fht] FMC Alias Private Key: 7
20,485,756 UART: [art] Derive CDI
20,486,518 UART: [art] Store in in slot 0x4
20,545,558 UART: [art] Derive Key Pair
20,546,583 UART: [art] Store priv key in slot 0x5
23,009,569 UART: [art] Derive Key Pair - Done
23,022,302 UART: [art] Signing Cert with AUTHO
23,023,602 UART: RITY.KEYID = 7
24,735,161 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,665 UART: [art] PUB.X = CC9E654CFE0C60BB43D05E750F2B3B5129675CF77DE36ECAE33182E852040DC331587FF7F11C53C64D77F2D6C514C397
24,743,951 UART: [art] PUB.Y = 985B6D1C68E4A36FBDA08D1F4577F3A8D7700C3AC7EDE7439A4511631F19747F85A81700A6F5F234D2A85D62AE718BAD
24,751,183 UART: [art] SIG.R = CF14DFFF6F4DBB2C6246A278AA23FA63EED43B7F81311D96E42F4508B210386C0526DC71350B2B5A22AD29C5A5C6B341
24,758,541 UART: [art] SIG.S = 9B77790F315C0283B21A6E0269334D02E52C8DE05FE0870AA9619D84BA13A2B878C13C58DB6AD08818F0EA511467DCFF
25,737,756 UART: Caliptra RT
25,738,441 UART: [state] CFI Enabled
25,902,930 UART: [rt] RT listening for mailbox commands...
25,934,349 UART: [rt]cmd =0x43455246, len=4
25,947,230 >>> mbox cmd response data (887 bytes)
25,989,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,019,405 UART: [rt]cmd =0x43455252, len=4
26,030,772 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
3,381,557 ready_for_fw is high
3,381,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,064,580 >>> mbox cmd response: success
14,065,337 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,342,451 UART:
18,342,910 UART: Running Caliptra FMC ...
18,344,017 UART:
18,344,176 UART: [state] CFI Enabled
18,411,293 UART: [fht] FMC Alias Private Key: 7
20,175,610 UART: [art] Extend RT PCRs Done
20,176,846 UART: [art] Lock RT PCRs Done
20,178,527 UART: [art] Populate DV Done
20,183,994 UART: [fht] FMC Alias Private Key: 7
20,185,528 UART: [art] Derive CDI
20,186,307 UART: [art] Store in in slot 0x4
20,244,441 UART: [art] Derive Key Pair
20,245,471 UART: [art] Store priv key in slot 0x5
22,708,455 UART: [art] Derive Key Pair - Done
22,721,544 UART: [art] Signing Cert with AUTHO
22,722,870 UART: RITY.KEYID = 7
24,434,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,694 UART: [art] PUB.X = 54B5892E84486809B7CCDA63361BB6CD3DD093550A573704B0DC2D606CD2DC9D10B342E57388E42ECE8EDC6C3E2844F7
24,442,963 UART: [art] PUB.Y = C14B0DB84400C969DDC1CFD6FE3E711A9AB20BC336F7761597B4C165570613280B7B3F812909F70B200B3D0FC6551892
24,450,247 UART: [art] SIG.R = 8631975E1952973E5D05DA69C5C56E43B527038C6C9E4B5C2A5B778F74C7D48662B4D2E79A18C5A4A1ED4CB33D039296
24,457,612 UART: [art] SIG.S = 8F8C0E558B11E3C1D6B510F623FF473AE0A45A2803BE6594B786024190C7E0221353DEA3C2294C196C6C81112872FC12
25,436,674 UART: Caliptra RT
25,437,376 UART: [state] CFI Enabled
25,602,976 UART: [rt] RT listening for mailbox commands...
25,634,447 UART: [rt]cmd =0x43455246, len=4
25,647,204 >>> mbox cmd response data (887 bytes)
25,689,194 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,719,015 UART: [rt]cmd =0x43455252, len=4
25,730,410 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,921 writing to cptra_bootfsm_go
193,192 UART:
193,572 UART: Running Caliptra ROM ...
194,774 UART:
604,204 UART: [state] CFI Enabled
617,219 UART: [state] LifecycleState = Unprovisioned
619,086 UART: [state] DebugLocked = No
621,744 UART: [state] WD Timer not started. Device not locked for debugging
626,281 UART: [kat] SHA2-256
805,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,963 UART: [kat] ++
817,409 UART: [kat] sha1
828,577 UART: [kat] SHA2-256
831,617 UART: [kat] SHA2-384
836,639 UART: [kat] SHA2-512-ACC
839,580 UART: [kat] ECC-384
3,282,733 UART: [kat] HMAC-384Kdf
3,294,326 UART: [kat] LMS
3,823,824 UART: [kat] --
3,828,690 UART: [cold-reset] ++
3,831,337 UART: [fht] FHT @ 0x50003400
3,843,311 UART: [idev] ++
3,843,877 UART: [idev] CDI.KEYID = 6
3,844,796 UART: [idev] SUBJECT.KEYID = 7
3,845,966 UART: [idev] UDS.KEYID = 0
3,846,892 ready_for_fw is high
3,847,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,381 UART: [idev] Erasing UDS.KEYID = 0
6,320,153 UART: [idev] Sha1 KeyId Algorithm
6,342,923 UART: [idev] --
6,345,607 UART: [ldev] ++
6,346,184 UART: [ldev] CDI.KEYID = 6
6,347,098 UART: [ldev] SUBJECT.KEYID = 5
6,348,262 UART: [ldev] AUTHORITY.KEYID = 7
6,349,505 UART: [ldev] FE.KEYID = 1
6,362,561 UART: [ldev] Erasing FE.KEYID = 1
8,834,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,633 UART: [ldev] --
10,625,791 UART: [fwproc] Wait for Commands...
10,627,999 UART: [fwproc] Recv command 0x46574c44
10,630,042 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,495,964 >>> mbox cmd response: success
14,496,491 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,500,290 UART: [afmc] ++
14,500,877 UART: [afmc] CDI.KEYID = 6
14,501,795 UART: [afmc] SUBJECT.KEYID = 7
14,503,050 UART: [afmc] AUTHORITY.KEYID = 5
17,004,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,809 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,803 UART: [afmc] --
18,801,238 UART: [cold-reset] --
18,805,555 UART: [state] Locking Datavault
18,810,756 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,461 UART: [state] Locking ICCM
18,814,719 UART: [exit] Launching FMC @ 0x40000130
18,823,120 UART:
18,823,398 UART: Running Caliptra FMC ...
18,824,514 UART:
18,824,676 UART: [state] CFI Enabled
18,832,726 UART: [fht] FMC Alias Private Key: 7
20,589,260 UART: [art] Extend RT PCRs Done
20,590,476 UART: [art] Lock RT PCRs Done
20,592,210 UART: [art] Populate DV Done
20,597,513 UART: [fht] FMC Alias Private Key: 7
20,599,054 UART: [art] Derive CDI
20,599,874 UART: [art] Store in in slot 0x4
20,642,039 UART: [art] Derive Key Pair
20,643,064 UART: [art] Store priv key in slot 0x5
23,070,283 UART: [art] Derive Key Pair - Done
23,083,237 UART: [art] Signing Cert with AUTHO
23,084,595 UART: RITY.KEYID = 7
24,789,643 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,178 UART: [art] PUB.X = D5C7B43BB9EAB4F0B056E3F5828B4128BA6DD2C1CA0EBE5EED40135AA0B5D8CC697E8F64D6E23F1C377338D90275F90D
24,798,453 UART: [art] PUB.Y = 68A324A0E3BDA358E8670F9A2776BB536BB3FC5E9A0B988D428D492863E45D841EC6AD05E7219E6E7E3E091012C746BE
24,805,713 UART: [art] SIG.R = B5791F07A245F58113DEB3098A0E6490E5C0759C4FB2CC00E1A506BE666D51D0BD8AC988FB5EEF3DF1ACB460C3D724D1
24,813,073 UART: [art] SIG.S = E7B3A176FFDA295932369F10576235F0616E4B51D5F6E5AC8978620E611905FD31544266976C74FF66BC75C81D0C92F4
25,792,069 UART: Caliptra RT
25,792,771 UART: [state] CFI Enabled
25,910,049 UART: [rt] RT listening for mailbox commands...
25,941,571 UART: [rt]cmd =0x43455246, len=4
25,954,143 >>> mbox cmd response data (887 bytes)
25,996,332 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,026,363 UART: [rt]cmd =0x43455252, len=4
26,037,738 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
3,693,937 ready_for_fw is high
3,694,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,278 >>> mbox cmd response: success
14,273,092 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,525,165 UART:
18,525,569 UART: Running Caliptra FMC ...
18,526,696 UART:
18,526,853 UART: [state] CFI Enabled
18,535,078 UART: [fht] FMC Alias Private Key: 7
20,291,965 UART: [art] Extend RT PCRs Done
20,293,183 UART: [art] Lock RT PCRs Done
20,294,833 UART: [art] Populate DV Done
20,300,195 UART: [fht] FMC Alias Private Key: 7
20,301,848 UART: [art] Derive CDI
20,302,587 UART: [art] Store in in slot 0x4
20,345,080 UART: [art] Derive Key Pair
20,346,128 UART: [art] Store priv key in slot 0x5
22,772,776 UART: [art] Derive Key Pair - Done
22,785,552 UART: [art] Signing Cert with AUTHO
22,786,862 UART: RITY.KEYID = 7
24,492,165 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,668 UART: [art] PUB.X = AC7A6DDBD20798F135A03F88F285B847090E92514512F4AFFE826D98FD2E936F41FA2CB1DC2CBF2C765DA75ECA2763D3
24,500,983 UART: [art] PUB.Y = 1FB4900F465EB57F7218652AFFC3BD61DEAAA788EF9D970FF39CA917B435A3DC2DCEDEC5821B70F8573AD1266A817E0D
24,508,219 UART: [art] SIG.R = 4D0EB0FB0FA86AFA9F18D714CFB8B49F4E6C8466C420B7EFFE8C97D00E5124A47DB4EDA0DC638B4CEEE3BFEADCD9DA47
24,515,698 UART: [art] SIG.S = 045FFFF6A7FBCE99BFC8FE7B1C9E4A3F866ADB9585D6E1FE60ABBD74B8824B97C997373E5E97F10AFC5489FDD2FBD248
25,494,608 UART: Caliptra RT
25,495,311 UART: [state] CFI Enabled
25,612,907 UART: [rt] RT listening for mailbox commands...
25,644,406 UART: [rt]cmd =0x43455246, len=4
25,657,188 >>> mbox cmd response data (887 bytes)
25,699,117 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,729,112 UART: [rt]cmd =0x43455252, len=4
25,740,402 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,330 UART:
192,701 UART: Running Caliptra ROM ...
193,860 UART:
194,006 UART: [state] CFI Enabled
260,019 UART: [state] LifecycleState = Unprovisioned
262,443 UART: [state] DebugLocked = No
265,187 UART: [state] WD Timer not started. Device not locked for debugging
269,903 UART: [kat] SHA2-256
459,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,507 UART: [kat] ++
470,991 UART: [kat] sha1
483,710 UART: [kat] SHA2-256
486,725 UART: [kat] SHA2-384
491,720 UART: [kat] SHA2-512-ACC
494,298 UART: [kat] ECC-384
2,947,149 UART: [kat] HMAC-384Kdf
2,969,620 UART: [kat] LMS
3,501,374 UART: [kat] --
3,504,233 UART: [cold-reset] ++
3,505,380 UART: [fht] FHT @ 0x50003400
3,517,582 UART: [idev] ++
3,518,288 UART: [idev] CDI.KEYID = 6
3,519,166 UART: [idev] SUBJECT.KEYID = 7
3,520,425 UART: [idev] UDS.KEYID = 0
3,521,353 ready_for_fw is high
3,521,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,032 UART: [idev] Erasing UDS.KEYID = 0
6,026,536 UART: [idev] Sha1 KeyId Algorithm
6,048,797 UART: [idev] --
6,053,095 UART: [ldev] ++
6,053,790 UART: [ldev] CDI.KEYID = 6
6,054,674 UART: [ldev] SUBJECT.KEYID = 5
6,055,778 UART: [ldev] AUTHORITY.KEYID = 7
6,057,063 UART: [ldev] FE.KEYID = 1
6,098,570 UART: [ldev] Erasing FE.KEYID = 1
8,603,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,544 UART: [ldev] --
10,412,507 UART: [fwproc] Wait for Commands...
10,414,867 UART: [fwproc] Recv command 0x46574c44
10,417,174 UART: [fwproc] Recv'd Img size: 114084 bytes
13,866,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,270 >>> mbox cmd response: success
14,602,796 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,607,199 UART: [afmc] ++
14,607,898 UART: [afmc] CDI.KEYID = 6
14,609,094 UART: [afmc] SUBJECT.KEYID = 7
14,610,515 UART: [afmc] AUTHORITY.KEYID = 5
17,147,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,310 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,952 UART: [afmc] --
18,945,744 UART: [cold-reset] --
18,950,258 UART: [state] Locking Datavault
18,957,303 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,465 UART: [state] Locking ICCM
18,961,838 UART: [exit] Launching FMC @ 0x40000130
18,970,470 UART:
18,970,700 UART: Running Caliptra FMC ...
18,971,797 UART:
18,971,954 UART: [state] CFI Enabled
19,026,459 UART: [fht] FMC Alias Private Key: 7
20,791,188 UART: [art] Extend RT PCRs Done
20,792,428 UART: [art] Lock RT PCRs Done
20,794,155 UART: [art] Populate DV Done
20,799,613 UART: [fht] FMC Alias Private Key: 7
20,801,204 UART: [art] Derive CDI
20,802,018 UART: [art] Store in in slot 0x4
20,859,471 UART: [art] Derive Key Pair
20,860,502 UART: [art] Store priv key in slot 0x5
23,323,451 UART: [art] Derive Key Pair - Done
23,336,539 UART: [art] Signing Cert with AUTHO
23,337,889 UART: RITY.KEYID = 7
25,049,029 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,528 UART: [art] PUB.X = B04C0106FBD0169C3B954A9D5DC25D85BDF785DF6A00752680B53A4BE2CC6CA30B7D6A29D5343EC0B73D9C4AEAA52980
25,057,790 UART: [art] PUB.Y = 1174358DC164301222F456E03EAE15D4EA3903E1870C4F4C034260FAFA013304643A03781EE35F3AC0559227447DB0FF
25,065,037 UART: [art] SIG.R = CCC75955EEAFAA444A8507492205A012A1DB9775C8A7B8AB045DD5A2B4DBF26346CD400B9981BEB590EB14D7D43026D7
25,072,412 UART: [art] SIG.S = D11041316F960B63318CECABD65FDBBC3599F2D1662BE5033CCCA87A6F2718B00D1CEFFABDA3D364C1DD626124FFB7DB
26,051,261 UART: Caliptra RT
26,051,993 UART: [state] CFI Enabled
26,217,041 UART: [rt] RT listening for mailbox commands...
26,248,246 UART: [rt]cmd =0x43455246, len=4
26,261,113 >>> mbox cmd response data (887 bytes)
26,304,015 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,334,001 UART: [rt]cmd =0x43455252, len=4
26,345,297 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,437,795 ready_for_fw is high
3,438,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,726,593 >>> mbox cmd response: success
14,727,379 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,006,593 UART:
19,007,000 UART: Running Caliptra FMC ...
19,008,148 UART:
19,008,318 UART: [state] CFI Enabled
19,073,802 UART: [fht] FMC Alias Private Key: 7
20,837,370 UART: [art] Extend RT PCRs Done
20,838,621 UART: [art] Lock RT PCRs Done
20,840,571 UART: [art] Populate DV Done
20,845,722 UART: [fht] FMC Alias Private Key: 7
20,847,367 UART: [art] Derive CDI
20,848,183 UART: [art] Store in in slot 0x4
20,906,181 UART: [art] Derive Key Pair
20,907,225 UART: [art] Store priv key in slot 0x5
23,370,023 UART: [art] Derive Key Pair - Done
23,383,023 UART: [art] Signing Cert with AUTHO
23,384,331 UART: RITY.KEYID = 7
25,096,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,289 UART: [art] PUB.X = 892EF81DED4057F65B1E6F01DFEBD04CF56E4E213A4DB4553F79F29DB35B6EB5AD94ADF20077282E75143F3A2F7B3918
25,105,437 UART: [art] PUB.Y = 67AD5080F51EA042A10EF495F08EB9FBF437AD15908877AB301FFD06066A092C11F8D4D4B9037F2D0CBF0F1C52208E31
25,112,706 UART: [art] SIG.R = EE3E730C6C3ADE90D5A7BC2EAA5AA49E1E100A38F9C8CEA18A71F18CDBC37751FDD10C760A8A95F5CA05DFEF2AA0455C
25,120,100 UART: [art] SIG.S = 4CE6B4D1229D2B6A858BC86781AA39F0B3913115911A8ADFDF028FE736240452ABD550B3BC626063D38A36CFF505057C
26,099,203 UART: Caliptra RT
26,099,926 UART: [state] CFI Enabled
26,265,830 UART: [rt] RT listening for mailbox commands...
26,297,519 UART: [rt]cmd =0x43455246, len=4
26,310,181 >>> mbox cmd response data (887 bytes)
26,352,247 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,382,176 UART: [rt]cmd =0x43455252, len=4
26,393,544 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
193,033 UART:
193,407 UART: Running Caliptra ROM ...
194,606 UART:
604,031 UART: [state] CFI Enabled
617,227 UART: [state] LifecycleState = Unprovisioned
619,602 UART: [state] DebugLocked = No
622,268 UART: [state] WD Timer not started. Device not locked for debugging
626,243 UART: [kat] SHA2-256
816,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,905 UART: [kat] ++
827,430 UART: [kat] sha1
838,373 UART: [kat] SHA2-256
841,387 UART: [kat] SHA2-384
847,805 UART: [kat] SHA2-512-ACC
850,336 UART: [kat] ECC-384
3,292,553 UART: [kat] HMAC-384Kdf
3,305,186 UART: [kat] LMS
3,837,019 UART: [kat] --
3,841,314 UART: [cold-reset] ++
3,843,061 UART: [fht] FHT @ 0x50003400
3,854,264 UART: [idev] ++
3,854,983 UART: [idev] CDI.KEYID = 6
3,855,899 UART: [idev] SUBJECT.KEYID = 7
3,857,152 UART: [idev] UDS.KEYID = 0
3,858,077 ready_for_fw is high
3,858,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,614 UART: [idev] Erasing UDS.KEYID = 0
6,329,668 UART: [idev] Sha1 KeyId Algorithm
6,353,809 UART: [idev] --
6,357,316 UART: [ldev] ++
6,358,016 UART: [ldev] CDI.KEYID = 6
6,358,930 UART: [ldev] SUBJECT.KEYID = 5
6,360,093 UART: [ldev] AUTHORITY.KEYID = 7
6,361,327 UART: [ldev] FE.KEYID = 1
6,372,194 UART: [ldev] Erasing FE.KEYID = 1
8,850,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,479 UART: [ldev] --
10,642,018 UART: [fwproc] Wait for Commands...
10,644,591 UART: [fwproc] Recv command 0x46574c44
10,646,849 UART: [fwproc] Recv'd Img size: 114084 bytes
14,091,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,829,336 >>> mbox cmd response: success
14,829,841 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,832,980 UART: [afmc] ++
14,833,728 UART: [afmc] CDI.KEYID = 6
14,834,833 UART: [afmc] SUBJECT.KEYID = 7
14,836,377 UART: [afmc] AUTHORITY.KEYID = 5
17,339,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,847 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,590 UART: [afmc] --
19,134,574 UART: [cold-reset] --
19,138,658 UART: [state] Locking Datavault
19,142,964 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,128 UART: [state] Locking ICCM
19,146,504 UART: [exit] Launching FMC @ 0x40000130
19,155,179 UART:
19,155,417 UART: Running Caliptra FMC ...
19,156,445 UART:
19,156,592 UART: [state] CFI Enabled
19,165,016 UART: [fht] FMC Alias Private Key: 7
20,921,890 UART: [art] Extend RT PCRs Done
20,923,114 UART: [art] Lock RT PCRs Done
20,924,872 UART: [art] Populate DV Done
20,930,445 UART: [fht] FMC Alias Private Key: 7
20,931,980 UART: [art] Derive CDI
20,932,714 UART: [art] Store in in slot 0x4
20,975,624 UART: [art] Derive Key Pair
20,976,663 UART: [art] Store priv key in slot 0x5
23,403,341 UART: [art] Derive Key Pair - Done
23,416,177 UART: [art] Signing Cert with AUTHO
23,417,473 UART: RITY.KEYID = 7
25,122,906 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,397 UART: [art] PUB.X = 8D31F21FF8EB35B3283D474F6492FA464C8A7FBE34259BC923B69F33B60981A63BEFEF9B8B74A8C51463D3B4E140110D
25,131,673 UART: [art] PUB.Y = 36271D1524E59A3ABF28D8F6E2803F421993EBF7991B5616879323BF48E1C5B620D094008F7F476F3FA31455395723BB
25,138,877 UART: [art] SIG.R = EF2B725B63636767AE1A3525B3290FD1566E0C2556ACF4EBB58897688CB22A40E6C25820B05F098BDF4A1B64DEDE8848
25,146,252 UART: [art] SIG.S = FEF3CC5AEB36704C8CE195E362D2114C19C057D6DDCA6918FAA14BCE96179A461BCF218BBCED442D76926429E8DAFA26
26,125,102 UART: Caliptra RT
26,125,821 UART: [state] CFI Enabled
26,243,628 UART: [rt] RT listening for mailbox commands...
26,274,988 UART: [rt]cmd =0x43455246, len=4
26,287,584 >>> mbox cmd response data (887 bytes)
26,329,953 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,359,882 UART: [rt]cmd =0x43455252, len=4
26,371,168 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
3,754,836 ready_for_fw is high
3,755,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,953,945 >>> mbox cmd response: success
14,954,606 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,208,732 UART:
19,209,124 UART: Running Caliptra FMC ...
19,210,225 UART:
19,210,377 UART: [state] CFI Enabled
19,218,607 UART: [fht] FMC Alias Private Key: 7
20,975,933 UART: [art] Extend RT PCRs Done
20,977,164 UART: [art] Lock RT PCRs Done
20,978,829 UART: [art] Populate DV Done
20,984,188 UART: [fht] FMC Alias Private Key: 7
20,985,758 UART: [art] Derive CDI
20,986,532 UART: [art] Store in in slot 0x4
21,029,019 UART: [art] Derive Key Pair
21,030,033 UART: [art] Store priv key in slot 0x5
23,456,965 UART: [art] Derive Key Pair - Done
23,470,011 UART: [art] Signing Cert with AUTHO
23,471,369 UART: RITY.KEYID = 7
25,176,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,276 UART: [art] PUB.X = C5ECD5DE149E07841DCA7AE0180CBC85441527517AF09DF42C2B60AF88CD97578BE886161162E049D83D01D678F945DD
25,185,515 UART: [art] PUB.Y = 66525DE0A583EDE5B19C9FC83624FC1D00D7862CFE6F8FB8D3AB75412A954B11AA4FDA5F11A96C1D4719262E3C412D66
25,192,792 UART: [art] SIG.R = F3DA6B2CF00EBDDE3FF08046172BB19881CEDEF105161D220967B1633A2AD35E06FF5AEF1F2BA9642CE841656553AD14
25,200,197 UART: [art] SIG.S = 85FE0B9AFB1EC414766C4EAD99162882F9259DB03704A5D492815FB4C7E94D7A06399C6C741FDC34A7DE6E4B90DC6A97
26,178,540 UART: Caliptra RT
26,179,712 UART: [state] CFI Enabled
26,295,765 UART: [rt] RT listening for mailbox commands...
26,327,186 UART: [rt]cmd =0x43455246, len=4
26,339,825 >>> mbox cmd response data (887 bytes)
26,381,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,411,963 UART: [rt]cmd =0x43455252, len=4
26,423,050 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,492 UART: [kat] LMS
1,475,688 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,476,945 UART: [fht] Storing FHT @ 0x50003400
1,479,714 UART: [idev] ++
1,479,882 UART: [idev] CDI.KEYID = 6
1,480,242 UART: [idev] SUBJECT.KEYID = 7
1,480,666 UART: [idev] UDS.KEYID = 0
1,481,011 ready_for_fw is high
1,481,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,570 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,960 UART: [idev] --
1,514,965 UART: [ldev] ++
1,515,133 UART: [ldev] CDI.KEYID = 6
1,515,496 UART: [ldev] SUBJECT.KEYID = 5
1,515,922 UART: [ldev] AUTHORITY.KEYID = 7
1,516,385 UART: [ldev] FE.KEYID = 1
1,521,895 UART: [ldev] Erasing FE.KEYID = 1
1,547,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,418 UART: [ldev] --
1,586,687 UART: [fwproc] Waiting for Commands...
1,587,486 UART: [fwproc] Received command 0x46574c44
1,588,277 UART: [fwproc] Received Image of size 114084 bytes
2,883,233 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,897 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,249 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,774 >>> mbox cmd response: success
3,075,774 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,076,916 UART: [afmc] ++
3,077,084 UART: [afmc] CDI.KEYID = 6
3,077,446 UART: [afmc] SUBJECT.KEYID = 7
3,077,871 UART: [afmc] AUTHORITY.KEYID = 5
3,113,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,089 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,779 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,842 UART: [afmc] --
3,156,738 UART: [cold-reset] --
3,157,648 UART: [state] Locking Datavault
3,158,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,435 UART: [state] Locking ICCM
3,159,973 UART: [exit] Launching FMC @ 0x40000130
3,165,302 UART:
3,165,318 UART: Running Caliptra FMC ...
3,165,726 UART:
3,165,780 UART: [state] CFI Enabled
3,176,245 UART: [fht] FMC Alias Private Key: 7
3,284,252 UART: [art] Extend RT PCRs Done
3,284,680 UART: [art] Lock RT PCRs Done
3,286,176 UART: [art] Populate DV Done
3,294,515 UART: [fht] FMC Alias Private Key: 7
3,295,687 UART: [art] Derive CDI
3,295,967 UART: [art] Store in in slot 0x4
3,381,924 UART: [art] Derive Key Pair
3,382,284 UART: [art] Store priv key in slot 0x5
3,394,842 UART: [art] Derive Key Pair - Done
3,409,617 UART: [art] Signing Cert with AUTHO
3,410,097 UART: RITY.KEYID = 7
3,425,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,072 UART: [art] PUB.X = 8A1F50CA039A49D0D9597DB0B75B7D78E10C420AB45F15B882E2FFC81A57400AAFC3C4F087B34910864FF68D64957CED
3,432,840 UART: [art] PUB.Y = 6C57D8F0BAD807F713909DCA41E53B51F8B6676FCEBDAA97AF9C25B71DC8F496F8465B9A28E6B46C327B73A04E8F9759
3,439,801 UART: [art] SIG.R = 48DE85696A7796883DBE997310277BA38EA620FA4BED241C9ECB18750B3810A4CE2DFEEF04024A479A63B343B46F043B
3,446,565 UART: [art] SIG.S = 2B63FC5D467D0D91478A6F4DD6AFE1D82CC52319352CC7E7A7B5D1B08A29B7ABF38008041851BB70B59BDA996857022B
3,469,390 UART: Caliptra RT
3,469,643 UART: [state] CFI Enabled
3,577,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,269 UART: [rt]cmd =0x43455246, len=4
3,620,660 >>> mbox cmd response data (920 bytes)
3,620,661 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,874 UART: [rt]cmd =0x43455252, len=4
3,660,840 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,223 ready_for_fw is high
1,362,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,652 >>> mbox cmd response: success
2,923,652 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,985,106 UART:
2,985,122 UART: Running Caliptra FMC ...
2,985,530 UART:
2,985,584 UART: [state] CFI Enabled
2,996,455 UART: [fht] FMC Alias Private Key: 7
3,104,420 UART: [art] Extend RT PCRs Done
3,104,848 UART: [art] Lock RT PCRs Done
3,106,542 UART: [art] Populate DV Done
3,114,647 UART: [fht] FMC Alias Private Key: 7
3,115,717 UART: [art] Derive CDI
3,115,997 UART: [art] Store in in slot 0x4
3,201,832 UART: [art] Derive Key Pair
3,202,192 UART: [art] Store priv key in slot 0x5
3,214,720 UART: [art] Derive Key Pair - Done
3,229,264 UART: [art] Signing Cert with AUTHO
3,229,744 UART: RITY.KEYID = 7
3,245,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,093 UART: [art] PUB.X = A6F50ED23E04F1B71A50994979052955489897887E5FE3A047357037C7CA10FF74AF06AFC7DCA3DD6AA6048FAC7E2132
3,252,852 UART: [art] PUB.Y = 75938112BFAF9892299238F0E458CD127439E0A63578A63E34D65CF94FB2DCC2B6D8D1CDBCE171D01206B0BB195AB6E3
3,259,807 UART: [art] SIG.R = 3AB6F8488D73C1AA397C2315FB0737819B08F4C0C4385498DA0786190139379DE472D213490008BDB39B2758E449DADA
3,266,534 UART: [art] SIG.S = 49B750DD17EF72BE2525DE4DB412977CB07CF237B1CCFBFAD7EF482B089997302FBA1345CEFED79106BFAD10FD0B28D6
3,290,680 UART: Caliptra RT
3,290,933 UART: [state] CFI Enabled
3,399,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,887 UART: [rt]cmd =0x43455246, len=4
3,442,188 >>> mbox cmd response data (920 bytes)
3,442,189 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,544 UART: [rt]cmd =0x43455252, len=4
3,482,382 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,566 UART: [kat] SHA2-256
892,504 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,579 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,546 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,689 UART: [idev] ++
1,479,857 UART: [idev] CDI.KEYID = 6
1,480,217 UART: [idev] SUBJECT.KEYID = 7
1,480,641 UART: [idev] UDS.KEYID = 0
1,480,986 ready_for_fw is high
1,480,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,883 UART: [idev] Erasing UDS.KEYID = 0
1,505,149 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,939 UART: [idev] --
1,514,848 UART: [ldev] ++
1,515,016 UART: [ldev] CDI.KEYID = 6
1,515,379 UART: [ldev] SUBJECT.KEYID = 5
1,515,805 UART: [ldev] AUTHORITY.KEYID = 7
1,516,268 UART: [ldev] FE.KEYID = 1
1,521,636 UART: [ldev] Erasing FE.KEYID = 1
1,547,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,117 UART: [ldev] --
1,586,422 UART: [fwproc] Waiting for Commands...
1,587,047 UART: [fwproc] Received command 0x46574c44
1,587,838 UART: [fwproc] Received Image of size 114084 bytes
2,883,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,067 >>> mbox cmd response: success
3,075,067 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,076,101 UART: [afmc] ++
3,076,269 UART: [afmc] CDI.KEYID = 6
3,076,631 UART: [afmc] SUBJECT.KEYID = 7
3,077,056 UART: [afmc] AUTHORITY.KEYID = 5
3,112,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,364 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,054 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,783 UART: [afmc] --
3,155,749 UART: [cold-reset] --
3,156,739 UART: [state] Locking Datavault
3,157,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,384 UART: [state] Locking ICCM
3,158,986 UART: [exit] Launching FMC @ 0x40000130
3,164,315 UART:
3,164,331 UART: Running Caliptra FMC ...
3,164,739 UART:
3,164,882 UART: [state] CFI Enabled
3,175,391 UART: [fht] FMC Alias Private Key: 7
3,283,048 UART: [art] Extend RT PCRs Done
3,283,476 UART: [art] Lock RT PCRs Done
3,284,680 UART: [art] Populate DV Done
3,292,965 UART: [fht] FMC Alias Private Key: 7
3,294,109 UART: [art] Derive CDI
3,294,389 UART: [art] Store in in slot 0x4
3,379,858 UART: [art] Derive Key Pair
3,380,218 UART: [art] Store priv key in slot 0x5
3,393,792 UART: [art] Derive Key Pair - Done
3,408,441 UART: [art] Signing Cert with AUTHO
3,408,921 UART: RITY.KEYID = 7
3,423,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,556 UART: [art] PUB.X = 1854806BA658545BEEE26C59E7323CA845C6110A7E336FA39D533F4BBF435CAFA8EE9A179FF55EAF5DAF529102704C2A
3,431,332 UART: [art] PUB.Y = FDF9326FD363D3CDD3BD62D528E98CC06D39E5E3B45E1874173F4DF28A568DEBA27AEB561FA82FB3BE1CD14E65CDD5DD
3,438,310 UART: [art] SIG.R = AEB8C7F504EB8FA7DA13AFF7732F5D59D2C7EB9E68DF317B77F3BA14EADFD4BB1D6135DA2D4B2F26067D8181DFE9CD65
3,445,104 UART: [art] SIG.S = 83595A658DABDB1333DF6D3185C7365333CBC1F7364581A5CA94B9C59B5C573AB49754E03C2735A1BA1313B5B4262710
3,469,055 UART: Caliptra RT
3,469,400 UART: [state] CFI Enabled
3,576,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,658 UART: [rt]cmd =0x43455246, len=4
3,619,919 >>> mbox cmd response data (920 bytes)
3,619,920 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,267 UART: [rt]cmd =0x43455252, len=4
3,659,854 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,201 >>> mbox cmd response: success
2,924,201 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,985,511 UART:
2,985,527 UART: Running Caliptra FMC ...
2,985,935 UART:
2,986,078 UART: [state] CFI Enabled
2,996,805 UART: [fht] FMC Alias Private Key: 7
3,104,766 UART: [art] Extend RT PCRs Done
3,105,194 UART: [art] Lock RT PCRs Done
3,106,874 UART: [art] Populate DV Done
3,115,239 UART: [fht] FMC Alias Private Key: 7
3,116,289 UART: [art] Derive CDI
3,116,569 UART: [art] Store in in slot 0x4
3,202,600 UART: [art] Derive Key Pair
3,202,960 UART: [art] Store priv key in slot 0x5
3,216,048 UART: [art] Derive Key Pair - Done
3,230,857 UART: [art] Signing Cert with AUTHO
3,231,337 UART: RITY.KEYID = 7
3,246,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,598 UART: [art] PUB.X = 8325E13D92B5DA9E2B09D77744E28A66C06A8F7F784D52CE1A21B3E200DED6C4543A162F8A952BDA6EDADBB378E3FDA5
3,254,361 UART: [art] PUB.Y = E0291BD3A0EEDD542FBA93AB6CFBC501FBFCDF776C2091ABDD192AF46AFDCC311B62CF9D1FB8E8E3A335BDB955AD5FCB
3,261,350 UART: [art] SIG.R = 719F77408592AEFB088A83FDB46E329148B7A7F9136B21CF925870FDDB466A974EE150935CC3DCB5B7DB1A4E05A170B7
3,268,122 UART: [art] SIG.S = 6264E1B1C14E139F6F49D192CCDAD17DBA234D63BBAA2AE1028D7EAB660B70151999BA020981B013F6DA4FF83153C39A
3,292,061 UART: Caliptra RT
3,292,406 UART: [state] CFI Enabled
3,399,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,072 UART: [rt]cmd =0x43455246, len=4
3,442,337 >>> mbox cmd response data (920 bytes)
3,442,338 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,601 UART: [rt]cmd =0x43455252, len=4
3,482,569 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,611 UART: [kat] SHA2-256
903,551 UART: [kat] SHA2-384
906,226 UART: [kat] SHA2-512-ACC
908,127 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,274 UART: [kat] LMS
1,170,602 UART: [kat] --
1,171,329 UART: [cold-reset] ++
1,171,749 UART: [fht] FHT @ 0x50003400
1,174,566 UART: [idev] ++
1,174,734 UART: [idev] CDI.KEYID = 6
1,175,094 UART: [idev] SUBJECT.KEYID = 7
1,175,518 UART: [idev] UDS.KEYID = 0
1,175,863 ready_for_fw is high
1,175,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,229 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,146 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,396 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,694 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,139 >>> mbox cmd response: success
2,770,139 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,771,323 UART: [afmc] ++
2,771,491 UART: [afmc] CDI.KEYID = 6
2,771,853 UART: [afmc] SUBJECT.KEYID = 7
2,772,278 UART: [afmc] AUTHORITY.KEYID = 5
2,808,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,704 UART: [afmc] --
2,851,808 UART: [cold-reset] --
2,852,598 UART: [state] Locking Datavault
2,853,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,363 UART: [state] Locking ICCM
2,854,985 UART: [exit] Launching FMC @ 0x40000130
2,860,314 UART:
2,860,330 UART: Running Caliptra FMC ...
2,860,738 UART:
2,860,792 UART: [state] CFI Enabled
2,871,687 UART: [fht] FMC Alias Private Key: 7
2,979,442 UART: [art] Extend RT PCRs Done
2,979,870 UART: [art] Lock RT PCRs Done
2,981,518 UART: [art] Populate DV Done
2,989,753 UART: [fht] FMC Alias Private Key: 7
2,990,701 UART: [art] Derive CDI
2,990,981 UART: [art] Store in in slot 0x4
3,077,072 UART: [art] Derive Key Pair
3,077,432 UART: [art] Store priv key in slot 0x5
3,090,862 UART: [art] Derive Key Pair - Done
3,105,671 UART: [art] Signing Cert with AUTHO
3,106,151 UART: RITY.KEYID = 7
3,121,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,420 UART: [art] PUB.X = A986C94301029A78CB2A1170B8E84D12F1597BC5FB5CC080E99A51DED3A78C3C96F140828172DB5D109FD46F34B623D4
3,129,188 UART: [art] PUB.Y = 25C26BF45DA31361A07C6190A34DD79B114ABC98A9C52A2A4AFD814E4FF61CCB4BB6B6F2197EF2E02BD3004160C2D09F
3,136,132 UART: [art] SIG.R = C1EA44C868FA1E29B0E97DC4BB695885921023FE4F5FC62BB20F8EB0B3907CA5D215CE0CB32D45CB349F08C63C3C7464
3,142,907 UART: [art] SIG.S = 5E89C667740CFFFF0680303166175FB89303E0BF4CF9558F04E9A2CA5EB9CF5A4F6A9D8DD19C9C3122FE6DC5CF53BAC4
3,167,062 UART: Caliptra RT
3,167,315 UART: [state] CFI Enabled
3,275,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,466 UART: [rt]cmd =0x43455246, len=4
3,318,607 >>> mbox cmd response data (887 bytes)
3,318,608 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,991 UART: [rt]cmd =0x43455252, len=4
3,358,937 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 ready_for_fw is high
1,060,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,658 >>> mbox cmd response: success
2,621,658 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,302 UART:
2,684,318 UART: Running Caliptra FMC ...
2,684,726 UART:
2,684,780 UART: [state] CFI Enabled
2,695,529 UART: [fht] FMC Alias Private Key: 7
2,802,790 UART: [art] Extend RT PCRs Done
2,803,218 UART: [art] Lock RT PCRs Done
2,804,812 UART: [art] Populate DV Done
2,813,027 UART: [fht] FMC Alias Private Key: 7
2,814,207 UART: [art] Derive CDI
2,814,487 UART: [art] Store in in slot 0x4
2,900,316 UART: [art] Derive Key Pair
2,900,676 UART: [art] Store priv key in slot 0x5
2,913,692 UART: [art] Derive Key Pair - Done
2,928,666 UART: [art] Signing Cert with AUTHO
2,929,146 UART: RITY.KEYID = 7
2,944,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,357 UART: [art] PUB.X = FAD8AD34A56D99CBEDE876FB5985B820EA72B5074AFF10173D8E7C64C135D7838D14CDDB5D8F22FA3DBF0756055A419A
2,952,136 UART: [art] PUB.Y = 5776F787F3EFE6274734B9CBC5155BE20A30E07AAFDD16FF2E4DBF4D7DF4E148B072E7BE45F63522BE6B41C8A358ECFD
2,959,105 UART: [art] SIG.R = 611C2EE55C2AA82BF65AC657251631ABBEBBEA5E16FA65191A847031E9A44EE82B46FC436B876980DD5162973F8BC42D
2,965,885 UART: [art] SIG.S = 56E511DA8E81C6637EA0714BD35FDBAFC60D2A26643AFB0AC037FDFD30841BD575E6A9D52434F8F436AF26A245EACDE9
2,989,124 UART: Caliptra RT
2,989,377 UART: [state] CFI Enabled
3,097,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,914 UART: [rt]cmd =0x43455246, len=4
3,139,989 >>> mbox cmd response data (887 bytes)
3,139,990 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,367 UART: [rt]cmd =0x43455252, len=4
3,180,039 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
893,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,278 UART: [kat] ++
897,430 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,631 UART: [kat] SHA2-512-ACC
908,532 UART: [kat] ECC-384
918,479 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,076 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,147 UART: [idev] ++
1,175,315 UART: [idev] CDI.KEYID = 6
1,175,675 UART: [idev] SUBJECT.KEYID = 7
1,176,099 UART: [idev] UDS.KEYID = 0
1,176,444 ready_for_fw is high
1,176,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,231 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,360 UART: [ldev] ++
1,211,528 UART: [ldev] CDI.KEYID = 6
1,211,891 UART: [ldev] SUBJECT.KEYID = 5
1,212,317 UART: [ldev] AUTHORITY.KEYID = 7
1,212,780 UART: [ldev] FE.KEYID = 1
1,218,214 UART: [ldev] Erasing FE.KEYID = 1
1,244,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,308 UART: [ldev] --
1,283,657 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,240 >>> mbox cmd response: success
2,772,240 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,773,404 UART: [afmc] ++
2,773,572 UART: [afmc] CDI.KEYID = 6
2,773,934 UART: [afmc] SUBJECT.KEYID = 7
2,774,359 UART: [afmc] AUTHORITY.KEYID = 5
2,811,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,894 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,343 UART: [afmc] --
2,854,463 UART: [cold-reset] --
2,855,285 UART: [state] Locking Datavault
2,856,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,234 UART: [state] Locking ICCM
2,857,848 UART: [exit] Launching FMC @ 0x40000130
2,863,177 UART:
2,863,193 UART: Running Caliptra FMC ...
2,863,601 UART:
2,863,744 UART: [state] CFI Enabled
2,874,309 UART: [fht] FMC Alias Private Key: 7
2,982,464 UART: [art] Extend RT PCRs Done
2,982,892 UART: [art] Lock RT PCRs Done
2,984,278 UART: [art] Populate DV Done
2,992,621 UART: [fht] FMC Alias Private Key: 7
2,993,707 UART: [art] Derive CDI
2,993,987 UART: [art] Store in in slot 0x4
3,079,070 UART: [art] Derive Key Pair
3,079,430 UART: [art] Store priv key in slot 0x5
3,093,450 UART: [art] Derive Key Pair - Done
3,108,009 UART: [art] Signing Cert with AUTHO
3,108,489 UART: RITY.KEYID = 7
3,123,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,478 UART: [art] PUB.X = 72C40B3B9D199C011204529CDE4AA403BA4E136CE9D363BFADA10042F560A1FB48A8E981DA96535F30C76E006FC43A1B
3,131,202 UART: [art] PUB.Y = 95A7FD9056519B692AA6AA247A81600530F2C5369D9CF2D0BA3374FA2ADFB6B70544E89B73C45640C89B278997CF948F
3,138,148 UART: [art] SIG.R = 0404A6DCD6F799B18839C9FDF22BCCD16B85D4BFFBEF45951719699FED4F4ED96186A7B3269BF41525C1F491A26D4246
3,144,922 UART: [art] SIG.S = BD7AB30B476BFCD247ABEDE02CE0F5CF399D7A4CBCD5043322FE456F2ADC50973DAA35C1E5EE85CB38E9C316976CB3B5
3,169,111 UART: Caliptra RT
3,169,456 UART: [state] CFI Enabled
3,277,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,499 UART: [rt]cmd =0x43455246, len=4
3,319,698 >>> mbox cmd response data (887 bytes)
3,319,699 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,922 UART: [rt]cmd =0x43455252, len=4
3,359,854 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 ready_for_fw is high
1,061,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,529 >>> mbox cmd response: success
2,623,529 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,685,777 UART:
2,685,793 UART: Running Caliptra FMC ...
2,686,201 UART:
2,686,344 UART: [state] CFI Enabled
2,696,977 UART: [fht] FMC Alias Private Key: 7
2,805,186 UART: [art] Extend RT PCRs Done
2,805,614 UART: [art] Lock RT PCRs Done
2,807,334 UART: [art] Populate DV Done
2,815,785 UART: [fht] FMC Alias Private Key: 7
2,816,839 UART: [art] Derive CDI
2,817,119 UART: [art] Store in in slot 0x4
2,902,844 UART: [art] Derive Key Pair
2,903,204 UART: [art] Store priv key in slot 0x5
2,916,312 UART: [art] Derive Key Pair - Done
2,930,817 UART: [art] Signing Cert with AUTHO
2,931,297 UART: RITY.KEYID = 7
2,946,793 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,558 UART: [art] PUB.X = 60B4A43336B1862CF363A4E75C6BDE3123375B1331B8FEA97EDEDB416D4BDDE561C901764E13A2062148EFB0BBC5E898
2,954,332 UART: [art] PUB.Y = 353C792CFDD812B8B302AFEC4A82F292A18E005BD8B6F417B70AF09E31701C637011613C514664380998EAEA52C015B8
2,961,251 UART: [art] SIG.R = 7ED7B2F13EA0A65DFEE4ABC154B2AF07B7BEE39BCA1968F658DDBB8435758278C122CBE9E894667EE4CA710FE217AF9E
2,968,039 UART: [art] SIG.S = C67FA1A4C34828E2273AE3775200509BD5DB1D6A8B22411AF1268F9783205240CAB10C27CF2717F43BC2C22B493E3417
2,991,915 UART: Caliptra RT
2,992,260 UART: [state] CFI Enabled
3,099,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,141 UART: [rt]cmd =0x43455246, len=4
3,142,250 >>> mbox cmd response data (887 bytes)
3,142,251 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,726 UART: [rt]cmd =0x43455252, len=4
3,182,560 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,878 UART: [kat] HMAC-384Kdf
920,230 UART: [kat] LMS
1,168,542 UART: [kat] --
1,169,365 UART: [cold-reset] ++
1,169,763 UART: [fht] FHT @ 0x50003400
1,172,307 UART: [idev] ++
1,172,475 UART: [idev] CDI.KEYID = 6
1,172,836 UART: [idev] SUBJECT.KEYID = 7
1,173,261 UART: [idev] UDS.KEYID = 0
1,173,607 ready_for_fw is high
1,173,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,171 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,661 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,951 >>> mbox cmd response: success
2,767,951 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,769,082 UART: [afmc] ++
2,769,250 UART: [afmc] CDI.KEYID = 6
2,769,613 UART: [afmc] SUBJECT.KEYID = 7
2,770,039 UART: [afmc] AUTHORITY.KEYID = 5
2,805,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,121 UART: [afmc] --
2,849,005 UART: [cold-reset] --
2,849,723 UART: [state] Locking Datavault
2,850,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,396 UART: [state] Locking ICCM
2,852,060 UART: [exit] Launching FMC @ 0x40000130
2,857,389 UART:
2,857,405 UART: Running Caliptra FMC ...
2,857,813 UART:
2,857,867 UART: [state] CFI Enabled
2,868,566 UART: [fht] FMC Alias Private Key: 7
2,976,435 UART: [art] Extend RT PCRs Done
2,976,863 UART: [art] Lock RT PCRs Done
2,978,181 UART: [art] Populate DV Done
2,986,272 UART: [fht] FMC Alias Private Key: 7
2,987,202 UART: [art] Derive CDI
2,987,482 UART: [art] Store in in slot 0x4
3,073,085 UART: [art] Derive Key Pair
3,073,445 UART: [art] Store priv key in slot 0x5
3,086,985 UART: [art] Derive Key Pair - Done
3,101,582 UART: [art] Signing Cert with AUTHO
3,102,062 UART: RITY.KEYID = 7
3,117,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,937 UART: [art] PUB.X = 687B922B0B6DD00E9EE1E112AF88EF2ED193082707849DCD73DB796B67A865CAA6B0EDC44FEC0690FE52027C45525C3E
3,124,701 UART: [art] PUB.Y = 18BBA2D5BA2C3EC1C53154A7A84662A583FFDEB4AFCA63320B6F9F726E57B7FF6BE0FF9B2D8B0DD49676AE556BA5DD82
3,131,671 UART: [art] SIG.R = 6B6C62E866E17C5074064FC7E10E316881FB060F5086915B0720CC07A60E072C8662EA8EC7BCE9D23864D464BD1D4F66
3,138,417 UART: [art] SIG.S = B6843A1F8BA2B55C48D6E5206639E21B50667FB91AC07593FD7516DACF6133C847F0FF11F132B0F096CC5B67B7F85A6F
3,162,526 UART: Caliptra RT
3,162,779 UART: [state] CFI Enabled
3,270,790 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,274 UART: [rt]cmd =0x43455246, len=4
3,313,323 >>> mbox cmd response data (887 bytes)
3,313,324 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,781 UART: [rt]cmd =0x43455252, len=4
3,353,769 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,536 ready_for_fw is high
1,056,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,863 >>> mbox cmd response: success
2,618,863 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,681,431 UART:
2,681,447 UART: Running Caliptra FMC ...
2,681,855 UART:
2,681,909 UART: [state] CFI Enabled
2,692,336 UART: [fht] FMC Alias Private Key: 7
2,799,947 UART: [art] Extend RT PCRs Done
2,800,375 UART: [art] Lock RT PCRs Done
2,801,895 UART: [art] Populate DV Done
2,810,144 UART: [fht] FMC Alias Private Key: 7
2,811,172 UART: [art] Derive CDI
2,811,452 UART: [art] Store in in slot 0x4
2,896,759 UART: [art] Derive Key Pair
2,897,119 UART: [art] Store priv key in slot 0x5
2,910,695 UART: [art] Derive Key Pair - Done
2,925,754 UART: [art] Signing Cert with AUTHO
2,926,234 UART: RITY.KEYID = 7
2,941,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,625 UART: [art] PUB.X = BC6B5D8D52358ABDD9F2F1C867D0B3A8FF2454D4D1C0F731D25C1C5461E22FC6802D41008E5BB9FBF37752F89C17E0E9
2,949,387 UART: [art] PUB.Y = 990399CFE8CF2B3DD1FDA2BAFF512266FD35E0BB8B352EF20C72DA2D4D14F085A371E147461DD50777982E086B35D9EE
2,956,339 UART: [art] SIG.R = 715507C3A7CF05F996A8CC0B3C5CD3EC3F7024AEF37BBE4E643E7C68C03F41DA4B05279540603114E5FF475D6304FE56
2,963,102 UART: [art] SIG.S = ED660E983C6FED6C5C73A9B59F1447F8CC3E260886755D295FD934858D10C1E7687B0B4B8E7B021B4A9DBCCB7E82927C
2,987,189 UART: Caliptra RT
2,987,442 UART: [state] CFI Enabled
3,095,441 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,769 UART: [rt]cmd =0x43455246, len=4
3,137,996 >>> mbox cmd response data (887 bytes)
3,137,997 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,164 UART: [rt]cmd =0x43455252, len=4
3,177,992 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,170,952 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,175,026 ready_for_fw is high
1,175,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,259 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,224 UART: [fwproc] Recv command 0x46574c44
1,282,957 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,932 >>> mbox cmd response: success
2,769,932 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,771,185 UART: [afmc] ++
2,771,353 UART: [afmc] CDI.KEYID = 6
2,771,716 UART: [afmc] SUBJECT.KEYID = 7
2,772,142 UART: [afmc] AUTHORITY.KEYID = 5
2,807,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,880 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,211 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,162 UART: [afmc] --
2,851,142 UART: [cold-reset] --
2,851,980 UART: [state] Locking Datavault
2,852,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,555 UART: [state] Locking ICCM
2,854,067 UART: [exit] Launching FMC @ 0x40000130
2,859,396 UART:
2,859,412 UART: Running Caliptra FMC ...
2,859,820 UART:
2,859,963 UART: [state] CFI Enabled
2,870,700 UART: [fht] FMC Alias Private Key: 7
2,977,977 UART: [art] Extend RT PCRs Done
2,978,405 UART: [art] Lock RT PCRs Done
2,980,291 UART: [art] Populate DV Done
2,988,664 UART: [fht] FMC Alias Private Key: 7
2,989,800 UART: [art] Derive CDI
2,990,080 UART: [art] Store in in slot 0x4
3,075,529 UART: [art] Derive Key Pair
3,075,889 UART: [art] Store priv key in slot 0x5
3,089,381 UART: [art] Derive Key Pair - Done
3,104,332 UART: [art] Signing Cert with AUTHO
3,104,812 UART: RITY.KEYID = 7
3,119,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,597 UART: [art] PUB.X = 26BD636B9592287F264BF678E9E1F63279E5E7EDCAF5B8E994811F2FAF090E024373F2D49F5DDFDE3A6A286A7E1B34BB
3,127,372 UART: [art] PUB.Y = A44B741B8457E4AFC8C7F03891BFC4F46D0D339B6EDD22D64C72BB9AB63077689A3E84C0D13711E94761FCD002145BC6
3,134,324 UART: [art] SIG.R = 8CBC83A5B0CA4FF35A1BA0B407484ECA7C2CFEA82CBE9B73AEB69BFA76ED9EC12F79D2A27E444F5BFA80F1EFE4843AF2
3,141,127 UART: [art] SIG.S = 4AC3206AB66A100DFF1E55073675E3F6C84BCF4E433F3A6AEEC3DEF8A1E3C88DBA2D4785FF1B475C522E59BFD93C32A4
3,165,056 UART: Caliptra RT
3,165,401 UART: [state] CFI Enabled
3,273,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,342 UART: [rt]cmd =0x43455246, len=4
3,316,593 >>> mbox cmd response data (887 bytes)
3,316,594 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,929 UART: [rt]cmd =0x43455252, len=4
3,356,729 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,459 ready_for_fw is high
1,056,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,890 >>> mbox cmd response: success
2,619,890 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,682,924 UART:
2,682,940 UART: Running Caliptra FMC ...
2,683,348 UART:
2,683,491 UART: [state] CFI Enabled
2,693,766 UART: [fht] FMC Alias Private Key: 7
2,800,555 UART: [art] Extend RT PCRs Done
2,800,983 UART: [art] Lock RT PCRs Done
2,802,681 UART: [art] Populate DV Done
2,810,836 UART: [fht] FMC Alias Private Key: 7
2,811,802 UART: [art] Derive CDI
2,812,082 UART: [art] Store in in slot 0x4
2,897,787 UART: [art] Derive Key Pair
2,898,147 UART: [art] Store priv key in slot 0x5
2,912,209 UART: [art] Derive Key Pair - Done
2,927,219 UART: [art] Signing Cert with AUTHO
2,927,699 UART: RITY.KEYID = 7
2,943,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,128 UART: [art] PUB.X = D0118EE66D67EEF43731A402ECE5051ED50877CAADFEE78151D7671930BA4B9AB6E6CD8D07A3C3F06B33DFCFB78B6A10
2,950,906 UART: [art] PUB.Y = 5A16B9CCB69304CFE04EC54000F079B06951A7C7BF2783B40FD4FDF429BD0CF67744D7D1B84212D0A97E1D9B4980B7E9
2,957,835 UART: [art] SIG.R = 472CD13BA84E77A49BC0BF9CCBD2DF7A855B4F050CA4BEA15A964AAF9514EC0B0E5914F24DEFA72F4400E293606B4FF9
2,964,593 UART: [art] SIG.S = 5C848B9CC2F3984DEC022554F3A6ECF5B7B106F2A82AE5F6B1391B83DB22DCAC5224FFC16145877694CED30D0C0A64F3
2,988,345 UART: Caliptra RT
2,988,690 UART: [state] CFI Enabled
3,096,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,325 UART: [rt]cmd =0x43455246, len=4
3,139,252 >>> mbox cmd response data (887 bytes)
3,139,253 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,792 UART: [rt]cmd =0x43455252, len=4
3,179,734 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,059 UART:
192,454 UART: Running Caliptra ROM ...
193,639 UART:
193,797 UART: [state] CFI Enabled
264,019 UART: [state] LifecycleState = Unprovisioned
265,939 UART: [state] DebugLocked = No
267,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,030 UART: [kat] SHA2-256
441,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,280 UART: [kat] ++
452,734 UART: [kat] sha1
464,266 UART: [kat] SHA2-256
466,918 UART: [kat] SHA2-384
472,762 UART: [kat] SHA2-512-ACC
475,197 UART: [kat] ECC-384
2,766,281 UART: [kat] HMAC-384Kdf
2,778,687 UART: [kat] LMS
3,969,002 UART: [kat] --
3,971,109 UART: [cold-reset] ++
3,972,133 UART: [fht] Storing FHT @ 0x50003400
3,982,970 UART: [idev] ++
3,983,602 UART: [idev] CDI.KEYID = 6
3,984,486 UART: [idev] SUBJECT.KEYID = 7
3,985,723 UART: [idev] UDS.KEYID = 0
3,986,743 ready_for_fw is high
3,986,928 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,130,015 UART: [idev] Erasing UDS.KEYID = 0
7,323,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,596 UART: [idev] --
7,349,676 UART: [ldev] ++
7,350,254 UART: [ldev] CDI.KEYID = 6
7,351,172 UART: [ldev] SUBJECT.KEYID = 5
7,352,384 UART: [ldev] AUTHORITY.KEYID = 7
7,353,669 UART: [ldev] FE.KEYID = 1
7,400,228 UART: [ldev] Erasing FE.KEYID = 1
10,733,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,217 UART: [ldev] --
13,095,987 UART: [fwproc] Waiting for Commands...
13,098,473 UART: [fwproc] Received command 0x46574c44
13,100,681 UART: [fwproc] Received Image of size 113760 bytes
17,152,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,609,109 >>> mbox cmd response: success
17,609,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,613,938 UART: [afmc] ++
17,614,558 UART: [afmc] CDI.KEYID = 6
17,615,486 UART: [afmc] SUBJECT.KEYID = 7
17,616,705 UART: [afmc] AUTHORITY.KEYID = 5
20,992,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,402 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,825 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,650 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,332,033 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,354,325 UART: [afmc] --
23,357,705 UART: [cold-reset] --
23,362,161 UART: [state] Locking Datavault
23,367,408 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,109 UART: [state] Locking ICCM
23,371,343 UART: [exit] Launching FMC @ 0x40000130
23,379,684 UART:
23,379,921 UART: Running Caliptra FMC ...
23,381,021 UART:
23,381,184 UART: [state] CFI Enabled
23,447,994 UART: [fht] FMC Alias Private Key: 7
25,785,692 UART: [art] Extend RT PCRs Done
25,786,914 UART: [art] Lock RT PCRs Done
25,788,297 UART: [art] Populate DV Done
25,793,603 UART: [fht] FMC Alias Private Key: 7
25,795,135 UART: [art] Derive CDI
25,795,885 UART: [art] Store in in slot 0x4
25,856,839 UART: [art] Derive Key Pair
25,857,880 UART: [art] Store priv key in slot 0x5
29,150,482 UART: [art] Derive Key Pair - Done
29,163,375 UART: [art] Signing Cert with AUTHO
29,164,685 UART: RITY.KEYID = 7
31,453,076 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,591 UART: [art] PUB.X = E7D5A8764D723112E99F45B74DE8D83EF4684D329E65D161A606E11ECDFAD4FC619C19CA74DF4B2F9ECB6D1764AF2B7E
31,461,841 UART: [art] PUB.Y = E26594402E392EAE259E18EFA28E657F30D021409604AB2DCDB18EF8D4AB3EF4C296323707FB7783C6730F05BC8BBEA3
31,469,123 UART: [art] SIG.R = E453669CF989D20058B9EB17D4E9F010580C562239094C6AEB1FB04D5CA8C2D3A0DC01FD142D44236024B2F78C8D1531
31,476,450 UART: [art] SIG.S = E5E69ACB902CFEFCA56595E1D7C4DCA4501D6BD5CD058505E63084571E47338C3FFED330801BB02F8A06C32681D64B25
32,781,210 UART: Caliptra RT
32,781,913 UART: [state] CFI Enabled
32,944,624 UART: [rt] RT listening for mailbox commands...
32,975,817 UART: [rt]cmd =0x43455252, len=4
32,987,172 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,784,206 ready_for_fw is high
3,784,784 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,863,826 >>> mbox cmd response: success
17,864,431 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,548,919 UART:
23,549,316 UART: Running Caliptra FMC ...
23,550,449 UART:
23,550,607 UART: [state] CFI Enabled
23,616,669 UART: [fht] FMC Alias Private Key: 7
25,954,381 UART: [art] Extend RT PCRs Done
25,955,608 UART: [art] Lock RT PCRs Done
25,957,023 UART: [art] Populate DV Done
25,962,298 UART: [fht] FMC Alias Private Key: 7
25,964,013 UART: [art] Derive CDI
25,964,835 UART: [art] Store in in slot 0x4
26,025,641 UART: [art] Derive Key Pair
26,026,684 UART: [art] Store priv key in slot 0x5
29,319,261 UART: [art] Derive Key Pair - Done
29,332,263 UART: [art] Signing Cert with AUTHO
29,333,562 UART: RITY.KEYID = 7
31,621,207 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,718 UART: [art] PUB.X = 5E004C2E730E970233EF4EA2FB9B76C5666F163ADA81FB7B6813371ED8053675B873030F94E29B9B71FA0C84A1BA2ABF
31,629,928 UART: [art] PUB.Y = 11A00D7141EE08839E5A6D23BA623D495557F9106B4A9784B0BAEDA91B1A3BC77BB7CAA2E7DB17FCF8F2D12A28E4267C
31,637,221 UART: [art] SIG.R = 43072F564690656B0C141D5EB5E19A61B97E8982207B5AFD7BE3EB28BA17F003E7D2498F9B3DD8980F544F10AB2F2C60
31,644,615 UART: [art] SIG.S = 31B03AD4342690F357AAF329D8DD45DB816898EEE1C159D97434FCBF8748FF90D4AB2629ADF76E24AF584DDE64ECE6F5
32,950,023 UART: Caliptra RT
32,950,749 UART: [state] CFI Enabled
33,113,313 UART: [rt] RT listening for mailbox commands...
33,144,362 UART: [rt]cmd =0x43455252, len=4
33,155,750 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
193,055 UART:
193,427 UART: Running Caliptra ROM ...
194,606 UART:
604,276 UART: [state] CFI Enabled
620,145 UART: [state] LifecycleState = Unprovisioned
622,102 UART: [state] DebugLocked = No
624,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,442 UART: [kat] SHA2-256
798,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,737 UART: [kat] ++
809,220 UART: [kat] sha1
821,017 UART: [kat] SHA2-256
823,735 UART: [kat] SHA2-384
830,497 UART: [kat] SHA2-512-ACC
832,797 UART: [kat] ECC-384
3,117,022 UART: [kat] HMAC-384Kdf
3,128,843 UART: [kat] LMS
4,318,935 UART: [kat] --
4,321,952 UART: [cold-reset] ++
4,323,619 UART: [fht] Storing FHT @ 0x50003400
4,335,236 UART: [idev] ++
4,335,803 UART: [idev] CDI.KEYID = 6
4,336,785 UART: [idev] SUBJECT.KEYID = 7
4,338,024 UART: [idev] UDS.KEYID = 0
4,339,062 ready_for_fw is high
4,339,273 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,224 UART: [idev] Erasing UDS.KEYID = 0
7,629,422 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,860 UART: [idev] --
7,655,399 UART: [ldev] ++
7,655,965 UART: [ldev] CDI.KEYID = 6
7,656,925 UART: [ldev] SUBJECT.KEYID = 5
7,658,131 UART: [ldev] AUTHORITY.KEYID = 7
7,659,412 UART: [ldev] FE.KEYID = 1
7,672,173 UART: [ldev] Erasing FE.KEYID = 1
10,961,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,460 UART: [ldev] --
13,321,612 UART: [fwproc] Waiting for Commands...
13,324,994 UART: [fwproc] Received command 0x46574c44
13,327,223 UART: [fwproc] Received Image of size 113760 bytes
17,374,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,984 >>> mbox cmd response: success
17,837,509 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,842,564 UART: [afmc] ++
17,843,150 UART: [afmc] CDI.KEYID = 6
17,844,051 UART: [afmc] SUBJECT.KEYID = 7
17,845,327 UART: [afmc] AUTHORITY.KEYID = 5
21,160,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,796 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,138 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,008 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,501,345 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,521,734 UART: [afmc] --
23,526,308 UART: [cold-reset] --
23,530,433 UART: [state] Locking Datavault
23,537,515 UART: [state] Locking PCR0, PCR1 and PCR31
23,539,209 UART: [state] Locking ICCM
23,540,919 UART: [exit] Launching FMC @ 0x40000130
23,549,268 UART:
23,549,506 UART: Running Caliptra FMC ...
23,550,572 UART:
23,550,722 UART: [state] CFI Enabled
23,558,657 UART: [fht] FMC Alias Private Key: 7
25,889,249 UART: [art] Extend RT PCRs Done
25,890,475 UART: [art] Lock RT PCRs Done
25,891,938 UART: [art] Populate DV Done
25,897,403 UART: [fht] FMC Alias Private Key: 7
25,899,045 UART: [art] Derive CDI
25,899,858 UART: [art] Store in in slot 0x4
25,942,234 UART: [art] Derive Key Pair
25,943,274 UART: [art] Store priv key in slot 0x5
29,185,314 UART: [art] Derive Key Pair - Done
29,198,653 UART: [art] Signing Cert with AUTHO
29,199,982 UART: RITY.KEYID = 7
31,479,256 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,765 UART: [art] PUB.X = 2BD484BDBE7B433421F15A5E06029C753117340DCF56D7A140AC1103D32C2ADD197CEDC70FE857683120BAB7F489F38C
31,488,053 UART: [art] PUB.Y = AEE9618CA58923C97776DDE3E37361B4C692A4E1220343A6546D1116706763594869D632AFD9321AE73BE000E9C1AC62
31,495,266 UART: [art] SIG.R = 24A858A54AD516973B495EEC91D2E271675FD201E20D1854EF59DB4DFC16EBDF89648DB701A2433C761B18B3A5D7953A
31,502,627 UART: [art] SIG.S = E5E653232BB83913BB7FA8F5E275B9E43FB72C36D1A73900DFC32F2FD2A85897799746DF938D2C44C50A26F833359FBE
32,807,733 UART: Caliptra RT
32,808,450 UART: [state] CFI Enabled
32,926,479 UART: [rt] RT listening for mailbox commands...
32,957,716 UART: [rt]cmd =0x43455252, len=4
32,969,267 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,617 writing to cptra_bootfsm_go
4,130,675 ready_for_fw is high
4,131,113 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,077,055 >>> mbox cmd response: success
18,077,945 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,713,817 UART:
23,714,203 UART: Running Caliptra FMC ...
23,715,335 UART:
23,715,511 UART: [state] CFI Enabled
23,723,189 UART: [fht] FMC Alias Private Key: 7
26,053,834 UART: [art] Extend RT PCRs Done
26,055,062 UART: [art] Lock RT PCRs Done
26,056,970 UART: [art] Populate DV Done
26,062,334 UART: [fht] FMC Alias Private Key: 7
26,063,880 UART: [art] Derive CDI
26,064,644 UART: [art] Store in in slot 0x4
26,107,509 UART: [art] Derive Key Pair
26,108,552 UART: [art] Store priv key in slot 0x5
29,350,476 UART: [art] Derive Key Pair - Done
29,364,178 UART: [art] Signing Cert with AUTHO
29,365,488 UART: RITY.KEYID = 7
31,644,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,500 UART: [art] PUB.X = FE1F29F01BEDB20AF09A6BAF97F509B8C0525043D4BCBB5C5628EC515A73A26E20CB1363CE076EDCF01C650B71A612DB
31,653,736 UART: [art] PUB.Y = 4E4DD9AD60F961E26380CC6947E123D62640E0DC8D17AB00F7E9F9397814069AFB10C6527A85A6BBB4D260729D5AD8E6
31,660,978 UART: [art] SIG.R = E4E9D90888C3C6211FC0343326B4FA293112EBAAA0CB6D415870EEA64336560D4016C15F861383100A15526B1447BD3E
31,668,372 UART: [art] SIG.S = CD8914464575139001126E04FCDD9B0A54FEF17CDB3A07A63DA203F6857B8419CFD7A9E2617C4A8D51D225382144AFFA
32,972,920 UART: Caliptra RT
32,973,625 UART: [state] CFI Enabled
33,090,756 UART: [rt] RT listening for mailbox commands...
33,122,226 UART: [rt]cmd =0x43455252, len=4
33,133,629 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,522 writing to cptra_bootfsm_go
192,631 UART:
192,986 UART: Running Caliptra ROM ...
194,188 UART:
194,341 UART: [state] CFI Enabled
263,859 UART: [state] LifecycleState = Unprovisioned
265,706 UART: [state] DebugLocked = No
268,302 UART: [state] WD Timer not started. Device not locked for debugging
271,627 UART: [kat] SHA2-256
450,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,311 UART: [kat] ++
462,855 UART: [kat] sha1
473,381 UART: [kat] SHA2-256
476,391 UART: [kat] SHA2-384
482,940 UART: [kat] SHA2-512-ACC
485,935 UART: [kat] ECC-384
2,949,185 UART: [kat] HMAC-384Kdf
2,971,322 UART: [kat] LMS
3,500,754 UART: [kat] --
3,505,460 UART: [cold-reset] ++
3,507,313 UART: [fht] FHT @ 0x50003400
3,519,494 UART: [idev] ++
3,520,049 UART: [idev] CDI.KEYID = 6
3,521,001 UART: [idev] SUBJECT.KEYID = 7
3,522,244 UART: [idev] UDS.KEYID = 0
3,523,146 ready_for_fw is high
3,523,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,825 UART: [idev] Erasing UDS.KEYID = 0
6,025,482 UART: [idev] Sha1 KeyId Algorithm
6,047,742 UART: [idev] --
6,051,413 UART: [ldev] ++
6,051,984 UART: [ldev] CDI.KEYID = 6
6,053,069 UART: [ldev] SUBJECT.KEYID = 5
6,054,197 UART: [ldev] AUTHORITY.KEYID = 7
6,055,377 UART: [ldev] FE.KEYID = 1
6,100,585 UART: [ldev] Erasing FE.KEYID = 1
8,605,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,399 UART: [ldev] --
10,413,661 UART: [fwproc] Wait for Commands...
10,416,510 UART: [fwproc] Recv command 0x46574c44
10,418,542 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,573 >>> mbox cmd response: success
14,276,061 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,280,726 UART: [afmc] ++
14,281,319 UART: [afmc] CDI.KEYID = 6
14,282,227 UART: [afmc] SUBJECT.KEYID = 7
14,283,437 UART: [afmc] AUTHORITY.KEYID = 5
16,826,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,987 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,601,872 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,623,677 UART: [afmc] --
18,627,825 UART: [cold-reset] --
18,631,854 UART: [state] Locking Datavault
18,636,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,630 UART: [state] Locking ICCM
18,640,993 UART: [exit] Launching FMC @ 0x40000130
18,649,439 UART:
18,649,681 UART: Running Caliptra FMC ...
18,650,779 UART:
18,650,942 UART: [state] CFI Enabled
18,710,498 UART: [fht] FMC Alias Private Key: 7
20,474,428 UART: [art] Extend RT PCRs Done
20,475,638 UART: [art] Lock RT PCRs Done
20,477,364 UART: [art] Populate DV Done
20,482,843 UART: [fht] FMC Alias Private Key: 7
20,484,376 UART: [art] Derive CDI
20,485,184 UART: [art] Store in in slot 0x4
20,543,278 UART: [art] Derive Key Pair
20,544,319 UART: [art] Store priv key in slot 0x5
23,007,647 UART: [art] Derive Key Pair - Done
23,020,887 UART: [art] Signing Cert with AUTHO
23,022,207 UART: RITY.KEYID = 7
24,733,636 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,114 UART: [art] PUB.X = 1F9657FBA9D89FE9573241A744AE398DE433E9F7A141DD7705A3F6ABAC82390A28AE6CD7A6CFC5D4C2F2DE7A4496B697
24,742,389 UART: [art] PUB.Y = D983EB9B733E0283502B5C42328BA6E4AD78F7BE70F1DD0EA281B1B8E2DEEE69CA462B4F193343BEF8C5E109AABC1610
24,749,704 UART: [art] SIG.R = 598B3B6C52C5CB09B4E27FA117DEC65C260FC0C55BA92A6C5CB68676E2E54493D6B1E42B8D5E41C5B78EF678319DD060
24,757,115 UART: [art] SIG.S = 6B84D8E17BCD60B669B15B77585D595C4D9DBDF1FA5C8FFA9B3741D5978CF75C9E648D30151AC60C79D84EC5C97CDF88
25,736,006 UART: Caliptra RT
25,736,729 UART: [state] CFI Enabled
25,904,083 UART: [rt] RT listening for mailbox commands...
25,935,732 UART: [rt]cmd =0x43455252, len=4
25,947,195 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,381,973 ready_for_fw is high
3,382,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,065,695 >>> mbox cmd response: success
14,066,479 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,362,276 UART:
18,362,680 UART: Running Caliptra FMC ...
18,363,877 UART:
18,364,034 UART: [state] CFI Enabled
18,432,916 UART: [fht] FMC Alias Private Key: 7
20,196,426 UART: [art] Extend RT PCRs Done
20,197,642 UART: [art] Lock RT PCRs Done
20,199,541 UART: [art] Populate DV Done
20,204,783 UART: [fht] FMC Alias Private Key: 7
20,206,329 UART: [art] Derive CDI
20,207,142 UART: [art] Store in in slot 0x4
20,265,118 UART: [art] Derive Key Pair
20,266,122 UART: [art] Store priv key in slot 0x5
22,728,940 UART: [art] Derive Key Pair - Done
22,742,131 UART: [art] Signing Cert with AUTHO
22,743,442 UART: RITY.KEYID = 7
24,453,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,402 UART: [art] PUB.X = 3AE879AA3B40538EF6FCF74470B8B06062E426D23D3BE2DF9E005D26131DF8CBDB2FCD12B7D969351761A98F0E0D2250
24,462,697 UART: [art] PUB.Y = 75B1869789F1320839D88823DF04097070CFD2E5DE08C25B85D6764E3126AE4ACCFC84AB1C5EE5592C84D028636B7D6C
24,469,916 UART: [art] SIG.R = 61113A92E46603DA669939FD41862399F9935A8402E149053335280B8031C8568D5515A1CE33728570D6527BE3668DBC
24,477,291 UART: [art] SIG.S = BAEC15FFC6C4C34E5666735E4340881A19121572BB83FB91710F0DB7DBB6CB7831CB9A83288B9AEBD4B3AD87BCB5A760
25,455,797 UART: Caliptra RT
25,456,495 UART: [state] CFI Enabled
25,621,216 UART: [rt] RT listening for mailbox commands...
25,652,540 UART: [rt]cmd =0x43455252, len=4
25,664,093 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
192,956 UART:
193,324 UART: Running Caliptra ROM ...
194,515 UART:
604,125 UART: [state] CFI Enabled
619,998 UART: [state] LifecycleState = Unprovisioned
621,904 UART: [state] DebugLocked = No
624,643 UART: [state] WD Timer not started. Device not locked for debugging
628,678 UART: [kat] SHA2-256
807,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,365 UART: [kat] ++
819,971 UART: [kat] sha1
830,640 UART: [kat] SHA2-256
833,663 UART: [kat] SHA2-384
840,080 UART: [kat] SHA2-512-ACC
843,023 UART: [kat] ECC-384
3,282,810 UART: [kat] HMAC-384Kdf
3,296,471 UART: [kat] LMS
3,826,015 UART: [kat] --
3,830,887 UART: [cold-reset] ++
3,833,396 UART: [fht] FHT @ 0x50003400
3,844,591 UART: [idev] ++
3,845,166 UART: [idev] CDI.KEYID = 6
3,846,079 UART: [idev] SUBJECT.KEYID = 7
3,847,328 UART: [idev] UDS.KEYID = 0
3,848,256 ready_for_fw is high
3,848,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,730 UART: [idev] Erasing UDS.KEYID = 0
6,321,880 UART: [idev] Sha1 KeyId Algorithm
6,345,723 UART: [idev] --
6,348,263 UART: [ldev] ++
6,348,839 UART: [ldev] CDI.KEYID = 6
6,349,753 UART: [ldev] SUBJECT.KEYID = 5
6,350,914 UART: [ldev] AUTHORITY.KEYID = 7
6,352,141 UART: [ldev] FE.KEYID = 1
6,362,138 UART: [ldev] Erasing FE.KEYID = 1
8,834,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,493 UART: [ldev] --
10,626,175 UART: [fwproc] Wait for Commands...
10,627,999 UART: [fwproc] Recv command 0x46574c44
10,630,100 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,413 >>> mbox cmd response: success
14,486,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,491,618 UART: [afmc] ++
14,492,206 UART: [afmc] CDI.KEYID = 6
14,493,086 UART: [afmc] SUBJECT.KEYID = 7
14,494,300 UART: [afmc] AUTHORITY.KEYID = 5
16,988,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,605 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,760,450 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,781,547 UART: [afmc] --
18,784,684 UART: [cold-reset] --
18,790,761 UART: [state] Locking Datavault
18,797,301 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,947 UART: [state] Locking ICCM
18,800,313 UART: [exit] Launching FMC @ 0x40000130
18,808,705 UART:
18,808,937 UART: Running Caliptra FMC ...
18,809,964 UART:
18,810,110 UART: [state] CFI Enabled
18,818,183 UART: [fht] FMC Alias Private Key: 7
20,575,444 UART: [art] Extend RT PCRs Done
20,576,660 UART: [art] Lock RT PCRs Done
20,578,205 UART: [art] Populate DV Done
20,583,611 UART: [fht] FMC Alias Private Key: 7
20,585,093 UART: [art] Derive CDI
20,585,829 UART: [art] Store in in slot 0x4
20,628,495 UART: [art] Derive Key Pair
20,629,535 UART: [art] Store priv key in slot 0x5
23,056,360 UART: [art] Derive Key Pair - Done
23,069,463 UART: [art] Signing Cert with AUTHO
23,070,769 UART: RITY.KEYID = 7
24,776,344 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,848 UART: [art] PUB.X = CA6FF1546A9981FC7F221086513882874A7534F632955701954A4DC3431BA3D7F737DDAD4A9A38B55FEB6ABEACC3F41E
24,785,117 UART: [art] PUB.Y = DCF98F7CFF47D461C01B907B3DE2ED3F6747212B366F97A8A9C869F5A1DD2D0E1FBECA142D9B23F5F36830C6FCF532DA
24,792,380 UART: [art] SIG.R = E80FB7983F0D32061881BC720EBBAD180B7B2D8DC378C50B9AEAE8DC205696E9E1D1BE1C6B0AEF5C3D928CDEA104BED7
24,799,800 UART: [art] SIG.S = 56716A87B462B1F1F8E080601BFB2314194D5C87AA8A1A8B4F86148EBD3C3723405E6314D99D8D188F98FE3DAAC495A1
25,778,539 UART: Caliptra RT
25,779,232 UART: [state] CFI Enabled
25,896,358 UART: [rt] RT listening for mailbox commands...
25,927,610 UART: [rt]cmd =0x43455252, len=4
25,938,968 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,762 writing to cptra_bootfsm_go
3,696,416 ready_for_fw is high
3,696,829 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,979 >>> mbox cmd response: success
14,271,561 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,522,839 UART:
18,523,222 UART: Running Caliptra FMC ...
18,524,415 UART:
18,524,583 UART: [state] CFI Enabled
18,532,203 UART: [fht] FMC Alias Private Key: 7
20,289,513 UART: [art] Extend RT PCRs Done
20,290,739 UART: [art] Lock RT PCRs Done
20,292,213 UART: [art] Populate DV Done
20,297,416 UART: [fht] FMC Alias Private Key: 7
20,298,906 UART: [art] Derive CDI
20,299,668 UART: [art] Store in in slot 0x4
20,342,315 UART: [art] Derive Key Pair
20,343,316 UART: [art] Store priv key in slot 0x5
22,771,041 UART: [art] Derive Key Pair - Done
22,784,484 UART: [art] Signing Cert with AUTHO
22,785,797 UART: RITY.KEYID = 7
24,491,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,120 UART: [art] PUB.X = 3CFCEE1019F741C7821471A13494CB6058801EE379767412EC2C5BF11CD5B926FFCCCD891B691BF2B2114C90026D232A
24,500,399 UART: [art] PUB.Y = CDA5B30DD51A8987BA6FC63B415B85696B22891889F9842D4C21C171D089D13CCD8F931F2F5C54092B584B94DF04D74C
24,507,702 UART: [art] SIG.R = FAAC7D8718E1BC5A981E6C72A66531D968BA51759E7FFEA3C197CC673B1F269481039979D4307118C1F35D5DC9633555
24,515,024 UART: [art] SIG.S = 7D63E1CEAC7C4491DB59248B50B8DFAD64F1516D3F8102D46175BD20A82F7FC7FB4D0DB82E245B533216A20F4D614F94
25,493,893 UART: Caliptra RT
25,494,595 UART: [state] CFI Enabled
25,612,787 UART: [rt] RT listening for mailbox commands...
25,644,018 UART: [rt]cmd =0x43455252, len=4
25,655,242 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
192,469 UART:
192,840 UART: Running Caliptra ROM ...
193,948 UART:
194,115 UART: [state] CFI Enabled
265,027 UART: [state] LifecycleState = Unprovisioned
267,374 UART: [state] DebugLocked = No
270,243 UART: [state] WD Timer not started. Device not locked for debugging
275,357 UART: [kat] SHA2-256
465,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,009 UART: [kat] ++
476,469 UART: [kat] sha1
487,058 UART: [kat] SHA2-256
490,066 UART: [kat] SHA2-384
496,634 UART: [kat] SHA2-512-ACC
499,211 UART: [kat] ECC-384
2,949,451 UART: [kat] HMAC-384Kdf
2,971,707 UART: [kat] LMS
3,503,455 UART: [kat] --
3,508,022 UART: [cold-reset] ++
3,509,973 UART: [fht] FHT @ 0x50003400
3,521,877 UART: [idev] ++
3,522,581 UART: [idev] CDI.KEYID = 6
3,523,608 UART: [idev] SUBJECT.KEYID = 7
3,524,778 UART: [idev] UDS.KEYID = 0
3,525,704 ready_for_fw is high
3,525,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,358 UART: [idev] Erasing UDS.KEYID = 0
6,039,229 UART: [idev] Sha1 KeyId Algorithm
6,062,343 UART: [idev] --
6,067,446 UART: [ldev] ++
6,068,125 UART: [ldev] CDI.KEYID = 6
6,069,013 UART: [ldev] SUBJECT.KEYID = 5
6,070,222 UART: [ldev] AUTHORITY.KEYID = 7
6,071,454 UART: [ldev] FE.KEYID = 1
6,111,726 UART: [ldev] Erasing FE.KEYID = 1
8,615,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,856 UART: [ldev] --
10,425,116 UART: [fwproc] Wait for Commands...
10,427,148 UART: [fwproc] Recv command 0x46574c44
10,429,401 UART: [fwproc] Recv'd Img size: 114084 bytes
13,877,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,610,827 >>> mbox cmd response: success
14,611,337 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,615,557 UART: [afmc] ++
14,616,290 UART: [afmc] CDI.KEYID = 6
14,617,420 UART: [afmc] SUBJECT.KEYID = 7
14,618,916 UART: [afmc] AUTHORITY.KEYID = 5
17,163,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,885,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,887,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,902,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,917,541 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,932,625 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,956,100 UART: [afmc] --
18,959,756 UART: [cold-reset] --
18,962,923 UART: [state] Locking Datavault
18,969,271 UART: [state] Locking PCR0, PCR1 and PCR31
18,971,446 UART: [state] Locking ICCM
18,973,818 UART: [exit] Launching FMC @ 0x40000130
18,982,451 UART:
18,982,678 UART: Running Caliptra FMC ...
18,983,790 UART:
18,983,947 UART: [state] CFI Enabled
19,044,238 UART: [fht] FMC Alias Private Key: 7
20,808,549 UART: [art] Extend RT PCRs Done
20,809,771 UART: [art] Lock RT PCRs Done
20,811,377 UART: [art] Populate DV Done
20,816,729 UART: [fht] FMC Alias Private Key: 7
20,818,258 UART: [art] Derive CDI
20,818,989 UART: [art] Store in in slot 0x4
20,876,643 UART: [art] Derive Key Pair
20,877,681 UART: [art] Store priv key in slot 0x5
23,340,272 UART: [art] Derive Key Pair - Done
23,353,589 UART: [art] Signing Cert with AUTHO
23,354,894 UART: RITY.KEYID = 7
25,066,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,068,299 UART: [art] PUB.X = 475519D598C8C5960AEC2C3AA8EE97A76FC01C950AFF3823E8954C4FA6A451FBB90FE4CF2B766D9BDA938CB2D95E6541
25,075,627 UART: [art] PUB.Y = BE078CADDD78AEBCD74684390D9B1DB1D1AAE929535298020C990F7A12BB3E3354D3E5347D79689BBBCDECDE93D3CBFD
25,082,931 UART: [art] SIG.R = FFAEB0772BD4758C6B299528FF9916E10BBFCA8CD34E95B5DE879D52AAE33B38E8D5369C83224F557728F97A5E4FFF92
25,090,356 UART: [art] SIG.S = 5B5C8362458E6A7F1D546B8112740F451FE42127FF65298E918DC7878243C4C1A90A5D5269EE75BA7B89286165E9940F
26,069,601 UART: Caliptra RT
26,070,310 UART: [state] CFI Enabled
26,234,643 UART: [rt] RT listening for mailbox commands...
26,266,005 UART: [rt]cmd =0x43455252, len=4
26,277,319 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,442,389 ready_for_fw is high
3,442,806 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,723,075 >>> mbox cmd response: success
14,723,863 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,007,801 UART:
19,008,208 UART: Running Caliptra FMC ...
19,009,352 UART:
19,009,519 UART: [state] CFI Enabled
19,076,147 UART: [fht] FMC Alias Private Key: 7
20,840,159 UART: [art] Extend RT PCRs Done
20,841,375 UART: [art] Lock RT PCRs Done
20,843,104 UART: [art] Populate DV Done
20,848,245 UART: [fht] FMC Alias Private Key: 7
20,849,783 UART: [art] Derive CDI
20,850,600 UART: [art] Store in in slot 0x4
20,909,136 UART: [art] Derive Key Pair
20,910,191 UART: [art] Store priv key in slot 0x5
23,373,107 UART: [art] Derive Key Pair - Done
23,386,373 UART: [art] Signing Cert with AUTHO
23,387,708 UART: RITY.KEYID = 7
25,099,427 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,937 UART: [art] PUB.X = 8FE842E3E57A2359B855B01787D15839D0384EE80C19E987CD99D0ED38206B8BF64C1CCD70C51D3C0EFA6C60FBA6D7D7
25,108,232 UART: [art] PUB.Y = 6B73452ECF6B89AD2EE0923B9AA6A45CEE064FE607E65425A686095563B6C00DA1AF51446163245F10A721D95E16CFDC
25,115,492 UART: [art] SIG.R = 5245D01F4DECF23E179C0682381A06B3ED65D4CB090529D42143865F7770C1400872BDD5973B763FB9B6795316DF0A0A
25,122,843 UART: [art] SIG.S = ED9E3A7DDB8A8BF0C205ED50E2EF4B2550C5B7208DE01FF931C989135F9A37E1C99503C72A05A89462DD63E82BC123A2
26,102,129 UART: Caliptra RT
26,102,821 UART: [state] CFI Enabled
26,268,877 UART: [rt] RT listening for mailbox commands...
26,300,297 UART: [rt]cmd =0x43455252, len=4
26,311,873 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
193,111 UART:
193,487 UART: Running Caliptra ROM ...
194,639 UART:
604,340 UART: [state] CFI Enabled
618,295 UART: [state] LifecycleState = Unprovisioned
620,605 UART: [state] DebugLocked = No
622,054 UART: [state] WD Timer not started. Device not locked for debugging
626,112 UART: [kat] SHA2-256
816,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,806 UART: [kat] ++
827,324 UART: [kat] sha1
839,188 UART: [kat] SHA2-256
842,264 UART: [kat] SHA2-384
848,039 UART: [kat] SHA2-512-ACC
850,635 UART: [kat] ECC-384
3,293,246 UART: [kat] HMAC-384Kdf
3,306,602 UART: [kat] LMS
3,838,462 UART: [kat] --
3,843,938 UART: [cold-reset] ++
3,846,024 UART: [fht] FHT @ 0x50003400
3,857,651 UART: [idev] ++
3,858,362 UART: [idev] CDI.KEYID = 6
3,859,286 UART: [idev] SUBJECT.KEYID = 7
3,860,553 UART: [idev] UDS.KEYID = 0
3,861,455 ready_for_fw is high
3,861,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,023 UART: [idev] Erasing UDS.KEYID = 0
6,339,341 UART: [idev] Sha1 KeyId Algorithm
6,361,269 UART: [idev] --
6,365,962 UART: [ldev] ++
6,366,656 UART: [ldev] CDI.KEYID = 6
6,367,568 UART: [ldev] SUBJECT.KEYID = 5
6,368,728 UART: [ldev] AUTHORITY.KEYID = 7
6,369,963 UART: [ldev] FE.KEYID = 1
6,379,365 UART: [ldev] Erasing FE.KEYID = 1
8,865,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,748 UART: [ldev] --
10,656,961 UART: [fwproc] Wait for Commands...
10,658,786 UART: [fwproc] Recv command 0x46574c44
10,661,139 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,315 >>> mbox cmd response: success
14,828,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,833,322 UART: [afmc] ++
14,834,015 UART: [afmc] CDI.KEYID = 6
14,835,210 UART: [afmc] SUBJECT.KEYID = 7
14,836,653 UART: [afmc] AUTHORITY.KEYID = 5
17,334,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,089,034 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
19,104,168 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
19,127,680 UART: [afmc] --
19,131,227 UART: [cold-reset] --
19,134,884 UART: [state] Locking Datavault
19,140,100 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,317 UART: [state] Locking ICCM
19,144,202 UART: [exit] Launching FMC @ 0x40000130
19,152,884 UART:
19,153,120 UART: Running Caliptra FMC ...
19,154,225 UART:
19,154,382 UART: [state] CFI Enabled
19,162,293 UART: [fht] FMC Alias Private Key: 7
20,918,217 UART: [art] Extend RT PCRs Done
20,919,455 UART: [art] Lock RT PCRs Done
20,921,377 UART: [art] Populate DV Done
20,927,058 UART: [fht] FMC Alias Private Key: 7
20,928,710 UART: [art] Derive CDI
20,929,448 UART: [art] Store in in slot 0x4
20,972,044 UART: [art] Derive Key Pair
20,973,091 UART: [art] Store priv key in slot 0x5
23,399,848 UART: [art] Derive Key Pair - Done
23,412,624 UART: [art] Signing Cert with AUTHO
23,413,925 UART: RITY.KEYID = 7
25,118,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,503 UART: [art] PUB.X = C695AA7DE41EF06603AB605B68052AA7699E63454B844BC173D0EF8C59BC94208C1B287CC0E26DDB4E8A3B29FF254A73
25,127,772 UART: [art] PUB.Y = 810C0AD73E77FE9A9BF7B41E58006105F6995E32D5FB870BFE9F88E7C7BAABFD292502AEC8B774832576BBB76CA6C693
25,135,027 UART: [art] SIG.R = 32318CA1150457627E5041B91D2B98E27862DEAF5B0FAAF23C49482835EE12A4F7CAB50D129380EE53EA78A0AF116978
25,142,404 UART: [art] SIG.S = 8AC545B25A88545B273BB3EA1B6B296B3B2A831CE189AB8AD775683D0E76D9EAE3DA612B25AC25CFAE43E49159FA3093
26,121,424 UART: Caliptra RT
26,122,135 UART: [state] CFI Enabled
26,240,068 UART: [rt] RT listening for mailbox commands...
26,271,595 UART: [rt]cmd =0x43455252, len=4
26,282,951 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
3,757,037 ready_for_fw is high
3,757,713 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,955,963 >>> mbox cmd response: success
14,956,598 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,213,333 UART:
19,213,723 UART: Running Caliptra FMC ...
19,214,870 UART:
19,215,028 UART: [state] CFI Enabled
19,222,815 UART: [fht] FMC Alias Private Key: 7
20,980,186 UART: [art] Extend RT PCRs Done
20,981,406 UART: [art] Lock RT PCRs Done
20,983,097 UART: [art] Populate DV Done
20,988,583 UART: [fht] FMC Alias Private Key: 7
20,990,113 UART: [art] Derive CDI
20,990,886 UART: [art] Store in in slot 0x4
21,033,265 UART: [art] Derive Key Pair
21,034,270 UART: [art] Store priv key in slot 0x5
23,461,159 UART: [art] Derive Key Pair - Done
23,474,227 UART: [art] Signing Cert with AUTHO
23,475,564 UART: RITY.KEYID = 7
25,180,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,278 UART: [art] PUB.X = 88091633198D6B4330B869EE23E39AA6322DABB51381F14EB2D70432869B72669902683A1D71C69F030AD2D36290E845
25,189,516 UART: [art] PUB.Y = 7D3B818F63582ABC50CA705595D11CCC13531E06C1F92C55C59A9B562CC12C31C60D994FBB704C9B44696E71A6E3386A
25,196,799 UART: [art] SIG.R = 634827E9E30DE2CCBF2D437BD9549321E9C7641A67DD17F8187073BC5CE84613B480CFB70B77B8BD5C3A5C927DCFA9AB
25,204,199 UART: [art] SIG.S = 5A24375F1F9B6426DE55B63979923C5B9A0F2A4C15A5AA78C7AE02BC0DF14DCA38B304AF8FB2BAD5BA559D95481A93C8
26,182,499 UART: Caliptra RT
26,183,192 UART: [state] CFI Enabled
26,300,786 UART: [rt] RT listening for mailbox commands...
26,332,142 UART: [rt]cmd =0x43455252, len=4
26,343,718 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,453 UART: [kat] SHA2-256
882,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,499 UART: [kat] ++
886,651 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,478 UART: [kat] SHA2-512-ACC
897,379 UART: [kat] ECC-384
903,142 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,859 UART: [cold-reset] ++
1,477,403 UART: [fht] Storing FHT @ 0x50003400
1,480,192 UART: [idev] ++
1,480,360 UART: [idev] CDI.KEYID = 6
1,480,720 UART: [idev] SUBJECT.KEYID = 7
1,481,144 UART: [idev] UDS.KEYID = 0
1,481,489 ready_for_fw is high
1,481,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,680 UART: [idev] Erasing UDS.KEYID = 0
1,505,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,546 UART: [idev] --
1,515,391 UART: [ldev] ++
1,515,559 UART: [ldev] CDI.KEYID = 6
1,515,922 UART: [ldev] SUBJECT.KEYID = 5
1,516,348 UART: [ldev] AUTHORITY.KEYID = 7
1,516,811 UART: [ldev] FE.KEYID = 1
1,522,043 UART: [ldev] Erasing FE.KEYID = 1
1,547,718 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,480 UART: [ldev] --
1,586,845 UART: [fwproc] Waiting for Commands...
1,587,552 UART: [fwproc] Received command 0x46574c44
1,588,343 UART: [fwproc] Received Image of size 114084 bytes
2,883,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,756 >>> mbox cmd response: success
3,075,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,077,096 UART: [afmc] ++
3,077,264 UART: [afmc] CDI.KEYID = 6
3,077,626 UART: [afmc] SUBJECT.KEYID = 7
3,078,051 UART: [afmc] AUTHORITY.KEYID = 5
3,112,666 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,768 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,548 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,161 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,146,873 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,154,867 UART: [afmc] --
3,155,785 UART: [cold-reset] --
3,156,747 UART: [state] Locking Datavault
3,157,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,470 UART: [state] Locking ICCM
3,159,048 UART: [exit] Launching FMC @ 0x40000130
3,164,377 UART:
3,164,393 UART: Running Caliptra FMC ...
3,164,801 UART:
3,164,855 UART: [state] CFI Enabled
3,175,338 UART: [fht] FMC Alias Private Key: 7
3,283,067 UART: [art] Extend RT PCRs Done
3,283,495 UART: [art] Lock RT PCRs Done
3,285,061 UART: [art] Populate DV Done
3,293,536 UART: [fht] FMC Alias Private Key: 7
3,294,640 UART: [art] Derive CDI
3,294,920 UART: [art] Store in in slot 0x4
3,380,351 UART: [art] Derive Key Pair
3,380,711 UART: [art] Store priv key in slot 0x5
3,393,947 UART: [art] Derive Key Pair - Done
3,408,662 UART: [art] Signing Cert with AUTHO
3,409,142 UART: RITY.KEYID = 7
3,424,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,521 UART: [art] PUB.X = C9F0EA6E3E52230E70728A9C0468CFA27F1B2556DDFE0E2722B38B178EC27D49782E2E7675B2BA8B02DA330DF069A42F
3,432,286 UART: [art] PUB.Y = 3CD379AFADF1F2A9100CF48862ED8BB26CF29D3D12C9C948A27152F2AC15A6C8411AD4950257DD7B593DAE44C0C1D594
3,439,244 UART: [art] SIG.R = EF37EB642B97EF74F5050231944C40E03F1823481782AA0BC2E611EBF308DD88537EC0FBD52CA04069F29859CB199EB9
3,446,006 UART: [art] SIG.S = 8D836BEF1AEC286C96ED842D1799A94F2EF63B64C96D9C22C07CA5AFB110FEC0026783C6BA62D56A774C0A66F0474935
3,469,769 UART: Caliptra RT
3,470,022 UART: [state] CFI Enabled
3,577,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,991 UART: [rt]cmd =0x43455252, len=4
3,618,732 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,612 >>> mbox cmd response: success
2,924,612 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,634 UART:
2,986,650 UART: Running Caliptra FMC ...
2,987,058 UART:
2,987,112 UART: [state] CFI Enabled
2,997,761 UART: [fht] FMC Alias Private Key: 7
3,105,992 UART: [art] Extend RT PCRs Done
3,106,420 UART: [art] Lock RT PCRs Done
3,108,150 UART: [art] Populate DV Done
3,116,441 UART: [fht] FMC Alias Private Key: 7
3,117,483 UART: [art] Derive CDI
3,117,763 UART: [art] Store in in slot 0x4
3,203,694 UART: [art] Derive Key Pair
3,204,054 UART: [art] Store priv key in slot 0x5
3,217,246 UART: [art] Derive Key Pair - Done
3,231,924 UART: [art] Signing Cert with AUTHO
3,232,404 UART: RITY.KEYID = 7
3,247,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,613 UART: [art] PUB.X = 9DD07E5A4C6E67ABF4248E73A20B7C7D727A59758D067D4FB1AAABEDBE67A2000FE49A0E8E159EA0DD35A0248BF8B6ED
3,255,373 UART: [art] PUB.Y = A8F19640516BFAAB8BE22AB1EE77629FD4B856E3EE164AB8088E0AF1C1D2E1F57430E5F459E0DC489A8C211CA9FD6CAA
3,262,339 UART: [art] SIG.R = 24BA1214A35218DEACB84D92324A5260E9D0D97128E7596EB6FFD1AC4FD4AAC6D18D71658DAC1138562E6824C71D898C
3,269,117 UART: [art] SIG.S = 196F42F678FF180CC30AC789BC4DCB08F519066338238312C24A37F1777F18C4393E1678C537FB7B7367B77A5531B70F
3,292,823 UART: Caliptra RT
3,293,076 UART: [state] CFI Enabled
3,401,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,305 UART: [rt]cmd =0x43455252, len=4
3,443,251 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,115 UART: [kat] SHA2-512-ACC
897,016 UART: [kat] ECC-384
902,543 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,392 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,875 UART: [idev] ++
1,480,043 UART: [idev] CDI.KEYID = 6
1,480,403 UART: [idev] SUBJECT.KEYID = 7
1,480,827 UART: [idev] UDS.KEYID = 0
1,481,172 ready_for_fw is high
1,481,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,506,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,793 UART: [idev] --
1,515,818 UART: [ldev] ++
1,515,986 UART: [ldev] CDI.KEYID = 6
1,516,349 UART: [ldev] SUBJECT.KEYID = 5
1,516,775 UART: [ldev] AUTHORITY.KEYID = 7
1,517,238 UART: [ldev] FE.KEYID = 1
1,522,646 UART: [ldev] Erasing FE.KEYID = 1
1,548,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,631 UART: [ldev] --
1,587,952 UART: [fwproc] Waiting for Commands...
1,588,697 UART: [fwproc] Received command 0x46574c44
1,589,488 UART: [fwproc] Received Image of size 114084 bytes
2,885,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,048 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,523 >>> mbox cmd response: success
3,077,523 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,839 UART: [afmc] ++
3,079,007 UART: [afmc] CDI.KEYID = 6
3,079,369 UART: [afmc] SUBJECT.KEYID = 7
3,079,794 UART: [afmc] AUTHORITY.KEYID = 5
3,114,641 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,324 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,149,036 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,156,968 UART: [afmc] --
3,157,920 UART: [cold-reset] --
3,158,900 UART: [state] Locking Datavault
3,160,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,815 UART: [state] Locking ICCM
3,161,423 UART: [exit] Launching FMC @ 0x40000130
3,166,752 UART:
3,166,768 UART: Running Caliptra FMC ...
3,167,176 UART:
3,167,319 UART: [state] CFI Enabled
3,177,868 UART: [fht] FMC Alias Private Key: 7
3,285,755 UART: [art] Extend RT PCRs Done
3,286,183 UART: [art] Lock RT PCRs Done
3,287,353 UART: [art] Populate DV Done
3,295,482 UART: [fht] FMC Alias Private Key: 7
3,296,530 UART: [art] Derive CDI
3,296,810 UART: [art] Store in in slot 0x4
3,382,721 UART: [art] Derive Key Pair
3,383,081 UART: [art] Store priv key in slot 0x5
3,396,565 UART: [art] Derive Key Pair - Done
3,411,464 UART: [art] Signing Cert with AUTHO
3,411,944 UART: RITY.KEYID = 7
3,427,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,009 UART: [art] PUB.X = D6E0C1CAE144D7B8E2ACDE22CF5AB3D81512E6A8DDBA249EA8DF039ED2210FD8352652ECF7B0118384E7C8BFE7E1DD0A
3,434,798 UART: [art] PUB.Y = 1A3DDDDA245D15DE56826831086DB492E7D81FE91797417A04ABC1B2808DF1D9F74A0BC75BE91DBD29F70C979ED53599
3,441,746 UART: [art] SIG.R = 88926413198FD1CB00EC6DFA6162FAE5D039B05AC3D94AF5B1FB88C798A160B1D45EA532EF6FA33DD95AA1FF38EEC93A
3,448,516 UART: [art] SIG.S = EAD5F1D184B358761F9022C4980BD6439C3179BE0ADBB83E83F874358E7C274440BB4C2B76D43E2791F46A8091E9C24F
3,472,833 UART: Caliptra RT
3,473,178 UART: [state] CFI Enabled
3,580,873 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,097 UART: [rt]cmd =0x43455252, len=4
3,622,080 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 ready_for_fw is high
1,363,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,561 >>> mbox cmd response: success
2,924,561 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,757 UART:
2,986,773 UART: Running Caliptra FMC ...
2,987,181 UART:
2,987,324 UART: [state] CFI Enabled
2,997,565 UART: [fht] FMC Alias Private Key: 7
3,105,620 UART: [art] Extend RT PCRs Done
3,106,048 UART: [art] Lock RT PCRs Done
3,107,448 UART: [art] Populate DV Done
3,115,603 UART: [fht] FMC Alias Private Key: 7
3,116,639 UART: [art] Derive CDI
3,116,919 UART: [art] Store in in slot 0x4
3,202,076 UART: [art] Derive Key Pair
3,202,436 UART: [art] Store priv key in slot 0x5
3,215,502 UART: [art] Derive Key Pair - Done
3,230,346 UART: [art] Signing Cert with AUTHO
3,230,826 UART: RITY.KEYID = 7
3,246,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,117 UART: [art] PUB.X = 1CA4D1E72F51F8C8448BE99CAE3EE50249FA1ADF987E1F594E7DBC0D4394ACBF15352C2D3FE7EA6F90DEE3C77889AF2B
3,253,907 UART: [art] PUB.Y = B44578D31392AD6B88933F9D1134A77D18A69493F8F124A81C8F2FB6E25DD2ADB114012994DC7B4DE0ABF1DF9792D5C1
3,260,862 UART: [art] SIG.R = 86C657C6252A21FF0A07176B0963F7A23B440E695E3B095D11EC758BAC9599C6D80A579EE2B63069D5660CBC97ECA0CE
3,267,617 UART: [art] SIG.S = B4C0436FE3A2EA091D7754B115297BECC29A7ED487EC3C7128304005C605AAAA575F91790B1AC309BA597CBDAEEA6BE0
3,291,311 UART: Caliptra RT
3,291,656 UART: [state] CFI Enabled
3,400,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,973 UART: [rt]cmd =0x43455252, len=4
3,441,716 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,662 UART: [kat] SHA2-512-ACC
908,563 UART: [kat] ECC-384
918,274 UART: [kat] HMAC-384Kdf
922,860 UART: [kat] LMS
1,171,188 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,018 UART: [idev] ++
1,175,186 UART: [idev] CDI.KEYID = 6
1,175,546 UART: [idev] SUBJECT.KEYID = 7
1,175,970 UART: [idev] UDS.KEYID = 0
1,176,315 ready_for_fw is high
1,176,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,201,607 UART: [idev] Sha1 KeyId Algorithm
1,210,065 UART: [idev] --
1,211,083 UART: [ldev] ++
1,211,251 UART: [ldev] CDI.KEYID = 6
1,211,614 UART: [ldev] SUBJECT.KEYID = 5
1,212,040 UART: [ldev] AUTHORITY.KEYID = 7
1,212,503 UART: [ldev] FE.KEYID = 1
1,217,871 UART: [ldev] Erasing FE.KEYID = 1
1,244,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,221 UART: [ldev] --
1,283,606 UART: [fwproc] Wait for Commands...
1,284,282 UART: [fwproc] Recv command 0x46574c44
1,285,010 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,201 >>> mbox cmd response: success
2,771,201 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,772,515 UART: [afmc] ++
2,772,683 UART: [afmc] CDI.KEYID = 6
2,773,045 UART: [afmc] SUBJECT.KEYID = 7
2,773,470 UART: [afmc] AUTHORITY.KEYID = 5
2,808,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,673 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,843,383 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,851,169 UART: [afmc] --
2,852,221 UART: [cold-reset] --
2,852,825 UART: [state] Locking Datavault
2,853,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,558 UART: [state] Locking ICCM
2,855,064 UART: [exit] Launching FMC @ 0x40000130
2,860,393 UART:
2,860,409 UART: Running Caliptra FMC ...
2,860,817 UART:
2,860,871 UART: [state] CFI Enabled
2,871,032 UART: [fht] FMC Alias Private Key: 7
2,979,423 UART: [art] Extend RT PCRs Done
2,979,851 UART: [art] Lock RT PCRs Done
2,981,421 UART: [art] Populate DV Done
2,989,490 UART: [fht] FMC Alias Private Key: 7
2,990,458 UART: [art] Derive CDI
2,990,738 UART: [art] Store in in slot 0x4
3,076,689 UART: [art] Derive Key Pair
3,077,049 UART: [art] Store priv key in slot 0x5
3,090,089 UART: [art] Derive Key Pair - Done
3,104,644 UART: [art] Signing Cert with AUTHO
3,105,124 UART: RITY.KEYID = 7
3,120,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,371 UART: [art] PUB.X = 6A65F9168E1142693AE4FC891FCB38F43FED9E99EF1B3D4665C610447BDE656BACD3985EF7B290291A2C407715D7074F
3,128,144 UART: [art] PUB.Y = 0D24E4D94C8CD97CF98841EECECE145959BD72D87140BB6039890AF549074F017F1EE6E2BDD388ACF977D694BD609A5A
3,135,094 UART: [art] SIG.R = 0341325890C5CA3CB66AFA07C1FD7C9E3C8B661E80F96510CE82574B3F8F8B9C4CB04D89CCAB6E5AD068F07F44B727C7
3,141,872 UART: [art] SIG.S = 019BD7E88F4D99AC65FAFE494500DC479835BC14C5795DB27E0CAB4C8ADE9BBB2AE617A5C81ED35B77F34283351613BD
3,165,873 UART: Caliptra RT
3,166,126 UART: [state] CFI Enabled
3,274,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,074 UART: [rt]cmd =0x43455252, len=4
3,316,074 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 ready_for_fw is high
1,059,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,624 >>> mbox cmd response: success
2,621,624 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,204 UART:
2,684,220 UART: Running Caliptra FMC ...
2,684,628 UART:
2,684,682 UART: [state] CFI Enabled
2,695,079 UART: [fht] FMC Alias Private Key: 7
2,802,752 UART: [art] Extend RT PCRs Done
2,803,180 UART: [art] Lock RT PCRs Done
2,804,734 UART: [art] Populate DV Done
2,812,749 UART: [fht] FMC Alias Private Key: 7
2,813,717 UART: [art] Derive CDI
2,813,997 UART: [art] Store in in slot 0x4
2,899,688 UART: [art] Derive Key Pair
2,900,048 UART: [art] Store priv key in slot 0x5
2,913,534 UART: [art] Derive Key Pair - Done
2,928,365 UART: [art] Signing Cert with AUTHO
2,928,845 UART: RITY.KEYID = 7
2,944,265 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,030 UART: [art] PUB.X = 84BE3768D03246B3C729A40DDB055B61E12CB60FEE62777716513209CA3FA779641E42598AF12ADD8D93953B7A211ED7
2,951,788 UART: [art] PUB.Y = DAB90DC44BCCA77EF5C5E1BA55CD04007E1C05C0BEA8FDC3AF08D8EC0B1E478778ECBD4004D717D05930E6A9A9AA6291
2,958,724 UART: [art] SIG.R = 0BC106B5EAE25C09D6EB31B0DCC189F8FFE666441521A6F53B36D44BF1D0B87B1AF02CFA9033731A818E3DA204D017C9
2,965,496 UART: [art] SIG.S = B2232FAE0D2A245FCAE3EB7A7E0F776BF4BCECA19D99D0496AC020A0B886F0E889297F54002B59071E54DB10B4C46AC8
2,988,862 UART: Caliptra RT
2,989,115 UART: [state] CFI Enabled
3,097,603 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,799 UART: [rt]cmd =0x43455252, len=4
3,138,525 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
902,146 UART: [kat] SHA2-256
904,086 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,505 UART: [kat] LMS
1,171,833 UART: [kat] --
1,172,514 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 ready_for_fw is high
1,176,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,210,242 UART: [idev] --
1,211,300 UART: [ldev] ++
1,211,468 UART: [ldev] CDI.KEYID = 6
1,211,831 UART: [ldev] SUBJECT.KEYID = 5
1,212,257 UART: [ldev] AUTHORITY.KEYID = 7
1,212,720 UART: [ldev] FE.KEYID = 1
1,218,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,560 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,837 UART: [fwproc] Recv command 0x46574c44
1,285,565 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,950 >>> mbox cmd response: success
2,772,950 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,774,156 UART: [afmc] ++
2,774,324 UART: [afmc] CDI.KEYID = 6
2,774,686 UART: [afmc] SUBJECT.KEYID = 7
2,775,111 UART: [afmc] AUTHORITY.KEYID = 5
2,810,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,417 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,030 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,844,740 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,852,502 UART: [afmc] --
2,853,442 UART: [cold-reset] --
2,854,398 UART: [state] Locking Datavault
2,855,579 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,183 UART: [state] Locking ICCM
2,856,841 UART: [exit] Launching FMC @ 0x40000130
2,862,170 UART:
2,862,186 UART: Running Caliptra FMC ...
2,862,594 UART:
2,862,737 UART: [state] CFI Enabled
2,873,610 UART: [fht] FMC Alias Private Key: 7
2,981,631 UART: [art] Extend RT PCRs Done
2,982,059 UART: [art] Lock RT PCRs Done
2,983,733 UART: [art] Populate DV Done
2,991,866 UART: [fht] FMC Alias Private Key: 7
2,992,922 UART: [art] Derive CDI
2,993,202 UART: [art] Store in in slot 0x4
3,078,779 UART: [art] Derive Key Pair
3,079,139 UART: [art] Store priv key in slot 0x5
3,092,241 UART: [art] Derive Key Pair - Done
3,107,209 UART: [art] Signing Cert with AUTHO
3,107,689 UART: RITY.KEYID = 7
3,123,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,816 UART: [art] PUB.X = F33DFB59A402CCD03AB9019E2856AC53CB57E1A88FA5DCA360E96397BB607FEB310F415EBAEE16527910F2FCE0B6CFD1
3,130,599 UART: [art] PUB.Y = 3B4BB43B6FD3649D5426D59EB4043395623D29CADCBCA8A9CBF375B70C6D6F2AC3C84B3E3D6FD06F22DBAADC0D3E749D
3,137,566 UART: [art] SIG.R = 773B7A820C77FA4AC40350C1C2EC743335B79298D3C9232BBDC3ABC62C689245492CE555ACF5662C56733BBA5F8AB35D
3,144,338 UART: [art] SIG.S = BC86043045420468FD92666655E5B6AD3EE8BFCA477FE510CB9F65FDD991097ADEE6F8B30F1C48D8A7AA939EDC93AAA2
3,167,815 UART: Caliptra RT
3,168,160 UART: [state] CFI Enabled
3,277,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,796 UART: [rt]cmd =0x43455252, len=4
3,318,618 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,830 ready_for_fw is high
1,060,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,745 >>> mbox cmd response: success
2,625,745 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,951 UART:
2,688,967 UART: Running Caliptra FMC ...
2,689,375 UART:
2,689,518 UART: [state] CFI Enabled
2,699,835 UART: [fht] FMC Alias Private Key: 7
2,807,602 UART: [art] Extend RT PCRs Done
2,808,030 UART: [art] Lock RT PCRs Done
2,809,448 UART: [art] Populate DV Done
2,817,843 UART: [fht] FMC Alias Private Key: 7
2,818,965 UART: [art] Derive CDI
2,819,245 UART: [art] Store in in slot 0x4
2,904,998 UART: [art] Derive Key Pair
2,905,358 UART: [art] Store priv key in slot 0x5
2,918,508 UART: [art] Derive Key Pair - Done
2,933,125 UART: [art] Signing Cert with AUTHO
2,933,605 UART: RITY.KEYID = 7
2,948,677 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,442 UART: [art] PUB.X = 19999EA0A6E9DADFCD68F4DB9BCC1A8173377D7D55741D39992B01881503EC773A1B821E495A3E49AF022AEEA706FEEC
2,956,214 UART: [art] PUB.Y = F86BC3A3E2B0BA8DD9B4F7FC86BDD6C7066F7506E02F3FA234E25CF767B65FA37E433EFC8DB5D3A1200B6C01FE35422D
2,963,174 UART: [art] SIG.R = 42FA626A60F961010A520B3DC170A6CE9FE7BAD6DA2BC5680713917477DBD14FE9935E553EF1DD92AD82E207DF1C121C
2,969,941 UART: [art] SIG.S = 604BA1EEE31421911B0B902946BEACEC451F57046684EE9BDFC914893564D21A45195E3EBA0E9AABF4BFB69756F9B2D9
2,993,853 UART: Caliptra RT
2,994,198 UART: [state] CFI Enabled
3,102,818 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,342 UART: [rt]cmd =0x43455252, len=4
3,144,050 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 ready_for_fw is high
1,174,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,877 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,210,124 UART: [ldev] ++
1,210,292 UART: [ldev] CDI.KEYID = 6
1,210,656 UART: [ldev] SUBJECT.KEYID = 5
1,211,083 UART: [ldev] AUTHORITY.KEYID = 7
1,211,546 UART: [ldev] FE.KEYID = 1
1,216,688 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,636 UART: [ldev] --
1,281,918 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,559 >>> mbox cmd response: success
2,769,559 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,770,770 UART: [afmc] ++
2,770,938 UART: [afmc] CDI.KEYID = 6
2,771,301 UART: [afmc] SUBJECT.KEYID = 7
2,771,727 UART: [afmc] AUTHORITY.KEYID = 5
2,807,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,021 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,750 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,633 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,841,343 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,849,208 UART: [afmc] --
2,850,306 UART: [cold-reset] --
2,851,122 UART: [state] Locking Datavault
2,852,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,871 UART: [state] Locking ICCM
2,853,459 UART: [exit] Launching FMC @ 0x40000130
2,858,788 UART:
2,858,804 UART: Running Caliptra FMC ...
2,859,212 UART:
2,859,266 UART: [state] CFI Enabled
2,869,755 UART: [fht] FMC Alias Private Key: 7
2,978,260 UART: [art] Extend RT PCRs Done
2,978,688 UART: [art] Lock RT PCRs Done
2,980,336 UART: [art] Populate DV Done
2,988,797 UART: [fht] FMC Alias Private Key: 7
2,989,915 UART: [art] Derive CDI
2,990,195 UART: [art] Store in in slot 0x4
3,075,714 UART: [art] Derive Key Pair
3,076,074 UART: [art] Store priv key in slot 0x5
3,089,338 UART: [art] Derive Key Pair - Done
3,104,093 UART: [art] Signing Cert with AUTHO
3,104,573 UART: RITY.KEYID = 7
3,120,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,988 UART: [art] PUB.X = 8CFE37794BD55054D9AB1DA2BDAD5907C526F82429004A829A9368291B2BE9337A2F02695C10B2700F8AAC84CF4606CC
3,127,728 UART: [art] PUB.Y = B40B09DF8BF3B25B0DA55CBE370D523522A487A3B369A3FFDC34828C553C16EDE609DE516196C773D0606E19B1FCB4CB
3,134,677 UART: [art] SIG.R = 860BF6FFC55989070B758DD4AE7EB47FAD78C73626DFD18360BE393ECC05588177B19719A345C8A6232A6FB895068443
3,141,432 UART: [art] SIG.S = A0F7733F7F7B2C114A715A4FCECC3CAC1D0F0F00C7D8CE1182ED262E5D84F68D9606590EE66F6469423D8E2031A05110
3,165,103 UART: Caliptra RT
3,165,356 UART: [state] CFI Enabled
3,272,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,985 UART: [rt]cmd =0x43455252, len=4
3,313,648 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,236 ready_for_fw is high
1,056,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,191 >>> mbox cmd response: success
2,619,191 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,681,995 UART:
2,682,011 UART: Running Caliptra FMC ...
2,682,419 UART:
2,682,473 UART: [state] CFI Enabled
2,693,200 UART: [fht] FMC Alias Private Key: 7
2,801,531 UART: [art] Extend RT PCRs Done
2,801,959 UART: [art] Lock RT PCRs Done
2,803,785 UART: [art] Populate DV Done
2,812,116 UART: [fht] FMC Alias Private Key: 7
2,813,280 UART: [art] Derive CDI
2,813,560 UART: [art] Store in in slot 0x4
2,899,073 UART: [art] Derive Key Pair
2,899,433 UART: [art] Store priv key in slot 0x5
2,912,501 UART: [art] Derive Key Pair - Done
2,927,149 UART: [art] Signing Cert with AUTHO
2,927,629 UART: RITY.KEYID = 7
2,942,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,504 UART: [art] PUB.X = 093B0A88FEC526C41F5EFEDC045C61BD82A04AA2CF2BCD12BE21CDC1F2EA6EE5A6BFE4E525552BD9C37875E0682DA288
2,950,291 UART: [art] PUB.Y = 5642C4AA8BDC953C6B3CEB21304F9E46075FC0C1123AF2C4453E16599DA95F7BB356F26B315D0F9E12FD2A4A454BD1CE
2,957,249 UART: [art] SIG.R = CB6EB4146FBE35B6027FF1A81237D5FD1B71BDD4F134AF64A8471DCD111123475A053381797F78D9F2715A556886D437
2,964,013 UART: [art] SIG.S = E9B26B3083E50595B01297584398A1B6DD70750774BC8DD86A4E65FDA2BB99E69CB4BB5961520DE966FF693DFF3337BA
2,987,623 UART: Caliptra RT
2,987,876 UART: [state] CFI Enabled
3,096,157 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,601 UART: [rt]cmd =0x43455252, len=4
3,137,498 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,700 UART: [kat] ++
895,852 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,174,758 ready_for_fw is high
1,174,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,023 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,181 UART: [ldev] --
1,281,641 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,388 >>> mbox cmd response: success
2,769,388 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,770,831 UART: [afmc] ++
2,770,999 UART: [afmc] CDI.KEYID = 6
2,771,362 UART: [afmc] SUBJECT.KEYID = 7
2,771,788 UART: [afmc] AUTHORITY.KEYID = 5
2,807,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,012 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,841,722 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,849,661 UART: [afmc] --
2,850,639 UART: [cold-reset] --
2,851,389 UART: [state] Locking Datavault
2,852,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,306 UART: [state] Locking ICCM
2,853,752 UART: [exit] Launching FMC @ 0x40000130
2,859,081 UART:
2,859,097 UART: Running Caliptra FMC ...
2,859,505 UART:
2,859,648 UART: [state] CFI Enabled
2,870,335 UART: [fht] FMC Alias Private Key: 7
2,978,018 UART: [art] Extend RT PCRs Done
2,978,446 UART: [art] Lock RT PCRs Done
2,979,890 UART: [art] Populate DV Done
2,988,267 UART: [fht] FMC Alias Private Key: 7
2,989,375 UART: [art] Derive CDI
2,989,655 UART: [art] Store in in slot 0x4
3,075,550 UART: [art] Derive Key Pair
3,075,910 UART: [art] Store priv key in slot 0x5
3,089,332 UART: [art] Derive Key Pair - Done
3,104,408 UART: [art] Signing Cert with AUTHO
3,104,888 UART: RITY.KEYID = 7
3,120,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,207 UART: [art] PUB.X = 77D6DBD3AD9223BBED0CE40C6E160063226CB6CA95D618D73C5CC42B0B2E3AF6299A5589568EAA6BC8036390BB5A14F4
3,127,957 UART: [art] PUB.Y = 4EAA1500C87B53BFE39DDF9E3915E595AC8894D01C5491F2C297F55CB5DD5CE31E47F29DDA758BA62E1BA91D9BCDA02B
3,134,907 UART: [art] SIG.R = 775231001142A8E1F991F94D853CFF948CE21F5F5F6C5BA19F5890AAF3846FAEF740656A15789BFBBC3FBEFE9AF6E669
3,141,669 UART: [art] SIG.S = 96A142466FC438C9CC02DBA8CFEF93A2425F93DCB0AA901AD5C8C7AB50F0C296FCEF61DF685EFF292E9AACBF18069D13
3,165,512 UART: Caliptra RT
3,165,857 UART: [state] CFI Enabled
3,273,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,705 UART: [rt]cmd =0x43455252, len=4
3,314,543 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,983 ready_for_fw is high
1,056,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,928 >>> mbox cmd response: success
2,619,928 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,682,412 UART:
2,682,428 UART: Running Caliptra FMC ...
2,682,836 UART:
2,682,979 UART: [state] CFI Enabled
2,693,998 UART: [fht] FMC Alias Private Key: 7
2,801,731 UART: [art] Extend RT PCRs Done
2,802,159 UART: [art] Lock RT PCRs Done
2,803,521 UART: [art] Populate DV Done
2,811,440 UART: [fht] FMC Alias Private Key: 7
2,812,560 UART: [art] Derive CDI
2,812,840 UART: [art] Store in in slot 0x4
2,898,631 UART: [art] Derive Key Pair
2,898,991 UART: [art] Store priv key in slot 0x5
2,911,951 UART: [art] Derive Key Pair - Done
2,927,075 UART: [art] Signing Cert with AUTHO
2,927,555 UART: RITY.KEYID = 7
2,943,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,168 UART: [art] PUB.X = 5EE163F11D21DCCE767784335A2C1A7E15EDDB4C5B19E468AB591368E66773EA4B6F019FC694EF04AACD10252FFB87FC
2,950,948 UART: [art] PUB.Y = 41287BDE44F294FC02B5BE80B7500B82F67FAC8234941572D5CEDB6EF575FF84DC0E88AC7438D040A7E88E30AFE5CA34
2,957,903 UART: [art] SIG.R = CC5EEAED849DB9EE6DBEE59AEE83B7F717004153C3DCCB3A88EA8281DD2D0D5D63D3E2DE8F3E6EE6F9C5E02DFBCD5CBC
2,964,690 UART: [art] SIG.S = D5B254B3ED5A535E8E3A3D13C06E3A6ED50B6BE82A6B9B95C5C8F3B696D32A0C4367826E5F561107CC77670F8E23E894
2,988,459 UART: Caliptra RT
2,988,804 UART: [state] CFI Enabled
3,096,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,097 UART: [rt]cmd =0x43455252, len=4
3,137,784 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,950 writing to cptra_bootfsm_go
193,049 UART:
193,420 UART: Running Caliptra ROM ...
194,619 UART:
194,774 UART: [state] CFI Enabled
264,331 UART: [state] LifecycleState = Unprovisioned
266,257 UART: [state] DebugLocked = No
267,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,077 UART: [kat] SHA2-256
441,822 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,290 UART: [kat] ++
452,895 UART: [kat] sha1
463,994 UART: [kat] SHA2-256
466,713 UART: [kat] SHA2-384
473,553 UART: [kat] SHA2-512-ACC
475,932 UART: [kat] ECC-384
2,769,632 UART: [kat] HMAC-384Kdf
2,800,427 UART: [kat] LMS
3,990,772 UART: [kat] --
3,994,577 UART: [cold-reset] ++
3,996,937 UART: [fht] Storing FHT @ 0x50003400
4,008,016 UART: [idev] ++
4,008,627 UART: [idev] CDI.KEYID = 6
4,009,526 UART: [idev] SUBJECT.KEYID = 7
4,010,776 UART: [idev] UDS.KEYID = 0
4,011,852 ready_for_fw is high
4,012,083 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,123 UART: [idev] Erasing UDS.KEYID = 0
7,348,063 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,913 UART: [idev] --
7,373,390 UART: [ldev] ++
7,373,969 UART: [ldev] CDI.KEYID = 6
7,374,941 UART: [ldev] SUBJECT.KEYID = 5
7,376,103 UART: [ldev] AUTHORITY.KEYID = 7
7,377,385 UART: [ldev] FE.KEYID = 1
7,423,238 UART: [ldev] Erasing FE.KEYID = 1
10,756,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,235 UART: [ldev] --
13,114,626 UART: [fwproc] Waiting for Commands...
13,117,215 UART: [fwproc] Received command 0x46574c44
13,119,396 UART: [fwproc] Received Image of size 113760 bytes
17,165,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,393 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,331 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,011 >>> mbox cmd response: success
17,627,505 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,631,559 UART: [afmc] ++
17,632,151 UART: [afmc] CDI.KEYID = 6
17,633,061 UART: [afmc] SUBJECT.KEYID = 7
17,634,336 UART: [afmc] AUTHORITY.KEYID = 5
21,009,402 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,819 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,183 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,036 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,486 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,595 UART: [afmc] --
23,378,688 UART: [cold-reset] --
23,382,115 UART: [state] Locking Datavault
23,387,414 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,167 UART: [state] Locking ICCM
23,391,533 UART: [exit] Launching FMC @ 0x40000130
23,399,928 UART:
23,400,162 UART: Running Caliptra FMC ...
23,401,210 UART:
23,401,362 UART: [state] CFI Enabled
23,469,785 UART: [fht] FMC Alias Private Key: 7
25,807,704 UART: [art] Extend RT PCRs Done
25,808,925 UART: [art] Lock RT PCRs Done
25,810,283 UART: [art] Populate DV Done
25,815,441 UART: [fht] FMC Alias Private Key: 7
25,816,925 UART: [art] Derive CDI
25,817,686 UART: [art] Store in in slot 0x4
25,878,801 UART: [art] Derive Key Pair
25,879,837 UART: [art] Store priv key in slot 0x5
29,172,186 UART: [art] Derive Key Pair - Done
29,184,966 UART: [art] Signing Cert with AUTHO
29,186,274 UART: RITY.KEYID = 7
31,472,828 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,336 UART: [art] PUB.X = 640EB0F000642505472185A678F9F09F54FB04449CA1ED727F883EB428D961031F5D2DE48AD5FB23E2DBF1D7C8742471
31,481,524 UART: [art] PUB.Y = 39F0C4DC8E2B42B76AC0B556B9E1313FD50AD9D46B848D48D75C36C5107B52FCE15237630DCC93FA3847F63C95952C89
31,488,809 UART: [art] SIG.R = 6F4E8528A5E109B317EDCB7E460D7AAC93FBBF975E4CFA868859E86746D16D06E60791EEE1840FC6A314A42BD8CE0081
31,496,193 UART: [art] SIG.S = AD07417F11B3B570F7E9CF5FA03E3AFB0A80D2D2693E679135BA1C0A38898C899FE0EB65FB0C4E1174A7F3376C157F12
32,801,572 UART: Caliptra RT
32,802,285 UART: [state] CFI Enabled
32,961,983 UART: [rt] RT listening for mailbox commands...
32,993,520 UART: [rt]cmd =0x4453424c, len=4
36,294,496 >>> mbox cmd response data (8 bytes)
38,346,639 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
38,491,624 UART:
38,492,019 UART: Running Caliptra ROM ...
38,493,078 UART:
38,493,231 UART: [state] CFI Enabled
38,550,455 UART: [state] LifecycleState = Unprovisioned
38,552,405 UART: [state] DebugLocked = No
38,553,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,558,003 UART: [kat] SHA2-256
38,727,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,738,186 UART: [kat] ++
38,738,646 UART: [kat] sha1
38,750,232 UART: [kat] SHA2-256
38,752,922 UART: [kat] SHA2-384
38,758,208 UART: [kat] SHA2-512-ACC
38,760,605 UART: [kat] ECC-384
41,056,323 UART: [kat] HMAC-384Kdf
41,089,048 UART: [kat] LMS
42,279,397 UART: [kat] --
42,282,547 UART: [update-reset] ++
46,421,535 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,424,843 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
46,805,835 >>> mbox cmd response: success
46,806,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,806,535 UART: [update-reset] Copying MAN_2 To MAN_1
46,828,887 UART: [update-reset Success] --
46,834,095 UART: [state] Locking Datavault
46,838,752 UART: [state] Locking PCR0, PCR1 and PCR31
46,840,456 UART: [state] Locking ICCM
46,843,055 UART: [exit] Launching FMC @ 0x40000130
46,851,506 UART:
46,851,738 UART: Running Caliptra FMC ...
46,852,838 UART:
46,852,991 UART: [state] CFI Enabled
46,945,827 UART: [art] Extend RT PCRs Done
46,947,015 UART: [art] Lock RT PCRs Done
46,948,311 UART: [art] Populate DV Done
46,953,606 UART: [fht] FMC Alias Private Key: 7
46,955,208 UART: [art] Derive CDI
46,955,970 UART: [art] Store in in slot 0x4
47,014,922 UART: [art] Derive Key Pair
47,015,989 UART: [art] Store priv key in slot 0x5
50,308,672 UART: [art] Derive Key Pair - Done
50,321,836 UART: [art] Signing Cert with AUTHO
50,323,172 UART: RITY.KEYID = 7
52,610,800 UART: [art] Erasing AUTHORITY.KEYID = 7
52,612,314 UART: [art] PUB.X = C062DB57EA71C30EFEFC51664DA4C0BCDF4991B666400C9A58DA6FEEBA5E0DD3B877CA923A38D8CB1C5896710FD73F9D
52,619,560 UART: [art] PUB.Y = 47D9DF5E463A10B3F4D262C71FB458F61E12DEEA5D14B7057DF9021AD78E676FB6ECAD32F8A3378506609D84C88C2430
52,626,852 UART: [art] SIG.R = 1DF816F59EA5414053F7B613BC7F20BAFFEE0C653B6A5DFBCA17E1CA68219846A04E08E8F98B29DD89A7AF6586FA330D
52,634,242 UART: [art] SIG.S = 4ABAA3D297E3E081F26D398DE1AC762A2CD8CC8F2201597012ED61D954AC5A1C0F9233CDD4E402363E4C352029CDC9E7
53,940,063 UART: Caliptra RT
53,940,775 UART: [state] CFI Enabled
57,552,888 UART: [rt] RT listening for mailbox commands...
57,584,067 UART: [rt]cmd =0x494e464f, len=4
57,588,306 >>> mbox cmd response data (312 bytes)
57,590,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,620,013 UART: [rt]cmd =0x43455252, len=4
57,631,327 >>> mbox cmd response data (782 bytes)
57,672,860 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,703,592 UART: [rt]cmd =0x44504543, len=92
63,463,039 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,784,581 ready_for_fw is high
3,785,006 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,805,163 >>> mbox cmd response: success
17,805,754 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,494,389 UART:
23,494,774 UART: Running Caliptra FMC ...
23,495,914 UART:
23,496,076 UART: [state] CFI Enabled
23,565,099 UART: [fht] FMC Alias Private Key: 7
25,902,693 UART: [art] Extend RT PCRs Done
25,903,927 UART: [art] Lock RT PCRs Done
25,905,436 UART: [art] Populate DV Done
25,911,101 UART: [fht] FMC Alias Private Key: 7
25,912,645 UART: [art] Derive CDI
25,913,384 UART: [art] Store in in slot 0x4
25,974,358 UART: [art] Derive Key Pair
25,975,407 UART: [art] Store priv key in slot 0x5
29,268,525 UART: [art] Derive Key Pair - Done
29,281,359 UART: [art] Signing Cert with AUTHO
29,282,690 UART: RITY.KEYID = 7
31,570,485 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,995 UART: [art] PUB.X = F261BB1FF8A01CAFAFE12A8F8CD1EE6C85B80A6E51A7F6CCFC55E28DBBFB4C301CA83C6BB42CAC92D3FF0A05D28E33FC
31,579,311 UART: [art] PUB.Y = 6061DACB6385867CC15CF18DF2A3F973D6A16C1FAC5878DF42CDB42BBB44208325DA10BDFA3A3F398BCC928EDB8E5133
31,586,562 UART: [art] SIG.R = F45E7F31E3B82C0ED4965E21AC5AFE82711098F7595B981777CE20F8FA49AB1ACDCDC589BFE411B48E56EB6A7E5A4F98
31,593,959 UART: [art] SIG.S = 69813EAE065DDE107389A4CA844DC1490961F9668BC6DFE3467714EB2565FF34546871CA17B920E38709D93A1C25D8A5
32,899,304 UART: Caliptra RT
32,900,017 UART: [state] CFI Enabled
33,061,613 UART: [rt] RT listening for mailbox commands...
33,092,917 UART: [rt]cmd =0x4453424c, len=4
36,394,081 >>> mbox cmd response data (8 bytes)
38,444,957 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
47,179,873 >>> mbox cmd response: success
47,180,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,213,416 UART:
47,213,707 UART: Running Caliptra FMC ...
47,214,751 UART:
47,214,902 UART: [state] CFI Enabled
47,319,258 UART: [art] Extend RT PCRs Done
47,320,472 UART: [art] Lock RT PCRs Done
47,321,671 UART: [art] Populate DV Done
47,327,154 UART: [fht] FMC Alias Private Key: 7
47,328,749 UART: [art] Derive CDI
47,329,486 UART: [art] Store in in slot 0x4
47,388,435 UART: [art] Derive Key Pair
47,389,441 UART: [art] Store priv key in slot 0x5
50,683,059 UART: [art] Derive Key Pair - Done
50,696,022 UART: [art] Signing Cert with AUTHO
50,697,328 UART: RITY.KEYID = 7
52,984,308 UART: [art] Erasing AUTHORITY.KEYID = 7
52,985,821 UART: [art] PUB.X = BCD288EBD000E8B52F840D9231CC1CBCCF052B1337263A6A756DF0E0024E98C92433359010873A2CA5341D1B97BB218A
52,993,064 UART: [art] PUB.Y = F60629B4D048320F76FAEB98A365B70DD953A79A27A1458B6629C8350F50A08A1EE70766CE762179C056A70664C13C86
53,000,307 UART: [art] SIG.R = D0F231B28C7F6F37940C1439742D45F6BF989EF6794122D24E2862CC0613A56A6CAEB10A435F0AA18062DA36326A7A8E
53,007,667 UART: [art] SIG.S = 02DCCE0ECA7B199F9F244AFBB059E0D19E2B192F1EC5ECD7B5B2C63E92364474FDE2B2CB26C0A414FFCF17632F18F0B0
54,312,831 UART: Caliptra RT
54,313,542 UART: [state] CFI Enabled
57,928,425 UART: [rt] RT listening for mailbox commands...
57,959,347 UART: [rt]cmd =0x494e464f, len=4
57,963,774 >>> mbox cmd response data (312 bytes)
57,965,639 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,995,280 UART: [rt]cmd =0x43455252, len=4
58,006,575 >>> mbox cmd response data (783 bytes)
58,048,467 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,079,380 UART: [rt]cmd =0x44504543, len=92
63,832,550 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
192,922 UART:
193,300 UART: Running Caliptra ROM ...
194,493 UART:
604,038 UART: [state] CFI Enabled
617,936 UART: [state] LifecycleState = Unprovisioned
619,809 UART: [state] DebugLocked = No
622,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,953 UART: [kat] SHA2-256
796,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,276 UART: [kat] ++
807,832 UART: [kat] sha1
818,358 UART: [kat] SHA2-256
821,072 UART: [kat] SHA2-384
828,197 UART: [kat] SHA2-512-ACC
830,557 UART: [kat] ECC-384
3,114,128 UART: [kat] HMAC-384Kdf
3,126,225 UART: [kat] LMS
4,316,305 UART: [kat] --
4,320,822 UART: [cold-reset] ++
4,322,548 UART: [fht] Storing FHT @ 0x50003400
4,334,519 UART: [idev] ++
4,335,158 UART: [idev] CDI.KEYID = 6
4,336,040 UART: [idev] SUBJECT.KEYID = 7
4,337,281 UART: [idev] UDS.KEYID = 0
4,338,242 ready_for_fw is high
4,338,431 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,357 UART: [idev] Erasing UDS.KEYID = 0
7,629,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,281 UART: [idev] --
7,654,227 UART: [ldev] ++
7,654,864 UART: [ldev] CDI.KEYID = 6
7,655,770 UART: [ldev] SUBJECT.KEYID = 5
7,656,976 UART: [ldev] AUTHORITY.KEYID = 7
7,658,256 UART: [ldev] FE.KEYID = 1
7,668,680 UART: [ldev] Erasing FE.KEYID = 1
10,956,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,057 UART: [ldev] --
13,314,243 UART: [fwproc] Waiting for Commands...
13,316,728 UART: [fwproc] Received command 0x46574c44
13,319,173 UART: [fwproc] Received Image of size 113760 bytes
17,368,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,442 >>> mbox cmd response: success
17,826,959 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,830,225 UART: [afmc] ++
17,830,802 UART: [afmc] CDI.KEYID = 6
17,831,680 UART: [afmc] SUBJECT.KEYID = 7
17,832,943 UART: [afmc] AUTHORITY.KEYID = 5
21,150,277 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,929 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,285 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,152 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,639 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,800 UART: [afmc] --
23,516,451 UART: [cold-reset] --
23,518,850 UART: [state] Locking Datavault
23,524,256 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,006 UART: [state] Locking ICCM
23,527,818 UART: [exit] Launching FMC @ 0x40000130
23,536,215 UART:
23,536,446 UART: Running Caliptra FMC ...
23,537,470 UART:
23,537,619 UART: [state] CFI Enabled
23,546,148 UART: [fht] FMC Alias Private Key: 7
25,877,433 UART: [art] Extend RT PCRs Done
25,878,647 UART: [art] Lock RT PCRs Done
25,880,480 UART: [art] Populate DV Done
25,885,906 UART: [fht] FMC Alias Private Key: 7
25,887,514 UART: [art] Derive CDI
25,888,271 UART: [art] Store in in slot 0x4
25,930,694 UART: [art] Derive Key Pair
25,931,682 UART: [art] Store priv key in slot 0x5
29,173,377 UART: [art] Derive Key Pair - Done
29,186,526 UART: [art] Signing Cert with AUTHO
29,187,826 UART: RITY.KEYID = 7
31,466,952 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,456 UART: [art] PUB.X = 4CE0CA8DF82955E640E9641679A849273EF535F5A82D0107ACF2075E89592AECE223BA6A21121EEF3A3F7E55CE0542F3
31,475,733 UART: [art] PUB.Y = BD2F3D01EBA71A48444BB75AB2AB9C43544201C42E2030563C7F2F2BA71230A118A8941C07E0CA30479FEE7B979FF241
31,482,964 UART: [art] SIG.R = D6586817962D07F1CACBA45F92D5D31DA88B5F6917DD91802FB28D8D9BC0E8BFFD6C04748CA4B45E967B2652162EC3E9
31,490,315 UART: [art] SIG.S = B7EB4ABCDC46C4E2989402FFBE889CA17B3247B8A633AA63A7D1FEAD6F60BCA41AC6F9B22ABF7158643231C2025BF808
32,795,264 UART: Caliptra RT
32,795,977 UART: [state] CFI Enabled
32,914,068 UART: [rt] RT listening for mailbox commands...
32,945,692 UART: [rt]cmd =0x4453424c, len=4
36,188,970 >>> mbox cmd response data (8 bytes)
38,241,436 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
38,385,777 UART:
38,386,160 UART: Running Caliptra ROM ...
38,387,246 UART:
38,387,456 UART: [state] CFI Enabled
38,398,919 UART: [state] LifecycleState = Unprovisioned
38,400,874 UART: [state] DebugLocked = No
38,402,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,407,477 UART: [kat] SHA2-256
38,577,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,587,679 UART: [kat] ++
38,588,216 UART: [kat] sha1
38,600,722 UART: [kat] SHA2-256
38,603,411 UART: [kat] SHA2-384
38,610,216 UART: [kat] SHA2-512-ACC
38,612,568 UART: [kat] ECC-384
40,897,113 UART: [kat] HMAC-384Kdf
40,907,737 UART: [kat] LMS
42,097,806 UART: [kat] --
42,103,202 UART: [update-reset] ++
46,234,885 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,238,508 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
46,619,478 >>> mbox cmd response: success
46,619,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,620,151 UART: [update-reset] Copying MAN_2 To MAN_1
46,642,221 UART: [update-reset Success] --
46,647,504 UART: [state] Locking Datavault
46,649,899 UART: [state] Locking PCR0, PCR1 and PCR31
46,651,652 UART: [state] Locking ICCM
46,653,255 UART: [exit] Launching FMC @ 0x40000130
46,661,703 UART:
46,661,936 UART: Running Caliptra FMC ...
46,663,035 UART:
46,663,193 UART: [state] CFI Enabled
46,707,641 UART: [art] Extend RT PCRs Done
46,708,827 UART: [art] Lock RT PCRs Done
46,710,551 UART: [art] Populate DV Done
46,716,171 UART: [fht] FMC Alias Private Key: 7
46,717,669 UART: [art] Derive CDI
46,718,426 UART: [art] Store in in slot 0x4
46,761,019 UART: [art] Derive Key Pair
46,762,060 UART: [art] Store priv key in slot 0x5
50,004,148 UART: [art] Derive Key Pair - Done
50,017,102 UART: [art] Signing Cert with AUTHO
50,018,415 UART: RITY.KEYID = 7
52,298,204 UART: [art] Erasing AUTHORITY.KEYID = 7
52,299,718 UART: [art] PUB.X = D95EB5ED009EB7A3C64F04ABADDAB244015AE04511477FFACD6D5B39109E720861A8F0D8ACDB6ED9171F0EA833EA802F
52,306,991 UART: [art] PUB.Y = 3DA80B145F5A0BCF654E2F847BE2E6CA336CA56F9230058906A35DE90BE0F529FAB7D26CBA27FDCB071A2618F6083933
52,314,251 UART: [art] SIG.R = 447D3F4C5925753BDB9ABB09549556B7AE78A924DAC1422F730F8C1DB1CED3A05003D4D95BD651BDD724B17A17D3A40C
52,321,617 UART: [art] SIG.S = 644ED92BD5A99CBA35172ABE92582384FDB35CE85A6D60B041C55E52DD2CE55163F0032213D63A25081AFB04FF2CED0A
53,626,718 UART: Caliptra RT
53,627,438 UART: [state] CFI Enabled
57,159,201 UART: [rt] RT listening for mailbox commands...
57,190,056 UART: [rt]cmd =0x494e464f, len=4
57,194,344 >>> mbox cmd response data (312 bytes)
57,196,264 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,226,167 UART: [rt]cmd =0x43455252, len=4
57,237,523 >>> mbox cmd response data (782 bytes)
57,278,530 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,309,151 UART: [rt]cmd =0x44504543, len=92
62,983,834 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
4,124,422 ready_for_fw is high
4,124,803 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,052,256 >>> mbox cmd response: success
18,052,912 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,694,347 UART:
23,694,747 UART: Running Caliptra FMC ...
23,695,880 UART:
23,696,034 UART: [state] CFI Enabled
23,704,310 UART: [fht] FMC Alias Private Key: 7
26,034,848 UART: [art] Extend RT PCRs Done
26,036,076 UART: [art] Lock RT PCRs Done
26,037,870 UART: [art] Populate DV Done
26,043,071 UART: [fht] FMC Alias Private Key: 7
26,044,780 UART: [art] Derive CDI
26,045,517 UART: [art] Store in in slot 0x4
26,088,229 UART: [art] Derive Key Pair
26,089,272 UART: [art] Store priv key in slot 0x5
29,331,672 UART: [art] Derive Key Pair - Done
29,344,891 UART: [art] Signing Cert with AUTHO
29,346,257 UART: RITY.KEYID = 7
31,625,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,071 UART: [art] PUB.X = C858F9FDCA12AB8EDEEE0B7217C2DDAE2AEA99D6956F5BF5359149495DF0A233BB4DF1D864DAEF476FD7CF8C990A7420
31,634,369 UART: [art] PUB.Y = D2A34078C848A77779C5A8F816AA513151222EB80C0305642A8B48FAE4AC12EAACFE30A7C5D3184F28BFB15DA07C6814
31,641,593 UART: [art] SIG.R = 4FD83A24C8836E3EA2131244251E8A42EAFF30C22A71A66347E13257C036336255DA4003E3AF304B2929C713D9B709FA
31,648,982 UART: [art] SIG.S = 314280646AC41D9FDA27784139AA7D38719332448D3CD9641FAC4607F085EB970EBD968B6800CA3270925012E6BAF8F6
32,954,403 UART: Caliptra RT
32,955,104 UART: [state] CFI Enabled
33,073,623 UART: [rt] RT listening for mailbox commands...
33,105,191 UART: [rt]cmd =0x4453424c, len=4
36,348,394 >>> mbox cmd response data (8 bytes)
38,400,061 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
47,046,924 >>> mbox cmd response: success
47,047,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,079,964 UART:
47,080,245 UART: Running Caliptra FMC ...
47,081,304 UART:
47,081,453 UART: [state] CFI Enabled
47,125,355 UART: [art] Extend RT PCRs Done
47,126,535 UART: [art] Lock RT PCRs Done
47,127,934 UART: [art] Populate DV Done
47,133,396 UART: [fht] FMC Alias Private Key: 7
47,135,043 UART: [art] Derive CDI
47,135,854 UART: [art] Store in in slot 0x4
47,178,390 UART: [art] Derive Key Pair
47,179,391 UART: [art] Store priv key in slot 0x5
50,421,235 UART: [art] Derive Key Pair - Done
50,434,314 UART: [art] Signing Cert with AUTHO
50,435,627 UART: RITY.KEYID = 7
52,715,666 UART: [art] Erasing AUTHORITY.KEYID = 7
52,717,173 UART: [art] PUB.X = 568A87D0BDA3BB1CD8D4B9E8E54938F61C124D8DCE9D409DF74384FC1C3C8FEF56DAC54FDC22D01D0973C0D8735EC436
52,724,455 UART: [art] PUB.Y = 0B436EA9E74FFD1B1C1E358318263376E4554900F4BDB5BEFA4F5BE0312231200F7583EA6B9409D918B52A6E4468BC85
52,731,674 UART: [art] SIG.R = B85A70EAF29313E0466DE8EAF79608DB157E018CCE64DA13576D9EF6E40188702533BAEF8F04D7BBBE4049604E33109D
52,739,115 UART: [art] SIG.S = AE59140C7D63323C1B29B5F4E93C2C93F9236115F7685ABA2344F4CD45C59F75507D07B8FF9D5B36825DE248723F9F32
54,044,187 UART: Caliptra RT
54,044,881 UART: [state] CFI Enabled
57,577,192 UART: [rt] RT listening for mailbox commands...
57,608,256 UART: [rt]cmd =0x494e464f, len=4
57,612,624 >>> mbox cmd response data (312 bytes)
57,614,482 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,644,230 UART: [rt]cmd =0x43455252, len=4
57,655,533 >>> mbox cmd response data (784 bytes)
57,696,846 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,727,474 UART: [rt]cmd =0x44504543, len=92
63,400,996 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,513 UART:
192,888 UART: Running Caliptra ROM ...
194,082 UART:
194,244 UART: [state] CFI Enabled
262,596 UART: [state] LifecycleState = Unprovisioned
264,512 UART: [state] DebugLocked = No
266,819 UART: [state] WD Timer not started. Device not locked for debugging
271,415 UART: [kat] SHA2-256
450,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,079 UART: [kat] ++
462,616 UART: [kat] sha1
474,417 UART: [kat] SHA2-256
477,480 UART: [kat] SHA2-384
484,027 UART: [kat] SHA2-512-ACC
486,972 UART: [kat] ECC-384
2,947,831 UART: [kat] HMAC-384Kdf
2,971,831 UART: [kat] LMS
3,501,260 UART: [kat] --
3,507,101 UART: [cold-reset] ++
3,508,108 UART: [fht] FHT @ 0x50003400
3,519,858 UART: [idev] ++
3,520,416 UART: [idev] CDI.KEYID = 6
3,521,327 UART: [idev] SUBJECT.KEYID = 7
3,522,563 UART: [idev] UDS.KEYID = 0
3,523,500 ready_for_fw is high
3,523,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,280 UART: [idev] Erasing UDS.KEYID = 0
6,025,266 UART: [idev] Sha1 KeyId Algorithm
6,048,987 UART: [idev] --
6,052,316 UART: [ldev] ++
6,052,893 UART: [ldev] CDI.KEYID = 6
6,053,808 UART: [ldev] SUBJECT.KEYID = 5
6,054,961 UART: [ldev] AUTHORITY.KEYID = 7
6,056,190 UART: [ldev] FE.KEYID = 1
6,100,893 UART: [ldev] Erasing FE.KEYID = 1
8,607,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,527 UART: [ldev] --
10,413,683 UART: [fwproc] Wait for Commands...
10,415,235 UART: [fwproc] Recv command 0x46574c44
10,417,321 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,266,318 >>> mbox cmd response: success
14,266,820 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,270,700 UART: [afmc] ++
14,271,293 UART: [afmc] CDI.KEYID = 6
14,272,174 UART: [afmc] SUBJECT.KEYID = 7
14,273,382 UART: [afmc] AUTHORITY.KEYID = 5
16,809,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,817 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,111 UART: [afmc] --
18,607,587 UART: [cold-reset] --
18,612,366 UART: [state] Locking Datavault
18,618,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,071 UART: [state] Locking ICCM
18,621,573 UART: [exit] Launching FMC @ 0x40000130
18,630,027 UART:
18,630,263 UART: Running Caliptra FMC ...
18,631,358 UART:
18,631,511 UART: [state] CFI Enabled
18,689,880 UART: [fht] FMC Alias Private Key: 7
20,454,037 UART: [art] Extend RT PCRs Done
20,455,261 UART: [art] Lock RT PCRs Done
20,457,007 UART: [art] Populate DV Done
20,462,211 UART: [fht] FMC Alias Private Key: 7
20,463,853 UART: [art] Derive CDI
20,464,662 UART: [art] Store in in slot 0x4
20,522,973 UART: [art] Derive Key Pair
20,524,009 UART: [art] Store priv key in slot 0x5
22,987,315 UART: [art] Derive Key Pair - Done
23,000,262 UART: [art] Signing Cert with AUTHO
23,001,563 UART: RITY.KEYID = 7
24,712,300 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,804 UART: [art] PUB.X = 148BC5AE4CC40F51AB35CBA16F7BA6808C75AC3BF9C542E5514929596215FC1C729ACAB7ED728183D103014FCF14F51B
24,721,116 UART: [art] PUB.Y = AFFB48E6CD6EA7C4AAF88019569840FD83271BE91DA7608BD7A6A4339276AE704EFA774BD04E7778F7B42C733FA86FFC
24,728,370 UART: [art] SIG.R = 728E52B3F54DAE84DFE051EA6973AE4741CA39E500ABEA10CB6E513B79090DDCF2D5746884C1610A1B92A7516AF17A76
24,735,743 UART: [art] SIG.S = F6168DAA384E2A3BB2D5EACDD6487DD1591290782DCF61C511C03C0BD5EA8DEFFD3EA9104587168836F27118B8D1AA3F
25,714,739 UART: Caliptra RT
25,715,453 UART: [state] CFI Enabled
25,879,549 UART: [rt] RT listening for mailbox commands...
25,911,242 UART: [rt]cmd =0x4453424c, len=4
28,382,046 >>> mbox cmd response data (8 bytes)
30,432,092 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,577,158 UART:
30,577,534 UART: Running Caliptra ROM ...
30,578,624 UART:
30,578,787 UART: [state] CFI Enabled
30,636,536 UART: [state] LifecycleState = Unprovisioned
30,638,424 UART: [state] DebugLocked = No
30,639,999 UART: [state] WD Timer not started. Device not locked for debugging
30,643,806 UART: [kat] SHA2-256
30,822,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,834,553 UART: [kat] ++
30,835,006 UART: [kat] sha1
30,845,086 UART: [kat] SHA2-256
30,848,087 UART: [kat] SHA2-384
30,855,699 UART: [kat] SHA2-512-ACC
30,858,644 UART: [kat] ECC-384
33,322,678 UART: [kat] HMAC-384Kdf
33,345,002 UART: [kat] LMS
33,874,472 UART: [kat] --
33,878,914 UART: [update-reset] ++
37,307,797 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,311,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
37,693,437 >>> mbox cmd response: success
37,693,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,694,083 UART: [update-reset] Copying MAN_2 To MAN_1
37,716,436 UART: [update-reset Success] --
37,720,189 UART: [state] Locking Datavault
37,722,089 UART: [state] Locking PCR0, PCR1 and PCR31
37,723,881 UART: [state] Locking ICCM
37,725,012 UART: [exit] Launching FMC @ 0x40000130
37,733,469 UART:
37,733,709 UART: Running Caliptra FMC ...
37,734,736 UART:
37,734,885 UART: [state] CFI Enabled
37,836,791 UART: [art] Extend RT PCRs Done
37,837,969 UART: [art] Lock RT PCRs Done
37,839,446 UART: [art] Populate DV Done
37,844,902 UART: [fht] FMC Alias Private Key: 7
37,846,379 UART: [art] Derive CDI
37,847,110 UART: [art] Store in in slot 0x4
37,905,551 UART: [art] Derive Key Pair
37,906,597 UART: [art] Store priv key in slot 0x5
40,369,484 UART: [art] Derive Key Pair - Done
40,382,432 UART: [art] Signing Cert with AUTHO
40,383,735 UART: RITY.KEYID = 7
42,094,371 UART: [art] Erasing AUTHORITY.KEYID = 7
42,095,860 UART: [art] PUB.X = 5B0394D12A8138EE6F499D9A7C8794516E48E9135F4FBAD9B5BC44A7CEE506FBD7628DB96E75734782F349D5C5E58E0E
42,103,084 UART: [art] PUB.Y = B9F389C5FEEF9D753FB63FCCD88A0B275CFE54A2BFAEDED3EC930DE16FDE073605A36DF257CD920FB13E6E3AAAE8A134
42,110,413 UART: [art] SIG.R = 82A35958D47EFA4454E709ECF80228312F457BE38B07544381E6694C1393DC711CD82E8D151EBD03B2E23A06D4D65A71
42,117,788 UART: [art] SIG.S = 10F0F7A5179D1D83B48FD5B75BBC2E5804E9B011186A13A4C3B56AFF89871C1B9D72D1013D97AC1B5235414599607AE4
43,096,684 UART: Caliptra RT
43,097,388 UART: [state] CFI Enabled
45,880,898 UART: [rt] RT listening for mailbox commands...
45,911,850 UART: [rt]cmd =0x494e464f, len=4
45,916,427 >>> mbox cmd response data (312 bytes)
45,918,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,947,967 UART: [rt]cmd =0x43455252, len=4
45,959,387 >>> mbox cmd response data (783 bytes)
46,001,257 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,031,994 UART: [rt]cmd =0x44504543, len=92
50,385,719 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
3,380,245 ready_for_fw is high
3,380,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,055,940 >>> mbox cmd response: success
14,056,716 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,339,059 UART:
18,339,446 UART: Running Caliptra FMC ...
18,340,644 UART:
18,340,809 UART: [state] CFI Enabled
18,406,974 UART: [fht] FMC Alias Private Key: 7
20,171,115 UART: [art] Extend RT PCRs Done
20,172,352 UART: [art] Lock RT PCRs Done
20,174,383 UART: [art] Populate DV Done
20,179,985 UART: [fht] FMC Alias Private Key: 7
20,181,472 UART: [art] Derive CDI
20,182,237 UART: [art] Store in in slot 0x4
20,239,793 UART: [art] Derive Key Pair
20,240,828 UART: [art] Store priv key in slot 0x5
22,703,573 UART: [art] Derive Key Pair - Done
22,716,625 UART: [art] Signing Cert with AUTHO
22,717,982 UART: RITY.KEYID = 7
24,429,573 UART: [art] Erasing AUTHORITY.KEYID = 7
24,431,062 UART: [art] PUB.X = 19B9866733F22D0FCC2CF9180D498E47137502254EC9A8364465249F97C174CC122929A605F691C5F6F5FCCE59D4EB37
24,438,350 UART: [art] PUB.Y = 3E0AE1B37CD0CB843B5BDA102E94DD811A080E9B9901B715E37FF9E001E6D68CB8AB8B13E418A26547461A7A14AD5AE9
24,445,625 UART: [art] SIG.R = D23EA0BFF558F6482D445D1660F3C6D52625F8602A3F63539B031FC9E74FC65BA62451CB990E7FDB58ECC78F0B120C62
24,453,020 UART: [art] SIG.S = 4A924ACD5977D283C4035FF71BFC7CC4807D24C1A82666A600EECD69C911C781677845A68CD5DBA06381FE22C96A68A3
25,431,450 UART: Caliptra RT
25,432,158 UART: [state] CFI Enabled
25,597,466 UART: [rt] RT listening for mailbox commands...
25,628,679 UART: [rt]cmd =0x4453424c, len=4
28,078,612 >>> mbox cmd response data (8 bytes)
30,129,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
37,250,543 >>> mbox cmd response: success
37,251,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,284,995 UART:
37,285,339 UART: Running Caliptra FMC ...
37,286,469 UART:
37,286,629 UART: [state] CFI Enabled
37,382,061 UART: [art] Extend RT PCRs Done
37,383,259 UART: [art] Lock RT PCRs Done
37,384,617 UART: [art] Populate DV Done
37,390,367 UART: [fht] FMC Alias Private Key: 7
37,391,969 UART: [art] Derive CDI
37,392,778 UART: [art] Store in in slot 0x4
37,451,474 UART: [art] Derive Key Pair
37,452,510 UART: [art] Store priv key in slot 0x5
39,915,067 UART: [art] Derive Key Pair - Done
39,928,069 UART: [art] Signing Cert with AUTHO
39,929,382 UART: RITY.KEYID = 7
41,640,232 UART: [art] Erasing AUTHORITY.KEYID = 7
41,641,747 UART: [art] PUB.X = 39D6C98F6FC66FE758A41B1B217E8F85AF20CE5A0BAE12407BF0786C3997486FB64264BDA33AD358151B5F8D8C8E6840
41,649,026 UART: [art] PUB.Y = C98EEBBED676C37FD1817F66498095331EA0AF74B957BB191B752F1F20CAA9BA8F4761175333878498063AA66A7D6319
41,656,295 UART: [art] SIG.R = 9788ABDAFEE186425A959ADFF9E72F70409617076F85B582B4E507B40BAF378CBF137A89D7C64B2AB00D0BADF9721588
41,663,670 UART: [art] SIG.S = 67D0F8A78E22BF48141E994BAD5726D8885421DA64E57CD8AE2D3E660A9216113C6B2B77F240DD467F82B682733D2DB2
42,643,174 UART: Caliptra RT
42,643,901 UART: [state] CFI Enabled
45,425,462 UART: [rt] RT listening for mailbox commands...
45,456,600 UART: [rt]cmd =0x494e464f, len=4
45,461,028 >>> mbox cmd response data (312 bytes)
45,462,946 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,492,662 UART: [rt]cmd =0x43455252, len=4
45,503,962 >>> mbox cmd response data (783 bytes)
45,545,470 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,576,376 UART: [rt]cmd =0x44504543, len=92
49,931,850 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
193,017 UART:
193,389 UART: Running Caliptra ROM ...
194,589 UART:
604,314 UART: [state] CFI Enabled
619,610 UART: [state] LifecycleState = Unprovisioned
621,486 UART: [state] DebugLocked = No
624,394 UART: [state] WD Timer not started. Device not locked for debugging
628,335 UART: [kat] SHA2-256
807,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,021 UART: [kat] ++
819,567 UART: [kat] sha1
830,594 UART: [kat] SHA2-256
833,596 UART: [kat] SHA2-384
840,507 UART: [kat] SHA2-512-ACC
843,452 UART: [kat] ECC-384
3,285,383 UART: [kat] HMAC-384Kdf
3,297,331 UART: [kat] LMS
3,826,849 UART: [kat] --
3,829,210 UART: [cold-reset] ++
3,831,569 UART: [fht] FHT @ 0x50003400
3,841,768 UART: [idev] ++
3,842,339 UART: [idev] CDI.KEYID = 6
3,843,371 UART: [idev] SUBJECT.KEYID = 7
3,844,475 UART: [idev] UDS.KEYID = 0
3,845,414 ready_for_fw is high
3,845,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,879 UART: [idev] Erasing UDS.KEYID = 0
6,315,582 UART: [idev] Sha1 KeyId Algorithm
6,337,456 UART: [idev] --
6,342,368 UART: [ldev] ++
6,342,936 UART: [ldev] CDI.KEYID = 6
6,343,837 UART: [ldev] SUBJECT.KEYID = 5
6,344,993 UART: [ldev] AUTHORITY.KEYID = 7
6,346,278 UART: [ldev] FE.KEYID = 1
6,357,922 UART: [ldev] Erasing FE.KEYID = 1
8,831,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,338 UART: [ldev] --
10,624,629 UART: [fwproc] Wait for Commands...
10,626,863 UART: [fwproc] Recv command 0x46574c44
10,628,909 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,400 >>> mbox cmd response: success
14,491,895 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,494,939 UART: [afmc] ++
14,495,521 UART: [afmc] CDI.KEYID = 6
14,496,400 UART: [afmc] SUBJECT.KEYID = 7
14,497,613 UART: [afmc] AUTHORITY.KEYID = 5
16,999,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,170 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,067 UART: [afmc] --
18,795,763 UART: [cold-reset] --
18,799,419 UART: [state] Locking Datavault
18,804,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,336 UART: [state] Locking ICCM
18,807,621 UART: [exit] Launching FMC @ 0x40000130
18,816,028 UART:
18,816,270 UART: Running Caliptra FMC ...
18,817,374 UART:
18,817,534 UART: [state] CFI Enabled
18,825,641 UART: [fht] FMC Alias Private Key: 7
20,581,984 UART: [art] Extend RT PCRs Done
20,583,210 UART: [art] Lock RT PCRs Done
20,585,025 UART: [art] Populate DV Done
20,590,278 UART: [fht] FMC Alias Private Key: 7
20,591,819 UART: [art] Derive CDI
20,592,581 UART: [art] Store in in slot 0x4
20,635,019 UART: [art] Derive Key Pair
20,636,064 UART: [art] Store priv key in slot 0x5
23,062,676 UART: [art] Derive Key Pair - Done
23,075,644 UART: [art] Signing Cert with AUTHO
23,076,956 UART: RITY.KEYID = 7
24,782,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,856 UART: [art] PUB.X = C8E1685486A109E794B92572DFE09FAA857465820D0CCB9F81DFA5EEB1573247C82987596EB339A9EDF2300626B3F39D
24,791,167 UART: [art] PUB.Y = 3ECA2B2BF1063976D72D3F313C5CEA42EB11E3B2A9BF2A82E98D686141D95376EF7AC1DD95D2902446C4F6CCA12A8C21
24,798,434 UART: [art] SIG.R = B3E4287C91C692024050C5813317D493856FB7E0C3A43643E6855876D52C1E80F21045A8DEE74DB0A2EEC86FC58E6F5D
24,805,800 UART: [art] SIG.S = 01F51F732A27F517CDADC46BBE19A352BB0933CDDE91CC4E63AB325A8CDA7D3C3A6C892B824B22CAFA39C1EDB11E2E8A
25,784,433 UART: Caliptra RT
25,785,142 UART: [state] CFI Enabled
25,902,203 UART: [rt] RT listening for mailbox commands...
25,933,439 UART: [rt]cmd =0x4453424c, len=4
28,361,296 >>> mbox cmd response data (8 bytes)
30,411,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,556,972 UART:
30,557,343 UART: Running Caliptra ROM ...
30,558,390 UART:
30,558,540 UART: [state] CFI Enabled
30,573,520 UART: [state] LifecycleState = Unprovisioned
30,575,362 UART: [state] DebugLocked = No
30,577,045 UART: [state] WD Timer not started. Device not locked for debugging
30,581,654 UART: [kat] SHA2-256
30,760,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,772,436 UART: [kat] ++
30,772,893 UART: [kat] sha1
30,783,829 UART: [kat] SHA2-256
30,786,882 UART: [kat] SHA2-384
30,793,527 UART: [kat] SHA2-512-ACC
30,796,473 UART: [kat] ECC-384
33,238,613 UART: [kat] HMAC-384Kdf
33,251,216 UART: [kat] LMS
33,780,727 UART: [kat] --
33,783,692 UART: [update-reset] ++
37,211,885 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,214,520 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
37,596,603 >>> mbox cmd response: success
37,596,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,597,977 UART: [update-reset] Copying MAN_2 To MAN_1
37,620,304 UART: [update-reset Success] --
37,624,865 UART: [state] Locking Datavault
37,628,168 UART: [state] Locking PCR0, PCR1 and PCR31
37,629,810 UART: [state] Locking ICCM
37,631,502 UART: [exit] Launching FMC @ 0x40000130
37,639,897 UART:
37,640,130 UART: Running Caliptra FMC ...
37,641,180 UART:
37,641,331 UART: [state] CFI Enabled
37,686,321 UART: [art] Extend RT PCRs Done
37,687,506 UART: [art] Lock RT PCRs Done
37,688,881 UART: [art] Populate DV Done
37,694,400 UART: [fht] FMC Alias Private Key: 7
37,696,092 UART: [art] Derive CDI
37,696,833 UART: [art] Store in in slot 0x4
37,739,420 UART: [art] Derive Key Pair
37,740,419 UART: [art] Store priv key in slot 0x5
40,166,991 UART: [art] Derive Key Pair - Done
40,179,856 UART: [art] Signing Cert with AUTHO
40,181,167 UART: RITY.KEYID = 7
41,886,708 UART: [art] Erasing AUTHORITY.KEYID = 7
41,888,214 UART: [art] PUB.X = F6215E1A10107405B943B217630F36FBFD42C38712DC472F695439DDA3625F2EB7CCC1134AB271CD88D44A2396F6CD13
41,895,490 UART: [art] PUB.Y = 9C9E52A6FBFC71E6764E9E2A23F499B9F89E0E9B285DAAE6EE7D4394E147B4BB88F4E3BC87EBB8BE0858E227B4BA84E3
41,902,774 UART: [art] SIG.R = 109F0BB3DC8DC5D922F3FB5E422F7A79C695B0CBC69F7A4B6E0AF9880F832EF71349F238D52ECA65C3D91253C6CBD72F
41,910,238 UART: [art] SIG.S = 4CE0EAD45AE1E2B4058C06869F9EC143A486552FDDEB4BDF73CA234AB02A4C5007D600C821DB13F30EB75AF18022E6FE
42,888,423 UART: Caliptra RT
42,889,135 UART: [state] CFI Enabled
45,602,921 UART: [rt] RT listening for mailbox commands...
45,633,928 UART: [rt]cmd =0x494e464f, len=4
45,638,274 >>> mbox cmd response data (312 bytes)
45,640,171 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,669,986 UART: [rt]cmd =0x43455252, len=4
45,681,481 >>> mbox cmd response data (782 bytes)
45,723,240 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,754,138 UART: [rt]cmd =0x44504543, len=92
50,038,388 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,454 writing to cptra_bootfsm_go
3,700,762 ready_for_fw is high
3,701,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,276 >>> mbox cmd response: success
14,270,884 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,522,015 UART:
18,522,416 UART: Running Caliptra FMC ...
18,523,540 UART:
18,523,699 UART: [state] CFI Enabled
18,531,327 UART: [fht] FMC Alias Private Key: 7
20,288,071 UART: [art] Extend RT PCRs Done
20,289,318 UART: [art] Lock RT PCRs Done
20,290,783 UART: [art] Populate DV Done
20,296,306 UART: [fht] FMC Alias Private Key: 7
20,297,851 UART: [art] Derive CDI
20,298,675 UART: [art] Store in in slot 0x4
20,341,276 UART: [art] Derive Key Pair
20,342,325 UART: [art] Store priv key in slot 0x5
22,769,086 UART: [art] Derive Key Pair - Done
22,781,825 UART: [art] Signing Cert with AUTHO
22,783,129 UART: RITY.KEYID = 7
24,488,659 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,166 UART: [art] PUB.X = CFAC735AD1D723EBFA916FB1FB7EC2541A1B13F49B709D32AFF57C888AACE07508433827BDA87D56492CF209144BC967
24,497,442 UART: [art] PUB.Y = 10CB41A7196EACB32EF67B566919A6916815BB1CC7372DE5E8CD4EE02A6D4E533567D17A8CDC1F6D0B86718F26A8AED0
24,504,725 UART: [art] SIG.R = F503112AE8F497E039795FA12044FD1129499937F93C604C7EAD8CAB8632909485C8FBF2941DC81158906EAFA4D0B089
24,512,096 UART: [art] SIG.S = 456B84ADACA9B019C1A80514AB720F5D69AE51EAB0CA96ACB903BDA54DD32EC1555EAED5522F20421BB0B733D7807BE7
25,490,992 UART: Caliptra RT
25,491,721 UART: [state] CFI Enabled
25,608,739 UART: [rt] RT listening for mailbox commands...
25,640,046 UART: [rt]cmd =0x4453424c, len=4
28,067,979 >>> mbox cmd response data (8 bytes)
30,119,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
37,162,991 >>> mbox cmd response: success
37,163,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,194,596 UART:
37,194,889 UART: Running Caliptra FMC ...
37,196,016 UART:
37,196,188 UART: [state] CFI Enabled
37,240,225 UART: [art] Extend RT PCRs Done
37,241,480 UART: [art] Lock RT PCRs Done
37,242,670 UART: [art] Populate DV Done
37,248,156 UART: [fht] FMC Alias Private Key: 7
37,249,769 UART: [art] Derive CDI
37,250,590 UART: [art] Store in in slot 0x4
37,293,319 UART: [art] Derive Key Pair
37,294,355 UART: [art] Store priv key in slot 0x5
39,721,320 UART: [art] Derive Key Pair - Done
39,734,053 UART: [art] Signing Cert with AUTHO
39,735,366 UART: RITY.KEYID = 7
41,440,942 UART: [art] Erasing AUTHORITY.KEYID = 7
41,442,580 UART: [art] PUB.X = 411609CF7E29DC53A0D9D08F93ACBA0D688BEBA5F6EA190370EA45FE0808C5F10D39DB5C6935B5EF2EDB323DD535EA0E
41,449,745 UART: [art] PUB.Y = 15805DDDA06D50EE1896DCEAC1D46653C4FEAB0C912A0D0567B12E25811A540E1F2BEF6E6AD66FDD37CE76477B77FFA2
41,457,006 UART: [art] SIG.R = DF2AEAB52C6E8F7421887DB73A42501F76006772E41F382CC986C89388C3DC6B806F198655356B8E50AD81FBB02E5FCF
41,464,377 UART: [art] SIG.S = 601FABEB7B14EB2C23B9633AD23BE9A1737B14F67E08204ED286E1035E28586DA92B84DB8E4AD79636A2DA6B0229AA43
42,443,152 UART: Caliptra RT
42,443,891 UART: [state] CFI Enabled
45,157,720 UART: [rt] RT listening for mailbox commands...
45,188,790 UART: [rt]cmd =0x494e464f, len=4
45,192,917 >>> mbox cmd response data (312 bytes)
45,194,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,224,652 UART: [rt]cmd =0x43455252, len=4
45,235,830 >>> mbox cmd response data (783 bytes)
45,276,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,307,518 UART: [rt]cmd =0x44504543, len=92
49,593,004 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,474 UART:
192,857 UART: Running Caliptra ROM ...
194,048 UART:
194,226 UART: [state] CFI Enabled
263,871 UART: [state] LifecycleState = Unprovisioned
266,299 UART: [state] DebugLocked = No
267,978 UART: [state] WD Timer not started. Device not locked for debugging
273,163 UART: [kat] SHA2-256
463,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,765 UART: [kat] ++
474,243 UART: [kat] sha1
484,715 UART: [kat] SHA2-256
487,733 UART: [kat] SHA2-384
493,789 UART: [kat] SHA2-512-ACC
496,368 UART: [kat] ECC-384
2,949,237 UART: [kat] HMAC-384Kdf
2,971,202 UART: [kat] LMS
3,502,930 UART: [kat] --
3,504,888 UART: [cold-reset] ++
3,506,212 UART: [fht] FHT @ 0x50003400
3,518,210 UART: [idev] ++
3,518,957 UART: [idev] CDI.KEYID = 6
3,519,845 UART: [idev] SUBJECT.KEYID = 7
3,521,087 UART: [idev] UDS.KEYID = 0
3,522,014 ready_for_fw is high
3,522,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,519 UART: [idev] Erasing UDS.KEYID = 0
6,028,188 UART: [idev] Sha1 KeyId Algorithm
6,051,047 UART: [idev] --
6,056,014 UART: [ldev] ++
6,056,692 UART: [ldev] CDI.KEYID = 6
6,057,575 UART: [ldev] SUBJECT.KEYID = 5
6,058,786 UART: [ldev] AUTHORITY.KEYID = 7
6,060,019 UART: [ldev] FE.KEYID = 1
6,100,085 UART: [ldev] Erasing FE.KEYID = 1
8,605,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,663 UART: [ldev] --
10,414,586 UART: [fwproc] Wait for Commands...
10,417,051 UART: [fwproc] Recv command 0x46574c44
10,419,359 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,787 >>> mbox cmd response: success
14,597,300 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,600,408 UART: [afmc] ++
14,601,129 UART: [afmc] CDI.KEYID = 6
14,602,339 UART: [afmc] SUBJECT.KEYID = 7
14,603,784 UART: [afmc] AUTHORITY.KEYID = 5
17,131,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,505 UART: [afmc] --
18,948,395 UART: [cold-reset] --
18,951,832 UART: [state] Locking Datavault
18,958,758 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,921 UART: [state] Locking ICCM
18,963,182 UART: [exit] Launching FMC @ 0x40000130
18,971,877 UART:
18,972,104 UART: Running Caliptra FMC ...
18,973,220 UART:
18,973,381 UART: [state] CFI Enabled
19,031,248 UART: [fht] FMC Alias Private Key: 7
20,795,981 UART: [art] Extend RT PCRs Done
20,797,207 UART: [art] Lock RT PCRs Done
20,798,773 UART: [art] Populate DV Done
20,804,180 UART: [fht] FMC Alias Private Key: 7
20,805,713 UART: [art] Derive CDI
20,806,521 UART: [art] Store in in slot 0x4
20,863,903 UART: [art] Derive Key Pair
20,864,896 UART: [art] Store priv key in slot 0x5
23,327,861 UART: [art] Derive Key Pair - Done
23,340,644 UART: [art] Signing Cert with AUTHO
23,341,945 UART: RITY.KEYID = 7
25,053,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,776 UART: [art] PUB.X = 43E13D6A838DA091639FA7D8D1CD9B633DAE97562DBD8DF14CAC6B5308081BCC612E20DACED8787F8FE4B284337C4419
25,062,116 UART: [art] PUB.Y = 3ED4429EA8CE65710701A828E4A390F152DE3E7127FFB0A9CE01C87E274D72838D3E8C3EA7A4A7EEB166BF4B5D679A6D
25,069,376 UART: [art] SIG.R = 38E3EDD3B0454BFC9D74A62060A6F0F8E86B41D17D91AD63ED9BC67A0952E25D55DF5BBB2CE3D8F6D8BF7D7D251211DD
25,076,801 UART: [art] SIG.S = 8F179B1589739E48150E4DAAA2C1CC1D690617BD65DE3EF46F8ED5C4AB13BB231168DABCEB91A5AA3A3F25C4932C7DF1
26,055,430 UART: Caliptra RT
26,056,125 UART: [state] CFI Enabled
26,220,958 UART: [rt] RT listening for mailbox commands...
26,252,502 UART: [rt]cmd =0x4453424c, len=4
28,703,877 >>> mbox cmd response data (8 bytes)
30,755,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,899,914 UART:
30,900,285 UART: Running Caliptra ROM ...
30,901,351 UART:
30,901,507 UART: [state] CFI Enabled
30,962,518 UART: [state] LifecycleState = Unprovisioned
30,964,583 UART: [state] DebugLocked = No
30,966,965 UART: [state] WD Timer not started. Device not locked for debugging
30,971,456 UART: [kat] SHA2-256
31,161,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,172,065 UART: [kat] ++
31,172,524 UART: [kat] sha1
31,182,716 UART: [kat] SHA2-256
31,185,731 UART: [kat] SHA2-384
31,190,911 UART: [kat] SHA2-512-ACC
31,193,523 UART: [kat] ECC-384
33,644,749 UART: [kat] HMAC-384Kdf
33,668,438 UART: [kat] LMS
34,200,022 UART: [kat] --
34,203,440 UART: [update-reset] ++
37,662,222 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,666,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
38,272,392 >>> mbox cmd response: success
38,272,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,274,179 UART: [update-reset] Copying MAN_2 To MAN_1
38,311,724 UART: [update-reset Success] --
38,316,802 UART: [state] Locking Datavault
38,320,455 UART: [state] Locking PCR0, PCR1 and PCR31
38,322,617 UART: [state] Locking ICCM
38,325,397 UART: [exit] Launching FMC @ 0x40000130
38,334,071 UART:
38,334,302 UART: Running Caliptra FMC ...
38,335,323 UART:
38,335,468 UART: [state] CFI Enabled
38,435,979 UART: [art] Extend RT PCRs Done
38,437,178 UART: [art] Lock RT PCRs Done
38,438,825 UART: [art] Populate DV Done
38,444,497 UART: [fht] FMC Alias Private Key: 7
38,445,982 UART: [art] Derive CDI
38,446,715 UART: [art] Store in in slot 0x4
38,504,860 UART: [art] Derive Key Pair
38,505,898 UART: [art] Store priv key in slot 0x5
40,968,484 UART: [art] Derive Key Pair - Done
40,981,276 UART: [art] Signing Cert with AUTHO
40,982,588 UART: RITY.KEYID = 7
42,694,930 UART: [art] Erasing AUTHORITY.KEYID = 7
42,696,425 UART: [art] PUB.X = B62A92853D16FAF491C7F72FB5BC632FBB76573EA56298BC8D6B5A2F3C6C6174003A1249844AA4E0FC9A383FABB41689
42,703,688 UART: [art] PUB.Y = 64597D29B3E8C7C3FC72D6991B60F743DACB632E3424DB82FDEF0FDD259AFFCEA55F5BE8EC75F11DE931C40A5F6646B9
42,711,001 UART: [art] SIG.R = F556DA9F5566CE1E1B1C8F142564D40A55BBC542CFACB161FA782FDEB98580E8DC81D037B848D46A5376DF35AAEB90D5
42,718,403 UART: [art] SIG.S = F96AC56E560967554B60A96259F3F10CE5AF58ED45C05EAEA2113CDF75F392099140B21DC631E88153AF845D1B4C422B
43,697,697 UART: Caliptra RT
43,698,404 UART: [state] CFI Enabled
46,476,935 UART: [rt] RT listening for mailbox commands...
46,508,103 UART: [rt]cmd =0x494e464f, len=4
46,512,274 >>> mbox cmd response data (312 bytes)
46,514,163 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,543,960 UART: [rt]cmd =0x43455252, len=4
46,555,425 >>> mbox cmd response data (784 bytes)
46,596,560 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,627,219 UART: [rt]cmd =0x44504543, len=92
50,986,352 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,440,401 ready_for_fw is high
3,440,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,146 >>> mbox cmd response: success
14,727,988 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,000,480 UART:
19,000,868 UART: Running Caliptra FMC ...
19,002,017 UART:
19,002,181 UART: [state] CFI Enabled
19,072,162 UART: [fht] FMC Alias Private Key: 7
20,835,860 UART: [art] Extend RT PCRs Done
20,837,083 UART: [art] Lock RT PCRs Done
20,838,818 UART: [art] Populate DV Done
20,844,018 UART: [fht] FMC Alias Private Key: 7
20,845,676 UART: [art] Derive CDI
20,846,486 UART: [art] Store in in slot 0x4
20,904,594 UART: [art] Derive Key Pair
20,905,662 UART: [art] Store priv key in slot 0x5
23,368,095 UART: [art] Derive Key Pair - Done
23,381,061 UART: [art] Signing Cert with AUTHO
23,382,371 UART: RITY.KEYID = 7
25,093,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,311 UART: [art] PUB.X = 07F7AEAC3187E252ADD98A776EFAF7446AEC73C4E99836E7EC31C2875B342BAD03053B21AA71D1A403ABC3DF7B83B951
25,102,633 UART: [art] PUB.Y = 544AF44EE24703D8924F404642C08BF7CD1CC977EF1AE6A48D4500296B5E8C85FD53A8676E9E11A5A2E4D80CE2434DE3
25,109,843 UART: [art] SIG.R = 1BC9EB6B8F2550DB9AEFB74B084C66DD8D3C6C44E6CE99F9F43DEE4649437E0159D2C6ACEA2DB945BFCBD208BF3C6944
25,117,272 UART: [art] SIG.S = 408E6CF499624E212F75B8880D55CD686D6898000BB32F6F4F684C2FC3A84A8EDC9E7A09449DD6BA3C35ABE8AB247F50
26,095,883 UART: Caliptra RT
26,096,574 UART: [state] CFI Enabled
26,263,662 UART: [rt] RT listening for mailbox commands...
26,295,082 UART: [rt]cmd =0x4453424c, len=4
28,764,493 >>> mbox cmd response data (8 bytes)
30,814,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,622,861 >>> mbox cmd response: success
38,623,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,658,379 UART:
38,658,712 UART: Running Caliptra FMC ...
38,659,841 UART:
38,660,002 UART: [state] CFI Enabled
38,752,205 UART: [art] Extend RT PCRs Done
38,753,393 UART: [art] Lock RT PCRs Done
38,754,692 UART: [art] Populate DV Done
38,760,000 UART: [fht] FMC Alias Private Key: 7
38,761,646 UART: [art] Derive CDI
38,762,461 UART: [art] Store in in slot 0x4
38,821,315 UART: [art] Derive Key Pair
38,822,356 UART: [art] Store priv key in slot 0x5
41,285,032 UART: [art] Derive Key Pair - Done
41,298,075 UART: [art] Signing Cert with AUTHO
41,299,391 UART: RITY.KEYID = 7
43,010,373 UART: [art] Erasing AUTHORITY.KEYID = 7
43,011,895 UART: [art] PUB.X = 07737DCA8037787D33A5CAD98E0067DF224AB19F23D30F9A1278546F443AD69717E4055E98D06E39F23BA5AB3330C48D
43,019,066 UART: [art] PUB.Y = 2AD69866015235CB3982FDF7DCBD36865F20B804AF33FC0CA6AFBA8B391E2A0418D17ED758AFA5B5839BC95C3E23911B
43,026,338 UART: [art] SIG.R = D6753E3B1EE19B1DF7C7AC48A314145C4165F33A2820190D0C66E75BAB224F54EBF91751F002217CB5F36F59099756D3
43,033,723 UART: [art] SIG.S = A42D0545D33D895B2EE1D9D7CA51557833086BB9A3D5ED1E5CDEA26640A55223488E16ACDE3325818ECCC81E589573BA
44,012,499 UART: Caliptra RT
44,013,218 UART: [state] CFI Enabled
46,799,988 UART: [rt] RT listening for mailbox commands...
46,830,937 UART: [rt]cmd =0x494e464f, len=4
46,835,145 >>> mbox cmd response data (312 bytes)
46,836,980 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,866,933 UART: [rt]cmd =0x43455252, len=4
46,878,393 >>> mbox cmd response data (784 bytes)
46,919,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,950,396 UART: [rt]cmd =0x44504543, len=92
51,300,106 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
192,866 UART:
193,245 UART: Running Caliptra ROM ...
194,354 UART:
604,020 UART: [state] CFI Enabled
617,830 UART: [state] LifecycleState = Unprovisioned
620,204 UART: [state] DebugLocked = No
621,742 UART: [state] WD Timer not started. Device not locked for debugging
626,003 UART: [kat] SHA2-256
815,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,596 UART: [kat] ++
827,211 UART: [kat] sha1
840,365 UART: [kat] SHA2-256
843,377 UART: [kat] SHA2-384
850,077 UART: [kat] SHA2-512-ACC
852,680 UART: [kat] ECC-384
3,297,757 UART: [kat] HMAC-384Kdf
3,310,836 UART: [kat] LMS
3,842,687 UART: [kat] --
3,844,481 UART: [cold-reset] ++
3,845,784 UART: [fht] FHT @ 0x50003400
3,855,676 UART: [idev] ++
3,856,332 UART: [idev] CDI.KEYID = 6
3,857,367 UART: [idev] SUBJECT.KEYID = 7
3,858,474 UART: [idev] UDS.KEYID = 0
3,859,407 ready_for_fw is high
3,859,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,817 UART: [idev] Erasing UDS.KEYID = 0
6,334,715 UART: [idev] Sha1 KeyId Algorithm
6,358,007 UART: [idev] --
6,364,333 UART: [ldev] ++
6,365,034 UART: [ldev] CDI.KEYID = 6
6,365,951 UART: [ldev] SUBJECT.KEYID = 5
6,367,109 UART: [ldev] AUTHORITY.KEYID = 7
6,368,339 UART: [ldev] FE.KEYID = 1
6,379,087 UART: [ldev] Erasing FE.KEYID = 1
8,861,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,606 UART: [ldev] --
10,651,718 UART: [fwproc] Wait for Commands...
10,653,531 UART: [fwproc] Recv command 0x46574c44
10,655,847 UART: [fwproc] Recv'd Img size: 114084 bytes
14,103,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,840,312 >>> mbox cmd response: success
14,840,809 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,844,663 UART: [afmc] ++
14,845,365 UART: [afmc] CDI.KEYID = 6
14,846,529 UART: [afmc] SUBJECT.KEYID = 7
14,848,025 UART: [afmc] AUTHORITY.KEYID = 5
17,350,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,175 UART: [afmc] --
19,146,223 UART: [cold-reset] --
19,149,984 UART: [state] Locking Datavault
19,154,994 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,145 UART: [state] Locking ICCM
19,158,545 UART: [exit] Launching FMC @ 0x40000130
19,167,168 UART:
19,167,414 UART: Running Caliptra FMC ...
19,168,522 UART:
19,168,683 UART: [state] CFI Enabled
19,176,917 UART: [fht] FMC Alias Private Key: 7
20,933,952 UART: [art] Extend RT PCRs Done
20,935,173 UART: [art] Lock RT PCRs Done
20,936,937 UART: [art] Populate DV Done
20,942,612 UART: [fht] FMC Alias Private Key: 7
20,944,149 UART: [art] Derive CDI
20,944,880 UART: [art] Store in in slot 0x4
20,987,414 UART: [art] Derive Key Pair
20,988,452 UART: [art] Store priv key in slot 0x5
23,415,552 UART: [art] Derive Key Pair - Done
23,428,503 UART: [art] Signing Cert with AUTHO
23,429,812 UART: RITY.KEYID = 7
25,135,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,827 UART: [art] PUB.X = BF98E604FFD89547E06A817F81A2967D6ADCE3DAA72CB7BD7762BEA348B00810BA48443EB660C8F5500D065BB7AC7060
25,144,110 UART: [art] PUB.Y = CF89C252378DC106EBE77E384C0303F3CCD22634F44765BB04B5C71826F0D07135605B2645660550EA44C752E3366E1B
25,151,365 UART: [art] SIG.R = 753DC9F599141715AEDC437B9AA0373A0D515EACB6E22677E871973AC68502C3FFDDBF4767F5D7AF5A6FAD8DA9C11BE2
25,158,778 UART: [art] SIG.S = 0F9DCCF73D816A8465A2F77AF987EBF612ED91F1F564852BBB805EF4BC087BBF1CA9D5F32F6A5BA839DAB51541FB5DA7
26,137,486 UART: Caliptra RT
26,138,195 UART: [state] CFI Enabled
26,254,928 UART: [rt] RT listening for mailbox commands...
26,286,448 UART: [rt]cmd =0x4453424c, len=4
28,714,525 >>> mbox cmd response data (8 bytes)
30,767,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,912,066 UART:
30,912,449 UART: Running Caliptra ROM ...
30,913,534 UART:
30,913,694 UART: [state] CFI Enabled
30,926,131 UART: [state] LifecycleState = Unprovisioned
30,928,030 UART: [state] DebugLocked = No
30,930,770 UART: [state] WD Timer not started. Device not locked for debugging
30,934,710 UART: [kat] SHA2-256
31,124,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,135,388 UART: [kat] ++
31,135,921 UART: [kat] sha1
31,146,806 UART: [kat] SHA2-256
31,149,775 UART: [kat] SHA2-384
31,155,195 UART: [kat] SHA2-512-ACC
31,157,770 UART: [kat] ECC-384
33,599,579 UART: [kat] HMAC-384Kdf
33,612,244 UART: [kat] LMS
34,143,868 UART: [kat] --
34,145,986 UART: [update-reset] ++
37,605,657 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,609,319 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
38,215,389 >>> mbox cmd response: success
38,215,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,216,594 UART: [update-reset] Copying MAN_2 To MAN_1
38,254,130 UART: [update-reset Success] --
38,259,060 UART: [state] Locking Datavault
38,261,574 UART: [state] Locking PCR0, PCR1 and PCR31
38,263,724 UART: [state] Locking ICCM
38,266,635 UART: [exit] Launching FMC @ 0x40000130
38,275,290 UART:
38,275,534 UART: Running Caliptra FMC ...
38,276,641 UART:
38,276,804 UART: [state] CFI Enabled
38,321,248 UART: [art] Extend RT PCRs Done
38,322,392 UART: [art] Lock RT PCRs Done
38,323,787 UART: [art] Populate DV Done
38,329,520 UART: [fht] FMC Alias Private Key: 7
38,331,262 UART: [art] Derive CDI
38,332,084 UART: [art] Store in in slot 0x4
38,374,899 UART: [art] Derive Key Pair
38,375,899 UART: [art] Store priv key in slot 0x5
40,803,232 UART: [art] Derive Key Pair - Done
40,815,796 UART: [art] Signing Cert with AUTHO
40,817,136 UART: RITY.KEYID = 7
42,522,525 UART: [art] Erasing AUTHORITY.KEYID = 7
42,524,051 UART: [art] PUB.X = 8E5A8E5DF2117011FCBB2D88041B9B72978A0E22575432445D50C2E04899DF1F8B7D7AF5AACC1D1518F2C9D7549EC7ED
42,531,275 UART: [art] PUB.Y = FCE3B39D8C461A7A3BA9BB2C80DA12257E3A0F8F4A7683AFC4A003B4C1DE15BC461D0C296D2A85865CCC55EABFBB7C3F
42,538,586 UART: [art] SIG.R = 8CE3008081B7F7EAF1C14986B27EED533A4FBB65C543B754F22358A135B281C040D4E5F7A409EC843F74F99255ECDD45
42,545,948 UART: [art] SIG.S = 3A01D852C666616C694B6D6156615A9FB91862056DBAF2260D12CA8AA01536F4606D5FF12A3C04FB5C84B8FBA40A1836
43,524,679 UART: Caliptra RT
43,525,367 UART: [state] CFI Enabled
46,241,122 UART: [rt] RT listening for mailbox commands...
46,272,124 UART: [rt]cmd =0x494e464f, len=4
46,276,282 >>> mbox cmd response data (312 bytes)
46,278,243 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,308,329 UART: [rt]cmd =0x43455252, len=4
46,319,736 >>> mbox cmd response data (783 bytes)
46,361,227 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,391,951 UART: [rt]cmd =0x44504543, len=92
50,676,677 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
3,754,647 ready_for_fw is high
3,755,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,026 >>> mbox cmd response: success
14,946,735 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,198,058 UART:
19,198,460 UART: Running Caliptra FMC ...
19,199,662 UART:
19,199,831 UART: [state] CFI Enabled
19,207,998 UART: [fht] FMC Alias Private Key: 7
20,965,231 UART: [art] Extend RT PCRs Done
20,966,457 UART: [art] Lock RT PCRs Done
20,967,980 UART: [art] Populate DV Done
20,973,354 UART: [fht] FMC Alias Private Key: 7
20,974,971 UART: [art] Derive CDI
20,975,798 UART: [art] Store in in slot 0x4
21,018,133 UART: [art] Derive Key Pair
21,019,141 UART: [art] Store priv key in slot 0x5
23,445,582 UART: [art] Derive Key Pair - Done
23,458,597 UART: [art] Signing Cert with AUTHO
23,459,907 UART: RITY.KEYID = 7
25,165,494 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,000 UART: [art] PUB.X = E969FF0DB26697ED02D9A92F0B853CC7B5DB55957B048F3076904B36DA01BFF297FA1F4556F434CEA47B5F5F6DC32222
25,174,298 UART: [art] PUB.Y = 52A2536E418F25B4388CA4E65617240A23EA9F9ACAD4998A25FBE8C870D948660B9B2F2B32A99493DC7781F9EEE328FE
25,181,537 UART: [art] SIG.R = BCE383870BDD4360810E444DC9124782083FFD21D61548D3818F3AA012470449BBA84E25F30040A0F2981B4DC16936A5
25,188,901 UART: [art] SIG.S = EC4CA775BE496D536A2DC7B9573FAAC90423F19E09F666D5E2E5F343E188F72FBF59C8C2F10AFDC5172C59CDF747A7D1
26,167,545 UART: Caliptra RT
26,168,263 UART: [state] CFI Enabled
26,285,227 UART: [rt] RT listening for mailbox commands...
26,316,800 UART: [rt]cmd =0x4453424c, len=4
28,744,842 >>> mbox cmd response data (8 bytes)
30,796,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
38,517,749 >>> mbox cmd response: success
38,518,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,552,477 UART:
38,552,806 UART: Running Caliptra FMC ...
38,553,846 UART:
38,553,994 UART: [state] CFI Enabled
38,598,239 UART: [art] Extend RT PCRs Done
38,599,391 UART: [art] Lock RT PCRs Done
38,600,925 UART: [art] Populate DV Done
38,606,249 UART: [fht] FMC Alias Private Key: 7
38,607,849 UART: [art] Derive CDI
38,608,587 UART: [art] Store in in slot 0x4
38,651,203 UART: [art] Derive Key Pair
38,652,273 UART: [art] Store priv key in slot 0x5
41,079,064 UART: [art] Derive Key Pair - Done
41,092,064 UART: [art] Signing Cert with AUTHO
41,093,375 UART: RITY.KEYID = 7
42,798,668 UART: [art] Erasing AUTHORITY.KEYID = 7
42,800,171 UART: [art] PUB.X = 917022BA56AA21AEFE2D0AA0B312268EE4A5685EA9C5A0125E42D94738E1E1ACCCB971A76F4E3F28B41A946269A90AEC
42,807,469 UART: [art] PUB.Y = 00CFE9ED9DE077F879F17E74E881D63C5CC90B52543FD5A8666BC051F06038BF7825B6C60765BBD7F1793AD4B8EA8EBF
42,814,695 UART: [art] SIG.R = 5A960646E0816564F6C59DFE467B5DE10F444C94615C9739BA3843AF315239A152B0AF50995441E6FEB9582361551697
42,822,084 UART: [art] SIG.S = 928713B8B2B3DD027A1C3AA1054F73F7569EE0F41C137C23FDA57703C2D8D5DDBD00FBC489A81D408775EFC01708B89B
43,801,177 UART: Caliptra RT
43,801,895 UART: [state] CFI Enabled
46,515,229 UART: [rt] RT listening for mailbox commands...
46,546,254 UART: [rt]cmd =0x494e464f, len=4
46,550,462 >>> mbox cmd response data (312 bytes)
46,552,326 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,582,153 UART: [rt]cmd =0x43455252, len=4
46,593,401 >>> mbox cmd response data (783 bytes)
46,634,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,665,565 UART: [rt]cmd =0x44504543, len=92
50,950,709 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,893 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 ready_for_fw is high
1,480,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,240 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,542 UART: [idev] --
1,514,517 UART: [ldev] ++
1,514,685 UART: [ldev] CDI.KEYID = 6
1,515,048 UART: [ldev] SUBJECT.KEYID = 5
1,515,474 UART: [ldev] AUTHORITY.KEYID = 7
1,515,937 UART: [ldev] FE.KEYID = 1
1,521,015 UART: [ldev] Erasing FE.KEYID = 1
1,546,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,480 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,742 UART: [fwproc] Received command 0x46574c44
1,587,533 UART: [fwproc] Received Image of size 114084 bytes
2,882,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,405 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,124 >>> mbox cmd response: success
3,075,124 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,076,188 UART: [afmc] ++
3,076,356 UART: [afmc] CDI.KEYID = 6
3,076,718 UART: [afmc] SUBJECT.KEYID = 7
3,077,143 UART: [afmc] AUTHORITY.KEYID = 5
3,111,976 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,050 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,830 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,443 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,133 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,110 UART: [afmc] --
3,155,172 UART: [cold-reset] --
3,156,108 UART: [state] Locking Datavault
3,157,373 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,977 UART: [state] Locking ICCM
3,158,515 UART: [exit] Launching FMC @ 0x40000130
3,163,844 UART:
3,163,860 UART: Running Caliptra FMC ...
3,164,268 UART:
3,164,322 UART: [state] CFI Enabled
3,174,791 UART: [fht] FMC Alias Private Key: 7
3,282,714 UART: [art] Extend RT PCRs Done
3,283,142 UART: [art] Lock RT PCRs Done
3,284,910 UART: [art] Populate DV Done
3,293,141 UART: [fht] FMC Alias Private Key: 7
3,294,129 UART: [art] Derive CDI
3,294,409 UART: [art] Store in in slot 0x4
3,379,698 UART: [art] Derive Key Pair
3,380,058 UART: [art] Store priv key in slot 0x5
3,393,464 UART: [art] Derive Key Pair - Done
3,408,352 UART: [art] Signing Cert with AUTHO
3,408,832 UART: RITY.KEYID = 7
3,424,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,767 UART: [art] PUB.X = B06154220EA50A414EB0449E668C862FC59BEB0DD225AA3C87BCC874E1373D21F64B027521FAC889FA9AB518C5D93581
3,431,531 UART: [art] PUB.Y = 7445231204EB8E64D26D7F2D262A018B29C5AE7F9B3B89D502AF51A10860F799616402DB30F32DBC43924C94F552C739
3,438,462 UART: [art] SIG.R = 6ABE83A5256890B7FF89EDA0D659C1FCBF9A1F200FC2C5339DE3E796E08B2E09CF94DB361F372CD0D2CBF287766FEC65
3,445,246 UART: [art] SIG.S = DE7BE60E6665425EA4CE801A3E9FD2D1DD47C434C03AA8D34DCD6CF907AF4061D842846F9CB84C1620DF12F8E43371AB
3,469,215 UART: Caliptra RT
3,469,468 UART: [state] CFI Enabled
3,577,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,857 UART: [rt]cmd =0x4453424c, len=4
3,621,752 >>> mbox cmd response data (8 bytes)
3,621,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,851 UART:
3,622,867 UART: Running Caliptra ROM ...
3,623,275 UART:
3,623,329 UART: [state] CFI Enabled
3,626,225 UART: [state] LifecycleState = Unprovisioned
3,626,880 UART: [state] DebugLocked = No
3,627,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,629,223 UART: [kat] SHA2-256
4,423,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,427,269 UART: [kat] ++
4,427,421 UART: [kat] sha1
4,431,537 UART: [kat] SHA2-256
4,433,475 UART: [kat] SHA2-384
4,436,162 UART: [kat] SHA2-512-ACC
4,438,062 UART: [kat] ECC-384
4,443,959 UART: [kat] HMAC-384Kdf
4,448,619 UART: [kat] LMS
5,016,815 UART: [kat] --
5,017,702 UART: [update-reset] ++
6,348,398 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,349,600 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,499,104 >>> mbox cmd response: success
6,499,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,499,251 UART: [update-reset] Copying MAN_2 To MAN_1
6,507,265 UART: [update-reset Success] --
6,508,240 UART: [state] Locking Datavault
6,509,138 UART: [state] Locking PCR0, PCR1 and PCR31
6,509,742 UART: [state] Locking ICCM
6,510,326 UART: [exit] Launching FMC @ 0x40000130
6,515,655 UART:
6,515,671 UART: Running Caliptra FMC ...
6,516,079 UART:
6,516,133 UART: [state] CFI Enabled
6,604,962 UART: [art] Extend RT PCRs Done
6,605,390 UART: [art] Lock RT PCRs Done
6,606,613 UART: [art] Populate DV Done
6,614,956 UART: [fht] FMC Alias Private Key: 7
6,615,966 UART: [art] Derive CDI
6,616,246 UART: [art] Store in in slot 0x4
6,701,423 UART: [art] Derive Key Pair
6,701,783 UART: [art] Store priv key in slot 0x5
6,715,013 UART: [art] Derive Key Pair - Done
6,729,700 UART: [art] Signing Cert with AUTHO
6,730,180 UART: RITY.KEYID = 7
6,745,302 UART: [art] Erasing AUTHORITY.KEYID = 7
6,746,067 UART: [art] PUB.X = 194C58FA6B50222A5FBCBF7F73214B7D972F114E78A631338722C3EA59DBB32DADF1DF3BD44BD1463C6EF23C66198A9B
6,752,851 UART: [art] PUB.Y = 9F8ADDBF9A1B6FA3E06C89F454CCCF773BCE6F506250BE0F1E020344B0B82B20756EEB88F0BA2902537630035FBF68F7
6,759,800 UART: [art] SIG.R = F5C7129E5B5E05E9916F34782DA1E6BEDD3AA37896C1F3137371A21467581D6E86FA1B1487DCC3EEAD67C51BC51F373A
6,766,577 UART: [art] SIG.S = 26A373D9187CFDF2C4F2240C64A6DB96C917EEF6933483EF731BDC68C83683B129D8F9E3791E3F4A849F1F7F841BD11C
6,790,255 UART: Caliptra RT
6,790,508 UART: [state] CFI Enabled
7,082,129 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,112,258 UART: [rt]cmd =0x494e464f, len=4
7,115,931 >>> mbox cmd response data (312 bytes)
7,115,932 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,145,289 UART: [rt]cmd =0x43455252, len=4
7,156,107 >>> mbox cmd response data (783 bytes)
7,156,108 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,185,991 UART: [rt]cmd =0x44504543, len=92
7,368,646 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,077 ready_for_fw is high
1,363,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,820 >>> mbox cmd response: success
2,924,820 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,986,392 UART:
2,986,408 UART: Running Caliptra FMC ...
2,986,816 UART:
2,986,870 UART: [state] CFI Enabled
2,997,057 UART: [fht] FMC Alias Private Key: 7
3,104,644 UART: [art] Extend RT PCRs Done
3,105,072 UART: [art] Lock RT PCRs Done
3,106,664 UART: [art] Populate DV Done
3,115,083 UART: [fht] FMC Alias Private Key: 7
3,116,169 UART: [art] Derive CDI
3,116,449 UART: [art] Store in in slot 0x4
3,202,004 UART: [art] Derive Key Pair
3,202,364 UART: [art] Store priv key in slot 0x5
3,215,474 UART: [art] Derive Key Pair - Done
3,230,013 UART: [art] Signing Cert with AUTHO
3,230,493 UART: RITY.KEYID = 7
3,245,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,716 UART: [art] PUB.X = 2FDF9688C8E3C699B3F85B7CBB5F1551767A2D6A58E12211D773E47764CBF64619748E48D2F0990353DEF37D098EBB9A
3,253,484 UART: [art] PUB.Y = D8D202BCA44FEC2FD4325EA4D1F991CDC3DDEF5D8A39A939408E990FD960F131E31EC7FD22BB7F012C58C9D0410AD0E8
3,260,444 UART: [art] SIG.R = C3CA7965471BCE70A947C9EFA25BA6C362C8AAF899A1BCC1A0ADBB4DD7D86D89E0E2D641BBEF08C0346C80EF59396126
3,267,233 UART: [art] SIG.S = 6D80DC59B48B65DA9624A62853BFCFEEAD3006B1B8B950B01A7506C24F666502C5C5E82434B15FEFBCF3F018B163ACAF
3,291,151 UART: Caliptra RT
3,291,404 UART: [state] CFI Enabled
3,400,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,015 UART: [rt]cmd =0x4453424c, len=4
3,444,932 >>> mbox cmd response data (8 bytes)
3,444,933 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,746 >>> mbox cmd response: success
6,204,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,218,067 UART:
6,218,083 UART: Running Caliptra FMC ...
6,218,491 UART:
6,218,545 UART: [state] CFI Enabled
6,307,372 UART: [art] Extend RT PCRs Done
6,307,800 UART: [art] Lock RT PCRs Done
6,309,249 UART: [art] Populate DV Done
6,317,476 UART: [fht] FMC Alias Private Key: 7
6,318,438 UART: [art] Derive CDI
6,318,718 UART: [art] Store in in slot 0x4
6,404,155 UART: [art] Derive Key Pair
6,404,515 UART: [art] Store priv key in slot 0x5
6,418,281 UART: [art] Derive Key Pair - Done
6,433,188 UART: [art] Signing Cert with AUTHO
6,433,668 UART: RITY.KEYID = 7
6,449,164 UART: [art] Erasing AUTHORITY.KEYID = 7
6,449,929 UART: [art] PUB.X = 27C40A73DCB336646D183049409B5082FE00D884C66EA972A85EA974F9ABDFD37F2862E52EDE90382C0B1237D502BF4C
6,456,672 UART: [art] PUB.Y = 940B61D953658DCE6931059A8A6AE8FDA23B61C53DEA9C26F8856569D0D35878F95A4B2CF75778685E8858851958A24D
6,463,612 UART: [art] SIG.R = C828A0F11DB79A9AB01F979AA765613D4A3DBCB7C36B48E7F046C902379E096FBFC46B041B4D1066D9BA2566404CC73D
6,470,383 UART: [art] SIG.S = D03BBE8137D79C11519745CA65F8953EE57CDB4BB68A9F1948E96C4B23B0F70587CBA073FE1AE75706DF5241E961F126
6,494,728 UART: Caliptra RT
6,494,981 UART: [state] CFI Enabled
6,794,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,824,814 UART: [rt]cmd =0x494e464f, len=4
6,828,537 >>> mbox cmd response data (312 bytes)
6,828,538 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,857,833 UART: [rt]cmd =0x43455252, len=4
6,868,588 >>> mbox cmd response data (784 bytes)
6,868,589 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,898,422 UART: [rt]cmd =0x44504543, len=92
7,082,084 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,626 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
902,603 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,030 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,291 UART: [idev] ++
1,479,459 UART: [idev] CDI.KEYID = 6
1,479,819 UART: [idev] SUBJECT.KEYID = 7
1,480,243 UART: [idev] UDS.KEYID = 0
1,480,588 ready_for_fw is high
1,480,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,351 UART: [idev] Erasing UDS.KEYID = 0
1,504,913 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,481 UART: [idev] --
1,514,364 UART: [ldev] ++
1,514,532 UART: [ldev] CDI.KEYID = 6
1,514,895 UART: [ldev] SUBJECT.KEYID = 5
1,515,321 UART: [ldev] AUTHORITY.KEYID = 7
1,515,784 UART: [ldev] FE.KEYID = 1
1,521,096 UART: [ldev] Erasing FE.KEYID = 1
1,546,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,077 UART: [ldev] --
1,585,504 UART: [fwproc] Waiting for Commands...
1,586,333 UART: [fwproc] Received command 0x46574c44
1,587,124 UART: [fwproc] Received Image of size 114084 bytes
2,882,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,098 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,909 >>> mbox cmd response: success
3,074,909 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,076,041 UART: [afmc] ++
3,076,209 UART: [afmc] CDI.KEYID = 6
3,076,571 UART: [afmc] SUBJECT.KEYID = 7
3,076,996 UART: [afmc] AUTHORITY.KEYID = 5
3,112,053 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,512 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,202 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,117 UART: [afmc] --
3,155,161 UART: [cold-reset] --
3,156,043 UART: [state] Locking Datavault
3,157,024 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,628 UART: [state] Locking ICCM
3,158,232 UART: [exit] Launching FMC @ 0x40000130
3,163,561 UART:
3,163,577 UART: Running Caliptra FMC ...
3,163,985 UART:
3,164,128 UART: [state] CFI Enabled
3,174,849 UART: [fht] FMC Alias Private Key: 7
3,282,492 UART: [art] Extend RT PCRs Done
3,282,920 UART: [art] Lock RT PCRs Done
3,284,826 UART: [art] Populate DV Done
3,292,877 UART: [fht] FMC Alias Private Key: 7
3,293,913 UART: [art] Derive CDI
3,294,193 UART: [art] Store in in slot 0x4
3,379,560 UART: [art] Derive Key Pair
3,379,920 UART: [art] Store priv key in slot 0x5
3,393,584 UART: [art] Derive Key Pair - Done
3,408,555 UART: [art] Signing Cert with AUTHO
3,409,035 UART: RITY.KEYID = 7
3,423,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,754 UART: [art] PUB.X = 54D3B3D059EEFAE5B92867BD5743325571503C74F697AAFF8E36449A804A0AA1AA4AFA0FC5B127FAA85A16E790FB55F0
3,431,532 UART: [art] PUB.Y = 5F9B386196D5F04A17614D08855788A424F8E7C1C811B8C2A0110A268F3F9AF330311439749489D6B8D837B5AF853F08
3,438,463 UART: [art] SIG.R = 934482BD337D325DFC192E0E163A533B4E7BE859EEF56BBC5FB759D91DFAEB87E88BF7CFAEB051F8A9EBB4CA7CAEEE0B
3,445,261 UART: [art] SIG.S = AE560A3944459E2D23FBB396BBD3514E16F18B6BFABFD6842B80C090E4C389B3DD7EDB57065B1FE82528EABCE6D53930
3,468,352 UART: Caliptra RT
3,468,697 UART: [state] CFI Enabled
3,576,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,901 UART: [rt]cmd =0x4453424c, len=4
3,621,012 >>> mbox cmd response data (8 bytes)
3,621,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,037 UART:
3,622,053 UART: Running Caliptra ROM ...
3,622,461 UART:
3,622,602 UART: [state] CFI Enabled
3,625,418 UART: [state] LifecycleState = Unprovisioned
3,626,073 UART: [state] DebugLocked = No
3,626,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,628,382 UART: [kat] SHA2-256
4,422,313 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,426,428 UART: [kat] ++
4,426,580 UART: [kat] sha1
4,431,002 UART: [kat] SHA2-256
4,432,940 UART: [kat] SHA2-384
4,435,597 UART: [kat] SHA2-512-ACC
4,437,497 UART: [kat] ECC-384
4,443,218 UART: [kat] HMAC-384Kdf
4,447,868 UART: [kat] LMS
5,016,064 UART: [kat] --
5,016,891 UART: [update-reset] ++
6,348,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,349,213 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,498,717 >>> mbox cmd response: success
6,498,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,498,852 UART: [update-reset] Copying MAN_2 To MAN_1
6,506,866 UART: [update-reset Success] --
6,508,041 UART: [state] Locking Datavault
6,508,861 UART: [state] Locking PCR0, PCR1 and PCR31
6,509,465 UART: [state] Locking ICCM
6,509,993 UART: [exit] Launching FMC @ 0x40000130
6,515,322 UART:
6,515,338 UART: Running Caliptra FMC ...
6,515,746 UART:
6,515,889 UART: [state] CFI Enabled
6,605,472 UART: [art] Extend RT PCRs Done
6,605,900 UART: [art] Lock RT PCRs Done
6,607,007 UART: [art] Populate DV Done
6,615,236 UART: [fht] FMC Alias Private Key: 7
6,616,246 UART: [art] Derive CDI
6,616,526 UART: [art] Store in in slot 0x4
6,702,019 UART: [art] Derive Key Pair
6,702,379 UART: [art] Store priv key in slot 0x5
6,715,221 UART: [art] Derive Key Pair - Done
6,729,895 UART: [art] Signing Cert with AUTHO
6,730,375 UART: RITY.KEYID = 7
6,745,403 UART: [art] Erasing AUTHORITY.KEYID = 7
6,746,168 UART: [art] PUB.X = 458610178784F565778CB785A7FC291B42E1E95C0616D314F5E7ECF51C5755C35792291BB8D5B74E890DF2672E136ED3
6,752,926 UART: [art] PUB.Y = 0775A169CB972C0B6DFD6681FE4D9FDAAB521DB9E28FA0791D86AC34F09013AB2E0FE12865F3A94175B01BB28D728377
6,759,877 UART: [art] SIG.R = 3FFF338A342D4D9E394CE3AD14DD102B62F077AF05ED1DFB6F51E26D2CC49E7CCBAAC2A09C8B88279A4C25D8BDA6ACCA
6,766,676 UART: [art] SIG.S = 5BFD72734DDD65FA99EB59520DCDC1761FA4F29AE5EA4E085099350F06E081F4123F6D3EFAAE9B7C8796B7531F4E3783
6,791,011 UART: Caliptra RT
6,791,356 UART: [state] CFI Enabled
7,087,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,117,379 UART: [rt]cmd =0x494e464f, len=4
7,121,310 >>> mbox cmd response data (312 bytes)
7,121,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,150,692 UART: [rt]cmd =0x43455252, len=4
7,161,480 >>> mbox cmd response data (782 bytes)
7,161,481 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,191,444 UART: [rt]cmd =0x44504543, len=92
7,375,279 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,658 ready_for_fw is high
1,362,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,845 >>> mbox cmd response: success
2,924,845 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,986,701 UART:
2,986,717 UART: Running Caliptra FMC ...
2,987,125 UART:
2,987,268 UART: [state] CFI Enabled
2,997,739 UART: [fht] FMC Alias Private Key: 7
3,105,508 UART: [art] Extend RT PCRs Done
3,105,936 UART: [art] Lock RT PCRs Done
3,107,448 UART: [art] Populate DV Done
3,115,875 UART: [fht] FMC Alias Private Key: 7
3,116,803 UART: [art] Derive CDI
3,117,083 UART: [art] Store in in slot 0x4
3,203,022 UART: [art] Derive Key Pair
3,203,382 UART: [art] Store priv key in slot 0x5
3,216,496 UART: [art] Derive Key Pair - Done
3,231,090 UART: [art] Signing Cert with AUTHO
3,231,570 UART: RITY.KEYID = 7
3,246,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,519 UART: [art] PUB.X = 59CDE6BE8C1CBF3A5B80FC07E9C797FE6341011013D603305174C3213F88CCB7C2114E290184165C6A9B84EECA7596ED
3,254,283 UART: [art] PUB.Y = 3755F8B7AE8E4F38F10F60C7C1F62E1200C1AB34EB3E3A8BEA01BF4E89373A4D5064C3908006E0726994009DA391CE34
3,261,184 UART: [art] SIG.R = 630465E0006B358ECB6BEC4FB2234E32E6F26193C414FCDC2D56D3AE9BCFDFE0150522FC9066EE3E20EE46D4A0974DFE
3,267,944 UART: [art] SIG.S = FDB31357E888901273ECEF87ADDB8A70350E46514F6899FA2267CD5B23026AD31A2A9407254A22321CDA8888FB7EC7F3
3,291,870 UART: Caliptra RT
3,292,215 UART: [state] CFI Enabled
3,401,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,820 UART: [rt]cmd =0x4453424c, len=4
3,445,301 >>> mbox cmd response data (8 bytes)
3,445,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,808 >>> mbox cmd response: success
6,203,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,217,335 UART:
6,217,351 UART: Running Caliptra FMC ...
6,217,759 UART:
6,217,902 UART: [state] CFI Enabled
6,306,779 UART: [art] Extend RT PCRs Done
6,307,207 UART: [art] Lock RT PCRs Done
6,308,584 UART: [art] Populate DV Done
6,317,039 UART: [fht] FMC Alias Private Key: 7
6,318,105 UART: [art] Derive CDI
6,318,385 UART: [art] Store in in slot 0x4
6,404,056 UART: [art] Derive Key Pair
6,404,416 UART: [art] Store priv key in slot 0x5
6,417,348 UART: [art] Derive Key Pair - Done
6,431,816 UART: [art] Signing Cert with AUTHO
6,432,296 UART: RITY.KEYID = 7
6,447,360 UART: [art] Erasing AUTHORITY.KEYID = 7
6,448,125 UART: [art] PUB.X = 23B0A3AD0726647469F2FA28AF8DC53406B87D81635189C77F19B791E3B0EC20CE07C02A253B2F31D9B7D035F8D3FEBF
6,454,894 UART: [art] PUB.Y = F738CDDFAE272A95E8EE99E477C84B177716AE2AF237BA5A668AEF1776BA7A898B90B5A8C55AA2B24B190004D52D4AF1
6,461,835 UART: [art] SIG.R = D822FE2B9AA2DCA9E1097CFEF6C66BDC366B62CBF1003B20B72EF68F1CA55F2C6E802421D25D798681BFE1EDC17DF905
6,468,599 UART: [art] SIG.S = B7007C5ACACD5AF6A782E622B2FC5EE3C4DC4DACF4504760527F7F171D79DD3B42BCDBBDF04F7DC536D1E50D41DA04DD
6,492,224 UART: Caliptra RT
6,492,569 UART: [state] CFI Enabled
6,788,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,818,580 UART: [rt]cmd =0x494e464f, len=4
6,822,315 >>> mbox cmd response data (312 bytes)
6,822,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,851,627 UART: [rt]cmd =0x43455252, len=4
6,862,296 >>> mbox cmd response data (784 bytes)
6,862,297 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,892,124 UART: [rt]cmd =0x44504543, len=92
7,074,497 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,956 UART: [kat] SHA2-256
893,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,731 UART: [kat] ++
897,883 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,726 UART: [kat] SHA2-512-ACC
908,627 UART: [kat] ECC-384
918,450 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,551 UART: [fht] FHT @ 0x50003400
1,175,330 UART: [idev] ++
1,175,498 UART: [idev] CDI.KEYID = 6
1,175,858 UART: [idev] SUBJECT.KEYID = 7
1,176,282 UART: [idev] UDS.KEYID = 0
1,176,627 ready_for_fw is high
1,176,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,164 UART: [idev] Erasing UDS.KEYID = 0
1,201,057 UART: [idev] Sha1 KeyId Algorithm
1,209,553 UART: [idev] --
1,210,585 UART: [ldev] ++
1,210,753 UART: [ldev] CDI.KEYID = 6
1,211,116 UART: [ldev] SUBJECT.KEYID = 5
1,211,542 UART: [ldev] AUTHORITY.KEYID = 7
1,212,005 UART: [ldev] FE.KEYID = 1
1,217,153 UART: [ldev] Erasing FE.KEYID = 1
1,243,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,282,906 UART: [fwproc] Wait for Commands...
1,283,638 UART: [fwproc] Recv command 0x46574c44
1,284,366 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,085 >>> mbox cmd response: success
2,770,085 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,771,249 UART: [afmc] ++
2,771,417 UART: [afmc] CDI.KEYID = 6
2,771,779 UART: [afmc] SUBJECT.KEYID = 7
2,772,204 UART: [afmc] AUTHORITY.KEYID = 5
2,807,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,512 UART: [afmc] --
2,851,434 UART: [cold-reset] --
2,852,210 UART: [state] Locking Datavault
2,853,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,947 UART: [state] Locking ICCM
2,854,493 UART: [exit] Launching FMC @ 0x40000130
2,859,822 UART:
2,859,838 UART: Running Caliptra FMC ...
2,860,246 UART:
2,860,300 UART: [state] CFI Enabled
2,870,977 UART: [fht] FMC Alias Private Key: 7
2,979,650 UART: [art] Extend RT PCRs Done
2,980,078 UART: [art] Lock RT PCRs Done
2,981,432 UART: [art] Populate DV Done
2,989,471 UART: [fht] FMC Alias Private Key: 7
2,990,473 UART: [art] Derive CDI
2,990,753 UART: [art] Store in in slot 0x4
3,076,138 UART: [art] Derive Key Pair
3,076,498 UART: [art] Store priv key in slot 0x5
3,090,082 UART: [art] Derive Key Pair - Done
3,104,848 UART: [art] Signing Cert with AUTHO
3,105,328 UART: RITY.KEYID = 7
3,120,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,619 UART: [art] PUB.X = 9FD604EA04677976A49D59B9E36E653997B8C7C3B25F7050A585996D4B6D3F4B37F62D8346999D2146A8B93A6EF85688
3,128,377 UART: [art] PUB.Y = 176CAE8BFB1A488C9D6DD30CFEFC311A326D3351C148E54286D55F52DC999C138B1A7149CA750C2A635C8FF3C10314E9
3,135,328 UART: [art] SIG.R = CFF6FB32927707195CA226B9084C40EB75BC9D4B3A544B34BDC7A364A5712F1B96ACD73DD5BEE0837487D0479E31CA52
3,142,102 UART: [art] SIG.S = B7613811DADB3D7FAA7A01B9A6B11F9D119818AC7EE8CAF31518865CAD30BE02CF59F5F812169525A5218DC60EDC0B63
3,165,617 UART: Caliptra RT
3,165,870 UART: [state] CFI Enabled
3,273,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,096 UART: [rt]cmd =0x4453424c, len=4
3,317,563 >>> mbox cmd response data (8 bytes)
3,317,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,269 UART:
3,318,285 UART: Running Caliptra ROM ...
3,318,693 UART:
3,318,748 UART: [state] CFI Enabled
3,321,214 UART: [state] LifecycleState = Unprovisioned
3,321,869 UART: [state] DebugLocked = No
3,322,415 UART: [state] WD Timer not started. Device not locked for debugging
3,323,739 UART: [kat] SHA2-256
4,129,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,133,514 UART: [kat] ++
4,133,666 UART: [kat] sha1
4,137,900 UART: [kat] SHA2-256
4,139,840 UART: [kat] SHA2-384
4,142,751 UART: [kat] SHA2-512-ACC
4,144,651 UART: [kat] ECC-384
4,154,340 UART: [kat] HMAC-384Kdf
4,158,984 UART: [kat] LMS
4,407,312 UART: [kat] --
4,408,200 UART: [update-reset] ++
5,717,436 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,718,529 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,867,981 >>> mbox cmd response: success
5,867,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,868,088 UART: [update-reset] Copying MAN_2 To MAN_1
5,876,102 UART: [update-reset Success] --
5,877,075 UART: [state] Locking Datavault
5,877,789 UART: [state] Locking PCR0, PCR1 and PCR31
5,878,393 UART: [state] Locking ICCM
5,878,891 UART: [exit] Launching FMC @ 0x40000130
5,884,220 UART:
5,884,236 UART: Running Caliptra FMC ...
5,884,644 UART:
5,884,698 UART: [state] CFI Enabled
5,973,699 UART: [art] Extend RT PCRs Done
5,974,127 UART: [art] Lock RT PCRs Done
5,975,414 UART: [art] Populate DV Done
5,983,881 UART: [fht] FMC Alias Private Key: 7
5,985,015 UART: [art] Derive CDI
5,985,295 UART: [art] Store in in slot 0x4
6,070,874 UART: [art] Derive Key Pair
6,071,234 UART: [art] Store priv key in slot 0x5
6,084,678 UART: [art] Derive Key Pair - Done
6,099,315 UART: [art] Signing Cert with AUTHO
6,099,795 UART: RITY.KEYID = 7
6,114,885 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,650 UART: [art] PUB.X = 6D6A004358C96F171121A13DFB672A7EDFE9E1C380B128F88BD1581267490F750A85D0620AD67AEB8569DDC153502958
6,122,387 UART: [art] PUB.Y = 9406C81001E537A3FAF81562B55554550CFA5135A17ED42EA94FC14CB6844FB843250FA48F9F6170FA6128CFB6EC6543
6,129,327 UART: [art] SIG.R = FABD2E04BB1A97663BFF8FBE1FF2944E4D0DEF99B0C1A865263011C18DC95533DFA0A95CB9DC5D40386056E9076C0C28
6,136,101 UART: [art] SIG.S = 2D12FCA9DABAD50AEC318D59377C9302F5E32705D75991092E64BC58D7C28209111FC17157D15B0675CC0662C9DD79E2
6,159,803 UART: Caliptra RT
6,160,056 UART: [state] CFI Enabled
6,455,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,485,870 UART: [rt]cmd =0x494e464f, len=4
6,489,679 >>> mbox cmd response data (312 bytes)
6,489,680 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,519,111 UART: [rt]cmd =0x43455252, len=4
6,530,101 >>> mbox cmd response data (783 bytes)
6,530,102 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,560,059 UART: [rt]cmd =0x44504543, len=92
6,743,160 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,865 ready_for_fw is high
1,059,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,028 >>> mbox cmd response: success
2,623,028 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,684,490 UART:
2,684,506 UART: Running Caliptra FMC ...
2,684,914 UART:
2,684,968 UART: [state] CFI Enabled
2,695,335 UART: [fht] FMC Alias Private Key: 7
2,802,712 UART: [art] Extend RT PCRs Done
2,803,140 UART: [art] Lock RT PCRs Done
2,804,606 UART: [art] Populate DV Done
2,813,045 UART: [fht] FMC Alias Private Key: 7
2,814,033 UART: [art] Derive CDI
2,814,313 UART: [art] Store in in slot 0x4
2,900,214 UART: [art] Derive Key Pair
2,900,574 UART: [art] Store priv key in slot 0x5
2,913,994 UART: [art] Derive Key Pair - Done
2,928,988 UART: [art] Signing Cert with AUTHO
2,929,468 UART: RITY.KEYID = 7
2,944,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,183 UART: [art] PUB.X = 6EE070B8DB754AC1E69B184684EC82C5BE970AD7ED1908EB3F21E56335CD496CD847851222CAE25DEF92F2A0E74DBAD4
2,951,963 UART: [art] PUB.Y = 4CAC1692A9E2F71DEB0802FDDAEDD9597F9F85F496D439550A41585BFF9D0A79470F57158C9B51A4DE3F6CC418F7FD11
2,958,912 UART: [art] SIG.R = 5AB733C0B10D58E2C43297FCCE0DFCF3A0E3687453E5BD04DD8FC7F88EF47E4ED0F6905DACB54CCBC0E3B92968A99DC7
2,965,699 UART: [art] SIG.S = A12D71FA717C71C7D56DF65AA82FB10765F7C7A568CE5C42F0E5A4D2A52FA42B892E1F2B0F7995BC247873DED8B17F9C
2,989,274 UART: Caliptra RT
2,989,527 UART: [state] CFI Enabled
3,096,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,538 UART: [rt]cmd =0x4453424c, len=4
3,139,605 >>> mbox cmd response data (8 bytes)
3,139,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,573,364 >>> mbox cmd response: success
5,573,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,586,378 UART:
5,586,394 UART: Running Caliptra FMC ...
5,586,802 UART:
5,586,856 UART: [state] CFI Enabled
5,675,349 UART: [art] Extend RT PCRs Done
5,675,777 UART: [art] Lock RT PCRs Done
5,676,932 UART: [art] Populate DV Done
5,685,073 UART: [fht] FMC Alias Private Key: 7
5,686,003 UART: [art] Derive CDI
5,686,283 UART: [art] Store in in slot 0x4
5,771,782 UART: [art] Derive Key Pair
5,772,142 UART: [art] Store priv key in slot 0x5
5,785,448 UART: [art] Derive Key Pair - Done
5,800,221 UART: [art] Signing Cert with AUTHO
5,800,701 UART: RITY.KEYID = 7
5,816,139 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,904 UART: [art] PUB.X = B561064A389FB729663BBAFCB9F83BE611EA43D2BB9FCF8545FCFCED52BAFC435E0FF1FF3E43199377EF9AC5430F4C0F
5,823,688 UART: [art] PUB.Y = 40D66CC4BC14D4C04B3CD40D79AC29D2B86281A508DD3A21042A9A19FFD40997D0E4862E103950C787819384E451F2D5
5,830,626 UART: [art] SIG.R = 74406FBF9DE2E8BADB62B0920772451A7F7DF864F107D0B74E11DD23FCFD633516A8438B34CD3F13D2BB16576AD8316D
5,837,400 UART: [art] SIG.S = 73A4FCD6D1979093838E5812263A13CED2702B225E95753FD64148E453CF9377052E32F5C76229B4003F74724D08B1F0
5,861,603 UART: Caliptra RT
5,861,856 UART: [state] CFI Enabled
6,156,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,186,722 UART: [rt]cmd =0x494e464f, len=4
6,190,479 >>> mbox cmd response data (312 bytes)
6,190,480 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,220,003 UART: [rt]cmd =0x43455252, len=4
6,230,911 >>> mbox cmd response data (782 bytes)
6,230,912 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,260,959 UART: [rt]cmd =0x44504543, len=92
6,445,379 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,664 UART: [kat] SHA2-256
904,604 UART: [kat] SHA2-384
907,199 UART: [kat] SHA2-512-ACC
909,100 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,802 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,851 UART: [idev] ++
1,176,019 UART: [idev] CDI.KEYID = 6
1,176,379 UART: [idev] SUBJECT.KEYID = 7
1,176,803 UART: [idev] UDS.KEYID = 0
1,177,148 ready_for_fw is high
1,177,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,700 UART: [idev] Sha1 KeyId Algorithm
1,210,178 UART: [idev] --
1,211,398 UART: [ldev] ++
1,211,566 UART: [ldev] CDI.KEYID = 6
1,211,929 UART: [ldev] SUBJECT.KEYID = 5
1,212,355 UART: [ldev] AUTHORITY.KEYID = 7
1,212,818 UART: [ldev] FE.KEYID = 1
1,218,022 UART: [ldev] Erasing FE.KEYID = 1
1,245,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,974 UART: [ldev] --
1,284,317 UART: [fwproc] Wait for Commands...
1,285,121 UART: [fwproc] Recv command 0x46574c44
1,285,849 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,053 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,422 >>> mbox cmd response: success
2,773,422 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,774,442 UART: [afmc] ++
2,774,610 UART: [afmc] CDI.KEYID = 6
2,774,972 UART: [afmc] SUBJECT.KEYID = 7
2,775,397 UART: [afmc] AUTHORITY.KEYID = 5
2,811,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,789 UART: [afmc] --
2,854,771 UART: [cold-reset] --
2,855,679 UART: [state] Locking Datavault
2,856,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,226 UART: [state] Locking ICCM
2,857,872 UART: [exit] Launching FMC @ 0x40000130
2,863,201 UART:
2,863,217 UART: Running Caliptra FMC ...
2,863,625 UART:
2,863,768 UART: [state] CFI Enabled
2,874,671 UART: [fht] FMC Alias Private Key: 7
2,982,272 UART: [art] Extend RT PCRs Done
2,982,700 UART: [art] Lock RT PCRs Done
2,984,206 UART: [art] Populate DV Done
2,992,407 UART: [fht] FMC Alias Private Key: 7
2,993,475 UART: [art] Derive CDI
2,993,755 UART: [art] Store in in slot 0x4
3,079,330 UART: [art] Derive Key Pair
3,079,690 UART: [art] Store priv key in slot 0x5
3,092,710 UART: [art] Derive Key Pair - Done
3,107,107 UART: [art] Signing Cert with AUTHO
3,107,587 UART: RITY.KEYID = 7
3,122,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,670 UART: [art] PUB.X = 5E378EB39510FA7DB428CF6AFF2F554FFA9C4950D05F50CA6413CDBAA85A6F451EEBEE151FBF789D4D1F7F63948B89DC
3,130,464 UART: [art] PUB.Y = 50B538444671252A88C724487BE73DD085F0CD9A7159BA086F4AA8974A8FAA2F8FD52481A5DD13E6D862D155B93C091B
3,137,410 UART: [art] SIG.R = F1F46EF61367A068EC339E506D045A17D0CB48005A085905E091C93DF4D9B628D8D61320D49BDCD9D73AAED921896E28
3,144,153 UART: [art] SIG.S = 203B6FDDCCC7211AEC0E0586276F845FD6FA4A18B3207076AD0B443F4280D91BF8D49746D71030016AAEF39ED804C573
3,168,057 UART: Caliptra RT
3,168,402 UART: [state] CFI Enabled
3,275,391 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,947 UART: [rt]cmd =0x4453424c, len=4
3,320,052 >>> mbox cmd response data (8 bytes)
3,320,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,798 UART:
3,320,814 UART: Running Caliptra ROM ...
3,321,222 UART:
3,321,364 UART: [state] CFI Enabled
3,324,422 UART: [state] LifecycleState = Unprovisioned
3,325,077 UART: [state] DebugLocked = No
3,325,699 UART: [state] WD Timer not started. Device not locked for debugging
3,326,925 UART: [kat] SHA2-256
4,132,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,136,700 UART: [kat] ++
4,136,852 UART: [kat] sha1
4,141,194 UART: [kat] SHA2-256
4,143,134 UART: [kat] SHA2-384
4,146,039 UART: [kat] SHA2-512-ACC
4,147,939 UART: [kat] ECC-384
4,157,928 UART: [kat] HMAC-384Kdf
4,162,720 UART: [kat] LMS
4,411,048 UART: [kat] --
4,411,976 UART: [update-reset] ++
5,721,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,722,037 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,871,489 >>> mbox cmd response: success
5,871,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,871,812 UART: [update-reset] Copying MAN_2 To MAN_1
5,879,826 UART: [update-reset Success] --
5,880,889 UART: [state] Locking Datavault
5,881,787 UART: [state] Locking PCR0, PCR1 and PCR31
5,882,391 UART: [state] Locking ICCM
5,882,813 UART: [exit] Launching FMC @ 0x40000130
5,888,142 UART:
5,888,158 UART: Running Caliptra FMC ...
5,888,566 UART:
5,888,709 UART: [state] CFI Enabled
5,978,004 UART: [art] Extend RT PCRs Done
5,978,432 UART: [art] Lock RT PCRs Done
5,979,569 UART: [art] Populate DV Done
5,988,088 UART: [fht] FMC Alias Private Key: 7
5,989,058 UART: [art] Derive CDI
5,989,338 UART: [art] Store in in slot 0x4
6,074,875 UART: [art] Derive Key Pair
6,075,235 UART: [art] Store priv key in slot 0x5
6,089,037 UART: [art] Derive Key Pair - Done
6,103,677 UART: [art] Signing Cert with AUTHO
6,104,157 UART: RITY.KEYID = 7
6,119,397 UART: [art] Erasing AUTHORITY.KEYID = 7
6,120,162 UART: [art] PUB.X = 0364C89EFEF3FB68FD81DF0CBEA474D31682922394A228BD8BB64787DCA90F7152478E66C2EFBAA1A4CA6CCBFACA74B0
6,126,947 UART: [art] PUB.Y = 38966276683D90794C1FB4F30482BFD490B57E7FD26D29C4FF8B70D294899162B2C4881A308FF292DA2D87E400946436
6,133,864 UART: [art] SIG.R = 7BB01075B5BCB8C980797FF03A7424CA8365C7A79D69E4E40BBD3745A390A4278AE67BBE7115F1C173222B5CEC6F209B
6,140,639 UART: [art] SIG.S = 58567476D3E14E6471820C2356F9433C8276DDC0BBE2460F61622907108F1C0B758249B45ED14AFEFD486DD4BB0D564B
6,165,245 UART: Caliptra RT
6,165,590 UART: [state] CFI Enabled
6,459,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,489,552 UART: [rt]cmd =0x494e464f, len=4
6,493,413 >>> mbox cmd response data (312 bytes)
6,493,414 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,522,859 UART: [rt]cmd =0x43455252, len=4
6,533,715 >>> mbox cmd response data (782 bytes)
6,533,716 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,563,689 UART: [rt]cmd =0x44504543, len=92
6,746,781 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 ready_for_fw is high
1,060,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,901 >>> mbox cmd response: success
2,623,901 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,686,171 UART:
2,686,187 UART: Running Caliptra FMC ...
2,686,595 UART:
2,686,738 UART: [state] CFI Enabled
2,697,179 UART: [fht] FMC Alias Private Key: 7
2,804,766 UART: [art] Extend RT PCRs Done
2,805,194 UART: [art] Lock RT PCRs Done
2,806,688 UART: [art] Populate DV Done
2,814,937 UART: [fht] FMC Alias Private Key: 7
2,815,931 UART: [art] Derive CDI
2,816,211 UART: [art] Store in in slot 0x4
2,902,340 UART: [art] Derive Key Pair
2,902,700 UART: [art] Store priv key in slot 0x5
2,916,174 UART: [art] Derive Key Pair - Done
2,931,034 UART: [art] Signing Cert with AUTHO
2,931,514 UART: RITY.KEYID = 7
2,947,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,791 UART: [art] PUB.X = CA980E25EF9C83948FC7DEF912151774E900B4ADC2F3506D503D05AD895665DE7A0468CA67C974A9A255066166E9BF92
2,954,529 UART: [art] PUB.Y = CF2670487F84B1FDD5D0449739AD906A9A97289F26FC6644D53A6796F14F8A3CBADBF7A7408A2413692061E68F7865E6
2,961,479 UART: [art] SIG.R = 3F2E4A146F341CF83F8FE9B9FA41799CE4FDEFD0B0F640B3D05F505449BBAECFA36E68403C7B126219AFC42F4E337C52
2,968,267 UART: [art] SIG.S = 0E3B2CAA91F37BF73C92719C71653A8245D0006533FF1906B9671F6ABB4E0B980554E0F1D0E75178205FC820C3CA988A
2,991,876 UART: Caliptra RT
2,992,221 UART: [state] CFI Enabled
3,100,488 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,978 UART: [rt]cmd =0x4453424c, len=4
3,145,157 >>> mbox cmd response data (8 bytes)
3,145,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,579,441 >>> mbox cmd response: success
5,579,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,593,113 UART:
5,593,129 UART: Running Caliptra FMC ...
5,593,537 UART:
5,593,680 UART: [state] CFI Enabled
5,682,817 UART: [art] Extend RT PCRs Done
5,683,245 UART: [art] Lock RT PCRs Done
5,684,390 UART: [art] Populate DV Done
5,692,495 UART: [fht] FMC Alias Private Key: 7
5,693,477 UART: [art] Derive CDI
5,693,757 UART: [art] Store in in slot 0x4
5,779,602 UART: [art] Derive Key Pair
5,779,962 UART: [art] Store priv key in slot 0x5
5,793,404 UART: [art] Derive Key Pair - Done
5,808,177 UART: [art] Signing Cert with AUTHO
5,808,657 UART: RITY.KEYID = 7
5,823,751 UART: [art] Erasing AUTHORITY.KEYID = 7
5,824,516 UART: [art] PUB.X = 585B224F0F41EEA5FA2193C27896A123F3AF1C247D7E82CD30F97EEA79C10E426FECFE2DE8503446C9A2224E4851644F
5,831,288 UART: [art] PUB.Y = DC18A10390CE71696661BB47D55AF2D4F39707903DB10A9BE7486ED396288ABEAF2DD2B6E328F74B209EE9F4EF238CFA
5,838,243 UART: [art] SIG.R = C28A7CB5E5ADF56EECDFDB72108E34E9ABB9751C7833D5150050283DE6A205CAB3D693244180A3663D44157479A7E1B7
5,844,994 UART: [art] SIG.S = 91AF12505B9089A1EB10C838ED807E97752859C361AC5B9B8C7B1B77F1373874991BFCB74F73DC60ECE84C5C53FF04F8
5,869,160 UART: Caliptra RT
5,869,505 UART: [state] CFI Enabled
6,165,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,195,236 UART: [rt]cmd =0x494e464f, len=4
6,198,973 >>> mbox cmd response data (312 bytes)
6,198,974 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,228,225 UART: [rt]cmd =0x43455252, len=4
6,239,082 >>> mbox cmd response data (784 bytes)
6,239,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,890 UART: [rt]cmd =0x44504543, len=92
6,452,865 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,011 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,174,389 ready_for_fw is high
1,174,389 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,827 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,834 UART: [ldev] ++
1,209,002 UART: [ldev] CDI.KEYID = 6
1,209,366 UART: [ldev] SUBJECT.KEYID = 5
1,209,793 UART: [ldev] AUTHORITY.KEYID = 7
1,210,256 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,717 >>> mbox cmd response: success
2,769,717 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,770,940 UART: [afmc] ++
2,771,108 UART: [afmc] CDI.KEYID = 6
2,771,471 UART: [afmc] SUBJECT.KEYID = 7
2,771,897 UART: [afmc] AUTHORITY.KEYID = 5
2,807,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,817 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,148 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,837 UART: [afmc] --
2,850,891 UART: [cold-reset] --
2,851,769 UART: [state] Locking Datavault
2,852,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,464 UART: [state] Locking ICCM
2,854,100 UART: [exit] Launching FMC @ 0x40000130
2,859,429 UART:
2,859,445 UART: Running Caliptra FMC ...
2,859,853 UART:
2,859,907 UART: [state] CFI Enabled
2,870,264 UART: [fht] FMC Alias Private Key: 7
2,978,913 UART: [art] Extend RT PCRs Done
2,979,341 UART: [art] Lock RT PCRs Done
2,980,691 UART: [art] Populate DV Done
2,988,612 UART: [fht] FMC Alias Private Key: 7
2,989,724 UART: [art] Derive CDI
2,990,004 UART: [art] Store in in slot 0x4
3,075,683 UART: [art] Derive Key Pair
3,076,043 UART: [art] Store priv key in slot 0x5
3,089,415 UART: [art] Derive Key Pair - Done
3,104,426 UART: [art] Signing Cert with AUTHO
3,104,906 UART: RITY.KEYID = 7
3,119,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,517 UART: [art] PUB.X = 16F8B2B6E613108B876E576C2B0C6F9C8F08826FFE56B6C23814110C77C30A42B6CA05A79E0768B6C2E31802C6C3DD7E
3,127,270 UART: [art] PUB.Y = 9045A16BFDAD7798B396A201D36D29145D108D1FEC60B07214F705B2668B3B2D2688150B1EB9F3ACC2E17D5F89157121
3,134,211 UART: [art] SIG.R = E9DC43ED72123208A924F874948CFD485F46F11F5B9E449E30D2AF25B86B223A69041706B0128A87AE03C364F5C8D14D
3,140,969 UART: [art] SIG.S = C2CFD10AA98999931CAC835305B12F3B01E365F0B2B5C262331596B4D8F7B1CC8332C5C92D2189857DB7F07A18A23B6A
3,164,465 UART: Caliptra RT
3,164,718 UART: [state] CFI Enabled
3,272,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,410 UART: [rt]cmd =0x4453424c, len=4
3,317,025 >>> mbox cmd response data (8 bytes)
3,317,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,945 UART:
3,317,961 UART: Running Caliptra ROM ...
3,318,369 UART:
3,318,424 UART: [state] CFI Enabled
3,320,500 UART: [state] LifecycleState = Unprovisioned
3,321,155 UART: [state] DebugLocked = No
3,321,647 UART: [state] WD Timer not started. Device not locked for debugging
3,322,799 UART: [kat] SHA2-256
4,126,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,130,478 UART: [kat] ++
4,130,630 UART: [kat] sha1
4,134,922 UART: [kat] SHA2-256
4,136,862 UART: [kat] SHA2-384
4,139,447 UART: [kat] SHA2-512-ACC
4,141,347 UART: [kat] ECC-384
4,150,806 UART: [kat] HMAC-384Kdf
4,155,506 UART: [kat] LMS
4,403,818 UART: [kat] --
4,404,710 UART: [update-reset] ++
5,714,133 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,715,252 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,864,704 >>> mbox cmd response: success
5,864,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,864,995 UART: [update-reset] Copying MAN_2 To MAN_1
5,873,009 UART: [update-reset Success] --
5,873,880 UART: [state] Locking Datavault
5,874,798 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,402 UART: [state] Locking ICCM
5,875,842 UART: [exit] Launching FMC @ 0x40000130
5,881,171 UART:
5,881,187 UART: Running Caliptra FMC ...
5,881,595 UART:
5,881,649 UART: [state] CFI Enabled
5,971,262 UART: [art] Extend RT PCRs Done
5,971,690 UART: [art] Lock RT PCRs Done
5,972,981 UART: [art] Populate DV Done
5,981,100 UART: [fht] FMC Alias Private Key: 7
5,982,092 UART: [art] Derive CDI
5,982,372 UART: [art] Store in in slot 0x4
6,067,863 UART: [art] Derive Key Pair
6,068,223 UART: [art] Store priv key in slot 0x5
6,081,461 UART: [art] Derive Key Pair - Done
6,096,022 UART: [art] Signing Cert with AUTHO
6,096,502 UART: RITY.KEYID = 7
6,111,296 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,061 UART: [art] PUB.X = 5BDCF230F83AA0E90D5C5668F784190BBCF5A78952668785F78259582A5955BA9AD97C071C5A528DE972848902AE346F
6,118,817 UART: [art] PUB.Y = 50DB51EDF4C347EE4A90656895C4D9AF2B692F867ADDD701A34DC7C7153DC6BABB5F68B11F386AE8416C75B2CA2BF37C
6,125,784 UART: [art] SIG.R = 5A0967D2B909547D015290C483654AAFCF6AE5DE1411E23D3C4D5DD4E8484DF1633CAD9E91AE42E6EAD07B1123FEC4A7
6,132,559 UART: [art] SIG.S = EE85B3BAA1AED3704F28983744B5C692195E316737B9A7DD50EBADFA2F9547782C14C2BA3543B16A6378DCD1F5D73821
6,156,498 UART: Caliptra RT
6,156,751 UART: [state] CFI Enabled
6,446,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,477,019 UART: [rt]cmd =0x494e464f, len=4
6,480,820 >>> mbox cmd response data (312 bytes)
6,480,821 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,510,290 UART: [rt]cmd =0x43455252, len=4
6,521,274 >>> mbox cmd response data (783 bytes)
6,521,275 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,551,126 UART: [rt]cmd =0x44504543, len=92
6,734,848 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,024 ready_for_fw is high
1,056,024 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,383 >>> mbox cmd response: success
2,618,383 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,680,845 UART:
2,680,861 UART: Running Caliptra FMC ...
2,681,269 UART:
2,681,323 UART: [state] CFI Enabled
2,691,564 UART: [fht] FMC Alias Private Key: 7
2,800,183 UART: [art] Extend RT PCRs Done
2,800,611 UART: [art] Lock RT PCRs Done
2,802,083 UART: [art] Populate DV Done
2,810,286 UART: [fht] FMC Alias Private Key: 7
2,811,266 UART: [art] Derive CDI
2,811,546 UART: [art] Store in in slot 0x4
2,897,007 UART: [art] Derive Key Pair
2,897,367 UART: [art] Store priv key in slot 0x5
2,910,287 UART: [art] Derive Key Pair - Done
2,925,008 UART: [art] Signing Cert with AUTHO
2,925,488 UART: RITY.KEYID = 7
2,940,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,343 UART: [art] PUB.X = 3FE79725EEC666E06FAA93117ACD83376C88A97A2928E740A210D18DB58FC7DC6F40618B39B12003D2D36F726BC08A19
2,948,114 UART: [art] PUB.Y = A8469EF0EC45788F9C62A3054044288A02893C813373738230C72BE1EA6C772AD52E84C92C987F1F61DAE9F87AD99488
2,955,054 UART: [art] SIG.R = 2917BC93000B1975570209E3135D2B0FFB3338ACAE1820322DB062359F5C770FA1C39FBD549D366B8672A9126F87F6A2
2,961,783 UART: [art] SIG.S = ED2C7CCC9D52DF2E72B18D44ACEEFF192D356307F933653866CD77A7D91F39A4F632B63AEA6405F066A008D751E250BF
2,985,507 UART: Caliptra RT
2,985,760 UART: [state] CFI Enabled
3,092,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,459 UART: [rt]cmd =0x4453424c, len=4
3,136,538 >>> mbox cmd response data (8 bytes)
3,136,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,565,664 >>> mbox cmd response: success
5,565,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,579,140 UART:
5,579,156 UART: Running Caliptra FMC ...
5,579,564 UART:
5,579,618 UART: [state] CFI Enabled
5,668,479 UART: [art] Extend RT PCRs Done
5,668,907 UART: [art] Lock RT PCRs Done
5,670,102 UART: [art] Populate DV Done
5,678,239 UART: [fht] FMC Alias Private Key: 7
5,679,325 UART: [art] Derive CDI
5,679,605 UART: [art] Store in in slot 0x4
5,765,458 UART: [art] Derive Key Pair
5,765,818 UART: [art] Store priv key in slot 0x5
5,779,032 UART: [art] Derive Key Pair - Done
5,793,653 UART: [art] Signing Cert with AUTHO
5,794,133 UART: RITY.KEYID = 7
5,808,879 UART: [art] Erasing AUTHORITY.KEYID = 7
5,809,644 UART: [art] PUB.X = 53B923EA84167B38E01A4A065D0B39F26EA742CB00CA00E5C1904F73AF1DA80F1F91861490A98B637AAA4D3E66B066C3
5,816,367 UART: [art] PUB.Y = A6CDC55172E47888A5BC05AF535A5B62FB2D6684CD1A988750CCBD70D73142A4CCA090B0B5D8261CD5AFB32DE202C09C
5,823,327 UART: [art] SIG.R = BB53F0184CA3619A75493EB8A29537F57885DC567499CB39BC38BA0FA0664AD43F4E5C9435294718DD1DBDD51FEA365F
5,830,102 UART: [art] SIG.S = 099A2E219E267B85AE2020BC200C27D8AA622D9949B17B87D244BE414D14F6BF0084BD0CCDA374308AF9F3E257CA9558
5,853,724 UART: Caliptra RT
5,853,977 UART: [state] CFI Enabled
6,148,422 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,178,521 UART: [rt]cmd =0x494e464f, len=4
6,182,300 >>> mbox cmd response data (312 bytes)
6,182,301 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,211,292 UART: [rt]cmd =0x43455252, len=4
6,222,060 >>> mbox cmd response data (783 bytes)
6,222,061 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,251,974 UART: [rt]cmd =0x44504543, len=92
6,434,839 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,267 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,252 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,174,760 ready_for_fw is high
1,174,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,186 >>> mbox cmd response: success
2,770,186 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,771,433 UART: [afmc] ++
2,771,601 UART: [afmc] CDI.KEYID = 6
2,771,964 UART: [afmc] SUBJECT.KEYID = 7
2,772,390 UART: [afmc] AUTHORITY.KEYID = 5
2,808,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,134 UART: [afmc] --
2,851,162 UART: [cold-reset] --
2,852,076 UART: [state] Locking Datavault
2,853,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,809 UART: [state] Locking ICCM
2,854,421 UART: [exit] Launching FMC @ 0x40000130
2,859,750 UART:
2,859,766 UART: Running Caliptra FMC ...
2,860,174 UART:
2,860,317 UART: [state] CFI Enabled
2,870,810 UART: [fht] FMC Alias Private Key: 7
2,979,241 UART: [art] Extend RT PCRs Done
2,979,669 UART: [art] Lock RT PCRs Done
2,981,225 UART: [art] Populate DV Done
2,989,434 UART: [fht] FMC Alias Private Key: 7
2,990,526 UART: [art] Derive CDI
2,990,806 UART: [art] Store in in slot 0x4
3,076,845 UART: [art] Derive Key Pair
3,077,205 UART: [art] Store priv key in slot 0x5
3,090,767 UART: [art] Derive Key Pair - Done
3,105,883 UART: [art] Signing Cert with AUTHO
3,106,363 UART: RITY.KEYID = 7
3,121,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,934 UART: [art] PUB.X = 7C64FB160153BF0C979F26C863A07CD31446DF641D495B3B1F73AE7DDF6B2A086D3E9E2A3F05CB7F41730044D0195CA6
3,128,678 UART: [art] PUB.Y = E498EDC4E1A76B8C2B8DF58FDFD82F04FFEEE8CC9F1960E88550D0D499E5F60DD26D811BE14FD0133844C0390E592EDC
3,135,639 UART: [art] SIG.R = A1D8C710587FCDEC778767BBF4A8D7B819CB3A7C9BC7D2D98FAE5367279905A9CED46ECAFC7EFB9312C4C0DF7CF4EF3A
3,142,436 UART: [art] SIG.S = 4839D875528ABA475ABB8B48C7CA0598647C64D1852687AEEF4C0F20F34CD40ABAE000413EABA8AED40E76C4E33AC475
3,165,787 UART: Caliptra RT
3,166,132 UART: [state] CFI Enabled
3,273,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,679 UART: [rt]cmd =0x4453424c, len=4
3,316,846 >>> mbox cmd response data (8 bytes)
3,316,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,624 UART:
3,317,640 UART: Running Caliptra ROM ...
3,318,048 UART:
3,318,190 UART: [state] CFI Enabled
3,320,940 UART: [state] LifecycleState = Unprovisioned
3,321,595 UART: [state] DebugLocked = No
3,322,083 UART: [state] WD Timer not started. Device not locked for debugging
3,323,327 UART: [kat] SHA2-256
4,126,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,131,006 UART: [kat] ++
4,131,158 UART: [kat] sha1
4,135,516 UART: [kat] SHA2-256
4,137,456 UART: [kat] SHA2-384
4,140,179 UART: [kat] SHA2-512-ACC
4,142,079 UART: [kat] ECC-384
4,151,704 UART: [kat] HMAC-384Kdf
4,156,262 UART: [kat] LMS
4,404,574 UART: [kat] --
4,405,630 UART: [update-reset] ++
5,714,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,715,672 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,865,124 >>> mbox cmd response: success
5,865,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,865,289 UART: [update-reset] Copying MAN_2 To MAN_1
5,873,303 UART: [update-reset Success] --
5,874,218 UART: [state] Locking Datavault
5,874,966 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,570 UART: [state] Locking ICCM
5,876,148 UART: [exit] Launching FMC @ 0x40000130
5,881,477 UART:
5,881,493 UART: Running Caliptra FMC ...
5,881,901 UART:
5,882,044 UART: [state] CFI Enabled
5,971,595 UART: [art] Extend RT PCRs Done
5,972,023 UART: [art] Lock RT PCRs Done
5,973,242 UART: [art] Populate DV Done
5,981,803 UART: [fht] FMC Alias Private Key: 7
5,982,799 UART: [art] Derive CDI
5,983,079 UART: [art] Store in in slot 0x4
6,068,452 UART: [art] Derive Key Pair
6,068,812 UART: [art] Store priv key in slot 0x5
6,081,772 UART: [art] Derive Key Pair - Done
6,096,761 UART: [art] Signing Cert with AUTHO
6,097,241 UART: RITY.KEYID = 7
6,112,761 UART: [art] Erasing AUTHORITY.KEYID = 7
6,113,526 UART: [art] PUB.X = 0102804E843F28CB95C196A90CBD65AA5E5A2A6E632E85C66F89A721E817870D49F12A4EB34542A8E7DC2AC4B97C262E
6,120,290 UART: [art] PUB.Y = 0A8B6E9230D96B94618BE08C7F2AEB56943EABF4DD5463469C299A9F999E91A80769C9F434669AF01E35DC31F75B6BD0
6,127,240 UART: [art] SIG.R = B46F87414C87E249FA6E441A92938C57451E426FA39A59AA697A02B889AA6F2C4287F3E5F3D1B277FF223299AFC129E2
6,134,009 UART: [art] SIG.S = 52615C86C87D2898B4562F3666B7630E8EDDB27FDD752A570CD2B15AAB0E31516F2820CCC957655344EBADD0B22C22BF
6,157,507 UART: Caliptra RT
6,157,852 UART: [state] CFI Enabled
6,450,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,480,278 UART: [rt]cmd =0x494e464f, len=4
6,483,797 >>> mbox cmd response data (312 bytes)
6,483,798 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,513,241 UART: [rt]cmd =0x43455252, len=4
6,523,931 >>> mbox cmd response data (783 bytes)
6,523,932 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,554,043 UART: [rt]cmd =0x44504543, len=92
6,738,186 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 ready_for_fw is high
1,056,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,474 >>> mbox cmd response: success
2,619,474 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,681,770 UART:
2,681,786 UART: Running Caliptra FMC ...
2,682,194 UART:
2,682,337 UART: [state] CFI Enabled
2,693,026 UART: [fht] FMC Alias Private Key: 7
2,800,905 UART: [art] Extend RT PCRs Done
2,801,333 UART: [art] Lock RT PCRs Done
2,802,729 UART: [art] Populate DV Done
2,810,966 UART: [fht] FMC Alias Private Key: 7
2,812,060 UART: [art] Derive CDI
2,812,340 UART: [art] Store in in slot 0x4
2,898,063 UART: [art] Derive Key Pair
2,898,423 UART: [art] Store priv key in slot 0x5
2,911,493 UART: [art] Derive Key Pair - Done
2,926,347 UART: [art] Signing Cert with AUTHO
2,926,827 UART: RITY.KEYID = 7
2,942,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,842 UART: [art] PUB.X = 21F836E6B2C240FA4AD90E36CB3E76EA516FCEA87B940BDCFFA31D37F5EE2B0287C859914DB803E40D92FD3CD0EEF1C3
2,949,621 UART: [art] PUB.Y = 73278EF97519507705EABDF7D8FF9AB8E7EF530382115CD1606C888A62CD3BAA37376D2110CFE29442584F1A92FAB551
2,956,569 UART: [art] SIG.R = 6C887901ABA0698AD8C3404EF87A33338532071D0BDF7D6042F4CA7308CF019F65EC8FCE7B3C62A3B9F0869B6C51853C
2,963,330 UART: [art] SIG.S = CA072655A5924C53F7EEB5E5144774224282050B17E06BDBCF56B22213018341E2966B38DE59B09EBBE139644EFF4C57
2,987,171 UART: Caliptra RT
2,987,516 UART: [state] CFI Enabled
3,094,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,437 UART: [rt]cmd =0x4453424c, len=4
3,139,554 >>> mbox cmd response data (8 bytes)
3,139,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,570,235 >>> mbox cmd response: success
5,570,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,583,257 UART:
5,583,273 UART: Running Caliptra FMC ...
5,583,681 UART:
5,583,824 UART: [state] CFI Enabled
5,673,517 UART: [art] Extend RT PCRs Done
5,673,945 UART: [art] Lock RT PCRs Done
5,675,422 UART: [art] Populate DV Done
5,683,433 UART: [fht] FMC Alias Private Key: 7
5,684,401 UART: [art] Derive CDI
5,684,681 UART: [art] Store in in slot 0x4
5,770,952 UART: [art] Derive Key Pair
5,771,312 UART: [art] Store priv key in slot 0x5
5,784,432 UART: [art] Derive Key Pair - Done
5,799,295 UART: [art] Signing Cert with AUTHO
5,799,775 UART: RITY.KEYID = 7
5,815,027 UART: [art] Erasing AUTHORITY.KEYID = 7
5,815,792 UART: [art] PUB.X = A24CC8BAFBC6E923186ECDF14E065F034A3C196D0323C9C3D6ACCEEF0077DAA3AF89FA041EEC5F1B78842334FAFCE829
5,822,554 UART: [art] PUB.Y = 320D83A3045202A0EDC07F9CD69B70749DA086B5E72ECE6F57DB57A27AB50401989CDEC56DDDF59F6B38AE22B55D7060
5,829,501 UART: [art] SIG.R = 35D5700719203534F1567C39BD3CC4A079D3ACE4E1027CD4086112D54F532B2B2435392805B8B677AB199AB8739115F8
5,836,249 UART: [art] SIG.S = ABE5BAA62F607F7AEAE5365B142E3C436FC77A72DB14AF1A4E956CEF25551855D00B62A08BAFF3D6B3C0A55E9AEDFAD0
5,860,153 UART: Caliptra RT
5,860,498 UART: [state] CFI Enabled
6,154,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,340 UART: [rt]cmd =0x494e464f, len=4
6,188,895 >>> mbox cmd response data (312 bytes)
6,188,896 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,218,335 UART: [rt]cmd =0x43455252, len=4
6,229,093 >>> mbox cmd response data (783 bytes)
6,229,094 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,259,033 UART: [rt]cmd =0x44504543, len=92
6,441,627 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,355 UART:
192,727 UART: Running Caliptra ROM ...
193,916 UART:
194,074 UART: [state] CFI Enabled
266,258 UART: [state] LifecycleState = Unprovisioned
268,235 UART: [state] DebugLocked = No
269,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,419 UART: [kat] SHA2-256
445,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,620 UART: [kat] ++
456,152 UART: [kat] sha1
467,271 UART: [kat] SHA2-256
469,964 UART: [kat] SHA2-384
475,553 UART: [kat] SHA2-512-ACC
477,923 UART: [kat] ECC-384
2,767,507 UART: [kat] HMAC-384Kdf
2,794,958 UART: [kat] LMS
3,985,211 UART: [kat] --
3,988,963 UART: [cold-reset] ++
3,991,357 UART: [fht] Storing FHT @ 0x50003400
4,001,850 UART: [idev] ++
4,002,425 UART: [idev] CDI.KEYID = 6
4,003,345 UART: [idev] SUBJECT.KEYID = 7
4,004,596 UART: [idev] UDS.KEYID = 0
4,005,640 ready_for_fw is high
4,005,839 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,148,934 UART: [idev] Erasing UDS.KEYID = 0
7,340,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,465 UART: [idev] --
7,365,775 UART: [ldev] ++
7,366,359 UART: [ldev] CDI.KEYID = 6
7,367,277 UART: [ldev] SUBJECT.KEYID = 5
7,368,489 UART: [ldev] AUTHORITY.KEYID = 7
7,369,775 UART: [ldev] FE.KEYID = 1
7,399,863 UART: [ldev] Erasing FE.KEYID = 1
10,728,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,034 UART: [ldev] --
13,106,871 UART: [fwproc] Waiting for Commands...
13,110,249 UART: [fwproc] Received command 0x46574c44
13,112,438 UART: [fwproc] Received Image of size 113760 bytes
17,161,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,618,403 >>> mbox cmd response: success
17,619,030 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,622,675 UART: [afmc] ++
17,623,255 UART: [afmc] CDI.KEYID = 6
17,624,166 UART: [afmc] SUBJECT.KEYID = 7
17,625,437 UART: [afmc] AUTHORITY.KEYID = 5
20,992,969 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,727 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,149 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,980 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,425 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,358,878 UART: [afmc] --
23,363,452 UART: [cold-reset] --
23,366,692 UART: [state] Locking Datavault
23,372,806 UART: [state] Locking PCR0, PCR1 and PCR31
23,374,559 UART: [state] Locking ICCM
23,376,364 UART: [exit] Launching FMC @ 0x40000130
23,384,763 UART:
23,385,004 UART: Running Caliptra FMC ...
23,386,110 UART:
23,386,274 UART: [state] CFI Enabled
23,447,789 UART: [fht] FMC Alias Private Key: 7
25,786,203 UART: [art] Extend RT PCRs Done
25,787,421 UART: [art] Lock RT PCRs Done
25,789,151 UART: [art] Populate DV Done
25,794,724 UART: [fht] FMC Alias Private Key: 7
25,796,312 UART: [art] Derive CDI
25,797,077 UART: [art] Store in in slot 0x4
25,852,637 UART: [art] Derive Key Pair
25,853,695 UART: [art] Store priv key in slot 0x5
29,145,395 UART: [art] Derive Key Pair - Done
29,158,455 UART: [art] Signing Cert with AUTHO
29,159,767 UART: RITY.KEYID = 7
31,454,894 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,400 UART: [art] PUB.X = F334F736138571830F786D3362218417F87BC3BE9D65325A6CDA561605868DB57FBC90C64D311C8A66B88BAC44B313B5
31,463,648 UART: [art] PUB.Y = EF237EFFFC6A4A0096A3574064B915D3E5E4FE1EC00465AA630E9FE9142CD06D0B19D2EFF1A2ED53BD0CC9887E7CE1F0
31,470,923 UART: [art] SIG.R = 877398BF92A5A10DAF69F03AA6D71B5C8480329E169AA4E0F506AF5FC566059EA5993217AE41444436E5118493E79CA0
31,478,309 UART: [art] SIG.S = C39AD093504BA3076605388A6003CA571A66C5DE7195C31E5E17C3DC2304DD4A16FBD9177E5EDB510DD2BAF51C9E24FE
32,783,722 UART: Caliptra RT
32,784,448 UART: [state] CFI Enabled
32,960,905 UART: [rt] RT listening for mailbox commands...
32,993,294 UART: [rt]cmd =0x44504543, len=136
38,599,042 >>> mbox cmd response data (136 bytes)
38,600,380 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,630,442 UART: [rt]cmd =0x4453424c, len=4
41,922,887 >>> mbox cmd response data (8 bytes)
41,923,412 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,953,891 UART: [rt]cmd =0x44504543, len=92
47,708,118 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,783,115 ready_for_fw is high
3,783,650 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,862,890 >>> mbox cmd response: success
17,863,584 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,564,307 UART:
23,564,698 UART: Running Caliptra FMC ...
23,565,845 UART:
23,566,007 UART: [state] CFI Enabled
23,634,138 UART: [fht] FMC Alias Private Key: 7
25,972,088 UART: [art] Extend RT PCRs Done
25,973,320 UART: [art] Lock RT PCRs Done
25,975,027 UART: [art] Populate DV Done
25,980,676 UART: [fht] FMC Alias Private Key: 7
25,982,166 UART: [art] Derive CDI
25,982,928 UART: [art] Store in in slot 0x4
26,043,236 UART: [art] Derive Key Pair
26,044,240 UART: [art] Store priv key in slot 0x5
29,337,222 UART: [art] Derive Key Pair - Done
29,350,384 UART: [art] Signing Cert with AUTHO
29,351,682 UART: RITY.KEYID = 7
31,639,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,024 UART: [art] PUB.X = E83F6316385F60F9A25BFBCDD109D52A8BE3A91447A6AAA8659ACCD155C324011D628F1EFC86DA879966A3606587345F
31,648,287 UART: [art] PUB.Y = DFB91E3D256868D6AE344E66DFD0E0A2B3B7EFC5DC19227A7046CB9C8A84005147BB2403C3F85F871EE66ED90A276E56
31,655,566 UART: [art] SIG.R = CE57A684D17FD271628A6C24631D730D01EA3BE180369399D9B50D1FC3C391F0F8A4F58C67F7DD0A415A70E9D2273C81
31,662,922 UART: [art] SIG.S = 2DA7E05EC5039881CE827DAE554336BC00F55DF6712EA0D6A8A711F85B7955DFB6D303F21B4E6449B7300E5478A152DA
32,967,960 UART: Caliptra RT
32,968,680 UART: [state] CFI Enabled
33,128,863 UART: [rt] RT listening for mailbox commands...
33,161,149 UART: [rt]cmd =0x44504543, len=136
38,785,222 >>> mbox cmd response data (136 bytes)
38,786,499 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,816,317 UART: [rt]cmd =0x4453424c, len=4
42,113,243 >>> mbox cmd response data (8 bytes)
42,113,764 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,144,197 UART: [rt]cmd =0x44504543, len=92
47,905,857 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
192,911 UART:
193,285 UART: Running Caliptra ROM ...
194,397 UART:
604,123 UART: [state] CFI Enabled
614,664 UART: [state] LifecycleState = Unprovisioned
616,609 UART: [state] DebugLocked = No
618,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,179 UART: [kat] SHA2-256
792,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,480 UART: [kat] ++
803,923 UART: [kat] sha1
814,576 UART: [kat] SHA2-256
817,288 UART: [kat] SHA2-384
824,075 UART: [kat] SHA2-512-ACC
826,412 UART: [kat] ECC-384
3,110,425 UART: [kat] HMAC-384Kdf
3,122,590 UART: [kat] LMS
4,312,659 UART: [kat] --
4,317,468 UART: [cold-reset] ++
4,320,132 UART: [fht] Storing FHT @ 0x50003400
4,330,766 UART: [idev] ++
4,331,328 UART: [idev] CDI.KEYID = 6
4,332,360 UART: [idev] SUBJECT.KEYID = 7
4,333,533 UART: [idev] UDS.KEYID = 0
4,334,509 ready_for_fw is high
4,334,703 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,558 UART: [idev] Erasing UDS.KEYID = 0
7,628,759 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,868 UART: [idev] --
7,653,806 UART: [ldev] ++
7,654,373 UART: [ldev] CDI.KEYID = 6
7,655,336 UART: [ldev] SUBJECT.KEYID = 5
7,656,546 UART: [ldev] AUTHORITY.KEYID = 7
7,657,826 UART: [ldev] FE.KEYID = 1
7,669,429 UART: [ldev] Erasing FE.KEYID = 1
10,963,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,665 UART: [ldev] --
13,325,138 UART: [fwproc] Waiting for Commands...
13,328,318 UART: [fwproc] Received command 0x46574c44
13,330,556 UART: [fwproc] Received Image of size 113760 bytes
17,384,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,843,557 >>> mbox cmd response: success
17,844,132 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,847,674 UART: [afmc] ++
17,848,263 UART: [afmc] CDI.KEYID = 6
17,849,215 UART: [afmc] SUBJECT.KEYID = 7
17,850,434 UART: [afmc] AUTHORITY.KEYID = 5
21,165,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,340 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,744 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,593 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,023 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,150 UART: [afmc] --
23,528,365 UART: [cold-reset] --
23,531,627 UART: [state] Locking Datavault
23,534,763 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,456 UART: [state] Locking ICCM
23,538,305 UART: [exit] Launching FMC @ 0x40000130
23,546,702 UART:
23,546,975 UART: Running Caliptra FMC ...
23,548,019 UART:
23,548,170 UART: [state] CFI Enabled
23,556,328 UART: [fht] FMC Alias Private Key: 7
25,887,216 UART: [art] Extend RT PCRs Done
25,888,438 UART: [art] Lock RT PCRs Done
25,890,145 UART: [art] Populate DV Done
25,895,393 UART: [fht] FMC Alias Private Key: 7
25,897,029 UART: [art] Derive CDI
25,897,762 UART: [art] Store in in slot 0x4
25,940,725 UART: [art] Derive Key Pair
25,941,767 UART: [art] Store priv key in slot 0x5
29,184,004 UART: [art] Derive Key Pair - Done
29,196,899 UART: [art] Signing Cert with AUTHO
29,198,204 UART: RITY.KEYID = 7
31,477,382 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,888 UART: [art] PUB.X = 78B7437B5F686A4BE6445A637847E7BAA2FA822EC0BCC370FDCB82A073F2992E81903CA5CDAC934A7BDD77CD85719BA0
31,486,169 UART: [art] PUB.Y = CAD913678B377FE3C532E3180089534924ABA701B641FFFA65D889042A64E264D9B0EE34EC3D26A2597B50835165B259
31,493,421 UART: [art] SIG.R = 27377786679F5FC625FF6B1F2151AC384627457C965CB6D1527BD803E072D3336A961697EFA51F8D36AECD9601845DF2
31,500,787 UART: [art] SIG.S = 9BE3FE3F85D78187FD24D1B657E23F210DBEBDC5BE89B39B2B709CBB3988E6440475F5947F80DFDAA8627161E2CA9594
32,806,470 UART: Caliptra RT
32,807,170 UART: [state] CFI Enabled
32,924,190 UART: [rt] RT listening for mailbox commands...
32,956,898 UART: [rt]cmd =0x44504543, len=136
38,516,121 >>> mbox cmd response data (136 bytes)
38,517,456 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,547,447 UART: [rt]cmd =0x4453424c, len=4
41,790,584 >>> mbox cmd response data (8 bytes)
41,791,100 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,821,906 UART: [rt]cmd =0x44504543, len=92
47,496,012 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,643 writing to cptra_bootfsm_go
4,124,033 ready_for_fw is high
4,124,659 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,058,989 >>> mbox cmd response: success
18,059,723 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,701,713 UART:
23,702,105 UART: Running Caliptra FMC ...
23,703,201 UART:
23,703,350 UART: [state] CFI Enabled
23,711,305 UART: [fht] FMC Alias Private Key: 7
26,042,465 UART: [art] Extend RT PCRs Done
26,043,696 UART: [art] Lock RT PCRs Done
26,045,405 UART: [art] Populate DV Done
26,050,710 UART: [fht] FMC Alias Private Key: 7
26,052,201 UART: [art] Derive CDI
26,052,967 UART: [art] Store in in slot 0x4
26,095,665 UART: [art] Derive Key Pair
26,096,667 UART: [art] Store priv key in slot 0x5
29,338,661 UART: [art] Derive Key Pair - Done
29,351,568 UART: [art] Signing Cert with AUTHO
29,352,877 UART: RITY.KEYID = 7
31,632,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,569 UART: [art] PUB.X = A2CBD7BD369E7E0D550E0259B66856C1C435133CFD426711AB2BA1446E375632F42AB6C76BB9A04B83213E7E161AC486
31,640,865 UART: [art] PUB.Y = 33870FB9A2CF9D3D1E3C424132EE49059140413E6BEF5ECDC373029D98E6B5EF7B8DF4BAFCF274708BE3108CC8545341
31,648,058 UART: [art] SIG.R = AC3E859A70A9BE979EEA0FC41CE0F1304FA6E160F457A183962092ADE08E6D33593A97E79C03417573D0665DCA79098F
31,655,437 UART: [art] SIG.S = B9F11265B06D0289041428055D9827F51A19EEE5D5655F376B6B3EC9B429AE2924915433C1ED3564FEA652473F25860E
32,961,162 UART: Caliptra RT
32,961,866 UART: [state] CFI Enabled
33,080,020 UART: [rt] RT listening for mailbox commands...
33,112,357 UART: [rt]cmd =0x44504543, len=136
38,671,091 >>> mbox cmd response data (136 bytes)
38,672,435 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,702,278 UART: [rt]cmd =0x4453424c, len=4
41,945,528 >>> mbox cmd response data (8 bytes)
41,946,071 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,976,732 UART: [rt]cmd =0x44504543, len=92
47,649,441 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,512 UART:
192,889 UART: Running Caliptra ROM ...
194,038 UART:
194,189 UART: [state] CFI Enabled
264,972 UART: [state] LifecycleState = Unprovisioned
266,840 UART: [state] DebugLocked = No
268,165 UART: [state] WD Timer not started. Device not locked for debugging
271,066 UART: [kat] SHA2-256
450,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,713 UART: [kat] ++
462,311 UART: [kat] sha1
473,685 UART: [kat] SHA2-256
476,686 UART: [kat] SHA2-384
481,676 UART: [kat] SHA2-512-ACC
484,676 UART: [kat] ECC-384
2,951,033 UART: [kat] HMAC-384Kdf
2,970,806 UART: [kat] LMS
3,500,239 UART: [kat] --
3,506,530 UART: [cold-reset] ++
3,507,896 UART: [fht] FHT @ 0x50003400
3,517,446 UART: [idev] ++
3,518,029 UART: [idev] CDI.KEYID = 6
3,518,941 UART: [idev] SUBJECT.KEYID = 7
3,520,107 UART: [idev] UDS.KEYID = 0
3,521,147 ready_for_fw is high
3,521,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,851 UART: [idev] Erasing UDS.KEYID = 0
6,024,516 UART: [idev] Sha1 KeyId Algorithm
6,048,077 UART: [idev] --
6,051,750 UART: [ldev] ++
6,052,322 UART: [ldev] CDI.KEYID = 6
6,053,338 UART: [ldev] SUBJECT.KEYID = 5
6,054,446 UART: [ldev] AUTHORITY.KEYID = 7
6,055,672 UART: [ldev] FE.KEYID = 1
6,098,306 UART: [ldev] Erasing FE.KEYID = 1
8,607,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,676 UART: [ldev] --
10,409,963 UART: [fwproc] Wait for Commands...
10,411,570 UART: [fwproc] Recv command 0x46574c44
10,413,655 UART: [fwproc] Recv'd Img size: 114084 bytes
13,807,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,268,458 >>> mbox cmd response: success
14,269,024 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,273,220 UART: [afmc] ++
14,273,799 UART: [afmc] CDI.KEYID = 6
14,274,706 UART: [afmc] SUBJECT.KEYID = 7
14,275,859 UART: [afmc] AUTHORITY.KEYID = 5
16,800,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,511 UART: [afmc] --
18,605,900 UART: [cold-reset] --
18,609,487 UART: [state] Locking Datavault
18,614,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,272 UART: [state] Locking ICCM
18,618,311 UART: [exit] Launching FMC @ 0x40000130
18,626,702 UART:
18,626,930 UART: Running Caliptra FMC ...
18,628,028 UART:
18,628,193 UART: [state] CFI Enabled
18,688,176 UART: [fht] FMC Alias Private Key: 7
20,452,465 UART: [art] Extend RT PCRs Done
20,453,685 UART: [art] Lock RT PCRs Done
20,455,528 UART: [art] Populate DV Done
20,461,049 UART: [fht] FMC Alias Private Key: 7
20,462,638 UART: [art] Derive CDI
20,463,445 UART: [art] Store in in slot 0x4
20,521,054 UART: [art] Derive Key Pair
20,522,096 UART: [art] Store priv key in slot 0x5
22,984,636 UART: [art] Derive Key Pair - Done
22,997,359 UART: [art] Signing Cert with AUTHO
22,998,666 UART: RITY.KEYID = 7
24,711,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,803 UART: [art] PUB.X = A121D2C839256D175180261D09CFA51F5AC7FD9D39992A096407F5014DA217C43AF52B8AC2C6C0B76FD4B85593429181
24,720,033 UART: [art] PUB.Y = 0E4EE17090EB867CB738064991AB792CAC6EA2BFCEAB34EA01BB03BE0B5C60998B9154B1564954ED6C65DF453D353C07
24,727,284 UART: [art] SIG.R = C329470A045121AE9127741E766A9C048DF50C86193CD00CA483C98528FB97D318C67676CD90B36306DA9C47803D3906
24,734,683 UART: [art] SIG.S = F70092B3212CE4096D955E62C7612B5B628B443F7AC9A29EF7707DA202B43C359064515726782226D8D510A484CE2E21
25,713,605 UART: Caliptra RT
25,714,308 UART: [state] CFI Enabled
25,878,415 UART: [rt] RT listening for mailbox commands...
25,910,578 UART: [rt]cmd =0x44504543, len=136
30,127,946 >>> mbox cmd response data (136 bytes)
30,129,276 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,159,221 UART: [rt]cmd =0x4453424c, len=4
32,624,323 >>> mbox cmd response data (8 bytes)
32,624,851 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,655,112 UART: [rt]cmd =0x44504543, len=92
37,008,531 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,363,177 ready_for_fw is high
3,363,592 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,041 >>> mbox cmd response: success
14,041,990 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,322,179 UART:
18,322,585 UART: Running Caliptra FMC ...
18,323,727 UART:
18,323,884 UART: [state] CFI Enabled
18,391,132 UART: [fht] FMC Alias Private Key: 7
20,155,327 UART: [art] Extend RT PCRs Done
20,156,555 UART: [art] Lock RT PCRs Done
20,158,453 UART: [art] Populate DV Done
20,163,857 UART: [fht] FMC Alias Private Key: 7
20,165,555 UART: [art] Derive CDI
20,166,373 UART: [art] Store in in slot 0x4
20,224,370 UART: [art] Derive Key Pair
20,225,407 UART: [art] Store priv key in slot 0x5
22,688,273 UART: [art] Derive Key Pair - Done
22,701,338 UART: [art] Signing Cert with AUTHO
22,702,641 UART: RITY.KEYID = 7
24,414,513 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,008 UART: [art] PUB.X = 85F74CE0579DC7C830322EDF52B2C05989B44BC8A9A09DF65BEB6F42041C96BC9ED7DAF5AB9060D4583B46AAF7AD3DBA
24,423,295 UART: [art] PUB.Y = 38DF45F2C78268E745BE3C0F2F9737BB3EA49D076150AF2C706212610306DA00F003F4F3BA42419BBBD3A83E61480D16
24,430,577 UART: [art] SIG.R = 19D6ACA7EAFF0D1EAAD54CD076B1BCE00348485A05E2C05B4AC9120253E3713F8CE46A677344DD9B4D1269F19CE7928A
24,437,986 UART: [art] SIG.S = 73F9ECC4954795EA7174E52234AD14AA680E40CFDECD2F78B1DB99522D55CC1B6DF5931B7753685BE6AE05DC2700D4B2
25,416,742 UART: Caliptra RT
25,417,437 UART: [state] CFI Enabled
25,583,841 UART: [rt] RT listening for mailbox commands...
25,616,300 UART: [rt]cmd =0x44504543, len=136
29,833,351 >>> mbox cmd response data (136 bytes)
29,834,675 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,864,292 UART: [rt]cmd =0x4453424c, len=4
32,331,060 >>> mbox cmd response data (8 bytes)
32,331,580 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,362,054 UART: [rt]cmd =0x44504543, len=92
36,716,996 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,998 UART:
193,374 UART: Running Caliptra ROM ...
194,577 UART:
604,150 UART: [state] CFI Enabled
617,174 UART: [state] LifecycleState = Unprovisioned
619,065 UART: [state] DebugLocked = No
621,298 UART: [state] WD Timer not started. Device not locked for debugging
625,670 UART: [kat] SHA2-256
804,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,362 UART: [kat] ++
816,809 UART: [kat] sha1
829,240 UART: [kat] SHA2-256
832,254 UART: [kat] SHA2-384
838,884 UART: [kat] SHA2-512-ACC
841,893 UART: [kat] ECC-384
3,281,402 UART: [kat] HMAC-384Kdf
3,293,571 UART: [kat] LMS
3,823,054 UART: [kat] --
3,826,777 UART: [cold-reset] ++
3,828,716 UART: [fht] FHT @ 0x50003400
3,838,984 UART: [idev] ++
3,839,548 UART: [idev] CDI.KEYID = 6
3,840,431 UART: [idev] SUBJECT.KEYID = 7
3,841,674 UART: [idev] UDS.KEYID = 0
3,842,575 ready_for_fw is high
3,842,770 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,036 UART: [idev] Erasing UDS.KEYID = 0
6,320,616 UART: [idev] Sha1 KeyId Algorithm
6,343,770 UART: [idev] --
6,346,209 UART: [ldev] ++
6,346,780 UART: [ldev] CDI.KEYID = 6
6,347,698 UART: [ldev] SUBJECT.KEYID = 5
6,348,922 UART: [ldev] AUTHORITY.KEYID = 7
6,350,159 UART: [ldev] FE.KEYID = 1
6,358,661 UART: [ldev] Erasing FE.KEYID = 1
8,834,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,331 UART: [ldev] --
10,627,553 UART: [fwproc] Wait for Commands...
10,629,040 UART: [fwproc] Recv command 0x46574c44
10,631,150 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,070 >>> mbox cmd response: success
14,486,680 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,489,521 UART: [afmc] ++
14,490,128 UART: [afmc] CDI.KEYID = 6
14,491,042 UART: [afmc] SUBJECT.KEYID = 7
14,492,206 UART: [afmc] AUTHORITY.KEYID = 5
16,991,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,181 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,835 UART: [afmc] --
18,787,246 UART: [cold-reset] --
18,790,900 UART: [state] Locking Datavault
18,796,631 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,346 UART: [state] Locking ICCM
18,799,846 UART: [exit] Launching FMC @ 0x40000130
18,808,246 UART:
18,808,498 UART: Running Caliptra FMC ...
18,809,606 UART:
18,809,762 UART: [state] CFI Enabled
18,817,969 UART: [fht] FMC Alias Private Key: 7
20,575,090 UART: [art] Extend RT PCRs Done
20,576,313 UART: [art] Lock RT PCRs Done
20,578,075 UART: [art] Populate DV Done
20,583,162 UART: [fht] FMC Alias Private Key: 7
20,584,754 UART: [art] Derive CDI
20,585,495 UART: [art] Store in in slot 0x4
20,628,459 UART: [art] Derive Key Pair
20,629,491 UART: [art] Store priv key in slot 0x5
23,056,384 UART: [art] Derive Key Pair - Done
23,069,330 UART: [art] Signing Cert with AUTHO
23,070,635 UART: RITY.KEYID = 7
24,776,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,612 UART: [art] PUB.X = B5953FFC22540E5B5EC8542B1C8C4C3C0570B4ADF813FF3668D4FE313D420E413549B7C3AEB53E7B98A5E8DAFA9DD4A0
24,784,901 UART: [art] PUB.Y = A426B565BB0572158C130C474BC7AC218E20FBEAF9D9E3F3489980814A387684D5814A6AB76367928FA0288DC489707E
24,792,163 UART: [art] SIG.R = 5968BFDE6ED2CEE1544CB24F7AA4B16861587AE6F666111C71D835CFCA38F8911A5DBC92F807DD420A270C9F22B7CA18
24,799,532 UART: [art] SIG.S = 025A8DAFA992C44C3E2530DE91050ECBB3EAFA1CCFE6074826C33B5ADBB6EDAD9B9AFD410B7DEDDDC7FAE0DA362ADC38
25,778,636 UART: Caliptra RT
25,779,347 UART: [state] CFI Enabled
25,896,523 UART: [rt] RT listening for mailbox commands...
25,928,690 UART: [rt]cmd =0x44504543, len=136
30,099,286 >>> mbox cmd response data (136 bytes)
30,100,619 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,130,351 UART: [rt]cmd =0x4453424c, len=4
32,558,097 >>> mbox cmd response data (8 bytes)
32,558,612 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,589,244 UART: [rt]cmd =0x44504543, len=92
36,874,322 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,697,667 ready_for_fw is high
3,698,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,373 >>> mbox cmd response: success
14,267,054 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,520,024 UART:
18,520,426 UART: Running Caliptra FMC ...
18,521,538 UART:
18,521,692 UART: [state] CFI Enabled
18,529,480 UART: [fht] FMC Alias Private Key: 7
20,286,418 UART: [art] Extend RT PCRs Done
20,287,636 UART: [art] Lock RT PCRs Done
20,289,154 UART: [art] Populate DV Done
20,294,634 UART: [fht] FMC Alias Private Key: 7
20,296,323 UART: [art] Derive CDI
20,297,157 UART: [art] Store in in slot 0x4
20,340,036 UART: [art] Derive Key Pair
20,341,044 UART: [art] Store priv key in slot 0x5
22,767,664 UART: [art] Derive Key Pair - Done
22,780,669 UART: [art] Signing Cert with AUTHO
22,782,001 UART: RITY.KEYID = 7
24,487,628 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,118 UART: [art] PUB.X = B3994BD8E8953CC9D4825C5DB77B29FB1CED4D5F8F087104F3FB7FC6C5F9F1EFE8D22869AF773886E4084C3FD6DF8F17
24,496,391 UART: [art] PUB.Y = C315FF095B0A83EEC0D7ED80E07A3F7B7AB628DEB92649869396C00BEAA93F2CE03C73A725B780048B413183424F276C
24,503,689 UART: [art] SIG.R = 047704E044C591F8F181D2C0C696964B3A9F2BA623641EF7C0DFF8E65254CDC271DE6D632BFDD634C3D4E12219726E64
24,511,056 UART: [art] SIG.S = 9409AEE2137A5144266988187FBB25BB2A3EBFCD0D7291A229800A1BAE03A6B3DABAA3C6AEA1EDB820E2737631A48CE9
25,490,834 UART: Caliptra RT
25,491,552 UART: [state] CFI Enabled
25,608,170 UART: [rt] RT listening for mailbox commands...
25,640,242 UART: [rt]cmd =0x44504543, len=136
29,810,198 >>> mbox cmd response data (136 bytes)
29,811,480 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,841,053 UART: [rt]cmd =0x4453424c, len=4
32,268,472 >>> mbox cmd response data (8 bytes)
32,269,003 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,299,444 UART: [rt]cmd =0x44504543, len=92
36,584,777 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,417 UART:
192,818 UART: Running Caliptra ROM ...
193,930 UART:
194,070 UART: [state] CFI Enabled
262,561 UART: [state] LifecycleState = Unprovisioned
264,994 UART: [state] DebugLocked = No
267,225 UART: [state] WD Timer not started. Device not locked for debugging
272,408 UART: [kat] SHA2-256
462,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,069 UART: [kat] ++
473,524 UART: [kat] sha1
484,112 UART: [kat] SHA2-256
487,121 UART: [kat] SHA2-384
493,322 UART: [kat] SHA2-512-ACC
495,904 UART: [kat] ECC-384
2,947,263 UART: [kat] HMAC-384Kdf
2,971,792 UART: [kat] LMS
3,503,563 UART: [kat] --
3,509,779 UART: [cold-reset] ++
3,511,279 UART: [fht] FHT @ 0x50003400
3,522,750 UART: [idev] ++
3,523,478 UART: [idev] CDI.KEYID = 6
3,524,403 UART: [idev] SUBJECT.KEYID = 7
3,525,574 UART: [idev] UDS.KEYID = 0
3,526,495 ready_for_fw is high
3,526,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,167 UART: [idev] Erasing UDS.KEYID = 0
6,030,999 UART: [idev] Sha1 KeyId Algorithm
6,053,472 UART: [idev] --
6,057,443 UART: [ldev] ++
6,058,128 UART: [ldev] CDI.KEYID = 6
6,059,014 UART: [ldev] SUBJECT.KEYID = 5
6,060,227 UART: [ldev] AUTHORITY.KEYID = 7
6,061,455 UART: [ldev] FE.KEYID = 1
6,100,811 UART: [ldev] Erasing FE.KEYID = 1
8,606,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,183 UART: [ldev] --
10,413,795 UART: [fwproc] Wait for Commands...
10,415,941 UART: [fwproc] Recv command 0x46574c44
10,418,245 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,290 >>> mbox cmd response: success
14,598,898 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,603,177 UART: [afmc] ++
14,603,875 UART: [afmc] CDI.KEYID = 6
14,605,121 UART: [afmc] SUBJECT.KEYID = 7
14,606,565 UART: [afmc] AUTHORITY.KEYID = 5
17,150,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,997 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,684 UART: [afmc] --
18,967,059 UART: [cold-reset] --
18,970,875 UART: [state] Locking Datavault
18,974,792 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,948 UART: [state] Locking ICCM
18,978,399 UART: [exit] Launching FMC @ 0x40000130
18,987,081 UART:
18,987,314 UART: Running Caliptra FMC ...
18,988,408 UART:
18,988,561 UART: [state] CFI Enabled
19,051,210 UART: [fht] FMC Alias Private Key: 7
20,815,430 UART: [art] Extend RT PCRs Done
20,816,658 UART: [art] Lock RT PCRs Done
20,818,206 UART: [art] Populate DV Done
20,823,724 UART: [fht] FMC Alias Private Key: 7
20,825,416 UART: [art] Derive CDI
20,826,149 UART: [art] Store in in slot 0x4
20,883,700 UART: [art] Derive Key Pair
20,884,739 UART: [art] Store priv key in slot 0x5
23,348,243 UART: [art] Derive Key Pair - Done
23,361,397 UART: [art] Signing Cert with AUTHO
23,362,699 UART: RITY.KEYID = 7
25,074,176 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,686 UART: [art] PUB.X = CEA5DB505001BEA764F91DD733B158CE6A3B3893057B151C3211B0D3C805F7F5D6D105E27E30A5668CBC7971125763FB
25,082,948 UART: [art] PUB.Y = 2AB073CAB0F9765C56EA0E6057149C5768737E086808B0E45F1CF7D03268223D31555D210AA59BC41AFD5CDF88CB022A
25,090,196 UART: [art] SIG.R = 1B3D444D56CE652FAD43DDA90A55968A475F76BF81013F83663DF67EA576FD8CDB1E8715820CBCF2E8AAA05ABB7FE955
25,097,674 UART: [art] SIG.S = 3A82D7778C8E17EC65468A03A2628DF64ECBB80E56C4779F0C681734DE65A50A8BB23E3B1E8C0018C7709878C75F2EA8
26,076,694 UART: Caliptra RT
26,077,414 UART: [state] CFI Enabled
26,242,736 UART: [rt] RT listening for mailbox commands...
26,275,182 UART: [rt]cmd =0x44504543, len=136
30,492,746 >>> mbox cmd response data (136 bytes)
30,494,173 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,523,890 UART: [rt]cmd =0x4453424c, len=4
32,990,602 >>> mbox cmd response data (8 bytes)
32,991,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,021,672 UART: [rt]cmd =0x44504543, len=92
37,375,857 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,435,981 ready_for_fw is high
3,436,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,726,206 >>> mbox cmd response: success
14,727,001 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,004,873 UART:
19,005,292 UART: Running Caliptra FMC ...
19,006,472 UART:
19,006,640 UART: [state] CFI Enabled
19,070,903 UART: [fht] FMC Alias Private Key: 7
20,835,643 UART: [art] Extend RT PCRs Done
20,836,871 UART: [art] Lock RT PCRs Done
20,838,604 UART: [art] Populate DV Done
20,843,916 UART: [fht] FMC Alias Private Key: 7
20,845,508 UART: [art] Derive CDI
20,846,318 UART: [art] Store in in slot 0x4
20,904,327 UART: [art] Derive Key Pair
20,905,370 UART: [art] Store priv key in slot 0x5
23,368,204 UART: [art] Derive Key Pair - Done
23,381,309 UART: [art] Signing Cert with AUTHO
23,382,605 UART: RITY.KEYID = 7
25,094,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,969 UART: [art] PUB.X = 7CF8086956ED4A4653FD833F177E145055F32F18B0079520BFC7D9289E6FB4D227686A096983E992A3B07637D8DE1914
25,103,195 UART: [art] PUB.Y = 68D0E879DD2CF328E30A6CE1C37F54ABBB0675DEA3CCF64CF15484DD3E454061FFEF21BE42A13DDD9022059E6F59C09C
25,110,461 UART: [art] SIG.R = 90F501DC84947D6FDD4581F17929EDE106BCC09092EE18862EDCB3C126CB32AF4B4BF59C875164A7169579478BEC64BA
25,117,885 UART: [art] SIG.S = 5A4A744458589092694020D6844DD887E7DD2BE3691E04B8D7346E37DBA66CB38E4CF06B53EF142EF4CCF826A84996B9
26,096,375 UART: Caliptra RT
26,097,101 UART: [state] CFI Enabled
26,263,236 UART: [rt] RT listening for mailbox commands...
26,295,737 UART: [rt]cmd =0x44504543, len=136
30,513,588 >>> mbox cmd response data (136 bytes)
30,514,891 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,544,611 UART: [rt]cmd =0x4453424c, len=4
33,011,250 >>> mbox cmd response data (8 bytes)
33,011,775 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,042,321 UART: [rt]cmd =0x44504543, len=92
37,397,505 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,916 writing to cptra_bootfsm_go
193,008 UART:
193,389 UART: Running Caliptra ROM ...
194,589 UART:
604,141 UART: [state] CFI Enabled
617,665 UART: [state] LifecycleState = Unprovisioned
620,044 UART: [state] DebugLocked = No
622,149 UART: [state] WD Timer not started. Device not locked for debugging
626,184 UART: [kat] SHA2-256
816,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,862 UART: [kat] ++
827,383 UART: [kat] sha1
838,608 UART: [kat] SHA2-256
841,564 UART: [kat] SHA2-384
848,198 UART: [kat] SHA2-512-ACC
850,789 UART: [kat] ECC-384
3,295,039 UART: [kat] HMAC-384Kdf
3,307,696 UART: [kat] LMS
3,839,566 UART: [kat] --
3,845,294 UART: [cold-reset] ++
3,847,162 UART: [fht] FHT @ 0x50003400
3,857,712 UART: [idev] ++
3,858,420 UART: [idev] CDI.KEYID = 6
3,859,372 UART: [idev] SUBJECT.KEYID = 7
3,860,611 UART: [idev] UDS.KEYID = 0
3,861,508 ready_for_fw is high
3,861,697 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,977 UART: [idev] Erasing UDS.KEYID = 0
6,342,493 UART: [idev] Sha1 KeyId Algorithm
6,364,829 UART: [idev] --
6,370,175 UART: [ldev] ++
6,370,853 UART: [ldev] CDI.KEYID = 6
6,371,734 UART: [ldev] SUBJECT.KEYID = 5
6,372,943 UART: [ldev] AUTHORITY.KEYID = 7
6,374,176 UART: [ldev] FE.KEYID = 1
6,383,928 UART: [ldev] Erasing FE.KEYID = 1
8,861,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,112 UART: [ldev] --
10,650,591 UART: [fwproc] Wait for Commands...
10,652,199 UART: [fwproc] Recv command 0x46574c44
10,654,509 UART: [fwproc] Recv'd Img size: 114084 bytes
14,090,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,237 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,876 >>> mbox cmd response: success
14,824,479 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,827,321 UART: [afmc] ++
14,828,074 UART: [afmc] CDI.KEYID = 6
14,829,187 UART: [afmc] SUBJECT.KEYID = 7
14,830,738 UART: [afmc] AUTHORITY.KEYID = 5
17,336,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,668 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,088,817 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,103,853 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,692 UART: [afmc] --
19,129,880 UART: [cold-reset] --
19,133,588 UART: [state] Locking Datavault
19,138,420 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,630 UART: [state] Locking ICCM
19,142,138 UART: [exit] Launching FMC @ 0x40000130
19,150,825 UART:
19,151,063 UART: Running Caliptra FMC ...
19,152,167 UART:
19,152,327 UART: [state] CFI Enabled
19,160,482 UART: [fht] FMC Alias Private Key: 7
20,917,274 UART: [art] Extend RT PCRs Done
20,918,478 UART: [art] Lock RT PCRs Done
20,919,796 UART: [art] Populate DV Done
20,925,480 UART: [fht] FMC Alias Private Key: 7
20,927,124 UART: [art] Derive CDI
20,927,863 UART: [art] Store in in slot 0x4
20,970,399 UART: [art] Derive Key Pair
20,971,463 UART: [art] Store priv key in slot 0x5
23,397,933 UART: [art] Derive Key Pair - Done
23,410,872 UART: [art] Signing Cert with AUTHO
23,412,174 UART: RITY.KEYID = 7
25,118,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,621 UART: [art] PUB.X = 98FB6D1800E8274B7F176298040AE5E22FCBA1BDE8788CFBFFEC7A61217C6DE5230D76B358F8D30A2B08DDCB96EE009A
25,126,841 UART: [art] PUB.Y = 9BD76E458B595A9A2749DCC6579D24A9B36371A491AF3233AC3073CB1A0DDA746136C142A2FC44DF6A0631C58BA1AFDF
25,134,106 UART: [art] SIG.R = 6903C21B74F9CD3ED7CDB4C7A57D5C7D17CB9057BF05022795D129EE0FA6CF17409AFA9076740D9FF44AE2A62DF3AA2B
25,141,525 UART: [art] SIG.S = 7B85E0BD47F7A43ACF858E6FC83A1FB0D355ED7C5575E851670188DDEFFCCC63570EBCE6E99AF3AFB43E1FF42EFCA00F
26,120,053 UART: Caliptra RT
26,120,748 UART: [state] CFI Enabled
26,237,769 UART: [rt] RT listening for mailbox commands...
26,269,991 UART: [rt]cmd =0x44504543, len=136
30,438,978 >>> mbox cmd response data (136 bytes)
30,440,284 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,470,090 UART: [rt]cmd =0x4453424c, len=4
32,897,535 >>> mbox cmd response data (8 bytes)
32,898,055 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,928,639 UART: [rt]cmd =0x44504543, len=92
37,213,262 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
3,761,279 ready_for_fw is high
3,761,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,572 >>> mbox cmd response: success
14,953,451 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,208,851 UART:
19,209,244 UART: Running Caliptra FMC ...
19,210,456 UART:
19,210,631 UART: [state] CFI Enabled
19,218,255 UART: [fht] FMC Alias Private Key: 7
20,975,411 UART: [art] Extend RT PCRs Done
20,976,639 UART: [art] Lock RT PCRs Done
20,978,241 UART: [art] Populate DV Done
20,983,663 UART: [fht] FMC Alias Private Key: 7
20,985,219 UART: [art] Derive CDI
20,985,986 UART: [art] Store in in slot 0x4
21,028,195 UART: [art] Derive Key Pair
21,029,194 UART: [art] Store priv key in slot 0x5
23,455,479 UART: [art] Derive Key Pair - Done
23,468,423 UART: [art] Signing Cert with AUTHO
23,469,727 UART: RITY.KEYID = 7
25,175,128 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,639 UART: [art] PUB.X = FB1FBADBCB9BED4B88F617F2012D60A3B07A5781B76BDDBBBDE729159D32454A6A4EA3EC312F1C0635554859B77F2183
25,183,958 UART: [art] PUB.Y = B3A3F656648A52ED4AFDFBE7918280688F71607588FFA78C772C93F566007244AC4482F1E57EA298B334CE56F7C5E4CA
25,191,139 UART: [art] SIG.R = 990301B3B7F38FAF626CA3FECB9426A8CBF6CE2A2DE1F299BA52CBCC7298B7813055A2EEADB151F19FF61449450258D4
25,198,580 UART: [art] SIG.S = 90FC71D1285992448D61A6988ABD548F70CA2A4E98A7777FBA020BE799CD152F7EB0ED2A3ECEBBF20C448DC7239968D8
26,177,760 UART: Caliptra RT
26,178,453 UART: [state] CFI Enabled
26,295,972 UART: [rt] RT listening for mailbox commands...
26,328,174 UART: [rt]cmd =0x44504543, len=136
30,497,690 >>> mbox cmd response data (136 bytes)
30,498,985 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,528,807 UART: [rt]cmd =0x4453424c, len=4
32,955,997 >>> mbox cmd response data (8 bytes)
32,956,527 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,986,952 UART: [rt]cmd =0x44504543, len=92
37,271,054 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,333 UART: [kat] SHA2-256
882,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,379 UART: [kat] ++
886,531 UART: [kat] sha1
890,883 UART: [kat] SHA2-256
892,821 UART: [kat] SHA2-384
895,588 UART: [kat] SHA2-512-ACC
897,489 UART: [kat] ECC-384
902,828 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,476,895 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 ready_for_fw is high
1,480,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,824 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,298 UART: [idev] --
1,515,513 UART: [ldev] ++
1,515,681 UART: [ldev] CDI.KEYID = 6
1,516,044 UART: [ldev] SUBJECT.KEYID = 5
1,516,470 UART: [ldev] AUTHORITY.KEYID = 7
1,516,933 UART: [ldev] FE.KEYID = 1
1,522,657 UART: [ldev] Erasing FE.KEYID = 1
1,548,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,070 UART: [ldev] --
1,587,381 UART: [fwproc] Waiting for Commands...
1,588,170 UART: [fwproc] Received command 0x46574c44
1,588,961 UART: [fwproc] Received Image of size 114084 bytes
2,884,331 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,139 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,110 >>> mbox cmd response: success
3,076,110 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,077,314 UART: [afmc] ++
3,077,482 UART: [afmc] CDI.KEYID = 6
3,077,844 UART: [afmc] SUBJECT.KEYID = 7
3,078,269 UART: [afmc] AUTHORITY.KEYID = 5
3,112,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,560 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,445 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,135 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,146 UART: [afmc] --
3,156,272 UART: [cold-reset] --
3,157,226 UART: [state] Locking Datavault
3,158,331 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,935 UART: [state] Locking ICCM
3,159,397 UART: [exit] Launching FMC @ 0x40000130
3,164,726 UART:
3,164,742 UART: Running Caliptra FMC ...
3,165,150 UART:
3,165,204 UART: [state] CFI Enabled
3,175,757 UART: [fht] FMC Alias Private Key: 7
3,283,720 UART: [art] Extend RT PCRs Done
3,284,148 UART: [art] Lock RT PCRs Done
3,285,550 UART: [art] Populate DV Done
3,293,903 UART: [fht] FMC Alias Private Key: 7
3,294,887 UART: [art] Derive CDI
3,295,167 UART: [art] Store in in slot 0x4
3,380,312 UART: [art] Derive Key Pair
3,380,672 UART: [art] Store priv key in slot 0x5
3,393,968 UART: [art] Derive Key Pair - Done
3,408,705 UART: [art] Signing Cert with AUTHO
3,409,185 UART: RITY.KEYID = 7
3,424,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,234 UART: [art] PUB.X = CC24166DD2BA2E420197CED74A665E0C8E2F80C4725976D44B93B4B147B56D10AE214FC7DC021CE8C1673A39697933F0
3,431,999 UART: [art] PUB.Y = E20F3B450A5B31CD1E09486FC0F8A409A9A9757516065A441420B78E44CDF30A5E029D492E4F9B53D6B721CB57626AF4
3,438,930 UART: [art] SIG.R = 818FFFA2FB9130A81CB118FBDB67CDF26A7D2EAB12D778FB2280EF60C0635F6D7D13F74ECA16F13EE52C1E6CC96603FA
3,445,721 UART: [art] SIG.S = CF3E3EF0467FB4D4D1E7CAE00F288F19651C70DBC4C6CB3FBBC52EA9E491271DBC79A1B496911E7324636558BC2FE1F8
3,468,837 UART: Caliptra RT
3,469,090 UART: [state] CFI Enabled
3,576,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,542 UART: [rt]cmd =0x44504543, len=136
3,672,584 >>> mbox cmd response data (136 bytes)
3,672,585 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,772 UART: [rt]cmd =0x4453424c, len=4
3,715,613 >>> mbox cmd response data (8 bytes)
3,715,614 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,599 UART: [rt]cmd =0x44504543, len=92
3,928,793 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,093 ready_for_fw is high
1,363,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,084 >>> mbox cmd response: success
2,925,084 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,986,140 UART:
2,986,156 UART: Running Caliptra FMC ...
2,986,564 UART:
2,986,618 UART: [state] CFI Enabled
2,997,301 UART: [fht] FMC Alias Private Key: 7
3,105,038 UART: [art] Extend RT PCRs Done
3,105,466 UART: [art] Lock RT PCRs Done
3,106,848 UART: [art] Populate DV Done
3,115,111 UART: [fht] FMC Alias Private Key: 7
3,116,231 UART: [art] Derive CDI
3,116,511 UART: [art] Store in in slot 0x4
3,201,848 UART: [art] Derive Key Pair
3,202,208 UART: [art] Store priv key in slot 0x5
3,215,642 UART: [art] Derive Key Pair - Done
3,230,513 UART: [art] Signing Cert with AUTHO
3,230,993 UART: RITY.KEYID = 7
3,245,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,576 UART: [art] PUB.X = C737F6F1ED882E843320E501B55308DC359C0F05648B0933992C548F2B22BAA6FC9665D7C3F58D52FDE001640723D8EB
3,253,325 UART: [art] PUB.Y = EA2BE555FC0D85DDC886ABAAB6EFA02E49B8A23400A45D6B5A99270D550B372BB1E6822E5CB483731552DADB1679EA4B
3,260,262 UART: [art] SIG.R = F2E3D826D102645043FB48A913813B99B416147EB9C0A6106D758A43CB44BC27532B9DEE5FEA700CC3917C21576EB098
3,267,026 UART: [art] SIG.S = C3873F221DEB942C95CB932F41CEE404571A25F23DE513953352821F93F1C6F5F9C4AB47F7ED8385E5D1210198AB2ABB
3,290,547 UART: Caliptra RT
3,290,800 UART: [state] CFI Enabled
3,399,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,382 UART: [rt]cmd =0x44504543, len=136
3,494,718 >>> mbox cmd response data (136 bytes)
3,494,719 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,194 UART: [rt]cmd =0x4453424c, len=4
3,538,311 >>> mbox cmd response data (8 bytes)
3,538,312 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,151 UART: [rt]cmd =0x44504543, len=92
3,751,021 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,662 UART: [kat] SHA2-256
882,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,708 UART: [kat] ++
886,860 UART: [kat] sha1
890,900 UART: [kat] SHA2-256
892,838 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
903,203 UART: [kat] HMAC-384Kdf
907,825 UART: [kat] LMS
1,476,021 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,624 UART: [fht] Storing FHT @ 0x50003400
1,480,361 UART: [idev] ++
1,480,529 UART: [idev] CDI.KEYID = 6
1,480,889 UART: [idev] SUBJECT.KEYID = 7
1,481,313 UART: [idev] UDS.KEYID = 0
1,481,658 ready_for_fw is high
1,481,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,505,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,228 UART: [ldev] ++
1,515,396 UART: [ldev] CDI.KEYID = 6
1,515,759 UART: [ldev] SUBJECT.KEYID = 5
1,516,185 UART: [ldev] AUTHORITY.KEYID = 7
1,516,648 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,547,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,333 UART: [ldev] --
1,586,610 UART: [fwproc] Waiting for Commands...
1,587,291 UART: [fwproc] Received command 0x46574c44
1,588,082 UART: [fwproc] Received Image of size 114084 bytes
2,883,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,430 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,297 >>> mbox cmd response: success
3,075,297 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,076,405 UART: [afmc] ++
3,076,573 UART: [afmc] CDI.KEYID = 6
3,076,935 UART: [afmc] SUBJECT.KEYID = 7
3,077,360 UART: [afmc] AUTHORITY.KEYID = 5
3,111,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,324 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,014 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,863 UART: [afmc] --
3,154,891 UART: [cold-reset] --
3,155,775 UART: [state] Locking Datavault
3,156,766 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,370 UART: [state] Locking ICCM
3,157,928 UART: [exit] Launching FMC @ 0x40000130
3,163,257 UART:
3,163,273 UART: Running Caliptra FMC ...
3,163,681 UART:
3,163,824 UART: [state] CFI Enabled
3,174,525 UART: [fht] FMC Alias Private Key: 7
3,282,784 UART: [art] Extend RT PCRs Done
3,283,212 UART: [art] Lock RT PCRs Done
3,284,640 UART: [art] Populate DV Done
3,293,073 UART: [fht] FMC Alias Private Key: 7
3,294,193 UART: [art] Derive CDI
3,294,473 UART: [art] Store in in slot 0x4
3,380,066 UART: [art] Derive Key Pair
3,380,426 UART: [art] Store priv key in slot 0x5
3,393,900 UART: [art] Derive Key Pair - Done
3,408,652 UART: [art] Signing Cert with AUTHO
3,409,132 UART: RITY.KEYID = 7
3,424,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,857 UART: [art] PUB.X = EB294DBA3B540B12F13E8C1562E09E8F7528B62CA2461794A6CCE173AD7E3B8125905A2D100B79A1D38636F66FF53EFD
3,431,629 UART: [art] PUB.Y = DC2161F02FF24513271D6130323038BD697D0C1935038B16E68640BCC09D133B8D9E902F6C0DD3C5DEA033985FF44359
3,438,566 UART: [art] SIG.R = 9B3267A7945FA9E88567E464D40A3A06C2A7153AC9FFC9B90DF95F97978F9E93E384741D3EA93826725F5D65CE4D9CFF
3,445,333 UART: [art] SIG.S = B369ACF58C27340F5210E6AA29DEEBB7B5D9B95C533E951A6B3615574044AF8D220B7C246E69E977A3547AC0822A62BE
3,469,030 UART: Caliptra RT
3,469,375 UART: [state] CFI Enabled
3,577,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,867 UART: [rt]cmd =0x44504543, len=136
3,672,479 >>> mbox cmd response data (136 bytes)
3,672,480 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,859 UART: [rt]cmd =0x4453424c, len=4
3,715,730 >>> mbox cmd response data (8 bytes)
3,715,731 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,666 UART: [rt]cmd =0x44504543, len=92
3,929,231 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 ready_for_fw is high
1,363,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,421 >>> mbox cmd response: success
2,926,421 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,987,647 UART:
2,987,663 UART: Running Caliptra FMC ...
2,988,071 UART:
2,988,214 UART: [state] CFI Enabled
2,998,867 UART: [fht] FMC Alias Private Key: 7
3,107,054 UART: [art] Extend RT PCRs Done
3,107,482 UART: [art] Lock RT PCRs Done
3,109,196 UART: [art] Populate DV Done
3,117,549 UART: [fht] FMC Alias Private Key: 7
3,118,595 UART: [art] Derive CDI
3,118,875 UART: [art] Store in in slot 0x4
3,204,392 UART: [art] Derive Key Pair
3,204,752 UART: [art] Store priv key in slot 0x5
3,217,574 UART: [art] Derive Key Pair - Done
3,232,189 UART: [art] Signing Cert with AUTHO
3,232,669 UART: RITY.KEYID = 7
3,247,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,452 UART: [art] PUB.X = 13534097FFA5B900C9DE02F248BE34DE0C3752B5C156525E97EBE313B2FAEDC295AE9E1B46E55CAAEAD0D67E6BE55AFF
3,255,218 UART: [art] PUB.Y = 91278E075C4FCC7BE27EB7F95CB3FD13730A97FAE498F72D41FC3EBF62DE54FABFDB6BF6F0891AA1DEF25BC3260F0689
3,262,182 UART: [art] SIG.R = FD505D7EC6DB9EEC726CD0B6B5B61301915647D4FCDFC3A767B8579E5552FE9C08CDC7BDC07A305CC6F313B43BC677C4
3,268,966 UART: [art] SIG.S = 00BA3A2EC4E6033820BA87BA20084E4E91FBB369F6714C373D774267CA7DE086D25F4D5671EA7F054796F08DF484D0BF
3,292,522 UART: Caliptra RT
3,292,867 UART: [state] CFI Enabled
3,401,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,193 UART: [rt]cmd =0x44504543, len=136
3,496,503 >>> mbox cmd response data (136 bytes)
3,496,504 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,701 UART: [rt]cmd =0x4453424c, len=4
3,539,940 >>> mbox cmd response data (8 bytes)
3,539,941 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,782 UART: [rt]cmd =0x44504543, len=92
3,753,024 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,762 UART: [kat] SHA2-512-ACC
908,663 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,172,175 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,042 UART: [idev] Erasing UDS.KEYID = 0
1,200,829 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,875 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,789 UART: [ldev] --
1,283,130 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,423 >>> mbox cmd response: success
2,772,423 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,493 UART: [afmc] ++
2,773,661 UART: [afmc] CDI.KEYID = 6
2,774,023 UART: [afmc] SUBJECT.KEYID = 7
2,774,448 UART: [afmc] AUTHORITY.KEYID = 5
2,809,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,384 UART: [afmc] --
2,852,448 UART: [cold-reset] --
2,853,328 UART: [state] Locking Datavault
2,854,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,033 UART: [state] Locking ICCM
2,855,529 UART: [exit] Launching FMC @ 0x40000130
2,860,858 UART:
2,860,874 UART: Running Caliptra FMC ...
2,861,282 UART:
2,861,336 UART: [state] CFI Enabled
2,871,949 UART: [fht] FMC Alias Private Key: 7
2,979,952 UART: [art] Extend RT PCRs Done
2,980,380 UART: [art] Lock RT PCRs Done
2,981,868 UART: [art] Populate DV Done
2,990,281 UART: [fht] FMC Alias Private Key: 7
2,991,411 UART: [art] Derive CDI
2,991,691 UART: [art] Store in in slot 0x4
3,077,288 UART: [art] Derive Key Pair
3,077,648 UART: [art] Store priv key in slot 0x5
3,091,050 UART: [art] Derive Key Pair - Done
3,105,759 UART: [art] Signing Cert with AUTHO
3,106,239 UART: RITY.KEYID = 7
3,121,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,804 UART: [art] PUB.X = A42F47A1AA77D752EFA78E30B11DF4970C699CC2397C8C4C87F9AD0CA3F9699BAD8301F9D88CB0506252E934B842E47D
3,128,575 UART: [art] PUB.Y = 8E6927127CA67E7A81B7BF1B7BA64E143B48D5C2C69AD518335277F73722ED15058A418DDE495BF2C700C8BF50CF5FCD
3,135,510 UART: [art] SIG.R = 16C12029C81D91831B394F3C3FDDEF68838AC9537514512A192880DF950D3714B9284EE0369797AA68F642BCA1203072
3,142,267 UART: [art] SIG.S = F5F21C49BCBA44604E2A6CE22A0856FB17EDF47B20D932980BA1BBDCC64BE7BDF28EC6C2E6CF3ACACB43B28A709F3C21
3,165,332 UART: Caliptra RT
3,165,585 UART: [state] CFI Enabled
3,273,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,722 UART: [rt]cmd =0x44504543, len=136
3,367,558 >>> mbox cmd response data (136 bytes)
3,367,559 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,102 UART: [rt]cmd =0x4453424c, len=4
3,410,131 >>> mbox cmd response data (8 bytes)
3,410,132 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,887 UART: [rt]cmd =0x44504543, len=92
3,623,007 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,843 ready_for_fw is high
1,060,843 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,438 >>> mbox cmd response: success
2,625,438 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,112 UART:
2,687,128 UART: Running Caliptra FMC ...
2,687,536 UART:
2,687,590 UART: [state] CFI Enabled
2,697,699 UART: [fht] FMC Alias Private Key: 7
2,805,520 UART: [art] Extend RT PCRs Done
2,805,948 UART: [art] Lock RT PCRs Done
2,807,550 UART: [art] Populate DV Done
2,815,881 UART: [fht] FMC Alias Private Key: 7
2,816,943 UART: [art] Derive CDI
2,817,223 UART: [art] Store in in slot 0x4
2,902,844 UART: [art] Derive Key Pair
2,903,204 UART: [art] Store priv key in slot 0x5
2,915,920 UART: [art] Derive Key Pair - Done
2,930,716 UART: [art] Signing Cert with AUTHO
2,931,196 UART: RITY.KEYID = 7
2,946,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,333 UART: [art] PUB.X = 4602EC5BDE55BE10A6CFDFEAA826FBB4031F0385A62EA73F954F657929B1C4C78C2A16A1DB1F7EC63EFE16872CF314F3
2,954,114 UART: [art] PUB.Y = 3ED88C7AA445C06F90D168AB216ED71B1AB16E3116DEDD4C952EE9452B4147628E560DA81CCC48E5DA0F6F52B75B5D69
2,961,072 UART: [art] SIG.R = DFFB46A7F9491538B72D77E5BAFD75AFC36F633B8213D26A3F1519A3A70838842BC8730BC61C063ECDDCBBD59C494459
2,967,845 UART: [art] SIG.S = 660EDB57248D2EEC4CB78B6D889C4416251C244B0856F3FEF45289BB75FFE89CD1409B4225D5C9AE7AE10DACCA98EFCE
2,992,275 UART: Caliptra RT
2,992,528 UART: [state] CFI Enabled
3,100,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,917 UART: [rt]cmd =0x44504543, len=136
3,195,295 >>> mbox cmd response data (136 bytes)
3,195,296 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,663 UART: [rt]cmd =0x4453424c, len=4
3,238,460 >>> mbox cmd response data (8 bytes)
3,238,461 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,268,374 UART: [rt]cmd =0x44504543, len=92
3,452,077 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,943 UART: [kat] HMAC-384Kdf
923,665 UART: [kat] LMS
1,171,993 UART: [kat] --
1,172,808 UART: [cold-reset] ++
1,173,376 UART: [fht] FHT @ 0x50003400
1,175,841 UART: [idev] ++
1,176,009 UART: [idev] CDI.KEYID = 6
1,176,369 UART: [idev] SUBJECT.KEYID = 7
1,176,793 UART: [idev] UDS.KEYID = 0
1,177,138 ready_for_fw is high
1,177,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,563 UART: [idev] Erasing UDS.KEYID = 0
1,201,330 UART: [idev] Sha1 KeyId Algorithm
1,209,968 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,244,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,100 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,093 UART: [fwproc] Recv command 0x46574c44
1,284,821 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,566 >>> mbox cmd response: success
2,772,566 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,706 UART: [afmc] ++
2,773,874 UART: [afmc] CDI.KEYID = 6
2,774,236 UART: [afmc] SUBJECT.KEYID = 7
2,774,661 UART: [afmc] AUTHORITY.KEYID = 5
2,810,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,691 UART: [afmc] --
2,853,817 UART: [cold-reset] --
2,854,795 UART: [state] Locking Datavault
2,855,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,474 UART: [state] Locking ICCM
2,857,138 UART: [exit] Launching FMC @ 0x40000130
2,862,467 UART:
2,862,483 UART: Running Caliptra FMC ...
2,862,891 UART:
2,863,034 UART: [state] CFI Enabled
2,873,533 UART: [fht] FMC Alias Private Key: 7
2,981,788 UART: [art] Extend RT PCRs Done
2,982,216 UART: [art] Lock RT PCRs Done
2,983,594 UART: [art] Populate DV Done
2,991,571 UART: [fht] FMC Alias Private Key: 7
2,992,711 UART: [art] Derive CDI
2,992,991 UART: [art] Store in in slot 0x4
3,078,562 UART: [art] Derive Key Pair
3,078,922 UART: [art] Store priv key in slot 0x5
3,092,634 UART: [art] Derive Key Pair - Done
3,107,064 UART: [art] Signing Cert with AUTHO
3,107,544 UART: RITY.KEYID = 7
3,123,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,967 UART: [art] PUB.X = A76E62AAD8EA99CDC0F07471B1D26D23D2AB28028E9959A7D82202C90674961727DBEC9A803DF526EC0B2DB8031A0C13
3,130,727 UART: [art] PUB.Y = 274CEBBF1FABA3F6BB87609F463FCB6622D14D62AA0FB2A732E6351A094170EA229D3E726DC4C34E5F1145854103097B
3,137,673 UART: [art] SIG.R = D4EEF67EDEA0EF2DBE2A7533789C20C41E59F3F0682A2C0058A379ED4EA90CBB364746646BC31377D0CA4A2594947E37
3,144,428 UART: [art] SIG.S = ECF37DEEEEBB407F7DEAB5DBB6C2FCD6FFD593DC5C260BFE5784CB65CCF9ACA15C6F61C18EAC3C01BD3354728ECF6561
3,168,241 UART: Caliptra RT
3,168,586 UART: [state] CFI Enabled
3,276,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,478 UART: [rt]cmd =0x44504543, len=136
3,371,430 >>> mbox cmd response data (136 bytes)
3,371,431 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,626 UART: [rt]cmd =0x4453424c, len=4
3,414,169 >>> mbox cmd response data (8 bytes)
3,414,170 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,171 UART: [rt]cmd =0x44504543, len=92
3,627,470 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 ready_for_fw is high
1,060,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,341 >>> mbox cmd response: success
2,623,341 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,321 UART:
2,686,337 UART: Running Caliptra FMC ...
2,686,745 UART:
2,686,888 UART: [state] CFI Enabled
2,697,559 UART: [fht] FMC Alias Private Key: 7
2,805,870 UART: [art] Extend RT PCRs Done
2,806,298 UART: [art] Lock RT PCRs Done
2,808,076 UART: [art] Populate DV Done
2,816,633 UART: [fht] FMC Alias Private Key: 7
2,817,679 UART: [art] Derive CDI
2,817,959 UART: [art] Store in in slot 0x4
2,903,794 UART: [art] Derive Key Pair
2,904,154 UART: [art] Store priv key in slot 0x5
2,917,146 UART: [art] Derive Key Pair - Done
2,931,907 UART: [art] Signing Cert with AUTHO
2,932,387 UART: RITY.KEYID = 7
2,947,715 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,480 UART: [art] PUB.X = E0558984FB2600D29407BE6C321524BFCC59C0EBF3F9F0FEB83221DD49A6769FDA16D3F2D7EC4AEBDCF5822FC0319322
2,955,241 UART: [art] PUB.Y = 3841FBAE9F58A9A23EAD0C84A25EBB73B7B431DBB3C86274246E977F4DF06FBBA299D94CCFE204C3C6CE87F1CE958E12
2,962,207 UART: [art] SIG.R = FC8C8880D30B78F3DFC0E87712376541DF6ED7DB1EB61E3BE30953F7D39CE1E83822F2DA30F16FA95055168354CC76A6
2,968,979 UART: [art] SIG.S = 5A1DF68C8741C644F9C15A24A172CAD8A857DCB36A937395C945F2F71ADA28EF2DA5EF3A4319E05CB4BA61BC8F4A5F72
2,992,640 UART: Caliptra RT
2,992,985 UART: [state] CFI Enabled
3,101,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,036 UART: [rt]cmd =0x44504543, len=136
3,196,104 >>> mbox cmd response data (136 bytes)
3,196,105 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,556 UART: [rt]cmd =0x4453424c, len=4
3,238,797 >>> mbox cmd response data (8 bytes)
3,238,798 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,268,751 UART: [rt]cmd =0x44504543, len=92
3,452,509 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,604 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,171,013 UART: [fht] FHT @ 0x50003400
1,173,669 UART: [idev] ++
1,173,837 UART: [idev] CDI.KEYID = 6
1,174,198 UART: [idev] SUBJECT.KEYID = 7
1,174,623 UART: [idev] UDS.KEYID = 0
1,174,969 ready_for_fw is high
1,174,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,483 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,232 UART: [ldev] ++
1,209,400 UART: [ldev] CDI.KEYID = 6
1,209,764 UART: [ldev] SUBJECT.KEYID = 5
1,210,191 UART: [ldev] AUTHORITY.KEYID = 7
1,210,654 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,234 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,457 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,329 >>> mbox cmd response: success
2,769,329 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,770,452 UART: [afmc] ++
2,770,620 UART: [afmc] CDI.KEYID = 6
2,770,983 UART: [afmc] SUBJECT.KEYID = 7
2,771,409 UART: [afmc] AUTHORITY.KEYID = 5
2,805,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,102 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,093 UART: [afmc] --
2,849,195 UART: [cold-reset] --
2,850,161 UART: [state] Locking Datavault
2,851,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,642 UART: [state] Locking ICCM
2,852,196 UART: [exit] Launching FMC @ 0x40000130
2,857,525 UART:
2,857,541 UART: Running Caliptra FMC ...
2,857,949 UART:
2,858,003 UART: [state] CFI Enabled
2,868,614 UART: [fht] FMC Alias Private Key: 7
2,976,715 UART: [art] Extend RT PCRs Done
2,977,143 UART: [art] Lock RT PCRs Done
2,978,539 UART: [art] Populate DV Done
2,986,740 UART: [fht] FMC Alias Private Key: 7
2,987,730 UART: [art] Derive CDI
2,988,010 UART: [art] Store in in slot 0x4
3,073,327 UART: [art] Derive Key Pair
3,073,687 UART: [art] Store priv key in slot 0x5
3,086,851 UART: [art] Derive Key Pair - Done
3,101,562 UART: [art] Signing Cert with AUTHO
3,102,042 UART: RITY.KEYID = 7
3,117,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,029 UART: [art] PUB.X = 4948B2BA9489EC6A77AA9334E8E2E95F7651E9DC5AC01AD99898C2405C4B92A39ACE78142DDDE4C8706165C0F60E0375
3,124,799 UART: [art] PUB.Y = 283D6BD45425599C7C7753BA8722CF6188A60C40164CA08FD37D3234B8721B2A3FC5C8491188799DD0E1F0C6B0EEBB12
3,131,748 UART: [art] SIG.R = 097B7440A6A64A1152A79350B233F3A484B4F94226F1D3B057BA5524A21162DF6F1AB9804DB58A439AF5BFA0A45FC766
3,138,517 UART: [art] SIG.S = 309E2D0B84461906251805275AACBC512F9C00D8C2DBCA4A64D3EA995B71AF5E86E88507FDD86DE213FF5D0592A51496
3,161,887 UART: Caliptra RT
3,162,140 UART: [state] CFI Enabled
3,270,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,607 UART: [rt]cmd =0x44504543, len=136
3,363,935 >>> mbox cmd response data (136 bytes)
3,363,936 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,207 UART: [rt]cmd =0x4453424c, len=4
3,407,612 >>> mbox cmd response data (8 bytes)
3,407,613 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,552 UART: [rt]cmd =0x44504543, len=92
3,620,455 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,826 ready_for_fw is high
1,055,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,389 >>> mbox cmd response: success
2,617,389 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,679,809 UART:
2,679,825 UART: Running Caliptra FMC ...
2,680,233 UART:
2,680,287 UART: [state] CFI Enabled
2,690,642 UART: [fht] FMC Alias Private Key: 7
2,798,321 UART: [art] Extend RT PCRs Done
2,798,749 UART: [art] Lock RT PCRs Done
2,800,099 UART: [art] Populate DV Done
2,808,036 UART: [fht] FMC Alias Private Key: 7
2,809,046 UART: [art] Derive CDI
2,809,326 UART: [art] Store in in slot 0x4
2,895,255 UART: [art] Derive Key Pair
2,895,615 UART: [art] Store priv key in slot 0x5
2,908,217 UART: [art] Derive Key Pair - Done
2,922,632 UART: [art] Signing Cert with AUTHO
2,923,112 UART: RITY.KEYID = 7
2,938,094 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,859 UART: [art] PUB.X = 58EBB976A3FCFA6C4C3A0F94FDCBF6578FCD18CAC333C2B9CBAF2581F4BA6A50D935DF0F7F9E3230E16693024381952E
2,945,640 UART: [art] PUB.Y = 847C8BBC2BB42AEF2EF3DAD001688D6E40C5F9858625B9ADE594348AF6C32A794F461FE15DB7CB2EA89F1845913765B0
2,952,599 UART: [art] SIG.R = 99B8189F7E8152F721BF3CD6534839CB4DD35456BB2B939506127DA4CE861D11BABDF4BD483D4C5AD15CC50CD8F05EC1
2,959,377 UART: [art] SIG.S = 3C61410C4DA8ABE5C44884A72C9AAAD1280F6E5E02D99751FA810C1FF5DEF7E50F26D3F1C0CEF05A2638F09C9110382D
2,983,345 UART: Caliptra RT
2,983,598 UART: [state] CFI Enabled
3,091,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,531 UART: [rt]cmd =0x44504543, len=136
3,186,703 >>> mbox cmd response data (136 bytes)
3,186,704 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,017 UART: [rt]cmd =0x4453424c, len=4
3,229,394 >>> mbox cmd response data (8 bytes)
3,229,395 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,178 UART: [rt]cmd =0x44504543, len=92
3,442,612 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
891,385 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,213 UART: [kat] LMS
1,169,525 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,175,016 ready_for_fw is high
1,175,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,446 UART: [idev] Sha1 KeyId Algorithm
1,209,260 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,997 UART: [ldev] SUBJECT.KEYID = 5
1,211,424 UART: [ldev] AUTHORITY.KEYID = 7
1,211,887 UART: [ldev] FE.KEYID = 1
1,217,225 UART: [ldev] Erasing FE.KEYID = 1
1,243,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,291 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,159 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,806 >>> mbox cmd response: success
2,770,806 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,059 UART: [afmc] ++
2,772,227 UART: [afmc] CDI.KEYID = 6
2,772,590 UART: [afmc] SUBJECT.KEYID = 7
2,773,016 UART: [afmc] AUTHORITY.KEYID = 5
2,808,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,504 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,223 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,004 UART: [afmc] --
2,852,118 UART: [cold-reset] --
2,853,074 UART: [state] Locking Datavault
2,854,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,941 UART: [state] Locking ICCM
2,855,505 UART: [exit] Launching FMC @ 0x40000130
2,860,834 UART:
2,860,850 UART: Running Caliptra FMC ...
2,861,258 UART:
2,861,401 UART: [state] CFI Enabled
2,871,802 UART: [fht] FMC Alias Private Key: 7
2,979,095 UART: [art] Extend RT PCRs Done
2,979,523 UART: [art] Lock RT PCRs Done
2,981,493 UART: [art] Populate DV Done
2,989,664 UART: [fht] FMC Alias Private Key: 7
2,990,702 UART: [art] Derive CDI
2,990,982 UART: [art] Store in in slot 0x4
3,076,973 UART: [art] Derive Key Pair
3,077,333 UART: [art] Store priv key in slot 0x5
3,090,373 UART: [art] Derive Key Pair - Done
3,105,246 UART: [art] Signing Cert with AUTHO
3,105,726 UART: RITY.KEYID = 7
3,121,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,111 UART: [art] PUB.X = DB9247034A4C7AD0EE06403CBA2BB42D30F28308806033F1377A7E4CB052C2E71A9AD2805A8FC5DE8C720C7473602A43
3,128,873 UART: [art] PUB.Y = F31906FBD192B4A76AFB59B6D4C51B65FB529CFF1C94C8AD2F1BE04B0BBEB01757D523A8C06868B4C3AC63CC82A8BC98
3,135,839 UART: [art] SIG.R = FEEE80A4893D425C3F534062A0DF3C3777F00C7472AFC32FA3779EE39DE0542FDA9420E9782E088D0A239835BF5B4542
3,142,604 UART: [art] SIG.S = 06692D18B17FC03058B0A3D45C79040D77FFB4786A74BD4EA6E4E0A0FAC475BB2986EA41FED13594638A0DE0513B936B
3,166,167 UART: Caliptra RT
3,166,512 UART: [state] CFI Enabled
3,273,743 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,857 UART: [rt]cmd =0x44504543, len=136
3,367,941 >>> mbox cmd response data (136 bytes)
3,367,942 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,243 UART: [rt]cmd =0x4453424c, len=4
3,410,882 >>> mbox cmd response data (8 bytes)
3,410,883 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,820 UART: [rt]cmd =0x44504543, len=92
3,623,729 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,366 >>> mbox cmd response: success
2,619,366 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,682,330 UART:
2,682,346 UART: Running Caliptra FMC ...
2,682,754 UART:
2,682,897 UART: [state] CFI Enabled
2,693,788 UART: [fht] FMC Alias Private Key: 7
2,802,113 UART: [art] Extend RT PCRs Done
2,802,541 UART: [art] Lock RT PCRs Done
2,803,645 UART: [art] Populate DV Done
2,811,816 UART: [fht] FMC Alias Private Key: 7
2,812,752 UART: [art] Derive CDI
2,813,032 UART: [art] Store in in slot 0x4
2,898,577 UART: [art] Derive Key Pair
2,898,937 UART: [art] Store priv key in slot 0x5
2,912,579 UART: [art] Derive Key Pair - Done
2,927,545 UART: [art] Signing Cert with AUTHO
2,928,025 UART: RITY.KEYID = 7
2,943,181 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,946 UART: [art] PUB.X = 32248662035A99BC515C3F0C54008C662A76C78498667C44D41EF81DA36247004A878C1A0905B8438F1272B1EAD1D43C
2,950,650 UART: [art] PUB.Y = CC1E6C53B1BA14155A938C071E334AC90BB9B1F76B09152A484E3F7FC22A09CA774C883F36151CD673F2FB17F49E7379
2,957,594 UART: [art] SIG.R = 8276B4DF1395C787B51C64052D61D0F4370C363D2217CC1112ADF03BF6744889E5ECFCB59E0142B547B876877C2AB88C
2,964,355 UART: [art] SIG.S = 440C57DC0B77C1FED5745AAA1A5F6F2A20B95D737251A04A07E8458539FC8FBB18630AB0FB9264F410382A15319D5215
2,987,972 UART: Caliptra RT
2,988,317 UART: [state] CFI Enabled
3,096,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,662 UART: [rt]cmd =0x44504543, len=136
3,191,508 >>> mbox cmd response data (136 bytes)
3,191,509 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,990 UART: [rt]cmd =0x4453424c, len=4
3,234,865 >>> mbox cmd response data (8 bytes)
3,234,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,264,887 UART: [rt]cmd =0x44504543, len=92
3,448,317 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 10.29s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 10.29s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.84s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.85s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.87s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.88s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.88s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 7.88s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.52s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.43s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.60s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.47s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.39s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.39s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.64s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.46s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.53s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.46s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.52s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 5.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,059 UART:
192,426 UART: Running Caliptra ROM ...
193,527 UART:
193,672 UART: [state] CFI Enabled
262,310 UART: [state] LifecycleState = Unprovisioned
264,227 UART: [state] DebugLocked = No
266,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,106 UART: [kat] SHA2-256
441,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,340 UART: [kat] ++
452,788 UART: [kat] sha1
464,244 UART: [kat] SHA2-256
466,965 UART: [kat] SHA2-384
471,815 UART: [kat] SHA2-512-ACC
474,180 UART: [kat] ECC-384
2,768,003 UART: [kat] HMAC-384Kdf
2,781,110 UART: [kat] LMS
3,971,411 UART: [kat] --
3,975,922 UART: [cold-reset] ++
3,977,865 UART: [fht] Storing FHT @ 0x50003400
3,988,279 UART: [idev] ++
3,988,841 UART: [idev] CDI.KEYID = 6
3,989,840 UART: [idev] SUBJECT.KEYID = 7
3,991,018 UART: [idev] UDS.KEYID = 0
3,992,004 ready_for_fw is high
3,992,202 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,275 UART: [idev] Erasing UDS.KEYID = 0
7,328,301 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,829 UART: [idev] --
7,357,009 UART: [ldev] ++
7,357,583 UART: [ldev] CDI.KEYID = 6
7,358,549 UART: [ldev] SUBJECT.KEYID = 5
7,359,760 UART: [ldev] AUTHORITY.KEYID = 7
7,361,044 UART: [ldev] FE.KEYID = 1
7,404,750 UART: [ldev] Erasing FE.KEYID = 1
10,739,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,070 UART: [ldev] --
13,116,958 UART: [fwproc] Waiting for Commands...
13,119,160 UART: [fwproc] Received command 0x46574c44
13,121,359 UART: [fwproc] Received Image of size 113760 bytes
17,154,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,607,019 >>> mbox cmd response: success
17,607,539 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,610,646 UART: [afmc] ++
17,611,236 UART: [afmc] CDI.KEYID = 6
17,612,145 UART: [afmc] SUBJECT.KEYID = 7
17,613,414 UART: [afmc] AUTHORITY.KEYID = 5
20,969,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,269,274 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,271,531 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,285,950 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,300,760 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,315,216 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,337,171 UART: [afmc] --
23,340,445 UART: [cold-reset] --
23,344,248 UART: [state] Locking Datavault
23,350,950 UART: [state] Locking PCR0, PCR1 and PCR31
23,352,701 UART: [state] Locking ICCM
23,354,145 UART: [exit] Launching FMC @ 0x40000130
23,362,538 UART:
23,362,768 UART: Running Caliptra FMC ...
23,363,867 UART:
23,364,026 UART: [state] CFI Enabled
23,430,829 UART: [fht] FMC Alias Private Key: 7
25,769,010 UART: [art] Extend RT PCRs Done
25,770,234 UART: [art] Lock RT PCRs Done
25,772,069 UART: [art] Populate DV Done
25,777,427 UART: [fht] FMC Alias Private Key: 7
25,779,106 UART: [art] Derive CDI
25,779,944 UART: [art] Store in in slot 0x4
25,839,390 UART: [art] Derive Key Pair
25,840,390 UART: [art] Store priv key in slot 0x5
29,133,120 UART: [art] Derive Key Pair - Done
29,146,319 UART: [art] Signing Cert with AUTHO
29,147,651 UART: RITY.KEYID = 7
31,435,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,436,829 UART: [art] PUB.X = 0BD97658AE6F91163E96C5818E4127B3D8A2EBF0F2810FA2D3F3F28498860D03B4775E29788D08A5056CFCAE59D2C2EA
31,444,069 UART: [art] PUB.Y = C54E126568E4BA1740F6DDF29B960C52CB2573E42207E718B8A38261943E05BC021741660FAE09D13D12B3C6AD7DF378
31,451,305 UART: [art] SIG.R = 01D04FB6C2BBDFE1570B1182E77CF6AEE0F52ED8199F9E971BCAA2FE70E854027207773B640A9BA5096A36CC26B98EC3
31,458,722 UART: [art] SIG.S = 04F175AAC4D3EF775DDA5E4307C7487DBABC4ADD27912A50233710D66FA6488C0DCE5AEAA15B543D01C01C6A893BAE01
32,764,235 UART: Caliptra RT
32,764,950 UART: [state] CFI Enabled
32,926,375 UART: [rt] RT listening for mailbox commands...
32,959,061 UART: [rt]cmd =0x53494756, len=196
32,964,052 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,802,799 ready_for_fw is high
3,803,195 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,869,731 >>> mbox cmd response: success
17,870,644 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,553,213 UART:
23,553,596 UART: Running Caliptra FMC ...
23,554,700 UART:
23,554,856 UART: [state] CFI Enabled
23,605,143 UART: [fht] FMC Alias Private Key: 7
25,943,592 UART: [art] Extend RT PCRs Done
25,944,815 UART: [art] Lock RT PCRs Done
25,946,577 UART: [art] Populate DV Done
25,952,044 UART: [fht] FMC Alias Private Key: 7
25,953,746 UART: [art] Derive CDI
25,954,484 UART: [art] Store in in slot 0x4
26,013,947 UART: [art] Derive Key Pair
26,014,984 UART: [art] Store priv key in slot 0x5
29,307,997 UART: [art] Derive Key Pair - Done
29,320,994 UART: [art] Signing Cert with AUTHO
29,322,295 UART: RITY.KEYID = 7
31,610,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,611,561 UART: [art] PUB.X = 334D7A15F6DD241D596CFC481634F22E782EF5B9ADD4D87671EAE6A289A609C1F65579E33C2EE6ED7C4CBB6658A92A1C
31,618,821 UART: [art] PUB.Y = C928D6E3B040FF5CA4165FD931ACFE09B708B653E4A0B5BA8E35186CFA8374910734B8B44552827940E2FA5EDD8D640F
31,626,067 UART: [art] SIG.R = 5FD7A93079B414A367621DDF2B1FA273D8DE04A871C38F7ACACE7032F5099E5899AFDFB9717EA1E3FC1D1BF9CB4A91DB
31,633,471 UART: [art] SIG.S = 37EA2E7AA8F97B3CC88C19A9CAB7052CEE59B8FAAAD9925EB6108243217FDB73316166FAD414A10B95A6DC5C4AC1B837
32,938,818 UART: Caliptra RT
32,939,527 UART: [state] CFI Enabled
33,100,638 UART: [rt] RT listening for mailbox commands...
33,133,176 UART: [rt]cmd =0x53494756, len=196
33,137,915 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,585 writing to cptra_bootfsm_go
192,848 UART:
193,247 UART: Running Caliptra ROM ...
194,393 UART:
604,089 UART: [state] CFI Enabled
618,210 UART: [state] LifecycleState = Unprovisioned
620,166 UART: [state] DebugLocked = No
621,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,472 UART: [kat] SHA2-256
796,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,783 UART: [kat] ++
807,226 UART: [kat] sha1
819,157 UART: [kat] SHA2-256
821,874 UART: [kat] SHA2-384
828,429 UART: [kat] SHA2-512-ACC
830,839 UART: [kat] ECC-384
3,116,119 UART: [kat] HMAC-384Kdf
3,127,786 UART: [kat] LMS
4,317,890 UART: [kat] --
4,320,117 UART: [cold-reset] ++
4,321,990 UART: [fht] Storing FHT @ 0x50003400
4,333,469 UART: [idev] ++
4,334,030 UART: [idev] CDI.KEYID = 6
4,334,939 UART: [idev] SUBJECT.KEYID = 7
4,336,181 UART: [idev] UDS.KEYID = 0
4,337,288 ready_for_fw is high
4,337,531 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,514 UART: [idev] Erasing UDS.KEYID = 0
7,617,106 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,979 UART: [idev] --
7,643,377 UART: [ldev] ++
7,643,955 UART: [ldev] CDI.KEYID = 6
7,644,913 UART: [ldev] SUBJECT.KEYID = 5
7,646,118 UART: [ldev] AUTHORITY.KEYID = 7
7,647,398 UART: [ldev] FE.KEYID = 1
7,659,278 UART: [ldev] Erasing FE.KEYID = 1
10,950,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,881 UART: [ldev] --
13,310,232 UART: [fwproc] Waiting for Commands...
13,313,552 UART: [fwproc] Received command 0x46574c44
13,315,791 UART: [fwproc] Received Image of size 113760 bytes
17,362,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,078 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,370 >>> mbox cmd response: success
17,828,964 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,831,724 UART: [afmc] ++
17,832,368 UART: [afmc] CDI.KEYID = 6
17,833,304 UART: [afmc] SUBJECT.KEYID = 7
17,834,520 UART: [afmc] AUTHORITY.KEYID = 5
21,151,399 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,104 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,501 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,319 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,642 UART: [afmc] --
23,518,077 UART: [cold-reset] --
23,523,827 UART: [state] Locking Datavault
23,529,882 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,642 UART: [state] Locking ICCM
23,533,192 UART: [exit] Launching FMC @ 0x40000130
23,541,588 UART:
23,541,820 UART: Running Caliptra FMC ...
23,542,936 UART:
23,543,102 UART: [state] CFI Enabled
23,550,991 UART: [fht] FMC Alias Private Key: 7
25,881,484 UART: [art] Extend RT PCRs Done
25,882,699 UART: [art] Lock RT PCRs Done
25,884,729 UART: [art] Populate DV Done
25,890,141 UART: [fht] FMC Alias Private Key: 7
25,891,786 UART: [art] Derive CDI
25,892,598 UART: [art] Store in in slot 0x4
25,934,969 UART: [art] Derive Key Pair
25,935,966 UART: [art] Store priv key in slot 0x5
29,178,074 UART: [art] Derive Key Pair - Done
29,190,968 UART: [art] Signing Cert with AUTHO
29,192,270 UART: RITY.KEYID = 7
31,472,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,564 UART: [art] PUB.X = 24DDD4A810F33ABCA50C295ACED19154570627E0CAFD12F8A377DB115829FCCF812C762BA688D6BDD90F7EB4516DC739
31,480,865 UART: [art] PUB.Y = 46D5612C3A43322E8E855536784B4AB808236ACF4855F4E98433312076ABB7888FD43E7EE34A6E0E7AA972FEE43FE4F0
31,488,063 UART: [art] SIG.R = D3B87D24A965E083B4F6C62ABB22E3A916FB8D3A8C9FA8B468FCE55DB09B695647777EEA02959BAD31E96436D0A18E72
31,495,474 UART: [art] SIG.S = 37881E81856211E56B2077CEC4BDE0135CB19BED9078EF827C78C80ADF58DE2AAAAE0240D96CAF42F3CA15E780F07EAD
32,800,521 UART: Caliptra RT
32,801,237 UART: [state] CFI Enabled
32,918,477 UART: [rt] RT listening for mailbox commands...
32,951,559 UART: [rt]cmd =0x53494756, len=196
32,955,991 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
4,131,332 ready_for_fw is high
4,131,739 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,894 >>> mbox cmd response: success
18,066,760 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,706,067 UART:
23,706,481 UART: Running Caliptra FMC ...
23,707,627 UART:
23,707,781 UART: [state] CFI Enabled
23,716,162 UART: [fht] FMC Alias Private Key: 7
26,047,019 UART: [art] Extend RT PCRs Done
26,048,252 UART: [art] Lock RT PCRs Done
26,050,098 UART: [art] Populate DV Done
26,055,464 UART: [fht] FMC Alias Private Key: 7
26,057,008 UART: [art] Derive CDI
26,057,832 UART: [art] Store in in slot 0x4
26,100,431 UART: [art] Derive Key Pair
26,101,430 UART: [art] Store priv key in slot 0x5
29,343,859 UART: [art] Derive Key Pair - Done
29,356,754 UART: [art] Signing Cert with AUTHO
29,358,066 UART: RITY.KEYID = 7
31,637,219 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,743 UART: [art] PUB.X = 396CB934F056169D6CFB217B32FA90812E019DFB07649CC24A1BA529AEF8B15DA1DAD75ACBDB0ADA5E6FD60F0A42867F
31,645,983 UART: [art] PUB.Y = D3808E99E7C1C65AD60C59D5BA42955DD4F185BF77B7038F2F12BA7FFB5E536139286D3974C052A50845EF08372DE488
31,653,252 UART: [art] SIG.R = 84FD407466B9657D5158372EBCA34B2DAAC9DAE42F07679FF4819252390062A83AB9EA3B488B0CEC26902464FB7EE430
31,660,599 UART: [art] SIG.S = 3F63F6D34209FA0C64624CE743A551F650A955FF07384DFAB1F2B63066E66A62B845F49999AF505362A559B2E4DF20A6
32,965,858 UART: Caliptra RT
32,966,559 UART: [state] CFI Enabled
33,084,482 UART: [rt] RT listening for mailbox commands...
33,117,392 UART: [rt]cmd =0x53494756, len=196
33,122,074 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,564 UART:
192,956 UART: Running Caliptra ROM ...
194,106 UART:
194,252 UART: [state] CFI Enabled
259,630 UART: [state] LifecycleState = Unprovisioned
261,497 UART: [state] DebugLocked = No
264,230 UART: [state] WD Timer not started. Device not locked for debugging
267,276 UART: [kat] SHA2-256
446,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,000 UART: [kat] ++
458,548 UART: [kat] sha1
470,421 UART: [kat] SHA2-256
473,424 UART: [kat] SHA2-384
481,115 UART: [kat] SHA2-512-ACC
484,051 UART: [kat] ECC-384
2,946,949 UART: [kat] HMAC-384Kdf
2,970,410 UART: [kat] LMS
3,499,853 UART: [kat] --
3,504,281 UART: [cold-reset] ++
3,505,220 UART: [fht] FHT @ 0x50003400
3,516,339 UART: [idev] ++
3,516,903 UART: [idev] CDI.KEYID = 6
3,517,928 UART: [idev] SUBJECT.KEYID = 7
3,519,027 UART: [idev] UDS.KEYID = 0
3,520,075 ready_for_fw is high
3,520,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,859 UART: [idev] Erasing UDS.KEYID = 0
6,020,913 UART: [idev] Sha1 KeyId Algorithm
6,043,546 UART: [idev] --
6,047,954 UART: [ldev] ++
6,048,525 UART: [ldev] CDI.KEYID = 6
6,049,412 UART: [ldev] SUBJECT.KEYID = 5
6,050,619 UART: [ldev] AUTHORITY.KEYID = 7
6,051,871 UART: [ldev] FE.KEYID = 1
6,077,726 UART: [ldev] Erasing FE.KEYID = 1
8,581,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,021 UART: [ldev] --
10,394,285 UART: [fwproc] Wait for Commands...
10,395,827 UART: [fwproc] Recv command 0x46574c44
10,397,919 UART: [fwproc] Recv'd Img size: 114084 bytes
13,794,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,255,197 >>> mbox cmd response: success
14,255,721 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,260,156 UART: [afmc] ++
14,260,763 UART: [afmc] CDI.KEYID = 6
14,261,647 UART: [afmc] SUBJECT.KEYID = 7
14,262,748 UART: [afmc] AUTHORITY.KEYID = 5
16,807,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,467 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,211 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,265 UART: [afmc] --
18,606,492 UART: [cold-reset] --
18,611,260 UART: [state] Locking Datavault
18,616,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,628 UART: [state] Locking ICCM
18,620,398 UART: [exit] Launching FMC @ 0x40000130
18,628,822 UART:
18,629,055 UART: Running Caliptra FMC ...
18,630,154 UART:
18,630,309 UART: [state] CFI Enabled
18,688,718 UART: [fht] FMC Alias Private Key: 7
20,453,165 UART: [art] Extend RT PCRs Done
20,454,376 UART: [art] Lock RT PCRs Done
20,455,915 UART: [art] Populate DV Done
20,460,940 UART: [fht] FMC Alias Private Key: 7
20,462,467 UART: [art] Derive CDI
20,463,198 UART: [art] Store in in slot 0x4
20,521,664 UART: [art] Derive Key Pair
20,522,699 UART: [art] Store priv key in slot 0x5
22,985,934 UART: [art] Derive Key Pair - Done
22,998,652 UART: [art] Signing Cert with AUTHO
22,999,974 UART: RITY.KEYID = 7
24,712,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,842 UART: [art] PUB.X = DE4ADE23F306E927984C5AB31DC4F22C68ED01A5794A4F20FF386BFD95962BAB30335C492C72B564CB1EE9D111A0EBB7
24,721,096 UART: [art] PUB.Y = 5414E2E2CBA542D3B6ACE70CFF9D2036DC794237A634C06D0EB97B2FF4E3A21CC66F41D85ECABE4B6B84EC9BDBB6B678
24,728,425 UART: [art] SIG.R = B28231700C1165D56F86790DD8F52216181985856046A026EC7D4558C431F4E26A755CB66F793DE5EF39F71A51689588
24,735,782 UART: [art] SIG.S = D98530070CD0A9DD83220622D4522C416FE831E15E0E703BC19344671F02312BDD2844343EAD0AA77E39BB5765A53424
25,714,458 UART: Caliptra RT
25,715,165 UART: [state] CFI Enabled
25,880,310 UART: [rt] RT listening for mailbox commands...
25,913,292 UART: [rt]cmd =0x53494756, len=196
25,917,783 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,360,067 ready_for_fw is high
3,360,485 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,043,163 >>> mbox cmd response: success
14,043,753 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,324,666 UART:
18,325,058 UART: Running Caliptra FMC ...
18,326,190 UART:
18,326,346 UART: [state] CFI Enabled
18,389,630 UART: [fht] FMC Alias Private Key: 7
20,153,333 UART: [art] Extend RT PCRs Done
20,154,559 UART: [art] Lock RT PCRs Done
20,156,149 UART: [art] Populate DV Done
20,161,395 UART: [fht] FMC Alias Private Key: 7
20,163,040 UART: [art] Derive CDI
20,163,877 UART: [art] Store in in slot 0x4
20,222,092 UART: [art] Derive Key Pair
20,223,136 UART: [art] Store priv key in slot 0x5
22,686,346 UART: [art] Derive Key Pair - Done
22,699,399 UART: [art] Signing Cert with AUTHO
22,700,701 UART: RITY.KEYID = 7
24,412,211 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,714 UART: [art] PUB.X = A620E2E2CCDC6F3180770483BA6960F67A6A78AF953C078703E49E51BD5F606054CF2438C4302E77C283A70C050B3E73
24,420,997 UART: [art] PUB.Y = BC7000122E7627C71771675C59E0A4004794A201DDE77B0871C6F69AAEC4AFEB6B1736F07F89B15A3E9EEB11474D4D3E
24,428,216 UART: [art] SIG.R = ED37B0FBCA3E665BFF2CDED03461CB389A3679C5F244689F280BDEF5B2C2700209E5E022F5FCBEB0E452D26D75A92FD1
24,435,651 UART: [art] SIG.S = 604633F095B40F69E9EFCDB1AF489053E470DA8F43125071170B0248AEC1D32FACE8FC1218E03B1EA1E57F1217B3F182
25,414,535 UART: Caliptra RT
25,415,233 UART: [state] CFI Enabled
25,580,807 UART: [rt] RT listening for mailbox commands...
25,613,514 UART: [rt]cmd =0x53494756, len=196
25,618,271 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
192,989 UART:
193,374 UART: Running Caliptra ROM ...
194,475 UART:
603,927 UART: [state] CFI Enabled
618,812 UART: [state] LifecycleState = Unprovisioned
620,630 UART: [state] DebugLocked = No
623,373 UART: [state] WD Timer not started. Device not locked for debugging
626,629 UART: [kat] SHA2-256
805,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,331 UART: [kat] ++
817,784 UART: [kat] sha1
828,580 UART: [kat] SHA2-256
831,606 UART: [kat] SHA2-384
837,031 UART: [kat] SHA2-512-ACC
839,977 UART: [kat] ECC-384
3,280,144 UART: [kat] HMAC-384Kdf
3,293,034 UART: [kat] LMS
3,822,500 UART: [kat] --
3,825,810 UART: [cold-reset] ++
3,828,312 UART: [fht] FHT @ 0x50003400
3,838,867 UART: [idev] ++
3,839,431 UART: [idev] CDI.KEYID = 6
3,840,311 UART: [idev] SUBJECT.KEYID = 7
3,841,553 UART: [idev] UDS.KEYID = 0
3,842,454 ready_for_fw is high
3,842,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,937 UART: [idev] Erasing UDS.KEYID = 0
6,318,641 UART: [idev] Sha1 KeyId Algorithm
6,341,225 UART: [idev] --
6,344,970 UART: [ldev] ++
6,345,557 UART: [ldev] CDI.KEYID = 6
6,346,473 UART: [ldev] SUBJECT.KEYID = 5
6,347,637 UART: [ldev] AUTHORITY.KEYID = 7
6,348,872 UART: [ldev] FE.KEYID = 1
6,361,786 UART: [ldev] Erasing FE.KEYID = 1
8,836,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,546 UART: [ldev] --
10,629,408 UART: [fwproc] Wait for Commands...
10,631,938 UART: [fwproc] Recv command 0x46574c44
10,634,030 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,498,169 >>> mbox cmd response: success
14,498,697 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,502,591 UART: [afmc] ++
14,503,178 UART: [afmc] CDI.KEYID = 6
14,504,066 UART: [afmc] SUBJECT.KEYID = 7
14,505,285 UART: [afmc] AUTHORITY.KEYID = 5
17,001,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,454 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,326 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,470 UART: [afmc] --
18,798,598 UART: [cold-reset] --
18,802,355 UART: [state] Locking Datavault
18,809,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,819 UART: [state] Locking ICCM
18,812,560 UART: [exit] Launching FMC @ 0x40000130
18,820,969 UART:
18,821,210 UART: Running Caliptra FMC ...
18,822,313 UART:
18,822,479 UART: [state] CFI Enabled
18,830,696 UART: [fht] FMC Alias Private Key: 7
20,587,295 UART: [art] Extend RT PCRs Done
20,588,527 UART: [art] Lock RT PCRs Done
20,590,073 UART: [art] Populate DV Done
20,595,440 UART: [fht] FMC Alias Private Key: 7
20,597,036 UART: [art] Derive CDI
20,597,859 UART: [art] Store in in slot 0x4
20,640,857 UART: [art] Derive Key Pair
20,641,856 UART: [art] Store priv key in slot 0x5
23,068,510 UART: [art] Derive Key Pair - Done
23,081,348 UART: [art] Signing Cert with AUTHO
23,082,659 UART: RITY.KEYID = 7
24,787,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,436 UART: [art] PUB.X = BDFAC58992E1D2DE5FAFBCDC9FF9A1F2880C640EFE03C11735F730CF244C3ECCA6CE66F396D29F937562711BD436A2ED
24,796,763 UART: [art] PUB.Y = DD19436E55A42A50F3077254A80D2C4AB813A5A6F7E273BB60069EDB74E30A3EF43793F4570E2D077F6B294B227D2221
24,803,968 UART: [art] SIG.R = 5EC9F612648471559BE721ED986C0EDAE73FE2727D9F09C58095C47B7F10824716BAB80A8A0D04ED0FC953A12BFA7E2C
24,811,418 UART: [art] SIG.S = 46B64A45D2839BE14AEDA355209F0D8807E7015CDDCA0BEB8A17AA8CD9F02C488A83FCBE6349DC68B7257E6693B8C1A4
25,790,054 UART: Caliptra RT
25,790,755 UART: [state] CFI Enabled
25,908,897 UART: [rt] RT listening for mailbox commands...
25,941,912 UART: [rt]cmd =0x53494756, len=196
25,946,754 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,013 writing to cptra_bootfsm_go
3,700,730 ready_for_fw is high
3,701,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,495 >>> mbox cmd response: success
14,270,147 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,517,826 UART:
18,518,235 UART: Running Caliptra FMC ...
18,519,334 UART:
18,519,485 UART: [state] CFI Enabled
18,527,328 UART: [fht] FMC Alias Private Key: 7
20,284,099 UART: [art] Extend RT PCRs Done
20,285,326 UART: [art] Lock RT PCRs Done
20,286,956 UART: [art] Populate DV Done
20,292,326 UART: [fht] FMC Alias Private Key: 7
20,293,816 UART: [art] Derive CDI
20,294,590 UART: [art] Store in in slot 0x4
20,337,359 UART: [art] Derive Key Pair
20,338,406 UART: [art] Store priv key in slot 0x5
22,764,755 UART: [art] Derive Key Pair - Done
22,777,586 UART: [art] Signing Cert with AUTHO
22,778,885 UART: RITY.KEYID = 7
24,484,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,929 UART: [art] PUB.X = 8BA8EAA543C3347F79F16B5E0D1EF131B6BB842794900BF5DDB1922735F72CBA30FFA7435DAB9A75BA5AE4E3FCA856DA
24,493,212 UART: [art] PUB.Y = 840F192639B2756AF69017BF01992F59DA38B06BAA433E0811E50D16241880878AB466425756921467934C6DDC3E54DA
24,500,430 UART: [art] SIG.R = 64A679D6D0CA5F9AAB409786C887EA9ED0805D66AD3968CB9212C42332E8C787BF33D902F3714871E7F91D812E1E48FB
24,507,856 UART: [art] SIG.S = B9F64A78AEA8B917395969E0CE43079068CFDF2A14A1CACFFFDE3A9A98568C62C9C9BA1D589DA57EDECB7F4C133B4C43
25,486,980 UART: Caliptra RT
25,487,680 UART: [state] CFI Enabled
25,604,559 UART: [rt] RT listening for mailbox commands...
25,637,295 UART: [rt]cmd =0x53494756, len=196
25,641,745 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,476 UART:
192,863 UART: Running Caliptra ROM ...
194,056 UART:
194,219 UART: [state] CFI Enabled
264,323 UART: [state] LifecycleState = Unprovisioned
266,763 UART: [state] DebugLocked = No
269,576 UART: [state] WD Timer not started. Device not locked for debugging
274,132 UART: [kat] SHA2-256
463,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,790 UART: [kat] ++
475,319 UART: [kat] sha1
486,690 UART: [kat] SHA2-256
489,683 UART: [kat] SHA2-384
496,818 UART: [kat] SHA2-512-ACC
499,398 UART: [kat] ECC-384
2,949,508 UART: [kat] HMAC-384Kdf
2,971,689 UART: [kat] LMS
3,503,424 UART: [kat] --
3,507,579 UART: [cold-reset] ++
3,509,157 UART: [fht] FHT @ 0x50003400
3,521,487 UART: [idev] ++
3,522,148 UART: [idev] CDI.KEYID = 6
3,523,138 UART: [idev] SUBJECT.KEYID = 7
3,524,309 UART: [idev] UDS.KEYID = 0
3,525,234 ready_for_fw is high
3,525,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,925 UART: [idev] Erasing UDS.KEYID = 0
6,029,308 UART: [idev] Sha1 KeyId Algorithm
6,051,997 UART: [idev] --
6,057,177 UART: [ldev] ++
6,057,860 UART: [ldev] CDI.KEYID = 6
6,058,773 UART: [ldev] SUBJECT.KEYID = 5
6,059,954 UART: [ldev] AUTHORITY.KEYID = 7
6,061,184 UART: [ldev] FE.KEYID = 1
6,101,539 UART: [ldev] Erasing FE.KEYID = 1
8,611,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,687 UART: [ldev] --
10,413,393 UART: [fwproc] Wait for Commands...
10,415,054 UART: [fwproc] Recv command 0x46574c44
10,417,308 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,681 >>> mbox cmd response: success
14,602,223 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,605,069 UART: [afmc] ++
14,605,764 UART: [afmc] CDI.KEYID = 6
14,607,001 UART: [afmc] SUBJECT.KEYID = 7
14,608,445 UART: [afmc] AUTHORITY.KEYID = 5
17,154,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,918,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,971,667 UART: [afmc] --
18,975,567 UART: [cold-reset] --
18,979,124 UART: [state] Locking Datavault
18,985,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,987,557 UART: [state] Locking ICCM
18,990,032 UART: [exit] Launching FMC @ 0x40000130
18,998,674 UART:
18,998,907 UART: Running Caliptra FMC ...
19,000,003 UART:
19,000,173 UART: [state] CFI Enabled
19,055,558 UART: [fht] FMC Alias Private Key: 7
20,820,040 UART: [art] Extend RT PCRs Done
20,821,267 UART: [art] Lock RT PCRs Done
20,823,211 UART: [art] Populate DV Done
20,828,511 UART: [fht] FMC Alias Private Key: 7
20,830,044 UART: [art] Derive CDI
20,830,858 UART: [art] Store in in slot 0x4
20,888,676 UART: [art] Derive Key Pair
20,889,711 UART: [art] Store priv key in slot 0x5
23,352,608 UART: [art] Derive Key Pair - Done
23,365,610 UART: [art] Signing Cert with AUTHO
23,366,918 UART: RITY.KEYID = 7
25,078,969 UART: [art] Erasing AUTHORITY.KEYID = 7
25,080,482 UART: [art] PUB.X = 032A29B1E507711389E6C0E243F0B5F15490F104666A389F695DDF763A2DE55EBC24F7674D686C13A880EF482BB9B84D
25,087,748 UART: [art] PUB.Y = 5109272375E055171D15761380FC0895B494DCADDA2D1E9B1B699429FB282755CD78569CAEC24794F26E4701228EC60F
25,094,955 UART: [art] SIG.R = 7E694B1C650EE8ECFE98A09E2E423EB2B8763AB19D273EDD9A2EBC1BB84173AB4956619D54E908C7AA21E051DC06F1DC
25,102,409 UART: [art] SIG.S = 10938100D3C42B56D3F64EBE9B839A52A9DE9210064B28A2B4B04F18858E764924D380EE87E35A94388FF8C98B66B9CF
26,081,326 UART: Caliptra RT
26,082,048 UART: [state] CFI Enabled
26,248,030 UART: [rt] RT listening for mailbox commands...
26,280,727 UART: [rt]cmd =0x53494756, len=196
26,285,337 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,439,128 ready_for_fw is high
3,439,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,748,505 >>> mbox cmd response: success
14,749,377 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,024,618 UART:
19,025,031 UART: Running Caliptra FMC ...
19,026,147 UART:
19,026,304 UART: [state] CFI Enabled
19,097,669 UART: [fht] FMC Alias Private Key: 7
20,861,544 UART: [art] Extend RT PCRs Done
20,862,760 UART: [art] Lock RT PCRs Done
20,864,386 UART: [art] Populate DV Done
20,869,857 UART: [fht] FMC Alias Private Key: 7
20,871,334 UART: [art] Derive CDI
20,872,094 UART: [art] Store in in slot 0x4
20,929,171 UART: [art] Derive Key Pair
20,930,234 UART: [art] Store priv key in slot 0x5
23,393,284 UART: [art] Derive Key Pair - Done
23,406,557 UART: [art] Signing Cert with AUTHO
23,407,863 UART: RITY.KEYID = 7
25,119,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,607 UART: [art] PUB.X = F278983EB32F623E6EBAFA60AAC3737EC61E82729E11F3D65216492EC85ACF959538BAA78D2ADD3DC4844C9A74F85042
25,127,918 UART: [art] PUB.Y = E0745783ABD2C7BB8BCDBD5FAE017932CC1C38BF23A0022A8DD0F5C4AB18831233F253470ED97DAD33F149449A6E8228
25,135,162 UART: [art] SIG.R = FBC41611BF255B688A0B3316600D560D2B468BFBED9ACACAE5C91224935474559F779B3C2561F3F3998B70738B286E9B
25,142,523 UART: [art] SIG.S = D734E80386A6FB5F9506BD5C703D8F6BAEB45B32D7CE4C8DB166F2B11B5F0230544125BEE592787395631D05EF68CA34
26,121,791 UART: Caliptra RT
26,122,482 UART: [state] CFI Enabled
26,287,194 UART: [rt] RT listening for mailbox commands...
26,320,176 UART: [rt]cmd =0x53494756, len=196
26,324,990 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
192,758 UART:
193,132 UART: Running Caliptra ROM ...
194,345 UART:
603,760 UART: [state] CFI Enabled
616,041 UART: [state] LifecycleState = Unprovisioned
618,470 UART: [state] DebugLocked = No
620,516 UART: [state] WD Timer not started. Device not locked for debugging
625,126 UART: [kat] SHA2-256
814,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,758 UART: [kat] ++
826,366 UART: [kat] sha1
838,174 UART: [kat] SHA2-256
841,179 UART: [kat] SHA2-384
846,958 UART: [kat] SHA2-512-ACC
849,564 UART: [kat] ECC-384
3,294,259 UART: [kat] HMAC-384Kdf
3,306,298 UART: [kat] LMS
3,838,094 UART: [kat] --
3,843,750 UART: [cold-reset] ++
3,845,473 UART: [fht] FHT @ 0x50003400
3,857,587 UART: [idev] ++
3,858,295 UART: [idev] CDI.KEYID = 6
3,859,334 UART: [idev] SUBJECT.KEYID = 7
3,860,444 UART: [idev] UDS.KEYID = 0
3,861,386 ready_for_fw is high
3,861,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,938 UART: [idev] Erasing UDS.KEYID = 0
6,335,780 UART: [idev] Sha1 KeyId Algorithm
6,357,984 UART: [idev] --
6,362,196 UART: [ldev] ++
6,362,931 UART: [ldev] CDI.KEYID = 6
6,363,843 UART: [ldev] SUBJECT.KEYID = 5
6,365,003 UART: [ldev] AUTHORITY.KEYID = 7
6,366,236 UART: [ldev] FE.KEYID = 1
6,376,204 UART: [ldev] Erasing FE.KEYID = 1
8,856,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,057 UART: [ldev] --
10,648,602 UART: [fwproc] Wait for Commands...
10,651,400 UART: [fwproc] Recv command 0x46574c44
10,653,656 UART: [fwproc] Recv'd Img size: 114084 bytes
14,108,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,845,156 >>> mbox cmd response: success
14,845,753 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,849,443 UART: [afmc] ++
14,850,197 UART: [afmc] CDI.KEYID = 6
14,851,343 UART: [afmc] SUBJECT.KEYID = 7
14,852,784 UART: [afmc] AUTHORITY.KEYID = 5
17,356,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,596 UART: [afmc] --
19,155,493 UART: [cold-reset] --
19,159,146 UART: [state] Locking Datavault
19,164,677 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,829 UART: [state] Locking ICCM
19,169,692 UART: [exit] Launching FMC @ 0x40000130
19,178,357 UART:
19,178,619 UART: Running Caliptra FMC ...
19,179,725 UART:
19,179,885 UART: [state] CFI Enabled
19,187,851 UART: [fht] FMC Alias Private Key: 7
20,944,599 UART: [art] Extend RT PCRs Done
20,945,812 UART: [art] Lock RT PCRs Done
20,947,707 UART: [art] Populate DV Done
20,953,069 UART: [fht] FMC Alias Private Key: 7
20,954,782 UART: [art] Derive CDI
20,955,606 UART: [art] Store in in slot 0x4
20,998,585 UART: [art] Derive Key Pair
20,999,582 UART: [art] Store priv key in slot 0x5
23,426,235 UART: [art] Derive Key Pair - Done
23,439,071 UART: [art] Signing Cert with AUTHO
23,440,375 UART: RITY.KEYID = 7
25,146,030 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,549 UART: [art] PUB.X = DDD2256D95E634FD0E619C189FAC61C8BA7B2BEE6A1356732436D54296D4EAAF2869EAC1E237CBAAFEE61498E007A9AD
25,154,810 UART: [art] PUB.Y = 113C7CF669B1750F826D329F8884A58AC490D14B1F342F7BD48A2B2A65A6189DDD8397A71F4197ACD06EAB16592A74B7
25,162,115 UART: [art] SIG.R = 077B2E72BF570FE6C6F5CEDE77B5149D6F5E6E35D5F772AB008846050F05FE78B5F867212B7C7A1B37935BF66B6E84A8
25,169,727 UART: [art] SIG.S = 720CB1A8F13C88D480695304A70FA4696564B24D11CC3325FCCC10B65F146696720A022CCC1ECFC8F4C6248CD935FB09
26,148,315 UART: Caliptra RT
26,149,010 UART: [state] CFI Enabled
26,267,848 UART: [rt] RT listening for mailbox commands...
26,300,863 UART: [rt]cmd =0x53494756, len=196
26,305,766 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,730 writing to cptra_bootfsm_go
3,759,076 ready_for_fw is high
3,759,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,885 >>> mbox cmd response: success
14,958,561 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,213,987 UART:
19,214,384 UART: Running Caliptra FMC ...
19,215,585 UART:
19,215,775 UART: [state] CFI Enabled
19,223,776 UART: [fht] FMC Alias Private Key: 7
20,980,098 UART: [art] Extend RT PCRs Done
20,981,331 UART: [art] Lock RT PCRs Done
20,982,541 UART: [art] Populate DV Done
20,987,914 UART: [fht] FMC Alias Private Key: 7
20,989,406 UART: [art] Derive CDI
20,990,170 UART: [art] Store in in slot 0x4
21,032,928 UART: [art] Derive Key Pair
21,033,980 UART: [art] Store priv key in slot 0x5
23,460,587 UART: [art] Derive Key Pair - Done
23,474,071 UART: [art] Signing Cert with AUTHO
23,475,564 UART: RITY.KEYID = 7
25,180,986 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,483 UART: [art] PUB.X = 0BABCDF00A5B3A03F2AFDB0F5DCD88E83BBBBDAD7ABB21D4C8151603ED55F8B77EAFA5DC256997962EDA79C55B2AAA2F
25,189,831 UART: [art] PUB.Y = E7A309005005A2014EF0C6BD3891209CD5CDE07DB1BB2997AB61FAE70AB2075B2271C55D864BBB3871DA9B182D4667E7
25,197,028 UART: [art] SIG.R = B07D7B32A138D6737DD23EB7111372ACB33D9D0B800F27F047565A76C8DB5EF7A2B69A7401C85B726C37A2D643AB9F45
25,204,425 UART: [art] SIG.S = 0C296141B04B25DBFAFF2D56AAA9F25F73ED96C7BDF39F12D99EB8834F77C2585C01589A3227E4FC7D43BC7A3E05EDBC
26,183,230 UART: Caliptra RT
26,183,934 UART: [state] CFI Enabled
26,301,045 UART: [rt] RT listening for mailbox commands...
26,333,971 UART: [rt]cmd =0x53494756, len=196
26,338,788 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,052 UART:
192,440 UART: Running Caliptra ROM ...
193,545 UART:
193,689 UART: [state] CFI Enabled
262,272 UART: [state] LifecycleState = Unprovisioned
264,205 UART: [state] DebugLocked = No
266,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,103 UART: [kat] SHA2-256
441,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,310 UART: [kat] ++
452,776 UART: [kat] sha1
464,857 UART: [kat] SHA2-256
467,577 UART: [kat] SHA2-384
474,703 UART: [kat] SHA2-512-ACC
477,077 UART: [kat] ECC-384
2,765,749 UART: [kat] HMAC-384Kdf
2,795,749 UART: [kat] LMS
3,986,059 UART: [kat] --
3,990,183 UART: [cold-reset] ++
3,991,768 UART: [fht] Storing FHT @ 0x50003400
4,004,452 UART: [idev] ++
4,005,033 UART: [idev] CDI.KEYID = 6
4,005,996 UART: [idev] SUBJECT.KEYID = 7
4,007,244 UART: [idev] UDS.KEYID = 0
4,008,225 ready_for_fw is high
4,008,431 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,074 UART: [idev] Erasing UDS.KEYID = 0
7,341,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,771 UART: [idev] --
7,367,552 UART: [ldev] ++
7,368,121 UART: [ldev] CDI.KEYID = 6
7,369,100 UART: [ldev] SUBJECT.KEYID = 5
7,370,313 UART: [ldev] AUTHORITY.KEYID = 7
7,371,541 UART: [ldev] FE.KEYID = 1
7,418,873 UART: [ldev] Erasing FE.KEYID = 1
10,750,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,934 UART: [ldev] --
13,111,034 UART: [fwproc] Waiting for Commands...
13,114,010 UART: [fwproc] Received command 0x46574c44
13,116,193 UART: [fwproc] Received Image of size 113760 bytes
17,163,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,626,690 >>> mbox cmd response: success
17,627,186 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,630,318 UART: [afmc] ++
17,630,908 UART: [afmc] CDI.KEYID = 6
17,631,931 UART: [afmc] SUBJECT.KEYID = 7
17,633,038 UART: [afmc] AUTHORITY.KEYID = 5
21,001,662 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,672 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,304,931 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,388 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,178 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,641 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,369,941 UART: [afmc] --
23,374,237 UART: [cold-reset] --
23,377,939 UART: [state] Locking Datavault
23,383,078 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,833 UART: [state] Locking ICCM
23,386,881 UART: [exit] Launching FMC @ 0x40000130
23,395,264 UART:
23,395,513 UART: Running Caliptra FMC ...
23,396,616 UART:
23,396,778 UART: [state] CFI Enabled
23,463,958 UART: [fht] FMC Alias Private Key: 7
25,801,685 UART: [art] Extend RT PCRs Done
25,802,906 UART: [art] Lock RT PCRs Done
25,804,639 UART: [art] Populate DV Done
25,809,935 UART: [fht] FMC Alias Private Key: 7
25,811,485 UART: [art] Derive CDI
25,812,224 UART: [art] Store in in slot 0x4
25,874,092 UART: [art] Derive Key Pair
25,875,131 UART: [art] Store priv key in slot 0x5
29,167,793 UART: [art] Derive Key Pair - Done
29,180,737 UART: [art] Signing Cert with AUTHO
29,182,042 UART: RITY.KEYID = 7
31,469,857 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,364 UART: [art] PUB.X = 8C1781DF259605C5307EA949AB7E68B83CD4F19A67A23E60AF4024A2D00DA1C32ABB97B39D53210586BF06271918D2A6
31,478,603 UART: [art] PUB.Y = 7FF2F43997827273511B667705B6EC964CCFDE798A0F5755DFAEDB441551DF8BE761E93A4DAF55920D02F160E7D616D2
31,485,888 UART: [art] SIG.R = E7E05481EF0C5BC8573351DF8CAE5FA0DBD9D2A0D3DA831A50DFE944E3918B4FA197998207DCEF611D8140093B494C2D
31,493,222 UART: [art] SIG.S = 1F59B4FB2A4598715DDD25FBD581A75413213E068BDD08242FE6494F6183680310FED0A341ABDA270DB1D71EF1701D52
32,797,971 UART: Caliptra RT
32,798,672 UART: [state] CFI Enabled
32,960,589 UART: [rt] RT listening for mailbox commands...
32,975,677 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,807,230 ready_for_fw is high
3,807,647 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,749 >>> mbox cmd response: success
17,885,347 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,583,798 UART:
23,584,189 UART: Running Caliptra FMC ...
23,585,387 UART:
23,585,562 UART: [state] CFI Enabled
23,654,537 UART: [fht] FMC Alias Private Key: 7
25,992,397 UART: [art] Extend RT PCRs Done
25,993,627 UART: [art] Lock RT PCRs Done
25,995,158 UART: [art] Populate DV Done
26,000,682 UART: [fht] FMC Alias Private Key: 7
26,002,173 UART: [art] Derive CDI
26,002,940 UART: [art] Store in in slot 0x4
26,062,617 UART: [art] Derive Key Pair
26,063,682 UART: [art] Store priv key in slot 0x5
29,356,655 UART: [art] Derive Key Pair - Done
29,370,026 UART: [art] Signing Cert with AUTHO
29,371,368 UART: RITY.KEYID = 7
31,658,299 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,809 UART: [art] PUB.X = 4FD5D3EB8C524AC250D2E7CBADD6DB42DF745F59136D587803087D87AB5B962ECFD5DA5C8041AF29B94E9D3E0D263BEB
31,667,070 UART: [art] PUB.Y = 0E6259082184AAC7FF0CD29A9E83D0BA6A9332D7C041DCE71AF6834BA6A84B8E97796E3207D05C6E295C1991E1A5F388
31,674,325 UART: [art] SIG.R = 8900390C58BF92CD4D79663D42B7BF9AA212F8C4AFB04364D8B44F4FBABB6B6D50693BA0BE05866AB08B9B9BC1252F40
31,681,726 UART: [art] SIG.S = 4D4533A8736E29666831576E80976D99FB7F000E3A56B68557A4D2BFA69F8E49F58AC44E6CBCE993CEE81764B87E6548
32,987,224 UART: Caliptra RT
32,987,941 UART: [state] CFI Enabled
33,149,197 UART: [rt] RT listening for mailbox commands...
33,164,509 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
192,999 UART:
193,365 UART: Running Caliptra ROM ...
194,553 UART:
604,202 UART: [state] CFI Enabled
619,017 UART: [state] LifecycleState = Unprovisioned
620,916 UART: [state] DebugLocked = No
622,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,011 UART: [kat] SHA2-256
796,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,285 UART: [kat] ++
807,821 UART: [kat] sha1
819,835 UART: [kat] SHA2-256
822,555 UART: [kat] SHA2-384
827,755 UART: [kat] SHA2-512-ACC
830,124 UART: [kat] ECC-384
3,116,431 UART: [kat] HMAC-384Kdf
3,129,446 UART: [kat] LMS
4,319,569 UART: [kat] --
4,326,432 UART: [cold-reset] ++
4,327,441 UART: [fht] Storing FHT @ 0x50003400
4,338,577 UART: [idev] ++
4,339,154 UART: [idev] CDI.KEYID = 6
4,340,033 UART: [idev] SUBJECT.KEYID = 7
4,341,346 UART: [idev] UDS.KEYID = 0
4,342,298 ready_for_fw is high
4,342,488 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,348 UART: [idev] Erasing UDS.KEYID = 0
7,628,299 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,088 UART: [idev] --
7,654,860 UART: [ldev] ++
7,655,420 UART: [ldev] CDI.KEYID = 6
7,656,355 UART: [ldev] SUBJECT.KEYID = 5
7,657,615 UART: [ldev] AUTHORITY.KEYID = 7
7,658,762 UART: [ldev] FE.KEYID = 1
7,668,359 UART: [ldev] Erasing FE.KEYID = 1
10,957,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,942 UART: [ldev] --
13,318,525 UART: [fwproc] Waiting for Commands...
13,321,098 UART: [fwproc] Received command 0x46574c44
13,323,328 UART: [fwproc] Received Image of size 113760 bytes
17,375,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,844 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,646 >>> mbox cmd response: success
17,837,192 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,841,457 UART: [afmc] ++
17,842,097 UART: [afmc] CDI.KEYID = 6
17,843,005 UART: [afmc] SUBJECT.KEYID = 7
17,844,221 UART: [afmc] AUTHORITY.KEYID = 5
21,155,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,912 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,222 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,541 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,414 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,853 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,841 UART: [afmc] --
23,521,908 UART: [cold-reset] --
23,525,548 UART: [state] Locking Datavault
23,530,360 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,114 UART: [state] Locking ICCM
23,534,473 UART: [exit] Launching FMC @ 0x40000130
23,542,866 UART:
23,543,107 UART: Running Caliptra FMC ...
23,544,206 UART:
23,544,359 UART: [state] CFI Enabled
23,552,799 UART: [fht] FMC Alias Private Key: 7
25,883,168 UART: [art] Extend RT PCRs Done
25,884,369 UART: [art] Lock RT PCRs Done
25,885,854 UART: [art] Populate DV Done
25,891,273 UART: [fht] FMC Alias Private Key: 7
25,892,967 UART: [art] Derive CDI
25,893,778 UART: [art] Store in in slot 0x4
25,936,237 UART: [art] Derive Key Pair
25,937,276 UART: [art] Store priv key in slot 0x5
29,179,563 UART: [art] Derive Key Pair - Done
29,192,609 UART: [art] Signing Cert with AUTHO
29,193,940 UART: RITY.KEYID = 7
31,473,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,724 UART: [art] PUB.X = 207A75F3B39109AF6DEA4A61F25E33FD12F33025B08205187D0A047028A8BDFA5CFD08CE354BBD906638DBD195FB27CA
31,481,991 UART: [art] PUB.Y = C3D9EA83CA06A0C60AA4E191E7D82DDA91D89E988C45ABB5465E26831557AB6DC86C474110E132AE40247BD345CD14AC
31,489,253 UART: [art] SIG.R = 29E5DC76CE4CEE9908D6DD3A763BD1F416F81344BB42B11D268D8AE4733D26452264DF5982F74519F368E44046050C4C
31,496,627 UART: [art] SIG.S = C0484D77112468B8EEC3F3D2F3396918FDF95480F5CE50F27AF1C7AED1FCFB22ABADA3A1C77ABC0EBCA678D9BD21E9E0
32,801,847 UART: Caliptra RT
32,802,560 UART: [state] CFI Enabled
32,919,842 UART: [rt] RT listening for mailbox commands...
32,934,934 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,862 writing to cptra_bootfsm_go
4,128,868 ready_for_fw is high
4,129,417 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,057,610 >>> mbox cmd response: success
18,058,240 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,701,738 UART:
23,702,115 UART: Running Caliptra FMC ...
23,703,313 UART:
23,703,477 UART: [state] CFI Enabled
23,711,483 UART: [fht] FMC Alias Private Key: 7
26,041,928 UART: [art] Extend RT PCRs Done
26,043,150 UART: [art] Lock RT PCRs Done
26,044,785 UART: [art] Populate DV Done
26,050,309 UART: [fht] FMC Alias Private Key: 7
26,051,921 UART: [art] Derive CDI
26,052,737 UART: [art] Store in in slot 0x4
26,095,267 UART: [art] Derive Key Pair
26,096,338 UART: [art] Store priv key in slot 0x5
29,338,234 UART: [art] Derive Key Pair - Done
29,351,147 UART: [art] Signing Cert with AUTHO
29,352,479 UART: RITY.KEYID = 7
31,632,135 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,648 UART: [art] PUB.X = 91E3AFF744BAA7975563B8F7CDF5FC9F48E2657938DE5303896B509AB93578930C9B0A0D8F6F63AF9A0975697DA82AA7
31,640,866 UART: [art] PUB.Y = 64F84006B780530820434E6467E56C65BA3C686635F7C767B4920F15D44B5BC38BABC8634B8F2C452F154D436A8A1D24
31,648,085 UART: [art] SIG.R = B134720DC44F150B38A0965E38879522C19329F9680F1DA1565D4BFE8AF21E718322067CEF7BC7BCD924A747E9349C3B
31,655,478 UART: [art] SIG.S = B6960ED4EDE79C9597ACFA0D30B770506836C4B1DD43E4837F06C0D491EA75674DEC3B7BBC2AD757C1CB0EC2D7289228
32,960,006 UART: Caliptra RT
32,960,721 UART: [state] CFI Enabled
33,078,278 UART: [rt] RT listening for mailbox commands...
33,093,225 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,569 writing to cptra_bootfsm_go
192,660 UART:
193,052 UART: Running Caliptra ROM ...
194,221 UART:
194,367 UART: [state] CFI Enabled
262,681 UART: [state] LifecycleState = Unprovisioned
264,596 UART: [state] DebugLocked = No
266,914 UART: [state] WD Timer not started. Device not locked for debugging
270,238 UART: [kat] SHA2-256
449,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,890 UART: [kat] ++
461,420 UART: [kat] sha1
470,826 UART: [kat] SHA2-256
473,896 UART: [kat] SHA2-384
479,202 UART: [kat] SHA2-512-ACC
482,113 UART: [kat] ECC-384
2,927,845 UART: [kat] HMAC-384Kdf
2,951,847 UART: [kat] LMS
3,481,320 UART: [kat] --
3,485,693 UART: [cold-reset] ++
3,487,550 UART: [fht] FHT @ 0x50003400
3,497,391 UART: [idev] ++
3,497,960 UART: [idev] CDI.KEYID = 6
3,498,872 UART: [idev] SUBJECT.KEYID = 7
3,500,045 UART: [idev] UDS.KEYID = 0
3,500,973 ready_for_fw is high
3,501,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,644,730 UART: [idev] Erasing UDS.KEYID = 0
6,004,706 UART: [idev] Sha1 KeyId Algorithm
6,027,196 UART: [idev] --
6,030,981 UART: [ldev] ++
6,031,561 UART: [ldev] CDI.KEYID = 6
6,032,474 UART: [ldev] SUBJECT.KEYID = 5
6,033,652 UART: [ldev] AUTHORITY.KEYID = 7
6,034,886 UART: [ldev] FE.KEYID = 1
6,079,839 UART: [ldev] Erasing FE.KEYID = 1
8,585,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,536 UART: [ldev] --
10,399,153 UART: [fwproc] Wait for Commands...
10,401,229 UART: [fwproc] Recv command 0x46574c44
10,403,342 UART: [fwproc] Recv'd Img size: 114084 bytes
13,803,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,257,830 >>> mbox cmd response: success
14,258,350 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,261,490 UART: [afmc] ++
14,262,079 UART: [afmc] CDI.KEYID = 6
14,262,990 UART: [afmc] SUBJECT.KEYID = 7
14,264,142 UART: [afmc] AUTHORITY.KEYID = 5
16,791,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,514,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,516,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,532,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,548,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,564,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,586,750 UART: [afmc] --
18,591,208 UART: [cold-reset] --
18,596,465 UART: [state] Locking Datavault
18,601,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,602,708 UART: [state] Locking ICCM
18,605,180 UART: [exit] Launching FMC @ 0x40000130
18,613,571 UART:
18,613,801 UART: Running Caliptra FMC ...
18,614,897 UART:
18,615,050 UART: [state] CFI Enabled
18,670,558 UART: [fht] FMC Alias Private Key: 7
20,435,294 UART: [art] Extend RT PCRs Done
20,436,515 UART: [art] Lock RT PCRs Done
20,438,303 UART: [art] Populate DV Done
20,443,778 UART: [fht] FMC Alias Private Key: 7
20,445,420 UART: [art] Derive CDI
20,446,253 UART: [art] Store in in slot 0x4
20,503,329 UART: [art] Derive Key Pair
20,504,415 UART: [art] Store priv key in slot 0x5
22,967,032 UART: [art] Derive Key Pair - Done
22,979,974 UART: [art] Signing Cert with AUTHO
22,981,280 UART: RITY.KEYID = 7
24,693,897 UART: [art] Erasing AUTHORITY.KEYID = 7
24,695,402 UART: [art] PUB.X = 266F549CC09E4679057F071F556459BAF2BEE4E5ED9FDE3C76B5ED20ED9957C41E80EA6AF484056E021339F36355B5FC
24,702,661 UART: [art] PUB.Y = 10D3E135AAC568A1D039376CB354E55397D53608000FAA0EBD0AE0BD756303030D7290DC227C9B25B8540B2174BCA8D8
24,709,926 UART: [art] SIG.R = B471656D546CEC05F55A5E798D4A260D7CEC2A17512D2E1E9D0B960490FE7A8C1787A453E462DBC9E89DE93581262DEE
24,717,286 UART: [art] SIG.S = 2B957FA3B3EF5F345D25ECA55101939C3D5E25AF1CFCFB700A4CD0EE89A08F68AB2D325FB354DF899A8F13B257429E73
25,696,423 UART: Caliptra RT
25,697,122 UART: [state] CFI Enabled
25,861,067 UART: [rt] RT listening for mailbox commands...
25,876,159 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,597 writing to cptra_bootfsm_go
3,360,371 ready_for_fw is high
3,360,775 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,074,900 >>> mbox cmd response: success
14,075,465 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,362,418 UART:
18,362,806 UART: Running Caliptra FMC ...
18,363,999 UART:
18,364,168 UART: [state] CFI Enabled
18,431,757 UART: [fht] FMC Alias Private Key: 7
20,196,377 UART: [art] Extend RT PCRs Done
20,197,583 UART: [art] Lock RT PCRs Done
20,199,634 UART: [art] Populate DV Done
20,204,763 UART: [fht] FMC Alias Private Key: 7
20,206,402 UART: [art] Derive CDI
20,207,207 UART: [art] Store in in slot 0x4
20,264,091 UART: [art] Derive Key Pair
20,265,158 UART: [art] Store priv key in slot 0x5
22,727,929 UART: [art] Derive Key Pair - Done
22,741,194 UART: [art] Signing Cert with AUTHO
22,742,485 UART: RITY.KEYID = 7
24,453,487 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,999 UART: [art] PUB.X = C7D4C7C8C815CB38888370022703440931A1CD2E5EB87DFE6ACE631D693AF9A316EB597AC103D64CD0101108A75A8220
24,462,218 UART: [art] PUB.Y = C6E3C8E4BBC7771CF2C1E2C93E5D1288C29FD309CB5CE193B42716D6F9DF0F0CFD072D409E3E5079078E629F26FB15D2
24,469,512 UART: [art] SIG.R = B96D069FABCBBC4571309C16AB627546B7DD1F1FE0EC39226F178A2CE360878A0786C4064AB969E6C381BE6788F41B1E
24,476,921 UART: [art] SIG.S = 983D0823F219A441E6B0967AFE024EBE50ACCA1A9132DF4B779379BFCA66881090F49AAEC372817CBEBCADFB48858839
25,455,649 UART: Caliptra RT
25,456,352 UART: [state] CFI Enabled
25,621,444 UART: [rt] RT listening for mailbox commands...
25,636,531 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,825 writing to cptra_bootfsm_go
193,077 UART:
193,461 UART: Running Caliptra ROM ...
194,642 UART:
604,264 UART: [state] CFI Enabled
617,832 UART: [state] LifecycleState = Unprovisioned
619,682 UART: [state] DebugLocked = No
622,490 UART: [state] WD Timer not started. Device not locked for debugging
626,598 UART: [kat] SHA2-256
805,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,251 UART: [kat] ++
817,721 UART: [kat] sha1
828,453 UART: [kat] SHA2-256
831,531 UART: [kat] SHA2-384
838,873 UART: [kat] SHA2-512-ACC
841,819 UART: [kat] ECC-384
3,283,657 UART: [kat] HMAC-384Kdf
3,297,173 UART: [kat] LMS
3,826,712 UART: [kat] --
3,831,491 UART: [cold-reset] ++
3,832,433 UART: [fht] FHT @ 0x50003400
3,844,550 UART: [idev] ++
3,845,126 UART: [idev] CDI.KEYID = 6
3,846,035 UART: [idev] SUBJECT.KEYID = 7
3,847,212 UART: [idev] UDS.KEYID = 0
3,848,263 ready_for_fw is high
3,848,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,863 UART: [idev] Erasing UDS.KEYID = 0
6,321,108 UART: [idev] Sha1 KeyId Algorithm
6,344,067 UART: [idev] --
6,347,312 UART: [ldev] ++
6,347,888 UART: [ldev] CDI.KEYID = 6
6,348,799 UART: [ldev] SUBJECT.KEYID = 5
6,350,010 UART: [ldev] AUTHORITY.KEYID = 7
6,351,244 UART: [ldev] FE.KEYID = 1
6,361,463 UART: [ldev] Erasing FE.KEYID = 1
8,838,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,248 UART: [ldev] --
10,630,173 UART: [fwproc] Wait for Commands...
10,632,722 UART: [fwproc] Recv command 0x46574c44
10,634,764 UART: [fwproc] Recv'd Img size: 114084 bytes
14,042,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,492,579 >>> mbox cmd response: success
14,493,107 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,496,336 UART: [afmc] ++
14,496,921 UART: [afmc] CDI.KEYID = 6
14,497,807 UART: [afmc] SUBJECT.KEYID = 7
14,498,963 UART: [afmc] AUTHORITY.KEYID = 5
17,003,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,926 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,048 UART: [afmc] --
18,798,809 UART: [cold-reset] --
18,802,991 UART: [state] Locking Datavault
18,807,748 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,401 UART: [state] Locking ICCM
18,810,981 UART: [exit] Launching FMC @ 0x40000130
18,819,373 UART:
18,819,610 UART: Running Caliptra FMC ...
18,820,634 UART:
18,820,779 UART: [state] CFI Enabled
18,829,039 UART: [fht] FMC Alias Private Key: 7
20,586,025 UART: [art] Extend RT PCRs Done
20,587,246 UART: [art] Lock RT PCRs Done
20,588,924 UART: [art] Populate DV Done
20,594,444 UART: [fht] FMC Alias Private Key: 7
20,596,067 UART: [art] Derive CDI
20,596,892 UART: [art] Store in in slot 0x4
20,639,763 UART: [art] Derive Key Pair
20,640,806 UART: [art] Store priv key in slot 0x5
23,067,425 UART: [art] Derive Key Pair - Done
23,080,524 UART: [art] Signing Cert with AUTHO
23,081,832 UART: RITY.KEYID = 7
24,787,468 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,970 UART: [art] PUB.X = 90A3617C37D4EE5BDB475D04176CF437264DDD93C1B92A6BC83962A1FA0FEA6B45BD0FB472EFFDE5D7834922B86AA2BE
24,796,239 UART: [art] PUB.Y = B580C79493E5699A1C700B16E8E6B73C56A7377B8D154FDDADB8E2BE41244675164385C49E23B813062F65272CFB2470
24,803,489 UART: [art] SIG.R = 7EC2122E70AC42043A65EFCB7982334F1FE3A91599B13721BA936B8CE8425DB9EA7BE6F98A87BF36A4A304C9AC578D27
24,810,915 UART: [art] SIG.S = 467F253AFD4BE6612C820C5A3743A948B09B77EDF9477F93A96F087988ACA1C808D8649710144B54175961A62A3196E3
25,789,855 UART: Caliptra RT
25,790,556 UART: [state] CFI Enabled
25,908,601 UART: [rt] RT listening for mailbox commands...
25,923,761 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
3,701,572 ready_for_fw is high
3,702,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,930 >>> mbox cmd response: success
14,278,589 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,528,059 UART:
18,528,442 UART: Running Caliptra FMC ...
18,529,539 UART:
18,529,710 UART: [state] CFI Enabled
18,537,607 UART: [fht] FMC Alias Private Key: 7
20,293,995 UART: [art] Extend RT PCRs Done
20,295,221 UART: [art] Lock RT PCRs Done
20,296,767 UART: [art] Populate DV Done
20,302,336 UART: [fht] FMC Alias Private Key: 7
20,304,038 UART: [art] Derive CDI
20,304,779 UART: [art] Store in in slot 0x4
20,347,809 UART: [art] Derive Key Pair
20,348,847 UART: [art] Store priv key in slot 0x5
22,775,515 UART: [art] Derive Key Pair - Done
22,788,731 UART: [art] Signing Cert with AUTHO
22,790,038 UART: RITY.KEYID = 7
24,495,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,820 UART: [art] PUB.X = A20D4C9E8FB3394BA86D3D9C9AE9785BFF3BB947FC9081F756264C2ECB22C35EFB200AB3B72220E8617A2702228025D2
24,504,093 UART: [art] PUB.Y = E774C96C7B3344556C409DC7F604022A903261E672A0D23C568AC10EFC41579298FBCD157A917FCA984C37B56FE55453
24,511,346 UART: [art] SIG.R = 81BE8E9BC810EFE22AE9B690354385D9D002EC11A5DF0743545DAA273477F9E1485C9FA1A016358BFB7A809BB68FF6AF
24,518,779 UART: [art] SIG.S = 362732CF701EE85D36777B380857E5FB50FBCE8F55820F1D5FE657B8D344CAE9E544A179FDDD2E9E5ED14A340FD8A14E
25,497,586 UART: Caliptra RT
25,498,303 UART: [state] CFI Enabled
25,615,602 UART: [rt] RT listening for mailbox commands...
25,630,752 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,477 UART:
192,900 UART: Running Caliptra ROM ...
194,023 UART:
194,179 UART: [state] CFI Enabled
265,587 UART: [state] LifecycleState = Unprovisioned
268,007 UART: [state] DebugLocked = No
270,189 UART: [state] WD Timer not started. Device not locked for debugging
274,717 UART: [kat] SHA2-256
464,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,340 UART: [kat] ++
475,787 UART: [kat] sha1
487,781 UART: [kat] SHA2-256
490,864 UART: [kat] SHA2-384
497,489 UART: [kat] SHA2-512-ACC
500,068 UART: [kat] ECC-384
2,947,363 UART: [kat] HMAC-384Kdf
2,972,035 UART: [kat] LMS
3,503,820 UART: [kat] --
3,508,763 UART: [cold-reset] ++
3,511,336 UART: [fht] FHT @ 0x50003400
3,522,809 UART: [idev] ++
3,523,520 UART: [idev] CDI.KEYID = 6
3,524,549 UART: [idev] SUBJECT.KEYID = 7
3,525,650 UART: [idev] UDS.KEYID = 0
3,526,594 ready_for_fw is high
3,526,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,329 UART: [idev] Erasing UDS.KEYID = 0
6,030,660 UART: [idev] Sha1 KeyId Algorithm
6,054,048 UART: [idev] --
6,059,859 UART: [ldev] ++
6,060,555 UART: [ldev] CDI.KEYID = 6
6,061,492 UART: [ldev] SUBJECT.KEYID = 5
6,062,657 UART: [ldev] AUTHORITY.KEYID = 7
6,063,888 UART: [ldev] FE.KEYID = 1
6,100,237 UART: [ldev] Erasing FE.KEYID = 1
8,609,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,552 UART: [ldev] --
10,413,517 UART: [fwproc] Wait for Commands...
10,416,086 UART: [fwproc] Recv command 0x46574c44
10,418,347 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,597 >>> mbox cmd response: success
14,603,094 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,606,878 UART: [afmc] ++
14,607,584 UART: [afmc] CDI.KEYID = 6
14,608,842 UART: [afmc] SUBJECT.KEYID = 7
14,610,285 UART: [afmc] AUTHORITY.KEYID = 5
17,145,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,735 UART: [afmc] --
18,944,965 UART: [cold-reset] --
18,949,705 UART: [state] Locking Datavault
18,954,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,976 UART: [state] Locking ICCM
18,958,913 UART: [exit] Launching FMC @ 0x40000130
18,967,549 UART:
18,967,778 UART: Running Caliptra FMC ...
18,968,876 UART:
18,969,033 UART: [state] CFI Enabled
19,027,671 UART: [fht] FMC Alias Private Key: 7
20,791,525 UART: [art] Extend RT PCRs Done
20,792,750 UART: [art] Lock RT PCRs Done
20,794,239 UART: [art] Populate DV Done
20,799,538 UART: [fht] FMC Alias Private Key: 7
20,801,122 UART: [art] Derive CDI
20,801,863 UART: [art] Store in in slot 0x4
20,860,069 UART: [art] Derive Key Pair
20,861,112 UART: [art] Store priv key in slot 0x5
23,323,528 UART: [art] Derive Key Pair - Done
23,336,426 UART: [art] Signing Cert with AUTHO
23,337,753 UART: RITY.KEYID = 7
25,049,209 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,720 UART: [art] PUB.X = 7F14BDB95D5C9FE24D3D6D9A12641F7C821B96C569075A13E24E3D4B217FD6961B3F1A01BDC9670C4BAF66AEC8C283A6
25,057,983 UART: [art] PUB.Y = 8A22F4C755273FE082132E6C5E84424C1A34BDBA1896C8EF54C9ED38D576666CB576E0B3B7AE2B7AC367720D379D8815
25,065,236 UART: [art] SIG.R = D9E306AC3AE0B8B774971E186CA268014F9C30163911F742BED7F9469934236FFFD7B900F571B342F433A7234F11F6CD
25,072,592 UART: [art] SIG.S = FAB4687F3DD6475F6AF72C47E06E298B25AA9CD877BCC3D9C0C2E1CA0F907582EC4479B0C0F0438CA17653A68139E57D
26,051,387 UART: Caliptra RT
26,052,080 UART: [state] CFI Enabled
26,216,923 UART: [rt] RT listening for mailbox commands...
26,231,924 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,439,741 ready_for_fw is high
3,440,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,756,217 >>> mbox cmd response: success
14,757,009 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,039,542 UART:
19,039,951 UART: Running Caliptra FMC ...
19,041,149 UART:
19,041,317 UART: [state] CFI Enabled
19,108,509 UART: [fht] FMC Alias Private Key: 7
20,872,978 UART: [art] Extend RT PCRs Done
20,874,209 UART: [art] Lock RT PCRs Done
20,875,724 UART: [art] Populate DV Done
20,881,028 UART: [fht] FMC Alias Private Key: 7
20,882,511 UART: [art] Derive CDI
20,883,279 UART: [art] Store in in slot 0x4
20,941,054 UART: [art] Derive Key Pair
20,942,099 UART: [art] Store priv key in slot 0x5
23,404,706 UART: [art] Derive Key Pair - Done
23,417,398 UART: [art] Signing Cert with AUTHO
23,418,705 UART: RITY.KEYID = 7
25,130,837 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,348 UART: [art] PUB.X = 990FA1A52B71B68BBEC4E4726045F79904A64C8B2BEDCB125B7343CA247228D97D22630FA7CC6A3B4945A73F8E8ED87D
25,139,663 UART: [art] PUB.Y = D23CBF6C3A3CFB90278AB3DE774A53C629DF674B8A612D6DBFCAAD53CBF7130A61110811B385E6E6B95F7F318EB2E895
25,146,888 UART: [art] SIG.R = A64C38BF7F00D48F0BAE8B924E8D7A862D447DEA421495AA26BE6288405CD262C685750405789F632D34F752F2ACEABE
25,154,268 UART: [art] SIG.S = 04729141ED49D617B6B8748632D2A166DAC9269AA53A5C15AAC835A4CC54D0A756F233D707DCA8951F2314B3C2F33DD6
26,133,516 UART: Caliptra RT
26,134,229 UART: [state] CFI Enabled
26,298,625 UART: [rt] RT listening for mailbox commands...
26,313,988 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,651 writing to cptra_bootfsm_go
193,882 UART:
194,250 UART: Running Caliptra ROM ...
195,443 UART:
604,904 UART: [state] CFI Enabled
621,688 UART: [state] LifecycleState = Unprovisioned
624,065 UART: [state] DebugLocked = No
626,313 UART: [state] WD Timer not started. Device not locked for debugging
631,777 UART: [kat] SHA2-256
821,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,454 UART: [kat] ++
833,057 UART: [kat] sha1
845,501 UART: [kat] SHA2-256
848,503 UART: [kat] SHA2-384
855,269 UART: [kat] SHA2-512-ACC
857,855 UART: [kat] ECC-384
3,301,914 UART: [kat] HMAC-384Kdf
3,314,301 UART: [kat] LMS
3,846,128 UART: [kat] --
3,851,191 UART: [cold-reset] ++
3,853,552 UART: [fht] FHT @ 0x50003400
3,866,582 UART: [idev] ++
3,867,290 UART: [idev] CDI.KEYID = 6
3,868,176 UART: [idev] SUBJECT.KEYID = 7
3,869,418 UART: [idev] UDS.KEYID = 0
3,870,355 ready_for_fw is high
3,870,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,013,918 UART: [idev] Erasing UDS.KEYID = 0
6,347,013 UART: [idev] Sha1 KeyId Algorithm
6,369,988 UART: [idev] --
6,374,364 UART: [ldev] ++
6,375,048 UART: [ldev] CDI.KEYID = 6
6,375,988 UART: [ldev] SUBJECT.KEYID = 5
6,377,149 UART: [ldev] AUTHORITY.KEYID = 7
6,378,381 UART: [ldev] FE.KEYID = 1
6,387,408 UART: [ldev] Erasing FE.KEYID = 1
8,862,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,310 UART: [ldev] --
10,652,386 UART: [fwproc] Wait for Commands...
10,655,025 UART: [fwproc] Recv command 0x46574c44
10,657,338 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,835,946 >>> mbox cmd response: success
14,836,433 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,839,234 UART: [afmc] ++
14,839,930 UART: [afmc] CDI.KEYID = 6
14,841,123 UART: [afmc] SUBJECT.KEYID = 7
14,842,619 UART: [afmc] AUTHORITY.KEYID = 5
17,345,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,449 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,736 UART: [afmc] --
19,139,505 UART: [cold-reset] --
19,143,319 UART: [state] Locking Datavault
19,150,741 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,914 UART: [state] Locking ICCM
19,155,664 UART: [exit] Launching FMC @ 0x40000130
19,164,340 UART:
19,164,584 UART: Running Caliptra FMC ...
19,165,693 UART:
19,165,854 UART: [state] CFI Enabled
19,173,954 UART: [fht] FMC Alias Private Key: 7
20,930,978 UART: [art] Extend RT PCRs Done
20,932,203 UART: [art] Lock RT PCRs Done
20,934,098 UART: [art] Populate DV Done
20,939,625 UART: [fht] FMC Alias Private Key: 7
20,941,166 UART: [art] Derive CDI
20,941,979 UART: [art] Store in in slot 0x4
20,984,255 UART: [art] Derive Key Pair
20,985,298 UART: [art] Store priv key in slot 0x5
23,412,175 UART: [art] Derive Key Pair - Done
23,425,028 UART: [art] Signing Cert with AUTHO
23,426,339 UART: RITY.KEYID = 7
25,131,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,286 UART: [art] PUB.X = AAAE6CE69FA0B16B955609A390A83611C8BD4CBF82B1F0525EADB85D1090D0F42C59BBAE1BE8B6DF6844079CD04D826F
25,140,552 UART: [art] PUB.Y = 47D6F36D09B2E7AB78006D30BFE55457BBDCEEE3BE6EFBA4D1C82F9FFC9777889F3A50CB98D8A228F0E538F5B88A5CF0
25,147,808 UART: [art] SIG.R = 6787DD9A8C6AC36D6D1FF3EC112EA2C133E0186669B0C3C2D7F00C664BBE5228FEA36D0A72FEBA915848CEFC1DEA5C44
25,155,272 UART: [art] SIG.S = A3776D8C879E5B1AB12CD1C2D63DCA469FC8646EE7594482172400D1289EE5D96F2DAD4E3ED83A1B8CD38AF3FF969108
26,134,321 UART: Caliptra RT
26,135,013 UART: [state] CFI Enabled
26,252,672 UART: [rt] RT listening for mailbox commands...
26,267,567 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
3,760,654 ready_for_fw is high
3,761,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,039 >>> mbox cmd response: success
14,951,666 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,208,646 UART:
19,209,069 UART: Running Caliptra FMC ...
19,210,210 UART:
19,210,369 UART: [state] CFI Enabled
19,218,431 UART: [fht] FMC Alias Private Key: 7
20,975,469 UART: [art] Extend RT PCRs Done
20,976,699 UART: [art] Lock RT PCRs Done
20,978,489 UART: [art] Populate DV Done
20,983,809 UART: [fht] FMC Alias Private Key: 7
20,985,416 UART: [art] Derive CDI
20,986,238 UART: [art] Store in in slot 0x4
21,028,458 UART: [art] Derive Key Pair
21,029,502 UART: [art] Store priv key in slot 0x5
23,456,325 UART: [art] Derive Key Pair - Done
23,469,823 UART: [art] Signing Cert with AUTHO
23,471,137 UART: RITY.KEYID = 7
25,176,360 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,876 UART: [art] PUB.X = E3995536EF79C2B25FF30F8B3EA194488E46A31432EBA412D060600E00799DCE76905710C98833F46DE5D41CADC3E5CB
25,185,113 UART: [art] PUB.Y = 2B90E5A71F0D1AD0AC7F0D3E7BAD18377E88749FF7ECD41458A77CE8EAB0656AB0146EFC9ACB2E262738AD33E271AAC2
25,192,372 UART: [art] SIG.R = 3D886A36DC07C2922FF496E0D9F33B569430F8B9A78D0106CCE26FF16D12528069EB8DD874D22207EFE6847A51369AC2
25,199,738 UART: [art] SIG.S = 8E4595DCA2EE00F70F98E0AF89A96F76E4568EBC47E66AFFDF9557C860067C5AEFE5223733DF93A47D667CC9217A6975
26,178,896 UART: Caliptra RT
26,179,592 UART: [state] CFI Enabled
26,297,080 UART: [rt] RT listening for mailbox commands...
26,312,420 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
895,028 UART: [kat] SHA2-512-ACC
896,929 UART: [kat] ECC-384
902,620 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,817 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 ready_for_fw is high
1,481,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,504,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,613 UART: [ldev] ++
1,514,781 UART: [ldev] CDI.KEYID = 6
1,515,144 UART: [ldev] SUBJECT.KEYID = 5
1,515,570 UART: [ldev] AUTHORITY.KEYID = 7
1,516,033 UART: [ldev] FE.KEYID = 1
1,521,173 UART: [ldev] Erasing FE.KEYID = 1
1,547,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,036 UART: [ldev] --
1,586,439 UART: [fwproc] Waiting for Commands...
1,587,162 UART: [fwproc] Received command 0x46574c44
1,587,953 UART: [fwproc] Received Image of size 114084 bytes
2,882,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,732 >>> mbox cmd response: success
3,074,732 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,075,858 UART: [afmc] ++
3,076,026 UART: [afmc] CDI.KEYID = 6
3,076,388 UART: [afmc] SUBJECT.KEYID = 7
3,076,813 UART: [afmc] AUTHORITY.KEYID = 5
3,111,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,351 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,041 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,778 UART: [afmc] --
3,154,714 UART: [cold-reset] --
3,155,554 UART: [state] Locking Datavault
3,156,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,437 UART: [state] Locking ICCM
3,158,043 UART: [exit] Launching FMC @ 0x40000130
3,163,372 UART:
3,163,388 UART: Running Caliptra FMC ...
3,163,796 UART:
3,163,850 UART: [state] CFI Enabled
3,174,161 UART: [fht] FMC Alias Private Key: 7
3,281,528 UART: [art] Extend RT PCRs Done
3,281,956 UART: [art] Lock RT PCRs Done
3,283,788 UART: [art] Populate DV Done
3,291,831 UART: [fht] FMC Alias Private Key: 7
3,292,931 UART: [art] Derive CDI
3,293,211 UART: [art] Store in in slot 0x4
3,378,836 UART: [art] Derive Key Pair
3,379,196 UART: [art] Store priv key in slot 0x5
3,392,276 UART: [art] Derive Key Pair - Done
3,407,247 UART: [art] Signing Cert with AUTHO
3,407,727 UART: RITY.KEYID = 7
3,422,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,640 UART: [art] PUB.X = 6D2A2EDE31E67886ECD0AC8CBA2198D024D9D91B86CE35DBF0EEFC0FE6927A84A1485906F9D469E406614979D3EE824C
3,430,415 UART: [art] PUB.Y = 5498F970C7D0435C558B32FD28FAC511A8B3B529C998079D221200A0AFCCC2935AF57247489E4B2D268C82B2C3EA1DD2
3,437,344 UART: [art] SIG.R = 1C009D7C6C66584DF028693460406DFD55E4BED91E53E3EB4C56FEA610071B382E339434702EF91ED0168AB1F2EE73BE
3,444,095 UART: [art] SIG.S = 3F6CDB56C4AAA32432CDB002D797360FBC83731D53A662819A7AF98A60088E58D57C20F7BF5DF764FD56DBD080B908DB
3,468,086 UART: Caliptra RT
3,468,339 UART: [state] CFI Enabled
3,576,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,448 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,171 ready_for_fw is high
1,362,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,574 >>> mbox cmd response: success
2,924,574 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,986,152 UART:
2,986,168 UART: Running Caliptra FMC ...
2,986,576 UART:
2,986,630 UART: [state] CFI Enabled
2,997,221 UART: [fht] FMC Alias Private Key: 7
3,105,026 UART: [art] Extend RT PCRs Done
3,105,454 UART: [art] Lock RT PCRs Done
3,106,994 UART: [art] Populate DV Done
3,115,127 UART: [fht] FMC Alias Private Key: 7
3,116,115 UART: [art] Derive CDI
3,116,395 UART: [art] Store in in slot 0x4
3,202,580 UART: [art] Derive Key Pair
3,202,940 UART: [art] Store priv key in slot 0x5
3,216,492 UART: [art] Derive Key Pair - Done
3,231,524 UART: [art] Signing Cert with AUTHO
3,232,004 UART: RITY.KEYID = 7
3,247,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,073 UART: [art] PUB.X = F70C4BF3FE1A847EB1662F275D84A74B25A300D6D30E265BBC63820142EDB07A4713289F39C5093E54874D8F08738F3B
3,254,806 UART: [art] PUB.Y = 6B5337F6FB9691C8364FE540C3316FF9ED0232F99487A68564AE8B44D45102CC00BE7663945D1442860AD369F31CE374
3,261,719 UART: [art] SIG.R = 63446E8E8D384AB337EF0340A541E58B73290774FA7362AB97E74828D0DB276EA9B87D5728B600BB21EEEE649EACBFC3
3,268,469 UART: [art] SIG.S = 1E8CDF14BC6700CCD5EE22F4B574FB687D8F0D6606428B0E25F4BAD177B87BB16930FA6293C612248F18E63D4ADC5386
3,292,197 UART: Caliptra RT
3,292,450 UART: [state] CFI Enabled
3,400,330 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,529 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,507 UART: [kat] LMS
1,475,703 UART: [kat] --
1,476,380 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,705 UART: [idev] ++
1,479,873 UART: [idev] CDI.KEYID = 6
1,480,233 UART: [idev] SUBJECT.KEYID = 7
1,480,657 UART: [idev] UDS.KEYID = 0
1,481,002 ready_for_fw is high
1,481,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,309 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,515,084 UART: [ldev] ++
1,515,252 UART: [ldev] CDI.KEYID = 6
1,515,615 UART: [ldev] SUBJECT.KEYID = 5
1,516,041 UART: [ldev] AUTHORITY.KEYID = 7
1,516,504 UART: [ldev] FE.KEYID = 1
1,521,922 UART: [ldev] Erasing FE.KEYID = 1
1,547,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,844 UART: [fwproc] Waiting for Commands...
1,587,507 UART: [fwproc] Received command 0x46574c44
1,588,298 UART: [fwproc] Received Image of size 114084 bytes
2,884,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,940 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,853 >>> mbox cmd response: success
3,076,853 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,101 UART: [afmc] ++
3,078,269 UART: [afmc] CDI.KEYID = 6
3,078,631 UART: [afmc] SUBJECT.KEYID = 7
3,079,056 UART: [afmc] AUTHORITY.KEYID = 5
3,114,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,076 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,766 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,615 UART: [afmc] --
3,157,683 UART: [cold-reset] --
3,158,553 UART: [state] Locking Datavault
3,159,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,132 UART: [state] Locking ICCM
3,160,632 UART: [exit] Launching FMC @ 0x40000130
3,165,961 UART:
3,165,977 UART: Running Caliptra FMC ...
3,166,385 UART:
3,166,528 UART: [state] CFI Enabled
3,176,981 UART: [fht] FMC Alias Private Key: 7
3,284,854 UART: [art] Extend RT PCRs Done
3,285,282 UART: [art] Lock RT PCRs Done
3,286,538 UART: [art] Populate DV Done
3,294,443 UART: [fht] FMC Alias Private Key: 7
3,295,581 UART: [art] Derive CDI
3,295,861 UART: [art] Store in in slot 0x4
3,382,012 UART: [art] Derive Key Pair
3,382,372 UART: [art] Store priv key in slot 0x5
3,395,970 UART: [art] Derive Key Pair - Done
3,410,715 UART: [art] Signing Cert with AUTHO
3,411,195 UART: RITY.KEYID = 7
3,427,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,850 UART: [art] PUB.X = 53D0CB6600BE7B1809C35950684B5742BB0C238F2359E3FBA32413CBD107AAB7C79AB8F3E68B3EF1C9E27EB7F26DA923
3,434,601 UART: [art] PUB.Y = DFC40FDDCBC14F0A98052093B375C359A7824F12D189B328E173B1B5B42AD66DC54AA48912E3E402F57CB2AC82C663C6
3,441,549 UART: [art] SIG.R = 14CF61DB5E7D695FC6C5CBB836462FC76E8E34C71E87B08ACB305EE7595E46223681F493345AF84E968629AF3047626A
3,448,321 UART: [art] SIG.S = 5C174B05431B7C988EF829348B1A401A691E5639A3BFA6850E99FE33B5E2CBFDE33FA0F4F9544FCCE0D39CEBE3450AAA
3,471,865 UART: Caliptra RT
3,472,210 UART: [state] CFI Enabled
3,580,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,429 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 ready_for_fw is high
1,362,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,109 >>> mbox cmd response: success
2,926,109 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,987,639 UART:
2,987,655 UART: Running Caliptra FMC ...
2,988,063 UART:
2,988,206 UART: [state] CFI Enabled
2,998,699 UART: [fht] FMC Alias Private Key: 7
3,106,600 UART: [art] Extend RT PCRs Done
3,107,028 UART: [art] Lock RT PCRs Done
3,108,820 UART: [art] Populate DV Done
3,117,065 UART: [fht] FMC Alias Private Key: 7
3,118,091 UART: [art] Derive CDI
3,118,371 UART: [art] Store in in slot 0x4
3,203,944 UART: [art] Derive Key Pair
3,204,304 UART: [art] Store priv key in slot 0x5
3,217,116 UART: [art] Derive Key Pair - Done
3,231,519 UART: [art] Signing Cert with AUTHO
3,231,999 UART: RITY.KEYID = 7
3,247,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,164 UART: [art] PUB.X = 09AE27F99AA5FCE9270193234605908D6A0DB37F7AF93ED4BC59003A69971770749D4E6AFEEB2EC6D4324455B2E57584
3,254,902 UART: [art] PUB.Y = A82BB71798CA27426627AF24A6DB721990BEC0DB63A0FB3E3673849A986E0B838228D88846075D873446D84EA0783D41
3,261,840 UART: [art] SIG.R = 450C1F6532EE1536D995FA1DEF2D0122E1B207A3D450B32D6265D128439AD226441D30EA5DDD5681F4E23BC1FB072D1F
3,268,604 UART: [art] SIG.S = D824BE78ED0F132D1A50CE686C0A70F29728ECFE3918A71A230A1A21A03436C4FA2B342D2FEFD64693AAC10B2E47F3BB
3,292,283 UART: Caliptra RT
3,292,628 UART: [state] CFI Enabled
3,400,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,446 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,511 UART: [kat] SHA2-256
903,451 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
917,486 UART: [kat] HMAC-384Kdf
922,314 UART: [kat] LMS
1,170,642 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,241 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,890 UART: [idev] Erasing UDS.KEYID = 0
1,201,063 UART: [idev] Sha1 KeyId Algorithm
1,209,629 UART: [idev] --
1,210,721 UART: [ldev] ++
1,210,889 UART: [ldev] CDI.KEYID = 6
1,211,252 UART: [ldev] SUBJECT.KEYID = 5
1,211,678 UART: [ldev] AUTHORITY.KEYID = 7
1,212,141 UART: [ldev] FE.KEYID = 1
1,217,483 UART: [ldev] Erasing FE.KEYID = 1
1,244,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,201 UART: [ldev] --
1,283,590 UART: [fwproc] Wait for Commands...
1,284,160 UART: [fwproc] Recv command 0x46574c44
1,284,888 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,671 >>> mbox cmd response: success
2,771,671 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,772,727 UART: [afmc] ++
2,772,895 UART: [afmc] CDI.KEYID = 6
2,773,257 UART: [afmc] SUBJECT.KEYID = 7
2,773,682 UART: [afmc] AUTHORITY.KEYID = 5
2,808,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,524 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,984 UART: [afmc] --
2,852,008 UART: [cold-reset] --
2,852,784 UART: [state] Locking Datavault
2,853,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,499 UART: [state] Locking ICCM
2,854,989 UART: [exit] Launching FMC @ 0x40000130
2,860,318 UART:
2,860,334 UART: Running Caliptra FMC ...
2,860,742 UART:
2,860,796 UART: [state] CFI Enabled
2,871,067 UART: [fht] FMC Alias Private Key: 7
2,978,996 UART: [art] Extend RT PCRs Done
2,979,424 UART: [art] Lock RT PCRs Done
2,980,792 UART: [art] Populate DV Done
2,988,855 UART: [fht] FMC Alias Private Key: 7
2,989,993 UART: [art] Derive CDI
2,990,273 UART: [art] Store in in slot 0x4
3,076,202 UART: [art] Derive Key Pair
3,076,562 UART: [art] Store priv key in slot 0x5
3,090,294 UART: [art] Derive Key Pair - Done
3,105,075 UART: [art] Signing Cert with AUTHO
3,105,555 UART: RITY.KEYID = 7
3,120,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,710 UART: [art] PUB.X = EAC9710FBBADD6DC1795A0A2C2B8843BC1666268CEE28E35621F4A44D3371EB7091F997F3FC885CAF15153D9BA2968A3
3,128,486 UART: [art] PUB.Y = 776067D711B8944955DA2CDA3720014416621CD598C3D266E3EE1FAB7213CAA42F386E9B51EAE9A50108DE13B19EAB33
3,135,431 UART: [art] SIG.R = ED94B57EE6EB11F57F63CDF49A25105591E805F7A043B0F8B74BCAB40BE7DA1BAA3F220021FCC5D95414B0094B4C69D3
3,142,186 UART: [art] SIG.S = 7EDC64DF669189EFC4EC1D8FC1C500866A286317189F537F7B665315F1FA5964ACC61BE812CD56B7714BAB690784F248
3,165,638 UART: Caliptra RT
3,165,891 UART: [state] CFI Enabled
3,273,618 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,693 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 ready_for_fw is high
1,060,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,418 >>> mbox cmd response: success
2,622,418 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,554 UART:
2,684,570 UART: Running Caliptra FMC ...
2,684,978 UART:
2,685,032 UART: [state] CFI Enabled
2,695,793 UART: [fht] FMC Alias Private Key: 7
2,803,632 UART: [art] Extend RT PCRs Done
2,804,060 UART: [art] Lock RT PCRs Done
2,805,498 UART: [art] Populate DV Done
2,813,485 UART: [fht] FMC Alias Private Key: 7
2,814,531 UART: [art] Derive CDI
2,814,811 UART: [art] Store in in slot 0x4
2,900,456 UART: [art] Derive Key Pair
2,900,816 UART: [art] Store priv key in slot 0x5
2,914,508 UART: [art] Derive Key Pair - Done
2,929,135 UART: [art] Signing Cert with AUTHO
2,929,615 UART: RITY.KEYID = 7
2,944,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,488 UART: [art] PUB.X = 52B9F915C807AE73C86E451AAC5A88E1A5B756DA4411ED518C0D3DE2E350A35FAE34001F1FDFAA0B8F0EF400CB592C59
2,952,220 UART: [art] PUB.Y = AC88D96BCC55BC5DB43DB2FF1662EB29CA1F55619E0E3E2451F9FD3955E69F7666A752E4171B4E7945A277A525C56B28
2,959,175 UART: [art] SIG.R = E6156F57B51640C89ECBD140E038E72CB33D2258F63F4A5F2B63C9578B65CC0ADCC9984A756413A493A426CBEE8E3A61
2,965,950 UART: [art] SIG.S = FB25C83F60F89049B2429EDBD4F0BD0C78E67A6BE707A8C0D4AF385BED8C61376158FEE11393C748BFB4A7B4273BA75F
2,990,089 UART: Caliptra RT
2,990,342 UART: [state] CFI Enabled
3,098,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,771 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
919,089 UART: [kat] HMAC-384Kdf
923,675 UART: [kat] LMS
1,172,003 UART: [kat] --
1,172,886 UART: [cold-reset] ++
1,173,278 UART: [fht] FHT @ 0x50003400
1,175,929 UART: [idev] ++
1,176,097 UART: [idev] CDI.KEYID = 6
1,176,457 UART: [idev] SUBJECT.KEYID = 7
1,176,881 UART: [idev] UDS.KEYID = 0
1,177,226 ready_for_fw is high
1,177,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,709 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,210,954 UART: [ldev] ++
1,211,122 UART: [ldev] CDI.KEYID = 6
1,211,485 UART: [ldev] SUBJECT.KEYID = 5
1,211,911 UART: [ldev] AUTHORITY.KEYID = 7
1,212,374 UART: [ldev] FE.KEYID = 1
1,217,534 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,662 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,779 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,042 >>> mbox cmd response: success
2,772,042 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,773,118 UART: [afmc] ++
2,773,286 UART: [afmc] CDI.KEYID = 6
2,773,648 UART: [afmc] SUBJECT.KEYID = 7
2,774,073 UART: [afmc] AUTHORITY.KEYID = 5
2,808,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,053 UART: [afmc] --
2,852,163 UART: [cold-reset] --
2,853,097 UART: [state] Locking Datavault
2,854,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,920 UART: [state] Locking ICCM
2,855,460 UART: [exit] Launching FMC @ 0x40000130
2,860,789 UART:
2,860,805 UART: Running Caliptra FMC ...
2,861,213 UART:
2,861,356 UART: [state] CFI Enabled
2,871,957 UART: [fht] FMC Alias Private Key: 7
2,980,016 UART: [art] Extend RT PCRs Done
2,980,444 UART: [art] Lock RT PCRs Done
2,981,866 UART: [art] Populate DV Done
2,989,963 UART: [fht] FMC Alias Private Key: 7
2,991,117 UART: [art] Derive CDI
2,991,397 UART: [art] Store in in slot 0x4
3,077,156 UART: [art] Derive Key Pair
3,077,516 UART: [art] Store priv key in slot 0x5
3,090,886 UART: [art] Derive Key Pair - Done
3,105,665 UART: [art] Signing Cert with AUTHO
3,106,145 UART: RITY.KEYID = 7
3,121,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,884 UART: [art] PUB.X = 9A7FD36E9FE99E0691B09115D14B3DBD3D806B5250FB27BA9CD0CF87E9A6EDBE28A86FED60CDBA04CBFCF9A77AA830B1
3,128,678 UART: [art] PUB.Y = 5562FE84FD7854D006F33668E62A70C0525B93DCCFABD06E456B3E311A17CAD4A73AB61481E35C5907FA9006512440F8
3,135,621 UART: [art] SIG.R = E2DB8100ECA73B88D2B31328C1873E589E21F358829C414AFA710614F682F2B89F83F97A229F4E4FCC6A064BF788D252
3,142,365 UART: [art] SIG.S = A0197CD617C1AAA3BDC3C15C3ADB4167704CA507EA2B34F2D6D28C6C589B7059FB3459EFC04F99DD9297D87C567B9885
3,166,115 UART: Caliptra RT
3,166,460 UART: [state] CFI Enabled
3,273,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,379 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,566 ready_for_fw is high
1,061,566 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,461 >>> mbox cmd response: success
2,625,461 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,687,567 UART:
2,687,583 UART: Running Caliptra FMC ...
2,687,991 UART:
2,688,134 UART: [state] CFI Enabled
2,698,609 UART: [fht] FMC Alias Private Key: 7
2,806,384 UART: [art] Extend RT PCRs Done
2,806,812 UART: [art] Lock RT PCRs Done
2,808,228 UART: [art] Populate DV Done
2,816,617 UART: [fht] FMC Alias Private Key: 7
2,817,723 UART: [art] Derive CDI
2,818,003 UART: [art] Store in in slot 0x4
2,903,404 UART: [art] Derive Key Pair
2,903,764 UART: [art] Store priv key in slot 0x5
2,917,114 UART: [art] Derive Key Pair - Done
2,931,884 UART: [art] Signing Cert with AUTHO
2,932,364 UART: RITY.KEYID = 7
2,948,124 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,889 UART: [art] PUB.X = 23BAB890C71257B96579119E9418A4CFFE37FA0E0EB2ECD24CD1B6733D98B093F616F18F7E856B5875CD7030AB625982
2,955,657 UART: [art] PUB.Y = 219CEC4BE92B075A191CBC0BFDCE024D4AEFD6ED3AED0D1BFB12B93B1300AA6E88C32ABB00A7BBAC56A33936AF3427EC
2,962,585 UART: [art] SIG.R = 3C3354A15C2508095F2E7D9E8B69483E5DEFE0A5F8B0BE78F696DD6673F3D5ADE7A2DA41C2943DE0C03A89B195411770
2,969,357 UART: [art] SIG.S = C814970F17C0861268D2AE3E43C536850E61B966D4C714C94A378DB52C20DDBE5307847CBE3C7DA054078BE087059218
2,992,921 UART: Caliptra RT
2,993,266 UART: [state] CFI Enabled
3,100,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,114,956 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,510 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,902 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,061 >>> mbox cmd response: success
2,770,061 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,771,084 UART: [afmc] ++
2,771,252 UART: [afmc] CDI.KEYID = 6
2,771,615 UART: [afmc] SUBJECT.KEYID = 7
2,772,041 UART: [afmc] AUTHORITY.KEYID = 5
2,807,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,999 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,718 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,449 UART: [afmc] --
2,850,557 UART: [cold-reset] --
2,851,231 UART: [state] Locking Datavault
2,852,432 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,036 UART: [state] Locking ICCM
2,853,458 UART: [exit] Launching FMC @ 0x40000130
2,858,787 UART:
2,858,803 UART: Running Caliptra FMC ...
2,859,211 UART:
2,859,265 UART: [state] CFI Enabled
2,869,506 UART: [fht] FMC Alias Private Key: 7
2,977,813 UART: [art] Extend RT PCRs Done
2,978,241 UART: [art] Lock RT PCRs Done
2,979,823 UART: [art] Populate DV Done
2,987,786 UART: [fht] FMC Alias Private Key: 7
2,988,848 UART: [art] Derive CDI
2,989,128 UART: [art] Store in in slot 0x4
3,074,617 UART: [art] Derive Key Pair
3,074,977 UART: [art] Store priv key in slot 0x5
3,087,879 UART: [art] Derive Key Pair - Done
3,102,775 UART: [art] Signing Cert with AUTHO
3,103,255 UART: RITY.KEYID = 7
3,118,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,126 UART: [art] PUB.X = 43A5874977A067274833A2B11BB0BC209153A58CF90812DC1768B7FB962C958E470BCBDB61BA437E68DB77EBBFB6305B
3,125,896 UART: [art] PUB.Y = B87385EE0F356ACB96D3ADC7E7EBAE784BFEBF251F86A914F518A058F88E4A6A50B3B135F2543FA9AB5F14498670025A
3,132,854 UART: [art] SIG.R = 7B75180F902C54B1521E4A55C95B88F398C975449E473447B8177E8E642CCF20B3C3C233DC824EE675248C1E1E6AB340
3,139,617 UART: [art] SIG.S = 727EEB37D3DD2D8027DC675578A1A19560225C0274B157ABBFFAE19748F688EFEAD169653B08682D71074923F7ADFAFF
3,163,397 UART: Caliptra RT
3,163,650 UART: [state] CFI Enabled
3,270,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,284,830 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,278 ready_for_fw is high
1,056,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,773 >>> mbox cmd response: success
2,617,773 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,679,283 UART:
2,679,299 UART: Running Caliptra FMC ...
2,679,707 UART:
2,679,761 UART: [state] CFI Enabled
2,690,318 UART: [fht] FMC Alias Private Key: 7
2,798,159 UART: [art] Extend RT PCRs Done
2,798,587 UART: [art] Lock RT PCRs Done
2,800,347 UART: [art] Populate DV Done
2,808,486 UART: [fht] FMC Alias Private Key: 7
2,809,416 UART: [art] Derive CDI
2,809,696 UART: [art] Store in in slot 0x4
2,895,101 UART: [art] Derive Key Pair
2,895,461 UART: [art] Store priv key in slot 0x5
2,908,833 UART: [art] Derive Key Pair - Done
2,923,469 UART: [art] Signing Cert with AUTHO
2,923,949 UART: RITY.KEYID = 7
2,939,219 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,984 UART: [art] PUB.X = 0C56677558A00F938321ABD0389E118A628A9B34B71D6B703DC8E9693B37B6680C3058AB11B83322BC8DDB35C69CAF08
2,946,742 UART: [art] PUB.Y = CF06C72407962D82E34890A799BA2D1E23AD3CCF8A1E86E96EA01B6C130B75F8DFEEE4C2DC9C78FE61B9CE3B9326684F
2,953,701 UART: [art] SIG.R = 8541B38F157B63989213E9CDD71B24820A92AEE24E7856DE14D25325E068A456D0E4FB98B735CAA930C938490DA85DB4
2,960,465 UART: [art] SIG.S = F38589F543356EB1FF3D6FECEBD7A5E192A4A6FE46BED9075FB7589CC0B9CF6597C77D3CEF08E40A0AF6F94933DBE5CF
2,984,216 UART: Caliptra RT
2,984,469 UART: [state] CFI Enabled
3,092,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,106,532 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,697 UART: [kat] SHA2-512-ACC
906,598 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 ready_for_fw is high
1,174,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,732 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,101 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,315 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,282,129 UART: [fwproc] Wait for Commands...
1,282,764 UART: [fwproc] Recv command 0x46574c44
1,283,497 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,820 >>> mbox cmd response: success
2,770,820 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,772,023 UART: [afmc] ++
2,772,191 UART: [afmc] CDI.KEYID = 6
2,772,554 UART: [afmc] SUBJECT.KEYID = 7
2,772,980 UART: [afmc] AUTHORITY.KEYID = 5
2,809,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,822 UART: [afmc] --
2,852,918 UART: [cold-reset] --
2,853,530 UART: [state] Locking Datavault
2,854,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,159 UART: [state] Locking ICCM
2,855,669 UART: [exit] Launching FMC @ 0x40000130
2,860,998 UART:
2,861,014 UART: Running Caliptra FMC ...
2,861,422 UART:
2,861,565 UART: [state] CFI Enabled
2,872,648 UART: [fht] FMC Alias Private Key: 7
2,980,973 UART: [art] Extend RT PCRs Done
2,981,401 UART: [art] Lock RT PCRs Done
2,982,913 UART: [art] Populate DV Done
2,991,110 UART: [fht] FMC Alias Private Key: 7
2,992,280 UART: [art] Derive CDI
2,992,560 UART: [art] Store in in slot 0x4
3,077,993 UART: [art] Derive Key Pair
3,078,353 UART: [art] Store priv key in slot 0x5
3,091,079 UART: [art] Derive Key Pair - Done
3,105,828 UART: [art] Signing Cert with AUTHO
3,106,308 UART: RITY.KEYID = 7
3,122,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,913 UART: [art] PUB.X = DF505C567A3271A60CD7F1531B650C0D18B17E41405D5693F89B399F89D081AD1A6AA9F74838A9C99FF18141584232B0
3,129,670 UART: [art] PUB.Y = 411DE7013AA4AEB6AFE4807E0EE6B5AAC95D78F1CA574C58F541788911D5FA8644C7B6756F5049E2D776ACC6D8043847
3,136,619 UART: [art] SIG.R = 0ACAEDB708C36F32B537B34EF3D15CA3F9F324658BCDAAB36D8EC5E5242C4A00B7DCA5438C39047512DF7CD6DFCE6193
3,143,380 UART: [art] SIG.S = C73D686917CB118AD5998BE004613A2616CBF9E4528F03409AF1D7235B5ACC424B80498922D94B4B8C981CA97FA764C0
3,166,917 UART: Caliptra RT
3,167,262 UART: [state] CFI Enabled
3,275,239 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,289,404 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,741 ready_for_fw is high
1,055,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,872 >>> mbox cmd response: success
2,617,872 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,681,008 UART:
2,681,024 UART: Running Caliptra FMC ...
2,681,432 UART:
2,681,575 UART: [state] CFI Enabled
2,692,098 UART: [fht] FMC Alias Private Key: 7
2,799,929 UART: [art] Extend RT PCRs Done
2,800,357 UART: [art] Lock RT PCRs Done
2,801,713 UART: [art] Populate DV Done
2,809,770 UART: [fht] FMC Alias Private Key: 7
2,810,760 UART: [art] Derive CDI
2,811,040 UART: [art] Store in in slot 0x4
2,896,687 UART: [art] Derive Key Pair
2,897,047 UART: [art] Store priv key in slot 0x5
2,910,841 UART: [art] Derive Key Pair - Done
2,925,370 UART: [art] Signing Cert with AUTHO
2,925,850 UART: RITY.KEYID = 7
2,941,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,837 UART: [art] PUB.X = AECB568B20849E2DFFC2231D49160CDB5139DA828AB0A725A735987900BA6BD6AF6527485C5FFF239A2D26DCBF92D586
2,948,594 UART: [art] PUB.Y = 59483C4C8362ACC357EF5A186A649199BE37A1B5F16A298DCA03EA106E762058F155A089F39D470998C9BE611213B744
2,955,534 UART: [art] SIG.R = 149C24ACCABD9E8ADC460BC045FD4D49D06D593201D9FC4BC0FF722DDA48EF9D89145C218774490D4EB917A844AEF809
2,962,308 UART: [art] SIG.S = 28ED97C89E037AB760836E83308DD5A0E47FFFCDBEBD132C66D9B27BAC77EDA779D1D2D5A55FFB16FE4A4ABAA30E7EE7
2,986,395 UART: Caliptra RT
2,986,740 UART: [state] CFI Enabled
3,094,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,108,542 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
192,006 UART:
192,384 UART: Running Caliptra ROM ...
193,498 UART:
193,646 UART: [state] CFI Enabled
266,398 UART: [state] LifecycleState = Unprovisioned
268,370 UART: [state] DebugLocked = No
269,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,271 UART: [kat] SHA2-256
445,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,504 UART: [kat] ++
456,045 UART: [kat] sha1
466,508 UART: [kat] SHA2-256
469,236 UART: [kat] SHA2-384
475,151 UART: [kat] SHA2-512-ACC
477,516 UART: [kat] ECC-384
2,768,912 UART: [kat] HMAC-384Kdf
2,801,320 UART: [kat] LMS
3,991,610 UART: [kat] --
3,995,002 UART: [cold-reset] ++
3,996,727 UART: [fht] Storing FHT @ 0x50003400
4,007,853 UART: [idev] ++
4,008,431 UART: [idev] CDI.KEYID = 6
4,009,364 UART: [idev] SUBJECT.KEYID = 7
4,010,615 UART: [idev] UDS.KEYID = 0
4,011,661 ready_for_fw is high
4,011,870 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,938 UART: [idev] Erasing UDS.KEYID = 0
7,339,079 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,356 UART: [idev] --
7,366,188 UART: [ldev] ++
7,366,759 UART: [ldev] CDI.KEYID = 6
7,367,722 UART: [ldev] SUBJECT.KEYID = 5
7,368,936 UART: [ldev] AUTHORITY.KEYID = 7
7,370,168 UART: [ldev] FE.KEYID = 1
7,414,270 UART: [ldev] Erasing FE.KEYID = 1
10,749,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,232 UART: [ldev] --
13,129,007 UART: [fwproc] Waiting for Commands...
13,131,434 UART: [fwproc] Received command 0x46574c44
13,133,667 UART: [fwproc] Received Image of size 113760 bytes
17,181,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,640,216 >>> mbox cmd response: success
17,644,612 UART: [afmc] ++
17,645,212 UART: [afmc] CDI.KEYID = 6
17,646,145 UART: [afmc] SUBJECT.KEYID = 7
17,647,366 UART: [afmc] AUTHORITY.KEYID = 5
21,000,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,948 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,207 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,651 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,445 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,901 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,366,720 UART: [afmc] --
23,369,888 UART: [cold-reset] --
23,374,667 UART: [state] Locking Datavault
23,379,966 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,664 UART: [state] Locking ICCM
23,382,948 UART: [exit] Launching FMC @ 0x40000130
23,391,300 UART:
23,391,575 UART: Running Caliptra FMC ...
23,392,701 UART:
23,392,865 UART: [state] CFI Enabled
23,461,260 UART: [fht] FMC Alias Private Key: 7
25,799,111 UART: [art] Extend RT PCRs Done
25,800,346 UART: [art] Lock RT PCRs Done
25,802,079 UART: [art] Populate DV Done
25,807,603 UART: [fht] FMC Alias Private Key: 7
25,809,304 UART: [art] Derive CDI
25,810,120 UART: [art] Store in in slot 0x4
25,869,274 UART: [art] Derive Key Pair
25,870,307 UART: [art] Store priv key in slot 0x5
29,162,561 UART: [art] Derive Key Pair - Done
29,175,669 UART: [art] Signing Cert with AUTHO
29,176,974 UART: RITY.KEYID = 7
31,464,418 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,052 UART: [art] PUB.X = 298A4EC5C7571F4DF070A889B1D139A26F2B70A6E7B882D17F927BA326BE8EF34EE1667558AF56A4AC810ED94E2212F8
31,473,207 UART: [art] PUB.Y = 7018C6C5FE72128D3092B2C6DA32EB2C9E9872629292305A243B27369A67AB200B9552A62DE843D00F107F3EA954DEE9
31,480,440 UART: [art] SIG.R = 535715AF54320BC879FEE93EFD110F25A1996C760078309899B59D97C270367B66476FBCAD51857CF9355C1587FB4EB3
31,487,774 UART: [art] SIG.S = 66D3F7B967D06B1731E5DF8529F510DDBF9B19D8F4C1AF2FD34F353210D58A2BAE92B9C14BDA5138EFDA24E9BF7F4913
32,793,312 UART: Caliptra RT
32,794,010 UART: [state] CFI Enabled
32,954,573 UART: [rt] RT listening for mailbox commands...
32,957,297 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,989,286 UART: [rt]cmd =0x53494756, len=196
34,281,194 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,782,739 ready_for_fw is high
3,783,254 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,825,309 >>> mbox cmd response: success
23,522,434 UART:
23,522,833 UART: Running Caliptra FMC ...
23,524,033 UART:
23,524,202 UART: [state] CFI Enabled
23,594,583 UART: [fht] FMC Alias Private Key: 7
25,932,590 UART: [art] Extend RT PCRs Done
25,933,824 UART: [art] Lock RT PCRs Done
25,935,346 UART: [art] Populate DV Done
25,940,826 UART: [fht] FMC Alias Private Key: 7
25,942,266 UART: [art] Derive CDI
25,943,008 UART: [art] Store in in slot 0x4
26,003,306 UART: [art] Derive Key Pair
26,004,353 UART: [art] Store priv key in slot 0x5
29,297,095 UART: [art] Derive Key Pair - Done
29,310,440 UART: [art] Signing Cert with AUTHO
29,311,745 UART: RITY.KEYID = 7
31,599,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,340 UART: [art] PUB.X = AAC18E551C82A6A52E4DD52DEF7D9CFFD2DF7D3F9833964E052C9DD58A5A668CF229FD7C8485E94993CD3A0685D1CE41
31,608,610 UART: [art] PUB.Y = 0E0A3828367A5CA9168A6AA79C38438D2BACA9DD5CE327809266BD81A30A82007EBD0FBC374D8F69214D542DDC2ACC41
31,615,809 UART: [art] SIG.R = 6FFAEA03B067CE5C6263D25605C305EBC6D32632276E651C60F96FAF7042DA67D673D4B6A79E2DF76779E1639EACDBF9
31,623,212 UART: [art] SIG.S = 9430068804C317700FD8D2415AA2F447CD54AFE33A6AE9825B9122444E63CB4FB66F5B10EAC16152DE471162A2AF75F0
32,928,874 UART: Caliptra RT
32,929,596 UART: [state] CFI Enabled
33,092,177 UART: [rt] RT listening for mailbox commands...
33,094,917 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,126,828 UART: [rt]cmd =0x53494756, len=196
34,418,868 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,758 writing to cptra_bootfsm_go
193,054 UART:
193,436 UART: Running Caliptra ROM ...
194,626 UART:
604,178 UART: [state] CFI Enabled
617,677 UART: [state] LifecycleState = Unprovisioned
619,603 UART: [state] DebugLocked = No
621,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,351 UART: [kat] SHA2-256
796,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,598 UART: [kat] ++
807,115 UART: [kat] sha1
818,263 UART: [kat] SHA2-256
820,979 UART: [kat] SHA2-384
826,755 UART: [kat] SHA2-512-ACC
829,116 UART: [kat] ECC-384
3,113,134 UART: [kat] HMAC-384Kdf
3,125,138 UART: [kat] LMS
4,315,300 UART: [kat] --
4,320,240 UART: [cold-reset] ++
4,321,319 UART: [fht] Storing FHT @ 0x50003400
4,332,198 UART: [idev] ++
4,332,777 UART: [idev] CDI.KEYID = 6
4,333,733 UART: [idev] SUBJECT.KEYID = 7
4,334,970 UART: [idev] UDS.KEYID = 0
4,335,975 ready_for_fw is high
4,336,192 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,152 UART: [idev] Erasing UDS.KEYID = 0
7,620,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,561 UART: [idev] --
7,646,357 UART: [ldev] ++
7,646,919 UART: [ldev] CDI.KEYID = 6
7,647,990 UART: [ldev] SUBJECT.KEYID = 5
7,649,698 UART: [ldev] AUTHORITY.KEYID = 7
7,650,887 UART: [ldev] FE.KEYID = 1
7,662,767 UART: [ldev] Erasing FE.KEYID = 1
10,955,642 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,603 UART: [ldev] --
13,318,485 UART: [fwproc] Waiting for Commands...
13,321,812 UART: [fwproc] Received command 0x46574c44
13,324,041 UART: [fwproc] Received Image of size 113760 bytes
17,376,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,173 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,842,941 >>> mbox cmd response: success
17,847,350 UART: [afmc] ++
17,847,998 UART: [afmc] CDI.KEYID = 6
17,848,904 UART: [afmc] SUBJECT.KEYID = 7
17,850,118 UART: [afmc] AUTHORITY.KEYID = 5
21,162,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,457,695 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,002 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,474,370 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,489,197 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,503,638 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,213 UART: [afmc] --
23,529,512 UART: [cold-reset] --
23,533,805 UART: [state] Locking Datavault
23,541,425 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,178 UART: [state] Locking ICCM
23,544,296 UART: [exit] Launching FMC @ 0x40000130
23,552,695 UART:
23,552,926 UART: Running Caliptra FMC ...
23,554,027 UART:
23,554,187 UART: [state] CFI Enabled
23,562,370 UART: [fht] FMC Alias Private Key: 7
25,893,197 UART: [art] Extend RT PCRs Done
25,894,427 UART: [art] Lock RT PCRs Done
25,896,089 UART: [art] Populate DV Done
25,901,505 UART: [fht] FMC Alias Private Key: 7
25,903,256 UART: [art] Derive CDI
25,903,989 UART: [art] Store in in slot 0x4
25,946,636 UART: [art] Derive Key Pair
25,947,638 UART: [art] Store priv key in slot 0x5
29,189,229 UART: [art] Derive Key Pair - Done
29,202,228 UART: [art] Signing Cert with AUTHO
29,203,527 UART: RITY.KEYID = 7
31,483,262 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,762 UART: [art] PUB.X = D50F4D559CC22056FF08184B0B62BA9DBC3DFCFB3FD1D0AADB6EF846F05A6C9D671845EE3DC7718D4E7F81DA04BD27A2
31,492,043 UART: [art] PUB.Y = E286B25952D13F0B861C21632DB2B73B8B324843552110D97B1B682DB6939B1B50210E2C47DF90F6449AA13BF5B97562
31,499,258 UART: [art] SIG.R = 73CB6E0F513C4CF7EFDDEEB2CFA84239AADDDBAFE74327735567DE488015BEB5B14EB15D8B8C9F44D09387FA7ADA50AF
31,506,621 UART: [art] SIG.S = 1E7D06907F6A26FBD8A7ED25C7AA62DFB07C980791F3B48A86ACBA7919ECF9437F2B5CBD0EBF4743DB9523B55F48FEDD
32,811,653 UART: Caliptra RT
32,812,370 UART: [state] CFI Enabled
32,930,473 UART: [rt] RT listening for mailbox commands...
32,933,262 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,964,629 UART: [rt]cmd =0x53494756, len=196
34,256,445 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
4,133,346 ready_for_fw is high
4,134,095 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,071,938 >>> mbox cmd response: success
23,711,565 UART:
23,711,967 UART: Running Caliptra FMC ...
23,713,085 UART:
23,713,253 UART: [state] CFI Enabled
23,721,102 UART: [fht] FMC Alias Private Key: 7
26,051,306 UART: [art] Extend RT PCRs Done
26,052,539 UART: [art] Lock RT PCRs Done
26,054,344 UART: [art] Populate DV Done
26,059,594 UART: [fht] FMC Alias Private Key: 7
26,061,138 UART: [art] Derive CDI
26,061,957 UART: [art] Store in in slot 0x4
26,104,447 UART: [art] Derive Key Pair
26,105,448 UART: [art] Store priv key in slot 0x5
29,348,142 UART: [art] Derive Key Pair - Done
29,361,032 UART: [art] Signing Cert with AUTHO
29,362,338 UART: RITY.KEYID = 7
31,641,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,191 UART: [art] PUB.X = 38C00CD48735256270856FC9DB7A47C3ED35E0F7FCB4CA7F0891C80423F4BF2536D20A89E5F11200E541CBA2997FE1BC
31,650,439 UART: [art] PUB.Y = 830E073E03C2AA95B1650062C380300B3E513C5A5F8677C9E50A3EFCD45C5EB225C7D925E0EA58564A5D1B24796F8C19
31,657,665 UART: [art] SIG.R = CE839B714D12D974A9552AFD90A7BF38668AAC641B5D641EAF280457568C201998330E97CCE622F3973AAA1BB76DE220
31,665,050 UART: [art] SIG.S = 3C6A01FFCB605A57D4BD4CA666DF0EF2609D365021E2B86ADBBEB6B72859061E788D85641163FFF884C9666D4A02DB32
32,970,561 UART: Caliptra RT
32,971,269 UART: [state] CFI Enabled
33,089,373 UART: [rt] RT listening for mailbox commands...
33,092,189 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,123,728 UART: [rt]cmd =0x53494756, len=196
34,415,501 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,476 UART:
192,856 UART: Running Caliptra ROM ...
194,041 UART:
194,204 UART: [state] CFI Enabled
263,648 UART: [state] LifecycleState = Unprovisioned
265,554 UART: [state] DebugLocked = No
268,024 UART: [state] WD Timer not started. Device not locked for debugging
272,061 UART: [kat] SHA2-256
451,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,789 UART: [kat] ++
463,344 UART: [kat] sha1
475,997 UART: [kat] SHA2-256
479,003 UART: [kat] SHA2-384
484,847 UART: [kat] SHA2-512-ACC
487,777 UART: [kat] ECC-384
2,946,099 UART: [kat] HMAC-384Kdf
2,970,417 UART: [kat] LMS
3,499,899 UART: [kat] --
3,502,971 UART: [cold-reset] ++
3,505,250 UART: [fht] FHT @ 0x50003400
3,516,264 UART: [idev] ++
3,516,831 UART: [idev] CDI.KEYID = 6
3,517,709 UART: [idev] SUBJECT.KEYID = 7
3,518,893 UART: [idev] UDS.KEYID = 0
3,519,858 ready_for_fw is high
3,520,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,617 UART: [idev] Erasing UDS.KEYID = 0
6,027,684 UART: [idev] Sha1 KeyId Algorithm
6,049,313 UART: [idev] --
6,053,091 UART: [ldev] ++
6,053,661 UART: [ldev] CDI.KEYID = 6
6,054,625 UART: [ldev] SUBJECT.KEYID = 5
6,055,778 UART: [ldev] AUTHORITY.KEYID = 7
6,057,007 UART: [ldev] FE.KEYID = 1
6,098,606 UART: [ldev] Erasing FE.KEYID = 1
8,603,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,262 UART: [ldev] --
10,411,278 UART: [fwproc] Wait for Commands...
10,413,759 UART: [fwproc] Recv command 0x46574c44
10,415,846 UART: [fwproc] Recv'd Img size: 114084 bytes
13,818,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,281,728 >>> mbox cmd response: success
14,285,168 UART: [afmc] ++
14,285,771 UART: [afmc] CDI.KEYID = 6
14,286,678 UART: [afmc] SUBJECT.KEYID = 7
14,287,835 UART: [afmc] AUTHORITY.KEYID = 5
16,826,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,706 UART: [afmc] --
18,627,218 UART: [cold-reset] --
18,630,318 UART: [state] Locking Datavault
18,635,991 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,685 UART: [state] Locking ICCM
18,639,886 UART: [exit] Launching FMC @ 0x40000130
18,648,277 UART:
18,648,508 UART: Running Caliptra FMC ...
18,649,605 UART:
18,649,769 UART: [state] CFI Enabled
18,710,560 UART: [fht] FMC Alias Private Key: 7
20,473,813 UART: [art] Extend RT PCRs Done
20,475,033 UART: [art] Lock RT PCRs Done
20,476,710 UART: [art] Populate DV Done
20,482,392 UART: [fht] FMC Alias Private Key: 7
20,483,882 UART: [art] Derive CDI
20,484,660 UART: [art] Store in in slot 0x4
20,543,002 UART: [art] Derive Key Pair
20,544,048 UART: [art] Store priv key in slot 0x5
23,007,173 UART: [art] Derive Key Pair - Done
23,020,499 UART: [art] Signing Cert with AUTHO
23,021,799 UART: RITY.KEYID = 7
24,733,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,931 UART: [art] PUB.X = 710069007AFAEEAE398ACF73A883075B2301D89334A931668F870AFDE11C75BDAE39448EE7AF4AAAB002CE43F4367712
24,742,230 UART: [art] PUB.Y = CF08659BAA6783E9BD69FCE319E92BCC7F797CB53EF647747F5D0CDF9BEC2198F5411E604996D16151575C9013328103
24,749,454 UART: [art] SIG.R = 73E0BD8551D551E9233FEEA001AD65F33E2C692A6A4D8CECACC8A22DD2CA3C549D30992ADBBA78130F2B9939E6DCD4F6
24,756,860 UART: [art] SIG.S = F301796AFA3BD531F9628BDA36968C473ECE5CAE2475F31C1115AF570BC13F4AC85A614245DFEF333E752AF1594CB8DA
25,735,943 UART: Caliptra RT
25,736,648 UART: [state] CFI Enabled
25,902,435 UART: [rt] RT listening for mailbox commands...
25,905,206 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,937,484 UART: [rt]cmd =0x53494756, len=196
26,903,073 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,378,348 ready_for_fw is high
3,378,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,078,484 >>> mbox cmd response: success
18,362,116 UART:
18,362,511 UART: Running Caliptra FMC ...
18,363,610 UART:
18,363,760 UART: [state] CFI Enabled
18,431,765 UART: [fht] FMC Alias Private Key: 7
20,195,211 UART: [art] Extend RT PCRs Done
20,196,418 UART: [art] Lock RT PCRs Done
20,197,795 UART: [art] Populate DV Done
20,203,049 UART: [fht] FMC Alias Private Key: 7
20,204,611 UART: [art] Derive CDI
20,205,352 UART: [art] Store in in slot 0x4
20,264,707 UART: [art] Derive Key Pair
20,265,703 UART: [art] Store priv key in slot 0x5
22,728,653 UART: [art] Derive Key Pair - Done
22,741,926 UART: [art] Signing Cert with AUTHO
22,743,225 UART: RITY.KEYID = 7
24,454,726 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,208 UART: [art] PUB.X = 986F179A6637A9D6275049AE924F495B8225A6D06B58564079A2349ED29E69EA3A425B403BECE5B8269D0418BFB59432
24,463,455 UART: [art] PUB.Y = CF98593038B5B2DCA5DBAA920C19A0EE64C9AF79E008CB7FB440DFDF6B95B840A90479AF57DAA15E7B11CED97CE44BC9
24,470,746 UART: [art] SIG.R = 3B0A535DA2556E7E2AA25BAB4B594389A4342895BB56B1033254CF2C42E4F43865B15B3CBFF0D00EF127B94FDB1433D2
24,478,187 UART: [art] SIG.S = 5B33E04F92604E584647ECF9B81BC152A41037D36B19C321B887391C9E7F13385F3C33CADE323D29B8B8B4FF74E353FD
25,457,243 UART: Caliptra RT
25,457,961 UART: [state] CFI Enabled
25,622,538 UART: [rt] RT listening for mailbox commands...
25,625,287 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,657,357 UART: [rt]cmd =0x53494756, len=196
26,622,731 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
193,076 UART:
193,449 UART: Running Caliptra ROM ...
194,597 UART:
604,118 UART: [state] CFI Enabled
618,911 UART: [state] LifecycleState = Unprovisioned
620,792 UART: [state] DebugLocked = No
623,676 UART: [state] WD Timer not started. Device not locked for debugging
628,079 UART: [kat] SHA2-256
807,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,789 UART: [kat] ++
819,344 UART: [kat] sha1
830,868 UART: [kat] SHA2-256
833,876 UART: [kat] SHA2-384
841,004 UART: [kat] SHA2-512-ACC
844,012 UART: [kat] ECC-384
3,286,956 UART: [kat] HMAC-384Kdf
3,299,438 UART: [kat] LMS
3,828,939 UART: [kat] --
3,832,326 UART: [cold-reset] ++
3,833,691 UART: [fht] FHT @ 0x50003400
3,845,336 UART: [idev] ++
3,845,899 UART: [idev] CDI.KEYID = 6
3,846,854 UART: [idev] SUBJECT.KEYID = 7
3,848,027 UART: [idev] UDS.KEYID = 0
3,849,005 ready_for_fw is high
3,849,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,610 UART: [idev] Erasing UDS.KEYID = 0
6,314,679 UART: [idev] Sha1 KeyId Algorithm
6,337,742 UART: [idev] --
6,340,551 UART: [ldev] ++
6,341,123 UART: [ldev] CDI.KEYID = 6
6,342,005 UART: [ldev] SUBJECT.KEYID = 5
6,343,141 UART: [ldev] AUTHORITY.KEYID = 7
6,344,418 UART: [ldev] FE.KEYID = 1
6,354,876 UART: [ldev] Erasing FE.KEYID = 1
8,834,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,016 UART: [ldev] --
10,625,703 UART: [fwproc] Wait for Commands...
10,627,455 UART: [fwproc] Recv command 0x46574c44
10,629,502 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,487,225 >>> mbox cmd response: success
14,490,933 UART: [afmc] ++
14,491,531 UART: [afmc] CDI.KEYID = 6
14,492,445 UART: [afmc] SUBJECT.KEYID = 7
14,493,607 UART: [afmc] AUTHORITY.KEYID = 5
16,988,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,904 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,699 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,948 UART: [afmc] --
18,786,564 UART: [cold-reset] --
18,790,317 UART: [state] Locking Datavault
18,794,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,471 UART: [state] Locking ICCM
18,798,567 UART: [exit] Launching FMC @ 0x40000130
18,807,018 UART:
18,807,268 UART: Running Caliptra FMC ...
18,808,373 UART:
18,808,529 UART: [state] CFI Enabled
18,816,628 UART: [fht] FMC Alias Private Key: 7
20,573,586 UART: [art] Extend RT PCRs Done
20,574,810 UART: [art] Lock RT PCRs Done
20,576,491 UART: [art] Populate DV Done
20,581,915 UART: [fht] FMC Alias Private Key: 7
20,583,454 UART: [art] Derive CDI
20,584,208 UART: [art] Store in in slot 0x4
20,626,646 UART: [art] Derive Key Pair
20,627,684 UART: [art] Store priv key in slot 0x5
23,054,561 UART: [art] Derive Key Pair - Done
23,067,293 UART: [art] Signing Cert with AUTHO
23,068,608 UART: RITY.KEYID = 7
24,774,094 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,605 UART: [art] PUB.X = CBD226D0FEED00B2F3175E9790AF5D20739A2EDA36312B78F7C461381B153900F5683328ACEB8CB039D72AEE92CC651C
24,782,841 UART: [art] PUB.Y = AC44A3FB5D592D9F549D99199176A4E81044788407B336087C9244900C9A63BC12CD98DF3476055F821B2A2F78B1040E
24,790,098 UART: [art] SIG.R = 2510B81C436E79B6A532688B37B5C89C2C13F32826767177B51EA903072A51F58A6051930EFE1CEFBE3928F24FE5BA04
24,797,476 UART: [art] SIG.S = FBCA0C2D3F5B420E94BC8E1564027ED2BDBEF81C34A7E363878C96792BA8F3F3290B89DF22B08F3D705F1A297B8DEBB1
25,776,448 UART: Caliptra RT
25,777,139 UART: [state] CFI Enabled
25,893,899 UART: [rt] RT listening for mailbox commands...
25,896,685 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,928,155 UART: [rt]cmd =0x53494756, len=196
26,893,755 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
3,695,077 ready_for_fw is high
3,695,582 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,262,833 >>> mbox cmd response: success
18,511,882 UART:
18,512,305 UART: Running Caliptra FMC ...
18,513,449 UART:
18,513,614 UART: [state] CFI Enabled
18,521,860 UART: [fht] FMC Alias Private Key: 7
20,279,362 UART: [art] Extend RT PCRs Done
20,280,588 UART: [art] Lock RT PCRs Done
20,281,891 UART: [art] Populate DV Done
20,287,365 UART: [fht] FMC Alias Private Key: 7
20,288,845 UART: [art] Derive CDI
20,289,616 UART: [art] Store in in slot 0x4
20,332,319 UART: [art] Derive Key Pair
20,333,327 UART: [art] Store priv key in slot 0x5
22,759,919 UART: [art] Derive Key Pair - Done
22,772,723 UART: [art] Signing Cert with AUTHO
22,774,061 UART: RITY.KEYID = 7
24,479,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,659 UART: [art] PUB.X = 1B009FA8F6F00C3572770C2CBA067293481B1DE89E3575675F301723D1E8A9099F5D50D14E8E0AEA765F42CF37FDED66
24,487,883 UART: [art] PUB.Y = 72F950B60B3F17E818FB666C9DCA0D3E38FCD5F2F3618D52DE73496AF048CCCB1D07CCBD95D83BD1E142EAECA0C62EB5
24,495,220 UART: [art] SIG.R = 0E40D950BE4D716D5498BE9C82C09E020952C1951006D02FDCF1EC366FF0E4FAA57E60176D3D616D656570893568BDFF
24,502,598 UART: [art] SIG.S = EC1C7698509855BFA0D151190BC7BA3EA4ED803A18B8DEFC68EB11CAE8137B12698FE267474A8CD0CF3029C691B3017A
25,481,354 UART: Caliptra RT
25,482,072 UART: [state] CFI Enabled
25,598,666 UART: [rt] RT listening for mailbox commands...
25,601,455 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,633,053 UART: [rt]cmd =0x53494756, len=196
26,598,927 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
192,745 UART:
193,111 UART: Running Caliptra ROM ...
194,292 UART:
194,448 UART: [state] CFI Enabled
262,130 UART: [state] LifecycleState = Unprovisioned
264,472 UART: [state] DebugLocked = No
267,139 UART: [state] WD Timer not started. Device not locked for debugging
272,119 UART: [kat] SHA2-256
462,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,786 UART: [kat] ++
473,266 UART: [kat] sha1
485,659 UART: [kat] SHA2-256
488,690 UART: [kat] SHA2-384
495,675 UART: [kat] SHA2-512-ACC
498,257 UART: [kat] ECC-384
2,947,501 UART: [kat] HMAC-384Kdf
2,971,117 UART: [kat] LMS
3,502,896 UART: [kat] --
3,507,595 UART: [cold-reset] ++
3,509,808 UART: [fht] FHT @ 0x50003400
3,521,776 UART: [idev] ++
3,522,557 UART: [idev] CDI.KEYID = 6
3,523,476 UART: [idev] SUBJECT.KEYID = 7
3,524,659 UART: [idev] UDS.KEYID = 0
3,525,580 ready_for_fw is high
3,525,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,098 UART: [idev] Erasing UDS.KEYID = 0
6,030,393 UART: [idev] Sha1 KeyId Algorithm
6,052,280 UART: [idev] --
6,057,516 UART: [ldev] ++
6,058,204 UART: [ldev] CDI.KEYID = 6
6,059,119 UART: [ldev] SUBJECT.KEYID = 5
6,060,277 UART: [ldev] AUTHORITY.KEYID = 7
6,061,507 UART: [ldev] FE.KEYID = 1
6,100,335 UART: [ldev] Erasing FE.KEYID = 1
8,605,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,145 UART: [ldev] --
10,414,877 UART: [fwproc] Wait for Commands...
10,417,419 UART: [fwproc] Recv command 0x46574c44
10,419,756 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,812 >>> mbox cmd response: success
14,600,245 UART: [afmc] ++
14,600,956 UART: [afmc] CDI.KEYID = 6
14,602,143 UART: [afmc] SUBJECT.KEYID = 7
14,603,637 UART: [afmc] AUTHORITY.KEYID = 5
17,151,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,929 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,966 UART: [afmc] --
18,945,367 UART: [cold-reset] --
18,950,216 UART: [state] Locking Datavault
18,953,649 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,856 UART: [state] Locking ICCM
18,958,398 UART: [exit] Launching FMC @ 0x40000130
18,967,031 UART:
18,967,265 UART: Running Caliptra FMC ...
18,968,364 UART:
18,968,518 UART: [state] CFI Enabled
19,029,853 UART: [fht] FMC Alias Private Key: 7
20,793,907 UART: [art] Extend RT PCRs Done
20,795,124 UART: [art] Lock RT PCRs Done
20,796,991 UART: [art] Populate DV Done
20,802,555 UART: [fht] FMC Alias Private Key: 7
20,804,256 UART: [art] Derive CDI
20,805,066 UART: [art] Store in in slot 0x4
20,862,710 UART: [art] Derive Key Pair
20,863,706 UART: [art] Store priv key in slot 0x5
23,327,011 UART: [art] Derive Key Pair - Done
23,340,278 UART: [art] Signing Cert with AUTHO
23,341,580 UART: RITY.KEYID = 7
25,053,000 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,517 UART: [art] PUB.X = A5AA22EC9A33CFA5B1E8D573604840DF3039D0CD8F2F1A660EA2C843E2262C911C2F6B2FB1DA45E653D5B28D075C3585
25,061,774 UART: [art] PUB.Y = 28F73A2E42ECD59CD7B9F23588B92159564D6BBE1D12BE8731621E087F17A3FA360F19B4613D1C396DB34C37803159DD
25,069,027 UART: [art] SIG.R = F672FD140451ABDB27527975F83690AF2FED9BC6E28531D5CDFBCAE677FFE84B048E06E8E8337A4EEA4770D52EB2F03F
25,076,436 UART: [art] SIG.S = 7A82709D80D42EEEF0C15ED0A8FABAB238B029EB3495B0A1C80C6BDE787F4CCEC67E5D8A1609F45BC5FBA8652B506D76
26,055,966 UART: Caliptra RT
26,056,660 UART: [state] CFI Enabled
26,222,694 UART: [rt] RT listening for mailbox commands...
26,225,423 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,257,312 UART: [rt]cmd =0x53494756, len=196
27,222,964 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,437,931 ready_for_fw is high
3,438,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,913 >>> mbox cmd response: success
19,003,420 UART:
19,003,820 UART: Running Caliptra FMC ...
19,004,930 UART:
19,005,085 UART: [state] CFI Enabled
19,071,528 UART: [fht] FMC Alias Private Key: 7
20,835,540 UART: [art] Extend RT PCRs Done
20,836,756 UART: [art] Lock RT PCRs Done
20,838,598 UART: [art] Populate DV Done
20,843,927 UART: [fht] FMC Alias Private Key: 7
20,845,670 UART: [art] Derive CDI
20,846,495 UART: [art] Store in in slot 0x4
20,904,075 UART: [art] Derive Key Pair
20,905,078 UART: [art] Store priv key in slot 0x5
23,368,664 UART: [art] Derive Key Pair - Done
23,381,755 UART: [art] Signing Cert with AUTHO
23,383,059 UART: RITY.KEYID = 7
25,093,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,418 UART: [art] PUB.X = D8A56DB90395466E19501CCF35C9D5BA223400543F51780A659E9FDF414B81FB60A1B750FDD8CA5C35AE0DB8C78E64EF
25,102,672 UART: [art] PUB.Y = 26B3FC25680B03FB555C93239849590F787CF824F89021541B80E3863B84AEE65947C4A152F5CFDCB2491C6580F7EDF0
25,109,878 UART: [art] SIG.R = BF34A16C11245AD3C1F60732447AE210E044C7DD567B28EBCEB276D2AA28E79B780F47DB9A22923C4E79FCCCFCD80A01
25,117,315 UART: [art] SIG.S = 26D32ECE3C77E93D79E1FC96BB883D8B349B308C5CBF1D08617CBFD8FC0DCDB57F926D53A7FED3E0E6E0E2AD613EFFB5
26,096,450 UART: Caliptra RT
26,097,163 UART: [state] CFI Enabled
26,260,889 UART: [rt] RT listening for mailbox commands...
26,263,709 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,295,689 UART: [rt]cmd =0x53494756, len=196
27,261,551 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
192,948 UART:
193,338 UART: Running Caliptra ROM ...
194,543 UART:
603,937 UART: [state] CFI Enabled
616,824 UART: [state] LifecycleState = Unprovisioned
619,196 UART: [state] DebugLocked = No
620,588 UART: [state] WD Timer not started. Device not locked for debugging
625,121 UART: [kat] SHA2-256
815,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,799 UART: [kat] ++
826,428 UART: [kat] sha1
838,659 UART: [kat] SHA2-256
841,674 UART: [kat] SHA2-384
847,663 UART: [kat] SHA2-512-ACC
850,247 UART: [kat] ECC-384
3,290,453 UART: [kat] HMAC-384Kdf
3,304,962 UART: [kat] LMS
3,836,751 UART: [kat] --
3,842,317 UART: [cold-reset] ++
3,843,684 UART: [fht] FHT @ 0x50003400
3,855,886 UART: [idev] ++
3,856,556 UART: [idev] CDI.KEYID = 6
3,857,596 UART: [idev] SUBJECT.KEYID = 7
3,858,704 UART: [idev] UDS.KEYID = 0
3,859,643 ready_for_fw is high
3,859,854 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,103 UART: [idev] Erasing UDS.KEYID = 0
6,336,592 UART: [idev] Sha1 KeyId Algorithm
6,359,378 UART: [idev] --
6,364,606 UART: [ldev] ++
6,365,281 UART: [ldev] CDI.KEYID = 6
6,366,245 UART: [ldev] SUBJECT.KEYID = 5
6,367,400 UART: [ldev] AUTHORITY.KEYID = 7
6,368,630 UART: [ldev] FE.KEYID = 1
6,377,655 UART: [ldev] Erasing FE.KEYID = 1
8,852,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,110 UART: [ldev] --
10,644,696 UART: [fwproc] Wait for Commands...
10,646,485 UART: [fwproc] Recv command 0x46574c44
10,648,799 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,510 >>> mbox cmd response: success
14,826,800 UART: [afmc] ++
14,827,519 UART: [afmc] CDI.KEYID = 6
14,828,715 UART: [afmc] SUBJECT.KEYID = 7
14,830,163 UART: [afmc] AUTHORITY.KEYID = 5
17,333,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,071,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,346 UART: [afmc] --
19,128,789 UART: [cold-reset] --
19,133,691 UART: [state] Locking Datavault
19,139,532 UART: [state] Locking PCR0, PCR1 and PCR31
19,141,692 UART: [state] Locking ICCM
19,144,335 UART: [exit] Launching FMC @ 0x40000130
19,153,032 UART:
19,153,276 UART: Running Caliptra FMC ...
19,154,381 UART:
19,154,543 UART: [state] CFI Enabled
19,162,593 UART: [fht] FMC Alias Private Key: 7
20,919,695 UART: [art] Extend RT PCRs Done
20,920,919 UART: [art] Lock RT PCRs Done
20,923,002 UART: [art] Populate DV Done
20,928,422 UART: [fht] FMC Alias Private Key: 7
20,930,134 UART: [art] Derive CDI
20,930,893 UART: [art] Store in in slot 0x4
20,973,762 UART: [art] Derive Key Pair
20,974,801 UART: [art] Store priv key in slot 0x5
23,401,347 UART: [art] Derive Key Pair - Done
23,414,319 UART: [art] Signing Cert with AUTHO
23,415,644 UART: RITY.KEYID = 7
25,121,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,014 UART: [art] PUB.X = 680F98424376DD2594DE479E78182A47463AD78E04CADC7359DFA5C3790C9BF401DE013EA25793EE7FA89C63489098FD
25,130,038 UART: [art] PUB.Y = D733BE458C6CDD3720BFA7175703979133C94C2B9FC0B1514212D1297C31C5F0232DFF1284DAE11C860EC08FD779F6A8
25,137,106 UART: [art] SIG.R = B0597D25AD2FCC9528CC329080CC20242D249DA91F033BC50FE275E76C5E0E526B2DC3063B8B20D376D50359741B5397
25,144,492 UART: [art] SIG.S = F76646F6ABF26CF05C0CD02CBA669D5F28AC70356C1FDA4F2A9BCDC73D66A0EF788DCF1317770A7EADAD0C45DA1A961B
26,123,268 UART: Caliptra RT
26,123,989 UART: [state] CFI Enabled
26,241,868 UART: [rt] RT listening for mailbox commands...
26,244,703 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,276,195 UART: [rt]cmd =0x53494756, len=196
27,242,120 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,758,992 ready_for_fw is high
3,759,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,076 >>> mbox cmd response: success
19,204,589 UART:
19,204,968 UART: Running Caliptra FMC ...
19,206,168 UART:
19,206,344 UART: [state] CFI Enabled
19,213,974 UART: [fht] FMC Alias Private Key: 7
20,971,454 UART: [art] Extend RT PCRs Done
20,972,683 UART: [art] Lock RT PCRs Done
20,974,067 UART: [art] Populate DV Done
20,979,507 UART: [fht] FMC Alias Private Key: 7
20,981,216 UART: [art] Derive CDI
20,982,036 UART: [art] Store in in slot 0x4
21,024,652 UART: [art] Derive Key Pair
21,025,701 UART: [art] Store priv key in slot 0x5
23,452,432 UART: [art] Derive Key Pair - Done
23,465,770 UART: [art] Signing Cert with AUTHO
23,467,082 UART: RITY.KEYID = 7
25,172,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,060 UART: [art] PUB.X = E1A399081F271FF0F0856A6019F25383185687C7F480BB8E011AC637A936B94FAF761F87485CCA8BD8C1372E769037C5
25,181,308 UART: [art] PUB.Y = 656874E6B0954DBAC1C1799E0B262B903EFDFE69A23441C1EB4CF1062EF8BBAA9B2BD19E8579D8F4B5C2557BD1E80CAD
25,188,644 UART: [art] SIG.R = 6D7B81A6E727FFDF0722D707BCCBDF2D110EDE65065917A2C86092BFF6927335B9C36BAC77747BBEF508498D14F736AD
25,196,048 UART: [art] SIG.S = 4CE7C2FAB3CF727275AD22B34ACAC1D326DA3F97549F2B9E9B6CE94368557F5FFD70B1265EB08ACCBE1307B2706EFCE3
26,175,232 UART: Caliptra RT
26,175,921 UART: [state] CFI Enabled
26,294,138 UART: [rt] RT listening for mailbox commands...
26,296,893 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,328,530 UART: [rt]cmd =0x53494756, len=196
27,294,021 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,466 UART: [idev] ++
1,479,634 UART: [idev] CDI.KEYID = 6
1,479,994 UART: [idev] SUBJECT.KEYID = 7
1,480,418 UART: [idev] UDS.KEYID = 0
1,480,763 ready_for_fw is high
1,480,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,670 UART: [idev] Erasing UDS.KEYID = 0
1,504,790 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,428 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,223 UART: [ldev] Erasing FE.KEYID = 1
1,546,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,358 UART: [ldev] --
1,585,823 UART: [fwproc] Waiting for Commands...
1,586,444 UART: [fwproc] Received command 0x46574c44
1,587,235 UART: [fwproc] Received Image of size 114084 bytes
2,882,203 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,504 >>> mbox cmd response: success
3,075,724 UART: [afmc] ++
3,075,892 UART: [afmc] CDI.KEYID = 6
3,076,254 UART: [afmc] SUBJECT.KEYID = 7
3,076,679 UART: [afmc] AUTHORITY.KEYID = 5
3,111,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,197 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,887 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,870 UART: [afmc] --
3,154,858 UART: [cold-reset] --
3,155,742 UART: [state] Locking Datavault
3,156,809 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,413 UART: [state] Locking ICCM
3,158,007 UART: [exit] Launching FMC @ 0x40000130
3,163,336 UART:
3,163,352 UART: Running Caliptra FMC ...
3,163,760 UART:
3,163,814 UART: [state] CFI Enabled
3,174,623 UART: [fht] FMC Alias Private Key: 7
3,282,594 UART: [art] Extend RT PCRs Done
3,283,022 UART: [art] Lock RT PCRs Done
3,284,436 UART: [art] Populate DV Done
3,292,411 UART: [fht] FMC Alias Private Key: 7
3,293,443 UART: [art] Derive CDI
3,293,723 UART: [art] Store in in slot 0x4
3,379,606 UART: [art] Derive Key Pair
3,379,966 UART: [art] Store priv key in slot 0x5
3,392,620 UART: [art] Derive Key Pair - Done
3,407,516 UART: [art] Signing Cert with AUTHO
3,407,996 UART: RITY.KEYID = 7
3,423,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,993 UART: [art] PUB.X = 6878BA62A3770F47B350B4B7190A9B5AE5EA04858C01347CD04D34CF97A2C207200644045048639FBA774A03BF9F80BF
3,430,737 UART: [art] PUB.Y = F4A4205FC492AE35339A0EDD24F0520827EADA9B060C046C6347C96D1261EF221C160ADFD500A024894E27323365BF40
3,437,647 UART: [art] SIG.R = 3CA871F79822AD5C5C41B2F4988C220F6AF7F87DF0C8D5FCD51189A073F81E7F963885F344607B2C9818F5C9E71EEA24
3,444,420 UART: [art] SIG.S = FA917FA6C0180336A97434C9DCC7D4DD20E5F3C55DDC13105581B02C50982E6A09BD1C379950E0322CC611F18ECF636F
3,468,119 UART: Caliptra RT
3,468,372 UART: [state] CFI Enabled
3,576,279 UART: [rt] RT listening for mailbox commands...
3,576,949 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,703 UART: [rt]cmd =0x53494756, len=196
3,613,087 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 ready_for_fw is high
1,362,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,185 >>> mbox cmd response: success
2,985,755 UART:
2,985,771 UART: Running Caliptra FMC ...
2,986,179 UART:
2,986,233 UART: [state] CFI Enabled
2,996,352 UART: [fht] FMC Alias Private Key: 7
3,104,305 UART: [art] Extend RT PCRs Done
3,104,733 UART: [art] Lock RT PCRs Done
3,106,235 UART: [art] Populate DV Done
3,114,168 UART: [fht] FMC Alias Private Key: 7
3,115,100 UART: [art] Derive CDI
3,115,380 UART: [art] Store in in slot 0x4
3,200,891 UART: [art] Derive Key Pair
3,201,251 UART: [art] Store priv key in slot 0x5
3,214,639 UART: [art] Derive Key Pair - Done
3,229,173 UART: [art] Signing Cert with AUTHO
3,229,653 UART: RITY.KEYID = 7
3,245,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,790 UART: [art] PUB.X = 1AD7BD3E7089E48A9396D6E43E8DB5F0DAEA6FEC8DCCAA1E6DA6DCB5836F7736B6434025CDD69BFDE0045A55636D5468
3,252,579 UART: [art] PUB.Y = 9C51CDB2A0FD3628D039CB126A43E0B850866B5D64FEB2282C4DDB1C47E68A0D0D834872070F6AD23695B8B2EAEC154D
3,259,529 UART: [art] SIG.R = B10EC8738A5692F20A68223E407BE2DAEF2FAF1BD3B3C06680B647BFADADAEB4DCC2250F03269B39A5FEE3D422F954B9
3,266,309 UART: [art] SIG.S = 0C7F7A1A64E2C1D9D6D17A8603FA868E4AADEB04F72BE3D09584B470F5ABA9D68A6B5B7707D089F99F30CD7D78D2B120
3,289,952 UART: Caliptra RT
3,290,205 UART: [state] CFI Enabled
3,397,924 UART: [rt] RT listening for mailbox commands...
3,398,594 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,706 UART: [rt]cmd =0x53494756, len=196
3,435,156 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,468 UART: [kat] SHA2-256
892,406 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,667 UART: [kat] LMS
1,475,863 UART: [kat] --
1,476,582 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,341 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,937 UART: [idev] --
1,514,926 UART: [ldev] ++
1,515,094 UART: [ldev] CDI.KEYID = 6
1,515,457 UART: [ldev] SUBJECT.KEYID = 5
1,515,883 UART: [ldev] AUTHORITY.KEYID = 7
1,516,346 UART: [ldev] FE.KEYID = 1
1,521,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,067 UART: [ldev] --
1,587,430 UART: [fwproc] Waiting for Commands...
1,588,177 UART: [fwproc] Received command 0x46574c44
1,588,968 UART: [fwproc] Received Image of size 114084 bytes
2,883,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,289 >>> mbox cmd response: success
3,077,489 UART: [afmc] ++
3,077,657 UART: [afmc] CDI.KEYID = 6
3,078,019 UART: [afmc] SUBJECT.KEYID = 7
3,078,444 UART: [afmc] AUTHORITY.KEYID = 5
3,113,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,035 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,428 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,118 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,975 UART: [afmc] --
3,156,987 UART: [cold-reset] --
3,157,845 UART: [state] Locking Datavault
3,158,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,584 UART: [state] Locking ICCM
3,160,036 UART: [exit] Launching FMC @ 0x40000130
3,165,365 UART:
3,165,381 UART: Running Caliptra FMC ...
3,165,789 UART:
3,165,932 UART: [state] CFI Enabled
3,176,217 UART: [fht] FMC Alias Private Key: 7
3,283,890 UART: [art] Extend RT PCRs Done
3,284,318 UART: [art] Lock RT PCRs Done
3,285,754 UART: [art] Populate DV Done
3,294,057 UART: [fht] FMC Alias Private Key: 7
3,295,205 UART: [art] Derive CDI
3,295,485 UART: [art] Store in in slot 0x4
3,381,470 UART: [art] Derive Key Pair
3,381,830 UART: [art] Store priv key in slot 0x5
3,395,302 UART: [art] Derive Key Pair - Done
3,410,271 UART: [art] Signing Cert with AUTHO
3,410,751 UART: RITY.KEYID = 7
3,426,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,236 UART: [art] PUB.X = 964C46DF92BE5078A9D664BAAC8732A6E4761A1FB7C502B6C691D137573BC4EEF459F3110F39CACF47AB844574028E02
3,434,000 UART: [art] PUB.Y = A6DB4E7C1409A375C7BE02DCCD7EB11A3B35C92B0C73F1034766495D0E52EAA6C73B390EB1720CA00E865B15AC5E15C1
3,440,940 UART: [art] SIG.R = 9E4C4DCFED714CAB42E3FD439243563779805E82326E5A9724BFC1DA5998BF779C880C49CBEEE6B398BC045FFAAA583D
3,447,720 UART: [art] SIG.S = 74FF9777D526E8FC427AA163FF9A3863D1F74E47046145A642F17BBA623E8907D573E9A0798C3E71090C0B5B2C86C52F
3,471,630 UART: Caliptra RT
3,471,975 UART: [state] CFI Enabled
3,580,900 UART: [rt] RT listening for mailbox commands...
3,581,570 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,516 UART: [rt]cmd =0x53494756, len=196
3,617,478 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 ready_for_fw is high
1,363,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,453 >>> mbox cmd response: success
2,987,673 UART:
2,987,689 UART: Running Caliptra FMC ...
2,988,097 UART:
2,988,240 UART: [state] CFI Enabled
2,999,063 UART: [fht] FMC Alias Private Key: 7
3,107,286 UART: [art] Extend RT PCRs Done
3,107,714 UART: [art] Lock RT PCRs Done
3,109,104 UART: [art] Populate DV Done
3,117,285 UART: [fht] FMC Alias Private Key: 7
3,118,387 UART: [art] Derive CDI
3,118,667 UART: [art] Store in in slot 0x4
3,204,472 UART: [art] Derive Key Pair
3,204,832 UART: [art] Store priv key in slot 0x5
3,218,140 UART: [art] Derive Key Pair - Done
3,233,014 UART: [art] Signing Cert with AUTHO
3,233,494 UART: RITY.KEYID = 7
3,248,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,689 UART: [art] PUB.X = 8098D9C1449A983D10C4399E1EB62DEE7F094B6233F1A3257CCBBA21CED1A02979D3418D812569F867A6D1A50C192119
3,256,453 UART: [art] PUB.Y = DF21B195C20304FAE6AF53BB04135BB79064225322F1929639825008DA61587292AD1C1A7F20F882BE9F288242415B97
3,263,381 UART: [art] SIG.R = 22F0245BEE121E88FD5236ED3520DE3E0768D673008AE8D08310D17A64D772BD8D7CC509EB5D271F11810A16F894D47C
3,270,122 UART: [art] SIG.S = DFB1E1B82EE2E830F9613730D869BAF023D47706495CA0FC9C7BC0D92074DA2E76E4D2E130C0DF84E3481A6D0D890C4C
3,293,908 UART: Caliptra RT
3,294,253 UART: [state] CFI Enabled
3,402,724 UART: [rt] RT listening for mailbox commands...
3,403,394 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,478 UART: [rt]cmd =0x53494756, len=196
3,440,268 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,098 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,389 UART: [fht] FHT @ 0x50003400
1,175,010 UART: [idev] ++
1,175,178 UART: [idev] CDI.KEYID = 6
1,175,538 UART: [idev] SUBJECT.KEYID = 7
1,175,962 UART: [idev] UDS.KEYID = 0
1,176,307 ready_for_fw is high
1,176,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,892 UART: [idev] Erasing UDS.KEYID = 0
1,201,103 UART: [idev] Sha1 KeyId Algorithm
1,209,683 UART: [idev] --
1,210,845 UART: [ldev] ++
1,211,013 UART: [ldev] CDI.KEYID = 6
1,211,376 UART: [ldev] SUBJECT.KEYID = 5
1,211,802 UART: [ldev] AUTHORITY.KEYID = 7
1,212,265 UART: [ldev] FE.KEYID = 1
1,217,459 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,617 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,644 UART: [fwproc] Recv command 0x46574c44
1,284,372 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,611 >>> mbox cmd response: success
2,771,641 UART: [afmc] ++
2,771,809 UART: [afmc] CDI.KEYID = 6
2,772,171 UART: [afmc] SUBJECT.KEYID = 7
2,772,596 UART: [afmc] AUTHORITY.KEYID = 5
2,808,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,895 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,510 UART: [afmc] --
2,851,610 UART: [cold-reset] --
2,852,334 UART: [state] Locking Datavault
2,853,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,179 UART: [state] Locking ICCM
2,854,801 UART: [exit] Launching FMC @ 0x40000130
2,860,130 UART:
2,860,146 UART: Running Caliptra FMC ...
2,860,554 UART:
2,860,608 UART: [state] CFI Enabled
2,871,145 UART: [fht] FMC Alias Private Key: 7
2,979,566 UART: [art] Extend RT PCRs Done
2,979,994 UART: [art] Lock RT PCRs Done
2,981,236 UART: [art] Populate DV Done
2,989,443 UART: [fht] FMC Alias Private Key: 7
2,990,371 UART: [art] Derive CDI
2,990,651 UART: [art] Store in in slot 0x4
3,075,708 UART: [art] Derive Key Pair
3,076,068 UART: [art] Store priv key in slot 0x5
3,089,080 UART: [art] Derive Key Pair - Done
3,103,641 UART: [art] Signing Cert with AUTHO
3,104,121 UART: RITY.KEYID = 7
3,118,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,638 UART: [art] PUB.X = 42A759B94E53F663496DC67600410D46F727E441300982D94A41464B7C8C5F331BEDD845FB0E73827689090197E26F20
3,126,357 UART: [art] PUB.Y = 9AD180C00140E39C96FFA969910F489ACE6F67387798F8B3F9D5B662156215BFFF342E96D46B6830C1093C0CB52E3C52
3,133,295 UART: [art] SIG.R = 3E7E0FB5622D5572955FAF30E2BAC8A90335EB7402C31348B1818E60240F03AF7B59A63F4368C6736CA3D3BB517F3552
3,140,050 UART: [art] SIG.S = 8D0DFBF7091F558E667925BBE28E4365D1A5970508FEFA824311F5159865D2E209901D8F2E85B63A962D6575BED0C46B
3,163,690 UART: Caliptra RT
3,163,943 UART: [state] CFI Enabled
3,271,554 UART: [rt] RT listening for mailbox commands...
3,272,224 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,256 UART: [rt]cmd =0x53494756, len=196
3,308,318 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,344 >>> mbox cmd response: success
2,684,044 UART:
2,684,060 UART: Running Caliptra FMC ...
2,684,468 UART:
2,684,522 UART: [state] CFI Enabled
2,695,241 UART: [fht] FMC Alias Private Key: 7
2,802,902 UART: [art] Extend RT PCRs Done
2,803,330 UART: [art] Lock RT PCRs Done
2,805,014 UART: [art] Populate DV Done
2,813,479 UART: [fht] FMC Alias Private Key: 7
2,814,605 UART: [art] Derive CDI
2,814,885 UART: [art] Store in in slot 0x4
2,900,186 UART: [art] Derive Key Pair
2,900,546 UART: [art] Store priv key in slot 0x5
2,913,990 UART: [art] Derive Key Pair - Done
2,928,887 UART: [art] Signing Cert with AUTHO
2,929,367 UART: RITY.KEYID = 7
2,944,435 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,200 UART: [art] PUB.X = C0BDD6A355885BD12B12A6F041F47B3FF216D8023DFCA8AEFA06E4AE302A6F51178444316B95B41AABC95DDE84C03CBE
2,951,984 UART: [art] PUB.Y = 1D122FF6FBEAA7F23CDFDE0FC60D343F554BAE15AC18058BD0277CE1317ECD44D8582DDCFE2FAF7E5A4DC01F1536CF04
2,958,952 UART: [art] SIG.R = ACF2FB29B4AD20E9F6299D650B34984D49D6F38661E2ED112C2754E5AAA2801BC014EE15CFE440D6CF141AD37A51DC0D
2,965,732 UART: [art] SIG.S = F1A14C310B5AFA581840BD66919CBB4F69CE170F6432AEDC1426E373B903FF990FF0813D724F1A65EB9437F99F44A717
2,989,349 UART: Caliptra RT
2,989,602 UART: [state] CFI Enabled
3,096,320 UART: [rt] RT listening for mailbox commands...
3,096,990 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,070 UART: [rt]cmd =0x53494756, len=196
3,133,356 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,727 UART: [kat] HMAC-384Kdf
923,377 UART: [kat] LMS
1,171,705 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,810 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,449 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,802 UART: [idev] --
1,210,984 UART: [ldev] ++
1,211,152 UART: [ldev] CDI.KEYID = 6
1,211,515 UART: [ldev] SUBJECT.KEYID = 5
1,211,941 UART: [ldev] AUTHORITY.KEYID = 7
1,212,404 UART: [ldev] FE.KEYID = 1
1,217,400 UART: [ldev] Erasing FE.KEYID = 1
1,244,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,240 UART: [ldev] --
1,283,749 UART: [fwproc] Wait for Commands...
1,284,385 UART: [fwproc] Recv command 0x46574c44
1,285,113 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,498 >>> mbox cmd response: success
2,772,538 UART: [afmc] ++
2,772,706 UART: [afmc] CDI.KEYID = 6
2,773,068 UART: [afmc] SUBJECT.KEYID = 7
2,773,493 UART: [afmc] AUTHORITY.KEYID = 5
2,809,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,118 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,551 UART: [afmc] --
2,852,673 UART: [cold-reset] --
2,853,685 UART: [state] Locking Datavault
2,855,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,642 UART: [state] Locking ICCM
2,856,278 UART: [exit] Launching FMC @ 0x40000130
2,861,607 UART:
2,861,623 UART: Running Caliptra FMC ...
2,862,031 UART:
2,862,174 UART: [state] CFI Enabled
2,872,869 UART: [fht] FMC Alias Private Key: 7
2,980,892 UART: [art] Extend RT PCRs Done
2,981,320 UART: [art] Lock RT PCRs Done
2,983,224 UART: [art] Populate DV Done
2,991,449 UART: [fht] FMC Alias Private Key: 7
2,992,381 UART: [art] Derive CDI
2,992,661 UART: [art] Store in in slot 0x4
3,078,488 UART: [art] Derive Key Pair
3,078,848 UART: [art] Store priv key in slot 0x5
3,092,186 UART: [art] Derive Key Pair - Done
3,106,729 UART: [art] Signing Cert with AUTHO
3,107,209 UART: RITY.KEYID = 7
3,122,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,158 UART: [art] PUB.X = 81B1B7582AFBE78BD632411A87F2AD977E82E6CD6C432FF3ABEBBF1C3057BD39E93FFCBCF59C0A5EEE7DDBB2985A4269
3,129,953 UART: [art] PUB.Y = A351D650EE2B1220710B607B3E6975A006B11ACE943D2CDE5F5C6AD12344FBA17F8344891D171D4678E4C06F318695DB
3,136,899 UART: [art] SIG.R = 2312FE228CCFFE65DB63F45DE7835EB87468AAF04ED5BA4EF67BDA16DE338B72CA98B00E2780143AC384DD8D85F32FD1
3,143,686 UART: [art] SIG.S = 60BA015AC1A3B2155C2EB7BBD7FA44764743B40B43E6905A396678938FC2B4C9C7A8FDA7C4F59955A21F20B977951D8E
3,167,437 UART: Caliptra RT
3,167,782 UART: [state] CFI Enabled
3,275,657 UART: [rt] RT listening for mailbox commands...
3,276,327 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,397 UART: [rt]cmd =0x53494756, len=196
3,313,039 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,982 ready_for_fw is high
1,060,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,511 >>> mbox cmd response: success
2,687,041 UART:
2,687,057 UART: Running Caliptra FMC ...
2,687,465 UART:
2,687,608 UART: [state] CFI Enabled
2,697,987 UART: [fht] FMC Alias Private Key: 7
2,806,138 UART: [art] Extend RT PCRs Done
2,806,566 UART: [art] Lock RT PCRs Done
2,807,876 UART: [art] Populate DV Done
2,815,983 UART: [fht] FMC Alias Private Key: 7
2,816,987 UART: [art] Derive CDI
2,817,267 UART: [art] Store in in slot 0x4
2,902,814 UART: [art] Derive Key Pair
2,903,174 UART: [art] Store priv key in slot 0x5
2,916,354 UART: [art] Derive Key Pair - Done
2,931,272 UART: [art] Signing Cert with AUTHO
2,931,752 UART: RITY.KEYID = 7
2,947,108 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,873 UART: [art] PUB.X = 3606CBFD21E8D81CEB73BC0DEC9C5AA41A8BFB686C9B9E0471BB055D81FD6A1FC0787EBD82529455B8166FE024494B1A
2,954,649 UART: [art] PUB.Y = 3AD1FF194964211B81190B6CFF8F4321B35FB9E61EBC4B01AF93C410FA07E33384710EF94144E62E7B51DC6CAC3A9DDE
2,961,601 UART: [art] SIG.R = F3D71C2A08202808D61623DE939D1C45B715B1BC87FC7CECCB60D4F22301D3D8782B8476462A8E69E4C408A1A91FCDAA
2,968,369 UART: [art] SIG.S = 67B0BE2E3A4F65B3B1E6DE4B823A0665A5C86051DACB28CAF5A4A475185988F46DB7872F20C506B9305176EDAF347049
2,991,640 UART: Caliptra RT
2,991,985 UART: [state] CFI Enabled
3,099,060 UART: [rt] RT listening for mailbox commands...
3,099,730 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,740 UART: [rt]cmd =0x53494756, len=196
3,136,014 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,617 UART: [idev] ++
1,172,785 UART: [idev] CDI.KEYID = 6
1,173,146 UART: [idev] SUBJECT.KEYID = 7
1,173,571 UART: [idev] UDS.KEYID = 0
1,173,917 ready_for_fw is high
1,173,917 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,521 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,302 UART: [ldev] ++
1,208,470 UART: [ldev] CDI.KEYID = 6
1,208,834 UART: [ldev] SUBJECT.KEYID = 5
1,209,261 UART: [ldev] AUTHORITY.KEYID = 7
1,209,724 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,700 UART: [fwproc] Wait for Commands...
1,281,431 UART: [fwproc] Recv command 0x46574c44
1,282,164 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,967 >>> mbox cmd response: success
2,770,096 UART: [afmc] ++
2,770,264 UART: [afmc] CDI.KEYID = 6
2,770,627 UART: [afmc] SUBJECT.KEYID = 7
2,771,053 UART: [afmc] AUTHORITY.KEYID = 5
2,806,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,059 UART: [afmc] --
2,849,109 UART: [cold-reset] --
2,849,667 UART: [state] Locking Datavault
2,850,768 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,372 UART: [state] Locking ICCM
2,851,824 UART: [exit] Launching FMC @ 0x40000130
2,857,153 UART:
2,857,169 UART: Running Caliptra FMC ...
2,857,577 UART:
2,857,631 UART: [state] CFI Enabled
2,868,208 UART: [fht] FMC Alias Private Key: 7
2,977,051 UART: [art] Extend RT PCRs Done
2,977,479 UART: [art] Lock RT PCRs Done
2,979,099 UART: [art] Populate DV Done
2,987,230 UART: [fht] FMC Alias Private Key: 7
2,988,306 UART: [art] Derive CDI
2,988,586 UART: [art] Store in in slot 0x4
3,074,387 UART: [art] Derive Key Pair
3,074,747 UART: [art] Store priv key in slot 0x5
3,088,537 UART: [art] Derive Key Pair - Done
3,103,322 UART: [art] Signing Cert with AUTHO
3,103,802 UART: RITY.KEYID = 7
3,118,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,651 UART: [art] PUB.X = B6EC1BA938BDD33A0C319AFFBD84BA8B9BDFAEDAC8F1182489F34E0300C51CDDD6CAAB48DE983C4CA3E6BBAA7470C396
3,126,429 UART: [art] PUB.Y = 283201A42D4FCA103A4DFBBFD675B623FCD2EDE4F547A560A5DA27F9E33D58A68771A68F269891D68272F1418C61CA10
3,133,384 UART: [art] SIG.R = E7E3326B380AD6B61AEE8A6E0E3FABD00252203F78EFC7AD4C6182EE513A4B04DBC4C0CC99C30F7764285EDA2FB7815C
3,140,159 UART: [art] SIG.S = 4365054940BFC0B51AF06210736BC2503290D1AB9B9D586B1B21D9DDDAA5FE02A30813F37A615375249511B77D906D34
3,163,771 UART: Caliptra RT
3,164,024 UART: [state] CFI Enabled
3,272,341 UART: [rt] RT listening for mailbox commands...
3,273,011 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,075 UART: [rt]cmd =0x53494756, len=196
3,309,481 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,608 ready_for_fw is high
1,056,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,477 >>> mbox cmd response: success
2,680,655 UART:
2,680,671 UART: Running Caliptra FMC ...
2,681,079 UART:
2,681,133 UART: [state] CFI Enabled
2,691,536 UART: [fht] FMC Alias Private Key: 7
2,799,643 UART: [art] Extend RT PCRs Done
2,800,071 UART: [art] Lock RT PCRs Done
2,801,141 UART: [art] Populate DV Done
2,809,386 UART: [fht] FMC Alias Private Key: 7
2,810,494 UART: [art] Derive CDI
2,810,774 UART: [art] Store in in slot 0x4
2,896,367 UART: [art] Derive Key Pair
2,896,727 UART: [art] Store priv key in slot 0x5
2,910,213 UART: [art] Derive Key Pair - Done
2,924,526 UART: [art] Signing Cert with AUTHO
2,925,006 UART: RITY.KEYID = 7
2,940,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,843 UART: [art] PUB.X = A32E1D46ADC61ABA7A97DCBB0EA5D6D3F05B6B485081ADE17F3A33608C2FC6F676AD9DFBE9AF2C1CDCCAC9EFB92EE4BC
2,947,652 UART: [art] PUB.Y = 473832B5224670040DD51FAE962FBC6E6C5B203C0BE0D7631D843F8EEE993D3C291D5E0AE7E2DC77C6ABA48DB3A44B82
2,954,604 UART: [art] SIG.R = 44D3D3523336D2E967782B009C822B06FCB3230E92A126EE6CA7F028AC1ACAE339C5FD8CD4532BCDCDA1A459B7AC7C03
2,961,359 UART: [art] SIG.S = 641354D94CE9E10615064922DE48E51CE8E579BD62F5E0BF13A5D9EB77B6648512FF98C0DB73AB38AD171EE8BB29D7D0
2,985,510 UART: Caliptra RT
2,985,763 UART: [state] CFI Enabled
3,093,844 UART: [rt] RT listening for mailbox commands...
3,094,514 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,514 UART: [rt]cmd =0x53494756, len=196
3,130,586 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,138 UART: [state] WD Timer not started. Device not locked for debugging
88,463 UART: [kat] SHA2-256
892,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,142 UART: [kat] ++
896,294 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,621 UART: [kat] HMAC-384Kdf
921,365 UART: [kat] LMS
1,169,677 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,586 UART: [idev] ++
1,173,754 UART: [idev] CDI.KEYID = 6
1,174,115 UART: [idev] SUBJECT.KEYID = 7
1,174,540 UART: [idev] UDS.KEYID = 0
1,174,886 ready_for_fw is high
1,174,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,958 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,283,018 UART: [fwproc] Recv command 0x46574c44
1,283,751 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,332 >>> mbox cmd response: success
2,772,577 UART: [afmc] ++
2,772,745 UART: [afmc] CDI.KEYID = 6
2,773,108 UART: [afmc] SUBJECT.KEYID = 7
2,773,534 UART: [afmc] AUTHORITY.KEYID = 5
2,809,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,330 UART: [afmc] --
2,853,380 UART: [cold-reset] --
2,854,332 UART: [state] Locking Datavault
2,855,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,303 UART: [state] Locking ICCM
2,856,803 UART: [exit] Launching FMC @ 0x40000130
2,862,132 UART:
2,862,148 UART: Running Caliptra FMC ...
2,862,556 UART:
2,862,699 UART: [state] CFI Enabled
2,873,664 UART: [fht] FMC Alias Private Key: 7
2,981,293 UART: [art] Extend RT PCRs Done
2,981,721 UART: [art] Lock RT PCRs Done
2,983,415 UART: [art] Populate DV Done
2,991,724 UART: [fht] FMC Alias Private Key: 7
2,992,692 UART: [art] Derive CDI
2,992,972 UART: [art] Store in in slot 0x4
3,078,791 UART: [art] Derive Key Pair
3,079,151 UART: [art] Store priv key in slot 0x5
3,092,795 UART: [art] Derive Key Pair - Done
3,107,749 UART: [art] Signing Cert with AUTHO
3,108,229 UART: RITY.KEYID = 7
3,123,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,102 UART: [art] PUB.X = 7626A29C602E0F47F60D92D01C5627C08E502659334607D7AFB70BE332464658F0AD7A91049911781274B6E795EF9FCD
3,130,849 UART: [art] PUB.Y = 7F38F8605AADB0A0ABE8BA9308869EAD9AB37E0A23986D71FA533370729EEB93155786C5C7B2BBD72762F0C87157C208
3,137,796 UART: [art] SIG.R = 36F0A155B0462C5AC16AFDC0DDAACC36F13240F97C383A65EEA7FD3562001EC8FD16433C39967DC29E8D3D075D7DC484
3,144,555 UART: [art] SIG.S = 4C57077884874F869BDAF3FD9C376C83581ECAF5FCF64A04B1E0361ACE61FD987C722C820CABF02CD3853679F68CDED7
3,168,321 UART: Caliptra RT
3,168,666 UART: [state] CFI Enabled
3,277,689 UART: [rt] RT listening for mailbox commands...
3,278,359 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,709 UART: [rt]cmd =0x53494756, len=196
3,315,189 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,949 ready_for_fw is high
1,055,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,422 >>> mbox cmd response: success
2,681,518 UART:
2,681,534 UART: Running Caliptra FMC ...
2,681,942 UART:
2,682,085 UART: [state] CFI Enabled
2,692,844 UART: [fht] FMC Alias Private Key: 7
2,800,805 UART: [art] Extend RT PCRs Done
2,801,233 UART: [art] Lock RT PCRs Done
2,802,667 UART: [art] Populate DV Done
2,810,984 UART: [fht] FMC Alias Private Key: 7
2,811,962 UART: [art] Derive CDI
2,812,242 UART: [art] Store in in slot 0x4
2,897,857 UART: [art] Derive Key Pair
2,898,217 UART: [art] Store priv key in slot 0x5
2,911,909 UART: [art] Derive Key Pair - Done
2,926,768 UART: [art] Signing Cert with AUTHO
2,927,248 UART: RITY.KEYID = 7
2,942,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,647 UART: [art] PUB.X = 9E49128A60EDA7D7FF34C265B274F895F7978B624834696115E8C098224A4A0D5EF9329470BC2AE97030D559E60F12AC
2,950,407 UART: [art] PUB.Y = BED5AC094524ECCA1D0F684EA8EF1C1ECD62237B76FC98F3903C39A12E2C585408EFE8146FC054A610C1DD71C22B4868
2,957,362 UART: [art] SIG.R = C34C02DBAAAF8464AFDA1E76442E5B33AAC663EB37F905ABFE733394F79E85CE1604F9A099AB7749B160F18D41D17746
2,964,135 UART: [art] SIG.S = CA1B14227F15BE2A250DD3F462594D2626B87407014688A03487B380B0246D138F355F9D590826387268D09D524A18E3
2,987,816 UART: Caliptra RT
2,988,161 UART: [state] CFI Enabled
3,095,613 UART: [rt] RT listening for mailbox commands...
3,096,283 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,437 UART: [rt]cmd =0x53494756, len=196
3,132,751 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,059 UART:
192,444 UART: Running Caliptra ROM ...
193,607 UART:
193,760 UART: [state] CFI Enabled
264,884 UART: [state] LifecycleState = Unprovisioned
266,811 UART: [state] DebugLocked = No
268,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,721 UART: [kat] SHA2-256
442,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,869 UART: [kat] ++
453,318 UART: [kat] sha1
464,760 UART: [kat] SHA2-256
467,416 UART: [kat] SHA2-384
472,838 UART: [kat] SHA2-512-ACC
475,204 UART: [kat] ECC-384
2,769,282 UART: [kat] HMAC-384Kdf
2,799,920 UART: [kat] LMS
3,990,183 UART: [kat] --
3,992,851 UART: [cold-reset] ++
3,994,288 UART: [fht] Storing FHT @ 0x50003400
4,006,126 UART: [idev] ++
4,006,703 UART: [idev] CDI.KEYID = 6
4,007,600 UART: [idev] SUBJECT.KEYID = 7
4,008,847 UART: [idev] UDS.KEYID = 0
4,009,847 ready_for_fw is high
4,010,056 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,235 UART: [idev] Erasing UDS.KEYID = 0
7,345,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,965 UART: [idev] --
7,373,254 UART: [ldev] ++
7,373,865 UART: [ldev] CDI.KEYID = 6
7,374,783 UART: [ldev] SUBJECT.KEYID = 5
7,375,998 UART: [ldev] AUTHORITY.KEYID = 7
7,377,286 UART: [ldev] FE.KEYID = 1
7,421,702 UART: [ldev] Erasing FE.KEYID = 1
10,752,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,095 UART: [ldev] --
13,115,604 UART: [fwproc] Waiting for Commands...
13,117,805 UART: [fwproc] Received command 0x46574c44
13,120,039 UART: [fwproc] Received Image of size 113760 bytes
17,168,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,804 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,625,924 >>> mbox cmd response: success
17,626,438 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,629,275 UART: [afmc] ++
17,629,884 UART: [afmc] CDI.KEYID = 6
17,630,950 UART: [afmc] SUBJECT.KEYID = 7
17,632,053 UART: [afmc] AUTHORITY.KEYID = 5
20,986,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,606 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,058 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,859 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,305 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,786 UART: [afmc] --
23,361,412 UART: [cold-reset] --
23,365,544 UART: [state] Locking Datavault
23,371,225 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,967 UART: [state] Locking ICCM
23,374,753 UART: [exit] Launching FMC @ 0x40000130
23,383,102 UART:
23,383,360 UART: Running Caliptra FMC ...
23,384,463 UART:
23,384,638 UART: [state] CFI Enabled
23,448,258 UART: [fht] FMC Alias Private Key: 7
25,786,485 UART: [art] Extend RT PCRs Done
25,787,719 UART: [art] Lock RT PCRs Done
25,789,344 UART: [art] Populate DV Done
25,794,645 UART: [fht] FMC Alias Private Key: 7
25,796,287 UART: [art] Derive CDI
25,797,101 UART: [art] Store in in slot 0x4
25,857,096 UART: [art] Derive Key Pair
25,858,140 UART: [art] Store priv key in slot 0x5
29,151,536 UART: [art] Derive Key Pair - Done
29,164,532 UART: [art] Signing Cert with AUTHO
29,165,836 UART: RITY.KEYID = 7
31,453,473 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,005 UART: [art] PUB.X = 0373F6BADEAA805E106D4328A44A4748756F089983E53B6175C79EBE3678485F7B64E3450ED07C721F8C79ECC0F64FFF
31,462,210 UART: [art] PUB.Y = 18C6BAC287545BCA85F6E3037CB7F136302B467207A48FEE8066E16D7345607DBD60D6299895032AEECDE5224160619B
31,469,436 UART: [art] SIG.R = 005C6C605E76D15B10B9B3FA6A73DCAB716EDA6D0EFAB88DC8EA891D7949AE26D4607259C2264D8D88C2620722D87374
31,476,832 UART: [art] SIG.S = 6AC75E2CAE986718DEDBB24F47B0DA534A65D7FC687E2CB0BA80C9574A28F259A289A886B98376DB6E343B61259A8568
32,781,770 UART: Caliptra RT
32,782,474 UART: [state] CFI Enabled
32,943,459 UART: [rt] RT listening for mailbox commands...
32,974,697 UART: [rt]cmd =0x46505344, len=4
33,084,780 >>> mbox cmd response data (8 bytes)
33,085,315 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,085,650 UART: Fatal Error: 0x000E0008
33,086,738 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,805,188 ready_for_fw is high
3,805,941 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,881,691 >>> mbox cmd response: success
17,882,618 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,568,843 UART:
23,569,239 UART: Running Caliptra FMC ...
23,570,453 UART:
23,570,626 UART: [state] CFI Enabled
23,637,461 UART: [fht] FMC Alias Private Key: 7
25,975,226 UART: [art] Extend RT PCRs Done
25,976,462 UART: [art] Lock RT PCRs Done
25,978,312 UART: [art] Populate DV Done
25,983,832 UART: [fht] FMC Alias Private Key: 7
25,985,438 UART: [art] Derive CDI
25,986,262 UART: [art] Store in in slot 0x4
26,045,950 UART: [art] Derive Key Pair
26,046,983 UART: [art] Store priv key in slot 0x5
29,339,785 UART: [art] Derive Key Pair - Done
29,352,509 UART: [art] Signing Cert with AUTHO
29,353,846 UART: RITY.KEYID = 7
31,642,457 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,968 UART: [art] PUB.X = E0CDF14E522ADD10F95F1D8693EAA6F127704C2E9DE7601B984AD2D5C939AD7C0113F4661A269DAEC8B0DA41FAB68F00
31,651,245 UART: [art] PUB.Y = FB63B64B7AE6DA44C76A50B1022C29FB0D5326B7D22088AD89F014A69CC4F02BF33C9DDD1CA0872C182982AEB4964371
31,658,500 UART: [art] SIG.R = EBFD9A9ED184568C8ECF8ABF58CE9CE0C94C361DF106271EC999A01C0952EAB82871125E08CE0F668A7D26B16220F296
31,665,897 UART: [art] SIG.S = 6F3194AC8BA9ADB3FC756B2C25C4A8CDBCEC2767F5B787982B3C73B2A4051B69514F8EB6D9AEC3A0AD08FD58A8F3ECFF
32,971,501 UART: Caliptra RT
32,972,217 UART: [state] CFI Enabled
33,132,594 UART: [rt] RT listening for mailbox commands...
33,164,033 UART: [rt]cmd =0x46505344, len=4
33,273,920 >>> mbox cmd response data (8 bytes)
33,274,453 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,274,744 UART: Fatal Error: 0x000E0008
33,275,919 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
192,981 UART:
193,339 UART: Running Caliptra ROM ...
194,475 UART:
604,203 UART: [state] CFI Enabled
616,542 UART: [state] LifecycleState = Unprovisioned
618,526 UART: [state] DebugLocked = No
621,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,632 UART: [kat] SHA2-256
795,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,875 UART: [kat] ++
806,494 UART: [kat] sha1
818,365 UART: [kat] SHA2-256
821,079 UART: [kat] SHA2-384
827,637 UART: [kat] SHA2-512-ACC
830,007 UART: [kat] ECC-384
3,114,332 UART: [kat] HMAC-384Kdf
3,126,855 UART: [kat] LMS
4,316,973 UART: [kat] --
4,322,905 UART: [cold-reset] ++
4,324,695 UART: [fht] Storing FHT @ 0x50003400
4,335,456 UART: [idev] ++
4,336,080 UART: [idev] CDI.KEYID = 6
4,336,990 UART: [idev] SUBJECT.KEYID = 7
4,338,222 UART: [idev] UDS.KEYID = 0
4,339,252 ready_for_fw is high
4,339,447 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,326 UART: [idev] Erasing UDS.KEYID = 0
7,626,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,257 UART: [idev] --
7,653,689 UART: [ldev] ++
7,654,297 UART: [ldev] CDI.KEYID = 6
7,655,216 UART: [ldev] SUBJECT.KEYID = 5
7,656,427 UART: [ldev] AUTHORITY.KEYID = 7
7,657,705 UART: [ldev] FE.KEYID = 1
7,667,752 UART: [ldev] Erasing FE.KEYID = 1
10,961,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,411 UART: [ldev] --
13,320,423 UART: [fwproc] Waiting for Commands...
13,322,097 UART: [fwproc] Received command 0x46574c44
13,324,348 UART: [fwproc] Received Image of size 113760 bytes
17,367,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,736 >>> mbox cmd response: success
17,828,283 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,831,063 UART: [afmc] ++
17,831,646 UART: [afmc] CDI.KEYID = 6
17,832,580 UART: [afmc] SUBJECT.KEYID = 7
17,833,798 UART: [afmc] AUTHORITY.KEYID = 5
21,148,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,934 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,190 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,580 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,404 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,856 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,834 UART: [afmc] --
23,514,269 UART: [cold-reset] --
23,517,750 UART: [state] Locking Datavault
23,522,561 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,311 UART: [state] Locking ICCM
23,526,993 UART: [exit] Launching FMC @ 0x40000130
23,535,382 UART:
23,535,615 UART: Running Caliptra FMC ...
23,536,722 UART:
23,536,876 UART: [state] CFI Enabled
23,544,975 UART: [fht] FMC Alias Private Key: 7
25,875,838 UART: [art] Extend RT PCRs Done
25,877,059 UART: [art] Lock RT PCRs Done
25,878,466 UART: [art] Populate DV Done
25,883,997 UART: [fht] FMC Alias Private Key: 7
25,885,552 UART: [art] Derive CDI
25,886,282 UART: [art] Store in in slot 0x4
25,929,200 UART: [art] Derive Key Pair
25,930,241 UART: [art] Store priv key in slot 0x5
29,172,146 UART: [art] Derive Key Pair - Done
29,185,109 UART: [art] Signing Cert with AUTHO
29,186,418 UART: RITY.KEYID = 7
31,465,355 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,857 UART: [art] PUB.X = 7598EECCE12DE0CB14CDC41A0C3B87D4FBE6FF38FC926A33F5E6E4E8FABD39081BE8C2E3E1074593CBBCDF3AA53EB4AE
31,474,119 UART: [art] PUB.Y = E331FD9C68DE27DFC64259D43CA5196C676854B750239940FF59AE979556E6F09A4F501BA8B43A35C3F2BD8672D5DC3B
31,481,422 UART: [art] SIG.R = 5A5F43E713731665B4E63E71D9AE7FA49786CE138560AF138D4CC518378B2AF57DEA7D1DB2D1097C26D7B4A607DFAF04
31,488,781 UART: [art] SIG.S = EDD4250BC25E68204C6801D32BF91C0E5BBEDA11B0CFBB8E41C9514E3C89CEC5B2570428F24883B7A406CBC0C168A710
32,793,841 UART: Caliptra RT
32,794,537 UART: [state] CFI Enabled
32,911,385 UART: [rt] RT listening for mailbox commands...
32,942,398 UART: [rt]cmd =0x46505344, len=4
33,052,231 >>> mbox cmd response data (8 bytes)
33,052,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,053,083 UART: Fatal Error: 0x000E0008
33,054,221 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,597 writing to cptra_bootfsm_go
4,128,704 ready_for_fw is high
4,129,107 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,060,845 >>> mbox cmd response: success
18,061,972 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,704,738 UART:
23,705,146 UART: Running Caliptra FMC ...
23,706,246 UART:
23,706,400 UART: [state] CFI Enabled
23,714,476 UART: [fht] FMC Alias Private Key: 7
26,045,613 UART: [art] Extend RT PCRs Done
26,046,838 UART: [art] Lock RT PCRs Done
26,048,383 UART: [art] Populate DV Done
26,053,913 UART: [fht] FMC Alias Private Key: 7
26,055,620 UART: [art] Derive CDI
26,056,436 UART: [art] Store in in slot 0x4
26,098,982 UART: [art] Derive Key Pair
26,099,984 UART: [art] Store priv key in slot 0x5
29,342,256 UART: [art] Derive Key Pair - Done
29,355,152 UART: [art] Signing Cert with AUTHO
29,356,458 UART: RITY.KEYID = 7
31,635,796 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,308 UART: [art] PUB.X = 6C75BF4D078A39624B6B33462AEDB59C66DA18DF21DBB89F54731D9BA0B43E4EAF3FE27BED5C538224B2A94CF752D2D2
31,644,547 UART: [art] PUB.Y = F96F83772372321755EC85A151055AAA734ED3B5E32BD1F7F9A405E7344E3AB0843E890C44BC98B0E80632865DA71D14
31,651,811 UART: [art] SIG.R = 22FFF90698F4AA6AB39BFEC1B2CD6A155EADA93124C8449B583F30C387A7D844EDA440ED14F3EFDC0AD894ECDB0EAD05
31,659,173 UART: [art] SIG.S = E5552590B907385C4B865AFD7D11D9AC39DE7AEAB67118FCFDE6668AD36DA9A414AA43E09A142CFDEA36A544DEA3C41D
32,964,361 UART: Caliptra RT
32,965,083 UART: [state] CFI Enabled
33,082,904 UART: [rt] RT listening for mailbox commands...
33,114,382 UART: [rt]cmd =0x46505344, len=4
33,224,337 >>> mbox cmd response data (8 bytes)
33,224,880 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,225,169 UART: Fatal Error: 0x000E0008
33,226,358 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,462 UART:
192,847 UART: Running Caliptra ROM ...
193,995 UART:
194,139 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Unprovisioned
265,660 UART: [state] DebugLocked = No
267,482 UART: [state] WD Timer not started. Device not locked for debugging
271,666 UART: [kat] SHA2-256
450,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,388 UART: [kat] ++
462,917 UART: [kat] sha1
473,939 UART: [kat] SHA2-256
476,946 UART: [kat] SHA2-384
482,149 UART: [kat] SHA2-512-ACC
485,075 UART: [kat] ECC-384
2,950,686 UART: [kat] HMAC-384Kdf
2,973,172 UART: [kat] LMS
3,502,639 UART: [kat] --
3,507,341 UART: [cold-reset] ++
3,508,350 UART: [fht] FHT @ 0x50003400
3,518,974 UART: [idev] ++
3,519,535 UART: [idev] CDI.KEYID = 6
3,520,516 UART: [idev] SUBJECT.KEYID = 7
3,521,686 UART: [idev] UDS.KEYID = 0
3,522,587 ready_for_fw is high
3,522,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,270 UART: [idev] Erasing UDS.KEYID = 0
6,030,372 UART: [idev] Sha1 KeyId Algorithm
6,053,293 UART: [idev] --
6,057,916 UART: [ldev] ++
6,058,492 UART: [ldev] CDI.KEYID = 6
6,059,408 UART: [ldev] SUBJECT.KEYID = 5
6,060,588 UART: [ldev] AUTHORITY.KEYID = 7
6,061,852 UART: [ldev] FE.KEYID = 1
6,100,745 UART: [ldev] Erasing FE.KEYID = 1
8,607,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,326 UART: [ldev] --
10,413,998 UART: [fwproc] Wait for Commands...
10,415,712 UART: [fwproc] Recv command 0x46574c44
10,417,818 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,711 >>> mbox cmd response: success
14,283,309 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,287,062 UART: [afmc] ++
14,287,656 UART: [afmc] CDI.KEYID = 6
14,288,562 UART: [afmc] SUBJECT.KEYID = 7
14,289,724 UART: [afmc] AUTHORITY.KEYID = 5
16,821,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,523 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,352 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,078 UART: [afmc] --
18,620,626 UART: [cold-reset] --
18,623,886 UART: [state] Locking Datavault
18,628,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,500 UART: [state] Locking ICCM
18,631,537 UART: [exit] Launching FMC @ 0x40000130
18,639,932 UART:
18,640,160 UART: Running Caliptra FMC ...
18,641,217 UART:
18,641,368 UART: [state] CFI Enabled
18,701,560 UART: [fht] FMC Alias Private Key: 7
20,465,718 UART: [art] Extend RT PCRs Done
20,466,937 UART: [art] Lock RT PCRs Done
20,468,776 UART: [art] Populate DV Done
20,474,345 UART: [fht] FMC Alias Private Key: 7
20,475,940 UART: [art] Derive CDI
20,476,751 UART: [art] Store in in slot 0x4
20,533,808 UART: [art] Derive Key Pair
20,534,865 UART: [art] Store priv key in slot 0x5
22,998,242 UART: [art] Derive Key Pair - Done
23,011,321 UART: [art] Signing Cert with AUTHO
23,012,655 UART: RITY.KEYID = 7
24,723,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,724,825 UART: [art] PUB.X = 6A236936DB66155B80444BFF827A69508607B0C125CF23C8E30B8431C61D03F6FDA236793665B38D1FEA2D58DBAECDB9
24,732,091 UART: [art] PUB.Y = 12E69461A45607C00B7284EAD55A2BBB4F2B4AE3FDE56A91F24BBB94A8EDB7F8A3C057BD594F2336457E70F47D1D0DD7
24,739,356 UART: [art] SIG.R = 340F14941025458712DC6F479484F78FAC4055FD2739A133306D1E549D0CBEB04C623858EF359D1939885592D5B36A56
24,746,729 UART: [art] SIG.S = 308F2E0D093B8657538C6D1BEB934209B9CA88987B07571883CC4067798EA5632A582A068CDCC3F0042E81E8D362F1C3
25,725,663 UART: Caliptra RT
25,726,365 UART: [state] CFI Enabled
25,891,407 UART: [rt] RT listening for mailbox commands...
25,922,661 UART: [rt]cmd =0x46505344, len=4
26,032,405 >>> mbox cmd response data (8 bytes)
26,032,964 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,033,250 UART: Fatal Error: 0x000E0008
26,034,336 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
3,367,392 ready_for_fw is high
3,368,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,036,385 >>> mbox cmd response: success
14,037,040 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,332,587 UART:
18,332,983 UART: Running Caliptra FMC ...
18,334,090 UART:
18,334,242 UART: [state] CFI Enabled
18,398,419 UART: [fht] FMC Alias Private Key: 7
20,162,158 UART: [art] Extend RT PCRs Done
20,163,382 UART: [art] Lock RT PCRs Done
20,165,411 UART: [art] Populate DV Done
20,170,660 UART: [fht] FMC Alias Private Key: 7
20,172,357 UART: [art] Derive CDI
20,173,090 UART: [art] Store in in slot 0x4
20,230,921 UART: [art] Derive Key Pair
20,231,955 UART: [art] Store priv key in slot 0x5
22,694,895 UART: [art] Derive Key Pair - Done
22,707,944 UART: [art] Signing Cert with AUTHO
22,709,244 UART: RITY.KEYID = 7
24,421,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,422,583 UART: [art] PUB.X = 24FCD73FD9290770319E0C5272F1F8A553E0C9D347B7962043D07E06B00457595DA5C7E0C352740FAD8F1FCB28C02882
24,429,849 UART: [art] PUB.Y = A0AAEDB32A9FF2AD5ED37463E488A74D372795C6C5EA56563AA320215A1599384D1A90AB7455F575DB29C7AA84F0E34D
24,437,121 UART: [art] SIG.R = F546ACE0844BB6A8744CCC20CA31D904EAF07FB498AE7E33C5F1174B675E1335A7C55AA163BB77ED6430EBF09299C6D6
24,444,506 UART: [art] SIG.S = F539C809106FE3318174DB5CD5A6329311721C1D3273AD5FAADD32854DB8AFB66F9E4ED3F4E9F31363C5677302A8F876
25,423,480 UART: Caliptra RT
25,424,196 UART: [state] CFI Enabled
25,590,423 UART: [rt] RT listening for mailbox commands...
25,621,946 UART: [rt]cmd =0x46505344, len=4
25,731,695 >>> mbox cmd response data (8 bytes)
25,732,220 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,732,545 UART: Fatal Error: 0x000E0008
25,733,669 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
193,056 UART:
193,446 UART: Running Caliptra ROM ...
194,545 UART:
604,395 UART: [state] CFI Enabled
619,059 UART: [state] LifecycleState = Unprovisioned
620,964 UART: [state] DebugLocked = No
623,282 UART: [state] WD Timer not started. Device not locked for debugging
626,252 UART: [kat] SHA2-256
805,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,929 UART: [kat] ++
817,464 UART: [kat] sha1
828,343 UART: [kat] SHA2-256
831,349 UART: [kat] SHA2-384
836,766 UART: [kat] SHA2-512-ACC
839,704 UART: [kat] ECC-384
3,284,340 UART: [kat] HMAC-384Kdf
3,298,450 UART: [kat] LMS
3,827,908 UART: [kat] --
3,833,746 UART: [cold-reset] ++
3,835,965 UART: [fht] FHT @ 0x50003400
3,846,016 UART: [idev] ++
3,846,605 UART: [idev] CDI.KEYID = 6
3,847,535 UART: [idev] SUBJECT.KEYID = 7
3,848,712 UART: [idev] UDS.KEYID = 0
3,849,707 ready_for_fw is high
3,849,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,507 UART: [idev] Erasing UDS.KEYID = 0
6,321,017 UART: [idev] Sha1 KeyId Algorithm
6,343,161 UART: [idev] --
6,347,836 UART: [ldev] ++
6,348,418 UART: [ldev] CDI.KEYID = 6
6,349,328 UART: [ldev] SUBJECT.KEYID = 5
6,350,485 UART: [ldev] AUTHORITY.KEYID = 7
6,351,771 UART: [ldev] FE.KEYID = 1
6,363,173 UART: [ldev] Erasing FE.KEYID = 1
8,837,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,088 UART: [ldev] --
10,628,870 UART: [fwproc] Wait for Commands...
10,631,505 UART: [fwproc] Recv command 0x46574c44
10,633,541 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,494,215 >>> mbox cmd response: success
14,494,797 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,497,797 UART: [afmc] ++
14,498,383 UART: [afmc] CDI.KEYID = 6
14,499,297 UART: [afmc] SUBJECT.KEYID = 7
14,500,456 UART: [afmc] AUTHORITY.KEYID = 5
17,001,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,094 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,743 UART: [afmc] --
18,800,312 UART: [cold-reset] --
18,801,965 UART: [state] Locking Datavault
18,807,003 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,655 UART: [state] Locking ICCM
18,809,890 UART: [exit] Launching FMC @ 0x40000130
18,818,269 UART:
18,818,515 UART: Running Caliptra FMC ...
18,819,620 UART:
18,819,783 UART: [state] CFI Enabled
18,827,903 UART: [fht] FMC Alias Private Key: 7
20,584,439 UART: [art] Extend RT PCRs Done
20,585,662 UART: [art] Lock RT PCRs Done
20,587,238 UART: [art] Populate DV Done
20,592,650 UART: [fht] FMC Alias Private Key: 7
20,594,243 UART: [art] Derive CDI
20,594,983 UART: [art] Store in in slot 0x4
20,637,899 UART: [art] Derive Key Pair
20,638,899 UART: [art] Store priv key in slot 0x5
23,065,410 UART: [art] Derive Key Pair - Done
23,078,727 UART: [art] Signing Cert with AUTHO
23,080,044 UART: RITY.KEYID = 7
24,785,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,069 UART: [art] PUB.X = A75AC89D2374966FA444BC41A60839B9F36BE23C6CBAF0B1560BE2ED21967778FEB294464FF306E5FEB5E81E6AB78CFB
24,794,341 UART: [art] PUB.Y = 1763F2FA7A01627202FD4E0075E84C88F71A736B95D035BAFA218EDB123031239FD24E91FFB9141BD2B2ACB24E6322F3
24,801,595 UART: [art] SIG.R = 4A959C71A4ADB8A015E13CCC03D0173AFE4AAA967FB47837FECEF1F465979ABA324FE0FD4608B284C1C7400CE895FB57
24,809,032 UART: [art] SIG.S = 1131D6E2EDC7E488B9E2AE5D81CDAF140699CCB2CA2395023AD0AD15266BC0A5E4DBBE4662DDAD975CC37BA697BB8908
25,788,314 UART: Caliptra RT
25,789,027 UART: [state] CFI Enabled
25,906,665 UART: [rt] RT listening for mailbox commands...
25,938,012 UART: [rt]cmd =0x46505344, len=4
26,047,760 >>> mbox cmd response data (8 bytes)
26,048,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,048,671 UART: Fatal Error: 0x000E0008
26,049,795 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
3,702,184 ready_for_fw is high
3,702,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,281,876 >>> mbox cmd response: success
14,282,916 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,533,071 UART:
18,533,494 UART: Running Caliptra FMC ...
18,534,634 UART:
18,534,788 UART: [state] CFI Enabled
18,542,723 UART: [fht] FMC Alias Private Key: 7
20,300,185 UART: [art] Extend RT PCRs Done
20,301,408 UART: [art] Lock RT PCRs Done
20,303,090 UART: [art] Populate DV Done
20,308,395 UART: [fht] FMC Alias Private Key: 7
20,309,832 UART: [art] Derive CDI
20,310,593 UART: [art] Store in in slot 0x4
20,353,189 UART: [art] Derive Key Pair
20,354,228 UART: [art] Store priv key in slot 0x5
22,780,999 UART: [art] Derive Key Pair - Done
22,794,151 UART: [art] Signing Cert with AUTHO
22,795,636 UART: RITY.KEYID = 7
24,500,836 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,353 UART: [art] PUB.X = 02B92E79BD3307AC4BF91819C66CB0D9FE5582A80D9C671017FBFC60FD1D7686FFF20117C5681D864FD1B97CC22DA734
24,509,583 UART: [art] PUB.Y = A06446BA4C3C682276599EDC9F9186462235C2FFE737EA1355CDDAEC9AB6EC60CA04ED5DC9B6F2455693245DEA44CC77
24,516,881 UART: [art] SIG.R = 42625414F244BDFA4CE39304348F31E52643FE66D599C8D188BA7468C3D84B5479C139ADD046BB04C2B9C6C85F185D5D
24,524,256 UART: [art] SIG.S = 785395FBB89CECFD04C76E2E5A8942DC819420F5DBACF9D764F968872C91D8B09F77A2FF924368F0D208A281825A383A
25,503,349 UART: Caliptra RT
25,504,047 UART: [state] CFI Enabled
25,620,973 UART: [rt] RT listening for mailbox commands...
25,652,474 UART: [rt]cmd =0x46505344, len=4
25,762,612 >>> mbox cmd response data (8 bytes)
25,763,149 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,763,444 UART: Fatal Error: 0x000E0008
25,764,559 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,488 UART:
192,856 UART: Running Caliptra ROM ...
194,052 UART:
194,209 UART: [state] CFI Enabled
264,770 UART: [state] LifecycleState = Unprovisioned
267,178 UART: [state] DebugLocked = No
269,346 UART: [state] WD Timer not started. Device not locked for debugging
274,102 UART: [kat] SHA2-256
464,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,771 UART: [kat] ++
475,303 UART: [kat] sha1
487,884 UART: [kat] SHA2-256
490,954 UART: [kat] SHA2-384
498,436 UART: [kat] SHA2-512-ACC
501,016 UART: [kat] ECC-384
2,947,425 UART: [kat] HMAC-384Kdf
2,971,674 UART: [kat] LMS
3,503,495 UART: [kat] --
3,508,589 UART: [cold-reset] ++
3,511,230 UART: [fht] FHT @ 0x50003400
3,523,438 UART: [idev] ++
3,524,072 UART: [idev] CDI.KEYID = 6
3,525,057 UART: [idev] SUBJECT.KEYID = 7
3,526,230 UART: [idev] UDS.KEYID = 0
3,527,157 ready_for_fw is high
3,527,340 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,824 UART: [idev] Erasing UDS.KEYID = 0
6,032,994 UART: [idev] Sha1 KeyId Algorithm
6,055,680 UART: [idev] --
6,060,478 UART: [ldev] ++
6,061,153 UART: [ldev] CDI.KEYID = 6
6,062,115 UART: [ldev] SUBJECT.KEYID = 5
6,063,275 UART: [ldev] AUTHORITY.KEYID = 7
6,064,659 UART: [ldev] FE.KEYID = 1
6,100,329 UART: [ldev] Erasing FE.KEYID = 1
8,609,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,040 UART: [ldev] --
10,415,848 UART: [fwproc] Wait for Commands...
10,419,020 UART: [fwproc] Recv command 0x46574c44
10,421,278 UART: [fwproc] Recv'd Img size: 114084 bytes
13,868,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,605,521 >>> mbox cmd response: success
14,606,029 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,609,281 UART: [afmc] ++
14,609,977 UART: [afmc] CDI.KEYID = 6
14,611,220 UART: [afmc] SUBJECT.KEYID = 7
14,612,677 UART: [afmc] AUTHORITY.KEYID = 5
17,151,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,777 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,652 UART: [afmc] --
18,970,042 UART: [cold-reset] --
18,974,618 UART: [state] Locking Datavault
18,980,149 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,364 UART: [state] Locking ICCM
18,984,633 UART: [exit] Launching FMC @ 0x40000130
18,993,278 UART:
18,993,512 UART: Running Caliptra FMC ...
18,994,611 UART:
18,994,792 UART: [state] CFI Enabled
19,062,916 UART: [fht] FMC Alias Private Key: 7
20,827,261 UART: [art] Extend RT PCRs Done
20,828,600 UART: [art] Lock RT PCRs Done
20,830,197 UART: [art] Populate DV Done
20,835,928 UART: [fht] FMC Alias Private Key: 7
20,837,366 UART: [art] Derive CDI
20,838,284 UART: [art] Store in in slot 0x4
20,895,624 UART: [art] Derive Key Pair
20,896,661 UART: [art] Store priv key in slot 0x5
23,359,655 UART: [art] Derive Key Pair - Done
23,372,480 UART: [art] Signing Cert with AUTHO
23,373,785 UART: RITY.KEYID = 7
25,098,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,526 UART: [art] PUB.X = 396333C008009A20EA146AFA95CE1DA794BEE644672881847323A4E52A49CC0CC7B961C6BFA96EF552358CB82F5D30DF
25,107,794 UART: [art] PUB.Y = 1A1BEC359A3D0F540AB24384755B52BA3B3E9D75030106C8F1F89883C91B98149EA65977BFB1043F67A9AD8E0BCA1A57
25,115,026 UART: [art] SIG.R = F54DF2E0A0C5C0AABDCB883BB06358D87A093418E58B0FACBCA08038B31E83C6FCD2A781D877CA281A29A12DC691B3FA
25,122,440 UART: [art] SIG.S = DA5E83997F8204104174581DC4D0D79415C1F1549E1F68AA29BACB52DCDBE818CBAA4F4059AB8D166344A8CF8B529825
26,101,022 UART: Caliptra RT
26,101,739 UART: [state] CFI Enabled
26,266,509 UART: [rt] RT listening for mailbox commands...
26,297,916 UART: [rt]cmd =0x46505344, len=4
26,407,823 >>> mbox cmd response data (8 bytes)
26,408,421 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,408,728 UART: Fatal Error: 0x000E0008
26,409,855 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,436,521 ready_for_fw is high
3,436,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,748,654 >>> mbox cmd response: success
14,749,484 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,045,344 UART:
19,045,744 UART: Running Caliptra FMC ...
19,046,847 UART:
19,047,004 UART: [state] CFI Enabled
19,114,479 UART: [fht] FMC Alias Private Key: 7
20,878,841 UART: [art] Extend RT PCRs Done
20,880,069 UART: [art] Lock RT PCRs Done
20,881,863 UART: [art] Populate DV Done
20,887,276 UART: [fht] FMC Alias Private Key: 7
20,888,926 UART: [art] Derive CDI
20,889,740 UART: [art] Store in in slot 0x4
20,947,522 UART: [art] Derive Key Pair
20,948,520 UART: [art] Store priv key in slot 0x5
23,411,879 UART: [art] Derive Key Pair - Done
23,424,399 UART: [art] Signing Cert with AUTHO
23,425,707 UART: RITY.KEYID = 7
25,137,464 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,974 UART: [art] PUB.X = E36546C2567193E0C87C27A397723BC5F854AD76F8CDE82CAD3B6BEA24D866B86E49C04D7CAB16FCC7037DA965D6D634
25,146,259 UART: [art] PUB.Y = 27EF8323CD139BD0E79FC30C77AF5AB42F93DA159878C69BF50898521D2A8E8AB13BDD79929BADFADB275EFA821CC395
25,153,540 UART: [art] SIG.R = 5106862B89ACB19588D92429A020145B6D404EAE2F17810ECC4753E9195012978A1C257353AD17587F41CC05239514DE
25,160,920 UART: [art] SIG.S = 8073F7783D43E410E3C195E946C581866ED52A1C2A6F8CBB7DE5A44E71FEDCC5CE06456FFD10E3ED26240A6A6C132477
26,139,496 UART: Caliptra RT
26,140,183 UART: [state] CFI Enabled
26,305,703 UART: [rt] RT listening for mailbox commands...
26,337,044 UART: [rt]cmd =0x46505344, len=4
26,446,867 >>> mbox cmd response data (8 bytes)
26,447,389 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,447,691 UART: Fatal Error: 0x000E0008
26,448,776 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
193,099 UART:
193,477 UART: Running Caliptra ROM ...
194,675 UART:
604,356 UART: [state] CFI Enabled
617,094 UART: [state] LifecycleState = Unprovisioned
619,408 UART: [state] DebugLocked = No
620,726 UART: [state] WD Timer not started. Device not locked for debugging
624,692 UART: [kat] SHA2-256
814,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,350 UART: [kat] ++
825,879 UART: [kat] sha1
838,170 UART: [kat] SHA2-256
841,170 UART: [kat] SHA2-384
847,167 UART: [kat] SHA2-512-ACC
849,751 UART: [kat] ECC-384
3,291,127 UART: [kat] HMAC-384Kdf
3,303,936 UART: [kat] LMS
3,835,731 UART: [kat] --
3,841,043 UART: [cold-reset] ++
3,842,553 UART: [fht] FHT @ 0x50003400
3,854,954 UART: [idev] ++
3,855,661 UART: [idev] CDI.KEYID = 6
3,856,542 UART: [idev] SUBJECT.KEYID = 7
3,857,785 UART: [idev] UDS.KEYID = 0
3,858,706 ready_for_fw is high
3,858,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,252 UART: [idev] Erasing UDS.KEYID = 0
6,338,189 UART: [idev] Sha1 KeyId Algorithm
6,359,985 UART: [idev] --
6,363,387 UART: [ldev] ++
6,364,068 UART: [ldev] CDI.KEYID = 6
6,364,993 UART: [ldev] SUBJECT.KEYID = 5
6,366,153 UART: [ldev] AUTHORITY.KEYID = 7
6,367,383 UART: [ldev] FE.KEYID = 1
6,379,654 UART: [ldev] Erasing FE.KEYID = 1
8,857,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,138 UART: [ldev] --
10,650,090 UART: [fwproc] Wait for Commands...
10,652,786 UART: [fwproc] Recv command 0x46574c44
10,655,092 UART: [fwproc] Recv'd Img size: 114084 bytes
14,105,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,845,902 >>> mbox cmd response: success
14,846,435 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,849,749 UART: [afmc] ++
14,850,503 UART: [afmc] CDI.KEYID = 6
14,851,700 UART: [afmc] SUBJECT.KEYID = 7
14,853,142 UART: [afmc] AUTHORITY.KEYID = 5
17,355,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,659 UART: [afmc] --
19,149,314 UART: [cold-reset] --
19,153,892 UART: [state] Locking Datavault
19,159,421 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,573 UART: [state] Locking ICCM
19,163,622 UART: [exit] Launching FMC @ 0x40000130
19,172,247 UART:
19,172,491 UART: Running Caliptra FMC ...
19,173,594 UART:
19,173,754 UART: [state] CFI Enabled
19,181,850 UART: [fht] FMC Alias Private Key: 7
20,939,472 UART: [art] Extend RT PCRs Done
20,940,696 UART: [art] Lock RT PCRs Done
20,942,500 UART: [art] Populate DV Done
20,947,862 UART: [fht] FMC Alias Private Key: 7
20,949,568 UART: [art] Derive CDI
20,950,389 UART: [art] Store in in slot 0x4
20,993,466 UART: [art] Derive Key Pair
20,994,478 UART: [art] Store priv key in slot 0x5
23,421,394 UART: [art] Derive Key Pair - Done
23,434,421 UART: [art] Signing Cert with AUTHO
23,435,748 UART: RITY.KEYID = 7
25,141,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,543 UART: [art] PUB.X = A2EE91DF75CAB48697566D1B10C3C940ED26794C965AB64EBFCEEB098316A845C325FE9A918DE90E5C96BE6869A7B3BA
25,149,823 UART: [art] PUB.Y = 7BDF9CBEAC5FF3704D7DC31E299FBEF18861AB524E311F63713663BB827356C5CFDC06D1D1D05AAB6E84462BEFBE5A84
25,157,138 UART: [art] SIG.R = 156E884EC65A056AE4302F893BA5A79D03E0C7D37D17C6FBDD45FFF3EF90A056F53F728DF5845D79B95804E6769D08F1
25,164,500 UART: [art] SIG.S = CACB0B1A3FEDA41BBCAC2E951B95B3D99E6E12F122C270C9FC561A76E1CB54D4CE680B8C5C360A671AFBE9F8B4C80C97
26,142,854 UART: Caliptra RT
26,143,560 UART: [state] CFI Enabled
26,261,028 UART: [rt] RT listening for mailbox commands...
26,292,393 UART: [rt]cmd =0x46505344, len=4
26,402,134 >>> mbox cmd response data (8 bytes)
26,402,700 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,402,980 UART: Fatal Error: 0x000E0008
26,404,113 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
3,756,717 ready_for_fw is high
3,757,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,383 >>> mbox cmd response: success
14,952,518 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,203,132 UART:
19,203,542 UART: Running Caliptra FMC ...
19,204,752 UART:
19,204,917 UART: [state] CFI Enabled
19,213,126 UART: [fht] FMC Alias Private Key: 7
20,970,312 UART: [art] Extend RT PCRs Done
20,971,539 UART: [art] Lock RT PCRs Done
20,973,332 UART: [art] Populate DV Done
20,978,594 UART: [fht] FMC Alias Private Key: 7
20,980,085 UART: [art] Derive CDI
20,980,873 UART: [art] Store in in slot 0x4
21,023,207 UART: [art] Derive Key Pair
21,024,255 UART: [art] Store priv key in slot 0x5
23,450,548 UART: [art] Derive Key Pair - Done
23,463,450 UART: [art] Signing Cert with AUTHO
23,464,762 UART: RITY.KEYID = 7
25,169,992 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,498 UART: [art] PUB.X = 245949DABD914E43699BF6E38BE5DBD5543E3A2780C3DFBD805C524168CEF38C9470E5A881DF516EBC2734994C4A9D62
25,178,830 UART: [art] PUB.Y = B9760A99E5053E259C48C8F8A9B2ACF1D266A38094AAB4C8A46E097D1D8DBA880959BBE0E5C4872A70409A7C0E65D0D2
25,186,071 UART: [art] SIG.R = DE0A7C1B4E685320B47A23053C095131EA01494A1FFCB6D1B9FD2B6313443791604071E87879356454FDB723768DF234
25,193,412 UART: [art] SIG.S = 422BC07C49A92D918FBAEF9653AEED79CA2FBDD2B50FCDB4993DA11DA629497C01636BB96629A8478398CEADC238EEEC
26,171,843 UART: Caliptra RT
26,172,557 UART: [state] CFI Enabled
26,290,029 UART: [rt] RT listening for mailbox commands...
26,321,538 UART: [rt]cmd =0x46505344, len=4
26,431,464 >>> mbox cmd response data (8 bytes)
26,432,029 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,432,368 UART: Fatal Error: 0x000E0008
26,433,458 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,477 UART: [cold-reset] ++
1,476,819 UART: [fht] Storing FHT @ 0x50003400
1,479,470 UART: [idev] ++
1,479,638 UART: [idev] CDI.KEYID = 6
1,479,998 UART: [idev] SUBJECT.KEYID = 7
1,480,422 UART: [idev] UDS.KEYID = 0
1,480,767 ready_for_fw is high
1,480,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,978 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,148 UART: [idev] --
1,514,147 UART: [ldev] ++
1,514,315 UART: [ldev] CDI.KEYID = 6
1,514,678 UART: [ldev] SUBJECT.KEYID = 5
1,515,104 UART: [ldev] AUTHORITY.KEYID = 7
1,515,567 UART: [ldev] FE.KEYID = 1
1,521,047 UART: [ldev] Erasing FE.KEYID = 1
1,546,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,527 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 114084 bytes
2,882,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,339 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,691 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,258 >>> mbox cmd response: success
3,075,258 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,076,470 UART: [afmc] ++
3,076,638 UART: [afmc] CDI.KEYID = 6
3,077,000 UART: [afmc] SUBJECT.KEYID = 7
3,077,425 UART: [afmc] AUTHORITY.KEYID = 5
3,112,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,156 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,936 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,549 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,239 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,076 UART: [afmc] --
3,156,150 UART: [cold-reset] --
3,157,068 UART: [state] Locking Datavault
3,158,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,787 UART: [state] Locking ICCM
3,159,235 UART: [exit] Launching FMC @ 0x40000130
3,164,564 UART:
3,164,580 UART: Running Caliptra FMC ...
3,164,988 UART:
3,165,042 UART: [state] CFI Enabled
3,175,501 UART: [fht] FMC Alias Private Key: 7
3,283,066 UART: [art] Extend RT PCRs Done
3,283,494 UART: [art] Lock RT PCRs Done
3,284,640 UART: [art] Populate DV Done
3,292,749 UART: [fht] FMC Alias Private Key: 7
3,293,915 UART: [art] Derive CDI
3,294,195 UART: [art] Store in in slot 0x4
3,379,594 UART: [art] Derive Key Pair
3,379,954 UART: [art] Store priv key in slot 0x5
3,393,290 UART: [art] Derive Key Pair - Done
3,408,196 UART: [art] Signing Cert with AUTHO
3,408,676 UART: RITY.KEYID = 7
3,423,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,517 UART: [art] PUB.X = A9BE58DFBC2B320567DCE08E5D8A0F9FCA61525D285363813CC763908BF5170621888122227D00300EB414090E7F329E
3,431,243 UART: [art] PUB.Y = B908945478FB50E4ECF9D3A0F9BBD3678257CE8C3E003D6DEE97E5CEBA0E2F4FC11BB84AFF4D10F25544CA249B7C956D
3,438,187 UART: [art] SIG.R = 9A3F33BEBCE70593E763F206EAD7ACD9B4CFA1E7C78A9B36CE09485D0C186C97AE3E54D7636417165BD4E978973DDC79
3,444,959 UART: [art] SIG.S = 2F586A6B3A4A309872E2C8C08BDD0AF71B1995A796638318EE02F774AE8E379F18A2582E1E8004EA373E5DF08B791957
3,469,127 UART: Caliptra RT
3,469,380 UART: [state] CFI Enabled
3,577,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,069 UART: [rt]cmd =0x46505344, len=4
3,715,771 >>> mbox cmd response data (8 bytes)
3,715,772 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,715,808 UART: Fatal Error: 0x000E0008
3,716,931 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,217 ready_for_fw is high
1,362,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,606 >>> mbox cmd response: success
2,923,606 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,490 UART:
2,984,506 UART: Running Caliptra FMC ...
2,984,914 UART:
2,984,968 UART: [state] CFI Enabled
2,995,723 UART: [fht] FMC Alias Private Key: 7
3,104,330 UART: [art] Extend RT PCRs Done
3,104,758 UART: [art] Lock RT PCRs Done
3,106,208 UART: [art] Populate DV Done
3,114,325 UART: [fht] FMC Alias Private Key: 7
3,115,417 UART: [art] Derive CDI
3,115,697 UART: [art] Store in in slot 0x4
3,201,056 UART: [art] Derive Key Pair
3,201,416 UART: [art] Store priv key in slot 0x5
3,215,080 UART: [art] Derive Key Pair - Done
3,230,195 UART: [art] Signing Cert with AUTHO
3,230,675 UART: RITY.KEYID = 7
3,245,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,474 UART: [art] PUB.X = B7DB3BA15EDC80E923C3B27E4AA1C176B0E7D1E560C0AD9E41D39801FE301DAAA1719075A5BF0EC29100716CC153C759
3,253,230 UART: [art] PUB.Y = 6BD77A8CB6296175BF19119CE9DC22489EB5F32CA7898DAC99C7E543A5E720739DE02AD38E854B93ED4447DF1991BF81
3,260,188 UART: [art] SIG.R = A437E7E83225D014A957790F6B79C0AA5DA166ED5533D0027F38A15AC9AD6ACA18846B4D5C0E03132E9E7A8CA686CBF7
3,266,956 UART: [art] SIG.S = D1544F01AC2309332299DD4415452503FC067262E0625754B49A9D4F560EFDF70FF6BCCA6F04055F3C8FF00111035602
3,290,676 UART: Caliptra RT
3,290,929 UART: [state] CFI Enabled
3,399,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,857 UART: [rt]cmd =0x46505344, len=4
3,537,905 >>> mbox cmd response data (8 bytes)
3,537,906 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,537,942 UART: Fatal Error: 0x000E0008
3,539,065 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
891,010 UART: [kat] SHA2-256
892,948 UART: [kat] SHA2-384
895,833 UART: [kat] SHA2-512-ACC
897,734 UART: [kat] ECC-384
903,575 UART: [kat] HMAC-384Kdf
908,171 UART: [kat] LMS
1,476,367 UART: [kat] --
1,477,096 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,225 UART: [idev] ++
1,480,393 UART: [idev] CDI.KEYID = 6
1,480,753 UART: [idev] SUBJECT.KEYID = 7
1,481,177 UART: [idev] UDS.KEYID = 0
1,481,522 ready_for_fw is high
1,481,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,251 UART: [idev] Erasing UDS.KEYID = 0
1,505,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,548,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,923 UART: [ldev] --
1,588,438 UART: [fwproc] Waiting for Commands...
1,589,269 UART: [fwproc] Received command 0x46574c44
1,590,060 UART: [fwproc] Received Image of size 114084 bytes
2,884,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,864 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,683 >>> mbox cmd response: success
3,076,683 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,077,713 UART: [afmc] ++
3,077,881 UART: [afmc] CDI.KEYID = 6
3,078,243 UART: [afmc] SUBJECT.KEYID = 7
3,078,668 UART: [afmc] AUTHORITY.KEYID = 5
3,114,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,344 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,034 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,055 UART: [afmc] --
3,158,167 UART: [cold-reset] --
3,159,013 UART: [state] Locking Datavault
3,160,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,906 UART: [state] Locking ICCM
3,161,442 UART: [exit] Launching FMC @ 0x40000130
3,166,771 UART:
3,166,787 UART: Running Caliptra FMC ...
3,167,195 UART:
3,167,338 UART: [state] CFI Enabled
3,177,713 UART: [fht] FMC Alias Private Key: 7
3,284,986 UART: [art] Extend RT PCRs Done
3,285,414 UART: [art] Lock RT PCRs Done
3,287,338 UART: [art] Populate DV Done
3,295,549 UART: [fht] FMC Alias Private Key: 7
3,296,593 UART: [art] Derive CDI
3,296,873 UART: [art] Store in in slot 0x4
3,382,830 UART: [art] Derive Key Pair
3,383,190 UART: [art] Store priv key in slot 0x5
3,396,336 UART: [art] Derive Key Pair - Done
3,411,143 UART: [art] Signing Cert with AUTHO
3,411,623 UART: RITY.KEYID = 7
3,427,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,806 UART: [art] PUB.X = DDBD659B4782FEB4E350BFA50F5E3404C0D5CAC338B917AAB961866960AF54C604BB472C30C13DDC9173558D17D99730
3,434,575 UART: [art] PUB.Y = ACBA74835A962407EAF940153753075C153E2D7B2925CB19A4D6AB1F94AAAC0F9EECFC865C507A8F2BE053518323A635
3,441,524 UART: [art] SIG.R = 3641160821657C69A40D89A270345FBE6210BEC7387138DF4E0494818DE1C6EB1FBE4AB58818C517247A509F96C204EA
3,448,278 UART: [art] SIG.S = 7CE5727F044A8FA394AFCC5D8BB8725A402C7840F59BA89E66586B36AAAAE6444C7AD8392C049EAB9EEE253DE98312FE
3,471,641 UART: Caliptra RT
3,471,986 UART: [state] CFI Enabled
3,578,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,388 UART: [rt]cmd =0x46505344, len=4
3,717,436 >>> mbox cmd response data (8 bytes)
3,717,437 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,717,473 UART: Fatal Error: 0x000E0008
3,718,596 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,993 >>> mbox cmd response: success
2,924,993 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,987,343 UART:
2,987,359 UART: Running Caliptra FMC ...
2,987,767 UART:
2,987,910 UART: [state] CFI Enabled
2,998,921 UART: [fht] FMC Alias Private Key: 7
3,106,898 UART: [art] Extend RT PCRs Done
3,107,326 UART: [art] Lock RT PCRs Done
3,108,788 UART: [art] Populate DV Done
3,116,867 UART: [fht] FMC Alias Private Key: 7
3,117,945 UART: [art] Derive CDI
3,118,225 UART: [art] Store in in slot 0x4
3,203,796 UART: [art] Derive Key Pair
3,204,156 UART: [art] Store priv key in slot 0x5
3,217,512 UART: [art] Derive Key Pair - Done
3,232,194 UART: [art] Signing Cert with AUTHO
3,232,674 UART: RITY.KEYID = 7
3,248,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,883 UART: [art] PUB.X = A557E16F9D126A96B856A2ED9F2E76FF6E61E564580F074B38E2D4370E3CE2DBA2914B6A0648CBD79048CE96ECBE7E97
3,255,653 UART: [art] PUB.Y = 20E46C602E152BC08D07662961FAB7996847C03D700C98644A380C9907D8AC0948BA8F4F37DCCEDCCBD939A53E5AB05E
3,262,596 UART: [art] SIG.R = 895CA547B45F7CD19E15AB7FDDCBCF282F50231898943250A540FDFE560270792B782BACA3DFF52518633AF9BBAA7EFA
3,269,379 UART: [art] SIG.S = 975F48B598847905264303084FF65C3F190EDA3F209448BBEB76BF5EBD802227A6F1519824E98641781B874E485F12A2
3,293,182 UART: Caliptra RT
3,293,527 UART: [state] CFI Enabled
3,401,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,069 UART: [rt]cmd =0x46505344, len=4
3,540,361 >>> mbox cmd response data (8 bytes)
3,540,362 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,398 UART: Fatal Error: 0x000E0008
3,541,521 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
893,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,349 UART: [kat] ++
897,501 UART: [kat] sha1
901,541 UART: [kat] SHA2-256
903,481 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
917,748 UART: [kat] HMAC-384Kdf
922,232 UART: [kat] LMS
1,170,560 UART: [kat] --
1,171,725 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 ready_for_fw is high
1,176,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,289 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,369 UART: [ldev] --
1,282,872 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,178 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,605 >>> mbox cmd response: success
2,771,605 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,772,791 UART: [afmc] ++
2,772,959 UART: [afmc] CDI.KEYID = 6
2,773,321 UART: [afmc] SUBJECT.KEYID = 7
2,773,746 UART: [afmc] AUTHORITY.KEYID = 5
2,809,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,702 UART: [afmc] --
2,852,732 UART: [cold-reset] --
2,853,660 UART: [state] Locking Datavault
2,854,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,217 UART: [state] Locking ICCM
2,855,837 UART: [exit] Launching FMC @ 0x40000130
2,861,166 UART:
2,861,182 UART: Running Caliptra FMC ...
2,861,590 UART:
2,861,644 UART: [state] CFI Enabled
2,872,175 UART: [fht] FMC Alias Private Key: 7
2,980,088 UART: [art] Extend RT PCRs Done
2,980,516 UART: [art] Lock RT PCRs Done
2,981,890 UART: [art] Populate DV Done
2,990,175 UART: [fht] FMC Alias Private Key: 7
2,991,191 UART: [art] Derive CDI
2,991,471 UART: [art] Store in in slot 0x4
3,077,186 UART: [art] Derive Key Pair
3,077,546 UART: [art] Store priv key in slot 0x5
3,090,538 UART: [art] Derive Key Pair - Done
3,105,080 UART: [art] Signing Cert with AUTHO
3,105,560 UART: RITY.KEYID = 7
3,120,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,309 UART: [art] PUB.X = C0BF90DED041D1175610F4A586BA25D4558A0035BB2B806C515431DF97CC76A898FC542DD64674265F51942153364C1F
3,128,053 UART: [art] PUB.Y = 4707AE523BD562CBA3BD2C52ACCA1416FC46FF675472E944B3E4927232E36ECD90D465416F7067D6FAB26DC108DE40B8
3,135,007 UART: [art] SIG.R = 6A3ADC461AC096A3290DDBEA60F7875263A27FF76E34D4E7FC8EC38D3703540803591299E52E49EB521D505D06150CFD
3,141,763 UART: [art] SIG.S = D6B6FF687665883C73441D904DDA2143A3B94F5BB923E6F0811F927A8521DF80B7F393A83F6FDD81D4D90A6983DF534F
3,164,791 UART: Caliptra RT
3,165,044 UART: [state] CFI Enabled
3,272,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,895 UART: [rt]cmd =0x46505344, len=4
3,411,269 >>> mbox cmd response data (8 bytes)
3,411,270 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,411,306 UART: Fatal Error: 0x000E0008
3,412,429 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 ready_for_fw is high
1,060,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,596 >>> mbox cmd response: success
2,620,596 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,681,812 UART:
2,681,828 UART: Running Caliptra FMC ...
2,682,236 UART:
2,682,290 UART: [state] CFI Enabled
2,692,895 UART: [fht] FMC Alias Private Key: 7
2,801,132 UART: [art] Extend RT PCRs Done
2,801,560 UART: [art] Lock RT PCRs Done
2,803,044 UART: [art] Populate DV Done
2,811,253 UART: [fht] FMC Alias Private Key: 7
2,812,289 UART: [art] Derive CDI
2,812,569 UART: [art] Store in in slot 0x4
2,898,388 UART: [art] Derive Key Pair
2,898,748 UART: [art] Store priv key in slot 0x5
2,911,874 UART: [art] Derive Key Pair - Done
2,926,643 UART: [art] Signing Cert with AUTHO
2,927,123 UART: RITY.KEYID = 7
2,942,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,938 UART: [art] PUB.X = 010685185EF0BC15F7F7FB88AF0FB085332C3E05CE1F9F2CC36B271D35852CCF637ECAD78C349C2E9431DC8928EC6B35
2,949,708 UART: [art] PUB.Y = 3F27B8CB71885EE082FBDCC1C1E2469AC5199A8D8FC3F2622632308378FA481D087E1EDD6E40170545966F59B3EF8C95
2,956,656 UART: [art] SIG.R = 2789EB9CF6612070FEB0E2E6B4A1560D9EF2EFF9CB72A6776C8635096D5E37A84383A970A64211483F0784D36E025841
2,963,410 UART: [art] SIG.S = 837D578E962F13C210684CA3DD9D7FEF4EE912C0B152A03BDF7986A5A018DA7153E2BB5F0BD8B2196311BE85935E6B49
2,986,898 UART: Caliptra RT
2,987,151 UART: [state] CFI Enabled
3,095,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,554 UART: [rt]cmd =0x46505344, len=4
3,233,812 >>> mbox cmd response data (8 bytes)
3,233,813 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,233,849 UART: Fatal Error: 0x000E0008
3,234,972 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,201 UART: [kat] HMAC-384Kdf
922,757 UART: [kat] LMS
1,171,085 UART: [kat] --
1,171,990 UART: [cold-reset] ++
1,172,434 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 ready_for_fw is high
1,176,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,201,294 UART: [idev] Sha1 KeyId Algorithm
1,209,812 UART: [idev] --
1,210,818 UART: [ldev] ++
1,210,986 UART: [ldev] CDI.KEYID = 6
1,211,349 UART: [ldev] SUBJECT.KEYID = 5
1,211,775 UART: [ldev] AUTHORITY.KEYID = 7
1,212,238 UART: [ldev] FE.KEYID = 1
1,217,586 UART: [ldev] Erasing FE.KEYID = 1
1,244,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,018 UART: [ldev] --
1,283,409 UART: [fwproc] Wait for Commands...
1,284,009 UART: [fwproc] Recv command 0x46574c44
1,284,737 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,632 >>> mbox cmd response: success
2,771,632 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,772,874 UART: [afmc] ++
2,773,042 UART: [afmc] CDI.KEYID = 6
2,773,404 UART: [afmc] SUBJECT.KEYID = 7
2,773,829 UART: [afmc] AUTHORITY.KEYID = 5
2,809,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,151 UART: [afmc] --
2,853,257 UART: [cold-reset] --
2,854,411 UART: [state] Locking Datavault
2,855,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,018 UART: [state] Locking ICCM
2,856,582 UART: [exit] Launching FMC @ 0x40000130
2,861,911 UART:
2,861,927 UART: Running Caliptra FMC ...
2,862,335 UART:
2,862,478 UART: [state] CFI Enabled
2,873,061 UART: [fht] FMC Alias Private Key: 7
2,981,014 UART: [art] Extend RT PCRs Done
2,981,442 UART: [art] Lock RT PCRs Done
2,983,188 UART: [art] Populate DV Done
2,991,363 UART: [fht] FMC Alias Private Key: 7
2,992,427 UART: [art] Derive CDI
2,992,707 UART: [art] Store in in slot 0x4
3,078,210 UART: [art] Derive Key Pair
3,078,570 UART: [art] Store priv key in slot 0x5
3,091,342 UART: [art] Derive Key Pair - Done
3,106,187 UART: [art] Signing Cert with AUTHO
3,106,667 UART: RITY.KEYID = 7
3,121,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,470 UART: [art] PUB.X = 98779C4B1560711487DE81A3AF135F6063B51EB5CF3357DBEA1046EE0EE9A5D700CAE9D51F695A50BAA27675100C78F3
3,129,218 UART: [art] PUB.Y = 79DBCA13B6AD19AF1476AECBF7554E1C808FB373AD8336A9C8C9CC20905D09B5B3C998B01D1735C785D492E0910A70D5
3,136,172 UART: [art] SIG.R = C6F2643BB37200F917F0E8B08F252D667346840408B6C48C083164BF6FC8A9AA4C9AB9C6E2FA58123BF135FC8B5FBB92
3,142,919 UART: [art] SIG.S = 102323E443C8DDC7574D26547D52E5DE1054F273C58F333B3410DA08576F1E51833D1AE6AC6E084FFBC16C8957DB251D
3,166,876 UART: Caliptra RT
3,167,221 UART: [state] CFI Enabled
3,274,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,162 UART: [rt]cmd =0x46505344, len=4
3,413,706 >>> mbox cmd response data (8 bytes)
3,413,707 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,413,743 UART: Fatal Error: 0x000E0008
3,414,866 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,654 ready_for_fw is high
1,060,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,963 >>> mbox cmd response: success
2,623,963 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,686,083 UART:
2,686,099 UART: Running Caliptra FMC ...
2,686,507 UART:
2,686,650 UART: [state] CFI Enabled
2,697,047 UART: [fht] FMC Alias Private Key: 7
2,805,068 UART: [art] Extend RT PCRs Done
2,805,496 UART: [art] Lock RT PCRs Done
2,807,060 UART: [art] Populate DV Done
2,815,377 UART: [fht] FMC Alias Private Key: 7
2,816,479 UART: [art] Derive CDI
2,816,759 UART: [art] Store in in slot 0x4
2,902,604 UART: [art] Derive Key Pair
2,902,964 UART: [art] Store priv key in slot 0x5
2,916,780 UART: [art] Derive Key Pair - Done
2,931,476 UART: [art] Signing Cert with AUTHO
2,931,956 UART: RITY.KEYID = 7
2,947,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,059 UART: [art] PUB.X = 5657E8981866962E007DEE340B9888F429A37BA0599A9E42525FAB3ED82A2F5C255010131B2F3354C796B213B428A54C
2,954,796 UART: [art] PUB.Y = E2F6806EBDDAD6C57B529E63A7CEBD288875B2BC2D875A97B9621FC63C6538664FA1D7FEBCA0988B8B25A62C430E1BB3
2,961,761 UART: [art] SIG.R = 215D88371F152D481457397349FF7D50C2EB40BA5C5AA5956B406C28C2AE5571E03C55306E44A157B0AB25E2EB3EBBC0
2,968,535 UART: [art] SIG.S = 8C76DE1D047D3CE33AEF1E23556318F8A6027EA32FC8AE7E42D1EE8922C3825F1C0835AAD3D4F027386FB68D3886F964
2,992,267 UART: Caliptra RT
2,992,612 UART: [state] CFI Enabled
3,099,727 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,371 UART: [rt]cmd =0x46505344, len=4
3,238,311 >>> mbox cmd response data (8 bytes)
3,238,312 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,238,348 UART: Fatal Error: 0x000E0008
3,239,471 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,927 UART: [idev] ++
1,173,095 UART: [idev] CDI.KEYID = 6
1,173,456 UART: [idev] SUBJECT.KEYID = 7
1,173,881 UART: [idev] UDS.KEYID = 0
1,174,227 ready_for_fw is high
1,174,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,899 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,968 UART: [ldev] ++
1,209,136 UART: [ldev] CDI.KEYID = 6
1,209,500 UART: [ldev] SUBJECT.KEYID = 5
1,209,927 UART: [ldev] AUTHORITY.KEYID = 7
1,210,390 UART: [ldev] FE.KEYID = 1
1,215,656 UART: [ldev] Erasing FE.KEYID = 1
1,242,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,281,931 UART: [fwproc] Recv command 0x46574c44
1,282,664 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,583 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,079 >>> mbox cmd response: success
2,770,079 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,771,222 UART: [afmc] ++
2,771,390 UART: [afmc] CDI.KEYID = 6
2,771,753 UART: [afmc] SUBJECT.KEYID = 7
2,772,179 UART: [afmc] AUTHORITY.KEYID = 5
2,807,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,399 UART: [afmc] --
2,851,359 UART: [cold-reset] --
2,852,307 UART: [state] Locking Datavault
2,853,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,304 UART: [state] Locking ICCM
2,854,884 UART: [exit] Launching FMC @ 0x40000130
2,860,213 UART:
2,860,229 UART: Running Caliptra FMC ...
2,860,637 UART:
2,860,691 UART: [state] CFI Enabled
2,871,314 UART: [fht] FMC Alias Private Key: 7
2,979,277 UART: [art] Extend RT PCRs Done
2,979,705 UART: [art] Lock RT PCRs Done
2,981,353 UART: [art] Populate DV Done
2,989,648 UART: [fht] FMC Alias Private Key: 7
2,990,800 UART: [art] Derive CDI
2,991,080 UART: [art] Store in in slot 0x4
3,076,827 UART: [art] Derive Key Pair
3,077,187 UART: [art] Store priv key in slot 0x5
3,090,137 UART: [art] Derive Key Pair - Done
3,104,801 UART: [art] Signing Cert with AUTHO
3,105,281 UART: RITY.KEYID = 7
3,120,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,446 UART: [art] PUB.X = 795F83C05B3F41270EF2A06C392DA52A658B19AEAD0F46066B6F213B3965A317DCD9295C527DBF8BE91EC3A33E7A40EC
3,128,219 UART: [art] PUB.Y = 23208FCEA610CB20FF0A346F9400CE16FA67F3DE61237971FDC2B1B0DB944F578AF30BEDE8BE20D0EF5636A8C4EDFBAD
3,135,167 UART: [art] SIG.R = C282D2FEF75F602C0AD1CE681F5FBFCE18BB53E070D3A537CCFAE7060D135A3F7BC9D3F0D2C5A887A23715B1A44ECE86
3,141,952 UART: [art] SIG.S = 252D7C091A2C340488C72CEBEAEE8E4F7F52BEE7893DC53259EFC439D02DC3003E6DEE916771C67DE7596988CB932D5D
3,165,397 UART: Caliptra RT
3,165,650 UART: [state] CFI Enabled
3,272,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,347 UART: [rt]cmd =0x46505344, len=4
3,411,803 >>> mbox cmd response data (8 bytes)
3,411,804 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,411,840 UART: Fatal Error: 0x000E0008
3,412,963 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,136 ready_for_fw is high
1,055,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,649 >>> mbox cmd response: success
2,618,649 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,681,291 UART:
2,681,307 UART: Running Caliptra FMC ...
2,681,715 UART:
2,681,769 UART: [state] CFI Enabled
2,692,082 UART: [fht] FMC Alias Private Key: 7
2,799,689 UART: [art] Extend RT PCRs Done
2,800,117 UART: [art] Lock RT PCRs Done
2,801,729 UART: [art] Populate DV Done
2,809,762 UART: [fht] FMC Alias Private Key: 7
2,810,692 UART: [art] Derive CDI
2,810,972 UART: [art] Store in in slot 0x4
2,896,753 UART: [art] Derive Key Pair
2,897,113 UART: [art] Store priv key in slot 0x5
2,910,303 UART: [art] Derive Key Pair - Done
2,925,350 UART: [art] Signing Cert with AUTHO
2,925,830 UART: RITY.KEYID = 7
2,941,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,205 UART: [art] PUB.X = 115E3BC80A8B0B76218E5AEC78201AAE92D3A985F1E697CEA766CC17A256197755ECBC1F6B7904EF52D24B8AB97EB769
2,948,978 UART: [art] PUB.Y = 02774259C388D75DBC8741F5367FA7667A98D28ED34BFB1E2023271E38861BF3B3450190A7C8A9A8D6DC9846C30B9938
2,955,915 UART: [art] SIG.R = 4A32E44ABDBC51562C9D1DABBFAE872BC2BDD2C5C152A169D8E5EAEF43AE52677D6C126AB521E0679A035965C6F61358
2,962,700 UART: [art] SIG.S = B17F276E96F064AFD10C32189019AC750200CB6090FF19A3DEAFE0D095825DDD0E35053A7930FCFAA1E60FA8AB6DF5BC
2,986,362 UART: Caliptra RT
2,986,615 UART: [state] CFI Enabled
3,093,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,576 UART: [rt]cmd =0x46505344, len=4
3,231,372 >>> mbox cmd response data (8 bytes)
3,231,373 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,231,409 UART: Fatal Error: 0x000E0008
3,232,532 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,458 UART: [kat] SHA2-256
901,398 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,435 UART: [kat] LMS
1,168,747 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,174,310 ready_for_fw is high
1,174,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,824 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,437 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,567 UART: [ldev] --
1,281,971 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,278 >>> mbox cmd response: success
2,772,278 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,773,409 UART: [afmc] ++
2,773,577 UART: [afmc] CDI.KEYID = 6
2,773,940 UART: [afmc] SUBJECT.KEYID = 7
2,774,366 UART: [afmc] AUTHORITY.KEYID = 5
2,809,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,422 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,924 UART: [afmc] --
2,852,876 UART: [cold-reset] --
2,854,000 UART: [state] Locking Datavault
2,855,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,081 UART: [state] Locking ICCM
2,856,731 UART: [exit] Launching FMC @ 0x40000130
2,862,060 UART:
2,862,076 UART: Running Caliptra FMC ...
2,862,484 UART:
2,862,627 UART: [state] CFI Enabled
2,872,886 UART: [fht] FMC Alias Private Key: 7
2,979,521 UART: [art] Extend RT PCRs Done
2,979,949 UART: [art] Lock RT PCRs Done
2,981,685 UART: [art] Populate DV Done
2,989,672 UART: [fht] FMC Alias Private Key: 7
2,990,614 UART: [art] Derive CDI
2,990,894 UART: [art] Store in in slot 0x4
3,076,657 UART: [art] Derive Key Pair
3,077,017 UART: [art] Store priv key in slot 0x5
3,089,683 UART: [art] Derive Key Pair - Done
3,104,515 UART: [art] Signing Cert with AUTHO
3,104,995 UART: RITY.KEYID = 7
3,120,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,250 UART: [art] PUB.X = 1A4DD901115017A9373AAADDA44F6FC3E34C0AB8B35BAC382C3DA4451F7E45779AB8E4637DE1965E051E99399A793AD6
3,128,021 UART: [art] PUB.Y = F754B0DB2B090C77056E36DFE06D41092165BD10ECD83522A89AE23D4563BE0FDA7005986F60C4487C09DF099A8E869A
3,134,951 UART: [art] SIG.R = 4BCD9612553A41051359E5CB5D59A47C1A129E5841D63C6B0AFAE64003EA7CC56B730B82CA45DCB96201DCEA023A088B
3,141,710 UART: [art] SIG.S = B336DF0430B9498D03D3D35E93A382AAD8282F85EAB4BF09AF6992025A92D6B71CB2628A9C7D25FB0A1CFE80228CA6DD
3,164,708 UART: Caliptra RT
3,165,053 UART: [state] CFI Enabled
3,273,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,326 UART: [rt]cmd =0x46505344, len=4
3,411,462 >>> mbox cmd response data (8 bytes)
3,411,463 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,411,499 UART: Fatal Error: 0x000E0008
3,412,622 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,545 ready_for_fw is high
1,056,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,988 >>> mbox cmd response: success
2,618,988 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,681,974 UART:
2,681,990 UART: Running Caliptra FMC ...
2,682,398 UART:
2,682,541 UART: [state] CFI Enabled
2,693,366 UART: [fht] FMC Alias Private Key: 7
2,801,177 UART: [art] Extend RT PCRs Done
2,801,605 UART: [art] Lock RT PCRs Done
2,802,793 UART: [art] Populate DV Done
2,810,994 UART: [fht] FMC Alias Private Key: 7
2,812,036 UART: [art] Derive CDI
2,812,316 UART: [art] Store in in slot 0x4
2,898,147 UART: [art] Derive Key Pair
2,898,507 UART: [art] Store priv key in slot 0x5
2,912,043 UART: [art] Derive Key Pair - Done
2,927,048 UART: [art] Signing Cert with AUTHO
2,927,528 UART: RITY.KEYID = 7
2,942,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,333 UART: [art] PUB.X = B7DCC6292944B7C9016641E59C61F414B4BED2DA876E7FEDA469C2615D4B19CC75A854D676863765F6AB302822ED8BAB
2,950,108 UART: [art] PUB.Y = 4423FAAEB9A7EE4CA1CC8528595D9A946B31A5F1D131F79B941082629D508FC7786A7BE2107264533CB6A0858A0FACC9
2,957,061 UART: [art] SIG.R = A0E1A8CC634E4DA1DFB131C016A8572C6F926846A614A3253171925040546D97AF1F1A1FAC0205D3DA7C24F2FFE319C3
2,963,831 UART: [art] SIG.S = 95F4D337ECE859BDF0DBF28B8660EB4262214463E7C155E9A8EC36A3F03FF9790FBB3AD1636264213787779B8CE8CA5C
2,987,583 UART: Caliptra RT
2,987,928 UART: [state] CFI Enabled
3,095,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,440 UART: [rt]cmd =0x46505344, len=4
3,234,886 >>> mbox cmd response data (8 bytes)
3,234,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,234,923 UART: Fatal Error: 0x000E0008
3,236,046 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,102 UART:
192,477 UART: Running Caliptra ROM ...
193,632 UART:
193,781 UART: [state] CFI Enabled
266,729 UART: [state] LifecycleState = Unprovisioned
268,648 UART: [state] DebugLocked = No
270,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,120 UART: [kat] SHA2-256
444,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,346 UART: [kat] ++
455,821 UART: [kat] sha1
466,144 UART: [kat] SHA2-256
468,841 UART: [kat] SHA2-384
475,120 UART: [kat] SHA2-512-ACC
477,484 UART: [kat] ECC-384
2,767,766 UART: [kat] HMAC-384Kdf
2,798,414 UART: [kat] LMS
3,988,717 UART: [kat] --
3,993,595 UART: [cold-reset] ++
3,995,890 UART: [fht] Storing FHT @ 0x50003400
4,005,950 UART: [idev] ++
4,006,521 UART: [idev] CDI.KEYID = 6
4,007,437 UART: [idev] SUBJECT.KEYID = 7
4,008,684 UART: [idev] UDS.KEYID = 0
4,009,673 ready_for_fw is high
4,009,866 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,923 UART: [idev] Erasing UDS.KEYID = 0
7,340,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,265 UART: [idev] --
7,366,172 UART: [ldev] ++
7,366,797 UART: [ldev] CDI.KEYID = 6
7,367,714 UART: [ldev] SUBJECT.KEYID = 5
7,368,924 UART: [ldev] AUTHORITY.KEYID = 7
7,370,215 UART: [ldev] FE.KEYID = 1
7,401,079 UART: [ldev] Erasing FE.KEYID = 1
10,733,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,754 UART: [ldev] --
13,092,155 UART: [fwproc] Waiting for Commands...
13,094,468 UART: [fwproc] Received command 0x46574c44
13,096,649 UART: [fwproc] Received Image of size 113760 bytes
17,148,679 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,227,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,296,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,612,313 >>> mbox cmd response: success
17,612,843 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,617,350 UART: [afmc] ++
17,618,020 UART: [afmc] CDI.KEYID = 6
17,618,909 UART: [afmc] SUBJECT.KEYID = 7
17,620,123 UART: [afmc] AUTHORITY.KEYID = 5
20,987,848 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,092 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,466 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,297 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,738 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,534 UART: [afmc] --
23,354,865 UART: [cold-reset] --
23,358,936 UART: [state] Locking Datavault
23,365,590 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,342 UART: [state] Locking ICCM
23,368,737 UART: [exit] Launching FMC @ 0x40000130
23,377,135 UART:
23,377,388 UART: Running Caliptra FMC ...
23,378,496 UART:
23,378,661 UART: [state] CFI Enabled
23,446,932 UART: [fht] FMC Alias Private Key: 7
25,785,357 UART: [art] Extend RT PCRs Done
25,786,597 UART: [art] Lock RT PCRs Done
25,788,055 UART: [art] Populate DV Done
25,793,578 UART: [fht] FMC Alias Private Key: 7
25,795,221 UART: [art] Derive CDI
25,796,031 UART: [art] Store in in slot 0x4
25,855,423 UART: [art] Derive Key Pair
25,856,462 UART: [art] Store priv key in slot 0x5
29,149,051 UART: [art] Derive Key Pair - Done
29,162,321 UART: [art] Signing Cert with AUTHO
29,163,623 UART: RITY.KEYID = 7
31,452,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,742 UART: [art] PUB.X = 45D6A2B6BAED5CC2F7746A7A23C81C0A17487B0AA5D34D3621F2D6B9772E0261CBEA11D11AD20BBE0BB663DFCCC33214
31,461,050 UART: [art] PUB.Y = 0D891399EFB35A9AA3FA000EB6D6BCF63F9994B0D9C670E6534BE50C6678EBA0AD69C9762947AC4A3443C40D8452A248
31,468,237 UART: [art] SIG.R = C1A98EA6A7D6428CB8D5873B2DCF1092BD014FF7A2766F70A74AEBF07369243DAD6A2B32F02B0DA9E4F1DD8276D1516D
31,475,624 UART: [art] SIG.S = EF2CBA43AA3BED7D97908294F47E78587958E6ECB2B5F35EB52CC4CF9001E097F1B688B554AFBEBC5029B98BB7CE671C
32,781,516 UART: Caliptra RT
32,782,242 UART: [state] CFI Enabled
32,943,291 UART: [rt] RT listening for mailbox commands...
32,974,442 UART: [rt]cmd =0x46505652, len=4
32,975,689 UART: [rt] FIPS Version
32,977,010 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,805,299 ready_for_fw is high
3,805,711 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,843,459 >>> mbox cmd response: success
17,844,055 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,544,768 UART:
23,545,154 UART: Running Caliptra FMC ...
23,546,287 UART:
23,546,445 UART: [state] CFI Enabled
23,617,093 UART: [fht] FMC Alias Private Key: 7
25,955,111 UART: [art] Extend RT PCRs Done
25,956,330 UART: [art] Lock RT PCRs Done
25,957,954 UART: [art] Populate DV Done
25,963,748 UART: [fht] FMC Alias Private Key: 7
25,965,245 UART: [art] Derive CDI
25,966,012 UART: [art] Store in in slot 0x4
26,026,214 UART: [art] Derive Key Pair
26,027,252 UART: [art] Store priv key in slot 0x5
29,320,287 UART: [art] Derive Key Pair - Done
29,333,122 UART: [art] Signing Cert with AUTHO
29,334,447 UART: RITY.KEYID = 7
31,621,346 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,858 UART: [art] PUB.X = E0990C84E3178A1762CB745C5C5997A27A1E14631D51EABDCA1043F5765151235CE22343C44317199B812D56CC59FFF4
31,630,067 UART: [art] PUB.Y = 76459600D2BEE5EC97816F2B43B2FAEDD6B2001C01C047C9EF2E9C3D8BCAD7F304990B26277C02324EAB3B404C846D1D
31,637,306 UART: [art] SIG.R = FD4BD0D28D1C2024E60BD8BB088D70C969EF19AD0BA2EE4ED4FE6206B63D87F9DDE1781AA21A460B23AE4DE1131BB0F2
31,644,755 UART: [art] SIG.S = 2FB20D985F20ADCEDA971E3D405A68CBFDD70DA387D86568DAA10729D4244955F607774EAB7C2E0579FEF16C4D010A79
32,949,515 UART: Caliptra RT
32,950,232 UART: [state] CFI Enabled
33,110,946 UART: [rt] RT listening for mailbox commands...
33,142,458 UART: [rt]cmd =0x46505652, len=4
33,143,731 UART: [rt] FIPS Version
33,144,790 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,005 writing to cptra_bootfsm_go
193,148 UART:
193,509 UART: Running Caliptra ROM ...
194,718 UART:
604,161 UART: [state] CFI Enabled
617,777 UART: [state] LifecycleState = Unprovisioned
619,679 UART: [state] DebugLocked = No
622,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,193 UART: [kat] SHA2-256
796,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,479 UART: [kat] ++
808,004 UART: [kat] sha1
819,311 UART: [kat] SHA2-256
822,030 UART: [kat] SHA2-384
827,592 UART: [kat] SHA2-512-ACC
829,951 UART: [kat] ECC-384
3,112,114 UART: [kat] HMAC-384Kdf
3,124,410 UART: [kat] LMS
4,314,549 UART: [kat] --
4,318,518 UART: [cold-reset] ++
4,320,173 UART: [fht] Storing FHT @ 0x50003400
4,331,374 UART: [idev] ++
4,332,006 UART: [idev] CDI.KEYID = 6
4,332,916 UART: [idev] SUBJECT.KEYID = 7
4,334,155 UART: [idev] UDS.KEYID = 0
4,335,192 ready_for_fw is high
4,335,387 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,265 UART: [idev] Erasing UDS.KEYID = 0
7,625,439 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,788 UART: [idev] --
7,652,315 UART: [ldev] ++
7,652,932 UART: [ldev] CDI.KEYID = 6
7,653,889 UART: [ldev] SUBJECT.KEYID = 5
7,655,209 UART: [ldev] AUTHORITY.KEYID = 7
7,656,394 UART: [ldev] FE.KEYID = 1
7,666,569 UART: [ldev] Erasing FE.KEYID = 1
10,956,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,947 UART: [ldev] --
13,316,502 UART: [fwproc] Waiting for Commands...
13,319,076 UART: [fwproc] Received command 0x46574c44
13,321,306 UART: [fwproc] Received Image of size 113760 bytes
17,364,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,284 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,199 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,820,380 >>> mbox cmd response: success
17,820,891 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,823,774 UART: [afmc] ++
17,824,374 UART: [afmc] CDI.KEYID = 6
17,825,249 UART: [afmc] SUBJECT.KEYID = 7
17,826,518 UART: [afmc] AUTHORITY.KEYID = 5
21,137,364 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,430,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,015 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,447,424 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,462,235 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,476,667 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,497,522 UART: [afmc] --
23,501,955 UART: [cold-reset] --
23,505,760 UART: [state] Locking Datavault
23,512,085 UART: [state] Locking PCR0, PCR1 and PCR31
23,513,850 UART: [state] Locking ICCM
23,515,804 UART: [exit] Launching FMC @ 0x40000130
23,524,191 UART:
23,524,440 UART: Running Caliptra FMC ...
23,525,460 UART:
23,525,601 UART: [state] CFI Enabled
23,533,538 UART: [fht] FMC Alias Private Key: 7
25,863,989 UART: [art] Extend RT PCRs Done
25,865,207 UART: [art] Lock RT PCRs Done
25,867,176 UART: [art] Populate DV Done
25,872,476 UART: [fht] FMC Alias Private Key: 7
25,874,171 UART: [art] Derive CDI
25,874,905 UART: [art] Store in in slot 0x4
25,917,382 UART: [art] Derive Key Pair
25,918,418 UART: [art] Store priv key in slot 0x5
29,160,788 UART: [art] Derive Key Pair - Done
29,174,010 UART: [art] Signing Cert with AUTHO
29,175,510 UART: RITY.KEYID = 7
31,454,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,059 UART: [art] PUB.X = 7C9BABA8276638BF4F6CA60F9044AE8C2550099B885AFB2AA2BD04704DB5534F31EE6D8E98996DEF9C88271CB8257A26
31,463,282 UART: [art] PUB.Y = 0F33726B98491F686C621A35B21EB802EA052C8D011AEDE3FAE6486092543FC585E3DA41F4E5ABBE3CCB37A1C63E572D
31,470,538 UART: [art] SIG.R = A2217117B8E75458385A14E07A5979F4A71C3FC042C1E02D9B9084E7A99F2E045983D88F6DABBD828BCBFD5BF9B6E3FA
31,477,900 UART: [art] SIG.S = B4F8DC145C13CE7A7B7C76835035643D2E4A5ED17D85AE2EDA9D9980C33C91737AF598BF3731B38600A415842AD1FEA8
32,782,902 UART: Caliptra RT
32,783,599 UART: [state] CFI Enabled
32,902,261 UART: [rt] RT listening for mailbox commands...
32,933,907 UART: [rt]cmd =0x46505652, len=4
32,935,354 UART: [rt] FIPS Version
32,936,410 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
4,128,843 ready_for_fw is high
4,129,510 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,049,431 >>> mbox cmd response: success
18,050,081 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,694,047 UART:
23,694,430 UART: Running Caliptra FMC ...
23,695,649 UART:
23,695,823 UART: [state] CFI Enabled
23,703,555 UART: [fht] FMC Alias Private Key: 7
26,033,914 UART: [art] Extend RT PCRs Done
26,035,135 UART: [art] Lock RT PCRs Done
26,036,661 UART: [art] Populate DV Done
26,042,239 UART: [fht] FMC Alias Private Key: 7
26,043,895 UART: [art] Derive CDI
26,044,713 UART: [art] Store in in slot 0x4
26,087,413 UART: [art] Derive Key Pair
26,088,409 UART: [art] Store priv key in slot 0x5
29,330,492 UART: [art] Derive Key Pair - Done
29,343,407 UART: [art] Signing Cert with AUTHO
29,344,713 UART: RITY.KEYID = 7
31,624,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,025 UART: [art] PUB.X = CFF595F20B184F2B2BBD1101BCD98F41DB984E9F52B0799023BF02E53F481F7ECE49CE34E2B0DA93DCC8643646860D27
31,633,283 UART: [art] PUB.Y = A9CE6624218313C9D3767F7BC557CDFBF0DF0B76A0C2CEBE8FA1CA236F7EA2414AA101B05428773AE2458707DDF034F0
31,640,559 UART: [art] SIG.R = C6CC1B95A570896DEF4EB8EBDD8C1075B11D965CA07309046695550790C894A5F27D3D2BF8474BC5999DA3DE5E02A77D
31,647,898 UART: [art] SIG.S = E35F87174034FCE1A5864B11E72E0BC1F7E78261321B5C4FE2FF2C04C047EDC0C3BD022D35740E8BD4D01F32A3E10748
32,953,059 UART: Caliptra RT
32,953,781 UART: [state] CFI Enabled
33,071,438 UART: [rt] RT listening for mailbox commands...
33,102,590 UART: [rt]cmd =0x46505652, len=4
33,103,888 UART: [rt] FIPS Version
33,105,107 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
192,541 UART:
192,928 UART: Running Caliptra ROM ...
194,122 UART:
194,274 UART: [state] CFI Enabled
264,518 UART: [state] LifecycleState = Unprovisioned
266,356 UART: [state] DebugLocked = No
268,597 UART: [state] WD Timer not started. Device not locked for debugging
272,927 UART: [kat] SHA2-256
452,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,630 UART: [kat] ++
464,169 UART: [kat] sha1
475,898 UART: [kat] SHA2-256
478,963 UART: [kat] SHA2-384
484,323 UART: [kat] SHA2-512-ACC
487,265 UART: [kat] ECC-384
2,948,359 UART: [kat] HMAC-384Kdf
2,972,039 UART: [kat] LMS
3,501,470 UART: [kat] --
3,505,961 UART: [cold-reset] ++
3,507,967 UART: [fht] FHT @ 0x50003400
3,519,860 UART: [idev] ++
3,520,420 UART: [idev] CDI.KEYID = 6
3,521,447 UART: [idev] SUBJECT.KEYID = 7
3,522,548 UART: [idev] UDS.KEYID = 0
3,523,591 ready_for_fw is high
3,523,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,280 UART: [idev] Erasing UDS.KEYID = 0
6,029,252 UART: [idev] Sha1 KeyId Algorithm
6,050,581 UART: [idev] --
6,054,629 UART: [ldev] ++
6,055,210 UART: [ldev] CDI.KEYID = 6
6,056,138 UART: [ldev] SUBJECT.KEYID = 5
6,057,315 UART: [ldev] AUTHORITY.KEYID = 7
6,058,543 UART: [ldev] FE.KEYID = 1
6,100,403 UART: [ldev] Erasing FE.KEYID = 1
8,604,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,966 UART: [ldev] --
10,413,448 UART: [fwproc] Wait for Commands...
10,416,620 UART: [fwproc] Recv command 0x46574c44
10,418,708 UART: [fwproc] Recv'd Img size: 114084 bytes
13,817,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,520 >>> mbox cmd response: success
14,276,064 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,279,384 UART: [afmc] ++
14,279,966 UART: [afmc] CDI.KEYID = 6
14,280,876 UART: [afmc] SUBJECT.KEYID = 7
14,282,031 UART: [afmc] AUTHORITY.KEYID = 5
16,826,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,470 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,904 UART: [afmc] --
18,625,235 UART: [cold-reset] --
18,628,417 UART: [state] Locking Datavault
18,635,072 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,718 UART: [state] Locking ICCM
18,638,161 UART: [exit] Launching FMC @ 0x40000130
18,646,554 UART:
18,646,791 UART: Running Caliptra FMC ...
18,647,888 UART:
18,648,040 UART: [state] CFI Enabled
18,707,374 UART: [fht] FMC Alias Private Key: 7
20,471,110 UART: [art] Extend RT PCRs Done
20,472,328 UART: [art] Lock RT PCRs Done
20,474,193 UART: [art] Populate DV Done
20,479,438 UART: [fht] FMC Alias Private Key: 7
20,480,917 UART: [art] Derive CDI
20,481,644 UART: [art] Store in in slot 0x4
20,540,002 UART: [art] Derive Key Pair
20,541,069 UART: [art] Store priv key in slot 0x5
23,003,812 UART: [art] Derive Key Pair - Done
23,016,860 UART: [art] Signing Cert with AUTHO
23,018,197 UART: RITY.KEYID = 7
24,729,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,192 UART: [art] PUB.X = 7A1E89F4AB294390C3D1569629C17A70650318F999B79CC36EDFA6786836C27AE46281A74B9A91D7C3FA96CB148E42CB
24,738,454 UART: [art] PUB.Y = 5B10CA542C462659EE8FFBA06A3E3461F1D542355F46A08687B19F716FABBD0767B7581DBDA145CE1AFF7F2A0F13714D
24,745,715 UART: [art] SIG.R = 036F1CF0A8DF280A692C322B15E0DAB428E5CBF680B4DB5BCC730C6D3675D3C17D28AF8882F2E0F02959B07248D2B9F4
24,753,133 UART: [art] SIG.S = 67C23A97EA71CB74550A545517865E56E9E9020801D107F9B9BD4F74311C3DA05CAB22DFD68A864691117A0BB42CD665
25,732,126 UART: Caliptra RT
25,732,838 UART: [state] CFI Enabled
25,897,562 UART: [rt] RT listening for mailbox commands...
25,928,871 UART: [rt]cmd =0x46505652, len=4
25,930,115 UART: [rt] FIPS Version
25,931,490 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,358,881 ready_for_fw is high
3,359,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,778 >>> mbox cmd response: success
14,038,427 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,322,198 UART:
18,322,601 UART: Running Caliptra FMC ...
18,323,707 UART:
18,323,857 UART: [state] CFI Enabled
18,388,797 UART: [fht] FMC Alias Private Key: 7
20,152,419 UART: [art] Extend RT PCRs Done
20,153,647 UART: [art] Lock RT PCRs Done
20,155,679 UART: [art] Populate DV Done
20,161,310 UART: [fht] FMC Alias Private Key: 7
20,163,063 UART: [art] Derive CDI
20,163,880 UART: [art] Store in in slot 0x4
20,220,689 UART: [art] Derive Key Pair
20,221,731 UART: [art] Store priv key in slot 0x5
22,684,726 UART: [art] Derive Key Pair - Done
22,697,890 UART: [art] Signing Cert with AUTHO
22,699,195 UART: RITY.KEYID = 7
24,409,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,357 UART: [art] PUB.X = F6B1AE9760E2CA69E3059276E40697CC10C1FD2C07F107FB9B01FD816450CF2A4234BC86948365105530A81EFA50AE1B
24,418,623 UART: [art] PUB.Y = BD4B2280E01E1B7DCACCA880E45F4AED2A119A6A2C7CDF33C57A2123A50CA63C64F8FE28CF23854B2EB2511BC5774235
24,425,899 UART: [art] SIG.R = AA68AB7EF28277458F3B595D0FE9FDDCE051092B5350BD4451041E263DAA23C93988488DA5960DD8AB75BD9E49B8E01E
24,433,355 UART: [art] SIG.S = 0B3C533D3633E60504F2E64EC4AA5B5E15094DBC1C54CE0FFC48D559FC2DE9BCE60CB47909A0BD583E2F39D5FA42FCE0
25,412,300 UART: Caliptra RT
25,413,000 UART: [state] CFI Enabled
25,579,490 UART: [rt] RT listening for mailbox commands...
25,610,734 UART: [rt]cmd =0x46505652, len=4
25,612,061 UART: [rt] FIPS Version
25,613,336 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,972 writing to cptra_bootfsm_go
193,105 UART:
193,480 UART: Running Caliptra ROM ...
194,630 UART:
604,336 UART: [state] CFI Enabled
617,706 UART: [state] LifecycleState = Unprovisioned
619,579 UART: [state] DebugLocked = No
621,748 UART: [state] WD Timer not started. Device not locked for debugging
626,067 UART: [kat] SHA2-256
805,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,766 UART: [kat] ++
817,314 UART: [kat] sha1
829,145 UART: [kat] SHA2-256
832,123 UART: [kat] SHA2-384
839,119 UART: [kat] SHA2-512-ACC
842,060 UART: [kat] ECC-384
3,283,055 UART: [kat] HMAC-384Kdf
3,294,963 UART: [kat] LMS
3,824,466 UART: [kat] --
3,828,816 UART: [cold-reset] ++
3,831,044 UART: [fht] FHT @ 0x50003400
3,840,680 UART: [idev] ++
3,841,247 UART: [idev] CDI.KEYID = 6
3,842,128 UART: [idev] SUBJECT.KEYID = 7
3,843,370 UART: [idev] UDS.KEYID = 0
3,844,300 ready_for_fw is high
3,844,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,883 UART: [idev] Erasing UDS.KEYID = 0
6,318,860 UART: [idev] Sha1 KeyId Algorithm
6,341,270 UART: [idev] --
6,346,721 UART: [ldev] ++
6,347,372 UART: [ldev] CDI.KEYID = 6
6,348,268 UART: [ldev] SUBJECT.KEYID = 5
6,349,447 UART: [ldev] AUTHORITY.KEYID = 7
6,350,687 UART: [ldev] FE.KEYID = 1
6,361,175 UART: [ldev] Erasing FE.KEYID = 1
8,834,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,835 UART: [ldev] --
10,627,826 UART: [fwproc] Wait for Commands...
10,630,403 UART: [fwproc] Recv command 0x46574c44
10,632,440 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,201 >>> mbox cmd response: success
14,490,809 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,493,600 UART: [afmc] ++
14,494,191 UART: [afmc] CDI.KEYID = 6
14,495,109 UART: [afmc] SUBJECT.KEYID = 7
14,496,268 UART: [afmc] AUTHORITY.KEYID = 5
16,987,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,207 UART: [afmc] --
18,787,775 UART: [cold-reset] --
18,791,581 UART: [state] Locking Datavault
18,796,018 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,724 UART: [state] Locking ICCM
18,799,082 UART: [exit] Launching FMC @ 0x40000130
18,807,484 UART:
18,807,727 UART: Running Caliptra FMC ...
18,808,832 UART:
18,808,997 UART: [state] CFI Enabled
18,816,661 UART: [fht] FMC Alias Private Key: 7
20,573,666 UART: [art] Extend RT PCRs Done
20,574,892 UART: [art] Lock RT PCRs Done
20,576,517 UART: [art] Populate DV Done
20,582,253 UART: [fht] FMC Alias Private Key: 7
20,583,781 UART: [art] Derive CDI
20,584,527 UART: [art] Store in in slot 0x4
20,627,005 UART: [art] Derive Key Pair
20,628,015 UART: [art] Store priv key in slot 0x5
23,054,813 UART: [art] Derive Key Pair - Done
23,067,804 UART: [art] Signing Cert with AUTHO
23,069,159 UART: RITY.KEYID = 7
24,774,320 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,830 UART: [art] PUB.X = 3709913FA82CF060BC2F53FF3573172D887807DB5B62F644FBA284EB566E0A42EC6A7A7DFE649DABA690E4905DA90121
24,783,107 UART: [art] PUB.Y = DDAFDB68074AE1272272335C21D12E287319C2DBC5710C618C80779DFDB3724DF1FC329C42A91DB23D25F62A81955A4F
24,790,369 UART: [art] SIG.R = C4D01B701410F268D0B8657763AD108F1E0DD45FC27B6C20BD6855B1DD611A398C62BAF3F9D097DCB8D58464E0317CAF
24,797,728 UART: [art] SIG.S = BF0C6A6443C2F7534FA9F27BA15DE61F89D16772B91ABFBE9B5D552D406D56AD0EA0253177ECD980B7EAEFBA0DF89810
25,777,075 UART: Caliptra RT
25,777,767 UART: [state] CFI Enabled
25,894,627 UART: [rt] RT listening for mailbox commands...
25,925,930 UART: [rt]cmd =0x46505652, len=4
25,927,177 UART: [rt] FIPS Version
25,928,388 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,743 writing to cptra_bootfsm_go
3,697,581 ready_for_fw is high
3,697,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,434 >>> mbox cmd response: success
14,270,296 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,514,557 UART:
18,514,957 UART: Running Caliptra FMC ...
18,516,065 UART:
18,516,221 UART: [state] CFI Enabled
18,523,913 UART: [fht] FMC Alias Private Key: 7
20,281,230 UART: [art] Extend RT PCRs Done
20,282,454 UART: [art] Lock RT PCRs Done
20,284,035 UART: [art] Populate DV Done
20,289,243 UART: [fht] FMC Alias Private Key: 7
20,290,932 UART: [art] Derive CDI
20,291,755 UART: [art] Store in in slot 0x4
20,334,136 UART: [art] Derive Key Pair
20,335,142 UART: [art] Store priv key in slot 0x5
22,762,642 UART: [art] Derive Key Pair - Done
22,775,701 UART: [art] Signing Cert with AUTHO
22,777,049 UART: RITY.KEYID = 7
24,482,056 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,566 UART: [art] PUB.X = E541AA40563D1C11F28E212FF3E21B9B5D1EA42290DAB65C7ACCC5F2FB563E8953235C0A7E5BB46EB044D77E6C29EADB
24,490,843 UART: [art] PUB.Y = 5119A0829BACA62448DB018D459A39C16F8504D1BDA38986DD6D3ED27FC81A264D5001935CED92ED42DA654D308C5E3D
24,498,137 UART: [art] SIG.R = 8909582A56BC976A91B0C1439222D7B345E910A0E42EB523E10A4E8D3226E20CE70B4A6F38BD381FD2CAA3D99D33E010
24,505,563 UART: [art] SIG.S = 0F6DE98D0D02ECFA85D521C350594A5C04226015E54D5E9F82642ABA3339486B69E322E1C8C1F1329929C0D5110C6BEA
25,483,745 UART: Caliptra RT
25,484,460 UART: [state] CFI Enabled
25,602,346 UART: [rt] RT listening for mailbox commands...
25,633,605 UART: [rt]cmd =0x46505652, len=4
25,634,856 UART: [rt] FIPS Version
25,635,964 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,392 UART:
192,753 UART: Running Caliptra ROM ...
193,896 UART:
194,060 UART: [state] CFI Enabled
262,136 UART: [state] LifecycleState = Unprovisioned
264,487 UART: [state] DebugLocked = No
267,314 UART: [state] WD Timer not started. Device not locked for debugging
272,218 UART: [kat] SHA2-256
462,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,893 UART: [kat] ++
473,370 UART: [kat] sha1
484,882 UART: [kat] SHA2-256
487,893 UART: [kat] SHA2-384
494,238 UART: [kat] SHA2-512-ACC
496,819 UART: [kat] ECC-384
2,946,556 UART: [kat] HMAC-384Kdf
2,970,455 UART: [kat] LMS
3,502,219 UART: [kat] --
3,507,069 UART: [cold-reset] ++
3,508,598 UART: [fht] FHT @ 0x50003400
3,519,729 UART: [idev] ++
3,520,432 UART: [idev] CDI.KEYID = 6
3,521,458 UART: [idev] SUBJECT.KEYID = 7
3,522,553 UART: [idev] UDS.KEYID = 0
3,523,476 ready_for_fw is high
3,523,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,171 UART: [idev] Erasing UDS.KEYID = 0
6,026,592 UART: [idev] Sha1 KeyId Algorithm
6,048,441 UART: [idev] --
6,052,167 UART: [ldev] ++
6,052,947 UART: [ldev] CDI.KEYID = 6
6,053,861 UART: [ldev] SUBJECT.KEYID = 5
6,054,968 UART: [ldev] AUTHORITY.KEYID = 7
6,056,145 UART: [ldev] FE.KEYID = 1
6,100,185 UART: [ldev] Erasing FE.KEYID = 1
8,607,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,796 UART: [ldev] --
10,411,007 UART: [fwproc] Wait for Commands...
10,414,024 UART: [fwproc] Recv command 0x46574c44
10,416,276 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,278 >>> mbox cmd response: success
14,599,790 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,602,500 UART: [afmc] ++
14,603,201 UART: [afmc] CDI.KEYID = 6
14,604,411 UART: [afmc] SUBJECT.KEYID = 7
14,605,868 UART: [afmc] AUTHORITY.KEYID = 5
17,145,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,059 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,731 UART: [afmc] --
18,945,985 UART: [cold-reset] --
18,949,423 UART: [state] Locking Datavault
18,954,358 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,511 UART: [state] Locking ICCM
18,958,663 UART: [exit] Launching FMC @ 0x40000130
18,967,304 UART:
18,967,536 UART: Running Caliptra FMC ...
18,968,652 UART:
18,968,807 UART: [state] CFI Enabled
19,028,327 UART: [fht] FMC Alias Private Key: 7
20,792,309 UART: [art] Extend RT PCRs Done
20,793,521 UART: [art] Lock RT PCRs Done
20,794,981 UART: [art] Populate DV Done
20,800,441 UART: [fht] FMC Alias Private Key: 7
20,801,916 UART: [art] Derive CDI
20,802,676 UART: [art] Store in in slot 0x4
20,860,879 UART: [art] Derive Key Pair
20,861,915 UART: [art] Store priv key in slot 0x5
23,325,343 UART: [art] Derive Key Pair - Done
23,338,706 UART: [art] Signing Cert with AUTHO
23,340,037 UART: RITY.KEYID = 7
25,050,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,333 UART: [art] PUB.X = 221281BEFC18F5CAFD73E8A12EADB4B34991EAAA19D2DA7AC0C64D1AC758256A8BDAFA172EF26252D97E3BC91EFBA657
25,059,635 UART: [art] PUB.Y = 47F97EFC26A36B66FD4BCFFF1C9C837882840754FBF92026592D7649B760A046FD5ABCBEEFB2832A669558895A5C00E1
25,066,835 UART: [art] SIG.R = AA0CA698B005D95A17F3575BD16BB58E0E8E1BDB2325A32D0136D9099CF4FE5E2AD46C43BE1FDE589B2D2124A58C83A2
25,074,254 UART: [art] SIG.S = 47BECB11620738875D8BEC8FFCDAA3AA15B1EF225C70C94550D014095B62203654EB892FCF0C888C60D1F313C0F08E59
26,052,979 UART: Caliptra RT
26,053,816 UART: [state] CFI Enabled
26,218,754 UART: [rt] RT listening for mailbox commands...
26,250,344 UART: [rt]cmd =0x46505652, len=4
26,251,648 UART: [rt] FIPS Version
26,253,078 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,438,444 ready_for_fw is high
3,438,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,914 >>> mbox cmd response: success
14,729,525 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,002,879 UART:
19,003,275 UART: Running Caliptra FMC ...
19,004,416 UART:
19,004,580 UART: [state] CFI Enabled
19,074,629 UART: [fht] FMC Alias Private Key: 7
20,838,846 UART: [art] Extend RT PCRs Done
20,840,070 UART: [art] Lock RT PCRs Done
20,841,804 UART: [art] Populate DV Done
20,847,179 UART: [fht] FMC Alias Private Key: 7
20,848,895 UART: [art] Derive CDI
20,849,708 UART: [art] Store in in slot 0x4
20,907,633 UART: [art] Derive Key Pair
20,908,628 UART: [art] Store priv key in slot 0x5
23,372,029 UART: [art] Derive Key Pair - Done
23,384,928 UART: [art] Signing Cert with AUTHO
23,386,235 UART: RITY.KEYID = 7
25,097,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,278 UART: [art] PUB.X = D4CA12D7CEE0580F754D752DA92FE33C591BE952BA669824F1482BAAEBCAF05481D42A15BF69766B4951DD8D70484F79
25,106,586 UART: [art] PUB.Y = 133F322160ADCA3118DE73700BA801A70F6996A85B3E4AFDE0AB82B12B0709B422BCED53B606BAF57A56531566D5C2DC
25,113,806 UART: [art] SIG.R = FF087958275541B4B6ACDC2AC3A5019214EDF515CDEA4087760F9B84ED651308C02200E109029DCE82EB4C971DDD18B0
25,121,186 UART: [art] SIG.S = 0B23D07FEF9436910F35FB666DD5E072F9822298D603D242AAA5633B43ADDEAEBD7CB986690A6F74998B4CBCECAF20CF
26,100,180 UART: Caliptra RT
26,100,877 UART: [state] CFI Enabled
26,265,753 UART: [rt] RT listening for mailbox commands...
26,297,231 UART: [rt]cmd =0x46505652, len=4
26,298,506 UART: [rt] FIPS Version
26,299,884 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
192,959 UART:
193,337 UART: Running Caliptra ROM ...
194,539 UART:
603,974 UART: [state] CFI Enabled
620,761 UART: [state] LifecycleState = Unprovisioned
623,135 UART: [state] DebugLocked = No
626,087 UART: [state] WD Timer not started. Device not locked for debugging
629,841 UART: [kat] SHA2-256
819,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,255 UART: [kat] ++
830,867 UART: [kat] sha1
841,963 UART: [kat] SHA2-256
844,976 UART: [kat] SHA2-384
850,045 UART: [kat] SHA2-512-ACC
852,632 UART: [kat] ECC-384
3,293,735 UART: [kat] HMAC-384Kdf
3,305,401 UART: [kat] LMS
3,837,236 UART: [kat] --
3,839,947 UART: [cold-reset] ++
3,841,528 UART: [fht] FHT @ 0x50003400
3,852,789 UART: [idev] ++
3,853,505 UART: [idev] CDI.KEYID = 6
3,854,538 UART: [idev] SUBJECT.KEYID = 7
3,855,643 UART: [idev] UDS.KEYID = 0
3,856,567 ready_for_fw is high
3,856,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,027 UART: [idev] Erasing UDS.KEYID = 0
6,334,039 UART: [idev] Sha1 KeyId Algorithm
6,357,028 UART: [idev] --
6,361,187 UART: [ldev] ++
6,361,867 UART: [ldev] CDI.KEYID = 6
6,362,749 UART: [ldev] SUBJECT.KEYID = 5
6,363,958 UART: [ldev] AUTHORITY.KEYID = 7
6,365,188 UART: [ldev] FE.KEYID = 1
6,377,266 UART: [ldev] Erasing FE.KEYID = 1
8,855,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,523 UART: [ldev] --
10,642,848 UART: [fwproc] Wait for Commands...
10,645,278 UART: [fwproc] Recv command 0x46574c44
10,647,593 UART: [fwproc] Recv'd Img size: 114084 bytes
14,086,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,829,654 >>> mbox cmd response: success
14,830,218 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,834,554 UART: [afmc] ++
14,835,254 UART: [afmc] CDI.KEYID = 6
14,836,444 UART: [afmc] SUBJECT.KEYID = 7
14,837,942 UART: [afmc] AUTHORITY.KEYID = 5
17,343,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,421 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,524 UART: [afmc] --
19,136,217 UART: [cold-reset] --
19,141,167 UART: [state] Locking Datavault
19,148,050 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,205 UART: [state] Locking ICCM
19,152,472 UART: [exit] Launching FMC @ 0x40000130
19,161,100 UART:
19,161,339 UART: Running Caliptra FMC ...
19,162,447 UART:
19,162,607 UART: [state] CFI Enabled
19,170,493 UART: [fht] FMC Alias Private Key: 7
20,927,274 UART: [art] Extend RT PCRs Done
20,928,482 UART: [art] Lock RT PCRs Done
20,929,995 UART: [art] Populate DV Done
20,935,643 UART: [fht] FMC Alias Private Key: 7
20,937,348 UART: [art] Derive CDI
20,938,164 UART: [art] Store in in slot 0x4
20,980,745 UART: [art] Derive Key Pair
20,981,809 UART: [art] Store priv key in slot 0x5
23,408,475 UART: [art] Derive Key Pair - Done
23,421,358 UART: [art] Signing Cert with AUTHO
23,422,666 UART: RITY.KEYID = 7
25,127,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,426 UART: [art] PUB.X = 1679A3A8D0815D724B6F5F9C81067355FB619F3D582CE53FC9FDD1FFC28801D308B01865CCB1DF42970DEE42C6C3983F
25,136,654 UART: [art] PUB.Y = 3E40F824714B9E9578F7EC1A8DE012C81D1A6BD0C4C58148DA130EBA7C3D1F1798DDD5ED8E4861EF457F653889FA846D
25,143,920 UART: [art] SIG.R = 59C713A86423C049A59ED93C128A7051B1FB12119080C2129C8469677AA5074FB2488C164906EE017D8ED85261F78EF7
25,151,295 UART: [art] SIG.S = 2C178B18E1A03DD1C0F792BFA8DA8758A2DAFF91D4109FF641F55AC158C1C3F124B679CC86ED5F7C136E7E3F38AB4591
26,130,742 UART: Caliptra RT
26,131,466 UART: [state] CFI Enabled
26,249,447 UART: [rt] RT listening for mailbox commands...
26,280,778 UART: [rt]cmd =0x46505652, len=4
26,282,028 UART: [rt] FIPS Version
26,283,298 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
3,759,799 ready_for_fw is high
3,760,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,518 >>> mbox cmd response: success
14,955,342 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,209,493 UART:
19,209,905 UART: Running Caliptra FMC ...
19,211,009 UART:
19,211,168 UART: [state] CFI Enabled
19,219,288 UART: [fht] FMC Alias Private Key: 7
20,975,970 UART: [art] Extend RT PCRs Done
20,977,205 UART: [art] Lock RT PCRs Done
20,978,785 UART: [art] Populate DV Done
20,984,228 UART: [fht] FMC Alias Private Key: 7
20,985,785 UART: [art] Derive CDI
20,986,552 UART: [art] Store in in slot 0x4
21,029,104 UART: [art] Derive Key Pair
21,030,148 UART: [art] Store priv key in slot 0x5
23,456,744 UART: [art] Derive Key Pair - Done
23,469,858 UART: [art] Signing Cert with AUTHO
23,471,164 UART: RITY.KEYID = 7
25,176,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,086 UART: [art] PUB.X = 9044F62CF69513B0E6A1E5AAA173E2F12E6FB90EACA5079A7FF5BADB805BE90A9A445EF4CBAC502D5AB8945078C2FF6B
25,185,389 UART: [art] PUB.Y = 3FE75CCD7B2CBE9D1794F71A1D3773ABCFDB13CD3AD86CADCF86B1A990C87C8C329C330978FBEB973F0EF626C8ADAD23
25,192,678 UART: [art] SIG.R = 99E2197A30C10A93C70CB45C13D8C1F6663B23D9CD08B42C61F96E159109564DEF8C4F54F570B602934B1A6B0B87BF86
25,200,056 UART: [art] SIG.S = 1831CEA9062D5263FD361AC38F0F6D86D12F57E99CD736F4757274189A08C9E19FE79A27934744B23C9165A7FF6CA828
26,178,568 UART: Caliptra RT
26,179,288 UART: [state] CFI Enabled
26,297,133 UART: [rt] RT listening for mailbox commands...
26,328,523 UART: [rt]cmd =0x46505652, len=4
26,329,781 UART: [rt] FIPS Version
26,331,004 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,143 UART: [kat] SHA2-256
882,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,189 UART: [kat] ++
886,341 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,064 UART: [kat] LMS
1,475,260 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,573 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 ready_for_fw is high
1,480,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,608 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,076 UART: [idev] --
1,514,999 UART: [ldev] ++
1,515,167 UART: [ldev] CDI.KEYID = 6
1,515,530 UART: [ldev] SUBJECT.KEYID = 5
1,515,956 UART: [ldev] AUTHORITY.KEYID = 7
1,516,419 UART: [ldev] FE.KEYID = 1
1,521,405 UART: [ldev] Erasing FE.KEYID = 1
1,546,778 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,958 UART: [ldev] --
1,586,395 UART: [fwproc] Waiting for Commands...
1,587,100 UART: [fwproc] Received command 0x46574c44
1,587,891 UART: [fwproc] Received Image of size 114084 bytes
2,881,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,566 >>> mbox cmd response: success
3,073,566 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,074,616 UART: [afmc] ++
3,074,784 UART: [afmc] CDI.KEYID = 6
3,075,146 UART: [afmc] SUBJECT.KEYID = 7
3,075,571 UART: [afmc] AUTHORITY.KEYID = 5
3,110,324 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,281 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,971 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,620 UART: [afmc] --
3,153,654 UART: [cold-reset] --
3,154,608 UART: [state] Locking Datavault
3,155,675 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,279 UART: [state] Locking ICCM
3,156,807 UART: [exit] Launching FMC @ 0x40000130
3,162,136 UART:
3,162,152 UART: Running Caliptra FMC ...
3,162,560 UART:
3,162,614 UART: [state] CFI Enabled
3,173,015 UART: [fht] FMC Alias Private Key: 7
3,280,830 UART: [art] Extend RT PCRs Done
3,281,258 UART: [art] Lock RT PCRs Done
3,282,940 UART: [art] Populate DV Done
3,291,161 UART: [fht] FMC Alias Private Key: 7
3,292,281 UART: [art] Derive CDI
3,292,561 UART: [art] Store in in slot 0x4
3,378,040 UART: [art] Derive Key Pair
3,378,400 UART: [art] Store priv key in slot 0x5
3,391,440 UART: [art] Derive Key Pair - Done
3,406,416 UART: [art] Signing Cert with AUTHO
3,406,896 UART: RITY.KEYID = 7
3,422,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,093 UART: [art] PUB.X = 0E1A07A4D3F8C044A1D6B4FF5611BB62B41D879DCD3E98DDED2DB35F25EBF64B43ECC0B8A741E4459B15A8BFBDC7D210
3,429,883 UART: [art] PUB.Y = 17E064B741CDA98EF70687F75D2C6B1DEA1C9706F9EA4B0598D77E06E26D11117F525280F321C5194862B31239476C16
3,436,815 UART: [art] SIG.R = DAC23F4A6364154C7B7D46C49B5FBACA9293589BE9ED52429ED3500C1ECAC802E5B6AF5EFA9A3CD777024DB7A2E42E86
3,443,596 UART: [art] SIG.S = 3C941DFA765E09F68B230CDCC8DF977C30D3EFFCB288A7661AEB4ED960B8E5034E7F6E228C9F559F6260F3E5C1EA8717
3,467,162 UART: Caliptra RT
3,467,415 UART: [state] CFI Enabled
3,575,526 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,964 UART: [rt]cmd =0x46505652, len=4
3,606,624 UART: [rt] FIPS Version
3,607,677 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,011 ready_for_fw is high
1,362,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,152 >>> mbox cmd response: success
2,924,152 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,985,676 UART:
2,985,692 UART: Running Caliptra FMC ...
2,986,100 UART:
2,986,154 UART: [state] CFI Enabled
2,996,675 UART: [fht] FMC Alias Private Key: 7
3,104,678 UART: [art] Extend RT PCRs Done
3,105,106 UART: [art] Lock RT PCRs Done
3,106,688 UART: [art] Populate DV Done
3,115,031 UART: [fht] FMC Alias Private Key: 7
3,116,053 UART: [art] Derive CDI
3,116,333 UART: [art] Store in in slot 0x4
3,201,956 UART: [art] Derive Key Pair
3,202,316 UART: [art] Store priv key in slot 0x5
3,215,610 UART: [art] Derive Key Pair - Done
3,230,259 UART: [art] Signing Cert with AUTHO
3,230,739 UART: RITY.KEYID = 7
3,245,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,610 UART: [art] PUB.X = E668BA0BA68C8642DEC05BD98215D8C7976DA512AED4667723DECCC5204FC00EE4C9F7CC10CB6E3E94AE494226CDD758
3,253,392 UART: [art] PUB.Y = 65022B9139E0EA98B32CB192E16BDBA5390E58D3894EB7CCA9EC7E7D303BCEF9183017D86E1961400C9E3D316138542B
3,260,337 UART: [art] SIG.R = AF23420D1D1EB8D3A1F1E25AF60D718C85CE2700BB558C73C3FF3A7323F8CD89088434C15797B243024D9F12FA78A897
3,267,077 UART: [art] SIG.S = 0B411BC798BD23A9727F9126B712CD2F5FAE17FE95D5C96CE29E170AF8E7C793FE7B7404E0EB42FE1A3A77391844F7EE
3,291,249 UART: Caliptra RT
3,291,502 UART: [state] CFI Enabled
3,399,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,189 UART: [rt]cmd =0x46505652, len=4
3,430,849 UART: [rt] FIPS Version
3,431,870 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,281 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,898 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,003 UART: [idev] ++
1,480,171 UART: [idev] CDI.KEYID = 6
1,480,531 UART: [idev] SUBJECT.KEYID = 7
1,480,955 UART: [idev] UDS.KEYID = 0
1,481,300 ready_for_fw is high
1,481,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,159 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,548,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,407 UART: [ldev] --
1,587,886 UART: [fwproc] Waiting for Commands...
1,588,633 UART: [fwproc] Received command 0x46574c44
1,589,424 UART: [fwproc] Received Image of size 114084 bytes
2,884,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,408 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,760 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,291 >>> mbox cmd response: success
3,077,291 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,507 UART: [afmc] ++
3,078,675 UART: [afmc] CDI.KEYID = 6
3,079,037 UART: [afmc] SUBJECT.KEYID = 7
3,079,462 UART: [afmc] AUTHORITY.KEYID = 5
3,114,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,852 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,542 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,585 UART: [afmc] --
3,157,517 UART: [cold-reset] --
3,158,201 UART: [state] Locking Datavault
3,159,474 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,078 UART: [state] Locking ICCM
3,160,636 UART: [exit] Launching FMC @ 0x40000130
3,165,965 UART:
3,165,981 UART: Running Caliptra FMC ...
3,166,389 UART:
3,166,532 UART: [state] CFI Enabled
3,177,481 UART: [fht] FMC Alias Private Key: 7
3,284,968 UART: [art] Extend RT PCRs Done
3,285,396 UART: [art] Lock RT PCRs Done
3,286,758 UART: [art] Populate DV Done
3,294,931 UART: [fht] FMC Alias Private Key: 7
3,296,013 UART: [art] Derive CDI
3,296,293 UART: [art] Store in in slot 0x4
3,381,982 UART: [art] Derive Key Pair
3,382,342 UART: [art] Store priv key in slot 0x5
3,395,302 UART: [art] Derive Key Pair - Done
3,409,975 UART: [art] Signing Cert with AUTHO
3,410,455 UART: RITY.KEYID = 7
3,425,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,870 UART: [art] PUB.X = 290E2F6402B994DA40A35EE87C4DE8FB340B2CE150022BBE22EEC4DFF97D1A30387C9D4998D04AFB79CA1F4B45426BA2
3,432,644 UART: [art] PUB.Y = 9B615420026C3CBBA0FA59B8022ECF205D13FFAF20C5A487B194674BB458D4D3F8A3148E1FE16DCADBEA2FA61CDC99F2
3,439,610 UART: [art] SIG.R = C7E74A9C252C2232DBEB2E78C4F1064A295357A803F11E2123AABF18AF6978A6C0BB7BC25D5BF128CD5667C6C5C02654
3,446,384 UART: [art] SIG.S = 4D120EAA8EA51F8E1EF16760C406FD8E7640F7505976761A770E2D1B7901DF83E54A91DD30CB546B51C5134DF7013D2A
3,470,078 UART: Caliptra RT
3,470,423 UART: [state] CFI Enabled
3,578,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,878 UART: [rt]cmd =0x46505652, len=4
3,609,538 UART: [rt] FIPS Version
3,610,457 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,898 ready_for_fw is high
1,362,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,265 >>> mbox cmd response: success
2,924,265 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,095 UART:
2,986,111 UART: Running Caliptra FMC ...
2,986,519 UART:
2,986,662 UART: [state] CFI Enabled
2,997,655 UART: [fht] FMC Alias Private Key: 7
3,105,464 UART: [art] Extend RT PCRs Done
3,105,892 UART: [art] Lock RT PCRs Done
3,107,378 UART: [art] Populate DV Done
3,115,429 UART: [fht] FMC Alias Private Key: 7
3,116,491 UART: [art] Derive CDI
3,116,771 UART: [art] Store in in slot 0x4
3,202,912 UART: [art] Derive Key Pair
3,203,272 UART: [art] Store priv key in slot 0x5
3,216,892 UART: [art] Derive Key Pair - Done
3,231,647 UART: [art] Signing Cert with AUTHO
3,232,127 UART: RITY.KEYID = 7
3,247,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,080 UART: [art] PUB.X = B3B8FE535D5C9329D05D7A1FCB773F16ECB7A0C74228833177B73E72F3AF51822C440B1460FC9E40126620DDA6F6745C
3,254,851 UART: [art] PUB.Y = 0FEE53E7B407EA4DAE50EC24EB8C99F86CA6787CEA807348FD72938FA8AA9D20FC623AC246E22B61019D84DF3E14E772
3,261,808 UART: [art] SIG.R = 8EBC90451AECF80D4A4E3093BB643D52387758E7BE8DF6A9CCD164AFD5FC19878E856E6AA1F8D7A1B1A2181181FC6D2F
3,268,593 UART: [art] SIG.S = 4FCE2164B80456B74748D2EC9595A330675517140A97490B7CB11133FD65FC4A5EA258150FC6A2FBD6C52AE85671DF3B
3,292,846 UART: Caliptra RT
3,293,191 UART: [state] CFI Enabled
3,401,362 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,884 UART: [rt]cmd =0x46505652, len=4
3,432,544 UART: [rt] FIPS Version
3,433,569 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
902,027 UART: [kat] SHA2-256
903,967 UART: [kat] SHA2-384
906,906 UART: [kat] SHA2-512-ACC
908,807 UART: [kat] ECC-384
918,430 UART: [kat] HMAC-384Kdf
923,052 UART: [kat] LMS
1,171,380 UART: [kat] --
1,172,349 UART: [cold-reset] ++
1,172,725 UART: [fht] FHT @ 0x50003400
1,175,406 UART: [idev] ++
1,175,574 UART: [idev] CDI.KEYID = 6
1,175,934 UART: [idev] SUBJECT.KEYID = 7
1,176,358 UART: [idev] UDS.KEYID = 0
1,176,703 ready_for_fw is high
1,176,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,516 UART: [idev] Erasing UDS.KEYID = 0
1,201,379 UART: [idev] Sha1 KeyId Algorithm
1,209,761 UART: [idev] --
1,210,673 UART: [ldev] ++
1,210,841 UART: [ldev] CDI.KEYID = 6
1,211,204 UART: [ldev] SUBJECT.KEYID = 5
1,211,630 UART: [ldev] AUTHORITY.KEYID = 7
1,212,093 UART: [ldev] FE.KEYID = 1
1,217,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,137 UART: [ldev] --
1,282,512 UART: [fwproc] Wait for Commands...
1,283,194 UART: [fwproc] Recv command 0x46574c44
1,283,922 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,043 >>> mbox cmd response: success
2,771,043 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,053 UART: [afmc] ++
2,772,221 UART: [afmc] CDI.KEYID = 6
2,772,583 UART: [afmc] SUBJECT.KEYID = 7
2,773,008 UART: [afmc] AUTHORITY.KEYID = 5
2,808,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,595 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,092 UART: [afmc] --
2,851,176 UART: [cold-reset] --
2,851,840 UART: [state] Locking Datavault
2,853,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,813 UART: [state] Locking ICCM
2,854,293 UART: [exit] Launching FMC @ 0x40000130
2,859,622 UART:
2,859,638 UART: Running Caliptra FMC ...
2,860,046 UART:
2,860,100 UART: [state] CFI Enabled
2,870,353 UART: [fht] FMC Alias Private Key: 7
2,978,768 UART: [art] Extend RT PCRs Done
2,979,196 UART: [art] Lock RT PCRs Done
2,980,626 UART: [art] Populate DV Done
2,988,899 UART: [fht] FMC Alias Private Key: 7
2,989,871 UART: [art] Derive CDI
2,990,151 UART: [art] Store in in slot 0x4
3,075,966 UART: [art] Derive Key Pair
3,076,326 UART: [art] Store priv key in slot 0x5
3,089,876 UART: [art] Derive Key Pair - Done
3,104,653 UART: [art] Signing Cert with AUTHO
3,105,133 UART: RITY.KEYID = 7
3,120,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,674 UART: [art] PUB.X = 39DAE14AEA6DC47606E7C16579689CC9FB98C88887F8D8BFB32455ED74E7A03983899A21CA0274A7E9971B9168B98FB5
3,128,442 UART: [art] PUB.Y = A93820DB41BF91663A9FEA3440B6013214DA44ADB47F92331EDF5199C56A113E838E0DE04F74AC89A5D80BAFC103DED4
3,135,392 UART: [art] SIG.R = A57955DDDE8C9C7560DD7CDD34E06F45C8A119DD46928033C069156AD39E37A9ADCDB4CF379039D0EBE486415CE5BF49
3,142,176 UART: [art] SIG.S = DA43621101FCEA2137664F0C953CB80F10E9488DA71FF846F3FD47DD6B94EEB6A9346BE9CD1D40595B7569795A907C06
3,166,355 UART: Caliptra RT
3,166,608 UART: [state] CFI Enabled
3,273,670 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,264 UART: [rt]cmd =0x46505652, len=4
3,304,924 UART: [rt] FIPS Version
3,305,979 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,585 ready_for_fw is high
1,059,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,432 >>> mbox cmd response: success
2,622,432 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,268 UART:
2,684,284 UART: Running Caliptra FMC ...
2,684,692 UART:
2,684,746 UART: [state] CFI Enabled
2,694,897 UART: [fht] FMC Alias Private Key: 7
2,802,550 UART: [art] Extend RT PCRs Done
2,802,978 UART: [art] Lock RT PCRs Done
2,804,646 UART: [art] Populate DV Done
2,812,761 UART: [fht] FMC Alias Private Key: 7
2,813,791 UART: [art] Derive CDI
2,814,071 UART: [art] Store in in slot 0x4
2,899,856 UART: [art] Derive Key Pair
2,900,216 UART: [art] Store priv key in slot 0x5
2,913,370 UART: [art] Derive Key Pair - Done
2,928,362 UART: [art] Signing Cert with AUTHO
2,928,842 UART: RITY.KEYID = 7
2,944,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,937 UART: [art] PUB.X = EED77D94088128B4B6727FCD5299B4910E5DD4E678C2F00484C1E650AA91372722D436BC04B9951867AC269BAF35C626
2,951,693 UART: [art] PUB.Y = 58E3B531AFACCBA8ACCFCAEEAB57725F64E2CF3D3960568FC7F6D96F3518B5992CC6F56CC0F338C50BD3BD4CC2DBFDE4
2,958,674 UART: [art] SIG.R = FC844A85B2FFF8D9DE5935452228A74170EBDD89D237516D5312FEDCFC56BC48D324B9B13E87E8886118CED7F3F85872
2,965,452 UART: [art] SIG.S = AAA1F3039C74EC3D6534C45B598624654F991072A44A7C6B8F593FBB1A409E98356DA259A403B3F0E337F45C3DC8B54C
2,990,001 UART: Caliptra RT
2,990,254 UART: [state] CFI Enabled
3,098,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,592 UART: [rt]cmd =0x46505652, len=4
3,130,252 UART: [rt] FIPS Version
3,131,409 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,877 UART: [kat] SHA2-512-ACC
908,778 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,590 UART: [cold-reset] ++
1,172,958 UART: [fht] FHT @ 0x50003400
1,175,601 UART: [idev] ++
1,175,769 UART: [idev] CDI.KEYID = 6
1,176,129 UART: [idev] SUBJECT.KEYID = 7
1,176,553 UART: [idev] UDS.KEYID = 0
1,176,898 ready_for_fw is high
1,176,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,617 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,364 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,844 UART: [ldev] --
1,284,193 UART: [fwproc] Wait for Commands...
1,284,797 UART: [fwproc] Recv command 0x46574c44
1,285,525 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,274 >>> mbox cmd response: success
2,771,274 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,436 UART: [afmc] ++
2,772,604 UART: [afmc] CDI.KEYID = 6
2,772,966 UART: [afmc] SUBJECT.KEYID = 7
2,773,391 UART: [afmc] AUTHORITY.KEYID = 5
2,808,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,123 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,027 UART: [afmc] --
2,852,131 UART: [cold-reset] --
2,853,093 UART: [state] Locking Datavault
2,854,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,752 UART: [state] Locking ICCM
2,855,344 UART: [exit] Launching FMC @ 0x40000130
2,860,673 UART:
2,860,689 UART: Running Caliptra FMC ...
2,861,097 UART:
2,861,240 UART: [state] CFI Enabled
2,871,689 UART: [fht] FMC Alias Private Key: 7
2,979,884 UART: [art] Extend RT PCRs Done
2,980,312 UART: [art] Lock RT PCRs Done
2,981,504 UART: [art] Populate DV Done
2,989,699 UART: [fht] FMC Alias Private Key: 7
2,990,717 UART: [art] Derive CDI
2,990,997 UART: [art] Store in in slot 0x4
3,076,824 UART: [art] Derive Key Pair
3,077,184 UART: [art] Store priv key in slot 0x5
3,090,824 UART: [art] Derive Key Pair - Done
3,105,520 UART: [art] Signing Cert with AUTHO
3,106,000 UART: RITY.KEYID = 7
3,121,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,815 UART: [art] PUB.X = F79C641E70FF416AEAD0FF3DCC9F810A4C014884C56C0D70721229B26CB3EC1A008808D2D349C983220137E567049635
3,128,543 UART: [art] PUB.Y = A424EC3BFF993EB80D1873FEF103DBE881E063D5F1E2AAB3B6ECF198954EEC37A570A006CB83F07DDB6D7135CC939873
3,135,502 UART: [art] SIG.R = 8DE246D8F01BB84C7E0C519F984EDA58FED0BF5A4E7D624231AB345084B941FF2AE800A439FC4A9506F3A769F4383BFC
3,142,258 UART: [art] SIG.S = B0ECDC9D2E08C057A957AAD13D27058CB3846C8AAAC2F643E3193238943878D6360CB2E748846F18B3841B9A6A42370E
3,166,379 UART: Caliptra RT
3,166,724 UART: [state] CFI Enabled
3,274,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,954 UART: [rt]cmd =0x46505652, len=4
3,305,614 UART: [rt] FIPS Version
3,306,683 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,138 ready_for_fw is high
1,060,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,939 >>> mbox cmd response: success
2,621,939 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,399 UART:
2,684,415 UART: Running Caliptra FMC ...
2,684,823 UART:
2,684,966 UART: [state] CFI Enabled
2,695,537 UART: [fht] FMC Alias Private Key: 7
2,803,104 UART: [art] Extend RT PCRs Done
2,803,532 UART: [art] Lock RT PCRs Done
2,804,878 UART: [art] Populate DV Done
2,813,151 UART: [fht] FMC Alias Private Key: 7
2,814,265 UART: [art] Derive CDI
2,814,545 UART: [art] Store in in slot 0x4
2,899,954 UART: [art] Derive Key Pair
2,900,314 UART: [art] Store priv key in slot 0x5
2,913,454 UART: [art] Derive Key Pair - Done
2,928,374 UART: [art] Signing Cert with AUTHO
2,928,854 UART: RITY.KEYID = 7
2,943,890 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,655 UART: [art] PUB.X = F79AE376E6D8E8B15FA0BB19869A9C2D995F89DE4928857D211AD9889B1E2199FEE9FF209F0CB7C5C5B4130EDE9F5D63
2,951,433 UART: [art] PUB.Y = 84C2AFE15AF7102DE2E8E07CF2038A2E43CFE2AC9B5BEB5E1D88A1C8A89C534757A28DA10AE7A42F0F2F377756F79149
2,958,390 UART: [art] SIG.R = D7C21775C8EFB335A2FFC300DBEE424F84019095A4D163A1119FB65FE9B1ADEA78603F927186D9C76A0CA1823F8021F9
2,965,140 UART: [art] SIG.S = D9E1313344DEA0C13AE3F23121BF3FE199EB9A6ADF72FAF6269E5C7A9A67871758CD4B9F20B3F94E01DDD0231E9E2F77
2,988,714 UART: Caliptra RT
2,989,059 UART: [state] CFI Enabled
3,097,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,465 UART: [rt]cmd =0x46505652, len=4
3,128,125 UART: [rt] FIPS Version
3,128,976 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,174,281 ready_for_fw is high
1,174,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,423 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,242,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,084 UART: [ldev] --
1,281,442 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,001 >>> mbox cmd response: success
2,769,001 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,770,212 UART: [afmc] ++
2,770,380 UART: [afmc] CDI.KEYID = 6
2,770,743 UART: [afmc] SUBJECT.KEYID = 7
2,771,169 UART: [afmc] AUTHORITY.KEYID = 5
2,806,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,017 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,113 UART: [afmc] --
2,849,119 UART: [cold-reset] --
2,850,049 UART: [state] Locking Datavault
2,851,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,962 UART: [state] Locking ICCM
2,852,574 UART: [exit] Launching FMC @ 0x40000130
2,857,903 UART:
2,857,919 UART: Running Caliptra FMC ...
2,858,327 UART:
2,858,381 UART: [state] CFI Enabled
2,868,916 UART: [fht] FMC Alias Private Key: 7
2,976,671 UART: [art] Extend RT PCRs Done
2,977,099 UART: [art] Lock RT PCRs Done
2,978,817 UART: [art] Populate DV Done
2,986,866 UART: [fht] FMC Alias Private Key: 7
2,987,816 UART: [art] Derive CDI
2,988,096 UART: [art] Store in in slot 0x4
3,073,635 UART: [art] Derive Key Pair
3,073,995 UART: [art] Store priv key in slot 0x5
3,087,457 UART: [art] Derive Key Pair - Done
3,102,256 UART: [art] Signing Cert with AUTHO
3,102,736 UART: RITY.KEYID = 7
3,117,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,447 UART: [art] PUB.X = AB4D7BBEC7732C36D868B75473291D93CC4B7E60F2E22C6F061E72A6AAE7D299F3E17AA93C76D67AE9DB62BAB9669F57
3,125,230 UART: [art] PUB.Y = AA2DDBCEB69898E10BC30BC15A8AD24844CE69C160E277D896E6AC0BCDF6208CAA6CD9FB8223105C15ED985280C38FC2
3,132,191 UART: [art] SIG.R = 11246CD307FE4BCE734FF51BA530C84E01A095EBB5FDC88079BC01A8F22C20D5EFA79AF20155C564319D81B562BE3405
3,138,956 UART: [art] SIG.S = D3D818140573D824D7F31AE3FBF01EED111705ACBB05B4075BA1278207F5A2155D1E0EC5F0A36208AC076647413A0779
3,162,770 UART: Caliptra RT
3,163,023 UART: [state] CFI Enabled
3,270,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,338 UART: [rt]cmd =0x46505652, len=4
3,301,998 UART: [rt] FIPS Version
3,302,961 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,590 ready_for_fw is high
1,055,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,213 >>> mbox cmd response: success
2,618,213 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,679,755 UART:
2,679,771 UART: Running Caliptra FMC ...
2,680,179 UART:
2,680,233 UART: [state] CFI Enabled
2,690,890 UART: [fht] FMC Alias Private Key: 7
2,799,297 UART: [art] Extend RT PCRs Done
2,799,725 UART: [art] Lock RT PCRs Done
2,801,483 UART: [art] Populate DV Done
2,809,520 UART: [fht] FMC Alias Private Key: 7
2,810,598 UART: [art] Derive CDI
2,810,878 UART: [art] Store in in slot 0x4
2,896,873 UART: [art] Derive Key Pair
2,897,233 UART: [art] Store priv key in slot 0x5
2,910,581 UART: [art] Derive Key Pair - Done
2,925,718 UART: [art] Signing Cert with AUTHO
2,926,198 UART: RITY.KEYID = 7
2,941,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,981 UART: [art] PUB.X = 3AF2B0F706190CAB8937A10ACFDEBC178BF9BB38F228B3671FB3FA733B32049D92BC5C74CE7B713A19105504B8D4AB6E
2,948,752 UART: [art] PUB.Y = 0CA35A5035F675D99A2C4AEE19AD2523BDF3B3348A387A4938D6E516629609DCFF66211748DCCFDD50CAE9AFAD7BC45C
2,955,714 UART: [art] SIG.R = 56C86B10D1D216E6BB4C89C91F4D6DDBD275E5210573F25A3AC02414CA7D7C4D196B14705B2A9A4FCA9B89B3C0E55FA8
2,962,495 UART: [art] SIG.S = DB5EECAA1BE6B242BC47C0AB3148712E658A323158CEF279732A279D768DA53E9E0A07A07420EAECEC1BABD2CF095B82
2,986,429 UART: Caliptra RT
2,986,682 UART: [state] CFI Enabled
3,094,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,451 UART: [rt]cmd =0x46505652, len=4
3,125,111 UART: [rt] FIPS Version
3,126,278 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,407 UART: [kat] SHA2-256
890,957 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 ready_for_fw is high
1,174,134 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,258 UART: [idev] --
1,209,281 UART: [ldev] ++
1,209,449 UART: [ldev] CDI.KEYID = 6
1,209,813 UART: [ldev] SUBJECT.KEYID = 5
1,210,240 UART: [ldev] AUTHORITY.KEYID = 7
1,210,703 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,525 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,174 >>> mbox cmd response: success
2,770,174 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,285 UART: [afmc] ++
2,771,453 UART: [afmc] CDI.KEYID = 6
2,771,816 UART: [afmc] SUBJECT.KEYID = 7
2,772,242 UART: [afmc] AUTHORITY.KEYID = 5
2,808,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,963 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,718 UART: [afmc] --
2,851,800 UART: [cold-reset] --
2,852,488 UART: [state] Locking Datavault
2,853,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,397 UART: [state] Locking ICCM
2,855,013 UART: [exit] Launching FMC @ 0x40000130
2,860,342 UART:
2,860,358 UART: Running Caliptra FMC ...
2,860,766 UART:
2,860,909 UART: [state] CFI Enabled
2,871,712 UART: [fht] FMC Alias Private Key: 7
2,980,399 UART: [art] Extend RT PCRs Done
2,980,827 UART: [art] Lock RT PCRs Done
2,982,379 UART: [art] Populate DV Done
2,990,474 UART: [fht] FMC Alias Private Key: 7
2,991,584 UART: [art] Derive CDI
2,991,864 UART: [art] Store in in slot 0x4
3,077,517 UART: [art] Derive Key Pair
3,077,877 UART: [art] Store priv key in slot 0x5
3,091,011 UART: [art] Derive Key Pair - Done
3,105,912 UART: [art] Signing Cert with AUTHO
3,106,392 UART: RITY.KEYID = 7
3,121,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,497 UART: [art] PUB.X = 8FD0167834A66EE25A5C3899FD0CC602094C14B33A7B20453A035C43A5011211BE39EC0A933485E031647A339A6952E3
3,129,241 UART: [art] PUB.Y = B82A93467D16B6FD8CAD89EFF6E9EEF039568D47CFADAA4EA8088A3AA6165788FC23CB8A936ED48055A69F5096870D3D
3,136,201 UART: [art] SIG.R = 5510C2D209E1F30C916309F185A6D8184ACE02A9E46E995245BD317DABDDDBA7948403B43BCD12D2D99B22732F0E155D
3,142,959 UART: [art] SIG.S = AD402143E7A86A76198E20BBEA74BDC09147EC632800EDFAAE31EAAB2FEFC337FFC0E8147E0E16BA576171267E5289E5
3,166,707 UART: Caliptra RT
3,167,052 UART: [state] CFI Enabled
3,273,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,521 UART: [rt]cmd =0x46505652, len=4
3,305,181 UART: [rt] FIPS Version
3,306,236 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,283 ready_for_fw is high
1,057,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,284 >>> mbox cmd response: success
2,620,284 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,086 UART:
2,683,102 UART: Running Caliptra FMC ...
2,683,510 UART:
2,683,653 UART: [state] CFI Enabled
2,694,368 UART: [fht] FMC Alias Private Key: 7
2,802,817 UART: [art] Extend RT PCRs Done
2,803,245 UART: [art] Lock RT PCRs Done
2,804,627 UART: [art] Populate DV Done
2,812,848 UART: [fht] FMC Alias Private Key: 7
2,813,954 UART: [art] Derive CDI
2,814,234 UART: [art] Store in in slot 0x4
2,900,445 UART: [art] Derive Key Pair
2,900,805 UART: [art] Store priv key in slot 0x5
2,914,207 UART: [art] Derive Key Pair - Done
2,929,039 UART: [art] Signing Cert with AUTHO
2,929,519 UART: RITY.KEYID = 7
2,944,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,354 UART: [art] PUB.X = EA3F75084C3B4686170C9D17398FB1E1E550B553C3ABAD316CC2EC8D92B155F4F97EC6DAEF133597816593B866517ACA
2,952,126 UART: [art] PUB.Y = CEC3E8D28EF801123A326DEE0E015DAB760C2F707A57864DE798818066933765D959A8406D4676A194946D09381B0668
2,959,048 UART: [art] SIG.R = 15603D9E34FC8816DB3912B1330EC0712DD0A0FF1491FC2611C8344EFB5D8C8FE3566C293B3243446C7E8F66FF2A630C
2,965,816 UART: [art] SIG.S = ADE1D326B98E37BD5736E63DA84FEA2B8FB0FAA51DFD15AE7259A3FD71FFE437B16881C3661ED16E2DDBD43C690D007C
2,989,452 UART: Caliptra RT
2,989,797 UART: [state] CFI Enabled
3,098,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,546 UART: [rt]cmd =0x46505652, len=4
3,129,206 UART: [rt] FIPS Version
3,130,383 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,056 UART:
192,422 UART: Running Caliptra ROM ...
193,513 UART:
193,655 UART: [state] CFI Enabled
264,621 UART: [state] LifecycleState = Unprovisioned
266,560 UART: [state] DebugLocked = No
269,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,392 UART: [kat] SHA2-256
444,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,629 UART: [kat] ++
455,129 UART: [kat] sha1
466,291 UART: [kat] SHA2-256
468,940 UART: [kat] SHA2-384
474,862 UART: [kat] SHA2-512-ACC
477,296 UART: [kat] ECC-384
2,766,613 UART: [kat] HMAC-384Kdf
2,778,558 UART: [kat] LMS
3,968,854 UART: [kat] --
3,973,160 UART: [cold-reset] ++
3,975,783 UART: [fht] Storing FHT @ 0x50003400
3,987,774 UART: [idev] ++
3,988,371 UART: [idev] CDI.KEYID = 6
3,989,290 UART: [idev] SUBJECT.KEYID = 7
3,990,534 UART: [idev] UDS.KEYID = 0
3,991,572 ready_for_fw is high
3,991,769 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,866 UART: [idev] Erasing UDS.KEYID = 0
7,326,691 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,164 UART: [idev] --
7,352,564 UART: [ldev] ++
7,353,143 UART: [ldev] CDI.KEYID = 6
7,354,107 UART: [ldev] SUBJECT.KEYID = 5
7,355,323 UART: [ldev] AUTHORITY.KEYID = 7
7,356,558 UART: [ldev] FE.KEYID = 1
7,401,068 UART: [ldev] Erasing FE.KEYID = 1
10,734,300 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,952 UART: [ldev] --
13,095,861 UART: [fwproc] Waiting for Commands...
13,098,594 UART: [fwproc] Received command 0x46574c44
13,100,788 UART: [fwproc] Received Image of size 113760 bytes
17,145,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,606,348 >>> mbox cmd response: success
17,606,847 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,611,385 UART: [afmc] ++
17,611,980 UART: [afmc] CDI.KEYID = 6
17,612,918 UART: [afmc] SUBJECT.KEYID = 7
17,614,188 UART: [afmc] AUTHORITY.KEYID = 5
20,988,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,735 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,991 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,414 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,245 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,678 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,506 UART: [afmc] --
23,361,583 UART: [cold-reset] --
23,363,992 UART: [state] Locking Datavault
23,370,372 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,126 UART: [state] Locking ICCM
23,374,223 UART: [exit] Launching FMC @ 0x40000130
23,382,617 UART:
23,382,847 UART: Running Caliptra FMC ...
23,383,943 UART:
23,384,100 UART: [state] CFI Enabled
23,449,252 UART: [fht] FMC Alias Private Key: 7
25,787,498 UART: [art] Extend RT PCRs Done
25,788,714 UART: [art] Lock RT PCRs Done
25,790,664 UART: [art] Populate DV Done
25,796,019 UART: [fht] FMC Alias Private Key: 7
25,797,730 UART: [art] Derive CDI
25,798,542 UART: [art] Store in in slot 0x4
25,857,664 UART: [art] Derive Key Pair
25,858,702 UART: [art] Store priv key in slot 0x5
29,151,443 UART: [art] Derive Key Pair - Done
29,164,274 UART: [art] Signing Cert with AUTHO
29,165,573 UART: RITY.KEYID = 7
31,453,051 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,577 UART: [art] PUB.X = 2487BE743099B09E16C5AF0885D184D7BF902B3AE832254A87769C7776581B2B354E7E11368103921102ED8AA6A18AB2
31,461,777 UART: [art] PUB.Y = 577E9C8E49AF153790E77F0C126DC2DE9FB6DF9F785A1DADD506F6E3657AA597C16A3064053E54C2462329373E755974
31,469,003 UART: [art] SIG.R = 61D9BD138406E3B91850F952CC4F922EAD639AA87A5D0B394F82D6517BACE7D041C0F3DD25021D8D2EE5D07D06580EFE
31,476,360 UART: [art] SIG.S = 2E641783AD210C9FB81B7E5C885AB4356B19B44142A11613437ACBC917BE1FE8F6C45AB89E46E0C5C2EF9870575935F9
32,780,790 UART: Caliptra RT
32,781,500 UART: [state] CFI Enabled
32,960,800 UART: [rt] RT listening for mailbox commands...
32,991,969 UART: [rt]cmd =0x464d4352, len=4
32,999,714 >>> mbox cmd response data (524 bytes)
33,169,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,199,135 UART: [rt]cmd =0x43455252, len=4
33,210,625 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,800,562 ready_for_fw is high
3,800,947 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,864,679 >>> mbox cmd response: success
17,865,667 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,569,078 UART:
23,569,478 UART: Running Caliptra FMC ...
23,570,595 UART:
23,570,753 UART: [state] CFI Enabled
23,635,958 UART: [fht] FMC Alias Private Key: 7
25,974,334 UART: [art] Extend RT PCRs Done
25,975,563 UART: [art] Lock RT PCRs Done
25,977,273 UART: [art] Populate DV Done
25,982,632 UART: [fht] FMC Alias Private Key: 7
25,984,301 UART: [art] Derive CDI
25,985,042 UART: [art] Store in in slot 0x4
26,044,986 UART: [art] Derive Key Pair
26,046,033 UART: [art] Store priv key in slot 0x5
29,339,191 UART: [art] Derive Key Pair - Done
29,351,917 UART: [art] Signing Cert with AUTHO
29,353,223 UART: RITY.KEYID = 7
31,640,996 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,501 UART: [art] PUB.X = 902F3085E522323E272A2B71DE06211104B7641C5E56BA8E380C88028A1796BC860593BE1F39EE5C7595E957BCAA68E3
31,649,753 UART: [art] PUB.Y = B0741E8AD8A03AE61F96D2575E3542C67274C704C02BE7CB6B82C8A0635D7D659DB0121AD81AEFE5536271DD86BE1278
31,656,999 UART: [art] SIG.R = 89301C6EADDA7C1C2A617318C3297BAA29AB673BB3AB5021E5A252641F9ACD5B9F292DAD1175A56ED40AF40247E4C022
31,664,401 UART: [art] SIG.S = 55E85D2ABA6F2950B718E3D86BBEDD65AFBCA848FE3A2DB61B1ACDA2EB4476EE5347E621EC424A860CAABE664E426636
32,969,709 UART: Caliptra RT
32,970,411 UART: [state] CFI Enabled
33,131,719 UART: [rt] RT listening for mailbox commands...
33,163,023 UART: [rt]cmd =0x464d4352, len=4
33,170,242 >>> mbox cmd response data (524 bytes)
33,338,961 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,368,865 UART: [rt]cmd =0x43455252, len=4
33,380,187 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
192,978 UART:
193,350 UART: Running Caliptra ROM ...
194,492 UART:
604,140 UART: [state] CFI Enabled
618,169 UART: [state] LifecycleState = Unprovisioned
620,043 UART: [state] DebugLocked = No
621,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,427 UART: [kat] SHA2-256
797,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,732 UART: [kat] ++
808,251 UART: [kat] sha1
818,266 UART: [kat] SHA2-256
820,942 UART: [kat] SHA2-384
827,752 UART: [kat] SHA2-512-ACC
830,118 UART: [kat] ECC-384
3,114,942 UART: [kat] HMAC-384Kdf
3,126,967 UART: [kat] LMS
4,317,106 UART: [kat] --
4,320,308 UART: [cold-reset] ++
4,322,383 UART: [fht] Storing FHT @ 0x50003400
4,332,720 UART: [idev] ++
4,333,280 UART: [idev] CDI.KEYID = 6
4,334,162 UART: [idev] SUBJECT.KEYID = 7
4,335,468 UART: [idev] UDS.KEYID = 0
4,336,460 ready_for_fw is high
4,336,718 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,754 UART: [idev] Erasing UDS.KEYID = 0
7,619,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,078 UART: [idev] --
7,644,752 UART: [ldev] ++
7,645,373 UART: [ldev] CDI.KEYID = 6
7,646,344 UART: [ldev] SUBJECT.KEYID = 5
7,647,549 UART: [ldev] AUTHORITY.KEYID = 7
7,648,773 UART: [ldev] FE.KEYID = 1
7,657,487 UART: [ldev] Erasing FE.KEYID = 1
10,944,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,875 UART: [ldev] --
13,304,935 UART: [fwproc] Waiting for Commands...
13,307,359 UART: [fwproc] Received command 0x46574c44
13,309,596 UART: [fwproc] Received Image of size 113760 bytes
17,365,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,304 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,818,657 >>> mbox cmd response: success
17,819,161 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,822,150 UART: [afmc] ++
17,822,756 UART: [afmc] CDI.KEYID = 6
17,823,662 UART: [afmc] SUBJECT.KEYID = 7
17,824,929 UART: [afmc] AUTHORITY.KEYID = 5
21,137,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,093 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,361 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,450,755 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,465,566 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,480,054 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,500,583 UART: [afmc] --
23,504,063 UART: [cold-reset] --
23,508,085 UART: [state] Locking Datavault
23,514,734 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,489 UART: [state] Locking ICCM
23,518,258 UART: [exit] Launching FMC @ 0x40000130
23,526,651 UART:
23,526,912 UART: Running Caliptra FMC ...
23,528,016 UART:
23,528,176 UART: [state] CFI Enabled
23,536,113 UART: [fht] FMC Alias Private Key: 7
25,867,497 UART: [art] Extend RT PCRs Done
25,868,724 UART: [art] Lock RT PCRs Done
25,870,638 UART: [art] Populate DV Done
25,875,995 UART: [fht] FMC Alias Private Key: 7
25,877,580 UART: [art] Derive CDI
25,878,309 UART: [art] Store in in slot 0x4
25,921,056 UART: [art] Derive Key Pair
25,922,054 UART: [art] Store priv key in slot 0x5
29,164,668 UART: [art] Derive Key Pair - Done
29,177,884 UART: [art] Signing Cert with AUTHO
29,179,185 UART: RITY.KEYID = 7
31,458,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,933 UART: [art] PUB.X = 07405D3FCB41FAE3656CE05B6ABB63F65686C65FC463A71AC52BE6B8938775A3678B3A5035F24A159DF9E1BCFDABB42B
31,467,197 UART: [art] PUB.Y = CFF41D9C1187CAA4EC6671681120568EF6AE96A906557B77F87F26B728355D13E6808F1B9ACC8B8B84B0E71F84255B7A
31,474,419 UART: [art] SIG.R = 89F593F78DD4D82CE052B030B468826D75DB80BF1B16C5FFC2702F9AD5B04D24E47289BF6B14E964CB69A7FC38B690EC
31,481,776 UART: [art] SIG.S = 322104F34D48E02853637BE75D636CB7D463FFF392FC47AD5B3D80C22AB62A239458F6254D49A3050A2FB3888685EF14
32,786,793 UART: Caliptra RT
32,787,511 UART: [state] CFI Enabled
32,904,756 UART: [rt] RT listening for mailbox commands...
32,936,389 UART: [rt]cmd =0x464d4352, len=4
32,944,019 >>> mbox cmd response data (524 bytes)
33,112,150 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,142,482 UART: [rt]cmd =0x43455252, len=4
33,153,632 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
4,130,436 ready_for_fw is high
4,130,822 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,053,727 >>> mbox cmd response: success
18,054,542 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,696,770 UART:
23,697,143 UART: Running Caliptra FMC ...
23,698,246 UART:
23,698,413 UART: [state] CFI Enabled
23,706,626 UART: [fht] FMC Alias Private Key: 7
26,037,572 UART: [art] Extend RT PCRs Done
26,038,801 UART: [art] Lock RT PCRs Done
26,040,562 UART: [art] Populate DV Done
26,046,135 UART: [fht] FMC Alias Private Key: 7
26,047,784 UART: [art] Derive CDI
26,048,600 UART: [art] Store in in slot 0x4
26,091,501 UART: [art] Derive Key Pair
26,092,576 UART: [art] Store priv key in slot 0x5
29,334,598 UART: [art] Derive Key Pair - Done
29,347,657 UART: [art] Signing Cert with AUTHO
29,349,143 UART: RITY.KEYID = 7
31,628,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,711 UART: [art] PUB.X = 58D5712395A2E7D39031634F12FDA042817322CDBE9D65DAA04BA02AD82853B447499D82FDE1DB72EF835143A1F86940
31,636,924 UART: [art] PUB.Y = CDB78376189C15215ACAE06D85E344E5E2A8A074A5CF2C33720B96C944EDED9365FE545091829EFE798534EB24D04538
31,644,157 UART: [art] SIG.R = F4229366E870611371B17345A184A40741D32DFFBB0BACE7472C0BB8D640CEEEB5D102957CD8FDF62F6C9731156A400A
31,651,545 UART: [art] SIG.S = 7FDEC7B6D3A907C04694C004EE51DA0921BB1778AEDB6CC78E588CD9B63F0D3C3D5E76614F88520249E4378C8A512784
32,957,133 UART: Caliptra RT
32,957,837 UART: [state] CFI Enabled
33,076,246 UART: [rt] RT listening for mailbox commands...
33,107,338 UART: [rt]cmd =0x464d4352, len=4
33,115,040 >>> mbox cmd response data (524 bytes)
33,282,948 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,312,903 UART: [rt]cmd =0x43455252, len=4
33,324,193 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,234 writing to cptra_bootfsm_go
193,496 UART:
193,856 UART: Running Caliptra ROM ...
195,063 UART:
195,222 UART: [state] CFI Enabled
261,497 UART: [state] LifecycleState = Unprovisioned
263,345 UART: [state] DebugLocked = No
265,361 UART: [state] WD Timer not started. Device not locked for debugging
268,975 UART: [kat] SHA2-256
448,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,642 UART: [kat] ++
460,088 UART: [kat] sha1
470,608 UART: [kat] SHA2-256
473,688 UART: [kat] SHA2-384
478,682 UART: [kat] SHA2-512-ACC
481,633 UART: [kat] ECC-384
2,926,208 UART: [kat] HMAC-384Kdf
2,950,385 UART: [kat] LMS
3,479,799 UART: [kat] --
3,483,226 UART: [cold-reset] ++
3,484,165 UART: [fht] FHT @ 0x50003400
3,494,924 UART: [idev] ++
3,495,482 UART: [idev] CDI.KEYID = 6
3,496,431 UART: [idev] SUBJECT.KEYID = 7
3,497,665 UART: [idev] UDS.KEYID = 0
3,498,560 ready_for_fw is high
3,498,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,642,223 UART: [idev] Erasing UDS.KEYID = 0
6,003,159 UART: [idev] Sha1 KeyId Algorithm
6,025,864 UART: [idev] --
6,030,021 UART: [ldev] ++
6,030,612 UART: [ldev] CDI.KEYID = 6
6,031,536 UART: [ldev] SUBJECT.KEYID = 5
6,032,695 UART: [ldev] AUTHORITY.KEYID = 7
6,033,925 UART: [ldev] FE.KEYID = 1
6,078,706 UART: [ldev] Erasing FE.KEYID = 1
8,583,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,702 UART: [ldev] --
10,392,172 UART: [fwproc] Wait for Commands...
10,395,286 UART: [fwproc] Recv command 0x46574c44
10,397,373 UART: [fwproc] Recv'd Img size: 114084 bytes
13,799,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,710 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,259,066 >>> mbox cmd response: success
14,259,576 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,263,036 UART: [afmc] ++
14,263,639 UART: [afmc] CDI.KEYID = 6
14,264,553 UART: [afmc] SUBJECT.KEYID = 7
14,265,712 UART: [afmc] AUTHORITY.KEYID = 5
16,805,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,748 UART: [afmc] --
18,607,036 UART: [cold-reset] --
18,609,868 UART: [state] Locking Datavault
18,617,180 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,827 UART: [state] Locking ICCM
18,619,953 UART: [exit] Launching FMC @ 0x40000130
18,628,399 UART:
18,628,641 UART: Running Caliptra FMC ...
18,629,744 UART:
18,629,903 UART: [state] CFI Enabled
18,689,112 UART: [fht] FMC Alias Private Key: 7
20,452,489 UART: [art] Extend RT PCRs Done
20,453,729 UART: [art] Lock RT PCRs Done
20,455,382 UART: [art] Populate DV Done
20,460,841 UART: [fht] FMC Alias Private Key: 7
20,462,423 UART: [art] Derive CDI
20,463,172 UART: [art] Store in in slot 0x4
20,521,542 UART: [art] Derive Key Pair
20,522,580 UART: [art] Store priv key in slot 0x5
22,985,728 UART: [art] Derive Key Pair - Done
22,998,469 UART: [art] Signing Cert with AUTHO
22,999,768 UART: RITY.KEYID = 7
24,711,290 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,792 UART: [art] PUB.X = 887BF033A3F62D44D5435C40C89E71BB127AD800770C5683600BC64AE065853AE764BB2E7D44FE884823EB991605450B
24,720,005 UART: [art] PUB.Y = 45D651FD4B78144514C3686F96FB3E79D2D866605CCC06807A5262F4612B92CF7860316FB1AA9B2602033E9163F84135
24,727,265 UART: [art] SIG.R = C04E2504BF066AD06D62793EE55B6BDE4EAA8B86EEEA099443D3053158AA6B59BCC097C7C3CDB3BB9BEDEEB8FD8D7EF1
24,734,653 UART: [art] SIG.S = 6454A05DF19E739BE0A53B94602A48E2DC7BB523A2176C4B7B48CA8330E86AC418EB62CD90BB0EDC929C5C60925737D9
25,713,428 UART: Caliptra RT
25,714,141 UART: [state] CFI Enabled
25,878,982 UART: [rt] RT listening for mailbox commands...
25,910,506 UART: [rt]cmd =0x464d4352, len=4
25,918,022 >>> mbox cmd response data (524 bytes)
26,086,356 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,116,312 UART: [rt]cmd =0x43455252, len=4
26,127,550 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,357,671 ready_for_fw is high
3,358,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,061,797 >>> mbox cmd response: success
14,062,660 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,343,564 UART:
18,343,961 UART: Running Caliptra FMC ...
18,345,153 UART:
18,345,319 UART: [state] CFI Enabled
18,410,241 UART: [fht] FMC Alias Private Key: 7
20,174,448 UART: [art] Extend RT PCRs Done
20,175,662 UART: [art] Lock RT PCRs Done
20,177,296 UART: [art] Populate DV Done
20,182,695 UART: [fht] FMC Alias Private Key: 7
20,184,337 UART: [art] Derive CDI
20,185,148 UART: [art] Store in in slot 0x4
20,242,965 UART: [art] Derive Key Pair
20,243,986 UART: [art] Store priv key in slot 0x5
22,706,604 UART: [art] Derive Key Pair - Done
22,719,710 UART: [art] Signing Cert with AUTHO
22,721,010 UART: RITY.KEYID = 7
24,433,871 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,372 UART: [art] PUB.X = 2D66BAC45B64191BF5EA05F682DC5234107BCF16A1EC80AD809B47675514E6DBF0E50E0780C13A5E1A9B6C2CBDA52D53
24,442,654 UART: [art] PUB.Y = AFE558F9FFB6717373C8364441B33703DB8D8F9678816D96FE27993E6680F8A77808683EC9D6B862846545476F154EA3
24,449,894 UART: [art] SIG.R = 5E69E3BE5631EF855AF557B878724A794758BB7B22B49F7276F1119991E53FBDA04EE4C6E2B91A81DF35BA03F588ACB8
24,457,255 UART: [art] SIG.S = B69FCE1E1A54116BAFB53F105A2586B786071CF7D1AF0DA07C3CFE522614CCD91DE811ACA79FB0D0B3956AD9C1A95241
25,436,512 UART: Caliptra RT
25,437,210 UART: [state] CFI Enabled
25,600,455 UART: [rt] RT listening for mailbox commands...
25,632,026 UART: [rt]cmd =0x464d4352, len=4
25,639,851 >>> mbox cmd response data (524 bytes)
25,806,965 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,837,165 UART: [rt]cmd =0x43455252, len=4
25,848,698 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
193,048 UART:
193,435 UART: Running Caliptra ROM ...
194,624 UART:
604,052 UART: [state] CFI Enabled
618,929 UART: [state] LifecycleState = Unprovisioned
620,812 UART: [state] DebugLocked = No
622,686 UART: [state] WD Timer not started. Device not locked for debugging
626,152 UART: [kat] SHA2-256
805,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,820 UART: [kat] ++
817,272 UART: [kat] sha1
827,810 UART: [kat] SHA2-256
830,818 UART: [kat] SHA2-384
836,603 UART: [kat] SHA2-512-ACC
839,545 UART: [kat] ECC-384
3,282,317 UART: [kat] HMAC-384Kdf
3,294,552 UART: [kat] LMS
3,824,047 UART: [kat] --
3,828,820 UART: [cold-reset] ++
3,830,049 UART: [fht] FHT @ 0x50003400
3,842,188 UART: [idev] ++
3,842,793 UART: [idev] CDI.KEYID = 6
3,843,722 UART: [idev] SUBJECT.KEYID = 7
3,844,904 UART: [idev] UDS.KEYID = 0
3,845,837 ready_for_fw is high
3,846,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,146 UART: [idev] Erasing UDS.KEYID = 0
6,317,396 UART: [idev] Sha1 KeyId Algorithm
6,341,116 UART: [idev] --
6,345,635 UART: [ldev] ++
6,346,228 UART: [ldev] CDI.KEYID = 6
6,347,146 UART: [ldev] SUBJECT.KEYID = 5
6,348,309 UART: [ldev] AUTHORITY.KEYID = 7
6,349,543 UART: [ldev] FE.KEYID = 1
6,359,165 UART: [ldev] Erasing FE.KEYID = 1
8,830,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,873 UART: [ldev] --
10,618,683 UART: [fwproc] Wait for Commands...
10,620,942 UART: [fwproc] Recv command 0x46574c44
10,623,051 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,480,734 >>> mbox cmd response: success
14,481,253 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,485,864 UART: [afmc] ++
14,486,446 UART: [afmc] CDI.KEYID = 6
14,487,356 UART: [afmc] SUBJECT.KEYID = 7
14,488,572 UART: [afmc] AUTHORITY.KEYID = 5
16,990,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,665 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,543 UART: [afmc] --
18,788,661 UART: [cold-reset] --
18,792,792 UART: [state] Locking Datavault
18,798,740 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,821 UART: [state] Locking ICCM
18,802,344 UART: [exit] Launching FMC @ 0x40000130
18,810,752 UART:
18,810,991 UART: Running Caliptra FMC ...
18,812,096 UART:
18,812,276 UART: [state] CFI Enabled
18,820,170 UART: [fht] FMC Alias Private Key: 7
20,576,688 UART: [art] Extend RT PCRs Done
20,577,892 UART: [art] Lock RT PCRs Done
20,579,836 UART: [art] Populate DV Done
20,585,083 UART: [fht] FMC Alias Private Key: 7
20,586,801 UART: [art] Derive CDI
20,587,639 UART: [art] Store in in slot 0x4
20,630,399 UART: [art] Derive Key Pair
20,631,397 UART: [art] Store priv key in slot 0x5
23,058,158 UART: [art] Derive Key Pair - Done
23,071,370 UART: [art] Signing Cert with AUTHO
23,072,675 UART: RITY.KEYID = 7
24,778,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,733 UART: [art] PUB.X = 306D8FE126B9A4A1D7718C3B3C8138B7668CB2A2199BB2C47456FC11C9A6236EAE6C6ABDF2A29483D8BFCDAEB3B14986
24,787,062 UART: [art] PUB.Y = 7134F65F145DA9D4F56C131B9475534153B0986995C620A442B28EE94932BE4EA6D637527C5E5D23A105ED8A76AFCD2E
24,794,267 UART: [art] SIG.R = F166C95AA8C2FF93EEA89A0CF2A98F611AE19A00C0EAFB976EF9E9330510B3BAEECCBBEC7FBE5C946D179CE601796FAC
24,801,726 UART: [art] SIG.S = 2BE54226EDB34339AB264ECC26D9B9445DDC587867162F0FD622B1E7D7B55306B829D8F3A5EF04CD3AB6B1C82200A8BF
25,781,113 UART: Caliptra RT
25,781,820 UART: [state] CFI Enabled
25,899,153 UART: [rt] RT listening for mailbox commands...
25,930,725 UART: [rt]cmd =0x464d4352, len=4
25,938,174 >>> mbox cmd response data (524 bytes)
26,107,113 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,137,303 UART: [rt]cmd =0x43455252, len=4
26,148,692 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
3,697,985 ready_for_fw is high
3,698,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,926 >>> mbox cmd response: success
14,265,510 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,515,843 UART:
18,516,232 UART: Running Caliptra FMC ...
18,517,389 UART:
18,517,553 UART: [state] CFI Enabled
18,525,445 UART: [fht] FMC Alias Private Key: 7
20,281,279 UART: [art] Extend RT PCRs Done
20,282,504 UART: [art] Lock RT PCRs Done
20,283,889 UART: [art] Populate DV Done
20,289,733 UART: [fht] FMC Alias Private Key: 7
20,291,436 UART: [art] Derive CDI
20,292,174 UART: [art] Store in in slot 0x4
20,334,891 UART: [art] Derive Key Pair
20,335,934 UART: [art] Store priv key in slot 0x5
22,762,674 UART: [art] Derive Key Pair - Done
22,775,616 UART: [art] Signing Cert with AUTHO
22,776,927 UART: RITY.KEYID = 7
24,482,242 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,740 UART: [art] PUB.X = 7D49F85B99FDCAF319FD5F84A0947229A0A1B4EAD8B1B593A5C0EAEB6CD9A5DC130398158821C37D8D40C4EC5BC23A6B
24,491,081 UART: [art] PUB.Y = 5DCC57DAC4E344B5F47ECEA51A5C83B87D332FDD459B722A127A1E0F6AD1ADA2BA08927A696B0833301C5B618C8493F0
24,498,318 UART: [art] SIG.R = 308352814849BA0914D789596EBF87ED493BD65745D701A71378D3476218A190AC4FA6B572FF2595FA16DA665C2B5FD6
24,505,690 UART: [art] SIG.S = E2F443D58EE62CCE556F71876C7EF9FBC74215196A39D07FDAC374FF5C08728A135380653C7A2C41D4F7158B0A0497F4
25,484,767 UART: Caliptra RT
25,485,472 UART: [state] CFI Enabled
25,602,652 UART: [rt] RT listening for mailbox commands...
25,633,906 UART: [rt]cmd =0x464d4352, len=4
25,641,376 >>> mbox cmd response data (524 bytes)
25,809,495 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,839,623 UART: [rt]cmd =0x43455252, len=4
25,851,102 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,363 UART:
192,735 UART: Running Caliptra ROM ...
193,826 UART:
193,968 UART: [state] CFI Enabled
264,423 UART: [state] LifecycleState = Unprovisioned
266,850 UART: [state] DebugLocked = No
268,728 UART: [state] WD Timer not started. Device not locked for debugging
274,002 UART: [kat] SHA2-256
463,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,709 UART: [kat] ++
475,158 UART: [kat] sha1
485,958 UART: [kat] SHA2-256
488,969 UART: [kat] SHA2-384
495,592 UART: [kat] SHA2-512-ACC
498,173 UART: [kat] ECC-384
2,948,025 UART: [kat] HMAC-384Kdf
2,971,984 UART: [kat] LMS
3,503,739 UART: [kat] --
3,508,517 UART: [cold-reset] ++
3,510,659 UART: [fht] FHT @ 0x50003400
3,521,771 UART: [idev] ++
3,522,407 UART: [idev] CDI.KEYID = 6
3,523,359 UART: [idev] SUBJECT.KEYID = 7
3,524,618 UART: [idev] UDS.KEYID = 0
3,525,518 ready_for_fw is high
3,525,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,304 UART: [idev] Erasing UDS.KEYID = 0
6,030,002 UART: [idev] Sha1 KeyId Algorithm
6,053,041 UART: [idev] --
6,056,591 UART: [ldev] ++
6,057,284 UART: [ldev] CDI.KEYID = 6
6,058,190 UART: [ldev] SUBJECT.KEYID = 5
6,059,330 UART: [ldev] AUTHORITY.KEYID = 7
6,060,614 UART: [ldev] FE.KEYID = 1
6,099,647 UART: [ldev] Erasing FE.KEYID = 1
8,607,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,517 UART: [ldev] --
10,411,727 UART: [fwproc] Wait for Commands...
10,414,409 UART: [fwproc] Recv command 0x46574c44
10,416,726 UART: [fwproc] Recv'd Img size: 114084 bytes
13,856,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,512 >>> mbox cmd response: success
14,595,024 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,599,188 UART: [afmc] ++
14,599,900 UART: [afmc] CDI.KEYID = 6
14,601,008 UART: [afmc] SUBJECT.KEYID = 7
14,602,561 UART: [afmc] AUTHORITY.KEYID = 5
17,126,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,926 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,975 UART: [afmc] --
18,924,243 UART: [cold-reset] --
18,927,787 UART: [state] Locking Datavault
18,932,994 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,176 UART: [state] Locking ICCM
18,937,047 UART: [exit] Launching FMC @ 0x40000130
18,945,738 UART:
18,945,968 UART: Running Caliptra FMC ...
18,947,065 UART:
18,947,224 UART: [state] CFI Enabled
19,008,686 UART: [fht] FMC Alias Private Key: 7
20,772,621 UART: [art] Extend RT PCRs Done
20,773,995 UART: [art] Lock RT PCRs Done
20,775,409 UART: [art] Populate DV Done
20,780,707 UART: [fht] FMC Alias Private Key: 7
20,782,249 UART: [art] Derive CDI
20,782,983 UART: [art] Store in in slot 0x4
20,840,747 UART: [art] Derive Key Pair
20,841,737 UART: [art] Store priv key in slot 0x5
23,305,072 UART: [art] Derive Key Pair - Done
23,317,969 UART: [art] Signing Cert with AUTHO
23,319,275 UART: RITY.KEYID = 7
25,030,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,935 UART: [art] PUB.X = 5D11CB4A2B6A586B18508D174F40313E03A64A13DA0787379AB07927F6D2378ECF61F2083C005D3813DE3B0C1E167EF1
25,039,153 UART: [art] PUB.Y = 4B7702CBE6FA71C77731C4D943278B68BBDB22BA749221971AB631EAC0AD51CC748F88AEAD3C8640B145CFC2ACEF57C5
25,046,403 UART: [art] SIG.R = 2A08A747DBD50C67C9DE4181742962E0D96AC4AE7704CA5BEE9560BFBEED9444EAC499CB04BB81E67CCB1584AC459007
25,053,814 UART: [art] SIG.S = 48C0E06C32CFD0E454AB2BEB43186B89FF73A1BF5C269F7BEC2C738241E475D63313DC3E727217BC589303C5F6042A08
26,032,839 UART: Caliptra RT
26,033,565 UART: [state] CFI Enabled
26,197,921 UART: [rt] RT listening for mailbox commands...
26,229,273 UART: [rt]cmd =0x464d4352, len=4
26,236,933 >>> mbox cmd response data (524 bytes)
26,405,003 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,435,090 UART: [rt]cmd =0x43455252, len=4
26,446,607 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
3,435,515 ready_for_fw is high
3,435,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,649 >>> mbox cmd response: success
14,725,224 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,001,577 UART:
19,001,965 UART: Running Caliptra FMC ...
19,003,272 UART:
19,003,439 UART: [state] CFI Enabled
19,071,517 UART: [fht] FMC Alias Private Key: 7
20,835,100 UART: [art] Extend RT PCRs Done
20,836,311 UART: [art] Lock RT PCRs Done
20,838,045 UART: [art] Populate DV Done
20,843,197 UART: [fht] FMC Alias Private Key: 7
20,844,823 UART: [art] Derive CDI
20,845,565 UART: [art] Store in in slot 0x4
20,905,022 UART: [art] Derive Key Pair
20,906,072 UART: [art] Store priv key in slot 0x5
23,368,874 UART: [art] Derive Key Pair - Done
23,381,662 UART: [art] Signing Cert with AUTHO
23,382,964 UART: RITY.KEYID = 7
25,094,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,744 UART: [art] PUB.X = 2BC39A6E008BAEB0120FB5E4291B5DB30367C7A843F6A747C601C5C125A160D26997AF20A59FEDD9F86D99700D30A6D3
25,102,981 UART: [art] PUB.Y = 5BC15129E31D78F077954020EB33AF3DD32BCC912DD050A2AA594376662FBAEFA70E74B3EEFAE6B50882AA3FE86E0E2B
25,110,281 UART: [art] SIG.R = 48E8B8E3075681E60D4022C4CC7B800EE25B9111E1D31736B3368B92C5FE70717785832C03A02A7F2A00CA8BAABD5358
25,117,669 UART: [art] SIG.S = 599B568B8D0B141A386C5220794A8C460146813CB58FB332EA51AEBB1AE8373785D127C4BE1B7E4A0C0AC5B84ED3010E
26,095,685 UART: Caliptra RT
26,096,377 UART: [state] CFI Enabled
26,262,276 UART: [rt] RT listening for mailbox commands...
26,293,630 UART: [rt]cmd =0x464d4352, len=4
26,301,166 >>> mbox cmd response data (524 bytes)
26,469,109 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,499,302 UART: [rt]cmd =0x43455252, len=4
26,510,830 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,905 writing to cptra_bootfsm_go
193,140 UART:
193,497 UART: Running Caliptra ROM ...
194,612 UART:
604,276 UART: [state] CFI Enabled
615,104 UART: [state] LifecycleState = Unprovisioned
617,478 UART: [state] DebugLocked = No
619,928 UART: [state] WD Timer not started. Device not locked for debugging
623,897 UART: [kat] SHA2-256
813,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,562 UART: [kat] ++
825,170 UART: [kat] sha1
836,616 UART: [kat] SHA2-256
839,621 UART: [kat] SHA2-384
846,202 UART: [kat] SHA2-512-ACC
848,786 UART: [kat] ECC-384
3,291,420 UART: [kat] HMAC-384Kdf
3,303,804 UART: [kat] LMS
3,835,565 UART: [kat] --
3,839,017 UART: [cold-reset] ++
3,840,599 UART: [fht] FHT @ 0x50003400
3,853,074 UART: [idev] ++
3,853,782 UART: [idev] CDI.KEYID = 6
3,854,660 UART: [idev] SUBJECT.KEYID = 7
3,855,903 UART: [idev] UDS.KEYID = 0
3,856,804 ready_for_fw is high
3,856,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,312 UART: [idev] Erasing UDS.KEYID = 0
6,336,530 UART: [idev] Sha1 KeyId Algorithm
6,359,914 UART: [idev] --
6,364,583 UART: [ldev] ++
6,365,267 UART: [ldev] CDI.KEYID = 6
6,366,202 UART: [ldev] SUBJECT.KEYID = 5
6,367,358 UART: [ldev] AUTHORITY.KEYID = 7
6,368,591 UART: [ldev] FE.KEYID = 1
6,379,376 UART: [ldev] Erasing FE.KEYID = 1
8,858,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,963 UART: [ldev] --
10,650,210 UART: [fwproc] Wait for Commands...
10,653,062 UART: [fwproc] Recv command 0x46574c44
10,655,374 UART: [fwproc] Recv'd Img size: 114084 bytes
14,104,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,841,228 >>> mbox cmd response: success
14,841,745 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,845,267 UART: [afmc] ++
14,845,961 UART: [afmc] CDI.KEYID = 6
14,847,209 UART: [afmc] SUBJECT.KEYID = 7
14,848,648 UART: [afmc] AUTHORITY.KEYID = 5
17,352,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,154 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,518 UART: [afmc] --
19,150,851 UART: [cold-reset] --
19,154,314 UART: [state] Locking Datavault
19,158,931 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,085 UART: [state] Locking ICCM
19,162,487 UART: [exit] Launching FMC @ 0x40000130
19,171,167 UART:
19,171,415 UART: Running Caliptra FMC ...
19,172,516 UART:
19,172,672 UART: [state] CFI Enabled
19,181,043 UART: [fht] FMC Alias Private Key: 7
20,937,779 UART: [art] Extend RT PCRs Done
20,938,998 UART: [art] Lock RT PCRs Done
20,940,923 UART: [art] Populate DV Done
20,946,443 UART: [fht] FMC Alias Private Key: 7
20,948,068 UART: [art] Derive CDI
20,948,813 UART: [art] Store in in slot 0x4
20,991,356 UART: [art] Derive Key Pair
20,992,375 UART: [art] Store priv key in slot 0x5
23,419,410 UART: [art] Derive Key Pair - Done
23,432,244 UART: [art] Signing Cert with AUTHO
23,433,588 UART: RITY.KEYID = 7
25,139,017 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,533 UART: [art] PUB.X = 928E52217DF19508075196FA3313A2FABDFEDE22625D67F39761743DC51148E24A41AF9F8F653BCCC2C082C237D08F9A
25,147,815 UART: [art] PUB.Y = CB39D9A622D7154AD02E5D2C61D82926C2FF47027961EACC6B5F9F33BF832EE510EA2429B996EBFF83130029D8265E78
25,155,076 UART: [art] SIG.R = 078F2AC90A8EF13C5CD8FE4BBED5B236393DFFB73ADB5A27EC25FBF57694B14422B94B18EEE576C7B1444AC4E8DFB920
25,162,454 UART: [art] SIG.S = 09FE473D21EE9D7CFEE537B11F312C75FB10CE8790725D73976BE760EE84560DE635C20EDBBE3C1DEB8C2FD09AC92F22
26,142,065 UART: Caliptra RT
26,142,781 UART: [state] CFI Enabled
26,260,611 UART: [rt] RT listening for mailbox commands...
26,292,133 UART: [rt]cmd =0x464d4352, len=4
26,299,762 >>> mbox cmd response data (524 bytes)
26,469,517 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,499,571 UART: [rt]cmd =0x43455252, len=4
26,510,751 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,709 writing to cptra_bootfsm_go
3,757,399 ready_for_fw is high
3,757,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,941,703 >>> mbox cmd response: success
14,942,586 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,195,387 UART:
19,195,788 UART: Running Caliptra FMC ...
19,196,903 UART:
19,197,059 UART: [state] CFI Enabled
19,204,953 UART: [fht] FMC Alias Private Key: 7
20,961,774 UART: [art] Extend RT PCRs Done
20,963,002 UART: [art] Lock RT PCRs Done
20,964,553 UART: [art] Populate DV Done
20,970,244 UART: [fht] FMC Alias Private Key: 7
20,971,737 UART: [art] Derive CDI
20,972,474 UART: [art] Store in in slot 0x4
21,014,963 UART: [art] Derive Key Pair
21,016,011 UART: [art] Store priv key in slot 0x5
23,442,933 UART: [art] Derive Key Pair - Done
23,456,268 UART: [art] Signing Cert with AUTHO
23,457,572 UART: RITY.KEYID = 7
25,162,920 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,435 UART: [art] PUB.X = 515963E2C7BC6D039679F6720A2E4BEB92D3E295A443ED704CB76BC548F4D88EF67F74B937386948B5867353E90A4F35
25,171,706 UART: [art] PUB.Y = 57EF04A1C5627263B2642E3F2A569E0FFAACE13D160DAD832BEF0F262A61D0EC56FE769291EEF69E8D083C85564DBE1E
25,178,917 UART: [art] SIG.R = D8FF831D55FCDB7C78CFDFC9523EE18C690B9A05E1CF76014D19E900CF6D1843112C08D6D8A2E17D79BAC72C25C71EE9
25,186,313 UART: [art] SIG.S = 3BD4199C5366D87C4FECE8E24A0603BED12191CF791B7E70F0B8B91A95AA802CDCF5D4013AF7C23879A8B1E669289EC8
26,166,062 UART: Caliptra RT
26,166,778 UART: [state] CFI Enabled
26,284,272 UART: [rt] RT listening for mailbox commands...
26,315,674 UART: [rt]cmd =0x464d4352, len=4
26,323,335 >>> mbox cmd response data (524 bytes)
26,491,954 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,521,971 UART: [rt]cmd =0x43455252, len=4
26,533,370 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,353 UART: [state] DebugLocked = No
86,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,593 UART: [kat] SHA2-256
881,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,639 UART: [kat] ++
885,791 UART: [kat] sha1
890,117 UART: [kat] SHA2-256
892,055 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,384 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,263 UART: [cold-reset] ++
1,476,651 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 ready_for_fw is high
1,480,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,505,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,674 UART: [idev] --
1,514,735 UART: [ldev] ++
1,514,903 UART: [ldev] CDI.KEYID = 6
1,515,266 UART: [ldev] SUBJECT.KEYID = 5
1,515,692 UART: [ldev] AUTHORITY.KEYID = 7
1,516,155 UART: [ldev] FE.KEYID = 1
1,521,311 UART: [ldev] Erasing FE.KEYID = 1
1,546,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,754 UART: [ldev] --
1,586,093 UART: [fwproc] Waiting for Commands...
1,586,954 UART: [fwproc] Received command 0x46574c44
1,587,745 UART: [fwproc] Received Image of size 114084 bytes
2,883,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,708 >>> mbox cmd response: success
3,075,708 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,076,766 UART: [afmc] ++
3,076,934 UART: [afmc] CDI.KEYID = 6
3,077,296 UART: [afmc] SUBJECT.KEYID = 7
3,077,721 UART: [afmc] AUTHORITY.KEYID = 5
3,113,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,225 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,915 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,722 UART: [afmc] --
3,156,792 UART: [cold-reset] --
3,157,638 UART: [state] Locking Datavault
3,158,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,553 UART: [state] Locking ICCM
3,159,987 UART: [exit] Launching FMC @ 0x40000130
3,165,316 UART:
3,165,332 UART: Running Caliptra FMC ...
3,165,740 UART:
3,165,794 UART: [state] CFI Enabled
3,176,001 UART: [fht] FMC Alias Private Key: 7
3,284,304 UART: [art] Extend RT PCRs Done
3,284,732 UART: [art] Lock RT PCRs Done
3,286,434 UART: [art] Populate DV Done
3,294,667 UART: [fht] FMC Alias Private Key: 7
3,295,651 UART: [art] Derive CDI
3,295,931 UART: [art] Store in in slot 0x4
3,381,574 UART: [art] Derive Key Pair
3,381,934 UART: [art] Store priv key in slot 0x5
3,394,836 UART: [art] Derive Key Pair - Done
3,409,544 UART: [art] Signing Cert with AUTHO
3,410,024 UART: RITY.KEYID = 7
3,424,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,703 UART: [art] PUB.X = 27A1F6A0E82FE5E138071FD5909E880686A3FF36224FFE035215868674EAA789AAFABE1DE2CE6B91D7ED98D4BEEE28A7
3,432,480 UART: [art] PUB.Y = 8310AB185B24381F8F63840BF36CE55FE231D5646A0A7B166FFABC94D4881B0B799551A7270261C0B47736B6E66E1BE2
3,439,418 UART: [art] SIG.R = DC4FC3D9E7B2C04BE9BE437C9823DE2D0000233921CE73C01903E9FC289254C29E54BCF471BD91B87D5E4E52F9700470
3,446,144 UART: [art] SIG.S = 514368A86C98E1DA6BF5B4DBB7F7586EE00F3E3FAD59D92DD18A89903B42FA7311FA8F448EBB5C3424350102033E784D
3,469,639 UART: Caliptra RT
3,469,892 UART: [state] CFI Enabled
3,578,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,501 UART: [rt]cmd =0x464d4352, len=4
3,615,902 >>> mbox cmd response data (524 bytes)
3,615,903 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,220 UART: [rt]cmd =0x43455252, len=4
3,655,984 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,320 >>> mbox cmd response: success
2,924,320 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,986,082 UART:
2,986,098 UART: Running Caliptra FMC ...
2,986,506 UART:
2,986,560 UART: [state] CFI Enabled
2,997,005 UART: [fht] FMC Alias Private Key: 7
3,105,140 UART: [art] Extend RT PCRs Done
3,105,568 UART: [art] Lock RT PCRs Done
3,107,544 UART: [art] Populate DV Done
3,115,681 UART: [fht] FMC Alias Private Key: 7
3,116,685 UART: [art] Derive CDI
3,116,965 UART: [art] Store in in slot 0x4
3,202,770 UART: [art] Derive Key Pair
3,203,130 UART: [art] Store priv key in slot 0x5
3,216,208 UART: [art] Derive Key Pair - Done
3,231,111 UART: [art] Signing Cert with AUTHO
3,231,591 UART: RITY.KEYID = 7
3,246,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,206 UART: [art] PUB.X = 22BB46B31053DCB2C9C2609BF3EB645BE673A2EEEF36342CB7B6722AB0F4C6D0C447AED56BF8A1F16355B61EC7E51DBA
3,253,998 UART: [art] PUB.Y = 6B6C5784CA34D0377DD42DD4754D1FE572EBDA41D38D5064569A6C492BABBC96C8B5BC7244B78249627AEFAE3A02CFAB
3,260,963 UART: [art] SIG.R = 2ED1E793CA01D5B0A76AB983BC733B1D55238D3C8EC493C4FA34563752FB4C3ED1675836558349B8C56275C9B9A4B06E
3,267,734 UART: [art] SIG.S = 527D9E6AE26A4B271AC23AFE362ADFE1594507D2742DAE1CEB21923D6EC238E9D617367133A98D2D42AC72704D2CFA83
3,291,620 UART: Caliptra RT
3,291,873 UART: [state] CFI Enabled
3,400,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,149 UART: [rt]cmd =0x464d4352, len=4
3,438,234 >>> mbox cmd response data (524 bytes)
3,438,235 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,760 UART: [rt]cmd =0x43455252, len=4
3,478,366 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,135 UART: [kat] HMAC-384Kdf
907,949 UART: [kat] LMS
1,476,145 UART: [kat] --
1,477,188 UART: [cold-reset] ++
1,477,528 UART: [fht] Storing FHT @ 0x50003400
1,480,367 UART: [idev] ++
1,480,535 UART: [idev] CDI.KEYID = 6
1,480,895 UART: [idev] SUBJECT.KEYID = 7
1,481,319 UART: [idev] UDS.KEYID = 0
1,481,664 ready_for_fw is high
1,481,664 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,506,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,683 UART: [idev] --
1,515,740 UART: [ldev] ++
1,515,908 UART: [ldev] CDI.KEYID = 6
1,516,271 UART: [ldev] SUBJECT.KEYID = 5
1,516,697 UART: [ldev] AUTHORITY.KEYID = 7
1,517,160 UART: [ldev] FE.KEYID = 1
1,522,420 UART: [ldev] Erasing FE.KEYID = 1
1,548,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,553 UART: [ldev] --
1,587,868 UART: [fwproc] Waiting for Commands...
1,588,701 UART: [fwproc] Received command 0x46574c44
1,589,492 UART: [fwproc] Received Image of size 114084 bytes
2,884,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,519 >>> mbox cmd response: success
3,075,519 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,076,567 UART: [afmc] ++
3,076,735 UART: [afmc] CDI.KEYID = 6
3,077,097 UART: [afmc] SUBJECT.KEYID = 7
3,077,522 UART: [afmc] AUTHORITY.KEYID = 5
3,112,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,672 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,362 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,209 UART: [afmc] --
3,156,127 UART: [cold-reset] --
3,156,895 UART: [state] Locking Datavault
3,158,180 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,784 UART: [state] Locking ICCM
3,159,420 UART: [exit] Launching FMC @ 0x40000130
3,164,749 UART:
3,164,765 UART: Running Caliptra FMC ...
3,165,173 UART:
3,165,316 UART: [state] CFI Enabled
3,176,185 UART: [fht] FMC Alias Private Key: 7
3,284,130 UART: [art] Extend RT PCRs Done
3,284,558 UART: [art] Lock RT PCRs Done
3,285,804 UART: [art] Populate DV Done
3,294,017 UART: [fht] FMC Alias Private Key: 7
3,295,019 UART: [art] Derive CDI
3,295,299 UART: [art] Store in in slot 0x4
3,380,716 UART: [art] Derive Key Pair
3,381,076 UART: [art] Store priv key in slot 0x5
3,394,260 UART: [art] Derive Key Pair - Done
3,409,266 UART: [art] Signing Cert with AUTHO
3,409,746 UART: RITY.KEYID = 7
3,425,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,815 UART: [art] PUB.X = 6342628636A177864E7645B04F9CE155E14E908442B935107774D17BEEA23374956035B5E0E9261D801884E3707389F1
3,432,563 UART: [art] PUB.Y = 648312359EA2F07E537AF637A3469A4581F0D585687D074AF8BFE6141981C93B6D4EB42D4A0429A6C32168EBFB441B11
3,439,505 UART: [art] SIG.R = 00943E429E07C70D8C12CE10E926447FE15066D2E54AC475104159BAE9C19B44680270468F03537CCD7B252F0DB400A4
3,446,210 UART: [art] SIG.S = AE3B5FD29236D4CB497C63E85C6C3EFC65E8AB1BF7E7147085E7D2E773D2E4DCB91FE0FE779E0D383E6EB11F292A1900
3,469,802 UART: Caliptra RT
3,470,147 UART: [state] CFI Enabled
3,578,557 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,095 UART: [rt]cmd =0x464d4352, len=4
3,616,416 >>> mbox cmd response data (524 bytes)
3,616,417 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,968 UART: [rt]cmd =0x43455252, len=4
3,656,847 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,618 ready_for_fw is high
1,363,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,247 >>> mbox cmd response: success
2,925,247 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,986,411 UART:
2,986,427 UART: Running Caliptra FMC ...
2,986,835 UART:
2,986,978 UART: [state] CFI Enabled
2,997,613 UART: [fht] FMC Alias Private Key: 7
3,105,330 UART: [art] Extend RT PCRs Done
3,105,758 UART: [art] Lock RT PCRs Done
3,107,378 UART: [art] Populate DV Done
3,115,685 UART: [fht] FMC Alias Private Key: 7
3,116,615 UART: [art] Derive CDI
3,116,895 UART: [art] Store in in slot 0x4
3,202,634 UART: [art] Derive Key Pair
3,202,994 UART: [art] Store priv key in slot 0x5
3,216,372 UART: [art] Derive Key Pair - Done
3,231,154 UART: [art] Signing Cert with AUTHO
3,231,634 UART: RITY.KEYID = 7
3,246,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,595 UART: [art] PUB.X = 925A0735D58DA4BFD987DF557771D511C188FAE5BCF36B4B2059E64D53F0A93CF5D4BABCF3756DF5992D33B3B47F3CEB
3,254,380 UART: [art] PUB.Y = BF54335A299611BBEEB329F3754F0D8A0826B9C6732B8652B76A612AFAB98AE68294F876CFDEF64042D9017B89817231
3,261,321 UART: [art] SIG.R = A5B9D4D391F16D8A54BF80BAF76A4A407F56C58CD7D4AEF7A50C4A5958CDDD7635B4B1E8F009D8107AF79A27E7C21DDB
3,268,107 UART: [art] SIG.S = 2B3D2BC85FC91AD1D448718925200E8252C4ACC037C1392FAB122A4F8B3911807A29DAC093CFA52D6E7FC7E29F75DA73
3,292,021 UART: Caliptra RT
3,292,366 UART: [state] CFI Enabled
3,400,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,533 UART: [rt]cmd =0x464d4352, len=4
3,438,558 >>> mbox cmd response data (524 bytes)
3,438,559 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,810 UART: [rt]cmd =0x43455252, len=4
3,478,738 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,756 UART: [kat] HMAC-384Kdf
923,120 UART: [kat] LMS
1,171,448 UART: [kat] --
1,172,315 UART: [cold-reset] ++
1,172,891 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,176,849 ready_for_fw is high
1,176,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,070 UART: [idev] Erasing UDS.KEYID = 0
1,201,093 UART: [idev] Sha1 KeyId Algorithm
1,209,699 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,755 UART: [ldev] --
1,283,158 UART: [fwproc] Wait for Commands...
1,283,918 UART: [fwproc] Recv command 0x46574c44
1,284,646 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,151 >>> mbox cmd response: success
2,771,151 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,772,231 UART: [afmc] ++
2,772,399 UART: [afmc] CDI.KEYID = 6
2,772,761 UART: [afmc] SUBJECT.KEYID = 7
2,773,186 UART: [afmc] AUTHORITY.KEYID = 5
2,808,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,424 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,037 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,692 UART: [afmc] --
2,851,780 UART: [cold-reset] --
2,852,826 UART: [state] Locking Datavault
2,853,935 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,539 UART: [state] Locking ICCM
2,855,059 UART: [exit] Launching FMC @ 0x40000130
2,860,388 UART:
2,860,404 UART: Running Caliptra FMC ...
2,860,812 UART:
2,860,866 UART: [state] CFI Enabled
2,871,503 UART: [fht] FMC Alias Private Key: 7
2,979,810 UART: [art] Extend RT PCRs Done
2,980,238 UART: [art] Lock RT PCRs Done
2,981,668 UART: [art] Populate DV Done
2,989,877 UART: [fht] FMC Alias Private Key: 7
2,990,829 UART: [art] Derive CDI
2,991,109 UART: [art] Store in in slot 0x4
3,077,016 UART: [art] Derive Key Pair
3,077,376 UART: [art] Store priv key in slot 0x5
3,090,864 UART: [art] Derive Key Pair - Done
3,105,752 UART: [art] Signing Cert with AUTHO
3,106,232 UART: RITY.KEYID = 7
3,121,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,745 UART: [art] PUB.X = D2E7A2B1C12C71D22BF3E3D39C91E2283E7ABD7019CF691A46E7EA22267744C3D3CD3CC1E72973E15C541C119098F52D
3,129,523 UART: [art] PUB.Y = 61E3E99BB59689D8844D4457342A42887F5CAA002E497AA0394287CA24370C07071FF89B0207382C2DE87D1F465805CD
3,136,425 UART: [art] SIG.R = 552E107ED964D945F6985CA4375B67B0E6349AFBAE0E5B6F8DACA8CA889A725C12DE2414CA412A50CD09B9138D36FB53
3,143,201 UART: [art] SIG.S = BFB25E422A79EB9005891F58B0FBF501B56E207CAF1B2C6C2F3D1583573AA200EF85EEAE23027BE18BE031941BC24C03
3,167,106 UART: Caliptra RT
3,167,359 UART: [state] CFI Enabled
3,275,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,476 UART: [rt]cmd =0x464d4352, len=4
3,312,415 >>> mbox cmd response data (524 bytes)
3,312,416 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,557 UART: [rt]cmd =0x43455252, len=4
3,352,359 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,063 ready_for_fw is high
1,061,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,534 >>> mbox cmd response: success
2,621,534 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,683,422 UART:
2,683,438 UART: Running Caliptra FMC ...
2,683,846 UART:
2,683,900 UART: [state] CFI Enabled
2,694,659 UART: [fht] FMC Alias Private Key: 7
2,801,882 UART: [art] Extend RT PCRs Done
2,802,310 UART: [art] Lock RT PCRs Done
2,804,108 UART: [art] Populate DV Done
2,812,081 UART: [fht] FMC Alias Private Key: 7
2,813,085 UART: [art] Derive CDI
2,813,365 UART: [art] Store in in slot 0x4
2,898,690 UART: [art] Derive Key Pair
2,899,050 UART: [art] Store priv key in slot 0x5
2,911,758 UART: [art] Derive Key Pair - Done
2,926,084 UART: [art] Signing Cert with AUTHO
2,926,564 UART: RITY.KEYID = 7
2,941,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,229 UART: [art] PUB.X = 78F912FFEEAF0B5668402E203830196E966340F371BACB856442D8BEA10199F2D6FD0543B3DD7C4C263C4B064E122169
2,948,987 UART: [art] PUB.Y = 21E1A8184C2A0313CC4F2CB32E35ACE8F39FE1E7D54EF2EAFD3DF4C5BC5A41925B79198DCAE6DB44E8D5CE7BDFA50445
2,955,959 UART: [art] SIG.R = C8B237155170EAD63B814844FD2D680B8DA98615B7A2BD0A4E79EBE5E1CC8BCE93EDC91D8ADC0AF70E8A9687777C1BA4
2,962,737 UART: [art] SIG.S = B2A59D51C070DF1CA4150A7F39D65BCF4404177A9C97A85CD9164D0F367E2ABE67B01264CB3733C940992184582C005C
2,987,053 UART: Caliptra RT
2,987,306 UART: [state] CFI Enabled
3,095,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,074 UART: [rt]cmd =0x464d4352, len=4
3,133,315 >>> mbox cmd response data (524 bytes)
3,133,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,781 UART: [rt]cmd =0x43455252, len=4
3,173,578 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,046 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,386 UART: [kat] SHA2-256
904,326 UART: [kat] SHA2-384
906,883 UART: [kat] SHA2-512-ACC
908,784 UART: [kat] ECC-384
918,447 UART: [kat] HMAC-384Kdf
923,017 UART: [kat] LMS
1,171,345 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,514 UART: [fht] FHT @ 0x50003400
1,175,269 UART: [idev] ++
1,175,437 UART: [idev] CDI.KEYID = 6
1,175,797 UART: [idev] SUBJECT.KEYID = 7
1,176,221 UART: [idev] UDS.KEYID = 0
1,176,566 ready_for_fw is high
1,176,566 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,568 UART: [idev] Sha1 KeyId Algorithm
1,210,092 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,108 UART: [ldev] Erasing FE.KEYID = 1
1,244,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,614 UART: [ldev] --
1,283,889 UART: [fwproc] Wait for Commands...
1,284,655 UART: [fwproc] Recv command 0x46574c44
1,285,383 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,936 >>> mbox cmd response: success
2,772,936 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,974 UART: [afmc] ++
2,774,142 UART: [afmc] CDI.KEYID = 6
2,774,504 UART: [afmc] SUBJECT.KEYID = 7
2,774,929 UART: [afmc] AUTHORITY.KEYID = 5
2,810,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,001 UART: [afmc] --
2,854,003 UART: [cold-reset] --
2,854,813 UART: [state] Locking Datavault
2,855,784 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,388 UART: [state] Locking ICCM
2,856,982 UART: [exit] Launching FMC @ 0x40000130
2,862,311 UART:
2,862,327 UART: Running Caliptra FMC ...
2,862,735 UART:
2,862,878 UART: [state] CFI Enabled
2,873,375 UART: [fht] FMC Alias Private Key: 7
2,980,996 UART: [art] Extend RT PCRs Done
2,981,424 UART: [art] Lock RT PCRs Done
2,982,864 UART: [art] Populate DV Done
2,991,017 UART: [fht] FMC Alias Private Key: 7
2,991,973 UART: [art] Derive CDI
2,992,253 UART: [art] Store in in slot 0x4
3,078,226 UART: [art] Derive Key Pair
3,078,586 UART: [art] Store priv key in slot 0x5
3,091,826 UART: [art] Derive Key Pair - Done
3,106,717 UART: [art] Signing Cert with AUTHO
3,107,197 UART: RITY.KEYID = 7
3,122,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,954 UART: [art] PUB.X = 0FC4845A1BF446529C97251100E4B3ECAF68760B4E7392FEEB95468D344567FAEA91D4997DD8A8582C973288B0A46100
3,129,672 UART: [art] PUB.Y = D0821C059FD6DD1E6FFF6706629F498A8A94ABC4032D59FCDE3E01C6EB7C6675159B83C38CE81475FE5A97BF6F8AEAE3
3,136,628 UART: [art] SIG.R = 44CFD431187813FB18DE0812259A062F19A775C1F58A91D0466BE58628F58282A3298B19DD76C5178809A58AB42C6A4F
3,143,383 UART: [art] SIG.S = 199655F69C0045F45173CA21DF58D1DCDCA078215A0BDDA803A0F83192C04109C8A2E3CFABA4595A766AB783F772344E
3,166,255 UART: Caliptra RT
3,166,600 UART: [state] CFI Enabled
3,274,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,753 UART: [rt]cmd =0x464d4352, len=4
3,311,706 >>> mbox cmd response data (524 bytes)
3,311,707 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,922 UART: [rt]cmd =0x43455252, len=4
3,351,932 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,120 ready_for_fw is high
1,061,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,775 >>> mbox cmd response: success
2,624,775 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,686,471 UART:
2,686,487 UART: Running Caliptra FMC ...
2,686,895 UART:
2,687,038 UART: [state] CFI Enabled
2,697,329 UART: [fht] FMC Alias Private Key: 7
2,804,956 UART: [art] Extend RT PCRs Done
2,805,384 UART: [art] Lock RT PCRs Done
2,806,616 UART: [art] Populate DV Done
2,815,027 UART: [fht] FMC Alias Private Key: 7
2,816,197 UART: [art] Derive CDI
2,816,477 UART: [art] Store in in slot 0x4
2,902,708 UART: [art] Derive Key Pair
2,903,068 UART: [art] Store priv key in slot 0x5
2,916,220 UART: [art] Derive Key Pair - Done
2,930,789 UART: [art] Signing Cert with AUTHO
2,931,269 UART: RITY.KEYID = 7
2,946,811 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,576 UART: [art] PUB.X = E3EDC71A17A6A133565278706D081C20FF7FE86F9FECEB10F00708A68A4D89626AD3D9D0D76C431CCD415D323B02F04B
2,954,344 UART: [art] PUB.Y = 12978D4593527771F2F66E20E553057F81BCBFE29034914302F9B911A6C70F258BB056430DDD95B36359CCCEFF91C880
2,961,278 UART: [art] SIG.R = F99B54937087DEB393D225B1673FF7FDD3CFD31A8DBCEB9937871E855797EA55A5CEFA124B5C876517CB19C024C716C1
2,968,058 UART: [art] SIG.S = 85E9174B6A59CAB28D8279EBF6AA7688C751ECF0B08937BCE8D2E6EFDB160F2340E16708BAC8ED79D5912762ED6320B2
2,991,823 UART: Caliptra RT
2,992,168 UART: [state] CFI Enabled
3,101,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,796 UART: [rt]cmd =0x464d4352, len=4
3,139,101 >>> mbox cmd response data (524 bytes)
3,139,102 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,645 UART: [rt]cmd =0x43455252, len=4
3,179,430 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 ready_for_fw is high
1,174,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,896 UART: [ldev] ++
1,209,064 UART: [ldev] CDI.KEYID = 6
1,209,428 UART: [ldev] SUBJECT.KEYID = 5
1,209,855 UART: [ldev] AUTHORITY.KEYID = 7
1,210,318 UART: [ldev] FE.KEYID = 1
1,215,798 UART: [ldev] Erasing FE.KEYID = 1
1,241,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,340 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,111 >>> mbox cmd response: success
2,769,111 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,770,366 UART: [afmc] ++
2,770,534 UART: [afmc] CDI.KEYID = 6
2,770,897 UART: [afmc] SUBJECT.KEYID = 7
2,771,323 UART: [afmc] AUTHORITY.KEYID = 5
2,806,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,235 UART: [afmc] --
2,850,319 UART: [cold-reset] --
2,851,421 UART: [state] Locking Datavault
2,852,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,244 UART: [state] Locking ICCM
2,853,740 UART: [exit] Launching FMC @ 0x40000130
2,859,069 UART:
2,859,085 UART: Running Caliptra FMC ...
2,859,493 UART:
2,859,547 UART: [state] CFI Enabled
2,869,896 UART: [fht] FMC Alias Private Key: 7
2,978,209 UART: [art] Extend RT PCRs Done
2,978,637 UART: [art] Lock RT PCRs Done
2,980,723 UART: [art] Populate DV Done
2,988,686 UART: [fht] FMC Alias Private Key: 7
2,989,802 UART: [art] Derive CDI
2,990,082 UART: [art] Store in in slot 0x4
3,075,817 UART: [art] Derive Key Pair
3,076,177 UART: [art] Store priv key in slot 0x5
3,089,423 UART: [art] Derive Key Pair - Done
3,104,266 UART: [art] Signing Cert with AUTHO
3,104,746 UART: RITY.KEYID = 7
3,120,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,197 UART: [art] PUB.X = 6558C3BD45A277342E0968E3B5800C85998C4F6EA221B3F535427E19491CD571E3EAC2CB4B831BB4B947DD4E4AC174B2
3,127,965 UART: [art] PUB.Y = A1185F8D6C98ED103399863E063640ED051E86DE386FD72C7191A17923FF6EEE3712B3EDD566FC0311D27E991A033825
3,134,901 UART: [art] SIG.R = ACA57B5BE3E5479CD14E8E2D87E6CAE8AB3DCDDC2B52BDD9530185E2BA20C7784668940FF63EE260D7094C995D3BAD5D
3,141,684 UART: [art] SIG.S = F3108D5CA799FDCF4AC5C9463AF6A6E525D043DA43B9F5CAFC71496E8123D9329CEBDE72193096E3B596298E5239337E
3,165,375 UART: Caliptra RT
3,165,628 UART: [state] CFI Enabled
3,272,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,490 UART: [rt]cmd =0x464d4352, len=4
3,310,593 >>> mbox cmd response data (524 bytes)
3,310,594 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,181 UART: [rt]cmd =0x43455252, len=4
3,351,208 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,570 ready_for_fw is high
1,056,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,763 >>> mbox cmd response: success
2,617,763 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,680,629 UART:
2,680,645 UART: Running Caliptra FMC ...
2,681,053 UART:
2,681,107 UART: [state] CFI Enabled
2,692,136 UART: [fht] FMC Alias Private Key: 7
2,800,199 UART: [art] Extend RT PCRs Done
2,800,627 UART: [art] Lock RT PCRs Done
2,802,219 UART: [art] Populate DV Done
2,810,190 UART: [fht] FMC Alias Private Key: 7
2,811,342 UART: [art] Derive CDI
2,811,622 UART: [art] Store in in slot 0x4
2,897,311 UART: [art] Derive Key Pair
2,897,671 UART: [art] Store priv key in slot 0x5
2,910,501 UART: [art] Derive Key Pair - Done
2,925,271 UART: [art] Signing Cert with AUTHO
2,925,751 UART: RITY.KEYID = 7
2,940,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,444 UART: [art] PUB.X = 09857CC9D89F55FF955BF2492CC80F2699E9516F1BA0B485B0C02FD03017A462F81D679D3128420A732528C81BD0054E
2,948,198 UART: [art] PUB.Y = FBF79A3ECDA6657D826AE8010FFD3F0FC5E7ED719A26B97AF6D07292B61687B4E85B9550F065D9759974442FAA68BA40
2,955,149 UART: [art] SIG.R = 1003757888B20456238206DDC8E99411B3446CA946E2929F4AB1F527AAA8490B525159B2D8DF44599768396BC06C8013
2,961,893 UART: [art] SIG.S = EA8B8A0FF9C480CF55FE21C5013A636D53202B4ED22ECFFA85D5ECA1ED68FD697516DE759EA390BA245EC7379798A460
2,985,870 UART: Caliptra RT
2,986,123 UART: [state] CFI Enabled
3,094,026 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,534 UART: [rt]cmd =0x464d4352, len=4
3,131,783 >>> mbox cmd response data (524 bytes)
3,131,784 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,175 UART: [rt]cmd =0x43455252, len=4
3,172,189 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,804 UART: [cold-reset] ++
1,170,188 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,174,052 ready_for_fw is high
1,174,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,198,926 UART: [idev] Sha1 KeyId Algorithm
1,207,692 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,275 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,030 >>> mbox cmd response: success
2,769,030 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,770,237 UART: [afmc] ++
2,770,405 UART: [afmc] CDI.KEYID = 6
2,770,768 UART: [afmc] SUBJECT.KEYID = 7
2,771,194 UART: [afmc] AUTHORITY.KEYID = 5
2,806,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,629 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,298 UART: [afmc] --
2,850,334 UART: [cold-reset] --
2,851,354 UART: [state] Locking Datavault
2,852,411 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,015 UART: [state] Locking ICCM
2,853,617 UART: [exit] Launching FMC @ 0x40000130
2,858,946 UART:
2,858,962 UART: Running Caliptra FMC ...
2,859,370 UART:
2,859,513 UART: [state] CFI Enabled
2,869,962 UART: [fht] FMC Alias Private Key: 7
2,977,833 UART: [art] Extend RT PCRs Done
2,978,261 UART: [art] Lock RT PCRs Done
2,979,723 UART: [art] Populate DV Done
2,988,290 UART: [fht] FMC Alias Private Key: 7
2,989,282 UART: [art] Derive CDI
2,989,562 UART: [art] Store in in slot 0x4
3,075,579 UART: [art] Derive Key Pair
3,075,939 UART: [art] Store priv key in slot 0x5
3,089,787 UART: [art] Derive Key Pair - Done
3,104,402 UART: [art] Signing Cert with AUTHO
3,104,882 UART: RITY.KEYID = 7
3,120,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,981 UART: [art] PUB.X = C531389897CFA8013819DFFECBC90C0DA90041C8EAD35026832B71793B6FF2D1967C077E5E8AC5FDB207AE3BE8EB6FF2
3,127,730 UART: [art] PUB.Y = 7E9A429A31308FB0BAC3654BD07F264DE2FAE6188BB0CC08467255D5D979DD1A3F83123842F63F2FD2D7C9D925F6FEC1
3,134,689 UART: [art] SIG.R = B528A890DABDFE585524E6AE97B5B52B5E0944A3EB093C68D6E1CA14EE10B70E52FC24834318A3C864302D5BB8266D6C
3,141,460 UART: [art] SIG.S = 4623CB1FBAFED8717D9DC3ACE7E7502CC3E3868F48179C1604E5FB91B09310D60F5684CFB195A0A3F9A2CBFED3D18DB2
3,165,837 UART: Caliptra RT
3,166,182 UART: [state] CFI Enabled
3,274,389 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,803 UART: [rt]cmd =0x464d4352, len=4
3,311,534 >>> mbox cmd response data (524 bytes)
3,311,535 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,036 UART: [rt]cmd =0x43455252, len=4
3,351,762 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,161 ready_for_fw is high
1,056,161 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,759 >>> mbox cmd response: success
2,619,759 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,680,669 UART:
2,680,685 UART: Running Caliptra FMC ...
2,681,093 UART:
2,681,236 UART: [state] CFI Enabled
2,691,623 UART: [fht] FMC Alias Private Key: 7
2,799,188 UART: [art] Extend RT PCRs Done
2,799,616 UART: [art] Lock RT PCRs Done
2,801,200 UART: [art] Populate DV Done
2,809,387 UART: [fht] FMC Alias Private Key: 7
2,810,351 UART: [art] Derive CDI
2,810,631 UART: [art] Store in in slot 0x4
2,896,500 UART: [art] Derive Key Pair
2,896,860 UART: [art] Store priv key in slot 0x5
2,911,130 UART: [art] Derive Key Pair - Done
2,925,706 UART: [art] Signing Cert with AUTHO
2,926,186 UART: RITY.KEYID = 7
2,941,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,109 UART: [art] PUB.X = E563B9982767931826E3F7F80C58EED414069E79D00C1B568E0FF47EBAC3107D8DDF43105856CD73337C9B8DA06F3DCB
2,948,873 UART: [art] PUB.Y = 0B5162068F6E4DD2FB22DEB733ABC387550632A075C359E8A8D331628A8DFFC3332B2182DB76D99E721CE5A24F49822D
2,955,818 UART: [art] SIG.R = 71336936631911434049D7CB3AB1A129F5AEF32959AEA301DCAEB51CDF23025DBBC330BEF78B960333C9325F6442F6AC
2,962,585 UART: [art] SIG.S = 5BEA50E96ED2BB39D0F43C88547B6A3A7F492B360A50DE1DE271B917B123A8B8336E8503999AFE7B67076766E3301377
2,985,899 UART: Caliptra RT
2,986,244 UART: [state] CFI Enabled
3,094,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,335 UART: [rt]cmd =0x464d4352, len=4
3,132,324 >>> mbox cmd response data (524 bytes)
3,132,325 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,578 UART: [rt]cmd =0x43455252, len=4
3,172,280 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,190 UART:
192,570 UART: Running Caliptra ROM ...
193,700 UART:
193,849 UART: [state] CFI Enabled
266,401 UART: [state] LifecycleState = Unprovisioned
268,352 UART: [state] DebugLocked = No
270,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,114 UART: [kat] SHA2-256
444,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,316 UART: [kat] ++
455,919 UART: [kat] sha1
467,936 UART: [kat] SHA2-256
470,655 UART: [kat] SHA2-384
475,501 UART: [kat] SHA2-512-ACC
477,866 UART: [kat] ECC-384
2,769,583 UART: [kat] HMAC-384Kdf
2,800,361 UART: [kat] LMS
3,990,601 UART: [kat] --
3,995,660 UART: [cold-reset] ++
3,996,811 UART: [fht] Storing FHT @ 0x50003400
4,008,363 UART: [idev] ++
4,008,953 UART: [idev] CDI.KEYID = 6
4,009,995 UART: [idev] SUBJECT.KEYID = 7
4,011,175 UART: [idev] UDS.KEYID = 0
4,033,757 UART: [idev] Erasing UDS.KEYID = 0
7,344,781 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,759 UART: [idev] CSR upload requested
7,371,971 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,675,037 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,689,664 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,704,271 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,718,617 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,741,539 UART: [idev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
9,865,517 UART: [idev] CSR uploaded
9,878,770 ready_for_fw is high
9,879,070 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,022,785 UART: [idev] --
10,023,499 UART: [ldev] ++
10,023,999 UART: [ldev] CDI.KEYID = 6
10,024,879 UART: [ldev] SUBJECT.KEYID = 5
10,025,895 UART: [ldev] AUTHORITY.KEYID = 7
10,026,989 UART: [ldev] FE.KEYID = 1
10,027,857 UART: [ldev] Erasing FE.KEYID = 1
13,245,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,543,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,558,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,573,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,587,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,606,126 UART: [ldev] --
15,610,738 UART: [fwproc] Waiting for Commands...
15,613,858 UART: [fwproc] Received command 0x46574c44
15,616,236 UART: [fwproc] Received Image of size 113760 bytes
19,661,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,741,861 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,810,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,127,545 >>> mbox cmd response: success
20,128,037 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,132,403 UART: [afmc] ++
20,133,002 UART: [afmc] CDI.KEYID = 6
20,134,082 UART: [afmc] SUBJECT.KEYID = 7
20,135,196 UART: [afmc] AUTHORITY.KEYID = 5
23,506,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,802,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,804,838 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,819,207 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,834,094 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,848,483 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,870,384 UART: [afmc] --
25,874,904 UART: [cold-reset] --
25,878,296 UART: [state] Locking Datavault
25,884,086 UART: [state] Locking PCR0, PCR1 and PCR31
25,885,785 UART: [state] Locking ICCM
25,887,506 UART: [exit] Launching FMC @ 0x40000130
25,895,849 UART:
25,896,084 UART: Running Caliptra FMC ...
25,897,186 UART:
25,897,342 UART: [state] CFI Enabled
25,964,689 UART: [fht] FMC Alias Private Key: 7
28,303,578 UART: [art] Extend RT PCRs Done
28,304,797 UART: [art] Lock RT PCRs Done
28,306,634 UART: [art] Populate DV Done
28,312,097 UART: [fht] FMC Alias Private Key: 7
28,313,686 UART: [art] Derive CDI
28,314,496 UART: [art] Store in in slot 0x4
28,373,563 UART: [art] Derive Key Pair
28,374,620 UART: [art] Store priv key in slot 0x5
31,667,514 UART: [art] Derive Key Pair - Done
31,680,410 UART: [art] Signing Cert with AUTHO
31,681,714 UART: RITY.KEYID = 7
33,969,678 UART: [art] Erasing AUTHORITY.KEYID = 7
33,971,254 UART: [art] PUB.X = 9E4281903466878BAE17FC309EFF0203354AA8BF48782EC241E3C664E02BDCC5A4E93126D304E00BD068203F7BA3655C
33,978,442 UART: [art] PUB.Y = 19A9A8B949F876D34B76778D770DC2D73C6A25764A4395F5D5B8C2AD62AF3A7FB3021E36229D50CF8A24BDA8830692E9
33,985,680 UART: [art] SIG.R = 625D5A79B5525959EDA74AA9740F2493553E0A12E6B37340EE3B910B269E066E658B552F61BAC9D69028168D0DF1DCB3
33,993,068 UART: [art] SIG.S = E23C70D45D901418C3488EF7F6B0DA6454A919FC3360DAC03695AB4CA66971D466B17C2FD513FE6E13A6A5067621F164
35,298,087 UART: Caliptra RT
35,298,810 UART: [state] CFI Enabled
35,460,081 UART: [rt] RT listening for mailbox commands...
35,491,063 UART: [rt]cmd =0x49444352, len=4
35,492,623 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
9,502,761 ready_for_fw is high
9,503,211 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,229,096 >>> mbox cmd response: success
20,230,275 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,913,464 UART:
25,914,283 UART: Running Caliptra FMC ...
25,915,413 UART:
25,915,636 UART: [state] CFI Enabled
25,984,042 UART: [fht] FMC Alias Private Key: 7
28,321,842 UART: [art] Extend RT PCRs Done
28,323,070 UART: [art] Lock RT PCRs Done
28,324,508 UART: [art] Populate DV Done
28,329,931 UART: [fht] FMC Alias Private Key: 7
28,331,422 UART: [art] Derive CDI
28,332,186 UART: [art] Store in in slot 0x4
28,393,824 UART: [art] Derive Key Pair
28,394,864 UART: [art] Store priv key in slot 0x5
31,687,505 UART: [art] Derive Key Pair - Done
31,700,609 UART: [art] Signing Cert with AUTHO
31,701,914 UART: RITY.KEYID = 7
33,988,996 UART: [art] Erasing AUTHORITY.KEYID = 7
33,990,498 UART: [art] PUB.X = E150CA3DDAD674665FD9D5E4726982BCFF8337617B345812E5083D9F68BF9BF05DC6F859921CC8C566B4895582473A50
33,997,759 UART: [art] PUB.Y = 2FEB2D8B1CF384EEE1FFFFC461EEDAD3CE0AB3176231596A2460C8E22CDB052047B771CCF9092D8247838193CF02688B
34,005,023 UART: [art] SIG.R = 118FC77FC20B0CEAB396C1B27759FFECE6783C7460B539C9D7FCCA90952731FA6253D8ADD21320E7C9E5438E0DEBF7A0
34,012,398 UART: [art] SIG.S = 3A5DD8400368D480D94C0C0CE5AE63FBA3ABFE7AFDAD99C9568A9567F9479C8251E9DBA898BFB2CCF08384F5ECA03AAB
35,317,674 UART: Caliptra RT
35,318,385 UART: [state] CFI Enabled
35,480,661 UART: [rt] RT listening for mailbox commands...
35,511,917 UART: [rt]cmd =0x49444352, len=4
35,513,637 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
192,827 UART:
193,192 UART: Running Caliptra ROM ...
194,288 UART:
604,098 UART: [state] CFI Enabled
620,825 UART: [state] LifecycleState = Unprovisioned
622,771 UART: [state] DebugLocked = No
624,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,581 UART: [kat] SHA2-256
798,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,918 UART: [kat] ++
809,450 UART: [kat] sha1
821,557 UART: [kat] SHA2-256
824,250 UART: [kat] SHA2-384
829,745 UART: [kat] SHA2-512-ACC
832,108 UART: [kat] ECC-384
3,115,467 UART: [kat] HMAC-384Kdf
3,127,891 UART: [kat] LMS
4,317,993 UART: [kat] --
4,323,713 UART: [cold-reset] ++
4,325,290 UART: [fht] Storing FHT @ 0x50003400
4,335,626 UART: [idev] ++
4,336,194 UART: [idev] CDI.KEYID = 6
4,337,170 UART: [idev] SUBJECT.KEYID = 7
4,338,476 UART: [idev] UDS.KEYID = 0
4,353,389 UART: [idev] Erasing UDS.KEYID = 0
7,622,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,120 UART: [idev] CSR upload requested
7,650,252 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,941,720 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,956,262 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,970,879 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,985,267 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,008,175 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,132,170 UART: [idev] CSR uploaded
10,145,417 ready_for_fw is high
10,145,736 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,288,738 UART: [idev] --
10,289,414 UART: [ldev] ++
10,289,904 UART: [ldev] CDI.KEYID = 6
10,290,775 UART: [ldev] SUBJECT.KEYID = 5
10,291,868 UART: [ldev] AUTHORITY.KEYID = 7
10,293,057 UART: [ldev] FE.KEYID = 1
10,293,929 UART: [ldev] Erasing FE.KEYID = 1
13,459,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,750,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,765,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,780,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,794,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,814,615 UART: [ldev] --
15,819,007 UART: [fwproc] Waiting for Commands...
15,821,813 UART: [fwproc] Received command 0x46574c44
15,823,999 UART: [fwproc] Received Image of size 113760 bytes
19,870,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,952,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,021,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,337,279 >>> mbox cmd response: success
20,337,925 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,340,683 UART: [afmc] ++
20,341,265 UART: [afmc] CDI.KEYID = 6
20,342,196 UART: [afmc] SUBJECT.KEYID = 7
20,343,457 UART: [afmc] AUTHORITY.KEYID = 5
23,661,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,955,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,957,390 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,971,821 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,986,633 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
26,001,066 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
26,022,374 UART: [afmc] --
26,025,526 UART: [cold-reset] --
26,029,066 UART: [state] Locking Datavault
26,033,828 UART: [state] Locking PCR0, PCR1 and PCR31
26,035,583 UART: [state] Locking ICCM
26,037,811 UART: [exit] Launching FMC @ 0x40000130
26,046,169 UART:
26,046,402 UART: Running Caliptra FMC ...
26,047,430 UART:
26,047,570 UART: [state] CFI Enabled
26,055,936 UART: [fht] FMC Alias Private Key: 7
28,386,414 UART: [art] Extend RT PCRs Done
28,387,632 UART: [art] Lock RT PCRs Done
28,389,493 UART: [art] Populate DV Done
28,394,954 UART: [fht] FMC Alias Private Key: 7
28,396,648 UART: [art] Derive CDI
28,397,458 UART: [art] Store in in slot 0x4
28,440,379 UART: [art] Derive Key Pair
28,441,416 UART: [art] Store priv key in slot 0x5
31,683,639 UART: [art] Derive Key Pair - Done
31,696,585 UART: [art] Signing Cert with AUTHO
31,698,078 UART: RITY.KEYID = 7
33,977,624 UART: [art] Erasing AUTHORITY.KEYID = 7
33,979,173 UART: [art] PUB.X = B89D0EB2910F72D43FD79B4BE63C9DD695990E2FD01248BC64C6CB10818E485933B6CFFCA9BDE9238F05A71DDAF65233
33,986,390 UART: [art] PUB.Y = 4F1FD08B679F35C33C14E39D6FB4F9AE8DA10A676FDE4C8B7D88226E9EDBF20FC166F00C10B70036C1547626EBFEE3BB
33,993,649 UART: [art] SIG.R = 6F797C2B76DAC89932A3A5BFCD024EE739D7E0029855267ED599D7DD4AB3CA32B51DEB739CCEB5D3E144F5930836DEB9
34,001,114 UART: [art] SIG.S = 632A77CE2DCD8F16D61ED1598770CE78D8CD9C1EB1E169D5F7985AA132C710ABD5D6DB58B47DD09BCA92268892BEA1EB
35,306,504 UART: Caliptra RT
35,307,216 UART: [state] CFI Enabled
35,425,240 UART: [rt] RT listening for mailbox commands...
35,456,649 UART: [rt]cmd =0x49444352, len=4
35,458,442 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
9,747,843 ready_for_fw is high
9,748,389 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,376,082 >>> mbox cmd response: success
20,376,748 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,020,522 UART:
26,020,909 UART: Running Caliptra FMC ...
26,022,101 UART:
26,022,262 UART: [state] CFI Enabled
26,030,319 UART: [fht] FMC Alias Private Key: 7
28,361,613 UART: [art] Extend RT PCRs Done
28,362,836 UART: [art] Lock RT PCRs Done
28,364,408 UART: [art] Populate DV Done
28,369,714 UART: [fht] FMC Alias Private Key: 7
28,371,431 UART: [art] Derive CDI
28,372,245 UART: [art] Store in in slot 0x4
28,414,912 UART: [art] Derive Key Pair
28,415,970 UART: [art] Store priv key in slot 0x5
31,657,930 UART: [art] Derive Key Pair - Done
31,670,979 UART: [art] Signing Cert with AUTHO
31,672,282 UART: RITY.KEYID = 7
33,952,010 UART: [art] Erasing AUTHORITY.KEYID = 7
33,953,528 UART: [art] PUB.X = 01E48BB325BA7F337C0BDC2182E34C07E446FDECA9F117844BDCB6AFED8F1CC99840653F2D12A8B15F17D501D2C39E7A
33,960,770 UART: [art] PUB.Y = 7709D1ED6B47BD34B34836ED5F886B393B1AE80D1057446A118ED79FCA58AE7433309FE66D706D1E6A2F8A7B1FAD68FC
33,968,048 UART: [art] SIG.R = C5D8810C4B7067A313118C72E01F1F25E4B531D64825D584C90902CA1FFB11A476CAA9E5335D44E06123420D1299E5F1
33,975,380 UART: [art] SIG.S = EF2F283995AF0F22CB3FF0C78DF0254953108EB4E5C52C3266281933F6C3A924BE8B34685E12F0F4C0CAEB85A2693874
35,280,879 UART: Caliptra RT
35,281,600 UART: [state] CFI Enabled
35,399,202 UART: [rt] RT listening for mailbox commands...
35,430,578 UART: [rt]cmd =0x49444352, len=4
35,432,059 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
192,486 UART:
193,252 UART: Running Caliptra ROM ...
194,486 UART:
194,641 UART: [state] CFI Enabled
264,562 UART: [state] LifecycleState = Unprovisioned
266,350 UART: [state] DebugLocked = No
268,296 UART: [state] WD Timer not started. Device not locked for debugging
271,890 UART: [kat] SHA2-256
450,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,585 UART: [kat] ++
463,035 UART: [kat] sha1
475,118 UART: [kat] SHA2-256
478,154 UART: [kat] SHA2-384
484,218 UART: [kat] SHA2-512-ACC
487,223 UART: [kat] ECC-384
2,947,628 UART: [kat] HMAC-384Kdf
2,972,150 UART: [kat] LMS
3,501,612 UART: [kat] --
3,505,698 UART: [cold-reset] ++
3,507,983 UART: [fht] FHT @ 0x50003400
3,518,175 UART: [idev] ++
3,518,742 UART: [idev] CDI.KEYID = 6
3,519,646 UART: [idev] SUBJECT.KEYID = 7
3,520,813 UART: [idev] UDS.KEYID = 0
3,544,207 UART: [idev] Erasing UDS.KEYID = 0
6,028,286 UART: [idev] Sha1 KeyId Algorithm
6,048,699 UART: [idev] CSR upload begun
6,053,372 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,782,176 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,290 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,814,192 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,830,076 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,906 UART: [idev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
7,996,091 UART: [idev] CSR uploaded
8,012,153 ready_for_fw is high
8,012,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,155,999 UART: [idev] --
8,156,641 UART: [ldev] ++
8,157,133 UART: [ldev] CDI.KEYID = 6
8,158,033 UART: [ldev] SUBJECT.KEYID = 5
8,159,106 UART: [ldev] AUTHORITY.KEYID = 7
8,160,294 UART: [ldev] FE.KEYID = 1
8,161,140 UART: [ldev] Erasing FE.KEYID = 1
10,562,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,299,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,315,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,331,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,352,873 UART: [ldev] --
12,357,046 UART: [fwproc] Wait for Commands...
12,358,663 UART: [fwproc] Recv command 0x46574c44
12,360,749 UART: [fwproc] Recv'd Img size: 114084 bytes
15,767,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,840,388 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,909,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,225,822 >>> mbox cmd response: success
16,226,307 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,229,220 UART: [afmc] ++
16,229,814 UART: [afmc] CDI.KEYID = 6
16,230,726 UART: [afmc] SUBJECT.KEYID = 7
16,231,963 UART: [afmc] AUTHORITY.KEYID = 5
18,771,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,495,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,497,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,513,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,529,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,544,958 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,566,560 UART: [afmc] --
20,569,825 UART: [cold-reset] --
20,572,975 UART: [state] Locking Datavault
20,576,759 UART: [state] Locking PCR0, PCR1 and PCR31
20,578,451 UART: [state] Locking ICCM
20,580,198 UART: [exit] Launching FMC @ 0x40000130
20,588,642 UART:
20,588,874 UART: Running Caliptra FMC ...
20,589,898 UART:
20,590,063 UART: [state] CFI Enabled
20,653,740 UART: [fht] FMC Alias Private Key: 7
22,418,228 UART: [art] Extend RT PCRs Done
22,419,442 UART: [art] Lock RT PCRs Done
22,421,143 UART: [art] Populate DV Done
22,426,714 UART: [fht] FMC Alias Private Key: 7
22,428,301 UART: [art] Derive CDI
22,429,113 UART: [art] Store in in slot 0x4
22,486,112 UART: [art] Derive Key Pair
22,487,167 UART: [art] Store priv key in slot 0x5
24,950,749 UART: [art] Derive Key Pair - Done
24,963,796 UART: [art] Signing Cert with AUTHO
24,965,083 UART: RITY.KEYID = 7
26,677,077 UART: [art] Erasing AUTHORITY.KEYID = 7
26,678,578 UART: [art] PUB.X = 0B84EEC7920A1E3EF275B34EA20149A876D8C7A2CA9AE22CAA2270EBC0CD06988302DCF61857FBB9E5B52B759B1E1053
26,685,906 UART: [art] PUB.Y = 4CEF42E324D5789D38AAB66F729F9035D1C7621C0441083471E79F6828B3B4D2E21603BB43489BF2B3A9BAEAA6973B4A
26,693,129 UART: [art] SIG.R = 75408EDFDC373095A103455FBE8665AA6744307AC1C765E39461F368E342A9B7DCAA4A81F1B47C2A8228E3B0702DCFED
26,700,562 UART: [art] SIG.S = 18826C8DA35CC134AE6565B04D9EC08B03270FDF1E926D0B31550FF7A926454C128F6A042D9A41D6B26BB1FAD7E924DF
27,679,254 UART: Caliptra RT
27,679,951 UART: [state] CFI Enabled
27,845,584 UART: [rt] RT listening for mailbox commands...
27,876,986 UART: [rt]cmd =0x49444352, len=4
27,884,592 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
7,661,089 ready_for_fw is high
7,661,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,811,578 >>> mbox cmd response: success
15,812,185 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,091,533 UART:
20,091,921 UART: Running Caliptra FMC ...
20,093,122 UART:
20,093,292 UART: [state] CFI Enabled
20,155,599 UART: [fht] FMC Alias Private Key: 7
21,919,645 UART: [art] Extend RT PCRs Done
21,920,952 UART: [art] Lock RT PCRs Done
21,922,446 UART: [art] Populate DV Done
21,927,587 UART: [fht] FMC Alias Private Key: 7
21,929,301 UART: [art] Derive CDI
21,930,115 UART: [art] Store in in slot 0x4
21,987,568 UART: [art] Derive Key Pair
21,988,631 UART: [art] Store priv key in slot 0x5
24,450,768 UART: [art] Derive Key Pair - Done
24,463,773 UART: [art] Signing Cert with AUTHO
24,465,081 UART: RITY.KEYID = 7
26,176,531 UART: [art] Erasing AUTHORITY.KEYID = 7
26,178,037 UART: [art] PUB.X = DAD909C4F0334C8349208184136958AFA241AD7621634BCBBFF0D7E67D0F30816CE45C121A9A325B99D532B1490FF7ED
26,185,270 UART: [art] PUB.Y = 201C74B2FCA0ED2771473FB38786EA0FCC9D24A31ACA8492C90701AA83F3F264CECAE71F42D20C164C5E046116E1B12A
26,192,565 UART: [art] SIG.R = EB1B7BA11BA8AA47C2917F850559E3033E6E799F18B2EB0C5822D09237E9F6B22EA1F5CA60542867A1CEBC6AA2EED3F2
26,199,984 UART: [art] SIG.S = 96F36728C927E97B3E6669C0D3A7C87A27427DE6061A868DFEEB011880CB12E2DB9B1E2778598DD0A6153620E5965C2E
27,178,481 UART: Caliptra RT
27,179,174 UART: [state] CFI Enabled
27,345,163 UART: [rt] RT listening for mailbox commands...
27,376,769 UART: [rt]cmd =0x49444352, len=4
27,384,226 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
193,055 UART:
193,450 UART: Running Caliptra ROM ...
194,652 UART:
604,268 UART: [state] CFI Enabled
616,147 UART: [state] LifecycleState = Unprovisioned
618,023 UART: [state] DebugLocked = No
620,196 UART: [state] WD Timer not started. Device not locked for debugging
623,740 UART: [kat] SHA2-256
802,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,430 UART: [kat] ++
814,966 UART: [kat] sha1
826,276 UART: [kat] SHA2-256
829,283 UART: [kat] SHA2-384
835,128 UART: [kat] SHA2-512-ACC
838,133 UART: [kat] ECC-384
3,277,846 UART: [kat] HMAC-384Kdf
3,290,453 UART: [kat] LMS
3,819,947 UART: [kat] --
3,825,172 UART: [cold-reset] ++
3,826,542 UART: [fht] FHT @ 0x50003400
3,836,386 UART: [idev] ++
3,836,958 UART: [idev] CDI.KEYID = 6
3,837,871 UART: [idev] SUBJECT.KEYID = 7
3,839,043 UART: [idev] UDS.KEYID = 0
3,854,842 UART: [idev] Erasing UDS.KEYID = 0
6,308,814 UART: [idev] Sha1 KeyId Algorithm
6,330,340 UART: [idev] CSR upload begun
6,335,112 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,051,447 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,067,572 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,083,480 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,099,372 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,123,181 UART: [idev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
8,265,331 UART: [idev] CSR uploaded
8,281,404 ready_for_fw is high
8,281,713 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,425,121 UART: [idev] --
8,425,762 UART: [ldev] ++
8,426,259 UART: [ldev] CDI.KEYID = 6
8,427,160 UART: [ldev] SUBJECT.KEYID = 5
8,428,238 UART: [ldev] AUTHORITY.KEYID = 7
8,429,334 UART: [ldev] FE.KEYID = 1
8,430,270 UART: [ldev] Erasing FE.KEYID = 1
10,779,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,530,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,546,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,566,240 UART: [ldev] --
12,570,516 UART: [fwproc] Wait for Commands...
12,573,695 UART: [fwproc] Recv command 0x46574c44
12,575,789 UART: [fwproc] Recv'd Img size: 114084 bytes
15,977,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,118,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,434,861 >>> mbox cmd response: success
16,435,392 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,439,304 UART: [afmc] ++
16,439,894 UART: [afmc] CDI.KEYID = 6
16,440,808 UART: [afmc] SUBJECT.KEYID = 7
16,441,967 UART: [afmc] AUTHORITY.KEYID = 5
18,942,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,663,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,665,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,681,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,697,520 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,713,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,735,072 UART: [afmc] --
20,739,594 UART: [cold-reset] --
20,744,549 UART: [state] Locking Datavault
20,748,390 UART: [state] Locking PCR0, PCR1 and PCR31
20,750,037 UART: [state] Locking ICCM
20,752,696 UART: [exit] Launching FMC @ 0x40000130
20,761,094 UART:
20,761,342 UART: Running Caliptra FMC ...
20,762,444 UART:
20,762,603 UART: [state] CFI Enabled
20,770,599 UART: [fht] FMC Alias Private Key: 7
22,526,600 UART: [art] Extend RT PCRs Done
22,527,821 UART: [art] Lock RT PCRs Done
22,529,500 UART: [art] Populate DV Done
22,534,804 UART: [fht] FMC Alias Private Key: 7
22,536,453 UART: [art] Derive CDI
22,537,268 UART: [art] Store in in slot 0x4
22,579,714 UART: [art] Derive Key Pair
22,580,750 UART: [art] Store priv key in slot 0x5
25,007,256 UART: [art] Derive Key Pair - Done
25,020,319 UART: [art] Signing Cert with AUTHO
25,021,652 UART: RITY.KEYID = 7
26,726,949 UART: [art] Erasing AUTHORITY.KEYID = 7
26,728,457 UART: [art] PUB.X = 00A0BBAA8C5A41EC93B55E927ACD2F1AACA78D406C3B7A91D35E15992E17A3DEB036F71EA06B73FCA2B6E25E2ECDD983
26,735,707 UART: [art] PUB.Y = 327C2ABF6EBC84D0E07C457DB8F3026245E6672A8B45DABE2ADFADAA1730D15F3893FC54178FF78C9A5A2B312CC2B540
26,743,030 UART: [art] SIG.R = D8D24490DC1F3FAF474568DB18AF607CA1D5EA4209DFCFE165DED4C57540224324EBCBB73541970E13B3046BE52C3ECC
26,750,396 UART: [art] SIG.S = FFCF1D051EE2FD9F7653CFA3AA4556AE91D0669BFCFF9E9253E9D47FE0C684518769C2ADEAB2095B96D2CD2D8A42FB34
27,729,106 UART: Caliptra RT
27,729,807 UART: [state] CFI Enabled
27,847,288 UART: [rt] RT listening for mailbox commands...
27,878,325 UART: [rt]cmd =0x49444352, len=4
27,886,010 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
7,945,320 ready_for_fw is high
7,945,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,034,390 >>> mbox cmd response: success
16,034,996 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,281,800 UART:
20,282,210 UART: Running Caliptra FMC ...
20,283,351 UART:
20,283,510 UART: [state] CFI Enabled
20,291,443 UART: [fht] FMC Alias Private Key: 7
22,048,751 UART: [art] Extend RT PCRs Done
22,049,975 UART: [art] Lock RT PCRs Done
22,051,493 UART: [art] Populate DV Done
22,056,858 UART: [fht] FMC Alias Private Key: 7
22,058,507 UART: [art] Derive CDI
22,059,322 UART: [art] Store in in slot 0x4
22,102,148 UART: [art] Derive Key Pair
22,103,193 UART: [art] Store priv key in slot 0x5
24,530,219 UART: [art] Derive Key Pair - Done
24,543,156 UART: [art] Signing Cert with AUTHO
24,544,457 UART: RITY.KEYID = 7
26,249,963 UART: [art] Erasing AUTHORITY.KEYID = 7
26,251,461 UART: [art] PUB.X = 1BDA43BBB8FC1D0877DFCAF7E96B6F7C5461B0A2CFB592CE56E2C3F3D6A11ED686066C911DA41B078356955A9B8304F9
26,258,791 UART: [art] PUB.Y = CABC580530AD076DEBB1D3A772EDCC471630F1B6E278C9B6C576497DDC5828491A8B28808AA7BB6A18CCEB7801F95667
26,266,022 UART: [art] SIG.R = 054AC7E1B291DAEE1A07F1DB02E3DD620E7D78141415E9C4E3F8DB707562496B7D8ADD9FD080BE416F117F24372FA62F
26,273,452 UART: [art] SIG.S = ABD3C2A0DD7C769FF4B3CC20140506439DE06F084A75574189DB8A631B5AF1F8E7A8E609DB2E86D1574625D86FECDFA5
27,252,172 UART: Caliptra RT
27,252,883 UART: [state] CFI Enabled
27,369,807 UART: [rt] RT listening for mailbox commands...
27,401,115 UART: [rt]cmd =0x49444352, len=4
27,408,633 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
192,582 UART:
192,954 UART: Running Caliptra ROM ...
194,158 UART:
194,309 UART: [state] CFI Enabled
264,674 UART: [state] LifecycleState = Unprovisioned
267,095 UART: [state] DebugLocked = No
269,132 UART: [state] WD Timer not started. Device not locked for debugging
272,895 UART: [kat] SHA2-256
462,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,522 UART: [kat] ++
473,966 UART: [kat] sha1
485,996 UART: [kat] SHA2-256
489,008 UART: [kat] SHA2-384
495,145 UART: [kat] SHA2-512-ACC
497,723 UART: [kat] ECC-384
2,948,941 UART: [kat] HMAC-384Kdf
2,971,856 UART: [kat] LMS
3,503,609 UART: [kat] --
3,507,695 UART: [cold-reset] ++
3,509,706 UART: [fht] FHT @ 0x50003400
3,521,181 UART: [idev] ++
3,521,889 UART: [idev] CDI.KEYID = 6
3,522,770 UART: [idev] SUBJECT.KEYID = 7
3,524,012 UART: [idev] UDS.KEYID = 0
3,543,793 UART: [idev] Erasing UDS.KEYID = 0
6,029,337 UART: [idev] Sha1 KeyId Algorithm
6,051,325 UART: [idev] CSR upload begun
6,056,086 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,783,296 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,570 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,608 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,596 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,798 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,983,419 UART: [idev] CSR uploaded
7,991,563 ready_for_fw is high
7,991,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,135,501 UART: [idev] --
8,136,134 UART: [ldev] ++
8,136,625 UART: [ldev] CDI.KEYID = 6
8,137,506 UART: [ldev] SUBJECT.KEYID = 5
8,138,563 UART: [ldev] AUTHORITY.KEYID = 7
8,139,749 UART: [ldev] FE.KEYID = 1
8,140,595 UART: [ldev] Erasing FE.KEYID = 1
10,546,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,279,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,294,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,309,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,325,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,345,791 UART: [ldev] --
12,351,586 UART: [fwproc] Wait for Commands...
12,353,781 UART: [fwproc] Recv command 0x46574c44
12,356,089 UART: [fwproc] Recv'd Img size: 114084 bytes
15,795,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,872,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,988,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,530,179 >>> mbox cmd response: success
16,530,673 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,534,089 UART: [afmc] ++
16,534,797 UART: [afmc] CDI.KEYID = 6
16,536,011 UART: [afmc] SUBJECT.KEYID = 7
16,537,465 UART: [afmc] AUTHORITY.KEYID = 5
19,064,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,789,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,791,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,806,607 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,821,848 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,836,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,860,480 UART: [afmc] --
20,864,454 UART: [cold-reset] --
20,868,751 UART: [state] Locking Datavault
20,875,371 UART: [state] Locking PCR0, PCR1 and PCR31
20,877,526 UART: [state] Locking ICCM
20,879,951 UART: [exit] Launching FMC @ 0x40000130
20,888,638 UART:
20,888,868 UART: Running Caliptra FMC ...
20,889,984 UART:
20,890,140 UART: [state] CFI Enabled
20,946,907 UART: [fht] FMC Alias Private Key: 7
22,710,399 UART: [art] Extend RT PCRs Done
22,711,619 UART: [art] Lock RT PCRs Done
22,713,490 UART: [art] Populate DV Done
22,718,581 UART: [fht] FMC Alias Private Key: 7
22,720,236 UART: [art] Derive CDI
22,721,050 UART: [art] Store in in slot 0x4
22,778,390 UART: [art] Derive Key Pair
22,779,430 UART: [art] Store priv key in slot 0x5
25,243,005 UART: [art] Derive Key Pair - Done
25,255,895 UART: [art] Signing Cert with AUTHO
25,257,228 UART: RITY.KEYID = 7
26,967,359 UART: [art] Erasing AUTHORITY.KEYID = 7
26,968,866 UART: [art] PUB.X = E268B90FA3F047A60CF22E53D9C3D4BCA1B2243DF84997A89BF37F282EE0157EB5ADFAE1A3A3D4B59AEBD97A212FE9B0
26,976,148 UART: [art] PUB.Y = A84C6F84A2903452423A4D36102364DF906915342AECB5FFC567982568A4DC18F60B53CBF310E6B11A2E86B755C0D6AB
26,983,400 UART: [art] SIG.R = D034299E5EB3A90213F42A16797E0E2A78FC4F9EB40611EEBC13EC27E9499D23CDD5122B0EB550CAB130CD39E559CE5D
26,990,826 UART: [art] SIG.S = F7B403223565BF085029D6D27948FFCD9D2C130EA8CCDD678C95D0775C1BC676421D1B792B03C79E291782C12330A290
27,969,302 UART: Caliptra RT
27,970,004 UART: [state] CFI Enabled
28,134,744 UART: [rt] RT listening for mailbox commands...
28,166,055 UART: [rt]cmd =0x49444352, len=4
28,167,772 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
7,715,246 ready_for_fw is high
7,715,722 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,502,941 >>> mbox cmd response: success
16,503,511 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,796,709 UART:
20,797,100 UART: Running Caliptra FMC ...
20,798,230 UART:
20,798,383 UART: [state] CFI Enabled
20,866,009 UART: [fht] FMC Alias Private Key: 7
22,629,642 UART: [art] Extend RT PCRs Done
22,630,861 UART: [art] Lock RT PCRs Done
22,632,621 UART: [art] Populate DV Done
22,637,707 UART: [fht] FMC Alias Private Key: 7
22,639,360 UART: [art] Derive CDI
22,640,179 UART: [art] Store in in slot 0x4
22,698,394 UART: [art] Derive Key Pair
22,699,435 UART: [art] Store priv key in slot 0x5
25,162,527 UART: [art] Derive Key Pair - Done
25,175,819 UART: [art] Signing Cert with AUTHO
25,177,130 UART: RITY.KEYID = 7
26,888,086 UART: [art] Erasing AUTHORITY.KEYID = 7
26,889,571 UART: [art] PUB.X = BB35A2549CEE583C7EADABC7778E701659ECAD294E3AF01EAA89894116940010D7FE9517A27E6FECDF190FC9A52FB7C2
26,896,865 UART: [art] PUB.Y = A70F2A7573B2DF8D7E806A250003928D8EBE7932C7213F511FAD1AA12046A1646B8B8FDA64F652699823A4F3D85D3303
26,904,086 UART: [art] SIG.R = 344FE2FA280D20F88D96DA95E1A2566DF6517A010D47AABF3D3E9E8A9D207D8AB8D0BD716E4CE1BBDBD97821FED90E69
26,911,460 UART: [art] SIG.S = 7AC51107C664BA0B0C042BD968DAD0F398D12F0B9781E7A49A8B7497883BB8EBA0C603E4116EEA180628DA17E2F79C5F
27,890,092 UART: Caliptra RT
27,890,806 UART: [state] CFI Enabled
28,054,936 UART: [rt] RT listening for mailbox commands...
28,086,246 UART: [rt]cmd =0x49444352, len=4
28,087,590 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,601 writing to cptra_bootfsm_go
192,890 UART:
193,260 UART: Running Caliptra ROM ...
194,462 UART:
603,947 UART: [state] CFI Enabled
616,695 UART: [state] LifecycleState = Unprovisioned
619,073 UART: [state] DebugLocked = No
620,327 UART: [state] WD Timer not started. Device not locked for debugging
624,793 UART: [kat] SHA2-256
814,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,462 UART: [kat] ++
826,012 UART: [kat] sha1
837,180 UART: [kat] SHA2-256
840,186 UART: [kat] SHA2-384
845,537 UART: [kat] SHA2-512-ACC
848,117 UART: [kat] ECC-384
3,288,109 UART: [kat] HMAC-384Kdf
3,300,721 UART: [kat] LMS
3,832,533 UART: [kat] --
3,836,455 UART: [cold-reset] ++
3,839,096 UART: [fht] FHT @ 0x50003400
3,851,211 UART: [idev] ++
3,851,920 UART: [idev] CDI.KEYID = 6
3,852,953 UART: [idev] SUBJECT.KEYID = 7
3,854,054 UART: [idev] UDS.KEYID = 0
3,869,737 UART: [idev] Erasing UDS.KEYID = 0
6,328,389 UART: [idev] Sha1 KeyId Algorithm
6,349,141 UART: [idev] CSR upload begun
6,353,930 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,074,537 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,089,824 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,104,822 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,119,861 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,145,002 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,274,683 UART: [idev] CSR uploaded
8,282,823 ready_for_fw is high
8,283,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
8,426,487 UART: [idev] --
8,427,125 UART: [ldev] ++
8,427,627 UART: [ldev] CDI.KEYID = 6
8,428,560 UART: [ldev] SUBJECT.KEYID = 5
8,429,621 UART: [ldev] AUTHORITY.KEYID = 7
8,430,715 UART: [ldev] FE.KEYID = 1
8,431,589 UART: [ldev] Erasing FE.KEYID = 1
10,784,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,504,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,519,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,534,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,549,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,569,871 UART: [ldev] --
12,575,375 UART: [fwproc] Wait for Commands...
12,578,397 UART: [fwproc] Recv command 0x46574c44
12,580,656 UART: [fwproc] Recv'd Img size: 114084 bytes
16,017,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,096,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,212,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,754,127 >>> mbox cmd response: success
16,754,694 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,758,019 UART: [afmc] ++
16,758,722 UART: [afmc] CDI.KEYID = 6
16,759,917 UART: [afmc] SUBJECT.KEYID = 7
16,761,357 UART: [afmc] AUTHORITY.KEYID = 5
19,267,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,987,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,989,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,004,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,019,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,034,835 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,058,368 UART: [afmc] --
21,062,663 UART: [cold-reset] --
21,066,860 UART: [state] Locking Datavault
21,073,851 UART: [state] Locking PCR0, PCR1 and PCR31
21,076,058 UART: [state] Locking ICCM
21,077,844 UART: [exit] Launching FMC @ 0x40000130
21,086,472 UART:
21,086,709 UART: Running Caliptra FMC ...
21,087,814 UART:
21,087,986 UART: [state] CFI Enabled
21,095,766 UART: [fht] FMC Alias Private Key: 7
22,851,888 UART: [art] Extend RT PCRs Done
22,853,113 UART: [art] Lock RT PCRs Done
22,854,705 UART: [art] Populate DV Done
22,860,009 UART: [fht] FMC Alias Private Key: 7
22,861,499 UART: [art] Derive CDI
22,862,263 UART: [art] Store in in slot 0x4
22,904,750 UART: [art] Derive Key Pair
22,905,787 UART: [art] Store priv key in slot 0x5
25,332,813 UART: [art] Derive Key Pair - Done
25,345,860 UART: [art] Signing Cert with AUTHO
25,347,164 UART: RITY.KEYID = 7
27,052,789 UART: [art] Erasing AUTHORITY.KEYID = 7
27,054,308 UART: [art] PUB.X = 04C4FE49ADC994F5FE17EB1772B15520D2E713D04F18B4807A6F4D8AA02F1560903813E06935ED468D90DBCD4CF0C731
27,061,555 UART: [art] PUB.Y = 30033583E4417BFC0521D7928F78050636EAF859ED9B64716F16923068EAA51ACF68D64283DDA4B456B57D606F72F132
27,068,812 UART: [art] SIG.R = 624E95E3B4D81EB6A6B0B08CBA2A3FAA1E0403D5F473404D8815E10511FB9B8D448895B505F534A339025BDB285266EE
27,076,178 UART: [art] SIG.S = 6FA1305634577AE534802D03223454013A22742ECF9259B5A67B5A7D93193B60D3330F5836F655E8963B9AEADA106775
28,055,002 UART: Caliptra RT
28,055,723 UART: [state] CFI Enabled
28,173,162 UART: [rt] RT listening for mailbox commands...
28,204,258 UART: [rt]cmd =0x49444352, len=4
28,206,251 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
7,986,692 ready_for_fw is high
7,987,375 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,695,665 >>> mbox cmd response: success
16,696,292 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,946,858 UART:
20,947,261 UART: Running Caliptra FMC ...
20,948,397 UART:
20,948,552 UART: [state] CFI Enabled
20,956,604 UART: [fht] FMC Alias Private Key: 7
22,713,295 UART: [art] Extend RT PCRs Done
22,714,525 UART: [art] Lock RT PCRs Done
22,716,182 UART: [art] Populate DV Done
22,721,442 UART: [fht] FMC Alias Private Key: 7
22,723,044 UART: [art] Derive CDI
22,723,869 UART: [art] Store in in slot 0x4
22,766,190 UART: [art] Derive Key Pair
22,767,224 UART: [art] Store priv key in slot 0x5
25,193,520 UART: [art] Derive Key Pair - Done
25,206,139 UART: [art] Signing Cert with AUTHO
25,207,450 UART: RITY.KEYID = 7
26,912,421 UART: [art] Erasing AUTHORITY.KEYID = 7
26,913,942 UART: [art] PUB.X = 3CDDFCE741B672E2562DFDDC332DC1C0FD0A1A65B4434F1581583D08082609E7DD82185E892003BF317ABDB8156FD53F
26,921,194 UART: [art] PUB.Y = 57D38B31BCCBA1E9C8B6B29C0DFA20B13EA3F3A50A88C2506AF710D6C8CE4966778971F1F7F8DA1FC8D1378811C6B114
26,928,457 UART: [art] SIG.R = 3FCBBA5F477BA5998335C9FD8E0C5DB8DC48F6CD223DC64A590C2F6AD99112AC9C00ACCADA7290A9040D7B247A54ED4A
26,935,845 UART: [art] SIG.S = 43AABAE7FD3C3D894AC1537855B70025E0B23A80BC929FA2AEB14175D72EE20B358BED473A57150863A4DD130CD5F49A
27,914,894 UART: Caliptra RT
27,915,598 UART: [state] CFI Enabled
28,032,660 UART: [rt] RT listening for mailbox commands...
28,064,135 UART: [rt]cmd =0x49444352, len=4
28,066,129 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,297 UART: [kat] SHA2-256
882,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,343 UART: [kat] ++
886,495 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,475,939 UART: [cold-reset] ++
1,476,445 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,243 UART: [idev] CSR upload requested
1,515,089 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,040 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,747 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,629 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,334 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,754 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,601,902 UART: [idev] CSR uploaded
1,604,283 ready_for_fw is high
1,604,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,604,454 UART: [idev] --
1,605,527 UART: [ldev] ++
1,605,695 UART: [ldev] CDI.KEYID = 6
1,606,058 UART: [ldev] SUBJECT.KEYID = 5
1,606,484 UART: [ldev] AUTHORITY.KEYID = 7
1,606,947 UART: [ldev] FE.KEYID = 1
1,612,399 UART: [ldev] Erasing FE.KEYID = 1
1,637,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,668,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,675,680 UART: [ldev] --
1,677,087 UART: [fwproc] Waiting for Commands...
1,677,850 UART: [fwproc] Received command 0x46574c44
1,678,641 UART: [fwproc] Received Image of size 114084 bytes
2,972,769 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,000,769 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,030,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,165,514 >>> mbox cmd response: success
3,165,514 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,166,540 UART: [afmc] ++
3,166,708 UART: [afmc] CDI.KEYID = 6
3,167,070 UART: [afmc] SUBJECT.KEYID = 7
3,167,495 UART: [afmc] AUTHORITY.KEYID = 5
3,202,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,218,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,219,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,225,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,231,207 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,236,897 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,244,678 UART: [afmc] --
3,245,756 UART: [cold-reset] --
3,246,648 UART: [state] Locking Datavault
3,247,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,248,505 UART: [state] Locking ICCM
3,248,993 UART: [exit] Launching FMC @ 0x40000130
3,254,322 UART:
3,254,338 UART: Running Caliptra FMC ...
3,254,746 UART:
3,254,800 UART: [state] CFI Enabled
3,265,311 UART: [fht] FMC Alias Private Key: 7
3,373,318 UART: [art] Extend RT PCRs Done
3,373,746 UART: [art] Lock RT PCRs Done
3,375,006 UART: [art] Populate DV Done
3,383,353 UART: [fht] FMC Alias Private Key: 7
3,384,509 UART: [art] Derive CDI
3,384,789 UART: [art] Store in in slot 0x4
3,470,250 UART: [art] Derive Key Pair
3,470,610 UART: [art] Store priv key in slot 0x5
3,483,746 UART: [art] Derive Key Pair - Done
3,498,491 UART: [art] Signing Cert with AUTHO
3,498,971 UART: RITY.KEYID = 7
3,514,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,515,208 UART: [art] PUB.X = E7A0DEB7800A983278B9B91A52045D21609238634FF7D1E67A1AEF43D0DEE5F91E1E08AA4F9D0E20F60BAE001C7E946C
3,521,953 UART: [art] PUB.Y = 42445D94FE2E7FBB1C3CA4F86A00EE046E9FA49252ABE9A7C9A09414E2D72F3140D5749D3A967CDD61D63A522E053D18
3,528,885 UART: [art] SIG.R = 5031AAC2849B8A21EADDBF2BEAD1EC877D85B6DCEE6675FD74A0DEAAD6A7E9869DAB0C727806F1DC31223C933A1CA081
3,535,675 UART: [art] SIG.S = A244087F79A148D73B60E5F016BACC2B93B514F2B88F09BE7D89DE7FCFA2BDA44BD9E7ECD4AE15CC73C6F74307728715
3,558,731 UART: Caliptra RT
3,558,984 UART: [state] CFI Enabled
3,665,769 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,545 UART: [rt]cmd =0x49444352, len=4
3,697,960 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,844 ready_for_fw is high
1,410,844 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,939,385 >>> mbox cmd response: success
2,939,385 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,000,735 UART:
3,000,751 UART: Running Caliptra FMC ...
3,001,159 UART:
3,001,213 UART: [state] CFI Enabled
3,011,784 UART: [fht] FMC Alias Private Key: 7
3,120,057 UART: [art] Extend RT PCRs Done
3,120,485 UART: [art] Lock RT PCRs Done
3,121,747 UART: [art] Populate DV Done
3,130,258 UART: [fht] FMC Alias Private Key: 7
3,131,326 UART: [art] Derive CDI
3,131,606 UART: [art] Store in in slot 0x4
3,217,333 UART: [art] Derive Key Pair
3,217,693 UART: [art] Store priv key in slot 0x5
3,230,795 UART: [art] Derive Key Pair - Done
3,245,897 UART: [art] Signing Cert with AUTHO
3,246,377 UART: RITY.KEYID = 7
3,261,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,264 UART: [art] PUB.X = 1FB9E53B9CC67D2503B0E55F0640D0F92E61CEEA2C45FF9540B7F439471D09DE09D240467A5731E73417DDBFFABB0B7B
3,269,033 UART: [art] PUB.Y = 93B2C83B1B3E42E583FACB8E644E41D9E7C21FDCE79665B822E0755C366AC4A59D5CA06CEEA9A29EBD10B27563D412B6
3,275,999 UART: [art] SIG.R = 96626A873C9E0464720F18EF8368BECB262597C3BACA6B35CAF7173EC00A805AA93588D0239CA7492EAFCA02FEEB5422
3,282,767 UART: [art] SIG.S = 3EF6E0F2FF06139382E7AD41896730F5FD57A92D1559F076F94516C8E51F22CE08C3E3BB9D88B82D87F6B05062DAD307
3,306,625 UART: Caliptra RT
3,306,878 UART: [state] CFI Enabled
3,414,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,691 UART: [rt]cmd =0x49444352, len=4
3,446,060 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,433 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,477,028 UART: [cold-reset] ++
1,477,598 UART: [fht] Storing FHT @ 0x50003400
1,480,303 UART: [idev] ++
1,480,471 UART: [idev] CDI.KEYID = 6
1,480,831 UART: [idev] SUBJECT.KEYID = 7
1,481,255 UART: [idev] UDS.KEYID = 0
1,489,549 UART: [idev] Erasing UDS.KEYID = 0
1,506,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,652 UART: [idev] CSR upload requested
1,516,498 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,109 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,816 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,698 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,403 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,823 UART: [idev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
1,602,971 UART: [idev] CSR uploaded
1,605,352 ready_for_fw is high
1,605,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,605,523 UART: [idev] --
1,606,478 UART: [ldev] ++
1,606,646 UART: [ldev] CDI.KEYID = 6
1,607,009 UART: [ldev] SUBJECT.KEYID = 5
1,607,435 UART: [ldev] AUTHORITY.KEYID = 7
1,607,898 UART: [ldev] FE.KEYID = 1
1,613,088 UART: [ldev] Erasing FE.KEYID = 1
1,638,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,413 UART: [ldev] --
1,677,864 UART: [fwproc] Waiting for Commands...
1,678,593 UART: [fwproc] Received command 0x46574c44
1,679,384 UART: [fwproc] Received Image of size 114084 bytes
2,974,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,002,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,031,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,166,947 >>> mbox cmd response: success
3,166,947 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,168,155 UART: [afmc] ++
3,168,323 UART: [afmc] CDI.KEYID = 6
3,168,685 UART: [afmc] SUBJECT.KEYID = 7
3,169,110 UART: [afmc] AUTHORITY.KEYID = 5
3,204,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,220,401 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,221,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,226,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,232,794 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,238,484 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,246,383 UART: [afmc] --
3,247,367 UART: [cold-reset] --
3,248,301 UART: [state] Locking Datavault
3,249,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,250,102 UART: [state] Locking ICCM
3,250,742 UART: [exit] Launching FMC @ 0x40000130
3,256,071 UART:
3,256,087 UART: Running Caliptra FMC ...
3,256,495 UART:
3,256,638 UART: [state] CFI Enabled
3,267,015 UART: [fht] FMC Alias Private Key: 7
3,374,936 UART: [art] Extend RT PCRs Done
3,375,364 UART: [art] Lock RT PCRs Done
3,376,932 UART: [art] Populate DV Done
3,385,177 UART: [fht] FMC Alias Private Key: 7
3,386,185 UART: [art] Derive CDI
3,386,465 UART: [art] Store in in slot 0x4
3,472,486 UART: [art] Derive Key Pair
3,472,846 UART: [art] Store priv key in slot 0x5
3,485,856 UART: [art] Derive Key Pair - Done
3,500,574 UART: [art] Signing Cert with AUTHO
3,501,054 UART: RITY.KEYID = 7
3,517,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,893 UART: [art] PUB.X = 013A4CB9E8B7E4080FE4DDB8F66B46F2497544913F3D775AA7D99DD59A59C8B89394BD84A38E6671BAB1BC5C796A3CB0
3,524,666 UART: [art] PUB.Y = D381F22728752FED6DCDF2CCAEE246D69F26235A8DADC7EA3BFC3246E0575C28AB4222712065FB72BA0CF2AD238FB635
3,531,631 UART: [art] SIG.R = 32DDFB8AAE1DB33E23C46CEB2FF8B0AA85431EA307B658773FCAFA5390C85CC00F1DE649EE32B9C6419BD665F1DE3025
3,538,417 UART: [art] SIG.S = 1EFE83442C5068CF886C987781B788AE3E1014E3F55B7BED75095BD3F8B71BC1C84E8CE6BDFF4C842E0646AD33C02258
3,562,270 UART: Caliptra RT
3,562,615 UART: [state] CFI Enabled
3,670,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,275 UART: [rt]cmd =0x49444352, len=4
3,702,606 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,055 ready_for_fw is high
1,411,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,942,494 >>> mbox cmd response: success
2,942,494 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,003,606 UART:
3,003,622 UART: Running Caliptra FMC ...
3,004,030 UART:
3,004,173 UART: [state] CFI Enabled
3,014,748 UART: [fht] FMC Alias Private Key: 7
3,122,797 UART: [art] Extend RT PCRs Done
3,123,225 UART: [art] Lock RT PCRs Done
3,125,089 UART: [art] Populate DV Done
3,133,300 UART: [fht] FMC Alias Private Key: 7
3,134,334 UART: [art] Derive CDI
3,134,614 UART: [art] Store in in slot 0x4
3,220,473 UART: [art] Derive Key Pair
3,220,833 UART: [art] Store priv key in slot 0x5
3,233,861 UART: [art] Derive Key Pair - Done
3,248,348 UART: [art] Signing Cert with AUTHO
3,248,828 UART: RITY.KEYID = 7
3,264,100 UART: [art] Erasing AUTHORITY.KEYID = 7
3,264,865 UART: [art] PUB.X = ABE44A1D02D434DFB72CCBF5D673196638C69FA6AA11159753C5CC155E8ABCC115EE7D595BBC92999D938EA44DAEE91B
3,271,652 UART: [art] PUB.Y = EA112B51FA5929FA781719899D362121D66E1D6D3E54458C47DE7A53D6C2E6984CF6A6504DA3217364BBDC30A7430F17
3,278,599 UART: [art] SIG.R = A211F50F4C47CC7ED8645AB513036C6963D0297461ED5194668C78992C7B07B416D0B3764FF4E9A924A044C5755135EB
3,285,354 UART: [art] SIG.S = F1A3D3240DEC5FF3554BF5E65513DDDFF54F1774BEE79D5E372451E5071A1C4AFA28476E98086FB01E315B272F6F16CA
3,308,596 UART: Caliptra RT
3,308,941 UART: [state] CFI Enabled
3,417,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,671 UART: [rt]cmd =0x49444352, len=4
3,448,974 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,166 UART: [kat] HMAC-384Kdf
922,670 UART: [kat] LMS
1,170,998 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,184,102 UART: [idev] Erasing UDS.KEYID = 0
1,201,289 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] CSR upload begun
1,211,212 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,232 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,939 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,821 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,526 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,946 UART: [idev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
1,298,094 UART: [idev] CSR uploaded
1,300,473 ready_for_fw is high
1,300,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,644 UART: [idev] --
1,301,692 UART: [ldev] ++
1,301,860 UART: [ldev] CDI.KEYID = 6
1,302,223 UART: [ldev] SUBJECT.KEYID = 5
1,302,649 UART: [ldev] AUTHORITY.KEYID = 7
1,303,112 UART: [ldev] FE.KEYID = 1
1,308,082 UART: [ldev] Erasing FE.KEYID = 1
1,333,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,910 UART: [ldev] --
1,373,297 UART: [fwproc] Wait for Commands...
1,374,039 UART: [fwproc] Recv command 0x46574c44
1,374,767 UART: [fwproc] Recv'd Img size: 114084 bytes
2,669,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,860,756 >>> mbox cmd response: success
2,860,756 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,861,966 UART: [afmc] ++
2,862,134 UART: [afmc] CDI.KEYID = 6
2,862,496 UART: [afmc] SUBJECT.KEYID = 7
2,862,921 UART: [afmc] AUTHORITY.KEYID = 5
2,898,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,920,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,926,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,940,317 UART: [afmc] --
2,941,277 UART: [cold-reset] --
2,942,307 UART: [state] Locking Datavault
2,943,476 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,080 UART: [state] Locking ICCM
2,944,570 UART: [exit] Launching FMC @ 0x40000130
2,949,899 UART:
2,949,915 UART: Running Caliptra FMC ...
2,950,323 UART:
2,950,377 UART: [state] CFI Enabled
2,960,714 UART: [fht] FMC Alias Private Key: 7
3,069,291 UART: [art] Extend RT PCRs Done
3,069,719 UART: [art] Lock RT PCRs Done
3,071,249 UART: [art] Populate DV Done
3,079,272 UART: [fht] FMC Alias Private Key: 7
3,080,370 UART: [art] Derive CDI
3,080,650 UART: [art] Store in in slot 0x4
3,165,965 UART: [art] Derive Key Pair
3,166,325 UART: [art] Store priv key in slot 0x5
3,179,773 UART: [art] Derive Key Pair - Done
3,194,465 UART: [art] Signing Cert with AUTHO
3,194,945 UART: RITY.KEYID = 7
3,209,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,646 UART: [art] PUB.X = 9AC09343CE4A6ED68730BCCFE553ED268F38777E0FF8AB0A15DC80791DE22C9DA5D59607D2ACA4A556B388EEA65E643A
3,217,425 UART: [art] PUB.Y = 79578578A1F4E596C2DB188702F43F1438CC8F7062462EC8566DF2D4709F4B72AE2988BF83C29023BF52FF438BAD90A4
3,224,372 UART: [art] SIG.R = 2B3A231EEC6EBC5F64AA9CCD929D7BE5DA07D0BABB05F3C470826B093C4E51BAE63728759180DA3FEFEA107173C36BDB
3,231,157 UART: [art] SIG.S = C68CA234EA934A63A9374BB3A1A2DEA21D09505C5CF602E4277DC374C1E1A25E9F34E0E80A47E5FCDABE8F3589C48A1F
3,254,969 UART: Caliptra RT
3,255,222 UART: [state] CFI Enabled
3,362,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,927 UART: [rt]cmd =0x49444352, len=4
3,393,970 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,814 ready_for_fw is high
1,108,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,588 >>> mbox cmd response: success
2,640,588 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,564 UART:
2,703,580 UART: Running Caliptra FMC ...
2,703,988 UART:
2,704,042 UART: [state] CFI Enabled
2,714,877 UART: [fht] FMC Alias Private Key: 7
2,822,818 UART: [art] Extend RT PCRs Done
2,823,246 UART: [art] Lock RT PCRs Done
2,824,814 UART: [art] Populate DV Done
2,832,907 UART: [fht] FMC Alias Private Key: 7
2,833,975 UART: [art] Derive CDI
2,834,255 UART: [art] Store in in slot 0x4
2,920,152 UART: [art] Derive Key Pair
2,920,512 UART: [art] Store priv key in slot 0x5
2,934,024 UART: [art] Derive Key Pair - Done
2,948,934 UART: [art] Signing Cert with AUTHO
2,949,414 UART: RITY.KEYID = 7
2,964,262 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,027 UART: [art] PUB.X = 744AA431E6EB1BA211D6BBC956B645D24245C212FE6911EAE3D672779F4539A7706377A5D432F04EBFDBE5ED149E0CE1
2,971,804 UART: [art] PUB.Y = C1129A252A74589FB91E7DDA8A695BD317BADB26F95A8F54B5B989CF9F4E8AA41D4DAAD24B256A3B18FF54639F0AABDA
2,978,775 UART: [art] SIG.R = C0B7959C52EA35EAEEA22E54A3BCCA323E0646E86C899DC602329AE69D27B93670B34FDB6450E932799DC24D6D1449B9
2,985,547 UART: [art] SIG.S = 4CB59384CCF128FCC4A27291D4169056A990A9FA47AA855982059F475A8B1C557F1001EF580A3790B32EE3A3B4B594B9
3,009,311 UART: Caliptra RT
3,009,564 UART: [state] CFI Enabled
3,118,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,661 UART: [rt]cmd =0x49444352, len=4
3,149,918 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,818 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,184,539 UART: [idev] Erasing UDS.KEYID = 0
1,202,028 UART: [idev] Sha1 KeyId Algorithm
1,210,434 UART: [idev] CSR upload begun
1,212,215 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,905 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,612 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,494 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,240,199 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,619 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,767 UART: [idev] CSR uploaded
1,301,146 ready_for_fw is high
1,301,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,301,317 UART: [idev] --
1,302,229 UART: [ldev] ++
1,302,397 UART: [ldev] CDI.KEYID = 6
1,302,760 UART: [ldev] SUBJECT.KEYID = 5
1,303,186 UART: [ldev] AUTHORITY.KEYID = 7
1,303,649 UART: [ldev] FE.KEYID = 1
1,309,169 UART: [ldev] Erasing FE.KEYID = 1
1,335,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,781 UART: [ldev] --
1,375,102 UART: [fwproc] Wait for Commands...
1,375,720 UART: [fwproc] Recv command 0x46574c44
1,376,448 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,723 >>> mbox cmd response: success
2,862,723 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,863,785 UART: [afmc] ++
2,863,953 UART: [afmc] CDI.KEYID = 6
2,864,315 UART: [afmc] SUBJECT.KEYID = 7
2,864,740 UART: [afmc] AUTHORITY.KEYID = 5
2,900,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,602 UART: [afmc] --
2,943,496 UART: [cold-reset] --
2,944,244 UART: [state] Locking Datavault
2,945,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,877 UART: [state] Locking ICCM
2,946,457 UART: [exit] Launching FMC @ 0x40000130
2,951,786 UART:
2,951,802 UART: Running Caliptra FMC ...
2,952,210 UART:
2,952,353 UART: [state] CFI Enabled
2,962,990 UART: [fht] FMC Alias Private Key: 7
3,070,651 UART: [art] Extend RT PCRs Done
3,071,079 UART: [art] Lock RT PCRs Done
3,072,759 UART: [art] Populate DV Done
3,080,752 UART: [fht] FMC Alias Private Key: 7
3,081,712 UART: [art] Derive CDI
3,081,992 UART: [art] Store in in slot 0x4
3,167,433 UART: [art] Derive Key Pair
3,167,793 UART: [art] Store priv key in slot 0x5
3,181,491 UART: [art] Derive Key Pair - Done
3,196,048 UART: [art] Signing Cert with AUTHO
3,196,528 UART: RITY.KEYID = 7
3,212,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,903 UART: [art] PUB.X = ADDCB8F4CEA0E9356224B4E955A4C435E6A2EA020C937B821D14A605AD7D5621906CBEB694B8CBE9BC1C520B237C6417
3,219,675 UART: [art] PUB.Y = A81EB4FA23492166884EE29C6340EF3E4033AE980FBD808598157D382BE07678FBF4F6F779D202234447659F77831D21
3,226,611 UART: [art] SIG.R = 62B2CD531CB3F0F8EFAA71CA38E810B5E5F83BFD1DB7F79D42FA5D1D44331B632F336BD6B22F1B0E32CE095AF50C2AA1
3,233,396 UART: [art] SIG.S = 309F5B2A459AEFF0A1E9FD3E4FA81AB5070145DF79B61B39985EBD97AC531E17F34A5689D3FC9967AE5CF29A84DC33C6
3,256,563 UART: Caliptra RT
3,256,908 UART: [state] CFI Enabled
3,363,731 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,163 UART: [rt]cmd =0x49444352, len=4
3,395,530 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,973 ready_for_fw is high
1,109,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,109 >>> mbox cmd response: success
2,641,109 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,943 UART:
2,703,959 UART: Running Caliptra FMC ...
2,704,367 UART:
2,704,510 UART: [state] CFI Enabled
2,715,105 UART: [fht] FMC Alias Private Key: 7
2,823,070 UART: [art] Extend RT PCRs Done
2,823,498 UART: [art] Lock RT PCRs Done
2,824,936 UART: [art] Populate DV Done
2,833,267 UART: [fht] FMC Alias Private Key: 7
2,834,331 UART: [art] Derive CDI
2,834,611 UART: [art] Store in in slot 0x4
2,920,028 UART: [art] Derive Key Pair
2,920,388 UART: [art] Store priv key in slot 0x5
2,934,040 UART: [art] Derive Key Pair - Done
2,948,874 UART: [art] Signing Cert with AUTHO
2,949,354 UART: RITY.KEYID = 7
2,964,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,999 UART: [art] PUB.X = E30393C065E662848FA3A90EA3D06F06B30448E738EBE9C5C6D9B5244D014B048D1655F809450AD47256A22F86EB761A
2,971,743 UART: [art] PUB.Y = 8BFA38650CC9BF523C67B14D53885502B364B12964929DF4736A7124674D3F91F3944DD6CC537B3A24034F4925C8A54E
2,978,678 UART: [art] SIG.R = B370B99ED76FCEE435808194FBF60FE2950778A48D8F80F6A01AF070FF32836FFFF42EFF4D3AC3CCA9A80B2E3CB8868C
2,985,459 UART: [art] SIG.S = D6335E1ED9A2044C6156853E98BB98F659386474EEC56E20D9E21FBF947D1FB9932973E0ECD90C605DCFACC632A5B6C2
3,008,640 UART: Caliptra RT
3,008,985 UART: [state] CFI Enabled
3,116,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,295 UART: [rt]cmd =0x49444352, len=4
3,148,654 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
915,178 UART: [kat] HMAC-384Kdf
919,726 UART: [kat] LMS
1,168,038 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,661 UART: [fht] FHT @ 0x50003400
1,172,237 UART: [idev] ++
1,172,405 UART: [idev] CDI.KEYID = 6
1,172,766 UART: [idev] SUBJECT.KEYID = 7
1,173,191 UART: [idev] UDS.KEYID = 0
1,180,759 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,206,633 UART: [idev] CSR upload begun
1,208,412 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,499 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,207 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,092 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,798 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,227 UART: [idev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
1,295,721 UART: [idev] CSR uploaded
1,298,766 ready_for_fw is high
1,298,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,298,935 UART: [idev] --
1,300,064 UART: [ldev] ++
1,300,232 UART: [ldev] CDI.KEYID = 6
1,300,596 UART: [ldev] SUBJECT.KEYID = 5
1,301,023 UART: [ldev] AUTHORITY.KEYID = 7
1,301,486 UART: [ldev] FE.KEYID = 1
1,306,694 UART: [ldev] Erasing FE.KEYID = 1
1,332,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,432 UART: [ldev] --
1,371,922 UART: [fwproc] Wait for Commands...
1,372,493 UART: [fwproc] Recv command 0x46574c44
1,373,226 UART: [fwproc] Recv'd Img size: 114084 bytes
2,667,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,694,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,723,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,858,993 >>> mbox cmd response: success
2,858,993 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,860,118 UART: [afmc] ++
2,860,286 UART: [afmc] CDI.KEYID = 6
2,860,649 UART: [afmc] SUBJECT.KEYID = 7
2,861,075 UART: [afmc] AUTHORITY.KEYID = 5
2,896,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,912,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,913,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,918,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,924,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,930,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,938,247 UART: [afmc] --
2,939,279 UART: [cold-reset] --
2,940,263 UART: [state] Locking Datavault
2,941,436 UART: [state] Locking PCR0, PCR1 and PCR31
2,942,040 UART: [state] Locking ICCM
2,942,564 UART: [exit] Launching FMC @ 0x40000130
2,947,893 UART:
2,947,909 UART: Running Caliptra FMC ...
2,948,317 UART:
2,948,371 UART: [state] CFI Enabled
2,958,688 UART: [fht] FMC Alias Private Key: 7
3,066,805 UART: [art] Extend RT PCRs Done
3,067,233 UART: [art] Lock RT PCRs Done
3,068,623 UART: [art] Populate DV Done
3,076,706 UART: [fht] FMC Alias Private Key: 7
3,077,876 UART: [art] Derive CDI
3,078,156 UART: [art] Store in in slot 0x4
3,163,819 UART: [art] Derive Key Pair
3,164,179 UART: [art] Store priv key in slot 0x5
3,177,089 UART: [art] Derive Key Pair - Done
3,191,830 UART: [art] Signing Cert with AUTHO
3,192,310 UART: RITY.KEYID = 7
3,207,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,208,129 UART: [art] PUB.X = 7556A921A8068F54B88D9EC00D1F2A996F6F181532F8A247C4B8116729CEB697A00475EA07C59B3EA64735F89E0A8178
3,214,880 UART: [art] PUB.Y = 6A5329F6CFE7ED93DA5B9EAAC80BBE3CA65401491D460F40150FC5FF27D9901297238CE89398F658F941596B01D96D96
3,221,819 UART: [art] SIG.R = D40DE688CD3A6D739ECD3BE56B0E502670544D68E15448481ACCCDD93DBF0327ECB2112C35D4B05F911C318392BC82AA
3,228,592 UART: [art] SIG.S = 1218BB7ED1618CA1B85351A4CA2B7C6987C5E1D2634F4910A1EBD502DA78B83C2806E4497CAA44D6FFC40B816D2C4B33
3,252,308 UART: Caliptra RT
3,252,561 UART: [state] CFI Enabled
3,359,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,628 UART: [rt]cmd =0x49444352, len=4
3,396,808 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,957 ready_for_fw is high
1,106,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,636,070 >>> mbox cmd response: success
2,636,070 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,698,236 UART:
2,698,252 UART: Running Caliptra FMC ...
2,698,660 UART:
2,698,714 UART: [state] CFI Enabled
2,708,989 UART: [fht] FMC Alias Private Key: 7
2,816,780 UART: [art] Extend RT PCRs Done
2,817,208 UART: [art] Lock RT PCRs Done
2,818,876 UART: [art] Populate DV Done
2,826,939 UART: [fht] FMC Alias Private Key: 7
2,828,053 UART: [art] Derive CDI
2,828,333 UART: [art] Store in in slot 0x4
2,913,616 UART: [art] Derive Key Pair
2,913,976 UART: [art] Store priv key in slot 0x5
2,927,414 UART: [art] Derive Key Pair - Done
2,941,899 UART: [art] Signing Cert with AUTHO
2,942,379 UART: RITY.KEYID = 7
2,957,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,056 UART: [art] PUB.X = 56846F38B1CBAECA146344AA0063439C372498CD92CD0AA8503A44136C7034041AD2A769C5148087F2698B2275C5A2D1
2,964,792 UART: [art] PUB.Y = 1A51161E6B9DEBF634D1C42DF3E48BE504162AD6DC2D4E52DB8D09223190EF755725E60357777F7627E0184418F3C534
2,971,731 UART: [art] SIG.R = F2514E8D0713E19FE817F53A483629C9F7D9AEFEF32D60207B21FB62909F59DE89500F7565CA676676BA60D0858FC330
2,978,495 UART: [art] SIG.S = 25AAF7403FA8B5E6E25AAEB585886806E02799A140D3B47FB7AC66D2ED03EC8F41490501DA039ADB856E316B49B3201B
3,002,119 UART: Caliptra RT
3,002,372 UART: [state] CFI Enabled
3,110,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,141 UART: [rt]cmd =0x49444352, len=4
3,148,077 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,879 UART: [state] LifecycleState = Unprovisioned
86,534 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,334 UART: [kat] SHA2-256
902,274 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,008 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] CSR upload begun
1,209,231 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,690 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,398 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,283 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,989 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,418 UART: [idev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
1,296,912 UART: [idev] CSR uploaded
1,299,957 ready_for_fw is high
1,299,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,300,126 UART: [idev] --
1,301,223 UART: [ldev] ++
1,301,391 UART: [ldev] CDI.KEYID = 6
1,301,755 UART: [ldev] SUBJECT.KEYID = 5
1,302,182 UART: [ldev] AUTHORITY.KEYID = 7
1,302,645 UART: [ldev] FE.KEYID = 1
1,307,767 UART: [ldev] Erasing FE.KEYID = 1
1,335,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,661 UART: [ldev] --
1,373,941 UART: [fwproc] Wait for Commands...
1,374,720 UART: [fwproc] Recv command 0x46574c44
1,375,453 UART: [fwproc] Recv'd Img size: 114084 bytes
2,670,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,862,618 >>> mbox cmd response: success
2,862,618 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,863,737 UART: [afmc] ++
2,863,905 UART: [afmc] CDI.KEYID = 6
2,864,268 UART: [afmc] SUBJECT.KEYID = 7
2,864,694 UART: [afmc] AUTHORITY.KEYID = 5
2,900,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,924 UART: [afmc] --
2,943,966 UART: [cold-reset] --
2,944,760 UART: [state] Locking Datavault
2,945,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,387 UART: [state] Locking ICCM
2,946,887 UART: [exit] Launching FMC @ 0x40000130
2,952,216 UART:
2,952,232 UART: Running Caliptra FMC ...
2,952,640 UART:
2,952,783 UART: [state] CFI Enabled
2,963,534 UART: [fht] FMC Alias Private Key: 7
3,071,489 UART: [art] Extend RT PCRs Done
3,071,917 UART: [art] Lock RT PCRs Done
3,073,467 UART: [art] Populate DV Done
3,081,482 UART: [fht] FMC Alias Private Key: 7
3,082,418 UART: [art] Derive CDI
3,082,698 UART: [art] Store in in slot 0x4
3,168,443 UART: [art] Derive Key Pair
3,168,803 UART: [art] Store priv key in slot 0x5
3,182,483 UART: [art] Derive Key Pair - Done
3,197,390 UART: [art] Signing Cert with AUTHO
3,197,870 UART: RITY.KEYID = 7
3,213,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,961 UART: [art] PUB.X = C2EAC222AA3E18EEA44FBFB779782C074D7C1B43217BA915165901FE2675784529DD27AB063C0C128903A521E7254FD4
3,220,718 UART: [art] PUB.Y = 1EA2C3FEC3C73FE79A4581A7A7771DD683BF7D41BAC908EC80DF2927A58816EFF3F791D748D0DAE390A93EDD9B09B1AE
3,227,684 UART: [art] SIG.R = 204117A4654246A23055275D796E9E3A29F3D786ED35E3F3AC90E54BD042B6F9CEA3CE68193AE1F6FDBBF1AFBA4965FB
3,234,468 UART: [art] SIG.S = FF9948A646964685C26D86BB7A6931791C81B10240E29F6CAFBFF892DBE5C9B19E179F07D3E41F0408D8554BB1A9F5D5
3,258,859 UART: Caliptra RT
3,259,204 UART: [state] CFI Enabled
3,366,435 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,875 UART: [rt]cmd =0x49444352, len=4
3,404,023 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,986 ready_for_fw is high
1,107,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,638,255 >>> mbox cmd response: success
2,638,255 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,701,049 UART:
2,701,065 UART: Running Caliptra FMC ...
2,701,473 UART:
2,701,616 UART: [state] CFI Enabled
2,712,129 UART: [fht] FMC Alias Private Key: 7
2,820,232 UART: [art] Extend RT PCRs Done
2,820,660 UART: [art] Lock RT PCRs Done
2,822,186 UART: [art] Populate DV Done
2,830,243 UART: [fht] FMC Alias Private Key: 7
2,831,205 UART: [art] Derive CDI
2,831,485 UART: [art] Store in in slot 0x4
2,917,084 UART: [art] Derive Key Pair
2,917,444 UART: [art] Store priv key in slot 0x5
2,930,760 UART: [art] Derive Key Pair - Done
2,945,551 UART: [art] Signing Cert with AUTHO
2,946,031 UART: RITY.KEYID = 7
2,961,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,002 UART: [art] PUB.X = 7AD9423C7B48DAE45F41C2700CF054EA2DABC9E19F280528A1727AF7BFA24D11F6F3C106C4CDD5A629E9266AA12725D3
2,968,777 UART: [art] PUB.Y = ECECA63B2D2840F2950E02B50F38DB5F542533B27B2D7FBDE05D8FD0094D12D84B505A1D52BD83480AB69863CA6B9DA6
2,975,726 UART: [art] SIG.R = 5AE5260C9F9C8ACED720599CACE675EB4176985373AF3F8D503233DD2725DD658014DDAEC109268BE0D5EDC765C4E35A
2,982,502 UART: [art] SIG.S = 9AFF77C980CA8EC04321F83774BD1E4C3DD0C361FDCAAD49B8F95A3B7674701781D5BC6DB7E7E84FC1CFCE9E06F0FF25
3,005,774 UART: Caliptra RT
3,006,119 UART: [state] CFI Enabled
3,114,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,578 UART: [rt]cmd =0x49444352, len=4
3,151,770 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,294 UART:
192,667 UART: Running Caliptra ROM ...
193,851 UART:
194,026 UART: [state] CFI Enabled
261,518 UART: [state] LifecycleState = Unprovisioned
263,441 UART: [state] DebugLocked = No
265,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,837 UART: [kat] SHA2-256
440,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,992 UART: [kat] ++
451,601 UART: [kat] sha1
462,767 UART: [kat] SHA2-256
465,411 UART: [kat] SHA2-384
471,255 UART: [kat] SHA2-512-ACC
473,640 UART: [kat] ECC-384
2,766,518 UART: [kat] HMAC-384Kdf
2,798,174 UART: [kat] LMS
3,988,526 UART: [kat] --
3,992,675 UART: [cold-reset] ++
3,993,649 UART: [fht] Storing FHT @ 0x50003400
4,004,924 UART: [idev] ++
4,005,500 UART: [idev] CDI.KEYID = 6
4,006,432 UART: [idev] SUBJECT.KEYID = 7
4,007,681 UART: [idev] UDS.KEYID = 0
4,008,719 ready_for_fw is high
4,008,924 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,011 UART: [idev] Erasing UDS.KEYID = 0
7,347,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,536 UART: [idev] --
7,372,177 UART: [ldev] ++
7,372,752 UART: [ldev] CDI.KEYID = 6
7,373,696 UART: [ldev] SUBJECT.KEYID = 5
7,374,906 UART: [ldev] AUTHORITY.KEYID = 7
7,376,164 UART: [ldev] FE.KEYID = 1
7,421,954 UART: [ldev] Erasing FE.KEYID = 1
10,753,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,188 UART: [ldev] --
13,137,292 UART: [fwproc] Waiting for Commands...
13,139,983 UART: [fwproc] Received command 0x46574c44
13,142,215 UART: [fwproc] Received Image of size 113760 bytes
17,187,690 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,651,898 >>> mbox cmd response: success
17,656,142 UART: [afmc] ++
17,656,761 UART: [afmc] CDI.KEYID = 6
17,657,679 UART: [afmc] SUBJECT.KEYID = 7
17,658,893 UART: [afmc] AUTHORITY.KEYID = 5
21,025,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,876 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,243 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,113 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,521 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,247 UART: [afmc] --
23,397,490 UART: [cold-reset] --
23,401,995 UART: [state] Locking Datavault
23,408,160 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,912 UART: [state] Locking ICCM
23,412,681 UART: [exit] Launching FMC @ 0x40000130
23,421,078 UART:
23,421,333 UART: Running Caliptra FMC ...
23,422,362 UART:
23,422,512 UART: [state] CFI Enabled
23,488,136 UART: [fht] FMC Alias Private Key: 7
25,827,126 UART: [art] Extend RT PCRs Done
25,828,345 UART: [art] Lock RT PCRs Done
25,829,887 UART: [art] Populate DV Done
25,835,341 UART: [fht] FMC Alias Private Key: 7
25,836,970 UART: [art] Derive CDI
25,837,790 UART: [art] Store in in slot 0x4
25,886,500 UART: [art] Derive Key Pair
25,887,502 UART: [art] Store priv key in slot 0x5
29,180,282 UART: [art] Derive Key Pair - Done
29,193,269 UART: [art] Signing Cert with AUTHO
29,194,600 UART: RITY.KEYID = 7
31,481,820 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,348 UART: [art] PUB.X = 2D8397EEC7DCBD80E58F70C7E312CC5CD9A5FC9E340146C978CEB588C322143732FE9FC15385030FEA541470C69D5257
31,490,547 UART: [art] PUB.Y = 15A8FCE3E23A867716EB24BCEE508F15604D36AD815249E1671D0A2E8ABB0814E73F76ED50D01339FF7765F913FE02BF
31,497,834 UART: [art] SIG.R = 27702973F46FAEE793399FA5A9CDEC6E2E510BEB86401D061A41C39273E97F1F71C426F9974BCBCC8751131A51EC6DC1
31,505,217 UART: [art] SIG.S = 9CCA260A9E8AF103558553307A148B0C41D7823BC17258595A530906191B191371A390DC8ED5815307F5FECDDACE903C
32,810,240 UART: Caliptra RT
32,810,956 UART: [state] CFI Enabled
32,972,058 UART: [rt] RT listening for mailbox commands...
32,973,893 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,004,438 UART: [rt]cmd =0x49444352, len=4
33,006,072 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,788,020 ready_for_fw is high
3,788,439 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,862,598 >>> mbox cmd response: success
23,549,235 UART:
23,549,764 UART: Running Caliptra FMC ...
23,550,872 UART:
23,551,031 UART: [state] CFI Enabled
23,618,248 UART: [fht] FMC Alias Private Key: 7
25,955,457 UART: [art] Extend RT PCRs Done
25,956,690 UART: [art] Lock RT PCRs Done
25,958,649 UART: [art] Populate DV Done
25,964,078 UART: [fht] FMC Alias Private Key: 7
25,965,729 UART: [art] Derive CDI
25,966,477 UART: [art] Store in in slot 0x4
26,025,896 UART: [art] Derive Key Pair
26,026,902 UART: [art] Store priv key in slot 0x5
29,319,873 UART: [art] Derive Key Pair - Done
29,332,490 UART: [art] Signing Cert with AUTHO
29,333,827 UART: RITY.KEYID = 7
31,621,067 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,596 UART: [art] PUB.X = 2AC5FAB083C5A8E54C664AD85F7137DD71EF85B46FC5BB1C743236D71F765064890D0201E7F84E4EECF225248045EF4D
31,629,865 UART: [art] PUB.Y = F10D17CD1C01663DB9EBC91D8281320332F6E9F41CF8F9D47B08343AF39650058F653F4DF0796D27714E3B78B0BC98E6
31,637,059 UART: [art] SIG.R = 842872F8684E06AB56C02F3094D450925247BB17BBC5B93D9C91ED8ACD445F45841FDADCF1A25F01A8E2F056BAC37526
31,644,473 UART: [art] SIG.S = A521F2708A643FBC4F82515D22BDCE579D42C4ACC78164C7C25CBE9A521A773B7DD4E32F6C6C3A77C867038B622C7D94
32,950,009 UART: Caliptra RT
32,950,733 UART: [state] CFI Enabled
33,110,444 UART: [rt] RT listening for mailbox commands...
33,112,290 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,142,737 UART: [rt]cmd =0x49444352, len=4
33,144,515 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
192,984 UART:
193,362 UART: Running Caliptra ROM ...
194,544 UART:
604,246 UART: [state] CFI Enabled
616,556 UART: [state] LifecycleState = Unprovisioned
618,422 UART: [state] DebugLocked = No
620,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,709 UART: [kat] SHA2-256
795,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,983 UART: [kat] ++
806,425 UART: [kat] sha1
817,270 UART: [kat] SHA2-256
819,972 UART: [kat] SHA2-384
824,121 UART: [kat] SHA2-512-ACC
826,485 UART: [kat] ECC-384
3,110,416 UART: [kat] HMAC-384Kdf
3,121,581 UART: [kat] LMS
4,311,676 UART: [kat] --
4,318,033 UART: [cold-reset] ++
4,318,912 UART: [fht] Storing FHT @ 0x50003400
4,329,037 UART: [idev] ++
4,329,594 UART: [idev] CDI.KEYID = 6
4,330,616 UART: [idev] SUBJECT.KEYID = 7
4,331,784 UART: [idev] UDS.KEYID = 0
4,332,820 ready_for_fw is high
4,333,025 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,475,903 UART: [idev] Erasing UDS.KEYID = 0
7,615,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,438 UART: [idev] --
7,642,615 UART: [ldev] ++
7,643,184 UART: [ldev] CDI.KEYID = 6
7,644,221 UART: [ldev] SUBJECT.KEYID = 5
7,645,323 UART: [ldev] AUTHORITY.KEYID = 7
7,646,601 UART: [ldev] FE.KEYID = 1
7,657,295 UART: [ldev] Erasing FE.KEYID = 1
10,949,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,536 UART: [ldev] --
13,308,079 UART: [fwproc] Waiting for Commands...
13,310,977 UART: [fwproc] Received command 0x46574c44
13,313,157 UART: [fwproc] Received Image of size 113760 bytes
17,367,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,185 >>> mbox cmd response: success
17,834,166 UART: [afmc] ++
17,834,762 UART: [afmc] CDI.KEYID = 6
17,835,726 UART: [afmc] SUBJECT.KEYID = 7
17,836,939 UART: [afmc] AUTHORITY.KEYID = 5
21,151,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,763 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,134 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,927 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,399 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,044 UART: [afmc] --
23,516,536 UART: [cold-reset] --
23,519,581 UART: [state] Locking Datavault
23,525,476 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,237 UART: [state] Locking ICCM
23,528,326 UART: [exit] Launching FMC @ 0x40000130
23,536,730 UART:
23,537,005 UART: Running Caliptra FMC ...
23,538,120 UART:
23,538,298 UART: [state] CFI Enabled
23,546,314 UART: [fht] FMC Alias Private Key: 7
25,877,296 UART: [art] Extend RT PCRs Done
25,878,519 UART: [art] Lock RT PCRs Done
25,880,274 UART: [art] Populate DV Done
25,885,628 UART: [fht] FMC Alias Private Key: 7
25,887,167 UART: [art] Derive CDI
25,887,897 UART: [art] Store in in slot 0x4
25,930,433 UART: [art] Derive Key Pair
25,931,429 UART: [art] Store priv key in slot 0x5
29,173,321 UART: [art] Derive Key Pair - Done
29,186,389 UART: [art] Signing Cert with AUTHO
29,187,710 UART: RITY.KEYID = 7
31,467,419 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,926 UART: [art] PUB.X = 25604D4638BD0BB6B39C6D8C2C7566706858FAC06227A7D88643166307FB2F8C32D7033D98C2FB2549BEA6537B072AE6
31,476,205 UART: [art] PUB.Y = 0C2C7E3C77BC03D81B856A077E44511C3B6A8C6FC25F10CA05BBE463BB3E0F450EFCC7CD1F15C015CFF5C059FB9745CE
31,483,458 UART: [art] SIG.R = EECD26784227890B4A11670AF48BACDFD8337383B3B863279748A7F8621531D5E2857611EA68266BF721CE0FBC8078C1
31,490,820 UART: [art] SIG.S = 23C94678E8D681AB1660EB1ABDF8934DC9454438440F6D94A34FE33870BC532B1582F313FA7F9D0AA9C43D566E607B7F
32,796,057 UART: Caliptra RT
32,796,771 UART: [state] CFI Enabled
32,914,442 UART: [rt] RT listening for mailbox commands...
32,916,279 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,945,937 UART: [rt]cmd =0x49444352, len=4
32,947,870 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
4,123,842 ready_for_fw is high
4,124,427 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,055,954 >>> mbox cmd response: success
23,693,092 UART:
23,693,504 UART: Running Caliptra FMC ...
23,694,645 UART:
23,694,806 UART: [state] CFI Enabled
23,703,013 UART: [fht] FMC Alias Private Key: 7
26,033,617 UART: [art] Extend RT PCRs Done
26,034,847 UART: [art] Lock RT PCRs Done
26,036,395 UART: [art] Populate DV Done
26,041,712 UART: [fht] FMC Alias Private Key: 7
26,043,312 UART: [art] Derive CDI
26,044,131 UART: [art] Store in in slot 0x4
26,086,785 UART: [art] Derive Key Pair
26,087,829 UART: [art] Store priv key in slot 0x5
29,329,700 UART: [art] Derive Key Pair - Done
29,342,886 UART: [art] Signing Cert with AUTHO
29,344,193 UART: RITY.KEYID = 7
31,623,419 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,940 UART: [art] PUB.X = B3D99D5650F510536BE0608AEF3D878744AFA0DDEAD66689FE035C3381F1871415116BFD98EA4915B6C873C5F31F8AB0
31,632,184 UART: [art] PUB.Y = AD41871F4F830FCB1D9F80F297DF806F6BA4B29BF087B23F3C3530441C1996358C48321FB5AE6CFA7170CA168CF7014A
31,639,418 UART: [art] SIG.R = DC2F413C32ED6F83E93F2A977E8CEA753CC23E35C24D6913FE8AD0D72B0DE91F163928829420167345E6CC478B899F60
31,646,807 UART: [art] SIG.S = 6E5B62251102B3050380B133657C7341F4F68354803EBB5DC5F437412B56B642EEF70E631ED17B8F0C37CCFA12C2DB88
32,952,219 UART: Caliptra RT
32,952,940 UART: [state] CFI Enabled
33,070,765 UART: [rt] RT listening for mailbox commands...
33,072,630 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,102,423 UART: [rt]cmd =0x49444352, len=4
33,104,259 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
192,640 UART:
193,016 UART: Running Caliptra ROM ...
194,208 UART:
194,357 UART: [state] CFI Enabled
259,985 UART: [state] LifecycleState = Unprovisioned
261,881 UART: [state] DebugLocked = No
263,904 UART: [state] WD Timer not started. Device not locked for debugging
267,944 UART: [kat] SHA2-256
447,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,608 UART: [kat] ++
459,138 UART: [kat] sha1
469,586 UART: [kat] SHA2-256
472,585 UART: [kat] SHA2-384
479,731 UART: [kat] SHA2-512-ACC
482,709 UART: [kat] ECC-384
2,927,381 UART: [kat] HMAC-384Kdf
2,949,288 UART: [kat] LMS
3,478,765 UART: [kat] --
3,483,186 UART: [cold-reset] ++
3,484,610 UART: [fht] FHT @ 0x50003400
3,494,587 UART: [idev] ++
3,495,142 UART: [idev] CDI.KEYID = 6
3,496,045 UART: [idev] SUBJECT.KEYID = 7
3,497,286 UART: [idev] UDS.KEYID = 0
3,498,206 ready_for_fw is high
3,498,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,641,893 UART: [idev] Erasing UDS.KEYID = 0
6,003,544 UART: [idev] Sha1 KeyId Algorithm
6,026,074 UART: [idev] --
6,030,236 UART: [ldev] ++
6,030,803 UART: [ldev] CDI.KEYID = 6
6,031,787 UART: [ldev] SUBJECT.KEYID = 5
6,032,953 UART: [ldev] AUTHORITY.KEYID = 7
6,034,186 UART: [ldev] FE.KEYID = 1
6,077,600 UART: [ldev] Erasing FE.KEYID = 1
8,582,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,027 UART: [ldev] --
10,391,449 UART: [fwproc] Wait for Commands...
10,393,910 UART: [fwproc] Recv command 0x46574c44
10,395,951 UART: [fwproc] Recv'd Img size: 114084 bytes
13,796,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,865,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,934,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,251,656 >>> mbox cmd response: success
14,255,105 UART: [afmc] ++
14,255,719 UART: [afmc] CDI.KEYID = 6
14,256,628 UART: [afmc] SUBJECT.KEYID = 7
14,257,788 UART: [afmc] AUTHORITY.KEYID = 5
16,784,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,527,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,543,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,559,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,953 UART: [afmc] --
18,584,059 UART: [cold-reset] --
18,588,132 UART: [state] Locking Datavault
18,590,291 UART: [state] Locking PCR0, PCR1 and PCR31
18,591,935 UART: [state] Locking ICCM
18,593,132 UART: [exit] Launching FMC @ 0x40000130
18,601,535 UART:
18,601,768 UART: Running Caliptra FMC ...
18,602,867 UART:
18,603,024 UART: [state] CFI Enabled
18,667,559 UART: [fht] FMC Alias Private Key: 7
20,431,436 UART: [art] Extend RT PCRs Done
20,432,660 UART: [art] Lock RT PCRs Done
20,434,226 UART: [art] Populate DV Done
20,439,851 UART: [fht] FMC Alias Private Key: 7
20,441,555 UART: [art] Derive CDI
20,442,366 UART: [art] Store in in slot 0x4
20,500,214 UART: [art] Derive Key Pair
20,501,250 UART: [art] Store priv key in slot 0x5
22,963,786 UART: [art] Derive Key Pair - Done
22,976,785 UART: [art] Signing Cert with AUTHO
22,978,112 UART: RITY.KEYID = 7
24,689,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,429 UART: [art] PUB.X = BB021F46E3EE42D63C42EA6AFBA07F113122C710A302A6310D33655A8D9B2CAB763DF0172A86465EDA4532997B665D01
24,698,715 UART: [art] PUB.Y = 7CA45885BCE13F36AB18CD1F22073C52728A8DC9AF8E2FACFF96426AF1DEC6B68FD32AD95AA00EB98377ED0A406C389B
24,705,979 UART: [art] SIG.R = 54C2186A46F4A7F4A4941A2E06F0BDA88B5D1951D491420B67250FD49773EF8AE845023B2C1E8F9BA4B8092CCD39E343
24,713,356 UART: [art] SIG.S = 904DD1BBC6152262FBBF6242B031A93D713F77BBD13B846EE5F9180DD29C4C6C0BEF8D74CD342CA3051142A6172B2E66
25,693,058 UART: Caliptra RT
25,694,079 UART: [state] CFI Enabled
25,867,824 UART: [rt] RT listening for mailbox commands...
25,869,679 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,900,165 UART: [rt]cmd =0x49444352, len=4
25,901,947 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
3,382,007 ready_for_fw is high
3,382,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,062,975 >>> mbox cmd response: success
18,343,693 UART:
18,344,097 UART: Running Caliptra FMC ...
18,345,227 UART:
18,345,386 UART: [state] CFI Enabled
18,412,300 UART: [fht] FMC Alias Private Key: 7
20,176,516 UART: [art] Extend RT PCRs Done
20,177,742 UART: [art] Lock RT PCRs Done
20,179,420 UART: [art] Populate DV Done
20,184,943 UART: [fht] FMC Alias Private Key: 7
20,186,527 UART: [art] Derive CDI
20,187,349 UART: [art] Store in in slot 0x4
20,244,606 UART: [art] Derive Key Pair
20,245,600 UART: [art] Store priv key in slot 0x5
22,709,001 UART: [art] Derive Key Pair - Done
22,721,629 UART: [art] Signing Cert with AUTHO
22,722,938 UART: RITY.KEYID = 7
24,435,504 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,996 UART: [art] PUB.X = 042E32B9F33BD337CABD6851CAC9A1B48CC467F39F2845C1505DB41FE96F6203114B8911CD7088C5AFCC3DC127CBD0BD
24,444,279 UART: [art] PUB.Y = A6782C99F403CDAB0CBF8D6129AC65CA32FCC27132ED1CC03777233F7BD5E907B803F4057773171D9A48E2548CB4B9E0
24,451,563 UART: [art] SIG.R = 84A27098422683577102FFED84EFBCF113566BB4A956D469DD244DDF4EB43DCC3F22985958BC5E4A7D06A1BD4242225E
24,458,923 UART: [art] SIG.S = F49A7A30DBBE386FBA5C00F0C1D4786853876F325D712027B930D8FDDBA024A8F847600140E4808CD8B6B0871C126DED
25,438,006 UART: Caliptra RT
25,438,708 UART: [state] CFI Enabled
25,604,793 UART: [rt] RT listening for mailbox commands...
25,606,628 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,637,164 UART: [rt]cmd =0x49444352, len=4
25,638,927 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
193,055 UART:
193,429 UART: Running Caliptra ROM ...
194,622 UART:
604,323 UART: [state] CFI Enabled
616,992 UART: [state] LifecycleState = Unprovisioned
618,798 UART: [state] DebugLocked = No
620,540 UART: [state] WD Timer not started. Device not locked for debugging
624,713 UART: [kat] SHA2-256
803,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,391 UART: [kat] ++
815,924 UART: [kat] sha1
826,805 UART: [kat] SHA2-256
829,875 UART: [kat] SHA2-384
837,072 UART: [kat] SHA2-512-ACC
839,968 UART: [kat] ECC-384
3,279,053 UART: [kat] HMAC-384Kdf
3,292,638 UART: [kat] LMS
3,822,075 UART: [kat] --
3,827,207 UART: [cold-reset] ++
3,829,222 UART: [fht] FHT @ 0x50003400
3,839,740 UART: [idev] ++
3,840,318 UART: [idev] CDI.KEYID = 6
3,841,231 UART: [idev] SUBJECT.KEYID = 7
3,842,408 UART: [idev] UDS.KEYID = 0
3,843,457 ready_for_fw is high
3,843,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,556 UART: [idev] Erasing UDS.KEYID = 0
6,319,300 UART: [idev] Sha1 KeyId Algorithm
6,341,302 UART: [idev] --
6,346,656 UART: [ldev] ++
6,347,251 UART: [ldev] CDI.KEYID = 6
6,348,172 UART: [ldev] SUBJECT.KEYID = 5
6,349,327 UART: [ldev] AUTHORITY.KEYID = 7
6,350,560 UART: [ldev] FE.KEYID = 1
6,360,127 UART: [ldev] Erasing FE.KEYID = 1
8,833,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,082 UART: [ldev] --
10,625,705 UART: [fwproc] Wait for Commands...
10,627,315 UART: [fwproc] Recv command 0x46574c44
10,629,517 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,477,482 >>> mbox cmd response: success
14,481,561 UART: [afmc] ++
14,482,162 UART: [afmc] CDI.KEYID = 6
14,483,050 UART: [afmc] SUBJECT.KEYID = 7
14,484,267 UART: [afmc] AUTHORITY.KEYID = 5
16,982,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,750 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,161 UART: [afmc] --
18,779,975 UART: [cold-reset] --
18,782,003 UART: [state] Locking Datavault
18,785,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,036 UART: [state] Locking ICCM
18,789,516 UART: [exit] Launching FMC @ 0x40000130
18,797,724 UART:
18,797,980 UART: Running Caliptra FMC ...
18,799,093 UART:
18,799,257 UART: [state] CFI Enabled
18,807,575 UART: [fht] FMC Alias Private Key: 7
20,565,320 UART: [art] Extend RT PCRs Done
20,566,534 UART: [art] Lock RT PCRs Done
20,567,782 UART: [art] Populate DV Done
20,573,361 UART: [fht] FMC Alias Private Key: 7
20,574,857 UART: [art] Derive CDI
20,575,622 UART: [art] Store in in slot 0x4
20,618,380 UART: [art] Derive Key Pair
20,619,381 UART: [art] Store priv key in slot 0x5
23,045,565 UART: [art] Derive Key Pair - Done
23,058,319 UART: [art] Signing Cert with AUTHO
23,059,626 UART: RITY.KEYID = 7
24,765,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,831 UART: [art] PUB.X = 79DD037658C8FC6975547945B3B2A47438C6E12E49C4D9B66E31C9D5B285632E775B83123FA909027C03F5C5FE07380F
24,774,046 UART: [art] PUB.Y = 7F4FD874A74F321EFF985357D16616D88EC162B6B7043E636E6729E68899F240A91ED61E9FC56EE564B42898615E56CA
24,781,311 UART: [art] SIG.R = 05192C0E5054C1777306B2F98266A71D080B21E465C31B126E83382014ED0EE2C338F478A125E38C198C1356A12FFAE8
24,788,687 UART: [art] SIG.S = C23A10AAEFF8EFA6AF5179845C5CC56FFC5DD040F877835099C6F7A95A3509273BACADBA44B1E0A3ACC23869C15EA6B7
25,767,671 UART: Caliptra RT
25,768,387 UART: [state] CFI Enabled
25,885,294 UART: [rt] RT listening for mailbox commands...
25,887,144 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,916,916 UART: [rt]cmd =0x49444352, len=4
25,918,610 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
3,694,973 ready_for_fw is high
3,695,382 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,428 >>> mbox cmd response: success
18,516,704 UART:
18,517,113 UART: Running Caliptra FMC ...
18,518,319 UART:
18,518,501 UART: [state] CFI Enabled
18,526,446 UART: [fht] FMC Alias Private Key: 7
20,283,270 UART: [art] Extend RT PCRs Done
20,284,497 UART: [art] Lock RT PCRs Done
20,285,698 UART: [art] Populate DV Done
20,291,064 UART: [fht] FMC Alias Private Key: 7
20,292,814 UART: [art] Derive CDI
20,293,652 UART: [art] Store in in slot 0x4
20,335,886 UART: [art] Derive Key Pair
20,336,893 UART: [art] Store priv key in slot 0x5
22,763,532 UART: [art] Derive Key Pair - Done
22,776,527 UART: [art] Signing Cert with AUTHO
22,777,873 UART: RITY.KEYID = 7
24,483,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,100 UART: [art] PUB.X = BE02B843A57C61D2AA4B94A7970A2E6935B84217229697D05336406EB69294975EFB72641852158F5515E40419AE8397
24,492,336 UART: [art] PUB.Y = 3D067ABA97ED074C195E18FAC04255BAF3B0E6B479D26B04A6E3A2247DB5303D8A10F91BDC27562BD5231DA334B323E6
24,499,572 UART: [art] SIG.R = 8B4B0FD6ADE7B0DB83EB83CF1E92DD893390F33F18389B7342BFDBF9EF4592B4DBE7295A954296E155B4E85BA06BE9D9
24,506,998 UART: [art] SIG.S = B341FF4C75BD4B2979ADE52C28AB9D873AA47B94C60B17E7FCC694D890B9E1498221B5B115FFFB8481792A2A1D4C5245
25,485,703 UART: Caliptra RT
25,486,406 UART: [state] CFI Enabled
25,604,237 UART: [rt] RT listening for mailbox commands...
25,606,077 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,635,626 UART: [rt]cmd =0x49444352, len=4
25,637,510 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,622 UART:
192,983 UART: Running Caliptra ROM ...
194,166 UART:
194,318 UART: [state] CFI Enabled
266,663 UART: [state] LifecycleState = Unprovisioned
269,091 UART: [state] DebugLocked = No
270,919 UART: [state] WD Timer not started. Device not locked for debugging
275,388 UART: [kat] SHA2-256
465,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,055 UART: [kat] ++
476,516 UART: [kat] sha1
488,172 UART: [kat] SHA2-256
491,175 UART: [kat] SHA2-384
498,372 UART: [kat] SHA2-512-ACC
500,953 UART: [kat] ECC-384
2,948,107 UART: [kat] HMAC-384Kdf
2,971,855 UART: [kat] LMS
3,503,664 UART: [kat] --
3,509,175 UART: [cold-reset] ++
3,510,823 UART: [fht] FHT @ 0x50003400
3,522,259 UART: [idev] ++
3,523,015 UART: [idev] CDI.KEYID = 6
3,523,907 UART: [idev] SUBJECT.KEYID = 7
3,525,083 UART: [idev] UDS.KEYID = 0
3,525,986 ready_for_fw is high
3,526,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,545 UART: [idev] Erasing UDS.KEYID = 0
6,026,931 UART: [idev] Sha1 KeyId Algorithm
6,048,494 UART: [idev] --
6,054,378 UART: [ldev] ++
6,055,053 UART: [ldev] CDI.KEYID = 6
6,055,939 UART: [ldev] SUBJECT.KEYID = 5
6,057,173 UART: [ldev] AUTHORITY.KEYID = 7
6,058,352 UART: [ldev] FE.KEYID = 1
6,099,118 UART: [ldev] Erasing FE.KEYID = 1
8,605,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,347 UART: [ldev] --
10,411,457 UART: [fwproc] Wait for Commands...
10,414,037 UART: [fwproc] Recv command 0x46574c44
10,416,344 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,188 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,133 >>> mbox cmd response: success
14,597,629 UART: [afmc] ++
14,598,337 UART: [afmc] CDI.KEYID = 6
14,599,444 UART: [afmc] SUBJECT.KEYID = 7
14,600,999 UART: [afmc] AUTHORITY.KEYID = 5
17,142,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,899 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,959 UART: [afmc] --
18,943,785 UART: [cold-reset] --
18,946,949 UART: [state] Locking Datavault
18,953,890 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,098 UART: [state] Locking ICCM
18,959,051 UART: [exit] Launching FMC @ 0x40000130
18,967,707 UART:
18,967,940 UART: Running Caliptra FMC ...
18,968,968 UART:
18,969,113 UART: [state] CFI Enabled
19,027,743 UART: [fht] FMC Alias Private Key: 7
20,791,703 UART: [art] Extend RT PCRs Done
20,792,929 UART: [art] Lock RT PCRs Done
20,794,703 UART: [art] Populate DV Done
20,800,211 UART: [fht] FMC Alias Private Key: 7
20,801,924 UART: [art] Derive CDI
20,802,741 UART: [art] Store in in slot 0x4
20,859,679 UART: [art] Derive Key Pair
20,860,672 UART: [art] Store priv key in slot 0x5
23,323,955 UART: [art] Derive Key Pair - Done
23,336,744 UART: [art] Signing Cert with AUTHO
23,338,044 UART: RITY.KEYID = 7
25,049,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,250 UART: [art] PUB.X = C14247DF16933E11345F8702ECD4A5E57247F84E8BC8AC962DB1AA025DDAC22EB6CD568D62B2B12CD92D441B0FD4FEB4
25,058,532 UART: [art] PUB.Y = AA8B4F80B7882D8E60E1801A44AE02F4BEF66B73813062A66C9EC33843908A79FA612C926B0A814D3599C780C61DFF5C
25,065,784 UART: [art] SIG.R = F977DC9DF7E053C1FF44900BBF2D314185B730FC08C11537C422C999E3199468F567EC2D59B16E1E36804E3C27788A97
25,073,161 UART: [art] SIG.S = 30F0FEB89CDDD3814E92526D229E0F17F80EF038B3A9E42C9AD27588146A68AEDD650AA90D1B97944951092A56DB473A
26,052,131 UART: Caliptra RT
26,052,854 UART: [state] CFI Enabled
26,217,171 UART: [rt] RT listening for mailbox commands...
26,219,026 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,249,517 UART: [rt]cmd =0x49444352, len=4
26,251,127 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,438,339 ready_for_fw is high
3,438,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,722,959 >>> mbox cmd response: success
19,020,179 UART:
19,020,616 UART: Running Caliptra FMC ...
19,022,002 UART:
19,022,177 UART: [state] CFI Enabled
19,085,041 UART: [fht] FMC Alias Private Key: 7
20,849,503 UART: [art] Extend RT PCRs Done
20,850,734 UART: [art] Lock RT PCRs Done
20,852,143 UART: [art] Populate DV Done
20,857,884 UART: [fht] FMC Alias Private Key: 7
20,859,423 UART: [art] Derive CDI
20,860,235 UART: [art] Store in in slot 0x4
20,917,565 UART: [art] Derive Key Pair
20,918,602 UART: [art] Store priv key in slot 0x5
23,381,251 UART: [art] Derive Key Pair - Done
23,394,422 UART: [art] Signing Cert with AUTHO
23,395,721 UART: RITY.KEYID = 7
25,106,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,121 UART: [art] PUB.X = 88355C018C0C487B51E30C606181AB42D070CB41E8EF6CE7DC3F64B3735A6A21DE2307A7210E9A70D1EA4ADFF6B3D006
25,115,412 UART: [art] PUB.Y = 6BEF6082B122AA89B44C0A5D90E8976F997C3C96ECAEE688BE2BC55D5572B40A66D478A421CA9ED029E803FEB8E434EC
25,122,665 UART: [art] SIG.R = C4BB9FD47C25CBD55FFEA485A13F2A9254D80D48EB27625099DB7C4E226DC5CEC8E4248B6E9AFA73E0B264C1619EB016
25,130,050 UART: [art] SIG.S = 1B35C737DDC542C0AC175A8CABF1AE2112B48F43D565637FCD26EF961A94F89616E986721237C0DAE63FFC163269405B
26,109,201 UART: Caliptra RT
26,109,928 UART: [state] CFI Enabled
26,275,007 UART: [rt] RT listening for mailbox commands...
26,276,862 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,307,057 UART: [rt]cmd =0x49444352, len=4
26,309,012 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,776 UART:
193,149 UART: Running Caliptra ROM ...
194,287 UART:
603,881 UART: [state] CFI Enabled
615,012 UART: [state] LifecycleState = Unprovisioned
617,327 UART: [state] DebugLocked = No
619,072 UART: [state] WD Timer not started. Device not locked for debugging
624,612 UART: [kat] SHA2-256
814,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,258 UART: [kat] ++
825,867 UART: [kat] sha1
837,176 UART: [kat] SHA2-256
840,183 UART: [kat] SHA2-384
845,644 UART: [kat] SHA2-512-ACC
848,197 UART: [kat] ECC-384
3,288,158 UART: [kat] HMAC-384Kdf
3,301,756 UART: [kat] LMS
3,833,587 UART: [kat] --
3,836,023 UART: [cold-reset] ++
3,837,484 UART: [fht] FHT @ 0x50003400
3,850,388 UART: [idev] ++
3,851,027 UART: [idev] CDI.KEYID = 6
3,852,014 UART: [idev] SUBJECT.KEYID = 7
3,853,191 UART: [idev] UDS.KEYID = 0
3,854,115 ready_for_fw is high
3,854,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,997,598 UART: [idev] Erasing UDS.KEYID = 0
6,331,291 UART: [idev] Sha1 KeyId Algorithm
6,354,225 UART: [idev] --
6,358,748 UART: [ldev] ++
6,359,439 UART: [ldev] CDI.KEYID = 6
6,360,352 UART: [ldev] SUBJECT.KEYID = 5
6,361,511 UART: [ldev] AUTHORITY.KEYID = 7
6,362,908 UART: [ldev] FE.KEYID = 1
6,374,302 UART: [ldev] Erasing FE.KEYID = 1
8,853,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,487 UART: [ldev] --
10,644,737 UART: [fwproc] Wait for Commands...
10,646,454 UART: [fwproc] Recv command 0x46574c44
10,648,764 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,832,343 >>> mbox cmd response: success
14,836,921 UART: [afmc] ++
14,837,631 UART: [afmc] CDI.KEYID = 6
14,838,888 UART: [afmc] SUBJECT.KEYID = 7
14,840,353 UART: [afmc] AUTHORITY.KEYID = 5
17,351,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,299 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,632 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,831 UART: [afmc] --
19,148,703 UART: [cold-reset] --
19,152,580 UART: [state] Locking Datavault
19,158,600 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,754 UART: [state] Locking ICCM
19,162,438 UART: [exit] Launching FMC @ 0x40000130
19,170,942 UART:
19,171,195 UART: Running Caliptra FMC ...
19,172,302 UART:
19,172,484 UART: [state] CFI Enabled
19,180,532 UART: [fht] FMC Alias Private Key: 7
20,937,508 UART: [art] Extend RT PCRs Done
20,938,731 UART: [art] Lock RT PCRs Done
20,940,355 UART: [art] Populate DV Done
20,945,986 UART: [fht] FMC Alias Private Key: 7
20,947,528 UART: [art] Derive CDI
20,948,346 UART: [art] Store in in slot 0x4
20,990,886 UART: [art] Derive Key Pair
20,991,886 UART: [art] Store priv key in slot 0x5
23,419,151 UART: [art] Derive Key Pair - Done
23,432,154 UART: [art] Signing Cert with AUTHO
23,433,467 UART: RITY.KEYID = 7
25,138,649 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,157 UART: [art] PUB.X = 42BF95E016449765899B96D1799A326C19609698167DA4A970869038B3E89D1363B02D954067FB7A1D591608F7A799E1
25,147,377 UART: [art] PUB.Y = B51854BDB8A00ED7A409CFD8C32D9452A1149FCD3910B87B9CD1AB0B80C48A082B1476275960B2F7C33E8610FB32A0AA
25,154,653 UART: [art] SIG.R = A0573E2E28FF6DCD693CB585EEDD72AFBDCB1DFDAAC2B5F594F13CA5F6021D47FA37EBC6EC49E575FE5EA443CD8223BF
25,162,077 UART: [art] SIG.S = 1FA12A5E4FDA19DEC6BCD3F18F3863AD60C62354B01157BD4A45726BF5B410F1C28954F3E4AC2DBD791DAAACA0AF2037
26,141,056 UART: Caliptra RT
26,141,773 UART: [state] CFI Enabled
26,259,532 UART: [rt] RT listening for mailbox commands...
26,261,374 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,291,137 UART: [rt]cmd =0x49444352, len=4
26,292,943 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
3,756,568 ready_for_fw is high
3,757,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,953,364 >>> mbox cmd response: success
19,210,900 UART:
19,211,298 UART: Running Caliptra FMC ...
19,212,415 UART:
19,212,571 UART: [state] CFI Enabled
19,220,688 UART: [fht] FMC Alias Private Key: 7
20,977,791 UART: [art] Extend RT PCRs Done
20,979,017 UART: [art] Lock RT PCRs Done
20,981,053 UART: [art] Populate DV Done
20,986,425 UART: [fht] FMC Alias Private Key: 7
20,988,101 UART: [art] Derive CDI
20,988,842 UART: [art] Store in in slot 0x4
21,031,769 UART: [art] Derive Key Pair
21,032,819 UART: [art] Store priv key in slot 0x5
23,460,030 UART: [art] Derive Key Pair - Done
23,473,298 UART: [art] Signing Cert with AUTHO
23,474,607 UART: RITY.KEYID = 7
25,179,960 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,480 UART: [art] PUB.X = 439805E9E41CA5FA5FD42EC702FED956BB45AF6E328AE42F78372FFD57E263F0CA4816B4C77EC177815951D593A3D3F0
25,188,745 UART: [art] PUB.Y = F08E0594E34D5A4F6586B7B9740EA067C9D522CD0321663FD2D4ACA31BB270791FDF6E0D84C1783EB6D53D7EECF41A20
25,195,971 UART: [art] SIG.R = 313FBE598295B8C539BA90D8E663907DF52693C9E86A577E89849E8C44387EC986203B5D06D4C4973893B5CA7E3523E4
25,203,363 UART: [art] SIG.S = 66877D93AE64F5838030714F82BD13796A3FDE4ACC6E982E9DA8D8517FD2D2DB7B235536790DAC6B469DE694D06889DC
26,182,211 UART: Caliptra RT
26,182,901 UART: [state] CFI Enabled
26,299,746 UART: [rt] RT listening for mailbox commands...
26,301,581 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,331,422 UART: [rt]cmd =0x49444352, len=4
26,333,129 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,030 UART: [kat] SHA2-512-ACC
896,931 UART: [kat] ECC-384
902,254 UART: [kat] HMAC-384Kdf
906,724 UART: [kat] LMS
1,474,920 UART: [kat] --
1,475,801 UART: [cold-reset] ++
1,476,315 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 ready_for_fw is high
1,480,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,504,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,048 UART: [idev] --
1,514,219 UART: [ldev] ++
1,514,387 UART: [ldev] CDI.KEYID = 6
1,514,750 UART: [ldev] SUBJECT.KEYID = 5
1,515,176 UART: [ldev] AUTHORITY.KEYID = 7
1,515,639 UART: [ldev] FE.KEYID = 1
1,520,969 UART: [ldev] Erasing FE.KEYID = 1
1,546,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,308 UART: [ldev] --
1,585,569 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 114084 bytes
2,881,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,505 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,468 >>> mbox cmd response: success
3,075,708 UART: [afmc] ++
3,075,876 UART: [afmc] CDI.KEYID = 6
3,076,238 UART: [afmc] SUBJECT.KEYID = 7
3,076,663 UART: [afmc] AUTHORITY.KEYID = 5
3,112,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,776 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,284 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,169 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,859 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,816 UART: [afmc] --
3,155,706 UART: [cold-reset] --
3,156,694 UART: [state] Locking Datavault
3,158,153 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,757 UART: [state] Locking ICCM
3,159,375 UART: [exit] Launching FMC @ 0x40000130
3,164,704 UART:
3,164,720 UART: Running Caliptra FMC ...
3,165,128 UART:
3,165,182 UART: [state] CFI Enabled
3,175,667 UART: [fht] FMC Alias Private Key: 7
3,282,978 UART: [art] Extend RT PCRs Done
3,283,406 UART: [art] Lock RT PCRs Done
3,285,022 UART: [art] Populate DV Done
3,293,093 UART: [fht] FMC Alias Private Key: 7
3,294,205 UART: [art] Derive CDI
3,294,485 UART: [art] Store in in slot 0x4
3,380,234 UART: [art] Derive Key Pair
3,380,594 UART: [art] Store priv key in slot 0x5
3,393,982 UART: [art] Derive Key Pair - Done
3,408,668 UART: [art] Signing Cert with AUTHO
3,409,148 UART: RITY.KEYID = 7
3,424,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,837 UART: [art] PUB.X = D26F19C2C2CC6C7C98FC0FDCA0D9E86C4D9637DE33BB0F833DFAEB4A049619123AB286AA80012C73C390199B353D6A84
3,431,609 UART: [art] PUB.Y = 9893C50AE4CE22FD1C6556E8938C7194564A40214291B52D985755C813D54B18AFF2E0C9F375D1BD37877788652258B5
3,438,546 UART: [art] SIG.R = 455EDB47FD70C04CE8AED8B6A6F418765977710D1D6516B970879EB34073B0BBF7ECD83776DFB446CC5067A820AF17F2
3,445,321 UART: [art] SIG.S = 2AA8AA8E5A0AF704DFBD1C4F8A4FCF35A8C16AC980930D8F77D58F4824B94D35308BF300995069DA8B50A0B7CA2EC7BC
3,468,875 UART: Caliptra RT
3,469,128 UART: [state] CFI Enabled
3,576,398 UART: [rt] RT listening for mailbox commands...
3,577,068 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,828 UART: [rt]cmd =0x49444352, len=4
3,608,393 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,921 ready_for_fw is high
1,362,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,210 >>> mbox cmd response: success
2,982,346 UART:
2,982,362 UART: Running Caliptra FMC ...
2,982,770 UART:
2,982,824 UART: [state] CFI Enabled
2,993,179 UART: [fht] FMC Alias Private Key: 7
3,101,822 UART: [art] Extend RT PCRs Done
3,102,250 UART: [art] Lock RT PCRs Done
3,103,768 UART: [art] Populate DV Done
3,111,717 UART: [fht] FMC Alias Private Key: 7
3,112,899 UART: [art] Derive CDI
3,113,179 UART: [art] Store in in slot 0x4
3,198,764 UART: [art] Derive Key Pair
3,199,124 UART: [art] Store priv key in slot 0x5
3,211,786 UART: [art] Derive Key Pair - Done
3,226,948 UART: [art] Signing Cert with AUTHO
3,227,428 UART: RITY.KEYID = 7
3,242,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,243,191 UART: [art] PUB.X = CE9D6A46AEB458426C385E5175372256223EBD04394B47390C10FC674A3832184FB4CDC5B03246CECA0B4924068B2106
3,249,942 UART: [art] PUB.Y = 4BFAF3E1091854A295E993A36D6249C0394EFA3F31B5C09E44E996BBC484570ACB6FDAAADFF5332A2808AFCD633BC875
3,256,899 UART: [art] SIG.R = D37BE8B720E268F3B11F35FEA943193D05B9A837867CC45247ADF54623ECE4B0B23F922A29D296345752B12B6EE757E4
3,263,668 UART: [art] SIG.S = 2E0B9ED013AFDD5C9FD1F16A139932112D7AE50D113E4124727FB1DB1E16F5D70F81DAA6A4576106D53AFFB87118BCCC
3,287,325 UART: Caliptra RT
3,287,578 UART: [state] CFI Enabled
3,395,749 UART: [rt] RT listening for mailbox commands...
3,396,419 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,426,315 UART: [rt]cmd =0x49444352, len=4
3,427,516 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,399 UART: [kat] HMAC-384Kdf
908,247 UART: [kat] LMS
1,476,443 UART: [kat] --
1,477,246 UART: [cold-reset] ++
1,477,598 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,667 UART: [idev] Erasing UDS.KEYID = 0
1,506,533 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,215 UART: [idev] --
1,516,294 UART: [ldev] ++
1,516,462 UART: [ldev] CDI.KEYID = 6
1,516,825 UART: [ldev] SUBJECT.KEYID = 5
1,517,251 UART: [ldev] AUTHORITY.KEYID = 7
1,517,714 UART: [ldev] FE.KEYID = 1
1,523,054 UART: [ldev] Erasing FE.KEYID = 1
1,548,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,793 UART: [ldev] --
1,588,234 UART: [fwproc] Waiting for Commands...
1,589,083 UART: [fwproc] Received command 0x46574c44
1,589,874 UART: [fwproc] Received Image of size 114084 bytes
2,885,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,479 >>> mbox cmd response: success
3,078,635 UART: [afmc] ++
3,078,803 UART: [afmc] CDI.KEYID = 6
3,079,165 UART: [afmc] SUBJECT.KEYID = 7
3,079,590 UART: [afmc] AUTHORITY.KEYID = 5
3,115,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,866 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,556 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,417 UART: [afmc] --
3,158,325 UART: [cold-reset] --
3,159,181 UART: [state] Locking Datavault
3,160,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,208 UART: [state] Locking ICCM
3,161,670 UART: [exit] Launching FMC @ 0x40000130
3,166,999 UART:
3,167,015 UART: Running Caliptra FMC ...
3,167,423 UART:
3,167,566 UART: [state] CFI Enabled
3,178,195 UART: [fht] FMC Alias Private Key: 7
3,286,536 UART: [art] Extend RT PCRs Done
3,286,964 UART: [art] Lock RT PCRs Done
3,288,280 UART: [art] Populate DV Done
3,296,641 UART: [fht] FMC Alias Private Key: 7
3,297,715 UART: [art] Derive CDI
3,297,995 UART: [art] Store in in slot 0x4
3,383,880 UART: [art] Derive Key Pair
3,384,240 UART: [art] Store priv key in slot 0x5
3,397,314 UART: [art] Derive Key Pair - Done
3,411,775 UART: [art] Signing Cert with AUTHO
3,412,255 UART: RITY.KEYID = 7
3,427,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,004 UART: [art] PUB.X = 2F75F8A87D61057D215159F5C4E90B35204D6146B67A9D5C52F9492F154D2B21FB640F9E9C3BD14C96343D68F01EA3F9
3,434,765 UART: [art] PUB.Y = 1ECF1713D5962E8C90D53E21D9F0672F8BAD92AFF2AF212BCEEF7332EBDDB80F7F1A93ED13DAD2E81623FBB6F722B359
3,441,736 UART: [art] SIG.R = B1E2A226B2BC8B2081C30830B51128EFA5631EED81A9C907F93338082C412EE29F89E5DD4D709D90B9AB3247211A0367
3,448,494 UART: [art] SIG.S = 9AA5EFA439788920E85E94FE39990891A119AE062983C83118D818E87242D02EC6966142FE736418AAB8201661FA07E4
3,471,718 UART: Caliptra RT
3,472,063 UART: [state] CFI Enabled
3,579,695 UART: [rt] RT listening for mailbox commands...
3,580,365 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,967 UART: [rt]cmd =0x49444352, len=4
3,611,244 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 ready_for_fw is high
1,362,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,655 >>> mbox cmd response: success
2,984,075 UART:
2,984,091 UART: Running Caliptra FMC ...
2,984,499 UART:
2,984,642 UART: [state] CFI Enabled
2,995,079 UART: [fht] FMC Alias Private Key: 7
3,103,664 UART: [art] Extend RT PCRs Done
3,104,092 UART: [art] Lock RT PCRs Done
3,105,748 UART: [art] Populate DV Done
3,113,907 UART: [fht] FMC Alias Private Key: 7
3,115,075 UART: [art] Derive CDI
3,115,355 UART: [art] Store in in slot 0x4
3,200,584 UART: [art] Derive Key Pair
3,200,944 UART: [art] Store priv key in slot 0x5
3,214,652 UART: [art] Derive Key Pair - Done
3,229,458 UART: [art] Signing Cert with AUTHO
3,229,938 UART: RITY.KEYID = 7
3,245,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,267 UART: [art] PUB.X = 2EFEEF573585563B7191BE02E787B07AA1C9D9E7507DA922BC8BA309726490999B6C7A9335398A07D02CBA012560B05E
3,253,025 UART: [art] PUB.Y = DF7DFB1D5C2AA7466E9F200A5CC31C1DE0B9432B6B34F909994340EEB081BBD9317CBA0D408B119FAD04FBC77C40A82B
3,259,983 UART: [art] SIG.R = E75E4F76E507BE0C6896C3A76858FA2A004FCEC7805C8F1011D4722A7B39C939AD805ABE965B4A03BE457C0E7B2B1175
3,266,727 UART: [art] SIG.S = 78854C0623A1FB14B76652093922CD20D920059F00F93CAEF1ECA07323E2AB3F8ED3985C630C459E5E04F93DA5031C82
3,290,280 UART: Caliptra RT
3,290,625 UART: [state] CFI Enabled
3,399,396 UART: [rt] RT listening for mailbox commands...
3,400,066 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,768 UART: [rt]cmd =0x49444352, len=4
3,430,759 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
917,706 UART: [kat] HMAC-384Kdf
922,088 UART: [kat] LMS
1,170,416 UART: [kat] --
1,171,559 UART: [cold-reset] ++
1,172,023 UART: [fht] FHT @ 0x50003400
1,174,638 UART: [idev] ++
1,174,806 UART: [idev] CDI.KEYID = 6
1,175,166 UART: [idev] SUBJECT.KEYID = 7
1,175,590 UART: [idev] UDS.KEYID = 0
1,175,935 ready_for_fw is high
1,175,935 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,981 UART: [idev] Sha1 KeyId Algorithm
1,208,335 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,012 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,586 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,939 >>> mbox cmd response: success
2,769,991 UART: [afmc] ++
2,770,159 UART: [afmc] CDI.KEYID = 6
2,770,521 UART: [afmc] SUBJECT.KEYID = 7
2,770,946 UART: [afmc] AUTHORITY.KEYID = 5
2,806,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,842 UART: [afmc] --
2,849,802 UART: [cold-reset] --
2,850,738 UART: [state] Locking Datavault
2,851,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,243 UART: [state] Locking ICCM
2,852,817 UART: [exit] Launching FMC @ 0x40000130
2,858,146 UART:
2,858,162 UART: Running Caliptra FMC ...
2,858,570 UART:
2,858,624 UART: [state] CFI Enabled
2,869,117 UART: [fht] FMC Alias Private Key: 7
2,976,900 UART: [art] Extend RT PCRs Done
2,977,328 UART: [art] Lock RT PCRs Done
2,979,358 UART: [art] Populate DV Done
2,987,695 UART: [fht] FMC Alias Private Key: 7
2,988,657 UART: [art] Derive CDI
2,988,937 UART: [art] Store in in slot 0x4
3,074,428 UART: [art] Derive Key Pair
3,074,788 UART: [art] Store priv key in slot 0x5
3,087,920 UART: [art] Derive Key Pair - Done
3,102,720 UART: [art] Signing Cert with AUTHO
3,103,200 UART: RITY.KEYID = 7
3,118,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,241 UART: [art] PUB.X = 61BD89749796EE8FC40ECBEBE714C5CBC7CD4521AAFAC3AC17DF4A7A2C1CA1B93512EE35AFCBE436E1CB8BA8F5E43306
3,126,037 UART: [art] PUB.Y = 1135DECCDDE9619C68A34FEE618F508A52A63D2584CE419B1A9B536DF427549741A534530084D13EDE3EAA1F892C7708
3,132,966 UART: [art] SIG.R = ACAEBC96E51D9CEF25EF08546E32A0150D8217EA701B42AB2BBDC3C93B667943E714192B8666D325942AAE3D16567384
3,139,736 UART: [art] SIG.S = 1DAE79D1311978A833848EDD0974C526D69EE6355C4E32C60534EA059433281DD7DE06C3A5CC3ED7C5D0D39F1FA53322
3,163,437 UART: Caliptra RT
3,163,690 UART: [state] CFI Enabled
3,271,997 UART: [rt] RT listening for mailbox commands...
3,272,667 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,609 UART: [rt]cmd =0x49444352, len=4
3,303,888 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,197 ready_for_fw is high
1,060,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,890 >>> mbox cmd response: success
2,686,274 UART:
2,686,290 UART: Running Caliptra FMC ...
2,686,698 UART:
2,686,752 UART: [state] CFI Enabled
2,697,161 UART: [fht] FMC Alias Private Key: 7
2,805,440 UART: [art] Extend RT PCRs Done
2,805,868 UART: [art] Lock RT PCRs Done
2,807,528 UART: [art] Populate DV Done
2,815,607 UART: [fht] FMC Alias Private Key: 7
2,816,785 UART: [art] Derive CDI
2,817,065 UART: [art] Store in in slot 0x4
2,903,232 UART: [art] Derive Key Pair
2,903,592 UART: [art] Store priv key in slot 0x5
2,916,410 UART: [art] Derive Key Pair - Done
2,930,903 UART: [art] Signing Cert with AUTHO
2,931,383 UART: RITY.KEYID = 7
2,946,221 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,986 UART: [art] PUB.X = A95D750A9ADDDBC9585B4205FD9B2401563078E47268D6CEEB22B9C06D806B14BA0A36025503519F1BC9083C7B02B470
2,953,734 UART: [art] PUB.Y = 5AC67E68F84289D583DEE320166A51692D6C1B1BFA528B931C0F98743F724D999261C9727EBA7794B37023D228277C66
2,960,673 UART: [art] SIG.R = 568705E5441A721824CE711A9040A8F2AEBFDE2BFACE11875A50D11631F6F7588E6A7F1A1AF07A4CB2B8D94B81A292E5
2,967,450 UART: [art] SIG.S = 15FB8694FD6DF5007EF6F58D26D900023F007C1AF6A54AE6F441CD37F636F5216FD1DD6276E4B38FBF9B8B1FCDCA4D7B
2,991,308 UART: Caliptra RT
2,991,561 UART: [state] CFI Enabled
3,099,608 UART: [rt] RT listening for mailbox commands...
3,100,278 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,102 UART: [rt]cmd =0x49444352, len=4
3,131,491 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,637 UART: [kat] SHA2-512-ACC
908,538 UART: [kat] ECC-384
918,345 UART: [kat] HMAC-384Kdf
923,115 UART: [kat] LMS
1,171,443 UART: [kat] --
1,172,638 UART: [cold-reset] ++
1,173,094 UART: [fht] FHT @ 0x50003400
1,175,977 UART: [idev] ++
1,176,145 UART: [idev] CDI.KEYID = 6
1,176,505 UART: [idev] SUBJECT.KEYID = 7
1,176,929 UART: [idev] UDS.KEYID = 0
1,177,274 ready_for_fw is high
1,177,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,407 UART: [idev] Erasing UDS.KEYID = 0
1,202,160 UART: [idev] Sha1 KeyId Algorithm
1,210,628 UART: [idev] --
1,211,462 UART: [ldev] ++
1,211,630 UART: [ldev] CDI.KEYID = 6
1,211,993 UART: [ldev] SUBJECT.KEYID = 5
1,212,419 UART: [ldev] AUTHORITY.KEYID = 7
1,212,882 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,232 UART: [ldev] --
1,283,737 UART: [fwproc] Wait for Commands...
1,284,399 UART: [fwproc] Recv command 0x46574c44
1,285,127 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,328 >>> mbox cmd response: success
2,771,442 UART: [afmc] ++
2,771,610 UART: [afmc] CDI.KEYID = 6
2,771,972 UART: [afmc] SUBJECT.KEYID = 7
2,772,397 UART: [afmc] AUTHORITY.KEYID = 5
2,807,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,217 UART: [afmc] --
2,851,195 UART: [cold-reset] --
2,851,825 UART: [state] Locking Datavault
2,852,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,488 UART: [state] Locking ICCM
2,854,140 UART: [exit] Launching FMC @ 0x40000130
2,859,469 UART:
2,859,485 UART: Running Caliptra FMC ...
2,859,893 UART:
2,860,036 UART: [state] CFI Enabled
2,870,989 UART: [fht] FMC Alias Private Key: 7
2,979,120 UART: [art] Extend RT PCRs Done
2,979,548 UART: [art] Lock RT PCRs Done
2,981,318 UART: [art] Populate DV Done
2,989,681 UART: [fht] FMC Alias Private Key: 7
2,990,767 UART: [art] Derive CDI
2,991,047 UART: [art] Store in in slot 0x4
3,076,998 UART: [art] Derive Key Pair
3,077,358 UART: [art] Store priv key in slot 0x5
3,091,210 UART: [art] Derive Key Pair - Done
3,106,177 UART: [art] Signing Cert with AUTHO
3,106,657 UART: RITY.KEYID = 7
3,122,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,820 UART: [art] PUB.X = B56CDE040BBE36625090FDD13AF9606B46A78FA60E22086C04144EF8085E9277F5C8DE54A236A3C20613E9C113E64F29
3,129,571 UART: [art] PUB.Y = 5B420B6DD114E315F8E6D72B80D5612E1BC9139BDD735C36C48E961F2C1AD055F8E4247D9EED5FD868309AEE7AB84D8F
3,136,532 UART: [art] SIG.R = 8DC512EA811DC2BD4B0D7835019D8637CD18EF67D1ACA79E5C9B1D1D939CE0D43CA0C36BE7EEF9F7D44C894D95B45D60
3,143,316 UART: [art] SIG.S = 5EE90A3FC383D29363809FEBDDA787E316133BFDEE5E38CB007016F369FD8B3D4ED4AC101F86ED0648B051C799AFC22F
3,166,983 UART: Caliptra RT
3,167,328 UART: [state] CFI Enabled
3,275,695 UART: [rt] RT listening for mailbox commands...
3,276,365 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,135 UART: [rt]cmd =0x49444352, len=4
3,307,642 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 ready_for_fw is high
1,060,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,871 >>> mbox cmd response: success
2,687,269 UART:
2,687,285 UART: Running Caliptra FMC ...
2,687,693 UART:
2,687,836 UART: [state] CFI Enabled
2,698,181 UART: [fht] FMC Alias Private Key: 7
2,806,394 UART: [art] Extend RT PCRs Done
2,806,822 UART: [art] Lock RT PCRs Done
2,808,000 UART: [art] Populate DV Done
2,815,925 UART: [fht] FMC Alias Private Key: 7
2,817,013 UART: [art] Derive CDI
2,817,293 UART: [art] Store in in slot 0x4
2,902,806 UART: [art] Derive Key Pair
2,903,166 UART: [art] Store priv key in slot 0x5
2,916,168 UART: [art] Derive Key Pair - Done
2,931,028 UART: [art] Signing Cert with AUTHO
2,931,508 UART: RITY.KEYID = 7
2,946,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,615 UART: [art] PUB.X = C8721DA43B043E828923801E40B85C250B494524A7BD9CCB28500E5FD5B4C1AE36999936359DBB013BC6A3CCB2D82DC9
2,954,379 UART: [art] PUB.Y = 11BB486A7D6B426B4F69C453A609074D126A8CEEECCA0BE3E7F2B1E3B80D1FD1D06408D4AEEDFEDAEDAA0565771D5F96
2,961,337 UART: [art] SIG.R = 511A29B503193E56D95A9361C57B75A560EA2111E3A9475BDE8B2EB8607EF778808DE75D77FA2D299FFAA360B9FA439A
2,968,110 UART: [art] SIG.S = 752E10BC5875174DF9EA45E5C56B6C39FDC585D9D6C157550931F59B5E8082EDC8F4AEC7CB7F943644061B8BB503D055
2,992,238 UART: Caliptra RT
2,992,583 UART: [state] CFI Enabled
3,100,832 UART: [rt] RT listening for mailbox commands...
3,101,502 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,264 UART: [rt]cmd =0x49444352, len=4
3,132,639 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,280 UART: [kat] LMS
1,168,592 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,663 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 ready_for_fw is high
1,173,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,320 UART: [ldev] ++
1,208,488 UART: [ldev] CDI.KEYID = 6
1,208,852 UART: [ldev] SUBJECT.KEYID = 5
1,209,279 UART: [ldev] AUTHORITY.KEYID = 7
1,209,742 UART: [ldev] FE.KEYID = 1
1,214,928 UART: [ldev] Erasing FE.KEYID = 1
1,241,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,862 UART: [ldev] --
1,280,176 UART: [fwproc] Wait for Commands...
1,280,769 UART: [fwproc] Recv command 0x46574c44
1,281,502 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,303 >>> mbox cmd response: success
2,769,402 UART: [afmc] ++
2,769,570 UART: [afmc] CDI.KEYID = 6
2,769,933 UART: [afmc] SUBJECT.KEYID = 7
2,770,359 UART: [afmc] AUTHORITY.KEYID = 5
2,805,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,259 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,389 UART: [afmc] --
2,848,293 UART: [cold-reset] --
2,849,097 UART: [state] Locking Datavault
2,850,176 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,780 UART: [state] Locking ICCM
2,851,228 UART: [exit] Launching FMC @ 0x40000130
2,856,557 UART:
2,856,573 UART: Running Caliptra FMC ...
2,856,981 UART:
2,857,035 UART: [state] CFI Enabled
2,867,630 UART: [fht] FMC Alias Private Key: 7
2,975,541 UART: [art] Extend RT PCRs Done
2,975,969 UART: [art] Lock RT PCRs Done
2,977,609 UART: [art] Populate DV Done
2,985,604 UART: [fht] FMC Alias Private Key: 7
2,986,550 UART: [art] Derive CDI
2,986,830 UART: [art] Store in in slot 0x4
3,072,443 UART: [art] Derive Key Pair
3,072,803 UART: [art] Store priv key in slot 0x5
3,085,983 UART: [art] Derive Key Pair - Done
3,100,950 UART: [art] Signing Cert with AUTHO
3,101,430 UART: RITY.KEYID = 7
3,116,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,467 UART: [art] PUB.X = 87184DFFD4A0055F2EF2943B58C0EF4B4947F1E25346559AAD81ADF7DE4953CC03C866F04A7B7692E6184B36EEF75E46
3,124,239 UART: [art] PUB.Y = 61FDBCCD364930A5949B3BB8E8E13D066541AC1598EB6E1555A469BABB9F517A336166A5D11538EE1A8E375A0A76C493
3,131,189 UART: [art] SIG.R = 1005EE99805C800FEF4B863645B46899993611AA27C8C8ABE85955871EBC0D05610E69964844C229D56C8F5D1B725DB8
3,137,938 UART: [art] SIG.S = FBD33098C688DCE2D551E2CFAC385EB8825E9B789BC2A6B93BCA43E56543F242BD512B7FCC2185C49852F7B7D52BD418
3,161,841 UART: Caliptra RT
3,162,094 UART: [state] CFI Enabled
3,269,339 UART: [rt] RT listening for mailbox commands...
3,270,009 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,595 UART: [rt]cmd =0x49444352, len=4
3,301,106 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,068 ready_for_fw is high
1,056,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,283 >>> mbox cmd response: success
2,681,359 UART:
2,681,375 UART: Running Caliptra FMC ...
2,681,783 UART:
2,681,837 UART: [state] CFI Enabled
2,692,334 UART: [fht] FMC Alias Private Key: 7
2,799,649 UART: [art] Extend RT PCRs Done
2,800,077 UART: [art] Lock RT PCRs Done
2,801,697 UART: [art] Populate DV Done
2,810,028 UART: [fht] FMC Alias Private Key: 7
2,810,970 UART: [art] Derive CDI
2,811,250 UART: [art] Store in in slot 0x4
2,896,559 UART: [art] Derive Key Pair
2,896,919 UART: [art] Store priv key in slot 0x5
2,910,395 UART: [art] Derive Key Pair - Done
2,925,309 UART: [art] Signing Cert with AUTHO
2,925,789 UART: RITY.KEYID = 7
2,940,953 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,718 UART: [art] PUB.X = 06BF3C15332EB6387439961ED25A9D2DC7BA58EF41D428683E3F3EB503B47E187E34A7EC2CE963CE9AFEE06990E9B2DA
2,948,496 UART: [art] PUB.Y = 9320D083810DC3E1563726E4276A1ED29DECC129E8808AF4B038FB4A4AD5181CF612DDF1CBE8EA0F0737447EB49AEB6D
2,955,451 UART: [art] SIG.R = 7D10598A4B84333B4A9F1F8AEFE2A30A8346A8A59DC625A9A24523D944084D1A8CB09C15369C4EFA1E34A04E56DA11BF
2,962,225 UART: [art] SIG.S = 833CDACF3AADF752E045EA02FB05BA766D8F185097049F9B97A2A4D157432C26A57AD619BBDBA3E51C1E4438050021E7
2,985,968 UART: Caliptra RT
2,986,221 UART: [state] CFI Enabled
3,094,088 UART: [rt] RT listening for mailbox commands...
3,094,758 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,736 UART: [rt]cmd =0x49444352, len=4
3,126,249 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,100 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,174,058 ready_for_fw is high
1,174,058 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,863 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,514 >>> mbox cmd response: success
2,770,659 UART: [afmc] ++
2,770,827 UART: [afmc] CDI.KEYID = 6
2,771,190 UART: [afmc] SUBJECT.KEYID = 7
2,771,616 UART: [afmc] AUTHORITY.KEYID = 5
2,806,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,052 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,781 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,364 UART: [afmc] --
2,850,284 UART: [cold-reset] --
2,851,332 UART: [state] Locking Datavault
2,852,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,233 UART: [state] Locking ICCM
2,853,757 UART: [exit] Launching FMC @ 0x40000130
2,859,086 UART:
2,859,102 UART: Running Caliptra FMC ...
2,859,510 UART:
2,859,653 UART: [state] CFI Enabled
2,870,258 UART: [fht] FMC Alias Private Key: 7
2,977,667 UART: [art] Extend RT PCRs Done
2,978,095 UART: [art] Lock RT PCRs Done
2,979,343 UART: [art] Populate DV Done
2,987,520 UART: [fht] FMC Alias Private Key: 7
2,988,558 UART: [art] Derive CDI
2,988,838 UART: [art] Store in in slot 0x4
3,074,139 UART: [art] Derive Key Pair
3,074,499 UART: [art] Store priv key in slot 0x5
3,087,979 UART: [art] Derive Key Pair - Done
3,102,332 UART: [art] Signing Cert with AUTHO
3,102,812 UART: RITY.KEYID = 7
3,118,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,771 UART: [art] PUB.X = AE0FD267516C1EE9EC53EBE7E8B394F15777611934663398210964496D1D45F2FAED0289DD92C4B064B516753D1D4B99
3,125,530 UART: [art] PUB.Y = E96AB1CBE639627E205CFCEBD3BD187FDB3F54038291AC9160DDB58405DDB4B03CA17EF64DC8181198ECDC354AABDCDF
3,132,502 UART: [art] SIG.R = B15A0BBC596301752D4FA3EE754F00D55505F7F71634F03B3FF08D5E4758ADF640DB55564FBA1BCA12B56C07FD37E425
3,139,248 UART: [art] SIG.S = 08DE56B450EE8B62A780C591B82C8AA73EF637DAEE5BDA78108422F35564C13BB82ADBB3296D740B69C72D47FD622F16
3,162,667 UART: Caliptra RT
3,163,012 UART: [state] CFI Enabled
3,271,005 UART: [rt] RT listening for mailbox commands...
3,271,675 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,625 UART: [rt]cmd =0x49444352, len=4
3,303,204 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,683 ready_for_fw is high
1,056,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,658 >>> mbox cmd response: success
2,683,732 UART:
2,683,748 UART: Running Caliptra FMC ...
2,684,156 UART:
2,684,299 UART: [state] CFI Enabled
2,694,962 UART: [fht] FMC Alias Private Key: 7
2,803,045 UART: [art] Extend RT PCRs Done
2,803,473 UART: [art] Lock RT PCRs Done
2,805,153 UART: [art] Populate DV Done
2,813,334 UART: [fht] FMC Alias Private Key: 7
2,814,358 UART: [art] Derive CDI
2,814,638 UART: [art] Store in in slot 0x4
2,900,313 UART: [art] Derive Key Pair
2,900,673 UART: [art] Store priv key in slot 0x5
2,914,357 UART: [art] Derive Key Pair - Done
2,928,882 UART: [art] Signing Cert with AUTHO
2,929,362 UART: RITY.KEYID = 7
2,944,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,565 UART: [art] PUB.X = 0D1DEB3EEEBBF2CBBE9D7E15D5116A54BF5FEBBD0B060776A9AC0BDCF453B251AA4A53141A474E86CDD20C6B5A4DDFAD
2,952,355 UART: [art] PUB.Y = 4F724AAC05305EC3BB9FFA929C2CEB379ED0B2E3706ADB793AEB9B60DAFD44899292806A32267B4BDF7FE4998EF8A763
2,959,320 UART: [art] SIG.R = 76A5D9A341350B69AF501E937DCB6F842A4C1A2E89B45B42539A96E2E48E3BEC032D3E342C7EF071C2AA5D38C9C9E8C5
2,966,096 UART: [art] SIG.S = 590C6777E6E9DC7611A168E5BA4A22D7DA8F44019A0E275CACCEF5DF7D0B8B61F4F7C50E3393D78F7B78A5753066119E
2,990,114 UART: Caliptra RT
2,990,459 UART: [state] CFI Enabled
3,097,662 UART: [rt] RT listening for mailbox commands...
3,098,332 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,074 UART: [rt]cmd =0x49444352, len=4
3,129,509 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,282 UART:
192,771 UART: Running Caliptra ROM ...
193,912 UART:
194,055 UART: [state] CFI Enabled
263,929 UART: [state] LifecycleState = Unprovisioned
265,946 UART: [state] DebugLocked = No
267,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,165 UART: [kat] SHA2-256
441,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,378 UART: [kat] ++
452,981 UART: [kat] sha1
463,579 UART: [kat] SHA2-256
466,291 UART: [kat] SHA2-384
471,353 UART: [kat] SHA2-512-ACC
473,725 UART: [kat] ECC-384
2,767,770 UART: [kat] HMAC-384Kdf
2,800,355 UART: [kat] LMS
3,990,647 UART: [kat] --
3,995,049 UART: [cold-reset] ++
3,996,713 UART: [fht] Storing FHT @ 0x50003400
4,007,201 UART: [idev] ++
4,007,840 UART: [idev] CDI.KEYID = 6
4,008,769 UART: [idev] SUBJECT.KEYID = 7
4,010,043 UART: [idev] UDS.KEYID = 0
4,011,109 ready_for_fw is high
4,011,332 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,531 UART: [idev] Erasing UDS.KEYID = 0
7,344,469 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,872 UART: [idev] --
7,371,617 UART: [ldev] ++
7,372,196 UART: [ldev] CDI.KEYID = 6
7,373,167 UART: [ldev] SUBJECT.KEYID = 5
7,374,377 UART: [ldev] AUTHORITY.KEYID = 7
7,375,607 UART: [ldev] FE.KEYID = 1
7,424,325 UART: [ldev] Erasing FE.KEYID = 1
10,758,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,412 UART: [ldev] --
13,138,051 UART: [fwproc] Waiting for Commands...
13,140,418 UART: [fwproc] Received command 0x46574c44
13,142,603 UART: [fwproc] Received Image of size 113760 bytes
17,196,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,337 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,659,192 >>> mbox cmd response: success
17,659,709 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,662,757 UART: [afmc] ++
17,663,341 UART: [afmc] CDI.KEYID = 6
17,664,255 UART: [afmc] SUBJECT.KEYID = 7
17,665,533 UART: [afmc] AUTHORITY.KEYID = 5
21,027,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,598 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,960 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,793 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,243 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,505 UART: [afmc] --
23,399,986 UART: [cold-reset] --
23,402,668 UART: [state] Locking Datavault
23,408,009 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,772 UART: [state] Locking ICCM
23,411,035 UART: [exit] Launching FMC @ 0x40000130
23,419,472 UART:
23,419,748 UART: Running Caliptra FMC ...
23,420,807 UART:
23,420,961 UART: [state] CFI Enabled
23,489,762 UART: [fht] FMC Alias Private Key: 7
25,829,260 UART: [art] Extend RT PCRs Done
25,830,525 UART: [art] Lock RT PCRs Done
25,832,077 UART: [art] Populate DV Done
25,837,437 UART: [fht] FMC Alias Private Key: 7
25,839,083 UART: [art] Derive CDI
25,839,823 UART: [art] Store in in slot 0x4
25,899,696 UART: [art] Derive Key Pair
25,900,740 UART: [art] Store priv key in slot 0x5
29,193,597 UART: [art] Derive Key Pair - Done
29,206,530 UART: [art] Signing Cert with AUTHO
29,207,834 UART: RITY.KEYID = 7
31,494,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,903 UART: [art] PUB.X = 0A9D984A3909DE1D46ECA5FE8EB7CDF58ABA6EE7586720084A348F4DA8D638AC597F7161907E9DB1E7DE338A7C38D87D
31,503,144 UART: [art] PUB.Y = F3ECEF2E850E4AB7826C8E7EE586C38A87F904AD9BA0D2B6FF0C8920D9557AD690F1F1E10ACE49BFC0AF4C0D39638CDF
31,510,433 UART: [art] SIG.R = 2D6F4772683646972A87AB204E980EE3B066BE452786A1EA3EC837474D5C6F9391895CFA2918597948554FA621B567EB
31,517,766 UART: [art] SIG.S = FAC397C9BFAB2C649C8CA97C541C517F98CA0049E3E3DE27306AB446FCB8C2AAAC9496AC2D619437862086768D8D89C1
32,823,107 UART: Caliptra RT
32,823,836 UART: [state] CFI Enabled
33,004,334 UART: [rt] RT listening for mailbox commands...
33,036,082 UART: [rt]cmd =0x43415053, len=4
33,037,587 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,783,090 ready_for_fw is high
3,783,503 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,844,137 >>> mbox cmd response: success
17,844,893 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,545,165 UART:
23,545,556 UART: Running Caliptra FMC ...
23,546,751 UART:
23,546,919 UART: [state] CFI Enabled
23,616,857 UART: [fht] FMC Alias Private Key: 7
25,954,487 UART: [art] Extend RT PCRs Done
25,955,715 UART: [art] Lock RT PCRs Done
25,957,725 UART: [art] Populate DV Done
25,963,156 UART: [fht] FMC Alias Private Key: 7
25,964,869 UART: [art] Derive CDI
25,965,691 UART: [art] Store in in slot 0x4
26,025,903 UART: [art] Derive Key Pair
26,026,930 UART: [art] Store priv key in slot 0x5
29,319,681 UART: [art] Derive Key Pair - Done
29,332,626 UART: [art] Signing Cert with AUTHO
29,333,931 UART: RITY.KEYID = 7
31,621,037 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,545 UART: [art] PUB.X = BF124507864608D82DA60830CF1C9A47D7B0FE97EE27F518B9E35B71F0CF00ACE29AE751B0BA4D80E20E0642A16CDA9F
31,629,811 UART: [art] PUB.Y = 8229F32C74E5BD3D06CCEE7CB65325E77BA0E7BD85A0DACDCA6981F29B3CA1F297F0C5F995380A0A08E9A2A57D17B456
31,637,150 UART: [art] SIG.R = 559EDDEF65D7B3D8C4D3FAA8AFCAED49C97665A6C2E18808C1977946AAE62DC270A68A6765E7E45A512BDE0CC398B684
31,644,504 UART: [art] SIG.S = 1FC559D5AC3D2E2D512ACBC5D5EA13030CD247FB2DF41F1F45A21D429AA79C25968B17C83A849D783657D560E354B4F2
32,949,841 UART: Caliptra RT
32,950,542 UART: [state] CFI Enabled
33,130,367 UART: [rt] RT listening for mailbox commands...
33,161,606 UART: [rt]cmd =0x43415053, len=4
33,163,428 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
192,893 UART:
193,257 UART: Running Caliptra ROM ...
194,450 UART:
604,010 UART: [state] CFI Enabled
615,740 UART: [state] LifecycleState = Unprovisioned
617,670 UART: [state] DebugLocked = No
619,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,897 UART: [kat] SHA2-256
794,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,210 UART: [kat] ++
805,655 UART: [kat] sha1
816,748 UART: [kat] SHA2-256
819,404 UART: [kat] SHA2-384
824,401 UART: [kat] SHA2-512-ACC
826,836 UART: [kat] ECC-384
3,112,676 UART: [kat] HMAC-384Kdf
3,123,848 UART: [kat] LMS
4,313,968 UART: [kat] --
4,320,543 UART: [cold-reset] ++
4,322,261 UART: [fht] Storing FHT @ 0x50003400
4,333,161 UART: [idev] ++
4,333,737 UART: [idev] CDI.KEYID = 6
4,334,767 UART: [idev] SUBJECT.KEYID = 7
4,335,932 UART: [idev] UDS.KEYID = 0
4,337,014 ready_for_fw is high
4,337,252 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,201 UART: [idev] Erasing UDS.KEYID = 0
7,619,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,736 UART: [idev] --
7,644,788 UART: [ldev] ++
7,645,355 UART: [ldev] CDI.KEYID = 6
7,646,320 UART: [ldev] SUBJECT.KEYID = 5
7,647,526 UART: [ldev] AUTHORITY.KEYID = 7
7,649,020 UART: [ldev] FE.KEYID = 1
7,660,328 UART: [ldev] Erasing FE.KEYID = 1
10,946,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,615 UART: [ldev] --
13,308,333 UART: [fwproc] Waiting for Commands...
13,310,419 UART: [fwproc] Received command 0x46574c44
13,312,660 UART: [fwproc] Received Image of size 113760 bytes
17,362,328 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,211 >>> mbox cmd response: success
17,824,739 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,828,765 UART: [afmc] ++
17,829,349 UART: [afmc] CDI.KEYID = 6
17,830,367 UART: [afmc] SUBJECT.KEYID = 7
17,831,532 UART: [afmc] AUTHORITY.KEYID = 5
21,145,710 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,099 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,452 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,329 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,771 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,256 UART: [afmc] --
23,511,591 UART: [cold-reset] --
23,514,210 UART: [state] Locking Datavault
23,520,480 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,178 UART: [state] Locking ICCM
23,524,270 UART: [exit] Launching FMC @ 0x40000130
23,532,672 UART:
23,532,905 UART: Running Caliptra FMC ...
23,534,005 UART:
23,534,171 UART: [state] CFI Enabled
23,542,234 UART: [fht] FMC Alias Private Key: 7
25,873,580 UART: [art] Extend RT PCRs Done
25,874,799 UART: [art] Lock RT PCRs Done
25,876,420 UART: [art] Populate DV Done
25,881,939 UART: [fht] FMC Alias Private Key: 7
25,883,640 UART: [art] Derive CDI
25,884,450 UART: [art] Store in in slot 0x4
25,927,151 UART: [art] Derive Key Pair
25,928,193 UART: [art] Store priv key in slot 0x5
29,170,517 UART: [art] Derive Key Pair - Done
29,183,557 UART: [art] Signing Cert with AUTHO
29,184,854 UART: RITY.KEYID = 7
31,463,715 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,220 UART: [art] PUB.X = 76FEEAAF43E573A34A5B5CB13A230B375D87309EB71F3CA5514A10DB14F2FDD4F0D0383B98587F4C41D24BE18174AE07
31,472,486 UART: [art] PUB.Y = DC17B5A8959DFA62806F68383931D72253260A6C8FB2C77EC85D64BB95D8DBF01F8BD5747927C5F236F7095E9DC3CC9A
31,479,749 UART: [art] SIG.R = 33889366AD3F038B54BBD0E567C4F73BCFE121E54AC6A5F9F89F1D18C3CB0D75C21F1EAB5C4C507A1FDA0699928CD5EF
31,487,127 UART: [art] SIG.S = C065FB5ACD8D06FE84832295A65931233AA85EBEAC97CB6199FA3DF39A4D2113D4599AEA27FE682BD52DE938139342B0
32,792,209 UART: Caliptra RT
32,793,005 UART: [state] CFI Enabled
32,910,182 UART: [rt] RT listening for mailbox commands...
32,941,479 UART: [rt]cmd =0x43415053, len=4
32,943,199 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
4,130,099 ready_for_fw is high
4,130,585 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,066,833 >>> mbox cmd response: success
18,067,625 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,708,927 UART:
23,709,318 UART: Running Caliptra FMC ...
23,710,421 UART:
23,710,574 UART: [state] CFI Enabled
23,718,706 UART: [fht] FMC Alias Private Key: 7
26,049,556 UART: [art] Extend RT PCRs Done
26,050,790 UART: [art] Lock RT PCRs Done
26,052,720 UART: [art] Populate DV Done
26,058,305 UART: [fht] FMC Alias Private Key: 7
26,059,899 UART: [art] Derive CDI
26,060,635 UART: [art] Store in in slot 0x4
26,102,952 UART: [art] Derive Key Pair
26,103,956 UART: [art] Store priv key in slot 0x5
29,345,659 UART: [art] Derive Key Pair - Done
29,358,716 UART: [art] Signing Cert with AUTHO
29,360,028 UART: RITY.KEYID = 7
31,639,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,119 UART: [art] PUB.X = 29D0A78D9FAEDD22F819058FE53758ED7B91EE5F4FC4251972AD2D5BB520CE19421EF404AAF27FBC0B3844AF8B5D09E0
31,648,256 UART: [art] PUB.Y = 9350B6DF9A986F0F5A8F58AA7174FFBB3C4A02DC90746AA68F2567C6D35F4BE1BF95671C8C8C17046C81998C9F4BC700
31,655,474 UART: [art] SIG.R = 06630176F9C97C2B268A82745793A3DAF1A8E32DF3255016240F538D26E82C6F9349F65AE3C5F6CD6876C4D1EEA07187
31,662,842 UART: [art] SIG.S = 9CBE0098D988DFBF35486446EB3C729CFEEB2121F6D4CADB19839DA48D4B527C8F53CA1F675A3E870A99F2EABA0F9888
32,967,953 UART: Caliptra RT
32,968,681 UART: [state] CFI Enabled
33,087,474 UART: [rt] RT listening for mailbox commands...
33,119,061 UART: [rt]cmd =0x43415053, len=4
33,120,646 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,542 writing to cptra_bootfsm_go
192,604 UART:
193,006 UART: Running Caliptra ROM ...
194,289 UART:
194,451 UART: [state] CFI Enabled
262,128 UART: [state] LifecycleState = Unprovisioned
264,230 UART: [state] DebugLocked = No
266,058 UART: [state] WD Timer not started. Device not locked for debugging
270,476 UART: [kat] SHA2-256
449,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,166 UART: [kat] ++
462,051 UART: [kat] sha1
472,860 UART: [kat] SHA2-256
475,887 UART: [kat] SHA2-384
481,314 UART: [kat] SHA2-512-ACC
484,248 UART: [kat] ECC-384
2,945,151 UART: [kat] HMAC-384Kdf
2,969,343 UART: [kat] LMS
3,498,781 UART: [kat] --
3,504,355 UART: [cold-reset] ++
3,506,392 UART: [fht] FHT @ 0x50003400
3,518,225 UART: [idev] ++
3,518,786 UART: [idev] CDI.KEYID = 6
3,519,768 UART: [idev] SUBJECT.KEYID = 7
3,520,938 UART: [idev] UDS.KEYID = 0
3,521,857 ready_for_fw is high
3,522,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,698 UART: [idev] Erasing UDS.KEYID = 0
6,025,754 UART: [idev] Sha1 KeyId Algorithm
6,047,546 UART: [idev] --
6,051,272 UART: [ldev] ++
6,051,840 UART: [ldev] CDI.KEYID = 6
6,052,721 UART: [ldev] SUBJECT.KEYID = 5
6,053,931 UART: [ldev] AUTHORITY.KEYID = 7
6,055,215 UART: [ldev] FE.KEYID = 1
6,097,940 UART: [ldev] Erasing FE.KEYID = 1
8,596,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,980 UART: [ldev] --
10,391,112 UART: [fwproc] Wait for Commands...
10,393,200 UART: [fwproc] Recv command 0x46574c44
10,395,234 UART: [fwproc] Recv'd Img size: 114084 bytes
13,800,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,258,931 >>> mbox cmd response: success
14,259,446 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,263,460 UART: [afmc] ++
14,264,057 UART: [afmc] CDI.KEYID = 6
14,264,972 UART: [afmc] SUBJECT.KEYID = 7
14,266,132 UART: [afmc] AUTHORITY.KEYID = 5
16,803,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,005 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,786 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,814 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,402 UART: [afmc] --
18,603,473 UART: [cold-reset] --
18,606,739 UART: [state] Locking Datavault
18,613,063 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,706 UART: [state] Locking ICCM
18,616,744 UART: [exit] Launching FMC @ 0x40000130
18,625,143 UART:
18,625,424 UART: Running Caliptra FMC ...
18,626,453 UART:
18,626,597 UART: [state] CFI Enabled
18,688,325 UART: [fht] FMC Alias Private Key: 7
20,451,736 UART: [art] Extend RT PCRs Done
20,452,952 UART: [art] Lock RT PCRs Done
20,454,897 UART: [art] Populate DV Done
20,460,246 UART: [fht] FMC Alias Private Key: 7
20,461,943 UART: [art] Derive CDI
20,462,738 UART: [art] Store in in slot 0x4
20,521,121 UART: [art] Derive Key Pair
20,522,119 UART: [art] Store priv key in slot 0x5
22,984,886 UART: [art] Derive Key Pair - Done
22,998,098 UART: [art] Signing Cert with AUTHO
22,999,399 UART: RITY.KEYID = 7
24,710,033 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,540 UART: [art] PUB.X = C578FB456AA1DA9DC1BF5D6E8065EEAD0E8D10587B883D658F46AD01E207F29B4C2FAB725D8CCD466C433309A73EC1C5
24,718,790 UART: [art] PUB.Y = 5031DC895BDB57A8E53526D26CCFDEEDCEA84AF4557C3166F5594F16A90C1D541F56856ABAFD00D0471DA5EE1190C0E0
24,726,054 UART: [art] SIG.R = DFAF83F08E2C9577449E5F82ECA2453875BBB63A7A0E398DFE08E359DFEF7A77C099DA3281B4998FA75CA4D3A29FF5A3
24,733,503 UART: [art] SIG.S = ADF76B02D2BF8FEB17827BBD5F2D436DD7A139E72AA48CF673503B682F0DFF33FE381447C1EA127180942D1788EEC189
25,712,102 UART: Caliptra RT
25,712,807 UART: [state] CFI Enabled
25,878,193 UART: [rt] RT listening for mailbox commands...
25,909,705 UART: [rt]cmd =0x43415053, len=4
25,911,474 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,493 writing to cptra_bootfsm_go
3,382,105 ready_for_fw is high
3,382,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,065,553 >>> mbox cmd response: success
14,066,138 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,344,244 UART:
18,344,621 UART: Running Caliptra FMC ...
18,345,810 UART:
18,345,974 UART: [state] CFI Enabled
18,411,221 UART: [fht] FMC Alias Private Key: 7
20,175,157 UART: [art] Extend RT PCRs Done
20,176,374 UART: [art] Lock RT PCRs Done
20,178,161 UART: [art] Populate DV Done
20,183,642 UART: [fht] FMC Alias Private Key: 7
20,185,349 UART: [art] Derive CDI
20,186,160 UART: [art] Store in in slot 0x4
20,243,985 UART: [art] Derive Key Pair
20,245,016 UART: [art] Store priv key in slot 0x5
22,707,862 UART: [art] Derive Key Pair - Done
22,721,119 UART: [art] Signing Cert with AUTHO
22,722,414 UART: RITY.KEYID = 7
24,433,346 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,854 UART: [art] PUB.X = 1E1EDD8BBE417888FEA5D9973E9C640F46C134B86C37C010698440C53FE68BFBDD97C890D3B6FD538CDD8AC97889AC62
24,442,181 UART: [art] PUB.Y = 2DB276D4526BADE8748FC8BD683CE3407B2E9879F5BF9033DC9B161FBC5C7093F0536CAE2E17E3680047C82283FCB056
24,449,398 UART: [art] SIG.R = 57316507254962B0C9B81520385F429D06DD9FA5813B5BF0A609A48B0472D49B80399F4B5ED2AB7459336386D536A2DA
24,456,768 UART: [art] SIG.S = B768E99C632BB93FA26CB7C1826DEF44320D6D8824E5F06D6890DB119B50498DE475B9497BDF00178F699ED591010B13
25,435,892 UART: Caliptra RT
25,436,613 UART: [state] CFI Enabled
25,601,538 UART: [rt] RT listening for mailbox commands...
25,632,766 UART: [rt]cmd =0x43415053, len=4
25,634,347 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
193,152 UART:
193,552 UART: Running Caliptra ROM ...
194,714 UART:
604,253 UART: [state] CFI Enabled
620,266 UART: [state] LifecycleState = Unprovisioned
622,156 UART: [state] DebugLocked = No
624,114 UART: [state] WD Timer not started. Device not locked for debugging
628,082 UART: [kat] SHA2-256
807,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,736 UART: [kat] ++
819,268 UART: [kat] sha1
830,930 UART: [kat] SHA2-256
833,931 UART: [kat] SHA2-384
840,838 UART: [kat] SHA2-512-ACC
843,779 UART: [kat] ECC-384
3,284,585 UART: [kat] HMAC-384Kdf
3,296,993 UART: [kat] LMS
3,826,482 UART: [kat] --
3,831,045 UART: [cold-reset] ++
3,832,224 UART: [fht] FHT @ 0x50003400
3,842,785 UART: [idev] ++
3,843,355 UART: [idev] CDI.KEYID = 6
3,844,427 UART: [idev] SUBJECT.KEYID = 7
3,845,555 UART: [idev] UDS.KEYID = 0
3,846,484 ready_for_fw is high
3,846,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,991 UART: [idev] Erasing UDS.KEYID = 0
6,317,559 UART: [idev] Sha1 KeyId Algorithm
6,340,569 UART: [idev] --
6,345,538 UART: [ldev] ++
6,346,108 UART: [ldev] CDI.KEYID = 6
6,346,995 UART: [ldev] SUBJECT.KEYID = 5
6,348,204 UART: [ldev] AUTHORITY.KEYID = 7
6,349,436 UART: [ldev] FE.KEYID = 1
6,360,321 UART: [ldev] Erasing FE.KEYID = 1
8,837,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,421 UART: [ldev] --
10,627,581 UART: [fwproc] Wait for Commands...
10,629,824 UART: [fwproc] Recv command 0x46574c44
10,631,933 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,492,132 >>> mbox cmd response: success
14,492,645 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,496,237 UART: [afmc] ++
14,496,824 UART: [afmc] CDI.KEYID = 6
14,497,742 UART: [afmc] SUBJECT.KEYID = 7
14,498,909 UART: [afmc] AUTHORITY.KEYID = 5
16,995,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,016 UART: [afmc] --
18,793,467 UART: [cold-reset] --
18,798,581 UART: [state] Locking Datavault
18,803,553 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,199 UART: [state] Locking ICCM
18,807,885 UART: [exit] Launching FMC @ 0x40000130
18,816,280 UART:
18,816,518 UART: Running Caliptra FMC ...
18,817,619 UART:
18,817,778 UART: [state] CFI Enabled
18,825,663 UART: [fht] FMC Alias Private Key: 7
20,582,028 UART: [art] Extend RT PCRs Done
20,583,279 UART: [art] Lock RT PCRs Done
20,585,292 UART: [art] Populate DV Done
20,590,812 UART: [fht] FMC Alias Private Key: 7
20,592,350 UART: [art] Derive CDI
20,593,286 UART: [art] Store in in slot 0x4
20,635,673 UART: [art] Derive Key Pair
20,636,719 UART: [art] Store priv key in slot 0x5
23,063,145 UART: [art] Derive Key Pair - Done
23,076,034 UART: [art] Signing Cert with AUTHO
23,077,348 UART: RITY.KEYID = 7
24,782,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,118 UART: [art] PUB.X = E87BC753B583118738FECF595C7D0D4C749B20CE6D55FC8B50682C72A6BA6AB2133DD086911BE6AF644C3789A090A429
24,791,409 UART: [art] PUB.Y = F66448B0649B71A9AE839DB48D861DA0C6CFCB2FCFD4E5C4E3B2096EA182F1BA56B83483257FAF319892EA19C69F0FFE
24,798,674 UART: [art] SIG.R = 1A4F7638B968A5AFABAC3CC14398FBC5BDEA7B683BDE43873000120D17F96DA27AD3495FBEAC8CF0A71351C30DC7BD21
24,806,083 UART: [art] SIG.S = D84AD83776F4EC048357329AA6CC24E5CE56409588AE74DCEAAB5C9A8FF0BEA18D9FC31805644CF792F201D574F6FD6C
25,785,251 UART: Caliptra RT
25,785,985 UART: [state] CFI Enabled
25,903,055 UART: [rt] RT listening for mailbox commands...
25,934,462 UART: [rt]cmd =0x43415053, len=4
25,936,290 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,936 writing to cptra_bootfsm_go
3,697,381 ready_for_fw is high
3,698,048 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,268 >>> mbox cmd response: success
14,266,930 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,518,308 UART:
18,518,719 UART: Running Caliptra FMC ...
18,519,883 UART:
18,520,041 UART: [state] CFI Enabled
18,528,045 UART: [fht] FMC Alias Private Key: 7
20,284,492 UART: [art] Extend RT PCRs Done
20,285,714 UART: [art] Lock RT PCRs Done
20,287,665 UART: [art] Populate DV Done
20,293,032 UART: [fht] FMC Alias Private Key: 7
20,294,523 UART: [art] Derive CDI
20,295,285 UART: [art] Store in in slot 0x4
20,337,884 UART: [art] Derive Key Pair
20,338,925 UART: [art] Store priv key in slot 0x5
22,766,163 UART: [art] Derive Key Pair - Done
22,778,898 UART: [art] Signing Cert with AUTHO
22,780,205 UART: RITY.KEYID = 7
24,485,253 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,735 UART: [art] PUB.X = 2C6FB30C173AEA3D43EBB9FF29576AB7371C7488DB785E703FD6C7CD30C009592EFF5201BA43DAD6B05EB1556F8EA2F8
24,494,080 UART: [art] PUB.Y = A3C08E8A539461BFC22DDB4234A0D0328AD1699DC2B16C456E0E66EB28173D9E26D943FC265914FCDBD0B3FFD533CBB0
24,501,325 UART: [art] SIG.R = 2F3CF3C643D3CE95EF3AABF5FE50D3BE3288F856A583BA787ACA9D172BB81C44905BBDC52AF80C4FEAAF75DDC980DC0D
24,508,777 UART: [art] SIG.S = CA0CD46C392783270F02BB800FE219A1EAB8C87E93A8B478123E89F4C37476ED652CC54882D1278AB4462FDD96E2C9B9
25,487,767 UART: Caliptra RT
25,488,477 UART: [state] CFI Enabled
25,605,758 UART: [rt] RT listening for mailbox commands...
25,636,993 UART: [rt]cmd =0x43415053, len=4
25,638,872 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,460 UART:
192,836 UART: Running Caliptra ROM ...
193,946 UART:
194,088 UART: [state] CFI Enabled
261,146 UART: [state] LifecycleState = Unprovisioned
263,578 UART: [state] DebugLocked = No
265,172 UART: [state] WD Timer not started. Device not locked for debugging
270,493 UART: [kat] SHA2-256
460,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,173 UART: [kat] ++
471,661 UART: [kat] sha1
483,811 UART: [kat] SHA2-256
486,824 UART: [kat] SHA2-384
493,116 UART: [kat] SHA2-512-ACC
495,708 UART: [kat] ECC-384
2,947,234 UART: [kat] HMAC-384Kdf
2,971,163 UART: [kat] LMS
3,502,960 UART: [kat] --
3,505,246 UART: [cold-reset] ++
3,506,683 UART: [fht] FHT @ 0x50003400
3,519,268 UART: [idev] ++
3,520,001 UART: [idev] CDI.KEYID = 6
3,520,929 UART: [idev] SUBJECT.KEYID = 7
3,522,102 UART: [idev] UDS.KEYID = 0
3,523,025 ready_for_fw is high
3,523,233 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,640 UART: [idev] Erasing UDS.KEYID = 0
6,027,693 UART: [idev] Sha1 KeyId Algorithm
6,050,662 UART: [idev] --
6,054,086 UART: [ldev] ++
6,054,772 UART: [ldev] CDI.KEYID = 6
6,055,655 UART: [ldev] SUBJECT.KEYID = 5
6,056,867 UART: [ldev] AUTHORITY.KEYID = 7
6,058,042 UART: [ldev] FE.KEYID = 1
6,100,706 UART: [ldev] Erasing FE.KEYID = 1
8,605,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,590 UART: [ldev] --
10,415,231 UART: [fwproc] Wait for Commands...
10,417,859 UART: [fwproc] Recv command 0x46574c44
10,420,167 UART: [fwproc] Recv'd Img size: 114084 bytes
13,862,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,603,038 >>> mbox cmd response: success
14,603,554 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,606,280 UART: [afmc] ++
14,606,987 UART: [afmc] CDI.KEYID = 6
14,608,233 UART: [afmc] SUBJECT.KEYID = 7
14,609,670 UART: [afmc] AUTHORITY.KEYID = 5
17,141,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,865,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,867,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,882,585 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,912,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,994 UART: [afmc] --
18,940,391 UART: [cold-reset] --
18,945,250 UART: [state] Locking Datavault
18,951,927 UART: [state] Locking PCR0, PCR1 and PCR31
18,954,128 UART: [state] Locking ICCM
18,956,022 UART: [exit] Launching FMC @ 0x40000130
18,964,715 UART:
18,964,946 UART: Running Caliptra FMC ...
18,966,045 UART:
18,966,206 UART: [state] CFI Enabled
19,024,072 UART: [fht] FMC Alias Private Key: 7
20,787,178 UART: [art] Extend RT PCRs Done
20,788,397 UART: [art] Lock RT PCRs Done
20,790,271 UART: [art] Populate DV Done
20,795,974 UART: [fht] FMC Alias Private Key: 7
20,797,614 UART: [art] Derive CDI
20,798,419 UART: [art] Store in in slot 0x4
20,856,620 UART: [art] Derive Key Pair
20,857,636 UART: [art] Store priv key in slot 0x5
23,320,497 UART: [art] Derive Key Pair - Done
23,333,658 UART: [art] Signing Cert with AUTHO
23,334,963 UART: RITY.KEYID = 7
25,046,360 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,884 UART: [art] PUB.X = 218CA4C065B91FD31AC3847E0A0B372E378ED55DB91A84A7E57BE533196CCD74BA21798F0B6E13AD70EA66B4464DC38D
25,055,163 UART: [art] PUB.Y = 2B5005E647DB0E9D785C7C2451D936BF54BD5593C2D9E4C5A63927F7463C5D06400E3944C4BE1F1921A3A5E2EB6FEBFC
25,062,406 UART: [art] SIG.R = ADF466013B5B52BF549BC27B29EB4F14BB4F35CA66F4DDEE2DDA0F1A38830CEDEB5D081C637C1C93B8A16B6EE55F6422
25,069,837 UART: [art] SIG.S = 6CAB2AFE0E7DD638B41B3096CE7C63093FD5AAD4F3329AE16EE54CBF2C5FE035BAD8F5A852388D8D241E6F345440F78A
26,048,904 UART: Caliptra RT
26,049,595 UART: [state] CFI Enabled
26,214,101 UART: [rt] RT listening for mailbox commands...
26,245,509 UART: [rt]cmd =0x43415053, len=4
26,247,224 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
3,436,120 ready_for_fw is high
3,436,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,735,580 >>> mbox cmd response: success
14,736,386 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,023,960 UART:
19,024,357 UART: Running Caliptra FMC ...
19,025,456 UART:
19,025,612 UART: [state] CFI Enabled
19,095,787 UART: [fht] FMC Alias Private Key: 7
20,860,133 UART: [art] Extend RT PCRs Done
20,861,349 UART: [art] Lock RT PCRs Done
20,863,028 UART: [art] Populate DV Done
20,868,500 UART: [fht] FMC Alias Private Key: 7
20,870,149 UART: [art] Derive CDI
20,870,960 UART: [art] Store in in slot 0x4
20,929,160 UART: [art] Derive Key Pair
20,930,148 UART: [art] Store priv key in slot 0x5
23,393,429 UART: [art] Derive Key Pair - Done
23,406,636 UART: [art] Signing Cert with AUTHO
23,407,935 UART: RITY.KEYID = 7
25,118,913 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,421 UART: [art] PUB.X = 14A26986E7074743354E08C16C60C9019400D6F092A4888A8C95E54BD0395014AD78CAEB37C5A210ADE55080719B0E10
25,127,652 UART: [art] PUB.Y = 8876CBD9B2AA10321D1DE67BC7687D1D59B050A1F211476EC477953073F3779150FCB1C924E85A8E0FBAC3BA52118DA8
25,134,946 UART: [art] SIG.R = 177BB599B9DBE50AF8F3F8C29A4F48266DFA1C051B738282AE56A7D2330239E55DAC3664FF80E50BC31002103113EFC0
25,142,336 UART: [art] SIG.S = 06F7122E7137E43A6BAAC26A2274C7CA0318BB1B48A01E6594177A55E8A9662CE855D43A7EF16EE8B13612142DDB85CD
26,120,967 UART: Caliptra RT
26,121,656 UART: [state] CFI Enabled
26,287,312 UART: [rt] RT listening for mailbox commands...
26,318,656 UART: [rt]cmd =0x43415053, len=4
26,320,482 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
192,717 UART:
193,102 UART: Running Caliptra ROM ...
194,227 UART:
603,979 UART: [state] CFI Enabled
618,298 UART: [state] LifecycleState = Unprovisioned
620,675 UART: [state] DebugLocked = No
623,488 UART: [state] WD Timer not started. Device not locked for debugging
627,457 UART: [kat] SHA2-256
817,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,132 UART: [kat] ++
828,744 UART: [kat] sha1
839,342 UART: [kat] SHA2-256
842,351 UART: [kat] SHA2-384
848,981 UART: [kat] SHA2-512-ACC
851,563 UART: [kat] ECC-384
3,292,158 UART: [kat] HMAC-384Kdf
3,303,984 UART: [kat] LMS
3,835,800 UART: [kat] --
3,840,453 UART: [cold-reset] ++
3,842,810 UART: [fht] FHT @ 0x50003400
3,854,530 UART: [idev] ++
3,855,143 UART: [idev] CDI.KEYID = 6
3,856,063 UART: [idev] SUBJECT.KEYID = 7
3,857,320 UART: [idev] UDS.KEYID = 0
3,858,245 ready_for_fw is high
3,858,437 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,557 UART: [idev] Erasing UDS.KEYID = 0
6,335,822 UART: [idev] Sha1 KeyId Algorithm
6,357,591 UART: [idev] --
6,363,204 UART: [ldev] ++
6,363,878 UART: [ldev] CDI.KEYID = 6
6,364,791 UART: [ldev] SUBJECT.KEYID = 5
6,365,949 UART: [ldev] AUTHORITY.KEYID = 7
6,367,181 UART: [ldev] FE.KEYID = 1
6,376,151 UART: [ldev] Erasing FE.KEYID = 1
8,854,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,665 UART: [ldev] --
10,645,797 UART: [fwproc] Wait for Commands...
10,648,064 UART: [fwproc] Recv command 0x46574c44
10,650,325 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,830,487 >>> mbox cmd response: success
14,830,992 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,834,794 UART: [afmc] ++
14,835,545 UART: [afmc] CDI.KEYID = 6
14,836,736 UART: [afmc] SUBJECT.KEYID = 7
14,838,206 UART: [afmc] AUTHORITY.KEYID = 5
17,338,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,019 UART: [afmc] --
19,138,260 UART: [cold-reset] --
19,143,226 UART: [state] Locking Datavault
19,146,869 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,077 UART: [state] Locking ICCM
19,151,505 UART: [exit] Launching FMC @ 0x40000130
19,160,134 UART:
19,160,370 UART: Running Caliptra FMC ...
19,161,471 UART:
19,161,659 UART: [state] CFI Enabled
19,169,714 UART: [fht] FMC Alias Private Key: 7
20,926,855 UART: [art] Extend RT PCRs Done
20,928,082 UART: [art] Lock RT PCRs Done
20,929,849 UART: [art] Populate DV Done
20,935,263 UART: [fht] FMC Alias Private Key: 7
20,936,857 UART: [art] Derive CDI
20,937,598 UART: [art] Store in in slot 0x4
20,980,249 UART: [art] Derive Key Pair
20,981,293 UART: [art] Store priv key in slot 0x5
23,407,647 UART: [art] Derive Key Pair - Done
23,420,429 UART: [art] Signing Cert with AUTHO
23,421,736 UART: RITY.KEYID = 7
25,127,074 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,584 UART: [art] PUB.X = 43EE5A4AC0EDA76AA9276125CB3F91101998E8DFE786DCC2FFEA9FABFA0E75A7CA1BEEE5BFDDFFCA1BC91F608116E71C
25,135,930 UART: [art] PUB.Y = 14CE46187BC01566D4402C421D02C344A30B871F785D4806D5DC5E8EA98F8603271FDC940011C2369BEA7C6A3C42CC88
25,143,102 UART: [art] SIG.R = C4855076BA921B45E426D6B3B5B956C60262F7E8A18596470CE66403AEBD7F8600A3B0DF03FBC06D6CA3767A4CA996F7
25,150,464 UART: [art] SIG.S = 869A4A630078ECF7D391A147DFB63E84DDE580164257B34947AD6FE2DF4E00EC6268594B6475B83792B230C17CA1C264
26,129,024 UART: Caliptra RT
26,129,719 UART: [state] CFI Enabled
26,247,484 UART: [rt] RT listening for mailbox commands...
26,278,889 UART: [rt]cmd =0x43415053, len=4
26,280,548 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,699 writing to cptra_bootfsm_go
3,756,534 ready_for_fw is high
3,756,918 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,962,876 >>> mbox cmd response: success
14,963,655 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,214,413 UART:
19,214,809 UART: Running Caliptra FMC ...
19,215,937 UART:
19,216,094 UART: [state] CFI Enabled
19,224,114 UART: [fht] FMC Alias Private Key: 7
20,981,135 UART: [art] Extend RT PCRs Done
20,982,360 UART: [art] Lock RT PCRs Done
20,984,235 UART: [art] Populate DV Done
20,989,443 UART: [fht] FMC Alias Private Key: 7
20,991,050 UART: [art] Derive CDI
20,991,800 UART: [art] Store in in slot 0x4
21,034,510 UART: [art] Derive Key Pair
21,035,552 UART: [art] Store priv key in slot 0x5
23,462,911 UART: [art] Derive Key Pair - Done
23,475,691 UART: [art] Signing Cert with AUTHO
23,476,992 UART: RITY.KEYID = 7
25,182,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,128 UART: [art] PUB.X = 1F1572C604DD8400F06864EFDF6E559CE4E34CAD82CD75D34A49EC4670941CCB86A47314C1150572293F7F18AD02F32A
25,191,456 UART: [art] PUB.Y = 34CCE1383273346E8811EE9EF8C930C53F9A4B51488219A80D8A2249F7C4C96B4122D62A5B141A76A1AAB9389E41E779
25,198,688 UART: [art] SIG.R = 99250B12AE0CD3609C1BAD695865E8E8784B64A50A65F6ABA39526A0B8C5DD1AE5CBE6C6A0051DE24E6F66C68A2FE334
25,206,065 UART: [art] SIG.S = 9AE370F28214A7983D2E322E853B373706A62F5056C922EACD7D15992595F4CE105A22603918FF101E0B6528B84F6960
26,185,425 UART: Caliptra RT
26,186,138 UART: [state] CFI Enabled
26,303,257 UART: [rt] RT listening for mailbox commands...
26,334,914 UART: [rt]cmd =0x43415053, len=4
26,336,683 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,773 UART: [kat] SHA2-256
892,711 UART: [kat] SHA2-384
895,314 UART: [kat] SHA2-512-ACC
897,215 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,817 UART: [cold-reset] ++
1,477,351 UART: [fht] Storing FHT @ 0x50003400
1,480,170 UART: [idev] ++
1,480,338 UART: [idev] CDI.KEYID = 6
1,480,698 UART: [idev] SUBJECT.KEYID = 7
1,481,122 UART: [idev] UDS.KEYID = 0
1,481,467 ready_for_fw is high
1,481,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,506 UART: [idev] Erasing UDS.KEYID = 0
1,506,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,924 UART: [idev] --
1,515,949 UART: [ldev] ++
1,516,117 UART: [ldev] CDI.KEYID = 6
1,516,480 UART: [ldev] SUBJECT.KEYID = 5
1,516,906 UART: [ldev] AUTHORITY.KEYID = 7
1,517,369 UART: [ldev] FE.KEYID = 1
1,522,515 UART: [ldev] Erasing FE.KEYID = 1
1,547,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,956 UART: [ldev] --
1,587,327 UART: [fwproc] Waiting for Commands...
1,588,016 UART: [fwproc] Received command 0x46574c44
1,588,807 UART: [fwproc] Received Image of size 114084 bytes
2,884,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,867 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,596 >>> mbox cmd response: success
3,077,596 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,078,854 UART: [afmc] ++
3,079,022 UART: [afmc] CDI.KEYID = 6
3,079,384 UART: [afmc] SUBJECT.KEYID = 7
3,079,809 UART: [afmc] AUTHORITY.KEYID = 5
3,115,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,660 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,053 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,743 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,694 UART: [afmc] --
3,158,720 UART: [cold-reset] --
3,159,510 UART: [state] Locking Datavault
3,160,613 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,217 UART: [state] Locking ICCM
3,161,641 UART: [exit] Launching FMC @ 0x40000130
3,166,970 UART:
3,166,986 UART: Running Caliptra FMC ...
3,167,394 UART:
3,167,448 UART: [state] CFI Enabled
3,177,977 UART: [fht] FMC Alias Private Key: 7
3,285,882 UART: [art] Extend RT PCRs Done
3,286,310 UART: [art] Lock RT PCRs Done
3,288,002 UART: [art] Populate DV Done
3,296,141 UART: [fht] FMC Alias Private Key: 7
3,297,171 UART: [art] Derive CDI
3,297,451 UART: [art] Store in in slot 0x4
3,383,294 UART: [art] Derive Key Pair
3,383,654 UART: [art] Store priv key in slot 0x5
3,396,852 UART: [art] Derive Key Pair - Done
3,411,592 UART: [art] Signing Cert with AUTHO
3,412,072 UART: RITY.KEYID = 7
3,427,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,157 UART: [art] PUB.X = 6A350DAA6CE9C298A830DEC70BD7D79A17F53ACB30DF782B312B3FD68EA3DEE268FC982F70B966309C02FEB8C5A64A81
3,434,938 UART: [art] PUB.Y = 75D152035D172F1A4EAD99682D7A0AD48433492BDD7B9CA06D9BC5A72FDC4A3E5E20E39AD4508F19AEF890F237077BE5
3,441,891 UART: [art] SIG.R = 89FE5EBB7377E53CE524483045695521BD7498476ADAF6F04D62930A9DBAEF477FE97184BBBA1BEF80A91B9AD76B3C79
3,448,670 UART: [art] SIG.S = E07B7FF4283BAF38A6662BF0339767051FD0F91431F091AF8F1DA43E4CC3A08C8BB453316901A6567641EEAA26F5C93C
3,472,635 UART: Caliptra RT
3,472,888 UART: [state] CFI Enabled
3,581,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,198 UART: [rt]cmd =0x43415053, len=4
3,613,313 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,575 ready_for_fw is high
1,361,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,236 >>> mbox cmd response: success
2,923,236 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,985,392 UART:
2,985,408 UART: Running Caliptra FMC ...
2,985,816 UART:
2,985,870 UART: [state] CFI Enabled
2,996,585 UART: [fht] FMC Alias Private Key: 7
3,104,534 UART: [art] Extend RT PCRs Done
3,104,962 UART: [art] Lock RT PCRs Done
3,106,152 UART: [art] Populate DV Done
3,114,381 UART: [fht] FMC Alias Private Key: 7
3,115,455 UART: [art] Derive CDI
3,115,735 UART: [art] Store in in slot 0x4
3,201,294 UART: [art] Derive Key Pair
3,201,654 UART: [art] Store priv key in slot 0x5
3,215,204 UART: [art] Derive Key Pair - Done
3,229,905 UART: [art] Signing Cert with AUTHO
3,230,385 UART: RITY.KEYID = 7
3,245,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,028 UART: [art] PUB.X = 57A566BC32625B6D8FA993FC5F3A83E6BE4A94D9102A7FFCA389C1E984A6323B61C6B47D2A54C7535546C0909E7CD82F
3,252,806 UART: [art] PUB.Y = 6DDF3585062779149E7E07A28944AEB43DF0650939CEE7091CB10B040167A22D3C9CE39BA5AC51E0BABF10ED3063DD8A
3,259,745 UART: [art] SIG.R = 037C3F05BCE5D79BB370E2AEA8804C10F18A5AE4FC7539E4A3C6C09A64F443945A0DE5D9B67F1ED25A6E1CEE247B1F01
3,266,521 UART: [art] SIG.S = 89C22DC5FB65BB0B66377D33FD4F9E155C01ED7D3F966B0C6273F604538D15B6407A1FCED8AF49B2D019CFDD13196700
3,290,082 UART: Caliptra RT
3,290,335 UART: [state] CFI Enabled
3,398,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,370 UART: [rt]cmd =0x43415053, len=4
3,430,687 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,996 UART: [kat] SHA2-256
881,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,042 UART: [kat] ++
886,194 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,063 UART: [kat] SHA2-512-ACC
896,964 UART: [kat] ECC-384
902,407 UART: [kat] HMAC-384Kdf
906,861 UART: [kat] LMS
1,475,057 UART: [kat] --
1,476,038 UART: [cold-reset] ++
1,476,400 UART: [fht] Storing FHT @ 0x50003400
1,479,187 UART: [idev] ++
1,479,355 UART: [idev] CDI.KEYID = 6
1,479,715 UART: [idev] SUBJECT.KEYID = 7
1,480,139 UART: [idev] UDS.KEYID = 0
1,480,484 ready_for_fw is high
1,480,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,197 UART: [idev] Erasing UDS.KEYID = 0
1,504,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,195 UART: [idev] --
1,514,174 UART: [ldev] ++
1,514,342 UART: [ldev] CDI.KEYID = 6
1,514,705 UART: [ldev] SUBJECT.KEYID = 5
1,515,131 UART: [ldev] AUTHORITY.KEYID = 7
1,515,594 UART: [ldev] FE.KEYID = 1
1,520,848 UART: [ldev] Erasing FE.KEYID = 1
1,546,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,101 UART: [ldev] --
1,585,510 UART: [fwproc] Waiting for Commands...
1,586,231 UART: [fwproc] Received command 0x46574c44
1,587,022 UART: [fwproc] Received Image of size 114084 bytes
2,881,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,053 >>> mbox cmd response: success
3,073,053 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,074,209 UART: [afmc] ++
3,074,377 UART: [afmc] CDI.KEYID = 6
3,074,739 UART: [afmc] SUBJECT.KEYID = 7
3,075,164 UART: [afmc] AUTHORITY.KEYID = 5
3,110,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,984 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,674 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,483 UART: [afmc] --
3,153,595 UART: [cold-reset] --
3,154,449 UART: [state] Locking Datavault
3,155,856 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,460 UART: [state] Locking ICCM
3,156,894 UART: [exit] Launching FMC @ 0x40000130
3,162,223 UART:
3,162,239 UART: Running Caliptra FMC ...
3,162,647 UART:
3,162,790 UART: [state] CFI Enabled
3,173,221 UART: [fht] FMC Alias Private Key: 7
3,280,780 UART: [art] Extend RT PCRs Done
3,281,208 UART: [art] Lock RT PCRs Done
3,282,630 UART: [art] Populate DV Done
3,290,871 UART: [fht] FMC Alias Private Key: 7
3,292,033 UART: [art] Derive CDI
3,292,313 UART: [art] Store in in slot 0x4
3,378,198 UART: [art] Derive Key Pair
3,378,558 UART: [art] Store priv key in slot 0x5
3,391,778 UART: [art] Derive Key Pair - Done
3,406,580 UART: [art] Signing Cert with AUTHO
3,407,060 UART: RITY.KEYID = 7
3,421,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,553 UART: [art] PUB.X = 22B6614F21BFF2B128CCF4B1CB1724AC4FBE248BE3B9C062421B6F4D77AFAF75925B701B2CCBEF47FD14B671F4B4F5E4
3,429,345 UART: [art] PUB.Y = 22591255C72191BB9247ECAA46D62B8D49CC95B118B8130E3147BE700F0501AAFB453265E504B96F61A7DF247BD6B718
3,436,280 UART: [art] SIG.R = F1AC2752E72FCA0D049B5F99D574E2424335F9FF24CC55AA25406BA3D5E7CCA036337108E3F34BCE7B254AF6D64578EC
3,443,053 UART: [art] SIG.S = AA0E6223DBCEB19872ACB6317DA9CEC1DAC6B7C3CB44CE663EFFE50772DDACECB78763304615F1BAA6422D17B5B4C37A
3,466,774 UART: Caliptra RT
3,467,119 UART: [state] CFI Enabled
3,574,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,389 UART: [rt]cmd =0x43415053, len=4
3,606,766 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,484 ready_for_fw is high
1,362,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,151 >>> mbox cmd response: success
2,925,151 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,986,613 UART:
2,986,629 UART: Running Caliptra FMC ...
2,987,037 UART:
2,987,180 UART: [state] CFI Enabled
2,997,919 UART: [fht] FMC Alias Private Key: 7
3,106,190 UART: [art] Extend RT PCRs Done
3,106,618 UART: [art] Lock RT PCRs Done
3,108,034 UART: [art] Populate DV Done
3,116,087 UART: [fht] FMC Alias Private Key: 7
3,117,117 UART: [art] Derive CDI
3,117,397 UART: [art] Store in in slot 0x4
3,203,058 UART: [art] Derive Key Pair
3,203,418 UART: [art] Store priv key in slot 0x5
3,216,332 UART: [art] Derive Key Pair - Done
3,230,916 UART: [art] Signing Cert with AUTHO
3,231,396 UART: RITY.KEYID = 7
3,246,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,279 UART: [art] PUB.X = E9EC8DBD248A6DB16BADCD039660802B4AF33CAC0469537CB7CFC83766D82C46A8636B8E253C3F11A14469416A758CCE
3,254,055 UART: [art] PUB.Y = 2B34034DE254CB469401FEB63899957DF97A84D94C12C95804D5751C8DCD18A7DEF249687365FEC837ADF877A210BD8E
3,261,000 UART: [art] SIG.R = 742E15D906D6EE3B315170750AB61AF0B92BAAE1E0CA7369407DDBA7B3487914BA4B333CFDAAA0AA062BDEBDF18D5F86
3,267,783 UART: [art] SIG.S = A80F722FA6310628FDD5A76D5727381C12DA76CF60769A2AF5268780C7C97982FF7432BF627E5EFFAE9A14591A943EC0
3,291,658 UART: Caliptra RT
3,292,003 UART: [state] CFI Enabled
3,400,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,370 UART: [rt]cmd =0x43415053, len=4
3,431,541 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Unprovisioned
86,327 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
893,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,931 UART: [kat] ++
898,083 UART: [kat] sha1
902,307 UART: [kat] SHA2-256
904,247 UART: [kat] SHA2-384
907,032 UART: [kat] SHA2-512-ACC
908,933 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
923,284 UART: [kat] LMS
1,171,612 UART: [kat] --
1,172,791 UART: [cold-reset] ++
1,173,319 UART: [fht] FHT @ 0x50003400
1,176,180 UART: [idev] ++
1,176,348 UART: [idev] CDI.KEYID = 6
1,176,708 UART: [idev] SUBJECT.KEYID = 7
1,177,132 UART: [idev] UDS.KEYID = 0
1,177,477 ready_for_fw is high
1,177,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,990 UART: [idev] Erasing UDS.KEYID = 0
1,201,603 UART: [idev] Sha1 KeyId Algorithm
1,210,177 UART: [idev] --
1,211,231 UART: [ldev] ++
1,211,399 UART: [ldev] CDI.KEYID = 6
1,211,762 UART: [ldev] SUBJECT.KEYID = 5
1,212,188 UART: [ldev] AUTHORITY.KEYID = 7
1,212,651 UART: [ldev] FE.KEYID = 1
1,217,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,747 UART: [ldev] --
1,283,210 UART: [fwproc] Wait for Commands...
1,283,926 UART: [fwproc] Recv command 0x46574c44
1,284,654 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,825 >>> mbox cmd response: success
2,771,825 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,772,873 UART: [afmc] ++
2,773,041 UART: [afmc] CDI.KEYID = 6
2,773,403 UART: [afmc] SUBJECT.KEYID = 7
2,773,828 UART: [afmc] AUTHORITY.KEYID = 5
2,808,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,204 UART: [afmc] --
2,852,104 UART: [cold-reset] --
2,852,918 UART: [state] Locking Datavault
2,854,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,639 UART: [state] Locking ICCM
2,855,307 UART: [exit] Launching FMC @ 0x40000130
2,860,636 UART:
2,860,652 UART: Running Caliptra FMC ...
2,861,060 UART:
2,861,114 UART: [state] CFI Enabled
2,871,787 UART: [fht] FMC Alias Private Key: 7
2,979,252 UART: [art] Extend RT PCRs Done
2,979,680 UART: [art] Lock RT PCRs Done
2,981,226 UART: [art] Populate DV Done
2,989,431 UART: [fht] FMC Alias Private Key: 7
2,990,453 UART: [art] Derive CDI
2,990,733 UART: [art] Store in in slot 0x4
3,076,912 UART: [art] Derive Key Pair
3,077,272 UART: [art] Store priv key in slot 0x5
3,090,852 UART: [art] Derive Key Pair - Done
3,105,672 UART: [art] Signing Cert with AUTHO
3,106,152 UART: RITY.KEYID = 7
3,121,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,135 UART: [art] PUB.X = BAE2B082184E1CA6955F0AFD609BB986E382D161DCCE3D054F8112F30CF130BDB41DDEDF402AA84F33435A179363BBA5
3,128,912 UART: [art] PUB.Y = 9EC75AF1F436B686AF3CF881B42B9D8E7233D011686317707464D5E3C52BBBAFB898DB8CFB5E2EB51A0A255DBE79C7F2
3,135,875 UART: [art] SIG.R = 3C5A454535E69E3FD643178B761156576184C1860E8C26A08B66BBA3BE908E00C27A8FC38D5E8C319ADAFE1BE6E493E6
3,142,626 UART: [art] SIG.S = 6E5FA12C6FA162E16014DF6A8C3594422270ACF83A2DD6F9502E811CB0CDA855067DBEDE2A6AD782D3490F7A9162A070
3,166,129 UART: Caliptra RT
3,166,382 UART: [state] CFI Enabled
3,274,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,457 UART: [rt]cmd =0x43415053, len=4
3,305,644 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 ready_for_fw is high
1,060,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,772 >>> mbox cmd response: success
2,620,772 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,682,452 UART:
2,682,468 UART: Running Caliptra FMC ...
2,682,876 UART:
2,682,930 UART: [state] CFI Enabled
2,693,441 UART: [fht] FMC Alias Private Key: 7
2,801,524 UART: [art] Extend RT PCRs Done
2,801,952 UART: [art] Lock RT PCRs Done
2,803,210 UART: [art] Populate DV Done
2,811,683 UART: [fht] FMC Alias Private Key: 7
2,812,641 UART: [art] Derive CDI
2,812,921 UART: [art] Store in in slot 0x4
2,898,814 UART: [art] Derive Key Pair
2,899,174 UART: [art] Store priv key in slot 0x5
2,912,198 UART: [art] Derive Key Pair - Done
2,926,920 UART: [art] Signing Cert with AUTHO
2,927,400 UART: RITY.KEYID = 7
2,942,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,587 UART: [art] PUB.X = 7598D4AD71E9DF1F59571414EA9BB7DC8F416E72A159F393F833B40796E881320D1C8497C56BB396AE14864E395E5214
2,950,347 UART: [art] PUB.Y = 05B680F6FF5982373E7C2A89EEE8D2223703DA84030554FC57D535BBFF1337F0652CD9095A0DAC0759F916C88C7CB0EA
2,957,282 UART: [art] SIG.R = 7917EFCBFBD66702AE14A3237BF309DAA013C71BB502F9C3B5B38CE4A70F9AB192C4A98ED6751081462CE4C0DA8A755E
2,964,056 UART: [art] SIG.S = B6DB203E651D115980C1C5C1958D95F94E9BADB11319F38562F1F839EF4CAAB51D6AB1E981F69B653D9B1BCD06AC9679
2,988,040 UART: Caliptra RT
2,988,293 UART: [state] CFI Enabled
3,095,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,448 UART: [rt]cmd =0x43415053, len=4
3,127,867 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,636 UART: [kat] SHA2-256
904,576 UART: [kat] SHA2-384
907,325 UART: [kat] SHA2-512-ACC
909,226 UART: [kat] ECC-384
919,055 UART: [kat] HMAC-384Kdf
923,671 UART: [kat] LMS
1,171,999 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,885 UART: [idev] ++
1,176,053 UART: [idev] CDI.KEYID = 6
1,176,413 UART: [idev] SUBJECT.KEYID = 7
1,176,837 UART: [idev] UDS.KEYID = 0
1,177,182 ready_for_fw is high
1,177,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,202,286 UART: [idev] Sha1 KeyId Algorithm
1,210,766 UART: [idev] --
1,211,852 UART: [ldev] ++
1,212,020 UART: [ldev] CDI.KEYID = 6
1,212,383 UART: [ldev] SUBJECT.KEYID = 5
1,212,809 UART: [ldev] AUTHORITY.KEYID = 7
1,213,272 UART: [ldev] FE.KEYID = 1
1,218,324 UART: [ldev] Erasing FE.KEYID = 1
1,245,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,456 UART: [ldev] --
1,284,809 UART: [fwproc] Wait for Commands...
1,285,381 UART: [fwproc] Recv command 0x46574c44
1,286,109 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,974 >>> mbox cmd response: success
2,773,974 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,775,118 UART: [afmc] ++
2,775,286 UART: [afmc] CDI.KEYID = 6
2,775,648 UART: [afmc] SUBJECT.KEYID = 7
2,776,073 UART: [afmc] AUTHORITY.KEYID = 5
2,811,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,273 UART: [afmc] --
2,855,263 UART: [cold-reset] --
2,855,991 UART: [state] Locking Datavault
2,857,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,152 UART: [state] Locking ICCM
2,858,736 UART: [exit] Launching FMC @ 0x40000130
2,864,065 UART:
2,864,081 UART: Running Caliptra FMC ...
2,864,489 UART:
2,864,632 UART: [state] CFI Enabled
2,875,407 UART: [fht] FMC Alias Private Key: 7
2,983,830 UART: [art] Extend RT PCRs Done
2,984,258 UART: [art] Lock RT PCRs Done
2,985,682 UART: [art] Populate DV Done
2,994,045 UART: [fht] FMC Alias Private Key: 7
2,995,121 UART: [art] Derive CDI
2,995,401 UART: [art] Store in in slot 0x4
3,081,138 UART: [art] Derive Key Pair
3,081,498 UART: [art] Store priv key in slot 0x5
3,094,534 UART: [art] Derive Key Pair - Done
3,109,238 UART: [art] Signing Cert with AUTHO
3,109,718 UART: RITY.KEYID = 7
3,125,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,943 UART: [art] PUB.X = 6BD97EC7B98EDF313AC62948C5CECE4F54D1A99B4EFD763422B09133074B223354D00623806901F6F196C93E9AC51373
3,132,704 UART: [art] PUB.Y = 0604594A980CE9087C84655BA8DC0D60E21C286072AC891B4F257AADF1F0F65335D4A81AA6B87A1961FB64970A046CD7
3,139,635 UART: [art] SIG.R = DDC217F521D285628B9AE5C686F11AB730D6232D2F24CC9B7536C56431A69BB7AD7AC060950F365529155019D501DC4A
3,146,399 UART: [art] SIG.S = 8798B69C8A876BA7FA471E90640AC2BE81C635510C8E90B591C54DEE767295B87E886CBF13E0A4F15C7BAD85BACCE76C
3,170,112 UART: Caliptra RT
3,170,457 UART: [state] CFI Enabled
3,277,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,405 UART: [rt]cmd =0x43415053, len=4
3,309,748 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,860 ready_for_fw is high
1,060,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,905 >>> mbox cmd response: success
2,623,905 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,399 UART:
2,686,415 UART: Running Caliptra FMC ...
2,686,823 UART:
2,686,966 UART: [state] CFI Enabled
2,697,489 UART: [fht] FMC Alias Private Key: 7
2,805,222 UART: [art] Extend RT PCRs Done
2,805,650 UART: [art] Lock RT PCRs Done
2,807,658 UART: [art] Populate DV Done
2,815,695 UART: [fht] FMC Alias Private Key: 7
2,816,667 UART: [art] Derive CDI
2,816,947 UART: [art] Store in in slot 0x4
2,902,390 UART: [art] Derive Key Pair
2,902,750 UART: [art] Store priv key in slot 0x5
2,915,774 UART: [art] Derive Key Pair - Done
2,930,361 UART: [art] Signing Cert with AUTHO
2,930,841 UART: RITY.KEYID = 7
2,946,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,914 UART: [art] PUB.X = DA14DDB34F9A3DFF80309A7E3EDC1DE5D9AEFF2F2F1DE3648DBC2FCE87814CCA5F480C66C3DE2D03108BEF11B6EE5985
2,953,710 UART: [art] PUB.Y = 2C6E2B1BEA678878D9C9C2B684D9276321198761C29F350DA90C801DF243710BB2E85EF3D9F46648546CF8FA219DC51A
2,960,653 UART: [art] SIG.R = 4D28722FA90186F83FB4A9063213BD3A65FD8B3714E3E4C658B6A25135C2A49C666F94E627FB42515F2C855CF39DB4A5
2,967,419 UART: [art] SIG.S = F9613C52B9676039482B7680099D4A93E9317E37F1D7F0B826105E452EB57977F87E885CF2149AC41650E0532F72FDDA
2,990,887 UART: Caliptra RT
2,991,232 UART: [state] CFI Enabled
3,098,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,897 UART: [rt]cmd =0x43415053, len=4
3,130,172 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
891,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,829 UART: [idev] Sha1 KeyId Algorithm
1,208,637 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,224 UART: [ldev] Erasing FE.KEYID = 1
1,242,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,304 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,363 UART: [fwproc] Recv command 0x46574c44
1,283,096 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,453 >>> mbox cmd response: success
2,768,453 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,769,606 UART: [afmc] ++
2,769,774 UART: [afmc] CDI.KEYID = 6
2,770,137 UART: [afmc] SUBJECT.KEYID = 7
2,770,563 UART: [afmc] AUTHORITY.KEYID = 5
2,806,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,473 UART: [afmc] --
2,849,475 UART: [cold-reset] --
2,850,385 UART: [state] Locking Datavault
2,851,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,012 UART: [state] Locking ICCM
2,852,640 UART: [exit] Launching FMC @ 0x40000130
2,857,969 UART:
2,857,985 UART: Running Caliptra FMC ...
2,858,393 UART:
2,858,447 UART: [state] CFI Enabled
2,868,806 UART: [fht] FMC Alias Private Key: 7
2,976,055 UART: [art] Extend RT PCRs Done
2,976,483 UART: [art] Lock RT PCRs Done
2,978,099 UART: [art] Populate DV Done
2,986,470 UART: [fht] FMC Alias Private Key: 7
2,987,558 UART: [art] Derive CDI
2,987,838 UART: [art] Store in in slot 0x4
3,073,291 UART: [art] Derive Key Pair
3,073,651 UART: [art] Store priv key in slot 0x5
3,086,975 UART: [art] Derive Key Pair - Done
3,101,806 UART: [art] Signing Cert with AUTHO
3,102,286 UART: RITY.KEYID = 7
3,117,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,419 UART: [art] PUB.X = 687BE23D257039B40EF1F9DD6095681E35A88001FC5092E09A867D0C8691D35E3873A0C5991B89DBE78E5685EFB236B5
3,125,178 UART: [art] PUB.Y = A5FF88E3E383C3A4A3762AF0B4BC293EF4CF8AF6FE330D92B661A42C259FC4697167EB108842B348F4B7D768671B5069
3,132,131 UART: [art] SIG.R = 4629C3D5F05277A4FA870F711D3EA49143E8DBB15C1915B374C8FC9F97F6B4BC45B19850D27A25630BB8F945E192E304
3,138,894 UART: [art] SIG.S = 5218BB37CD4F4DCDB48074ECBBBAB8638671C0D93EBFE371F5055A9CE9327E89372185230FF47CC05B150B11C66628BE
3,162,638 UART: Caliptra RT
3,162,891 UART: [state] CFI Enabled
3,271,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,258 UART: [rt]cmd =0x43415053, len=4
3,303,543 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 ready_for_fw is high
1,055,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,421 >>> mbox cmd response: success
2,618,421 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,679,221 UART:
2,679,237 UART: Running Caliptra FMC ...
2,679,645 UART:
2,679,699 UART: [state] CFI Enabled
2,690,574 UART: [fht] FMC Alias Private Key: 7
2,798,717 UART: [art] Extend RT PCRs Done
2,799,145 UART: [art] Lock RT PCRs Done
2,800,649 UART: [art] Populate DV Done
2,808,732 UART: [fht] FMC Alias Private Key: 7
2,809,910 UART: [art] Derive CDI
2,810,190 UART: [art] Store in in slot 0x4
2,895,849 UART: [art] Derive Key Pair
2,896,209 UART: [art] Store priv key in slot 0x5
2,908,941 UART: [art] Derive Key Pair - Done
2,923,669 UART: [art] Signing Cert with AUTHO
2,924,149 UART: RITY.KEYID = 7
2,939,197 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,962 UART: [art] PUB.X = 24E27E354C97D63A89203CDAD947BD81D9DE3668B55303276053C020BF1D4C897087A69B428A2C9FB0CD3EC4EE8970D6
2,946,733 UART: [art] PUB.Y = 310BD0B9DB20220668700D43AC2843D43737CF6DCF35BF2E1CE7F02A62B44C992AAC0F0DEE249A932E3CCC10213652A1
2,953,678 UART: [art] SIG.R = 55F30826E178C7ACC0CD9DB05B37CCA07ECD66440F91D828E692F3D8D0F1F042833857681386A07038CD8AE1DB46078E
2,960,443 UART: [art] SIG.S = 0D553909857377DC6DC1145F9F9CF0756E80ABE27EC9E48B48E707DEDC35EB1FEE63D4947850AB03ABEDB23559612F94
2,984,256 UART: Caliptra RT
2,984,509 UART: [state] CFI Enabled
3,092,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,532 UART: [rt]cmd =0x43415053, len=4
3,123,811 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
920,975 UART: [kat] LMS
1,169,287 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 ready_for_fw is high
1,174,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,931 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,606 >>> mbox cmd response: success
2,770,606 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,771,621 UART: [afmc] ++
2,771,789 UART: [afmc] CDI.KEYID = 6
2,772,152 UART: [afmc] SUBJECT.KEYID = 7
2,772,578 UART: [afmc] AUTHORITY.KEYID = 5
2,808,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,248 UART: [afmc] --
2,851,136 UART: [cold-reset] --
2,852,026 UART: [state] Locking Datavault
2,853,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,887 UART: [state] Locking ICCM
2,854,419 UART: [exit] Launching FMC @ 0x40000130
2,859,748 UART:
2,859,764 UART: Running Caliptra FMC ...
2,860,172 UART:
2,860,315 UART: [state] CFI Enabled
2,870,402 UART: [fht] FMC Alias Private Key: 7
2,978,591 UART: [art] Extend RT PCRs Done
2,979,019 UART: [art] Lock RT PCRs Done
2,980,553 UART: [art] Populate DV Done
2,988,906 UART: [fht] FMC Alias Private Key: 7
2,990,008 UART: [art] Derive CDI
2,990,288 UART: [art] Store in in slot 0x4
3,075,941 UART: [art] Derive Key Pair
3,076,301 UART: [art] Store priv key in slot 0x5
3,089,341 UART: [art] Derive Key Pair - Done
3,104,274 UART: [art] Signing Cert with AUTHO
3,104,754 UART: RITY.KEYID = 7
3,119,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,483 UART: [art] PUB.X = ED6CB4B1BB335860FF3A7DAF589CB298C181B54895C928AED4172D8CA3E20B016CED4607E4B87ADE7A5C5DB02917A779
3,127,260 UART: [art] PUB.Y = A2D4716B92152FB7F4D071424D9BA427578098A35FBFCA7DA01E5852A2509FF839B31937D05A86CB75039D5FDE9FF231
3,134,211 UART: [art] SIG.R = FEEF1F8F5A3A7E143C76F0BA79E0326E951E8E0B8E1CD8727CB278796326BBC84C4B712095DFC90CCBC9389FB0E2431A
3,140,991 UART: [art] SIG.S = 1D24351D28A5E56D79C6E33C365D9F05A80325721B938944FE8AB6193C4AD94C01C5A977832FCE247CC489D730E4B9AF
3,164,621 UART: Caliptra RT
3,164,966 UART: [state] CFI Enabled
3,271,493 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,953 UART: [rt]cmd =0x43415053, len=4
3,303,202 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,155 ready_for_fw is high
1,057,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,644 >>> mbox cmd response: success
2,619,644 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,682,238 UART:
2,682,254 UART: Running Caliptra FMC ...
2,682,662 UART:
2,682,805 UART: [state] CFI Enabled
2,693,310 UART: [fht] FMC Alias Private Key: 7
2,801,655 UART: [art] Extend RT PCRs Done
2,802,083 UART: [art] Lock RT PCRs Done
2,803,585 UART: [art] Populate DV Done
2,811,356 UART: [fht] FMC Alias Private Key: 7
2,812,470 UART: [art] Derive CDI
2,812,750 UART: [art] Store in in slot 0x4
2,898,273 UART: [art] Derive Key Pair
2,898,633 UART: [art] Store priv key in slot 0x5
2,911,861 UART: [art] Derive Key Pair - Done
2,926,913 UART: [art] Signing Cert with AUTHO
2,927,393 UART: RITY.KEYID = 7
2,942,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,270 UART: [art] PUB.X = 7DCD0FF482AFCD4D304037C6162246245090743F6B24F35B9B1D7B8AC1341F2F113D308C23230125700C81227623C0E2
2,950,023 UART: [art] PUB.Y = 26B31E33A8626CA2A32C6A8CDF6BB78404FD1F7F92507F86B84B5B925D6F1EC1D1577BDEC7F3C1DAD6D4BA5FF6FBBCE3
2,956,998 UART: [art] SIG.R = 9ECF7B67305926737176F2F1B313D350AF48C1D83D81C4367BCBE888EAF55CC16665DF986670CA89EDCE119CDC444276
2,963,774 UART: [art] SIG.S = 74678E3A0A6095FF0E3E9E13A8129A5800EF523FA08373E6F364DDB6A5E0D56665B32725D104537D366FFADC96779FA7
2,987,900 UART: Caliptra RT
2,988,245 UART: [state] CFI Enabled
3,095,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,984 UART: [rt]cmd =0x43415053, len=4
3,127,221 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,351,427 UART: [ldev] SUBJECT.KEYID = 5
7,352,639 UART: [ldev] AUTHORITY.KEYID = 7
7,353,871 UART: [ldev] FE.KEYID = 1
7,401,113 UART: [ldev] Erasing FE.KEYID = 1
10,734,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,655 UART: [ldev] --
13,116,175 UART: [fwproc] Waiting for Commands...
13,119,348 UART: [fwproc] Received command 0x46574c44
13,121,533 UART: [fwproc] Received Image of size 113760 bytes
17,167,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,240,298 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,309,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,625,096 >>> mbox cmd response: success
17,626,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,628,441 UART: [afmc] ++
17,629,030 UART: [afmc] CDI.KEYID = 6
17,629,945 UART: [afmc] SUBJECT.KEYID = 7
17,631,166 UART: [afmc] AUTHORITY.KEYID = 5
20,985,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,699 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,300,221 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,315,044 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,329,541 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,350,446 UART: [afmc] --
23,353,530 UART: [cold-reset] --
23,359,010 UART: [state] Locking Datavault
23,366,048 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,748 UART: [state] Locking ICCM
23,370,170 UART: [exit] Launching FMC @ 0x40000130
23,378,562 UART:
23,378,803 UART: Running Caliptra FMC ...
23,379,903 UART:
23,380,067 UART: [state] CFI Enabled
23,445,261 UART: [fht] FMC Alias Private Key: 7
25,783,198 UART: [art] Extend RT PCRs Done
25,784,424 UART: [art] Lock RT PCRs Done
25,786,237 UART: [art] Populate DV Done
25,791,703 UART: [fht] FMC Alias Private Key: 7
25,793,247 UART: [art] Derive CDI
25,794,014 UART: [art] Store in in slot 0x4
25,854,293 UART: [art] Derive Key Pair
25,855,334 UART: [art] Store priv key in slot 0x5
29,147,963 UART: [art] Derive Key Pair - Done
29,161,235 UART: [art] Signing Cert with AUTHO
29,162,538 UART: RITY.KEYID = 7
31,450,268 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,772 UART: [art] PUB.X = 0C694DBCAEAFEC2AF572112BB801AE6794658A58B44883A0E4FFE197728B6933FA67600A7D058FA271A52C554B5616CB
31,459,015 UART: [art] PUB.Y = 25C39A74C11FCE42AC270572C2C9ED24B45C51B7FB58CD3CC82FAF8FEA66A4FC4108A08E14675B03CBC5746B2990B0FA
31,466,237 UART: [art] SIG.R = 775EE92D142D58C2BF481A77642C07D362A38775944415AAB185A19E25F44FBEDC58089E1B9A4D03F26704C747337EC6
31,473,632 UART: [art] SIG.S = 98FC8D589DC51F65A4ABC7914D694E66C9EFF8ACD57D02FE7568085CD3FBA56E24D406CE6EC832B6964BC6E4F5F1F404
32,779,284 UART: Caliptra RT
32,779,976 UART: [state] CFI Enabled
32,941,021 UART: [rt] RT listening for mailbox commands...
32,972,490 UART: [rt]cmd =0x494e464f, len=4
32,976,821 >>> mbox cmd response data (312 bytes)
35,033,369 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,178,187 UART:
35,178,559 UART: Running Caliptra ROM ...
35,179,703 UART:
35,179,876 UART: [state] CFI Enabled
35,250,686 UART: [state] LifecycleState = Unprovisioned
35,252,580 UART: [state] DebugLocked = No
35,255,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,261,017 UART: [kat] SHA2-256
35,430,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,441,183 UART: [kat] ++
35,441,698 UART: [kat] sha1
35,453,343 UART: [kat] SHA2-256
35,456,030 UART: [kat] SHA2-384
35,462,510 UART: [kat] SHA2-512-ACC
35,464,859 UART: [kat] ECC-384
37,751,805 UART: [kat] HMAC-384Kdf
37,784,067 UART: [kat] LMS
38,974,350 UART: [kat] --
38,978,119 UART: [update-reset] ++
43,110,926 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,114,715 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
43,495,681 >>> mbox cmd response: success
43,497,509 UART: [update-reset] Copying MAN_2 To MAN_1
43,519,921 UART: [update-reset Success] --
43,525,071 UART: [state] Locking Datavault
43,528,079 UART: [state] Locking PCR0, PCR1 and PCR31
43,529,842 UART: [state] Locking ICCM
43,531,296 UART: [exit] Launching FMC @ 0x40000130
43,539,693 UART:
43,539,928 UART: Running Caliptra FMC ...
43,540,952 UART:
43,541,099 UART: [state] CFI Enabled
43,641,377 UART: [art] Extend RT PCRs Done
43,642,558 UART: [art] Lock RT PCRs Done
43,643,988 UART: [art] Populate DV Done
43,649,392 UART: [fht] FMC Alias Private Key: 7
43,651,082 UART: [art] Derive CDI
43,651,901 UART: [art] Store in in slot 0x4
43,710,568 UART: [art] Derive Key Pair
43,711,610 UART: [art] Store priv key in slot 0x5
47,003,976 UART: [art] Derive Key Pair - Done
47,017,184 UART: [art] Signing Cert with AUTHO
47,018,531 UART: RITY.KEYID = 7
49,306,495 UART: [art] Erasing AUTHORITY.KEYID = 7
49,308,014 UART: [art] PUB.X = 6A44CF520015C30678ADC1C2E5E1BC76810A444E64E3E8652ED0E2F0B5A5E0857ED921BB39B5439189395C6A8C56903F
49,315,216 UART: [art] PUB.Y = 00CD39C6A254C3EF4146FF40FF9731EA9A81BC13CD929F44A8F4AFAB8BBFA6D7FEA9106700B363A44E4FD64D0943ABF5
49,322,459 UART: [art] SIG.R = F249420B691797FD354106D025C04824857530C334A2E8EE52BA6F4A236BB189A38CF071A7DCED96DF1D04484FE79F93
49,329,854 UART: [art] SIG.S = 9CEEA9BB1495821933D1A3CD174D2C4A920BE144E22ADA03F4C0B1D2D4731625DB072908FD5046C14845E77ACC80F526
50,635,156 UART: Caliptra RT
50,635,870 UART: [state] CFI Enabled
50,967,870 UART: [rt] RT listening for mailbox commands...
50,969,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,999,614 UART: [rt]cmd =0x494e464f, len=4
51,003,836 >>> mbox cmd response data (312 bytes)
53,058,856 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
53,203,137 UART:
53,203,520 UART: Running Caliptra ROM ...
53,204,656 UART:
53,204,828 UART: [state] CFI Enabled
53,275,061 UART: [state] LifecycleState = Unprovisioned
53,277,000 UART: [state] DebugLocked = No
53,279,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,283,893 UART: [kat] SHA2-256
53,453,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,464,064 UART: [kat] ++
53,464,607 UART: [kat] sha1
53,476,585 UART: [kat] SHA2-256
53,479,277 UART: [kat] SHA2-384
53,484,665 UART: [kat] SHA2-512-ACC
53,487,029 UART: [kat] ECC-384
55,779,281 UART: [kat] HMAC-384Kdf
55,811,171 UART: [kat] LMS
57,001,512 UART: [kat] --
57,006,339 UART: [update-reset] ++
61,147,147 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,150,919 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
61,531,945 >>> mbox cmd response: success
61,532,501 UART: [update-reset] Copying MAN_2 To MAN_1
61,554,950 UART: [update-reset Success] --
61,559,890 UART: [state] Locking Datavault
61,562,065 UART: [state] Locking PCR0, PCR1 and PCR31
61,563,820 UART: [state] Locking ICCM
61,565,325 UART: [exit] Launching FMC @ 0x40000130
61,573,727 UART:
61,573,961 UART: Running Caliptra FMC ...
61,575,082 UART:
61,575,251 UART: [state] CFI Enabled
61,668,547 UART: [art] Extend RT PCRs Done
61,669,735 UART: [art] Lock RT PCRs Done
61,671,192 UART: [art] Populate DV Done
61,676,495 UART: [fht] FMC Alias Private Key: 7
61,678,089 UART: [art] Derive CDI
61,678,905 UART: [art] Store in in slot 0x4
61,737,345 UART: [art] Derive Key Pair
61,738,382 UART: [art] Store priv key in slot 0x5
65,030,913 UART: [art] Derive Key Pair - Done
65,043,497 UART: [art] Signing Cert with AUTHO
65,044,808 UART: RITY.KEYID = 7
67,333,280 UART: [art] Erasing AUTHORITY.KEYID = 7
67,334,808 UART: [art] PUB.X = 4F7F442B06A3110DE77D6DB956510432A621CF2A9A471A71C02F9494DF1818330EA1AD2A07FCB054DF45D3BEB36DC820
67,342,088 UART: [art] PUB.Y = 2C90A2503B1B2F2C5E732A33F7A7C898B9B2EB9CA436BD78104626D568121706321A12DAC8E8BD15DE694538F5B500F9
67,349,294 UART: [art] SIG.R = 3F752EDE45988308555D6EC4C19FB600AA187463BBE56C03B93FD701151AB18BD1935A45D2A2C18026B8FA5426E4FE74
67,356,641 UART: [art] SIG.S = 89928558379F241D4741DD691E33B70E7EDB28F898E8DD59D614CA5D826329F07F171FA92AD42FC19C851025362F6ADF
68,662,332 UART: Caliptra RT
68,663,027 UART: [state] CFI Enabled
69,012,812 UART: [rt] RT listening for mailbox commands...
69,014,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,044,504 UART: [rt]cmd =0x494e464f, len=4
69,048,985 >>> mbox cmd response data (312 bytes)
69,050,913 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
69,194,984 UART:
69,195,287 UART: Running Caliptra ROM ...
69,196,319 UART:
69,196,467 UART: [state] CFI Enabled
69,273,220 UART: [state] LifecycleState = Unprovisioned
69,275,149 UART: [state] DebugLocked = No
69,277,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,282,284 UART: [kat] SHA2-256
69,451,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,462,452 UART: [kat] ++
69,462,909 UART: [kat] sha1
69,474,280 UART: [kat] SHA2-256
69,476,976 UART: [kat] SHA2-384
69,482,752 UART: [kat] SHA2-512-ACC
69,485,099 UART: [kat] ECC-384
71,774,875 UART: [kat] HMAC-384Kdf
71,787,815 UART: [kat] LMS
72,978,151 UART: [kat] --
72,983,837 UART: [update-reset] ++
77,123,103 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,127,260 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
77,508,270 >>> mbox cmd response: success
77,510,103 UART: [update-reset] Copying MAN_2 To MAN_1
77,532,506 UART: [update-reset Success] --
77,537,008 UART: [state] Locking Datavault
77,541,022 UART: [state] Locking PCR0, PCR1 and PCR31
77,542,723 UART: [state] Locking ICCM
77,544,580 UART: [exit] Launching FMC @ 0x40000130
77,553,022 UART:
77,553,260 UART: Running Caliptra FMC ...
77,554,286 UART:
77,554,433 UART: [state] CFI Enabled
77,643,567 UART: [art] Extend RT PCRs Done
77,644,751 UART: [art] Lock RT PCRs Done
77,646,234 UART: [art] Populate DV Done
77,651,476 UART: [fht] FMC Alias Private Key: 7
77,653,183 UART: [art] Derive CDI
77,653,923 UART: [art] Store in in slot 0x4
77,712,261 UART: [art] Derive Key Pair
77,713,323 UART: [art] Store priv key in slot 0x5
81,006,011 UART: [art] Derive Key Pair - Done
81,019,006 UART: [art] Signing Cert with AUTHO
81,020,341 UART: RITY.KEYID = 7
83,307,351 UART: [art] Erasing AUTHORITY.KEYID = 7
83,308,861 UART: [art] PUB.X = 6A44CF520015C30678ADC1C2E5E1BC76810A444E64E3E8652ED0E2F0B5A5E0857ED921BB39B5439189395C6A8C56903F
83,316,058 UART: [art] PUB.Y = 00CD39C6A254C3EF4146FF40FF9731EA9A81BC13CD929F44A8F4AFAB8BBFA6D7FEA9106700B363A44E4FD64D0943ABF5
83,323,287 UART: [art] SIG.R = F249420B691797FD354106D025C04824857530C334A2E8EE52BA6F4A236BB189A38CF071A7DCED96DF1D04484FE79F93
83,330,679 UART: [art] SIG.S = 9CEEA9BB1495821933D1A3CD174D2C4A920BE144E22ADA03F4C0B1D2D4731625DB072908FD5046C14845E77ACC80F526
84,635,974 UART: Caliptra RT
84,636,677 UART: [state] CFI Enabled
84,965,217 UART: [rt] RT listening for mailbox commands...
84,967,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,996,629 UART: [rt]cmd =0x494e464f, len=4
85,000,959 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,804,812 ready_for_fw is high
3,805,226 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,871,454 >>> mbox cmd response: success
17,872,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,568,704 UART:
23,569,136 UART: Running Caliptra FMC ...
23,570,383 UART:
23,570,576 UART: [state] CFI Enabled
23,641,379 UART: [fht] FMC Alias Private Key: 7
25,979,570 UART: [art] Extend RT PCRs Done
25,980,803 UART: [art] Lock RT PCRs Done
25,982,512 UART: [art] Populate DV Done
25,988,026 UART: [fht] FMC Alias Private Key: 7
25,989,630 UART: [art] Derive CDI
25,990,447 UART: [art] Store in in slot 0x4
26,050,126 UART: [art] Derive Key Pair
26,051,171 UART: [art] Store priv key in slot 0x5
29,343,325 UART: [art] Derive Key Pair - Done
29,356,433 UART: [art] Signing Cert with AUTHO
29,357,736 UART: RITY.KEYID = 7
31,645,509 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,016 UART: [art] PUB.X = 6B88CE7A922B17A69F777904AC7DAD8040B329153329D71292E50D1342CF1361BAF73027E9513A125915E8E5F8E922FC
31,654,223 UART: [art] PUB.Y = 80D92DE6F0A0179A3C6FDAFFB600B81617E735A8F26C46D9C07AA6C9A00CCDF5C8C4A49C31D83996D84839F7F63D7D25
31,661,479 UART: [art] SIG.R = 4FDEF0B00532D88B4F6397E81B4A7F407A7A1CD560BE54311A05EE6A805F211FDF8E4B167C89BD8B0429352169AF3BEE
31,668,880 UART: [art] SIG.S = 73A0971F062FDC1B702C890C7CB86CB2405C3DD8ABA9E3FD691582F91B2976495E0493A8BFF933B77FD3ABBEF0AE67F7
32,974,223 UART: Caliptra RT
32,974,937 UART: [state] CFI Enabled
33,135,824 UART: [rt] RT listening for mailbox commands...
33,167,073 UART: [rt]cmd =0x494e464f, len=4
33,171,391 >>> mbox cmd response data (312 bytes)
35,227,346 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,952,270 >>> mbox cmd response: success
43,987,771 UART:
43,988,077 UART: Running Caliptra FMC ...
43,989,122 UART:
43,989,277 UART: [state] CFI Enabled
44,092,158 UART: [art] Extend RT PCRs Done
44,093,350 UART: [art] Lock RT PCRs Done
44,094,565 UART: [art] Populate DV Done
44,100,098 UART: [fht] FMC Alias Private Key: 7
44,101,691 UART: [art] Derive CDI
44,102,635 UART: [art] Store in in slot 0x4
44,161,380 UART: [art] Derive Key Pair
44,162,381 UART: [art] Store priv key in slot 0x5
47,454,817 UART: [art] Derive Key Pair - Done
47,467,761 UART: [art] Signing Cert with AUTHO
47,469,106 UART: RITY.KEYID = 7
49,756,229 UART: [art] Erasing AUTHORITY.KEYID = 7
49,757,763 UART: [art] PUB.X = C0BD3CFF78FAB2B56075E939522BD00BFE4FA981127543C250CFC457A8CBC1E266F9A165C80B5720540506C21F05788C
49,764,986 UART: [art] PUB.Y = EBE15792A6F5F205BB9FFC80DAC222E4CBE38AF68D0F235267F04EC9DC99EDB6776CEF006AD4823AD700839E9E611DA8
49,772,240 UART: [art] SIG.R = C1F5EF4C13F9EA5596127E2EC42FFB69458DBDFED09B0B62F5637D3B8130EA60D08142BD9E3CBA464BCBEC0B33556E16
49,779,650 UART: [art] SIG.S = DEF953DBA3F6D0DC6C9F96816D044CF839F86D6A3D0E7B680CE90CD3217851F33D4BF2000090EC1CE1840308D4AF90D8
51,084,458 UART: Caliptra RT
51,085,174 UART: [state] CFI Enabled
51,416,794 UART: [rt] RT listening for mailbox commands...
51,418,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,448,257 UART: [rt]cmd =0x494e464f, len=4
51,452,597 >>> mbox cmd response data (312 bytes)
53,506,375 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
62,241,999 >>> mbox cmd response: success
62,276,803 UART:
62,277,154 UART: Running Caliptra FMC ...
62,278,292 UART:
62,278,465 UART: [state] CFI Enabled
62,375,394 UART: [art] Extend RT PCRs Done
62,376,575 UART: [art] Lock RT PCRs Done
62,378,199 UART: [art] Populate DV Done
62,383,852 UART: [fht] FMC Alias Private Key: 7
62,385,545 UART: [art] Derive CDI
62,386,364 UART: [art] Store in in slot 0x4
62,444,670 UART: [art] Derive Key Pair
62,445,708 UART: [art] Store priv key in slot 0x5
65,738,579 UART: [art] Derive Key Pair - Done
65,751,850 UART: [art] Signing Cert with AUTHO
65,753,154 UART: RITY.KEYID = 7
68,040,515 UART: [art] Erasing AUTHORITY.KEYID = 7
68,042,028 UART: [art] PUB.X = 738789D6A85046A3D5586EF5BF041860067EFF4D83E7C1D021C792404D5CE8B0AEF2F08911DBB8C6B296FEED755A5BE2
68,049,259 UART: [art] PUB.Y = BA2B47AD6AA3D7997A1156874AA4CD2C1F5BA7B5B34145C6CFFEECF9587A9A83B6A57D34F76D848743327B2EBC84D674
68,056,514 UART: [art] SIG.R = 0B3580AB4EE2FFDA1BE46BB84935F304B566919C52CFADA2C38B918E7BFB0A2DB0F3422A5B6F65E115D3A09A0FB2FFF9
68,063,931 UART: [art] SIG.S = D57401CB5206EBB10797899D674619F41924179033DA6207A1F1A26C62ECD1529196524D9939FA6D75B5015862E534FF
69,368,944 UART: Caliptra RT
69,369,659 UART: [state] CFI Enabled
69,706,842 UART: [rt] RT listening for mailbox commands...
69,708,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,738,628 UART: [rt]cmd =0x494e464f, len=4
69,742,912 >>> mbox cmd response data (312 bytes)
69,744,780 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
78,475,529 >>> mbox cmd response: success
78,509,730 UART:
78,510,029 UART: Running Caliptra FMC ...
78,511,152 UART:
78,511,316 UART: [state] CFI Enabled
78,610,451 UART: [art] Extend RT PCRs Done
78,611,651 UART: [art] Lock RT PCRs Done
78,613,115 UART: [art] Populate DV Done
78,618,631 UART: [fht] FMC Alias Private Key: 7
78,620,273 UART: [art] Derive CDI
78,621,089 UART: [art] Store in in slot 0x4
78,679,274 UART: [art] Derive Key Pair
78,680,312 UART: [art] Store priv key in slot 0x5
81,973,143 UART: [art] Derive Key Pair - Done
81,985,819 UART: [art] Signing Cert with AUTHO
81,987,124 UART: RITY.KEYID = 7
84,274,883 UART: [art] Erasing AUTHORITY.KEYID = 7
84,276,388 UART: [art] PUB.X = C0BD3CFF78FAB2B56075E939522BD00BFE4FA981127543C250CFC457A8CBC1E266F9A165C80B5720540506C21F05788C
84,283,651 UART: [art] PUB.Y = EBE15792A6F5F205BB9FFC80DAC222E4CBE38AF68D0F235267F04EC9DC99EDB6776CEF006AD4823AD700839E9E611DA8
84,290,904 UART: [art] SIG.R = C1F5EF4C13F9EA5596127E2EC42FFB69458DBDFED09B0B62F5637D3B8130EA60D08142BD9E3CBA464BCBEC0B33556E16
84,298,306 UART: [art] SIG.S = DEF953DBA3F6D0DC6C9F96816D044CF839F86D6A3D0E7B680CE90CD3217851F33D4BF2000090EC1CE1840308D4AF90D8
85,603,347 UART: Caliptra RT
85,604,065 UART: [state] CFI Enabled
85,939,397 UART: [rt] RT listening for mailbox commands...
85,941,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,970,810 UART: [rt]cmd =0x494e464f, len=4
85,975,017 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.41s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,655,905 UART: [ldev] SUBJECT.KEYID = 5
7,657,170 UART: [ldev] AUTHORITY.KEYID = 7
7,658,393 UART: [ldev] FE.KEYID = 1
7,671,417 UART: [ldev] Erasing FE.KEYID = 1
10,961,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,019 UART: [ldev] --
13,322,492 UART: [fwproc] Waiting for Commands...
13,324,253 UART: [fwproc] Received command 0x46574c44
13,326,429 UART: [fwproc] Received Image of size 113760 bytes
17,366,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,554 >>> mbox cmd response: success
17,828,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,831,280 UART: [afmc] ++
17,831,873 UART: [afmc] CDI.KEYID = 6
17,832,786 UART: [afmc] SUBJECT.KEYID = 7
17,834,052 UART: [afmc] AUTHORITY.KEYID = 5
21,151,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,617 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,462,150 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,476,962 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,491,453 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,512,886 UART: [afmc] --
23,515,989 UART: [cold-reset] --
23,520,437 UART: [state] Locking Datavault
23,525,044 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,772 UART: [state] Locking ICCM
23,528,759 UART: [exit] Launching FMC @ 0x40000130
23,537,103 UART:
23,537,336 UART: Running Caliptra FMC ...
23,538,435 UART:
23,538,591 UART: [state] CFI Enabled
23,546,577 UART: [fht] FMC Alias Private Key: 7
25,877,622 UART: [art] Extend RT PCRs Done
25,878,840 UART: [art] Lock RT PCRs Done
25,880,380 UART: [art] Populate DV Done
25,885,836 UART: [fht] FMC Alias Private Key: 7
25,887,420 UART: [art] Derive CDI
25,888,153 UART: [art] Store in in slot 0x4
25,930,852 UART: [art] Derive Key Pair
25,931,891 UART: [art] Store priv key in slot 0x5
29,173,339 UART: [art] Derive Key Pair - Done
29,186,547 UART: [art] Signing Cert with AUTHO
29,187,845 UART: RITY.KEYID = 7
31,467,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,883 UART: [art] PUB.X = 2BA6B1086DF48BB854EE2AD1D2C316EDFA773674019EB8618AC769E5BB32E5935273018169CAB63F9BA01817F8A64D2C
31,476,158 UART: [art] PUB.Y = 24B03065054E0810DD7415C363C614E77E6348B1AF7E5B982342731D509CB206F903AC32CC60601D485C200FF3A39343
31,483,353 UART: [art] SIG.R = C8ECF64D4A3A501CB9D17937843B38EB3B437C69134AAB7D9FFD5EC4005C07D1F98FD9B404F0ECDCF197272E77D72E46
31,490,709 UART: [art] SIG.S = EAF62E91CCFD6DD113E1993331F8D8F4564E25D2A94D1E5CF1C05A11083831D3B82C1FE8C8997F03F0641EFDDF571C04
32,796,355 UART: Caliptra RT
32,797,058 UART: [state] CFI Enabled
32,914,631 UART: [rt] RT listening for mailbox commands...
32,946,153 UART: [rt]cmd =0x494e464f, len=4
32,950,542 >>> mbox cmd response data (312 bytes)
35,007,672 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,152,320 UART:
35,152,691 UART: Running Caliptra ROM ...
35,153,786 UART:
35,153,942 UART: [state] CFI Enabled
35,166,106 UART: [state] LifecycleState = Unprovisioned
35,168,003 UART: [state] DebugLocked = No
35,170,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,175,640 UART: [kat] SHA2-256
35,345,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,355,898 UART: [kat] ++
35,356,437 UART: [kat] sha1
35,367,517 UART: [kat] SHA2-256
35,370,190 UART: [kat] SHA2-384
35,376,556 UART: [kat] SHA2-512-ACC
35,378,911 UART: [kat] ECC-384
37,663,892 UART: [kat] HMAC-384Kdf
37,675,347 UART: [kat] LMS
38,865,386 UART: [kat] --
38,868,322 UART: [update-reset] ++
43,003,972 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,008,085 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
43,389,084 >>> mbox cmd response: success
43,389,766 UART: [update-reset] Copying MAN_2 To MAN_1
43,412,217 UART: [update-reset Success] --
43,416,718 UART: [state] Locking Datavault
43,420,074 UART: [state] Locking PCR0, PCR1 and PCR31
43,421,834 UART: [state] Locking ICCM
43,422,927 UART: [exit] Launching FMC @ 0x40000130
43,431,383 UART:
43,431,625 UART: Running Caliptra FMC ...
43,432,723 UART:
43,432,878 UART: [state] CFI Enabled
43,477,054 UART: [art] Extend RT PCRs Done
43,478,239 UART: [art] Lock RT PCRs Done
43,479,640 UART: [art] Populate DV Done
43,485,103 UART: [fht] FMC Alias Private Key: 7
43,486,807 UART: [art] Derive CDI
43,487,622 UART: [art] Store in in slot 0x4
43,530,277 UART: [art] Derive Key Pair
43,531,318 UART: [art] Store priv key in slot 0x5
46,773,286 UART: [art] Derive Key Pair - Done
46,786,123 UART: [art] Signing Cert with AUTHO
46,787,431 UART: RITY.KEYID = 7
49,067,065 UART: [art] Erasing AUTHORITY.KEYID = 7
49,068,584 UART: [art] PUB.X = 165C880E1B136D76BA976F847664EF96030FCFC0D54A099908AA4C7A92168620043A7F371ED9AB460765C4A42F490F09
49,075,809 UART: [art] PUB.Y = 3FE7F24D5208DD96121588FD39C3CEB15825002D4BC7675AABB575D5B443FEEC12BE988BAEDD394F98B303419BCBD099
49,083,068 UART: [art] SIG.R = 2BDD2760567AFB5A01CD4F7EF8B35B345E73BD9C0EDE34A9EC996A60BD08C1B5F89175C837A3CEE1FDB85AA15A99F695
49,090,445 UART: [art] SIG.S = B43AC97C394510CD3D05CAFE4CF283A82F17196EC1B42CCFD77E08CA7F065E4A5680481B98C9FEB6DC1ADAB28013BF7A
50,395,856 UART: Caliptra RT
50,396,575 UART: [state] CFI Enabled
50,683,719 UART: [rt] RT listening for mailbox commands...
50,685,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,715,311 UART: [rt]cmd =0x494e464f, len=4
50,719,646 >>> mbox cmd response data (312 bytes)
52,772,884 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
52,917,456 UART:
52,917,824 UART: Running Caliptra ROM ...
52,918,963 UART:
52,919,128 UART: [state] CFI Enabled
52,931,022 UART: [state] LifecycleState = Unprovisioned
52,932,918 UART: [state] DebugLocked = No
52,935,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,939,581 UART: [kat] SHA2-256
53,109,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,119,857 UART: [kat] ++
53,120,395 UART: [kat] sha1
53,131,073 UART: [kat] SHA2-256
53,133,799 UART: [kat] SHA2-384
53,139,033 UART: [kat] SHA2-512-ACC
53,141,392 UART: [kat] ECC-384
55,427,106 UART: [kat] HMAC-384Kdf
55,437,481 UART: [kat] LMS
56,627,529 UART: [kat] --
56,632,028 UART: [update-reset] ++
60,763,444 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,767,762 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
61,148,791 >>> mbox cmd response: success
61,150,012 UART: [update-reset] Copying MAN_2 To MAN_1
61,172,407 UART: [update-reset Success] --
61,176,262 UART: [state] Locking Datavault
61,180,972 UART: [state] Locking PCR0, PCR1 and PCR31
61,182,727 UART: [state] Locking ICCM
61,184,931 UART: [exit] Launching FMC @ 0x40000130
61,193,380 UART:
61,193,620 UART: Running Caliptra FMC ...
61,194,721 UART:
61,194,878 UART: [state] CFI Enabled
61,239,019 UART: [art] Extend RT PCRs Done
61,240,206 UART: [art] Lock RT PCRs Done
61,241,659 UART: [art] Populate DV Done
61,247,115 UART: [fht] FMC Alias Private Key: 7
61,248,752 UART: [art] Derive CDI
61,249,561 UART: [art] Store in in slot 0x4
61,291,700 UART: [art] Derive Key Pair
61,292,737 UART: [art] Store priv key in slot 0x5
64,534,806 UART: [art] Derive Key Pair - Done
64,547,665 UART: [art] Signing Cert with AUTHO
64,548,967 UART: RITY.KEYID = 7
66,828,514 UART: [art] Erasing AUTHORITY.KEYID = 7
66,830,037 UART: [art] PUB.X = C2A85808E938534E4246B40731BC7622A5467D7B6CC7A55853A5E15974CEA9A124AD68A0FFB6D5A7E673CA5AD8A12F38
66,837,264 UART: [art] PUB.Y = B07FCF69638A63A311899E06436810304327E0785EA869C54C7CE5C4D5723F7FFDE7B636DA82D1D3D82F8BD7C1ADDC91
66,844,526 UART: [art] SIG.R = 16566E51EEC79E12EAD9358E80D58A4D9DBF85625F5E5A8BB0D9523128773AFBEE9AE1EC1D6D610E06ED2CC76B62087D
66,851,887 UART: [art] SIG.S = 937B1F89C3C644C7547B2AB2207D13A90A2DEF0D046484D38AD9B0AC330F86B5B9E3566D305D98CDBF82C1C1FFBBD1F9
68,156,857 UART: Caliptra RT
68,157,563 UART: [state] CFI Enabled
68,445,083 UART: [rt] RT listening for mailbox commands...
68,446,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,476,669 UART: [rt]cmd =0x494e464f, len=4
68,480,790 >>> mbox cmd response data (312 bytes)
68,482,828 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
68,626,639 UART:
68,626,936 UART: Running Caliptra ROM ...
68,628,046 UART:
68,628,261 UART: [state] CFI Enabled
68,639,774 UART: [state] LifecycleState = Unprovisioned
68,641,815 UART: [state] DebugLocked = No
68,644,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,649,568 UART: [kat] SHA2-256
68,819,294 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,829,804 UART: [kat] ++
68,830,341 UART: [kat] sha1
68,840,963 UART: [kat] SHA2-256
68,843,696 UART: [kat] SHA2-384
68,849,023 UART: [kat] SHA2-512-ACC
68,851,423 UART: [kat] ECC-384
71,135,200 UART: [kat] HMAC-384Kdf
71,147,209 UART: [kat] LMS
72,337,281 UART: [kat] --
72,341,330 UART: [update-reset] ++
76,478,921 UART: [update-reset] Image verified using Vendor ECC Key Index 0
76,482,721 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
76,863,675 >>> mbox cmd response: success
76,864,512 UART: [update-reset] Copying MAN_2 To MAN_1
76,886,915 UART: [update-reset Success] --
76,890,207 UART: [state] Locking Datavault
76,893,541 UART: [state] Locking PCR0, PCR1 and PCR31
76,895,298 UART: [state] Locking ICCM
76,896,796 UART: [exit] Launching FMC @ 0x40000130
76,905,196 UART:
76,905,432 UART: Running Caliptra FMC ...
76,906,530 UART:
76,906,683 UART: [state] CFI Enabled
76,951,125 UART: [art] Extend RT PCRs Done
76,952,276 UART: [art] Lock RT PCRs Done
76,953,726 UART: [art] Populate DV Done
76,959,021 UART: [fht] FMC Alias Private Key: 7
76,960,776 UART: [art] Derive CDI
76,961,903 UART: [art] Store in in slot 0x4
77,004,136 UART: [art] Derive Key Pair
77,005,143 UART: [art] Store priv key in slot 0x5
80,247,359 UART: [art] Derive Key Pair - Done
80,260,189 UART: [art] Signing Cert with AUTHO
80,261,597 UART: RITY.KEYID = 7
82,540,417 UART: [art] Erasing AUTHORITY.KEYID = 7
82,541,924 UART: [art] PUB.X = 165C880E1B136D76BA976F847664EF96030FCFC0D54A099908AA4C7A92168620043A7F371ED9AB460765C4A42F490F09
82,549,199 UART: [art] PUB.Y = 3FE7F24D5208DD96121588FD39C3CEB15825002D4BC7675AABB575D5B443FEEC12BE988BAEDD394F98B303419BCBD099
82,556,448 UART: [art] SIG.R = 2BDD2760567AFB5A01CD4F7EF8B35B345E73BD9C0EDE34A9EC996A60BD08C1B5F89175C837A3CEE1FDB85AA15A99F695
82,563,905 UART: [art] SIG.S = B43AC97C394510CD3D05CAFE4CF283A82F17196EC1B42CCFD77E08CA7F065E4A5680481B98C9FEB6DC1ADAB28013BF7A
83,869,223 UART: Caliptra RT
83,869,941 UART: [state] CFI Enabled
84,159,949 UART: [rt] RT listening for mailbox commands...
84,161,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,191,406 UART: [rt]cmd =0x494e464f, len=4
84,195,523 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
4,127,885 ready_for_fw is high
4,128,394 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,968 >>> mbox cmd response: success
18,064,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,707,954 UART:
23,708,364 UART: Running Caliptra FMC ...
23,709,471 UART:
23,709,626 UART: [state] CFI Enabled
23,717,442 UART: [fht] FMC Alias Private Key: 7
26,048,008 UART: [art] Extend RT PCRs Done
26,049,244 UART: [art] Lock RT PCRs Done
26,051,005 UART: [art] Populate DV Done
26,056,529 UART: [fht] FMC Alias Private Key: 7
26,058,019 UART: [art] Derive CDI
26,058,756 UART: [art] Store in in slot 0x4
26,101,353 UART: [art] Derive Key Pair
26,102,387 UART: [art] Store priv key in slot 0x5
29,344,890 UART: [art] Derive Key Pair - Done
29,358,264 UART: [art] Signing Cert with AUTHO
29,359,572 UART: RITY.KEYID = 7
31,639,101 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,628 UART: [art] PUB.X = 2D95B02BCE267EE5208981B01073DE66544DBA5BE4272F8DF5178C9456C7B2F475E538E3D2DE84BB17DCEECEB66AD2AD
31,647,866 UART: [art] PUB.Y = 5C7F0995F20F7FF1A63F064E747F2C000228A73E1AF06275C4C673B80FC8233376E5107E556CFD0C0CFEDC28B86FEDE1
31,655,138 UART: [art] SIG.R = 45F58BBCD94149AC398858059341E8C70CC403F420187E9780634E2D1769CDAB14E7F2DE98D18181D8DB64D6499B2231
31,662,511 UART: [art] SIG.S = C669534B99E55C5FE1B738910B279E1CEDEED6FC7BE85E04F85621F2CA20A6924672650A8AF292A5F055BD18E5886D94
32,968,000 UART: Caliptra RT
32,968,717 UART: [state] CFI Enabled
33,085,829 UART: [rt] RT listening for mailbox commands...
33,117,340 UART: [rt]cmd =0x494e464f, len=4
33,121,654 >>> mbox cmd response data (312 bytes)
35,176,491 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,823,713 >>> mbox cmd response: success
43,859,117 UART:
43,859,408 UART: Running Caliptra FMC ...
43,860,443 UART:
43,860,587 UART: [state] CFI Enabled
43,904,607 UART: [art] Extend RT PCRs Done
43,905,799 UART: [art] Lock RT PCRs Done
43,907,325 UART: [art] Populate DV Done
43,912,953 UART: [fht] FMC Alias Private Key: 7
43,914,434 UART: [art] Derive CDI
43,915,160 UART: [art] Store in in slot 0x4
43,958,229 UART: [art] Derive Key Pair
43,959,227 UART: [art] Store priv key in slot 0x5
47,202,012 UART: [art] Derive Key Pair - Done
47,215,089 UART: [art] Signing Cert with AUTHO
47,216,414 UART: RITY.KEYID = 7
49,495,748 UART: [art] Erasing AUTHORITY.KEYID = 7
49,497,260 UART: [art] PUB.X = F4970FF7623CE2933EAC0966AEC465C6DECA3BA377A323FE5722EAE99CE04CA53D20BD1F435D148814955B2B41C5DF84
49,504,556 UART: [art] PUB.Y = 1E683B1D5E93EAC07403E482DB948C94A84307E5454E557E9F58876A970B4AB7A6762C3D61CF80FB545E4D0950638815
49,511,739 UART: [art] SIG.R = 8E4115E8CE3216F1EEB4EF5AE9F63CA26DC111C5E803EC583FC5ECB926A084965236829CB8E5EE58772EB888310ABC19
49,519,156 UART: [art] SIG.S = 2DA4E3057DADE8FCEDBDC73BFE6A96DADEC9DDEF1DBC86162D955DECBA38251A93CE5D9C00552AAC9FC7FDB6C4477DD0
50,824,765 UART: Caliptra RT
50,825,460 UART: [state] CFI Enabled
51,115,236 UART: [rt] RT listening for mailbox commands...
51,117,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,146,709 UART: [rt]cmd =0x494e464f, len=4
51,151,201 >>> mbox cmd response data (312 bytes)
53,204,416 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
61,859,965 >>> mbox cmd response: success
61,895,284 UART:
61,895,574 UART: Running Caliptra FMC ...
61,896,689 UART:
61,896,851 UART: [state] CFI Enabled
61,940,988 UART: [art] Extend RT PCRs Done
61,942,200 UART: [art] Lock RT PCRs Done
61,943,610 UART: [art] Populate DV Done
61,949,341 UART: [fht] FMC Alias Private Key: 7
61,951,038 UART: [art] Derive CDI
61,951,776 UART: [art] Store in in slot 0x4
61,994,199 UART: [art] Derive Key Pair
61,995,241 UART: [art] Store priv key in slot 0x5
65,236,771 UART: [art] Derive Key Pair - Done
65,249,823 UART: [art] Signing Cert with AUTHO
65,251,121 UART: RITY.KEYID = 7
67,530,201 UART: [art] Erasing AUTHORITY.KEYID = 7
67,531,706 UART: [art] PUB.X = 6A79C0EC2A9C23BC388A938C6A301DB2B6A9C15319FD75AF92246180FBBC0906B8032E79D14846E1C46180ECE2F23BC0
67,538,940 UART: [art] PUB.Y = EB5DBE2211DA7A429AD0EC463443AD96477583E0CAEBE7E5AC360C094F94C4014172FE4752A136F308256AFEE8EB9697
67,546,167 UART: [art] SIG.R = B7513C979BFD4160319607E911635D4244B8E1FD10131E3369892CDD6AED6D08971916692663E6FD397E167C77F32149
67,553,546 UART: [art] SIG.S = 8122C5B8B682662C4DAFB736B1B522A7EA6A88FA9D3F3455E63ECEBC91D5E748D4B5DC8071A431A7DACEA15941A27A75
68,858,774 UART: Caliptra RT
68,859,489 UART: [state] CFI Enabled
69,145,921 UART: [rt] RT listening for mailbox commands...
69,147,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,177,549 UART: [rt]cmd =0x494e464f, len=4
69,182,110 >>> mbox cmd response data (312 bytes)
69,184,029 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
77,829,240 >>> mbox cmd response: success
77,862,816 UART:
77,863,077 UART: Running Caliptra FMC ...
77,864,189 UART:
77,864,364 UART: [state] CFI Enabled
77,907,956 UART: [art] Extend RT PCRs Done
77,909,137 UART: [art] Lock RT PCRs Done
77,910,536 UART: [art] Populate DV Done
77,916,208 UART: [fht] FMC Alias Private Key: 7
77,917,900 UART: [art] Derive CDI
77,918,704 UART: [art] Store in in slot 0x4
77,961,349 UART: [art] Derive Key Pair
77,962,335 UART: [art] Store priv key in slot 0x5
81,204,236 UART: [art] Derive Key Pair - Done
81,217,341 UART: [art] Signing Cert with AUTHO
81,218,649 UART: RITY.KEYID = 7
83,498,241 UART: [art] Erasing AUTHORITY.KEYID = 7
83,499,741 UART: [art] PUB.X = F4970FF7623CE2933EAC0966AEC465C6DECA3BA377A323FE5722EAE99CE04CA53D20BD1F435D148814955B2B41C5DF84
83,507,047 UART: [art] PUB.Y = 1E683B1D5E93EAC07403E482DB948C94A84307E5454E557E9F58876A970B4AB7A6762C3D61CF80FB545E4D0950638815
83,514,228 UART: [art] SIG.R = 8E4115E8CE3216F1EEB4EF5AE9F63CA26DC111C5E803EC583FC5ECB926A084965236829CB8E5EE58772EB888310ABC19
83,521,641 UART: [art] SIG.S = 2DA4E3057DADE8FCEDBDC73BFE6A96DADEC9DDEF1DBC86162D955DECBA38251A93CE5D9C00552AAC9FC7FDB6C4477DD0
84,826,775 UART: Caliptra RT
84,827,488 UART: [state] CFI Enabled
85,113,915 UART: [rt] RT listening for mailbox commands...
85,115,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,145,304 UART: [rt]cmd =0x494e464f, len=4
85,149,633 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.37s
Truncated 1634 bytes from beginning
,025,452 UART: [idev] Sha1 KeyId Algorithm
6,048,209 UART: [idev] --
6,052,413 UART: [ldev] ++
6,052,983 UART: [ldev] CDI.KEYID = 6
6,053,865 UART: [ldev] SUBJECT.KEYID = 5
6,055,079 UART: [ldev] AUTHORITY.KEYID = 7
6,056,329 UART: [ldev] FE.KEYID = 1
6,101,214 UART: [ldev] Erasing FE.KEYID = 1
8,600,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,396,897 UART: [ldev] --
10,402,325 UART: [fwproc] Wait for Commands...
10,405,232 UART: [fwproc] Recv command 0x46574c44
10,407,346 UART: [fwproc] Recv'd Img size: 114084 bytes
13,804,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,257,039 >>> mbox cmd response: success
14,258,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,260,442 UART: [afmc] ++
14,261,034 UART: [afmc] CDI.KEYID = 6
14,261,917 UART: [afmc] SUBJECT.KEYID = 7
14,263,024 UART: [afmc] AUTHORITY.KEYID = 5
16,804,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,365 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,561,372 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,577,450 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,593,388 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,615,214 UART: [afmc] --
18,619,508 UART: [cold-reset] --
18,624,104 UART: [state] Locking Datavault
18,630,061 UART: [state] Locking PCR0, PCR1 and PCR31
18,631,706 UART: [state] Locking ICCM
18,634,313 UART: [exit] Launching FMC @ 0x40000130
18,642,722 UART:
18,642,952 UART: Running Caliptra FMC ...
18,644,045 UART:
18,644,206 UART: [state] CFI Enabled
18,701,451 UART: [fht] FMC Alias Private Key: 7
20,465,098 UART: [art] Extend RT PCRs Done
20,466,329 UART: [art] Lock RT PCRs Done
20,468,100 UART: [art] Populate DV Done
20,473,570 UART: [fht] FMC Alias Private Key: 7
20,475,215 UART: [art] Derive CDI
20,475,946 UART: [art] Store in in slot 0x4
20,533,925 UART: [art] Derive Key Pair
20,534,917 UART: [art] Store priv key in slot 0x5
22,997,916 UART: [art] Derive Key Pair - Done
23,011,196 UART: [art] Signing Cert with AUTHO
23,012,502 UART: RITY.KEYID = 7
24,723,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,207 UART: [art] PUB.X = E7F4ADFC50B821EED51D96418E9B5D4E7F7E1BC9FADC2493F5BA94E8A8C8DF77EFC02A69BA8644BD281D04814F8A9CAC
24,732,468 UART: [art] PUB.Y = 74BE3D613C8FCE1F900BCEBB554D38BE690179319E2BACA3E4861E4A300BB8BFDF318DC0B18798C4FC5FCD1C81ABC5EE
24,739,789 UART: [art] SIG.R = 8E6B64959A71671A1F91504E9CEAD215E3A0EC7D3F3FAAAF22F11EC49763A6F43FB1368DCEB2E7FB6F59BA99C32DEF51
24,747,200 UART: [art] SIG.S = BFE51FF79A6F4DE20CD12614B5F086B53CE5B02D74B8A8269A38FF8013C12A0C0900446B2E37E3DC9A9E27001792513B
25,725,946 UART: Caliptra RT
25,726,654 UART: [state] CFI Enabled
25,891,689 UART: [rt] RT listening for mailbox commands...
25,923,139 UART: [rt]cmd =0x494e464f, len=4
25,927,404 >>> mbox cmd response data (312 bytes)
27,983,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,128,930 UART:
28,129,337 UART: Running Caliptra ROM ...
28,130,382 UART:
28,130,544 UART: [state] CFI Enabled
28,197,815 UART: [state] LifecycleState = Unprovisioned
28,199,709 UART: [state] DebugLocked = No
28,201,096 UART: [state] WD Timer not started. Device not locked for debugging
28,204,357 UART: [kat] SHA2-256
28,383,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,395,054 UART: [kat] ++
28,395,510 UART: [kat] sha1
28,407,635 UART: [kat] SHA2-256
28,410,636 UART: [kat] SHA2-384
28,417,369 UART: [kat] SHA2-512-ACC
28,420,334 UART: [kat] ECC-384
30,881,162 UART: [kat] HMAC-384Kdf
30,905,601 UART: [kat] LMS
31,435,060 UART: [kat] --
31,439,588 UART: [update-reset] ++
34,859,213 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,862,161 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,244,179 >>> mbox cmd response: success
35,244,945 UART: [update-reset] Copying MAN_2 To MAN_1
35,267,226 UART: [update-reset Success] --
35,272,843 UART: [state] Locking Datavault
35,276,310 UART: [state] Locking PCR0, PCR1 and PCR31
35,278,012 UART: [state] Locking ICCM
35,280,407 UART: [exit] Launching FMC @ 0x40000130
35,288,851 UART:
35,289,079 UART: Running Caliptra FMC ...
35,290,198 UART:
35,290,354 UART: [state] CFI Enabled
35,397,173 UART: [art] Extend RT PCRs Done
35,398,354 UART: [art] Lock RT PCRs Done
35,399,667 UART: [art] Populate DV Done
35,404,907 UART: [fht] FMC Alias Private Key: 7
35,406,597 UART: [art] Derive CDI
35,407,404 UART: [art] Store in in slot 0x4
35,466,387 UART: [art] Derive Key Pair
35,467,424 UART: [art] Store priv key in slot 0x5
37,930,223 UART: [art] Derive Key Pair - Done
37,942,900 UART: [art] Signing Cert with AUTHO
37,944,203 UART: RITY.KEYID = 7
39,655,804 UART: [art] Erasing AUTHORITY.KEYID = 7
39,657,313 UART: [art] PUB.X = 3542F30A71FE34DAA23904DE99E699E41042D32DB2B19B47F79A2860F92131D9D665817245A082FFA526B1144C1A3306
39,664,563 UART: [art] PUB.Y = 478C8FECBEB412A8C8F98E891FE7742291090E6B251B494B13B4FE4860B7EB464CA6D885495990DDC173A36EC9D1B2F0
39,671,807 UART: [art] SIG.R = 4FA7C0AB9508FDB8170D6DDA7E4A672A8CF1754769A102A5CE467C5E21E1C948C187111C7819C309351DEF60C0A25F48
39,679,194 UART: [art] SIG.S = D51C0686560CB9BFF0F359D1A859A0208C89A675C887C6C071E63C6C488ED5DD68114F614FC517A43F23B496051065CD
40,658,110 UART: Caliptra RT
40,658,827 UART: [state] CFI Enabled
40,995,605 UART: [rt] RT listening for mailbox commands...
40,997,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,027,236 UART: [rt]cmd =0x494e464f, len=4
41,031,601 >>> mbox cmd response data (312 bytes)
43,086,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
43,231,085 UART:
43,231,456 UART: Running Caliptra ROM ...
43,232,510 UART:
43,232,682 UART: [state] CFI Enabled
43,294,876 UART: [state] LifecycleState = Unprovisioned
43,296,762 UART: [state] DebugLocked = No
43,298,332 UART: [state] WD Timer not started. Device not locked for debugging
43,302,511 UART: [kat] SHA2-256
43,481,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,493,216 UART: [kat] ++
43,493,669 UART: [kat] sha1
43,504,979 UART: [kat] SHA2-256
43,508,030 UART: [kat] SHA2-384
43,514,772 UART: [kat] SHA2-512-ACC
43,517,709 UART: [kat] ECC-384
45,960,607 UART: [kat] HMAC-384Kdf
45,984,145 UART: [kat] LMS
46,513,627 UART: [kat] --
46,518,422 UART: [update-reset] ++
49,941,398 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,944,033 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
50,326,102 >>> mbox cmd response: success
50,327,581 UART: [update-reset] Copying MAN_2 To MAN_1
50,349,860 UART: [update-reset Success] --
50,354,578 UART: [state] Locking Datavault
50,357,831 UART: [state] Locking PCR0, PCR1 and PCR31
50,359,476 UART: [state] Locking ICCM
50,361,653 UART: [exit] Launching FMC @ 0x40000130
50,370,100 UART:
50,370,328 UART: Running Caliptra FMC ...
50,371,421 UART:
50,371,573 UART: [state] CFI Enabled
50,474,896 UART: [art] Extend RT PCRs Done
50,476,085 UART: [art] Lock RT PCRs Done
50,477,407 UART: [art] Populate DV Done
50,482,884 UART: [fht] FMC Alias Private Key: 7
50,484,363 UART: [art] Derive CDI
50,485,122 UART: [art] Store in in slot 0x4
50,543,747 UART: [art] Derive Key Pair
50,544,785 UART: [art] Store priv key in slot 0x5
53,007,481 UART: [art] Derive Key Pair - Done
53,020,714 UART: [art] Signing Cert with AUTHO
53,022,053 UART: RITY.KEYID = 7
54,733,707 UART: [art] Erasing AUTHORITY.KEYID = 7
54,735,225 UART: [art] PUB.X = E226C9A6A2E30BAA387A2CA14C34D9C286A0BF96D5BFB27B6F6DE5B22C779EE1D157366C715DD76D3554886266BF8705
54,742,495 UART: [art] PUB.Y = F5B8A65A7E3DDE367BAE948BCFF0468C684911C55A55E1265B28B58E21877C56933252EA94349DCD4EF4E99B4F7F26E4
54,749,761 UART: [art] SIG.R = 7644C28DA0CCFC17C684F3B3FD335D857DE41641ADC84E3F811EE761FD50CA8752DDAA650EFEF14BD61E9C2A3AB1C4AB
54,757,167 UART: [art] SIG.S = 422A35FFC9C14B83E1DB0094E03627C4E13017E14D5511597DF7808E66ABACAB156CFB9788B863996D53098AC54AFBC0
55,736,073 UART: Caliptra RT
55,736,785 UART: [state] CFI Enabled
56,071,957 UART: [rt] RT listening for mailbox commands...
56,073,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,103,565 UART: [rt]cmd =0x494e464f, len=4
56,108,011 >>> mbox cmd response data (312 bytes)
56,109,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
56,254,361 UART:
56,254,672 UART: Running Caliptra ROM ...
56,255,706 UART:
56,255,855 UART: [state] CFI Enabled
56,333,631 UART: [state] LifecycleState = Unprovisioned
56,335,505 UART: [state] DebugLocked = No
56,337,346 UART: [state] WD Timer not started. Device not locked for debugging
56,340,656 UART: [kat] SHA2-256
56,519,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,531,368 UART: [kat] ++
56,531,819 UART: [kat] sha1
56,541,518 UART: [kat] SHA2-256
56,544,593 UART: [kat] SHA2-384
56,551,344 UART: [kat] SHA2-512-ACC
56,554,288 UART: [kat] ECC-384
59,018,836 UART: [kat] HMAC-384Kdf
59,039,919 UART: [kat] LMS
59,569,372 UART: [kat] --
59,574,066 UART: [update-reset] ++
62,997,471 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,000,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
63,382,625 >>> mbox cmd response: success
63,383,503 UART: [update-reset] Copying MAN_2 To MAN_1
63,405,834 UART: [update-reset Success] --
63,410,550 UART: [state] Locking Datavault
63,413,849 UART: [state] Locking PCR0, PCR1 and PCR31
63,415,487 UART: [state] Locking ICCM
63,417,309 UART: [exit] Launching FMC @ 0x40000130
63,425,726 UART:
63,425,977 UART: Running Caliptra FMC ...
63,427,077 UART:
63,427,237 UART: [state] CFI Enabled
63,528,917 UART: [art] Extend RT PCRs Done
63,530,095 UART: [art] Lock RT PCRs Done
63,531,436 UART: [art] Populate DV Done
63,536,840 UART: [fht] FMC Alias Private Key: 7
63,538,313 UART: [art] Derive CDI
63,539,073 UART: [art] Store in in slot 0x4
63,598,213 UART: [art] Derive Key Pair
63,599,251 UART: [art] Store priv key in slot 0x5
66,062,112 UART: [art] Derive Key Pair - Done
66,075,069 UART: [art] Signing Cert with AUTHO
66,076,373 UART: RITY.KEYID = 7
67,787,526 UART: [art] Erasing AUTHORITY.KEYID = 7
67,789,051 UART: [art] PUB.X = 3542F30A71FE34DAA23904DE99E699E41042D32DB2B19B47F79A2860F92131D9D665817245A082FFA526B1144C1A3306
67,796,235 UART: [art] PUB.Y = 478C8FECBEB412A8C8F98E891FE7742291090E6B251B494B13B4FE4860B7EB464CA6D885495990DDC173A36EC9D1B2F0
67,803,516 UART: [art] SIG.R = 4FA7C0AB9508FDB8170D6DDA7E4A672A8CF1754769A102A5CE467C5E21E1C948C187111C7819C309351DEF60C0A25F48
67,810,879 UART: [art] SIG.S = D51C0686560CB9BFF0F359D1A859A0208C89A675C887C6C071E63C6C488ED5DD68114F614FC517A43F23B496051065CD
68,790,183 UART: Caliptra RT
68,790,878 UART: [state] CFI Enabled
69,125,132 UART: [rt] RT listening for mailbox commands...
69,126,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,156,720 UART: [rt]cmd =0x494e464f, len=4
69,161,042 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
3,380,557 ready_for_fw is high
3,380,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,885 >>> mbox cmd response: success
14,058,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,353,076 UART:
18,353,473 UART: Running Caliptra FMC ...
18,354,576 UART:
18,354,726 UART: [state] CFI Enabled
18,420,198 UART: [fht] FMC Alias Private Key: 7
20,183,670 UART: [art] Extend RT PCRs Done
20,184,893 UART: [art] Lock RT PCRs Done
20,186,708 UART: [art] Populate DV Done
20,192,007 UART: [fht] FMC Alias Private Key: 7
20,193,655 UART: [art] Derive CDI
20,194,389 UART: [art] Store in in slot 0x4
20,252,973 UART: [art] Derive Key Pair
20,254,012 UART: [art] Store priv key in slot 0x5
22,716,277 UART: [art] Derive Key Pair - Done
22,729,163 UART: [art] Signing Cert with AUTHO
22,730,466 UART: RITY.KEYID = 7
24,442,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,443,630 UART: [art] PUB.X = 5C9A04E9D0B69A769EDAA8068307D488737DD697ED129F034ECE1395E7A06AB70356674101DBDED0A8267201C3CF640A
24,450,905 UART: [art] PUB.Y = BE36657493130FD09DF3FC42FA8F7D0A6C530ADA38678069A339551A01418334B2519082A6FC12D8E52A8C0A85F9FF0B
24,458,130 UART: [art] SIG.R = C4790E133FD589CA4B5C2DCE31A5C5AA2BE1C22EB8010B0454C51FC7DE9A37281B973334E6B1217E7B5B492F479B414B
24,465,582 UART: [art] SIG.S = 073209E83D3AF16FBFC8C9D9986DBA916FC5B0CE9FDE90C12C5BDEDCCDC8486FC0E9190B98AE22CEC2AA1314A0F9BD39
25,443,811 UART: Caliptra RT
25,444,512 UART: [state] CFI Enabled
25,610,951 UART: [rt] RT listening for mailbox commands...
25,642,219 UART: [rt]cmd =0x494e464f, len=4
25,646,608 >>> mbox cmd response data (312 bytes)
27,703,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,836,987 >>> mbox cmd response: success
34,872,290 UART:
34,872,627 UART: Running Caliptra FMC ...
34,873,690 UART:
34,873,842 UART: [state] CFI Enabled
34,967,596 UART: [art] Extend RT PCRs Done
34,968,790 UART: [art] Lock RT PCRs Done
34,970,318 UART: [art] Populate DV Done
34,975,999 UART: [fht] FMC Alias Private Key: 7
34,977,651 UART: [art] Derive CDI
34,978,384 UART: [art] Store in in slot 0x4
35,037,151 UART: [art] Derive Key Pair
35,038,192 UART: [art] Store priv key in slot 0x5
37,500,828 UART: [art] Derive Key Pair - Done
37,514,003 UART: [art] Signing Cert with AUTHO
37,515,347 UART: RITY.KEYID = 7
39,226,426 UART: [art] Erasing AUTHORITY.KEYID = 7
39,227,934 UART: [art] PUB.X = CFDEFC98A07C5D8432DA6B1D80CD9F7CDF3FA04B9D0065D91CF6B3610E729FCE976710B4C34DBBCEA8053F6C8BDCAAE0
39,235,237 UART: [art] PUB.Y = 2FFE3434F7DF90017631918FA5355D1022C9EF39D59ED5AC506D4459EE744A6E1215528CACEF47FCD1709BD338FF76C8
39,242,470 UART: [art] SIG.R = F625284BEBA6CE178CD05336EF82DE720E6BAF16D64C26872F13C442C36BF1C0E2DE8C6D15EA43D2D926E9812D9E33A5
39,249,905 UART: [art] SIG.S = 78B55A782398DA8B29675F035DD6B7E15F90EA59D32AB5B7722D520C3C97CD41E9763E2A89640D074E5F0923A8E49270
40,228,338 UART: Caliptra RT
40,229,054 UART: [state] CFI Enabled
40,565,859 UART: [rt] RT listening for mailbox commands...
40,567,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,597,296 UART: [rt]cmd =0x494e464f, len=4
40,601,519 >>> mbox cmd response data (312 bytes)
42,655,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
49,789,100 >>> mbox cmd response: success
49,824,767 UART:
49,825,066 UART: Running Caliptra FMC ...
49,826,353 UART:
49,826,522 UART: [state] CFI Enabled
49,922,283 UART: [art] Extend RT PCRs Done
49,923,470 UART: [art] Lock RT PCRs Done
49,924,654 UART: [art] Populate DV Done
49,930,179 UART: [fht] FMC Alias Private Key: 7
49,931,820 UART: [art] Derive CDI
49,932,578 UART: [art] Store in in slot 0x4
49,991,021 UART: [art] Derive Key Pair
49,992,060 UART: [art] Store priv key in slot 0x5
52,454,899 UART: [art] Derive Key Pair - Done
52,467,564 UART: [art] Signing Cert with AUTHO
52,468,904 UART: RITY.KEYID = 7
54,180,997 UART: [art] Erasing AUTHORITY.KEYID = 7
54,182,499 UART: [art] PUB.X = CF8B274B000BC99F5C209E59E53B957BD071C2E6271A31B6B2154F9759F131EC2E8AF4F096E45D3D555CF6FFB87140DE
54,189,776 UART: [art] PUB.Y = 472E2B48CBEEAD2EBA45B455AF5892B26AE8B9EEF4289FC0D186AB6881B80279095429BC10296DA5D8F64AFBC079E120
54,197,067 UART: [art] SIG.R = 2D0A325C0C5E3673CD5BFC62D1361B5438F63634C582A98D6FE6CAEE24D39B5EC0D9916F98E638DFD062F4D3B07699E9
54,204,452 UART: [art] SIG.S = 74859F0609914AC782BFAB45AC281D61D3F7C01222515D561A793496925EEA4A5880198083BC7443C4989CD1B8855CC5
55,183,408 UART: Caliptra RT
55,184,134 UART: [state] CFI Enabled
55,520,164 UART: [rt] RT listening for mailbox commands...
55,522,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,551,481 UART: [rt]cmd =0x494e464f, len=4
55,555,825 >>> mbox cmd response data (312 bytes)
55,557,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
62,656,138 >>> mbox cmd response: success
62,692,478 UART:
62,692,746 UART: Running Caliptra FMC ...
62,693,852 UART:
62,694,012 UART: [state] CFI Enabled
62,786,147 UART: [art] Extend RT PCRs Done
62,787,335 UART: [art] Lock RT PCRs Done
62,788,865 UART: [art] Populate DV Done
62,794,168 UART: [fht] FMC Alias Private Key: 7
62,795,753 UART: [art] Derive CDI
62,796,560 UART: [art] Store in in slot 0x4
62,855,114 UART: [art] Derive Key Pair
62,856,110 UART: [art] Store priv key in slot 0x5
65,319,127 UART: [art] Derive Key Pair - Done
65,332,080 UART: [art] Signing Cert with AUTHO
65,333,386 UART: RITY.KEYID = 7
67,045,446 UART: [art] Erasing AUTHORITY.KEYID = 7
67,046,941 UART: [art] PUB.X = CFDEFC98A07C5D8432DA6B1D80CD9F7CDF3FA04B9D0065D91CF6B3610E729FCE976710B4C34DBBCEA8053F6C8BDCAAE0
67,054,224 UART: [art] PUB.Y = 2FFE3434F7DF90017631918FA5355D1022C9EF39D59ED5AC506D4459EE744A6E1215528CACEF47FCD1709BD338FF76C8
67,061,504 UART: [art] SIG.R = F625284BEBA6CE178CD05336EF82DE720E6BAF16D64C26872F13C442C36BF1C0E2DE8C6D15EA43D2D926E9812D9E33A5
67,068,941 UART: [art] SIG.S = 78B55A782398DA8B29675F035DD6B7E15F90EA59D32AB5B7722D520C3C97CD41E9763E2A89640D074E5F0923A8E49270
68,047,890 UART: Caliptra RT
68,048,601 UART: [state] CFI Enabled
68,380,085 UART: [rt] RT listening for mailbox commands...
68,381,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,411,641 UART: [rt]cmd =0x494e464f, len=4
68,416,060 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.54s
Truncated 1634 bytes from beginning
,316,517 UART: [idev] Sha1 KeyId Algorithm
6,339,180 UART: [idev] --
6,342,747 UART: [ldev] ++
6,343,323 UART: [ldev] CDI.KEYID = 6
6,344,231 UART: [ldev] SUBJECT.KEYID = 5
6,345,386 UART: [ldev] AUTHORITY.KEYID = 7
6,346,674 UART: [ldev] FE.KEYID = 1
6,356,360 UART: [ldev] Erasing FE.KEYID = 1
8,833,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,633 UART: [ldev] --
10,624,035 UART: [fwproc] Wait for Commands...
10,626,996 UART: [fwproc] Recv command 0x46574c44
10,629,093 UART: [fwproc] Recv'd Img size: 114084 bytes
14,025,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,535 >>> mbox cmd response: success
14,484,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,487,227 UART: [afmc] ++
14,487,814 UART: [afmc] CDI.KEYID = 6
14,488,723 UART: [afmc] SUBJECT.KEYID = 7
14,489,938 UART: [afmc] AUTHORITY.KEYID = 5
16,989,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,795 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,728,812 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,744,881 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,760,821 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,783,955 UART: [afmc] --
18,788,548 UART: [cold-reset] --
18,791,008 UART: [state] Locking Datavault
18,795,828 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,475 UART: [state] Locking ICCM
18,798,544 UART: [exit] Launching FMC @ 0x40000130
18,806,937 UART:
18,807,180 UART: Running Caliptra FMC ...
18,808,283 UART:
18,808,448 UART: [state] CFI Enabled
18,816,814 UART: [fht] FMC Alias Private Key: 7
20,574,078 UART: [art] Extend RT PCRs Done
20,575,282 UART: [art] Lock RT PCRs Done
20,577,117 UART: [art] Populate DV Done
20,582,800 UART: [fht] FMC Alias Private Key: 7
20,584,502 UART: [art] Derive CDI
20,585,321 UART: [art] Store in in slot 0x4
20,628,223 UART: [art] Derive Key Pair
20,629,266 UART: [art] Store priv key in slot 0x5
23,056,455 UART: [art] Derive Key Pair - Done
23,069,457 UART: [art] Signing Cert with AUTHO
23,070,769 UART: RITY.KEYID = 7
24,775,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,281 UART: [art] PUB.X = D9012B25A710A1AD8852F6095E359AEA14B54168C8D089453CA2A47CDC74D9286F03A6FD8B54A3EF1A1A6841CCEC8A04
24,784,558 UART: [art] PUB.Y = 052FF4A7F3E309A872FBB6A3E3B6554933D13CEC3E4C5283E1259A4AAB015070C7B9013BDC0CD604C434038992E38948
24,791,815 UART: [art] SIG.R = 3432CF6105C8D03F086B58D2A1AB1C23E4E108A5AF5108629B213C218CB3E5E4F0E14DB642CB828DEA11F0E7ECB2D69E
24,799,175 UART: [art] SIG.S = 8EB6BE9317367E9A2BDE47EBA6BD3720F5B5A6B08D09813C24CC8474FF399FE623CD0498330FE806C10DE349DB9F552F
25,778,301 UART: Caliptra RT
25,779,015 UART: [state] CFI Enabled
25,896,474 UART: [rt] RT listening for mailbox commands...
25,928,056 UART: [rt]cmd =0x494e464f, len=4
25,932,611 >>> mbox cmd response data (312 bytes)
27,989,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,134,157 UART:
28,134,547 UART: Running Caliptra ROM ...
28,135,684 UART:
28,135,857 UART: [state] CFI Enabled
28,147,483 UART: [state] LifecycleState = Unprovisioned
28,149,450 UART: [state] DebugLocked = No
28,150,809 UART: [state] WD Timer not started. Device not locked for debugging
28,154,757 UART: [kat] SHA2-256
28,333,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,345,531 UART: [kat] ++
28,346,083 UART: [kat] sha1
28,356,925 UART: [kat] SHA2-256
28,359,979 UART: [kat] SHA2-384
28,366,733 UART: [kat] SHA2-512-ACC
28,369,680 UART: [kat] ECC-384
30,812,693 UART: [kat] HMAC-384Kdf
30,825,781 UART: [kat] LMS
31,355,281 UART: [kat] --
31,359,666 UART: [update-reset] ++
34,788,088 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,790,822 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,172,837 >>> mbox cmd response: success
35,174,701 UART: [update-reset] Copying MAN_2 To MAN_1
35,197,043 UART: [update-reset Success] --
35,202,085 UART: [state] Locking Datavault
35,204,932 UART: [state] Locking PCR0, PCR1 and PCR31
35,206,650 UART: [state] Locking ICCM
35,209,239 UART: [exit] Launching FMC @ 0x40000130
35,217,691 UART:
35,217,932 UART: Running Caliptra FMC ...
35,219,038 UART:
35,219,201 UART: [state] CFI Enabled
35,263,279 UART: [art] Extend RT PCRs Done
35,264,465 UART: [art] Lock RT PCRs Done
35,265,655 UART: [art] Populate DV Done
35,271,067 UART: [fht] FMC Alias Private Key: 7
35,272,664 UART: [art] Derive CDI
35,273,480 UART: [art] Store in in slot 0x4
35,316,240 UART: [art] Derive Key Pair
35,317,824 UART: [art] Store priv key in slot 0x5
37,743,621 UART: [art] Derive Key Pair - Done
37,756,966 UART: [art] Signing Cert with AUTHO
37,758,275 UART: RITY.KEYID = 7
39,463,817 UART: [art] Erasing AUTHORITY.KEYID = 7
39,465,303 UART: [art] PUB.X = 09908B790A0176813DDE01649DC7E683CFA40F1CE04770F84B6D391B32E4D98D3144BFFA3DE5AF6986C4981C99926915
39,472,584 UART: [art] PUB.Y = 7B0C655B72D537D1218BA09667A4EB87C79C387686BBA85EA75BE56CCCF3A620CA484AEA21565FCA57E3B22C63F87A1C
39,479,870 UART: [art] SIG.R = 1A736CC3E89C82EC0A3D8D02F4AECB751EC23255598B0759F0F38B77BE89CB1360FA3858FE4B04235E06F4E13FBDCF04
39,487,259 UART: [art] SIG.S = 32712FFA8C22CB992AEBFBDC964AEEC8D4D938C93AB4E903F3A33C7F2E275CAEB75C54EAD1F5E03C65D4454CA9A9FE1F
40,465,934 UART: Caliptra RT
40,466,635 UART: [state] CFI Enabled
40,751,439 UART: [rt] RT listening for mailbox commands...
40,753,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,783,002 UART: [rt]cmd =0x494e464f, len=4
40,787,379 >>> mbox cmd response data (312 bytes)
42,846,899 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
42,991,795 UART:
42,992,189 UART: Running Caliptra ROM ...
42,993,324 UART:
42,993,493 UART: [state] CFI Enabled
43,007,014 UART: [state] LifecycleState = Unprovisioned
43,008,907 UART: [state] DebugLocked = No
43,010,413 UART: [state] WD Timer not started. Device not locked for debugging
43,013,355 UART: [kat] SHA2-256
43,192,516 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,204,095 UART: [kat] ++
43,204,638 UART: [kat] sha1
43,217,047 UART: [kat] SHA2-256
43,220,120 UART: [kat] SHA2-384
43,226,483 UART: [kat] SHA2-512-ACC
43,229,448 UART: [kat] ECC-384
45,672,318 UART: [kat] HMAC-384Kdf
45,686,016 UART: [kat] LMS
46,215,522 UART: [kat] --
46,218,940 UART: [update-reset] ++
49,643,714 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,646,318 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
50,028,381 >>> mbox cmd response: success
50,029,634 UART: [update-reset] Copying MAN_2 To MAN_1
50,051,998 UART: [update-reset Success] --
50,057,356 UART: [state] Locking Datavault
50,060,837 UART: [state] Locking PCR0, PCR1 and PCR31
50,062,494 UART: [state] Locking ICCM
50,064,976 UART: [exit] Launching FMC @ 0x40000130
50,073,433 UART:
50,073,683 UART: Running Caliptra FMC ...
50,074,813 UART:
50,074,984 UART: [state] CFI Enabled
50,119,112 UART: [art] Extend RT PCRs Done
50,120,301 UART: [art] Lock RT PCRs Done
50,121,943 UART: [art] Populate DV Done
50,127,412 UART: [fht] FMC Alias Private Key: 7
50,129,059 UART: [art] Derive CDI
50,129,874 UART: [art] Store in in slot 0x4
50,172,789 UART: [art] Derive Key Pair
50,173,792 UART: [art] Store priv key in slot 0x5
52,600,468 UART: [art] Derive Key Pair - Done
52,613,359 UART: [art] Signing Cert with AUTHO
52,614,664 UART: RITY.KEYID = 7
54,320,496 UART: [art] Erasing AUTHORITY.KEYID = 7
54,322,003 UART: [art] PUB.X = 7BC5FB80146F213ECC215D97B418CEFCA819DB5F66C94DBE2C1EBA1894FC0A6E8180B950A40D4E0D662CC4C919A8AEF6
54,329,282 UART: [art] PUB.Y = 16E3DAEEECC7AAD4E0963372859DE2E57231345978C6E7416CF058660FC9DC13F0FFEB962596777A621C8879A5847B82
54,336,511 UART: [art] SIG.R = EC29C03BEEEBD26BB0D9BE19E6C775630F6F21E0AF3A503946DFAA8701978304454A3ABA40B6996F540DADAAC7F752C5
54,343,939 UART: [art] SIG.S = 9FC2881C439F1E07213FA1144F0BD00C3F22E9C0DC9403FF05CB90376D2BD4A10E17858AED4AEC534493F3C0FE4F7E3C
55,322,684 UART: Caliptra RT
55,323,390 UART: [state] CFI Enabled
55,610,632 UART: [rt] RT listening for mailbox commands...
55,612,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,641,971 UART: [rt]cmd =0x494e464f, len=4
55,646,444 >>> mbox cmd response data (312 bytes)
55,648,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
55,792,591 UART:
55,792,889 UART: Running Caliptra ROM ...
55,793,950 UART:
55,794,158 UART: [state] CFI Enabled
55,808,918 UART: [state] LifecycleState = Unprovisioned
55,810,791 UART: [state] DebugLocked = No
55,812,124 UART: [state] WD Timer not started. Device not locked for debugging
55,816,699 UART: [kat] SHA2-256
55,995,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,007,448 UART: [kat] ++
56,007,996 UART: [kat] sha1
56,019,327 UART: [kat] SHA2-256
56,022,341 UART: [kat] SHA2-384
56,030,056 UART: [kat] SHA2-512-ACC
56,033,010 UART: [kat] ECC-384
58,473,393 UART: [kat] HMAC-384Kdf
58,485,838 UART: [kat] LMS
59,015,352 UART: [kat] --
59,017,989 UART: [update-reset] ++
62,441,095 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,443,879 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
62,825,879 >>> mbox cmd response: success
62,827,498 UART: [update-reset] Copying MAN_2 To MAN_1
62,849,845 UART: [update-reset Success] --
62,854,007 UART: [state] Locking Datavault
62,857,378 UART: [state] Locking PCR0, PCR1 and PCR31
62,859,028 UART: [state] Locking ICCM
62,860,184 UART: [exit] Launching FMC @ 0x40000130
62,868,577 UART:
62,868,821 UART: Running Caliptra FMC ...
62,869,848 UART:
62,869,996 UART: [state] CFI Enabled
62,914,226 UART: [art] Extend RT PCRs Done
62,915,372 UART: [art] Lock RT PCRs Done
62,916,955 UART: [art] Populate DV Done
62,922,449 UART: [fht] FMC Alias Private Key: 7
62,924,054 UART: [art] Derive CDI
62,924,795 UART: [art] Store in in slot 0x4
62,967,549 UART: [art] Derive Key Pair
62,968,569 UART: [art] Store priv key in slot 0x5
65,395,378 UART: [art] Derive Key Pair - Done
65,408,043 UART: [art] Signing Cert with AUTHO
65,409,383 UART: RITY.KEYID = 7
67,115,166 UART: [art] Erasing AUTHORITY.KEYID = 7
67,116,687 UART: [art] PUB.X = 09908B790A0176813DDE01649DC7E683CFA40F1CE04770F84B6D391B32E4D98D3144BFFA3DE5AF6986C4981C99926915
67,123,924 UART: [art] PUB.Y = 7B0C655B72D537D1218BA09667A4EB87C79C387686BBA85EA75BE56CCCF3A620CA484AEA21565FCA57E3B22C63F87A1C
67,131,192 UART: [art] SIG.R = 1A736CC3E89C82EC0A3D8D02F4AECB751EC23255598B0759F0F38B77BE89CB1360FA3858FE4B04235E06F4E13FBDCF04
67,138,559 UART: [art] SIG.S = 32712FFA8C22CB992AEBFBDC964AEEC8D4D938C93AB4E903F3A33C7F2E275CAEB75C54EAD1F5E03C65D4454CA9A9FE1F
68,117,309 UART: Caliptra RT
68,118,139 UART: [state] CFI Enabled
68,405,361 UART: [rt] RT listening for mailbox commands...
68,407,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,436,973 UART: [rt]cmd =0x494e464f, len=4
68,441,275 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
3,688,675 ready_for_fw is high
3,689,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,253,335 >>> mbox cmd response: success
14,254,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,496,472 UART:
18,496,861 UART: Running Caliptra FMC ...
18,498,063 UART:
18,498,241 UART: [state] CFI Enabled
18,505,649 UART: [fht] FMC Alias Private Key: 7
20,262,645 UART: [art] Extend RT PCRs Done
20,263,860 UART: [art] Lock RT PCRs Done
20,265,328 UART: [art] Populate DV Done
20,270,800 UART: [fht] FMC Alias Private Key: 7
20,272,424 UART: [art] Derive CDI
20,273,251 UART: [art] Store in in slot 0x4
20,315,851 UART: [art] Derive Key Pair
20,316,893 UART: [art] Store priv key in slot 0x5
22,743,348 UART: [art] Derive Key Pair - Done
22,756,520 UART: [art] Signing Cert with AUTHO
22,757,825 UART: RITY.KEYID = 7
24,463,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,464,627 UART: [art] PUB.X = B3517286CD915558AA01164EAACE4A8C04101C18F9483D9E0B345F1AE35B4715BB9A64D43A191CA1B4BCCD52DBC1CCA5
24,471,957 UART: [art] PUB.Y = 873A5B2EC0BF42EAD7459E92E25FAD057853DD0BD68A6F46C1BD4E92630AEACCEAC9416A46CE972EDDE44BDD5423841D
24,479,234 UART: [art] SIG.R = 436C93ADCAD78368CCE21BEE7CF99CE07CDDDA81B669835F75DD337A193300F154B170C9B885BBCD5A5790C0078EC563
24,486,666 UART: [art] SIG.S = 4A6E50351F08FADBF6C4ECAD4B141F1D836046EED3EB0FC975344D7F232620DF9C902D6397024C6CD06BEF6620356BE9
25,465,264 UART: Caliptra RT
25,465,986 UART: [state] CFI Enabled
25,584,309 UART: [rt] RT listening for mailbox commands...
25,615,725 UART: [rt]cmd =0x494e464f, len=4
25,620,023 >>> mbox cmd response data (312 bytes)
27,677,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,726,449 >>> mbox cmd response: success
34,763,738 UART:
34,764,045 UART: Running Caliptra FMC ...
34,765,173 UART:
34,765,346 UART: [state] CFI Enabled
34,809,441 UART: [art] Extend RT PCRs Done
34,810,634 UART: [art] Lock RT PCRs Done
34,812,231 UART: [art] Populate DV Done
34,817,551 UART: [fht] FMC Alias Private Key: 7
34,819,156 UART: [art] Derive CDI
34,819,899 UART: [art] Store in in slot 0x4
34,862,594 UART: [art] Derive Key Pair
34,863,647 UART: [art] Store priv key in slot 0x5
37,290,636 UART: [art] Derive Key Pair - Done
37,303,688 UART: [art] Signing Cert with AUTHO
37,305,000 UART: RITY.KEYID = 7
39,010,610 UART: [art] Erasing AUTHORITY.KEYID = 7
39,012,120 UART: [art] PUB.X = A88687688540105FE08EF90DB6DC54F7E8BDA1357CAAC4ECD16F2B5EDD659918E08E3A71BC23D70A50C118984DF3A366
39,019,412 UART: [art] PUB.Y = 9BFDC0FAC0EBDBB2A23C0E517930CB66C4B2AA3F3A81337C54F7814E4683AAFF9E8AA1B917C751321B3886438DFBB54D
39,026,672 UART: [art] SIG.R = 1AF36E2DDAA852EE656CC3E2DD12035EFFC3D756AD4B35C4F7FA447F74A2C1EEABB02DA3798DD0885E72B61E44F05A44
39,034,094 UART: [art] SIG.S = 39BF9FA5EA8E70DF26AB9B3A2DD719B010EE7F1A73593A27EE264846D14DE3103EEE093B703F316033E24D06C8CC7947
40,013,039 UART: Caliptra RT
40,013,761 UART: [state] CFI Enabled
40,302,898 UART: [rt] RT listening for mailbox commands...
40,304,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,334,584 UART: [rt]cmd =0x494e464f, len=4
40,339,021 >>> mbox cmd response data (312 bytes)
42,392,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
49,423,950 >>> mbox cmd response: success
49,458,675 UART:
49,458,981 UART: Running Caliptra FMC ...
49,460,109 UART:
49,460,286 UART: [state] CFI Enabled
49,504,745 UART: [art] Extend RT PCRs Done
49,505,933 UART: [art] Lock RT PCRs Done
49,507,362 UART: [art] Populate DV Done
49,512,991 UART: [fht] FMC Alias Private Key: 7
49,514,587 UART: [art] Derive CDI
49,515,403 UART: [art] Store in in slot 0x4
49,557,998 UART: [art] Derive Key Pair
49,559,002 UART: [art] Store priv key in slot 0x5
51,985,641 UART: [art] Derive Key Pair - Done
51,998,706 UART: [art] Signing Cert with AUTHO
52,000,016 UART: RITY.KEYID = 7
53,705,737 UART: [art] Erasing AUTHORITY.KEYID = 7
53,707,230 UART: [art] PUB.X = DE17A94573C23084DA1285517F757E83E1DD6315D9CB9B449CC25C5EB29C7832BEFFC3772570CF8061E1B22B1563BAA5
53,714,504 UART: [art] PUB.Y = F886A87D242A83583AF092D37727F9644EFB56D4461A07624B753DFCF835E9E0B04DEB9E070972A19566859597A0BF8E
53,721,744 UART: [art] SIG.R = 32457D23BCDDA8242430F9539D1EB95FAD5523C6D589BF1C679A2473DE1E60FFEF8BDCB76089D21BB16D207CE07B6D05
53,729,202 UART: [art] SIG.S = E578F97E3B5251E662C651385BC3F5CD62C7CC283EAFDF9033B8C86825D3E9BC680A76A05E53EC494576C439D2464BDD
54,707,821 UART: Caliptra RT
54,708,547 UART: [state] CFI Enabled
54,998,894 UART: [rt] RT listening for mailbox commands...
55,000,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,030,702 UART: [rt]cmd =0x494e464f, len=4
55,035,076 >>> mbox cmd response data (312 bytes)
55,036,970 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
62,080,263 >>> mbox cmd response: success
62,115,344 UART:
62,115,616 UART: Running Caliptra FMC ...
62,116,650 UART:
62,116,800 UART: [state] CFI Enabled
62,160,587 UART: [art] Extend RT PCRs Done
62,161,802 UART: [art] Lock RT PCRs Done
62,163,238 UART: [art] Populate DV Done
62,168,974 UART: [fht] FMC Alias Private Key: 7
62,170,568 UART: [art] Derive CDI
62,171,386 UART: [art] Store in in slot 0x4
62,214,394 UART: [art] Derive Key Pair
62,215,441 UART: [art] Store priv key in slot 0x5
64,642,184 UART: [art] Derive Key Pair - Done
64,655,184 UART: [art] Signing Cert with AUTHO
64,656,485 UART: RITY.KEYID = 7
66,361,918 UART: [art] Erasing AUTHORITY.KEYID = 7
66,363,416 UART: [art] PUB.X = A88687688540105FE08EF90DB6DC54F7E8BDA1357CAAC4ECD16F2B5EDD659918E08E3A71BC23D70A50C118984DF3A366
66,370,717 UART: [art] PUB.Y = 9BFDC0FAC0EBDBB2A23C0E517930CB66C4B2AA3F3A81337C54F7814E4683AAFF9E8AA1B917C751321B3886438DFBB54D
66,377,983 UART: [art] SIG.R = 1AF36E2DDAA852EE656CC3E2DD12035EFFC3D756AD4B35C4F7FA447F74A2C1EEABB02DA3798DD0885E72B61E44F05A44
66,385,402 UART: [art] SIG.S = 39BF9FA5EA8E70DF26AB9B3A2DD719B010EE7F1A73593A27EE264846D14DE3103EEE093B703F316033E24D06C8CC7947
67,364,486 UART: Caliptra RT
67,365,182 UART: [state] CFI Enabled
67,650,916 UART: [rt] RT listening for mailbox commands...
67,652,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
67,682,462 UART: [rt]cmd =0x494e464f, len=4
67,686,901 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.50s
Truncated 1634 bytes from beginning
,022,495 UART: [idev] Sha1 KeyId Algorithm
6,046,138 UART: [idev] --
6,052,132 UART: [ldev] ++
6,052,814 UART: [ldev] CDI.KEYID = 6
6,053,711 UART: [ldev] SUBJECT.KEYID = 5
6,054,920 UART: [ldev] AUTHORITY.KEYID = 7
6,056,154 UART: [ldev] FE.KEYID = 1
6,092,369 UART: [ldev] Erasing FE.KEYID = 1
8,595,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,505 UART: [ldev] --
10,408,268 UART: [fwproc] Wait for Commands...
10,410,682 UART: [fwproc] Recv command 0x46574c44
10,412,987 UART: [fwproc] Recv'd Img size: 114084 bytes
13,856,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,824 >>> mbox cmd response: success
14,591,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,594,968 UART: [afmc] ++
14,595,675 UART: [afmc] CDI.KEYID = 6
14,596,922 UART: [afmc] SUBJECT.KEYID = 7
14,598,360 UART: [afmc] AUTHORITY.KEYID = 5
17,142,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,867,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,869,655 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,884,749 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,899,849 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,914,833 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,939,406 UART: [afmc] --
18,943,323 UART: [cold-reset] --
18,946,255 UART: [state] Locking Datavault
18,951,038 UART: [state] Locking PCR0, PCR1 and PCR31
18,953,402 UART: [state] Locking ICCM
18,955,266 UART: [exit] Launching FMC @ 0x40000130
18,963,957 UART:
18,964,194 UART: Running Caliptra FMC ...
18,965,290 UART:
18,965,446 UART: [state] CFI Enabled
19,025,177 UART: [fht] FMC Alias Private Key: 7
20,788,662 UART: [art] Extend RT PCRs Done
20,789,879 UART: [art] Lock RT PCRs Done
20,791,229 UART: [art] Populate DV Done
20,796,657 UART: [fht] FMC Alias Private Key: 7
20,798,127 UART: [art] Derive CDI
20,798,900 UART: [art] Store in in slot 0x4
20,857,585 UART: [art] Derive Key Pair
20,858,583 UART: [art] Store priv key in slot 0x5
23,321,623 UART: [art] Derive Key Pair - Done
23,334,732 UART: [art] Signing Cert with AUTHO
23,336,037 UART: RITY.KEYID = 7
25,047,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,048,998 UART: [art] PUB.X = 8CCB902B288B651557494E1456545AE5C7AD21B65226CEC6934414102BD029AABA451CC3ABFFB863B7EB5877CB024750
25,056,263 UART: [art] PUB.Y = 19E3F3CDD96E80D5F92725AC2996CDF08BDD74BD715C3FF1A01CABFC7CBA745EBEC3B6581B1C9F5FA4C6F1AE576D0711
25,063,577 UART: [art] SIG.R = A653E6A5CFE20FA4C223C7CE94F89FAF57215FF0E1087A5AB05CD41F519744A2828BF0F9C4522147279BEF4F0C76B69D
25,070,960 UART: [art] SIG.S = 5800DC7338F84C418DF8FA9FB13A33107B4B3685751ECB3C296BF87B9D47A5A605514670B949FF72C130719FAEA70615
26,049,164 UART: Caliptra RT
26,049,853 UART: [state] CFI Enabled
26,215,975 UART: [rt] RT listening for mailbox commands...
26,247,411 UART: [rt]cmd =0x494e464f, len=4
26,251,784 >>> mbox cmd response data (312 bytes)
28,314,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,459,389 UART:
28,459,741 UART: Running Caliptra ROM ...
28,460,876 UART:
28,461,045 UART: [state] CFI Enabled
28,524,097 UART: [state] LifecycleState = Unprovisioned
28,526,175 UART: [state] DebugLocked = No
28,528,508 UART: [state] WD Timer not started. Device not locked for debugging
28,533,025 UART: [kat] SHA2-256
28,722,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,733,679 UART: [kat] ++
28,734,133 UART: [kat] sha1
28,746,963 UART: [kat] SHA2-256
28,749,934 UART: [kat] SHA2-384
28,755,330 UART: [kat] SHA2-512-ACC
28,757,901 UART: [kat] ECC-384
31,207,780 UART: [kat] HMAC-384Kdf
31,231,754 UART: [kat] LMS
31,763,302 UART: [kat] --
31,767,615 UART: [update-reset] ++
35,225,756 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,229,522 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,835,566 >>> mbox cmd response: success
35,836,703 UART: [update-reset] Copying MAN_2 To MAN_1
35,874,288 UART: [update-reset Success] --
35,877,867 UART: [state] Locking Datavault
35,881,940 UART: [state] Locking PCR0, PCR1 and PCR31
35,884,094 UART: [state] Locking ICCM
35,887,103 UART: [exit] Launching FMC @ 0x40000130
35,895,785 UART:
35,896,013 UART: Running Caliptra FMC ...
35,897,119 UART:
35,897,274 UART: [state] CFI Enabled
35,998,821 UART: [art] Extend RT PCRs Done
36,000,005 UART: [art] Lock RT PCRs Done
36,001,251 UART: [art] Populate DV Done
36,006,607 UART: [fht] FMC Alias Private Key: 7
36,008,248 UART: [art] Derive CDI
36,009,085 UART: [art] Store in in slot 0x4
36,068,410 UART: [art] Derive Key Pair
36,069,402 UART: [art] Store priv key in slot 0x5
38,532,968 UART: [art] Derive Key Pair - Done
38,545,927 UART: [art] Signing Cert with AUTHO
38,547,230 UART: RITY.KEYID = 7
40,258,997 UART: [art] Erasing AUTHORITY.KEYID = 7
40,260,509 UART: [art] PUB.X = B8B7FA6F823C47DD9127EF8645A340018A541724B0A090B3287DEA291FE1D90A3990944F8C00D9A318537A1E901C1C5B
40,267,735 UART: [art] PUB.Y = 4E5B84DB915D29412D53E7FB920FFAD18E1B30886159B4361CB58A0C4387A1FFF968EAFC3323BBE941CBD8E255550982
40,275,045 UART: [art] SIG.R = 499DF4C6DB0FD609FC36EC5FC8EF561F8BB755151C5C32C5C1A9679162793493360529D2FB0E3328032100C29FF9F4B4
40,282,366 UART: [art] SIG.S = 9625256DA111DA685EF5831CAEA45F6E76BF6148286E2965D817A3BDB16C9174EE8D4DDA8DA7BF25C96667AF2723593C
41,261,475 UART: Caliptra RT
41,262,173 UART: [state] CFI Enabled
41,598,819 UART: [rt] RT listening for mailbox commands...
41,600,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,630,483 UART: [rt]cmd =0x494e464f, len=4
41,634,943 >>> mbox cmd response data (312 bytes)
43,688,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
43,832,903 UART:
43,833,259 UART: Running Caliptra ROM ...
43,834,498 UART:
43,834,673 UART: [state] CFI Enabled
43,905,388 UART: [state] LifecycleState = Unprovisioned
43,907,464 UART: [state] DebugLocked = No
43,910,245 UART: [state] WD Timer not started. Device not locked for debugging
43,915,278 UART: [kat] SHA2-256
44,105,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,115,913 UART: [kat] ++
44,116,414 UART: [kat] sha1
44,128,489 UART: [kat] SHA2-256
44,131,467 UART: [kat] SHA2-384
44,138,002 UART: [kat] SHA2-512-ACC
44,140,586 UART: [kat] ECC-384
46,585,362 UART: [kat] HMAC-384Kdf
46,611,004 UART: [kat] LMS
47,142,576 UART: [kat] --
47,146,615 UART: [update-reset] ++
50,607,864 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,610,716 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
51,216,781 >>> mbox cmd response: success
51,218,266 UART: [update-reset] Copying MAN_2 To MAN_1
51,255,853 UART: [update-reset Success] --
51,261,705 UART: [state] Locking Datavault
51,265,888 UART: [state] Locking PCR0, PCR1 and PCR31
51,268,065 UART: [state] Locking ICCM
51,269,905 UART: [exit] Launching FMC @ 0x40000130
51,278,554 UART:
51,278,828 UART: Running Caliptra FMC ...
51,279,934 UART:
51,280,092 UART: [state] CFI Enabled
51,377,502 UART: [art] Extend RT PCRs Done
51,378,683 UART: [art] Lock RT PCRs Done
51,380,135 UART: [art] Populate DV Done
51,385,805 UART: [fht] FMC Alias Private Key: 7
51,387,440 UART: [art] Derive CDI
51,388,248 UART: [art] Store in in slot 0x4
51,446,755 UART: [art] Derive Key Pair
51,447,789 UART: [art] Store priv key in slot 0x5
53,910,386 UART: [art] Derive Key Pair - Done
53,923,271 UART: [art] Signing Cert with AUTHO
53,924,636 UART: RITY.KEYID = 7
55,636,152 UART: [art] Erasing AUTHORITY.KEYID = 7
55,637,635 UART: [art] PUB.X = 36CEBF07EC9299A38AA3121397BF5F82C80599C261CC1D10AC7B448732912A4540CDC6A5B08B053BC8CAB89452E8A20B
55,644,939 UART: [art] PUB.Y = 7BCA3854DCF07E6308B589375F76F3A21D110F6C7A2E9FEE867F399F5A811726F9C984382DA6AAAAA8A98BEBF466C748
55,652,238 UART: [art] SIG.R = 963F304DC2C4E6FD03106C27088F997D07AEA88000BE4D28C263A1DECA005811C74B5EE2EFFAD5B85A40902292E178EF
55,659,553 UART: [art] SIG.S = 3C3D6B47E6E000C3AD3F8A7C50EB4D900506A1CB3E354DD1E3F7CDDBC24302CA03C06B81D74931B61B4CCB90DB07A367
56,637,929 UART: Caliptra RT
56,638,648 UART: [state] CFI Enabled
56,975,728 UART: [rt] RT listening for mailbox commands...
56,977,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,007,357 UART: [rt]cmd =0x494e464f, len=4
57,011,479 >>> mbox cmd response data (312 bytes)
57,013,385 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
57,157,926 UART:
57,158,236 UART: Running Caliptra ROM ...
57,159,349 UART:
57,159,526 UART: [state] CFI Enabled
57,235,681 UART: [state] LifecycleState = Unprovisioned
57,237,729 UART: [state] DebugLocked = No
57,239,651 UART: [state] WD Timer not started. Device not locked for debugging
57,245,032 UART: [kat] SHA2-256
57,434,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,445,665 UART: [kat] ++
57,446,146 UART: [kat] sha1
57,457,898 UART: [kat] SHA2-256
57,460,869 UART: [kat] SHA2-384
57,467,668 UART: [kat] SHA2-512-ACC
57,470,295 UART: [kat] ECC-384
59,917,658 UART: [kat] HMAC-384Kdf
59,940,852 UART: [kat] LMS
60,472,421 UART: [kat] --
60,477,189 UART: [update-reset] ++
63,927,538 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,930,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
64,536,392 >>> mbox cmd response: success
64,536,848 UART: [update-reset] Copying MAN_2 To MAN_1
64,574,435 UART: [update-reset Success] --
64,579,835 UART: [state] Locking Datavault
64,583,495 UART: [state] Locking PCR0, PCR1 and PCR31
64,585,709 UART: [state] Locking ICCM
64,588,654 UART: [exit] Launching FMC @ 0x40000130
64,597,333 UART:
64,597,560 UART: Running Caliptra FMC ...
64,598,601 UART:
64,598,747 UART: [state] CFI Enabled
64,685,662 UART: [art] Extend RT PCRs Done
64,686,843 UART: [art] Lock RT PCRs Done
64,688,487 UART: [art] Populate DV Done
64,693,800 UART: [fht] FMC Alias Private Key: 7
64,695,448 UART: [art] Derive CDI
64,696,259 UART: [art] Store in in slot 0x4
64,754,924 UART: [art] Derive Key Pair
64,755,965 UART: [art] Store priv key in slot 0x5
67,218,345 UART: [art] Derive Key Pair - Done
67,231,719 UART: [art] Signing Cert with AUTHO
67,233,022 UART: RITY.KEYID = 7
68,943,703 UART: [art] Erasing AUTHORITY.KEYID = 7
68,945,208 UART: [art] PUB.X = B8B7FA6F823C47DD9127EF8645A340018A541724B0A090B3287DEA291FE1D90A3990944F8C00D9A318537A1E901C1C5B
68,952,427 UART: [art] PUB.Y = 4E5B84DB915D29412D53E7FB920FFAD18E1B30886159B4361CB58A0C4387A1FFF968EAFC3323BBE941CBD8E255550982
68,959,700 UART: [art] SIG.R = 499DF4C6DB0FD609FC36EC5FC8EF561F8BB755151C5C32C5C1A9679162793493360529D2FB0E3328032100C29FF9F4B4
68,967,082 UART: [art] SIG.S = 9625256DA111DA685EF5831CAEA45F6E76BF6148286E2965D817A3BDB16C9174EE8D4DDA8DA7BF25C96667AF2723593C
69,945,995 UART: Caliptra RT
69,946,688 UART: [state] CFI Enabled
70,284,371 UART: [rt] RT listening for mailbox commands...
70,286,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,315,939 UART: [rt]cmd =0x494e464f, len=4
70,320,140 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,439,448 ready_for_fw is high
3,440,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,474 >>> mbox cmd response: success
14,725,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,005,098 UART:
19,005,534 UART: Running Caliptra FMC ...
19,006,650 UART:
19,006,822 UART: [state] CFI Enabled
19,072,483 UART: [fht] FMC Alias Private Key: 7
20,836,115 UART: [art] Extend RT PCRs Done
20,837,339 UART: [art] Lock RT PCRs Done
20,839,126 UART: [art] Populate DV Done
20,844,377 UART: [fht] FMC Alias Private Key: 7
20,845,858 UART: [art] Derive CDI
20,846,626 UART: [art] Store in in slot 0x4
20,904,674 UART: [art] Derive Key Pair
20,905,720 UART: [art] Store priv key in slot 0x5
23,369,263 UART: [art] Derive Key Pair - Done
23,382,425 UART: [art] Signing Cert with AUTHO
23,383,724 UART: RITY.KEYID = 7
25,095,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,782 UART: [art] PUB.X = 5E82B82471FA019D9EAFEDB8EB88A1A77D1685D31643711B78A1A5B66305C37E144BD8DD8E9ADD7E14BEA1AFC38ADAE3
25,104,080 UART: [art] PUB.Y = 3DC95E978ADA59D3E7A97E517772443B383C1CD593B74213A1869AF05723996A335BDD98CFBDBAA553C56D20CCEFC31E
25,111,359 UART: [art] SIG.R = BA98438DE5911A6FD1EC6CCF1B1585D91173287E7CA1688BC53BD2C6268DB9116E898A71C58A80EE1DB3F743D34C7D59
25,118,752 UART: [art] SIG.S = F242E9398D26E806205C6CF2B3F8C30ECAB2B3448108811031C38A9A42840A66E1DB8AF8D52763BFAE82B98D3E8A7C8D
26,097,416 UART: Caliptra RT
26,098,110 UART: [state] CFI Enabled
26,262,118 UART: [rt] RT listening for mailbox commands...
26,293,479 UART: [rt]cmd =0x494e464f, len=4
26,297,646 >>> mbox cmd response data (312 bytes)
28,360,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,172,900 >>> mbox cmd response: success
36,206,548 UART:
36,206,852 UART: Running Caliptra FMC ...
36,207,969 UART:
36,208,133 UART: [state] CFI Enabled
36,301,068 UART: [art] Extend RT PCRs Done
36,302,268 UART: [art] Lock RT PCRs Done
36,303,780 UART: [art] Populate DV Done
36,309,299 UART: [fht] FMC Alias Private Key: 7
36,310,947 UART: [art] Derive CDI
36,311,758 UART: [art] Store in in slot 0x4
36,370,315 UART: [art] Derive Key Pair
36,371,355 UART: [art] Store priv key in slot 0x5
38,833,848 UART: [art] Derive Key Pair - Done
38,846,845 UART: [art] Signing Cert with AUTHO
38,848,152 UART: RITY.KEYID = 7
40,559,730 UART: [art] Erasing AUTHORITY.KEYID = 7
40,561,235 UART: [art] PUB.X = 7B5CE1AFBAF329BA793ECFA8B280C3D076C00FEF5289644B23399536B08C3F36B0487671599F7F178CEBBD5795493520
40,568,471 UART: [art] PUB.Y = 0B90952D50B4AF68FDF5B9D69A61C4BB278B5DC4D1A8D65F8D6CCA26C7DF9B04C077F9501E07DA74C43D6C1C682DF6E8
40,575,760 UART: [art] SIG.R = 189875BAAA9E004EE8887A5E703318F97DA68C7A0F70910FCC0648DF5703B56177B1ED3CE32654A01C612D2E3ED728AA
40,583,148 UART: [art] SIG.S = E0A28A2DE026482E2A4C9F0ECED692125395FF3913BEACB37C90555707D11A75E1809E428DDCA62428771EC39F67EA8B
41,561,830 UART: Caliptra RT
41,562,543 UART: [state] CFI Enabled
41,898,599 UART: [rt] RT listening for mailbox commands...
41,900,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,930,288 UART: [rt]cmd =0x494e464f, len=4
41,934,763 >>> mbox cmd response data (312 bytes)
43,989,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
51,805,667 >>> mbox cmd response: success
51,839,314 UART:
51,839,615 UART: Running Caliptra FMC ...
51,840,728 UART:
51,840,893 UART: [state] CFI Enabled
51,936,390 UART: [art] Extend RT PCRs Done
51,937,587 UART: [art] Lock RT PCRs Done
51,938,906 UART: [art] Populate DV Done
51,944,152 UART: [fht] FMC Alias Private Key: 7
51,945,682 UART: [art] Derive CDI
51,946,413 UART: [art] Store in in slot 0x4
52,005,352 UART: [art] Derive Key Pair
52,006,357 UART: [art] Store priv key in slot 0x5
54,469,165 UART: [art] Derive Key Pair - Done
54,482,136 UART: [art] Signing Cert with AUTHO
54,483,439 UART: RITY.KEYID = 7
56,194,636 UART: [art] Erasing AUTHORITY.KEYID = 7
56,196,144 UART: [art] PUB.X = C013B068052A8888804E188332BB01C1EF49F26D958323CB4308AFD0F632E4222023EB064C8280FC1CC416B5C1D00AAE
56,203,397 UART: [art] PUB.Y = 41979A43B2433228D0ADBA2FFDE22E1E2DA03F17584E041C04E8C5B8F392BE443DDA89D930E0012E9CD69CBE75FD2A75
56,210,691 UART: [art] SIG.R = E8EA397B708560C0741176827E3419D2CB63A8BB9199A7D5F577FA56A19FAF5193E93727AAACFCF14A2D1C1A3BAC47D5
56,218,068 UART: [art] SIG.S = 0B9CDCB1C587CB0D66310E8CB4B66B8083F3C5B33AA2E3A765493E778C78999968FBB8CAB4F1BD415F4A8411E8497C9E
57,196,756 UART: Caliptra RT
57,197,451 UART: [state] CFI Enabled
57,534,603 UART: [rt] RT listening for mailbox commands...
57,536,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,566,082 UART: [rt]cmd =0x494e464f, len=4
57,570,586 >>> mbox cmd response data (312 bytes)
57,572,447 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
65,370,701 >>> mbox cmd response: success
65,403,848 UART:
65,404,133 UART: Running Caliptra FMC ...
65,405,248 UART:
65,405,407 UART: [state] CFI Enabled
65,500,825 UART: [art] Extend RT PCRs Done
65,502,012 UART: [art] Lock RT PCRs Done
65,503,523 UART: [art] Populate DV Done
65,509,088 UART: [fht] FMC Alias Private Key: 7
65,510,727 UART: [art] Derive CDI
65,511,535 UART: [art] Store in in slot 0x4
65,569,986 UART: [art] Derive Key Pair
65,571,024 UART: [art] Store priv key in slot 0x5
68,034,088 UART: [art] Derive Key Pair - Done
68,046,830 UART: [art] Signing Cert with AUTHO
68,048,141 UART: RITY.KEYID = 7
69,759,253 UART: [art] Erasing AUTHORITY.KEYID = 7
69,760,751 UART: [art] PUB.X = 7B5CE1AFBAF329BA793ECFA8B280C3D076C00FEF5289644B23399536B08C3F36B0487671599F7F178CEBBD5795493520
69,768,004 UART: [art] PUB.Y = 0B90952D50B4AF68FDF5B9D69A61C4BB278B5DC4D1A8D65F8D6CCA26C7DF9B04C077F9501E07DA74C43D6C1C682DF6E8
69,775,260 UART: [art] SIG.R = 189875BAAA9E004EE8887A5E703318F97DA68C7A0F70910FCC0648DF5703B56177B1ED3CE32654A01C612D2E3ED728AA
69,782,660 UART: [art] SIG.S = E0A28A2DE026482E2A4C9F0ECED692125395FF3913BEACB37C90555707D11A75E1809E428DDCA62428771EC39F67EA8B
70,761,676 UART: Caliptra RT
70,762,385 UART: [state] CFI Enabled
71,098,236 UART: [rt] RT listening for mailbox commands...
71,100,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,129,787 UART: [rt]cmd =0x494e464f, len=4
71,134,150 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.67s
Truncated 1634 bytes from beginning
,334,868 UART: [idev] Sha1 KeyId Algorithm
6,358,609 UART: [idev] --
6,362,064 UART: [ldev] ++
6,362,797 UART: [ldev] CDI.KEYID = 6
6,363,702 UART: [ldev] SUBJECT.KEYID = 5
6,364,857 UART: [ldev] AUTHORITY.KEYID = 7
6,366,093 UART: [ldev] FE.KEYID = 1
6,377,581 UART: [ldev] Erasing FE.KEYID = 1
8,855,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,554 UART: [ldev] --
10,646,694 UART: [fwproc] Wait for Commands...
10,649,388 UART: [fwproc] Recv command 0x46574c44
10,651,642 UART: [fwproc] Recv'd Img size: 114084 bytes
14,090,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,697 >>> mbox cmd response: success
14,824,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,828,654 UART: [afmc] ++
14,829,353 UART: [afmc] CDI.KEYID = 6
14,830,548 UART: [afmc] SUBJECT.KEYID = 7
14,832,043 UART: [afmc] AUTHORITY.KEYID = 5
17,338,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,588 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
19,078,595 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
19,093,802 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
19,108,732 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
19,132,934 UART: [afmc] --
19,135,837 UART: [cold-reset] --
19,140,833 UART: [state] Locking Datavault
19,143,991 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,169 UART: [state] Locking ICCM
19,147,726 UART: [exit] Launching FMC @ 0x40000130
19,156,406 UART:
19,156,642 UART: Running Caliptra FMC ...
19,157,745 UART:
19,157,903 UART: [state] CFI Enabled
19,166,059 UART: [fht] FMC Alias Private Key: 7
20,922,665 UART: [art] Extend RT PCRs Done
20,923,880 UART: [art] Lock RT PCRs Done
20,925,669 UART: [art] Populate DV Done
20,931,141 UART: [fht] FMC Alias Private Key: 7
20,932,838 UART: [art] Derive CDI
20,933,658 UART: [art] Store in in slot 0x4
20,975,668 UART: [art] Derive Key Pair
20,976,703 UART: [art] Store priv key in slot 0x5
23,403,442 UART: [art] Derive Key Pair - Done
23,416,669 UART: [art] Signing Cert with AUTHO
23,417,977 UART: RITY.KEYID = 7
25,123,505 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,029 UART: [art] PUB.X = 5AB07AFB75E5331D9455420C85F7FF66EBEC190CE864C3FCBC877141AD295149B0F24C07414F7E8C559E3F90C00C2F67
25,132,255 UART: [art] PUB.Y = FC5BF5EAAC7BB4CD69F03E85F65AED27958B7DBA0485CB5B19EEBF6F36247C35E967E1C8B6C421E89CE9B5F98BE7B24A
25,139,520 UART: [art] SIG.R = 9853873A8C4CA2600DC283B7BA011AC24A3A8FB130A661908A8E85980C257C08403019FD14AD9C8DF32E8DA88A2DD78C
25,146,943 UART: [art] SIG.S = 5FE22A55F7042A98BF93EBEDE141DBF1D010A0E46714FE80D837B38C602C20134FEB37F654B9947B89CBCA51F4AA7D18
26,125,559 UART: Caliptra RT
26,126,247 UART: [state] CFI Enabled
26,244,293 UART: [rt] RT listening for mailbox commands...
26,275,489 UART: [rt]cmd =0x494e464f, len=4
26,279,660 >>> mbox cmd response data (312 bytes)
28,336,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,481,349 UART:
28,481,730 UART: Running Caliptra ROM ...
28,482,831 UART:
28,482,995 UART: [state] CFI Enabled
28,496,842 UART: [state] LifecycleState = Unprovisioned
28,498,690 UART: [state] DebugLocked = No
28,500,186 UART: [state] WD Timer not started. Device not locked for debugging
28,505,366 UART: [kat] SHA2-256
28,695,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,705,983 UART: [kat] ++
28,706,578 UART: [kat] sha1
28,718,560 UART: [kat] SHA2-256
28,721,536 UART: [kat] SHA2-384
28,726,895 UART: [kat] SHA2-512-ACC
28,729,528 UART: [kat] ECC-384
31,170,971 UART: [kat] HMAC-384Kdf
31,183,696 UART: [kat] LMS
31,715,356 UART: [kat] --
31,720,046 UART: [update-reset] ++
35,181,523 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,185,493 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,791,564 >>> mbox cmd response: success
35,793,296 UART: [update-reset] Copying MAN_2 To MAN_1
35,830,876 UART: [update-reset Success] --
35,834,796 UART: [state] Locking Datavault
35,838,587 UART: [state] Locking PCR0, PCR1 and PCR31
35,840,751 UART: [state] Locking ICCM
35,843,457 UART: [exit] Launching FMC @ 0x40000130
35,852,103 UART:
35,852,344 UART: Running Caliptra FMC ...
35,853,447 UART:
35,853,610 UART: [state] CFI Enabled
35,897,943 UART: [art] Extend RT PCRs Done
35,899,086 UART: [art] Lock RT PCRs Done
35,900,489 UART: [art] Populate DV Done
35,906,175 UART: [fht] FMC Alias Private Key: 7
35,907,874 UART: [art] Derive CDI
35,908,610 UART: [art] Store in in slot 0x4
35,950,877 UART: [art] Derive Key Pair
35,951,913 UART: [art] Store priv key in slot 0x5
38,378,939 UART: [art] Derive Key Pair - Done
38,391,825 UART: [art] Signing Cert with AUTHO
38,393,131 UART: RITY.KEYID = 7
40,098,638 UART: [art] Erasing AUTHORITY.KEYID = 7
40,100,167 UART: [art] PUB.X = AF89AA160F338525BA9A5D276025DB019B1A95825A29F1CB79FDCC8BA7B660F5D05BA557F5E9494B11E5F206AAA2F5BA
40,107,390 UART: [art] PUB.Y = 931A0577131EC55EF64612788F49CE6B12CD8536AAF8C68E7A9A2D41F7C31D261095A961A488F41593214A26BD720FB8
40,114,661 UART: [art] SIG.R = 14D2D5A587827E0FC5AEC53F4F7098173EE0DEF2EB6C894DC252E9C58699A18DA4812F5B2038BF90BA4958DD74362555
40,122,081 UART: [art] SIG.S = 6B8401F2FC316F85F83868392FF1CE0DD2BAD64DA63A9F15076DAAF6EB4CD890B7164181111974934928ABFE3E6C5CBE
41,101,384 UART: Caliptra RT
41,102,073 UART: [state] CFI Enabled
41,388,657 UART: [rt] RT listening for mailbox commands...
41,390,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,420,354 UART: [rt]cmd =0x494e464f, len=4
41,424,579 >>> mbox cmd response data (312 bytes)
43,480,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
43,625,951 UART:
43,626,344 UART: Running Caliptra ROM ...
43,627,398 UART:
43,627,605 UART: [state] CFI Enabled
43,641,286 UART: [state] LifecycleState = Unprovisioned
43,643,190 UART: [state] DebugLocked = No
43,644,623 UART: [state] WD Timer not started. Device not locked for debugging
43,650,017 UART: [kat] SHA2-256
43,839,909 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,850,676 UART: [kat] ++
43,851,276 UART: [kat] sha1
43,862,114 UART: [kat] SHA2-256
43,865,136 UART: [kat] SHA2-384
43,872,207 UART: [kat] SHA2-512-ACC
43,874,779 UART: [kat] ECC-384
46,319,411 UART: [kat] HMAC-384Kdf
46,332,367 UART: [kat] LMS
46,864,000 UART: [kat] --
46,868,970 UART: [update-reset] ++
50,316,969 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,319,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
50,926,046 >>> mbox cmd response: success
50,927,957 UART: [update-reset] Copying MAN_2 To MAN_1
50,965,537 UART: [update-reset Success] --
50,970,792 UART: [state] Locking Datavault
50,974,605 UART: [state] Locking PCR0, PCR1 and PCR31
50,976,761 UART: [state] Locking ICCM
50,979,409 UART: [exit] Launching FMC @ 0x40000130
50,988,092 UART:
50,988,332 UART: Running Caliptra FMC ...
50,989,436 UART:
50,989,592 UART: [state] CFI Enabled
51,033,065 UART: [art] Extend RT PCRs Done
51,034,238 UART: [art] Lock RT PCRs Done
51,035,798 UART: [art] Populate DV Done
51,041,274 UART: [fht] FMC Alias Private Key: 7
51,042,924 UART: [art] Derive CDI
51,043,742 UART: [art] Store in in slot 0x4
51,086,119 UART: [art] Derive Key Pair
51,087,125 UART: [art] Store priv key in slot 0x5
53,514,254 UART: [art] Derive Key Pair - Done
53,526,950 UART: [art] Signing Cert with AUTHO
53,528,257 UART: RITY.KEYID = 7
55,233,902 UART: [art] Erasing AUTHORITY.KEYID = 7
55,235,407 UART: [art] PUB.X = C6E83769AF0B91C5FD4969C20A12125F13295B714CDDD4C9F373CDDC1E629F68DBFE39B01EEA461C669DD4093183BFBB
55,242,686 UART: [art] PUB.Y = 61832BE09DD6537AB385F4C64DDE6000466C09220F539C0EE76B12447667A9232E1A212CCAAE8285A3612B9855C4CDEA
55,249,949 UART: [art] SIG.R = 1ED1999D18A703326E152EC8FB6F528F6F81F7CFA200234DC7BC5724E7AC827550CABC8BE7DDDEAE30CA63DD9058CE63
55,257,323 UART: [art] SIG.S = 69844E2CE17C56596581EF16843021922ED99DF3A8938EBC1730990F679CBEF1BDF16E11B124CDEEA21396766A576811
56,235,544 UART: Caliptra RT
56,236,272 UART: [state] CFI Enabled
56,527,346 UART: [rt] RT listening for mailbox commands...
56,529,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,558,962 UART: [rt]cmd =0x494e464f, len=4
56,563,544 >>> mbox cmd response data (312 bytes)
56,565,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
56,709,469 UART:
56,709,773 UART: Running Caliptra ROM ...
56,710,812 UART:
56,711,070 UART: [state] CFI Enabled
56,726,003 UART: [state] LifecycleState = Unprovisioned
56,727,940 UART: [state] DebugLocked = No
56,730,649 UART: [state] WD Timer not started. Device not locked for debugging
56,735,551 UART: [kat] SHA2-256
56,925,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,936,189 UART: [kat] ++
56,936,720 UART: [kat] sha1
56,948,364 UART: [kat] SHA2-256
56,951,382 UART: [kat] SHA2-384
56,957,804 UART: [kat] SHA2-512-ACC
56,960,354 UART: [kat] ECC-384
59,400,107 UART: [kat] HMAC-384Kdf
59,413,745 UART: [kat] LMS
59,945,362 UART: [kat] --
59,949,091 UART: [update-reset] ++
63,405,172 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,408,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
64,014,338 >>> mbox cmd response: success
64,015,392 UART: [update-reset] Copying MAN_2 To MAN_1
64,052,987 UART: [update-reset Success] --
64,057,232 UART: [state] Locking Datavault
64,060,661 UART: [state] Locking PCR0, PCR1 and PCR31
64,062,841 UART: [state] Locking ICCM
64,065,332 UART: [exit] Launching FMC @ 0x40000130
64,073,966 UART:
64,074,204 UART: Running Caliptra FMC ...
64,075,527 UART:
64,075,698 UART: [state] CFI Enabled
64,119,795 UART: [art] Extend RT PCRs Done
64,120,942 UART: [art] Lock RT PCRs Done
64,122,362 UART: [art] Populate DV Done
64,128,037 UART: [fht] FMC Alias Private Key: 7
64,129,681 UART: [art] Derive CDI
64,130,418 UART: [art] Store in in slot 0x4
64,173,293 UART: [art] Derive Key Pair
64,174,358 UART: [art] Store priv key in slot 0x5
66,601,543 UART: [art] Derive Key Pair - Done
66,614,105 UART: [art] Signing Cert with AUTHO
66,615,422 UART: RITY.KEYID = 7
68,320,840 UART: [art] Erasing AUTHORITY.KEYID = 7
68,322,352 UART: [art] PUB.X = AF89AA160F338525BA9A5D276025DB019B1A95825A29F1CB79FDCC8BA7B660F5D05BA557F5E9494B11E5F206AAA2F5BA
68,329,577 UART: [art] PUB.Y = 931A0577131EC55EF64612788F49CE6B12CD8536AAF8C68E7A9A2D41F7C31D261095A961A488F41593214A26BD720FB8
68,336,842 UART: [art] SIG.R = 14D2D5A587827E0FC5AEC53F4F7098173EE0DEF2EB6C894DC252E9C58699A18DA4812F5B2038BF90BA4958DD74362555
68,344,263 UART: [art] SIG.S = 6B8401F2FC316F85F83868392FF1CE0DD2BAD64DA63A9F15076DAAF6EB4CD890B7164181111974934928ABFE3E6C5CBE
69,322,848 UART: Caliptra RT
69,323,541 UART: [state] CFI Enabled
69,612,362 UART: [rt] RT listening for mailbox commands...
69,614,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,643,870 UART: [rt]cmd =0x494e464f, len=4
69,648,040 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
3,757,609 ready_for_fw is high
3,757,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,956,254 >>> mbox cmd response: success
14,957,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,204,511 UART:
19,204,891 UART: Running Caliptra FMC ...
19,205,996 UART:
19,206,152 UART: [state] CFI Enabled
19,214,098 UART: [fht] FMC Alias Private Key: 7
20,971,055 UART: [art] Extend RT PCRs Done
20,972,283 UART: [art] Lock RT PCRs Done
20,973,846 UART: [art] Populate DV Done
20,979,230 UART: [fht] FMC Alias Private Key: 7
20,980,776 UART: [art] Derive CDI
20,981,516 UART: [art] Store in in slot 0x4
21,024,325 UART: [art] Derive Key Pair
21,025,330 UART: [art] Store priv key in slot 0x5
23,452,538 UART: [art] Derive Key Pair - Done
23,465,915 UART: [art] Signing Cert with AUTHO
23,467,222 UART: RITY.KEYID = 7
25,172,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,313 UART: [art] PUB.X = 5BDAF43B77B45AA2C701EAED077F818E9FAEFB033087AB92C1D476D90970C1846E2D00CC93B204D2AEFA05DCB6B34920
25,181,610 UART: [art] PUB.Y = AE99196474F9E7CF0B659E88B01D5423A62526C9B3FCCC1BE2F4145FBFDBD95F59860AA89A5E6842EEE6AE4AF2018172
25,188,900 UART: [art] SIG.R = 5936D073650889A2CBA08DE6302E3A53A9D15B6D0B852284645F4565EC6D326E36500230507B390666163D92883E32C2
25,196,250 UART: [art] SIG.S = 6A32AE33F98BC0DF99BE6F6D439E6457FA0836D5885D0FA83519D4FA94C29CE60658288027BA111D65DA5C0E98197054
26,174,891 UART: Caliptra RT
26,175,604 UART: [state] CFI Enabled
26,293,431 UART: [rt] RT listening for mailbox commands...
26,324,750 UART: [rt]cmd =0x494e464f, len=4
26,328,977 >>> mbox cmd response data (312 bytes)
28,386,111 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
36,117,286 >>> mbox cmd response: success
36,151,144 UART:
36,151,478 UART: Running Caliptra FMC ...
36,152,611 UART:
36,152,783 UART: [state] CFI Enabled
36,197,093 UART: [art] Extend RT PCRs Done
36,198,255 UART: [art] Lock RT PCRs Done
36,199,770 UART: [art] Populate DV Done
36,205,081 UART: [fht] FMC Alias Private Key: 7
36,206,572 UART: [art] Derive CDI
36,207,339 UART: [art] Store in in slot 0x4
36,250,277 UART: [art] Derive Key Pair
36,251,349 UART: [art] Store priv key in slot 0x5
38,678,345 UART: [art] Derive Key Pair - Done
38,691,018 UART: [art] Signing Cert with AUTHO
38,692,330 UART: RITY.KEYID = 7
40,398,193 UART: [art] Erasing AUTHORITY.KEYID = 7
40,399,699 UART: [art] PUB.X = EE18277D04C47C11CE2511C2092EA57D97B062D558398B9AB7BAFA8270190FBBDDC91E7A1F96BC867D33292E3CB96643
40,406,993 UART: [art] PUB.Y = 473202E74970FE8E5DF24E0A994DF880C882FD4EF100BB6A5745348C623A3094DFB3CDD6367BAFE74C8652CBCDD6ED7F
40,414,276 UART: [art] SIG.R = 790789C3AF705F063B0809E843747F605A902A55626B1CC753AAED3734615F6291991BFD365811B6EC8493380415FDA7
40,421,610 UART: [art] SIG.S = 44E8BC95A550EF2318850103B1FCDFEFA1B947E850A5437F12FF80518FAA868ECD935F7F69EFF11B00E8EA11F6C1FEF2
41,400,613 UART: Caliptra RT
41,401,310 UART: [state] CFI Enabled
41,688,985 UART: [rt] RT listening for mailbox commands...
41,690,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,720,392 UART: [rt]cmd =0x494e464f, len=4
41,724,728 >>> mbox cmd response data (312 bytes)
43,779,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
51,493,110 >>> mbox cmd response: success
51,528,201 UART:
51,528,541 UART: Running Caliptra FMC ...
51,529,590 UART:
51,529,742 UART: [state] CFI Enabled
51,573,823 UART: [art] Extend RT PCRs Done
51,574,998 UART: [art] Lock RT PCRs Done
51,576,808 UART: [art] Populate DV Done
51,582,051 UART: [fht] FMC Alias Private Key: 7
51,583,653 UART: [art] Derive CDI
51,584,421 UART: [art] Store in in slot 0x4
51,627,104 UART: [art] Derive Key Pair
51,628,154 UART: [art] Store priv key in slot 0x5
54,055,343 UART: [art] Derive Key Pair - Done
54,068,228 UART: [art] Signing Cert with AUTHO
54,069,572 UART: RITY.KEYID = 7
55,775,171 UART: [art] Erasing AUTHORITY.KEYID = 7
55,776,682 UART: [art] PUB.X = AF4FEF61DBE9E8923CE515B649598177F1AE55A49F38E9E283D76846AE3645DD8AF17932CC788A683BC1B6136B3138BF
55,783,934 UART: [art] PUB.Y = 41558AB95CBBD2CC66EB85BF2A741D3EABCBD326337FEB537259D5F4181A3D75FD792226B5049BB5F6E2AB3E1DC10448
55,791,215 UART: [art] SIG.R = C5FD7918C78620D73617CC0578B9E5050210C35EA7674FF645B04D792B6D354ABCF7B3EE82088E71A601285A38B368C7
55,798,597 UART: [art] SIG.S = F5BC29DC4C287F7F39DAE2B79C0FBAEE32D34BEF5588F3B924382AD3ADD44AB2A51DE5E6E9129CC5ABA93862D08252F0
56,778,639 UART: Caliptra RT
56,779,350 UART: [state] CFI Enabled
57,066,294 UART: [rt] RT listening for mailbox commands...
57,068,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,097,789 UART: [rt]cmd =0x494e464f, len=4
57,101,953 >>> mbox cmd response data (312 bytes)
57,103,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
64,821,589 >>> mbox cmd response: success
64,858,406 UART:
64,858,679 UART: Running Caliptra FMC ...
64,859,794 UART:
64,859,949 UART: [state] CFI Enabled
64,903,918 UART: [art] Extend RT PCRs Done
64,905,102 UART: [art] Lock RT PCRs Done
64,906,781 UART: [art] Populate DV Done
64,912,144 UART: [fht] FMC Alias Private Key: 7
64,913,791 UART: [art] Derive CDI
64,914,632 UART: [art] Store in in slot 0x4
64,957,290 UART: [art] Derive Key Pair
64,958,328 UART: [art] Store priv key in slot 0x5
67,385,353 UART: [art] Derive Key Pair - Done
67,397,817 UART: [art] Signing Cert with AUTHO
67,399,123 UART: RITY.KEYID = 7
69,104,786 UART: [art] Erasing AUTHORITY.KEYID = 7
69,106,281 UART: [art] PUB.X = EE18277D04C47C11CE2511C2092EA57D97B062D558398B9AB7BAFA8270190FBBDDC91E7A1F96BC867D33292E3CB96643
69,113,593 UART: [art] PUB.Y = 473202E74970FE8E5DF24E0A994DF880C882FD4EF100BB6A5745348C623A3094DFB3CDD6367BAFE74C8652CBCDD6ED7F
69,120,885 UART: [art] SIG.R = 790789C3AF705F063B0809E843747F605A902A55626B1CC753AAED3734615F6291991BFD365811B6EC8493380415FDA7
69,128,231 UART: [art] SIG.S = 44E8BC95A550EF2318850103B1FCDFEFA1B947E850A5437F12FF80518FAA868ECD935F7F69EFF11B00E8EA11F6C1FEF2
70,107,471 UART: Caliptra RT
70,108,185 UART: [state] CFI Enabled
70,393,568 UART: [rt] RT listening for mailbox commands...
70,395,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,425,251 UART: [rt]cmd =0x494e464f, len=4
70,429,611 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.64s
Truncated 2120 bytes from beginning
,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,512 UART: [ldev] --
1,585,951 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114084 bytes
2,881,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,834 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,186 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,725 >>> mbox cmd response: success
3,073,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,074,751 UART: [afmc] ++
3,074,919 UART: [afmc] CDI.KEYID = 6
3,075,281 UART: [afmc] SUBJECT.KEYID = 7
3,075,706 UART: [afmc] AUTHORITY.KEYID = 5
3,110,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,970 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,750 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,133,442 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,139,315 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,145,029 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,152,956 UART: [afmc] --
3,153,932 UART: [cold-reset] --
3,154,796 UART: [state] Locking Datavault
3,156,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,825 UART: [state] Locking ICCM
3,157,245 UART: [exit] Launching FMC @ 0x40000130
3,162,574 UART:
3,162,590 UART: Running Caliptra FMC ...
3,162,998 UART:
3,163,052 UART: [state] CFI Enabled
3,173,814 UART: [fht] FMC Alias Private Key: 7
3,281,621 UART: [art] Extend RT PCRs Done
3,282,049 UART: [art] Lock RT PCRs Done
3,283,689 UART: [art] Populate DV Done
3,291,927 UART: [fht] FMC Alias Private Key: 7
3,293,075 UART: [art] Derive CDI
3,293,355 UART: [art] Store in in slot 0x4
3,379,172 UART: [art] Derive Key Pair
3,379,532 UART: [art] Store priv key in slot 0x5
3,392,648 UART: [art] Derive Key Pair - Done
3,407,510 UART: [art] Signing Cert with AUTHO
3,407,990 UART: RITY.KEYID = 7
3,423,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,885 UART: [art] PUB.X = 998DBD64EB14119FDE13F259859A8CFCDB8E1FF8D1633D1150C09E5CCEA7E87E469929CB0BD50130669143713DE1D164
3,430,657 UART: [art] PUB.Y = E25E7510B9DFF8863DE01853D0B47A1002B608199F4F89C31DDD31A4B39BD476F61579AB976DA19C3FBBB6DA18D2D77E
3,437,613 UART: [art] SIG.R = 669508D862EA0C171656413AFFE26A6031A42DBB053AF7C5E3F734B862CA5E2E04161485FCF227EF60D8022801C53A4E
3,444,367 UART: [art] SIG.S = CB07626C786791F866760989EC800867DD2E41FCD4CB63636F89BB0424E7695BF491FC3D4D2DF57D31424352BB25A5D4
3,468,292 UART: Caliptra RT
3,468,545 UART: [state] CFI Enabled
3,577,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,386 UART: [rt]cmd =0x494e464f, len=4
3,611,967 >>> mbox cmd response data (312 bytes)
3,611,968 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,694 UART:
3,612,710 UART: Running Caliptra ROM ...
3,613,118 UART:
3,613,172 UART: [state] CFI Enabled
3,615,448 UART: [state] LifecycleState = Unprovisioned
3,616,103 UART: [state] DebugLocked = No
3,616,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,330 UART: [kat] SHA2-256
4,412,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,376 UART: [kat] ++
4,416,528 UART: [kat] sha1
4,420,748 UART: [kat] SHA2-256
4,422,686 UART: [kat] SHA2-384
4,425,385 UART: [kat] SHA2-512-ACC
4,427,285 UART: [kat] ECC-384
4,432,658 UART: [kat] HMAC-384Kdf
4,437,146 UART: [kat] LMS
5,005,342 UART: [kat] --
5,006,181 UART: [update-reset] ++
6,337,320 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,338,494 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,487,998 >>> mbox cmd response: success
6,488,285 UART: [update-reset] Copying MAN_2 To MAN_1
6,496,299 UART: [update-reset Success] --
6,497,398 UART: [state] Locking Datavault
6,498,010 UART: [state] Locking PCR0, PCR1 and PCR31
6,498,614 UART: [state] Locking ICCM
6,499,232 UART: [exit] Launching FMC @ 0x40000130
6,504,561 UART:
6,504,577 UART: Running Caliptra FMC ...
6,504,985 UART:
6,505,039 UART: [state] CFI Enabled
6,594,062 UART: [art] Extend RT PCRs Done
6,594,490 UART: [art] Lock RT PCRs Done
6,595,827 UART: [art] Populate DV Done
6,603,831 UART: [fht] FMC Alias Private Key: 7
6,604,979 UART: [art] Derive CDI
6,605,259 UART: [art] Store in in slot 0x4
6,690,218 UART: [art] Derive Key Pair
6,690,578 UART: [art] Store priv key in slot 0x5
6,703,820 UART: [art] Derive Key Pair - Done
6,718,402 UART: [art] Signing Cert with AUTHO
6,718,882 UART: RITY.KEYID = 7
6,734,034 UART: [art] Erasing AUTHORITY.KEYID = 7
6,734,799 UART: [art] PUB.X = 74D29E1FBA4260A964CE60738498E6AE16E22D84CA6A44637EA1864CDF356319AD68F40531FA9D90A3D259B920DDCDB9
6,741,574 UART: [art] PUB.Y = C935DCBB82D5B08AF39122652475092AEC97F3335CA5B55797EF127611ECB8DA1711C53C8FCADCDD550EDD1B2AAE0154
6,748,531 UART: [art] SIG.R = 1E8F7D1A00D8737D28F23B7741DFBD9ED1BD3B2B9417AA23B3AE0609C0AACF445F0D9339066EB882B54C0310B3255AEB
6,755,278 UART: [art] SIG.S = D72B469E8A4A4E70BB12F6508F4F8E27BDCCB0AA5A4065C6301928FA406F990F262CEC3CF5315539FE18D55765ACD613
6,779,620 UART: Caliptra RT
6,779,873 UART: [state] CFI Enabled
7,065,824 UART: [rt] RT listening for mailbox commands...
7,066,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,111 UART: [rt]cmd =0x494e464f, len=4
7,099,870 >>> mbox cmd response data (312 bytes)
7,099,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,100,723 UART:
7,100,739 UART: Running Caliptra ROM ...
7,101,147 UART:
7,101,201 UART: [state] CFI Enabled
7,103,965 UART: [state] LifecycleState = Unprovisioned
7,104,620 UART: [state] DebugLocked = No
7,105,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,106,669 UART: [kat] SHA2-256
7,900,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,904,715 UART: [kat] ++
7,904,867 UART: [kat] sha1
7,909,175 UART: [kat] SHA2-256
7,911,113 UART: [kat] SHA2-384
7,913,842 UART: [kat] SHA2-512-ACC
7,915,742 UART: [kat] ECC-384
7,921,329 UART: [kat] HMAC-384Kdf
7,925,845 UART: [kat] LMS
8,494,041 UART: [kat] --
8,495,162 UART: [update-reset] ++
9,825,027 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,826,253 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
9,975,757 >>> mbox cmd response: success
9,975,956 UART: [update-reset] Copying MAN_2 To MAN_1
9,983,970 UART: [update-reset Success] --
9,985,237 UART: [state] Locking Datavault
9,986,177 UART: [state] Locking PCR0, PCR1 and PCR31
9,986,781 UART: [state] Locking ICCM
9,987,209 UART: [exit] Launching FMC @ 0x40000130
9,992,538 UART:
9,992,554 UART: Running Caliptra FMC ...
9,992,962 UART:
9,993,016 UART: [state] CFI Enabled
10,082,787 UART: [art] Extend RT PCRs Done
10,083,215 UART: [art] Lock RT PCRs Done
10,084,210 UART: [art] Populate DV Done
10,092,276 UART: [fht] FMC Alias Private Key: 7
10,093,328 UART: [art] Derive CDI
10,093,608 UART: [art] Store in in slot 0x4
10,179,481 UART: [art] Derive Key Pair
10,179,841 UART: [art] Store priv key in slot 0x5
10,193,167 UART: [art] Derive Key Pair - Done
10,208,001 UART: [art] Signing Cert with AUTHO
10,208,481 UART: RITY.KEYID = 7
10,223,141 UART: [art] Erasing AUTHORITY.KEYID = 7
10,223,906 UART: [art] PUB.X = 461204C91AE7276581AC17DFE9F9BFCC1F95CB94950C92231D0B2E8EBACCCE27F675235321EAD890D37AE8D4B49C394B
10,230,681 UART: [art] PUB.Y = 942B6CEC709FFBFEC40DE14D5C24DE9722718C8C1DDD6FDA81DB7AD42EF3C07BEB782FFC82D1939A119D20F86233843B
10,237,650 UART: [art] SIG.R = 600ABF293ED10A095B42CA5FCDCA1514693187ADBDDD0A11940AEC0823AD1AF2B9963D4D364A77E3CF236FE078F73B9C
10,244,420 UART: [art] SIG.S = BC1C9B3F2677B0411B74F204345992BB2D3E5AE066E13F58189A2483CEDF465AE9D25863B74525507707F7711B204964
10,268,235 UART: Caliptra RT
10,268,488 UART: [state] CFI Enabled
10,548,853 UART: [rt] RT listening for mailbox commands...
10,549,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,579,090 UART: [rt]cmd =0x494e464f, len=4
10,582,867 >>> mbox cmd response data (312 bytes)
10,582,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,583,532 UART:
10,583,548 UART: Running Caliptra ROM ...
10,583,956 UART:
10,584,010 UART: [state] CFI Enabled
10,586,650 UART: [state] LifecycleState = Unprovisioned
10,587,305 UART: [state] DebugLocked = No
10,587,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,589,506 UART: [kat] SHA2-256
11,383,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,387,552 UART: [kat] ++
11,387,704 UART: [kat] sha1
11,391,930 UART: [kat] SHA2-256
11,393,868 UART: [kat] SHA2-384
11,396,561 UART: [kat] SHA2-512-ACC
11,398,461 UART: [kat] ECC-384
11,404,076 UART: [kat] HMAC-384Kdf
11,408,712 UART: [kat] LMS
11,976,908 UART: [kat] --
11,977,741 UART: [update-reset] ++
13,309,022 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,310,108 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
13,459,612 >>> mbox cmd response: success
13,459,907 UART: [update-reset] Copying MAN_2 To MAN_1
13,467,921 UART: [update-reset Success] --
13,469,140 UART: [state] Locking Datavault
13,469,946 UART: [state] Locking PCR0, PCR1 and PCR31
13,470,550 UART: [state] Locking ICCM
13,471,162 UART: [exit] Launching FMC @ 0x40000130
13,476,491 UART:
13,476,507 UART: Running Caliptra FMC ...
13,476,915 UART:
13,476,969 UART: [state] CFI Enabled
13,565,712 UART: [art] Extend RT PCRs Done
13,566,140 UART: [art] Lock RT PCRs Done
13,567,341 UART: [art] Populate DV Done
13,575,397 UART: [fht] FMC Alias Private Key: 7
13,576,519 UART: [art] Derive CDI
13,576,799 UART: [art] Store in in slot 0x4
13,662,512 UART: [art] Derive Key Pair
13,662,872 UART: [art] Store priv key in slot 0x5
13,676,176 UART: [art] Derive Key Pair - Done
13,690,856 UART: [art] Signing Cert with AUTHO
13,691,336 UART: RITY.KEYID = 7
13,706,322 UART: [art] Erasing AUTHORITY.KEYID = 7
13,707,087 UART: [art] PUB.X = 74D29E1FBA4260A964CE60738498E6AE16E22D84CA6A44637EA1864CDF356319AD68F40531FA9D90A3D259B920DDCDB9
13,713,862 UART: [art] PUB.Y = C935DCBB82D5B08AF39122652475092AEC97F3335CA5B55797EF127611ECB8DA1711C53C8FCADCDD550EDD1B2AAE0154
13,720,819 UART: [art] SIG.R = 1E8F7D1A00D8737D28F23B7741DFBD9ED1BD3B2B9417AA23B3AE0609C0AACF445F0D9339066EB882B54C0310B3255AEB
13,727,566 UART: [art] SIG.S = D72B469E8A4A4E70BB12F6508F4F8E27BDCCB0AA5A4065C6301928FA406F990F262CEC3CF5315539FE18D55765ACD613
13,751,502 UART: Caliptra RT
13,751,755 UART: [state] CFI Enabled
14,037,844 UART: [rt] RT listening for mailbox commands...
14,038,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,067,889 UART: [rt]cmd =0x494e464f, len=4
14,071,700 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 4.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,063 >>> mbox cmd response: success
2,923,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,984,478 UART:
2,984,494 UART: Running Caliptra FMC ...
2,984,902 UART:
2,984,956 UART: [state] CFI Enabled
2,995,530 UART: [fht] FMC Alias Private Key: 7
3,103,443 UART: [art] Extend RT PCRs Done
3,103,871 UART: [art] Lock RT PCRs Done
3,105,287 UART: [art] Populate DV Done
3,113,597 UART: [fht] FMC Alias Private Key: 7
3,114,769 UART: [art] Derive CDI
3,115,049 UART: [art] Store in in slot 0x4
3,200,336 UART: [art] Derive Key Pair
3,200,696 UART: [art] Store priv key in slot 0x5
3,213,608 UART: [art] Derive Key Pair - Done
3,228,481 UART: [art] Signing Cert with AUTHO
3,228,961 UART: RITY.KEYID = 7
3,244,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,952 UART: [art] PUB.X = 184A32671B32C71AEDC9BE8AF850A66A2D7D9A77D51A461D8F21F8FEC45558AAB1582EE281444540F10C3534ED794B14
3,251,725 UART: [art] PUB.Y = 3303180CC2C67527B6F012901B8A739BDD549E0AD6E17359B78F166350D303DE1233A432B4C911CD1D6B6B2F06ADF103
3,258,657 UART: [art] SIG.R = A8B9A2FBAAA7EC386E82550F33B582C6661390F52F387E081FE36D6BA001A6536D37E795120CCFF0D153A45E07E406F0
3,265,415 UART: [art] SIG.S = B5F93316DA456D83A84C3D611C617E9CA7AF5C907A96E5CA724414484DD0DE0193D1DF6AC9D669061B90EF994844DD1C
3,288,836 UART: Caliptra RT
3,289,089 UART: [state] CFI Enabled
3,397,031 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,689 UART: [rt]cmd =0x494e464f, len=4
3,431,400 >>> mbox cmd response data (312 bytes)
3,431,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,188,551 >>> mbox cmd response: success
6,201,930 UART:
6,201,946 UART: Running Caliptra FMC ...
6,202,354 UART:
6,202,408 UART: [state] CFI Enabled
6,291,499 UART: [art] Extend RT PCRs Done
6,291,927 UART: [art] Lock RT PCRs Done
6,293,270 UART: [art] Populate DV Done
6,301,236 UART: [fht] FMC Alias Private Key: 7
6,302,384 UART: [art] Derive CDI
6,302,664 UART: [art] Store in in slot 0x4
6,388,387 UART: [art] Derive Key Pair
6,388,747 UART: [art] Store priv key in slot 0x5
6,401,105 UART: [art] Derive Key Pair - Done
6,415,905 UART: [art] Signing Cert with AUTHO
6,416,385 UART: RITY.KEYID = 7
6,432,111 UART: [art] Erasing AUTHORITY.KEYID = 7
6,432,876 UART: [art] PUB.X = 681601DB8FFDDD3B2A5002C85AE427E38EBE4D988967449597472EC71D0915D200B6ABE023A5C53A379D1356BB8DDA41
6,439,621 UART: [art] PUB.Y = 42E0BE2BCE7CC624EDD412A15B365D5739137AD66419DBF4293A2A5CC36E96E00BBB6D5904934865A1EA1ACB3C43D93B
6,446,579 UART: [art] SIG.R = 83CEADA9B9612C3246A9288C2F46CF575F4233B6BB5BDE121CF02FDD1ED1999C8E425F7BD758AEAF2FDFC72AF5045B4E
6,453,370 UART: [art] SIG.S = 48156641015D816472A0CAA516C88475F37158CA66AA6DE2752A316423A8318FD546C03BBBBEEABEA74A2BA13A944379
6,477,216 UART: Caliptra RT
6,477,469 UART: [state] CFI Enabled
6,760,360 UART: [rt] RT listening for mailbox commands...
6,761,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,790,505 UART: [rt]cmd =0x494e464f, len=4
6,794,232 >>> mbox cmd response data (312 bytes)
6,794,233 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,552,941 >>> mbox cmd response: success
9,566,214 UART:
9,566,230 UART: Running Caliptra FMC ...
9,566,638 UART:
9,566,692 UART: [state] CFI Enabled
9,655,963 UART: [art] Extend RT PCRs Done
9,656,391 UART: [art] Lock RT PCRs Done
9,657,714 UART: [art] Populate DV Done
9,666,124 UART: [fht] FMC Alias Private Key: 7
9,667,106 UART: [art] Derive CDI
9,667,386 UART: [art] Store in in slot 0x4
9,753,051 UART: [art] Derive Key Pair
9,753,411 UART: [art] Store priv key in slot 0x5
9,766,523 UART: [art] Derive Key Pair - Done
9,781,467 UART: [art] Signing Cert with AUTHO
9,781,947 UART: RITY.KEYID = 7
9,797,091 UART: [art] Erasing AUTHORITY.KEYID = 7
9,797,856 UART: [art] PUB.X = 6A8EC6CE17BE8C461EB3A990BE232771A8F395796127F18AD4189415E65CD8A1174D83559B1A6EBDEA3350F34AA02594
9,804,630 UART: [art] PUB.Y = DEE58C82F15848BFA43A72B0591CE09E0790CC518E813F3D3F711538911463FC79C517263F4BDD45D6F3EC3511C3B24C
9,811,581 UART: [art] SIG.R = 9C275EC0E622E073BB76DA1B0B1350F288159E5E45009E863407077B50F43B79026947D130891FAA5E752323A680E453
9,818,305 UART: [art] SIG.S = 2C45EA10F8BBFBFCFC3C4F3922804F12C5F90D06C97D00C9BD83EF20D77FB8C9B57895237BDBED8A7F4F64124E5A86C0
9,841,624 UART: Caliptra RT
9,841,877 UART: [state] CFI Enabled
10,123,804 UART: [rt] RT listening for mailbox commands...
10,124,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,153,915 UART: [rt]cmd =0x494e464f, len=4
10,157,636 >>> mbox cmd response data (312 bytes)
10,157,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,914,939 >>> mbox cmd response: success
12,928,184 UART:
12,928,200 UART: Running Caliptra FMC ...
12,928,608 UART:
12,928,662 UART: [state] CFI Enabled
13,017,719 UART: [art] Extend RT PCRs Done
13,018,147 UART: [art] Lock RT PCRs Done
13,019,276 UART: [art] Populate DV Done
13,027,688 UART: [fht] FMC Alias Private Key: 7
13,028,752 UART: [art] Derive CDI
13,029,032 UART: [art] Store in in slot 0x4
13,114,785 UART: [art] Derive Key Pair
13,115,145 UART: [art] Store priv key in slot 0x5
13,128,795 UART: [art] Derive Key Pair - Done
13,143,753 UART: [art] Signing Cert with AUTHO
13,144,233 UART: RITY.KEYID = 7
13,159,031 UART: [art] Erasing AUTHORITY.KEYID = 7
13,159,796 UART: [art] PUB.X = 681601DB8FFDDD3B2A5002C85AE427E38EBE4D988967449597472EC71D0915D200B6ABE023A5C53A379D1356BB8DDA41
13,166,541 UART: [art] PUB.Y = 42E0BE2BCE7CC624EDD412A15B365D5739137AD66419DBF4293A2A5CC36E96E00BBB6D5904934865A1EA1ACB3C43D93B
13,173,499 UART: [art] SIG.R = 83CEADA9B9612C3246A9288C2F46CF575F4233B6BB5BDE121CF02FDD1ED1999C8E425F7BD758AEAF2FDFC72AF5045B4E
13,180,290 UART: [art] SIG.S = 48156641015D816472A0CAA516C88475F37158CA66AA6DE2752A316423A8318FD546C03BBBBEEABEA74A2BA13A944379
13,203,480 UART: Caliptra RT
13,203,733 UART: [state] CFI Enabled
13,488,362 UART: [rt] RT listening for mailbox commands...
13,489,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,518,351 UART: [rt]cmd =0x494e464f, len=4
13,522,184 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.78s
Truncated 2120 bytes from beginning
,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,631 UART: [ldev] --
1,588,990 UART: [fwproc] Waiting for Commands...
1,589,827 UART: [fwproc] Received command 0x46574c44
1,590,618 UART: [fwproc] Received Image of size 114084 bytes
2,884,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,568 >>> mbox cmd response: success
3,076,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,077,742 UART: [afmc] ++
3,077,910 UART: [afmc] CDI.KEYID = 6
3,078,272 UART: [afmc] SUBJECT.KEYID = 7
3,078,697 UART: [afmc] AUTHORITY.KEYID = 5
3,114,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,311 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,091 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,136,783 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,142,656 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,148,370 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,191 UART: [afmc] --
3,157,291 UART: [cold-reset] --
3,158,213 UART: [state] Locking Datavault
3,159,402 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,006 UART: [state] Locking ICCM
3,160,548 UART: [exit] Launching FMC @ 0x40000130
3,165,877 UART:
3,165,893 UART: Running Caliptra FMC ...
3,166,301 UART:
3,166,444 UART: [state] CFI Enabled
3,176,892 UART: [fht] FMC Alias Private Key: 7
3,285,475 UART: [art] Extend RT PCRs Done
3,285,903 UART: [art] Lock RT PCRs Done
3,287,375 UART: [art] Populate DV Done
3,295,575 UART: [fht] FMC Alias Private Key: 7
3,296,659 UART: [art] Derive CDI
3,296,939 UART: [art] Store in in slot 0x4
3,382,390 UART: [art] Derive Key Pair
3,382,750 UART: [art] Store priv key in slot 0x5
3,395,888 UART: [art] Derive Key Pair - Done
3,410,483 UART: [art] Signing Cert with AUTHO
3,410,963 UART: RITY.KEYID = 7
3,426,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,234 UART: [art] PUB.X = 0A05ACD32F64C92588C5BCB058D92F4718D624427D550D38F7A82FB6E4A8D8D7FBD1A26FEF7E29D669AE6E0F31D316E6
3,434,006 UART: [art] PUB.Y = E355259A91D43EDF1D98D40F02ED75CEA99F31B5BC6EDBD330B6F68F2373BD3B9EF9F915D01F79A43F9961318F7A5402
3,440,959 UART: [art] SIG.R = B0E45E150180DE8CA63E9B51C060FBEDEDC66B0D80F3F8DEAA866F2ADB484AE3D4BA46DD3F290D70B8ABEDEF278C1C08
3,447,749 UART: [art] SIG.S = F039AF7D6252092CB5292C5A072CA94B9B126752BBBBE863368D60C968F9DDCE19AD045D19428D20CE6C3B0D345104E2
3,471,319 UART: Caliptra RT
3,471,664 UART: [state] CFI Enabled
3,580,858 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,434 UART: [rt]cmd =0x494e464f, len=4
3,615,365 >>> mbox cmd response data (312 bytes)
3,615,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,214 UART:
3,616,230 UART: Running Caliptra ROM ...
3,616,638 UART:
3,616,779 UART: [state] CFI Enabled
3,619,475 UART: [state] LifecycleState = Unprovisioned
3,620,130 UART: [state] DebugLocked = No
3,620,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,201 UART: [kat] SHA2-256
4,416,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,247 UART: [kat] ++
4,420,399 UART: [kat] sha1
4,424,491 UART: [kat] SHA2-256
4,426,429 UART: [kat] SHA2-384
4,429,058 UART: [kat] SHA2-512-ACC
4,430,958 UART: [kat] ECC-384
4,436,453 UART: [kat] HMAC-384Kdf
4,441,147 UART: [kat] LMS
5,009,343 UART: [kat] --
5,010,046 UART: [update-reset] ++
6,342,169 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,343,245 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,492,749 >>> mbox cmd response: success
6,492,990 UART: [update-reset] Copying MAN_2 To MAN_1
6,501,004 UART: [update-reset Success] --
6,501,829 UART: [state] Locking Datavault
6,502,561 UART: [state] Locking PCR0, PCR1 and PCR31
6,503,165 UART: [state] Locking ICCM
6,503,605 UART: [exit] Launching FMC @ 0x40000130
6,508,934 UART:
6,508,950 UART: Running Caliptra FMC ...
6,509,358 UART:
6,509,501 UART: [state] CFI Enabled
6,598,404 UART: [art] Extend RT PCRs Done
6,598,832 UART: [art] Lock RT PCRs Done
6,600,247 UART: [art] Populate DV Done
6,608,213 UART: [fht] FMC Alias Private Key: 7
6,609,155 UART: [art] Derive CDI
6,609,435 UART: [art] Store in in slot 0x4
6,695,152 UART: [art] Derive Key Pair
6,695,512 UART: [art] Store priv key in slot 0x5
6,708,582 UART: [art] Derive Key Pair - Done
6,723,396 UART: [art] Signing Cert with AUTHO
6,723,876 UART: RITY.KEYID = 7
6,739,482 UART: [art] Erasing AUTHORITY.KEYID = 7
6,740,247 UART: [art] PUB.X = 82A42E32FE74670A861135D3117D2A48D406D0E20628A5E406ECB947567CCE3F2950F105D07BB6CA5340D14237BF241A
6,747,000 UART: [art] PUB.Y = 93163C419AE433C38534138EDA40797B285632ED5D34A261E40C6BE46FC2397E9F598B078ADD63FEF9D557499A09E265
6,753,939 UART: [art] SIG.R = 4E9C8CC29818C171FF50CEFC9963A6AABE1573EFD247BE949508F1FD2C1B8759508D7EC7D4C4617C49E2A9DD7A9C3265
6,760,720 UART: [art] SIG.S = 280E453786D6F15CA64E4C5D071A01F0B65763CD13288351EA3CCE4FE583B54282FE687CD9DA25AF5C157E133BD74280
6,784,702 UART: Caliptra RT
6,785,047 UART: [state] CFI Enabled
7,068,389 UART: [rt] RT listening for mailbox commands...
7,069,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,098,882 UART: [rt]cmd =0x494e464f, len=4
7,102,723 >>> mbox cmd response data (312 bytes)
7,102,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,103,520 UART:
7,103,536 UART: Running Caliptra ROM ...
7,103,944 UART:
7,104,085 UART: [state] CFI Enabled
7,106,993 UART: [state] LifecycleState = Unprovisioned
7,107,648 UART: [state] DebugLocked = No
7,108,148 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,109,661 UART: [kat] SHA2-256
7,903,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,907,707 UART: [kat] ++
7,907,859 UART: [kat] sha1
7,912,061 UART: [kat] SHA2-256
7,913,999 UART: [kat] SHA2-384
7,916,784 UART: [kat] SHA2-512-ACC
7,918,684 UART: [kat] ECC-384
7,924,335 UART: [kat] HMAC-384Kdf
7,928,951 UART: [kat] LMS
8,497,147 UART: [kat] --
8,498,050 UART: [update-reset] ++
9,828,703 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,829,929 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
9,979,433 >>> mbox cmd response: success
9,979,650 UART: [update-reset] Copying MAN_2 To MAN_1
9,987,664 UART: [update-reset Success] --
9,988,587 UART: [state] Locking Datavault
9,989,423 UART: [state] Locking PCR0, PCR1 and PCR31
9,990,027 UART: [state] Locking ICCM
9,990,551 UART: [exit] Launching FMC @ 0x40000130
9,995,880 UART:
9,995,896 UART: Running Caliptra FMC ...
9,996,304 UART:
9,996,447 UART: [state] CFI Enabled
10,085,302 UART: [art] Extend RT PCRs Done
10,085,730 UART: [art] Lock RT PCRs Done
10,087,063 UART: [art] Populate DV Done
10,095,469 UART: [fht] FMC Alias Private Key: 7
10,096,455 UART: [art] Derive CDI
10,096,735 UART: [art] Store in in slot 0x4
10,182,538 UART: [art] Derive Key Pair
10,182,898 UART: [art] Store priv key in slot 0x5
10,196,206 UART: [art] Derive Key Pair - Done
10,210,957 UART: [art] Signing Cert with AUTHO
10,211,437 UART: RITY.KEYID = 7
10,226,733 UART: [art] Erasing AUTHORITY.KEYID = 7
10,227,498 UART: [art] PUB.X = 36A6E7F37D978620F5B9697EB981C909AF6F4D2CFC87F38B60072D74499E59C7772968F079622292E245D15CFB791753
10,234,254 UART: [art] PUB.Y = 7CA74A71B7540A9B15618DC8718E985ACF12B777E4554197BA43BD91BDB02A3B2B63706E6996E2269EB184C2917F0390
10,241,196 UART: [art] SIG.R = 9323C6C80F41DC0B782425C01F82EA23380784BBE0B4A269F647BC28C0E3F09584EACC4354504E4A0795FDF92F78DF7F
10,247,960 UART: [art] SIG.S = AB674B366338F6B9FF448E2BD65A8BD7CCF9FFA0624D354257AA58DFABCAECB2ECE68002E72051AD3AB5899BF6478F77
10,271,584 UART: Caliptra RT
10,271,929 UART: [state] CFI Enabled
10,552,939 UART: [rt] RT listening for mailbox commands...
10,553,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,583,186 UART: [rt]cmd =0x494e464f, len=4
10,586,835 >>> mbox cmd response data (312 bytes)
10,586,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,587,682 UART:
10,587,698 UART: Running Caliptra ROM ...
10,588,106 UART:
10,588,247 UART: [state] CFI Enabled
10,590,757 UART: [state] LifecycleState = Unprovisioned
10,591,412 UART: [state] DebugLocked = No
10,592,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,593,755 UART: [kat] SHA2-256
11,387,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,391,801 UART: [kat] ++
11,391,953 UART: [kat] sha1
11,396,059 UART: [kat] SHA2-256
11,397,997 UART: [kat] SHA2-384
11,400,738 UART: [kat] SHA2-512-ACC
11,402,638 UART: [kat] ECC-384
11,408,221 UART: [kat] HMAC-384Kdf
11,412,777 UART: [kat] LMS
11,980,973 UART: [kat] --
11,981,848 UART: [update-reset] ++
13,314,951 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,316,157 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
13,465,661 >>> mbox cmd response: success
13,465,818 UART: [update-reset] Copying MAN_2 To MAN_1
13,473,832 UART: [update-reset Success] --
13,474,671 UART: [state] Locking Datavault
13,475,355 UART: [state] Locking PCR0, PCR1 and PCR31
13,475,959 UART: [state] Locking ICCM
13,476,573 UART: [exit] Launching FMC @ 0x40000130
13,481,902 UART:
13,481,918 UART: Running Caliptra FMC ...
13,482,326 UART:
13,482,469 UART: [state] CFI Enabled
13,571,674 UART: [art] Extend RT PCRs Done
13,572,102 UART: [art] Lock RT PCRs Done
13,573,151 UART: [art] Populate DV Done
13,581,269 UART: [fht] FMC Alias Private Key: 7
13,582,393 UART: [art] Derive CDI
13,582,673 UART: [art] Store in in slot 0x4
13,668,192 UART: [art] Derive Key Pair
13,668,552 UART: [art] Store priv key in slot 0x5
13,681,888 UART: [art] Derive Key Pair - Done
13,696,596 UART: [art] Signing Cert with AUTHO
13,697,076 UART: RITY.KEYID = 7
13,712,222 UART: [art] Erasing AUTHORITY.KEYID = 7
13,712,987 UART: [art] PUB.X = 82A42E32FE74670A861135D3117D2A48D406D0E20628A5E406ECB947567CCE3F2950F105D07BB6CA5340D14237BF241A
13,719,740 UART: [art] PUB.Y = 93163C419AE433C38534138EDA40797B285632ED5D34A261E40C6BE46FC2397E9F598B078ADD63FEF9D557499A09E265
13,726,679 UART: [art] SIG.R = 4E9C8CC29818C171FF50CEFC9963A6AABE1573EFD247BE949508F1FD2C1B8759508D7EC7D4C4617C49E2A9DD7A9C3265
13,733,460 UART: [art] SIG.S = 280E453786D6F15CA64E4C5D071A01F0B65763CD13288351EA3CCE4FE583B54282FE687CD9DA25AF5C157E133BD74280
13,757,070 UART: Caliptra RT
13,757,415 UART: [state] CFI Enabled
14,041,217 UART: [rt] RT listening for mailbox commands...
14,041,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,071,432 UART: [rt]cmd =0x494e464f, len=4
14,075,049 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,448 ready_for_fw is high
1,362,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,052 >>> mbox cmd response: success
2,926,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,987,627 UART:
2,987,643 UART: Running Caliptra FMC ...
2,988,051 UART:
2,988,194 UART: [state] CFI Enabled
2,998,988 UART: [fht] FMC Alias Private Key: 7
3,106,515 UART: [art] Extend RT PCRs Done
3,106,943 UART: [art] Lock RT PCRs Done
3,108,727 UART: [art] Populate DV Done
3,116,949 UART: [fht] FMC Alias Private Key: 7
3,117,915 UART: [art] Derive CDI
3,118,195 UART: [art] Store in in slot 0x4
3,203,808 UART: [art] Derive Key Pair
3,204,168 UART: [art] Store priv key in slot 0x5
3,217,322 UART: [art] Derive Key Pair - Done
3,231,844 UART: [art] Signing Cert with AUTHO
3,232,324 UART: RITY.KEYID = 7
3,247,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,449 UART: [art] PUB.X = F57B6B3FABA5D82A666A5BECE92976D87AC32239B154EC6764FB2E4645B574BD4B2C8275E2EF8B6D3F0C19BCF8046CD7
3,255,231 UART: [art] PUB.Y = 6BAEE027E2CA808BFE73260B8C6C368578566AC144675210134E737BD381CAEC4118508C735541559750B816304792B5
3,262,166 UART: [art] SIG.R = 07CD32C0882466C52383595B069486DBA9B7133664989D1A1F1742C898B34C4233CD47EBFF93617C6A8B188BACEC5777
3,268,926 UART: [art] SIG.S = 500DDFE800CC41E17DC5DCCAA37C761239E2057F2E0F6B8DB7A3D2236EF370C6DE81B1553A03C70CCD136F8F1470144E
3,292,746 UART: Caliptra RT
3,293,091 UART: [state] CFI Enabled
3,401,853 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,501 UART: [rt]cmd =0x494e464f, len=4
3,436,242 >>> mbox cmd response data (312 bytes)
3,436,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,194,778 >>> mbox cmd response: success
6,208,481 UART:
6,208,497 UART: Running Caliptra FMC ...
6,208,905 UART:
6,209,048 UART: [state] CFI Enabled
6,298,413 UART: [art] Extend RT PCRs Done
6,298,841 UART: [art] Lock RT PCRs Done
6,300,016 UART: [art] Populate DV Done
6,308,096 UART: [fht] FMC Alias Private Key: 7
6,309,204 UART: [art] Derive CDI
6,309,484 UART: [art] Store in in slot 0x4
6,395,369 UART: [art] Derive Key Pair
6,395,729 UART: [art] Store priv key in slot 0x5
6,408,917 UART: [art] Derive Key Pair - Done
6,423,788 UART: [art] Signing Cert with AUTHO
6,424,268 UART: RITY.KEYID = 7
6,439,844 UART: [art] Erasing AUTHORITY.KEYID = 7
6,440,609 UART: [art] PUB.X = AEF3647A6BB47C5BC2C17F9997D89127C50B5BC43D00C71E43D598047D65D08C8DEAB79BC2DF3ACF2D34CC0BB1EBD67C
6,447,372 UART: [art] PUB.Y = 86DA1370F1C8E27167DE8312DA59E5DA5B1A81AAFD3CEC8D2FB31AEAFF96901D3A3B1F33037ADED761A191D38E699FCD
6,454,343 UART: [art] SIG.R = 25207BE8818C6BADB566AD7C4CEB078528E17DAB9D3897A51A7AFAC1BBE8020D6E1BA61485FB30866A2C3E0946F901AB
6,461,114 UART: [art] SIG.S = 36BF0385D353775217FE1B963593CB7B85149D2A63766116E2F076F0A8738BED05FA64B05396BC4FA2A98D8A9A06F5B1
6,484,494 UART: Caliptra RT
6,484,839 UART: [state] CFI Enabled
6,769,299 UART: [rt] RT listening for mailbox commands...
6,769,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,799,688 UART: [rt]cmd =0x494e464f, len=4
6,803,479 >>> mbox cmd response data (312 bytes)
6,803,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,562,911 >>> mbox cmd response: success
9,576,518 UART:
9,576,534 UART: Running Caliptra FMC ...
9,576,942 UART:
9,577,085 UART: [state] CFI Enabled
9,666,334 UART: [art] Extend RT PCRs Done
9,666,762 UART: [art] Lock RT PCRs Done
9,667,975 UART: [art] Populate DV Done
9,676,489 UART: [fht] FMC Alias Private Key: 7
9,677,599 UART: [art] Derive CDI
9,677,879 UART: [art] Store in in slot 0x4
9,763,718 UART: [art] Derive Key Pair
9,764,078 UART: [art] Store priv key in slot 0x5
9,777,602 UART: [art] Derive Key Pair - Done
9,791,991 UART: [art] Signing Cert with AUTHO
9,792,471 UART: RITY.KEYID = 7
9,807,673 UART: [art] Erasing AUTHORITY.KEYID = 7
9,808,438 UART: [art] PUB.X = 945BEC48EFC0ED1718D5CF0AC0A802B4D5ADD2C80AF0EACC62A3DD44E73A7BBBD6977F9D3474DCC1DCA3E63FA493CBF1
9,815,235 UART: [art] PUB.Y = BA2362D0E50C1D71E52F59CA7DDE491DC4CFC2506E502219F09AAB00277979FCB1A979835F2533829FE957728C9CB6CB
9,822,168 UART: [art] SIG.R = B537FB15AA7A78889CF81227FD2AEACE62511E8E4DEAE4207D92CE6EEEEB5964F3119711C4FDCC4B79C393B33EB509FC
9,828,957 UART: [art] SIG.S = 06E2636C8CA33D3A79D427E7270EDEDEFE2AE3327577E4EEBE24F743674D22DD5611C12076AA9196DBAD5E20214DD58B
9,852,478 UART: Caliptra RT
9,852,823 UART: [state] CFI Enabled
10,134,206 UART: [rt] RT listening for mailbox commands...
10,134,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,164,563 UART: [rt]cmd =0x494e464f, len=4
10,168,162 >>> mbox cmd response data (312 bytes)
10,168,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,925,532 >>> mbox cmd response: success
12,938,787 UART:
12,938,803 UART: Running Caliptra FMC ...
12,939,211 UART:
12,939,354 UART: [state] CFI Enabled
13,028,423 UART: [art] Extend RT PCRs Done
13,028,851 UART: [art] Lock RT PCRs Done
13,030,220 UART: [art] Populate DV Done
13,038,562 UART: [fht] FMC Alias Private Key: 7
13,039,700 UART: [art] Derive CDI
13,039,980 UART: [art] Store in in slot 0x4
13,125,917 UART: [art] Derive Key Pair
13,126,277 UART: [art] Store priv key in slot 0x5
13,140,087 UART: [art] Derive Key Pair - Done
13,154,560 UART: [art] Signing Cert with AUTHO
13,155,040 UART: RITY.KEYID = 7
13,170,434 UART: [art] Erasing AUTHORITY.KEYID = 7
13,171,199 UART: [art] PUB.X = AEF3647A6BB47C5BC2C17F9997D89127C50B5BC43D00C71E43D598047D65D08C8DEAB79BC2DF3ACF2D34CC0BB1EBD67C
13,177,962 UART: [art] PUB.Y = 86DA1370F1C8E27167DE8312DA59E5DA5B1A81AAFD3CEC8D2FB31AEAFF96901D3A3B1F33037ADED761A191D38E699FCD
13,184,933 UART: [art] SIG.R = 25207BE8818C6BADB566AD7C4CEB078528E17DAB9D3897A51A7AFAC1BBE8020D6E1BA61485FB30866A2C3E0946F901AB
13,191,704 UART: [art] SIG.S = 36BF0385D353775217FE1B963593CB7B85149D2A63766116E2F076F0A8738BED05FA64B05396BC4FA2A98D8A9A06F5B1
13,215,540 UART: Caliptra RT
13,215,885 UART: [state] CFI Enabled
13,498,181 UART: [rt] RT listening for mailbox commands...
13,498,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,528,230 UART: [rt]cmd =0x494e464f, len=4
13,531,971 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.78s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,052 UART: [fwproc] Wait for Commands...
1,283,664 UART: [fwproc] Recv command 0x46574c44
1,284,392 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,952 >>> mbox cmd response: success
2,769,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,771,174 UART: [afmc] ++
2,771,342 UART: [afmc] CDI.KEYID = 6
2,771,704 UART: [afmc] SUBJECT.KEYID = 7
2,772,129 UART: [afmc] AUTHORITY.KEYID = 5
2,807,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,750 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,830,442 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,836,315 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,842,017 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,849,772 UART: [afmc] --
2,850,866 UART: [cold-reset] --
2,851,592 UART: [state] Locking Datavault
2,852,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,411 UART: [state] Locking ICCM
2,853,849 UART: [exit] Launching FMC @ 0x40000130
2,859,178 UART:
2,859,194 UART: Running Caliptra FMC ...
2,859,602 UART:
2,859,656 UART: [state] CFI Enabled
2,869,878 UART: [fht] FMC Alias Private Key: 7
2,977,471 UART: [art] Extend RT PCRs Done
2,977,899 UART: [art] Lock RT PCRs Done
2,979,297 UART: [art] Populate DV Done
2,987,511 UART: [fht] FMC Alias Private Key: 7
2,988,561 UART: [art] Derive CDI
2,988,841 UART: [art] Store in in slot 0x4
3,074,456 UART: [art] Derive Key Pair
3,074,816 UART: [art] Store priv key in slot 0x5
3,087,616 UART: [art] Derive Key Pair - Done
3,102,138 UART: [art] Signing Cert with AUTHO
3,102,618 UART: RITY.KEYID = 7
3,118,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,059 UART: [art] PUB.X = FF129ADB2B66DD073D8426AB7F4D8F605E10AEF6D20397FDE86DFFB49F3FD9E8ECAFE990F53B7F443A5DB35EA66D000C
3,125,826 UART: [art] PUB.Y = 51183D2AF68AFFF77B4505D36D85B0F9FA8E48AD9B3595AF66ED50E796DDD556B216886AFCA673E4842ECD47B6DD81E9
3,132,789 UART: [art] SIG.R = 620BE92E59D09A3F7E5475BB26D75A0B0CA0E4FEFC59E179330DB6FDCF2EB564DD12A8C9F7AC6DFFD79E3141D1407336
3,139,567 UART: [art] SIG.S = 64EC268C9B11CFC0F09B3013CD3AEAAE6DCC3E7738EAB6F7939A28C6809393B08FD6379A6628C5C3D1100CBF529E4C18
3,163,321 UART: Caliptra RT
3,163,574 UART: [state] CFI Enabled
3,271,360 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,604 UART: [rt]cmd =0x494e464f, len=4
3,305,327 >>> mbox cmd response data (312 bytes)
3,305,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,301 UART:
3,306,317 UART: Running Caliptra ROM ...
3,306,725 UART:
3,306,780 UART: [state] CFI Enabled
3,309,562 UART: [state] LifecycleState = Unprovisioned
3,310,217 UART: [state] DebugLocked = No
3,310,767 UART: [state] WD Timer not started. Device not locked for debugging
3,312,089 UART: [kat] SHA2-256
4,117,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,121,864 UART: [kat] ++
4,122,016 UART: [kat] sha1
4,126,188 UART: [kat] SHA2-256
4,128,128 UART: [kat] SHA2-384
4,130,879 UART: [kat] SHA2-512-ACC
4,132,779 UART: [kat] ECC-384
4,142,998 UART: [kat] HMAC-384Kdf
4,147,574 UART: [kat] LMS
4,395,902 UART: [kat] --
4,396,656 UART: [update-reset] ++
5,704,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,705,890 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,855,342 >>> mbox cmd response: success
5,855,653 UART: [update-reset] Copying MAN_2 To MAN_1
5,863,667 UART: [update-reset Success] --
5,864,522 UART: [state] Locking Datavault
5,865,466 UART: [state] Locking PCR0, PCR1 and PCR31
5,866,070 UART: [state] Locking ICCM
5,866,500 UART: [exit] Launching FMC @ 0x40000130
5,871,829 UART:
5,871,845 UART: Running Caliptra FMC ...
5,872,253 UART:
5,872,307 UART: [state] CFI Enabled
5,961,902 UART: [art] Extend RT PCRs Done
5,962,330 UART: [art] Lock RT PCRs Done
5,963,511 UART: [art] Populate DV Done
5,971,877 UART: [fht] FMC Alias Private Key: 7
5,973,051 UART: [art] Derive CDI
5,973,331 UART: [art] Store in in slot 0x4
6,058,974 UART: [art] Derive Key Pair
6,059,334 UART: [art] Store priv key in slot 0x5
6,072,746 UART: [art] Derive Key Pair - Done
6,087,813 UART: [art] Signing Cert with AUTHO
6,088,293 UART: RITY.KEYID = 7
6,103,355 UART: [art] Erasing AUTHORITY.KEYID = 7
6,104,120 UART: [art] PUB.X = 9F2D26D19F6F8F4FF7BFFA70C684C79624B47B4BE63F40637C682C09C229FA66D0002B785C1DC803BA174601113F8E32
6,110,863 UART: [art] PUB.Y = F75BF1C5516F214405A5F96FFDA03D300FE4F8023EB7F4F2DFE9337DF5B690A6455520201370F885E9010CCB84B83F83
6,117,802 UART: [art] SIG.R = 0659192864B27012F59D82063F8134D64BA148CE834D96338CF69A80F058D4DE092D8AF600D9F0BDD36A566C4AF2BA68
6,124,541 UART: [art] SIG.S = 532A4070D12BF559DDEFD71C800156B50F3A52013507AACDB13A0F2399B5ECDBFDC4440E67FF81B91738B44AC9C68385
6,148,554 UART: Caliptra RT
6,148,807 UART: [state] CFI Enabled
6,430,093 UART: [rt] RT listening for mailbox commands...
6,430,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,460,178 UART: [rt]cmd =0x494e464f, len=4
6,463,735 >>> mbox cmd response data (312 bytes)
6,463,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,464,591 UART:
6,464,607 UART: Running Caliptra ROM ...
6,465,015 UART:
6,465,070 UART: [state] CFI Enabled
6,467,896 UART: [state] LifecycleState = Unprovisioned
6,468,551 UART: [state] DebugLocked = No
6,469,115 UART: [state] WD Timer not started. Device not locked for debugging
6,470,297 UART: [kat] SHA2-256
7,275,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,280,072 UART: [kat] ++
7,280,224 UART: [kat] sha1
7,284,500 UART: [kat] SHA2-256
7,286,440 UART: [kat] SHA2-384
7,289,105 UART: [kat] SHA2-512-ACC
7,291,005 UART: [kat] ECC-384
7,300,370 UART: [kat] HMAC-384Kdf
7,305,030 UART: [kat] LMS
7,553,358 UART: [kat] --
7,554,472 UART: [update-reset] ++
8,863,309 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,864,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
9,013,762 >>> mbox cmd response: success
9,013,985 UART: [update-reset] Copying MAN_2 To MAN_1
9,021,999 UART: [update-reset Success] --
9,022,876 UART: [state] Locking Datavault
9,023,768 UART: [state] Locking PCR0, PCR1 and PCR31
9,024,372 UART: [state] Locking ICCM
9,024,804 UART: [exit] Launching FMC @ 0x40000130
9,030,133 UART:
9,030,149 UART: Running Caliptra FMC ...
9,030,557 UART:
9,030,611 UART: [state] CFI Enabled
9,119,654 UART: [art] Extend RT PCRs Done
9,120,082 UART: [art] Lock RT PCRs Done
9,121,397 UART: [art] Populate DV Done
9,129,747 UART: [fht] FMC Alias Private Key: 7
9,130,691 UART: [art] Derive CDI
9,130,971 UART: [art] Store in in slot 0x4
9,216,594 UART: [art] Derive Key Pair
9,216,954 UART: [art] Store priv key in slot 0x5
9,230,388 UART: [art] Derive Key Pair - Done
9,245,183 UART: [art] Signing Cert with AUTHO
9,245,663 UART: RITY.KEYID = 7
9,260,807 UART: [art] Erasing AUTHORITY.KEYID = 7
9,261,572 UART: [art] PUB.X = D05ECA095F03A531440E5C1BCEFAD42EBF2F041E73B328EE50D28D2BE097F62E2AA3E884841981D465344421E89A32DF
9,268,340 UART: [art] PUB.Y = 2A2230A27E2269607938E57973262279E9C02F57D4467DC396FEA0011E488C9D5B1771A3204169B6CF02840AE1B8EB4C
9,275,273 UART: [art] SIG.R = F634DF2B7537792F69979949EB63B9BD5B00FFA49130D9111505E95D66C6BC72E668C4C1C00AE0CBBBCB3F7B2A4818F3
9,282,025 UART: [art] SIG.S = 1D1D7665B3CC0A858CD3FA5AFB0D112D4859967EEAA946A05BA06CB2658940DB62116F2980171285FF2707B9C9B401CD
9,305,532 UART: Caliptra RT
9,305,785 UART: [state] CFI Enabled
9,585,794 UART: [rt] RT listening for mailbox commands...
9,586,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,615,673 UART: [rt]cmd =0x494e464f, len=4
9,619,426 >>> mbox cmd response data (312 bytes)
9,619,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,620,028 UART:
9,620,044 UART: Running Caliptra ROM ...
9,620,452 UART:
9,620,507 UART: [state] CFI Enabled
9,623,361 UART: [state] LifecycleState = Unprovisioned
9,624,016 UART: [state] DebugLocked = No
9,624,572 UART: [state] WD Timer not started. Device not locked for debugging
9,625,892 UART: [kat] SHA2-256
10,431,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,435,667 UART: [kat] ++
10,435,819 UART: [kat] sha1
10,439,973 UART: [kat] SHA2-256
10,441,913 UART: [kat] SHA2-384
10,444,562 UART: [kat] SHA2-512-ACC
10,446,462 UART: [kat] ECC-384
10,455,905 UART: [kat] HMAC-384Kdf
10,460,467 UART: [kat] LMS
10,708,795 UART: [kat] --
10,709,317 UART: [update-reset] ++
12,018,064 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,019,211 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
12,168,663 >>> mbox cmd response: success
12,168,894 UART: [update-reset] Copying MAN_2 To MAN_1
12,176,908 UART: [update-reset Success] --
12,177,915 UART: [state] Locking Datavault
12,178,709 UART: [state] Locking PCR0, PCR1 and PCR31
12,179,313 UART: [state] Locking ICCM
12,179,977 UART: [exit] Launching FMC @ 0x40000130
12,185,306 UART:
12,185,322 UART: Running Caliptra FMC ...
12,185,730 UART:
12,185,784 UART: [state] CFI Enabled
12,274,855 UART: [art] Extend RT PCRs Done
12,275,283 UART: [art] Lock RT PCRs Done
12,276,490 UART: [art] Populate DV Done
12,284,662 UART: [fht] FMC Alias Private Key: 7
12,285,688 UART: [art] Derive CDI
12,285,968 UART: [art] Store in in slot 0x4
12,371,403 UART: [art] Derive Key Pair
12,371,763 UART: [art] Store priv key in slot 0x5
12,384,739 UART: [art] Derive Key Pair - Done
12,399,460 UART: [art] Signing Cert with AUTHO
12,399,940 UART: RITY.KEYID = 7
12,415,322 UART: [art] Erasing AUTHORITY.KEYID = 7
12,416,087 UART: [art] PUB.X = 9F2D26D19F6F8F4FF7BFFA70C684C79624B47B4BE63F40637C682C09C229FA66D0002B785C1DC803BA174601113F8E32
12,422,830 UART: [art] PUB.Y = F75BF1C5516F214405A5F96FFDA03D300FE4F8023EB7F4F2DFE9337DF5B690A6455520201370F885E9010CCB84B83F83
12,429,769 UART: [art] SIG.R = 0659192864B27012F59D82063F8134D64BA148CE834D96338CF69A80F058D4DE092D8AF600D9F0BDD36A566C4AF2BA68
12,436,508 UART: [art] SIG.S = 532A4070D12BF559DDEFD71C800156B50F3A52013507AACDB13A0F2399B5ECDBFDC4440E67FF81B91738B44AC9C68385
12,459,915 UART: Caliptra RT
12,460,168 UART: [state] CFI Enabled
12,738,480 UART: [rt] RT listening for mailbox commands...
12,739,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,768,591 UART: [rt]cmd =0x494e464f, len=4
12,772,192 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 ready_for_fw is high
1,060,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,395 >>> mbox cmd response: success
2,623,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,096 UART:
2,685,112 UART: Running Caliptra FMC ...
2,685,520 UART:
2,685,574 UART: [state] CFI Enabled
2,696,064 UART: [fht] FMC Alias Private Key: 7
2,803,823 UART: [art] Extend RT PCRs Done
2,804,251 UART: [art] Lock RT PCRs Done
2,805,801 UART: [art] Populate DV Done
2,814,039 UART: [fht] FMC Alias Private Key: 7
2,815,107 UART: [art] Derive CDI
2,815,387 UART: [art] Store in in slot 0x4
2,901,068 UART: [art] Derive Key Pair
2,901,428 UART: [art] Store priv key in slot 0x5
2,914,310 UART: [art] Derive Key Pair - Done
2,929,413 UART: [art] Signing Cert with AUTHO
2,929,893 UART: RITY.KEYID = 7
2,944,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,552 UART: [art] PUB.X = 22CDBC6F352DCA3761ECCD5B73DFB2FDCF0B9D7D6EF590466E1E13868AE3A79E2A3A28E9012ECFC7939613AA8A52421D
2,952,338 UART: [art] PUB.Y = E36362AEF97BDEE8D5D132F98083366C4AF80F0998CDAC857624E3B519DC95E1BF8107B4A19866F31B9C98F8AF191E3E
2,959,289 UART: [art] SIG.R = DDE320DDDA0F74FDEC68D769F04F025F6033EEEC7314218073D79248E6723212FC59B7AF571042048725348EA66F0F27
2,966,047 UART: [art] SIG.S = 51FA0CF551D34AD331BA2B464060FB5487D7ADC4C1D75292E987D94C7D102E2B817B384BCC29CED44DD4F9AAF3284DBF
2,989,625 UART: Caliptra RT
2,989,878 UART: [state] CFI Enabled
3,097,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,583 UART: [rt]cmd =0x494e464f, len=4
3,131,278 >>> mbox cmd response data (312 bytes)
3,131,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,564,730 >>> mbox cmd response: success
5,578,240 UART:
5,578,256 UART: Running Caliptra FMC ...
5,578,664 UART:
5,578,718 UART: [state] CFI Enabled
5,667,835 UART: [art] Extend RT PCRs Done
5,668,263 UART: [art] Lock RT PCRs Done
5,669,604 UART: [art] Populate DV Done
5,677,910 UART: [fht] FMC Alias Private Key: 7
5,678,854 UART: [art] Derive CDI
5,679,134 UART: [art] Store in in slot 0x4
5,765,099 UART: [art] Derive Key Pair
5,765,459 UART: [art] Store priv key in slot 0x5
5,778,331 UART: [art] Derive Key Pair - Done
5,792,947 UART: [art] Signing Cert with AUTHO
5,793,427 UART: RITY.KEYID = 7
5,808,695 UART: [art] Erasing AUTHORITY.KEYID = 7
5,809,460 UART: [art] PUB.X = 548A805D032D6DE20AE8192C0026A2E64AA37F31DA7D387E77ADD235A04DD0767456BBB5ECFA4CB3EABC8C8144BA1B7D
5,816,222 UART: [art] PUB.Y = 401E05AE69D80A0ACA108A0D3C51E3A1E2BDB195170A4A609DA4C359DBC90D10E63FD6AD98E648A6ACA354C59EA9A24F
5,823,174 UART: [art] SIG.R = 410035CD0841DF20E2E8383EC7F411737EDF1511CCEF3406054A2284AEEA117B77EB3CF0FFB4D547B21B26D4A39FD6DF
5,829,927 UART: [art] SIG.S = 74E263CFE71941596C683E2297C7CC9A96C4DDE087B55B0F6BAC49086366E72A1FE93AF2D764A863D1C0ECED3721EC26
5,854,190 UART: Caliptra RT
5,854,443 UART: [state] CFI Enabled
6,136,153 UART: [rt] RT listening for mailbox commands...
6,136,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,354 UART: [rt]cmd =0x494e464f, len=4
6,170,277 >>> mbox cmd response data (312 bytes)
6,170,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,603,517 >>> mbox cmd response: success
8,616,873 UART:
8,616,889 UART: Running Caliptra FMC ...
8,617,297 UART:
8,617,351 UART: [state] CFI Enabled
8,706,446 UART: [art] Extend RT PCRs Done
8,706,874 UART: [art] Lock RT PCRs Done
8,708,103 UART: [art] Populate DV Done
8,716,295 UART: [fht] FMC Alias Private Key: 7
8,717,365 UART: [art] Derive CDI
8,717,645 UART: [art] Store in in slot 0x4
8,803,152 UART: [art] Derive Key Pair
8,803,512 UART: [art] Store priv key in slot 0x5
8,816,210 UART: [art] Derive Key Pair - Done
8,830,803 UART: [art] Signing Cert with AUTHO
8,831,283 UART: RITY.KEYID = 7
8,846,189 UART: [art] Erasing AUTHORITY.KEYID = 7
8,846,954 UART: [art] PUB.X = ECD6E8286BCD34441AA7E4E349CB24DE18BA085F923CE0A4C81438AEEB17181DD3A85C507A9919CDFDC79301F7074B94
8,853,729 UART: [art] PUB.Y = 1608D7D60757BF8660D4E24753CF308367DCE6B5B7F32547A4E3A39B980822560DB8E66D04409E1289FEB212DEA812E5
8,860,662 UART: [art] SIG.R = CCF148D85495D790732345C322D99E79CF887F0B2B51933EB9750243A3F1908D7502D42793EBA4447044555C597119C9
8,867,409 UART: [art] SIG.S = 4EC0E020194981FAE7A6AE1FFBBE15F391C66D86820C139D57306242002F5D35E4A0DCCE4F90CB54164CC88CCF846C90
8,891,033 UART: Caliptra RT
8,891,286 UART: [state] CFI Enabled
9,173,173 UART: [rt] RT listening for mailbox commands...
9,173,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,203,132 UART: [rt]cmd =0x494e464f, len=4
9,206,825 >>> mbox cmd response data (312 bytes)
9,206,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,641,353 >>> mbox cmd response: success
11,654,491 UART:
11,654,507 UART: Running Caliptra FMC ...
11,654,915 UART:
11,654,969 UART: [state] CFI Enabled
11,743,846 UART: [art] Extend RT PCRs Done
11,744,274 UART: [art] Lock RT PCRs Done
11,745,573 UART: [art] Populate DV Done
11,753,679 UART: [fht] FMC Alias Private Key: 7
11,754,659 UART: [art] Derive CDI
11,754,939 UART: [art] Store in in slot 0x4
11,840,196 UART: [art] Derive Key Pair
11,840,556 UART: [art] Store priv key in slot 0x5
11,853,216 UART: [art] Derive Key Pair - Done
11,867,988 UART: [art] Signing Cert with AUTHO
11,868,468 UART: RITY.KEYID = 7
11,883,292 UART: [art] Erasing AUTHORITY.KEYID = 7
11,884,057 UART: [art] PUB.X = 548A805D032D6DE20AE8192C0026A2E64AA37F31DA7D387E77ADD235A04DD0767456BBB5ECFA4CB3EABC8C8144BA1B7D
11,890,819 UART: [art] PUB.Y = 401E05AE69D80A0ACA108A0D3C51E3A1E2BDB195170A4A609DA4C359DBC90D10E63FD6AD98E648A6ACA354C59EA9A24F
11,897,771 UART: [art] SIG.R = 410035CD0841DF20E2E8383EC7F411737EDF1511CCEF3406054A2284AEEA117B77EB3CF0FFB4D547B21B26D4A39FD6DF
11,904,524 UART: [art] SIG.S = 74E263CFE71941596C683E2297C7CC9A96C4DDE087B55B0F6BAC49086366E72A1FE93AF2D764A863D1C0ECED3721EC26
11,928,489 UART: Caliptra RT
11,928,742 UART: [state] CFI Enabled
12,209,400 UART: [rt] RT listening for mailbox commands...
12,210,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,239,451 UART: [rt]cmd =0x494e464f, len=4
12,242,980 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.49s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,206 UART: [ldev] --
1,282,539 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,055 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,463 >>> mbox cmd response: success
2,770,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,771,511 UART: [afmc] ++
2,771,679 UART: [afmc] CDI.KEYID = 6
2,772,041 UART: [afmc] SUBJECT.KEYID = 7
2,772,466 UART: [afmc] AUTHORITY.KEYID = 5
2,808,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,361 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,053 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,836,926 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,842,628 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,850,299 UART: [afmc] --
2,851,269 UART: [cold-reset] --
2,852,137 UART: [state] Locking Datavault
2,853,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,938 UART: [state] Locking ICCM
2,854,512 UART: [exit] Launching FMC @ 0x40000130
2,859,841 UART:
2,859,857 UART: Running Caliptra FMC ...
2,860,265 UART:
2,860,408 UART: [state] CFI Enabled
2,870,980 UART: [fht] FMC Alias Private Key: 7
2,979,599 UART: [art] Extend RT PCRs Done
2,980,027 UART: [art] Lock RT PCRs Done
2,981,489 UART: [art] Populate DV Done
2,989,705 UART: [fht] FMC Alias Private Key: 7
2,990,865 UART: [art] Derive CDI
2,991,145 UART: [art] Store in in slot 0x4
3,076,808 UART: [art] Derive Key Pair
3,077,168 UART: [art] Store priv key in slot 0x5
3,090,370 UART: [art] Derive Key Pair - Done
3,105,437 UART: [art] Signing Cert with AUTHO
3,105,917 UART: RITY.KEYID = 7
3,121,163 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,928 UART: [art] PUB.X = 411738BFBB535DADE444AE748D04F858838DCDD36E5B6C377DBA4B25E89B1A16D59DE96D8AB0C0F7804F90B1994B6756
3,128,707 UART: [art] PUB.Y = 5F404709187F838B0141F6AEF3219840FBC34F614929B006033B1A8A57B1A1800913240939406C013D85D91D17370573
3,135,613 UART: [art] SIG.R = E0CD8B0CF8C0E45FF04FF66B589A6CF339EED6B715048F4E6C90B9D91C9AB136C76A31F1CF4C74D1C812BC00BB9776BF
3,142,377 UART: [art] SIG.S = A2841C25BD2F5FCCAFD7A28E356B6449586361DB468392380A90BB9B0F6839B25C90061FEFAD3E01278C853A73A27C65
3,166,284 UART: Caliptra RT
3,166,629 UART: [state] CFI Enabled
3,275,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,774 UART: [rt]cmd =0x494e464f, len=4
3,309,559 >>> mbox cmd response data (312 bytes)
3,309,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,203 UART:
3,310,219 UART: Running Caliptra ROM ...
3,310,627 UART:
3,310,769 UART: [state] CFI Enabled
3,313,387 UART: [state] LifecycleState = Unprovisioned
3,314,042 UART: [state] DebugLocked = No
3,314,684 UART: [state] WD Timer not started. Device not locked for debugging
3,315,982 UART: [kat] SHA2-256
4,121,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,757 UART: [kat] ++
4,125,909 UART: [kat] sha1
4,130,313 UART: [kat] SHA2-256
4,132,253 UART: [kat] SHA2-384
4,134,806 UART: [kat] SHA2-512-ACC
4,136,706 UART: [kat] ECC-384
4,146,121 UART: [kat] HMAC-384Kdf
4,151,003 UART: [kat] LMS
4,399,331 UART: [kat] --
4,400,165 UART: [update-reset] ++
5,709,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,710,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,859,693 >>> mbox cmd response: success
5,860,050 UART: [update-reset] Copying MAN_2 To MAN_1
5,868,064 UART: [update-reset Success] --
5,869,141 UART: [state] Locking Datavault
5,869,985 UART: [state] Locking PCR0, PCR1 and PCR31
5,870,589 UART: [state] Locking ICCM
5,871,075 UART: [exit] Launching FMC @ 0x40000130
5,876,404 UART:
5,876,420 UART: Running Caliptra FMC ...
5,876,828 UART:
5,876,971 UART: [state] CFI Enabled
5,966,242 UART: [art] Extend RT PCRs Done
5,966,670 UART: [art] Lock RT PCRs Done
5,967,869 UART: [art] Populate DV Done
5,976,429 UART: [fht] FMC Alias Private Key: 7
5,977,417 UART: [art] Derive CDI
5,977,697 UART: [art] Store in in slot 0x4
6,063,230 UART: [art] Derive Key Pair
6,063,590 UART: [art] Store priv key in slot 0x5
6,076,800 UART: [art] Derive Key Pair - Done
6,091,797 UART: [art] Signing Cert with AUTHO
6,092,277 UART: RITY.KEYID = 7
6,107,541 UART: [art] Erasing AUTHORITY.KEYID = 7
6,108,306 UART: [art] PUB.X = 46AC648DAD5EC1257A64DA0BF0AF0DA769522854ECB47CE3F02489E62390AFFD57363D0D63D7B1CCB41120E69F57198A
6,115,079 UART: [art] PUB.Y = 1479A002229AC54989942003F1AE015514EE8FC9DA9CF1C4BF9533E17FB9B0CCC909C2128E6442B766356227BB0A157A
6,122,014 UART: [art] SIG.R = 27C30D0B731F9526976951664C07AE1CA118BE1FA0601807AC76143C21B47A75186FD38CF5E9C58C2C9548F9D542496E
6,128,768 UART: [art] SIG.S = F6DF89F7C7ABFCDA5EB79052F746BE2F26E0C7999BD9B30A15889B03F33FD907CE42A2AB288111E145FEB09111D8DB01
6,152,067 UART: Caliptra RT
6,152,412 UART: [state] CFI Enabled
6,436,051 UART: [rt] RT listening for mailbox commands...
6,436,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,466,182 UART: [rt]cmd =0x494e464f, len=4
6,469,961 >>> mbox cmd response data (312 bytes)
6,469,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,791 UART:
6,470,807 UART: Running Caliptra ROM ...
6,471,215 UART:
6,471,357 UART: [state] CFI Enabled
6,474,171 UART: [state] LifecycleState = Unprovisioned
6,474,826 UART: [state] DebugLocked = No
6,475,332 UART: [state] WD Timer not started. Device not locked for debugging
6,476,478 UART: [kat] SHA2-256
7,282,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,286,253 UART: [kat] ++
7,286,405 UART: [kat] sha1
7,290,695 UART: [kat] SHA2-256
7,292,635 UART: [kat] SHA2-384
7,295,538 UART: [kat] SHA2-512-ACC
7,297,438 UART: [kat] ECC-384
7,307,141 UART: [kat] HMAC-384Kdf
7,311,741 UART: [kat] LMS
7,560,069 UART: [kat] --
7,561,067 UART: [update-reset] ++
8,871,066 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,872,201 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
9,021,653 >>> mbox cmd response: success
9,021,800 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,814 UART: [update-reset Success] --
9,030,595 UART: [state] Locking Datavault
9,031,337 UART: [state] Locking PCR0, PCR1 and PCR31
9,031,941 UART: [state] Locking ICCM
9,032,385 UART: [exit] Launching FMC @ 0x40000130
9,037,714 UART:
9,037,730 UART: Running Caliptra FMC ...
9,038,138 UART:
9,038,281 UART: [state] CFI Enabled
9,127,146 UART: [art] Extend RT PCRs Done
9,127,574 UART: [art] Lock RT PCRs Done
9,128,777 UART: [art] Populate DV Done
9,137,013 UART: [fht] FMC Alias Private Key: 7
9,138,151 UART: [art] Derive CDI
9,138,431 UART: [art] Store in in slot 0x4
9,224,074 UART: [art] Derive Key Pair
9,224,434 UART: [art] Store priv key in slot 0x5
9,237,870 UART: [art] Derive Key Pair - Done
9,252,753 UART: [art] Signing Cert with AUTHO
9,253,233 UART: RITY.KEYID = 7
9,268,237 UART: [art] Erasing AUTHORITY.KEYID = 7
9,269,002 UART: [art] PUB.X = DD2FA9071867A46A224A802675D18ADF4676B114F22491F5501BEF222E24931810C64FB8787542B97884D5707578267E
9,275,755 UART: [art] PUB.Y = C36B2EB8E0B58F7E6C5063153139EF9A44B9FFDA5DE27F5961F50E1164A3F96F1312215CC0CBB7FA713930FD7282F719
9,282,710 UART: [art] SIG.R = B1F50470B4056E0DC56323C69AC956981526DF155F10289FA05F6D60A9772C190FE8281A68843A222188B03C6646AA66
9,289,458 UART: [art] SIG.S = 86C8932F1C26146A084136C7D15BB3F5DC4663091A1F53DE7255C2F6A47C56892FB7D613C66B5C4A789538EEC397D396
9,313,209 UART: Caliptra RT
9,313,554 UART: [state] CFI Enabled
9,595,997 UART: [rt] RT listening for mailbox commands...
9,596,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,626,160 UART: [rt]cmd =0x494e464f, len=4
9,629,875 >>> mbox cmd response data (312 bytes)
9,629,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,630,865 UART:
9,630,881 UART: Running Caliptra ROM ...
9,631,289 UART:
9,631,431 UART: [state] CFI Enabled
9,634,743 UART: [state] LifecycleState = Unprovisioned
9,635,398 UART: [state] DebugLocked = No
9,636,040 UART: [state] WD Timer not started. Device not locked for debugging
9,637,298 UART: [kat] SHA2-256
10,442,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,447,073 UART: [kat] ++
10,447,225 UART: [kat] sha1
10,451,415 UART: [kat] SHA2-256
10,453,355 UART: [kat] SHA2-384
10,456,166 UART: [kat] SHA2-512-ACC
10,458,066 UART: [kat] ECC-384
10,467,645 UART: [kat] HMAC-384Kdf
10,472,423 UART: [kat] LMS
10,720,751 UART: [kat] --
10,721,729 UART: [update-reset] ++
12,030,762 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,031,871 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
12,181,323 >>> mbox cmd response: success
12,181,674 UART: [update-reset] Copying MAN_2 To MAN_1
12,189,688 UART: [update-reset Success] --
12,190,665 UART: [state] Locking Datavault
12,191,595 UART: [state] Locking PCR0, PCR1 and PCR31
12,192,199 UART: [state] Locking ICCM
12,192,659 UART: [exit] Launching FMC @ 0x40000130
12,197,988 UART:
12,198,004 UART: Running Caliptra FMC ...
12,198,412 UART:
12,198,555 UART: [state] CFI Enabled
12,287,546 UART: [art] Extend RT PCRs Done
12,287,974 UART: [art] Lock RT PCRs Done
12,289,047 UART: [art] Populate DV Done
12,297,461 UART: [fht] FMC Alias Private Key: 7
12,298,529 UART: [art] Derive CDI
12,298,809 UART: [art] Store in in slot 0x4
12,384,588 UART: [art] Derive Key Pair
12,384,948 UART: [art] Store priv key in slot 0x5
12,398,216 UART: [art] Derive Key Pair - Done
12,412,961 UART: [art] Signing Cert with AUTHO
12,413,441 UART: RITY.KEYID = 7
12,428,403 UART: [art] Erasing AUTHORITY.KEYID = 7
12,429,168 UART: [art] PUB.X = 46AC648DAD5EC1257A64DA0BF0AF0DA769522854ECB47CE3F02489E62390AFFD57363D0D63D7B1CCB41120E69F57198A
12,435,941 UART: [art] PUB.Y = 1479A002229AC54989942003F1AE015514EE8FC9DA9CF1C4BF9533E17FB9B0CCC909C2128E6442B766356227BB0A157A
12,442,876 UART: [art] SIG.R = 27C30D0B731F9526976951664C07AE1CA118BE1FA0601807AC76143C21B47A75186FD38CF5E9C58C2C9548F9D542496E
12,449,630 UART: [art] SIG.S = F6DF89F7C7ABFCDA5EB79052F746BE2F26E0C7999BD9B30A15889B03F33FD907CE42A2AB288111E145FEB09111D8DB01
12,473,193 UART: Caliptra RT
12,473,538 UART: [state] CFI Enabled
12,759,021 UART: [rt] RT listening for mailbox commands...
12,759,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,789,232 UART: [rt]cmd =0x494e464f, len=4
12,792,957 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 ready_for_fw is high
1,060,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,154 >>> mbox cmd response: success
2,623,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,685,461 UART:
2,685,477 UART: Running Caliptra FMC ...
2,685,885 UART:
2,686,028 UART: [state] CFI Enabled
2,696,620 UART: [fht] FMC Alias Private Key: 7
2,804,311 UART: [art] Extend RT PCRs Done
2,804,739 UART: [art] Lock RT PCRs Done
2,806,235 UART: [art] Populate DV Done
2,814,231 UART: [fht] FMC Alias Private Key: 7
2,815,409 UART: [art] Derive CDI
2,815,689 UART: [art] Store in in slot 0x4
2,901,630 UART: [art] Derive Key Pair
2,901,990 UART: [art] Store priv key in slot 0x5
2,915,296 UART: [art] Derive Key Pair - Done
2,930,044 UART: [art] Signing Cert with AUTHO
2,930,524 UART: RITY.KEYID = 7
2,945,980 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,745 UART: [art] PUB.X = 317CA5BD5AAD9A308DFA53F6C3A75E2DC68515D89A667450CCC4C4ADD354182DB842B6834EDDB3DF1CA77E9F06CCBDEE
2,953,540 UART: [art] PUB.Y = EAFAD19DC937D2EB3D9457873DB35754AC3EB9471E170B47D69A88C8AE10B802CB27CAE81F4139D182A0EFF390E9D0D7
2,960,500 UART: [art] SIG.R = 668C12150ADD62289A1CD5D6FAC62E8AC59B4B336B9E1167A86229251F02BBE15B77F4F2EFA86DEE5160D50346C245DA
2,967,271 UART: [art] SIG.S = 4BAE33E87188EEA6A6C8B335C1B468D2547E510CAC6D339BB6092862118A2F25672F508A8850CB708BFEBC79EEF8BDDF
2,991,076 UART: Caliptra RT
2,991,421 UART: [state] CFI Enabled
3,099,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,821 UART: [rt]cmd =0x494e464f, len=4
3,133,648 >>> mbox cmd response data (312 bytes)
3,133,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,566,461 >>> mbox cmd response: success
5,580,051 UART:
5,580,067 UART: Running Caliptra FMC ...
5,580,475 UART:
5,580,618 UART: [state] CFI Enabled
5,670,337 UART: [art] Extend RT PCRs Done
5,670,765 UART: [art] Lock RT PCRs Done
5,672,134 UART: [art] Populate DV Done
5,680,334 UART: [fht] FMC Alias Private Key: 7
5,681,418 UART: [art] Derive CDI
5,681,698 UART: [art] Store in in slot 0x4
5,767,003 UART: [art] Derive Key Pair
5,767,363 UART: [art] Store priv key in slot 0x5
5,780,299 UART: [art] Derive Key Pair - Done
5,795,455 UART: [art] Signing Cert with AUTHO
5,795,935 UART: RITY.KEYID = 7
5,811,443 UART: [art] Erasing AUTHORITY.KEYID = 7
5,812,208 UART: [art] PUB.X = 5A3B58EB1022CE53390F66C36767169E3283AD2C5D71D2BFC8A4AC5C6700E3211E20830B4C655A1EC4DBBDD4C49413E0
5,818,958 UART: [art] PUB.Y = EEFD4F7190F176F738FFEFA318435EECB86921443E05170D5CC4051EE87EE478587610D4E18008A34C98AC8D973A2F15
5,825,900 UART: [art] SIG.R = 70BAE52084AFEBF5FEC794BE12A0320FDE511C784BC3EE78DB936B64D4F2718C7DC5CDCB52509C23FDFE8C898092F77D
5,832,689 UART: [art] SIG.S = 58F717E6C376FB4FBB438D5BFB037821CB832AEC7DB508FEB03DAEE29DF4FB2345987CDA4F4A25E8090C24494AD37817
5,856,684 UART: Caliptra RT
5,857,029 UART: [state] CFI Enabled
6,135,687 UART: [rt] RT listening for mailbox commands...
6,136,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,980 UART: [rt]cmd =0x494e464f, len=4
6,169,613 >>> mbox cmd response data (312 bytes)
6,169,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,604,466 >>> mbox cmd response: success
8,617,828 UART:
8,617,844 UART: Running Caliptra FMC ...
8,618,252 UART:
8,618,395 UART: [state] CFI Enabled
8,707,242 UART: [art] Extend RT PCRs Done
8,707,670 UART: [art] Lock RT PCRs Done
8,708,883 UART: [art] Populate DV Done
8,717,153 UART: [fht] FMC Alias Private Key: 7
8,718,125 UART: [art] Derive CDI
8,718,405 UART: [art] Store in in slot 0x4
8,804,246 UART: [art] Derive Key Pair
8,804,606 UART: [art] Store priv key in slot 0x5
8,817,904 UART: [art] Derive Key Pair - Done
8,832,617 UART: [art] Signing Cert with AUTHO
8,833,097 UART: RITY.KEYID = 7
8,848,247 UART: [art] Erasing AUTHORITY.KEYID = 7
8,849,012 UART: [art] PUB.X = 5FBCE047AC5E86F51719FE5C41FCB196382792468880588C5E3C50B1311F1AA21F8E07CDCD23A66E08F317DBAFEDC653
8,855,788 UART: [art] PUB.Y = 07C6B2812F36E7969771CAF037ED3208685AF3F178E4F13D34FF41108DDCD9B9AF4A42520569E461DD9AC6C543CD4628
8,862,733 UART: [art] SIG.R = 40ECA2CF4DAACE130DB7FF81B747A3A84BB81D7FC6417EE558F1B72DD51FD835FC0AF716EDE1119B87D4CB38D504E966
8,869,518 UART: [art] SIG.S = E831E8E6097DD29D07E3E81053C26BF64528A7686219FD9DF4C880A9246A807669CE2964A5F64B169F6009C7B73FD1B2
8,893,738 UART: Caliptra RT
8,894,083 UART: [state] CFI Enabled
9,179,128 UART: [rt] RT listening for mailbox commands...
9,179,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,209,257 UART: [rt]cmd =0x494e464f, len=4
9,212,928 >>> mbox cmd response data (312 bytes)
9,212,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,647,625 >>> mbox cmd response: success
11,660,723 UART:
11,660,739 UART: Running Caliptra FMC ...
11,661,147 UART:
11,661,290 UART: [state] CFI Enabled
11,749,881 UART: [art] Extend RT PCRs Done
11,750,309 UART: [art] Lock RT PCRs Done
11,751,756 UART: [art] Populate DV Done
11,760,102 UART: [fht] FMC Alias Private Key: 7
11,761,072 UART: [art] Derive CDI
11,761,352 UART: [art] Store in in slot 0x4
11,846,883 UART: [art] Derive Key Pair
11,847,243 UART: [art] Store priv key in slot 0x5
11,860,597 UART: [art] Derive Key Pair - Done
11,875,541 UART: [art] Signing Cert with AUTHO
11,876,021 UART: RITY.KEYID = 7
11,891,221 UART: [art] Erasing AUTHORITY.KEYID = 7
11,891,986 UART: [art] PUB.X = 5A3B58EB1022CE53390F66C36767169E3283AD2C5D71D2BFC8A4AC5C6700E3211E20830B4C655A1EC4DBBDD4C49413E0
11,898,736 UART: [art] PUB.Y = EEFD4F7190F176F738FFEFA318435EECB86921443E05170D5CC4051EE87EE478587610D4E18008A34C98AC8D973A2F15
11,905,678 UART: [art] SIG.R = 70BAE52084AFEBF5FEC794BE12A0320FDE511C784BC3EE78DB936B64D4F2718C7DC5CDCB52509C23FDFE8C898092F77D
11,912,467 UART: [art] SIG.S = 58F717E6C376FB4FBB438D5BFB037821CB832AEC7DB508FEB03DAEE29DF4FB2345987CDA4F4A25E8090C24494AD37817
11,936,250 UART: Caliptra RT
11,936,595 UART: [state] CFI Enabled
12,219,361 UART: [rt] RT listening for mailbox commands...
12,220,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,249,428 UART: [rt]cmd =0x494e464f, len=4
12,253,225 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.60s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,022 UART: [ldev] --
1,281,346 UART: [fwproc] Wait for Commands...
1,282,065 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,828 >>> mbox cmd response: success
2,767,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,768,867 UART: [afmc] ++
2,769,035 UART: [afmc] CDI.KEYID = 6
2,769,398 UART: [afmc] SUBJECT.KEYID = 7
2,769,824 UART: [afmc] AUTHORITY.KEYID = 5
2,805,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,987 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,827,680 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,833,551 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,839,253 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,847,141 UART: [afmc] --
2,848,265 UART: [cold-reset] --
2,848,901 UART: [state] Locking Datavault
2,849,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,560 UART: [state] Locking ICCM
2,851,072 UART: [exit] Launching FMC @ 0x40000130
2,856,401 UART:
2,856,417 UART: Running Caliptra FMC ...
2,856,825 UART:
2,856,879 UART: [state] CFI Enabled
2,867,331 UART: [fht] FMC Alias Private Key: 7
2,975,090 UART: [art] Extend RT PCRs Done
2,975,518 UART: [art] Lock RT PCRs Done
2,976,922 UART: [art] Populate DV Done
2,985,398 UART: [fht] FMC Alias Private Key: 7
2,986,366 UART: [art] Derive CDI
2,986,646 UART: [art] Store in in slot 0x4
3,072,181 UART: [art] Derive Key Pair
3,072,541 UART: [art] Store priv key in slot 0x5
3,086,099 UART: [art] Derive Key Pair - Done
3,100,966 UART: [art] Signing Cert with AUTHO
3,101,446 UART: RITY.KEYID = 7
3,116,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,413 UART: [art] PUB.X = 4419F8754CC7461D4E9B676173FBA1C1D7BEC49534C3C8D583B7634F35FAEC18747A188B4824A92A7205D91F520EABBA
3,124,183 UART: [art] PUB.Y = 22C823347FF54629D49E7B6C7F67069804C7AC12EED7EEA7E6989808C025B2F39FF82586B77AEAABB5F4E851A2C57469
3,131,130 UART: [art] SIG.R = 53AEC0078F7C65E3D8E344B076AD216CE00708F4F9BDC7D96DDFD80D2F72232F864DBC25E5714D5065F254630CDE0525
3,137,890 UART: [art] SIG.S = FA16424A03C4A9E416B77F42300A3D1AF45D946401422A408301CD268E380A0EDD8B8DA5E6C56E07E464619BB42B1D76
3,161,968 UART: Caliptra RT
3,162,221 UART: [state] CFI Enabled
3,269,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,304 UART: [rt]cmd =0x494e464f, len=4
3,304,089 >>> mbox cmd response data (312 bytes)
3,304,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,727 UART:
3,304,743 UART: Running Caliptra ROM ...
3,305,151 UART:
3,305,206 UART: [state] CFI Enabled
3,307,760 UART: [state] LifecycleState = Unprovisioned
3,308,415 UART: [state] DebugLocked = No
3,308,997 UART: [state] WD Timer not started. Device not locked for debugging
3,310,261 UART: [kat] SHA2-256
4,113,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,940 UART: [kat] ++
4,118,092 UART: [kat] sha1
4,122,334 UART: [kat] SHA2-256
4,124,274 UART: [kat] SHA2-384
4,126,981 UART: [kat] SHA2-512-ACC
4,128,881 UART: [kat] ECC-384
4,138,634 UART: [kat] HMAC-384Kdf
4,143,292 UART: [kat] LMS
4,391,604 UART: [kat] --
4,392,218 UART: [update-reset] ++
5,702,462 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,703,517 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,852,969 >>> mbox cmd response: success
5,853,174 UART: [update-reset] Copying MAN_2 To MAN_1
5,861,188 UART: [update-reset Success] --
5,862,263 UART: [state] Locking Datavault
5,862,925 UART: [state] Locking PCR0, PCR1 and PCR31
5,863,529 UART: [state] Locking ICCM
5,864,021 UART: [exit] Launching FMC @ 0x40000130
5,869,350 UART:
5,869,366 UART: Running Caliptra FMC ...
5,869,774 UART:
5,869,828 UART: [state] CFI Enabled
5,959,079 UART: [art] Extend RT PCRs Done
5,959,507 UART: [art] Lock RT PCRs Done
5,960,602 UART: [art] Populate DV Done
5,968,904 UART: [fht] FMC Alias Private Key: 7
5,969,884 UART: [art] Derive CDI
5,970,164 UART: [art] Store in in slot 0x4
6,055,957 UART: [art] Derive Key Pair
6,056,317 UART: [art] Store priv key in slot 0x5
6,069,603 UART: [art] Derive Key Pair - Done
6,084,654 UART: [art] Signing Cert with AUTHO
6,085,134 UART: RITY.KEYID = 7
6,100,170 UART: [art] Erasing AUTHORITY.KEYID = 7
6,100,935 UART: [art] PUB.X = 5D48BADB71E9DA06654520FE7A4C81B2D12B2737037B06FC1680FB2B44F2D5E1B53142064232E4C30AA2F01D51411077
6,107,690 UART: [art] PUB.Y = 33DDE3C27C78A28AC96A8578D5864BED7CED4EEDE62C1CC93AC7A16AC414FC3A569EB2A96E6A0772176FF6219F5D5A6A
6,114,659 UART: [art] SIG.R = 6638FB49126C6C79856F494022381C6E306A7FD9BFB4C2018D4F4EEFDA50F69201E0829B783D6BDA5C4D7FFE1FFBB12F
6,121,437 UART: [art] SIG.S = 19009A534932C17FCD250DADE9EF588BE1BAADA202686B80E38636E4E9806CF7DF8E796475EF6C1B33077784D311071A
6,144,962 UART: Caliptra RT
6,145,215 UART: [state] CFI Enabled
6,426,673 UART: [rt] RT listening for mailbox commands...
6,427,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,456,584 UART: [rt]cmd =0x494e464f, len=4
6,460,355 >>> mbox cmd response data (312 bytes)
6,460,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,461,295 UART:
6,461,311 UART: Running Caliptra ROM ...
6,461,719 UART:
6,461,774 UART: [state] CFI Enabled
6,464,260 UART: [state] LifecycleState = Unprovisioned
6,464,915 UART: [state] DebugLocked = No
6,465,599 UART: [state] WD Timer not started. Device not locked for debugging
6,466,727 UART: [kat] SHA2-256
7,270,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,274,406 UART: [kat] ++
7,274,558 UART: [kat] sha1
7,278,844 UART: [kat] SHA2-256
7,280,784 UART: [kat] SHA2-384
7,283,491 UART: [kat] SHA2-512-ACC
7,285,391 UART: [kat] ECC-384
7,295,004 UART: [kat] HMAC-384Kdf
7,299,564 UART: [kat] LMS
7,547,876 UART: [kat] --
7,548,786 UART: [update-reset] ++
8,859,017 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,860,166 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
9,009,618 >>> mbox cmd response: success
9,009,763 UART: [update-reset] Copying MAN_2 To MAN_1
9,017,777 UART: [update-reset Success] --
9,018,940 UART: [state] Locking Datavault
9,019,770 UART: [state] Locking PCR0, PCR1 and PCR31
9,020,374 UART: [state] Locking ICCM
9,020,920 UART: [exit] Launching FMC @ 0x40000130
9,026,249 UART:
9,026,265 UART: Running Caliptra FMC ...
9,026,673 UART:
9,026,727 UART: [state] CFI Enabled
9,116,124 UART: [art] Extend RT PCRs Done
9,116,552 UART: [art] Lock RT PCRs Done
9,117,925 UART: [art] Populate DV Done
9,126,175 UART: [fht] FMC Alias Private Key: 7
9,127,173 UART: [art] Derive CDI
9,127,453 UART: [art] Store in in slot 0x4
9,212,882 UART: [art] Derive Key Pair
9,213,242 UART: [art] Store priv key in slot 0x5
9,226,378 UART: [art] Derive Key Pair - Done
9,241,100 UART: [art] Signing Cert with AUTHO
9,241,580 UART: RITY.KEYID = 7
9,256,644 UART: [art] Erasing AUTHORITY.KEYID = 7
9,257,409 UART: [art] PUB.X = A3FD3787986854C750B44D56B7E8D4BDEA7B07758EF49222CFDD590F6995DF15E3F560F4A49B2C00996B7B238EA57580
9,264,155 UART: [art] PUB.Y = BC94CC9FFE4B585E1F3A1798E7B2A5B01C0EE0CA67EDE2589E8F5D6C88C66B317788206F2F895D99D4E908EB67D6B444
9,271,113 UART: [art] SIG.R = 4E9057D327AEC3B4DD16143D6D7C0079218E85E13E3D2D6380DEC6AD711287E1B1B3B8F66BA91A6DC15CE8A62786E5BF
9,277,873 UART: [art] SIG.S = 1537D912038E4EA791BA4E5A671B3C0FAB383B8EB8C158158981D32AB5B2705B477F68BC2A991DAB13A3847D65A4E6E5
9,301,050 UART: Caliptra RT
9,301,303 UART: [state] CFI Enabled
9,583,991 UART: [rt] RT listening for mailbox commands...
9,584,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,614,078 UART: [rt]cmd =0x494e464f, len=4
9,617,949 >>> mbox cmd response data (312 bytes)
9,617,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,618,823 UART:
9,618,839 UART: Running Caliptra ROM ...
9,619,247 UART:
9,619,302 UART: [state] CFI Enabled
9,622,370 UART: [state] LifecycleState = Unprovisioned
9,623,025 UART: [state] DebugLocked = No
9,623,703 UART: [state] WD Timer not started. Device not locked for debugging
9,624,895 UART: [kat] SHA2-256
10,428,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,432,574 UART: [kat] ++
10,432,726 UART: [kat] sha1
10,437,066 UART: [kat] SHA2-256
10,439,006 UART: [kat] SHA2-384
10,441,757 UART: [kat] SHA2-512-ACC
10,443,657 UART: [kat] ECC-384
10,453,588 UART: [kat] HMAC-384Kdf
10,457,962 UART: [kat] LMS
10,706,274 UART: [kat] --
10,707,132 UART: [update-reset] ++
12,015,554 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,016,569 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
12,166,021 >>> mbox cmd response: success
12,166,140 UART: [update-reset] Copying MAN_2 To MAN_1
12,174,154 UART: [update-reset Success] --
12,175,341 UART: [state] Locking Datavault
12,176,071 UART: [state] Locking PCR0, PCR1 and PCR31
12,176,675 UART: [state] Locking ICCM
12,177,273 UART: [exit] Launching FMC @ 0x40000130
12,182,602 UART:
12,182,618 UART: Running Caliptra FMC ...
12,183,026 UART:
12,183,080 UART: [state] CFI Enabled
12,272,423 UART: [art] Extend RT PCRs Done
12,272,851 UART: [art] Lock RT PCRs Done
12,274,062 UART: [art] Populate DV Done
12,282,452 UART: [fht] FMC Alias Private Key: 7
12,283,582 UART: [art] Derive CDI
12,283,862 UART: [art] Store in in slot 0x4
12,369,743 UART: [art] Derive Key Pair
12,370,103 UART: [art] Store priv key in slot 0x5
12,383,347 UART: [art] Derive Key Pair - Done
12,398,140 UART: [art] Signing Cert with AUTHO
12,398,620 UART: RITY.KEYID = 7
12,413,118 UART: [art] Erasing AUTHORITY.KEYID = 7
12,413,883 UART: [art] PUB.X = 5D48BADB71E9DA06654520FE7A4C81B2D12B2737037B06FC1680FB2B44F2D5E1B53142064232E4C30AA2F01D51411077
12,420,638 UART: [art] PUB.Y = 33DDE3C27C78A28AC96A8578D5864BED7CED4EEDE62C1CC93AC7A16AC414FC3A569EB2A96E6A0772176FF6219F5D5A6A
12,427,607 UART: [art] SIG.R = 6638FB49126C6C79856F494022381C6E306A7FD9BFB4C2018D4F4EEFDA50F69201E0829B783D6BDA5C4D7FFE1FFBB12F
12,434,385 UART: [art] SIG.S = 19009A534932C17FCD250DADE9EF588BE1BAADA202686B80E38636E4E9806CF7DF8E796475EF6C1B33077784D311071A
12,457,606 UART: Caliptra RT
12,457,859 UART: [state] CFI Enabled
12,733,795 UART: [rt] RT listening for mailbox commands...
12,734,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,763,944 UART: [rt]cmd =0x494e464f, len=4
12,767,679 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,208 ready_for_fw is high
1,056,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,538 >>> mbox cmd response: success
2,618,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,680,435 UART:
2,680,451 UART: Running Caliptra FMC ...
2,680,859 UART:
2,680,913 UART: [state] CFI Enabled
2,691,633 UART: [fht] FMC Alias Private Key: 7
2,798,644 UART: [art] Extend RT PCRs Done
2,799,072 UART: [art] Lock RT PCRs Done
2,800,776 UART: [art] Populate DV Done
2,809,062 UART: [fht] FMC Alias Private Key: 7
2,810,220 UART: [art] Derive CDI
2,810,500 UART: [art] Store in in slot 0x4
2,896,017 UART: [art] Derive Key Pair
2,896,377 UART: [art] Store priv key in slot 0x5
2,909,789 UART: [art] Derive Key Pair - Done
2,924,593 UART: [art] Signing Cert with AUTHO
2,925,073 UART: RITY.KEYID = 7
2,940,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,052 UART: [art] PUB.X = 0298F55E7A23B8D218B922CC7275B17F4C249D10E62A5DBA5607E2E525F2ED892FAA8117B7CEB8A7BAF7B11A774F96BE
2,947,830 UART: [art] PUB.Y = 188D566180119C89CF440126208BD58DFB7C5B7A0508FED9F79B4041C892BA7559EE7E2DD91DC7C8ED7FE721CDA22313
2,954,779 UART: [art] SIG.R = 5073DAD0C90638D679E787BF49C3778F002DA08325BD8EF53A8762A560F75F6FE9D666FDBC355EAD8482D20F0373A694
2,961,522 UART: [art] SIG.S = 87CA5739F791DE8BDAE9E0CA935D95376024DE15DC5F8EC1FA37213C488908D95B28414FBD351C50A052A41066311675
2,985,886 UART: Caliptra RT
2,986,139 UART: [state] CFI Enabled
3,094,120 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,542 UART: [rt]cmd =0x494e464f, len=4
3,128,169 >>> mbox cmd response data (312 bytes)
3,128,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,556,284 >>> mbox cmd response: success
5,569,500 UART:
5,569,516 UART: Running Caliptra FMC ...
5,569,924 UART:
5,569,978 UART: [state] CFI Enabled
5,659,173 UART: [art] Extend RT PCRs Done
5,659,601 UART: [art] Lock RT PCRs Done
5,661,070 UART: [art] Populate DV Done
5,669,724 UART: [fht] FMC Alias Private Key: 7
5,670,776 UART: [art] Derive CDI
5,671,056 UART: [art] Store in in slot 0x4
5,756,853 UART: [art] Derive Key Pair
5,757,213 UART: [art] Store priv key in slot 0x5
5,770,165 UART: [art] Derive Key Pair - Done
5,784,878 UART: [art] Signing Cert with AUTHO
5,785,358 UART: RITY.KEYID = 7
5,800,678 UART: [art] Erasing AUTHORITY.KEYID = 7
5,801,443 UART: [art] PUB.X = 42818FF7390E73CBCFD92615CCADE10385225003A97F38B29E5579D585D8B2A6CFEFF89C0932F12EA83F2FBA235318C5
5,808,209 UART: [art] PUB.Y = 08021920B20A4FA18CED4DE7DAC88018EC7AFBF123C935020D51B4BE541BA1E5DA74F8EEA2ECBFD0186E9468FF46366F
5,815,164 UART: [art] SIG.R = 6CB81EE1789B9864ED2C56767637D0A859B5F9D21DF881F432755D585833B259725139EC876E5C3310CB4A08CD459CB7
5,821,927 UART: [art] SIG.S = EC954297B72557613B942E9B3AC5FE5F8E528C35DEB0024585CA3F72C19EEACF2397A5AEB419A69FCEB845AF6C6358FF
5,845,557 UART: Caliptra RT
5,845,810 UART: [state] CFI Enabled
6,125,611 UART: [rt] RT listening for mailbox commands...
6,126,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,155,762 UART: [rt]cmd =0x494e464f, len=4
6,159,407 >>> mbox cmd response data (312 bytes)
6,159,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,588,220 >>> mbox cmd response: success
8,601,444 UART:
8,601,460 UART: Running Caliptra FMC ...
8,601,868 UART:
8,601,922 UART: [state] CFI Enabled
8,691,191 UART: [art] Extend RT PCRs Done
8,691,619 UART: [art] Lock RT PCRs Done
8,692,854 UART: [art] Populate DV Done
8,701,174 UART: [fht] FMC Alias Private Key: 7
8,702,138 UART: [art] Derive CDI
8,702,418 UART: [art] Store in in slot 0x4
8,788,415 UART: [art] Derive Key Pair
8,788,775 UART: [art] Store priv key in slot 0x5
8,801,889 UART: [art] Derive Key Pair - Done
8,816,351 UART: [art] Signing Cert with AUTHO
8,816,831 UART: RITY.KEYID = 7
8,832,275 UART: [art] Erasing AUTHORITY.KEYID = 7
8,833,040 UART: [art] PUB.X = 06F9F5EC064853702DDB6A81F8F7E2F8C475549A25CBDD0AF9BB0DFA4356967EE8763A9A27EB1A00C9BD524C1E85B27A
8,839,792 UART: [art] PUB.Y = 1404019B08E73070FD5454643A643DC5F09CFF8816CAEC9552FC77AD1EA32BAEE2DF1B0D7BD986BE16ED437408C9AE35
8,846,741 UART: [art] SIG.R = 90C7D346B7B2DA254F2280957AC1E9087443FF5F5AD3D1D11A77F842565146117532E730DAFC3258D335B1410E4315C4
8,853,499 UART: [art] SIG.S = 5C598DADC16684C67057F41A2FF9C198B84AD9209855FE405DD5EB775F61662DF9A76FE8389A9AC1BE524888D9106A52
8,877,364 UART: Caliptra RT
8,877,617 UART: [state] CFI Enabled
9,158,732 UART: [rt] RT listening for mailbox commands...
9,159,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,189,037 UART: [rt]cmd =0x494e464f, len=4
9,192,940 >>> mbox cmd response data (312 bytes)
9,192,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,621,105 >>> mbox cmd response: success
11,634,751 UART:
11,634,767 UART: Running Caliptra FMC ...
11,635,175 UART:
11,635,229 UART: [state] CFI Enabled
11,724,464 UART: [art] Extend RT PCRs Done
11,724,892 UART: [art] Lock RT PCRs Done
11,726,155 UART: [art] Populate DV Done
11,734,577 UART: [fht] FMC Alias Private Key: 7
11,735,607 UART: [art] Derive CDI
11,735,887 UART: [art] Store in in slot 0x4
11,821,814 UART: [art] Derive Key Pair
11,822,174 UART: [art] Store priv key in slot 0x5
11,835,740 UART: [art] Derive Key Pair - Done
11,850,555 UART: [art] Signing Cert with AUTHO
11,851,035 UART: RITY.KEYID = 7
11,865,601 UART: [art] Erasing AUTHORITY.KEYID = 7
11,866,366 UART: [art] PUB.X = 42818FF7390E73CBCFD92615CCADE10385225003A97F38B29E5579D585D8B2A6CFEFF89C0932F12EA83F2FBA235318C5
11,873,132 UART: [art] PUB.Y = 08021920B20A4FA18CED4DE7DAC88018EC7AFBF123C935020D51B4BE541BA1E5DA74F8EEA2ECBFD0186E9468FF46366F
11,880,087 UART: [art] SIG.R = 6CB81EE1789B9864ED2C56767637D0A859B5F9D21DF881F432755D585833B259725139EC876E5C3310CB4A08CD459CB7
11,886,850 UART: [art] SIG.S = EC954297B72557613B942E9B3AC5FE5F8E528C35DEB0024585CA3F72C19EEACF2397A5AEB419A69FCEB845AF6C6358FF
11,910,516 UART: Caliptra RT
11,910,769 UART: [state] CFI Enabled
12,190,964 UART: [rt] RT listening for mailbox commands...
12,191,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,221,291 UART: [rt]cmd =0x494e464f, len=4
12,225,024 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.51s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,179 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,099 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,571 >>> mbox cmd response: success
2,769,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,770,642 UART: [afmc] ++
2,770,810 UART: [afmc] CDI.KEYID = 6
2,771,173 UART: [afmc] SUBJECT.KEYID = 7
2,771,599 UART: [afmc] AUTHORITY.KEYID = 5
2,807,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,686 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,830,379 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,836,250 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,841,952 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,849,672 UART: [afmc] --
2,850,638 UART: [cold-reset] --
2,851,316 UART: [state] Locking Datavault
2,852,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,859 UART: [state] Locking ICCM
2,853,477 UART: [exit] Launching FMC @ 0x40000130
2,858,806 UART:
2,858,822 UART: Running Caliptra FMC ...
2,859,230 UART:
2,859,373 UART: [state] CFI Enabled
2,870,159 UART: [fht] FMC Alias Private Key: 7
2,978,330 UART: [art] Extend RT PCRs Done
2,978,758 UART: [art] Lock RT PCRs Done
2,980,228 UART: [art] Populate DV Done
2,988,254 UART: [fht] FMC Alias Private Key: 7
2,989,258 UART: [art] Derive CDI
2,989,538 UART: [art] Store in in slot 0x4
3,075,213 UART: [art] Derive Key Pair
3,075,573 UART: [art] Store priv key in slot 0x5
3,088,761 UART: [art] Derive Key Pair - Done
3,103,883 UART: [art] Signing Cert with AUTHO
3,104,363 UART: RITY.KEYID = 7
3,119,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,716 UART: [art] PUB.X = 6301EE3306D0BBCF8FDC26B9A2E90E6A5C604A17D52B3B8CBC5910F4EBFB2C3C0EDFC4D410333504A1F405001D61C58F
3,127,464 UART: [art] PUB.Y = 917DE2195033535FA128E8FB1623560AF51BA6457ADB5B1F577DDEDF4BADCFBF6D37DBEA506050E0CD29438C7D241CB5
3,134,429 UART: [art] SIG.R = 3388073C06CA21C760BE6F8B2C87B25FE34611C69F622E2E6BA9DD1199EB7C1593E03AA2626B5F91B1E1D8F00C5EBE3E
3,141,202 UART: [art] SIG.S = 98DA4BDF052D1A78D243995079C198B0ACA81B0709A4901E7FC03D2114D18A6CBA186822201BBE3CD66A2AC805A0CDD2
3,163,867 UART: Caliptra RT
3,164,212 UART: [state] CFI Enabled
3,272,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,873 UART: [rt]cmd =0x494e464f, len=4
3,306,618 >>> mbox cmd response data (312 bytes)
3,306,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,562 UART:
3,307,578 UART: Running Caliptra ROM ...
3,307,986 UART:
3,308,128 UART: [state] CFI Enabled
3,311,164 UART: [state] LifecycleState = Unprovisioned
3,311,819 UART: [state] DebugLocked = No
3,312,465 UART: [state] WD Timer not started. Device not locked for debugging
3,313,671 UART: [kat] SHA2-256
4,117,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,350 UART: [kat] ++
4,121,502 UART: [kat] sha1
4,125,772 UART: [kat] SHA2-256
4,127,712 UART: [kat] SHA2-384
4,130,471 UART: [kat] SHA2-512-ACC
4,132,371 UART: [kat] ECC-384
4,142,488 UART: [kat] HMAC-384Kdf
4,147,056 UART: [kat] LMS
4,395,368 UART: [kat] --
4,396,312 UART: [update-reset] ++
5,704,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,705,387 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,854,839 >>> mbox cmd response: success
5,855,112 UART: [update-reset] Copying MAN_2 To MAN_1
5,863,126 UART: [update-reset Success] --
5,864,097 UART: [state] Locking Datavault
5,864,931 UART: [state] Locking PCR0, PCR1 and PCR31
5,865,535 UART: [state] Locking ICCM
5,866,105 UART: [exit] Launching FMC @ 0x40000130
5,871,434 UART:
5,871,450 UART: Running Caliptra FMC ...
5,871,858 UART:
5,872,001 UART: [state] CFI Enabled
5,960,954 UART: [art] Extend RT PCRs Done
5,961,382 UART: [art] Lock RT PCRs Done
5,962,595 UART: [art] Populate DV Done
5,970,743 UART: [fht] FMC Alias Private Key: 7
5,971,811 UART: [art] Derive CDI
5,972,091 UART: [art] Store in in slot 0x4
6,057,914 UART: [art] Derive Key Pair
6,058,274 UART: [art] Store priv key in slot 0x5
6,071,842 UART: [art] Derive Key Pair - Done
6,086,642 UART: [art] Signing Cert with AUTHO
6,087,122 UART: RITY.KEYID = 7
6,102,154 UART: [art] Erasing AUTHORITY.KEYID = 7
6,102,919 UART: [art] PUB.X = 4DBDE6F6495F0FD530934629CBCD9646386A54386E1070E2029ABD0E9995B1565BCF27EB0514326519AE353BA22A3F74
6,109,677 UART: [art] PUB.Y = 1841A81DE5710F69818188838171905785BF61AD90B20C8BFF100635C5D273E081AB08BCCB028E853ACFE2C0D4AE022D
6,116,611 UART: [art] SIG.R = FA3E292D5355D7615C2BE62124FE8A3D37E7EF2E30FF3F1E7953290D0F67F047AF7549FDC02C36BDFC11184C0487798B
6,123,380 UART: [art] SIG.S = 803094DF69C593752A5084D727A72F2781256A4B6E08B4F61755D042B6C67CD38B2F66DB3FC7D8A206C98A92D2F06C65
6,147,329 UART: Caliptra RT
6,147,674 UART: [state] CFI Enabled
6,427,559 UART: [rt] RT listening for mailbox commands...
6,428,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,457,392 UART: [rt]cmd =0x494e464f, len=4
6,461,207 >>> mbox cmd response data (312 bytes)
6,461,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,461,835 UART:
6,461,851 UART: Running Caliptra ROM ...
6,462,259 UART:
6,462,401 UART: [state] CFI Enabled
6,464,947 UART: [state] LifecycleState = Unprovisioned
6,465,602 UART: [state] DebugLocked = No
6,466,240 UART: [state] WD Timer not started. Device not locked for debugging
6,467,370 UART: [kat] SHA2-256
7,270,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,275,049 UART: [kat] ++
7,275,201 UART: [kat] sha1
7,279,423 UART: [kat] SHA2-256
7,281,363 UART: [kat] SHA2-384
7,284,048 UART: [kat] SHA2-512-ACC
7,285,948 UART: [kat] ECC-384
7,295,777 UART: [kat] HMAC-384Kdf
7,300,275 UART: [kat] LMS
7,548,587 UART: [kat] --
7,549,167 UART: [update-reset] ++
8,857,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,858,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
9,008,100 >>> mbox cmd response: success
9,008,355 UART: [update-reset] Copying MAN_2 To MAN_1
9,016,369 UART: [update-reset Success] --
9,017,256 UART: [state] Locking Datavault
9,018,078 UART: [state] Locking PCR0, PCR1 and PCR31
9,018,682 UART: [state] Locking ICCM
9,019,324 UART: [exit] Launching FMC @ 0x40000130
9,024,653 UART:
9,024,669 UART: Running Caliptra FMC ...
9,025,077 UART:
9,025,220 UART: [state] CFI Enabled
9,114,643 UART: [art] Extend RT PCRs Done
9,115,071 UART: [art] Lock RT PCRs Done
9,116,432 UART: [art] Populate DV Done
9,124,852 UART: [fht] FMC Alias Private Key: 7
9,125,996 UART: [art] Derive CDI
9,126,276 UART: [art] Store in in slot 0x4
9,211,639 UART: [art] Derive Key Pair
9,211,999 UART: [art] Store priv key in slot 0x5
9,225,399 UART: [art] Derive Key Pair - Done
9,240,102 UART: [art] Signing Cert with AUTHO
9,240,582 UART: RITY.KEYID = 7
9,255,938 UART: [art] Erasing AUTHORITY.KEYID = 7
9,256,703 UART: [art] PUB.X = EC14A7C039D2BB0D94ECD65F8857CB94D53B1CD8C92F755410A7B6AD2802436B2255C8520075CA2305609EB2437168F6
9,263,442 UART: [art] PUB.Y = 921499E48C3A0A33BB47E5487117344C784ECDC4D151A2358D5CAC3085AA8EEABACF9D14871C66C921C8839651D82D20
9,270,393 UART: [art] SIG.R = 33CE9E2DB48807AAD90164A4CAD0028A3589FBB5CD9C8314A2E4E62BE7F0747E55C1C49ECBD1751FF50FF080AFBFACC7
9,277,175 UART: [art] SIG.S = 20980E0A709A34E2949683A4852AFADFE22769687AB68C726522381A4F9DC5047EDAFECF13BEAB01EA1D6B11902A1888
9,301,208 UART: Caliptra RT
9,301,553 UART: [state] CFI Enabled
9,584,733 UART: [rt] RT listening for mailbox commands...
9,585,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,614,926 UART: [rt]cmd =0x494e464f, len=4
9,618,459 >>> mbox cmd response data (312 bytes)
9,618,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,619,435 UART:
9,619,451 UART: Running Caliptra ROM ...
9,619,859 UART:
9,620,001 UART: [state] CFI Enabled
9,622,451 UART: [state] LifecycleState = Unprovisioned
9,623,106 UART: [state] DebugLocked = No
9,623,734 UART: [state] WD Timer not started. Device not locked for debugging
9,624,946 UART: [kat] SHA2-256
10,428,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,432,625 UART: [kat] ++
10,432,777 UART: [kat] sha1
10,437,021 UART: [kat] SHA2-256
10,438,961 UART: [kat] SHA2-384
10,441,562 UART: [kat] SHA2-512-ACC
10,443,462 UART: [kat] ECC-384
10,453,249 UART: [kat] HMAC-384Kdf
10,457,897 UART: [kat] LMS
10,706,209 UART: [kat] --
10,707,061 UART: [update-reset] ++
12,015,885 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,016,974 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
12,166,426 >>> mbox cmd response: success
12,166,755 UART: [update-reset] Copying MAN_2 To MAN_1
12,174,769 UART: [update-reset Success] --
12,175,608 UART: [state] Locking Datavault
12,176,424 UART: [state] Locking PCR0, PCR1 and PCR31
12,177,028 UART: [state] Locking ICCM
12,177,630 UART: [exit] Launching FMC @ 0x40000130
12,182,959 UART:
12,182,975 UART: Running Caliptra FMC ...
12,183,383 UART:
12,183,526 UART: [state] CFI Enabled
12,273,167 UART: [art] Extend RT PCRs Done
12,273,595 UART: [art] Lock RT PCRs Done
12,274,710 UART: [art] Populate DV Done
12,283,144 UART: [fht] FMC Alias Private Key: 7
12,284,126 UART: [art] Derive CDI
12,284,406 UART: [art] Store in in slot 0x4
12,370,085 UART: [art] Derive Key Pair
12,370,445 UART: [art] Store priv key in slot 0x5
12,383,341 UART: [art] Derive Key Pair - Done
12,398,055 UART: [art] Signing Cert with AUTHO
12,398,535 UART: RITY.KEYID = 7
12,414,025 UART: [art] Erasing AUTHORITY.KEYID = 7
12,414,790 UART: [art] PUB.X = 4DBDE6F6495F0FD530934629CBCD9646386A54386E1070E2029ABD0E9995B1565BCF27EB0514326519AE353BA22A3F74
12,421,548 UART: [art] PUB.Y = 1841A81DE5710F69818188838171905785BF61AD90B20C8BFF100635C5D273E081AB08BCCB028E853ACFE2C0D4AE022D
12,428,482 UART: [art] SIG.R = FA3E292D5355D7615C2BE62124FE8A3D37E7EF2E30FF3F1E7953290D0F67F047AF7549FDC02C36BDFC11184C0487798B
12,435,251 UART: [art] SIG.S = 803094DF69C593752A5084D727A72F2781256A4B6E08B4F61755D042B6C67CD38B2F66DB3FC7D8A206C98A92D2F06C65
12,458,652 UART: Caliptra RT
12,458,997 UART: [state] CFI Enabled
12,739,368 UART: [rt] RT listening for mailbox commands...
12,740,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,769,421 UART: [rt]cmd =0x494e464f, len=4
12,773,302 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,739 ready_for_fw is high
1,056,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,135 >>> mbox cmd response: success
2,621,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,683,782 UART:
2,683,798 UART: Running Caliptra FMC ...
2,684,206 UART:
2,684,349 UART: [state] CFI Enabled
2,694,599 UART: [fht] FMC Alias Private Key: 7
2,802,490 UART: [art] Extend RT PCRs Done
2,802,918 UART: [art] Lock RT PCRs Done
2,804,450 UART: [art] Populate DV Done
2,812,982 UART: [fht] FMC Alias Private Key: 7
2,813,998 UART: [art] Derive CDI
2,814,278 UART: [art] Store in in slot 0x4
2,899,769 UART: [art] Derive Key Pair
2,900,129 UART: [art] Store priv key in slot 0x5
2,913,075 UART: [art] Derive Key Pair - Done
2,927,736 UART: [art] Signing Cert with AUTHO
2,928,216 UART: RITY.KEYID = 7
2,943,522 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,287 UART: [art] PUB.X = 5FF7DDFB1AB8553D33E8BFAE3DC2BB3EDB0945AD1EC0B547E520B52559CB64D0E4158C57E90562C7C4C61779C8738BEA
2,951,071 UART: [art] PUB.Y = C9236F7255DDEFAAFD3B3007362D510948B56772C54EDE99A2826A5AC6755CD52D92EF320A2E73EF8F4AFE84C994DA25
2,958,024 UART: [art] SIG.R = 47D62B4C506773DBF0B921EF8A0FB7D87400496340B7AA4A8E86782EF12463E624E83CBBC44E5A5D81033AAE2A6DAE47
2,964,776 UART: [art] SIG.S = 6BBD49F9885C192E6E1C938BF9E0051B6118442407429A736C5404813F72AB5009ECFE18CEDD2E7567726B318816FA11
2,988,445 UART: Caliptra RT
2,988,790 UART: [state] CFI Enabled
3,097,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,888 UART: [rt]cmd =0x494e464f, len=4
3,131,493 >>> mbox cmd response data (312 bytes)
3,131,494 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,167 >>> mbox cmd response: success
5,573,299 UART:
5,573,315 UART: Running Caliptra FMC ...
5,573,723 UART:
5,573,866 UART: [state] CFI Enabled
5,663,155 UART: [art] Extend RT PCRs Done
5,663,583 UART: [art] Lock RT PCRs Done
5,664,654 UART: [art] Populate DV Done
5,672,712 UART: [fht] FMC Alias Private Key: 7
5,673,704 UART: [art] Derive CDI
5,673,984 UART: [art] Store in in slot 0x4
5,759,241 UART: [art] Derive Key Pair
5,759,601 UART: [art] Store priv key in slot 0x5
5,772,737 UART: [art] Derive Key Pair - Done
5,787,348 UART: [art] Signing Cert with AUTHO
5,787,828 UART: RITY.KEYID = 7
5,802,286 UART: [art] Erasing AUTHORITY.KEYID = 7
5,803,051 UART: [art] PUB.X = C35BA045FCB19EA2553A607265512F74B44BD3F47D89DAA515693F52AFF7463A4E51DB5BB419FEFB669BDF0DF50F1FEC
5,809,835 UART: [art] PUB.Y = 6FC42F97EEBE17468889C1D52D3E5239B76C0EF6FE5F14883EB093805C8BC863D65815EC7A24EACFC05730DE9029D965
5,816,790 UART: [art] SIG.R = B86988338A70A6025475BB4E2233B68E2C647F9320E106A599BF8D2F38F763B45D87E0E20B4F62B28D1BD31C35FEBC67
5,823,553 UART: [art] SIG.S = 4C822C3F8B0D514E0823209088AED5BEFB93124DA648F1364B681B392B6B9782B97E506D90BAAAD47118AF6930067577
5,847,231 UART: Caliptra RT
5,847,576 UART: [state] CFI Enabled
6,125,905 UART: [rt] RT listening for mailbox commands...
6,126,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,156,270 UART: [rt]cmd =0x494e464f, len=4
6,160,101 >>> mbox cmd response data (312 bytes)
6,160,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,590,669 >>> mbox cmd response: success
8,604,383 UART:
8,604,399 UART: Running Caliptra FMC ...
8,604,807 UART:
8,604,950 UART: [state] CFI Enabled
8,694,171 UART: [art] Extend RT PCRs Done
8,694,599 UART: [art] Lock RT PCRs Done
8,695,840 UART: [art] Populate DV Done
8,704,032 UART: [fht] FMC Alias Private Key: 7
8,705,028 UART: [art] Derive CDI
8,705,308 UART: [art] Store in in slot 0x4
8,790,939 UART: [art] Derive Key Pair
8,791,299 UART: [art] Store priv key in slot 0x5
8,804,283 UART: [art] Derive Key Pair - Done
8,819,272 UART: [art] Signing Cert with AUTHO
8,819,752 UART: RITY.KEYID = 7
8,834,446 UART: [art] Erasing AUTHORITY.KEYID = 7
8,835,211 UART: [art] PUB.X = 22A4892D9AA6E40B8FE41B0B0F976CB25A268243986F01FED31C779D86A3ACC826A49757CC553F8287EC269D8FEFD718
8,841,977 UART: [art] PUB.Y = 16980AE52D2219D371EB12197E2993E9059F6EFA76BC2B6226216C942AD6CD0BEC6510BC765FF3C9CAAD88CC1B594000
8,848,904 UART: [art] SIG.R = A8B98F4815468C0BBD704C9AE1EAC816DD537F28D5C1FB9A8BBC674139F9397FF1F4CC62C37E13A84BDD4D28370A3E13
8,855,684 UART: [art] SIG.S = 71243BA9EE097A71E765B0DBB851186FB5560BD266D7552F278DD88D178DD5DCD15C11244665EF10DB06B1095FD5032B
8,878,858 UART: Caliptra RT
8,879,203 UART: [state] CFI Enabled
9,162,318 UART: [rt] RT listening for mailbox commands...
9,162,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,192,511 UART: [rt]cmd =0x494e464f, len=4
9,196,278 >>> mbox cmd response data (312 bytes)
9,196,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,625,690 >>> mbox cmd response: success
11,638,782 UART:
11,638,798 UART: Running Caliptra FMC ...
11,639,206 UART:
11,639,349 UART: [state] CFI Enabled
11,728,306 UART: [art] Extend RT PCRs Done
11,728,734 UART: [art] Lock RT PCRs Done
11,729,759 UART: [art] Populate DV Done
11,737,895 UART: [fht] FMC Alias Private Key: 7
11,738,899 UART: [art] Derive CDI
11,739,179 UART: [art] Store in in slot 0x4
11,824,630 UART: [art] Derive Key Pair
11,824,990 UART: [art] Store priv key in slot 0x5
11,838,776 UART: [art] Derive Key Pair - Done
11,853,265 UART: [art] Signing Cert with AUTHO
11,853,745 UART: RITY.KEYID = 7
11,868,641 UART: [art] Erasing AUTHORITY.KEYID = 7
11,869,406 UART: [art] PUB.X = C35BA045FCB19EA2553A607265512F74B44BD3F47D89DAA515693F52AFF7463A4E51DB5BB419FEFB669BDF0DF50F1FEC
11,876,190 UART: [art] PUB.Y = 6FC42F97EEBE17468889C1D52D3E5239B76C0EF6FE5F14883EB093805C8BC863D65815EC7A24EACFC05730DE9029D965
11,883,145 UART: [art] SIG.R = B86988338A70A6025475BB4E2233B68E2C647F9320E106A599BF8D2F38F763B45D87E0E20B4F62B28D1BD31C35FEBC67
11,889,908 UART: [art] SIG.S = 4C822C3F8B0D514E0823209088AED5BEFB93124DA648F1364B681B392B6B9782B97E506D90BAAAD47118AF6930067577
11,913,834 UART: Caliptra RT
11,914,179 UART: [state] CFI Enabled
12,197,076 UART: [rt] RT listening for mailbox commands...
12,197,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,227,215 UART: [rt]cmd =0x494e464f, len=4
12,230,836 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,148 UART:
192,517 UART: Running Caliptra ROM ...
193,644 UART:
193,792 UART: [state] CFI Enabled
263,096 UART: [state] LifecycleState = Unprovisioned
265,035 UART: [state] DebugLocked = No
267,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,304 UART: [kat] SHA2-256
442,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,471 UART: [kat] ++
452,918 UART: [kat] sha1
464,786 UART: [kat] SHA2-256
467,435 UART: [kat] SHA2-384
473,069 UART: [kat] SHA2-512-ACC
475,435 UART: [kat] ECC-384
2,769,426 UART: [kat] HMAC-384Kdf
2,799,842 UART: [kat] LMS
3,990,110 UART: [kat] --
3,995,203 UART: [cold-reset] ++
3,996,715 UART: [fht] Storing FHT @ 0x50003400
4,009,549 UART: [idev] ++
4,010,124 UART: [idev] CDI.KEYID = 6
4,011,060 UART: [idev] SUBJECT.KEYID = 7
4,012,314 UART: [idev] UDS.KEYID = 0
4,013,304 ready_for_fw is high
4,013,502 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,595 UART: [idev] Erasing UDS.KEYID = 0
7,348,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,621 UART: [idev] --
7,374,451 UART: [ldev] ++
7,375,017 UART: [ldev] CDI.KEYID = 6
7,375,990 UART: [ldev] SUBJECT.KEYID = 5
7,377,209 UART: [ldev] AUTHORITY.KEYID = 7
7,378,442 UART: [ldev] FE.KEYID = 1
7,422,431 UART: [ldev] Erasing FE.KEYID = 1
10,751,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,267 UART: [ldev] --
13,115,419 UART: [fwproc] Waiting for Commands...
13,118,698 UART: [fwproc] Received command 0x46574c44
13,120,932 UART: [fwproc] Received Image of size 113760 bytes
17,168,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,630,895 >>> mbox cmd response: success
17,631,398 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,635,631 UART: [afmc] ++
17,636,269 UART: [afmc] CDI.KEYID = 6
17,637,180 UART: [afmc] SUBJECT.KEYID = 7
17,638,394 UART: [afmc] AUTHORITY.KEYID = 5
21,000,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,299,867 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,269 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,108 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,503 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,365,012 UART: [afmc] --
23,368,828 UART: [cold-reset] --
23,373,182 UART: [state] Locking Datavault
23,378,322 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,076 UART: [state] Locking ICCM
23,382,178 UART: [exit] Launching FMC @ 0x40000130
23,390,530 UART:
23,390,816 UART: Running Caliptra FMC ...
23,391,924 UART:
23,392,085 UART: [state] CFI Enabled
23,458,835 UART: [fht] FMC Alias Private Key: 7
25,797,245 UART: [art] Extend RT PCRs Done
25,798,467 UART: [art] Lock RT PCRs Done
25,800,146 UART: [art] Populate DV Done
25,805,665 UART: [fht] FMC Alias Private Key: 7
25,807,361 UART: [art] Derive CDI
25,808,173 UART: [art] Store in in slot 0x4
25,866,814 UART: [art] Derive Key Pair
25,868,025 UART: [art] Store priv key in slot 0x5
29,161,116 UART: [art] Derive Key Pair - Done
29,173,952 UART: [art] Signing Cert with AUTHO
29,175,257 UART: RITY.KEYID = 7
31,462,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,159 UART: [art] PUB.X = 61C020B12A7D037D05083CE81009934D2DC0907BE76636561C6D2F7457089C442CAA77958C83728C9B598A6D16A1FAF7
31,471,428 UART: [art] PUB.Y = 61323346E4B121258F4987F36969B44652886F9060768F17B57DA7634749C46A9EC023413C271ADF2D019686C93488ED
31,478,560 UART: [art] SIG.R = 4758274DEBA0C2A8CF88DAA14F49048B696205B1424A8FB8FD5CEEE20BFCBE3B19CB43098BD9C8601BB69AF29F5B40D7
31,486,010 UART: [art] SIG.S = 4995F2DD3AD9A4BD3797785967D5265C97A57DA4E5BE2FC5BAB2111E0C6BF5729782440B5E6AAB26D1EDAFA67B7AA60D
32,791,545 UART: Caliptra RT
32,792,232 UART: [state] CFI Enabled
32,952,077 UART: [rt] RT listening for mailbox commands...
32,983,596 UART: [rt]cmd =0x49444549, len=4
32,986,364 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,806,048 ready_for_fw is high
3,806,457 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,617 >>> mbox cmd response: success
17,885,171 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,587,144 UART:
23,587,534 UART: Running Caliptra FMC ...
23,588,635 UART:
23,588,790 UART: [state] CFI Enabled
23,656,952 UART: [fht] FMC Alias Private Key: 7
25,994,644 UART: [art] Extend RT PCRs Done
25,995,875 UART: [art] Lock RT PCRs Done
25,997,478 UART: [art] Populate DV Done
26,002,732 UART: [fht] FMC Alias Private Key: 7
26,004,278 UART: [art] Derive CDI
26,005,100 UART: [art] Store in in slot 0x4
26,065,846 UART: [art] Derive Key Pair
26,066,885 UART: [art] Store priv key in slot 0x5
29,359,602 UART: [art] Derive Key Pair - Done
29,372,602 UART: [art] Signing Cert with AUTHO
29,373,916 UART: RITY.KEYID = 7
31,660,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,480 UART: [art] PUB.X = 0BCD0D47C7F7B1E8202C189797DA97AB97262804DAFEDA1969378D51EFB446F7BEEAF7655706A10F7BFC242C57A841BD
31,669,738 UART: [art] PUB.Y = AB93B4FBC7B705E98EA5683120AD13236D75F8A24C818E412838FE4588B8ED3B3D84AFA9E43DC880943BBF06ED38F996
31,676,997 UART: [art] SIG.R = FDC46E72356AED41515CBCB1FB267FA40B3CBE69E7E5322FC7670F5979DD6384F345517D64A62DDB477584270D2C16AD
31,684,339 UART: [art] SIG.S = D0DA6DDE07378B2A56D2B331C6C10639DA4B2C9DFE442254F35C0F49A703253B4353C989E4356B86E6BA947A86314DA2
32,989,383 UART: Caliptra RT
32,990,101 UART: [state] CFI Enabled
33,150,879 UART: [rt] RT listening for mailbox commands...
33,182,119 UART: [rt]cmd =0x49444549, len=4
33,184,919 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,827 writing to cptra_bootfsm_go
192,908 UART:
193,273 UART: Running Caliptra ROM ...
194,388 UART:
604,152 UART: [state] CFI Enabled
618,951 UART: [state] LifecycleState = Unprovisioned
620,904 UART: [state] DebugLocked = No
622,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,480 UART: [kat] SHA2-256
797,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,756 UART: [kat] ++
808,200 UART: [kat] sha1
819,847 UART: [kat] SHA2-256
822,571 UART: [kat] SHA2-384
828,841 UART: [kat] SHA2-512-ACC
831,207 UART: [kat] ECC-384
3,113,226 UART: [kat] HMAC-384Kdf
3,126,268 UART: [kat] LMS
4,316,360 UART: [kat] --
4,321,387 UART: [cold-reset] ++
4,323,756 UART: [fht] Storing FHT @ 0x50003400
4,334,239 UART: [idev] ++
4,334,796 UART: [idev] CDI.KEYID = 6
4,335,822 UART: [idev] SUBJECT.KEYID = 7
4,336,996 UART: [idev] UDS.KEYID = 0
4,338,080 ready_for_fw is high
4,338,307 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,238 UART: [idev] Erasing UDS.KEYID = 0
7,618,959 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,431 UART: [idev] --
7,644,050 UART: [ldev] ++
7,644,673 UART: [ldev] CDI.KEYID = 6
7,645,637 UART: [ldev] SUBJECT.KEYID = 5
7,646,840 UART: [ldev] AUTHORITY.KEYID = 7
7,648,065 UART: [ldev] FE.KEYID = 1
7,659,164 UART: [ldev] Erasing FE.KEYID = 1
10,948,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,908 UART: [ldev] --
13,309,244 UART: [fwproc] Waiting for Commands...
13,312,248 UART: [fwproc] Received command 0x46574c44
13,314,424 UART: [fwproc] Received Image of size 113760 bytes
17,365,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,063 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,542 >>> mbox cmd response: success
17,825,091 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,829,598 UART: [afmc] ++
17,830,208 UART: [afmc] CDI.KEYID = 6
17,831,097 UART: [afmc] SUBJECT.KEYID = 7
17,832,371 UART: [afmc] AUTHORITY.KEYID = 5
21,144,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,070 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,468 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,286 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,731 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,294 UART: [afmc] --
23,510,620 UART: [cold-reset] --
23,515,786 UART: [state] Locking Datavault
23,520,923 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,614 UART: [state] Locking ICCM
23,523,764 UART: [exit] Launching FMC @ 0x40000130
23,532,151 UART:
23,532,409 UART: Running Caliptra FMC ...
23,533,432 UART:
23,533,574 UART: [state] CFI Enabled
23,541,833 UART: [fht] FMC Alias Private Key: 7
25,872,953 UART: [art] Extend RT PCRs Done
25,874,172 UART: [art] Lock RT PCRs Done
25,875,743 UART: [art] Populate DV Done
25,881,312 UART: [fht] FMC Alias Private Key: 7
25,882,745 UART: [art] Derive CDI
25,883,505 UART: [art] Store in in slot 0x4
25,926,211 UART: [art] Derive Key Pair
25,927,270 UART: [art] Store priv key in slot 0x5
29,169,314 UART: [art] Derive Key Pair - Done
29,182,305 UART: [art] Signing Cert with AUTHO
29,183,599 UART: RITY.KEYID = 7
31,462,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,516 UART: [art] PUB.X = 5EBA5D3D9B9D502DFF8B8871023F09D768C55B4F190074DC9268906C3F480370FAB8D4A0757E01FCCC2DBE305BF95B49
31,471,716 UART: [art] PUB.Y = 43C7D8FD357538B127818A61CB4162BE94E81FC10E5A6435F443BECB15FE0D4704CF7AB493D9E2AA4099D52B6F9D1265
31,479,030 UART: [art] SIG.R = 79A670126BD00BF35463AC05A16B4460A37B46E71EA34FA0212E18C19DFF87238C9997381CC4492D397144D4709CA31B
31,486,392 UART: [art] SIG.S = 906F2693E5718F6405C99CBA9BC4BD5AA6789734D1EAE000A3A608DA175B6B3BE75F962FF9BAE105FE96877D2740696D
32,791,359 UART: Caliptra RT
32,792,072 UART: [state] CFI Enabled
32,909,613 UART: [rt] RT listening for mailbox commands...
32,941,021 UART: [rt]cmd =0x49444549, len=4
32,944,023 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
4,129,180 ready_for_fw is high
4,129,705 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,071,383 >>> mbox cmd response: success
18,072,017 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,715,828 UART:
23,716,212 UART: Running Caliptra FMC ...
23,717,348 UART:
23,717,499 UART: [state] CFI Enabled
23,725,336 UART: [fht] FMC Alias Private Key: 7
26,056,209 UART: [art] Extend RT PCRs Done
26,057,439 UART: [art] Lock RT PCRs Done
26,058,955 UART: [art] Populate DV Done
26,064,478 UART: [fht] FMC Alias Private Key: 7
26,066,018 UART: [art] Derive CDI
26,066,838 UART: [art] Store in in slot 0x4
26,109,324 UART: [art] Derive Key Pair
26,110,325 UART: [art] Store priv key in slot 0x5
29,352,287 UART: [art] Derive Key Pair - Done
29,365,673 UART: [art] Signing Cert with AUTHO
29,366,994 UART: RITY.KEYID = 7
31,645,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,350 UART: [art] PUB.X = 2084720FEAA49246CB8A2CB14C18FA66B68F1111A3693544D63D8241105A2071BDED11544C4ED42AD0FB6330063E24E6
31,654,571 UART: [art] PUB.Y = A8E813D52439A3FC7215F85BED070B033693D80D8A9A9F484998204C030F58C60485FCEDD9F9DCC8155F1C903B8E4516
31,661,796 UART: [art] SIG.R = 3CE0A7AAA322936E36EE758535B08FEBDB51AFE466BD750E6F10038652085560CE7461EA4D29A0E6942FE3052F0E2169
31,669,181 UART: [art] SIG.S = BDC3379FC1D6648F46344D44AC3346AD38ED0AE1C0E2D64DE11C7C81A15F86A9199FD67C241702B51D702C93F9518746
32,974,532 UART: Caliptra RT
32,975,242 UART: [state] CFI Enabled
33,092,358 UART: [rt] RT listening for mailbox commands...
33,123,763 UART: [rt]cmd =0x49444549, len=4
33,126,428 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
192,728 UART:
193,109 UART: Running Caliptra ROM ...
194,256 UART:
194,404 UART: [state] CFI Enabled
264,368 UART: [state] LifecycleState = Unprovisioned
266,226 UART: [state] DebugLocked = No
269,029 UART: [state] WD Timer not started. Device not locked for debugging
273,279 UART: [kat] SHA2-256
452,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,970 UART: [kat] ++
464,416 UART: [kat] sha1
474,532 UART: [kat] SHA2-256
477,510 UART: [kat] SHA2-384
483,929 UART: [kat] SHA2-512-ACC
486,940 UART: [kat] ECC-384
2,947,248 UART: [kat] HMAC-384Kdf
2,970,082 UART: [kat] LMS
3,499,532 UART: [kat] --
3,502,838 UART: [cold-reset] ++
3,504,632 UART: [fht] FHT @ 0x50003400
3,516,688 UART: [idev] ++
3,517,287 UART: [idev] CDI.KEYID = 6
3,518,169 UART: [idev] SUBJECT.KEYID = 7
3,519,407 UART: [idev] UDS.KEYID = 0
3,520,299 ready_for_fw is high
3,520,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,801 UART: [idev] Erasing UDS.KEYID = 0
6,026,040 UART: [idev] Sha1 KeyId Algorithm
6,048,680 UART: [idev] --
6,054,347 UART: [ldev] ++
6,054,923 UART: [ldev] CDI.KEYID = 6
6,055,845 UART: [ldev] SUBJECT.KEYID = 5
6,057,023 UART: [ldev] AUTHORITY.KEYID = 7
6,058,255 UART: [ldev] FE.KEYID = 1
6,098,718 UART: [ldev] Erasing FE.KEYID = 1
8,601,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,801 UART: [ldev] --
10,409,621 UART: [fwproc] Wait for Commands...
10,411,225 UART: [fwproc] Recv command 0x46574c44
10,413,262 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,269,697 >>> mbox cmd response: success
14,270,180 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,274,457 UART: [afmc] ++
14,275,064 UART: [afmc] CDI.KEYID = 6
14,275,943 UART: [afmc] SUBJECT.KEYID = 7
14,277,157 UART: [afmc] AUTHORITY.KEYID = 5
16,805,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,332 UART: [afmc] --
18,606,519 UART: [cold-reset] --
18,611,292 UART: [state] Locking Datavault
18,617,186 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,824 UART: [state] Locking ICCM
18,620,433 UART: [exit] Launching FMC @ 0x40000130
18,628,823 UART:
18,629,080 UART: Running Caliptra FMC ...
18,630,185 UART:
18,630,340 UART: [state] CFI Enabled
18,686,444 UART: [fht] FMC Alias Private Key: 7
20,450,168 UART: [art] Extend RT PCRs Done
20,451,391 UART: [art] Lock RT PCRs Done
20,453,014 UART: [art] Populate DV Done
20,458,424 UART: [fht] FMC Alias Private Key: 7
20,460,065 UART: [art] Derive CDI
20,460,880 UART: [art] Store in in slot 0x4
20,519,309 UART: [art] Derive Key Pair
20,520,351 UART: [art] Store priv key in slot 0x5
22,983,424 UART: [art] Derive Key Pair - Done
22,996,418 UART: [art] Signing Cert with AUTHO
22,997,715 UART: RITY.KEYID = 7
24,709,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,541 UART: [art] PUB.X = FF8B68F8E1F23FF3376126860E8174D90A70801CF703C294DCC2F699E667EA8B6982C23CD7130B0585F7429CCF9FCB71
24,718,663 UART: [art] PUB.Y = A874C74548288E7D191F3B3430A7B87C3FED103B372F914D530A49AD98C1D4F95DF3A7B8E442FA307B468EE85087FFC2
24,725,873 UART: [art] SIG.R = 3F930CD3B1F1F18D74B566221F5656797ED34C81ED4C03573C5903E9E9CE0BD362A64EBEA3EFC2242665F463C1EE7702
24,733,247 UART: [art] SIG.S = 967530A2E6C23735673E9D44070CF50E434F0CCA08BCFC9CB299A8A0F1BD7E84C042392E54CD38DFD21089E46C92334C
25,712,750 UART: Caliptra RT
25,713,462 UART: [state] CFI Enabled
25,878,720 UART: [rt] RT listening for mailbox commands...
25,910,293 UART: [rt]cmd =0x49444549, len=4
25,912,976 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,648 writing to cptra_bootfsm_go
3,382,854 ready_for_fw is high
3,383,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,050,105 >>> mbox cmd response: success
14,050,685 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,343,655 UART:
18,344,039 UART: Running Caliptra FMC ...
18,345,175 UART:
18,345,329 UART: [state] CFI Enabled
18,413,487 UART: [fht] FMC Alias Private Key: 7
20,177,462 UART: [art] Extend RT PCRs Done
20,178,678 UART: [art] Lock RT PCRs Done
20,180,568 UART: [art] Populate DV Done
20,185,705 UART: [fht] FMC Alias Private Key: 7
20,187,296 UART: [art] Derive CDI
20,188,055 UART: [art] Store in in slot 0x4
20,246,376 UART: [art] Derive Key Pair
20,247,414 UART: [art] Store priv key in slot 0x5
22,710,396 UART: [art] Derive Key Pair - Done
22,723,451 UART: [art] Signing Cert with AUTHO
22,724,753 UART: RITY.KEYID = 7
24,436,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,287 UART: [art] PUB.X = 4E44EC16743E613BC843C4F40FE164A28E0CC5B7D98B169B9AB18EC6B99EB1438EC96EC0F430C6B473FA1E29BEC9DE0E
24,445,556 UART: [art] PUB.Y = EBA7BDEB48AE412366EA0403062AB73CF4F2D4F7905C165C01F903F4A8A784E664E69CBA400F19A72929833709709054
24,452,836 UART: [art] SIG.R = 2C5ED4B6EBE234E1E9917DE12DC47293EF5974F8762D72565815145217381F925A2CCBAC2F56F9A212DC98FAC833FD39
24,460,202 UART: [art] SIG.S = 72CBF23ABC1E4D1C1A017EB5E5A02CB7A5E1B722CCDC29AA8CB7BD2582795AA74B6D8C9023B537C66264A8CBC1768882
25,438,549 UART: Caliptra RT
25,439,267 UART: [state] CFI Enabled
25,604,572 UART: [rt] RT listening for mailbox commands...
25,636,193 UART: [rt]cmd =0x49444549, len=4
25,638,831 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,946 writing to cptra_bootfsm_go
193,057 UART:
193,446 UART: Running Caliptra ROM ...
194,555 UART:
604,302 UART: [state] CFI Enabled
618,891 UART: [state] LifecycleState = Unprovisioned
620,744 UART: [state] DebugLocked = No
622,840 UART: [state] WD Timer not started. Device not locked for debugging
626,674 UART: [kat] SHA2-256
805,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,368 UART: [kat] ++
817,904 UART: [kat] sha1
829,921 UART: [kat] SHA2-256
832,922 UART: [kat] SHA2-384
839,197 UART: [kat] SHA2-512-ACC
842,138 UART: [kat] ECC-384
3,283,380 UART: [kat] HMAC-384Kdf
3,296,045 UART: [kat] LMS
3,825,553 UART: [kat] --
3,827,011 UART: [cold-reset] ++
3,829,169 UART: [fht] FHT @ 0x50003400
3,840,221 UART: [idev] ++
3,840,807 UART: [idev] CDI.KEYID = 6
3,841,731 UART: [idev] SUBJECT.KEYID = 7
3,842,910 UART: [idev] UDS.KEYID = 0
3,843,810 ready_for_fw is high
3,844,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,285 UART: [idev] Erasing UDS.KEYID = 0
6,317,573 UART: [idev] Sha1 KeyId Algorithm
6,340,740 UART: [idev] --
6,344,782 UART: [ldev] ++
6,345,355 UART: [ldev] CDI.KEYID = 6
6,346,267 UART: [ldev] SUBJECT.KEYID = 5
6,347,427 UART: [ldev] AUTHORITY.KEYID = 7
6,348,658 UART: [ldev] FE.KEYID = 1
6,359,412 UART: [ldev] Erasing FE.KEYID = 1
8,830,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,580 UART: [ldev] --
10,621,996 UART: [fwproc] Wait for Commands...
10,624,959 UART: [fwproc] Recv command 0x46574c44
10,627,055 UART: [fwproc] Recv'd Img size: 114084 bytes
14,026,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,495 >>> mbox cmd response: success
14,490,022 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,493,185 UART: [afmc] ++
14,493,770 UART: [afmc] CDI.KEYID = 6
14,494,687 UART: [afmc] SUBJECT.KEYID = 7
14,495,846 UART: [afmc] AUTHORITY.KEYID = 5
16,996,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,514 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,273 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,121 UART: [afmc] --
18,792,617 UART: [cold-reset] --
18,796,530 UART: [state] Locking Datavault
18,802,210 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,857 UART: [state] Locking ICCM
18,805,576 UART: [exit] Launching FMC @ 0x40000130
18,813,978 UART:
18,814,219 UART: Running Caliptra FMC ...
18,815,324 UART:
18,815,484 UART: [state] CFI Enabled
18,823,766 UART: [fht] FMC Alias Private Key: 7
20,580,856 UART: [art] Extend RT PCRs Done
20,582,078 UART: [art] Lock RT PCRs Done
20,583,944 UART: [art] Populate DV Done
20,589,299 UART: [fht] FMC Alias Private Key: 7
20,590,844 UART: [art] Derive CDI
20,591,580 UART: [art] Store in in slot 0x4
20,634,173 UART: [art] Derive Key Pair
20,635,213 UART: [art] Store priv key in slot 0x5
23,062,204 UART: [art] Derive Key Pair - Done
23,075,365 UART: [art] Signing Cert with AUTHO
23,076,671 UART: RITY.KEYID = 7
24,782,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,559 UART: [art] PUB.X = 62ABDF607D5C2F3BF117F69E63229BE321EDE16CDA14124B4519B749ABFCB1BB77B2FC36A8DA5EDEA65CE94E1EB21D72
24,790,888 UART: [art] PUB.Y = A2354221ED68D8A32DD6AE0E8BE364EBD109170FFB0CCC954531A49F0EAF8E5E7E695FEC8BD6D379571013D7545178DC
24,798,139 UART: [art] SIG.R = 8FA631CC82301C8E02A46D1BB9C390A9756667CEBAC8B2D7A54799F34BAE5388EA6A7A4AD5E759F78B1E26A9F8BC76CC
24,805,570 UART: [art] SIG.S = 3A9C318E0A241D2010834DA9C6B0EED089BBCC1CC7DD387B021A96C55596FF85D0E29BEDEC95D0C915E398F56BCF9194
25,784,479 UART: Caliptra RT
25,785,196 UART: [state] CFI Enabled
25,903,417 UART: [rt] RT listening for mailbox commands...
25,934,834 UART: [rt]cmd =0x49444549, len=4
25,937,598 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,818 writing to cptra_bootfsm_go
3,698,468 ready_for_fw is high
3,699,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,275 >>> mbox cmd response: success
14,260,962 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,515,329 UART:
18,515,723 UART: Running Caliptra FMC ...
18,516,926 UART:
18,517,091 UART: [state] CFI Enabled
18,525,035 UART: [fht] FMC Alias Private Key: 7
20,281,931 UART: [art] Extend RT PCRs Done
20,283,145 UART: [art] Lock RT PCRs Done
20,284,988 UART: [art] Populate DV Done
20,290,315 UART: [fht] FMC Alias Private Key: 7
20,291,863 UART: [art] Derive CDI
20,292,683 UART: [art] Store in in slot 0x4
20,335,495 UART: [art] Derive Key Pair
20,336,497 UART: [art] Store priv key in slot 0x5
22,762,961 UART: [art] Derive Key Pair - Done
22,776,021 UART: [art] Signing Cert with AUTHO
22,777,333 UART: RITY.KEYID = 7
24,482,863 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,370 UART: [art] PUB.X = EC1AF66FCB0A9C97BF4A77DB3895D60E48425BD256B2C4BAE05ED2F17BAC61902FB7174B3B670E73A2921C4241BAB3DE
24,491,647 UART: [art] PUB.Y = C6A9FBA0DF06BF46C830C0934B60B73AFF6E957CABA6FA542DFB77E781EEEC90C3B62E794B8C64378D1344F1FFDA7CDB
24,498,979 UART: [art] SIG.R = 6A456A6680A1390E0AF4168EDF35F69D9E50CEC49574A1F69CBA4137F0C5E883848D657873AC6ABDC21A80F6008AC783
24,506,375 UART: [art] SIG.S = 0B5AEC7C8D33C2AB3FF71C312D84AF78BA38D82ED8F42FB1043FC69C909EE752B09F429449B2DA2E06898C1E657F5882
25,485,895 UART: Caliptra RT
25,486,598 UART: [state] CFI Enabled
25,604,090 UART: [rt] RT listening for mailbox commands...
25,635,629 UART: [rt]cmd =0x49444549, len=4
25,638,432 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,373 UART:
192,755 UART: Running Caliptra ROM ...
193,952 UART:
194,106 UART: [state] CFI Enabled
265,141 UART: [state] LifecycleState = Unprovisioned
267,511 UART: [state] DebugLocked = No
269,758 UART: [state] WD Timer not started. Device not locked for debugging
274,315 UART: [kat] SHA2-256
464,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,943 UART: [kat] ++
475,396 UART: [kat] sha1
487,722 UART: [kat] SHA2-256
490,805 UART: [kat] SHA2-384
496,168 UART: [kat] SHA2-512-ACC
498,751 UART: [kat] ECC-384
2,961,099 UART: [kat] HMAC-384Kdf
2,986,114 UART: [kat] LMS
3,517,851 UART: [kat] --
3,522,556 UART: [cold-reset] ++
3,523,710 UART: [fht] FHT @ 0x50003400
3,534,457 UART: [idev] ++
3,535,119 UART: [idev] CDI.KEYID = 6
3,536,158 UART: [idev] SUBJECT.KEYID = 7
3,537,262 UART: [idev] UDS.KEYID = 0
3,538,205 ready_for_fw is high
3,538,422 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,681,840 UART: [idev] Erasing UDS.KEYID = 0
6,044,022 UART: [idev] Sha1 KeyId Algorithm
6,066,778 UART: [idev] --
6,072,777 UART: [ldev] ++
6,073,456 UART: [ldev] CDI.KEYID = 6
6,074,398 UART: [ldev] SUBJECT.KEYID = 5
6,075,554 UART: [ldev] AUTHORITY.KEYID = 7
6,076,784 UART: [ldev] FE.KEYID = 1
6,114,200 UART: [ldev] Erasing FE.KEYID = 1
8,618,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,583 UART: [ldev] --
10,427,860 UART: [fwproc] Wait for Commands...
10,430,248 UART: [fwproc] Recv command 0x46574c44
10,432,506 UART: [fwproc] Recv'd Img size: 114084 bytes
13,872,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,610,711 >>> mbox cmd response: success
14,611,247 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,614,027 UART: [afmc] ++
14,614,723 UART: [afmc] CDI.KEYID = 6
14,615,835 UART: [afmc] SUBJECT.KEYID = 7
14,617,380 UART: [afmc] AUTHORITY.KEYID = 5
17,144,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,869,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,871,713 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,886,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,901,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,859 UART: [afmc] --
18,944,692 UART: [cold-reset] --
18,948,350 UART: [state] Locking Datavault
18,953,889 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,065 UART: [state] Locking ICCM
18,957,414 UART: [exit] Launching FMC @ 0x40000130
18,966,061 UART:
18,966,340 UART: Running Caliptra FMC ...
18,967,369 UART:
18,967,515 UART: [state] CFI Enabled
19,025,829 UART: [fht] FMC Alias Private Key: 7
20,789,863 UART: [art] Extend RT PCRs Done
20,791,093 UART: [art] Lock RT PCRs Done
20,792,799 UART: [art] Populate DV Done
20,798,315 UART: [fht] FMC Alias Private Key: 7
20,800,064 UART: [art] Derive CDI
20,800,878 UART: [art] Store in in slot 0x4
20,859,081 UART: [art] Derive Key Pair
20,860,122 UART: [art] Store priv key in slot 0x5
23,323,283 UART: [art] Derive Key Pair - Done
23,336,276 UART: [art] Signing Cert with AUTHO
23,337,565 UART: RITY.KEYID = 7
25,048,634 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,157 UART: [art] PUB.X = D58524D0D1B3A2EB168406BA204DE072D8AB0B578485FA9060282A39892E86297D67F3B62EC3A26D694926A826FE7424
25,057,428 UART: [art] PUB.Y = 1AEECB183DBFF69126971C5D8742925FB1A2A6CA1CD82D44DE0F69614B75359390358D0B0238DFD426A8722D68FB8BCF
25,064,672 UART: [art] SIG.R = 99DA9659386DD8B99C9B870C3DA18C8AE4F32631A5B3F44C09F5E14876EFE5D46619DBDFBAFEA9536DFF50BEE1149F4F
25,072,116 UART: [art] SIG.S = E2FDFEACBB0DFAE6B1A4B3A52DE30049F5B8DBB8768020DBE035BF9A36DE9A58E508418B1E2CE905710957A8320BC627
26,051,352 UART: Caliptra RT
26,052,086 UART: [state] CFI Enabled
26,215,298 UART: [rt] RT listening for mailbox commands...
26,246,808 UART: [rt]cmd =0x49444549, len=4
26,249,668 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,417,696 ready_for_fw is high
3,418,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,704,857 >>> mbox cmd response: success
14,705,423 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,983,764 UART:
18,984,183 UART: Running Caliptra FMC ...
18,985,371 UART:
18,985,533 UART: [state] CFI Enabled
19,052,470 UART: [fht] FMC Alias Private Key: 7
20,816,636 UART: [art] Extend RT PCRs Done
20,817,847 UART: [art] Lock RT PCRs Done
20,819,281 UART: [art] Populate DV Done
20,824,645 UART: [fht] FMC Alias Private Key: 7
20,826,349 UART: [art] Derive CDI
20,827,087 UART: [art] Store in in slot 0x4
20,884,912 UART: [art] Derive Key Pair
20,885,905 UART: [art] Store priv key in slot 0x5
23,349,089 UART: [art] Derive Key Pair - Done
23,362,302 UART: [art] Signing Cert with AUTHO
23,363,607 UART: RITY.KEYID = 7
25,074,930 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,457 UART: [art] PUB.X = 4450567E1A791D6F711598D4682ECF7FFDF5D25DDBC9FEDE47951FFE5E19DCE731AF4414FA032A622FA0965D6924D2D6
25,083,739 UART: [art] PUB.Y = C1EFFD38CF79AC7E87D86A979F99F23B912228EA1BDED2007DC23E5E576E008F214BF31A1FE20720BD1F11C4D765B46D
25,090,974 UART: [art] SIG.R = 1DE219CED2FD4DD2F406ABC714C3044653D6F1AE4650717F54294E6DF06910B90C0488129B6FCDA27F509D9A005F9360
25,098,337 UART: [art] SIG.S = 1C88C4CB614EA30F6E4EC57EAE400AFCC9F814ECFDB627431C44FC294DBC73C2BF443A6AC2F1EAA87CBE7C5FA4784023
26,077,677 UART: Caliptra RT
26,078,375 UART: [state] CFI Enabled
26,242,985 UART: [rt] RT listening for mailbox commands...
26,274,223 UART: [rt]cmd =0x49444549, len=4
26,277,193 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
192,933 UART:
193,308 UART: Running Caliptra ROM ...
194,451 UART:
604,255 UART: [state] CFI Enabled
619,265 UART: [state] LifecycleState = Unprovisioned
621,647 UART: [state] DebugLocked = No
623,681 UART: [state] WD Timer not started. Device not locked for debugging
627,721 UART: [kat] SHA2-256
817,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,455 UART: [kat] ++
828,906 UART: [kat] sha1
840,088 UART: [kat] SHA2-256
843,075 UART: [kat] SHA2-384
847,732 UART: [kat] SHA2-512-ACC
850,319 UART: [kat] ECC-384
3,294,659 UART: [kat] HMAC-384Kdf
3,307,667 UART: [kat] LMS
3,839,498 UART: [kat] --
3,843,069 UART: [cold-reset] ++
3,844,522 UART: [fht] FHT @ 0x50003400
3,856,438 UART: [idev] ++
3,857,148 UART: [idev] CDI.KEYID = 6
3,858,182 UART: [idev] SUBJECT.KEYID = 7
3,859,288 UART: [idev] UDS.KEYID = 0
3,860,216 ready_for_fw is high
3,860,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,711 UART: [idev] Erasing UDS.KEYID = 0
6,336,436 UART: [idev] Sha1 KeyId Algorithm
6,360,173 UART: [idev] --
6,364,951 UART: [ldev] ++
6,365,638 UART: [ldev] CDI.KEYID = 6
6,366,549 UART: [ldev] SUBJECT.KEYID = 5
6,367,759 UART: [ldev] AUTHORITY.KEYID = 7
6,368,935 UART: [ldev] FE.KEYID = 1
6,378,232 UART: [ldev] Erasing FE.KEYID = 1
8,854,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,164 UART: [ldev] --
10,645,188 UART: [fwproc] Wait for Commands...
10,647,339 UART: [fwproc] Recv command 0x46574c44
10,649,592 UART: [fwproc] Recv'd Img size: 114084 bytes
14,094,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,829,251 >>> mbox cmd response: success
14,829,746 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,834,201 UART: [afmc] ++
14,834,895 UART: [afmc] CDI.KEYID = 6
14,836,077 UART: [afmc] SUBJECT.KEYID = 7
14,837,575 UART: [afmc] AUTHORITY.KEYID = 5
17,336,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,932 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,127,706 UART: [afmc] --
19,131,406 UART: [cold-reset] --
19,135,700 UART: [state] Locking Datavault
19,142,692 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,892 UART: [state] Locking ICCM
19,146,971 UART: [exit] Launching FMC @ 0x40000130
19,155,647 UART:
19,155,883 UART: Running Caliptra FMC ...
19,156,929 UART:
19,157,080 UART: [state] CFI Enabled
19,165,037 UART: [fht] FMC Alias Private Key: 7
20,921,560 UART: [art] Extend RT PCRs Done
20,922,778 UART: [art] Lock RT PCRs Done
20,924,358 UART: [art] Populate DV Done
20,929,777 UART: [fht] FMC Alias Private Key: 7
20,931,424 UART: [art] Derive CDI
20,932,243 UART: [art] Store in in slot 0x4
20,974,852 UART: [art] Derive Key Pair
20,975,857 UART: [art] Store priv key in slot 0x5
23,403,246 UART: [art] Derive Key Pair - Done
23,416,782 UART: [art] Signing Cert with AUTHO
23,418,092 UART: RITY.KEYID = 7
25,123,539 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,051 UART: [art] PUB.X = EC24CDA7EE371A6C57F6261C04719B87E0F43C8EAC2BC7B22BA1B6A65B4D48758857DA67BA0A7431C42CC72EA8EA7972
25,132,346 UART: [art] PUB.Y = 5701FC1AE139A6F932615773AAA32DAA12343D85FEDABF6DD210D3AE2ECE93FA92497BDABDF74109C61AE5B9A6F0DFC1
25,139,611 UART: [art] SIG.R = 156D35CA6704302FBC4963AD18BAF94E72BF4F65290B1FD2CC4E0F8A1FAFDFA277DF224E029D639349752182AC8DE99E
25,147,027 UART: [art] SIG.S = 0B08BA367595917F398EB2718BFABF790938A3E7CC7C912F1535D997D84DDC06D9B8F7983C17A2F8FDB5654106E703AB
26,125,630 UART: Caliptra RT
26,126,340 UART: [state] CFI Enabled
26,243,456 UART: [rt] RT listening for mailbox commands...
26,274,753 UART: [rt]cmd =0x49444549, len=4
26,277,624 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
3,757,934 ready_for_fw is high
3,758,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,950,307 >>> mbox cmd response: success
14,951,046 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,203,708 UART:
19,204,088 UART: Running Caliptra FMC ...
19,205,196 UART:
19,205,354 UART: [state] CFI Enabled
19,213,684 UART: [fht] FMC Alias Private Key: 7
20,969,949 UART: [art] Extend RT PCRs Done
20,971,180 UART: [art] Lock RT PCRs Done
20,972,875 UART: [art] Populate DV Done
20,978,312 UART: [fht] FMC Alias Private Key: 7
20,979,982 UART: [art] Derive CDI
20,980,727 UART: [art] Store in in slot 0x4
21,023,276 UART: [art] Derive Key Pair
21,024,343 UART: [art] Store priv key in slot 0x5
23,451,290 UART: [art] Derive Key Pair - Done
23,464,186 UART: [art] Signing Cert with AUTHO
23,465,488 UART: RITY.KEYID = 7
25,171,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,845 UART: [art] PUB.X = 68DB2381DF6130D8D1065F09F9833104DCAD67FD3047407AD6784BC73A491FA6CC87F3E98FD6394D98BE848977CEAC4F
25,180,088 UART: [art] PUB.Y = 0BEB5B4099770C15A454874DD8456C7B27921DF98E2017EF91CCA26975246E804F34D7CFA90596C4F976E4B7A1136F9F
25,187,329 UART: [art] SIG.R = C40B77C509C7AC3D83B345BB52C1F545DE78ED3EA147743833AA7EE872CCE3DE656C0A3BED626B4DF1AB56DC4597A10E
25,194,779 UART: [art] SIG.S = DAB2821746989176451A036AF6EDBCC09B161EA10C22FBBCB7336A10F45820CAFE6539CCE70AE787E814728116941893
26,174,026 UART: Caliptra RT
26,174,719 UART: [state] CFI Enabled
26,291,568 UART: [rt] RT listening for mailbox commands...
26,323,249 UART: [rt]cmd =0x49444549, len=4
26,326,075 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,166 UART: [kat] SHA2-512-ACC
897,067 UART: [kat] ECC-384
902,512 UART: [kat] HMAC-384Kdf
907,236 UART: [kat] LMS
1,475,432 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,591 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 ready_for_fw is high
1,480,685 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,973 UART: [ldev] ++
1,515,141 UART: [ldev] CDI.KEYID = 6
1,515,504 UART: [ldev] SUBJECT.KEYID = 5
1,515,930 UART: [ldev] AUTHORITY.KEYID = 7
1,516,393 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,584 UART: [ldev] --
1,585,911 UART: [fwproc] Waiting for Commands...
1,586,670 UART: [fwproc] Received command 0x46574c44
1,587,461 UART: [fwproc] Received Image of size 114084 bytes
2,882,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,109 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,590 >>> mbox cmd response: success
3,074,590 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,075,636 UART: [afmc] ++
3,075,804 UART: [afmc] CDI.KEYID = 6
3,076,166 UART: [afmc] SUBJECT.KEYID = 7
3,076,591 UART: [afmc] AUTHORITY.KEYID = 5
3,111,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,833 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,523 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,500 UART: [afmc] --
3,154,562 UART: [cold-reset] --
3,155,320 UART: [state] Locking Datavault
3,156,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,295 UART: [state] Locking ICCM
3,157,755 UART: [exit] Launching FMC @ 0x40000130
3,163,084 UART:
3,163,100 UART: Running Caliptra FMC ...
3,163,508 UART:
3,163,562 UART: [state] CFI Enabled
3,174,067 UART: [fht] FMC Alias Private Key: 7
3,282,516 UART: [art] Extend RT PCRs Done
3,282,944 UART: [art] Lock RT PCRs Done
3,284,580 UART: [art] Populate DV Done
3,292,527 UART: [fht] FMC Alias Private Key: 7
3,293,659 UART: [art] Derive CDI
3,293,939 UART: [art] Store in in slot 0x4
3,379,558 UART: [art] Derive Key Pair
3,379,918 UART: [art] Store priv key in slot 0x5
3,393,104 UART: [art] Derive Key Pair - Done
3,407,911 UART: [art] Signing Cert with AUTHO
3,408,391 UART: RITY.KEYID = 7
3,423,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,380 UART: [art] PUB.X = 76B26A2B126E9D32FB70AB7FA75CB01E5EFC9BEA275A6FC75A3FB1E2993E631FC89BAF56159024D4086A5989310F2AD4
3,431,158 UART: [art] PUB.Y = 1696874C75EF99D5B852D726CC9A8602D28D91EC44C481589D30D139C473988CCA073BEA3D8880C0F10002E683C1F9CD
3,438,077 UART: [art] SIG.R = 9A66568514B37D2F7D7B53DD4D8AF2EDE7D73717ED12DBB8C58A877DC182F489DF2823119ED35A732EB53114BB193286
3,444,853 UART: [art] SIG.S = 6D99C6D345A6FDBDE9C2ABC76D7A10711C617520B58ED0220F945CABBBBBECC7E98FE9AEDA7FC3A73B751E022AF3E4CB
3,468,694 UART: Caliptra RT
3,468,947 UART: [state] CFI Enabled
3,577,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,606 UART: [rt]cmd =0x49444549, len=4
3,609,811 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 ready_for_fw is high
1,362,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,352 >>> mbox cmd response: success
2,923,352 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,984,374 UART:
2,984,390 UART: Running Caliptra FMC ...
2,984,798 UART:
2,984,852 UART: [state] CFI Enabled
2,995,351 UART: [fht] FMC Alias Private Key: 7
3,103,746 UART: [art] Extend RT PCRs Done
3,104,174 UART: [art] Lock RT PCRs Done
3,105,752 UART: [art] Populate DV Done
3,114,135 UART: [fht] FMC Alias Private Key: 7
3,115,317 UART: [art] Derive CDI
3,115,597 UART: [art] Store in in slot 0x4
3,200,766 UART: [art] Derive Key Pair
3,201,126 UART: [art] Store priv key in slot 0x5
3,214,248 UART: [art] Derive Key Pair - Done
3,228,748 UART: [art] Signing Cert with AUTHO
3,229,228 UART: RITY.KEYID = 7
3,244,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,271 UART: [art] PUB.X = 6C4C8E03724AB1A632B32386F6638C65C795E9C4B48979828584C57634A3DA35897B4678448E943C0420A88950BC55D6
3,252,021 UART: [art] PUB.Y = 61F1ADE3D44B3C01D3C205ADB0A6DED91647C6FB358070D21DF3E486827E12B0B370A0BBC6016B92E3094E3E0DA6F2A7
3,258,970 UART: [art] SIG.R = CCEC3329525E8C81146E95CA482829A1DBA60655ADB8F15D257D99CFAFF45B87492F66D506F83C21BD4D8461135EE5C3
3,265,742 UART: [art] SIG.S = 2784F99DEB7A468C03901FF1E3896CF0C90157983E55B8885C0870E4CA7AC8FDEE5CA73BE41DB50996CB7B40BF972808
3,289,280 UART: Caliptra RT
3,289,533 UART: [state] CFI Enabled
3,397,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,146 UART: [rt]cmd =0x49444549, len=4
3,430,697 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,536 UART: [kat] SHA2-256
882,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,582 UART: [kat] ++
886,734 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,691 UART: [kat] SHA2-512-ACC
897,592 UART: [kat] ECC-384
903,319 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,477,178 UART: [cold-reset] ++
1,477,758 UART: [fht] Storing FHT @ 0x50003400
1,480,493 UART: [idev] ++
1,480,661 UART: [idev] CDI.KEYID = 6
1,481,021 UART: [idev] SUBJECT.KEYID = 7
1,481,445 UART: [idev] UDS.KEYID = 0
1,481,790 ready_for_fw is high
1,481,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,009 UART: [idev] Erasing UDS.KEYID = 0
1,506,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,491 UART: [idev] --
1,516,596 UART: [ldev] ++
1,516,764 UART: [ldev] CDI.KEYID = 6
1,517,127 UART: [ldev] SUBJECT.KEYID = 5
1,517,553 UART: [ldev] AUTHORITY.KEYID = 7
1,518,016 UART: [ldev] FE.KEYID = 1
1,523,432 UART: [ldev] Erasing FE.KEYID = 1
1,549,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,109 UART: [ldev] --
1,588,602 UART: [fwproc] Waiting for Commands...
1,589,275 UART: [fwproc] Received command 0x46574c44
1,590,066 UART: [fwproc] Received Image of size 114084 bytes
2,884,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,125 >>> mbox cmd response: success
3,076,125 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,077,355 UART: [afmc] ++
3,077,523 UART: [afmc] CDI.KEYID = 6
3,077,885 UART: [afmc] SUBJECT.KEYID = 7
3,078,310 UART: [afmc] AUTHORITY.KEYID = 5
3,113,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,592 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,282 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,095 UART: [afmc] --
3,157,037 UART: [cold-reset] --
3,158,003 UART: [state] Locking Datavault
3,159,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,698 UART: [state] Locking ICCM
3,160,280 UART: [exit] Launching FMC @ 0x40000130
3,165,609 UART:
3,165,625 UART: Running Caliptra FMC ...
3,166,033 UART:
3,166,176 UART: [state] CFI Enabled
3,176,345 UART: [fht] FMC Alias Private Key: 7
3,284,634 UART: [art] Extend RT PCRs Done
3,285,062 UART: [art] Lock RT PCRs Done
3,286,604 UART: [art] Populate DV Done
3,294,955 UART: [fht] FMC Alias Private Key: 7
3,296,039 UART: [art] Derive CDI
3,296,319 UART: [art] Store in in slot 0x4
3,381,978 UART: [art] Derive Key Pair
3,382,338 UART: [art] Store priv key in slot 0x5
3,395,860 UART: [art] Derive Key Pair - Done
3,410,827 UART: [art] Signing Cert with AUTHO
3,411,307 UART: RITY.KEYID = 7
3,426,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,194 UART: [art] PUB.X = 67F2D1B7B0863F64A0165334C37D7DB61279005B5C67B56C60C26F61AE8E34778C3292AD1741D05FC3F2BFC7E8EBF768
3,433,946 UART: [art] PUB.Y = 053BC8F4A300341C78A129A51D5EBD782FE15D7668FEE094E78218B9AF5BAE7A06F08F0DC3A3906F6582E249577A8742
3,440,869 UART: [art] SIG.R = 50BE9CDAF579D3F89FB37399DAE85BEE84E870AE22A11A4AAC90550CFD3A1978CBEBBBB21B07DD308932015C9B4105C6
3,447,647 UART: [art] SIG.S = 60633294968F4CB1EA96D25118D5C46391E3BB16BC79403F8550AAE7E96C0038115B5483FF856EC8D7A5FB4C3C4C6A77
3,471,736 UART: Caliptra RT
3,472,081 UART: [state] CFI Enabled
3,580,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,673 UART: [rt]cmd =0x49444549, len=4
3,612,788 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,607 >>> mbox cmd response: success
2,924,607 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,987,335 UART:
2,987,351 UART: Running Caliptra FMC ...
2,987,759 UART:
2,987,902 UART: [state] CFI Enabled
2,998,515 UART: [fht] FMC Alias Private Key: 7
3,106,608 UART: [art] Extend RT PCRs Done
3,107,036 UART: [art] Lock RT PCRs Done
3,108,858 UART: [art] Populate DV Done
3,117,009 UART: [fht] FMC Alias Private Key: 7
3,117,943 UART: [art] Derive CDI
3,118,223 UART: [art] Store in in slot 0x4
3,204,354 UART: [art] Derive Key Pair
3,204,714 UART: [art] Store priv key in slot 0x5
3,217,358 UART: [art] Derive Key Pair - Done
3,232,322 UART: [art] Signing Cert with AUTHO
3,232,802 UART: RITY.KEYID = 7
3,247,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,529 UART: [art] PUB.X = 53FE36467B4C6B1018964255CEDE58E5F769F74D551039E99A7DCC097ADA2FB348C6511492A819D5FB4F001332F9BC2E
3,255,278 UART: [art] PUB.Y = 350CE65CBCB390863648B9CE820733A94DBA2CE5D9455D7CF051116F494CFDEB9B6BB18266CE3362332C3EB0728B46F5
3,262,230 UART: [art] SIG.R = 6AB96C463F853F802F11A7672B1652D2F502419EDFEEC6394CC3E8FE6C14501128D386972FF70FDFD73DA29AEC4D8E16
3,269,004 UART: [art] SIG.S = 913E8F16D429031E2731A26D4F0F35E2B9C94ACDB7715B7DACE83751B6B35394E23283F4D480136AFBEAB0B1FFCE8751
3,293,041 UART: Caliptra RT
3,293,386 UART: [state] CFI Enabled
3,401,669 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,219 UART: [rt]cmd =0x49444549, len=4
3,434,574 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
892,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,057 UART: [kat] ++
897,209 UART: [kat] sha1
901,391 UART: [kat] SHA2-256
903,331 UART: [kat] SHA2-384
906,020 UART: [kat] SHA2-512-ACC
907,921 UART: [kat] ECC-384
917,530 UART: [kat] HMAC-384Kdf
922,076 UART: [kat] LMS
1,170,404 UART: [kat] --
1,171,237 UART: [cold-reset] ++
1,171,735 UART: [fht] FHT @ 0x50003400
1,174,376 UART: [idev] ++
1,174,544 UART: [idev] CDI.KEYID = 6
1,174,904 UART: [idev] SUBJECT.KEYID = 7
1,175,328 UART: [idev] UDS.KEYID = 0
1,175,673 ready_for_fw is high
1,175,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,374 UART: [idev] Erasing UDS.KEYID = 0
1,200,329 UART: [idev] Sha1 KeyId Algorithm
1,208,793 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,573 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,716 UART: [fwproc] Recv command 0x46574c44
1,283,444 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,377 >>> mbox cmd response: success
2,768,377 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,769,465 UART: [afmc] ++
2,769,633 UART: [afmc] CDI.KEYID = 6
2,769,995 UART: [afmc] SUBJECT.KEYID = 7
2,770,420 UART: [afmc] AUTHORITY.KEYID = 5
2,806,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,646 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,468 UART: [afmc] --
2,850,470 UART: [cold-reset] --
2,851,202 UART: [state] Locking Datavault
2,852,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,065 UART: [state] Locking ICCM
2,853,695 UART: [exit] Launching FMC @ 0x40000130
2,859,024 UART:
2,859,040 UART: Running Caliptra FMC ...
2,859,448 UART:
2,859,502 UART: [state] CFI Enabled
2,870,299 UART: [fht] FMC Alias Private Key: 7
2,978,186 UART: [art] Extend RT PCRs Done
2,978,614 UART: [art] Lock RT PCRs Done
2,980,180 UART: [art] Populate DV Done
2,988,101 UART: [fht] FMC Alias Private Key: 7
2,989,271 UART: [art] Derive CDI
2,989,551 UART: [art] Store in in slot 0x4
3,075,460 UART: [art] Derive Key Pair
3,075,820 UART: [art] Store priv key in slot 0x5
3,089,334 UART: [art] Derive Key Pair - Done
3,103,918 UART: [art] Signing Cert with AUTHO
3,104,398 UART: RITY.KEYID = 7
3,119,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,467 UART: [art] PUB.X = 2C4E6C1202E6A3143C183C0BDBD905F5763851C7506B10800489B09D008AFFB246B46C0C05709CB3EB0DEC3BAAEDFBEC
3,127,210 UART: [art] PUB.Y = 915BF2FC2869D33E338256FBBEC37D86392803DE526A8033DC5B8B40C51BD2E26F27ADA58F9E25D95234CA486B42AE1C
3,134,167 UART: [art] SIG.R = E6023B186933296B05AB5C9136FE47E346795016CE418B79BF16EC031AA38E89F49EBBFE2550968ACC81BE6E7ED248E5
3,140,934 UART: [art] SIG.S = F6B9F2C602F5365ACDF79959FB456A18908EFF8ABAF0932C45FE48F8047E822E5330C50E9416BF1E211CBCD65C465035
3,165,114 UART: Caliptra RT
3,165,367 UART: [state] CFI Enabled
3,271,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,297 UART: [rt]cmd =0x49444549, len=4
3,304,522 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,627 ready_for_fw is high
1,060,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,996 >>> mbox cmd response: success
2,622,996 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,686,266 UART:
2,686,282 UART: Running Caliptra FMC ...
2,686,690 UART:
2,686,744 UART: [state] CFI Enabled
2,697,047 UART: [fht] FMC Alias Private Key: 7
2,804,474 UART: [art] Extend RT PCRs Done
2,804,902 UART: [art] Lock RT PCRs Done
2,806,450 UART: [art] Populate DV Done
2,814,673 UART: [fht] FMC Alias Private Key: 7
2,815,807 UART: [art] Derive CDI
2,816,087 UART: [art] Store in in slot 0x4
2,901,896 UART: [art] Derive Key Pair
2,902,256 UART: [art] Store priv key in slot 0x5
2,915,262 UART: [art] Derive Key Pair - Done
2,930,000 UART: [art] Signing Cert with AUTHO
2,930,480 UART: RITY.KEYID = 7
2,945,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,325 UART: [art] PUB.X = A35FD7BCD03C7A98A6701A618BF0E28729A1E318D4A35CFB8EEE5983576CC0885EF3C4C3E157A4075E88F153A7BE9EBE
2,953,108 UART: [art] PUB.Y = 7148941B1186933C4CD52EA29AA42A589B4214BF4958A517936740A96FAFF6377E9761EADB8B7D1201112708597F18EF
2,960,046 UART: [art] SIG.R = FBC459176C0A775BBE0123CD98038E900F994DA51E4CEA402A2BE79F918A6055FE79ED5B062A198D89699647E0FBEACD
2,966,813 UART: [art] SIG.S = 497DAC2D0A961DB7BE64242251471DFDD3D1D22B20A60B7F6EFDE657556E8153467ED509E5B890C61F89D9176EBB464E
2,991,137 UART: Caliptra RT
2,991,390 UART: [state] CFI Enabled
3,098,159 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,671 UART: [rt]cmd =0x49444549, len=4
3,130,886 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
893,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,974 UART: [kat] ++
898,126 UART: [kat] sha1
902,316 UART: [kat] SHA2-256
904,256 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,601 UART: [kat] LMS
1,171,929 UART: [kat] --
1,172,836 UART: [cold-reset] ++
1,173,310 UART: [fht] FHT @ 0x50003400
1,175,955 UART: [idev] ++
1,176,123 UART: [idev] CDI.KEYID = 6
1,176,483 UART: [idev] SUBJECT.KEYID = 7
1,176,907 UART: [idev] UDS.KEYID = 0
1,177,252 ready_for_fw is high
1,177,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,616 UART: [idev] --
1,211,756 UART: [ldev] ++
1,211,924 UART: [ldev] CDI.KEYID = 6
1,212,287 UART: [ldev] SUBJECT.KEYID = 5
1,212,713 UART: [ldev] AUTHORITY.KEYID = 7
1,213,176 UART: [ldev] FE.KEYID = 1
1,218,786 UART: [ldev] Erasing FE.KEYID = 1
1,245,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,898 UART: [ldev] --
1,284,261 UART: [fwproc] Wait for Commands...
1,284,869 UART: [fwproc] Recv command 0x46574c44
1,285,597 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,092 >>> mbox cmd response: success
2,772,092 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,194 UART: [afmc] ++
2,773,362 UART: [afmc] CDI.KEYID = 6
2,773,724 UART: [afmc] SUBJECT.KEYID = 7
2,774,149 UART: [afmc] AUTHORITY.KEYID = 5
2,810,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,607 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,492 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,211 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,885 UART: [afmc] --
2,853,803 UART: [cold-reset] --
2,854,623 UART: [state] Locking Datavault
2,855,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,436 UART: [state] Locking ICCM
2,856,922 UART: [exit] Launching FMC @ 0x40000130
2,862,251 UART:
2,862,267 UART: Running Caliptra FMC ...
2,862,675 UART:
2,862,818 UART: [state] CFI Enabled
2,873,545 UART: [fht] FMC Alias Private Key: 7
2,981,546 UART: [art] Extend RT PCRs Done
2,981,974 UART: [art] Lock RT PCRs Done
2,983,462 UART: [art] Populate DV Done
2,991,547 UART: [fht] FMC Alias Private Key: 7
2,992,729 UART: [art] Derive CDI
2,993,009 UART: [art] Store in in slot 0x4
3,078,716 UART: [art] Derive Key Pair
3,079,076 UART: [art] Store priv key in slot 0x5
3,092,452 UART: [art] Derive Key Pair - Done
3,107,256 UART: [art] Signing Cert with AUTHO
3,107,736 UART: RITY.KEYID = 7
3,123,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,157 UART: [art] PUB.X = 45475092FEDA73AC733350600EC4926F81A5EBB32A9388D4D00BAA8A6526615A6668F2D352A1AB846E6E4686F0A5F97A
3,130,923 UART: [art] PUB.Y = FB5D3DE30D7684E341518225A2E7947417A2307CF525BB6B66052A8AD8738E28694432BE1DD3C8D91950AD96648B7C8B
3,137,865 UART: [art] SIG.R = 13E2AA783296EB3B4C323F166148785E7C060671DDE8C5F864715DA4FC35B6B3259A8A285614EDDD4FB0EA6CAE34592D
3,144,637 UART: [art] SIG.S = 8561EE15899F0E967B2C291449C93D37B723E9CDABA1C5C9458D432F579B71A427137D43B6208D10FFC29E4DD5FE00FD
3,168,251 UART: Caliptra RT
3,168,596 UART: [state] CFI Enabled
3,277,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,833 UART: [rt]cmd =0x49444549, len=4
3,310,094 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,476 ready_for_fw is high
1,060,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,591 >>> mbox cmd response: success
2,623,591 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,685,411 UART:
2,685,427 UART: Running Caliptra FMC ...
2,685,835 UART:
2,685,978 UART: [state] CFI Enabled
2,696,935 UART: [fht] FMC Alias Private Key: 7
2,804,578 UART: [art] Extend RT PCRs Done
2,805,006 UART: [art] Lock RT PCRs Done
2,806,782 UART: [art] Populate DV Done
2,815,237 UART: [fht] FMC Alias Private Key: 7
2,816,309 UART: [art] Derive CDI
2,816,589 UART: [art] Store in in slot 0x4
2,902,304 UART: [art] Derive Key Pair
2,902,664 UART: [art] Store priv key in slot 0x5
2,915,942 UART: [art] Derive Key Pair - Done
2,930,503 UART: [art] Signing Cert with AUTHO
2,930,983 UART: RITY.KEYID = 7
2,945,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,764 UART: [art] PUB.X = 435CAA1BD85BE87A973096AC0E102BC048B6FD7EF665DA428EF387BA76E982C483EE9FFA073838063968F65D67BF746D
2,953,535 UART: [art] PUB.Y = 3BBD234C0847F010A24E0A8CE692A92BD23CE39DC803426B1728C9434260969D295726343317BEFB166E7EEEC3688BEF
2,960,478 UART: [art] SIG.R = 42F022B766C6C9AFEAE2090E47516B4B50276498279838DFC9A2B5EA3E2E18AD7255EDF9138D845238B1997AB24F89E4
2,967,244 UART: [art] SIG.S = CACF694ED80837467D69F204FA65A495534DD71F8289646A70D5F5345D5B661ED09245044D1F4EEFCC6130FE98EF6281
2,991,172 UART: Caliptra RT
2,991,517 UART: [state] CFI Enabled
3,099,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,150 UART: [rt]cmd =0x49444549, len=4
3,132,579 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 ready_for_fw is high
1,174,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,207,079 UART: [idev] --
1,207,978 UART: [ldev] ++
1,208,146 UART: [ldev] CDI.KEYID = 6
1,208,510 UART: [ldev] SUBJECT.KEYID = 5
1,208,937 UART: [ldev] AUTHORITY.KEYID = 7
1,209,400 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,240,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,074 UART: [ldev] --
1,280,566 UART: [fwproc] Wait for Commands...
1,281,385 UART: [fwproc] Recv command 0x46574c44
1,282,118 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,007 >>> mbox cmd response: success
2,769,007 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,770,270 UART: [afmc] ++
2,770,438 UART: [afmc] CDI.KEYID = 6
2,770,801 UART: [afmc] SUBJECT.KEYID = 7
2,771,227 UART: [afmc] AUTHORITY.KEYID = 5
2,806,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,405 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,124 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,857 UART: [afmc] --
2,849,965 UART: [cold-reset] --
2,850,685 UART: [state] Locking Datavault
2,852,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,736 UART: [state] Locking ICCM
2,853,192 UART: [exit] Launching FMC @ 0x40000130
2,858,521 UART:
2,858,537 UART: Running Caliptra FMC ...
2,858,945 UART:
2,858,999 UART: [state] CFI Enabled
2,869,262 UART: [fht] FMC Alias Private Key: 7
2,977,447 UART: [art] Extend RT PCRs Done
2,977,875 UART: [art] Lock RT PCRs Done
2,979,283 UART: [art] Populate DV Done
2,987,468 UART: [fht] FMC Alias Private Key: 7
2,988,396 UART: [art] Derive CDI
2,988,676 UART: [art] Store in in slot 0x4
3,074,337 UART: [art] Derive Key Pair
3,074,697 UART: [art] Store priv key in slot 0x5
3,087,529 UART: [art] Derive Key Pair - Done
3,102,300 UART: [art] Signing Cert with AUTHO
3,102,780 UART: RITY.KEYID = 7
3,117,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,549 UART: [art] PUB.X = A35A2DE8E9F18A24D64573E6E53DFE5B57CF5A8980443DBBBF0569AC785371CBFBD30CF3653C2E6A8E1DF7D7911D7374
3,125,329 UART: [art] PUB.Y = 9502CB2D6E0A21BF6AC01C3C9759C87BB63DE3FE351745EC51F0DAC9303A7BFB0132AF62CC341DB3B9E557CD90F278D3
3,132,288 UART: [art] SIG.R = C7F776E8B633B31BD377F286E806186DD3EA52D36A39C423CD7A710990C5EBDEECE54936D585E0E00546F0277242030D
3,139,045 UART: [art] SIG.S = 47BCBB4A2B46EDC481BF925E718E875F9FEB2B608978974A067B560F165DD7910183A57ECC07D29B4EE22B5C618AFCA5
3,163,118 UART: Caliptra RT
3,163,371 UART: [state] CFI Enabled
3,270,856 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,360 UART: [rt]cmd =0x49444549, len=4
3,303,771 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,682 ready_for_fw is high
1,055,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,191 >>> mbox cmd response: success
2,620,191 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,680,355 UART:
2,680,371 UART: Running Caliptra FMC ...
2,680,779 UART:
2,680,833 UART: [state] CFI Enabled
2,691,172 UART: [fht] FMC Alias Private Key: 7
2,798,649 UART: [art] Extend RT PCRs Done
2,799,077 UART: [art] Lock RT PCRs Done
2,800,695 UART: [art] Populate DV Done
2,808,750 UART: [fht] FMC Alias Private Key: 7
2,809,840 UART: [art] Derive CDI
2,810,120 UART: [art] Store in in slot 0x4
2,896,141 UART: [art] Derive Key Pair
2,896,501 UART: [art] Store priv key in slot 0x5
2,909,957 UART: [art] Derive Key Pair - Done
2,924,893 UART: [art] Signing Cert with AUTHO
2,925,373 UART: RITY.KEYID = 7
2,940,749 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,514 UART: [art] PUB.X = 8025E38B51AA2B41701B2F55AD8AC8811965B789B88664F2AB120D8ACBA399E09678935263C798A5C5E0509632D15CE5
2,948,277 UART: [art] PUB.Y = 92E8496A5425E943811BFBA7D87A80B2591B95F1F3812B8CD83EFBBCC1CB12A013953131AEE53CA21289414F03B075AD
2,955,230 UART: [art] SIG.R = 50405D0D6E0F453DA9F99FF68535175633CC6E0B591D43629819A185865EB549D409A2E90153598F4B59475F5FB4C8F2
2,961,977 UART: [art] SIG.S = BD71FB1F48B108447EE41F3475F47F180CF81E805471924C8376E6FBA69E9CACA9C34FDDE1980299D0267F1B3EFE597E
2,985,555 UART: Caliptra RT
2,985,808 UART: [state] CFI Enabled
3,093,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,457 UART: [rt]cmd =0x49444549, len=4
3,126,872 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,167 UART: [idev] SUBJECT.KEYID = 7
1,174,592 UART: [idev] UDS.KEYID = 0
1,174,938 ready_for_fw is high
1,174,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,651 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,750 UART: [fwproc] Recv command 0x46574c44
1,284,483 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,208 >>> mbox cmd response: success
2,770,208 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,771,343 UART: [afmc] ++
2,771,511 UART: [afmc] CDI.KEYID = 6
2,771,874 UART: [afmc] SUBJECT.KEYID = 7
2,772,300 UART: [afmc] AUTHORITY.KEYID = 5
2,808,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,548 UART: [afmc] --
2,851,532 UART: [cold-reset] --
2,852,446 UART: [state] Locking Datavault
2,853,669 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,273 UART: [state] Locking ICCM
2,854,711 UART: [exit] Launching FMC @ 0x40000130
2,860,040 UART:
2,860,056 UART: Running Caliptra FMC ...
2,860,464 UART:
2,860,607 UART: [state] CFI Enabled
2,871,348 UART: [fht] FMC Alias Private Key: 7
2,978,423 UART: [art] Extend RT PCRs Done
2,978,851 UART: [art] Lock RT PCRs Done
2,980,363 UART: [art] Populate DV Done
2,988,600 UART: [fht] FMC Alias Private Key: 7
2,989,720 UART: [art] Derive CDI
2,990,000 UART: [art] Store in in slot 0x4
3,075,761 UART: [art] Derive Key Pair
3,076,121 UART: [art] Store priv key in slot 0x5
3,089,635 UART: [art] Derive Key Pair - Done
3,104,227 UART: [art] Signing Cert with AUTHO
3,104,707 UART: RITY.KEYID = 7
3,120,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,006 UART: [art] PUB.X = 2BA9861060274281CC997A691FD0F932AEA732A6259DB67BBE629A60EE04F968EA6D0D856F3BFF41AD4B8DB12FF49962
3,127,780 UART: [art] PUB.Y = 3FD9E999C4D3890225E4019F16B272B815A979D268CA0D1C6C5FE21B96F5643C901DAA2EC41F51FDAFF5DD36F29C9850
3,134,731 UART: [art] SIG.R = 5D118C10EFC0646DAF0BD5FF83B7D55DFA6E39403A2CDE8C04C79169AD985BE27A8464BE4F2FF420699D3B80BEB10E12
3,141,510 UART: [art] SIG.S = 130D9A449AEC6E7645B213F312DED0AAD1C2075DF19EE129ACD480E38B5A0B597275D7DBBF201763ED71CC2CEFED04C5
3,165,539 UART: Caliptra RT
3,165,884 UART: [state] CFI Enabled
3,272,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,635 UART: [rt]cmd =0x49444549, len=4
3,305,848 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,505 ready_for_fw is high
1,056,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,728 >>> mbox cmd response: success
2,620,728 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,682,562 UART:
2,682,578 UART: Running Caliptra FMC ...
2,682,986 UART:
2,683,129 UART: [state] CFI Enabled
2,693,690 UART: [fht] FMC Alias Private Key: 7
2,800,913 UART: [art] Extend RT PCRs Done
2,801,341 UART: [art] Lock RT PCRs Done
2,803,189 UART: [art] Populate DV Done
2,811,424 UART: [fht] FMC Alias Private Key: 7
2,812,438 UART: [art] Derive CDI
2,812,718 UART: [art] Store in in slot 0x4
2,898,145 UART: [art] Derive Key Pair
2,898,505 UART: [art] Store priv key in slot 0x5
2,912,203 UART: [art] Derive Key Pair - Done
2,926,669 UART: [art] Signing Cert with AUTHO
2,927,149 UART: RITY.KEYID = 7
2,942,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,290 UART: [art] PUB.X = FBA877BFBFFCC0FBCDA00CEC726690FCAE5D5DAA0CD479DFDAECF3BB71FC046AF5AD76BAD6B32D63C287A07E626DE7FE
2,950,099 UART: [art] PUB.Y = D6D5BE7C7919211DD3E77B03E5F2740BB28F559550C1F58AEEBF5CF7722E19E3B363B048514808B4E66ED3E8AAACF7E5
2,957,054 UART: [art] SIG.R = 2B3A067A78F0CBE74A4059645BB6F2EAD9CD04F2036A9D1CA6FD5D998FF80D62753F1D18AC283002395BF7E1A57CF19E
2,963,823 UART: [art] SIG.S = 24A7275B522517D6EBB5BD2A2D5120BBA971F95038514F83B2D43E7989D3B594349593E5456FD5B73E466888DEFA90B9
2,987,386 UART: Caliptra RT
2,987,731 UART: [state] CFI Enabled
3,095,984 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,358 UART: [rt]cmd =0x49444549, len=4
3,128,765 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
191,997 UART:
192,367 UART: Running Caliptra ROM ...
193,462 UART:
193,604 UART: [state] CFI Enabled
264,093 UART: [state] LifecycleState = Unprovisioned
266,078 UART: [state] DebugLocked = No
269,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,175 UART: [kat] SHA2-256
442,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,393 UART: [kat] ++
453,843 UART: [kat] sha1
464,431 UART: [kat] SHA2-256
467,080 UART: [kat] SHA2-384
472,218 UART: [kat] SHA2-512-ACC
474,543 UART: [kat] ECC-384
2,766,186 UART: [kat] HMAC-384Kdf
2,800,064 UART: [kat] LMS
3,990,386 UART: [kat] --
3,994,968 UART: [cold-reset] ++
3,997,124 UART: [fht] Storing FHT @ 0x50003400
4,007,396 UART: [idev] ++
4,007,969 UART: [idev] CDI.KEYID = 6
4,009,002 UART: [idev] SUBJECT.KEYID = 7
4,010,185 UART: [idev] UDS.KEYID = 0
4,011,219 ready_for_fw is high
4,011,415 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,498 UART: [idev] Erasing UDS.KEYID = 0
7,346,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,175 UART: [idev] --
7,373,250 UART: [ldev] ++
7,373,839 UART: [ldev] CDI.KEYID = 6
7,374,856 UART: [ldev] SUBJECT.KEYID = 5
7,376,021 UART: [ldev] AUTHORITY.KEYID = 7
7,377,255 UART: [ldev] FE.KEYID = 1
7,423,469 UART: [ldev] Erasing FE.KEYID = 1
10,756,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,118 UART: [ldev] --
13,118,433 UART: [fwproc] Waiting for Commands...
13,120,314 UART: [fwproc] Received command 0x46574c44
13,122,496 UART: [fwproc] Received Image of size 113760 bytes
17,169,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,834 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,629,034 >>> mbox cmd response: success
17,633,124 UART: [afmc] ++
17,633,727 UART: [afmc] CDI.KEYID = 6
17,634,638 UART: [afmc] SUBJECT.KEYID = 7
17,635,856 UART: [afmc] AUTHORITY.KEYID = 5
21,008,657 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,974 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,340 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,208 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,619 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,037 UART: [afmc] --
23,381,578 UART: [cold-reset] --
23,383,385 UART: [state] Locking Datavault
23,389,274 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,052 UART: [state] Locking ICCM
23,393,371 UART: [exit] Launching FMC @ 0x40000130
23,401,767 UART:
23,401,998 UART: Running Caliptra FMC ...
23,403,098 UART:
23,403,279 UART: [state] CFI Enabled
23,470,011 UART: [fht] FMC Alias Private Key: 7
25,808,393 UART: [art] Extend RT PCRs Done
25,809,771 UART: [art] Lock RT PCRs Done
25,811,242 UART: [art] Populate DV Done
25,816,448 UART: [fht] FMC Alias Private Key: 7
25,818,093 UART: [art] Derive CDI
25,818,907 UART: [art] Store in in slot 0x4
25,879,461 UART: [art] Derive Key Pair
25,880,463 UART: [art] Store priv key in slot 0x5
29,173,107 UART: [art] Derive Key Pair - Done
29,186,145 UART: [art] Signing Cert with AUTHO
29,187,457 UART: RITY.KEYID = 7
31,475,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,755 UART: [art] PUB.X = 3FB3D2F10EF62172CF35399C0E3D93DB4BCE820CB2967C6413C6240DF076B809529BF101F4684F87951C4502D2A3457E
31,483,997 UART: [art] PUB.Y = 352D8A2F0DD3370A4B9B029354F094181DF27EA763D3729375438C8CC0251B517E479D5ADB16181BBCAE4681BBDE013E
31,491,259 UART: [art] SIG.R = C4AF20D05F0721B4ACC5649DF11AA2A9E8EB5254027574250B42A7817D4D3BFDF98DAC8363F6FE1E07D4414A6EF74DBD
31,498,655 UART: [art] SIG.S = CA83C41C27E6264FF3B901E5639C42630EBBDA93F20530B25E7473C2FF782B0FF50F6AC3A184B7A67F4A65CE7441EE9C
32,803,581 UART: Caliptra RT
32,804,295 UART: [state] CFI Enabled
32,964,656 UART: [rt] RT listening for mailbox commands...
32,966,592 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,998,260 UART: [rt]cmd =0x44504543, len=136
38,618,814 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,782,372 ready_for_fw is high
3,782,742 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,845,102 >>> mbox cmd response: success
23,545,678 UART:
23,546,064 UART: Running Caliptra FMC ...
23,547,196 UART:
23,547,358 UART: [state] CFI Enabled
23,615,941 UART: [fht] FMC Alias Private Key: 7
25,953,533 UART: [art] Extend RT PCRs Done
25,954,757 UART: [art] Lock RT PCRs Done
25,956,688 UART: [art] Populate DV Done
25,962,223 UART: [fht] FMC Alias Private Key: 7
25,963,813 UART: [art] Derive CDI
25,964,555 UART: [art] Store in in slot 0x4
26,025,436 UART: [art] Derive Key Pair
26,026,482 UART: [art] Store priv key in slot 0x5
29,319,334 UART: [art] Derive Key Pair - Done
29,332,066 UART: [art] Signing Cert with AUTHO
29,333,395 UART: RITY.KEYID = 7
31,621,398 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,901 UART: [art] PUB.X = 2A597999686029AF2DAB1C055AA856634DAF8712E2327912C45D235187FB0840CC9BF04ECBDD418FF9AFFB6D69FF94EC
31,630,167 UART: [art] PUB.Y = 5A3F5B94D1201FA1B814565C9CFC9B3A41C049A95B33DDD3FF823E5FD6667B1E06B678A6181BC2849BB947E38169A483
31,637,412 UART: [art] SIG.R = C311C90E52DB425AC188C210236FFB50C9F92064F7D2FDBA8BDDDFF74EDE38BC66DE6BCFE95992FEBDD17B03C54A9D82
31,644,822 UART: [art] SIG.S = 91EEA1DF6E5957B2B1E691AA93FC9D02F238D2F1864D9F81CB81B12A39209474529B45D0B023A0BF03CBEC2FBC4C68E7
32,950,281 UART: Caliptra RT
32,950,986 UART: [state] CFI Enabled
33,111,669 UART: [rt] RT listening for mailbox commands...
33,113,596 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,145,123 UART: [rt]cmd =0x44504543, len=136
38,766,371 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
192,933 UART:
193,305 UART: Running Caliptra ROM ...
194,484 UART:
604,062 UART: [state] CFI Enabled
616,543 UART: [state] LifecycleState = Unprovisioned
618,439 UART: [state] DebugLocked = No
619,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,969 UART: [kat] SHA2-256
793,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,305 UART: [kat] ++
804,750 UART: [kat] sha1
816,399 UART: [kat] SHA2-256
819,046 UART: [kat] SHA2-384
824,042 UART: [kat] SHA2-512-ACC
826,404 UART: [kat] ECC-384
3,109,999 UART: [kat] HMAC-384Kdf
3,121,332 UART: [kat] LMS
4,311,442 UART: [kat] --
4,318,019 UART: [cold-reset] ++
4,319,390 UART: [fht] Storing FHT @ 0x50003400
4,331,077 UART: [idev] ++
4,331,639 UART: [idev] CDI.KEYID = 6
4,332,666 UART: [idev] SUBJECT.KEYID = 7
4,333,836 UART: [idev] UDS.KEYID = 0
4,334,874 ready_for_fw is high
4,335,090 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,074 UART: [idev] Erasing UDS.KEYID = 0
7,622,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,688 UART: [idev] --
7,647,530 UART: [ldev] ++
7,648,165 UART: [ldev] CDI.KEYID = 6
7,649,047 UART: [ldev] SUBJECT.KEYID = 5
7,650,326 UART: [ldev] AUTHORITY.KEYID = 7
7,651,562 UART: [ldev] FE.KEYID = 1
7,662,962 UART: [ldev] Erasing FE.KEYID = 1
10,957,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,557 UART: [ldev] --
13,316,677 UART: [fwproc] Waiting for Commands...
13,318,650 UART: [fwproc] Received command 0x46574c44
13,320,821 UART: [fwproc] Received Image of size 113760 bytes
17,372,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,602 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,834,351 >>> mbox cmd response: success
17,838,257 UART: [afmc] ++
17,838,910 UART: [afmc] CDI.KEYID = 6
17,839,789 UART: [afmc] SUBJECT.KEYID = 7
17,841,051 UART: [afmc] AUTHORITY.KEYID = 5
21,155,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,598 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,976 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,775 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,270 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,644 UART: [afmc] --
23,523,126 UART: [cold-reset] --
23,527,363 UART: [state] Locking Datavault
23,531,104 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,858 UART: [state] Locking ICCM
23,535,436 UART: [exit] Launching FMC @ 0x40000130
23,543,793 UART:
23,544,030 UART: Running Caliptra FMC ...
23,545,129 UART:
23,545,284 UART: [state] CFI Enabled
23,553,301 UART: [fht] FMC Alias Private Key: 7
25,884,188 UART: [art] Extend RT PCRs Done
25,885,541 UART: [art] Lock RT PCRs Done
25,887,112 UART: [art] Populate DV Done
25,892,521 UART: [fht] FMC Alias Private Key: 7
25,894,165 UART: [art] Derive CDI
25,894,975 UART: [art] Store in in slot 0x4
25,937,835 UART: [art] Derive Key Pair
25,938,831 UART: [art] Store priv key in slot 0x5
29,180,070 UART: [art] Derive Key Pair - Done
29,192,912 UART: [art] Signing Cert with AUTHO
29,194,215 UART: RITY.KEYID = 7
31,473,820 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,327 UART: [art] PUB.X = 657E91542AEB6AA454A34767BB318C7ECAA5303C0C3C88B70C971529275F2C9A18DD8F82EA1534151C0F9858D9D2B1A7
31,482,539 UART: [art] PUB.Y = EAB481001AF044D50FE345650D5D896D799022EA09F8DD06B75B6FE1133153A7177245848B3EDDE0BCA1F567D0DFBDCB
31,489,773 UART: [art] SIG.R = E0BC3C4E9AF6AEB26B04B9CD85FC871A4CC3FA3C3119946BADF325FA7EECFE9C01696DA917FA356525E3603AC9617E8D
31,497,213 UART: [art] SIG.S = 8CD44885D1659BE8671EE1C1C3778EFF9BCAE4E79FF39094DC323FB923F51CB115E58038D1B4E5C8A6254EF8DE1976E7
32,802,471 UART: Caliptra RT
32,803,183 UART: [state] CFI Enabled
32,920,676 UART: [rt] RT listening for mailbox commands...
32,922,597 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,953,577 UART: [rt]cmd =0x44504543, len=136
38,513,190 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,702 writing to cptra_bootfsm_go
4,126,764 ready_for_fw is high
4,127,306 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,065 >>> mbox cmd response: success
23,708,197 UART:
23,708,579 UART: Running Caliptra FMC ...
23,709,708 UART:
23,709,869 UART: [state] CFI Enabled
23,717,930 UART: [fht] FMC Alias Private Key: 7
26,049,272 UART: [art] Extend RT PCRs Done
26,050,497 UART: [art] Lock RT PCRs Done
26,051,715 UART: [art] Populate DV Done
26,057,133 UART: [fht] FMC Alias Private Key: 7
26,058,730 UART: [art] Derive CDI
26,059,491 UART: [art] Store in in slot 0x4
26,102,581 UART: [art] Derive Key Pair
26,103,627 UART: [art] Store priv key in slot 0x5
29,345,450 UART: [art] Derive Key Pair - Done
29,358,230 UART: [art] Signing Cert with AUTHO
29,359,565 UART: RITY.KEYID = 7
31,639,047 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,556 UART: [art] PUB.X = 068B6A097E0FD99E8810B555CAE043C2AA35374B0EE940037B0ED4D73F2A10F20AC397AFA5829B66F116749937864C6A
31,647,805 UART: [art] PUB.Y = B26D2711B64021DF1F7681AA48F86F49A8B346245412E58ADA2B72DAC51F9D46151A7B055E984DED9C29AE86E796DE32
31,655,014 UART: [art] SIG.R = 2C1861224BF3D9F93539D1F3AD689FEB21E67DB0A661E587058529333B2590C0208633516D89C9437B2B9BD4CAB9FC09
31,662,405 UART: [art] SIG.S = 604F5A3BC167252EC3DF3AE7E8715EFA623A532C338F7BCFF8757DEB82EF0E26EB32B25747D4DC96AEBE1BBB96B864EC
32,967,740 UART: Caliptra RT
32,968,443 UART: [state] CFI Enabled
33,085,937 UART: [rt] RT listening for mailbox commands...
33,087,863 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,118,785 UART: [rt]cmd =0x44504543, len=136
38,677,696 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,647 UART:
193,011 UART: Running Caliptra ROM ...
194,216 UART:
194,365 UART: [state] CFI Enabled
264,896 UART: [state] LifecycleState = Unprovisioned
266,820 UART: [state] DebugLocked = No
268,423 UART: [state] WD Timer not started. Device not locked for debugging
272,596 UART: [kat] SHA2-256
451,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,326 UART: [kat] ++
463,854 UART: [kat] sha1
474,403 UART: [kat] SHA2-256
477,382 UART: [kat] SHA2-384
483,864 UART: [kat] SHA2-512-ACC
486,798 UART: [kat] ECC-384
2,945,566 UART: [kat] HMAC-384Kdf
2,971,277 UART: [kat] LMS
3,500,720 UART: [kat] --
3,506,368 UART: [cold-reset] ++
3,507,375 UART: [fht] FHT @ 0x50003400
3,519,865 UART: [idev] ++
3,520,467 UART: [idev] CDI.KEYID = 6
3,521,381 UART: [idev] SUBJECT.KEYID = 7
3,522,560 UART: [idev] UDS.KEYID = 0
3,523,501 ready_for_fw is high
3,523,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,175 UART: [idev] Erasing UDS.KEYID = 0
6,024,049 UART: [idev] Sha1 KeyId Algorithm
6,046,678 UART: [idev] --
6,050,876 UART: [ldev] ++
6,051,441 UART: [ldev] CDI.KEYID = 6
6,052,348 UART: [ldev] SUBJECT.KEYID = 5
6,053,559 UART: [ldev] AUTHORITY.KEYID = 7
6,054,791 UART: [ldev] FE.KEYID = 1
6,100,613 UART: [ldev] Erasing FE.KEYID = 1
8,603,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,337 UART: [ldev] --
10,414,366 UART: [fwproc] Wait for Commands...
10,415,813 UART: [fwproc] Recv command 0x46574c44
10,417,906 UART: [fwproc] Recv'd Img size: 114084 bytes
13,812,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,272,724 >>> mbox cmd response: success
14,276,750 UART: [afmc] ++
14,277,345 UART: [afmc] CDI.KEYID = 6
14,278,257 UART: [afmc] SUBJECT.KEYID = 7
14,279,415 UART: [afmc] AUTHORITY.KEYID = 5
16,804,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,769 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,668 UART: [afmc] --
18,604,364 UART: [cold-reset] --
18,607,404 UART: [state] Locking Datavault
18,611,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,831 UART: [state] Locking ICCM
18,615,219 UART: [exit] Launching FMC @ 0x40000130
18,623,671 UART:
18,623,895 UART: Running Caliptra FMC ...
18,624,914 UART:
18,625,058 UART: [state] CFI Enabled
18,687,047 UART: [fht] FMC Alias Private Key: 7
20,450,954 UART: [art] Extend RT PCRs Done
20,452,461 UART: [art] Lock RT PCRs Done
20,453,852 UART: [art] Populate DV Done
20,459,252 UART: [fht] FMC Alias Private Key: 7
20,460,798 UART: [art] Derive CDI
20,461,611 UART: [art] Store in in slot 0x4
20,519,918 UART: [art] Derive Key Pair
20,520,953 UART: [art] Store priv key in slot 0x5
22,983,742 UART: [art] Derive Key Pair - Done
22,996,668 UART: [art] Signing Cert with AUTHO
22,997,972 UART: RITY.KEYID = 7
24,710,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,265 UART: [art] PUB.X = 5620954CBF8C995B7D0C2D145929CC914CA3D8D0734034D5016253EE8863CC7C9485272BABC0BCD8A7D9B9117253C947
24,719,578 UART: [art] PUB.Y = 47DE7BCC1DF8F88E0D41DF850A4B5FCE7159AC29F6055362BC8A218EDD944EE5E0D5BEFAE8397F8484E89D73B852CA08
24,726,841 UART: [art] SIG.R = 4902606F6C88FF8D579C118418FD4922EEF7048A05EEBF283B880BC28A75C6CC958DDF2CDD1D6E4F6993A9AEC6633F98
24,734,253 UART: [art] SIG.S = 6552BD45C254C256027963F1A1268E7964E9FEB7919FF774CAB4B10D3E6DD5EE1EEC5279A498A3DEAB329C23DBAB9EF3
25,713,190 UART: Caliptra RT
25,713,887 UART: [state] CFI Enabled
25,879,008 UART: [rt] RT listening for mailbox commands...
25,880,965 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,912,553 UART: [rt]cmd =0x44504543, len=136
30,129,757 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,363,611 ready_for_fw is high
3,364,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,046,920 >>> mbox cmd response: success
18,344,213 UART:
18,344,617 UART: Running Caliptra FMC ...
18,345,721 UART:
18,345,871 UART: [state] CFI Enabled
18,413,338 UART: [fht] FMC Alias Private Key: 7
20,176,709 UART: [art] Extend RT PCRs Done
20,177,931 UART: [art] Lock RT PCRs Done
20,179,505 UART: [art] Populate DV Done
20,184,979 UART: [fht] FMC Alias Private Key: 7
20,186,699 UART: [art] Derive CDI
20,187,516 UART: [art] Store in in slot 0x4
20,246,136 UART: [art] Derive Key Pair
20,247,179 UART: [art] Store priv key in slot 0x5
22,710,268 UART: [art] Derive Key Pair - Done
22,723,271 UART: [art] Signing Cert with AUTHO
22,724,572 UART: RITY.KEYID = 7
24,435,417 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,895 UART: [art] PUB.X = 9F7AA33AD3811DB7571999A27FDEFB85400B5F1BE330B3F3438B9DBCC6CE7A84237DE23EBFD4DB7941F08056B3ADAF06
24,444,214 UART: [art] PUB.Y = 6F2781E023021AC7986163932924338D6B43372158F9A4CA1CB6E21E68EB4AF36951BA2F9FCB6412765A40D364106430
24,451,439 UART: [art] SIG.R = 0B262298E62621E1F9123DC2737F8BF5B899A42DCFBB1B77DF29E8937C8AB20354BB2B844CD301CE72F3D9D845D2299D
24,458,823 UART: [art] SIG.S = D8A2036A2F842E814F1B7BF2A75CF5373BA01C2CC763289CD6FDFA2E2F29CBD9AA82506C08DA857D28A237E8CF3A80CD
25,437,988 UART: Caliptra RT
25,438,702 UART: [state] CFI Enabled
25,601,885 UART: [rt] RT listening for mailbox commands...
25,603,817 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,635,342 UART: [rt]cmd =0x44504543, len=136
29,852,966 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
193,152 UART:
193,537 UART: Running Caliptra ROM ...
194,874 UART:
604,315 UART: [state] CFI Enabled
620,595 UART: [state] LifecycleState = Unprovisioned
622,469 UART: [state] DebugLocked = No
624,636 UART: [state] WD Timer not started. Device not locked for debugging
627,896 UART: [kat] SHA2-256
807,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,600 UART: [kat] ++
819,048 UART: [kat] sha1
829,707 UART: [kat] SHA2-256
832,781 UART: [kat] SHA2-384
838,158 UART: [kat] SHA2-512-ACC
841,059 UART: [kat] ECC-384
3,285,115 UART: [kat] HMAC-384Kdf
3,296,297 UART: [kat] LMS
3,825,765 UART: [kat] --
3,830,470 UART: [cold-reset] ++
3,831,629 UART: [fht] FHT @ 0x50003400
3,842,398 UART: [idev] ++
3,842,959 UART: [idev] CDI.KEYID = 6
3,843,869 UART: [idev] SUBJECT.KEYID = 7
3,845,040 UART: [idev] UDS.KEYID = 0
3,845,966 ready_for_fw is high
3,846,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,471 UART: [idev] Erasing UDS.KEYID = 0
6,314,110 UART: [idev] Sha1 KeyId Algorithm
6,335,736 UART: [idev] --
6,338,648 UART: [ldev] ++
6,339,220 UART: [ldev] CDI.KEYID = 6
6,340,129 UART: [ldev] SUBJECT.KEYID = 5
6,341,305 UART: [ldev] AUTHORITY.KEYID = 7
6,342,537 UART: [ldev] FE.KEYID = 1
6,351,779 UART: [ldev] Erasing FE.KEYID = 1
8,824,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,068 UART: [ldev] --
10,616,236 UART: [fwproc] Wait for Commands...
10,619,144 UART: [fwproc] Recv command 0x46574c44
10,621,235 UART: [fwproc] Recv'd Img size: 114084 bytes
14,009,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,152,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,470,194 >>> mbox cmd response: success
14,473,797 UART: [afmc] ++
14,474,395 UART: [afmc] CDI.KEYID = 6
14,475,307 UART: [afmc] SUBJECT.KEYID = 7
14,476,473 UART: [afmc] AUTHORITY.KEYID = 5
16,979,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,719,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,735,147 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,680 UART: [afmc] --
18,779,162 UART: [cold-reset] --
18,783,734 UART: [state] Locking Datavault
18,790,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,048 UART: [state] Locking ICCM
18,793,338 UART: [exit] Launching FMC @ 0x40000130
18,801,753 UART:
18,801,995 UART: Running Caliptra FMC ...
18,803,098 UART:
18,803,260 UART: [state] CFI Enabled
18,811,200 UART: [fht] FMC Alias Private Key: 7
20,567,744 UART: [art] Extend RT PCRs Done
20,568,954 UART: [art] Lock RT PCRs Done
20,570,501 UART: [art] Populate DV Done
20,575,694 UART: [fht] FMC Alias Private Key: 7
20,577,396 UART: [art] Derive CDI
20,578,134 UART: [art] Store in in slot 0x4
20,620,728 UART: [art] Derive Key Pair
20,621,765 UART: [art] Store priv key in slot 0x5
23,048,422 UART: [art] Derive Key Pair - Done
23,061,756 UART: [art] Signing Cert with AUTHO
23,063,071 UART: RITY.KEYID = 7
24,768,178 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,666 UART: [art] PUB.X = 73E55FEB5AE966ED4A57F2396F6418A9842F34BB80563C898F394FA97BF64D3C53A6E9B0F5488C666181CED531B04712
24,776,937 UART: [art] PUB.Y = 335DF51EB9B44DB7AB55DBF0F29B9BE3AE5F914795C898B7A4B0F1C2CF4480A9459DF2378225D3B93DD71E6C582223AF
24,784,202 UART: [art] SIG.R = C30F78FB38203DD9F048982AD15006BAC28395481A90519CC62257FB0102D070FF40EDE809717CCEC6E2C086DDC12409
24,791,573 UART: [art] SIG.S = F7B732ACFA7BA59C9F919034ED64AA93DA8DBABC3A4DA2F64A28B97C51F11F709D158D20788A1571BB4724CA12F27330
25,770,179 UART: Caliptra RT
25,770,892 UART: [state] CFI Enabled
25,887,256 UART: [rt] RT listening for mailbox commands...
25,889,185 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,920,154 UART: [rt]cmd =0x44504543, len=136
30,089,434 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,906 writing to cptra_bootfsm_go
3,699,254 ready_for_fw is high
3,699,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,357 >>> mbox cmd response: success
18,522,197 UART:
18,522,608 UART: Running Caliptra FMC ...
18,523,768 UART:
18,523,937 UART: [state] CFI Enabled
18,531,775 UART: [fht] FMC Alias Private Key: 7
20,288,350 UART: [art] Extend RT PCRs Done
20,289,576 UART: [art] Lock RT PCRs Done
20,291,154 UART: [art] Populate DV Done
20,296,735 UART: [fht] FMC Alias Private Key: 7
20,298,279 UART: [art] Derive CDI
20,299,103 UART: [art] Store in in slot 0x4
20,341,925 UART: [art] Derive Key Pair
20,342,968 UART: [art] Store priv key in slot 0x5
22,769,741 UART: [art] Derive Key Pair - Done
22,782,748 UART: [art] Signing Cert with AUTHO
22,784,053 UART: RITY.KEYID = 7
24,489,859 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,369 UART: [art] PUB.X = B9F1B16BD64E053735A5C248807857D1CFD2BBD1FA9C60869F81B54E153E67F4B7157CF71C7FAD9AC5F1E8B3DFC53638
24,498,669 UART: [art] PUB.Y = C22E746DAF0D484ECCBB2D2F1FB8A99ED6A662AC0B40E7612CC911F6F3BCA66E45ECBDF507354FE688D5A423A264B1C7
24,505,897 UART: [art] SIG.R = 416C72A4D74E3AF57E68E74222F47CF3D12D0C10C2BBC2F09F1CB86DA5FBEB64E6D4F388F84CF09CA8BBE5EF89B0A99E
24,513,323 UART: [art] SIG.S = 6F2A981252A08AC04AC3596D79131256858E229EA932F67666CB92FF171F9FCC369AB64DC2F6EFF873D5E639FCDB8F2A
25,492,608 UART: Caliptra RT
25,493,310 UART: [state] CFI Enabled
25,610,709 UART: [rt] RT listening for mailbox commands...
25,612,633 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,643,491 UART: [rt]cmd =0x44504543, len=136
29,813,412 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,298 writing to cptra_bootfsm_go
193,439 UART:
193,827 UART: Running Caliptra ROM ...
195,046 UART:
195,201 UART: [state] CFI Enabled
265,737 UART: [state] LifecycleState = Unprovisioned
268,151 UART: [state] DebugLocked = No
269,320 UART: [state] WD Timer not started. Device not locked for debugging
272,439 UART: [kat] SHA2-256
462,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,119 UART: [kat] ++
473,596 UART: [kat] sha1
484,669 UART: [kat] SHA2-256
487,715 UART: [kat] SHA2-384
492,575 UART: [kat] SHA2-512-ACC
495,184 UART: [kat] ECC-384
2,946,869 UART: [kat] HMAC-384Kdf
2,973,787 UART: [kat] LMS
3,505,524 UART: [kat] --
3,510,366 UART: [cold-reset] ++
3,511,932 UART: [fht] FHT @ 0x50003400
3,523,838 UART: [idev] ++
3,524,503 UART: [idev] CDI.KEYID = 6
3,525,493 UART: [idev] SUBJECT.KEYID = 7
3,526,665 UART: [idev] UDS.KEYID = 0
3,527,587 ready_for_fw is high
3,527,795 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,229 UART: [idev] Erasing UDS.KEYID = 0
6,028,540 UART: [idev] Sha1 KeyId Algorithm
6,050,977 UART: [idev] --
6,056,700 UART: [ldev] ++
6,057,443 UART: [ldev] CDI.KEYID = 6
6,058,334 UART: [ldev] SUBJECT.KEYID = 5
6,059,357 UART: [ldev] AUTHORITY.KEYID = 7
6,060,695 UART: [ldev] FE.KEYID = 1
6,103,635 UART: [ldev] Erasing FE.KEYID = 1
8,605,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,272 UART: [ldev] --
10,416,248 UART: [fwproc] Wait for Commands...
10,418,661 UART: [fwproc] Recv command 0x46574c44
10,420,965 UART: [fwproc] Recv'd Img size: 114084 bytes
13,870,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,885 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,605,498 >>> mbox cmd response: success
14,610,229 UART: [afmc] ++
14,610,936 UART: [afmc] CDI.KEYID = 6
14,612,126 UART: [afmc] SUBJECT.KEYID = 7
14,613,562 UART: [afmc] AUTHORITY.KEYID = 5
17,151,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,816 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,311 UART: [afmc] --
18,969,046 UART: [cold-reset] --
18,973,792 UART: [state] Locking Datavault
18,978,620 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,793 UART: [state] Locking ICCM
18,983,314 UART: [exit] Launching FMC @ 0x40000130
18,991,945 UART:
18,992,181 UART: Running Caliptra FMC ...
18,993,206 UART:
18,993,349 UART: [state] CFI Enabled
19,051,333 UART: [fht] FMC Alias Private Key: 7
20,815,160 UART: [art] Extend RT PCRs Done
20,816,375 UART: [art] Lock RT PCRs Done
20,817,756 UART: [art] Populate DV Done
20,823,011 UART: [fht] FMC Alias Private Key: 7
20,824,541 UART: [art] Derive CDI
20,825,272 UART: [art] Store in in slot 0x4
20,883,926 UART: [art] Derive Key Pair
20,884,966 UART: [art] Store priv key in slot 0x5
23,348,307 UART: [art] Derive Key Pair - Done
23,361,210 UART: [art] Signing Cert with AUTHO
23,362,513 UART: RITY.KEYID = 7
25,074,081 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,596 UART: [art] PUB.X = 38A6003DC5DE12F236EBA5CF2B8AA550252598FB402BF8C276A6410545C6E880BE9225EA6A516F3823D96573E4611FBC
25,082,798 UART: [art] PUB.Y = 33CFEE3BBF99E4B4AB047A5B15AE31DEF9619997A1EB4790B16B8170EE8A9877E9D6A7E6EE2A6F01DF481191D5669216
25,090,102 UART: [art] SIG.R = 0EBF2CA688C60A05E1DE6D6ACB2DF29BD7BB47009FD2BD18978FDBCEB06254A00817871D89B661B84D7BA8D497A91D3A
25,097,481 UART: [art] SIG.S = 6659DCDDF6494C4D503F11464AC851EFC95CC455D6AD1FA598F105268B5FB104C9CC8866D65D05DA5BA12549FB2D31B6
26,076,955 UART: Caliptra RT
26,077,671 UART: [state] CFI Enabled
26,242,449 UART: [rt] RT listening for mailbox commands...
26,244,509 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,276,234 UART: [rt]cmd =0x44504543, len=136
30,491,748 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,435,419 ready_for_fw is high
3,435,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,655 >>> mbox cmd response: success
19,019,367 UART:
19,019,762 UART: Running Caliptra FMC ...
19,020,957 UART:
19,021,127 UART: [state] CFI Enabled
19,085,613 UART: [fht] FMC Alias Private Key: 7
20,849,163 UART: [art] Extend RT PCRs Done
20,850,392 UART: [art] Lock RT PCRs Done
20,852,012 UART: [art] Populate DV Done
20,857,348 UART: [fht] FMC Alias Private Key: 7
20,858,984 UART: [art] Derive CDI
20,859,811 UART: [art] Store in in slot 0x4
20,918,256 UART: [art] Derive Key Pair
20,919,255 UART: [art] Store priv key in slot 0x5
23,382,674 UART: [art] Derive Key Pair - Done
23,395,349 UART: [art] Signing Cert with AUTHO
23,396,648 UART: RITY.KEYID = 7
25,108,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,204 UART: [art] PUB.X = 1D8B79F3EB59A68BE8CCD9D38B11AC6171CDBE8FB4F9DB770E2810B0BC825C2070990C167A8E159B6791C170E3EF88B5
25,117,432 UART: [art] PUB.Y = B8BF571780F43A0D1C56A682D42798D2FD60FC8D4AFFF7C3BE49F963459E5093D4A6DEF136481DF16BCB24D5AE57FFAD
25,124,732 UART: [art] SIG.R = 8AEAD6DFB850B54AA3A6C7E0D4E531A91D3E681B2D8B4400342E0F6AD6879880C53A01C833B09C1D64B13CC3EE9455FD
25,132,143 UART: [art] SIG.S = 2DC1CA1B4B7B50E9936C39B45EEBF07E56F3CAB196225B68D04CE6D786BCC77A411C703F0BCCFBD27C24541C504988B5
26,110,933 UART: Caliptra RT
26,111,636 UART: [state] CFI Enabled
26,276,107 UART: [rt] RT listening for mailbox commands...
26,278,041 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,309,461 UART: [rt]cmd =0x44504543, len=136
30,527,342 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
192,863 UART:
193,241 UART: Running Caliptra ROM ...
194,446 UART:
604,184 UART: [state] CFI Enabled
621,906 UART: [state] LifecycleState = Unprovisioned
624,311 UART: [state] DebugLocked = No
626,209 UART: [state] WD Timer not started. Device not locked for debugging
631,029 UART: [kat] SHA2-256
820,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,686 UART: [kat] ++
832,297 UART: [kat] sha1
844,673 UART: [kat] SHA2-256
847,685 UART: [kat] SHA2-384
853,462 UART: [kat] SHA2-512-ACC
856,045 UART: [kat] ECC-384
3,299,722 UART: [kat] HMAC-384Kdf
3,312,173 UART: [kat] LMS
3,844,057 UART: [kat] --
3,846,779 UART: [cold-reset] ++
3,847,786 UART: [fht] FHT @ 0x50003400
3,858,129 UART: [idev] ++
3,858,839 UART: [idev] CDI.KEYID = 6
3,859,750 UART: [idev] SUBJECT.KEYID = 7
3,861,004 UART: [idev] UDS.KEYID = 0
3,861,940 ready_for_fw is high
3,862,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,430 UART: [idev] Erasing UDS.KEYID = 0
6,333,422 UART: [idev] Sha1 KeyId Algorithm
6,356,388 UART: [idev] --
6,361,091 UART: [ldev] ++
6,361,777 UART: [ldev] CDI.KEYID = 6
6,362,716 UART: [ldev] SUBJECT.KEYID = 5
6,363,872 UART: [ldev] AUTHORITY.KEYID = 7
6,365,109 UART: [ldev] FE.KEYID = 1
6,378,483 UART: [ldev] Erasing FE.KEYID = 1
8,859,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,577 UART: [ldev] --
10,648,646 UART: [fwproc] Wait for Commands...
10,651,336 UART: [fwproc] Recv command 0x46574c44
10,653,593 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,923 >>> mbox cmd response: success
14,833,423 UART: [afmc] ++
14,834,129 UART: [afmc] CDI.KEYID = 6
14,835,330 UART: [afmc] SUBJECT.KEYID = 7
14,836,779 UART: [afmc] AUTHORITY.KEYID = 5
17,339,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,120 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,695 UART: [afmc] --
19,135,357 UART: [cold-reset] --
19,139,987 UART: [state] Locking Datavault
19,144,603 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,809 UART: [state] Locking ICCM
19,149,234 UART: [exit] Launching FMC @ 0x40000130
19,157,870 UART:
19,158,109 UART: Running Caliptra FMC ...
19,159,212 UART:
19,159,371 UART: [state] CFI Enabled
19,167,311 UART: [fht] FMC Alias Private Key: 7
20,925,505 UART: [art] Extend RT PCRs Done
20,926,721 UART: [art] Lock RT PCRs Done
20,928,728 UART: [art] Populate DV Done
20,934,192 UART: [fht] FMC Alias Private Key: 7
20,935,760 UART: [art] Derive CDI
20,936,583 UART: [art] Store in in slot 0x4
20,979,354 UART: [art] Derive Key Pair
20,980,392 UART: [art] Store priv key in slot 0x5
23,408,058 UART: [art] Derive Key Pair - Done
23,421,261 UART: [art] Signing Cert with AUTHO
23,422,592 UART: RITY.KEYID = 7
25,127,917 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,426 UART: [art] PUB.X = 730A3C7F2762F986E0B9E24F4F823254C12EAE28F3F59CA9CC9A9840433CCCEB1049F252F2EDF74ADD5D8073546BCE6A
25,136,702 UART: [art] PUB.Y = 888739950C0A80454349163E532E969098A1E238C2DC143695F5AD1DF44C97EAEC3F769DCC10EB668DE7F6446DDA5ABC
25,143,966 UART: [art] SIG.R = 60676CC34E6B8ABF6994CFD51AE4B8578BC2D8EA1F812653B88D0D6708ED7E8D1A32AFD8C219C7A345A9444A9E6759E5
25,151,396 UART: [art] SIG.S = 98701C9B969DB9B1F89A97B338D4BE7A99E57D3E3005871B3635605F232705535A99FF7B4CCC61F94654870139011AE8
26,130,178 UART: Caliptra RT
26,130,869 UART: [state] CFI Enabled
26,249,168 UART: [rt] RT listening for mailbox commands...
26,251,100 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,282,238 UART: [rt]cmd =0x44504543, len=136
30,451,721 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
3,759,797 ready_for_fw is high
3,760,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,963,715 >>> mbox cmd response: success
19,213,772 UART:
19,214,186 UART: Running Caliptra FMC ...
19,215,332 UART:
19,215,493 UART: [state] CFI Enabled
19,223,641 UART: [fht] FMC Alias Private Key: 7
20,980,712 UART: [art] Extend RT PCRs Done
20,981,940 UART: [art] Lock RT PCRs Done
20,983,407 UART: [art] Populate DV Done
20,988,616 UART: [fht] FMC Alias Private Key: 7
20,990,106 UART: [art] Derive CDI
20,990,843 UART: [art] Store in in slot 0x4
21,033,274 UART: [art] Derive Key Pair
21,034,300 UART: [art] Store priv key in slot 0x5
23,461,454 UART: [art] Derive Key Pair - Done
23,474,759 UART: [art] Signing Cert with AUTHO
23,476,223 UART: RITY.KEYID = 7
25,181,440 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,069 UART: [art] PUB.X = 18B80F74E8723831EB9D9ADD1D127BE6D883AF7787A9FFD6B96C5119D0BC1FC91200283DB6399F36B2AD9D30124C9030
25,190,205 UART: [art] PUB.Y = 6901F8C5F11A052DEF75D0C004F72A150DC8EAEFD7FA2ED8506EEE8FDC8D1B03910E4B9B9D1402AE7408D163E988CCE5
25,197,488 UART: [art] SIG.R = E4567704E614853068B7605600ACF162B909BBE05F17D3E4D18A8CD6D842B3909C4DEC95EA7061AD81571F946BC6F0D9
25,204,837 UART: [art] SIG.S = 5C0E0EEAEBDC2BBF1FD5FABE5C85573A64DA97ED07A0C1A947E3F08C55455E3BDBF362988C399585AEBC70D7AAA3F204
26,183,460 UART: Caliptra RT
26,184,193 UART: [state] CFI Enabled
26,299,869 UART: [rt] RT listening for mailbox commands...
26,301,796 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,332,933 UART: [rt]cmd =0x44504543, len=136
30,502,415 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,282 UART: [kat] LMS
1,475,478 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 ready_for_fw is high
1,481,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,054 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,411 UART: [ldev] ++
1,514,579 UART: [ldev] CDI.KEYID = 6
1,514,942 UART: [ldev] SUBJECT.KEYID = 5
1,515,368 UART: [ldev] AUTHORITY.KEYID = 7
1,515,831 UART: [ldev] FE.KEYID = 1
1,520,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,310 UART: [ldev] --
1,585,733 UART: [fwproc] Waiting for Commands...
1,586,430 UART: [fwproc] Received command 0x46574c44
1,587,221 UART: [fwproc] Received Image of size 114084 bytes
2,882,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,212 >>> mbox cmd response: success
3,075,320 UART: [afmc] ++
3,075,488 UART: [afmc] CDI.KEYID = 6
3,075,850 UART: [afmc] SUBJECT.KEYID = 7
3,076,275 UART: [afmc] AUTHORITY.KEYID = 5
3,111,178 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,162 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,555 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,245 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,304 UART: [afmc] --
3,154,270 UART: [cold-reset] --
3,155,104 UART: [state] Locking Datavault
3,156,309 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,913 UART: [state] Locking ICCM
3,157,417 UART: [exit] Launching FMC @ 0x40000130
3,162,746 UART:
3,162,762 UART: Running Caliptra FMC ...
3,163,170 UART:
3,163,224 UART: [state] CFI Enabled
3,173,709 UART: [fht] FMC Alias Private Key: 7
3,281,598 UART: [art] Extend RT PCRs Done
3,282,026 UART: [art] Lock RT PCRs Done
3,283,510 UART: [art] Populate DV Done
3,291,573 UART: [fht] FMC Alias Private Key: 7
3,292,651 UART: [art] Derive CDI
3,292,931 UART: [art] Store in in slot 0x4
3,378,318 UART: [art] Derive Key Pair
3,378,678 UART: [art] Store priv key in slot 0x5
3,391,382 UART: [art] Derive Key Pair - Done
3,406,011 UART: [art] Signing Cert with AUTHO
3,406,491 UART: RITY.KEYID = 7
3,421,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,022 UART: [art] PUB.X = DF37C20744D2F15191F759D11FDC016F29C6C35B1ABF5F230E2A43313900BEF8CF24F8FBE0F73B8B1E54A087CAE8CFB2
3,428,779 UART: [art] PUB.Y = F251E936204EAC91F6921DB4AC08515F4B133CCA476D2B4488E5766AA333643A8DC014196137665DF9C2748EA7D041C2
3,435,724 UART: [art] SIG.R = A759358FDCDF88274DCEA67B5BB858269FFCC5A854B2FB35E06780F061E8E8362765910C2506BB2AC4AE9E4BE719520D
3,442,495 UART: [art] SIG.S = 7C1AD5533F7C838E424FE2FDE951C0001D3726F298DF4E903AE2CAC08EA59F42C0D5BB50E2B82A658A3C6599963ACC93
3,466,102 UART: Caliptra RT
3,466,355 UART: [state] CFI Enabled
3,574,132 UART: [rt] RT listening for mailbox commands...
3,574,802 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,624 UART: [rt]cmd =0x44504543, len=136
3,669,324 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,460 >>> mbox cmd response: success
2,987,420 UART:
2,987,436 UART: Running Caliptra FMC ...
2,987,844 UART:
2,987,898 UART: [state] CFI Enabled
2,998,169 UART: [fht] FMC Alias Private Key: 7
3,106,886 UART: [art] Extend RT PCRs Done
3,107,314 UART: [art] Lock RT PCRs Done
3,108,598 UART: [art] Populate DV Done
3,116,977 UART: [fht] FMC Alias Private Key: 7
3,117,939 UART: [art] Derive CDI
3,118,219 UART: [art] Store in in slot 0x4
3,204,092 UART: [art] Derive Key Pair
3,204,452 UART: [art] Store priv key in slot 0x5
3,217,984 UART: [art] Derive Key Pair - Done
3,232,874 UART: [art] Signing Cert with AUTHO
3,233,354 UART: RITY.KEYID = 7
3,248,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,615 UART: [art] PUB.X = BF5FE7F31DD4D17561F0967E59BFA2C8BB569A435E98BD85CF186D5E6B302C63084B7800BF131FFC264D51976779F2F3
3,256,368 UART: [art] PUB.Y = B4EA98FBC515BAD6330BF1FCC96BA1807309BAA00C1E44FB7AB87CE780DC921F8EB4B05DB288226631598FDA4B98E70D
3,263,326 UART: [art] SIG.R = 510443D83CCDFCDE4F0CD6812F78F0E348AC346F418B113711EC2867413027DC084578F99FE46082919E055FA971CACE
3,270,086 UART: [art] SIG.S = CAEBBB1D0F4824EE1C0E3D2CFC099A0C7AA84277612A1789E5F68EF6F9D905824C9A65249452CCFD3F70B14A1C59F9E3
3,293,238 UART: Caliptra RT
3,293,491 UART: [state] CFI Enabled
3,400,958 UART: [rt] RT listening for mailbox commands...
3,401,628 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,116 UART: [rt]cmd =0x44504543, len=136
3,495,704 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
903,183 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,477,028 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,307 UART: [idev] ++
1,480,475 UART: [idev] CDI.KEYID = 6
1,480,835 UART: [idev] SUBJECT.KEYID = 7
1,481,259 UART: [idev] UDS.KEYID = 0
1,481,604 ready_for_fw is high
1,481,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,693 UART: [idev] Erasing UDS.KEYID = 0
1,506,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,169 UART: [idev] --
1,516,246 UART: [ldev] ++
1,516,414 UART: [ldev] CDI.KEYID = 6
1,516,777 UART: [ldev] SUBJECT.KEYID = 5
1,517,203 UART: [ldev] AUTHORITY.KEYID = 7
1,517,666 UART: [ldev] FE.KEYID = 1
1,522,768 UART: [ldev] Erasing FE.KEYID = 1
1,548,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,315 UART: [ldev] --
1,587,738 UART: [fwproc] Waiting for Commands...
1,588,433 UART: [fwproc] Received command 0x46574c44
1,589,224 UART: [fwproc] Received Image of size 114084 bytes
2,884,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,937 >>> mbox cmd response: success
3,078,129 UART: [afmc] ++
3,078,297 UART: [afmc] CDI.KEYID = 6
3,078,659 UART: [afmc] SUBJECT.KEYID = 7
3,079,084 UART: [afmc] AUTHORITY.KEYID = 5
3,114,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,010 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,700 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,595 UART: [afmc] --
3,157,705 UART: [cold-reset] --
3,158,657 UART: [state] Locking Datavault
3,159,698 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,302 UART: [state] Locking ICCM
3,160,748 UART: [exit] Launching FMC @ 0x40000130
3,166,077 UART:
3,166,093 UART: Running Caliptra FMC ...
3,166,501 UART:
3,166,644 UART: [state] CFI Enabled
3,177,099 UART: [fht] FMC Alias Private Key: 7
3,284,746 UART: [art] Extend RT PCRs Done
3,285,174 UART: [art] Lock RT PCRs Done
3,287,056 UART: [art] Populate DV Done
3,295,401 UART: [fht] FMC Alias Private Key: 7
3,296,519 UART: [art] Derive CDI
3,296,799 UART: [art] Store in in slot 0x4
3,382,580 UART: [art] Derive Key Pair
3,382,940 UART: [art] Store priv key in slot 0x5
3,396,194 UART: [art] Derive Key Pair - Done
3,410,869 UART: [art] Signing Cert with AUTHO
3,411,349 UART: RITY.KEYID = 7
3,427,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,782 UART: [art] PUB.X = F0B6126C5B28F9E01A01B7F8A83F5B2AC2C1F5EE4A595EAD51956F846D9F687904A72575DD7D92EDBD8E4B9F42AA079A
3,434,559 UART: [art] PUB.Y = F66676E1B86E609612A2074125059AF11E01F92F4F77DE4AFF69732E17B9027995E52AB73C4BDBCC55F16F614CAEA1A7
3,441,503 UART: [art] SIG.R = E4A1C2B20735C1BE2D19679B3E190F28BF3D56F93DB16351F49A977BF71FDA441047FB8221D91B1F305EFBFC964C075B
3,448,274 UART: [art] SIG.S = 9D6E39F9570C176775223EEAD79004FC8EE5E7AA0726362C87818DB6FFA443773C208D8C872AD91EA0208256FD46A234
3,472,356 UART: Caliptra RT
3,472,701 UART: [state] CFI Enabled
3,580,429 UART: [rt] RT listening for mailbox commands...
3,581,099 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,027 UART: [rt]cmd =0x44504543, len=136
3,676,249 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 ready_for_fw is high
1,363,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,715 >>> mbox cmd response: success
2,987,655 UART:
2,987,671 UART: Running Caliptra FMC ...
2,988,079 UART:
2,988,222 UART: [state] CFI Enabled
2,998,691 UART: [fht] FMC Alias Private Key: 7
3,106,802 UART: [art] Extend RT PCRs Done
3,107,230 UART: [art] Lock RT PCRs Done
3,109,052 UART: [art] Populate DV Done
3,117,301 UART: [fht] FMC Alias Private Key: 7
3,118,253 UART: [art] Derive CDI
3,118,533 UART: [art] Store in in slot 0x4
3,204,072 UART: [art] Derive Key Pair
3,204,432 UART: [art] Store priv key in slot 0x5
3,217,660 UART: [art] Derive Key Pair - Done
3,232,362 UART: [art] Signing Cert with AUTHO
3,232,842 UART: RITY.KEYID = 7
3,247,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,703 UART: [art] PUB.X = E4AAA971921CB457BE727B76D8CF88F1E2301DB822F008CC7EB9D35646EEC461BD0028AEA67BA6C97590C2906309B0D1
3,255,455 UART: [art] PUB.Y = E38F819581E0D698B7A1E580207797C1BFA720330129E78B283F20FF00DD01B1B5386DD7F53F36C9E9BAA01AF0AECFF6
3,262,387 UART: [art] SIG.R = 8EDCF9E6188C3F95A0EFC0EBF8AC7DBBFBCE56D93346EA6F0FD75B47E2B5367EF4D1AC911F283636137E9C8724774AEC
3,269,178 UART: [art] SIG.S = 6591F031E77139150D4E3039040BD4DD0A4A58C9C73708F54B3A85E47D25CD8FBA7AF105A55E292D40BB60FC6B4668BC
3,292,547 UART: Caliptra RT
3,292,892 UART: [state] CFI Enabled
3,401,193 UART: [rt] RT listening for mailbox commands...
3,401,863 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,359 UART: [rt]cmd =0x44504543, len=136
3,495,693 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,113 UART: [kat] SHA2-256
904,053 UART: [kat] SHA2-384
906,816 UART: [kat] SHA2-512-ACC
908,717 UART: [kat] ECC-384
918,300 UART: [kat] HMAC-384Kdf
922,800 UART: [kat] LMS
1,171,128 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,223 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 ready_for_fw is high
1,176,097 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,201,051 UART: [idev] Sha1 KeyId Algorithm
1,209,555 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,363 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,333 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,238 UART: [fwproc] Recv command 0x46574c44
1,283,966 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,587 >>> mbox cmd response: success
2,772,629 UART: [afmc] ++
2,772,797 UART: [afmc] CDI.KEYID = 6
2,773,159 UART: [afmc] SUBJECT.KEYID = 7
2,773,584 UART: [afmc] AUTHORITY.KEYID = 5
2,809,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,310 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,326 UART: [afmc] --
2,852,272 UART: [cold-reset] --
2,852,798 UART: [state] Locking Datavault
2,854,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,717 UART: [state] Locking ICCM
2,855,281 UART: [exit] Launching FMC @ 0x40000130
2,860,610 UART:
2,860,626 UART: Running Caliptra FMC ...
2,861,034 UART:
2,861,088 UART: [state] CFI Enabled
2,871,865 UART: [fht] FMC Alias Private Key: 7
2,980,084 UART: [art] Extend RT PCRs Done
2,980,512 UART: [art] Lock RT PCRs Done
2,981,912 UART: [art] Populate DV Done
2,990,189 UART: [fht] FMC Alias Private Key: 7
2,991,231 UART: [art] Derive CDI
2,991,511 UART: [art] Store in in slot 0x4
3,076,934 UART: [art] Derive Key Pair
3,077,294 UART: [art] Store priv key in slot 0x5
3,090,526 UART: [art] Derive Key Pair - Done
3,105,347 UART: [art] Signing Cert with AUTHO
3,105,827 UART: RITY.KEYID = 7
3,120,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,622 UART: [art] PUB.X = 0F28A37BCE848C6CE38CA87FBC55C28D45C781A47E29B3B0215E4C08B83F48C3184122E0A8A3E195D5D04A8266FC894B
3,128,394 UART: [art] PUB.Y = 0B886159B98084388D6A7ECD39D1C43BE46FBA629051336806DAB2EA93259F2535E70671DFDE460C7B27217B97833B24
3,135,328 UART: [art] SIG.R = 64F0EFD6896276918A3999E8D0A023975F973FF1825EE7C69C12BFC72CF4C8C3CC79AD009F7063C6CD052F5757853325
3,142,073 UART: [art] SIG.S = EB8FC44E692E2997E1165D2AFB95942597C64EC5E743D45C55100D38BE9C42AF9845A87D7399838B80D2284324469BED
3,165,845 UART: Caliptra RT
3,166,098 UART: [state] CFI Enabled
3,274,155 UART: [rt] RT listening for mailbox commands...
3,274,825 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,603 UART: [rt]cmd =0x44504543, len=136
3,368,741 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,117 ready_for_fw is high
1,060,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,322 >>> mbox cmd response: success
2,684,542 UART:
2,684,558 UART: Running Caliptra FMC ...
2,684,966 UART:
2,685,020 UART: [state] CFI Enabled
2,695,271 UART: [fht] FMC Alias Private Key: 7
2,803,396 UART: [art] Extend RT PCRs Done
2,803,824 UART: [art] Lock RT PCRs Done
2,805,464 UART: [art] Populate DV Done
2,813,609 UART: [fht] FMC Alias Private Key: 7
2,814,667 UART: [art] Derive CDI
2,814,947 UART: [art] Store in in slot 0x4
2,900,166 UART: [art] Derive Key Pair
2,900,526 UART: [art] Store priv key in slot 0x5
2,913,278 UART: [art] Derive Key Pair - Done
2,928,173 UART: [art] Signing Cert with AUTHO
2,928,653 UART: RITY.KEYID = 7
2,943,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,310 UART: [art] PUB.X = 7E02E4602AC8FB9C37FE5E7A037E8C5F36FFF74A8B762313B16BEDAAFA57BAB27BE6C7155F0F776870F9E19939CEAC8C
2,951,093 UART: [art] PUB.Y = BDAADC591B0201CB54C607ADE6B59862E19C0687AD011619D7E7713946B7BD9630DFC520DF7D5188999A3EFFD9E9F69C
2,958,040 UART: [art] SIG.R = A826D38B6BC9A9F06788960250BCE040526C8207C844120CDE64B70C3E200B31A9B390D57C276A71CE4E4BB14113F648
2,964,793 UART: [art] SIG.S = 9063977079733D6943EB7A93AA5C7E11CB852C8C6302753E446F848DF85E7E6E160D0D62C09A1309B3491535FB1E5FAF
2,988,294 UART: Caliptra RT
2,988,547 UART: [state] CFI Enabled
3,096,079 UART: [rt] RT listening for mailbox commands...
3,096,749 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,517 UART: [rt]cmd =0x44504543, len=136
3,191,575 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,483 UART: [kat] SHA2-256
893,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,258 UART: [kat] ++
897,410 UART: [kat] sha1
901,656 UART: [kat] SHA2-256
903,596 UART: [kat] SHA2-384
906,323 UART: [kat] SHA2-512-ACC
908,224 UART: [kat] ECC-384
917,991 UART: [kat] HMAC-384Kdf
922,701 UART: [kat] LMS
1,171,029 UART: [kat] --
1,172,012 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 ready_for_fw is high
1,176,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,951 UART: [idev] Erasing UDS.KEYID = 0
1,201,158 UART: [idev] Sha1 KeyId Algorithm
1,209,534 UART: [idev] --
1,210,494 UART: [ldev] ++
1,210,662 UART: [ldev] CDI.KEYID = 6
1,211,025 UART: [ldev] SUBJECT.KEYID = 5
1,211,451 UART: [ldev] AUTHORITY.KEYID = 7
1,211,914 UART: [ldev] FE.KEYID = 1
1,217,300 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,144 UART: [ldev] --
1,283,649 UART: [fwproc] Wait for Commands...
1,284,469 UART: [fwproc] Recv command 0x46574c44
1,285,197 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,274 >>> mbox cmd response: success
2,773,352 UART: [afmc] ++
2,773,520 UART: [afmc] CDI.KEYID = 6
2,773,882 UART: [afmc] SUBJECT.KEYID = 7
2,774,307 UART: [afmc] AUTHORITY.KEYID = 5
2,809,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,565 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,947 UART: [afmc] --
2,852,949 UART: [cold-reset] --
2,853,725 UART: [state] Locking Datavault
2,854,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,474 UART: [state] Locking ICCM
2,856,086 UART: [exit] Launching FMC @ 0x40000130
2,861,415 UART:
2,861,431 UART: Running Caliptra FMC ...
2,861,839 UART:
2,861,982 UART: [state] CFI Enabled
2,872,487 UART: [fht] FMC Alias Private Key: 7
2,980,940 UART: [art] Extend RT PCRs Done
2,981,368 UART: [art] Lock RT PCRs Done
2,983,018 UART: [art] Populate DV Done
2,991,199 UART: [fht] FMC Alias Private Key: 7
2,992,341 UART: [art] Derive CDI
2,992,621 UART: [art] Store in in slot 0x4
3,078,602 UART: [art] Derive Key Pair
3,078,962 UART: [art] Store priv key in slot 0x5
3,092,242 UART: [art] Derive Key Pair - Done
3,106,847 UART: [art] Signing Cert with AUTHO
3,107,327 UART: RITY.KEYID = 7
3,123,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,868 UART: [art] PUB.X = 7261C1738BE78E820648384DDFAFEA576EFE0B9319E1B769B0B287F60E2C64FA13AF55339E9DB55BB4DA2C2E98B3172E
3,130,641 UART: [art] PUB.Y = 4BB913C7B7B449F21EE20040227A24F69E162E99C6F6600DE2E20F2DC1D7B78DAAF00DFF2E234C3032F7A9CE5571EE62
3,137,572 UART: [art] SIG.R = 02F01F5CD54DCD4977A302142147A52DAB71F5F4B1AF141DAF53B5E11146EE00D0057799AFDCD88CE881685506183E6C
3,144,314 UART: [art] SIG.S = 961B10D556390D8EBC146F15A549102313A17D3EF01BC56356B7C0C259487224B4C9AB7812EC80B49B98AFF3C3817F1C
3,168,202 UART: Caliptra RT
3,168,547 UART: [state] CFI Enabled
3,275,994 UART: [rt] RT listening for mailbox commands...
3,276,664 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,330 UART: [rt]cmd =0x44504543, len=136
3,370,882 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 ready_for_fw is high
1,060,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,255 >>> mbox cmd response: success
2,686,875 UART:
2,686,891 UART: Running Caliptra FMC ...
2,687,299 UART:
2,687,442 UART: [state] CFI Enabled
2,698,033 UART: [fht] FMC Alias Private Key: 7
2,805,872 UART: [art] Extend RT PCRs Done
2,806,300 UART: [art] Lock RT PCRs Done
2,807,938 UART: [art] Populate DV Done
2,816,275 UART: [fht] FMC Alias Private Key: 7
2,817,383 UART: [art] Derive CDI
2,817,663 UART: [art] Store in in slot 0x4
2,903,534 UART: [art] Derive Key Pair
2,903,894 UART: [art] Store priv key in slot 0x5
2,917,252 UART: [art] Derive Key Pair - Done
2,932,347 UART: [art] Signing Cert with AUTHO
2,932,827 UART: RITY.KEYID = 7
2,947,957 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,722 UART: [art] PUB.X = E582AA0C2E534C11CC6334532E238E4A12A34BAD3469A88BC34F0AB98BDB5C3E47CE0A051F3222F2DF1F4F48BC3BD953
2,955,496 UART: [art] PUB.Y = FCF27FADFF50AF5E1E5EEBFAAB7341080B77F4F8BA1DF35E43BEECC6E43F8EE255A3B8DB160F74D423E8E7C503468B2E
2,962,466 UART: [art] SIG.R = 53A9829FCE66967E3A17618500FF6988FD612D455C46FFDAC7B4CC7504FD2E6D8D9806669F421DA2BECB124D895875D5
2,969,214 UART: [art] SIG.S = 5029DD01351069020EBEF9BF04383884768984E8D3956D640001BE9B9AE3EA9DC464B4BC101D33D29D8C84DC62DAAF5E
2,992,932 UART: Caliptra RT
2,993,277 UART: [state] CFI Enabled
3,100,366 UART: [rt] RT listening for mailbox commands...
3,101,036 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,846 UART: [rt]cmd =0x44504543, len=136
3,195,588 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,553 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,174,523 ready_for_fw is high
1,174,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,553 UART: [idev] Sha1 KeyId Algorithm
1,208,407 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,216,050 UART: [ldev] Erasing FE.KEYID = 1
1,242,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,422 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,551 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,003 >>> mbox cmd response: success
2,770,138 UART: [afmc] ++
2,770,306 UART: [afmc] CDI.KEYID = 6
2,770,669 UART: [afmc] SUBJECT.KEYID = 7
2,771,095 UART: [afmc] AUTHORITY.KEYID = 5
2,806,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,466 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,471 UART: [afmc] --
2,849,469 UART: [cold-reset] --
2,850,231 UART: [state] Locking Datavault
2,851,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,922 UART: [state] Locking ICCM
2,852,534 UART: [exit] Launching FMC @ 0x40000130
2,857,863 UART:
2,857,879 UART: Running Caliptra FMC ...
2,858,287 UART:
2,858,341 UART: [state] CFI Enabled
2,868,844 UART: [fht] FMC Alias Private Key: 7
2,976,439 UART: [art] Extend RT PCRs Done
2,976,867 UART: [art] Lock RT PCRs Done
2,978,407 UART: [art] Populate DV Done
2,986,622 UART: [fht] FMC Alias Private Key: 7
2,987,736 UART: [art] Derive CDI
2,988,016 UART: [art] Store in in slot 0x4
3,073,777 UART: [art] Derive Key Pair
3,074,137 UART: [art] Store priv key in slot 0x5
3,087,613 UART: [art] Derive Key Pair - Done
3,102,568 UART: [art] Signing Cert with AUTHO
3,103,048 UART: RITY.KEYID = 7
3,118,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,941 UART: [art] PUB.X = 2820915F1706A6F12B3CC0B5B9CB4352A60834E30F5CF130A79FC5D317E648D14577BB0BD4ED9D9566FC8D9AF7E3DA57
3,125,709 UART: [art] PUB.Y = A1F817D688067E686FA2F1D4CC27379BED8DE1C8355BC30DAEB3533F6CBC7224202A9E39EAF0DC14E4E2B1782646D8E8
3,132,667 UART: [art] SIG.R = 7FA10F321A647004D4BFA80F90F450D338F642BEC3C272434685BCCD18D3F9E9AB34A28FC20C27C727CC96E3E517D8FD
3,139,437 UART: [art] SIG.S = 1EA58F9AC91D91D94795A3DE40C391DF1DAD824B04F82FD72AA4BB85F0F30C03B9588E0F4EF44696370D70305A26BEA1
3,163,199 UART: Caliptra RT
3,163,452 UART: [state] CFI Enabled
3,271,429 UART: [rt] RT listening for mailbox commands...
3,272,099 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,917 UART: [rt]cmd =0x44504543, len=136
3,366,681 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,794 ready_for_fw is high
1,055,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,127 >>> mbox cmd response: success
2,680,125 UART:
2,680,141 UART: Running Caliptra FMC ...
2,680,549 UART:
2,680,603 UART: [state] CFI Enabled
2,691,084 UART: [fht] FMC Alias Private Key: 7
2,798,783 UART: [art] Extend RT PCRs Done
2,799,211 UART: [art] Lock RT PCRs Done
2,800,777 UART: [art] Populate DV Done
2,809,202 UART: [fht] FMC Alias Private Key: 7
2,810,360 UART: [art] Derive CDI
2,810,640 UART: [art] Store in in slot 0x4
2,896,229 UART: [art] Derive Key Pair
2,896,589 UART: [art] Store priv key in slot 0x5
2,909,665 UART: [art] Derive Key Pair - Done
2,924,337 UART: [art] Signing Cert with AUTHO
2,924,817 UART: RITY.KEYID = 7
2,940,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,914 UART: [art] PUB.X = ED121B574FDF14A3BD9FA0C1CAE2B15B467A40EAC55304ECE9F6DE373C60780F98FE29B72F16A344EC3A733CB4CB5307
2,947,695 UART: [art] PUB.Y = 0EB9F97D3BA128945B65246CD6CDC638C7570DB942FFB4F0F12DBABB1E59819EC1B72522D39D089B8E36CF0943255929
2,954,641 UART: [art] SIG.R = 6FFF69CC97072979EF06E9909F370A143EA54503B3603C9257A9EE76E8401B6C6745183883FE8874E6B062FDD08B9F44
2,961,395 UART: [art] SIG.S = 4A1034D62F5A8C0F8F58A5AD21B970CCF965BC1202E442BA696744CF2282CA99B625364B7D26A05F0F49673E173C53B2
2,985,051 UART: Caliptra RT
2,985,304 UART: [state] CFI Enabled
3,093,055 UART: [rt] RT listening for mailbox commands...
3,093,725 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,239 UART: [rt]cmd =0x44504543, len=136
3,188,355 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,378 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,652 UART: [idev] ++
1,173,820 UART: [idev] CDI.KEYID = 6
1,174,181 UART: [idev] SUBJECT.KEYID = 7
1,174,606 UART: [idev] UDS.KEYID = 0
1,174,952 ready_for_fw is high
1,174,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,639 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,294 >>> mbox cmd response: success
2,772,375 UART: [afmc] ++
2,772,543 UART: [afmc] CDI.KEYID = 6
2,772,906 UART: [afmc] SUBJECT.KEYID = 7
2,773,332 UART: [afmc] AUTHORITY.KEYID = 5
2,808,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,062 UART: [afmc] --
2,851,984 UART: [cold-reset] --
2,853,020 UART: [state] Locking Datavault
2,854,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,945 UART: [state] Locking ICCM
2,855,401 UART: [exit] Launching FMC @ 0x40000130
2,860,730 UART:
2,860,746 UART: Running Caliptra FMC ...
2,861,154 UART:
2,861,297 UART: [state] CFI Enabled
2,871,774 UART: [fht] FMC Alias Private Key: 7
2,979,557 UART: [art] Extend RT PCRs Done
2,979,985 UART: [art] Lock RT PCRs Done
2,981,799 UART: [art] Populate DV Done
2,989,984 UART: [fht] FMC Alias Private Key: 7
2,990,984 UART: [art] Derive CDI
2,991,264 UART: [art] Store in in slot 0x4
3,077,001 UART: [art] Derive Key Pair
3,077,361 UART: [art] Store priv key in slot 0x5
3,091,029 UART: [art] Derive Key Pair - Done
3,105,990 UART: [art] Signing Cert with AUTHO
3,106,470 UART: RITY.KEYID = 7
3,121,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,607 UART: [art] PUB.X = 1EBAC53C875C4B9FDFC3AAF19359F08F82EDE76668FF396D16E3D62F693C7E7B935DE1A737567C1D9936BF7099FC99E0
3,129,391 UART: [art] PUB.Y = 8FC3E2EECA7444F72A2C105FBD4F6268DCF89C1EF74573D087C9D526F38CD5F5ACF3F2A58E6666ECB32AF12128FC8BB6
3,136,363 UART: [art] SIG.R = 4124752681D6502AEEDAF69F2A5B6EAE7F06EE02EE8DB21DFF25AF4365567CA343FDBD9201F5725E9F5FF4CC0CD2EEC1
3,143,145 UART: [art] SIG.S = ABF86C6BDD27E778590AD17957D2078F7BB799CDDD7E295527D62EC90C2F8758F9B5BFC1965061B6CD652828080BA68B
3,166,163 UART: Caliptra RT
3,166,508 UART: [state] CFI Enabled
3,274,039 UART: [rt] RT listening for mailbox commands...
3,274,709 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,575 UART: [rt]cmd =0x44504543, len=136
3,369,039 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,867 ready_for_fw is high
1,056,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,248 >>> mbox cmd response: success
2,683,034 UART:
2,683,050 UART: Running Caliptra FMC ...
2,683,458 UART:
2,683,601 UART: [state] CFI Enabled
2,694,318 UART: [fht] FMC Alias Private Key: 7
2,802,593 UART: [art] Extend RT PCRs Done
2,803,021 UART: [art] Lock RT PCRs Done
2,804,177 UART: [art] Populate DV Done
2,812,634 UART: [fht] FMC Alias Private Key: 7
2,813,644 UART: [art] Derive CDI
2,813,924 UART: [art] Store in in slot 0x4
2,899,695 UART: [art] Derive Key Pair
2,900,055 UART: [art] Store priv key in slot 0x5
2,913,055 UART: [art] Derive Key Pair - Done
2,927,827 UART: [art] Signing Cert with AUTHO
2,928,307 UART: RITY.KEYID = 7
2,943,991 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,756 UART: [art] PUB.X = 28BC6E72312A0E6468A1944A96AD84B000C4345B0D12CAB1AE278D3FAF68F758BA6B8D36B514D32026BA1E3A5669AD9A
2,951,508 UART: [art] PUB.Y = AEA6ADE33E5C2E5F17F0DF89A1EC0F90CD5288A39351F630BE180F65F7A680E4221585FB518CCD68AC6C6B03E1377663
2,958,461 UART: [art] SIG.R = A3C391983385ECFCAA5C947F4545B34E6CE6060152D65F666B1B1316026902D59E7033805CD2307C8245609C38100E25
2,965,204 UART: [art] SIG.S = 1B35B93965CF7D8757537A5B5513F976F0E66E2B02347BE704F96401DE764E0A81AC0F48CFF0CA94DD2729B2F2272010
2,989,322 UART: Caliptra RT
2,989,667 UART: [state] CFI Enabled
3,097,850 UART: [rt] RT listening for mailbox commands...
3,098,520 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,342 UART: [rt]cmd =0x44504543, len=136
3,192,738 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,125 UART:
192,500 UART: Running Caliptra ROM ...
193,601 UART:
193,745 UART: [state] CFI Enabled
263,719 UART: [state] LifecycleState = Unprovisioned
265,716 UART: [state] DebugLocked = No
268,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,957 UART: [kat] SHA2-256
442,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,229 UART: [kat] ++
453,676 UART: [kat] sha1
464,287 UART: [kat] SHA2-256
467,009 UART: [kat] SHA2-384
473,085 UART: [kat] SHA2-512-ACC
475,459 UART: [kat] ECC-384
2,766,857 UART: [kat] HMAC-384Kdf
2,798,129 UART: [kat] LMS
3,988,475 UART: [kat] --
3,994,621 UART: [cold-reset] ++
3,996,063 UART: [fht] Storing FHT @ 0x50003400
4,007,979 UART: [idev] ++
4,008,548 UART: [idev] CDI.KEYID = 6
4,009,463 UART: [idev] SUBJECT.KEYID = 7
4,010,713 UART: [idev] UDS.KEYID = 0
4,011,692 ready_for_fw is high
4,011,883 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,967 UART: [idev] Erasing UDS.KEYID = 0
7,345,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,654 UART: [idev] --
7,371,679 UART: [ldev] ++
7,372,252 UART: [ldev] CDI.KEYID = 6
7,373,219 UART: [ldev] SUBJECT.KEYID = 5
7,374,437 UART: [ldev] AUTHORITY.KEYID = 7
7,375,671 UART: [ldev] FE.KEYID = 1
7,420,940 UART: [ldev] Erasing FE.KEYID = 1
10,754,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,364 UART: [ldev] --
13,135,925 UART: [fwproc] Waiting for Commands...
13,137,910 UART: [fwproc] Received command 0x46574c44
13,140,179 UART: [fwproc] Received Image of size 113760 bytes
17,189,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,489 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,337,389 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,653,266 >>> mbox cmd response: success
17,657,036 UART: [afmc] ++
17,657,638 UART: [afmc] CDI.KEYID = 6
17,658,583 UART: [afmc] SUBJECT.KEYID = 7
17,659,743 UART: [afmc] AUTHORITY.KEYID = 5
21,031,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,029 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,444 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,274 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,726 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,377 UART: [afmc] --
23,401,054 UART: [cold-reset] --
23,405,089 UART: [state] Locking Datavault
23,409,958 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,718 UART: [state] Locking ICCM
23,414,410 UART: [exit] Launching FMC @ 0x40000130
23,422,808 UART:
23,423,041 UART: Running Caliptra FMC ...
23,424,145 UART:
23,424,307 UART: [state] CFI Enabled
23,489,163 UART: [fht] FMC Alias Private Key: 7
25,827,864 UART: [art] Extend RT PCRs Done
25,829,082 UART: [art] Lock RT PCRs Done
25,831,111 UART: [art] Populate DV Done
25,836,461 UART: [fht] FMC Alias Private Key: 7
25,837,994 UART: [art] Derive CDI
25,838,731 UART: [art] Store in in slot 0x4
25,898,273 UART: [art] Derive Key Pair
25,899,312 UART: [art] Store priv key in slot 0x5
29,192,046 UART: [art] Derive Key Pair - Done
29,204,996 UART: [art] Signing Cert with AUTHO
29,206,303 UART: RITY.KEYID = 7
31,493,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,998 UART: [art] PUB.X = FDD7FF1FC879D2DDB2392123D7143ED32B0977BC2684D023265C51EEA6DD2FB7BC7AB2AC48748F309D22F0CDA1C4E60A
31,502,294 UART: [art] PUB.Y = BA5109785746DCC21EE937D7A79C6914D17DE7A140CEA61207A4C649F3FB9E5052E7CF7CDEDD8DAE20793B20E1FA7817
31,509,531 UART: [art] SIG.R = 792BE0D599D7535152A1B10AAD8C2AC38F2B2CB43A61E1801B3E1BEEFBB0EADC78BCC9E2F29BDA4865421194ED961D14
31,516,921 UART: [art] SIG.S = A2D47D4228D88C6660ACEAD28006343105389947F06873139E27B7EC6F3D5E845B454150E44CE0E90BDA8E2D113ADDCF
32,822,563 UART: Caliptra RT
32,823,274 UART: [state] CFI Enabled
32,981,933 UART: [rt] RT listening for mailbox commands...
32,984,346 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,015,305 UART: [rt]cmd =0x44504543, len=92
41,069,648 >>> mbox cmd response data (6284 bytes)
41,098,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,128,641 UART: [rt]cmd =0x43455252, len=4
41,140,192 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,783,224 ready_for_fw is high
3,783,600 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,868,874 >>> mbox cmd response: success
23,567,832 UART:
23,568,228 UART: Running Caliptra FMC ...
23,569,342 UART:
23,569,497 UART: [state] CFI Enabled
23,636,810 UART: [fht] FMC Alias Private Key: 7
25,974,494 UART: [art] Extend RT PCRs Done
25,975,710 UART: [art] Lock RT PCRs Done
25,977,366 UART: [art] Populate DV Done
25,982,876 UART: [fht] FMC Alias Private Key: 7
25,984,564 UART: [art] Derive CDI
25,985,328 UART: [art] Store in in slot 0x4
26,045,242 UART: [art] Derive Key Pair
26,046,242 UART: [art] Store priv key in slot 0x5
29,339,679 UART: [art] Derive Key Pair - Done
29,352,404 UART: [art] Signing Cert with AUTHO
29,353,740 UART: RITY.KEYID = 7
31,640,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,944 UART: [art] PUB.X = 52845AFC181D04397748CB6CC62DBD976CF16910714F0B3E68D5DDCFD4ACD27B65159113F7D6CBAF2CACADB5D5D75109
31,649,207 UART: [art] PUB.Y = 8AFCE7A948E687097A63A2D40D61A805D210F6FC07466BF19498D6300CF6ECB35C46DEA6A3D22CF93306DF3709719995
31,656,460 UART: [art] SIG.R = 815FB2FF46392448DA350266DC06533A5A5BC064F650068CE7812EC4EB44F2A9DB99FD8720E8A94A3980F5837643DADE
31,663,851 UART: [art] SIG.S = 6A7DAAA8F2C9DD15BC6738B015E574B25BB85A562ECC05310738F2C2A7ADEC89704890694D783106F6AF834BE16B0D72
32,969,103 UART: Caliptra RT
32,969,817 UART: [state] CFI Enabled
33,131,067 UART: [rt] RT listening for mailbox commands...
33,133,472 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,164,563 UART: [rt]cmd =0x44504543, len=92
41,227,644 >>> mbox cmd response data (6284 bytes)
41,256,921 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,286,745 UART: [rt]cmd =0x43455252, len=4
41,298,039 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
192,954 UART:
193,320 UART: Running Caliptra ROM ...
194,514 UART:
604,149 UART: [state] CFI Enabled
615,822 UART: [state] LifecycleState = Unprovisioned
617,787 UART: [state] DebugLocked = No
619,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,164 UART: [kat] SHA2-256
794,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,410 UART: [kat] ++
805,884 UART: [kat] sha1
816,330 UART: [kat] SHA2-256
819,048 UART: [kat] SHA2-384
825,248 UART: [kat] SHA2-512-ACC
827,556 UART: [kat] ECC-384
3,111,411 UART: [kat] HMAC-384Kdf
3,122,375 UART: [kat] LMS
4,312,482 UART: [kat] --
4,316,637 UART: [cold-reset] ++
4,318,718 UART: [fht] Storing FHT @ 0x50003400
4,329,770 UART: [idev] ++
4,330,330 UART: [idev] CDI.KEYID = 6
4,331,302 UART: [idev] SUBJECT.KEYID = 7
4,332,547 UART: [idev] UDS.KEYID = 0
4,333,517 ready_for_fw is high
4,333,710 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,617 UART: [idev] Erasing UDS.KEYID = 0
7,617,565 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,559 UART: [idev] --
7,644,180 UART: [ldev] ++
7,644,785 UART: [ldev] CDI.KEYID = 6
7,645,855 UART: [ldev] SUBJECT.KEYID = 5
7,646,960 UART: [ldev] AUTHORITY.KEYID = 7
7,648,188 UART: [ldev] FE.KEYID = 1
7,657,106 UART: [ldev] Erasing FE.KEYID = 1
10,949,221 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,536 UART: [ldev] --
13,313,744 UART: [fwproc] Waiting for Commands...
13,315,785 UART: [fwproc] Received command 0x46574c44
13,318,012 UART: [fwproc] Received Image of size 113760 bytes
17,363,954 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,271 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,822 >>> mbox cmd response: success
17,834,886 UART: [afmc] ++
17,835,482 UART: [afmc] CDI.KEYID = 6
17,836,362 UART: [afmc] SUBJECT.KEYID = 7
17,837,629 UART: [afmc] AUTHORITY.KEYID = 5
21,155,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,583 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,990 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,830 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,305 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,874 UART: [afmc] --
23,521,007 UART: [cold-reset] --
23,524,765 UART: [state] Locking Datavault
23,529,902 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,680 UART: [state] Locking ICCM
23,534,424 UART: [exit] Launching FMC @ 0x40000130
23,542,826 UART:
23,543,059 UART: Running Caliptra FMC ...
23,544,164 UART:
23,544,317 UART: [state] CFI Enabled
23,552,577 UART: [fht] FMC Alias Private Key: 7
25,883,718 UART: [art] Extend RT PCRs Done
25,884,945 UART: [art] Lock RT PCRs Done
25,886,700 UART: [art] Populate DV Done
25,892,115 UART: [fht] FMC Alias Private Key: 7
25,893,702 UART: [art] Derive CDI
25,894,510 UART: [art] Store in in slot 0x4
25,937,209 UART: [art] Derive Key Pair
25,938,204 UART: [art] Store priv key in slot 0x5
29,179,922 UART: [art] Derive Key Pair - Done
29,192,954 UART: [art] Signing Cert with AUTHO
29,194,263 UART: RITY.KEYID = 7
31,474,152 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,659 UART: [art] PUB.X = 31E0F6DD9E8DAC982AEF1352DF30C462AB822A7B4820D99753374483A97BBF5192413C022C388F2813EB2B26587E2174
31,482,895 UART: [art] PUB.Y = 4412FF96D8F50835BB304608D8AC814231735F2E6B085E739ACAA3F2620A67B153E61F9C1358A9394A0603EFB37BF70B
31,490,107 UART: [art] SIG.R = 218E7F4965DE232ABD15E474DC0D9DE278E5106C71D95A6041F06B8C6637FDDBFE49234616F26C5DFCB6D2505F09952B
31,497,477 UART: [art] SIG.S = 33E76D52D29E5FADC9D7F8C6A9E6FD66C7F5D8B0CD160B16D1E69F87B7E42A897CEEA26D109355F689B0455676DF8354
32,802,531 UART: Caliptra RT
32,803,232 UART: [state] CFI Enabled
32,921,858 UART: [rt] RT listening for mailbox commands...
32,924,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,954,998 UART: [rt]cmd =0x44504543, len=92
40,927,021 >>> mbox cmd response data (6284 bytes)
40,956,329 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
40,986,138 UART: [rt]cmd =0x43455252, len=4
40,997,392 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
4,130,120 ready_for_fw is high
4,130,641 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,839 >>> mbox cmd response: success
23,713,278 UART:
23,713,692 UART: Running Caliptra FMC ...
23,714,823 UART:
23,714,978 UART: [state] CFI Enabled
23,722,616 UART: [fht] FMC Alias Private Key: 7
26,053,217 UART: [art] Extend RT PCRs Done
26,054,450 UART: [art] Lock RT PCRs Done
26,056,023 UART: [art] Populate DV Done
26,061,498 UART: [fht] FMC Alias Private Key: 7
26,063,041 UART: [art] Derive CDI
26,063,863 UART: [art] Store in in slot 0x4
26,106,745 UART: [art] Derive Key Pair
26,107,796 UART: [art] Store priv key in slot 0x5
29,349,252 UART: [art] Derive Key Pair - Done
29,362,092 UART: [art] Signing Cert with AUTHO
29,363,396 UART: RITY.KEYID = 7
31,642,837 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,348 UART: [art] PUB.X = 96EA8327C5842E3A8341C224542D4B90D093A88DF42E4CAFF7F3DC99ADEC16AAB765A7622715D4B180D951ED2C968FB8
31,651,562 UART: [art] PUB.Y = 39543ADF7F62DC84F9482512D9C02F4AB2A9D5844AA89961D059A98D802092242BF638DEB7A6C75886AC94C27062871B
31,658,791 UART: [art] SIG.R = AC99A60005341345CEFD42357073FBB3128814DBD7E07853335E298CB4CC84E558CD8268DCBF44F0405DD5DC28A9EC69
31,666,242 UART: [art] SIG.S = 67CC9DDFDFE9CF1C59EAD10599016E8EA7BBA1645459C4E2F68B10BF8C4E52FCD419791DE27213C994A81F50376A7338
32,971,473 UART: Caliptra RT
32,972,187 UART: [state] CFI Enabled
33,089,358 UART: [rt] RT listening for mailbox commands...
33,091,746 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,122,440 UART: [rt]cmd =0x44504543, len=92
41,094,601 >>> mbox cmd response data (6284 bytes)
41,124,046 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,154,027 UART: [rt]cmd =0x43455252, len=4
41,165,402 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
192,530 UART:
192,905 UART: Running Caliptra ROM ...
194,106 UART:
194,258 UART: [state] CFI Enabled
262,980 UART: [state] LifecycleState = Unprovisioned
264,849 UART: [state] DebugLocked = No
267,165 UART: [state] WD Timer not started. Device not locked for debugging
270,556 UART: [kat] SHA2-256
449,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,259 UART: [kat] ++
461,793 UART: [kat] sha1
473,666 UART: [kat] SHA2-256
476,741 UART: [kat] SHA2-384
481,803 UART: [kat] SHA2-512-ACC
484,802 UART: [kat] ECC-384
2,949,771 UART: [kat] HMAC-384Kdf
2,971,470 UART: [kat] LMS
3,500,926 UART: [kat] --
3,506,074 UART: [cold-reset] ++
3,507,861 UART: [fht] FHT @ 0x50003400
3,519,492 UART: [idev] ++
3,520,052 UART: [idev] CDI.KEYID = 6
3,520,939 UART: [idev] SUBJECT.KEYID = 7
3,522,181 UART: [idev] UDS.KEYID = 0
3,523,103 ready_for_fw is high
3,523,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,819 UART: [idev] Erasing UDS.KEYID = 0
6,027,990 UART: [idev] Sha1 KeyId Algorithm
6,051,391 UART: [idev] --
6,056,465 UART: [ldev] ++
6,057,028 UART: [ldev] CDI.KEYID = 6
6,057,910 UART: [ldev] SUBJECT.KEYID = 5
6,059,118 UART: [ldev] AUTHORITY.KEYID = 7
6,060,345 UART: [ldev] FE.KEYID = 1
6,100,645 UART: [ldev] Erasing FE.KEYID = 1
8,602,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,858 UART: [ldev] --
10,412,129 UART: [fwproc] Wait for Commands...
10,414,758 UART: [fwproc] Recv command 0x46574c44
10,416,861 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,774 >>> mbox cmd response: success
14,285,553 UART: [afmc] ++
14,286,199 UART: [afmc] CDI.KEYID = 6
14,287,089 UART: [afmc] SUBJECT.KEYID = 7
14,288,188 UART: [afmc] AUTHORITY.KEYID = 5
16,828,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,235 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,037 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,363 UART: [afmc] --
18,628,788 UART: [cold-reset] --
18,631,944 UART: [state] Locking Datavault
18,637,939 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,579 UART: [state] Locking ICCM
18,641,887 UART: [exit] Launching FMC @ 0x40000130
18,650,290 UART:
18,650,567 UART: Running Caliptra FMC ...
18,651,673 UART:
18,651,827 UART: [state] CFI Enabled
18,708,519 UART: [fht] FMC Alias Private Key: 7
20,472,832 UART: [art] Extend RT PCRs Done
20,474,050 UART: [art] Lock RT PCRs Done
20,475,947 UART: [art] Populate DV Done
20,481,404 UART: [fht] FMC Alias Private Key: 7
20,482,877 UART: [art] Derive CDI
20,483,637 UART: [art] Store in in slot 0x4
20,540,614 UART: [art] Derive Key Pair
20,541,651 UART: [art] Store priv key in slot 0x5
23,004,356 UART: [art] Derive Key Pair - Done
23,017,061 UART: [art] Signing Cert with AUTHO
23,018,376 UART: RITY.KEYID = 7
24,730,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,531 UART: [art] PUB.X = AFCCD063AE004A49DDB1603FE3D71D8C0B68EDDEAA2A3E6C7B03C0E14BB9356A5F6E6F6EFF170CA7BD4309C812C5666A
24,738,844 UART: [art] PUB.Y = F520A3052E1A5B2C9650C8D033EECAD79B80B7D26A710A95C0C5147BA8CA8B8D2A3AB6453E3155805D4AC7D16D8E3FD2
24,746,111 UART: [art] SIG.R = 7D51287E295A0EA78E2C05125683A9EEC73D84B6BA379FFF0EB038BD45A67D4F4D4053E9FEFB6F380A6411AF8CD9F943
24,753,539 UART: [art] SIG.S = 7D4C87A428109C9BC620BDA8DF3234CD41EC5AC7C9E6E449EF17D2FDA9FBB85C43834DFCF6E1470454B7308A5380AF9E
25,732,111 UART: Caliptra RT
25,732,809 UART: [state] CFI Enabled
25,898,315 UART: [rt] RT listening for mailbox commands...
25,900,607 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,931,701 UART: [rt]cmd =0x44504543, len=92
32,001,609 >>> mbox cmd response data (6284 bytes)
32,031,109 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,060,874 UART: [rt]cmd =0x43455252, len=4
32,072,520 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,362,836 ready_for_fw is high
3,363,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,011,891 >>> mbox cmd response: success
18,302,682 UART:
18,303,093 UART: Running Caliptra FMC ...
18,304,231 UART:
18,304,393 UART: [state] CFI Enabled
18,366,988 UART: [fht] FMC Alias Private Key: 7
20,131,071 UART: [art] Extend RT PCRs Done
20,132,299 UART: [art] Lock RT PCRs Done
20,134,193 UART: [art] Populate DV Done
20,139,767 UART: [fht] FMC Alias Private Key: 7
20,141,302 UART: [art] Derive CDI
20,142,113 UART: [art] Store in in slot 0x4
20,199,753 UART: [art] Derive Key Pair
20,200,794 UART: [art] Store priv key in slot 0x5
22,663,562 UART: [art] Derive Key Pair - Done
22,676,724 UART: [art] Signing Cert with AUTHO
22,678,031 UART: RITY.KEYID = 7
24,389,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,390,697 UART: [art] PUB.X = 9995AA2279B958A0888B186F742255C14D82D2D5D779DD0CFF914EBCFD71B42F83931EA8A2B7E89DE909A5EBBBA5B84B
24,397,931 UART: [art] PUB.Y = AD2164287834F10F1991460E77028FD84EB1956BE862BEC51C462B83CE1FFDCD545628A8311D0056975D5D3C53FB9A91
24,405,208 UART: [art] SIG.R = 1A8A070C12D585675A9AB4BF09B7A80406EF6F23B8AB0A3E015AF378D26F4D794929C43E1C637BD501D0F2CEFEACB577
24,412,733 UART: [art] SIG.S = F30A09FA95C315969FD8FAC24AC603491AB3938C784690EA2108A7859BB49D45AC3F184634435F54CBA87DA9543B11C8
25,391,743 UART: Caliptra RT
25,392,441 UART: [state] CFI Enabled
25,556,861 UART: [rt] RT listening for mailbox commands...
25,559,201 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,590,452 UART: [rt]cmd =0x44504543, len=92
31,663,280 >>> mbox cmd response data (6284 bytes)
31,692,939 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,722,648 UART: [rt]cmd =0x43455252, len=4
31,734,295 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,927 writing to cptra_bootfsm_go
194,023 UART:
194,399 UART: Running Caliptra ROM ...
195,584 UART:
605,110 UART: [state] CFI Enabled
619,264 UART: [state] LifecycleState = Unprovisioned
621,148 UART: [state] DebugLocked = No
623,594 UART: [state] WD Timer not started. Device not locked for debugging
627,552 UART: [kat] SHA2-256
806,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,235 UART: [kat] ++
818,682 UART: [kat] sha1
829,550 UART: [kat] SHA2-256
832,552 UART: [kat] SHA2-384
837,409 UART: [kat] SHA2-512-ACC
840,354 UART: [kat] ECC-384
3,281,070 UART: [kat] HMAC-384Kdf
3,294,229 UART: [kat] LMS
3,823,733 UART: [kat] --
3,827,732 UART: [cold-reset] ++
3,830,165 UART: [fht] FHT @ 0x50003400
3,840,153 UART: [idev] ++
3,840,943 UART: [idev] CDI.KEYID = 6
3,841,863 UART: [idev] SUBJECT.KEYID = 7
3,842,909 UART: [idev] UDS.KEYID = 0
3,843,822 ready_for_fw is high
3,844,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,153 UART: [idev] Erasing UDS.KEYID = 0
6,316,265 UART: [idev] Sha1 KeyId Algorithm
6,338,134 UART: [idev] --
6,340,594 UART: [ldev] ++
6,341,182 UART: [ldev] CDI.KEYID = 6
6,342,094 UART: [ldev] SUBJECT.KEYID = 5
6,343,256 UART: [ldev] AUTHORITY.KEYID = 7
6,344,545 UART: [ldev] FE.KEYID = 1
6,353,737 UART: [ldev] Erasing FE.KEYID = 1
8,828,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,081 UART: [ldev] --
10,617,699 UART: [fwproc] Wait for Commands...
10,620,119 UART: [fwproc] Recv command 0x46574c44
10,622,156 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,476,698 >>> mbox cmd response: success
14,480,969 UART: [afmc] ++
14,481,594 UART: [afmc] CDI.KEYID = 6
14,482,522 UART: [afmc] SUBJECT.KEYID = 7
14,483,632 UART: [afmc] AUTHORITY.KEYID = 5
16,982,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,133 UART: [afmc] --
18,778,158 UART: [cold-reset] --
18,780,774 UART: [state] Locking Datavault
18,784,722 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,367 UART: [state] Locking ICCM
18,789,084 UART: [exit] Launching FMC @ 0x40000130
18,797,539 UART:
18,797,779 UART: Running Caliptra FMC ...
18,798,886 UART:
18,799,045 UART: [state] CFI Enabled
18,807,266 UART: [fht] FMC Alias Private Key: 7
20,564,606 UART: [art] Extend RT PCRs Done
20,565,829 UART: [art] Lock RT PCRs Done
20,567,670 UART: [art] Populate DV Done
20,573,084 UART: [fht] FMC Alias Private Key: 7
20,574,800 UART: [art] Derive CDI
20,575,620 UART: [art] Store in in slot 0x4
20,618,265 UART: [art] Derive Key Pair
20,619,268 UART: [art] Store priv key in slot 0x5
23,046,066 UART: [art] Derive Key Pair - Done
23,059,119 UART: [art] Signing Cert with AUTHO
23,060,427 UART: RITY.KEYID = 7
24,765,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,144 UART: [art] PUB.X = 9297F9642179211FE2CB254A22B4DF5EABCD87AC28C770BD540297B8FDE719151C9AC1A80ED6B1F00D529944273AFFAE
24,774,363 UART: [art] PUB.Y = 070DB79DE65651B71A89F7F70875FA097E70CB1D03B737787FC91747003144254D81A5827F2D24721121B3B66D27A6DC
24,781,626 UART: [art] SIG.R = 12D83E03E9A34FDEB17DC562EE8DED786D695C52FFD5614741C368F2E6868EA144211EC4E6F602ABC91FB7F0B5E1C118
24,788,997 UART: [art] SIG.S = 0F3E6585F85317C03AACB550B8D902C4C4D122DB9BF14A01690AB2D62F7958408C5FC5B2CC23AD0AC7793164D5E5DB38
25,767,209 UART: Caliptra RT
25,767,921 UART: [state] CFI Enabled
25,886,176 UART: [rt] RT listening for mailbox commands...
25,888,556 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,919,197 UART: [rt]cmd =0x44504543, len=92
31,927,946 >>> mbox cmd response data (6284 bytes)
31,957,248 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,987,101 UART: [rt]cmd =0x43455252, len=4
31,998,673 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,857 writing to cptra_bootfsm_go
3,697,011 ready_for_fw is high
3,697,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,284,410 >>> mbox cmd response: success
18,539,891 UART:
18,540,292 UART: Running Caliptra FMC ...
18,541,398 UART:
18,541,551 UART: [state] CFI Enabled
18,549,231 UART: [fht] FMC Alias Private Key: 7
20,306,709 UART: [art] Extend RT PCRs Done
20,307,937 UART: [art] Lock RT PCRs Done
20,309,647 UART: [art] Populate DV Done
20,315,275 UART: [fht] FMC Alias Private Key: 7
20,316,952 UART: [art] Derive CDI
20,317,697 UART: [art] Store in in slot 0x4
20,360,523 UART: [art] Derive Key Pair
20,361,566 UART: [art] Store priv key in slot 0x5
22,788,610 UART: [art] Derive Key Pair - Done
22,801,285 UART: [art] Signing Cert with AUTHO
22,802,586 UART: RITY.KEYID = 7
24,508,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,823 UART: [art] PUB.X = 579053AC98468A04B32E061539277034BB13871EF260261620D647A7BCA9F978CB8E4EC700AE37C81EA608C41E477452
24,517,043 UART: [art] PUB.Y = CFE56F9FA0AA9370B54879198F50B94DF998BCC28EA49432D974DA4E407EDC0E8654C3CE9BC53A9ACBC07E345D602B1C
24,524,322 UART: [art] SIG.R = 6274E9B260E8D5F189B1B8C7DD522F257C617DAC3C1631A1F652010FF034892E85F62DB2D2045F40622108CC082D17ED
24,531,697 UART: [art] SIG.S = F94FE3F957B0DEC1CA88B3F2D6EB0AEB9B7972990A1B5370653613E0F73E488F1AFA5B8F9547AB57E5887BB631B22D68
25,511,148 UART: Caliptra RT
25,511,850 UART: [state] CFI Enabled
25,628,918 UART: [rt] RT listening for mailbox commands...
25,631,303 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,662,310 UART: [rt]cmd =0x44504543, len=92
31,671,351 >>> mbox cmd response data (6284 bytes)
31,700,986 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,730,976 UART: [rt]cmd =0x43455252, len=4
31,742,398 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,448 UART:
192,835 UART: Running Caliptra ROM ...
194,048 UART:
194,205 UART: [state] CFI Enabled
261,362 UART: [state] LifecycleState = Unprovisioned
263,751 UART: [state] DebugLocked = No
265,929 UART: [state] WD Timer not started. Device not locked for debugging
270,764 UART: [kat] SHA2-256
460,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,384 UART: [kat] ++
471,855 UART: [kat] sha1
483,439 UART: [kat] SHA2-256
486,450 UART: [kat] SHA2-384
492,293 UART: [kat] SHA2-512-ACC
494,871 UART: [kat] ECC-384
2,948,292 UART: [kat] HMAC-384Kdf
2,973,125 UART: [kat] LMS
3,504,899 UART: [kat] --
3,510,202 UART: [cold-reset] ++
3,511,491 UART: [fht] FHT @ 0x50003400
3,523,315 UART: [idev] ++
3,524,019 UART: [idev] CDI.KEYID = 6
3,524,930 UART: [idev] SUBJECT.KEYID = 7
3,526,171 UART: [idev] UDS.KEYID = 0
3,527,092 ready_for_fw is high
3,527,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,869 UART: [idev] Erasing UDS.KEYID = 0
6,031,148 UART: [idev] Sha1 KeyId Algorithm
6,052,813 UART: [idev] --
6,057,510 UART: [ldev] ++
6,058,193 UART: [ldev] CDI.KEYID = 6
6,059,123 UART: [ldev] SUBJECT.KEYID = 5
6,060,331 UART: [ldev] AUTHORITY.KEYID = 7
6,061,505 UART: [ldev] FE.KEYID = 1
6,102,627 UART: [ldev] Erasing FE.KEYID = 1
8,607,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,315 UART: [ldev] --
10,416,599 UART: [fwproc] Wait for Commands...
10,418,743 UART: [fwproc] Recv command 0x46574c44
10,421,046 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,522 >>> mbox cmd response: success
14,604,141 UART: [afmc] ++
14,604,853 UART: [afmc] CDI.KEYID = 6
14,606,056 UART: [afmc] SUBJECT.KEYID = 7
14,607,501 UART: [afmc] AUTHORITY.KEYID = 5
17,157,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,063 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,407 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,491 UART: [afmc] --
18,968,981 UART: [cold-reset] --
18,972,850 UART: [state] Locking Datavault
18,976,758 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,911 UART: [state] Locking ICCM
18,981,768 UART: [exit] Launching FMC @ 0x40000130
18,990,393 UART:
18,990,636 UART: Running Caliptra FMC ...
18,991,690 UART:
18,991,840 UART: [state] CFI Enabled
19,055,233 UART: [fht] FMC Alias Private Key: 7
20,819,790 UART: [art] Extend RT PCRs Done
20,821,027 UART: [art] Lock RT PCRs Done
20,822,823 UART: [art] Populate DV Done
20,828,326 UART: [fht] FMC Alias Private Key: 7
20,829,989 UART: [art] Derive CDI
20,830,801 UART: [art] Store in in slot 0x4
20,888,324 UART: [art] Derive Key Pair
20,889,321 UART: [art] Store priv key in slot 0x5
23,352,013 UART: [art] Derive Key Pair - Done
23,364,850 UART: [art] Signing Cert with AUTHO
23,366,151 UART: RITY.KEYID = 7
25,077,789 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,294 UART: [art] PUB.X = 5940ECD06E16517C2C1618C93CB4EB93A797F6A5DC0250447E085E7F135E98C81DD1B928917222AF78E889C5B71A1241
25,086,588 UART: [art] PUB.Y = 59BFDE82DD40811152F83ECF011A949916FCE2B4BAB9C6C784A31F9A6FFD64C788C90FAD2065725C856C9BE4D1CCC192
25,093,841 UART: [art] SIG.R = 24DFC9624E4593FDDE3EBB57E13110695EBDE9601AA886B802E9A00E9793E9F44B485C58A348DBF349EC9E2269308CD3
25,101,255 UART: [art] SIG.S = 04CDC4FA7FB928A589C14F3EA0B823EB0F76FB5778DE46DDAE80C2928D86E589D1B5749D2574A0250DD6E3477D0B1675
26,080,981 UART: Caliptra RT
26,081,695 UART: [state] CFI Enabled
26,246,218 UART: [rt] RT listening for mailbox commands...
26,248,593 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,279,786 UART: [rt]cmd =0x44504543, len=92
32,350,377 >>> mbox cmd response data (6284 bytes)
32,379,642 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,409,392 UART: [rt]cmd =0x43455252, len=4
32,420,867 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,440,874 ready_for_fw is high
3,441,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,713 >>> mbox cmd response: success
19,023,592 UART:
19,024,001 UART: Running Caliptra FMC ...
19,025,199 UART:
19,025,389 UART: [state] CFI Enabled
19,092,983 UART: [fht] FMC Alias Private Key: 7
20,856,429 UART: [art] Extend RT PCRs Done
20,857,662 UART: [art] Lock RT PCRs Done
20,859,298 UART: [art] Populate DV Done
20,864,716 UART: [fht] FMC Alias Private Key: 7
20,866,307 UART: [art] Derive CDI
20,867,069 UART: [art] Store in in slot 0x4
20,925,519 UART: [art] Derive Key Pair
20,926,558 UART: [art] Store priv key in slot 0x5
23,389,774 UART: [art] Derive Key Pair - Done
23,402,941 UART: [art] Signing Cert with AUTHO
23,404,280 UART: RITY.KEYID = 7
25,115,306 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,801 UART: [art] PUB.X = 7E50B5555A7C453285E0641E4EBC8F4C60D41D2A31970C900E61485545D8C61EFD54982798DE8B8ACEA836B6592C233D
25,124,033 UART: [art] PUB.Y = 1FD61E792405E81E98F64A2C249073AAA7CA525C6A4BADFF0239D30486BE3F1073FCE08C263C4A184BE0ADD559BA1E64
25,131,315 UART: [art] SIG.R = 6C8C639A861342A8EFE6E60B5103BEA87FFC23A4CEDA0DFCF0426B66A5BDC874C0B9AF628AF3A0C1D13A38F2E1D46701
25,138,771 UART: [art] SIG.S = EA5452389E248BFC548AD93F5AAA597F7197854D5F0B267C489C64E0C723F7551CFF03B0A4A17043B21BA05619017534
26,118,100 UART: Caliptra RT
26,118,805 UART: [state] CFI Enabled
26,283,926 UART: [rt] RT listening for mailbox commands...
26,286,247 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,317,313 UART: [rt]cmd =0x44504543, len=92
32,387,490 >>> mbox cmd response data (6284 bytes)
32,416,757 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,446,682 UART: [rt]cmd =0x43455252, len=4
32,458,257 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
192,949 UART:
193,334 UART: Running Caliptra ROM ...
194,533 UART:
603,959 UART: [state] CFI Enabled
618,637 UART: [state] LifecycleState = Unprovisioned
621,029 UART: [state] DebugLocked = No
623,633 UART: [state] WD Timer not started. Device not locked for debugging
627,964 UART: [kat] SHA2-256
817,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,612 UART: [kat] ++
829,217 UART: [kat] sha1
840,069 UART: [kat] SHA2-256
843,049 UART: [kat] SHA2-384
849,199 UART: [kat] SHA2-512-ACC
851,783 UART: [kat] ECC-384
3,290,901 UART: [kat] HMAC-384Kdf
3,305,333 UART: [kat] LMS
3,837,146 UART: [kat] --
3,843,200 UART: [cold-reset] ++
3,844,353 UART: [fht] FHT @ 0x50003400
3,854,642 UART: [idev] ++
3,855,273 UART: [idev] CDI.KEYID = 6
3,856,227 UART: [idev] SUBJECT.KEYID = 7
3,857,470 UART: [idev] UDS.KEYID = 0
3,858,366 ready_for_fw is high
3,858,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,839 UART: [idev] Erasing UDS.KEYID = 0
6,334,887 UART: [idev] Sha1 KeyId Algorithm
6,357,700 UART: [idev] --
6,361,657 UART: [ldev] ++
6,362,343 UART: [ldev] CDI.KEYID = 6
6,363,226 UART: [ldev] SUBJECT.KEYID = 5
6,364,435 UART: [ldev] AUTHORITY.KEYID = 7
6,365,665 UART: [ldev] FE.KEYID = 1
6,376,430 UART: [ldev] Erasing FE.KEYID = 1
8,851,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,556 UART: [ldev] --
10,640,231 UART: [fwproc] Wait for Commands...
10,643,410 UART: [fwproc] Recv command 0x46574c44
10,645,743 UART: [fwproc] Recv'd Img size: 114084 bytes
14,083,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,273,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,815,014 >>> mbox cmd response: success
14,819,046 UART: [afmc] ++
14,819,754 UART: [afmc] CDI.KEYID = 6
14,820,950 UART: [afmc] SUBJECT.KEYID = 7
14,822,388 UART: [afmc] AUTHORITY.KEYID = 5
17,329,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,050,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,052,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,067,539 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,082,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,097,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,120,313 UART: [afmc] --
19,123,550 UART: [cold-reset] --
19,128,934 UART: [state] Locking Datavault
19,134,031 UART: [state] Locking PCR0, PCR1 and PCR31
19,136,240 UART: [state] Locking ICCM
19,137,908 UART: [exit] Launching FMC @ 0x40000130
19,146,586 UART:
19,146,821 UART: Running Caliptra FMC ...
19,147,925 UART:
19,148,080 UART: [state] CFI Enabled
19,156,468 UART: [fht] FMC Alias Private Key: 7
20,913,867 UART: [art] Extend RT PCRs Done
20,915,090 UART: [art] Lock RT PCRs Done
20,916,664 UART: [art] Populate DV Done
20,921,858 UART: [fht] FMC Alias Private Key: 7
20,923,505 UART: [art] Derive CDI
20,924,321 UART: [art] Store in in slot 0x4
20,967,040 UART: [art] Derive Key Pair
20,968,048 UART: [art] Store priv key in slot 0x5
23,394,837 UART: [art] Derive Key Pair - Done
23,407,943 UART: [art] Signing Cert with AUTHO
23,409,246 UART: RITY.KEYID = 7
25,114,778 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,272 UART: [art] PUB.X = 08F9FDFDEE876D4F73D8CE7F2CC3E882F2418E894C215DEC048D278CAA665EF8B5A05B57DE520857D2475962DD077989
25,123,595 UART: [art] PUB.Y = 3DE6D027283A4161DE9F017F3B4A5203D84F29CAF3697F9D76D655683F12171876236DBEA6DAD44EB7F6F8D41578563D
25,130,805 UART: [art] SIG.R = 340BCA47CC0FD95DFA16A8FAAFB22F4C6C4C8304E6E6EE99597DAA089B885591195FE7E4A9370F6B80060BE81BEB6CF5
25,138,223 UART: [art] SIG.S = DA16DA0B16D46F77594913A0E363205B480DE3406DD8863C52DE0804E5651DAC3873F67681F2DBD803ED54536D631469
26,116,853 UART: Caliptra RT
26,117,563 UART: [state] CFI Enabled
26,234,030 UART: [rt] RT listening for mailbox commands...
26,236,393 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,267,127 UART: [rt]cmd =0x44504543, len=92
32,275,535 >>> mbox cmd response data (6284 bytes)
32,304,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,334,677 UART: [rt]cmd =0x43455252, len=4
32,346,155 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,691 writing to cptra_bootfsm_go
3,752,696 ready_for_fw is high
3,753,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,953,198 >>> mbox cmd response: success
19,197,570 UART:
19,197,959 UART: Running Caliptra FMC ...
19,199,087 UART:
19,199,249 UART: [state] CFI Enabled
19,207,485 UART: [fht] FMC Alias Private Key: 7
20,963,433 UART: [art] Extend RT PCRs Done
20,964,655 UART: [art] Lock RT PCRs Done
20,966,143 UART: [art] Populate DV Done
20,971,724 UART: [fht] FMC Alias Private Key: 7
20,973,267 UART: [art] Derive CDI
20,974,003 UART: [art] Store in in slot 0x4
21,016,385 UART: [art] Derive Key Pair
21,017,392 UART: [art] Store priv key in slot 0x5
23,444,459 UART: [art] Derive Key Pair - Done
23,457,686 UART: [art] Signing Cert with AUTHO
23,459,002 UART: RITY.KEYID = 7
25,164,890 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,401 UART: [art] PUB.X = 9B0A00A826FA07354F0D3CC83EB15A7C547DF73B2DC9B4907681CE98321ECB767F6D69E7844FDF03BFE80E673492924D
25,173,662 UART: [art] PUB.Y = 473F9D91A3DFCF812E0924767A883D09F0740686C0448BF8CE515D6FD476A9D04A5CF876D2FD9416074541DD7251EEE5
25,180,934 UART: [art] SIG.R = 189DFEE39D234B0F34ABE3115451F1EBBA44CCEA6A53C9BBC46A1C7B1A5DB4632E91ADE87961E68CCE5131540396B9E5
25,188,335 UART: [art] SIG.S = 5031BF9050FDEB09B9CC285A588C25E74E301CDCBD222BFEE6E90492E29C034A1A7356EFFB317FA677ADACC36067968B
26,167,696 UART: Caliptra RT
26,168,411 UART: [state] CFI Enabled
26,285,259 UART: [rt] RT listening for mailbox commands...
26,287,635 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,317,993 UART: [rt]cmd =0x44504543, len=92
32,326,174 >>> mbox cmd response data (6284 bytes)
32,355,454 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,385,528 UART: [rt]cmd =0x43455252, len=4
32,397,057 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,345 UART: [kat] SHA2-256
882,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,391 UART: [kat] ++
886,543 UART: [kat] sha1
890,907 UART: [kat] SHA2-256
892,845 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
903,306 UART: [kat] HMAC-384Kdf
907,688 UART: [kat] LMS
1,475,884 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,794 UART: [idev] ++
1,479,962 UART: [idev] CDI.KEYID = 6
1,480,322 UART: [idev] SUBJECT.KEYID = 7
1,480,746 UART: [idev] UDS.KEYID = 0
1,481,091 ready_for_fw is high
1,481,091 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,466 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,012 UART: [idev] --
1,515,045 UART: [ldev] ++
1,515,213 UART: [ldev] CDI.KEYID = 6
1,515,576 UART: [ldev] SUBJECT.KEYID = 5
1,516,002 UART: [ldev] AUTHORITY.KEYID = 7
1,516,465 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,886 UART: [ldev] --
1,586,355 UART: [fwproc] Waiting for Commands...
1,587,200 UART: [fwproc] Received command 0x46574c44
1,587,991 UART: [fwproc] Received Image of size 114084 bytes
2,884,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,661 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,610 >>> mbox cmd response: success
3,078,662 UART: [afmc] ++
3,078,830 UART: [afmc] CDI.KEYID = 6
3,079,192 UART: [afmc] SUBJECT.KEYID = 7
3,079,617 UART: [afmc] AUTHORITY.KEYID = 5
3,115,090 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,334 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,727 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,417 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,316 UART: [afmc] --
3,158,246 UART: [cold-reset] --
3,159,006 UART: [state] Locking Datavault
3,160,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,815 UART: [state] Locking ICCM
3,161,437 UART: [exit] Launching FMC @ 0x40000130
3,166,766 UART:
3,166,782 UART: Running Caliptra FMC ...
3,167,190 UART:
3,167,244 UART: [state] CFI Enabled
3,177,621 UART: [fht] FMC Alias Private Key: 7
3,285,688 UART: [art] Extend RT PCRs Done
3,286,116 UART: [art] Lock RT PCRs Done
3,287,798 UART: [art] Populate DV Done
3,295,921 UART: [fht] FMC Alias Private Key: 7
3,296,993 UART: [art] Derive CDI
3,297,273 UART: [art] Store in in slot 0x4
3,382,704 UART: [art] Derive Key Pair
3,383,064 UART: [art] Store priv key in slot 0x5
3,395,776 UART: [art] Derive Key Pair - Done
3,410,342 UART: [art] Signing Cert with AUTHO
3,410,822 UART: RITY.KEYID = 7
3,426,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,783 UART: [art] PUB.X = C6312CFD714BC9F258CA799DD7578373A46ECBAE55FA1D2DBD5BEF3A80B99784B0BDA1E69493D2E617E95C87A9E9E598
3,433,571 UART: [art] PUB.Y = 8323E14E07EE8A3ECB317AAF08F63A40CAE57CE4F7508F2D10EB7CE7E39AC8373247BC58A66A1CB223B0E21B9457161C
3,440,529 UART: [art] SIG.R = 812C5D73B154669A34F9542F145C320E7910477894167C8D2EB26EC5B604791EA77E17F11E2A22AB1B6297774823AABF
3,447,287 UART: [art] SIG.S = AF4B7C15FEEB2B3F32D9DAA0538162A6A531426759C76BC853444E52AB9095D69EC5B4BED2DBAF8D9B4D3925A3C8134E
3,470,916 UART: Caliptra RT
3,471,169 UART: [state] CFI Enabled
3,578,281 UART: [rt] RT listening for mailbox commands...
3,578,951 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,149 UART: [rt]cmd =0x44504543, len=92
3,824,735 >>> mbox cmd response data (6284 bytes)
3,824,736 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,845 UART: [rt]cmd =0x43455252, len=4
3,864,594 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 ready_for_fw is high
1,362,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,328 >>> mbox cmd response: success
2,984,854 UART:
2,984,870 UART: Running Caliptra FMC ...
2,985,278 UART:
2,985,332 UART: [state] CFI Enabled
2,996,109 UART: [fht] FMC Alias Private Key: 7
3,104,542 UART: [art] Extend RT PCRs Done
3,104,970 UART: [art] Lock RT PCRs Done
3,106,390 UART: [art] Populate DV Done
3,114,679 UART: [fht] FMC Alias Private Key: 7
3,115,779 UART: [art] Derive CDI
3,116,059 UART: [art] Store in in slot 0x4
3,201,514 UART: [art] Derive Key Pair
3,201,874 UART: [art] Store priv key in slot 0x5
3,214,738 UART: [art] Derive Key Pair - Done
3,229,751 UART: [art] Signing Cert with AUTHO
3,230,231 UART: RITY.KEYID = 7
3,245,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,190 UART: [art] PUB.X = DB2D504AAF0E04D18AFFE359354FAA02D0DF57E6D2A584AC9B47AE97DF0453BAE28FDE117B1AA35CC83E991E9E97BB8B
3,252,976 UART: [art] PUB.Y = C11CCCA0F7A46EF679D7CA36FD911D084425458B16A0445BB0FA57FC0A36071278EFA81CF1A668B56770A0CE22467290
3,259,923 UART: [art] SIG.R = CE0ED5448ED14CF542A0E0083E7F436BF88080567247FE7AF609ECE0B3A2C28F8886D8F9C84BAFDCFBCBCA45E91048D3
3,266,704 UART: [art] SIG.S = F7A526C23ED73FF6AD5F6A76CCE5A59BAF1048FBCA07FA2742F4410E162A4CFAE6F0288AA8DEB29B6E0A34264B231EA5
3,290,370 UART: Caliptra RT
3,290,623 UART: [state] CFI Enabled
3,398,023 UART: [rt] RT listening for mailbox commands...
3,398,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,207 UART: [rt]cmd =0x44504543, len=92
3,645,512 >>> mbox cmd response data (6284 bytes)
3,645,513 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,744 UART: [rt]cmd =0x43455252, len=4
3,685,639 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,020 UART: [kat] SHA2-256
882,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,066 UART: [kat] ++
887,218 UART: [kat] sha1
891,274 UART: [kat] SHA2-256
893,212 UART: [kat] SHA2-384
895,991 UART: [kat] SHA2-512-ACC
897,892 UART: [kat] ECC-384
903,295 UART: [kat] HMAC-384Kdf
907,927 UART: [kat] LMS
1,476,123 UART: [kat] --
1,476,976 UART: [cold-reset] ++
1,477,456 UART: [fht] Storing FHT @ 0x50003400
1,480,327 UART: [idev] ++
1,480,495 UART: [idev] CDI.KEYID = 6
1,480,855 UART: [idev] SUBJECT.KEYID = 7
1,481,279 UART: [idev] UDS.KEYID = 0
1,481,624 ready_for_fw is high
1,481,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,559 UART: [idev] Erasing UDS.KEYID = 0
1,506,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,767 UART: [idev] --
1,515,890 UART: [ldev] ++
1,516,058 UART: [ldev] CDI.KEYID = 6
1,516,421 UART: [ldev] SUBJECT.KEYID = 5
1,516,847 UART: [ldev] AUTHORITY.KEYID = 7
1,517,310 UART: [ldev] FE.KEYID = 1
1,522,686 UART: [ldev] Erasing FE.KEYID = 1
1,548,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,185 UART: [ldev] --
1,587,514 UART: [fwproc] Waiting for Commands...
1,588,379 UART: [fwproc] Received command 0x46574c44
1,589,170 UART: [fwproc] Received Image of size 114084 bytes
2,884,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,996 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,799 >>> mbox cmd response: success
3,076,821 UART: [afmc] ++
3,076,989 UART: [afmc] CDI.KEYID = 6
3,077,351 UART: [afmc] SUBJECT.KEYID = 7
3,077,776 UART: [afmc] AUTHORITY.KEYID = 5
3,112,609 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,608 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,298 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,271 UART: [afmc] --
3,156,403 UART: [cold-reset] --
3,157,347 UART: [state] Locking Datavault
3,158,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,088 UART: [state] Locking ICCM
3,159,514 UART: [exit] Launching FMC @ 0x40000130
3,164,843 UART:
3,164,859 UART: Running Caliptra FMC ...
3,165,267 UART:
3,165,410 UART: [state] CFI Enabled
3,176,201 UART: [fht] FMC Alias Private Key: 7
3,284,486 UART: [art] Extend RT PCRs Done
3,284,914 UART: [art] Lock RT PCRs Done
3,286,538 UART: [art] Populate DV Done
3,294,701 UART: [fht] FMC Alias Private Key: 7
3,295,855 UART: [art] Derive CDI
3,296,135 UART: [art] Store in in slot 0x4
3,381,926 UART: [art] Derive Key Pair
3,382,286 UART: [art] Store priv key in slot 0x5
3,395,588 UART: [art] Derive Key Pair - Done
3,410,603 UART: [art] Signing Cert with AUTHO
3,411,083 UART: RITY.KEYID = 7
3,426,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,430 UART: [art] PUB.X = D9F7ACD71BE209788150A5F5D7660F3D4F6DA633E89F5295B37CF5E42D9F30034DA7C2DE918CA1600EEC94953D4C43AE
3,434,200 UART: [art] PUB.Y = F189466777634C98A0B09B584FBD55A7BFE4A6633AC15BC225A19B87E9D62CF309D0967BA6D35B61ECB541FAE6AE845F
3,441,159 UART: [art] SIG.R = 3D9F02E67E9CA01763A6D78E99A15D40EC8B435820918674479279EB3677E5D4F97DB19092F72A954E170FCF0A8F01EE
3,447,917 UART: [art] SIG.S = D10617E558CAC068FD07A1937B486733DC98210D42527C89B59FC93F125C1F86F386AE3EF075B86CFBDBE78605743A2B
3,471,454 UART: Caliptra RT
3,471,799 UART: [state] CFI Enabled
3,579,354 UART: [rt] RT listening for mailbox commands...
3,580,024 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,350 UART: [rt]cmd =0x44504543, len=92
3,827,147 >>> mbox cmd response data (6284 bytes)
3,827,148 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,457 UART: [rt]cmd =0x43455252, len=4
3,867,261 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,620 ready_for_fw is high
1,363,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,983 >>> mbox cmd response: success
2,988,823 UART:
2,988,839 UART: Running Caliptra FMC ...
2,989,247 UART:
2,989,390 UART: [state] CFI Enabled
2,999,923 UART: [fht] FMC Alias Private Key: 7
3,107,328 UART: [art] Extend RT PCRs Done
3,107,756 UART: [art] Lock RT PCRs Done
3,109,038 UART: [art] Populate DV Done
3,117,099 UART: [fht] FMC Alias Private Key: 7
3,118,167 UART: [art] Derive CDI
3,118,447 UART: [art] Store in in slot 0x4
3,204,372 UART: [art] Derive Key Pair
3,204,732 UART: [art] Store priv key in slot 0x5
3,218,258 UART: [art] Derive Key Pair - Done
3,232,910 UART: [art] Signing Cert with AUTHO
3,233,390 UART: RITY.KEYID = 7
3,248,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,247 UART: [art] PUB.X = 4D0E0A4E2F1E12E1CE7691B74CAC989ED5C0BEF6528A16A33551B7DF0BDF281ED3D10D9BAE7F57B5ADA1AFA7B594877B
3,256,031 UART: [art] PUB.Y = 6810C481B72EE0A1E08F3F2FBC2B7DD77B7FFCADCF8F4D2956E7CD17EA8E4257C92C5D5692E2BE4067DDE11386D05912
3,262,999 UART: [art] SIG.R = 2B981D868320D1874CA6D7FF928F2A3B006960012FF4C7ED879A6996A17709C69FF40B5DB3E426584A3F0CCC03865FE8
3,269,734 UART: [art] SIG.S = 37E0846AE60BF67F1A5A7ED148A7645E371617586F254AB5AA9C6EEF05C1103AF10AB0CE862154D8C70E675A8B7498DE
3,293,439 UART: Caliptra RT
3,293,784 UART: [state] CFI Enabled
3,402,516 UART: [rt] RT listening for mailbox commands...
3,403,186 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,536 UART: [rt]cmd =0x44504543, len=92
3,650,284 >>> mbox cmd response data (6284 bytes)
3,650,285 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,640 UART: [rt]cmd =0x43455252, len=4
3,690,448 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
893,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,177 UART: [kat] ++
897,329 UART: [kat] sha1
901,407 UART: [kat] SHA2-256
903,347 UART: [kat] SHA2-384
906,086 UART: [kat] SHA2-512-ACC
907,987 UART: [kat] ECC-384
917,712 UART: [kat] HMAC-384Kdf
922,490 UART: [kat] LMS
1,170,818 UART: [kat] --
1,171,937 UART: [cold-reset] ++
1,172,447 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 ready_for_fw is high
1,176,503 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,108 UART: [idev] Erasing UDS.KEYID = 0
1,201,241 UART: [idev] Sha1 KeyId Algorithm
1,209,639 UART: [idev] --
1,210,925 UART: [ldev] ++
1,211,093 UART: [ldev] CDI.KEYID = 6
1,211,456 UART: [ldev] SUBJECT.KEYID = 5
1,211,882 UART: [ldev] AUTHORITY.KEYID = 7
1,212,345 UART: [ldev] FE.KEYID = 1
1,217,761 UART: [ldev] Erasing FE.KEYID = 1
1,244,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,869 >>> mbox cmd response: success
2,771,885 UART: [afmc] ++
2,772,053 UART: [afmc] CDI.KEYID = 6
2,772,415 UART: [afmc] SUBJECT.KEYID = 7
2,772,840 UART: [afmc] AUTHORITY.KEYID = 5
2,808,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,384 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,112 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,344 UART: [afmc] --
2,851,412 UART: [cold-reset] --
2,852,208 UART: [state] Locking Datavault
2,853,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,997 UART: [state] Locking ICCM
2,854,453 UART: [exit] Launching FMC @ 0x40000130
2,859,782 UART:
2,859,798 UART: Running Caliptra FMC ...
2,860,206 UART:
2,860,260 UART: [state] CFI Enabled
2,870,581 UART: [fht] FMC Alias Private Key: 7
2,978,582 UART: [art] Extend RT PCRs Done
2,979,010 UART: [art] Lock RT PCRs Done
2,980,396 UART: [art] Populate DV Done
2,988,733 UART: [fht] FMC Alias Private Key: 7
2,989,679 UART: [art] Derive CDI
2,989,959 UART: [art] Store in in slot 0x4
3,075,952 UART: [art] Derive Key Pair
3,076,312 UART: [art] Store priv key in slot 0x5
3,089,296 UART: [art] Derive Key Pair - Done
3,104,102 UART: [art] Signing Cert with AUTHO
3,104,582 UART: RITY.KEYID = 7
3,120,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,933 UART: [art] PUB.X = C81E8A39310D49A1D2DA5E2A9EE842E08F20C8759F089CCCFA22480EFED967EF83C1FF015164C7293A18A4849CEF0F31
3,127,700 UART: [art] PUB.Y = 62EC7A2A1ACEFFD533E8B70D46DEEB24EA89FA1A5D255E6D55CAB6DAD3E9C3501FC490858A1C61567006566929F29E9F
3,134,662 UART: [art] SIG.R = F372B4F079E34801FC9676D18178D981CF3D6D7F986108626D9AF1380FAF8A1FAF5F76285B70D746C8FF9D0C8B15EFA9
3,141,428 UART: [art] SIG.S = 19885AF9C6E0E9919D4DBD90BBFB72269F0B0BFDE76CA7246B9FD95526DB606100F59F25A0F9A773B56986952BF3481C
3,164,729 UART: Caliptra RT
3,164,982 UART: [state] CFI Enabled
3,272,779 UART: [rt] RT listening for mailbox commands...
3,273,449 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,957 UART: [rt]cmd =0x44504543, len=92
3,520,312 >>> mbox cmd response data (6284 bytes)
3,520,313 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,506 UART: [rt]cmd =0x43455252, len=4
3,560,290 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,067 ready_for_fw is high
1,061,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,942 >>> mbox cmd response: success
2,685,964 UART:
2,685,980 UART: Running Caliptra FMC ...
2,686,388 UART:
2,686,442 UART: [state] CFI Enabled
2,696,815 UART: [fht] FMC Alias Private Key: 7
2,804,542 UART: [art] Extend RT PCRs Done
2,804,970 UART: [art] Lock RT PCRs Done
2,806,514 UART: [art] Populate DV Done
2,814,695 UART: [fht] FMC Alias Private Key: 7
2,815,743 UART: [art] Derive CDI
2,816,023 UART: [art] Store in in slot 0x4
2,901,462 UART: [art] Derive Key Pair
2,901,822 UART: [art] Store priv key in slot 0x5
2,915,268 UART: [art] Derive Key Pair - Done
2,930,422 UART: [art] Signing Cert with AUTHO
2,930,902 UART: RITY.KEYID = 7
2,945,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,647 UART: [art] PUB.X = D1291D3E081EB5A23828A9DE204962E52B7B3A44EA30C7B8407FEA4B9F8405307DFCAB30284B05D6148873608EB50198
2,953,405 UART: [art] PUB.Y = 44206DDE22E6E8BDEABA3027F843ADBA2A23A0D898A8FAA9D8FAA8E2C096F2AEAE11AE151F382070B76361CA9FF848EE
2,960,381 UART: [art] SIG.R = D06A1A30B2D0C3C8F1595A71C3B0FFDE5E1A54195ECE90E5274FBE8934CB08D9FDA231651C801345EDAF041085B4CBE9
2,967,161 UART: [art] SIG.S = EF1E9D327EBC0EC55D91E5BD7AC3B9EED175BDFF997FF0FC10509640E23B96C6C1200C3FFF8AC2680F5FE1BDF117919F
2,991,055 UART: Caliptra RT
2,991,308 UART: [state] CFI Enabled
3,099,078 UART: [rt] RT listening for mailbox commands...
3,099,748 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,048 UART: [rt]cmd =0x44504543, len=92
3,346,235 >>> mbox cmd response data (6284 bytes)
3,346,236 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,615 UART: [rt]cmd =0x43455252, len=4
3,386,350 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
893,781 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,906 UART: [kat] ++
898,058 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
907,005 UART: [kat] SHA2-512-ACC
908,906 UART: [kat] ECC-384
918,405 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,174,897 UART: [idev] ++
1,175,065 UART: [idev] CDI.KEYID = 6
1,175,425 UART: [idev] SUBJECT.KEYID = 7
1,175,849 UART: [idev] UDS.KEYID = 0
1,176,194 ready_for_fw is high
1,176,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,655 UART: [idev] Erasing UDS.KEYID = 0
1,200,916 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,488 UART: [ldev] ++
1,210,656 UART: [ldev] CDI.KEYID = 6
1,211,019 UART: [ldev] SUBJECT.KEYID = 5
1,211,445 UART: [ldev] AUTHORITY.KEYID = 7
1,211,908 UART: [ldev] FE.KEYID = 1
1,217,036 UART: [ldev] Erasing FE.KEYID = 1
1,244,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,056 UART: [ldev] --
1,283,445 UART: [fwproc] Wait for Commands...
1,284,151 UART: [fwproc] Recv command 0x46574c44
1,284,879 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,122 >>> mbox cmd response: success
2,772,188 UART: [afmc] ++
2,772,356 UART: [afmc] CDI.KEYID = 6
2,772,718 UART: [afmc] SUBJECT.KEYID = 7
2,773,143 UART: [afmc] AUTHORITY.KEYID = 5
2,808,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,533 UART: [afmc] --
2,851,539 UART: [cold-reset] --
2,852,327 UART: [state] Locking Datavault
2,853,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,082 UART: [state] Locking ICCM
2,854,536 UART: [exit] Launching FMC @ 0x40000130
2,859,865 UART:
2,859,881 UART: Running Caliptra FMC ...
2,860,289 UART:
2,860,432 UART: [state] CFI Enabled
2,871,013 UART: [fht] FMC Alias Private Key: 7
2,979,244 UART: [art] Extend RT PCRs Done
2,979,672 UART: [art] Lock RT PCRs Done
2,981,458 UART: [art] Populate DV Done
2,989,353 UART: [fht] FMC Alias Private Key: 7
2,990,457 UART: [art] Derive CDI
2,990,737 UART: [art] Store in in slot 0x4
3,076,710 UART: [art] Derive Key Pair
3,077,070 UART: [art] Store priv key in slot 0x5
3,090,274 UART: [art] Derive Key Pair - Done
3,105,110 UART: [art] Signing Cert with AUTHO
3,105,590 UART: RITY.KEYID = 7
3,120,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,375 UART: [art] PUB.X = 9A625A5B0762ACC1F4CCD563E7752305DA4DD920D78143AFA689DF3D7418F0BA4B0729330E7F409D6ED3EC1D9A6035AE
3,128,145 UART: [art] PUB.Y = 2BD4FC403B24B8AA7BF39E6164652351E01743DACEB1223351FCF5B4A3DC3483495F0502C3172E3F0DE796A49D62EC73
3,135,092 UART: [art] SIG.R = 0D81CFCBE1A3C4EFE58CE0FEA65E26850299AEDD9CEE0F7271A2D3538BCE9877A0EB64D0450E893FB577C4622FB39524
3,141,868 UART: [art] SIG.S = 3A529B2527202C218BBAF67ACBFFEC0FE7DCA0CDA70D1E2A2E6511C5B38D0D1C455E838CDCA27D12E2C4CF95D529C12C
3,165,272 UART: Caliptra RT
3,165,617 UART: [state] CFI Enabled
3,274,330 UART: [rt] RT listening for mailbox commands...
3,275,000 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,484 UART: [rt]cmd =0x44504543, len=92
3,521,795 >>> mbox cmd response data (6284 bytes)
3,521,796 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,013 UART: [rt]cmd =0x43455252, len=4
3,561,961 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,208 ready_for_fw is high
1,061,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,813 >>> mbox cmd response: success
2,687,091 UART:
2,687,107 UART: Running Caliptra FMC ...
2,687,515 UART:
2,687,658 UART: [state] CFI Enabled
2,698,395 UART: [fht] FMC Alias Private Key: 7
2,806,490 UART: [art] Extend RT PCRs Done
2,806,918 UART: [art] Lock RT PCRs Done
2,808,542 UART: [art] Populate DV Done
2,816,747 UART: [fht] FMC Alias Private Key: 7
2,817,769 UART: [art] Derive CDI
2,818,049 UART: [art] Store in in slot 0x4
2,903,750 UART: [art] Derive Key Pair
2,904,110 UART: [art] Store priv key in slot 0x5
2,917,696 UART: [art] Derive Key Pair - Done
2,932,710 UART: [art] Signing Cert with AUTHO
2,933,190 UART: RITY.KEYID = 7
2,948,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,093 UART: [art] PUB.X = C698139C0CEAA4F91E01647E175099E72BA8E11BB0ACB6FC88EF8C5F9DDFA1E79D4206613AB74365093772F9F836DC91
2,955,861 UART: [art] PUB.Y = A4AA6F1127D5664225360F3F2CAE85E4227480C4B113E06E1FB3A22E60A4A9CFE02BB58ED8EE7D349DBAF9F6D988EDA7
2,962,826 UART: [art] SIG.R = 53D2060D8FC52550C180B8CE3F86AFAA26C9711D5B21A2F0E88DBA57CA16B4E830283B1A9CAD59137C950CA076BC2820
2,969,597 UART: [art] SIG.S = 3A74CD06DB7670A343EC15839B9E3E64AC779EB998544D386D6830192C96B0C58F9E45D090174B9BE301C8B6EB468D04
2,993,493 UART: Caliptra RT
2,993,838 UART: [state] CFI Enabled
3,101,889 UART: [rt] RT listening for mailbox commands...
3,102,559 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,893 UART: [rt]cmd =0x44504543, len=92
3,350,274 >>> mbox cmd response data (6284 bytes)
3,350,275 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,379,782 UART: [rt]cmd =0x43455252, len=4
3,390,674 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,170,039 UART: [fht] FHT @ 0x50003400
1,172,467 UART: [idev] ++
1,172,635 UART: [idev] CDI.KEYID = 6
1,172,996 UART: [idev] SUBJECT.KEYID = 7
1,173,421 UART: [idev] UDS.KEYID = 0
1,173,767 ready_for_fw is high
1,173,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,437 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,121 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,028 UART: [ldev] --
1,280,366 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,987 >>> mbox cmd response: success
2,769,234 UART: [afmc] ++
2,769,402 UART: [afmc] CDI.KEYID = 6
2,769,765 UART: [afmc] SUBJECT.KEYID = 7
2,770,191 UART: [afmc] AUTHORITY.KEYID = 5
2,805,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,021 UART: [afmc] --
2,849,115 UART: [cold-reset] --
2,849,841 UART: [state] Locking Datavault
2,851,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,788 UART: [state] Locking ICCM
2,852,442 UART: [exit] Launching FMC @ 0x40000130
2,857,771 UART:
2,857,787 UART: Running Caliptra FMC ...
2,858,195 UART:
2,858,249 UART: [state] CFI Enabled
2,868,738 UART: [fht] FMC Alias Private Key: 7
2,977,107 UART: [art] Extend RT PCRs Done
2,977,535 UART: [art] Lock RT PCRs Done
2,978,743 UART: [art] Populate DV Done
2,986,996 UART: [fht] FMC Alias Private Key: 7
2,988,118 UART: [art] Derive CDI
2,988,398 UART: [art] Store in in slot 0x4
3,074,207 UART: [art] Derive Key Pair
3,074,567 UART: [art] Store priv key in slot 0x5
3,087,595 UART: [art] Derive Key Pair - Done
3,102,038 UART: [art] Signing Cert with AUTHO
3,102,518 UART: RITY.KEYID = 7
3,117,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,531 UART: [art] PUB.X = FC1FB504D94BCB6E02F08AD1205A8157D2D45624D65A68DFA625CD414393B9B7DFB3D0B136B7F2C50779294F74859DDC
3,125,302 UART: [art] PUB.Y = 7A04B45E2C9AB7CA92A3D04E7BDBB89FE204B571AD0748F932F5F376A30A421DFC6335A17DE13F9A53E4A62DF0A88AA8
3,132,258 UART: [art] SIG.R = 866E54AB473A91E7A4F9EB116F831260B51EB5DD833370EEAF9D98710ACB5A73D6AEBAEBA01CDC1B1167CD03C929BCAF
3,139,046 UART: [art] SIG.S = B03E46B92713E235BDFF7A45A15948571F66BA1532C3CE2FB4F14501874582C98782E41916A543FDD1F9EACC1BE81691
3,163,046 UART: Caliptra RT
3,163,299 UART: [state] CFI Enabled
3,270,815 UART: [rt] RT listening for mailbox commands...
3,271,485 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,781 UART: [rt]cmd =0x44504543, len=92
3,518,548 >>> mbox cmd response data (6284 bytes)
3,518,549 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,547,706 UART: [rt]cmd =0x43455252, len=4
3,558,461 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,356 ready_for_fw is high
1,056,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,701 >>> mbox cmd response: success
2,681,567 UART:
2,681,583 UART: Running Caliptra FMC ...
2,681,991 UART:
2,682,045 UART: [state] CFI Enabled
2,692,682 UART: [fht] FMC Alias Private Key: 7
2,800,411 UART: [art] Extend RT PCRs Done
2,800,839 UART: [art] Lock RT PCRs Done
2,802,349 UART: [art] Populate DV Done
2,810,596 UART: [fht] FMC Alias Private Key: 7
2,811,534 UART: [art] Derive CDI
2,811,814 UART: [art] Store in in slot 0x4
2,897,905 UART: [art] Derive Key Pair
2,898,265 UART: [art] Store priv key in slot 0x5
2,911,469 UART: [art] Derive Key Pair - Done
2,926,220 UART: [art] Signing Cert with AUTHO
2,926,700 UART: RITY.KEYID = 7
2,941,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,295 UART: [art] PUB.X = 0DCB19DDC3EF4EAF1CE811BF0A8050001B2326B81EAF25A11CAD24FFB16BBADCAA6F46C2BEA8E566193FC7FF59A4429A
2,949,069 UART: [art] PUB.Y = A653D07AFE63DAB452D677E35432BA665FEE03EE343575B9218B8564AC3ACDB9806E8ACE6F27D129EF43FF7F39553BDE
2,956,032 UART: [art] SIG.R = 2AC801BAB78BD80A8294BC6A6C06C5CF60826452E3A76709A0814D47468812B5FDB843893589F863318075C792DB691F
2,962,784 UART: [art] SIG.S = 4535C2346620850690F36DEB377AF50C581DD17D2C3D7546E36E9164FD878305E2CDEF56F5F1F5269159319082710D16
2,986,759 UART: Caliptra RT
2,987,012 UART: [state] CFI Enabled
3,095,189 UART: [rt] RT listening for mailbox commands...
3,095,859 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,153 UART: [rt]cmd =0x44504543, len=92
3,342,911 >>> mbox cmd response data (6284 bytes)
3,342,912 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,251 UART: [rt]cmd =0x43455252, len=4
3,383,199 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,871 UART: [ldev] --
1,282,217 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,555 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,878 >>> mbox cmd response: success
2,768,911 UART: [afmc] ++
2,769,079 UART: [afmc] CDI.KEYID = 6
2,769,442 UART: [afmc] SUBJECT.KEYID = 7
2,769,868 UART: [afmc] AUTHORITY.KEYID = 5
2,805,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,532 UART: [afmc] --
2,848,640 UART: [cold-reset] --
2,849,392 UART: [state] Locking Datavault
2,850,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,139 UART: [state] Locking ICCM
2,851,791 UART: [exit] Launching FMC @ 0x40000130
2,857,120 UART:
2,857,136 UART: Running Caliptra FMC ...
2,857,544 UART:
2,857,687 UART: [state] CFI Enabled
2,868,570 UART: [fht] FMC Alias Private Key: 7
2,977,305 UART: [art] Extend RT PCRs Done
2,977,733 UART: [art] Lock RT PCRs Done
2,979,301 UART: [art] Populate DV Done
2,987,714 UART: [fht] FMC Alias Private Key: 7
2,988,790 UART: [art] Derive CDI
2,989,070 UART: [art] Store in in slot 0x4
3,074,701 UART: [art] Derive Key Pair
3,075,061 UART: [art] Store priv key in slot 0x5
3,089,289 UART: [art] Derive Key Pair - Done
3,104,295 UART: [art] Signing Cert with AUTHO
3,104,775 UART: RITY.KEYID = 7
3,120,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,416 UART: [art] PUB.X = F6224FB61669219B5D7BDA25E1BD2DEFCDFDA8B502B867534A137819247AE5D4FCC5363EF2B0808B0141C10A401801B6
3,128,182 UART: [art] PUB.Y = 721AB4F9631342C18BEE6D6600E7F1A5526205D1EECF17B6ABDCC959EF0153D3F1DDAB67F6008F1E17667640B56BD8B8
3,135,094 UART: [art] SIG.R = 4141AFA8770FEF4179B2EC84B60EBB563BA2F3C56932CD48609085C4A506CDA024CAB6ABBBE922AEA6990C3F9B3E43E0
3,141,870 UART: [art] SIG.S = 5BA2C1C6188E664BD9942DF5EFE75E6DB33BC5ACB34835E8FE8AFDC168C98EC0D0DFEEAB8592C6C33A099DE8C94E8F52
3,165,438 UART: Caliptra RT
3,165,783 UART: [state] CFI Enabled
3,273,672 UART: [rt] RT listening for mailbox commands...
3,274,342 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,664 UART: [rt]cmd =0x44504543, len=92
3,519,714 >>> mbox cmd response data (6284 bytes)
3,519,715 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,912 UART: [rt]cmd =0x43455252, len=4
3,559,686 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,831 ready_for_fw is high
1,055,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,322 >>> mbox cmd response: success
2,681,366 UART:
2,681,382 UART: Running Caliptra FMC ...
2,681,790 UART:
2,681,933 UART: [state] CFI Enabled
2,692,352 UART: [fht] FMC Alias Private Key: 7
2,799,941 UART: [art] Extend RT PCRs Done
2,800,369 UART: [art] Lock RT PCRs Done
2,801,747 UART: [art] Populate DV Done
2,810,152 UART: [fht] FMC Alias Private Key: 7
2,811,166 UART: [art] Derive CDI
2,811,446 UART: [art] Store in in slot 0x4
2,896,925 UART: [art] Derive Key Pair
2,897,285 UART: [art] Store priv key in slot 0x5
2,910,761 UART: [art] Derive Key Pair - Done
2,925,503 UART: [art] Signing Cert with AUTHO
2,925,983 UART: RITY.KEYID = 7
2,941,113 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,878 UART: [art] PUB.X = 10D2AF01FDA94450FBE0B16E25C9C815C87C72ECD65E84CAB8CC8FB4DD322FBC8AB28B27F15D7B7134410D8A6D8F4E79
2,948,664 UART: [art] PUB.Y = 5E7D255B09B6AA5E9A6D171B6CEBE3E1BE839EFA531B4D14946B50D557AA0709474105AA64238B1BB4D8B2FDCAD1C288
2,955,618 UART: [art] SIG.R = E1D897F8CD3A14E8DC6BD500B85549948445E45D72C4CA867866E78A99D6E7D988C28BCD752467E4E8C10A3069A80B2B
2,962,364 UART: [art] SIG.S = 12F1056086A6F64DF1E84E94DAEC0C7831E63140CE352EA6C991D568D4417FED8C2C546A1AE2A189CB44399AE00D181E
2,985,984 UART: Caliptra RT
2,986,329 UART: [state] CFI Enabled
3,094,830 UART: [rt] RT listening for mailbox commands...
3,095,500 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,904 UART: [rt]cmd =0x44504543, len=92
3,341,809 >>> mbox cmd response data (6284 bytes)
3,341,810 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,159 UART: [rt]cmd =0x43455252, len=4
3,381,961 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,151 UART:
192,523 UART: Running Caliptra ROM ...
193,710 UART:
193,863 UART: [state] CFI Enabled
264,397 UART: [state] LifecycleState = Unprovisioned
266,395 UART: [state] DebugLocked = No
269,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,909 UART: [kat] SHA2-256
444,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,048 UART: [kat] ++
455,527 UART: [kat] sha1
466,048 UART: [kat] SHA2-256
468,771 UART: [kat] SHA2-384
474,556 UART: [kat] SHA2-512-ACC
476,927 UART: [kat] ECC-384
2,768,000 UART: [kat] HMAC-384Kdf
2,801,483 UART: [kat] LMS
3,991,752 UART: [kat] --
3,994,690 UART: [cold-reset] ++
3,996,196 UART: [fht] Storing FHT @ 0x50003400
4,008,751 UART: [idev] ++
4,009,396 UART: [idev] CDI.KEYID = 6
4,010,329 UART: [idev] SUBJECT.KEYID = 7
4,011,517 UART: [idev] UDS.KEYID = 0
4,012,571 ready_for_fw is high
4,012,786 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,793 UART: [idev] Erasing UDS.KEYID = 0
7,346,178 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,070 UART: [idev] --
7,370,827 UART: [ldev] ++
7,371,410 UART: [ldev] CDI.KEYID = 6
7,372,378 UART: [ldev] SUBJECT.KEYID = 5
7,373,561 UART: [ldev] AUTHORITY.KEYID = 7
7,374,798 UART: [ldev] FE.KEYID = 1
7,422,708 UART: [ldev] Erasing FE.KEYID = 1
10,756,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,848 UART: [ldev] --
13,137,931 UART: [fwproc] Waiting for Commands...
13,140,509 UART: [fwproc] Received command 0x46574c44
13,142,688 UART: [fwproc] Received Image of size 113760 bytes
17,192,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,653,897 >>> mbox cmd response: success
17,654,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,658,340 UART: [afmc] ++
17,658,922 UART: [afmc] CDI.KEYID = 6
17,659,940 UART: [afmc] SUBJECT.KEYID = 7
17,661,097 UART: [afmc] AUTHORITY.KEYID = 5
21,026,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,820 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,247 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,064 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,530 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,960 UART: [afmc] --
23,401,771 UART: [cold-reset] --
23,407,143 UART: [state] Locking Datavault
23,413,420 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,174 UART: [state] Locking ICCM
23,416,862 UART: [exit] Launching FMC @ 0x40000130
23,425,259 UART:
23,425,494 UART: Running Caliptra FMC ...
23,426,606 UART:
23,426,775 UART: [state] CFI Enabled
23,486,730 UART: [fht] FMC Alias Private Key: 7
25,824,838 UART: [art] Extend RT PCRs Done
25,826,082 UART: [art] Lock RT PCRs Done
25,827,576 UART: [art] Populate DV Done
25,833,313 UART: [fht] FMC Alias Private Key: 7
25,834,850 UART: [art] Derive CDI
25,835,615 UART: [art] Store in in slot 0x4
25,894,583 UART: [art] Derive Key Pair
25,895,629 UART: [art] Store priv key in slot 0x5
29,187,989 UART: [art] Derive Key Pair - Done
29,200,932 UART: [art] Signing Cert with AUTHO
29,202,292 UART: RITY.KEYID = 7
31,489,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,125 UART: [art] PUB.X = 56052E22646633EB1DD5EE4E04E8859B2DFEBF5B2A2B17BF7EE321994482E53344F93F2C8826EFAA5A682685F8D5DAC2
31,498,365 UART: [art] PUB.Y = AA2A60BE0250BB5ED76A9A71DEAFF0249A9829829199A9FC59FC2DE8749B24F67838DDEF25B598D82388E58C21DB903F
31,505,656 UART: [art] SIG.R = 5ADB00575B4C1B8ADD5BA51773D8FF38ADC4BDF662BC264D6345465F99C3C3EA1A2BCF54BE7BA57700F00F4813A9D796
31,513,042 UART: [art] SIG.S = B4A4ED29B3DE1F2AA3FCF8A00C526A17063F99B8CD60825CA9379DC022CCBE22DDD91715E4B3640DB9CFB96F5186DF60
32,818,524 UART: Caliptra RT
32,819,240 UART: [state] CFI Enabled
32,980,964 UART: [rt] RT listening for mailbox commands...
33,012,809 UART: [rt]cmd =0x44504543, len=92
38,778,695 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,804,206 ready_for_fw is high
3,804,797 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,865,109 >>> mbox cmd response: success
17,865,830 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,562,003 UART:
23,562,399 UART: Running Caliptra FMC ...
23,563,600 UART:
23,563,775 UART: [state] CFI Enabled
23,633,417 UART: [fht] FMC Alias Private Key: 7
25,971,646 UART: [art] Extend RT PCRs Done
25,972,879 UART: [art] Lock RT PCRs Done
25,974,402 UART: [art] Populate DV Done
25,979,816 UART: [fht] FMC Alias Private Key: 7
25,981,520 UART: [art] Derive CDI
25,982,334 UART: [art] Store in in slot 0x4
26,042,105 UART: [art] Derive Key Pair
26,043,105 UART: [art] Store priv key in slot 0x5
29,335,902 UART: [art] Derive Key Pair - Done
29,348,685 UART: [art] Signing Cert with AUTHO
29,350,002 UART: RITY.KEYID = 7
31,638,315 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,826 UART: [art] PUB.X = D5E67ADEA7D5132D1D6880A5A595B62225F4D06D49E61D2D27A7626B95265A59929776F0FD8A0A7D15AD880053CC7189
31,647,037 UART: [art] PUB.Y = 91EBC27BF81A3FB148AD0FE0A26116F765CEC6615755FA4AF3AAD4ADCA94762D9ECD43B3AE122C139C89A3DC7F49BAA9
31,654,348 UART: [art] SIG.R = 03E65B5AF598C3B76634286AF29B1D18FACD3D20B9E8E0942E76EFC4F8332CDA854A9A63AF3B57213BBC143EBA0115F0
31,661,764 UART: [art] SIG.S = CA0D97A18748EFD081BC9D5BC33E0C4F1CCE224CB8F9021D7DF19B99EE77CD9BA0B704707DB560397510B6B045C98C58
32,967,541 UART: Caliptra RT
32,968,258 UART: [state] CFI Enabled
33,130,500 UART: [rt] RT listening for mailbox commands...
33,162,296 UART: [rt]cmd =0x44504543, len=92
38,928,031 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
192,965 UART:
193,351 UART: Running Caliptra ROM ...
194,539 UART:
603,948 UART: [state] CFI Enabled
616,059 UART: [state] LifecycleState = Unprovisioned
618,004 UART: [state] DebugLocked = No
619,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,805 UART: [kat] SHA2-256
793,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,084 UART: [kat] ++
804,538 UART: [kat] sha1
816,114 UART: [kat] SHA2-256
818,827 UART: [kat] SHA2-384
825,161 UART: [kat] SHA2-512-ACC
827,590 UART: [kat] ECC-384
3,112,725 UART: [kat] HMAC-384Kdf
3,124,350 UART: [kat] LMS
4,314,472 UART: [kat] --
4,319,560 UART: [cold-reset] ++
4,321,659 UART: [fht] Storing FHT @ 0x50003400
4,333,849 UART: [idev] ++
4,334,409 UART: [idev] CDI.KEYID = 6
4,335,288 UART: [idev] SUBJECT.KEYID = 7
4,336,633 UART: [idev] UDS.KEYID = 0
4,337,702 ready_for_fw is high
4,337,900 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,788 UART: [idev] Erasing UDS.KEYID = 0
7,623,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,478 UART: [idev] --
7,649,791 UART: [ldev] ++
7,650,355 UART: [ldev] CDI.KEYID = 6
7,651,330 UART: [ldev] SUBJECT.KEYID = 5
7,652,532 UART: [ldev] AUTHORITY.KEYID = 7
7,653,828 UART: [ldev] FE.KEYID = 1
7,666,087 UART: [ldev] Erasing FE.KEYID = 1
10,953,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,898 UART: [ldev] --
13,311,971 UART: [fwproc] Waiting for Commands...
13,314,004 UART: [fwproc] Received command 0x46574c44
13,316,183 UART: [fwproc] Received Image of size 113760 bytes
17,368,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,908 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,822 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,821,273 >>> mbox cmd response: success
17,821,901 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,826,065 UART: [afmc] ++
17,826,660 UART: [afmc] CDI.KEYID = 6
17,827,599 UART: [afmc] SUBJECT.KEYID = 7
17,828,865 UART: [afmc] AUTHORITY.KEYID = 5
21,143,033 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,882 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,262 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,130 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,555 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,553 UART: [afmc] --
23,507,576 UART: [cold-reset] --
23,511,161 UART: [state] Locking Datavault
23,518,668 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,405 UART: [state] Locking ICCM
23,522,337 UART: [exit] Launching FMC @ 0x40000130
23,530,695 UART:
23,530,926 UART: Running Caliptra FMC ...
23,532,022 UART:
23,532,181 UART: [state] CFI Enabled
23,540,491 UART: [fht] FMC Alias Private Key: 7
25,870,530 UART: [art] Extend RT PCRs Done
25,871,754 UART: [art] Lock RT PCRs Done
25,873,754 UART: [art] Populate DV Done
25,879,268 UART: [fht] FMC Alias Private Key: 7
25,880,957 UART: [art] Derive CDI
25,881,764 UART: [art] Store in in slot 0x4
25,924,196 UART: [art] Derive Key Pair
25,925,237 UART: [art] Store priv key in slot 0x5
29,166,714 UART: [art] Derive Key Pair - Done
29,179,979 UART: [art] Signing Cert with AUTHO
29,181,284 UART: RITY.KEYID = 7
31,460,868 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,378 UART: [art] PUB.X = E751B99A72F1DA53B6CCA1A70DCEE1657A03E7EC4B927D2A52A48A59F105709EC2A9BD0BA49DB0EBFEAE051674B8269A
31,469,650 UART: [art] PUB.Y = 3E8B9094D8CE37D6050A0E50005F3472367CFCB7601BEFD26BD71E797DCCC2C5433127DB5E8BFBB85AE92D45F9498E87
31,476,892 UART: [art] SIG.R = 4E545FE8448C6CA74347899137AF9BC8866FDEA1CEF9D9B0C5F1C0768B9DA9FF5F5CB238237082A3851C9450DD26EADC
31,484,318 UART: [art] SIG.S = 56B805C763E710E95F865F9ADE97037C789333C65FBF9AC99DC31A57395771DE500ED57861BB3AD18B83EC3628D18AD5
32,789,802 UART: Caliptra RT
32,790,515 UART: [state] CFI Enabled
32,907,860 UART: [rt] RT listening for mailbox commands...
32,940,098 UART: [rt]cmd =0x44504543, len=92
38,614,686 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
4,129,343 ready_for_fw is high
4,129,826 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,056,433 >>> mbox cmd response: success
18,057,286 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,694,638 UART:
23,695,084 UART: Running Caliptra FMC ...
23,696,204 UART:
23,696,361 UART: [state] CFI Enabled
23,704,174 UART: [fht] FMC Alias Private Key: 7
26,035,254 UART: [art] Extend RT PCRs Done
26,036,488 UART: [art] Lock RT PCRs Done
26,038,070 UART: [art] Populate DV Done
26,043,267 UART: [fht] FMC Alias Private Key: 7
26,044,813 UART: [art] Derive CDI
26,045,575 UART: [art] Store in in slot 0x4
26,088,549 UART: [art] Derive Key Pair
26,089,554 UART: [art] Store priv key in slot 0x5
29,330,893 UART: [art] Derive Key Pair - Done
29,343,731 UART: [art] Signing Cert with AUTHO
29,345,041 UART: RITY.KEYID = 7
31,624,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,808 UART: [art] PUB.X = 6D7F5A08E3D1B2360DAE23C62BDD242078CAFA4D7F0AB9AED8BB5C8076E936EEA10D59788D524AE076FDA5321127F63A
31,633,043 UART: [art] PUB.Y = 816D67D51E37989A8C1844A5B347D159A84FC240E79ED47607C74620D68F2A0B537D059DE3E1F39A3F36E65F43957629
31,640,265 UART: [art] SIG.R = B0080B5068917B77080447EAD57DBE45A6368C976350C213C9DD2D8720DED23EEBA9B862B6A42A3A2C0762D525346D3B
31,647,657 UART: [art] SIG.S = 220815ED288F06FC68DA68B1657C7EB769734751097D54B3476E5AE6AB5A022D78BFD462826CBF2E5ADD1094F1BB08A9
32,952,537 UART: Caliptra RT
32,953,261 UART: [state] CFI Enabled
33,070,676 UART: [rt] RT listening for mailbox commands...
33,102,647 UART: [rt]cmd =0x44504543, len=92
38,776,443 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,421 UART:
192,823 UART: Running Caliptra ROM ...
194,034 UART:
194,195 UART: [state] CFI Enabled
264,159 UART: [state] LifecycleState = Unprovisioned
266,007 UART: [state] DebugLocked = No
267,965 UART: [state] WD Timer not started. Device not locked for debugging
270,784 UART: [kat] SHA2-256
449,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,476 UART: [kat] ++
462,009 UART: [kat] sha1
472,681 UART: [kat] SHA2-256
475,762 UART: [kat] SHA2-384
482,245 UART: [kat] SHA2-512-ACC
485,251 UART: [kat] ECC-384
2,948,671 UART: [kat] HMAC-384Kdf
2,969,800 UART: [kat] LMS
3,499,248 UART: [kat] --
3,504,849 UART: [cold-reset] ++
3,507,416 UART: [fht] FHT @ 0x50003400
3,518,108 UART: [idev] ++
3,518,664 UART: [idev] CDI.KEYID = 6
3,519,543 UART: [idev] SUBJECT.KEYID = 7
3,520,777 UART: [idev] UDS.KEYID = 0
3,521,775 ready_for_fw is high
3,521,965 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,524 UART: [idev] Erasing UDS.KEYID = 0
6,025,061 UART: [idev] Sha1 KeyId Algorithm
6,048,398 UART: [idev] --
6,051,075 UART: [ldev] ++
6,051,652 UART: [ldev] CDI.KEYID = 6
6,052,588 UART: [ldev] SUBJECT.KEYID = 5
6,053,744 UART: [ldev] AUTHORITY.KEYID = 7
6,055,016 UART: [ldev] FE.KEYID = 1
6,098,681 UART: [ldev] Erasing FE.KEYID = 1
8,605,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,630 UART: [ldev] --
10,415,349 UART: [fwproc] Wait for Commands...
10,417,270 UART: [fwproc] Recv command 0x46574c44
10,419,359 UART: [fwproc] Recv'd Img size: 114084 bytes
13,817,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,915 >>> mbox cmd response: success
14,276,511 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,280,664 UART: [afmc] ++
14,281,246 UART: [afmc] CDI.KEYID = 6
14,282,155 UART: [afmc] SUBJECT.KEYID = 7
14,283,365 UART: [afmc] AUTHORITY.KEYID = 5
16,806,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,660 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,537 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,747 UART: [afmc] --
18,607,910 UART: [cold-reset] --
18,611,808 UART: [state] Locking Datavault
18,615,817 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,464 UART: [state] Locking ICCM
18,619,881 UART: [exit] Launching FMC @ 0x40000130
18,628,294 UART:
18,628,536 UART: Running Caliptra FMC ...
18,629,635 UART:
18,629,792 UART: [state] CFI Enabled
18,689,510 UART: [fht] FMC Alias Private Key: 7
20,453,908 UART: [art] Extend RT PCRs Done
20,455,126 UART: [art] Lock RT PCRs Done
20,456,959 UART: [art] Populate DV Done
20,462,260 UART: [fht] FMC Alias Private Key: 7
20,463,899 UART: [art] Derive CDI
20,464,708 UART: [art] Store in in slot 0x4
20,522,638 UART: [art] Derive Key Pair
20,523,634 UART: [art] Store priv key in slot 0x5
22,986,722 UART: [art] Derive Key Pair - Done
22,999,777 UART: [art] Signing Cert with AUTHO
23,001,075 UART: RITY.KEYID = 7
24,712,849 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,360 UART: [art] PUB.X = DBCC032306F56CF5C4B914498AE382DC88E2D3BF9948FC485AE02444F92DAF9353699AE402A52C32988D54CCAE21B48F
24,721,642 UART: [art] PUB.Y = E14D7E92271FC8D35B994E757415FD9FB47113EBF6D7061A992139B86282D95C3D7F73704CC8808FC64C2129505F05EE
24,728,912 UART: [art] SIG.R = D8F3C73628E5FE87E1B409F93E60D9B50D24026911A5D8B12881AA63DBAA01CE0CD529F12F3ED710B58798CCFBF68D3F
24,736,268 UART: [art] SIG.S = EDA152B4046BBD5FB5DDB2B90AC8F6EDBC87CF92DF7D87899630B13A381B19A3D389934F04BA565CB04F9D69DB3FC28D
25,714,785 UART: Caliptra RT
25,715,505 UART: [state] CFI Enabled
25,880,867 UART: [rt] RT listening for mailbox commands...
25,913,135 UART: [rt]cmd =0x44504543, len=92
30,274,842 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,384,771 ready_for_fw is high
3,385,216 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,047,155 >>> mbox cmd response: success
14,048,052 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,328,000 UART:
18,328,402 UART: Running Caliptra FMC ...
18,329,506 UART:
18,329,659 UART: [state] CFI Enabled
18,391,094 UART: [fht] FMC Alias Private Key: 7
20,154,996 UART: [art] Extend RT PCRs Done
20,156,228 UART: [art] Lock RT PCRs Done
20,157,932 UART: [art] Populate DV Done
20,163,229 UART: [fht] FMC Alias Private Key: 7
20,164,822 UART: [art] Derive CDI
20,165,636 UART: [art] Store in in slot 0x4
20,222,768 UART: [art] Derive Key Pair
20,223,810 UART: [art] Store priv key in slot 0x5
22,687,247 UART: [art] Derive Key Pair - Done
22,699,918 UART: [art] Signing Cert with AUTHO
22,701,221 UART: RITY.KEYID = 7
24,412,169 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,813 UART: [art] PUB.X = BDBE387D822DA2702EBFC8ADBED4CDC55254872E2616D18D3F32ABE6AF31D4E9FA69D34F55E954BCE6765051DE5EB69D
24,420,974 UART: [art] PUB.Y = D2201D94D52EDDD419223DE43F554D01954B52131EE95D6B08748720938BAF66D73482CC22FD907D00BE60909D594A60
24,428,243 UART: [art] SIG.R = 9F1A229C8D9CB02280A8422B6EB9EC69316DB50518E70DF73405ED5AA17353CBD9414F69A9C93BEFACD38AB9FB7F2D30
24,435,611 UART: [art] SIG.S = 14D59889B79B675035B7C122ABC59C35DFFC9FA25FD4A78D41323899C3CE83B1625047E1905D8BC0143B92FF521A03B2
25,414,717 UART: Caliptra RT
25,415,424 UART: [state] CFI Enabled
25,579,421 UART: [rt] RT listening for mailbox commands...
25,611,588 UART: [rt]cmd =0x44504543, len=92
29,972,261 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
193,195 UART:
193,606 UART: Running Caliptra ROM ...
194,765 UART:
604,532 UART: [state] CFI Enabled
616,129 UART: [state] LifecycleState = Unprovisioned
618,023 UART: [state] DebugLocked = No
620,618 UART: [state] WD Timer not started. Device not locked for debugging
623,876 UART: [kat] SHA2-256
802,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,573 UART: [kat] ++
815,108 UART: [kat] sha1
826,772 UART: [kat] SHA2-256
829,772 UART: [kat] SHA2-384
835,699 UART: [kat] SHA2-512-ACC
838,641 UART: [kat] ECC-384
3,278,990 UART: [kat] HMAC-384Kdf
3,292,209 UART: [kat] LMS
3,821,680 UART: [kat] --
3,826,468 UART: [cold-reset] ++
3,829,043 UART: [fht] FHT @ 0x50003400
3,839,238 UART: [idev] ++
3,839,823 UART: [idev] CDI.KEYID = 6
3,840,706 UART: [idev] SUBJECT.KEYID = 7
3,841,952 UART: [idev] UDS.KEYID = 0
3,842,857 ready_for_fw is high
3,843,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,454 UART: [idev] Erasing UDS.KEYID = 0
6,317,737 UART: [idev] Sha1 KeyId Algorithm
6,340,693 UART: [idev] --
6,343,556 UART: [ldev] ++
6,344,124 UART: [ldev] CDI.KEYID = 6
6,345,008 UART: [ldev] SUBJECT.KEYID = 5
6,346,171 UART: [ldev] AUTHORITY.KEYID = 7
6,347,454 UART: [ldev] FE.KEYID = 1
6,357,804 UART: [ldev] Erasing FE.KEYID = 1
8,832,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,793 UART: [ldev] --
10,622,933 UART: [fwproc] Wait for Commands...
10,625,414 UART: [fwproc] Recv command 0x46574c44
10,627,454 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,315 >>> mbox cmd response: success
14,491,924 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,495,477 UART: [afmc] ++
14,496,065 UART: [afmc] CDI.KEYID = 6
14,496,958 UART: [afmc] SUBJECT.KEYID = 7
14,498,120 UART: [afmc] AUTHORITY.KEYID = 5
16,996,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,945 UART: [afmc] --
18,793,649 UART: [cold-reset] --
18,797,240 UART: [state] Locking Datavault
18,801,999 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,657 UART: [state] Locking ICCM
18,806,055 UART: [exit] Launching FMC @ 0x40000130
18,814,510 UART:
18,814,748 UART: Running Caliptra FMC ...
18,815,853 UART:
18,816,013 UART: [state] CFI Enabled
18,824,192 UART: [fht] FMC Alias Private Key: 7
20,581,377 UART: [art] Extend RT PCRs Done
20,582,600 UART: [art] Lock RT PCRs Done
20,584,140 UART: [art] Populate DV Done
20,589,442 UART: [fht] FMC Alias Private Key: 7
20,590,978 UART: [art] Derive CDI
20,591,712 UART: [art] Store in in slot 0x4
20,634,195 UART: [art] Derive Key Pair
20,635,235 UART: [art] Store priv key in slot 0x5
23,062,095 UART: [art] Derive Key Pair - Done
23,075,147 UART: [art] Signing Cert with AUTHO
23,076,451 UART: RITY.KEYID = 7
24,781,946 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,444 UART: [art] PUB.X = EA5347C0CDAF90548B270BDEA9ECB9074870743F083861A2A96457ECE260383F8810456BC8D8397C4928F20B2E99CF9B
24,790,709 UART: [art] PUB.Y = FDE82B3E23F74D22A16FE6C3C8C166DE4E3827F33182FFFCCB4F42D26D6D8838DD2797A6A5DA405F318688B87B02EF66
24,798,015 UART: [art] SIG.R = C86E8F6E21F1310589692A205548B4D2CFC3DA2B590BB6DD8738718C156DC83CEBDD6490EFA55EA43BBB574EAB0B2341
24,805,394 UART: [art] SIG.S = 1449C5F4089FB6D293BA176DC6842156885292C734E9020E57B333EF672E4EDA8E1C485BA165E647007E744A7B18D3C1
25,784,236 UART: Caliptra RT
25,784,938 UART: [state] CFI Enabled
25,901,671 UART: [rt] RT listening for mailbox commands...
25,933,573 UART: [rt]cmd =0x44504543, len=92
30,218,183 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,775 writing to cptra_bootfsm_go
3,697,327 ready_for_fw is high
3,697,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,262,322 >>> mbox cmd response: success
14,263,126 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,515,166 UART:
18,515,553 UART: Running Caliptra FMC ...
18,516,663 UART:
18,516,816 UART: [state] CFI Enabled
18,524,491 UART: [fht] FMC Alias Private Key: 7
20,281,640 UART: [art] Extend RT PCRs Done
20,282,873 UART: [art] Lock RT PCRs Done
20,284,420 UART: [art] Populate DV Done
20,289,775 UART: [fht] FMC Alias Private Key: 7
20,291,482 UART: [art] Derive CDI
20,292,223 UART: [art] Store in in slot 0x4
20,334,899 UART: [art] Derive Key Pair
20,335,945 UART: [art] Store priv key in slot 0x5
22,762,235 UART: [art] Derive Key Pair - Done
22,775,404 UART: [art] Signing Cert with AUTHO
22,776,709 UART: RITY.KEYID = 7
24,481,931 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,417 UART: [art] PUB.X = 7D1267FA9627E50A56A1A6018DB06D04B26866E1611B8A676CB1AE3A5AFBC6A27FAFE3560731F77DC153C3F57DFF6327
24,490,744 UART: [art] PUB.Y = 5D30739F419D93EEFC80C19D1EBA8C80F551FAE09D3D85CC85F55A4581A8F4947DA54A95DCD65A41D8EEFFC79937B017
24,498,014 UART: [art] SIG.R = D78220CA2F6FD10485D37A92067FFC7C43D8ACD84C0756A5637A2CF8B571FD4F6A28795D7C1B5FF3C61AA3CB442E87E3
24,505,442 UART: [art] SIG.S = 10EA8A64324FFD7701CFF566593FA4ACEAF8E5DEADF9D45B61FAC84CFEB9297A3B9BA50A7F2DDDA472B3382BB0C92310
25,484,916 UART: Caliptra RT
25,485,635 UART: [state] CFI Enabled
25,602,986 UART: [rt] RT listening for mailbox commands...
25,635,104 UART: [rt]cmd =0x44504543, len=92
29,919,652 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
192,621 UART:
192,997 UART: Running Caliptra ROM ...
194,190 UART:
194,344 UART: [state] CFI Enabled
264,525 UART: [state] LifecycleState = Unprovisioned
266,878 UART: [state] DebugLocked = No
269,403 UART: [state] WD Timer not started. Device not locked for debugging
274,657 UART: [kat] SHA2-256
464,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,339 UART: [kat] ++
475,786 UART: [kat] sha1
486,724 UART: [kat] SHA2-256
489,702 UART: [kat] SHA2-384
496,434 UART: [kat] SHA2-512-ACC
499,021 UART: [kat] ECC-384
2,945,105 UART: [kat] HMAC-384Kdf
2,970,157 UART: [kat] LMS
3,501,893 UART: [kat] --
3,504,970 UART: [cold-reset] ++
3,506,970 UART: [fht] FHT @ 0x50003400
3,517,251 UART: [idev] ++
3,517,919 UART: [idev] CDI.KEYID = 6
3,518,803 UART: [idev] SUBJECT.KEYID = 7
3,520,047 UART: [idev] UDS.KEYID = 0
3,520,950 ready_for_fw is high
3,521,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,453 UART: [idev] Erasing UDS.KEYID = 0
6,026,426 UART: [idev] Sha1 KeyId Algorithm
6,049,753 UART: [idev] --
6,054,194 UART: [ldev] ++
6,054,870 UART: [ldev] CDI.KEYID = 6
6,055,771 UART: [ldev] SUBJECT.KEYID = 5
6,056,979 UART: [ldev] AUTHORITY.KEYID = 7
6,058,154 UART: [ldev] FE.KEYID = 1
6,099,299 UART: [ldev] Erasing FE.KEYID = 1
8,605,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,128 UART: [ldev] --
10,411,565 UART: [fwproc] Wait for Commands...
10,414,586 UART: [fwproc] Recv command 0x46574c44
10,416,891 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,925,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,041,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,581,310 >>> mbox cmd response: success
14,581,895 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,585,235 UART: [afmc] ++
14,585,924 UART: [afmc] CDI.KEYID = 6
14,587,108 UART: [afmc] SUBJECT.KEYID = 7
14,588,604 UART: [afmc] AUTHORITY.KEYID = 5
17,125,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,436 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,472 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,981 UART: [afmc] --
18,925,270 UART: [cold-reset] --
18,928,343 UART: [state] Locking Datavault
18,932,794 UART: [state] Locking PCR0, PCR1 and PCR31
18,934,945 UART: [state] Locking ICCM
18,936,722 UART: [exit] Launching FMC @ 0x40000130
18,945,363 UART:
18,945,602 UART: Running Caliptra FMC ...
18,946,702 UART:
18,946,858 UART: [state] CFI Enabled
19,007,638 UART: [fht] FMC Alias Private Key: 7
20,772,455 UART: [art] Extend RT PCRs Done
20,773,687 UART: [art] Lock RT PCRs Done
20,775,235 UART: [art] Populate DV Done
20,780,748 UART: [fht] FMC Alias Private Key: 7
20,782,385 UART: [art] Derive CDI
20,783,121 UART: [art] Store in in slot 0x4
20,841,325 UART: [art] Derive Key Pair
20,842,385 UART: [art] Store priv key in slot 0x5
23,305,038 UART: [art] Derive Key Pair - Done
23,317,880 UART: [art] Signing Cert with AUTHO
23,319,177 UART: RITY.KEYID = 7
25,030,793 UART: [art] Erasing AUTHORITY.KEYID = 7
25,032,308 UART: [art] PUB.X = 4F53BFE31B969C70576ADCC2194551A5B2A59681644B80F7E9C1B68510A2E2903DB903A0DF94B1AB9D77656489E339A7
25,039,599 UART: [art] PUB.Y = 06DD638BAF0F3DD60890794B9547F6A9CB1E8383F9611E9ACD3104E2E61C7965751B3CB36E2F63FA1F97429AC1A752A8
25,046,814 UART: [art] SIG.R = 38F9B44935150E51D25D357D045596EC7EB58C3A4FA662D997F5FD7F86F0E79325BB35DD7F6267CB3389F40B9EEB9A39
25,054,193 UART: [art] SIG.S = 08279B57087D98EE2E6551ABB44E393580286DCB159D8B7E90FA0DD6F2116679688C66EB54EE784BC5E13AE6F56CF91D
26,033,037 UART: Caliptra RT
26,033,753 UART: [state] CFI Enabled
26,199,505 UART: [rt] RT listening for mailbox commands...
26,231,412 UART: [rt]cmd =0x44504543, len=92
30,592,296 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
3,439,861 ready_for_fw is high
3,440,469 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,732,724 >>> mbox cmd response: success
14,733,453 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,021,646 UART:
19,022,079 UART: Running Caliptra FMC ...
19,023,210 UART:
19,023,365 UART: [state] CFI Enabled
19,094,281 UART: [fht] FMC Alias Private Key: 7
20,858,496 UART: [art] Extend RT PCRs Done
20,859,725 UART: [art] Lock RT PCRs Done
20,861,461 UART: [art] Populate DV Done
20,866,985 UART: [fht] FMC Alias Private Key: 7
20,868,683 UART: [art] Derive CDI
20,869,511 UART: [art] Store in in slot 0x4
20,926,796 UART: [art] Derive Key Pair
20,927,792 UART: [art] Store priv key in slot 0x5
23,390,882 UART: [art] Derive Key Pair - Done
23,403,771 UART: [art] Signing Cert with AUTHO
23,405,073 UART: RITY.KEYID = 7
25,117,270 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,786 UART: [art] PUB.X = A26FE21002C1F1942ABA6542F9C8559914404A8058CAAA13D6B66132C8D17A3CF83D05CC809E61123EBE2EE64D155494
25,126,039 UART: [art] PUB.Y = 11105AC24EF15BB56D163B32E53E3875E7611EF2D5F4B976569A70A34CC32450808CB44BE0016DFA0FBFE97B6CC6D817
25,133,275 UART: [art] SIG.R = 71A6DDE58B6AAA942B36641F36FCEF6C2EF84C12837F1BCDE3E0E7F696B2AACB7868CDBD019F5C7C908D0C532A8A10A5
25,140,686 UART: [art] SIG.S = 6BFB9679EE493EDB75D6F88A3DA3A50C6AED9160A4CEBB1A0F6D5290587EBEAC0D858D390AD59A0FC5E294D1ABF4E138
26,119,974 UART: Caliptra RT
26,120,687 UART: [state] CFI Enabled
26,286,352 UART: [rt] RT listening for mailbox commands...
26,318,465 UART: [rt]cmd =0x44504543, len=92
30,678,649 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,687 writing to cptra_bootfsm_go
192,976 UART:
193,354 UART: Running Caliptra ROM ...
194,452 UART:
604,011 UART: [state] CFI Enabled
617,241 UART: [state] LifecycleState = Unprovisioned
619,611 UART: [state] DebugLocked = No
621,231 UART: [state] WD Timer not started. Device not locked for debugging
625,201 UART: [kat] SHA2-256
815,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,820 UART: [kat] ++
826,337 UART: [kat] sha1
836,994 UART: [kat] SHA2-256
840,005 UART: [kat] SHA2-384
846,644 UART: [kat] SHA2-512-ACC
849,293 UART: [kat] ECC-384
3,294,212 UART: [kat] HMAC-384Kdf
3,306,950 UART: [kat] LMS
3,838,786 UART: [kat] --
3,844,342 UART: [cold-reset] ++
3,845,707 UART: [fht] FHT @ 0x50003400
3,857,625 UART: [idev] ++
3,858,378 UART: [idev] CDI.KEYID = 6
3,859,319 UART: [idev] SUBJECT.KEYID = 7
3,860,499 UART: [idev] UDS.KEYID = 0
3,861,425 ready_for_fw is high
3,861,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,749 UART: [idev] Erasing UDS.KEYID = 0
6,339,245 UART: [idev] Sha1 KeyId Algorithm
6,361,661 UART: [idev] --
6,367,490 UART: [ldev] ++
6,368,230 UART: [ldev] CDI.KEYID = 6
6,369,113 UART: [ldev] SUBJECT.KEYID = 5
6,370,210 UART: [ldev] AUTHORITY.KEYID = 7
6,371,495 UART: [ldev] FE.KEYID = 1
6,381,900 UART: [ldev] Erasing FE.KEYID = 1
8,861,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,658 UART: [ldev] --
10,651,393 UART: [fwproc] Wait for Commands...
10,652,985 UART: [fwproc] Recv command 0x46574c44
10,655,252 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,841 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,827,942 >>> mbox cmd response: success
14,828,521 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,831,630 UART: [afmc] ++
14,832,329 UART: [afmc] CDI.KEYID = 6
14,833,576 UART: [afmc] SUBJECT.KEYID = 7
14,835,019 UART: [afmc] AUTHORITY.KEYID = 5
17,337,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,075 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,567 UART: [afmc] --
19,136,090 UART: [cold-reset] --
19,138,563 UART: [state] Locking Datavault
19,145,126 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,278 UART: [state] Locking ICCM
19,148,677 UART: [exit] Launching FMC @ 0x40000130
19,157,303 UART:
19,157,542 UART: Running Caliptra FMC ...
19,158,642 UART:
19,158,801 UART: [state] CFI Enabled
19,166,849 UART: [fht] FMC Alias Private Key: 7
20,923,641 UART: [art] Extend RT PCRs Done
20,924,860 UART: [art] Lock RT PCRs Done
20,926,490 UART: [art] Populate DV Done
20,932,016 UART: [fht] FMC Alias Private Key: 7
20,933,559 UART: [art] Derive CDI
20,934,377 UART: [art] Store in in slot 0x4
20,977,463 UART: [art] Derive Key Pair
20,978,508 UART: [art] Store priv key in slot 0x5
23,405,980 UART: [art] Derive Key Pair - Done
23,419,078 UART: [art] Signing Cert with AUTHO
23,420,389 UART: RITY.KEYID = 7
25,125,896 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,402 UART: [art] PUB.X = AA0C6CCBF494E73BBFFA024AD0C979BC213435DA027665152CD5335A22FAB40455DC251D5CFE138E80D44BC19AB16E9E
25,134,708 UART: [art] PUB.Y = 650BE19973A6B4B0EF1B02176F1CED1F7CBF7289805E457ECC80C1F77ACB0A73A67636254259BF661ABF787DB63AFF1F
25,141,976 UART: [art] SIG.R = 5919AAE728992D7840864C9F16EC684C4AB8FF7D3FA633C5D211CE2C1D895C3B2F5C532063268844F96E381F77D1D6EB
25,149,334 UART: [art] SIG.S = 60CB6FA051B9441401FAFB30E3E81323F17AB3FC6337070FDCA3F46B4ADD088EBFF9BB4FD44AE7CCF036DB7B8CE09DF4
26,128,542 UART: Caliptra RT
26,129,253 UART: [state] CFI Enabled
26,246,325 UART: [rt] RT listening for mailbox commands...
26,278,323 UART: [rt]cmd =0x44504543, len=92
30,563,530 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,734 writing to cptra_bootfsm_go
3,757,329 ready_for_fw is high
3,757,710 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,955,322 >>> mbox cmd response: success
14,955,965 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,209,134 UART:
19,209,512 UART: Running Caliptra FMC ...
19,210,657 UART:
19,210,819 UART: [state] CFI Enabled
19,218,722 UART: [fht] FMC Alias Private Key: 7
20,976,684 UART: [art] Extend RT PCRs Done
20,977,911 UART: [art] Lock RT PCRs Done
20,979,108 UART: [art] Populate DV Done
20,984,528 UART: [fht] FMC Alias Private Key: 7
20,986,071 UART: [art] Derive CDI
20,986,841 UART: [art] Store in in slot 0x4
21,029,548 UART: [art] Derive Key Pair
21,030,557 UART: [art] Store priv key in slot 0x5
23,456,868 UART: [art] Derive Key Pair - Done
23,469,429 UART: [art] Signing Cert with AUTHO
23,470,742 UART: RITY.KEYID = 7
25,176,274 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,780 UART: [art] PUB.X = EF994E35C680CDF30BC3CA26A62DB9D1263CD7F7C9EBB6CDBC9B127116AC382EC9424FB2157BA6D79C1F879CB1F67357
25,185,108 UART: [art] PUB.Y = C77F6DB9DDFF5FC114E8BA42368773545B40FCC546031CED6622231D31D08C6C91ACC5FC1BA8762FD36A05F155EB66E4
25,192,388 UART: [art] SIG.R = 4CC81FCE9EDBC0BBE53EB7CE7D19C22EA7DC5DA075E0DF19C940236910B2C1E903441BF9F3B01621020E0B3666AC0E75
25,199,811 UART: [art] SIG.S = CB95724F701A14AA74F97E43E67E2660553F0737630ECE3C8767FD37A99609A3F3692682B010E4541E95B275BD13C394
26,178,718 UART: Caliptra RT
26,179,414 UART: [state] CFI Enabled
26,296,209 UART: [rt] RT listening for mailbox commands...
26,328,161 UART: [rt]cmd =0x44504543, len=92
30,612,032 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,961 UART: [kat] SHA2-256
881,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,007 UART: [kat] ++
886,159 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,580 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,129 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,942 UART: [idev] Erasing UDS.KEYID = 0
1,504,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,310 UART: [idev] --
1,514,385 UART: [ldev] ++
1,514,553 UART: [ldev] CDI.KEYID = 6
1,514,916 UART: [ldev] SUBJECT.KEYID = 5
1,515,342 UART: [ldev] AUTHORITY.KEYID = 7
1,515,805 UART: [ldev] FE.KEYID = 1
1,521,277 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,372 UART: [ldev] --
1,585,829 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 114084 bytes
2,881,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,096 >>> mbox cmd response: success
3,073,096 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,074,350 UART: [afmc] ++
3,074,518 UART: [afmc] CDI.KEYID = 6
3,074,880 UART: [afmc] SUBJECT.KEYID = 7
3,075,305 UART: [afmc] AUTHORITY.KEYID = 5
3,110,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,261 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,951 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,018 UART: [afmc] --
3,154,042 UART: [cold-reset] --
3,154,816 UART: [state] Locking Datavault
3,155,881 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,485 UART: [state] Locking ICCM
3,156,939 UART: [exit] Launching FMC @ 0x40000130
3,162,268 UART:
3,162,284 UART: Running Caliptra FMC ...
3,162,692 UART:
3,162,746 UART: [state] CFI Enabled
3,173,553 UART: [fht] FMC Alias Private Key: 7
3,281,180 UART: [art] Extend RT PCRs Done
3,281,608 UART: [art] Lock RT PCRs Done
3,282,880 UART: [art] Populate DV Done
3,291,015 UART: [fht] FMC Alias Private Key: 7
3,292,065 UART: [art] Derive CDI
3,292,345 UART: [art] Store in in slot 0x4
3,378,036 UART: [art] Derive Key Pair
3,378,396 UART: [art] Store priv key in slot 0x5
3,391,408 UART: [art] Derive Key Pair - Done
3,406,412 UART: [art] Signing Cert with AUTHO
3,406,892 UART: RITY.KEYID = 7
3,421,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,671 UART: [art] PUB.X = 9C6695088BEA6B2B6AF680D26F22EC49AAA546A5A6CD3CD31BB4459BD6F6F74537749F4B773A7A1F3FFD5CFB653E520F
3,429,453 UART: [art] PUB.Y = 1EF9CAD245877EB1A576F02374E4A0C489C85921120FA16ABF3E377D841593BC05C6F4425EFA3BB1CDF784EAADF35EFE
3,436,415 UART: [art] SIG.R = FC27AB788AC26D5A577E6AEB119A6BF7528548BEE2C7CF7AA3925E5F609DEA09AE2A5C65959AA8225ECCA4ACBFB22BCF
3,443,212 UART: [art] SIG.S = BC73A2A2173A7C0AF1A670E3C54AD984A5DB6E0C42B92EB9508BF16D607B16684793395CDA2321FDB5F90B29301117F2
3,466,946 UART: Caliptra RT
3,467,199 UART: [state] CFI Enabled
3,575,049 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,153 UART: [rt]cmd =0x44504543, len=92
3,789,549 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,755 ready_for_fw is high
1,362,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,640 >>> mbox cmd response: success
2,926,640 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,989,284 UART:
2,989,300 UART: Running Caliptra FMC ...
2,989,708 UART:
2,989,762 UART: [state] CFI Enabled
3,000,005 UART: [fht] FMC Alias Private Key: 7
3,107,980 UART: [art] Extend RT PCRs Done
3,108,408 UART: [art] Lock RT PCRs Done
3,109,906 UART: [art] Populate DV Done
3,117,895 UART: [fht] FMC Alias Private Key: 7
3,119,027 UART: [art] Derive CDI
3,119,307 UART: [art] Store in in slot 0x4
3,204,638 UART: [art] Derive Key Pair
3,204,998 UART: [art] Store priv key in slot 0x5
3,218,074 UART: [art] Derive Key Pair - Done
3,232,569 UART: [art] Signing Cert with AUTHO
3,233,049 UART: RITY.KEYID = 7
3,248,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,908 UART: [art] PUB.X = 57B51EB0058D346775A60EBC0D6D71E73AA4F4AD60B2C9915BF3C9AABC2732EA709F8B17C97F55B3FC3C2CB01F1409A4
3,255,682 UART: [art] PUB.Y = 52ECB8BD4BBDF5E645A81D21271826CEC825F4ABCF3070C399825858F2785D6875ACB7948279C742386716EE65899904
3,262,625 UART: [art] SIG.R = 3062C0A5C9CB2EEFE01A70CAEECD65D295E8C216CD9BE094F9B4D38D7B70525BBEF0CF9A029CA4F890523C1796290ED3
3,269,409 UART: [art] SIG.S = FA88D1C1383B838743067AF07C10CCB53D447ACE04E7CC02A780E8C67002DCDB45412C475DE9588665B39DCDA50CBA0B
3,293,120 UART: Caliptra RT
3,293,373 UART: [state] CFI Enabled
3,401,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,206 UART: [rt]cmd =0x44504543, len=92
3,615,380 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,498 UART: [kat] SHA2-256
882,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,544 UART: [kat] ++
886,696 UART: [kat] sha1
891,018 UART: [kat] SHA2-256
892,956 UART: [kat] SHA2-384
895,677 UART: [kat] SHA2-512-ACC
897,578 UART: [kat] ECC-384
903,583 UART: [kat] HMAC-384Kdf
908,095 UART: [kat] LMS
1,476,291 UART: [kat] --
1,477,364 UART: [cold-reset] ++
1,477,728 UART: [fht] Storing FHT @ 0x50003400
1,480,461 UART: [idev] ++
1,480,629 UART: [idev] CDI.KEYID = 6
1,480,989 UART: [idev] SUBJECT.KEYID = 7
1,481,413 UART: [idev] UDS.KEYID = 0
1,481,758 ready_for_fw is high
1,481,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,395 UART: [idev] --
1,515,392 UART: [ldev] ++
1,515,560 UART: [ldev] CDI.KEYID = 6
1,515,923 UART: [ldev] SUBJECT.KEYID = 5
1,516,349 UART: [ldev] AUTHORITY.KEYID = 7
1,516,812 UART: [ldev] FE.KEYID = 1
1,522,232 UART: [ldev] Erasing FE.KEYID = 1
1,547,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,561 UART: [ldev] --
1,586,878 UART: [fwproc] Waiting for Commands...
1,587,571 UART: [fwproc] Received command 0x46574c44
1,588,362 UART: [fwproc] Received Image of size 114084 bytes
2,882,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,624 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,557 >>> mbox cmd response: success
3,075,557 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,076,679 UART: [afmc] ++
3,076,847 UART: [afmc] CDI.KEYID = 6
3,077,209 UART: [afmc] SUBJECT.KEYID = 7
3,077,634 UART: [afmc] AUTHORITY.KEYID = 5
3,113,055 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,684 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,374 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,061 UART: [afmc] --
3,156,015 UART: [cold-reset] --
3,156,725 UART: [state] Locking Datavault
3,157,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,206 UART: [state] Locking ICCM
3,158,822 UART: [exit] Launching FMC @ 0x40000130
3,164,151 UART:
3,164,167 UART: Running Caliptra FMC ...
3,164,575 UART:
3,164,718 UART: [state] CFI Enabled
3,175,053 UART: [fht] FMC Alias Private Key: 7
3,283,070 UART: [art] Extend RT PCRs Done
3,283,498 UART: [art] Lock RT PCRs Done
3,285,100 UART: [art] Populate DV Done
3,293,221 UART: [fht] FMC Alias Private Key: 7
3,294,237 UART: [art] Derive CDI
3,294,517 UART: [art] Store in in slot 0x4
3,380,340 UART: [art] Derive Key Pair
3,380,700 UART: [art] Store priv key in slot 0x5
3,394,838 UART: [art] Derive Key Pair - Done
3,409,254 UART: [art] Signing Cert with AUTHO
3,409,734 UART: RITY.KEYID = 7
3,424,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,751 UART: [art] PUB.X = EF2238756B9A874A64A077DAD9F0599585F09A88AEE1AA45B743F288E8EF56C3D79C8920D73153B18C727B1CCE20DF46
3,432,527 UART: [art] PUB.Y = 5EA2AD2486B213C2CCE37AC83B6A7C05BC3201F7EEDD4B5D3AD853F3D64390B281F918442064D20BFCF3071B9365E182
3,439,475 UART: [art] SIG.R = F4D63F001B336A46DB34F975C954395B52C41E4C938DF17BE3858D641C9A5201F6B8B199399DBDC0AD8B6EC3E8E48538
3,446,226 UART: [art] SIG.S = 5798F5CF7A7D21BAAFE2AECEA2D6809B973164A40650DD7EC164ECE00F921211AF8AD511BF9ACF41991A1BA1711653BD
3,469,899 UART: Caliptra RT
3,470,244 UART: [state] CFI Enabled
3,577,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,177 UART: [rt]cmd =0x44504543, len=92
3,793,444 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,292 ready_for_fw is high
1,363,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,163 >>> mbox cmd response: success
2,924,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,986,145 UART:
2,986,161 UART: Running Caliptra FMC ...
2,986,569 UART:
2,986,712 UART: [state] CFI Enabled
2,997,453 UART: [fht] FMC Alias Private Key: 7
3,105,666 UART: [art] Extend RT PCRs Done
3,106,094 UART: [art] Lock RT PCRs Done
3,107,694 UART: [art] Populate DV Done
3,115,865 UART: [fht] FMC Alias Private Key: 7
3,116,949 UART: [art] Derive CDI
3,117,229 UART: [art] Store in in slot 0x4
3,202,812 UART: [art] Derive Key Pair
3,203,172 UART: [art] Store priv key in slot 0x5
3,216,226 UART: [art] Derive Key Pair - Done
3,231,160 UART: [art] Signing Cert with AUTHO
3,231,640 UART: RITY.KEYID = 7
3,247,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,927 UART: [art] PUB.X = 3025D09BB57B4B17E3331B07C613639DDDB3DC635D1ECA22F8E0E78388357524D5E20CE330A98F42DA378D5B2EC2AD7F
3,254,701 UART: [art] PUB.Y = 5ED0FF8FBE58DB072208B7F56DFBA0A55D1481E695072A2B7EAD8D8C6E6B72EAD47A4DE1ED0B0D0612E667F04F807471
3,261,651 UART: [art] SIG.R = E6FA1CEE5EC70DA8CAD7812E2FE7AF05FE1C2DCBE7970E69782FAE840731B7CB54CC56D1AEC1CFB431067B58F34B8263
3,268,432 UART: [art] SIG.S = 47C80635D6757B9D6235EBC65D6CB5F037B3D7FA881835819AB406C638BD3F81EF3B7F335CB7D05EE9FD36A1F35A0B12
3,292,724 UART: Caliptra RT
3,293,069 UART: [state] CFI Enabled
3,402,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,536 UART: [rt]cmd =0x44504543, len=92
3,617,618 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,808 UART: [kat] SHA2-512-ACC
908,709 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,079 UART: [cold-reset] ++
1,172,641 UART: [fht] FHT @ 0x50003400
1,175,496 UART: [idev] ++
1,175,664 UART: [idev] CDI.KEYID = 6
1,176,024 UART: [idev] SUBJECT.KEYID = 7
1,176,448 UART: [idev] UDS.KEYID = 0
1,176,793 ready_for_fw is high
1,176,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,432 UART: [idev] Erasing UDS.KEYID = 0
1,201,055 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,559 UART: [ldev] ++
1,210,727 UART: [ldev] CDI.KEYID = 6
1,211,090 UART: [ldev] SUBJECT.KEYID = 5
1,211,516 UART: [ldev] AUTHORITY.KEYID = 7
1,211,979 UART: [ldev] FE.KEYID = 1
1,216,893 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,169 UART: [ldev] --
1,282,596 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,595 >>> mbox cmd response: success
2,771,595 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,772,829 UART: [afmc] ++
2,772,997 UART: [afmc] CDI.KEYID = 6
2,773,359 UART: [afmc] SUBJECT.KEYID = 7
2,773,784 UART: [afmc] AUTHORITY.KEYID = 5
2,809,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,292 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,714 UART: [afmc] --
2,852,666 UART: [cold-reset] --
2,853,394 UART: [state] Locking Datavault
2,854,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,149 UART: [state] Locking ICCM
2,855,817 UART: [exit] Launching FMC @ 0x40000130
2,861,146 UART:
2,861,162 UART: Running Caliptra FMC ...
2,861,570 UART:
2,861,624 UART: [state] CFI Enabled
2,872,161 UART: [fht] FMC Alias Private Key: 7
2,979,750 UART: [art] Extend RT PCRs Done
2,980,178 UART: [art] Lock RT PCRs Done
2,981,822 UART: [art] Populate DV Done
2,990,305 UART: [fht] FMC Alias Private Key: 7
2,991,437 UART: [art] Derive CDI
2,991,717 UART: [art] Store in in slot 0x4
3,077,358 UART: [art] Derive Key Pair
3,077,718 UART: [art] Store priv key in slot 0x5
3,090,956 UART: [art] Derive Key Pair - Done
3,105,578 UART: [art] Signing Cert with AUTHO
3,106,058 UART: RITY.KEYID = 7
3,121,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,141 UART: [art] PUB.X = B71E172906FA3305EBBE7ECF7A66C4BD57D90283C3ADD5D73EF76A8992AB3E86E33E96F3996438CF3550A7A103E0C8DB
3,128,913 UART: [art] PUB.Y = 47229CD004A8E5F58F0AC1232B51E1840F1CF65C26358A7156CCB9E96D3352F04AA907C77D8B08475A61BAA2591D678C
3,135,850 UART: [art] SIG.R = 753B9D86AF25725388831C6645B6C4DA47B5335DE8321495CB4949C41DE823A7F5AB9AF25661D53590CC00E526ADE285
3,142,596 UART: [art] SIG.S = DCFB53152BC50501442F2CB541FB7294E7507E1F0974F5F6ADB0349A662B6DF5DDE6A2941E13700ED868D1941FDC07D5
3,166,778 UART: Caliptra RT
3,167,031 UART: [state] CFI Enabled
3,275,286 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,448 UART: [rt]cmd =0x44504543, len=92
3,489,702 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 ready_for_fw is high
1,060,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,708 >>> mbox cmd response: success
2,622,708 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,684,078 UART:
2,684,094 UART: Running Caliptra FMC ...
2,684,502 UART:
2,684,556 UART: [state] CFI Enabled
2,695,187 UART: [fht] FMC Alias Private Key: 7
2,802,348 UART: [art] Extend RT PCRs Done
2,802,776 UART: [art] Lock RT PCRs Done
2,804,626 UART: [art] Populate DV Done
2,813,207 UART: [fht] FMC Alias Private Key: 7
2,814,329 UART: [art] Derive CDI
2,814,609 UART: [art] Store in in slot 0x4
2,900,194 UART: [art] Derive Key Pair
2,900,554 UART: [art] Store priv key in slot 0x5
2,913,468 UART: [art] Derive Key Pair - Done
2,928,122 UART: [art] Signing Cert with AUTHO
2,928,602 UART: RITY.KEYID = 7
2,944,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,037 UART: [art] PUB.X = F609F5028CC671A52B50FAD6C1C179E862107DA13D43D38E816E4F7055A723D258666ADBB5127DFCF351D4382D94DF4D
2,951,807 UART: [art] PUB.Y = AEA0E4FD2166C8B3C3E77E0A00C3731076167CD3040C933DAF3D8B6B12FA0CB44C7C936C82D723AF0FCFB3512B7FDC10
2,958,738 UART: [art] SIG.R = 50FEB703660250445D0F95A6AE229B764F04A4FFBA184099ABDE9B48F27EC7613427EF99567EAE16C2D0763C926776C0
2,965,498 UART: [art] SIG.S = C6B49CA54FF5AAC3A91B51EFCEDA80FE9AD0413729501C195AF2310AD62689DB3C4F576931FC1359AEAD8E287F6B2E77
2,989,336 UART: Caliptra RT
2,989,589 UART: [state] CFI Enabled
3,096,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,024 UART: [rt]cmd =0x44504543, len=92
3,310,509 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,633 UART: [kat] HMAC-384Kdf
923,353 UART: [kat] LMS
1,171,681 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 ready_for_fw is high
1,176,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,669 UART: [idev] Erasing UDS.KEYID = 0
1,202,022 UART: [idev] Sha1 KeyId Algorithm
1,210,516 UART: [idev] --
1,211,460 UART: [ldev] ++
1,211,628 UART: [ldev] CDI.KEYID = 6
1,211,991 UART: [ldev] SUBJECT.KEYID = 5
1,212,417 UART: [ldev] AUTHORITY.KEYID = 7
1,212,880 UART: [ldev] FE.KEYID = 1
1,218,256 UART: [ldev] Erasing FE.KEYID = 1
1,244,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,206 UART: [ldev] --
1,283,657 UART: [fwproc] Wait for Commands...
1,284,241 UART: [fwproc] Recv command 0x46574c44
1,284,969 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,810 >>> mbox cmd response: success
2,770,810 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,772,026 UART: [afmc] ++
2,772,194 UART: [afmc] CDI.KEYID = 6
2,772,556 UART: [afmc] SUBJECT.KEYID = 7
2,772,981 UART: [afmc] AUTHORITY.KEYID = 5
2,808,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,263 UART: [afmc] --
2,852,325 UART: [cold-reset] --
2,853,049 UART: [state] Locking Datavault
2,854,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,948 UART: [state] Locking ICCM
2,855,542 UART: [exit] Launching FMC @ 0x40000130
2,860,871 UART:
2,860,887 UART: Running Caliptra FMC ...
2,861,295 UART:
2,861,438 UART: [state] CFI Enabled
2,872,125 UART: [fht] FMC Alias Private Key: 7
2,979,724 UART: [art] Extend RT PCRs Done
2,980,152 UART: [art] Lock RT PCRs Done
2,981,602 UART: [art] Populate DV Done
2,989,811 UART: [fht] FMC Alias Private Key: 7
2,990,759 UART: [art] Derive CDI
2,991,039 UART: [art] Store in in slot 0x4
3,076,692 UART: [art] Derive Key Pair
3,077,052 UART: [art] Store priv key in slot 0x5
3,090,694 UART: [art] Derive Key Pair - Done
3,105,380 UART: [art] Signing Cert with AUTHO
3,105,860 UART: RITY.KEYID = 7
3,120,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,703 UART: [art] PUB.X = 9A99BFF7EC4672CAC263DEEDAD50CEAE3168D4C533C6ED4F5C9B99E9AE3A89F5A058FB990A329C11B27765C75910D9CF
3,128,492 UART: [art] PUB.Y = 4C9BAFE95BBACCF383A947A81BF642E8F5126BB9E85C285AFE8C307F372A70040583BCE85A0A57B11883577979C702FA
3,135,440 UART: [art] SIG.R = 01D9C12704EA9ECF057BBA5B362A2BC4FB0B23890B34E89869A457E3653213393544D28F358F01C2A895F7D224FDA998
3,142,192 UART: [art] SIG.S = AF292EBA4D64AF350F57627CEB3790CE96450F8152194EAE2378789499ECBC17CBB50FCF862FE2C925D1CD2C85353B6F
3,166,428 UART: Caliptra RT
3,166,773 UART: [state] CFI Enabled
3,274,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,334 UART: [rt]cmd =0x44504543, len=92
3,489,842 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,818 ready_for_fw is high
1,060,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,579 >>> mbox cmd response: success
2,624,579 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,686,587 UART:
2,686,603 UART: Running Caliptra FMC ...
2,687,011 UART:
2,687,154 UART: [state] CFI Enabled
2,697,439 UART: [fht] FMC Alias Private Key: 7
2,805,098 UART: [art] Extend RT PCRs Done
2,805,526 UART: [art] Lock RT PCRs Done
2,807,102 UART: [art] Populate DV Done
2,815,007 UART: [fht] FMC Alias Private Key: 7
2,816,075 UART: [art] Derive CDI
2,816,355 UART: [art] Store in in slot 0x4
2,902,150 UART: [art] Derive Key Pair
2,902,510 UART: [art] Store priv key in slot 0x5
2,916,092 UART: [art] Derive Key Pair - Done
2,930,878 UART: [art] Signing Cert with AUTHO
2,931,358 UART: RITY.KEYID = 7
2,946,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,267 UART: [art] PUB.X = 8BE1989F062186EF3BC52FFD13B8A9BC51618BB6EB1D95CA162CACEB2BE25DCC2417491C5965E6781C93EA4A163E0748
2,954,045 UART: [art] PUB.Y = D3917C78FFD00EFD3F5CB5C0350623E2CA580B060633A76B4C938CE7586527467BB820596A453CE3D12C33884E82C764
2,960,978 UART: [art] SIG.R = F4845DACE6BCD456AFEC10323CA7A7226453EF1929D8DC0DEC0F7858C3AF5EC926A64F25966AC5E8F175A8A56705B9E9
2,967,755 UART: [art] SIG.S = 3009C0000F2BE2D6679B84D63D8E187CDFEBCA49870CE005BCFE9DE661EE0883BBE409B912A62D639F8C832E2F347A66
2,991,722 UART: Caliptra RT
2,992,067 UART: [state] CFI Enabled
3,099,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,934 UART: [rt]cmd =0x44504543, len=92
3,313,856 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,707 UART: [kat] ++
895,859 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,962 UART: [kat] LMS
1,169,274 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,235 UART: [idev] Erasing UDS.KEYID = 0
1,198,723 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,324 UART: [ldev] ++
1,208,492 UART: [ldev] CDI.KEYID = 6
1,208,856 UART: [ldev] SUBJECT.KEYID = 5
1,209,283 UART: [ldev] AUTHORITY.KEYID = 7
1,209,746 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,130 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,247 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,639 >>> mbox cmd response: success
2,768,639 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,769,656 UART: [afmc] ++
2,769,824 UART: [afmc] CDI.KEYID = 6
2,770,187 UART: [afmc] SUBJECT.KEYID = 7
2,770,613 UART: [afmc] AUTHORITY.KEYID = 5
2,805,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,549 UART: [afmc] --
2,849,619 UART: [cold-reset] --
2,850,739 UART: [state] Locking Datavault
2,851,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,474 UART: [state] Locking ICCM
2,852,918 UART: [exit] Launching FMC @ 0x40000130
2,858,247 UART:
2,858,263 UART: Running Caliptra FMC ...
2,858,671 UART:
2,858,725 UART: [state] CFI Enabled
2,868,852 UART: [fht] FMC Alias Private Key: 7
2,976,973 UART: [art] Extend RT PCRs Done
2,977,401 UART: [art] Lock RT PCRs Done
2,979,117 UART: [art] Populate DV Done
2,987,432 UART: [fht] FMC Alias Private Key: 7
2,988,422 UART: [art] Derive CDI
2,988,702 UART: [art] Store in in slot 0x4
3,073,835 UART: [art] Derive Key Pair
3,074,195 UART: [art] Store priv key in slot 0x5
3,087,031 UART: [art] Derive Key Pair - Done
3,101,755 UART: [art] Signing Cert with AUTHO
3,102,235 UART: RITY.KEYID = 7
3,116,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,710 UART: [art] PUB.X = C2F04A9F460F8055D97A9582C99272805D99103E5737F56B2254E121D94D995EA664AF851D1CF85A8EEC72971E94E79A
3,124,473 UART: [art] PUB.Y = 93FA3DBE983600EFDD86B018D24809719136B3C0F6BFFF153CAA4C2DC8441C79077E71F1F28797776CDE4FF572BE9B62
3,131,405 UART: [art] SIG.R = 64A49B654787919734D462008B1499A40188224DCB4A8D348F133D5CD8FFF07CEDA2B7CEB0DF8DB1921FE65139E110CE
3,138,156 UART: [art] SIG.S = 6348977D34518E3044064EBBACF4A254826A8AAF64ACE222AF701412F50813D5F273CD4EB38FCF71AD05F6B4005B37D3
3,161,492 UART: Caliptra RT
3,161,745 UART: [state] CFI Enabled
3,269,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,700 UART: [rt]cmd =0x44504543, len=92
3,483,513 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,128 ready_for_fw is high
1,056,128 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,799 >>> mbox cmd response: success
2,618,799 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,680,899 UART:
2,680,915 UART: Running Caliptra FMC ...
2,681,323 UART:
2,681,377 UART: [state] CFI Enabled
2,692,230 UART: [fht] FMC Alias Private Key: 7
2,800,475 UART: [art] Extend RT PCRs Done
2,800,903 UART: [art] Lock RT PCRs Done
2,802,521 UART: [art] Populate DV Done
2,810,754 UART: [fht] FMC Alias Private Key: 7
2,811,768 UART: [art] Derive CDI
2,812,048 UART: [art] Store in in slot 0x4
2,897,229 UART: [art] Derive Key Pair
2,897,589 UART: [art] Store priv key in slot 0x5
2,910,125 UART: [art] Derive Key Pair - Done
2,924,944 UART: [art] Signing Cert with AUTHO
2,925,424 UART: RITY.KEYID = 7
2,940,520 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,285 UART: [art] PUB.X = 97E10A1CFC71B3C2A5180295C1A299EB9B0B311A8E81D8ECDA7BD67CC45C1F1ADEECEBE9207A01216DC5F2D78ED2A129
2,948,067 UART: [art] PUB.Y = A667B3758F7DC902D4898D3548BE20F7678E026192FC2E73E57B6B3264E6F3E5FE4DB0320F8F882197F31D2C3674CDF4
2,955,010 UART: [art] SIG.R = 18AAFE0A849D44AE589F8535AC160B159E2B60F3546009E44D6D0B60FBC9F74D543D0B405D937E745B7DFA3AEB527703
2,961,770 UART: [art] SIG.S = D3F0FB07A15A8F8A5241648999F7317FF6F2A3B6E9308FBA4DC2C6F96DAD5107C494981523A64F3F8B311AB8D9BBD792
2,985,753 UART: Caliptra RT
2,986,006 UART: [state] CFI Enabled
3,094,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,443 UART: [rt]cmd =0x44504543, len=92
3,308,899 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,927 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,183 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x46574c44
1,283,733 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,154 >>> mbox cmd response: success
2,771,154 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,772,265 UART: [afmc] ++
2,772,433 UART: [afmc] CDI.KEYID = 6
2,772,796 UART: [afmc] SUBJECT.KEYID = 7
2,773,222 UART: [afmc] AUTHORITY.KEYID = 5
2,809,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,188 UART: [afmc] --
2,853,294 UART: [cold-reset] --
2,853,948 UART: [state] Locking Datavault
2,854,875 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,479 UART: [state] Locking ICCM
2,856,053 UART: [exit] Launching FMC @ 0x40000130
2,861,382 UART:
2,861,398 UART: Running Caliptra FMC ...
2,861,806 UART:
2,861,949 UART: [state] CFI Enabled
2,872,680 UART: [fht] FMC Alias Private Key: 7
2,980,141 UART: [art] Extend RT PCRs Done
2,980,569 UART: [art] Lock RT PCRs Done
2,982,023 UART: [art] Populate DV Done
2,990,392 UART: [fht] FMC Alias Private Key: 7
2,991,520 UART: [art] Derive CDI
2,991,800 UART: [art] Store in in slot 0x4
3,077,119 UART: [art] Derive Key Pair
3,077,479 UART: [art] Store priv key in slot 0x5
3,091,261 UART: [art] Derive Key Pair - Done
3,105,876 UART: [art] Signing Cert with AUTHO
3,106,356 UART: RITY.KEYID = 7
3,121,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,525 UART: [art] PUB.X = 4BFCA1260DF5BE74BDB4AC3D5F8C11B8358E8DF95BE74A93A363977D31A6531C3BF5EF6D1664DDEC064ECABACAA08AE5
3,129,319 UART: [art] PUB.Y = 879AF5B54F30380D3D54E693ABC9BA429F1F88DEF78EB926DE3DF721AB7CFE404AA536FAE6263978C580B460FDD0355D
3,136,282 UART: [art] SIG.R = 3E44B5EFF39D953AC4F19A648CB0FEF043F7AD05A24DD9D9AE1FD74CB9C2F741C26486FFDB60A0E97CA1DA0789711CCF
3,143,072 UART: [art] SIG.S = 1CB3819634EE1A7CE5D1B612ECBE88976F04CF4FE907FB8B3973EB2C53990FFD4F734F0F8B4A5572BD9257871CE72F66
3,167,423 UART: Caliptra RT
3,167,768 UART: [state] CFI Enabled
3,275,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,857 UART: [rt]cmd =0x44504543, len=92
3,490,764 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,483 ready_for_fw is high
1,056,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,780 >>> mbox cmd response: success
2,619,780 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,681,830 UART:
2,681,846 UART: Running Caliptra FMC ...
2,682,254 UART:
2,682,397 UART: [state] CFI Enabled
2,693,010 UART: [fht] FMC Alias Private Key: 7
2,801,189 UART: [art] Extend RT PCRs Done
2,801,617 UART: [art] Lock RT PCRs Done
2,802,907 UART: [art] Populate DV Done
2,811,080 UART: [fht] FMC Alias Private Key: 7
2,812,200 UART: [art] Derive CDI
2,812,480 UART: [art] Store in in slot 0x4
2,898,307 UART: [art] Derive Key Pair
2,898,667 UART: [art] Store priv key in slot 0x5
2,911,757 UART: [art] Derive Key Pair - Done
2,926,404 UART: [art] Signing Cert with AUTHO
2,926,884 UART: RITY.KEYID = 7
2,941,670 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,435 UART: [art] PUB.X = E921FE37BA39DDF3A8740D1FA4CB14BE63E6C4ADDAF3F270921D87B5444F6DB80BADDAFAE8479CB294333E23E3DD4B5E
2,949,227 UART: [art] PUB.Y = F8B13333CA6CFABB53E017978D3FD4A4F6DA14782545839A061B65B02016176CEBB3B503902B60F9CBFAC3B7E7339348
2,956,177 UART: [art] SIG.R = 23EE2871921EC06DF645D6CCEB35B64C798EFB08E38826E12E9A26CD32D1A3DC28D05EDF76752075235075F0FB7D7BA6
2,962,954 UART: [art] SIG.S = 9303DFC61E954240F6CE80FE940DBC4CB8A56A2AA30DCF015C2F03A5CF2FBB9ED7AE92783A12AB87F2555B6516EA80E8
2,986,366 UART: Caliptra RT
2,986,711 UART: [state] CFI Enabled
3,095,360 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,550 UART: [rt]cmd =0x44504543, len=92
3,309,345 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,141 UART:
192,506 UART: Running Caliptra ROM ...
193,589 UART:
193,737 UART: [state] CFI Enabled
265,032 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
269,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,141 UART: [kat] SHA2-256
443,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,399 UART: [kat] ++
454,848 UART: [kat] sha1
465,223 UART: [kat] SHA2-256
467,948 UART: [kat] SHA2-384
474,861 UART: [kat] SHA2-512-ACC
477,224 UART: [kat] ECC-384
2,767,658 UART: [kat] HMAC-384Kdf
2,800,359 UART: [kat] LMS
3,990,637 UART: [kat] --
3,996,783 UART: [cold-reset] ++
3,998,290 UART: [fht] Storing FHT @ 0x50003400
4,010,408 UART: [idev] ++
4,011,053 UART: [idev] CDI.KEYID = 6
4,011,967 UART: [idev] SUBJECT.KEYID = 7
4,013,216 UART: [idev] UDS.KEYID = 0
4,014,187 ready_for_fw is high
4,014,384 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,542 UART: [idev] Erasing UDS.KEYID = 0
7,347,472 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,743 UART: [idev] --
7,371,709 UART: [ldev] ++
7,372,275 UART: [ldev] CDI.KEYID = 6
7,373,211 UART: [ldev] SUBJECT.KEYID = 5
7,374,473 UART: [ldev] AUTHORITY.KEYID = 7
7,375,703 UART: [ldev] FE.KEYID = 1
7,423,817 UART: [ldev] Erasing FE.KEYID = 1
10,754,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,632 UART: [ldev] --
13,117,894 UART: [fwproc] Waiting for Commands...
13,121,010 UART: [fwproc] Received command 0x46574c44
13,123,191 UART: [fwproc] Received Image of size 113760 bytes
17,174,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,462 >>> mbox cmd response: success
17,631,652 UART: [afmc] ++
17,632,251 UART: [afmc] CDI.KEYID = 6
17,633,163 UART: [afmc] SUBJECT.KEYID = 7
17,634,380 UART: [afmc] AUTHORITY.KEYID = 5
20,990,160 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,957 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,228 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,680 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,475 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,917 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,405 UART: [afmc] --
23,360,398 UART: [cold-reset] --
23,364,103 UART: [state] Locking Datavault
23,370,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,721 UART: [state] Locking ICCM
23,374,599 UART: [exit] Launching FMC @ 0x40000130
23,382,996 UART:
23,383,283 UART: Running Caliptra FMC ...
23,384,390 UART:
23,384,546 UART: [state] CFI Enabled
23,449,075 UART: [fht] FMC Alias Private Key: 7
25,787,720 UART: [art] Extend RT PCRs Done
25,788,965 UART: [art] Lock RT PCRs Done
25,790,811 UART: [art] Populate DV Done
25,796,167 UART: [fht] FMC Alias Private Key: 7
25,797,713 UART: [art] Derive CDI
25,798,527 UART: [art] Store in in slot 0x4
25,858,204 UART: [art] Derive Key Pair
25,859,262 UART: [art] Store priv key in slot 0x5
29,151,921 UART: [art] Derive Key Pair - Done
29,164,812 UART: [art] Signing Cert with AUTHO
29,166,111 UART: RITY.KEYID = 7
31,454,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,916 UART: [art] PUB.X = 022AC34E1810FA751D553495297A72BECD272BA1CADB057426970381FF92B83CFA094A72782E11ED3772FCF829D0A96E
31,463,182 UART: [art] PUB.Y = 6DAA2F1A62132CD23B049DD10204D8C2E389001D117D704DEEF9F4E73A57612773082558CE913FEA1955AB3F421B8FE7
31,470,415 UART: [art] SIG.R = 15D2D2E3077F8F17862A9DF86303CB297ECDE7A1959C3AC3C2A3AB9E40C4B82DB2997467AFB8F69E6F9426903FC34481
31,477,813 UART: [art] SIG.S = 30B65D92D16C55ED6D84D8FB38B53B89243C6DBFED89A281C9653BE6B7839966C44B1FB6419FC9AD87144E52FCDCE39B
32,783,317 UART: Caliptra RT
32,784,046 UART: [state] CFI Enabled
32,946,140 UART: [rt] RT listening for mailbox commands...
32,948,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,979,170 UART: [rt]cmd =0x44504543, len=96
38,764,747 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,786,617 ready_for_fw is high
3,787,265 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,846,155 >>> mbox cmd response: success
23,547,293 UART:
23,547,730 UART: Running Caliptra FMC ...
23,548,937 UART:
23,549,126 UART: [state] CFI Enabled
23,618,863 UART: [fht] FMC Alias Private Key: 7
25,956,831 UART: [art] Extend RT PCRs Done
25,958,051 UART: [art] Lock RT PCRs Done
25,959,956 UART: [art] Populate DV Done
25,965,535 UART: [fht] FMC Alias Private Key: 7
25,966,967 UART: [art] Derive CDI
25,967,729 UART: [art] Store in in slot 0x4
26,026,958 UART: [art] Derive Key Pair
26,028,000 UART: [art] Store priv key in slot 0x5
29,321,439 UART: [art] Derive Key Pair - Done
29,334,814 UART: [art] Signing Cert with AUTHO
29,336,124 UART: RITY.KEYID = 7
31,623,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,668 UART: [art] PUB.X = 632E66B9CD099F340A0C62EAE6DADD59471388D0B87A6A960B8C8CFC3632DDAB8A0337E5E4C3DC8AB9F6963A963AEA95
31,631,932 UART: [art] PUB.Y = EE23FD7A30051D3732090712F04F8DD3BE7689FCBCCE71C03649F0EAD11462A128789BBC05732AE3B19423C5F7EA0793
31,639,197 UART: [art] SIG.R = 91237C1B225FBC57C9A7D1FC6411E40A76C1FDF1B3B426CD5FAAEE7763FD137D6BFF2DFF0D6E5E433AAF2353B32DD734
31,646,602 UART: [art] SIG.S = 8E5EAED15373C56436509C77E507B4CE2F66732864B1763B702D3F52C4E196E9D622A697723DD4E57A4855717937679E
32,952,344 UART: Caliptra RT
32,953,059 UART: [state] CFI Enabled
33,115,062 UART: [rt] RT listening for mailbox commands...
33,117,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,148,422 UART: [rt]cmd =0x44504543, len=96
38,933,163 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,897 UART:
193,291 UART: Running Caliptra ROM ...
194,492 UART:
603,878 UART: [state] CFI Enabled
619,110 UART: [state] LifecycleState = Unprovisioned
621,053 UART: [state] DebugLocked = No
622,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,094 UART: [kat] SHA2-256
797,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,411 UART: [kat] ++
808,885 UART: [kat] sha1
818,642 UART: [kat] SHA2-256
821,336 UART: [kat] SHA2-384
826,901 UART: [kat] SHA2-512-ACC
829,266 UART: [kat] ECC-384
3,113,362 UART: [kat] HMAC-384Kdf
3,124,492 UART: [kat] LMS
4,314,617 UART: [kat] --
4,318,857 UART: [cold-reset] ++
4,320,157 UART: [fht] Storing FHT @ 0x50003400
4,331,496 UART: [idev] ++
4,332,059 UART: [idev] CDI.KEYID = 6
4,333,041 UART: [idev] SUBJECT.KEYID = 7
4,334,212 UART: [idev] UDS.KEYID = 0
4,335,338 ready_for_fw is high
4,335,576 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,599 UART: [idev] Erasing UDS.KEYID = 0
7,626,307 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,616 UART: [idev] --
7,652,394 UART: [ldev] ++
7,653,015 UART: [ldev] CDI.KEYID = 6
7,653,902 UART: [ldev] SUBJECT.KEYID = 5
7,655,161 UART: [ldev] AUTHORITY.KEYID = 7
7,656,464 UART: [ldev] FE.KEYID = 1
7,668,487 UART: [ldev] Erasing FE.KEYID = 1
10,953,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,108 UART: [ldev] --
13,314,083 UART: [fwproc] Waiting for Commands...
13,316,125 UART: [fwproc] Received command 0x46574c44
13,318,307 UART: [fwproc] Received Image of size 113760 bytes
17,359,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,825,116 >>> mbox cmd response: success
17,829,583 UART: [afmc] ++
17,830,211 UART: [afmc] CDI.KEYID = 6
17,831,130 UART: [afmc] SUBJECT.KEYID = 7
17,832,345 UART: [afmc] AUTHORITY.KEYID = 5
21,143,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,093 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,486 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,320 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,748 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,708 UART: [afmc] --
23,507,739 UART: [cold-reset] --
23,511,326 UART: [state] Locking Datavault
23,517,060 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,816 UART: [state] Locking ICCM
23,521,116 UART: [exit] Launching FMC @ 0x40000130
23,529,510 UART:
23,529,771 UART: Running Caliptra FMC ...
23,530,875 UART:
23,531,029 UART: [state] CFI Enabled
23,539,006 UART: [fht] FMC Alias Private Key: 7
25,870,593 UART: [art] Extend RT PCRs Done
25,871,814 UART: [art] Lock RT PCRs Done
25,873,412 UART: [art] Populate DV Done
25,878,716 UART: [fht] FMC Alias Private Key: 7
25,880,361 UART: [art] Derive CDI
25,881,094 UART: [art] Store in in slot 0x4
25,923,578 UART: [art] Derive Key Pair
25,924,575 UART: [art] Store priv key in slot 0x5
29,166,348 UART: [art] Derive Key Pair - Done
29,179,183 UART: [art] Signing Cert with AUTHO
29,180,478 UART: RITY.KEYID = 7
31,459,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,048 UART: [art] PUB.X = 76E2C5799439399D632597C68FF8AC7928A81DB90B01905EC145B94F7A44E3D73BFCF90768E68439875F0DC8ADFF6F38
31,468,266 UART: [art] PUB.Y = 8EDCF5F05681A3A85C725A90E902EB39CAF031EC31CDCCDB77CED8B8A8409FC2858F3153261D9EFF7039E32A3B5C8219
31,475,535 UART: [art] SIG.R = 8579AF5859F902615EFB47BB74A34C4A74A46445E8FB50FD0839AE1A0199E0CA3CCCBFB6748C7C41D776669316DD57D5
31,482,901 UART: [art] SIG.S = 5956028B6F391477435B626D1A2BBC9FC8E25FA2662465AD984A81D6E309E9512CE4596EF635CF277F40666BFD5268F5
32,787,856 UART: Caliptra RT
32,788,574 UART: [state] CFI Enabled
32,905,224 UART: [rt] RT listening for mailbox commands...
32,907,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,937,583 UART: [rt]cmd =0x44504543, len=96
38,609,090 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
4,123,184 ready_for_fw is high
4,123,592 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,054,273 >>> mbox cmd response: success
23,701,223 UART:
23,701,621 UART: Running Caliptra FMC ...
23,702,915 UART:
23,703,108 UART: [state] CFI Enabled
23,710,838 UART: [fht] FMC Alias Private Key: 7
26,042,153 UART: [art] Extend RT PCRs Done
26,043,387 UART: [art] Lock RT PCRs Done
26,044,744 UART: [art] Populate DV Done
26,050,230 UART: [fht] FMC Alias Private Key: 7
26,051,775 UART: [art] Derive CDI
26,052,592 UART: [art] Store in in slot 0x4
26,095,137 UART: [art] Derive Key Pair
26,096,137 UART: [art] Store priv key in slot 0x5
29,338,061 UART: [art] Derive Key Pair - Done
29,351,507 UART: [art] Signing Cert with AUTHO
29,352,808 UART: RITY.KEYID = 7
31,631,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,339 UART: [art] PUB.X = C3BD3DD5AF256EEE35CEDB69C6B0F3619C1830C090F6C010D1D38EC43856B1EEE3D98FB56BA1EA1033FE070F3B868ACD
31,640,636 UART: [art] PUB.Y = 21FD82FD08D1A3DA2DF370B715EBF11E0D1D6510A5158E3B350445A70001EC5E4055C12100B08CEC2040F9337E34D6B0
31,647,830 UART: [art] SIG.R = 7FA439C92864A99AEA932488C6449F5C28E5751F90F538C321A253D0DAEEE9B5A3780AE467A4722B9BF51A5894FE338F
31,655,218 UART: [art] SIG.S = F3922DDFC33BB56BAD477844DA733BD20751818CBF0F4788F7EB1E5D44B52FA80EE9C87DC9F421A7E7B64281E545EE1B
32,960,488 UART: Caliptra RT
32,961,190 UART: [state] CFI Enabled
33,078,647 UART: [rt] RT listening for mailbox commands...
33,080,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,111,234 UART: [rt]cmd =0x44504543, len=96
38,783,352 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,446 UART:
192,855 UART: Running Caliptra ROM ...
194,060 UART:
194,220 UART: [state] CFI Enabled
262,977 UART: [state] LifecycleState = Unprovisioned
264,880 UART: [state] DebugLocked = No
266,192 UART: [state] WD Timer not started. Device not locked for debugging
270,296 UART: [kat] SHA2-256
449,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,986 UART: [kat] ++
461,444 UART: [kat] sha1
473,250 UART: [kat] SHA2-256
476,337 UART: [kat] SHA2-384
481,256 UART: [kat] SHA2-512-ACC
484,255 UART: [kat] ECC-384
2,947,144 UART: [kat] HMAC-384Kdf
2,971,835 UART: [kat] LMS
3,501,246 UART: [kat] --
3,504,671 UART: [cold-reset] ++
3,506,026 UART: [fht] FHT @ 0x50003400
3,516,789 UART: [idev] ++
3,517,353 UART: [idev] CDI.KEYID = 6
3,518,262 UART: [idev] SUBJECT.KEYID = 7
3,519,506 UART: [idev] UDS.KEYID = 0
3,520,429 ready_for_fw is high
3,520,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,222 UART: [idev] Erasing UDS.KEYID = 0
6,028,058 UART: [idev] Sha1 KeyId Algorithm
6,052,256 UART: [idev] --
6,057,091 UART: [ldev] ++
6,057,669 UART: [ldev] CDI.KEYID = 6
6,058,583 UART: [ldev] SUBJECT.KEYID = 5
6,059,739 UART: [ldev] AUTHORITY.KEYID = 7
6,060,986 UART: [ldev] FE.KEYID = 1
6,100,039 UART: [ldev] Erasing FE.KEYID = 1
8,601,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,827 UART: [ldev] --
10,413,114 UART: [fwproc] Wait for Commands...
10,414,696 UART: [fwproc] Recv command 0x46574c44
10,416,783 UART: [fwproc] Recv'd Img size: 114084 bytes
13,813,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,276,118 >>> mbox cmd response: success
14,279,537 UART: [afmc] ++
14,280,145 UART: [afmc] CDI.KEYID = 6
14,281,026 UART: [afmc] SUBJECT.KEYID = 7
14,282,182 UART: [afmc] AUTHORITY.KEYID = 5
16,808,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,828 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,690 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,794 UART: [afmc] --
18,604,893 UART: [cold-reset] --
18,610,434 UART: [state] Locking Datavault
18,616,645 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,300 UART: [state] Locking ICCM
18,619,643 UART: [exit] Launching FMC @ 0x40000130
18,628,036 UART:
18,628,288 UART: Running Caliptra FMC ...
18,629,391 UART:
18,629,547 UART: [state] CFI Enabled
18,687,576 UART: [fht] FMC Alias Private Key: 7
20,450,974 UART: [art] Extend RT PCRs Done
20,452,188 UART: [art] Lock RT PCRs Done
20,453,873 UART: [art] Populate DV Done
20,459,224 UART: [fht] FMC Alias Private Key: 7
20,460,869 UART: [art] Derive CDI
20,461,678 UART: [art] Store in in slot 0x4
20,519,692 UART: [art] Derive Key Pair
20,520,683 UART: [art] Store priv key in slot 0x5
22,983,662 UART: [art] Derive Key Pair - Done
22,996,646 UART: [art] Signing Cert with AUTHO
22,997,951 UART: RITY.KEYID = 7
24,708,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,290 UART: [art] PUB.X = 29DB23AA30EF31AE5B75CB54A0084244FA8A8B5A2E1191E6E878B2CBDA793CBE65E45C53A20D193BBC487779AA986C70
24,717,580 UART: [art] PUB.Y = C84148A2D8300F3B6361160906F018718DD4610F83267A9608CBED0F76FAAEDD9717E0AF006218A7E1A9F86BB5E81281
24,724,787 UART: [art] SIG.R = 2F2A558BAC0AD363C26EBEF2D3C50C0D0DD54347198AAF4AE19C705640035A87F7EA139A93920609973E9574858AA496
24,732,138 UART: [art] SIG.S = AE4A867876878622E8A322AB5087A2C661B7B90C087FBDDCC9BF32A4CB9BE0AD67946B99E161255212BE80105B67213F
25,711,068 UART: Caliptra RT
25,711,781 UART: [state] CFI Enabled
25,876,085 UART: [rt] RT listening for mailbox commands...
25,878,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,908,938 UART: [rt]cmd =0x44504543, len=96
30,268,587 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
3,359,763 ready_for_fw is high
3,360,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,050,024 >>> mbox cmd response: success
18,346,485 UART:
18,346,878 UART: Running Caliptra FMC ...
18,348,021 UART:
18,348,188 UART: [state] CFI Enabled
18,412,680 UART: [fht] FMC Alias Private Key: 7
20,176,435 UART: [art] Extend RT PCRs Done
20,177,683 UART: [art] Lock RT PCRs Done
20,179,040 UART: [art] Populate DV Done
20,184,188 UART: [fht] FMC Alias Private Key: 7
20,185,737 UART: [art] Derive CDI
20,186,550 UART: [art] Store in in slot 0x4
20,244,989 UART: [art] Derive Key Pair
20,245,986 UART: [art] Store priv key in slot 0x5
22,709,168 UART: [art] Derive Key Pair - Done
22,722,058 UART: [art] Signing Cert with AUTHO
22,723,367 UART: RITY.KEYID = 7
24,434,436 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,940 UART: [art] PUB.X = 5BBD2D97788FF5774E91B03946791DB3F40670C271C023A2F5E473A9CA6BDB1353EB83ECA39D3A1AD3E60A305FF109CF
24,443,227 UART: [art] PUB.Y = 57CEA6787EAA3127709CD4D9D8FC721144E39B7F5799018110F2E7A9EFFEC407848A381DAE24B8EC4262FC0FC8D91F99
24,450,516 UART: [art] SIG.R = 472046C4855A5F055402044FE0B5DCB31DD19586726C1B279CDDF7C04ECE8ECA3AB4E2A346EE857AA8E8FA7F94677DBF
24,457,877 UART: [art] SIG.S = 2EB87EBFAA7CE6DC1376C8FBF48A4954DF5C7891932DD3A4C7F5F3F34195AD28A89913BE8437AC5EA5E1C1198CBB6011
25,436,904 UART: Caliptra RT
25,437,624 UART: [state] CFI Enabled
25,602,100 UART: [rt] RT listening for mailbox commands...
25,604,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,635,224 UART: [rt]cmd =0x44504543, len=96
30,013,542 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,833 writing to cptra_bootfsm_go
192,964 UART:
193,326 UART: Running Caliptra ROM ...
194,459 UART:
604,263 UART: [state] CFI Enabled
618,915 UART: [state] LifecycleState = Unprovisioned
620,717 UART: [state] DebugLocked = No
623,301 UART: [state] WD Timer not started. Device not locked for debugging
627,902 UART: [kat] SHA2-256
807,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,585 UART: [kat] ++
819,038 UART: [kat] sha1
829,344 UART: [kat] SHA2-256
832,352 UART: [kat] SHA2-384
838,629 UART: [kat] SHA2-512-ACC
841,638 UART: [kat] ECC-384
3,283,527 UART: [kat] HMAC-384Kdf
3,297,343 UART: [kat] LMS
3,826,864 UART: [kat] --
3,828,954 UART: [cold-reset] ++
3,830,698 UART: [fht] FHT @ 0x50003400
3,841,538 UART: [idev] ++
3,842,109 UART: [idev] CDI.KEYID = 6
3,843,019 UART: [idev] SUBJECT.KEYID = 7
3,844,276 UART: [idev] UDS.KEYID = 0
3,845,208 ready_for_fw is high
3,845,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,677 UART: [idev] Erasing UDS.KEYID = 0
6,317,731 UART: [idev] Sha1 KeyId Algorithm
6,341,284 UART: [idev] --
6,345,848 UART: [ldev] ++
6,346,429 UART: [ldev] CDI.KEYID = 6
6,347,346 UART: [ldev] SUBJECT.KEYID = 5
6,348,504 UART: [ldev] AUTHORITY.KEYID = 7
6,349,737 UART: [ldev] FE.KEYID = 1
6,360,172 UART: [ldev] Erasing FE.KEYID = 1
8,830,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,145 UART: [ldev] --
10,621,058 UART: [fwproc] Wait for Commands...
10,623,804 UART: [fwproc] Recv command 0x46574c44
10,625,898 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,478,578 >>> mbox cmd response: success
14,482,369 UART: [afmc] ++
14,482,962 UART: [afmc] CDI.KEYID = 6
14,483,848 UART: [afmc] SUBJECT.KEYID = 7
14,485,085 UART: [afmc] AUTHORITY.KEYID = 5
16,984,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,703,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,051 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,022 UART: [afmc] --
18,779,103 UART: [cold-reset] --
18,782,046 UART: [state] Locking Datavault
18,787,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,381 UART: [state] Locking ICCM
18,790,787 UART: [exit] Launching FMC @ 0x40000130
18,799,190 UART:
18,799,437 UART: Running Caliptra FMC ...
18,800,545 UART:
18,800,722 UART: [state] CFI Enabled
18,808,827 UART: [fht] FMC Alias Private Key: 7
20,566,203 UART: [art] Extend RT PCRs Done
20,567,400 UART: [art] Lock RT PCRs Done
20,568,861 UART: [art] Populate DV Done
20,574,211 UART: [fht] FMC Alias Private Key: 7
20,575,894 UART: [art] Derive CDI
20,576,722 UART: [art] Store in in slot 0x4
20,619,533 UART: [art] Derive Key Pair
20,620,532 UART: [art] Store priv key in slot 0x5
23,047,519 UART: [art] Derive Key Pair - Done
23,060,728 UART: [art] Signing Cert with AUTHO
23,062,069 UART: RITY.KEYID = 7
24,767,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,064 UART: [art] PUB.X = 0CF8D7C1F93B152025AA7FADFB3628603D734A96035466C74FD74E8EEB52EEACF12DB4B4B651C24BB96A1069D38DFBC6
24,776,341 UART: [art] PUB.Y = D92EC06914C6F3AEE17D551793AEA755973C3B509673E025AA6597528E0839E8F2DFB53C281BD8D59EEEFDC8B0029A51
24,783,620 UART: [art] SIG.R = B6B7770C828B8DB20161113E8447A9C7AFBC53F6BCF452379BCF779EB07CF1D92B0E0537B15FE9B58BB38C1323BE63CE
24,790,993 UART: [art] SIG.S = AD88D042C5818D257F262B4F903CC9DCA92FF8F77508232CF072C85AFBF6425F3E4FDC72B58FC047B84F2922D4552C40
25,770,177 UART: Caliptra RT
25,770,887 UART: [state] CFI Enabled
25,888,017 UART: [rt] RT listening for mailbox commands...
25,889,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,920,702 UART: [rt]cmd =0x44504543, len=96
30,202,898 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
3,696,176 ready_for_fw is high
3,696,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,279,013 >>> mbox cmd response: success
18,525,267 UART:
18,525,666 UART: Running Caliptra FMC ...
18,526,873 UART:
18,527,048 UART: [state] CFI Enabled
18,534,501 UART: [fht] FMC Alias Private Key: 7
20,291,338 UART: [art] Extend RT PCRs Done
20,292,558 UART: [art] Lock RT PCRs Done
20,294,237 UART: [art] Populate DV Done
20,299,652 UART: [fht] FMC Alias Private Key: 7
20,301,314 UART: [art] Derive CDI
20,302,138 UART: [art] Store in in slot 0x4
20,344,579 UART: [art] Derive Key Pair
20,345,604 UART: [art] Store priv key in slot 0x5
22,772,566 UART: [art] Derive Key Pair - Done
22,785,569 UART: [art] Signing Cert with AUTHO
22,786,875 UART: RITY.KEYID = 7
24,492,459 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,967 UART: [art] PUB.X = 2B0AAAEA679174C2477D7A88A8133A9994C4223439163782100380BFD00B70062249B35807BDB4FC1C93FCF8D3E2EB56
24,501,247 UART: [art] PUB.Y = A6D69DF66D527FA734528AAA28BDA76EC94A5C1740F371B744B120059D53B56AA0E6FB1EA228C74ED5D81D754E60EEC2
24,508,531 UART: [art] SIG.R = 8ED493D470E2D9F587D6F738A0EF4313F7A8C034FDB87F7613D570E1235310606C3C1DF70F09E9801060DCEC488A04BB
24,515,906 UART: [art] SIG.S = 9CF96FA7153E32D664A3D1389D913827E5AD586F9F6309770F9C61D22783F2A8D04CBEE57A83E0149FFBA773CCC84AE7
25,494,531 UART: Caliptra RT
25,495,232 UART: [state] CFI Enabled
25,612,174 UART: [rt] RT listening for mailbox commands...
25,614,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,644,523 UART: [rt]cmd =0x44504543, len=96
29,927,743 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,447 UART:
192,827 UART: Running Caliptra ROM ...
193,952 UART:
194,097 UART: [state] CFI Enabled
264,030 UART: [state] LifecycleState = Unprovisioned
266,373 UART: [state] DebugLocked = No
269,245 UART: [state] WD Timer not started. Device not locked for debugging
273,790 UART: [kat] SHA2-256
463,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,458 UART: [kat] ++
474,910 UART: [kat] sha1
486,936 UART: [kat] SHA2-256
489,947 UART: [kat] SHA2-384
495,676 UART: [kat] SHA2-512-ACC
498,261 UART: [kat] ECC-384
2,948,567 UART: [kat] HMAC-384Kdf
2,971,796 UART: [kat] LMS
3,503,586 UART: [kat] --
3,505,452 UART: [cold-reset] ++
3,507,523 UART: [fht] FHT @ 0x50003400
3,519,142 UART: [idev] ++
3,519,849 UART: [idev] CDI.KEYID = 6
3,520,873 UART: [idev] SUBJECT.KEYID = 7
3,521,976 UART: [idev] UDS.KEYID = 0
3,522,917 ready_for_fw is high
3,523,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,718 UART: [idev] Erasing UDS.KEYID = 0
6,030,103 UART: [idev] Sha1 KeyId Algorithm
6,051,500 UART: [idev] --
6,055,925 UART: [ldev] ++
6,056,617 UART: [ldev] CDI.KEYID = 6
6,057,531 UART: [ldev] SUBJECT.KEYID = 5
6,058,692 UART: [ldev] AUTHORITY.KEYID = 7
6,059,925 UART: [ldev] FE.KEYID = 1
6,101,413 UART: [ldev] Erasing FE.KEYID = 1
8,605,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,113 UART: [ldev] --
10,413,807 UART: [fwproc] Wait for Commands...
10,416,545 UART: [fwproc] Recv command 0x46574c44
10,418,796 UART: [fwproc] Recv'd Img size: 114084 bytes
13,870,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,611,486 >>> mbox cmd response: success
14,615,339 UART: [afmc] ++
14,616,050 UART: [afmc] CDI.KEYID = 6
14,617,241 UART: [afmc] SUBJECT.KEYID = 7
14,618,688 UART: [afmc] AUTHORITY.KEYID = 5
17,154,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,225 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,363 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,394 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,666 UART: [afmc] --
18,969,939 UART: [cold-reset] --
18,973,594 UART: [state] Locking Datavault
18,980,658 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,820 UART: [state] Locking ICCM
18,985,133 UART: [exit] Launching FMC @ 0x40000130
18,993,774 UART:
18,994,007 UART: Running Caliptra FMC ...
18,995,110 UART:
18,995,269 UART: [state] CFI Enabled
19,052,443 UART: [fht] FMC Alias Private Key: 7
20,816,806 UART: [art] Extend RT PCRs Done
20,818,022 UART: [art] Lock RT PCRs Done
20,819,924 UART: [art] Populate DV Done
20,825,495 UART: [fht] FMC Alias Private Key: 7
20,827,249 UART: [art] Derive CDI
20,827,985 UART: [art] Store in in slot 0x4
20,884,651 UART: [art] Derive Key Pair
20,885,686 UART: [art] Store priv key in slot 0x5
23,348,421 UART: [art] Derive Key Pair - Done
23,361,308 UART: [art] Signing Cert with AUTHO
23,362,606 UART: RITY.KEYID = 7
25,073,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,994 UART: [art] PUB.X = E4C918FBDE9542FACA5EBC5B8FE125E227D593704B377AA72E816F76F4E9CD618F846041ABE3073950545BE1A5E132F6
25,082,252 UART: [art] PUB.Y = 5583EE0CD651170F48DA7FD0D2CF7966B177C0256B7A6F3E39ACC98EDA3EA7FBBCB2D2B947A820E1554CB39ED5541C0E
25,089,513 UART: [art] SIG.R = B27BBC21F3429C11D5A8323F40C53B2EE9583867B71923929B329D8988BF7FBA8D9F1F0A089568DC002857305D0C4002
25,096,866 UART: [art] SIG.S = C45FB8630B4885DC07354E8266B8C598410C8FE3EF905FE20A80E3F8AFEC386C5974C87E1DB9B463A5D658D4B8ADB2D1
26,074,661 UART: Caliptra RT
26,075,375 UART: [state] CFI Enabled
26,241,356 UART: [rt] RT listening for mailbox commands...
26,243,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,274,354 UART: [rt]cmd =0x44504543, len=96
30,633,695 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,165 writing to cptra_bootfsm_go
3,438,491 ready_for_fw is high
3,438,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,514 >>> mbox cmd response: success
19,043,617 UART:
19,044,007 UART: Running Caliptra FMC ...
19,045,111 UART:
19,045,261 UART: [state] CFI Enabled
19,114,876 UART: [fht] FMC Alias Private Key: 7
20,878,771 UART: [art] Extend RT PCRs Done
20,880,021 UART: [art] Lock RT PCRs Done
20,881,795 UART: [art] Populate DV Done
20,887,394 UART: [fht] FMC Alias Private Key: 7
20,889,028 UART: [art] Derive CDI
20,889,849 UART: [art] Store in in slot 0x4
20,947,694 UART: [art] Derive Key Pair
20,948,694 UART: [art] Store priv key in slot 0x5
23,412,062 UART: [art] Derive Key Pair - Done
23,425,168 UART: [art] Signing Cert with AUTHO
23,426,464 UART: RITY.KEYID = 7
25,138,180 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,683 UART: [art] PUB.X = 9697786A33C7371803A66247F5CAEB4FD70A975520AF8BCC2095945683AFEA5FB55CAED163F7C18E9CE12B69E7A72ACF
25,146,958 UART: [art] PUB.Y = 2F39E5B56CF71D9CFD99DB8983C1CFEA0F2BF1D71BD75C814ACF0F893EDB99654464EB080F8A4013CE3392A4F55DF8CF
25,154,246 UART: [art] SIG.R = A0E46D2E0BD902AB7ED2DAC385CB69F1E94BEFB138E28CA9BA49C38E9024B41A8DEE70AC094AC21332F7419F48164CA6
25,161,685 UART: [art] SIG.S = 218CE0C8F213F695337A21497907727F8FEDE86D85705AC85CE099B7BD0CEA35927996ABB442E7B57177698CA093E94A
26,140,396 UART: Caliptra RT
26,141,129 UART: [state] CFI Enabled
26,306,290 UART: [rt] RT listening for mailbox commands...
26,308,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,392 UART: [rt]cmd =0x44504543, len=96
30,697,765 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,998 writing to cptra_bootfsm_go
193,100 UART:
193,473 UART: Running Caliptra ROM ...
194,571 UART:
604,363 UART: [state] CFI Enabled
619,155 UART: [state] LifecycleState = Unprovisioned
621,531 UART: [state] DebugLocked = No
624,273 UART: [state] WD Timer not started. Device not locked for debugging
629,482 UART: [kat] SHA2-256
819,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,166 UART: [kat] ++
830,771 UART: [kat] sha1
842,857 UART: [kat] SHA2-256
845,815 UART: [kat] SHA2-384
852,731 UART: [kat] SHA2-512-ACC
855,379 UART: [kat] ECC-384
3,296,910 UART: [kat] HMAC-384Kdf
3,308,856 UART: [kat] LMS
3,840,695 UART: [kat] --
3,844,844 UART: [cold-reset] ++
3,845,782 UART: [fht] FHT @ 0x50003400
3,857,899 UART: [idev] ++
3,858,608 UART: [idev] CDI.KEYID = 6
3,859,595 UART: [idev] SUBJECT.KEYID = 7
3,860,769 UART: [idev] UDS.KEYID = 0
3,861,673 ready_for_fw is high
3,861,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,140 UART: [idev] Erasing UDS.KEYID = 0
6,337,865 UART: [idev] Sha1 KeyId Algorithm
6,360,081 UART: [idev] --
6,364,304 UART: [ldev] ++
6,364,989 UART: [ldev] CDI.KEYID = 6
6,366,057 UART: [ldev] SUBJECT.KEYID = 5
6,367,166 UART: [ldev] AUTHORITY.KEYID = 7
6,368,345 UART: [ldev] FE.KEYID = 1
6,378,606 UART: [ldev] Erasing FE.KEYID = 1
8,856,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,638 UART: [ldev] --
10,648,221 UART: [fwproc] Wait for Commands...
10,649,939 UART: [fwproc] Recv command 0x46574c44
10,652,246 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,833,283 >>> mbox cmd response: success
14,836,554 UART: [afmc] ++
14,837,268 UART: [afmc] CDI.KEYID = 6
14,838,518 UART: [afmc] SUBJECT.KEYID = 7
14,839,959 UART: [afmc] AUTHORITY.KEYID = 5
17,345,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,391 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,690 UART: [afmc] --
19,139,782 UART: [cold-reset] --
19,145,026 UART: [state] Locking Datavault
19,149,757 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,968 UART: [state] Locking ICCM
19,153,585 UART: [exit] Launching FMC @ 0x40000130
19,162,276 UART:
19,162,518 UART: Running Caliptra FMC ...
19,163,620 UART:
19,163,780 UART: [state] CFI Enabled
19,172,045 UART: [fht] FMC Alias Private Key: 7
20,928,835 UART: [art] Extend RT PCRs Done
20,930,047 UART: [art] Lock RT PCRs Done
20,931,565 UART: [art] Populate DV Done
20,936,975 UART: [fht] FMC Alias Private Key: 7
20,938,470 UART: [art] Derive CDI
20,939,232 UART: [art] Store in in slot 0x4
20,981,396 UART: [art] Derive Key Pair
20,982,457 UART: [art] Store priv key in slot 0x5
23,408,821 UART: [art] Derive Key Pair - Done
23,422,030 UART: [art] Signing Cert with AUTHO
23,423,343 UART: RITY.KEYID = 7
25,128,797 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,304 UART: [art] PUB.X = F60CC99153B9168968A2AF9C446C03DB315FECE6A514DBA7EB1542ED0F160B46A42761B2F25F5B838DCAA47D087847A4
25,137,582 UART: [art] PUB.Y = BEF4A3F7F861F688CA20CAE09336E90A28F9790351AA9851E446686B660D93D7FAD8445E5246B6E8CD966230BAC5CE96
25,144,789 UART: [art] SIG.R = 9DC4A7E86A3895DA642BA1E3F3C3632C201DAF6806DD4F205C3CF683C1E9BB5C35333800B951F04E52624C315694265E
25,152,157 UART: [art] SIG.S = C870269F9E58805A60CF384A89A320C464F2DFBB17B9202663B56349FC7975E4C3CC68105BA39B763812C3BABC3FD95A
26,131,607 UART: Caliptra RT
26,132,297 UART: [state] CFI Enabled
26,249,856 UART: [rt] RT listening for mailbox commands...
26,251,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,452 UART: [rt]cmd =0x44504543, len=96
30,565,467 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
3,755,669 ready_for_fw is high
3,756,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,494 >>> mbox cmd response: success
19,202,384 UART:
19,202,785 UART: Running Caliptra FMC ...
19,203,923 UART:
19,204,086 UART: [state] CFI Enabled
19,212,091 UART: [fht] FMC Alias Private Key: 7
20,968,832 UART: [art] Extend RT PCRs Done
20,970,052 UART: [art] Lock RT PCRs Done
20,971,688 UART: [art] Populate DV Done
20,977,001 UART: [fht] FMC Alias Private Key: 7
20,978,549 UART: [art] Derive CDI
20,979,334 UART: [art] Store in in slot 0x4
21,022,040 UART: [art] Derive Key Pair
21,023,092 UART: [art] Store priv key in slot 0x5
23,449,484 UART: [art] Derive Key Pair - Done
23,462,209 UART: [art] Signing Cert with AUTHO
23,463,513 UART: RITY.KEYID = 7
25,168,888 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,394 UART: [art] PUB.X = AC54A74829442F724CDA4BA4DE1D76A8B1C72F2440BDDB7B2A11CEDF86934D74C99FF6AB3BED6482D4470BF68AA90CE3
25,177,695 UART: [art] PUB.Y = CF0F88EE82F0D8E086C0D56339E62D09D20E96AC1BB2F31CA0F8914654E41F53E0D3C7E60E0EB6A522A3604F0EBE2D11
25,184,925 UART: [art] SIG.R = 0CF0DE34CF42F4E9CCF5D82A08C41909F8089576D721CB9480D5E222ECFE5C7E53D1BBDA525FD04072C33137106A81CB
25,192,304 UART: [art] SIG.S = 9BB1A5E478E0F3B48832112FD28C9DB703B67B54142CB990594F94B915F8BC0003424A67AE58CE35FB1D11A99FC38B6C
26,170,472 UART: Caliptra RT
26,171,160 UART: [state] CFI Enabled
26,288,775 UART: [rt] RT listening for mailbox commands...
26,290,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,321,407 UART: [rt]cmd =0x44504543, len=96
30,604,205 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,105 UART: [kat] SHA2-256
882,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,151 UART: [kat] ++
886,303 UART: [kat] sha1
890,645 UART: [kat] SHA2-256
892,583 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,748 UART: [kat] LMS
1,475,944 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,062 UART: [idev] Erasing UDS.KEYID = 0
1,505,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,886 UART: [idev] --
1,514,717 UART: [ldev] ++
1,514,885 UART: [ldev] CDI.KEYID = 6
1,515,248 UART: [ldev] SUBJECT.KEYID = 5
1,515,674 UART: [ldev] AUTHORITY.KEYID = 7
1,516,137 UART: [ldev] FE.KEYID = 1
1,521,171 UART: [ldev] Erasing FE.KEYID = 1
1,546,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,032 UART: [ldev] --
1,585,313 UART: [fwproc] Waiting for Commands...
1,585,940 UART: [fwproc] Received command 0x46574c44
1,586,731 UART: [fwproc] Received Image of size 114084 bytes
2,881,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,321 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,230 >>> mbox cmd response: success
3,074,324 UART: [afmc] ++
3,074,492 UART: [afmc] CDI.KEYID = 6
3,074,854 UART: [afmc] SUBJECT.KEYID = 7
3,075,279 UART: [afmc] AUTHORITY.KEYID = 5
3,110,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,460 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,853 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,543 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,386 UART: [afmc] --
3,153,330 UART: [cold-reset] --
3,154,244 UART: [state] Locking Datavault
3,155,437 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,041 UART: [state] Locking ICCM
3,156,659 UART: [exit] Launching FMC @ 0x40000130
3,161,988 UART:
3,162,004 UART: Running Caliptra FMC ...
3,162,412 UART:
3,162,466 UART: [state] CFI Enabled
3,173,159 UART: [fht] FMC Alias Private Key: 7
3,280,688 UART: [art] Extend RT PCRs Done
3,281,116 UART: [art] Lock RT PCRs Done
3,282,640 UART: [art] Populate DV Done
3,290,657 UART: [fht] FMC Alias Private Key: 7
3,291,637 UART: [art] Derive CDI
3,291,917 UART: [art] Store in in slot 0x4
3,377,194 UART: [art] Derive Key Pair
3,377,554 UART: [art] Store priv key in slot 0x5
3,390,188 UART: [art] Derive Key Pair - Done
3,405,201 UART: [art] Signing Cert with AUTHO
3,405,681 UART: RITY.KEYID = 7
3,421,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,421,814 UART: [art] PUB.X = C1F7A5E407DDB4CCBE40D248122EC5CD219757A744E5C5E5CC6DF72FC1117193CA9AA427E384B3190510FBABA3A96AD8
3,428,596 UART: [art] PUB.Y = B5DC3B25A0CB46D878DDE64B330E194EA49C7EC8EF5B773822872DCB7F0D2B0B1F98D2FE4970F78551373A1E3AC276EC
3,435,553 UART: [art] SIG.R = 9C865106F7EC05AD48D3029B0CD0BC092FDCB0F6338570027A2FB94B49EA5F91ACF172C990E8F7CA9DAF2176364361DA
3,442,317 UART: [art] SIG.S = D64B92E4E61B38216CAC8E73FFC0E56FACFFEB54269D5974C3DA114164CB71FBCFD3FD3D51AC78D567B54919FF5D243D
3,466,202 UART: Caliptra RT
3,466,455 UART: [state] CFI Enabled
3,574,425 UART: [rt] RT listening for mailbox commands...
3,575,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,625 UART: [rt]cmd =0x44504543, len=96
3,786,016 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,185 ready_for_fw is high
1,362,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,490 >>> mbox cmd response: success
2,984,606 UART:
2,984,622 UART: Running Caliptra FMC ...
2,985,030 UART:
2,985,084 UART: [state] CFI Enabled
2,995,379 UART: [fht] FMC Alias Private Key: 7
3,102,888 UART: [art] Extend RT PCRs Done
3,103,316 UART: [art] Lock RT PCRs Done
3,104,618 UART: [art] Populate DV Done
3,112,821 UART: [fht] FMC Alias Private Key: 7
3,113,785 UART: [art] Derive CDI
3,114,065 UART: [art] Store in in slot 0x4
3,199,894 UART: [art] Derive Key Pair
3,200,254 UART: [art] Store priv key in slot 0x5
3,213,620 UART: [art] Derive Key Pair - Done
3,228,838 UART: [art] Signing Cert with AUTHO
3,229,318 UART: RITY.KEYID = 7
3,244,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,915 UART: [art] PUB.X = 8F3F2C43D050C4186A4C6AA228BAC74C82D63AFDD2B5D90113C2EF96E5E887CA9FF6142EE5ED4EEDE50586F6B49C9649
3,251,697 UART: [art] PUB.Y = 35712DC0D84000948D0EFAB84DFD0259EAF3643C8601D4AC4F6003FF28296F9B4A385DD430AF1CFF1B0CFE2FFEEBC834
3,258,630 UART: [art] SIG.R = B9B1CAC9A1D59664B6F2D45E3F6C03CF60338D731F7CDA84031D72EEF7F3223DF74D1FBBCC4A7434A74AAAC4EAE8A88E
3,265,420 UART: [art] SIG.S = 0E4481D5350DC42C6DBDD171EEE3BAAC67DB9C978F20198C08883E0930F4BFAF9600FF61B352F1A414EBCB3187F9FCA3
3,289,643 UART: Caliptra RT
3,289,896 UART: [state] CFI Enabled
3,398,583 UART: [rt] RT listening for mailbox commands...
3,399,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,679 UART: [rt]cmd =0x44504543, len=96
3,609,688 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,474 UART: [kat] SHA2-256
882,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,520 UART: [kat] ++
886,672 UART: [kat] sha1
891,006 UART: [kat] SHA2-256
892,944 UART: [kat] SHA2-384
895,689 UART: [kat] SHA2-512-ACC
897,590 UART: [kat] ECC-384
903,055 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,108 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 ready_for_fw is high
1,481,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,735 UART: [idev] Erasing UDS.KEYID = 0
1,504,943 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,459 UART: [idev] --
1,514,582 UART: [ldev] ++
1,514,750 UART: [ldev] CDI.KEYID = 6
1,515,113 UART: [ldev] SUBJECT.KEYID = 5
1,515,539 UART: [ldev] AUTHORITY.KEYID = 7
1,516,002 UART: [ldev] FE.KEYID = 1
1,520,996 UART: [ldev] Erasing FE.KEYID = 1
1,546,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,413 UART: [ldev] --
1,585,710 UART: [fwproc] Waiting for Commands...
1,586,351 UART: [fwproc] Received command 0x46574c44
1,587,142 UART: [fwproc] Received Image of size 114084 bytes
2,882,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,297 >>> mbox cmd response: success
3,075,337 UART: [afmc] ++
3,075,505 UART: [afmc] CDI.KEYID = 6
3,075,867 UART: [afmc] SUBJECT.KEYID = 7
3,076,292 UART: [afmc] AUTHORITY.KEYID = 5
3,111,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,389 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,169 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,782 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,472 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,397 UART: [afmc] --
3,154,485 UART: [cold-reset] --
3,155,361 UART: [state] Locking Datavault
3,156,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,354 UART: [state] Locking ICCM
3,157,800 UART: [exit] Launching FMC @ 0x40000130
3,163,129 UART:
3,163,145 UART: Running Caliptra FMC ...
3,163,553 UART:
3,163,696 UART: [state] CFI Enabled
3,174,489 UART: [fht] FMC Alias Private Key: 7
3,282,702 UART: [art] Extend RT PCRs Done
3,283,130 UART: [art] Lock RT PCRs Done
3,284,422 UART: [art] Populate DV Done
3,292,959 UART: [fht] FMC Alias Private Key: 7
3,293,917 UART: [art] Derive CDI
3,294,197 UART: [art] Store in in slot 0x4
3,379,894 UART: [art] Derive Key Pair
3,380,254 UART: [art] Store priv key in slot 0x5
3,393,408 UART: [art] Derive Key Pair - Done
3,408,360 UART: [art] Signing Cert with AUTHO
3,408,840 UART: RITY.KEYID = 7
3,423,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,361 UART: [art] PUB.X = C9490DACDF4240D5FAAB5249C4DBE68B3BA666A167C37AEF901C27785B71E95774AD0F476D2E6C1708F74660EDF54BDC
3,431,138 UART: [art] PUB.Y = CF73F9E5F2206D8BE1E0E465E5BB49674BC8FEC4516EE3700105A560DFC2C65A2900BC622ABDBACA5CA1E7C0A64AC66A
3,438,084 UART: [art] SIG.R = D65E93932DE4E4E4404C791AAFDB3E0BF413F24F79442C88B1DE302605A30DE3112F1A984E3BED4710715952A18A9C9A
3,444,851 UART: [art] SIG.S = E53D24718536FC49F3252683A294A4C2E05982C402A9B1A841F1CA7252CF410E622472078E0C7EB160F8035BCE5AE509
3,469,346 UART: Caliptra RT
3,469,691 UART: [state] CFI Enabled
3,577,679 UART: [rt] RT listening for mailbox commands...
3,578,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,627 UART: [rt]cmd =0x44504543, len=96
3,789,846 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,968 ready_for_fw is high
1,362,968 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,315 >>> mbox cmd response: success
2,987,165 UART:
2,987,181 UART: Running Caliptra FMC ...
2,987,589 UART:
2,987,732 UART: [state] CFI Enabled
2,998,505 UART: [fht] FMC Alias Private Key: 7
3,106,626 UART: [art] Extend RT PCRs Done
3,107,054 UART: [art] Lock RT PCRs Done
3,108,658 UART: [art] Populate DV Done
3,116,857 UART: [fht] FMC Alias Private Key: 7
3,117,937 UART: [art] Derive CDI
3,118,217 UART: [art] Store in in slot 0x4
3,203,836 UART: [art] Derive Key Pair
3,204,196 UART: [art] Store priv key in slot 0x5
3,217,730 UART: [art] Derive Key Pair - Done
3,232,498 UART: [art] Signing Cert with AUTHO
3,232,978 UART: RITY.KEYID = 7
3,248,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,441 UART: [art] PUB.X = 197331002F9C07804726E832B18586321E53B14D4D116261A93ED8F3CCE58FE019ECD0AFED6D00D55A7E46128E11DCA1
3,256,166 UART: [art] PUB.Y = AAE36993133763A76E82C0B731FA71943F92503E08985DB875DCDAD5964038865F1D88561C0E05FCFF65A9D7D6A8921B
3,263,107 UART: [art] SIG.R = DA776DC0248F4B757DD03F7D9AF2D6F1470895496E7A7A5BC148617947B6DC9BDEB770347EBE8AA361D20F4417345D48
3,269,877 UART: [art] SIG.S = 7968D18680DB2A020440179C32935ED29E938BADAA82EBF982F931147441B9DC461DF3E88713F9D78BC7389B2BC0C38B
3,293,142 UART: Caliptra RT
3,293,487 UART: [state] CFI Enabled
3,401,902 UART: [rt] RT listening for mailbox commands...
3,402,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,150 UART: [rt]cmd =0x44504543, len=96
3,613,934 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,119 UART: [kat] SHA2-256
904,059 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,864 UART: [kat] LMS
1,171,192 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,466 UART: [idev] ++
1,175,634 UART: [idev] CDI.KEYID = 6
1,175,994 UART: [idev] SUBJECT.KEYID = 7
1,176,418 UART: [idev] UDS.KEYID = 0
1,176,763 ready_for_fw is high
1,176,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,696 UART: [idev] Erasing UDS.KEYID = 0
1,201,725 UART: [idev] Sha1 KeyId Algorithm
1,210,205 UART: [idev] --
1,211,385 UART: [ldev] ++
1,211,553 UART: [ldev] CDI.KEYID = 6
1,211,916 UART: [ldev] SUBJECT.KEYID = 5
1,212,342 UART: [ldev] AUTHORITY.KEYID = 7
1,212,805 UART: [ldev] FE.KEYID = 1
1,217,635 UART: [ldev] Erasing FE.KEYID = 1
1,243,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,374 UART: [fwproc] Wait for Commands...
1,284,010 UART: [fwproc] Recv command 0x46574c44
1,284,738 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,941 >>> mbox cmd response: success
2,772,123 UART: [afmc] ++
2,772,291 UART: [afmc] CDI.KEYID = 6
2,772,653 UART: [afmc] SUBJECT.KEYID = 7
2,773,078 UART: [afmc] AUTHORITY.KEYID = 5
2,808,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,038 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,914 UART: [afmc] --
2,852,026 UART: [cold-reset] --
2,853,006 UART: [state] Locking Datavault
2,854,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,931 UART: [state] Locking ICCM
2,855,365 UART: [exit] Launching FMC @ 0x40000130
2,860,694 UART:
2,860,710 UART: Running Caliptra FMC ...
2,861,118 UART:
2,861,172 UART: [state] CFI Enabled
2,871,853 UART: [fht] FMC Alias Private Key: 7
2,980,258 UART: [art] Extend RT PCRs Done
2,980,686 UART: [art] Lock RT PCRs Done
2,982,340 UART: [art] Populate DV Done
2,990,759 UART: [fht] FMC Alias Private Key: 7
2,991,849 UART: [art] Derive CDI
2,992,129 UART: [art] Store in in slot 0x4
3,077,976 UART: [art] Derive Key Pair
3,078,336 UART: [art] Store priv key in slot 0x5
3,091,318 UART: [art] Derive Key Pair - Done
3,106,376 UART: [art] Signing Cert with AUTHO
3,106,856 UART: RITY.KEYID = 7
3,122,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,081 UART: [art] PUB.X = 4EDFA99C8C3A61598FC27556FF03DC296D9D300E2F08DDA4A8D0FE9BAB88A5A986C23AB940714F86FA725E306F32D21E
3,129,858 UART: [art] PUB.Y = 42A8A94D835ECBB5A877D97FD27FA98E8F9C34D67F1BF019945298B9B8279B81B4D75A940B403EDA02B3781636183F51
3,136,804 UART: [art] SIG.R = FF7531BCEE49E11C5277B5E9E442C049B2783257D5FE17FFAE5DB8E3D021BB689E5D95F9A881F2122B50531DAA47B6F8
3,143,586 UART: [art] SIG.S = ED69B510320F7770AD71EB8A7B134F3E85EA66CBE807AA3442DC18C5E1826E2B9075D2652CA17F7417E3925C21F76514
3,167,243 UART: Caliptra RT
3,167,496 UART: [state] CFI Enabled
3,274,302 UART: [rt] RT listening for mailbox commands...
3,274,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,088 UART: [rt]cmd =0x44504543, len=96
3,485,119 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,203 ready_for_fw is high
1,060,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,840 >>> mbox cmd response: success
2,686,556 UART:
2,686,572 UART: Running Caliptra FMC ...
2,686,980 UART:
2,687,034 UART: [state] CFI Enabled
2,697,471 UART: [fht] FMC Alias Private Key: 7
2,805,378 UART: [art] Extend RT PCRs Done
2,805,806 UART: [art] Lock RT PCRs Done
2,807,470 UART: [art] Populate DV Done
2,815,631 UART: [fht] FMC Alias Private Key: 7
2,816,613 UART: [art] Derive CDI
2,816,893 UART: [art] Store in in slot 0x4
2,902,382 UART: [art] Derive Key Pair
2,902,742 UART: [art] Store priv key in slot 0x5
2,915,952 UART: [art] Derive Key Pair - Done
2,931,000 UART: [art] Signing Cert with AUTHO
2,931,480 UART: RITY.KEYID = 7
2,946,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,361 UART: [art] PUB.X = 3B056B72F6890EACD3C822AA86B94A09C8220DFCF1CAA28E3FD26CFB8B20035ECDF1CF602F182271897F5969727A96DB
2,954,130 UART: [art] PUB.Y = 8BB4A10FC132254168E6B5D7677C484DFC1B0F61260C3967FC45DE13FAEFA50FA4A65618818E6809BF9545F91C4BD7DF
2,961,075 UART: [art] SIG.R = 83688862A5329FBAB431B22DD1653A56DCA06B3EB4EE299D0D163EC68DD0EA2057E3324800646A347B2EABDD8DD9289F
2,967,830 UART: [art] SIG.S = EB0A309A43727D05820BB5DB7182231AF19EEBAEFC25D98D68538E260378A872CD593B6CAD8028FE552815EB6B1ABB51
2,991,053 UART: Caliptra RT
2,991,306 UART: [state] CFI Enabled
3,099,326 UART: [rt] RT listening for mailbox commands...
3,099,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,326 UART: [rt]cmd =0x44504543, len=96
3,310,086 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,471 UART: [kat] SHA2-512-ACC
908,372 UART: [kat] ECC-384
918,013 UART: [kat] HMAC-384Kdf
922,595 UART: [kat] LMS
1,170,923 UART: [kat] --
1,171,830 UART: [cold-reset] ++
1,172,214 UART: [fht] FHT @ 0x50003400
1,174,681 UART: [idev] ++
1,174,849 UART: [idev] CDI.KEYID = 6
1,175,209 UART: [idev] SUBJECT.KEYID = 7
1,175,633 UART: [idev] UDS.KEYID = 0
1,175,978 ready_for_fw is high
1,175,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,005 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,862 UART: [idev] --
1,210,760 UART: [ldev] ++
1,210,928 UART: [ldev] CDI.KEYID = 6
1,211,291 UART: [ldev] SUBJECT.KEYID = 5
1,211,717 UART: [ldev] AUTHORITY.KEYID = 7
1,212,180 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,243,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,564 UART: [ldev] --
1,282,843 UART: [fwproc] Wait for Commands...
1,283,477 UART: [fwproc] Recv command 0x46574c44
1,284,205 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,404 >>> mbox cmd response: success
2,771,648 UART: [afmc] ++
2,771,816 UART: [afmc] CDI.KEYID = 6
2,772,178 UART: [afmc] SUBJECT.KEYID = 7
2,772,603 UART: [afmc] AUTHORITY.KEYID = 5
2,808,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,843 UART: [afmc] --
2,851,951 UART: [cold-reset] --
2,852,729 UART: [state] Locking Datavault
2,853,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,362 UART: [state] Locking ICCM
2,854,878 UART: [exit] Launching FMC @ 0x40000130
2,860,207 UART:
2,860,223 UART: Running Caliptra FMC ...
2,860,631 UART:
2,860,774 UART: [state] CFI Enabled
2,871,469 UART: [fht] FMC Alias Private Key: 7
2,979,276 UART: [art] Extend RT PCRs Done
2,979,704 UART: [art] Lock RT PCRs Done
2,980,894 UART: [art] Populate DV Done
2,989,391 UART: [fht] FMC Alias Private Key: 7
2,990,517 UART: [art] Derive CDI
2,990,797 UART: [art] Store in in slot 0x4
3,076,506 UART: [art] Derive Key Pair
3,076,866 UART: [art] Store priv key in slot 0x5
3,091,050 UART: [art] Derive Key Pair - Done
3,105,783 UART: [art] Signing Cert with AUTHO
3,106,263 UART: RITY.KEYID = 7
3,121,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,332 UART: [art] PUB.X = 4DCAC0C31357A06FAE2CAD76CAE8BE4060208AD948299F76646E2018B9559037D0A02728A3F211F173B5EB5FC319E812
3,129,106 UART: [art] PUB.Y = 835CD345F7F4709F5D1EC8565176D3C85294908680E09C67FD7AD2A0B5B62D27EAA51CCD283ED909E7CC6C5539289AAE
3,136,061 UART: [art] SIG.R = A0D0E106F4706BA020CB3ADC877F87DA18A7D459ACED35C316C77771EAF37475DD574689419D3A01FAB569C7E0E3456A
3,142,835 UART: [art] SIG.S = 77D71EB1F9D1522241CAC436E287E560330365FE1EE59D53F9BD5D996526FA57E81539133F206AF51614EE854F898612
3,166,799 UART: Caliptra RT
3,167,144 UART: [state] CFI Enabled
3,274,965 UART: [rt] RT listening for mailbox commands...
3,275,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,123 UART: [rt]cmd =0x44504543, len=96
3,486,028 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,882 ready_for_fw is high
1,060,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,389 >>> mbox cmd response: success
2,684,585 UART:
2,684,601 UART: Running Caliptra FMC ...
2,685,009 UART:
2,685,152 UART: [state] CFI Enabled
2,695,793 UART: [fht] FMC Alias Private Key: 7
2,804,242 UART: [art] Extend RT PCRs Done
2,804,670 UART: [art] Lock RT PCRs Done
2,806,500 UART: [art] Populate DV Done
2,814,799 UART: [fht] FMC Alias Private Key: 7
2,815,877 UART: [art] Derive CDI
2,816,157 UART: [art] Store in in slot 0x4
2,901,796 UART: [art] Derive Key Pair
2,902,156 UART: [art] Store priv key in slot 0x5
2,915,136 UART: [art] Derive Key Pair - Done
2,929,829 UART: [art] Signing Cert with AUTHO
2,930,309 UART: RITY.KEYID = 7
2,945,193 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,958 UART: [art] PUB.X = 1E6268B60A12005184D4F817C304D869B719635B2A93E75A3539A7C0E0E7183CA5277F465A2CC48AC89828D770FEB6C8
2,952,696 UART: [art] PUB.Y = EDD38102B2E89917F0966F71EB3BE4B1BB4C9452281ADC5830A0F4B12B0DCEB43F56BF27B7950EFE0947C29E6D0B0BE7
2,959,644 UART: [art] SIG.R = 511E7062414BE8B25390F99130172C2ECEC6835E382C91E6E6A410AFE0842F8EF1EFA82FB3C9F2EDFD0524F4AC74E76D
2,966,423 UART: [art] SIG.S = 29E001EAF4B14D74D9957379C3CAF122D36222031A752B22EB8E7CBC0FC06190CD89A11ED97EF97533EB48693FD77C3B
2,989,883 UART: Caliptra RT
2,990,228 UART: [state] CFI Enabled
3,098,133 UART: [rt] RT listening for mailbox commands...
3,098,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,905 UART: [rt]cmd =0x44504543, len=96
3,309,002 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,831 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,135 UART: [kat] SHA2-256
901,075 UART: [kat] SHA2-384
903,834 UART: [kat] SHA2-512-ACC
905,735 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,280 UART: [kat] LMS
1,168,592 UART: [kat] --
1,169,353 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,539 UART: [idev] ++
1,172,707 UART: [idev] CDI.KEYID = 6
1,173,068 UART: [idev] SUBJECT.KEYID = 7
1,173,493 UART: [idev] UDS.KEYID = 0
1,173,839 ready_for_fw is high
1,173,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,415 UART: [idev] Sha1 KeyId Algorithm
1,207,317 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,268 UART: [ldev] --
1,280,756 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,943 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,323 >>> mbox cmd response: success
2,771,406 UART: [afmc] ++
2,771,574 UART: [afmc] CDI.KEYID = 6
2,771,937 UART: [afmc] SUBJECT.KEYID = 7
2,772,363 UART: [afmc] AUTHORITY.KEYID = 5
2,807,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,631 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,350 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,129 UART: [afmc] --
2,851,199 UART: [cold-reset] --
2,851,979 UART: [state] Locking Datavault
2,853,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,772 UART: [state] Locking ICCM
2,854,360 UART: [exit] Launching FMC @ 0x40000130
2,859,689 UART:
2,859,705 UART: Running Caliptra FMC ...
2,860,113 UART:
2,860,167 UART: [state] CFI Enabled
2,870,516 UART: [fht] FMC Alias Private Key: 7
2,978,123 UART: [art] Extend RT PCRs Done
2,978,551 UART: [art] Lock RT PCRs Done
2,979,997 UART: [art] Populate DV Done
2,988,496 UART: [fht] FMC Alias Private Key: 7
2,989,668 UART: [art] Derive CDI
2,989,948 UART: [art] Store in in slot 0x4
3,076,051 UART: [art] Derive Key Pair
3,076,411 UART: [art] Store priv key in slot 0x5
3,088,907 UART: [art] Derive Key Pair - Done
3,103,374 UART: [art] Signing Cert with AUTHO
3,103,854 UART: RITY.KEYID = 7
3,119,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,795 UART: [art] PUB.X = 8A4B94637CB8E43CD7416EEB332AD985208DD12A9219D71D4106D72B0894EA2DE38EE775ECBCD8F93B6929909E9AB063
3,126,567 UART: [art] PUB.Y = B6E273D508515CB7F9EDC8490A4C51FE16D70CBBFBC5C9DD4C625ECC348F12417965A2598D29BDFD092C03BDB5BEE959
3,133,522 UART: [art] SIG.R = D1C1800818CC559C76CEABA456C03BB75E561F609B41994BABDA83F5992D91B486998182DAD6146EC31666B288B8E083
3,140,291 UART: [art] SIG.S = CDC11557D6F8851EF12EC1749B69593D71323A97404426633C075DCBE15F5347855AF7A0185B11D4B33AE9932E4A1CEC
3,164,857 UART: Caliptra RT
3,165,110 UART: [state] CFI Enabled
3,272,950 UART: [rt] RT listening for mailbox commands...
3,273,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,206 UART: [rt]cmd =0x44504543, len=96
3,484,438 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,766 ready_for_fw is high
1,055,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,053 >>> mbox cmd response: success
2,681,209 UART:
2,681,225 UART: Running Caliptra FMC ...
2,681,633 UART:
2,681,687 UART: [state] CFI Enabled
2,692,118 UART: [fht] FMC Alias Private Key: 7
2,800,185 UART: [art] Extend RT PCRs Done
2,800,613 UART: [art] Lock RT PCRs Done
2,802,497 UART: [art] Populate DV Done
2,810,702 UART: [fht] FMC Alias Private Key: 7
2,811,692 UART: [art] Derive CDI
2,811,972 UART: [art] Store in in slot 0x4
2,897,261 UART: [art] Derive Key Pair
2,897,621 UART: [art] Store priv key in slot 0x5
2,911,375 UART: [art] Derive Key Pair - Done
2,926,184 UART: [art] Signing Cert with AUTHO
2,926,664 UART: RITY.KEYID = 7
2,942,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,007 UART: [art] PUB.X = 556BD7A8B9B70DC982A6549E6DD7BE3A10128DC5CA2308AD343CF38C3DFD50ED914218F37DCB20D8B7C6EE542D128BB0
2,949,789 UART: [art] PUB.Y = 3853530E05D64366DC24F69962B5113DF22856968305505CD58FE0C308EAD115B18762E2A2FF677FBCA9AF54771D69F6
2,956,723 UART: [art] SIG.R = 19BD0234778F79F6BE7781BAC182EFE604656D0840963AD01440C2291105EC701C91C2157FB40B719F8ABE01DB0C9F93
2,963,472 UART: [art] SIG.S = 3D2F8859E1941C7700ED5724FA5CBEFDF825878546E7210A26983A35D71B0FA6FB672B0F9691ED74C0E45433C1DD2342
2,987,156 UART: Caliptra RT
2,987,409 UART: [state] CFI Enabled
3,094,910 UART: [rt] RT listening for mailbox commands...
3,095,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,708 UART: [rt]cmd =0x44504543, len=96
3,305,829 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,164 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
891,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,950 UART: [kat] ++
896,102 UART: [kat] sha1
900,524 UART: [kat] SHA2-256
902,464 UART: [kat] SHA2-384
905,163 UART: [kat] SHA2-512-ACC
907,064 UART: [kat] ECC-384
916,859 UART: [kat] HMAC-384Kdf
921,423 UART: [kat] LMS
1,169,735 UART: [kat] --
1,170,650 UART: [cold-reset] ++
1,171,014 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,174,842 ready_for_fw is high
1,174,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,590 UART: [idev] Erasing UDS.KEYID = 0
1,200,140 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,603 UART: [ldev] --
1,281,971 UART: [fwproc] Wait for Commands...
1,282,786 UART: [fwproc] Recv command 0x46574c44
1,283,519 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,288 >>> mbox cmd response: success
2,771,425 UART: [afmc] ++
2,771,593 UART: [afmc] CDI.KEYID = 6
2,771,956 UART: [afmc] SUBJECT.KEYID = 7
2,772,382 UART: [afmc] AUTHORITY.KEYID = 5
2,808,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,414 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,106 UART: [afmc] --
2,852,190 UART: [cold-reset] --
2,853,124 UART: [state] Locking Datavault
2,854,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,865 UART: [state] Locking ICCM
2,855,321 UART: [exit] Launching FMC @ 0x40000130
2,860,650 UART:
2,860,666 UART: Running Caliptra FMC ...
2,861,074 UART:
2,861,217 UART: [state] CFI Enabled
2,872,030 UART: [fht] FMC Alias Private Key: 7
2,980,695 UART: [art] Extend RT PCRs Done
2,981,123 UART: [art] Lock RT PCRs Done
2,982,897 UART: [art] Populate DV Done
2,990,936 UART: [fht] FMC Alias Private Key: 7
2,991,950 UART: [art] Derive CDI
2,992,230 UART: [art] Store in in slot 0x4
3,077,975 UART: [art] Derive Key Pair
3,078,335 UART: [art] Store priv key in slot 0x5
3,091,397 UART: [art] Derive Key Pair - Done
3,106,057 UART: [art] Signing Cert with AUTHO
3,106,537 UART: RITY.KEYID = 7
3,122,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,828 UART: [art] PUB.X = 521CC1F9F37416128FC99D0A55F2074F8951B42F0902C8EBB2BBB4FC1139EE1E5AE51033D051D80B532FBAE43307FE03
3,129,585 UART: [art] PUB.Y = 56F51F38D735537C0645D0FC0D473A98F1E724E511972A4FF4844396151CE1FE68D4B016C78244540FBCEB7E9B078081
3,136,519 UART: [art] SIG.R = 83A14E32AB58E396C3A864E9C636263C40D8D9F7E974686DEB3F89342D7ED8B9C918B6505B3ED24EBBA91A36D6B97363
3,143,295 UART: [art] SIG.S = B6F689685AF410393A60BBCA4800EE9F78C3A8BC4A3C89AFCB15AB3B19DD1182128F7C1F6F7D0422C5DACF8E23E7A97B
3,166,877 UART: Caliptra RT
3,167,222 UART: [state] CFI Enabled
3,274,076 UART: [rt] RT listening for mailbox commands...
3,274,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,920 UART: [rt]cmd =0x44504543, len=96
3,485,726 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 ready_for_fw is high
1,056,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,294 >>> mbox cmd response: success
2,680,670 UART:
2,680,686 UART: Running Caliptra FMC ...
2,681,094 UART:
2,681,237 UART: [state] CFI Enabled
2,692,334 UART: [fht] FMC Alias Private Key: 7
2,800,139 UART: [art] Extend RT PCRs Done
2,800,567 UART: [art] Lock RT PCRs Done
2,801,999 UART: [art] Populate DV Done
2,810,542 UART: [fht] FMC Alias Private Key: 7
2,811,506 UART: [art] Derive CDI
2,811,786 UART: [art] Store in in slot 0x4
2,897,735 UART: [art] Derive Key Pair
2,898,095 UART: [art] Store priv key in slot 0x5
2,912,023 UART: [art] Derive Key Pair - Done
2,926,809 UART: [art] Signing Cert with AUTHO
2,927,289 UART: RITY.KEYID = 7
2,942,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,726 UART: [art] PUB.X = 8135AFCF7092145488B0D3E3E845BC7845094754E707986147FB434D2BD387F4D26EE4BF1320755236579D259653F8BC
2,950,480 UART: [art] PUB.Y = CD72DFFDF729E0E9E5E6EAA08D7AD3292EE37EC1C3CB0A4AE52A2A71FD0F257CAF18764946BCCC4A2A464C04CA785CC6
2,957,451 UART: [art] SIG.R = 18AB1B8C373D2791B2FD884DF764556837D07D4E3ABA10B940F451A3CE928EB5E85F1CB10C78BF1E5F3F2763D3A2CC60
2,964,230 UART: [art] SIG.S = 35B8BE2F8516AB2BA305F67276273773AB05E8EBC0D8E75CB851AF7B08EF7812DC3C67148C55831A7D689320033ACA10
2,987,653 UART: Caliptra RT
2,987,998 UART: [state] CFI Enabled
3,095,671 UART: [rt] RT listening for mailbox commands...
3,096,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,933 UART: [rt]cmd =0x44504543, len=96
3,307,814 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,202 UART:
192,568 UART: Running Caliptra ROM ...
193,713 UART:
193,863 UART: [state] CFI Enabled
268,252 UART: [state] LifecycleState = Unprovisioned
270,172 UART: [state] DebugLocked = No
272,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,069 UART: [kat] SHA2-256
447,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,298 UART: [kat] ++
458,834 UART: [kat] sha1
469,506 UART: [kat] SHA2-256
472,234 UART: [kat] SHA2-384
478,720 UART: [kat] SHA2-512-ACC
481,087 UART: [kat] ECC-384
2,769,138 UART: [kat] HMAC-384Kdf
2,801,706 UART: [kat] LMS
3,991,995 UART: [kat] --
3,995,736 UART: [cold-reset] ++
3,998,317 UART: [fht] Storing FHT @ 0x50003400
4,010,435 UART: [idev] ++
4,011,012 UART: [idev] CDI.KEYID = 6
4,011,932 UART: [idev] SUBJECT.KEYID = 7
4,013,184 UART: [idev] UDS.KEYID = 0
4,014,232 ready_for_fw is high
4,014,462 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,570 UART: [idev] Erasing UDS.KEYID = 0
7,344,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,529 UART: [idev] --
7,371,299 UART: [ldev] ++
7,371,867 UART: [ldev] CDI.KEYID = 6
7,372,803 UART: [ldev] SUBJECT.KEYID = 5
7,374,011 UART: [ldev] AUTHORITY.KEYID = 7
7,375,296 UART: [ldev] FE.KEYID = 1
7,403,094 UART: [ldev] Erasing FE.KEYID = 1
10,733,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,916 UART: [ldev] --
13,096,788 UART: [fwproc] Waiting for Commands...
13,098,834 UART: [fwproc] Received command 0x46574c44
13,101,017 UART: [fwproc] Received Image of size 113760 bytes
17,145,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,602,860 >>> mbox cmd response: success
17,606,601 UART: [afmc] ++
17,607,198 UART: [afmc] CDI.KEYID = 6
17,608,221 UART: [afmc] SUBJECT.KEYID = 7
17,609,379 UART: [afmc] AUTHORITY.KEYID = 5
20,967,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,773 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,090 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,465 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,299 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,804 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,411 UART: [afmc] --
23,355,038 UART: [cold-reset] --
23,357,552 UART: [state] Locking Datavault
23,362,096 UART: [state] Locking PCR0, PCR1 and PCR31
23,363,797 UART: [state] Locking ICCM
23,365,298 UART: [exit] Launching FMC @ 0x40000130
23,373,694 UART:
23,373,930 UART: Running Caliptra FMC ...
23,375,030 UART:
23,375,192 UART: [state] CFI Enabled
23,441,272 UART: [fht] FMC Alias Private Key: 7
25,778,959 UART: [art] Extend RT PCRs Done
25,780,181 UART: [art] Lock RT PCRs Done
25,781,792 UART: [art] Populate DV Done
25,787,253 UART: [fht] FMC Alias Private Key: 7
25,788,804 UART: [art] Derive CDI
25,789,541 UART: [art] Store in in slot 0x4
25,849,177 UART: [art] Derive Key Pair
25,850,217 UART: [art] Store priv key in slot 0x5
29,143,261 UART: [art] Derive Key Pair - Done
29,156,365 UART: [art] Signing Cert with AUTHO
29,157,668 UART: RITY.KEYID = 7
31,444,872 UART: [art] Erasing AUTHORITY.KEYID = 7
31,446,378 UART: [art] PUB.X = F39B0CB47DA318820E87E28723C691A48928A496E795F7114B67EC8DB1382578CA5C880917601DE2A86F476522FA0189
31,453,562 UART: [art] PUB.Y = 203E68877CBC860CFDFE74C1E9D78D360007FA189CBFDE341565F0940449A74A4FADEB29CB627875101A42CE5A227E8F
31,460,838 UART: [art] SIG.R = 442525130A470ADF8DFBCF0471D92951EC4937359307D3377A78D84CEDD434BDA3BE8F70FD2AFBE83D1AFE56F9BEC7B2
31,468,231 UART: [art] SIG.S = 30D59285B00FF986A40F12CAFBF3D593145007E40CA1E60BC44987DE802984CA197E88B2D58E73DDBB84E56DE774EC87
32,773,093 UART: Caliptra RT
32,773,817 UART: [state] CFI Enabled
32,935,524 UART: [rt] RT listening for mailbox commands...
32,937,429 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,968,150 UART: [rt]cmd =0x44504543, len=28
33,011,063 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,786,745 ready_for_fw is high
3,787,179 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,822,702 >>> mbox cmd response: success
23,507,533 UART:
23,507,918 UART: Running Caliptra FMC ...
23,509,065 UART:
23,509,226 UART: [state] CFI Enabled
23,577,339 UART: [fht] FMC Alias Private Key: 7
25,915,143 UART: [art] Extend RT PCRs Done
25,916,372 UART: [art] Lock RT PCRs Done
25,918,112 UART: [art] Populate DV Done
25,923,624 UART: [fht] FMC Alias Private Key: 7
25,925,222 UART: [art] Derive CDI
25,925,962 UART: [art] Store in in slot 0x4
25,985,701 UART: [art] Derive Key Pair
25,986,729 UART: [art] Store priv key in slot 0x5
29,279,813 UART: [art] Derive Key Pair - Done
29,292,807 UART: [art] Signing Cert with AUTHO
29,294,139 UART: RITY.KEYID = 7
31,579,862 UART: [art] Erasing AUTHORITY.KEYID = 7
31,581,371 UART: [art] PUB.X = CC67B6EEFFB5BEAA45C3EF224EA13A3AB5D995B868254DD4C291C9FE9D009724D3FE40CF0A47F42B61DB4718C45C43AF
31,588,636 UART: [art] PUB.Y = 7D1BE30B075C186F06298B34AF69A235EFD006E0AE43917331E7BB36A212AF5C3F43B8148568FAC98B8048D4DEBBAF7B
31,595,887 UART: [art] SIG.R = 9348F6252453E85164AFD40D1F02219FEFEC7A45F8C41279DC6782F1B767C7216B08E88C6059352E5FB1BE292BB2C2D8
31,603,283 UART: [art] SIG.S = C76E6DC6BD3AA88C7079886CF28CC1149947867B800AA3E73DBBC4CA87F5D1FFC6F05AF68C65A4A970CD938DCF93DD57
32,908,948 UART: Caliptra RT
32,909,664 UART: [state] CFI Enabled
33,091,008 UART: [rt] RT listening for mailbox commands...
33,092,945 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,123,499 UART: [rt]cmd =0x44504543, len=28
33,166,185 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,661 writing to cptra_bootfsm_go
192,722 UART:
193,108 UART: Running Caliptra ROM ...
194,240 UART:
604,175 UART: [state] CFI Enabled
621,049 UART: [state] LifecycleState = Unprovisioned
623,002 UART: [state] DebugLocked = No
625,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,504 UART: [kat] SHA2-256
800,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,791 UART: [kat] ++
811,230 UART: [kat] sha1
822,948 UART: [kat] SHA2-256
825,665 UART: [kat] SHA2-384
831,577 UART: [kat] SHA2-512-ACC
833,937 UART: [kat] ECC-384
3,117,449 UART: [kat] HMAC-384Kdf
3,130,049 UART: [kat] LMS
4,320,187 UART: [kat] --
4,325,986 UART: [cold-reset] ++
4,327,629 UART: [fht] Storing FHT @ 0x50003400
4,337,691 UART: [idev] ++
4,338,261 UART: [idev] CDI.KEYID = 6
4,339,143 UART: [idev] SUBJECT.KEYID = 7
4,340,450 UART: [idev] UDS.KEYID = 0
4,341,471 ready_for_fw is high
4,341,688 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,689 UART: [idev] Erasing UDS.KEYID = 0
7,625,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,662 UART: [idev] --
7,652,683 UART: [ldev] ++
7,653,255 UART: [ldev] CDI.KEYID = 6
7,654,271 UART: [ldev] SUBJECT.KEYID = 5
7,655,423 UART: [ldev] AUTHORITY.KEYID = 7
7,656,700 UART: [ldev] FE.KEYID = 1
7,668,098 UART: [ldev] Erasing FE.KEYID = 1
10,957,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,250 UART: [ldev] --
13,316,599 UART: [fwproc] Waiting for Commands...
13,319,539 UART: [fwproc] Received command 0x46574c44
13,321,775 UART: [fwproc] Received Image of size 113760 bytes
17,371,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,831,188 >>> mbox cmd response: success
17,835,589 UART: [afmc] ++
17,836,182 UART: [afmc] CDI.KEYID = 6
17,837,202 UART: [afmc] SUBJECT.KEYID = 7
17,838,358 UART: [afmc] AUTHORITY.KEYID = 5
21,150,534 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,622 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,875 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,247 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,095 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,549 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,508 UART: [afmc] --
23,516,698 UART: [cold-reset] --
23,522,169 UART: [state] Locking Datavault
23,528,274 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,024 UART: [state] Locking ICCM
23,532,256 UART: [exit] Launching FMC @ 0x40000130
23,540,654 UART:
23,540,885 UART: Running Caliptra FMC ...
23,541,978 UART:
23,542,131 UART: [state] CFI Enabled
23,550,255 UART: [fht] FMC Alias Private Key: 7
25,880,719 UART: [art] Extend RT PCRs Done
25,881,938 UART: [art] Lock RT PCRs Done
25,883,668 UART: [art] Populate DV Done
25,889,096 UART: [fht] FMC Alias Private Key: 7
25,890,747 UART: [art] Derive CDI
25,891,560 UART: [art] Store in in slot 0x4
25,934,364 UART: [art] Derive Key Pair
25,935,358 UART: [art] Store priv key in slot 0x5
29,177,256 UART: [art] Derive Key Pair - Done
29,189,976 UART: [art] Signing Cert with AUTHO
29,191,271 UART: RITY.KEYID = 7
31,470,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,663 UART: [art] PUB.X = F48018DFC15FA3FC58F9FCAC2AB648194225F5A6D8326BA9E29DF0C2A005E020EBD4183AD36ECE9E3BB98441041BB147
31,478,953 UART: [art] PUB.Y = 44C313EE284AEC67ABE692A6DA1B4B29E93AFD0BBCBA67FB8079DDFCB111C76DE6AE792832F66484496A78405D3205E8
31,486,163 UART: [art] SIG.R = A433113A9F1F1D3AF8880012D4FE4D4DD8E35FB9EF18F2696B5E4964C7002CFA75F9421F84B8F6EC722C14F20CE230E3
31,493,527 UART: [art] SIG.S = EB83FDFA61D4C482A1D07023EDD4D33FFD423B280EE81C09DAC10A09DF8923EFFFD66E1B2C125C68F8998A185FF1A56C
32,799,123 UART: Caliptra RT
32,799,815 UART: [state] CFI Enabled
32,916,702 UART: [rt] RT listening for mailbox commands...
32,918,622 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,948,646 UART: [rt]cmd =0x44504543, len=28
32,991,366 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,586 writing to cptra_bootfsm_go
4,127,805 ready_for_fw is high
4,128,436 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,151 >>> mbox cmd response: success
23,705,720 UART:
23,706,114 UART: Running Caliptra FMC ...
23,707,430 UART:
23,707,594 UART: [state] CFI Enabled
23,715,331 UART: [fht] FMC Alias Private Key: 7
26,045,750 UART: [art] Extend RT PCRs Done
26,046,980 UART: [art] Lock RT PCRs Done
26,048,854 UART: [art] Populate DV Done
26,054,398 UART: [fht] FMC Alias Private Key: 7
26,056,054 UART: [art] Derive CDI
26,056,797 UART: [art] Store in in slot 0x4
26,099,555 UART: [art] Derive Key Pair
26,100,553 UART: [art] Store priv key in slot 0x5
29,342,436 UART: [art] Derive Key Pair - Done
29,355,658 UART: [art] Signing Cert with AUTHO
29,356,971 UART: RITY.KEYID = 7
31,636,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,882 UART: [art] PUB.X = 7816BE3F249D1017E72E7E595765EF7B03A2CD4C905C44078E74A688A2153BED47E1E57503E02F1B238F513CB44C1D5E
31,645,097 UART: [art] PUB.Y = 38C789A45B79C8F076C5BF798487A03914459C3BB0DAC3F6886F67B5A3452F035260E83CD4387373F2FDB2CD98E22FF1
31,652,365 UART: [art] SIG.R = E75B03D457552BA21AAC03F36450E0CDA6F7C1372E3AD7F2818BE6B6CFFBEF57C502EA6F1E85C5AD5F7AF8C31B59CB18
31,659,758 UART: [art] SIG.S = B5F66387D91C4638D9153F9E1858EE6E6471CCB0D7B55594E75F61ACB5235E423BB91C52C72FA9BDEF64ECD2D77AB1EC
32,964,802 UART: Caliptra RT
32,965,524 UART: [state] CFI Enabled
33,083,877 UART: [rt] RT listening for mailbox commands...
33,085,833 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,115,926 UART: [rt]cmd =0x44504543, len=28
33,158,782 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,619 UART:
192,988 UART: Running Caliptra ROM ...
194,191 UART:
194,362 UART: [state] CFI Enabled
263,184 UART: [state] LifecycleState = Unprovisioned
265,091 UART: [state] DebugLocked = No
267,831 UART: [state] WD Timer not started. Device not locked for debugging
272,295 UART: [kat] SHA2-256
451,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,010 UART: [kat] ++
463,547 UART: [kat] sha1
475,487 UART: [kat] SHA2-256
478,565 UART: [kat] SHA2-384
484,054 UART: [kat] SHA2-512-ACC
487,058 UART: [kat] ECC-384
2,948,865 UART: [kat] HMAC-384Kdf
2,971,262 UART: [kat] LMS
3,500,702 UART: [kat] --
3,503,874 UART: [cold-reset] ++
3,506,325 UART: [fht] FHT @ 0x50003400
3,518,448 UART: [idev] ++
3,519,008 UART: [idev] CDI.KEYID = 6
3,519,933 UART: [idev] SUBJECT.KEYID = 7
3,521,103 UART: [idev] UDS.KEYID = 0
3,522,094 ready_for_fw is high
3,522,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,779 UART: [idev] Erasing UDS.KEYID = 0
6,025,224 UART: [idev] Sha1 KeyId Algorithm
6,048,503 UART: [idev] --
6,052,011 UART: [ldev] ++
6,052,582 UART: [ldev] CDI.KEYID = 6
6,053,491 UART: [ldev] SUBJECT.KEYID = 5
6,054,687 UART: [ldev] AUTHORITY.KEYID = 7
6,055,855 UART: [ldev] FE.KEYID = 1
6,100,104 UART: [ldev] Erasing FE.KEYID = 1
8,601,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,233 UART: [ldev] --
10,411,150 UART: [fwproc] Wait for Commands...
10,414,371 UART: [fwproc] Recv command 0x46574c44
10,416,455 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,651 >>> mbox cmd response: success
14,279,188 UART: [afmc] ++
14,279,780 UART: [afmc] CDI.KEYID = 6
14,280,663 UART: [afmc] SUBJECT.KEYID = 7
14,281,833 UART: [afmc] AUTHORITY.KEYID = 5
16,803,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,448 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,314 UART: [afmc] --
18,608,224 UART: [cold-reset] --
18,612,139 UART: [state] Locking Datavault
18,619,495 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,234 UART: [state] Locking ICCM
18,623,548 UART: [exit] Launching FMC @ 0x40000130
18,631,944 UART:
18,632,183 UART: Running Caliptra FMC ...
18,633,276 UART:
18,633,451 UART: [state] CFI Enabled
18,689,213 UART: [fht] FMC Alias Private Key: 7
20,453,058 UART: [art] Extend RT PCRs Done
20,454,283 UART: [art] Lock RT PCRs Done
20,455,963 UART: [art] Populate DV Done
20,461,486 UART: [fht] FMC Alias Private Key: 7
20,463,061 UART: [art] Derive CDI
20,463,885 UART: [art] Store in in slot 0x4
20,521,360 UART: [art] Derive Key Pair
20,522,357 UART: [art] Store priv key in slot 0x5
22,985,463 UART: [art] Derive Key Pair - Done
22,998,523 UART: [art] Signing Cert with AUTHO
22,999,833 UART: RITY.KEYID = 7
24,711,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,212 UART: [art] PUB.X = BE741C1F73E88CC0CDC4493D150E06C9A17C04741ACA19BC56279D76CFE644471D6324918C5A19E5CD27F9860F905529
24,720,449 UART: [art] PUB.Y = AEB5DFBDA34B9340FE12CBE03C81B2A7A7A3B25CF5154572BAF18D4060CB66671B33DA6F6FD4A7D5C0B36A27B26BDA83
24,727,771 UART: [art] SIG.R = 9DB5406F07DB2BE3CBCAAAC590C2C148F06ECEF721A004699EEFDE219AF16953CF0466956A6EDEA091891514A69C8D26
24,735,152 UART: [art] SIG.S = 92048F41948DB9AC72CDFD69C4E8B49830CC4878A1B1087D2FCB72F075BC59EE8EBDC6F0781475E4CEE17208E2644AC1
25,714,031 UART: Caliptra RT
25,714,928 UART: [state] CFI Enabled
25,881,059 UART: [rt] RT listening for mailbox commands...
25,883,047 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,913,646 UART: [rt]cmd =0x44504543, len=28
25,956,321 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,382,565 ready_for_fw is high
3,382,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,046,186 >>> mbox cmd response: success
18,321,715 UART:
18,322,123 UART: Running Caliptra FMC ...
18,323,320 UART:
18,323,492 UART: [state] CFI Enabled
18,392,849 UART: [fht] FMC Alias Private Key: 7
20,156,871 UART: [art] Extend RT PCRs Done
20,158,115 UART: [art] Lock RT PCRs Done
20,159,686 UART: [art] Populate DV Done
20,165,209 UART: [fht] FMC Alias Private Key: 7
20,166,751 UART: [art] Derive CDI
20,167,564 UART: [art] Store in in slot 0x4
20,226,391 UART: [art] Derive Key Pair
20,227,426 UART: [art] Store priv key in slot 0x5
22,689,728 UART: [art] Derive Key Pair - Done
22,702,622 UART: [art] Signing Cert with AUTHO
22,703,916 UART: RITY.KEYID = 7
24,415,758 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,260 UART: [art] PUB.X = 1651E98FCA621774F8E769B26D98DA4C4B8BC7B9B597770B8D112F886F078353A89BAE418617CED90A7E21A7F5F18979
24,424,513 UART: [art] PUB.Y = A87A2908C1A7CB9471DE5302DB2BA933CB1EFB73690EEA8213A999824BD07D417201EB13541FFF36B8320F66C491D2B3
24,431,798 UART: [art] SIG.R = 051A1FFF46D087DC1F82E8D026820AAE0397E8649A5A40FDF4BDAB154AD654174C8EE0124253CBA9391300ABD6908E19
24,439,263 UART: [art] SIG.S = 89732755F22DC2D2D782895B912CCD03A97CB07F8D2B8A4DEF7C4245CBBEAD28A1E8DFB7FF36F9C89B9FFDD5FA6D7DBD
25,417,804 UART: Caliptra RT
25,418,518 UART: [state] CFI Enabled
25,584,326 UART: [rt] RT listening for mailbox commands...
25,586,263 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,616,670 UART: [rt]cmd =0x44504543, len=28
25,659,142 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,855 writing to cptra_bootfsm_go
194,089 UART:
194,459 UART: Running Caliptra ROM ...
195,650 UART:
605,329 UART: [state] CFI Enabled
618,923 UART: [state] LifecycleState = Unprovisioned
620,807 UART: [state] DebugLocked = No
622,195 UART: [state] WD Timer not started. Device not locked for debugging
625,167 UART: [kat] SHA2-256
804,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,844 UART: [kat] ++
816,406 UART: [kat] sha1
828,640 UART: [kat] SHA2-256
831,648 UART: [kat] SHA2-384
838,137 UART: [kat] SHA2-512-ACC
841,080 UART: [kat] ECC-384
3,282,524 UART: [kat] HMAC-384Kdf
3,294,692 UART: [kat] LMS
3,824,172 UART: [kat] --
3,829,871 UART: [cold-reset] ++
3,832,086 UART: [fht] FHT @ 0x50003400
3,842,870 UART: [idev] ++
3,843,473 UART: [idev] CDI.KEYID = 6
3,844,363 UART: [idev] SUBJECT.KEYID = 7
3,845,610 UART: [idev] UDS.KEYID = 0
3,846,537 ready_for_fw is high
3,846,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,244 UART: [idev] Erasing UDS.KEYID = 0
6,325,829 UART: [idev] Sha1 KeyId Algorithm
6,347,331 UART: [idev] --
6,350,631 UART: [ldev] ++
6,351,203 UART: [ldev] CDI.KEYID = 6
6,352,087 UART: [ldev] SUBJECT.KEYID = 5
6,353,301 UART: [ldev] AUTHORITY.KEYID = 7
6,354,588 UART: [ldev] FE.KEYID = 1
6,365,722 UART: [ldev] Erasing FE.KEYID = 1
8,840,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,612 UART: [ldev] --
10,629,418 UART: [fwproc] Wait for Commands...
10,632,291 UART: [fwproc] Recv command 0x46574c44
10,634,344 UART: [fwproc] Recv'd Img size: 114084 bytes
14,038,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,498,291 >>> mbox cmd response: success
14,502,791 UART: [afmc] ++
14,503,396 UART: [afmc] CDI.KEYID = 6
14,504,314 UART: [afmc] SUBJECT.KEYID = 7
14,505,472 UART: [afmc] AUTHORITY.KEYID = 5
17,002,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,272 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,940 UART: [afmc] --
18,800,052 UART: [cold-reset] --
18,804,245 UART: [state] Locking Datavault
18,809,423 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,094 UART: [state] Locking ICCM
18,812,117 UART: [exit] Launching FMC @ 0x40000130
18,820,578 UART:
18,820,815 UART: Running Caliptra FMC ...
18,821,919 UART:
18,822,080 UART: [state] CFI Enabled
18,829,805 UART: [fht] FMC Alias Private Key: 7
20,586,619 UART: [art] Extend RT PCRs Done
20,587,835 UART: [art] Lock RT PCRs Done
20,589,680 UART: [art] Populate DV Done
20,595,200 UART: [fht] FMC Alias Private Key: 7
20,596,746 UART: [art] Derive CDI
20,597,586 UART: [art] Store in in slot 0x4
20,640,509 UART: [art] Derive Key Pair
20,641,701 UART: [art] Store priv key in slot 0x5
23,068,685 UART: [art] Derive Key Pair - Done
23,082,121 UART: [art] Signing Cert with AUTHO
23,083,423 UART: RITY.KEYID = 7
24,789,144 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,647 UART: [art] PUB.X = C12BFA5FEEA462944075AB80DF54C157C7185505AB3FCE5011BB1E2F2C60F53C7CB9D476A9F6FE5302DDDEFAFC4C9C46
24,797,918 UART: [art] PUB.Y = 5844D2504B4E6A853C40F153BBC8FEFB01BFEC9F9FAB3E6B9E8C21613E1405FABF278C887B0B5EEB07E3CFF1DFF6492A
24,805,200 UART: [art] SIG.R = 5FEB40875613DF753EB4CB3E2F9C6AEF0D34744A2A7C5C976411E718C287395A354D8359F0D679C9622B173372374320
24,812,588 UART: [art] SIG.S = D37F8CEBD317CD707645170A5BABB1AF7A3F3C52798B853C04FB31C0B4858E1A90007D0FF9198DA93A0C3543010BF91C
25,791,040 UART: Caliptra RT
25,791,751 UART: [state] CFI Enabled
25,909,233 UART: [rt] RT listening for mailbox commands...
25,911,140 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,941,121 UART: [rt]cmd =0x44504543, len=28
25,983,949 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,759 writing to cptra_bootfsm_go
3,693,391 ready_for_fw is high
3,694,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,241 >>> mbox cmd response: success
18,503,992 UART:
18,504,404 UART: Running Caliptra FMC ...
18,505,604 UART:
18,505,782 UART: [state] CFI Enabled
18,513,251 UART: [fht] FMC Alias Private Key: 7
20,270,139 UART: [art] Extend RT PCRs Done
20,271,378 UART: [art] Lock RT PCRs Done
20,273,093 UART: [art] Populate DV Done
20,278,371 UART: [fht] FMC Alias Private Key: 7
20,279,937 UART: [art] Derive CDI
20,280,678 UART: [art] Store in in slot 0x4
20,323,448 UART: [art] Derive Key Pair
20,324,492 UART: [art] Store priv key in slot 0x5
22,751,142 UART: [art] Derive Key Pair - Done
22,764,312 UART: [art] Signing Cert with AUTHO
22,765,618 UART: RITY.KEYID = 7
24,471,267 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,773 UART: [art] PUB.X = 8CCBD0FAD1F32E83A9026646F835202723C8F30BCF071B39AD7EB08A62E9D72AAED16C43B57B8F1331EBB7ED69EEF649
24,480,079 UART: [art] PUB.Y = 74EE2F890A7D2E3AC78BF5C07697193F86270E39B457C8E9985A30F7CF8BEBA16E06A3B41647DE7C2592279A73D4DC26
24,487,316 UART: [art] SIG.R = BED9E7CFBC4DA0472EB74091320D6A2DB98EA31EB55786D6D439B47FE11C03E094702D7136227C4498C161DA7AFC641D
24,494,751 UART: [art] SIG.S = 53685E0F41F189FD989B03D5FD51CD6A171F9307F94A4048DED1821DE8C968B53BB95F6ECE4DAC6F7F8F5DA77F13B7A8
25,473,453 UART: Caliptra RT
25,474,155 UART: [state] CFI Enabled
25,591,720 UART: [rt] RT listening for mailbox commands...
25,593,797 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,623,887 UART: [rt]cmd =0x44504543, len=28
25,666,445 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,446 UART:
192,819 UART: Running Caliptra ROM ...
194,031 UART:
194,189 UART: [state] CFI Enabled
265,721 UART: [state] LifecycleState = Unprovisioned
268,077 UART: [state] DebugLocked = No
271,036 UART: [state] WD Timer not started. Device not locked for debugging
275,724 UART: [kat] SHA2-256
465,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,393 UART: [kat] ++
476,869 UART: [kat] sha1
487,313 UART: [kat] SHA2-256
490,327 UART: [kat] SHA2-384
496,315 UART: [kat] SHA2-512-ACC
498,895 UART: [kat] ECC-384
2,949,814 UART: [kat] HMAC-384Kdf
2,972,085 UART: [kat] LMS
3,503,840 UART: [kat] --
3,507,947 UART: [cold-reset] ++
3,510,459 UART: [fht] FHT @ 0x50003400
3,521,299 UART: [idev] ++
3,522,004 UART: [idev] CDI.KEYID = 6
3,523,039 UART: [idev] SUBJECT.KEYID = 7
3,524,142 UART: [idev] UDS.KEYID = 0
3,525,066 ready_for_fw is high
3,525,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,742 UART: [idev] Erasing UDS.KEYID = 0
6,032,010 UART: [idev] Sha1 KeyId Algorithm
6,054,593 UART: [idev] --
6,059,433 UART: [ldev] ++
6,060,177 UART: [ldev] CDI.KEYID = 6
6,061,090 UART: [ldev] SUBJECT.KEYID = 5
6,062,251 UART: [ldev] AUTHORITY.KEYID = 7
6,063,480 UART: [ldev] FE.KEYID = 1
6,101,744 UART: [ldev] Erasing FE.KEYID = 1
8,606,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,569 UART: [ldev] --
10,416,584 UART: [fwproc] Wait for Commands...
10,419,693 UART: [fwproc] Recv command 0x46574c44
10,421,939 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,251 >>> mbox cmd response: success
14,605,536 UART: [afmc] ++
14,606,300 UART: [afmc] CDI.KEYID = 6
14,607,510 UART: [afmc] SUBJECT.KEYID = 7
14,608,958 UART: [afmc] AUTHORITY.KEYID = 5
17,150,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,184 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,118 UART: [afmc] --
18,947,881 UART: [cold-reset] --
18,950,943 UART: [state] Locking Datavault
18,955,504 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,669 UART: [state] Locking ICCM
18,960,039 UART: [exit] Launching FMC @ 0x40000130
18,968,673 UART:
18,968,911 UART: Running Caliptra FMC ...
18,970,025 UART:
18,970,184 UART: [state] CFI Enabled
19,032,281 UART: [fht] FMC Alias Private Key: 7
20,795,729 UART: [art] Extend RT PCRs Done
20,796,953 UART: [art] Lock RT PCRs Done
20,798,846 UART: [art] Populate DV Done
20,804,206 UART: [fht] FMC Alias Private Key: 7
20,805,844 UART: [art] Derive CDI
20,806,659 UART: [art] Store in in slot 0x4
20,864,997 UART: [art] Derive Key Pair
20,866,034 UART: [art] Store priv key in slot 0x5
23,329,206 UART: [art] Derive Key Pair - Done
23,342,151 UART: [art] Signing Cert with AUTHO
23,343,448 UART: RITY.KEYID = 7
25,055,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,845 UART: [art] PUB.X = DD75C22F9353120CF901A59E8B1F702E2FE6A0644EBF4450F81F2EC9C1335A4F3F554DD6549C7F851EEB5F419618C4AE
25,064,128 UART: [art] PUB.Y = D78B163DC274A000A36044FDB6C64CCF09AFD52019A06BB609AC08DF9989A9A2228AB7107FDA1C77A2F80974BBF686DD
25,071,375 UART: [art] SIG.R = 394A4413BA3FB1820E6A5334D3FFB5BA82A0E87815E355CF13289BFD50C8EF4A74476EA19F4F731A6242EF78E2107679
25,078,783 UART: [art] SIG.S = D1869AABE183CCBEE8D285C1F24CC8477FF81082035C599F39107319B716D9DCE4B0AFB984EBB9B0B5D2042F3F11833A
26,057,994 UART: Caliptra RT
26,058,712 UART: [state] CFI Enabled
26,236,519 UART: [rt] RT listening for mailbox commands...
26,238,428 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,268,848 UART: [rt]cmd =0x44504543, len=28
26,311,216 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,437,130 ready_for_fw is high
3,437,528 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,736,141 >>> mbox cmd response: success
19,029,531 UART:
19,029,940 UART: Running Caliptra FMC ...
19,031,077 UART:
19,031,244 UART: [state] CFI Enabled
19,096,137 UART: [fht] FMC Alias Private Key: 7
20,859,538 UART: [art] Extend RT PCRs Done
20,860,756 UART: [art] Lock RT PCRs Done
20,862,108 UART: [art] Populate DV Done
20,867,600 UART: [fht] FMC Alias Private Key: 7
20,869,136 UART: [art] Derive CDI
20,869,947 UART: [art] Store in in slot 0x4
20,927,648 UART: [art] Derive Key Pair
20,928,681 UART: [art] Store priv key in slot 0x5
23,391,763 UART: [art] Derive Key Pair - Done
23,404,553 UART: [art] Signing Cert with AUTHO
23,405,853 UART: RITY.KEYID = 7
25,117,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,868 UART: [art] PUB.X = 52DBB2E50B0DD52A2611FC123F80207715AA9DEFAD148198645F1AB2ABEDB0E414D6913C18B0FAB9AC29E1E1F240815B
25,126,107 UART: [art] PUB.Y = B638A8F49A800F1A3D1820CB0C7F2F4362E22BE8EA3D18A974B1C0E3A1DF5027331F4C7FF7312C03866BF6BEA89075DF
25,133,411 UART: [art] SIG.R = 989E627321FAFF544BAD318C51587C342E649787C168387A3F77FFF2942DA3FB61C88349D97953862171B9602994E24C
25,140,829 UART: [art] SIG.S = 7A4C002D971E655C2EE9CDF70E0DFA6305F298BD045693BB64EF07C141A6C707E23BA1D98942A6F68C1A2AE9B20A8A7E
26,120,055 UART: Caliptra RT
26,120,763 UART: [state] CFI Enabled
26,284,643 UART: [rt] RT listening for mailbox commands...
26,286,581 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,317,133 UART: [rt]cmd =0x44504543, len=28
26,359,976 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
193,130 UART:
193,519 UART: Running Caliptra ROM ...
194,725 UART:
604,437 UART: [state] CFI Enabled
617,682 UART: [state] LifecycleState = Unprovisioned
620,057 UART: [state] DebugLocked = No
621,387 UART: [state] WD Timer not started. Device not locked for debugging
626,277 UART: [kat] SHA2-256
816,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,046 UART: [kat] ++
827,572 UART: [kat] sha1
838,101 UART: [kat] SHA2-256
841,111 UART: [kat] SHA2-384
847,031 UART: [kat] SHA2-512-ACC
849,621 UART: [kat] ECC-384
3,293,132 UART: [kat] HMAC-384Kdf
3,307,260 UART: [kat] LMS
3,839,128 UART: [kat] --
3,845,140 UART: [cold-reset] ++
3,846,577 UART: [fht] FHT @ 0x50003400
3,858,341 UART: [idev] ++
3,859,045 UART: [idev] CDI.KEYID = 6
3,860,004 UART: [idev] SUBJECT.KEYID = 7
3,861,183 UART: [idev] UDS.KEYID = 0
3,862,085 ready_for_fw is high
3,862,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,629 UART: [idev] Erasing UDS.KEYID = 0
6,344,903 UART: [idev] Sha1 KeyId Algorithm
6,367,166 UART: [idev] --
6,371,138 UART: [ldev] ++
6,371,829 UART: [ldev] CDI.KEYID = 6
6,372,714 UART: [ldev] SUBJECT.KEYID = 5
6,373,924 UART: [ldev] AUTHORITY.KEYID = 7
6,375,077 UART: [ldev] FE.KEYID = 1
6,384,320 UART: [ldev] Erasing FE.KEYID = 1
8,862,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,160 UART: [ldev] --
10,654,696 UART: [fwproc] Wait for Commands...
10,657,920 UART: [fwproc] Recv command 0x46574c44
10,660,229 UART: [fwproc] Recv'd Img size: 114084 bytes
14,106,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,843,020 >>> mbox cmd response: success
14,846,574 UART: [afmc] ++
14,847,305 UART: [afmc] CDI.KEYID = 6
14,848,507 UART: [afmc] SUBJECT.KEYID = 7
14,849,954 UART: [afmc] AUTHORITY.KEYID = 5
17,351,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,259 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,952 UART: [afmc] --
19,148,293 UART: [cold-reset] --
19,151,934 UART: [state] Locking Datavault
19,157,150 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,315 UART: [state] Locking ICCM
19,162,228 UART: [exit] Launching FMC @ 0x40000130
19,170,861 UART:
19,171,115 UART: Running Caliptra FMC ...
19,172,219 UART:
19,172,383 UART: [state] CFI Enabled
19,180,484 UART: [fht] FMC Alias Private Key: 7
20,937,624 UART: [art] Extend RT PCRs Done
20,938,865 UART: [art] Lock RT PCRs Done
20,940,361 UART: [art] Populate DV Done
20,945,774 UART: [fht] FMC Alias Private Key: 7
20,947,473 UART: [art] Derive CDI
20,948,292 UART: [art] Store in in slot 0x4
20,991,109 UART: [art] Derive Key Pair
20,992,146 UART: [art] Store priv key in slot 0x5
23,418,622 UART: [art] Derive Key Pair - Done
23,431,512 UART: [art] Signing Cert with AUTHO
23,432,815 UART: RITY.KEYID = 7
25,138,213 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,736 UART: [art] PUB.X = C8E303A252C8E9C3DFDC17775E776384C7D32F5E1EBC9604D716BD724DB24FBFC575F36D8C51B70A30E6E4B5A506D43D
25,146,955 UART: [art] PUB.Y = 64B8FA7A4B743DA978323DC64A54A2414C4DF398A899D2883311D2366ED9A929F7A9AA060815DE397D37D89103C4F540
25,154,259 UART: [art] SIG.R = 142187A95555C79AED1AF478220BD08ACC7974291C7BA12A9376D06BF3C3800D595926CBA2B5792704B661D2FAEA8683
25,161,635 UART: [art] SIG.S = CEB362FD67424D14731C945B67076CAD3B49484E80312BB7F75CF29F0E9707554DBC0C137A34597B8253373C9C2C3F30
26,140,587 UART: Caliptra RT
26,141,292 UART: [state] CFI Enabled
26,258,460 UART: [rt] RT listening for mailbox commands...
26,260,369 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,290,193 UART: [rt]cmd =0x44504543, len=28
26,333,004 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,909 writing to cptra_bootfsm_go
3,755,378 ready_for_fw is high
3,756,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,960,372 >>> mbox cmd response: success
19,214,429 UART:
19,214,833 UART: Running Caliptra FMC ...
19,215,941 UART:
19,216,094 UART: [state] CFI Enabled
19,223,786 UART: [fht] FMC Alias Private Key: 7
20,980,530 UART: [art] Extend RT PCRs Done
20,981,761 UART: [art] Lock RT PCRs Done
20,983,529 UART: [art] Populate DV Done
20,988,998 UART: [fht] FMC Alias Private Key: 7
20,990,486 UART: [art] Derive CDI
20,991,255 UART: [art] Store in in slot 0x4
21,033,965 UART: [art] Derive Key Pair
21,035,012 UART: [art] Store priv key in slot 0x5
23,461,718 UART: [art] Derive Key Pair - Done
23,474,937 UART: [art] Signing Cert with AUTHO
23,476,245 UART: RITY.KEYID = 7
25,182,193 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,716 UART: [art] PUB.X = DEBF88F38DAD1973CE358BBC18DDEBC88659E34087D2CFBA693E7482902246B81A40C7EF74E4CB29EDAE68EC744C8F6A
25,190,956 UART: [art] PUB.Y = C1C7D6AE326A0659EF5A9AF067E862FF820D81ACE5439662AA438D4A15E4794E8A1D8EB668CA95B58687F604A5FDE3C3
25,198,212 UART: [art] SIG.R = 6807EC80B30E9A018BCAD41C5C9A9FB038F02C720A1BAF0147239D61A4224E8115DDB224F57CC4AF83E62ABB3B0B5869
25,205,608 UART: [art] SIG.S = 31F893CF566D912C27E9180B4576A5320C7ABE850A5108BCFC8BC67E4FB844A1E75E91DD506C0B2FA5E4425AD8945204
26,184,719 UART: Caliptra RT
26,185,422 UART: [state] CFI Enabled
26,302,025 UART: [rt] RT listening for mailbox commands...
26,303,942 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,334,241 UART: [rt]cmd =0x44504543, len=28
26,377,275 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,048 UART: [kat] LMS
1,475,244 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,603 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 ready_for_fw is high
1,480,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,498 UART: [idev] Erasing UDS.KEYID = 0
1,505,590 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,260 UART: [idev] --
1,515,233 UART: [ldev] ++
1,515,401 UART: [ldev] CDI.KEYID = 6
1,515,764 UART: [ldev] SUBJECT.KEYID = 5
1,516,190 UART: [ldev] AUTHORITY.KEYID = 7
1,516,653 UART: [ldev] FE.KEYID = 1
1,521,551 UART: [ldev] Erasing FE.KEYID = 1
1,546,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,494 UART: [ldev] --
1,585,995 UART: [fwproc] Waiting for Commands...
1,586,662 UART: [fwproc] Received command 0x46574c44
1,587,453 UART: [fwproc] Received Image of size 114084 bytes
2,881,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,354 >>> mbox cmd response: success
3,074,574 UART: [afmc] ++
3,074,742 UART: [afmc] CDI.KEYID = 6
3,075,104 UART: [afmc] SUBJECT.KEYID = 7
3,075,529 UART: [afmc] AUTHORITY.KEYID = 5
3,111,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,835 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,525 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,346 UART: [afmc] --
3,154,224 UART: [cold-reset] --
3,154,976 UART: [state] Locking Datavault
3,156,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,943 UART: [state] Locking ICCM
3,157,371 UART: [exit] Launching FMC @ 0x40000130
3,162,700 UART:
3,162,716 UART: Running Caliptra FMC ...
3,163,124 UART:
3,163,178 UART: [state] CFI Enabled
3,173,713 UART: [fht] FMC Alias Private Key: 7
3,281,652 UART: [art] Extend RT PCRs Done
3,282,080 UART: [art] Lock RT PCRs Done
3,283,388 UART: [art] Populate DV Done
3,291,929 UART: [fht] FMC Alias Private Key: 7
3,292,891 UART: [art] Derive CDI
3,293,171 UART: [art] Store in in slot 0x4
3,378,746 UART: [art] Derive Key Pair
3,379,106 UART: [art] Store priv key in slot 0x5
3,392,284 UART: [art] Derive Key Pair - Done
3,406,971 UART: [art] Signing Cert with AUTHO
3,407,451 UART: RITY.KEYID = 7
3,422,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,274 UART: [art] PUB.X = 92F83AA3F836A288560FA8C0B7B01D3AB59034D34618A6A1D0FD4D782A2E0E58E35B1DC8BE07F3A403061D3273BAAA79
3,430,039 UART: [art] PUB.Y = F1BD75845391F67C23FD857A726F0BBCEE60C3C53E36CDFAFA30A2FCC927379DB433629662D5179972B5CD304DD4DA4E
3,437,000 UART: [art] SIG.R = FF7F6DC30F67729BB9B3424A097AE9199CAC66CAD1DE9C4BB43A470E170139F19547CB6D2C5AE01C4ED4A8B73834746A
3,443,772 UART: [art] SIG.S = 739AD3B4F16028886116B101A947FC5549C0B84A2CACA789CCD4A338EFAFE30C1F2162027CA0B3BEC1348BFAA144BB68
3,467,706 UART: Caliptra RT
3,467,959 UART: [state] CFI Enabled
3,576,616 UART: [rt] RT listening for mailbox commands...
3,577,286 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,258 UART: [rt]cmd =0x44504543, len=28
3,650,378 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,713 ready_for_fw is high
1,362,713 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,500 >>> mbox cmd response: success
2,986,486 UART:
2,986,502 UART: Running Caliptra FMC ...
2,986,910 UART:
2,986,964 UART: [state] CFI Enabled
2,997,409 UART: [fht] FMC Alias Private Key: 7
3,105,110 UART: [art] Extend RT PCRs Done
3,105,538 UART: [art] Lock RT PCRs Done
3,107,284 UART: [art] Populate DV Done
3,115,583 UART: [fht] FMC Alias Private Key: 7
3,116,637 UART: [art] Derive CDI
3,116,917 UART: [art] Store in in slot 0x4
3,202,344 UART: [art] Derive Key Pair
3,202,704 UART: [art] Store priv key in slot 0x5
3,216,006 UART: [art] Derive Key Pair - Done
3,230,745 UART: [art] Signing Cert with AUTHO
3,231,225 UART: RITY.KEYID = 7
3,246,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,882 UART: [art] PUB.X = 6ED8EB3DBC5CFBC669CB46BF313AAFBD289C98C4EC0DF960B60A0ABB6A0FA3A2140E03D7EFDF9C2B604FF415665A1C9F
3,253,668 UART: [art] PUB.Y = 056A48ADA0147FB515FE96A01343E587012538D34E892B34315484B1FB30DC9B493AB9668EAAA2E387ABA6D06BC91E65
3,260,616 UART: [art] SIG.R = 657CE31F8106CBCEDB79A77DAE0E3DF6E9FE9AE28E8D1A852FF3FF0C4708130A347261E747FC63B64EC46D0356D918E3
3,267,384 UART: [art] SIG.S = 4F585CBCB6C4E96E32CE635045528CD4B20FB3EEBE499FFE5DC247F839F0142B346B144DF2390DF8B8F58CE5FAA99303
3,291,118 UART: Caliptra RT
3,291,371 UART: [state] CFI Enabled
3,399,379 UART: [rt] RT listening for mailbox commands...
3,400,049 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,951 UART: [rt]cmd =0x44504543, len=28
3,473,085 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,672 UART: [kat] SHA2-256
892,610 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,259 UART: [kat] LMS
1,475,455 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,772 UART: [fht] Storing FHT @ 0x50003400
1,479,401 UART: [idev] ++
1,479,569 UART: [idev] CDI.KEYID = 6
1,479,929 UART: [idev] SUBJECT.KEYID = 7
1,480,353 UART: [idev] UDS.KEYID = 0
1,480,698 ready_for_fw is high
1,480,698 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,549 UART: [idev] Erasing UDS.KEYID = 0
1,505,083 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,687 UART: [idev] --
1,514,652 UART: [ldev] ++
1,514,820 UART: [ldev] CDI.KEYID = 6
1,515,183 UART: [ldev] SUBJECT.KEYID = 5
1,515,609 UART: [ldev] AUTHORITY.KEYID = 7
1,516,072 UART: [ldev] FE.KEYID = 1
1,521,296 UART: [ldev] Erasing FE.KEYID = 1
1,546,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,777 UART: [ldev] --
1,586,178 UART: [fwproc] Waiting for Commands...
1,586,957 UART: [fwproc] Received command 0x46574c44
1,587,748 UART: [fwproc] Received Image of size 114084 bytes
2,883,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,969 >>> mbox cmd response: success
3,076,007 UART: [afmc] ++
3,076,175 UART: [afmc] CDI.KEYID = 6
3,076,537 UART: [afmc] SUBJECT.KEYID = 7
3,076,962 UART: [afmc] AUTHORITY.KEYID = 5
3,112,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,190 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,880 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,645 UART: [afmc] --
3,155,659 UART: [cold-reset] --
3,156,509 UART: [state] Locking Datavault
3,157,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,382 UART: [state] Locking ICCM
3,158,810 UART: [exit] Launching FMC @ 0x40000130
3,164,139 UART:
3,164,155 UART: Running Caliptra FMC ...
3,164,563 UART:
3,164,706 UART: [state] CFI Enabled
3,175,433 UART: [fht] FMC Alias Private Key: 7
3,283,244 UART: [art] Extend RT PCRs Done
3,283,672 UART: [art] Lock RT PCRs Done
3,284,922 UART: [art] Populate DV Done
3,293,243 UART: [fht] FMC Alias Private Key: 7
3,294,251 UART: [art] Derive CDI
3,294,531 UART: [art] Store in in slot 0x4
3,380,190 UART: [art] Derive Key Pair
3,380,550 UART: [art] Store priv key in slot 0x5
3,394,120 UART: [art] Derive Key Pair - Done
3,409,012 UART: [art] Signing Cert with AUTHO
3,409,492 UART: RITY.KEYID = 7
3,424,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,655 UART: [art] PUB.X = 70CC0E7DDBB54E5A3385B03468474FB897AE1D92D0BEF0DE5A6629AC8F2D52EE3CF26EC011EAFB77B11AD4EA6F909A5E
3,432,448 UART: [art] PUB.Y = E1BC75F867E89223E17E6FD69CA983B85DE8D71249C7FE7E6233662CE671D0438A0E1BC8E3E0D3FDABC6D3489479A7F5
3,439,407 UART: [art] SIG.R = EF3D761F8A5DB597F8B5E747385A34EBC34842F37FEBE32BA41BE071AB5ACA9F5BEFF7AF56929B5A76B36EDD30D315D5
3,446,201 UART: [art] SIG.S = 3E2CFC8E6193D39EE57A8F9DB5AB9220C31E4F5B7F01E64CD88DB8B37DA3DB7799E822AC30C489AF73E889C10C2B2A19
3,470,120 UART: Caliptra RT
3,470,465 UART: [state] CFI Enabled
3,578,494 UART: [rt] RT listening for mailbox commands...
3,579,164 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,906 UART: [rt]cmd =0x44504543, len=28
3,652,112 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,448 ready_for_fw is high
1,362,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,437 >>> mbox cmd response: success
2,986,957 UART:
2,986,973 UART: Running Caliptra FMC ...
2,987,381 UART:
2,987,524 UART: [state] CFI Enabled
2,998,243 UART: [fht] FMC Alias Private Key: 7
3,106,566 UART: [art] Extend RT PCRs Done
3,106,994 UART: [art] Lock RT PCRs Done
3,108,726 UART: [art] Populate DV Done
3,117,099 UART: [fht] FMC Alias Private Key: 7
3,118,089 UART: [art] Derive CDI
3,118,369 UART: [art] Store in in slot 0x4
3,203,894 UART: [art] Derive Key Pair
3,204,254 UART: [art] Store priv key in slot 0x5
3,217,578 UART: [art] Derive Key Pair - Done
3,232,677 UART: [art] Signing Cert with AUTHO
3,233,157 UART: RITY.KEYID = 7
3,248,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,042 UART: [art] PUB.X = 586807714D99CA4848F449C505E92AF62D4AB6DCA2C29B6BD845B285C374CB30C0654FF18530D52E5C0DFFE02B607794
3,255,807 UART: [art] PUB.Y = E171285338441D8D92BDD2DCC996CF8B170A557C64F707A8A638DB216BF911816F402CAD5805C52D69F87452D22CC58A
3,262,750 UART: [art] SIG.R = DB8B2A4059E60153C8B42BE990504361E4B76E78B49E5789D15A7635BD460C376CC9B88C717C1DEEA9C97B6746568A09
3,269,511 UART: [art] SIG.S = E02489EEACA6327743644E0F29C943E304FA85D20CC8554DAEF9785DECE1FD248B166F16BF637A08B1A1D9F54539AA47
3,293,436 UART: Caliptra RT
3,293,781 UART: [state] CFI Enabled
3,401,409 UART: [rt] RT listening for mailbox commands...
3,402,079 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,171 UART: [rt]cmd =0x44504543, len=28
3,475,773 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
918,442 UART: [kat] HMAC-384Kdf
922,876 UART: [kat] LMS
1,171,204 UART: [kat] --
1,172,155 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,346 UART: [idev] ++
1,175,514 UART: [idev] CDI.KEYID = 6
1,175,874 UART: [idev] SUBJECT.KEYID = 7
1,176,298 UART: [idev] UDS.KEYID = 0
1,176,643 ready_for_fw is high
1,176,643 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,954 UART: [idev] Erasing UDS.KEYID = 0
1,201,157 UART: [idev] Sha1 KeyId Algorithm
1,209,589 UART: [idev] --
1,210,643 UART: [ldev] ++
1,210,811 UART: [ldev] CDI.KEYID = 6
1,211,174 UART: [ldev] SUBJECT.KEYID = 5
1,211,600 UART: [ldev] AUTHORITY.KEYID = 7
1,212,063 UART: [ldev] FE.KEYID = 1
1,217,209 UART: [ldev] Erasing FE.KEYID = 1
1,243,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,131 UART: [ldev] --
1,282,582 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,003 >>> mbox cmd response: success
2,773,103 UART: [afmc] ++
2,773,271 UART: [afmc] CDI.KEYID = 6
2,773,633 UART: [afmc] SUBJECT.KEYID = 7
2,774,058 UART: [afmc] AUTHORITY.KEYID = 5
2,809,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,718 UART: [afmc] --
2,852,694 UART: [cold-reset] --
2,853,464 UART: [state] Locking Datavault
2,854,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,487 UART: [state] Locking ICCM
2,856,065 UART: [exit] Launching FMC @ 0x40000130
2,861,394 UART:
2,861,410 UART: Running Caliptra FMC ...
2,861,818 UART:
2,861,872 UART: [state] CFI Enabled
2,871,931 UART: [fht] FMC Alias Private Key: 7
2,979,030 UART: [art] Extend RT PCRs Done
2,979,458 UART: [art] Lock RT PCRs Done
2,981,214 UART: [art] Populate DV Done
2,989,483 UART: [fht] FMC Alias Private Key: 7
2,990,493 UART: [art] Derive CDI
2,990,773 UART: [art] Store in in slot 0x4
3,076,150 UART: [art] Derive Key Pair
3,076,510 UART: [art] Store priv key in slot 0x5
3,090,090 UART: [art] Derive Key Pair - Done
3,104,800 UART: [art] Signing Cert with AUTHO
3,105,280 UART: RITY.KEYID = 7
3,120,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,961 UART: [art] PUB.X = B8CE65FE3AC47477C0258395C31147AFA2BFD5A4EC6957551C77165E769C390B6B996B8D274C0523D8D7AE3F7E4E88D6
3,127,731 UART: [art] PUB.Y = F436229AB383AE8429B4286C5662F2B62A33DD85FE4E37369CC1A73FD18D8442286A652D46D82B64081AA0A6F3829F4F
3,134,678 UART: [art] SIG.R = 8B2D2FA849CAB99E25752FE4533FC4E585C6AEB4120FEA521E77121F85EF5DB7E7475FCD726F6AF7B153BEDA06FE5D44
3,141,462 UART: [art] SIG.S = D6F720FEBD44CC946A10A6FF8B5B58EE62FD76D0AE147B9D92169ADFF4299A8EADD5412A5BF1053886FDA2ECDB3ECA12
3,165,518 UART: Caliptra RT
3,165,771 UART: [state] CFI Enabled
3,273,197 UART: [rt] RT listening for mailbox commands...
3,273,867 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,753 UART: [rt]cmd =0x44504543, len=28
3,346,957 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,153 ready_for_fw is high
1,060,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,444 >>> mbox cmd response: success
2,684,460 UART:
2,684,476 UART: Running Caliptra FMC ...
2,684,884 UART:
2,684,938 UART: [state] CFI Enabled
2,695,427 UART: [fht] FMC Alias Private Key: 7
2,802,994 UART: [art] Extend RT PCRs Done
2,803,422 UART: [art] Lock RT PCRs Done
2,805,018 UART: [art] Populate DV Done
2,813,085 UART: [fht] FMC Alias Private Key: 7
2,814,213 UART: [art] Derive CDI
2,814,493 UART: [art] Store in in slot 0x4
2,899,978 UART: [art] Derive Key Pair
2,900,338 UART: [art] Store priv key in slot 0x5
2,914,048 UART: [art] Derive Key Pair - Done
2,928,842 UART: [art] Signing Cert with AUTHO
2,929,322 UART: RITY.KEYID = 7
2,944,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,497 UART: [art] PUB.X = 66B19BEA4B6CB1F2645A090EA0D6D5F9D871D5C8957F5D31E7A683F2FC3F92B2AEC08CA0E46E3C45DF53595F9A838C43
2,952,277 UART: [art] PUB.Y = A799E4B81B69DF023B4036D69D492B3653E2D10393F73460695E09AC74008FA6FA526231CD2A1CE70BFF757CF79F47CE
2,959,197 UART: [art] SIG.R = 0357C56700386D1053DAC4629C10F94B1EFCE195B9716479609E43CA6E2E31C45176E7ABEA8C9F828BBE9D61B353E221
2,965,944 UART: [art] SIG.S = 53CDF39AD25A95E3404499DE37B0AA7B63B0E4774A1A9192F294B609572E529CAE200E201E674C29C1F35382C899BAE6
2,989,767 UART: Caliptra RT
2,990,020 UART: [state] CFI Enabled
3,097,297 UART: [rt] RT listening for mailbox commands...
3,097,967 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,765 UART: [rt]cmd =0x44504543, len=28
3,170,783 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
893,565 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,690 UART: [kat] ++
897,842 UART: [kat] sha1
902,106 UART: [kat] SHA2-256
904,046 UART: [kat] SHA2-384
906,653 UART: [kat] SHA2-512-ACC
908,554 UART: [kat] ECC-384
918,123 UART: [kat] HMAC-384Kdf
922,655 UART: [kat] LMS
1,170,983 UART: [kat] --
1,171,904 UART: [cold-reset] ++
1,172,268 UART: [fht] FHT @ 0x50003400
1,174,925 UART: [idev] ++
1,175,093 UART: [idev] CDI.KEYID = 6
1,175,453 UART: [idev] SUBJECT.KEYID = 7
1,175,877 UART: [idev] UDS.KEYID = 0
1,176,222 ready_for_fw is high
1,176,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,197 UART: [idev] Erasing UDS.KEYID = 0
1,201,660 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,084 UART: [ldev] ++
1,211,252 UART: [ldev] CDI.KEYID = 6
1,211,615 UART: [ldev] SUBJECT.KEYID = 5
1,212,041 UART: [ldev] AUTHORITY.KEYID = 7
1,212,504 UART: [ldev] FE.KEYID = 1
1,217,892 UART: [ldev] Erasing FE.KEYID = 1
1,244,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,084 UART: [ldev] --
1,283,427 UART: [fwproc] Wait for Commands...
1,284,165 UART: [fwproc] Recv command 0x46574c44
1,284,893 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,596 >>> mbox cmd response: success
2,771,820 UART: [afmc] ++
2,771,988 UART: [afmc] CDI.KEYID = 6
2,772,350 UART: [afmc] SUBJECT.KEYID = 7
2,772,775 UART: [afmc] AUTHORITY.KEYID = 5
2,807,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,237 UART: [afmc] --
2,851,259 UART: [cold-reset] --
2,852,121 UART: [state] Locking Datavault
2,853,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,816 UART: [state] Locking ICCM
2,854,284 UART: [exit] Launching FMC @ 0x40000130
2,859,613 UART:
2,859,629 UART: Running Caliptra FMC ...
2,860,037 UART:
2,860,180 UART: [state] CFI Enabled
2,870,949 UART: [fht] FMC Alias Private Key: 7
2,978,602 UART: [art] Extend RT PCRs Done
2,979,030 UART: [art] Lock RT PCRs Done
2,980,764 UART: [art] Populate DV Done
2,988,903 UART: [fht] FMC Alias Private Key: 7
2,990,083 UART: [art] Derive CDI
2,990,363 UART: [art] Store in in slot 0x4
3,075,726 UART: [art] Derive Key Pair
3,076,086 UART: [art] Store priv key in slot 0x5
3,089,582 UART: [art] Derive Key Pair - Done
3,104,422 UART: [art] Signing Cert with AUTHO
3,104,902 UART: RITY.KEYID = 7
3,119,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,631 UART: [art] PUB.X = 173FA28C07E8E6E0988CFC7F79949A2A1A6095F4363125A0A81B9FD521C1B0553874E5B7AB147B76990CBA7ED6254B19
3,127,397 UART: [art] PUB.Y = 0FA0EC642D57B630E68AC6B17471149144A7D9C8150430319C9E77F1C42E904A8F01E574F96BD95A0ED3EA9C8F419ACE
3,134,341 UART: [art] SIG.R = 3A570E136B82358D93AB8C22F48944857A6C882A0D324B25644C3C5E1A470768BFB776DF11A26CBDE80E20E22A0965F1
3,141,096 UART: [art] SIG.S = 49F8BEA65F8291DFF932245A4570F6B0828D7CDE17CC40E4C40AFAE7C49D25D09B1304B4171F992BD432409257C359F3
3,164,961 UART: Caliptra RT
3,165,306 UART: [state] CFI Enabled
3,273,027 UART: [rt] RT listening for mailbox commands...
3,273,697 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,519 UART: [rt]cmd =0x44504543, len=28
3,346,417 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,672 ready_for_fw is high
1,059,672 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,877 >>> mbox cmd response: success
2,684,939 UART:
2,684,955 UART: Running Caliptra FMC ...
2,685,363 UART:
2,685,506 UART: [state] CFI Enabled
2,696,235 UART: [fht] FMC Alias Private Key: 7
2,803,578 UART: [art] Extend RT PCRs Done
2,804,006 UART: [art] Lock RT PCRs Done
2,805,698 UART: [art] Populate DV Done
2,813,895 UART: [fht] FMC Alias Private Key: 7
2,814,871 UART: [art] Derive CDI
2,815,151 UART: [art] Store in in slot 0x4
2,900,844 UART: [art] Derive Key Pair
2,901,204 UART: [art] Store priv key in slot 0x5
2,914,036 UART: [art] Derive Key Pair - Done
2,928,960 UART: [art] Signing Cert with AUTHO
2,929,440 UART: RITY.KEYID = 7
2,944,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,699 UART: [art] PUB.X = 435DF0F8F0E999CE957C20FBB336E46E4F68121919E8997A0672BCCE1B63F827950434C28DCF060725A44415830B5328
2,952,448 UART: [art] PUB.Y = 63C9C989824CF5F94EA153ED9A8966D66996812787522CB252FCC77E2BF509D654799853DCAE9275B40FA6B89834D1CB
2,959,392 UART: [art] SIG.R = B596E747852B357E3CBD03D5A55F5AE5865FF3BD1DD517CF65EE7A7116665C020E5B5F64B45BB312F9F2D55613DE006D
2,966,141 UART: [art] SIG.S = 0049EF58FB2E9A62396B94B4FE17FEA91EDB229E3A43BEB0F81771CB5E4A612F3F65EDA8D1CD93D14EAA622A37EA456E
2,990,212 UART: Caliptra RT
2,990,557 UART: [state] CFI Enabled
3,098,441 UART: [rt] RT listening for mailbox commands...
3,099,111 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,051 UART: [rt]cmd =0x44504543, len=28
3,172,257 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,385 UART: [kat] SHA2-256
901,325 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
919,920 UART: [kat] LMS
1,168,232 UART: [kat] --
1,168,845 UART: [cold-reset] ++
1,169,197 UART: [fht] FHT @ 0x50003400
1,171,749 UART: [idev] ++
1,171,917 UART: [idev] CDI.KEYID = 6
1,172,278 UART: [idev] SUBJECT.KEYID = 7
1,172,703 UART: [idev] UDS.KEYID = 0
1,173,049 ready_for_fw is high
1,173,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,673 UART: [idev] Erasing UDS.KEYID = 0
1,197,485 UART: [idev] Sha1 KeyId Algorithm
1,206,375 UART: [idev] --
1,207,396 UART: [ldev] ++
1,207,564 UART: [ldev] CDI.KEYID = 6
1,207,928 UART: [ldev] SUBJECT.KEYID = 5
1,208,355 UART: [ldev] AUTHORITY.KEYID = 7
1,208,818 UART: [ldev] FE.KEYID = 1
1,214,088 UART: [ldev] Erasing FE.KEYID = 1
1,239,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,954 UART: [ldev] --
1,279,360 UART: [fwproc] Wait for Commands...
1,280,153 UART: [fwproc] Recv command 0x46574c44
1,280,886 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,765,409 >>> mbox cmd response: success
2,766,470 UART: [afmc] ++
2,766,638 UART: [afmc] CDI.KEYID = 6
2,767,001 UART: [afmc] SUBJECT.KEYID = 7
2,767,427 UART: [afmc] AUTHORITY.KEYID = 5
2,802,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,397 UART: [afmc] --
2,846,455 UART: [cold-reset] --
2,847,229 UART: [state] Locking Datavault
2,848,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,146 UART: [state] Locking ICCM
2,849,586 UART: [exit] Launching FMC @ 0x40000130
2,854,915 UART:
2,854,931 UART: Running Caliptra FMC ...
2,855,339 UART:
2,855,393 UART: [state] CFI Enabled
2,865,906 UART: [fht] FMC Alias Private Key: 7
2,973,755 UART: [art] Extend RT PCRs Done
2,974,183 UART: [art] Lock RT PCRs Done
2,975,743 UART: [art] Populate DV Done
2,984,228 UART: [fht] FMC Alias Private Key: 7
2,985,160 UART: [art] Derive CDI
2,985,440 UART: [art] Store in in slot 0x4
3,071,285 UART: [art] Derive Key Pair
3,071,645 UART: [art] Store priv key in slot 0x5
3,085,299 UART: [art] Derive Key Pair - Done
3,099,955 UART: [art] Signing Cert with AUTHO
3,100,435 UART: RITY.KEYID = 7
3,115,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,700 UART: [art] PUB.X = D401A815C4ABA5D466BADDEBA3478DA66FEE8DE9AFD44DF6051DB0862D65C68D14E0C482AC3EB9CC9FE28C00AB8FBDDC
3,123,478 UART: [art] PUB.Y = 4711A4FEAD86EBA9A1F37D789E61678483271C647CDA681484950C32B9B8DB7ADCD3BB8BD59ECFC6BA3D9CB9D2355C23
3,130,443 UART: [art] SIG.R = F35AC75536716C66EA1AB2E4D1022247A1AC0CF8D4280F682604C259785373F8CF2DCF2724ED9D4709BAF2994C88E5A6
3,137,202 UART: [art] SIG.S = 68CA772F3FBF9AEA3940E26C28744413C7D748F54D1CE8A325036677FE1D5C8425B4618FEC2D4AFB2D017CAA9CD94E89
3,161,447 UART: Caliptra RT
3,161,700 UART: [state] CFI Enabled
3,269,099 UART: [rt] RT listening for mailbox commands...
3,269,769 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,779 UART: [rt]cmd =0x44504543, len=28
3,343,185 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,025 >>> mbox cmd response: success
2,680,443 UART:
2,680,459 UART: Running Caliptra FMC ...
2,680,867 UART:
2,680,921 UART: [state] CFI Enabled
2,691,450 UART: [fht] FMC Alias Private Key: 7
2,799,335 UART: [art] Extend RT PCRs Done
2,799,763 UART: [art] Lock RT PCRs Done
2,801,143 UART: [art] Populate DV Done
2,809,220 UART: [fht] FMC Alias Private Key: 7
2,810,288 UART: [art] Derive CDI
2,810,568 UART: [art] Store in in slot 0x4
2,895,909 UART: [art] Derive Key Pair
2,896,269 UART: [art] Store priv key in slot 0x5
2,909,827 UART: [art] Derive Key Pair - Done
2,924,832 UART: [art] Signing Cert with AUTHO
2,925,312 UART: RITY.KEYID = 7
2,940,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,179 UART: [art] PUB.X = 788E0622E72267EF1BAEF49E9F8B4010BB3E94F52F48EE5378B2616881ED1DEA71C6ABF8D8DCCDA54E9DA06E00F5F81F
2,947,944 UART: [art] PUB.Y = 430A8C7B7CD47D95CF66BD2A386E8340EFD24A546DAF9976D66F14CBF42D3E7480B1F1E0590EF957176CEC7320B5992E
2,954,898 UART: [art] SIG.R = 08AFC661718FB56FBCEF1367D27BE65E6DD96D5D0B0518E359463A3BFAAC89F2BE421A8B239FC348C0FD4A0E5D7875BA
2,961,676 UART: [art] SIG.S = 72DFD0AC341BEED1263083D2E7DAC5773C7EEBDA5E0991156F51D9B75B20BFDC08564DF25528FC884ED56BF203DF14ED
2,985,562 UART: Caliptra RT
2,985,815 UART: [state] CFI Enabled
3,092,826 UART: [rt] RT listening for mailbox commands...
3,093,496 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,622 UART: [rt]cmd =0x44504543, len=28
3,167,102 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
891,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,998 UART: [kat] ++
896,150 UART: [kat] sha1
900,324 UART: [kat] SHA2-256
902,264 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,611 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 ready_for_fw is high
1,174,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,684 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,875 UART: [fwproc] Wait for Commands...
1,282,534 UART: [fwproc] Recv command 0x46574c44
1,283,267 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,516 >>> mbox cmd response: success
2,769,551 UART: [afmc] ++
2,769,719 UART: [afmc] CDI.KEYID = 6
2,770,082 UART: [afmc] SUBJECT.KEYID = 7
2,770,508 UART: [afmc] AUTHORITY.KEYID = 5
2,806,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,320 UART: [afmc] --
2,849,438 UART: [cold-reset] --
2,850,164 UART: [state] Locking Datavault
2,851,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,781 UART: [state] Locking ICCM
2,852,301 UART: [exit] Launching FMC @ 0x40000130
2,857,630 UART:
2,857,646 UART: Running Caliptra FMC ...
2,858,054 UART:
2,858,197 UART: [state] CFI Enabled
2,869,150 UART: [fht] FMC Alias Private Key: 7
2,977,269 UART: [art] Extend RT PCRs Done
2,977,697 UART: [art] Lock RT PCRs Done
2,979,043 UART: [art] Populate DV Done
2,987,094 UART: [fht] FMC Alias Private Key: 7
2,988,050 UART: [art] Derive CDI
2,988,330 UART: [art] Store in in slot 0x4
3,073,857 UART: [art] Derive Key Pair
3,074,217 UART: [art] Store priv key in slot 0x5
3,088,613 UART: [art] Derive Key Pair - Done
3,103,462 UART: [art] Signing Cert with AUTHO
3,103,942 UART: RITY.KEYID = 7
3,119,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,887 UART: [art] PUB.X = DB8E92FBC24751BB88ADB433ACB0F6099A3FB02627BF941EC350A2CF9D2127A5D614A1E7A3CA94B7F90E9760E572066D
3,126,662 UART: [art] PUB.Y = 6BE4ED54925DCE79466446136932B936D9A487A7B95A390A45241C26CB5896A145F355662FF0FCF3A9DE1E3F4805A6D1
3,133,606 UART: [art] SIG.R = E6F46E537108C0FC71533DEC1DAD8709A1E9D3C8105A271D66DC438A79B4C18ED77FE3FF4D4B0983BF9240210E90B29A
3,140,374 UART: [art] SIG.S = E0DABB59304AE4A44020BC94A4AC2469CBF159145C631D77363647DAF6A57D021912E01501F389D3C6BF3BFEBC19F14D
3,164,051 UART: Caliptra RT
3,164,396 UART: [state] CFI Enabled
3,272,562 UART: [rt] RT listening for mailbox commands...
3,273,232 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,458 UART: [rt]cmd =0x44504543, len=28
3,346,354 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,581 ready_for_fw is high
1,056,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,652 >>> mbox cmd response: success
2,683,284 UART:
2,683,300 UART: Running Caliptra FMC ...
2,683,708 UART:
2,683,851 UART: [state] CFI Enabled
2,694,720 UART: [fht] FMC Alias Private Key: 7
2,802,489 UART: [art] Extend RT PCRs Done
2,802,917 UART: [art] Lock RT PCRs Done
2,804,113 UART: [art] Populate DV Done
2,812,210 UART: [fht] FMC Alias Private Key: 7
2,813,312 UART: [art] Derive CDI
2,813,592 UART: [art] Store in in slot 0x4
2,899,227 UART: [art] Derive Key Pair
2,899,587 UART: [art] Store priv key in slot 0x5
2,912,545 UART: [art] Derive Key Pair - Done
2,927,152 UART: [art] Signing Cert with AUTHO
2,927,632 UART: RITY.KEYID = 7
2,943,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,885 UART: [art] PUB.X = 6E36BEB04576591B526B6D888E413C7A82361127F336AEAFE0121D5CC7896417A67902C6CC0E8EC3D2B61761F9CAABEB
2,950,657 UART: [art] PUB.Y = AAA1F24B8CA678FFC207DEBD3106936B625F3297DA8DA731ECA082B865754203BCAD55734E7816352131B01BB3A4FC81
2,957,606 UART: [art] SIG.R = 3A47AA56D011E15AC223E649867D5939CAE9A0F9176345E3DA6C2F24D9BFB06E359FD2A071CA4E47EE88DEA27154DB23
2,964,388 UART: [art] SIG.S = D60090F583B4123E2F7FD5B0318462824B46D83659AFBD52BBA2EF0E0D827939187A81BD63E74C0ADF5C19D51389F7A1
2,988,754 UART: Caliptra RT
2,989,099 UART: [state] CFI Enabled
3,096,256 UART: [rt] RT listening for mailbox commands...
3,096,926 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,892 UART: [rt]cmd =0x44504543, len=28
3,170,118 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,356 writing to cptra_bootfsm_go
193,599 UART:
193,959 UART: Running Caliptra ROM ...
195,050 UART:
195,201 UART: [state] CFI Enabled
267,656 UART: [state] LifecycleState = Unprovisioned
269,633 UART: [state] DebugLocked = No
272,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,941 UART: [kat] SHA2-256
447,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,140 UART: [kat] ++
458,678 UART: [kat] sha1
469,776 UART: [kat] SHA2-256
472,443 UART: [kat] SHA2-384
478,079 UART: [kat] SHA2-512-ACC
480,456 UART: [kat] ECC-384
2,766,127 UART: [kat] HMAC-384Kdf
2,779,692 UART: [kat] LMS
3,969,987 UART: [kat] --
3,974,663 UART: [cold-reset] ++
3,975,893 UART: [fht] Storing FHT @ 0x50003400
3,988,161 UART: [idev] ++
3,988,729 UART: [idev] CDI.KEYID = 6
3,989,686 UART: [idev] SUBJECT.KEYID = 7
3,990,932 UART: [idev] UDS.KEYID = 0
3,991,916 ready_for_fw is high
3,992,116 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,273 UART: [idev] Erasing UDS.KEYID = 0
7,327,748 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,791 UART: [idev] --
7,353,357 UART: [ldev] ++
7,353,936 UART: [ldev] CDI.KEYID = 6
7,354,956 UART: [ldev] SUBJECT.KEYID = 5
7,356,115 UART: [ldev] AUTHORITY.KEYID = 7
7,357,350 UART: [ldev] FE.KEYID = 1
7,403,438 UART: [ldev] Erasing FE.KEYID = 1
10,737,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,513 UART: [ldev] --
13,117,988 UART: [fwproc] Waiting for Commands...
13,120,353 UART: [fwproc] Received command 0x46574c44
13,122,540 UART: [fwproc] Received Image of size 113760 bytes
17,169,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,422 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,634,110 >>> mbox cmd response: success
17,639,107 UART: [afmc] ++
17,639,703 UART: [afmc] CDI.KEYID = 6
17,640,584 UART: [afmc] SUBJECT.KEYID = 7
17,641,799 UART: [afmc] AUTHORITY.KEYID = 5
21,009,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,103 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,525 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,362 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,811 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,093 UART: [afmc] --
23,381,280 UART: [cold-reset] --
23,384,840 UART: [state] Locking Datavault
23,391,173 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,925 UART: [state] Locking ICCM
23,394,486 UART: [exit] Launching FMC @ 0x40000130
23,402,834 UART:
23,403,066 UART: Running Caliptra FMC ...
23,404,172 UART:
23,404,332 UART: [state] CFI Enabled
23,471,953 UART: [fht] FMC Alias Private Key: 7
25,809,199 UART: [art] Extend RT PCRs Done
25,810,423 UART: [art] Lock RT PCRs Done
25,811,943 UART: [art] Populate DV Done
25,817,518 UART: [fht] FMC Alias Private Key: 7
25,819,106 UART: [art] Derive CDI
25,819,920 UART: [art] Store in in slot 0x4
25,880,968 UART: [art] Derive Key Pair
25,882,027 UART: [art] Store priv key in slot 0x5
29,174,520 UART: [art] Derive Key Pair - Done
29,187,365 UART: [art] Signing Cert with AUTHO
29,188,674 UART: RITY.KEYID = 7
31,476,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,085 UART: [art] PUB.X = 8323BD9E6C948A2CD1790865E6406EDFBA41CEA19337E36C2F6BD1765B60A0A1861D81C22437DD91FD38EC422684E394
31,485,331 UART: [art] PUB.Y = FF08FD7D1E6670F162379F6540884123D4BAEFF10C8C0161457ED6B6C3D9E8AD7A23A1A8AAA5D1E005A5DAFF52240868
31,492,568 UART: [art] SIG.R = A96E782DBB2C274DC95C0ADDE25F77BBE5196837033C7E157A81B55D14121881B9B0D2EF70818C33B8C39229C5AE4459
31,499,956 UART: [art] SIG.S = 08E9FC106007220EBF388219358737474EA4C1FDBDBCD833054CEF564F1B19812A55F8D01EB651139B0219C33C18CE43
32,805,504 UART: Caliptra RT
32,806,210 UART: [state] CFI Enabled
32,967,280 UART: [rt] RT listening for mailbox commands...
32,969,206 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,999,716 UART: [rt]cmd =0x44504543, len=20
33,020,030 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,783,923 ready_for_fw is high
3,784,417 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,858,052 >>> mbox cmd response: success
23,542,555 UART:
23,542,943 UART: Running Caliptra FMC ...
23,544,069 UART:
23,544,255 UART: [state] CFI Enabled
23,594,249 UART: [fht] FMC Alias Private Key: 7
25,932,992 UART: [art] Extend RT PCRs Done
25,934,229 UART: [art] Lock RT PCRs Done
25,935,914 UART: [art] Populate DV Done
25,941,333 UART: [fht] FMC Alias Private Key: 7
25,942,928 UART: [art] Derive CDI
25,943,740 UART: [art] Store in in slot 0x4
26,003,274 UART: [art] Derive Key Pair
26,004,324 UART: [art] Store priv key in slot 0x5
29,297,474 UART: [art] Derive Key Pair - Done
29,309,874 UART: [art] Signing Cert with AUTHO
29,311,185 UART: RITY.KEYID = 7
31,598,440 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,954 UART: [art] PUB.X = 2E18D605CE59042B762A2D9AC3B0C123D536A9C1ACA449A2CD1CF54A24770BE9BA9D462418145F5960A3335C20FA82F6
31,607,161 UART: [art] PUB.Y = F980BB07042270BD90AE6C49FCD6A12E846FA17DEDC907AF80E39D234274E5780A8B6EEB7CBB491F677A709A46628A30
31,614,439 UART: [art] SIG.R = EB99C8B3E71062C5C39F4F072F262559AB627B78EC627465769D10F90F8CC5E99E232B3FABD7E988320D54FEA3A50F35
31,621,790 UART: [art] SIG.S = 9D58770D9F594ED05312FA8DD3B559E724A520C1DE7B438E00DE2A90C8215BE8B9F20E2E4C7A6110F8F7DB44A994F840
32,927,640 UART: Caliptra RT
32,928,348 UART: [state] CFI Enabled
33,090,656 UART: [rt] RT listening for mailbox commands...
33,092,566 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,123,283 UART: [rt]cmd =0x44504543, len=20
33,143,701 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
192,880 UART:
193,247 UART: Running Caliptra ROM ...
194,375 UART:
604,267 UART: [state] CFI Enabled
618,418 UART: [state] LifecycleState = Unprovisioned
620,289 UART: [state] DebugLocked = No
622,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,772 UART: [kat] SHA2-256
796,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,082 UART: [kat] ++
807,560 UART: [kat] sha1
818,308 UART: [kat] SHA2-256
820,993 UART: [kat] SHA2-384
826,983 UART: [kat] SHA2-512-ACC
829,351 UART: [kat] ECC-384
3,113,440 UART: [kat] HMAC-384Kdf
3,125,618 UART: [kat] LMS
4,315,709 UART: [kat] --
4,319,720 UART: [cold-reset] ++
4,321,864 UART: [fht] Storing FHT @ 0x50003400
4,333,499 UART: [idev] ++
4,334,099 UART: [idev] CDI.KEYID = 6
4,335,010 UART: [idev] SUBJECT.KEYID = 7
4,336,276 UART: [idev] UDS.KEYID = 0
4,337,311 ready_for_fw is high
4,337,521 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,248 UART: [idev] Erasing UDS.KEYID = 0
7,619,856 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,770 UART: [idev] --
7,644,592 UART: [ldev] ++
7,645,167 UART: [ldev] CDI.KEYID = 6
7,646,132 UART: [ldev] SUBJECT.KEYID = 5
7,647,336 UART: [ldev] AUTHORITY.KEYID = 7
7,648,560 UART: [ldev] FE.KEYID = 1
7,661,629 UART: [ldev] Erasing FE.KEYID = 1
10,948,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,987 UART: [ldev] --
13,309,710 UART: [fwproc] Waiting for Commands...
13,312,715 UART: [fwproc] Received command 0x46574c44
13,314,889 UART: [fwproc] Received Image of size 113760 bytes
17,371,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,358 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,832,550 >>> mbox cmd response: success
17,836,522 UART: [afmc] ++
17,837,133 UART: [afmc] CDI.KEYID = 6
17,838,043 UART: [afmc] SUBJECT.KEYID = 7
17,839,260 UART: [afmc] AUTHORITY.KEYID = 5
21,153,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,422 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,839 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,618 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,084 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,435 UART: [afmc] --
23,520,595 UART: [cold-reset] --
23,523,641 UART: [state] Locking Datavault
23,527,967 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,724 UART: [state] Locking ICCM
23,531,828 UART: [exit] Launching FMC @ 0x40000130
23,540,045 UART:
23,540,296 UART: Running Caliptra FMC ...
23,541,324 UART:
23,541,468 UART: [state] CFI Enabled
23,549,239 UART: [fht] FMC Alias Private Key: 7
25,880,476 UART: [art] Extend RT PCRs Done
25,881,707 UART: [art] Lock RT PCRs Done
25,883,108 UART: [art] Populate DV Done
25,888,313 UART: [fht] FMC Alias Private Key: 7
25,889,809 UART: [art] Derive CDI
25,890,727 UART: [art] Store in in slot 0x4
25,933,163 UART: [art] Derive Key Pair
25,934,202 UART: [art] Store priv key in slot 0x5
29,176,131 UART: [art] Derive Key Pair - Done
29,188,859 UART: [art] Signing Cert with AUTHO
29,190,171 UART: RITY.KEYID = 7
31,469,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,847 UART: [art] PUB.X = 841FE48F32ACB82A7EFAF7EF240946CCEFEC33A6B190635615F771569E60839F7BE6B50AFAE9C764D3B1C9DFD1B6AA30
31,478,122 UART: [art] PUB.Y = AF99CF1A8CB33ECFE015C965F7504D8EDBB1A415D89A2D0FC51585BDC8EFDE897EFF279CB85C4FF4AF0BB90DB6384CB9
31,485,382 UART: [art] SIG.R = A02BB68D190CD471CF37ECA6BDF2D01FCEB1E436BC73EDA24F3B50D85BA9E0D3D85DD3FC6ABE27D9ED022BC75E56CE9C
31,492,812 UART: [art] SIG.S = 09203E8A3FED0A470B537CE5B4400DBAF1A2C3B7A98824C3D54D301226F106FA67F0219F07C2131DAD6677B01012F2F0
32,798,227 UART: Caliptra RT
32,798,934 UART: [state] CFI Enabled
32,916,034 UART: [rt] RT listening for mailbox commands...
32,917,951 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,947,974 UART: [rt]cmd =0x44504543, len=20
32,968,591 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
4,120,141 ready_for_fw is high
4,120,634 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,066,124 >>> mbox cmd response: success
23,708,295 UART:
23,708,685 UART: Running Caliptra FMC ...
23,709,797 UART:
23,709,944 UART: [state] CFI Enabled
23,717,906 UART: [fht] FMC Alias Private Key: 7
26,048,689 UART: [art] Extend RT PCRs Done
26,049,921 UART: [art] Lock RT PCRs Done
26,051,627 UART: [art] Populate DV Done
26,057,327 UART: [fht] FMC Alias Private Key: 7
26,058,926 UART: [art] Derive CDI
26,059,667 UART: [art] Store in in slot 0x4
26,101,623 UART: [art] Derive Key Pair
26,102,668 UART: [art] Store priv key in slot 0x5
29,344,757 UART: [art] Derive Key Pair - Done
29,357,649 UART: [art] Signing Cert with AUTHO
29,358,949 UART: RITY.KEYID = 7
31,638,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,589 UART: [art] PUB.X = B256B315834A27D19F17B059E6932049994D8C160CF03EE95AE734FB6A1C617B4D2CCF1D1611914668E1E9C812D78ABE
31,646,808 UART: [art] PUB.Y = CC94D633FF888E865163DFB547EC3F25E548625158F1C6C2DF6F82603D75E8611E1C85DDA5CFE1BCBBE3BA4E8C30E05B
31,654,060 UART: [art] SIG.R = 997C893CB630DC9672963BBBCC82C9A15201AA4BD1BED7D72DECE2CCC9A2E9C216EFB7B842390E91923D808A4DC29159
31,661,446 UART: [art] SIG.S = 318AD6A44350846B5C767B15224419CBC2679B9F7F2812260322BF89567E1A73E39FB703245B3B406C0CD3B8AA576A70
32,966,577 UART: Caliptra RT
32,967,294 UART: [state] CFI Enabled
33,085,136 UART: [rt] RT listening for mailbox commands...
33,087,074 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,116,832 UART: [rt]cmd =0x44504543, len=20
33,137,222 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
192,566 UART:
192,932 UART: Running Caliptra ROM ...
194,031 UART:
194,176 UART: [state] CFI Enabled
264,382 UART: [state] LifecycleState = Unprovisioned
266,314 UART: [state] DebugLocked = No
267,832 UART: [state] WD Timer not started. Device not locked for debugging
270,798 UART: [kat] SHA2-256
449,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,470 UART: [kat] ++
461,917 UART: [kat] sha1
473,801 UART: [kat] SHA2-256
476,862 UART: [kat] SHA2-384
483,703 UART: [kat] SHA2-512-ACC
486,634 UART: [kat] ECC-384
2,950,812 UART: [kat] HMAC-384Kdf
2,971,505 UART: [kat] LMS
3,501,002 UART: [kat] --
3,504,890 UART: [cold-reset] ++
3,506,404 UART: [fht] FHT @ 0x50003400
3,516,903 UART: [idev] ++
3,517,586 UART: [idev] CDI.KEYID = 6
3,518,480 UART: [idev] SUBJECT.KEYID = 7
3,519,528 UART: [idev] UDS.KEYID = 0
3,520,543 ready_for_fw is high
3,520,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,055 UART: [idev] Erasing UDS.KEYID = 0
6,028,727 UART: [idev] Sha1 KeyId Algorithm
6,051,690 UART: [idev] --
6,056,174 UART: [ldev] ++
6,056,747 UART: [ldev] CDI.KEYID = 6
6,057,711 UART: [ldev] SUBJECT.KEYID = 5
6,058,872 UART: [ldev] AUTHORITY.KEYID = 7
6,060,102 UART: [ldev] FE.KEYID = 1
6,099,644 UART: [ldev] Erasing FE.KEYID = 1
8,604,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,791 UART: [ldev] --
10,411,911 UART: [fwproc] Wait for Commands...
10,415,078 UART: [fwproc] Recv command 0x46574c44
10,417,169 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,788 >>> mbox cmd response: success
14,284,987 UART: [afmc] ++
14,285,588 UART: [afmc] CDI.KEYID = 6
14,286,498 UART: [afmc] SUBJECT.KEYID = 7
14,287,653 UART: [afmc] AUTHORITY.KEYID = 5
16,827,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,281 UART: [afmc] --
18,625,435 UART: [cold-reset] --
18,627,620 UART: [state] Locking Datavault
18,632,922 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,610 UART: [state] Locking ICCM
18,637,171 UART: [exit] Launching FMC @ 0x40000130
18,645,573 UART:
18,645,807 UART: Running Caliptra FMC ...
18,646,916 UART:
18,647,080 UART: [state] CFI Enabled
18,709,444 UART: [fht] FMC Alias Private Key: 7
20,472,801 UART: [art] Extend RT PCRs Done
20,474,024 UART: [art] Lock RT PCRs Done
20,475,917 UART: [art] Populate DV Done
20,481,398 UART: [fht] FMC Alias Private Key: 7
20,482,932 UART: [art] Derive CDI
20,483,693 UART: [art] Store in in slot 0x4
20,542,079 UART: [art] Derive Key Pair
20,543,071 UART: [art] Store priv key in slot 0x5
23,006,331 UART: [art] Derive Key Pair - Done
23,018,799 UART: [art] Signing Cert with AUTHO
23,020,092 UART: RITY.KEYID = 7
24,732,223 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,722 UART: [art] PUB.X = A4CAE5514CD5A0A0DA9E9684AAF981BE444F5B5CE27E7984A1FA4F24E2E9DC318A074C858912367ECDADD40EE6DB24E7
24,740,985 UART: [art] PUB.Y = FB2C18D49B73EFCCD6AF0B5B0DE552E49FA12D9E399686A3114A9E28738BBC5F9871A55FA70923C13696E1F893B38EA1
24,748,307 UART: [art] SIG.R = 89F65880E0C806D6F3A8EB655F4D0C130F309FD96A67BFDFAD39C0673569206948A6F311A313BE90E25A4B166BF58FB4
24,755,666 UART: [art] SIG.S = 06373B66204DBF92A64CB49DC2115C93ACEDDB4DEF5EE9556DBF2253C005DB52FC3E268B04127F38F2517F931168823E
25,734,391 UART: Caliptra RT
25,735,088 UART: [state] CFI Enabled
25,899,977 UART: [rt] RT listening for mailbox commands...
25,901,923 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,932,653 UART: [rt]cmd =0x44504543, len=20
25,953,101 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,352,415 ready_for_fw is high
3,353,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,016,633 >>> mbox cmd response: success
18,292,684 UART:
18,293,078 UART: Running Caliptra FMC ...
18,294,190 UART:
18,294,345 UART: [state] CFI Enabled
18,361,972 UART: [fht] FMC Alias Private Key: 7
20,126,195 UART: [art] Extend RT PCRs Done
20,127,418 UART: [art] Lock RT PCRs Done
20,129,086 UART: [art] Populate DV Done
20,134,562 UART: [fht] FMC Alias Private Key: 7
20,136,209 UART: [art] Derive CDI
20,137,020 UART: [art] Store in in slot 0x4
20,195,028 UART: [art] Derive Key Pair
20,196,028 UART: [art] Store priv key in slot 0x5
22,658,843 UART: [art] Derive Key Pair - Done
22,671,787 UART: [art] Signing Cert with AUTHO
22,673,082 UART: RITY.KEYID = 7
24,385,379 UART: [art] Erasing AUTHORITY.KEYID = 7
24,386,883 UART: [art] PUB.X = C6D8FF7D81907971F2A53FB0C80F7F852B5480B20FE476C98C261D02578A7E9BCA24BCB0B3AC9E6BC152E2E145B1941C
24,394,175 UART: [art] PUB.Y = 7321ACF27E323AEE7E438C5FE4BDB29D6BA2730C4D448E08C8617DF18716383595C57755A5661B1C46EC70C32C2DD2AB
24,401,416 UART: [art] SIG.R = 2BFE6598D5FDAE7BACE4538173D78EBA83455A762207E3717B0CC056CBB035A50A0FAF195DC8108046395DE5382F4284
24,408,836 UART: [art] SIG.S = 254F93966E72320A30E05BF751B618DB89847D13C5F2E3B6AD721DB0245205FEBEF16E29DBE4AE12FDE03D9E6CB6534D
25,388,084 UART: Caliptra RT
25,388,787 UART: [state] CFI Enabled
25,554,840 UART: [rt] RT listening for mailbox commands...
25,556,749 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,587,256 UART: [rt]cmd =0x44504543, len=20
25,607,221 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
192,913 UART:
193,301 UART: Running Caliptra ROM ...
194,504 UART:
603,996 UART: [state] CFI Enabled
618,525 UART: [state] LifecycleState = Unprovisioned
620,363 UART: [state] DebugLocked = No
622,881 UART: [state] WD Timer not started. Device not locked for debugging
626,700 UART: [kat] SHA2-256
805,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,371 UART: [kat] ++
817,818 UART: [kat] sha1
829,185 UART: [kat] SHA2-256
832,190 UART: [kat] SHA2-384
839,744 UART: [kat] SHA2-512-ACC
842,760 UART: [kat] ECC-384
3,287,693 UART: [kat] HMAC-384Kdf
3,299,520 UART: [kat] LMS
3,829,067 UART: [kat] --
3,833,350 UART: [cold-reset] ++
3,834,219 UART: [fht] FHT @ 0x50003400
3,845,202 UART: [idev] ++
3,845,767 UART: [idev] CDI.KEYID = 6
3,846,796 UART: [idev] SUBJECT.KEYID = 7
3,847,900 UART: [idev] UDS.KEYID = 0
3,848,826 ready_for_fw is high
3,849,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,285 UART: [idev] Erasing UDS.KEYID = 0
6,321,489 UART: [idev] Sha1 KeyId Algorithm
6,344,710 UART: [idev] --
6,348,590 UART: [ldev] ++
6,349,157 UART: [ldev] CDI.KEYID = 6
6,350,068 UART: [ldev] SUBJECT.KEYID = 5
6,351,304 UART: [ldev] AUTHORITY.KEYID = 7
6,352,538 UART: [ldev] FE.KEYID = 1
6,364,856 UART: [ldev] Erasing FE.KEYID = 1
8,838,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,961 UART: [ldev] --
10,629,235 UART: [fwproc] Wait for Commands...
10,632,414 UART: [fwproc] Recv command 0x46574c44
10,634,506 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,688 >>> mbox cmd response: success
14,493,159 UART: [afmc] ++
14,493,759 UART: [afmc] CDI.KEYID = 6
14,494,672 UART: [afmc] SUBJECT.KEYID = 7
14,495,828 UART: [afmc] AUTHORITY.KEYID = 5
16,993,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,749 UART: [afmc] --
18,793,173 UART: [cold-reset] --
18,796,551 UART: [state] Locking Datavault
18,802,561 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,212 UART: [state] Locking ICCM
18,806,199 UART: [exit] Launching FMC @ 0x40000130
18,814,615 UART:
18,814,863 UART: Running Caliptra FMC ...
18,815,965 UART:
18,816,128 UART: [state] CFI Enabled
18,824,392 UART: [fht] FMC Alias Private Key: 7
20,580,562 UART: [art] Extend RT PCRs Done
20,581,785 UART: [art] Lock RT PCRs Done
20,583,411 UART: [art] Populate DV Done
20,588,768 UART: [fht] FMC Alias Private Key: 7
20,590,255 UART: [art] Derive CDI
20,591,018 UART: [art] Store in in slot 0x4
20,633,832 UART: [art] Derive Key Pair
20,634,872 UART: [art] Store priv key in slot 0x5
23,061,656 UART: [art] Derive Key Pair - Done
23,074,821 UART: [art] Signing Cert with AUTHO
23,076,132 UART: RITY.KEYID = 7
24,781,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,990 UART: [art] PUB.X = A1835C3D709E1523BD0B9E3DC0594003B5AD2DFA1609D5AB3FA8E8055027540DF71EF639E31C98AFE9BBA831FF83FC34
24,790,316 UART: [art] PUB.Y = DF469C3F9F452571C2CE80D35E5DF2FE9377BE2DBC6CF0D1788BC720C3C15DDEFCC0F8063CD93198D145FB614BD631AB
24,797,632 UART: [art] SIG.R = 3884B600B2B62BC79619EDD320C8D7BE277BB6832C1DAA68262296A647079218891A35BD8AE11FEE63338F4935B5B8F4
24,804,940 UART: [art] SIG.S = C350F339F39605497BDFAA2F49C481095C1D4B974959C0BA87AC4051B4167D1B8300C5C95BEFEE02287703C26B4F9755
25,783,425 UART: Caliptra RT
25,784,138 UART: [state] CFI Enabled
25,901,331 UART: [rt] RT listening for mailbox commands...
25,903,250 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,933,313 UART: [rt]cmd =0x44504543, len=20
25,953,890 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,911 writing to cptra_bootfsm_go
3,699,147 ready_for_fw is high
3,699,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,579 >>> mbox cmd response: success
18,523,267 UART:
18,523,679 UART: Running Caliptra FMC ...
18,524,818 UART:
18,524,988 UART: [state] CFI Enabled
18,532,673 UART: [fht] FMC Alias Private Key: 7
20,289,680 UART: [art] Extend RT PCRs Done
20,290,907 UART: [art] Lock RT PCRs Done
20,292,434 UART: [art] Populate DV Done
20,297,957 UART: [fht] FMC Alias Private Key: 7
20,299,684 UART: [art] Derive CDI
20,300,466 UART: [art] Store in in slot 0x4
20,343,283 UART: [art] Derive Key Pair
20,344,291 UART: [art] Store priv key in slot 0x5
22,772,132 UART: [art] Derive Key Pair - Done
22,784,674 UART: [art] Signing Cert with AUTHO
22,786,005 UART: RITY.KEYID = 7
24,491,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,095 UART: [art] PUB.X = 947D3930123FD6858527A398160A92420FBBCF059A05F57D12DBD28B622DE8A08084B6A560D88391F484FA590980CC09
24,500,377 UART: [art] PUB.Y = AB6A4FDA38C9652E00BAB478C32BC4D96FB362175BC3CE6E49E66C2598766366F4B4B326BC6D846BE34239E3994559D3
24,507,617 UART: [art] SIG.R = AD923C7E393FA0F66F690FBD6DE1C7174B8807C8BF24B8F36E911EF718FF42468613ECB640642684B0990FFAFED608E9
24,515,001 UART: [art] SIG.S = B28D240C374804048851CE097866D054302AF8F0ACB3E056894A067C8B3DB88367FD140B728C14E11FB2F3DCE69F9C04
25,493,382 UART: Caliptra RT
25,494,081 UART: [state] CFI Enabled
25,610,460 UART: [rt] RT listening for mailbox commands...
25,612,378 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,642,196 UART: [rt]cmd =0x44504543, len=20
25,662,291 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
192,673 UART:
193,064 UART: Running Caliptra ROM ...
194,301 UART:
194,459 UART: [state] CFI Enabled
263,325 UART: [state] LifecycleState = Unprovisioned
265,663 UART: [state] DebugLocked = No
267,407 UART: [state] WD Timer not started. Device not locked for debugging
272,734 UART: [kat] SHA2-256
462,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,349 UART: [kat] ++
473,824 UART: [kat] sha1
484,768 UART: [kat] SHA2-256
487,786 UART: [kat] SHA2-384
492,707 UART: [kat] SHA2-512-ACC
495,360 UART: [kat] ECC-384
2,947,875 UART: [kat] HMAC-384Kdf
2,971,911 UART: [kat] LMS
3,503,681 UART: [kat] --
3,510,043 UART: [cold-reset] ++
3,511,194 UART: [fht] FHT @ 0x50003400
3,522,881 UART: [idev] ++
3,523,583 UART: [idev] CDI.KEYID = 6
3,524,717 UART: [idev] SUBJECT.KEYID = 7
3,525,820 UART: [idev] UDS.KEYID = 0
3,526,748 ready_for_fw is high
3,526,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,490 UART: [idev] Erasing UDS.KEYID = 0
6,027,376 UART: [idev] Sha1 KeyId Algorithm
6,049,160 UART: [idev] --
6,053,916 UART: [ldev] ++
6,054,639 UART: [ldev] CDI.KEYID = 6
6,055,563 UART: [ldev] SUBJECT.KEYID = 5
6,056,672 UART: [ldev] AUTHORITY.KEYID = 7
6,057,901 UART: [ldev] FE.KEYID = 1
6,100,248 UART: [ldev] Erasing FE.KEYID = 1
8,604,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,545 UART: [ldev] --
10,414,509 UART: [fwproc] Wait for Commands...
10,416,115 UART: [fwproc] Recv command 0x46574c44
10,418,421 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,589,495 >>> mbox cmd response: success
14,594,232 UART: [afmc] ++
14,594,942 UART: [afmc] CDI.KEYID = 6
14,596,153 UART: [afmc] SUBJECT.KEYID = 7
14,597,598 UART: [afmc] AUTHORITY.KEYID = 5
17,124,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,881,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,896,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,406 UART: [afmc] --
18,923,461 UART: [cold-reset] --
18,926,356 UART: [state] Locking Datavault
18,931,942 UART: [state] Locking PCR0, PCR1 and PCR31
18,934,310 UART: [state] Locking ICCM
18,935,661 UART: [exit] Launching FMC @ 0x40000130
18,944,353 UART:
18,944,595 UART: Running Caliptra FMC ...
18,945,715 UART:
18,945,874 UART: [state] CFI Enabled
19,007,047 UART: [fht] FMC Alias Private Key: 7
20,770,269 UART: [art] Extend RT PCRs Done
20,771,489 UART: [art] Lock RT PCRs Done
20,773,466 UART: [art] Populate DV Done
20,779,126 UART: [fht] FMC Alias Private Key: 7
20,780,831 UART: [art] Derive CDI
20,781,564 UART: [art] Store in in slot 0x4
20,839,142 UART: [art] Derive Key Pair
20,840,139 UART: [art] Store priv key in slot 0x5
23,303,304 UART: [art] Derive Key Pair - Done
23,316,136 UART: [art] Signing Cert with AUTHO
23,317,435 UART: RITY.KEYID = 7
25,028,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,169 UART: [art] PUB.X = 15021730657C9ED7FCC54B5CB151354AA1F3194FDC51D2326E27FB892F59D7007F32D565EF20FF05FF0C58E62660522D
25,037,414 UART: [art] PUB.Y = B1BFD5465DFB8775398737125DCBBE3E2189FE9C1A65560AA31A065876516D6A9DF90B5D87E796B0E32DD59F85CC5752
25,044,689 UART: [art] SIG.R = B6ABAA23ACB781A7C1C259C866FE2B888BBD3A169F671141FD1F0325A8558C387C31D35128878249B29B919F22CF52B0
25,052,065 UART: [art] SIG.S = CBE85F660CCEC345B37C9CC7993CDA971F3B669042813A5E69E04302EF4DA05B68B3F6C52C7688AD0255351AF50C1DD2
26,031,259 UART: Caliptra RT
26,031,979 UART: [state] CFI Enabled
26,196,463 UART: [rt] RT listening for mailbox commands...
26,198,379 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,228,674 UART: [rt]cmd =0x44504543, len=20
26,249,261 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,439,793 ready_for_fw is high
3,440,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,280 >>> mbox cmd response: success
19,006,339 UART:
19,006,801 UART: Running Caliptra FMC ...
19,007,914 UART:
19,008,078 UART: [state] CFI Enabled
19,073,483 UART: [fht] FMC Alias Private Key: 7
20,837,391 UART: [art] Extend RT PCRs Done
20,838,616 UART: [art] Lock RT PCRs Done
20,840,150 UART: [art] Populate DV Done
20,845,621 UART: [fht] FMC Alias Private Key: 7
20,847,263 UART: [art] Derive CDI
20,848,075 UART: [art] Store in in slot 0x4
20,906,365 UART: [art] Derive Key Pair
20,907,404 UART: [art] Store priv key in slot 0x5
23,370,218 UART: [art] Derive Key Pair - Done
23,383,213 UART: [art] Signing Cert with AUTHO
23,384,520 UART: RITY.KEYID = 7
25,096,510 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,025 UART: [art] PUB.X = D5ED9A1048C95F5186A4228513E05295B0AB2BDDBEFD26B442837D6C83D63F0267D78E15EB466FF3553A41BB9A630025
25,105,299 UART: [art] PUB.Y = 63861D36B82A6B8CBE6BBD0685E0DED5CF12D12800DD291CBB90EC5DC513FFF39BD0C7196495F40D77C6937CE345F837
25,112,534 UART: [art] SIG.R = 5731B7AC80CF35F2F7B6FB7A917EC3FC6375128FB8FC2D4E6EC28436817C2838BF3F71FDA97869063EBD0AA82F40E41C
25,119,933 UART: [art] SIG.S = FB0087D5A4CC56A8A7BCBF88122C0021272E807D03E88A83A96A33E14EB8B195A337CF2C16AF5908E3282DBF0D7C97DA
26,098,476 UART: Caliptra RT
26,099,167 UART: [state] CFI Enabled
26,265,778 UART: [rt] RT listening for mailbox commands...
26,267,714 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,298,433 UART: [rt]cmd =0x44504543, len=20
26,318,970 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,612 writing to cptra_bootfsm_go
192,856 UART:
193,226 UART: Running Caliptra ROM ...
194,444 UART:
604,224 UART: [state] CFI Enabled
617,886 UART: [state] LifecycleState = Unprovisioned
620,194 UART: [state] DebugLocked = No
623,072 UART: [state] WD Timer not started. Device not locked for debugging
627,551 UART: [kat] SHA2-256
817,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,189 UART: [kat] ++
828,795 UART: [kat] sha1
840,337 UART: [kat] SHA2-256
843,317 UART: [kat] SHA2-384
850,312 UART: [kat] SHA2-512-ACC
852,899 UART: [kat] ECC-384
3,293,513 UART: [kat] HMAC-384Kdf
3,307,450 UART: [kat] LMS
3,839,322 UART: [kat] --
3,842,698 UART: [cold-reset] ++
3,844,919 UART: [fht] FHT @ 0x50003400
3,856,113 UART: [idev] ++
3,856,758 UART: [idev] CDI.KEYID = 6
3,857,788 UART: [idev] SUBJECT.KEYID = 7
3,858,967 UART: [idev] UDS.KEYID = 0
3,859,898 ready_for_fw is high
3,860,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,412 UART: [idev] Erasing UDS.KEYID = 0
6,334,144 UART: [idev] Sha1 KeyId Algorithm
6,356,896 UART: [idev] --
6,361,455 UART: [ldev] ++
6,362,192 UART: [ldev] CDI.KEYID = 6
6,363,073 UART: [ldev] SUBJECT.KEYID = 5
6,364,182 UART: [ldev] AUTHORITY.KEYID = 7
6,365,467 UART: [ldev] FE.KEYID = 1
6,377,350 UART: [ldev] Erasing FE.KEYID = 1
8,860,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,778 UART: [ldev] --
10,649,345 UART: [fwproc] Wait for Commands...
10,652,463 UART: [fwproc] Recv command 0x46574c44
10,654,770 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,837,126 >>> mbox cmd response: success
14,841,386 UART: [afmc] ++
14,842,094 UART: [afmc] CDI.KEYID = 6
14,843,312 UART: [afmc] SUBJECT.KEYID = 7
14,844,757 UART: [afmc] AUTHORITY.KEYID = 5
17,341,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,627 UART: [afmc] --
19,141,681 UART: [cold-reset] --
19,144,738 UART: [state] Locking Datavault
19,149,786 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,996 UART: [state] Locking ICCM
19,154,908 UART: [exit] Launching FMC @ 0x40000130
19,163,573 UART:
19,163,823 UART: Running Caliptra FMC ...
19,164,869 UART:
19,165,017 UART: [state] CFI Enabled
19,173,127 UART: [fht] FMC Alias Private Key: 7
20,929,527 UART: [art] Extend RT PCRs Done
20,930,746 UART: [art] Lock RT PCRs Done
20,932,758 UART: [art] Populate DV Done
20,938,281 UART: [fht] FMC Alias Private Key: 7
20,939,875 UART: [art] Derive CDI
20,940,695 UART: [art] Store in in slot 0x4
20,983,451 UART: [art] Derive Key Pair
20,984,446 UART: [art] Store priv key in slot 0x5
23,411,028 UART: [art] Derive Key Pair - Done
23,423,966 UART: [art] Signing Cert with AUTHO
23,425,280 UART: RITY.KEYID = 7
25,130,843 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,360 UART: [art] PUB.X = E58FCA1ED22ADFB86621885DFF4BEB64ED8E910D9C9AAE3D4D9779841733CD444D63CB246E3C9A0A083974F797735156
25,139,660 UART: [art] PUB.Y = 38A3BEB0F1F5D9894E2BC494372038192FBC160CDB2B8BA9BB4F487C1D7C020CC5A4DA450410DBCCBB2FBAE4CD3FEBBB
25,146,929 UART: [art] SIG.R = 092FC16891C7E39D3448C3A3D8FE85DE16E5D0EA4BEA746C6436A02FC2F27A5F45C60CA7ABFFA61C5347E81F934A13C4
25,154,352 UART: [art] SIG.S = 7015A4FE3D8153C471D32E805A69AA0749B61C5768DFD0483E7FDFF45B5E00EF6CB88030EE416F412253F7F7A368245E
26,133,364 UART: Caliptra RT
26,134,073 UART: [state] CFI Enabled
26,251,191 UART: [rt] RT listening for mailbox commands...
26,253,099 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,283,008 UART: [rt]cmd =0x44504543, len=20
26,303,559 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
3,759,078 ready_for_fw is high
3,759,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,945,620 >>> mbox cmd response: success
19,196,629 UART:
19,197,025 UART: Running Caliptra FMC ...
19,198,170 UART:
19,198,332 UART: [state] CFI Enabled
19,206,612 UART: [fht] FMC Alias Private Key: 7
20,963,292 UART: [art] Extend RT PCRs Done
20,964,526 UART: [art] Lock RT PCRs Done
20,966,319 UART: [art] Populate DV Done
20,971,743 UART: [fht] FMC Alias Private Key: 7
20,973,327 UART: [art] Derive CDI
20,974,080 UART: [art] Store in in slot 0x4
21,016,573 UART: [art] Derive Key Pair
21,017,582 UART: [art] Store priv key in slot 0x5
23,444,226 UART: [art] Derive Key Pair - Done
23,457,332 UART: [art] Signing Cert with AUTHO
23,458,670 UART: RITY.KEYID = 7
25,164,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,690 UART: [art] PUB.X = 1A8E8043392B352C3DDB8B7EA65E8218768B07FD2A89A8ED935ACA9C24F594F65125697E2C3D1353AD4B9D74926F2840
25,172,975 UART: [art] PUB.Y = 3202B1182BE5A9974117612A18A2D56748094747A34A2E37353979BE10EEC3F76C9E77E6053390AB61379D6E7C01B4EA
25,180,188 UART: [art] SIG.R = 6935712A8E12CBA4E4401F3D41AA99882BEF4B9FA8E622C87E990A3F7221D2248E04B6365743DF6A5A2DE6945D014477
25,187,594 UART: [art] SIG.S = ADE6AB5B533110E5517177DECF315643CC6609726597AB810E88B6C51B7063C40EFF04A7001FA264063688C822410404
26,166,499 UART: Caliptra RT
26,167,215 UART: [state] CFI Enabled
26,284,853 UART: [rt] RT listening for mailbox commands...
26,286,768 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,316,502 UART: [rt]cmd =0x44504543, len=20
26,336,653 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,547 UART: [kat] SHA2-256
881,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,593 UART: [kat] ++
885,745 UART: [kat] sha1
889,861 UART: [kat] SHA2-256
891,799 UART: [kat] SHA2-384
894,702 UART: [kat] SHA2-512-ACC
896,603 UART: [kat] ECC-384
902,246 UART: [kat] HMAC-384Kdf
906,624 UART: [kat] LMS
1,474,820 UART: [kat] --
1,476,023 UART: [cold-reset] ++
1,476,569 UART: [fht] Storing FHT @ 0x50003400
1,479,390 UART: [idev] ++
1,479,558 UART: [idev] CDI.KEYID = 6
1,479,918 UART: [idev] SUBJECT.KEYID = 7
1,480,342 UART: [idev] UDS.KEYID = 0
1,480,687 ready_for_fw is high
1,480,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,266 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,468 UART: [idev] --
1,514,429 UART: [ldev] ++
1,514,597 UART: [ldev] CDI.KEYID = 6
1,514,960 UART: [ldev] SUBJECT.KEYID = 5
1,515,386 UART: [ldev] AUTHORITY.KEYID = 7
1,515,849 UART: [ldev] FE.KEYID = 1
1,520,805 UART: [ldev] Erasing FE.KEYID = 1
1,545,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,740 UART: [ldev] --
1,585,029 UART: [fwproc] Waiting for Commands...
1,585,752 UART: [fwproc] Received command 0x46574c44
1,586,543 UART: [fwproc] Received Image of size 114084 bytes
2,881,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,927 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,754 >>> mbox cmd response: success
3,074,970 UART: [afmc] ++
3,075,138 UART: [afmc] CDI.KEYID = 6
3,075,500 UART: [afmc] SUBJECT.KEYID = 7
3,075,925 UART: [afmc] AUTHORITY.KEYID = 5
3,111,292 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,560 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,173 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,863 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,930 UART: [afmc] --
3,154,898 UART: [cold-reset] --
3,155,722 UART: [state] Locking Datavault
3,156,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,513 UART: [state] Locking ICCM
3,157,935 UART: [exit] Launching FMC @ 0x40000130
3,163,264 UART:
3,163,280 UART: Running Caliptra FMC ...
3,163,688 UART:
3,163,742 UART: [state] CFI Enabled
3,174,407 UART: [fht] FMC Alias Private Key: 7
3,282,694 UART: [art] Extend RT PCRs Done
3,283,122 UART: [art] Lock RT PCRs Done
3,284,796 UART: [art] Populate DV Done
3,292,995 UART: [fht] FMC Alias Private Key: 7
3,294,025 UART: [art] Derive CDI
3,294,305 UART: [art] Store in in slot 0x4
3,379,832 UART: [art] Derive Key Pair
3,380,192 UART: [art] Store priv key in slot 0x5
3,393,348 UART: [art] Derive Key Pair - Done
3,408,073 UART: [art] Signing Cert with AUTHO
3,408,553 UART: RITY.KEYID = 7
3,423,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,598 UART: [art] PUB.X = AC097103FBB795A34C8959B96B96BF41BD152128ADCC2F2C2F604710D3E8C00A0B084EF7EAFA54E589462A961F8BF2CE
3,431,367 UART: [art] PUB.Y = 780F30939021567DEB49868BB022E95116E06B1122A9A00388A26B145D8EABCBC111A3A701CA546CAEC671D2B1F334E9
3,438,310 UART: [art] SIG.R = 1D38BA50367B1448AF204C8ECDB9A764663259515E04DC58D95CEE7C05ED9C8A4E2F5811AA9191951BC25E4C4CCC6535
3,445,082 UART: [art] SIG.S = 66CEA9D4D8F1291810BECD5F53AD650061F02725D2D10C410CAB8F54C54CE593B34C4354AC372ACBED2111CD4883F556
3,469,501 UART: Caliptra RT
3,469,754 UART: [state] CFI Enabled
3,578,404 UART: [rt] RT listening for mailbox commands...
3,579,074 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,062 UART: [rt]cmd =0x44504543, len=20
3,629,902 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,162 >>> mbox cmd response: success
2,984,830 UART:
2,984,846 UART: Running Caliptra FMC ...
2,985,254 UART:
2,985,308 UART: [state] CFI Enabled
2,995,803 UART: [fht] FMC Alias Private Key: 7
3,102,950 UART: [art] Extend RT PCRs Done
3,103,378 UART: [art] Lock RT PCRs Done
3,104,840 UART: [art] Populate DV Done
3,113,007 UART: [fht] FMC Alias Private Key: 7
3,113,997 UART: [art] Derive CDI
3,114,277 UART: [art] Store in in slot 0x4
3,200,154 UART: [art] Derive Key Pair
3,200,514 UART: [art] Store priv key in slot 0x5
3,213,710 UART: [art] Derive Key Pair - Done
3,228,365 UART: [art] Signing Cert with AUTHO
3,228,845 UART: RITY.KEYID = 7
3,244,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,912 UART: [art] PUB.X = DE942E677C4FB353121C6C9FC60A98B914EDBD1FE07487E925AB6132D1792F2D4C299BEE5754F91DF7441C81D4090404
3,251,674 UART: [art] PUB.Y = 1900D984B559BAA18040369065A1890294A7E41BDC7BE2FF56396D14B38222D6D011CD52A86790ED93DD3FC2D95BE2CB
3,258,603 UART: [art] SIG.R = E81041EE91421D9F4CB2A2842DF30DA471F07BA1EBAA8F08674713B0EF85A8762DBFA7D7EA8DA0AF302FF2762B999C3D
3,265,385 UART: [art] SIG.S = 9CD0533F00E490CDE0C93BFD04ED2F0D1491EA75ADF3BD8EADECCA9E33F6F6FC9F461A2125DD6FE627DF3FFB43948977
3,289,538 UART: Caliptra RT
3,289,791 UART: [state] CFI Enabled
3,398,087 UART: [rt] RT listening for mailbox commands...
3,398,757 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,851 UART: [rt]cmd =0x44504543, len=20
3,449,543 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,706 UART: [kat] SHA2-256
882,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,752 UART: [kat] ++
886,904 UART: [kat] sha1
891,272 UART: [kat] SHA2-256
893,210 UART: [kat] SHA2-384
896,165 UART: [kat] SHA2-512-ACC
898,066 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
908,039 UART: [kat] LMS
1,476,235 UART: [kat] --
1,477,198 UART: [cold-reset] ++
1,477,746 UART: [fht] Storing FHT @ 0x50003400
1,480,567 UART: [idev] ++
1,480,735 UART: [idev] CDI.KEYID = 6
1,481,095 UART: [idev] SUBJECT.KEYID = 7
1,481,519 UART: [idev] UDS.KEYID = 0
1,481,864 ready_for_fw is high
1,481,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,499 UART: [idev] Erasing UDS.KEYID = 0
1,506,107 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,609 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,430 UART: [ldev] Erasing FE.KEYID = 1
1,547,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,650 UART: [fwproc] Waiting for Commands...
1,587,275 UART: [fwproc] Received command 0x46574c44
1,588,066 UART: [fwproc] Received Image of size 114084 bytes
2,882,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,255 >>> mbox cmd response: success
3,076,311 UART: [afmc] ++
3,076,479 UART: [afmc] CDI.KEYID = 6
3,076,841 UART: [afmc] SUBJECT.KEYID = 7
3,077,266 UART: [afmc] AUTHORITY.KEYID = 5
3,112,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,435 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,048 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,738 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,685 UART: [afmc] --
3,155,695 UART: [cold-reset] --
3,156,649 UART: [state] Locking Datavault
3,158,080 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,684 UART: [state] Locking ICCM
3,159,190 UART: [exit] Launching FMC @ 0x40000130
3,164,519 UART:
3,164,535 UART: Running Caliptra FMC ...
3,164,943 UART:
3,165,086 UART: [state] CFI Enabled
3,175,449 UART: [fht] FMC Alias Private Key: 7
3,283,618 UART: [art] Extend RT PCRs Done
3,284,046 UART: [art] Lock RT PCRs Done
3,285,562 UART: [art] Populate DV Done
3,293,547 UART: [fht] FMC Alias Private Key: 7
3,294,709 UART: [art] Derive CDI
3,294,989 UART: [art] Store in in slot 0x4
3,380,694 UART: [art] Derive Key Pair
3,381,054 UART: [art] Store priv key in slot 0x5
3,393,776 UART: [art] Derive Key Pair - Done
3,408,893 UART: [art] Signing Cert with AUTHO
3,409,373 UART: RITY.KEYID = 7
3,424,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,018 UART: [art] PUB.X = 2A143C2F4A043361394D6580350785720FB2319EFF4059043B5B6A377B380356747ACB929C52F7B3613420C9738ADE2F
3,431,761 UART: [art] PUB.Y = D4EBBD4A1109C0096C8301673E452B864FD178D56420FB221A97C2EF05CB9331F075C5023E99CA995E338724A0FDA6F4
3,438,698 UART: [art] SIG.R = CF0562883E50C554EE6EB24358962449387497117EF6CBBE35A081527796A917AFDB9867D219C6473EB97620A0B758C1
3,445,457 UART: [art] SIG.S = B72E36313C258CA61FCD33E0724F0B04676E1EE43CBF42D854DCC2A23BC0E7139E325695911AC236527E4679626ADBF2
3,469,032 UART: Caliptra RT
3,469,377 UART: [state] CFI Enabled
3,577,409 UART: [rt] RT listening for mailbox commands...
3,578,079 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,977 UART: [rt]cmd =0x44504543, len=20
3,628,889 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,658 ready_for_fw is high
1,363,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,443 >>> mbox cmd response: success
2,988,305 UART:
2,988,321 UART: Running Caliptra FMC ...
2,988,729 UART:
2,988,872 UART: [state] CFI Enabled
2,999,641 UART: [fht] FMC Alias Private Key: 7
3,107,950 UART: [art] Extend RT PCRs Done
3,108,378 UART: [art] Lock RT PCRs Done
3,109,858 UART: [art] Populate DV Done
3,118,105 UART: [fht] FMC Alias Private Key: 7
3,119,143 UART: [art] Derive CDI
3,119,423 UART: [art] Store in in slot 0x4
3,205,452 UART: [art] Derive Key Pair
3,205,812 UART: [art] Store priv key in slot 0x5
3,219,454 UART: [art] Derive Key Pair - Done
3,234,473 UART: [art] Signing Cert with AUTHO
3,234,953 UART: RITY.KEYID = 7
3,250,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,110 UART: [art] PUB.X = 718DA763155003AC2DD69A9750B0EA6F6CFFE8566A1C0D4BA7C678988B6500654145B6DAD895C4A4065F87637905239F
3,257,844 UART: [art] PUB.Y = 214D1E1B20857658EEA4CF3265A3FEA09B8F0BC6A80C712E8B169597783008BB6875EF9A4BED46F51987F8A67AF370A6
3,264,791 UART: [art] SIG.R = 4DC3E5B86AF584D006811E637BA919F5CEE15868754469C7AFB9E13DB5F7FDB98436699FC095345B55D632C3A4F8B337
3,271,562 UART: [art] SIG.S = E79ACFF2899A4A5BAB7A0F59874408BB4A210FDD7CBEEADF12B2B52EAF1346A22732CE6FDDA30BF2E7859FAEE1B4A980
3,295,099 UART: Caliptra RT
3,295,444 UART: [state] CFI Enabled
3,402,941 UART: [rt] RT listening for mailbox commands...
3,403,611 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,227 UART: [rt]cmd =0x44504543, len=20
3,454,051 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
901,873 UART: [kat] SHA2-256
903,813 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,751 UART: [fht] FHT @ 0x50003400
1,175,432 UART: [idev] ++
1,175,600 UART: [idev] CDI.KEYID = 6
1,175,960 UART: [idev] SUBJECT.KEYID = 7
1,176,384 UART: [idev] UDS.KEYID = 0
1,176,729 ready_for_fw is high
1,176,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,372 UART: [idev] Erasing UDS.KEYID = 0
1,201,357 UART: [idev] Sha1 KeyId Algorithm
1,210,017 UART: [idev] --
1,210,913 UART: [ldev] ++
1,211,081 UART: [ldev] CDI.KEYID = 6
1,211,444 UART: [ldev] SUBJECT.KEYID = 5
1,211,870 UART: [ldev] AUTHORITY.KEYID = 7
1,212,333 UART: [ldev] FE.KEYID = 1
1,217,455 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,329 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,259 >>> mbox cmd response: success
2,771,385 UART: [afmc] ++
2,771,553 UART: [afmc] CDI.KEYID = 6
2,771,915 UART: [afmc] SUBJECT.KEYID = 7
2,772,340 UART: [afmc] AUTHORITY.KEYID = 5
2,807,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,666 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,394 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,718 UART: [afmc] --
2,850,700 UART: [cold-reset] --
2,851,490 UART: [state] Locking Datavault
2,852,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,157 UART: [state] Locking ICCM
2,853,715 UART: [exit] Launching FMC @ 0x40000130
2,859,044 UART:
2,859,060 UART: Running Caliptra FMC ...
2,859,468 UART:
2,859,522 UART: [state] CFI Enabled
2,870,319 UART: [fht] FMC Alias Private Key: 7
2,978,188 UART: [art] Extend RT PCRs Done
2,978,616 UART: [art] Lock RT PCRs Done
2,980,172 UART: [art] Populate DV Done
2,988,375 UART: [fht] FMC Alias Private Key: 7
2,989,433 UART: [art] Derive CDI
2,989,713 UART: [art] Store in in slot 0x4
3,075,136 UART: [art] Derive Key Pair
3,075,496 UART: [art] Store priv key in slot 0x5
3,089,420 UART: [art] Derive Key Pair - Done
3,104,069 UART: [art] Signing Cert with AUTHO
3,104,549 UART: RITY.KEYID = 7
3,119,989 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,754 UART: [art] PUB.X = 835D7A0F9485D1E1C2EE243B5D622282E1FAF9790A1E2F82EF224E83678A14992EF48ECBFB6DC87F57F237270299BC7B
3,127,523 UART: [art] PUB.Y = E369FB0726379E58244D5F2C350C4965A987451E105190C9B26D13AF356E723480C210A804CFC2DD72759BACD8394000
3,134,434 UART: [art] SIG.R = 1E48E2D95B53721486A080299C02C391843E65B6228F33B7BF47BA6C33955ACAE980F68F3BEC86062E73DA034AC3AC4F
3,141,199 UART: [art] SIG.S = D83CB942536306A11CDBE69A4F64BAA6F8A2E096FFA790358F2B48BF212230F729E212CF9C10BA2B0A52E17CE8F678BF
3,165,006 UART: Caliptra RT
3,165,259 UART: [state] CFI Enabled
3,273,262 UART: [rt] RT listening for mailbox commands...
3,273,932 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,580 UART: [rt]cmd =0x44504543, len=20
3,324,550 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,229 ready_for_fw is high
1,061,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,257 >>> mbox cmd response: success
2,685,321 UART:
2,685,337 UART: Running Caliptra FMC ...
2,685,745 UART:
2,685,799 UART: [state] CFI Enabled
2,696,238 UART: [fht] FMC Alias Private Key: 7
2,803,355 UART: [art] Extend RT PCRs Done
2,803,783 UART: [art] Lock RT PCRs Done
2,805,119 UART: [art] Populate DV Done
2,813,394 UART: [fht] FMC Alias Private Key: 7
2,814,550 UART: [art] Derive CDI
2,814,830 UART: [art] Store in in slot 0x4
2,900,373 UART: [art] Derive Key Pair
2,900,733 UART: [art] Store priv key in slot 0x5
2,914,129 UART: [art] Derive Key Pair - Done
2,928,801 UART: [art] Signing Cert with AUTHO
2,929,281 UART: RITY.KEYID = 7
2,944,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,282 UART: [art] PUB.X = 869F44D83D839AEF359611A231BA691FA3B898F0C6752A7C9479E7058452EDEAB41DFB2DF6280B57326603D893A44835
2,952,041 UART: [art] PUB.Y = 33500AE359E359D19D5C0388453C54DB96684FB75757E20BD95245263E46A269A33FB70CA95B74CFE24984B7D6F9C6C1
2,958,977 UART: [art] SIG.R = DC1F3FC46F010B757AC87163DCDEE2937F9E588FEF860E45EE00E30DFB13D2D537081F572DE59B52FC19EB8E27ED571C
2,965,728 UART: [art] SIG.S = 69A6E5D8278B825437EB094E2B1FCD6B14A7C96296829CEB37030AAD64A389B3330C25877EBC61E99CF229AD5920DADA
2,989,405 UART: Caliptra RT
2,989,658 UART: [state] CFI Enabled
3,096,337 UART: [rt] RT listening for mailbox commands...
3,097,007 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,007 UART: [rt]cmd =0x44504543, len=20
3,147,723 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
893,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,460 UART: [kat] ++
897,612 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,277 UART: [kat] HMAC-384Kdf
923,013 UART: [kat] LMS
1,171,341 UART: [kat] --
1,172,030 UART: [cold-reset] ++
1,172,454 UART: [fht] FHT @ 0x50003400
1,175,043 UART: [idev] ++
1,175,211 UART: [idev] CDI.KEYID = 6
1,175,571 UART: [idev] SUBJECT.KEYID = 7
1,175,995 UART: [idev] UDS.KEYID = 0
1,176,340 ready_for_fw is high
1,176,340 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,915 UART: [idev] Erasing UDS.KEYID = 0
1,200,536 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,074 UART: [ldev] ++
1,210,242 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,031 UART: [ldev] AUTHORITY.KEYID = 7
1,211,494 UART: [ldev] FE.KEYID = 1
1,216,810 UART: [ldev] Erasing FE.KEYID = 1
1,243,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,306 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,445 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,860 >>> mbox cmd response: success
2,771,940 UART: [afmc] ++
2,772,108 UART: [afmc] CDI.KEYID = 6
2,772,470 UART: [afmc] SUBJECT.KEYID = 7
2,772,895 UART: [afmc] AUTHORITY.KEYID = 5
2,808,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,953 UART: [afmc] --
2,852,079 UART: [cold-reset] --
2,852,971 UART: [state] Locking Datavault
2,854,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,826 UART: [state] Locking ICCM
2,855,310 UART: [exit] Launching FMC @ 0x40000130
2,860,639 UART:
2,860,655 UART: Running Caliptra FMC ...
2,861,063 UART:
2,861,206 UART: [state] CFI Enabled
2,871,915 UART: [fht] FMC Alias Private Key: 7
2,980,396 UART: [art] Extend RT PCRs Done
2,980,824 UART: [art] Lock RT PCRs Done
2,982,066 UART: [art] Populate DV Done
2,990,461 UART: [fht] FMC Alias Private Key: 7
2,991,603 UART: [art] Derive CDI
2,991,883 UART: [art] Store in in slot 0x4
3,077,592 UART: [art] Derive Key Pair
3,077,952 UART: [art] Store priv key in slot 0x5
3,091,310 UART: [art] Derive Key Pair - Done
3,106,309 UART: [art] Signing Cert with AUTHO
3,106,789 UART: RITY.KEYID = 7
3,122,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,202 UART: [art] PUB.X = F3302C563E70AB951DE92D2DBC1D15B3C10351698AF48CA25C9F2602D58E25F18740C4F050C05D30F7FA5B8F480F048B
3,129,966 UART: [art] PUB.Y = E940F036ADF0FBA3E5E0DB1FA4262A37F3B82DA0002C0D5F0023CC0D8919F4030252204D8923B20C0C0B317F27ED64AE
3,136,861 UART: [art] SIG.R = C698A82B118DDB063198D84B8BD0AFB2A9C880267E9413A573F44AEFB2337BC656198D9FFA8AA5740824CA31021C12C3
3,143,628 UART: [art] SIG.S = F6DDC9D1D83A7FE7CAE11C44D517BCDABADE71063A72D84F05CE82BE76A2DBD1E6368F3D9C8D36767C468B6E27AA5DE9
3,167,529 UART: Caliptra RT
3,167,874 UART: [state] CFI Enabled
3,275,390 UART: [rt] RT listening for mailbox commands...
3,276,060 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,810 UART: [rt]cmd =0x44504543, len=20
3,326,630 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,352 ready_for_fw is high
1,060,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,125 >>> mbox cmd response: success
2,684,341 UART:
2,684,357 UART: Running Caliptra FMC ...
2,684,765 UART:
2,684,908 UART: [state] CFI Enabled
2,695,469 UART: [fht] FMC Alias Private Key: 7
2,803,486 UART: [art] Extend RT PCRs Done
2,803,914 UART: [art] Lock RT PCRs Done
2,805,030 UART: [art] Populate DV Done
2,813,303 UART: [fht] FMC Alias Private Key: 7
2,814,313 UART: [art] Derive CDI
2,814,593 UART: [art] Store in in slot 0x4
2,900,052 UART: [art] Derive Key Pair
2,900,412 UART: [art] Store priv key in slot 0x5
2,913,668 UART: [art] Derive Key Pair - Done
2,928,463 UART: [art] Signing Cert with AUTHO
2,928,943 UART: RITY.KEYID = 7
2,943,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,506 UART: [art] PUB.X = 5F6E53433CE4444EF59B77E819ACF421BC12A9D70CB7F3E6C9FEABCAEBFB27C9577CD762BF62A3E56370C8B0EEAF3F56
2,951,299 UART: [art] PUB.Y = 6EB76FF749E791BEDF5BB2888FC454063DB578E6D7CE7E6A8177BE22B1A3AE99CD80EE8AF96E97EE10538ADDAB0EF8E4
2,958,269 UART: [art] SIG.R = 10ABA9EBB9D86DF3A1855FFD8F2DBBEF981CC7743B36ADDB59A14CE055DC8C094B638DA7A5BA7AB5C03CE6C56F25C85D
2,965,068 UART: [art] SIG.S = 2DC1708A03317B188A0CA11417276968A3A2D048178380A581DD8BAE2DF84AB7C5FED4A101EB8780D47DC439B4EF798A
2,989,368 UART: Caliptra RT
2,989,713 UART: [state] CFI Enabled
3,096,720 UART: [rt] RT listening for mailbox commands...
3,097,390 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,244 UART: [rt]cmd =0x44504543, len=20
3,148,246 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,891 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
891,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 ready_for_fw is high
1,174,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,214,880 UART: [ldev] Erasing FE.KEYID = 1
1,241,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,188 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,636 >>> mbox cmd response: success
2,769,751 UART: [afmc] ++
2,769,919 UART: [afmc] CDI.KEYID = 6
2,770,282 UART: [afmc] SUBJECT.KEYID = 7
2,770,708 UART: [afmc] AUTHORITY.KEYID = 5
2,806,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,370 UART: [afmc] --
2,849,326 UART: [cold-reset] --
2,850,090 UART: [state] Locking Datavault
2,851,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,669 UART: [state] Locking ICCM
2,852,221 UART: [exit] Launching FMC @ 0x40000130
2,857,550 UART:
2,857,566 UART: Running Caliptra FMC ...
2,857,974 UART:
2,858,028 UART: [state] CFI Enabled
2,868,227 UART: [fht] FMC Alias Private Key: 7
2,976,516 UART: [art] Extend RT PCRs Done
2,976,944 UART: [art] Lock RT PCRs Done
2,978,604 UART: [art] Populate DV Done
2,986,907 UART: [fht] FMC Alias Private Key: 7
2,987,957 UART: [art] Derive CDI
2,988,237 UART: [art] Store in in slot 0x4
3,074,088 UART: [art] Derive Key Pair
3,074,448 UART: [art] Store priv key in slot 0x5
3,087,136 UART: [art] Derive Key Pair - Done
3,101,772 UART: [art] Signing Cert with AUTHO
3,102,252 UART: RITY.KEYID = 7
3,117,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,275 UART: [art] PUB.X = A5E40BB45CE36D973FD6ED961B66B985604D1D19B6CA6BC067E5E1D6CD3D69A31115BE8259CE525869432F10D13E168B
3,125,050 UART: [art] PUB.Y = 5C1A2B9296F0BAFA603330B3DB63327BA78749FE5DFB985B57925F83283A87370DA96A60659E91E56F17309A4048D134
3,131,993 UART: [art] SIG.R = ABFF17FD1258053D0074A51C0AC3E2831335E3FB0373A4ABD47302378D03A543DF9E5DC6C12F9DFDA8E75AA16C6FA73A
3,138,742 UART: [art] SIG.S = 96C2958C01222A8C1EF38991A7246C31D8D9453FC58FC4FEE248E7871BCCED3AF243F9935029BE38AE6AF50304CCB46A
3,161,972 UART: Caliptra RT
3,162,225 UART: [state] CFI Enabled
3,269,953 UART: [rt] RT listening for mailbox commands...
3,270,623 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,599 UART: [rt]cmd =0x44504543, len=20
3,321,469 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,794 ready_for_fw is high
1,056,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,405 >>> mbox cmd response: success
2,681,893 UART:
2,681,909 UART: Running Caliptra FMC ...
2,682,317 UART:
2,682,371 UART: [state] CFI Enabled
2,692,934 UART: [fht] FMC Alias Private Key: 7
2,800,637 UART: [art] Extend RT PCRs Done
2,801,065 UART: [art] Lock RT PCRs Done
2,802,769 UART: [art] Populate DV Done
2,810,794 UART: [fht] FMC Alias Private Key: 7
2,811,738 UART: [art] Derive CDI
2,812,018 UART: [art] Store in in slot 0x4
2,898,227 UART: [art] Derive Key Pair
2,898,587 UART: [art] Store priv key in slot 0x5
2,911,861 UART: [art] Derive Key Pair - Done
2,926,780 UART: [art] Signing Cert with AUTHO
2,927,260 UART: RITY.KEYID = 7
2,942,326 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,091 UART: [art] PUB.X = 9CF395FE2801F3F96818D314569A985D23900044240FC3DA4AED08E83FB82404CA14AD4A61AFB5B7030C489EBB48EBD8
2,949,829 UART: [art] PUB.Y = 1DB8BB1869D49460009BDCC6E928DE15D7FD92370D82B109C094E89E6D17C466593DB7DBC8B5D3092BEA8479BEDEB524
2,956,760 UART: [art] SIG.R = 976BE63562045447CB432D5D9CA58C98A28747B21E1ED4ED198FD69EFD722BF07E0205FDECF8DB684AA4E055237FA0CA
2,963,535 UART: [art] SIG.S = 674A22D028BE356FFC404062AE8005906FD82ECC12B342D4CEE2A4E6F4A243362C4083F186D10DEA4727FEED82A57A8F
2,987,614 UART: Caliptra RT
2,987,867 UART: [state] CFI Enabled
3,095,182 UART: [rt] RT listening for mailbox commands...
3,095,852 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,890 UART: [rt]cmd =0x44504543, len=20
3,146,940 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 ready_for_fw is high
1,174,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,436 UART: [fwproc] Recv command 0x46574c44
1,283,169 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,225 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,906 >>> mbox cmd response: success
2,771,027 UART: [afmc] ++
2,771,195 UART: [afmc] CDI.KEYID = 6
2,771,558 UART: [afmc] SUBJECT.KEYID = 7
2,771,984 UART: [afmc] AUTHORITY.KEYID = 5
2,807,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,478 UART: [afmc] --
2,851,512 UART: [cold-reset] --
2,852,458 UART: [state] Locking Datavault
2,853,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,959 UART: [state] Locking ICCM
2,854,379 UART: [exit] Launching FMC @ 0x40000130
2,859,708 UART:
2,859,724 UART: Running Caliptra FMC ...
2,860,132 UART:
2,860,275 UART: [state] CFI Enabled
2,871,054 UART: [fht] FMC Alias Private Key: 7
2,978,857 UART: [art] Extend RT PCRs Done
2,979,285 UART: [art] Lock RT PCRs Done
2,980,647 UART: [art] Populate DV Done
2,988,780 UART: [fht] FMC Alias Private Key: 7
2,989,820 UART: [art] Derive CDI
2,990,100 UART: [art] Store in in slot 0x4
3,076,007 UART: [art] Derive Key Pair
3,076,367 UART: [art] Store priv key in slot 0x5
3,089,447 UART: [art] Derive Key Pair - Done
3,104,285 UART: [art] Signing Cert with AUTHO
3,104,765 UART: RITY.KEYID = 7
3,119,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,346 UART: [art] PUB.X = 078347B10A6F8ECF7B3F4955074A0BB002F5E7AFB675DF1B0385B5AE96AC7E9BE6A8C4F0172DFFA94E86459773667195
3,127,106 UART: [art] PUB.Y = 1AD9FFDC028DB09244931A09B5E593979FEAF37F673447130603BEB09DC8F49EEC428350D3B8AF6B07BB3FC0DBBBE5C2
3,134,059 UART: [art] SIG.R = A3776A6FCFCA0CFDFF239282993662C83EF46899BD5E694A78C19D71CE94B1AA54B350C1FF77B5C3F17DFF43778B5EE2
3,140,842 UART: [art] SIG.S = 99837D61E505DC6AB4223F44FD73FF2DEBE57DFB2D7BC1C6DE7583FCBCFA35024ED7D5B5715C8E1C4A3FB16773A57A27
3,164,327 UART: Caliptra RT
3,164,672 UART: [state] CFI Enabled
3,272,402 UART: [rt] RT listening for mailbox commands...
3,273,072 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,852 UART: [rt]cmd =0x44504543, len=20
3,323,694 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,937 ready_for_fw is high
1,055,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,586 >>> mbox cmd response: success
2,680,118 UART:
2,680,134 UART: Running Caliptra FMC ...
2,680,542 UART:
2,680,685 UART: [state] CFI Enabled
2,691,276 UART: [fht] FMC Alias Private Key: 7
2,798,915 UART: [art] Extend RT PCRs Done
2,799,343 UART: [art] Lock RT PCRs Done
2,800,725 UART: [art] Populate DV Done
2,808,934 UART: [fht] FMC Alias Private Key: 7
2,810,078 UART: [art] Derive CDI
2,810,358 UART: [art] Store in in slot 0x4
2,896,221 UART: [art] Derive Key Pair
2,896,581 UART: [art] Store priv key in slot 0x5
2,909,941 UART: [art] Derive Key Pair - Done
2,925,092 UART: [art] Signing Cert with AUTHO
2,925,572 UART: RITY.KEYID = 7
2,940,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,125 UART: [art] PUB.X = 78B560C9FCFCCBEF26D881F99150457370DF03A977D0F9F36E1F9D3A9BEF49F2C7D102C3A7E0F48AC12AE96F5962DF30
2,947,905 UART: [art] PUB.Y = 56F857B926C466DBB79973B2E5E938E9F885A72E912B33543A550823D83A2A9056FE72A5486B08C124A159E2611B91AB
2,954,843 UART: [art] SIG.R = 505EDCBEA786AE04CF7081E5D6F3E46B2EB5A2B15CACDCE50CC55A01FCEB11C1F321467335F77B97937B690CFB4BD2AE
2,961,627 UART: [art] SIG.S = D5AAB564A90F91A56531072F60851326CD3BB8B380AE74790FC07279B8ED8B4E7E51528AA829C1E353615AD24B7DEAF7
2,985,431 UART: Caliptra RT
2,985,776 UART: [state] CFI Enabled
3,093,885 UART: [rt] RT listening for mailbox commands...
3,094,555 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,305 UART: [rt]cmd =0x44504543, len=20
3,145,351 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,246 UART:
192,617 UART: Running Caliptra ROM ...
193,798 UART:
193,952 UART: [state] CFI Enabled
266,098 UART: [state] LifecycleState = Unprovisioned
268,021 UART: [state] DebugLocked = No
270,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,424 UART: [kat] SHA2-256
446,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,636 UART: [kat] ++
457,173 UART: [kat] sha1
467,914 UART: [kat] SHA2-256
470,557 UART: [kat] SHA2-384
477,040 UART: [kat] SHA2-512-ACC
479,345 UART: [kat] ECC-384
2,766,425 UART: [kat] HMAC-384Kdf
2,780,590 UART: [kat] LMS
3,970,887 UART: [kat] --
3,975,506 UART: [cold-reset] ++
3,976,698 UART: [fht] Storing FHT @ 0x50003400
3,988,998 UART: [idev] ++
3,989,641 UART: [idev] CDI.KEYID = 6
3,990,553 UART: [idev] SUBJECT.KEYID = 7
3,991,799 UART: [idev] UDS.KEYID = 0
3,992,850 ready_for_fw is high
3,993,070 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,273 UART: [idev] Erasing UDS.KEYID = 0
7,326,337 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,811 UART: [idev] --
7,352,314 UART: [ldev] ++
7,352,893 UART: [ldev] CDI.KEYID = 6
7,353,919 UART: [ldev] SUBJECT.KEYID = 5
7,355,079 UART: [ldev] AUTHORITY.KEYID = 7
7,356,315 UART: [ldev] FE.KEYID = 1
7,405,704 UART: [ldev] Erasing FE.KEYID = 1
10,736,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,579 UART: [ldev] --
13,096,474 UART: [fwproc] Waiting for Commands...
13,098,500 UART: [fwproc] Received command 0x46574c44
13,100,691 UART: [fwproc] Received Image of size 113760 bytes
17,148,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,201 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,610,790 >>> mbox cmd response: success
17,614,574 UART: [afmc] ++
17,615,174 UART: [afmc] CDI.KEYID = 6
17,616,088 UART: [afmc] SUBJECT.KEYID = 7
17,617,359 UART: [afmc] AUTHORITY.KEYID = 5
20,988,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,844 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,263 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,100 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,631 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,019 UART: [afmc] --
23,359,424 UART: [cold-reset] --
23,363,824 UART: [state] Locking Datavault
23,368,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,005 UART: [state] Locking ICCM
23,372,573 UART: [exit] Launching FMC @ 0x40000130
23,380,962 UART:
23,381,203 UART: Running Caliptra FMC ...
23,382,306 UART:
23,382,465 UART: [state] CFI Enabled
23,449,072 UART: [fht] FMC Alias Private Key: 7
25,787,154 UART: [art] Extend RT PCRs Done
25,788,387 UART: [art] Lock RT PCRs Done
25,789,987 UART: [art] Populate DV Done
25,795,556 UART: [fht] FMC Alias Private Key: 7
25,797,091 UART: [art] Derive CDI
25,797,828 UART: [art] Store in in slot 0x4
25,857,945 UART: [art] Derive Key Pair
25,858,986 UART: [art] Store priv key in slot 0x5
29,151,400 UART: [art] Derive Key Pair - Done
29,164,188 UART: [art] Signing Cert with AUTHO
29,165,484 UART: RITY.KEYID = 7
31,453,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,195 UART: [art] PUB.X = 9D6E5D48EDC974120DF524A296338E327BF588CBE1C088E8770E3866A02BE63E935484F9F216BBF305ED4CC402C07334
31,462,440 UART: [art] PUB.Y = 1ADC8F5DE8FC8607E49A83604E5B3DB10C3F570218C42F3003E599D4AB8DBD292E8E577B5B4EBBF7FB4942B6BB7809C1
31,469,719 UART: [art] SIG.R = 1FCCAC8D9B88FE1EDF227D876EEDA42B2BFDE31E9C8019A9E089BD3646635D18461A80E00A8C8DDFD8DBAB6267790BE0
31,477,112 UART: [art] SIG.S = 5D069B119BAFDE05019633480FE29BF3F607684AB1A33D3F71120138C70FE5CFC61FB882E4545BB25BDD6EE9F0ADF2D8
32,782,501 UART: Caliptra RT
32,783,219 UART: [state] CFI Enabled
32,944,220 UART: [rt] RT listening for mailbox commands...
32,946,134 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,976,537 UART: [rt]cmd =0x44504543, len=40
33,018,142 >>> mbox cmd response data (40 bytes)
33,019,206 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,049,143 UART: [rt]cmd =0x44504543, len=40
33,071,676 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,784,306 ready_for_fw is high
3,784,674 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,864,089 >>> mbox cmd response: success
23,568,460 UART:
23,568,842 UART: Running Caliptra FMC ...
23,569,949 UART:
23,570,104 UART: [state] CFI Enabled
23,635,348 UART: [fht] FMC Alias Private Key: 7
25,973,382 UART: [art] Extend RT PCRs Done
25,974,608 UART: [art] Lock RT PCRs Done
25,976,207 UART: [art] Populate DV Done
25,981,739 UART: [fht] FMC Alias Private Key: 7
25,983,474 UART: [art] Derive CDI
25,984,219 UART: [art] Store in in slot 0x4
26,043,474 UART: [art] Derive Key Pair
26,044,480 UART: [art] Store priv key in slot 0x5
29,337,615 UART: [art] Derive Key Pair - Done
29,350,805 UART: [art] Signing Cert with AUTHO
29,352,117 UART: RITY.KEYID = 7
31,638,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,186 UART: [art] PUB.X = D1B5DB4F207053275C2E234F2D9D7EA7B33944255D7DDEDE7B8C4E216D387C57EDF0C310EE30C7B06B77F448A2617A8C
31,647,450 UART: [art] PUB.Y = B5F44B5DA5FAE3FDD01E145BA31F5A64EB8F9E23B333CFCB53323170A99E66581310D6FA2F7A305E1269BC89A2C3D19B
31,654,702 UART: [art] SIG.R = 8DEBCC8094268F3E91AA671FF6D2B66BCD8ED8C84348C71E4E8190E9CB388C9B96036B280BCA0E37247D500019C1B437
31,662,136 UART: [art] SIG.S = 01C0AEC73765064E6C3363643AD50AA430C3B4EC6A1DECEFAC5C7F2B09590BD0CA82996D9DD3739204C1C76162C9548F
32,967,379 UART: Caliptra RT
32,968,092 UART: [state] CFI Enabled
33,128,722 UART: [rt] RT listening for mailbox commands...
33,130,639 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,161,240 UART: [rt]cmd =0x44504543, len=40
33,201,878 >>> mbox cmd response data (40 bytes)
33,203,077 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,233,232 UART: [rt]cmd =0x44504543, len=40
33,255,550 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
192,865 UART:
193,245 UART: Running Caliptra ROM ...
194,403 UART:
604,278 UART: [state] CFI Enabled
621,499 UART: [state] LifecycleState = Unprovisioned
623,451 UART: [state] DebugLocked = No
625,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,465 UART: [kat] SHA2-256
800,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,766 UART: [kat] ++
811,212 UART: [kat] sha1
822,889 UART: [kat] SHA2-256
825,588 UART: [kat] SHA2-384
831,157 UART: [kat] SHA2-512-ACC
833,522 UART: [kat] ECC-384
3,114,732 UART: [kat] HMAC-384Kdf
3,125,221 UART: [kat] LMS
4,315,335 UART: [kat] --
4,318,525 UART: [cold-reset] ++
4,320,536 UART: [fht] Storing FHT @ 0x50003400
4,332,937 UART: [idev] ++
4,333,507 UART: [idev] CDI.KEYID = 6
4,334,538 UART: [idev] SUBJECT.KEYID = 7
4,335,714 UART: [idev] UDS.KEYID = 0
4,336,774 ready_for_fw is high
4,337,006 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,996 UART: [idev] Erasing UDS.KEYID = 0
7,621,395 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,191 UART: [idev] --
7,647,846 UART: [ldev] ++
7,648,413 UART: [ldev] CDI.KEYID = 6
7,649,382 UART: [ldev] SUBJECT.KEYID = 5
7,650,587 UART: [ldev] AUTHORITY.KEYID = 7
7,651,813 UART: [ldev] FE.KEYID = 1
7,663,768 UART: [ldev] Erasing FE.KEYID = 1
10,951,366 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,996 UART: [ldev] --
13,309,918 UART: [fwproc] Waiting for Commands...
13,313,249 UART: [fwproc] Received command 0x46574c44
13,315,426 UART: [fwproc] Received Image of size 113760 bytes
17,357,925 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,179 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,820,032 >>> mbox cmd response: success
17,824,511 UART: [afmc] ++
17,825,105 UART: [afmc] CDI.KEYID = 6
17,826,011 UART: [afmc] SUBJECT.KEYID = 7
17,827,292 UART: [afmc] AUTHORITY.KEYID = 5
21,142,073 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,759 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,154 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,985 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,421 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,215 UART: [afmc] --
23,506,162 UART: [cold-reset] --
23,508,564 UART: [state] Locking Datavault
23,513,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,678 UART: [state] Locking ICCM
23,517,333 UART: [exit] Launching FMC @ 0x40000130
23,525,728 UART:
23,525,959 UART: Running Caliptra FMC ...
23,527,024 UART:
23,527,181 UART: [state] CFI Enabled
23,535,577 UART: [fht] FMC Alias Private Key: 7
25,866,828 UART: [art] Extend RT PCRs Done
25,868,053 UART: [art] Lock RT PCRs Done
25,870,051 UART: [art] Populate DV Done
25,875,463 UART: [fht] FMC Alias Private Key: 7
25,877,164 UART: [art] Derive CDI
25,877,974 UART: [art] Store in in slot 0x4
25,920,507 UART: [art] Derive Key Pair
25,921,506 UART: [art] Store priv key in slot 0x5
29,163,492 UART: [art] Derive Key Pair - Done
29,177,033 UART: [art] Signing Cert with AUTHO
29,178,341 UART: RITY.KEYID = 7
31,457,164 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,805 UART: [art] PUB.X = 044B346C8FA7C1EB3E24DFD717A67B9FA3F3530735B672444223D9B92F3BF5379D217D8CFC7211DF3B483348C538C4AF
31,465,885 UART: [art] PUB.Y = 841065A7CFA1CC4EA5894409B9A482BE2BBF6AC0E876E1439DDC9C5ACABC06DD02F2EBD58652206B1C1F4CD957D8922D
31,473,145 UART: [art] SIG.R = 2CB65BFBE364C209B14DD57B02C697EB9958D327766B05456AE08C7C0B265D09672CC8174C52CF7A5B30F0CF3042308D
31,480,509 UART: [art] SIG.S = F336C9F1FA8D148539F9B796E6812AB384DA933941CB98118E28C3901678D381B5A001602337A630163CD62CEE73FAE1
32,785,751 UART: Caliptra RT
32,786,459 UART: [state] CFI Enabled
32,904,601 UART: [rt] RT listening for mailbox commands...
32,906,521 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,936,512 UART: [rt]cmd =0x44504543, len=40
32,962,590 >>> mbox cmd response data (40 bytes)
32,963,921 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,993,972 UART: [rt]cmd =0x44504543, len=40
33,016,325 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
4,128,070 ready_for_fw is high
4,128,672 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,064,279 >>> mbox cmd response: success
23,706,836 UART:
23,707,214 UART: Running Caliptra FMC ...
23,708,344 UART:
23,708,504 UART: [state] CFI Enabled
23,716,560 UART: [fht] FMC Alias Private Key: 7
26,046,944 UART: [art] Extend RT PCRs Done
26,048,208 UART: [art] Lock RT PCRs Done
26,049,872 UART: [art] Populate DV Done
26,055,343 UART: [fht] FMC Alias Private Key: 7
26,056,862 UART: [art] Derive CDI
26,057,600 UART: [art] Store in in slot 0x4
26,099,877 UART: [art] Derive Key Pair
26,100,926 UART: [art] Store priv key in slot 0x5
29,342,267 UART: [art] Derive Key Pair - Done
29,355,324 UART: [art] Signing Cert with AUTHO
29,356,632 UART: RITY.KEYID = 7
31,636,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,943 UART: [art] PUB.X = 427443F805D81760788A9963FDE1A44CF0A6900939BBFFCC493675C3B42ED65D072D4AE88479DE9AFD6B5D112B415563
31,645,188 UART: [art] PUB.Y = 1C402495C833B3D0D9BE5657CCF6970AB63FBB2DE4A728A96AAE1EDCD604C08F54FEED70B730EDCF444107D2CC2B95A5
31,652,457 UART: [art] SIG.R = 8F5D061CFEE609428852EDC14AEE547934082697D4381AF57D1256ACA311B01163F3A0ACC1D7A9EB5E9161FD7A969393
31,659,849 UART: [art] SIG.S = F2EF9208A613D925514DD33F4EF1B63549ECD3C1179BE094A60E6EC1C051BD14D9014D19C290C61042A886247053B8D2
32,964,870 UART: Caliptra RT
32,965,569 UART: [state] CFI Enabled
33,083,453 UART: [rt] RT listening for mailbox commands...
33,085,389 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,115,551 UART: [rt]cmd =0x44504543, len=40
33,141,976 >>> mbox cmd response data (40 bytes)
33,143,307 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,173,569 UART: [rt]cmd =0x44504543, len=40
33,196,370 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,383 UART:
192,887 UART: Running Caliptra ROM ...
194,041 UART:
194,201 UART: [state] CFI Enabled
265,318 UART: [state] LifecycleState = Unprovisioned
267,401 UART: [state] DebugLocked = No
269,239 UART: [state] WD Timer not started. Device not locked for debugging
272,296 UART: [kat] SHA2-256
451,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,016 UART: [kat] ++
463,490 UART: [kat] sha1
473,295 UART: [kat] SHA2-256
476,306 UART: [kat] SHA2-384
482,645 UART: [kat] SHA2-512-ACC
485,575 UART: [kat] ECC-384
2,947,288 UART: [kat] HMAC-384Kdf
2,971,977 UART: [kat] LMS
3,501,431 UART: [kat] --
3,505,993 UART: [cold-reset] ++
3,507,916 UART: [fht] FHT @ 0x50003400
3,518,892 UART: [idev] ++
3,519,451 UART: [idev] CDI.KEYID = 6
3,520,476 UART: [idev] SUBJECT.KEYID = 7
3,521,572 UART: [idev] UDS.KEYID = 0
3,522,614 ready_for_fw is high
3,522,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,358 UART: [idev] Erasing UDS.KEYID = 0
6,023,626 UART: [idev] Sha1 KeyId Algorithm
6,046,642 UART: [idev] --
6,050,165 UART: [ldev] ++
6,050,754 UART: [ldev] CDI.KEYID = 6
6,051,691 UART: [ldev] SUBJECT.KEYID = 5
6,052,798 UART: [ldev] AUTHORITY.KEYID = 7
6,054,030 UART: [ldev] FE.KEYID = 1
6,100,280 UART: [ldev] Erasing FE.KEYID = 1
8,603,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,049 UART: [ldev] --
10,415,046 UART: [fwproc] Wait for Commands...
10,417,648 UART: [fwproc] Recv command 0x46574c44
10,419,738 UART: [fwproc] Recv'd Img size: 114084 bytes
13,815,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,055 >>> mbox cmd response: success
14,277,287 UART: [afmc] ++
14,277,881 UART: [afmc] CDI.KEYID = 6
14,278,789 UART: [afmc] SUBJECT.KEYID = 7
14,279,942 UART: [afmc] AUTHORITY.KEYID = 5
16,806,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,140 UART: [afmc] --
18,608,555 UART: [cold-reset] --
18,611,830 UART: [state] Locking Datavault
18,617,558 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,201 UART: [state] Locking ICCM
18,621,836 UART: [exit] Launching FMC @ 0x40000130
18,630,280 UART:
18,630,517 UART: Running Caliptra FMC ...
18,631,616 UART:
18,631,777 UART: [state] CFI Enabled
18,690,673 UART: [fht] FMC Alias Private Key: 7
20,454,223 UART: [art] Extend RT PCRs Done
20,455,441 UART: [art] Lock RT PCRs Done
20,457,174 UART: [art] Populate DV Done
20,462,260 UART: [fht] FMC Alias Private Key: 7
20,463,854 UART: [art] Derive CDI
20,464,601 UART: [art] Store in in slot 0x4
20,523,696 UART: [art] Derive Key Pair
20,524,729 UART: [art] Store priv key in slot 0x5
22,987,422 UART: [art] Derive Key Pair - Done
23,000,263 UART: [art] Signing Cert with AUTHO
23,001,573 UART: RITY.KEYID = 7
24,713,827 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,334 UART: [art] PUB.X = 1938F12C3319BD34BD99466F56F8EA78D012D30CD16111D4F6ACB8A5C268ADC70D983685F11CF03BE9656A3F24036C18
24,722,545 UART: [art] PUB.Y = 7F7B5A69C1661FA454A4A041611AFD8621F534CF6CDD62EB02D8E08F7E2BC8A0C9CD7A732EC0721B462A3076CA89FCB7
24,729,848 UART: [art] SIG.R = 74971181EEF87C0B6BB5B08E88CEAC5AC25BC0C41E280DBD6B0E78358F3BB54529DE9A384BB680ADD434B55B61DBE30E
24,737,272 UART: [art] SIG.S = CB754A3730391AEEC097E7495574B93470A9ED7D15D0798389DDCAC3192E9B1D017D4110CAA95AC2F7C5A05ED8F164FD
25,716,152 UART: Caliptra RT
25,716,868 UART: [state] CFI Enabled
25,881,560 UART: [rt] RT listening for mailbox commands...
25,883,486 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,914,143 UART: [rt]cmd =0x44504543, len=40
25,956,258 >>> mbox cmd response data (40 bytes)
25,957,504 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,987,652 UART: [rt]cmd =0x44504543, len=40
26,010,295 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
3,362,189 ready_for_fw is high
3,362,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,065,247 >>> mbox cmd response: success
18,346,201 UART:
18,346,689 UART: Running Caliptra FMC ...
18,347,792 UART:
18,347,947 UART: [state] CFI Enabled
18,412,817 UART: [fht] FMC Alias Private Key: 7
20,176,243 UART: [art] Extend RT PCRs Done
20,177,477 UART: [art] Lock RT PCRs Done
20,179,006 UART: [art] Populate DV Done
20,184,480 UART: [fht] FMC Alias Private Key: 7
20,186,080 UART: [art] Derive CDI
20,186,893 UART: [art] Store in in slot 0x4
20,245,023 UART: [art] Derive Key Pair
20,246,086 UART: [art] Store priv key in slot 0x5
22,708,995 UART: [art] Derive Key Pair - Done
22,722,206 UART: [art] Signing Cert with AUTHO
22,723,512 UART: RITY.KEYID = 7
24,434,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,600 UART: [art] PUB.X = A12E27E1FB9CB67FA396B5A5647E767E91A2408C371A343453EF3DC2FA631E8D534BACA8EA60E24D425B06E7CFE1796D
24,442,872 UART: [art] PUB.Y = 30B29CB987CC5751203289733E4AFB97DE0F81B6854447A66C0A87F4A07BD9DEC5AB58165995319858E393786473917D
24,450,108 UART: [art] SIG.R = BFC31FBA1AD1E6CEBD2022932841FDAE8D5EF78EAFFFC389CF05BF7C147159BC650F7498C5FB32E97F59399BBAEB66CC
24,457,528 UART: [art] SIG.S = CCA52C1631FDA0CCE95E671EC8A34F488AF2691D10A8ADC9F903A8745D4605A15C28031B0F8F4DFF30482B34798F2E37
25,436,530 UART: Caliptra RT
25,437,241 UART: [state] CFI Enabled
25,602,849 UART: [rt] RT listening for mailbox commands...
25,604,779 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,635,418 UART: [rt]cmd =0x44504543, len=40
25,676,341 >>> mbox cmd response data (40 bytes)
25,677,530 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,707,652 UART: [rt]cmd =0x44504543, len=40
25,730,744 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
193,002 UART:
193,375 UART: Running Caliptra ROM ...
194,564 UART:
604,204 UART: [state] CFI Enabled
620,566 UART: [state] LifecycleState = Unprovisioned
622,448 UART: [state] DebugLocked = No
624,890 UART: [state] WD Timer not started. Device not locked for debugging
629,273 UART: [kat] SHA2-256
808,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,962 UART: [kat] ++
820,510 UART: [kat] sha1
830,256 UART: [kat] SHA2-256
833,268 UART: [kat] SHA2-384
838,906 UART: [kat] SHA2-512-ACC
841,837 UART: [kat] ECC-384
3,280,491 UART: [kat] HMAC-384Kdf
3,293,076 UART: [kat] LMS
3,822,561 UART: [kat] --
3,828,472 UART: [cold-reset] ++
3,830,481 UART: [fht] FHT @ 0x50003400
3,839,846 UART: [idev] ++
3,840,444 UART: [idev] CDI.KEYID = 6
3,841,335 UART: [idev] SUBJECT.KEYID = 7
3,842,505 UART: [idev] UDS.KEYID = 0
3,843,554 ready_for_fw is high
3,843,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,871 UART: [idev] Erasing UDS.KEYID = 0
6,320,006 UART: [idev] Sha1 KeyId Algorithm
6,344,537 UART: [idev] --
6,348,582 UART: [ldev] ++
6,349,145 UART: [ldev] CDI.KEYID = 6
6,350,050 UART: [ldev] SUBJECT.KEYID = 5
6,351,261 UART: [ldev] AUTHORITY.KEYID = 7
6,352,492 UART: [ldev] FE.KEYID = 1
6,364,460 UART: [ldev] Erasing FE.KEYID = 1
8,841,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,367 UART: [ldev] --
10,630,683 UART: [fwproc] Wait for Commands...
10,632,502 UART: [fwproc] Recv command 0x46574c44
10,634,593 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,598 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,623 >>> mbox cmd response: success
14,491,075 UART: [afmc] ++
14,491,677 UART: [afmc] CDI.KEYID = 6
14,492,567 UART: [afmc] SUBJECT.KEYID = 7
14,493,785 UART: [afmc] AUTHORITY.KEYID = 5
16,991,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,759 UART: [afmc] --
18,785,982 UART: [cold-reset] --
18,790,770 UART: [state] Locking Datavault
18,796,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,078 UART: [state] Locking ICCM
18,799,993 UART: [exit] Launching FMC @ 0x40000130
18,808,396 UART:
18,808,638 UART: Running Caliptra FMC ...
18,809,742 UART:
18,809,900 UART: [state] CFI Enabled
18,818,112 UART: [fht] FMC Alias Private Key: 7
20,575,046 UART: [art] Extend RT PCRs Done
20,576,273 UART: [art] Lock RT PCRs Done
20,578,306 UART: [art] Populate DV Done
20,583,664 UART: [fht] FMC Alias Private Key: 7
20,585,374 UART: [art] Derive CDI
20,586,112 UART: [art] Store in in slot 0x4
20,628,657 UART: [art] Derive Key Pair
20,629,659 UART: [art] Store priv key in slot 0x5
23,056,658 UART: [art] Derive Key Pair - Done
23,069,602 UART: [art] Signing Cert with AUTHO
23,070,930 UART: RITY.KEYID = 7
24,775,783 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,288 UART: [art] PUB.X = 6555312B323BA67E3D8B842BA1D44042C709053AAA258E9EDF7CD114A40AC697203A4BE5AC8FE17906E48AE1D55F8F21
24,784,565 UART: [art] PUB.Y = 1F1CAF1891156D1E9C3EFF84C39685DD71904D1EA10825263E0001870865CB67A7DC7D640474E372CEA4DA38B3C21E16
24,791,820 UART: [art] SIG.R = ECCCA2D538B91ACF6CD759BDF8721B980ADF287CF6F409935216D6F37CD2E6A5967584FA569B5712AF662BFBAA85FD5B
24,799,279 UART: [art] SIG.S = 6E38BE7D864E03089AB784EB39270FE719C65EFE331F699FAB040C22A8C8FD33D17F4DFC5F32EABD3F89974C2EF66039
25,778,407 UART: Caliptra RT
25,779,113 UART: [state] CFI Enabled
25,896,672 UART: [rt] RT listening for mailbox commands...
25,898,590 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,928,798 UART: [rt]cmd =0x44504543, len=40
25,955,129 >>> mbox cmd response data (40 bytes)
25,956,310 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,986,242 UART: [rt]cmd =0x44504543, len=40
26,008,998 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,932 writing to cptra_bootfsm_go
3,696,624 ready_for_fw is high
3,696,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,182 >>> mbox cmd response: success
18,504,676 UART:
18,505,073 UART: Running Caliptra FMC ...
18,506,179 UART:
18,506,343 UART: [state] CFI Enabled
18,514,047 UART: [fht] FMC Alias Private Key: 7
20,270,754 UART: [art] Extend RT PCRs Done
20,271,987 UART: [art] Lock RT PCRs Done
20,273,781 UART: [art] Populate DV Done
20,279,035 UART: [fht] FMC Alias Private Key: 7
20,280,756 UART: [art] Derive CDI
20,281,579 UART: [art] Store in in slot 0x4
20,324,028 UART: [art] Derive Key Pair
20,325,075 UART: [art] Store priv key in slot 0x5
22,752,121 UART: [art] Derive Key Pair - Done
22,765,179 UART: [art] Signing Cert with AUTHO
22,766,490 UART: RITY.KEYID = 7
24,471,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,267 UART: [art] PUB.X = 5F26AE7DE46649E43EB80FEE6A9C1B7236058E1651EE5FB6A839E51684A93524246FA1A83813BF8DDB77E680EAEC8978
24,480,596 UART: [art] PUB.Y = 8FDC4C8AEC4E1616593EE0B6CDEC073A4B6F26F9A6869FD212BE21FB4CF6216602CF0FCAE1CF6D6DB2304991C03FC014
24,487,881 UART: [art] SIG.R = 9B1B927C570C893C329342832C6C99D03A3AE5BBD50815B202977BA7BDD69806F23FA3A783E6B7BB4EF64C1136FEA538
24,495,279 UART: [art] SIG.S = 839488B254C54A010AAF91F948E123D2ED1ED8632FB222DC0BFF1C249EFEF2A04882EAB529D44AE65E5F7324D74C36F1
25,474,617 UART: Caliptra RT
25,475,329 UART: [state] CFI Enabled
25,590,992 UART: [rt] RT listening for mailbox commands...
25,592,906 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,622,887 UART: [rt]cmd =0x44504543, len=40
25,649,231 >>> mbox cmd response data (40 bytes)
25,650,513 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,680,773 UART: [rt]cmd =0x44504543, len=40
25,703,638 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,519 writing to cptra_bootfsm_go
192,738 UART:
193,118 UART: Running Caliptra ROM ...
194,312 UART:
194,463 UART: [state] CFI Enabled
263,936 UART: [state] LifecycleState = Unprovisioned
266,356 UART: [state] DebugLocked = No
268,812 UART: [state] WD Timer not started. Device not locked for debugging
273,291 UART: [kat] SHA2-256
463,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,923 UART: [kat] ++
474,572 UART: [kat] sha1
486,801 UART: [kat] SHA2-256
489,811 UART: [kat] SHA2-384
494,450 UART: [kat] SHA2-512-ACC
497,030 UART: [kat] ECC-384
2,945,066 UART: [kat] HMAC-384Kdf
2,969,476 UART: [kat] LMS
3,501,225 UART: [kat] --
3,505,667 UART: [cold-reset] ++
3,506,892 UART: [fht] FHT @ 0x50003400
3,517,760 UART: [idev] ++
3,518,519 UART: [idev] CDI.KEYID = 6
3,519,452 UART: [idev] SUBJECT.KEYID = 7
3,520,626 UART: [idev] UDS.KEYID = 0
3,521,568 ready_for_fw is high
3,521,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,105 UART: [idev] Erasing UDS.KEYID = 0
6,026,584 UART: [idev] Sha1 KeyId Algorithm
6,049,017 UART: [idev] --
6,053,553 UART: [ldev] ++
6,054,239 UART: [ldev] CDI.KEYID = 6
6,055,152 UART: [ldev] SUBJECT.KEYID = 5
6,056,310 UART: [ldev] AUTHORITY.KEYID = 7
6,057,512 UART: [ldev] FE.KEYID = 1
6,098,522 UART: [ldev] Erasing FE.KEYID = 1
8,604,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,100 UART: [ldev] --
10,411,425 UART: [fwproc] Wait for Commands...
10,413,966 UART: [fwproc] Recv command 0x46574c44
10,416,275 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,276 >>> mbox cmd response: success
14,598,180 UART: [afmc] ++
14,598,888 UART: [afmc] CDI.KEYID = 6
14,600,084 UART: [afmc] SUBJECT.KEYID = 7
14,601,584 UART: [afmc] AUTHORITY.KEYID = 5
17,146,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,085 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,061 UART: [afmc] --
18,945,760 UART: [cold-reset] --
18,950,008 UART: [state] Locking Datavault
18,954,772 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,940 UART: [state] Locking ICCM
18,958,508 UART: [exit] Launching FMC @ 0x40000130
18,967,149 UART:
18,967,380 UART: Running Caliptra FMC ...
18,968,477 UART:
18,968,636 UART: [state] CFI Enabled
19,027,584 UART: [fht] FMC Alias Private Key: 7
20,791,384 UART: [art] Extend RT PCRs Done
20,792,602 UART: [art] Lock RT PCRs Done
20,794,390 UART: [art] Populate DV Done
20,800,037 UART: [fht] FMC Alias Private Key: 7
20,801,747 UART: [art] Derive CDI
20,802,560 UART: [art] Store in in slot 0x4
20,860,154 UART: [art] Derive Key Pair
20,861,152 UART: [art] Store priv key in slot 0x5
23,324,214 UART: [art] Derive Key Pair - Done
23,337,060 UART: [art] Signing Cert with AUTHO
23,338,371 UART: RITY.KEYID = 7
25,050,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,811 UART: [art] PUB.X = B50FEF2232CF41E5132CDB0DE61C3A8EC360CE10FF37D062A742D395692D02019E8BE9CC3CD6477F20B8723F17E9DEE5
25,059,101 UART: [art] PUB.Y = F37AFBE6C1D5C2892B10C2385AA8D7C1D7B9F57C3C6EDFFBE6113D2217D0B40606121253699350FC217472C915F247E2
25,066,306 UART: [art] SIG.R = A3DACE22FDA39638CD4D5D041C958D425B191A28F3B78A6EB8E00BC6E54C4F5CA61303A3631413E1ECC05E08200E8BE4
25,073,738 UART: [art] SIG.S = 7D50FCBC791FFF2CBB45937958B1D587DC1D2CBE4957224FDF5AB2AD4D93B2A27988A71E843C7EE21002775AD2D59DAD
26,052,151 UART: Caliptra RT
26,052,849 UART: [state] CFI Enabled
26,219,152 UART: [rt] RT listening for mailbox commands...
26,221,089 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,251,839 UART: [rt]cmd =0x44504543, len=40
26,293,218 >>> mbox cmd response data (40 bytes)
26,294,372 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,324,485 UART: [rt]cmd =0x44504543, len=40
26,346,930 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,441,775 ready_for_fw is high
3,442,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,618 >>> mbox cmd response: success
19,046,663 UART:
19,047,065 UART: Running Caliptra FMC ...
19,048,270 UART:
19,048,437 UART: [state] CFI Enabled
19,112,447 UART: [fht] FMC Alias Private Key: 7
20,875,842 UART: [art] Extend RT PCRs Done
20,877,065 UART: [art] Lock RT PCRs Done
20,878,748 UART: [art] Populate DV Done
20,884,105 UART: [fht] FMC Alias Private Key: 7
20,885,587 UART: [art] Derive CDI
20,886,350 UART: [art] Store in in slot 0x4
20,943,713 UART: [art] Derive Key Pair
20,944,713 UART: [art] Store priv key in slot 0x5
23,407,629 UART: [art] Derive Key Pair - Done
23,421,064 UART: [art] Signing Cert with AUTHO
23,422,385 UART: RITY.KEYID = 7
25,132,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,342 UART: [art] PUB.X = CEAC273D35D0CE99DF43D756E139C1FD3A90516E8F81472AF04ED3C5B8D1D285BD1970E79348ABCDFEA143CC58EAA0AE
25,141,642 UART: [art] PUB.Y = C34FF828C493FA9A98A2E5E71B3B63EA7E299FC31EF70A00CE6865B6810E235691C5610078C6EF6D6D7FB0A3EA9FC92B
25,148,879 UART: [art] SIG.R = BCE73A3463F3A08D3AF1354E7D2B1B9A81C7BB12A704691F0B003149337921FE0C16F2FDF17EAB31E795CB76FD6833A2
25,156,260 UART: [art] SIG.S = EE347753F2C0C337CE2C0803B8AEB984FB06869C25227BDD5A82312554A25879D7139863F3EF7DA89A2C688812DCE931
26,135,137 UART: Caliptra RT
26,135,823 UART: [state] CFI Enabled
26,299,587 UART: [rt] RT listening for mailbox commands...
26,301,509 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,332,221 UART: [rt]cmd =0x44504543, len=40
26,374,459 >>> mbox cmd response data (40 bytes)
26,375,571 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,405,849 UART: [rt]cmd =0x44504543, len=40
26,428,136 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
45 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,759 writing to cptra_bootfsm_go
193,878 UART:
194,255 UART: Running Caliptra ROM ...
195,366 UART:
604,938 UART: [state] CFI Enabled
618,771 UART: [state] LifecycleState = Unprovisioned
621,155 UART: [state] DebugLocked = No
623,602 UART: [state] WD Timer not started. Device not locked for debugging
628,130 UART: [kat] SHA2-256
818,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,812 UART: [kat] ++
829,334 UART: [kat] sha1
839,725 UART: [kat] SHA2-256
842,739 UART: [kat] SHA2-384
848,588 UART: [kat] SHA2-512-ACC
851,170 UART: [kat] ECC-384
3,291,037 UART: [kat] HMAC-384Kdf
3,305,187 UART: [kat] LMS
3,837,035 UART: [kat] --
3,842,821 UART: [cold-reset] ++
3,845,351 UART: [fht] FHT @ 0x50003400
3,856,483 UART: [idev] ++
3,857,124 UART: [idev] CDI.KEYID = 6
3,858,160 UART: [idev] SUBJECT.KEYID = 7
3,859,338 UART: [idev] UDS.KEYID = 0
3,860,268 ready_for_fw is high
3,860,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,707 UART: [idev] Erasing UDS.KEYID = 0
6,336,240 UART: [idev] Sha1 KeyId Algorithm
6,358,720 UART: [idev] --
6,364,608 UART: [ldev] ++
6,365,288 UART: [ldev] CDI.KEYID = 6
6,366,173 UART: [ldev] SUBJECT.KEYID = 5
6,367,382 UART: [ldev] AUTHORITY.KEYID = 7
6,368,617 UART: [ldev] FE.KEYID = 1
6,379,288 UART: [ldev] Erasing FE.KEYID = 1
8,854,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,938 UART: [ldev] --
10,647,548 UART: [fwproc] Wait for Commands...
10,649,647 UART: [fwproc] Recv command 0x46574c44
10,651,925 UART: [fwproc] Recv'd Img size: 114084 bytes
14,088,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,625 >>> mbox cmd response: success
14,827,717 UART: [afmc] ++
14,828,431 UART: [afmc] CDI.KEYID = 6
14,829,625 UART: [afmc] SUBJECT.KEYID = 7
14,831,122 UART: [afmc] AUTHORITY.KEYID = 5
17,333,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,071,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,086,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,101,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,341 UART: [afmc] --
19,127,779 UART: [cold-reset] --
19,131,829 UART: [state] Locking Datavault
19,136,449 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,601 UART: [state] Locking ICCM
19,141,168 UART: [exit] Launching FMC @ 0x40000130
19,149,849 UART:
19,150,095 UART: Running Caliptra FMC ...
19,151,124 UART:
19,151,272 UART: [state] CFI Enabled
19,159,428 UART: [fht] FMC Alias Private Key: 7
20,916,217 UART: [art] Extend RT PCRs Done
20,917,433 UART: [art] Lock RT PCRs Done
20,918,765 UART: [art] Populate DV Done
20,924,077 UART: [fht] FMC Alias Private Key: 7
20,925,777 UART: [art] Derive CDI
20,926,515 UART: [art] Store in in slot 0x4
20,968,892 UART: [art] Derive Key Pair
20,969,960 UART: [art] Store priv key in slot 0x5
23,396,616 UART: [art] Derive Key Pair - Done
23,409,658 UART: [art] Signing Cert with AUTHO
23,410,965 UART: RITY.KEYID = 7
25,116,415 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,912 UART: [art] PUB.X = 597FF2D72252840950C9B669D995D8C5C668331D1D0277C8180C09CC04AFDD88CEE769444C939AA8074FF8C0FCF66508
25,125,162 UART: [art] PUB.Y = 16F250B811F9D65EFD74C23AA881455A4479FC37E14B80F45E961F55D61C089BAAF56E2E799DEFF042A2CC6204E4AE7E
25,132,429 UART: [art] SIG.R = F860C458203E7085F8596C9915389B5FF4F868880566EBFBAEFB6627B08626358DE9B8C28467EF0A43467DBF4306F2CC
25,139,797 UART: [art] SIG.S = 70CFF32ED79960C291C26536D1513FEDAE2522C17692644B11C588AE95BD274D9C56826E6447804378941B10D5332E33
26,119,047 UART: Caliptra RT
26,119,736 UART: [state] CFI Enabled
26,236,582 UART: [rt] RT listening for mailbox commands...
26,238,495 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,268,588 UART: [rt]cmd =0x44504543, len=40
26,294,482 >>> mbox cmd response data (40 bytes)
26,295,816 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,326,033 UART: [rt]cmd =0x44504543, len=40
26,348,375 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,605 writing to cptra_bootfsm_go
3,762,662 ready_for_fw is high
3,763,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,956,030 >>> mbox cmd response: success
19,210,051 UART:
19,210,453 UART: Running Caliptra FMC ...
19,211,648 UART:
19,211,820 UART: [state] CFI Enabled
19,219,769 UART: [fht] FMC Alias Private Key: 7
20,976,446 UART: [art] Extend RT PCRs Done
20,977,950 UART: [art] Lock RT PCRs Done
20,979,515 UART: [art] Populate DV Done
20,985,231 UART: [fht] FMC Alias Private Key: 7
20,986,887 UART: [art] Derive CDI
20,987,726 UART: [art] Store in in slot 0x4
21,030,272 UART: [art] Derive Key Pair
21,031,281 UART: [art] Store priv key in slot 0x5
23,458,322 UART: [art] Derive Key Pair - Done
23,471,285 UART: [art] Signing Cert with AUTHO
23,472,615 UART: RITY.KEYID = 7
25,178,322 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,847 UART: [art] PUB.X = 15F366F769948DC5B444C1B23E83633F28D3B53D986223A63A3F28FCC05766C631DBDFE050ABCD46C946ECC56556E168
25,187,082 UART: [art] PUB.Y = CEC10AA581247FA434D94E4DC58347F2D2319A9AC68377442B9A8617245637BF795186F3AC1C546F1BB43F5D2AEB5627
25,194,321 UART: [art] SIG.R = ECA4427705C37544029ACBCC1A118CD2E26A9EC818D6C96AC201B9D55F5572C91BBC16C0A58938302A58A908FB14EC5A
25,201,718 UART: [art] SIG.S = 34A033AD7F7E1C1346F52D8EC4A09CD6B1A10282A901319CAA75DF0117474833F8B28CCD1C58DA57704484EE88CD6B44
26,180,672 UART: Caliptra RT
26,181,386 UART: [state] CFI Enabled
26,298,920 UART: [rt] RT listening for mailbox commands...
26,300,842 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,330,921 UART: [rt]cmd =0x44504543, len=40
26,356,313 >>> mbox cmd response data (40 bytes)
26,357,771 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,387,820 UART: [rt]cmd =0x44504543, len=40
26,410,567 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
903,162 UART: [kat] HMAC-384Kdf
907,818 UART: [kat] LMS
1,476,014 UART: [kat] --
1,476,669 UART: [cold-reset] ++
1,477,091 UART: [fht] Storing FHT @ 0x50003400
1,479,764 UART: [idev] ++
1,479,932 UART: [idev] CDI.KEYID = 6
1,480,292 UART: [idev] SUBJECT.KEYID = 7
1,480,716 UART: [idev] UDS.KEYID = 0
1,481,061 ready_for_fw is high
1,481,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,762 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,546,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,300 UART: [ldev] --
1,585,717 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 114084 bytes
2,882,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,507 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,242 >>> mbox cmd response: success
3,075,280 UART: [afmc] ++
3,075,448 UART: [afmc] CDI.KEYID = 6
3,075,810 UART: [afmc] SUBJECT.KEYID = 7
3,076,235 UART: [afmc] AUTHORITY.KEYID = 5
3,111,210 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,658 UART: [afmc] --
3,154,540 UART: [cold-reset] --
3,155,594 UART: [state] Locking Datavault
3,156,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,271 UART: [state] Locking ICCM
3,157,823 UART: [exit] Launching FMC @ 0x40000130
3,163,152 UART:
3,163,168 UART: Running Caliptra FMC ...
3,163,576 UART:
3,163,630 UART: [state] CFI Enabled
3,173,525 UART: [fht] FMC Alias Private Key: 7
3,281,290 UART: [art] Extend RT PCRs Done
3,281,718 UART: [art] Lock RT PCRs Done
3,283,162 UART: [art] Populate DV Done
3,291,405 UART: [fht] FMC Alias Private Key: 7
3,292,445 UART: [art] Derive CDI
3,292,725 UART: [art] Store in in slot 0x4
3,378,376 UART: [art] Derive Key Pair
3,378,736 UART: [art] Store priv key in slot 0x5
3,392,386 UART: [art] Derive Key Pair - Done
3,407,204 UART: [art] Signing Cert with AUTHO
3,407,684 UART: RITY.KEYID = 7
3,422,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,541 UART: [art] PUB.X = 45370110A603771AFD5804E7F57342258C05069E228D71A5E649F6F15FF48A8CF8221ECE2D033962ADDC455B7D8A5830
3,430,289 UART: [art] PUB.Y = 8963852ED4E62D73C56F0BD651D3024210E62E4827F5A0865403C07B2CD70AB6201AA656BC30A16D7FC74C33179564C3
3,437,223 UART: [art] SIG.R = 2479B6765F19B5E38C9FCD602DDBDE152A5077C7C0077D0F8C3E6476557CCF2353477D231D9906001FFA474CD0B7238E
3,443,964 UART: [art] SIG.S = BD603EF79ECC18A692F9C0B8F28FD47BADFEDC287C55C713D579155581C970C056319B613505243C71803CF3B2403349
3,468,068 UART: Caliptra RT
3,468,321 UART: [state] CFI Enabled
3,576,456 UART: [rt] RT listening for mailbox commands...
3,577,126 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,432 UART: [rt]cmd =0x44504543, len=40
3,633,239 >>> mbox cmd response data (40 bytes)
3,633,240 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,763 UART: [rt]cmd =0x44504543, len=40
3,685,982 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,979 ready_for_fw is high
1,362,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,582 >>> mbox cmd response: success
2,986,064 UART:
2,986,080 UART: Running Caliptra FMC ...
2,986,488 UART:
2,986,542 UART: [state] CFI Enabled
2,997,299 UART: [fht] FMC Alias Private Key: 7
3,105,302 UART: [art] Extend RT PCRs Done
3,105,730 UART: [art] Lock RT PCRs Done
3,107,084 UART: [art] Populate DV Done
3,115,011 UART: [fht] FMC Alias Private Key: 7
3,116,005 UART: [art] Derive CDI
3,116,285 UART: [art] Store in in slot 0x4
3,201,702 UART: [art] Derive Key Pair
3,202,062 UART: [art] Store priv key in slot 0x5
3,215,062 UART: [art] Derive Key Pair - Done
3,229,562 UART: [art] Signing Cert with AUTHO
3,230,042 UART: RITY.KEYID = 7
3,245,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,099 UART: [art] PUB.X = DF86A28E0AB3B04413F50340CDC270EE2BC55D323867ACFB0A04CAD2264EC087F1A5281A1644F8E463154000DD1AF5C7
3,252,845 UART: [art] PUB.Y = 79D690385A4350BA883B01095F6B62176CFD147E6E154182AC6851ADF49B46DE59F9B8EDDA9E2980E99B8B07D19D4E32
3,259,790 UART: [art] SIG.R = FBE9F99C92D9203CD39D97C92F1243A6181B1936F21C28AE42479EF060FFE8BEA870E1C30C8BEEA1C2922BBC48C3D4D1
3,266,573 UART: [art] SIG.S = 446476A07353594255E403C3C79C74347F31BC2744165D2392E2265F274BCD65FEF48BA560723E22D9859147B7E2CA2C
3,289,859 UART: Caliptra RT
3,290,112 UART: [state] CFI Enabled
3,399,197 UART: [rt] RT listening for mailbox commands...
3,399,867 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,181 UART: [rt]cmd =0x44504543, len=40
3,456,252 >>> mbox cmd response data (40 bytes)
3,456,253 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,900 UART: [rt]cmd =0x44504543, len=40
3,508,561 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,058 UART: [kat] SHA2-256
881,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,104 UART: [kat] ++
886,256 UART: [kat] sha1
890,270 UART: [kat] SHA2-256
892,208 UART: [kat] SHA2-384
894,907 UART: [kat] SHA2-512-ACC
896,808 UART: [kat] ECC-384
902,239 UART: [kat] HMAC-384Kdf
906,821 UART: [kat] LMS
1,475,017 UART: [kat] --
1,475,762 UART: [cold-reset] ++
1,476,120 UART: [fht] Storing FHT @ 0x50003400
1,478,967 UART: [idev] ++
1,479,135 UART: [idev] CDI.KEYID = 6
1,479,495 UART: [idev] SUBJECT.KEYID = 7
1,479,919 UART: [idev] UDS.KEYID = 0
1,480,264 ready_for_fw is high
1,480,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,123 UART: [idev] Erasing UDS.KEYID = 0
1,504,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,079 UART: [idev] --
1,514,192 UART: [ldev] ++
1,514,360 UART: [ldev] CDI.KEYID = 6
1,514,723 UART: [ldev] SUBJECT.KEYID = 5
1,515,149 UART: [ldev] AUTHORITY.KEYID = 7
1,515,612 UART: [ldev] FE.KEYID = 1
1,521,066 UART: [ldev] Erasing FE.KEYID = 1
1,546,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,709 UART: [ldev] --
1,586,100 UART: [fwproc] Waiting for Commands...
1,586,927 UART: [fwproc] Received command 0x46574c44
1,587,718 UART: [fwproc] Received Image of size 114084 bytes
2,882,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,995 >>> mbox cmd response: success
3,075,117 UART: [afmc] ++
3,075,285 UART: [afmc] CDI.KEYID = 6
3,075,647 UART: [afmc] SUBJECT.KEYID = 7
3,076,072 UART: [afmc] AUTHORITY.KEYID = 5
3,111,417 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,587 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,367 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,980 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,670 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,485 UART: [afmc] --
3,154,599 UART: [cold-reset] --
3,155,449 UART: [state] Locking Datavault
3,156,562 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,166 UART: [state] Locking ICCM
3,157,792 UART: [exit] Launching FMC @ 0x40000130
3,163,121 UART:
3,163,137 UART: Running Caliptra FMC ...
3,163,545 UART:
3,163,688 UART: [state] CFI Enabled
3,174,421 UART: [fht] FMC Alias Private Key: 7
3,282,792 UART: [art] Extend RT PCRs Done
3,283,220 UART: [art] Lock RT PCRs Done
3,284,682 UART: [art] Populate DV Done
3,293,157 UART: [fht] FMC Alias Private Key: 7
3,294,131 UART: [art] Derive CDI
3,294,411 UART: [art] Store in in slot 0x4
3,379,978 UART: [art] Derive Key Pair
3,380,338 UART: [art] Store priv key in slot 0x5
3,394,090 UART: [art] Derive Key Pair - Done
3,408,700 UART: [art] Signing Cert with AUTHO
3,409,180 UART: RITY.KEYID = 7
3,424,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,377 UART: [art] PUB.X = 4DD14E16B87540C0EDC4240F8B658566EDF111E9FC57D91F9971571680870344DCAA5A30E6AE07609C956EF3CCCF97B9
3,432,144 UART: [art] PUB.Y = E822B50871532D46D34005010E7FAEAA805687A067C42350AA7443672602CCBF9A801F52A3CBE978DC893D0F81DD2CEF
3,439,080 UART: [art] SIG.R = 7D6414EEDD3A13A126BFDAF27BD87DDE2E71A2883CF1DC306C036A3403169F6D6B054E73ADDCD620A269825F38E39555
3,445,853 UART: [art] SIG.S = 06467027654724CFDFBA1222ACCD37C7C6ED92EA0EDD2292F7C03FB1985E65A26CB1040B5405F4965D7966BFA69F44D4
3,469,701 UART: Caliptra RT
3,470,046 UART: [state] CFI Enabled
3,577,240 UART: [rt] RT listening for mailbox commands...
3,577,910 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,972 UART: [rt]cmd =0x44504543, len=40
3,634,421 >>> mbox cmd response data (40 bytes)
3,634,422 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,713 UART: [rt]cmd =0x44504543, len=40
3,686,238 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,644 ready_for_fw is high
1,363,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,749 >>> mbox cmd response: success
2,987,415 UART:
2,987,431 UART: Running Caliptra FMC ...
2,987,839 UART:
2,987,982 UART: [state] CFI Enabled
2,998,639 UART: [fht] FMC Alias Private Key: 7
3,106,596 UART: [art] Extend RT PCRs Done
3,107,024 UART: [art] Lock RT PCRs Done
3,108,376 UART: [art] Populate DV Done
3,116,527 UART: [fht] FMC Alias Private Key: 7
3,117,485 UART: [art] Derive CDI
3,117,765 UART: [art] Store in in slot 0x4
3,203,338 UART: [art] Derive Key Pair
3,203,698 UART: [art] Store priv key in slot 0x5
3,216,342 UART: [art] Derive Key Pair - Done
3,231,122 UART: [art] Signing Cert with AUTHO
3,231,602 UART: RITY.KEYID = 7
3,247,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,791 UART: [art] PUB.X = 6DB39B62DD366344265F0209AC9DD584D9968C2852FC2D24CE6E70AA695AEA9D4855C004D56E83B7457F8A63AF126822
3,254,554 UART: [art] PUB.Y = FD075E967D0C25F26C8AC50FF065D2BAC801C2095E12D1206110318BEF31E77187555AE8A971A862B5D478BEE720FB7D
3,261,495 UART: [art] SIG.R = 64C358CF36E2280D95D2EC518595EA1A12C876801552BCE06A1C9097CEEC210280A6F79F68ABF9AE1E607FF20C59D438
3,268,262 UART: [art] SIG.S = 484B6CBF66DC9E19CEC9077F818C115E8D874A37986DDB9F1B6B405837F79D3CFC83DEFE521E7A273246D397F89A35D3
3,291,852 UART: Caliptra RT
3,292,197 UART: [state] CFI Enabled
3,399,263 UART: [rt] RT listening for mailbox commands...
3,399,933 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,359 UART: [rt]cmd =0x44504543, len=40
3,456,352 >>> mbox cmd response data (40 bytes)
3,456,353 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,878 UART: [rt]cmd =0x44504543, len=40
3,508,983 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,340 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,500 UART: [idev] Erasing UDS.KEYID = 0
1,201,907 UART: [idev] Sha1 KeyId Algorithm
1,210,293 UART: [idev] --
1,211,133 UART: [ldev] ++
1,211,301 UART: [ldev] CDI.KEYID = 6
1,211,664 UART: [ldev] SUBJECT.KEYID = 5
1,212,090 UART: [ldev] AUTHORITY.KEYID = 7
1,212,553 UART: [ldev] FE.KEYID = 1
1,217,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,418 UART: [fwproc] Recv command 0x46574c44
1,284,146 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,539 >>> mbox cmd response: success
2,772,715 UART: [afmc] ++
2,772,883 UART: [afmc] CDI.KEYID = 6
2,773,245 UART: [afmc] SUBJECT.KEYID = 7
2,773,670 UART: [afmc] AUTHORITY.KEYID = 5
2,809,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,819 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,538 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,578 UART: [afmc] --
2,852,682 UART: [cold-reset] --
2,853,342 UART: [state] Locking Datavault
2,854,713 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,317 UART: [state] Locking ICCM
2,855,779 UART: [exit] Launching FMC @ 0x40000130
2,861,108 UART:
2,861,124 UART: Running Caliptra FMC ...
2,861,532 UART:
2,861,586 UART: [state] CFI Enabled
2,872,049 UART: [fht] FMC Alias Private Key: 7
2,980,080 UART: [art] Extend RT PCRs Done
2,980,508 UART: [art] Lock RT PCRs Done
2,982,176 UART: [art] Populate DV Done
2,990,223 UART: [fht] FMC Alias Private Key: 7
2,991,217 UART: [art] Derive CDI
2,991,497 UART: [art] Store in in slot 0x4
3,077,150 UART: [art] Derive Key Pair
3,077,510 UART: [art] Store priv key in slot 0x5
3,090,010 UART: [art] Derive Key Pair - Done
3,104,661 UART: [art] Signing Cert with AUTHO
3,105,141 UART: RITY.KEYID = 7
3,120,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,252 UART: [art] PUB.X = 438A65E4A458D8611A748764B06AB2CE4B88366F14C169FF704006BD7049C39C93335A8DA3A35225F011B789C38E31A1
3,128,013 UART: [art] PUB.Y = 9A2F515524D83841D3AA7584E92C1364AEB9B9859452C9EC914BC1B922B7ECCAE7619F2CF309F7E2EF2C2C31A775E33F
3,134,970 UART: [art] SIG.R = F3E66A2A2DCBF37D036056FD1BA241AB54EF63463C8DFD21ECFC19A7381DF3D525BF05B2FA996756B4B83A1661327E5E
3,141,750 UART: [art] SIG.S = DBD15E1E505F735AE158A57655D85907CA62CE20E3B4B97906137CDF61C7570B4D15973102B2CEC5DB68001E42E8DE26
3,165,069 UART: Caliptra RT
3,165,322 UART: [state] CFI Enabled
3,272,774 UART: [rt] RT listening for mailbox commands...
3,273,444 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,926 UART: [rt]cmd =0x44504543, len=40
3,330,589 >>> mbox cmd response data (40 bytes)
3,330,590 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,377 UART: [rt]cmd =0x44504543, len=40
3,383,010 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 ready_for_fw is high
1,060,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,298 >>> mbox cmd response: success
2,684,774 UART:
2,684,790 UART: Running Caliptra FMC ...
2,685,198 UART:
2,685,252 UART: [state] CFI Enabled
2,695,701 UART: [fht] FMC Alias Private Key: 7
2,802,978 UART: [art] Extend RT PCRs Done
2,803,406 UART: [art] Lock RT PCRs Done
2,804,830 UART: [art] Populate DV Done
2,813,285 UART: [fht] FMC Alias Private Key: 7
2,814,289 UART: [art] Derive CDI
2,814,569 UART: [art] Store in in slot 0x4
2,900,184 UART: [art] Derive Key Pair
2,900,544 UART: [art] Store priv key in slot 0x5
2,913,142 UART: [art] Derive Key Pair - Done
2,927,672 UART: [art] Signing Cert with AUTHO
2,928,152 UART: RITY.KEYID = 7
2,943,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,179 UART: [art] PUB.X = DBC650989FB73FB8636BC087DB78B412CF790C9549CB3D62210237FFF5AB5E69DAC49E18683123FA893C4433CC34399C
2,950,949 UART: [art] PUB.Y = 91B828C423142698342EF8B650E70E0E081C68D85B429CB35652D137471F3DFF1F8BB17EA9C523C30624AB3B7A5C4705
2,957,882 UART: [art] SIG.R = 022E6074028E6336872C001472E95D84C85212844C469E0151145F07BB4E9F74D1358EFB8E533996A6E89009B0749D64
2,964,597 UART: [art] SIG.S = 1791CE067F01A7587E3459331E26D19E442D52F4C2EFEE5C4185A200F01683AA6B0A3A7568C5DF278F238FF721D96812
2,988,635 UART: Caliptra RT
2,988,888 UART: [state] CFI Enabled
3,096,215 UART: [rt] RT listening for mailbox commands...
3,096,885 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,209 UART: [rt]cmd =0x44504543, len=40
3,153,022 >>> mbox cmd response data (40 bytes)
3,153,023 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,600 UART: [rt]cmd =0x44504543, len=40
3,205,769 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
918,087 UART: [kat] HMAC-384Kdf
922,783 UART: [kat] LMS
1,171,111 UART: [kat] --
1,171,950 UART: [cold-reset] ++
1,172,410 UART: [fht] FHT @ 0x50003400
1,175,053 UART: [idev] ++
1,175,221 UART: [idev] CDI.KEYID = 6
1,175,581 UART: [idev] SUBJECT.KEYID = 7
1,176,005 UART: [idev] UDS.KEYID = 0
1,176,350 ready_for_fw is high
1,176,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,651 UART: [idev] Erasing UDS.KEYID = 0
1,200,602 UART: [idev] Sha1 KeyId Algorithm
1,209,098 UART: [idev] --
1,210,268 UART: [ldev] ++
1,210,436 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,225 UART: [ldev] AUTHORITY.KEYID = 7
1,211,688 UART: [ldev] FE.KEYID = 1
1,217,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,106 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,283,081 UART: [fwproc] Recv command 0x46574c44
1,283,809 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,494 >>> mbox cmd response: success
2,771,720 UART: [afmc] ++
2,771,888 UART: [afmc] CDI.KEYID = 6
2,772,250 UART: [afmc] SUBJECT.KEYID = 7
2,772,675 UART: [afmc] AUTHORITY.KEYID = 5
2,808,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,735 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,553 UART: [afmc] --
2,851,461 UART: [cold-reset] --
2,852,223 UART: [state] Locking Datavault
2,853,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,154 UART: [state] Locking ICCM
2,854,782 UART: [exit] Launching FMC @ 0x40000130
2,860,111 UART:
2,860,127 UART: Running Caliptra FMC ...
2,860,535 UART:
2,860,678 UART: [state] CFI Enabled
2,871,295 UART: [fht] FMC Alias Private Key: 7
2,979,342 UART: [art] Extend RT PCRs Done
2,979,770 UART: [art] Lock RT PCRs Done
2,981,656 UART: [art] Populate DV Done
2,989,955 UART: [fht] FMC Alias Private Key: 7
2,990,989 UART: [art] Derive CDI
2,991,269 UART: [art] Store in in slot 0x4
3,076,862 UART: [art] Derive Key Pair
3,077,222 UART: [art] Store priv key in slot 0x5
3,090,232 UART: [art] Derive Key Pair - Done
3,105,079 UART: [art] Signing Cert with AUTHO
3,105,559 UART: RITY.KEYID = 7
3,121,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,002 UART: [art] PUB.X = F2F380CC01A9A2D7A50D6000844CAB083F70E9D3A4B903892931A80CD6DFEBCEC9D1175C3611B318995E83BA8EB7E0FA
3,128,749 UART: [art] PUB.Y = 9085D1A4C296F511E34603A7A8E5F6F1BC057E0BDA9B03C5670420C1D523A63967DC86535E585A406E518F4A769125FB
3,135,682 UART: [art] SIG.R = 859F6AD934E1D5323CB5DF551F9F1178AEB194DAF6322B8B4F73A64B985C61B9DCCA2C3F9F1E6CA0ED40EC964C3FC98C
3,142,474 UART: [art] SIG.S = CD0DEC6E07459631354C280DD986D22BD40ABDE817B2B740EAF4319A8552B7131C02C3BBC27D7CD9143B8588672F5503
3,166,411 UART: Caliptra RT
3,166,756 UART: [state] CFI Enabled
3,274,788 UART: [rt] RT listening for mailbox commands...
3,275,458 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,522 UART: [rt]cmd =0x44504543, len=40
3,331,365 >>> mbox cmd response data (40 bytes)
3,331,366 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,053 UART: [rt]cmd =0x44504543, len=40
3,383,850 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,711 >>> mbox cmd response: success
2,686,179 UART:
2,686,195 UART: Running Caliptra FMC ...
2,686,603 UART:
2,686,746 UART: [state] CFI Enabled
2,697,351 UART: [fht] FMC Alias Private Key: 7
2,804,850 UART: [art] Extend RT PCRs Done
2,805,278 UART: [art] Lock RT PCRs Done
2,806,786 UART: [art] Populate DV Done
2,815,075 UART: [fht] FMC Alias Private Key: 7
2,816,195 UART: [art] Derive CDI
2,816,475 UART: [art] Store in in slot 0x4
2,901,876 UART: [art] Derive Key Pair
2,902,236 UART: [art] Store priv key in slot 0x5
2,915,180 UART: [art] Derive Key Pair - Done
2,930,284 UART: [art] Signing Cert with AUTHO
2,930,764 UART: RITY.KEYID = 7
2,945,974 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,739 UART: [art] PUB.X = FA8408EE60CA341CF1C5BBD0C413B6D97C3D90A9319F3937536938D119567C4581A477EBA5A87B682770EFB99A8D5560
2,953,508 UART: [art] PUB.Y = 829E19B92AE8E764B7F24CB559655A829D4A9ABB6FD87D941D280BC0B751AC5B6835F8284CF06E3C8F4D8A9A4DE16A59
2,960,467 UART: [art] SIG.R = 5549AAF414249AB2C2620208452CD09E1CB8CEE5F76C7286C92DA525DC2E8843E6A73AD1190AE24EB1F3352BA03226CE
2,967,236 UART: [art] SIG.S = D2BCA5B2CFCB5F23F4F4AB9761BAA279C2FA90E973881311101E4ECFE3DA7975B5CFBCF6765F0C6662D12878DEB32598
2,989,912 UART: Caliptra RT
2,990,257 UART: [state] CFI Enabled
3,097,836 UART: [rt] RT listening for mailbox commands...
3,098,506 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,416 UART: [rt]cmd =0x44504543, len=40
3,155,047 >>> mbox cmd response data (40 bytes)
3,155,048 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,661 UART: [rt]cmd =0x44504543, len=40
3,207,758 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,743 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
891,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 ready_for_fw is high
1,174,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,737 UART: [idev] Erasing UDS.KEYID = 0
1,200,445 UART: [idev] Sha1 KeyId Algorithm
1,209,251 UART: [idev] --
1,210,346 UART: [ldev] ++
1,210,514 UART: [ldev] CDI.KEYID = 6
1,210,878 UART: [ldev] SUBJECT.KEYID = 5
1,211,305 UART: [ldev] AUTHORITY.KEYID = 7
1,211,768 UART: [ldev] FE.KEYID = 1
1,216,686 UART: [ldev] Erasing FE.KEYID = 1
1,242,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,346 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,347 UART: [fwproc] Recv command 0x46574c44
1,283,080 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,167 >>> mbox cmd response: success
2,770,294 UART: [afmc] ++
2,770,462 UART: [afmc] CDI.KEYID = 6
2,770,825 UART: [afmc] SUBJECT.KEYID = 7
2,771,251 UART: [afmc] AUTHORITY.KEYID = 5
2,806,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,932 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,659 UART: [afmc] --
2,849,595 UART: [cold-reset] --
2,850,571 UART: [state] Locking Datavault
2,851,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,468 UART: [state] Locking ICCM
2,852,894 UART: [exit] Launching FMC @ 0x40000130
2,858,223 UART:
2,858,239 UART: Running Caliptra FMC ...
2,858,647 UART:
2,858,701 UART: [state] CFI Enabled
2,869,272 UART: [fht] FMC Alias Private Key: 7
2,976,571 UART: [art] Extend RT PCRs Done
2,976,999 UART: [art] Lock RT PCRs Done
2,978,321 UART: [art] Populate DV Done
2,986,700 UART: [fht] FMC Alias Private Key: 7
2,987,758 UART: [art] Derive CDI
2,988,038 UART: [art] Store in in slot 0x4
3,073,405 UART: [art] Derive Key Pair
3,073,765 UART: [art] Store priv key in slot 0x5
3,086,483 UART: [art] Derive Key Pair - Done
3,101,496 UART: [art] Signing Cert with AUTHO
3,101,976 UART: RITY.KEYID = 7
3,117,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,827 UART: [art] PUB.X = 9DDA0EA0F1927D408E4CAA9689C60C5E34D01BAE55E28EB70B86DC9AC562711A180DC0CE6D0A50E3726A58578FB9571F
3,124,596 UART: [art] PUB.Y = 0B4BE9BC287F38E73A6DDF4B3B63A5BD5F0EC77CBE9F888C99C2B0127AA9D0CBDAE9F925E1DEB64A82988908882FA5D1
3,131,561 UART: [art] SIG.R = CE9A6024B695BDA68C9F7BCD7A73E6FD87070617A7E019C87E0D1F41F8F7A85CF201A2A30CBCF4915879CD080C57656B
3,138,322 UART: [art] SIG.S = BFE22FBC904E76F1900F2AD440CE0C06DA50CBC4D9985958D786B339623625FEF4E5BD589CE2530B7329D8B5DD527253
3,161,875 UART: Caliptra RT
3,162,128 UART: [state] CFI Enabled
3,269,850 UART: [rt] RT listening for mailbox commands...
3,270,520 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,502 UART: [rt]cmd =0x44504543, len=40
3,326,953 >>> mbox cmd response data (40 bytes)
3,326,954 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,527 UART: [rt]cmd =0x44504543, len=40
3,379,304 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,260 ready_for_fw is high
1,056,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,167 >>> mbox cmd response: success
2,680,957 UART:
2,680,973 UART: Running Caliptra FMC ...
2,681,381 UART:
2,681,435 UART: [state] CFI Enabled
2,691,654 UART: [fht] FMC Alias Private Key: 7
2,799,825 UART: [art] Extend RT PCRs Done
2,800,253 UART: [art] Lock RT PCRs Done
2,801,675 UART: [art] Populate DV Done
2,810,166 UART: [fht] FMC Alias Private Key: 7
2,811,096 UART: [art] Derive CDI
2,811,376 UART: [art] Store in in slot 0x4
2,896,809 UART: [art] Derive Key Pair
2,897,169 UART: [art] Store priv key in slot 0x5
2,910,441 UART: [art] Derive Key Pair - Done
2,925,360 UART: [art] Signing Cert with AUTHO
2,925,840 UART: RITY.KEYID = 7
2,940,636 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,401 UART: [art] PUB.X = 21DD7A09CA648836883CB72B9F6F77F83EF2FFB1E575E14C17ECB57E1AF64414DD388153C652AB505AC75FFC30C9CD69
2,948,182 UART: [art] PUB.Y = 38FFBD3582F9C8F3A6DEBF46DA1830D7698F274DDDA81E53A9F870F91CB118075BE4F6BC4EDFA8D346DAEE10262B8E3F
2,955,153 UART: [art] SIG.R = F0D4A00E9BEB059CDF3A073ED9CC179C7140B33F48E6C54F4CCF9A2CCCAEEBA7E0E7F113C529B935F5A02D9E06475880
2,961,933 UART: [art] SIG.S = FDC4D6DD565C72A520259AF76B821C76F628FF2B63AF43BCA950C209CA790ED49155768F5047270A09B1F9620A6CA17A
2,985,565 UART: Caliptra RT
2,985,818 UART: [state] CFI Enabled
3,093,354 UART: [rt] RT listening for mailbox commands...
3,094,024 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,058 UART: [rt]cmd =0x44504543, len=40
3,150,069 >>> mbox cmd response data (40 bytes)
3,150,070 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,833 UART: [rt]cmd =0x44504543, len=40
3,202,558 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 ready_for_fw is high
1,174,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,830 UART: [idev] Sha1 KeyId Algorithm
1,208,700 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,105 UART: [ldev] --
1,282,561 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,584 >>> mbox cmd response: success
2,770,741 UART: [afmc] ++
2,770,909 UART: [afmc] CDI.KEYID = 6
2,771,272 UART: [afmc] SUBJECT.KEYID = 7
2,771,698 UART: [afmc] AUTHORITY.KEYID = 5
2,807,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,352 UART: [afmc] --
2,850,480 UART: [cold-reset] --
2,851,440 UART: [state] Locking Datavault
2,852,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,233 UART: [state] Locking ICCM
2,853,793 UART: [exit] Launching FMC @ 0x40000130
2,859,122 UART:
2,859,138 UART: Running Caliptra FMC ...
2,859,546 UART:
2,859,689 UART: [state] CFI Enabled
2,870,038 UART: [fht] FMC Alias Private Key: 7
2,978,023 UART: [art] Extend RT PCRs Done
2,978,451 UART: [art] Lock RT PCRs Done
2,979,919 UART: [art] Populate DV Done
2,988,108 UART: [fht] FMC Alias Private Key: 7
2,989,212 UART: [art] Derive CDI
2,989,492 UART: [art] Store in in slot 0x4
3,075,375 UART: [art] Derive Key Pair
3,075,735 UART: [art] Store priv key in slot 0x5
3,089,157 UART: [art] Derive Key Pair - Done
3,103,884 UART: [art] Signing Cert with AUTHO
3,104,364 UART: RITY.KEYID = 7
3,119,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,741 UART: [art] PUB.X = 87CAD0A9A68B666AD23B70F9479407CA6055366E86523B9E6DB601DA8BA6AE0ED2A54D6E1616934A9AB6AA3FDC7D15D1
3,127,516 UART: [art] PUB.Y = 523C7425E826C342623E4CECED6725D64CDD950C86AB7B3596BDAC913E07C41A40ABC30AB5F61EBDD996CAD121FFA79B
3,134,477 UART: [art] SIG.R = 50925FD70139ACFF27BCC7D0D90DD3686081EA11AC322A2419CE9824961BB41ED050957E77B7634D0377A1F125657751
3,141,234 UART: [art] SIG.S = CEE120599F85E2F6E4DE1CD9CB4962E87ECADFDF0CAC52B14329ED62D24C013AE72D36BA05FD73DB476CFC6AB66EE16A
3,165,170 UART: Caliptra RT
3,165,515 UART: [state] CFI Enabled
3,273,232 UART: [rt] RT listening for mailbox commands...
3,273,902 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,286 UART: [rt]cmd =0x44504543, len=40
3,330,189 >>> mbox cmd response data (40 bytes)
3,330,190 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,721 UART: [rt]cmd =0x44504543, len=40
3,382,808 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,691 ready_for_fw is high
1,056,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,426 >>> mbox cmd response: success
2,682,096 UART:
2,682,112 UART: Running Caliptra FMC ...
2,682,520 UART:
2,682,663 UART: [state] CFI Enabled
2,693,262 UART: [fht] FMC Alias Private Key: 7
2,800,983 UART: [art] Extend RT PCRs Done
2,801,411 UART: [art] Lock RT PCRs Done
2,803,105 UART: [art] Populate DV Done
2,811,146 UART: [fht] FMC Alias Private Key: 7
2,812,158 UART: [art] Derive CDI
2,812,438 UART: [art] Store in in slot 0x4
2,898,391 UART: [art] Derive Key Pair
2,898,751 UART: [art] Store priv key in slot 0x5
2,912,069 UART: [art] Derive Key Pair - Done
2,926,925 UART: [art] Signing Cert with AUTHO
2,927,405 UART: RITY.KEYID = 7
2,942,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,248 UART: [art] PUB.X = 630AEB1F40A4C965B2FA64FFFB8B8D1F8CD025D7EAF82829E4E2169BED78218C98142A17D28B9EBDD31C5209C08C27A5
2,950,028 UART: [art] PUB.Y = E967A81F1F59F10763D8138C5D251BD763420CCEEE8071B777FF44F343845AE5357F4A51A4C2A0F768229048B99AE37F
2,956,972 UART: [art] SIG.R = 96E4619B669E3DFAEF13D209560C6DF13326CE7493FD1689CE2749CEC63AB855F3805FA50FDCFDC067E5A3CE1D5DBB11
2,963,751 UART: [art] SIG.S = EB3681FC80CA8A8423C2F3ABB464E0CA1B78F041039A2265B9BE38960FBD53D7D95032EFBDF8F90F61215ACBB511F42C
2,987,377 UART: Caliptra RT
2,987,722 UART: [state] CFI Enabled
3,095,970 UART: [rt] RT listening for mailbox commands...
3,096,640 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,452 UART: [rt]cmd =0x44504543, len=40
3,152,951 >>> mbox cmd response data (40 bytes)
3,152,952 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,547 UART: [rt]cmd =0x44504543, len=40
3,205,558 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,013 UART:
192,378 UART: Running Caliptra ROM ...
193,576 UART:
193,734 UART: [state] CFI Enabled
260,855 UART: [state] LifecycleState = Unprovisioned
262,855 UART: [state] DebugLocked = No
265,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,679 UART: [kat] SHA2-256
440,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,910 UART: [kat] ++
451,407 UART: [kat] sha1
463,135 UART: [kat] SHA2-256
465,790 UART: [kat] SHA2-384
472,986 UART: [kat] SHA2-512-ACC
475,354 UART: [kat] ECC-384
2,769,130 UART: [kat] HMAC-384Kdf
2,800,985 UART: [kat] LMS
3,991,266 UART: [kat] --
3,995,725 UART: [cold-reset] ++
3,997,167 UART: [fht] Storing FHT @ 0x50003400
4,008,433 UART: [idev] ++
4,008,999 UART: [idev] CDI.KEYID = 6
4,010,035 UART: [idev] SUBJECT.KEYID = 7
4,011,222 UART: [idev] UDS.KEYID = 0
4,012,280 ready_for_fw is high
4,012,509 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,644 UART: [idev] Erasing UDS.KEYID = 0
7,346,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,793 UART: [idev] --
7,373,839 UART: [ldev] ++
7,374,407 UART: [ldev] CDI.KEYID = 6
7,375,344 UART: [ldev] SUBJECT.KEYID = 5
7,376,550 UART: [ldev] AUTHORITY.KEYID = 7
7,377,835 UART: [ldev] FE.KEYID = 1
7,413,764 UART: [ldev] Erasing FE.KEYID = 1
10,747,562 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,030 UART: [ldev] --
13,129,564 UART: [fwproc] Waiting for Commands...
13,131,386 UART: [fwproc] Received command 0x46574c44
13,133,566 UART: [fwproc] Received Image of size 113760 bytes
17,188,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,639 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,652,142 >>> mbox cmd response: success
17,652,734 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,655,840 UART: [afmc] ++
17,656,452 UART: [afmc] CDI.KEYID = 6
17,657,375 UART: [afmc] SUBJECT.KEYID = 7
17,658,587 UART: [afmc] AUTHORITY.KEYID = 5
21,023,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,346 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,784 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,575 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,366,033 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,387,596 UART: [afmc] --
23,391,293 UART: [cold-reset] --
23,394,772 UART: [state] Locking Datavault
23,399,530 UART: [state] Locking PCR0, PCR1 and PCR31
23,401,229 UART: [state] Locking ICCM
23,403,112 UART: [exit] Launching FMC @ 0x40000130
23,411,498 UART:
23,411,766 UART: Running Caliptra FMC ...
23,412,872 UART:
23,413,030 UART: [state] CFI Enabled
23,480,001 UART: [fht] FMC Alias Private Key: 7
25,818,045 UART: [art] Extend RT PCRs Done
25,819,273 UART: [art] Lock RT PCRs Done
25,820,842 UART: [art] Populate DV Done
25,826,037 UART: [fht] FMC Alias Private Key: 7
25,827,685 UART: [art] Derive CDI
25,828,502 UART: [art] Store in in slot 0x4
25,888,813 UART: [art] Derive Key Pair
25,889,850 UART: [art] Store priv key in slot 0x5
29,182,000 UART: [art] Derive Key Pair - Done
29,195,167 UART: [art] Signing Cert with AUTHO
29,196,472 UART: RITY.KEYID = 7
31,484,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,846 UART: [art] PUB.X = 5A28E6D03CA8190DE95A2CD07D99AFE0E30A2B491BF336E21DBA0744C54CB791650A7DAAA277745D67338FAAB82154AA
31,493,092 UART: [art] PUB.Y = 5481DD523B611BE9C4FC0180BF08B9DA88AEA29C0E7B9F7AF98D1EE8A6F511DA19740E12051CEB11E311F847A36E09E5
31,500,354 UART: [art] SIG.R = 28E043B6D89FE31C40AC4A94B79097C0CCE48D87299E9DDA06250117D93F2237F951AF6A8060719A0AFB9E2D5919E3F3
31,507,748 UART: [art] SIG.S = C3629ED131F6AE359341F79DD5DCB1082D06C7419FD7576103842ACCE530A01417587EF1A54F79756AAD8D66B2B563E2
32,812,844 UART: Caliptra RT
32,813,568 UART: [state] CFI Enabled
32,974,491 UART: [rt] RT listening for mailbox commands...
33,006,480 UART: [rt]cmd =0x44504543, len=136
38,630,633 >>> mbox cmd response data (136 bytes)
38,632,070 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,662,679 UART: [rt]cmd =0x44504543, len=92
44,425,963 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,797,826 ready_for_fw is high
3,798,455 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,859,079 >>> mbox cmd response: success
17,859,790 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,558,672 UART:
23,559,069 UART: Running Caliptra FMC ...
23,560,217 UART:
23,560,379 UART: [state] CFI Enabled
23,629,313 UART: [fht] FMC Alias Private Key: 7
25,967,335 UART: [art] Extend RT PCRs Done
25,968,609 UART: [art] Lock RT PCRs Done
25,970,458 UART: [art] Populate DV Done
25,975,771 UART: [fht] FMC Alias Private Key: 7
25,977,322 UART: [art] Derive CDI
25,978,136 UART: [art] Store in in slot 0x4
26,037,813 UART: [art] Derive Key Pair
26,038,879 UART: [art] Store priv key in slot 0x5
29,332,071 UART: [art] Derive Key Pair - Done
29,344,857 UART: [art] Signing Cert with AUTHO
29,346,155 UART: RITY.KEYID = 7
31,634,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,524 UART: [art] PUB.X = D9298DA3395EE32B9E73E6129C6E746B9DE3B4650A457DCF0720020BD48518DD164F63FD8E550113604559F02481043B
31,642,740 UART: [art] PUB.Y = 8D44A62092D7B40B365B3CC7AAC4A22179480CEA32D32AFD0A6F8000CE581061FA880149638D73BDD37477A683149B25
31,649,975 UART: [art] SIG.R = 3422886F7DBA63EC0432A63B2C81F97803320A9DF78FB2820ECD9C80101E930ECDF4D327E97AD030226CB4B8EF263A6E
31,657,380 UART: [art] SIG.S = DD7ECDAE4F8CB9C83A5F1F69BFCC4B4A1A1C54C9B716BFD476C7F8CD8FC520A0CA7BA739C93CDF15E2803A0FB42C7248
32,962,640 UART: Caliptra RT
32,963,357 UART: [state] CFI Enabled
33,125,260 UART: [rt] RT listening for mailbox commands...
33,157,644 UART: [rt]cmd =0x44504543, len=136
38,781,055 >>> mbox cmd response data (136 bytes)
38,782,373 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,812,858 UART: [rt]cmd =0x44504543, len=92
44,575,591 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,792 writing to cptra_bootfsm_go
192,972 UART:
193,338 UART: Running Caliptra ROM ...
194,418 UART:
604,346 UART: [state] CFI Enabled
619,889 UART: [state] LifecycleState = Unprovisioned
621,788 UART: [state] DebugLocked = No
624,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,607 UART: [kat] SHA2-256
799,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,855 UART: [kat] ++
810,382 UART: [kat] sha1
820,973 UART: [kat] SHA2-256
823,622 UART: [kat] SHA2-384
830,461 UART: [kat] SHA2-512-ACC
832,822 UART: [kat] ECC-384
3,116,786 UART: [kat] HMAC-384Kdf
3,128,584 UART: [kat] LMS
4,318,654 UART: [kat] --
4,324,870 UART: [cold-reset] ++
4,326,948 UART: [fht] Storing FHT @ 0x50003400
4,338,138 UART: [idev] ++
4,338,703 UART: [idev] CDI.KEYID = 6
4,339,733 UART: [idev] SUBJECT.KEYID = 7
4,340,904 UART: [idev] UDS.KEYID = 0
4,341,951 ready_for_fw is high
4,342,151 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,002 UART: [idev] Erasing UDS.KEYID = 0
7,629,195 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,789 UART: [idev] --
7,653,889 UART: [ldev] ++
7,654,451 UART: [ldev] CDI.KEYID = 6
7,655,517 UART: [ldev] SUBJECT.KEYID = 5
7,656,670 UART: [ldev] AUTHORITY.KEYID = 7
7,657,892 UART: [ldev] FE.KEYID = 1
7,669,694 UART: [ldev] Erasing FE.KEYID = 1
10,959,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,397 UART: [ldev] --
13,320,882 UART: [fwproc] Waiting for Commands...
13,323,190 UART: [fwproc] Received command 0x46574c44
13,325,422 UART: [fwproc] Received Image of size 113760 bytes
17,375,635 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,028 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,834,214 >>> mbox cmd response: success
17,834,834 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,838,268 UART: [afmc] ++
17,838,854 UART: [afmc] CDI.KEYID = 6
17,839,762 UART: [afmc] SUBJECT.KEYID = 7
17,841,029 UART: [afmc] AUTHORITY.KEYID = 5
21,153,359 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,847 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,664 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,102 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,190 UART: [afmc] --
23,518,655 UART: [cold-reset] --
23,522,409 UART: [state] Locking Datavault
23,527,168 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,931 UART: [state] Locking ICCM
23,530,428 UART: [exit] Launching FMC @ 0x40000130
23,538,819 UART:
23,539,052 UART: Running Caliptra FMC ...
23,540,155 UART:
23,540,314 UART: [state] CFI Enabled
23,548,193 UART: [fht] FMC Alias Private Key: 7
25,879,208 UART: [art] Extend RT PCRs Done
25,880,425 UART: [art] Lock RT PCRs Done
25,882,065 UART: [art] Populate DV Done
25,887,368 UART: [fht] FMC Alias Private Key: 7
25,889,006 UART: [art] Derive CDI
25,889,822 UART: [art] Store in in slot 0x4
25,932,415 UART: [art] Derive Key Pair
25,933,454 UART: [art] Store priv key in slot 0x5
29,175,713 UART: [art] Derive Key Pair - Done
29,188,638 UART: [art] Signing Cert with AUTHO
29,189,975 UART: RITY.KEYID = 7
31,469,629 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,133 UART: [art] PUB.X = E969D48E32872AF10C237B3350C34CB3B2BD843BFEB1AC98AEA9DE8E679838F7CE85B1FDABF38EBE5E87C59070244C78
31,478,414 UART: [art] PUB.Y = C86CB2EF94E953590D3A5C3B1939EBFE0684396885806E4BB3DA7AED1CBDCEE1099A7B963B0E33B03FCCA9F626214093
31,485,668 UART: [art] SIG.R = 9AE71A8DC6593C7A2E2449AD94064AD83AAC2004598F22B4C6451CCE675D56F5B6F57D84A30ABCB454806E5A2B4EAFEA
31,493,082 UART: [art] SIG.S = F91D9EEF96DFA31C9FA9E74F05856B9495110045030BB6AD68D235BCF1F546D6DD1C0DCD0DE9D6A7FD6ED5CF14D8EA72
32,798,730 UART: Caliptra RT
32,799,449 UART: [state] CFI Enabled
32,917,017 UART: [rt] RT listening for mailbox commands...
32,949,556 UART: [rt]cmd =0x44504543, len=136
38,508,613 >>> mbox cmd response data (136 bytes)
38,510,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,540,614 UART: [rt]cmd =0x44504543, len=92
44,213,937 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
4,131,143 ready_for_fw is high
4,131,538 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,056,476 >>> mbox cmd response: success
18,057,478 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,701,314 UART:
23,701,717 UART: Running Caliptra FMC ...
23,702,856 UART:
23,703,031 UART: [state] CFI Enabled
23,710,879 UART: [fht] FMC Alias Private Key: 7
26,041,390 UART: [art] Extend RT PCRs Done
26,042,622 UART: [art] Lock RT PCRs Done
26,044,363 UART: [art] Populate DV Done
26,049,844 UART: [fht] FMC Alias Private Key: 7
26,051,440 UART: [art] Derive CDI
26,052,252 UART: [art] Store in in slot 0x4
26,094,682 UART: [art] Derive Key Pair
26,095,684 UART: [art] Store priv key in slot 0x5
29,338,101 UART: [art] Derive Key Pair - Done
29,350,944 UART: [art] Signing Cert with AUTHO
29,352,247 UART: RITY.KEYID = 7
31,631,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,234 UART: [art] PUB.X = 04E101EE9B079EF1ADB0C8DEB08C8B3962CC139877CD473EF516691435303F3DDC933FB5C003C916738BBD31C24ACF24
31,640,537 UART: [art] PUB.Y = 5752FEA569311A1682236677268F35FDB137805080D1078BE6A1F65B56A0F4B32ED0E944B6775E092FA67CFEB46ECBF9
31,647,774 UART: [art] SIG.R = 879C4C1AB01FD5EFC877907B5DC1B2F507489FD1A7FC7DFCD18AD4739825220CFD8D14C4F519D09C0CAF946411BB21EC
31,655,167 UART: [art] SIG.S = 7B97C371443BCB31F4483980DEB4DDC8A7B76BCE4AE0F0D7FF7B4AD1D8078AEDF6B2329391BA5E3273601D0A45ADBCC1
32,960,376 UART: Caliptra RT
32,961,094 UART: [state] CFI Enabled
33,078,162 UART: [rt] RT listening for mailbox commands...
33,110,546 UART: [rt]cmd =0x44504543, len=136
38,669,843 >>> mbox cmd response data (136 bytes)
38,671,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,702,148 UART: [rt]cmd =0x44504543, len=92
44,375,936 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
192,773 UART:
193,152 UART: Running Caliptra ROM ...
194,345 UART:
194,497 UART: [state] CFI Enabled
262,400 UART: [state] LifecycleState = Unprovisioned
264,236 UART: [state] DebugLocked = No
265,620 UART: [state] WD Timer not started. Device not locked for debugging
269,160 UART: [kat] SHA2-256
448,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,828 UART: [kat] ++
460,354 UART: [kat] sha1
471,749 UART: [kat] SHA2-256
474,788 UART: [kat] SHA2-384
481,405 UART: [kat] SHA2-512-ACC
484,359 UART: [kat] ECC-384
2,950,935 UART: [kat] HMAC-384Kdf
2,972,388 UART: [kat] LMS
3,501,842 UART: [kat] --
3,506,835 UART: [cold-reset] ++
3,508,124 UART: [fht] FHT @ 0x50003400
3,518,402 UART: [idev] ++
3,519,001 UART: [idev] CDI.KEYID = 6
3,519,920 UART: [idev] SUBJECT.KEYID = 7
3,521,089 UART: [idev] UDS.KEYID = 0
3,522,017 ready_for_fw is high
3,522,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,633 UART: [idev] Erasing UDS.KEYID = 0
6,028,777 UART: [idev] Sha1 KeyId Algorithm
6,051,856 UART: [idev] --
6,056,175 UART: [ldev] ++
6,056,744 UART: [ldev] CDI.KEYID = 6
6,057,631 UART: [ldev] SUBJECT.KEYID = 5
6,058,839 UART: [ldev] AUTHORITY.KEYID = 7
6,060,088 UART: [ldev] FE.KEYID = 1
6,101,855 UART: [ldev] Erasing FE.KEYID = 1
8,604,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,719 UART: [ldev] --
10,393,742 UART: [fwproc] Wait for Commands...
10,396,790 UART: [fwproc] Recv command 0x46574c44
10,398,903 UART: [fwproc] Recv'd Img size: 114084 bytes
13,795,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,253,557 >>> mbox cmd response: success
14,254,160 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,257,859 UART: [afmc] ++
14,258,456 UART: [afmc] CDI.KEYID = 6
14,259,333 UART: [afmc] SUBJECT.KEYID = 7
14,260,492 UART: [afmc] AUTHORITY.KEYID = 5
16,789,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,514,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,516,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,531,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,547,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,563,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,585,511 UART: [afmc] --
18,588,831 UART: [cold-reset] --
18,593,168 UART: [state] Locking Datavault
18,598,790 UART: [state] Locking PCR0, PCR1 and PCR31
18,600,430 UART: [state] Locking ICCM
18,603,173 UART: [exit] Launching FMC @ 0x40000130
18,611,565 UART:
18,611,798 UART: Running Caliptra FMC ...
18,612,897 UART:
18,613,050 UART: [state] CFI Enabled
18,672,685 UART: [fht] FMC Alias Private Key: 7
20,436,137 UART: [art] Extend RT PCRs Done
20,437,368 UART: [art] Lock RT PCRs Done
20,439,338 UART: [art] Populate DV Done
20,444,751 UART: [fht] FMC Alias Private Key: 7
20,446,445 UART: [art] Derive CDI
20,447,279 UART: [art] Store in in slot 0x4
20,505,330 UART: [art] Derive Key Pair
20,506,370 UART: [art] Store priv key in slot 0x5
22,969,350 UART: [art] Derive Key Pair - Done
22,982,405 UART: [art] Signing Cert with AUTHO
22,983,705 UART: RITY.KEYID = 7
24,696,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,697,545 UART: [art] PUB.X = C3BA9674A2098A719D5E22B84885D9039209E24BD58B9B16AE65F70C7FDD6D833F4FF9279B51EA9F9D1978677615F7E9
24,704,777 UART: [art] PUB.Y = 71F9F0D608B4B76E266B435C18A53BE5A4F03E194394A8CCBFC63536D12CA354FCC0A1D8C4E882F22B87D316F1BED726
24,712,042 UART: [art] SIG.R = 97D3EBEA0BDA9E85569B73B2EC1AB22E856247FB3A435CCC5634142304EA29E5EC2D8E3363AA35C33FE638DADB432C6B
24,719,513 UART: [art] SIG.S = 33F4DF6732EF973E262742585ED7269A001A696076B124084B20AC7E4B4398ABB3B5D713932CF5A98E8AEB8AE48D8D75
25,698,079 UART: Caliptra RT
25,698,798 UART: [state] CFI Enabled
25,863,979 UART: [rt] RT listening for mailbox commands...
25,896,592 UART: [rt]cmd =0x44504543, len=136
30,114,464 >>> mbox cmd response data (136 bytes)
30,115,909 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,146,607 UART: [rt]cmd =0x44504543, len=92
34,502,298 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,557 writing to cptra_bootfsm_go
3,381,045 ready_for_fw is high
3,381,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,091,283 >>> mbox cmd response: success
14,092,163 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,386,481 UART:
18,386,863 UART: Running Caliptra FMC ...
18,387,998 UART:
18,388,155 UART: [state] CFI Enabled
18,451,775 UART: [fht] FMC Alias Private Key: 7
20,215,933 UART: [art] Extend RT PCRs Done
20,217,162 UART: [art] Lock RT PCRs Done
20,218,950 UART: [art] Populate DV Done
20,224,373 UART: [fht] FMC Alias Private Key: 7
20,226,017 UART: [art] Derive CDI
20,226,835 UART: [art] Store in in slot 0x4
20,284,006 UART: [art] Derive Key Pair
20,285,005 UART: [art] Store priv key in slot 0x5
22,747,878 UART: [art] Derive Key Pair - Done
22,761,211 UART: [art] Signing Cert with AUTHO
22,762,521 UART: RITY.KEYID = 7
24,473,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,821 UART: [art] PUB.X = 2C71998EE5F9C6A0E4F22F0746D27345AE1D8784D1B20B4C85D0EB43A3CF2AEDBC3D8A7FE4F2A5CFAFB987DEBB07A460
24,482,163 UART: [art] PUB.Y = B11276A7440A57C6010DB531EC2BE0AFC4933B1D7A9A09432885D5CD336F2AEE9BAF2D0CDEEAE1871CEB512C35B15852
24,489,393 UART: [art] SIG.R = C1D02369D3F91250F90F6F973DF5A79B1204FDC2675CAE95BEEE4D0DA5803232C5221912FB99A5F85A02F6F2027F0C22
24,496,770 UART: [art] SIG.S = 1909BF024AFF001F9AEEBADAD0D1A3D70894CC9485DB4969C2E7264B51588A00D80759CDBB7800976437F049830BFE04
25,475,096 UART: Caliptra RT
25,475,816 UART: [state] CFI Enabled
25,641,790 UART: [rt] RT listening for mailbox commands...
25,673,857 UART: [rt]cmd =0x44504543, len=136
29,891,603 >>> mbox cmd response data (136 bytes)
29,892,922 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,923,767 UART: [rt]cmd =0x44504543, len=92
34,279,669 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,871 writing to cptra_bootfsm_go
193,105 UART:
193,479 UART: Running Caliptra ROM ...
194,666 UART:
604,223 UART: [state] CFI Enabled
616,110 UART: [state] LifecycleState = Unprovisioned
617,932 UART: [state] DebugLocked = No
620,812 UART: [state] WD Timer not started. Device not locked for debugging
625,432 UART: [kat] SHA2-256
804,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,127 UART: [kat] ++
816,663 UART: [kat] sha1
827,545 UART: [kat] SHA2-256
830,622 UART: [kat] SHA2-384
837,251 UART: [kat] SHA2-512-ACC
840,188 UART: [kat] ECC-384
3,282,430 UART: [kat] HMAC-384Kdf
3,295,466 UART: [kat] LMS
3,824,938 UART: [kat] --
3,828,593 UART: [cold-reset] ++
3,829,465 UART: [fht] FHT @ 0x50003400
3,840,158 UART: [idev] ++
3,840,737 UART: [idev] CDI.KEYID = 6
3,841,623 UART: [idev] SUBJECT.KEYID = 7
3,842,864 UART: [idev] UDS.KEYID = 0
3,843,811 ready_for_fw is high
3,844,021 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,376 UART: [idev] Erasing UDS.KEYID = 0
6,320,960 UART: [idev] Sha1 KeyId Algorithm
6,343,486 UART: [idev] --
6,347,590 UART: [ldev] ++
6,348,161 UART: [ldev] CDI.KEYID = 6
6,349,075 UART: [ldev] SUBJECT.KEYID = 5
6,350,258 UART: [ldev] AUTHORITY.KEYID = 7
6,351,500 UART: [ldev] FE.KEYID = 1
6,359,234 UART: [ldev] Erasing FE.KEYID = 1
8,835,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,749 UART: [ldev] --
10,623,565 UART: [fwproc] Wait for Commands...
10,626,132 UART: [fwproc] Recv command 0x46574c44
10,628,234 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,782 >>> mbox cmd response: success
14,484,380 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,487,438 UART: [afmc] ++
14,488,021 UART: [afmc] CDI.KEYID = 6
14,488,940 UART: [afmc] SUBJECT.KEYID = 7
14,490,102 UART: [afmc] AUTHORITY.KEYID = 5
16,989,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,671 UART: [afmc] --
18,788,354 UART: [cold-reset] --
18,793,032 UART: [state] Locking Datavault
18,799,588 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,240 UART: [state] Locking ICCM
18,803,301 UART: [exit] Launching FMC @ 0x40000130
18,811,754 UART:
18,811,996 UART: Running Caliptra FMC ...
18,813,099 UART:
18,813,263 UART: [state] CFI Enabled
18,821,608 UART: [fht] FMC Alias Private Key: 7
20,578,294 UART: [art] Extend RT PCRs Done
20,579,528 UART: [art] Lock RT PCRs Done
20,581,047 UART: [art] Populate DV Done
20,586,198 UART: [fht] FMC Alias Private Key: 7
20,587,906 UART: [art] Derive CDI
20,588,765 UART: [art] Store in in slot 0x4
20,631,135 UART: [art] Derive Key Pair
20,632,180 UART: [art] Store priv key in slot 0x5
23,059,283 UART: [art] Derive Key Pair - Done
23,071,958 UART: [art] Signing Cert with AUTHO
23,073,295 UART: RITY.KEYID = 7
24,778,433 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,947 UART: [art] PUB.X = 49231EBADE195C0F0C5F48F3C35691CCEAF7DD9CA91FC4C23822132CB0FA1EF8F5117A80618E2D17399348CBF6B5B4E6
24,787,244 UART: [art] PUB.Y = 4EFC804F884CFBD06DAC754B6BB02DFD03FE6F9F7ADDF50D5C314686A355DF94C2D444ABCA01F9C5D3009555BA8E4132
24,794,515 UART: [art] SIG.R = 3A1338FEC65E142ECBCE02A9B38925542BF6F73D80B2F07382C26925A8F3C9DFF8959000B5201FA3A7D98EA953CCAE10
24,801,889 UART: [art] SIG.S = 5215D02D504543321B7C62252B573F6BFDD12845E5DC6CFC9B1133FA45DF9AA5EF711A1C38783CC1681AE1205131411C
25,780,972 UART: Caliptra RT
25,781,672 UART: [state] CFI Enabled
25,898,736 UART: [rt] RT listening for mailbox commands...
25,931,103 UART: [rt]cmd =0x44504543, len=136
30,100,883 >>> mbox cmd response data (136 bytes)
30,102,277 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,132,935 UART: [rt]cmd =0x44504543, len=92
34,417,561 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
3,701,927 ready_for_fw is high
3,702,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,087 >>> mbox cmd response: success
14,272,777 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,519,960 UART:
18,520,354 UART: Running Caliptra FMC ...
18,521,543 UART:
18,521,714 UART: [state] CFI Enabled
18,529,549 UART: [fht] FMC Alias Private Key: 7
20,286,962 UART: [art] Extend RT PCRs Done
20,288,179 UART: [art] Lock RT PCRs Done
20,290,022 UART: [art] Populate DV Done
20,295,165 UART: [fht] FMC Alias Private Key: 7
20,296,755 UART: [art] Derive CDI
20,297,570 UART: [art] Store in in slot 0x4
20,340,383 UART: [art] Derive Key Pair
20,341,385 UART: [art] Store priv key in slot 0x5
22,768,350 UART: [art] Derive Key Pair - Done
22,781,625 UART: [art] Signing Cert with AUTHO
22,782,937 UART: RITY.KEYID = 7
24,488,482 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,987 UART: [art] PUB.X = 867098A3411CCE1D01523B96B71C493A464CD18E440794C0AA1DF0B9419F9DB0489BB28F29292787023E7A2BF9A8BAFA
24,497,267 UART: [art] PUB.Y = FA6034AD6873007EC0D7DD0C10A883452477808A5AC10929E563E23A7028ACCBCB2F3A4CFD3B574493E3C6383BE338A5
24,504,480 UART: [art] SIG.R = D3986CD6D046C1746D48926E8CDE9E7A6FAFD2A2B8189CE72CDB67E73231C27498F79249D9D456D51A6CEA627FC5BE29
24,511,902 UART: [art] SIG.S = 76805937E7265E41075879A77764E3E3E762B98867AE43160E6DEFC3A98C8902CF75B4121CF86D32E2256CB06FFD4A5C
25,490,430 UART: Caliptra RT
25,491,134 UART: [state] CFI Enabled
25,608,738 UART: [rt] RT listening for mailbox commands...
25,641,114 UART: [rt]cmd =0x44504543, len=136
29,810,672 >>> mbox cmd response data (136 bytes)
29,811,978 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,842,468 UART: [rt]cmd =0x44504543, len=92
34,126,443 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,442 UART:
192,816 UART: Running Caliptra ROM ...
193,918 UART:
194,059 UART: [state] CFI Enabled
265,133 UART: [state] LifecycleState = Unprovisioned
267,487 UART: [state] DebugLocked = No
269,434 UART: [state] WD Timer not started. Device not locked for debugging
274,260 UART: [kat] SHA2-256
464,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,883 UART: [kat] ++
475,352 UART: [kat] sha1
486,295 UART: [kat] SHA2-256
489,305 UART: [kat] SHA2-384
494,795 UART: [kat] SHA2-512-ACC
497,375 UART: [kat] ECC-384
2,946,489 UART: [kat] HMAC-384Kdf
2,971,223 UART: [kat] LMS
3,503,022 UART: [kat] --
3,507,045 UART: [cold-reset] ++
3,508,915 UART: [fht] FHT @ 0x50003400
3,521,240 UART: [idev] ++
3,521,943 UART: [idev] CDI.KEYID = 6
3,522,898 UART: [idev] SUBJECT.KEYID = 7
3,524,067 UART: [idev] UDS.KEYID = 0
3,524,969 ready_for_fw is high
3,525,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,730 UART: [idev] Erasing UDS.KEYID = 0
6,027,007 UART: [idev] Sha1 KeyId Algorithm
6,049,706 UART: [idev] --
6,054,941 UART: [ldev] ++
6,055,619 UART: [ldev] CDI.KEYID = 6
6,056,504 UART: [ldev] SUBJECT.KEYID = 5
6,057,721 UART: [ldev] AUTHORITY.KEYID = 7
6,059,713 UART: [ldev] FE.KEYID = 1
6,099,716 UART: [ldev] Erasing FE.KEYID = 1
8,606,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,119 UART: [ldev] --
10,414,143 UART: [fwproc] Wait for Commands...
10,416,360 UART: [fwproc] Recv command 0x46574c44
10,418,666 UART: [fwproc] Recv'd Img size: 114084 bytes
13,853,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,044,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,584,775 >>> mbox cmd response: success
14,585,383 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,588,059 UART: [afmc] ++
14,588,769 UART: [afmc] CDI.KEYID = 6
14,589,879 UART: [afmc] SUBJECT.KEYID = 7
14,591,431 UART: [afmc] AUTHORITY.KEYID = 5
17,127,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,266 UART: [afmc] --
18,925,373 UART: [cold-reset] --
18,930,161 UART: [state] Locking Datavault
18,935,802 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,961 UART: [state] Locking ICCM
18,939,258 UART: [exit] Launching FMC @ 0x40000130
18,947,920 UART:
18,948,155 UART: Running Caliptra FMC ...
18,949,252 UART:
18,949,409 UART: [state] CFI Enabled
19,010,167 UART: [fht] FMC Alias Private Key: 7
20,773,984 UART: [art] Extend RT PCRs Done
20,775,209 UART: [art] Lock RT PCRs Done
20,776,535 UART: [art] Populate DV Done
20,781,901 UART: [fht] FMC Alias Private Key: 7
20,783,650 UART: [art] Derive CDI
20,784,392 UART: [art] Store in in slot 0x4
20,842,967 UART: [art] Derive Key Pair
20,843,961 UART: [art] Store priv key in slot 0x5
23,307,086 UART: [art] Derive Key Pair - Done
23,320,097 UART: [art] Signing Cert with AUTHO
23,321,403 UART: RITY.KEYID = 7
25,032,565 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,075 UART: [art] PUB.X = C563685CD82F94521DF9624E3C9E6F869206A9A7EE9A07C43AB67CBBC032544B3BA6A8EB2E033F0A494CDF00613B5B1D
25,041,299 UART: [art] PUB.Y = D0E7EB341F93C9B637613979493CC6A8FD965C90F883F766BB2DDCAC168E554B00154F81CE1BF1E7CDAB7A249221CD04
25,048,556 UART: [art] SIG.R = B1C8EB54C9284682F61A7686DA485BE950EB081E99FC4E41C955F8C10104FA49116541D7CA86572537489411B9B39486
25,055,915 UART: [art] SIG.S = F5C8CE6381F6A3A837E1DF89C01953A0EDCC3A9471617381FB6C6C1222B860DA18DF9AC7E4A8F4CC845BA0E3150C2315
26,034,849 UART: Caliptra RT
26,035,559 UART: [state] CFI Enabled
26,199,643 UART: [rt] RT listening for mailbox commands...
26,231,860 UART: [rt]cmd =0x44504543, len=136
30,450,260 >>> mbox cmd response data (136 bytes)
30,451,601 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,482,386 UART: [rt]cmd =0x44504543, len=92
34,837,195 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,434,172 ready_for_fw is high
3,434,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,288 >>> mbox cmd response: success
14,727,963 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,024,225 UART:
19,024,627 UART: Running Caliptra FMC ...
19,025,720 UART:
19,025,874 UART: [state] CFI Enabled
19,090,862 UART: [fht] FMC Alias Private Key: 7
20,854,977 UART: [art] Extend RT PCRs Done
20,856,335 UART: [art] Lock RT PCRs Done
20,857,936 UART: [art] Populate DV Done
20,863,035 UART: [fht] FMC Alias Private Key: 7
20,864,632 UART: [art] Derive CDI
20,865,368 UART: [art] Store in in slot 0x4
20,922,597 UART: [art] Derive Key Pair
20,923,596 UART: [art] Store priv key in slot 0x5
23,386,267 UART: [art] Derive Key Pair - Done
23,399,327 UART: [art] Signing Cert with AUTHO
23,400,636 UART: RITY.KEYID = 7
25,111,449 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,955 UART: [art] PUB.X = BB8EB4F62C9802FB9C1685DC5017A836589197E10CA7A5EF30C2728E810993E3E59078AAC11E683605DE08BEF6160FD6
25,120,205 UART: [art] PUB.Y = 4C1D63D81F3E8B4F56EA5863E9CEE7D4D30D158577B0FA3167A0856FEE1D96AE97DFB6F12C4ADD4B2DD18F4398EC0932
25,127,504 UART: [art] SIG.R = 11F28EB421994B23D361E45C0DC136E9845F652328F24D454064E898381A4EAC9D15057A5CD89D602DDC68660017C19E
25,134,843 UART: [art] SIG.S = 39309D6616B7B7D1077561B111CC12AD4BA895AB698A47FD25F397DEF401A27678650F6EC37014447995577A00BE3819
26,113,286 UART: Caliptra RT
26,113,980 UART: [state] CFI Enabled
26,280,682 UART: [rt] RT listening for mailbox commands...
26,312,993 UART: [rt]cmd =0x44504543, len=136
30,530,688 >>> mbox cmd response data (136 bytes)
30,531,984 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,562,451 UART: [rt]cmd =0x44504543, len=92
34,917,763 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
192,908 UART:
193,274 UART: Running Caliptra ROM ...
194,420 UART:
603,919 UART: [state] CFI Enabled
616,086 UART: [state] LifecycleState = Unprovisioned
618,464 UART: [state] DebugLocked = No
619,644 UART: [state] WD Timer not started. Device not locked for debugging
622,614 UART: [kat] SHA2-256
812,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,243 UART: [kat] ++
823,763 UART: [kat] sha1
835,489 UART: [kat] SHA2-256
838,572 UART: [kat] SHA2-384
844,918 UART: [kat] SHA2-512-ACC
847,495 UART: [kat] ECC-384
3,286,916 UART: [kat] HMAC-384Kdf
3,298,503 UART: [kat] LMS
3,830,342 UART: [kat] --
3,834,934 UART: [cold-reset] ++
3,836,447 UART: [fht] FHT @ 0x50003400
3,848,087 UART: [idev] ++
3,848,842 UART: [idev] CDI.KEYID = 6
3,849,762 UART: [idev] SUBJECT.KEYID = 7
3,850,937 UART: [idev] UDS.KEYID = 0
3,851,883 ready_for_fw is high
3,852,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,995,256 UART: [idev] Erasing UDS.KEYID = 0
6,330,033 UART: [idev] Sha1 KeyId Algorithm
6,351,322 UART: [idev] --
6,355,207 UART: [ldev] ++
6,355,934 UART: [ldev] CDI.KEYID = 6
6,356,828 UART: [ldev] SUBJECT.KEYID = 5
6,357,901 UART: [ldev] AUTHORITY.KEYID = 7
6,359,097 UART: [ldev] FE.KEYID = 1
6,371,380 UART: [ldev] Erasing FE.KEYID = 1
8,846,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,340 UART: [ldev] --
10,640,254 UART: [fwproc] Wait for Commands...
10,643,431 UART: [fwproc] Recv command 0x46574c44
10,645,697 UART: [fwproc] Recv'd Img size: 114084 bytes
14,090,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,565 >>> mbox cmd response: success
14,829,178 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,832,719 UART: [afmc] ++
14,833,415 UART: [afmc] CDI.KEYID = 6
14,834,660 UART: [afmc] SUBJECT.KEYID = 7
14,836,096 UART: [afmc] AUTHORITY.KEYID = 5
17,343,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,379 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,552 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,873 UART: [afmc] --
19,140,941 UART: [cold-reset] --
19,145,672 UART: [state] Locking Datavault
19,150,716 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,920 UART: [state] Locking ICCM
19,155,271 UART: [exit] Launching FMC @ 0x40000130
19,163,942 UART:
19,164,176 UART: Running Caliptra FMC ...
19,165,202 UART:
19,165,349 UART: [state] CFI Enabled
19,173,131 UART: [fht] FMC Alias Private Key: 7
20,930,068 UART: [art] Extend RT PCRs Done
20,931,293 UART: [art] Lock RT PCRs Done
20,932,914 UART: [art] Populate DV Done
20,938,545 UART: [fht] FMC Alias Private Key: 7
20,940,196 UART: [art] Derive CDI
20,941,014 UART: [art] Store in in slot 0x4
20,983,755 UART: [art] Derive Key Pair
20,984,795 UART: [art] Store priv key in slot 0x5
23,411,547 UART: [art] Derive Key Pair - Done
23,424,705 UART: [art] Signing Cert with AUTHO
23,426,015 UART: RITY.KEYID = 7
25,131,082 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,592 UART: [art] PUB.X = B0187B9601FD3CC07287F6CE43DCB19B572F634ED8D626FFC87FA1DA9DF0918D46A1F94926CB2D09A28144603B9881B9
25,139,873 UART: [art] PUB.Y = 217887FC99FE5EE49FFA00ABAA3FF810DFA99E67FA2DFA7ACFAAD4092128C8CABFB1AE8FAD049D5DE269484E75C18055
25,147,176 UART: [art] SIG.R = D64D4AA65E06DECB4AF7BA106D33BCC8492D8E9141BD1EF535A983D408883B9F79F21F34C6A3EA57419E4F03C6CD304F
25,154,598 UART: [art] SIG.S = A6F897E7295EF5C48811597198FAC0846AAD78D10286C29F3CAB3F5B2352688912E4931C78B68B34C34829A5DE531426
26,133,490 UART: Caliptra RT
26,134,182 UART: [state] CFI Enabled
26,251,060 UART: [rt] RT listening for mailbox commands...
26,283,125 UART: [rt]cmd =0x44504543, len=136
30,452,689 >>> mbox cmd response data (136 bytes)
30,454,030 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,484,623 UART: [rt]cmd =0x44504543, len=92
34,769,741 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
3,759,500 ready_for_fw is high
3,759,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,961,631 >>> mbox cmd response: success
14,962,565 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,210,394 UART:
19,210,778 UART: Running Caliptra FMC ...
19,211,979 UART:
19,212,147 UART: [state] CFI Enabled
19,219,952 UART: [fht] FMC Alias Private Key: 7
20,976,136 UART: [art] Extend RT PCRs Done
20,977,358 UART: [art] Lock RT PCRs Done
20,978,945 UART: [art] Populate DV Done
20,984,485 UART: [fht] FMC Alias Private Key: 7
20,986,012 UART: [art] Derive CDI
20,986,761 UART: [art] Store in in slot 0x4
21,029,035 UART: [art] Derive Key Pair
21,030,045 UART: [art] Store priv key in slot 0x5
23,457,026 UART: [art] Derive Key Pair - Done
23,470,179 UART: [art] Signing Cert with AUTHO
23,471,521 UART: RITY.KEYID = 7
25,176,593 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,106 UART: [art] PUB.X = 2B1048249D392EF4DF574C96AC53784E76CCD3E6589CDC6C550AB25002F921909D5A10F066F3380EA9771218272F6BC1
25,185,347 UART: [art] PUB.Y = BCBEC2E32881A24E86FD066BC1A823D767F6798D8C9DAA7B63F7F406EDD90F295B2A6D8B5DDF8DA806614C5723E1390F
25,192,631 UART: [art] SIG.R = F802CF0526325B39D7C8E060581CBB794F9C55316407E36C1F046D909BF3D831A3FD5EB52CB20DA838E7F1DB6D385B07
25,200,039 UART: [art] SIG.S = C75B8D3790B2110E104AA1F1A09795148DABE1FD7823949F3A1AD2AA06A6121F55002A358D6D9E11F138F7F205626E34
26,179,229 UART: Caliptra RT
26,179,925 UART: [state] CFI Enabled
26,296,080 UART: [rt] RT listening for mailbox commands...
26,328,255 UART: [rt]cmd =0x44504543, len=136
30,497,883 >>> mbox cmd response data (136 bytes)
30,499,198 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,529,686 UART: [rt]cmd =0x44504543, len=92
34,813,583 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,377 UART: [kat] SHA2-256
882,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,423 UART: [kat] ++
886,575 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,456 UART: [kat] LMS
1,475,652 UART: [kat] --
1,476,509 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,858 UART: [idev] ++
1,480,026 UART: [idev] CDI.KEYID = 6
1,480,386 UART: [idev] SUBJECT.KEYID = 7
1,480,810 UART: [idev] UDS.KEYID = 0
1,481,155 ready_for_fw is high
1,481,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,547,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,034 UART: [ldev] --
1,586,405 UART: [fwproc] Waiting for Commands...
1,587,168 UART: [fwproc] Received command 0x46574c44
1,587,959 UART: [fwproc] Received Image of size 114084 bytes
2,881,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,151 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,994 >>> mbox cmd response: success
3,073,994 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,075,046 UART: [afmc] ++
3,075,214 UART: [afmc] CDI.KEYID = 6
3,075,576 UART: [afmc] SUBJECT.KEYID = 7
3,076,001 UART: [afmc] AUTHORITY.KEYID = 5
3,110,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,639 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,329 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,218 UART: [afmc] --
3,154,240 UART: [cold-reset] --
3,155,012 UART: [state] Locking Datavault
3,156,103 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,707 UART: [state] Locking ICCM
3,157,151 UART: [exit] Launching FMC @ 0x40000130
3,162,480 UART:
3,162,496 UART: Running Caliptra FMC ...
3,162,904 UART:
3,162,958 UART: [state] CFI Enabled
3,173,633 UART: [fht] FMC Alias Private Key: 7
3,281,848 UART: [art] Extend RT PCRs Done
3,282,276 UART: [art] Lock RT PCRs Done
3,284,104 UART: [art] Populate DV Done
3,292,455 UART: [fht] FMC Alias Private Key: 7
3,293,433 UART: [art] Derive CDI
3,293,713 UART: [art] Store in in slot 0x4
3,379,330 UART: [art] Derive Key Pair
3,379,690 UART: [art] Store priv key in slot 0x5
3,392,888 UART: [art] Derive Key Pair - Done
3,407,596 UART: [art] Signing Cert with AUTHO
3,408,076 UART: RITY.KEYID = 7
3,423,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,221 UART: [art] PUB.X = 23D288C0C71EC0331090FC93F197755CBA711E0C4D0CF547E7933D8AAA467FF6B13359BB127FB401FCA21B22973C5E50
3,430,988 UART: [art] PUB.Y = 7C566223F5E2BAF79590D41ECF1D262A0E8868BD221465A5E7B1D249A16B5882BA487209FFEC30239F275E5C6DAAF502
3,437,935 UART: [art] SIG.R = 14C2E5DD2E03AFEF13018B4AF5BF3C88E572E2A96BF422AF2F1809221297E44840C1DEBEB53D465CBE2F733A4A5AB9CB
3,444,716 UART: [art] SIG.S = A753387ECF5E4F2454EB101B2DBA533AE5B954624D7FC5759A42C81478652E9AFB166D5153123F11902D18E8AD67DA18
3,469,247 UART: Caliptra RT
3,469,500 UART: [state] CFI Enabled
3,578,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,629 UART: [rt]cmd =0x44504543, len=136
3,673,397 >>> mbox cmd response data (136 bytes)
3,673,398 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,301 UART: [rt]cmd =0x44504543, len=92
3,886,303 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,151 ready_for_fw is high
1,363,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,248 >>> mbox cmd response: success
2,924,248 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,985,830 UART:
2,985,846 UART: Running Caliptra FMC ...
2,986,254 UART:
2,986,308 UART: [state] CFI Enabled
2,996,971 UART: [fht] FMC Alias Private Key: 7
3,104,694 UART: [art] Extend RT PCRs Done
3,105,122 UART: [art] Lock RT PCRs Done
3,106,492 UART: [art] Populate DV Done
3,114,601 UART: [fht] FMC Alias Private Key: 7
3,115,771 UART: [art] Derive CDI
3,116,051 UART: [art] Store in in slot 0x4
3,201,688 UART: [art] Derive Key Pair
3,202,048 UART: [art] Store priv key in slot 0x5
3,215,096 UART: [art] Derive Key Pair - Done
3,229,882 UART: [art] Signing Cert with AUTHO
3,230,362 UART: RITY.KEYID = 7
3,245,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,001 UART: [art] PUB.X = 9A49C1C785CED632388149EF314CF8A8E8249810CD6A86C774C14E7D84CD524D55F285E9603EF0EE50E9E022F25294FE
3,252,775 UART: [art] PUB.Y = BFD31D634427AEA74A24C57E1FEAD2EEE571AAB76D497B2AF2FF61B18237366E7EEF33FA7D978582C3A773D3A0A3A6E2
3,259,745 UART: [art] SIG.R = F65DBCF05D625FB9F736108A422E3E00936EFD0C7F820DF22BBF9ACAD00EA6E713C3FC74DB2DE47843149A9DE646D322
3,266,502 UART: [art] SIG.S = 401FB69040BBD0B0D1EB35B9BEA9A748F91A419F4ACDF83A1C8621E1E2D3BAACED43BCDECA55A7C21FC1B62C6F4182B9
3,290,539 UART: Caliptra RT
3,290,792 UART: [state] CFI Enabled
3,399,325 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,573 UART: [rt]cmd =0x44504543, len=136
3,494,287 >>> mbox cmd response data (136 bytes)
3,494,288 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,219 UART: [rt]cmd =0x44504543, len=92
3,707,339 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,325 UART: [kat] SHA2-512-ACC
897,226 UART: [kat] ECC-384
902,575 UART: [kat] HMAC-384Kdf
907,177 UART: [kat] LMS
1,475,373 UART: [kat] --
1,476,416 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,677 UART: [idev] ++
1,479,845 UART: [idev] CDI.KEYID = 6
1,480,205 UART: [idev] SUBJECT.KEYID = 7
1,480,629 UART: [idev] UDS.KEYID = 0
1,480,974 ready_for_fw is high
1,480,974 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,497 UART: [idev] Erasing UDS.KEYID = 0
1,505,089 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,833 UART: [idev] --
1,514,928 UART: [ldev] ++
1,515,096 UART: [ldev] CDI.KEYID = 6
1,515,459 UART: [ldev] SUBJECT.KEYID = 5
1,515,885 UART: [ldev] AUTHORITY.KEYID = 7
1,516,348 UART: [ldev] FE.KEYID = 1
1,521,468 UART: [ldev] Erasing FE.KEYID = 1
1,547,531 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,941 UART: [ldev] --
1,587,240 UART: [fwproc] Waiting for Commands...
1,587,925 UART: [fwproc] Received command 0x46574c44
1,588,716 UART: [fwproc] Received Image of size 114084 bytes
2,883,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,968 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,320 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,765 >>> mbox cmd response: success
3,075,765 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,076,935 UART: [afmc] ++
3,077,103 UART: [afmc] CDI.KEYID = 6
3,077,465 UART: [afmc] SUBJECT.KEYID = 7
3,077,890 UART: [afmc] AUTHORITY.KEYID = 5
3,113,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,960 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,650 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,353 UART: [afmc] --
3,156,313 UART: [cold-reset] --
3,157,267 UART: [state] Locking Datavault
3,158,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,944 UART: [state] Locking ICCM
3,159,450 UART: [exit] Launching FMC @ 0x40000130
3,164,779 UART:
3,164,795 UART: Running Caliptra FMC ...
3,165,203 UART:
3,165,346 UART: [state] CFI Enabled
3,176,025 UART: [fht] FMC Alias Private Key: 7
3,284,770 UART: [art] Extend RT PCRs Done
3,285,198 UART: [art] Lock RT PCRs Done
3,286,288 UART: [art] Populate DV Done
3,294,533 UART: [fht] FMC Alias Private Key: 7
3,295,501 UART: [art] Derive CDI
3,295,781 UART: [art] Store in in slot 0x4
3,381,468 UART: [art] Derive Key Pair
3,381,828 UART: [art] Store priv key in slot 0x5
3,395,150 UART: [art] Derive Key Pair - Done
3,410,302 UART: [art] Signing Cert with AUTHO
3,410,782 UART: RITY.KEYID = 7
3,425,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,745 UART: [art] PUB.X = 219314E899DA091359B36DCCF4843F0045CE29095D15968840555DE20251C7FB0ECB0E8AF53D80873AE46ED59F1F6A1E
3,433,480 UART: [art] PUB.Y = 4468693C83C91CED63770E590ED434EF744CFDCEAD4CA934C3219879E99186BA76754B889CF17E6ABE239BF65DEA112E
3,440,434 UART: [art] SIG.R = A1FD4D50734D7F013EE5A47120728ADFB960FCC759DBE1B586E60DCA367B070A4BDE3C101BB4106F660AE5BF5C7815E3
3,447,205 UART: [art] SIG.S = B3F55735EFB2619E1BA1FE85370EF344188C473B75F1144FCD59CC245DF8911AE5D94CA9E9755F6C21787ACBC3FF4042
3,471,039 UART: Caliptra RT
3,471,384 UART: [state] CFI Enabled
3,579,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,446 UART: [rt]cmd =0x44504543, len=136
3,673,680 >>> mbox cmd response data (136 bytes)
3,673,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,564 UART: [rt]cmd =0x44504543, len=92
3,887,539 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,319 >>> mbox cmd response: success
2,925,319 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,987,627 UART:
2,987,643 UART: Running Caliptra FMC ...
2,988,051 UART:
2,988,194 UART: [state] CFI Enabled
2,999,431 UART: [fht] FMC Alias Private Key: 7
3,107,494 UART: [art] Extend RT PCRs Done
3,107,922 UART: [art] Lock RT PCRs Done
3,109,460 UART: [art] Populate DV Done
3,117,577 UART: [fht] FMC Alias Private Key: 7
3,118,521 UART: [art] Derive CDI
3,118,801 UART: [art] Store in in slot 0x4
3,204,814 UART: [art] Derive Key Pair
3,205,174 UART: [art] Store priv key in slot 0x5
3,218,492 UART: [art] Derive Key Pair - Done
3,233,237 UART: [art] Signing Cert with AUTHO
3,233,717 UART: RITY.KEYID = 7
3,248,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,460 UART: [art] PUB.X = 9F62608ED47E76521DAC63477BD5C56D3C3671F35592EA4A4956E1C8448E2567FCA437597821CBA9D8C460C7F727A31F
3,256,230 UART: [art] PUB.Y = AB0385DC88ACB4BD2A870A5033BA371C0BED606E459A0B184D0F8445C9A6E2EA3148982E08E05F004DEB922C98ABBF19
3,263,154 UART: [art] SIG.R = 8C36CC1F6369A481F9B7C8FE36F8BD5D8E9CABDE4BF189AE125A953F1EF8B333319ECC2FEC42B5BA6317B3647AEABC00
3,269,928 UART: [art] SIG.S = 2A7A4343A10ECEF234EE29EC7FA4F10FCD487E5649AB36B462C18446504259F7D6248434344A1418F7C29A4FD8135A87
3,293,467 UART: Caliptra RT
3,293,812 UART: [state] CFI Enabled
3,401,869 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,491 UART: [rt]cmd =0x44504543, len=136
3,496,597 >>> mbox cmd response data (136 bytes)
3,496,598 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,611 UART: [rt]cmd =0x44504543, len=92
3,710,349 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,801 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,039 UART: [kat] SHA2-256
903,979 UART: [kat] SHA2-384
906,884 UART: [kat] SHA2-512-ACC
908,785 UART: [kat] ECC-384
918,374 UART: [kat] HMAC-384Kdf
922,828 UART: [kat] LMS
1,171,156 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,419 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 ready_for_fw is high
1,176,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,329 UART: [idev] Sha1 KeyId Algorithm
1,209,821 UART: [idev] --
1,210,883 UART: [ldev] ++
1,211,051 UART: [ldev] CDI.KEYID = 6
1,211,414 UART: [ldev] SUBJECT.KEYID = 5
1,211,840 UART: [ldev] AUTHORITY.KEYID = 7
1,212,303 UART: [ldev] FE.KEYID = 1
1,217,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,112 UART: [fwproc] Wait for Commands...
1,283,826 UART: [fwproc] Recv command 0x46574c44
1,284,554 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,767 >>> mbox cmd response: success
2,772,767 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,843 UART: [afmc] ++
2,774,011 UART: [afmc] CDI.KEYID = 6
2,774,373 UART: [afmc] SUBJECT.KEYID = 7
2,774,798 UART: [afmc] AUTHORITY.KEYID = 5
2,810,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,407 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,112 UART: [afmc] --
2,854,172 UART: [cold-reset] --
2,855,038 UART: [state] Locking Datavault
2,856,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,085 UART: [state] Locking ICCM
2,857,605 UART: [exit] Launching FMC @ 0x40000130
2,862,934 UART:
2,862,950 UART: Running Caliptra FMC ...
2,863,358 UART:
2,863,412 UART: [state] CFI Enabled
2,873,911 UART: [fht] FMC Alias Private Key: 7
2,981,898 UART: [art] Extend RT PCRs Done
2,982,326 UART: [art] Lock RT PCRs Done
2,983,746 UART: [art] Populate DV Done
2,991,989 UART: [fht] FMC Alias Private Key: 7
2,993,021 UART: [art] Derive CDI
2,993,301 UART: [art] Store in in slot 0x4
3,079,056 UART: [art] Derive Key Pair
3,079,416 UART: [art] Store priv key in slot 0x5
3,092,540 UART: [art] Derive Key Pair - Done
3,106,940 UART: [art] Signing Cert with AUTHO
3,107,420 UART: RITY.KEYID = 7
3,122,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,993 UART: [art] PUB.X = C3E50577885D07725E0647F390CBAB1F79C776750BFE2CE49C96D173374D51FC90C4DC312DDBB80356A0F7D9E4EDAD04
3,129,755 UART: [art] PUB.Y = 04E15F079CA099C0329079C8FB77CA1AD2B5E22448373060CB6680EA7778982894964D3FCBB7D072AFB62A207707E344
3,136,692 UART: [art] SIG.R = 6821F15C63D982E9B78D8565627E094084282FD2DC33EC16510037B64C5D7E7EBD602F559B2960CA9086CC07C00E8AD5
3,143,429 UART: [art] SIG.S = 88CE640F05592712A7EBAD949C7CED489969F1F7B2F77BC622F636948DAEDB15B9186511F6A5D3AF70ED6B60EC349028
3,167,538 UART: Caliptra RT
3,167,791 UART: [state] CFI Enabled
3,274,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,308 UART: [rt]cmd =0x44504543, len=136
3,369,980 >>> mbox cmd response data (136 bytes)
3,369,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,034 UART: [rt]cmd =0x44504543, len=92
3,583,420 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,905 ready_for_fw is high
1,060,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,090 >>> mbox cmd response: success
2,622,090 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,408 UART:
2,684,424 UART: Running Caliptra FMC ...
2,684,832 UART:
2,684,886 UART: [state] CFI Enabled
2,695,687 UART: [fht] FMC Alias Private Key: 7
2,803,406 UART: [art] Extend RT PCRs Done
2,803,834 UART: [art] Lock RT PCRs Done
2,805,452 UART: [art] Populate DV Done
2,813,775 UART: [fht] FMC Alias Private Key: 7
2,814,905 UART: [art] Derive CDI
2,815,185 UART: [art] Store in in slot 0x4
2,900,744 UART: [art] Derive Key Pair
2,901,104 UART: [art] Store priv key in slot 0x5
2,914,182 UART: [art] Derive Key Pair - Done
2,929,034 UART: [art] Signing Cert with AUTHO
2,929,514 UART: RITY.KEYID = 7
2,944,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,191 UART: [art] PUB.X = 1E5CC1BBB19706E0608EF0714797F22450FFBF295EEB3B815B8B4E86E0BACCABE9476FBDE429AAB81D627CC873D9C645
2,951,978 UART: [art] PUB.Y = C102796ACEDC43DCD0DBEEAA6E084D788564DCCF9087E6F972D5BF6847CBA5759BD99684190B36594B57C97F81E90428
2,958,926 UART: [art] SIG.R = 78261A0BC88C00A4911D1055A38EB6F1460A106C34F342B0FAB73A2D02B0FF2C4556B21C6BCFB5696430E9FA349F2A7A
2,965,673 UART: [art] SIG.S = E04B2B81593757D3AA5352A618517EAB42CA063CF0ADB8007F2717F666C73C51176C59554E991115A7E317D36D0521A8
2,989,154 UART: Caliptra RT
2,989,407 UART: [state] CFI Enabled
3,096,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,178 UART: [rt]cmd =0x44504543, len=136
3,192,230 >>> mbox cmd response data (136 bytes)
3,192,231 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,156 UART: [rt]cmd =0x44504543, len=92
3,406,212 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,027 UART: [kat] LMS
1,171,355 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,303 UART: [idev] ++
1,175,471 UART: [idev] CDI.KEYID = 6
1,175,831 UART: [idev] SUBJECT.KEYID = 7
1,176,255 UART: [idev] UDS.KEYID = 0
1,176,600 ready_for_fw is high
1,176,600 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,201,112 UART: [idev] Sha1 KeyId Algorithm
1,209,546 UART: [idev] --
1,210,668 UART: [ldev] ++
1,210,836 UART: [ldev] CDI.KEYID = 6
1,211,199 UART: [ldev] SUBJECT.KEYID = 5
1,211,625 UART: [ldev] AUTHORITY.KEYID = 7
1,212,088 UART: [ldev] FE.KEYID = 1
1,217,192 UART: [ldev] Erasing FE.KEYID = 1
1,243,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,700 UART: [ldev] --
1,283,025 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,529 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,660 >>> mbox cmd response: success
2,772,660 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,694 UART: [afmc] ++
2,773,862 UART: [afmc] CDI.KEYID = 6
2,774,224 UART: [afmc] SUBJECT.KEYID = 7
2,774,649 UART: [afmc] AUTHORITY.KEYID = 5
2,810,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,725 UART: [afmc] --
2,853,709 UART: [cold-reset] --
2,854,633 UART: [state] Locking Datavault
2,856,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,730 UART: [state] Locking ICCM
2,857,246 UART: [exit] Launching FMC @ 0x40000130
2,862,575 UART:
2,862,591 UART: Running Caliptra FMC ...
2,862,999 UART:
2,863,142 UART: [state] CFI Enabled
2,873,685 UART: [fht] FMC Alias Private Key: 7
2,981,896 UART: [art] Extend RT PCRs Done
2,982,324 UART: [art] Lock RT PCRs Done
2,984,160 UART: [art] Populate DV Done
2,992,447 UART: [fht] FMC Alias Private Key: 7
2,993,453 UART: [art] Derive CDI
2,993,733 UART: [art] Store in in slot 0x4
3,079,658 UART: [art] Derive Key Pair
3,080,018 UART: [art] Store priv key in slot 0x5
3,093,384 UART: [art] Derive Key Pair - Done
3,108,153 UART: [art] Signing Cert with AUTHO
3,108,633 UART: RITY.KEYID = 7
3,124,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,782 UART: [art] PUB.X = D887F267E453E9C76F069D1B06EADF835D07C5B1BF1E61CE7E2E73E9EA7F74B3C2EC36DE9B6DB840329F748FEA133FE1
3,131,563 UART: [art] PUB.Y = 9C72AFC9BB27B7D56FA180A41F617DC20DA6DA54D30EA31850ADF92CBBB76C3117E22B1FEB21CF4E1AA8806D788D04DF
3,138,528 UART: [art] SIG.R = 522AD7AB19647D3A7D980B0636AE15040E7F2D4C359EEEFC7EEC944B2DDDD9F9BCCD64E822A43DA87C7F0397EDE2FBAB
3,145,311 UART: [art] SIG.S = 28735E53682A50307374DB24A82BE588C203A7D107D0C8A08A1767A576D10534E186AF32F21CDA94055B25E6BC28B7B9
3,168,820 UART: Caliptra RT
3,169,165 UART: [state] CFI Enabled
3,276,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,916 UART: [rt]cmd =0x44504543, len=136
3,371,078 >>> mbox cmd response data (136 bytes)
3,371,079 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,986 UART: [rt]cmd =0x44504543, len=92
3,584,065 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,320 ready_for_fw is high
1,061,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,895 >>> mbox cmd response: success
2,622,895 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,955 UART:
2,684,971 UART: Running Caliptra FMC ...
2,685,379 UART:
2,685,522 UART: [state] CFI Enabled
2,696,221 UART: [fht] FMC Alias Private Key: 7
2,804,398 UART: [art] Extend RT PCRs Done
2,804,826 UART: [art] Lock RT PCRs Done
2,806,574 UART: [art] Populate DV Done
2,814,797 UART: [fht] FMC Alias Private Key: 7
2,815,747 UART: [art] Derive CDI
2,816,027 UART: [art] Store in in slot 0x4
2,902,042 UART: [art] Derive Key Pair
2,902,402 UART: [art] Store priv key in slot 0x5
2,915,536 UART: [art] Derive Key Pair - Done
2,930,243 UART: [art] Signing Cert with AUTHO
2,930,723 UART: RITY.KEYID = 7
2,946,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,884 UART: [art] PUB.X = D74A4BAD4F9F9340948B16FEF8BB9DFD6D7C6C3AC0003BA18156B99B058BF090348D90C6A860ED7D08ED247CF97F71FC
2,953,644 UART: [art] PUB.Y = C7849B1F5B17B6E8BAC4513B5E96AB40DDAA52FBEDBFAD9DA533B818042C355017D5564453F3EA781C23096AEC359867
2,960,600 UART: [art] SIG.R = E49D3665D155EF2B2009E31306175E1FEEEEE7BD444B1EDD036832CBC8E0856CC60863F28AB661B1ED2C871740FEEFD7
2,967,372 UART: [art] SIG.S = 73EEF99994C258C0DD5CE8736E30FC621C328FFDA8DE4C134AFC03470493A2608CA3D8A92013ECE2016DDB0B04353907
2,991,049 UART: Caliptra RT
2,991,394 UART: [state] CFI Enabled
3,099,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,665 UART: [rt]cmd =0x44504543, len=136
3,194,103 >>> mbox cmd response data (136 bytes)
3,194,104 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,853 UART: [rt]cmd =0x44504543, len=92
3,407,086 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,530 UART: [state] LifecycleState = Unprovisioned
86,185 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
891,616 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,174,789 ready_for_fw is high
1,174,789 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,563 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,412 UART: [ldev] ++
1,209,580 UART: [ldev] CDI.KEYID = 6
1,209,944 UART: [ldev] SUBJECT.KEYID = 5
1,210,371 UART: [ldev] AUTHORITY.KEYID = 7
1,210,834 UART: [ldev] FE.KEYID = 1
1,216,076 UART: [ldev] Erasing FE.KEYID = 1
1,242,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,120 UART: [ldev] --
1,281,606 UART: [fwproc] Wait for Commands...
1,282,195 UART: [fwproc] Recv command 0x46574c44
1,282,928 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,779 >>> mbox cmd response: success
2,770,779 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,771,920 UART: [afmc] ++
2,772,088 UART: [afmc] CDI.KEYID = 6
2,772,451 UART: [afmc] SUBJECT.KEYID = 7
2,772,877 UART: [afmc] AUTHORITY.KEYID = 5
2,808,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,845 UART: [afmc] --
2,851,813 UART: [cold-reset] --
2,852,547 UART: [state] Locking Datavault
2,853,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,210 UART: [state] Locking ICCM
2,854,754 UART: [exit] Launching FMC @ 0x40000130
2,860,083 UART:
2,860,099 UART: Running Caliptra FMC ...
2,860,507 UART:
2,860,561 UART: [state] CFI Enabled
2,870,800 UART: [fht] FMC Alias Private Key: 7
2,979,127 UART: [art] Extend RT PCRs Done
2,979,555 UART: [art] Lock RT PCRs Done
2,981,185 UART: [art] Populate DV Done
2,989,454 UART: [fht] FMC Alias Private Key: 7
2,990,396 UART: [art] Derive CDI
2,990,676 UART: [art] Store in in slot 0x4
3,076,421 UART: [art] Derive Key Pair
3,076,781 UART: [art] Store priv key in slot 0x5
3,090,073 UART: [art] Derive Key Pair - Done
3,104,874 UART: [art] Signing Cert with AUTHO
3,105,354 UART: RITY.KEYID = 7
3,120,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,629 UART: [art] PUB.X = 674846CDEF2A5E976B57F62F00CA46050DA2D912FB9EC586F7885F493AA2CE09A84D49D3A4022A5154E74B2C141C1422
3,128,369 UART: [art] PUB.Y = 4A6D6836BD184CC23403EB7D4820FC7050943ACEDEF1632D50B595A5AE4118885AF93B16D2FBF0480716DC6961720908
3,135,307 UART: [art] SIG.R = 1BDFDCD8CEBD07A50A7C1E36535D47CB6A8E27A1716B1CF252BC65F8340DBA2842182D587BD7A9B57A45AAE995680460
3,142,079 UART: [art] SIG.S = B9A6629FE2C1B9970BD77B2A3BF1B2E64EBCAC249DD650738D04D8EB2016EE11BE659F1B53D0ACD6E095E4688F690EDB
3,166,495 UART: Caliptra RT
3,166,748 UART: [state] CFI Enabled
3,274,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,955 UART: [rt]cmd =0x44504543, len=136
3,369,933 >>> mbox cmd response data (136 bytes)
3,369,934 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,789 UART: [rt]cmd =0x44504543, len=92
3,582,423 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,922 ready_for_fw is high
1,054,922 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,073 >>> mbox cmd response: success
2,617,073 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,678,665 UART:
2,678,681 UART: Running Caliptra FMC ...
2,679,089 UART:
2,679,143 UART: [state] CFI Enabled
2,689,644 UART: [fht] FMC Alias Private Key: 7
2,797,095 UART: [art] Extend RT PCRs Done
2,797,523 UART: [art] Lock RT PCRs Done
2,799,301 UART: [art] Populate DV Done
2,807,308 UART: [fht] FMC Alias Private Key: 7
2,808,254 UART: [art] Derive CDI
2,808,534 UART: [art] Store in in slot 0x4
2,894,019 UART: [art] Derive Key Pair
2,894,379 UART: [art] Store priv key in slot 0x5
2,908,161 UART: [art] Derive Key Pair - Done
2,922,653 UART: [art] Signing Cert with AUTHO
2,923,133 UART: RITY.KEYID = 7
2,938,779 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,544 UART: [art] PUB.X = 67D6F83A2AFFAA3B864F02CF10EF780D7BC05463928A0E87BA07A087EB378EAD3EB28A35CDEAB6754D3B3000D25008AE
2,946,295 UART: [art] PUB.Y = 2E0392F182BF2E10BBF18C45F78D36C22EBA7235FF823F1B933DA1B5BE9FBBCFBA3683F8DBFED78443B0EF1A28EC863D
2,953,268 UART: [art] SIG.R = 18E262FE880C0D6D2A4C73BE54F7AAACC4A0C712111157D96738093B68768F4A69BF167719411ECC831F952A9EBD3703
2,960,028 UART: [art] SIG.S = 4BA701A10C64AA18D68E34F14C37C7EAE2A73B0791B1F2F0934FEC09C01FAFF048DD97ECE6E125F865F3F296F1D60858
2,983,532 UART: Caliptra RT
2,983,785 UART: [state] CFI Enabled
3,091,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,974 UART: [rt]cmd =0x44504543, len=136
3,186,182 >>> mbox cmd response data (136 bytes)
3,186,183 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,232 UART: [rt]cmd =0x44504543, len=92
3,400,126 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,174,836 ready_for_fw is high
1,174,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,822 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,853 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,428 >>> mbox cmd response: success
2,770,428 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,771,469 UART: [afmc] ++
2,771,637 UART: [afmc] CDI.KEYID = 6
2,772,000 UART: [afmc] SUBJECT.KEYID = 7
2,772,426 UART: [afmc] AUTHORITY.KEYID = 5
2,808,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,670 UART: [afmc] --
2,851,746 UART: [cold-reset] --
2,852,728 UART: [state] Locking Datavault
2,853,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,315 UART: [state] Locking ICCM
2,854,773 UART: [exit] Launching FMC @ 0x40000130
2,860,102 UART:
2,860,118 UART: Running Caliptra FMC ...
2,860,526 UART:
2,860,669 UART: [state] CFI Enabled
2,871,424 UART: [fht] FMC Alias Private Key: 7
2,979,107 UART: [art] Extend RT PCRs Done
2,979,535 UART: [art] Lock RT PCRs Done
2,980,769 UART: [art] Populate DV Done
2,989,192 UART: [fht] FMC Alias Private Key: 7
2,990,230 UART: [art] Derive CDI
2,990,510 UART: [art] Store in in slot 0x4
3,076,489 UART: [art] Derive Key Pair
3,076,849 UART: [art] Store priv key in slot 0x5
3,089,907 UART: [art] Derive Key Pair - Done
3,104,964 UART: [art] Signing Cert with AUTHO
3,105,444 UART: RITY.KEYID = 7
3,120,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,573 UART: [art] PUB.X = 68EA65FF41A76B8918D27E3ECD719E7FEAA558E9FF00A4573D0DDA27C5274BE2F3C8B462D6C1E5C7CF9C3B1CA4D2AC1F
3,128,344 UART: [art] PUB.Y = A75B673395F023F172BF57763706DBDAF3E4E1C10B700D6E8113C31418BC038C42955B60A17C3940AA8742E0520B73A3
3,135,275 UART: [art] SIG.R = 57850A3EFDFB59669600D902CB39841B1B405CE5FFC8E3A0A00A3833EA2F158A605ADF20247D71076DCB310B770799E4
3,142,009 UART: [art] SIG.S = 07258D0569083306538A462FAFE9B0B8BB8984A65FE4B0071D11B0CC01CEA53B39258640D6774D09C365754F6202E220
3,166,000 UART: Caliptra RT
3,166,345 UART: [state] CFI Enabled
3,273,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,136 UART: [rt]cmd =0x44504543, len=136
3,368,052 >>> mbox cmd response data (136 bytes)
3,368,053 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,224 UART: [rt]cmd =0x44504543, len=92
3,581,767 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,537 ready_for_fw is high
1,056,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,486 >>> mbox cmd response: success
2,621,486 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,520 UART:
2,684,536 UART: Running Caliptra FMC ...
2,684,944 UART:
2,685,087 UART: [state] CFI Enabled
2,695,574 UART: [fht] FMC Alias Private Key: 7
2,803,157 UART: [art] Extend RT PCRs Done
2,803,585 UART: [art] Lock RT PCRs Done
2,805,009 UART: [art] Populate DV Done
2,813,398 UART: [fht] FMC Alias Private Key: 7
2,814,498 UART: [art] Derive CDI
2,814,778 UART: [art] Store in in slot 0x4
2,900,467 UART: [art] Derive Key Pair
2,900,827 UART: [art] Store priv key in slot 0x5
2,914,215 UART: [art] Derive Key Pair - Done
2,929,145 UART: [art] Signing Cert with AUTHO
2,929,625 UART: RITY.KEYID = 7
2,944,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,574 UART: [art] PUB.X = B0F61847238A8825052828C2BA3F99AE60CD8827C83B868D3BD34CB1832AF77FC0DE744D612D8C4A4F1908E38D4C9793
2,952,340 UART: [art] PUB.Y = ED18885D89FDB71E488B2D1D015CBE2773D7D1F778D1AA916F827E9B1F2AC3F998E0D9181ED74FB82429F48C1D853133
2,959,295 UART: [art] SIG.R = 4E9177D7F6DCD2A22A4E20408E8AEE0BB2FED25AB65164A86689B5B386B50F7934D15AF9F3CBE0801855057207541F97
2,966,057 UART: [art] SIG.S = F712F2313626BF82CD137B18974882115F33C0B746BA31AF145A0630853AB83DB9B3D5BCE6CCFB64F6D0089EB1690803
2,989,766 UART: Caliptra RT
2,990,111 UART: [state] CFI Enabled
3,097,458 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,906 UART: [rt]cmd =0x44504543, len=136
3,192,320 >>> mbox cmd response data (136 bytes)
3,192,321 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,144 UART: [rt]cmd =0x44504543, len=92
3,405,906 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,153 UART:
192,522 UART: Running Caliptra ROM ...
193,611 UART:
193,756 UART: [state] CFI Enabled
267,804 UART: [state] LifecycleState = Unprovisioned
269,780 UART: [state] DebugLocked = No
272,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,087 UART: [kat] SHA2-256
446,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,293 UART: [kat] ++
457,739 UART: [kat] sha1
468,467 UART: [kat] SHA2-256
471,121 UART: [kat] SHA2-384
476,052 UART: [kat] SHA2-512-ACC
478,420 UART: [kat] ECC-384
2,768,931 UART: [kat] HMAC-384Kdf
2,800,203 UART: [kat] LMS
3,990,499 UART: [kat] --
3,996,982 UART: [cold-reset] ++
3,999,053 UART: [fht] Storing FHT @ 0x50003400
4,011,387 UART: [idev] ++
4,011,960 UART: [idev] CDI.KEYID = 6
4,012,887 UART: [idev] SUBJECT.KEYID = 7
4,014,136 UART: [idev] UDS.KEYID = 0
4,015,253 ready_for_fw is high
4,015,481 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,159,068 UART: [idev] Erasing UDS.KEYID = 0
7,347,507 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,343 UART: [idev] --
7,374,101 UART: [ldev] ++
7,374,674 UART: [ldev] CDI.KEYID = 6
7,375,615 UART: [ldev] SUBJECT.KEYID = 5
7,376,881 UART: [ldev] AUTHORITY.KEYID = 7
7,378,113 UART: [ldev] FE.KEYID = 1
7,424,878 UART: [ldev] Erasing FE.KEYID = 1
10,756,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,258 UART: [ldev] --
13,139,235 UART: [fwproc] Waiting for Commands...
13,141,488 UART: [fwproc] Received command 0x46574c44
13,143,670 UART: [fwproc] Received Image of size 113760 bytes
17,187,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,797 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,648,098 >>> mbox cmd response: success
17,652,138 UART: [afmc] ++
17,652,746 UART: [afmc] CDI.KEYID = 6
17,653,663 UART: [afmc] SUBJECT.KEYID = 7
17,654,931 UART: [afmc] AUTHORITY.KEYID = 5
21,027,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,067 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,491 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,339 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,730 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,895 UART: [afmc] --
23,400,292 UART: [cold-reset] --
23,403,659 UART: [state] Locking Datavault
23,408,566 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,337 UART: [state] Locking ICCM
23,411,734 UART: [exit] Launching FMC @ 0x40000130
23,420,130 UART:
23,420,364 UART: Running Caliptra FMC ...
23,421,460 UART:
23,421,617 UART: [state] CFI Enabled
23,490,289 UART: [fht] FMC Alias Private Key: 7
25,828,137 UART: [art] Extend RT PCRs Done
25,829,365 UART: [art] Lock RT PCRs Done
25,831,258 UART: [art] Populate DV Done
25,836,528 UART: [fht] FMC Alias Private Key: 7
25,838,119 UART: [art] Derive CDI
25,838,932 UART: [art] Store in in slot 0x4
25,892,458 UART: [art] Derive Key Pair
25,893,489 UART: [art] Store priv key in slot 0x5
29,186,215 UART: [art] Derive Key Pair - Done
29,199,260 UART: [art] Signing Cert with AUTHO
29,200,570 UART: RITY.KEYID = 7
31,487,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,076 UART: [art] PUB.X = 66981E0D635B3A1F0783B6CA969D069CFDE0213F21BE99D8D693798C92FDB71A01732DD19A823DBD8C803E01E9B24F2E
31,496,353 UART: [art] PUB.Y = 8920F51499467A4A405DCB37F9378C6A6C2EE7D777203ECBF0E153C5F0C68F7BA43DCBB15235F33986E5253CDD6B5C88
31,503,590 UART: [art] SIG.R = 345E1B35DF1BF27DE386BB4DFE50ED059EAF20BE40ADF2AD03B04F8B9D21CA34BD9E1555CEA7E2096F87EA733604E75B
31,510,985 UART: [art] SIG.S = 5A9DDC3B23DFA699B1EE3403D60802DA93F383F752B7D72C2C4E19A2332BF7D0B06DEADBA41A5645A38CE7AF6686A057
32,815,791 UART: Caliptra RT
32,816,536 UART: [state] CFI Enabled
32,985,079 UART: [rt] RT listening for mailbox commands...
32,989,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,034,268 UART: [rt]cmd =0x4c4d5356, len=1672
34,235,924 >>> mbox cmd response data (8 bytes)
34,238,441 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,283,033 UART: [rt]cmd =0x4c4d5356, len=1672
35,048,969 >>> mbox cmd response data (8 bytes)
35,051,371 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,095,643 UART: [rt]cmd =0x4c4d5356, len=1672
35,835,824 >>> mbox cmd response data (8 bytes)
35,838,229 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,882,604 UART: [rt]cmd =0x4c4d5356, len=1672
36,648,728 >>> mbox cmd response data (8 bytes)
36,649,986 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,694,253 UART: [rt]cmd =0x4c4d5356, len=1672
37,538,341 >>> mbox cmd response data (8 bytes)
37,539,635 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,584,090 UART: [rt]cmd =0x4c4d5356, len=1672
38,323,986 >>> mbox cmd response data (8 bytes)
38,325,244 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,369,571 UART: [rt]cmd =0x4c4d5356, len=1672
39,161,827 >>> mbox cmd response data (8 bytes)
39,163,075 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,207,676 UART: [rt]cmd =0x4c4d5356, len=1672
40,025,885 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,802,783 ready_for_fw is high
3,803,180 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,859,550 >>> mbox cmd response: success
23,546,161 UART:
23,546,550 UART: Running Caliptra FMC ...
23,547,666 UART:
23,547,823 UART: [state] CFI Enabled
23,618,519 UART: [fht] FMC Alias Private Key: 7
25,956,664 UART: [art] Extend RT PCRs Done
25,958,051 UART: [art] Lock RT PCRs Done
25,959,425 UART: [art] Populate DV Done
25,965,008 UART: [fht] FMC Alias Private Key: 7
25,966,612 UART: [art] Derive CDI
25,967,427 UART: [art] Store in in slot 0x4
26,027,602 UART: [art] Derive Key Pair
26,028,601 UART: [art] Store priv key in slot 0x5
29,321,037 UART: [art] Derive Key Pair - Done
29,333,923 UART: [art] Signing Cert with AUTHO
29,335,221 UART: RITY.KEYID = 7
31,623,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,521 UART: [art] PUB.X = DBF93D7222EB28E43F9E53C383D2E7DE615D39BA4C612DBB0D14F70B02E6175C4D2928FC4690E7091338593491C07EDE
31,631,783 UART: [art] PUB.Y = 9905EA695FF47D9557E902820C5F5D44466C0DF2B1B73B72FCF0D0DC979596D111BE14A23166B408F9722C199AC86EF0
31,639,001 UART: [art] SIG.R = E1052B2748F86A42C5072EDCC1AFAC88AEF6D0D59F56997A2DA4570706B57B38C12675F64DA48CA2E4739C7626DED17A
31,646,426 UART: [art] SIG.S = 7E57D8888437DB125D1C8892CB3AFE21A53F90E0BEEDA07C46D9734E963FCC9555F43E4DCE2ED13A976FC88A48F9BB1F
32,951,378 UART: Caliptra RT
32,952,092 UART: [state] CFI Enabled
33,114,461 UART: [rt] RT listening for mailbox commands...
33,118,455 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,163,666 UART: [rt]cmd =0x4c4d5356, len=1672
34,365,259 >>> mbox cmd response data (8 bytes)
34,367,730 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,412,116 UART: [rt]cmd =0x4c4d5356, len=1672
35,178,321 >>> mbox cmd response data (8 bytes)
35,180,735 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,225,067 UART: [rt]cmd =0x4c4d5356, len=1672
35,965,263 >>> mbox cmd response data (8 bytes)
35,967,642 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,012,174 UART: [rt]cmd =0x4c4d5356, len=1672
36,778,150 >>> mbox cmd response data (8 bytes)
36,779,445 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,824,043 UART: [rt]cmd =0x4c4d5356, len=1672
37,667,866 >>> mbox cmd response data (8 bytes)
37,669,165 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,713,651 UART: [rt]cmd =0x4c4d5356, len=1672
38,453,709 >>> mbox cmd response data (8 bytes)
38,454,993 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,499,426 UART: [rt]cmd =0x4c4d5356, len=1672
39,291,549 >>> mbox cmd response data (8 bytes)
39,292,806 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,337,182 UART: [rt]cmd =0x4c4d5356, len=1672
40,155,118 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,666 writing to cptra_bootfsm_go
192,935 UART:
193,314 UART: Running Caliptra ROM ...
194,458 UART:
604,229 UART: [state] CFI Enabled
616,827 UART: [state] LifecycleState = Unprovisioned
618,769 UART: [state] DebugLocked = No
620,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,722 UART: [kat] SHA2-256
795,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,984 UART: [kat] ++
806,579 UART: [kat] sha1
818,333 UART: [kat] SHA2-256
821,022 UART: [kat] SHA2-384
826,597 UART: [kat] SHA2-512-ACC
828,969 UART: [kat] ECC-384
3,114,345 UART: [kat] HMAC-384Kdf
3,126,101 UART: [kat] LMS
4,316,238 UART: [kat] --
4,320,261 UART: [cold-reset] ++
4,321,910 UART: [fht] Storing FHT @ 0x50003400
4,334,121 UART: [idev] ++
4,334,721 UART: [idev] CDI.KEYID = 6
4,335,783 UART: [idev] SUBJECT.KEYID = 7
4,336,886 UART: [idev] UDS.KEYID = 0
4,337,876 ready_for_fw is high
4,338,078 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,860 UART: [idev] Erasing UDS.KEYID = 0
7,626,054 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,623 UART: [idev] --
7,653,260 UART: [ldev] ++
7,653,826 UART: [ldev] CDI.KEYID = 6
7,654,785 UART: [ldev] SUBJECT.KEYID = 5
7,656,012 UART: [ldev] AUTHORITY.KEYID = 7
7,657,306 UART: [ldev] FE.KEYID = 1
7,667,404 UART: [ldev] Erasing FE.KEYID = 1
10,956,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,510 UART: [ldev] --
13,319,555 UART: [fwproc] Waiting for Commands...
13,322,017 UART: [fwproc] Received command 0x46574c44
13,324,205 UART: [fwproc] Received Image of size 113760 bytes
17,378,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,103 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,839,823 >>> mbox cmd response: success
17,844,589 UART: [afmc] ++
17,845,185 UART: [afmc] CDI.KEYID = 6
17,846,244 UART: [afmc] SUBJECT.KEYID = 7
17,847,289 UART: [afmc] AUTHORITY.KEYID = 5
21,166,754 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,727 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,065 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,916 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,385 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,850 UART: [afmc] --
23,533,070 UART: [cold-reset] --
23,536,973 UART: [state] Locking Datavault
23,543,263 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,019 UART: [state] Locking ICCM
23,547,061 UART: [exit] Launching FMC @ 0x40000130
23,555,476 UART:
23,555,714 UART: Running Caliptra FMC ...
23,556,814 UART:
23,556,975 UART: [state] CFI Enabled
23,564,915 UART: [fht] FMC Alias Private Key: 7
25,895,578 UART: [art] Extend RT PCRs Done
25,896,793 UART: [art] Lock RT PCRs Done
25,898,467 UART: [art] Populate DV Done
25,903,988 UART: [fht] FMC Alias Private Key: 7
25,905,628 UART: [art] Derive CDI
25,906,434 UART: [art] Store in in slot 0x4
25,948,598 UART: [art] Derive Key Pair
25,949,638 UART: [art] Store priv key in slot 0x5
29,191,703 UART: [art] Derive Key Pair - Done
29,204,801 UART: [art] Signing Cert with AUTHO
29,206,110 UART: RITY.KEYID = 7
31,485,756 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,272 UART: [art] PUB.X = 0B1C4EE82A8A66EE4EDBD087CD6D694F403911467A5D45F1671F16FBAE7D5E9750C23311CF42491EDC92622C18A41CB3
31,494,480 UART: [art] PUB.Y = 7A3107C28CC666290E5EF7C6B69CC4F30292967478220229F154535CE8F7D5BB219D44437876CEF0FB77F4498FC4293D
31,501,736 UART: [art] SIG.R = 2947541C24BFB1AB9E6E473EC7047CDF6A3F4B9105E61A89D2BF4EE9C38E31C4218E10D59D51FEB5C4BB1C0785E85D65
31,509,110 UART: [art] SIG.S = B4BFAE3D308B0F9CA4AB8089080214F85C8C91BEE915B2BA9BBDF3395D0C344ED229CB7B3192A22CC3F10F113F35DD19
32,813,921 UART: Caliptra RT
32,814,634 UART: [state] CFI Enabled
32,932,898 UART: [rt] RT listening for mailbox commands...
32,936,909 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,981,480 UART: [rt]cmd =0x4c4d5356, len=1672
34,182,928 >>> mbox cmd response data (8 bytes)
34,185,415 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,229,755 UART: [rt]cmd =0x4c4d5356, len=1672
34,996,202 >>> mbox cmd response data (8 bytes)
34,998,621 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,043,000 UART: [rt]cmd =0x4c4d5356, len=1672
35,783,420 >>> mbox cmd response data (8 bytes)
35,785,803 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,830,338 UART: [rt]cmd =0x4c4d5356, len=1672
36,596,456 >>> mbox cmd response data (8 bytes)
36,597,723 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,641,978 UART: [rt]cmd =0x4c4d5356, len=1672
37,485,941 >>> mbox cmd response data (8 bytes)
37,487,234 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,531,677 UART: [rt]cmd =0x4c4d5356, len=1672
38,271,885 >>> mbox cmd response data (8 bytes)
38,273,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,317,583 UART: [rt]cmd =0x4c4d5356, len=1672
39,109,905 >>> mbox cmd response data (8 bytes)
39,111,187 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,155,414 UART: [rt]cmd =0x4c4d5356, len=1672
39,973,464 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
4,128,623 ready_for_fw is high
4,129,016 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,066,946 >>> mbox cmd response: success
23,703,571 UART:
23,703,955 UART: Running Caliptra FMC ...
23,705,080 UART:
23,705,240 UART: [state] CFI Enabled
23,713,236 UART: [fht] FMC Alias Private Key: 7
26,043,658 UART: [art] Extend RT PCRs Done
26,044,903 UART: [art] Lock RT PCRs Done
26,046,424 UART: [art] Populate DV Done
26,051,849 UART: [fht] FMC Alias Private Key: 7
26,053,565 UART: [art] Derive CDI
26,054,383 UART: [art] Store in in slot 0x4
26,097,115 UART: [art] Derive Key Pair
26,098,122 UART: [art] Store priv key in slot 0x5
29,339,834 UART: [art] Derive Key Pair - Done
29,353,048 UART: [art] Signing Cert with AUTHO
29,354,355 UART: RITY.KEYID = 7
31,633,721 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,226 UART: [art] PUB.X = DFA016E1458AF1E1F581D1C67E2D28CD067325D434332E37513EFDFC034D15E6E9E86B584ECF0841189EC00BBADB0FC1
31,642,521 UART: [art] PUB.Y = 3C033CBBBBF88B391140F7C2D69191ABCE3B588DC231D86289077C914E9BE420CF30A01799AE829AF77599374A9C13AE
31,649,784 UART: [art] SIG.R = 571671479C56578841EE82B99EA73266524BEE1FAC2B20DDE387997FFBB1FCEEDD0E0AF08914BCDCE35D8ED9D9B5632F
31,657,182 UART: [art] SIG.S = F8AECC102B759C377FAF86CE369AA9F63F40792F6FFD7D97A044B46B845C89855488895E4F50EDD6C5EBCAF48FA255D4
32,962,987 UART: Caliptra RT
32,963,705 UART: [state] CFI Enabled
33,080,285 UART: [rt] RT listening for mailbox commands...
33,084,238 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,128,750 UART: [rt]cmd =0x4c4d5356, len=1672
34,330,061 >>> mbox cmd response data (8 bytes)
34,332,580 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,377,246 UART: [rt]cmd =0x4c4d5356, len=1672
35,143,576 >>> mbox cmd response data (8 bytes)
35,146,007 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,190,293 UART: [rt]cmd =0x4c4d5356, len=1672
35,930,600 >>> mbox cmd response data (8 bytes)
35,932,986 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,977,252 UART: [rt]cmd =0x4c4d5356, len=1672
36,743,474 >>> mbox cmd response data (8 bytes)
36,744,751 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,789,251 UART: [rt]cmd =0x4c4d5356, len=1672
37,633,055 >>> mbox cmd response data (8 bytes)
37,634,347 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,678,942 UART: [rt]cmd =0x4c4d5356, len=1672
38,419,203 >>> mbox cmd response data (8 bytes)
38,420,504 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,465,126 UART: [rt]cmd =0x4c4d5356, len=1672
39,257,279 >>> mbox cmd response data (8 bytes)
39,258,567 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,303,104 UART: [rt]cmd =0x4c4d5356, len=1672
40,121,078 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
192,563 UART:
192,965 UART: Running Caliptra ROM ...
194,161 UART:
194,312 UART: [state] CFI Enabled
264,025 UART: [state] LifecycleState = Unprovisioned
265,947 UART: [state] DebugLocked = No
268,544 UART: [state] WD Timer not started. Device not locked for debugging
273,147 UART: [kat] SHA2-256
452,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,838 UART: [kat] ++
464,369 UART: [kat] sha1
475,247 UART: [kat] SHA2-256
478,263 UART: [kat] SHA2-384
485,172 UART: [kat] SHA2-512-ACC
488,102 UART: [kat] ECC-384
2,948,876 UART: [kat] HMAC-384Kdf
2,972,341 UART: [kat] LMS
3,501,835 UART: [kat] --
3,504,754 UART: [cold-reset] ++
3,505,687 UART: [fht] FHT @ 0x50003400
3,517,582 UART: [idev] ++
3,518,143 UART: [idev] CDI.KEYID = 6
3,519,052 UART: [idev] SUBJECT.KEYID = 7
3,520,225 UART: [idev] UDS.KEYID = 0
3,521,147 ready_for_fw is high
3,521,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,829 UART: [idev] Erasing UDS.KEYID = 0
6,029,221 UART: [idev] Sha1 KeyId Algorithm
6,052,177 UART: [idev] --
6,055,577 UART: [ldev] ++
6,056,166 UART: [ldev] CDI.KEYID = 6
6,057,091 UART: [ldev] SUBJECT.KEYID = 5
6,058,254 UART: [ldev] AUTHORITY.KEYID = 7
6,059,502 UART: [ldev] FE.KEYID = 1
6,102,988 UART: [ldev] Erasing FE.KEYID = 1
8,605,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,569 UART: [ldev] --
10,413,800 UART: [fwproc] Wait for Commands...
10,416,855 UART: [fwproc] Recv command 0x46574c44
10,418,940 UART: [fwproc] Recv'd Img size: 114084 bytes
13,815,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,642 >>> mbox cmd response: success
14,274,606 UART: [afmc] ++
14,275,234 UART: [afmc] CDI.KEYID = 6
14,276,149 UART: [afmc] SUBJECT.KEYID = 7
14,277,192 UART: [afmc] AUTHORITY.KEYID = 5
16,813,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,242 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,608 UART: [afmc] --
18,631,607 UART: [cold-reset] --
18,635,082 UART: [state] Locking Datavault
18,641,869 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,571 UART: [state] Locking ICCM
18,646,128 UART: [exit] Launching FMC @ 0x40000130
18,654,579 UART:
18,654,827 UART: Running Caliptra FMC ...
18,655,927 UART:
18,656,087 UART: [state] CFI Enabled
18,714,291 UART: [fht] FMC Alias Private Key: 7
20,477,886 UART: [art] Extend RT PCRs Done
20,479,106 UART: [art] Lock RT PCRs Done
20,480,890 UART: [art] Populate DV Done
20,486,508 UART: [fht] FMC Alias Private Key: 7
20,487,983 UART: [art] Derive CDI
20,488,718 UART: [art] Store in in slot 0x4
20,546,828 UART: [art] Derive Key Pair
20,547,863 UART: [art] Store priv key in slot 0x5
23,010,766 UART: [art] Derive Key Pair - Done
23,023,766 UART: [art] Signing Cert with AUTHO
23,025,075 UART: RITY.KEYID = 7
24,736,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,061 UART: [art] PUB.X = B80588F04734E324E60BE8126476E551E0138A231AB1DD1053793B478FF6632BBD50ECA02FA59CA9871F6531CFB82211
24,745,300 UART: [art] PUB.Y = 96488B76C066911445AA5EF58BC4C2E82DBD1B6620C96AA0B1D4712EA005C1A7DF23332B460E81BF22EC35D6399A5603
24,752,570 UART: [art] SIG.R = A87BC08AFC74ADB73ECF0E135626E479C8A6103EB3392ABFC2E82902179B0A6BE75D4C0EDAE6CED3CDB1E00C6DA90862
24,760,542 UART: [art] SIG.S = 8CD5EF20849610124456949DA8B164AE1F382AAFFB2B6324AA57C3DB24C9A91591BF5BECB5D38BF2D76DC99B79F8520E
25,738,323 UART: Caliptra RT
25,739,030 UART: [state] CFI Enabled
25,904,685 UART: [rt] RT listening for mailbox commands...
25,908,674 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,953,716 UART: [rt]cmd =0x4c4d5356, len=1672
26,366,808 >>> mbox cmd response data (8 bytes)
26,369,296 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,413,991 UART: [rt]cmd =0x4c4d5356, len=1672
26,632,215 >>> mbox cmd response data (8 bytes)
26,634,606 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,679,132 UART: [rt]cmd =0x4c4d5356, len=1672
26,896,278 >>> mbox cmd response data (8 bytes)
26,898,696 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,943,079 UART: [rt]cmd =0x4c4d5356, len=1672
27,158,181 >>> mbox cmd response data (8 bytes)
27,159,438 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,204,120 UART: [rt]cmd =0x4c4d5356, len=1672
27,422,102 >>> mbox cmd response data (8 bytes)
27,423,372 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,467,738 UART: [rt]cmd =0x4c4d5356, len=1672
27,683,530 >>> mbox cmd response data (8 bytes)
27,684,782 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,729,041 UART: [rt]cmd =0x4c4d5356, len=1672
27,945,048 >>> mbox cmd response data (8 bytes)
27,946,298 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,990,723 UART: [rt]cmd =0x4c4d5356, len=1672
28,209,375 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
3,359,530 ready_for_fw is high
3,359,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,777 >>> mbox cmd response: success
18,342,059 UART:
18,342,460 UART: Running Caliptra FMC ...
18,343,569 UART:
18,343,718 UART: [state] CFI Enabled
18,408,152 UART: [fht] FMC Alias Private Key: 7
20,172,356 UART: [art] Extend RT PCRs Done
20,173,581 UART: [art] Lock RT PCRs Done
20,175,446 UART: [art] Populate DV Done
20,181,022 UART: [fht] FMC Alias Private Key: 7
20,182,617 UART: [art] Derive CDI
20,183,430 UART: [art] Store in in slot 0x4
20,240,730 UART: [art] Derive Key Pair
20,241,725 UART: [art] Store priv key in slot 0x5
22,704,993 UART: [art] Derive Key Pair - Done
22,717,829 UART: [art] Signing Cert with AUTHO
22,719,125 UART: RITY.KEYID = 7
24,430,588 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,095 UART: [art] PUB.X = 963CE8439FB9E6F74BB3E5619AD2C1F710424F4335E3F2EF4DCA53E267AB34797A7F6F042E6DCD4BC3ECC3A56D319286
24,439,367 UART: [art] PUB.Y = 1410F4DD62C49FDC13C3C3D89BC00A1DFBC692506D19B7EEA6A111C34D31B24ABA31B5AC422AA77D1226851EC20E8B3D
24,446,653 UART: [art] SIG.R = DFC513FCF9B5FDB54F0A4B27204D26FD329852A8FE08099683A89B884BBBE983E62299A2547518EDF2C88E000BB96FD9
24,454,062 UART: [art] SIG.S = 98E8618BBF4FFDDB73CBB74AE1AF5BBBC00B5BEEED4422136BB06272FD2C061CF7B7E6BB9EC29329CC738EDE1250E788
25,432,826 UART: Caliptra RT
25,433,548 UART: [state] CFI Enabled
25,599,288 UART: [rt] RT listening for mailbox commands...
25,603,302 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,648,525 UART: [rt]cmd =0x4c4d5356, len=1672
26,061,641 >>> mbox cmd response data (8 bytes)
26,064,097 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,108,752 UART: [rt]cmd =0x4c4d5356, len=1672
26,327,214 >>> mbox cmd response data (8 bytes)
26,329,778 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,374,338 UART: [rt]cmd =0x4c4d5356, len=1672
26,591,664 >>> mbox cmd response data (8 bytes)
26,594,091 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,638,366 UART: [rt]cmd =0x4c4d5356, len=1672
26,853,285 >>> mbox cmd response data (8 bytes)
26,854,554 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,899,110 UART: [rt]cmd =0x4c4d5356, len=1672
27,117,123 >>> mbox cmd response data (8 bytes)
27,118,380 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,162,767 UART: [rt]cmd =0x4c4d5356, len=1672
27,378,510 >>> mbox cmd response data (8 bytes)
27,379,778 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,424,051 UART: [rt]cmd =0x4c4d5356, len=1672
27,640,175 >>> mbox cmd response data (8 bytes)
27,641,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,685,583 UART: [rt]cmd =0x4c4d5356, len=1672
27,904,151 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,906 writing to cptra_bootfsm_go
193,031 UART:
193,424 UART: Running Caliptra ROM ...
194,528 UART:
604,320 UART: [state] CFI Enabled
616,139 UART: [state] LifecycleState = Unprovisioned
618,014 UART: [state] DebugLocked = No
619,541 UART: [state] WD Timer not started. Device not locked for debugging
623,510 UART: [kat] SHA2-256
802,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,191 UART: [kat] ++
814,642 UART: [kat] sha1
826,012 UART: [kat] SHA2-256
829,023 UART: [kat] SHA2-384
835,518 UART: [kat] SHA2-512-ACC
838,478 UART: [kat] ECC-384
3,278,373 UART: [kat] HMAC-384Kdf
3,290,831 UART: [kat] LMS
3,820,299 UART: [kat] --
3,824,158 UART: [cold-reset] ++
3,826,733 UART: [fht] FHT @ 0x50003400
3,838,420 UART: [idev] ++
3,838,993 UART: [idev] CDI.KEYID = 6
3,839,913 UART: [idev] SUBJECT.KEYID = 7
3,841,089 UART: [idev] UDS.KEYID = 0
3,842,015 ready_for_fw is high
3,842,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,622 UART: [idev] Erasing UDS.KEYID = 0
6,316,323 UART: [idev] Sha1 KeyId Algorithm
6,339,189 UART: [idev] --
6,342,917 UART: [ldev] ++
6,343,488 UART: [ldev] CDI.KEYID = 6
6,344,371 UART: [ldev] SUBJECT.KEYID = 5
6,345,585 UART: [ldev] AUTHORITY.KEYID = 7
6,346,819 UART: [ldev] FE.KEYID = 1
6,356,412 UART: [ldev] Erasing FE.KEYID = 1
8,829,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,583 UART: [ldev] --
10,622,502 UART: [fwproc] Wait for Commands...
10,625,571 UART: [fwproc] Recv command 0x46574c44
10,627,665 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,102 >>> mbox cmd response: success
14,493,734 UART: [afmc] ++
14,494,341 UART: [afmc] CDI.KEYID = 6
14,495,260 UART: [afmc] SUBJECT.KEYID = 7
14,496,423 UART: [afmc] AUTHORITY.KEYID = 5
16,996,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,046 UART: [afmc] --
18,794,519 UART: [cold-reset] --
18,797,630 UART: [state] Locking Datavault
18,802,394 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,095 UART: [state] Locking ICCM
18,805,334 UART: [exit] Launching FMC @ 0x40000130
18,813,732 UART:
18,813,977 UART: Running Caliptra FMC ...
18,815,086 UART:
18,815,254 UART: [state] CFI Enabled
18,823,633 UART: [fht] FMC Alias Private Key: 7
20,580,018 UART: [art] Extend RT PCRs Done
20,581,245 UART: [art] Lock RT PCRs Done
20,582,871 UART: [art] Populate DV Done
20,588,498 UART: [fht] FMC Alias Private Key: 7
20,590,166 UART: [art] Derive CDI
20,590,984 UART: [art] Store in in slot 0x4
20,633,827 UART: [art] Derive Key Pair
20,634,859 UART: [art] Store priv key in slot 0x5
23,061,461 UART: [art] Derive Key Pair - Done
23,074,413 UART: [art] Signing Cert with AUTHO
23,075,725 UART: RITY.KEYID = 7
24,781,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,811 UART: [art] PUB.X = FE9494B09660811B12775D62307DFD47B71E06E90D14D6F24DDA2FCD43CF76BCDF2AFEDBF50F02FE5FC24D8EE0B85E55
24,790,094 UART: [art] PUB.Y = A42B15AD5F288431B03EE8E6D89D9DF0A11BD79CA344FEBD2D5AB169A45B1DE1230A690A15514E9794DCD5DAD62E69FF
24,797,361 UART: [art] SIG.R = 6CCA8EC663ECDEDDA0D3EEA778A4BF40A424105DB19D614825981161DEFA8177CEC272E842884BD2A5ECF341ED7092BD
24,804,782 UART: [art] SIG.S = 8F89A73BAA8EBA0C2546E839F325223FCF0D0E3E81CFBE25D6061C00A1BF09DB681D71161CE52E5609D5EAB6CC029880
25,782,917 UART: Caliptra RT
25,783,622 UART: [state] CFI Enabled
25,900,258 UART: [rt] RT listening for mailbox commands...
25,904,234 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,948,933 UART: [rt]cmd =0x4c4d5356, len=1672
26,362,159 >>> mbox cmd response data (8 bytes)
26,364,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,409,080 UART: [rt]cmd =0x4c4d5356, len=1672
26,627,581 >>> mbox cmd response data (8 bytes)
26,629,972 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,674,186 UART: [rt]cmd =0x4c4d5356, len=1672
26,891,615 >>> mbox cmd response data (8 bytes)
26,893,997 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,938,382 UART: [rt]cmd =0x4c4d5356, len=1672
27,153,411 >>> mbox cmd response data (8 bytes)
27,154,651 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,199,182 UART: [rt]cmd =0x4c4d5356, len=1672
27,417,442 >>> mbox cmd response data (8 bytes)
27,418,709 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,463,194 UART: [rt]cmd =0x4c4d5356, len=1672
27,678,883 >>> mbox cmd response data (8 bytes)
27,680,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,724,573 UART: [rt]cmd =0x4c4d5356, len=1672
27,940,354 >>> mbox cmd response data (8 bytes)
27,941,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,985,961 UART: [rt]cmd =0x4c4d5356, len=1672
28,204,728 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
3,704,528 ready_for_fw is high
3,705,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,282,426 >>> mbox cmd response: success
18,528,457 UART:
18,528,890 UART: Running Caliptra FMC ...
18,530,027 UART:
18,530,189 UART: [state] CFI Enabled
18,538,087 UART: [fht] FMC Alias Private Key: 7
20,294,688 UART: [art] Extend RT PCRs Done
20,295,917 UART: [art] Lock RT PCRs Done
20,297,465 UART: [art] Populate DV Done
20,302,775 UART: [fht] FMC Alias Private Key: 7
20,304,489 UART: [art] Derive CDI
20,305,234 UART: [art] Store in in slot 0x4
20,348,155 UART: [art] Derive Key Pair
20,349,157 UART: [art] Store priv key in slot 0x5
22,775,665 UART: [art] Derive Key Pair - Done
22,788,560 UART: [art] Signing Cert with AUTHO
22,789,861 UART: RITY.KEYID = 7
24,495,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,112 UART: [art] PUB.X = 837A2A35D906322F23DF1B603E4AA4D5DCC95CE4128292BEA880F0A284161C5328BAED9FF5319899B1F996D630ED88CB
24,504,407 UART: [art] PUB.Y = 9B02C26D994FF088EC6E5D737C4082B8D892CD2D0FBD4017AD275A3E61BD9526EC03AFBCC7504008DE89EC2006585956
24,511,639 UART: [art] SIG.R = 0123F50E2384992EAF40437C536086EE0F649FADA56C1A8CB8527E7D16BFF16C96682B6D954DB7394614647340E311BD
24,519,011 UART: [art] SIG.S = 290A57607C0BFB2621DE28DDB1160F6F23B51E4FD8F91DA0D8667752823B39562A512F2F2F929FD4EB63A29D59FC8A67
25,498,365 UART: Caliptra RT
25,499,078 UART: [state] CFI Enabled
25,616,310 UART: [rt] RT listening for mailbox commands...
25,620,233 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,664,786 UART: [rt]cmd =0x4c4d5356, len=1672
26,077,915 >>> mbox cmd response data (8 bytes)
26,080,367 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,124,691 UART: [rt]cmd =0x4c4d5356, len=1672
26,343,223 >>> mbox cmd response data (8 bytes)
26,345,618 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,389,885 UART: [rt]cmd =0x4c4d5356, len=1672
26,607,285 >>> mbox cmd response data (8 bytes)
26,609,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,654,115 UART: [rt]cmd =0x4c4d5356, len=1672
26,869,225 >>> mbox cmd response data (8 bytes)
26,870,496 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,914,708 UART: [rt]cmd =0x4c4d5356, len=1672
27,132,536 >>> mbox cmd response data (8 bytes)
27,133,793 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,178,224 UART: [rt]cmd =0x4c4d5356, len=1672
27,393,792 >>> mbox cmd response data (8 bytes)
27,395,057 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,439,491 UART: [rt]cmd =0x4c4d5356, len=1672
27,655,515 >>> mbox cmd response data (8 bytes)
27,656,794 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,700,961 UART: [rt]cmd =0x4c4d5356, len=1672
27,919,804 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
192,683 UART:
193,056 UART: Running Caliptra ROM ...
194,198 UART:
194,342 UART: [state] CFI Enabled
265,721 UART: [state] LifecycleState = Unprovisioned
268,143 UART: [state] DebugLocked = No
270,177 UART: [state] WD Timer not started. Device not locked for debugging
274,580 UART: [kat] SHA2-256
464,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,284 UART: [kat] ++
475,759 UART: [kat] sha1
487,057 UART: [kat] SHA2-256
490,096 UART: [kat] SHA2-384
496,236 UART: [kat] SHA2-512-ACC
498,814 UART: [kat] ECC-384
2,948,411 UART: [kat] HMAC-384Kdf
2,971,805 UART: [kat] LMS
3,503,578 UART: [kat] --
3,507,350 UART: [cold-reset] ++
3,509,494 UART: [fht] FHT @ 0x50003400
3,521,393 UART: [idev] ++
3,522,105 UART: [idev] CDI.KEYID = 6
3,523,023 UART: [idev] SUBJECT.KEYID = 7
3,524,197 UART: [idev] UDS.KEYID = 0
3,525,120 ready_for_fw is high
3,525,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,909 UART: [idev] Erasing UDS.KEYID = 0
6,029,587 UART: [idev] Sha1 KeyId Algorithm
6,053,045 UART: [idev] --
6,057,395 UART: [ldev] ++
6,058,088 UART: [ldev] CDI.KEYID = 6
6,058,978 UART: [ldev] SUBJECT.KEYID = 5
6,060,086 UART: [ldev] AUTHORITY.KEYID = 7
6,061,401 UART: [ldev] FE.KEYID = 1
6,100,045 UART: [ldev] Erasing FE.KEYID = 1
8,610,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,813 UART: [ldev] --
10,411,565 UART: [fwproc] Wait for Commands...
10,414,467 UART: [fwproc] Recv command 0x46574c44
10,416,771 UART: [fwproc] Recv'd Img size: 114084 bytes
13,852,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,047,473 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,588,817 >>> mbox cmd response: success
14,593,496 UART: [afmc] ++
14,594,204 UART: [afmc] CDI.KEYID = 6
14,595,315 UART: [afmc] SUBJECT.KEYID = 7
14,596,867 UART: [afmc] AUTHORITY.KEYID = 5
17,124,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,870,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,425 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,872 UART: [afmc] --
18,927,411 UART: [cold-reset] --
18,932,168 UART: [state] Locking Datavault
18,936,836 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,017 UART: [state] Locking ICCM
18,940,800 UART: [exit] Launching FMC @ 0x40000130
18,949,485 UART:
18,949,716 UART: Running Caliptra FMC ...
18,950,813 UART:
18,950,970 UART: [state] CFI Enabled
19,009,377 UART: [fht] FMC Alias Private Key: 7
20,773,636 UART: [art] Extend RT PCRs Done
20,774,851 UART: [art] Lock RT PCRs Done
20,776,518 UART: [art] Populate DV Done
20,781,923 UART: [fht] FMC Alias Private Key: 7
20,783,506 UART: [art] Derive CDI
20,784,237 UART: [art] Store in in slot 0x4
20,841,862 UART: [art] Derive Key Pair
20,842,879 UART: [art] Store priv key in slot 0x5
23,305,487 UART: [art] Derive Key Pair - Done
23,318,275 UART: [art] Signing Cert with AUTHO
23,319,585 UART: RITY.KEYID = 7
25,031,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,404 UART: [art] PUB.X = 014AD1941D8C55AC7FA7B39DA14A60FC6CEB3731A8D78861E7E954B0C5AA153765BAB4679E65C0BFB43677C42C62869B
25,040,693 UART: [art] PUB.Y = C8857E33E7BC2286F8D0FEBB6B67253A0B34AA3102A200EBA16DFB3D4FF4ACBF4C56DA1485CDDADFD40873FC387FAC4E
25,047,941 UART: [art] SIG.R = 91D30EE511E1073EDDC66AA4516384AFE02083C0DDAF4BF3A991B3F6BEEB2738C64685D7437D13219F8F5C4CABA99B95
25,055,358 UART: [art] SIG.S = D1113D77AEEC47227E134CA64AFE8FC7B5138F5FCBF97F05996690E5F318304BE85DFD6860BE18C7E526E8CBDDD7E77A
26,035,098 UART: Caliptra RT
26,035,813 UART: [state] CFI Enabled
26,200,389 UART: [rt] RT listening for mailbox commands...
26,204,343 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,249,457 UART: [rt]cmd =0x4c4d5356, len=1672
26,662,770 >>> mbox cmd response data (8 bytes)
26,665,269 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,709,639 UART: [rt]cmd =0x4c4d5356, len=1672
26,928,350 >>> mbox cmd response data (8 bytes)
26,930,735 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,975,192 UART: [rt]cmd =0x4c4d5356, len=1672
27,192,672 >>> mbox cmd response data (8 bytes)
27,195,047 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,239,485 UART: [rt]cmd =0x4c4d5356, len=1672
27,454,722 >>> mbox cmd response data (8 bytes)
27,455,996 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,500,470 UART: [rt]cmd =0x4c4d5356, len=1672
27,718,691 >>> mbox cmd response data (8 bytes)
27,719,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,764,191 UART: [rt]cmd =0x4c4d5356, len=1672
27,979,967 >>> mbox cmd response data (8 bytes)
27,981,247 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,025,555 UART: [rt]cmd =0x4c4d5356, len=1672
28,241,595 >>> mbox cmd response data (8 bytes)
28,242,876 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,287,461 UART: [rt]cmd =0x4c4d5356, len=1672
28,506,281 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,438,554 ready_for_fw is high
3,438,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,815 >>> mbox cmd response: success
19,046,794 UART:
19,047,202 UART: Running Caliptra FMC ...
19,048,404 UART:
19,048,570 UART: [state] CFI Enabled
19,113,439 UART: [fht] FMC Alias Private Key: 7
20,877,377 UART: [art] Extend RT PCRs Done
20,878,604 UART: [art] Lock RT PCRs Done
20,880,341 UART: [art] Populate DV Done
20,885,703 UART: [fht] FMC Alias Private Key: 7
20,887,299 UART: [art] Derive CDI
20,888,109 UART: [art] Store in in slot 0x4
20,946,120 UART: [art] Derive Key Pair
20,947,152 UART: [art] Store priv key in slot 0x5
23,409,953 UART: [art] Derive Key Pair - Done
23,423,063 UART: [art] Signing Cert with AUTHO
23,424,368 UART: RITY.KEYID = 7
25,136,473 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,001 UART: [art] PUB.X = 933E2DBF86D31B044E9239759C4667DA764151D47EF607FBAB6890CF1198C9989A038317C23CA056E7A998A75435F9B6
25,145,240 UART: [art] PUB.Y = A3A7A4FED0A199BD2961FEAFBBE3E714B025022D186ED078839ED976E8A0044601A78895FCE5837C689F3F80608ED1C6
25,152,511 UART: [art] SIG.R = FBB75EA648BE8215FAF9320FFCCBF3AAAF69A9362E6E5ACA86D5E25E324B1577B2FD39268B60EADA8621054C07A40976
25,159,916 UART: [art] SIG.S = 285032C9B94524AFBCF559846017310F9004051D08AA1855AE7527246571E80D9E96ACEE675E39519AF8D826126B07D3
26,138,949 UART: Caliptra RT
26,139,669 UART: [state] CFI Enabled
26,305,652 UART: [rt] RT listening for mailbox commands...
26,309,650 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,354,843 UART: [rt]cmd =0x4c4d5356, len=1672
26,768,101 >>> mbox cmd response data (8 bytes)
26,770,574 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,815,166 UART: [rt]cmd =0x4c4d5356, len=1672
27,033,333 >>> mbox cmd response data (8 bytes)
27,035,728 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,080,104 UART: [rt]cmd =0x4c4d5356, len=1672
27,297,318 >>> mbox cmd response data (8 bytes)
27,299,701 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,344,140 UART: [rt]cmd =0x4c4d5356, len=1672
27,559,176 >>> mbox cmd response data (8 bytes)
27,560,458 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,604,782 UART: [rt]cmd =0x4c4d5356, len=1672
27,822,990 >>> mbox cmd response data (8 bytes)
27,824,255 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,868,792 UART: [rt]cmd =0x4c4d5356, len=1672
28,084,431 >>> mbox cmd response data (8 bytes)
28,085,688 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,130,038 UART: [rt]cmd =0x4c4d5356, len=1672
28,346,208 >>> mbox cmd response data (8 bytes)
28,347,459 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,391,813 UART: [rt]cmd =0x4c4d5356, len=1672
28,610,634 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,985 writing to cptra_bootfsm_go
193,135 UART:
193,504 UART: Running Caliptra ROM ...
194,616 UART:
604,389 UART: [state] CFI Enabled
617,794 UART: [state] LifecycleState = Unprovisioned
620,183 UART: [state] DebugLocked = No
621,847 UART: [state] WD Timer not started. Device not locked for debugging
626,752 UART: [kat] SHA2-256
816,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,487 UART: [kat] ++
827,931 UART: [kat] sha1
840,793 UART: [kat] SHA2-256
843,807 UART: [kat] SHA2-384
850,176 UART: [kat] SHA2-512-ACC
852,761 UART: [kat] ECC-384
3,293,181 UART: [kat] HMAC-384Kdf
3,306,497 UART: [kat] LMS
3,838,306 UART: [kat] --
3,843,862 UART: [cold-reset] ++
3,846,361 UART: [fht] FHT @ 0x50003400
3,857,481 UART: [idev] ++
3,858,128 UART: [idev] CDI.KEYID = 6
3,859,164 UART: [idev] SUBJECT.KEYID = 7
3,860,269 UART: [idev] UDS.KEYID = 0
3,861,194 ready_for_fw is high
3,861,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,628 UART: [idev] Erasing UDS.KEYID = 0
6,337,971 UART: [idev] Sha1 KeyId Algorithm
6,360,280 UART: [idev] --
6,366,296 UART: [ldev] ++
6,366,979 UART: [ldev] CDI.KEYID = 6
6,367,940 UART: [ldev] SUBJECT.KEYID = 5
6,369,101 UART: [ldev] AUTHORITY.KEYID = 7
6,370,330 UART: [ldev] FE.KEYID = 1
6,383,622 UART: [ldev] Erasing FE.KEYID = 1
8,861,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,524 UART: [ldev] --
10,653,712 UART: [fwproc] Wait for Commands...
10,655,642 UART: [fwproc] Recv command 0x46574c44
10,657,951 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,825,327 >>> mbox cmd response: success
14,828,591 UART: [afmc] ++
14,829,300 UART: [afmc] CDI.KEYID = 6
14,830,500 UART: [afmc] SUBJECT.KEYID = 7
14,831,940 UART: [afmc] AUTHORITY.KEYID = 5
17,335,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,097 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,129,486 UART: [afmc] --
19,133,087 UART: [cold-reset] --
19,137,876 UART: [state] Locking Datavault
19,143,803 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,020 UART: [state] Locking ICCM
19,148,828 UART: [exit] Launching FMC @ 0x40000130
19,157,507 UART:
19,157,745 UART: Running Caliptra FMC ...
19,158,850 UART:
19,159,009 UART: [state] CFI Enabled
19,166,685 UART: [fht] FMC Alias Private Key: 7
20,923,199 UART: [art] Extend RT PCRs Done
20,924,417 UART: [art] Lock RT PCRs Done
20,926,100 UART: [art] Populate DV Done
20,931,674 UART: [fht] FMC Alias Private Key: 7
20,933,267 UART: [art] Derive CDI
20,934,085 UART: [art] Store in in slot 0x4
20,976,303 UART: [art] Derive Key Pair
20,977,321 UART: [art] Store priv key in slot 0x5
23,404,050 UART: [art] Derive Key Pair - Done
23,417,089 UART: [art] Signing Cert with AUTHO
23,418,421 UART: RITY.KEYID = 7
25,123,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,313 UART: [art] PUB.X = C77C63F07A5F2BAA34BB57D2DFF9F83B824F58BADFB15CCD8418F5A1E9CAF8112C439C07B6C3C064B94A7C7BBF7A880C
25,132,585 UART: [art] PUB.Y = AC99FC09E77541ED58E07469043951AF6B6BB188A1F3D5B4EEE5443337D1B150E4FC25FAF05E69043E6CAF3B218BADE3
25,139,846 UART: [art] SIG.R = 7111B8B255A588DDA4DA2878DEF666636B098951A3348D4B6B455779E82AEEBC7A9EAE1896C383E703003A014527A713
25,147,217 UART: [art] SIG.S = 2925322D4C6806DA8017DDD18C5C30B272A7BAAEFCCA0332BB876EA1731F7DC690DCD6696DAF1B9EDF450C7B6E4AB6B7
26,126,545 UART: Caliptra RT
26,127,250 UART: [state] CFI Enabled
26,244,508 UART: [rt] RT listening for mailbox commands...
26,248,475 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,292,868 UART: [rt]cmd =0x4c4d5356, len=1672
26,706,303 >>> mbox cmd response data (8 bytes)
26,708,804 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,753,017 UART: [rt]cmd =0x4c4d5356, len=1672
26,971,457 >>> mbox cmd response data (8 bytes)
26,973,840 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,018,167 UART: [rt]cmd =0x4c4d5356, len=1672
27,235,311 >>> mbox cmd response data (8 bytes)
27,237,681 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,282,059 UART: [rt]cmd =0x4c4d5356, len=1672
27,497,262 >>> mbox cmd response data (8 bytes)
27,498,522 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,543,105 UART: [rt]cmd =0x4c4d5356, len=1672
27,760,992 >>> mbox cmd response data (8 bytes)
27,762,249 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,806,726 UART: [rt]cmd =0x4c4d5356, len=1672
28,022,403 >>> mbox cmd response data (8 bytes)
28,023,655 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,068,302 UART: [rt]cmd =0x4c4d5356, len=1672
28,284,466 >>> mbox cmd response data (8 bytes)
28,285,763 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,330,110 UART: [rt]cmd =0x4c4d5356, len=1672
28,548,801 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,769 writing to cptra_bootfsm_go
3,754,642 ready_for_fw is high
3,755,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,267 >>> mbox cmd response: success
19,199,428 UART:
19,199,821 UART: Running Caliptra FMC ...
19,200,966 UART:
19,201,150 UART: [state] CFI Enabled
19,208,944 UART: [fht] FMC Alias Private Key: 7
20,965,568 UART: [art] Extend RT PCRs Done
20,966,795 UART: [art] Lock RT PCRs Done
20,968,432 UART: [art] Populate DV Done
20,973,638 UART: [fht] FMC Alias Private Key: 7
20,975,236 UART: [art] Derive CDI
20,976,054 UART: [art] Store in in slot 0x4
21,018,554 UART: [art] Derive Key Pair
21,019,601 UART: [art] Store priv key in slot 0x5
23,446,455 UART: [art] Derive Key Pair - Done
23,459,411 UART: [art] Signing Cert with AUTHO
23,460,717 UART: RITY.KEYID = 7
25,166,279 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,794 UART: [art] PUB.X = 6BBAE841DCD09083CEF90EC6DA973C751F48F678C34CC4C3B49467BDA91CC58C5650BD2A2FE0F53BBBAD38C842F0C709
25,175,088 UART: [art] PUB.Y = 95E1DEA661299CA6B425DE97542DCF2A8930184694B551FC5E3E54A01118717C83816EDD98BBF15B27C3C18057FB5393
25,182,331 UART: [art] SIG.R = 6D9D500C5371AA95DB7D79CBAE2B410CB948CFFC656D1985D8726689A74765C4E5CDC6520216EA335A84A46B6DAB9011
25,189,722 UART: [art] SIG.S = D4ABF0350D25516D50C5E7D4684B1C06D8F788C9B7D3620FB875CC335CDD354B6937F4413D4BD5132E19D30EF4F2A75B
26,168,709 UART: Caliptra RT
26,169,405 UART: [state] CFI Enabled
26,286,328 UART: [rt] RT listening for mailbox commands...
26,290,380 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,334,763 UART: [rt]cmd =0x4c4d5356, len=1672
26,747,884 >>> mbox cmd response data (8 bytes)
26,750,356 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,794,732 UART: [rt]cmd =0x4c4d5356, len=1672
27,013,126 >>> mbox cmd response data (8 bytes)
27,015,549 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,059,936 UART: [rt]cmd =0x4c4d5356, len=1672
27,277,303 >>> mbox cmd response data (8 bytes)
27,279,683 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,324,277 UART: [rt]cmd =0x4c4d5356, len=1672
27,539,364 >>> mbox cmd response data (8 bytes)
27,540,643 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,584,924 UART: [rt]cmd =0x4c4d5356, len=1672
27,802,888 >>> mbox cmd response data (8 bytes)
27,804,158 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,848,581 UART: [rt]cmd =0x4c4d5356, len=1672
28,064,177 >>> mbox cmd response data (8 bytes)
28,065,435 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,109,702 UART: [rt]cmd =0x4c4d5356, len=1672
28,325,865 >>> mbox cmd response data (8 bytes)
28,327,116 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,371,325 UART: [rt]cmd =0x4c4d5356, len=1672
28,590,120 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,264 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,476,229 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 ready_for_fw is high
1,480,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,620 UART: [idev] Erasing UDS.KEYID = 0
1,505,330 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,890 UART: [idev] --
1,514,915 UART: [ldev] ++
1,515,083 UART: [ldev] CDI.KEYID = 6
1,515,446 UART: [ldev] SUBJECT.KEYID = 5
1,515,872 UART: [ldev] AUTHORITY.KEYID = 7
1,516,335 UART: [ldev] FE.KEYID = 1
1,521,601 UART: [ldev] Erasing FE.KEYID = 1
1,547,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,268 UART: [ldev] --
1,586,753 UART: [fwproc] Waiting for Commands...
1,587,406 UART: [fwproc] Received command 0x46574c44
1,588,197 UART: [fwproc] Received Image of size 114084 bytes
2,883,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,253 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,096 >>> mbox cmd response: success
3,076,164 UART: [afmc] ++
3,076,332 UART: [afmc] CDI.KEYID = 6
3,076,694 UART: [afmc] SUBJECT.KEYID = 7
3,077,119 UART: [afmc] AUTHORITY.KEYID = 5
3,111,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,401 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,091 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,994 UART: [afmc] --
3,154,984 UART: [cold-reset] --
3,155,726 UART: [state] Locking Datavault
3,157,101 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,705 UART: [state] Locking ICCM
3,158,221 UART: [exit] Launching FMC @ 0x40000130
3,163,550 UART:
3,163,566 UART: Running Caliptra FMC ...
3,163,974 UART:
3,164,028 UART: [state] CFI Enabled
3,174,307 UART: [fht] FMC Alias Private Key: 7
3,282,150 UART: [art] Extend RT PCRs Done
3,282,578 UART: [art] Lock RT PCRs Done
3,284,192 UART: [art] Populate DV Done
3,292,493 UART: [fht] FMC Alias Private Key: 7
3,293,617 UART: [art] Derive CDI
3,293,897 UART: [art] Store in in slot 0x4
3,379,558 UART: [art] Derive Key Pair
3,379,918 UART: [art] Store priv key in slot 0x5
3,393,140 UART: [art] Derive Key Pair - Done
3,408,068 UART: [art] Signing Cert with AUTHO
3,408,548 UART: RITY.KEYID = 7
3,423,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,437 UART: [art] PUB.X = 607E55DE3074F952BCC81AC644100B31152577F7391AD583F1622DAAFD398833C6312B05659D0775869DCA85F3DB8E33
3,431,194 UART: [art] PUB.Y = EB8C68EAE706F639D66EE12C21E1256C8EE4F475ADA0D83D35F4D8AA93F10AF2A912F12AEF3C19564B3B01268BF3EC20
3,438,153 UART: [art] SIG.R = 119B71C834CDFDDC4C56CEC33CBF82F101A5EF15CBDA172C693AE1BD499610A06EB42225D7A54A882E11A70DA3274BAA
3,444,937 UART: [art] SIG.S = 25191EB30B66D900E91F81757F873E77676665F30EC9AD4DAD1238BD24275F30ABF978A5708A3732D556B3C50C7598F5
3,467,801 UART: Caliptra RT
3,468,054 UART: [state] CFI Enabled
3,576,790 UART: [rt] RT listening for mailbox commands...
3,577,460 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,340 UART: [rt]cmd =0x4c4d5356, len=1672
4,138,541 >>> mbox cmd response data (8 bytes)
4,138,542 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,178,827 UART: [rt]cmd =0x4c4d5356, len=1672
4,455,412 >>> mbox cmd response data (8 bytes)
4,455,413 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,495,812 UART: [rt]cmd =0x4c4d5356, len=1672
4,772,119 >>> mbox cmd response data (8 bytes)
4,772,120 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,812,391 UART: [rt]cmd =0x4c4d5356, len=1672
5,084,342 >>> mbox cmd response data (8 bytes)
5,084,343 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,124,510 UART: [rt]cmd =0x4c4d5356, len=1672
5,396,029 >>> mbox cmd response data (8 bytes)
5,396,030 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,436,105 UART: [rt]cmd =0x4c4d5356, len=1672
5,710,387 >>> mbox cmd response data (8 bytes)
5,710,388 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,750,659 UART: [rt]cmd =0x4c4d5356, len=1672
6,022,296 >>> mbox cmd response data (8 bytes)
6,022,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,676 UART: [rt]cmd =0x4c4d5356, len=1672
6,336,398 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,583 ready_for_fw is high
1,362,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,326 >>> mbox cmd response: success
2,986,842 UART:
2,986,858 UART: Running Caliptra FMC ...
2,987,266 UART:
2,987,320 UART: [state] CFI Enabled
2,998,175 UART: [fht] FMC Alias Private Key: 7
3,105,932 UART: [art] Extend RT PCRs Done
3,106,360 UART: [art] Lock RT PCRs Done
3,107,982 UART: [art] Populate DV Done
3,116,011 UART: [fht] FMC Alias Private Key: 7
3,116,963 UART: [art] Derive CDI
3,117,243 UART: [art] Store in in slot 0x4
3,202,908 UART: [art] Derive Key Pair
3,203,268 UART: [art] Store priv key in slot 0x5
3,216,708 UART: [art] Derive Key Pair - Done
3,231,855 UART: [art] Signing Cert with AUTHO
3,232,335 UART: RITY.KEYID = 7
3,247,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,830 UART: [art] PUB.X = E95E9B86CD531A29C54C36886CA5FB0203D88EA27CBE6F7FBBAECE2C7EC6E6E5A9810135427AE2A7F2A3B337C7284EAA
3,254,613 UART: [art] PUB.Y = 447D79265B164698AE329A563BF26A264583961C37688DDF8F78C3F177C4104C4DCB065C0666A2D0066B30BD04F61E36
3,261,545 UART: [art] SIG.R = 2FCF99F45EB369C2DCE4618800581E28436806AB0C1F659613DE43AB9CFED3287471A3C766EFAED240568C78F63C6E51
3,268,293 UART: [art] SIG.S = 7E341C933816575A783C8F978327E3D3FEED48448763BF3585C956D6AFB82752A5E5B6C845D524634C4471147A7FA0C1
3,291,560 UART: Caliptra RT
3,291,813 UART: [state] CFI Enabled
3,399,095 UART: [rt] RT listening for mailbox commands...
3,399,765 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,603 UART: [rt]cmd =0x4c4d5356, len=1672
3,961,004 >>> mbox cmd response data (8 bytes)
3,961,005 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,984 UART: [rt]cmd =0x4c4d5356, len=1672
4,277,647 >>> mbox cmd response data (8 bytes)
4,277,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,317,613 UART: [rt]cmd =0x4c4d5356, len=1672
4,594,148 >>> mbox cmd response data (8 bytes)
4,594,149 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,634,336 UART: [rt]cmd =0x4c4d5356, len=1672
4,906,193 >>> mbox cmd response data (8 bytes)
4,906,194 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,946,395 UART: [rt]cmd =0x4c4d5356, len=1672
5,218,038 >>> mbox cmd response data (8 bytes)
5,218,039 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,258,222 UART: [rt]cmd =0x4c4d5356, len=1672
5,532,340 >>> mbox cmd response data (8 bytes)
5,532,341 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,572,538 UART: [rt]cmd =0x4c4d5356, len=1672
5,844,465 >>> mbox cmd response data (8 bytes)
5,844,466 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,647 UART: [rt]cmd =0x4c4d5356, len=1672
6,158,891 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,324 UART: [kat] SHA2-256
882,255 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,370 UART: [kat] ++
886,522 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
903,003 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,638 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 ready_for_fw is high
1,480,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,761 UART: [idev] Erasing UDS.KEYID = 0
1,504,991 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,455 UART: [idev] --
1,514,544 UART: [ldev] ++
1,514,712 UART: [ldev] CDI.KEYID = 6
1,515,075 UART: [ldev] SUBJECT.KEYID = 5
1,515,501 UART: [ldev] AUTHORITY.KEYID = 7
1,515,964 UART: [ldev] FE.KEYID = 1
1,521,300 UART: [ldev] Erasing FE.KEYID = 1
1,546,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,047 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,205 UART: [fwproc] Received command 0x46574c44
1,587,996 UART: [fwproc] Received Image of size 114084 bytes
2,882,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,945 >>> mbox cmd response: success
3,076,103 UART: [afmc] ++
3,076,271 UART: [afmc] CDI.KEYID = 6
3,076,633 UART: [afmc] SUBJECT.KEYID = 7
3,077,058 UART: [afmc] AUTHORITY.KEYID = 5
3,111,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,282 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,972 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,973 UART: [afmc] --
3,154,915 UART: [cold-reset] --
3,155,841 UART: [state] Locking Datavault
3,157,076 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,680 UART: [state] Locking ICCM
3,158,266 UART: [exit] Launching FMC @ 0x40000130
3,163,595 UART:
3,163,611 UART: Running Caliptra FMC ...
3,164,019 UART:
3,164,162 UART: [state] CFI Enabled
3,174,729 UART: [fht] FMC Alias Private Key: 7
3,282,614 UART: [art] Extend RT PCRs Done
3,283,042 UART: [art] Lock RT PCRs Done
3,284,566 UART: [art] Populate DV Done
3,292,649 UART: [fht] FMC Alias Private Key: 7
3,293,619 UART: [art] Derive CDI
3,293,899 UART: [art] Store in in slot 0x4
3,379,260 UART: [art] Derive Key Pair
3,379,620 UART: [art] Store priv key in slot 0x5
3,392,800 UART: [art] Derive Key Pair - Done
3,407,591 UART: [art] Signing Cert with AUTHO
3,408,071 UART: RITY.KEYID = 7
3,423,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,276 UART: [art] PUB.X = DA1AC92512E67082F17466C73A22E906B8F15F0024D7969940D0361A958FE21E2F00760508A31F619212E5BEEEE2BAA4
3,430,991 UART: [art] PUB.Y = 50CE3A307D9DB71524E4E1F0E0F49E4E2143D781794E2BAA4D0D466FAF272CA78A162E54F1A6383B39F53739391A0974
3,437,937 UART: [art] SIG.R = C4E7E3D3C6DFD835A636B6F78524141DD2A657F673B6083D233280FFEC45E4E0020666B235ABAAE95DDFAF2B0D2AE379
3,444,709 UART: [art] SIG.S = 1FD2215660E65A71EA74521F7EF8606D9905B2A35BDA1B713A4CAF8D5F51F798ADDF55204AD3A349F609BB0ECC5438C9
3,468,765 UART: Caliptra RT
3,469,110 UART: [state] CFI Enabled
3,578,693 UART: [rt] RT listening for mailbox commands...
3,579,363 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,353 UART: [rt]cmd =0x4c4d5356, len=1672
4,140,494 >>> mbox cmd response data (8 bytes)
4,140,495 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,180,924 UART: [rt]cmd =0x4c4d5356, len=1672
4,457,287 >>> mbox cmd response data (8 bytes)
4,457,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,497,593 UART: [rt]cmd =0x4c4d5356, len=1672
4,774,176 >>> mbox cmd response data (8 bytes)
4,774,177 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,814,098 UART: [rt]cmd =0x4c4d5356, len=1672
5,085,815 >>> mbox cmd response data (8 bytes)
5,085,816 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,145 UART: [rt]cmd =0x4c4d5356, len=1672
5,397,780 >>> mbox cmd response data (8 bytes)
5,397,781 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,437,886 UART: [rt]cmd =0x4c4d5356, len=1672
5,711,950 >>> mbox cmd response data (8 bytes)
5,711,951 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,752,100 UART: [rt]cmd =0x4c4d5356, len=1672
6,023,551 >>> mbox cmd response data (8 bytes)
6,023,552 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,063,687 UART: [rt]cmd =0x4c4d5356, len=1672
6,337,847 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,240 ready_for_fw is high
1,362,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,929 >>> mbox cmd response: success
2,985,713 UART:
2,985,729 UART: Running Caliptra FMC ...
2,986,137 UART:
2,986,280 UART: [state] CFI Enabled
2,996,459 UART: [fht] FMC Alias Private Key: 7
3,104,848 UART: [art] Extend RT PCRs Done
3,105,276 UART: [art] Lock RT PCRs Done
3,106,724 UART: [art] Populate DV Done
3,114,997 UART: [fht] FMC Alias Private Key: 7
3,116,171 UART: [art] Derive CDI
3,116,451 UART: [art] Store in in slot 0x4
3,201,984 UART: [art] Derive Key Pair
3,202,344 UART: [art] Store priv key in slot 0x5
3,215,222 UART: [art] Derive Key Pair - Done
3,229,685 UART: [art] Signing Cert with AUTHO
3,230,165 UART: RITY.KEYID = 7
3,245,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,452 UART: [art] PUB.X = BFA5A6784431E1B4F3B4EF30B1463E3A37350550B9E8881195C844F60E2869EEC0B531EF25C66E73F034189D8FD860E7
3,253,216 UART: [art] PUB.Y = 64CE040CB02F7BF8F18FF9063425D8B2FD811EF05A973DF197D59FF17156361201BA9E709A2BA32A70AC5D97C88671FA
3,260,162 UART: [art] SIG.R = 6518807ECCDE4B07A13FD4668C249C22CB2B545933B686879A7E0C04D334DE6FF344E1154A49E66D51B7DA0C91DE83B5
3,266,926 UART: [art] SIG.S = E69B5A29C318362A9BFB27B1FD081055489500BF590CB3DB207CDFA1A5304FBBB403F14A49DCFCA2F6E3DB02A9B2B164
3,290,057 UART: Caliptra RT
3,290,402 UART: [state] CFI Enabled
3,397,849 UART: [rt] RT listening for mailbox commands...
3,398,519 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,101 UART: [rt]cmd =0x4c4d5356, len=1672
3,959,570 >>> mbox cmd response data (8 bytes)
3,959,571 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,040 UART: [rt]cmd =0x4c4d5356, len=1672
4,276,471 >>> mbox cmd response data (8 bytes)
4,276,472 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,316,719 UART: [rt]cmd =0x4c4d5356, len=1672
4,593,176 >>> mbox cmd response data (8 bytes)
4,593,177 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,633,364 UART: [rt]cmd =0x4c4d5356, len=1672
4,904,951 >>> mbox cmd response data (8 bytes)
4,904,952 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,945,053 UART: [rt]cmd =0x4c4d5356, len=1672
5,216,700 >>> mbox cmd response data (8 bytes)
5,216,701 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,256,938 UART: [rt]cmd =0x4c4d5356, len=1672
5,531,062 >>> mbox cmd response data (8 bytes)
5,531,063 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,571,382 UART: [rt]cmd =0x4c4d5356, len=1672
5,843,327 >>> mbox cmd response data (8 bytes)
5,843,328 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,727 UART: [rt]cmd =0x4c4d5356, len=1672
6,158,043 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
892,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,033 UART: [kat] ++
897,185 UART: [kat] sha1
901,249 UART: [kat] SHA2-256
903,189 UART: [kat] SHA2-384
905,974 UART: [kat] SHA2-512-ACC
907,875 UART: [kat] ECC-384
917,962 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,441 UART: [cold-reset] ++
1,172,013 UART: [fht] FHT @ 0x50003400
1,174,472 UART: [idev] ++
1,174,640 UART: [idev] CDI.KEYID = 6
1,175,000 UART: [idev] SUBJECT.KEYID = 7
1,175,424 UART: [idev] UDS.KEYID = 0
1,175,769 ready_for_fw is high
1,175,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,731 UART: [idev] Sha1 KeyId Algorithm
1,208,189 UART: [idev] --
1,209,205 UART: [ldev] ++
1,209,373 UART: [ldev] CDI.KEYID = 6
1,209,736 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,788 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x46574c44
1,283,230 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,647 >>> mbox cmd response: success
2,771,785 UART: [afmc] ++
2,771,953 UART: [afmc] CDI.KEYID = 6
2,772,315 UART: [afmc] SUBJECT.KEYID = 7
2,772,740 UART: [afmc] AUTHORITY.KEYID = 5
2,808,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,595 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,190 UART: [afmc] --
2,852,214 UART: [cold-reset] --
2,852,974 UART: [state] Locking Datavault
2,854,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,797 UART: [state] Locking ICCM
2,855,267 UART: [exit] Launching FMC @ 0x40000130
2,860,596 UART:
2,860,612 UART: Running Caliptra FMC ...
2,861,020 UART:
2,861,074 UART: [state] CFI Enabled
2,871,881 UART: [fht] FMC Alias Private Key: 7
2,979,686 UART: [art] Extend RT PCRs Done
2,980,114 UART: [art] Lock RT PCRs Done
2,981,726 UART: [art] Populate DV Done
2,989,829 UART: [fht] FMC Alias Private Key: 7
2,990,793 UART: [art] Derive CDI
2,991,073 UART: [art] Store in in slot 0x4
3,076,286 UART: [art] Derive Key Pair
3,076,646 UART: [art] Store priv key in slot 0x5
3,089,594 UART: [art] Derive Key Pair - Done
3,104,456 UART: [art] Signing Cert with AUTHO
3,104,936 UART: RITY.KEYID = 7
3,120,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,081 UART: [art] PUB.X = C5D1318A703F5FC71DDC7A47F82A42F6C8E932B7EE67D4F8F3405B256BEFAC3DB42CB5AE4BFF0AF649D031BCD0D0EF1F
3,127,878 UART: [art] PUB.Y = 2DA696A0FF8F50A929B07E5A3D2BA7BB75B242D94CBD6418922881DE88C90E472F444F3B324AF819571CB8E1F2557D78
3,134,831 UART: [art] SIG.R = F7A921E0D97D259524DBA89C2FDC1B3FB9192DC599D6221E5DC6A8E1CF8D93EFE31718CA0C15701DC378EF35511EE12B
3,141,614 UART: [art] SIG.S = 6B4F9B6FE771E60D478D47655D3865EED9B007DDB15B2B3296B752D8F86EC1636D64008C2A91B481A435770CDF92044C
3,164,997 UART: Caliptra RT
3,165,250 UART: [state] CFI Enabled
3,273,049 UART: [rt] RT listening for mailbox commands...
3,273,719 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,287 UART: [rt]cmd =0x4c4d5356, len=1672
3,834,642 >>> mbox cmd response data (8 bytes)
3,834,643 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,888 UART: [rt]cmd =0x4c4d5356, len=1672
4,151,305 >>> mbox cmd response data (8 bytes)
4,151,306 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,191,407 UART: [rt]cmd =0x4c4d5356, len=1672
4,467,826 >>> mbox cmd response data (8 bytes)
4,467,827 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,508,288 UART: [rt]cmd =0x4c4d5356, len=1672
4,779,797 >>> mbox cmd response data (8 bytes)
4,779,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,819,903 UART: [rt]cmd =0x4c4d5356, len=1672
5,091,492 >>> mbox cmd response data (8 bytes)
5,091,493 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,584 UART: [rt]cmd =0x4c4d5356, len=1672
5,405,744 >>> mbox cmd response data (8 bytes)
5,405,745 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,445,794 UART: [rt]cmd =0x4c4d5356, len=1672
5,717,461 >>> mbox cmd response data (8 bytes)
5,717,462 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,539 UART: [rt]cmd =0x4c4d5356, len=1672
6,031,505 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,845 ready_for_fw is high
1,060,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,854 >>> mbox cmd response: success
2,685,790 UART:
2,685,806 UART: Running Caliptra FMC ...
2,686,214 UART:
2,686,268 UART: [state] CFI Enabled
2,696,509 UART: [fht] FMC Alias Private Key: 7
2,805,092 UART: [art] Extend RT PCRs Done
2,805,520 UART: [art] Lock RT PCRs Done
2,807,190 UART: [art] Populate DV Done
2,815,339 UART: [fht] FMC Alias Private Key: 7
2,816,401 UART: [art] Derive CDI
2,816,681 UART: [art] Store in in slot 0x4
2,902,412 UART: [art] Derive Key Pair
2,902,772 UART: [art] Store priv key in slot 0x5
2,915,970 UART: [art] Derive Key Pair - Done
2,930,916 UART: [art] Signing Cert with AUTHO
2,931,396 UART: RITY.KEYID = 7
2,946,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,211 UART: [art] PUB.X = 2B05ED08E40693C457C0DA008F00FDDCF487059A0254A8A8D5574B9ED6AF80DFCE1D4383B7C99863BD997FE713A50BFC
2,953,933 UART: [art] PUB.Y = 96A870BE2EAB1C04597829E49247599C72E23D1DEAC1F09C5EECC7A8750D0688DE514AFAE526C341BEDFCDFB4144315C
2,960,890 UART: [art] SIG.R = 58C296234B9412DBDDFECBCB1C37C6BB5F1DA825A4D4AA81B96DEFF387B9678375C2EA8CD11B3E5BAD95C11EF0285123
2,967,682 UART: [art] SIG.S = AD64E673422B9C929EC9758A0B94E4B84E4C86728292F8407F96381E0F3AEF6A0F15F65FC9C1E4CCDBA92F63259EBF6E
2,991,156 UART: Caliptra RT
2,991,409 UART: [state] CFI Enabled
3,098,402 UART: [rt] RT listening for mailbox commands...
3,099,072 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,264 UART: [rt]cmd =0x4c4d5356, len=1672
3,659,603 >>> mbox cmd response data (8 bytes)
3,659,604 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,727 UART: [rt]cmd =0x4c4d5356, len=1672
3,976,332 >>> mbox cmd response data (8 bytes)
3,976,333 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,448 UART: [rt]cmd =0x4c4d5356, len=1672
4,293,151 >>> mbox cmd response data (8 bytes)
4,293,152 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,333,393 UART: [rt]cmd =0x4c4d5356, len=1672
4,604,966 >>> mbox cmd response data (8 bytes)
4,604,967 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,645,332 UART: [rt]cmd =0x4c4d5356, len=1672
4,916,791 >>> mbox cmd response data (8 bytes)
4,916,792 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,957,025 UART: [rt]cmd =0x4c4d5356, len=1672
5,231,185 >>> mbox cmd response data (8 bytes)
5,231,186 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,271,401 UART: [rt]cmd =0x4c4d5356, len=1672
5,542,736 >>> mbox cmd response data (8 bytes)
5,542,737 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,930 UART: [rt]cmd =0x4c4d5356, len=1672
5,856,938 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
901,978 UART: [kat] SHA2-256
903,918 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,172,784 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 ready_for_fw is high
1,176,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,333 UART: [idev] Erasing UDS.KEYID = 0
1,201,344 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,211,192 UART: [ldev] ++
1,211,360 UART: [ldev] CDI.KEYID = 6
1,211,723 UART: [ldev] SUBJECT.KEYID = 5
1,212,149 UART: [ldev] AUTHORITY.KEYID = 7
1,212,612 UART: [ldev] FE.KEYID = 1
1,218,128 UART: [ldev] Erasing FE.KEYID = 1
1,244,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,702 UART: [ldev] --
1,283,149 UART: [fwproc] Wait for Commands...
1,283,771 UART: [fwproc] Recv command 0x46574c44
1,284,499 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,784 >>> mbox cmd response: success
2,771,922 UART: [afmc] ++
2,772,090 UART: [afmc] CDI.KEYID = 6
2,772,452 UART: [afmc] SUBJECT.KEYID = 7
2,772,877 UART: [afmc] AUTHORITY.KEYID = 5
2,808,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,615 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,357 UART: [afmc] --
2,852,345 UART: [cold-reset] --
2,853,063 UART: [state] Locking Datavault
2,854,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,898 UART: [state] Locking ICCM
2,855,392 UART: [exit] Launching FMC @ 0x40000130
2,860,721 UART:
2,860,737 UART: Running Caliptra FMC ...
2,861,145 UART:
2,861,288 UART: [state] CFI Enabled
2,871,847 UART: [fht] FMC Alias Private Key: 7
2,979,452 UART: [art] Extend RT PCRs Done
2,979,880 UART: [art] Lock RT PCRs Done
2,981,540 UART: [art] Populate DV Done
2,989,595 UART: [fht] FMC Alias Private Key: 7
2,990,523 UART: [art] Derive CDI
2,990,803 UART: [art] Store in in slot 0x4
3,076,478 UART: [art] Derive Key Pair
3,076,838 UART: [art] Store priv key in slot 0x5
3,090,018 UART: [art] Derive Key Pair - Done
3,104,737 UART: [art] Signing Cert with AUTHO
3,105,217 UART: RITY.KEYID = 7
3,120,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,228 UART: [art] PUB.X = 1CE041AC165B983110E64EE0DC632297EFFC02153C1BC79A25A596312BDB4B151E6329D1E6783940E4C31D1614CAD245
3,127,997 UART: [art] PUB.Y = B9D735D1FAD282519F5030391131BDBBB490BB20D55E74C5FD19F98EF8B292A9C465B6CD9F45B49EA897806FFE4991F2
3,134,957 UART: [art] SIG.R = 61A3D45D42716E29D8FD390C1EA5C5E685E398BBEEB895623E7C23824F7BB28C128603B9FFBE1E29E5D5A191B0CB8D5F
3,141,735 UART: [art] SIG.S = E62FD34FFF66306B58AAD21985516F4EE602E35DEFEB2A16150BC2D865953F005FA075A0343FED91DDC777B36C921591
3,165,158 UART: Caliptra RT
3,165,503 UART: [state] CFI Enabled
3,273,570 UART: [rt] RT listening for mailbox commands...
3,274,240 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,934 UART: [rt]cmd =0x4c4d5356, len=1672
3,835,469 >>> mbox cmd response data (8 bytes)
3,835,470 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,687 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,194 >>> mbox cmd response data (8 bytes)
4,152,195 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,576 UART: [rt]cmd =0x4c4d5356, len=1672
4,469,201 >>> mbox cmd response data (8 bytes)
4,469,202 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,509,405 UART: [rt]cmd =0x4c4d5356, len=1672
4,780,762 >>> mbox cmd response data (8 bytes)
4,780,763 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,821,170 UART: [rt]cmd =0x4c4d5356, len=1672
5,092,851 >>> mbox cmd response data (8 bytes)
5,092,852 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,133,105 UART: [rt]cmd =0x4c4d5356, len=1672
5,407,157 >>> mbox cmd response data (8 bytes)
5,407,158 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,447,275 UART: [rt]cmd =0x4c4d5356, len=1672
5,718,832 >>> mbox cmd response data (8 bytes)
5,718,833 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,160 UART: [rt]cmd =0x4c4d5356, len=1672
6,033,246 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,070 ready_for_fw is high
1,061,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,193 >>> mbox cmd response: success
2,686,641 UART:
2,686,657 UART: Running Caliptra FMC ...
2,687,065 UART:
2,687,208 UART: [state] CFI Enabled
2,697,581 UART: [fht] FMC Alias Private Key: 7
2,805,774 UART: [art] Extend RT PCRs Done
2,806,202 UART: [art] Lock RT PCRs Done
2,807,562 UART: [art] Populate DV Done
2,815,429 UART: [fht] FMC Alias Private Key: 7
2,816,541 UART: [art] Derive CDI
2,816,821 UART: [art] Store in in slot 0x4
2,902,718 UART: [art] Derive Key Pair
2,903,078 UART: [art] Store priv key in slot 0x5
2,916,590 UART: [art] Derive Key Pair - Done
2,931,085 UART: [art] Signing Cert with AUTHO
2,931,565 UART: RITY.KEYID = 7
2,946,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,422 UART: [art] PUB.X = A03E8CFC5D0F5764DF07527DD631C893CFD95DD26C03C1AF5DAF8F865C24EC331A0DEBA352891319E44294D841E3514E
2,954,192 UART: [art] PUB.Y = 9F3E0A1505390BC44B9C6CFD7A9D4591FD612A061515EDAA1D9CF5ABF4AD024C6C3729F38DF98F92873E7954F45FDEF6
2,961,143 UART: [art] SIG.R = CC4E9D2EED23B815D0D42FD98351D55F53E1B4807A3293004CFB440A546D0FCB2D9A370DF8C08141A181E90693BA8A06
2,967,884 UART: [art] SIG.S = 16B880560B5326788928D65CBE69662A4696F172D9F342E6AEB4BBD73995272A1E4048B7C5C7E02A47BD95753A77BBED
2,991,444 UART: Caliptra RT
2,991,789 UART: [state] CFI Enabled
3,099,716 UART: [rt] RT listening for mailbox commands...
3,100,386 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,968 UART: [rt]cmd =0x4c4d5356, len=1672
3,661,043 >>> mbox cmd response data (8 bytes)
3,661,044 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,369 UART: [rt]cmd =0x4c4d5356, len=1672
3,977,760 >>> mbox cmd response data (8 bytes)
3,977,761 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,058 UART: [rt]cmd =0x4c4d5356, len=1672
4,294,749 >>> mbox cmd response data (8 bytes)
4,294,750 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,815 UART: [rt]cmd =0x4c4d5356, len=1672
4,606,386 >>> mbox cmd response data (8 bytes)
4,606,387 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,646,438 UART: [rt]cmd =0x4c4d5356, len=1672
4,918,109 >>> mbox cmd response data (8 bytes)
4,918,110 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,958,259 UART: [rt]cmd =0x4c4d5356, len=1672
5,232,311 >>> mbox cmd response data (8 bytes)
5,232,312 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,272,335 UART: [rt]cmd =0x4c4d5356, len=1672
5,543,934 >>> mbox cmd response data (8 bytes)
5,543,935 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,140 UART: [rt]cmd =0x4c4d5356, len=1672
5,858,038 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 ready_for_fw is high
1,174,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,902 UART: [ldev] ++
1,209,070 UART: [ldev] CDI.KEYID = 6
1,209,434 UART: [ldev] SUBJECT.KEYID = 5
1,209,861 UART: [ldev] AUTHORITY.KEYID = 7
1,210,324 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,166 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,183 UART: [fwproc] Recv command 0x46574c44
1,281,916 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,831 >>> mbox cmd response: success
2,770,930 UART: [afmc] ++
2,771,098 UART: [afmc] CDI.KEYID = 6
2,771,461 UART: [afmc] SUBJECT.KEYID = 7
2,771,887 UART: [afmc] AUTHORITY.KEYID = 5
2,807,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,853 UART: [afmc] --
2,850,955 UART: [cold-reset] --
2,851,699 UART: [state] Locking Datavault
2,852,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,486 UART: [state] Locking ICCM
2,854,040 UART: [exit] Launching FMC @ 0x40000130
2,859,369 UART:
2,859,385 UART: Running Caliptra FMC ...
2,859,793 UART:
2,859,847 UART: [state] CFI Enabled
2,870,550 UART: [fht] FMC Alias Private Key: 7
2,977,909 UART: [art] Extend RT PCRs Done
2,978,337 UART: [art] Lock RT PCRs Done
2,979,533 UART: [art] Populate DV Done
2,987,846 UART: [fht] FMC Alias Private Key: 7
2,988,846 UART: [art] Derive CDI
2,989,126 UART: [art] Store in in slot 0x4
3,074,939 UART: [art] Derive Key Pair
3,075,299 UART: [art] Store priv key in slot 0x5
3,088,353 UART: [art] Derive Key Pair - Done
3,103,592 UART: [art] Signing Cert with AUTHO
3,104,072 UART: RITY.KEYID = 7
3,119,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,511 UART: [art] PUB.X = F7C8D7AB322381CE76256A8C39E33F84ADE71185C7CEA9B3C0BCC6E1B6807B008359E958907F07DA6CC82A9C15A5B434
3,127,266 UART: [art] PUB.Y = 0092329C770DA6CB8949152A55D195116DF799E3518523171CEF32ED3EFAADB2F149931EA519AA70D5224E36BFCAD339
3,134,195 UART: [art] SIG.R = 09C5C60CEEA2CB25A5830C6C3A7C6F18DBB619374FD9A33EA2B3CD56769011359EF5C7F6CD8C2B523E2524406428637E
3,140,964 UART: [art] SIG.S = 50C8C4C4ACF757CF9F8344ADDA088B1186B6A65FB8364D3111821F9D9E1FB980FE4CDF1310D27A97DF920697198D7CD5
3,165,413 UART: Caliptra RT
3,165,666 UART: [state] CFI Enabled
3,272,893 UART: [rt] RT listening for mailbox commands...
3,273,563 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,223 UART: [rt]cmd =0x4c4d5356, len=1672
3,834,458 >>> mbox cmd response data (8 bytes)
3,834,459 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,382 UART: [rt]cmd =0x4c4d5356, len=1672
4,150,615 >>> mbox cmd response data (8 bytes)
4,150,616 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,190,629 UART: [rt]cmd =0x4c4d5356, len=1672
4,467,278 >>> mbox cmd response data (8 bytes)
4,467,279 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,507,318 UART: [rt]cmd =0x4c4d5356, len=1672
4,779,031 >>> mbox cmd response data (8 bytes)
4,779,032 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,819,317 UART: [rt]cmd =0x4c4d5356, len=1672
5,090,872 >>> mbox cmd response data (8 bytes)
5,090,873 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,131,084 UART: [rt]cmd =0x4c4d5356, len=1672
5,405,406 >>> mbox cmd response data (8 bytes)
5,405,407 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,445,436 UART: [rt]cmd =0x4c4d5356, len=1672
5,717,009 >>> mbox cmd response data (8 bytes)
5,717,010 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,117 UART: [rt]cmd =0x4c4d5356, len=1672
6,031,203 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,692 ready_for_fw is high
1,055,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,347 >>> mbox cmd response: success
2,679,999 UART:
2,680,015 UART: Running Caliptra FMC ...
2,680,423 UART:
2,680,477 UART: [state] CFI Enabled
2,691,194 UART: [fht] FMC Alias Private Key: 7
2,798,391 UART: [art] Extend RT PCRs Done
2,798,819 UART: [art] Lock RT PCRs Done
2,800,257 UART: [art] Populate DV Done
2,808,648 UART: [fht] FMC Alias Private Key: 7
2,809,700 UART: [art] Derive CDI
2,809,980 UART: [art] Store in in slot 0x4
2,895,863 UART: [art] Derive Key Pair
2,896,223 UART: [art] Store priv key in slot 0x5
2,909,695 UART: [art] Derive Key Pair - Done
2,924,576 UART: [art] Signing Cert with AUTHO
2,925,056 UART: RITY.KEYID = 7
2,939,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,615 UART: [art] PUB.X = FDFA43AF0B946CD68F70AD2C84E3769DC17FA66F62D5EC0562ACD48B363D963824A810408FC6796619565BFADB5E7B04
2,947,388 UART: [art] PUB.Y = 15260FF21B7623160C8409BB8076657AA402AEE89F7D6345E7ECF014318CD39089B284CADB401A432229A147D6CD1933
2,954,322 UART: [art] SIG.R = 6A98F39814F2CDABF8FB4A57956CE0933E0ACFF1A32F05715BF95B5EBECE0CC5E6F3CD09277B9BB240A97B785A24E07B
2,961,102 UART: [art] SIG.S = D36D8226EBA3197AEE6B0C8DD7FE96A00B27E2B1520EBEDAE7026437F2D1DFCAC4E7DE4C9AC4B532D7E5E7BE7859732B
2,984,767 UART: Caliptra RT
2,985,020 UART: [state] CFI Enabled
3,092,435 UART: [rt] RT listening for mailbox commands...
3,093,105 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,751 UART: [rt]cmd =0x4c4d5356, len=1672
3,654,128 >>> mbox cmd response data (8 bytes)
3,654,129 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,134 UART: [rt]cmd =0x4c4d5356, len=1672
3,970,627 >>> mbox cmd response data (8 bytes)
3,970,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,010,787 UART: [rt]cmd =0x4c4d5356, len=1672
4,287,382 >>> mbox cmd response data (8 bytes)
4,287,383 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,327,490 UART: [rt]cmd =0x4c4d5356, len=1672
4,599,055 >>> mbox cmd response data (8 bytes)
4,599,056 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,639,407 UART: [rt]cmd =0x4c4d5356, len=1672
4,910,970 >>> mbox cmd response data (8 bytes)
4,910,971 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,162 UART: [rt]cmd =0x4c4d5356, len=1672
5,225,326 >>> mbox cmd response data (8 bytes)
5,225,327 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,265,582 UART: [rt]cmd =0x4c4d5356, len=1672
5,537,201 >>> mbox cmd response data (8 bytes)
5,537,202 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,577,291 UART: [rt]cmd =0x4c4d5356, len=1672
5,851,639 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,174,760 ready_for_fw is high
1,174,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,872 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,281,941 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,572 >>> mbox cmd response: success
2,771,819 UART: [afmc] ++
2,771,987 UART: [afmc] CDI.KEYID = 6
2,772,350 UART: [afmc] SUBJECT.KEYID = 7
2,772,776 UART: [afmc] AUTHORITY.KEYID = 5
2,808,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,028 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,757 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,010 UART: [afmc] --
2,851,990 UART: [cold-reset] --
2,852,746 UART: [state] Locking Datavault
2,853,727 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,331 UART: [state] Locking ICCM
2,854,903 UART: [exit] Launching FMC @ 0x40000130
2,860,232 UART:
2,860,248 UART: Running Caliptra FMC ...
2,860,656 UART:
2,860,799 UART: [state] CFI Enabled
2,871,212 UART: [fht] FMC Alias Private Key: 7
2,978,915 UART: [art] Extend RT PCRs Done
2,979,343 UART: [art] Lock RT PCRs Done
2,981,283 UART: [art] Populate DV Done
2,989,590 UART: [fht] FMC Alias Private Key: 7
2,990,530 UART: [art] Derive CDI
2,990,810 UART: [art] Store in in slot 0x4
3,076,971 UART: [art] Derive Key Pair
3,077,331 UART: [art] Store priv key in slot 0x5
3,090,525 UART: [art] Derive Key Pair - Done
3,105,624 UART: [art] Signing Cert with AUTHO
3,106,104 UART: RITY.KEYID = 7
3,121,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,875 UART: [art] PUB.X = B388D3E95F5C86ABDE1250547E952A016ABE9A204F30E60E41751D276E324B1E215467F81EC35DDD4B1A687426C677EC
3,128,643 UART: [art] PUB.Y = 95CE0DEFB6A85EEC10792481297EB6754453CE2F4D4CEC4370F641C903D18AF6A529FA69A0B888F4EDBEA0E093AAC5D1
3,135,605 UART: [art] SIG.R = 3CDB5701ACE0A6BCED38F5282685D57244FF72658DD16AE3FFA760F9581B70FCFAEB8DA81EB8EBBE8525808B65E8091E
3,142,389 UART: [art] SIG.S = BF5BE840D6A070EABEBEDCF1C40A563E848B617DCC4F3E2C29EC84C926D7769293F3F8252549244105DFCDE14DE04BD5
3,165,768 UART: Caliptra RT
3,166,113 UART: [state] CFI Enabled
3,275,094 UART: [rt] RT listening for mailbox commands...
3,275,764 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,534 UART: [rt]cmd =0x4c4d5356, len=1672
3,836,927 >>> mbox cmd response data (8 bytes)
3,836,928 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,023 UART: [rt]cmd =0x4c4d5356, len=1672
4,153,378 >>> mbox cmd response data (8 bytes)
4,153,379 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,746 UART: [rt]cmd =0x4c4d5356, len=1672
4,470,163 >>> mbox cmd response data (8 bytes)
4,470,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,510,345 UART: [rt]cmd =0x4c4d5356, len=1672
4,782,076 >>> mbox cmd response data (8 bytes)
4,782,077 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,822,422 UART: [rt]cmd =0x4c4d5356, len=1672
5,094,063 >>> mbox cmd response data (8 bytes)
5,094,064 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,134,331 UART: [rt]cmd =0x4c4d5356, len=1672
5,408,647 >>> mbox cmd response data (8 bytes)
5,408,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,448,891 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,392 >>> mbox cmd response data (8 bytes)
5,720,393 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,440 UART: [rt]cmd =0x4c4d5356, len=1672
6,034,620 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,155 ready_for_fw is high
1,056,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,168 >>> mbox cmd response: success
2,681,100 UART:
2,681,116 UART: Running Caliptra FMC ...
2,681,524 UART:
2,681,667 UART: [state] CFI Enabled
2,692,006 UART: [fht] FMC Alias Private Key: 7
2,800,815 UART: [art] Extend RT PCRs Done
2,801,243 UART: [art] Lock RT PCRs Done
2,802,731 UART: [art] Populate DV Done
2,811,094 UART: [fht] FMC Alias Private Key: 7
2,812,162 UART: [art] Derive CDI
2,812,442 UART: [art] Store in in slot 0x4
2,898,045 UART: [art] Derive Key Pair
2,898,405 UART: [art] Store priv key in slot 0x5
2,911,861 UART: [art] Derive Key Pair - Done
2,926,656 UART: [art] Signing Cert with AUTHO
2,927,136 UART: RITY.KEYID = 7
2,942,454 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,219 UART: [art] PUB.X = 2BE44D6D74542A1752126F574D15F1A3CDABD69CA5E166DBFCA875F6CCF5A0A6915E753E63EF1BC336FA49EA8CB54A8F
2,950,011 UART: [art] PUB.Y = 10C4BEB7F1D3A6D8D0085A7C6A2A35C379AE6D66434E2F27AC7BEA9282083207A3FC1111A01D05E1703EBD2321F2CD4D
2,956,961 UART: [art] SIG.R = 8B6593CBEFB64C4CC6CB664C2A3AAFFDF958CDD7C307D91FA4F89ED54E8125AD0A734615E708D4A9D51F09456B0B5F01
2,963,733 UART: [art] SIG.S = 4EA484521949B7534C5C89D7D39B9A194CB5F4583A57406582CA9D23B935C501C6C7DE28BD749D8A36FB79659423E5A2
2,987,193 UART: Caliptra RT
2,987,538 UART: [state] CFI Enabled
3,094,639 UART: [rt] RT listening for mailbox commands...
3,095,309 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,251 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,718 >>> mbox cmd response data (8 bytes)
3,656,719 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,924 UART: [rt]cmd =0x4c4d5356, len=1672
3,973,751 >>> mbox cmd response data (8 bytes)
3,973,752 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,093 UART: [rt]cmd =0x4c4d5356, len=1672
4,290,542 >>> mbox cmd response data (8 bytes)
4,290,543 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,330,558 UART: [rt]cmd =0x4c4d5356, len=1672
4,602,353 >>> mbox cmd response data (8 bytes)
4,602,354 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,642,473 UART: [rt]cmd =0x4c4d5356, len=1672
4,913,994 >>> mbox cmd response data (8 bytes)
4,913,995 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,954,360 UART: [rt]cmd =0x4c4d5356, len=1672
5,228,390 >>> mbox cmd response data (8 bytes)
5,228,391 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,268,654 UART: [rt]cmd =0x4c4d5356, len=1672
5,540,345 >>> mbox cmd response data (8 bytes)
5,540,346 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,421 UART: [rt]cmd =0x4c4d5356, len=1672
5,854,413 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,039 UART:
192,424 UART: Running Caliptra ROM ...
193,519 UART:
193,663 UART: [state] CFI Enabled
265,441 UART: [state] LifecycleState = Unprovisioned
267,426 UART: [state] DebugLocked = No
270,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,535 UART: [kat] SHA2-256
444,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,733 UART: [kat] ++
455,206 UART: [kat] sha1
465,723 UART: [kat] SHA2-256
468,454 UART: [kat] SHA2-384
475,365 UART: [kat] SHA2-512-ACC
477,740 UART: [kat] ECC-384
2,767,244 UART: [kat] HMAC-384Kdf
2,800,327 UART: [kat] LMS
3,990,592 UART: [kat] --
3,996,263 UART: [cold-reset] ++
3,998,910 UART: [fht] Storing FHT @ 0x50003400
4,010,959 UART: [idev] ++
4,011,537 UART: [idev] CDI.KEYID = 6
4,012,478 UART: [idev] SUBJECT.KEYID = 7
4,013,724 UART: [idev] UDS.KEYID = 0
4,014,771 ready_for_fw is high
4,014,979 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,158,166 UART: [idev] Erasing UDS.KEYID = 0
7,348,052 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,939 UART: [idev] --
7,374,448 UART: [ldev] ++
7,375,019 UART: [ldev] CDI.KEYID = 6
7,375,986 UART: [ldev] SUBJECT.KEYID = 5
7,377,199 UART: [ldev] AUTHORITY.KEYID = 7
7,378,434 UART: [ldev] FE.KEYID = 1
7,424,028 UART: [ldev] Erasing FE.KEYID = 1
10,758,967 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,592 UART: [ldev] --
13,138,965 UART: [fwproc] Waiting for Commands...
13,140,703 UART: [fwproc] Received command 0x46574c44
13,142,944 UART: [fwproc] Received Image of size 113760 bytes
17,193,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,682 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,650,453 >>> mbox cmd response: success
17,653,989 UART: [afmc] ++
17,654,642 UART: [afmc] CDI.KEYID = 6
17,655,707 UART: [afmc] SUBJECT.KEYID = 7
17,656,815 UART: [afmc] AUTHORITY.KEYID = 5
21,032,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,328 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,700 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,528 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,981 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,704 UART: [afmc] --
23,401,399 UART: [cold-reset] --
23,405,582 UART: [state] Locking Datavault
23,410,668 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,436 UART: [state] Locking ICCM
23,415,243 UART: [exit] Launching FMC @ 0x40000130
23,423,586 UART:
23,423,822 UART: Running Caliptra FMC ...
23,424,923 UART:
23,425,088 UART: [state] CFI Enabled
23,488,698 UART: [fht] FMC Alias Private Key: 7
25,826,390 UART: [art] Extend RT PCRs Done
25,827,611 UART: [art] Lock RT PCRs Done
25,829,394 UART: [art] Populate DV Done
25,834,966 UART: [fht] FMC Alias Private Key: 7
25,836,508 UART: [art] Derive CDI
25,837,292 UART: [art] Store in in slot 0x4
25,896,551 UART: [art] Derive Key Pair
25,897,583 UART: [art] Store priv key in slot 0x5
29,190,671 UART: [art] Derive Key Pair - Done
29,203,512 UART: [art] Signing Cert with AUTHO
29,204,812 UART: RITY.KEYID = 7
31,492,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,594 UART: [art] PUB.X = 3362F79352D6EAB2DAF29A46482FF4630C9CD38F76DE0262C3D4501B42ED4B82759BD98EE17135D4F9299C29CAF889AF
31,500,846 UART: [art] PUB.Y = 57096309709480F51A61EB9206DC71ED8B370D187970722EDD75187F2BD7BA8E2DB9FAEA3078A6281EF9B320DE1A5550
31,508,074 UART: [art] SIG.R = 1EEA03E8CA29B6056F6E706619D43324544ED9AE19F8C07060033885712E0DC21786BDBA31C4A2C8647444B45E23FDDB
31,515,409 UART: [art] SIG.S = 0625F3288771F8239140FAE7184514079EC7EB8F3F75CE439021464EBE0E86674F45DB3EA215B8EC222702911E802E91
32,820,716 UART: Caliptra RT
32,821,430 UART: [state] CFI Enabled
32,981,943 UART: [rt] RT listening for mailbox commands...
32,985,989 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,031,220 UART: [rt]cmd =0x4c4d5356, len=1672
34,283,962 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,807,665 ready_for_fw is high
3,808,188 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,876,057 >>> mbox cmd response: success
23,566,972 UART:
23,567,368 UART: Running Caliptra FMC ...
23,568,508 UART:
23,568,667 UART: [state] CFI Enabled
23,636,180 UART: [fht] FMC Alias Private Key: 7
25,973,678 UART: [art] Extend RT PCRs Done
25,974,907 UART: [art] Lock RT PCRs Done
25,976,849 UART: [art] Populate DV Done
25,982,477 UART: [fht] FMC Alias Private Key: 7
25,983,964 UART: [art] Derive CDI
25,984,701 UART: [art] Store in in slot 0x4
26,044,934 UART: [art] Derive Key Pair
26,045,984 UART: [art] Store priv key in slot 0x5
29,338,585 UART: [art] Derive Key Pair - Done
29,351,338 UART: [art] Signing Cert with AUTHO
29,352,678 UART: RITY.KEYID = 7
31,639,869 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,378 UART: [art] PUB.X = 7D84E04F2BB472650BF6D34101FECAFB78672C3806FE59644C25FF15676E0761BCFD92DA8072DBC49B074BCAC580C76E
31,648,595 UART: [art] PUB.Y = E16304CD05AF3F97582BAA972F81C74E2660D00DE93CA4ED2A14F09B10341C1D5F4396057ACF56CC4AC766DB19BF4C1E
31,655,894 UART: [art] SIG.R = 51E1EB53394870F23B697FBB536906ED7998A57D1051D0652447CAD1A1D2048D7B207CFBE9ABEF68B5CAEBF170D8B63D
31,663,242 UART: [art] SIG.S = DE7B5AFF19593A25DBA035709FE27C60D4E2DD95F982A1BEA9A92F06C15E9C5E611F55ED297065163A6DC7D798C24C00
32,968,319 UART: Caliptra RT
32,969,037 UART: [state] CFI Enabled
33,130,112 UART: [rt] RT listening for mailbox commands...
33,134,059 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,178,959 UART: [rt]cmd =0x4c4d5356, len=1672
34,431,889 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,911 writing to cptra_bootfsm_go
193,155 UART:
193,523 UART: Running Caliptra ROM ...
194,724 UART:
604,387 UART: [state] CFI Enabled
617,910 UART: [state] LifecycleState = Unprovisioned
619,854 UART: [state] DebugLocked = No
621,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,439 UART: [kat] SHA2-256
796,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,731 UART: [kat] ++
807,214 UART: [kat] sha1
818,737 UART: [kat] SHA2-256
821,461 UART: [kat] SHA2-384
827,088 UART: [kat] SHA2-512-ACC
829,453 UART: [kat] ECC-384
3,113,279 UART: [kat] HMAC-384Kdf
3,124,595 UART: [kat] LMS
4,314,669 UART: [kat] --
4,319,603 UART: [cold-reset] ++
4,321,463 UART: [fht] Storing FHT @ 0x50003400
4,332,863 UART: [idev] ++
4,333,428 UART: [idev] CDI.KEYID = 6
4,334,379 UART: [idev] SUBJECT.KEYID = 7
4,335,619 UART: [idev] UDS.KEYID = 0
4,336,576 ready_for_fw is high
4,336,765 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,638 UART: [idev] Erasing UDS.KEYID = 0
7,628,715 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,077 UART: [idev] --
7,657,102 UART: [ldev] ++
7,657,670 UART: [ldev] CDI.KEYID = 6
7,658,644 UART: [ldev] SUBJECT.KEYID = 5
7,659,847 UART: [ldev] AUTHORITY.KEYID = 7
7,661,130 UART: [ldev] FE.KEYID = 1
7,673,991 UART: [ldev] Erasing FE.KEYID = 1
10,960,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,787 UART: [ldev] --
13,322,233 UART: [fwproc] Waiting for Commands...
13,325,339 UART: [fwproc] Received command 0x46574c44
13,327,542 UART: [fwproc] Received Image of size 113760 bytes
17,369,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,553 >>> mbox cmd response: success
17,829,438 UART: [afmc] ++
17,830,042 UART: [afmc] CDI.KEYID = 6
17,830,956 UART: [afmc] SUBJECT.KEYID = 7
17,832,167 UART: [afmc] AUTHORITY.KEYID = 5
21,143,972 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,594 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,970 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,773 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,240 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,280 UART: [afmc] --
23,508,243 UART: [cold-reset] --
23,513,217 UART: [state] Locking Datavault
23,517,282 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,033 UART: [state] Locking ICCM
23,521,725 UART: [exit] Launching FMC @ 0x40000130
23,530,121 UART:
23,530,355 UART: Running Caliptra FMC ...
23,531,452 UART:
23,531,612 UART: [state] CFI Enabled
23,540,086 UART: [fht] FMC Alias Private Key: 7
25,871,376 UART: [art] Extend RT PCRs Done
25,872,604 UART: [art] Lock RT PCRs Done
25,874,040 UART: [art] Populate DV Done
25,879,288 UART: [fht] FMC Alias Private Key: 7
25,880,983 UART: [art] Derive CDI
25,881,792 UART: [art] Store in in slot 0x4
25,924,276 UART: [art] Derive Key Pair
25,925,309 UART: [art] Store priv key in slot 0x5
29,166,975 UART: [art] Derive Key Pair - Done
29,180,183 UART: [art] Signing Cert with AUTHO
29,181,478 UART: RITY.KEYID = 7
31,460,781 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,289 UART: [art] PUB.X = 39314614826501AFCC9EC48B1123A5E26D127E9FAA92925F7B7228748F16049809051A02D513DA9AEA45EF8596B3625C
31,469,509 UART: [art] PUB.Y = 69012FBFA3BD70E6120A353C3A66CFC8B501BD1C9D9B70D20C81067551FE85649208186979A15C6A919915944D3DE20F
31,476,763 UART: [art] SIG.R = 6071050C15A45AE70F16DE12131602AC63C9CA6ED32FA452BC51320B77CB8819E057DD534BD2CF1F2C4E14CA300E71A5
31,484,115 UART: [art] SIG.S = CE2CAA3C7DED249E9E27F194800D1CD1EFF220FF56FA61358C1E51AFCCAC3DC8A51B1C24B5976C6112DC3F6BD2B5D366
32,789,523 UART: Caliptra RT
32,790,222 UART: [state] CFI Enabled
32,908,035 UART: [rt] RT listening for mailbox commands...
32,912,015 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,956,419 UART: [rt]cmd =0x4c4d5356, len=1672
34,209,337 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
4,131,697 ready_for_fw is high
4,132,081 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,071,726 >>> mbox cmd response: success
23,715,428 UART:
23,715,833 UART: Running Caliptra FMC ...
23,716,960 UART:
23,717,119 UART: [state] CFI Enabled
23,725,066 UART: [fht] FMC Alias Private Key: 7
26,055,364 UART: [art] Extend RT PCRs Done
26,056,602 UART: [art] Lock RT PCRs Done
26,058,285 UART: [art] Populate DV Done
26,063,764 UART: [fht] FMC Alias Private Key: 7
26,065,410 UART: [art] Derive CDI
26,066,226 UART: [art] Store in in slot 0x4
26,108,509 UART: [art] Derive Key Pair
26,109,555 UART: [art] Store priv key in slot 0x5
29,351,760 UART: [art] Derive Key Pair - Done
29,364,932 UART: [art] Signing Cert with AUTHO
29,366,270 UART: RITY.KEYID = 7
31,645,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,927 UART: [art] PUB.X = D876E9D564E10085859070C3CC8E07E93C5B488287239F95F17AD08936BAD8CB314D9EBE4BD40D404B622C97068DC87F
31,654,114 UART: [art] PUB.Y = E13BB4FA9B0F9D2D6CD0D70090AD2B15511DBE89049A742277D0ED7F102E9B8DCEFD4316D0C117D3E1799CA0C3EE7CED
31,661,373 UART: [art] SIG.R = 22F68169EF9D0047BDCA50E08B0338B163C1CE1AB314AE915FEE5C7FF3EEFBCAE51BE1184D4F84009C0439B2554C8255
31,668,756 UART: [art] SIG.S = 37D560621B6A24143A8862282B81444B4281998228B2228004025401FECEC063FAE094F8ECDFBA7CAF758F99D5B87D18
32,973,416 UART: Caliptra RT
32,974,129 UART: [state] CFI Enabled
33,091,680 UART: [rt] RT listening for mailbox commands...
33,095,667 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,140,086 UART: [rt]cmd =0x4c4d5356, len=1672
34,393,194 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,582 UART:
192,944 UART: Running Caliptra ROM ...
194,131 UART:
194,290 UART: [state] CFI Enabled
266,363 UART: [state] LifecycleState = Unprovisioned
268,293 UART: [state] DebugLocked = No
270,536 UART: [state] WD Timer not started. Device not locked for debugging
275,144 UART: [kat] SHA2-256
454,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,785 UART: [kat] ++
466,233 UART: [kat] sha1
477,885 UART: [kat] SHA2-256
480,891 UART: [kat] SHA2-384
485,526 UART: [kat] SHA2-512-ACC
488,525 UART: [kat] ECC-384
2,948,778 UART: [kat] HMAC-384Kdf
2,972,111 UART: [kat] LMS
3,501,532 UART: [kat] --
3,506,306 UART: [cold-reset] ++
3,508,446 UART: [fht] FHT @ 0x50003400
3,520,554 UART: [idev] ++
3,521,119 UART: [idev] CDI.KEYID = 6
3,522,039 UART: [idev] SUBJECT.KEYID = 7
3,523,208 UART: [idev] UDS.KEYID = 0
3,524,126 ready_for_fw is high
3,524,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,893 UART: [idev] Erasing UDS.KEYID = 0
6,029,984 UART: [idev] Sha1 KeyId Algorithm
6,051,859 UART: [idev] --
6,055,284 UART: [ldev] ++
6,055,866 UART: [ldev] CDI.KEYID = 6
6,056,778 UART: [ldev] SUBJECT.KEYID = 5
6,057,952 UART: [ldev] AUTHORITY.KEYID = 7
6,059,186 UART: [ldev] FE.KEYID = 1
6,101,693 UART: [ldev] Erasing FE.KEYID = 1
8,602,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,443 UART: [ldev] --
10,395,120 UART: [fwproc] Wait for Commands...
10,397,487 UART: [fwproc] Recv command 0x46574c44
10,399,582 UART: [fwproc] Recv'd Img size: 114084 bytes
13,799,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,263,812 >>> mbox cmd response: success
14,267,372 UART: [afmc] ++
14,267,969 UART: [afmc] CDI.KEYID = 6
14,268,881 UART: [afmc] SUBJECT.KEYID = 7
14,270,036 UART: [afmc] AUTHORITY.KEYID = 5
16,806,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,619 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,093 UART: [afmc] --
18,607,140 UART: [cold-reset] --
18,610,185 UART: [state] Locking Datavault
18,614,421 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,107 UART: [state] Locking ICCM
18,617,448 UART: [exit] Launching FMC @ 0x40000130
18,625,871 UART:
18,626,112 UART: Running Caliptra FMC ...
18,627,209 UART:
18,627,371 UART: [state] CFI Enabled
18,689,946 UART: [fht] FMC Alias Private Key: 7
20,453,623 UART: [art] Extend RT PCRs Done
20,454,837 UART: [art] Lock RT PCRs Done
20,456,456 UART: [art] Populate DV Done
20,461,760 UART: [fht] FMC Alias Private Key: 7
20,463,343 UART: [art] Derive CDI
20,464,149 UART: [art] Store in in slot 0x4
20,521,998 UART: [art] Derive Key Pair
20,522,994 UART: [art] Store priv key in slot 0x5
22,985,791 UART: [art] Derive Key Pair - Done
22,999,060 UART: [art] Signing Cert with AUTHO
23,000,360 UART: RITY.KEYID = 7
24,711,323 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,828 UART: [art] PUB.X = 8C40D74D173F082C6245656A0E459046A8E1538C40775337CE65618ED3A3973EF9FB8F9910429DD0BAE0D55B982E8DB3
24,720,085 UART: [art] PUB.Y = 86182E7877C51352CE44AA8465BC8AFBBD49B5D38F526341A6FD4E665B3749E5DAF561AAF2627178865E8D79C47FC01D
24,727,346 UART: [art] SIG.R = F73630932D08900F26BE8EC50B7B1CD5AB2DFFD8D2AE98D4173F199B219CCFD815F5C5DFAB74861F20B5D3D2468A496B
24,734,758 UART: [art] SIG.S = BE149F96168D5BEB705656FDA3B02D363DEA525F0096A89677E859203EC321180115873311A319D0113BE66DBB017F7A
25,713,352 UART: Caliptra RT
25,714,070 UART: [state] CFI Enabled
25,880,663 UART: [rt] RT listening for mailbox commands...
25,884,670 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,929,625 UART: [rt]cmd =0x4c4d5356, len=1672
26,350,747 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
3,384,824 ready_for_fw is high
3,385,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,047,354 >>> mbox cmd response: success
18,345,032 UART:
18,345,419 UART: Running Caliptra FMC ...
18,346,561 UART:
18,346,719 UART: [state] CFI Enabled
18,410,021 UART: [fht] FMC Alias Private Key: 7
20,174,042 UART: [art] Extend RT PCRs Done
20,175,250 UART: [art] Lock RT PCRs Done
20,176,981 UART: [art] Populate DV Done
20,182,484 UART: [fht] FMC Alias Private Key: 7
20,184,079 UART: [art] Derive CDI
20,184,911 UART: [art] Store in in slot 0x4
20,242,654 UART: [art] Derive Key Pair
20,243,643 UART: [art] Store priv key in slot 0x5
22,706,658 UART: [art] Derive Key Pair - Done
22,719,550 UART: [art] Signing Cert with AUTHO
22,720,854 UART: RITY.KEYID = 7
24,431,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,175 UART: [art] PUB.X = 682EE29BABF1B221E8002B84602BBC9B581A92A49384EAF520A87E1F9AEF8468E3E4163760722B6B1E99744BFAA331BE
24,440,412 UART: [art] PUB.Y = 1B94740E1DC10DC5789AEDA5FB504531ACA4599EBC733369FEBB3E09B577683D9D2AE92D97647A09ED134356A682B35B
24,447,679 UART: [art] SIG.R = 74504385D6E071A1AF3734EEF0ABCC1D4420EF54F242C2CEB9BA257966CEF637B4FCC25C3C43343272AA7286BA6C4810
24,455,124 UART: [art] SIG.S = 57A66D2C04278455BB9BFFA18C0F9A759AF39B22ED48859D3347A10CA5BA64638E11D5606A8CFECCAA5B53AA41E372CA
25,434,612 UART: Caliptra RT
25,435,331 UART: [state] CFI Enabled
25,599,782 UART: [rt] RT listening for mailbox commands...
25,603,809 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,648,854 UART: [rt]cmd =0x4c4d5356, len=1672
26,070,018 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,963 writing to cptra_bootfsm_go
193,098 UART:
193,503 UART: Running Caliptra ROM ...
194,608 UART:
604,007 UART: [state] CFI Enabled
618,458 UART: [state] LifecycleState = Unprovisioned
620,334 UART: [state] DebugLocked = No
622,277 UART: [state] WD Timer not started. Device not locked for debugging
626,193 UART: [kat] SHA2-256
805,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,767 UART: [kat] ++
817,214 UART: [kat] sha1
829,714 UART: [kat] SHA2-256
832,793 UART: [kat] SHA2-384
839,136 UART: [kat] SHA2-512-ACC
842,084 UART: [kat] ECC-384
3,283,923 UART: [kat] HMAC-384Kdf
3,295,794 UART: [kat] LMS
3,825,304 UART: [kat] --
3,829,249 UART: [cold-reset] ++
3,830,646 UART: [fht] FHT @ 0x50003400
3,842,842 UART: [idev] ++
3,843,483 UART: [idev] CDI.KEYID = 6
3,844,376 UART: [idev] SUBJECT.KEYID = 7
3,845,479 UART: [idev] UDS.KEYID = 0
3,846,532 ready_for_fw is high
3,846,752 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,114 UART: [idev] Erasing UDS.KEYID = 0
6,319,524 UART: [idev] Sha1 KeyId Algorithm
6,341,507 UART: [idev] --
6,344,524 UART: [ldev] ++
6,345,090 UART: [ldev] CDI.KEYID = 6
6,346,008 UART: [ldev] SUBJECT.KEYID = 5
6,347,177 UART: [ldev] AUTHORITY.KEYID = 7
6,348,484 UART: [ldev] FE.KEYID = 1
6,357,838 UART: [ldev] Erasing FE.KEYID = 1
8,829,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,966 UART: [ldev] --
10,619,587 UART: [fwproc] Wait for Commands...
10,621,467 UART: [fwproc] Recv command 0x46574c44
10,623,562 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,476,837 >>> mbox cmd response: success
14,481,748 UART: [afmc] ++
14,482,366 UART: [afmc] CDI.KEYID = 6
14,483,255 UART: [afmc] SUBJECT.KEYID = 7
14,484,420 UART: [afmc] AUTHORITY.KEYID = 5
16,979,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,140 UART: [afmc] --
18,778,060 UART: [cold-reset] --
18,783,166 UART: [state] Locking Datavault
18,787,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,771 UART: [state] Locking ICCM
18,790,417 UART: [exit] Launching FMC @ 0x40000130
18,798,815 UART:
18,799,072 UART: Running Caliptra FMC ...
18,800,230 UART:
18,800,397 UART: [state] CFI Enabled
18,808,266 UART: [fht] FMC Alias Private Key: 7
20,564,714 UART: [art] Extend RT PCRs Done
20,565,937 UART: [art] Lock RT PCRs Done
20,567,668 UART: [art] Populate DV Done
20,573,132 UART: [fht] FMC Alias Private Key: 7
20,574,726 UART: [art] Derive CDI
20,575,543 UART: [art] Store in in slot 0x4
20,618,463 UART: [art] Derive Key Pair
20,619,466 UART: [art] Store priv key in slot 0x5
23,045,806 UART: [art] Derive Key Pair - Done
23,058,748 UART: [art] Signing Cert with AUTHO
23,060,054 UART: RITY.KEYID = 7
24,765,387 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,889 UART: [art] PUB.X = 5FE1E9B050BC04474E3C28F2812F05A2BF96117317753A574B9236E3556DCC7EC817DDE0BCC6369086209390259F9C20
24,774,160 UART: [art] PUB.Y = 710B6BF1796C2B2ACB5CB80BE26D4AAE1B47F6E47EC9CFFEC5FF3E85753C2C7A13CCA5933D0C40CBC52BFDFD03863B79
24,781,479 UART: [art] SIG.R = 59567A14F12D6038F146E14725E04DD586D1488A30694647DF5BA4F15EFEEC0D93D935B9315E54B7EED2130634373103
24,788,872 UART: [art] SIG.S = C1712FB985BBD57AACE8AFA430879E30EBFBBC84873146A83D0D98A312A4BBC58FE96D4469EFD2DE5D0C5E466A570FFA
25,767,851 UART: Caliptra RT
25,768,561 UART: [state] CFI Enabled
25,885,950 UART: [rt] RT listening for mailbox commands...
25,889,880 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,934,347 UART: [rt]cmd =0x4c4d5356, len=1672
26,355,571 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
3,697,942 ready_for_fw is high
3,698,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,274,157 >>> mbox cmd response: success
18,521,773 UART:
18,522,193 UART: Running Caliptra FMC ...
18,523,309 UART:
18,523,461 UART: [state] CFI Enabled
18,531,531 UART: [fht] FMC Alias Private Key: 7
20,288,272 UART: [art] Extend RT PCRs Done
20,289,481 UART: [art] Lock RT PCRs Done
20,290,922 UART: [art] Populate DV Done
20,296,448 UART: [fht] FMC Alias Private Key: 7
20,298,053 UART: [art] Derive CDI
20,298,875 UART: [art] Store in in slot 0x4
20,341,529 UART: [art] Derive Key Pair
20,342,529 UART: [art] Store priv key in slot 0x5
22,769,036 UART: [art] Derive Key Pair - Done
22,781,666 UART: [art] Signing Cert with AUTHO
22,782,978 UART: RITY.KEYID = 7
24,488,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,872 UART: [art] PUB.X = 635A77E7C0F0AF789B4911262D1C3CD8D55F41E2D7F096447FEF0C56E9B0267AA3F3FB77D695841AEC9637A75FEF2409
24,497,147 UART: [art] PUB.Y = 2E69E0413730FFCAB5B3319EE2DD61FAE78C385A8E4C4957F64F7FF82B9CAF88914513F913387FC142018644A7FD8E7F
24,504,432 UART: [art] SIG.R = E3B0F39BD2D7E7153A994DEF31EE804888DC4DEC5AAEFD46ED8933DBD4A4E7036ED310DE7FC22E02B643F1EF7AA66C32
24,511,865 UART: [art] SIG.S = 5D2F67104C4606E8AE3DE95D4EFC210EDD3821CE08E0E913361DCE18F5190F1CA8A21D7D678238224A14D768F2B2E595
25,490,801 UART: Caliptra RT
25,491,517 UART: [state] CFI Enabled
25,609,558 UART: [rt] RT listening for mailbox commands...
25,613,529 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,657,942 UART: [rt]cmd =0x4c4d5356, len=1672
26,079,031 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,412 UART:
192,786 UART: Running Caliptra ROM ...
193,982 UART:
194,135 UART: [state] CFI Enabled
263,488 UART: [state] LifecycleState = Unprovisioned
265,903 UART: [state] DebugLocked = No
268,449 UART: [state] WD Timer not started. Device not locked for debugging
273,493 UART: [kat] SHA2-256
463,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,202 UART: [kat] ++
474,677 UART: [kat] sha1
485,842 UART: [kat] SHA2-256
488,852 UART: [kat] SHA2-384
494,059 UART: [kat] SHA2-512-ACC
496,653 UART: [kat] ECC-384
2,946,862 UART: [kat] HMAC-384Kdf
2,972,565 UART: [kat] LMS
3,504,293 UART: [kat] --
3,509,897 UART: [cold-reset] ++
3,511,259 UART: [fht] FHT @ 0x50003400
3,524,293 UART: [idev] ++
3,524,993 UART: [idev] CDI.KEYID = 6
3,526,003 UART: [idev] SUBJECT.KEYID = 7
3,527,182 UART: [idev] UDS.KEYID = 0
3,528,110 ready_for_fw is high
3,528,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,882 UART: [idev] Erasing UDS.KEYID = 0
6,029,175 UART: [idev] Sha1 KeyId Algorithm
6,051,804 UART: [idev] --
6,057,717 UART: [ldev] ++
6,058,408 UART: [ldev] CDI.KEYID = 6
6,059,325 UART: [ldev] SUBJECT.KEYID = 5
6,060,489 UART: [ldev] AUTHORITY.KEYID = 7
6,061,667 UART: [ldev] FE.KEYID = 1
6,103,441 UART: [ldev] Erasing FE.KEYID = 1
8,608,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,957 UART: [ldev] --
10,416,335 UART: [fwproc] Wait for Commands...
10,418,369 UART: [fwproc] Recv command 0x46574c44
10,420,618 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,356 >>> mbox cmd response: success
14,604,125 UART: [afmc] ++
14,604,858 UART: [afmc] CDI.KEYID = 6
14,605,978 UART: [afmc] SUBJECT.KEYID = 7
14,607,529 UART: [afmc] AUTHORITY.KEYID = 5
17,152,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,696 UART: [afmc] --
18,949,493 UART: [cold-reset] --
18,954,498 UART: [state] Locking Datavault
18,958,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,791 UART: [state] Locking ICCM
18,963,311 UART: [exit] Launching FMC @ 0x40000130
18,971,940 UART:
18,972,178 UART: Running Caliptra FMC ...
18,973,279 UART:
18,973,436 UART: [state] CFI Enabled
19,032,937 UART: [fht] FMC Alias Private Key: 7
20,796,506 UART: [art] Extend RT PCRs Done
20,797,741 UART: [art] Lock RT PCRs Done
20,799,341 UART: [art] Populate DV Done
20,804,861 UART: [fht] FMC Alias Private Key: 7
20,806,391 UART: [art] Derive CDI
20,807,122 UART: [art] Store in in slot 0x4
20,865,893 UART: [art] Derive Key Pair
20,866,935 UART: [art] Store priv key in slot 0x5
23,330,128 UART: [art] Derive Key Pair - Done
23,342,805 UART: [art] Signing Cert with AUTHO
23,344,100 UART: RITY.KEYID = 7
25,056,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,645 UART: [art] PUB.X = 242B83B97E644443A51BA3A9581D1BB4BD6E551C9FE4E0C9129FBD75CE0C65586017775FF7DE3A16F669FF82B5530651
25,064,906 UART: [art] PUB.Y = 1675171B0D289ED3EF715A05B496DD15A24C0196456AF2475D34278251167033FD1BF56BC0F750471F1921462F094382
25,072,110 UART: [art] SIG.R = 29691803797FA9AAF840BDEE26E94A93AD89DF0CCEA112334E8203DF2D20D071E3AAB7D081A7D5A407416B20D3F3FD15
25,079,478 UART: [art] SIG.S = C818AFED689AB7BB19945888971CCBDD78028D51E023BDBC03F492DD4DD28056B4D039F5D3EA558097094AB54AD7BB17
26,058,392 UART: Caliptra RT
26,059,127 UART: [state] CFI Enabled
26,225,150 UART: [rt] RT listening for mailbox commands...
26,229,185 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,274,308 UART: [rt]cmd =0x4c4d5356, len=1672
26,695,266 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,439,985 ready_for_fw is high
3,440,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,119 >>> mbox cmd response: success
19,026,511 UART:
19,026,907 UART: Running Caliptra FMC ...
19,028,017 UART:
19,028,174 UART: [state] CFI Enabled
19,092,942 UART: [fht] FMC Alias Private Key: 7
20,857,073 UART: [art] Extend RT PCRs Done
20,858,303 UART: [art] Lock RT PCRs Done
20,860,035 UART: [art] Populate DV Done
20,865,397 UART: [fht] FMC Alias Private Key: 7
20,867,095 UART: [art] Derive CDI
20,867,908 UART: [art] Store in in slot 0x4
20,925,437 UART: [art] Derive Key Pair
20,926,478 UART: [art] Store priv key in slot 0x5
23,404,516 UART: [art] Derive Key Pair - Done
23,417,457 UART: [art] Signing Cert with AUTHO
23,418,761 UART: RITY.KEYID = 7
25,130,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,098 UART: [art] PUB.X = F7344E21CB95413E253B2F6494C0A4B2832DA44F5887639ED769A50CC4696EBE0C3376DA78B229A07CF5D7AEDBCB1FB6
25,139,368 UART: [art] PUB.Y = 563062150EA0B3E70F8F5EC94ED76D7D67720A58E07EB38E2905AEC36E5378F65931CB88AA390BCD5B2D2F75FE550BA0
25,146,615 UART: [art] SIG.R = 10B7D14E3D18B3E5A8C0D623EBDA14C4809170E860F335FB9695709F5CDA9CCDD3135CCA4F8A6F07DEA4ADEB2D5A9795
25,154,054 UART: [art] SIG.S = F3980DCEC12CC8B287833A1CB055D7EAF34751843AED781BB1FE1E6E3E030178FBB29110CA6060BF0749F00ECBFA59B6
26,132,914 UART: Caliptra RT
26,133,609 UART: [state] CFI Enabled
26,296,785 UART: [rt] RT listening for mailbox commands...
26,300,773 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,345,949 UART: [rt]cmd =0x4c4d5356, len=1672
26,767,197 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
192,892 UART:
193,268 UART: Running Caliptra ROM ...
194,482 UART:
604,303 UART: [state] CFI Enabled
617,762 UART: [state] LifecycleState = Unprovisioned
620,149 UART: [state] DebugLocked = No
622,605 UART: [state] WD Timer not started. Device not locked for debugging
627,924 UART: [kat] SHA2-256
817,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,614 UART: [kat] ++
829,168 UART: [kat] sha1
839,263 UART: [kat] SHA2-256
842,272 UART: [kat] SHA2-384
848,362 UART: [kat] SHA2-512-ACC
850,949 UART: [kat] ECC-384
3,290,956 UART: [kat] HMAC-384Kdf
3,305,542 UART: [kat] LMS
3,837,370 UART: [kat] --
3,841,575 UART: [cold-reset] ++
3,842,709 UART: [fht] FHT @ 0x50003400
3,853,061 UART: [idev] ++
3,853,702 UART: [idev] CDI.KEYID = 6
3,854,741 UART: [idev] SUBJECT.KEYID = 7
3,855,912 UART: [idev] UDS.KEYID = 0
3,856,840 ready_for_fw is high
3,857,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,302 UART: [idev] Erasing UDS.KEYID = 0
6,332,037 UART: [idev] Sha1 KeyId Algorithm
6,355,111 UART: [idev] --
6,361,118 UART: [ldev] ++
6,361,803 UART: [ldev] CDI.KEYID = 6
6,362,686 UART: [ldev] SUBJECT.KEYID = 5
6,363,893 UART: [ldev] AUTHORITY.KEYID = 7
6,365,124 UART: [ldev] FE.KEYID = 1
6,377,091 UART: [ldev] Erasing FE.KEYID = 1
8,854,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,678 UART: [ldev] --
10,645,521 UART: [fwproc] Wait for Commands...
10,648,646 UART: [fwproc] Recv command 0x46574c44
10,650,958 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,839,720 >>> mbox cmd response: success
14,843,260 UART: [afmc] ++
14,843,974 UART: [afmc] CDI.KEYID = 6
14,845,168 UART: [afmc] SUBJECT.KEYID = 7
14,846,607 UART: [afmc] AUTHORITY.KEYID = 5
17,354,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,200 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,182 UART: [afmc] --
19,149,537 UART: [cold-reset] --
19,154,281 UART: [state] Locking Datavault
19,160,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,907 UART: [state] Locking ICCM
19,165,819 UART: [exit] Launching FMC @ 0x40000130
19,174,501 UART:
19,174,744 UART: Running Caliptra FMC ...
19,175,848 UART:
19,176,004 UART: [state] CFI Enabled
19,184,056 UART: [fht] FMC Alias Private Key: 7
20,941,288 UART: [art] Extend RT PCRs Done
20,942,502 UART: [art] Lock RT PCRs Done
20,943,910 UART: [art] Populate DV Done
20,948,997 UART: [fht] FMC Alias Private Key: 7
20,950,699 UART: [art] Derive CDI
20,951,513 UART: [art] Store in in slot 0x4
20,994,542 UART: [art] Derive Key Pair
20,995,577 UART: [art] Store priv key in slot 0x5
23,422,583 UART: [art] Derive Key Pair - Done
23,435,688 UART: [art] Signing Cert with AUTHO
23,436,991 UART: RITY.KEYID = 7
25,142,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,059 UART: [art] PUB.X = 7947805BD1B4EAEB9596CCCE48FEC434F0394009472601949D027809DD16C55A49AF0FBA5505384F44CF7A362A2CF3F8
25,151,288 UART: [art] PUB.Y = 68C127B06EBE299211EE71350833F550F538111DA8DCEA062E090C8C3618076B7286202D2B988D3484B439727B0BC55C
25,158,548 UART: [art] SIG.R = B767EE3AB325406B3329A05854F227B2E4EF3F4055F02386499344679B03C8378854A78259CEB44269B18177889F8A7D
25,165,862 UART: [art] SIG.S = 6248E760657C6FE8078DB3A5223F3DF5153A37C5AC5B219FF012887BBBB0B8279E21993B43E702272732A22D7D4C711E
26,145,093 UART: Caliptra RT
26,145,786 UART: [state] CFI Enabled
26,263,456 UART: [rt] RT listening for mailbox commands...
26,267,449 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,311,955 UART: [rt]cmd =0x4c4d5356, len=1672
26,732,851 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,969 writing to cptra_bootfsm_go
3,756,847 ready_for_fw is high
3,757,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,960,648 >>> mbox cmd response: success
19,206,273 UART:
19,206,723 UART: Running Caliptra FMC ...
19,207,843 UART:
19,208,009 UART: [state] CFI Enabled
19,215,850 UART: [fht] FMC Alias Private Key: 7
20,972,726 UART: [art] Extend RT PCRs Done
20,973,952 UART: [art] Lock RT PCRs Done
20,976,079 UART: [art] Populate DV Done
20,981,569 UART: [fht] FMC Alias Private Key: 7
20,983,279 UART: [art] Derive CDI
20,984,123 UART: [art] Store in in slot 0x4
21,026,570 UART: [art] Derive Key Pair
21,027,620 UART: [art] Store priv key in slot 0x5
23,454,654 UART: [art] Derive Key Pair - Done
23,467,708 UART: [art] Signing Cert with AUTHO
23,469,194 UART: RITY.KEYID = 7
25,174,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,308 UART: [art] PUB.X = 8E84DA3FFB08994F9482515DB2ADED28B617A2F82B7F5BEE1BAA679DD44BA4532CD92147A0B20133C39F338AD3B17F71
25,183,556 UART: [art] PUB.Y = 3F522AB0CCB9D156DCB7121C3EE0DA3BB40AFF674356851E6A5DC0A933D1892F3D7E361E5DFE742D07BFC576F789CA1F
25,190,838 UART: [art] SIG.R = 711482C28756B43E50A53952A9718B9C2AE63AE4516BEAF3D6D2B4E2AD78456BB48ADF7342079E38B44C365475FDB0A0
25,198,228 UART: [art] SIG.S = 0FAC17D43DFCF4722A0A95F9C6F7AB747C7E9735B1418C4322343F7EA1AD4B4E871BAA91D223D66ECDFA01E7EAEAD57A
26,176,973 UART: Caliptra RT
26,177,667 UART: [state] CFI Enabled
26,294,855 UART: [rt] RT listening for mailbox commands...
26,298,841 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,343,282 UART: [rt]cmd =0x4c4d5356, len=1672
26,764,406 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
85,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,485 UART: [kat] SHA2-256
881,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,531 UART: [kat] ++
885,683 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,756 UART: [kat] SHA2-512-ACC
896,657 UART: [kat] ECC-384
902,342 UART: [kat] HMAC-384Kdf
906,854 UART: [kat] LMS
1,475,050 UART: [kat] --
1,475,715 UART: [cold-reset] ++
1,476,135 UART: [fht] Storing FHT @ 0x50003400
1,478,914 UART: [idev] ++
1,479,082 UART: [idev] CDI.KEYID = 6
1,479,442 UART: [idev] SUBJECT.KEYID = 7
1,479,866 UART: [idev] UDS.KEYID = 0
1,480,211 ready_for_fw is high
1,480,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,154 UART: [idev] Erasing UDS.KEYID = 0
1,504,728 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,368 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,520,943 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,306 UART: [ldev] --
1,585,629 UART: [fwproc] Waiting for Commands...
1,586,474 UART: [fwproc] Received command 0x46574c44
1,587,265 UART: [fwproc] Received Image of size 114084 bytes
2,881,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,491 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,386 >>> mbox cmd response: success
3,074,540 UART: [afmc] ++
3,074,708 UART: [afmc] CDI.KEYID = 6
3,075,070 UART: [afmc] SUBJECT.KEYID = 7
3,075,495 UART: [afmc] AUTHORITY.KEYID = 5
3,110,532 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,528 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,921 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,611 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,322 UART: [afmc] --
3,153,388 UART: [cold-reset] --
3,154,168 UART: [state] Locking Datavault
3,155,423 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,027 UART: [state] Locking ICCM
3,156,555 UART: [exit] Launching FMC @ 0x40000130
3,161,884 UART:
3,161,900 UART: Running Caliptra FMC ...
3,162,308 UART:
3,162,362 UART: [state] CFI Enabled
3,172,989 UART: [fht] FMC Alias Private Key: 7
3,280,906 UART: [art] Extend RT PCRs Done
3,281,334 UART: [art] Lock RT PCRs Done
3,282,650 UART: [art] Populate DV Done
3,290,845 UART: [fht] FMC Alias Private Key: 7
3,292,001 UART: [art] Derive CDI
3,292,281 UART: [art] Store in in slot 0x4
3,378,138 UART: [art] Derive Key Pair
3,378,498 UART: [art] Store priv key in slot 0x5
3,391,464 UART: [art] Derive Key Pair - Done
3,406,581 UART: [art] Signing Cert with AUTHO
3,407,061 UART: RITY.KEYID = 7
3,422,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,058 UART: [art] PUB.X = 75A0402345F82212A4037818721B992077DAD29AF8470525F8EF995002D7900A6D9F66D0F1509F2EA783FB1B37CF3666
3,429,806 UART: [art] PUB.Y = 27E58DE1E759094F026CEB187D1389876C58FEDAA77E4B237CFA0D0E0D005AA812A1AF28977D86DE091661BA08E0D380
3,436,721 UART: [art] SIG.R = DBCF691C848C6F000F2D1697094C37A5175EF3B8BCB6C55D6901A09DB40011D417EB49BCFE234E6666266374970FDA29
3,443,439 UART: [art] SIG.S = B0183844EC8306F925126B4C1CCA00AC2B7500A33D5214F3B1E363144212A362652E6F94EB38A3B5C4F9F86661006490
3,466,985 UART: Caliptra RT
3,467,238 UART: [state] CFI Enabled
3,575,196 UART: [rt] RT listening for mailbox commands...
3,575,866 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,256 UART: [rt]cmd =0x4c4d5356, len=1672
4,146,120 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,049 ready_for_fw is high
1,362,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,304 >>> mbox cmd response: success
2,986,622 UART:
2,986,638 UART: Running Caliptra FMC ...
2,987,046 UART:
2,987,100 UART: [state] CFI Enabled
2,997,367 UART: [fht] FMC Alias Private Key: 7
3,105,732 UART: [art] Extend RT PCRs Done
3,106,160 UART: [art] Lock RT PCRs Done
3,108,088 UART: [art] Populate DV Done
3,116,255 UART: [fht] FMC Alias Private Key: 7
3,117,311 UART: [art] Derive CDI
3,117,591 UART: [art] Store in in slot 0x4
3,203,346 UART: [art] Derive Key Pair
3,203,706 UART: [art] Store priv key in slot 0x5
3,217,388 UART: [art] Derive Key Pair - Done
3,232,269 UART: [art] Signing Cert with AUTHO
3,232,749 UART: RITY.KEYID = 7
3,248,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,994 UART: [art] PUB.X = 0AC9280BF0C1C13F1B6C554C7A1F792E3C41D32C83F7CC7CD9B6A82CCCA7E1689A564BF449AE0646EBD227AD41452680
3,255,769 UART: [art] PUB.Y = 17860D71AF93E5573F50E79B7FC1AD56C04B819E0E47299C35B541895DFE9B6A0F0B38689AD2C8CE0CF62AF3DC329B65
3,262,714 UART: [art] SIG.R = D509F8B96C30E0B9C2336F88DB5443BCDCB5A0A037D3712FBDCBF5F709AF41F06A435CFB0188C5D89DC441A10F3CA014
3,269,490 UART: [art] SIG.S = E8973434310521222FD538583848078C716F6661E550400C1881F2A3168C4225F825DC19AE07C400CF35E2FA3C3687E3
3,292,825 UART: Caliptra RT
3,293,078 UART: [state] CFI Enabled
3,400,582 UART: [rt] RT listening for mailbox commands...
3,401,252 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,126 UART: [rt]cmd =0x4c4d5356, len=1672
3,972,176 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,576 UART: [kat] SHA2-256
892,514 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,287 UART: [kat] LMS
1,475,483 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,872 UART: [fht] Storing FHT @ 0x50003400
1,479,741 UART: [idev] ++
1,479,909 UART: [idev] CDI.KEYID = 6
1,480,269 UART: [idev] SUBJECT.KEYID = 7
1,480,693 UART: [idev] UDS.KEYID = 0
1,481,038 ready_for_fw is high
1,481,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,505,967 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,587 UART: [idev] --
1,515,658 UART: [ldev] ++
1,515,826 UART: [ldev] CDI.KEYID = 6
1,516,189 UART: [ldev] SUBJECT.KEYID = 5
1,516,615 UART: [ldev] AUTHORITY.KEYID = 7
1,517,078 UART: [ldev] FE.KEYID = 1
1,522,272 UART: [ldev] Erasing FE.KEYID = 1
1,547,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,557 UART: [ldev] --
1,586,988 UART: [fwproc] Waiting for Commands...
1,587,715 UART: [fwproc] Received command 0x46574c44
1,588,506 UART: [fwproc] Received Image of size 114084 bytes
2,883,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,666 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,635 >>> mbox cmd response: success
3,076,765 UART: [afmc] ++
3,076,933 UART: [afmc] CDI.KEYID = 6
3,077,295 UART: [afmc] SUBJECT.KEYID = 7
3,077,720 UART: [afmc] AUTHORITY.KEYID = 5
3,113,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,549 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,329 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,942 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,632 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,603 UART: [afmc] --
3,156,661 UART: [cold-reset] --
3,157,711 UART: [state] Locking Datavault
3,158,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,522 UART: [state] Locking ICCM
3,160,128 UART: [exit] Launching FMC @ 0x40000130
3,165,457 UART:
3,165,473 UART: Running Caliptra FMC ...
3,165,881 UART:
3,166,024 UART: [state] CFI Enabled
3,176,957 UART: [fht] FMC Alias Private Key: 7
3,285,304 UART: [art] Extend RT PCRs Done
3,285,732 UART: [art] Lock RT PCRs Done
3,287,192 UART: [art] Populate DV Done
3,295,123 UART: [fht] FMC Alias Private Key: 7
3,296,165 UART: [art] Derive CDI
3,296,445 UART: [art] Store in in slot 0x4
3,382,242 UART: [art] Derive Key Pair
3,382,602 UART: [art] Store priv key in slot 0x5
3,395,526 UART: [art] Derive Key Pair - Done
3,410,106 UART: [art] Signing Cert with AUTHO
3,410,586 UART: RITY.KEYID = 7
3,426,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,767 UART: [art] PUB.X = CB613EB81B7DB5D6690FD8B76BCE225861A8F7C65FE48317EC4F6884600FD92D3492A749757294116DC5F73D3964F744
3,433,531 UART: [art] PUB.Y = A81B2CEB600B6E2D036B8B6DBEAA1ED71B0490A0855695077E7ADD12ABE8D8D9CE4F0607445924E752A6A89C38EC4442
3,440,475 UART: [art] SIG.R = F1E3B78FAF0DB68AE0835499B350A3193706C1369727B642D8F502F81A8DA28FFAA3A6F6ABF0BAC55D70057367DB0762
3,447,238 UART: [art] SIG.S = 1DC950CF02DA639183A00A268AFD3014F2DCE4822C46189520342C1D8D336F324362AF2649761AD68D5190A87A5AD8C9
3,470,857 UART: Caliptra RT
3,471,202 UART: [state] CFI Enabled
3,579,349 UART: [rt] RT listening for mailbox commands...
3,580,019 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,733 UART: [rt]cmd =0x4c4d5356, len=1672
4,150,609 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,094 ready_for_fw is high
1,362,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,837 >>> mbox cmd response: success
2,986,587 UART:
2,986,603 UART: Running Caliptra FMC ...
2,987,011 UART:
2,987,154 UART: [state] CFI Enabled
2,997,867 UART: [fht] FMC Alias Private Key: 7
3,105,558 UART: [art] Extend RT PCRs Done
3,105,986 UART: [art] Lock RT PCRs Done
3,107,704 UART: [art] Populate DV Done
3,115,947 UART: [fht] FMC Alias Private Key: 7
3,117,035 UART: [art] Derive CDI
3,117,315 UART: [art] Store in in slot 0x4
3,202,512 UART: [art] Derive Key Pair
3,202,872 UART: [art] Store priv key in slot 0x5
3,216,234 UART: [art] Derive Key Pair - Done
3,230,745 UART: [art] Signing Cert with AUTHO
3,231,225 UART: RITY.KEYID = 7
3,246,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,390 UART: [art] PUB.X = 465440AB062139BF45594C526F2AB10DDBBB04008C2945B34610F253962FA9C751751733D68C44EE85AE8C37908DD83A
3,254,125 UART: [art] PUB.Y = 4CE3AF9BFFED17750BADD9E2FE4D73BF24FA27EBA4936FDFFF593E0E0448B347DF53BF550979D8C6CB410B5A6458C6C8
3,261,086 UART: [art] SIG.R = B210D15757F6AEDB8BAD35F4ED8F8D074203C1EB367203FA64D4D8B12BF1B53AA0A3ED49C1E3210FD2389864950A5785
3,267,851 UART: [art] SIG.S = 9D3A218E632D730745D3BF37AB4674033DE768259E9215E40ED60638A681B58AB1752D0D8437C2FE08E02F8526559CDB
3,291,654 UART: Caliptra RT
3,291,999 UART: [state] CFI Enabled
3,399,133 UART: [rt] RT listening for mailbox commands...
3,399,803 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,407 UART: [rt]cmd =0x4c4d5356, len=1672
3,970,165 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,075 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,210 UART: [kat] SHA2-512-ACC
908,111 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,396 UART: [kat] LMS
1,170,724 UART: [kat] --
1,171,321 UART: [cold-reset] ++
1,171,689 UART: [fht] FHT @ 0x50003400
1,174,506 UART: [idev] ++
1,174,674 UART: [idev] CDI.KEYID = 6
1,175,034 UART: [idev] SUBJECT.KEYID = 7
1,175,458 UART: [idev] UDS.KEYID = 0
1,175,803 ready_for_fw is high
1,175,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,684 UART: [idev] Erasing UDS.KEYID = 0
1,200,893 UART: [idev] Sha1 KeyId Algorithm
1,209,317 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,880 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,976 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,142 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,577 >>> mbox cmd response: success
2,771,733 UART: [afmc] ++
2,771,901 UART: [afmc] CDI.KEYID = 6
2,772,263 UART: [afmc] SUBJECT.KEYID = 7
2,772,688 UART: [afmc] AUTHORITY.KEYID = 5
2,808,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,516 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,129 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,442 UART: [afmc] --
2,851,414 UART: [cold-reset] --
2,851,990 UART: [state] Locking Datavault
2,853,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,689 UART: [state] Locking ICCM
2,854,259 UART: [exit] Launching FMC @ 0x40000130
2,859,588 UART:
2,859,604 UART: Running Caliptra FMC ...
2,860,012 UART:
2,860,066 UART: [state] CFI Enabled
2,870,809 UART: [fht] FMC Alias Private Key: 7
2,978,676 UART: [art] Extend RT PCRs Done
2,979,104 UART: [art] Lock RT PCRs Done
2,980,618 UART: [art] Populate DV Done
2,988,923 UART: [fht] FMC Alias Private Key: 7
2,989,875 UART: [art] Derive CDI
2,990,155 UART: [art] Store in in slot 0x4
3,075,828 UART: [art] Derive Key Pair
3,076,188 UART: [art] Store priv key in slot 0x5
3,089,524 UART: [art] Derive Key Pair - Done
3,104,395 UART: [art] Signing Cert with AUTHO
3,104,875 UART: RITY.KEYID = 7
3,119,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,696 UART: [art] PUB.X = 1E58B8D8DBBA7CA6D141CF2B448A877BA76F4831AE3456C3FFBCF8BD5D57574C9B2FF302D47B3128CD9605C1FC6006E4
3,127,475 UART: [art] PUB.Y = 97C82A487500B016AB63FC750B7017981CBDEEDFBED35700D3C06DAE19259FB5EF5DEA699C1F634563BA1166007470B6
3,134,364 UART: [art] SIG.R = 317D727C2E6BFA53B59923BB668377E9F8C360F700B445453CF9791147549BF84E95C750E4C79A3BB6FF68031221A85F
3,141,105 UART: [art] SIG.S = B2379DABCEEA92AF35C99CFB581A7A4E5161CF595B4A14AAFDE6A529F5B7152B7936DE7D4DDA391F67FCB9C29F010A7C
3,164,862 UART: Caliptra RT
3,165,115 UART: [state] CFI Enabled
3,272,970 UART: [rt] RT listening for mailbox commands...
3,273,640 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,394 UART: [rt]cmd =0x4c4d5356, len=1672
3,844,266 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,507 ready_for_fw is high
1,060,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,530 >>> mbox cmd response: success
2,685,626 UART:
2,685,642 UART: Running Caliptra FMC ...
2,686,050 UART:
2,686,104 UART: [state] CFI Enabled
2,696,509 UART: [fht] FMC Alias Private Key: 7
2,804,706 UART: [art] Extend RT PCRs Done
2,805,134 UART: [art] Lock RT PCRs Done
2,806,694 UART: [art] Populate DV Done
2,815,031 UART: [fht] FMC Alias Private Key: 7
2,816,079 UART: [art] Derive CDI
2,816,359 UART: [art] Store in in slot 0x4
2,901,792 UART: [art] Derive Key Pair
2,902,152 UART: [art] Store priv key in slot 0x5
2,915,272 UART: [art] Derive Key Pair - Done
2,929,993 UART: [art] Signing Cert with AUTHO
2,930,473 UART: RITY.KEYID = 7
2,945,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,180 UART: [art] PUB.X = 2CE602C8325D17E90F903E3F6990C35CFE21EDF13D7F3BF64FE189775A1778956EB19FC4688A35BD35299B132C892737
2,952,944 UART: [art] PUB.Y = 145E1EF639E7EFB7488C007E81747969542C359E99D59FD765FCCCAFA0EB382522894E99E02E1358EBCC85F00BD17BF2
2,959,877 UART: [art] SIG.R = 343C98AC3E4B0AE14B5435B6A66FB1BFDCC1E898C0FA7049DA66BA4D145E540C4A1FF407F7E7CC835CA4B398E82D686C
2,966,658 UART: [art] SIG.S = 9EE31B03A8F080E39B9C5CD6E9EB12773A57BFC21C49D3559F993B1DD367828C1FDB803F87A072C7283F2C0353E95CE8
2,990,527 UART: Caliptra RT
2,990,780 UART: [state] CFI Enabled
3,097,545 UART: [rt] RT listening for mailbox commands...
3,098,215 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,669 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,311 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,491 UART: [kat] SHA2-512-ACC
908,392 UART: [kat] ECC-384
918,503 UART: [kat] HMAC-384Kdf
923,357 UART: [kat] LMS
1,171,685 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,173,084 UART: [fht] FHT @ 0x50003400
1,175,703 UART: [idev] ++
1,175,871 UART: [idev] CDI.KEYID = 6
1,176,231 UART: [idev] SUBJECT.KEYID = 7
1,176,655 UART: [idev] UDS.KEYID = 0
1,177,000 ready_for_fw is high
1,177,000 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,848 UART: [idev] Sha1 KeyId Algorithm
1,210,326 UART: [idev] --
1,211,314 UART: [ldev] ++
1,211,482 UART: [ldev] CDI.KEYID = 6
1,211,845 UART: [ldev] SUBJECT.KEYID = 5
1,212,271 UART: [ldev] AUTHORITY.KEYID = 7
1,212,734 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,472 UART: [ldev] --
1,283,959 UART: [fwproc] Wait for Commands...
1,284,617 UART: [fwproc] Recv command 0x46574c44
1,285,345 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,526 >>> mbox cmd response: success
2,772,546 UART: [afmc] ++
2,772,714 UART: [afmc] CDI.KEYID = 6
2,773,076 UART: [afmc] SUBJECT.KEYID = 7
2,773,501 UART: [afmc] AUTHORITY.KEYID = 5
2,809,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,289 UART: [afmc] --
2,852,379 UART: [cold-reset] --
2,853,237 UART: [state] Locking Datavault
2,854,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,066 UART: [state] Locking ICCM
2,855,644 UART: [exit] Launching FMC @ 0x40000130
2,860,973 UART:
2,860,989 UART: Running Caliptra FMC ...
2,861,397 UART:
2,861,540 UART: [state] CFI Enabled
2,871,847 UART: [fht] FMC Alias Private Key: 7
2,979,694 UART: [art] Extend RT PCRs Done
2,980,122 UART: [art] Lock RT PCRs Done
2,981,992 UART: [art] Populate DV Done
2,990,415 UART: [fht] FMC Alias Private Key: 7
2,991,571 UART: [art] Derive CDI
2,991,851 UART: [art] Store in in slot 0x4
3,077,470 UART: [art] Derive Key Pair
3,077,830 UART: [art] Store priv key in slot 0x5
3,090,656 UART: [art] Derive Key Pair - Done
3,105,322 UART: [art] Signing Cert with AUTHO
3,105,802 UART: RITY.KEYID = 7
3,120,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,739 UART: [art] PUB.X = 934DEE7C12476A45DF0F4503CCC64A7653AFCBD139526875FF8BD2E4E34956CA5FA1859841230454930C16F88CF656CD
3,128,501 UART: [art] PUB.Y = E716AADBBF6FDB27B035EAE38710517569FCD6B4CC80E84FDDB5C8C309973DEA3B49386816F3267230533C51924238B2
3,135,454 UART: [art] SIG.R = D3A3FE5C78C02A2CAD2CD08AEA05B2BCCB7B0B524D527DD270C30CF89E63B9AE7889394F3A945A5E881F2374AF4A4117
3,142,233 UART: [art] SIG.S = 5215A78AB3EDF3DF997A0C48E53FE908D66A30BED908C70676834DEF9C5B2010C532AE10529C0D3CD035AAA666F65B6B
3,165,983 UART: Caliptra RT
3,166,328 UART: [state] CFI Enabled
3,274,375 UART: [rt] RT listening for mailbox commands...
3,275,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,643 UART: [rt]cmd =0x4c4d5356, len=1672
3,845,473 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,894 ready_for_fw is high
1,060,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,167 >>> mbox cmd response: success
2,684,683 UART:
2,684,699 UART: Running Caliptra FMC ...
2,685,107 UART:
2,685,250 UART: [state] CFI Enabled
2,695,953 UART: [fht] FMC Alias Private Key: 7
2,804,128 UART: [art] Extend RT PCRs Done
2,804,556 UART: [art] Lock RT PCRs Done
2,806,262 UART: [art] Populate DV Done
2,814,465 UART: [fht] FMC Alias Private Key: 7
2,815,621 UART: [art] Derive CDI
2,815,901 UART: [art] Store in in slot 0x4
2,901,640 UART: [art] Derive Key Pair
2,902,000 UART: [art] Store priv key in slot 0x5
2,915,120 UART: [art] Derive Key Pair - Done
2,930,122 UART: [art] Signing Cert with AUTHO
2,930,602 UART: RITY.KEYID = 7
2,945,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,505 UART: [art] PUB.X = 3ED0BDD03D3F24FB0430E7EDE4ED247CB29988E209C237476E01E9A73F1830E6B3D59EEBCF22DF977F922E6D587B2024
2,953,278 UART: [art] PUB.Y = A8DEDA9D23B0E6EB134E986D73588980853DB75F223A36974F496FE47EE9CED97CB3482EB58C243FA8E075950126238F
2,960,229 UART: [art] SIG.R = C06BCB4045F4E0145D6C4490C2727A2643FB1C9722611C9DD8E4C449F90C5C5A2C64D32F27BC1BCA2EA83BBC7391F188
2,967,006 UART: [art] SIG.S = B38E94E9876E73A9668A0FD6435250AC8405876DF62671CC9185BC5EFDF413F8FD92177C26546E1BA0F680A71ED7896B
2,991,149 UART: Caliptra RT
2,991,494 UART: [state] CFI Enabled
3,098,766 UART: [rt] RT listening for mailbox commands...
3,099,436 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,322 UART: [rt]cmd =0x4c4d5356, len=1672
3,670,200 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,238 UART: [kat] SHA2-256
891,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,917 UART: [kat] ++
896,069 UART: [kat] sha1
900,297 UART: [kat] SHA2-256
902,237 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,622 UART: [kat] HMAC-384Kdf
921,352 UART: [kat] LMS
1,169,664 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,170,973 UART: [fht] FHT @ 0x50003400
1,173,709 UART: [idev] ++
1,173,877 UART: [idev] CDI.KEYID = 6
1,174,238 UART: [idev] SUBJECT.KEYID = 7
1,174,663 UART: [idev] UDS.KEYID = 0
1,175,009 ready_for_fw is high
1,175,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,198,849 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,936 UART: [fwproc] Wait for Commands...
1,281,607 UART: [fwproc] Recv command 0x46574c44
1,282,340 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,775 >>> mbox cmd response: success
2,769,936 UART: [afmc] ++
2,770,104 UART: [afmc] CDI.KEYID = 6
2,770,467 UART: [afmc] SUBJECT.KEYID = 7
2,770,893 UART: [afmc] AUTHORITY.KEYID = 5
2,806,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,311 UART: [afmc] --
2,850,195 UART: [cold-reset] --
2,851,091 UART: [state] Locking Datavault
2,852,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,038 UART: [state] Locking ICCM
2,853,532 UART: [exit] Launching FMC @ 0x40000130
2,858,861 UART:
2,858,877 UART: Running Caliptra FMC ...
2,859,285 UART:
2,859,339 UART: [state] CFI Enabled
2,869,956 UART: [fht] FMC Alias Private Key: 7
2,977,827 UART: [art] Extend RT PCRs Done
2,978,255 UART: [art] Lock RT PCRs Done
2,979,999 UART: [art] Populate DV Done
2,988,138 UART: [fht] FMC Alias Private Key: 7
2,989,194 UART: [art] Derive CDI
2,989,474 UART: [art] Store in in slot 0x4
3,074,881 UART: [art] Derive Key Pair
3,075,241 UART: [art] Store priv key in slot 0x5
3,088,369 UART: [art] Derive Key Pair - Done
3,103,280 UART: [art] Signing Cert with AUTHO
3,103,760 UART: RITY.KEYID = 7
3,119,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,771 UART: [art] PUB.X = 5A52C7384F0174C75B4E3F2DD182A1F260161299885A3CC53325E8A37D3835A9EA3D3B512B48475DBC1183F1F66A5532
3,126,534 UART: [art] PUB.Y = C027E7EB424FB9F1B46455DE4EA293C26813C1A975342C28090EBE8DD6F05B655DB325F0A878C828AA77A924C0132A34
3,133,482 UART: [art] SIG.R = 896DAA441666E3775ED307CC165A9A8CA3269840BBE6B0C12A0A09328096325CE59C92F9B497FB7E71FA117E1519FA40
3,140,245 UART: [art] SIG.S = 42CFF6E7419943C31F36D12F5F15872C4FD156F97F0EF3F976D571489440D1052B28CAA2BFB506C41C3CC0DA3BB56E1B
3,164,493 UART: Caliptra RT
3,164,746 UART: [state] CFI Enabled
3,272,205 UART: [rt] RT listening for mailbox commands...
3,272,875 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,455 UART: [rt]cmd =0x4c4d5356, len=1672
3,843,263 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,522 ready_for_fw is high
1,056,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,667 >>> mbox cmd response: success
2,680,885 UART:
2,680,901 UART: Running Caliptra FMC ...
2,681,309 UART:
2,681,363 UART: [state] CFI Enabled
2,692,272 UART: [fht] FMC Alias Private Key: 7
2,799,443 UART: [art] Extend RT PCRs Done
2,799,871 UART: [art] Lock RT PCRs Done
2,801,317 UART: [art] Populate DV Done
2,809,466 UART: [fht] FMC Alias Private Key: 7
2,810,610 UART: [art] Derive CDI
2,810,890 UART: [art] Store in in slot 0x4
2,896,131 UART: [art] Derive Key Pair
2,896,491 UART: [art] Store priv key in slot 0x5
2,909,407 UART: [art] Derive Key Pair - Done
2,923,848 UART: [art] Signing Cert with AUTHO
2,924,328 UART: RITY.KEYID = 7
2,939,918 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,683 UART: [art] PUB.X = 4806DE2EEBA05E39EEF469690DE67054EEDF68446BF00BA4403280160912F91AB06B85D8E4C99C7130F2F6DC4C650ECE
2,947,448 UART: [art] PUB.Y = F0E8EF20015124EF7C33CBD87D51FBCF6D9C7D3DD3F4E427CB1C79F046C261752C9131997FE4739054612A957400D9AC
2,954,379 UART: [art] SIG.R = B12219AF9F84381D4E9B7A5273C465CF86AB5B5DE69A34F3980BB53B08E88A604C1DCCFE15E3F9C28F5EA732FAEFFA2B
2,961,165 UART: [art] SIG.S = CBB86437E197374042243FCA8DDC359A1FCBB73CC46D4CC0CDD44AA233D43400E6EEB86DB81CF5F963ECB5E53531D580
2,984,756 UART: Caliptra RT
2,985,009 UART: [state] CFI Enabled
3,092,961 UART: [rt] RT listening for mailbox commands...
3,093,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,397 UART: [rt]cmd =0x4c4d5356, len=1672
3,664,079 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,762 UART: [cold-reset] ++
1,171,176 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,175,146 ready_for_fw is high
1,175,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,726 UART: [idev] --
1,209,627 UART: [ldev] ++
1,209,795 UART: [ldev] CDI.KEYID = 6
1,210,159 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,131 UART: [ldev] --
1,281,397 UART: [fwproc] Wait for Commands...
1,282,128 UART: [fwproc] Recv command 0x46574c44
1,282,861 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,882 >>> mbox cmd response: success
2,770,925 UART: [afmc] ++
2,771,093 UART: [afmc] CDI.KEYID = 6
2,771,456 UART: [afmc] SUBJECT.KEYID = 7
2,771,882 UART: [afmc] AUTHORITY.KEYID = 5
2,807,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,794 UART: [afmc] --
2,850,778 UART: [cold-reset] --
2,851,672 UART: [state] Locking Datavault
2,852,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,307 UART: [state] Locking ICCM
2,853,775 UART: [exit] Launching FMC @ 0x40000130
2,859,104 UART:
2,859,120 UART: Running Caliptra FMC ...
2,859,528 UART:
2,859,671 UART: [state] CFI Enabled
2,870,880 UART: [fht] FMC Alias Private Key: 7
2,978,491 UART: [art] Extend RT PCRs Done
2,978,919 UART: [art] Lock RT PCRs Done
2,980,161 UART: [art] Populate DV Done
2,988,362 UART: [fht] FMC Alias Private Key: 7
2,989,542 UART: [art] Derive CDI
2,989,822 UART: [art] Store in in slot 0x4
3,075,555 UART: [art] Derive Key Pair
3,075,915 UART: [art] Store priv key in slot 0x5
3,089,013 UART: [art] Derive Key Pair - Done
3,103,912 UART: [art] Signing Cert with AUTHO
3,104,392 UART: RITY.KEYID = 7
3,119,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,381 UART: [art] PUB.X = 84381F288DD06B3362FC89C028E8E13D56F8D230E6EF417470809CFFC55F4D5FCB500A76D620F1154A31208C8EF138FD
3,127,152 UART: [art] PUB.Y = F4BD1FFDB729796261028F82C4B8CFD117D694D8B4F8770265DEEA164E4833A209BF30D429214C26E715F9C17D67536B
3,134,095 UART: [art] SIG.R = C701C7BD9F1F678605A654273ACB81CBE9AB817E3D4C71E67099EB56D8E69344185933D38BFE54AD949BF11E3C600CBD
3,140,866 UART: [art] SIG.S = 4852212E6F06CD8C2ADDA5675888857794CD487082AEAD344BC69B19C4105649761BEE218EAAA79E09E0DC5023A4A401
3,164,290 UART: Caliptra RT
3,164,635 UART: [state] CFI Enabled
3,272,204 UART: [rt] RT listening for mailbox commands...
3,272,874 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,468 UART: [rt]cmd =0x4c4d5356, len=1672
3,843,328 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,887 ready_for_fw is high
1,055,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,520 >>> mbox cmd response: success
2,682,824 UART:
2,682,840 UART: Running Caliptra FMC ...
2,683,248 UART:
2,683,391 UART: [state] CFI Enabled
2,694,128 UART: [fht] FMC Alias Private Key: 7
2,801,901 UART: [art] Extend RT PCRs Done
2,802,329 UART: [art] Lock RT PCRs Done
2,803,709 UART: [art] Populate DV Done
2,811,794 UART: [fht] FMC Alias Private Key: 7
2,812,754 UART: [art] Derive CDI
2,813,034 UART: [art] Store in in slot 0x4
2,898,363 UART: [art] Derive Key Pair
2,898,723 UART: [art] Store priv key in slot 0x5
2,912,319 UART: [art] Derive Key Pair - Done
2,927,006 UART: [art] Signing Cert with AUTHO
2,927,486 UART: RITY.KEYID = 7
2,943,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,785 UART: [art] PUB.X = 6D157A15D930E6B1231621BF62FDBA46CFC6F98C337648358DBAD7A28925B8AFFC6EEDD59AADA8D61F166253D95CFFEE
2,950,577 UART: [art] PUB.Y = C4C08FFDECF95CA41010BB46FD64F43786AB7EBBA255036BCB9A74CDD929D48D9FBC2A91694CA69567820A339A92FBC1
2,957,541 UART: [art] SIG.R = E36A674E6485BDBDACBB1AC8E9CE8AD90509D0A17A160ED3C10093EF1615E80118A7B2A736F4C4C5CF1C6B8A811F6B97
2,964,295 UART: [art] SIG.S = 521B9EF517690D5021B2FCAC750C67899E59EACBA954F8B05ABBA65080160ACDBB376F003B0E9BAB748E252DAE60BB89
2,987,958 UART: Caliptra RT
2,988,303 UART: [state] CFI Enabled
3,096,862 UART: [rt] RT listening for mailbox commands...
3,097,532 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,176 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,104 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,066 UART:
192,448 UART: Running Caliptra ROM ...
193,606 UART:
193,756 UART: [state] CFI Enabled
261,914 UART: [state] LifecycleState = Unprovisioned
263,850 UART: [state] DebugLocked = No
266,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,035 UART: [kat] SHA2-256
441,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,252 UART: [kat] ++
452,727 UART: [kat] sha1
463,819 UART: [kat] SHA2-256
466,537 UART: [kat] SHA2-384
472,170 UART: [kat] SHA2-512-ACC
474,546 UART: [kat] ECC-384
2,769,159 UART: [kat] HMAC-384Kdf
2,801,009 UART: [kat] LMS
3,991,310 UART: [kat] --
3,995,177 UART: [cold-reset] ++
3,997,051 UART: [fht] Storing FHT @ 0x50003400
4,008,464 UART: [idev] ++
4,009,039 UART: [idev] CDI.KEYID = 6
4,009,967 UART: [idev] SUBJECT.KEYID = 7
4,011,218 UART: [idev] UDS.KEYID = 0
4,012,261 ready_for_fw is high
4,012,481 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,638 UART: [idev] Erasing UDS.KEYID = 0
7,349,995 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,666 UART: [idev] --
7,376,768 UART: [ldev] ++
7,377,338 UART: [ldev] CDI.KEYID = 6
7,378,356 UART: [ldev] SUBJECT.KEYID = 5
7,379,514 UART: [ldev] AUTHORITY.KEYID = 7
7,380,797 UART: [ldev] FE.KEYID = 1
7,424,960 UART: [ldev] Erasing FE.KEYID = 1
10,757,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,273 UART: [ldev] --
13,119,751 UART: [fwproc] Waiting for Commands...
13,121,852 UART: [fwproc] Received command 0x46574c44
13,124,031 UART: [fwproc] Received Image of size 113760 bytes
17,172,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,631,338 >>> mbox cmd response: success
17,635,901 UART: [afmc] ++
17,636,506 UART: [afmc] CDI.KEYID = 6
17,637,442 UART: [afmc] SUBJECT.KEYID = 7
17,638,665 UART: [afmc] AUTHORITY.KEYID = 5
21,008,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,743 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,155 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,993 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,446 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,115 UART: [afmc] --
23,380,769 UART: [cold-reset] --
23,383,876 UART: [state] Locking Datavault
23,387,728 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,526 UART: [state] Locking ICCM
23,392,224 UART: [exit] Launching FMC @ 0x40000130
23,400,574 UART:
23,400,811 UART: Running Caliptra FMC ...
23,401,932 UART:
23,402,096 UART: [state] CFI Enabled
23,468,994 UART: [fht] FMC Alias Private Key: 7
25,807,339 UART: [art] Extend RT PCRs Done
25,808,568 UART: [art] Lock RT PCRs Done
25,810,353 UART: [art] Populate DV Done
25,815,552 UART: [fht] FMC Alias Private Key: 7
25,817,199 UART: [art] Derive CDI
25,818,012 UART: [art] Store in in slot 0x4
25,877,814 UART: [art] Derive Key Pair
25,878,853 UART: [art] Store priv key in slot 0x5
29,171,911 UART: [art] Derive Key Pair - Done
29,185,297 UART: [art] Signing Cert with AUTHO
29,186,607 UART: RITY.KEYID = 7
31,473,401 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,911 UART: [art] PUB.X = 065193C19BD24408F4963ABBE567A32A821DB22833BFA117B7CCE355800E87F7150EE0CA1E9F0AB0303F910903B0F9C7
31,482,114 UART: [art] PUB.Y = 7261301ACEEB939F92F57781B2F6401EF05CD8DCAA7EF47C77EF40C4C8AB531518736B0C9E8A259313F05069C48644BD
31,489,351 UART: [art] SIG.R = A902A1A201EEDFB0D3EEF1A711F0F1BE64EDCF1939EC47947276AB46B721F72518D767D55F939D696586BD851146E1FB
31,496,741 UART: [art] SIG.S = DC4AC7709E3E3E4F3CAEA9C21C0AF1FC62288D86A9934E2E44983ABCAF50A9676192C6B3C47A8A9F2C125CC2742725ED
32,801,618 UART: Caliptra RT
32,802,332 UART: [state] CFI Enabled
32,962,887 UART: [rt] RT listening for mailbox commands...
32,966,875 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,011,894 UART: [rt]cmd =0x4c4d5356, len=1672
33,425,929 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,805,390 ready_for_fw is high
3,805,767 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,887,517 >>> mbox cmd response: success
23,594,404 UART:
23,594,802 UART: Running Caliptra FMC ...
23,595,996 UART:
23,596,169 UART: [state] CFI Enabled
23,660,911 UART: [fht] FMC Alias Private Key: 7
25,999,416 UART: [art] Extend RT PCRs Done
26,000,643 UART: [art] Lock RT PCRs Done
26,002,605 UART: [art] Populate DV Done
26,007,756 UART: [fht] FMC Alias Private Key: 7
26,009,309 UART: [art] Derive CDI
26,010,133 UART: [art] Store in in slot 0x4
26,070,158 UART: [art] Derive Key Pair
26,071,204 UART: [art] Store priv key in slot 0x5
29,363,788 UART: [art] Derive Key Pair - Done
29,376,681 UART: [art] Signing Cert with AUTHO
29,377,983 UART: RITY.KEYID = 7
31,666,073 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,581 UART: [art] PUB.X = D9264D23C0F2E1A9F5049DDB4316912D5EEE1922FDE932DE0676F251BDF904E8179B875F12D0FD1239C394E552352C2C
31,674,804 UART: [art] PUB.Y = EC0A240B0AF2AB51F75DEB42121D90F96240B4162ADCA5457FF22B9B12A886B801644ED63B228926BD163908B4CA45A6
31,682,057 UART: [art] SIG.R = E3A871B958BF13303BDA4D8E12C0F09C871383EC329E1C7259C001DD5BF6FAB7DB4054AB63E1182FF6FD6A37881A12FD
31,689,416 UART: [art] SIG.S = 8DA2CDBBACE7246B1FCF59A9679703A71B7F0F9CFE5B45E848E4266C79AB8097A464C06CE0B9B101CC15B0AF950043CA
32,994,416 UART: Caliptra RT
32,995,136 UART: [state] CFI Enabled
33,156,896 UART: [rt] RT listening for mailbox commands...
33,160,866 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,206,175 UART: [rt]cmd =0x4c4d5356, len=1672
33,620,219 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,690 writing to cptra_bootfsm_go
192,916 UART:
193,291 UART: Running Caliptra ROM ...
194,485 UART:
603,996 UART: [state] CFI Enabled
620,634 UART: [state] LifecycleState = Unprovisioned
622,503 UART: [state] DebugLocked = No
624,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,587 UART: [kat] SHA2-256
799,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,871 UART: [kat] ++
810,353 UART: [kat] sha1
821,220 UART: [kat] SHA2-256
823,874 UART: [kat] SHA2-384
829,580 UART: [kat] SHA2-512-ACC
831,945 UART: [kat] ECC-384
3,116,212 UART: [kat] HMAC-384Kdf
3,128,730 UART: [kat] LMS
4,318,847 UART: [kat] --
4,323,868 UART: [cold-reset] ++
4,325,379 UART: [fht] Storing FHT @ 0x50003400
4,335,932 UART: [idev] ++
4,336,496 UART: [idev] CDI.KEYID = 6
4,337,530 UART: [idev] SUBJECT.KEYID = 7
4,338,699 UART: [idev] UDS.KEYID = 0
4,339,727 ready_for_fw is high
4,339,922 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,809 UART: [idev] Erasing UDS.KEYID = 0
7,630,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,170 UART: [idev] --
7,655,595 UART: [ldev] ++
7,656,177 UART: [ldev] CDI.KEYID = 6
7,657,139 UART: [ldev] SUBJECT.KEYID = 5
7,658,341 UART: [ldev] AUTHORITY.KEYID = 7
7,659,636 UART: [ldev] FE.KEYID = 1
7,672,763 UART: [ldev] Erasing FE.KEYID = 1
10,959,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,556 UART: [ldev] --
13,319,742 UART: [fwproc] Waiting for Commands...
13,322,260 UART: [fwproc] Received command 0x46574c44
13,324,651 UART: [fwproc] Received Image of size 113760 bytes
17,373,289 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,440 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,850 >>> mbox cmd response: success
17,841,079 UART: [afmc] ++
17,841,706 UART: [afmc] CDI.KEYID = 6
17,842,617 UART: [afmc] SUBJECT.KEYID = 7
17,843,825 UART: [afmc] AUTHORITY.KEYID = 5
21,158,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,844 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,159 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,534 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,319 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,827 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,290 UART: [afmc] --
23,519,773 UART: [cold-reset] --
23,522,715 UART: [state] Locking Datavault
23,526,934 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,696 UART: [state] Locking ICCM
23,530,675 UART: [exit] Launching FMC @ 0x40000130
23,539,071 UART:
23,539,329 UART: Running Caliptra FMC ...
23,540,431 UART:
23,540,592 UART: [state] CFI Enabled
23,548,606 UART: [fht] FMC Alias Private Key: 7
25,879,736 UART: [art] Extend RT PCRs Done
25,880,969 UART: [art] Lock RT PCRs Done
25,882,435 UART: [art] Populate DV Done
25,887,847 UART: [fht] FMC Alias Private Key: 7
25,889,479 UART: [art] Derive CDI
25,890,302 UART: [art] Store in in slot 0x4
25,933,276 UART: [art] Derive Key Pair
25,934,271 UART: [art] Store priv key in slot 0x5
29,176,432 UART: [art] Derive Key Pair - Done
29,189,217 UART: [art] Signing Cert with AUTHO
29,190,522 UART: RITY.KEYID = 7
31,469,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,443 UART: [art] PUB.X = BB1A63D615FF8D169FA83F896D346FF2C33B0D4F44061089D67C5C339547A76D2173402DDBC5DE15AD94D73D5F2FE223
31,478,666 UART: [art] PUB.Y = 1BEEE66E6C430D06A182A675B7DFB818A4A3B3F698E17C8E9D5E4A1B08307288ECF13E991291B40F1CFADEF2274EB32A
31,485,900 UART: [art] SIG.R = 855B686E8DB9DF4A35903D56ABC04391025E4BB45B3916B7974EBA09D88101F05ACE60DB5197D3E43D2DB4200734740A
31,493,274 UART: [art] SIG.S = 924F760F37017F95E08741B1E162351F7C0038E28C248775B721DDC079F0C4026782C83B0783B809DF68924D8FF5A2D5
32,798,243 UART: Caliptra RT
32,798,957 UART: [state] CFI Enabled
32,916,075 UART: [rt] RT listening for mailbox commands...
32,920,002 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,964,561 UART: [rt]cmd =0x4c4d5356, len=1672
33,378,426 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
4,134,314 ready_for_fw is high
4,134,750 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,081,126 >>> mbox cmd response: success
23,724,701 UART:
23,725,085 UART: Running Caliptra FMC ...
23,726,182 UART:
23,726,330 UART: [state] CFI Enabled
23,734,433 UART: [fht] FMC Alias Private Key: 7
26,065,657 UART: [art] Extend RT PCRs Done
26,066,881 UART: [art] Lock RT PCRs Done
26,068,481 UART: [art] Populate DV Done
26,074,003 UART: [fht] FMC Alias Private Key: 7
26,075,663 UART: [art] Derive CDI
26,076,399 UART: [art] Store in in slot 0x4
26,118,829 UART: [art] Derive Key Pair
26,119,867 UART: [art] Store priv key in slot 0x5
29,361,486 UART: [art] Derive Key Pair - Done
29,374,536 UART: [art] Signing Cert with AUTHO
29,375,838 UART: RITY.KEYID = 7
31,655,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,066 UART: [art] PUB.X = 61B28DF821FDF6F4A95086DF95097040E4422E675E67CE79188170AD0B3904DAB88B997889ED5AC94663AC6669C2253F
31,664,312 UART: [art] PUB.Y = B538681B7006B0340D65C0CC043AE1F45714073818BDA53A327AE8952F2414ADF6508E6F94CE0AA1F43F6A3EBC70CEE6
31,671,524 UART: [art] SIG.R = F814DE78F78FA0ED8BA785CE420A0D3DC6BAD995CBB476AD5CD63316D9CBB573CF56F2095D71F3B5ADEB2A9773C34C75
31,678,972 UART: [art] SIG.S = 57EC400F9EC4150F966E71687DF920CC528A8D74F723612CC2B71FD952B80526969E684FDCB6D7F2935E974B68597C37
32,983,972 UART: Caliptra RT
32,984,687 UART: [state] CFI Enabled
33,102,112 UART: [rt] RT listening for mailbox commands...
33,106,041 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,150,653 UART: [rt]cmd =0x4c4d5356, len=1672
33,564,620 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,582 UART:
192,982 UART: Running Caliptra ROM ...
194,085 UART:
194,230 UART: [state] CFI Enabled
264,767 UART: [state] LifecycleState = Unprovisioned
266,627 UART: [state] DebugLocked = No
269,014 UART: [state] WD Timer not started. Device not locked for debugging
272,201 UART: [kat] SHA2-256
451,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,930 UART: [kat] ++
463,457 UART: [kat] sha1
474,118 UART: [kat] SHA2-256
477,196 UART: [kat] SHA2-384
483,675 UART: [kat] SHA2-512-ACC
486,576 UART: [kat] ECC-384
2,948,620 UART: [kat] HMAC-384Kdf
2,969,704 UART: [kat] LMS
3,499,156 UART: [kat] --
3,503,364 UART: [cold-reset] ++
3,504,866 UART: [fht] FHT @ 0x50003400
3,516,338 UART: [idev] ++
3,516,924 UART: [idev] CDI.KEYID = 6
3,517,836 UART: [idev] SUBJECT.KEYID = 7
3,519,004 UART: [idev] UDS.KEYID = 0
3,520,057 ready_for_fw is high
3,520,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,212 UART: [idev] Erasing UDS.KEYID = 0
6,026,327 UART: [idev] Sha1 KeyId Algorithm
6,049,011 UART: [idev] --
6,052,799 UART: [ldev] ++
6,053,385 UART: [ldev] CDI.KEYID = 6
6,054,273 UART: [ldev] SUBJECT.KEYID = 5
6,055,488 UART: [ldev] AUTHORITY.KEYID = 7
6,056,724 UART: [ldev] FE.KEYID = 1
6,098,091 UART: [ldev] Erasing FE.KEYID = 1
8,601,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,705 UART: [ldev] --
10,414,203 UART: [fwproc] Wait for Commands...
10,416,145 UART: [fwproc] Recv command 0x46574c44
10,418,202 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,279,138 >>> mbox cmd response: success
14,284,095 UART: [afmc] ++
14,284,696 UART: [afmc] CDI.KEYID = 6
14,285,579 UART: [afmc] SUBJECT.KEYID = 7
14,286,792 UART: [afmc] AUTHORITY.KEYID = 5
16,828,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,271 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,155 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,547 UART: [afmc] --
18,628,891 UART: [cold-reset] --
18,632,524 UART: [state] Locking Datavault
18,639,276 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,916 UART: [state] Locking ICCM
18,643,116 UART: [exit] Launching FMC @ 0x40000130
18,651,533 UART:
18,651,794 UART: Running Caliptra FMC ...
18,652,818 UART:
18,652,966 UART: [state] CFI Enabled
18,711,160 UART: [fht] FMC Alias Private Key: 7
20,475,043 UART: [art] Extend RT PCRs Done
20,476,270 UART: [art] Lock RT PCRs Done
20,478,322 UART: [art] Populate DV Done
20,483,730 UART: [fht] FMC Alias Private Key: 7
20,485,332 UART: [art] Derive CDI
20,486,102 UART: [art] Store in in slot 0x4
20,544,123 UART: [art] Derive Key Pair
20,545,126 UART: [art] Store priv key in slot 0x5
23,008,516 UART: [art] Derive Key Pair - Done
23,021,301 UART: [art] Signing Cert with AUTHO
23,022,608 UART: RITY.KEYID = 7
24,734,882 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,386 UART: [art] PUB.X = 13D0B78F5D24952AE81217DBD7819C205C84B706689A61187509D1E7F321C22854991083E06D7F7E7609A292B5B2B7DA
24,743,617 UART: [art] PUB.Y = B8C34B7062B156CE8F2DEFAB09AD78EC48231E21D26E644339257EBAB7263D80E6618318EFD540F2953D8C865C447837
24,750,884 UART: [art] SIG.R = 1EC64D1AF05451FAA4335D1F05CE2151B62F25F1E7822C460DEBF6C92724DC6DE276F9A517F6379F9FE49B15F79D08EF
24,758,241 UART: [art] SIG.S = 34612255B7CD0D50AC7EEC5F5385ACB13EFE4F76573E5F1FC4E9EAFE904D7396651297DAE50C25D122FDED8105569F2F
25,737,122 UART: Caliptra RT
25,737,826 UART: [state] CFI Enabled
25,902,328 UART: [rt] RT listening for mailbox commands...
25,906,346 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,951,259 UART: [rt]cmd =0x4c4d5356, len=1672
26,152,443 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,384,154 ready_for_fw is high
3,384,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,218 >>> mbox cmd response: success
18,315,434 UART:
18,315,846 UART: Running Caliptra FMC ...
18,316,961 UART:
18,317,110 UART: [state] CFI Enabled
18,383,645 UART: [fht] FMC Alias Private Key: 7
20,147,751 UART: [art] Extend RT PCRs Done
20,148,960 UART: [art] Lock RT PCRs Done
20,150,721 UART: [art] Populate DV Done
20,156,023 UART: [fht] FMC Alias Private Key: 7
20,157,778 UART: [art] Derive CDI
20,158,509 UART: [art] Store in in slot 0x4
20,216,729 UART: [art] Derive Key Pair
20,217,760 UART: [art] Store priv key in slot 0x5
22,681,189 UART: [art] Derive Key Pair - Done
22,693,672 UART: [art] Signing Cert with AUTHO
22,694,983 UART: RITY.KEYID = 7
24,406,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,408,281 UART: [art] PUB.X = 58829475D42CE2C0ABF33691E3AC4BB818FAF5E4BBB600EBE5AA47833494CBE9DB052D6694C467F89BFDB4D60320AE68
24,415,537 UART: [art] PUB.Y = 19D587C58BB6B0D6E220D922786B796D230054EA2501FC958FB77759B6DC646851FCE7A133988162103A1C0BF1745102
24,423,333 UART: [art] SIG.R = C39D240E9775B8CA0F8690AFA18A3C2B172170466D6425434470668AC2C174A924F1605E725ED2223CE4EA46BC31DB0F
24,430,164 UART: [art] SIG.S = EDCA69499D7C833EFB5CA88D3D2E5748E72ED17160622D84A5CA063E907A2354A3BC3A055FCF470F0C1DDFF61AFEC2BE
25,408,949 UART: Caliptra RT
25,409,641 UART: [state] CFI Enabled
25,574,027 UART: [rt] RT listening for mailbox commands...
25,578,057 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,622,966 UART: [rt]cmd =0x4c4d5356, len=1672
25,824,232 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
193,074 UART:
193,446 UART: Running Caliptra ROM ...
194,635 UART:
604,213 UART: [state] CFI Enabled
620,299 UART: [state] LifecycleState = Unprovisioned
622,178 UART: [state] DebugLocked = No
624,055 UART: [state] WD Timer not started. Device not locked for debugging
628,608 UART: [kat] SHA2-256
807,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,283 UART: [kat] ++
819,741 UART: [kat] sha1
829,974 UART: [kat] SHA2-256
832,984 UART: [kat] SHA2-384
839,548 UART: [kat] SHA2-512-ACC
842,555 UART: [kat] ECC-384
3,286,301 UART: [kat] HMAC-384Kdf
3,299,965 UART: [kat] LMS
3,829,474 UART: [kat] --
3,834,818 UART: [cold-reset] ++
3,836,183 UART: [fht] FHT @ 0x50003400
3,847,449 UART: [idev] ++
3,848,021 UART: [idev] CDI.KEYID = 6
3,848,940 UART: [idev] SUBJECT.KEYID = 7
3,850,132 UART: [idev] UDS.KEYID = 0
3,851,063 ready_for_fw is high
3,851,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,630 UART: [idev] Erasing UDS.KEYID = 0
6,321,278 UART: [idev] Sha1 KeyId Algorithm
6,343,583 UART: [idev] --
6,348,098 UART: [ldev] ++
6,348,680 UART: [ldev] CDI.KEYID = 6
6,349,570 UART: [ldev] SUBJECT.KEYID = 5
6,350,777 UART: [ldev] AUTHORITY.KEYID = 7
6,352,007 UART: [ldev] FE.KEYID = 1
6,363,418 UART: [ldev] Erasing FE.KEYID = 1
8,839,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,390 UART: [ldev] --
10,631,203 UART: [fwproc] Wait for Commands...
10,634,274 UART: [fwproc] Recv command 0x46574c44
10,636,363 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,733 >>> mbox cmd response: success
14,495,682 UART: [afmc] ++
14,496,306 UART: [afmc] CDI.KEYID = 6
14,497,225 UART: [afmc] SUBJECT.KEYID = 7
14,498,333 UART: [afmc] AUTHORITY.KEYID = 5
16,998,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,806 UART: [afmc] --
18,795,695 UART: [cold-reset] --
18,797,946 UART: [state] Locking Datavault
18,803,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,330 UART: [state] Locking ICCM
18,807,479 UART: [exit] Launching FMC @ 0x40000130
18,815,893 UART:
18,816,170 UART: Running Caliptra FMC ...
18,817,284 UART:
18,817,446 UART: [state] CFI Enabled
18,825,604 UART: [fht] FMC Alias Private Key: 7
20,582,790 UART: [art] Extend RT PCRs Done
20,584,008 UART: [art] Lock RT PCRs Done
20,585,498 UART: [art] Populate DV Done
20,590,970 UART: [fht] FMC Alias Private Key: 7
20,592,619 UART: [art] Derive CDI
20,593,437 UART: [art] Store in in slot 0x4
20,636,087 UART: [art] Derive Key Pair
20,637,093 UART: [art] Store priv key in slot 0x5
23,063,530 UART: [art] Derive Key Pair - Done
23,076,753 UART: [art] Signing Cert with AUTHO
23,078,093 UART: RITY.KEYID = 7
24,783,365 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,864 UART: [art] PUB.X = F738E9A4A80FD80B74EF41BA513DB98501FA843E460EB2A5C425BBB69EF50A2F536D8AF651C6EAF2DB9EFFB77FD3B513
24,792,191 UART: [art] PUB.Y = 90EF1D75FCBB6AFC632860D0D0B9956BFB2DEE114A86DD33A4BEA3BC173FB5BCCB1CA5D47C9346DC1CAED88DB136B363
24,799,506 UART: [art] SIG.R = ED5B647A5D1F105696F7124CE0C915C9BE80425331416CDA9D14429D6FDD6728B31B734460F0BA753BD3E14EF2EF9182
24,806,930 UART: [art] SIG.S = C376AA82A6B9AA4814FEA7DC8691D0606BB983CBB1BF8E5DA94B28722C2D6D483A22EB821224A053A919B0776ED53A0C
25,786,360 UART: Caliptra RT
25,787,087 UART: [state] CFI Enabled
25,904,266 UART: [rt] RT listening for mailbox commands...
25,908,230 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,952,756 UART: [rt]cmd =0x4c4d5356, len=1672
26,153,796 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
3,700,035 ready_for_fw is high
3,700,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,620 >>> mbox cmd response: success
18,525,327 UART:
18,526,037 UART: Running Caliptra FMC ...
18,527,179 UART:
18,527,347 UART: [state] CFI Enabled
18,534,986 UART: [fht] FMC Alias Private Key: 7
20,291,992 UART: [art] Extend RT PCRs Done
20,293,490 UART: [art] Lock RT PCRs Done
20,294,726 UART: [art] Populate DV Done
20,300,267 UART: [fht] FMC Alias Private Key: 7
20,301,867 UART: [art] Derive CDI
20,302,692 UART: [art] Store in in slot 0x4
20,344,970 UART: [art] Derive Key Pair
20,345,976 UART: [art] Store priv key in slot 0x5
22,772,743 UART: [art] Derive Key Pair - Done
22,785,640 UART: [art] Signing Cert with AUTHO
22,786,953 UART: RITY.KEYID = 7
24,491,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,473 UART: [art] PUB.X = FF49DC2AF43710CF2D5BE28978FA69525C3719CA8D65256F2AB0A14E920A2856004CD44235E91AFFAA147DAD669D41A1
24,500,775 UART: [art] PUB.Y = DFB6A607BD7B14BF256AF386DDF9AB4925F68D270664E331E4195D65AE500237F2C04B322DD1D16C207E8E0E40189054
24,507,979 UART: [art] SIG.R = F95CC6B091F00C7D001901A7B74A195171BC6DB4BE57CE9248F7F75EB0ED7A7B647334946EAB306DC29AF00CA18AC47C
24,515,449 UART: [art] SIG.S = 1288696C1937564EF5695194089514B04FE53C0C44E239F7EB20F1FC3599CD2B23F0F5458C60E2D2A9C6227604D6489E
25,493,915 UART: Caliptra RT
25,494,625 UART: [state] CFI Enabled
25,611,584 UART: [rt] RT listening for mailbox commands...
25,615,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,660,066 UART: [rt]cmd =0x4c4d5356, len=1672
25,861,264 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,454 UART:
192,857 UART: Running Caliptra ROM ...
193,963 UART:
194,104 UART: [state] CFI Enabled
264,001 UART: [state] LifecycleState = Unprovisioned
266,364 UART: [state] DebugLocked = No
269,091 UART: [state] WD Timer not started. Device not locked for debugging
273,995 UART: [kat] SHA2-256
463,842 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,657 UART: [kat] ++
475,098 UART: [kat] sha1
486,896 UART: [kat] SHA2-256
489,902 UART: [kat] SHA2-384
496,256 UART: [kat] SHA2-512-ACC
498,845 UART: [kat] ECC-384
2,946,562 UART: [kat] HMAC-384Kdf
2,972,406 UART: [kat] LMS
3,504,171 UART: [kat] --
3,505,672 UART: [cold-reset] ++
3,507,812 UART: [fht] FHT @ 0x50003400
3,519,565 UART: [idev] ++
3,520,193 UART: [idev] CDI.KEYID = 6
3,521,187 UART: [idev] SUBJECT.KEYID = 7
3,522,357 UART: [idev] UDS.KEYID = 0
3,523,292 ready_for_fw is high
3,523,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,007 UART: [idev] Erasing UDS.KEYID = 0
6,032,119 UART: [idev] Sha1 KeyId Algorithm
6,054,984 UART: [idev] --
6,059,036 UART: [ldev] ++
6,059,720 UART: [ldev] CDI.KEYID = 6
6,060,632 UART: [ldev] SUBJECT.KEYID = 5
6,061,791 UART: [ldev] AUTHORITY.KEYID = 7
6,063,040 UART: [ldev] FE.KEYID = 1
6,102,679 UART: [ldev] Erasing FE.KEYID = 1
8,609,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,311 UART: [ldev] --
10,416,884 UART: [fwproc] Wait for Commands...
10,419,901 UART: [fwproc] Recv command 0x46574c44
10,422,154 UART: [fwproc] Recv'd Img size: 114084 bytes
13,871,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,374 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,607,633 >>> mbox cmd response: success
14,611,973 UART: [afmc] ++
14,612,699 UART: [afmc] CDI.KEYID = 6
14,613,889 UART: [afmc] SUBJECT.KEYID = 7
14,615,330 UART: [afmc] AUTHORITY.KEYID = 5
17,152,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,586 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,927 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,521 UART: [afmc] --
18,950,056 UART: [cold-reset] --
18,953,814 UART: [state] Locking Datavault
18,958,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,121 UART: [state] Locking ICCM
18,962,950 UART: [exit] Launching FMC @ 0x40000130
18,971,644 UART:
18,971,942 UART: Running Caliptra FMC ...
18,972,972 UART:
18,973,116 UART: [state] CFI Enabled
19,034,729 UART: [fht] FMC Alias Private Key: 7
20,798,783 UART: [art] Extend RT PCRs Done
20,800,004 UART: [art] Lock RT PCRs Done
20,801,664 UART: [art] Populate DV Done
20,807,182 UART: [fht] FMC Alias Private Key: 7
20,808,751 UART: [art] Derive CDI
20,809,496 UART: [art] Store in in slot 0x4
20,867,401 UART: [art] Derive Key Pair
20,868,402 UART: [art] Store priv key in slot 0x5
23,331,519 UART: [art] Derive Key Pair - Done
23,344,566 UART: [art] Signing Cert with AUTHO
23,345,861 UART: RITY.KEYID = 7
25,057,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,517 UART: [art] PUB.X = FE26BAAD432B67CD4B540FD03B36869308BD33978D021944DAF15DFC09F923CC873BF320A5D0D8784ACBA95F0BA08AE6
25,066,790 UART: [art] PUB.Y = 711411B10551E8EBE1679212403A1CD9D79DA8CFFBEFD73140655DA3BC5A62D19E8112D3C11DA8362C06C8BD34683C9E
25,074,054 UART: [art] SIG.R = 51C6EEF75989AF08752ACC3B8442A2E8EA4907817FD9164429F80D52D7EB3061D2ED1557E9FA09CF0E89B0567526145F
25,081,430 UART: [art] SIG.S = 8B35FB5AC19C87503902238495283405DF14919ED884ABF3373EF88099812D8044F17D0F53236C00FC5D59EA926F07DA
26,060,296 UART: Caliptra RT
26,061,003 UART: [state] CFI Enabled
26,225,330 UART: [rt] RT listening for mailbox commands...
26,229,274 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,274,206 UART: [rt]cmd =0x4c4d5356, len=1672
26,475,518 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,435,178 ready_for_fw is high
3,435,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,729,825 >>> mbox cmd response: success
19,009,922 UART:
19,010,328 UART: Running Caliptra FMC ...
19,011,529 UART:
19,011,690 UART: [state] CFI Enabled
19,074,879 UART: [fht] FMC Alias Private Key: 7
20,839,188 UART: [art] Extend RT PCRs Done
20,840,399 UART: [art] Lock RT PCRs Done
20,841,995 UART: [art] Populate DV Done
20,847,521 UART: [fht] FMC Alias Private Key: 7
20,849,009 UART: [art] Derive CDI
20,849,749 UART: [art] Store in in slot 0x4
20,907,872 UART: [art] Derive Key Pair
20,908,913 UART: [art] Store priv key in slot 0x5
23,372,007 UART: [art] Derive Key Pair - Done
23,385,150 UART: [art] Signing Cert with AUTHO
23,386,461 UART: RITY.KEYID = 7
25,098,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,985 UART: [art] PUB.X = 5B9802AB7D83764FF93E3BA18753807F3A7B36FA885F58B73E96B2BD4FD1907D8D73C1E189F482B7F45F909059045978
25,107,241 UART: [art] PUB.Y = 72724220A777C5F99F02A10F6B950B734CEA50436F1A9E180D07BA7569BA7512E708EEA03412AC41C7CAC6C73280484E
25,114,487 UART: [art] SIG.R = C6782F4851007D26FB5B71D51734F31CEF5D52629F4CD30DF2625EB0B3AE12B2831E050BF74B474D919B416B6EC00A4C
25,121,868 UART: [art] SIG.S = CE03ECDDF4059E528FB8B7F39BFF5BA6D0F7AB5A2B1AA935DDE9ADF8CBD8DE207B9252B7E953C4F83F9F29D731B4C37B
26,101,071 UART: Caliptra RT
26,101,772 UART: [state] CFI Enabled
26,267,649 UART: [rt] RT listening for mailbox commands...
26,271,578 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,316,619 UART: [rt]cmd =0x4c4d5356, len=1672
26,517,693 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
192,982 UART:
193,356 UART: Running Caliptra ROM ...
194,507 UART:
603,952 UART: [state] CFI Enabled
615,276 UART: [state] LifecycleState = Unprovisioned
617,655 UART: [state] DebugLocked = No
620,553 UART: [state] WD Timer not started. Device not locked for debugging
625,868 UART: [kat] SHA2-256
815,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,538 UART: [kat] ++
827,063 UART: [kat] sha1
837,937 UART: [kat] SHA2-256
841,010 UART: [kat] SHA2-384
846,870 UART: [kat] SHA2-512-ACC
849,451 UART: [kat] ECC-384
3,291,377 UART: [kat] HMAC-384Kdf
3,303,984 UART: [kat] LMS
3,835,775 UART: [kat] --
3,841,332 UART: [cold-reset] ++
3,842,628 UART: [fht] FHT @ 0x50003400
3,853,541 UART: [idev] ++
3,854,249 UART: [idev] CDI.KEYID = 6
3,855,149 UART: [idev] SUBJECT.KEYID = 7
3,856,391 UART: [idev] UDS.KEYID = 0
3,857,289 ready_for_fw is high
3,857,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,737 UART: [idev] Erasing UDS.KEYID = 0
6,334,776 UART: [idev] Sha1 KeyId Algorithm
6,356,325 UART: [idev] --
6,359,642 UART: [ldev] ++
6,360,379 UART: [ldev] CDI.KEYID = 6
6,361,270 UART: [ldev] SUBJECT.KEYID = 5
6,362,422 UART: [ldev] AUTHORITY.KEYID = 7
6,363,649 UART: [ldev] FE.KEYID = 1
6,376,946 UART: [ldev] Erasing FE.KEYID = 1
8,852,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,165 UART: [ldev] --
10,643,186 UART: [fwproc] Wait for Commands...
10,644,740 UART: [fwproc] Recv command 0x46574c44
10,646,995 UART: [fwproc] Recv'd Img size: 114084 bytes
14,089,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,135 >>> mbox cmd response: success
14,827,263 UART: [afmc] ++
14,827,975 UART: [afmc] CDI.KEYID = 6
14,829,169 UART: [afmc] SUBJECT.KEYID = 7
14,830,619 UART: [afmc] AUTHORITY.KEYID = 5
17,341,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,120 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,644 UART: [afmc] --
19,139,014 UART: [cold-reset] --
19,143,950 UART: [state] Locking Datavault
19,150,735 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,902 UART: [state] Locking ICCM
19,154,200 UART: [exit] Launching FMC @ 0x40000130
19,162,886 UART:
19,163,125 UART: Running Caliptra FMC ...
19,164,226 UART:
19,164,384 UART: [state] CFI Enabled
19,172,380 UART: [fht] FMC Alias Private Key: 7
20,930,042 UART: [art] Extend RT PCRs Done
20,931,285 UART: [art] Lock RT PCRs Done
20,933,258 UART: [art] Populate DV Done
20,938,840 UART: [fht] FMC Alias Private Key: 7
20,940,436 UART: [art] Derive CDI
20,941,258 UART: [art] Store in in slot 0x4
20,983,699 UART: [art] Derive Key Pair
20,984,735 UART: [art] Store priv key in slot 0x5
23,411,067 UART: [art] Derive Key Pair - Done
23,424,236 UART: [art] Signing Cert with AUTHO
23,425,537 UART: RITY.KEYID = 7
25,130,858 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,365 UART: [art] PUB.X = 4E7690F7CFA70EE6FA81FBBF6FFF533B798C72D7A212CBE13E764F4D61A9752578E6A3BB8773FF81365EC0CC080E136B
25,139,720 UART: [art] PUB.Y = D4BBB65952D8F17B99CFAC630AF840B1927A118418F6650F69A825888540F65AC411FD1D53DEB64D4D9717F567427267
25,146,936 UART: [art] SIG.R = 8E8F61974446F5F8678598A98C43AF6EC2A91B490700813B0BEF26589623A15CF8CD12ACB60EBB40AA2C480C0CAF6F68
25,154,302 UART: [art] SIG.S = 78D25911FE16457447E61CE4A659BA7025D7A81F07C6D5222720F8AD6846ABCA4452D86591FCB4CE0A33142550F7144C
26,133,468 UART: Caliptra RT
26,134,195 UART: [state] CFI Enabled
26,251,744 UART: [rt] RT listening for mailbox commands...
26,255,678 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,300,029 UART: [rt]cmd =0x4c4d5356, len=1672
26,501,218 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
3,756,545 ready_for_fw is high
3,756,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,722 >>> mbox cmd response: success
19,198,986 UART:
19,199,390 UART: Running Caliptra FMC ...
19,200,545 UART:
19,200,713 UART: [state] CFI Enabled
19,208,613 UART: [fht] FMC Alias Private Key: 7
20,965,675 UART: [art] Extend RT PCRs Done
20,966,890 UART: [art] Lock RT PCRs Done
20,968,601 UART: [art] Populate DV Done
20,974,076 UART: [fht] FMC Alias Private Key: 7
20,975,770 UART: [art] Derive CDI
20,976,517 UART: [art] Store in in slot 0x4
21,018,691 UART: [art] Derive Key Pair
21,019,696 UART: [art] Store priv key in slot 0x5
23,445,904 UART: [art] Derive Key Pair - Done
23,458,734 UART: [art] Signing Cert with AUTHO
23,460,067 UART: RITY.KEYID = 7
25,165,263 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,756 UART: [art] PUB.X = 8D80E4D551640168625D39C315F744F74D20429E15B3498C793EBF98C63BD6C0BB43CC161F271AEAF0978007C1009850
25,174,007 UART: [art] PUB.Y = 2D748A41F2DF014B8B36442AFDC9A3F9BAABC0E213EAD5240B49822E646B499196A9BD846A128EAA87C76BEC58EF5A8F
25,181,250 UART: [art] SIG.R = D7EEAB3785126D5F6FC11308246C268E253BB8FCFF68FC992910FAA9D72F07D24293D936E30D70C01CA233B713519B9C
25,188,646 UART: [art] SIG.S = BF0FBA738A37D329EDB8CA6D9453DFE18203BE83D7EBACFA676B18DA46D6D540691C6E03900B24BC2152D6FAB46029AE
26,167,722 UART: Caliptra RT
26,168,432 UART: [state] CFI Enabled
26,286,063 UART: [rt] RT listening for mailbox commands...
26,290,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,334,582 UART: [rt]cmd =0x4c4d5356, len=1672
26,535,989 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,349 UART: [kat] SHA2-256
882,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,395 UART: [kat] ++
886,547 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,430 UART: [kat] SHA2-512-ACC
897,331 UART: [kat] ECC-384
903,232 UART: [kat] HMAC-384Kdf
907,808 UART: [kat] LMS
1,476,004 UART: [kat] --
1,477,235 UART: [cold-reset] ++
1,477,671 UART: [fht] Storing FHT @ 0x50003400
1,480,504 UART: [idev] ++
1,480,672 UART: [idev] CDI.KEYID = 6
1,481,032 UART: [idev] SUBJECT.KEYID = 7
1,481,456 UART: [idev] UDS.KEYID = 0
1,481,801 ready_for_fw is high
1,481,801 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,342 UART: [idev] Erasing UDS.KEYID = 0
1,505,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,707 UART: [ldev] Erasing FE.KEYID = 1
1,546,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,808 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,586,958 UART: [fwproc] Received command 0x46574c44
1,587,749 UART: [fwproc] Received Image of size 114084 bytes
2,883,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,459 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,274 >>> mbox cmd response: success
3,076,376 UART: [afmc] ++
3,076,544 UART: [afmc] CDI.KEYID = 6
3,076,906 UART: [afmc] SUBJECT.KEYID = 7
3,077,331 UART: [afmc] AUTHORITY.KEYID = 5
3,112,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,348 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,741 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,431 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,452 UART: [afmc] --
3,155,454 UART: [cold-reset] --
3,156,272 UART: [state] Locking Datavault
3,157,759 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,363 UART: [state] Locking ICCM
3,158,981 UART: [exit] Launching FMC @ 0x40000130
3,164,310 UART:
3,164,326 UART: Running Caliptra FMC ...
3,164,734 UART:
3,164,788 UART: [state] CFI Enabled
3,175,297 UART: [fht] FMC Alias Private Key: 7
3,283,316 UART: [art] Extend RT PCRs Done
3,283,744 UART: [art] Lock RT PCRs Done
3,285,374 UART: [art] Populate DV Done
3,293,803 UART: [fht] FMC Alias Private Key: 7
3,294,807 UART: [art] Derive CDI
3,295,087 UART: [art] Store in in slot 0x4
3,380,856 UART: [art] Derive Key Pair
3,381,216 UART: [art] Store priv key in slot 0x5
3,394,462 UART: [art] Derive Key Pair - Done
3,409,340 UART: [art] Signing Cert with AUTHO
3,409,820 UART: RITY.KEYID = 7
3,425,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,913 UART: [art] PUB.X = E99FB0085A23F72BDA352EF812A36CA49D4AD9B1F0360C2F8691C3C87EB255DD4D11F68C305B2D7E861943652ED2D51D
3,432,687 UART: [art] PUB.Y = 678CFF2181DA3A2E27B775CAAD8E1EF34260503B02206659E5C4DF40855181979CFDFEBCA5AF1CC749367F58093DF536
3,439,639 UART: [art] SIG.R = 5483DE45783C04506469D5DF779AE33C2EFDEFD40F1FD4C43B9E990E0C4ABE348AA4A83AA41B3751091B43981BE8D917
3,446,404 UART: [art] SIG.S = 4CB2EFD654508624A4B75F28F42547FEE8C3283693D103B7382EE5FE17F82C848452F51A28F6B0A69EF3DBBC653B4761
3,470,110 UART: Caliptra RT
3,470,363 UART: [state] CFI Enabled
3,578,151 UART: [rt] RT listening for mailbox commands...
3,578,821 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,507 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,271 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,065 ready_for_fw is high
1,363,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,896 >>> mbox cmd response: success
2,985,892 UART:
2,985,908 UART: Running Caliptra FMC ...
2,986,316 UART:
2,986,370 UART: [state] CFI Enabled
2,996,553 UART: [fht] FMC Alias Private Key: 7
3,103,836 UART: [art] Extend RT PCRs Done
3,104,264 UART: [art] Lock RT PCRs Done
3,105,844 UART: [art] Populate DV Done
3,114,089 UART: [fht] FMC Alias Private Key: 7
3,115,139 UART: [art] Derive CDI
3,115,419 UART: [art] Store in in slot 0x4
3,201,332 UART: [art] Derive Key Pair
3,201,692 UART: [art] Store priv key in slot 0x5
3,214,720 UART: [art] Derive Key Pair - Done
3,229,639 UART: [art] Signing Cert with AUTHO
3,230,119 UART: RITY.KEYID = 7
3,245,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,490 UART: [art] PUB.X = 9D288E600A7A003F980EF50FA29D380F81DE4B8BA348E70C1153C91EF66F310C48CAA043AF221BE8BDC9009CF5077088
3,253,203 UART: [art] PUB.Y = EDB88DF905ECDFCE5C1F49F978A297455CE0BEFDE7C77ACFAFFE939978EA617AEC6A7339E5DEAC54341D8560EA1D7A4A
3,260,182 UART: [art] SIG.R = 6619FEDF8BFD471D11CD58DC59512DA3FB72564118B5F856954CAB1782DBEC81E54508154B6E5E7392B0BD0F2199FB10
3,266,954 UART: [art] SIG.S = 500F7F3D31626DCFAA6A6081B0695A70E7EE7974F205F6B2894425AC27C1F460A92D4324E339CCF7D48787604660B136
3,290,815 UART: Caliptra RT
3,291,068 UART: [state] CFI Enabled
3,399,774 UART: [rt] RT listening for mailbox commands...
3,400,444 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,184 UART: [rt]cmd =0x4c4d5356, len=1672
3,693,912 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,839 UART: [state] LifecycleState = Unprovisioned
85,494 UART: [state] DebugLocked = No
86,124 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,652 UART: [kat] SHA2-256
881,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,698 UART: [kat] ++
885,850 UART: [kat] sha1
890,038 UART: [kat] SHA2-256
891,976 UART: [kat] SHA2-384
894,639 UART: [kat] SHA2-512-ACC
896,540 UART: [kat] ECC-384
902,165 UART: [kat] HMAC-384Kdf
906,791 UART: [kat] LMS
1,474,987 UART: [kat] --
1,475,884 UART: [cold-reset] ++
1,476,464 UART: [fht] Storing FHT @ 0x50003400
1,479,115 UART: [idev] ++
1,479,283 UART: [idev] CDI.KEYID = 6
1,479,643 UART: [idev] SUBJECT.KEYID = 7
1,480,067 UART: [idev] UDS.KEYID = 0
1,480,412 ready_for_fw is high
1,480,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,875 UART: [idev] Erasing UDS.KEYID = 0
1,504,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,729 UART: [idev] --
1,513,882 UART: [ldev] ++
1,514,050 UART: [ldev] CDI.KEYID = 6
1,514,413 UART: [ldev] SUBJECT.KEYID = 5
1,514,839 UART: [ldev] AUTHORITY.KEYID = 7
1,515,302 UART: [ldev] FE.KEYID = 1
1,520,602 UART: [ldev] Erasing FE.KEYID = 1
1,546,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,529 UART: [ldev] --
1,585,978 UART: [fwproc] Waiting for Commands...
1,586,609 UART: [fwproc] Received command 0x46574c44
1,587,400 UART: [fwproc] Received Image of size 114084 bytes
2,883,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,917 >>> mbox cmd response: success
3,077,085 UART: [afmc] ++
3,077,253 UART: [afmc] CDI.KEYID = 6
3,077,615 UART: [afmc] SUBJECT.KEYID = 7
3,078,040 UART: [afmc] AUTHORITY.KEYID = 5
3,113,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,014 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,704 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,369 UART: [afmc] --
3,156,275 UART: [cold-reset] --
3,157,107 UART: [state] Locking Datavault
3,158,472 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,076 UART: [state] Locking ICCM
3,159,572 UART: [exit] Launching FMC @ 0x40000130
3,164,901 UART:
3,164,917 UART: Running Caliptra FMC ...
3,165,325 UART:
3,165,468 UART: [state] CFI Enabled
3,175,969 UART: [fht] FMC Alias Private Key: 7
3,283,714 UART: [art] Extend RT PCRs Done
3,284,142 UART: [art] Lock RT PCRs Done
3,285,708 UART: [art] Populate DV Done
3,294,057 UART: [fht] FMC Alias Private Key: 7
3,295,149 UART: [art] Derive CDI
3,295,429 UART: [art] Store in in slot 0x4
3,380,716 UART: [art] Derive Key Pair
3,381,076 UART: [art] Store priv key in slot 0x5
3,394,294 UART: [art] Derive Key Pair - Done
3,409,043 UART: [art] Signing Cert with AUTHO
3,409,523 UART: RITY.KEYID = 7
3,424,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,696 UART: [art] PUB.X = E3E84E213823A001D3ADDD620936E491AF9E2D2919DD21BD8F64DAC408BD0EA6A4D169ADE16E00A3A914284E2F885BA3
3,432,446 UART: [art] PUB.Y = 4BD913D5AE500178DA1BD75333FC99666197DC4A4E06EE81D2EF9FF1DC9F01381F854CC385A31C4558B2BD04A3794CB7
3,439,394 UART: [art] SIG.R = 7AA9B4D207F002129E0CDC407A8B27FF2FFE3280825C5E7C3A1C9F5780FFF1EB35882CEB0467D0B1878192F5FEBD3582
3,446,164 UART: [art] SIG.S = A4BBD9685E6A3E28C8044C81B9B7682A3DC19A49014FEC453A2B64AF59B32676B8948ACF4FA905B8D7740C3C93844970
3,470,291 UART: Caliptra RT
3,470,636 UART: [state] CFI Enabled
3,579,661 UART: [rt] RT listening for mailbox commands...
3,580,331 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,701 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,351 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,140 ready_for_fw is high
1,363,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,193 >>> mbox cmd response: success
2,986,891 UART:
2,986,907 UART: Running Caliptra FMC ...
2,987,315 UART:
2,987,458 UART: [state] CFI Enabled
2,998,397 UART: [fht] FMC Alias Private Key: 7
3,106,096 UART: [art] Extend RT PCRs Done
3,106,524 UART: [art] Lock RT PCRs Done
3,107,712 UART: [art] Populate DV Done
3,115,979 UART: [fht] FMC Alias Private Key: 7
3,117,111 UART: [art] Derive CDI
3,117,391 UART: [art] Store in in slot 0x4
3,203,206 UART: [art] Derive Key Pair
3,203,566 UART: [art] Store priv key in slot 0x5
3,217,174 UART: [art] Derive Key Pair - Done
3,231,958 UART: [art] Signing Cert with AUTHO
3,232,438 UART: RITY.KEYID = 7
3,247,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,645 UART: [art] PUB.X = C85940565B13FF46CBD30DF6F5E281E3358D2CC769B75D5A0914563175FA2C304A6BE87897DEB175B716F797805CA0AD
3,255,413 UART: [art] PUB.Y = BAA81759337CA23A9E06C9F89F26DDC465E5C0B72112B5D9F2A68BF54DABCBBDCD8A0B6E16D8DDF5803F68D4BBCEFB7F
3,262,389 UART: [art] SIG.R = 084F1D5EA670A0A13AD9F71A716FE2628D5BC707AFB3FB9B3DD3D38A25A9985E308C9A231EAF275C306B48422ED79EB3
3,269,167 UART: [art] SIG.S = 14CEA715068E92FD1CE2B88615BC0997A4A0CBFC1C0E59AAFB3E7E650044DA4C5D5DE8998B49994742820E2D2145A157
3,292,886 UART: Caliptra RT
3,293,231 UART: [state] CFI Enabled
3,400,789 UART: [rt] RT listening for mailbox commands...
3,401,459 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,367 UART: [rt]cmd =0x4c4d5356, len=1672
3,694,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,174 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,333 UART: [fht] FHT @ 0x50003400
1,174,832 UART: [idev] ++
1,175,000 UART: [idev] CDI.KEYID = 6
1,175,360 UART: [idev] SUBJECT.KEYID = 7
1,175,784 UART: [idev] UDS.KEYID = 0
1,176,129 ready_for_fw is high
1,176,129 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,200,853 UART: [idev] Sha1 KeyId Algorithm
1,209,243 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,380 UART: [fwproc] Recv command 0x46574c44
1,283,108 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,984 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,353 >>> mbox cmd response: success
2,771,537 UART: [afmc] ++
2,771,705 UART: [afmc] CDI.KEYID = 6
2,772,067 UART: [afmc] SUBJECT.KEYID = 7
2,772,492 UART: [afmc] AUTHORITY.KEYID = 5
2,807,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,888 UART: [afmc] --
2,850,940 UART: [cold-reset] --
2,851,896 UART: [state] Locking Datavault
2,853,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,617 UART: [state] Locking ICCM
2,854,091 UART: [exit] Launching FMC @ 0x40000130
2,859,420 UART:
2,859,436 UART: Running Caliptra FMC ...
2,859,844 UART:
2,859,898 UART: [state] CFI Enabled
2,869,887 UART: [fht] FMC Alias Private Key: 7
2,978,362 UART: [art] Extend RT PCRs Done
2,978,790 UART: [art] Lock RT PCRs Done
2,980,250 UART: [art] Populate DV Done
2,988,449 UART: [fht] FMC Alias Private Key: 7
2,989,407 UART: [art] Derive CDI
2,989,687 UART: [art] Store in in slot 0x4
3,075,182 UART: [art] Derive Key Pair
3,075,542 UART: [art] Store priv key in slot 0x5
3,088,976 UART: [art] Derive Key Pair - Done
3,104,046 UART: [art] Signing Cert with AUTHO
3,104,526 UART: RITY.KEYID = 7
3,119,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,241 UART: [art] PUB.X = B5016548987074279EC6F37446EF87A6096EE3C42D081E6D613DDCDF7FF3BEE91FBA3CA8143774143C753DCD9617935D
3,127,006 UART: [art] PUB.Y = EF8F24FC4379F43DFC188A03C5DA5D83612D15A4FF2E4CF8C8146AC8BC740065CC4608A01686B0D1E6FC0BE15F34AF95
3,133,941 UART: [art] SIG.R = 1166E457D7D779692BBC20A34E32EC6FBCA7E3209ABEC4097ADFACC32A5A7C992F4B4C7C95852354CE2ACA79CF26C36E
3,140,728 UART: [art] SIG.S = 8AB292D512708DA9421BF0E11522CBBD87602D0F1A518F9C6998DC946AA362604EDAE24EC4C389C013C16014BD261606
3,165,037 UART: Caliptra RT
3,165,290 UART: [state] CFI Enabled
3,273,159 UART: [rt] RT listening for mailbox commands...
3,273,829 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,619 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,031 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,841 ready_for_fw is high
1,060,841 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,822 >>> mbox cmd response: success
2,687,554 UART:
2,687,570 UART: Running Caliptra FMC ...
2,687,978 UART:
2,688,032 UART: [state] CFI Enabled
2,698,137 UART: [fht] FMC Alias Private Key: 7
2,805,926 UART: [art] Extend RT PCRs Done
2,806,354 UART: [art] Lock RT PCRs Done
2,807,830 UART: [art] Populate DV Done
2,816,179 UART: [fht] FMC Alias Private Key: 7
2,817,275 UART: [art] Derive CDI
2,817,555 UART: [art] Store in in slot 0x4
2,903,302 UART: [art] Derive Key Pair
2,903,662 UART: [art] Store priv key in slot 0x5
2,916,302 UART: [art] Derive Key Pair - Done
2,930,916 UART: [art] Signing Cert with AUTHO
2,931,396 UART: RITY.KEYID = 7
2,946,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,679 UART: [art] PUB.X = E36BECAA8571F82D6EE32FBDED06357245408D085DC52A68165331487288F33BAD1587D25506C9966BC767E220F76ADF
2,954,442 UART: [art] PUB.Y = 2692FF6CC6C50F7BBD4BEC0F89C176D99AB7829776016B19C1E04A82211DC8DA28FD2D0782D2160EE422D69DA66451C1
2,961,385 UART: [art] SIG.R = ACD7307309221B21FE1D8B71732CB865DD8223D124F8C63D45286EC15A0AF544B3A7A3990E3AFAE2C798E964A4B9F58C
2,968,154 UART: [art] SIG.S = 6472B5094CBC9D2B1A10339848DD373CE5C2D292E4A8B9FBE16732E1CE13D41891BAB76CC5132F9FF6C7EC50ED11B28F
2,991,610 UART: Caliptra RT
2,991,863 UART: [state] CFI Enabled
3,099,962 UART: [rt] RT listening for mailbox commands...
3,100,632 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,636 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,336 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,721 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,457 UART: [idev] ++
1,175,625 UART: [idev] CDI.KEYID = 6
1,175,985 UART: [idev] SUBJECT.KEYID = 7
1,176,409 UART: [idev] UDS.KEYID = 0
1,176,754 ready_for_fw is high
1,176,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,593 UART: [idev] Erasing UDS.KEYID = 0
1,202,118 UART: [idev] Sha1 KeyId Algorithm
1,210,552 UART: [idev] --
1,211,854 UART: [ldev] ++
1,212,022 UART: [ldev] CDI.KEYID = 6
1,212,385 UART: [ldev] SUBJECT.KEYID = 5
1,212,811 UART: [ldev] AUTHORITY.KEYID = 7
1,213,274 UART: [ldev] FE.KEYID = 1
1,218,624 UART: [ldev] Erasing FE.KEYID = 1
1,244,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,222 UART: [ldev] --
1,283,635 UART: [fwproc] Wait for Commands...
1,284,257 UART: [fwproc] Recv command 0x46574c44
1,284,985 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,880 >>> mbox cmd response: success
2,773,066 UART: [afmc] ++
2,773,234 UART: [afmc] CDI.KEYID = 6
2,773,596 UART: [afmc] SUBJECT.KEYID = 7
2,774,021 UART: [afmc] AUTHORITY.KEYID = 5
2,810,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,573 UART: [afmc] --
2,853,579 UART: [cold-reset] --
2,854,443 UART: [state] Locking Datavault
2,855,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,202 UART: [state] Locking ICCM
2,856,772 UART: [exit] Launching FMC @ 0x40000130
2,862,101 UART:
2,862,117 UART: Running Caliptra FMC ...
2,862,525 UART:
2,862,668 UART: [state] CFI Enabled
2,873,367 UART: [fht] FMC Alias Private Key: 7
2,981,504 UART: [art] Extend RT PCRs Done
2,981,932 UART: [art] Lock RT PCRs Done
2,983,390 UART: [art] Populate DV Done
2,991,703 UART: [fht] FMC Alias Private Key: 7
2,992,675 UART: [art] Derive CDI
2,992,955 UART: [art] Store in in slot 0x4
3,078,358 UART: [art] Derive Key Pair
3,078,718 UART: [art] Store priv key in slot 0x5
3,091,898 UART: [art] Derive Key Pair - Done
3,106,424 UART: [art] Signing Cert with AUTHO
3,106,904 UART: RITY.KEYID = 7
3,121,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,675 UART: [art] PUB.X = 6F9D63DD00514A94F84FF184770CE836C2EDDA19CCF46D7911FCFC7CF6043599C5E459FF4FD573B3D71C9F4E45BD71B5
3,129,433 UART: [art] PUB.Y = E259776267088ACEE21E42284C9E86F746AECCB61968BCA43B6292B11225730DCA1F3E6E5BFF9F5BA14E46FDE1AAE26C
3,136,393 UART: [art] SIG.R = A5270EAD2E3D13F039025CF977EE263EA20BBF7A0C16FDE274A867F91313110653043B1A8BD1088ECE865921CBC15A07
3,143,145 UART: [art] SIG.S = 497830496143583C8CFC24B636FC6F490A3FD35EED56F23D85DFD01D539821EA32EA1E5D23A9C222B226B243B8ACA24C
3,166,725 UART: Caliptra RT
3,167,070 UART: [state] CFI Enabled
3,274,561 UART: [rt] RT listening for mailbox commands...
3,275,231 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,787 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,301 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,242 ready_for_fw is high
1,061,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,276 >>> mbox cmd response: success
2,686,534 UART:
2,686,550 UART: Running Caliptra FMC ...
2,686,958 UART:
2,687,101 UART: [state] CFI Enabled
2,697,518 UART: [fht] FMC Alias Private Key: 7
2,805,527 UART: [art] Extend RT PCRs Done
2,805,955 UART: [art] Lock RT PCRs Done
2,807,459 UART: [art] Populate DV Done
2,815,832 UART: [fht] FMC Alias Private Key: 7
2,816,800 UART: [art] Derive CDI
2,817,080 UART: [art] Store in in slot 0x4
2,902,955 UART: [art] Derive Key Pair
2,903,315 UART: [art] Store priv key in slot 0x5
2,916,713 UART: [art] Derive Key Pair - Done
2,931,260 UART: [art] Signing Cert with AUTHO
2,931,740 UART: RITY.KEYID = 7
2,947,168 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,933 UART: [art] PUB.X = 553F88479F33795D9EECAE3E88BC4B42EDA100916E472E9FAA06380A996B49AE064E65ADC1A6013053391763C207A513
2,954,666 UART: [art] PUB.Y = FF51BEB724124CFE21BE24AFDAA0C5923FF27C56B663BA01231936871891FB251F341930A6D3C59116BE9297473CB665
2,961,615 UART: [art] SIG.R = B11FCE64758DCC83F999E4F28E8C1D8C6C8BFE1923C16DCB3839B3FB49A334BE9867250E513A40714F948969BC72B35C
2,968,390 UART: [art] SIG.S = 3C3FF5D3E69314F3A9F5CAC7903CB54E848F4ED53E5F4325C20DCFB090CCF18E04D807C7733396B73D68F1B082C6C414
2,992,578 UART: Caliptra RT
2,992,923 UART: [state] CFI Enabled
3,100,550 UART: [rt] RT listening for mailbox commands...
3,101,220 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,194 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,596 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,431 UART: [kat] SHA2-256
901,371 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,867 UART: [idev] ++
1,173,035 UART: [idev] CDI.KEYID = 6
1,173,396 UART: [idev] SUBJECT.KEYID = 7
1,173,821 UART: [idev] UDS.KEYID = 0
1,174,167 ready_for_fw is high
1,174,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,766 UART: [fwproc] Wait for Commands...
1,281,475 UART: [fwproc] Recv command 0x46574c44
1,282,208 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,159 >>> mbox cmd response: success
2,770,414 UART: [afmc] ++
2,770,582 UART: [afmc] CDI.KEYID = 6
2,770,945 UART: [afmc] SUBJECT.KEYID = 7
2,771,371 UART: [afmc] AUTHORITY.KEYID = 5
2,806,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,543 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,155 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,659 UART: [afmc] --
2,849,781 UART: [cold-reset] --
2,850,407 UART: [state] Locking Datavault
2,851,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,246 UART: [state] Locking ICCM
2,852,732 UART: [exit] Launching FMC @ 0x40000130
2,858,061 UART:
2,858,077 UART: Running Caliptra FMC ...
2,858,485 UART:
2,858,539 UART: [state] CFI Enabled
2,869,502 UART: [fht] FMC Alias Private Key: 7
2,977,383 UART: [art] Extend RT PCRs Done
2,977,811 UART: [art] Lock RT PCRs Done
2,979,191 UART: [art] Populate DV Done
2,987,218 UART: [fht] FMC Alias Private Key: 7
2,988,350 UART: [art] Derive CDI
2,988,630 UART: [art] Store in in slot 0x4
3,074,555 UART: [art] Derive Key Pair
3,074,915 UART: [art] Store priv key in slot 0x5
3,087,697 UART: [art] Derive Key Pair - Done
3,102,662 UART: [art] Signing Cert with AUTHO
3,103,142 UART: RITY.KEYID = 7
3,118,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,185 UART: [art] PUB.X = F9A94C6C06A01346722A8BD672334178048547C8469AF75592460A4BA5007A458AA75F9ECCC8C31AD2EC873556A2F130
3,125,920 UART: [art] PUB.Y = CF57F541104384BAEA999A292D7B9ED988C3F570CAE5A049B3771F8DC7BA0FD1CDC2CB7973A5ECD8043886E87837D1C4
3,132,878 UART: [art] SIG.R = 2567B7EEAF4A9F9B9D680594992ABF3A26B57DC23F0F5B9109E97AA51AFD8FFC9328001BD7F6FA1DF88CA06F7BE95137
3,139,635 UART: [art] SIG.S = 07BB69774DBA34C972B3840070FFDD80F6AAF9CED31394296AE84AB528C63281789C9597A33D289EDE5B450D9E6A1E06
3,163,713 UART: Caliptra RT
3,163,966 UART: [state] CFI Enabled
3,271,323 UART: [rt] RT listening for mailbox commands...
3,271,993 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,759 UART: [rt]cmd =0x4c4d5356, len=1672
3,565,319 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,334 ready_for_fw is high
1,055,334 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,343 >>> mbox cmd response: success
2,679,865 UART:
2,679,881 UART: Running Caliptra FMC ...
2,680,289 UART:
2,680,343 UART: [state] CFI Enabled
2,691,032 UART: [fht] FMC Alias Private Key: 7
2,798,739 UART: [art] Extend RT PCRs Done
2,799,167 UART: [art] Lock RT PCRs Done
2,800,723 UART: [art] Populate DV Done
2,809,060 UART: [fht] FMC Alias Private Key: 7
2,810,176 UART: [art] Derive CDI
2,810,456 UART: [art] Store in in slot 0x4
2,895,877 UART: [art] Derive Key Pair
2,896,237 UART: [art] Store priv key in slot 0x5
2,909,027 UART: [art] Derive Key Pair - Done
2,923,780 UART: [art] Signing Cert with AUTHO
2,924,260 UART: RITY.KEYID = 7
2,939,364 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,129 UART: [art] PUB.X = 1156C84B4C465395963EA20807009428C243341FA0D3A621130574AFF5768689D187DAAEAC5D7F1FC53C842D14951A42
2,946,860 UART: [art] PUB.Y = 2A80CECBDBC6AA972924B83B24FF9CCC981BF3A75ADD682049B2E0FF6C7158CF61AC5BEFBCA46CC9BD659BD1996BF00E
2,953,839 UART: [art] SIG.R = D50E1C5DBE9904224B477C3C9F76BBD2F14BFD1A7DD1A5674512F39A28E4E426071F85FF6E00F90F24184872F4356A3E
2,960,581 UART: [art] SIG.S = 4FF30A1F465D6EADB24C230403CF33C2BEC28013EB54C6F9549AF914A9CC8F991ACF1264013318026D387A7E3D5EC238
2,984,507 UART: Caliptra RT
2,984,760 UART: [state] CFI Enabled
3,091,659 UART: [rt] RT listening for mailbox commands...
3,092,329 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,075 UART: [rt]cmd =0x4c4d5356, len=1672
3,385,301 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,473 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 ready_for_fw is high
1,174,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,198,932 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,209,019 UART: [ldev] ++
1,209,187 UART: [ldev] CDI.KEYID = 6
1,209,551 UART: [ldev] SUBJECT.KEYID = 5
1,209,978 UART: [ldev] AUTHORITY.KEYID = 7
1,210,441 UART: [ldev] FE.KEYID = 1
1,215,687 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,255 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,668 >>> mbox cmd response: success
2,771,911 UART: [afmc] ++
2,772,079 UART: [afmc] CDI.KEYID = 6
2,772,442 UART: [afmc] SUBJECT.KEYID = 7
2,772,868 UART: [afmc] AUTHORITY.KEYID = 5
2,807,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,477 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,396 UART: [afmc] --
2,851,374 UART: [cold-reset] --
2,852,114 UART: [state] Locking Datavault
2,853,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,029 UART: [state] Locking ICCM
2,854,689 UART: [exit] Launching FMC @ 0x40000130
2,860,018 UART:
2,860,034 UART: Running Caliptra FMC ...
2,860,442 UART:
2,860,585 UART: [state] CFI Enabled
2,871,224 UART: [fht] FMC Alias Private Key: 7
2,980,159 UART: [art] Extend RT PCRs Done
2,980,587 UART: [art] Lock RT PCRs Done
2,982,027 UART: [art] Populate DV Done
2,990,292 UART: [fht] FMC Alias Private Key: 7
2,991,444 UART: [art] Derive CDI
2,991,724 UART: [art] Store in in slot 0x4
3,077,353 UART: [art] Derive Key Pair
3,077,713 UART: [art] Store priv key in slot 0x5
3,091,069 UART: [art] Derive Key Pair - Done
3,105,891 UART: [art] Signing Cert with AUTHO
3,106,371 UART: RITY.KEYID = 7
3,121,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,164 UART: [art] PUB.X = D56C657A670B311D72E3EEFBF16EA732ECEAA8FC845A62BE26A3135AF85502116D0892599BBB3E75B57341EE370D3BF6
3,128,934 UART: [art] PUB.Y = 43C9E343F3ADAFA2D36B45557878A6041E20A655713BB4A8D79654BBE6D9D8ACE4F20972F7EDDB34F97C64F0FC7F259E
3,135,892 UART: [art] SIG.R = 3131E2E9AEFD73ADF6D17ACC8B25EA44DA8CC430051C19516041D22E7204ECC51B33CEB36EE4B74FB1C600D1CBCBCE6A
3,142,660 UART: [art] SIG.S = 310A8C30EC99AB301CB7B784D0D2013DAA82E0640F9D5B19D950A515CE0F04D7BE1D82CB4D874E2F2C08370F1D943E58
3,166,688 UART: Caliptra RT
3,167,033 UART: [state] CFI Enabled
3,274,778 UART: [rt] RT listening for mailbox commands...
3,275,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,032 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,480 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 ready_for_fw is high
1,056,275 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,274 >>> mbox cmd response: success
2,682,224 UART:
2,682,240 UART: Running Caliptra FMC ...
2,682,648 UART:
2,682,791 UART: [state] CFI Enabled
2,693,442 UART: [fht] FMC Alias Private Key: 7
2,801,607 UART: [art] Extend RT PCRs Done
2,802,035 UART: [art] Lock RT PCRs Done
2,803,449 UART: [art] Populate DV Done
2,811,700 UART: [fht] FMC Alias Private Key: 7
2,812,714 UART: [art] Derive CDI
2,812,994 UART: [art] Store in in slot 0x4
2,898,909 UART: [art] Derive Key Pair
2,899,269 UART: [art] Store priv key in slot 0x5
2,912,281 UART: [art] Derive Key Pair - Done
2,927,134 UART: [art] Signing Cert with AUTHO
2,927,614 UART: RITY.KEYID = 7
2,942,816 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,581 UART: [art] PUB.X = FC0487ADF5F462BC00E27D2183C52A323391D47BCF844B3C159E0E3262EAE27E3876B1AD92D1847C774371E04C4657F1
2,950,325 UART: [art] PUB.Y = 5B7061E1B9A1DF70AC3162A54F6FE9F287568DB0B7D4BD1AC83876740A8ADC408297794E70D09D9DA0531594FAB351C6
2,957,278 UART: [art] SIG.R = C2628D9DF65CC595785000AC65842D87F0F11C06ADF2AA57863A9C91FA2096E3FD1B4CFB8EA7F7D8C4C51577E6C63E1C
2,964,037 UART: [art] SIG.S = CD8812B447CCE8434D0DF1E821DE305A94A96CC83DA10B20E145C046B32CA9F7B18F68D3214377D13B007303A59E3A71
2,987,751 UART: Caliptra RT
2,988,096 UART: [state] CFI Enabled
3,095,456 UART: [rt] RT listening for mailbox commands...
3,096,126 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,056 UART: [rt]cmd =0x4c4d5356, len=1672
3,389,612 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,071 UART:
192,442 UART: Running Caliptra ROM ...
193,644 UART:
193,803 UART: [state] CFI Enabled
268,761 UART: [state] LifecycleState = Unprovisioned
270,749 UART: [state] DebugLocked = No
272,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,284 UART: [kat] SHA2-256
447,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,491 UART: [kat] ++
457,980 UART: [kat] sha1
469,756 UART: [kat] SHA2-256
472,460 UART: [kat] SHA2-384
477,536 UART: [kat] SHA2-512-ACC
479,903 UART: [kat] ECC-384
2,768,114 UART: [kat] HMAC-384Kdf
2,800,327 UART: [kat] LMS
3,990,670 UART: [kat] --
3,996,812 UART: [cold-reset] ++
3,998,614 UART: [fht] Storing FHT @ 0x50003400
4,010,309 UART: [idev] ++
4,010,880 UART: [idev] CDI.KEYID = 6
4,011,912 UART: [idev] SUBJECT.KEYID = 7
4,013,085 UART: [idev] UDS.KEYID = 0
4,014,129 ready_for_fw is high
4,014,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,381 UART: [idev] Erasing UDS.KEYID = 0
7,345,147 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,168 UART: [idev] --
7,372,728 UART: [ldev] ++
7,373,346 UART: [ldev] CDI.KEYID = 6
7,374,242 UART: [ldev] SUBJECT.KEYID = 5
7,375,452 UART: [ldev] AUTHORITY.KEYID = 7
7,376,739 UART: [ldev] FE.KEYID = 1
7,424,487 UART: [ldev] Erasing FE.KEYID = 1
10,754,606 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,216 UART: [ldev] --
13,118,084 UART: [fwproc] Waiting for Commands...
13,120,240 UART: [fwproc] Received command 0x46574c44
13,122,428 UART: [fwproc] Received Image of size 113760 bytes
17,174,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,784 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,637,192 >>> mbox cmd response: success
17,640,788 UART: [afmc] ++
17,641,385 UART: [afmc] CDI.KEYID = 6
17,642,292 UART: [afmc] SUBJECT.KEYID = 7
17,643,510 UART: [afmc] AUTHORITY.KEYID = 5
21,012,954 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,942 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,310 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,147 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,610 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,837 UART: [afmc] --
23,380,302 UART: [cold-reset] --
23,383,407 UART: [state] Locking Datavault
23,387,573 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,323 UART: [state] Locking ICCM
23,391,290 UART: [exit] Launching FMC @ 0x40000130
23,399,678 UART:
23,399,917 UART: Running Caliptra FMC ...
23,401,042 UART:
23,401,208 UART: [state] CFI Enabled
23,468,403 UART: [fht] FMC Alias Private Key: 7
25,806,662 UART: [art] Extend RT PCRs Done
25,807,886 UART: [art] Lock RT PCRs Done
25,809,431 UART: [art] Populate DV Done
25,814,786 UART: [fht] FMC Alias Private Key: 7
25,816,477 UART: [art] Derive CDI
25,817,214 UART: [art] Store in in slot 0x4
25,877,048 UART: [art] Derive Key Pair
25,878,087 UART: [art] Store priv key in slot 0x5
29,170,729 UART: [art] Derive Key Pair - Done
29,183,995 UART: [art] Signing Cert with AUTHO
29,185,335 UART: RITY.KEYID = 7
31,472,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,885 UART: [art] PUB.X = A94A89152EC7A7F194E05D0D9AB163F127C58C01024378D7E909D9052E2391CA8C485BF19784842555E439BEE57B13BE
31,481,097 UART: [art] PUB.Y = 85628038140B0FF7313FE1F15CE4F88816F0D40F6EBD627199331EF53B19F12D0EE846A5668E6DCCE0746AD049A7269D
31,488,330 UART: [art] SIG.R = DFA8FE71E439332B25000F48BE2DF7AF3D07D4F95BC2A708C49FD1FAFF537BA1C2DA246453885E464E78FE525C83EB62
31,495,722 UART: [art] SIG.S = 04B1456F5A3A61B8584CE7295B7C0FA49C651E93C92648DA3FAC356E81C535DED955ADFD6B1F8D1210BF867CE85173FF
32,801,216 UART: Caliptra RT
32,801,933 UART: [state] CFI Enabled
32,962,508 UART: [rt] RT listening for mailbox commands...
32,966,495 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,011,574 UART: [rt]cmd =0x4c4d5356, len=1672
33,425,538 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,805,622 ready_for_fw is high
3,806,000 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,894,490 >>> mbox cmd response: success
23,585,832 UART:
23,586,243 UART: Running Caliptra FMC ...
23,587,380 UART:
23,587,542 UART: [state] CFI Enabled
23,657,149 UART: [fht] FMC Alias Private Key: 7
25,994,476 UART: [art] Extend RT PCRs Done
25,995,708 UART: [art] Lock RT PCRs Done
25,997,450 UART: [art] Populate DV Done
26,002,970 UART: [fht] FMC Alias Private Key: 7
26,004,579 UART: [art] Derive CDI
26,005,326 UART: [art] Store in in slot 0x4
26,065,956 UART: [art] Derive Key Pair
26,067,021 UART: [art] Store priv key in slot 0x5
29,360,001 UART: [art] Derive Key Pair - Done
29,373,175 UART: [art] Signing Cert with AUTHO
29,374,480 UART: RITY.KEYID = 7
31,662,610 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,120 UART: [art] PUB.X = CCA25B99ACF2357A4185974F8CDBC3A626B66D2165DB9BA5DC95D957032153BE20B6A24507056FBBCF9A91C3D807F318
31,671,361 UART: [art] PUB.Y = FB9CAADD29E057652F20302F1BF4C7CD30C8AA4A8EC4C69809D140E45631B2ADBA848A99D51F5121EBA6C5DA9BDE71B5
31,678,609 UART: [art] SIG.R = 2F514A0FB1F5529A491C4E593054ADD309861E15CEC5F701766C63C4BF647FC8AD5E7757307898196E85A0CAB128B77B
31,686,017 UART: [art] SIG.S = 6AB3ED65D59AF66F2F7E1B7E7F903927FBE1520C91E41BA5A99DE5A5806C4CF00D0195F6A2AE20EBF8CC6F18948EB2E5
32,991,186 UART: Caliptra RT
32,991,901 UART: [state] CFI Enabled
33,153,283 UART: [rt] RT listening for mailbox commands...
33,157,237 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,202,494 UART: [rt]cmd =0x4c4d5356, len=1672
33,616,532 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
193,017 UART:
193,383 UART: Running Caliptra ROM ...
194,568 UART:
604,223 UART: [state] CFI Enabled
617,793 UART: [state] LifecycleState = Unprovisioned
619,789 UART: [state] DebugLocked = No
622,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,956 UART: [kat] SHA2-256
797,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,282 UART: [kat] ++
808,756 UART: [kat] sha1
819,199 UART: [kat] SHA2-256
821,911 UART: [kat] SHA2-384
827,043 UART: [kat] SHA2-512-ACC
829,409 UART: [kat] ECC-384
3,111,126 UART: [kat] HMAC-384Kdf
3,122,578 UART: [kat] LMS
4,312,692 UART: [kat] --
4,317,490 UART: [cold-reset] ++
4,319,561 UART: [fht] Storing FHT @ 0x50003400
4,332,099 UART: [idev] ++
4,332,662 UART: [idev] CDI.KEYID = 6
4,333,646 UART: [idev] SUBJECT.KEYID = 7
4,334,813 UART: [idev] UDS.KEYID = 0
4,335,918 ready_for_fw is high
4,336,132 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,060 UART: [idev] Erasing UDS.KEYID = 0
7,620,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,464 UART: [idev] --
7,647,418 UART: [ldev] ++
7,647,990 UART: [ldev] CDI.KEYID = 6
7,648,955 UART: [ldev] SUBJECT.KEYID = 5
7,650,167 UART: [ldev] AUTHORITY.KEYID = 7
7,651,399 UART: [ldev] FE.KEYID = 1
7,661,243 UART: [ldev] Erasing FE.KEYID = 1
10,949,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,066 UART: [ldev] --
13,309,095 UART: [fwproc] Waiting for Commands...
13,311,249 UART: [fwproc] Received command 0x46574c44
13,313,483 UART: [fwproc] Received Image of size 113760 bytes
17,356,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,331 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,213 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,819,564 >>> mbox cmd response: success
17,823,901 UART: [afmc] ++
17,824,499 UART: [afmc] CDI.KEYID = 6
17,825,379 UART: [afmc] SUBJECT.KEYID = 7
17,826,649 UART: [afmc] AUTHORITY.KEYID = 5
21,142,201 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,970 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,383 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,205 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,644 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,122 UART: [afmc] --
23,506,169 UART: [cold-reset] --
23,508,949 UART: [state] Locking Datavault
23,514,519 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,216 UART: [state] Locking ICCM
23,517,714 UART: [exit] Launching FMC @ 0x40000130
23,526,054 UART:
23,526,299 UART: Running Caliptra FMC ...
23,527,397 UART:
23,527,552 UART: [state] CFI Enabled
23,535,488 UART: [fht] FMC Alias Private Key: 7
25,866,477 UART: [art] Extend RT PCRs Done
25,867,695 UART: [art] Lock RT PCRs Done
25,869,346 UART: [art] Populate DV Done
25,874,770 UART: [fht] FMC Alias Private Key: 7
25,876,415 UART: [art] Derive CDI
25,877,147 UART: [art] Store in in slot 0x4
25,919,683 UART: [art] Derive Key Pair
25,920,721 UART: [art] Store priv key in slot 0x5
29,162,976 UART: [art] Derive Key Pair - Done
29,175,973 UART: [art] Signing Cert with AUTHO
29,177,301 UART: RITY.KEYID = 7
31,457,019 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,533 UART: [art] PUB.X = 3CCDBA145AB40FDE34A78145611327B304281AB4F2383DF144D9D533AE38F615D13E413E48B78624E93C63FC1F3569DF
31,465,752 UART: [art] PUB.Y = 34E4681D20C301D9AF664B92A06298DBC2FB5F93C7DFF0C3D795041BEDA3206D484564A3AC54A421452AEEF8418DC771
31,473,023 UART: [art] SIG.R = 445EA55DE61CD6AB6634E2F499559F2D466C4591BA6ABA8467B3A81A9FB481BAF18BE8AE982F3577C5100589C19B564A
31,480,396 UART: [art] SIG.S = AA091EBDA267A49E0C2B0DB4010460B1C5F7FE43D51CD372F985FCD5252CFB3D38B280B6C0C5854550437987C7E00772
32,785,263 UART: Caliptra RT
32,785,986 UART: [state] CFI Enabled
32,904,511 UART: [rt] RT listening for mailbox commands...
32,908,484 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,952,785 UART: [rt]cmd =0x4c4d5356, len=1672
33,366,761 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
4,126,223 ready_for_fw is high
4,126,828 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,057,796 >>> mbox cmd response: success
23,694,150 UART:
23,694,554 UART: Running Caliptra FMC ...
23,695,689 UART:
23,695,845 UART: [state] CFI Enabled
23,704,112 UART: [fht] FMC Alias Private Key: 7
26,035,223 UART: [art] Extend RT PCRs Done
26,036,452 UART: [art] Lock RT PCRs Done
26,038,268 UART: [art] Populate DV Done
26,043,473 UART: [fht] FMC Alias Private Key: 7
26,045,021 UART: [art] Derive CDI
26,045,759 UART: [art] Store in in slot 0x4
26,088,308 UART: [art] Derive Key Pair
26,089,352 UART: [art] Store priv key in slot 0x5
29,331,454 UART: [art] Derive Key Pair - Done
29,344,447 UART: [art] Signing Cert with AUTHO
29,345,749 UART: RITY.KEYID = 7
31,624,759 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,285 UART: [art] PUB.X = FB23906866F485634974D98D290CF8247E06312D64BA12C5E7E0641E6151BA93D2A0B456DF329AC44AAA81372AADC22B
31,633,471 UART: [art] PUB.Y = FAF5D97DE6EE3B5A27CD8A369E522CBFE87912D65028C7C3FE891FAD9266BB4765A6715E4CCC6DF50DD87E15F75BCD07
31,640,754 UART: [art] SIG.R = 8183B05575FA0692C3FD1E6567396F666653FAFBEBCEC2639D794CF6E18595EFE49E026F39D49809B3E0F1826F4A7029
31,648,144 UART: [art] SIG.S = 9E6BF867CA3CC707BBD2A25F87DE816C30F59CFE5DF079B9C0824BB8106684892875967F9B4C7772BB24D1AA283E17B6
32,953,332 UART: Caliptra RT
32,954,050 UART: [state] CFI Enabled
33,071,402 UART: [rt] RT listening for mailbox commands...
33,075,362 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,119,928 UART: [rt]cmd =0x4c4d5356, len=1672
33,533,828 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,529 UART:
192,903 UART: Running Caliptra ROM ...
194,088 UART:
194,250 UART: [state] CFI Enabled
262,000 UART: [state] LifecycleState = Unprovisioned
263,919 UART: [state] DebugLocked = No
266,442 UART: [state] WD Timer not started. Device not locked for debugging
270,259 UART: [kat] SHA2-256
449,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,992 UART: [kat] ++
461,518 UART: [kat] sha1
470,874 UART: [kat] SHA2-256
473,934 UART: [kat] SHA2-384
479,074 UART: [kat] SHA2-512-ACC
482,084 UART: [kat] ECC-384
2,925,176 UART: [kat] HMAC-384Kdf
2,948,927 UART: [kat] LMS
3,478,200 UART: [kat] --
3,482,900 UART: [cold-reset] ++
3,485,318 UART: [fht] FHT @ 0x50003400
3,495,796 UART: [idev] ++
3,496,353 UART: [idev] CDI.KEYID = 6
3,497,327 UART: [idev] SUBJECT.KEYID = 7
3,498,495 UART: [idev] UDS.KEYID = 0
3,499,487 ready_for_fw is high
3,499,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,643,143 UART: [idev] Erasing UDS.KEYID = 0
6,005,198 UART: [idev] Sha1 KeyId Algorithm
6,028,760 UART: [idev] --
6,032,589 UART: [ldev] ++
6,033,160 UART: [ldev] CDI.KEYID = 6
6,034,070 UART: [ldev] SUBJECT.KEYID = 5
6,035,282 UART: [ldev] AUTHORITY.KEYID = 7
6,036,511 UART: [ldev] FE.KEYID = 1
6,076,973 UART: [ldev] Erasing FE.KEYID = 1
8,578,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,256 UART: [ldev] --
10,369,457 UART: [fwproc] Wait for Commands...
10,371,764 UART: [fwproc] Recv command 0x46574c44
10,373,870 UART: [fwproc] Recv'd Img size: 114084 bytes
13,774,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,852,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,920,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,238,296 >>> mbox cmd response: success
14,241,724 UART: [afmc] ++
14,242,319 UART: [afmc] CDI.KEYID = 6
14,243,206 UART: [afmc] SUBJECT.KEYID = 7
14,244,357 UART: [afmc] AUTHORITY.KEYID = 5
16,784,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,521,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,523,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,538,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,554,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,570,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,594,388 UART: [afmc] --
18,598,113 UART: [cold-reset] --
18,602,623 UART: [state] Locking Datavault
18,606,729 UART: [state] Locking PCR0, PCR1 and PCR31
18,608,370 UART: [state] Locking ICCM
18,611,060 UART: [exit] Launching FMC @ 0x40000130
18,619,470 UART:
18,619,703 UART: Running Caliptra FMC ...
18,620,799 UART:
18,620,953 UART: [state] CFI Enabled
18,680,010 UART: [fht] FMC Alias Private Key: 7
20,443,781 UART: [art] Extend RT PCRs Done
20,444,994 UART: [art] Lock RT PCRs Done
20,446,726 UART: [art] Populate DV Done
20,452,080 UART: [fht] FMC Alias Private Key: 7
20,453,614 UART: [art] Derive CDI
20,454,425 UART: [art] Store in in slot 0x4
20,512,740 UART: [art] Derive Key Pair
20,513,769 UART: [art] Store priv key in slot 0x5
22,977,044 UART: [art] Derive Key Pair - Done
22,989,881 UART: [art] Signing Cert with AUTHO
22,991,177 UART: RITY.KEYID = 7
24,702,805 UART: [art] Erasing AUTHORITY.KEYID = 7
24,704,310 UART: [art] PUB.X = A4E5DC765C62A589C86B4C7028F97E2C2CFD3F95CF4BCF08D4931B750C0EAF7D3364957CAF5604AF152AB3821CDF44B1
24,711,586 UART: [art] PUB.Y = BD1F4EC7BC9734252DE14197BA884864D090B12775FB5AF27388E6433EF10951F82B4DCE56178B52B1F4B5E78FD65CF1
24,718,814 UART: [art] SIG.R = 5FD87FB8602A3FA4F36B81390E5B3C177E1AE3AEDB8E3A66FDFED18EF9EB45D2AF556B58E8D1B2D63B4FCFE62A7C47DD
24,726,247 UART: [art] SIG.S = 86CC826E21D98AEBCD1BCC1694345C7E12EFAC7F3474D0F1BE4C48145BCE26FF59DD2ED2143EB794627C96021671408D
25,705,162 UART: Caliptra RT
25,705,859 UART: [state] CFI Enabled
25,869,874 UART: [rt] RT listening for mailbox commands...
25,873,847 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,919,057 UART: [rt]cmd =0x4c4d5356, len=1672
26,120,542 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
3,380,151 ready_for_fw is high
3,380,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,076,700 >>> mbox cmd response: success
18,362,692 UART:
18,363,103 UART: Running Caliptra FMC ...
18,364,204 UART:
18,364,355 UART: [state] CFI Enabled
18,429,639 UART: [fht] FMC Alias Private Key: 7
20,193,195 UART: [art] Extend RT PCRs Done
20,194,416 UART: [art] Lock RT PCRs Done
20,195,962 UART: [art] Populate DV Done
20,201,261 UART: [fht] FMC Alias Private Key: 7
20,202,900 UART: [art] Derive CDI
20,203,635 UART: [art] Store in in slot 0x4
20,262,405 UART: [art] Derive Key Pair
20,263,447 UART: [art] Store priv key in slot 0x5
22,726,483 UART: [art] Derive Key Pair - Done
22,739,115 UART: [art] Signing Cert with AUTHO
22,740,414 UART: RITY.KEYID = 7
24,452,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,149 UART: [art] PUB.X = 92617E377D354529EA7854123C0E5F85E973F46E38D9F5CFD0C95968A79343F1E9B7CE467A6FA3D1256523E5A730250B
24,461,403 UART: [art] PUB.Y = A3EAEBD94F4FD16D09C8346CE8253E1CBFCA386D1DD2D04A76F4A31441E464000B00D4F3F70B4BFAD0D6BEA5943D6751
24,468,648 UART: [art] SIG.R = 6B932EFDE71EE85F382AB2FDE6D62CD730F18F2E66A83954A943668F7BDC2F5F26E18C5AB4C02F054FC5BF6B42FDB2C2
24,476,070 UART: [art] SIG.S = 206A9E899122B73B1C64EE30C4E423131CDDAD62F53FFF997A875E4F701517D956B9F7D8F2C36B969CF28F00270FCCF7
25,455,302 UART: Caliptra RT
25,456,023 UART: [state] CFI Enabled
25,622,513 UART: [rt] RT listening for mailbox commands...
25,626,449 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,671,552 UART: [rt]cmd =0x4c4d5356, len=1672
25,873,086 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
192,984 UART:
193,349 UART: Running Caliptra ROM ...
194,533 UART:
604,028 UART: [state] CFI Enabled
621,824 UART: [state] LifecycleState = Unprovisioned
623,696 UART: [state] DebugLocked = No
626,432 UART: [state] WD Timer not started. Device not locked for debugging
629,552 UART: [kat] SHA2-256
808,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,204 UART: [kat] ++
820,741 UART: [kat] sha1
832,544 UART: [kat] SHA2-256
835,546 UART: [kat] SHA2-384
841,078 UART: [kat] SHA2-512-ACC
844,024 UART: [kat] ECC-384
3,286,423 UART: [kat] HMAC-384Kdf
3,298,056 UART: [kat] LMS
3,827,579 UART: [kat] --
3,834,053 UART: [cold-reset] ++
3,835,915 UART: [fht] FHT @ 0x50003400
3,847,032 UART: [idev] ++
3,847,601 UART: [idev] CDI.KEYID = 6
3,848,511 UART: [idev] SUBJECT.KEYID = 7
3,849,685 UART: [idev] UDS.KEYID = 0
3,850,784 ready_for_fw is high
3,851,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,125 UART: [idev] Erasing UDS.KEYID = 0
6,329,058 UART: [idev] Sha1 KeyId Algorithm
6,351,238 UART: [idev] --
6,355,987 UART: [ldev] ++
6,356,555 UART: [ldev] CDI.KEYID = 6
6,357,542 UART: [ldev] SUBJECT.KEYID = 5
6,358,708 UART: [ldev] AUTHORITY.KEYID = 7
6,359,939 UART: [ldev] FE.KEYID = 1
6,368,855 UART: [ldev] Erasing FE.KEYID = 1
8,846,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,033 UART: [ldev] --
10,637,387 UART: [fwproc] Wait for Commands...
10,640,288 UART: [fwproc] Recv command 0x46574c44
10,642,377 UART: [fwproc] Recv'd Img size: 114084 bytes
14,045,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,506,600 >>> mbox cmd response: success
14,510,550 UART: [afmc] ++
14,511,154 UART: [afmc] CDI.KEYID = 6
14,512,074 UART: [afmc] SUBJECT.KEYID = 7
14,513,241 UART: [afmc] AUTHORITY.KEYID = 5
17,014,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,738,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,740,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,756,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,772,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,788,182 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,812,254 UART: [afmc] --
18,816,648 UART: [cold-reset] --
18,821,919 UART: [state] Locking Datavault
18,827,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,406 UART: [state] Locking ICCM
18,830,579 UART: [exit] Launching FMC @ 0x40000130
18,838,979 UART:
18,839,216 UART: Running Caliptra FMC ...
18,840,254 UART:
18,840,403 UART: [state] CFI Enabled
18,848,721 UART: [fht] FMC Alias Private Key: 7
20,606,402 UART: [art] Extend RT PCRs Done
20,607,622 UART: [art] Lock RT PCRs Done
20,609,440 UART: [art] Populate DV Done
20,614,804 UART: [fht] FMC Alias Private Key: 7
20,616,349 UART: [art] Derive CDI
20,617,168 UART: [art] Store in in slot 0x4
20,659,596 UART: [art] Derive Key Pair
20,660,629 UART: [art] Store priv key in slot 0x5
23,088,030 UART: [art] Derive Key Pair - Done
23,100,647 UART: [art] Signing Cert with AUTHO
23,101,972 UART: RITY.KEYID = 7
24,807,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,808,819 UART: [art] PUB.X = 1F2126A560E7AE4E314F8F5A6F336CC6362167976287AB9D2813B62D71DA97F0ADB25D7E826816C952B7A8E97CE813B5
24,816,084 UART: [art] PUB.Y = A0B6B7C9610FE09C3652E2F017A1A8E0F071E1C5717B7DC8E5DE3F08123D051C52A220ACE94F8FF433F1DE7671137185
24,823,295 UART: [art] SIG.R = 6FED0D0E5F230F57438D0F78B2C1F89534D4CB6ADAFC6E3E9B04B88536C9BF7551317D1763E5CFD38BD77991E6B961E0
24,830,720 UART: [art] SIG.S = B1B07E57AF022CA569004844F7B03276C6779EB60634409F4EF86826C7C81751022710C7E85A1986EBA7C0080082DD07
25,809,528 UART: Caliptra RT
25,810,241 UART: [state] CFI Enabled
25,927,983 UART: [rt] RT listening for mailbox commands...
25,932,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,976,687 UART: [rt]cmd =0x4c4d5356, len=1672
26,177,984 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,792 writing to cptra_bootfsm_go
3,696,389 ready_for_fw is high
3,696,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,653 >>> mbox cmd response: success
18,517,045 UART:
18,517,446 UART: Running Caliptra FMC ...
18,518,565 UART:
18,518,719 UART: [state] CFI Enabled
18,526,401 UART: [fht] FMC Alias Private Key: 7
20,282,573 UART: [art] Extend RT PCRs Done
20,283,811 UART: [art] Lock RT PCRs Done
20,285,582 UART: [art] Populate DV Done
20,291,118 UART: [fht] FMC Alias Private Key: 7
20,292,687 UART: [art] Derive CDI
20,293,512 UART: [art] Store in in slot 0x4
20,336,173 UART: [art] Derive Key Pair
20,337,218 UART: [art] Store priv key in slot 0x5
22,763,659 UART: [art] Derive Key Pair - Done
22,776,980 UART: [art] Signing Cert with AUTHO
22,778,286 UART: RITY.KEYID = 7
24,483,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,449 UART: [art] PUB.X = 2818CBEE8D69BDCE6BCBDC38478EF7F7D475B6A5916693C53FF145C0D85B3C6DF47511D291D28BDC46E5B3044571C338
24,492,802 UART: [art] PUB.Y = B9306FABE59FE4B0839EB89FFD012651796D630C858AE76191DA4EC9B0A8A858F2A9C69EE35E9AE756B3A7D2AAFC3F76
24,500,044 UART: [art] SIG.R = A287EAF6E0D16EAB5957E9D02464B7085F64B8930F95ED0CF69D1FAF0AE52A41DAE5008AF1FA182970CDA5C8FD79AA19
24,507,427 UART: [art] SIG.S = 70411FFE4E82DC3C3BDE0CB36D8366E65BA6DAF8F203B059DADE73880A7393797E85FBF1DB4B4057E18851CD6E11DEA5
25,485,875 UART: Caliptra RT
25,486,602 UART: [state] CFI Enabled
25,603,849 UART: [rt] RT listening for mailbox commands...
25,608,069 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,652,612 UART: [rt]cmd =0x4c4d5356, len=1672
25,853,867 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,401 UART:
192,771 UART: Running Caliptra ROM ...
193,953 UART:
194,129 UART: [state] CFI Enabled
264,915 UART: [state] LifecycleState = Unprovisioned
267,271 UART: [state] DebugLocked = No
269,941 UART: [state] WD Timer not started. Device not locked for debugging
274,135 UART: [kat] SHA2-256
463,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,725 UART: [kat] ++
475,326 UART: [kat] sha1
486,202 UART: [kat] SHA2-256
489,203 UART: [kat] SHA2-384
494,760 UART: [kat] SHA2-512-ACC
497,338 UART: [kat] ECC-384
2,950,983 UART: [kat] HMAC-384Kdf
2,972,240 UART: [kat] LMS
3,503,974 UART: [kat] --
3,509,483 UART: [cold-reset] ++
3,512,009 UART: [fht] FHT @ 0x50003400
3,523,420 UART: [idev] ++
3,524,135 UART: [idev] CDI.KEYID = 6
3,525,050 UART: [idev] SUBJECT.KEYID = 7
3,526,293 UART: [idev] UDS.KEYID = 0
3,527,214 ready_for_fw is high
3,527,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,028 UART: [idev] Erasing UDS.KEYID = 0
6,028,157 UART: [idev] Sha1 KeyId Algorithm
6,050,121 UART: [idev] --
6,055,062 UART: [ldev] ++
6,055,749 UART: [ldev] CDI.KEYID = 6
6,056,633 UART: [ldev] SUBJECT.KEYID = 5
6,057,813 UART: [ldev] AUTHORITY.KEYID = 7
6,059,040 UART: [ldev] FE.KEYID = 1
6,100,728 UART: [ldev] Erasing FE.KEYID = 1
8,606,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,633 UART: [ldev] --
10,411,618 UART: [fwproc] Wait for Commands...
10,414,569 UART: [fwproc] Recv command 0x46574c44
10,416,871 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,490 >>> mbox cmd response: success
14,603,660 UART: [afmc] ++
14,604,363 UART: [afmc] CDI.KEYID = 6
14,605,614 UART: [afmc] SUBJECT.KEYID = 7
14,607,069 UART: [afmc] AUTHORITY.KEYID = 5
17,145,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,407 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,395 UART: [afmc] --
18,948,684 UART: [cold-reset] --
18,951,629 UART: [state] Locking Datavault
18,955,647 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,859 UART: [state] Locking ICCM
18,960,662 UART: [exit] Launching FMC @ 0x40000130
18,969,294 UART:
18,969,517 UART: Running Caliptra FMC ...
18,970,544 UART:
18,970,711 UART: [state] CFI Enabled
19,030,909 UART: [fht] FMC Alias Private Key: 7
20,794,316 UART: [art] Extend RT PCRs Done
20,795,538 UART: [art] Lock RT PCRs Done
20,797,329 UART: [art] Populate DV Done
20,802,953 UART: [fht] FMC Alias Private Key: 7
20,804,660 UART: [art] Derive CDI
20,805,471 UART: [art] Store in in slot 0x4
20,862,781 UART: [art] Derive Key Pair
20,863,819 UART: [art] Store priv key in slot 0x5
23,326,839 UART: [art] Derive Key Pair - Done
23,339,727 UART: [art] Signing Cert with AUTHO
23,341,025 UART: RITY.KEYID = 7
25,052,136 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,651 UART: [art] PUB.X = D18DFC79E87E6371BC3106F03AF29C0EC0FC4410B8DF834E3C4CCFCF92A45CE9984FC3C99DCEF77D3025FBCA31CC2FC7
25,060,935 UART: [art] PUB.Y = 9BBDAE2490E945A5885161190D8974400588F216A4038E3D4B43121E08FFEFDEEE267C1661D2E38546893009EA3F1B52
25,068,152 UART: [art] SIG.R = 4CCA7F8FB57BF028D3137C4FE354A020FE6591099F0DBA9CB6669D05B421986014528541C02247F2B6E550909BDEAA1C
25,075,603 UART: [art] SIG.S = 0483B0C7303B680D7BBCB313F6F153361D49F9BC98281ACE2924032A31439CA8B2CF2F48FDC5B295D953221EFB45418B
26,054,644 UART: Caliptra RT
26,055,359 UART: [state] CFI Enabled
26,220,612 UART: [rt] RT listening for mailbox commands...
26,224,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,269,400 UART: [rt]cmd =0x4c4d5356, len=1672
26,470,422 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,436,913 ready_for_fw is high
3,437,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,115 >>> mbox cmd response: success
19,030,480 UART:
19,030,893 UART: Running Caliptra FMC ...
19,032,011 UART:
19,032,169 UART: [state] CFI Enabled
19,098,080 UART: [fht] FMC Alias Private Key: 7
20,862,340 UART: [art] Extend RT PCRs Done
20,863,559 UART: [art] Lock RT PCRs Done
20,865,132 UART: [art] Populate DV Done
20,870,553 UART: [fht] FMC Alias Private Key: 7
20,872,113 UART: [art] Derive CDI
20,872,931 UART: [art] Store in in slot 0x4
20,931,384 UART: [art] Derive Key Pair
20,932,427 UART: [art] Store priv key in slot 0x5
23,395,201 UART: [art] Derive Key Pair - Done
23,408,260 UART: [art] Signing Cert with AUTHO
23,409,604 UART: RITY.KEYID = 7
25,120,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,230 UART: [art] PUB.X = 6D893BFEA6D6ABE7F3931BEC5507ED3F85878C782DDE119673C8C467D1BDF1D200D9FAEE1153811B6CE4BD49AD19C612
25,129,510 UART: [art] PUB.Y = B3F7458954D6C24BEA0D0A74B910495CA4BE6ADD0E683498D85975676C388FBED09B2A3F3D085302BC2FE1C581938E3F
25,136,770 UART: [art] SIG.R = 47DD164218D41F40F5F42B5B493864493C4DD02B94578D4C4E2E7A1E54FB1DC000056951A6A67093CF33B06809D61AFB
25,144,138 UART: [art] SIG.S = 1F2B06B43136FEC732275BAFEA724CAC09EB25C1C4EA1CAF15D82F2DFF61196FE43573D186811705EE18D5E1E15A9774
26,123,033 UART: Caliptra RT
26,123,725 UART: [state] CFI Enabled
26,288,771 UART: [rt] RT listening for mailbox commands...
26,292,796 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,337,783 UART: [rt]cmd =0x4c4d5356, len=1672
26,538,942 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
193,038 UART:
193,425 UART: Running Caliptra ROM ...
194,618 UART:
604,156 UART: [state] CFI Enabled
618,594 UART: [state] LifecycleState = Unprovisioned
620,969 UART: [state] DebugLocked = No
623,351 UART: [state] WD Timer not started. Device not locked for debugging
627,386 UART: [kat] SHA2-256
817,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,991 UART: [kat] ++
828,595 UART: [kat] sha1
839,121 UART: [kat] SHA2-256
842,126 UART: [kat] SHA2-384
847,336 UART: [kat] SHA2-512-ACC
849,927 UART: [kat] ECC-384
3,293,451 UART: [kat] HMAC-384Kdf
3,306,637 UART: [kat] LMS
3,838,477 UART: [kat] --
3,844,675 UART: [cold-reset] ++
3,846,186 UART: [fht] FHT @ 0x50003400
3,858,113 UART: [idev] ++
3,858,783 UART: [idev] CDI.KEYID = 6
3,859,675 UART: [idev] SUBJECT.KEYID = 7
3,860,920 UART: [idev] UDS.KEYID = 0
3,861,821 ready_for_fw is high
3,862,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,906 UART: [idev] Erasing UDS.KEYID = 0
6,338,278 UART: [idev] Sha1 KeyId Algorithm
6,361,283 UART: [idev] --
6,365,221 UART: [ldev] ++
6,365,903 UART: [ldev] CDI.KEYID = 6
6,366,815 UART: [ldev] SUBJECT.KEYID = 5
6,367,976 UART: [ldev] AUTHORITY.KEYID = 7
6,369,210 UART: [ldev] FE.KEYID = 1
6,381,420 UART: [ldev] Erasing FE.KEYID = 1
8,859,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,431 UART: [ldev] --
10,650,940 UART: [fwproc] Wait for Commands...
10,653,203 UART: [fwproc] Recv command 0x46574c44
10,655,511 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,461 >>> mbox cmd response: success
14,838,094 UART: [afmc] ++
14,838,803 UART: [afmc] CDI.KEYID = 6
14,839,996 UART: [afmc] SUBJECT.KEYID = 7
14,841,499 UART: [afmc] AUTHORITY.KEYID = 5
17,344,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,090 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,127 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,695 UART: [afmc] --
19,140,792 UART: [cold-reset] --
19,144,562 UART: [state] Locking Datavault
19,148,855 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,004 UART: [state] Locking ICCM
19,152,578 UART: [exit] Launching FMC @ 0x40000130
19,161,213 UART:
19,161,452 UART: Running Caliptra FMC ...
19,162,553 UART:
19,162,710 UART: [state] CFI Enabled
19,170,810 UART: [fht] FMC Alias Private Key: 7
20,926,955 UART: [art] Extend RT PCRs Done
20,928,175 UART: [art] Lock RT PCRs Done
20,929,613 UART: [art] Populate DV Done
20,934,973 UART: [fht] FMC Alias Private Key: 7
20,936,587 UART: [art] Derive CDI
20,937,406 UART: [art] Store in in slot 0x4
20,979,833 UART: [art] Derive Key Pair
20,980,875 UART: [art] Store priv key in slot 0x5
23,407,801 UART: [art] Derive Key Pair - Done
23,420,895 UART: [art] Signing Cert with AUTHO
23,422,203 UART: RITY.KEYID = 7
25,127,713 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,222 UART: [art] PUB.X = BAF9203244BF66EE81D8673DDDF561583C06C1CD694B69D20FD3E680876959AF75BFA4AA1ED628D8EBD9823F930C4C8D
25,136,513 UART: [art] PUB.Y = EE5A795B267B52434A21130DECF7D332A1B135F6B4F0BEC65DE2774C4D964E162214ABCA66F14EC3E4AE75CB594606F4
25,143,785 UART: [art] SIG.R = 6274C7EC646A1FB3B845185F93AB4D92970C2A8349B8E5B622D0DA4984DA4E8AD452216C7B97DE59A1A0B331435F6D88
25,151,153 UART: [art] SIG.S = 61FA3B4A2B365D1CB913529918CCDA15BCE837399C37F3B72DF2A9FE5E8BE8464FA444469D273F39C9392E1A25E8F522
26,130,107 UART: Caliptra RT
26,130,812 UART: [state] CFI Enabled
26,248,409 UART: [rt] RT listening for mailbox commands...
26,252,317 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,296,772 UART: [rt]cmd =0x4c4d5356, len=1672
26,498,205 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,700 writing to cptra_bootfsm_go
3,759,542 ready_for_fw is high
3,759,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,638 >>> mbox cmd response: success
19,205,541 UART:
19,205,960 UART: Running Caliptra FMC ...
19,207,277 UART:
19,207,448 UART: [state] CFI Enabled
19,215,176 UART: [fht] FMC Alias Private Key: 7
20,971,796 UART: [art] Extend RT PCRs Done
20,973,026 UART: [art] Lock RT PCRs Done
20,974,773 UART: [art] Populate DV Done
20,980,083 UART: [fht] FMC Alias Private Key: 7
20,981,749 UART: [art] Derive CDI
20,982,571 UART: [art] Store in in slot 0x4
21,025,133 UART: [art] Derive Key Pair
21,026,175 UART: [art] Store priv key in slot 0x5
23,453,000 UART: [art] Derive Key Pair - Done
23,465,680 UART: [art] Signing Cert with AUTHO
23,466,986 UART: RITY.KEYID = 7
25,172,559 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,065 UART: [art] PUB.X = BD55C17DD5C69FEDB7DFCCCDE2A93BF05459F5FADB076B6E2DDB9144332D3F6BC574A8AA7D632C8B27CD3B7B6E2397C0
25,181,347 UART: [art] PUB.Y = 974D62AED4B0CBCBE5A1BA9F47B710000961BA967652C086198A4D7F6257E9876A3734366A34BFFB170C98AF13E906A8
25,188,611 UART: [art] SIG.R = 788DE52EAD9AFC3ABFCDF3A27EDE4EA56BBE88EA1FD7BB6C5054B91B1181736270F75F27009C240FED0E924018BEB4F9
25,196,019 UART: [art] SIG.S = 94F9993FB360C91350FC27D5261EF778E070F472EFC8CEA1EB9B7F260E85730B77A95BE281BDB6FF25B6FBB4F053F678
26,174,620 UART: Caliptra RT
26,175,332 UART: [state] CFI Enabled
26,291,971 UART: [rt] RT listening for mailbox commands...
26,295,979 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,340,535 UART: [rt]cmd =0x4c4d5356, len=1672
26,541,572 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,772 UART: [kat] HMAC-384Kdf
907,518 UART: [kat] LMS
1,475,714 UART: [kat] --
1,476,805 UART: [cold-reset] ++
1,477,267 UART: [fht] Storing FHT @ 0x50003400
1,480,080 UART: [idev] ++
1,480,248 UART: [idev] CDI.KEYID = 6
1,480,608 UART: [idev] SUBJECT.KEYID = 7
1,481,032 UART: [idev] UDS.KEYID = 0
1,481,377 ready_for_fw is high
1,481,377 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,192 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,322 UART: [idev] --
1,515,357 UART: [ldev] ++
1,515,525 UART: [ldev] CDI.KEYID = 6
1,515,888 UART: [ldev] SUBJECT.KEYID = 5
1,516,314 UART: [ldev] AUTHORITY.KEYID = 7
1,516,777 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,058 UART: [ldev] --
1,586,383 UART: [fwproc] Waiting for Commands...
1,587,200 UART: [fwproc] Received command 0x46574c44
1,587,991 UART: [fwproc] Received Image of size 114084 bytes
2,884,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,247 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,142 >>> mbox cmd response: success
3,077,224 UART: [afmc] ++
3,077,392 UART: [afmc] CDI.KEYID = 6
3,077,754 UART: [afmc] SUBJECT.KEYID = 7
3,078,179 UART: [afmc] AUTHORITY.KEYID = 5
3,113,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,909 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,599 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,466 UART: [afmc] --
3,156,392 UART: [cold-reset] --
3,157,236 UART: [state] Locking Datavault
3,158,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,193 UART: [state] Locking ICCM
3,159,829 UART: [exit] Launching FMC @ 0x40000130
3,165,158 UART:
3,165,174 UART: Running Caliptra FMC ...
3,165,582 UART:
3,165,636 UART: [state] CFI Enabled
3,176,343 UART: [fht] FMC Alias Private Key: 7
3,283,972 UART: [art] Extend RT PCRs Done
3,284,400 UART: [art] Lock RT PCRs Done
3,285,582 UART: [art] Populate DV Done
3,293,709 UART: [fht] FMC Alias Private Key: 7
3,294,799 UART: [art] Derive CDI
3,295,079 UART: [art] Store in in slot 0x4
3,380,624 UART: [art] Derive Key Pair
3,380,984 UART: [art] Store priv key in slot 0x5
3,394,488 UART: [art] Derive Key Pair - Done
3,409,025 UART: [art] Signing Cert with AUTHO
3,409,505 UART: RITY.KEYID = 7
3,424,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,326 UART: [art] PUB.X = 088E83A1B61F68E90337963A3C33A11CC40AE773FC662CC3C214BBCA9CF2A1E12C6F483E51953C4CDA360A114976FDCE
3,432,096 UART: [art] PUB.Y = 76ED72B759E577DEF98F39BC5E250DC27B921633C9FA7C0E154FFFD3676165D2AD65D9435FAE9A2C58DFC1BF33E089B8
3,439,056 UART: [art] SIG.R = A85540ADF56A53181E0F3CD8D5CE923BC6E986394CB2033C4F66846CABBBF167A11E577F764E3FB0018668A90756BEC2
3,445,822 UART: [art] SIG.S = 1BC3BC3E1B5FEDF83CF790BD7496719BAEE51D467CCC6690D7C02ECA54248A5754AA08A8D699A56406CAE9536A0B389E
3,469,770 UART: Caliptra RT
3,470,023 UART: [state] CFI Enabled
3,578,330 UART: [rt] RT listening for mailbox commands...
3,579,000 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,754 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,297 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,355 ready_for_fw is high
1,363,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,560 >>> mbox cmd response: success
2,986,358 UART:
2,986,374 UART: Running Caliptra FMC ...
2,986,782 UART:
2,986,836 UART: [state] CFI Enabled
2,997,233 UART: [fht] FMC Alias Private Key: 7
3,104,958 UART: [art] Extend RT PCRs Done
3,105,386 UART: [art] Lock RT PCRs Done
3,106,926 UART: [art] Populate DV Done
3,115,331 UART: [fht] FMC Alias Private Key: 7
3,116,489 UART: [art] Derive CDI
3,116,769 UART: [art] Store in in slot 0x4
3,202,664 UART: [art] Derive Key Pair
3,203,024 UART: [art] Store priv key in slot 0x5
3,216,994 UART: [art] Derive Key Pair - Done
3,231,645 UART: [art] Signing Cert with AUTHO
3,232,125 UART: RITY.KEYID = 7
3,247,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,202 UART: [art] PUB.X = 89D742BCEB42EDB5F4D1C281B05DA6BCDBFCB445C3C1988DD6DC09C65A5EEA670AA12E54FDFB6C7E026F90A66C7B5F7E
3,254,995 UART: [art] PUB.Y = 67AA817E44D03D82CC121F93739A50556325D0C307E711E8EC0179B03B16AB86E4A597912039FC552F596A0C1ED1732D
3,261,932 UART: [art] SIG.R = D326820F4839A98EF60C598E9E8DAAEB90B2F1962743AFF2B5E4C156D2C6D6698DD948C26F37896BC578BE6F4C19944F
3,268,704 UART: [art] SIG.S = B6449A34B339C7EBA03F64F7DA99AC3FA7A77E174637E3C29EA4958F1070C8B9D8EFA5E7A31CF95CE3D7DE2833EB6900
3,292,421 UART: Caliptra RT
3,292,674 UART: [state] CFI Enabled
3,401,012 UART: [rt] RT listening for mailbox commands...
3,401,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,418 UART: [rt]cmd =0x4c4d5356, len=1672
3,694,923 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,820 UART: [kat] SHA2-256
881,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,866 UART: [kat] ++
886,018 UART: [kat] sha1
890,250 UART: [kat] SHA2-256
892,188 UART: [kat] SHA2-384
894,919 UART: [kat] SHA2-512-ACC
896,820 UART: [kat] ECC-384
902,489 UART: [kat] HMAC-384Kdf
906,953 UART: [kat] LMS
1,475,149 UART: [kat] --
1,476,112 UART: [cold-reset] ++
1,476,588 UART: [fht] Storing FHT @ 0x50003400
1,479,315 UART: [idev] ++
1,479,483 UART: [idev] CDI.KEYID = 6
1,479,843 UART: [idev] SUBJECT.KEYID = 7
1,480,267 UART: [idev] UDS.KEYID = 0
1,480,612 ready_for_fw is high
1,480,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,469 UART: [idev] Erasing UDS.KEYID = 0
1,505,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,643 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,462 UART: [ldev] Erasing FE.KEYID = 1
1,546,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,989 UART: [ldev] --
1,585,390 UART: [fwproc] Waiting for Commands...
1,586,059 UART: [fwproc] Received command 0x46574c44
1,586,850 UART: [fwproc] Received Image of size 114084 bytes
2,881,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,513 >>> mbox cmd response: success
3,074,603 UART: [afmc] ++
3,074,771 UART: [afmc] CDI.KEYID = 6
3,075,133 UART: [afmc] SUBJECT.KEYID = 7
3,075,558 UART: [afmc] AUTHORITY.KEYID = 5
3,110,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,703 UART: [afmc] --
3,153,599 UART: [cold-reset] --
3,154,359 UART: [state] Locking Datavault
3,155,548 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,152 UART: [state] Locking ICCM
3,156,682 UART: [exit] Launching FMC @ 0x40000130
3,162,011 UART:
3,162,027 UART: Running Caliptra FMC ...
3,162,435 UART:
3,162,578 UART: [state] CFI Enabled
3,173,535 UART: [fht] FMC Alias Private Key: 7
3,281,536 UART: [art] Extend RT PCRs Done
3,281,964 UART: [art] Lock RT PCRs Done
3,283,458 UART: [art] Populate DV Done
3,291,569 UART: [fht] FMC Alias Private Key: 7
3,292,535 UART: [art] Derive CDI
3,292,815 UART: [art] Store in in slot 0x4
3,378,734 UART: [art] Derive Key Pair
3,379,094 UART: [art] Store priv key in slot 0x5
3,391,986 UART: [art] Derive Key Pair - Done
3,406,887 UART: [art] Signing Cert with AUTHO
3,407,367 UART: RITY.KEYID = 7
3,422,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,428 UART: [art] PUB.X = 799359738D0EFA41F334868093D3FB5A0850387EE13FAFB275524BB7DD160072992BD49CD2E7DCC26E02E36989E0B3D9
3,430,169 UART: [art] PUB.Y = 58C9D494EB02B75B7C7DB816D844DC4B62968CBD5B3AF1464584B641C68C9D02929B5D6786957C48C00038F9C7D1E33F
3,437,093 UART: [art] SIG.R = 23C561E5F17FABBB52A697BBE6AAB5E89B997F4B72F7F949A82D80E578A52466B48956404CC0002031D813F0546FE07F
3,443,845 UART: [art] SIG.S = 8572710F1D549EED07494C044CB38422C4D486CCB4B26EAFCC8E5E03998B8CBBB521546CF5F4C9FBABECE90C0154A99C
3,467,434 UART: Caliptra RT
3,467,779 UART: [state] CFI Enabled
3,575,378 UART: [rt] RT listening for mailbox commands...
3,576,048 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,848 UART: [rt]cmd =0x4c4d5356, len=1672
3,869,317 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,220 ready_for_fw is high
1,362,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,217 >>> mbox cmd response: success
2,987,389 UART:
2,987,405 UART: Running Caliptra FMC ...
2,987,813 UART:
2,987,956 UART: [state] CFI Enabled
2,998,543 UART: [fht] FMC Alias Private Key: 7
3,106,644 UART: [art] Extend RT PCRs Done
3,107,072 UART: [art] Lock RT PCRs Done
3,108,558 UART: [art] Populate DV Done
3,116,885 UART: [fht] FMC Alias Private Key: 7
3,117,979 UART: [art] Derive CDI
3,118,259 UART: [art] Store in in slot 0x4
3,204,056 UART: [art] Derive Key Pair
3,204,416 UART: [art] Store priv key in slot 0x5
3,218,898 UART: [art] Derive Key Pair - Done
3,233,457 UART: [art] Signing Cert with AUTHO
3,233,937 UART: RITY.KEYID = 7
3,249,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,042 UART: [art] PUB.X = E35C82FF1536667B120DDC8CF657F00A7DA74633DA0BC50ACDEDCA7E5BC9AA80E167C8CEE73B82F9F2693C22600CA3B8
3,256,819 UART: [art] PUB.Y = 69CC50E93BEC311E9D2182EE8F01C7FA4F33653E24D6C06EBDC6DF9ED5D123AF1D257BD7385799BC2C585C1870BCFAC6
3,263,786 UART: [art] SIG.R = FC3F1D405D2730EEA55A3E86358846A132D33B25A3AFAC47A0615CECAE93DDDC375160DB4B5394B34F2FD107B8A4342E
3,270,567 UART: [art] SIG.S = 8FEA78ACFAECDEB839EDE85EDA135E765FCB42ABBC233AABD7E1EE5C3FE7566F88AF27EE0D8E17B611B76B6BDD8C7071
3,294,571 UART: Caliptra RT
3,294,916 UART: [state] CFI Enabled
3,402,730 UART: [rt] RT listening for mailbox commands...
3,403,400 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,018 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,415 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,559 UART: [kat] SHA2-256
903,499 UART: [kat] SHA2-384
906,092 UART: [kat] SHA2-512-ACC
907,993 UART: [kat] ECC-384
917,504 UART: [kat] HMAC-384Kdf
922,018 UART: [kat] LMS
1,170,346 UART: [kat] --
1,171,153 UART: [cold-reset] ++
1,171,707 UART: [fht] FHT @ 0x50003400
1,174,442 UART: [idev] ++
1,174,610 UART: [idev] CDI.KEYID = 6
1,174,970 UART: [idev] SUBJECT.KEYID = 7
1,175,394 UART: [idev] UDS.KEYID = 0
1,175,739 ready_for_fw is high
1,175,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,619 UART: [idev] Sha1 KeyId Algorithm
1,209,085 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,758 UART: [ldev] SUBJECT.KEYID = 5
1,211,184 UART: [ldev] AUTHORITY.KEYID = 7
1,211,647 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,248 UART: [fwproc] Wait for Commands...
1,282,870 UART: [fwproc] Recv command 0x46574c44
1,283,598 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,766 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,299 >>> mbox cmd response: success
2,772,461 UART: [afmc] ++
2,772,629 UART: [afmc] CDI.KEYID = 6
2,772,991 UART: [afmc] SUBJECT.KEYID = 7
2,773,416 UART: [afmc] AUTHORITY.KEYID = 5
2,809,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,592 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,540 UART: [afmc] --
2,852,480 UART: [cold-reset] --
2,853,186 UART: [state] Locking Datavault
2,854,411 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,015 UART: [state] Locking ICCM
2,855,585 UART: [exit] Launching FMC @ 0x40000130
2,860,914 UART:
2,860,930 UART: Running Caliptra FMC ...
2,861,338 UART:
2,861,392 UART: [state] CFI Enabled
2,871,745 UART: [fht] FMC Alias Private Key: 7
2,979,620 UART: [art] Extend RT PCRs Done
2,980,048 UART: [art] Lock RT PCRs Done
2,981,820 UART: [art] Populate DV Done
2,989,941 UART: [fht] FMC Alias Private Key: 7
2,990,957 UART: [art] Derive CDI
2,991,237 UART: [art] Store in in slot 0x4
3,077,040 UART: [art] Derive Key Pair
3,077,400 UART: [art] Store priv key in slot 0x5
3,090,472 UART: [art] Derive Key Pair - Done
3,105,089 UART: [art] Signing Cert with AUTHO
3,105,569 UART: RITY.KEYID = 7
3,120,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,574 UART: [art] PUB.X = CF391014F52713B1A690B4DA8C9E0494BB06CD42C25EEE3D99A6C85EC793EFF23AD96960322BD9D23D23ECD35368327C
3,128,348 UART: [art] PUB.Y = B43217A14A1FB1AE2823B8ACAA939709265642757039ECECFADB9267EC9769CC3D6CBA20F0A04F40D2F74E472245D21C
3,135,305 UART: [art] SIG.R = 474EBCD67CBE555D615ACBD29D2D5C23BCF2F25A35E41B5AF874FD58AE4A8DF974CC7448D0AB8C2D3C5D39C807CE0BF0
3,142,097 UART: [art] SIG.S = 831B4A087FF6C80FBE8F66D16D465ECA846296C9538F3CFD6393777951E8A18116C4CBA8CFDC810984E5B9A2B0E0B674
3,166,161 UART: Caliptra RT
3,166,414 UART: [state] CFI Enabled
3,274,259 UART: [rt] RT listening for mailbox commands...
3,274,929 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,687 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,990 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,995 ready_for_fw is high
1,059,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,576 >>> mbox cmd response: success
2,684,710 UART:
2,684,726 UART: Running Caliptra FMC ...
2,685,134 UART:
2,685,188 UART: [state] CFI Enabled
2,695,755 UART: [fht] FMC Alias Private Key: 7
2,804,150 UART: [art] Extend RT PCRs Done
2,804,578 UART: [art] Lock RT PCRs Done
2,805,978 UART: [art] Populate DV Done
2,814,135 UART: [fht] FMC Alias Private Key: 7
2,815,273 UART: [art] Derive CDI
2,815,553 UART: [art] Store in in slot 0x4
2,901,096 UART: [art] Derive Key Pair
2,901,456 UART: [art] Store priv key in slot 0x5
2,914,950 UART: [art] Derive Key Pair - Done
2,929,861 UART: [art] Signing Cert with AUTHO
2,930,341 UART: RITY.KEYID = 7
2,945,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,290 UART: [art] PUB.X = BDA1F045DCC5678ACCE79DFF4CFCF4B3DD72A91D4D3142CF93D9407604894BB7DFA4E4DEB6B8209042E2EC079E561921
2,953,074 UART: [art] PUB.Y = 785E4D242B44DF7D038C11AD945349C5D0A3BFF789F3116484A590BD237EC19AADC5BCBFE3E2B5E70D5C49DDA10AE248
2,960,033 UART: [art] SIG.R = A8FABCB167D1B5C077C9303D76C72A08AF5FC126EC73E4F836558DDB1BBF2A4C9FEE242AC47B791CF271DEED8BBEC998
2,966,828 UART: [art] SIG.S = 48A457DA800A1BAE8381293CBAEBBE23241D12F07059D57CEA7DDF9EF1ED927D2D0C3F89793F10F8F62ECE5880405CBF
2,990,277 UART: Caliptra RT
2,990,530 UART: [state] CFI Enabled
3,099,061 UART: [rt] RT listening for mailbox commands...
3,099,731 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,471 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,890 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,145 UART: [kat] HMAC-384Kdf
922,725 UART: [kat] LMS
1,171,053 UART: [kat] --
1,171,720 UART: [cold-reset] ++
1,172,126 UART: [fht] FHT @ 0x50003400
1,174,837 UART: [idev] ++
1,175,005 UART: [idev] CDI.KEYID = 6
1,175,365 UART: [idev] SUBJECT.KEYID = 7
1,175,789 UART: [idev] UDS.KEYID = 0
1,176,134 ready_for_fw is high
1,176,134 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,683 UART: [idev] Erasing UDS.KEYID = 0
1,201,026 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,534 UART: [ldev] ++
1,210,702 UART: [ldev] CDI.KEYID = 6
1,211,065 UART: [ldev] SUBJECT.KEYID = 5
1,211,491 UART: [ldev] AUTHORITY.KEYID = 7
1,211,954 UART: [ldev] FE.KEYID = 1
1,217,418 UART: [ldev] Erasing FE.KEYID = 1
1,243,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,370 UART: [ldev] --
1,282,799 UART: [fwproc] Wait for Commands...
1,283,473 UART: [fwproc] Recv command 0x46574c44
1,284,201 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,248 >>> mbox cmd response: success
2,772,362 UART: [afmc] ++
2,772,530 UART: [afmc] CDI.KEYID = 6
2,772,892 UART: [afmc] SUBJECT.KEYID = 7
2,773,317 UART: [afmc] AUTHORITY.KEYID = 5
2,809,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,387 UART: [afmc] --
2,852,325 UART: [cold-reset] --
2,853,053 UART: [state] Locking Datavault
2,854,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,678 UART: [state] Locking ICCM
2,855,276 UART: [exit] Launching FMC @ 0x40000130
2,860,605 UART:
2,860,621 UART: Running Caliptra FMC ...
2,861,029 UART:
2,861,172 UART: [state] CFI Enabled
2,872,323 UART: [fht] FMC Alias Private Key: 7
2,979,948 UART: [art] Extend RT PCRs Done
2,980,376 UART: [art] Lock RT PCRs Done
2,981,716 UART: [art] Populate DV Done
2,989,955 UART: [fht] FMC Alias Private Key: 7
2,990,985 UART: [art] Derive CDI
2,991,265 UART: [art] Store in in slot 0x4
3,076,884 UART: [art] Derive Key Pair
3,077,244 UART: [art] Store priv key in slot 0x5
3,090,266 UART: [art] Derive Key Pair - Done
3,104,618 UART: [art] Signing Cert with AUTHO
3,105,098 UART: RITY.KEYID = 7
3,120,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,067 UART: [art] PUB.X = D2088492E58EA28C6EF5E3742C7C92A5042657FBB55ACC5B38DB4E35C27B7B7BF1FD58D2B54FE743B964A6198ADE7676
3,127,843 UART: [art] PUB.Y = 7C5A76284EEA1F3FB024BD319D6ABE68059355894E4D7279768ABBE1C70069B16985D50A140463B2173E57A5E9042D93
3,134,755 UART: [art] SIG.R = 8836E38DC279F0AF2A55E7110ACDB213E581CE73D2811E7970815C7B386D41BA3188855616449FFA5AC3CFC569E9A1C0
3,141,526 UART: [art] SIG.S = 2702A6369AB9CDD7E898CA200F3C86417B95CA784DB454F70B4A7F2F9911DFF38CBE7125943B1E41B7996953AA37ADFB
3,164,944 UART: Caliptra RT
3,165,289 UART: [state] CFI Enabled
3,272,944 UART: [rt] RT listening for mailbox commands...
3,273,614 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,686 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,089 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,502 ready_for_fw is high
1,061,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,579 >>> mbox cmd response: success
2,687,819 UART:
2,687,835 UART: Running Caliptra FMC ...
2,688,243 UART:
2,688,386 UART: [state] CFI Enabled
2,699,145 UART: [fht] FMC Alias Private Key: 7
2,807,710 UART: [art] Extend RT PCRs Done
2,808,138 UART: [art] Lock RT PCRs Done
2,809,738 UART: [art] Populate DV Done
2,817,997 UART: [fht] FMC Alias Private Key: 7
2,818,961 UART: [art] Derive CDI
2,819,241 UART: [art] Store in in slot 0x4
2,905,120 UART: [art] Derive Key Pair
2,905,480 UART: [art] Store priv key in slot 0x5
2,918,560 UART: [art] Derive Key Pair - Done
2,933,247 UART: [art] Signing Cert with AUTHO
2,933,727 UART: RITY.KEYID = 7
2,949,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,916 UART: [art] PUB.X = 66E8C3C6DB35101437CE1327B08B13885B1E2B9C30B45C7A26CE082AAA9FA6CAFBF496E7B3E69B4EA7CEB28BC84DCC37
2,956,705 UART: [art] PUB.Y = E7CCABC7CE5D02016A258D7BE7329699B8310A351C5B57B1DA6E937F491600E7B2ABFECB04B05DEBF609F052EB0B9ED8
2,963,635 UART: [art] SIG.R = 96AA05F075BEF985473A35E9E6FD67474799565D3DCB8933BF8A220FC77590451289F9A22171EC6E43EB651AEEAFF272
2,970,403 UART: [art] SIG.S = FE074E8782251A1A89E489E22D04D235C9DC42AF942D0AC727E7D18B4C3B5103D448AF96D68B5BE5310699D3B7C77800
2,993,899 UART: Caliptra RT
2,994,244 UART: [state] CFI Enabled
3,100,734 UART: [rt] RT listening for mailbox commands...
3,101,404 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,214 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,535 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,174,453 ready_for_fw is high
1,174,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,133 UART: [idev] Sha1 KeyId Algorithm
1,207,051 UART: [idev] --
1,208,034 UART: [ldev] ++
1,208,202 UART: [ldev] CDI.KEYID = 6
1,208,566 UART: [ldev] SUBJECT.KEYID = 5
1,208,993 UART: [ldev] AUTHORITY.KEYID = 7
1,209,456 UART: [ldev] FE.KEYID = 1
1,214,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,446 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,637 UART: [fwproc] Recv command 0x46574c44
1,281,370 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,937 >>> mbox cmd response: success
2,769,090 UART: [afmc] ++
2,769,258 UART: [afmc] CDI.KEYID = 6
2,769,621 UART: [afmc] SUBJECT.KEYID = 7
2,770,047 UART: [afmc] AUTHORITY.KEYID = 5
2,805,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,550 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,407 UART: [afmc] --
2,848,495 UART: [cold-reset] --
2,849,401 UART: [state] Locking Datavault
2,850,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,120 UART: [state] Locking ICCM
2,851,680 UART: [exit] Launching FMC @ 0x40000130
2,857,009 UART:
2,857,025 UART: Running Caliptra FMC ...
2,857,433 UART:
2,857,487 UART: [state] CFI Enabled
2,868,200 UART: [fht] FMC Alias Private Key: 7
2,976,003 UART: [art] Extend RT PCRs Done
2,976,431 UART: [art] Lock RT PCRs Done
2,977,967 UART: [art] Populate DV Done
2,985,976 UART: [fht] FMC Alias Private Key: 7
2,987,036 UART: [art] Derive CDI
2,987,316 UART: [art] Store in in slot 0x4
3,073,299 UART: [art] Derive Key Pair
3,073,659 UART: [art] Store priv key in slot 0x5
3,087,219 UART: [art] Derive Key Pair - Done
3,102,050 UART: [art] Signing Cert with AUTHO
3,102,530 UART: RITY.KEYID = 7
3,117,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,047 UART: [art] PUB.X = 100B9F96A61743852C25D28EF1E629D2E44ACBFE8E56436C1C85489283E3B7BB7B979CC0FA414A5CCB76095B6D0A039F
3,124,813 UART: [art] PUB.Y = ED7C8B302CCC0CB22DEB2986F1C0CA53025CC7D45897893D216FE05FE0702A8A91A8231E930B6A3CE519776956FFBD7B
3,131,766 UART: [art] SIG.R = DF2032658BB084BB5B5AEA16A8CC240C73B78D594638CF4E97D2103BD0C4F0F84E9D395363E6F15B43DAC28F2C8978BD
3,138,545 UART: [art] SIG.S = 425EF122C4744B627AFFD25FE09087085F2760B0F6CBAE558077DEC5D2DF3916994B7C226E52802F2372590EB72518B0
3,161,970 UART: Caliptra RT
3,162,223 UART: [state] CFI Enabled
3,270,512 UART: [rt] RT listening for mailbox commands...
3,271,182 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,902 UART: [rt]cmd =0x4c4d5356, len=1672
3,564,357 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,718 ready_for_fw is high
1,055,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,617 >>> mbox cmd response: success
2,681,485 UART:
2,681,501 UART: Running Caliptra FMC ...
2,681,909 UART:
2,681,963 UART: [state] CFI Enabled
2,691,854 UART: [fht] FMC Alias Private Key: 7
2,799,839 UART: [art] Extend RT PCRs Done
2,800,267 UART: [art] Lock RT PCRs Done
2,801,701 UART: [art] Populate DV Done
2,810,022 UART: [fht] FMC Alias Private Key: 7
2,811,106 UART: [art] Derive CDI
2,811,386 UART: [art] Store in in slot 0x4
2,896,955 UART: [art] Derive Key Pair
2,897,315 UART: [art] Store priv key in slot 0x5
2,910,031 UART: [art] Derive Key Pair - Done
2,924,477 UART: [art] Signing Cert with AUTHO
2,924,957 UART: RITY.KEYID = 7
2,940,475 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,240 UART: [art] PUB.X = E01B556BBA0866E072883980234049C37B6530D62027A60962418DD5EDA50AA56436D3B59B0983DDD61C747129D05ADA
2,947,992 UART: [art] PUB.Y = 3895E713CFCAFFC2C986E9A726F201A3693BE4035BC434CD9A6B2633F90C815136EC6B69E5B877DC0608E522141D3D99
2,954,931 UART: [art] SIG.R = 5871ECAEB91E1FDEEA96AA03137C9B4785164AD747631067CB7A33BD390FFB090C9FF82879716B7193615791B1F1D47C
2,961,693 UART: [art] SIG.S = C1B4E137A1D721750E13274A5306C096010F7A1B05B8771515BA85132BA377AFF9B85E44F47BA01CB6903572922F8B9C
2,985,583 UART: Caliptra RT
2,985,836 UART: [state] CFI Enabled
3,092,815 UART: [rt] RT listening for mailbox commands...
3,093,485 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,325 UART: [rt]cmd =0x4c4d5356, len=1672
3,386,560 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,741 UART: [kat] HMAC-384Kdf
921,401 UART: [kat] LMS
1,169,713 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,948 UART: [idev] ++
1,174,116 UART: [idev] CDI.KEYID = 6
1,174,477 UART: [idev] SUBJECT.KEYID = 7
1,174,902 UART: [idev] UDS.KEYID = 0
1,175,248 ready_for_fw is high
1,175,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,010 UART: [idev] Sha1 KeyId Algorithm
1,208,980 UART: [idev] --
1,209,941 UART: [ldev] ++
1,210,109 UART: [ldev] CDI.KEYID = 6
1,210,473 UART: [ldev] SUBJECT.KEYID = 5
1,210,900 UART: [ldev] AUTHORITY.KEYID = 7
1,211,363 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,488 >>> mbox cmd response: success
2,770,567 UART: [afmc] ++
2,770,735 UART: [afmc] CDI.KEYID = 6
2,771,098 UART: [afmc] SUBJECT.KEYID = 7
2,771,524 UART: [afmc] AUTHORITY.KEYID = 5
2,808,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,616 UART: [afmc] --
2,851,632 UART: [cold-reset] --
2,852,496 UART: [state] Locking Datavault
2,853,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,449 UART: [state] Locking ICCM
2,854,873 UART: [exit] Launching FMC @ 0x40000130
2,860,202 UART:
2,860,218 UART: Running Caliptra FMC ...
2,860,626 UART:
2,860,769 UART: [state] CFI Enabled
2,871,338 UART: [fht] FMC Alias Private Key: 7
2,979,621 UART: [art] Extend RT PCRs Done
2,980,049 UART: [art] Lock RT PCRs Done
2,981,533 UART: [art] Populate DV Done
2,989,760 UART: [fht] FMC Alias Private Key: 7
2,990,900 UART: [art] Derive CDI
2,991,180 UART: [art] Store in in slot 0x4
3,076,947 UART: [art] Derive Key Pair
3,077,307 UART: [art] Store priv key in slot 0x5
3,090,731 UART: [art] Derive Key Pair - Done
3,105,684 UART: [art] Signing Cert with AUTHO
3,106,164 UART: RITY.KEYID = 7
3,121,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,171 UART: [art] PUB.X = 09AD6ED3A22B4DEB8C3C4F08E5AA927C4866458E72DD67BA56C572780690B7C7032778DF13F6D87DA8E997E88E89E85A
3,128,937 UART: [art] PUB.Y = 924372D31F90C2799D291BE6562EE7116041130AC57F43C3A074F5E841A116D5E965624125B0EA077DB52F0DBAC97245
3,135,872 UART: [art] SIG.R = 4C42C56C075F6AF459B8B326CE5977EA47BDAD0D86C0D9F490417CF5B51867D079BCAC6DFE382BDA5F7F76F948A7C291
3,142,652 UART: [art] SIG.S = 227C6CF712F024B57024D58465B5B203C1C9CDB2CE2C63A28656C0E88884E15BF161DE6D80905DBB5E1D338055F2A040
3,166,642 UART: Caliptra RT
3,166,987 UART: [state] CFI Enabled
3,276,328 UART: [rt] RT listening for mailbox commands...
3,276,998 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,954 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,481 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,427 ready_for_fw is high
1,056,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,822 >>> mbox cmd response: success
2,682,130 UART:
2,682,146 UART: Running Caliptra FMC ...
2,682,554 UART:
2,682,697 UART: [state] CFI Enabled
2,693,524 UART: [fht] FMC Alias Private Key: 7
2,800,983 UART: [art] Extend RT PCRs Done
2,801,411 UART: [art] Lock RT PCRs Done
2,802,955 UART: [art] Populate DV Done
2,811,396 UART: [fht] FMC Alias Private Key: 7
2,812,508 UART: [art] Derive CDI
2,812,788 UART: [art] Store in in slot 0x4
2,898,085 UART: [art] Derive Key Pair
2,898,445 UART: [art] Store priv key in slot 0x5
2,911,813 UART: [art] Derive Key Pair - Done
2,926,835 UART: [art] Signing Cert with AUTHO
2,927,315 UART: RITY.KEYID = 7
2,942,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,630 UART: [art] PUB.X = 4120B29C36989757C07C87C3397647B9FC51F9C337A727E86D26864699B873B091D2580886F81F5F21604E216E2652BC
2,950,381 UART: [art] PUB.Y = F88EE689D4B7169E4DF8953BCDC69C61423906A4BE92C56BF261265A7D2BFB52EA4000BE54F81ED2433304A2AF5262AA
2,957,313 UART: [art] SIG.R = DA80143C419D1562F1F1BAE4480AFD098E69C06C1C8193600B7977B955BAB8FC30DF94BF0B92FFBAECF5BC1C30396C82
2,964,087 UART: [art] SIG.S = 4168169183C44B7B57E80B7662A5FB1B862905349EEF82D11406775D0ACD90072994211DE855DD29610016C4356D4152
2,987,877 UART: Caliptra RT
2,988,222 UART: [state] CFI Enabled
3,095,399 UART: [rt] RT listening for mailbox commands...
3,096,069 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,713 UART: [rt]cmd =0x4c4d5356, len=1672
3,389,128 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,077 UART:
192,450 UART: Running Caliptra ROM ...
193,542 UART:
193,689 UART: [state] CFI Enabled
266,379 UART: [state] LifecycleState = Unprovisioned
268,392 UART: [state] DebugLocked = No
270,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,854 UART: [kat] SHA2-256
445,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,048 UART: [kat] ++
456,503 UART: [kat] sha1
467,233 UART: [kat] SHA2-256
469,951 UART: [kat] SHA2-384
474,946 UART: [kat] SHA2-512-ACC
477,321 UART: [kat] ECC-384
2,768,094 UART: [kat] HMAC-384Kdf
2,801,185 UART: [kat] LMS
3,991,518 UART: [kat] --
3,995,752 UART: [cold-reset] ++
3,997,480 UART: [fht] Storing FHT @ 0x50003400
4,008,178 UART: [idev] ++
4,008,767 UART: [idev] CDI.KEYID = 6
4,009,662 UART: [idev] SUBJECT.KEYID = 7
4,011,102 UART: [idev] UDS.KEYID = 0
4,012,201 ready_for_fw is high
4,012,410 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,415 UART: [idev] Erasing UDS.KEYID = 0
7,350,028 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,107 UART: [idev] --
7,376,505 UART: [ldev] ++
7,377,089 UART: [ldev] CDI.KEYID = 6
7,378,039 UART: [ldev] SUBJECT.KEYID = 5
7,379,248 UART: [ldev] AUTHORITY.KEYID = 7
7,380,532 UART: [ldev] FE.KEYID = 1
7,423,031 UART: [ldev] Erasing FE.KEYID = 1
10,758,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,686 UART: [ldev] --
13,138,938 UART: [fwproc] Waiting for Commands...
13,141,195 UART: [fwproc] Received command 0x46574c44
13,143,378 UART: [fwproc] Received Image of size 113760 bytes
17,190,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,652,414 >>> mbox cmd response: success
17,656,468 UART: [afmc] ++
17,657,120 UART: [afmc] CDI.KEYID = 6
17,658,034 UART: [afmc] SUBJECT.KEYID = 7
17,659,254 UART: [afmc] AUTHORITY.KEYID = 5
21,030,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,493 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,749 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,179 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,018 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,452 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,693 UART: [afmc] --
23,398,049 UART: [cold-reset] --
23,403,270 UART: [state] Locking Datavault
23,407,542 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,294 UART: [state] Locking ICCM
23,411,553 UART: [exit] Launching FMC @ 0x40000130
23,419,949 UART:
23,420,189 UART: Running Caliptra FMC ...
23,421,290 UART:
23,421,448 UART: [state] CFI Enabled
23,489,171 UART: [fht] FMC Alias Private Key: 7
25,827,175 UART: [art] Extend RT PCRs Done
25,828,395 UART: [art] Lock RT PCRs Done
25,829,954 UART: [art] Populate DV Done
25,835,519 UART: [fht] FMC Alias Private Key: 7
25,837,108 UART: [art] Derive CDI
25,837,871 UART: [art] Store in in slot 0x4
25,897,829 UART: [art] Derive Key Pair
25,898,864 UART: [art] Store priv key in slot 0x5
29,191,610 UART: [art] Derive Key Pair - Done
29,204,879 UART: [art] Signing Cert with AUTHO
29,206,188 UART: RITY.KEYID = 7
31,493,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,160 UART: [art] PUB.X = 77BCC92C4A3CBD6F10DAFDC41F91539A09160E234209C4F0956553BC45282B3EFA9A3D2EC1B90B84C8F676E18CF229F1
31,502,403 UART: [art] PUB.Y = 4FDDC06CA200C26D3DF57D840FFEACF8773C3143A4334159BEC0BB75CEA8CB52E5BAEC37C865C5DE14E929D995BE2C43
31,509,681 UART: [art] SIG.R = 757B30844E91EEF7564771BF7B3BD73EFC08494E31C268480FA1945EE1FC12E3FDB1A84793491DDAAC13DBE30B11ED76
31,517,076 UART: [art] SIG.S = 110FA2311933DF812CD64D65CC2E544DFD482A94FF86704385FB54B9E4926E9E6E31E08AC0E5EEEF438AE6D826EE0870
32,822,161 UART: Caliptra RT
32,822,876 UART: [state] CFI Enabled
32,984,147 UART: [rt] RT listening for mailbox commands...
32,988,134 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,033,099 UART: [rt]cmd =0x4c4d5356, len=1672
33,447,008 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,806,808 ready_for_fw is high
3,807,352 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,890,279 >>> mbox cmd response: success
23,584,333 UART:
23,584,721 UART: Running Caliptra FMC ...
23,586,023 UART:
23,586,195 UART: [state] CFI Enabled
23,651,779 UART: [fht] FMC Alias Private Key: 7
25,990,015 UART: [art] Extend RT PCRs Done
25,991,247 UART: [art] Lock RT PCRs Done
25,992,988 UART: [art] Populate DV Done
25,998,428 UART: [fht] FMC Alias Private Key: 7
26,000,085 UART: [art] Derive CDI
26,000,912 UART: [art] Store in in slot 0x4
26,060,605 UART: [art] Derive Key Pair
26,061,609 UART: [art] Store priv key in slot 0x5
29,353,818 UART: [art] Derive Key Pair - Done
29,366,599 UART: [art] Signing Cert with AUTHO
29,367,910 UART: RITY.KEYID = 7
31,656,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,977 UART: [art] PUB.X = A401B7E116682EDD2CF795058C6698ECD8DEBC966C4BDE58A3A5CC52CC25DA64155582706B621D594532D64E8F3103F6
31,665,246 UART: [art] PUB.Y = 6A18F5BBAC8A062164D9F705B68A1022C5ACE4F36A3A1F641165BB1388321EC68EDD9ADF97A44D01273B81A9C45D5D06
31,672,482 UART: [art] SIG.R = C544B6528D40A5703C9B6DB6875FF1B1198720F3FBB8DF9E693326235780C11CCC3AFCBF3FF352AC7C5ACA727AC692B3
31,679,891 UART: [art] SIG.S = 0D5D4082EB1DCAC723AE44EFC433CAC9F6E49C053D63A157C2DAF1BF169559F2A04CF92DE2B36B1B2616E7001EC6CC8D
32,984,777 UART: Caliptra RT
32,985,491 UART: [state] CFI Enabled
33,149,039 UART: [rt] RT listening for mailbox commands...
33,152,993 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,198,066 UART: [rt]cmd =0x4c4d5356, len=1672
33,611,893 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
193,026 UART:
193,402 UART: Running Caliptra ROM ...
194,584 UART:
604,225 UART: [state] CFI Enabled
617,963 UART: [state] LifecycleState = Unprovisioned
619,840 UART: [state] DebugLocked = No
621,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,166 UART: [kat] SHA2-256
796,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,419 UART: [kat] ++
807,936 UART: [kat] sha1
818,804 UART: [kat] SHA2-256
821,514 UART: [kat] SHA2-384
827,003 UART: [kat] SHA2-512-ACC
829,381 UART: [kat] ECC-384
3,114,726 UART: [kat] HMAC-384Kdf
3,126,889 UART: [kat] LMS
4,316,990 UART: [kat] --
4,321,927 UART: [cold-reset] ++
4,323,718 UART: [fht] Storing FHT @ 0x50003400
4,333,909 UART: [idev] ++
4,334,476 UART: [idev] CDI.KEYID = 6
4,335,422 UART: [idev] SUBJECT.KEYID = 7
4,336,680 UART: [idev] UDS.KEYID = 0
4,337,656 ready_for_fw is high
4,337,842 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,694 UART: [idev] Erasing UDS.KEYID = 0
7,621,365 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,021 UART: [idev] --
7,645,316 UART: [ldev] ++
7,645,883 UART: [ldev] CDI.KEYID = 6
7,646,898 UART: [ldev] SUBJECT.KEYID = 5
7,648,051 UART: [ldev] AUTHORITY.KEYID = 7
7,649,328 UART: [ldev] FE.KEYID = 1
7,660,783 UART: [ldev] Erasing FE.KEYID = 1
10,945,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,399 UART: [ldev] --
13,304,849 UART: [fwproc] Waiting for Commands...
13,306,565 UART: [fwproc] Received command 0x46574c44
13,308,796 UART: [fwproc] Received Image of size 113760 bytes
17,359,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,822,548 >>> mbox cmd response: success
17,826,076 UART: [afmc] ++
17,826,681 UART: [afmc] CDI.KEYID = 6
17,827,587 UART: [afmc] SUBJECT.KEYID = 7
17,828,857 UART: [afmc] AUTHORITY.KEYID = 5
21,143,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,755 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,138 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,943 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,379 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,489 UART: [afmc] --
23,510,763 UART: [cold-reset] --
23,514,249 UART: [state] Locking Datavault
23,520,899 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,653 UART: [state] Locking ICCM
23,524,803 UART: [exit] Launching FMC @ 0x40000130
23,533,206 UART:
23,533,440 UART: Running Caliptra FMC ...
23,534,541 UART:
23,534,699 UART: [state] CFI Enabled
23,542,737 UART: [fht] FMC Alias Private Key: 7
25,873,697 UART: [art] Extend RT PCRs Done
25,874,926 UART: [art] Lock RT PCRs Done
25,876,791 UART: [art] Populate DV Done
25,882,156 UART: [fht] FMC Alias Private Key: 7
25,883,859 UART: [art] Derive CDI
25,884,596 UART: [art] Store in in slot 0x4
25,927,484 UART: [art] Derive Key Pair
25,928,532 UART: [art] Store priv key in slot 0x5
29,170,926 UART: [art] Derive Key Pair - Done
29,184,132 UART: [art] Signing Cert with AUTHO
29,185,468 UART: RITY.KEYID = 7
31,465,088 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,599 UART: [art] PUB.X = 03B8539E9E64342FAFA4F9AC24AA2975BFC7F1778B52E35E79EA63A986DF40D37D50B7FE06B6E36768B82C6811ED047E
31,473,816 UART: [art] PUB.Y = 71BF282A8899DE6535D657216388E172F6013B3362CB36242321D87524A6E12025CE9E737E49255A923936E2E2364C71
31,481,068 UART: [art] SIG.R = 048B78A5FB3F120EF249DD995B982DFCF27AB248AAEF25E75FCBBA637A6D2938767D0CF25DC58CBEB7FF983239B18486
31,488,441 UART: [art] SIG.S = 24181BF672F5F477874EA1688E7DDB02B4D2A14C4D8C9BDDAC22B611133BBFC87D5CBE2211363209DAEED459746356B4
32,793,249 UART: Caliptra RT
32,793,963 UART: [state] CFI Enabled
32,912,182 UART: [rt] RT listening for mailbox commands...
32,916,193 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,960,699 UART: [rt]cmd =0x4c4d5356, len=1672
33,374,762 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,641 writing to cptra_bootfsm_go
4,123,456 ready_for_fw is high
4,123,863 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,306 >>> mbox cmd response: success
23,705,032 UART:
23,705,442 UART: Running Caliptra FMC ...
23,706,578 UART:
23,706,736 UART: [state] CFI Enabled
23,714,136 UART: [fht] FMC Alias Private Key: 7
26,044,909 UART: [art] Extend RT PCRs Done
26,046,132 UART: [art] Lock RT PCRs Done
26,047,710 UART: [art] Populate DV Done
26,053,231 UART: [fht] FMC Alias Private Key: 7
26,054,757 UART: [art] Derive CDI
26,055,500 UART: [art] Store in in slot 0x4
26,098,367 UART: [art] Derive Key Pair
26,099,370 UART: [art] Store priv key in slot 0x5
29,341,281 UART: [art] Derive Key Pair - Done
29,354,072 UART: [art] Signing Cert with AUTHO
29,355,382 UART: RITY.KEYID = 7
31,635,097 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,608 UART: [art] PUB.X = 8936E25FAF2DADF61F9E401790ED9A35A40766D27BF24975DBE39521A18633F15C8717D4CBE5D8E0EBEF8FC004638137
31,643,848 UART: [art] PUB.Y = 86083CDFC2AE6F124A0C18EE5EC168D4A17DFB6C5E669A478741EAFCC90B29158BA50495ED9FBD37E04AD4223D19ADE8
31,651,112 UART: [art] SIG.R = D7DFB1830851DF65AF1516E455BD8419ECDFEAE182B3B9A3F28FA579CAAFE1DE7898D125EDCB85369A2299728CC7F99A
31,658,486 UART: [art] SIG.S = B70775D007269882359AA4FF200EF528C06A9B7911093DDA7E73FC3C6AC79C46CB92765413EBF5CE72AE781AEFFC43F6
32,963,760 UART: Caliptra RT
32,964,464 UART: [state] CFI Enabled
33,081,325 UART: [rt] RT listening for mailbox commands...
33,085,332 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,129,806 UART: [rt]cmd =0x4c4d5356, len=1672
33,543,793 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,476 writing to cptra_bootfsm_go
193,660 UART:
194,039 UART: Running Caliptra ROM ...
195,141 UART:
195,282 UART: [state] CFI Enabled
263,272 UART: [state] LifecycleState = Unprovisioned
265,183 UART: [state] DebugLocked = No
267,906 UART: [state] WD Timer not started. Device not locked for debugging
271,662 UART: [kat] SHA2-256
450,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,352 UART: [kat] ++
462,794 UART: [kat] sha1
474,585 UART: [kat] SHA2-256
477,654 UART: [kat] SHA2-384
483,966 UART: [kat] SHA2-512-ACC
486,868 UART: [kat] ECC-384
2,947,492 UART: [kat] HMAC-384Kdf
2,973,248 UART: [kat] LMS
3,502,712 UART: [kat] --
3,507,794 UART: [cold-reset] ++
3,510,227 UART: [fht] FHT @ 0x50003400
3,520,564 UART: [idev] ++
3,521,297 UART: [idev] CDI.KEYID = 6
3,522,289 UART: [idev] SUBJECT.KEYID = 7
3,523,396 UART: [idev] UDS.KEYID = 0
3,524,340 ready_for_fw is high
3,524,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,869 UART: [idev] Erasing UDS.KEYID = 0
6,024,842 UART: [idev] Sha1 KeyId Algorithm
6,047,584 UART: [idev] --
6,050,574 UART: [ldev] ++
6,051,149 UART: [ldev] CDI.KEYID = 6
6,052,060 UART: [ldev] SUBJECT.KEYID = 5
6,053,222 UART: [ldev] AUTHORITY.KEYID = 7
6,054,505 UART: [ldev] FE.KEYID = 1
6,100,051 UART: [ldev] Erasing FE.KEYID = 1
8,602,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,038 UART: [ldev] --
10,415,093 UART: [fwproc] Wait for Commands...
10,418,214 UART: [fwproc] Recv command 0x46574c44
10,420,305 UART: [fwproc] Recv'd Img size: 114084 bytes
13,826,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,371 >>> mbox cmd response: success
14,285,880 UART: [afmc] ++
14,286,479 UART: [afmc] CDI.KEYID = 6
14,287,395 UART: [afmc] SUBJECT.KEYID = 7
14,288,606 UART: [afmc] AUTHORITY.KEYID = 5
16,827,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,852 UART: [afmc] --
18,633,252 UART: [cold-reset] --
18,637,323 UART: [state] Locking Datavault
18,641,459 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,150 UART: [state] Locking ICCM
18,644,170 UART: [exit] Launching FMC @ 0x40000130
18,652,571 UART:
18,652,806 UART: Running Caliptra FMC ...
18,653,905 UART:
18,654,064 UART: [state] CFI Enabled
18,712,695 UART: [fht] FMC Alias Private Key: 7
20,476,945 UART: [art] Extend RT PCRs Done
20,478,168 UART: [art] Lock RT PCRs Done
20,480,003 UART: [art] Populate DV Done
20,485,530 UART: [fht] FMC Alias Private Key: 7
20,487,116 UART: [art] Derive CDI
20,487,936 UART: [art] Store in in slot 0x4
20,545,624 UART: [art] Derive Key Pair
20,546,621 UART: [art] Store priv key in slot 0x5
23,009,769 UART: [art] Derive Key Pair - Done
23,022,560 UART: [art] Signing Cert with AUTHO
23,023,863 UART: RITY.KEYID = 7
24,735,598 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,105 UART: [art] PUB.X = 698242DFCD435B62C788F8EA2CF76F40A5A55DCD7B0773474EA62264F889319A5861E26B57C3A6C7F1CF8D3D54C2AD27
24,744,344 UART: [art] PUB.Y = 6F9CC3DD3E79E9DC74B3F06AA2173CFFB84080921F66AF1AD9BE57CBD525BC5146BA24BA015145A9EF925DD33EC47910
24,751,622 UART: [art] SIG.R = ED198DE9AF388482D3FF06D3BE5BFB90925A76E66C1B3183FADC211E5B6D1BA3DF4C854612CA533DAE3C9FD874B905B7
24,759,057 UART: [art] SIG.S = BE42F63E9829EA939E6420349580C49A8DE5394777009DA0B2A2EC1F16A7EA20C94EE5A9069ABFFB40808666C4B57F7A
25,737,658 UART: Caliptra RT
25,738,360 UART: [state] CFI Enabled
25,903,095 UART: [rt] RT listening for mailbox commands...
25,907,136 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,952,255 UART: [rt]cmd =0x4c4d5356, len=1672
26,153,491 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
3,359,958 ready_for_fw is high
3,360,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,034,813 >>> mbox cmd response: success
18,314,391 UART:
18,314,800 UART: Running Caliptra FMC ...
18,315,935 UART:
18,316,091 UART: [state] CFI Enabled
18,385,026 UART: [fht] FMC Alias Private Key: 7
20,149,142 UART: [art] Extend RT PCRs Done
20,150,371 UART: [art] Lock RT PCRs Done
20,152,346 UART: [art] Populate DV Done
20,157,600 UART: [fht] FMC Alias Private Key: 7
20,159,210 UART: [art] Derive CDI
20,159,946 UART: [art] Store in in slot 0x4
20,217,528 UART: [art] Derive Key Pair
20,218,570 UART: [art] Store priv key in slot 0x5
22,681,737 UART: [art] Derive Key Pair - Done
22,694,733 UART: [art] Signing Cert with AUTHO
22,696,035 UART: RITY.KEYID = 7
24,407,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,409,200 UART: [art] PUB.X = 8A8E0507CE91E0C53AE56E4362E7B9C29F9C2C7987CC927B3C61B690E14AFF4F7BB148757466E5827DA3200C4B805319
24,416,468 UART: [art] PUB.Y = 406EB29FA500E1E132E39495A024A88E26D8500BF0DBFE308502FC26257705C89846D78ABEED4B3780B0DA97910B1096
24,423,695 UART: [art] SIG.R = EC2E8CDD8B9F7D09A93C5CD54DFB76B65E21BC1992B10A9A376841AB053E78839C19A17B0132DB88E145A7CCE4DD201A
24,431,128 UART: [art] SIG.S = DACF1A878229D2A95FCE78AB33F3486904C494DB66489261D723BBC6ADBFC0139A0C981E4996832F53496FB117A66C9A
25,410,562 UART: Caliptra RT
25,411,264 UART: [state] CFI Enabled
25,575,906 UART: [rt] RT listening for mailbox commands...
25,580,005 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,625,001 UART: [rt]cmd =0x4c4d5356, len=1672
25,826,249 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
193,039 UART:
193,413 UART: Running Caliptra ROM ...
194,612 UART:
604,400 UART: [state] CFI Enabled
622,335 UART: [state] LifecycleState = Unprovisioned
624,247 UART: [state] DebugLocked = No
626,000 UART: [state] WD Timer not started. Device not locked for debugging
629,700 UART: [kat] SHA2-256
808,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,391 UART: [kat] ++
820,928 UART: [kat] sha1
831,901 UART: [kat] SHA2-256
834,917 UART: [kat] SHA2-384
840,124 UART: [kat] SHA2-512-ACC
843,059 UART: [kat] ECC-384
3,284,997 UART: [kat] HMAC-384Kdf
3,296,530 UART: [kat] LMS
3,826,023 UART: [kat] --
3,831,042 UART: [cold-reset] ++
3,831,918 UART: [fht] FHT @ 0x50003400
3,843,252 UART: [idev] ++
3,843,826 UART: [idev] CDI.KEYID = 6
3,844,865 UART: [idev] SUBJECT.KEYID = 7
3,845,971 UART: [idev] UDS.KEYID = 0
3,846,908 ready_for_fw is high
3,847,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,373 UART: [idev] Erasing UDS.KEYID = 0
6,321,754 UART: [idev] Sha1 KeyId Algorithm
6,344,982 UART: [idev] --
6,348,819 UART: [ldev] ++
6,349,397 UART: [ldev] CDI.KEYID = 6
6,350,311 UART: [ldev] SUBJECT.KEYID = 5
6,351,471 UART: [ldev] AUTHORITY.KEYID = 7
6,352,705 UART: [ldev] FE.KEYID = 1
6,363,728 UART: [ldev] Erasing FE.KEYID = 1
8,834,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,996 UART: [ldev] --
10,622,984 UART: [fwproc] Wait for Commands...
10,625,822 UART: [fwproc] Recv command 0x46574c44
10,627,939 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,485,085 >>> mbox cmd response: success
14,489,424 UART: [afmc] ++
14,490,021 UART: [afmc] CDI.KEYID = 6
14,490,940 UART: [afmc] SUBJECT.KEYID = 7
14,492,104 UART: [afmc] AUTHORITY.KEYID = 5
16,992,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,302 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,565 UART: [afmc] --
18,789,087 UART: [cold-reset] --
18,793,668 UART: [state] Locking Datavault
18,799,190 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,850 UART: [state] Locking ICCM
18,803,168 UART: [exit] Launching FMC @ 0x40000130
18,811,569 UART:
18,811,810 UART: Running Caliptra FMC ...
18,812,920 UART:
18,813,076 UART: [state] CFI Enabled
18,821,178 UART: [fht] FMC Alias Private Key: 7
20,578,133 UART: [art] Extend RT PCRs Done
20,579,357 UART: [art] Lock RT PCRs Done
20,580,956 UART: [art] Populate DV Done
20,586,637 UART: [fht] FMC Alias Private Key: 7
20,588,288 UART: [art] Derive CDI
20,589,104 UART: [art] Store in in slot 0x4
20,631,998 UART: [art] Derive Key Pair
20,633,038 UART: [art] Store priv key in slot 0x5
23,059,843 UART: [art] Derive Key Pair - Done
23,072,679 UART: [art] Signing Cert with AUTHO
23,073,986 UART: RITY.KEYID = 7
24,778,802 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,317 UART: [art] PUB.X = 2106BEE60BD6A4BADEBD564011638375A8D22136A1DECF1205497FF9E0CDFD56FAAE670BD1B8CDEDEE63C114D1C2C7FD
24,787,605 UART: [art] PUB.Y = 9D0661F217B47AEB132F45225D0D92C2257511BCEDCBC7F2E09D5A454EAD730D652EBC8E8C3E662BC95351CCC54381D4
24,794,884 UART: [art] SIG.R = 416A5D4E143FB5D8CE113846D1A3898D4A48AE8CD75A7DD5BFBEA44856080AB5EA5AE2678F484624870568959F861B4D
24,802,263 UART: [art] SIG.S = 90E3C9249018252C79A69BF8E7F724BE2AB84B884F3E553C0422E233D138A05E6BF184E9A3489DADCA265CA2C4DA9F21
25,780,888 UART: Caliptra RT
25,781,583 UART: [state] CFI Enabled
25,898,918 UART: [rt] RT listening for mailbox commands...
25,903,046 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,947,305 UART: [rt]cmd =0x4c4d5356, len=1672
26,148,515 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,684 writing to cptra_bootfsm_go
3,700,423 ready_for_fw is high
3,700,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,283,657 >>> mbox cmd response: success
18,533,295 UART:
18,533,691 UART: Running Caliptra FMC ...
18,534,857 UART:
18,535,023 UART: [state] CFI Enabled
18,542,808 UART: [fht] FMC Alias Private Key: 7
20,299,558 UART: [art] Extend RT PCRs Done
20,300,778 UART: [art] Lock RT PCRs Done
20,302,366 UART: [art] Populate DV Done
20,307,668 UART: [fht] FMC Alias Private Key: 7
20,309,270 UART: [art] Derive CDI
20,310,088 UART: [art] Store in in slot 0x4
20,352,430 UART: [art] Derive Key Pair
20,353,497 UART: [art] Store priv key in slot 0x5
22,780,040 UART: [art] Derive Key Pair - Done
22,793,096 UART: [art] Signing Cert with AUTHO
22,794,441 UART: RITY.KEYID = 7
24,499,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,304 UART: [art] PUB.X = F39F018B5DB6C25B0F38F1EAB85924A5A0EB28EBA0BF84762D9F0DE97E6AC6F7C05F16D12DF3FC3C945BC46E307C5E76
24,508,654 UART: [art] PUB.Y = 2F23BAEE1CACCE426CD9BD8B45F7D9FACA3870782AFE7B2690051829C48FD833C6262AC3F154EEC2E5D2B63AC9821DFD
24,515,880 UART: [art] SIG.R = 0E4F283E7787CBFBBB3DEE60B5B84774BE380BD5ADA77B81822AE6C63F548BFF9DAC764489D153F49D11CD7D6CCA46F7
24,523,310 UART: [art] SIG.S = DDCBD59979083B4D435F7630B78C2B3E08FA1BF24F2EE328A76A3FF5AF3822CD07658D76434BB33B97745D4947E6CDAE
25,502,035 UART: Caliptra RT
25,502,765 UART: [state] CFI Enabled
25,620,393 UART: [rt] RT listening for mailbox commands...
25,624,405 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,669,015 UART: [rt]cmd =0x4c4d5356, len=1672
25,870,019 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,333 UART:
192,714 UART: Running Caliptra ROM ...
193,861 UART:
194,005 UART: [state] CFI Enabled
261,253 UART: [state] LifecycleState = Unprovisioned
263,695 UART: [state] DebugLocked = No
266,580 UART: [state] WD Timer not started. Device not locked for debugging
271,123 UART: [kat] SHA2-256
460,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,818 UART: [kat] ++
472,293 UART: [kat] sha1
482,217 UART: [kat] SHA2-256
485,227 UART: [kat] SHA2-384
491,285 UART: [kat] SHA2-512-ACC
493,873 UART: [kat] ECC-384
2,947,497 UART: [kat] HMAC-384Kdf
2,970,750 UART: [kat] LMS
3,502,511 UART: [kat] --
3,506,528 UART: [cold-reset] ++
3,508,878 UART: [fht] FHT @ 0x50003400
3,520,493 UART: [idev] ++
3,521,144 UART: [idev] CDI.KEYID = 6
3,522,099 UART: [idev] SUBJECT.KEYID = 7
3,523,273 UART: [idev] UDS.KEYID = 0
3,524,173 ready_for_fw is high
3,524,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,851 UART: [idev] Erasing UDS.KEYID = 0
6,026,379 UART: [idev] Sha1 KeyId Algorithm
6,050,115 UART: [idev] --
6,054,630 UART: [ldev] ++
6,055,322 UART: [ldev] CDI.KEYID = 6
6,056,247 UART: [ldev] SUBJECT.KEYID = 5
6,057,427 UART: [ldev] AUTHORITY.KEYID = 7
6,058,656 UART: [ldev] FE.KEYID = 1
6,099,437 UART: [ldev] Erasing FE.KEYID = 1
8,607,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,197 UART: [ldev] --
10,416,624 UART: [fwproc] Wait for Commands...
10,418,174 UART: [fwproc] Recv command 0x46574c44
10,420,421 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,655 >>> mbox cmd response: success
14,603,321 UART: [afmc] ++
14,604,036 UART: [afmc] CDI.KEYID = 6
14,605,156 UART: [afmc] SUBJECT.KEYID = 7
14,606,706 UART: [afmc] AUTHORITY.KEYID = 5
17,147,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,944 UART: [afmc] --
18,949,122 UART: [cold-reset] --
18,952,293 UART: [state] Locking Datavault
18,956,482 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,637 UART: [state] Locking ICCM
18,961,492 UART: [exit] Launching FMC @ 0x40000130
18,970,191 UART:
18,970,422 UART: Running Caliptra FMC ...
18,971,519 UART:
18,971,673 UART: [state] CFI Enabled
19,032,144 UART: [fht] FMC Alias Private Key: 7
20,796,381 UART: [art] Extend RT PCRs Done
20,797,602 UART: [art] Lock RT PCRs Done
20,799,419 UART: [art] Populate DV Done
20,804,552 UART: [fht] FMC Alias Private Key: 7
20,806,192 UART: [art] Derive CDI
20,806,928 UART: [art] Store in in slot 0x4
20,865,050 UART: [art] Derive Key Pair
20,866,087 UART: [art] Store priv key in slot 0x5
23,329,126 UART: [art] Derive Key Pair - Done
23,342,062 UART: [art] Signing Cert with AUTHO
23,343,360 UART: RITY.KEYID = 7
25,055,634 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,143 UART: [art] PUB.X = 397B7C70DE20A632ADD69733ECCDC7728EA0330CEA2365E064DC36B5D53CDADEF2FB16D79F8C1DD9A096FC58C3DC3169
25,064,401 UART: [art] PUB.Y = F3C35E70FB1BFA6739A3BA1CBB960CB3B5890313ABB4DB719FC6B460A862DEE7F32CEDA962539F8E13DB7968D6E6080E
25,071,715 UART: [art] SIG.R = FB5904C215B7C49126273F8FEE3EF6F8DAECDB159132D9B79452FAE08B65921803B2B2B329535E302D7B94B9A8C30E42
25,079,089 UART: [art] SIG.S = 7F5300D9FA3B957FE60FB99C5B5919C8A86FF26AE4DCAB22B47B3B79F83F3588CFEF95903FF5CBF85295A386D0BEF652
26,058,367 UART: Caliptra RT
26,059,060 UART: [state] CFI Enabled
26,223,669 UART: [rt] RT listening for mailbox commands...
26,227,666 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,272,554 UART: [rt]cmd =0x4c4d5356, len=1672
26,474,009 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
3,437,389 ready_for_fw is high
3,437,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,751,742 >>> mbox cmd response: success
19,048,845 UART:
19,049,246 UART: Running Caliptra FMC ...
19,050,471 UART:
19,050,637 UART: [state] CFI Enabled
19,114,479 UART: [fht] FMC Alias Private Key: 7
20,878,419 UART: [art] Extend RT PCRs Done
20,879,634 UART: [art] Lock RT PCRs Done
20,881,531 UART: [art] Populate DV Done
20,887,102 UART: [fht] FMC Alias Private Key: 7
20,888,642 UART: [art] Derive CDI
20,889,452 UART: [art] Store in in slot 0x4
20,946,604 UART: [art] Derive Key Pair
20,947,596 UART: [art] Store priv key in slot 0x5
23,410,683 UART: [art] Derive Key Pair - Done
23,423,748 UART: [art] Signing Cert with AUTHO
23,425,046 UART: RITY.KEYID = 7
25,137,035 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,545 UART: [art] PUB.X = 3B4EA8E2533FED09650177ABC6443ED2CBB646EAA193A0745590E100C7BED00A903132DE35E3668915B2787D3B176109
25,145,807 UART: [art] PUB.Y = C69E4CD3CA686ED50529108D61A63A63D4FE421EBD59E50A64DEDCC1DCA62B38A9ADCA21FB1445C8B26B54ADFA821DF9
25,153,087 UART: [art] SIG.R = 0EDA5B0CC633BB43CE876E05B8F7330779C3FA6D2B568657BE07DA3C9241BA986DFEA0F3D6FB30F36F8DB77CF638A5C9
25,160,526 UART: [art] SIG.S = E5CA05A355D25B6E566F78AC147EDF1A6925709D1C60EB8216414592667E2580F97E3BBE4A8CF95DD8B4AFB0CA5D0359
26,140,017 UART: Caliptra RT
26,140,704 UART: [state] CFI Enabled
26,305,659 UART: [rt] RT listening for mailbox commands...
26,309,631 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,354,697 UART: [rt]cmd =0x4c4d5356, len=1672
26,555,917 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,670 writing to cptra_bootfsm_go
192,905 UART:
193,289 UART: Running Caliptra ROM ...
194,519 UART:
603,965 UART: [state] CFI Enabled
618,757 UART: [state] LifecycleState = Unprovisioned
621,128 UART: [state] DebugLocked = No
624,009 UART: [state] WD Timer not started. Device not locked for debugging
629,399 UART: [kat] SHA2-256
819,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,062 UART: [kat] ++
830,730 UART: [kat] sha1
842,254 UART: [kat] SHA2-256
845,272 UART: [kat] SHA2-384
850,831 UART: [kat] SHA2-512-ACC
853,417 UART: [kat] ECC-384
3,293,934 UART: [kat] HMAC-384Kdf
3,306,117 UART: [kat] LMS
3,837,918 UART: [kat] --
3,843,872 UART: [cold-reset] ++
3,846,165 UART: [fht] FHT @ 0x50003400
3,856,926 UART: [idev] ++
3,857,628 UART: [idev] CDI.KEYID = 6
3,858,577 UART: [idev] SUBJECT.KEYID = 7
3,859,745 UART: [idev] UDS.KEYID = 0
3,860,666 ready_for_fw is high
3,860,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,120 UART: [idev] Erasing UDS.KEYID = 0
6,337,689 UART: [idev] Sha1 KeyId Algorithm
6,360,792 UART: [idev] --
6,365,196 UART: [ldev] ++
6,365,936 UART: [ldev] CDI.KEYID = 6
6,366,849 UART: [ldev] SUBJECT.KEYID = 5
6,367,945 UART: [ldev] AUTHORITY.KEYID = 7
6,369,228 UART: [ldev] FE.KEYID = 1
6,379,026 UART: [ldev] Erasing FE.KEYID = 1
8,855,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,148 UART: [ldev] --
10,648,037 UART: [fwproc] Wait for Commands...
10,650,240 UART: [fwproc] Recv command 0x46574c44
10,652,500 UART: [fwproc] Recv'd Img size: 114084 bytes
14,103,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,841,561 >>> mbox cmd response: success
14,845,015 UART: [afmc] ++
14,845,727 UART: [afmc] CDI.KEYID = 6
14,846,939 UART: [afmc] SUBJECT.KEYID = 7
14,848,382 UART: [afmc] AUTHORITY.KEYID = 5
17,352,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,023 UART: [afmc] --
19,148,143 UART: [cold-reset] --
19,151,747 UART: [state] Locking Datavault
19,155,163 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,322 UART: [state] Locking ICCM
19,159,048 UART: [exit] Launching FMC @ 0x40000130
19,167,735 UART:
19,167,972 UART: Running Caliptra FMC ...
19,169,094 UART:
19,169,260 UART: [state] CFI Enabled
19,177,363 UART: [fht] FMC Alias Private Key: 7
20,933,778 UART: [art] Extend RT PCRs Done
20,934,997 UART: [art] Lock RT PCRs Done
20,936,974 UART: [art] Populate DV Done
20,942,388 UART: [fht] FMC Alias Private Key: 7
20,943,936 UART: [art] Derive CDI
20,944,671 UART: [art] Store in in slot 0x4
20,987,640 UART: [art] Derive Key Pair
20,988,639 UART: [art] Store priv key in slot 0x5
23,415,415 UART: [art] Derive Key Pair - Done
23,428,091 UART: [art] Signing Cert with AUTHO
23,429,398 UART: RITY.KEYID = 7
25,135,094 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,602 UART: [art] PUB.X = 0A4A3E3B067272E89C93218F78310AEF1DA9C98F21BA8E4988EBD9252983BC7C0CAD1CB82B35315A482FD421DE1D0B2D
25,143,895 UART: [art] PUB.Y = 2179BE2CFC2451793EE7B81619A7AE489CCFE6FD7855977C60CE583FCA542C7B4ACA687CBEBA381DEC414C0766BF1EB7
25,151,124 UART: [art] SIG.R = E5C41E186813D5E7CCF29A5555C6DAA66898DAB8FFF82B7AD402C7C3DF9CCE8F0EAD6F7DE847D121FF53CC5A8D11894F
25,158,566 UART: [art] SIG.S = B20B5E539F03146CA19B689A54B97A03B4E466C80319B79838C176B292168FFDCF026C54874DC27CEEC1BF43F0038665
26,136,898 UART: Caliptra RT
26,137,580 UART: [state] CFI Enabled
26,253,983 UART: [rt] RT listening for mailbox commands...
26,258,048 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,302,576 UART: [rt]cmd =0x4c4d5356, len=1672
26,503,705 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,760,372 ready_for_fw is high
3,760,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,965,353 >>> mbox cmd response: success
19,221,781 UART:
19,222,187 UART: Running Caliptra FMC ...
19,223,330 UART:
19,223,497 UART: [state] CFI Enabled
19,231,861 UART: [fht] FMC Alias Private Key: 7
20,989,086 UART: [art] Extend RT PCRs Done
20,990,327 UART: [art] Lock RT PCRs Done
20,991,878 UART: [art] Populate DV Done
20,997,419 UART: [fht] FMC Alias Private Key: 7
20,999,108 UART: [art] Derive CDI
20,999,853 UART: [art] Store in in slot 0x4
21,042,182 UART: [art] Derive Key Pair
21,043,197 UART: [art] Store priv key in slot 0x5
23,469,748 UART: [art] Derive Key Pair - Done
23,482,842 UART: [art] Signing Cert with AUTHO
23,484,177 UART: RITY.KEYID = 7
25,189,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,310 UART: [art] PUB.X = 526E39E569FF815DE05F8EE5A60506CC565D3F34C40D155CA8A93882797F89349E40F467710A1C4365BC00D1EF86A81D
25,198,557 UART: [art] PUB.Y = 087D5107D1826F6A17CF6EACBBA83E212FD3AC7DF44A0DDFE83478F350CFE52B72B5637A52A09AFE092881670A8326F6
25,205,797 UART: [art] SIG.R = F7EB9AE32046168406C71020EFDEE560136B9F0EC22DE5F7BA27E7430C0267A2B66A61FFF414E2137C993D81FDE7AAE2
25,213,208 UART: [art] SIG.S = E8F5721D2A63E98EF06A9354FAD22AFC78116B08F5D48AA68D25699EC83FC9315227511C0C12DFC3B605BA63937642A7
26,192,041 UART: Caliptra RT
26,192,755 UART: [state] CFI Enabled
26,310,721 UART: [rt] RT listening for mailbox commands...
26,314,640 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,359,300 UART: [rt]cmd =0x4c4d5356, len=1672
26,560,384 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,441 UART: [kat] SHA2-256
882,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,487 UART: [kat] ++
886,639 UART: [kat] sha1
890,913 UART: [kat] SHA2-256
892,851 UART: [kat] SHA2-384
895,616 UART: [kat] SHA2-512-ACC
897,517 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,462 UART: [kat] LMS
1,475,658 UART: [kat] --
1,476,585 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,480,018 UART: [idev] ++
1,480,186 UART: [idev] CDI.KEYID = 6
1,480,546 UART: [idev] SUBJECT.KEYID = 7
1,480,970 UART: [idev] UDS.KEYID = 0
1,481,315 ready_for_fw is high
1,481,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,599 UART: [ldev] ++
1,514,767 UART: [ldev] CDI.KEYID = 6
1,515,130 UART: [ldev] SUBJECT.KEYID = 5
1,515,556 UART: [ldev] AUTHORITY.KEYID = 7
1,516,019 UART: [ldev] FE.KEYID = 1
1,521,235 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,251 UART: [fwproc] Waiting for Commands...
1,586,072 UART: [fwproc] Received command 0x46574c44
1,586,863 UART: [fwproc] Received Image of size 114084 bytes
2,881,757 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,554 >>> mbox cmd response: success
3,073,740 UART: [afmc] ++
3,073,908 UART: [afmc] CDI.KEYID = 6
3,074,270 UART: [afmc] SUBJECT.KEYID = 7
3,074,695 UART: [afmc] AUTHORITY.KEYID = 5
3,108,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,120 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,125,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,131,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,137,513 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,203 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,150,864 UART: [afmc] --
3,151,948 UART: [cold-reset] --
3,152,984 UART: [state] Locking Datavault
3,154,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,154,959 UART: [state] Locking ICCM
3,155,425 UART: [exit] Launching FMC @ 0x40000130
3,160,754 UART:
3,160,770 UART: Running Caliptra FMC ...
3,161,178 UART:
3,161,232 UART: [state] CFI Enabled
3,171,557 UART: [fht] FMC Alias Private Key: 7
3,279,862 UART: [art] Extend RT PCRs Done
3,280,290 UART: [art] Lock RT PCRs Done
3,281,602 UART: [art] Populate DV Done
3,289,963 UART: [fht] FMC Alias Private Key: 7
3,291,083 UART: [art] Derive CDI
3,291,363 UART: [art] Store in in slot 0x4
3,377,022 UART: [art] Derive Key Pair
3,377,382 UART: [art] Store priv key in slot 0x5
3,391,048 UART: [art] Derive Key Pair - Done
3,405,686 UART: [art] Signing Cert with AUTHO
3,406,166 UART: RITY.KEYID = 7
3,421,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,103 UART: [art] PUB.X = 486D1F098CCB756CDC21987EF3A31D42633E4EDB71BAF91651FD70A562A413E60DE032013E578B3D116DE7E290CBAF51
3,428,874 UART: [art] PUB.Y = 3FB3C86FF7EE56A71965B44B94CA2D01AC917B5B02DD38E24F5FDB17B469D248216C9F97650B21351B5DA7177A75193E
3,435,821 UART: [art] SIG.R = 5328D5C6EEF5A99BAEB2F22CDCE1047F30F401E272C5EEC3C8539BE2A884322CCDC41C1EBF359BE6A86115993AFB4BA3
3,442,607 UART: [art] SIG.S = D03DF8C7F0E5CB391F1A9F99A484BB975CFC16B103B0FCDBE55F4489EA39A4227B52FAAD2BB4CA2B2E2B45741F83ED5E
3,466,367 UART: Caliptra RT
3,466,620 UART: [state] CFI Enabled
3,574,321 UART: [rt] RT listening for mailbox commands...
3,574,991 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,615,701 UART: [rt]cmd =0x4c4d5356, len=1672
3,868,324 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,355 ready_for_fw is high
1,363,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,872 >>> mbox cmd response: success
2,985,674 UART:
2,985,690 UART: Running Caliptra FMC ...
2,986,098 UART:
2,986,152 UART: [state] CFI Enabled
2,996,401 UART: [fht] FMC Alias Private Key: 7
3,104,170 UART: [art] Extend RT PCRs Done
3,104,598 UART: [art] Lock RT PCRs Done
3,105,956 UART: [art] Populate DV Done
3,114,127 UART: [fht] FMC Alias Private Key: 7
3,115,273 UART: [art] Derive CDI
3,115,553 UART: [art] Store in in slot 0x4
3,201,196 UART: [art] Derive Key Pair
3,201,556 UART: [art] Store priv key in slot 0x5
3,214,496 UART: [art] Derive Key Pair - Done
3,229,490 UART: [art] Signing Cert with AUTHO
3,229,970 UART: RITY.KEYID = 7
3,245,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,021 UART: [art] PUB.X = CE4EAA1AA6D29F5BBBCC93A9D0F4F7AFAF365613DACC151BC067D9DEDBD256A8D95362720E1A5A93F326CAEA742D522B
3,252,818 UART: [art] PUB.Y = F2C8537604B94D28ACAEBD54BA319794CF7F0C278081CDE0517DE92324BCB9F495D137B4E5DF3C512EFF2025709FA9BA
3,259,776 UART: [art] SIG.R = 3692F035AC4F217255D50C12C8F61C2A3FE2AECCFAF9592A49BD5A8F239E0F742B58DE53DFF6928A977790BFA0202070
3,266,550 UART: [art] SIG.S = 1F6972505DE3BEE690DDAB645EB1BBDE080189C20DC6F387E83D2EF791E1F65E286719604739EC0FC55C46469BC03CBE
3,290,063 UART: Caliptra RT
3,290,316 UART: [state] CFI Enabled
3,398,128 UART: [rt] RT listening for mailbox commands...
3,398,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,302 UART: [rt]cmd =0x4c4d5356, len=1672
3,691,873 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,538 UART: [kat] SHA2-256
882,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,584 UART: [kat] ++
886,736 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,345 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,224 UART: [cold-reset] ++
1,477,576 UART: [fht] Storing FHT @ 0x50003400
1,480,491 UART: [idev] ++
1,480,659 UART: [idev] CDI.KEYID = 6
1,481,019 UART: [idev] SUBJECT.KEYID = 7
1,481,443 UART: [idev] UDS.KEYID = 0
1,481,788 ready_for_fw is high
1,481,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,501 UART: [idev] Erasing UDS.KEYID = 0
1,506,541 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,057 UART: [idev] --
1,516,188 UART: [ldev] ++
1,516,356 UART: [ldev] CDI.KEYID = 6
1,516,719 UART: [ldev] SUBJECT.KEYID = 5
1,517,145 UART: [ldev] AUTHORITY.KEYID = 7
1,517,608 UART: [ldev] FE.KEYID = 1
1,522,858 UART: [ldev] Erasing FE.KEYID = 1
1,547,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,225 UART: [ldev] --
1,587,630 UART: [fwproc] Waiting for Commands...
1,588,461 UART: [fwproc] Received command 0x46574c44
1,589,252 UART: [fwproc] Received Image of size 114084 bytes
2,884,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,373 >>> mbox cmd response: success
3,078,407 UART: [afmc] ++
3,078,575 UART: [afmc] CDI.KEYID = 6
3,078,937 UART: [afmc] SUBJECT.KEYID = 7
3,079,362 UART: [afmc] AUTHORITY.KEYID = 5
3,113,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,910 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,600 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,669 UART: [afmc] --
3,156,765 UART: [cold-reset] --
3,157,735 UART: [state] Locking Datavault
3,158,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,416 UART: [state] Locking ICCM
3,159,938 UART: [exit] Launching FMC @ 0x40000130
3,165,267 UART:
3,165,283 UART: Running Caliptra FMC ...
3,165,691 UART:
3,165,834 UART: [state] CFI Enabled
3,176,495 UART: [fht] FMC Alias Private Key: 7
3,284,462 UART: [art] Extend RT PCRs Done
3,284,890 UART: [art] Lock RT PCRs Done
3,286,294 UART: [art] Populate DV Done
3,294,521 UART: [fht] FMC Alias Private Key: 7
3,295,583 UART: [art] Derive CDI
3,295,863 UART: [art] Store in in slot 0x4
3,381,720 UART: [art] Derive Key Pair
3,382,080 UART: [art] Store priv key in slot 0x5
3,395,976 UART: [art] Derive Key Pair - Done
3,411,035 UART: [art] Signing Cert with AUTHO
3,411,515 UART: RITY.KEYID = 7
3,426,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,092 UART: [art] PUB.X = B988515B63AE8D7F0AEB3A678B003A21FC0E829B9EEC9768DC2FF7A7A48D4C4F43C533C4E0A305882123071BA445A23A
3,433,838 UART: [art] PUB.Y = 096D0ED05D3F3EEA13C17BB5FE58A9FF28FA09F2F630A99DC20B51C90DCFF56B87F04A098C805F62C21E96900567FF89
3,440,781 UART: [art] SIG.R = A01BCD09EAF7521966C109C537E0AD233E242FB3F9DA4F7A02AF9129CD9242167AB31AAB55B1985BEB2E98DE2EC6DAAE
3,447,564 UART: [art] SIG.S = AEF659A6F4B361E13F69390DEA1BB302F1E9F31890C70091F1D973DB4B62994D465CD04734A5C69650FDDB149C2A4647
3,471,511 UART: Caliptra RT
3,471,856 UART: [state] CFI Enabled
3,579,936 UART: [rt] RT listening for mailbox commands...
3,580,606 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,088 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,817 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,268 ready_for_fw is high
1,363,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,831 >>> mbox cmd response: success
2,986,757 UART:
2,986,773 UART: Running Caliptra FMC ...
2,987,181 UART:
2,987,324 UART: [state] CFI Enabled
2,998,499 UART: [fht] FMC Alias Private Key: 7
3,106,526 UART: [art] Extend RT PCRs Done
3,106,954 UART: [art] Lock RT PCRs Done
3,108,524 UART: [art] Populate DV Done
3,116,821 UART: [fht] FMC Alias Private Key: 7
3,117,869 UART: [art] Derive CDI
3,118,149 UART: [art] Store in in slot 0x4
3,203,166 UART: [art] Derive Key Pair
3,203,526 UART: [art] Store priv key in slot 0x5
3,216,568 UART: [art] Derive Key Pair - Done
3,231,467 UART: [art] Signing Cert with AUTHO
3,231,947 UART: RITY.KEYID = 7
3,247,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,998 UART: [art] PUB.X = 81B7DA4D6E531170BB41DFA8CEBBF7DD8E7E091E639DD6BA8E2D479F8A9AA4451CF621C1D6C3772E23F5B77BB7B4A012
3,254,787 UART: [art] PUB.Y = A94121FB83F4F48D168D508F5709A6AD3C1DAC633BB44E86AF7999EBEE9308908872B6BFA6A9EABE62F8D8C7F403245F
3,261,742 UART: [art] SIG.R = 8DAFEC79437191837F7874FC6AFB1D92ED7385786AF8E404427500C5F22F916FDA87C61F67337B1CB862FB9C7AAEC3D7
3,268,497 UART: [art] SIG.S = EB6B3B96476FFD743B540FE5DF426D88735DBD3831BAB7509179D9443B9FB2C3417BF5B1350D3C9BDFF80061F49A6522
3,292,402 UART: Caliptra RT
3,292,747 UART: [state] CFI Enabled
3,401,459 UART: [rt] RT listening for mailbox commands...
3,402,129 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,113 UART: [rt]cmd =0x4c4d5356, len=1672
3,695,434 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
902,147 UART: [kat] SHA2-256
904,087 UART: [kat] SHA2-384
906,974 UART: [kat] SHA2-512-ACC
908,875 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,494 UART: [kat] LMS
1,171,822 UART: [kat] --
1,172,785 UART: [cold-reset] ++
1,173,247 UART: [fht] FHT @ 0x50003400
1,176,050 UART: [idev] ++
1,176,218 UART: [idev] CDI.KEYID = 6
1,176,578 UART: [idev] SUBJECT.KEYID = 7
1,177,002 UART: [idev] UDS.KEYID = 0
1,177,347 ready_for_fw is high
1,177,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,974 UART: [idev] Erasing UDS.KEYID = 0
1,201,651 UART: [idev] Sha1 KeyId Algorithm
1,210,271 UART: [idev] --
1,211,413 UART: [ldev] ++
1,211,581 UART: [ldev] CDI.KEYID = 6
1,211,944 UART: [ldev] SUBJECT.KEYID = 5
1,212,370 UART: [ldev] AUTHORITY.KEYID = 7
1,212,833 UART: [ldev] FE.KEYID = 1
1,218,031 UART: [ldev] Erasing FE.KEYID = 1
1,244,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,981 UART: [ldev] --
1,283,424 UART: [fwproc] Wait for Commands...
1,284,232 UART: [fwproc] Recv command 0x46574c44
1,284,960 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,588 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,957 >>> mbox cmd response: success
2,773,031 UART: [afmc] ++
2,773,199 UART: [afmc] CDI.KEYID = 6
2,773,561 UART: [afmc] SUBJECT.KEYID = 7
2,773,986 UART: [afmc] AUTHORITY.KEYID = 5
2,808,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,880 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,048 UART: [afmc] --
2,852,034 UART: [cold-reset] --
2,852,866 UART: [state] Locking Datavault
2,854,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,691 UART: [state] Locking ICCM
2,855,263 UART: [exit] Launching FMC @ 0x40000130
2,860,592 UART:
2,860,608 UART: Running Caliptra FMC ...
2,861,016 UART:
2,861,070 UART: [state] CFI Enabled
2,871,193 UART: [fht] FMC Alias Private Key: 7
2,978,986 UART: [art] Extend RT PCRs Done
2,979,414 UART: [art] Lock RT PCRs Done
2,981,212 UART: [art] Populate DV Done
2,989,491 UART: [fht] FMC Alias Private Key: 7
2,990,453 UART: [art] Derive CDI
2,990,733 UART: [art] Store in in slot 0x4
3,076,152 UART: [art] Derive Key Pair
3,076,512 UART: [art] Store priv key in slot 0x5
3,089,950 UART: [art] Derive Key Pair - Done
3,104,768 UART: [art] Signing Cert with AUTHO
3,105,248 UART: RITY.KEYID = 7
3,120,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,103 UART: [art] PUB.X = 697FC74C675EE5937FCEA97C73FDC5CF7BC201E7AC11CAA9A9EDE892D9002CD0D872301E62C149010454814F690ED01E
3,127,851 UART: [art] PUB.Y = FC836BE8C771947366FA39C051640742D99204B5508294776C76E2BDDA629C135BFDF7267C5DCC42BF63DFCCF23CE195
3,134,801 UART: [art] SIG.R = 945A840721DF4734CAB541EFDA1DE2A93D4A2FE7380969960366949F402798CD86F4E9538C6D1AA555A4674BA5541F36
3,141,560 UART: [art] SIG.S = FEC72F8FB839C3951909F511A777AD7C1F75E260E7DEB0243E2C3E306FEC45ACFB846AD926464BE52BF85AF519C5E421
3,165,202 UART: Caliptra RT
3,165,455 UART: [state] CFI Enabled
3,274,407 UART: [rt] RT listening for mailbox commands...
3,275,077 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,769 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,316 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 ready_for_fw is high
1,059,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,222 >>> mbox cmd response: success
2,685,942 UART:
2,685,958 UART: Running Caliptra FMC ...
2,686,366 UART:
2,686,420 UART: [state] CFI Enabled
2,696,691 UART: [fht] FMC Alias Private Key: 7
2,804,402 UART: [art] Extend RT PCRs Done
2,804,830 UART: [art] Lock RT PCRs Done
2,806,364 UART: [art] Populate DV Done
2,814,603 UART: [fht] FMC Alias Private Key: 7
2,815,659 UART: [art] Derive CDI
2,815,939 UART: [art] Store in in slot 0x4
2,901,712 UART: [art] Derive Key Pair
2,902,072 UART: [art] Store priv key in slot 0x5
2,915,314 UART: [art] Derive Key Pair - Done
2,930,032 UART: [art] Signing Cert with AUTHO
2,930,512 UART: RITY.KEYID = 7
2,945,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,645 UART: [art] PUB.X = 6779E11FE3931FF13DD89205CAE8F5FBF5D85DB1F492DC5FA52FDDDA2AF57E7D5339A05411060C9EE8D3CB49A2E2AEEB
2,953,432 UART: [art] PUB.Y = 92A45AB4E5875DF286C6EA9BF49C51C9CC31B550B3656133AC82A117EE69E6FF6FAECA0B1474086F0BAEE8B7FAA95E3C
2,960,395 UART: [art] SIG.R = 6357D829F5A56B8230884E1A0DB21A3A42C0A63C13A3E64028FCA99571454004BC9B0C7701317B4323B101AE91566535
2,967,140 UART: [art] SIG.S = F1288855B4674BBDDD56BAA6C6C771AC90079C04EE563688CC668A8810C1E16CCC9C9DDA584FA46DBCC2AC3E24EE86AE
2,991,467 UART: Caliptra RT
2,991,720 UART: [state] CFI Enabled
3,098,169 UART: [rt] RT listening for mailbox commands...
3,098,839 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,569 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,980 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,824 UART: [kat] SHA2-256
903,764 UART: [kat] SHA2-384
906,329 UART: [kat] SHA2-512-ACC
908,230 UART: [kat] ECC-384
918,041 UART: [kat] HMAC-384Kdf
922,535 UART: [kat] LMS
1,170,863 UART: [kat] --
1,171,660 UART: [cold-reset] ++
1,171,994 UART: [fht] FHT @ 0x50003400
1,174,603 UART: [idev] ++
1,174,771 UART: [idev] CDI.KEYID = 6
1,175,131 UART: [idev] SUBJECT.KEYID = 7
1,175,555 UART: [idev] UDS.KEYID = 0
1,175,900 ready_for_fw is high
1,175,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,040 UART: [idev] Sha1 KeyId Algorithm
1,209,456 UART: [idev] --
1,210,686 UART: [ldev] ++
1,210,854 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,643 UART: [ldev] AUTHORITY.KEYID = 7
1,212,106 UART: [ldev] FE.KEYID = 1
1,217,450 UART: [ldev] Erasing FE.KEYID = 1
1,244,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,828 UART: [ldev] --
1,283,143 UART: [fwproc] Wait for Commands...
1,283,955 UART: [fwproc] Recv command 0x46574c44
1,284,683 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,424 >>> mbox cmd response: success
2,771,436 UART: [afmc] ++
2,771,604 UART: [afmc] CDI.KEYID = 6
2,771,966 UART: [afmc] SUBJECT.KEYID = 7
2,772,391 UART: [afmc] AUTHORITY.KEYID = 5
2,807,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,945 UART: [afmc] --
2,850,961 UART: [cold-reset] --
2,851,871 UART: [state] Locking Datavault
2,853,156 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,760 UART: [state] Locking ICCM
2,854,334 UART: [exit] Launching FMC @ 0x40000130
2,859,663 UART:
2,859,679 UART: Running Caliptra FMC ...
2,860,087 UART:
2,860,230 UART: [state] CFI Enabled
2,870,599 UART: [fht] FMC Alias Private Key: 7
2,978,618 UART: [art] Extend RT PCRs Done
2,979,046 UART: [art] Lock RT PCRs Done
2,980,654 UART: [art] Populate DV Done
2,989,121 UART: [fht] FMC Alias Private Key: 7
2,990,247 UART: [art] Derive CDI
2,990,527 UART: [art] Store in in slot 0x4
3,075,948 UART: [art] Derive Key Pair
3,076,308 UART: [art] Store priv key in slot 0x5
3,089,894 UART: [art] Derive Key Pair - Done
3,104,949 UART: [art] Signing Cert with AUTHO
3,105,429 UART: RITY.KEYID = 7
3,120,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,646 UART: [art] PUB.X = 978925856E64B459F19C54CA1D4FD0F959B5E1F3A9CFED82FA970FD09956BF3C6469BB5CD00E650E9AB5848C984CA30B
3,128,416 UART: [art] PUB.Y = D2E5993EA919E1DA9AB8AC26264126B733B75B5D1B2379A87065FFC01DD6DCD9E21744EB6F2C618A11BA0197F55A04AB
3,135,372 UART: [art] SIG.R = E19B47B15EE6E485542CADF5FE7F7B82C7A87267494093C0C91EB3871CE20B4FC5966F30907D2055F91C1933160726E0
3,142,134 UART: [art] SIG.S = BE6345A68C9E64BBA0DAA28407231EE0ABD6CACDE61C37FCE19CB0B67315D8DFC112A6BD5773C84502F503FE574B5930
3,165,560 UART: Caliptra RT
3,165,905 UART: [state] CFI Enabled
3,273,241 UART: [rt] RT listening for mailbox commands...
3,273,911 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,663 UART: [rt]cmd =0x4c4d5356, len=1672
3,567,328 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,224 ready_for_fw is high
1,060,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,671 >>> mbox cmd response: success
2,687,467 UART:
2,687,483 UART: Running Caliptra FMC ...
2,687,891 UART:
2,688,034 UART: [state] CFI Enabled
2,698,695 UART: [fht] FMC Alias Private Key: 7
2,806,412 UART: [art] Extend RT PCRs Done
2,806,840 UART: [art] Lock RT PCRs Done
2,808,332 UART: [art] Populate DV Done
2,816,587 UART: [fht] FMC Alias Private Key: 7
2,817,745 UART: [art] Derive CDI
2,818,025 UART: [art] Store in in slot 0x4
2,904,056 UART: [art] Derive Key Pair
2,904,416 UART: [art] Store priv key in slot 0x5
2,917,190 UART: [art] Derive Key Pair - Done
2,931,938 UART: [art] Signing Cert with AUTHO
2,932,418 UART: RITY.KEYID = 7
2,947,650 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,415 UART: [art] PUB.X = 91D30EC4F78128CCB58948ED054A6531FA70B0985CCDB493240BA0BB7EEF1EC4464AF452BB40DF410D753E0D645C5BB1
2,955,184 UART: [art] PUB.Y = 723399BD24E24923F87217389710AE63C478CCB43234A18ABBD8CDA17B671DEF75CA496AC402FCB6C59C76BA4F91219F
2,962,139 UART: [art] SIG.R = AE89D5A6987A173EFC34E94B92DB0B52AA8E9CFE78291AD476529EC7F2438717DBD7F97706B3D0387CAD925622B21420
2,968,909 UART: [art] SIG.S = 0828EA8B91B362B897F7C15050C74C0C663E2C57A88236F2170CE61DF8DDD32FF5820837E212C340220C59CADCDFA6D2
2,992,651 UART: Caliptra RT
2,992,996 UART: [state] CFI Enabled
3,100,959 UART: [rt] RT listening for mailbox commands...
3,101,629 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,383 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,846 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,967 UART: [idev] ++
1,173,135 UART: [idev] CDI.KEYID = 6
1,173,496 UART: [idev] SUBJECT.KEYID = 7
1,173,921 UART: [idev] UDS.KEYID = 0
1,174,267 ready_for_fw is high
1,174,267 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,507 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,203 UART: [fwproc] Recv command 0x46574c44
1,281,936 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,005 >>> mbox cmd response: success
2,770,084 UART: [afmc] ++
2,770,252 UART: [afmc] CDI.KEYID = 6
2,770,615 UART: [afmc] SUBJECT.KEYID = 7
2,771,041 UART: [afmc] AUTHORITY.KEYID = 5
2,806,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,353 UART: [afmc] --
2,849,323 UART: [cold-reset] --
2,850,089 UART: [state] Locking Datavault
2,851,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,044 UART: [state] Locking ICCM
2,852,640 UART: [exit] Launching FMC @ 0x40000130
2,857,969 UART:
2,857,985 UART: Running Caliptra FMC ...
2,858,393 UART:
2,858,447 UART: [state] CFI Enabled
2,868,878 UART: [fht] FMC Alias Private Key: 7
2,977,035 UART: [art] Extend RT PCRs Done
2,977,463 UART: [art] Lock RT PCRs Done
2,978,861 UART: [art] Populate DV Done
2,986,970 UART: [fht] FMC Alias Private Key: 7
2,987,990 UART: [art] Derive CDI
2,988,270 UART: [art] Store in in slot 0x4
3,074,011 UART: [art] Derive Key Pair
3,074,371 UART: [art] Store priv key in slot 0x5
3,087,455 UART: [art] Derive Key Pair - Done
3,102,150 UART: [art] Signing Cert with AUTHO
3,102,630 UART: RITY.KEYID = 7
3,118,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,769 UART: [art] PUB.X = 6596F1C1E8D99D1D7F9D216AC865D32AC90EA18C98294F227C4E29EE2E60E33EFA65F42FD18E5DDE5F1CD9D1386532C3
3,125,550 UART: [art] PUB.Y = 57186C734ACA7D0EDC5DB64D63A4620EC8283369661BE4C6B9AE52C234D6D2C23FA2F187D7432516F9F949AA76BFE427
3,132,502 UART: [art] SIG.R = 3EEEE0399FDBDC1B4B4CFD5D4F0773BF7F41E8543B1761FF0907EC7CC88CB729EA337149AA1E5AB7AB9E7CB83A3312C2
3,139,287 UART: [art] SIG.S = 3CA27AFFB5BC08A4C95D74ED157E51713670F22C7B99A4737E0DEC1B0C1AF18EA72F1EDC72DA6CE0B66F86F3C01FEDD7
3,162,843 UART: Caliptra RT
3,163,096 UART: [state] CFI Enabled
3,271,045 UART: [rt] RT listening for mailbox commands...
3,271,715 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,723 UART: [rt]cmd =0x4c4d5356, len=1672
3,565,258 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,140 ready_for_fw is high
1,056,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,361 >>> mbox cmd response: success
2,681,669 UART:
2,681,685 UART: Running Caliptra FMC ...
2,682,093 UART:
2,682,147 UART: [state] CFI Enabled
2,692,700 UART: [fht] FMC Alias Private Key: 7
2,800,507 UART: [art] Extend RT PCRs Done
2,800,935 UART: [art] Lock RT PCRs Done
2,802,555 UART: [art] Populate DV Done
2,810,666 UART: [fht] FMC Alias Private Key: 7
2,811,776 UART: [art] Derive CDI
2,812,056 UART: [art] Store in in slot 0x4
2,897,747 UART: [art] Derive Key Pair
2,898,107 UART: [art] Store priv key in slot 0x5
2,911,331 UART: [art] Derive Key Pair - Done
2,926,047 UART: [art] Signing Cert with AUTHO
2,926,527 UART: RITY.KEYID = 7
2,941,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,474 UART: [art] PUB.X = 487365E42658D3B357D29FF15BEA0FDBF7ED1C2324857E4635D295CBAB4F4E8D7A16CA0009E55461C6DA66C16C60F914
2,949,224 UART: [art] PUB.Y = DE6F3BA2929CDB960545EF6F00AFD8F7482F9CD6F3508D5095022D77A5A665B2730BA91044982A0B3A7B03B701E5BEF9
2,956,142 UART: [art] SIG.R = BC31C107E1FBF7ECAC50B0E48656E24A9BD0CD10E8F2AF66799EF3EB2CF3B1BBF1EC132CCBDE47AB17729730D5940E53
2,962,932 UART: [art] SIG.S = 2D57A60E7B3AB477C0B8D4B2757AF0BBB7E41AD9E16BFE7C192200AC944CF6647298AD960D79ADFF431E10456DF516CB
2,986,617 UART: Caliptra RT
2,986,870 UART: [state] CFI Enabled
3,094,699 UART: [rt] RT listening for mailbox commands...
3,095,369 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,691 UART: [rt]cmd =0x4c4d5356, len=1672
3,387,968 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
891,775 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,904 UART: [kat] ++
896,056 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,895 UART: [kat] SHA2-512-ACC
906,796 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,436 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,174,728 ready_for_fw is high
1,174,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,101 UART: [ldev] ++
1,209,269 UART: [ldev] CDI.KEYID = 6
1,209,633 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,861 UART: [fwproc] Wait for Commands...
1,282,466 UART: [fwproc] Recv command 0x46574c44
1,283,199 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,568 >>> mbox cmd response: success
2,771,763 UART: [afmc] ++
2,771,931 UART: [afmc] CDI.KEYID = 6
2,772,294 UART: [afmc] SUBJECT.KEYID = 7
2,772,720 UART: [afmc] AUTHORITY.KEYID = 5
2,808,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,897 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,482 UART: [afmc] --
2,852,522 UART: [cold-reset] --
2,853,520 UART: [state] Locking Datavault
2,854,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,371 UART: [state] Locking ICCM
2,856,003 UART: [exit] Launching FMC @ 0x40000130
2,861,332 UART:
2,861,348 UART: Running Caliptra FMC ...
2,861,756 UART:
2,861,899 UART: [state] CFI Enabled
2,872,778 UART: [fht] FMC Alias Private Key: 7
2,980,597 UART: [art] Extend RT PCRs Done
2,981,025 UART: [art] Lock RT PCRs Done
2,982,407 UART: [art] Populate DV Done
2,990,436 UART: [fht] FMC Alias Private Key: 7
2,991,440 UART: [art] Derive CDI
2,991,720 UART: [art] Store in in slot 0x4
3,077,245 UART: [art] Derive Key Pair
3,077,605 UART: [art] Store priv key in slot 0x5
3,090,905 UART: [art] Derive Key Pair - Done
3,105,634 UART: [art] Signing Cert with AUTHO
3,106,114 UART: RITY.KEYID = 7
3,121,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,425 UART: [art] PUB.X = DAC7207B7C6F0961B747B1100CD373DE5655643434DB3E08CBF17F6175E1AA85A4FC771E332252A96C7E0C5D0DD18AAD
3,129,190 UART: [art] PUB.Y = DEC02A50B7D4830B05D042E2A11711BE5015587C34B1BD1E4AD9E3C8F36F6E3BDD39CC30A40E5073F858490CAED0C217
3,136,140 UART: [art] SIG.R = 82CAF069159610B2E72B46F30B8B90E73958FE1C2753AE36A211E684A95162FC0F910854214E7C443FF31253ACE7281D
3,142,897 UART: [art] SIG.S = CD497F63BDD82A5FD9D47197D9E9C7790BADAD026EA6BC7CF1F80805CD62429966967A7B91C1CCBBA47DA3DCB8E992DC
3,166,660 UART: Caliptra RT
3,167,005 UART: [state] CFI Enabled
3,275,483 UART: [rt] RT listening for mailbox commands...
3,276,153 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,915 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,494 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,059 ready_for_fw is high
1,057,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,982 >>> mbox cmd response: success
2,680,730 UART:
2,680,746 UART: Running Caliptra FMC ...
2,681,154 UART:
2,681,297 UART: [state] CFI Enabled
2,691,698 UART: [fht] FMC Alias Private Key: 7
2,799,289 UART: [art] Extend RT PCRs Done
2,799,717 UART: [art] Lock RT PCRs Done
2,801,089 UART: [art] Populate DV Done
2,809,254 UART: [fht] FMC Alias Private Key: 7
2,810,408 UART: [art] Derive CDI
2,810,688 UART: [art] Store in in slot 0x4
2,896,669 UART: [art] Derive Key Pair
2,897,029 UART: [art] Store priv key in slot 0x5
2,910,699 UART: [art] Derive Key Pair - Done
2,925,315 UART: [art] Signing Cert with AUTHO
2,925,795 UART: RITY.KEYID = 7
2,941,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,924 UART: [art] PUB.X = D83C2C53B29D1A1B3CDB7071CC849213F1EBBCBC3FBF730C131FE50CC905CDC56F8AE3F9D8BE274CC294869F04E56AAB
2,948,708 UART: [art] PUB.Y = 0DA623139A51C07F38127C1EC3874C9D211A4ED40934850DD723BD415173DF9AD70966BA00906FDEBE70ACCE84602B23
2,955,628 UART: [art] SIG.R = C13FBCEAEFFBD0B190D5FD3F4E7D314936209BEF697B28CB7E0D69A9B6A642083F5CD3087C3AFA2B7BBEF94E7C7E6C56
2,962,417 UART: [art] SIG.S = C999522A183037B6EBD48D10D27E368F7FEF6A7E8BBBF3B8EB63E53FBB36F8501971456DA060FBBE61F96A3E2A6FBB37
2,986,132 UART: Caliptra RT
2,986,477 UART: [state] CFI Enabled
3,093,693 UART: [rt] RT listening for mailbox commands...
3,094,363 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,251 UART: [rt]cmd =0x4c4d5356, len=1672
3,387,576 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,147 UART:
192,513 UART: Running Caliptra ROM ...
193,707 UART:
193,879 UART: [state] CFI Enabled
265,054 UART: [state] LifecycleState = Unprovisioned
266,974 UART: [state] DebugLocked = No
269,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,176 UART: [kat] SHA2-256
444,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,343 UART: [kat] ++
455,832 UART: [kat] sha1
466,142 UART: [kat] SHA2-256
468,863 UART: [kat] SHA2-384
474,142 UART: [kat] SHA2-512-ACC
476,508 UART: [kat] ECC-384
2,769,642 UART: [kat] HMAC-384Kdf
2,800,427 UART: [kat] LMS
3,990,705 UART: [kat] --
3,996,836 UART: [cold-reset] ++
3,999,474 UART: [fht] Storing FHT @ 0x50003400
4,010,312 UART: [idev] ++
4,010,881 UART: [idev] CDI.KEYID = 6
4,011,921 UART: [idev] SUBJECT.KEYID = 7
4,013,118 UART: [idev] UDS.KEYID = 0
4,014,154 ready_for_fw is high
4,014,350 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,413 UART: [idev] Erasing UDS.KEYID = 0
7,347,261 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,663 UART: [idev] --
7,372,116 UART: [ldev] ++
7,372,687 UART: [ldev] CDI.KEYID = 6
7,373,662 UART: [ldev] SUBJECT.KEYID = 5
7,374,873 UART: [ldev] AUTHORITY.KEYID = 7
7,376,100 UART: [ldev] FE.KEYID = 1
7,423,210 UART: [ldev] Erasing FE.KEYID = 1
10,753,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,424 UART: [ldev] --
13,116,880 UART: [fwproc] Waiting for Commands...
13,118,972 UART: [fwproc] Received command 0x46574c44
13,121,204 UART: [fwproc] Received Image of size 113760 bytes
17,159,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,205 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,621,927 >>> mbox cmd response: success
17,622,437 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,626,914 UART: [afmc] ++
17,627,531 UART: [afmc] CDI.KEYID = 6
17,628,450 UART: [afmc] SUBJECT.KEYID = 7
17,629,665 UART: [afmc] AUTHORITY.KEYID = 5
20,988,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,486 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,931 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,718 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,164 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,138 UART: [afmc] --
23,357,190 UART: [cold-reset] --
23,359,810 UART: [state] Locking Datavault
23,363,224 UART: [state] Locking PCR0, PCR1 and PCR31
23,364,976 UART: [state] Locking ICCM
23,366,101 UART: [exit] Launching FMC @ 0x40000130
23,374,493 UART:
23,374,727 UART: Running Caliptra FMC ...
23,375,825 UART:
23,375,984 UART: [state] CFI Enabled
23,427,736 UART: [fht] FMC Alias Private Key: 7
25,765,137 UART: [art] Extend RT PCRs Done
25,766,375 UART: [art] Lock RT PCRs Done
25,768,189 UART: [art] Populate DV Done
25,773,821 UART: [fht] FMC Alias Private Key: 7
25,775,303 UART: [art] Derive CDI
25,776,067 UART: [art] Store in in slot 0x4
25,837,729 UART: [art] Derive Key Pair
25,838,765 UART: [art] Store priv key in slot 0x5
29,131,943 UART: [art] Derive Key Pair - Done
29,144,925 UART: [art] Signing Cert with AUTHO
29,146,258 UART: RITY.KEYID = 7
31,433,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,434,590 UART: [art] PUB.X = EBFD7CB5511E881133970D36F3438D8E3D6E8A2AD1C0902C81EAA8BA8DB3254751BA5BCBC29B694EF11FF101A1A1B54E
31,441,880 UART: [art] PUB.Y = 47D53BBB95BB32C6422ECF6B05B189174A94F755D44A78B215F810E2F80D6788DF98B3904FD5D86EDF22840F0273AEB1
31,449,114 UART: [art] SIG.R = 2C6228D3C6258653FFBBC97EABE6B313541261C0B16A1FC32B243B8B3C93181EBA78B224672BDF45417EEBF72EA7621F
31,456,450 UART: [art] SIG.S = 10791ECC05C13CC007A52C4D0C6C299EBC0A793EB5562C020C7D51A54ADD634E07BED88F3B42CCBC5FFED084EF450FDB
32,762,160 UART: Caliptra RT
32,762,897 UART: [state] CFI Enabled
32,924,354 UART: [rt] RT listening for mailbox commands...
32,937,878 >>> mbox cmd response: failed
32,938,278 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,968,319 UART: [rt]cmd =0x46505652, len=4
32,969,560 UART: [rt] FIPS Version
32,970,666 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,805,226 ready_for_fw is high
3,805,595 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,907,014 >>> mbox cmd response: success
17,907,904 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,599,306 UART:
23,599,705 UART: Running Caliptra FMC ...
23,600,848 UART:
23,601,008 UART: [state] CFI Enabled
23,670,421 UART: [fht] FMC Alias Private Key: 7
26,008,393 UART: [art] Extend RT PCRs Done
26,009,671 UART: [art] Lock RT PCRs Done
26,011,139 UART: [art] Populate DV Done
26,016,479 UART: [fht] FMC Alias Private Key: 7
26,018,128 UART: [art] Derive CDI
26,018,865 UART: [art] Store in in slot 0x4
26,080,225 UART: [art] Derive Key Pair
26,081,271 UART: [art] Store priv key in slot 0x5
29,374,238 UART: [art] Derive Key Pair - Done
29,387,140 UART: [art] Signing Cert with AUTHO
29,388,448 UART: RITY.KEYID = 7
31,675,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,676,749 UART: [art] PUB.X = F0A8739926CE4A13448F1186F240661C68D35BF093C2A721CF17CCE5CBD67CEB035DFEB30068C2CF0CCB9EEC5C227C32
31,684,007 UART: [art] PUB.Y = 828B8CDAF3504D493C7F1E6ABFFB3245B624600FB4A41BC5145E5A1C047DDBDB11917E5A75076C943E34E86138490C7E
31,691,261 UART: [art] SIG.R = 3DED7F64AF9F05B8850E86F84D944DFE3FBE2C07EADA7823D2A7B0E2D7C00FA26B005F238C8691C9AA8D8AFE933D678F
31,698,671 UART: [art] SIG.S = 57BCF4F2F371B71828E7E665A673E27F47C36E62FEB29191DFC8CDA2DD85C894192BD097D4298553DA900F50A3619918
33,003,890 UART: Caliptra RT
33,004,629 UART: [state] CFI Enabled
33,165,782 UART: [rt] RT listening for mailbox commands...
33,179,469 >>> mbox cmd response: failed
33,179,870 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,209,424 UART: [rt]cmd =0x46505652, len=4
33,210,759 UART: [rt] FIPS Version
33,211,706 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
192,983 UART:
193,345 UART: Running Caliptra ROM ...
194,487 UART:
604,160 UART: [state] CFI Enabled
618,961 UART: [state] LifecycleState = Unprovisioned
620,905 UART: [state] DebugLocked = No
623,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,431 UART: [kat] SHA2-256
797,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,743 UART: [kat] ++
808,186 UART: [kat] sha1
818,841 UART: [kat] SHA2-256
821,559 UART: [kat] SHA2-384
827,118 UART: [kat] SHA2-512-ACC
829,477 UART: [kat] ECC-384
3,111,638 UART: [kat] HMAC-384Kdf
3,124,167 UART: [kat] LMS
4,314,327 UART: [kat] --
4,318,764 UART: [cold-reset] ++
4,321,256 UART: [fht] Storing FHT @ 0x50003400
4,333,864 UART: [idev] ++
4,334,418 UART: [idev] CDI.KEYID = 6
4,335,369 UART: [idev] SUBJECT.KEYID = 7
4,336,606 UART: [idev] UDS.KEYID = 0
4,337,620 ready_for_fw is high
4,337,836 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,768 UART: [idev] Erasing UDS.KEYID = 0
7,624,123 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,523 UART: [idev] --
7,649,970 UART: [ldev] ++
7,650,533 UART: [ldev] CDI.KEYID = 6
7,651,494 UART: [ldev] SUBJECT.KEYID = 5
7,652,715 UART: [ldev] AUTHORITY.KEYID = 7
7,653,943 UART: [ldev] FE.KEYID = 1
7,665,499 UART: [ldev] Erasing FE.KEYID = 1
10,953,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,664 UART: [ldev] --
13,313,215 UART: [fwproc] Waiting for Commands...
13,315,197 UART: [fwproc] Received command 0x46574c44
13,317,430 UART: [fwproc] Received Image of size 113760 bytes
17,369,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,854 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,829,818 >>> mbox cmd response: success
17,830,351 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,834,703 UART: [afmc] ++
17,835,333 UART: [afmc] CDI.KEYID = 6
17,836,242 UART: [afmc] SUBJECT.KEYID = 7
17,837,506 UART: [afmc] AUTHORITY.KEYID = 5
21,152,056 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,586 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,851 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,288 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,059 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,507 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,574 UART: [afmc] --
23,519,050 UART: [cold-reset] --
23,522,700 UART: [state] Locking Datavault
23,528,322 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,076 UART: [state] Locking ICCM
23,531,596 UART: [exit] Launching FMC @ 0x40000130
23,539,990 UART:
23,540,224 UART: Running Caliptra FMC ...
23,541,323 UART:
23,541,479 UART: [state] CFI Enabled
23,549,574 UART: [fht] FMC Alias Private Key: 7
25,880,721 UART: [art] Extend RT PCRs Done
25,881,969 UART: [art] Lock RT PCRs Done
25,883,673 UART: [art] Populate DV Done
25,889,240 UART: [fht] FMC Alias Private Key: 7
25,890,775 UART: [art] Derive CDI
25,891,534 UART: [art] Store in in slot 0x4
25,934,181 UART: [art] Derive Key Pair
25,935,221 UART: [art] Store priv key in slot 0x5
29,177,261 UART: [art] Derive Key Pair - Done
29,190,422 UART: [art] Signing Cert with AUTHO
29,191,772 UART: RITY.KEYID = 7
31,471,145 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,117 UART: [art] PUB.X = 8BBE038C89B35CF9BAA5A5AD8AAD3ED307B4229F251E90E47402AFC465F5A4090C077DE734019762A2D9165ADB432D51
31,479,904 UART: [art] PUB.Y = 0FD789513EF54C11385EC1EE111DB8753E93EF4155AFCF7F85517C0202F919633978AA78318490BFA4AF03FD9A7FF45E
31,487,154 UART: [art] SIG.R = C6B18F74D1EAFEDCA6894A3EBFD751ECCD6F52F7F4EC37B086864124A736B73DC52AA7CB1E495B60668EAC2D187FEC74
31,494,560 UART: [art] SIG.S = 2EB52DA7B4C4C1CF28F4DAEA6FD54646D698470D1D5ADB38F6D2890E127F4522BBFFF0F93B531F0FE2933C4057F9F3BC
32,800,498 UART: Caliptra RT
32,801,222 UART: [state] CFI Enabled
32,919,159 UART: [rt] RT listening for mailbox commands...
32,932,570 >>> mbox cmd response: failed
32,933,006 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,963,008 UART: [rt]cmd =0x46505652, len=4
32,964,291 UART: [rt] FIPS Version
32,965,342 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
4,134,119 ready_for_fw is high
4,134,706 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,643 >>> mbox cmd response: success
18,063,299 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,701,501 UART:
23,701,883 UART: Running Caliptra FMC ...
23,702,978 UART:
23,703,128 UART: [state] CFI Enabled
23,711,645 UART: [fht] FMC Alias Private Key: 7
26,042,080 UART: [art] Extend RT PCRs Done
26,043,320 UART: [art] Lock RT PCRs Done
26,045,045 UART: [art] Populate DV Done
26,050,477 UART: [fht] FMC Alias Private Key: 7
26,052,184 UART: [art] Derive CDI
26,053,001 UART: [art] Store in in slot 0x4
26,096,089 UART: [art] Derive Key Pair
26,097,091 UART: [art] Store priv key in slot 0x5
29,339,065 UART: [art] Derive Key Pair - Done
29,351,911 UART: [art] Signing Cert with AUTHO
29,353,213 UART: RITY.KEYID = 7
31,632,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,108 UART: [art] PUB.X = 13F48ABF23992FBCABCD4E81DEB1599444EB51EE524FA33725A0B6000B61539023B75DE2BA3613ABE17962B15EDE1FDB
31,641,376 UART: [art] PUB.Y = 5C64CE37865749742D43DF5533379BA2095761D2DA076FE447A76DEFCB2AECEA99E8A23D897CC49DADAF0AD994D16588
31,648,641 UART: [art] SIG.R = 3B6DAFC742428CB58780BFAAF9550191E33A3E63CAC94F3FCBA31FC2B9921D536FA6C60B751BD9A7A6D235A39F0A0E7A
31,656,007 UART: [art] SIG.S = 6DADF2829ED051954CBA6BC5D2D6EAB5D21BA5AB941A27728A172EBC9543D96E5F0B61A212AB75C66B4510483939401F
32,960,819 UART: Caliptra RT
32,961,521 UART: [state] CFI Enabled
33,079,798 UART: [rt] RT listening for mailbox commands...
33,093,332 >>> mbox cmd response: failed
33,093,713 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,123,093 UART: [rt]cmd =0x46505652, len=4
33,124,335 UART: [rt] FIPS Version
33,125,597 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
192,494 UART:
192,856 UART: Running Caliptra ROM ...
193,955 UART:
194,096 UART: [state] CFI Enabled
264,654 UART: [state] LifecycleState = Unprovisioned
266,574 UART: [state] DebugLocked = No
268,734 UART: [state] WD Timer not started. Device not locked for debugging
271,914 UART: [kat] SHA2-256
451,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,575 UART: [kat] ++
463,027 UART: [kat] sha1
474,044 UART: [kat] SHA2-256
477,056 UART: [kat] SHA2-384
482,405 UART: [kat] SHA2-512-ACC
485,353 UART: [kat] ECC-384
2,947,613 UART: [kat] HMAC-384Kdf
2,970,357 UART: [kat] LMS
3,499,762 UART: [kat] --
3,503,888 UART: [cold-reset] ++
3,506,313 UART: [fht] FHT @ 0x50003400
3,517,856 UART: [idev] ++
3,518,416 UART: [idev] CDI.KEYID = 6
3,519,335 UART: [idev] SUBJECT.KEYID = 7
3,520,506 UART: [idev] UDS.KEYID = 0
3,521,425 ready_for_fw is high
3,521,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,053 UART: [idev] Erasing UDS.KEYID = 0
6,024,933 UART: [idev] Sha1 KeyId Algorithm
6,047,628 UART: [idev] --
6,051,458 UART: [ldev] ++
6,052,050 UART: [ldev] CDI.KEYID = 6
6,052,961 UART: [ldev] SUBJECT.KEYID = 5
6,054,117 UART: [ldev] AUTHORITY.KEYID = 7
6,055,402 UART: [ldev] FE.KEYID = 1
6,100,030 UART: [ldev] Erasing FE.KEYID = 1
8,603,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,233 UART: [ldev] --
10,412,416 UART: [fwproc] Wait for Commands...
10,415,611 UART: [fwproc] Recv command 0x46574c44
10,417,646 UART: [fwproc] Recv'd Img size: 114084 bytes
13,821,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,279,820 >>> mbox cmd response: success
14,280,323 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,284,603 UART: [afmc] ++
14,285,187 UART: [afmc] CDI.KEYID = 6
14,286,073 UART: [afmc] SUBJECT.KEYID = 7
14,287,283 UART: [afmc] AUTHORITY.KEYID = 5
16,830,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,616 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,411 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,943 UART: [afmc] --
18,632,489 UART: [cold-reset] --
18,636,718 UART: [state] Locking Datavault
18,641,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,138 UART: [state] Locking ICCM
18,645,744 UART: [exit] Launching FMC @ 0x40000130
18,654,184 UART:
18,654,422 UART: Running Caliptra FMC ...
18,655,525 UART:
18,655,682 UART: [state] CFI Enabled
18,713,588 UART: [fht] FMC Alias Private Key: 7
20,477,765 UART: [art] Extend RT PCRs Done
20,478,971 UART: [art] Lock RT PCRs Done
20,480,640 UART: [art] Populate DV Done
20,485,943 UART: [fht] FMC Alias Private Key: 7
20,487,528 UART: [art] Derive CDI
20,488,257 UART: [art] Store in in slot 0x4
20,546,025 UART: [art] Derive Key Pair
20,547,092 UART: [art] Store priv key in slot 0x5
23,010,282 UART: [art] Derive Key Pair - Done
23,023,051 UART: [art] Signing Cert with AUTHO
23,024,385 UART: RITY.KEYID = 7
24,735,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,471 UART: [art] PUB.X = A5F89682F0BB4A65DF4B5BD098BB39E71FA11DBB09F838188E3E83427FAE35E9B1EFE791B8CED2F8FA0C2F299E3D1962
24,744,749 UART: [art] PUB.Y = CB013018FA8C34E97F0D80478892D693863BB7A0EBC823548C17DDC71E110CFEBAAFF2C148BE68BFE1E99415A67E9E78
24,752,009 UART: [art] SIG.R = 2334A0B9DA93AC1A4824AC79D9E6DF36EC10AFEE5B10D30F4FF03219126626330D4BCAE039AC8276B680E6F91C09D8AC
24,759,434 UART: [art] SIG.S = CCA37843982F9EB42B36B7430B3BD7E86573671A49D0CB88C0C51C678CD77B61F3BD5266895DE06EF96C80EEB8B49DA5
25,738,225 UART: Caliptra RT
25,738,927 UART: [state] CFI Enabled
25,904,031 UART: [rt] RT listening for mailbox commands...
25,917,287 >>> mbox cmd response: failed
25,917,681 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,947,272 UART: [rt]cmd =0x46505652, len=4
25,948,513 UART: [rt] FIPS Version
25,949,668 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
3,359,099 ready_for_fw is high
3,359,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,586 >>> mbox cmd response: success
14,071,306 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,360,217 UART:
18,360,610 UART: Running Caliptra FMC ...
18,361,819 UART:
18,361,982 UART: [state] CFI Enabled
18,430,429 UART: [fht] FMC Alias Private Key: 7
20,194,394 UART: [art] Extend RT PCRs Done
20,195,611 UART: [art] Lock RT PCRs Done
20,197,296 UART: [art] Populate DV Done
20,202,433 UART: [fht] FMC Alias Private Key: 7
20,204,086 UART: [art] Derive CDI
20,204,906 UART: [art] Store in in slot 0x4
20,263,018 UART: [art] Derive Key Pair
20,264,053 UART: [art] Store priv key in slot 0x5
22,727,192 UART: [art] Derive Key Pair - Done
22,739,978 UART: [art] Signing Cert with AUTHO
22,741,289 UART: RITY.KEYID = 7
24,453,200 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,701 UART: [art] PUB.X = 6B8EBCE60E1E7495AD9E0E5CE364ABFD9F8D8834499AF2903DD36F341A206E21118A32145E2BD6D1722F7BD15F9F8FBC
24,462,012 UART: [art] PUB.Y = 15A268D301643B9962EC969B9C6BEAEB04E9DB20C4343DA685CB8BDCEC54D7346A86FC78EF6F8DC39CCB8F21F2CCAED8
24,469,241 UART: [art] SIG.R = BB303E299992F19AD4929FD6427C4D1ECAAD4F1EE30B03441947229D711702426C05D8966E00C0D492CC5D661ECF983C
24,476,605 UART: [art] SIG.S = 0F577230AE099D34F9CF16181C51F7F6CCF0C47CCA23F97EC9334A78379B5063C0525260CF34D9EFCAEA81B0B744A471
25,456,226 UART: Caliptra RT
25,456,940 UART: [state] CFI Enabled
25,621,549 UART: [rt] RT listening for mailbox commands...
25,635,180 >>> mbox cmd response: failed
25,635,569 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,665,398 UART: [rt]cmd =0x46505652, len=4
25,666,673 UART: [rt] FIPS Version
25,667,723 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
192,947 UART:
193,327 UART: Running Caliptra ROM ...
194,513 UART:
604,081 UART: [state] CFI Enabled
617,035 UART: [state] LifecycleState = Unprovisioned
619,394 UART: [state] DebugLocked = No
621,257 UART: [state] WD Timer not started. Device not locked for debugging
625,180 UART: [kat] SHA2-256
804,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,877 UART: [kat] ++
816,434 UART: [kat] sha1
828,241 UART: [kat] SHA2-256
831,316 UART: [kat] SHA2-384
837,518 UART: [kat] SHA2-512-ACC
840,463 UART: [kat] ECC-384
3,282,286 UART: [kat] HMAC-384Kdf
3,296,218 UART: [kat] LMS
3,825,735 UART: [kat] --
3,832,176 UART: [cold-reset] ++
3,833,346 UART: [fht] FHT @ 0x50003400
3,844,744 UART: [idev] ++
3,845,304 UART: [idev] CDI.KEYID = 6
3,846,186 UART: [idev] SUBJECT.KEYID = 7
3,847,429 UART: [idev] UDS.KEYID = 0
3,848,332 ready_for_fw is high
3,848,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,859 UART: [idev] Erasing UDS.KEYID = 0
6,322,188 UART: [idev] Sha1 KeyId Algorithm
6,344,608 UART: [idev] --
6,348,388 UART: [ldev] ++
6,348,961 UART: [ldev] CDI.KEYID = 6
6,349,873 UART: [ldev] SUBJECT.KEYID = 5
6,351,031 UART: [ldev] AUTHORITY.KEYID = 7
6,352,267 UART: [ldev] FE.KEYID = 1
6,363,726 UART: [ldev] Erasing FE.KEYID = 1
8,837,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,482 UART: [ldev] --
10,630,621 UART: [fwproc] Wait for Commands...
10,633,331 UART: [fwproc] Recv command 0x46574c44
10,635,369 UART: [fwproc] Recv'd Img size: 114084 bytes
14,037,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,498,520 >>> mbox cmd response: success
14,499,067 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,502,600 UART: [afmc] ++
14,503,189 UART: [afmc] CDI.KEYID = 6
14,504,104 UART: [afmc] SUBJECT.KEYID = 7
14,505,266 UART: [afmc] AUTHORITY.KEYID = 5
17,004,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,669 UART: [afmc] --
18,802,438 UART: [cold-reset] --
18,806,844 UART: [state] Locking Datavault
18,811,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,049 UART: [state] Locking ICCM
18,814,178 UART: [exit] Launching FMC @ 0x40000130
18,822,576 UART:
18,822,814 UART: Running Caliptra FMC ...
18,823,921 UART:
18,824,085 UART: [state] CFI Enabled
18,832,353 UART: [fht] FMC Alias Private Key: 7
20,589,321 UART: [art] Extend RT PCRs Done
20,590,554 UART: [art] Lock RT PCRs Done
20,592,480 UART: [art] Populate DV Done
20,597,619 UART: [fht] FMC Alias Private Key: 7
20,599,179 UART: [art] Derive CDI
20,599,916 UART: [art] Store in in slot 0x4
20,642,836 UART: [art] Derive Key Pair
20,643,873 UART: [art] Store priv key in slot 0x5
23,070,154 UART: [art] Derive Key Pair - Done
23,083,152 UART: [art] Signing Cert with AUTHO
23,084,469 UART: RITY.KEYID = 7
24,789,897 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,403 UART: [art] PUB.X = 6640FBC7DE443945685247925F6742E8BD6C732D0BF102C606B6A453439BBA20DADF48990B673FDA9288C9E942709D70
24,798,685 UART: [art] PUB.Y = 3E6FCFA29A28C9091CD08093E72AD085A699CF8DE1C5E584720D002DE0C11EE434A67437DC73E867B914CF302C7C8992
24,805,946 UART: [art] SIG.R = D9B1961FB515C124E3EA35A67BF0B0FE3AAF4C2E3367F0100CA7B44DFD04D5F12CC08FC6F02F95AAA1E71B57DCCCB664
24,813,312 UART: [art] SIG.S = F6E4A0B7E6B97BAF9B36F908DF4D97A0D917B8C7A4B32B769AD004AB38BBB36C3B0CA3591624E4B0CC9A331F034233BB
25,792,278 UART: Caliptra RT
25,792,991 UART: [state] CFI Enabled
25,910,183 UART: [rt] RT listening for mailbox commands...
25,924,039 >>> mbox cmd response: failed
25,924,485 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,954,140 UART: [rt]cmd =0x46505652, len=4
25,955,384 UART: [rt] FIPS Version
25,956,598 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
3,697,083 ready_for_fw is high
3,697,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,827 >>> mbox cmd response: success
14,262,633 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,517,021 UART:
18,517,426 UART: Running Caliptra FMC ...
18,518,531 UART:
18,518,686 UART: [state] CFI Enabled
18,526,798 UART: [fht] FMC Alias Private Key: 7
20,283,693 UART: [art] Extend RT PCRs Done
20,284,916 UART: [art] Lock RT PCRs Done
20,286,517 UART: [art] Populate DV Done
20,291,770 UART: [fht] FMC Alias Private Key: 7
20,293,420 UART: [art] Derive CDI
20,294,181 UART: [art] Store in in slot 0x4
20,336,618 UART: [art] Derive Key Pair
20,337,626 UART: [art] Store priv key in slot 0x5
22,764,678 UART: [art] Derive Key Pair - Done
22,777,621 UART: [art] Signing Cert with AUTHO
22,778,936 UART: RITY.KEYID = 7
24,484,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,953 UART: [art] PUB.X = D5B64A7560832C4B1987D0C406668697123DF3B2B430A886E5A0C7E1FD15C5D1C5956C21AFB28FFB56BA7CFC21743D8B
24,493,244 UART: [art] PUB.Y = 272409F2D1DEB88A671C0D73B687EB758A920F2EF57E1BF896DDA346A1C548DFABDD8F14A7C948E163E75F3DD0CE91C2
24,500,474 UART: [art] SIG.R = 7A17847FCEF5CB8B7A373F6008F9F56F2ABDAB8A8FEF35BD1A9B62E6B9918F898F47E37D2C17C0044059ABE5A1BBECAF
24,507,903 UART: [art] SIG.S = FD24D3E187D0F557FE23D620E8D908C3F88B42065065DA20B85315B556B392290D0C122C43374EADD6F69A71306C8F99
25,486,311 UART: Caliptra RT
25,487,012 UART: [state] CFI Enabled
25,604,672 UART: [rt] RT listening for mailbox commands...
25,618,352 >>> mbox cmd response: failed
25,618,749 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,648,420 UART: [rt]cmd =0x46505652, len=4
25,649,706 UART: [rt] FIPS Version
25,650,977 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,539 writing to cptra_bootfsm_go
192,628 UART:
193,007 UART: Running Caliptra ROM ...
194,222 UART:
194,376 UART: [state] CFI Enabled
263,689 UART: [state] LifecycleState = Unprovisioned
266,114 UART: [state] DebugLocked = No
268,004 UART: [state] WD Timer not started. Device not locked for debugging
271,978 UART: [kat] SHA2-256
461,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,611 UART: [kat] ++
473,060 UART: [kat] sha1
484,222 UART: [kat] SHA2-256
487,230 UART: [kat] SHA2-384
493,236 UART: [kat] SHA2-512-ACC
495,885 UART: [kat] ECC-384
2,950,724 UART: [kat] HMAC-384Kdf
2,971,167 UART: [kat] LMS
3,502,969 UART: [kat] --
3,507,464 UART: [cold-reset] ++
3,509,819 UART: [fht] FHT @ 0x50003400
3,521,152 UART: [idev] ++
3,521,902 UART: [idev] CDI.KEYID = 6
3,522,789 UART: [idev] SUBJECT.KEYID = 7
3,524,028 UART: [idev] UDS.KEYID = 0
3,524,928 ready_for_fw is high
3,525,107 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,436 UART: [idev] Erasing UDS.KEYID = 0
6,026,557 UART: [idev] Sha1 KeyId Algorithm
6,047,783 UART: [idev] --
6,053,041 UART: [ldev] ++
6,053,728 UART: [ldev] CDI.KEYID = 6
6,054,617 UART: [ldev] SUBJECT.KEYID = 5
6,055,827 UART: [ldev] AUTHORITY.KEYID = 7
6,057,000 UART: [ldev] FE.KEYID = 1
6,100,068 UART: [ldev] Erasing FE.KEYID = 1
8,604,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,784 UART: [ldev] --
10,412,547 UART: [fwproc] Wait for Commands...
10,415,233 UART: [fwproc] Recv command 0x46574c44
10,417,537 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,937 >>> mbox cmd response: success
14,601,462 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,604,171 UART: [afmc] ++
14,604,873 UART: [afmc] CDI.KEYID = 6
14,606,129 UART: [afmc] SUBJECT.KEYID = 7
14,607,495 UART: [afmc] AUTHORITY.KEYID = 5
17,150,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,753 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,962 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,119 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,653 UART: [afmc] --
18,966,331 UART: [cold-reset] --
18,970,270 UART: [state] Locking Datavault
18,974,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,285 UART: [state] Locking ICCM
18,978,206 UART: [exit] Launching FMC @ 0x40000130
18,986,890 UART:
18,987,119 UART: Running Caliptra FMC ...
18,988,143 UART:
18,988,289 UART: [state] CFI Enabled
19,050,083 UART: [fht] FMC Alias Private Key: 7
20,813,726 UART: [art] Extend RT PCRs Done
20,814,955 UART: [art] Lock RT PCRs Done
20,816,882 UART: [art] Populate DV Done
20,822,347 UART: [fht] FMC Alias Private Key: 7
20,823,776 UART: [art] Derive CDI
20,824,505 UART: [art] Store in in slot 0x4
20,882,058 UART: [art] Derive Key Pair
20,883,118 UART: [art] Store priv key in slot 0x5
23,345,848 UART: [art] Derive Key Pair - Done
23,359,001 UART: [art] Signing Cert with AUTHO
23,360,343 UART: RITY.KEYID = 7
25,071,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,436 UART: [art] PUB.X = 5A3482F9B3D39B973F627ACBDDC6AF6EBC32A0BA733ADB3E1BAFE1AA16B39649FF013C6D78F402B690B64B51152DB050
25,080,714 UART: [art] PUB.Y = 48A069C79E6E3FADDF6B98E282E847BB1D5C6E193AFA393CF9ADE03E0E15DF3B4FC07C79D460895672ED07783CBBF964
25,088,018 UART: [art] SIG.R = 1FAE46ECFE426DD925EEB77BEC2467A592242E5C7187EC95B796BD92EA0755FA2796BB57C6D8DFE45B3ADDAE5489E515
25,095,390 UART: [art] SIG.S = 9759CCFBE8D7AE3DD9871A6EE4D322D8810CFA50F50212D4BD8604BE1BA7F5A0BB746F13A7FDAA6909478EAF4256FFBB
26,074,258 UART: Caliptra RT
26,074,975 UART: [state] CFI Enabled
26,240,019 UART: [rt] RT listening for mailbox commands...
26,253,442 >>> mbox cmd response: failed
26,253,840 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,283,436 UART: [rt]cmd =0x46505652, len=4
26,284,678 UART: [rt] FIPS Version
26,286,020 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,438,580 ready_for_fw is high
3,439,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,341 >>> mbox cmd response: success
14,728,963 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,020,785 UART:
19,021,185 UART: Running Caliptra FMC ...
19,022,371 UART:
19,022,552 UART: [state] CFI Enabled
19,073,266 UART: [fht] FMC Alias Private Key: 7
20,837,117 UART: [art] Extend RT PCRs Done
20,838,339 UART: [art] Lock RT PCRs Done
20,840,205 UART: [art] Populate DV Done
20,845,726 UART: [fht] FMC Alias Private Key: 7
20,847,425 UART: [art] Derive CDI
20,848,231 UART: [art] Store in in slot 0x4
20,906,004 UART: [art] Derive Key Pair
20,907,056 UART: [art] Store priv key in slot 0x5
23,370,585 UART: [art] Derive Key Pair - Done
23,383,741 UART: [art] Signing Cert with AUTHO
23,385,075 UART: RITY.KEYID = 7
25,096,452 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,963 UART: [art] PUB.X = BC887EC4F223FFBB6922091CE95AD3FD1D06B6D5CA7F881651A109CD9E7ED169C77D123E514E01BE377CFE697CCECFE3
25,105,220 UART: [art] PUB.Y = E69EAB0BF2E0FEF27ACC893604A3C99DE6E671669F803C1988379EC3A82A0E11311295547C465EDE67DE50CF0A9CFA9A
25,112,528 UART: [art] SIG.R = 02168E5519A477C6755ABC89A9039B82BD278FA365EB4A0123212B89F86A3F383E29C5DF9A1D7053FA157A0A57F599A2
25,119,888 UART: [art] SIG.S = 0C0EAD65719CD22D2AD0D77B9CB53DBF6F6C26E5234D9288A6F6670EE5B4E2C42DBDD769EE3CC0F4422666CC77DB531E
26,098,901 UART: Caliptra RT
26,099,588 UART: [state] CFI Enabled
26,263,803 UART: [rt] RT listening for mailbox commands...
26,277,319 >>> mbox cmd response: failed
26,277,697 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,307,463 UART: [rt]cmd =0x46505652, len=4
26,308,699 UART: [rt] FIPS Version
26,310,075 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
192,946 UART:
193,324 UART: Running Caliptra ROM ...
194,428 UART:
604,220 UART: [state] CFI Enabled
617,274 UART: [state] LifecycleState = Unprovisioned
619,698 UART: [state] DebugLocked = No
621,240 UART: [state] WD Timer not started. Device not locked for debugging
625,707 UART: [kat] SHA2-256
815,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,441 UART: [kat] ++
826,922 UART: [kat] sha1
838,616 UART: [kat] SHA2-256
841,641 UART: [kat] SHA2-384
846,638 UART: [kat] SHA2-512-ACC
849,223 UART: [kat] ECC-384
3,289,833 UART: [kat] HMAC-384Kdf
3,302,663 UART: [kat] LMS
3,834,541 UART: [kat] --
3,839,547 UART: [cold-reset] ++
3,840,556 UART: [fht] FHT @ 0x50003400
3,851,740 UART: [idev] ++
3,852,460 UART: [idev] CDI.KEYID = 6
3,853,350 UART: [idev] SUBJECT.KEYID = 7
3,854,593 UART: [idev] UDS.KEYID = 0
3,855,496 ready_for_fw is high
3,855,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,088 UART: [idev] Erasing UDS.KEYID = 0
6,328,621 UART: [idev] Sha1 KeyId Algorithm
6,351,586 UART: [idev] --
6,355,718 UART: [ldev] ++
6,356,411 UART: [ldev] CDI.KEYID = 6
6,357,340 UART: [ldev] SUBJECT.KEYID = 5
6,358,498 UART: [ldev] AUTHORITY.KEYID = 7
6,359,731 UART: [ldev] FE.KEYID = 1
6,370,867 UART: [ldev] Erasing FE.KEYID = 1
8,851,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,870 UART: [ldev] --
10,644,702 UART: [fwproc] Wait for Commands...
10,647,658 UART: [fwproc] Recv command 0x46574c44
10,649,920 UART: [fwproc] Recv'd Img size: 114084 bytes
14,094,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,826,942 >>> mbox cmd response: success
14,827,475 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,831,052 UART: [afmc] ++
14,831,782 UART: [afmc] CDI.KEYID = 6
14,832,890 UART: [afmc] SUBJECT.KEYID = 7
14,834,441 UART: [afmc] AUTHORITY.KEYID = 5
17,341,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,042 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,295 UART: [afmc] --
19,138,055 UART: [cold-reset] --
19,142,788 UART: [state] Locking Datavault
19,148,755 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,942 UART: [state] Locking ICCM
19,153,802 UART: [exit] Launching FMC @ 0x40000130
19,162,489 UART:
19,162,725 UART: Running Caliptra FMC ...
19,163,827 UART:
19,163,987 UART: [state] CFI Enabled
19,171,732 UART: [fht] FMC Alias Private Key: 7
20,928,968 UART: [art] Extend RT PCRs Done
20,930,188 UART: [art] Lock RT PCRs Done
20,931,869 UART: [art] Populate DV Done
20,937,063 UART: [fht] FMC Alias Private Key: 7
20,938,659 UART: [art] Derive CDI
20,939,396 UART: [art] Store in in slot 0x4
20,981,929 UART: [art] Derive Key Pair
20,982,926 UART: [art] Store priv key in slot 0x5
23,410,408 UART: [art] Derive Key Pair - Done
23,423,560 UART: [art] Signing Cert with AUTHO
23,424,864 UART: RITY.KEYID = 7
25,130,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,623 UART: [art] PUB.X = E0156A5B103F5CA217C3AE4D736BC64510FC2F48F4D0BA607D1E1846410BEC0B2EA5D82D730DE24E4BE661CA25DB3100
25,138,895 UART: [art] PUB.Y = 14E7A463EF04EE5E63EED0BA624D3E7B8361023FFB641F6A676F92FFC67F7C81526D22B17936B3191DF9E616ACD8BF45
25,146,154 UART: [art] SIG.R = BC8B253F9C11F751C810BE7A3D9ADD65765D11B86983A979F225540908F57743F068ED7ACC4AD9889B1FCE92318B2505
25,153,575 UART: [art] SIG.S = 31D2B10E0DCDAE92798F81188FF0F6FBB00298DD2DD1BB50FB3C7EAA781F05D610D243550B3333A7B2CD90DE9078D2EF
26,132,839 UART: Caliptra RT
26,133,554 UART: [state] CFI Enabled
26,250,185 UART: [rt] RT listening for mailbox commands...
26,263,980 >>> mbox cmd response: failed
26,264,373 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,294,142 UART: [rt]cmd =0x46505652, len=4
26,295,424 UART: [rt] FIPS Version
26,296,802 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,754,141 ready_for_fw is high
3,754,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,582 >>> mbox cmd response: success
14,947,210 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,197,881 UART:
19,198,289 UART: Running Caliptra FMC ...
19,199,387 UART:
19,199,545 UART: [state] CFI Enabled
19,207,499 UART: [fht] FMC Alias Private Key: 7
20,964,404 UART: [art] Extend RT PCRs Done
20,965,636 UART: [art] Lock RT PCRs Done
20,967,184 UART: [art] Populate DV Done
20,972,656 UART: [fht] FMC Alias Private Key: 7
20,974,421 UART: [art] Derive CDI
20,975,235 UART: [art] Store in in slot 0x4
21,017,614 UART: [art] Derive Key Pair
21,018,643 UART: [art] Store priv key in slot 0x5
23,445,294 UART: [art] Derive Key Pair - Done
23,458,021 UART: [art] Signing Cert with AUTHO
23,459,327 UART: RITY.KEYID = 7
25,164,641 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,153 UART: [art] PUB.X = 497E3706A8CDDD10C0E514D8B9118C64EC318895487CC42907F8DB59DC214BDCA820594E3BAF34B546A1148635028388
25,173,393 UART: [art] PUB.Y = 60AF0C5517D3A4BB671C4927F7561A7991BDC096BE2EA02F4D4835A45A1909759A119CBF87FB50111FFA0CA6F9CA0E69
25,180,628 UART: [art] SIG.R = 4753725FF2EDEE23425966AD09C5CDDF652476191782631859546E7F79B45B058C4199CBA060A33FA68C902E5A3CF744
25,188,055 UART: [art] SIG.S = 863EC920522421A6581F730F89F3F022C9454BEE6D6314BC29E52CECF089B2F643611DAB4873CB0339CB36CB3EC68D32
26,166,883 UART: Caliptra RT
26,167,577 UART: [state] CFI Enabled
26,285,341 UART: [rt] RT listening for mailbox commands...
26,299,186 >>> mbox cmd response: failed
26,299,589 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,329,139 UART: [rt]cmd =0x46505652, len=4
26,330,420 UART: [rt] FIPS Version
26,331,765 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,433 UART: [kat] SHA2-256
892,371 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,882 UART: [kat] HMAC-384Kdf
907,420 UART: [kat] LMS
1,475,616 UART: [kat] --
1,476,607 UART: [cold-reset] ++
1,477,091 UART: [fht] Storing FHT @ 0x50003400
1,479,956 UART: [idev] ++
1,480,124 UART: [idev] CDI.KEYID = 6
1,480,484 UART: [idev] SUBJECT.KEYID = 7
1,480,908 UART: [idev] UDS.KEYID = 0
1,481,253 ready_for_fw is high
1,481,253 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,132 UART: [idev] Erasing UDS.KEYID = 0
1,505,110 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,766 UART: [idev] --
1,514,833 UART: [ldev] ++
1,515,001 UART: [ldev] CDI.KEYID = 6
1,515,364 UART: [ldev] SUBJECT.KEYID = 5
1,515,790 UART: [ldev] AUTHORITY.KEYID = 7
1,516,253 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,713 UART: [fwproc] Waiting for Commands...
1,586,410 UART: [fwproc] Received command 0x46574c44
1,587,201 UART: [fwproc] Received Image of size 114084 bytes
2,882,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,275 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,627 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,094 >>> mbox cmd response: success
3,074,094 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,075,284 UART: [afmc] ++
3,075,452 UART: [afmc] CDI.KEYID = 6
3,075,814 UART: [afmc] SUBJECT.KEYID = 7
3,076,239 UART: [afmc] AUTHORITY.KEYID = 5
3,111,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,782 UART: [afmc] --
3,154,672 UART: [cold-reset] --
3,155,414 UART: [state] Locking Datavault
3,156,605 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,209 UART: [state] Locking ICCM
3,157,825 UART: [exit] Launching FMC @ 0x40000130
3,163,154 UART:
3,163,170 UART: Running Caliptra FMC ...
3,163,578 UART:
3,163,632 UART: [state] CFI Enabled
3,173,919 UART: [fht] FMC Alias Private Key: 7
3,282,176 UART: [art] Extend RT PCRs Done
3,282,604 UART: [art] Lock RT PCRs Done
3,283,910 UART: [art] Populate DV Done
3,292,125 UART: [fht] FMC Alias Private Key: 7
3,293,095 UART: [art] Derive CDI
3,293,375 UART: [art] Store in in slot 0x4
3,378,982 UART: [art] Derive Key Pair
3,379,342 UART: [art] Store priv key in slot 0x5
3,392,190 UART: [art] Derive Key Pair - Done
3,407,182 UART: [art] Signing Cert with AUTHO
3,407,662 UART: RITY.KEYID = 7
3,423,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,167 UART: [art] PUB.X = 76DA2A880F8FB20F9BD847DE7A29DF640A173DD7D77DC7D82DA2A6506E3CC811A1D610780429765796FA1DAC59C6947E
3,430,935 UART: [art] PUB.Y = 8624A4992158E2D357298777096BFC86BCDE418B1495F58BCDD70520CA6F001DECDA92A42E090F73F7FC4151416712B0
3,437,851 UART: [art] SIG.R = 34860EDCE8B430C06344EAF272207DBF60EA69A1D67D7F498EC617B1765C634600D60678EF3F268A3C47D3CA0422A54C
3,444,594 UART: [art] SIG.S = 80E8626C1564E3D4345A6610DEF1F31E29375906D2232F7FF9F4D425EB48009B5EC078F6BD6879BB3F0A553E20A34F7F
3,468,331 UART: Caliptra RT
3,468,584 UART: [state] CFI Enabled
3,577,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,184 >>> mbox cmd response: failed
3,590,184 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,512 UART: [rt]cmd =0x46505652, len=4
3,620,172 UART: [rt] FIPS Version
3,621,329 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,539 ready_for_fw is high
1,362,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,452 >>> mbox cmd response: success
2,926,452 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,987,698 UART:
2,987,714 UART: Running Caliptra FMC ...
2,988,122 UART:
2,988,176 UART: [state] CFI Enabled
2,998,361 UART: [fht] FMC Alias Private Key: 7
3,105,892 UART: [art] Extend RT PCRs Done
3,106,320 UART: [art] Lock RT PCRs Done
3,107,702 UART: [art] Populate DV Done
3,116,167 UART: [fht] FMC Alias Private Key: 7
3,117,125 UART: [art] Derive CDI
3,117,405 UART: [art] Store in in slot 0x4
3,203,052 UART: [art] Derive Key Pair
3,203,412 UART: [art] Store priv key in slot 0x5
3,216,774 UART: [art] Derive Key Pair - Done
3,231,769 UART: [art] Signing Cert with AUTHO
3,232,249 UART: RITY.KEYID = 7
3,247,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,388 UART: [art] PUB.X = 346BC1A666B2995B7B37EB867E79245F20A6EEF450C95FF70CCEB4E9175B2A78269A23887690A8294E0AB48E4E208DD6
3,255,156 UART: [art] PUB.Y = 729A687A8F047456898E56E541FEDB366A3D871F407EC3A6F7B78C2F6478123339386BB67A8999A369AC53F5D6FC8A90
3,262,101 UART: [art] SIG.R = BE58E885A82970AD408DA36D1235C4897C31C553BD5F0110B16C033EE95F99F280E9A8E7547FB3D7F162B89DEA9A135E
3,268,871 UART: [art] SIG.S = 6F61ECF63811C74D093C4F9DD28E006B454F55D21DF9664F5E83F90ED31E6C6BD1EBFC392F2509EFADCFBBCE72DB77F6
3,292,825 UART: Caliptra RT
3,293,078 UART: [state] CFI Enabled
3,401,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,368 >>> mbox cmd response: failed
3,414,368 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,722 UART: [rt]cmd =0x46505652, len=4
3,444,382 UART: [rt] FIPS Version
3,445,499 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,676 UART: [kat] SHA2-256
882,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,722 UART: [kat] ++
886,874 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,967 UART: [kat] SHA2-512-ACC
897,868 UART: [kat] ECC-384
903,583 UART: [kat] HMAC-384Kdf
908,273 UART: [kat] LMS
1,476,469 UART: [kat] --
1,477,522 UART: [cold-reset] ++
1,477,854 UART: [fht] Storing FHT @ 0x50003400
1,480,633 UART: [idev] ++
1,480,801 UART: [idev] CDI.KEYID = 6
1,481,161 UART: [idev] SUBJECT.KEYID = 7
1,481,585 UART: [idev] UDS.KEYID = 0
1,481,930 ready_for_fw is high
1,481,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,561 UART: [idev] Erasing UDS.KEYID = 0
1,506,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,707 UART: [idev] --
1,515,846 UART: [ldev] ++
1,516,014 UART: [ldev] CDI.KEYID = 6
1,516,377 UART: [ldev] SUBJECT.KEYID = 5
1,516,803 UART: [ldev] AUTHORITY.KEYID = 7
1,517,266 UART: [ldev] FE.KEYID = 1
1,522,494 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,001 UART: [ldev] --
1,587,452 UART: [fwproc] Waiting for Commands...
1,588,125 UART: [fwproc] Received command 0x46574c44
1,588,916 UART: [fwproc] Received Image of size 114084 bytes
2,883,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,057 >>> mbox cmd response: success
3,075,057 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,076,255 UART: [afmc] ++
3,076,423 UART: [afmc] CDI.KEYID = 6
3,076,785 UART: [afmc] SUBJECT.KEYID = 7
3,077,210 UART: [afmc] AUTHORITY.KEYID = 5
3,112,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,314 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,004 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,029 UART: [afmc] --
3,156,035 UART: [cold-reset] --
3,156,871 UART: [state] Locking Datavault
3,157,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,592 UART: [state] Locking ICCM
3,159,224 UART: [exit] Launching FMC @ 0x40000130
3,164,553 UART:
3,164,569 UART: Running Caliptra FMC ...
3,164,977 UART:
3,165,120 UART: [state] CFI Enabled
3,175,997 UART: [fht] FMC Alias Private Key: 7
3,283,704 UART: [art] Extend RT PCRs Done
3,284,132 UART: [art] Lock RT PCRs Done
3,285,588 UART: [art] Populate DV Done
3,293,819 UART: [fht] FMC Alias Private Key: 7
3,294,747 UART: [art] Derive CDI
3,295,027 UART: [art] Store in in slot 0x4
3,380,538 UART: [art] Derive Key Pair
3,380,898 UART: [art] Store priv key in slot 0x5
3,393,916 UART: [art] Derive Key Pair - Done
3,408,912 UART: [art] Signing Cert with AUTHO
3,409,392 UART: RITY.KEYID = 7
3,424,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,423 UART: [art] PUB.X = 5643BF12DB4D34C293D13B34C47E452FD03D981B8DEED72F1B384150B036AEA21360278ACE7A88DC284D475DB2615C27
3,432,199 UART: [art] PUB.Y = AC8406D20120611E40DA875987C7CC535F1191136646A748CE9CC5E87CB03F957737C0F0C5F320DCCD4B9985399F6935
3,439,139 UART: [art] SIG.R = BE1F22EBDE99A66921088A9350D887674432FC7CA58F4260AF948EC8ACE93DF531478B4D5173B0C8F81A6AC69D637F03
3,445,909 UART: [art] SIG.S = 115552C0B0B7122A750327774D6254BBC027DFC82FAABCD59B18B8A55761BC46E0EB01DBF4EEED46B4FDA9BF574962B6
3,469,204 UART: Caliptra RT
3,469,549 UART: [state] CFI Enabled
3,577,966 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,025 >>> mbox cmd response: failed
3,591,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,323 UART: [rt]cmd =0x46505652, len=4
3,620,983 UART: [rt] FIPS Version
3,621,850 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,694 ready_for_fw is high
1,363,694 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,707 >>> mbox cmd response: success
2,925,707 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,986,983 UART:
2,986,999 UART: Running Caliptra FMC ...
2,987,407 UART:
2,987,550 UART: [state] CFI Enabled
2,998,239 UART: [fht] FMC Alias Private Key: 7
3,106,464 UART: [art] Extend RT PCRs Done
3,106,892 UART: [art] Lock RT PCRs Done
3,108,550 UART: [art] Populate DV Done
3,116,777 UART: [fht] FMC Alias Private Key: 7
3,117,897 UART: [art] Derive CDI
3,118,177 UART: [art] Store in in slot 0x4
3,204,450 UART: [art] Derive Key Pair
3,204,810 UART: [art] Store priv key in slot 0x5
3,218,662 UART: [art] Derive Key Pair - Done
3,233,577 UART: [art] Signing Cert with AUTHO
3,234,057 UART: RITY.KEYID = 7
3,249,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,112 UART: [art] PUB.X = 9F1FE27EA3110291FAF33CADD88277434FA014B5F40C92075C8AB7BBB91652FF892ED8AC305E005B6CF0FB2B5546E58F
3,256,865 UART: [art] PUB.Y = 76D99A355C19DCD29FBC7D8F3CA2A7D094E5B1BA0113796874F8AEF9F5ED008349D1E191A04AC3F09BFA6EFFB76A1B78
3,263,810 UART: [art] SIG.R = 3C43860219F6C2328A70EFE524CFD85004694DB9BEC675ACA8EC77BF6B48DDAF92CECCEF392EC0444B669210DD9302DF
3,270,589 UART: [art] SIG.S = D6C96B05AD25A9BC1274157FC7153A07376CECFFD662585D1E694106E43C0AFB039B725A562A419FEFA78E59183BEE01
3,294,482 UART: Caliptra RT
3,294,827 UART: [state] CFI Enabled
3,402,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,349 >>> mbox cmd response: failed
3,415,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,561 UART: [rt]cmd =0x46505652, len=4
3,445,221 UART: [rt] FIPS Version
3,446,430 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,462 UART: [idev] ++
1,175,630 UART: [idev] CDI.KEYID = 6
1,175,990 UART: [idev] SUBJECT.KEYID = 7
1,176,414 UART: [idev] UDS.KEYID = 0
1,176,759 ready_for_fw is high
1,176,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,456 UART: [idev] Erasing UDS.KEYID = 0
1,201,611 UART: [idev] Sha1 KeyId Algorithm
1,210,095 UART: [idev] --
1,211,283 UART: [ldev] ++
1,211,451 UART: [ldev] CDI.KEYID = 6
1,211,814 UART: [ldev] SUBJECT.KEYID = 5
1,212,240 UART: [ldev] AUTHORITY.KEYID = 7
1,212,703 UART: [ldev] FE.KEYID = 1
1,217,837 UART: [ldev] Erasing FE.KEYID = 1
1,244,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,009 UART: [ldev] --
1,284,474 UART: [fwproc] Wait for Commands...
1,285,182 UART: [fwproc] Recv command 0x46574c44
1,285,910 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,751 >>> mbox cmd response: success
2,772,751 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,797 UART: [afmc] ++
2,773,965 UART: [afmc] CDI.KEYID = 6
2,774,327 UART: [afmc] SUBJECT.KEYID = 7
2,774,752 UART: [afmc] AUTHORITY.KEYID = 5
2,810,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,366 UART: [afmc] --
2,853,476 UART: [cold-reset] --
2,854,486 UART: [state] Locking Datavault
2,855,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,491 UART: [state] Locking ICCM
2,856,953 UART: [exit] Launching FMC @ 0x40000130
2,862,282 UART:
2,862,298 UART: Running Caliptra FMC ...
2,862,706 UART:
2,862,760 UART: [state] CFI Enabled
2,873,007 UART: [fht] FMC Alias Private Key: 7
2,981,496 UART: [art] Extend RT PCRs Done
2,981,924 UART: [art] Lock RT PCRs Done
2,983,348 UART: [art] Populate DV Done
2,991,423 UART: [fht] FMC Alias Private Key: 7
2,992,499 UART: [art] Derive CDI
2,992,779 UART: [art] Store in in slot 0x4
3,078,652 UART: [art] Derive Key Pair
3,079,012 UART: [art] Store priv key in slot 0x5
3,092,038 UART: [art] Derive Key Pair - Done
3,106,685 UART: [art] Signing Cert with AUTHO
3,107,165 UART: RITY.KEYID = 7
3,121,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,758 UART: [art] PUB.X = D00185870B53161A10850A6AF4F9C55AD13B9142B98C6B39FECF7DDBDD4CD50452E3651D33396204D10FA0F850EBC7A7
3,129,518 UART: [art] PUB.Y = 8C5EB4D825EC38E93BA0D64382C26293507B8302CDC8497B7969B249DC33A207514AF51F775E403CD37B1D0090391E5E
3,136,438 UART: [art] SIG.R = B4D10E1F51452100F70FE8A84CE8F40D22F8FA0020EE5B0B1095F154964EB6B647D4D38872AF439D730880A2D5BD88A6
3,143,153 UART: [art] SIG.S = 8401F661436547143F65C286E45B9E8B748C3C82C56A11DA11FCCCC0A01FB05305C6D7A2B683BFA24F027540E5CE0637
3,167,066 UART: Caliptra RT
3,167,319 UART: [state] CFI Enabled
3,274,861 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,368 >>> mbox cmd response: failed
3,287,368 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,546 UART: [rt]cmd =0x46505652, len=4
3,317,206 UART: [rt] FIPS Version
3,318,213 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,130 >>> mbox cmd response: success
2,622,130 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,684,672 UART:
2,684,688 UART: Running Caliptra FMC ...
2,685,096 UART:
2,685,150 UART: [state] CFI Enabled
2,695,551 UART: [fht] FMC Alias Private Key: 7
2,803,174 UART: [art] Extend RT PCRs Done
2,803,602 UART: [art] Lock RT PCRs Done
2,805,004 UART: [art] Populate DV Done
2,813,253 UART: [fht] FMC Alias Private Key: 7
2,814,415 UART: [art] Derive CDI
2,814,695 UART: [art] Store in in slot 0x4
2,900,576 UART: [art] Derive Key Pair
2,900,936 UART: [art] Store priv key in slot 0x5
2,914,204 UART: [art] Derive Key Pair - Done
2,928,970 UART: [art] Signing Cert with AUTHO
2,929,450 UART: RITY.KEYID = 7
2,944,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,245 UART: [art] PUB.X = 3D59A7810E83000A044ABF9482547BF256FF51CB2E32E076B5E3E30BA5A799F443E5A80C76608C5D9D6FB2584CF05A36
2,951,982 UART: [art] PUB.Y = BB3226E9CDD1131460E532DEE22A65303B378CED277CB62C58CD156A4C78F55E0004591D1DD51E5FFB5B5B5BC0E6D488
2,958,919 UART: [art] SIG.R = 962E89340423E3BD9C68F7BD3BA8D7B4EC46B544CC9FE7CCFE6C88A9E55EC086A5BAA4125B78CE8A63533FB3D6C4F796
2,965,706 UART: [art] SIG.S = B68088BD07FE92B93289D4B702E2BD960FAF0FEE1C2F77BB0C5B8E649229640FC291D326AF342E87A89A04BDB6FE7D05
2,989,333 UART: Caliptra RT
2,989,586 UART: [state] CFI Enabled
3,097,682 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,110,079 >>> mbox cmd response: failed
3,110,079 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,563 UART: [rt]cmd =0x46505652, len=4
3,140,223 UART: [rt] FIPS Version
3,141,382 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,827 UART: [kat] LMS
1,171,155 UART: [kat] --
1,171,746 UART: [cold-reset] ++
1,172,250 UART: [fht] FHT @ 0x50003400
1,175,019 UART: [idev] ++
1,175,187 UART: [idev] CDI.KEYID = 6
1,175,547 UART: [idev] SUBJECT.KEYID = 7
1,175,971 UART: [idev] UDS.KEYID = 0
1,176,316 ready_for_fw is high
1,176,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,449 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,522 UART: [ldev] ++
1,209,690 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,479 UART: [ldev] AUTHORITY.KEYID = 7
1,210,942 UART: [ldev] FE.KEYID = 1
1,216,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,954 UART: [ldev] --
1,281,321 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,757 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,367 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,182 >>> mbox cmd response: success
2,770,182 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,771,204 UART: [afmc] ++
2,771,372 UART: [afmc] CDI.KEYID = 6
2,771,734 UART: [afmc] SUBJECT.KEYID = 7
2,772,159 UART: [afmc] AUTHORITY.KEYID = 5
2,807,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,725 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,453 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,338 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,939 UART: [afmc] --
2,851,057 UART: [cold-reset] --
2,851,673 UART: [state] Locking Datavault
2,853,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,646 UART: [state] Locking ICCM
2,854,226 UART: [exit] Launching FMC @ 0x40000130
2,859,555 UART:
2,859,571 UART: Running Caliptra FMC ...
2,859,979 UART:
2,860,122 UART: [state] CFI Enabled
2,870,523 UART: [fht] FMC Alias Private Key: 7
2,978,786 UART: [art] Extend RT PCRs Done
2,979,214 UART: [art] Lock RT PCRs Done
2,980,932 UART: [art] Populate DV Done
2,989,009 UART: [fht] FMC Alias Private Key: 7
2,990,163 UART: [art] Derive CDI
2,990,443 UART: [art] Store in in slot 0x4
3,076,006 UART: [art] Derive Key Pair
3,076,366 UART: [art] Store priv key in slot 0x5
3,089,806 UART: [art] Derive Key Pair - Done
3,104,474 UART: [art] Signing Cert with AUTHO
3,104,954 UART: RITY.KEYID = 7
3,120,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,805 UART: [art] PUB.X = 8268CCF37D196BB6AA69909800579E75C4CC576E45EA63B79B84B189A322DE96F6551536AF056FFB8CF214B05729EB37
3,127,552 UART: [art] PUB.Y = 5D5E4CACC7109B55EFF7C1D2F610F59A5E85DE8E856A6D07E71BB2197B47A198DFC5CC77C78DF316CDB951F9E1F2659F
3,134,519 UART: [art] SIG.R = 51935189BB5FA7264EE04C6156479F588F7EF5985BE46AF1E03658716ECAA14058B841E00C11B2D27ABFAEB4E52959C4
3,141,290 UART: [art] SIG.S = 5BF65C8719B0832DAF9344A12098B10163C88A226ACB9228D5567BF674455D92453632DCE0AC5AA1F4F8F51E72C92DF6
3,164,908 UART: Caliptra RT
3,165,253 UART: [state] CFI Enabled
3,273,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,333 >>> mbox cmd response: failed
3,286,333 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,883 UART: [rt]cmd =0x46505652, len=4
3,316,543 UART: [rt] FIPS Version
3,317,664 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,644 ready_for_fw is high
1,061,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,619 >>> mbox cmd response: success
2,624,619 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,686,289 UART:
2,686,305 UART: Running Caliptra FMC ...
2,686,713 UART:
2,686,856 UART: [state] CFI Enabled
2,697,417 UART: [fht] FMC Alias Private Key: 7
2,805,518 UART: [art] Extend RT PCRs Done
2,805,946 UART: [art] Lock RT PCRs Done
2,807,614 UART: [art] Populate DV Done
2,816,107 UART: [fht] FMC Alias Private Key: 7
2,817,105 UART: [art] Derive CDI
2,817,385 UART: [art] Store in in slot 0x4
2,902,806 UART: [art] Derive Key Pair
2,903,166 UART: [art] Store priv key in slot 0x5
2,917,158 UART: [art] Derive Key Pair - Done
2,931,872 UART: [art] Signing Cert with AUTHO
2,932,352 UART: RITY.KEYID = 7
2,947,680 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,445 UART: [art] PUB.X = 002B4C5D629FB29D5EB3FC9D4BB36EF67BDBF590D7B639443931D8CB001C9C199EE6833E9FAE220932EB3A090BAD3429
2,955,176 UART: [art] PUB.Y = CED6E45CB4B9A63E4D9A0390620EF3240D7BF4ED0259B0A71CDAC73E62DA0D9E49501FB60DE0B7A0A5A1F90A7183B808
2,962,120 UART: [art] SIG.R = F5481042E251357A9AEB43F0EAF93517AFE2FE3D8C73482CDF1C9930DE12F064AA2B18AD19366D29B00892E54094EF7C
2,968,895 UART: [art] SIG.S = 0718A4C68C2CFC4E09874D914048E784485AC8D3A4B9BFC8F906264E443AE678A8809705B651962331172C695698F779
2,992,990 UART: Caliptra RT
2,993,335 UART: [state] CFI Enabled
3,101,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,545 >>> mbox cmd response: failed
3,113,545 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,673 UART: [rt]cmd =0x46505652, len=4
3,143,333 UART: [rt] FIPS Version
3,144,398 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,402 UART: [kat] SHA2-256
890,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,081 UART: [kat] ++
895,233 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,141 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,174,601 ready_for_fw is high
1,174,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,780 UART: [ldev] ++
1,208,948 UART: [ldev] CDI.KEYID = 6
1,209,312 UART: [ldev] SUBJECT.KEYID = 5
1,209,739 UART: [ldev] AUTHORITY.KEYID = 7
1,210,202 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,681 >>> mbox cmd response: success
2,768,681 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,769,926 UART: [afmc] ++
2,770,094 UART: [afmc] CDI.KEYID = 6
2,770,457 UART: [afmc] SUBJECT.KEYID = 7
2,770,883 UART: [afmc] AUTHORITY.KEYID = 5
2,806,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,066 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,881 UART: [afmc] --
2,849,835 UART: [cold-reset] --
2,850,443 UART: [state] Locking Datavault
2,851,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,218 UART: [state] Locking ICCM
2,852,674 UART: [exit] Launching FMC @ 0x40000130
2,858,003 UART:
2,858,019 UART: Running Caliptra FMC ...
2,858,427 UART:
2,858,481 UART: [state] CFI Enabled
2,869,140 UART: [fht] FMC Alias Private Key: 7
2,977,751 UART: [art] Extend RT PCRs Done
2,978,179 UART: [art] Lock RT PCRs Done
2,979,745 UART: [art] Populate DV Done
2,988,156 UART: [fht] FMC Alias Private Key: 7
2,989,186 UART: [art] Derive CDI
2,989,466 UART: [art] Store in in slot 0x4
3,075,385 UART: [art] Derive Key Pair
3,075,745 UART: [art] Store priv key in slot 0x5
3,088,999 UART: [art] Derive Key Pair - Done
3,103,655 UART: [art] Signing Cert with AUTHO
3,104,135 UART: RITY.KEYID = 7
3,119,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,408 UART: [art] PUB.X = DCBCA4DBED6FA660F735C8C3EFC137508E9501BC355ED69AE86F59A29266D39DA63F598B90183CDAAA7968EC4FC01693
3,127,193 UART: [art] PUB.Y = B8027F28850A849A37EA673EDDD5BCF406FD462E1F877AAB5B8054C6F17FE3FE07AECE155AD6BC8D72E4990E1D9A3A86
3,134,148 UART: [art] SIG.R = 592E5932E641B9FC023974B24D17CB3901EFB4F88E052ED06E901FDC27148AC7E2F43AF9612FFC10D9877A802E5074E0
3,140,913 UART: [art] SIG.S = 02132A39E35771500DC5F04276C27EAD73CA0AE25847DA8550FE0495B1718891970DE91ABE2C2D57457601FC2E4C3CC4
3,164,368 UART: Caliptra RT
3,164,621 UART: [state] CFI Enabled
3,272,926 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,897 >>> mbox cmd response: failed
3,285,897 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,065 UART: [rt]cmd =0x46505652, len=4
3,315,725 UART: [rt] FIPS Version
3,316,782 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,702 ready_for_fw is high
1,056,702 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,541 >>> mbox cmd response: success
2,619,541 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,682,109 UART:
2,682,125 UART: Running Caliptra FMC ...
2,682,533 UART:
2,682,587 UART: [state] CFI Enabled
2,692,782 UART: [fht] FMC Alias Private Key: 7
2,800,391 UART: [art] Extend RT PCRs Done
2,800,819 UART: [art] Lock RT PCRs Done
2,802,021 UART: [art] Populate DV Done
2,810,066 UART: [fht] FMC Alias Private Key: 7
2,811,156 UART: [art] Derive CDI
2,811,436 UART: [art] Store in in slot 0x4
2,896,983 UART: [art] Derive Key Pair
2,897,343 UART: [art] Store priv key in slot 0x5
2,910,055 UART: [art] Derive Key Pair - Done
2,924,759 UART: [art] Signing Cert with AUTHO
2,925,239 UART: RITY.KEYID = 7
2,940,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,412 UART: [art] PUB.X = 4265ADC14CB7F17F799892FAFB7A445BF0DF475B994CD7656EC1F91A23961CF3434D62060CB0277A01CA56ACEAC51C47
2,948,185 UART: [art] PUB.Y = CC3A3949E0F40BDD0026376E5C73F47F4F77CCB2229AD81A95A2D9266A086C13723E273FE140C20F64DF4F98A2B98406
2,955,105 UART: [art] SIG.R = F039A86DE2292C24D97DE5B4F131C53ED19711DDA73DBD45CAF8060AA7EB60762051A66D1745CA94FE216A2B7FBEA93A
2,961,885 UART: [art] SIG.S = E1AEF4B7EEF907966CCB8E78F64CDB81F434E4AD686C226804EEE504A5A1CBAF14B2247BED5A279F3052454E051FD003
2,985,493 UART: Caliptra RT
2,985,746 UART: [state] CFI Enabled
3,093,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,105,795 >>> mbox cmd response: failed
3,105,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,117 UART: [rt]cmd =0x46505652, len=4
3,135,777 UART: [rt] FIPS Version
3,136,912 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 ready_for_fw is high
1,174,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,869 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,856 UART: [fwproc] Recv command 0x46574c44
1,283,589 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,500 >>> mbox cmd response: success
2,769,500 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,770,575 UART: [afmc] ++
2,770,743 UART: [afmc] CDI.KEYID = 6
2,771,106 UART: [afmc] SUBJECT.KEYID = 7
2,771,532 UART: [afmc] AUTHORITY.KEYID = 5
2,806,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,989 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,934 UART: [afmc] --
2,850,894 UART: [cold-reset] --
2,851,610 UART: [state] Locking Datavault
2,852,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,283 UART: [state] Locking ICCM
2,853,827 UART: [exit] Launching FMC @ 0x40000130
2,859,156 UART:
2,859,172 UART: Running Caliptra FMC ...
2,859,580 UART:
2,859,723 UART: [state] CFI Enabled
2,869,886 UART: [fht] FMC Alias Private Key: 7
2,978,937 UART: [art] Extend RT PCRs Done
2,979,365 UART: [art] Lock RT PCRs Done
2,981,097 UART: [art] Populate DV Done
2,989,482 UART: [fht] FMC Alias Private Key: 7
2,990,428 UART: [art] Derive CDI
2,990,708 UART: [art] Store in in slot 0x4
3,075,993 UART: [art] Derive Key Pair
3,076,353 UART: [art] Store priv key in slot 0x5
3,090,135 UART: [art] Derive Key Pair - Done
3,105,272 UART: [art] Signing Cert with AUTHO
3,105,752 UART: RITY.KEYID = 7
3,121,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,963 UART: [art] PUB.X = EDEA3ACFB68CBE88462B070C8E6AA49D915F32CF7C97F5C5794B0549086529B96BAA97869A9BC2832FCFDB72F884B766
3,128,735 UART: [art] PUB.Y = 0901579A12C797522032DBABE5BF1F3A927AB05FAEE1950C3D7A76DE789043998AEBEE9976B19A7B2B3C459145C27E60
3,135,682 UART: [art] SIG.R = 0DFE34AE5542D5263368F7DD0A1589C22A8579CAF49AD8F177E4ED0767D4F9BEA00045DCCFBF180E02A74498A4C0EE07
3,142,426 UART: [art] SIG.S = 1157F26926240856D31B0C5A81F844B03E7F32D8C951138E4CCC16952ED48849A3FC0122BD842BF3A5A94BE31DC341EB
3,165,964 UART: Caliptra RT
3,166,309 UART: [state] CFI Enabled
3,273,888 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,733 >>> mbox cmd response: failed
3,286,733 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,057 UART: [rt]cmd =0x46505652, len=4
3,316,717 UART: [rt] FIPS Version
3,317,870 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,867 ready_for_fw is high
1,055,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,318 >>> mbox cmd response: success
2,619,318 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,682,272 UART:
2,682,288 UART: Running Caliptra FMC ...
2,682,696 UART:
2,682,839 UART: [state] CFI Enabled
2,693,306 UART: [fht] FMC Alias Private Key: 7
2,801,989 UART: [art] Extend RT PCRs Done
2,802,417 UART: [art] Lock RT PCRs Done
2,804,065 UART: [art] Populate DV Done
2,812,150 UART: [fht] FMC Alias Private Key: 7
2,813,310 UART: [art] Derive CDI
2,813,590 UART: [art] Store in in slot 0x4
2,899,591 UART: [art] Derive Key Pair
2,899,951 UART: [art] Store priv key in slot 0x5
2,913,411 UART: [art] Derive Key Pair - Done
2,927,951 UART: [art] Signing Cert with AUTHO
2,928,431 UART: RITY.KEYID = 7
2,943,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,264 UART: [art] PUB.X = C8C5EEE4C34AAF98F4AD44D4DD09A23F3F5ED90B1F9B71C229E86313C0C8EBE0A406EE1F167CD485363CA109CE470CBB
2,951,043 UART: [art] PUB.Y = 36DB9790C7DE7C7A7B1441ABF7A507F2A7C1C4E9FB1282216E70EB120D375B7D1801026B6616E4935DF7E7120DEB01DA
2,957,983 UART: [art] SIG.R = 2A3C56929449EB410EFA0F89AD6DF6665BAC93099206ED21B00E2AF4CCC70EF4104D8C8FE859B3DF13B8EB2CF37C5372
2,964,751 UART: [art] SIG.S = F4BB17959326BB590D27D2BB4BE52F5BD9E233F10890370161AA51E099BA861E6EBBB3D1B62C70F084326877F6957016
2,988,207 UART: Caliptra RT
2,988,552 UART: [state] CFI Enabled
3,097,161 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,109,586 >>> mbox cmd response: failed
3,109,586 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,150 UART: [rt]cmd =0x46505652, len=4
3,139,810 UART: [rt] FIPS Version
3,140,659 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,231 UART:
192,619 UART: Running Caliptra ROM ...
193,768 UART:
193,920 UART: [state] CFI Enabled
253,168 UART: [state] LifecycleState = Unprovisioned
255,154 UART: [state] DebugLocked = No
256,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,081 UART: [kat] SHA2-256
430,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,262 UART: [kat] ++
441,717 UART: [kat] sha1
452,683 UART: [kat] SHA2-256
455,339 UART: [kat] SHA2-384
462,039 UART: [kat] SHA2-512-ACC
464,414 UART: [kat] ECC-384
2,757,500 UART: [kat] HMAC-384Kdf
2,772,527 UART: [kat] LMS
3,962,834 UART: [kat] --
3,967,558 UART: [cold-reset] ++
3,968,929 UART: [fht] Storing FHT @ 0x50003400
3,980,769 UART: [idev] ++
3,981,331 UART: [idev] CDI.KEYID = 6
3,982,334 UART: [idev] SUBJECT.KEYID = 7
3,983,454 UART: [idev] UDS.KEYID = 0
3,984,479 ready_for_fw is high
3,984,850 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,128,195 UART: [idev] Erasing UDS.KEYID = 0
7,320,764 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,083 UART: [idev] --
7,347,700 UART: [ldev] ++
7,348,267 UART: [ldev] CDI.KEYID = 6
7,349,208 UART: [ldev] SUBJECT.KEYID = 5
7,350,475 UART: [ldev] AUTHORITY.KEYID = 7
7,351,635 UART: [ldev] FE.KEYID = 1
7,394,764 UART: [ldev] Erasing FE.KEYID = 1
10,728,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,433 UART: [ldev] --
13,107,964 UART: [fwproc] Waiting for Commands...
13,109,954 UART: [fwproc] Received command 0x46574c44
13,112,136 UART: [fwproc] Received Image of size 113760 bytes
17,164,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,716 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,626,501 >>> mbox cmd response: success
17,627,019 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,630,451 UART: [afmc] ++
17,631,040 UART: [afmc] CDI.KEYID = 6
17,631,956 UART: [afmc] SUBJECT.KEYID = 7
17,633,229 UART: [afmc] AUTHORITY.KEYID = 5
21,000,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,303,205 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,620 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,461 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,928 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,542 UART: [afmc] --
23,371,601 UART: [cold-reset] --
23,375,455 UART: [state] Locking Datavault
23,381,671 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,422 UART: [state] Locking ICCM
23,385,196 UART: [exit] Launching FMC @ 0x40000130
23,393,590 UART:
23,393,823 UART: Running Caliptra FMC ...
23,394,921 UART:
23,395,081 UART: [state] CFI Enabled
23,459,746 UART: [fht] FMC Alias Private Key: 7
25,797,617 UART: [art] Extend RT PCRs Done
25,798,833 UART: [art] Lock RT PCRs Done
25,800,592 UART: [art] Populate DV Done
25,806,096 UART: [fht] FMC Alias Private Key: 7
25,807,696 UART: [art] Derive CDI
25,808,509 UART: [art] Store in in slot 0x4
25,867,574 UART: [art] Derive Key Pair
25,868,573 UART: [art] Store priv key in slot 0x5
29,161,724 UART: [art] Derive Key Pair - Done
29,174,560 UART: [art] Signing Cert with AUTHO
29,175,868 UART: RITY.KEYID = 7
31,463,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,929 UART: [art] PUB.X = A64E79FD0347AE7601DD1D8A93FEDE7A7B3A8A556593DD805276ED64FB6209B268559357CB35463F9377C7B33FF9E4DB
31,472,154 UART: [art] PUB.Y = 58155925FA33A35F7E7C67AF50C215DB817984D773CE049AFEFE8F36A7D3CD9DB6DE367D1B5F085861124C3429742A9E
31,479,398 UART: [art] SIG.R = C4AAD41D9DBF9E7F00605D590C5F68745B738C45D73348409BC980864E595DB57D49799DBB362645E3FF510D68863091
31,486,780 UART: [art] SIG.S = 0BE24C682B1EB96D32FB253857C9F86D1509783DBA0FDD941EB1A55717F0B22B3A3590CBC4F1586CCEF890877AE73B57
32,791,674 UART: Caliptra RT
32,792,389 UART: [state] CFI Enabled
32,953,701 UART: [rt] RT listening for mailbox commands...
32,956,319 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,803,560 ready_for_fw is high
3,803,963 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,887,708 >>> mbox cmd response: success
17,888,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,584,560 UART:
23,584,946 UART: Running Caliptra FMC ...
23,586,146 UART:
23,586,317 UART: [state] CFI Enabled
23,652,184 UART: [fht] FMC Alias Private Key: 7
25,990,354 UART: [art] Extend RT PCRs Done
25,991,576 UART: [art] Lock RT PCRs Done
25,993,422 UART: [art] Populate DV Done
25,998,613 UART: [fht] FMC Alias Private Key: 7
26,000,202 UART: [art] Derive CDI
26,001,023 UART: [art] Store in in slot 0x4
26,060,918 UART: [art] Derive Key Pair
26,061,979 UART: [art] Store priv key in slot 0x5
29,355,054 UART: [art] Derive Key Pair - Done
29,367,790 UART: [art] Signing Cert with AUTHO
29,369,096 UART: RITY.KEYID = 7
31,656,560 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,074 UART: [art] PUB.X = E6DBA9715C7651B8433E279FC583AC9E5BD8AC07C31E9A069008AF233C53A218D623E19E26B3D301DF3E258EF2DE2313
31,665,290 UART: [art] PUB.Y = 572B7252F7BE7F65727D5579BDD3602F496D7DDC4DDE65A94D004D5FDD4AE612877D9311B12DAA92506A48BA8311ADD7
31,672,539 UART: [art] SIG.R = CE884C9C63368AB1684AC37B1592E0AA70F7E49525E5DB0686DB51BE078A83B900D8B68E759CDB639F95FE574022554B
31,679,939 UART: [art] SIG.S = 4115DFB620AFF41DF43442B6BB7A8EE14BDF844258E7559E3BC7CF5D21592F6A1C6017A10765A76F5D7940E98CF2BB31
32,984,873 UART: Caliptra RT
32,985,587 UART: [state] CFI Enabled
33,146,631 UART: [rt] RT listening for mailbox commands...
33,149,195 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
192,734 UART:
193,104 UART: Running Caliptra ROM ...
194,301 UART:
604,074 UART: [state] CFI Enabled
619,485 UART: [state] LifecycleState = Unprovisioned
621,432 UART: [state] DebugLocked = No
624,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,670 UART: [kat] SHA2-256
798,416 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,936 UART: [kat] ++
809,464 UART: [kat] sha1
821,873 UART: [kat] SHA2-256
824,562 UART: [kat] SHA2-384
831,403 UART: [kat] SHA2-512-ACC
833,766 UART: [kat] ECC-384
3,119,940 UART: [kat] HMAC-384Kdf
3,132,810 UART: [kat] LMS
4,322,912 UART: [kat] --
4,327,797 UART: [cold-reset] ++
4,329,736 UART: [fht] Storing FHT @ 0x50003400
4,340,662 UART: [idev] ++
4,341,274 UART: [idev] CDI.KEYID = 6
4,342,189 UART: [idev] SUBJECT.KEYID = 7
4,343,359 UART: [idev] UDS.KEYID = 0
4,344,339 ready_for_fw is high
4,344,535 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,487,277 UART: [idev] Erasing UDS.KEYID = 0
7,626,578 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,346 UART: [idev] --
7,651,141 UART: [ldev] ++
7,651,759 UART: [ldev] CDI.KEYID = 6
7,652,722 UART: [ldev] SUBJECT.KEYID = 5
7,653,925 UART: [ldev] AUTHORITY.KEYID = 7
7,655,148 UART: [ldev] FE.KEYID = 1
7,668,432 UART: [ldev] Erasing FE.KEYID = 1
10,957,780 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,292 UART: [ldev] --
13,318,616 UART: [fwproc] Waiting for Commands...
13,321,149 UART: [fwproc] Received command 0x46574c44
13,323,349 UART: [fwproc] Received Image of size 113760 bytes
17,377,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,839,102 >>> mbox cmd response: success
17,839,678 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,843,968 UART: [afmc] ++
17,844,550 UART: [afmc] CDI.KEYID = 6
17,845,487 UART: [afmc] SUBJECT.KEYID = 7
17,846,758 UART: [afmc] AUTHORITY.KEYID = 5
21,158,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,055 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,318 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,767 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,569 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,001 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,815 UART: [afmc] --
23,524,404 UART: [cold-reset] --
23,529,501 UART: [state] Locking Datavault
23,534,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,436 UART: [state] Locking ICCM
23,538,687 UART: [exit] Launching FMC @ 0x40000130
23,547,061 UART:
23,547,309 UART: Running Caliptra FMC ...
23,548,409 UART:
23,548,566 UART: [state] CFI Enabled
23,556,718 UART: [fht] FMC Alias Private Key: 7
25,887,469 UART: [art] Extend RT PCRs Done
25,888,687 UART: [art] Lock RT PCRs Done
25,890,414 UART: [art] Populate DV Done
25,895,980 UART: [fht] FMC Alias Private Key: 7
25,897,622 UART: [art] Derive CDI
25,898,451 UART: [art] Store in in slot 0x4
25,941,315 UART: [art] Derive Key Pair
25,942,355 UART: [art] Store priv key in slot 0x5
29,184,762 UART: [art] Derive Key Pair - Done
29,197,805 UART: [art] Signing Cert with AUTHO
29,199,104 UART: RITY.KEYID = 7
31,478,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,776 UART: [art] PUB.X = B5F5A9B6DBB1018A462B2DF14173054FC6F6C903302A55339036DF65EA5E44A3D8E26757BF0603D118D6B48CE6988968
31,487,042 UART: [art] PUB.Y = 4236ACBB12B7F7D9406279A1CEEF339B3FD993A0379AAA5BCF12BD25318FE140B64525EB45E7FAFEC28123AF0828FB14
31,494,306 UART: [art] SIG.R = 26FC97C72963CD9FE242D03B3A243C21384B6C5A8FC8B5E118F83CAF059494E0217A4A7DA99E15FC82A1382A5A6634CC
31,501,664 UART: [art] SIG.S = CB3582123505DAF308FF12E56AF6627F28BC5E830AF85B021E0D3264059F74787F4E0F969ECA45BBB6BD4AD93DD66363
32,806,712 UART: Caliptra RT
32,807,423 UART: [state] CFI Enabled
32,925,509 UART: [rt] RT listening for mailbox commands...
32,928,025 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
4,122,030 ready_for_fw is high
4,122,414 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,061,885 >>> mbox cmd response: success
18,062,792 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,698,672 UART:
23,699,064 UART: Running Caliptra FMC ...
23,700,163 UART:
23,700,312 UART: [state] CFI Enabled
23,708,437 UART: [fht] FMC Alias Private Key: 7
26,039,268 UART: [art] Extend RT PCRs Done
26,040,497 UART: [art] Lock RT PCRs Done
26,042,095 UART: [art] Populate DV Done
26,047,405 UART: [fht] FMC Alias Private Key: 7
26,049,112 UART: [art] Derive CDI
26,049,925 UART: [art] Store in in slot 0x4
26,092,152 UART: [art] Derive Key Pair
26,093,194 UART: [art] Store priv key in slot 0x5
29,334,949 UART: [art] Derive Key Pair - Done
29,347,889 UART: [art] Signing Cert with AUTHO
29,349,233 UART: RITY.KEYID = 7
31,628,739 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,248 UART: [art] PUB.X = 56557D54D7BAD5CF067157E98BF17D0C1A361B089717B161225491A218D8DE4511FB1360FE03AB05A28BDD0A4FDD2B26
31,637,537 UART: [art] PUB.Y = 255A9BCCAAC7F9C32C56DEB8EFFBAF3D827AF3DADC3B4653DD82DB0465BB0EA92FD353AEF4697E8040BDC1927948426F
31,644,811 UART: [art] SIG.R = B6700F5C9F62C65627C142884400EB098CE9D0EA5F521D921026C6E566F7CD129F6E6A60C608173A390C7CB0F6B4DB96
31,652,173 UART: [art] SIG.S = A8FD1747C30FD8C360DBB011DF26D18142FA92A7002C144A32F241B8E58F97E69463AE62454BC338B242E42E3F5DF1EF
32,957,659 UART: Caliptra RT
32,958,361 UART: [state] CFI Enabled
33,075,147 UART: [rt] RT listening for mailbox commands...
33,077,654 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
192,481 UART:
192,856 UART: Running Caliptra ROM ...
193,957 UART:
194,099 UART: [state] CFI Enabled
264,926 UART: [state] LifecycleState = Unprovisioned
266,827 UART: [state] DebugLocked = No
268,701 UART: [state] WD Timer not started. Device not locked for debugging
273,155 UART: [kat] SHA2-256
452,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,865 UART: [kat] ++
464,308 UART: [kat] sha1
475,391 UART: [kat] SHA2-256
478,403 UART: [kat] SHA2-384
483,913 UART: [kat] SHA2-512-ACC
486,848 UART: [kat] ECC-384
2,950,625 UART: [kat] HMAC-384Kdf
2,971,540 UART: [kat] LMS
3,501,048 UART: [kat] --
3,505,039 UART: [cold-reset] ++
3,506,042 UART: [fht] FHT @ 0x50003400
3,516,659 UART: [idev] ++
3,517,223 UART: [idev] CDI.KEYID = 6
3,518,200 UART: [idev] SUBJECT.KEYID = 7
3,519,370 UART: [idev] UDS.KEYID = 0
3,520,286 ready_for_fw is high
3,520,469 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,975 UART: [idev] Erasing UDS.KEYID = 0
6,024,042 UART: [idev] Sha1 KeyId Algorithm
6,047,711 UART: [idev] --
6,052,914 UART: [ldev] ++
6,053,492 UART: [ldev] CDI.KEYID = 6
6,054,403 UART: [ldev] SUBJECT.KEYID = 5
6,055,559 UART: [ldev] AUTHORITY.KEYID = 7
6,056,841 UART: [ldev] FE.KEYID = 1
6,099,414 UART: [ldev] Erasing FE.KEYID = 1
8,600,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,703 UART: [ldev] --
10,413,211 UART: [fwproc] Wait for Commands...
10,414,909 UART: [fwproc] Recv command 0x46574c44
10,416,953 UART: [fwproc] Recv'd Img size: 114084 bytes
13,812,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,207 >>> mbox cmd response: success
14,273,723 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,276,652 UART: [afmc] ++
14,277,232 UART: [afmc] CDI.KEYID = 6
14,278,297 UART: [afmc] SUBJECT.KEYID = 7
14,279,395 UART: [afmc] AUTHORITY.KEYID = 5
16,803,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,194 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,119 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,047 UART: [afmc] --
18,601,313 UART: [cold-reset] --
18,604,647 UART: [state] Locking Datavault
18,609,137 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,846 UART: [state] Locking ICCM
18,612,286 UART: [exit] Launching FMC @ 0x40000130
18,620,679 UART:
18,620,908 UART: Running Caliptra FMC ...
18,622,004 UART:
18,622,161 UART: [state] CFI Enabled
18,684,438 UART: [fht] FMC Alias Private Key: 7
20,448,630 UART: [art] Extend RT PCRs Done
20,449,829 UART: [art] Lock RT PCRs Done
20,451,450 UART: [art] Populate DV Done
20,457,016 UART: [fht] FMC Alias Private Key: 7
20,458,656 UART: [art] Derive CDI
20,459,464 UART: [art] Store in in slot 0x4
20,518,307 UART: [art] Derive Key Pair
20,519,358 UART: [art] Store priv key in slot 0x5
22,981,964 UART: [art] Derive Key Pair - Done
22,994,961 UART: [art] Signing Cert with AUTHO
22,996,267 UART: RITY.KEYID = 7
24,707,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,251 UART: [art] PUB.X = 534ACB2F3124A7BC5397BD5C27A291AC1B598FB356CFE9CD57AFA12AE02E304592EF8F106808B1991A4FE737F9D647C6
24,716,531 UART: [art] PUB.Y = 4FB18E0AECECBA4E65BFD70F2AE119F40FA9A1FAACC22CCBEEC835E81A7AE919D75CAC6859E0A0A49DD60D069C6B3E3D
24,723,849 UART: [art] SIG.R = 9D224A4D9B5C5E06E8C388CAB09394B4336C92CCADCE3EA8CC018DBADB45B4497DA5240B7036703DDADD44BDAB5D88D1
24,731,686 UART: [art] SIG.S = 479F8DBF9077D6FAE7CA880474CEE5F2B1DE6ABB817359D1446A6DB7D1F2E866F77C8C9FCF206D0184BB87E32156740F
25,710,182 UART: Caliptra RT
25,710,882 UART: [state] CFI Enabled
25,876,685 UART: [rt] RT listening for mailbox commands...
25,879,086 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
3,382,745 ready_for_fw is high
3,383,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,078,474 >>> mbox cmd response: success
14,079,272 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,365,508 UART:
18,365,905 UART: Running Caliptra FMC ...
18,367,056 UART:
18,367,234 UART: [state] CFI Enabled
18,435,142 UART: [fht] FMC Alias Private Key: 7
20,199,158 UART: [art] Extend RT PCRs Done
20,200,395 UART: [art] Lock RT PCRs Done
20,202,021 UART: [art] Populate DV Done
20,207,652 UART: [fht] FMC Alias Private Key: 7
20,209,247 UART: [art] Derive CDI
20,210,007 UART: [art] Store in in slot 0x4
20,268,331 UART: [art] Derive Key Pair
20,269,367 UART: [art] Store priv key in slot 0x5
22,732,372 UART: [art] Derive Key Pair - Done
22,745,214 UART: [art] Signing Cert with AUTHO
22,746,523 UART: RITY.KEYID = 7
24,458,074 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,581 UART: [art] PUB.X = E4BBAC9208A420699CDE83FBD5C271707751DAE1EE21BF32A1437A6AB131F8EA81FA914ADD5F0A79DACC835C38F931C2
24,466,876 UART: [art] PUB.Y = A923F741FF91AEC008291EFF9F1FF2C0C48CACB41545A39FED5D5FC8B00F1D4D562C853A46C1AF5A763961F9204D933A
24,474,119 UART: [art] SIG.R = 109A51FAA6ED06FA74B23152ABD559DC2605BBD43CF7472A4BD1C904734ED2FA0AB13BF2638438B94839B55007E8E76C
24,481,546 UART: [art] SIG.S = F32F984B43BC821B000F1537E5EAA19750E27E72F45946CBB4FA1952A32F5A645C678A48639A85185235B9DB760FAFCB
25,460,798 UART: Caliptra RT
25,461,518 UART: [state] CFI Enabled
25,625,155 UART: [rt] RT listening for mailbox commands...
25,627,722 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,149 writing to cptra_bootfsm_go
204,251 UART:
204,630 UART: Running Caliptra ROM ...
205,733 UART:
615,509 UART: [state] CFI Enabled
626,695 UART: [state] LifecycleState = Unprovisioned
628,578 UART: [state] DebugLocked = No
630,093 UART: [state] WD Timer not started. Device not locked for debugging
633,918 UART: [kat] SHA2-256
812,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
824,567 UART: [kat] ++
825,020 UART: [kat] sha1
834,757 UART: [kat] SHA2-256
837,784 UART: [kat] SHA2-384
844,628 UART: [kat] SHA2-512-ACC
847,576 UART: [kat] ECC-384
3,287,941 UART: [kat] HMAC-384Kdf
3,301,389 UART: [kat] LMS
3,830,895 UART: [kat] --
3,834,396 UART: [cold-reset] ++
3,835,410 UART: [fht] FHT @ 0x50003400
3,847,808 UART: [idev] ++
3,848,414 UART: [idev] CDI.KEYID = 6
3,849,334 UART: [idev] SUBJECT.KEYID = 7
3,850,515 UART: [idev] UDS.KEYID = 0
3,851,439 ready_for_fw is high
3,851,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,751 UART: [idev] Erasing UDS.KEYID = 0
6,324,234 UART: [idev] Sha1 KeyId Algorithm
6,347,636 UART: [idev] --
6,352,711 UART: [ldev] ++
6,353,281 UART: [ldev] CDI.KEYID = 6
6,354,166 UART: [ldev] SUBJECT.KEYID = 5
6,355,373 UART: [ldev] AUTHORITY.KEYID = 7
6,356,663 UART: [ldev] FE.KEYID = 1
6,367,822 UART: [ldev] Erasing FE.KEYID = 1
8,837,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,107 UART: [ldev] --
10,630,935 UART: [fwproc] Wait for Commands...
10,632,916 UART: [fwproc] Recv command 0x46574c44
10,635,007 UART: [fwproc] Recv'd Img size: 114084 bytes
14,034,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,492,002 >>> mbox cmd response: success
14,492,550 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,496,463 UART: [afmc] ++
14,497,062 UART: [afmc] CDI.KEYID = 6
14,497,955 UART: [afmc] SUBJECT.KEYID = 7
14,499,120 UART: [afmc] AUTHORITY.KEYID = 5
16,995,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,627 UART: [afmc] --
18,793,001 UART: [cold-reset] --
18,796,760 UART: [state] Locking Datavault
18,803,954 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,637 UART: [state] Locking ICCM
18,807,013 UART: [exit] Launching FMC @ 0x40000130
18,815,415 UART:
18,815,655 UART: Running Caliptra FMC ...
18,816,760 UART:
18,816,923 UART: [state] CFI Enabled
18,824,866 UART: [fht] FMC Alias Private Key: 7
20,581,796 UART: [art] Extend RT PCRs Done
20,583,020 UART: [art] Lock RT PCRs Done
20,584,632 UART: [art] Populate DV Done
20,589,881 UART: [fht] FMC Alias Private Key: 7
20,591,526 UART: [art] Derive CDI
20,592,344 UART: [art] Store in in slot 0x4
20,635,552 UART: [art] Derive Key Pair
20,636,556 UART: [art] Store priv key in slot 0x5
23,063,155 UART: [art] Derive Key Pair - Done
23,076,051 UART: [art] Signing Cert with AUTHO
23,077,364 UART: RITY.KEYID = 7
24,783,272 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,777 UART: [art] PUB.X = 21E5C57893D4E8D7EC6A4C06CDCFF2CBA60CFB1650E901FF8F1D9EC9F56CDFE19B7C34C4AE2CD88E3231F1AB39CDB274
24,792,099 UART: [art] PUB.Y = 06D76012BBDC478410BBD06C8D90B6A1DA960B463584725B1DA689B1C71EE261E0FC8AA4C6CE884F042FF8D846F0C096
24,799,368 UART: [art] SIG.R = 58FACAA25CB3D1D3FE22BFD310CC1F89EB1F3BAA51ACD0FB67E930115FE71FB827DCC01E99E34674E7C11C51C5DE26AA
24,806,819 UART: [art] SIG.S = A277C7B9354C419C22F22F8004722159DDB15FFF8369E6329BA3903A5CCCE20C2E2BCA0B883A403C5E6883C1F896272B
25,785,832 UART: Caliptra RT
25,786,531 UART: [state] CFI Enabled
25,903,208 UART: [rt] RT listening for mailbox commands...
25,905,706 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
3,694,554 ready_for_fw is high
3,694,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,727 >>> mbox cmd response: success
14,265,368 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,510,302 UART:
18,510,700 UART: Running Caliptra FMC ...
18,511,836 UART:
18,512,000 UART: [state] CFI Enabled
18,519,841 UART: [fht] FMC Alias Private Key: 7
20,276,858 UART: [art] Extend RT PCRs Done
20,278,086 UART: [art] Lock RT PCRs Done
20,279,992 UART: [art] Populate DV Done
20,285,084 UART: [fht] FMC Alias Private Key: 7
20,286,629 UART: [art] Derive CDI
20,287,447 UART: [art] Store in in slot 0x4
20,330,272 UART: [art] Derive Key Pair
20,331,312 UART: [art] Store priv key in slot 0x5
22,757,775 UART: [art] Derive Key Pair - Done
22,770,606 UART: [art] Signing Cert with AUTHO
22,771,935 UART: RITY.KEYID = 7
24,477,510 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,012 UART: [art] PUB.X = 946EC3D424F1693022CADB1A78B79EEE2815B7AAEAE9A012F6EB83F7B26DA1D741F3CF3B88D403B430A768F553ACDDCF
24,486,292 UART: [art] PUB.Y = 274243921BDA682447445A33C773A5BE1EA0EF54E70043052209364EF422A2DC7BB1F9DBD8C44EF7B4AF59861ACEC9F6
24,493,580 UART: [art] SIG.R = D080AC1E722F21C2B1923E2F1E0F9CE164EB88ED26C6498B7DE1A5BDBB7220259CEAD8E73F221BF0917137D7C03B900C
24,501,002 UART: [art] SIG.S = E3DD5F3E864F4C5733154C957C350E4BEAA80A7206A7D5EE2699A1AA4C86B31292A12587214FD668B73FEB8DD41268FF
25,480,362 UART: Caliptra RT
25,481,063 UART: [state] CFI Enabled
25,598,036 UART: [rt] RT listening for mailbox commands...
25,600,541 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,440 UART:
192,799 UART: Running Caliptra ROM ...
193,903 UART:
194,045 UART: [state] CFI Enabled
265,480 UART: [state] LifecycleState = Unprovisioned
267,897 UART: [state] DebugLocked = No
270,767 UART: [state] WD Timer not started. Device not locked for debugging
275,945 UART: [kat] SHA2-256
465,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,615 UART: [kat] ++
477,059 UART: [kat] sha1
489,941 UART: [kat] SHA2-256
492,947 UART: [kat] SHA2-384
499,794 UART: [kat] SHA2-512-ACC
502,375 UART: [kat] ECC-384
2,948,122 UART: [kat] HMAC-384Kdf
2,972,868 UART: [kat] LMS
3,504,595 UART: [kat] --
3,509,885 UART: [cold-reset] ++
3,512,313 UART: [fht] FHT @ 0x50003400
3,524,291 UART: [idev] ++
3,524,995 UART: [idev] CDI.KEYID = 6
3,525,981 UART: [idev] SUBJECT.KEYID = 7
3,527,150 UART: [idev] UDS.KEYID = 0
3,528,073 ready_for_fw is high
3,528,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,755 UART: [idev] Erasing UDS.KEYID = 0
6,031,174 UART: [idev] Sha1 KeyId Algorithm
6,053,916 UART: [idev] --
6,060,429 UART: [ldev] ++
6,061,170 UART: [ldev] CDI.KEYID = 6
6,062,078 UART: [ldev] SUBJECT.KEYID = 5
6,063,239 UART: [ldev] AUTHORITY.KEYID = 7
6,064,466 UART: [ldev] FE.KEYID = 1
6,101,417 UART: [ldev] Erasing FE.KEYID = 1
8,609,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,863 UART: [ldev] --
10,412,003 UART: [fwproc] Wait for Commands...
10,414,164 UART: [fwproc] Recv command 0x46574c44
10,416,442 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,858 >>> mbox cmd response: success
14,597,393 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,600,702 UART: [afmc] ++
14,601,402 UART: [afmc] CDI.KEYID = 6
14,602,565 UART: [afmc] SUBJECT.KEYID = 7
14,604,115 UART: [afmc] AUTHORITY.KEYID = 5
17,152,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,799 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,017 UART: [afmc] --
18,970,612 UART: [cold-reset] --
18,973,938 UART: [state] Locking Datavault
18,978,981 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,136 UART: [state] Locking ICCM
18,982,691 UART: [exit] Launching FMC @ 0x40000130
18,991,375 UART:
18,991,614 UART: Running Caliptra FMC ...
18,992,713 UART:
18,992,868 UART: [state] CFI Enabled
19,053,281 UART: [fht] FMC Alias Private Key: 7
20,816,850 UART: [art] Extend RT PCRs Done
20,818,073 UART: [art] Lock RT PCRs Done
20,819,838 UART: [art] Populate DV Done
20,825,083 UART: [fht] FMC Alias Private Key: 7
20,826,724 UART: [art] Derive CDI
20,827,480 UART: [art] Store in in slot 0x4
20,885,905 UART: [art] Derive Key Pair
20,886,942 UART: [art] Store priv key in slot 0x5
23,350,458 UART: [art] Derive Key Pair - Done
23,363,666 UART: [art] Signing Cert with AUTHO
23,364,961 UART: RITY.KEYID = 7
25,076,354 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,861 UART: [art] PUB.X = 07673368001D21DED6FCD75A06DE14F39BEBC9E809E071EF38B6E14366FF4B6D24601AB1D49D2611D7EC66F6553B8382
25,085,119 UART: [art] PUB.Y = BEADD15E643C1B984D4A0471538EDCD4196B79264556EB79B2314D5160ACCD79A28B14073F69CAF3223041C5C2DD8BC2
25,092,351 UART: [art] SIG.R = 28262D4F6416E21F74BA488C173B0E0583BA9C82451477A21E56648906BFB11071D1188B4DB485A8C703978B335ACF47
25,099,723 UART: [art] SIG.S = CE250B03FA9132272B883EE49FC848BB1A65E2D4AF7F00C911D6FD7D714EA0430677268273DB195C12397A381F7C2FBC
26,078,703 UART: Caliptra RT
26,079,394 UART: [state] CFI Enabled
26,243,497 UART: [rt] RT listening for mailbox commands...
26,245,864 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,429,504 ready_for_fw is high
3,430,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,743,067 >>> mbox cmd response: success
14,743,860 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,031,529 UART:
19,031,927 UART: Running Caliptra FMC ...
19,033,071 UART:
19,033,232 UART: [state] CFI Enabled
19,099,014 UART: [fht] FMC Alias Private Key: 7
20,863,222 UART: [art] Extend RT PCRs Done
20,864,444 UART: [art] Lock RT PCRs Done
20,866,130 UART: [art] Populate DV Done
20,871,674 UART: [fht] FMC Alias Private Key: 7
20,873,168 UART: [art] Derive CDI
20,873,932 UART: [art] Store in in slot 0x4
20,932,196 UART: [art] Derive Key Pair
20,933,237 UART: [art] Store priv key in slot 0x5
23,395,974 UART: [art] Derive Key Pair - Done
23,409,073 UART: [art] Signing Cert with AUTHO
23,410,417 UART: RITY.KEYID = 7
25,122,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,807 UART: [art] PUB.X = 3421398956BF3C7A98316E7DDD1010DDA72C25A67781BDD4B06D8A5232602FAE4890F8C546720320DB4432D37BEB32E7
25,131,042 UART: [art] PUB.Y = E3E4EB9C2DD226CB127B7710F0776E098C0388BDA7C747F5675909440E2B5D1A97405BB3A149EBBB1839F3CF0D25634E
25,138,352 UART: [art] SIG.R = 4A31A6C0C8F3626BFE5C1B6830B40DAEB45FC20609903027898CB497497EFB7CAFB2FC32E57B40E626F8D18C90CFED85
25,145,759 UART: [art] SIG.S = C47C1CAFFA23DB4D52CBBAF82D7ECA05A3F48742023B89EB4EB042E4D2AF686A2A48D3E81EDAA4B6D646DD3F172D7031
26,124,653 UART: Caliptra RT
26,125,363 UART: [state] CFI Enabled
26,289,428 UART: [rt] RT listening for mailbox commands...
26,291,890 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,475 writing to cptra_bootfsm_go
193,746 UART:
194,118 UART: Running Caliptra ROM ...
195,330 UART:
604,966 UART: [state] CFI Enabled
617,842 UART: [state] LifecycleState = Unprovisioned
620,202 UART: [state] DebugLocked = No
621,937 UART: [state] WD Timer not started. Device not locked for debugging
626,248 UART: [kat] SHA2-256
816,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,912 UART: [kat] ++
827,436 UART: [kat] sha1
839,725 UART: [kat] SHA2-256
842,730 UART: [kat] SHA2-384
848,505 UART: [kat] SHA2-512-ACC
851,091 UART: [kat] ECC-384
3,292,225 UART: [kat] HMAC-384Kdf
3,305,978 UART: [kat] LMS
3,837,826 UART: [kat] --
3,843,258 UART: [cold-reset] ++
3,845,220 UART: [fht] FHT @ 0x50003400
3,857,697 UART: [idev] ++
3,858,335 UART: [idev] CDI.KEYID = 6
3,859,371 UART: [idev] SUBJECT.KEYID = 7
3,860,550 UART: [idev] UDS.KEYID = 0
3,861,479 ready_for_fw is high
3,861,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,058 UART: [idev] Erasing UDS.KEYID = 0
6,337,321 UART: [idev] Sha1 KeyId Algorithm
6,358,597 UART: [idev] --
6,363,561 UART: [ldev] ++
6,364,246 UART: [ldev] CDI.KEYID = 6
6,365,131 UART: [ldev] SUBJECT.KEYID = 5
6,366,343 UART: [ldev] AUTHORITY.KEYID = 7
6,367,576 UART: [ldev] FE.KEYID = 1
6,377,513 UART: [ldev] Erasing FE.KEYID = 1
8,859,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,708 UART: [ldev] --
10,652,990 UART: [fwproc] Wait for Commands...
10,655,687 UART: [fwproc] Recv command 0x46574c44
10,658,001 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,919 >>> mbox cmd response: success
14,835,455 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,838,881 UART: [afmc] ++
14,839,601 UART: [afmc] CDI.KEYID = 6
14,840,803 UART: [afmc] SUBJECT.KEYID = 7
14,842,248 UART: [afmc] AUTHORITY.KEYID = 5
17,339,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,611 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,941 UART: [afmc] --
19,138,410 UART: [cold-reset] --
19,141,856 UART: [state] Locking Datavault
19,147,441 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,593 UART: [state] Locking ICCM
19,151,273 UART: [exit] Launching FMC @ 0x40000130
19,159,960 UART:
19,160,223 UART: Running Caliptra FMC ...
19,161,332 UART:
19,161,502 UART: [state] CFI Enabled
19,169,501 UART: [fht] FMC Alias Private Key: 7
20,926,779 UART: [art] Extend RT PCRs Done
20,928,000 UART: [art] Lock RT PCRs Done
20,929,872 UART: [art] Populate DV Done
20,935,282 UART: [fht] FMC Alias Private Key: 7
20,936,815 UART: [art] Derive CDI
20,937,553 UART: [art] Store in in slot 0x4
20,980,305 UART: [art] Derive Key Pair
20,981,340 UART: [art] Store priv key in slot 0x5
23,408,092 UART: [art] Derive Key Pair - Done
23,420,982 UART: [art] Signing Cert with AUTHO
23,422,292 UART: RITY.KEYID = 7
25,128,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,719 UART: [art] PUB.X = BA052FD6A807E3E0F6B3809C1108A1D850972E55E9F8E52C9A0E3529213550FB3D82F70954DB4541CADC1DB785E238D2
25,136,944 UART: [art] PUB.Y = 3048A00575DE37E86FF5BCC3CEE09841E0F4E39F8C65C81CCBBF9D7E85F314451D141933C8CDF0511D2FCA04F069303E
25,144,258 UART: [art] SIG.R = 492AA7CDC0538481D0F7B46D6B88D82228EE5D858BF0067633C8E59AFA82B9779E42FBBB0D92453CF8D4D700D3F04014
25,151,623 UART: [art] SIG.S = E2C6205F1C3FECE2EF36A367AE512E14B805E17AE92315615ECD5E7E606F15E84159FE86434572B0158DB75D58F4D46C
26,130,048 UART: Caliptra RT
26,130,756 UART: [state] CFI Enabled
26,247,674 UART: [rt] RT listening for mailbox commands...
26,250,191 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
3,752,960 ready_for_fw is high
3,753,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,941,121 >>> mbox cmd response: success
14,941,716 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,191,801 UART:
19,192,203 UART: Running Caliptra FMC ...
19,193,507 UART:
19,193,668 UART: [state] CFI Enabled
19,201,508 UART: [fht] FMC Alias Private Key: 7
20,959,074 UART: [art] Extend RT PCRs Done
20,960,306 UART: [art] Lock RT PCRs Done
20,961,554 UART: [art] Populate DV Done
20,966,979 UART: [fht] FMC Alias Private Key: 7
20,968,472 UART: [art] Derive CDI
20,969,236 UART: [art] Store in in slot 0x4
21,011,942 UART: [art] Derive Key Pair
21,012,949 UART: [art] Store priv key in slot 0x5
23,440,154 UART: [art] Derive Key Pair - Done
23,452,876 UART: [art] Signing Cert with AUTHO
23,454,195 UART: RITY.KEYID = 7
25,160,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,667 UART: [art] PUB.X = 21F8BC91A99834B4432E9633FD1CBB9DAF63F75D72811731EEBCB2E41FA4A10C5067200E1DA14E48C09C6A61CC6FC1E9
25,168,970 UART: [art] PUB.Y = FA362E44563EAD0FB9B5E9B92E5189CBBE2B741BDBFF102AD0687D24423C69D26436A24BA0FF5C0B2BCCDBACD59A3CF1
25,176,253 UART: [art] SIG.R = 88E5147920AE75AA8A32D98333796BA04EC7634A409860F4381032A22393F40C6FA95D87AFF95A9C1806560813EEC99E
25,183,642 UART: [art] SIG.S = DEF6B63DF611B9794AA784034F6B0CF0C1443E8B8830E2375033E8E2BB5AE19E3F772318DB0C39360F9F100611700BC4
26,162,204 UART: Caliptra RT
26,162,899 UART: [state] CFI Enabled
26,279,425 UART: [rt] RT listening for mailbox commands...
26,281,410 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,071 UART:
192,450 UART: Running Caliptra ROM ...
193,641 UART:
193,817 UART: [state] CFI Enabled
265,277 UART: [state] LifecycleState = Unprovisioned
267,197 UART: [state] DebugLocked = No
268,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,463 UART: [kat] SHA2-256
443,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,631 UART: [kat] ++
454,126 UART: [kat] sha1
465,782 UART: [kat] SHA2-256
468,616 UART: [kat] SHA2-384
473,867 UART: [kat] SHA2-512-ACC
476,238 UART: [kat] ECC-384
2,769,269 UART: [kat] HMAC-384Kdf
2,799,042 UART: [kat] LMS
3,989,316 UART: [kat] --
3,993,876 UART: [cold-reset] ++
3,995,593 UART: [fht] Storing FHT @ 0x50003400
4,006,571 UART: [idev] ++
4,007,145 UART: [idev] CDI.KEYID = 6
4,008,033 UART: [idev] SUBJECT.KEYID = 7
4,009,303 UART: [idev] UDS.KEYID = 0
4,010,262 ready_for_fw is high
4,010,452 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,556 UART: [idev] Erasing UDS.KEYID = 0
7,343,902 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,821 UART: [idev] --
7,367,705 UART: [ldev] ++
7,368,284 UART: [ldev] CDI.KEYID = 6
7,369,254 UART: [ldev] SUBJECT.KEYID = 5
7,370,466 UART: [ldev] AUTHORITY.KEYID = 7
7,371,695 UART: [ldev] FE.KEYID = 1
7,399,359 UART: [ldev] Erasing FE.KEYID = 1
10,732,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,930 UART: [ldev] --
13,094,600 UART: [fwproc] Waiting for Commands...
13,097,179 UART: [fwproc] Received command 0x46574c44
13,099,363 UART: [fwproc] Received Image of size 113760 bytes
17,142,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,216,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,601,892 >>> mbox cmd response: success
17,602,438 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,605,330 UART: [afmc] ++
17,605,970 UART: [afmc] CDI.KEYID = 6
17,606,879 UART: [afmc] SUBJECT.KEYID = 7
17,608,094 UART: [afmc] AUTHORITY.KEYID = 5
20,959,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,767 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,281,162 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,296,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,310,402 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,332,560 UART: [afmc] --
23,336,907 UART: [cold-reset] --
23,341,040 UART: [state] Locking Datavault
23,345,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,347,018 UART: [state] Locking ICCM
23,349,532 UART: [exit] Launching FMC @ 0x40000130
23,357,918 UART:
23,358,158 UART: Running Caliptra FMC ...
23,359,263 UART:
23,359,422 UART: [state] CFI Enabled
23,423,585 UART: [fht] FMC Alias Private Key: 7
25,761,967 UART: [art] Extend RT PCRs Done
25,763,209 UART: [art] Lock RT PCRs Done
25,764,952 UART: [art] Populate DV Done
25,770,207 UART: [fht] FMC Alias Private Key: 7
25,771,753 UART: [art] Derive CDI
25,772,487 UART: [art] Store in in slot 0x4
25,831,775 UART: [art] Derive Key Pair
25,832,810 UART: [art] Store priv key in slot 0x5
29,125,773 UART: [art] Derive Key Pair - Done
29,138,504 UART: [art] Signing Cert with AUTHO
29,139,806 UART: RITY.KEYID = 7
31,426,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,427,820 UART: [art] PUB.X = 15BA7C1B2F7665B61582893C47F7FA490052065AF34B10D6D77C7D3640B207F3BA422F515761A0A8B7468556A10A1456
31,435,096 UART: [art] PUB.Y = 285F4F00D732731AA6065BD277E892517970BB84D19D7BCB2872AE4C9A1C55D156159EF1A0D146AE045A7D5636349B75
31,442,279 UART: [art] SIG.R = 1D1E540DFAEF45824B2D79098B56489C56401413A0B82ADD03C0CF8A02F0CD28E9AF4A1B54C0FDC6F9908567AA619BFC
31,449,667 UART: [art] SIG.S = B42F7F1D5319C62A996C2E8415440691574AB46608A9F326BEDA328C132A8849A57BE93827C9DC36E1A28A6C0D3134C0
32,754,157 UART: Caliptra RT
32,754,877 UART: [state] CFI Enabled
32,915,962 UART: [rt] RT listening for mailbox commands...
32,947,702 UART: [rt]cmd =0xaabbccdd, len=4
32,949,221 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,803,671 ready_for_fw is high
3,804,081 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,866,874 >>> mbox cmd response: success
17,867,653 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,567,450 UART:
23,567,821 UART: Running Caliptra FMC ...
23,569,016 UART:
23,569,189 UART: [state] CFI Enabled
23,637,328 UART: [fht] FMC Alias Private Key: 7
25,974,865 UART: [art] Extend RT PCRs Done
25,976,093 UART: [art] Lock RT PCRs Done
25,977,456 UART: [art] Populate DV Done
25,982,868 UART: [fht] FMC Alias Private Key: 7
25,984,356 UART: [art] Derive CDI
25,985,122 UART: [art] Store in in slot 0x4
26,044,512 UART: [art] Derive Key Pair
26,045,554 UART: [art] Store priv key in slot 0x5
29,338,878 UART: [art] Derive Key Pair - Done
29,351,611 UART: [art] Signing Cert with AUTHO
29,352,915 UART: RITY.KEYID = 7
31,640,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,915 UART: [art] PUB.X = B43977017CA2DFA9734DD74CA40BC08F1CFB017E3423A7B4EA418651D722B2514CC88763FAD9FD3E81B8D9AD5E11BAE8
31,649,183 UART: [art] PUB.Y = E671762F5031D06F761F80248792463C8DA4A78185653663E1E0FBD5849E2C8709B1C55EF196F6E91481103496CE99EF
31,656,430 UART: [art] SIG.R = BC3A124B91CAC4525BA22FF78E3114C044AE0699B62F7DEF6595F34B81440253D9BD1E6FED3C8B9DE6FF195CE19160EB
31,663,798 UART: [art] SIG.S = 06E38E307ED86E3B71636C30109745DF8055C1EE2B751B117E10B5C086CE05E5ECBE5ED54A0C8ACDD8902B76436E47D7
32,968,589 UART: Caliptra RT
32,969,313 UART: [state] CFI Enabled
33,131,500 UART: [rt] RT listening for mailbox commands...
33,162,734 UART: [rt]cmd =0xaabbccdd, len=4
33,164,133 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
192,938 UART:
193,343 UART: Running Caliptra ROM ...
194,515 UART:
604,181 UART: [state] CFI Enabled
618,063 UART: [state] LifecycleState = Unprovisioned
620,010 UART: [state] DebugLocked = No
621,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,961 UART: [kat] SHA2-256
795,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,200 UART: [kat] ++
806,802 UART: [kat] sha1
817,271 UART: [kat] SHA2-256
820,000 UART: [kat] SHA2-384
825,990 UART: [kat] SHA2-512-ACC
828,422 UART: [kat] ECC-384
3,110,634 UART: [kat] HMAC-384Kdf
3,122,593 UART: [kat] LMS
4,312,710 UART: [kat] --
4,316,213 UART: [cold-reset] ++
4,317,655 UART: [fht] Storing FHT @ 0x50003400
4,329,203 UART: [idev] ++
4,329,766 UART: [idev] CDI.KEYID = 6
4,330,670 UART: [idev] SUBJECT.KEYID = 7
4,331,908 UART: [idev] UDS.KEYID = 0
4,332,886 ready_for_fw is high
4,333,092 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,019 UART: [idev] Erasing UDS.KEYID = 0
7,617,679 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,954 UART: [idev] --
7,642,296 UART: [ldev] ++
7,642,855 UART: [ldev] CDI.KEYID = 6
7,643,810 UART: [ldev] SUBJECT.KEYID = 5
7,645,014 UART: [ldev] AUTHORITY.KEYID = 7
7,646,298 UART: [ldev] FE.KEYID = 1
7,656,603 UART: [ldev] Erasing FE.KEYID = 1
10,946,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,497 UART: [ldev] --
13,310,912 UART: [fwproc] Waiting for Commands...
13,314,137 UART: [fwproc] Received command 0x46574c44
13,316,391 UART: [fwproc] Received Image of size 113760 bytes
17,365,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,739 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,831,360 >>> mbox cmd response: success
17,831,901 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,836,427 UART: [afmc] ++
17,837,010 UART: [afmc] CDI.KEYID = 6
17,837,920 UART: [afmc] SUBJECT.KEYID = 7
17,839,191 UART: [afmc] AUTHORITY.KEYID = 5
21,154,627 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,344 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,744 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,586 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,953 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,558 UART: [afmc] --
23,516,111 UART: [cold-reset] --
23,520,161 UART: [state] Locking Datavault
23,525,042 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,651 UART: [state] Locking ICCM
23,528,162 UART: [exit] Launching FMC @ 0x40000130
23,536,570 UART:
23,536,708 UART: Running Caliptra FMC ...
23,537,713 UART:
23,537,848 UART: [state] CFI Enabled
23,546,072 UART: [fht] FMC Alias Private Key: 7
25,876,733 UART: [art] Extend RT PCRs Done
25,878,336 UART: [art] Lock RT PCRs Done
25,879,667 UART: [art] Populate DV Done
25,885,148 UART: [fht] FMC Alias Private Key: 7
25,886,855 UART: [art] Derive CDI
25,887,688 UART: [art] Store in in slot 0x4
25,930,104 UART: [art] Derive Key Pair
25,931,138 UART: [art] Store priv key in slot 0x5
29,173,582 UART: [art] Derive Key Pair - Done
29,187,072 UART: [art] Signing Cert with AUTHO
29,188,582 UART: RITY.KEYID = 7
31,467,934 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,438 UART: [art] PUB.X = A71166B289CAB43CA3C4D4156CFECFE0F5FE85FFBECBD0D46DEF20DFC10CEDFF7C71499F67DBC77B04F76EE248D1D802
31,476,710 UART: [art] PUB.Y = E6380E717B107162C9E5AC2F8ED896B65B10BD0BF8810DC825C9E8168611B585A112395685F94B17208A6E2600B5FF4D
31,483,911 UART: [art] SIG.R = 908449D178520F4F42C2B20367C1B07C46F0FA9BC1C159B70F9D098CEC5A1B849E852BFF34C6C10C41BBA21C4F6F1413
31,491,328 UART: [art] SIG.S = 67C344DBA4F2EF82086C58985E0963A14BA56065D55C82734383C3DF5AB8A3EFEAF45519F0C7C713B413092E2D9C912D
32,796,260 UART: Caliptra RT
32,796,978 UART: [state] CFI Enabled
32,915,069 UART: [rt] RT listening for mailbox commands...
32,946,270 UART: [rt]cmd =0xaabbccdd, len=4
32,947,774 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,606 writing to cptra_bootfsm_go
4,129,911 ready_for_fw is high
4,130,365 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,078,394 >>> mbox cmd response: success
18,078,998 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,717,887 UART:
23,718,274 UART: Running Caliptra FMC ...
23,719,408 UART:
23,719,561 UART: [state] CFI Enabled
23,727,398 UART: [fht] FMC Alias Private Key: 7
26,058,433 UART: [art] Extend RT PCRs Done
26,059,659 UART: [art] Lock RT PCRs Done
26,061,395 UART: [art] Populate DV Done
26,066,860 UART: [fht] FMC Alias Private Key: 7
26,068,564 UART: [art] Derive CDI
26,069,376 UART: [art] Store in in slot 0x4
26,111,913 UART: [art] Derive Key Pair
26,112,910 UART: [art] Store priv key in slot 0x5
29,354,760 UART: [art] Derive Key Pair - Done
29,367,431 UART: [art] Signing Cert with AUTHO
29,368,737 UART: RITY.KEYID = 7
31,648,366 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,928 UART: [art] PUB.X = D0C1D3E64B98259927D188718DE285A886FBE69E37A5280B15F4601E71A63F941BF6627D728F8CF1CFC8EBE5CDAA38A6
31,657,111 UART: [art] PUB.Y = D7C3F5DC7F8E3F3DD0A13AFCA50D419EF42841EDD5322D865CFA0E8D93AA047B53E7E6F58B005C8EB4A1CA21D6683F6C
31,664,404 UART: [art] SIG.R = 987FFD1215C1BE5E48601A51546F12CC8B87B07A2E5BEF7CACF993F20984B22FACFEACCC66654952E9E6141256EE4EA7
31,671,792 UART: [art] SIG.S = 3F7C0A9BD11B67458A60B3FD52880195A12E07FFBA40753B19A09B04AD39C99A05DD3C004D229E90EC792F595455433F
32,976,963 UART: Caliptra RT
32,977,667 UART: [state] CFI Enabled
33,095,010 UART: [rt] RT listening for mailbox commands...
33,126,289 UART: [rt]cmd =0xaabbccdd, len=4
33,127,633 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,448 writing to cptra_bootfsm_go
192,566 UART:
192,929 UART: Running Caliptra ROM ...
194,114 UART:
194,666 UART: [state] CFI Enabled
264,745 UART: [state] LifecycleState = Unprovisioned
266,605 UART: [state] DebugLocked = No
268,626 UART: [state] WD Timer not started. Device not locked for debugging
272,952 UART: [kat] SHA2-256
452,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,631 UART: [kat] ++
464,083 UART: [kat] sha1
475,312 UART: [kat] SHA2-256
478,323 UART: [kat] SHA2-384
484,590 UART: [kat] SHA2-512-ACC
487,519 UART: [kat] ECC-384
2,949,866 UART: [kat] HMAC-384Kdf
2,973,068 UART: [kat] LMS
3,502,507 UART: [kat] --
3,505,958 UART: [cold-reset] ++
3,507,316 UART: [fht] FHT @ 0x50003400
3,518,664 UART: [idev] ++
3,519,231 UART: [idev] CDI.KEYID = 6
3,520,115 UART: [idev] SUBJECT.KEYID = 7
3,521,372 UART: [idev] UDS.KEYID = 0
3,522,270 ready_for_fw is high
3,522,465 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,012 UART: [idev] Erasing UDS.KEYID = 0
6,031,003 UART: [idev] Sha1 KeyId Algorithm
6,055,108 UART: [idev] --
6,058,865 UART: [ldev] ++
6,059,440 UART: [ldev] CDI.KEYID = 6
6,060,321 UART: [ldev] SUBJECT.KEYID = 5
6,061,529 UART: [ldev] AUTHORITY.KEYID = 7
6,062,768 UART: [ldev] FE.KEYID = 1
6,100,773 UART: [ldev] Erasing FE.KEYID = 1
8,603,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,935 UART: [ldev] --
10,414,302 UART: [fwproc] Wait for Commands...
10,415,806 UART: [fwproc] Recv command 0x46574c44
10,417,892 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,268,642 >>> mbox cmd response: success
14,269,164 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,272,371 UART: [afmc] ++
14,272,963 UART: [afmc] CDI.KEYID = 6
14,273,841 UART: [afmc] SUBJECT.KEYID = 7
14,275,059 UART: [afmc] AUTHORITY.KEYID = 5
16,804,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,039 UART: [afmc] --
18,606,694 UART: [cold-reset] --
18,610,766 UART: [state] Locking Datavault
18,614,605 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,258 UART: [state] Locking ICCM
18,617,626 UART: [exit] Launching FMC @ 0x40000130
18,626,081 UART:
18,626,316 UART: Running Caliptra FMC ...
18,627,417 UART:
18,627,572 UART: [state] CFI Enabled
18,688,537 UART: [fht] FMC Alias Private Key: 7
20,452,220 UART: [art] Extend RT PCRs Done
20,453,457 UART: [art] Lock RT PCRs Done
20,455,240 UART: [art] Populate DV Done
20,460,810 UART: [fht] FMC Alias Private Key: 7
20,462,347 UART: [art] Derive CDI
20,463,105 UART: [art] Store in in slot 0x4
20,521,141 UART: [art] Derive Key Pair
20,522,177 UART: [art] Store priv key in slot 0x5
22,985,177 UART: [art] Derive Key Pair - Done
22,998,319 UART: [art] Signing Cert with AUTHO
22,999,652 UART: RITY.KEYID = 7
24,711,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,673 UART: [art] PUB.X = 5771C4E325798DD9D82B254F478CD7ACB589FC3B4D818E3B074CEF11F1A20CA121B1D59224E495CEFE0BD4376B34B88A
24,719,982 UART: [art] PUB.Y = B8F94B1E835BA7FAA8E8298B872BCD9F37CD93AF64D1D7A38573A6564801115401C373FBD3F7236A999DAAAD2D11669E
24,727,284 UART: [art] SIG.R = 935CC0B1486023FE70C3E32BEAF9C3ADDD1BBD2C785C9E540D6782EEE0AF463ACFF5206A5023B053CC04DFBF841E92F8
24,734,694 UART: [art] SIG.S = F0BA9ECC74D6F603326373637905D165D229A42615E0572F2CECA881B1BAA6EA6C13D90D8175A1727F950D9AFBB46FF3
25,713,367 UART: Caliptra RT
25,714,082 UART: [state] CFI Enabled
25,878,429 UART: [rt] RT listening for mailbox commands...
25,909,782 UART: [rt]cmd =0xaabbccdd, len=4
25,911,107 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,559 writing to cptra_bootfsm_go
3,362,108 ready_for_fw is high
3,362,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,949 >>> mbox cmd response: success
14,042,752 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,324,035 UART:
18,324,437 UART: Running Caliptra FMC ...
18,325,580 UART:
18,325,729 UART: [state] CFI Enabled
18,393,491 UART: [fht] FMC Alias Private Key: 7
20,157,891 UART: [art] Extend RT PCRs Done
20,159,116 UART: [art] Lock RT PCRs Done
20,160,902 UART: [art] Populate DV Done
20,166,635 UART: [fht] FMC Alias Private Key: 7
20,168,223 UART: [art] Derive CDI
20,169,035 UART: [art] Store in in slot 0x4
20,226,044 UART: [art] Derive Key Pair
20,227,083 UART: [art] Store priv key in slot 0x5
22,690,281 UART: [art] Derive Key Pair - Done
22,703,279 UART: [art] Signing Cert with AUTHO
22,704,575 UART: RITY.KEYID = 7
24,416,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,892 UART: [art] PUB.X = 5A20D3F41C4F1F40E3CB0F58FB5FD530767ECD93539257CC9C76527183D99B691B8A1DC2B74FC52FA07D0ECBBAD41CAF
24,425,218 UART: [art] PUB.Y = AABF5BE6E38BF41D224A1D7F2F3D2B4AFC86A7AEAA3861691EA39DFAE15C42D7EB1DC30C949B52C5404BCBB32B5D4E1A
24,432,521 UART: [art] SIG.R = 26227FBE4A743443CB0197050D7D39DEFEAC07CD6CD425DF835349D540BC45D4CFC674D9A05139AB0116A773CA16820C
24,439,901 UART: [art] SIG.S = A98B2537235866AD28B7415B2AA2F2D0577362A5C716BA2558B677F0A15B4CD57A497CF8FBB3DA32AF8240C97E25DBF7
25,418,990 UART: Caliptra RT
25,419,702 UART: [state] CFI Enabled
25,583,994 UART: [rt] RT listening for mailbox commands...
25,615,356 UART: [rt]cmd =0xaabbccdd, len=4
25,616,803 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,749 writing to cptra_bootfsm_go
192,823 UART:
193,191 UART: Running Caliptra ROM ...
194,341 UART:
604,048 UART: [state] CFI Enabled
619,739 UART: [state] LifecycleState = Unprovisioned
621,621 UART: [state] DebugLocked = No
623,649 UART: [state] WD Timer not started. Device not locked for debugging
627,199 UART: [kat] SHA2-256
806,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,989 UART: [kat] ++
818,554 UART: [kat] sha1
829,823 UART: [kat] SHA2-256
832,840 UART: [kat] SHA2-384
838,407 UART: [kat] SHA2-512-ACC
841,417 UART: [kat] ECC-384
3,283,598 UART: [kat] HMAC-384Kdf
3,296,686 UART: [kat] LMS
3,826,164 UART: [kat] --
3,832,078 UART: [cold-reset] ++
3,833,441 UART: [fht] FHT @ 0x50003400
3,844,654 UART: [idev] ++
3,845,231 UART: [idev] CDI.KEYID = 6
3,846,144 UART: [idev] SUBJECT.KEYID = 7
3,847,390 UART: [idev] UDS.KEYID = 0
3,848,310 ready_for_fw is high
3,848,501 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,782 UART: [idev] Erasing UDS.KEYID = 0
6,317,711 UART: [idev] Sha1 KeyId Algorithm
6,341,576 UART: [idev] --
6,346,437 UART: [ldev] ++
6,347,019 UART: [ldev] CDI.KEYID = 6
6,347,905 UART: [ldev] SUBJECT.KEYID = 5
6,349,117 UART: [ldev] AUTHORITY.KEYID = 7
6,350,349 UART: [ldev] FE.KEYID = 1
6,363,672 UART: [ldev] Erasing FE.KEYID = 1
8,840,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,300 UART: [ldev] --
10,630,860 UART: [fwproc] Wait for Commands...
10,633,057 UART: [fwproc] Recv command 0x46574c44
10,635,095 UART: [fwproc] Recv'd Img size: 114084 bytes
14,041,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,498,247 >>> mbox cmd response: success
14,498,787 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,501,726 UART: [afmc] ++
14,502,310 UART: [afmc] CDI.KEYID = 6
14,503,193 UART: [afmc] SUBJECT.KEYID = 7
14,504,426 UART: [afmc] AUTHORITY.KEYID = 5
17,002,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,194 UART: [afmc] --
18,800,602 UART: [cold-reset] --
18,805,058 UART: [state] Locking Datavault
18,809,392 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,093 UART: [state] Locking ICCM
18,812,603 UART: [exit] Launching FMC @ 0x40000130
18,821,013 UART:
18,821,290 UART: Running Caliptra FMC ...
18,822,403 UART:
18,822,583 UART: [state] CFI Enabled
18,830,686 UART: [fht] FMC Alias Private Key: 7
20,587,552 UART: [art] Extend RT PCRs Done
20,588,777 UART: [art] Lock RT PCRs Done
20,590,616 UART: [art] Populate DV Done
20,596,079 UART: [fht] FMC Alias Private Key: 7
20,597,627 UART: [art] Derive CDI
20,598,360 UART: [art] Store in in slot 0x4
20,641,328 UART: [art] Derive Key Pair
20,642,325 UART: [art] Store priv key in slot 0x5
23,069,958 UART: [art] Derive Key Pair - Done
23,082,957 UART: [art] Signing Cert with AUTHO
23,084,258 UART: RITY.KEYID = 7
24,789,697 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,201 UART: [art] PUB.X = 93A9E6653C2E1E7130D902F0FE64B045E3A6D46DB054120350D513DB60FC85F4C15E5DC7B4F4F5C8F55AF7DB31AF2CA0
24,798,467 UART: [art] PUB.Y = 588822BA1F2372F0FA0A38D01C5EF8A21D60652E9B227D2F3F821DE27C2DED4800372FD35CA2763ADA36D4D3DCCBE14D
24,805,739 UART: [art] SIG.R = 1601C698FDC65EC770BC312DAC116DECF4D753187B7D9E7E8A27B150312B7263C1972DD316D40D785768EE4E744F5C8F
24,813,103 UART: [art] SIG.S = 347824BEE3AE40202A8B74B49CCD58657CCD39E39144962445DC1762928AB16F3C63F2005AD9AABEDF7556906029678D
25,792,625 UART: Caliptra RT
25,793,338 UART: [state] CFI Enabled
25,910,402 UART: [rt] RT listening for mailbox commands...
25,941,802 UART: [rt]cmd =0xaabbccdd, len=4
25,943,117 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,982 writing to cptra_bootfsm_go
3,698,591 ready_for_fw is high
3,699,199 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,850 >>> mbox cmd response: success
14,274,509 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,513,767 UART:
18,514,198 UART: Running Caliptra FMC ...
18,515,313 UART:
18,515,467 UART: [state] CFI Enabled
18,523,347 UART: [fht] FMC Alias Private Key: 7
20,279,801 UART: [art] Extend RT PCRs Done
20,281,038 UART: [art] Lock RT PCRs Done
20,282,780 UART: [art] Populate DV Done
20,288,208 UART: [fht] FMC Alias Private Key: 7
20,289,790 UART: [art] Derive CDI
20,290,616 UART: [art] Store in in slot 0x4
20,333,320 UART: [art] Derive Key Pair
20,334,327 UART: [art] Store priv key in slot 0x5
22,761,615 UART: [art] Derive Key Pair - Done
22,774,334 UART: [art] Signing Cert with AUTHO
22,775,666 UART: RITY.KEYID = 7
24,481,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,543 UART: [art] PUB.X = ED713AFE2328C2200398A2C78F8A024536142729D694BA5116D183DE237747DCCCFC243C89A42460E42B6EF21B992974
24,489,819 UART: [art] PUB.Y = AF98C492469EB7142465A7153EACCC3660022DB2EDA84EF523169A78C8D09A51C5B32D06EC40F1730E3CBE47C4E35F3E
24,497,099 UART: [art] SIG.R = 9DC13CB8DB793C7BEBFD72B2D4053A325B2BA7FE433494CC9B39095BBC317685B5C049CBE54043E7731A9E8B12573DB4
24,504,499 UART: [art] SIG.S = B59EA7FD38508AD83A3603135A89A0327496966D4C336D46A47CD137E0932F76FB6E2BCD76DC2D3E2511FFF4CEF12F30
25,483,512 UART: Caliptra RT
25,484,219 UART: [state] CFI Enabled
25,601,453 UART: [rt] RT listening for mailbox commands...
25,632,923 UART: [rt]cmd =0xaabbccdd, len=4
25,634,377 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
192,707 UART:
193,073 UART: Running Caliptra ROM ...
194,286 UART:
194,438 UART: [state] CFI Enabled
263,900 UART: [state] LifecycleState = Unprovisioned
266,329 UART: [state] DebugLocked = No
268,008 UART: [state] WD Timer not started. Device not locked for debugging
272,352 UART: [kat] SHA2-256
462,215 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,963 UART: [kat] ++
473,453 UART: [kat] sha1
484,824 UART: [kat] SHA2-256
487,793 UART: [kat] SHA2-384
492,152 UART: [kat] SHA2-512-ACC
494,735 UART: [kat] ECC-384
2,944,520 UART: [kat] HMAC-384Kdf
2,970,119 UART: [kat] LMS
3,501,873 UART: [kat] --
3,506,172 UART: [cold-reset] ++
3,508,245 UART: [fht] FHT @ 0x50003400
3,519,572 UART: [idev] ++
3,520,284 UART: [idev] CDI.KEYID = 6
3,521,267 UART: [idev] SUBJECT.KEYID = 7
3,522,437 UART: [idev] UDS.KEYID = 0
3,523,359 ready_for_fw is high
3,523,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,025 UART: [idev] Erasing UDS.KEYID = 0
6,029,137 UART: [idev] Sha1 KeyId Algorithm
6,052,007 UART: [idev] --
6,057,035 UART: [ldev] ++
6,057,758 UART: [ldev] CDI.KEYID = 6
6,058,676 UART: [ldev] SUBJECT.KEYID = 5
6,059,781 UART: [ldev] AUTHORITY.KEYID = 7
6,061,014 UART: [ldev] FE.KEYID = 1
6,099,584 UART: [ldev] Erasing FE.KEYID = 1
8,608,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,408 UART: [ldev] --
10,415,320 UART: [fwproc] Wait for Commands...
10,418,222 UART: [fwproc] Recv command 0x46574c44
10,420,527 UART: [fwproc] Recv'd Img size: 114084 bytes
13,868,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,451 >>> mbox cmd response: success
14,600,968 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,604,925 UART: [afmc] ++
14,605,681 UART: [afmc] CDI.KEYID = 6
14,606,814 UART: [afmc] SUBJECT.KEYID = 7
14,608,309 UART: [afmc] AUTHORITY.KEYID = 5
17,144,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,400 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,009 UART: [afmc] --
18,945,557 UART: [cold-reset] --
18,950,459 UART: [state] Locking Datavault
18,955,891 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,057 UART: [state] Locking ICCM
18,960,751 UART: [exit] Launching FMC @ 0x40000130
18,969,385 UART:
18,969,611 UART: Running Caliptra FMC ...
18,970,706 UART:
18,970,863 UART: [state] CFI Enabled
19,029,198 UART: [fht] FMC Alias Private Key: 7
20,792,967 UART: [art] Extend RT PCRs Done
20,794,180 UART: [art] Lock RT PCRs Done
20,795,687 UART: [art] Populate DV Done
20,800,988 UART: [fht] FMC Alias Private Key: 7
20,802,519 UART: [art] Derive CDI
20,803,326 UART: [art] Store in in slot 0x4
20,861,854 UART: [art] Derive Key Pair
20,862,885 UART: [art] Store priv key in slot 0x5
23,326,019 UART: [art] Derive Key Pair - Done
23,338,863 UART: [art] Signing Cert with AUTHO
23,340,200 UART: RITY.KEYID = 7
25,051,516 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,025 UART: [art] PUB.X = 74D4D3C938B30A1DCB61375289420014AD98B8DC9C25E1689EC05F55AB414B038618B3D3F1CBC388B4D8A3A617473DB7
25,060,285 UART: [art] PUB.Y = FA83ED39B4354CAED39F0B2C8DC0FFF721C5D59D2DF60CE7BCB0AEC72870E379176FD036161EE088061D906E58D0D206
25,067,538 UART: [art] SIG.R = 30BF9BB11A9218D3B82D4EE8C0AFC8A1D38F13BCFB149D5A5504FE608BFC64EA04C1F669744BF922317F90063012E6D4
25,074,953 UART: [art] SIG.S = B4E61B8BE0552BBF220A4481EBD59A8A54EA760B2E47116974517C095A0F46FED1BD1252203A400A705B0A72FF03782C
26,053,800 UART: Caliptra RT
26,054,489 UART: [state] CFI Enabled
26,220,474 UART: [rt] RT listening for mailbox commands...
26,251,856 UART: [rt]cmd =0xaabbccdd, len=4
26,253,248 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,440,220 ready_for_fw is high
3,440,638 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,712,380 >>> mbox cmd response: success
14,713,330 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,002,548 UART:
19,002,980 UART: Running Caliptra FMC ...
19,004,097 UART:
19,004,260 UART: [state] CFI Enabled
19,071,279 UART: [fht] FMC Alias Private Key: 7
20,834,788 UART: [art] Extend RT PCRs Done
20,836,024 UART: [art] Lock RT PCRs Done
20,837,711 UART: [art] Populate DV Done
20,843,231 UART: [fht] FMC Alias Private Key: 7
20,844,884 UART: [art] Derive CDI
20,845,697 UART: [art] Store in in slot 0x4
20,903,098 UART: [art] Derive Key Pair
20,904,144 UART: [art] Store priv key in slot 0x5
23,366,965 UART: [art] Derive Key Pair - Done
23,379,591 UART: [art] Signing Cert with AUTHO
23,380,930 UART: RITY.KEYID = 7
25,092,087 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,606 UART: [art] PUB.X = 287C6CE97EAC55391FEFA230B64039F0527641633CB54E5AE9C7F9B5FDFF92F9CC026642E3C14C74F69237DE27B75355
25,100,851 UART: [art] PUB.Y = BDEF43F0A6812CE82BA61795487D57FA5EC7333D49303D8279F60E153C14B369CA1679BE6E7E58CB19116B2AB0F0A96B
25,108,129 UART: [art] SIG.R = 01C1D4D0ED7B1694EE668E4A735A868F9DC992D959C1FCECF1B2F710193C0CA407AADB1A45D3FC495F8138AE30BD97DE
25,115,571 UART: [art] SIG.S = C0B49245B319271E1B6892EB6AFECCEACC0191E627CFA12BDA83C3AE1A5D30C8DD89D8ECC972A6B67D4D60CAFB1B3403
26,094,837 UART: Caliptra RT
26,095,565 UART: [state] CFI Enabled
26,261,188 UART: [rt] RT listening for mailbox commands...
26,292,934 UART: [rt]cmd =0xaabbccdd, len=4
26,294,228 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
192,993 UART:
193,358 UART: Running Caliptra ROM ...
194,473 UART:
604,193 UART: [state] CFI Enabled
620,995 UART: [state] LifecycleState = Unprovisioned
623,381 UART: [state] DebugLocked = No
625,255 UART: [state] WD Timer not started. Device not locked for debugging
630,212 UART: [kat] SHA2-256
820,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,850 UART: [kat] ++
831,401 UART: [kat] sha1
843,482 UART: [kat] SHA2-256
846,437 UART: [kat] SHA2-384
851,860 UART: [kat] SHA2-512-ACC
854,384 UART: [kat] ECC-384
3,294,567 UART: [kat] HMAC-384Kdf
3,306,528 UART: [kat] LMS
3,838,344 UART: [kat] --
3,843,263 UART: [cold-reset] ++
3,845,693 UART: [fht] FHT @ 0x50003400
3,857,315 UART: [idev] ++
3,858,029 UART: [idev] CDI.KEYID = 6
3,858,947 UART: [idev] SUBJECT.KEYID = 7
3,860,190 UART: [idev] UDS.KEYID = 0
3,861,121 ready_for_fw is high
3,861,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,631 UART: [idev] Erasing UDS.KEYID = 0
6,340,797 UART: [idev] Sha1 KeyId Algorithm
6,363,547 UART: [idev] --
6,369,297 UART: [ldev] ++
6,369,998 UART: [ldev] CDI.KEYID = 6
6,370,915 UART: [ldev] SUBJECT.KEYID = 5
6,372,075 UART: [ldev] AUTHORITY.KEYID = 7
6,373,256 UART: [ldev] FE.KEYID = 1
6,382,179 UART: [ldev] Erasing FE.KEYID = 1
8,858,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,625 UART: [ldev] --
10,650,413 UART: [fwproc] Wait for Commands...
10,652,674 UART: [fwproc] Recv command 0x46574c44
10,654,983 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,547 >>> mbox cmd response: success
14,839,084 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,842,729 UART: [afmc] ++
14,843,427 UART: [afmc] CDI.KEYID = 6
14,844,622 UART: [afmc] SUBJECT.KEYID = 7
14,846,065 UART: [afmc] AUTHORITY.KEYID = 5
17,353,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,886 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,215 UART: [afmc] --
19,149,951 UART: [cold-reset] --
19,154,963 UART: [state] Locking Datavault
19,160,599 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,760 UART: [state] Locking ICCM
19,165,617 UART: [exit] Launching FMC @ 0x40000130
19,174,245 UART:
19,174,479 UART: Running Caliptra FMC ...
19,175,584 UART:
19,175,748 UART: [state] CFI Enabled
19,183,747 UART: [fht] FMC Alias Private Key: 7
20,940,878 UART: [art] Extend RT PCRs Done
20,942,086 UART: [art] Lock RT PCRs Done
20,943,955 UART: [art] Populate DV Done
20,949,637 UART: [fht] FMC Alias Private Key: 7
20,951,282 UART: [art] Derive CDI
20,952,021 UART: [art] Store in in slot 0x4
20,995,068 UART: [art] Derive Key Pair
20,996,111 UART: [art] Store priv key in slot 0x5
23,423,081 UART: [art] Derive Key Pair - Done
23,436,137 UART: [art] Signing Cert with AUTHO
23,437,438 UART: RITY.KEYID = 7
25,142,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,469 UART: [art] PUB.X = DA186ADC1AC554BECEC09E481F84FCDE0C5DCE4461E25C4B9181ED7DB598E2E84DCF0543412020E74F429B02C110C479
25,151,820 UART: [art] PUB.Y = 4FEC0811C74E9EE207719D5ED702AA0A574C2022E8DF3F65F60F4D07F2E10459F4F511A5276CE176699FBF34954975A8
25,159,034 UART: [art] SIG.R = 66485CE57AC0B1C726DB508C466011CF6BB40D70E83BB3B4CCE4DD23769CA27D1431F6FE0F13FC72A5B088EC19ACEDED
25,166,461 UART: [art] SIG.S = 72166800F86F82A47C017F11EEE3AEFA1055E0743A0254E3EFEF413340773C00BE6AC39A9FE4F3F77CC2236EF9C2A809
26,144,328 UART: Caliptra RT
26,145,035 UART: [state] CFI Enabled
26,262,681 UART: [rt] RT listening for mailbox commands...
26,293,969 UART: [rt]cmd =0xaabbccdd, len=4
26,295,288 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
3,760,075 ready_for_fw is high
3,760,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,947,553 >>> mbox cmd response: success
14,948,200 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,205,834 UART:
19,206,219 UART: Running Caliptra FMC ...
19,207,420 UART:
19,207,588 UART: [state] CFI Enabled
19,214,996 UART: [fht] FMC Alias Private Key: 7
20,972,568 UART: [art] Extend RT PCRs Done
20,973,830 UART: [art] Lock RT PCRs Done
20,975,436 UART: [art] Populate DV Done
20,980,797 UART: [fht] FMC Alias Private Key: 7
20,982,455 UART: [art] Derive CDI
20,983,197 UART: [art] Store in in slot 0x4
21,026,020 UART: [art] Derive Key Pair
21,027,070 UART: [art] Store priv key in slot 0x5
23,453,716 UART: [art] Derive Key Pair - Done
23,466,829 UART: [art] Signing Cert with AUTHO
23,468,133 UART: RITY.KEYID = 7
25,173,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,901 UART: [art] PUB.X = 840E040B230F44C48A3BB564975A34EEDFAA650393BEEC2833F06140DC203748952B76E216CBB7FA9E70386B1A7608C3
25,182,203 UART: [art] PUB.Y = 11359D1461ED90B8795CEB4D1926AF2F7D660205E8D88B9497A64BA8EEE6ABF2A85B9C2BE8E57F0FA91C6806190AA88B
25,189,438 UART: [art] SIG.R = 47E4D48399387F1CECF963455333BFBC7BBF21BEC96972BB9FF7AF0CC29BF8F564362E33C9C59BCA21E97590AB2F9633
25,196,839 UART: [art] SIG.S = 26F311899991B96A965E75DC1F88D129A79173B810EC6CFF18FD2C8B9510CB6CA734A2DA30360240AD4B32F66A7FC5FA
26,175,273 UART: Caliptra RT
26,175,988 UART: [state] CFI Enabled
26,292,409 UART: [rt] RT listening for mailbox commands...
26,323,488 UART: [rt]cmd =0xaabbccdd, len=4
26,324,808 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
894,976 UART: [kat] SHA2-512-ACC
896,877 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,236 UART: [kat] LMS
1,475,432 UART: [kat] --
1,476,423 UART: [cold-reset] ++
1,476,851 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 ready_for_fw is high
1,481,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,012 UART: [idev] Erasing UDS.KEYID = 0
1,505,692 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,274 UART: [idev] --
1,515,281 UART: [ldev] ++
1,515,449 UART: [ldev] CDI.KEYID = 6
1,515,812 UART: [ldev] SUBJECT.KEYID = 5
1,516,238 UART: [ldev] AUTHORITY.KEYID = 7
1,516,701 UART: [ldev] FE.KEYID = 1
1,522,129 UART: [ldev] Erasing FE.KEYID = 1
1,547,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,358 UART: [ldev] --
1,587,773 UART: [fwproc] Waiting for Commands...
1,588,488 UART: [fwproc] Received command 0x46574c44
1,589,279 UART: [fwproc] Received Image of size 114084 bytes
2,884,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,576 >>> mbox cmd response: success
3,076,576 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,077,628 UART: [afmc] ++
3,077,796 UART: [afmc] CDI.KEYID = 6
3,078,158 UART: [afmc] SUBJECT.KEYID = 7
3,078,583 UART: [afmc] AUTHORITY.KEYID = 5
3,113,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,061 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,751 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,742 UART: [afmc] --
3,156,808 UART: [cold-reset] --
3,157,944 UART: [state] Locking Datavault
3,159,075 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,679 UART: [state] Locking ICCM
3,160,279 UART: [exit] Launching FMC @ 0x40000130
3,165,608 UART:
3,165,624 UART: Running Caliptra FMC ...
3,166,032 UART:
3,166,086 UART: [state] CFI Enabled
3,176,673 UART: [fht] FMC Alias Private Key: 7
3,284,090 UART: [art] Extend RT PCRs Done
3,284,518 UART: [art] Lock RT PCRs Done
3,286,022 UART: [art] Populate DV Done
3,294,165 UART: [fht] FMC Alias Private Key: 7
3,295,339 UART: [art] Derive CDI
3,295,619 UART: [art] Store in in slot 0x4
3,381,188 UART: [art] Derive Key Pair
3,381,548 UART: [art] Store priv key in slot 0x5
3,394,594 UART: [art] Derive Key Pair - Done
3,409,263 UART: [art] Signing Cert with AUTHO
3,409,743 UART: RITY.KEYID = 7
3,425,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,952 UART: [art] PUB.X = 794F06AB869ED92F90BA05727FED259E391C3946207BBA079781CD423C3939A9E68051EC34EAFF891DAAA57D054D8237
3,432,714 UART: [art] PUB.Y = 957AE0079DA3257CA3754C218C0D809A0E3E79D736380CA5B88A2C9F68627D7EE8B61DC9F292EB1D184BB158BCB02211
3,439,658 UART: [art] SIG.R = ECAEFEDD2245EDD57FC1DB2F007F647EF05C530B0DEB1FC59C35814247048C9431E38AACCB45716AEDE5A109B5AA1DA6
3,446,420 UART: [art] SIG.S = C7E69A2DE88D74C15630B4151810971DE8B3019FAB8ECF426B83BEB0074AFAA5405B896EC852ED6CBCC44F94786912EF
3,470,549 UART: Caliptra RT
3,470,802 UART: [state] CFI Enabled
3,578,996 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,870 UART: [rt]cmd =0xaabbccdd, len=4
3,610,794 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,835 ready_for_fw is high
1,362,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,504 >>> mbox cmd response: success
2,925,504 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,986,296 UART:
2,986,312 UART: Running Caliptra FMC ...
2,986,720 UART:
2,986,774 UART: [state] CFI Enabled
2,997,123 UART: [fht] FMC Alias Private Key: 7
3,105,030 UART: [art] Extend RT PCRs Done
3,105,458 UART: [art] Lock RT PCRs Done
3,106,972 UART: [art] Populate DV Done
3,114,913 UART: [fht] FMC Alias Private Key: 7
3,115,857 UART: [art] Derive CDI
3,116,137 UART: [art] Store in in slot 0x4
3,201,426 UART: [art] Derive Key Pair
3,201,786 UART: [art] Store priv key in slot 0x5
3,214,954 UART: [art] Derive Key Pair - Done
3,229,757 UART: [art] Signing Cert with AUTHO
3,230,237 UART: RITY.KEYID = 7
3,245,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,182 UART: [art] PUB.X = BD01BDCB0B00BB1FA7444FC1A8E06C372A53A6965E21B9DC7641D4D7A673AD368AF73FAF7EC12BDDAF19D34684DE450A
3,252,945 UART: [art] PUB.Y = 7F311C694DD54A0833051DA7E4898681C0E12F885A55A3F08F5651F192A26AC6F30391787D58AB5937178B7EBC32FC78
3,259,882 UART: [art] SIG.R = CD2719E39D14897988ABC277A41EDFC69594772FD2D6875BFB3B385A690DCF6E50B34E31AC04E39923128319484D9BE5
3,266,648 UART: [art] SIG.S = EA8F226BFD2CC2AF4770840AF25596FE03D29EFFDC139EA269AFE6FE32291060E2BF57946B89E918F23DAF4B6DE6B150
3,290,413 UART: Caliptra RT
3,290,666 UART: [state] CFI Enabled
3,399,780 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,126 UART: [rt]cmd =0xaabbccdd, len=4
3,431,168 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,771 UART: [kat] SHA2-512-ACC
897,672 UART: [kat] ECC-384
903,309 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,816 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 ready_for_fw is high
1,481,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,163 UART: [idev] Erasing UDS.KEYID = 0
1,506,057 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,599 UART: [idev] --
1,515,498 UART: [ldev] ++
1,515,666 UART: [ldev] CDI.KEYID = 6
1,516,029 UART: [ldev] SUBJECT.KEYID = 5
1,516,455 UART: [ldev] AUTHORITY.KEYID = 7
1,516,918 UART: [ldev] FE.KEYID = 1
1,522,502 UART: [ldev] Erasing FE.KEYID = 1
1,547,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,983 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,331 UART: [fwproc] Received command 0x46574c44
1,589,122 UART: [fwproc] Received Image of size 114084 bytes
2,883,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,529 >>> mbox cmd response: success
3,075,529 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,076,681 UART: [afmc] ++
3,076,849 UART: [afmc] CDI.KEYID = 6
3,077,211 UART: [afmc] SUBJECT.KEYID = 7
3,077,636 UART: [afmc] AUTHORITY.KEYID = 5
3,113,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,939 UART: [afmc] --
3,155,947 UART: [cold-reset] --
3,156,613 UART: [state] Locking Datavault
3,157,820 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,424 UART: [state] Locking ICCM
3,158,880 UART: [exit] Launching FMC @ 0x40000130
3,164,209 UART:
3,164,225 UART: Running Caliptra FMC ...
3,164,633 UART:
3,164,776 UART: [state] CFI Enabled
3,175,233 UART: [fht] FMC Alias Private Key: 7
3,283,172 UART: [art] Extend RT PCRs Done
3,283,600 UART: [art] Lock RT PCRs Done
3,284,862 UART: [art] Populate DV Done
3,293,073 UART: [fht] FMC Alias Private Key: 7
3,294,135 UART: [art] Derive CDI
3,294,415 UART: [art] Store in in slot 0x4
3,379,954 UART: [art] Derive Key Pair
3,380,314 UART: [art] Store priv key in slot 0x5
3,393,938 UART: [art] Derive Key Pair - Done
3,408,980 UART: [art] Signing Cert with AUTHO
3,409,460 UART: RITY.KEYID = 7
3,424,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,529 UART: [art] PUB.X = 344DEDAE4198AA3CCA3BB9D02239B3C8D6785EE4895C60C22E55297B9BB4A09C36151954BA3484DBF938DBBBC83C9CDA
3,432,317 UART: [art] PUB.Y = 32285BAC7316765A77A98521478559EE520A2B952D5ACE19B654A9BB82A6054154B1C030CD25225F3F2BE64C9CD60242
3,439,254 UART: [art] SIG.R = 44D5714A05775C2214FC62C4557116D7692EA8532748017913A5826FB96191E1BDF4C256D9970E70D086C889882B8CB0
3,446,001 UART: [art] SIG.S = 67B1DEA0F8734DB737FDD7BDDF8F3E059B2C0B3F7A3E63464AC456528A8B6658734C1DDF53F860E084D334B7AF27C3B9
3,469,372 UART: Caliptra RT
3,469,717 UART: [state] CFI Enabled
3,577,377 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,005 UART: [rt]cmd =0xaabbccdd, len=4
3,608,859 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 ready_for_fw is high
1,363,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,273 >>> mbox cmd response: success
2,925,273 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,986,357 UART:
2,986,373 UART: Running Caliptra FMC ...
2,986,781 UART:
2,986,924 UART: [state] CFI Enabled
2,997,471 UART: [fht] FMC Alias Private Key: 7
3,105,644 UART: [art] Extend RT PCRs Done
3,106,072 UART: [art] Lock RT PCRs Done
3,107,718 UART: [art] Populate DV Done
3,116,013 UART: [fht] FMC Alias Private Key: 7
3,117,107 UART: [art] Derive CDI
3,117,387 UART: [art] Store in in slot 0x4
3,203,008 UART: [art] Derive Key Pair
3,203,368 UART: [art] Store priv key in slot 0x5
3,217,200 UART: [art] Derive Key Pair - Done
3,231,737 UART: [art] Signing Cert with AUTHO
3,232,217 UART: RITY.KEYID = 7
3,247,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,472 UART: [art] PUB.X = 1C6480B8EC1D31491BF2D67DF760B8B402B68A8125A6354DE25952FF3DB8654B8AEDB3E68E2D630C433A0BED934AA01D
3,255,245 UART: [art] PUB.Y = DD67E6632115F252F9C997A6EA40B757D04BD3A79BE92CD44FE96BDBF051C16D7B92C9D052C0143A3D90E758E5D23222
3,262,203 UART: [art] SIG.R = 0B51047793603FED21E95AC828ADA18C60B97FCB2B7FDAC935BE9F10D2369359C793FF89C18B604FC146E32FA268143D
3,268,975 UART: [art] SIG.S = 0937A933F334089DDF73B5E8D420EA1A5110A324EC462F4A4EE063D1621433E387C10CA61E4BEA643E85F1B09B5D649A
3,292,605 UART: Caliptra RT
3,292,950 UART: [state] CFI Enabled
3,400,688 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,180 UART: [rt]cmd =0xaabbccdd, len=4
3,432,224 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
893,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,551 UART: [kat] ++
897,703 UART: [kat] sha1
902,171 UART: [kat] SHA2-256
904,111 UART: [kat] SHA2-384
907,028 UART: [kat] SHA2-512-ACC
908,929 UART: [kat] ECC-384
918,310 UART: [kat] HMAC-384Kdf
922,880 UART: [kat] LMS
1,171,208 UART: [kat] --
1,171,867 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 ready_for_fw is high
1,176,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,201,353 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,587 UART: [ldev] Erasing FE.KEYID = 1
1,243,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,406 UART: [fwproc] Recv command 0x46574c44
1,284,134 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,713 >>> mbox cmd response: success
2,769,713 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,770,939 UART: [afmc] ++
2,771,107 UART: [afmc] CDI.KEYID = 6
2,771,469 UART: [afmc] SUBJECT.KEYID = 7
2,771,894 UART: [afmc] AUTHORITY.KEYID = 5
2,807,367 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,864 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,656 UART: [afmc] --
2,850,654 UART: [cold-reset] --
2,851,376 UART: [state] Locking Datavault
2,852,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,245 UART: [state] Locking ICCM
2,853,849 UART: [exit] Launching FMC @ 0x40000130
2,859,178 UART:
2,859,194 UART: Running Caliptra FMC ...
2,859,602 UART:
2,859,656 UART: [state] CFI Enabled
2,870,141 UART: [fht] FMC Alias Private Key: 7
2,978,146 UART: [art] Extend RT PCRs Done
2,978,574 UART: [art] Lock RT PCRs Done
2,980,212 UART: [art] Populate DV Done
2,988,463 UART: [fht] FMC Alias Private Key: 7
2,989,565 UART: [art] Derive CDI
2,989,845 UART: [art] Store in in slot 0x4
3,075,388 UART: [art] Derive Key Pair
3,075,748 UART: [art] Store priv key in slot 0x5
3,088,842 UART: [art] Derive Key Pair - Done
3,103,691 UART: [art] Signing Cert with AUTHO
3,104,171 UART: RITY.KEYID = 7
3,119,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,438 UART: [art] PUB.X = BE7DD02D5B9F03AD1EBE46985E95810238241725F08CDAB3176DB8E7572C1EB221732254C94D611D5717FD89CDF46E43
3,127,206 UART: [art] PUB.Y = 20156C45C1A5F3364C1C1D938E08263043729B493B2822A3922171EFBE37068D259A0B278F24B4964ADABE94D14C4897
3,134,139 UART: [art] SIG.R = 0BD203064F12342C48DBA57E1BC1FD610B0FC0AF9531D8D12A99131AA07E9E85E92BF6845D4C722A05B528AD4E4B2083
3,140,899 UART: [art] SIG.S = DE88341887E38A5307F05C1B57595D8C81F46E3DF617BFAAFD299A7181254ACA6B586EAA0220B930AF5EA52F300B06FE
3,164,786 UART: Caliptra RT
3,165,039 UART: [state] CFI Enabled
3,272,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,882 UART: [rt]cmd =0xaabbccdd, len=4
3,303,902 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 ready_for_fw is high
1,059,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,310 >>> mbox cmd response: success
2,622,310 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,683,652 UART:
2,683,668 UART: Running Caliptra FMC ...
2,684,076 UART:
2,684,130 UART: [state] CFI Enabled
2,694,637 UART: [fht] FMC Alias Private Key: 7
2,802,488 UART: [art] Extend RT PCRs Done
2,802,916 UART: [art] Lock RT PCRs Done
2,804,284 UART: [art] Populate DV Done
2,812,577 UART: [fht] FMC Alias Private Key: 7
2,813,719 UART: [art] Derive CDI
2,813,999 UART: [art] Store in in slot 0x4
2,899,772 UART: [art] Derive Key Pair
2,900,132 UART: [art] Store priv key in slot 0x5
2,913,840 UART: [art] Derive Key Pair - Done
2,928,948 UART: [art] Signing Cert with AUTHO
2,929,428 UART: RITY.KEYID = 7
2,944,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,111 UART: [art] PUB.X = EA07A572C98D147A83B8312B90E111BAFFD326DEB364EEE6272BD07450FC452F5B3D57CB081EE85696C5720A91CDB1E7
2,951,884 UART: [art] PUB.Y = 74F4D05F3E2EC5CBD33410759ED2DF8FC66AFB7A6F383B1EB3FA01570C51B32060E6EE871E4460771A96BA2FAD3022A1
2,958,842 UART: [art] SIG.R = C8F259BD86BD0DBA371740D8150C6FA10AC7A27E1D10F0C1D2259EB706F45F35D4BD241DBEC7048DB5D6209EEF7ABFC1
2,965,619 UART: [art] SIG.S = 829BB865C3479051E6FE26DD8CC5CCE94C07F71B73BA7C4287D976169795B9787EAF200C04DEAE1693653A3508DB7417
2,989,060 UART: Caliptra RT
2,989,313 UART: [state] CFI Enabled
3,096,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,179 UART: [rt]cmd =0xaabbccdd, len=4
3,128,161 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
907,035 UART: [kat] SHA2-512-ACC
908,936 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,850 UART: [fht] FHT @ 0x50003400
1,175,601 UART: [idev] ++
1,175,769 UART: [idev] CDI.KEYID = 6
1,176,129 UART: [idev] SUBJECT.KEYID = 7
1,176,553 UART: [idev] UDS.KEYID = 0
1,176,898 ready_for_fw is high
1,176,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,565 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,210,036 UART: [idev] --
1,210,860 UART: [ldev] ++
1,211,028 UART: [ldev] CDI.KEYID = 6
1,211,391 UART: [ldev] SUBJECT.KEYID = 5
1,211,817 UART: [ldev] AUTHORITY.KEYID = 7
1,212,280 UART: [ldev] FE.KEYID = 1
1,217,810 UART: [ldev] Erasing FE.KEYID = 1
1,244,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,744 UART: [ldev] --
1,283,135 UART: [fwproc] Wait for Commands...
1,283,829 UART: [fwproc] Recv command 0x46574c44
1,284,557 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,142 >>> mbox cmd response: success
2,772,142 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,773,326 UART: [afmc] ++
2,773,494 UART: [afmc] CDI.KEYID = 6
2,773,856 UART: [afmc] SUBJECT.KEYID = 7
2,774,281 UART: [afmc] AUTHORITY.KEYID = 5
2,809,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,727 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,005 UART: [afmc] --
2,853,019 UART: [cold-reset] --
2,853,939 UART: [state] Locking Datavault
2,855,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,700 UART: [state] Locking ICCM
2,856,148 UART: [exit] Launching FMC @ 0x40000130
2,861,477 UART:
2,861,493 UART: Running Caliptra FMC ...
2,861,901 UART:
2,862,044 UART: [state] CFI Enabled
2,872,697 UART: [fht] FMC Alias Private Key: 7
2,980,230 UART: [art] Extend RT PCRs Done
2,980,658 UART: [art] Lock RT PCRs Done
2,981,934 UART: [art] Populate DV Done
2,990,039 UART: [fht] FMC Alias Private Key: 7
2,991,197 UART: [art] Derive CDI
2,991,477 UART: [art] Store in in slot 0x4
3,077,664 UART: [art] Derive Key Pair
3,078,024 UART: [art] Store priv key in slot 0x5
3,091,106 UART: [art] Derive Key Pair - Done
3,105,707 UART: [art] Signing Cert with AUTHO
3,106,187 UART: RITY.KEYID = 7
3,121,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,370 UART: [art] PUB.X = B5F71A92F40AB8B47393B0A9AA05FF3071F0283B97A7EC8AB29EDF7F9AA0A460E33126C3C08DD6BC9A46003EC1265A52
3,129,126 UART: [art] PUB.Y = 108B083F6C13B0A0738C963C979F4A429D39C721DE9B4B1932DA9ACA89405A2ED19CE8C0CD71BB1979C3596AAB2BC285
3,136,083 UART: [art] SIG.R = 65FFA5133E220DB6A466FD69ECB2E3E773336127F582D02797D0826E0FC0C4AA7674F51C40CA77549DDA04C8A8456C3A
3,142,850 UART: [art] SIG.S = B8C952691679617DEE5932769013A4D48BD3D4C029B679A1B889BC817F2B6CB131A9E8BE804FD1365BA199650B06C5E7
3,166,757 UART: Caliptra RT
3,167,102 UART: [state] CFI Enabled
3,274,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,795 UART: [rt]cmd =0xaabbccdd, len=4
3,305,881 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,724 ready_for_fw is high
1,059,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,573 >>> mbox cmd response: success
2,623,573 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,685,801 UART:
2,685,817 UART: Running Caliptra FMC ...
2,686,225 UART:
2,686,368 UART: [state] CFI Enabled
2,696,947 UART: [fht] FMC Alias Private Key: 7
2,804,578 UART: [art] Extend RT PCRs Done
2,805,006 UART: [art] Lock RT PCRs Done
2,806,180 UART: [art] Populate DV Done
2,814,417 UART: [fht] FMC Alias Private Key: 7
2,815,499 UART: [art] Derive CDI
2,815,779 UART: [art] Store in in slot 0x4
2,901,338 UART: [art] Derive Key Pair
2,901,698 UART: [art] Store priv key in slot 0x5
2,915,354 UART: [art] Derive Key Pair - Done
2,929,973 UART: [art] Signing Cert with AUTHO
2,930,453 UART: RITY.KEYID = 7
2,945,645 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,410 UART: [art] PUB.X = 48606C304C25C7477A1ED02BBFE5AC71082BD60E461E9146B55794C6C731568375819B508480E22552791BEB7E609F69
2,953,164 UART: [art] PUB.Y = E710C2ED4F40D43C3DCB35A37CA376C178F01294C97A422583F3D033E23B22144271AC80F8E66CC24B5C323ECB37F5D5
2,960,120 UART: [art] SIG.R = 53677E148314CE8ED3D715280D534A13EFE512121F16609D575FB8D5A7D6DF9F7E5069FE1064B3EA0F4155E1E1C51EA2
2,966,888 UART: [art] SIG.S = B3309F6742349DA719CA2FD628739ED605C82E7D1490EC9C8EF07FA421E12D09728C40A76B61EFF9AC4CDCF49DD70632
2,990,938 UART: Caliptra RT
2,991,283 UART: [state] CFI Enabled
3,099,856 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,278 UART: [rt]cmd =0xaabbccdd, len=4
3,131,240 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,501 UART: [kat] SHA2-256
901,441 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
915,498 UART: [kat] HMAC-384Kdf
919,948 UART: [kat] LMS
1,168,260 UART: [kat] --
1,169,205 UART: [cold-reset] ++
1,169,543 UART: [fht] FHT @ 0x50003400
1,172,107 UART: [idev] ++
1,172,275 UART: [idev] CDI.KEYID = 6
1,172,636 UART: [idev] SUBJECT.KEYID = 7
1,173,061 UART: [idev] UDS.KEYID = 0
1,173,407 ready_for_fw is high
1,173,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,489 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,214,914 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,696 UART: [ldev] --
1,280,164 UART: [fwproc] Wait for Commands...
1,280,891 UART: [fwproc] Recv command 0x46574c44
1,281,624 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,993 >>> mbox cmd response: success
2,767,993 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,769,142 UART: [afmc] ++
2,769,310 UART: [afmc] CDI.KEYID = 6
2,769,673 UART: [afmc] SUBJECT.KEYID = 7
2,770,099 UART: [afmc] AUTHORITY.KEYID = 5
2,805,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,573 UART: [afmc] --
2,848,549 UART: [cold-reset] --
2,849,355 UART: [state] Locking Datavault
2,850,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,244 UART: [state] Locking ICCM
2,851,918 UART: [exit] Launching FMC @ 0x40000130
2,857,247 UART:
2,857,263 UART: Running Caliptra FMC ...
2,857,671 UART:
2,857,725 UART: [state] CFI Enabled
2,868,354 UART: [fht] FMC Alias Private Key: 7
2,975,561 UART: [art] Extend RT PCRs Done
2,975,989 UART: [art] Lock RT PCRs Done
2,977,871 UART: [art] Populate DV Done
2,986,038 UART: [fht] FMC Alias Private Key: 7
2,986,992 UART: [art] Derive CDI
2,987,272 UART: [art] Store in in slot 0x4
3,073,201 UART: [art] Derive Key Pair
3,073,561 UART: [art] Store priv key in slot 0x5
3,085,991 UART: [art] Derive Key Pair - Done
3,100,803 UART: [art] Signing Cert with AUTHO
3,101,283 UART: RITY.KEYID = 7
3,116,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,148 UART: [art] PUB.X = E7E2390E8C021FC986A276D7EA056A05C0060065365190752BA3C0B56E6546E525E3E78B0117C98B81E2E1515CA6A279
3,123,872 UART: [art] PUB.Y = 44432B57300E30001073962E143F6469265F87BD19187C2A0476298A97B669AF0BCAF400B545A624156F2FB27A6869AE
3,130,757 UART: [art] SIG.R = 4D6F113B1C64965585700A6E3FD79D0812E090F447634B7DFB6C503E712B96370652C20ACE3F5212AD613A88862E7B71
3,137,509 UART: [art] SIG.S = CB4A1BF2F40C799EC04DD71BEBF88C05985FD488AC25EED32427AA470D6685400F120FF7D5A5830D05416952F3CDCAA3
3,161,305 UART: Caliptra RT
3,161,558 UART: [state] CFI Enabled
3,268,583 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,997 UART: [rt]cmd =0xaabbccdd, len=4
3,300,027 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,976 ready_for_fw is high
1,055,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,777 >>> mbox cmd response: success
2,618,777 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,679,981 UART:
2,679,997 UART: Running Caliptra FMC ...
2,680,405 UART:
2,680,459 UART: [state] CFI Enabled
2,690,638 UART: [fht] FMC Alias Private Key: 7
2,797,881 UART: [art] Extend RT PCRs Done
2,798,309 UART: [art] Lock RT PCRs Done
2,799,591 UART: [art] Populate DV Done
2,807,648 UART: [fht] FMC Alias Private Key: 7
2,808,678 UART: [art] Derive CDI
2,808,958 UART: [art] Store in in slot 0x4
2,894,501 UART: [art] Derive Key Pair
2,894,861 UART: [art] Store priv key in slot 0x5
2,908,023 UART: [art] Derive Key Pair - Done
2,922,602 UART: [art] Signing Cert with AUTHO
2,923,082 UART: RITY.KEYID = 7
2,937,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,719 UART: [art] PUB.X = 3B2E2CA37C77346273F1F1808012FC17049317CE0DFEA4C1054B6EB4029C74FA4F364A0AA030EA37AEB50EFF731921A4
2,945,479 UART: [art] PUB.Y = 91AB9E72D163CD487BE0462082A3C3A4427FFC00E04DA0F434E28FCB5A66DEB1DC5A7A9A022D014FA491ED99F1224AE6
2,952,417 UART: [art] SIG.R = 6C730F2AAB04E165AA1E99253822361AE9BE67609D8A04E003DFBF0805461A79A835E690BE8B06A4B402FF3C727D368F
2,959,167 UART: [art] SIG.S = C29C06360CD30066A18375A38595A28A81E0CB4066ED291D10CA8DEED3AB22332A5ED072D8CB7E73BAE65CBD0EA696A4
2,982,571 UART: Caliptra RT
2,982,824 UART: [state] CFI Enabled
3,091,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,121,873 UART: [rt]cmd =0xaabbccdd, len=4
3,123,027 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 ready_for_fw is high
1,174,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,209,011 UART: [ldev] ++
1,209,179 UART: [ldev] CDI.KEYID = 6
1,209,543 UART: [ldev] SUBJECT.KEYID = 5
1,209,970 UART: [ldev] AUTHORITY.KEYID = 7
1,210,433 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,241,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,510 UART: [fwproc] Recv command 0x46574c44
1,282,243 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,060 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,410 >>> mbox cmd response: success
2,769,410 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,770,617 UART: [afmc] ++
2,770,785 UART: [afmc] CDI.KEYID = 6
2,771,148 UART: [afmc] SUBJECT.KEYID = 7
2,771,574 UART: [afmc] AUTHORITY.KEYID = 5
2,807,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,830 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,559 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,161 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,930 UART: [afmc] --
2,850,874 UART: [cold-reset] --
2,851,968 UART: [state] Locking Datavault
2,853,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,885 UART: [state] Locking ICCM
2,854,537 UART: [exit] Launching FMC @ 0x40000130
2,859,866 UART:
2,859,882 UART: Running Caliptra FMC ...
2,860,290 UART:
2,860,433 UART: [state] CFI Enabled
2,871,230 UART: [fht] FMC Alias Private Key: 7
2,980,201 UART: [art] Extend RT PCRs Done
2,980,629 UART: [art] Lock RT PCRs Done
2,981,963 UART: [art] Populate DV Done
2,990,110 UART: [fht] FMC Alias Private Key: 7
2,991,144 UART: [art] Derive CDI
2,991,424 UART: [art] Store in in slot 0x4
3,076,785 UART: [art] Derive Key Pair
3,077,145 UART: [art] Store priv key in slot 0x5
3,090,097 UART: [art] Derive Key Pair - Done
3,104,662 UART: [art] Signing Cert with AUTHO
3,105,142 UART: RITY.KEYID = 7
3,120,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,089 UART: [art] PUB.X = 0FECE4018529483FE5AC3B10C7FD515BA1FB33359DC33F957A85B2AC69555ED889A17AD92C8813AEEE2019D7A2842F19
3,127,863 UART: [art] PUB.Y = 09FF61D0C25AFD011F336D690EEB19E4525591EF1EF8B067824B634467AC0C85F81BDD8FF16F947DDBD4792FF326FBB2
3,134,815 UART: [art] SIG.R = F1DC38B5BA8829F13B308047FC6B51950199AD66C1E159B9B6E88522EAE07DF092E14C9DE4BFBAAAB24484ADA2706B84
3,141,596 UART: [art] SIG.S = 6AF31E45FD8DA626CC430746A07DA08CCD36C841AA9E36652D1C2AC0B41FA1A088E0F0CB0D5A7989BD6B0057A04AF3FE
3,165,965 UART: Caliptra RT
3,166,310 UART: [state] CFI Enabled
3,273,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,393 UART: [rt]cmd =0xaabbccdd, len=4
3,305,341 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,529 ready_for_fw is high
1,056,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,404 >>> mbox cmd response: success
2,619,404 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,680,982 UART:
2,680,998 UART: Running Caliptra FMC ...
2,681,406 UART:
2,681,549 UART: [state] CFI Enabled
2,692,384 UART: [fht] FMC Alias Private Key: 7
2,800,265 UART: [art] Extend RT PCRs Done
2,800,693 UART: [art] Lock RT PCRs Done
2,802,425 UART: [art] Populate DV Done
2,810,808 UART: [fht] FMC Alias Private Key: 7
2,811,934 UART: [art] Derive CDI
2,812,214 UART: [art] Store in in slot 0x4
2,898,045 UART: [art] Derive Key Pair
2,898,405 UART: [art] Store priv key in slot 0x5
2,911,993 UART: [art] Derive Key Pair - Done
2,926,854 UART: [art] Signing Cert with AUTHO
2,927,334 UART: RITY.KEYID = 7
2,942,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,715 UART: [art] PUB.X = 48768B844B24776046CC28BCDEAF73213AA78134866574B9EF791CCBF7D378C86781BC83A2AA02A467702927B6C8F651
2,950,480 UART: [art] PUB.Y = 576483B48C9738FAB34AFCFB557E14FB015D7315E6266202F1FC24385658990BFD9354C200345A9418DE39F65F0CBE69
2,957,394 UART: [art] SIG.R = 4C24C501C47CE70688612B305CBC26158B2128C7C170151A47E9879A1636F970074180A906BF1177F1C778420A275FC4
2,964,135 UART: [art] SIG.S = 658277495E841EDA4569CC93EC2DCE1D0687C85E9C682F1A20DDE0413EA9DED3D120A11FDCFE58B29806F496A50DEEB2
2,988,177 UART: Caliptra RT
2,988,522 UART: [state] CFI Enabled
3,095,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,509 UART: [rt]cmd =0xaabbccdd, len=4
3,127,455 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,130 UART:
192,490 UART: Running Caliptra ROM ...
193,630 UART:
193,779 UART: [state] CFI Enabled
265,001 UART: [state] LifecycleState = Unprovisioned
266,987 UART: [state] DebugLocked = No
269,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,293 UART: [kat] SHA2-256
444,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,541 UART: [kat] ++
456,024 UART: [kat] sha1
468,043 UART: [kat] SHA2-256
470,696 UART: [kat] SHA2-384
477,756 UART: [kat] SHA2-512-ACC
480,125 UART: [kat] ECC-384
2,766,014 UART: [kat] HMAC-384Kdf
2,799,570 UART: [kat] LMS
3,989,828 UART: [kat] --
3,994,819 UART: [cold-reset] ++
3,996,474 UART: [fht] Storing FHT @ 0x50003400
4,008,166 UART: [idev] ++
4,008,739 UART: [idev] CDI.KEYID = 6
4,009,775 UART: [idev] SUBJECT.KEYID = 7
4,010,959 UART: [idev] UDS.KEYID = 0
4,011,939 ready_for_fw is high
4,012,161 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,705 UART: [idev] Erasing UDS.KEYID = 0
7,347,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,016 UART: [idev] --
7,372,110 UART: [ldev] ++
7,372,684 UART: [ldev] CDI.KEYID = 6
7,373,621 UART: [ldev] SUBJECT.KEYID = 5
7,374,886 UART: [ldev] AUTHORITY.KEYID = 7
7,376,036 UART: [ldev] FE.KEYID = 1
7,419,961 UART: [ldev] Erasing FE.KEYID = 1
10,753,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,663 UART: [ldev] --
13,129,297 UART: [fwproc] Waiting for Commands...
13,131,121 UART: [fwproc] Received command 0x46574c44
13,133,356 UART: [fwproc] Received Image of size 113760 bytes
17,179,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,786 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,639,484 >>> mbox cmd response: success
17,643,464 UART: [afmc] ++
17,644,064 UART: [afmc] CDI.KEYID = 6
17,644,957 UART: [afmc] SUBJECT.KEYID = 7
17,646,227 UART: [afmc] AUTHORITY.KEYID = 5
21,017,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,319,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,160 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,583 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,416 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,365,834 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,387,786 UART: [afmc] --
23,391,919 UART: [cold-reset] --
23,395,890 UART: [state] Locking Datavault
23,401,342 UART: [state] Locking PCR0, PCR1 and PCR31
23,403,112 UART: [state] Locking ICCM
23,404,886 UART: [exit] Launching FMC @ 0x40000130
23,413,289 UART:
23,413,524 UART: Running Caliptra FMC ...
23,414,625 UART:
23,414,786 UART: [state] CFI Enabled
23,478,506 UART: [fht] FMC Alias Private Key: 7
25,816,857 UART: [art] Extend RT PCRs Done
25,818,077 UART: [art] Lock RT PCRs Done
25,819,521 UART: [art] Populate DV Done
25,824,827 UART: [fht] FMC Alias Private Key: 7
25,826,557 UART: [art] Derive CDI
25,827,296 UART: [art] Store in in slot 0x4
25,887,422 UART: [art] Derive Key Pair
25,888,461 UART: [art] Store priv key in slot 0x5
29,181,563 UART: [art] Derive Key Pair - Done
29,194,564 UART: [art] Signing Cert with AUTHO
29,195,866 UART: RITY.KEYID = 7
31,483,635 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,146 UART: [art] PUB.X = F98FB40CB6DC99AFC43B4F491E57196CBF65D22B347ED8E21D28A40548B279657AF10CD4C8B9B4A0EB11A39D40E69470
31,492,399 UART: [art] PUB.Y = B32ECF057E39F3CC7F38285B4D573645685C0B87B1104EF8E558DB87DC394E1091A2C5E6DC714C37F65CFB6D7C28FCD4
31,499,633 UART: [art] SIG.R = 827728F5ACDD961E3BD1D492BB31F89241A5F63598596B3058795DED5AFC535B13A85AF59D0B4550A37368C9A6CF2634
31,507,028 UART: [art] SIG.S = CB9462C39451DE04A1FC069F6064938ADE8B79B3A022A5EB7556BE3D55DEEAC7B3A03E8863DEB68AB6E03723A5B907C6
32,812,294 UART: Caliptra RT
32,812,992 UART: [state] CFI Enabled
32,974,529 UART: [rt] RT listening for mailbox commands...
32,976,402 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,007,598 UART: [rt]cmd =0x434b4558, len=80
33,009,019 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,804,974 ready_for_fw is high
3,805,387 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,832 >>> mbox cmd response: success
23,587,892 UART:
23,588,277 UART: Running Caliptra FMC ...
23,589,405 UART:
23,589,566 UART: [state] CFI Enabled
23,657,751 UART: [fht] FMC Alias Private Key: 7
25,995,956 UART: [art] Extend RT PCRs Done
25,997,197 UART: [art] Lock RT PCRs Done
25,998,853 UART: [art] Populate DV Done
26,004,484 UART: [fht] FMC Alias Private Key: 7
26,005,981 UART: [art] Derive CDI
26,006,806 UART: [art] Store in in slot 0x4
26,066,485 UART: [art] Derive Key Pair
26,067,528 UART: [art] Store priv key in slot 0x5
29,360,724 UART: [art] Derive Key Pair - Done
29,374,063 UART: [art] Signing Cert with AUTHO
29,375,380 UART: RITY.KEYID = 7
31,662,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,295 UART: [art] PUB.X = 80F9F67B8618884973D1A094FD0E098A87F9FFAA33F832449A09858B237656B538C07EE8E4969475A031B6537B23FC91
31,671,553 UART: [art] PUB.Y = E938A186038F7794A1972E82FC43D44BC5B3E9D85CC7E102F3FE5A61B9AE5A08066D759FD20EE972771D4A8613B2DBC9
31,678,754 UART: [art] SIG.R = 9D1E15276AB7A0825EC9F0BC9C1A1E65DBFFD7BD73D9412949D798A8CFDAC9E2D59435FF1ECC814B71B4A3F46DBD9D5A
31,686,152 UART: [art] SIG.S = E0F22F225793302AEA57C3C8DC99EA092054B56CD10387CE8D9DD3147E2B85A23ACA979CDC4C03D133C4BA0318493709
32,990,767 UART: Caliptra RT
32,991,503 UART: [state] CFI Enabled
33,153,799 UART: [rt] RT listening for mailbox commands...
33,155,695 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,186,399 UART: [rt]cmd =0x434b4558, len=80
33,187,793 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,794 writing to cptra_bootfsm_go
192,902 UART:
193,283 UART: Running Caliptra ROM ...
194,392 UART:
603,994 UART: [state] CFI Enabled
615,623 UART: [state] LifecycleState = Unprovisioned
617,572 UART: [state] DebugLocked = No
619,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,014 UART: [kat] SHA2-256
794,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,253 UART: [kat] ++
805,727 UART: [kat] sha1
815,671 UART: [kat] SHA2-256
818,393 UART: [kat] SHA2-384
822,816 UART: [kat] SHA2-512-ACC
825,182 UART: [kat] ECC-384
3,109,958 UART: [kat] HMAC-384Kdf
3,120,562 UART: [kat] LMS
4,310,670 UART: [kat] --
4,314,680 UART: [cold-reset] ++
4,317,033 UART: [fht] Storing FHT @ 0x50003400
4,329,429 UART: [idev] ++
4,329,987 UART: [idev] CDI.KEYID = 6
4,331,020 UART: [idev] SUBJECT.KEYID = 7
4,332,193 UART: [idev] UDS.KEYID = 0
4,333,269 ready_for_fw is high
4,333,498 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,459 UART: [idev] Erasing UDS.KEYID = 0
7,619,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,074 UART: [idev] --
7,644,932 UART: [ldev] ++
7,645,502 UART: [ldev] CDI.KEYID = 6
7,646,468 UART: [ldev] SUBJECT.KEYID = 5
7,647,679 UART: [ldev] AUTHORITY.KEYID = 7
7,648,981 UART: [ldev] FE.KEYID = 1
7,658,502 UART: [ldev] Erasing FE.KEYID = 1
10,948,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,269 UART: [ldev] --
13,308,036 UART: [fwproc] Waiting for Commands...
13,310,186 UART: [fwproc] Received command 0x46574c44
13,312,362 UART: [fwproc] Received Image of size 113760 bytes
17,359,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,410 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,823,589 >>> mbox cmd response: success
17,827,298 UART: [afmc] ++
17,827,909 UART: [afmc] CDI.KEYID = 6
17,828,793 UART: [afmc] SUBJECT.KEYID = 7
17,830,062 UART: [afmc] AUTHORITY.KEYID = 5
21,141,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,248 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,616 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,462 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,924 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,489 UART: [afmc] --
23,510,709 UART: [cold-reset] --
23,513,814 UART: [state] Locking Datavault
23,519,331 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,093 UART: [state] Locking ICCM
23,523,405 UART: [exit] Launching FMC @ 0x40000130
23,531,799 UART:
23,532,051 UART: Running Caliptra FMC ...
23,533,107 UART:
23,533,260 UART: [state] CFI Enabled
23,541,414 UART: [fht] FMC Alias Private Key: 7
25,872,958 UART: [art] Extend RT PCRs Done
25,874,172 UART: [art] Lock RT PCRs Done
25,875,839 UART: [art] Populate DV Done
25,881,406 UART: [fht] FMC Alias Private Key: 7
25,882,943 UART: [art] Derive CDI
25,883,752 UART: [art] Store in in slot 0x4
25,926,513 UART: [art] Derive Key Pair
25,927,546 UART: [art] Store priv key in slot 0x5
29,169,108 UART: [art] Derive Key Pair - Done
29,182,042 UART: [art] Signing Cert with AUTHO
29,183,379 UART: RITY.KEYID = 7
31,462,723 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,244 UART: [art] PUB.X = B0C7E108550D41E9C9141E37D3DCD8730C4996FBB8D2DDBC91B1BD4645A3935A4D33F44FB4B588E26392E1345A54F6E8
31,471,463 UART: [art] PUB.Y = 653BAF9A60C32973D4CEEAB6B331B092477C40B3BE191EE8702E910913C5AD70E835052AE481F53755545CD153BFCAC0
31,478,716 UART: [art] SIG.R = 14FB24AB48D5C7BB5EAC2B22FC2F80065730EBC94D784606685C72AD22C255F10ED4BA91BD99E28F6C7503187B0BEDFC
31,486,080 UART: [art] SIG.S = CDAA4A5811CDD3A6F2F08E24B465803D89BDAE88A3056F801286742EABCDB187AE7C518B317F07750FBAF1FD3DB6A689
32,791,275 UART: Caliptra RT
32,791,988 UART: [state] CFI Enabled
32,909,803 UART: [rt] RT listening for mailbox commands...
32,911,678 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,942,156 UART: [rt]cmd =0x434b4558, len=80
32,943,663 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
4,123,751 ready_for_fw is high
4,124,356 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,064,785 >>> mbox cmd response: success
23,704,800 UART:
23,705,529 UART: Running Caliptra FMC ...
23,706,656 UART:
23,706,810 UART: [state] CFI Enabled
23,714,261 UART: [fht] FMC Alias Private Key: 7
26,044,733 UART: [art] Extend RT PCRs Done
26,046,007 UART: [art] Lock RT PCRs Done
26,047,643 UART: [art] Populate DV Done
26,052,872 UART: [fht] FMC Alias Private Key: 7
26,054,575 UART: [art] Derive CDI
26,055,395 UART: [art] Store in in slot 0x4
26,097,950 UART: [art] Derive Key Pair
26,098,986 UART: [art] Store priv key in slot 0x5
29,341,145 UART: [art] Derive Key Pair - Done
29,353,795 UART: [art] Signing Cert with AUTHO
29,355,104 UART: RITY.KEYID = 7
31,634,456 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,974 UART: [art] PUB.X = 66F44D323A4E31933428C3C40B2979D8F1EF814E5E2F0BC0BACFE39FC63BFF38608DA3DF5FC9DE67BBCA3C0316D18102
31,643,191 UART: [art] PUB.Y = 541B3DFC46AB3754AFD8899DB8B48282AB7FCD6F537B3252E7507736A377CBC897F646A4B8683D19C9161DA814A00B62
31,650,466 UART: [art] SIG.R = 3C281B115406F12D640C1AFCE7A43F4FFE7460F3A097D745868C90DA26D1C31141E46FB22EEDAE09B57E6EE87928F174
31,657,886 UART: [art] SIG.S = 1712D2F37E51BC85CEBFAFC7133E09C1E5AE3166404106ED6172744E8819097F6AAFA7C027B83FB67918D51CF5524EB5
32,963,150 UART: Caliptra RT
32,963,851 UART: [state] CFI Enabled
33,082,282 UART: [rt] RT listening for mailbox commands...
33,084,180 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,114,712 UART: [rt]cmd =0x434b4558, len=80
33,116,262 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
192,578 UART:
192,948 UART: Running Caliptra ROM ...
194,135 UART:
194,287 UART: [state] CFI Enabled
265,906 UART: [state] LifecycleState = Unprovisioned
267,844 UART: [state] DebugLocked = No
269,018 UART: [state] WD Timer not started. Device not locked for debugging
273,484 UART: [kat] SHA2-256
452,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,157 UART: [kat] ++
464,694 UART: [kat] sha1
474,364 UART: [kat] SHA2-256
477,361 UART: [kat] SHA2-384
484,762 UART: [kat] SHA2-512-ACC
487,704 UART: [kat] ECC-384
2,945,942 UART: [kat] HMAC-384Kdf
2,969,956 UART: [kat] LMS
3,499,403 UART: [kat] --
3,503,247 UART: [cold-reset] ++
3,504,217 UART: [fht] FHT @ 0x50003400
3,515,334 UART: [idev] ++
3,515,913 UART: [idev] CDI.KEYID = 6
3,516,801 UART: [idev] SUBJECT.KEYID = 7
3,518,046 UART: [idev] UDS.KEYID = 0
3,518,948 ready_for_fw is high
3,519,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,248 UART: [idev] Erasing UDS.KEYID = 0
6,026,810 UART: [idev] Sha1 KeyId Algorithm
6,049,712 UART: [idev] --
6,054,629 UART: [ldev] ++
6,055,201 UART: [ldev] CDI.KEYID = 6
6,056,267 UART: [ldev] SUBJECT.KEYID = 5
6,057,372 UART: [ldev] AUTHORITY.KEYID = 7
6,058,545 UART: [ldev] FE.KEYID = 1
6,099,544 UART: [ldev] Erasing FE.KEYID = 1
8,604,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,488 UART: [ldev] --
10,416,028 UART: [fwproc] Wait for Commands...
10,418,559 UART: [fwproc] Recv command 0x46574c44
10,420,659 UART: [fwproc] Recv'd Img size: 114084 bytes
13,828,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,291,470 >>> mbox cmd response: success
14,295,345 UART: [afmc] ++
14,295,942 UART: [afmc] CDI.KEYID = 6
14,296,852 UART: [afmc] SUBJECT.KEYID = 7
14,298,007 UART: [afmc] AUTHORITY.KEYID = 5
16,834,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,650 UART: [afmc] --
18,632,218 UART: [cold-reset] --
18,635,425 UART: [state] Locking Datavault
18,640,619 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,269 UART: [state] Locking ICCM
18,644,474 UART: [exit] Launching FMC @ 0x40000130
18,652,930 UART:
18,653,163 UART: Running Caliptra FMC ...
18,654,261 UART:
18,654,435 UART: [state] CFI Enabled
18,713,013 UART: [fht] FMC Alias Private Key: 7
20,476,921 UART: [art] Extend RT PCRs Done
20,478,142 UART: [art] Lock RT PCRs Done
20,479,710 UART: [art] Populate DV Done
20,485,171 UART: [fht] FMC Alias Private Key: 7
20,486,711 UART: [art] Derive CDI
20,487,523 UART: [art] Store in in slot 0x4
20,545,806 UART: [art] Derive Key Pair
20,546,835 UART: [art] Store priv key in slot 0x5
23,009,852 UART: [art] Derive Key Pair - Done
23,022,853 UART: [art] Signing Cert with AUTHO
23,024,190 UART: RITY.KEYID = 7
24,735,768 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,266 UART: [art] PUB.X = 8DEEA0FC86C4DF2FECF4296632B674C8B8730CC8C8C0D60D4E131A8496B26FF34B8368A8D04BF0E5989F2008499DC325
24,744,540 UART: [art] PUB.Y = 03096D7BEFDDE7B3A3D19D0B13AC10A189135528A055ACB5C04922E053778B83E1E89003C6C1CC8E0808FDEDD53D77EB
24,751,806 UART: [art] SIG.R = 27232F9AC66FBA33F7E96631BE9D416314154C533AC45B740FDF8EA366923EED5988E344B2BFA020B76F1061AEBD5FCA
24,759,239 UART: [art] SIG.S = 0F9ACE1523EC7B4AB6309BF3839B195C03D20812FE72BB2D0C99F2BAC0E2E65ECDA97A282036D840155066CA69716A50
25,738,449 UART: Caliptra RT
25,739,149 UART: [state] CFI Enabled
25,903,096 UART: [rt] RT listening for mailbox commands...
25,904,979 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,936,012 UART: [rt]cmd =0x434b4558, len=80
25,937,351 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
3,382,136 ready_for_fw is high
3,382,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,085,518 >>> mbox cmd response: success
18,363,569 UART:
18,364,388 UART: Running Caliptra FMC ...
18,365,519 UART:
18,365,670 UART: [state] CFI Enabled
18,432,212 UART: [fht] FMC Alias Private Key: 7
20,195,964 UART: [art] Extend RT PCRs Done
20,197,711 UART: [art] Lock RT PCRs Done
20,198,967 UART: [art] Populate DV Done
20,204,460 UART: [fht] FMC Alias Private Key: 7
20,206,003 UART: [art] Derive CDI
20,206,742 UART: [art] Store in in slot 0x4
20,267,022 UART: [art] Derive Key Pair
20,268,020 UART: [art] Store priv key in slot 0x5
22,730,894 UART: [art] Derive Key Pair - Done
22,743,621 UART: [art] Signing Cert with AUTHO
22,744,928 UART: RITY.KEYID = 7
24,456,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,242 UART: [art] PUB.X = 00743A91A07E390D1C0E46E4BBED680288A6BA2778DF20F04A2838D54F2628D7A9BCAF24195528014A0BF255536EDE3D
24,465,009 UART: [art] PUB.Y = 6EE9125AA802A91D6DCDF851B778E43BE2FBAB33A6150ED3DA2DAE9A0A330D61ADE2292209A5B3D0B3B9E89F80357160
24,472,253 UART: [art] SIG.R = 041DD351A1DC72F7108564814180A68B835893ACDDE8A666ACEA2D3A414A4C28AAB00550A53393DBE08A6F5DF3221904
24,479,635 UART: [art] SIG.S = A7BE6E52AF6FE598D7B8B9278CF98C4BCEFB3C26088B7B809D88008834621BCFE2EA84271FE1235925599C5453D9FC87
25,458,728 UART: Caliptra RT
25,459,808 UART: [state] CFI Enabled
25,627,687 UART: [rt] RT listening for mailbox commands...
25,629,824 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,661,000 UART: [rt]cmd =0x434b4558, len=80
25,662,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,777 writing to cptra_bootfsm_go
193,030 UART:
193,415 UART: Running Caliptra ROM ...
194,550 UART:
604,251 UART: [state] CFI Enabled
620,421 UART: [state] LifecycleState = Unprovisioned
622,244 UART: [state] DebugLocked = No
623,491 UART: [state] WD Timer not started. Device not locked for debugging
627,964 UART: [kat] SHA2-256
807,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,658 UART: [kat] ++
819,197 UART: [kat] sha1
830,227 UART: [kat] SHA2-256
833,230 UART: [kat] SHA2-384
839,573 UART: [kat] SHA2-512-ACC
842,516 UART: [kat] ECC-384
3,285,846 UART: [kat] HMAC-384Kdf
3,299,087 UART: [kat] LMS
3,828,583 UART: [kat] --
3,834,775 UART: [cold-reset] ++
3,836,633 UART: [fht] FHT @ 0x50003400
3,847,540 UART: [idev] ++
3,848,112 UART: [idev] CDI.KEYID = 6
3,849,027 UART: [idev] SUBJECT.KEYID = 7
3,850,205 UART: [idev] UDS.KEYID = 0
3,851,128 ready_for_fw is high
3,851,344 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,708 UART: [idev] Erasing UDS.KEYID = 0
6,320,326 UART: [idev] Sha1 KeyId Algorithm
6,342,790 UART: [idev] --
6,346,174 UART: [ldev] ++
6,346,752 UART: [ldev] CDI.KEYID = 6
6,347,685 UART: [ldev] SUBJECT.KEYID = 5
6,348,787 UART: [ldev] AUTHORITY.KEYID = 7
6,350,128 UART: [ldev] FE.KEYID = 1
6,361,157 UART: [ldev] Erasing FE.KEYID = 1
8,836,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,782 UART: [ldev] --
10,628,344 UART: [fwproc] Wait for Commands...
10,630,543 UART: [fwproc] Recv command 0x46574c44
10,632,636 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,553 >>> mbox cmd response: success
14,495,752 UART: [afmc] ++
14,496,347 UART: [afmc] CDI.KEYID = 6
14,497,776 UART: [afmc] SUBJECT.KEYID = 7
14,498,917 UART: [afmc] AUTHORITY.KEYID = 5
17,003,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,875 UART: [afmc] --
18,801,369 UART: [cold-reset] --
18,804,961 UART: [state] Locking Datavault
18,811,614 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,264 UART: [state] Locking ICCM
18,814,306 UART: [exit] Launching FMC @ 0x40000130
18,822,715 UART:
18,822,991 UART: Running Caliptra FMC ...
18,824,106 UART:
18,824,270 UART: [state] CFI Enabled
18,832,212 UART: [fht] FMC Alias Private Key: 7
20,590,061 UART: [art] Extend RT PCRs Done
20,591,268 UART: [art] Lock RT PCRs Done
20,593,209 UART: [art] Populate DV Done
20,598,889 UART: [fht] FMC Alias Private Key: 7
20,600,439 UART: [art] Derive CDI
20,601,205 UART: [art] Store in in slot 0x4
20,644,179 UART: [art] Derive Key Pair
20,645,179 UART: [art] Store priv key in slot 0x5
23,072,521 UART: [art] Derive Key Pair - Done
23,085,473 UART: [art] Signing Cert with AUTHO
23,086,802 UART: RITY.KEYID = 7
24,792,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,072 UART: [art] PUB.X = 92DD6AB5878E63A9D40C9B9138069B44E0D4A6EBAB7456984DBE7A3DF341529AA1BD694949B046E2942CABD714B44D1E
24,801,347 UART: [art] PUB.Y = 2F688E81C1904B6526FB621801D9101D67E013FF55DFE840D32951AF4631582B05FD5DB32D5F5341782EE058CDC91CDE
24,808,603 UART: [art] SIG.R = 1A0D324F3E4C453A12A2CD2CD56A059571C8F815D234C9A0A984FBB72C8AFE9C78E33DE396D59FB0EE0246B4FA80B5E2
24,816,029 UART: [art] SIG.S = 3CC86987E634E35206858FD675B74670339A252B79450BA5EA90597AD5F6E0FBD3F0C4D8522DF5E8349624A50E4BABFE
25,794,910 UART: Caliptra RT
25,795,617 UART: [state] CFI Enabled
25,911,767 UART: [rt] RT listening for mailbox commands...
25,913,647 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,944,049 UART: [rt]cmd =0x434b4558, len=80
25,945,681 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
3,692,198 ready_for_fw is high
3,692,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,655 >>> mbox cmd response: success
18,521,873 UART:
18,522,287 UART: Running Caliptra FMC ...
18,523,511 UART:
18,523,684 UART: [state] CFI Enabled
18,531,423 UART: [fht] FMC Alias Private Key: 7
20,289,182 UART: [art] Extend RT PCRs Done
20,290,406 UART: [art] Lock RT PCRs Done
20,291,982 UART: [art] Populate DV Done
20,297,446 UART: [fht] FMC Alias Private Key: 7
20,298,935 UART: [art] Derive CDI
20,299,699 UART: [art] Store in in slot 0x4
20,342,129 UART: [art] Derive Key Pair
20,343,134 UART: [art] Store priv key in slot 0x5
22,769,825 UART: [art] Derive Key Pair - Done
22,782,245 UART: [art] Signing Cert with AUTHO
22,783,554 UART: RITY.KEYID = 7
24,488,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,385 UART: [art] PUB.X = 99BA44693E4CC067F3AC8C6C9B06BF135513AB5FE6A06E9E818A970C4289F8E674FE6ACF95B881E58F5DFD44700B594B
24,497,681 UART: [art] PUB.Y = ED5E230A531F1C546B56D89EFB85D3306CF3C9E05547510AEE5A068F1B6E048D666A28EC1FE0AF6F783CF517C9D5E1DE
24,504,965 UART: [art] SIG.R = 8BCFBBBA89D9E449C9AC0897ED428D815EB094149FDE0666A822FCD10DC6147444AC2F0E044840E7623980E82CD722B3
24,512,332 UART: [art] SIG.S = E115986E7D93F5D409A97F6BF1F49A344B65B614CE9F12CE50A7CCDF1B88BE671AAB10400E4F43E4A33756426A4A2425
25,491,583 UART: Caliptra RT
25,492,295 UART: [state] CFI Enabled
25,609,125 UART: [rt] RT listening for mailbox commands...
25,611,027 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,641,586 UART: [rt]cmd =0x434b4558, len=80
25,643,267 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,332 UART:
192,698 UART: Running Caliptra ROM ...
193,860 UART:
194,006 UART: [state] CFI Enabled
263,407 UART: [state] LifecycleState = Unprovisioned
265,762 UART: [state] DebugLocked = No
268,646 UART: [state] WD Timer not started. Device not locked for debugging
273,408 UART: [kat] SHA2-256
463,249 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,047 UART: [kat] ++
474,523 UART: [kat] sha1
487,688 UART: [kat] SHA2-256
490,694 UART: [kat] SHA2-384
496,470 UART: [kat] SHA2-512-ACC
499,058 UART: [kat] ECC-384
2,946,929 UART: [kat] HMAC-384Kdf
2,971,813 UART: [kat] LMS
3,503,645 UART: [kat] --
3,509,017 UART: [cold-reset] ++
3,510,877 UART: [fht] FHT @ 0x50003400
3,521,642 UART: [idev] ++
3,522,356 UART: [idev] CDI.KEYID = 6
3,523,311 UART: [idev] SUBJECT.KEYID = 7
3,524,477 UART: [idev] UDS.KEYID = 0
3,525,448 ready_for_fw is high
3,525,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,106 UART: [idev] Erasing UDS.KEYID = 0
6,027,412 UART: [idev] Sha1 KeyId Algorithm
6,049,574 UART: [idev] --
6,054,208 UART: [ldev] ++
6,054,890 UART: [ldev] CDI.KEYID = 6
6,055,862 UART: [ldev] SUBJECT.KEYID = 5
6,056,989 UART: [ldev] AUTHORITY.KEYID = 7
6,058,243 UART: [ldev] FE.KEYID = 1
6,100,165 UART: [ldev] Erasing FE.KEYID = 1
8,606,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,109 UART: [ldev] --
10,412,209 UART: [fwproc] Wait for Commands...
10,414,298 UART: [fwproc] Recv command 0x46574c44
10,416,576 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,654 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,713 >>> mbox cmd response: success
14,594,230 UART: [afmc] ++
14,594,934 UART: [afmc] CDI.KEYID = 6
14,596,040 UART: [afmc] SUBJECT.KEYID = 7
14,597,587 UART: [afmc] AUTHORITY.KEYID = 5
17,126,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,893 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,220 UART: [afmc] --
18,928,399 UART: [cold-reset] --
18,933,511 UART: [state] Locking Datavault
18,939,366 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,518 UART: [state] Locking ICCM
18,944,371 UART: [exit] Launching FMC @ 0x40000130
18,953,004 UART:
18,953,246 UART: Running Caliptra FMC ...
18,954,344 UART:
18,954,500 UART: [state] CFI Enabled
19,011,239 UART: [fht] FMC Alias Private Key: 7
20,774,958 UART: [art] Extend RT PCRs Done
20,776,188 UART: [art] Lock RT PCRs Done
20,777,958 UART: [art] Populate DV Done
20,783,366 UART: [fht] FMC Alias Private Key: 7
20,785,055 UART: [art] Derive CDI
20,785,791 UART: [art] Store in in slot 0x4
20,843,926 UART: [art] Derive Key Pair
20,844,960 UART: [art] Store priv key in slot 0x5
23,308,074 UART: [art] Derive Key Pair - Done
23,321,021 UART: [art] Signing Cert with AUTHO
23,322,331 UART: RITY.KEYID = 7
25,034,363 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,881 UART: [art] PUB.X = 2D4A9B1216C3C369988A73521F00036970B7CFE0C2753C52776BA536C5F36A21EEC336B7D6258D4D84E3298CFA8F6B80
25,043,154 UART: [art] PUB.Y = F9674210991DBACA7CD8561B9F6166953FF1613EB57C466AAC28B9E31C834F41AD4D0074F11E5D4D811F645AC55164AD
25,050,397 UART: [art] SIG.R = 354BEFA5DB74B5CEE69CAB26A5240CFB6499C298450D54AD6232BB0E8F46A35A006EC96D9B0C71AFFFC2494FB5F5AC33
25,057,774 UART: [art] SIG.S = 5DE54607701819B792731070249DD30471DFCB1C7718E73EB6B61DF865147CD90B492917CE9A44B329D448D752A5F689
26,037,131 UART: Caliptra RT
26,037,829 UART: [state] CFI Enabled
26,202,217 UART: [rt] RT listening for mailbox commands...
26,204,101 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,235,345 UART: [rt]cmd =0x434b4558, len=80
26,236,847 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
3,415,602 ready_for_fw is high
3,415,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,679,214 >>> mbox cmd response: success
18,960,236 UART:
18,960,630 UART: Running Caliptra FMC ...
18,961,819 UART:
18,961,987 UART: [state] CFI Enabled
19,028,486 UART: [fht] FMC Alias Private Key: 7
20,792,145 UART: [art] Extend RT PCRs Done
20,793,375 UART: [art] Lock RT PCRs Done
20,795,022 UART: [art] Populate DV Done
20,800,345 UART: [fht] FMC Alias Private Key: 7
20,801,981 UART: [art] Derive CDI
20,802,803 UART: [art] Store in in slot 0x4
20,860,702 UART: [art] Derive Key Pair
20,861,702 UART: [art] Store priv key in slot 0x5
23,324,472 UART: [art] Derive Key Pair - Done
23,337,523 UART: [art] Signing Cert with AUTHO
23,338,830 UART: RITY.KEYID = 7
25,050,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,415 UART: [art] PUB.X = BDE23BF079897A985DF3BDF56BA7ECEE3A7C8479074D7DABB0900F30C703CD4B60A4230FC16A58FF6404FEC8E0CD1303
25,059,699 UART: [art] PUB.Y = CBAC0D93EDC48CA6F88D8CA7989BCD3604240B8800A30947A126B7E8D2EE849E8E4666C2B6F6C20BE2EB1CEEA6FEE384
25,066,923 UART: [art] SIG.R = 8DAAEDC6F3DC9FE327E21F3DCB89487366180496ADABF13F1AF38464159398B5439DA9F5F2F27F148D61178182AEA22B
25,074,383 UART: [art] SIG.S = F0E464271B8D5ACD1F97DEAB63C1D1B7147919C2C047C2EA5FCDD453DD384EEC2ED234E1778FE61762F4B41D6265D30A
26,052,866 UART: Caliptra RT
26,053,581 UART: [state] CFI Enabled
26,220,394 UART: [rt] RT listening for mailbox commands...
26,222,284 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,253,295 UART: [rt]cmd =0x434b4558, len=80
26,254,877 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,585 writing to cptra_bootfsm_go
192,808 UART:
193,181 UART: Running Caliptra ROM ...
194,377 UART:
604,072 UART: [state] CFI Enabled
618,586 UART: [state] LifecycleState = Unprovisioned
620,968 UART: [state] DebugLocked = No
623,211 UART: [state] WD Timer not started. Device not locked for debugging
628,534 UART: [kat] SHA2-256
818,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,211 UART: [kat] ++
829,737 UART: [kat] sha1
842,029 UART: [kat] SHA2-256
845,062 UART: [kat] SHA2-384
849,854 UART: [kat] SHA2-512-ACC
852,440 UART: [kat] ECC-384
3,296,405 UART: [kat] HMAC-384Kdf
3,311,046 UART: [kat] LMS
3,842,894 UART: [kat] --
3,844,577 UART: [cold-reset] ++
3,845,870 UART: [fht] FHT @ 0x50003400
3,857,225 UART: [idev] ++
3,857,907 UART: [idev] CDI.KEYID = 6
3,858,828 UART: [idev] SUBJECT.KEYID = 7
3,860,002 UART: [idev] UDS.KEYID = 0
3,860,936 ready_for_fw is high
3,861,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,337 UART: [idev] Erasing UDS.KEYID = 0
6,336,743 UART: [idev] Sha1 KeyId Algorithm
6,358,289 UART: [idev] --
6,363,162 UART: [ldev] ++
6,363,898 UART: [ldev] CDI.KEYID = 6
6,364,782 UART: [ldev] SUBJECT.KEYID = 5
6,365,993 UART: [ldev] AUTHORITY.KEYID = 7
6,367,119 UART: [ldev] FE.KEYID = 1
6,379,106 UART: [ldev] Erasing FE.KEYID = 1
8,854,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,467 UART: [ldev] --
10,642,305 UART: [fwproc] Wait for Commands...
10,643,861 UART: [fwproc] Recv command 0x46574c44
10,646,172 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,762 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,996 >>> mbox cmd response: success
14,839,734 UART: [afmc] ++
14,840,447 UART: [afmc] CDI.KEYID = 6
14,841,644 UART: [afmc] SUBJECT.KEYID = 7
14,843,087 UART: [afmc] AUTHORITY.KEYID = 5
17,345,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,298 UART: [afmc] --
19,142,472 UART: [cold-reset] --
19,146,533 UART: [state] Locking Datavault
19,153,536 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,744 UART: [state] Locking ICCM
19,157,199 UART: [exit] Launching FMC @ 0x40000130
19,165,823 UART:
19,166,060 UART: Running Caliptra FMC ...
19,167,172 UART:
19,167,334 UART: [state] CFI Enabled
19,175,709 UART: [fht] FMC Alias Private Key: 7
20,931,937 UART: [art] Extend RT PCRs Done
20,933,145 UART: [art] Lock RT PCRs Done
20,934,852 UART: [art] Populate DV Done
20,940,052 UART: [fht] FMC Alias Private Key: 7
20,941,595 UART: [art] Derive CDI
20,942,410 UART: [art] Store in in slot 0x4
20,984,959 UART: [art] Derive Key Pair
20,986,045 UART: [art] Store priv key in slot 0x5
23,412,600 UART: [art] Derive Key Pair - Done
23,425,919 UART: [art] Signing Cert with AUTHO
23,427,226 UART: RITY.KEYID = 7
25,132,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,353 UART: [art] PUB.X = F9322EC2B326468904F9C81C713F619CBC6556EDED0E9316148F842E806E2C680355D13CAF6F3432E49EB018D56A60A8
25,141,661 UART: [art] PUB.Y = 0F1ACA3AD0B4F893B720CDD78AD503107CF02F42EAAF8104699C5AF4C835AAED68C0194E0CC869EB5B4B25FC34717C17
25,148,942 UART: [art] SIG.R = BF7A1EF776A2B134140876F02D4F122AD9A6C79CD226C234B78D8A2CB314E75F551ED55508B179122B7BDA35C8EA5B6E
25,156,318 UART: [art] SIG.S = C9DDA66A0EF5E210E6604C6997D3155CFFB8A812F9486AAF26EB3024BFBB61F10FAB6171BEA25B4298D1F51221D3A8AC
26,134,800 UART: Caliptra RT
26,135,493 UART: [state] CFI Enabled
26,252,721 UART: [rt] RT listening for mailbox commands...
26,254,597 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,285,153 UART: [rt]cmd =0x434b4558, len=80
26,286,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
3,753,813 ready_for_fw is high
3,754,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,940,364 >>> mbox cmd response: success
19,191,236 UART:
19,191,622 UART: Running Caliptra FMC ...
19,192,814 UART:
19,192,984 UART: [state] CFI Enabled
19,201,048 UART: [fht] FMC Alias Private Key: 7
20,958,314 UART: [art] Extend RT PCRs Done
20,959,552 UART: [art] Lock RT PCRs Done
20,961,293 UART: [art] Populate DV Done
20,966,776 UART: [fht] FMC Alias Private Key: 7
20,968,380 UART: [art] Derive CDI
20,969,201 UART: [art] Store in in slot 0x4
21,011,937 UART: [art] Derive Key Pair
21,012,988 UART: [art] Store priv key in slot 0x5
23,439,577 UART: [art] Derive Key Pair - Done
23,452,368 UART: [art] Signing Cert with AUTHO
23,453,672 UART: RITY.KEYID = 7
25,159,036 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,548 UART: [art] PUB.X = 0747F1671BD5A1812B0107AA43F067F0BE97F537E9ECE4808916C4D265503F88F4E29DB76D8624B7987604F78B5AF6AE
25,167,793 UART: [art] PUB.Y = 2AD9BEA19016BF0FF7A1B66BC6FA46240458487C90A11AAA1359F3035A1D4A0E8C538F7B5DAD6780CC92E7BC3A30CD36
25,175,022 UART: [art] SIG.R = FC0942CC46A498FFEAF1C5ACB07C51B7B0E44B26402C133AB1629E978FDBB5618959FD4E1D0D57EC3B249C94A18ABE2A
25,182,429 UART: [art] SIG.S = 0940FA364423697088F09E7910FEF941898950F174328B772E9288C0B70463F099BB0269BB829B87F8D683803793D1CB
26,161,402 UART: Caliptra RT
26,162,117 UART: [state] CFI Enabled
26,278,882 UART: [rt] RT listening for mailbox commands...
26,280,756 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,311,161 UART: [rt]cmd =0x434b4558, len=80
26,312,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,589 UART: [kat] SHA2-256
881,520 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,635 UART: [kat] ++
885,787 UART: [kat] sha1
889,969 UART: [kat] SHA2-256
891,907 UART: [kat] SHA2-384
894,616 UART: [kat] SHA2-512-ACC
896,517 UART: [kat] ECC-384
902,140 UART: [kat] HMAC-384Kdf
906,738 UART: [kat] LMS
1,474,934 UART: [kat] --
1,475,661 UART: [cold-reset] ++
1,476,225 UART: [fht] Storing FHT @ 0x50003400
1,479,102 UART: [idev] ++
1,479,270 UART: [idev] CDI.KEYID = 6
1,479,630 UART: [idev] SUBJECT.KEYID = 7
1,480,054 UART: [idev] UDS.KEYID = 0
1,480,399 ready_for_fw is high
1,480,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,726 UART: [idev] Erasing UDS.KEYID = 0
1,504,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,704 UART: [idev] --
1,513,687 UART: [ldev] ++
1,513,855 UART: [ldev] CDI.KEYID = 6
1,514,218 UART: [ldev] SUBJECT.KEYID = 5
1,514,644 UART: [ldev] AUTHORITY.KEYID = 7
1,515,107 UART: [ldev] FE.KEYID = 1
1,520,085 UART: [ldev] Erasing FE.KEYID = 1
1,545,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,434 UART: [ldev] --
1,584,779 UART: [fwproc] Waiting for Commands...
1,585,584 UART: [fwproc] Received command 0x46574c44
1,586,375 UART: [fwproc] Received Image of size 114084 bytes
2,880,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,504 >>> mbox cmd response: success
3,073,674 UART: [afmc] ++
3,073,842 UART: [afmc] CDI.KEYID = 6
3,074,204 UART: [afmc] SUBJECT.KEYID = 7
3,074,629 UART: [afmc] AUTHORITY.KEYID = 5
3,109,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,425 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,115 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,902 UART: [afmc] --
3,152,956 UART: [cold-reset] --
3,153,724 UART: [state] Locking Datavault
3,155,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,631 UART: [state] Locking ICCM
3,156,097 UART: [exit] Launching FMC @ 0x40000130
3,161,426 UART:
3,161,442 UART: Running Caliptra FMC ...
3,161,850 UART:
3,161,904 UART: [state] CFI Enabled
3,172,381 UART: [fht] FMC Alias Private Key: 7
3,280,486 UART: [art] Extend RT PCRs Done
3,280,914 UART: [art] Lock RT PCRs Done
3,282,416 UART: [art] Populate DV Done
3,290,815 UART: [fht] FMC Alias Private Key: 7
3,291,919 UART: [art] Derive CDI
3,292,199 UART: [art] Store in in slot 0x4
3,377,772 UART: [art] Derive Key Pair
3,378,132 UART: [art] Store priv key in slot 0x5
3,391,582 UART: [art] Derive Key Pair - Done
3,406,110 UART: [art] Signing Cert with AUTHO
3,406,590 UART: RITY.KEYID = 7
3,421,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,465 UART: [art] PUB.X = 4465B658D44A3BF9EF1D9E17908EAC940292589A6533CA4D5F93DEE33EE31862DD5AB492C82B94FD3E26D74BEC3E2401
3,429,239 UART: [art] PUB.Y = 05C487FB40B6B3A8F0C3D5B4D6FA190798BD8ED7CFC70257BF0CF3F4D742968ECB1FC5D920B5EA84C1712D8600054EA2
3,436,168 UART: [art] SIG.R = 2B9E57D8DE587D70C992C006CB81D0D716D609BADFA2E71435611BCC7C872D7C76451B31601F258178EB109DC41EEA72
3,442,938 UART: [art] SIG.S = EBBD8A1DACDACA777C215E8E89E54AFA9C890A1BC28AE5D89C65159C147920AB8062C37262B13677E85D53DB5FF07D86
3,466,296 UART: Caliptra RT
3,466,549 UART: [state] CFI Enabled
3,575,044 UART: [rt] RT listening for mailbox commands...
3,575,714 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,132 UART: [rt]cmd =0x434b4558, len=80
3,607,189 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,929 ready_for_fw is high
1,361,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,234 >>> mbox cmd response: success
2,983,640 UART:
2,983,656 UART: Running Caliptra FMC ...
2,984,064 UART:
2,984,118 UART: [state] CFI Enabled
2,994,557 UART: [fht] FMC Alias Private Key: 7
3,102,224 UART: [art] Extend RT PCRs Done
3,102,652 UART: [art] Lock RT PCRs Done
3,104,080 UART: [art] Populate DV Done
3,112,295 UART: [fht] FMC Alias Private Key: 7
3,113,469 UART: [art] Derive CDI
3,113,749 UART: [art] Store in in slot 0x4
3,199,046 UART: [art] Derive Key Pair
3,199,406 UART: [art] Store priv key in slot 0x5
3,212,176 UART: [art] Derive Key Pair - Done
3,226,757 UART: [art] Signing Cert with AUTHO
3,227,237 UART: RITY.KEYID = 7
3,242,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,243,236 UART: [art] PUB.X = D2BC07BE0E63A3BA9FB16754848A457DE3B7AC14AAA5FB384DD26A1A83047EB2D4552515A6C4BA5B6F609E6ABD6CE0B8
3,250,019 UART: [art] PUB.Y = 3899A300EB75439C89E459C5A7CA1943A2B9CAE19CDED3320DB0014E0C0631D4A6ACB86915F977E8422D6C5F983F100E
3,256,938 UART: [art] SIG.R = F7683E9BE5D3C4D7485FCCCD3C115C2063DEACF1ACFBAD912DC22B3B7D4F8F76EC344F4FAFBDC2B7BB1FB3F976265B30
3,263,742 UART: [art] SIG.S = 70DE4D46159229052528BA18CFD10CF92E2F2BF26A5159FC907CF1E4AA931110A70020C54CF470347F396FC3DBEDD455
3,287,999 UART: Caliptra RT
3,288,252 UART: [state] CFI Enabled
3,395,119 UART: [rt] RT listening for mailbox commands...
3,395,789 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,426,355 UART: [rt]cmd =0x434b4558, len=80
3,427,448 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,126 UART: [kat] SHA2-256
882,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,172 UART: [kat] ++
886,324 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,697 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,584 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 ready_for_fw is high
1,481,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,795 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,522,112 UART: [ldev] Erasing FE.KEYID = 1
1,548,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,079 UART: [ldev] --
1,587,566 UART: [fwproc] Waiting for Commands...
1,588,411 UART: [fwproc] Received command 0x46574c44
1,589,202 UART: [fwproc] Received Image of size 114084 bytes
2,884,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,275 >>> mbox cmd response: success
3,078,525 UART: [afmc] ++
3,078,693 UART: [afmc] CDI.KEYID = 6
3,079,055 UART: [afmc] SUBJECT.KEYID = 7
3,079,480 UART: [afmc] AUTHORITY.KEYID = 5
3,114,713 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,204 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,894 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,695 UART: [afmc] --
3,157,793 UART: [cold-reset] --
3,158,783 UART: [state] Locking Datavault
3,159,930 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,534 UART: [state] Locking ICCM
3,160,992 UART: [exit] Launching FMC @ 0x40000130
3,166,321 UART:
3,166,337 UART: Running Caliptra FMC ...
3,166,745 UART:
3,166,888 UART: [state] CFI Enabled
3,177,619 UART: [fht] FMC Alias Private Key: 7
3,285,640 UART: [art] Extend RT PCRs Done
3,286,068 UART: [art] Lock RT PCRs Done
3,287,516 UART: [art] Populate DV Done
3,295,747 UART: [fht] FMC Alias Private Key: 7
3,296,691 UART: [art] Derive CDI
3,296,971 UART: [art] Store in in slot 0x4
3,382,496 UART: [art] Derive Key Pair
3,382,856 UART: [art] Store priv key in slot 0x5
3,396,344 UART: [art] Derive Key Pair - Done
3,411,291 UART: [art] Signing Cert with AUTHO
3,411,771 UART: RITY.KEYID = 7
3,426,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,622 UART: [art] PUB.X = E84BEC6CE7F638D68C71E1D9B8B50C7D263E84F54FD0F1161578763F61ACFE907006B1C673C2CF45974EE33F582DBFE8
3,434,398 UART: [art] PUB.Y = B4DE3D049633D204060E4680E916D2F4D757A6579F1C4B4825C1776D14D35E3F5E27AB847CB7021CA0DEEFB8EABA2F13
3,441,343 UART: [art] SIG.R = 2CF498344E239864C144645B35A6D591007629644239200E802D5D22274ED98DDB0F30F66D4B8C60134673FC1C250F69
3,448,068 UART: [art] SIG.S = C0FC1DEE4F3F2DD706B94515716AB3D4611DA7476366ED1E8D431415820727B3A577B68AFEDC2FEB85235B518F9748AB
3,471,463 UART: Caliptra RT
3,471,808 UART: [state] CFI Enabled
3,580,133 UART: [rt] RT listening for mailbox commands...
3,580,803 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,725 UART: [rt]cmd =0x434b4558, len=80
3,611,766 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,008 ready_for_fw is high
1,363,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,145 >>> mbox cmd response: success
2,985,315 UART:
2,985,331 UART: Running Caliptra FMC ...
2,985,739 UART:
2,985,882 UART: [state] CFI Enabled
2,996,333 UART: [fht] FMC Alias Private Key: 7
3,104,848 UART: [art] Extend RT PCRs Done
3,105,276 UART: [art] Lock RT PCRs Done
3,106,764 UART: [art] Populate DV Done
3,114,979 UART: [fht] FMC Alias Private Key: 7
3,115,999 UART: [art] Derive CDI
3,116,279 UART: [art] Store in in slot 0x4
3,202,148 UART: [art] Derive Key Pair
3,202,508 UART: [art] Store priv key in slot 0x5
3,215,558 UART: [art] Derive Key Pair - Done
3,230,046 UART: [art] Signing Cert with AUTHO
3,230,526 UART: RITY.KEYID = 7
3,245,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,507 UART: [art] PUB.X = E3F941BD666504CDA170778B721AB397D0E24631D7E1FDD173CFC757DA75AA671C14520959B3183BBEE385668E0256F3
3,253,270 UART: [art] PUB.Y = D4EE9C6CE0784B778D6B59A16BBA299342427120F6ED4EC91C2B80DA295EBE37295EEC70C3388371A8677EBF51A715F8
3,260,228 UART: [art] SIG.R = 63106A349977ADFEB4B430C61E8166F101C150CB1A4DEBAF9EBDE0E599E2526D48CC8D9E2A8549E72F12611B25C6E97D
3,267,007 UART: [art] SIG.S = 81E0FF1AF008FA120582AAE014EEF157686D34776F7741FE1CEED1826247C484BAFD0DD63E765735E7793037B0F08245
3,291,197 UART: Caliptra RT
3,291,542 UART: [state] CFI Enabled
3,399,257 UART: [rt] RT listening for mailbox commands...
3,399,927 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,229 UART: [rt]cmd =0x434b4558, len=80
3,431,370 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,448 UART: [state] LifecycleState = Unprovisioned
85,103 UART: [state] DebugLocked = No
85,749 UART: [state] WD Timer not started. Device not locked for debugging
86,876 UART: [kat] SHA2-256
892,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,651 UART: [kat] ++
896,803 UART: [kat] sha1
900,945 UART: [kat] SHA2-256
902,885 UART: [kat] SHA2-384
905,762 UART: [kat] SHA2-512-ACC
907,663 UART: [kat] ECC-384
917,418 UART: [kat] HMAC-384Kdf
922,162 UART: [kat] LMS
1,170,490 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,039 UART: [fht] FHT @ 0x50003400
1,174,740 UART: [idev] ++
1,174,908 UART: [idev] CDI.KEYID = 6
1,175,268 UART: [idev] SUBJECT.KEYID = 7
1,175,692 UART: [idev] UDS.KEYID = 0
1,176,037 ready_for_fw is high
1,176,037 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,775 UART: [idev] Sha1 KeyId Algorithm
1,209,357 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,230 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,119 >>> mbox cmd response: success
2,771,205 UART: [afmc] ++
2,771,373 UART: [afmc] CDI.KEYID = 6
2,771,735 UART: [afmc] SUBJECT.KEYID = 7
2,772,160 UART: [afmc] AUTHORITY.KEYID = 5
2,807,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,038 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,866 UART: [afmc] --
2,850,764 UART: [cold-reset] --
2,851,578 UART: [state] Locking Datavault
2,852,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,343 UART: [state] Locking ICCM
2,853,917 UART: [exit] Launching FMC @ 0x40000130
2,859,246 UART:
2,859,262 UART: Running Caliptra FMC ...
2,859,670 UART:
2,859,724 UART: [state] CFI Enabled
2,870,061 UART: [fht] FMC Alias Private Key: 7
2,977,868 UART: [art] Extend RT PCRs Done
2,978,296 UART: [art] Lock RT PCRs Done
2,979,384 UART: [art] Populate DV Done
2,987,337 UART: [fht] FMC Alias Private Key: 7
2,988,465 UART: [art] Derive CDI
2,988,745 UART: [art] Store in in slot 0x4
3,074,558 UART: [art] Derive Key Pair
3,074,918 UART: [art] Store priv key in slot 0x5
3,087,812 UART: [art] Derive Key Pair - Done
3,102,642 UART: [art] Signing Cert with AUTHO
3,103,122 UART: RITY.KEYID = 7
3,118,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,837 UART: [art] PUB.X = 14C0C413C9BEED186783DC418B8AFAE24B5073EA6C13BFD9107C130EEDD64E42FFF3E0BFA124C9E2A7E233C306DDD4CA
3,125,627 UART: [art] PUB.Y = BBF749D874394D74B83D9C0BAE9975FA58C280372782F9683582484B4EB6EFE952BA23AE56B2E1C640DB613D135D0A31
3,132,575 UART: [art] SIG.R = FAEBC8746B1F572CB93F976A17572611BBED1C782DD9E23804365B168C41407E3D69CC675795FFF1E1BCA037B6995793
3,139,346 UART: [art] SIG.S = D5BF430BE76F5AE46E018AE77E57F40BEB22A2F65685C4A108D04AEF2D0311316ED1A0C0995592AE925BDD637BA1618F
3,162,946 UART: Caliptra RT
3,163,199 UART: [state] CFI Enabled
3,270,765 UART: [rt] RT listening for mailbox commands...
3,271,435 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,673 UART: [rt]cmd =0x434b4558, len=80
3,302,704 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,857 ready_for_fw is high
1,060,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,627,338 >>> mbox cmd response: success
2,689,092 UART:
2,689,108 UART: Running Caliptra FMC ...
2,689,516 UART:
2,689,570 UART: [state] CFI Enabled
2,700,439 UART: [fht] FMC Alias Private Key: 7
2,808,222 UART: [art] Extend RT PCRs Done
2,808,650 UART: [art] Lock RT PCRs Done
2,810,444 UART: [art] Populate DV Done
2,818,853 UART: [fht] FMC Alias Private Key: 7
2,819,839 UART: [art] Derive CDI
2,820,119 UART: [art] Store in in slot 0x4
2,905,448 UART: [art] Derive Key Pair
2,905,808 UART: [art] Store priv key in slot 0x5
2,918,476 UART: [art] Derive Key Pair - Done
2,932,923 UART: [art] Signing Cert with AUTHO
2,933,403 UART: RITY.KEYID = 7
2,948,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,424 UART: [art] PUB.X = 19F5AE7DA9F70CBD4B0C907118CB63CE9F8D8CF42D0194827313A86F2AE5DCC07DF176B4CDEF5E0219AC8082D422F1C1
2,956,200 UART: [art] PUB.Y = C9840B7A0E938C0AF71A2E530718F0D3BECAFDAF2E87C2719CBD75E7D9BDE08205A7DCE793295F362C80D9143C094B2C
2,963,148 UART: [art] SIG.R = 84D6286A3724CFAC97E921578B8F901F072C3E2FAA802AC8552D1E67C888C5A18955ABBD6718D26BF0EC3A822D39F151
2,969,921 UART: [art] SIG.S = 870F093353DBBCD8D34199D632007CE3DED2C58E98C3CCEB1BC8F726601A26F33BC2280EED7461F913EC8085152DCA73
2,994,297 UART: Caliptra RT
2,994,550 UART: [state] CFI Enabled
3,102,906 UART: [rt] RT listening for mailbox commands...
3,103,576 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,038 UART: [rt]cmd =0x434b4558, len=80
3,135,251 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,471 UART: [kat] SHA2-256
894,121 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,246 UART: [kat] ++
898,398 UART: [kat] sha1
902,652 UART: [kat] SHA2-256
904,592 UART: [kat] SHA2-384
907,427 UART: [kat] SHA2-512-ACC
909,328 UART: [kat] ECC-384
919,377 UART: [kat] HMAC-384Kdf
924,037 UART: [kat] LMS
1,172,365 UART: [kat] --
1,173,198 UART: [cold-reset] ++
1,173,690 UART: [fht] FHT @ 0x50003400
1,176,369 UART: [idev] ++
1,176,537 UART: [idev] CDI.KEYID = 6
1,176,897 UART: [idev] SUBJECT.KEYID = 7
1,177,321 UART: [idev] UDS.KEYID = 0
1,177,666 ready_for_fw is high
1,177,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,571 UART: [idev] Erasing UDS.KEYID = 0
1,202,204 UART: [idev] Sha1 KeyId Algorithm
1,210,804 UART: [idev] --
1,211,834 UART: [ldev] ++
1,212,002 UART: [ldev] CDI.KEYID = 6
1,212,365 UART: [ldev] SUBJECT.KEYID = 5
1,212,791 UART: [ldev] AUTHORITY.KEYID = 7
1,213,254 UART: [ldev] FE.KEYID = 1
1,218,388 UART: [ldev] Erasing FE.KEYID = 1
1,244,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,632 UART: [ldev] --
1,284,121 UART: [fwproc] Wait for Commands...
1,284,745 UART: [fwproc] Recv command 0x46574c44
1,285,473 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,600 >>> mbox cmd response: success
2,773,642 UART: [afmc] ++
2,773,810 UART: [afmc] CDI.KEYID = 6
2,774,172 UART: [afmc] SUBJECT.KEYID = 7
2,774,597 UART: [afmc] AUTHORITY.KEYID = 5
2,810,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,503 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,231 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,116 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,835 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,711 UART: [afmc] --
2,853,725 UART: [cold-reset] --
2,854,641 UART: [state] Locking Datavault
2,856,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,666 UART: [state] Locking ICCM
2,857,092 UART: [exit] Launching FMC @ 0x40000130
2,862,421 UART:
2,862,437 UART: Running Caliptra FMC ...
2,862,845 UART:
2,862,988 UART: [state] CFI Enabled
2,873,737 UART: [fht] FMC Alias Private Key: 7
2,981,398 UART: [art] Extend RT PCRs Done
2,981,826 UART: [art] Lock RT PCRs Done
2,983,156 UART: [art] Populate DV Done
2,991,391 UART: [fht] FMC Alias Private Key: 7
2,992,437 UART: [art] Derive CDI
2,992,717 UART: [art] Store in in slot 0x4
3,078,200 UART: [art] Derive Key Pair
3,078,560 UART: [art] Store priv key in slot 0x5
3,091,892 UART: [art] Derive Key Pair - Done
3,107,116 UART: [art] Signing Cert with AUTHO
3,107,596 UART: RITY.KEYID = 7
3,122,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,237 UART: [art] PUB.X = C4884F9EF10BD94CE5C1A60C4D523A203E67F15D17E4CE95BB6D48F802DF71AB03C1AE25BB4B8E221DBC2F830D41F3C1
3,130,012 UART: [art] PUB.Y = 8C6E468AE765226C3FD56E27DF5CCF0B0B5A0906113C9391955C4E52232F2BA6AA4EC05FC751DAB64AE1A45350B97D09
3,136,957 UART: [art] SIG.R = CAFFB5383A47ADE43E5EF4B9A02BD86B401322775D57CB3BCF28E5033BFB061569073F99B8556246BF85E3E9CEE8CE71
3,143,732 UART: [art] SIG.S = C2C556444B37724A0D0621E34714AB66BE6413AEDEE5714D367F0445C984FEA63185350B8DCB703AB405E6EDB20100C1
3,167,175 UART: Caliptra RT
3,167,520 UART: [state] CFI Enabled
3,274,756 UART: [rt] RT listening for mailbox commands...
3,275,426 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,858 UART: [rt]cmd =0x434b4558, len=80
3,306,865 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,584 ready_for_fw is high
1,060,584 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,875 >>> mbox cmd response: success
2,685,677 UART:
2,685,693 UART: Running Caliptra FMC ...
2,686,101 UART:
2,686,244 UART: [state] CFI Enabled
2,696,697 UART: [fht] FMC Alias Private Key: 7
2,804,678 UART: [art] Extend RT PCRs Done
2,805,106 UART: [art] Lock RT PCRs Done
2,806,712 UART: [art] Populate DV Done
2,814,929 UART: [fht] FMC Alias Private Key: 7
2,816,069 UART: [art] Derive CDI
2,816,349 UART: [art] Store in in slot 0x4
2,901,968 UART: [art] Derive Key Pair
2,902,328 UART: [art] Store priv key in slot 0x5
2,915,916 UART: [art] Derive Key Pair - Done
2,930,639 UART: [art] Signing Cert with AUTHO
2,931,119 UART: RITY.KEYID = 7
2,946,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,114 UART: [art] PUB.X = A0965EBD0339132BB8D2ACEC512115960B8254E37A2568393D3242F89F2A702F38E00E9A5D8562D15FF3557E10F0EEF4
2,953,875 UART: [art] PUB.Y = 581196857547F94389F39943E64499374644558BBDB498C7F838216EC73F6F8D692F0BB2F401E50440F27CE3666D4BB9
2,960,804 UART: [art] SIG.R = 09978171C53746F8C6E28667B3BF49D3424F94FE7A721FD33190CA4F3D550749BFA7A6706E3C38A9E4014E0F55BE1C92
2,967,562 UART: [art] SIG.S = C6FE40197C7A77E6C93048CF36D65034809E5967BEA8000146BD5705B02CB530116C3D127C57A7244BCDD203E3D516F9
2,991,480 UART: Caliptra RT
2,991,825 UART: [state] CFI Enabled
3,100,040 UART: [rt] RT listening for mailbox commands...
3,100,710 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,932 UART: [rt]cmd =0x434b4558, len=80
3,132,035 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,575 UART: [kat] SHA2-256
901,515 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,841 UART: [idev] ++
1,173,009 UART: [idev] CDI.KEYID = 6
1,173,370 UART: [idev] SUBJECT.KEYID = 7
1,173,795 UART: [idev] UDS.KEYID = 0
1,174,141 ready_for_fw is high
1,174,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,884 UART: [ldev] ++
1,209,052 UART: [ldev] CDI.KEYID = 6
1,209,416 UART: [ldev] SUBJECT.KEYID = 5
1,209,843 UART: [ldev] AUTHORITY.KEYID = 7
1,210,306 UART: [ldev] FE.KEYID = 1
1,215,356 UART: [ldev] Erasing FE.KEYID = 1
1,242,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,186 UART: [ldev] --
1,281,668 UART: [fwproc] Wait for Commands...
1,282,439 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,205 >>> mbox cmd response: success
2,771,278 UART: [afmc] ++
2,771,446 UART: [afmc] CDI.KEYID = 6
2,771,809 UART: [afmc] SUBJECT.KEYID = 7
2,772,235 UART: [afmc] AUTHORITY.KEYID = 5
2,808,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,107 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,719 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,037 UART: [afmc] --
2,852,053 UART: [cold-reset] --
2,852,729 UART: [state] Locking Datavault
2,854,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,748 UART: [state] Locking ICCM
2,855,184 UART: [exit] Launching FMC @ 0x40000130
2,860,513 UART:
2,860,529 UART: Running Caliptra FMC ...
2,860,937 UART:
2,860,991 UART: [state] CFI Enabled
2,871,694 UART: [fht] FMC Alias Private Key: 7
2,979,249 UART: [art] Extend RT PCRs Done
2,979,677 UART: [art] Lock RT PCRs Done
2,981,171 UART: [art] Populate DV Done
2,989,286 UART: [fht] FMC Alias Private Key: 7
2,990,312 UART: [art] Derive CDI
2,990,592 UART: [art] Store in in slot 0x4
3,075,927 UART: [art] Derive Key Pair
3,076,287 UART: [art] Store priv key in slot 0x5
3,089,741 UART: [art] Derive Key Pair - Done
3,104,542 UART: [art] Signing Cert with AUTHO
3,105,022 UART: RITY.KEYID = 7
3,120,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,089 UART: [art] PUB.X = 4DAA1BF0312BF0E1E26EF86133D4E4137DF2043147BCB6AF3AE607D23553DD6B654764D951E74776A13AB828456A194A
3,127,857 UART: [art] PUB.Y = F7CE7DA04C345600D8897E6892B521255B03F35D23A43F5AC2558BE6A2ED67C3A98A9D2C38290A931FAD84C075DF1B73
3,134,785 UART: [art] SIG.R = BA0F2328D5F2196DCB50FA853992975611988AD6092BB84989D591D118893CFE5E5A60A511B160804EF130896C11C00D
3,141,540 UART: [art] SIG.S = F913E2A40890AC65278201362588C939B9FCFC7B74339CADCD02EEAD8CF90F8777FE31D6011A4E3F88CC9E4FEB6EAEA9
3,165,336 UART: Caliptra RT
3,165,589 UART: [state] CFI Enabled
3,273,509 UART: [rt] RT listening for mailbox commands...
3,274,179 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,637 UART: [rt]cmd =0x434b4558, len=80
3,305,766 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,342 ready_for_fw is high
1,055,342 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,025 >>> mbox cmd response: success
2,679,497 UART:
2,679,513 UART: Running Caliptra FMC ...
2,679,921 UART:
2,679,975 UART: [state] CFI Enabled
2,690,408 UART: [fht] FMC Alias Private Key: 7
2,798,451 UART: [art] Extend RT PCRs Done
2,798,879 UART: [art] Lock RT PCRs Done
2,800,577 UART: [art] Populate DV Done
2,808,826 UART: [fht] FMC Alias Private Key: 7
2,809,782 UART: [art] Derive CDI
2,810,062 UART: [art] Store in in slot 0x4
2,895,681 UART: [art] Derive Key Pair
2,896,041 UART: [art] Store priv key in slot 0x5
2,909,939 UART: [art] Derive Key Pair - Done
2,924,743 UART: [art] Signing Cert with AUTHO
2,925,223 UART: RITY.KEYID = 7
2,940,495 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,260 UART: [art] PUB.X = 5C6D7F4F0F88819456B0D8F76BA3CD03C64793BD84E6F641428341554E20FA99474B11D68ABA35DE9DA8AFE86A8E91E1
2,948,032 UART: [art] PUB.Y = 93FC128804F13CCA567D63C26655658D66199BCCDC22ECB65FBB61B8775DC24E59FCAB2F17AEFBA172E68E62DFD89E00
2,954,975 UART: [art] SIG.R = 2C7A177A55838C3219728451981900291703C9BDB82B7224E1DEECAAA4C8B37507086113DA0E08F8D01F4E3382ABFBB8
2,961,708 UART: [art] SIG.S = 622BEF5B136A72235EB82EA0861CE10D7A2E30F82C5E88C22853C5501DDF62B76B45E55881B386789521E037F227FBFE
2,985,428 UART: Caliptra RT
2,985,681 UART: [state] CFI Enabled
3,094,546 UART: [rt] RT listening for mailbox commands...
3,095,216 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,730 UART: [rt]cmd =0x434b4558, len=80
3,126,709 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,979 UART: [kat] SHA2-512-ACC
906,880 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,174,472 ready_for_fw is high
1,174,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,816 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,219 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,522 >>> mbox cmd response: success
2,772,719 UART: [afmc] ++
2,772,887 UART: [afmc] CDI.KEYID = 6
2,773,250 UART: [afmc] SUBJECT.KEYID = 7
2,773,676 UART: [afmc] AUTHORITY.KEYID = 5
2,810,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,232 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,710 UART: [afmc] --
2,853,684 UART: [cold-reset] --
2,854,766 UART: [state] Locking Datavault
2,855,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,339 UART: [state] Locking ICCM
2,856,943 UART: [exit] Launching FMC @ 0x40000130
2,862,272 UART:
2,862,288 UART: Running Caliptra FMC ...
2,862,696 UART:
2,862,839 UART: [state] CFI Enabled
2,873,730 UART: [fht] FMC Alias Private Key: 7
2,981,427 UART: [art] Extend RT PCRs Done
2,981,855 UART: [art] Lock RT PCRs Done
2,983,421 UART: [art] Populate DV Done
2,991,418 UART: [fht] FMC Alias Private Key: 7
2,992,548 UART: [art] Derive CDI
2,992,828 UART: [art] Store in in slot 0x4
3,077,945 UART: [art] Derive Key Pair
3,078,305 UART: [art] Store priv key in slot 0x5
3,091,105 UART: [art] Derive Key Pair - Done
3,106,068 UART: [art] Signing Cert with AUTHO
3,106,548 UART: RITY.KEYID = 7
3,121,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,579 UART: [art] PUB.X = 0F08522B09D20814A7D5129A38CD2AC46D042C5D2CCEB62ABFBA682341B0A713A72A13D220FCF8D897E06F1D038D1325
3,129,339 UART: [art] PUB.Y = 7DD60AEE146552C2ADEA07FFFBE4EBC2BEAE4C87424A7615882F846401ECF4F0E61B61F128B9588C7F97217F8A4B9340
3,136,294 UART: [art] SIG.R = 3D986D7F0FD6FA6190C2C0CB138A9343D7CD913B7B343E3313016AFF0928DC8DD4223D47B41B25636C7194B150B9269A
3,143,057 UART: [art] SIG.S = C355E043A397AC6D939C965C982E771E265FAC33720838ECC34079AED0ABA753888E98EAA343934002DE4EBC7C690A4A
3,167,433 UART: Caliptra RT
3,167,778 UART: [state] CFI Enabled
3,275,395 UART: [rt] RT listening for mailbox commands...
3,276,065 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,425 UART: [rt]cmd =0x434b4558, len=80
3,307,476 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 ready_for_fw is high
1,056,385 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,876 >>> mbox cmd response: success
2,682,164 UART:
2,682,180 UART: Running Caliptra FMC ...
2,682,588 UART:
2,682,731 UART: [state] CFI Enabled
2,693,214 UART: [fht] FMC Alias Private Key: 7
2,800,421 UART: [art] Extend RT PCRs Done
2,800,849 UART: [art] Lock RT PCRs Done
2,802,223 UART: [art] Populate DV Done
2,810,516 UART: [fht] FMC Alias Private Key: 7
2,811,670 UART: [art] Derive CDI
2,811,950 UART: [art] Store in in slot 0x4
2,897,265 UART: [art] Derive Key Pair
2,897,625 UART: [art] Store priv key in slot 0x5
2,910,527 UART: [art] Derive Key Pair - Done
2,925,035 UART: [art] Signing Cert with AUTHO
2,925,515 UART: RITY.KEYID = 7
2,940,399 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,164 UART: [art] PUB.X = 23F0DE35EF8B4302B00F7C7636D43449345F1C74786F24EFE230F252C72F980F810EE239AD8421809D7522613EC73840
2,947,914 UART: [art] PUB.Y = 5193F635F78EB2013594245612FEE53F4F440743A40D69AEDD832F654315B1DB1F5A407FBF6837B16884A8A6879AC689
2,954,851 UART: [art] SIG.R = FF29E0379A334B83F34A343138998ABF9147B7CFB4C95EB55FAEC9BED9DCD943088F0AFF422C78132912E11898E63741
2,961,621 UART: [art] SIG.S = 8F18AE97FD42F8813ED862FE5E26FC62FE3D3A8FC72105D573FC9013E448B86E3D4AFE85C7F3FD4AC1CA14DB7F8D32A8
2,985,349 UART: Caliptra RT
2,985,694 UART: [state] CFI Enabled
3,093,918 UART: [rt] RT listening for mailbox commands...
3,094,588 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,052 UART: [rt]cmd =0x434b4558, len=80
3,126,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,250 UART:
192,618 UART: Running Caliptra ROM ...
193,723 UART:
193,883 UART: [state] CFI Enabled
263,993 UART: [state] LifecycleState = Unprovisioned
265,907 UART: [state] DebugLocked = No
267,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,645 UART: [kat] SHA2-256
442,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,824 UART: [kat] ++
453,272 UART: [kat] sha1
463,438 UART: [kat] SHA2-256
466,149 UART: [kat] SHA2-384
471,790 UART: [kat] SHA2-512-ACC
474,159 UART: [kat] ECC-384
2,766,433 UART: [kat] HMAC-384Kdf
2,779,986 UART: [kat] LMS
3,970,287 UART: [kat] --
3,974,918 UART: [cold-reset] ++
3,976,650 UART: [fht] Storing FHT @ 0x50003400
3,987,917 UART: [idev] ++
3,988,552 UART: [idev] CDI.KEYID = 6
3,989,618 UART: [idev] SUBJECT.KEYID = 7
3,990,725 UART: [idev] UDS.KEYID = 0
3,991,795 ready_for_fw is high
3,992,001 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,574 UART: [idev] Erasing UDS.KEYID = 0
7,324,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,972 UART: [idev] --
7,350,507 UART: [ldev] ++
7,351,081 UART: [ldev] CDI.KEYID = 6
7,352,054 UART: [ldev] SUBJECT.KEYID = 5
7,353,278 UART: [ldev] AUTHORITY.KEYID = 7
7,354,510 UART: [ldev] FE.KEYID = 1
7,400,730 UART: [ldev] Erasing FE.KEYID = 1
10,734,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,015 UART: [ldev] --
13,096,607 UART: [fwproc] Waiting for Commands...
13,099,727 UART: [fwproc] Received command 0x46574c44
13,101,966 UART: [fwproc] Received Image of size 113760 bytes
17,142,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,610,177 >>> mbox cmd response: success
17,613,651 UART: [afmc] ++
17,614,250 UART: [afmc] CDI.KEYID = 6
17,615,145 UART: [afmc] SUBJECT.KEYID = 7
17,616,429 UART: [afmc] AUTHORITY.KEYID = 5
20,986,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,029 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,341 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,723 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,556 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,006 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,145 UART: [afmc] --
23,358,389 UART: [cold-reset] --
23,362,180 UART: [state] Locking Datavault
23,366,790 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,492 UART: [state] Locking ICCM
23,370,968 UART: [exit] Launching FMC @ 0x40000130
23,379,362 UART:
23,379,594 UART: Running Caliptra FMC ...
23,380,692 UART:
23,380,876 UART: [state] CFI Enabled
23,446,918 UART: [fht] FMC Alias Private Key: 7
25,785,206 UART: [art] Extend RT PCRs Done
25,786,424 UART: [art] Lock RT PCRs Done
25,787,823 UART: [art] Populate DV Done
25,793,299 UART: [fht] FMC Alias Private Key: 7
25,794,999 UART: [art] Derive CDI
25,795,739 UART: [art] Store in in slot 0x4
25,855,799 UART: [art] Derive Key Pair
25,856,833 UART: [art] Store priv key in slot 0x5
29,149,683 UART: [art] Derive Key Pair - Done
29,162,675 UART: [art] Signing Cert with AUTHO
29,163,970 UART: RITY.KEYID = 7
31,451,293 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,799 UART: [art] PUB.X = 82FB724B07E7EB7F91B97A35EAAB6C6827A4F4BB45B4006492CF7652FD84E8B59D4A693BD3050894F29311E094F5DD7A
31,460,052 UART: [art] PUB.Y = 36CC3CF4B3F6B5207F39F4ED45BF41D95D83D45C26CBA362D2D6EAEB583D2F3313A7B0E842B662F7EB2D75E18EB07230
31,467,297 UART: [art] SIG.R = E67C3D89696855F1483775729046129B52742DCA02CE383314C81FEC0741F207013F2BDEA411D37E6797813172925061
31,474,685 UART: [art] SIG.S = 4F1876F1E9072032C726072585367314497B44F57355314010691C47BC53F1801A03D91EA3867FB758601E1CF6823E52
32,779,368 UART: Caliptra RT
32,780,065 UART: [state] CFI Enabled
32,941,609 UART: [rt] RT listening for mailbox commands...
32,943,523 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,974,596 UART: [rt]cmd =0x44504543, len=92
32,981,302 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,784,016 ready_for_fw is high
3,784,626 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,868,308 >>> mbox cmd response: success
23,569,803 UART:
23,570,208 UART: Running Caliptra FMC ...
23,571,405 UART:
23,571,577 UART: [state] CFI Enabled
23,637,734 UART: [fht] FMC Alias Private Key: 7
25,976,531 UART: [art] Extend RT PCRs Done
25,977,796 UART: [art] Lock RT PCRs Done
25,979,633 UART: [art] Populate DV Done
25,984,936 UART: [fht] FMC Alias Private Key: 7
25,986,427 UART: [art] Derive CDI
25,987,195 UART: [art] Store in in slot 0x4
26,047,259 UART: [art] Derive Key Pair
26,048,266 UART: [art] Store priv key in slot 0x5
29,341,585 UART: [art] Derive Key Pair - Done
29,354,530 UART: [art] Signing Cert with AUTHO
29,355,841 UART: RITY.KEYID = 7
31,643,193 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,720 UART: [art] PUB.X = CA0AEB2CBF25FB1C628018175D8DEB7C2F1185E2956EE5C071B0358949BEC1C830B281C640615105F896A820AF7B5ED8
31,652,089 UART: [art] PUB.Y = 930216842666633707335AA634CC09645801FA9F1B9B1BA181C5851939427C84939886DD51B14D4A0295A969D147A214
31,659,103 UART: [art] SIG.R = 864076E4B0B7C8EBDF0912D7FAA1CDE12BB9527441273944FBECB3668826454EE61281C8AE0A56ABA1BCC31FC01BCD8F
31,666,509 UART: [art] SIG.S = C7C9E1AEB750F9ECC1C4162D9954BFD9B4F3164BBB9822F4543D671ED06D27C76C44597F9ED9EA45DBC78161283CECB2
32,972,454 UART: Caliptra RT
32,973,157 UART: [state] CFI Enabled
33,135,008 UART: [rt] RT listening for mailbox commands...
33,136,956 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,168,307 UART: [rt]cmd =0x44504543, len=92
33,174,971 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,616 writing to cptra_bootfsm_go
192,876 UART:
193,253 UART: Running Caliptra ROM ...
194,578 UART:
604,208 UART: [state] CFI Enabled
616,908 UART: [state] LifecycleState = Unprovisioned
618,785 UART: [state] DebugLocked = No
621,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,311 UART: [kat] SHA2-256
797,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,611 UART: [kat] ++
808,135 UART: [kat] sha1
818,160 UART: [kat] SHA2-256
820,849 UART: [kat] SHA2-384
826,773 UART: [kat] SHA2-512-ACC
829,138 UART: [kat] ECC-384
3,111,753 UART: [kat] HMAC-384Kdf
3,123,509 UART: [kat] LMS
4,313,591 UART: [kat] --
4,317,879 UART: [cold-reset] ++
4,320,086 UART: [fht] Storing FHT @ 0x50003400
4,330,207 UART: [idev] ++
4,330,764 UART: [idev] CDI.KEYID = 6
4,331,744 UART: [idev] SUBJECT.KEYID = 7
4,332,940 UART: [idev] UDS.KEYID = 0
4,334,244 ready_for_fw is high
4,334,485 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,742 UART: [idev] Erasing UDS.KEYID = 0
7,624,674 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,758 UART: [idev] --
7,650,908 UART: [ldev] ++
7,651,472 UART: [ldev] CDI.KEYID = 6
7,652,427 UART: [ldev] SUBJECT.KEYID = 5
7,653,628 UART: [ldev] AUTHORITY.KEYID = 7
7,654,911 UART: [ldev] FE.KEYID = 1
7,665,659 UART: [ldev] Erasing FE.KEYID = 1
10,954,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,439 UART: [ldev] --
13,314,363 UART: [fwproc] Waiting for Commands...
13,316,720 UART: [fwproc] Received command 0x46574c44
13,318,895 UART: [fwproc] Received Image of size 113760 bytes
17,372,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,893 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,980 >>> mbox cmd response: success
17,835,660 UART: [afmc] ++
17,836,253 UART: [afmc] CDI.KEYID = 6
17,837,132 UART: [afmc] SUBJECT.KEYID = 7
17,838,404 UART: [afmc] AUTHORITY.KEYID = 5
21,149,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,983 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,243 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,664 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,467 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,912 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,716 UART: [afmc] --
23,513,414 UART: [cold-reset] --
23,516,623 UART: [state] Locking Datavault
23,520,786 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,546 UART: [state] Locking ICCM
23,524,151 UART: [exit] Launching FMC @ 0x40000130
23,532,545 UART:
23,532,780 UART: Running Caliptra FMC ...
23,534,069 UART:
23,534,244 UART: [state] CFI Enabled
23,542,293 UART: [fht] FMC Alias Private Key: 7
25,872,931 UART: [art] Extend RT PCRs Done
25,874,147 UART: [art] Lock RT PCRs Done
25,875,648 UART: [art] Populate DV Done
25,881,163 UART: [fht] FMC Alias Private Key: 7
25,882,746 UART: [art] Derive CDI
25,883,474 UART: [art] Store in in slot 0x4
25,926,439 UART: [art] Derive Key Pair
25,927,435 UART: [art] Store priv key in slot 0x5
29,169,622 UART: [art] Derive Key Pair - Done
29,182,668 UART: [art] Signing Cert with AUTHO
29,183,963 UART: RITY.KEYID = 7
31,463,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,636 UART: [art] PUB.X = B70EBDD7FE8F307A9C3F31D2D0804E80156923DF4E5C09AFE769BDA7CD1217758E05E98ACEC1C55B707459C191A58EA3
31,471,908 UART: [art] PUB.Y = F0A69B0F673FEEFB39708D9E39AA5BD81F643B545FA11E424486C0836669723510BA138074A3AA744A81D2A99D566DC2
31,479,103 UART: [art] SIG.R = D5EF6127D3E5D8CBABF73C1A523B41C2E75C72B2916D9C9EFB4F8F01F72298D87053EF5C17096CE7A48E0978E45D1AD3
31,486,518 UART: [art] SIG.S = 349482E3FBA7202CF56482D4662D0FC09AD3328333F7024E647866A36E33C3EBE994B8AC5F113CFA63D15D25E7F3AAF7
32,791,376 UART: Caliptra RT
32,792,083 UART: [state] CFI Enabled
32,909,592 UART: [rt] RT listening for mailbox commands...
32,911,534 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,942,130 UART: [rt]cmd =0x44504543, len=92
32,948,584 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,644 writing to cptra_bootfsm_go
4,127,203 ready_for_fw is high
4,127,777 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,703 >>> mbox cmd response: success
23,705,289 UART:
23,705,690 UART: Running Caliptra FMC ...
23,706,817 UART:
23,706,976 UART: [state] CFI Enabled
23,714,717 UART: [fht] FMC Alias Private Key: 7
26,045,316 UART: [art] Extend RT PCRs Done
26,046,554 UART: [art] Lock RT PCRs Done
26,048,252 UART: [art] Populate DV Done
26,053,722 UART: [fht] FMC Alias Private Key: 7
26,055,276 UART: [art] Derive CDI
26,056,039 UART: [art] Store in in slot 0x4
26,099,230 UART: [art] Derive Key Pair
26,100,237 UART: [art] Store priv key in slot 0x5
29,341,795 UART: [art] Derive Key Pair - Done
29,354,774 UART: [art] Signing Cert with AUTHO
29,356,086 UART: RITY.KEYID = 7
31,635,642 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,155 UART: [art] PUB.X = 4DBFCC0B3ED99157B0B4156B383734F3292F060E64766F46AB6B8618290DB0077675380205B72DF7AF63161C031E0B34
31,644,391 UART: [art] PUB.Y = 7D2E5490BF439125A1D97D41B1BAAA5ED1E4D9AFC820292507C0D3337000102095675BF51C45240CE233591F9E943663
31,651,611 UART: [art] SIG.R = 9456A266B0B127D41A389D055D2FB7FDCCB302DEA705E096B30C8E537DF0CDCEBA233BB612C8390E0C0E953EC9213EF7
31,659,009 UART: [art] SIG.S = 8382A21A40E8066F377775B8B8557296369BE7C189F9990BEE1351C48968992A927B0DB54B8D7D61D45B0038FF599B8C
32,964,658 UART: Caliptra RT
32,965,386 UART: [state] CFI Enabled
33,082,179 UART: [rt] RT listening for mailbox commands...
33,084,110 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,114,611 UART: [rt]cmd =0x44504543, len=92
33,121,109 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,508 UART:
192,880 UART: Running Caliptra ROM ...
194,082 UART:
194,243 UART: [state] CFI Enabled
262,852 UART: [state] LifecycleState = Unprovisioned
264,719 UART: [state] DebugLocked = No
267,320 UART: [state] WD Timer not started. Device not locked for debugging
270,997 UART: [kat] SHA2-256
450,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,681 UART: [kat] ++
462,202 UART: [kat] sha1
473,141 UART: [kat] SHA2-256
476,213 UART: [kat] SHA2-384
482,627 UART: [kat] SHA2-512-ACC
485,556 UART: [kat] ECC-384
2,947,673 UART: [kat] HMAC-384Kdf
2,972,628 UART: [kat] LMS
3,502,082 UART: [kat] --
3,506,316 UART: [cold-reset] ++
3,507,320 UART: [fht] FHT @ 0x50003400
3,518,714 UART: [idev] ++
3,519,293 UART: [idev] CDI.KEYID = 6
3,520,180 UART: [idev] SUBJECT.KEYID = 7
3,521,421 UART: [idev] UDS.KEYID = 0
3,522,321 ready_for_fw is high
3,522,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,069 UART: [idev] Erasing UDS.KEYID = 0
6,025,908 UART: [idev] Sha1 KeyId Algorithm
6,048,979 UART: [idev] --
6,052,486 UART: [ldev] ++
6,053,053 UART: [ldev] CDI.KEYID = 6
6,053,938 UART: [ldev] SUBJECT.KEYID = 5
6,055,146 UART: [ldev] AUTHORITY.KEYID = 7
6,056,374 UART: [ldev] FE.KEYID = 1
6,099,995 UART: [ldev] Erasing FE.KEYID = 1
8,605,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,715 UART: [ldev] --
10,413,879 UART: [fwproc] Wait for Commands...
10,415,958 UART: [fwproc] Recv command 0x46574c44
10,418,051 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,232 >>> mbox cmd response: success
14,277,412 UART: [afmc] ++
14,278,002 UART: [afmc] CDI.KEYID = 6
14,278,885 UART: [afmc] SUBJECT.KEYID = 7
14,280,096 UART: [afmc] AUTHORITY.KEYID = 5
16,805,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,483 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,324 UART: [afmc] --
18,602,379 UART: [cold-reset] --
18,606,510 UART: [state] Locking Datavault
18,612,935 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,639 UART: [state] Locking ICCM
18,616,329 UART: [exit] Launching FMC @ 0x40000130
18,624,723 UART:
18,624,952 UART: Running Caliptra FMC ...
18,626,048 UART:
18,626,203 UART: [state] CFI Enabled
18,688,086 UART: [fht] FMC Alias Private Key: 7
20,452,862 UART: [art] Extend RT PCRs Done
20,454,083 UART: [art] Lock RT PCRs Done
20,455,550 UART: [art] Populate DV Done
20,460,963 UART: [fht] FMC Alias Private Key: 7
20,462,665 UART: [art] Derive CDI
20,463,479 UART: [art] Store in in slot 0x4
20,521,014 UART: [art] Derive Key Pair
20,522,054 UART: [art] Store priv key in slot 0x5
22,984,689 UART: [art] Derive Key Pair - Done
22,997,793 UART: [art] Signing Cert with AUTHO
22,999,095 UART: RITY.KEYID = 7
24,710,781 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,281 UART: [art] PUB.X = 6D90346298F0EBA9CD2EF054C70B64E04ECE472F5387DAC51BF316A0998D5D493BAD4AC78911710F748A9EFC0465A1C1
24,719,540 UART: [art] PUB.Y = B937C88FA1F50B537F907F0BDAC64F5F5C16422485A0073F391B165CB752AA79823DD371426F3D5579166644DBD3DAE1
24,726,802 UART: [art] SIG.R = 4A6BBB99D74E17F3753EDB1390A1D97F8717A84F547577F3CBDEB32731215D730771F01B1419682374782352E176EA80
24,734,187 UART: [art] SIG.S = 8526C8D0C2FA486E71D82D0AC66A9FE62A39D243C8A87AE1844011A26D465D610FB5F5B9C1E07F81755ABF4F309619B5
25,713,119 UART: Caliptra RT
25,713,806 UART: [state] CFI Enabled
25,879,523 UART: [rt] RT listening for mailbox commands...
25,881,442 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,912,558 UART: [rt]cmd =0x44504543, len=92
25,919,409 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,586 writing to cptra_bootfsm_go
3,381,851 ready_for_fw is high
3,382,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,049,661 >>> mbox cmd response: success
18,359,747 UART:
18,360,765 UART: Running Caliptra FMC ...
18,361,895 UART:
18,362,046 UART: [state] CFI Enabled
18,431,956 UART: [fht] FMC Alias Private Key: 7
20,195,829 UART: [art] Extend RT PCRs Done
20,197,091 UART: [art] Lock RT PCRs Done
20,198,587 UART: [art] Populate DV Done
20,204,094 UART: [fht] FMC Alias Private Key: 7
20,205,590 UART: [art] Derive CDI
20,206,407 UART: [art] Store in in slot 0x4
20,264,545 UART: [art] Derive Key Pair
20,265,590 UART: [art] Store priv key in slot 0x5
22,729,129 UART: [art] Derive Key Pair - Done
22,742,196 UART: [art] Signing Cert with AUTHO
22,743,493 UART: RITY.KEYID = 7
24,453,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,309 UART: [art] PUB.X = B39550D0AD7671CD12AEB620832FDD509B47F4F89E6FDFE50F4BF51972D1003801A183671E516B9838840B4678EBE3FB
24,462,531 UART: [art] PUB.Y = AEDDE601D692333315F7A139CDE9B2A45C3D7240FE078C9C4FEBB074BDABD9B98CE85A4F4AEDAC17A7420E9C498F4EBA
24,469,866 UART: [art] SIG.R = 3D3AED88CBAEAF2AC5BE445A669AF4B2CC58BE74F2B6242DF571BBE34F149D52F611F82D3757C8CD663D73EAD70129D6
24,477,289 UART: [art] SIG.S = A0627FB3AD40B07675451F3B076CFEC48C7B7F4BA6592625EB94E0692E3CF8B5140AA84E0F5283117980F883621AFD66
25,456,299 UART: Caliptra RT
25,457,018 UART: [state] CFI Enabled
25,620,668 UART: [rt] RT listening for mailbox commands...
25,622,604 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,654,084 UART: [rt]cmd =0x44504543, len=92
25,660,228 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
193,132 UART:
193,496 UART: Running Caliptra ROM ...
194,691 UART:
604,137 UART: [state] CFI Enabled
616,520 UART: [state] LifecycleState = Unprovisioned
618,455 UART: [state] DebugLocked = No
619,877 UART: [state] WD Timer not started. Device not locked for debugging
623,992 UART: [kat] SHA2-256
803,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,707 UART: [kat] ++
815,248 UART: [kat] sha1
826,767 UART: [kat] SHA2-256
829,777 UART: [kat] SHA2-384
835,693 UART: [kat] SHA2-512-ACC
838,650 UART: [kat] ECC-384
3,282,425 UART: [kat] HMAC-384Kdf
3,294,359 UART: [kat] LMS
3,823,842 UART: [kat] --
3,829,037 UART: [cold-reset] ++
3,830,540 UART: [fht] FHT @ 0x50003400
3,842,372 UART: [idev] ++
3,842,941 UART: [idev] CDI.KEYID = 6
3,843,826 UART: [idev] SUBJECT.KEYID = 7
3,845,072 UART: [idev] UDS.KEYID = 0
3,846,007 ready_for_fw is high
3,846,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,550 UART: [idev] Erasing UDS.KEYID = 0
6,321,242 UART: [idev] Sha1 KeyId Algorithm
6,344,793 UART: [idev] --
6,349,491 UART: [ldev] ++
6,350,082 UART: [ldev] CDI.KEYID = 6
6,350,970 UART: [ldev] SUBJECT.KEYID = 5
6,352,183 UART: [ldev] AUTHORITY.KEYID = 7
6,353,415 UART: [ldev] FE.KEYID = 1
6,364,873 UART: [ldev] Erasing FE.KEYID = 1
8,839,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,372 UART: [ldev] --
10,628,536 UART: [fwproc] Wait for Commands...
10,630,794 UART: [fwproc] Recv command 0x46574c44
10,632,889 UART: [fwproc] Recv'd Img size: 114084 bytes
14,037,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,514 >>> mbox cmd response: success
14,492,557 UART: [afmc] ++
14,493,149 UART: [afmc] CDI.KEYID = 6
14,494,035 UART: [afmc] SUBJECT.KEYID = 7
14,495,200 UART: [afmc] AUTHORITY.KEYID = 5
16,990,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,139 UART: [afmc] --
18,786,768 UART: [cold-reset] --
18,791,227 UART: [state] Locking Datavault
18,797,773 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,448 UART: [state] Locking ICCM
18,802,088 UART: [exit] Launching FMC @ 0x40000130
18,810,497 UART:
18,810,735 UART: Running Caliptra FMC ...
18,811,837 UART:
18,811,995 UART: [state] CFI Enabled
18,819,989 UART: [fht] FMC Alias Private Key: 7
20,577,123 UART: [art] Extend RT PCRs Done
20,578,354 UART: [art] Lock RT PCRs Done
20,580,311 UART: [art] Populate DV Done
20,585,627 UART: [fht] FMC Alias Private Key: 7
20,587,271 UART: [art] Derive CDI
20,588,091 UART: [art] Store in in slot 0x4
20,631,132 UART: [art] Derive Key Pair
20,632,178 UART: [art] Store priv key in slot 0x5
23,058,887 UART: [art] Derive Key Pair - Done
23,071,745 UART: [art] Signing Cert with AUTHO
23,073,053 UART: RITY.KEYID = 7
24,778,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,836 UART: [art] PUB.X = F82354489796F05227437EAA3257293653198FC9E866299C0627272B4957B96E715B4AB920BBD6B09C4C6D429BD538BD
24,787,103 UART: [art] PUB.Y = 74395DE392D28EE3E00B4EE00D4B5B7B694FF02F8F284F5BC003897F574AECECC57CDFC45D45DDA5514D741AFB0C1854
24,794,364 UART: [art] SIG.R = 395ACCA5E26FDC109852B41A30CC06849832859F6A5E4BF499964E8E4E2EA2112992B404CB276DB56259EFF32FA66AB7
24,801,736 UART: [art] SIG.S = F77518ED3936EC2DE60057E6C4D207EC9BF8D26726DBD9B411C898F5589EB484F161BE27401973209FC05749788742DF
25,780,218 UART: Caliptra RT
25,780,926 UART: [state] CFI Enabled
25,898,824 UART: [rt] RT listening for mailbox commands...
25,900,747 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,931,389 UART: [rt]cmd =0x44504543, len=92
25,937,952 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
3,696,665 ready_for_fw is high
3,697,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,044 >>> mbox cmd response: success
18,512,121 UART:
18,512,511 UART: Running Caliptra FMC ...
18,513,711 UART:
18,513,882 UART: [state] CFI Enabled
18,521,229 UART: [fht] FMC Alias Private Key: 7
20,277,856 UART: [art] Extend RT PCRs Done
20,279,088 UART: [art] Lock RT PCRs Done
20,281,121 UART: [art] Populate DV Done
20,286,439 UART: [fht] FMC Alias Private Key: 7
20,288,042 UART: [art] Derive CDI
20,288,869 UART: [art] Store in in slot 0x4
20,331,473 UART: [art] Derive Key Pair
20,332,521 UART: [art] Store priv key in slot 0x5
22,759,600 UART: [art] Derive Key Pair - Done
22,772,331 UART: [art] Signing Cert with AUTHO
22,773,632 UART: RITY.KEYID = 7
24,478,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,470 UART: [art] PUB.X = F145B753CD465B1AEA19C563A5575A16FDF32E57D8E76AD5FE8417CF4BED07F44FF51F1BF205CFEB000DB7AA061E6145
24,487,747 UART: [art] PUB.Y = FD55D5BCF12E058DC3C877BEDD8C58E79C725E73D8A4C17091C1B8C4F2E7C2A9A3FB4BB0C661319F50EC0913DB4BBD83
24,495,027 UART: [art] SIG.R = 3093E347834705F9569FB6D51B76A470FF66A0121EA32BD6C695602F065FECD5E6C9A8573871E638C6367E487C766031
24,502,400 UART: [art] SIG.S = FEA1A6B468CAAC01A1A93A7745A7B55D5F7D420F1974718D0D2B056758389242E7EF2A6E905B893E3828536BDD54321C
25,481,581 UART: Caliptra RT
25,482,291 UART: [state] CFI Enabled
25,599,497 UART: [rt] RT listening for mailbox commands...
25,601,423 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,632,275 UART: [rt]cmd =0x44504543, len=92
25,639,000 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,392 UART:
192,758 UART: Running Caliptra ROM ...
193,912 UART:
194,078 UART: [state] CFI Enabled
266,658 UART: [state] LifecycleState = Unprovisioned
269,065 UART: [state] DebugLocked = No
271,881 UART: [state] WD Timer not started. Device not locked for debugging
276,072 UART: [kat] SHA2-256
465,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,773 UART: [kat] ++
477,214 UART: [kat] sha1
487,943 UART: [kat] SHA2-256
490,949 UART: [kat] SHA2-384
496,867 UART: [kat] SHA2-512-ACC
499,452 UART: [kat] ECC-384
2,950,217 UART: [kat] HMAC-384Kdf
2,973,769 UART: [kat] LMS
3,505,507 UART: [kat] --
3,509,502 UART: [cold-reset] ++
3,511,446 UART: [fht] FHT @ 0x50003400
3,523,771 UART: [idev] ++
3,524,484 UART: [idev] CDI.KEYID = 6
3,525,393 UART: [idev] SUBJECT.KEYID = 7
3,526,632 UART: [idev] UDS.KEYID = 0
3,527,553 ready_for_fw is high
3,527,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,602 UART: [idev] Erasing UDS.KEYID = 0
6,029,657 UART: [idev] Sha1 KeyId Algorithm
6,052,138 UART: [idev] --
6,056,188 UART: [ldev] ++
6,056,878 UART: [ldev] CDI.KEYID = 6
6,057,788 UART: [ldev] SUBJECT.KEYID = 5
6,058,943 UART: [ldev] AUTHORITY.KEYID = 7
6,060,177 UART: [ldev] FE.KEYID = 1
6,101,549 UART: [ldev] Erasing FE.KEYID = 1
8,608,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,977 UART: [ldev] --
10,413,125 UART: [fwproc] Wait for Commands...
10,416,240 UART: [fwproc] Recv command 0x46574c44
10,418,555 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,504 >>> mbox cmd response: success
14,602,248 UART: [afmc] ++
14,602,950 UART: [afmc] CDI.KEYID = 6
14,604,134 UART: [afmc] SUBJECT.KEYID = 7
14,605,592 UART: [afmc] AUTHORITY.KEYID = 5
17,147,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,480 UART: [afmc] --
18,948,424 UART: [cold-reset] --
18,953,315 UART: [state] Locking Datavault
18,960,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,201 UART: [state] Locking ICCM
18,964,248 UART: [exit] Launching FMC @ 0x40000130
18,972,931 UART:
18,973,166 UART: Running Caliptra FMC ...
18,974,263 UART:
18,974,440 UART: [state] CFI Enabled
19,031,384 UART: [fht] FMC Alias Private Key: 7
20,795,765 UART: [art] Extend RT PCRs Done
20,796,982 UART: [art] Lock RT PCRs Done
20,798,583 UART: [art] Populate DV Done
20,804,150 UART: [fht] FMC Alias Private Key: 7
20,805,682 UART: [art] Derive CDI
20,806,415 UART: [art] Store in in slot 0x4
20,864,095 UART: [art] Derive Key Pair
20,865,137 UART: [art] Store priv key in slot 0x5
23,328,455 UART: [art] Derive Key Pair - Done
23,341,501 UART: [art] Signing Cert with AUTHO
23,342,801 UART: RITY.KEYID = 7
25,054,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,077 UART: [art] PUB.X = 39864EA343BE19E19D35C84B4A6703758A2F58A674668317B1757AB7E0453DE19FD560CCF2EB0EC42B071945F4177CD7
25,063,283 UART: [art] PUB.Y = A8C9E3C8287EAD3DBA66A105D0EBECC913CA6CCCC3DFDAAD71C85E80AB36054E5FA59537234F2841CA5A73730410DFA6
25,070,583 UART: [art] SIG.R = 9109497D17CF4EE789EE4E50A7B0F1426F8EEDDA929DFCC6244EE091D2F930AFC4F1480998A2C12CC221CC9525C1483C
25,078,023 UART: [art] SIG.S = FDA3D05CB0A319CFDF9BBDBB3929252AB9B5756729FCB17D15F7FF03DBFC8B428A99B974D6A2FA411FB179F54C6B84A1
26,057,251 UART: Caliptra RT
26,057,946 UART: [state] CFI Enabled
26,223,383 UART: [rt] RT listening for mailbox commands...
26,225,301 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,256,351 UART: [rt]cmd =0x44504543, len=92
26,262,502 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
3,415,277 ready_for_fw is high
3,415,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,705,335 >>> mbox cmd response: success
18,985,171 UART:
18,985,569 UART: Running Caliptra FMC ...
18,986,708 UART:
18,986,863 UART: [state] CFI Enabled
19,050,686 UART: [fht] FMC Alias Private Key: 7
20,815,008 UART: [art] Extend RT PCRs Done
20,816,229 UART: [art] Lock RT PCRs Done
20,818,017 UART: [art] Populate DV Done
20,823,435 UART: [fht] FMC Alias Private Key: 7
20,825,079 UART: [art] Derive CDI
20,825,894 UART: [art] Store in in slot 0x4
20,883,155 UART: [art] Derive Key Pair
20,884,195 UART: [art] Store priv key in slot 0x5
23,347,422 UART: [art] Derive Key Pair - Done
23,360,816 UART: [art] Signing Cert with AUTHO
23,362,165 UART: RITY.KEYID = 7
25,073,440 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,950 UART: [art] PUB.X = AD0398A3D743C899C1C3A09B116468EC73741CC89A350B4FF6E6C6D57E3CCE6B18A0B6983E97233E2B7C62F3449895CD
25,082,231 UART: [art] PUB.Y = A37F049EF7E6875B34E3C8497029EEBBFDAC18C5CEA690B1798EEFF045D6AAF4AC36D1C3658AB78D5AD3B9791D5DFD22
25,089,518 UART: [art] SIG.R = 043DDCF382AFE83005729BF1498116AE5048F4B0ECF57BABDB6ED7650B57D365F8A70DD4360FFC1ED275B00036F8F69B
25,096,866 UART: [art] SIG.S = CA70F015520679FB6066B2D604AADBA466EEB9643860399BEB247E69CCD10B84D042574290717740C8F7528B1A275263
26,075,468 UART: Caliptra RT
26,076,163 UART: [state] CFI Enabled
26,242,096 UART: [rt] RT listening for mailbox commands...
26,244,036 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,275,322 UART: [rt]cmd =0x44504543, len=92
26,281,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,816 writing to cptra_bootfsm_go
193,922 UART:
194,285 UART: Running Caliptra ROM ...
195,491 UART:
605,175 UART: [state] CFI Enabled
617,059 UART: [state] LifecycleState = Unprovisioned
619,443 UART: [state] DebugLocked = No
621,827 UART: [state] WD Timer not started. Device not locked for debugging
627,096 UART: [kat] SHA2-256
816,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,720 UART: [kat] ++
828,273 UART: [kat] sha1
839,006 UART: [kat] SHA2-256
842,022 UART: [kat] SHA2-384
847,952 UART: [kat] SHA2-512-ACC
850,539 UART: [kat] ECC-384
3,294,573 UART: [kat] HMAC-384Kdf
3,307,376 UART: [kat] LMS
3,839,180 UART: [kat] --
3,842,363 UART: [cold-reset] ++
3,843,409 UART: [fht] FHT @ 0x50003400
3,853,677 UART: [idev] ++
3,854,382 UART: [idev] CDI.KEYID = 6
3,855,363 UART: [idev] SUBJECT.KEYID = 7
3,856,559 UART: [idev] UDS.KEYID = 0
3,857,539 ready_for_fw is high
3,857,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,869 UART: [idev] Erasing UDS.KEYID = 0
6,332,830 UART: [idev] Sha1 KeyId Algorithm
6,354,642 UART: [idev] --
6,359,823 UART: [ldev] ++
6,360,510 UART: [ldev] CDI.KEYID = 6
6,361,421 UART: [ldev] SUBJECT.KEYID = 5
6,362,583 UART: [ldev] AUTHORITY.KEYID = 7
6,363,816 UART: [ldev] FE.KEYID = 1
6,375,273 UART: [ldev] Erasing FE.KEYID = 1
8,849,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,118 UART: [ldev] --
10,640,350 UART: [fwproc] Wait for Commands...
10,643,313 UART: [fwproc] Recv command 0x46574c44
10,645,607 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,309 >>> mbox cmd response: success
14,838,605 UART: [afmc] ++
14,839,315 UART: [afmc] CDI.KEYID = 6
14,840,561 UART: [afmc] SUBJECT.KEYID = 7
14,842,005 UART: [afmc] AUTHORITY.KEYID = 5
17,347,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,481 UART: [afmc] --
19,141,627 UART: [cold-reset] --
19,147,119 UART: [state] Locking Datavault
19,152,000 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,156 UART: [state] Locking ICCM
19,156,885 UART: [exit] Launching FMC @ 0x40000130
19,165,561 UART:
19,165,795 UART: Running Caliptra FMC ...
19,166,830 UART:
19,166,979 UART: [state] CFI Enabled
19,175,403 UART: [fht] FMC Alias Private Key: 7
20,932,923 UART: [art] Extend RT PCRs Done
20,934,135 UART: [art] Lock RT PCRs Done
20,935,807 UART: [art] Populate DV Done
20,941,431 UART: [fht] FMC Alias Private Key: 7
20,943,078 UART: [art] Derive CDI
20,943,819 UART: [art] Store in in slot 0x4
20,986,413 UART: [art] Derive Key Pair
20,987,448 UART: [art] Store priv key in slot 0x5
23,413,587 UART: [art] Derive Key Pair - Done
23,426,359 UART: [art] Signing Cert with AUTHO
23,427,659 UART: RITY.KEYID = 7
25,133,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,905 UART: [art] PUB.X = B874485FE329A9E1A154EFA726C9AAE74939C2E0148735ED6F2721F1097D4593C60B918D807BAEDC46C270CA0A921C0E
25,142,177 UART: [art] PUB.Y = AB2A6E707AAFEE87AC3122C8F515F3CA3927C6AA7368A5FAFD620B7CB2B7236B72BA12FDE12C46A474A89BB9231E254A
25,149,444 UART: [art] SIG.R = 450AB33DE7422091EDDBD99CFCE1ADBFDB52D2E55E57E96B750E62911BC6EB26F460C2AB5D65B71CA3B3C1E6DE3523CB
25,156,867 UART: [art] SIG.S = 018AE4FB8A72AB2AB81174910043799F388720BE03E7EA5CA975C55CA526485F5AE032651596FC9DE9F40FB8C1172C0D
26,135,696 UART: Caliptra RT
26,136,379 UART: [state] CFI Enabled
26,253,854 UART: [rt] RT listening for mailbox commands...
26,255,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,286,241 UART: [rt]cmd =0x44504543, len=92
26,292,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,935 writing to cptra_bootfsm_go
3,758,059 ready_for_fw is high
3,758,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,961,723 >>> mbox cmd response: success
19,219,303 UART:
19,219,695 UART: Running Caliptra FMC ...
19,220,903 UART:
19,221,081 UART: [state] CFI Enabled
19,228,864 UART: [fht] FMC Alias Private Key: 7
20,985,735 UART: [art] Extend RT PCRs Done
20,986,966 UART: [art] Lock RT PCRs Done
20,988,709 UART: [art] Populate DV Done
20,994,037 UART: [fht] FMC Alias Private Key: 7
20,995,536 UART: [art] Derive CDI
20,996,273 UART: [art] Store in in slot 0x4
21,038,923 UART: [art] Derive Key Pair
21,039,972 UART: [art] Store priv key in slot 0x5
23,466,531 UART: [art] Derive Key Pair - Done
23,479,375 UART: [art] Signing Cert with AUTHO
23,480,701 UART: RITY.KEYID = 7
25,186,126 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,633 UART: [art] PUB.X = 60548757BECC4B391810AA45CB263ECCFCA3B0D053D41AEEC3459A026AAA13BEC91A81B0C542C7467ECB7AEBE68A09F9
25,194,963 UART: [art] PUB.Y = 7BA63290A5A18B5CC768E3CE7A23743A5BA8710803C227B6BF1D3A739935A22E531977C2A184B98504FBE1D0ED8AB66D
25,202,246 UART: [art] SIG.R = 022EF7DED783CD17B7E7DA88CC03CA6525C792381BC3B7B46AC3FAE8A58541A94B37AD26EB9F3D75F30E5AF78B85DBFA
25,209,644 UART: [art] SIG.S = C50A54707A6562E31258CEDE423E5F4B07F7B404E61E4AA8EE5AA446E7064FE5E2A4C1176F9F46B36A7779738D47113D
26,188,851 UART: Caliptra RT
26,189,563 UART: [state] CFI Enabled
26,306,001 UART: [rt] RT listening for mailbox commands...
26,307,933 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,338,673 UART: [rt]cmd =0x44504543, len=92
26,345,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,310 UART: [kat] HMAC-384Kdf
906,792 UART: [kat] LMS
1,474,988 UART: [kat] --
1,476,057 UART: [cold-reset] ++
1,476,613 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 ready_for_fw is high
1,480,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,426 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,038 UART: [idev] --
1,513,985 UART: [ldev] ++
1,514,153 UART: [ldev] CDI.KEYID = 6
1,514,516 UART: [ldev] SUBJECT.KEYID = 5
1,514,942 UART: [ldev] AUTHORITY.KEYID = 7
1,515,405 UART: [ldev] FE.KEYID = 1
1,520,351 UART: [ldev] Erasing FE.KEYID = 1
1,545,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,160 UART: [ldev] --
1,584,455 UART: [fwproc] Waiting for Commands...
1,585,214 UART: [fwproc] Received command 0x46574c44
1,586,005 UART: [fwproc] Received Image of size 114084 bytes
2,880,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,660 >>> mbox cmd response: success
3,074,672 UART: [afmc] ++
3,074,840 UART: [afmc] CDI.KEYID = 6
3,075,202 UART: [afmc] SUBJECT.KEYID = 7
3,075,627 UART: [afmc] AUTHORITY.KEYID = 5
3,110,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,188 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,581 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,271 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,986 UART: [afmc] --
3,153,912 UART: [cold-reset] --
3,155,000 UART: [state] Locking Datavault
3,156,119 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,723 UART: [state] Locking ICCM
3,157,381 UART: [exit] Launching FMC @ 0x40000130
3,162,710 UART:
3,162,726 UART: Running Caliptra FMC ...
3,163,134 UART:
3,163,188 UART: [state] CFI Enabled
3,173,767 UART: [fht] FMC Alias Private Key: 7
3,281,616 UART: [art] Extend RT PCRs Done
3,282,044 UART: [art] Lock RT PCRs Done
3,283,538 UART: [art] Populate DV Done
3,291,787 UART: [fht] FMC Alias Private Key: 7
3,292,821 UART: [art] Derive CDI
3,293,101 UART: [art] Store in in slot 0x4
3,378,244 UART: [art] Derive Key Pair
3,378,604 UART: [art] Store priv key in slot 0x5
3,391,502 UART: [art] Derive Key Pair - Done
3,406,229 UART: [art] Signing Cert with AUTHO
3,406,709 UART: RITY.KEYID = 7
3,422,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,806 UART: [art] PUB.X = BDCD6CB84AD78792CF1B81CE34CF33DA8DB48BB0B4126044505B6BA72693DC4D38CD2D9E309262FE90D4FD6872561FDC
3,429,594 UART: [art] PUB.Y = 788F64CE4FCD406D6266884FF390DF33F38050F5A2CAFEE1EB652A47EFF80214D36DD90B5626E4C7B59960947BF0EE1B
3,436,550 UART: [art] SIG.R = F48FE9E9B937C30EEECA5FF1F5652C862498E8AC0EA17D0F139324001663BBD64CABE8E9226127B15B62D2712B8FBC93
3,443,301 UART: [art] SIG.S = D4FFCAD3ABBDAF15A721DA6D108EC59961ACE594143CDCBB02E5236130B636297F2698A416AA7A0FC1250A292A15DF45
3,467,229 UART: Caliptra RT
3,467,482 UART: [state] CFI Enabled
3,575,626 UART: [rt] RT listening for mailbox commands...
3,576,296 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,652 UART: [rt]cmd =0x44504543, len=92
3,613,686 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,765 ready_for_fw is high
1,362,765 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,580 >>> mbox cmd response: success
2,985,392 UART:
2,985,408 UART: Running Caliptra FMC ...
2,985,816 UART:
2,985,870 UART: [state] CFI Enabled
2,996,365 UART: [fht] FMC Alias Private Key: 7
3,104,404 UART: [art] Extend RT PCRs Done
3,104,832 UART: [art] Lock RT PCRs Done
3,106,262 UART: [art] Populate DV Done
3,114,335 UART: [fht] FMC Alias Private Key: 7
3,115,279 UART: [art] Derive CDI
3,115,559 UART: [art] Store in in slot 0x4
3,201,410 UART: [art] Derive Key Pair
3,201,770 UART: [art] Store priv key in slot 0x5
3,215,262 UART: [art] Derive Key Pair - Done
3,230,036 UART: [art] Signing Cert with AUTHO
3,230,516 UART: RITY.KEYID = 7
3,245,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,657 UART: [art] PUB.X = 13E3500FF70E4C4D8C4D52547D08B7909963897F98B41F181F49C6AB32234307E9D4717044B4475D66D5D406DCCA0E80
3,253,403 UART: [art] PUB.Y = AED54C925D88E132845E1286A009DC03C2384BB96B100AA984DB8239F5DEEB04CA32478C24B176874010F7F288E5BB79
3,260,343 UART: [art] SIG.R = 5524B6E860C1A9C97D610E2D3DB8A1B373B043189FFCE5E044992FDF9D005F46D85329ACA0692CC7F77525FFE92C30AD
3,267,098 UART: [art] SIG.S = 512425931753D35FDD381A1753B038EFB6A44D79D72E0E0F547A1BCBA0E87AA7A02897526D2DD7537862BD99B3504567
3,291,703 UART: Caliptra RT
3,291,956 UART: [state] CFI Enabled
3,400,646 UART: [rt] RT listening for mailbox commands...
3,401,316 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,750 UART: [rt]cmd =0x44504543, len=92
3,439,046 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,844 UART: [kat] SHA2-256
892,782 UART: [kat] SHA2-384
895,395 UART: [kat] SHA2-512-ACC
897,296 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,705 UART: [kat] LMS
1,475,901 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,248 UART: [fht] Storing FHT @ 0x50003400
1,479,915 UART: [idev] ++
1,480,083 UART: [idev] CDI.KEYID = 6
1,480,443 UART: [idev] SUBJECT.KEYID = 7
1,480,867 UART: [idev] UDS.KEYID = 0
1,481,212 ready_for_fw is high
1,481,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,187 UART: [idev] --
1,515,350 UART: [ldev] ++
1,515,518 UART: [ldev] CDI.KEYID = 6
1,515,881 UART: [ldev] SUBJECT.KEYID = 5
1,516,307 UART: [ldev] AUTHORITY.KEYID = 7
1,516,770 UART: [ldev] FE.KEYID = 1
1,522,070 UART: [ldev] Erasing FE.KEYID = 1
1,547,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,605 UART: [ldev] --
1,587,054 UART: [fwproc] Waiting for Commands...
1,587,845 UART: [fwproc] Received command 0x46574c44
1,588,636 UART: [fwproc] Received Image of size 114084 bytes
2,884,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,030 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,787 >>> mbox cmd response: success
3,077,847 UART: [afmc] ++
3,078,015 UART: [afmc] CDI.KEYID = 6
3,078,377 UART: [afmc] SUBJECT.KEYID = 7
3,078,802 UART: [afmc] AUTHORITY.KEYID = 5
3,114,175 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,309 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,702 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,392 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,321 UART: [afmc] --
3,157,337 UART: [cold-reset] --
3,158,137 UART: [state] Locking Datavault
3,159,192 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,796 UART: [state] Locking ICCM
3,160,364 UART: [exit] Launching FMC @ 0x40000130
3,165,693 UART:
3,165,709 UART: Running Caliptra FMC ...
3,166,117 UART:
3,166,260 UART: [state] CFI Enabled
3,176,603 UART: [fht] FMC Alias Private Key: 7
3,284,478 UART: [art] Extend RT PCRs Done
3,284,906 UART: [art] Lock RT PCRs Done
3,286,640 UART: [art] Populate DV Done
3,294,999 UART: [fht] FMC Alias Private Key: 7
3,295,927 UART: [art] Derive CDI
3,296,207 UART: [art] Store in in slot 0x4
3,381,956 UART: [art] Derive Key Pair
3,382,316 UART: [art] Store priv key in slot 0x5
3,395,790 UART: [art] Derive Key Pair - Done
3,410,467 UART: [art] Signing Cert with AUTHO
3,410,947 UART: RITY.KEYID = 7
3,426,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,862 UART: [art] PUB.X = 50DDB1FB5ECDDC142D969279F95CD7E89363A569B253496DBBCB3B5EF8F2F9D55523DE0E2D5A4593DE292D6ADD9F9E00
3,433,627 UART: [art] PUB.Y = 3C455147A1EAD5F0D42DB82178E76BA1EF16D92C09336AB9A4A7CB4C1F014912F458A06EE4BAC348F6A357F6AC8C4577
3,440,583 UART: [art] SIG.R = 452B5D8190BC2AC9F100E56C03CE18561AACB5A8B2EACB16F348D8604C2CE411810DAA4BB643B478945CC78E8D886F41
3,447,337 UART: [art] SIG.S = C9D459F3B3433B71DADC152242C535CD2C47735B52E17F2841071598C54C3A47BA668CFA7B3661429AA102DB27C3E4D0
3,470,898 UART: Caliptra RT
3,471,243 UART: [state] CFI Enabled
3,579,950 UART: [rt] RT listening for mailbox commands...
3,580,620 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,094 UART: [rt]cmd =0x44504543, len=92
3,618,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,924 ready_for_fw is high
1,362,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,111 >>> mbox cmd response: success
2,986,301 UART:
2,986,317 UART: Running Caliptra FMC ...
2,986,725 UART:
2,986,868 UART: [state] CFI Enabled
2,997,571 UART: [fht] FMC Alias Private Key: 7
3,105,280 UART: [art] Extend RT PCRs Done
3,105,708 UART: [art] Lock RT PCRs Done
3,107,416 UART: [art] Populate DV Done
3,115,577 UART: [fht] FMC Alias Private Key: 7
3,116,571 UART: [art] Derive CDI
3,116,851 UART: [art] Store in in slot 0x4
3,202,254 UART: [art] Derive Key Pair
3,202,614 UART: [art] Store priv key in slot 0x5
3,215,642 UART: [art] Derive Key Pair - Done
3,230,477 UART: [art] Signing Cert with AUTHO
3,230,957 UART: RITY.KEYID = 7
3,246,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,076 UART: [art] PUB.X = 520B7FD0089CBACD726650EE9DE082FD403A9A48CCD190619973D524000BD6DE55F1B00FE2C60E3F2943C78C1539B5A8
3,253,817 UART: [art] PUB.Y = F111847478F467ED77CBCF1ADA7BD229BA48FC53CC8B33802DFA3973C3141B9BE33DE6382282DAEFDB757D6E879CA765
3,260,783 UART: [art] SIG.R = 66272898493BE78F8C05C11751B222A7A75BFA4CC034922DF34915AFEFBD27562038F65B2AE898CA0683DD78E40A077C
3,267,543 UART: [art] SIG.S = 57515F5A298A711628D601C18C3518CDF0A38E67E27ACC68268DE2A022E73392BFC459D83192D064B67F17B5A33BBBAA
3,291,443 UART: Caliptra RT
3,291,788 UART: [state] CFI Enabled
3,399,808 UART: [rt] RT listening for mailbox commands...
3,400,478 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,806 UART: [rt]cmd =0x44504543, len=92
3,438,074 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,613 UART: [kat] SHA2-256
903,553 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
918,182 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,382 UART: [idev] ++
1,175,550 UART: [idev] CDI.KEYID = 6
1,175,910 UART: [idev] SUBJECT.KEYID = 7
1,176,334 UART: [idev] UDS.KEYID = 0
1,176,679 ready_for_fw is high
1,176,679 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,244 UART: [idev] Erasing UDS.KEYID = 0
1,201,203 UART: [idev] Sha1 KeyId Algorithm
1,209,579 UART: [idev] --
1,210,705 UART: [ldev] ++
1,210,873 UART: [ldev] CDI.KEYID = 6
1,211,236 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,401 UART: [ldev] Erasing FE.KEYID = 1
1,244,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,011 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,144 UART: [fwproc] Recv command 0x46574c44
1,284,872 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,713 >>> mbox cmd response: success
2,771,861 UART: [afmc] ++
2,772,029 UART: [afmc] CDI.KEYID = 6
2,772,391 UART: [afmc] SUBJECT.KEYID = 7
2,772,816 UART: [afmc] AUTHORITY.KEYID = 5
2,807,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,105 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,824 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,572 UART: [afmc] --
2,850,480 UART: [cold-reset] --
2,851,352 UART: [state] Locking Datavault
2,852,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,073 UART: [state] Locking ICCM
2,853,707 UART: [exit] Launching FMC @ 0x40000130
2,859,036 UART:
2,859,052 UART: Running Caliptra FMC ...
2,859,460 UART:
2,859,514 UART: [state] CFI Enabled
2,870,281 UART: [fht] FMC Alias Private Key: 7
2,978,200 UART: [art] Extend RT PCRs Done
2,978,628 UART: [art] Lock RT PCRs Done
2,980,238 UART: [art] Populate DV Done
2,988,503 UART: [fht] FMC Alias Private Key: 7
2,989,575 UART: [art] Derive CDI
2,989,855 UART: [art] Store in in slot 0x4
3,075,412 UART: [art] Derive Key Pair
3,075,772 UART: [art] Store priv key in slot 0x5
3,089,084 UART: [art] Derive Key Pair - Done
3,103,755 UART: [art] Signing Cert with AUTHO
3,104,235 UART: RITY.KEYID = 7
3,119,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,446 UART: [art] PUB.X = 281E154BA31B47CE576A7D8706907330B6B27E3755B3A673C67798CCE7F3E25FC490220EF4473203F97B4E5A93F29D09
3,127,200 UART: [art] PUB.Y = 79BC22EA2EF2C0757F6E38096F3BF3237FD6133A8BE4178EB45C86D0B273AD53892D8807C5AE30B26BAFC6B429D67D90
3,134,154 UART: [art] SIG.R = 120EB15457410DDE5D266E72AB323F3436E220EA8A983E54786A1B8FFD0255633951EB6B1A0662DB8A0140277D2A7F9E
3,140,909 UART: [art] SIG.S = A7DCE521C52D6EEE200D6A17CC1D56547B75860274B17AAC82ABBF7154316057763D633C8E058F37F3AFD62973DAEA2D
3,165,057 UART: Caliptra RT
3,165,310 UART: [state] CFI Enabled
3,272,729 UART: [rt] RT listening for mailbox commands...
3,273,399 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,521 UART: [rt]cmd =0x44504543, len=92
3,310,577 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,633 ready_for_fw is high
1,060,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,076 >>> mbox cmd response: success
2,686,622 UART:
2,686,638 UART: Running Caliptra FMC ...
2,687,046 UART:
2,687,100 UART: [state] CFI Enabled
2,697,653 UART: [fht] FMC Alias Private Key: 7
2,806,130 UART: [art] Extend RT PCRs Done
2,806,558 UART: [art] Lock RT PCRs Done
2,807,948 UART: [art] Populate DV Done
2,816,381 UART: [fht] FMC Alias Private Key: 7
2,817,451 UART: [art] Derive CDI
2,817,731 UART: [art] Store in in slot 0x4
2,903,320 UART: [art] Derive Key Pair
2,903,680 UART: [art] Store priv key in slot 0x5
2,916,774 UART: [art] Derive Key Pair - Done
2,931,165 UART: [art] Signing Cert with AUTHO
2,931,645 UART: RITY.KEYID = 7
2,946,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,484 UART: [art] PUB.X = 5A7ECAE91EFDFF2E6DE100032FFD2EB03714C6D2762CCF59C4AF97FA3FD1F4FE1EC7F6675340BE0619F681ED8D5F4EC6
2,954,254 UART: [art] PUB.Y = F53790B2A103672A97FFDF555223284A22D2CB0A897DF1D7E64BACDD93C65F9DF2BD45D7BE7CF91AF3E42E0F423AD542
2,961,213 UART: [art] SIG.R = D60701BC7875731DAC0DF7DFC8DACD5BCAF0476B0BC5EEFA9A3A40838553CFCD7A5BCCC97EEAA9C0DA42369F46AB465A
2,968,005 UART: [art] SIG.S = 1E3BC071DA659C3E5E504690CAC39A3D38655FB36AD5CBE7BE89D9833F6355CC464F45DBBD14848538314EBDF4DCE865
2,992,052 UART: Caliptra RT
2,992,305 UART: [state] CFI Enabled
3,098,936 UART: [rt] RT listening for mailbox commands...
3,099,606 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,884 UART: [rt]cmd =0x44504543, len=92
3,136,674 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
893,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,942 UART: [kat] ++
898,094 UART: [kat] sha1
902,408 UART: [kat] SHA2-256
904,348 UART: [kat] SHA2-384
907,093 UART: [kat] SHA2-512-ACC
908,994 UART: [kat] ECC-384
918,523 UART: [kat] HMAC-384Kdf
923,311 UART: [kat] LMS
1,171,639 UART: [kat] --
1,172,392 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,605 UART: [idev] ++
1,175,773 UART: [idev] CDI.KEYID = 6
1,176,133 UART: [idev] SUBJECT.KEYID = 7
1,176,557 UART: [idev] UDS.KEYID = 0
1,176,902 ready_for_fw is high
1,176,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,202,538 UART: [idev] Sha1 KeyId Algorithm
1,210,930 UART: [idev] --
1,211,840 UART: [ldev] ++
1,212,008 UART: [ldev] CDI.KEYID = 6
1,212,371 UART: [ldev] SUBJECT.KEYID = 5
1,212,797 UART: [ldev] AUTHORITY.KEYID = 7
1,213,260 UART: [ldev] FE.KEYID = 1
1,218,358 UART: [ldev] Erasing FE.KEYID = 1
1,245,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,900 UART: [ldev] --
1,284,365 UART: [fwproc] Wait for Commands...
1,284,967 UART: [fwproc] Recv command 0x46574c44
1,285,695 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,140 >>> mbox cmd response: success
2,773,360 UART: [afmc] ++
2,773,528 UART: [afmc] CDI.KEYID = 6
2,773,890 UART: [afmc] SUBJECT.KEYID = 7
2,774,315 UART: [afmc] AUTHORITY.KEYID = 5
2,809,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,233 UART: [afmc] --
2,853,265 UART: [cold-reset] --
2,853,945 UART: [state] Locking Datavault
2,855,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,940 UART: [state] Locking ICCM
2,856,588 UART: [exit] Launching FMC @ 0x40000130
2,861,917 UART:
2,861,933 UART: Running Caliptra FMC ...
2,862,341 UART:
2,862,484 UART: [state] CFI Enabled
2,872,861 UART: [fht] FMC Alias Private Key: 7
2,981,132 UART: [art] Extend RT PCRs Done
2,981,560 UART: [art] Lock RT PCRs Done
2,983,024 UART: [art] Populate DV Done
2,991,289 UART: [fht] FMC Alias Private Key: 7
2,992,267 UART: [art] Derive CDI
2,992,547 UART: [art] Store in in slot 0x4
3,078,522 UART: [art] Derive Key Pair
3,078,882 UART: [art] Store priv key in slot 0x5
3,091,952 UART: [art] Derive Key Pair - Done
3,107,029 UART: [art] Signing Cert with AUTHO
3,107,509 UART: RITY.KEYID = 7
3,123,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,850 UART: [art] PUB.X = F8BD34B6C73458C6BB07276E73F71A84FC6E7DE7C9CB728AB2E4F6646D74A2185E60C922093EC4057685E32FAB354C51
3,130,617 UART: [art] PUB.Y = 60425D190CAE39F6914288F4531DAB283E04C2FA8CF392F75E67CF3EFC2B64E930C5097E4905EE44DA5DD304C6B1EC11
3,137,562 UART: [art] SIG.R = D3550B4F5AA59F8CF55C0B0E30F2F1897F38D10FC107D4CF620A60A18B64CCC55F2DCFCE588DA743CB75540EBFB39EE2
3,144,333 UART: [art] SIG.S = 93FAAE344B5D91AECE809AA8E39D7B26A1F5A0A6CCE96D5E49D3BD84BC7250C1A692CA5C1324BD2AC59247007186CFE8
3,167,994 UART: Caliptra RT
3,168,339 UART: [state] CFI Enabled
3,276,399 UART: [rt] RT listening for mailbox commands...
3,277,069 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,509 UART: [rt]cmd =0x44504543, len=92
3,314,897 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,052 ready_for_fw is high
1,061,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,809 >>> mbox cmd response: success
2,685,825 UART:
2,685,841 UART: Running Caliptra FMC ...
2,686,249 UART:
2,686,392 UART: [state] CFI Enabled
2,697,007 UART: [fht] FMC Alias Private Key: 7
2,804,726 UART: [art] Extend RT PCRs Done
2,805,154 UART: [art] Lock RT PCRs Done
2,806,672 UART: [art] Populate DV Done
2,814,951 UART: [fht] FMC Alias Private Key: 7
2,815,999 UART: [art] Derive CDI
2,816,279 UART: [art] Store in in slot 0x4
2,901,660 UART: [art] Derive Key Pair
2,902,020 UART: [art] Store priv key in slot 0x5
2,915,096 UART: [art] Derive Key Pair - Done
2,930,199 UART: [art] Signing Cert with AUTHO
2,930,679 UART: RITY.KEYID = 7
2,946,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,926 UART: [art] PUB.X = EE319882E2B9FAA660BA25932089BDE6D89E14683F4164EA19199ADA28B8F59D5C74C178AAB97DD47083DAA65C079274
2,953,699 UART: [art] PUB.Y = F313EDDFCCF311E6C7FEDC81D55D434BCFF20A11D8F20E5E3EF6799BEBBF5880059522B86D298FEEE751AD239BCC4E85
2,960,666 UART: [art] SIG.R = 4B7297A0F00FB846A8FB326ADA9769D216595BF0DE8D1923250DB845BA3D3ED1D12C0C99DE202B9355886FA81F1837DF
2,967,435 UART: [art] SIG.S = C31ADAF1CB69B65843F38E71985C62FDC6887918DBB06682305C4C31F21CB63B0DEF5BBF179A59B13BD6120DAF953D91
2,991,334 UART: Caliptra RT
2,991,679 UART: [state] CFI Enabled
3,099,836 UART: [rt] RT listening for mailbox commands...
3,100,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,786 UART: [rt]cmd =0x44504543, len=92
3,137,972 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,147 UART: [kat] SHA2-256
902,087 UART: [kat] SHA2-384
904,860 UART: [kat] SHA2-512-ACC
906,761 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 ready_for_fw is high
1,174,371 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,326 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,925 >>> mbox cmd response: success
2,771,138 UART: [afmc] ++
2,771,306 UART: [afmc] CDI.KEYID = 6
2,771,669 UART: [afmc] SUBJECT.KEYID = 7
2,772,095 UART: [afmc] AUTHORITY.KEYID = 5
2,808,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,231 UART: [afmc] --
2,851,303 UART: [cold-reset] --
2,851,905 UART: [state] Locking Datavault
2,853,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,838 UART: [state] Locking ICCM
2,854,442 UART: [exit] Launching FMC @ 0x40000130
2,859,771 UART:
2,859,787 UART: Running Caliptra FMC ...
2,860,195 UART:
2,860,249 UART: [state] CFI Enabled
2,870,558 UART: [fht] FMC Alias Private Key: 7
2,978,035 UART: [art] Extend RT PCRs Done
2,978,463 UART: [art] Lock RT PCRs Done
2,979,983 UART: [art] Populate DV Done
2,988,258 UART: [fht] FMC Alias Private Key: 7
2,989,386 UART: [art] Derive CDI
2,989,666 UART: [art] Store in in slot 0x4
3,075,071 UART: [art] Derive Key Pair
3,075,431 UART: [art] Store priv key in slot 0x5
3,088,205 UART: [art] Derive Key Pair - Done
3,102,802 UART: [art] Signing Cert with AUTHO
3,103,282 UART: RITY.KEYID = 7
3,118,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,939 UART: [art] PUB.X = E0EF76E47FFD30150F14CE758BD5036DEDE0ED16BD8CC2A5EB1ED6348C6C4857953A8782396D45728FD5D3F70EAE4606
3,125,711 UART: [art] PUB.Y = F5E7252118829A158496773A31C4893263B736E7C08BF86CBDA7A24C9458E5B73911B3DE24AC1FF916EDEB30AC3A0BB8
3,132,664 UART: [art] SIG.R = 3E2596E994F85409A11160DEFD6DB84C5C8912E70AEBD5CE2B3159D254B74D4146104095CB3611AD1AE5CE0F3E6C7FFE
3,139,437 UART: [art] SIG.S = 0B83E5C454FD04200CF50A62BA5940571F04D217F14D54265ECE7FB1F5F05E403057CF8FBFEE8BFAAE31C820B3B4A772
3,162,931 UART: Caliptra RT
3,163,184 UART: [state] CFI Enabled
3,270,665 UART: [rt] RT listening for mailbox commands...
3,271,335 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,721 UART: [rt]cmd =0x44504543, len=92
3,308,671 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 ready_for_fw is high
1,056,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,859 >>> mbox cmd response: success
2,680,291 UART:
2,680,307 UART: Running Caliptra FMC ...
2,680,715 UART:
2,680,769 UART: [state] CFI Enabled
2,691,346 UART: [fht] FMC Alias Private Key: 7
2,799,057 UART: [art] Extend RT PCRs Done
2,799,485 UART: [art] Lock RT PCRs Done
2,800,939 UART: [art] Populate DV Done
2,809,140 UART: [fht] FMC Alias Private Key: 7
2,810,070 UART: [art] Derive CDI
2,810,350 UART: [art] Store in in slot 0x4
2,895,703 UART: [art] Derive Key Pair
2,896,063 UART: [art] Store priv key in slot 0x5
2,909,087 UART: [art] Derive Key Pair - Done
2,923,481 UART: [art] Signing Cert with AUTHO
2,923,961 UART: RITY.KEYID = 7
2,938,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,694 UART: [art] PUB.X = 0EBD0C9BCAE6A9B0210F57D81C8A59C81A05F2437056300CC1EB29D8D28A4C8DB305A34292677937C47936CF8718F393
2,946,448 UART: [art] PUB.Y = F239DC54769A388EC9F40FC32EDF4F1255F8E4EF774108C2AEB16937A1973ECE954C2797A462CDFA73F1029D7BDA2F70
2,953,401 UART: [art] SIG.R = 67FA6ABBF42C5659BC534ACD6BA50162001755F500BBC36C017FDC9C7AB13259120C2DDBEDF7F096E39E16888CF8D25F
2,960,134 UART: [art] SIG.S = 7E2D0F2DD381EAA199F583E077EB7BF1A58DF8DEB5FAD650F5B4C7629412FEE63D62CACE1150957F15D5A4D08D122E28
2,984,278 UART: Caliptra RT
2,984,531 UART: [state] CFI Enabled
3,093,094 UART: [rt] RT listening for mailbox commands...
3,093,764 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,220 UART: [rt]cmd =0x44504543, len=92
3,131,258 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,174,650 ready_for_fw is high
1,174,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,537 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,410 UART: [fwproc] Recv command 0x46574c44
1,282,143 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,094 >>> mbox cmd response: success
2,769,155 UART: [afmc] ++
2,769,323 UART: [afmc] CDI.KEYID = 6
2,769,686 UART: [afmc] SUBJECT.KEYID = 7
2,770,112 UART: [afmc] AUTHORITY.KEYID = 5
2,806,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,064 UART: [afmc] --
2,849,960 UART: [cold-reset] --
2,850,756 UART: [state] Locking Datavault
2,852,129 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,733 UART: [state] Locking ICCM
2,853,275 UART: [exit] Launching FMC @ 0x40000130
2,858,604 UART:
2,858,620 UART: Running Caliptra FMC ...
2,859,028 UART:
2,859,171 UART: [state] CFI Enabled
2,869,946 UART: [fht] FMC Alias Private Key: 7
2,978,345 UART: [art] Extend RT PCRs Done
2,978,773 UART: [art] Lock RT PCRs Done
2,980,231 UART: [art] Populate DV Done
2,988,430 UART: [fht] FMC Alias Private Key: 7
2,989,420 UART: [art] Derive CDI
2,989,700 UART: [art] Store in in slot 0x4
3,075,217 UART: [art] Derive Key Pair
3,075,577 UART: [art] Store priv key in slot 0x5
3,088,879 UART: [art] Derive Key Pair - Done
3,103,820 UART: [art] Signing Cert with AUTHO
3,104,300 UART: RITY.KEYID = 7
3,119,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,569 UART: [art] PUB.X = 097446DD317FA6C76E323C431D40C28A2DCC2AEE38F6D11C53013372C3211346CC3F95DEDE32EA087E18AB13FF5FE285
3,127,340 UART: [art] PUB.Y = 0F4393A6760D0B2422C7A91FE32680A767F56B4123D895D37A314CB7BBFBA09A648DC80FBAA732245D38C20F4FDA86B8
3,134,283 UART: [art] SIG.R = BF2D1A596EE97E59D4F723B1F1C958588BD5159EBB3CB71881B7E66961B6D0D0C8386518489593BE52FEBF6B8B9A30E3
3,141,061 UART: [art] SIG.S = 0366A975F4293D6A584D863D16B82C88A9A1376CE119C88516E65156FCAF079121B9D6D74BA470A066A9579FD93762EC
3,165,336 UART: Caliptra RT
3,165,681 UART: [state] CFI Enabled
3,274,794 UART: [rt] RT listening for mailbox commands...
3,275,464 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,010 UART: [rt]cmd =0x44504543, len=92
3,313,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,181 ready_for_fw is high
1,056,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,094 >>> mbox cmd response: success
2,682,648 UART:
2,682,664 UART: Running Caliptra FMC ...
2,683,072 UART:
2,683,215 UART: [state] CFI Enabled
2,693,758 UART: [fht] FMC Alias Private Key: 7
2,801,709 UART: [art] Extend RT PCRs Done
2,802,137 UART: [art] Lock RT PCRs Done
2,804,125 UART: [art] Populate DV Done
2,812,434 UART: [fht] FMC Alias Private Key: 7
2,813,604 UART: [art] Derive CDI
2,813,884 UART: [art] Store in in slot 0x4
2,900,031 UART: [art] Derive Key Pair
2,900,391 UART: [art] Store priv key in slot 0x5
2,913,167 UART: [art] Derive Key Pair - Done
2,928,207 UART: [art] Signing Cert with AUTHO
2,928,687 UART: RITY.KEYID = 7
2,944,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,766 UART: [art] PUB.X = 4F57013B0439FFEF9D73D69A24871C07C6DDEDC1A5A22E62D918EF4FBB848D3C77592B90E01B36AC1CFBCF8B20FA7179
2,951,545 UART: [art] PUB.Y = 8292F99C35A42D7A30D7E067A7AF4546C6C8E20469D6FDACAAE71EB895629E62C0AF10DAA374B02E8D337AAFAB49971C
2,958,508 UART: [art] SIG.R = 43DB00C0CC476F50CE1A6A4AD0DB67FFBFA3E89720DBE913A91CA4EEEC632F4B919FED74EF995FA4C0D2F79D14DA835A
2,965,286 UART: [art] SIG.S = 2A814973E3B0B6D40AFB12789BCBF2AAD88B0074846676E9481AA4B769BC19510A0D5C7AE460C14C958E888B7479D3D4
2,989,342 UART: Caliptra RT
2,989,687 UART: [state] CFI Enabled
3,097,428 UART: [rt] RT listening for mailbox commands...
3,098,098 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,374 UART: [rt]cmd =0x44504543, len=92
3,135,430 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,191 UART:
192,559 UART: Running Caliptra ROM ...
193,708 UART:
193,861 UART: [state] CFI Enabled
264,679 UART: [state] LifecycleState = Unprovisioned
266,599 UART: [state] DebugLocked = No
269,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,695 UART: [kat] SHA2-256
444,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,907 UART: [kat] ++
455,376 UART: [kat] sha1
467,670 UART: [kat] SHA2-256
470,327 UART: [kat] SHA2-384
477,139 UART: [kat] SHA2-512-ACC
479,480 UART: [kat] ECC-384
2,766,662 UART: [kat] HMAC-384Kdf
2,798,597 UART: [kat] LMS
3,988,953 UART: [kat] --
3,992,104 UART: [cold-reset] ++
3,994,423 UART: [fht] Storing FHT @ 0x50003400
4,004,986 UART: [idev] ++
4,005,557 UART: [idev] CDI.KEYID = 6
4,006,472 UART: [idev] SUBJECT.KEYID = 7
4,007,723 UART: [idev] UDS.KEYID = 0
4,008,770 ready_for_fw is high
4,008,977 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,089 UART: [idev] Erasing UDS.KEYID = 0
7,345,619 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,290 UART: [idev] --
7,371,665 UART: [ldev] ++
7,372,244 UART: [ldev] CDI.KEYID = 6
7,373,131 UART: [ldev] SUBJECT.KEYID = 5
7,374,392 UART: [ldev] AUTHORITY.KEYID = 7
7,375,623 UART: [ldev] FE.KEYID = 1
7,419,434 UART: [ldev] Erasing FE.KEYID = 1
10,756,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,071 UART: [ldev] --
13,134,241 UART: [fwproc] Waiting for Commands...
13,135,874 UART: [fwproc] Received command 0x46574c44
13,138,057 UART: [fwproc] Received Image of size 113760 bytes
17,194,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,719 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,655,336 >>> mbox cmd response: success
17,658,871 UART: [afmc] ++
17,659,472 UART: [afmc] CDI.KEYID = 6
17,660,386 UART: [afmc] SUBJECT.KEYID = 7
17,661,654 UART: [afmc] AUTHORITY.KEYID = 5
21,024,253 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,275 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,640 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,508 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,914 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,021 UART: [afmc] --
23,394,571 UART: [cold-reset] --
23,399,785 UART: [state] Locking Datavault
23,405,464 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,217 UART: [state] Locking ICCM
23,408,554 UART: [exit] Launching FMC @ 0x40000130
23,416,948 UART:
23,417,180 UART: Running Caliptra FMC ...
23,418,281 UART:
23,418,445 UART: [state] CFI Enabled
23,483,941 UART: [fht] FMC Alias Private Key: 7
25,822,281 UART: [art] Extend RT PCRs Done
25,823,502 UART: [art] Lock RT PCRs Done
25,825,312 UART: [art] Populate DV Done
25,830,828 UART: [fht] FMC Alias Private Key: 7
25,832,342 UART: [art] Derive CDI
25,833,109 UART: [art] Store in in slot 0x4
25,892,256 UART: [art] Derive Key Pair
25,893,256 UART: [art] Store priv key in slot 0x5
29,186,032 UART: [art] Derive Key Pair - Done
29,198,696 UART: [art] Signing Cert with AUTHO
29,200,037 UART: RITY.KEYID = 7
31,487,614 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,122 UART: [art] PUB.X = 4E28CFC8FEE084D2B346E818D3220E3B3D2B7FBF5412DE0453F1A5ED6E5DE0A7BD113DBB4230428A90D66590BB8546F1
31,496,366 UART: [art] PUB.Y = 92AB49E1015AF905D6C0E9565A74F818F3D27B79D864E0F889B28205F030E2AAD139DA269AF7FBC00F3FC4D64504B21E
31,503,646 UART: [art] SIG.R = 93E2B503A722A91E36C637E7CB5C15488A3C40368F0CF68E205038DF096E14B75A5DDDEF44382E525EFEB554ABAC974B
31,511,027 UART: [art] SIG.S = AAAAB870B40E1BE66F29D9E9BD7614DD59478485A74AFFFECE700F01AAF8C39CB81922C4A7A9DB8C2A6560C19B98614C
32,816,242 UART: Caliptra RT
32,816,957 UART: [state] CFI Enabled
32,977,860 UART: [rt] RT listening for mailbox commands...
32,979,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,010,957 UART: [rt]cmd =0x44504543, len=96
33,042,868 >>> mbox cmd response data (56 bytes)
33,043,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,074,234 UART: [rt]cmd =0x44504543, len=96
33,105,448 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,785,303 ready_for_fw is high
3,785,710 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,860,333 >>> mbox cmd response: success
23,548,261 UART:
23,548,681 UART: Running Caliptra FMC ...
23,549,997 UART:
23,550,173 UART: [state] CFI Enabled
23,618,870 UART: [fht] FMC Alias Private Key: 7
25,956,971 UART: [art] Extend RT PCRs Done
25,958,214 UART: [art] Lock RT PCRs Done
25,959,791 UART: [art] Populate DV Done
25,965,198 UART: [fht] FMC Alias Private Key: 7
25,966,841 UART: [art] Derive CDI
25,967,654 UART: [art] Store in in slot 0x4
26,027,521 UART: [art] Derive Key Pair
26,028,569 UART: [art] Store priv key in slot 0x5
29,321,302 UART: [art] Derive Key Pair - Done
29,334,522 UART: [art] Signing Cert with AUTHO
29,335,827 UART: RITY.KEYID = 7
31,622,931 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,441 UART: [art] PUB.X = DC2D1E9B127211BA4EC85E290A788CAA4CD8694EC4D3679687C9F07AAF0DC46A2784C619E7F57BD93712DA1309177CD7
31,631,698 UART: [art] PUB.Y = 94E9FBF9772DEB79CC89BAD5859FD05EE98177E2036A75E72B3BCEE572739D75CECF2A05DE9A4F3E0FFFCCAE94B14038
31,639,009 UART: [art] SIG.R = CBC3AAC400FFAAA848243CE78F80BD8986A2F11C0E3DC47FF508E55866CD334E56457E153C99D354CB6174DF8182A91C
31,646,369 UART: [art] SIG.S = A4F9CA4A8456C620FE986DEA99034EBEA715CFC6E2C263D32FCF5E6B103FD1EE2AAD3D8220F7FCFF986297DA23B9E645
32,951,838 UART: Caliptra RT
32,952,569 UART: [state] CFI Enabled
33,112,546 UART: [rt] RT listening for mailbox commands...
33,114,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,145,568 UART: [rt]cmd =0x44504543, len=96
33,176,170 >>> mbox cmd response data (56 bytes)
33,177,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,207,706 UART: [rt]cmd =0x44504543, len=96
33,238,932 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
192,876 UART:
193,252 UART: Running Caliptra ROM ...
194,443 UART:
603,899 UART: [state] CFI Enabled
619,442 UART: [state] LifecycleState = Unprovisioned
621,362 UART: [state] DebugLocked = No
624,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,526 UART: [kat] SHA2-256
799,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,823 UART: [kat] ++
810,270 UART: [kat] sha1
821,705 UART: [kat] SHA2-256
824,430 UART: [kat] SHA2-384
830,415 UART: [kat] SHA2-512-ACC
832,774 UART: [kat] ECC-384
3,118,771 UART: [kat] HMAC-384Kdf
3,132,146 UART: [kat] LMS
4,322,252 UART: [kat] --
4,326,321 UART: [cold-reset] ++
4,328,248 UART: [fht] Storing FHT @ 0x50003400
4,340,286 UART: [idev] ++
4,340,872 UART: [idev] CDI.KEYID = 6
4,341,905 UART: [idev] SUBJECT.KEYID = 7
4,343,071 UART: [idev] UDS.KEYID = 0
4,344,158 ready_for_fw is high
4,344,381 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,487,301 UART: [idev] Erasing UDS.KEYID = 0
7,630,528 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,342 UART: [idev] --
7,655,701 UART: [ldev] ++
7,656,274 UART: [ldev] CDI.KEYID = 6
7,657,237 UART: [ldev] SUBJECT.KEYID = 5
7,658,444 UART: [ldev] AUTHORITY.KEYID = 7
7,659,725 UART: [ldev] FE.KEYID = 1
7,669,281 UART: [ldev] Erasing FE.KEYID = 1
10,959,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,056 UART: [ldev] --
13,320,876 UART: [fwproc] Waiting for Commands...
13,322,688 UART: [fwproc] Received command 0x46574c44
13,324,915 UART: [fwproc] Received Image of size 113760 bytes
17,376,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,232 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,834,142 >>> mbox cmd response: success
17,839,099 UART: [afmc] ++
17,839,692 UART: [afmc] CDI.KEYID = 6
17,840,657 UART: [afmc] SUBJECT.KEYID = 7
17,841,879 UART: [afmc] AUTHORITY.KEYID = 5
21,155,915 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,829 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,218 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,012 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,506 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,543 UART: [afmc] --
23,515,756 UART: [cold-reset] --
23,518,207 UART: [state] Locking Datavault
23,523,880 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,638 UART: [state] Locking ICCM
23,528,376 UART: [exit] Launching FMC @ 0x40000130
23,536,777 UART:
23,537,007 UART: Running Caliptra FMC ...
23,538,110 UART:
23,538,268 UART: [state] CFI Enabled
23,546,467 UART: [fht] FMC Alias Private Key: 7
25,878,031 UART: [art] Extend RT PCRs Done
25,879,258 UART: [art] Lock RT PCRs Done
25,881,097 UART: [art] Populate DV Done
25,886,453 UART: [fht] FMC Alias Private Key: 7
25,888,152 UART: [art] Derive CDI
25,888,965 UART: [art] Store in in slot 0x4
25,931,598 UART: [art] Derive Key Pair
25,932,608 UART: [art] Store priv key in slot 0x5
29,174,704 UART: [art] Derive Key Pair - Done
29,187,478 UART: [art] Signing Cert with AUTHO
29,188,782 UART: RITY.KEYID = 7
31,468,480 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,987 UART: [art] PUB.X = D2767CE73B6844CCDD2ED1BC5BF69A11CE043F03EEF19C3AFF7E9A0FF2A3E9D503754DDB62CF4159D085B6685CC5CF88
31,477,216 UART: [art] PUB.Y = 4798B4DDDC8C234895399DE682F8A32A2F09BCF6E6B80504AD15F6F0254AF291DE288AD2D8D4E26D435E70E93DB3ADBF
31,484,525 UART: [art] SIG.R = 04D50FEC85E35EF9D3AA5367EE6417015263AC9D3E76A9396772D1D973C2D8599410D42AD80C6EFD91A8E1AA7B829CBB
31,491,918 UART: [art] SIG.S = EEE0569DCBB8E9739C2F50F3F5EFDE0451FD2A0812C48E1FCA2F2571C47B51919778B32AA1896EFAE57A7D15422CBB5E
32,797,158 UART: Caliptra RT
32,797,876 UART: [state] CFI Enabled
32,915,102 UART: [rt] RT listening for mailbox commands...
32,917,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,947,778 UART: [rt]cmd =0x44504543, len=96
32,978,909 >>> mbox cmd response data (56 bytes)
32,979,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,010,383 UART: [rt]cmd =0x44504543, len=96
33,042,011 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
4,134,674 ready_for_fw is high
4,135,231 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,613 >>> mbox cmd response: success
23,709,439 UART:
23,709,879 UART: Running Caliptra FMC ...
23,710,990 UART:
23,711,142 UART: [state] CFI Enabled
23,719,532 UART: [fht] FMC Alias Private Key: 7
26,050,817 UART: [art] Extend RT PCRs Done
26,052,048 UART: [art] Lock RT PCRs Done
26,053,650 UART: [art] Populate DV Done
26,059,021 UART: [fht] FMC Alias Private Key: 7
26,060,673 UART: [art] Derive CDI
26,061,411 UART: [art] Store in in slot 0x4
26,104,281 UART: [art] Derive Key Pair
26,105,322 UART: [art] Store priv key in slot 0x5
29,347,492 UART: [art] Derive Key Pair - Done
29,360,926 UART: [art] Signing Cert with AUTHO
29,362,271 UART: RITY.KEYID = 7
31,641,587 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,093 UART: [art] PUB.X = 0E612D50727D437C574757C6EB27A438D867AB56A6708014455FDF805D4190D5F252702764B29D963BB5C335FE5AB21F
31,650,286 UART: [art] PUB.Y = 1B22039AD0F2453DD00A76F463F6CDA24741778ACF9A133560F1B84FBF57A38AC6F4E4CCA1D6508E19F606AEF412C8C8
31,657,578 UART: [art] SIG.R = B77604B62099D0B64297C172373817FCACF5C8351C155D9E62540A1EE6D2061DE7F6AC29AB0F6650EACACA3D22606B70
31,664,905 UART: [art] SIG.S = 13A2032AB848A7ECA5FAEF26BF35331CE32CF89F3346F9E74BB4A3D2113BFF8BFD8854419C52E6835601C80F8925DA65
32,970,017 UART: Caliptra RT
32,970,738 UART: [state] CFI Enabled
33,088,393 UART: [rt] RT listening for mailbox commands...
33,090,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,121,079 UART: [rt]cmd =0x44504543, len=96
33,153,249 >>> mbox cmd response data (56 bytes)
33,154,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,184,776 UART: [rt]cmd =0x44504543, len=96
33,216,273 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
192,500 UART:
192,883 UART: Running Caliptra ROM ...
194,080 UART:
194,237 UART: [state] CFI Enabled
263,392 UART: [state] LifecycleState = Unprovisioned
265,260 UART: [state] DebugLocked = No
266,887 UART: [state] WD Timer not started. Device not locked for debugging
270,855 UART: [kat] SHA2-256
449,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,525 UART: [kat] ++
461,973 UART: [kat] sha1
471,443 UART: [kat] SHA2-256
474,497 UART: [kat] SHA2-384
480,488 UART: [kat] SHA2-512-ACC
483,417 UART: [kat] ECC-384
2,949,581 UART: [kat] HMAC-384Kdf
2,972,899 UART: [kat] LMS
3,502,333 UART: [kat] --
3,506,551 UART: [cold-reset] ++
3,508,220 UART: [fht] FHT @ 0x50003400
3,518,844 UART: [idev] ++
3,519,414 UART: [idev] CDI.KEYID = 6
3,520,347 UART: [idev] SUBJECT.KEYID = 7
3,521,522 UART: [idev] UDS.KEYID = 0
3,522,445 ready_for_fw is high
3,522,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,098 UART: [idev] Erasing UDS.KEYID = 0
6,027,423 UART: [idev] Sha1 KeyId Algorithm
6,049,731 UART: [idev] --
6,054,151 UART: [ldev] ++
6,054,720 UART: [ldev] CDI.KEYID = 6
6,055,657 UART: [ldev] SUBJECT.KEYID = 5
6,056,812 UART: [ldev] AUTHORITY.KEYID = 7
6,058,042 UART: [ldev] FE.KEYID = 1
6,100,618 UART: [ldev] Erasing FE.KEYID = 1
8,604,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,249 UART: [ldev] --
10,413,565 UART: [fwproc] Wait for Commands...
10,416,149 UART: [fwproc] Recv command 0x46574c44
10,418,238 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,283,310 >>> mbox cmd response: success
14,287,035 UART: [afmc] ++
14,287,634 UART: [afmc] CDI.KEYID = 6
14,288,543 UART: [afmc] SUBJECT.KEYID = 7
14,289,757 UART: [afmc] AUTHORITY.KEYID = 5
16,825,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,457 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,644 UART: [afmc] --
18,624,728 UART: [cold-reset] --
18,629,546 UART: [state] Locking Datavault
18,636,367 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,076 UART: [state] Locking ICCM
18,639,905 UART: [exit] Launching FMC @ 0x40000130
18,648,298 UART:
18,648,528 UART: Running Caliptra FMC ...
18,649,624 UART:
18,649,783 UART: [state] CFI Enabled
18,707,276 UART: [fht] FMC Alias Private Key: 7
20,471,338 UART: [art] Extend RT PCRs Done
20,472,578 UART: [art] Lock RT PCRs Done
20,474,604 UART: [art] Populate DV Done
20,480,123 UART: [fht] FMC Alias Private Key: 7
20,481,715 UART: [art] Derive CDI
20,482,527 UART: [art] Store in in slot 0x4
20,540,103 UART: [art] Derive Key Pair
20,541,098 UART: [art] Store priv key in slot 0x5
23,003,875 UART: [art] Derive Key Pair - Done
23,017,308 UART: [art] Signing Cert with AUTHO
23,018,611 UART: RITY.KEYID = 7
24,729,083 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,584 UART: [art] PUB.X = 00AE0F1064884AFA8902CA325EA44457EE5F17B9CE71D4F6E761570C8050CE22D3A748BFD960E41952850B4686C704F9
24,737,870 UART: [art] PUB.Y = 4B5BD7087E0641406F01D9A73716B1E53295E60A039346E17273B659680765ED00ED5AAE964F325F414A2C033B326A91
24,745,083 UART: [art] SIG.R = E5BDA0FA159EE418264C8F357365737EBCEF7EAD98EBFA3EDC4A5429F5C8A82EC72DBE95E2C4A6E41C40558288C14EFB
24,752,441 UART: [art] SIG.S = FACFA7ADED7C3958FAE70A80C3103A1CC0EDCCA4609125043355894DDAE0B8FFFDDF977F9D5560BAFCAF25CACEBF28C8
25,731,652 UART: Caliptra RT
25,732,381 UART: [state] CFI Enabled
25,897,728 UART: [rt] RT listening for mailbox commands...
25,899,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,930,792 UART: [rt]cmd =0x44504543, len=96
25,963,238 >>> mbox cmd response data (56 bytes)
25,964,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,994,811 UART: [rt]cmd =0x44504543, len=96
26,026,060 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,383,627 ready_for_fw is high
3,384,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,573 >>> mbox cmd response: success
18,342,042 UART:
18,342,462 UART: Running Caliptra FMC ...
18,343,574 UART:
18,343,724 UART: [state] CFI Enabled
18,411,989 UART: [fht] FMC Alias Private Key: 7
20,176,203 UART: [art] Extend RT PCRs Done
20,177,436 UART: [art] Lock RT PCRs Done
20,179,066 UART: [art] Populate DV Done
20,184,399 UART: [fht] FMC Alias Private Key: 7
20,185,893 UART: [art] Derive CDI
20,186,627 UART: [art] Store in in slot 0x4
20,244,630 UART: [art] Derive Key Pair
20,245,625 UART: [art] Store priv key in slot 0x5
22,708,264 UART: [art] Derive Key Pair - Done
22,721,368 UART: [art] Signing Cert with AUTHO
22,722,662 UART: RITY.KEYID = 7
24,433,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,111 UART: [art] PUB.X = CE44F9D653DCAF8566F74072421179C1D7BDBC8183C7E36916086FD6E03E85674A6D5BB60B692C97C54D49694A4F9955
24,442,345 UART: [art] PUB.Y = 7C03FEF4011245FC11F008DB49989E99DB4440254372FDA45D4DCE0875AB6B79AE2B3BEEE0BD898BB24841A2683C4FB6
24,449,622 UART: [art] SIG.R = 8BF3398DE7193F24BE63083CA52A2A733D8FBF61546060C6C9FFC18D14F16BCA42479436DA8C5070021475D97CEAFC6F
24,457,005 UART: [art] SIG.S = F8F09C8F1311DBE40D55A13AE1E025F84E3903DAA0BEA05DD4E1A9BFC6763827C5657E511BD82931DD3E03DDB650AE96
25,435,555 UART: Caliptra RT
25,436,281 UART: [state] CFI Enabled
25,601,631 UART: [rt] RT listening for mailbox commands...
25,603,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,634,703 UART: [rt]cmd =0x44504543, len=96
25,665,962 >>> mbox cmd response data (56 bytes)
25,666,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,697,437 UART: [rt]cmd =0x44504543, len=96
25,728,854 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,787 writing to cptra_bootfsm_go
193,025 UART:
193,407 UART: Running Caliptra ROM ...
194,509 UART:
604,076 UART: [state] CFI Enabled
615,749 UART: [state] LifecycleState = Unprovisioned
617,629 UART: [state] DebugLocked = No
620,570 UART: [state] WD Timer not started. Device not locked for debugging
624,909 UART: [kat] SHA2-256
804,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,616 UART: [kat] ++
816,068 UART: [kat] sha1
827,124 UART: [kat] SHA2-256
830,190 UART: [kat] SHA2-384
836,691 UART: [kat] SHA2-512-ACC
839,704 UART: [kat] ECC-384
3,278,912 UART: [kat] HMAC-384Kdf
3,292,420 UART: [kat] LMS
3,821,935 UART: [kat] --
3,826,751 UART: [cold-reset] ++
3,828,047 UART: [fht] FHT @ 0x50003400
3,839,243 UART: [idev] ++
3,839,815 UART: [idev] CDI.KEYID = 6
3,840,731 UART: [idev] SUBJECT.KEYID = 7
3,841,929 UART: [idev] UDS.KEYID = 0
3,842,909 ready_for_fw is high
3,843,129 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,516 UART: [idev] Erasing UDS.KEYID = 0
6,318,211 UART: [idev] Sha1 KeyId Algorithm
6,341,680 UART: [idev] --
6,346,062 UART: [ldev] ++
6,346,678 UART: [ldev] CDI.KEYID = 6
6,347,593 UART: [ldev] SUBJECT.KEYID = 5
6,348,699 UART: [ldev] AUTHORITY.KEYID = 7
6,349,984 UART: [ldev] FE.KEYID = 1
6,360,522 UART: [ldev] Erasing FE.KEYID = 1
8,831,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,651 UART: [ldev] --
10,623,600 UART: [fwproc] Wait for Commands...
10,625,643 UART: [fwproc] Recv command 0x46574c44
10,627,739 UART: [fwproc] Recv'd Img size: 114084 bytes
14,025,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,643 >>> mbox cmd response: success
14,490,749 UART: [afmc] ++
14,491,346 UART: [afmc] CDI.KEYID = 6
14,492,239 UART: [afmc] SUBJECT.KEYID = 7
14,493,459 UART: [afmc] AUTHORITY.KEYID = 5
16,990,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,727 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,537 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,447 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,590 UART: [afmc] --
18,789,757 UART: [cold-reset] --
18,793,571 UART: [state] Locking Datavault
18,797,629 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,329 UART: [state] Locking ICCM
18,800,748 UART: [exit] Launching FMC @ 0x40000130
18,809,147 UART:
18,809,384 UART: Running Caliptra FMC ...
18,810,410 UART:
18,810,559 UART: [state] CFI Enabled
18,818,608 UART: [fht] FMC Alias Private Key: 7
20,575,226 UART: [art] Extend RT PCRs Done
20,576,445 UART: [art] Lock RT PCRs Done
20,577,856 UART: [art] Populate DV Done
20,583,225 UART: [fht] FMC Alias Private Key: 7
20,584,766 UART: [art] Derive CDI
20,585,701 UART: [art] Store in in slot 0x4
20,628,372 UART: [art] Derive Key Pair
20,629,377 UART: [art] Store priv key in slot 0x5
23,055,780 UART: [art] Derive Key Pair - Done
23,068,931 UART: [art] Signing Cert with AUTHO
23,070,274 UART: RITY.KEYID = 7
24,775,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,247 UART: [art] PUB.X = F6BE1F43FC4350C69AD2228D1DD5E1EF34555F08F9C6AD2C9FAE27AC2A1E45607323056A044750568972CF37E02AF378
24,784,519 UART: [art] PUB.Y = 5CA4F3521BAC0B2DB12BE4934007004814BAB8BF738480454CD3760F1CF5FDBB4493ED0D873ABC6E7D4B479E4815FC4F
24,791,785 UART: [art] SIG.R = 86525DFD5379310C6D2F2B5DB04C0AE246E30DA01380FC95B4E68AB125399DB8E8567E22CEF99F543C126F5068E8C7E6
24,799,152 UART: [art] SIG.S = 5008D165AB75A6A6C63DC6628451F64710D042572ABC512085DE87151AA749BA5E1EEA7FFBE836638F88ED19F7AEB235
25,778,000 UART: Caliptra RT
25,778,715 UART: [state] CFI Enabled
25,896,480 UART: [rt] RT listening for mailbox commands...
25,898,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,850 UART: [rt]cmd =0x44504543, len=96
25,960,668 >>> mbox cmd response data (56 bytes)
25,961,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,992,124 UART: [rt]cmd =0x44504543, len=96
26,023,985 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
3,691,650 ready_for_fw is high
3,692,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,451 >>> mbox cmd response: success
18,515,547 UART:
18,515,950 UART: Running Caliptra FMC ...
18,517,056 UART:
18,517,213 UART: [state] CFI Enabled
18,525,113 UART: [fht] FMC Alias Private Key: 7
20,282,005 UART: [art] Extend RT PCRs Done
20,283,239 UART: [art] Lock RT PCRs Done
20,284,947 UART: [art] Populate DV Done
20,290,203 UART: [fht] FMC Alias Private Key: 7
20,291,652 UART: [art] Derive CDI
20,292,425 UART: [art] Store in in slot 0x4
20,335,289 UART: [art] Derive Key Pair
20,336,295 UART: [art] Store priv key in slot 0x5
22,763,456 UART: [art] Derive Key Pair - Done
22,775,968 UART: [art] Signing Cert with AUTHO
22,777,270 UART: RITY.KEYID = 7
24,482,845 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,352 UART: [art] PUB.X = 5B2996F66223CCB3A3130583CD324BE8269A81BFECD047DE13028EFFB06AB590DF896CE3BF04781D76B2A5C49C2CB072
24,491,582 UART: [art] PUB.Y = 3B94554C71F442858EC8BFC58B0BA016F413027B5BFF76ACDC11B93B7A60B8817139EB15E32514CA98FDF8176AF15CEA
24,498,860 UART: [art] SIG.R = 8F783257AB76D73CF45B0D3862BA7CCF420D368FBDA9DD9775B99110F5F939C867457B49125201C69AE3D00F79A8DCF9
24,506,330 UART: [art] SIG.S = 4876D3D7F5571B1B7729C1ADE94DE3392AAB1E1CD1582FF927643233A711A84082921A8439C4CD4898E5AF71845414A5
25,485,182 UART: Caliptra RT
25,485,884 UART: [state] CFI Enabled
25,602,189 UART: [rt] RT listening for mailbox commands...
25,604,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,634,639 UART: [rt]cmd =0x44504543, len=96
25,666,743 >>> mbox cmd response data (56 bytes)
25,667,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,698,473 UART: [rt]cmd =0x44504543, len=96
25,730,822 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,381 UART:
192,779 UART: Running Caliptra ROM ...
193,976 UART:
194,132 UART: [state] CFI Enabled
268,702 UART: [state] LifecycleState = Unprovisioned
271,061 UART: [state] DebugLocked = No
272,302 UART: [state] WD Timer not started. Device not locked for debugging
276,986 UART: [kat] SHA2-256
466,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,636 UART: [kat] ++
478,082 UART: [kat] sha1
489,104 UART: [kat] SHA2-256
492,104 UART: [kat] SHA2-384
496,454 UART: [kat] SHA2-512-ACC
499,032 UART: [kat] ECC-384
2,951,513 UART: [kat] HMAC-384Kdf
2,976,880 UART: [kat] LMS
3,508,652 UART: [kat] --
3,512,583 UART: [cold-reset] ++
3,515,011 UART: [fht] FHT @ 0x50003400
3,526,912 UART: [idev] ++
3,527,617 UART: [idev] CDI.KEYID = 6
3,528,542 UART: [idev] SUBJECT.KEYID = 7
3,529,714 UART: [idev] UDS.KEYID = 0
3,530,641 ready_for_fw is high
3,530,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,674,393 UART: [idev] Erasing UDS.KEYID = 0
6,036,630 UART: [idev] Sha1 KeyId Algorithm
6,058,895 UART: [idev] --
6,062,188 UART: [ldev] ++
6,062,872 UART: [ldev] CDI.KEYID = 6
6,063,791 UART: [ldev] SUBJECT.KEYID = 5
6,064,947 UART: [ldev] AUTHORITY.KEYID = 7
6,066,200 UART: [ldev] FE.KEYID = 1
6,104,844 UART: [ldev] Erasing FE.KEYID = 1
8,624,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,360,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,376,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,391,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,406,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,324 UART: [ldev] --
10,432,842 UART: [fwproc] Wait for Commands...
10,435,881 UART: [fwproc] Recv command 0x46574c44
10,438,143 UART: [fwproc] Recv'd Img size: 114084 bytes
13,886,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,968,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,085,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,626,992 >>> mbox cmd response: success
14,631,328 UART: [afmc] ++
14,632,057 UART: [afmc] CDI.KEYID = 6
14,633,250 UART: [afmc] SUBJECT.KEYID = 7
14,634,690 UART: [afmc] AUTHORITY.KEYID = 5
17,161,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,884,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,886,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,901,555 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,916,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,931,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,955,090 UART: [afmc] --
18,958,899 UART: [cold-reset] --
18,962,605 UART: [state] Locking Datavault
18,968,840 UART: [state] Locking PCR0, PCR1 and PCR31
18,971,004 UART: [state] Locking ICCM
18,972,842 UART: [exit] Launching FMC @ 0x40000130
18,981,531 UART:
18,981,779 UART: Running Caliptra FMC ...
18,982,882 UART:
18,983,036 UART: [state] CFI Enabled
19,041,311 UART: [fht] FMC Alias Private Key: 7
20,805,625 UART: [art] Extend RT PCRs Done
20,806,850 UART: [art] Lock RT PCRs Done
20,808,612 UART: [art] Populate DV Done
20,813,858 UART: [fht] FMC Alias Private Key: 7
20,815,508 UART: [art] Derive CDI
20,816,317 UART: [art] Store in in slot 0x4
20,874,374 UART: [art] Derive Key Pair
20,875,404 UART: [art] Store priv key in slot 0x5
23,338,284 UART: [art] Derive Key Pair - Done
23,351,332 UART: [art] Signing Cert with AUTHO
23,352,640 UART: RITY.KEYID = 7
25,064,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,065,840 UART: [art] PUB.X = D99F91A241DD22FC212D82393B9B54FD0F49770C45BA531184042BEFBD8E3759C80E48A890DBB00FB6510CC0FA1DAD8A
25,073,021 UART: [art] PUB.Y = E67026DD0ACF7B4C156EFD3A6F956B183939AEC5C1BD234A53BCC516DF42FB6CD3FAB548933E95AAFABBA49702C01884
25,080,272 UART: [art] SIG.R = 6932E6FC3BBFA7DBB9C120A025C290C94814153BC26050C394FBEE0DB32A4D58E3A4B7411646785F817B60510B8503C3
25,087,645 UART: [art] SIG.S = D51EF230B2F5347BCAD92F02D3567B5B0F05D7EC2DBAA2513ABBCADCE674809E849E1FCD63872C03FAEDC6D13D21D1D7
26,066,818 UART: Caliptra RT
26,067,530 UART: [state] CFI Enabled
26,231,143 UART: [rt] RT listening for mailbox commands...
26,233,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,264,120 UART: [rt]cmd =0x44504543, len=96
26,296,199 >>> mbox cmd response data (56 bytes)
26,297,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,939 UART: [rt]cmd =0x44504543, len=96
26,359,881 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,434,347 ready_for_fw is high
3,434,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,723,027 >>> mbox cmd response: success
19,007,385 UART:
19,007,788 UART: Running Caliptra FMC ...
19,009,138 UART:
19,009,315 UART: [state] CFI Enabled
19,074,821 UART: [fht] FMC Alias Private Key: 7
20,838,877 UART: [art] Extend RT PCRs Done
20,840,096 UART: [art] Lock RT PCRs Done
20,841,903 UART: [art] Populate DV Done
20,847,161 UART: [fht] FMC Alias Private Key: 7
20,848,871 UART: [art] Derive CDI
20,849,717 UART: [art] Store in in slot 0x4
20,907,411 UART: [art] Derive Key Pair
20,908,411 UART: [art] Store priv key in slot 0x5
23,371,756 UART: [art] Derive Key Pair - Done
23,384,706 UART: [art] Signing Cert with AUTHO
23,386,018 UART: RITY.KEYID = 7
25,097,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,870 UART: [art] PUB.X = 7BC3CEDB7B1EEBE2390FB4B9038FDE89978796786FE71369B40D25038FE34A80D852AC4C37E64E433FEC2CB91775BB7C
25,106,171 UART: [art] PUB.Y = 64225C1D8355D8199F1B5E59721EC029F58E147714EF76A10CC267EA80EF5E3D82CFC4CF3656B7E266FD08189F263741
25,113,430 UART: [art] SIG.R = 31C371233AE6585218E4BE9DD1F92A6B86B2C54DCE8D5C8EC6CB79A144AEA7FCCC247F9A7A144DF017E26B64B2C2902B
25,120,833 UART: [art] SIG.S = F974C339BCD7E950663C7309D96A1AB92BF9949A4AF8C51BDFB6E86682F9097D12612B77590C26984D0DD07B97104D8C
26,099,622 UART: Caliptra RT
26,100,316 UART: [state] CFI Enabled
26,267,351 UART: [rt] RT listening for mailbox commands...
26,269,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,300,551 UART: [rt]cmd =0x44504543, len=96
26,331,857 >>> mbox cmd response data (56 bytes)
26,332,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,363,479 UART: [rt]cmd =0x44504543, len=96
26,395,462 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,713 writing to cptra_bootfsm_go
192,946 UART:
193,315 UART: Running Caliptra ROM ...
194,506 UART:
604,296 UART: [state] CFI Enabled
615,117 UART: [state] LifecycleState = Unprovisioned
617,533 UART: [state] DebugLocked = No
619,217 UART: [state] WD Timer not started. Device not locked for debugging
624,683 UART: [kat] SHA2-256
814,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,338 UART: [kat] ++
825,860 UART: [kat] sha1
836,236 UART: [kat] SHA2-256
839,306 UART: [kat] SHA2-384
845,646 UART: [kat] SHA2-512-ACC
848,265 UART: [kat] ECC-384
3,289,405 UART: [kat] HMAC-384Kdf
3,302,631 UART: [kat] LMS
3,834,433 UART: [kat] --
3,838,849 UART: [cold-reset] ++
3,841,279 UART: [fht] FHT @ 0x50003400
3,854,034 UART: [idev] ++
3,854,683 UART: [idev] CDI.KEYID = 6
3,855,717 UART: [idev] SUBJECT.KEYID = 7
3,856,819 UART: [idev] UDS.KEYID = 0
3,857,814 ready_for_fw is high
3,858,021 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,653 UART: [idev] Erasing UDS.KEYID = 0
6,332,865 UART: [idev] Sha1 KeyId Algorithm
6,354,768 UART: [idev] --
6,360,382 UART: [ldev] ++
6,361,068 UART: [ldev] CDI.KEYID = 6
6,362,005 UART: [ldev] SUBJECT.KEYID = 5
6,363,168 UART: [ldev] AUTHORITY.KEYID = 7
6,364,399 UART: [ldev] FE.KEYID = 1
6,373,866 UART: [ldev] Erasing FE.KEYID = 1
8,852,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,292 UART: [ldev] --
10,643,426 UART: [fwproc] Wait for Commands...
10,646,553 UART: [fwproc] Recv command 0x46574c44
10,648,863 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,831,143 >>> mbox cmd response: success
14,834,923 UART: [afmc] ++
14,835,641 UART: [afmc] CDI.KEYID = 6
14,836,836 UART: [afmc] SUBJECT.KEYID = 7
14,838,278 UART: [afmc] AUTHORITY.KEYID = 5
17,344,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,381 UART: [afmc] --
19,139,201 UART: [cold-reset] --
19,144,045 UART: [state] Locking Datavault
19,148,228 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,381 UART: [state] Locking ICCM
19,152,920 UART: [exit] Launching FMC @ 0x40000130
19,161,610 UART:
19,161,848 UART: Running Caliptra FMC ...
19,162,875 UART:
19,163,023 UART: [state] CFI Enabled
19,170,973 UART: [fht] FMC Alias Private Key: 7
20,927,938 UART: [art] Extend RT PCRs Done
20,929,159 UART: [art] Lock RT PCRs Done
20,930,653 UART: [art] Populate DV Done
20,935,766 UART: [fht] FMC Alias Private Key: 7
20,937,365 UART: [art] Derive CDI
20,938,108 UART: [art] Store in in slot 0x4
20,980,810 UART: [art] Derive Key Pair
20,981,809 UART: [art] Store priv key in slot 0x5
23,408,573 UART: [art] Derive Key Pair - Done
23,421,946 UART: [art] Signing Cert with AUTHO
23,423,250 UART: RITY.KEYID = 7
25,128,505 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,013 UART: [art] PUB.X = 0A27A5BB26F9C099C85CD66BF317D68635DA24FEC2C15B08318BB2632B36BF2989934353A45D306A76A12853BC8BCC64
25,137,243 UART: [art] PUB.Y = FAE9DC5EA0F41099DB6B5AA0C60863DCAB6E154604E19AF88695B6FE1B9BB9CB0249B22D01F76011EFF24C32206B0085
25,144,500 UART: [art] SIG.R = 075993244CA524FC30E620E610F980EF563096E2175A031C718ED6E710CF2D05B6AAD9A32A50200566EB3EC677C7377D
25,151,873 UART: [art] SIG.S = 038556C0AF4A737C04A3E2931CEAAD5A7B71F24F4693AC8C0A872803ECE5FFEDC80D06729D26C92217CC2588B58F9171
26,130,771 UART: Caliptra RT
26,131,481 UART: [state] CFI Enabled
26,248,816 UART: [rt] RT listening for mailbox commands...
26,250,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,281,409 UART: [rt]cmd =0x44504543, len=96
26,312,743 >>> mbox cmd response data (56 bytes)
26,313,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,344,128 UART: [rt]cmd =0x44504543, len=96
26,375,692 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,754,921 ready_for_fw is high
3,755,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,641 >>> mbox cmd response: success
19,204,049 UART:
19,204,444 UART: Running Caliptra FMC ...
19,205,665 UART:
19,205,834 UART: [state] CFI Enabled
19,213,622 UART: [fht] FMC Alias Private Key: 7
20,971,436 UART: [art] Extend RT PCRs Done
20,972,662 UART: [art] Lock RT PCRs Done
20,974,083 UART: [art] Populate DV Done
20,979,667 UART: [fht] FMC Alias Private Key: 7
20,981,222 UART: [art] Derive CDI
20,981,989 UART: [art] Store in in slot 0x4
21,024,215 UART: [art] Derive Key Pair
21,025,262 UART: [art] Store priv key in slot 0x5
23,452,084 UART: [art] Derive Key Pair - Done
23,464,883 UART: [art] Signing Cert with AUTHO
23,466,199 UART: RITY.KEYID = 7
25,171,971 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,488 UART: [art] PUB.X = 694B222A8D1AA2962A51C9139ED3CC2D6C244290F31BC80A3496F06DA106DBDFD3E23A3057CDA5EC2AE36F6F06FF0D14
25,180,832 UART: [art] PUB.Y = 92083CE90430C23224FCB676AD986D956B430E156D19779E2D46DDEA1B954C35A3CB52A366694CCA187F2BC49564173A
25,188,055 UART: [art] SIG.R = 2E828A37A973EB60AD15F49E339FAF2F8D4A129D00E323BE671FF60C776E7870143C45FCB3BCA6571EFC095DB4B630B3
25,195,404 UART: [art] SIG.S = FCEB6D36C6AAABB1711268CE0F161BA06355E7BE396B947FE05B196653140D06344A7E8716457227E070252FFD4593FA
26,174,111 UART: Caliptra RT
26,174,799 UART: [state] CFI Enabled
26,292,808 UART: [rt] RT listening for mailbox commands...
26,294,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,338 UART: [rt]cmd =0x44504543, len=96
26,356,445 >>> mbox cmd response data (56 bytes)
26,357,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,890 UART: [rt]cmd =0x44504543, len=96
26,419,302 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,337 UART: [kat] SHA2-256
882,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,383 UART: [kat] ++
886,535 UART: [kat] sha1
890,831 UART: [kat] SHA2-256
892,769 UART: [kat] SHA2-384
895,682 UART: [kat] SHA2-512-ACC
897,583 UART: [kat] ECC-384
902,986 UART: [kat] HMAC-384Kdf
907,630 UART: [kat] LMS
1,475,826 UART: [kat] --
1,476,661 UART: [cold-reset] ++
1,477,159 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 ready_for_fw is high
1,481,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,766 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,836 UART: [idev] --
1,514,725 UART: [ldev] ++
1,514,893 UART: [ldev] CDI.KEYID = 6
1,515,256 UART: [ldev] SUBJECT.KEYID = 5
1,515,682 UART: [ldev] AUTHORITY.KEYID = 7
1,516,145 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,716 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,928 UART: [fwproc] Received command 0x46574c44
1,587,719 UART: [fwproc] Received Image of size 114084 bytes
2,883,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,363 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,715 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,254 >>> mbox cmd response: success
3,076,512 UART: [afmc] ++
3,076,680 UART: [afmc] CDI.KEYID = 6
3,077,042 UART: [afmc] SUBJECT.KEYID = 7
3,077,467 UART: [afmc] AUTHORITY.KEYID = 5
3,112,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,474 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,867 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,557 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,604 UART: [afmc] --
3,155,510 UART: [cold-reset] --
3,156,406 UART: [state] Locking Datavault
3,157,729 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,333 UART: [state] Locking ICCM
3,158,759 UART: [exit] Launching FMC @ 0x40000130
3,164,088 UART:
3,164,104 UART: Running Caliptra FMC ...
3,164,512 UART:
3,164,566 UART: [state] CFI Enabled
3,175,199 UART: [fht] FMC Alias Private Key: 7
3,283,428 UART: [art] Extend RT PCRs Done
3,283,856 UART: [art] Lock RT PCRs Done
3,285,844 UART: [art] Populate DV Done
3,294,141 UART: [fht] FMC Alias Private Key: 7
3,295,119 UART: [art] Derive CDI
3,295,399 UART: [art] Store in in slot 0x4
3,381,116 UART: [art] Derive Key Pair
3,381,476 UART: [art] Store priv key in slot 0x5
3,394,364 UART: [art] Derive Key Pair - Done
3,409,215 UART: [art] Signing Cert with AUTHO
3,409,695 UART: RITY.KEYID = 7
3,425,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,828 UART: [art] PUB.X = 77941FDC5BDCF374CC81EC7C04309E987EC5DAB0C72A5BEB211EB5A6D0302E4573901913546D8255723271CE59B39AC2
3,432,601 UART: [art] PUB.Y = F3E8EC69E9A61177FA5DD51056B3134877A234530FD476E4F81987F18C73F91893BE16B66FF9FD3FBA245F497A5AC308
3,439,549 UART: [art] SIG.R = D2651548274DC34DE77312C52DF5508B9583120450F91537973817631CDDF48CFAF6AA86D97809E00D41419E0C229938
3,446,295 UART: [art] SIG.S = CA912CC57259F236384625BFE58DBDC8B56DB59AC911A60DC0B67886940A825D607F8A17074CB16CC74CD9EA3E310945
3,470,646 UART: Caliptra RT
3,470,899 UART: [state] CFI Enabled
3,578,709 UART: [rt] RT listening for mailbox commands...
3,579,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,999 UART: [rt]cmd =0x44504543, len=96
3,642,638 >>> mbox cmd response data (56 bytes)
3,642,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,708 UART: [rt]cmd =0x44504543, len=96
3,705,276 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,891 ready_for_fw is high
1,362,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,662 >>> mbox cmd response: success
2,986,422 UART:
2,986,438 UART: Running Caliptra FMC ...
2,986,846 UART:
2,986,900 UART: [state] CFI Enabled
2,997,579 UART: [fht] FMC Alias Private Key: 7
3,106,886 UART: [art] Extend RT PCRs Done
3,107,314 UART: [art] Lock RT PCRs Done
3,109,234 UART: [art] Populate DV Done
3,117,521 UART: [fht] FMC Alias Private Key: 7
3,118,679 UART: [art] Derive CDI
3,118,959 UART: [art] Store in in slot 0x4
3,204,908 UART: [art] Derive Key Pair
3,205,268 UART: [art] Store priv key in slot 0x5
3,218,480 UART: [art] Derive Key Pair - Done
3,233,239 UART: [art] Signing Cert with AUTHO
3,233,719 UART: RITY.KEYID = 7
3,248,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,222 UART: [art] PUB.X = 915839AE6DB5538FD0E659312DC317335A3E38A061CEC7D03D3300D8D2BE1EE644E8AF6B8A9FC92531060AE95A105C66
3,255,970 UART: [art] PUB.Y = 474F0C5AF161996BE51B4C59F5A6560205A94522CB2E4D5A59F1A4AA9BAC366288C0F5DEBB847D78E2EB90AE8DC3B269
3,262,925 UART: [art] SIG.R = 385CCC0BD1D7D88D64B631DAF76064A92F77E01BF51A92E1978E50E88B7D3C82F880F0D36D756C2D27CE33D0E559ADC5
3,269,704 UART: [art] SIG.S = F021524DDEBD32F79E912A7FF6F4D244AEE4EE21003C79CED4613441CBF32503893D01CFB5DE8F2F71447DBF2642736A
3,293,231 UART: Caliptra RT
3,293,484 UART: [state] CFI Enabled
3,402,211 UART: [rt] RT listening for mailbox commands...
3,402,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,691 UART: [rt]cmd =0x44504543, len=96
3,466,194 >>> mbox cmd response data (56 bytes)
3,466,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,164 UART: [rt]cmd =0x44504543, len=96
3,528,760 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,998 UART: [kat] SHA2-256
881,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,044 UART: [kat] ++
886,196 UART: [kat] sha1
890,340 UART: [kat] SHA2-256
892,278 UART: [kat] SHA2-384
894,879 UART: [kat] SHA2-512-ACC
896,780 UART: [kat] ECC-384
902,269 UART: [kat] HMAC-384Kdf
906,949 UART: [kat] LMS
1,475,145 UART: [kat] --
1,476,096 UART: [cold-reset] ++
1,476,582 UART: [fht] Storing FHT @ 0x50003400
1,479,359 UART: [idev] ++
1,479,527 UART: [idev] CDI.KEYID = 6
1,479,887 UART: [idev] SUBJECT.KEYID = 7
1,480,311 UART: [idev] UDS.KEYID = 0
1,480,656 ready_for_fw is high
1,480,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,049 UART: [idev] Erasing UDS.KEYID = 0
1,504,883 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,405 UART: [idev] --
1,514,332 UART: [ldev] ++
1,514,500 UART: [ldev] CDI.KEYID = 6
1,514,863 UART: [ldev] SUBJECT.KEYID = 5
1,515,289 UART: [ldev] AUTHORITY.KEYID = 7
1,515,752 UART: [ldev] FE.KEYID = 1
1,520,586 UART: [ldev] Erasing FE.KEYID = 1
1,546,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,157 UART: [ldev] --
1,585,432 UART: [fwproc] Waiting for Commands...
1,586,157 UART: [fwproc] Received command 0x46574c44
1,586,948 UART: [fwproc] Received Image of size 114084 bytes
2,881,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,494 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,393 >>> mbox cmd response: success
3,075,547 UART: [afmc] ++
3,075,715 UART: [afmc] CDI.KEYID = 6
3,076,077 UART: [afmc] SUBJECT.KEYID = 7
3,076,502 UART: [afmc] AUTHORITY.KEYID = 5
3,112,191 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,236 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,926 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,763 UART: [afmc] --
3,155,825 UART: [cold-reset] --
3,156,615 UART: [state] Locking Datavault
3,157,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,394 UART: [state] Locking ICCM
3,158,980 UART: [exit] Launching FMC @ 0x40000130
3,164,309 UART:
3,164,325 UART: Running Caliptra FMC ...
3,164,733 UART:
3,164,876 UART: [state] CFI Enabled
3,175,481 UART: [fht] FMC Alias Private Key: 7
3,283,552 UART: [art] Extend RT PCRs Done
3,283,980 UART: [art] Lock RT PCRs Done
3,285,458 UART: [art] Populate DV Done
3,293,827 UART: [fht] FMC Alias Private Key: 7
3,294,785 UART: [art] Derive CDI
3,295,065 UART: [art] Store in in slot 0x4
3,380,492 UART: [art] Derive Key Pair
3,380,852 UART: [art] Store priv key in slot 0x5
3,394,212 UART: [art] Derive Key Pair - Done
3,409,115 UART: [art] Signing Cert with AUTHO
3,409,595 UART: RITY.KEYID = 7
3,425,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,034 UART: [art] PUB.X = 10B15F0603FB33ED24CCA5A09DBB8F1BBEBF09ADF22B6FCCBCA64394291C02A6291B114BF3069F9D9C7135914958873B
3,432,803 UART: [art] PUB.Y = 4ADE35C6F0929DEEA09B31E52B44C705AB11B0076EA12E493D16082536921FE153D21658970C3A99A1FDB444BE4DA7A5
3,439,747 UART: [art] SIG.R = D4963A04A151827D8A0DA6BBA1435291024EDC93CF98F1485BCA4492E1209FE67F7CCC52E434D36F5813183C82EF5565
3,446,510 UART: [art] SIG.S = FD504CD9A8B5FBC0BF3F2DEA3994A1D0A1B49C5A99485DF710A0EA4A84E43DE9233F99261F565A3ADAAC3BCAC2046BA4
3,471,114 UART: Caliptra RT
3,471,459 UART: [state] CFI Enabled
3,579,751 UART: [rt] RT listening for mailbox commands...
3,580,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,611 UART: [rt]cmd =0x44504543, len=96
3,643,200 >>> mbox cmd response data (56 bytes)
3,643,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,208 UART: [rt]cmd =0x44504543, len=96
3,706,080 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 ready_for_fw is high
1,362,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,283 >>> mbox cmd response: success
2,985,803 UART:
2,985,819 UART: Running Caliptra FMC ...
2,986,227 UART:
2,986,370 UART: [state] CFI Enabled
2,997,087 UART: [fht] FMC Alias Private Key: 7
3,104,888 UART: [art] Extend RT PCRs Done
3,105,316 UART: [art] Lock RT PCRs Done
3,106,834 UART: [art] Populate DV Done
3,115,103 UART: [fht] FMC Alias Private Key: 7
3,116,245 UART: [art] Derive CDI
3,116,525 UART: [art] Store in in slot 0x4
3,202,026 UART: [art] Derive Key Pair
3,202,386 UART: [art] Store priv key in slot 0x5
3,215,578 UART: [art] Derive Key Pair - Done
3,230,303 UART: [art] Signing Cert with AUTHO
3,230,783 UART: RITY.KEYID = 7
3,245,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,380 UART: [art] PUB.X = CB9AD580ADF8188BD5F646B22AF2E5509CD751FD6F4BF4EC2284FEE8FE78862AE6125AFA6E5736CB9F9EA2008C122442
3,253,146 UART: [art] PUB.Y = F8AEAF9A25D3F82D73DBE7C14EED7C52F7A13F81345C00B8A37E4D630D35B060E009F2FCDDF63DA9A24CB87FD93B9C81
3,260,092 UART: [art] SIG.R = 5AC51495191A66EA795F52AA6558F9479B4F1242F26EC9D0B5847FC072B4F21EF266CC9D6DC15D1CA028DE46F75C3081
3,266,868 UART: [art] SIG.S = 93D3FB54C62420919BA0CA5FC85E4A0A4FCB1A3DDBD643199CB3F158E0282916F464763ADC0221087B640C5C44E04CAC
3,290,945 UART: Caliptra RT
3,291,290 UART: [state] CFI Enabled
3,400,255 UART: [rt] RT listening for mailbox commands...
3,400,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,371 UART: [rt]cmd =0x44504543, len=96
3,463,124 >>> mbox cmd response data (56 bytes)
3,463,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,108 UART: [rt]cmd =0x44504543, len=96
3,526,160 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
902,105 UART: [kat] SHA2-256
904,045 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,446 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,309 UART: [cold-reset] ++
1,172,769 UART: [fht] FHT @ 0x50003400
1,175,442 UART: [idev] ++
1,175,610 UART: [idev] CDI.KEYID = 6
1,175,970 UART: [idev] SUBJECT.KEYID = 7
1,176,394 UART: [idev] UDS.KEYID = 0
1,176,739 ready_for_fw is high
1,176,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,308 UART: [idev] Erasing UDS.KEYID = 0
1,201,181 UART: [idev] Sha1 KeyId Algorithm
1,209,675 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,269 UART: [ldev] Erasing FE.KEYID = 1
1,243,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,831 UART: [ldev] --
1,283,308 UART: [fwproc] Wait for Commands...
1,283,888 UART: [fwproc] Recv command 0x46574c44
1,284,616 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,605 >>> mbox cmd response: success
2,771,861 UART: [afmc] ++
2,772,029 UART: [afmc] CDI.KEYID = 6
2,772,391 UART: [afmc] SUBJECT.KEYID = 7
2,772,816 UART: [afmc] AUTHORITY.KEYID = 5
2,808,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,730 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,343 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,886 UART: [afmc] --
2,851,946 UART: [cold-reset] --
2,852,860 UART: [state] Locking Datavault
2,854,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,735 UART: [state] Locking ICCM
2,855,195 UART: [exit] Launching FMC @ 0x40000130
2,860,524 UART:
2,860,540 UART: Running Caliptra FMC ...
2,860,948 UART:
2,861,002 UART: [state] CFI Enabled
2,871,529 UART: [fht] FMC Alias Private Key: 7
2,979,822 UART: [art] Extend RT PCRs Done
2,980,250 UART: [art] Lock RT PCRs Done
2,981,520 UART: [art] Populate DV Done
2,989,725 UART: [fht] FMC Alias Private Key: 7
2,990,803 UART: [art] Derive CDI
2,991,083 UART: [art] Store in in slot 0x4
3,076,390 UART: [art] Derive Key Pair
3,076,750 UART: [art] Store priv key in slot 0x5
3,089,610 UART: [art] Derive Key Pair - Done
3,104,342 UART: [art] Signing Cert with AUTHO
3,104,822 UART: RITY.KEYID = 7
3,120,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,883 UART: [art] PUB.X = 7699FB1A001DF03CD9D69EEB2C3A9D472AA69595F550666574DFEF9DCA8D3A2C816600311357DE92CABFA0AC9AB9CCA2
3,127,629 UART: [art] PUB.Y = 2BC4DE722A5AB5928A8F627FE5B63F060D5EE73F11D12399C098231EFE53A7B3673F774C306EC2CBDD51EB0B2F2B71DE
3,134,586 UART: [art] SIG.R = E79506295B9C17FEBAD206D41F0EA0237108645E4DAF314373A3092D29C9B64F2EA899852DACE671D4CA67A502138247
3,141,338 UART: [art] SIG.S = 06FA481F5F16306327DDC7883FA673B566F45C401952DB16F42AAD6411DC69A34D280ADF261FD5C918EC0AB66AB2DB76
3,164,658 UART: Caliptra RT
3,164,911 UART: [state] CFI Enabled
3,273,000 UART: [rt] RT listening for mailbox commands...
3,273,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,266 UART: [rt]cmd =0x44504543, len=96
3,336,769 >>> mbox cmd response data (56 bytes)
3,336,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,799 UART: [rt]cmd =0x44504543, len=96
3,400,279 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 ready_for_fw is high
1,060,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,782 >>> mbox cmd response: success
2,686,858 UART:
2,686,874 UART: Running Caliptra FMC ...
2,687,282 UART:
2,687,336 UART: [state] CFI Enabled
2,697,759 UART: [fht] FMC Alias Private Key: 7
2,805,064 UART: [art] Extend RT PCRs Done
2,805,492 UART: [art] Lock RT PCRs Done
2,807,318 UART: [art] Populate DV Done
2,815,733 UART: [fht] FMC Alias Private Key: 7
2,816,855 UART: [art] Derive CDI
2,817,135 UART: [art] Store in in slot 0x4
2,902,582 UART: [art] Derive Key Pair
2,902,942 UART: [art] Store priv key in slot 0x5
2,916,210 UART: [art] Derive Key Pair - Done
2,930,779 UART: [art] Signing Cert with AUTHO
2,931,259 UART: RITY.KEYID = 7
2,946,497 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,262 UART: [art] PUB.X = F6AE186F45A07A495C490A5C7ED170FA931ECCB6A8270BB38B7FF4C96CEDE0B906758F9EF8AE5251E9CFB7EAEFD4828D
2,954,049 UART: [art] PUB.Y = AD66F2C45E8714A107E4F0F63591A91A6493B8C8CE27BD0111C360D46866574E1B090DFC216BFD32228A0EBEC9BBD7A0
2,960,994 UART: [art] SIG.R = CD9A00CAF1BEFFC246A40EB292A872BC706658650D6C17C34285E0170A2D6525C5CE4EE95004173A0EB69C2654E44230
2,967,731 UART: [art] SIG.S = 1585D92D7676A0E576BD75D3EF5AB07157C3E8254E68840209DA09708C7A70C6B3A0709CB924DC467965D15C8EDACE3B
2,991,641 UART: Caliptra RT
2,991,894 UART: [state] CFI Enabled
3,098,951 UART: [rt] RT listening for mailbox commands...
3,099,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,033 UART: [rt]cmd =0x44504543, len=96
3,162,540 >>> mbox cmd response data (56 bytes)
3,162,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,534 UART: [rt]cmd =0x44504543, len=96
3,224,388 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,189 UART: [kat] SHA2-256
893,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,964 UART: [kat] ++
898,116 UART: [kat] sha1
902,334 UART: [kat] SHA2-256
904,274 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,567 UART: [kat] LMS
1,171,895 UART: [kat] --
1,173,030 UART: [cold-reset] ++
1,173,470 UART: [fht] FHT @ 0x50003400
1,176,093 UART: [idev] ++
1,176,261 UART: [idev] CDI.KEYID = 6
1,176,621 UART: [idev] SUBJECT.KEYID = 7
1,177,045 UART: [idev] UDS.KEYID = 0
1,177,390 ready_for_fw is high
1,177,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,245 UART: [idev] Erasing UDS.KEYID = 0
1,202,288 UART: [idev] Sha1 KeyId Algorithm
1,210,888 UART: [idev] --
1,211,966 UART: [ldev] ++
1,212,134 UART: [ldev] CDI.KEYID = 6
1,212,497 UART: [ldev] SUBJECT.KEYID = 5
1,212,923 UART: [ldev] AUTHORITY.KEYID = 7
1,213,386 UART: [ldev] FE.KEYID = 1
1,218,666 UART: [ldev] Erasing FE.KEYID = 1
1,245,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,564 UART: [ldev] --
1,284,911 UART: [fwproc] Wait for Commands...
1,285,595 UART: [fwproc] Recv command 0x46574c44
1,286,323 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,154 >>> mbox cmd response: success
2,774,178 UART: [afmc] ++
2,774,346 UART: [afmc] CDI.KEYID = 6
2,774,708 UART: [afmc] SUBJECT.KEYID = 7
2,775,133 UART: [afmc] AUTHORITY.KEYID = 5
2,810,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,897 UART: [afmc] --
2,853,787 UART: [cold-reset] --
2,854,647 UART: [state] Locking Datavault
2,855,778 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,382 UART: [state] Locking ICCM
2,856,996 UART: [exit] Launching FMC @ 0x40000130
2,862,325 UART:
2,862,341 UART: Running Caliptra FMC ...
2,862,749 UART:
2,862,892 UART: [state] CFI Enabled
2,873,677 UART: [fht] FMC Alias Private Key: 7
2,981,332 UART: [art] Extend RT PCRs Done
2,981,760 UART: [art] Lock RT PCRs Done
2,983,482 UART: [art] Populate DV Done
2,991,805 UART: [fht] FMC Alias Private Key: 7
2,992,793 UART: [art] Derive CDI
2,993,073 UART: [art] Store in in slot 0x4
3,079,068 UART: [art] Derive Key Pair
3,079,428 UART: [art] Store priv key in slot 0x5
3,092,856 UART: [art] Derive Key Pair - Done
3,107,711 UART: [art] Signing Cert with AUTHO
3,108,191 UART: RITY.KEYID = 7
3,123,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,358 UART: [art] PUB.X = BBFE7854C39529F567A808E96D45FA161E466BB781EF1FB1420742D31186D8FB664F976472C062B21101A520531F7673
3,131,111 UART: [art] PUB.Y = 294482DA74D435E34B9D4BE705ABA2DBED58D9FC70D66DED48D1B3A5FEED5E46DA5900FB184CF6EDB2E199F249A0939A
3,138,060 UART: [art] SIG.R = 85F3735E565A9A1C91406949C04F1B4925F8DC4A43AD43B9628AE5E9725AF0DA35FD752391D43BB4D7F63361D28418C9
3,144,830 UART: [art] SIG.S = FC5FE667ECCD8EBFD22718542D59264284F683A6D353F953924A14F31622DDD44E551F28B225712C0D19CDFD35767FAA
3,168,318 UART: Caliptra RT
3,168,663 UART: [state] CFI Enabled
3,277,221 UART: [rt] RT listening for mailbox commands...
3,277,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,309 UART: [rt]cmd =0x44504543, len=96
3,340,656 >>> mbox cmd response data (56 bytes)
3,340,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,716 UART: [rt]cmd =0x44504543, len=96
3,403,810 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 ready_for_fw is high
1,060,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,909 >>> mbox cmd response: success
2,684,357 UART:
2,684,373 UART: Running Caliptra FMC ...
2,684,781 UART:
2,684,924 UART: [state] CFI Enabled
2,695,893 UART: [fht] FMC Alias Private Key: 7
2,803,616 UART: [art] Extend RT PCRs Done
2,804,044 UART: [art] Lock RT PCRs Done
2,805,442 UART: [art] Populate DV Done
2,813,591 UART: [fht] FMC Alias Private Key: 7
2,814,605 UART: [art] Derive CDI
2,814,885 UART: [art] Store in in slot 0x4
2,900,344 UART: [art] Derive Key Pair
2,900,704 UART: [art] Store priv key in slot 0x5
2,913,670 UART: [art] Derive Key Pair - Done
2,928,654 UART: [art] Signing Cert with AUTHO
2,929,134 UART: RITY.KEYID = 7
2,945,114 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,879 UART: [art] PUB.X = 806671408E539DF67004C76101B6E1DFC23682109CEFC8EB8ADB214C7C78738E05B49A39EB6BA2116C1F7D7D980967B7
2,952,639 UART: [art] PUB.Y = 902976A771CE0C7E250EF23A2FFB7D07001BC792812F3D519ADC464746917AED49B6B4B49DCD38D7D1B0E532B8F49042
2,959,564 UART: [art] SIG.R = 18FE06929C775D27A00B332431ED6613DBC353BCF7801EDB4393883B3013506F4F4395CA7D5BE924D141082D39A0ECC1
2,966,325 UART: [art] SIG.S = AF33CC95E2522424C7DBC3246C8C706EDBA18AD5B84E8E6A2928A375BB3B2A0C0F07509B7648447904BD8A65C9748CA2
2,990,536 UART: Caliptra RT
2,990,881 UART: [state] CFI Enabled
3,098,620 UART: [rt] RT listening for mailbox commands...
3,099,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,588 UART: [rt]cmd =0x44504543, len=96
3,161,675 >>> mbox cmd response data (56 bytes)
3,161,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,595 UART: [rt]cmd =0x44504543, len=96
3,224,599 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
920,856 UART: [kat] LMS
1,169,168 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 ready_for_fw is high
1,174,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,199,057 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,656 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,822 UART: [ldev] --
1,281,242 UART: [fwproc] Wait for Commands...
1,281,839 UART: [fwproc] Recv command 0x46574c44
1,282,572 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,485 >>> mbox cmd response: success
2,769,598 UART: [afmc] ++
2,769,766 UART: [afmc] CDI.KEYID = 6
2,770,129 UART: [afmc] SUBJECT.KEYID = 7
2,770,555 UART: [afmc] AUTHORITY.KEYID = 5
2,806,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,569 UART: [afmc] --
2,849,511 UART: [cold-reset] --
2,850,163 UART: [state] Locking Datavault
2,851,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,842 UART: [state] Locking ICCM
2,852,410 UART: [exit] Launching FMC @ 0x40000130
2,857,739 UART:
2,857,755 UART: Running Caliptra FMC ...
2,858,163 UART:
2,858,217 UART: [state] CFI Enabled
2,868,432 UART: [fht] FMC Alias Private Key: 7
2,975,851 UART: [art] Extend RT PCRs Done
2,976,279 UART: [art] Lock RT PCRs Done
2,978,029 UART: [art] Populate DV Done
2,986,288 UART: [fht] FMC Alias Private Key: 7
2,987,378 UART: [art] Derive CDI
2,987,658 UART: [art] Store in in slot 0x4
3,073,187 UART: [art] Derive Key Pair
3,073,547 UART: [art] Store priv key in slot 0x5
3,087,317 UART: [art] Derive Key Pair - Done
3,102,046 UART: [art] Signing Cert with AUTHO
3,102,526 UART: RITY.KEYID = 7
3,117,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,763 UART: [art] PUB.X = 8129B763E42E6C6FF17F56079D0394CC8B4AECB419F7DEEB58C6749D4215F15F41B0AD939DB93C4E7F7FF57808B19A47
3,125,534 UART: [art] PUB.Y = EEA9533319E9331BC82631384B194298208587921B354D7C0F157C550D50302E8C303046954854D8401D72923B65100C
3,132,451 UART: [art] SIG.R = 158BC4852BF5833471360BDE738FF3A2C0BCB4596434D526092EBE48C3B24F70A3F0B301DDF85D1C252C35BA79B2EF91
3,139,220 UART: [art] SIG.S = 21A0F2086B9FC8C71F4CE34A6DE2933DD4ABEC2D6FF5ACBBC417CB95FB2DA5E38BEB014BD90863F0F308C31A1B216E66
3,163,545 UART: Caliptra RT
3,163,798 UART: [state] CFI Enabled
3,271,871 UART: [rt] RT listening for mailbox commands...
3,272,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,927 UART: [rt]cmd =0x44504543, len=96
3,335,584 >>> mbox cmd response data (56 bytes)
3,335,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,684 UART: [rt]cmd =0x44504543, len=96
3,398,064 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,324 ready_for_fw is high
1,055,324 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,667 >>> mbox cmd response: success
2,679,729 UART:
2,679,745 UART: Running Caliptra FMC ...
2,680,153 UART:
2,680,207 UART: [state] CFI Enabled
2,690,758 UART: [fht] FMC Alias Private Key: 7
2,798,207 UART: [art] Extend RT PCRs Done
2,798,635 UART: [art] Lock RT PCRs Done
2,800,533 UART: [art] Populate DV Done
2,808,684 UART: [fht] FMC Alias Private Key: 7
2,809,836 UART: [art] Derive CDI
2,810,116 UART: [art] Store in in slot 0x4
2,896,015 UART: [art] Derive Key Pair
2,896,375 UART: [art] Store priv key in slot 0x5
2,910,017 UART: [art] Derive Key Pair - Done
2,924,567 UART: [art] Signing Cert with AUTHO
2,925,047 UART: RITY.KEYID = 7
2,940,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,214 UART: [art] PUB.X = 810E65DEFB4BF92D273B2FA7EACF22C9782BC7DCCDA124942E1AE0C009AF4F5D2708845B4D960919A97C02D5BADA0DF0
2,947,988 UART: [art] PUB.Y = CC65273FEDAE40905C1FD17811EBEB07364A9EC7D2AEAEFBC9A22DCFB0A6112CACC0EBFB075FC91914FABFF17E05E483
2,954,963 UART: [art] SIG.R = 2F918DBBE3F1B55B5D897A11262FFC97E2DE724233C616A56DD698A6F4EC372C7C748DEBCAFE8FF9386E42E1521C4814
2,961,747 UART: [art] SIG.S = 42BF859F7A6BED95CC1DDCAD933610CC548A830CD63D2060B4410DE2D7B6850160D9519411E1C155BFB73338B3775D1A
2,985,329 UART: Caliptra RT
2,985,582 UART: [state] CFI Enabled
3,092,447 UART: [rt] RT listening for mailbox commands...
3,093,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,605 UART: [rt]cmd =0x44504543, len=96
3,156,186 >>> mbox cmd response data (56 bytes)
3,156,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,150 UART: [rt]cmd =0x44504543, len=96
3,218,560 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,174,106 ready_for_fw is high
1,174,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,302 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,073 UART: [ldev] --
1,282,339 UART: [fwproc] Wait for Commands...
1,283,040 UART: [fwproc] Recv command 0x46574c44
1,283,773 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,882 >>> mbox cmd response: success
2,771,103 UART: [afmc] ++
2,771,271 UART: [afmc] CDI.KEYID = 6
2,771,634 UART: [afmc] SUBJECT.KEYID = 7
2,772,060 UART: [afmc] AUTHORITY.KEYID = 5
2,807,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,270 UART: [afmc] --
2,851,230 UART: [cold-reset] --
2,851,970 UART: [state] Locking Datavault
2,853,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,953 UART: [state] Locking ICCM
2,854,621 UART: [exit] Launching FMC @ 0x40000130
2,859,950 UART:
2,859,966 UART: Running Caliptra FMC ...
2,860,374 UART:
2,860,517 UART: [state] CFI Enabled
2,870,870 UART: [fht] FMC Alias Private Key: 7
2,978,163 UART: [art] Extend RT PCRs Done
2,978,591 UART: [art] Lock RT PCRs Done
2,980,021 UART: [art] Populate DV Done
2,988,338 UART: [fht] FMC Alias Private Key: 7
2,989,502 UART: [art] Derive CDI
2,989,782 UART: [art] Store in in slot 0x4
3,075,477 UART: [art] Derive Key Pair
3,075,837 UART: [art] Store priv key in slot 0x5
3,088,973 UART: [art] Derive Key Pair - Done
3,103,358 UART: [art] Signing Cert with AUTHO
3,103,838 UART: RITY.KEYID = 7
3,119,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,835 UART: [art] PUB.X = E71C2954567FE9E4A34380980971D10C712880118CA2FA7F642FC7345FF6B15AABEF2D80064534F25F21BBC21DFE8AA3
3,126,602 UART: [art] PUB.Y = 8E76201F6B6DE01BE05A0A10C813A015D10DE3F45650BCF22724BABF5DF9E3F34DF669CB94D12DD4E1EE0C5C60E1B061
3,133,561 UART: [art] SIG.R = 933D2382330589AE0B108463C2D9B3787282C3833E605B25CA960C008418F6D9BFC737316A9B2F8E72FF5F75EDBDF4F7
3,140,300 UART: [art] SIG.S = 136B458E3BAD6FF247DA78D43AF0D0C0E324F469E08DDA112694F010490565CB2576EB27C64AD4D710CA0D8E10DCEF8D
3,164,021 UART: Caliptra RT
3,164,366 UART: [state] CFI Enabled
3,272,679 UART: [rt] RT listening for mailbox commands...
3,273,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,881 UART: [rt]cmd =0x44504543, len=96
3,336,360 >>> mbox cmd response data (56 bytes)
3,336,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,362 UART: [rt]cmd =0x44504543, len=96
3,398,296 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,992 >>> mbox cmd response: success
2,678,688 UART:
2,678,704 UART: Running Caliptra FMC ...
2,679,112 UART:
2,679,255 UART: [state] CFI Enabled
2,689,848 UART: [fht] FMC Alias Private Key: 7
2,798,281 UART: [art] Extend RT PCRs Done
2,798,709 UART: [art] Lock RT PCRs Done
2,800,177 UART: [art] Populate DV Done
2,808,498 UART: [fht] FMC Alias Private Key: 7
2,809,608 UART: [art] Derive CDI
2,809,888 UART: [art] Store in in slot 0x4
2,895,691 UART: [art] Derive Key Pair
2,896,051 UART: [art] Store priv key in slot 0x5
2,909,327 UART: [art] Derive Key Pair - Done
2,923,964 UART: [art] Signing Cert with AUTHO
2,924,444 UART: RITY.KEYID = 7
2,939,766 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,531 UART: [art] PUB.X = 950D2B2C8DFEA721219F33788C76638CD246A26CD1E615572504B6D63D13FF460F31FA6C1AFC47F9B39A46EA586F6CE7
2,947,300 UART: [art] PUB.Y = E8786D4FE68FE4C091CFEDD17F380A92EFD8E2D8A6EFD18AADE2C077F90084CAE9AD69E84248A73DA860CCA98DFACD21
2,954,255 UART: [art] SIG.R = 8E75982DFF26569E4DCB5F832BE0B34FECE55CC99F634747A1C28A2EBD716F76F1E561242750812C21536650E8924085
2,961,023 UART: [art] SIG.S = 27F86B4C14E8A1DBFA39872C5FA079E4299E30905987C1AF034CB8B9102EB6CAF24447072F011D3C94960074519A8BE3
2,985,227 UART: Caliptra RT
2,985,572 UART: [state] CFI Enabled
3,093,281 UART: [rt] RT listening for mailbox commands...
3,093,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,269 UART: [rt]cmd =0x44504543, len=96
3,156,452 >>> mbox cmd response data (56 bytes)
3,156,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,476 UART: [rt]cmd =0x44504543, len=96
3,219,336 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,016 UART:
192,389 UART: Running Caliptra ROM ...
193,521 UART:
193,673 UART: [state] CFI Enabled
267,834 UART: [state] LifecycleState = Unprovisioned
269,758 UART: [state] DebugLocked = No
271,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,076 UART: [kat] SHA2-256
446,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,287 UART: [kat] ++
457,887 UART: [kat] sha1
468,982 UART: [kat] SHA2-256
471,697 UART: [kat] SHA2-384
476,049 UART: [kat] SHA2-512-ACC
478,426 UART: [kat] ECC-384
2,770,244 UART: [kat] HMAC-384Kdf
2,800,848 UART: [kat] LMS
3,991,138 UART: [kat] --
3,995,220 UART: [cold-reset] ++
3,996,795 UART: [fht] Storing FHT @ 0x50003400
4,007,506 UART: [idev] ++
4,008,147 UART: [idev] CDI.KEYID = 6
4,009,040 UART: [idev] SUBJECT.KEYID = 7
4,010,290 UART: [idev] UDS.KEYID = 0
4,011,367 ready_for_fw is high
4,011,600 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,668 UART: [idev] Erasing UDS.KEYID = 0
7,347,462 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,350 UART: [idev] --
7,374,021 UART: [ldev] ++
7,374,594 UART: [ldev] CDI.KEYID = 6
7,375,562 UART: [ldev] SUBJECT.KEYID = 5
7,376,722 UART: [ldev] AUTHORITY.KEYID = 7
7,378,003 UART: [ldev] FE.KEYID = 1
7,423,069 UART: [ldev] Erasing FE.KEYID = 1
10,756,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,376 UART: [ldev] --
13,136,873 UART: [fwproc] Waiting for Commands...
13,139,886 UART: [fwproc] Received command 0x46574c44
13,142,071 UART: [fwproc] Received Image of size 113760 bytes
17,193,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,660,776 >>> mbox cmd response: success
17,664,163 UART: [afmc] ++
17,664,760 UART: [afmc] CDI.KEYID = 6
17,665,647 UART: [afmc] SUBJECT.KEYID = 7
17,666,919 UART: [afmc] AUTHORITY.KEYID = 5
21,024,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,038 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,414 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,256 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,720 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,974 UART: [afmc] --
23,395,821 UART: [cold-reset] --
23,400,934 UART: [state] Locking Datavault
23,406,721 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,477 UART: [state] Locking ICCM
23,411,168 UART: [exit] Launching FMC @ 0x40000130
23,419,503 UART:
23,419,745 UART: Running Caliptra FMC ...
23,420,843 UART:
23,421,001 UART: [state] CFI Enabled
23,485,617 UART: [fht] FMC Alias Private Key: 7
25,824,193 UART: [art] Extend RT PCRs Done
25,825,417 UART: [art] Lock RT PCRs Done
25,827,239 UART: [art] Populate DV Done
25,832,699 UART: [fht] FMC Alias Private Key: 7
25,834,306 UART: [art] Derive CDI
25,835,043 UART: [art] Store in in slot 0x4
25,893,705 UART: [art] Derive Key Pair
25,894,741 UART: [art] Store priv key in slot 0x5
29,187,515 UART: [art] Derive Key Pair - Done
29,200,455 UART: [art] Signing Cert with AUTHO
29,201,759 UART: RITY.KEYID = 7
31,488,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,751 UART: [art] PUB.X = FAAF657B4A6E9A1E5C7BCD566A0AD5C611DDF604DFE9BE5F24B48F547D59D850E128C267D062B55812CF803B64142362
31,497,003 UART: [art] PUB.Y = 2CFF0779D5A1CDD06C7A905072A2368929923FE419B684A0BF8C69CD254034255AC36CD7B2822778B1EE361D6DF59551
31,504,235 UART: [art] SIG.R = 86A4F862731C1FD46AB46FE1C7FC99F0F9D81177771B13D7D2EA5B5F0184A3EB7655BA3E4D52EC738E7413DAB4D33AD8
31,511,616 UART: [art] SIG.S = CB44A7C843E5B0B43712BA4ED9964AF37FC08EC1119A143842B5D6E3046C4C07BB1DA8B52089DBAC1B9BE5D3692FAC75
32,816,751 UART: Caliptra RT
32,817,450 UART: [state] CFI Enabled
32,978,717 UART: [rt] RT listening for mailbox commands...
32,980,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,011,041 UART: [rt]cmd =0x44504543, len=24
33,052,132 >>> mbox cmd response data (40 bytes)
33,053,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,083,988 UART: [rt]cmd =0x44504543, len=96
33,090,562 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,805,561 ready_for_fw is high
3,806,176 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,871,140 >>> mbox cmd response: success
23,561,263 UART:
23,561,663 UART: Running Caliptra FMC ...
23,562,863 UART:
23,563,038 UART: [state] CFI Enabled
23,631,912 UART: [fht] FMC Alias Private Key: 7
25,969,508 UART: [art] Extend RT PCRs Done
25,970,729 UART: [art] Lock RT PCRs Done
25,972,580 UART: [art] Populate DV Done
25,978,109 UART: [fht] FMC Alias Private Key: 7
25,979,605 UART: [art] Derive CDI
25,980,391 UART: [art] Store in in slot 0x4
26,040,196 UART: [art] Derive Key Pair
26,041,241 UART: [art] Store priv key in slot 0x5
29,333,898 UART: [art] Derive Key Pair - Done
29,347,122 UART: [art] Signing Cert with AUTHO
29,348,421 UART: RITY.KEYID = 7
31,636,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,678 UART: [art] PUB.X = 8D2EF74052D5D12C61F7C584226CD5BC9D0001AEE641A9BA5D3BC232B95C29AC8C8071A2A72FB48750D706EF4CAB8EC5
31,644,885 UART: [art] PUB.Y = E0B9A4EBC6D771A57ED2D95981E04D640C4AE74EFF70A071816BC193CD41594606D69F156835279D8D314891F2F4E350
31,652,132 UART: [art] SIG.R = 0A10DB4A87980B9D2A209601A093EB5175F68C9C6A24D7DC923D488F3B2CA42899246EAA7BB074F19A35C9ECF85014D3
31,659,543 UART: [art] SIG.S = FD1229906200E2236A780AFBFD2055797F8F8A2F2AA02974AC8EE797C442AE082E4FB044E752D0DED1E3423CA32B5CD5
32,964,577 UART: Caliptra RT
32,965,278 UART: [state] CFI Enabled
33,126,287 UART: [rt] RT listening for mailbox commands...
33,128,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,158,588 UART: [rt]cmd =0x44504543, len=24
33,201,009 >>> mbox cmd response data (40 bytes)
33,202,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,232,812 UART: [rt]cmd =0x44504543, len=96
33,239,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,689 writing to cptra_bootfsm_go
192,947 UART:
193,307 UART: Running Caliptra ROM ...
194,485 UART:
604,062 UART: [state] CFI Enabled
620,369 UART: [state] LifecycleState = Unprovisioned
622,314 UART: [state] DebugLocked = No
624,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,734 UART: [kat] SHA2-256
799,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,034 UART: [kat] ++
810,482 UART: [kat] sha1
823,121 UART: [kat] SHA2-256
825,849 UART: [kat] SHA2-384
831,838 UART: [kat] SHA2-512-ACC
834,199 UART: [kat] ECC-384
3,116,735 UART: [kat] HMAC-384Kdf
3,127,413 UART: [kat] LMS
4,317,480 UART: [kat] --
4,321,143 UART: [cold-reset] ++
4,322,362 UART: [fht] Storing FHT @ 0x50003400
4,333,908 UART: [idev] ++
4,334,479 UART: [idev] CDI.KEYID = 6
4,335,390 UART: [idev] SUBJECT.KEYID = 7
4,336,628 UART: [idev] UDS.KEYID = 0
4,337,657 ready_for_fw is high
4,337,855 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,729 UART: [idev] Erasing UDS.KEYID = 0
7,622,262 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,647 UART: [idev] --
7,649,722 UART: [ldev] ++
7,650,339 UART: [ldev] CDI.KEYID = 6
7,651,277 UART: [ldev] SUBJECT.KEYID = 5
7,652,478 UART: [ldev] AUTHORITY.KEYID = 7
7,653,755 UART: [ldev] FE.KEYID = 1
7,665,830 UART: [ldev] Erasing FE.KEYID = 1
10,953,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,675 UART: [ldev] --
13,314,450 UART: [fwproc] Waiting for Commands...
13,316,102 UART: [fwproc] Received command 0x46574c44
13,318,332 UART: [fwproc] Received Image of size 113760 bytes
17,369,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,386 >>> mbox cmd response: success
17,835,192 UART: [afmc] ++
17,835,795 UART: [afmc] CDI.KEYID = 6
17,836,709 UART: [afmc] SUBJECT.KEYID = 7
17,837,927 UART: [afmc] AUTHORITY.KEYID = 5
21,154,732 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,256 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,600 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,447 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,875 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,874 UART: [afmc] --
23,520,995 UART: [cold-reset] --
23,525,748 UART: [state] Locking Datavault
23,531,217 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,912 UART: [state] Locking ICCM
23,534,565 UART: [exit] Launching FMC @ 0x40000130
23,542,961 UART:
23,543,202 UART: Running Caliptra FMC ...
23,544,308 UART:
23,544,467 UART: [state] CFI Enabled
23,552,916 UART: [fht] FMC Alias Private Key: 7
25,884,084 UART: [art] Extend RT PCRs Done
25,885,307 UART: [art] Lock RT PCRs Done
25,887,141 UART: [art] Populate DV Done
25,892,658 UART: [fht] FMC Alias Private Key: 7
25,894,139 UART: [art] Derive CDI
25,894,898 UART: [art] Store in in slot 0x4
25,937,548 UART: [art] Derive Key Pair
25,938,607 UART: [art] Store priv key in slot 0x5
29,180,680 UART: [art] Derive Key Pair - Done
29,193,341 UART: [art] Signing Cert with AUTHO
29,194,667 UART: RITY.KEYID = 7
31,474,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,093 UART: [art] PUB.X = A4A1ED8F8C7997B1CC5F30FDD931264A8AFC52EC023E8D47E4344422774E925905DD54C46BF0B2A4808966D79ABDECF7
31,483,312 UART: [art] PUB.Y = BFD62F237F4141B2AD02BB2173C1CC059E4F78751A56CB7DFAC01A219A2DA54AE0B8569DB2E2BC766E93B911F6697BE9
31,490,576 UART: [art] SIG.R = 86AB1984ACAB533EDE455C191282B4373934339CF2D5FD91AA78E793FDE064D87CF12595F73C6770BB51F007F5F9FBEE
31,497,934 UART: [art] SIG.S = 204E0DCA5836AE867B2BE4AEDDD9761419C4C0AEA7E8190C4C2FC406C889D005ED871CFB094190CD160821D2E449C25D
32,802,911 UART: Caliptra RT
32,803,608 UART: [state] CFI Enabled
32,920,664 UART: [rt] RT listening for mailbox commands...
32,922,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,952,645 UART: [rt]cmd =0x44504543, len=24
32,979,620 >>> mbox cmd response data (40 bytes)
32,980,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,011,647 UART: [rt]cmd =0x44504543, len=96
33,018,496 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
4,131,997 ready_for_fw is high
4,132,440 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,298 >>> mbox cmd response: success
23,694,190 UART:
23,694,577 UART: Running Caliptra FMC ...
23,695,675 UART:
23,695,831 UART: [state] CFI Enabled
23,704,002 UART: [fht] FMC Alias Private Key: 7
26,034,670 UART: [art] Extend RT PCRs Done
26,035,897 UART: [art] Lock RT PCRs Done
26,037,954 UART: [art] Populate DV Done
26,043,374 UART: [fht] FMC Alias Private Key: 7
26,044,978 UART: [art] Derive CDI
26,045,793 UART: [art] Store in in slot 0x4
26,087,958 UART: [art] Derive Key Pair
26,088,958 UART: [art] Store priv key in slot 0x5
29,331,614 UART: [art] Derive Key Pair - Done
29,344,503 UART: [art] Signing Cert with AUTHO
29,345,829 UART: RITY.KEYID = 7
31,624,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,448 UART: [art] PUB.X = 39A5380F20A30D2F226E6EEB6AFF86D7002FA16D64074727CE1894EDAD2EE2DD9AFEF444237BC44E69155A57F890278B
31,633,714 UART: [art] PUB.Y = 98F64451F722724D345E1A13DF421477FA05B0DFD22BBB00224537F36020F8E4907C22C0908F6A044E16F59D6E784866
31,640,941 UART: [art] SIG.R = 1BCD71433EC2B8081FA1C3A9E1FD1450E8658D5A5AE923AAA1C8AD289EA265E0348E4E2710D5052565DABE25E8FC9A36
31,648,301 UART: [art] SIG.S = 30669E3D822E350FE738A1406A6E7953CECEBBC585CCA2EB7F7DFD61558EBAFEAB31582082200D8D7661B1AC3121D52D
32,953,762 UART: Caliptra RT
32,954,467 UART: [state] CFI Enabled
33,071,924 UART: [rt] RT listening for mailbox commands...
33,073,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,104,019 UART: [rt]cmd =0x44504543, len=24
33,130,809 >>> mbox cmd response data (40 bytes)
33,132,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,026 UART: [rt]cmd =0x44504543, len=96
33,169,515 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,516 UART:
192,905 UART: Running Caliptra ROM ...
194,049 UART:
194,202 UART: [state] CFI Enabled
266,484 UART: [state] LifecycleState = Unprovisioned
268,422 UART: [state] DebugLocked = No
270,756 UART: [state] WD Timer not started. Device not locked for debugging
274,864 UART: [kat] SHA2-256
453,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,517 UART: [kat] ++
466,049 UART: [kat] sha1
478,136 UART: [kat] SHA2-256
481,211 UART: [kat] SHA2-384
487,140 UART: [kat] SHA2-512-ACC
490,125 UART: [kat] ECC-384
2,950,003 UART: [kat] HMAC-384Kdf
2,973,046 UART: [kat] LMS
3,502,496 UART: [kat] --
3,508,125 UART: [cold-reset] ++
3,510,194 UART: [fht] FHT @ 0x50003400
3,520,954 UART: [idev] ++
3,521,519 UART: [idev] CDI.KEYID = 6
3,522,422 UART: [idev] SUBJECT.KEYID = 7
3,523,591 UART: [idev] UDS.KEYID = 0
3,524,512 ready_for_fw is high
3,524,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,184 UART: [idev] Erasing UDS.KEYID = 0
6,029,067 UART: [idev] Sha1 KeyId Algorithm
6,052,230 UART: [idev] --
6,055,115 UART: [ldev] ++
6,055,689 UART: [ldev] CDI.KEYID = 6
6,056,597 UART: [ldev] SUBJECT.KEYID = 5
6,057,772 UART: [ldev] AUTHORITY.KEYID = 7
6,059,023 UART: [ldev] FE.KEYID = 1
6,104,161 UART: [ldev] Erasing FE.KEYID = 1
8,611,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,877 UART: [ldev] --
10,417,247 UART: [fwproc] Wait for Commands...
10,420,133 UART: [fwproc] Recv command 0x46574c44
10,422,238 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,285,160 >>> mbox cmd response: success
14,288,817 UART: [afmc] ++
14,289,404 UART: [afmc] CDI.KEYID = 6
14,290,313 UART: [afmc] SUBJECT.KEYID = 7
14,291,467 UART: [afmc] AUTHORITY.KEYID = 5
16,828,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,559,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,561,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,577,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,593,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,609,459 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,633,156 UART: [afmc] --
18,637,172 UART: [cold-reset] --
18,640,863 UART: [state] Locking Datavault
18,646,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,648,630 UART: [state] Locking ICCM
18,650,332 UART: [exit] Launching FMC @ 0x40000130
18,658,737 UART:
18,659,014 UART: Running Caliptra FMC ...
18,660,125 UART:
18,660,293 UART: [state] CFI Enabled
18,716,973 UART: [fht] FMC Alias Private Key: 7
20,480,444 UART: [art] Extend RT PCRs Done
20,481,658 UART: [art] Lock RT PCRs Done
20,482,959 UART: [art] Populate DV Done
20,488,366 UART: [fht] FMC Alias Private Key: 7
20,489,896 UART: [art] Derive CDI
20,490,654 UART: [art] Store in in slot 0x4
20,549,637 UART: [art] Derive Key Pair
20,550,682 UART: [art] Store priv key in slot 0x5
23,013,446 UART: [art] Derive Key Pair - Done
23,026,229 UART: [art] Signing Cert with AUTHO
23,027,534 UART: RITY.KEYID = 7
24,740,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,517 UART: [art] PUB.X = EA94BB61DC258EA0ACF05E13F854847BB53283BAF9E5B1AFBEB36323209129A1F23AE883A113E0F850F78C566FE49FF3
24,748,750 UART: [art] PUB.Y = FC738D643906266D4AE11C885FC187ABD953228F448AA409673E7DB00DE7FBB68C9B624262C0FFBAA2F3B35107945DD6
24,756,017 UART: [art] SIG.R = 0680CC22B0004A613F37C5A99CBB2A9DFB0E412A6CC21706E0BFFA987F37BD986EA0CC1147A533B365D206D20AAC9BEB
24,763,402 UART: [art] SIG.S = 8CC07E3B069F5722BF1BA51AB99F07189E3C16CB975273C15B73096EC13A4A2ED50B718657B57A58214E985574DA4BB6
25,741,522 UART: Caliptra RT
25,742,237 UART: [state] CFI Enabled
25,908,134 UART: [rt] RT listening for mailbox commands...
25,910,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,940,475 UART: [rt]cmd =0x44504543, len=24
25,982,422 >>> mbox cmd response data (40 bytes)
25,983,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,190 UART: [rt]cmd =0x44504543, len=96
26,020,764 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,383,469 ready_for_fw is high
3,384,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,097,117 >>> mbox cmd response: success
18,387,137 UART:
18,387,546 UART: Running Caliptra FMC ...
18,388,687 UART:
18,388,845 UART: [state] CFI Enabled
18,453,330 UART: [fht] FMC Alias Private Key: 7
20,216,602 UART: [art] Extend RT PCRs Done
20,217,819 UART: [art] Lock RT PCRs Done
20,219,674 UART: [art] Populate DV Done
20,225,199 UART: [fht] FMC Alias Private Key: 7
20,226,843 UART: [art] Derive CDI
20,227,655 UART: [art] Store in in slot 0x4
20,286,046 UART: [art] Derive Key Pair
20,287,090 UART: [art] Store priv key in slot 0x5
22,750,037 UART: [art] Derive Key Pair - Done
22,763,039 UART: [art] Signing Cert with AUTHO
22,764,348 UART: RITY.KEYID = 7
24,475,944 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,436 UART: [art] PUB.X = 228FDBE5BEC048043E2163F7E9ECD76420BAE461CBEED48D45BD8F5FEFD0953FEC3DC27C0D986C873C8FEEF5D0E565DB
24,484,751 UART: [art] PUB.Y = F8A08EC92525762DC0F6282F07996BBF768A90A8DEC62E44430C4DC80BD03D588B7444D2BCC70E1727AD4B69504F9526
24,492,036 UART: [art] SIG.R = EAF084A9580F255571252AA66EAE31560683FDB25D4D321D0C9B16B878CDA0BE201BDDCA42C4D8C3CEC051F052EC92DE
24,499,427 UART: [art] SIG.S = 47382FD296EF65D09624C15987EE49D5CFFA240E4C9AEF491FB4737B8520C249A49DE6770D2CCAD2387C5618A8054CE1
25,478,396 UART: Caliptra RT
25,479,104 UART: [state] CFI Enabled
25,644,088 UART: [rt] RT listening for mailbox commands...
25,646,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,676,417 UART: [rt]cmd =0x44504543, len=24
25,718,554 >>> mbox cmd response data (40 bytes)
25,719,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,750,406 UART: [rt]cmd =0x44504543, len=96
25,756,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
192,975 UART:
193,350 UART: Running Caliptra ROM ...
194,549 UART:
604,205 UART: [state] CFI Enabled
618,938 UART: [state] LifecycleState = Unprovisioned
620,813 UART: [state] DebugLocked = No
623,005 UART: [state] WD Timer not started. Device not locked for debugging
625,822 UART: [kat] SHA2-256
804,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,485 UART: [kat] ++
816,932 UART: [kat] sha1
827,019 UART: [kat] SHA2-256
830,032 UART: [kat] SHA2-384
835,528 UART: [kat] SHA2-512-ACC
838,533 UART: [kat] ECC-384
3,282,749 UART: [kat] HMAC-384Kdf
3,294,992 UART: [kat] LMS
3,824,488 UART: [kat] --
3,828,728 UART: [cold-reset] ++
3,829,886 UART: [fht] FHT @ 0x50003400
3,841,217 UART: [idev] ++
3,841,786 UART: [idev] CDI.KEYID = 6
3,842,768 UART: [idev] SUBJECT.KEYID = 7
3,843,965 UART: [idev] UDS.KEYID = 0
3,844,898 ready_for_fw is high
3,845,097 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,396 UART: [idev] Erasing UDS.KEYID = 0
6,318,619 UART: [idev] Sha1 KeyId Algorithm
6,341,552 UART: [idev] --
6,346,256 UART: [ldev] ++
6,346,826 UART: [ldev] CDI.KEYID = 6
6,347,710 UART: [ldev] SUBJECT.KEYID = 5
6,348,929 UART: [ldev] AUTHORITY.KEYID = 7
6,350,162 UART: [ldev] FE.KEYID = 1
6,362,725 UART: [ldev] Erasing FE.KEYID = 1
8,842,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,850 UART: [ldev] --
10,630,779 UART: [fwproc] Wait for Commands...
10,632,288 UART: [fwproc] Recv command 0x46574c44
10,634,381 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,492,815 >>> mbox cmd response: success
14,497,619 UART: [afmc] ++
14,498,234 UART: [afmc] CDI.KEYID = 6
14,499,148 UART: [afmc] SUBJECT.KEYID = 7
14,500,316 UART: [afmc] AUTHORITY.KEYID = 5
17,001,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,338 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,507 UART: [afmc] --
18,798,602 UART: [cold-reset] --
18,802,098 UART: [state] Locking Datavault
18,806,167 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,816 UART: [state] Locking ICCM
18,809,159 UART: [exit] Launching FMC @ 0x40000130
18,817,613 UART:
18,817,858 UART: Running Caliptra FMC ...
18,818,962 UART:
18,819,116 UART: [state] CFI Enabled
18,827,057 UART: [fht] FMC Alias Private Key: 7
20,582,953 UART: [art] Extend RT PCRs Done
20,584,175 UART: [art] Lock RT PCRs Done
20,585,444 UART: [art] Populate DV Done
20,590,915 UART: [fht] FMC Alias Private Key: 7
20,592,403 UART: [art] Derive CDI
20,593,164 UART: [art] Store in in slot 0x4
20,636,029 UART: [art] Derive Key Pair
20,637,073 UART: [art] Store priv key in slot 0x5
23,063,428 UART: [art] Derive Key Pair - Done
23,076,106 UART: [art] Signing Cert with AUTHO
23,077,419 UART: RITY.KEYID = 7
24,782,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,620 UART: [art] PUB.X = F8A3A93B25300D76A3441D4789FFAD9F5D7C031BFC6AC379B40787F043D6A6955218E571588BD9C24E00CA288674F8F9
24,791,679 UART: [art] PUB.Y = ADF7C81357E807BD866FACCA018BCF2F96D8AAEB8A299065C1D0BC5E9B83DC3C4B215075FD32CBE20892FDA83CED7A12
24,799,003 UART: [art] SIG.R = BA1BAFB858FF244ED73B7FDF4F25E711C84E8DC1D15BE6FF06A436DBE600FCB89D149605956960CA8171C7811362D9DD
24,806,377 UART: [art] SIG.S = 7F96216DCF3B37BAFD971AB5B9C554B0A2E75D50CDF3F685FA333F567614912218ED62046BD13E91F4D13F29833BCACA
25,785,034 UART: Caliptra RT
25,785,738 UART: [state] CFI Enabled
25,902,924 UART: [rt] RT listening for mailbox commands...
25,904,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,934,942 UART: [rt]cmd =0x44504543, len=24
25,961,563 >>> mbox cmd response data (40 bytes)
25,962,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,993,508 UART: [rt]cmd =0x44504543, len=96
25,999,959 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,013 writing to cptra_bootfsm_go
3,695,369 ready_for_fw is high
3,695,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,276,019 >>> mbox cmd response: success
18,523,824 UART:
18,524,213 UART: Running Caliptra FMC ...
18,525,352 UART:
18,525,517 UART: [state] CFI Enabled
18,533,354 UART: [fht] FMC Alias Private Key: 7
20,289,859 UART: [art] Extend RT PCRs Done
20,291,088 UART: [art] Lock RT PCRs Done
20,292,885 UART: [art] Populate DV Done
20,298,525 UART: [fht] FMC Alias Private Key: 7
20,300,177 UART: [art] Derive CDI
20,300,916 UART: [art] Store in in slot 0x4
20,343,836 UART: [art] Derive Key Pair
20,344,864 UART: [art] Store priv key in slot 0x5
22,771,953 UART: [art] Derive Key Pair - Done
22,785,170 UART: [art] Signing Cert with AUTHO
22,786,485 UART: RITY.KEYID = 7
24,492,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,648 UART: [art] PUB.X = 900E513B3AC7F39488753024A3D4B1D4DCA58E5058710FF39EE4139E8D657CEFBD1E34CA857939DD1A4A05B3EF25CDB4
24,500,923 UART: [art] PUB.Y = 2DEF2569EDE580B31E028962E3FD45CF1816BF83FAB2F6F9740142E9E763B58BE3D99783FF818979F11F9E77956DF6D6
24,508,205 UART: [art] SIG.R = A64383E63107D7864168CB5C97D16A7226AD2BBA59AA9498D69DDBEA3AE8E653B5DB48DA613DB32C3788578AA77BBD04
24,515,614 UART: [art] SIG.S = 5D7439911B5FDCCBF9FA32E0B933D352DB8225D8E4F52038C7799AB31467EC62E95DFF75312899B49CDA3B2C3C0D6D8A
25,494,830 UART: Caliptra RT
25,495,550 UART: [state] CFI Enabled
25,612,674 UART: [rt] RT listening for mailbox commands...
25,614,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,644,491 UART: [rt]cmd =0x44504543, len=24
25,670,821 >>> mbox cmd response data (40 bytes)
25,672,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,702,611 UART: [rt]cmd =0x44504543, len=96
25,709,091 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,556 UART:
192,922 UART: Running Caliptra ROM ...
194,122 UART:
194,270 UART: [state] CFI Enabled
267,833 UART: [state] LifecycleState = Unprovisioned
270,263 UART: [state] DebugLocked = No
272,720 UART: [state] WD Timer not started. Device not locked for debugging
276,987 UART: [kat] SHA2-256
466,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,594 UART: [kat] ++
478,043 UART: [kat] sha1
490,414 UART: [kat] SHA2-256
493,420 UART: [kat] SHA2-384
499,710 UART: [kat] SHA2-512-ACC
502,359 UART: [kat] ECC-384
2,944,630 UART: [kat] HMAC-384Kdf
2,970,581 UART: [kat] LMS
3,502,399 UART: [kat] --
3,506,239 UART: [cold-reset] ++
3,507,179 UART: [fht] FHT @ 0x50003400
3,519,302 UART: [idev] ++
3,520,047 UART: [idev] CDI.KEYID = 6
3,520,976 UART: [idev] SUBJECT.KEYID = 7
3,522,144 UART: [idev] UDS.KEYID = 0
3,523,072 ready_for_fw is high
3,523,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,664 UART: [idev] Erasing UDS.KEYID = 0
6,029,961 UART: [idev] Sha1 KeyId Algorithm
6,052,823 UART: [idev] --
6,058,032 UART: [ldev] ++
6,058,721 UART: [ldev] CDI.KEYID = 6
6,059,641 UART: [ldev] SUBJECT.KEYID = 5
6,060,799 UART: [ldev] AUTHORITY.KEYID = 7
6,062,024 UART: [ldev] FE.KEYID = 1
6,100,486 UART: [ldev] Erasing FE.KEYID = 1
8,607,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,627 UART: [ldev] --
10,414,447 UART: [fwproc] Wait for Commands...
10,417,345 UART: [fwproc] Recv command 0x46574c44
10,419,591 UART: [fwproc] Recv'd Img size: 114084 bytes
13,866,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,606,788 >>> mbox cmd response: success
14,610,824 UART: [afmc] ++
14,611,591 UART: [afmc] CDI.KEYID = 6
14,612,786 UART: [afmc] SUBJECT.KEYID = 7
14,614,229 UART: [afmc] AUTHORITY.KEYID = 5
17,150,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,712 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,249 UART: [afmc] --
18,952,271 UART: [cold-reset] --
18,956,751 UART: [state] Locking Datavault
18,961,159 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,380 UART: [state] Locking ICCM
18,964,772 UART: [exit] Launching FMC @ 0x40000130
18,973,464 UART:
18,973,695 UART: Running Caliptra FMC ...
18,974,717 UART:
18,974,860 UART: [state] CFI Enabled
19,034,362 UART: [fht] FMC Alias Private Key: 7
20,798,684 UART: [art] Extend RT PCRs Done
20,799,901 UART: [art] Lock RT PCRs Done
20,801,330 UART: [art] Populate DV Done
20,806,634 UART: [fht] FMC Alias Private Key: 7
20,808,231 UART: [art] Derive CDI
20,808,973 UART: [art] Store in in slot 0x4
20,866,986 UART: [art] Derive Key Pair
20,867,987 UART: [art] Store priv key in slot 0x5
23,330,539 UART: [art] Derive Key Pair - Done
23,343,215 UART: [art] Signing Cert with AUTHO
23,344,518 UART: RITY.KEYID = 7
25,056,431 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,950 UART: [art] PUB.X = EF8A4B9B27E533776C4CDE7C5F890E05B45487D64A5015C40266FE61F84B2C3F19BC3010CB8F65E098115927565B57A5
25,065,174 UART: [art] PUB.Y = E360CE733DE5F7F9BF7F46CDC0E3A15EEB783F0FB6B061D88345166A6635C28BC496FA17D00496F9D189625D99A94D7A
25,072,432 UART: [art] SIG.R = 702165E04EDE7F3E13E80FF86C6F0BF6073191038396E07EDFE19D578063AD0F03B3E8F5A2C71C721CAD569CBCACFD9A
25,079,843 UART: [art] SIG.S = 1C5F4E18EC9A1130E20D789E820134AFE0C545964339823FFE1F625D2E2B9E47676BA3272D1BDB842C10C9D9924EC39D
26,058,466 UART: Caliptra RT
26,059,168 UART: [state] CFI Enabled
26,223,316 UART: [rt] RT listening for mailbox commands...
26,225,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,255,838 UART: [rt]cmd =0x44504543, len=24
26,297,900 >>> mbox cmd response data (40 bytes)
26,299,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,329,591 UART: [rt]cmd =0x44504543, len=96
26,336,276 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,439,035 ready_for_fw is high
3,439,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,725,236 >>> mbox cmd response: success
19,005,857 UART:
19,006,262 UART: Running Caliptra FMC ...
19,007,413 UART:
19,007,575 UART: [state] CFI Enabled
19,074,081 UART: [fht] FMC Alias Private Key: 7
20,838,373 UART: [art] Extend RT PCRs Done
20,839,595 UART: [art] Lock RT PCRs Done
20,841,030 UART: [art] Populate DV Done
20,846,390 UART: [fht] FMC Alias Private Key: 7
20,847,990 UART: [art] Derive CDI
20,848,805 UART: [art] Store in in slot 0x4
20,906,542 UART: [art] Derive Key Pair
20,907,580 UART: [art] Store priv key in slot 0x5
23,370,783 UART: [art] Derive Key Pair - Done
23,383,940 UART: [art] Signing Cert with AUTHO
23,385,245 UART: RITY.KEYID = 7
25,096,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,336 UART: [art] PUB.X = 0D296AC38FDB12F17E43240E2F9BFA987A6064D7212E198F4CBF28E4385C0A5B1424EA04BFA1366838206A2C640EB9EA
25,105,626 UART: [art] PUB.Y = 0CB811DA3C430F2B258CA94533C3238C56A9FB0BA491F19732E4D0406A07350674180342B52DCEFFE77359A511044351
25,112,846 UART: [art] SIG.R = 176309E4B494F056BDA7DBB668B9C5E48C7B4B055D11C19A0AE7212F64C8EE84CE2C92ED9E252487CA36C7FC5D0A1885
25,120,246 UART: [art] SIG.S = 0F0284AE49C8A554F1072CE3E0BE233171EDB54B3FC970BC9290E7CAE8F256DFFBDCE9E81091A8B55EDE0EE2F2EC1CDB
26,098,647 UART: Caliptra RT
26,099,355 UART: [state] CFI Enabled
26,266,931 UART: [rt] RT listening for mailbox commands...
26,268,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,299,594 UART: [rt]cmd =0x44504543, len=24
26,339,520 >>> mbox cmd response data (40 bytes)
26,340,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,371,127 UART: [rt]cmd =0x44504543, len=96
26,377,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,938 UART:
193,307 UART: Running Caliptra ROM ...
194,420 UART:
603,972 UART: [state] CFI Enabled
617,490 UART: [state] LifecycleState = Unprovisioned
619,860 UART: [state] DebugLocked = No
621,463 UART: [state] WD Timer not started. Device not locked for debugging
626,496 UART: [kat] SHA2-256
816,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,161 UART: [kat] ++
827,767 UART: [kat] sha1
840,283 UART: [kat] SHA2-256
843,303 UART: [kat] SHA2-384
849,014 UART: [kat] SHA2-512-ACC
851,620 UART: [kat] ECC-384
3,296,325 UART: [kat] HMAC-384Kdf
3,308,413 UART: [kat] LMS
3,840,250 UART: [kat] --
3,843,535 UART: [cold-reset] ++
3,844,686 UART: [fht] FHT @ 0x50003400
3,856,132 UART: [idev] ++
3,856,842 UART: [idev] CDI.KEYID = 6
3,857,765 UART: [idev] SUBJECT.KEYID = 7
3,858,950 UART: [idev] UDS.KEYID = 0
3,859,875 ready_for_fw is high
3,860,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,204 UART: [idev] Erasing UDS.KEYID = 0
6,332,813 UART: [idev] Sha1 KeyId Algorithm
6,354,959 UART: [idev] --
6,358,795 UART: [ldev] ++
6,359,493 UART: [ldev] CDI.KEYID = 6
6,360,403 UART: [ldev] SUBJECT.KEYID = 5
6,361,562 UART: [ldev] AUTHORITY.KEYID = 7
6,362,790 UART: [ldev] FE.KEYID = 1
6,371,493 UART: [ldev] Erasing FE.KEYID = 1
8,845,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,267 UART: [ldev] --
10,633,535 UART: [fwproc] Wait for Commands...
10,635,740 UART: [fwproc] Recv command 0x46574c44
10,638,053 UART: [fwproc] Recv'd Img size: 114084 bytes
14,081,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,277,825 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,818,834 >>> mbox cmd response: success
14,823,149 UART: [afmc] ++
14,823,861 UART: [afmc] CDI.KEYID = 6
14,825,051 UART: [afmc] SUBJECT.KEYID = 7
14,826,553 UART: [afmc] AUTHORITY.KEYID = 5
17,333,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,663 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,521 UART: [afmc] --
19,129,243 UART: [cold-reset] --
19,134,336 UART: [state] Locking Datavault
19,139,228 UART: [state] Locking PCR0, PCR1 and PCR31
19,141,464 UART: [state] Locking ICCM
19,143,840 UART: [exit] Launching FMC @ 0x40000130
19,152,531 UART:
19,152,771 UART: Running Caliptra FMC ...
19,153,801 UART:
19,153,950 UART: [state] CFI Enabled
19,162,163 UART: [fht] FMC Alias Private Key: 7
20,919,290 UART: [art] Extend RT PCRs Done
20,920,514 UART: [art] Lock RT PCRs Done
20,922,088 UART: [art] Populate DV Done
20,927,343 UART: [fht] FMC Alias Private Key: 7
20,929,048 UART: [art] Derive CDI
20,929,869 UART: [art] Store in in slot 0x4
20,972,553 UART: [art] Derive Key Pair
20,973,594 UART: [art] Store priv key in slot 0x5
23,400,343 UART: [art] Derive Key Pair - Done
23,413,353 UART: [art] Signing Cert with AUTHO
23,414,662 UART: RITY.KEYID = 7
25,120,011 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,530 UART: [art] PUB.X = AA6C2EB255DB37817168026FF52BDF5CD3304C82DAA493E4EA8CE971393B5002D7D7B28EDBF50B66D929330ABDF56EB4
25,128,878 UART: [art] PUB.Y = 963AF3B0EB7C27992960778171A5B2861C31FA987C21AE31D25CC4168B023FA05DE2E349F95B51428550954EF0F59851
25,136,048 UART: [art] SIG.R = 28D9FA385889EB8FD5A80955AF0098C702E2487CB26653ED006F1DEB64A1BC427BE13348C88C71A43BE10299795229F8
25,143,358 UART: [art] SIG.S = 0124F34D93A306509217C7D72CDD17EE30EBFBBBAAA98A65070C193004C68BCC223ACCC8694CB16B880AEE3BFE35A29C
26,122,566 UART: Caliptra RT
26,123,259 UART: [state] CFI Enabled
26,240,804 UART: [rt] RT listening for mailbox commands...
26,242,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,272,837 UART: [rt]cmd =0x44504543, len=24
26,299,756 >>> mbox cmd response data (40 bytes)
26,300,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,448 UART: [rt]cmd =0x44504543, len=96
26,337,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
3,760,708 ready_for_fw is high
3,761,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,605 >>> mbox cmd response: success
19,214,408 UART:
19,214,811 UART: Running Caliptra FMC ...
19,216,007 UART:
19,216,189 UART: [state] CFI Enabled
19,223,706 UART: [fht] FMC Alias Private Key: 7
20,980,856 UART: [art] Extend RT PCRs Done
20,982,089 UART: [art] Lock RT PCRs Done
20,983,732 UART: [art] Populate DV Done
20,988,994 UART: [fht] FMC Alias Private Key: 7
20,990,541 UART: [art] Derive CDI
20,991,361 UART: [art] Store in in slot 0x4
21,033,966 UART: [art] Derive Key Pair
21,035,022 UART: [art] Store priv key in slot 0x5
23,461,214 UART: [art] Derive Key Pair - Done
23,474,008 UART: [art] Signing Cert with AUTHO
23,475,330 UART: RITY.KEYID = 7
25,180,635 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,149 UART: [art] PUB.X = 3171221F1A6B1C78A7762C52EFD99D944E72E31E7ECDDCA9DEC4242B016CE1C01E9CCBB308E22B51CD8FF6EAB24F80CE
25,189,423 UART: [art] PUB.Y = 45E3546E7C00C908F91E84BEE939880620475BE08F24D2A699BDD2DFCD9FECDBABCEE8611A63BB1B8C01247A6AACA4C4
25,196,689 UART: [art] SIG.R = 787FBC1866E4567F7CE801C60547BBBE72B1716D1BDDCD097E17A1ACC18377CCE57060F5190FAD7A865B8B1D342CBE71
25,204,080 UART: [art] SIG.S = 2351679DBA1D071B24703FBE03C45DEF92BB8A6918E7B0E760DF2F2BCF7ECC19592F60F182ECEDF6A08C9BFC0C401AFF
26,183,545 UART: Caliptra RT
26,184,256 UART: [state] CFI Enabled
26,301,813 UART: [rt] RT listening for mailbox commands...
26,303,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,333,482 UART: [rt]cmd =0x44504543, len=24
26,359,563 >>> mbox cmd response data (40 bytes)
26,360,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,701 UART: [rt]cmd =0x44504543, len=96
26,398,195 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,542 UART: [kat] HMAC-384Kdf
907,330 UART: [kat] LMS
1,475,526 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,582 UART: [idev] ++
1,479,750 UART: [idev] CDI.KEYID = 6
1,480,110 UART: [idev] SUBJECT.KEYID = 7
1,480,534 UART: [idev] UDS.KEYID = 0
1,480,879 ready_for_fw is high
1,480,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,896 UART: [idev] Erasing UDS.KEYID = 0
1,505,180 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,834 UART: [idev] --
1,514,889 UART: [ldev] ++
1,515,057 UART: [ldev] CDI.KEYID = 6
1,515,420 UART: [ldev] SUBJECT.KEYID = 5
1,515,846 UART: [ldev] AUTHORITY.KEYID = 7
1,516,309 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,398 UART: [ldev] --
1,585,743 UART: [fwproc] Waiting for Commands...
1,586,468 UART: [fwproc] Received command 0x46574c44
1,587,259 UART: [fwproc] Received Image of size 114084 bytes
2,881,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,997 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,944 >>> mbox cmd response: success
3,074,970 UART: [afmc] ++
3,075,138 UART: [afmc] CDI.KEYID = 6
3,075,500 UART: [afmc] SUBJECT.KEYID = 7
3,075,925 UART: [afmc] AUTHORITY.KEYID = 5
3,110,654 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,948 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,341 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,031 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,982 UART: [afmc] --
3,153,894 UART: [cold-reset] --
3,154,834 UART: [state] Locking Datavault
3,156,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,631 UART: [state] Locking ICCM
3,157,077 UART: [exit] Launching FMC @ 0x40000130
3,162,406 UART:
3,162,422 UART: Running Caliptra FMC ...
3,162,830 UART:
3,162,884 UART: [state] CFI Enabled
3,173,229 UART: [fht] FMC Alias Private Key: 7
3,281,036 UART: [art] Extend RT PCRs Done
3,281,464 UART: [art] Lock RT PCRs Done
3,283,022 UART: [art] Populate DV Done
3,291,207 UART: [fht] FMC Alias Private Key: 7
3,292,387 UART: [art] Derive CDI
3,292,667 UART: [art] Store in in slot 0x4
3,378,306 UART: [art] Derive Key Pair
3,378,666 UART: [art] Store priv key in slot 0x5
3,392,124 UART: [art] Derive Key Pair - Done
3,407,120 UART: [art] Signing Cert with AUTHO
3,407,600 UART: RITY.KEYID = 7
3,422,808 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,573 UART: [art] PUB.X = F6C25BAA33DEEE691C8D98584F85F1AD09C0163D21AF402FDF8A84E8F6F24B2DD0C6EBD30B1A9148DB4085C2296AD5F8
3,430,357 UART: [art] PUB.Y = A0CF8BCB6860D2C8AB7EB4DC273928CA7AD3F5F44037F3B0E3B8AA92387F748DCF3A6A887D4EFCA57A9B30578FE4005E
3,437,307 UART: [art] SIG.R = 8C133DFD2E4064C3A5E8F4966B97D08CB0B0E795F3A4E279E76CA77415933C1A515EF9F279528F8D5B66DA8189317933
3,444,077 UART: [art] SIG.S = 5FC25DA12C87FD75A9246530287065929475BA9776C744605DA06171F55DE74D3CE188C2E83F006817166727CCD99626
3,468,140 UART: Caliptra RT
3,468,393 UART: [state] CFI Enabled
3,576,110 UART: [rt] RT listening for mailbox commands...
3,576,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,868 UART: [rt]cmd =0x44504543, len=24
3,633,011 >>> mbox cmd response data (40 bytes)
3,633,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,085 UART: [rt]cmd =0x44504543, len=96
3,670,276 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,043 ready_for_fw is high
1,362,043 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,812 >>> mbox cmd response: success
2,986,762 UART:
2,986,778 UART: Running Caliptra FMC ...
2,987,186 UART:
2,987,240 UART: [state] CFI Enabled
2,997,673 UART: [fht] FMC Alias Private Key: 7
3,105,718 UART: [art] Extend RT PCRs Done
3,106,146 UART: [art] Lock RT PCRs Done
3,107,926 UART: [art] Populate DV Done
3,116,109 UART: [fht] FMC Alias Private Key: 7
3,117,231 UART: [art] Derive CDI
3,117,511 UART: [art] Store in in slot 0x4
3,203,410 UART: [art] Derive Key Pair
3,203,770 UART: [art] Store priv key in slot 0x5
3,216,416 UART: [art] Derive Key Pair - Done
3,231,024 UART: [art] Signing Cert with AUTHO
3,231,504 UART: RITY.KEYID = 7
3,246,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,215 UART: [art] PUB.X = 8997836D26076B0031A11C4D94DE98B863C66E6726C718EA48CD1D6EEA832CB6B3A15F785A531B5F686D32316C5C3C2D
3,253,962 UART: [art] PUB.Y = FF8A9F8B5A0D63A5991B3CE20F72F53FC5B4D29C44119729EA9AFA579C6B43967941331671800C7D3F549A22BC709B41
3,260,905 UART: [art] SIG.R = A57A7A3248855C84ED69E958E3BBC3ABAE70F3D20D9C610B5A0FF6FD6BBE52B83D59DE9413DF18AE1BB2428961C432D4
3,267,684 UART: [art] SIG.S = 3A18C57D08DC59E6EA833B0BDAA146A59FC1AB66584B74500C66F184150CCB1B98690A52361EBA81F576012C60D581C9
3,291,339 UART: Caliptra RT
3,291,592 UART: [state] CFI Enabled
3,399,835 UART: [rt] RT listening for mailbox commands...
3,400,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,569 UART: [rt]cmd =0x44504543, len=24
3,456,550 >>> mbox cmd response data (40 bytes)
3,456,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,610 UART: [rt]cmd =0x44504543, len=96
3,493,765 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,777 UART: [kat] HMAC-384Kdf
907,605 UART: [kat] LMS
1,475,801 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,201 UART: [idev] ++
1,480,369 UART: [idev] CDI.KEYID = 6
1,480,729 UART: [idev] SUBJECT.KEYID = 7
1,481,153 UART: [idev] UDS.KEYID = 0
1,481,498 ready_for_fw is high
1,481,498 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,145 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,855 UART: [idev] --
1,515,856 UART: [ldev] ++
1,516,024 UART: [ldev] CDI.KEYID = 6
1,516,387 UART: [ldev] SUBJECT.KEYID = 5
1,516,813 UART: [ldev] AUTHORITY.KEYID = 7
1,517,276 UART: [ldev] FE.KEYID = 1
1,522,790 UART: [ldev] Erasing FE.KEYID = 1
1,548,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,935 UART: [ldev] --
1,587,372 UART: [fwproc] Waiting for Commands...
1,588,209 UART: [fwproc] Received command 0x46574c44
1,589,000 UART: [fwproc] Received Image of size 114084 bytes
2,885,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,394 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,361 >>> mbox cmd response: success
3,078,467 UART: [afmc] ++
3,078,635 UART: [afmc] CDI.KEYID = 6
3,078,997 UART: [afmc] SUBJECT.KEYID = 7
3,079,422 UART: [afmc] AUTHORITY.KEYID = 5
3,115,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,050 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,740 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,711 UART: [afmc] --
3,158,599 UART: [cold-reset] --
3,159,399 UART: [state] Locking Datavault
3,160,580 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,184 UART: [state] Locking ICCM
3,161,722 UART: [exit] Launching FMC @ 0x40000130
3,167,051 UART:
3,167,067 UART: Running Caliptra FMC ...
3,167,475 UART:
3,167,618 UART: [state] CFI Enabled
3,178,417 UART: [fht] FMC Alias Private Key: 7
3,286,450 UART: [art] Extend RT PCRs Done
3,286,878 UART: [art] Lock RT PCRs Done
3,288,640 UART: [art] Populate DV Done
3,296,759 UART: [fht] FMC Alias Private Key: 7
3,297,847 UART: [art] Derive CDI
3,298,127 UART: [art] Store in in slot 0x4
3,383,892 UART: [art] Derive Key Pair
3,384,252 UART: [art] Store priv key in slot 0x5
3,397,360 UART: [art] Derive Key Pair - Done
3,412,127 UART: [art] Signing Cert with AUTHO
3,412,607 UART: RITY.KEYID = 7
3,427,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,694 UART: [art] PUB.X = 40B30C0E7BB90EF146394D35840712EB0E5AA58E7D1A2A5C2717120B72A4E4208CC7CE1E8A3BA14B93E6E393C9EC5B04
3,435,453 UART: [art] PUB.Y = B0D9BF718D86CEBB7ED02E23B7E45BE03CD3186114BBAE0FDE8F519DE6D2B857308ECFB1A3915EE7FB776FF8CF841A3C
3,442,428 UART: [art] SIG.R = 0FA0F230AD3C51BD051EC11167A026993B26FF299EE177C423BFA421C06AC1767FBCD3F8D740E3C1FA0C51BEBA4D1092
3,449,205 UART: [art] SIG.S = 882285F48A0852031DCE1BCAEB7C5A26D97D3B356B9261EB3586078891AB17D5AA40307C4E7CFD593C889C7C8F34CCD0
3,472,939 UART: Caliptra RT
3,473,284 UART: [state] CFI Enabled
3,580,779 UART: [rt] RT listening for mailbox commands...
3,581,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,497 UART: [rt]cmd =0x44504543, len=24
3,638,000 >>> mbox cmd response data (40 bytes)
3,638,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,668,216 UART: [rt]cmd =0x44504543, len=96
3,675,691 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 ready_for_fw is high
1,362,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,205 >>> mbox cmd response: success
2,987,357 UART:
2,987,373 UART: Running Caliptra FMC ...
2,987,781 UART:
2,987,924 UART: [state] CFI Enabled
2,998,355 UART: [fht] FMC Alias Private Key: 7
3,106,532 UART: [art] Extend RT PCRs Done
3,106,960 UART: [art] Lock RT PCRs Done
3,108,700 UART: [art] Populate DV Done
3,117,031 UART: [fht] FMC Alias Private Key: 7
3,118,203 UART: [art] Derive CDI
3,118,483 UART: [art] Store in in slot 0x4
3,204,056 UART: [art] Derive Key Pair
3,204,416 UART: [art] Store priv key in slot 0x5
3,217,376 UART: [art] Derive Key Pair - Done
3,232,353 UART: [art] Signing Cert with AUTHO
3,232,833 UART: RITY.KEYID = 7
3,248,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,248 UART: [art] PUB.X = 31BA110BD4E69682D835708FA1D88011327F3179B783F86125B5916E62649CB50C23BC31395BDE818B39497231A7C631
3,256,000 UART: [art] PUB.Y = 6FB9315E60BF2C3EA0A880B940A904BC5B764242A1B548F2BF1A0A2AD400F9F86F8E1FD7504CF1B29C3B62AC747D8A28
3,262,936 UART: [art] SIG.R = 4FCEFC2E7D8F9EE06FACB9623A4FC4C5E79913E3EE46E44BE344AEE40CFA944F86698B6E701111BF98FDB65DB0B897CB
3,269,729 UART: [art] SIG.S = DBFA6810E0A2E8250B8350734BA2C56AC1863613DBFC520F3CF7B729D8D76F8E2D93FC7A5ABD1519C2F0258BE6AE4AC1
3,293,398 UART: Caliptra RT
3,293,743 UART: [state] CFI Enabled
3,402,722 UART: [rt] RT listening for mailbox commands...
3,403,392 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,336 UART: [rt]cmd =0x44504543, len=24
3,460,167 >>> mbox cmd response data (40 bytes)
3,460,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,027 UART: [rt]cmd =0x44504543, len=96
3,497,038 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,174,948 UART: [idev] ++
1,175,116 UART: [idev] CDI.KEYID = 6
1,175,476 UART: [idev] SUBJECT.KEYID = 7
1,175,900 UART: [idev] UDS.KEYID = 0
1,176,245 ready_for_fw is high
1,176,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,201,183 UART: [idev] Sha1 KeyId Algorithm
1,209,579 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,014 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,303 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,407 UART: [ldev] --
1,283,800 UART: [fwproc] Wait for Commands...
1,284,370 UART: [fwproc] Recv command 0x46574c44
1,285,098 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,117 >>> mbox cmd response: success
2,773,139 UART: [afmc] ++
2,773,307 UART: [afmc] CDI.KEYID = 6
2,773,669 UART: [afmc] SUBJECT.KEYID = 7
2,774,094 UART: [afmc] AUTHORITY.KEYID = 5
2,809,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,922 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,535 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,232 UART: [afmc] --
2,853,162 UART: [cold-reset] --
2,854,100 UART: [state] Locking Datavault
2,855,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,165 UART: [state] Locking ICCM
2,856,585 UART: [exit] Launching FMC @ 0x40000130
2,861,914 UART:
2,861,930 UART: Running Caliptra FMC ...
2,862,338 UART:
2,862,392 UART: [state] CFI Enabled
2,872,779 UART: [fht] FMC Alias Private Key: 7
2,980,828 UART: [art] Extend RT PCRs Done
2,981,256 UART: [art] Lock RT PCRs Done
2,982,914 UART: [art] Populate DV Done
2,991,043 UART: [fht] FMC Alias Private Key: 7
2,992,035 UART: [art] Derive CDI
2,992,315 UART: [art] Store in in slot 0x4
3,077,456 UART: [art] Derive Key Pair
3,077,816 UART: [art] Store priv key in slot 0x5
3,091,000 UART: [art] Derive Key Pair - Done
3,105,728 UART: [art] Signing Cert with AUTHO
3,106,208 UART: RITY.KEYID = 7
3,121,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,873 UART: [art] PUB.X = DA1A6A59F6FBDBDB2A50CD4192D65067347A616B651A3AEAE5E57472CFCE5E18DD0CE9ABB703345E639D7C711C3AF1F2
3,128,659 UART: [art] PUB.Y = 5A6DF44738532BAFD73B85DE6A65F91D8F0E914B187DDFA08C0F0603E89A46E1903B44E3D43911F4FD7A5FEB3A6B5B5C
3,135,613 UART: [art] SIG.R = 4B21F58526E8294701E83D298FB6BA0840C73E4B4B36E6B42C39764F4869786A90600DB00EA022C63881179163458B54
3,142,357 UART: [art] SIG.S = 441089664402010655358BFA5BDE13D4C1726E021FA7419FCEA54122A4BCC0F76F56E5B159646276603C8F747F15FBEA
3,165,722 UART: Caliptra RT
3,165,975 UART: [state] CFI Enabled
3,273,920 UART: [rt] RT listening for mailbox commands...
3,274,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,870 UART: [rt]cmd =0x44504543, len=24
3,330,655 >>> mbox cmd response data (40 bytes)
3,330,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,517 UART: [rt]cmd =0x44504543, len=96
3,367,606 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 ready_for_fw is high
1,060,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,196 >>> mbox cmd response: success
2,685,954 UART:
2,685,970 UART: Running Caliptra FMC ...
2,686,378 UART:
2,686,432 UART: [state] CFI Enabled
2,696,821 UART: [fht] FMC Alias Private Key: 7
2,805,338 UART: [art] Extend RT PCRs Done
2,805,766 UART: [art] Lock RT PCRs Done
2,807,318 UART: [art] Populate DV Done
2,815,627 UART: [fht] FMC Alias Private Key: 7
2,816,613 UART: [art] Derive CDI
2,816,893 UART: [art] Store in in slot 0x4
2,902,484 UART: [art] Derive Key Pair
2,902,844 UART: [art] Store priv key in slot 0x5
2,915,960 UART: [art] Derive Key Pair - Done
2,930,835 UART: [art] Signing Cert with AUTHO
2,931,315 UART: RITY.KEYID = 7
2,946,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,224 UART: [art] PUB.X = 701CF0105A96FC5A085718D9E0B28860384E064C1AEBD41A4696548FA31A6CDE4AA834034CFB45634DAC97B08B246F2D
2,953,991 UART: [art] PUB.Y = 3BC1A84D53071E29D085DBACA19FD2837F9D9A09EEA72A36A5DB09C2627C0C1BAF1BD0DFE85B61631384E8A922D1BCE5
2,960,949 UART: [art] SIG.R = 8EF4D29D0AF74738192C46654F836602D944D6813AB521DFF86702290E19A210B9E61D2B942685C07025BBB2515FC0E7
2,967,701 UART: [art] SIG.S = 1056FA2A1018F674D88959958FC408F0D9134DCA89A4DF6DD5C17A02389CAB03F7975632185D256760CFFC62CAC30ACA
2,991,968 UART: Caliptra RT
2,992,221 UART: [state] CFI Enabled
3,100,018 UART: [rt] RT listening for mailbox commands...
3,100,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,838 UART: [rt]cmd =0x44504543, len=24
3,156,927 >>> mbox cmd response data (40 bytes)
3,156,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,889 UART: [rt]cmd =0x44504543, len=96
3,194,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
918,647 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,778 UART: [fht] FHT @ 0x50003400
1,175,425 UART: [idev] ++
1,175,593 UART: [idev] CDI.KEYID = 6
1,175,953 UART: [idev] SUBJECT.KEYID = 7
1,176,377 UART: [idev] UDS.KEYID = 0
1,176,722 ready_for_fw is high
1,176,722 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,511 UART: [idev] Erasing UDS.KEYID = 0
1,201,946 UART: [idev] Sha1 KeyId Algorithm
1,210,494 UART: [idev] --
1,211,684 UART: [ldev] ++
1,211,852 UART: [ldev] CDI.KEYID = 6
1,212,215 UART: [ldev] SUBJECT.KEYID = 5
1,212,641 UART: [ldev] AUTHORITY.KEYID = 7
1,213,104 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,245,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,042 UART: [ldev] --
1,284,319 UART: [fwproc] Wait for Commands...
1,284,925 UART: [fwproc] Recv command 0x46574c44
1,285,653 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,290 >>> mbox cmd response: success
2,774,504 UART: [afmc] ++
2,774,672 UART: [afmc] CDI.KEYID = 6
2,775,034 UART: [afmc] SUBJECT.KEYID = 7
2,775,459 UART: [afmc] AUTHORITY.KEYID = 5
2,811,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,295 UART: [afmc] --
2,854,327 UART: [cold-reset] --
2,855,279 UART: [state] Locking Datavault
2,856,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,158 UART: [state] Locking ICCM
2,857,608 UART: [exit] Launching FMC @ 0x40000130
2,862,937 UART:
2,862,953 UART: Running Caliptra FMC ...
2,863,361 UART:
2,863,504 UART: [state] CFI Enabled
2,874,411 UART: [fht] FMC Alias Private Key: 7
2,982,494 UART: [art] Extend RT PCRs Done
2,982,922 UART: [art] Lock RT PCRs Done
2,984,248 UART: [art] Populate DV Done
2,992,501 UART: [fht] FMC Alias Private Key: 7
2,993,451 UART: [art] Derive CDI
2,993,731 UART: [art] Store in in slot 0x4
3,080,078 UART: [art] Derive Key Pair
3,080,438 UART: [art] Store priv key in slot 0x5
3,093,862 UART: [art] Derive Key Pair - Done
3,108,852 UART: [art] Signing Cert with AUTHO
3,109,332 UART: RITY.KEYID = 7
3,124,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,405 UART: [art] PUB.X = 3E91C6CF6A87F6E72297E1DB115E15354E3FFA95D453296D74641BC1454F248478D2E33EF45C8D90151052F3B963EDFF
3,132,177 UART: [art] PUB.Y = 1AAA935DCF3C181E999CD188C679813E59E881B02977EE006BF304C4D8D3934EEDFAF0D7003C07333B47C305B1A802B1
3,139,077 UART: [art] SIG.R = EE1EC0C13F8BA33EBD90B8E15819F3A1AEC31F04466C29C4DE5CC93C8B1BEE5D721895FC32642CB251FEB5359098515A
3,145,860 UART: [art] SIG.S = 07F970596AA3D9ED836D4273BB2245484C843908A84708AC59E3E38CC5743BBCAB7FBF6583655A6ABB6A783494754DD8
3,170,080 UART: Caliptra RT
3,170,425 UART: [state] CFI Enabled
3,278,846 UART: [rt] RT listening for mailbox commands...
3,279,516 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,652 UART: [rt]cmd =0x44504543, len=24
3,335,589 >>> mbox cmd response data (40 bytes)
3,335,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,597 UART: [rt]cmd =0x44504543, len=96
3,372,934 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,790 ready_for_fw is high
1,059,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,075 >>> mbox cmd response: success
2,685,655 UART:
2,685,671 UART: Running Caliptra FMC ...
2,686,079 UART:
2,686,222 UART: [state] CFI Enabled
2,696,835 UART: [fht] FMC Alias Private Key: 7
2,805,660 UART: [art] Extend RT PCRs Done
2,806,088 UART: [art] Lock RT PCRs Done
2,807,456 UART: [art] Populate DV Done
2,815,569 UART: [fht] FMC Alias Private Key: 7
2,816,507 UART: [art] Derive CDI
2,816,787 UART: [art] Store in in slot 0x4
2,902,326 UART: [art] Derive Key Pair
2,902,686 UART: [art] Store priv key in slot 0x5
2,916,008 UART: [art] Derive Key Pair - Done
2,930,788 UART: [art] Signing Cert with AUTHO
2,931,268 UART: RITY.KEYID = 7
2,946,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,333 UART: [art] PUB.X = D764454BEE5E9BD5A218B2B1B700EAD37C004C44EF9F20C9374B0A7EC9976A8D7CFDBE1A4E096BB4CF7F2F3FE17503A5
2,954,072 UART: [art] PUB.Y = 59721D16E5277C7C8598C9B932C58EC74CF96857AEE80B680A727C195C76AB07DFFCCD70A3E8960870F1010EA6521995
2,961,004 UART: [art] SIG.R = 4B1DF139CE909D1A8E9B6D35D35559675A7AFA55C253226EF7781086E1146001D0E872236011E8C50ED20240CF355D8C
2,967,761 UART: [art] SIG.S = 2441C7D4D581B0AC31E41660DE0AFBA7F269182CBE50ED643A0C32195FA0072AF4402CED2F2A6882AE0BE502CF0104C5
2,991,283 UART: Caliptra RT
2,991,628 UART: [state] CFI Enabled
3,098,841 UART: [rt] RT listening for mailbox commands...
3,099,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,601 UART: [rt]cmd =0x44504543, len=24
3,155,758 >>> mbox cmd response data (40 bytes)
3,155,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,700 UART: [rt]cmd =0x44504543, len=96
3,192,865 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 ready_for_fw is high
1,174,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,864 UART: [ldev] ++
1,209,032 UART: [ldev] CDI.KEYID = 6
1,209,396 UART: [ldev] SUBJECT.KEYID = 5
1,209,823 UART: [ldev] AUTHORITY.KEYID = 7
1,210,286 UART: [ldev] FE.KEYID = 1
1,215,500 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,272 UART: [ldev] --
1,280,778 UART: [fwproc] Wait for Commands...
1,281,483 UART: [fwproc] Recv command 0x46574c44
1,282,216 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,775 >>> mbox cmd response: success
2,770,848 UART: [afmc] ++
2,771,016 UART: [afmc] CDI.KEYID = 6
2,771,379 UART: [afmc] SUBJECT.KEYID = 7
2,771,805 UART: [afmc] AUTHORITY.KEYID = 5
2,807,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,888 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,251 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,970 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,733 UART: [afmc] --
2,850,713 UART: [cold-reset] --
2,851,291 UART: [state] Locking Datavault
2,852,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,936 UART: [state] Locking ICCM
2,853,546 UART: [exit] Launching FMC @ 0x40000130
2,858,875 UART:
2,858,891 UART: Running Caliptra FMC ...
2,859,299 UART:
2,859,353 UART: [state] CFI Enabled
2,869,934 UART: [fht] FMC Alias Private Key: 7
2,977,663 UART: [art] Extend RT PCRs Done
2,978,091 UART: [art] Lock RT PCRs Done
2,979,465 UART: [art] Populate DV Done
2,987,828 UART: [fht] FMC Alias Private Key: 7
2,988,824 UART: [art] Derive CDI
2,989,104 UART: [art] Store in in slot 0x4
3,074,821 UART: [art] Derive Key Pair
3,075,181 UART: [art] Store priv key in slot 0x5
3,088,379 UART: [art] Derive Key Pair - Done
3,103,569 UART: [art] Signing Cert with AUTHO
3,104,049 UART: RITY.KEYID = 7
3,119,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,200 UART: [art] PUB.X = C649607F74A046B5A45FF14A7A5C39A184A5943E2F7EC8EBCC329E97E86402679B92C15EB3FC08C95226AFF63F3A55F9
3,126,972 UART: [art] PUB.Y = C54EF23F2F1EBF68DDD4EDF174D0CEA8ED8817E196B001BF85482F33E2B35D65EBDEF64CBC0E2C3B804E453DCB31DC94
3,133,944 UART: [art] SIG.R = 2A0CD9A36E8910130B5B73E85B1ECBD5904797DBB4CC243561DCB58A52D1748E075C0EF0FB129FE2EB6F1958FDBB6750
3,140,716 UART: [art] SIG.S = 0CCEE7C1B4E91549910325A31AFE91BCEA843FB0751B24ED957751823BF3171C72083295053F2DCBA5FABC167346EFD2
3,164,563 UART: Caliptra RT
3,164,816 UART: [state] CFI Enabled
3,271,907 UART: [rt] RT listening for mailbox commands...
3,272,577 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,653 UART: [rt]cmd =0x44504543, len=24
3,328,640 >>> mbox cmd response data (40 bytes)
3,328,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,728 UART: [rt]cmd =0x44504543, len=96
3,365,809 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,350 ready_for_fw is high
1,055,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,527 >>> mbox cmd response: success
2,680,445 UART:
2,680,461 UART: Running Caliptra FMC ...
2,680,869 UART:
2,680,923 UART: [state] CFI Enabled
2,691,584 UART: [fht] FMC Alias Private Key: 7
2,799,623 UART: [art] Extend RT PCRs Done
2,800,051 UART: [art] Lock RT PCRs Done
2,801,541 UART: [art] Populate DV Done
2,809,758 UART: [fht] FMC Alias Private Key: 7
2,810,856 UART: [art] Derive CDI
2,811,136 UART: [art] Store in in slot 0x4
2,896,575 UART: [art] Derive Key Pair
2,896,935 UART: [art] Store priv key in slot 0x5
2,909,571 UART: [art] Derive Key Pair - Done
2,924,140 UART: [art] Signing Cert with AUTHO
2,924,620 UART: RITY.KEYID = 7
2,939,462 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,227 UART: [art] PUB.X = 2073299356DBE7B0064FE46D485235AF3F53E4B773A67B5845759F3940C494C68945C63B7532C751130A6DAEF0433D42
2,946,981 UART: [art] PUB.Y = 72F0EC13671E29C01808F2AA583F0E888A1821221695922D84B94CAFFA263D6BDF059A9383842956836521F9CB957EC1
2,953,916 UART: [art] SIG.R = D03B3498136DB09F0BFC8B9D4D0A81F8CE6A89771E9F108C9E58A494604138A49CFCFFF11A2E51666FCD66EF74C1A1D5
2,960,694 UART: [art] SIG.S = 7B1DFECB4429259AED88581A1D06589ADA10FC2F780CEEEA644D4E902AC556A2F894AAA193253B8DFBC06665895347C0
2,984,293 UART: Caliptra RT
2,984,546 UART: [state] CFI Enabled
3,092,295 UART: [rt] RT listening for mailbox commands...
3,092,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,041 UART: [rt]cmd =0x44504543, len=24
3,149,178 >>> mbox cmd response data (40 bytes)
3,149,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,114 UART: [rt]cmd =0x44504543, len=96
3,186,713 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,828 UART: [kat] ++
895,980 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,374 UART: [idev] ++
1,173,542 UART: [idev] CDI.KEYID = 6
1,173,903 UART: [idev] SUBJECT.KEYID = 7
1,174,328 UART: [idev] UDS.KEYID = 0
1,174,674 ready_for_fw is high
1,174,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,446 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,375 UART: [ldev] SUBJECT.KEYID = 5
1,210,802 UART: [ldev] AUTHORITY.KEYID = 7
1,211,265 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,194 UART: [fwproc] Recv command 0x46574c44
1,283,927 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,468 >>> mbox cmd response: success
2,770,737 UART: [afmc] ++
2,770,905 UART: [afmc] CDI.KEYID = 6
2,771,268 UART: [afmc] SUBJECT.KEYID = 7
2,771,694 UART: [afmc] AUTHORITY.KEYID = 5
2,807,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,335 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,800 UART: [afmc] --
2,850,688 UART: [cold-reset] --
2,851,832 UART: [state] Locking Datavault
2,853,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,657 UART: [state] Locking ICCM
2,854,285 UART: [exit] Launching FMC @ 0x40000130
2,859,614 UART:
2,859,630 UART: Running Caliptra FMC ...
2,860,038 UART:
2,860,181 UART: [state] CFI Enabled
2,870,750 UART: [fht] FMC Alias Private Key: 7
2,979,351 UART: [art] Extend RT PCRs Done
2,979,779 UART: [art] Lock RT PCRs Done
2,981,009 UART: [art] Populate DV Done
2,989,290 UART: [fht] FMC Alias Private Key: 7
2,990,360 UART: [art] Derive CDI
2,990,640 UART: [art] Store in in slot 0x4
3,076,789 UART: [art] Derive Key Pair
3,077,149 UART: [art] Store priv key in slot 0x5
3,090,883 UART: [art] Derive Key Pair - Done
3,105,518 UART: [art] Signing Cert with AUTHO
3,105,998 UART: RITY.KEYID = 7
3,121,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,007 UART: [art] PUB.X = 68404FF1F066F8D2177729500BBA7E9BEB42FD71006110C661B0641814950905E96C259DC316F7C908EAA4CB7979CCC8
3,128,741 UART: [art] PUB.Y = FE06D440AE2FA155CFBCF8A0DF94C515ED15D93C323570FF6BD41AAD7D052175819DEA0D1E2336217973329A292EDE9F
3,135,696 UART: [art] SIG.R = DA29BD540C567655A0138B738F094D188B96A07FB59F5D6CD285CBF359EC4F8AE0B4851D4FC5C10A75F506AD0A7EFCC0
3,142,467 UART: [art] SIG.S = 058F79BE4D3B0DEEDEFB72FCE0524354B59F12650FED6D5BB106DF9E6D717C63A3D9A5DD7A74AF75DAF7889411394077
3,166,886 UART: Caliptra RT
3,167,231 UART: [state] CFI Enabled
3,274,952 UART: [rt] RT listening for mailbox commands...
3,275,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,268 UART: [rt]cmd =0x44504543, len=24
3,331,653 >>> mbox cmd response data (40 bytes)
3,331,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,871 UART: [rt]cmd =0x44504543, len=96
3,369,078 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,609 ready_for_fw is high
1,056,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,192 >>> mbox cmd response: success
2,681,640 UART:
2,681,656 UART: Running Caliptra FMC ...
2,682,064 UART:
2,682,207 UART: [state] CFI Enabled
2,693,090 UART: [fht] FMC Alias Private Key: 7
2,801,155 UART: [art] Extend RT PCRs Done
2,801,583 UART: [art] Lock RT PCRs Done
2,803,225 UART: [art] Populate DV Done
2,811,420 UART: [fht] FMC Alias Private Key: 7
2,812,504 UART: [art] Derive CDI
2,812,784 UART: [art] Store in in slot 0x4
2,898,137 UART: [art] Derive Key Pair
2,898,497 UART: [art] Store priv key in slot 0x5
2,912,003 UART: [art] Derive Key Pair - Done
2,926,634 UART: [art] Signing Cert with AUTHO
2,927,114 UART: RITY.KEYID = 7
2,942,034 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,799 UART: [art] PUB.X = C57D7D27D6EEF0F1191CB11CDB9ADBF44C61EB3A147B674E63CDFF37416665F663687627B94B1D90E58980DDC86EFE3F
2,949,585 UART: [art] PUB.Y = 82612FFDA92A2B1972436CB66CF3E21375C0C91F0EAC637E90D4C04187012404DDA33B81B9F086F7E49647D0BC67607E
2,956,528 UART: [art] SIG.R = 29575331F7B37C970A062438B8A75CFDBECFAA1C00FD8F8C00C78715857C26EDDDC7540B83DBFCB418BAE537912126B9
2,963,257 UART: [art] SIG.S = 4E224761A509AA429CC6B2D03AB50050EBB604A1EB21B50CEF0B269802FC2AA0A914931FDE126E2A22B62AA9903B2A20
2,987,433 UART: Caliptra RT
2,987,778 UART: [state] CFI Enabled
3,095,367 UART: [rt] RT listening for mailbox commands...
3,096,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,945 UART: [rt]cmd =0x44504543, len=24
3,152,216 >>> mbox cmd response data (40 bytes)
3,152,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,158 UART: [rt]cmd =0x44504543, len=96
3,189,343 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,157 UART:
192,516 UART: Running Caliptra ROM ...
193,717 UART:
193,875 UART: [state] CFI Enabled
264,198 UART: [state] LifecycleState = Unprovisioned
266,171 UART: [state] DebugLocked = No
267,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,148 UART: [kat] SHA2-256
441,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,380 UART: [kat] ++
452,838 UART: [kat] sha1
464,596 UART: [kat] SHA2-256
467,260 UART: [kat] SHA2-384
472,228 UART: [kat] SHA2-512-ACC
474,648 UART: [kat] ECC-384
2,765,695 UART: [kat] HMAC-384Kdf
2,777,436 UART: [kat] LMS
3,967,734 UART: [kat] --
3,971,964 UART: [cold-reset] ++
3,974,036 UART: [fht] Storing FHT @ 0x50003400
3,986,157 UART: [idev] ++
3,986,724 UART: [idev] CDI.KEYID = 6
3,987,790 UART: [idev] SUBJECT.KEYID = 7
3,988,895 UART: [idev] UDS.KEYID = 0
3,989,937 ready_for_fw is high
3,990,136 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,221 UART: [idev] Erasing UDS.KEYID = 0
7,323,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,801 UART: [idev] --
7,349,643 UART: [ldev] ++
7,350,210 UART: [ldev] CDI.KEYID = 6
7,351,229 UART: [ldev] SUBJECT.KEYID = 5
7,352,462 UART: [ldev] AUTHORITY.KEYID = 7
7,353,598 UART: [ldev] FE.KEYID = 1
7,399,989 UART: [ldev] Erasing FE.KEYID = 1
10,736,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,428 UART: [ldev] --
13,113,367 UART: [fwproc] Waiting for Commands...
13,115,986 UART: [fwproc] Received command 0x46574c44
13,118,176 UART: [fwproc] Received Image of size 113760 bytes
17,168,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,608 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,628,707 >>> mbox cmd response: success
17,633,686 UART: [afmc] ++
17,634,346 UART: [afmc] CDI.KEYID = 6
17,635,278 UART: [afmc] SUBJECT.KEYID = 7
17,636,499 UART: [afmc] AUTHORITY.KEYID = 5
21,007,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,051 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,431 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,271 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,708 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,043 UART: [afmc] --
23,378,799 UART: [cold-reset] --
23,382,820 UART: [state] Locking Datavault
23,388,656 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,406 UART: [state] Locking ICCM
23,391,748 UART: [exit] Launching FMC @ 0x40000130
23,400,142 UART:
23,400,382 UART: Running Caliptra FMC ...
23,401,499 UART:
23,401,665 UART: [state] CFI Enabled
23,465,822 UART: [fht] FMC Alias Private Key: 7
25,803,266 UART: [art] Extend RT PCRs Done
25,804,490 UART: [art] Lock RT PCRs Done
25,806,197 UART: [art] Populate DV Done
25,811,503 UART: [fht] FMC Alias Private Key: 7
25,813,261 UART: [art] Derive CDI
25,814,082 UART: [art] Store in in slot 0x4
25,876,544 UART: [art] Derive Key Pair
25,877,585 UART: [art] Store priv key in slot 0x5
29,151,064 UART: [art] Derive Key Pair - Done
29,163,966 UART: [art] Signing Cert with AUTHO
29,165,272 UART: RITY.KEYID = 7
31,453,400 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,905 UART: [art] PUB.X = F51DB98E87CD4BFFA6C48B32BC6CC5F0631E730256C310E5CEC83EFD0D2D0AED3E2416A4FD45C4CD271EBC3A3E1741F8
31,462,221 UART: [art] PUB.Y = FCC1F7C714EB9ADB105A6246198B2927BE554B5719E222CB92A1BFC60A69A01293423A43887AB840126416D8E60346AB
31,469,446 UART: [art] SIG.R = BC59132E82C046DAACB56CA95B67F04F5EEDF495FC577431F62FB0CB00BAF0740AA6F6CC6D96D8880E7E4A73C2ADB26E
31,476,843 UART: [art] SIG.S = 3DB505D26E17700B56C597974101F4ABDD4E696ED7E5DD65EEFCFD474DE3884A844716C898AE4ACA9578E032B50A183F
32,782,528 UART: Caliptra RT
32,783,241 UART: [state] CFI Enabled
32,942,957 UART: [rt] RT listening for mailbox commands...
32,944,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,976,048 UART: [rt]cmd =0x44504543, len=96
32,982,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,801,300 ready_for_fw is high
3,801,681 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,888,170 >>> mbox cmd response: success
23,587,619 UART:
23,588,017 UART: Running Caliptra FMC ...
23,589,217 UART:
23,589,396 UART: [state] CFI Enabled
23,656,322 UART: [fht] FMC Alias Private Key: 7
25,993,487 UART: [art] Extend RT PCRs Done
25,994,708 UART: [art] Lock RT PCRs Done
25,996,311 UART: [art] Populate DV Done
26,002,052 UART: [fht] FMC Alias Private Key: 7
26,003,608 UART: [art] Derive CDI
26,004,430 UART: [art] Store in in slot 0x4
26,065,456 UART: [art] Derive Key Pair
26,066,530 UART: [art] Store priv key in slot 0x5
29,359,125 UART: [art] Derive Key Pair - Done
29,372,083 UART: [art] Signing Cert with AUTHO
29,373,393 UART: RITY.KEYID = 7
31,660,793 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,435 UART: [art] PUB.X = 612DFF3D2F9D5D149EE148D0A8DAEAA0043879273CDE2A403A03678F146B81088BB705CB4F8FCA5ABA6AAAAC9C40A111
31,669,606 UART: [art] PUB.Y = 98CAE9DDB426B0BCD881ED0148DCE3EEA9780100D30C63B11F8D50BE250AF6C5056DA39CBF95C43FB2F7FBBEE2C2D453
31,676,819 UART: [art] SIG.R = 8749355C6F72F79FDD3AF744123FB7E14C9A516D3044CB48947B65CC0595091EDFAD7A0A26912E3DBD76139EE454F1FE
31,684,225 UART: [art] SIG.S = 71291B96E03648D37862069A3AEDD605451F089A013CF892131C8E655004FD31ED49D130D85653F58403DE87E92456FD
32,989,694 UART: Caliptra RT
32,990,413 UART: [state] CFI Enabled
33,151,574 UART: [rt] RT listening for mailbox commands...
33,153,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,184,850 UART: [rt]cmd =0x44504543, len=96
33,191,516 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,708 writing to cptra_bootfsm_go
192,874 UART:
193,248 UART: Running Caliptra ROM ...
194,382 UART:
604,033 UART: [state] CFI Enabled
618,374 UART: [state] LifecycleState = Unprovisioned
620,339 UART: [state] DebugLocked = No
622,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,867 UART: [kat] SHA2-256
796,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,175 UART: [kat] ++
807,619 UART: [kat] sha1
818,769 UART: [kat] SHA2-256
821,479 UART: [kat] SHA2-384
827,029 UART: [kat] SHA2-512-ACC
829,392 UART: [kat] ECC-384
3,112,666 UART: [kat] HMAC-384Kdf
3,125,749 UART: [kat] LMS
4,315,874 UART: [kat] --
4,321,353 UART: [cold-reset] ++
4,323,990 UART: [fht] Storing FHT @ 0x50003400
4,336,591 UART: [idev] ++
4,337,168 UART: [idev] CDI.KEYID = 6
4,338,152 UART: [idev] SUBJECT.KEYID = 7
4,339,320 UART: [idev] UDS.KEYID = 0
4,340,393 ready_for_fw is high
4,340,620 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,975 UART: [idev] Erasing UDS.KEYID = 0
7,625,861 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,872 UART: [idev] --
7,652,015 UART: [ldev] ++
7,652,596 UART: [ldev] CDI.KEYID = 6
7,653,558 UART: [ldev] SUBJECT.KEYID = 5
7,654,764 UART: [ldev] AUTHORITY.KEYID = 7
7,656,043 UART: [ldev] FE.KEYID = 1
7,669,166 UART: [ldev] Erasing FE.KEYID = 1
10,956,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,435 UART: [ldev] --
13,316,800 UART: [fwproc] Waiting for Commands...
13,319,802 UART: [fwproc] Received command 0x46574c44
13,321,976 UART: [fwproc] Received Image of size 113760 bytes
17,372,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,840 >>> mbox cmd response: success
17,840,551 UART: [afmc] ++
17,841,139 UART: [afmc] CDI.KEYID = 6
17,842,163 UART: [afmc] SUBJECT.KEYID = 7
17,843,325 UART: [afmc] AUTHORITY.KEYID = 5
21,160,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,702 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,083 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,907 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,364 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,978 UART: [afmc] --
23,528,160 UART: [cold-reset] --
23,531,528 UART: [state] Locking Datavault
23,536,878 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,630 UART: [state] Locking ICCM
23,540,021 UART: [exit] Launching FMC @ 0x40000130
23,548,428 UART:
23,548,661 UART: Running Caliptra FMC ...
23,549,757 UART:
23,549,908 UART: [state] CFI Enabled
23,558,224 UART: [fht] FMC Alias Private Key: 7
25,888,617 UART: [art] Extend RT PCRs Done
25,889,876 UART: [art] Lock RT PCRs Done
25,891,370 UART: [art] Populate DV Done
25,896,780 UART: [fht] FMC Alias Private Key: 7
25,898,483 UART: [art] Derive CDI
25,899,295 UART: [art] Store in in slot 0x4
25,941,622 UART: [art] Derive Key Pair
25,942,622 UART: [art] Store priv key in slot 0x5
29,184,732 UART: [art] Derive Key Pair - Done
29,197,735 UART: [art] Signing Cert with AUTHO
29,199,032 UART: RITY.KEYID = 7
31,478,177 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,697 UART: [art] PUB.X = 4B4987128C71BC1741A7CDCCD552AF4EDE0C3CC30D5B6D0E0B3AA2820E73F33B68B2900D65208B352A2CCC5A7565E5EC
31,486,945 UART: [art] PUB.Y = 4281A55F1468F8DF07D9077BF50B945DAA0F5E410CFD8106E9B6D8FE15C760CD119E991B346BDBD886037E2A4E31D446
31,494,157 UART: [art] SIG.R = 2A5E6D9F94CC45C5AE56E04161A65C139487674B6C1311507A80D78CE1ADB0A588E78CA1326908A65530057E44C8D069
31,501,521 UART: [art] SIG.S = 4F9E5178C7DDA51C86233586B0BEF059802DE4DBC70761FA20D3DEC501E9E45B20874CAFE18C267E6B8205CA728FDDAD
32,807,103 UART: Caliptra RT
32,807,808 UART: [state] CFI Enabled
32,925,965 UART: [rt] RT listening for mailbox commands...
32,927,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,958,303 UART: [rt]cmd =0x44504543, len=96
32,964,762 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,684 writing to cptra_bootfsm_go
4,128,322 ready_for_fw is high
4,128,725 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,870 >>> mbox cmd response: success
23,706,607 UART:
23,707,012 UART: Running Caliptra FMC ...
23,708,153 UART:
23,708,314 UART: [state] CFI Enabled
23,715,983 UART: [fht] FMC Alias Private Key: 7
26,046,353 UART: [art] Extend RT PCRs Done
26,047,865 UART: [art] Lock RT PCRs Done
26,049,527 UART: [art] Populate DV Done
26,054,894 UART: [fht] FMC Alias Private Key: 7
26,056,554 UART: [art] Derive CDI
26,057,370 UART: [art] Store in in slot 0x4
26,100,201 UART: [art] Derive Key Pair
26,101,247 UART: [art] Store priv key in slot 0x5
29,342,767 UART: [art] Derive Key Pair - Done
29,355,506 UART: [art] Signing Cert with AUTHO
29,356,823 UART: RITY.KEYID = 7
31,636,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,891 UART: [art] PUB.X = 5A6F52AF9E67A559DDDD1DEC56DE59166BFEABD8D0A5216E6F3EF2EB2529C5773B900DC219719F6CEA5FB7164380479D
31,645,148 UART: [art] PUB.Y = 64CF0B8391612013BA7C996D61CD829A7EA0B8AF2A658F8CD24EC83BA098B365DBFC6AC3252B77063B52D2382614DCEE
31,652,393 UART: [art] SIG.R = A854E98AE0F1822FCD55FED526D04E46BA11D01DE2F671D5FF92047E650DFE93B85D9AE29AC003276C8CCFCE4D73E313
31,659,779 UART: [art] SIG.S = 1774B39913DA27719ED7C3734D8CC40F6D67A5F83D8C1FF02D2A57D71D03A6A468E64AE8FFE0E1FA310606B32B913CDF
32,964,553 UART: Caliptra RT
32,965,269 UART: [state] CFI Enabled
33,082,225 UART: [rt] RT listening for mailbox commands...
33,084,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,114,815 UART: [rt]cmd =0x44504543, len=96
33,121,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
192,694 UART:
193,089 UART: Running Caliptra ROM ...
194,297 UART:
194,454 UART: [state] CFI Enabled
264,708 UART: [state] LifecycleState = Unprovisioned
266,557 UART: [state] DebugLocked = No
268,088 UART: [state] WD Timer not started. Device not locked for debugging
271,494 UART: [kat] SHA2-256
450,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,145 UART: [kat] ++
462,675 UART: [kat] sha1
473,765 UART: [kat] SHA2-256
476,769 UART: [kat] SHA2-384
484,169 UART: [kat] SHA2-512-ACC
487,099 UART: [kat] ECC-384
2,949,821 UART: [kat] HMAC-384Kdf
2,972,137 UART: [kat] LMS
3,501,552 UART: [kat] --
3,504,066 UART: [cold-reset] ++
3,506,635 UART: [fht] FHT @ 0x50003400
3,518,747 UART: [idev] ++
3,519,305 UART: [idev] CDI.KEYID = 6
3,520,331 UART: [idev] SUBJECT.KEYID = 7
3,521,426 UART: [idev] UDS.KEYID = 0
3,522,468 ready_for_fw is high
3,522,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,144 UART: [idev] Erasing UDS.KEYID = 0
6,022,656 UART: [idev] Sha1 KeyId Algorithm
6,045,729 UART: [idev] --
6,049,564 UART: [ldev] ++
6,050,137 UART: [ldev] CDI.KEYID = 6
6,051,046 UART: [ldev] SUBJECT.KEYID = 5
6,052,206 UART: [ldev] AUTHORITY.KEYID = 7
6,053,506 UART: [ldev] FE.KEYID = 1
6,101,532 UART: [ldev] Erasing FE.KEYID = 1
8,600,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,898 UART: [ldev] --
10,393,033 UART: [fwproc] Wait for Commands...
10,395,614 UART: [fwproc] Recv command 0x46574c44
10,397,670 UART: [fwproc] Recv'd Img size: 114084 bytes
13,795,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,259,793 >>> mbox cmd response: success
14,263,990 UART: [afmc] ++
14,264,611 UART: [afmc] CDI.KEYID = 6
14,265,498 UART: [afmc] SUBJECT.KEYID = 7
14,266,711 UART: [afmc] AUTHORITY.KEYID = 5
16,807,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,230 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,938 UART: [afmc] --
18,609,019 UART: [cold-reset] --
18,611,045 UART: [state] Locking Datavault
18,616,772 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,412 UART: [state] Locking ICCM
18,619,804 UART: [exit] Launching FMC @ 0x40000130
18,628,241 UART:
18,628,514 UART: Running Caliptra FMC ...
18,629,618 UART:
18,629,773 UART: [state] CFI Enabled
18,691,852 UART: [fht] FMC Alias Private Key: 7
20,456,016 UART: [art] Extend RT PCRs Done
20,457,244 UART: [art] Lock RT PCRs Done
20,458,974 UART: [art] Populate DV Done
20,464,327 UART: [fht] FMC Alias Private Key: 7
20,465,852 UART: [art] Derive CDI
20,466,619 UART: [art] Store in in slot 0x4
20,524,246 UART: [art] Derive Key Pair
20,525,247 UART: [art] Store priv key in slot 0x5
22,988,092 UART: [art] Derive Key Pair - Done
23,000,879 UART: [art] Signing Cert with AUTHO
23,002,181 UART: RITY.KEYID = 7
24,714,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,113 UART: [art] PUB.X = B34F55E7B9743A46A290D6B2EFDD0AE697FDBCE386902B617D3D583C651604074A064441E357148F1D2892A5F3504A4B
24,723,377 UART: [art] PUB.Y = 9CA629D2046EF01299D2AB1C869872873A99713EBE6CD6858DA32438EBFF6E7EEC66821850F300374C0AABCE0004A9A6
24,730,587 UART: [art] SIG.R = 082DB37B18465AF896BD860E4173385A4B4DECBE6A57533D51F883CB7F61C0CF3D44314A45DF4455F2F3EE09415331AE
24,737,946 UART: [art] SIG.S = A8C36ECA58A5030687A4EF52FC7A8A265177CA85967CB4D339E8EF13932300678054841F564D16C83B199682AA7401A9
25,716,865 UART: Caliptra RT
25,717,579 UART: [state] CFI Enabled
25,883,316 UART: [rt] RT listening for mailbox commands...
25,885,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,916,465 UART: [rt]cmd =0x44504543, len=96
25,923,082 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,380,720 ready_for_fw is high
3,381,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,827 >>> mbox cmd response: success
18,365,034 UART:
18,365,468 UART: Running Caliptra FMC ...
18,366,581 UART:
18,366,734 UART: [state] CFI Enabled
18,430,148 UART: [fht] FMC Alias Private Key: 7
20,194,355 UART: [art] Extend RT PCRs Done
20,195,566 UART: [art] Lock RT PCRs Done
20,197,291 UART: [art] Populate DV Done
20,202,435 UART: [fht] FMC Alias Private Key: 7
20,204,022 UART: [art] Derive CDI
20,204,758 UART: [art] Store in in slot 0x4
20,262,402 UART: [art] Derive Key Pair
20,263,440 UART: [art] Store priv key in slot 0x5
22,726,171 UART: [art] Derive Key Pair - Done
22,739,222 UART: [art] Signing Cert with AUTHO
22,740,553 UART: RITY.KEYID = 7
24,451,746 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,250 UART: [art] PUB.X = 56598DC47891C161B94913C6E6A43C1040C23E2903401F521E2A7C7A606F078BD3D979BE1C09557FEAAD2B73452A182C
24,460,534 UART: [art] PUB.Y = 1F5198271132C23F101F4F65CDF3113422CA73A4E29053E1A1155E791B7FC8DA015FFD1D4681516DAEDF64AB201B4EAE
24,467,807 UART: [art] SIG.R = FD391CF6D0BD8E5F4ABDF21ECAEF1311DB3C7410B6C5EB7604F7E42231CB4163BBFE1B5C195750097486C360B8419227
24,475,173 UART: [art] SIG.S = D8CFB8412BB4CA4BAEC2AF9C9FDC8D58F2267E8936BB1AD86C5775457FAD31EA2EEB21B421A655DDD1CD732583C5A94B
25,454,018 UART: Caliptra RT
25,454,721 UART: [state] CFI Enabled
25,619,469 UART: [rt] RT listening for mailbox commands...
25,621,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,652,724 UART: [rt]cmd =0x44504543, len=96
25,659,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,140 writing to cptra_bootfsm_go
193,284 UART:
193,658 UART: Running Caliptra ROM ...
194,854 UART:
604,213 UART: [state] CFI Enabled
618,036 UART: [state] LifecycleState = Unprovisioned
619,947 UART: [state] DebugLocked = No
622,414 UART: [state] WD Timer not started. Device not locked for debugging
627,019 UART: [kat] SHA2-256
806,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,768 UART: [kat] ++
818,218 UART: [kat] sha1
827,740 UART: [kat] SHA2-256
830,752 UART: [kat] SHA2-384
837,739 UART: [kat] SHA2-512-ACC
840,674 UART: [kat] ECC-384
3,281,348 UART: [kat] HMAC-384Kdf
3,293,730 UART: [kat] LMS
3,823,243 UART: [kat] --
3,827,373 UART: [cold-reset] ++
3,829,654 UART: [fht] FHT @ 0x50003400
3,839,277 UART: [idev] ++
3,839,840 UART: [idev] CDI.KEYID = 6
3,840,814 UART: [idev] SUBJECT.KEYID = 7
3,841,988 UART: [idev] UDS.KEYID = 0
3,842,890 ready_for_fw is high
3,843,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,746 UART: [idev] Erasing UDS.KEYID = 0
6,314,875 UART: [idev] Sha1 KeyId Algorithm
6,338,248 UART: [idev] --
6,342,188 UART: [ldev] ++
6,342,761 UART: [ldev] CDI.KEYID = 6
6,343,687 UART: [ldev] SUBJECT.KEYID = 5
6,344,851 UART: [ldev] AUTHORITY.KEYID = 7
6,346,141 UART: [ldev] FE.KEYID = 1
6,355,275 UART: [ldev] Erasing FE.KEYID = 1
8,830,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,913 UART: [ldev] --
10,622,996 UART: [fwproc] Wait for Commands...
10,625,690 UART: [fwproc] Recv command 0x46574c44
10,627,783 UART: [fwproc] Recv'd Img size: 114084 bytes
14,026,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,626 >>> mbox cmd response: success
14,492,313 UART: [afmc] ++
14,492,912 UART: [afmc] CDI.KEYID = 6
14,493,801 UART: [afmc] SUBJECT.KEYID = 7
14,495,019 UART: [afmc] AUTHORITY.KEYID = 5
16,992,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,447 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,181 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,229 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,761 UART: [afmc] --
18,791,231 UART: [cold-reset] --
18,796,388 UART: [state] Locking Datavault
18,801,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,124 UART: [state] Locking ICCM
18,805,112 UART: [exit] Launching FMC @ 0x40000130
18,813,508 UART:
18,813,755 UART: Running Caliptra FMC ...
18,814,865 UART:
18,815,024 UART: [state] CFI Enabled
18,823,078 UART: [fht] FMC Alias Private Key: 7
20,579,666 UART: [art] Extend RT PCRs Done
20,580,896 UART: [art] Lock RT PCRs Done
20,582,389 UART: [art] Populate DV Done
20,587,639 UART: [fht] FMC Alias Private Key: 7
20,589,177 UART: [art] Derive CDI
20,589,994 UART: [art] Store in in slot 0x4
20,632,220 UART: [art] Derive Key Pair
20,633,287 UART: [art] Store priv key in slot 0x5
23,060,618 UART: [art] Derive Key Pair - Done
23,073,607 UART: [art] Signing Cert with AUTHO
23,074,917 UART: RITY.KEYID = 7
24,780,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,794 UART: [art] PUB.X = 29096D396B074E13CCDD316146162DEDA9B9C1E8BA3AA932C639F899A541C684AD337D026F5E2D85D454E924C886713C
24,789,061 UART: [art] PUB.Y = 77CFCE80434C18A4F11ADCFCBF02F7FF8BD212F06925716983AABEE714E35CAD068D10A046F10F9DF99D1356DE7C0F4F
24,796,378 UART: [art] SIG.R = ABEF835A16B2BC46953CBF6A14E71BFAA2B9FD4FF09FF1FC3ACC4CF25156E256E63523B510766BF71FC075DA84D1CF96
24,803,798 UART: [art] SIG.S = 10BD3FE0A8F0336275232948D01594423B26201EFE4D5911355154E98A7BCDF5862C3A0E7CED395FE5D7D24953EE6C9B
25,782,751 UART: Caliptra RT
25,783,476 UART: [state] CFI Enabled
25,900,226 UART: [rt] RT listening for mailbox commands...
25,902,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,932,645 UART: [rt]cmd =0x44504543, len=96
25,939,152 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,891 writing to cptra_bootfsm_go
3,695,787 ready_for_fw is high
3,696,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,523 >>> mbox cmd response: success
18,523,972 UART:
18,524,360 UART: Running Caliptra FMC ...
18,525,480 UART:
18,525,636 UART: [state] CFI Enabled
18,533,330 UART: [fht] FMC Alias Private Key: 7
20,290,364 UART: [art] Extend RT PCRs Done
20,291,594 UART: [art] Lock RT PCRs Done
20,293,360 UART: [art] Populate DV Done
20,298,987 UART: [fht] FMC Alias Private Key: 7
20,300,597 UART: [art] Derive CDI
20,301,338 UART: [art] Store in in slot 0x4
20,343,942 UART: [art] Derive Key Pair
20,344,984 UART: [art] Store priv key in slot 0x5
22,771,357 UART: [art] Derive Key Pair - Done
22,784,191 UART: [art] Signing Cert with AUTHO
22,785,492 UART: RITY.KEYID = 7
24,491,361 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,865 UART: [art] PUB.X = D58ADEB98473BA35CB6F3E77F4B2DCAAE8179BD43610E8278BDCA6FAD64E95C1A1FF5253CD8E8286610A319A30BB4CD6
24,500,145 UART: [art] PUB.Y = 6321D555A15007EC917C98AC4C76756569D75337A12DBBF157DAD835B73D0A8FCD6A3F818D77E265C1ECDD2A4734F952
24,507,380 UART: [art] SIG.R = E6A43AE3287CC37A6AD684125203F2C5B933A4E800D96E8F5651CF2BBF2EF1FA7DE46E64C6607D74CE9307728C675944
24,514,832 UART: [art] SIG.S = E693524CAA385CB64E0E95449E7FD64014AFEDADBA64CA2E710E4F44270CAF51508CCD8C4E624EE684BB62DC2BCE9FB1
25,493,409 UART: Caliptra RT
25,494,107 UART: [state] CFI Enabled
25,611,508 UART: [rt] RT listening for mailbox commands...
25,613,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,644,083 UART: [rt]cmd =0x44504543, len=96
25,650,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,898 writing to cptra_bootfsm_go
193,981 UART:
194,351 UART: Running Caliptra ROM ...
195,556 UART:
195,724 UART: [state] CFI Enabled
260,008 UART: [state] LifecycleState = Unprovisioned
262,445 UART: [state] DebugLocked = No
264,901 UART: [state] WD Timer not started. Device not locked for debugging
269,376 UART: [kat] SHA2-256
459,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,022 UART: [kat] ++
470,517 UART: [kat] sha1
482,770 UART: [kat] SHA2-256
485,756 UART: [kat] SHA2-384
491,677 UART: [kat] SHA2-512-ACC
494,269 UART: [kat] ECC-384
2,950,397 UART: [kat] HMAC-384Kdf
2,973,400 UART: [kat] LMS
3,505,198 UART: [kat] --
3,510,609 UART: [cold-reset] ++
3,511,692 UART: [fht] FHT @ 0x50003400
3,522,186 UART: [idev] ++
3,522,859 UART: [idev] CDI.KEYID = 6
3,523,860 UART: [idev] SUBJECT.KEYID = 7
3,525,039 UART: [idev] UDS.KEYID = 0
3,525,985 ready_for_fw is high
3,526,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,642 UART: [idev] Erasing UDS.KEYID = 0
6,035,401 UART: [idev] Sha1 KeyId Algorithm
6,058,745 UART: [idev] --
6,063,113 UART: [ldev] ++
6,063,792 UART: [ldev] CDI.KEYID = 6
6,064,678 UART: [ldev] SUBJECT.KEYID = 5
6,065,888 UART: [ldev] AUTHORITY.KEYID = 7
6,067,120 UART: [ldev] FE.KEYID = 1
6,104,809 UART: [ldev] Erasing FE.KEYID = 1
8,610,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,675 UART: [ldev] --
10,420,392 UART: [fwproc] Wait for Commands...
10,423,190 UART: [fwproc] Recv command 0x46574c44
10,425,443 UART: [fwproc] Recv'd Img size: 114084 bytes
13,875,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,607,533 >>> mbox cmd response: success
14,610,888 UART: [afmc] ++
14,611,600 UART: [afmc] CDI.KEYID = 6
14,612,788 UART: [afmc] SUBJECT.KEYID = 7
14,614,227 UART: [afmc] AUTHORITY.KEYID = 5
17,157,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,880,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,882,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,897,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,912,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,927,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,952,165 UART: [afmc] --
18,955,600 UART: [cold-reset] --
18,959,087 UART: [state] Locking Datavault
18,965,279 UART: [state] Locking PCR0, PCR1 and PCR31
18,967,487 UART: [state] Locking ICCM
18,969,470 UART: [exit] Launching FMC @ 0x40000130
18,978,156 UART:
18,978,383 UART: Running Caliptra FMC ...
18,979,408 UART:
18,979,551 UART: [state] CFI Enabled
19,038,340 UART: [fht] FMC Alias Private Key: 7
20,802,665 UART: [art] Extend RT PCRs Done
20,803,875 UART: [art] Lock RT PCRs Done
20,805,520 UART: [art] Populate DV Done
20,810,942 UART: [fht] FMC Alias Private Key: 7
20,812,634 UART: [art] Derive CDI
20,813,366 UART: [art] Store in in slot 0x4
20,871,048 UART: [art] Derive Key Pair
20,872,042 UART: [art] Store priv key in slot 0x5
23,334,782 UART: [art] Derive Key Pair - Done
23,347,667 UART: [art] Signing Cert with AUTHO
23,348,961 UART: RITY.KEYID = 7
25,061,329 UART: [art] Erasing AUTHORITY.KEYID = 7
25,062,891 UART: [art] PUB.X = E6D2A18A984F59B8A7EA3AA3E7858BB74E8B478FB0DD93689BBDA689D7736110145E37E63AF91D4DBD516F8FBFF454C7
25,070,118 UART: [art] PUB.Y = 09867688AB343B6BC76A1B8D148E87E685FF3BC2747B03E04F9FAD46C60841C1555C95C54BA2441FDA5505CA3DBFC1D9
25,077,423 UART: [art] SIG.R = BC0FBBA46ECFF447BF0489D1B9E68AD1BD3E556BAC81DA3F5873A0C5F4280236571E84EB4AE044B2C00933979A067AD6
25,084,785 UART: [art] SIG.S = 443264CAA35EBFCEB7C2FF28AEB9C9147E65F63C85D979B5003B25F73B1F128FDA0C138E7D9D1B3A35F417B1D2EE65B2
26,063,378 UART: Caliptra RT
26,064,072 UART: [state] CFI Enabled
26,230,553 UART: [rt] RT listening for mailbox commands...
26,232,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,263,791 UART: [rt]cmd =0x44504543, len=96
26,270,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,439,927 ready_for_fw is high
3,440,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,392 >>> mbox cmd response: success
19,005,584 UART:
19,005,992 UART: Running Caliptra FMC ...
19,007,125 UART:
19,007,285 UART: [state] CFI Enabled
19,074,617 UART: [fht] FMC Alias Private Key: 7
20,838,938 UART: [art] Extend RT PCRs Done
20,840,166 UART: [art] Lock RT PCRs Done
20,841,735 UART: [art] Populate DV Done
20,847,309 UART: [fht] FMC Alias Private Key: 7
20,848,796 UART: [art] Derive CDI
20,849,560 UART: [art] Store in in slot 0x4
20,907,142 UART: [art] Derive Key Pair
20,908,211 UART: [art] Store priv key in slot 0x5
23,371,027 UART: [art] Derive Key Pair - Done
23,383,806 UART: [art] Signing Cert with AUTHO
23,385,143 UART: RITY.KEYID = 7
25,096,481 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,995 UART: [art] PUB.X = B21F83241B112FE88C4DFDF4C196AFEFC26E76EC0BEE7C7BD5F8A164A2AD1F706F775876B05B6138B13D79329166C08E
25,105,261 UART: [art] PUB.Y = 9C382C2E5BE64167CDC8A890E28B4D23C42517BF8EDB40E870B0EA2F333936DC2554246A5154034FE2D4068821686EDC
25,112,499 UART: [art] SIG.R = BB028E990F91F94F47B417B503480B52C4E4553DB2BEB613ED6E1E0C961180ECE47A59C2DC398C520EDDAD1887EE9192
25,119,896 UART: [art] SIG.S = 353222F6CA45529124FE6F283423EE9CFE8065E25902BA334F46388ECD7DDB8ACBFFA13536A1D11D2A6D9F0ED48EBFD8
26,098,816 UART: Caliptra RT
26,099,514 UART: [state] CFI Enabled
26,263,220 UART: [rt] RT listening for mailbox commands...
26,265,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,296,224 UART: [rt]cmd =0x44504543, len=96
26,302,805 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
192,903 UART:
193,293 UART: Running Caliptra ROM ...
194,426 UART:
604,162 UART: [state] CFI Enabled
618,333 UART: [state] LifecycleState = Unprovisioned
620,711 UART: [state] DebugLocked = No
622,517 UART: [state] WD Timer not started. Device not locked for debugging
627,685 UART: [kat] SHA2-256
817,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,365 UART: [kat] ++
828,887 UART: [kat] sha1
840,822 UART: [kat] SHA2-256
843,826 UART: [kat] SHA2-384
849,176 UART: [kat] SHA2-512-ACC
851,764 UART: [kat] ECC-384
3,294,271 UART: [kat] HMAC-384Kdf
3,308,508 UART: [kat] LMS
3,840,296 UART: [kat] --
3,844,007 UART: [cold-reset] ++
3,844,883 UART: [fht] FHT @ 0x50003400
3,855,829 UART: [idev] ++
3,856,485 UART: [idev] CDI.KEYID = 6
3,857,467 UART: [idev] SUBJECT.KEYID = 7
3,858,642 UART: [idev] UDS.KEYID = 0
3,859,566 ready_for_fw is high
3,859,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,913 UART: [idev] Erasing UDS.KEYID = 0
6,332,035 UART: [idev] Sha1 KeyId Algorithm
6,355,594 UART: [idev] --
6,359,375 UART: [ldev] ++
6,360,053 UART: [ldev] CDI.KEYID = 6
6,360,969 UART: [ldev] SUBJECT.KEYID = 5
6,362,121 UART: [ldev] AUTHORITY.KEYID = 7
6,363,351 UART: [ldev] FE.KEYID = 1
6,374,213 UART: [ldev] Erasing FE.KEYID = 1
8,854,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,272 UART: [ldev] --
10,646,994 UART: [fwproc] Wait for Commands...
10,649,259 UART: [fwproc] Recv command 0x46574c44
10,651,581 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,831,607 >>> mbox cmd response: success
14,835,352 UART: [afmc] ++
14,836,079 UART: [afmc] CDI.KEYID = 6
14,837,275 UART: [afmc] SUBJECT.KEYID = 7
14,838,720 UART: [afmc] AUTHORITY.KEYID = 5
17,340,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,591 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,867 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,133,514 UART: [afmc] --
19,137,429 UART: [cold-reset] --
19,141,637 UART: [state] Locking Datavault
19,147,822 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,975 UART: [state] Locking ICCM
19,152,945 UART: [exit] Launching FMC @ 0x40000130
19,161,639 UART:
19,161,884 UART: Running Caliptra FMC ...
19,162,990 UART:
19,163,153 UART: [state] CFI Enabled
19,171,426 UART: [fht] FMC Alias Private Key: 7
20,928,757 UART: [art] Extend RT PCRs Done
20,929,964 UART: [art] Lock RT PCRs Done
20,931,744 UART: [art] Populate DV Done
20,937,261 UART: [fht] FMC Alias Private Key: 7
20,938,869 UART: [art] Derive CDI
20,939,609 UART: [art] Store in in slot 0x4
20,982,851 UART: [art] Derive Key Pair
20,983,884 UART: [art] Store priv key in slot 0x5
23,410,828 UART: [art] Derive Key Pair - Done
23,423,778 UART: [art] Signing Cert with AUTHO
23,425,090 UART: RITY.KEYID = 7
25,130,460 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,950 UART: [art] PUB.X = 222EFDFF3844EF3025AAFE59066C437A0BD23FC1607CA199B89910CF82595CF1A259857A68863D4D96E1E6C1F7379131
25,139,225 UART: [art] PUB.Y = D5DADFEF0C17DD979CF35AD0F0B9CF8B7BB107BB936B88FAE298BABE5F322D58482DAC987A8122E4C87D72097417C9A6
25,146,537 UART: [art] SIG.R = 8094B6C75D7248E058FC8872A395B5334AD85D4C449F449D12007C9857C4A61A2619686E2C13BB5158A597EFC68D58C3
25,153,904 UART: [art] SIG.S = CB600123266D5390EC0D734B2CECC563478F664605E5C42DF840C386A4E4380AD4E612C53139884013D277A3AD27E48E
26,132,912 UART: Caliptra RT
26,133,619 UART: [state] CFI Enabled
26,251,404 UART: [rt] RT listening for mailbox commands...
26,253,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,168 UART: [rt]cmd =0x44504543, len=96
26,290,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,593 writing to cptra_bootfsm_go
3,760,162 ready_for_fw is high
3,760,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,355 >>> mbox cmd response: success
19,210,076 UART:
19,210,474 UART: Running Caliptra FMC ...
19,211,683 UART:
19,211,857 UART: [state] CFI Enabled
19,219,814 UART: [fht] FMC Alias Private Key: 7
20,976,929 UART: [art] Extend RT PCRs Done
20,978,152 UART: [art] Lock RT PCRs Done
20,979,467 UART: [art] Populate DV Done
20,984,939 UART: [fht] FMC Alias Private Key: 7
20,986,646 UART: [art] Derive CDI
20,987,463 UART: [art] Store in in slot 0x4
21,030,063 UART: [art] Derive Key Pair
21,031,075 UART: [art] Store priv key in slot 0x5
23,457,685 UART: [art] Derive Key Pair - Done
23,470,846 UART: [art] Signing Cert with AUTHO
23,472,178 UART: RITY.KEYID = 7
25,177,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,196 UART: [art] PUB.X = 747F66BF01D5E165B00DFF8EE9AE023CC11A14CFC86034C5403F21273050D72A0EE07DD7F8309BE92EC766C3F85F82FB
25,186,442 UART: [art] PUB.Y = BD436CF5528D82C3B5BA27FCB9B9166F57CE2805D61885574C015B30AC9A7B930920FD376E8B0065807B2CFEE503CB55
25,193,676 UART: [art] SIG.R = D1B26DE80BB42ABA760328A3D7A6B99B5AAFA162D5DCCBAE1E124AF73567FC5D2164CB70ADAFAA0F971B60ED0ABE8CE7
25,201,125 UART: [art] SIG.S = 52899E556A427E06BAF91700B13FD5F5E205E3B1370E91BE7ADE595DAD64916B288A6AFB0348F033FC20C1884E2E8F57
26,180,183 UART: Caliptra RT
26,180,876 UART: [state] CFI Enabled
26,298,044 UART: [rt] RT listening for mailbox commands...
26,299,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,557 UART: [rt]cmd =0x44504543, len=96
26,337,156 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,123 UART: [kat] SHA2-256
882,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,169 UART: [kat] ++
886,321 UART: [kat] sha1
890,599 UART: [kat] SHA2-256
892,537 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,752 UART: [kat] LMS
1,475,948 UART: [kat] --
1,477,001 UART: [cold-reset] ++
1,477,433 UART: [fht] Storing FHT @ 0x50003400
1,480,288 UART: [idev] ++
1,480,456 UART: [idev] CDI.KEYID = 6
1,480,816 UART: [idev] SUBJECT.KEYID = 7
1,481,240 UART: [idev] UDS.KEYID = 0
1,481,585 ready_for_fw is high
1,481,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,004 UART: [idev] Erasing UDS.KEYID = 0
1,505,168 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,646 UART: [idev] --
1,514,881 UART: [ldev] ++
1,515,049 UART: [ldev] CDI.KEYID = 6
1,515,412 UART: [ldev] SUBJECT.KEYID = 5
1,515,838 UART: [ldev] AUTHORITY.KEYID = 7
1,516,301 UART: [ldev] FE.KEYID = 1
1,521,523 UART: [ldev] Erasing FE.KEYID = 1
1,546,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,572 UART: [ldev] --
1,585,891 UART: [fwproc] Waiting for Commands...
1,586,736 UART: [fwproc] Received command 0x46574c44
1,587,527 UART: [fwproc] Received Image of size 114084 bytes
2,881,899 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,630 >>> mbox cmd response: success
3,074,754 UART: [afmc] ++
3,074,922 UART: [afmc] CDI.KEYID = 6
3,075,284 UART: [afmc] SUBJECT.KEYID = 7
3,075,709 UART: [afmc] AUTHORITY.KEYID = 5
3,111,146 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,865 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,555 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,412 UART: [afmc] --
3,154,510 UART: [cold-reset] --
3,155,366 UART: [state] Locking Datavault
3,156,307 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,911 UART: [state] Locking ICCM
3,157,371 UART: [exit] Launching FMC @ 0x40000130
3,162,700 UART:
3,162,716 UART: Running Caliptra FMC ...
3,163,124 UART:
3,163,178 UART: [state] CFI Enabled
3,174,085 UART: [fht] FMC Alias Private Key: 7
3,281,710 UART: [art] Extend RT PCRs Done
3,282,138 UART: [art] Lock RT PCRs Done
3,283,696 UART: [art] Populate DV Done
3,291,891 UART: [fht] FMC Alias Private Key: 7
3,292,829 UART: [art] Derive CDI
3,293,109 UART: [art] Store in in slot 0x4
3,378,912 UART: [art] Derive Key Pair
3,379,272 UART: [art] Store priv key in slot 0x5
3,392,502 UART: [art] Derive Key Pair - Done
3,407,268 UART: [art] Signing Cert with AUTHO
3,407,748 UART: RITY.KEYID = 7
3,422,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,133 UART: [art] PUB.X = 08B21E2A4DFDBFA4CEEDBD37CC9C79E8E24C77B5E185854FFCE5DF7662726B2A5099BC81E9643D65A6A0485223C16697
3,429,914 UART: [art] PUB.Y = 46B19E0BAEACE82FD216DC3E20A1D32174D2575CAF79A31EDEEEA8AFC7C6C962E528236ABD984D0A1031371E0F9D2F23
3,436,875 UART: [art] SIG.R = 490BD9256A41E0BD61E59337BF97BF99A997679378FBA1289F8246F278EBA0E1A172D3A664A120934DEE075FE027F91E
3,443,641 UART: [art] SIG.S = 7245562167500BB526440557778B840AA36B34E63B692CC9C741C175B254928F3E675B436A00843F2D7DB824B567A93B
3,467,601 UART: Caliptra RT
3,467,854 UART: [state] CFI Enabled
3,575,814 UART: [rt] RT listening for mailbox commands...
3,576,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,804 UART: [rt]cmd =0x44504543, len=96
3,613,832 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,565 ready_for_fw is high
1,362,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,562 >>> mbox cmd response: success
2,985,510 UART:
2,985,526 UART: Running Caliptra FMC ...
2,985,934 UART:
2,985,988 UART: [state] CFI Enabled
2,996,265 UART: [fht] FMC Alias Private Key: 7
3,104,922 UART: [art] Extend RT PCRs Done
3,105,350 UART: [art] Lock RT PCRs Done
3,107,088 UART: [art] Populate DV Done
3,115,245 UART: [fht] FMC Alias Private Key: 7
3,116,241 UART: [art] Derive CDI
3,116,521 UART: [art] Store in in slot 0x4
3,201,778 UART: [art] Derive Key Pair
3,202,138 UART: [art] Store priv key in slot 0x5
3,215,122 UART: [art] Derive Key Pair - Done
3,229,906 UART: [art] Signing Cert with AUTHO
3,230,386 UART: RITY.KEYID = 7
3,245,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,263 UART: [art] PUB.X = 76B4CF784373CF123226B02E36E6C8860171F62859C17204541F0210392EB2002D3C7E0FB690A2F036134CB50AD77B2D
3,252,988 UART: [art] PUB.Y = 54795B1984CB1F4FD275B4DB12F372B56DC588A9D47396585DAA2A9B59FACE4B9F6537DDDEEC0AA08FDCCA99283855D0
3,259,953 UART: [art] SIG.R = 22D802AB41B4DCCEFEBE7BF28220C2B844CC5E2E70DC0023CA183FF1DE47BDA8F9F8C0B60A63B8659B1FF30B607DA50D
3,266,715 UART: [art] SIG.S = F9F3BC0CCF0376225014C37F74C9BB0E83E0CF9AC28FA230FFEDD5BB7DDAEBC1BA2A72902D44F6B4EC9CC8D9E871958E
3,290,221 UART: Caliptra RT
3,290,474 UART: [state] CFI Enabled
3,398,251 UART: [rt] RT listening for mailbox commands...
3,398,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,307 UART: [rt]cmd =0x44504543, len=96
3,436,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,366 UART: [kat] SHA2-256
882,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,412 UART: [kat] ++
886,564 UART: [kat] sha1
890,758 UART: [kat] SHA2-256
892,696 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,833 UART: [idev] ++
1,480,001 UART: [idev] CDI.KEYID = 6
1,480,361 UART: [idev] SUBJECT.KEYID = 7
1,480,785 UART: [idev] UDS.KEYID = 0
1,481,130 ready_for_fw is high
1,481,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,925 UART: [idev] Erasing UDS.KEYID = 0
1,505,959 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,483 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,521,976 UART: [ldev] Erasing FE.KEYID = 1
1,547,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,781 UART: [ldev] --
1,587,216 UART: [fwproc] Waiting for Commands...
1,588,049 UART: [fwproc] Received command 0x46574c44
1,588,840 UART: [fwproc] Received Image of size 114084 bytes
2,883,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,677 >>> mbox cmd response: success
3,076,883 UART: [afmc] ++
3,077,051 UART: [afmc] CDI.KEYID = 6
3,077,413 UART: [afmc] SUBJECT.KEYID = 7
3,077,838 UART: [afmc] AUTHORITY.KEYID = 5
3,113,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,084 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,774 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,695 UART: [afmc] --
3,156,681 UART: [cold-reset] --
3,157,683 UART: [state] Locking Datavault
3,158,852 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,456 UART: [state] Locking ICCM
3,160,124 UART: [exit] Launching FMC @ 0x40000130
3,165,453 UART:
3,165,469 UART: Running Caliptra FMC ...
3,165,877 UART:
3,166,020 UART: [state] CFI Enabled
3,176,775 UART: [fht] FMC Alias Private Key: 7
3,284,766 UART: [art] Extend RT PCRs Done
3,285,194 UART: [art] Lock RT PCRs Done
3,286,530 UART: [art] Populate DV Done
3,294,545 UART: [fht] FMC Alias Private Key: 7
3,295,715 UART: [art] Derive CDI
3,295,995 UART: [art] Store in in slot 0x4
3,381,800 UART: [art] Derive Key Pair
3,382,160 UART: [art] Store priv key in slot 0x5
3,395,622 UART: [art] Derive Key Pair - Done
3,410,314 UART: [art] Signing Cert with AUTHO
3,410,794 UART: RITY.KEYID = 7
3,425,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,753 UART: [art] PUB.X = 3017383000DF5C2FA366CF447049296753B84034E0508DF15D0812A25127F7449E3D4F81FE49929C8A3A8E33434B712D
3,433,486 UART: [art] PUB.Y = A80A57181D57FD9F969CAAA9F31E8EDFCF34357CE0024A8101E87CF76C38B61E5672A1C138040FE61AEED5B33F2CF270
3,440,435 UART: [art] SIG.R = 470A319E492AEE0CA2193531FF93036E8DDF6B594A615994FA448C6DEC4107E322640640DC2E547FF0E02E763010B4FC
3,447,192 UART: [art] SIG.S = F1FAF02FBCE4DBE790CEDB33D9BD70349B53850AA1E8784F12D2A21D5F04AC835650E3B896C6D25934B799AE8263C8B0
3,471,297 UART: Caliptra RT
3,471,642 UART: [state] CFI Enabled
3,580,335 UART: [rt] RT listening for mailbox commands...
3,581,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,529 UART: [rt]cmd =0x44504543, len=96
3,618,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,426 ready_for_fw is high
1,362,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,163 >>> mbox cmd response: success
2,984,759 UART:
2,984,775 UART: Running Caliptra FMC ...
2,985,183 UART:
2,985,326 UART: [state] CFI Enabled
2,995,973 UART: [fht] FMC Alias Private Key: 7
3,103,134 UART: [art] Extend RT PCRs Done
3,103,562 UART: [art] Lock RT PCRs Done
3,105,078 UART: [art] Populate DV Done
3,113,017 UART: [fht] FMC Alias Private Key: 7
3,114,001 UART: [art] Derive CDI
3,114,281 UART: [art] Store in in slot 0x4
3,199,812 UART: [art] Derive Key Pair
3,200,172 UART: [art] Store priv key in slot 0x5
3,213,610 UART: [art] Derive Key Pair - Done
3,228,232 UART: [art] Signing Cert with AUTHO
3,228,712 UART: RITY.KEYID = 7
3,244,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,203 UART: [art] PUB.X = D32F67CBF0D5303E124E2120A69587ABB478A91E110DAD8C448342E11DB8AB1338F0E17ACB7A49763834D663764140CB
3,251,972 UART: [art] PUB.Y = DBF0A2AE1CF2419E54E17899FE0A71ABA85758E2F8BDEA55536016AECB4FDD75B3A3ED6705B33DF678612CA0C3AB1702
3,258,933 UART: [art] SIG.R = 818C48B4FCBE08790366AABBC86CCF41D14E4D6692C8E64F0C306F2F278B641466D8F3807576F555BDBA2826154C3F39
3,265,698 UART: [art] SIG.S = AE7795845C49F4C5E0214CD302D2BE7AC1ACFC47C1E23903A29D30024ECD3861F6B73238E988A1F82E8FAD1291D849DE
3,289,644 UART: Caliptra RT
3,289,989 UART: [state] CFI Enabled
3,397,531 UART: [rt] RT listening for mailbox commands...
3,398,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,621 UART: [rt]cmd =0x44504543, len=96
3,435,893 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,538 UART: [kat] HMAC-384Kdf
923,018 UART: [kat] LMS
1,171,346 UART: [kat] --
1,172,295 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,378 UART: [idev] ++
1,175,546 UART: [idev] CDI.KEYID = 6
1,175,906 UART: [idev] SUBJECT.KEYID = 7
1,176,330 UART: [idev] UDS.KEYID = 0
1,176,675 ready_for_fw is high
1,176,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,541 UART: [idev] Sha1 KeyId Algorithm
1,209,157 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,217,047 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,681 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,906 UART: [fwproc] Recv command 0x46574c44
1,284,634 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,265 >>> mbox cmd response: success
2,771,341 UART: [afmc] ++
2,771,509 UART: [afmc] CDI.KEYID = 6
2,771,871 UART: [afmc] SUBJECT.KEYID = 7
2,772,296 UART: [afmc] AUTHORITY.KEYID = 5
2,808,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,120 UART: [afmc] --
2,851,202 UART: [cold-reset] --
2,851,918 UART: [state] Locking Datavault
2,853,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,009 UART: [state] Locking ICCM
2,854,593 UART: [exit] Launching FMC @ 0x40000130
2,859,922 UART:
2,859,938 UART: Running Caliptra FMC ...
2,860,346 UART:
2,860,400 UART: [state] CFI Enabled
2,870,601 UART: [fht] FMC Alias Private Key: 7
2,978,642 UART: [art] Extend RT PCRs Done
2,979,070 UART: [art] Lock RT PCRs Done
2,980,990 UART: [art] Populate DV Done
2,989,245 UART: [fht] FMC Alias Private Key: 7
2,990,281 UART: [art] Derive CDI
2,990,561 UART: [art] Store in in slot 0x4
3,076,036 UART: [art] Derive Key Pair
3,076,396 UART: [art] Store priv key in slot 0x5
3,089,246 UART: [art] Derive Key Pair - Done
3,104,177 UART: [art] Signing Cert with AUTHO
3,104,657 UART: RITY.KEYID = 7
3,119,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,220 UART: [art] PUB.X = D9C79FD9E166045DB2ECECD2E0CD8BA94A955616D99B9BA12D7640F32987F1AF2EE6C14174CCC9C47BFECDC4F9A96DCC
3,127,015 UART: [art] PUB.Y = 2C0DDE29FCEEB9FA2DDCAAA8D1DCFA52FEC5130D992DC01E09055518B1556440C19677F123BE9FD22FEC8DA879139374
3,133,973 UART: [art] SIG.R = F507381F44244F555A31EEF45D64F36958E5EAAD0795C8B7D086B436E6E547CF93D0C53F7B3D17A675AC4773E7AC7D02
3,140,740 UART: [art] SIG.S = CB0CA50A50B4166BB95E5FBD5B5B44F20DD54835BD510848021CCA35EFB461C2C31B4A9CE0CE6927CD8066700FC6CCF6
3,163,833 UART: Caliptra RT
3,164,086 UART: [state] CFI Enabled
3,271,442 UART: [rt] RT listening for mailbox commands...
3,272,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,306 UART: [rt]cmd =0x44504543, len=96
3,309,382 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,477 ready_for_fw is high
1,060,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,044 >>> mbox cmd response: success
2,686,154 UART:
2,686,170 UART: Running Caliptra FMC ...
2,686,578 UART:
2,686,632 UART: [state] CFI Enabled
2,697,091 UART: [fht] FMC Alias Private Key: 7
2,804,718 UART: [art] Extend RT PCRs Done
2,805,146 UART: [art] Lock RT PCRs Done
2,806,758 UART: [art] Populate DV Done
2,815,041 UART: [fht] FMC Alias Private Key: 7
2,816,037 UART: [art] Derive CDI
2,816,317 UART: [art] Store in in slot 0x4
2,901,924 UART: [art] Derive Key Pair
2,902,284 UART: [art] Store priv key in slot 0x5
2,915,600 UART: [art] Derive Key Pair - Done
2,930,163 UART: [art] Signing Cert with AUTHO
2,930,643 UART: RITY.KEYID = 7
2,945,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,430 UART: [art] PUB.X = D579FA210BF3FF62E47442F2ADCE48825A0005877C56E7C8E1A3F8B49D1FE57E4005DDE2B2967935606E5B7A24736768
2,953,171 UART: [art] PUB.Y = 37F0CF037016C64048369137B82288FA4152A467C7A38A208B77AD692C23A61B7CA602B6802B5463131D79E33EAFC137
2,960,107 UART: [art] SIG.R = 7D2B71D34C8BE74F5BC8537FD087F9D5D7AAC31A8203E818597EA10DFB694E99CA7A9263B0CE5820E089AA3B531C8149
2,966,881 UART: [art] SIG.S = 31AE064CC1EB9E715EC32C4FDC44373CE6571924BBE2BA610FF4B64DC1810551F61F52A98471103F92874FA9E59121B3
2,990,925 UART: Caliptra RT
2,991,178 UART: [state] CFI Enabled
3,098,305 UART: [rt] RT listening for mailbox commands...
3,098,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,443 UART: [rt]cmd =0x44504543, len=96
3,136,607 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
901,880 UART: [kat] SHA2-256
903,820 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,172,088 UART: [cold-reset] ++
1,172,436 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 ready_for_fw is high
1,176,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,201,354 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,802 UART: [ldev] ++
1,210,970 UART: [ldev] CDI.KEYID = 6
1,211,333 UART: [ldev] SUBJECT.KEYID = 5
1,211,759 UART: [ldev] AUTHORITY.KEYID = 7
1,212,222 UART: [ldev] FE.KEYID = 1
1,217,174 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,583 UART: [fwproc] Wait for Commands...
1,284,365 UART: [fwproc] Recv command 0x46574c44
1,285,093 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,971 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,446 >>> mbox cmd response: success
2,772,498 UART: [afmc] ++
2,772,666 UART: [afmc] CDI.KEYID = 6
2,773,028 UART: [afmc] SUBJECT.KEYID = 7
2,773,453 UART: [afmc] AUTHORITY.KEYID = 5
2,809,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,269 UART: [afmc] --
2,852,379 UART: [cold-reset] --
2,853,235 UART: [state] Locking Datavault
2,854,430 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,034 UART: [state] Locking ICCM
2,855,696 UART: [exit] Launching FMC @ 0x40000130
2,861,025 UART:
2,861,041 UART: Running Caliptra FMC ...
2,861,449 UART:
2,861,592 UART: [state] CFI Enabled
2,872,271 UART: [fht] FMC Alias Private Key: 7
2,979,998 UART: [art] Extend RT PCRs Done
2,980,426 UART: [art] Lock RT PCRs Done
2,981,996 UART: [art] Populate DV Done
2,990,007 UART: [fht] FMC Alias Private Key: 7
2,990,955 UART: [art] Derive CDI
2,991,235 UART: [art] Store in in slot 0x4
3,077,014 UART: [art] Derive Key Pair
3,077,374 UART: [art] Store priv key in slot 0x5
3,090,324 UART: [art] Derive Key Pair - Done
3,104,785 UART: [art] Signing Cert with AUTHO
3,105,265 UART: RITY.KEYID = 7
3,120,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,020 UART: [art] PUB.X = 922160F2C4E57B915546B5E1A80932FDA47DA75C02348854A350CF36ADD7A30587441E4464750997A1067C777426D734
3,127,761 UART: [art] PUB.Y = D0C4A8AF88A4132F15D2F4941060FC219F39B357F1B28C01A9FD1DC976CBE7E6A24C50182571C8D1E474A8E26F650C4D
3,134,713 UART: [art] SIG.R = 8B5CB04EAA6E10FDB32E4778A7DB46D63376C82E5A5160D0B8A90192A980D025A7C8DD954F5BD0606F482CF87773C1FB
3,141,490 UART: [art] SIG.S = E035461BE3A50454A75FCF1EF5E4A9120DB71D54DB98D8D1AB492434D33A85A5F82D86A34D991B53BD862594A034EFE9
3,165,745 UART: Caliptra RT
3,166,090 UART: [state] CFI Enabled
3,274,724 UART: [rt] RT listening for mailbox commands...
3,275,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,692 UART: [rt]cmd =0x44504543, len=96
3,312,766 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 ready_for_fw is high
1,060,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,981 >>> mbox cmd response: success
2,687,949 UART:
2,687,965 UART: Running Caliptra FMC ...
2,688,373 UART:
2,688,516 UART: [state] CFI Enabled
2,698,885 UART: [fht] FMC Alias Private Key: 7
2,806,822 UART: [art] Extend RT PCRs Done
2,807,250 UART: [art] Lock RT PCRs Done
2,808,766 UART: [art] Populate DV Done
2,817,097 UART: [fht] FMC Alias Private Key: 7
2,818,235 UART: [art] Derive CDI
2,818,515 UART: [art] Store in in slot 0x4
2,904,274 UART: [art] Derive Key Pair
2,904,634 UART: [art] Store priv key in slot 0x5
2,917,686 UART: [art] Derive Key Pair - Done
2,932,446 UART: [art] Signing Cert with AUTHO
2,932,926 UART: RITY.KEYID = 7
2,948,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,959 UART: [art] PUB.X = 18FE55A71EDC283ADAC17E045D2B4AAE92A6E38134BDCCEC68D18E2DF46E22902083F3D6EEF5349CA446F33272827EF9
2,955,742 UART: [art] PUB.Y = F25688EFD640B98D9CB4AC1C391C5C77CBB83258740F5909E6693D736A09F50276BE045D865F24619B5F9EED99FAB908
2,962,678 UART: [art] SIG.R = A2D332AE72427CAD2FF98F2D3BD4812120915D5EB8F1EB5C9E23A77E02B8D3BE3EEEF02C179F4E67FA5B26DED2D72599
2,969,465 UART: [art] SIG.S = 5319B7A8690E561AC2FE14F41C7FA25CDB73F744DD0789593A11AE359A87C0F35E7F2B410386A4BF9914186B9EE6AA35
2,992,787 UART: Caliptra RT
2,993,132 UART: [state] CFI Enabled
3,099,521 UART: [rt] RT listening for mailbox commands...
3,100,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,543 UART: [rt]cmd =0x44504543, len=96
3,137,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 ready_for_fw is high
1,174,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha1 KeyId Algorithm
1,206,965 UART: [idev] --
1,208,112 UART: [ldev] ++
1,208,280 UART: [ldev] CDI.KEYID = 6
1,208,644 UART: [ldev] SUBJECT.KEYID = 5
1,209,071 UART: [ldev] AUTHORITY.KEYID = 7
1,209,534 UART: [ldev] FE.KEYID = 1
1,214,848 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,304 UART: [ldev] --
1,279,758 UART: [fwproc] Wait for Commands...
1,280,577 UART: [fwproc] Recv command 0x46574c44
1,281,310 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,231 >>> mbox cmd response: success
2,769,300 UART: [afmc] ++
2,769,468 UART: [afmc] CDI.KEYID = 6
2,769,831 UART: [afmc] SUBJECT.KEYID = 7
2,770,257 UART: [afmc] AUTHORITY.KEYID = 5
2,805,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,725 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,291 UART: [afmc] --
2,848,189 UART: [cold-reset] --
2,848,949 UART: [state] Locking Datavault
2,849,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,556 UART: [state] Locking ICCM
2,851,096 UART: [exit] Launching FMC @ 0x40000130
2,856,425 UART:
2,856,441 UART: Running Caliptra FMC ...
2,856,849 UART:
2,856,903 UART: [state] CFI Enabled
2,867,650 UART: [fht] FMC Alias Private Key: 7
2,975,487 UART: [art] Extend RT PCRs Done
2,975,915 UART: [art] Lock RT PCRs Done
2,977,655 UART: [art] Populate DV Done
2,985,618 UART: [fht] FMC Alias Private Key: 7
2,986,566 UART: [art] Derive CDI
2,986,846 UART: [art] Store in in slot 0x4
3,072,667 UART: [art] Derive Key Pair
3,073,027 UART: [art] Store priv key in slot 0x5
3,086,013 UART: [art] Derive Key Pair - Done
3,100,954 UART: [art] Signing Cert with AUTHO
3,101,434 UART: RITY.KEYID = 7
3,116,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,019 UART: [art] PUB.X = 5278B588D5AB995A5B116EF4972D6BA3B74703ACB46642607D36A635F627D719DCDB9F718646D6E3C6C75C21E9DDA5B2
3,123,792 UART: [art] PUB.Y = EDD7DEE17ACF0F577CF70A69EE41292A2976DE553C0BA8332BC4C33E157C05DB9308319335F9A4DDC64CA5A496C884EE
3,130,743 UART: [art] SIG.R = A090F6912F1B47CAD672D5E5AD0ECC9A9FEC61697D694ACA43AC7C7C0AC127B4E79AC875B52BCFCA85008438E2D955E1
3,137,505 UART: [art] SIG.S = BA0E629458B8DA5AF1A6A44F9D6CD3C3AC0E82066442BBBC8055E1F2BEEFD2AE239E252D9A5899F2B2BCC838F3EE2082
3,161,087 UART: Caliptra RT
3,161,340 UART: [state] CFI Enabled
3,268,868 UART: [rt] RT listening for mailbox commands...
3,269,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,118 UART: [rt]cmd =0x44504543, len=96
3,307,672 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,886 ready_for_fw is high
1,054,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,099 >>> mbox cmd response: success
2,681,455 UART:
2,681,471 UART: Running Caliptra FMC ...
2,681,879 UART:
2,681,933 UART: [state] CFI Enabled
2,692,100 UART: [fht] FMC Alias Private Key: 7
2,800,197 UART: [art] Extend RT PCRs Done
2,800,625 UART: [art] Lock RT PCRs Done
2,801,925 UART: [art] Populate DV Done
2,810,432 UART: [fht] FMC Alias Private Key: 7
2,811,568 UART: [art] Derive CDI
2,811,848 UART: [art] Store in in slot 0x4
2,897,437 UART: [art] Derive Key Pair
2,897,797 UART: [art] Store priv key in slot 0x5
2,910,387 UART: [art] Derive Key Pair - Done
2,925,103 UART: [art] Signing Cert with AUTHO
2,925,583 UART: RITY.KEYID = 7
2,940,967 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,732 UART: [art] PUB.X = 407850C517E09247D97CEF6E8E72A104DECC9A778E290C8A4A2DE4D2C8EEBC0E535FFC336A0DDFE8F2C271F0D7047292
2,948,503 UART: [art] PUB.Y = 5056456008E4D966071FA84920FFEA23C94A4FC3FC70B248A0D141EC6253168922C12CED556166DDC19763217AC9CA0E
2,955,444 UART: [art] SIG.R = 3D54D9EB3A7763A5113023C594E9C0C1FF6D660323DF2D1505AD4B6C52AA55B4A42217D08CB8A76741C805191F6AFC58
2,962,209 UART: [art] SIG.S = DE475566FEC5574D62C4154D3B07F889C6743FB53540BB124948F6B895324409D6C777D2B0C1F1723DF4DB6C2C7213EB
2,985,984 UART: Caliptra RT
2,986,237 UART: [state] CFI Enabled
3,093,488 UART: [rt] RT listening for mailbox commands...
3,094,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,568 UART: [rt]cmd =0x44504543, len=96
3,131,890 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,876 UART: [fht] FHT @ 0x50003400
1,172,650 UART: [idev] ++
1,172,818 UART: [idev] CDI.KEYID = 6
1,173,179 UART: [idev] SUBJECT.KEYID = 7
1,173,604 UART: [idev] UDS.KEYID = 0
1,173,950 ready_for_fw is high
1,173,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,392 UART: [idev] Erasing UDS.KEYID = 0
1,198,400 UART: [idev] Sha1 KeyId Algorithm
1,207,026 UART: [idev] --
1,208,069 UART: [ldev] ++
1,208,237 UART: [ldev] CDI.KEYID = 6
1,208,601 UART: [ldev] SUBJECT.KEYID = 5
1,209,028 UART: [ldev] AUTHORITY.KEYID = 7
1,209,491 UART: [ldev] FE.KEYID = 1
1,214,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,257 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,864 >>> mbox cmd response: success
2,768,881 UART: [afmc] ++
2,769,049 UART: [afmc] CDI.KEYID = 6
2,769,412 UART: [afmc] SUBJECT.KEYID = 7
2,769,838 UART: [afmc] AUTHORITY.KEYID = 5
2,805,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,952 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,604 UART: [afmc] --
2,848,722 UART: [cold-reset] --
2,849,590 UART: [state] Locking Datavault
2,850,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,563 UART: [state] Locking ICCM
2,852,193 UART: [exit] Launching FMC @ 0x40000130
2,857,522 UART:
2,857,538 UART: Running Caliptra FMC ...
2,857,946 UART:
2,858,089 UART: [state] CFI Enabled
2,868,846 UART: [fht] FMC Alias Private Key: 7
2,976,949 UART: [art] Extend RT PCRs Done
2,977,377 UART: [art] Lock RT PCRs Done
2,978,887 UART: [art] Populate DV Done
2,987,104 UART: [fht] FMC Alias Private Key: 7
2,988,272 UART: [art] Derive CDI
2,988,552 UART: [art] Store in in slot 0x4
3,074,507 UART: [art] Derive Key Pair
3,074,867 UART: [art] Store priv key in slot 0x5
3,087,971 UART: [art] Derive Key Pair - Done
3,102,407 UART: [art] Signing Cert with AUTHO
3,102,887 UART: RITY.KEYID = 7
3,117,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,554 UART: [art] PUB.X = 27AA04B5DF2FFB0EB5B48431CABB45569F7E300DD9A6C4B41F995B60E2E593A36E752C8FF1519F0C6D1844EEE338D0FA
3,125,330 UART: [art] PUB.Y = 0CB785A94CB947D8FF365E429AFED042E4143AB7F6D92928BB93CF8A5A5F79E781D80AB5A44C0CDCC843178CDCC780FD
3,132,291 UART: [art] SIG.R = 1144AAAF8B12E222D4039078D56CB555970A6A022E419A9914EDEF2311B2CD5C68E6CE2ADF239C12C943EA439D7A14E3
3,139,060 UART: [art] SIG.S = 7706DC5DFB4E4382C1FF4D2FC1E1DF88B345B401CBEF203D9A10CAC11C5BB22A6EBD28C53E533880479885C89AC7F7E1
3,163,061 UART: Caliptra RT
3,163,406 UART: [state] CFI Enabled
3,271,655 UART: [rt] RT listening for mailbox commands...
3,272,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,835 UART: [rt]cmd =0x44504543, len=96
3,310,015 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,743 ready_for_fw is high
1,056,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,406 >>> mbox cmd response: success
2,683,618 UART:
2,683,634 UART: Running Caliptra FMC ...
2,684,042 UART:
2,684,185 UART: [state] CFI Enabled
2,695,022 UART: [fht] FMC Alias Private Key: 7
2,802,659 UART: [art] Extend RT PCRs Done
2,803,087 UART: [art] Lock RT PCRs Done
2,804,569 UART: [art] Populate DV Done
2,812,840 UART: [fht] FMC Alias Private Key: 7
2,813,890 UART: [art] Derive CDI
2,814,170 UART: [art] Store in in slot 0x4
2,899,937 UART: [art] Derive Key Pair
2,900,297 UART: [art] Store priv key in slot 0x5
2,913,441 UART: [art] Derive Key Pair - Done
2,928,393 UART: [art] Signing Cert with AUTHO
2,928,873 UART: RITY.KEYID = 7
2,944,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,352 UART: [art] PUB.X = 0B2229441D887961E420C3CA3189C409128DFBCB7F215C44CBBC13BA072790FDDC0EF5154DEBC9D25489FEFD26B7401A
2,952,122 UART: [art] PUB.Y = 3D5D7AA44002683158105DB61E8ABA685997E15A14EEF707923F5C22406F8218BF50BD55DD62B35B7AF327E735EE16B7
2,959,068 UART: [art] SIG.R = 8AE5829F026C525F52251BC2EDB2D84FC958E66EF741E5EAB6F657C61E06DF209D5984D533B751E0AA59C377D02631FE
2,965,840 UART: [art] SIG.S = 93BB9B8AA3344B4A912ABBD33D66BA6ED2C6A3B6D0BD61E6528B860B399D8C420F5493AE5A49557784343DC35EB80B24
2,988,916 UART: Caliptra RT
2,989,261 UART: [state] CFI Enabled
3,097,025 UART: [rt] RT listening for mailbox commands...
3,097,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,463 UART: [rt]cmd =0x44504543, len=96
3,135,743 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,183 UART:
192,553 UART: Running Caliptra ROM ...
193,736 UART:
193,894 UART: [state] CFI Enabled
267,059 UART: [state] LifecycleState = Unprovisioned
268,963 UART: [state] DebugLocked = No
271,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,070 UART: [kat] SHA2-256
445,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,240 UART: [kat] ++
456,808 UART: [kat] sha1
468,779 UART: [kat] SHA2-256
471,482 UART: [kat] SHA2-384
477,336 UART: [kat] SHA2-512-ACC
479,704 UART: [kat] ECC-384
2,768,191 UART: [kat] HMAC-384Kdf
2,780,234 UART: [kat] LMS
3,970,520 UART: [kat] --
3,973,896 UART: [cold-reset] ++
3,975,827 UART: [fht] Storing FHT @ 0x50003400
3,987,659 UART: [idev] ++
3,988,232 UART: [idev] CDI.KEYID = 6
3,989,305 UART: [idev] SUBJECT.KEYID = 7
3,990,443 UART: [idev] UDS.KEYID = 0
3,991,435 ready_for_fw is high
3,991,644 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,566 UART: [idev] Erasing UDS.KEYID = 0
7,327,559 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,676 UART: [idev] --
7,354,345 UART: [ldev] ++
7,354,920 UART: [ldev] CDI.KEYID = 6
7,355,831 UART: [ldev] SUBJECT.KEYID = 5
7,357,042 UART: [ldev] AUTHORITY.KEYID = 7
7,358,340 UART: [ldev] FE.KEYID = 1
7,403,681 UART: [ldev] Erasing FE.KEYID = 1
10,735,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,548 UART: [ldev] --
13,117,898 UART: [fwproc] Waiting for Commands...
13,119,620 UART: [fwproc] Received command 0x46574c44
13,121,807 UART: [fwproc] Received Image of size 113760 bytes
17,166,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,414 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,625,927 >>> mbox cmd response: success
17,630,644 UART: [afmc] ++
17,631,243 UART: [afmc] CDI.KEYID = 6
17,632,129 UART: [afmc] SUBJECT.KEYID = 7
17,633,397 UART: [afmc] AUTHORITY.KEYID = 5
21,012,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,505 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,787 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,218 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,000 UART: [afmc] --
23,400,273 UART: [cold-reset] --
23,404,997 UART: [state] Locking Datavault
23,409,222 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,979 UART: [state] Locking ICCM
23,412,751 UART: [exit] Launching FMC @ 0x40000130
23,421,142 UART:
23,421,378 UART: Running Caliptra FMC ...
23,422,475 UART:
23,422,634 UART: [state] CFI Enabled
23,489,756 UART: [fht] FMC Alias Private Key: 7
25,827,587 UART: [art] Extend RT PCRs Done
25,828,928 UART: [art] Lock RT PCRs Done
25,830,398 UART: [art] Populate DV Done
25,835,703 UART: [fht] FMC Alias Private Key: 7
25,837,323 UART: [art] Derive CDI
25,838,140 UART: [art] Store in in slot 0x4
25,898,367 UART: [art] Derive Key Pair
25,899,363 UART: [art] Store priv key in slot 0x5
29,192,526 UART: [art] Derive Key Pair - Done
29,205,521 UART: [art] Signing Cert with AUTHO
29,206,819 UART: RITY.KEYID = 7
31,494,130 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,636 UART: [art] PUB.X = FDE4D9C3F70ED7A15FC70D881A020301AB4FDE883D2EC1AC1244C0B18B8C2A8698F366416C74352B679C83D01DAD459E
31,502,889 UART: [art] PUB.Y = C48E525FF9A0E1CAE1BCCCA7ADCC92CE04BCC4ECFE894560F73021D194C9C67AF49915B1EEEEA94B40DF62E68238C16D
31,510,146 UART: [art] SIG.R = E07B3B3B876B86AB92BB137D19D1F70EB42314C4C76194FE2EAEDE8C2538DBB97B42AFF96BF181F55B8315D1D0615726
31,517,550 UART: [art] SIG.S = 7570147C6702B0BDB9597A75431D1A9BD9E798C4F36F3D964B213F15F26DEE75113769C5D11CFBAF7D7C5A5D07EF999A
32,822,828 UART: Caliptra RT
32,823,552 UART: [state] CFI Enabled
32,985,864 UART: [rt] RT listening for mailbox commands...
32,987,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,019,237 UART: [rt]cmd =0x4d454153, len=108
33,038,086 >>> mbox cmd response data (12 bytes)
33,038,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,069,180 UART: [rt]cmd =0x4d454153, len=108
33,087,904 >>> mbox cmd response data (12 bytes)
33,088,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,118,895 UART: [rt]cmd =0x4d454153, len=108
33,137,752 >>> mbox cmd response data (12 bytes)
33,138,191 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,169,004 UART: [rt]cmd =0x4d454153, len=108
33,187,342 >>> mbox cmd response data (12 bytes)
33,187,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,218,369 UART: [rt]cmd =0x4d454153, len=108
33,236,675 >>> mbox cmd response data (12 bytes)
33,237,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,267,704 UART: [rt]cmd =0x4d454153, len=108
33,286,416 >>> mbox cmd response data (12 bytes)
33,286,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,317,291 UART: [rt]cmd =0x4d454153, len=108
33,334,975 >>> mbox cmd response data (12 bytes)
33,335,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,366,001 UART: [rt]cmd =0x4d454153, len=108
33,384,266 >>> mbox cmd response data (12 bytes)
33,384,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,415,364 UART: [rt]cmd =0x4d454153, len=108
33,434,408 >>> mbox cmd response data (12 bytes)
33,434,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,465,407 UART: [rt]cmd =0x4d454153, len=108
33,484,879 >>> mbox cmd response data (12 bytes)
33,485,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,515,950 UART: [rt]cmd =0x4d454153, len=108
33,534,691 >>> mbox cmd response data (12 bytes)
33,535,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,565,733 UART: [rt]cmd =0x4d454153, len=108
33,585,144 >>> mbox cmd response data (12 bytes)
33,585,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,616,051 UART: [rt]cmd =0x4d454153, len=108
33,635,178 >>> mbox cmd response data (12 bytes)
33,635,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,666,193 UART: [rt]cmd =0x4d454153, len=108
33,685,188 >>> mbox cmd response data (12 bytes)
33,685,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,716,241 UART: [rt]cmd =0x4d454153, len=108
33,735,115 >>> mbox cmd response data (12 bytes)
33,735,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,766,028 UART: [rt]cmd =0x4d454153, len=108
33,768,450 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,805,480 ready_for_fw is high
3,805,904 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,871,099 >>> mbox cmd response: success
23,563,063 UART:
23,563,468 UART: Running Caliptra FMC ...
23,564,595 UART:
23,564,757 UART: [state] CFI Enabled
23,631,808 UART: [fht] FMC Alias Private Key: 7
25,969,627 UART: [art] Extend RT PCRs Done
25,970,864 UART: [art] Lock RT PCRs Done
25,972,600 UART: [art] Populate DV Done
25,977,798 UART: [fht] FMC Alias Private Key: 7
25,979,498 UART: [art] Derive CDI
25,980,315 UART: [art] Store in in slot 0x4
26,040,192 UART: [art] Derive Key Pair
26,041,239 UART: [art] Store priv key in slot 0x5
29,315,197 UART: [art] Derive Key Pair - Done
29,328,131 UART: [art] Signing Cert with AUTHO
29,329,441 UART: RITY.KEYID = 7
31,617,569 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,090 UART: [art] PUB.X = F491405F49F5D3E40B781B4B57790E6EB2DA17F8C1B8E4E5C1348D6BC3F019FC74E4F82ECFF871A0431407A56CCC0BEA
31,626,309 UART: [art] PUB.Y = CFDD85B33B3B01D16BF61BDD6C2AD7F8D90DAAE63589DC12BA3E761AE6F4009073EE9DA4DC47F439182D96775ABC5CA8
31,633,586 UART: [art] SIG.R = 284EC56003DD0FF99A4D350C635FDD424D97B0B96079A6D3F98A87C288C77F68E0C68C3AB5F7C5853B11401C56143957
31,640,996 UART: [art] SIG.S = 913CEF11335999E26431EC23BDE35ED120C553CDD445A075AEB3DB052A89FAD74BCBF0454B4D17351E6FDDDEB09F62F7
32,946,319 UART: Caliptra RT
32,947,038 UART: [state] CFI Enabled
33,127,797 UART: [rt] RT listening for mailbox commands...
33,129,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,161,162 UART: [rt]cmd =0x4d454153, len=108
33,179,653 >>> mbox cmd response data (12 bytes)
33,180,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,210,608 UART: [rt]cmd =0x4d454153, len=108
33,228,517 >>> mbox cmd response data (12 bytes)
33,228,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,259,485 UART: [rt]cmd =0x4d454153, len=108
33,277,878 >>> mbox cmd response data (12 bytes)
33,278,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,309,045 UART: [rt]cmd =0x4d454153, len=108
33,328,368 >>> mbox cmd response data (12 bytes)
33,328,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,359,586 UART: [rt]cmd =0x4d454153, len=108
33,378,203 >>> mbox cmd response data (12 bytes)
33,378,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,409,367 UART: [rt]cmd =0x4d454153, len=108
33,428,352 >>> mbox cmd response data (12 bytes)
33,428,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,459,320 UART: [rt]cmd =0x4d454153, len=108
33,477,908 >>> mbox cmd response data (12 bytes)
33,478,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,509,003 UART: [rt]cmd =0x4d454153, len=108
33,528,099 >>> mbox cmd response data (12 bytes)
33,528,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,559,337 UART: [rt]cmd =0x4d454153, len=108
33,577,751 >>> mbox cmd response data (12 bytes)
33,578,182 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,608,716 UART: [rt]cmd =0x4d454153, len=108
33,627,647 >>> mbox cmd response data (12 bytes)
33,628,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,658,642 UART: [rt]cmd =0x4d454153, len=108
33,677,622 >>> mbox cmd response data (12 bytes)
33,678,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,708,599 UART: [rt]cmd =0x4d454153, len=108
33,727,398 >>> mbox cmd response data (12 bytes)
33,727,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,758,389 UART: [rt]cmd =0x4d454153, len=108
33,777,591 >>> mbox cmd response data (12 bytes)
33,778,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,808,612 UART: [rt]cmd =0x4d454153, len=108
33,827,973 >>> mbox cmd response data (12 bytes)
33,828,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,859,157 UART: [rt]cmd =0x4d454153, len=108
33,877,469 >>> mbox cmd response data (12 bytes)
33,877,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,908,485 UART: [rt]cmd =0x4d454153, len=108
33,910,813 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
192,906 UART:
193,258 UART: Running Caliptra ROM ...
194,475 UART:
603,953 UART: [state] CFI Enabled
617,299 UART: [state] LifecycleState = Unprovisioned
619,196 UART: [state] DebugLocked = No
620,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,350 UART: [kat] SHA2-256
795,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,650 UART: [kat] ++
806,095 UART: [kat] sha1
816,726 UART: [kat] SHA2-256
819,447 UART: [kat] SHA2-384
824,512 UART: [kat] SHA2-512-ACC
826,869 UART: [kat] ECC-384
3,107,850 UART: [kat] HMAC-384Kdf
3,119,589 UART: [kat] LMS
4,309,699 UART: [kat] --
4,315,575 UART: [cold-reset] ++
4,317,584 UART: [fht] Storing FHT @ 0x50003400
4,327,990 UART: [idev] ++
4,328,550 UART: [idev] CDI.KEYID = 6
4,329,574 UART: [idev] SUBJECT.KEYID = 7
4,330,696 UART: [idev] UDS.KEYID = 0
4,331,665 ready_for_fw is high
4,331,856 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,474,713 UART: [idev] Erasing UDS.KEYID = 0
7,621,853 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,259 UART: [idev] --
7,646,823 UART: [ldev] ++
7,647,395 UART: [ldev] CDI.KEYID = 6
7,648,360 UART: [ldev] SUBJECT.KEYID = 5
7,649,566 UART: [ldev] AUTHORITY.KEYID = 7
7,650,788 UART: [ldev] FE.KEYID = 1
7,662,697 UART: [ldev] Erasing FE.KEYID = 1
10,952,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,558 UART: [ldev] --
13,312,413 UART: [fwproc] Waiting for Commands...
13,315,525 UART: [fwproc] Received command 0x46574c44
13,317,697 UART: [fwproc] Received Image of size 113760 bytes
17,371,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,451 >>> mbox cmd response: success
17,835,187 UART: [afmc] ++
17,835,778 UART: [afmc] CDI.KEYID = 6
17,836,678 UART: [afmc] SUBJECT.KEYID = 7
17,837,949 UART: [afmc] AUTHORITY.KEYID = 5
21,149,024 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,839 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,149 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,525 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,362 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,775 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,168 UART: [afmc] --
23,516,767 UART: [cold-reset] --
23,520,679 UART: [state] Locking Datavault
23,526,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,336 UART: [state] Locking ICCM
23,530,289 UART: [exit] Launching FMC @ 0x40000130
23,538,681 UART:
23,538,911 UART: Running Caliptra FMC ...
23,540,030 UART:
23,540,190 UART: [state] CFI Enabled
23,548,449 UART: [fht] FMC Alias Private Key: 7
25,878,768 UART: [art] Extend RT PCRs Done
25,879,989 UART: [art] Lock RT PCRs Done
25,881,723 UART: [art] Populate DV Done
25,887,019 UART: [fht] FMC Alias Private Key: 7
25,888,608 UART: [art] Derive CDI
25,889,418 UART: [art] Store in in slot 0x4
25,931,578 UART: [art] Derive Key Pair
25,932,611 UART: [art] Store priv key in slot 0x5
29,174,530 UART: [art] Derive Key Pair - Done
29,187,624 UART: [art] Signing Cert with AUTHO
29,188,956 UART: RITY.KEYID = 7
31,468,128 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,644 UART: [art] PUB.X = A24B245B4B79243D512F6632184D2A25A293B9DC0EE0F25C31597131E5E9E6E193C06146FE9484029176B60E233808B8
31,476,882 UART: [art] PUB.Y = 7B21E6CA47BA8065DCB6BF4089719033BE787CF3A9B5D9C80A909AA3F5A4B93483D60DDFD80CB0F0B39B9A9AF2BA203C
31,484,147 UART: [art] SIG.R = 574D40FD34170852717BA5E4E1826C98395E83D3CC4E388F6785381E950914E07D31A200E7D73FE59867446B6FE156B3
31,491,459 UART: [art] SIG.S = 9739E91154F059091C865BF265199A928E4505507750BAACCB1B861F79D29BAB49CA96509CC24000801385ED6194C89F
32,796,499 UART: Caliptra RT
32,797,218 UART: [state] CFI Enabled
32,913,897 UART: [rt] RT listening for mailbox commands...
32,915,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,946,549 UART: [rt]cmd =0x4d454153, len=108
32,965,950 >>> mbox cmd response data (12 bytes)
32,966,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,997,321 UART: [rt]cmd =0x4d454153, len=108
33,016,096 >>> mbox cmd response data (12 bytes)
33,016,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,047,228 UART: [rt]cmd =0x4d454153, len=108
33,066,058 >>> mbox cmd response data (12 bytes)
33,066,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,097,072 UART: [rt]cmd =0x4d454153, len=108
33,115,661 >>> mbox cmd response data (12 bytes)
33,116,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,146,687 UART: [rt]cmd =0x4d454153, len=108
33,165,070 >>> mbox cmd response data (12 bytes)
33,165,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,195,818 UART: [rt]cmd =0x4d454153, len=108
33,213,751 >>> mbox cmd response data (12 bytes)
33,214,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,244,992 UART: [rt]cmd =0x4d454153, len=108
33,263,873 >>> mbox cmd response data (12 bytes)
33,264,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,294,873 UART: [rt]cmd =0x4d454153, len=108
33,313,476 >>> mbox cmd response data (12 bytes)
33,313,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,344,381 UART: [rt]cmd =0x4d454153, len=108
33,362,502 >>> mbox cmd response data (12 bytes)
33,362,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,393,586 UART: [rt]cmd =0x4d454153, len=108
33,412,133 >>> mbox cmd response data (12 bytes)
33,412,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,443,209 UART: [rt]cmd =0x4d454153, len=108
33,461,956 >>> mbox cmd response data (12 bytes)
33,462,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,493,083 UART: [rt]cmd =0x4d454153, len=108
33,511,886 >>> mbox cmd response data (12 bytes)
33,512,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,542,936 UART: [rt]cmd =0x4d454153, len=108
33,562,080 >>> mbox cmd response data (12 bytes)
33,562,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,593,320 UART: [rt]cmd =0x4d454153, len=108
33,611,899 >>> mbox cmd response data (12 bytes)
33,612,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,643,207 UART: [rt]cmd =0x4d454153, len=108
33,662,304 >>> mbox cmd response data (12 bytes)
33,662,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,693,356 UART: [rt]cmd =0x4d454153, len=108
33,695,954 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,708 writing to cptra_bootfsm_go
4,123,995 ready_for_fw is high
4,124,565 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,346 >>> mbox cmd response: success
23,704,303 UART:
23,704,696 UART: Running Caliptra FMC ...
23,705,837 UART:
23,705,995 UART: [state] CFI Enabled
23,713,622 UART: [fht] FMC Alias Private Key: 7
26,044,121 UART: [art] Extend RT PCRs Done
26,045,348 UART: [art] Lock RT PCRs Done
26,046,710 UART: [art] Populate DV Done
26,051,907 UART: [fht] FMC Alias Private Key: 7
26,053,460 UART: [art] Derive CDI
26,054,226 UART: [art] Store in in slot 0x4
26,097,153 UART: [art] Derive Key Pair
26,098,194 UART: [art] Store priv key in slot 0x5
29,340,243 UART: [art] Derive Key Pair - Done
29,353,554 UART: [art] Signing Cert with AUTHO
29,354,861 UART: RITY.KEYID = 7
31,634,654 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,156 UART: [art] PUB.X = 8D594ACB6B01BF7613F0D703D5B04A687C5F2E7D27B5AAD37B4D0CBF76C3AE1DE6E5872FA984376C45DFB85DCED8054B
31,643,399 UART: [art] PUB.Y = 9CA76B0F108966BEAA2D4DC9AC188A71B98C10F61AEF7C8431DE693ED9C78C2DA20AE345442841EC2E8472AEBF73B5F5
31,650,677 UART: [art] SIG.R = F69F145FB326012CC416EDA21F6198BF81D8A849F7F15013320A220E188BE16EF9D920167BBEF53819D353FEE0A61C6E
31,658,059 UART: [art] SIG.S = DCF272F18AFA2F8FD6E34E7973A2A3A8BF657022D75BEFF05F236003EA56F302275169AA340630D2DDB5BEBBF3AAC59C
32,963,752 UART: Caliptra RT
32,964,455 UART: [state] CFI Enabled
33,081,878 UART: [rt] RT listening for mailbox commands...
33,083,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,114,380 UART: [rt]cmd =0x4d454153, len=108
33,133,320 >>> mbox cmd response data (12 bytes)
33,133,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,538 UART: [rt]cmd =0x4d454153, len=108
33,183,095 >>> mbox cmd response data (12 bytes)
33,183,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,213,880 UART: [rt]cmd =0x4d454153, len=108
33,233,781 >>> mbox cmd response data (12 bytes)
33,234,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,264,919 UART: [rt]cmd =0x4d454153, len=108
33,283,871 >>> mbox cmd response data (12 bytes)
33,284,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,314,911 UART: [rt]cmd =0x4d454153, len=108
33,333,818 >>> mbox cmd response data (12 bytes)
33,334,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,365,104 UART: [rt]cmd =0x4d454153, len=108
33,383,849 >>> mbox cmd response data (12 bytes)
33,384,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,415,029 UART: [rt]cmd =0x4d454153, len=108
33,433,202 >>> mbox cmd response data (12 bytes)
33,433,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,464,262 UART: [rt]cmd =0x4d454153, len=108
33,482,468 >>> mbox cmd response data (12 bytes)
33,482,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,513,449 UART: [rt]cmd =0x4d454153, len=108
33,532,217 >>> mbox cmd response data (12 bytes)
33,532,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,563,207 UART: [rt]cmd =0x4d454153, len=108
33,582,781 >>> mbox cmd response data (12 bytes)
33,583,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,614,122 UART: [rt]cmd =0x4d454153, len=108
33,633,133 >>> mbox cmd response data (12 bytes)
33,633,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,664,476 UART: [rt]cmd =0x4d454153, len=108
33,682,756 >>> mbox cmd response data (12 bytes)
33,683,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,713,933 UART: [rt]cmd =0x4d454153, len=108
33,733,111 >>> mbox cmd response data (12 bytes)
33,733,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,764,142 UART: [rt]cmd =0x4d454153, len=108
33,783,752 >>> mbox cmd response data (12 bytes)
33,784,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,814,873 UART: [rt]cmd =0x4d454153, len=108
33,833,260 >>> mbox cmd response data (12 bytes)
33,833,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,864,390 UART: [rt]cmd =0x4d454153, len=108
33,866,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,450 UART:
192,830 UART: Running Caliptra ROM ...
193,976 UART:
194,127 UART: [state] CFI Enabled
265,398 UART: [state] LifecycleState = Unprovisioned
267,263 UART: [state] DebugLocked = No
270,103 UART: [state] WD Timer not started. Device not locked for debugging
274,052 UART: [kat] SHA2-256
453,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,783 UART: [kat] ++
465,313 UART: [kat] sha1
476,881 UART: [kat] SHA2-256
479,910 UART: [kat] SHA2-384
486,687 UART: [kat] SHA2-512-ACC
489,621 UART: [kat] ECC-384
2,947,721 UART: [kat] HMAC-384Kdf
2,972,745 UART: [kat] LMS
3,502,212 UART: [kat] --
3,506,802 UART: [cold-reset] ++
3,508,025 UART: [fht] FHT @ 0x50003400
3,519,506 UART: [idev] ++
3,520,066 UART: [idev] CDI.KEYID = 6
3,520,974 UART: [idev] SUBJECT.KEYID = 7
3,522,143 UART: [idev] UDS.KEYID = 0
3,523,138 ready_for_fw is high
3,523,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,832 UART: [idev] Erasing UDS.KEYID = 0
6,025,987 UART: [idev] Sha1 KeyId Algorithm
6,047,839 UART: [idev] --
6,051,439 UART: [ldev] ++
6,052,019 UART: [ldev] CDI.KEYID = 6
6,052,948 UART: [ldev] SUBJECT.KEYID = 5
6,054,102 UART: [ldev] AUTHORITY.KEYID = 7
6,055,386 UART: [ldev] FE.KEYID = 1
6,102,172 UART: [ldev] Erasing FE.KEYID = 1
8,604,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,182 UART: [ldev] --
10,395,633 UART: [fwproc] Wait for Commands...
10,398,371 UART: [fwproc] Recv command 0x46574c44
10,400,410 UART: [fwproc] Recv'd Img size: 114084 bytes
13,805,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,264,889 >>> mbox cmd response: success
14,268,890 UART: [afmc] ++
14,269,487 UART: [afmc] CDI.KEYID = 6
14,270,566 UART: [afmc] SUBJECT.KEYID = 7
14,271,685 UART: [afmc] AUTHORITY.KEYID = 5
16,810,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,493 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,326 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,988 UART: [afmc] --
18,608,919 UART: [cold-reset] --
18,612,684 UART: [state] Locking Datavault
18,618,143 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,838 UART: [state] Locking ICCM
18,622,473 UART: [exit] Launching FMC @ 0x40000130
18,630,866 UART:
18,631,096 UART: Running Caliptra FMC ...
18,632,198 UART:
18,632,355 UART: [state] CFI Enabled
18,693,153 UART: [fht] FMC Alias Private Key: 7
20,457,227 UART: [art] Extend RT PCRs Done
20,458,441 UART: [art] Lock RT PCRs Done
20,460,278 UART: [art] Populate DV Done
20,465,743 UART: [fht] FMC Alias Private Key: 7
20,467,393 UART: [art] Derive CDI
20,468,204 UART: [art] Store in in slot 0x4
20,525,959 UART: [art] Derive Key Pair
20,527,015 UART: [art] Store priv key in slot 0x5
22,990,009 UART: [art] Derive Key Pair - Done
23,003,067 UART: [art] Signing Cert with AUTHO
23,004,376 UART: RITY.KEYID = 7
24,715,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,006 UART: [art] PUB.X = 018098C6DBF746EF1403FAD9C33F70E098330F2E1125D41225D07B0110200A0795C5ADBDCBACF777196FF6E4C11321E4
24,724,249 UART: [art] PUB.Y = 88009458E15B84A31E193E13340D0933284D06AC233AC32C34D226EBAFF3A4D461D4B517F948FF35728854E02F7274D3
24,731,464 UART: [art] SIG.R = F024D618D52E6476C18EE6A4A106F64B953D40C7EA1BB0DF98B5D2EB872661029D027AAE89B74F4DE130854355EEBC27
24,738,872 UART: [art] SIG.S = 4462520D893D9DB647705A09AB5A4434479B1B51CBB1A7E3C3ECDF18422F5BE70950BEF0BE5FFE38F51BBBA5EC7131AF
25,717,320 UART: Caliptra RT
25,718,021 UART: [state] CFI Enabled
25,883,046 UART: [rt] RT listening for mailbox commands...
25,884,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,916,238 UART: [rt]cmd =0x4d454153, len=108
25,934,862 >>> mbox cmd response data (12 bytes)
25,935,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,965,859 UART: [rt]cmd =0x4d454153, len=108
25,984,776 >>> mbox cmd response data (12 bytes)
25,985,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,015,894 UART: [rt]cmd =0x4d454153, len=108
26,034,027 >>> mbox cmd response data (12 bytes)
26,034,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,065,262 UART: [rt]cmd =0x4d454153, len=108
26,083,497 >>> mbox cmd response data (12 bytes)
26,083,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,114,478 UART: [rt]cmd =0x4d454153, len=108
26,133,286 >>> mbox cmd response data (12 bytes)
26,133,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,164,201 UART: [rt]cmd =0x4d454153, len=108
26,183,395 >>> mbox cmd response data (12 bytes)
26,183,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,214,297 UART: [rt]cmd =0x4d454153, len=108
26,232,954 >>> mbox cmd response data (12 bytes)
26,233,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,264,238 UART: [rt]cmd =0x4d454153, len=108
26,282,907 >>> mbox cmd response data (12 bytes)
26,283,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,314,121 UART: [rt]cmd =0x4d454153, len=108
26,333,047 >>> mbox cmd response data (12 bytes)
26,333,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,363,980 UART: [rt]cmd =0x4d454153, len=108
26,381,995 >>> mbox cmd response data (12 bytes)
26,382,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,412,982 UART: [rt]cmd =0x4d454153, len=108
26,431,495 >>> mbox cmd response data (12 bytes)
26,431,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,462,539 UART: [rt]cmd =0x4d454153, len=108
26,481,202 >>> mbox cmd response data (12 bytes)
26,481,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,512,120 UART: [rt]cmd =0x4d454153, len=108
26,530,918 >>> mbox cmd response data (12 bytes)
26,531,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,562,045 UART: [rt]cmd =0x4d454153, len=108
26,581,512 >>> mbox cmd response data (12 bytes)
26,581,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,612,849 UART: [rt]cmd =0x4d454153, len=108
26,631,859 >>> mbox cmd response data (12 bytes)
26,632,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,663,036 UART: [rt]cmd =0x4d454153, len=108
26,665,216 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
3,358,082 ready_for_fw is high
3,358,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,058,564 >>> mbox cmd response: success
18,345,867 UART:
18,346,261 UART: Running Caliptra FMC ...
18,347,392 UART:
18,347,550 UART: [state] CFI Enabled
18,410,403 UART: [fht] FMC Alias Private Key: 7
20,174,364 UART: [art] Extend RT PCRs Done
20,175,585 UART: [art] Lock RT PCRs Done
20,177,317 UART: [art] Populate DV Done
20,182,836 UART: [fht] FMC Alias Private Key: 7
20,184,538 UART: [art] Derive CDI
20,185,309 UART: [art] Store in in slot 0x4
20,243,326 UART: [art] Derive Key Pair
20,244,316 UART: [art] Store priv key in slot 0x5
22,708,016 UART: [art] Derive Key Pair - Done
22,721,079 UART: [art] Signing Cert with AUTHO
22,722,388 UART: RITY.KEYID = 7
24,433,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,246 UART: [art] PUB.X = 6399CE6A6AEC1722449E78715C5F49D3577BC9A46F0397BAAEA98245D41DA2C8E21BBA323A6D5B9AA1F90337D0F3FFCB
24,442,532 UART: [art] PUB.Y = 78871CCC267BAEAFBF12481DFA89D0AEC01E3B342A28A62E18679831CDCA4360627C1965DEA464E38F995314DE7903BC
24,449,780 UART: [art] SIG.R = 34FEE2ECC5E244FFBE5516DA1F9E2A48D41774258C7F6BE35F5270F8AE29803EE6398767A2033BFC297ABEEAFA6D852C
24,457,214 UART: [art] SIG.S = 8B674F71180BE31CE1769BCABF6E4B35589000D5A2E8142689DBAAC1509210AAE40AC0EA4F0050C27CC3ACD1FB806357
25,436,472 UART: Caliptra RT
25,437,185 UART: [state] CFI Enabled
25,601,224 UART: [rt] RT listening for mailbox commands...
25,603,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,634,499 UART: [rt]cmd =0x4d454153, len=108
25,652,937 >>> mbox cmd response data (12 bytes)
25,653,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,684,060 UART: [rt]cmd =0x4d454153, len=108
25,702,363 >>> mbox cmd response data (12 bytes)
25,702,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,733,458 UART: [rt]cmd =0x4d454153, len=108
25,751,504 >>> mbox cmd response data (12 bytes)
25,751,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,782,730 UART: [rt]cmd =0x4d454153, len=108
25,801,721 >>> mbox cmd response data (12 bytes)
25,802,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,832,861 UART: [rt]cmd =0x4d454153, len=108
25,851,410 >>> mbox cmd response data (12 bytes)
25,851,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,882,544 UART: [rt]cmd =0x4d454153, len=108
25,900,426 >>> mbox cmd response data (12 bytes)
25,900,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,931,172 UART: [rt]cmd =0x4d454153, len=108
25,950,540 >>> mbox cmd response data (12 bytes)
25,951,015 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,981,724 UART: [rt]cmd =0x4d454153, len=108
26,000,273 >>> mbox cmd response data (12 bytes)
26,000,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,031,250 UART: [rt]cmd =0x4d454153, len=108
26,049,992 >>> mbox cmd response data (12 bytes)
26,050,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,080,944 UART: [rt]cmd =0x4d454153, len=108
26,099,657 >>> mbox cmd response data (12 bytes)
26,100,082 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,130,737 UART: [rt]cmd =0x4d454153, len=108
26,148,833 >>> mbox cmd response data (12 bytes)
26,149,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,180,116 UART: [rt]cmd =0x4d454153, len=108
26,198,286 >>> mbox cmd response data (12 bytes)
26,198,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,229,455 UART: [rt]cmd =0x4d454153, len=108
26,248,708 >>> mbox cmd response data (12 bytes)
26,249,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,279,714 UART: [rt]cmd =0x4d454153, len=108
26,298,352 >>> mbox cmd response data (12 bytes)
26,298,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,329,366 UART: [rt]cmd =0x4d454153, len=108
26,347,864 >>> mbox cmd response data (12 bytes)
26,348,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,378,851 UART: [rt]cmd =0x4d454153, len=108
26,381,352 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
192,912 UART:
193,294 UART: Running Caliptra ROM ...
194,424 UART:
604,160 UART: [state] CFI Enabled
615,403 UART: [state] LifecycleState = Unprovisioned
617,277 UART: [state] DebugLocked = No
619,804 UART: [state] WD Timer not started. Device not locked for debugging
623,568 UART: [kat] SHA2-256
802,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,240 UART: [kat] ++
814,775 UART: [kat] sha1
825,374 UART: [kat] SHA2-256
828,450 UART: [kat] SHA2-384
835,291 UART: [kat] SHA2-512-ACC
838,233 UART: [kat] ECC-384
3,280,387 UART: [kat] HMAC-384Kdf
3,292,915 UART: [kat] LMS
3,822,418 UART: [kat] --
3,827,976 UART: [cold-reset] ++
3,830,193 UART: [fht] FHT @ 0x50003400
3,841,815 UART: [idev] ++
3,842,384 UART: [idev] CDI.KEYID = 6
3,843,261 UART: [idev] SUBJECT.KEYID = 7
3,844,531 UART: [idev] UDS.KEYID = 0
3,845,434 ready_for_fw is high
3,845,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,877 UART: [idev] Erasing UDS.KEYID = 0
6,322,410 UART: [idev] Sha1 KeyId Algorithm
6,346,494 UART: [idev] --
6,350,914 UART: [ldev] ++
6,351,498 UART: [ldev] CDI.KEYID = 6
6,352,383 UART: [ldev] SUBJECT.KEYID = 5
6,353,596 UART: [ldev] AUTHORITY.KEYID = 7
6,354,830 UART: [ldev] FE.KEYID = 1
6,365,670 UART: [ldev] Erasing FE.KEYID = 1
8,837,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,495 UART: [ldev] --
10,624,519 UART: [fwproc] Wait for Commands...
10,627,643 UART: [fwproc] Recv command 0x46574c44
10,629,737 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,557 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,493,898 >>> mbox cmd response: success
14,497,467 UART: [afmc] ++
14,498,066 UART: [afmc] CDI.KEYID = 6
14,498,959 UART: [afmc] SUBJECT.KEYID = 7
14,500,066 UART: [afmc] AUTHORITY.KEYID = 5
17,002,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,262 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,077 UART: [afmc] --
18,800,271 UART: [cold-reset] --
18,804,837 UART: [state] Locking Datavault
18,807,981 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,682 UART: [state] Locking ICCM
18,812,389 UART: [exit] Launching FMC @ 0x40000130
18,820,853 UART:
18,821,116 UART: Running Caliptra FMC ...
18,822,223 UART:
18,822,383 UART: [state] CFI Enabled
18,830,054 UART: [fht] FMC Alias Private Key: 7
20,587,584 UART: [art] Extend RT PCRs Done
20,588,792 UART: [art] Lock RT PCRs Done
20,590,713 UART: [art] Populate DV Done
20,595,858 UART: [fht] FMC Alias Private Key: 7
20,597,504 UART: [art] Derive CDI
20,598,320 UART: [art] Store in in slot 0x4
20,641,238 UART: [art] Derive Key Pair
20,642,240 UART: [art] Store priv key in slot 0x5
23,069,295 UART: [art] Derive Key Pair - Done
23,082,507 UART: [art] Signing Cert with AUTHO
23,083,817 UART: RITY.KEYID = 7
24,789,875 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,357 UART: [art] PUB.X = 5FF5C60EACBD36309FBA8768A7687E83CE0CE6D31F9EB602ECD62DF6EBFF7E0CF2C2855F575C0A283EA52B6F9FD77878
24,798,693 UART: [art] PUB.Y = 273BDF71B7E550FA027E755BFE2B656EC897F8ED98492957131EAD2B93E0A7D2B6B8F00F37F86A76C7ABD473CCEBD9BD
24,805,956 UART: [art] SIG.R = 490FE666DD36E39F58DFCEBE158AF89CEBC1CE4A7B3B91FFF3596A384EEBECD676BC04DB63D18B0CD0AA3DB7AFE2961F
24,813,456 UART: [art] SIG.S = E4BF551022B98837B8B57B6F987742F2F605C7748FA7EC8ACEF292BFFA2FE2E90F64922EFD0E91BC11042D24DC16AAB9
25,792,403 UART: Caliptra RT
25,793,119 UART: [state] CFI Enabled
25,910,559 UART: [rt] RT listening for mailbox commands...
25,912,453 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,943,332 UART: [rt]cmd =0x4d454153, len=108
25,962,022 >>> mbox cmd response data (12 bytes)
25,962,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,993,197 UART: [rt]cmd =0x4d454153, len=108
26,012,451 >>> mbox cmd response data (12 bytes)
26,012,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,043,495 UART: [rt]cmd =0x4d454153, len=108
26,062,432 >>> mbox cmd response data (12 bytes)
26,062,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,093,299 UART: [rt]cmd =0x4d454153, len=108
26,112,154 >>> mbox cmd response data (12 bytes)
26,112,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,143,289 UART: [rt]cmd =0x4d454153, len=108
26,161,026 >>> mbox cmd response data (12 bytes)
26,161,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,192,015 UART: [rt]cmd =0x4d454153, len=108
26,210,874 >>> mbox cmd response data (12 bytes)
26,211,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,241,844 UART: [rt]cmd =0x4d454153, len=108
26,261,304 >>> mbox cmd response data (12 bytes)
26,261,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,292,496 UART: [rt]cmd =0x4d454153, len=108
26,311,272 >>> mbox cmd response data (12 bytes)
26,311,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,342,257 UART: [rt]cmd =0x4d454153, len=108
26,360,788 >>> mbox cmd response data (12 bytes)
26,361,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,391,814 UART: [rt]cmd =0x4d454153, len=108
26,410,416 >>> mbox cmd response data (12 bytes)
26,410,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,354 UART: [rt]cmd =0x4d454153, len=108
26,459,884 >>> mbox cmd response data (12 bytes)
26,460,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,490,799 UART: [rt]cmd =0x4d454153, len=108
26,509,491 >>> mbox cmd response data (12 bytes)
26,509,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,540,188 UART: [rt]cmd =0x4d454153, len=108
26,558,569 >>> mbox cmd response data (12 bytes)
26,558,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,589,880 UART: [rt]cmd =0x4d454153, len=108
26,608,408 >>> mbox cmd response data (12 bytes)
26,608,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,639,754 UART: [rt]cmd =0x4d454153, len=108
26,658,254 >>> mbox cmd response data (12 bytes)
26,658,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,689,407 UART: [rt]cmd =0x4d454153, len=108
26,691,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
3,695,490 ready_for_fw is high
3,695,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,504 >>> mbox cmd response: success
18,506,311 UART:
18,506,698 UART: Running Caliptra FMC ...
18,507,799 UART:
18,507,957 UART: [state] CFI Enabled
18,515,968 UART: [fht] FMC Alias Private Key: 7
20,272,906 UART: [art] Extend RT PCRs Done
20,274,136 UART: [art] Lock RT PCRs Done
20,275,578 UART: [art] Populate DV Done
20,280,942 UART: [fht] FMC Alias Private Key: 7
20,282,613 UART: [art] Derive CDI
20,283,431 UART: [art] Store in in slot 0x4
20,326,305 UART: [art] Derive Key Pair
20,327,347 UART: [art] Store priv key in slot 0x5
22,754,446 UART: [art] Derive Key Pair - Done
22,767,284 UART: [art] Signing Cert with AUTHO
22,768,592 UART: RITY.KEYID = 7
24,474,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,899 UART: [art] PUB.X = C4FF211F3025D77B143B1953DD689584DA2470D72203A9B35B5FE87616A023CDB86AF893D7B0405265A2BF73D2EC4E46
24,483,020 UART: [art] PUB.Y = EBD17E90A53F7C8CCBEE6BE70E1D1EFBD65B5ED7E97EF48599E5184FDE3C12CACA7117087F308ECF9F2925C09DF54E42
24,490,307 UART: [art] SIG.R = 83585A5E83B9987EC903741905B158524B1EAEF17252D9032CE96E347A1E50ACD65AFA5E8F33085DB45AF0C2EBF5899A
24,497,695 UART: [art] SIG.S = 27AA5982ACDD39D6A7EF60969923CB654E2155A875299BB91485C21570B6232BF94A1FADEA36736EC7324935AE834D6A
25,476,880 UART: Caliptra RT
25,477,592 UART: [state] CFI Enabled
25,595,755 UART: [rt] RT listening for mailbox commands...
25,597,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,628,471 UART: [rt]cmd =0x4d454153, len=108
25,646,107 >>> mbox cmd response data (12 bytes)
25,646,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,677,222 UART: [rt]cmd =0x4d454153, len=108
25,695,263 >>> mbox cmd response data (12 bytes)
25,695,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,726,358 UART: [rt]cmd =0x4d454153, len=108
25,744,744 >>> mbox cmd response data (12 bytes)
25,745,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,775,715 UART: [rt]cmd =0x4d454153, len=108
25,794,275 >>> mbox cmd response data (12 bytes)
25,794,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,825,431 UART: [rt]cmd =0x4d454153, len=108
25,844,102 >>> mbox cmd response data (12 bytes)
25,844,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,874,939 UART: [rt]cmd =0x4d454153, len=108
25,894,211 >>> mbox cmd response data (12 bytes)
25,894,638 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,925,451 UART: [rt]cmd =0x4d454153, len=108
25,943,436 >>> mbox cmd response data (12 bytes)
25,943,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,974,459 UART: [rt]cmd =0x4d454153, len=108
25,993,120 >>> mbox cmd response data (12 bytes)
25,993,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,024,133 UART: [rt]cmd =0x4d454153, len=108
26,042,986 >>> mbox cmd response data (12 bytes)
26,043,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,073,690 UART: [rt]cmd =0x4d454153, len=108
26,092,893 >>> mbox cmd response data (12 bytes)
26,093,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,123,886 UART: [rt]cmd =0x4d454153, len=108
26,141,628 >>> mbox cmd response data (12 bytes)
26,142,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,172,797 UART: [rt]cmd =0x4d454153, len=108
26,191,492 >>> mbox cmd response data (12 bytes)
26,191,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,222,376 UART: [rt]cmd =0x4d454153, len=108
26,241,226 >>> mbox cmd response data (12 bytes)
26,241,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,272,188 UART: [rt]cmd =0x4d454153, len=108
26,290,687 >>> mbox cmd response data (12 bytes)
26,291,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,321,377 UART: [rt]cmd =0x4d454153, len=108
26,340,173 >>> mbox cmd response data (12 bytes)
26,340,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,371,214 UART: [rt]cmd =0x4d454153, len=108
26,373,650 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,620 UART:
192,990 UART: Running Caliptra ROM ...
194,186 UART:
194,338 UART: [state] CFI Enabled
261,362 UART: [state] LifecycleState = Unprovisioned
263,717 UART: [state] DebugLocked = No
266,172 UART: [state] WD Timer not started. Device not locked for debugging
271,212 UART: [kat] SHA2-256
461,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,871 UART: [kat] ++
472,356 UART: [kat] sha1
483,515 UART: [kat] SHA2-256
486,518 UART: [kat] SHA2-384
491,964 UART: [kat] SHA2-512-ACC
494,552 UART: [kat] ECC-384
2,946,034 UART: [kat] HMAC-384Kdf
2,971,850 UART: [kat] LMS
3,503,608 UART: [kat] --
3,507,246 UART: [cold-reset] ++
3,508,393 UART: [fht] FHT @ 0x50003400
3,520,284 UART: [idev] ++
3,520,911 UART: [idev] CDI.KEYID = 6
3,521,864 UART: [idev] SUBJECT.KEYID = 7
3,523,105 UART: [idev] UDS.KEYID = 0
3,524,000 ready_for_fw is high
3,524,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,662 UART: [idev] Erasing UDS.KEYID = 0
6,027,868 UART: [idev] Sha1 KeyId Algorithm
6,051,194 UART: [idev] --
6,056,187 UART: [ldev] ++
6,056,868 UART: [ldev] CDI.KEYID = 6
6,057,754 UART: [ldev] SUBJECT.KEYID = 5
6,058,911 UART: [ldev] AUTHORITY.KEYID = 7
6,060,302 UART: [ldev] FE.KEYID = 1
6,099,997 UART: [ldev] Erasing FE.KEYID = 1
8,604,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,306 UART: [ldev] --
10,411,138 UART: [fwproc] Wait for Commands...
10,414,143 UART: [fwproc] Recv command 0x46574c44
10,416,447 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,851 >>> mbox cmd response: success
14,605,553 UART: [afmc] ++
14,606,260 UART: [afmc] CDI.KEYID = 6
14,607,450 UART: [afmc] SUBJECT.KEYID = 7
14,608,944 UART: [afmc] AUTHORITY.KEYID = 5
17,151,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,857 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,021 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,253 UART: [afmc] --
18,950,163 UART: [cold-reset] --
18,955,394 UART: [state] Locking Datavault
18,960,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,353 UART: [state] Locking ICCM
18,963,917 UART: [exit] Launching FMC @ 0x40000130
18,972,555 UART:
18,972,789 UART: Running Caliptra FMC ...
18,973,823 UART:
18,973,967 UART: [state] CFI Enabled
19,032,812 UART: [fht] FMC Alias Private Key: 7
20,796,417 UART: [art] Extend RT PCRs Done
20,797,621 UART: [art] Lock RT PCRs Done
20,799,268 UART: [art] Populate DV Done
20,804,614 UART: [fht] FMC Alias Private Key: 7
20,806,306 UART: [art] Derive CDI
20,807,118 UART: [art] Store in in slot 0x4
20,865,245 UART: [art] Derive Key Pair
20,866,277 UART: [art] Store priv key in slot 0x5
23,329,435 UART: [art] Derive Key Pair - Done
23,342,646 UART: [art] Signing Cert with AUTHO
23,343,979 UART: RITY.KEYID = 7
25,055,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,998 UART: [art] PUB.X = A24217F96B7FD4391DA43BB9134FF434AEB1E40AD77F61EFFCB3141715A88C58B9B43BF9E74177AA363CB59A511FAA1B
25,064,268 UART: [art] PUB.Y = A57FB2ACD6E15AD1FA26D9213D7FFC4F86A2AF6928FDC4E51F8BC5AC9C7D2266ACD0246465C38AF82DEF79CE779BAF24
25,071,617 UART: [art] SIG.R = 659CC4C9F67421AD5113B50CF028A90C00BCA22914018304979ED81563ED68CF03CE7767823EE7F2ED49F924A75CDBEB
25,078,932 UART: [art] SIG.S = 111969932186145A2C29DAE3084CBFB149D95A93F4E162198396532537337734A976C6A2FCF74B9215D318D209EF30E4
26,057,666 UART: Caliptra RT
26,058,390 UART: [state] CFI Enabled
26,223,483 UART: [rt] RT listening for mailbox commands...
26,225,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,256,946 UART: [rt]cmd =0x4d454153, len=108
26,275,680 >>> mbox cmd response data (12 bytes)
26,276,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,306,698 UART: [rt]cmd =0x4d454153, len=108
26,325,311 >>> mbox cmd response data (12 bytes)
26,325,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,356,392 UART: [rt]cmd =0x4d454153, len=108
26,374,299 >>> mbox cmd response data (12 bytes)
26,374,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,405,171 UART: [rt]cmd =0x4d454153, len=108
26,423,330 >>> mbox cmd response data (12 bytes)
26,423,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,454,406 UART: [rt]cmd =0x4d454153, len=108
26,472,069 >>> mbox cmd response data (12 bytes)
26,472,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,503,207 UART: [rt]cmd =0x4d454153, len=108
26,522,261 >>> mbox cmd response data (12 bytes)
26,522,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,553,325 UART: [rt]cmd =0x4d454153, len=108
26,571,648 >>> mbox cmd response data (12 bytes)
26,572,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,602,742 UART: [rt]cmd =0x4d454153, len=108
26,621,460 >>> mbox cmd response data (12 bytes)
26,621,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,652,510 UART: [rt]cmd =0x4d454153, len=108
26,670,897 >>> mbox cmd response data (12 bytes)
26,671,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,701,852 UART: [rt]cmd =0x4d454153, len=108
26,720,816 >>> mbox cmd response data (12 bytes)
26,721,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,751,933 UART: [rt]cmd =0x4d454153, len=108
26,770,205 >>> mbox cmd response data (12 bytes)
26,770,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,801,121 UART: [rt]cmd =0x4d454153, len=108
26,819,700 >>> mbox cmd response data (12 bytes)
26,820,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,850,780 UART: [rt]cmd =0x4d454153, len=108
26,869,725 >>> mbox cmd response data (12 bytes)
26,870,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,900,675 UART: [rt]cmd =0x4d454153, len=108
26,920,032 >>> mbox cmd response data (12 bytes)
26,920,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,950,994 UART: [rt]cmd =0x4d454153, len=108
26,968,764 >>> mbox cmd response data (12 bytes)
26,969,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,999,718 UART: [rt]cmd =0x4d454153, len=108
27,002,053 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
3,415,039 ready_for_fw is high
3,415,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,704,001 >>> mbox cmd response: success
18,981,724 UART:
18,982,114 UART: Running Caliptra FMC ...
18,983,209 UART:
18,983,362 UART: [state] CFI Enabled
19,052,398 UART: [fht] FMC Alias Private Key: 7
20,815,969 UART: [art] Extend RT PCRs Done
20,817,186 UART: [art] Lock RT PCRs Done
20,818,841 UART: [art] Populate DV Done
20,824,300 UART: [fht] FMC Alias Private Key: 7
20,825,998 UART: [art] Derive CDI
20,826,807 UART: [art] Store in in slot 0x4
20,885,218 UART: [art] Derive Key Pair
20,886,260 UART: [art] Store priv key in slot 0x5
23,349,414 UART: [art] Derive Key Pair - Done
23,362,255 UART: [art] Signing Cert with AUTHO
23,363,562 UART: RITY.KEYID = 7
25,075,624 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,138 UART: [art] PUB.X = 9479E6A957F91186C5B77412914992ED0290E3986104E52694EFE96B682FC982B57D5BAC4050DF9953E67E13C7E452DE
25,084,346 UART: [art] PUB.Y = 6FC266A87F8C72E4EF167E1131D2C305561D04AD0E3A11EDA76E2E0109C81A2058C9C994A9B2C5AF2B706422A65EFB23
25,091,672 UART: [art] SIG.R = 6A2244852458610D24BEEB75051DCF2CEECC6DEA267664504162650BF0519D307529785C60F46121CC81B131B9B47821
25,099,052 UART: [art] SIG.S = C4A1B0E425CC4C615C23B04781579E5BE677457E8C516EAD6FB6A48A0BCA6DA62BD27EE8CBCFA3C8D22526B5B524B0F9
26,078,198 UART: Caliptra RT
26,078,889 UART: [state] CFI Enabled
26,244,830 UART: [rt] RT listening for mailbox commands...
26,246,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,278,160 UART: [rt]cmd =0x4d454153, len=108
26,296,792 >>> mbox cmd response data (12 bytes)
26,297,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,327,980 UART: [rt]cmd =0x4d454153, len=108
26,346,430 >>> mbox cmd response data (12 bytes)
26,346,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,377,416 UART: [rt]cmd =0x4d454153, len=108
26,396,650 >>> mbox cmd response data (12 bytes)
26,397,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,428,057 UART: [rt]cmd =0x4d454153, len=108
26,446,522 >>> mbox cmd response data (12 bytes)
26,446,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,477,608 UART: [rt]cmd =0x4d454153, len=108
26,496,795 >>> mbox cmd response data (12 bytes)
26,497,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,527,874 UART: [rt]cmd =0x4d454153, len=108
26,546,062 >>> mbox cmd response data (12 bytes)
26,546,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,577,246 UART: [rt]cmd =0x4d454153, len=108
26,596,130 >>> mbox cmd response data (12 bytes)
26,596,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,627,391 UART: [rt]cmd =0x4d454153, len=108
26,646,224 >>> mbox cmd response data (12 bytes)
26,646,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,677,087 UART: [rt]cmd =0x4d454153, len=108
26,695,763 >>> mbox cmd response data (12 bytes)
26,696,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,726,670 UART: [rt]cmd =0x4d454153, len=108
26,744,575 >>> mbox cmd response data (12 bytes)
26,744,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,775,272 UART: [rt]cmd =0x4d454153, len=108
26,794,241 >>> mbox cmd response data (12 bytes)
26,794,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,825,207 UART: [rt]cmd =0x4d454153, len=108
26,844,204 >>> mbox cmd response data (12 bytes)
26,844,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,875,279 UART: [rt]cmd =0x4d454153, len=108
26,893,648 >>> mbox cmd response data (12 bytes)
26,894,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,924,825 UART: [rt]cmd =0x4d454153, len=108
26,943,761 >>> mbox cmd response data (12 bytes)
26,944,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,974,760 UART: [rt]cmd =0x4d454153, len=108
26,993,040 >>> mbox cmd response data (12 bytes)
26,993,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,024,157 UART: [rt]cmd =0x4d454153, len=108
27,026,467 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
193,188 UART:
193,563 UART: Running Caliptra ROM ...
194,770 UART:
604,531 UART: [state] CFI Enabled
615,990 UART: [state] LifecycleState = Unprovisioned
618,368 UART: [state] DebugLocked = No
620,609 UART: [state] WD Timer not started. Device not locked for debugging
625,713 UART: [kat] SHA2-256
815,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,308 UART: [kat] ++
826,937 UART: [kat] sha1
839,459 UART: [kat] SHA2-256
842,466 UART: [kat] SHA2-384
849,025 UART: [kat] SHA2-512-ACC
851,619 UART: [kat] ECC-384
3,294,139 UART: [kat] HMAC-384Kdf
3,307,155 UART: [kat] LMS
3,839,024 UART: [kat] --
3,842,093 UART: [cold-reset] ++
3,844,598 UART: [fht] FHT @ 0x50003400
3,856,357 UART: [idev] ++
3,857,001 UART: [idev] CDI.KEYID = 6
3,858,040 UART: [idev] SUBJECT.KEYID = 7
3,859,220 UART: [idev] UDS.KEYID = 0
3,860,144 ready_for_fw is high
3,860,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,615 UART: [idev] Erasing UDS.KEYID = 0
6,337,187 UART: [idev] Sha1 KeyId Algorithm
6,359,871 UART: [idev] --
6,365,320 UART: [ldev] ++
6,366,011 UART: [ldev] CDI.KEYID = 6
6,366,925 UART: [ldev] SUBJECT.KEYID = 5
6,368,088 UART: [ldev] AUTHORITY.KEYID = 7
6,369,328 UART: [ldev] FE.KEYID = 1
6,380,189 UART: [ldev] Erasing FE.KEYID = 1
8,857,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,334 UART: [ldev] --
10,648,885 UART: [fwproc] Wait for Commands...
10,651,490 UART: [fwproc] Recv command 0x46574c44
10,653,747 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,833,319 >>> mbox cmd response: success
14,837,021 UART: [afmc] ++
14,837,745 UART: [afmc] CDI.KEYID = 6
14,838,943 UART: [afmc] SUBJECT.KEYID = 7
14,840,386 UART: [afmc] AUTHORITY.KEYID = 5
17,351,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,439 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,794 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,649 UART: [afmc] --
19,149,464 UART: [cold-reset] --
19,152,904 UART: [state] Locking Datavault
19,159,351 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,509 UART: [state] Locking ICCM
19,163,024 UART: [exit] Launching FMC @ 0x40000130
19,171,663 UART:
19,171,904 UART: Running Caliptra FMC ...
19,173,009 UART:
19,173,179 UART: [state] CFI Enabled
19,181,119 UART: [fht] FMC Alias Private Key: 7
20,937,674 UART: [art] Extend RT PCRs Done
20,938,896 UART: [art] Lock RT PCRs Done
20,940,686 UART: [art] Populate DV Done
20,946,161 UART: [fht] FMC Alias Private Key: 7
20,947,757 UART: [art] Derive CDI
20,948,550 UART: [art] Store in in slot 0x4
20,991,263 UART: [art] Derive Key Pair
20,992,272 UART: [art] Store priv key in slot 0x5
23,419,834 UART: [art] Derive Key Pair - Done
23,432,819 UART: [art] Signing Cert with AUTHO
23,434,148 UART: RITY.KEYID = 7
25,139,805 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,314 UART: [art] PUB.X = 3CA05F8A4BB8F8248978E13F91B7B79C1C2C246FFD8E60993D8E7641895B9E1B1C90DB44E430E403986BDBD5AD0DFA2A
25,148,531 UART: [art] PUB.Y = F26FAB4E8E285D029DD2F276205667ABBC68C6F49D92DDF12BA6B3B514E10A4749970D785F7E669973F90C41C358D59A
25,155,797 UART: [art] SIG.R = A95CF66C7976C7E72D9E273704326C30B5C7ADF46250220CBF9C7694F950110438B1A45CF9D3362DB8E60EB6546F5DE7
25,163,227 UART: [art] SIG.S = 43D08C439527E3B5AD6ECE5AB339070D8D59A9F7C3D990E29C83F655EBDE2CD5307D969B423E7A3C97053E34D2B00DEB
26,142,452 UART: Caliptra RT
26,143,146 UART: [state] CFI Enabled
26,261,520 UART: [rt] RT listening for mailbox commands...
26,263,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,294,326 UART: [rt]cmd =0x4d454153, len=108
26,312,309 >>> mbox cmd response data (12 bytes)
26,312,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,343,539 UART: [rt]cmd =0x4d454153, len=108
26,361,609 >>> mbox cmd response data (12 bytes)
26,362,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,392,888 UART: [rt]cmd =0x4d454153, len=108
26,411,784 >>> mbox cmd response data (12 bytes)
26,412,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,442,870 UART: [rt]cmd =0x4d454153, len=108
26,461,960 >>> mbox cmd response data (12 bytes)
26,462,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,492,879 UART: [rt]cmd =0x4d454153, len=108
26,510,432 >>> mbox cmd response data (12 bytes)
26,510,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,541,562 UART: [rt]cmd =0x4d454153, len=108
26,560,430 >>> mbox cmd response data (12 bytes)
26,560,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,591,621 UART: [rt]cmd =0x4d454153, len=108
26,609,582 >>> mbox cmd response data (12 bytes)
26,610,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,640,551 UART: [rt]cmd =0x4d454153, len=108
26,659,133 >>> mbox cmd response data (12 bytes)
26,659,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,690,101 UART: [rt]cmd =0x4d454153, len=108
26,708,277 >>> mbox cmd response data (12 bytes)
26,708,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,739,292 UART: [rt]cmd =0x4d454153, len=108
26,758,167 >>> mbox cmd response data (12 bytes)
26,758,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,789,137 UART: [rt]cmd =0x4d454153, len=108
26,807,825 >>> mbox cmd response data (12 bytes)
26,808,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,838,757 UART: [rt]cmd =0x4d454153, len=108
26,857,148 >>> mbox cmd response data (12 bytes)
26,857,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,888,218 UART: [rt]cmd =0x4d454153, len=108
26,907,234 >>> mbox cmd response data (12 bytes)
26,907,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,938,263 UART: [rt]cmd =0x4d454153, len=108
26,957,846 >>> mbox cmd response data (12 bytes)
26,958,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,988,705 UART: [rt]cmd =0x4d454153, len=108
27,007,904 >>> mbox cmd response data (12 bytes)
27,008,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,038,830 UART: [rt]cmd =0x4d454153, len=108
27,041,195 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,670 writing to cptra_bootfsm_go
3,753,545 ready_for_fw is high
3,753,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,602 >>> mbox cmd response: success
19,205,047 UART:
19,205,475 UART: Running Caliptra FMC ...
19,206,627 UART:
19,206,795 UART: [state] CFI Enabled
19,214,863 UART: [fht] FMC Alias Private Key: 7
20,971,837 UART: [art] Extend RT PCRs Done
20,973,061 UART: [art] Lock RT PCRs Done
20,974,588 UART: [art] Populate DV Done
20,980,167 UART: [fht] FMC Alias Private Key: 7
20,981,667 UART: [art] Derive CDI
20,982,456 UART: [art] Store in in slot 0x4
21,025,109 UART: [art] Derive Key Pair
21,026,119 UART: [art] Store priv key in slot 0x5
23,452,789 UART: [art] Derive Key Pair - Done
23,465,308 UART: [art] Signing Cert with AUTHO
23,466,611 UART: RITY.KEYID = 7
25,171,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,405 UART: [art] PUB.X = 2F6E863660073F3F1F49380F43793392DAA3E8F988636F2117237AFC22BE2649DDA6D7DFE909AFE0A9814ED82ED6023B
25,180,647 UART: [art] PUB.Y = D3ABD4625311048AEA5B741AF5CF17ECB8BEF79D5C213CAF74D0279EDD609CB24D73DC58F4CC77BC5C0A2FA36F57CA91
25,187,962 UART: [art] SIG.R = 7F8081A6D0A952FFA51940C0A191B2AFA58511ADD7E991D05F8548288C5E92230530910D311DA15418669628A2310E10
25,195,352 UART: [art] SIG.S = D019D45425B7D15084B1024050399F81268FC2F4459D1BE75A99E91DFDFE20EF7282141079C96FAD14593B3BD3790C68
26,174,372 UART: Caliptra RT
26,175,059 UART: [state] CFI Enabled
26,291,915 UART: [rt] RT listening for mailbox commands...
26,293,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,324,547 UART: [rt]cmd =0x4d454153, len=108
26,342,546 >>> mbox cmd response data (12 bytes)
26,343,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,373,464 UART: [rt]cmd =0x4d454153, len=108
26,391,586 >>> mbox cmd response data (12 bytes)
26,392,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,422,520 UART: [rt]cmd =0x4d454153, len=108
26,441,261 >>> mbox cmd response data (12 bytes)
26,441,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,021 UART: [rt]cmd =0x4d454153, len=108
26,490,375 >>> mbox cmd response data (12 bytes)
26,490,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,521,116 UART: [rt]cmd =0x4d454153, len=108
26,539,803 >>> mbox cmd response data (12 bytes)
26,540,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,570,772 UART: [rt]cmd =0x4d454153, len=108
26,589,722 >>> mbox cmd response data (12 bytes)
26,590,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,620,767 UART: [rt]cmd =0x4d454153, len=108
26,639,426 >>> mbox cmd response data (12 bytes)
26,639,838 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,670,436 UART: [rt]cmd =0x4d454153, len=108
26,688,483 >>> mbox cmd response data (12 bytes)
26,688,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,719,673 UART: [rt]cmd =0x4d454153, len=108
26,738,660 >>> mbox cmd response data (12 bytes)
26,739,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,769,608 UART: [rt]cmd =0x4d454153, len=108
26,787,620 >>> mbox cmd response data (12 bytes)
26,788,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,818,797 UART: [rt]cmd =0x4d454153, len=108
26,837,595 >>> mbox cmd response data (12 bytes)
26,838,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,868,592 UART: [rt]cmd =0x4d454153, len=108
26,887,254 >>> mbox cmd response data (12 bytes)
26,887,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,918,332 UART: [rt]cmd =0x4d454153, len=108
26,936,916 >>> mbox cmd response data (12 bytes)
26,937,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,967,945 UART: [rt]cmd =0x4d454153, len=108
26,986,221 >>> mbox cmd response data (12 bytes)
26,986,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,017,271 UART: [rt]cmd =0x4d454153, len=108
27,036,413 >>> mbox cmd response data (12 bytes)
27,036,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,067,325 UART: [rt]cmd =0x4d454153, len=108
27,069,692 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,576 UART: [kat] LMS
1,475,772 UART: [kat] --
1,476,427 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,480 UART: [idev] ++
1,479,648 UART: [idev] CDI.KEYID = 6
1,480,008 UART: [idev] SUBJECT.KEYID = 7
1,480,432 UART: [idev] UDS.KEYID = 0
1,480,777 ready_for_fw is high
1,480,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,715 UART: [ldev] ++
1,514,883 UART: [ldev] CDI.KEYID = 6
1,515,246 UART: [ldev] SUBJECT.KEYID = 5
1,515,672 UART: [ldev] AUTHORITY.KEYID = 7
1,516,135 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,958 UART: [ldev] --
1,586,265 UART: [fwproc] Waiting for Commands...
1,587,038 UART: [fwproc] Received command 0x46574c44
1,587,829 UART: [fwproc] Received Image of size 114084 bytes
2,882,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,065 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,788 >>> mbox cmd response: success
3,075,856 UART: [afmc] ++
3,076,024 UART: [afmc] CDI.KEYID = 6
3,076,386 UART: [afmc] SUBJECT.KEYID = 7
3,076,811 UART: [afmc] AUTHORITY.KEYID = 5
3,111,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,130 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,638 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,523 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,213 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,932 UART: [afmc] --
3,154,814 UART: [cold-reset] --
3,155,600 UART: [state] Locking Datavault
3,156,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,355 UART: [state] Locking ICCM
3,157,881 UART: [exit] Launching FMC @ 0x40000130
3,163,210 UART:
3,163,226 UART: Running Caliptra FMC ...
3,163,634 UART:
3,163,688 UART: [state] CFI Enabled
3,174,361 UART: [fht] FMC Alias Private Key: 7
3,282,158 UART: [art] Extend RT PCRs Done
3,282,586 UART: [art] Lock RT PCRs Done
3,284,244 UART: [art] Populate DV Done
3,292,117 UART: [fht] FMC Alias Private Key: 7
3,293,273 UART: [art] Derive CDI
3,293,553 UART: [art] Store in in slot 0x4
3,379,128 UART: [art] Derive Key Pair
3,379,488 UART: [art] Store priv key in slot 0x5
3,392,754 UART: [art] Derive Key Pair - Done
3,407,406 UART: [art] Signing Cert with AUTHO
3,407,886 UART: RITY.KEYID = 7
3,423,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,019 UART: [art] PUB.X = 71E6FC283B6C408E705D0CB64C4F2DEB4607AA3A46B0261B7E6E3B0D191068B6D472DE0DBBF42D0910659E79B52073DA
3,430,784 UART: [art] PUB.Y = 9C1031ABA54710B6261482F92A4BE0C5121A1BC1970CA9EED1C930C25B3791ECE5E8AFC977C55AFADB04789D348D8B81
3,437,740 UART: [art] SIG.R = 152920BBAB3BB8EFF50B09344C786E118B22939B48E2FE94095E4607134E8E25AF88600E32C7450184B4BF9E2F84D6AE
3,444,494 UART: [art] SIG.S = A0208F649A24035C299385C5EFCB6CA06117D88A616F55E4D7009A077DA0BCA4DA83573F7BE09606B4BE8D2E35757988
3,468,402 UART: Caliptra RT
3,468,655 UART: [state] CFI Enabled
3,577,158 UART: [rt] RT listening for mailbox commands...
3,577,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,558 UART: [rt]cmd =0x4d454153, len=108
3,629,477 >>> mbox cmd response data (12 bytes)
3,629,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,511 UART: [rt]cmd =0x4d454153, len=108
3,680,126 >>> mbox cmd response data (12 bytes)
3,680,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,220 UART: [rt]cmd =0x4d454153, len=108
3,730,547 >>> mbox cmd response data (12 bytes)
3,730,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,541 UART: [rt]cmd =0x4d454153, len=108
3,780,784 >>> mbox cmd response data (12 bytes)
3,780,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,810,964 UART: [rt]cmd =0x4d454153, len=108
3,831,321 >>> mbox cmd response data (12 bytes)
3,831,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,405 UART: [rt]cmd =0x4d454153, len=108
3,882,162 >>> mbox cmd response data (12 bytes)
3,882,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,156 UART: [rt]cmd =0x4d454153, len=108
3,933,151 >>> mbox cmd response data (12 bytes)
3,933,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,101 UART: [rt]cmd =0x4d454153, len=108
3,983,284 >>> mbox cmd response data (12 bytes)
3,983,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,224 UART: [rt]cmd =0x4d454153, len=108
4,033,853 >>> mbox cmd response data (12 bytes)
4,033,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,639 UART: [rt]cmd =0x4d454153, len=108
4,084,892 >>> mbox cmd response data (12 bytes)
4,084,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,726 UART: [rt]cmd =0x4d454153, len=108
4,135,671 >>> mbox cmd response data (12 bytes)
4,135,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,621 UART: [rt]cmd =0x4d454153, len=108
4,187,128 >>> mbox cmd response data (12 bytes)
4,187,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,217,364 UART: [rt]cmd =0x4d454153, len=108
4,237,983 >>> mbox cmd response data (12 bytes)
4,237,984 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,239 UART: [rt]cmd =0x4d454153, len=108
4,288,364 >>> mbox cmd response data (12 bytes)
4,288,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,318,182 UART: [rt]cmd =0x4d454153, len=108
4,338,667 >>> mbox cmd response data (12 bytes)
4,338,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,727 UART: [rt]cmd =0x4d454153, len=108
4,370,421 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,177 ready_for_fw is high
1,362,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,052 >>> mbox cmd response: success
2,986,010 UART:
2,986,026 UART: Running Caliptra FMC ...
2,986,434 UART:
2,986,488 UART: [state] CFI Enabled
2,997,007 UART: [fht] FMC Alias Private Key: 7
3,105,270 UART: [art] Extend RT PCRs Done
3,105,698 UART: [art] Lock RT PCRs Done
3,106,788 UART: [art] Populate DV Done
3,114,957 UART: [fht] FMC Alias Private Key: 7
3,116,075 UART: [art] Derive CDI
3,116,355 UART: [art] Store in in slot 0x4
3,201,978 UART: [art] Derive Key Pair
3,202,338 UART: [art] Store priv key in slot 0x5
3,215,396 UART: [art] Derive Key Pair - Done
3,230,479 UART: [art] Signing Cert with AUTHO
3,230,959 UART: RITY.KEYID = 7
3,246,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,040 UART: [art] PUB.X = E04C564328E944EF160E173AFD2137EB73B46D50D4954D24EA4586FF6FD36C82C9EF507AD4DCE25B0D09E20DD868A193
3,253,808 UART: [art] PUB.Y = 6D8137189DF7D98E91624C0616DAB3A35D35893A3A96EE2F6046722AFD173718F1789DB0CC605FA009039766DBC2D31E
3,260,749 UART: [art] SIG.R = 8542AA2ED02FC613FFFCDAE201E3A2B2CAC6C56B88A4016C9D00057751DF0A65C76975DA83D09D616FA07AE61E2C4C7D
3,267,503 UART: [art] SIG.S = 155B4B2F541013A82CB5EE708B5B1BE5A628D6EE0FE62C3EAD15C80A6C9A5A549C896F1E310DB7EE1DA7F9DA07FEDB29
3,291,144 UART: Caliptra RT
3,291,397 UART: [state] CFI Enabled
3,399,446 UART: [rt] RT listening for mailbox commands...
3,400,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,522 UART: [rt]cmd =0x4d454153, len=108
3,450,997 >>> mbox cmd response data (12 bytes)
3,450,998 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,079 UART: [rt]cmd =0x4d454153, len=108
3,501,046 >>> mbox cmd response data (12 bytes)
3,501,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,866 UART: [rt]cmd =0x4d454153, len=108
3,550,985 >>> mbox cmd response data (12 bytes)
3,550,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,971 UART: [rt]cmd =0x4d454153, len=108
3,600,984 >>> mbox cmd response data (12 bytes)
3,600,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,962 UART: [rt]cmd =0x4d454153, len=108
3,652,335 >>> mbox cmd response data (12 bytes)
3,652,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,321 UART: [rt]cmd =0x4d454153, len=108
3,703,408 >>> mbox cmd response data (12 bytes)
3,703,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,262 UART: [rt]cmd =0x4d454153, len=108
3,754,205 >>> mbox cmd response data (12 bytes)
3,754,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,307 UART: [rt]cmd =0x4d454153, len=108
3,804,864 >>> mbox cmd response data (12 bytes)
3,804,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,068 UART: [rt]cmd =0x4d454153, len=108
3,855,401 >>> mbox cmd response data (12 bytes)
3,855,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,311 UART: [rt]cmd =0x4d454153, len=108
3,906,242 >>> mbox cmd response data (12 bytes)
3,906,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,202 UART: [rt]cmd =0x4d454153, len=108
3,956,447 >>> mbox cmd response data (12 bytes)
3,956,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,381 UART: [rt]cmd =0x4d454153, len=108
4,006,810 >>> mbox cmd response data (12 bytes)
4,006,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,036,636 UART: [rt]cmd =0x4d454153, len=108
4,057,593 >>> mbox cmd response data (12 bytes)
4,057,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,509 UART: [rt]cmd =0x4d454153, len=108
4,107,576 >>> mbox cmd response data (12 bytes)
4,107,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,137,432 UART: [rt]cmd =0x4d454153, len=108
4,158,443 >>> mbox cmd response data (12 bytes)
4,158,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,188,573 UART: [rt]cmd =0x4d454153, len=108
4,190,551 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,490 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,458 UART: [cold-reset] ++
1,476,858 UART: [fht] Storing FHT @ 0x50003400
1,479,595 UART: [idev] ++
1,479,763 UART: [idev] CDI.KEYID = 6
1,480,123 UART: [idev] SUBJECT.KEYID = 7
1,480,547 UART: [idev] UDS.KEYID = 0
1,480,892 ready_for_fw is high
1,480,892 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,506,045 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,631 UART: [idev] --
1,515,654 UART: [ldev] ++
1,515,822 UART: [ldev] CDI.KEYID = 6
1,516,185 UART: [ldev] SUBJECT.KEYID = 5
1,516,611 UART: [ldev] AUTHORITY.KEYID = 7
1,517,074 UART: [ldev] FE.KEYID = 1
1,522,370 UART: [ldev] Erasing FE.KEYID = 1
1,547,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,567 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,567 UART: [fwproc] Received command 0x46574c44
1,588,358 UART: [fwproc] Received Image of size 114084 bytes
2,883,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,945 >>> mbox cmd response: success
3,075,975 UART: [afmc] ++
3,076,143 UART: [afmc] CDI.KEYID = 6
3,076,505 UART: [afmc] SUBJECT.KEYID = 7
3,076,930 UART: [afmc] AUTHORITY.KEYID = 5
3,112,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,549 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,329 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,942 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,632 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,689 UART: [afmc] --
3,155,819 UART: [cold-reset] --
3,156,617 UART: [state] Locking Datavault
3,157,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,384 UART: [state] Locking ICCM
3,158,834 UART: [exit] Launching FMC @ 0x40000130
3,164,163 UART:
3,164,179 UART: Running Caliptra FMC ...
3,164,587 UART:
3,164,730 UART: [state] CFI Enabled
3,175,453 UART: [fht] FMC Alias Private Key: 7
3,283,398 UART: [art] Extend RT PCRs Done
3,283,826 UART: [art] Lock RT PCRs Done
3,285,486 UART: [art] Populate DV Done
3,293,699 UART: [fht] FMC Alias Private Key: 7
3,294,721 UART: [art] Derive CDI
3,295,001 UART: [art] Store in in slot 0x4
3,380,306 UART: [art] Derive Key Pair
3,380,666 UART: [art] Store priv key in slot 0x5
3,394,064 UART: [art] Derive Key Pair - Done
3,408,598 UART: [art] Signing Cert with AUTHO
3,409,078 UART: RITY.KEYID = 7
3,424,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,349 UART: [art] PUB.X = E596095683E9DFD53303B0B2CDF73A08C055F159615C4C7726D4552B927399616B86779BD46D606A5783FC943257E36E
3,432,100 UART: [art] PUB.Y = ABC15185AF5D91FF9B6EE13194E0E0E06A36516012D9613F64AEDCDA79FF1997058DD620DA29FDDD248E69CB4B9DEB4E
3,439,067 UART: [art] SIG.R = 351076EBB7B1684E28FCFBAEA08E60C8C893D204F544837C4DD640BE465838AACDB71D729EB19F75BA726A57782B371B
3,445,844 UART: [art] SIG.S = 91F90C73DEAE68FD5E9C4C6BB174FA27F2A7881381F2C434B1F8FBB7443092940A42B412B09E25FFF548FD45D2FD7F84
3,470,627 UART: Caliptra RT
3,470,972 UART: [state] CFI Enabled
3,581,205 UART: [rt] RT listening for mailbox commands...
3,581,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,365 UART: [rt]cmd =0x4d454153, len=108
3,633,388 >>> mbox cmd response data (12 bytes)
3,633,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,234 UART: [rt]cmd =0x4d454153, len=108
3,683,691 >>> mbox cmd response data (12 bytes)
3,683,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,713 UART: [rt]cmd =0x4d454153, len=108
3,734,062 >>> mbox cmd response data (12 bytes)
3,734,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,024 UART: [rt]cmd =0x4d454153, len=108
3,784,677 >>> mbox cmd response data (12 bytes)
3,784,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,779 UART: [rt]cmd =0x4d454153, len=108
3,834,866 >>> mbox cmd response data (12 bytes)
3,834,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,926 UART: [rt]cmd =0x4d454153, len=108
3,885,409 >>> mbox cmd response data (12 bytes)
3,885,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,473 UART: [rt]cmd =0x4d454153, len=108
3,936,012 >>> mbox cmd response data (12 bytes)
3,936,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,762 UART: [rt]cmd =0x4d454153, len=108
3,986,363 >>> mbox cmd response data (12 bytes)
3,986,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,201 UART: [rt]cmd =0x4d454153, len=108
4,036,542 >>> mbox cmd response data (12 bytes)
4,036,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,596 UART: [rt]cmd =0x4d454153, len=108
4,087,803 >>> mbox cmd response data (12 bytes)
4,087,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,837 UART: [rt]cmd =0x4d454153, len=108
4,139,098 >>> mbox cmd response data (12 bytes)
4,139,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,182 UART: [rt]cmd =0x4d454153, len=108
4,189,601 >>> mbox cmd response data (12 bytes)
4,189,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,889 UART: [rt]cmd =0x4d454153, len=108
4,240,418 >>> mbox cmd response data (12 bytes)
4,240,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,454 UART: [rt]cmd =0x4d454153, len=108
4,291,605 >>> mbox cmd response data (12 bytes)
4,291,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,503 UART: [rt]cmd =0x4d454153, len=108
4,342,072 >>> mbox cmd response data (12 bytes)
4,342,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,206 UART: [rt]cmd =0x4d454153, len=108
4,373,910 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,616 ready_for_fw is high
1,362,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,571 >>> mbox cmd response: success
2,987,043 UART:
2,987,059 UART: Running Caliptra FMC ...
2,987,467 UART:
2,987,610 UART: [state] CFI Enabled
2,998,377 UART: [fht] FMC Alias Private Key: 7
3,106,374 UART: [art] Extend RT PCRs Done
3,106,802 UART: [art] Lock RT PCRs Done
3,108,344 UART: [art] Populate DV Done
3,116,763 UART: [fht] FMC Alias Private Key: 7
3,117,715 UART: [art] Derive CDI
3,117,995 UART: [art] Store in in slot 0x4
3,203,448 UART: [art] Derive Key Pair
3,203,808 UART: [art] Store priv key in slot 0x5
3,217,358 UART: [art] Derive Key Pair - Done
3,232,296 UART: [art] Signing Cert with AUTHO
3,232,776 UART: RITY.KEYID = 7
3,248,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,873 UART: [art] PUB.X = 4A2C16F6D9DC8EB7AFB8C8423868B92D8FAF61D313B5790873E3FE9C5B67894091BB4E06B32931028790B514A30AA4EC
3,255,637 UART: [art] PUB.Y = E9FE7CB054F68B532FCE924E1FA64C87CE335C4EB33431408B67F35FD53FC28C52E2E536EFAD2B38B88B23FB71949D82
3,262,601 UART: [art] SIG.R = 67A8AFB67AFE7D48F9DF253329C46E0F8D6A69122E5D1865561A97032136A4A43C93172C43BC5D87C2554A5E9EAD0286
3,269,364 UART: [art] SIG.S = AE94581D6A53B8207CB1CE9D0CF536AD9867926BAFE57F4222FB6DEA0C812E5B4299A74360FEFEBC8D306D22946311E1
3,292,901 UART: Caliptra RT
3,293,246 UART: [state] CFI Enabled
3,402,973 UART: [rt] RT listening for mailbox commands...
3,403,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,969 UART: [rt]cmd =0x4d454153, len=108
3,453,944 >>> mbox cmd response data (12 bytes)
3,453,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,160 UART: [rt]cmd =0x4d454153, len=108
3,504,947 >>> mbox cmd response data (12 bytes)
3,504,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,813 UART: [rt]cmd =0x4d454153, len=108
3,555,256 >>> mbox cmd response data (12 bytes)
3,555,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,118 UART: [rt]cmd =0x4d454153, len=108
3,606,175 >>> mbox cmd response data (12 bytes)
3,606,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,041 UART: [rt]cmd =0x4d454153, len=108
3,656,564 >>> mbox cmd response data (12 bytes)
3,656,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,622 UART: [rt]cmd =0x4d454153, len=108
3,706,587 >>> mbox cmd response data (12 bytes)
3,706,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,623 UART: [rt]cmd =0x4d454153, len=108
3,757,372 >>> mbox cmd response data (12 bytes)
3,757,373 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,580 UART: [rt]cmd =0x4d454153, len=108
3,808,049 >>> mbox cmd response data (12 bytes)
3,808,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,857 UART: [rt]cmd =0x4d454153, len=108
3,858,682 >>> mbox cmd response data (12 bytes)
3,858,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,888 UART: [rt]cmd =0x4d454153, len=108
3,909,953 >>> mbox cmd response data (12 bytes)
3,909,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,005 UART: [rt]cmd =0x4d454153, len=108
3,960,476 >>> mbox cmd response data (12 bytes)
3,960,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,246 UART: [rt]cmd =0x4d454153, len=108
4,010,629 >>> mbox cmd response data (12 bytes)
4,010,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,633 UART: [rt]cmd =0x4d454153, len=108
4,060,772 >>> mbox cmd response data (12 bytes)
4,060,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,900 UART: [rt]cmd =0x4d454153, len=108
4,111,551 >>> mbox cmd response data (12 bytes)
4,111,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,605 UART: [rt]cmd =0x4d454153, len=108
4,162,152 >>> mbox cmd response data (12 bytes)
4,162,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,288 UART: [rt]cmd =0x4d454153, len=108
4,194,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
893,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,195 UART: [kat] ++
897,347 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,532 UART: [kat] LMS
1,170,860 UART: [kat] --
1,171,857 UART: [cold-reset] ++
1,172,279 UART: [fht] FHT @ 0x50003400
1,175,028 UART: [idev] ++
1,175,196 UART: [idev] CDI.KEYID = 6
1,175,556 UART: [idev] SUBJECT.KEYID = 7
1,175,980 UART: [idev] UDS.KEYID = 0
1,176,325 ready_for_fw is high
1,176,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,346 UART: [idev] Erasing UDS.KEYID = 0
1,201,493 UART: [idev] Sha1 KeyId Algorithm
1,209,871 UART: [idev] --
1,210,831 UART: [ldev] ++
1,210,999 UART: [ldev] CDI.KEYID = 6
1,211,362 UART: [ldev] SUBJECT.KEYID = 5
1,211,788 UART: [ldev] AUTHORITY.KEYID = 7
1,212,251 UART: [ldev] FE.KEYID = 1
1,217,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,737 UART: [ldev] --
1,283,082 UART: [fwproc] Wait for Commands...
1,283,860 UART: [fwproc] Recv command 0x46574c44
1,284,588 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,328 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,097 >>> mbox cmd response: success
2,772,357 UART: [afmc] ++
2,772,525 UART: [afmc] CDI.KEYID = 6
2,772,887 UART: [afmc] SUBJECT.KEYID = 7
2,773,312 UART: [afmc] AUTHORITY.KEYID = 5
2,808,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,908 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,521 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,936 UART: [afmc] --
2,852,010 UART: [cold-reset] --
2,852,936 UART: [state] Locking Datavault
2,853,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,373 UART: [state] Locking ICCM
2,854,881 UART: [exit] Launching FMC @ 0x40000130
2,860,210 UART:
2,860,226 UART: Running Caliptra FMC ...
2,860,634 UART:
2,860,688 UART: [state] CFI Enabled
2,871,477 UART: [fht] FMC Alias Private Key: 7
2,979,098 UART: [art] Extend RT PCRs Done
2,979,526 UART: [art] Lock RT PCRs Done
2,980,936 UART: [art] Populate DV Done
2,988,991 UART: [fht] FMC Alias Private Key: 7
2,990,165 UART: [art] Derive CDI
2,990,445 UART: [art] Store in in slot 0x4
3,075,774 UART: [art] Derive Key Pair
3,076,134 UART: [art] Store priv key in slot 0x5
3,088,880 UART: [art] Derive Key Pair - Done
3,104,004 UART: [art] Signing Cert with AUTHO
3,104,484 UART: RITY.KEYID = 7
3,119,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,217 UART: [art] PUB.X = 85730CA285165F9F596DD6C91DE4B9275FE589CC3DEC5F5C1D1AC1ACA0374A67EF9D4CEB9B6C9D140BA5E669EB1AF03C
3,127,005 UART: [art] PUB.Y = 6EA945AC6ECAACC96469319C5EC620DD34D2C0595B001ADC334DE1339CDFEBF0F1903ABE5E9C874150C7C8457C916B8D
3,133,951 UART: [art] SIG.R = 831DE95BEAD26F124102C5A0C532DE066140E99F8829DC5F97E92B68C88EAC4C6C0AD6CC840AA60D2E2215A01C87D178
3,140,716 UART: [art] SIG.S = 82A20F45A08EE4834F10CF05949CB5B691A5776E620EBB55D76E5492B8A7804FA7FE286FD83B8F800E3B80310F2D6CA8
3,164,108 UART: Caliptra RT
3,164,361 UART: [state] CFI Enabled
3,271,617 UART: [rt] RT listening for mailbox commands...
3,272,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,901 UART: [rt]cmd =0x4d454153, len=108
3,323,092 >>> mbox cmd response data (12 bytes)
3,323,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,076 UART: [rt]cmd =0x4d454153, len=108
3,373,467 >>> mbox cmd response data (12 bytes)
3,373,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,339 UART: [rt]cmd =0x4d454153, len=108
3,424,578 >>> mbox cmd response data (12 bytes)
3,424,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,476 UART: [rt]cmd =0x4d454153, len=108
3,475,595 >>> mbox cmd response data (12 bytes)
3,475,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,665 UART: [rt]cmd =0x4d454153, len=108
3,526,254 >>> mbox cmd response data (12 bytes)
3,526,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,046 UART: [rt]cmd =0x4d454153, len=108
3,576,467 >>> mbox cmd response data (12 bytes)
3,576,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,653 UART: [rt]cmd =0x4d454153, len=108
3,627,404 >>> mbox cmd response data (12 bytes)
3,627,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,546 UART: [rt]cmd =0x4d454153, len=108
3,678,957 >>> mbox cmd response data (12 bytes)
3,678,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,891 UART: [rt]cmd =0x4d454153, len=108
3,729,462 >>> mbox cmd response data (12 bytes)
3,729,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,370 UART: [rt]cmd =0x4d454153, len=108
3,781,021 >>> mbox cmd response data (12 bytes)
3,781,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,203 UART: [rt]cmd =0x4d454153, len=108
3,832,784 >>> mbox cmd response data (12 bytes)
3,832,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,714 UART: [rt]cmd =0x4d454153, len=108
3,883,319 >>> mbox cmd response data (12 bytes)
3,883,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,423 UART: [rt]cmd =0x4d454153, len=108
3,934,586 >>> mbox cmd response data (12 bytes)
3,934,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,552 UART: [rt]cmd =0x4d454153, len=108
3,985,645 >>> mbox cmd response data (12 bytes)
3,985,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,591 UART: [rt]cmd =0x4d454153, len=108
4,036,582 >>> mbox cmd response data (12 bytes)
4,036,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,890 UART: [rt]cmd =0x4d454153, len=108
4,068,802 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,788 >>> mbox cmd response: success
2,683,438 UART:
2,683,454 UART: Running Caliptra FMC ...
2,683,862 UART:
2,683,916 UART: [state] CFI Enabled
2,694,497 UART: [fht] FMC Alias Private Key: 7
2,802,414 UART: [art] Extend RT PCRs Done
2,802,842 UART: [art] Lock RT PCRs Done
2,804,564 UART: [art] Populate DV Done
2,812,919 UART: [fht] FMC Alias Private Key: 7
2,813,913 UART: [art] Derive CDI
2,814,193 UART: [art] Store in in slot 0x4
2,899,988 UART: [art] Derive Key Pair
2,900,348 UART: [art] Store priv key in slot 0x5
2,913,704 UART: [art] Derive Key Pair - Done
2,928,583 UART: [art] Signing Cert with AUTHO
2,929,063 UART: RITY.KEYID = 7
2,944,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,040 UART: [art] PUB.X = BF453E6AF6384CD6BCE6703AE10F151CAFC882CC473A4C2E1DFAFEE52CA214D7F2798C1FB5EDCC3674CF3328D4563725
2,951,829 UART: [art] PUB.Y = D6CE56E5EA6E804FC5A829A24FEBC1D5BCAA3FF9968B8ED39E801A13268A4526A068B052FE9A751F1C399EBED930E2BA
2,958,801 UART: [art] SIG.R = 8468545BED31232A944EEF8D05F9415535832D68D9E09C2C4A0B144527FC68B3EE2783DD758B92B9AF20C5A1DBE0365C
2,965,569 UART: [art] SIG.S = 7C68E145488B3805ED386BCB78FB17F860E510F56AB0C5387D595F4D3029BCF73F6E87753B013E6B8BD13AF1DF511BAC
2,990,082 UART: Caliptra RT
2,990,335 UART: [state] CFI Enabled
3,098,560 UART: [rt] RT listening for mailbox commands...
3,099,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,598 UART: [rt]cmd =0x4d454153, len=108
3,150,473 >>> mbox cmd response data (12 bytes)
3,150,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,229 UART: [rt]cmd =0x4d454153, len=108
3,201,570 >>> mbox cmd response data (12 bytes)
3,201,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,556 UART: [rt]cmd =0x4d454153, len=108
3,252,531 >>> mbox cmd response data (12 bytes)
3,252,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,451 UART: [rt]cmd =0x4d454153, len=108
3,303,274 >>> mbox cmd response data (12 bytes)
3,303,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,290 UART: [rt]cmd =0x4d454153, len=108
3,353,633 >>> mbox cmd response data (12 bytes)
3,353,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,691 UART: [rt]cmd =0x4d454153, len=108
3,403,376 >>> mbox cmd response data (12 bytes)
3,403,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,180 UART: [rt]cmd =0x4d454153, len=108
3,453,293 >>> mbox cmd response data (12 bytes)
3,453,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,145 UART: [rt]cmd =0x4d454153, len=108
3,504,120 >>> mbox cmd response data (12 bytes)
3,504,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,998 UART: [rt]cmd =0x4d454153, len=108
3,554,501 >>> mbox cmd response data (12 bytes)
3,554,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,511 UART: [rt]cmd =0x4d454153, len=108
3,604,836 >>> mbox cmd response data (12 bytes)
3,604,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,954 UART: [rt]cmd =0x4d454153, len=108
3,656,619 >>> mbox cmd response data (12 bytes)
3,656,620 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,467 UART: [rt]cmd =0x4d454153, len=108
3,706,392 >>> mbox cmd response data (12 bytes)
3,706,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,498 UART: [rt]cmd =0x4d454153, len=108
3,757,643 >>> mbox cmd response data (12 bytes)
3,757,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,643 UART: [rt]cmd =0x4d454153, len=108
3,808,802 >>> mbox cmd response data (12 bytes)
3,808,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,016 UART: [rt]cmd =0x4d454153, len=108
3,860,185 >>> mbox cmd response data (12 bytes)
3,860,186 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,959 UART: [rt]cmd =0x4d454153, len=108
3,891,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,218 UART: [kat] SHA2-256
904,158 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,703 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,804 UART: [cold-reset] ++
1,173,180 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 ready_for_fw is high
1,176,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,827 UART: [idev] Erasing UDS.KEYID = 0
1,201,664 UART: [idev] Sha1 KeyId Algorithm
1,210,066 UART: [idev] --
1,210,990 UART: [ldev] ++
1,211,158 UART: [ldev] CDI.KEYID = 6
1,211,521 UART: [ldev] SUBJECT.KEYID = 5
1,211,947 UART: [ldev] AUTHORITY.KEYID = 7
1,212,410 UART: [ldev] FE.KEYID = 1
1,218,016 UART: [ldev] Erasing FE.KEYID = 1
1,243,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,930 UART: [ldev] --
1,283,195 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,625 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,456 >>> mbox cmd response: success
2,772,560 UART: [afmc] ++
2,772,728 UART: [afmc] CDI.KEYID = 6
2,773,090 UART: [afmc] SUBJECT.KEYID = 7
2,773,515 UART: [afmc] AUTHORITY.KEYID = 5
2,809,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,861 UART: [afmc] --
2,852,807 UART: [cold-reset] --
2,853,605 UART: [state] Locking Datavault
2,854,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,442 UART: [state] Locking ICCM
2,855,998 UART: [exit] Launching FMC @ 0x40000130
2,861,327 UART:
2,861,343 UART: Running Caliptra FMC ...
2,861,751 UART:
2,861,894 UART: [state] CFI Enabled
2,872,471 UART: [fht] FMC Alias Private Key: 7
2,980,868 UART: [art] Extend RT PCRs Done
2,981,296 UART: [art] Lock RT PCRs Done
2,982,972 UART: [art] Populate DV Done
2,991,281 UART: [fht] FMC Alias Private Key: 7
2,992,257 UART: [art] Derive CDI
2,992,537 UART: [art] Store in in slot 0x4
3,078,482 UART: [art] Derive Key Pair
3,078,842 UART: [art] Store priv key in slot 0x5
3,092,092 UART: [art] Derive Key Pair - Done
3,106,980 UART: [art] Signing Cert with AUTHO
3,107,460 UART: RITY.KEYID = 7
3,122,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,529 UART: [art] PUB.X = 9C25607F0462458DF6E22B18A114822E8DBF9D92AD03B85B1D0115AFE21011ECDC9B57847C6D3518E1B5C03DC34D9C57
3,130,296 UART: [art] PUB.Y = D4C97783A15C296544AF6AF82B3CBF54CA557A14B90E658A5F37BC7602D7EF4C4F590C45E859542CADB95B373F8B8DFA
3,137,251 UART: [art] SIG.R = 8370F2D4BDDCF77917C8AF29DCC8D1548BD1F5775A99F65A6B771E91DF8C2A5221809C15A16852AC7C5B9F29A50F5D8C
3,144,030 UART: [art] SIG.S = F3629C778896DA502F710B56406C958D877E068AE330CB64BD6F19DA9601F0DD0346A6CACFE9FB3CEF96383C0090EE3A
3,167,981 UART: Caliptra RT
3,168,326 UART: [state] CFI Enabled
3,275,720 UART: [rt] RT listening for mailbox commands...
3,276,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,070 UART: [rt]cmd =0x4d454153, len=108
3,327,221 >>> mbox cmd response data (12 bytes)
3,327,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,095 UART: [rt]cmd =0x4d454153, len=108
3,377,872 >>> mbox cmd response data (12 bytes)
3,377,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,872 UART: [rt]cmd =0x4d454153, len=108
3,428,699 >>> mbox cmd response data (12 bytes)
3,428,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,039 UART: [rt]cmd =0x4d454153, len=108
3,479,598 >>> mbox cmd response data (12 bytes)
3,479,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,580 UART: [rt]cmd =0x4d454153, len=108
3,530,615 >>> mbox cmd response data (12 bytes)
3,530,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,783 UART: [rt]cmd =0x4d454153, len=108
3,581,482 >>> mbox cmd response data (12 bytes)
3,581,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,640 UART: [rt]cmd =0x4d454153, len=108
3,632,921 >>> mbox cmd response data (12 bytes)
3,632,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,863 UART: [rt]cmd =0x4d454153, len=108
3,682,308 >>> mbox cmd response data (12 bytes)
3,682,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,468 UART: [rt]cmd =0x4d454153, len=108
3,733,119 >>> mbox cmd response data (12 bytes)
3,733,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,107 UART: [rt]cmd =0x4d454153, len=108
3,784,086 >>> mbox cmd response data (12 bytes)
3,784,087 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,152 UART: [rt]cmd =0x4d454153, len=108
3,835,309 >>> mbox cmd response data (12 bytes)
3,835,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,243 UART: [rt]cmd =0x4d454153, len=108
3,885,552 >>> mbox cmd response data (12 bytes)
3,885,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,456 UART: [rt]cmd =0x4d454153, len=108
3,936,455 >>> mbox cmd response data (12 bytes)
3,936,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,383 UART: [rt]cmd =0x4d454153, len=108
3,987,322 >>> mbox cmd response data (12 bytes)
3,987,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,334 UART: [rt]cmd =0x4d454153, len=108
4,037,823 >>> mbox cmd response data (12 bytes)
4,037,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,623 UART: [rt]cmd =0x4d454153, len=108
4,069,473 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 ready_for_fw is high
1,060,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,059 >>> mbox cmd response: success
2,684,677 UART:
2,684,693 UART: Running Caliptra FMC ...
2,685,101 UART:
2,685,244 UART: [state] CFI Enabled
2,695,763 UART: [fht] FMC Alias Private Key: 7
2,803,210 UART: [art] Extend RT PCRs Done
2,803,638 UART: [art] Lock RT PCRs Done
2,804,926 UART: [art] Populate DV Done
2,813,003 UART: [fht] FMC Alias Private Key: 7
2,814,165 UART: [art] Derive CDI
2,814,445 UART: [art] Store in in slot 0x4
2,899,962 UART: [art] Derive Key Pair
2,900,322 UART: [art] Store priv key in slot 0x5
2,914,248 UART: [art] Derive Key Pair - Done
2,928,954 UART: [art] Signing Cert with AUTHO
2,929,434 UART: RITY.KEYID = 7
2,944,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,679 UART: [art] PUB.X = 67ED56A88271EBC6ABD7BC756015D67D3BC3B9A9AD60B2AE96ADCBE8AB31C1E77A4E33CFFF61F9DD1E3F09CD76AD1F2C
2,952,480 UART: [art] PUB.Y = 8DB91F3F49766E57F7F1A05E7BAE076DCF3BBE8886D54BC53A2C4755ADF67D69C163915893C89CC1C5291A6DBCEA89E8
2,959,443 UART: [art] SIG.R = 14EDC39439DAA4FBCE7E511F84C0D3BBB11D37BC4500E94E4182F7C0755A3003C9FD35E2524E4A46AEE69059726843A8
2,966,196 UART: [art] SIG.S = 88497B7F017A34308EE53A24FF490F20F18B1946EEE8321AA8AC0B9D00FC752E3979B2B17666D5ABD19BE85ECAF74BC8
2,989,918 UART: Caliptra RT
2,990,263 UART: [state] CFI Enabled
3,098,260 UART: [rt] RT listening for mailbox commands...
3,098,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,544 UART: [rt]cmd =0x4d454153, len=108
3,150,123 >>> mbox cmd response data (12 bytes)
3,150,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,995 UART: [rt]cmd =0x4d454153, len=108
3,200,288 >>> mbox cmd response data (12 bytes)
3,200,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,148 UART: [rt]cmd =0x4d454153, len=108
3,250,177 >>> mbox cmd response data (12 bytes)
3,250,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,185 UART: [rt]cmd =0x4d454153, len=108
3,301,466 >>> mbox cmd response data (12 bytes)
3,301,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,534 UART: [rt]cmd =0x4d454153, len=108
3,351,985 >>> mbox cmd response data (12 bytes)
3,351,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,865 UART: [rt]cmd =0x4d454153, len=108
3,402,648 >>> mbox cmd response data (12 bytes)
3,402,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,744 UART: [rt]cmd =0x4d454153, len=108
3,453,369 >>> mbox cmd response data (12 bytes)
3,453,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,167 UART: [rt]cmd =0x4d454153, len=108
3,504,236 >>> mbox cmd response data (12 bytes)
3,504,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,936 UART: [rt]cmd =0x4d454153, len=108
3,555,125 >>> mbox cmd response data (12 bytes)
3,555,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,963 UART: [rt]cmd =0x4d454153, len=108
3,606,146 >>> mbox cmd response data (12 bytes)
3,606,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,078 UART: [rt]cmd =0x4d454153, len=108
3,656,401 >>> mbox cmd response data (12 bytes)
3,656,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,493 UART: [rt]cmd =0x4d454153, len=108
3,707,480 >>> mbox cmd response data (12 bytes)
3,707,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,644 UART: [rt]cmd =0x4d454153, len=108
3,758,371 >>> mbox cmd response data (12 bytes)
3,758,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,331 UART: [rt]cmd =0x4d454153, len=108
3,809,454 >>> mbox cmd response data (12 bytes)
3,809,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,540 UART: [rt]cmd =0x4d454153, len=108
3,859,761 >>> mbox cmd response data (12 bytes)
3,859,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,619 UART: [rt]cmd =0x4d454153, len=108
3,891,599 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,286 UART: [kat] SHA2-512-ACC
906,187 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,021 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,173,859 ready_for_fw is high
1,173,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,763 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,830 UART: [ldev] --
1,280,324 UART: [fwproc] Wait for Commands...
1,280,921 UART: [fwproc] Recv command 0x46574c44
1,281,654 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,962 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,705 >>> mbox cmd response: success
2,769,834 UART: [afmc] ++
2,770,002 UART: [afmc] CDI.KEYID = 6
2,770,365 UART: [afmc] SUBJECT.KEYID = 7
2,770,791 UART: [afmc] AUTHORITY.KEYID = 5
2,806,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,185 UART: [afmc] --
2,849,277 UART: [cold-reset] --
2,850,241 UART: [state] Locking Datavault
2,851,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,184 UART: [state] Locking ICCM
2,852,762 UART: [exit] Launching FMC @ 0x40000130
2,858,091 UART:
2,858,107 UART: Running Caliptra FMC ...
2,858,515 UART:
2,858,569 UART: [state] CFI Enabled
2,869,214 UART: [fht] FMC Alias Private Key: 7
2,977,779 UART: [art] Extend RT PCRs Done
2,978,207 UART: [art] Lock RT PCRs Done
2,979,967 UART: [art] Populate DV Done
2,988,164 UART: [fht] FMC Alias Private Key: 7
2,989,328 UART: [art] Derive CDI
2,989,608 UART: [art] Store in in slot 0x4
3,075,251 UART: [art] Derive Key Pair
3,075,611 UART: [art] Store priv key in slot 0x5
3,088,451 UART: [art] Derive Key Pair - Done
3,103,296 UART: [art] Signing Cert with AUTHO
3,103,776 UART: RITY.KEYID = 7
3,119,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,109 UART: [art] PUB.X = AC4EE9A468ACE37C527110CAC7A7B35B3FF078109578E18EFB88A8044012C2A05C910FD0F7441A1F44B453468747ED84
3,126,877 UART: [art] PUB.Y = 777B0BE9688CCA7FFB3E07617ED3AFC377D192708B8FE9B30BA2F944F1C1A61B02CF4C81D233FF3709178FFD36BE4441
3,133,826 UART: [art] SIG.R = 1C47ED5737080A6F35AACBB3B49029AFB5CB58F494748DADB4DD87299CB5602FF1E0373E1BDAC3F414C68C8DE42FCB3C
3,140,612 UART: [art] SIG.S = 0E468F8E3DFFAA2C5020C2C2EC39B85C7D7AF58AFACDC68F5ECDE86DE17E4499E920BF4EA30E49462783DABFEF06A5E6
3,164,492 UART: Caliptra RT
3,164,745 UART: [state] CFI Enabled
3,272,602 UART: [rt] RT listening for mailbox commands...
3,273,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,606 UART: [rt]cmd =0x4d454153, len=108
3,324,069 >>> mbox cmd response data (12 bytes)
3,324,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,095 UART: [rt]cmd =0x4d454153, len=108
3,374,238 >>> mbox cmd response data (12 bytes)
3,374,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,980 UART: [rt]cmd =0x4d454153, len=108
3,425,009 >>> mbox cmd response data (12 bytes)
3,425,010 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,219 UART: [rt]cmd =0x4d454153, len=108
3,475,734 >>> mbox cmd response data (12 bytes)
3,475,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,928 UART: [rt]cmd =0x4d454153, len=108
3,527,487 >>> mbox cmd response data (12 bytes)
3,527,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,395 UART: [rt]cmd =0x4d454153, len=108
3,578,954 >>> mbox cmd response data (12 bytes)
3,578,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,872 UART: [rt]cmd =0x4d454153, len=108
3,629,439 >>> mbox cmd response data (12 bytes)
3,629,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,323 UART: [rt]cmd =0x4d454153, len=108
3,679,948 >>> mbox cmd response data (12 bytes)
3,679,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,842 UART: [rt]cmd =0x4d454153, len=108
3,730,303 >>> mbox cmd response data (12 bytes)
3,730,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,369 UART: [rt]cmd =0x4d454153, len=108
3,781,562 >>> mbox cmd response data (12 bytes)
3,781,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,276 UART: [rt]cmd =0x4d454153, len=108
3,832,217 >>> mbox cmd response data (12 bytes)
3,832,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,571 UART: [rt]cmd =0x4d454153, len=108
3,883,000 >>> mbox cmd response data (12 bytes)
3,883,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,090 UART: [rt]cmd =0x4d454153, len=108
3,934,125 >>> mbox cmd response data (12 bytes)
3,934,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,211 UART: [rt]cmd =0x4d454153, len=108
3,985,642 >>> mbox cmd response data (12 bytes)
3,985,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,592 UART: [rt]cmd =0x4d454153, len=108
4,035,503 >>> mbox cmd response data (12 bytes)
4,035,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,599 UART: [rt]cmd =0x4d454153, len=108
4,067,735 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,938 ready_for_fw is high
1,055,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,987 >>> mbox cmd response: success
2,681,623 UART:
2,681,639 UART: Running Caliptra FMC ...
2,682,047 UART:
2,682,101 UART: [state] CFI Enabled
2,692,376 UART: [fht] FMC Alias Private Key: 7
2,800,159 UART: [art] Extend RT PCRs Done
2,800,587 UART: [art] Lock RT PCRs Done
2,802,033 UART: [art] Populate DV Done
2,810,338 UART: [fht] FMC Alias Private Key: 7
2,811,434 UART: [art] Derive CDI
2,811,714 UART: [art] Store in in slot 0x4
2,897,591 UART: [art] Derive Key Pair
2,897,951 UART: [art] Store priv key in slot 0x5
2,910,675 UART: [art] Derive Key Pair - Done
2,925,057 UART: [art] Signing Cert with AUTHO
2,925,537 UART: RITY.KEYID = 7
2,940,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,622 UART: [art] PUB.X = B38C528659B6CC378E876BFB72ED2D280DFE1021795A32BD4B53AA5C99D712192FB8BC6FC56EC22CB3123FFA54CDCFFC
2,948,411 UART: [art] PUB.Y = B6D6F573A1F78C5C82F515C4EFFDC0DA36C60D95AE713A8798DFCE2F392B6FE39B153E97B53EB4893E5875B4B80E6D00
2,955,349 UART: [art] SIG.R = 5AC16B3EA51CCB75D58869C4806E4549829B6C39C5A90FEBBB601CA91BBF22BB188C79246B386AC6D690187ECB83F341
2,962,126 UART: [art] SIG.S = FA26EE8A7303E80C02CE3798205A0FF538E838945FE67145222106B7D542D541E5C28B60426058F8C2AFE606A34C7D09
2,985,520 UART: Caliptra RT
2,985,773 UART: [state] CFI Enabled
3,093,398 UART: [rt] RT listening for mailbox commands...
3,094,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,580 UART: [rt]cmd =0x4d454153, len=108
3,144,763 >>> mbox cmd response data (12 bytes)
3,144,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,175,027 UART: [rt]cmd =0x4d454153, len=108
3,195,950 >>> mbox cmd response data (12 bytes)
3,195,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,158 UART: [rt]cmd =0x4d454153, len=108
3,246,973 >>> mbox cmd response data (12 bytes)
3,246,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,005 UART: [rt]cmd =0x4d454153, len=108
3,297,066 >>> mbox cmd response data (12 bytes)
3,297,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,128 UART: [rt]cmd =0x4d454153, len=108
3,347,213 >>> mbox cmd response data (12 bytes)
3,347,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,221 UART: [rt]cmd =0x4d454153, len=108
3,397,916 >>> mbox cmd response data (12 bytes)
3,397,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,918 UART: [rt]cmd =0x4d454153, len=108
3,449,037 >>> mbox cmd response data (12 bytes)
3,449,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,045 UART: [rt]cmd =0x4d454153, len=108
3,499,808 >>> mbox cmd response data (12 bytes)
3,499,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,810 UART: [rt]cmd =0x4d454153, len=108
3,550,193 >>> mbox cmd response data (12 bytes)
3,550,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,069 UART: [rt]cmd =0x4d454153, len=108
3,600,886 >>> mbox cmd response data (12 bytes)
3,600,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,022 UART: [rt]cmd =0x4d454153, len=108
3,652,235 >>> mbox cmd response data (12 bytes)
3,652,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,429 UART: [rt]cmd =0x4d454153, len=108
3,703,508 >>> mbox cmd response data (12 bytes)
3,703,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,778 UART: [rt]cmd =0x4d454153, len=108
3,754,173 >>> mbox cmd response data (12 bytes)
3,754,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,171 UART: [rt]cmd =0x4d454153, len=108
3,804,312 >>> mbox cmd response data (12 bytes)
3,804,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,312 UART: [rt]cmd =0x4d454153, len=108
3,855,485 >>> mbox cmd response data (12 bytes)
3,855,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,517 UART: [rt]cmd =0x4d454153, len=108
3,887,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 ready_for_fw is high
1,174,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,295 UART: [ldev] --
1,282,569 UART: [fwproc] Wait for Commands...
1,283,320 UART: [fwproc] Recv command 0x46574c44
1,284,053 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,712 >>> mbox cmd response: success
2,772,895 UART: [afmc] ++
2,773,063 UART: [afmc] CDI.KEYID = 6
2,773,426 UART: [afmc] SUBJECT.KEYID = 7
2,773,852 UART: [afmc] AUTHORITY.KEYID = 5
2,809,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,698 UART: [afmc] --
2,852,636 UART: [cold-reset] --
2,853,516 UART: [state] Locking Datavault
2,854,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,385 UART: [state] Locking ICCM
2,856,027 UART: [exit] Launching FMC @ 0x40000130
2,861,356 UART:
2,861,372 UART: Running Caliptra FMC ...
2,861,780 UART:
2,861,923 UART: [state] CFI Enabled
2,872,714 UART: [fht] FMC Alias Private Key: 7
2,980,321 UART: [art] Extend RT PCRs Done
2,980,749 UART: [art] Lock RT PCRs Done
2,982,141 UART: [art] Populate DV Done
2,990,392 UART: [fht] FMC Alias Private Key: 7
2,991,508 UART: [art] Derive CDI
2,991,788 UART: [art] Store in in slot 0x4
3,077,437 UART: [art] Derive Key Pair
3,077,797 UART: [art] Store priv key in slot 0x5
3,091,387 UART: [art] Derive Key Pair - Done
3,106,181 UART: [art] Signing Cert with AUTHO
3,106,661 UART: RITY.KEYID = 7
3,121,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,370 UART: [art] PUB.X = 9D6812C90C1C2E1E5463BB3F6EEA15D912E0B039E866E680B7F5178682A51D155A7A4B800C1A8DE144F4A245FC40C9F6
3,129,140 UART: [art] PUB.Y = 68141DE8E2996FF05FE52E85629CF904DFAD5AF5AFD6630E27E58D5AEC5E779F2FE6023C1E556E8CB0D920AD640BBE06
3,136,093 UART: [art] SIG.R = 1AEF6B4565CC84F06C067FC32E90279D36455E27EA55B7B62B49F849792E73BF755FFAFF8855CF2FC12B8B086D79949B
3,142,865 UART: [art] SIG.S = 08DFB20206C5A211BFAB4E787A2DD962D44561956956EFCA4E0F7171463DEEBD7AA848341B5F0DC8C2563F5B02285634
3,166,740 UART: Caliptra RT
3,167,085 UART: [state] CFI Enabled
3,276,284 UART: [rt] RT listening for mailbox commands...
3,276,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,388 UART: [rt]cmd =0x4d454153, len=108
3,327,763 >>> mbox cmd response data (12 bytes)
3,327,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,651 UART: [rt]cmd =0x4d454153, len=108
3,376,838 >>> mbox cmd response data (12 bytes)
3,376,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,407,110 UART: [rt]cmd =0x4d454153, len=108
3,427,639 >>> mbox cmd response data (12 bytes)
3,427,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,691 UART: [rt]cmd =0x4d454153, len=108
3,478,616 >>> mbox cmd response data (12 bytes)
3,478,617 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,744 UART: [rt]cmd =0x4d454153, len=108
3,529,883 >>> mbox cmd response data (12 bytes)
3,529,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,947 UART: [rt]cmd =0x4d454153, len=108
3,581,088 >>> mbox cmd response data (12 bytes)
3,581,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,268 UART: [rt]cmd =0x4d454153, len=108
3,632,649 >>> mbox cmd response data (12 bytes)
3,632,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,537 UART: [rt]cmd =0x4d454153, len=108
3,683,674 >>> mbox cmd response data (12 bytes)
3,683,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,732 UART: [rt]cmd =0x4d454153, len=108
3,733,737 >>> mbox cmd response data (12 bytes)
3,733,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,749 UART: [rt]cmd =0x4d454153, len=108
3,784,250 >>> mbox cmd response data (12 bytes)
3,784,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,322 UART: [rt]cmd =0x4d454153, len=108
3,835,275 >>> mbox cmd response data (12 bytes)
3,835,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,425 UART: [rt]cmd =0x4d454153, len=108
3,886,276 >>> mbox cmd response data (12 bytes)
3,886,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,406 UART: [rt]cmd =0x4d454153, len=108
3,936,863 >>> mbox cmd response data (12 bytes)
3,936,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,981 UART: [rt]cmd =0x4d454153, len=108
3,988,140 >>> mbox cmd response data (12 bytes)
3,988,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,158 UART: [rt]cmd =0x4d454153, len=108
4,039,383 >>> mbox cmd response data (12 bytes)
4,039,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,407 UART: [rt]cmd =0x4d454153, len=108
4,071,149 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,067 ready_for_fw is high
1,056,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,630 >>> mbox cmd response: success
2,680,376 UART:
2,680,392 UART: Running Caliptra FMC ...
2,680,800 UART:
2,680,943 UART: [state] CFI Enabled
2,691,500 UART: [fht] FMC Alias Private Key: 7
2,799,819 UART: [art] Extend RT PCRs Done
2,800,247 UART: [art] Lock RT PCRs Done
2,801,803 UART: [art] Populate DV Done
2,810,210 UART: [fht] FMC Alias Private Key: 7
2,811,320 UART: [art] Derive CDI
2,811,600 UART: [art] Store in in slot 0x4
2,897,247 UART: [art] Derive Key Pair
2,897,607 UART: [art] Store priv key in slot 0x5
2,910,865 UART: [art] Derive Key Pair - Done
2,925,529 UART: [art] Signing Cert with AUTHO
2,926,009 UART: RITY.KEYID = 7
2,940,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,664 UART: [art] PUB.X = 574457FB01AC9A4BD8DDF6D1ED0EF5C957B4EADAF4973CDB237FC9A5D945013CD6DEE2D64E68DF7A5FACAE7A68F44390
2,948,455 UART: [art] PUB.Y = 029AE0577B6CCD50678CF37D723BBEADCA0A475B5DA385A72A339292EA2014835DA0500B36EE357F9892022BED9D4562
2,955,399 UART: [art] SIG.R = E550C93886D4D3FB5F778F315A90D2FB621286EA38E79392CB55E2DCC99C383DA0E37DB2D941A9216E241E46864EE53B
2,962,175 UART: [art] SIG.S = 74D1AABBB809CD5509E51E6A2500BE7FE9C66AC238DD50E6AB2D92A90A69E890B9A1785ACC705CAF86377BDC8FA46F9A
2,986,659 UART: Caliptra RT
2,987,004 UART: [state] CFI Enabled
3,095,427 UART: [rt] RT listening for mailbox commands...
3,096,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,641 UART: [rt]cmd =0x4d454153, len=108
3,147,586 >>> mbox cmd response data (12 bytes)
3,147,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,788 UART: [rt]cmd =0x4d454153, len=108
3,197,911 >>> mbox cmd response data (12 bytes)
3,197,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,043 UART: [rt]cmd =0x4d454153, len=108
3,248,612 >>> mbox cmd response data (12 bytes)
3,248,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,542 UART: [rt]cmd =0x4d454153, len=108
3,299,535 >>> mbox cmd response data (12 bytes)
3,299,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,329,453 UART: [rt]cmd =0x4d454153, len=108
3,350,978 >>> mbox cmd response data (12 bytes)
3,350,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,806 UART: [rt]cmd =0x4d454153, len=108
3,402,515 >>> mbox cmd response data (12 bytes)
3,402,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,791 UART: [rt]cmd =0x4d454153, len=108
3,453,220 >>> mbox cmd response data (12 bytes)
3,453,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,382 UART: [rt]cmd =0x4d454153, len=108
3,504,613 >>> mbox cmd response data (12 bytes)
3,504,614 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,499 UART: [rt]cmd =0x4d454153, len=108
3,556,394 >>> mbox cmd response data (12 bytes)
3,556,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,370 UART: [rt]cmd =0x4d454153, len=108
3,607,147 >>> mbox cmd response data (12 bytes)
3,607,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,133 UART: [rt]cmd =0x4d454153, len=108
3,657,546 >>> mbox cmd response data (12 bytes)
3,657,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,580 UART: [rt]cmd =0x4d454153, len=108
3,708,399 >>> mbox cmd response data (12 bytes)
3,708,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,473 UART: [rt]cmd =0x4d454153, len=108
3,758,890 >>> mbox cmd response data (12 bytes)
3,758,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,876 UART: [rt]cmd =0x4d454153, len=108
3,809,247 >>> mbox cmd response data (12 bytes)
3,809,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,269 UART: [rt]cmd =0x4d454153, len=108
3,860,620 >>> mbox cmd response data (12 bytes)
3,860,621 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,474 UART: [rt]cmd =0x4d454153, len=108
3,892,436 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,286 UART:
192,647 UART: Running Caliptra ROM ...
193,821 UART:
193,978 UART: [state] CFI Enabled
263,031 UART: [state] LifecycleState = Unprovisioned
265,027 UART: [state] DebugLocked = No
267,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,583 UART: [kat] SHA2-256
442,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,826 UART: [kat] ++
453,356 UART: [kat] sha1
463,103 UART: [kat] SHA2-256
465,753 UART: [kat] SHA2-384
471,100 UART: [kat] SHA2-512-ACC
473,464 UART: [kat] ECC-384
2,767,116 UART: [kat] HMAC-384Kdf
2,798,612 UART: [kat] LMS
3,988,894 UART: [kat] --
3,993,629 UART: [cold-reset] ++
3,994,856 UART: [fht] Storing FHT @ 0x50003400
4,007,871 UART: [idev] ++
4,008,485 UART: [idev] CDI.KEYID = 6
4,009,486 UART: [idev] SUBJECT.KEYID = 7
4,010,670 UART: [idev] UDS.KEYID = 0
4,011,727 ready_for_fw is high
4,011,940 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,920 UART: [idev] Erasing UDS.KEYID = 0
7,346,943 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,805 UART: [idev] --
7,372,123 UART: [ldev] ++
7,372,697 UART: [ldev] CDI.KEYID = 6
7,373,635 UART: [ldev] SUBJECT.KEYID = 5
7,374,905 UART: [ldev] AUTHORITY.KEYID = 7
7,376,058 UART: [ldev] FE.KEYID = 1
7,420,970 UART: [ldev] Erasing FE.KEYID = 1
10,754,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,831 UART: [ldev] --
13,136,215 UART: [fwproc] Waiting for Commands...
13,138,525 UART: [fwproc] Received command 0x46574c44
13,140,701 UART: [fwproc] Received Image of size 113760 bytes
17,181,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,762 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,642,912 >>> mbox cmd response: success
17,647,468 UART: [afmc] ++
17,648,060 UART: [afmc] CDI.KEYID = 6
17,648,947 UART: [afmc] SUBJECT.KEYID = 7
17,650,219 UART: [afmc] AUTHORITY.KEYID = 5
21,002,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,303,199 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,625 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,460 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,865 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,685 UART: [afmc] --
23,372,071 UART: [cold-reset] --
23,376,422 UART: [state] Locking Datavault
23,382,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,078 UART: [state] Locking ICCM
23,385,422 UART: [exit] Launching FMC @ 0x40000130
23,393,817 UART:
23,394,052 UART: Running Caliptra FMC ...
23,395,157 UART:
23,395,316 UART: [state] CFI Enabled
23,461,303 UART: [fht] FMC Alias Private Key: 7
25,799,659 UART: [art] Extend RT PCRs Done
25,800,903 UART: [art] Lock RT PCRs Done
25,802,750 UART: [art] Populate DV Done
25,808,220 UART: [fht] FMC Alias Private Key: 7
25,809,764 UART: [art] Derive CDI
25,810,577 UART: [art] Store in in slot 0x4
25,870,374 UART: [art] Derive Key Pair
25,871,412 UART: [art] Store priv key in slot 0x5
29,164,421 UART: [art] Derive Key Pair - Done
29,177,303 UART: [art] Signing Cert with AUTHO
29,178,604 UART: RITY.KEYID = 7
31,466,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,544 UART: [art] PUB.X = 4C6F68E3A5E2C6E462DFF31D170B32E8EBFE1D472D54B5765F5675FEFDB1F93272D0E00B38C2D9BB317DDB05E1B0CAC6
31,474,798 UART: [art] PUB.Y = D102ECFC6AAF36D0D21777B9F250E7E730528FFD6F6C82CFC9B9901A8446FE1CEF5CC243A96BF51C694A197125EA52CA
31,482,077 UART: [art] SIG.R = DA672675655AB8AFF1EFAD60EB357115C4BE1E693F4378B4EB26D4149BDDC519638E4059058707D06107C8A0DB5E414D
31,489,463 UART: [art] SIG.S = 47282ADA106F6523F09EC62A18031666A987815829553E3D18A181D83A60F6FB93690F80F59D26822431D793798106FA
32,794,429 UART: Caliptra RT
32,795,158 UART: [state] CFI Enabled
32,956,421 UART: [rt] RT listening for mailbox commands...
32,958,460 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,989,187 UART: [rt]cmd =0x44504543, len=40
33,030,408 >>> mbox cmd response data (40 bytes)
33,031,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,062,064 UART: [rt]cmd =0x44504543, len=96
33,121,893 >>> mbox cmd response data (56 bytes)
33,122,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,153,125 UART: [rt]cmd =0x44504543, len=96
33,229,278 >>> mbox cmd response data (56 bytes)
33,230,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,260,434 UART: [rt]cmd =0x44504543, len=96
33,335,886 >>> mbox cmd response data (56 bytes)
33,336,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,367,094 UART: [rt]cmd =0x44504543, len=96
33,442,756 >>> mbox cmd response data (56 bytes)
33,443,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,474,020 UART: [rt]cmd =0x44504543, len=96
33,550,237 >>> mbox cmd response data (56 bytes)
33,550,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,581,549 UART: [rt]cmd =0x44504543, len=96
33,657,156 >>> mbox cmd response data (56 bytes)
33,657,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,688,311 UART: [rt]cmd =0x44504543, len=96
33,763,993 >>> mbox cmd response data (56 bytes)
33,764,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,795,192 UART: [rt]cmd =0x44504543, len=96
33,870,901 >>> mbox cmd response data (56 bytes)
33,871,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,902,214 UART: [rt]cmd =0x44504543, len=96
33,977,870 >>> mbox cmd response data (56 bytes)
33,978,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,009,158 UART: [rt]cmd =0x44504543, len=96
34,084,735 >>> mbox cmd response data (56 bytes)
34,085,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,116,049 UART: [rt]cmd =0x44504543, len=96
34,192,042 >>> mbox cmd response data (56 bytes)
34,192,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,223,242 UART: [rt]cmd =0x44504543, len=96
34,298,631 >>> mbox cmd response data (56 bytes)
34,299,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,329,993 UART: [rt]cmd =0x44504543, len=96
34,405,186 >>> mbox cmd response data (56 bytes)
34,405,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,436,381 UART: [rt]cmd =0x44504543, len=96
34,512,516 >>> mbox cmd response data (56 bytes)
34,513,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,543,837 UART: [rt]cmd =0x44504543, len=96
34,619,238 >>> mbox cmd response data (56 bytes)
34,619,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,650,505 UART: [rt]cmd =0x44504543, len=96
34,657,100 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,785,120 ready_for_fw is high
3,785,740 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,846,945 >>> mbox cmd response: success
23,558,449 UART:
23,558,843 UART: Running Caliptra FMC ...
23,559,975 UART:
23,560,130 UART: [state] CFI Enabled
23,627,750 UART: [fht] FMC Alias Private Key: 7
25,966,131 UART: [art] Extend RT PCRs Done
25,967,363 UART: [art] Lock RT PCRs Done
25,969,453 UART: [art] Populate DV Done
25,975,190 UART: [fht] FMC Alias Private Key: 7
25,976,902 UART: [art] Derive CDI
25,977,720 UART: [art] Store in in slot 0x4
26,036,925 UART: [art] Derive Key Pair
26,037,929 UART: [art] Store priv key in slot 0x5
29,330,523 UART: [art] Derive Key Pair - Done
29,343,685 UART: [art] Signing Cert with AUTHO
29,344,987 UART: RITY.KEYID = 7
31,632,360 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,873 UART: [art] PUB.X = 22CB1E63E92962EDDD1F1706632C8535D6FFEB626A3BEB3FD692E003958D5C9681D96DDDCC09012735471C35C6708738
31,641,130 UART: [art] PUB.Y = 1CB0E2C64B28FDDA25C255188F504AD0429021599B8EFB4BDB60D6613340967B0D4082787F1C70D28AC0F00DE39BE105
31,648,336 UART: [art] SIG.R = C5A463CC0877C89135BC3B2397644AEF1A4FFB7B7100E006DF1DD3BB61135EE29C5CBA435A20CBCE30BBD8B14C5464FD
31,655,743 UART: [art] SIG.S = 905E2120F929D76D879E82598C40B50A50E5E9E961A62C205D04ABEE1BA597CE81F1C5A959646F739DA07636561E31DA
32,961,496 UART: Caliptra RT
32,962,214 UART: [state] CFI Enabled
33,122,559 UART: [rt] RT listening for mailbox commands...
33,124,482 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,155,408 UART: [rt]cmd =0x44504543, len=40
33,197,722 >>> mbox cmd response data (40 bytes)
33,198,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,229,662 UART: [rt]cmd =0x44504543, len=96
33,288,983 >>> mbox cmd response data (56 bytes)
33,289,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,320,227 UART: [rt]cmd =0x44504543, len=96
33,395,760 >>> mbox cmd response data (56 bytes)
33,396,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,426,703 UART: [rt]cmd =0x44504543, len=96
33,502,483 >>> mbox cmd response data (56 bytes)
33,503,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,533,813 UART: [rt]cmd =0x44504543, len=96
33,609,573 >>> mbox cmd response data (56 bytes)
33,610,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,640,781 UART: [rt]cmd =0x44504543, len=96
33,716,357 >>> mbox cmd response data (56 bytes)
33,717,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,747,484 UART: [rt]cmd =0x44504543, len=96
33,822,836 >>> mbox cmd response data (56 bytes)
33,823,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,854,069 UART: [rt]cmd =0x44504543, len=96
33,929,798 >>> mbox cmd response data (56 bytes)
33,930,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,961,125 UART: [rt]cmd =0x44504543, len=96
34,036,611 >>> mbox cmd response data (56 bytes)
34,037,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,067,749 UART: [rt]cmd =0x44504543, len=96
34,143,442 >>> mbox cmd response data (56 bytes)
34,144,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,174,647 UART: [rt]cmd =0x44504543, len=96
34,250,252 >>> mbox cmd response data (56 bytes)
34,250,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,281,574 UART: [rt]cmd =0x44504543, len=96
34,357,210 >>> mbox cmd response data (56 bytes)
34,357,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,388,613 UART: [rt]cmd =0x44504543, len=96
34,463,713 >>> mbox cmd response data (56 bytes)
34,464,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,495,264 UART: [rt]cmd =0x44504543, len=96
34,570,188 >>> mbox cmd response data (56 bytes)
34,570,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,601,647 UART: [rt]cmd =0x44504543, len=96
34,677,602 >>> mbox cmd response data (56 bytes)
34,678,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,708,887 UART: [rt]cmd =0x44504543, len=96
34,784,248 >>> mbox cmd response data (56 bytes)
34,784,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,815,448 UART: [rt]cmd =0x44504543, len=96
34,821,857 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
192,983 UART:
193,342 UART: Running Caliptra ROM ...
194,453 UART:
604,185 UART: [state] CFI Enabled
617,284 UART: [state] LifecycleState = Unprovisioned
619,159 UART: [state] DebugLocked = No
620,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,456 UART: [kat] SHA2-256
796,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,744 UART: [kat] ++
807,272 UART: [kat] sha1
818,929 UART: [kat] SHA2-256
821,647 UART: [kat] SHA2-384
828,197 UART: [kat] SHA2-512-ACC
830,558 UART: [kat] ECC-384
3,113,840 UART: [kat] HMAC-384Kdf
3,125,367 UART: [kat] LMS
4,315,459 UART: [kat] --
4,320,488 UART: [cold-reset] ++
4,321,862 UART: [fht] Storing FHT @ 0x50003400
4,332,199 UART: [idev] ++
4,332,764 UART: [idev] CDI.KEYID = 6
4,333,786 UART: [idev] SUBJECT.KEYID = 7
4,334,953 UART: [idev] UDS.KEYID = 0
4,335,932 ready_for_fw is high
4,336,124 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,001 UART: [idev] Erasing UDS.KEYID = 0
7,617,903 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,739 UART: [idev] --
7,644,511 UART: [ldev] ++
7,645,129 UART: [ldev] CDI.KEYID = 6
7,646,089 UART: [ldev] SUBJECT.KEYID = 5
7,647,297 UART: [ldev] AUTHORITY.KEYID = 7
7,648,522 UART: [ldev] FE.KEYID = 1
7,658,911 UART: [ldev] Erasing FE.KEYID = 1
10,944,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,343 UART: [ldev] --
13,308,411 UART: [fwproc] Waiting for Commands...
13,311,035 UART: [fwproc] Received command 0x46574c44
13,313,211 UART: [fwproc] Received Image of size 113760 bytes
17,353,544 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,813 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,821,929 >>> mbox cmd response: success
17,826,695 UART: [afmc] ++
17,827,340 UART: [afmc] CDI.KEYID = 6
17,828,280 UART: [afmc] SUBJECT.KEYID = 7
17,829,500 UART: [afmc] AUTHORITY.KEYID = 5
21,141,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,075 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,383 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,759 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,564 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,019 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,911 UART: [afmc] --
23,508,457 UART: [cold-reset] --
23,512,702 UART: [state] Locking Datavault
23,517,031 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,738 UART: [state] Locking ICCM
23,520,378 UART: [exit] Launching FMC @ 0x40000130
23,528,775 UART:
23,529,006 UART: Running Caliptra FMC ...
23,530,130 UART:
23,530,299 UART: [state] CFI Enabled
23,538,457 UART: [fht] FMC Alias Private Key: 7
25,869,906 UART: [art] Extend RT PCRs Done
25,871,124 UART: [art] Lock RT PCRs Done
25,872,862 UART: [art] Populate DV Done
25,878,225 UART: [fht] FMC Alias Private Key: 7
25,879,770 UART: [art] Derive CDI
25,880,502 UART: [art] Store in in slot 0x4
25,922,987 UART: [art] Derive Key Pair
25,924,029 UART: [art] Store priv key in slot 0x5
29,165,945 UART: [art] Derive Key Pair - Done
29,178,565 UART: [art] Signing Cert with AUTHO
29,179,873 UART: RITY.KEYID = 7
31,458,974 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,479 UART: [art] PUB.X = C753F41CC8AA656574F9A3F86DE7CBFFB96BA6A06C0B018DEB63D74B7793640249C8702ACA11BDF4F36484D20415C383
31,467,708 UART: [art] PUB.Y = 12FAE451FC96039D78FB3F7EB0659E3A8B877B546F4AC3312AC8DB90C28A1CFA647B64BD3B0B54CB7FC659F6AA9539E1
31,474,962 UART: [art] SIG.R = 685D54388B44943F325503BAF3EC4C086577A5E5115A48AD33CEC77DA68A339615B3B3C0805E9B844BA7740B373D9A2F
31,482,328 UART: [art] SIG.S = AF07B49038E1A89C63D2BD73ED4233FE459D96638147DE986B9C2B8CE5E349DC69B31416919394F204BA9EB0FBB1EC22
32,786,877 UART: Caliptra RT
32,787,591 UART: [state] CFI Enabled
32,906,112 UART: [rt] RT listening for mailbox commands...
32,908,035 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,937,913 UART: [rt]cmd =0x44504543, len=40
32,964,160 >>> mbox cmd response data (40 bytes)
32,965,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,996,139 UART: [rt]cmd =0x44504543, len=96
33,036,221 >>> mbox cmd response data (56 bytes)
33,036,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,067,584 UART: [rt]cmd =0x44504543, len=96
33,107,828 >>> mbox cmd response data (56 bytes)
33,108,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,139,113 UART: [rt]cmd =0x44504543, len=96
33,180,856 >>> mbox cmd response data (56 bytes)
33,181,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,211,938 UART: [rt]cmd =0x44504543, len=96
33,253,929 >>> mbox cmd response data (56 bytes)
33,254,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,285,233 UART: [rt]cmd =0x44504543, len=96
33,326,894 >>> mbox cmd response data (56 bytes)
33,327,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,358,261 UART: [rt]cmd =0x44504543, len=96
33,399,492 >>> mbox cmd response data (56 bytes)
33,400,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,430,847 UART: [rt]cmd =0x44504543, len=96
33,472,130 >>> mbox cmd response data (56 bytes)
33,472,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,503,336 UART: [rt]cmd =0x44504543, len=96
33,546,094 >>> mbox cmd response data (56 bytes)
33,546,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,577,427 UART: [rt]cmd =0x44504543, len=96
33,619,941 >>> mbox cmd response data (56 bytes)
33,620,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,651,243 UART: [rt]cmd =0x44504543, len=96
33,694,296 >>> mbox cmd response data (56 bytes)
33,695,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,725,491 UART: [rt]cmd =0x44504543, len=96
33,769,846 >>> mbox cmd response data (56 bytes)
33,770,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,801,155 UART: [rt]cmd =0x44504543, len=96
33,845,498 >>> mbox cmd response data (56 bytes)
33,846,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,876,532 UART: [rt]cmd =0x44504543, len=96
33,920,375 >>> mbox cmd response data (56 bytes)
33,921,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,951,707 UART: [rt]cmd =0x44504543, len=96
33,996,269 >>> mbox cmd response data (56 bytes)
33,996,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,027,686 UART: [rt]cmd =0x44504543, len=96
34,072,193 >>> mbox cmd response data (56 bytes)
34,072,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,103,514 UART: [rt]cmd =0x44504543, len=96
34,110,021 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,653 writing to cptra_bootfsm_go
4,127,266 ready_for_fw is high
4,127,660 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,992 >>> mbox cmd response: success
23,698,205 UART:
23,698,609 UART: Running Caliptra FMC ...
23,699,740 UART:
23,699,904 UART: [state] CFI Enabled
23,708,005 UART: [fht] FMC Alias Private Key: 7
26,038,132 UART: [art] Extend RT PCRs Done
26,039,362 UART: [art] Lock RT PCRs Done
26,041,211 UART: [art] Populate DV Done
26,046,686 UART: [fht] FMC Alias Private Key: 7
26,048,340 UART: [art] Derive CDI
26,049,160 UART: [art] Store in in slot 0x4
26,091,554 UART: [art] Derive Key Pair
26,092,592 UART: [art] Store priv key in slot 0x5
29,334,820 UART: [art] Derive Key Pair - Done
29,347,757 UART: [art] Signing Cert with AUTHO
29,349,062 UART: RITY.KEYID = 7
31,628,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,118 UART: [art] PUB.X = 14933AFC5FA8FC0633A3794E5D989E69581159FF7606ACEBA61D95A12AC88DFA037E72B687F6A47E8D9F706B8E981849
31,637,351 UART: [art] PUB.Y = 5918CE1133AF43708A879F92CB5BF813A7037C99715E0065048D235EBDF4D98FD2AB67D6A288FFAC04F93E28BB500AAE
31,644,548 UART: [art] SIG.R = 78CF64ECB2778DA9300B968C1EF2D35753872CFA3B2FC0616D295AC21DC619EEEFA772E44280B831466ED3E6F170BC59
31,651,994 UART: [art] SIG.S = 8C8E0F372548E6D9655B0F45EB5E79E539E886542FC0B62BAA1776D0EEA8A40973C5397C7A39C0E652B455DEFF21F908
32,957,063 UART: Caliptra RT
32,957,782 UART: [state] CFI Enabled
33,075,942 UART: [rt] RT listening for mailbox commands...
33,077,871 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,107,807 UART: [rt]cmd =0x44504543, len=40
33,133,517 >>> mbox cmd response data (40 bytes)
33,134,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,165,701 UART: [rt]cmd =0x44504543, len=96
33,205,520 >>> mbox cmd response data (56 bytes)
33,206,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,236,810 UART: [rt]cmd =0x44504543, len=96
33,278,628 >>> mbox cmd response data (56 bytes)
33,279,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,309,931 UART: [rt]cmd =0x44504543, len=96
33,350,704 >>> mbox cmd response data (56 bytes)
33,351,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,382,130 UART: [rt]cmd =0x44504543, len=96
33,423,365 >>> mbox cmd response data (56 bytes)
33,424,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,454,558 UART: [rt]cmd =0x44504543, len=96
33,496,123 >>> mbox cmd response data (56 bytes)
33,496,827 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,527,531 UART: [rt]cmd =0x44504543, len=96
33,569,086 >>> mbox cmd response data (56 bytes)
33,569,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,600,550 UART: [rt]cmd =0x44504543, len=96
33,642,497 >>> mbox cmd response data (56 bytes)
33,643,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,673,691 UART: [rt]cmd =0x44504543, len=96
33,715,552 >>> mbox cmd response data (56 bytes)
33,716,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,746,919 UART: [rt]cmd =0x44504543, len=96
33,789,638 >>> mbox cmd response data (56 bytes)
33,790,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,820,843 UART: [rt]cmd =0x44504543, len=96
33,863,884 >>> mbox cmd response data (56 bytes)
33,864,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,895,033 UART: [rt]cmd =0x44504543, len=96
33,938,192 >>> mbox cmd response data (56 bytes)
33,938,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,969,507 UART: [rt]cmd =0x44504543, len=96
34,012,934 >>> mbox cmd response data (56 bytes)
34,013,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,044,321 UART: [rt]cmd =0x44504543, len=96
34,089,158 >>> mbox cmd response data (56 bytes)
34,089,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,120,426 UART: [rt]cmd =0x44504543, len=96
34,164,554 >>> mbox cmd response data (56 bytes)
34,165,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,195,811 UART: [rt]cmd =0x44504543, len=96
34,240,361 >>> mbox cmd response data (56 bytes)
34,241,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,271,625 UART: [rt]cmd =0x44504543, len=96
34,278,310 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,665 UART:
193,037 UART: Running Caliptra ROM ...
194,177 UART:
194,323 UART: [state] CFI Enabled
262,829 UART: [state] LifecycleState = Unprovisioned
264,691 UART: [state] DebugLocked = No
266,940 UART: [state] WD Timer not started. Device not locked for debugging
269,994 UART: [kat] SHA2-256
449,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,666 UART: [kat] ++
461,212 UART: [kat] sha1
472,020 UART: [kat] SHA2-256
475,092 UART: [kat] SHA2-384
480,013 UART: [kat] SHA2-512-ACC
482,944 UART: [kat] ECC-384
2,946,687 UART: [kat] HMAC-384Kdf
2,972,277 UART: [kat] LMS
3,501,682 UART: [kat] --
3,508,107 UART: [cold-reset] ++
3,509,824 UART: [fht] FHT @ 0x50003400
3,520,165 UART: [idev] ++
3,520,724 UART: [idev] CDI.KEYID = 6
3,521,748 UART: [idev] SUBJECT.KEYID = 7
3,522,870 UART: [idev] UDS.KEYID = 0
3,523,791 ready_for_fw is high
3,523,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,475 UART: [idev] Erasing UDS.KEYID = 0
6,023,411 UART: [idev] Sha1 KeyId Algorithm
6,045,133 UART: [idev] --
6,049,019 UART: [ldev] ++
6,049,590 UART: [ldev] CDI.KEYID = 6
6,050,496 UART: [ldev] SUBJECT.KEYID = 5
6,051,652 UART: [ldev] AUTHORITY.KEYID = 7
6,052,882 UART: [ldev] FE.KEYID = 1
6,099,395 UART: [ldev] Erasing FE.KEYID = 1
8,600,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,910 UART: [ldev] --
10,411,258 UART: [fwproc] Wait for Commands...
10,413,075 UART: [fwproc] Recv command 0x46574c44
10,415,172 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,276,115 >>> mbox cmd response: success
14,281,097 UART: [afmc] ++
14,281,697 UART: [afmc] CDI.KEYID = 6
14,282,576 UART: [afmc] SUBJECT.KEYID = 7
14,283,674 UART: [afmc] AUTHORITY.KEYID = 5
16,827,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,570,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,572,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,587,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,603,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,619,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,643,359 UART: [afmc] --
18,647,971 UART: [cold-reset] --
18,653,120 UART: [state] Locking Datavault
18,658,688 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,328 UART: [state] Locking ICCM
18,663,045 UART: [exit] Launching FMC @ 0x40000130
18,671,445 UART:
18,671,676 UART: Running Caliptra FMC ...
18,672,772 UART:
18,672,932 UART: [state] CFI Enabled
18,729,128 UART: [fht] FMC Alias Private Key: 7
20,493,265 UART: [art] Extend RT PCRs Done
20,494,492 UART: [art] Lock RT PCRs Done
20,496,271 UART: [art] Populate DV Done
20,501,627 UART: [fht] FMC Alias Private Key: 7
20,503,158 UART: [art] Derive CDI
20,503,890 UART: [art] Store in in slot 0x4
20,561,674 UART: [art] Derive Key Pair
20,562,718 UART: [art] Store priv key in slot 0x5
23,025,250 UART: [art] Derive Key Pair - Done
23,038,143 UART: [art] Signing Cert with AUTHO
23,039,442 UART: RITY.KEYID = 7
24,751,500 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,018 UART: [art] PUB.X = 414A30D4F584431544F5A726A2A023BA477BA9EE6A3A7875C98E3934C8A9A68DEAC3B04612001CF40E8FAED4858CE772
24,760,256 UART: [art] PUB.Y = 910B697EA532637E37B18D33EAB1F8CD2857B8DD962BD5150462A727D029FDBD78596F0776E43174D0FD2DE74D30F4DD
24,767,524 UART: [art] SIG.R = E27DCB744A81C9A375733E7240051B683D97EA238BFF2B8A1B1E1C49472806EC9BA9B72A61F19EFAA6F702190F1D1FFE
24,775,030 UART: [art] SIG.S = E7985E5DD6E171B44361DC5FBC8926F1953843A087E3C10C5E07F9E898F81AD5F02625751074D07EBD45B28C20070098
25,753,701 UART: Caliptra RT
25,754,399 UART: [state] CFI Enabled
25,919,893 UART: [rt] RT listening for mailbox commands...
25,921,816 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,952,342 UART: [rt]cmd =0x44504543, len=40
25,994,649 >>> mbox cmd response data (40 bytes)
25,995,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,026,429 UART: [rt]cmd =0x44504543, len=96
26,085,974 >>> mbox cmd response data (56 bytes)
26,086,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,117,164 UART: [rt]cmd =0x44504543, len=96
26,192,960 >>> mbox cmd response data (56 bytes)
26,193,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,224,346 UART: [rt]cmd =0x44504543, len=96
26,299,343 >>> mbox cmd response data (56 bytes)
26,300,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,383 UART: [rt]cmd =0x44504543, len=96
26,406,427 >>> mbox cmd response data (56 bytes)
26,407,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,437,810 UART: [rt]cmd =0x44504543, len=96
26,513,329 >>> mbox cmd response data (56 bytes)
26,514,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,544,440 UART: [rt]cmd =0x44504543, len=96
26,619,808 >>> mbox cmd response data (56 bytes)
26,620,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,651,336 UART: [rt]cmd =0x44504543, len=96
26,726,956 >>> mbox cmd response data (56 bytes)
26,727,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,758,155 UART: [rt]cmd =0x44504543, len=96
26,833,399 >>> mbox cmd response data (56 bytes)
26,834,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,864,717 UART: [rt]cmd =0x44504543, len=96
26,940,027 >>> mbox cmd response data (56 bytes)
26,940,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,208 UART: [rt]cmd =0x44504543, len=96
27,046,843 >>> mbox cmd response data (56 bytes)
27,047,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,078,269 UART: [rt]cmd =0x44504543, len=96
27,153,844 >>> mbox cmd response data (56 bytes)
27,154,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,185,160 UART: [rt]cmd =0x44504543, len=96
27,260,901 >>> mbox cmd response data (56 bytes)
27,261,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,292,110 UART: [rt]cmd =0x44504543, len=96
27,367,397 >>> mbox cmd response data (56 bytes)
27,368,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,398,568 UART: [rt]cmd =0x44504543, len=96
27,474,243 >>> mbox cmd response data (56 bytes)
27,474,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,505,513 UART: [rt]cmd =0x44504543, len=96
27,581,119 >>> mbox cmd response data (56 bytes)
27,581,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,612,150 UART: [rt]cmd =0x44504543, len=96
27,618,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,736 writing to cptra_bootfsm_go
3,379,408 ready_for_fw is high
3,379,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,051,815 >>> mbox cmd response: success
18,342,859 UART:
18,343,263 UART: Running Caliptra FMC ...
18,344,374 UART:
18,344,524 UART: [state] CFI Enabled
18,410,815 UART: [fht] FMC Alias Private Key: 7
20,174,564 UART: [art] Extend RT PCRs Done
20,176,059 UART: [art] Lock RT PCRs Done
20,177,564 UART: [art] Populate DV Done
20,183,225 UART: [fht] FMC Alias Private Key: 7
20,184,876 UART: [art] Derive CDI
20,185,612 UART: [art] Store in in slot 0x4
20,243,740 UART: [art] Derive Key Pair
20,244,779 UART: [art] Store priv key in slot 0x5
22,707,526 UART: [art] Derive Key Pair - Done
22,720,269 UART: [art] Signing Cert with AUTHO
22,721,570 UART: RITY.KEYID = 7
24,433,766 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,280 UART: [art] PUB.X = 697FFEC81DA563A2F74F8DDA0069891A86883ECAB9711BABEC2B0FAEFAF686EF6861A2C4A0472281E7C1BF1B30FC51BE
24,442,555 UART: [art] PUB.Y = 04944A5A0FDA6926DDDE6A0AB3478518BCAC20989A763A220DE2E224DFA64ED556FF16DCE9F3C2D990907C3545022312
24,449,791 UART: [art] SIG.R = D45B18777021318486B90DE8C028CEA6A708732B8D8C123B7EB88EC3B315F997E3AAB096468D5CABB224CF9702676FF8
24,457,190 UART: [art] SIG.S = F1DB307803920DAD9C9CA0D03D68A2874AF488F3440F1167DCCA6265B4A12CBAD528F1EDEEB5BD0F4BF395B733E6BAF0
25,436,106 UART: Caliptra RT
25,436,812 UART: [state] CFI Enabled
25,602,743 UART: [rt] RT listening for mailbox commands...
25,604,673 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,635,313 UART: [rt]cmd =0x44504543, len=40
25,676,713 >>> mbox cmd response data (40 bytes)
25,677,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,708,437 UART: [rt]cmd =0x44504543, len=96
25,768,367 >>> mbox cmd response data (56 bytes)
25,769,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,799,714 UART: [rt]cmd =0x44504543, len=96
25,875,138 >>> mbox cmd response data (56 bytes)
25,875,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,906,452 UART: [rt]cmd =0x44504543, len=96
25,982,333 >>> mbox cmd response data (56 bytes)
25,983,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,557 UART: [rt]cmd =0x44504543, len=96
26,089,074 >>> mbox cmd response data (56 bytes)
26,089,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,120,291 UART: [rt]cmd =0x44504543, len=96
26,195,664 >>> mbox cmd response data (56 bytes)
26,196,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,226,901 UART: [rt]cmd =0x44504543, len=96
26,302,438 >>> mbox cmd response data (56 bytes)
26,303,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,640 UART: [rt]cmd =0x44504543, len=96
26,409,098 >>> mbox cmd response data (56 bytes)
26,409,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,440,210 UART: [rt]cmd =0x44504543, len=96
26,516,128 >>> mbox cmd response data (56 bytes)
26,516,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,289 UART: [rt]cmd =0x44504543, len=96
26,622,862 >>> mbox cmd response data (56 bytes)
26,623,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,654,005 UART: [rt]cmd =0x44504543, len=96
26,729,510 >>> mbox cmd response data (56 bytes)
26,730,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,761,091 UART: [rt]cmd =0x44504543, len=96
26,835,959 >>> mbox cmd response data (56 bytes)
26,836,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,867,262 UART: [rt]cmd =0x44504543, len=96
26,942,888 >>> mbox cmd response data (56 bytes)
26,943,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,973,981 UART: [rt]cmd =0x44504543, len=96
27,049,927 >>> mbox cmd response data (56 bytes)
27,050,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,081,351 UART: [rt]cmd =0x44504543, len=96
27,156,098 >>> mbox cmd response data (56 bytes)
27,156,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,187,296 UART: [rt]cmd =0x44504543, len=96
27,263,069 >>> mbox cmd response data (56 bytes)
27,263,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,294,386 UART: [rt]cmd =0x44504543, len=96
27,300,851 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
193,081 UART:
193,454 UART: Running Caliptra ROM ...
194,643 UART:
604,353 UART: [state] CFI Enabled
618,811 UART: [state] LifecycleState = Unprovisioned
620,618 UART: [state] DebugLocked = No
623,350 UART: [state] WD Timer not started. Device not locked for debugging
627,170 UART: [kat] SHA2-256
806,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,876 UART: [kat] ++
818,332 UART: [kat] sha1
830,216 UART: [kat] SHA2-256
833,254 UART: [kat] SHA2-384
839,425 UART: [kat] SHA2-512-ACC
842,440 UART: [kat] ECC-384
3,283,257 UART: [kat] HMAC-384Kdf
3,295,706 UART: [kat] LMS
3,825,160 UART: [kat] --
3,829,016 UART: [cold-reset] ++
3,830,242 UART: [fht] FHT @ 0x50003400
3,840,581 UART: [idev] ++
3,841,145 UART: [idev] CDI.KEYID = 6
3,842,057 UART: [idev] SUBJECT.KEYID = 7
3,843,231 UART: [idev] UDS.KEYID = 0
3,844,155 ready_for_fw is high
3,844,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,638 UART: [idev] Erasing UDS.KEYID = 0
6,314,129 UART: [idev] Sha1 KeyId Algorithm
6,337,025 UART: [idev] --
6,340,056 UART: [ldev] ++
6,340,635 UART: [ldev] CDI.KEYID = 6
6,341,557 UART: [ldev] SUBJECT.KEYID = 5
6,342,719 UART: [ldev] AUTHORITY.KEYID = 7
6,343,951 UART: [ldev] FE.KEYID = 1
6,357,667 UART: [ldev] Erasing FE.KEYID = 1
8,833,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,630 UART: [ldev] --
10,623,446 UART: [fwproc] Wait for Commands...
10,624,943 UART: [fwproc] Recv command 0x46574c44
10,627,061 UART: [fwproc] Recv'd Img size: 114084 bytes
14,038,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,498,072 >>> mbox cmd response: success
14,502,550 UART: [afmc] ++
14,503,148 UART: [afmc] CDI.KEYID = 6
14,504,066 UART: [afmc] SUBJECT.KEYID = 7
14,505,229 UART: [afmc] AUTHORITY.KEYID = 5
17,006,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,286 UART: [afmc] --
18,802,262 UART: [cold-reset] --
18,806,018 UART: [state] Locking Datavault
18,811,812 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,460 UART: [state] Locking ICCM
18,815,993 UART: [exit] Launching FMC @ 0x40000130
18,824,391 UART:
18,824,630 UART: Running Caliptra FMC ...
18,825,738 UART:
18,825,901 UART: [state] CFI Enabled
18,833,999 UART: [fht] FMC Alias Private Key: 7
20,591,200 UART: [art] Extend RT PCRs Done
20,592,428 UART: [art] Lock RT PCRs Done
20,594,426 UART: [art] Populate DV Done
20,599,913 UART: [fht] FMC Alias Private Key: 7
20,601,524 UART: [art] Derive CDI
20,602,343 UART: [art] Store in in slot 0x4
20,644,957 UART: [art] Derive Key Pair
20,645,967 UART: [art] Store priv key in slot 0x5
23,073,124 UART: [art] Derive Key Pair - Done
23,086,126 UART: [art] Signing Cert with AUTHO
23,087,436 UART: RITY.KEYID = 7
24,792,857 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,364 UART: [art] PUB.X = E1C63FCD148C1C75818BD89DD0D6E11ED11704CC9AA7564EFDDCCF6B2791949FDDA289DD43EBDFA5479D362DB555DDF8
24,801,697 UART: [art] PUB.Y = CA2393F2D7F6B604C0ED815A5A4E3F88520FC82620528CF889B13E26D26437ADDA12B579C8083C4C57998EFA93FA2383
24,808,897 UART: [art] SIG.R = 97E7FF94A3FBE6C8027D248B83F67C753AE6E637895D5BC744BA958A254F8FCA35B21258360B3C51E8BFB92297125A37
24,816,327 UART: [art] SIG.S = 821FE5524E1B458115FF4BB990DA3132717CBF8033186CAE9BA6576F4A27226F0565FBC58E89E87A76F14B237EA5F80E
25,796,021 UART: Caliptra RT
25,796,739 UART: [state] CFI Enabled
25,913,969 UART: [rt] RT listening for mailbox commands...
25,915,880 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,945,866 UART: [rt]cmd =0x44504543, len=40
25,972,434 >>> mbox cmd response data (40 bytes)
25,973,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,004,239 UART: [rt]cmd =0x44504543, len=96
26,044,619 >>> mbox cmd response data (56 bytes)
26,045,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,075,970 UART: [rt]cmd =0x44504543, len=96
26,116,650 >>> mbox cmd response data (56 bytes)
26,117,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,148,025 UART: [rt]cmd =0x44504543, len=96
26,188,960 >>> mbox cmd response data (56 bytes)
26,189,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,220,091 UART: [rt]cmd =0x44504543, len=96
26,261,271 >>> mbox cmd response data (56 bytes)
26,261,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,370 UART: [rt]cmd =0x44504543, len=96
26,333,876 >>> mbox cmd response data (56 bytes)
26,334,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,365,148 UART: [rt]cmd =0x44504543, len=96
26,406,495 >>> mbox cmd response data (56 bytes)
26,407,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,437,639 UART: [rt]cmd =0x44504543, len=96
26,479,077 >>> mbox cmd response data (56 bytes)
26,479,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,510,578 UART: [rt]cmd =0x44504543, len=96
26,553,096 >>> mbox cmd response data (56 bytes)
26,553,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,584,259 UART: [rt]cmd =0x44504543, len=96
26,626,771 >>> mbox cmd response data (56 bytes)
26,627,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,658,193 UART: [rt]cmd =0x44504543, len=96
26,701,078 >>> mbox cmd response data (56 bytes)
26,701,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,732,289 UART: [rt]cmd =0x44504543, len=96
26,776,273 >>> mbox cmd response data (56 bytes)
26,777,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,807,650 UART: [rt]cmd =0x44504543, len=96
26,850,807 >>> mbox cmd response data (56 bytes)
26,851,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,882,069 UART: [rt]cmd =0x44504543, len=96
26,925,417 >>> mbox cmd response data (56 bytes)
26,926,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,956,663 UART: [rt]cmd =0x44504543, len=96
27,000,789 >>> mbox cmd response data (56 bytes)
27,001,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,031,891 UART: [rt]cmd =0x44504543, len=96
27,075,972 >>> mbox cmd response data (56 bytes)
27,076,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,107,182 UART: [rt]cmd =0x44504543, len=96
27,113,859 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
3,697,232 ready_for_fw is high
3,697,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,850 >>> mbox cmd response: success
18,504,141 UART:
18,504,552 UART: Running Caliptra FMC ...
18,505,670 UART:
18,505,829 UART: [state] CFI Enabled
18,513,189 UART: [fht] FMC Alias Private Key: 7
20,269,872 UART: [art] Extend RT PCRs Done
20,271,094 UART: [art] Lock RT PCRs Done
20,272,621 UART: [art] Populate DV Done
20,278,253 UART: [fht] FMC Alias Private Key: 7
20,279,743 UART: [art] Derive CDI
20,280,507 UART: [art] Store in in slot 0x4
20,322,993 UART: [art] Derive Key Pair
20,323,989 UART: [art] Store priv key in slot 0x5
22,751,125 UART: [art] Derive Key Pair - Done
22,764,021 UART: [art] Signing Cert with AUTHO
22,765,334 UART: RITY.KEYID = 7
24,470,619 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,106 UART: [art] PUB.X = 710F072375D525D1A814639171983A9A9165043279117B7D8B59C0C43FD6629749A2B60FE8F51F64C1E12B6E914CCF46
24,479,379 UART: [art] PUB.Y = E6BE7C4E3376EBFC9C075A0AE4D89A0515E31A95D8C4597F5D8235BDDF6005B19935923F8CD10CA4976D944B6BE4920E
24,486,669 UART: [art] SIG.R = CBD3F4AC4358175A7F8CCC5F346EECCC7699AA1150DDF5D023867C588801C481ED18D3AD164B0B43AB13E8F7EACFE19F
24,494,040 UART: [art] SIG.S = 8D344894DD341A6C69A6C2FF3B1AAE4B1B2CC057A281B5B3BF0E2A35764A45D9891F0EA0E100B831D252A471BB48CF54
25,472,639 UART: Caliptra RT
25,473,356 UART: [state] CFI Enabled
25,590,533 UART: [rt] RT listening for mailbox commands...
25,592,453 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,622,439 UART: [rt]cmd =0x44504543, len=40
25,648,684 >>> mbox cmd response data (40 bytes)
25,650,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,680,424 UART: [rt]cmd =0x44504543, len=96
25,720,368 >>> mbox cmd response data (56 bytes)
25,721,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,751,609 UART: [rt]cmd =0x44504543, len=96
25,793,166 >>> mbox cmd response data (56 bytes)
25,793,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,824,221 UART: [rt]cmd =0x44504543, len=96
25,865,239 >>> mbox cmd response data (56 bytes)
25,865,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,896,662 UART: [rt]cmd =0x44504543, len=96
25,937,781 >>> mbox cmd response data (56 bytes)
25,938,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,968,865 UART: [rt]cmd =0x44504543, len=96
26,010,641 >>> mbox cmd response data (56 bytes)
26,011,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,041,797 UART: [rt]cmd =0x44504543, len=96
26,083,627 >>> mbox cmd response data (56 bytes)
26,084,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,114,781 UART: [rt]cmd =0x44504543, len=96
26,156,821 >>> mbox cmd response data (56 bytes)
26,157,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,188,420 UART: [rt]cmd =0x44504543, len=96
26,230,843 >>> mbox cmd response data (56 bytes)
26,231,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,262,381 UART: [rt]cmd =0x44504543, len=96
26,305,479 >>> mbox cmd response data (56 bytes)
26,306,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,738 UART: [rt]cmd =0x44504543, len=96
26,379,381 >>> mbox cmd response data (56 bytes)
26,380,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,752 UART: [rt]cmd =0x44504543, len=96
26,454,230 >>> mbox cmd response data (56 bytes)
26,454,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,485,493 UART: [rt]cmd =0x44504543, len=96
26,528,646 >>> mbox cmd response data (56 bytes)
26,529,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,559,824 UART: [rt]cmd =0x44504543, len=96
26,603,842 >>> mbox cmd response data (56 bytes)
26,604,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,635,047 UART: [rt]cmd =0x44504543, len=96
26,679,224 >>> mbox cmd response data (56 bytes)
26,679,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,325 UART: [rt]cmd =0x44504543, len=96
26,754,771 >>> mbox cmd response data (56 bytes)
26,755,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,785,917 UART: [rt]cmd =0x44504543, len=96
26,792,750 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,349 UART:
192,706 UART: Running Caliptra ROM ...
193,867 UART:
194,013 UART: [state] CFI Enabled
265,335 UART: [state] LifecycleState = Unprovisioned
267,686 UART: [state] DebugLocked = No
270,423 UART: [state] WD Timer not started. Device not locked for debugging
275,259 UART: [kat] SHA2-256
465,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,919 UART: [kat] ++
476,386 UART: [kat] sha1
487,545 UART: [kat] SHA2-256
490,560 UART: [kat] SHA2-384
496,693 UART: [kat] SHA2-512-ACC
499,271 UART: [kat] ECC-384
2,949,753 UART: [kat] HMAC-384Kdf
2,972,581 UART: [kat] LMS
3,504,359 UART: [kat] --
3,510,272 UART: [cold-reset] ++
3,512,488 UART: [fht] FHT @ 0x50003400
3,523,742 UART: [idev] ++
3,524,381 UART: [idev] CDI.KEYID = 6
3,525,407 UART: [idev] SUBJECT.KEYID = 7
3,526,577 UART: [idev] UDS.KEYID = 0
3,527,500 ready_for_fw is high
3,527,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,168 UART: [idev] Erasing UDS.KEYID = 0
6,026,866 UART: [idev] Sha1 KeyId Algorithm
6,049,038 UART: [idev] --
6,054,654 UART: [ldev] ++
6,055,351 UART: [ldev] CDI.KEYID = 6
6,056,271 UART: [ldev] SUBJECT.KEYID = 5
6,057,430 UART: [ldev] AUTHORITY.KEYID = 7
6,058,662 UART: [ldev] FE.KEYID = 1
6,100,921 UART: [ldev] Erasing FE.KEYID = 1
8,606,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,733 UART: [ldev] --
10,413,502 UART: [fwproc] Wait for Commands...
10,416,215 UART: [fwproc] Recv command 0x46574c44
10,418,523 UART: [fwproc] Recv'd Img size: 114084 bytes
13,854,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,043,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,583,360 >>> mbox cmd response: success
14,587,990 UART: [afmc] ++
14,588,699 UART: [afmc] CDI.KEYID = 6
14,589,870 UART: [afmc] SUBJECT.KEYID = 7
14,591,364 UART: [afmc] AUTHORITY.KEYID = 5
17,129,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,013 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,693 UART: [afmc] --
18,944,410 UART: [cold-reset] --
18,950,381 UART: [state] Locking Datavault
18,956,561 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,726 UART: [state] Locking ICCM
18,960,803 UART: [exit] Launching FMC @ 0x40000130
18,969,486 UART:
18,969,713 UART: Running Caliptra FMC ...
18,970,737 UART:
18,970,881 UART: [state] CFI Enabled
19,028,754 UART: [fht] FMC Alias Private Key: 7
20,792,071 UART: [art] Extend RT PCRs Done
20,793,305 UART: [art] Lock RT PCRs Done
20,795,017 UART: [art] Populate DV Done
20,800,649 UART: [fht] FMC Alias Private Key: 7
20,802,185 UART: [art] Derive CDI
20,802,935 UART: [art] Store in in slot 0x4
20,860,516 UART: [art] Derive Key Pair
20,861,558 UART: [art] Store priv key in slot 0x5
23,324,510 UART: [art] Derive Key Pair - Done
23,337,553 UART: [art] Signing Cert with AUTHO
23,338,848 UART: RITY.KEYID = 7
25,050,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,166 UART: [art] PUB.X = 9F8835CC8D1DDE429A8A46EFC1E29F7D89D304598E1C3CD86D44AFB85169C6E844DB8DCE3FB6F664E0A187A7FFB83350
25,059,484 UART: [art] PUB.Y = 3906DF31D7E8AA46AB03704310C21F6A6B97A86CCF708BFB89457E811A25E30060E717054766626983B1FA036FABD5C8
25,066,733 UART: [art] SIG.R = 0D43C87DA4748C7F1BC931227EDD4E9AA81B53F7E99FBE321E1A75401B691E8E78E0732DB7A580201D5A4E2E63E27C42
25,074,111 UART: [art] SIG.S = 42915661DC57612C7D2EFE29A5B040DC2103A20F6BECF14004A9F175B6011554B86127347186441DC46B950CCCC13A64
26,052,986 UART: Caliptra RT
26,053,684 UART: [state] CFI Enabled
26,217,610 UART: [rt] RT listening for mailbox commands...
26,219,529 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,250,228 UART: [rt]cmd =0x44504543, len=40
26,292,247 >>> mbox cmd response data (40 bytes)
26,293,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,097 UART: [rt]cmd =0x44504543, len=96
26,384,068 >>> mbox cmd response data (56 bytes)
26,384,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,301 UART: [rt]cmd =0x44504543, len=96
26,490,652 >>> mbox cmd response data (56 bytes)
26,491,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,747 UART: [rt]cmd =0x44504543, len=96
26,597,960 >>> mbox cmd response data (56 bytes)
26,598,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,629,099 UART: [rt]cmd =0x44504543, len=96
26,704,419 >>> mbox cmd response data (56 bytes)
26,705,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,667 UART: [rt]cmd =0x44504543, len=96
26,811,011 >>> mbox cmd response data (56 bytes)
26,811,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,842,012 UART: [rt]cmd =0x44504543, len=96
26,917,814 >>> mbox cmd response data (56 bytes)
26,918,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,949,020 UART: [rt]cmd =0x44504543, len=96
27,024,567 >>> mbox cmd response data (56 bytes)
27,025,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,055,671 UART: [rt]cmd =0x44504543, len=96
27,132,000 >>> mbox cmd response data (56 bytes)
27,132,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,163,095 UART: [rt]cmd =0x44504543, len=96
27,238,445 >>> mbox cmd response data (56 bytes)
27,239,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,269,713 UART: [rt]cmd =0x44504543, len=96
27,345,681 >>> mbox cmd response data (56 bytes)
27,346,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,376,730 UART: [rt]cmd =0x44504543, len=96
27,451,973 >>> mbox cmd response data (56 bytes)
27,452,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,483,385 UART: [rt]cmd =0x44504543, len=96
27,558,665 >>> mbox cmd response data (56 bytes)
27,559,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,589,961 UART: [rt]cmd =0x44504543, len=96
27,665,441 >>> mbox cmd response data (56 bytes)
27,666,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,696,908 UART: [rt]cmd =0x44504543, len=96
27,772,259 >>> mbox cmd response data (56 bytes)
27,772,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,803,401 UART: [rt]cmd =0x44504543, len=96
27,878,624 >>> mbox cmd response data (56 bytes)
27,879,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,909,707 UART: [rt]cmd =0x44504543, len=96
27,916,599 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,535 writing to cptra_bootfsm_go
3,442,371 ready_for_fw is high
3,442,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,742,330 >>> mbox cmd response: success
19,050,185 UART:
19,050,614 UART: Running Caliptra FMC ...
19,051,752 UART:
19,051,934 UART: [state] CFI Enabled
19,116,518 UART: [fht] FMC Alias Private Key: 7
20,880,223 UART: [art] Extend RT PCRs Done
20,881,448 UART: [art] Lock RT PCRs Done
20,883,067 UART: [art] Populate DV Done
20,888,550 UART: [fht] FMC Alias Private Key: 7
20,890,078 UART: [art] Derive CDI
20,890,849 UART: [art] Store in in slot 0x4
20,949,456 UART: [art] Derive Key Pair
20,950,458 UART: [art] Store priv key in slot 0x5
23,413,864 UART: [art] Derive Key Pair - Done
23,426,877 UART: [art] Signing Cert with AUTHO
23,428,187 UART: RITY.KEYID = 7
25,139,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,097 UART: [art] PUB.X = 469216F6948066F05A0E27F17709AC252A6296CD0554E15C37DBC9F7A0BDAFE74191DB6CF64EC30BE63A336B0EF2BF3B
25,148,370 UART: [art] PUB.Y = 8CFC720F7C8C921834ECFCF0A5BC98EDE259F9BB0942107E514E16D86C1F004D548453691ED3CF6A5162BC6C82DF71E9
25,155,608 UART: [art] SIG.R = BF8C727DF1CEF2CC4DF537DAF4CCE055F1F02FE763070BF7CB7D7A279638F4427C89B97308948F5499F8ADA2D3B9C247
25,162,999 UART: [art] SIG.S = B273FABE8595AFEEEAE5D601E820B633D4CA52676520B026CB80353263902B3E7F16378A3FFCEB40CB9C59369DEC0278
26,141,918 UART: Caliptra RT
26,142,634 UART: [state] CFI Enabled
26,306,930 UART: [rt] RT listening for mailbox commands...
26,308,866 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,339,564 UART: [rt]cmd =0x44504543, len=40
26,382,168 >>> mbox cmd response data (40 bytes)
26,383,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,414,112 UART: [rt]cmd =0x44504543, len=96
26,473,930 >>> mbox cmd response data (56 bytes)
26,474,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,505,143 UART: [rt]cmd =0x44504543, len=96
26,581,048 >>> mbox cmd response data (56 bytes)
26,581,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,612,429 UART: [rt]cmd =0x44504543, len=96
26,687,344 >>> mbox cmd response data (56 bytes)
26,688,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,731 UART: [rt]cmd =0x44504543, len=96
26,794,671 >>> mbox cmd response data (56 bytes)
26,795,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,152 UART: [rt]cmd =0x44504543, len=96
26,901,250 >>> mbox cmd response data (56 bytes)
26,901,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,932,279 UART: [rt]cmd =0x44504543, len=96
27,008,115 >>> mbox cmd response data (56 bytes)
27,008,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,039,100 UART: [rt]cmd =0x44504543, len=96
27,114,396 >>> mbox cmd response data (56 bytes)
27,115,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,145,614 UART: [rt]cmd =0x44504543, len=96
27,221,307 >>> mbox cmd response data (56 bytes)
27,222,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,252,583 UART: [rt]cmd =0x44504543, len=96
27,327,876 >>> mbox cmd response data (56 bytes)
27,328,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,358,972 UART: [rt]cmd =0x44504543, len=96
27,434,521 >>> mbox cmd response data (56 bytes)
27,435,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,465,593 UART: [rt]cmd =0x44504543, len=96
27,541,525 >>> mbox cmd response data (56 bytes)
27,542,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,572,889 UART: [rt]cmd =0x44504543, len=96
27,648,619 >>> mbox cmd response data (56 bytes)
27,649,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,679,869 UART: [rt]cmd =0x44504543, len=96
27,755,168 >>> mbox cmd response data (56 bytes)
27,755,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,786,447 UART: [rt]cmd =0x44504543, len=96
27,861,748 >>> mbox cmd response data (56 bytes)
27,862,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,893,249 UART: [rt]cmd =0x44504543, len=96
27,968,877 >>> mbox cmd response data (56 bytes)
27,969,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,000,190 UART: [rt]cmd =0x44504543, len=96
28,006,731 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,713 writing to cptra_bootfsm_go
192,882 UART:
193,261 UART: Running Caliptra ROM ...
194,403 UART:
604,180 UART: [state] CFI Enabled
620,541 UART: [state] LifecycleState = Unprovisioned
622,919 UART: [state] DebugLocked = No
625,728 UART: [state] WD Timer not started. Device not locked for debugging
629,482 UART: [kat] SHA2-256
819,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,096 UART: [kat] ++
830,710 UART: [kat] sha1
842,111 UART: [kat] SHA2-256
845,126 UART: [kat] SHA2-384
851,971 UART: [kat] SHA2-512-ACC
854,552 UART: [kat] ECC-384
3,296,315 UART: [kat] HMAC-384Kdf
3,308,259 UART: [kat] LMS
3,840,101 UART: [kat] --
3,843,810 UART: [cold-reset] ++
3,845,744 UART: [fht] FHT @ 0x50003400
3,857,238 UART: [idev] ++
3,857,985 UART: [idev] CDI.KEYID = 6
3,858,871 UART: [idev] SUBJECT.KEYID = 7
3,860,120 UART: [idev] UDS.KEYID = 0
3,861,391 ready_for_fw is high
3,861,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,738 UART: [idev] Erasing UDS.KEYID = 0
6,335,165 UART: [idev] Sha1 KeyId Algorithm
6,357,641 UART: [idev] --
6,362,613 UART: [ldev] ++
6,363,304 UART: [ldev] CDI.KEYID = 6
6,364,215 UART: [ldev] SUBJECT.KEYID = 5
6,365,376 UART: [ldev] AUTHORITY.KEYID = 7
6,366,614 UART: [ldev] FE.KEYID = 1
6,377,181 UART: [ldev] Erasing FE.KEYID = 1
8,857,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,791 UART: [ldev] --
10,648,329 UART: [fwproc] Wait for Commands...
10,650,738 UART: [fwproc] Recv command 0x46574c44
10,653,080 UART: [fwproc] Recv'd Img size: 114084 bytes
14,107,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,835,975 >>> mbox cmd response: success
14,840,747 UART: [afmc] ++
14,841,461 UART: [afmc] CDI.KEYID = 6
14,842,575 UART: [afmc] SUBJECT.KEYID = 7
14,844,121 UART: [afmc] AUTHORITY.KEYID = 5
17,345,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,591 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,691 UART: [afmc] --
19,140,078 UART: [cold-reset] --
19,144,288 UART: [state] Locking Datavault
19,149,339 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,487 UART: [state] Locking ICCM
19,153,863 UART: [exit] Launching FMC @ 0x40000130
19,162,493 UART:
19,162,731 UART: Running Caliptra FMC ...
19,163,833 UART:
19,163,995 UART: [state] CFI Enabled
19,171,987 UART: [fht] FMC Alias Private Key: 7
20,928,728 UART: [art] Extend RT PCRs Done
20,929,938 UART: [art] Lock RT PCRs Done
20,931,511 UART: [art] Populate DV Done
20,936,920 UART: [fht] FMC Alias Private Key: 7
20,938,468 UART: [art] Derive CDI
20,939,287 UART: [art] Store in in slot 0x4
20,981,889 UART: [art] Derive Key Pair
20,982,927 UART: [art] Store priv key in slot 0x5
23,409,509 UART: [art] Derive Key Pair - Done
23,422,501 UART: [art] Signing Cert with AUTHO
23,423,808 UART: RITY.KEYID = 7
25,129,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,064 UART: [art] PUB.X = 7521E66FEA8447E9D79F60AD8E77F619E7B8B42B0C12A80A4B748C96F77714C71965978E7BE84F4655AE44C1E014B3B0
25,138,346 UART: [art] PUB.Y = 3C740AD61245739A891FA22A4A49A13A303C9F39FCBB45237695BB855E1F6A19938ED14F1B3CF2EE3A7F77008AD529CA
25,145,603 UART: [art] SIG.R = 58A096D94F0854A654613A4CD25C63A745CCA3568F11FCDF4DFC0203748E525B84D0DBCC7BDE27D845474E6B9381D543
25,152,978 UART: [art] SIG.S = E9B977DD226BAE467CF38CA65F0710F9EC66E0CF04FC43C186A614E97AC0171EB8AA734DE6C3ACD21B738238368EB330
26,131,727 UART: Caliptra RT
26,132,420 UART: [state] CFI Enabled
26,250,632 UART: [rt] RT listening for mailbox commands...
26,252,545 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,282,746 UART: [rt]cmd =0x44504543, len=40
26,308,884 >>> mbox cmd response data (40 bytes)
26,310,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,015 UART: [rt]cmd =0x44504543, len=96
26,381,285 >>> mbox cmd response data (56 bytes)
26,382,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,356 UART: [rt]cmd =0x44504543, len=96
26,453,540 >>> mbox cmd response data (56 bytes)
26,454,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,485,002 UART: [rt]cmd =0x44504543, len=96
26,525,956 >>> mbox cmd response data (56 bytes)
26,526,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,556,949 UART: [rt]cmd =0x44504543, len=96
26,598,221 >>> mbox cmd response data (56 bytes)
26,598,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,629,423 UART: [rt]cmd =0x44504543, len=96
26,670,803 >>> mbox cmd response data (56 bytes)
26,671,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,702,245 UART: [rt]cmd =0x44504543, len=96
26,743,564 >>> mbox cmd response data (56 bytes)
26,744,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,774,494 UART: [rt]cmd =0x44504543, len=96
26,816,564 >>> mbox cmd response data (56 bytes)
26,817,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,847,766 UART: [rt]cmd =0x44504543, len=96
26,889,729 >>> mbox cmd response data (56 bytes)
26,890,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,920,941 UART: [rt]cmd =0x44504543, len=96
26,964,193 >>> mbox cmd response data (56 bytes)
26,964,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,995,152 UART: [rt]cmd =0x44504543, len=96
27,037,955 >>> mbox cmd response data (56 bytes)
27,038,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,069,295 UART: [rt]cmd =0x44504543, len=96
27,112,786 >>> mbox cmd response data (56 bytes)
27,113,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,143,938 UART: [rt]cmd =0x44504543, len=96
27,187,495 >>> mbox cmd response data (56 bytes)
27,188,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,218,520 UART: [rt]cmd =0x44504543, len=96
27,262,612 >>> mbox cmd response data (56 bytes)
27,263,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,293,894 UART: [rt]cmd =0x44504543, len=96
27,338,108 >>> mbox cmd response data (56 bytes)
27,338,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,369,187 UART: [rt]cmd =0x44504543, len=96
27,413,491 >>> mbox cmd response data (56 bytes)
27,414,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,444,661 UART: [rt]cmd =0x44504543, len=96
27,450,968 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
3,759,605 ready_for_fw is high
3,760,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,173 >>> mbox cmd response: success
19,211,336 UART:
19,211,870 UART: Running Caliptra FMC ...
19,213,012 UART:
19,213,181 UART: [state] CFI Enabled
19,221,015 UART: [fht] FMC Alias Private Key: 7
20,977,981 UART: [art] Extend RT PCRs Done
20,979,196 UART: [art] Lock RT PCRs Done
20,980,778 UART: [art] Populate DV Done
20,986,199 UART: [fht] FMC Alias Private Key: 7
20,987,852 UART: [art] Derive CDI
20,988,674 UART: [art] Store in in slot 0x4
21,031,054 UART: [art] Derive Key Pair
21,032,071 UART: [art] Store priv key in slot 0x5
23,458,030 UART: [art] Derive Key Pair - Done
23,471,199 UART: [art] Signing Cert with AUTHO
23,472,531 UART: RITY.KEYID = 7
25,177,800 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,298 UART: [art] PUB.X = 36D0F4A80A3C1472E5DE7519B25BFDF04CC13EA93EA23E9ECB93287B22B8002704F90908418EF8BA1D77891E6CEA91ED
25,186,593 UART: [art] PUB.Y = E2ACBA3C4B044312CCF879582259CE669C092C66831986F4BEC523CD35336DE1EEB839BDBC67F2A59EA2D3634DF7609E
25,193,855 UART: [art] SIG.R = 1385A05D7C6131AC32E43A1C401C9D398DF1644465F196650EC2BE46542E678969A421AE6FAC59ED76D09041908A710D
25,201,197 UART: [art] SIG.S = 9C3DB16AEAECCFE76FC8C54080E3C155208338603024B0FFF62C021479163EB01ADA6C213BA42257EBE07E8AD3F4CFB4
26,180,147 UART: Caliptra RT
26,180,870 UART: [state] CFI Enabled
26,297,163 UART: [rt] RT listening for mailbox commands...
26,299,076 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,329,174 UART: [rt]cmd =0x44504543, len=40
26,355,267 >>> mbox cmd response data (40 bytes)
26,356,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,404 UART: [rt]cmd =0x44504543, len=96
26,427,603 >>> mbox cmd response data (56 bytes)
26,428,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,960 UART: [rt]cmd =0x44504543, len=96
26,499,582 >>> mbox cmd response data (56 bytes)
26,500,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,689 UART: [rt]cmd =0x44504543, len=96
26,572,148 >>> mbox cmd response data (56 bytes)
26,572,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,603,461 UART: [rt]cmd =0x44504543, len=96
26,644,777 >>> mbox cmd response data (56 bytes)
26,645,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,676,049 UART: [rt]cmd =0x44504543, len=96
26,717,340 >>> mbox cmd response data (56 bytes)
26,718,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,748,577 UART: [rt]cmd =0x44504543, len=96
26,790,727 >>> mbox cmd response data (56 bytes)
26,791,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,821,897 UART: [rt]cmd =0x44504543, len=96
26,863,908 >>> mbox cmd response data (56 bytes)
26,864,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,895,327 UART: [rt]cmd =0x44504543, len=96
26,937,537 >>> mbox cmd response data (56 bytes)
26,938,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,968,706 UART: [rt]cmd =0x44504543, len=96
27,011,595 >>> mbox cmd response data (56 bytes)
27,012,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,042,926 UART: [rt]cmd =0x44504543, len=96
27,085,880 >>> mbox cmd response data (56 bytes)
27,086,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,116,984 UART: [rt]cmd =0x44504543, len=96
27,160,633 >>> mbox cmd response data (56 bytes)
27,161,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,191,997 UART: [rt]cmd =0x44504543, len=96
27,235,160 >>> mbox cmd response data (56 bytes)
27,235,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,266,550 UART: [rt]cmd =0x44504543, len=96
27,310,404 >>> mbox cmd response data (56 bytes)
27,311,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,341,624 UART: [rt]cmd =0x44504543, len=96
27,386,381 >>> mbox cmd response data (56 bytes)
27,387,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,417,771 UART: [rt]cmd =0x44504543, len=96
27,463,046 >>> mbox cmd response data (56 bytes)
27,463,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,494,317 UART: [rt]cmd =0x44504543, len=96
27,501,052 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,595 UART: [kat] SHA2-256
881,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,641 UART: [kat] ++
885,793 UART: [kat] sha1
890,005 UART: [kat] SHA2-256
891,943 UART: [kat] SHA2-384
894,622 UART: [kat] SHA2-512-ACC
896,523 UART: [kat] ECC-384
901,862 UART: [kat] HMAC-384Kdf
906,412 UART: [kat] LMS
1,474,608 UART: [kat] --
1,475,631 UART: [cold-reset] ++
1,476,165 UART: [fht] Storing FHT @ 0x50003400
1,478,836 UART: [idev] ++
1,479,004 UART: [idev] CDI.KEYID = 6
1,479,364 UART: [idev] SUBJECT.KEYID = 7
1,479,788 UART: [idev] UDS.KEYID = 0
1,480,133 ready_for_fw is high
1,480,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,918 UART: [idev] Erasing UDS.KEYID = 0
1,504,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,560 UART: [idev] --
1,513,659 UART: [ldev] ++
1,513,827 UART: [ldev] CDI.KEYID = 6
1,514,190 UART: [ldev] SUBJECT.KEYID = 5
1,514,616 UART: [ldev] AUTHORITY.KEYID = 7
1,515,079 UART: [ldev] FE.KEYID = 1
1,520,251 UART: [ldev] Erasing FE.KEYID = 1
1,545,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,852 UART: [ldev] --
1,585,129 UART: [fwproc] Waiting for Commands...
1,585,802 UART: [fwproc] Received command 0x46574c44
1,586,593 UART: [fwproc] Received Image of size 114084 bytes
2,880,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,936,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,450 >>> mbox cmd response: success
3,073,630 UART: [afmc] ++
3,073,798 UART: [afmc] CDI.KEYID = 6
3,074,160 UART: [afmc] SUBJECT.KEYID = 7
3,074,585 UART: [afmc] AUTHORITY.KEYID = 5
3,109,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,125,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,131,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,137,569 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,259 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,140 UART: [afmc] --
3,152,040 UART: [cold-reset] --
3,152,878 UART: [state] Locking Datavault
3,154,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,154,765 UART: [state] Locking ICCM
3,155,331 UART: [exit] Launching FMC @ 0x40000130
3,160,660 UART:
3,160,676 UART: Running Caliptra FMC ...
3,161,084 UART:
3,161,138 UART: [state] CFI Enabled
3,171,825 UART: [fht] FMC Alias Private Key: 7
3,279,510 UART: [art] Extend RT PCRs Done
3,279,938 UART: [art] Lock RT PCRs Done
3,281,282 UART: [art] Populate DV Done
3,289,409 UART: [fht] FMC Alias Private Key: 7
3,290,511 UART: [art] Derive CDI
3,290,791 UART: [art] Store in in slot 0x4
3,376,218 UART: [art] Derive Key Pair
3,376,578 UART: [art] Store priv key in slot 0x5
3,390,068 UART: [art] Derive Key Pair - Done
3,404,677 UART: [art] Signing Cert with AUTHO
3,405,157 UART: RITY.KEYID = 7
3,420,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,420,998 UART: [art] PUB.X = A96632973FAB8145D9E1F3FF734192C927DB4A2DC2E478404C3528BE8D3238EA5A62AD36FCF0388EF41B709FB68E2101
3,427,771 UART: [art] PUB.Y = 65E8CC3BC19267B63AD9C3029FE7EE2DAD6C804AF711F7C146E9F2D75406C16B67F002B1174BC4B545B0510C0A1897A9
3,434,714 UART: [art] SIG.R = CD5C91B80806A98CD75C2AFCB93A16E1995CCD6328F00158CC1D97D15FB91502926897751E43E2C879C97EF2B96F2596
3,441,474 UART: [art] SIG.S = 61418ADD23AE29461D4D8D524A36ABC8822C01190910F18761B0F12EA022956A1ECEDB89396ABB95DEFA526612A72D61
3,465,297 UART: Caliptra RT
3,465,550 UART: [state] CFI Enabled
3,575,049 UART: [rt] RT listening for mailbox commands...
3,575,719 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,571 UART: [rt]cmd =0x44504543, len=40
3,631,170 >>> mbox cmd response data (40 bytes)
3,631,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,050 UART: [rt]cmd =0x44504543, len=96
3,702,031 >>> mbox cmd response data (56 bytes)
3,702,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,731,997 UART: [rt]cmd =0x44504543, len=96
3,772,549 >>> mbox cmd response data (56 bytes)
3,772,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,802,467 UART: [rt]cmd =0x44504543, len=96
3,843,449 >>> mbox cmd response data (56 bytes)
3,843,450 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,873,359 UART: [rt]cmd =0x44504543, len=96
3,914,573 >>> mbox cmd response data (56 bytes)
3,914,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,337 UART: [rt]cmd =0x44504543, len=96
3,984,209 >>> mbox cmd response data (56 bytes)
3,984,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,075 UART: [rt]cmd =0x44504543, len=96
4,054,897 >>> mbox cmd response data (56 bytes)
4,054,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,035 UART: [rt]cmd =0x44504543, len=96
4,126,511 >>> mbox cmd response data (56 bytes)
4,126,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,571 UART: [rt]cmd =0x44504543, len=96
4,198,121 >>> mbox cmd response data (56 bytes)
4,198,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,228,181 UART: [rt]cmd =0x44504543, len=96
4,270,113 >>> mbox cmd response data (56 bytes)
4,270,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,031 UART: [rt]cmd =0x44504543, len=96
4,342,945 >>> mbox cmd response data (56 bytes)
4,342,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,827 UART: [rt]cmd =0x44504543, len=96
4,415,917 >>> mbox cmd response data (56 bytes)
4,415,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,445,903 UART: [rt]cmd =0x44504543, len=96
4,489,025 >>> mbox cmd response data (56 bytes)
4,489,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,518,757 UART: [rt]cmd =0x44504543, len=96
4,562,705 >>> mbox cmd response data (56 bytes)
4,562,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,592,463 UART: [rt]cmd =0x44504543, len=96
4,636,777 >>> mbox cmd response data (56 bytes)
4,636,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,666,935 UART: [rt]cmd =0x44504543, len=96
4,711,513 >>> mbox cmd response data (56 bytes)
4,711,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,741,491 UART: [rt]cmd =0x44504543, len=96
4,748,688 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 ready_for_fw is high
1,362,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,420 >>> mbox cmd response: success
2,984,686 UART:
2,984,702 UART: Running Caliptra FMC ...
2,985,110 UART:
2,985,164 UART: [state] CFI Enabled
2,995,745 UART: [fht] FMC Alias Private Key: 7
3,103,822 UART: [art] Extend RT PCRs Done
3,104,250 UART: [art] Lock RT PCRs Done
3,105,510 UART: [art] Populate DV Done
3,113,955 UART: [fht] FMC Alias Private Key: 7
3,114,909 UART: [art] Derive CDI
3,115,189 UART: [art] Store in in slot 0x4
3,200,796 UART: [art] Derive Key Pair
3,201,156 UART: [art] Store priv key in slot 0x5
3,214,702 UART: [art] Derive Key Pair - Done
3,229,396 UART: [art] Signing Cert with AUTHO
3,229,876 UART: RITY.KEYID = 7
3,244,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,737 UART: [art] PUB.X = 44B73E00B3E32859EA6AFCB0144A308C6FD446664100FAE729D6A2A9338294A75A1E45F1A701CA165A1341E325F59792
3,252,458 UART: [art] PUB.Y = B37DFA5D05B37438FA67672761CBE91C6DD5844305A4F5FF24A6F8707157691EFB22AEBFDE4ADE256B4057900706C697
3,259,402 UART: [art] SIG.R = AB90247B6F2CB179DB88B1676ED2E96E64BB905E3A5D01240CCCDD1AA8657E3F84B4F03EA0BD3CC9C5167303E17A9279
3,266,177 UART: [art] SIG.S = C10FB71483FF73E912A1EE2CE9D7F4F0FF12A0846A3748BABE960EBF71A16006D00E83596FB375414611C6FACFD69BE6
3,289,770 UART: Caliptra RT
3,290,023 UART: [state] CFI Enabled
3,398,187 UART: [rt] RT listening for mailbox commands...
3,398,857 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,091 UART: [rt]cmd =0x44504543, len=40
3,455,350 >>> mbox cmd response data (40 bytes)
3,455,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,236 UART: [rt]cmd =0x44504543, len=96
3,525,535 >>> mbox cmd response data (56 bytes)
3,525,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,447 UART: [rt]cmd =0x44504543, len=96
3,596,525 >>> mbox cmd response data (56 bytes)
3,596,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,549 UART: [rt]cmd =0x44504543, len=96
3,667,077 >>> mbox cmd response data (56 bytes)
3,667,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,995 UART: [rt]cmd =0x44504543, len=96
3,738,747 >>> mbox cmd response data (56 bytes)
3,738,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,601 UART: [rt]cmd =0x44504543, len=96
3,809,923 >>> mbox cmd response data (56 bytes)
3,809,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,873 UART: [rt]cmd =0x44504543, len=96
3,881,959 >>> mbox cmd response data (56 bytes)
3,881,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,975 UART: [rt]cmd =0x44504543, len=96
3,953,835 >>> mbox cmd response data (56 bytes)
3,953,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,983,631 UART: [rt]cmd =0x44504543, len=96
4,025,621 >>> mbox cmd response data (56 bytes)
4,025,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,055,467 UART: [rt]cmd =0x44504543, len=96
4,096,865 >>> mbox cmd response data (56 bytes)
4,096,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,811 UART: [rt]cmd =0x44504543, len=96
4,169,501 >>> mbox cmd response data (56 bytes)
4,169,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,349 UART: [rt]cmd =0x44504543, len=96
4,242,467 >>> mbox cmd response data (56 bytes)
4,242,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,465 UART: [rt]cmd =0x44504543, len=96
4,315,519 >>> mbox cmd response data (56 bytes)
4,315,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,345,421 UART: [rt]cmd =0x44504543, len=96
4,388,801 >>> mbox cmd response data (56 bytes)
4,388,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,418,877 UART: [rt]cmd =0x44504543, len=96
4,462,805 >>> mbox cmd response data (56 bytes)
4,462,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,492,667 UART: [rt]cmd =0x44504543, len=96
4,537,069 >>> mbox cmd response data (56 bytes)
4,537,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,567,191 UART: [rt]cmd =0x44504543, len=96
4,573,924 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
895,111 UART: [kat] SHA2-512-ACC
897,012 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,186 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 ready_for_fw is high
1,481,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,505,497 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,515,104 UART: [ldev] ++
1,515,272 UART: [ldev] CDI.KEYID = 6
1,515,635 UART: [ldev] SUBJECT.KEYID = 5
1,516,061 UART: [ldev] AUTHORITY.KEYID = 7
1,516,524 UART: [ldev] FE.KEYID = 1
1,521,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,019 UART: [ldev] --
1,586,472 UART: [fwproc] Waiting for Commands...
1,587,259 UART: [fwproc] Received command 0x46574c44
1,588,050 UART: [fwproc] Received Image of size 114084 bytes
2,883,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,727 >>> mbox cmd response: success
3,076,765 UART: [afmc] ++
3,076,933 UART: [afmc] CDI.KEYID = 6
3,077,295 UART: [afmc] SUBJECT.KEYID = 7
3,077,720 UART: [afmc] AUTHORITY.KEYID = 5
3,113,047 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,949 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,562 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,252 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,067 UART: [afmc] --
3,156,183 UART: [cold-reset] --
3,157,133 UART: [state] Locking Datavault
3,158,242 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,846 UART: [state] Locking ICCM
3,159,398 UART: [exit] Launching FMC @ 0x40000130
3,164,727 UART:
3,164,743 UART: Running Caliptra FMC ...
3,165,151 UART:
3,165,294 UART: [state] CFI Enabled
3,175,489 UART: [fht] FMC Alias Private Key: 7
3,283,788 UART: [art] Extend RT PCRs Done
3,284,216 UART: [art] Lock RT PCRs Done
3,285,754 UART: [art] Populate DV Done
3,293,777 UART: [fht] FMC Alias Private Key: 7
3,294,957 UART: [art] Derive CDI
3,295,237 UART: [art] Store in in slot 0x4
3,381,318 UART: [art] Derive Key Pair
3,381,678 UART: [art] Store priv key in slot 0x5
3,394,994 UART: [art] Derive Key Pair - Done
3,409,476 UART: [art] Signing Cert with AUTHO
3,409,956 UART: RITY.KEYID = 7
3,425,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,223 UART: [art] PUB.X = 78A465355604B32D97BCFA019A6F937BCFD294C65E5B4514003BC6A23FE37FF9D64E91D925648F691C1857CC995F411A
3,432,967 UART: [art] PUB.Y = 7550AF86653716DB1E82FBC0DEE47EB05C566CC2AB32C352AAC94BD3A8388551B17A69AC1BF6A2D9A273CC37CD9A1014
3,439,933 UART: [art] SIG.R = B51B83534F7BC003247E987E45ABAB44D0AC3F12CC622477139FE6F8C13157CFC0F7A3507279632B1306ED8BB355EA31
3,446,701 UART: [art] SIG.S = 2C7A84CD6CA840F4E6E00075A8FFB7B10CA562332FBB130322074063ACD3BBA746B3587549F5AA65CE49B6AA203E874F
3,470,307 UART: Caliptra RT
3,470,652 UART: [state] CFI Enabled
3,578,121 UART: [rt] RT listening for mailbox commands...
3,578,791 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,745 UART: [rt]cmd =0x44504543, len=40
3,634,736 >>> mbox cmd response data (40 bytes)
3,634,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,838 UART: [rt]cmd =0x44504543, len=96
3,704,985 >>> mbox cmd response data (56 bytes)
3,704,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,821 UART: [rt]cmd =0x44504543, len=96
3,775,647 >>> mbox cmd response data (56 bytes)
3,775,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,777 UART: [rt]cmd =0x44504543, len=96
3,846,231 >>> mbox cmd response data (56 bytes)
3,846,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,027 UART: [rt]cmd =0x44504543, len=96
3,916,619 >>> mbox cmd response data (56 bytes)
3,916,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,607 UART: [rt]cmd =0x44504543, len=96
3,988,491 >>> mbox cmd response data (56 bytes)
3,988,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,555 UART: [rt]cmd =0x44504543, len=96
4,059,377 >>> mbox cmd response data (56 bytes)
4,059,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,525 UART: [rt]cmd =0x44504543, len=96
4,131,857 >>> mbox cmd response data (56 bytes)
4,131,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,161,973 UART: [rt]cmd =0x44504543, len=96
4,204,213 >>> mbox cmd response data (56 bytes)
4,204,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,234,059 UART: [rt]cmd =0x44504543, len=96
4,277,041 >>> mbox cmd response data (56 bytes)
4,277,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,306,907 UART: [rt]cmd =0x44504543, len=96
4,349,099 >>> mbox cmd response data (56 bytes)
4,349,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,379,161 UART: [rt]cmd =0x44504543, len=96
4,422,517 >>> mbox cmd response data (56 bytes)
4,422,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,452,243 UART: [rt]cmd =0x44504543, len=96
4,495,989 >>> mbox cmd response data (56 bytes)
4,495,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,525,871 UART: [rt]cmd =0x44504543, len=96
4,569,599 >>> mbox cmd response data (56 bytes)
4,569,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,599,561 UART: [rt]cmd =0x44504543, len=96
4,644,063 >>> mbox cmd response data (56 bytes)
4,644,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,674,047 UART: [rt]cmd =0x44504543, len=96
4,717,957 >>> mbox cmd response data (56 bytes)
4,717,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,747,785 UART: [rt]cmd =0x44504543, len=96
4,754,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 ready_for_fw is high
1,363,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,233 >>> mbox cmd response: success
2,986,249 UART:
2,986,265 UART: Running Caliptra FMC ...
2,986,673 UART:
2,986,816 UART: [state] CFI Enabled
2,997,359 UART: [fht] FMC Alias Private Key: 7
3,105,690 UART: [art] Extend RT PCRs Done
3,106,118 UART: [art] Lock RT PCRs Done
3,107,758 UART: [art] Populate DV Done
3,115,971 UART: [fht] FMC Alias Private Key: 7
3,117,097 UART: [art] Derive CDI
3,117,377 UART: [art] Store in in slot 0x4
3,203,076 UART: [art] Derive Key Pair
3,203,436 UART: [art] Store priv key in slot 0x5
3,216,088 UART: [art] Derive Key Pair - Done
3,231,004 UART: [art] Signing Cert with AUTHO
3,231,484 UART: RITY.KEYID = 7
3,246,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,653 UART: [art] PUB.X = F7A4B0D9A710AFED59B223C4BFA7FA806CF8CF2A2DAB9AFDF59C8B203EE6618392346227949FFCCF3606FB6C1232A6C2
3,254,442 UART: [art] PUB.Y = E57529CD7C0D83836B855C7B4B05CF3D5DEBE2F66AA1C246F81AB16CBE39BB1F70B5BA3438F9033577A0D23F36DD6EFC
3,261,403 UART: [art] SIG.R = 54377DAAA2A01364B0F1211804EC1B34262F95D0150661EBCD99FB0A6B8FD496FAD509DB225A7C91C46169B3FE846C96
3,268,167 UART: [art] SIG.S = DE69DCB6DD7AFA585DDF4E87FEB4E9B96B405C688CC878C3732418CEF1DED7E6C00962D4606E466F76E9E3B6053C08C6
3,291,847 UART: Caliptra RT
3,292,192 UART: [state] CFI Enabled
3,399,953 UART: [rt] RT listening for mailbox commands...
3,400,623 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,765 UART: [rt]cmd =0x44504543, len=40
3,457,284 >>> mbox cmd response data (40 bytes)
3,457,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,114 UART: [rt]cmd =0x44504543, len=96
3,527,469 >>> mbox cmd response data (56 bytes)
3,527,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,467 UART: [rt]cmd =0x44504543, len=96
3,598,279 >>> mbox cmd response data (56 bytes)
3,598,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,365 UART: [rt]cmd =0x44504543, len=96
3,669,269 >>> mbox cmd response data (56 bytes)
3,669,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,073 UART: [rt]cmd =0x44504543, len=96
3,740,587 >>> mbox cmd response data (56 bytes)
3,740,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,509 UART: [rt]cmd =0x44504543, len=96
3,812,347 >>> mbox cmd response data (56 bytes)
3,812,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,337 UART: [rt]cmd =0x44504543, len=96
3,885,049 >>> mbox cmd response data (56 bytes)
3,885,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,827 UART: [rt]cmd =0x44504543, len=96
3,957,411 >>> mbox cmd response data (56 bytes)
3,957,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,987,179 UART: [rt]cmd =0x44504543, len=96
4,029,113 >>> mbox cmd response data (56 bytes)
4,029,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,135 UART: [rt]cmd =0x44504543, len=96
4,102,563 >>> mbox cmd response data (56 bytes)
4,102,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,132,445 UART: [rt]cmd =0x44504543, len=96
4,175,135 >>> mbox cmd response data (56 bytes)
4,175,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,917 UART: [rt]cmd =0x44504543, len=96
4,248,377 >>> mbox cmd response data (56 bytes)
4,248,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,491 UART: [rt]cmd =0x44504543, len=96
4,322,419 >>> mbox cmd response data (56 bytes)
4,322,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,352,517 UART: [rt]cmd =0x44504543, len=96
4,396,435 >>> mbox cmd response data (56 bytes)
4,396,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,426,479 UART: [rt]cmd =0x44504543, len=96
4,470,673 >>> mbox cmd response data (56 bytes)
4,470,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,571 UART: [rt]cmd =0x44504543, len=96
4,545,093 >>> mbox cmd response data (56 bytes)
4,545,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,575,077 UART: [rt]cmd =0x44504543, len=96
4,582,312 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,236 UART: [kat] HMAC-384Kdf
922,792 UART: [kat] LMS
1,171,120 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,591 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,034 UART: [idev] Erasing UDS.KEYID = 0
1,201,453 UART: [idev] Sha1 KeyId Algorithm
1,209,939 UART: [idev] --
1,211,061 UART: [ldev] ++
1,211,229 UART: [ldev] CDI.KEYID = 6
1,211,592 UART: [ldev] SUBJECT.KEYID = 5
1,212,018 UART: [ldev] AUTHORITY.KEYID = 7
1,212,481 UART: [ldev] FE.KEYID = 1
1,217,639 UART: [ldev] Erasing FE.KEYID = 1
1,244,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,083 UART: [ldev] --
1,283,460 UART: [fwproc] Wait for Commands...
1,284,250 UART: [fwproc] Recv command 0x46574c44
1,284,978 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,287 >>> mbox cmd response: success
2,772,491 UART: [afmc] ++
2,772,659 UART: [afmc] CDI.KEYID = 6
2,773,021 UART: [afmc] SUBJECT.KEYID = 7
2,773,446 UART: [afmc] AUTHORITY.KEYID = 5
2,808,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,548 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,748 UART: [afmc] --
2,851,806 UART: [cold-reset] --
2,852,790 UART: [state] Locking Datavault
2,854,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,641 UART: [state] Locking ICCM
2,855,249 UART: [exit] Launching FMC @ 0x40000130
2,860,578 UART:
2,860,594 UART: Running Caliptra FMC ...
2,861,002 UART:
2,861,056 UART: [state] CFI Enabled
2,871,901 UART: [fht] FMC Alias Private Key: 7
2,979,844 UART: [art] Extend RT PCRs Done
2,980,272 UART: [art] Lock RT PCRs Done
2,981,592 UART: [art] Populate DV Done
2,990,085 UART: [fht] FMC Alias Private Key: 7
2,991,101 UART: [art] Derive CDI
2,991,381 UART: [art] Store in in slot 0x4
3,076,894 UART: [art] Derive Key Pair
3,077,254 UART: [art] Store priv key in slot 0x5
3,090,374 UART: [art] Derive Key Pair - Done
3,105,447 UART: [art] Signing Cert with AUTHO
3,105,927 UART: RITY.KEYID = 7
3,120,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,372 UART: [art] PUB.X = FADF7DBA038C15424BEF91BFECDAD792F72388AD6579B7EB8498FF5A5C21D42F03CA3E14419C500A3942F02481BC1FA9
3,128,151 UART: [art] PUB.Y = 0DD769B9BAD2023B4073BECD0419B28E9FE4A75454A4B851C6F3B78DF6405B3A6B95E6C64D4C334ED0FA495A7D41A1FB
3,135,108 UART: [art] SIG.R = A4247D7A30BA2E1D61FF492B12139FBAFC66BDAAB206526172A931DB4981B0387EF85EAD0731C8F4145B0ACF81B3B677
3,141,881 UART: [art] SIG.S = C2E2F055D7ADCF01899BF0F348086EA84EB89BFA1A756E98F0692CEEE4B9E2DADBA8AEAF1A0186DAFF7C48DB93F015C7
3,165,537 UART: Caliptra RT
3,165,790 UART: [state] CFI Enabled
3,274,524 UART: [rt] RT listening for mailbox commands...
3,275,194 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,346 UART: [rt]cmd =0x44504543, len=40
3,331,935 >>> mbox cmd response data (40 bytes)
3,331,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,907 UART: [rt]cmd =0x44504543, len=96
3,402,536 >>> mbox cmd response data (56 bytes)
3,402,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,384 UART: [rt]cmd =0x44504543, len=96
3,472,512 >>> mbox cmd response data (56 bytes)
3,472,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,594 UART: [rt]cmd =0x44504543, len=96
3,543,144 >>> mbox cmd response data (56 bytes)
3,543,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,350 UART: [rt]cmd =0x44504543, len=96
3,614,372 >>> mbox cmd response data (56 bytes)
3,614,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,290 UART: [rt]cmd =0x44504543, len=96
3,685,780 >>> mbox cmd response data (56 bytes)
3,685,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,812 UART: [rt]cmd =0x44504543, len=96
3,756,894 >>> mbox cmd response data (56 bytes)
3,756,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,816 UART: [rt]cmd =0x44504543, len=96
3,828,284 >>> mbox cmd response data (56 bytes)
3,828,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,348 UART: [rt]cmd =0x44504543, len=96
3,900,336 >>> mbox cmd response data (56 bytes)
3,900,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,320 UART: [rt]cmd =0x44504543, len=96
3,972,586 >>> mbox cmd response data (56 bytes)
3,972,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,528 UART: [rt]cmd =0x44504543, len=96
4,044,870 >>> mbox cmd response data (56 bytes)
4,044,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,878 UART: [rt]cmd =0x44504543, len=96
4,118,300 >>> mbox cmd response data (56 bytes)
4,118,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,264 UART: [rt]cmd =0x44504543, len=96
4,192,218 >>> mbox cmd response data (56 bytes)
4,192,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,946 UART: [rt]cmd =0x44504543, len=96
4,265,744 >>> mbox cmd response data (56 bytes)
4,265,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,295,396 UART: [rt]cmd =0x44504543, len=96
4,338,736 >>> mbox cmd response data (56 bytes)
4,338,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,932 UART: [rt]cmd =0x44504543, len=96
4,412,898 >>> mbox cmd response data (56 bytes)
4,412,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,442,682 UART: [rt]cmd =0x44504543, len=96
4,449,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,001 ready_for_fw is high
1,059,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,076 >>> mbox cmd response: success
2,682,812 UART:
2,682,828 UART: Running Caliptra FMC ...
2,683,236 UART:
2,683,290 UART: [state] CFI Enabled
2,693,901 UART: [fht] FMC Alias Private Key: 7
2,802,382 UART: [art] Extend RT PCRs Done
2,802,810 UART: [art] Lock RT PCRs Done
2,804,456 UART: [art] Populate DV Done
2,812,729 UART: [fht] FMC Alias Private Key: 7
2,813,723 UART: [art] Derive CDI
2,814,003 UART: [art] Store in in slot 0x4
2,899,750 UART: [art] Derive Key Pair
2,900,110 UART: [art] Store priv key in slot 0x5
2,913,546 UART: [art] Derive Key Pair - Done
2,927,980 UART: [art] Signing Cert with AUTHO
2,928,460 UART: RITY.KEYID = 7
2,943,674 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,439 UART: [art] PUB.X = 52ABA3168E9C9F5D11025C7A6F63583DD9AE26F83761A67C5088BA2ACD3A84C5475660473EB1C3289AACE2AA7B95F452
2,951,214 UART: [art] PUB.Y = 53C43DD4528941FD5F0E6F2794C0F433AE3F4F8C8BD5B808C28C3098899A22AF413E32E4973E5B75818D592FC0CDE47A
2,958,164 UART: [art] SIG.R = 978F5C29F3AF3997AD0B56A54BDF0A296204BFBC8C59AE24245F8BF9482C949F8940069FF4E74CC993AA95254046B938
2,964,926 UART: [art] SIG.S = 3A8BC62947BB554D3AB4658160D63ED65697AA0E5198FA351EE7BFD9E2BA77B19E1C66501828AA7C796D914C76D44A2E
2,989,642 UART: Caliptra RT
2,989,895 UART: [state] CFI Enabled
3,097,138 UART: [rt] RT listening for mailbox commands...
3,097,808 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,934 UART: [rt]cmd =0x44504543, len=40
3,154,307 >>> mbox cmd response data (40 bytes)
3,154,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,263 UART: [rt]cmd =0x44504543, len=96
3,224,488 >>> mbox cmd response data (56 bytes)
3,224,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,292 UART: [rt]cmd =0x44504543, len=96
3,294,764 >>> mbox cmd response data (56 bytes)
3,294,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,674 UART: [rt]cmd =0x44504543, len=96
3,365,676 >>> mbox cmd response data (56 bytes)
3,365,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,702 UART: [rt]cmd =0x44504543, len=96
3,436,666 >>> mbox cmd response data (56 bytes)
3,436,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,618 UART: [rt]cmd =0x44504543, len=96
3,507,048 >>> mbox cmd response data (56 bytes)
3,507,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,124 UART: [rt]cmd =0x44504543, len=96
3,578,702 >>> mbox cmd response data (56 bytes)
3,578,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,840 UART: [rt]cmd =0x44504543, len=96
3,650,680 >>> mbox cmd response data (56 bytes)
3,650,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,684 UART: [rt]cmd =0x44504543, len=96
3,722,350 >>> mbox cmd response data (56 bytes)
3,722,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,352 UART: [rt]cmd =0x44504543, len=96
3,794,234 >>> mbox cmd response data (56 bytes)
3,794,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,026 UART: [rt]cmd =0x44504543, len=96
3,867,296 >>> mbox cmd response data (56 bytes)
3,867,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,897,224 UART: [rt]cmd =0x44504543, len=96
3,940,866 >>> mbox cmd response data (56 bytes)
3,940,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,726 UART: [rt]cmd =0x44504543, len=96
4,014,222 >>> mbox cmd response data (56 bytes)
4,014,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,322 UART: [rt]cmd =0x44504543, len=96
4,088,574 >>> mbox cmd response data (56 bytes)
4,088,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,692 UART: [rt]cmd =0x44504543, len=96
4,162,862 >>> mbox cmd response data (56 bytes)
4,162,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,802 UART: [rt]cmd =0x44504543, len=96
4,237,374 >>> mbox cmd response data (56 bytes)
4,237,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,356 UART: [rt]cmd =0x44504543, len=96
4,274,927 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,529 UART: [kat] SHA2-512-ACC
908,430 UART: [kat] ECC-384
918,223 UART: [kat] HMAC-384Kdf
922,947 UART: [kat] LMS
1,171,275 UART: [kat] --
1,172,206 UART: [cold-reset] ++
1,172,708 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 ready_for_fw is high
1,176,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,340 UART: [idev] Sha1 KeyId Algorithm
1,209,756 UART: [idev] --
1,210,950 UART: [ldev] ++
1,211,118 UART: [ldev] CDI.KEYID = 6
1,211,481 UART: [ldev] SUBJECT.KEYID = 5
1,211,907 UART: [ldev] AUTHORITY.KEYID = 7
1,212,370 UART: [ldev] FE.KEYID = 1
1,217,588 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,148 UART: [ldev] --
1,283,547 UART: [fwproc] Wait for Commands...
1,284,259 UART: [fwproc] Recv command 0x46574c44
1,284,987 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,126 >>> mbox cmd response: success
2,773,368 UART: [afmc] ++
2,773,536 UART: [afmc] CDI.KEYID = 6
2,773,898 UART: [afmc] SUBJECT.KEYID = 7
2,774,323 UART: [afmc] AUTHORITY.KEYID = 5
2,809,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,429 UART: [afmc] --
2,853,513 UART: [cold-reset] --
2,854,431 UART: [state] Locking Datavault
2,855,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,924 UART: [state] Locking ICCM
2,856,428 UART: [exit] Launching FMC @ 0x40000130
2,861,757 UART:
2,861,773 UART: Running Caliptra FMC ...
2,862,181 UART:
2,862,324 UART: [state] CFI Enabled
2,872,883 UART: [fht] FMC Alias Private Key: 7
2,980,186 UART: [art] Extend RT PCRs Done
2,980,614 UART: [art] Lock RT PCRs Done
2,981,990 UART: [art] Populate DV Done
2,990,223 UART: [fht] FMC Alias Private Key: 7
2,991,321 UART: [art] Derive CDI
2,991,601 UART: [art] Store in in slot 0x4
3,076,920 UART: [art] Derive Key Pair
3,077,280 UART: [art] Store priv key in slot 0x5
3,090,572 UART: [art] Derive Key Pair - Done
3,105,094 UART: [art] Signing Cert with AUTHO
3,105,574 UART: RITY.KEYID = 7
3,120,772 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,537 UART: [art] PUB.X = 4606778CFD33CD3BE9EB46D7BEFC62D1EEA895CC605BF6F85CFFBE678D9DE6FF070450502002B03FD9CCADF8D369D0C7
3,128,321 UART: [art] PUB.Y = 65D73C3D3300CBD3B8323AA39FCD5A3648B1E7C0577E98952B2E62F3428B7DB88DD3AE9D8590BC7FB19AFE871754BEA4
3,135,263 UART: [art] SIG.R = 563E43ACDE03277B105CE60D62B0848D2511D959B51C30BFAF699D720F49739BA55B26D5A9CAA6FD9CEB56942FB9D065
3,142,034 UART: [art] SIG.S = F9EDC5AAD7E504E57C164FFB29DB1C56C4815457F7ACE3412BB86C09D241BE223F3F17867ADCB9DAC13948115BFA2AD6
3,165,547 UART: Caliptra RT
3,165,892 UART: [state] CFI Enabled
3,274,035 UART: [rt] RT listening for mailbox commands...
3,274,705 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,847 UART: [rt]cmd =0x44504543, len=40
3,331,078 >>> mbox cmd response data (40 bytes)
3,331,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,916 UART: [rt]cmd =0x44504543, len=96
3,401,239 >>> mbox cmd response data (56 bytes)
3,401,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,159 UART: [rt]cmd =0x44504543, len=96
3,471,693 >>> mbox cmd response data (56 bytes)
3,471,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,443 UART: [rt]cmd =0x44504543, len=96
3,542,341 >>> mbox cmd response data (56 bytes)
3,542,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,153 UART: [rt]cmd =0x44504543, len=96
3,613,559 >>> mbox cmd response data (56 bytes)
3,613,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,387 UART: [rt]cmd =0x44504543, len=96
3,685,069 >>> mbox cmd response data (56 bytes)
3,685,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,071 UART: [rt]cmd =0x44504543, len=96
3,756,795 >>> mbox cmd response data (56 bytes)
3,756,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,865 UART: [rt]cmd =0x44504543, len=96
3,829,145 >>> mbox cmd response data (56 bytes)
3,829,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,131 UART: [rt]cmd =0x44504543, len=96
3,901,301 >>> mbox cmd response data (56 bytes)
3,901,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,019 UART: [rt]cmd =0x44504543, len=96
3,973,699 >>> mbox cmd response data (56 bytes)
3,973,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,507 UART: [rt]cmd =0x44504543, len=96
4,046,437 >>> mbox cmd response data (56 bytes)
4,046,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,435 UART: [rt]cmd =0x44504543, len=96
4,118,687 >>> mbox cmd response data (56 bytes)
4,118,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,577 UART: [rt]cmd =0x44504543, len=96
4,191,595 >>> mbox cmd response data (56 bytes)
4,191,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,863 UART: [rt]cmd =0x44504543, len=96
4,266,235 >>> mbox cmd response data (56 bytes)
4,266,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,131 UART: [rt]cmd =0x44504543, len=96
4,340,221 >>> mbox cmd response data (56 bytes)
4,340,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,091 UART: [rt]cmd =0x44504543, len=96
4,414,359 >>> mbox cmd response data (56 bytes)
4,414,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,444,337 UART: [rt]cmd =0x44504543, len=96
4,451,278 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,008 ready_for_fw is high
1,060,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,077 >>> mbox cmd response: success
2,684,583 UART:
2,684,599 UART: Running Caliptra FMC ...
2,685,007 UART:
2,685,150 UART: [state] CFI Enabled
2,695,527 UART: [fht] FMC Alias Private Key: 7
2,803,512 UART: [art] Extend RT PCRs Done
2,803,940 UART: [art] Lock RT PCRs Done
2,805,582 UART: [art] Populate DV Done
2,813,951 UART: [fht] FMC Alias Private Key: 7
2,814,955 UART: [art] Derive CDI
2,815,235 UART: [art] Store in in slot 0x4
2,901,010 UART: [art] Derive Key Pair
2,901,370 UART: [art] Store priv key in slot 0x5
2,915,306 UART: [art] Derive Key Pair - Done
2,930,251 UART: [art] Signing Cert with AUTHO
2,930,731 UART: RITY.KEYID = 7
2,945,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,688 UART: [art] PUB.X = F2498D23244724FB278720A300A3E06445BE3DA9A6DD34B51DE2CCB2C028B1B3B386B262FC4C67FC6B2BAEEED87EAC0F
2,953,453 UART: [art] PUB.Y = E453EF64E3EE702CC1B96DF41771A744EDB5F02FF8ED83C108577821C5683838E3CA266DFB8FFE439F7CBFE2B626F466
2,960,414 UART: [art] SIG.R = 03D152A77E9498B745D39FF556F50B3776F11C36ED278432B0AEF2B17BD3578AF48D451151EE93880C42B410C4AF69CE
2,967,177 UART: [art] SIG.S = 2CF24E20466F961B47E38ED9D1614C9FB793397FEE41FA21AB02286EB7D16149C46E4E8BFAD24E10BC09D1A5AF60999F
2,990,880 UART: Caliptra RT
2,991,225 UART: [state] CFI Enabled
3,099,274 UART: [rt] RT listening for mailbox commands...
3,099,944 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,214 UART: [rt]cmd =0x44504543, len=40
3,155,955 >>> mbox cmd response data (40 bytes)
3,155,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,859 UART: [rt]cmd =0x44504543, len=96
3,226,368 >>> mbox cmd response data (56 bytes)
3,226,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,116 UART: [rt]cmd =0x44504543, len=96
3,296,600 >>> mbox cmd response data (56 bytes)
3,296,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,518 UART: [rt]cmd =0x44504543, len=96
3,367,718 >>> mbox cmd response data (56 bytes)
3,367,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,512 UART: [rt]cmd =0x44504543, len=96
3,438,302 >>> mbox cmd response data (56 bytes)
3,438,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,074 UART: [rt]cmd =0x44504543, len=96
3,510,088 >>> mbox cmd response data (56 bytes)
3,510,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,826 UART: [rt]cmd =0x44504543, len=96
3,581,510 >>> mbox cmd response data (56 bytes)
3,581,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,394 UART: [rt]cmd =0x44504543, len=96
3,654,118 >>> mbox cmd response data (56 bytes)
3,654,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,142 UART: [rt]cmd =0x44504543, len=96
3,726,362 >>> mbox cmd response data (56 bytes)
3,726,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,372 UART: [rt]cmd =0x44504543, len=96
3,799,138 >>> mbox cmd response data (56 bytes)
3,799,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,796 UART: [rt]cmd =0x44504543, len=96
3,871,420 >>> mbox cmd response data (56 bytes)
3,871,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,901,186 UART: [rt]cmd =0x44504543, len=96
3,944,156 >>> mbox cmd response data (56 bytes)
3,944,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,116 UART: [rt]cmd =0x44504543, len=96
4,016,816 >>> mbox cmd response data (56 bytes)
4,016,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,840 UART: [rt]cmd =0x44504543, len=96
4,090,592 >>> mbox cmd response data (56 bytes)
4,090,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,580 UART: [rt]cmd =0x44504543, len=96
4,164,864 >>> mbox cmd response data (56 bytes)
4,164,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,676 UART: [rt]cmd =0x44504543, len=96
4,239,358 >>> mbox cmd response data (56 bytes)
4,239,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,374 UART: [rt]cmd =0x44504543, len=96
4,276,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 ready_for_fw is high
1,174,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,886 UART: [fwproc] Wait for Commands...
1,281,525 UART: [fwproc] Recv command 0x46574c44
1,282,258 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,395 >>> mbox cmd response: success
2,770,654 UART: [afmc] ++
2,770,822 UART: [afmc] CDI.KEYID = 6
2,771,185 UART: [afmc] SUBJECT.KEYID = 7
2,771,611 UART: [afmc] AUTHORITY.KEYID = 5
2,807,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,647 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,366 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,295 UART: [afmc] --
2,850,321 UART: [cold-reset] --
2,851,275 UART: [state] Locking Datavault
2,852,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,796 UART: [state] Locking ICCM
2,853,436 UART: [exit] Launching FMC @ 0x40000130
2,858,765 UART:
2,858,781 UART: Running Caliptra FMC ...
2,859,189 UART:
2,859,243 UART: [state] CFI Enabled
2,869,814 UART: [fht] FMC Alias Private Key: 7
2,977,509 UART: [art] Extend RT PCRs Done
2,977,937 UART: [art] Lock RT PCRs Done
2,979,615 UART: [art] Populate DV Done
2,988,022 UART: [fht] FMC Alias Private Key: 7
2,989,078 UART: [art] Derive CDI
2,989,358 UART: [art] Store in in slot 0x4
3,074,747 UART: [art] Derive Key Pair
3,075,107 UART: [art] Store priv key in slot 0x5
3,088,181 UART: [art] Derive Key Pair - Done
3,103,163 UART: [art] Signing Cert with AUTHO
3,103,643 UART: RITY.KEYID = 7
3,118,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,322 UART: [art] PUB.X = E06BD388738AA3F04E416AA72D52057525182FEEB6F085403E34B982233CCA3C60DEB814E44BB171589E33486743D8D7
3,126,087 UART: [art] PUB.Y = 75FD1CC390B11581C3872651327B0AB0F65D613A6AF159BDB8F8FC697091B39494B4C91C81F3C05B1A726754205D0DD7
3,133,031 UART: [art] SIG.R = 643B52A6547354D0F656E5FBB22168567A0BE2A8993CC6032789FEADCF05321EE307C59B0D4AE39346A6B81B6231600D
3,139,783 UART: [art] SIG.S = 1BE252BD936C081704657C64D20D74A664B36B7EFECAB520D5A89909BF9E676B9B78F80776D9E8085F75AF36E9446349
3,163,068 UART: Caliptra RT
3,163,321 UART: [state] CFI Enabled
3,270,722 UART: [rt] RT listening for mailbox commands...
3,271,392 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,296 UART: [rt]cmd =0x44504543, len=40
3,327,011 >>> mbox cmd response data (40 bytes)
3,327,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,049 UART: [rt]cmd =0x44504543, len=96
3,396,764 >>> mbox cmd response data (56 bytes)
3,396,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,426,726 UART: [rt]cmd =0x44504543, len=96
3,466,666 >>> mbox cmd response data (56 bytes)
3,466,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,608 UART: [rt]cmd =0x44504543, len=96
3,537,560 >>> mbox cmd response data (56 bytes)
3,537,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,722 UART: [rt]cmd =0x44504543, len=96
3,609,034 >>> mbox cmd response data (56 bytes)
3,609,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,028 UART: [rt]cmd =0x44504543, len=96
3,681,142 >>> mbox cmd response data (56 bytes)
3,681,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,244 UART: [rt]cmd =0x44504543, len=96
3,754,022 >>> mbox cmd response data (56 bytes)
3,754,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,966 UART: [rt]cmd =0x44504543, len=96
3,825,932 >>> mbox cmd response data (56 bytes)
3,825,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,002 UART: [rt]cmd =0x44504543, len=96
3,898,026 >>> mbox cmd response data (56 bytes)
3,898,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,974 UART: [rt]cmd =0x44504543, len=96
3,970,714 >>> mbox cmd response data (56 bytes)
3,970,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,866 UART: [rt]cmd =0x44504543, len=96
4,044,244 >>> mbox cmd response data (56 bytes)
4,044,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,074,144 UART: [rt]cmd =0x44504543, len=96
4,117,068 >>> mbox cmd response data (56 bytes)
4,117,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,108 UART: [rt]cmd =0x44504543, len=96
4,190,508 >>> mbox cmd response data (56 bytes)
4,190,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,220,366 UART: [rt]cmd =0x44504543, len=96
4,264,122 >>> mbox cmd response data (56 bytes)
4,264,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,294,076 UART: [rt]cmd =0x44504543, len=96
4,337,982 >>> mbox cmd response data (56 bytes)
4,337,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,050 UART: [rt]cmd =0x44504543, len=96
4,412,518 >>> mbox cmd response data (56 bytes)
4,412,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,442,374 UART: [rt]cmd =0x44504543, len=96
4,449,463 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,730 ready_for_fw is high
1,055,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,053 >>> mbox cmd response: success
2,680,009 UART:
2,680,025 UART: Running Caliptra FMC ...
2,680,433 UART:
2,680,487 UART: [state] CFI Enabled
2,691,106 UART: [fht] FMC Alias Private Key: 7
2,799,169 UART: [art] Extend RT PCRs Done
2,799,597 UART: [art] Lock RT PCRs Done
2,801,137 UART: [art] Populate DV Done
2,809,548 UART: [fht] FMC Alias Private Key: 7
2,810,510 UART: [art] Derive CDI
2,810,790 UART: [art] Store in in slot 0x4
2,896,209 UART: [art] Derive Key Pair
2,896,569 UART: [art] Store priv key in slot 0x5
2,909,765 UART: [art] Derive Key Pair - Done
2,924,343 UART: [art] Signing Cert with AUTHO
2,924,823 UART: RITY.KEYID = 7
2,939,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,688 UART: [art] PUB.X = 969604708D8B510DB21C8CEA9CE4C5526E8393229A6461FBF7FFF4B89B3A47DD221181E11FFD1AC48CFB77CE596FDEBE
2,947,470 UART: [art] PUB.Y = 31A28055164CA24E573A7169A20E819C340FD24AD2FBC8C70DD7AD0961C77347439616DE7206AA5F992BF300ACB896CE
2,954,387 UART: [art] SIG.R = 8B202232D2DCAC1B16A9F0F74D6A3CA75702FA2C755E53B6F5485B2BAAE6B09C5CCCC82F2A6DA6B12D84E83EE581CD30
2,961,176 UART: [art] SIG.S = 80CE7A8393CACBD82C80523E56864551A81C43C645B2BCF9E53303F2C452354999FCC4EE4B3C9132532A95CEBA84F255
2,984,808 UART: Caliptra RT
2,985,061 UART: [state] CFI Enabled
3,091,619 UART: [rt] RT listening for mailbox commands...
3,092,289 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,181 UART: [rt]cmd =0x44504543, len=40
3,148,172 >>> mbox cmd response data (40 bytes)
3,148,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,042 UART: [rt]cmd =0x44504543, len=96
3,218,309 >>> mbox cmd response data (56 bytes)
3,218,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,248,125 UART: [rt]cmd =0x44504543, len=96
3,288,215 >>> mbox cmd response data (56 bytes)
3,288,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,213 UART: [rt]cmd =0x44504543, len=96
3,358,025 >>> mbox cmd response data (56 bytes)
3,358,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,675 UART: [rt]cmd =0x44504543, len=96
3,428,775 >>> mbox cmd response data (56 bytes)
3,428,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,751 UART: [rt]cmd =0x44504543, len=96
3,499,875 >>> mbox cmd response data (56 bytes)
3,499,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,951 UART: [rt]cmd =0x44504543, len=96
3,571,717 >>> mbox cmd response data (56 bytes)
3,571,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,601,785 UART: [rt]cmd =0x44504543, len=96
3,643,875 >>> mbox cmd response data (56 bytes)
3,643,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,753 UART: [rt]cmd =0x44504543, len=96
3,715,653 >>> mbox cmd response data (56 bytes)
3,715,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,509 UART: [rt]cmd =0x44504543, len=96
3,788,875 >>> mbox cmd response data (56 bytes)
3,788,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,809 UART: [rt]cmd =0x44504543, len=96
3,862,097 >>> mbox cmd response data (56 bytes)
3,862,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,143 UART: [rt]cmd =0x44504543, len=96
3,936,265 >>> mbox cmd response data (56 bytes)
3,936,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,283 UART: [rt]cmd =0x44504543, len=96
4,009,841 >>> mbox cmd response data (56 bytes)
4,009,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,879 UART: [rt]cmd =0x44504543, len=96
4,082,975 >>> mbox cmd response data (56 bytes)
4,082,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,747 UART: [rt]cmd =0x44504543, len=96
4,156,791 >>> mbox cmd response data (56 bytes)
4,156,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,186,703 UART: [rt]cmd =0x44504543, len=96
4,231,207 >>> mbox cmd response data (56 bytes)
4,231,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,261,175 UART: [rt]cmd =0x44504543, len=96
4,267,876 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,962 UART: [kat] SHA2-256
901,902 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,030 UART: [idev] Erasing UDS.KEYID = 0
1,199,004 UART: [idev] Sha1 KeyId Algorithm
1,207,956 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,189 UART: [ldev] --
1,281,547 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,212 >>> mbox cmd response: success
2,771,475 UART: [afmc] ++
2,771,643 UART: [afmc] CDI.KEYID = 6
2,772,006 UART: [afmc] SUBJECT.KEYID = 7
2,772,432 UART: [afmc] AUTHORITY.KEYID = 5
2,808,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,996 UART: [afmc] --
2,852,120 UART: [cold-reset] --
2,852,968 UART: [state] Locking Datavault
2,854,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,753 UART: [state] Locking ICCM
2,855,209 UART: [exit] Launching FMC @ 0x40000130
2,860,538 UART:
2,860,554 UART: Running Caliptra FMC ...
2,860,962 UART:
2,861,105 UART: [state] CFI Enabled
2,871,772 UART: [fht] FMC Alias Private Key: 7
2,980,011 UART: [art] Extend RT PCRs Done
2,980,439 UART: [art] Lock RT PCRs Done
2,981,581 UART: [art] Populate DV Done
2,989,838 UART: [fht] FMC Alias Private Key: 7
2,990,974 UART: [art] Derive CDI
2,991,254 UART: [art] Store in in slot 0x4
3,077,119 UART: [art] Derive Key Pair
3,077,479 UART: [art] Store priv key in slot 0x5
3,090,719 UART: [art] Derive Key Pair - Done
3,105,782 UART: [art] Signing Cert with AUTHO
3,106,262 UART: RITY.KEYID = 7
3,121,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,499 UART: [art] PUB.X = 23BC8AA0488209DC354BFB8446DA9BD8C8497E57FB5EAE9D365067DC27C4E7A9CEAE37445864CF28E5A50A485FE16B7C
3,129,279 UART: [art] PUB.Y = 48DA6ACB409DFB54C0261860B4657E16ADFD8ED2481FB33B3932CDDE36A55F0C2EBBB49AE45A850F933C2E4E18F7EFB8
3,136,245 UART: [art] SIG.R = 3A3CDEDF92C22611DEC954FC7A2E991AA6CE470628B322EBB6FEFB8CBEC529D89E24BB01540D82E6B6D826ADCE35E797
3,143,030 UART: [art] SIG.S = F3F298B2D1EB9357B388DDE2ADC2A633FFAE71A8767429DC2EF16FA984F90526CC72882B4C3DF0E38A5AD6DA483C85F9
3,167,088 UART: Caliptra RT
3,167,433 UART: [state] CFI Enabled
3,276,252 UART: [rt] RT listening for mailbox commands...
3,276,922 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,268 UART: [rt]cmd =0x44504543, len=40
3,333,707 >>> mbox cmd response data (40 bytes)
3,333,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,915 UART: [rt]cmd =0x44504543, len=96
3,404,240 >>> mbox cmd response data (56 bytes)
3,404,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,264 UART: [rt]cmd =0x44504543, len=96
3,475,276 >>> mbox cmd response data (56 bytes)
3,475,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,076 UART: [rt]cmd =0x44504543, len=96
3,546,094 >>> mbox cmd response data (56 bytes)
3,546,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,080 UART: [rt]cmd =0x44504543, len=96
3,617,238 >>> mbox cmd response data (56 bytes)
3,617,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,138 UART: [rt]cmd =0x44504543, len=96
3,688,468 >>> mbox cmd response data (56 bytes)
3,688,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,510 UART: [rt]cmd =0x44504543, len=96
3,760,854 >>> mbox cmd response data (56 bytes)
3,760,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,640 UART: [rt]cmd =0x44504543, len=96
3,832,972 >>> mbox cmd response data (56 bytes)
3,832,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,868 UART: [rt]cmd =0x44504543, len=96
3,905,912 >>> mbox cmd response data (56 bytes)
3,905,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,026 UART: [rt]cmd =0x44504543, len=96
3,978,734 >>> mbox cmd response data (56 bytes)
3,978,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,008,546 UART: [rt]cmd =0x44504543, len=96
4,051,368 >>> mbox cmd response data (56 bytes)
4,051,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,081,284 UART: [rt]cmd =0x44504543, len=96
4,124,604 >>> mbox cmd response data (56 bytes)
4,124,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,154,506 UART: [rt]cmd =0x44504543, len=96
4,197,450 >>> mbox cmd response data (56 bytes)
4,197,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,227,328 UART: [rt]cmd =0x44504543, len=96
4,270,644 >>> mbox cmd response data (56 bytes)
4,270,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,300,512 UART: [rt]cmd =0x44504543, len=96
4,344,344 >>> mbox cmd response data (56 bytes)
4,344,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,184 UART: [rt]cmd =0x44504543, len=96
4,419,326 >>> mbox cmd response data (56 bytes)
4,419,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,136 UART: [rt]cmd =0x44504543, len=96
4,456,401 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,495 ready_for_fw is high
1,056,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,944 >>> mbox cmd response: success
2,680,660 UART:
2,680,676 UART: Running Caliptra FMC ...
2,681,084 UART:
2,681,227 UART: [state] CFI Enabled
2,691,852 UART: [fht] FMC Alias Private Key: 7
2,799,349 UART: [art] Extend RT PCRs Done
2,799,777 UART: [art] Lock RT PCRs Done
2,801,417 UART: [art] Populate DV Done
2,809,466 UART: [fht] FMC Alias Private Key: 7
2,810,466 UART: [art] Derive CDI
2,810,746 UART: [art] Store in in slot 0x4
2,896,285 UART: [art] Derive Key Pair
2,896,645 UART: [art] Store priv key in slot 0x5
2,909,705 UART: [art] Derive Key Pair - Done
2,924,271 UART: [art] Signing Cert with AUTHO
2,924,751 UART: RITY.KEYID = 7
2,940,125 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,890 UART: [art] PUB.X = 1A0C5BAF46DFC2B303EF2BB905D326A745D7BD7D93C512AD8737792C432D8EA39C5719C46D6BBA7FD3FD368419B14DD2
2,947,667 UART: [art] PUB.Y = 6315EAC1C3D4FEFEBEB63E7D501AB788DA53F32D02CD85A7964DE59628F3483A2E729D1EE1FF900130A410FB8CE21DFE
2,954,631 UART: [art] SIG.R = 22EF212D4E9100FDC935445815C710E4101F9EB3EA0B2A78A52560C1BE28E25A2C6F662D5889241CA555089B3161B874
2,961,369 UART: [art] SIG.S = A37F81F6AB5B344295A6E0994C4201008A3F0F315E52A7CEBD22E80EFDE4F636E9670BCCF7931E14C3027AAA51749953
2,985,055 UART: Caliptra RT
2,985,400 UART: [state] CFI Enabled
3,092,925 UART: [rt] RT listening for mailbox commands...
3,093,595 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,545 UART: [rt]cmd =0x44504543, len=40
3,149,860 >>> mbox cmd response data (40 bytes)
3,149,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,988 UART: [rt]cmd =0x44504543, len=96
3,220,189 >>> mbox cmd response data (56 bytes)
3,220,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,250,151 UART: [rt]cmd =0x44504543, len=96
3,290,653 >>> mbox cmd response data (56 bytes)
3,290,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,843 UART: [rt]cmd =0x44504543, len=96
3,362,093 >>> mbox cmd response data (56 bytes)
3,362,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,195 UART: [rt]cmd =0x44504543, len=96
3,433,527 >>> mbox cmd response data (56 bytes)
3,433,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,269 UART: [rt]cmd =0x44504543, len=96
3,504,469 >>> mbox cmd response data (56 bytes)
3,504,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,385 UART: [rt]cmd =0x44504543, len=96
3,576,173 >>> mbox cmd response data (56 bytes)
3,576,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,197 UART: [rt]cmd =0x44504543, len=96
3,648,217 >>> mbox cmd response data (56 bytes)
3,648,218 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,101 UART: [rt]cmd =0x44504543, len=96
3,720,351 >>> mbox cmd response data (56 bytes)
3,720,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,465 UART: [rt]cmd =0x44504543, len=96
3,792,711 >>> mbox cmd response data (56 bytes)
3,792,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,609 UART: [rt]cmd =0x44504543, len=96
3,865,415 >>> mbox cmd response data (56 bytes)
3,865,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,895,391 UART: [rt]cmd =0x44504543, len=96
3,938,601 >>> mbox cmd response data (56 bytes)
3,938,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,649 UART: [rt]cmd =0x44504543, len=96
4,012,281 >>> mbox cmd response data (56 bytes)
4,012,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,161 UART: [rt]cmd =0x44504543, len=96
4,085,457 >>> mbox cmd response data (56 bytes)
4,085,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,433 UART: [rt]cmd =0x44504543, len=96
4,159,479 >>> mbox cmd response data (56 bytes)
4,159,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,189,397 UART: [rt]cmd =0x44504543, len=96
4,232,841 >>> mbox cmd response data (56 bytes)
4,232,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,262,669 UART: [rt]cmd =0x44504543, len=96
4,269,782 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,178 UART:
192,551 UART: Running Caliptra ROM ...
193,737 UART:
193,897 UART: [state] CFI Enabled
262,376 UART: [state] LifecycleState = Unprovisioned
264,358 UART: [state] DebugLocked = No
267,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,746 UART: [kat] SHA2-256
442,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,975 UART: [kat] ++
453,486 UART: [kat] sha1
464,080 UART: [kat] SHA2-256
466,810 UART: [kat] SHA2-384
472,158 UART: [kat] SHA2-512-ACC
474,526 UART: [kat] ECC-384
2,766,968 UART: [kat] HMAC-384Kdf
2,778,497 UART: [kat] LMS
3,968,785 UART: [kat] --
3,973,724 UART: [cold-reset] ++
3,975,376 UART: [fht] Storing FHT @ 0x50003400
3,985,795 UART: [idev] ++
3,986,365 UART: [idev] CDI.KEYID = 6
3,987,395 UART: [idev] SUBJECT.KEYID = 7
3,988,569 UART: [idev] UDS.KEYID = 0
3,989,604 ready_for_fw is high
3,989,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,132,906 UART: [idev] Erasing UDS.KEYID = 0
7,325,674 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,561 UART: [idev] --
7,351,177 UART: [ldev] ++
7,351,749 UART: [ldev] CDI.KEYID = 6
7,352,723 UART: [ldev] SUBJECT.KEYID = 5
7,353,882 UART: [ldev] AUTHORITY.KEYID = 7
7,355,168 UART: [ldev] FE.KEYID = 1
7,401,470 UART: [ldev] Erasing FE.KEYID = 1
10,733,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,153 UART: [ldev] --
13,095,204 UART: [fwproc] Waiting for Commands...
13,097,645 UART: [fwproc] Received command 0x46574c44
13,099,841 UART: [fwproc] Received Image of size 113760 bytes
17,158,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,883 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,622,316 >>> mbox cmd response: success
17,625,907 UART: [afmc] ++
17,626,499 UART: [afmc] CDI.KEYID = 6
17,627,408 UART: [afmc] SUBJECT.KEYID = 7
17,628,673 UART: [afmc] AUTHORITY.KEYID = 5
20,988,114 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,839 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,269 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,564 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,354 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,813 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,014 UART: [afmc] --
23,358,752 UART: [cold-reset] --
23,363,313 UART: [state] Locking Datavault
23,368,829 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,557 UART: [state] Locking ICCM
23,371,798 UART: [exit] Launching FMC @ 0x40000130
23,380,195 UART:
23,380,431 UART: Running Caliptra FMC ...
23,381,533 UART:
23,381,695 UART: [state] CFI Enabled
23,446,112 UART: [fht] FMC Alias Private Key: 7
25,784,637 UART: [art] Extend RT PCRs Done
25,785,861 UART: [art] Lock RT PCRs Done
25,787,592 UART: [art] Populate DV Done
25,793,165 UART: [fht] FMC Alias Private Key: 7
25,794,646 UART: [art] Derive CDI
25,795,426 UART: [art] Store in in slot 0x4
25,853,865 UART: [art] Derive Key Pair
25,854,903 UART: [art] Store priv key in slot 0x5
29,148,091 UART: [art] Derive Key Pair - Done
29,160,873 UART: [art] Signing Cert with AUTHO
29,162,176 UART: RITY.KEYID = 7
31,448,544 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,182 UART: [art] PUB.X = 46252410E2BDBCCD4C6CD3412A165387E87EF8506818FD84A2EC41C3C6006C6F33F7F493658C6186C943605F8EF62608
31,457,316 UART: [art] PUB.Y = 897D0AC8A1B0A3CD4F02793041DD13C487B3A65D723E11CFF5F0C8255CEAD3BC04081C4F106B58D22FD46F2712DC012D
31,464,599 UART: [art] SIG.R = 051E7466453C65603F3DBCFA31709E2443AD703E495324E7E59FE6FFF45D5E04F99E5FF2D65FFF2E72960A9504FB707F
31,471,939 UART: [art] SIG.S = EA43A210D6AB75CA4A9781A112F5C28E45380CE1E974A4265980EC21792DB8856218D9C7B7629F91A16813D2DD38B1A6
32,777,127 UART: Caliptra RT
32,777,825 UART: [state] CFI Enabled
32,937,615 UART: [rt] RT listening for mailbox commands...
32,939,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,970,186 UART: [rt]cmd =0x44504543, len=24
33,011,556 >>> mbox cmd response data (40 bytes)
33,012,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,042,294 UART: [rt]cmd =0x44504543, len=24
33,075,479 >>> mbox cmd response data (40 bytes)
33,076,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,105,949 UART: [rt]cmd =0x44504543, len=24
33,139,766 >>> mbox cmd response data (40 bytes)
33,140,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,170,215 UART: [rt]cmd =0x44504543, len=24
33,203,858 >>> mbox cmd response data (40 bytes)
33,204,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,234,441 UART: [rt]cmd =0x44504543, len=24
33,267,849 >>> mbox cmd response data (40 bytes)
33,268,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,298,331 UART: [rt]cmd =0x44504543, len=24
33,331,839 >>> mbox cmd response data (40 bytes)
33,332,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,362,284 UART: [rt]cmd =0x44504543, len=24
33,395,828 >>> mbox cmd response data (40 bytes)
33,396,481 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,426,323 UART: [rt]cmd =0x44504543, len=24
33,460,188 >>> mbox cmd response data (40 bytes)
33,460,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,490,852 UART: [rt]cmd =0x44504543, len=24
33,524,007 >>> mbox cmd response data (40 bytes)
33,524,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,554,491 UART: [rt]cmd =0x44504543, len=24
33,588,105 >>> mbox cmd response data (40 bytes)
33,588,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,618,574 UART: [rt]cmd =0x44504543, len=24
33,652,253 >>> mbox cmd response data (40 bytes)
33,652,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,682,686 UART: [rt]cmd =0x44504543, len=24
33,716,226 >>> mbox cmd response data (40 bytes)
33,716,869 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,746,605 UART: [rt]cmd =0x44504543, len=24
33,780,311 >>> mbox cmd response data (40 bytes)
33,780,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,810,912 UART: [rt]cmd =0x44504543, len=24
33,844,340 >>> mbox cmd response data (40 bytes)
33,844,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,874,748 UART: [rt]cmd =0x44504543, len=24
33,908,370 >>> mbox cmd response data (40 bytes)
33,908,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,938,952 UART: [rt]cmd =0x44504543, len=24
33,945,490 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,806,940 ready_for_fw is high
3,807,316 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,792 >>> mbox cmd response: success
23,567,508 UART:
23,567,895 UART: Running Caliptra FMC ...
23,569,002 UART:
23,569,159 UART: [state] CFI Enabled
23,636,105 UART: [fht] FMC Alias Private Key: 7
25,974,786 UART: [art] Extend RT PCRs Done
25,976,016 UART: [art] Lock RT PCRs Done
25,977,486 UART: [art] Populate DV Done
25,982,846 UART: [fht] FMC Alias Private Key: 7
25,984,328 UART: [art] Derive CDI
25,985,096 UART: [art] Store in in slot 0x4
26,044,913 UART: [art] Derive Key Pair
26,045,919 UART: [art] Store priv key in slot 0x5
29,339,556 UART: [art] Derive Key Pair - Done
29,352,767 UART: [art] Signing Cert with AUTHO
29,354,069 UART: RITY.KEYID = 7
31,641,396 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,904 UART: [art] PUB.X = 39ABC6869B4967219DA683E676C8D63AA58E41156A44CE9F48F9D1F32F5ED10FD66B7672331C479657EEFE9339D67DFC
31,650,161 UART: [art] PUB.Y = 8328265B7333212BEE5248E2373C8A3C2F7AAFAACD13FCDF0F883BCBC2647E43BCD09549730736E5C6FD0EB2F5392186
31,657,383 UART: [art] SIG.R = A7A667D8E86E3BB2F1C9C6F9DFCE90127EE421A3B9865E3B4F81235309BC3DA86FCE96F72721DAB8D8107108E1489F9A
31,664,799 UART: [art] SIG.S = 954ABF05B7B357646BD94433E664D609E33807DA37928C21AF58CCF4A8A4BDDB4BCEDB8B7A8A70544DCA5F4981FE5266
32,969,654 UART: Caliptra RT
32,970,365 UART: [state] CFI Enabled
33,131,861 UART: [rt] RT listening for mailbox commands...
33,133,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,164,512 UART: [rt]cmd =0x44504543, len=24
33,206,056 >>> mbox cmd response data (40 bytes)
33,206,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,236,867 UART: [rt]cmd =0x44504543, len=24
33,270,205 >>> mbox cmd response data (40 bytes)
33,270,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,300,952 UART: [rt]cmd =0x44504543, len=24
33,334,336 >>> mbox cmd response data (40 bytes)
33,334,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,364,839 UART: [rt]cmd =0x44504543, len=24
33,397,969 >>> mbox cmd response data (40 bytes)
33,398,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,428,683 UART: [rt]cmd =0x44504543, len=24
33,462,409 >>> mbox cmd response data (40 bytes)
33,463,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,493,108 UART: [rt]cmd =0x44504543, len=24
33,526,030 >>> mbox cmd response data (40 bytes)
33,526,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,556,738 UART: [rt]cmd =0x44504543, len=24
33,590,171 >>> mbox cmd response data (40 bytes)
33,590,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,620,610 UART: [rt]cmd =0x44504543, len=24
33,654,781 >>> mbox cmd response data (40 bytes)
33,655,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,685,323 UART: [rt]cmd =0x44504543, len=24
33,718,591 >>> mbox cmd response data (40 bytes)
33,719,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,749,116 UART: [rt]cmd =0x44504543, len=24
33,782,575 >>> mbox cmd response data (40 bytes)
33,783,200 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,813,328 UART: [rt]cmd =0x44504543, len=24
33,846,840 >>> mbox cmd response data (40 bytes)
33,847,470 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,877,263 UART: [rt]cmd =0x44504543, len=24
33,910,610 >>> mbox cmd response data (40 bytes)
33,911,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,941,280 UART: [rt]cmd =0x44504543, len=24
33,974,821 >>> mbox cmd response data (40 bytes)
33,975,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,005,635 UART: [rt]cmd =0x44504543, len=24
34,038,799 >>> mbox cmd response data (40 bytes)
34,039,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,069,280 UART: [rt]cmd =0x44504543, len=24
34,103,012 >>> mbox cmd response data (40 bytes)
34,103,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,133,536 UART: [rt]cmd =0x44504543, len=24
34,140,399 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,818 writing to cptra_bootfsm_go
193,071 UART:
193,434 UART: Running Caliptra ROM ...
194,629 UART:
604,370 UART: [state] CFI Enabled
622,173 UART: [state] LifecycleState = Unprovisioned
624,141 UART: [state] DebugLocked = No
627,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,826 UART: [kat] SHA2-256
801,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,138 UART: [kat] ++
812,581 UART: [kat] sha1
823,446 UART: [kat] SHA2-256
826,170 UART: [kat] SHA2-384
831,518 UART: [kat] SHA2-512-ACC
833,879 UART: [kat] ECC-384
3,117,330 UART: [kat] HMAC-384Kdf
3,129,605 UART: [kat] LMS
4,319,735 UART: [kat] --
4,324,962 UART: [cold-reset] ++
4,326,611 UART: [fht] Storing FHT @ 0x50003400
4,337,732 UART: [idev] ++
4,338,293 UART: [idev] CDI.KEYID = 6
4,339,320 UART: [idev] SUBJECT.KEYID = 7
4,340,512 UART: [idev] UDS.KEYID = 0
4,341,588 ready_for_fw is high
4,341,817 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,740 UART: [idev] Erasing UDS.KEYID = 0
7,630,816 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,439 UART: [idev] --
7,656,878 UART: [ldev] ++
7,657,447 UART: [ldev] CDI.KEYID = 6
7,658,381 UART: [ldev] SUBJECT.KEYID = 5
7,659,641 UART: [ldev] AUTHORITY.KEYID = 7
7,661,012 UART: [ldev] FE.KEYID = 1
7,671,374 UART: [ldev] Erasing FE.KEYID = 1
10,957,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,497 UART: [ldev] --
13,314,403 UART: [fwproc] Waiting for Commands...
13,317,517 UART: [fwproc] Received command 0x46574c44
13,319,694 UART: [fwproc] Received Image of size 113760 bytes
17,369,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,469 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,825,570 >>> mbox cmd response: success
17,830,309 UART: [afmc] ++
17,830,904 UART: [afmc] CDI.KEYID = 6
17,831,811 UART: [afmc] SUBJECT.KEYID = 7
17,833,075 UART: [afmc] AUTHORITY.KEYID = 5
21,143,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,617 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,012 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,869 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,250 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,037 UART: [afmc] --
23,508,450 UART: [cold-reset] --
23,512,753 UART: [state] Locking Datavault
23,517,351 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,102 UART: [state] Locking ICCM
23,521,816 UART: [exit] Launching FMC @ 0x40000130
23,530,204 UART:
23,530,445 UART: Running Caliptra FMC ...
23,531,542 UART:
23,531,696 UART: [state] CFI Enabled
23,539,897 UART: [fht] FMC Alias Private Key: 7
25,870,978 UART: [art] Extend RT PCRs Done
25,872,199 UART: [art] Lock RT PCRs Done
25,874,026 UART: [art] Populate DV Done
25,879,227 UART: [fht] FMC Alias Private Key: 7
25,880,769 UART: [art] Derive CDI
25,881,498 UART: [art] Store in in slot 0x4
25,924,576 UART: [art] Derive Key Pair
25,925,611 UART: [art] Store priv key in slot 0x5
29,167,639 UART: [art] Derive Key Pair - Done
29,180,364 UART: [art] Signing Cert with AUTHO
29,181,857 UART: RITY.KEYID = 7
31,461,188 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,691 UART: [art] PUB.X = D0F95AF7A5BA1B2FD5283C412441234CC71967BEEF7ED84174639500EE518A54A72E3505B3C8327F673DB00D181F1FC9
31,469,897 UART: [art] PUB.Y = B078F35F0C2530CFBEEE49B036E40B114DF793D6BA0D6978BD620918C842A7407656D74036589952462B0330DCA887D0
31,477,150 UART: [art] SIG.R = 0AA7915A7CE646D09B4FFBB59C948456FC84379579709988C23450BC437F61D7E4B0B0B56363A722D9A419B37F413B52
31,484,509 UART: [art] SIG.S = 1631736685A7DE86E4FF8719332CF896DC55AFB5116C432E3BECB278BA4FFAB9AE80DB7B5AC5F18E4C21818169183F40
32,789,872 UART: Caliptra RT
32,790,585 UART: [state] CFI Enabled
32,908,365 UART: [rt] RT listening for mailbox commands...
32,910,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,940,304 UART: [rt]cmd =0x44504543, len=24
32,966,414 >>> mbox cmd response data (40 bytes)
32,967,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,996,990 UART: [rt]cmd =0x44504543, len=24
33,023,251 >>> mbox cmd response data (40 bytes)
33,023,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,053,842 UART: [rt]cmd =0x44504543, len=24
33,080,260 >>> mbox cmd response data (40 bytes)
33,080,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,110,689 UART: [rt]cmd =0x44504543, len=24
33,137,115 >>> mbox cmd response data (40 bytes)
33,137,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,167,532 UART: [rt]cmd =0x44504543, len=24
33,193,774 >>> mbox cmd response data (40 bytes)
33,194,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,224,353 UART: [rt]cmd =0x44504543, len=24
33,250,651 >>> mbox cmd response data (40 bytes)
33,251,271 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,281,344 UART: [rt]cmd =0x44504543, len=24
33,307,389 >>> mbox cmd response data (40 bytes)
33,308,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,338,133 UART: [rt]cmd =0x44504543, len=24
33,364,654 >>> mbox cmd response data (40 bytes)
33,365,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,395,328 UART: [rt]cmd =0x44504543, len=24
33,421,734 >>> mbox cmd response data (40 bytes)
33,422,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,452,337 UART: [rt]cmd =0x44504543, len=24
33,478,790 >>> mbox cmd response data (40 bytes)
33,479,402 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,509,167 UART: [rt]cmd =0x44504543, len=24
33,535,817 >>> mbox cmd response data (40 bytes)
33,536,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,566,002 UART: [rt]cmd =0x44504543, len=24
33,592,358 >>> mbox cmd response data (40 bytes)
33,593,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,622,637 UART: [rt]cmd =0x44504543, len=24
33,649,090 >>> mbox cmd response data (40 bytes)
33,649,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,679,816 UART: [rt]cmd =0x44504543, len=24
33,706,250 >>> mbox cmd response data (40 bytes)
33,706,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,736,870 UART: [rt]cmd =0x44504543, len=24
33,763,390 >>> mbox cmd response data (40 bytes)
33,764,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,793,948 UART: [rt]cmd =0x44504543, len=24
33,800,747 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
4,130,594 ready_for_fw is high
4,131,098 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,052,902 >>> mbox cmd response: success
23,694,414 UART:
23,694,827 UART: Running Caliptra FMC ...
23,695,958 UART:
23,696,117 UART: [state] CFI Enabled
23,703,787 UART: [fht] FMC Alias Private Key: 7
26,033,942 UART: [art] Extend RT PCRs Done
26,035,176 UART: [art] Lock RT PCRs Done
26,036,805 UART: [art] Populate DV Done
26,042,114 UART: [fht] FMC Alias Private Key: 7
26,043,817 UART: [art] Derive CDI
26,044,580 UART: [art] Store in in slot 0x4
26,087,202 UART: [art] Derive Key Pair
26,088,243 UART: [art] Store priv key in slot 0x5
29,330,527 UART: [art] Derive Key Pair - Done
29,343,622 UART: [art] Signing Cert with AUTHO
29,344,929 UART: RITY.KEYID = 7
31,624,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,942 UART: [art] PUB.X = 306CF6C4AF8FB6E0E83D7914A6B639144D92ABDDCD3F361F5DE3ADDA76E9223A6C7131D6ABD3A2A9F1126AFDAA46E0C9
31,633,249 UART: [art] PUB.Y = 2193AFA6EFA0D74F536AAFB4EDBB0E8FBBC565D0B915F6D4F7275728C18288F27445F738015927DB7E342B5B30F35312
31,640,474 UART: [art] SIG.R = 7EC2D1BE4E2790591DB1C8E336C4403F8FF5C35A4B3FED63C8481D40626567A13A9F0699A1338163A3B5904255C35334
31,647,859 UART: [art] SIG.S = 1D6BC5463407911533FBBF7CBEDFFC6B2DD899DB8C5D8D5033A30A08728C11364CD961691A5717EE0CB4CE8177ECF771
32,952,770 UART: Caliptra RT
32,953,485 UART: [state] CFI Enabled
33,071,738 UART: [rt] RT listening for mailbox commands...
33,073,656 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,103,410 UART: [rt]cmd =0x44504543, len=24
33,129,652 >>> mbox cmd response data (40 bytes)
33,130,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,160,403 UART: [rt]cmd =0x44504543, len=24
33,186,880 >>> mbox cmd response data (40 bytes)
33,187,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,217,192 UART: [rt]cmd =0x44504543, len=24
33,243,280 >>> mbox cmd response data (40 bytes)
33,243,899 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,273,867 UART: [rt]cmd =0x44504543, len=24
33,300,215 >>> mbox cmd response data (40 bytes)
33,300,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,330,915 UART: [rt]cmd =0x44504543, len=24
33,357,329 >>> mbox cmd response data (40 bytes)
33,357,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,387,835 UART: [rt]cmd =0x44504543, len=24
33,413,969 >>> mbox cmd response data (40 bytes)
33,414,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,444,511 UART: [rt]cmd =0x44504543, len=24
33,471,218 >>> mbox cmd response data (40 bytes)
33,471,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,501,519 UART: [rt]cmd =0x44504543, len=24
33,528,095 >>> mbox cmd response data (40 bytes)
33,528,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,558,699 UART: [rt]cmd =0x44504543, len=24
33,585,328 >>> mbox cmd response data (40 bytes)
33,586,132 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,615,939 UART: [rt]cmd =0x44504543, len=24
33,642,026 >>> mbox cmd response data (40 bytes)
33,642,650 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,672,528 UART: [rt]cmd =0x44504543, len=24
33,698,639 >>> mbox cmd response data (40 bytes)
33,699,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,728,953 UART: [rt]cmd =0x44504543, len=24
33,754,844 >>> mbox cmd response data (40 bytes)
33,755,496 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,785,288 UART: [rt]cmd =0x44504543, len=24
33,811,751 >>> mbox cmd response data (40 bytes)
33,812,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,842,323 UART: [rt]cmd =0x44504543, len=24
33,869,095 >>> mbox cmd response data (40 bytes)
33,869,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,899,663 UART: [rt]cmd =0x44504543, len=24
33,926,299 >>> mbox cmd response data (40 bytes)
33,926,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,956,951 UART: [rt]cmd =0x44504543, len=24
33,963,572 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
192,515 UART:
192,917 UART: Running Caliptra ROM ...
194,230 UART:
194,384 UART: [state] CFI Enabled
263,573 UART: [state] LifecycleState = Unprovisioned
265,429 UART: [state] DebugLocked = No
266,698 UART: [state] WD Timer not started. Device not locked for debugging
270,457 UART: [kat] SHA2-256
449,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,177 UART: [kat] ++
461,713 UART: [kat] sha1
472,807 UART: [kat] SHA2-256
475,825 UART: [kat] SHA2-384
482,803 UART: [kat] SHA2-512-ACC
485,739 UART: [kat] ECC-384
2,945,759 UART: [kat] HMAC-384Kdf
2,971,599 UART: [kat] LMS
3,501,065 UART: [kat] --
3,506,256 UART: [cold-reset] ++
3,508,196 UART: [fht] FHT @ 0x50003400
3,519,029 UART: [idev] ++
3,519,591 UART: [idev] CDI.KEYID = 6
3,520,499 UART: [idev] SUBJECT.KEYID = 7
3,521,669 UART: [idev] UDS.KEYID = 0
3,522,713 ready_for_fw is high
3,522,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,470 UART: [idev] Erasing UDS.KEYID = 0
6,028,982 UART: [idev] Sha1 KeyId Algorithm
6,051,918 UART: [idev] --
6,056,027 UART: [ldev] ++
6,056,599 UART: [ldev] CDI.KEYID = 6
6,057,662 UART: [ldev] SUBJECT.KEYID = 5
6,058,767 UART: [ldev] AUTHORITY.KEYID = 7
6,059,941 UART: [ldev] FE.KEYID = 1
6,100,558 UART: [ldev] Erasing FE.KEYID = 1
8,597,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,397 UART: [ldev] --
10,391,599 UART: [fwproc] Wait for Commands...
10,393,419 UART: [fwproc] Recv command 0x46574c44
10,395,506 UART: [fwproc] Recv'd Img size: 114084 bytes
13,802,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,457 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,259,469 >>> mbox cmd response: success
14,264,189 UART: [afmc] ++
14,264,782 UART: [afmc] CDI.KEYID = 6
14,265,666 UART: [afmc] SUBJECT.KEYID = 7
14,266,880 UART: [afmc] AUTHORITY.KEYID = 5
16,806,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,555 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,365 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,280 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,047 UART: [afmc] --
18,605,296 UART: [cold-reset] --
18,609,494 UART: [state] Locking Datavault
18,614,249 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,945 UART: [state] Locking ICCM
18,617,225 UART: [exit] Launching FMC @ 0x40000130
18,625,620 UART:
18,625,859 UART: Running Caliptra FMC ...
18,626,902 UART:
18,627,054 UART: [state] CFI Enabled
18,689,353 UART: [fht] FMC Alias Private Key: 7
20,452,480 UART: [art] Extend RT PCRs Done
20,453,701 UART: [art] Lock RT PCRs Done
20,455,354 UART: [art] Populate DV Done
20,460,656 UART: [fht] FMC Alias Private Key: 7
20,462,189 UART: [art] Derive CDI
20,462,998 UART: [art] Store in in slot 0x4
20,521,660 UART: [art] Derive Key Pair
20,522,720 UART: [art] Store priv key in slot 0x5
22,985,725 UART: [art] Derive Key Pair - Done
22,998,772 UART: [art] Signing Cert with AUTHO
23,000,069 UART: RITY.KEYID = 7
24,711,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,334 UART: [art] PUB.X = E02679C81C2B1DE592426E25706E4EB3ED722C1AED42B25EFE96E7E7DD1599604FCAD7F3B382F3388AFE72ABA0A38A17
24,720,567 UART: [art] PUB.Y = BD8A178F084043BF0EDCD60C496BB43C74122E7349EE2A8FBE7E929094A5FCAC0660B3758A7F6AD7D9A39491AD3B5483
24,727,876 UART: [art] SIG.R = F20E72DBCC3D960B19BE0891A4AC476BE53AA695069AC347AA91B30826187A6F5B40AA121F49370C4B30EF01C5A4CF63
24,735,294 UART: [art] SIG.S = D8DC45A138C91AFDAD21321A8BC90110ECE07A3B31349EB9815CBA75283B7DDAA19F644D67E77A9D930B289E99FB14AF
25,713,989 UART: Caliptra RT
25,714,702 UART: [state] CFI Enabled
25,881,227 UART: [rt] RT listening for mailbox commands...
25,883,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,913,544 UART: [rt]cmd =0x44504543, len=24
25,954,623 >>> mbox cmd response data (40 bytes)
25,955,467 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,985,558 UART: [rt]cmd =0x44504543, len=24
26,018,852 >>> mbox cmd response data (40 bytes)
26,019,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,049,539 UART: [rt]cmd =0x44504543, len=24
26,082,433 >>> mbox cmd response data (40 bytes)
26,083,056 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,112,935 UART: [rt]cmd =0x44504543, len=24
26,146,612 >>> mbox cmd response data (40 bytes)
26,147,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,176,932 UART: [rt]cmd =0x44504543, len=24
26,210,777 >>> mbox cmd response data (40 bytes)
26,211,397 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,241,457 UART: [rt]cmd =0x44504543, len=24
26,274,690 >>> mbox cmd response data (40 bytes)
26,275,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,305,459 UART: [rt]cmd =0x44504543, len=24
26,338,872 >>> mbox cmd response data (40 bytes)
26,339,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,369,203 UART: [rt]cmd =0x44504543, len=24
26,403,009 >>> mbox cmd response data (40 bytes)
26,403,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,433,584 UART: [rt]cmd =0x44504543, len=24
26,466,985 >>> mbox cmd response data (40 bytes)
26,467,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,509 UART: [rt]cmd =0x44504543, len=24
26,531,084 >>> mbox cmd response data (40 bytes)
26,531,703 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,561,657 UART: [rt]cmd =0x44504543, len=24
26,594,826 >>> mbox cmd response data (40 bytes)
26,595,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,625,370 UART: [rt]cmd =0x44504543, len=24
26,658,867 >>> mbox cmd response data (40 bytes)
26,659,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,689,324 UART: [rt]cmd =0x44504543, len=24
26,723,229 >>> mbox cmd response data (40 bytes)
26,723,846 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,753,819 UART: [rt]cmd =0x44504543, len=24
26,787,498 >>> mbox cmd response data (40 bytes)
26,788,115 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,817,869 UART: [rt]cmd =0x44504543, len=24
26,851,542 >>> mbox cmd response data (40 bytes)
26,852,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,881,947 UART: [rt]cmd =0x44504543, len=24
26,888,086 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,535 writing to cptra_bootfsm_go
3,382,271 ready_for_fw is high
3,382,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,090,643 >>> mbox cmd response: success
18,387,640 UART:
18,388,040 UART: Running Caliptra FMC ...
18,389,171 UART:
18,389,335 UART: [state] CFI Enabled
18,455,615 UART: [fht] FMC Alias Private Key: 7
20,219,022 UART: [art] Extend RT PCRs Done
20,220,250 UART: [art] Lock RT PCRs Done
20,221,995 UART: [art] Populate DV Done
20,227,570 UART: [fht] FMC Alias Private Key: 7
20,229,269 UART: [art] Derive CDI
20,230,084 UART: [art] Store in in slot 0x4
20,287,840 UART: [art] Derive Key Pair
20,288,876 UART: [art] Store priv key in slot 0x5
22,751,423 UART: [art] Derive Key Pair - Done
22,764,161 UART: [art] Signing Cert with AUTHO
22,765,463 UART: RITY.KEYID = 7
24,477,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,331 UART: [art] PUB.X = F905AD1DD9500846E2D30A71B9CD4B863C7A2D501C5F59B58E8D58F6B83BED380759F9B45D1C353B707E1ECE5833144B
24,486,521 UART: [art] PUB.Y = 1DF6610CDB8E5210CD86D9B717AB5FAC4510A79D83B95B2C84C3FDA7D0444152A56FC8A12E643C80600B108FE2881294
24,493,750 UART: [art] SIG.R = 545FBBACEC9B64757FA883626D739986DB7C2C9A79DF0A7199BD3A9EFC65365C7CD35B1471505705EB76E3543EB0AFEC
24,501,115 UART: [art] SIG.S = 76F1C691D23ECA705D741C73B9DFAD8BF6AE4A724F7722A213F686761A610530E11363F847812C0E30A06450B9C83BB1
25,480,103 UART: Caliptra RT
25,480,819 UART: [state] CFI Enabled
25,646,694 UART: [rt] RT listening for mailbox commands...
25,648,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,679,391 UART: [rt]cmd =0x44504543, len=24
25,720,465 >>> mbox cmd response data (40 bytes)
25,721,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,751,180 UART: [rt]cmd =0x44504543, len=24
25,784,143 >>> mbox cmd response data (40 bytes)
25,784,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,814,832 UART: [rt]cmd =0x44504543, len=24
25,848,389 >>> mbox cmd response data (40 bytes)
25,849,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,879,118 UART: [rt]cmd =0x44504543, len=24
25,912,198 >>> mbox cmd response data (40 bytes)
25,912,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,942,865 UART: [rt]cmd =0x44504543, len=24
25,976,602 >>> mbox cmd response data (40 bytes)
25,977,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,007,188 UART: [rt]cmd =0x44504543, len=24
26,040,447 >>> mbox cmd response data (40 bytes)
26,041,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,071,029 UART: [rt]cmd =0x44504543, len=24
26,104,525 >>> mbox cmd response data (40 bytes)
26,105,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,135,061 UART: [rt]cmd =0x44504543, len=24
26,168,504 >>> mbox cmd response data (40 bytes)
26,169,154 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,198,998 UART: [rt]cmd =0x44504543, len=24
26,232,701 >>> mbox cmd response data (40 bytes)
26,233,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,263,218 UART: [rt]cmd =0x44504543, len=24
26,296,532 >>> mbox cmd response data (40 bytes)
26,297,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,327,313 UART: [rt]cmd =0x44504543, len=24
26,360,676 >>> mbox cmd response data (40 bytes)
26,361,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,044 UART: [rt]cmd =0x44504543, len=24
26,424,608 >>> mbox cmd response data (40 bytes)
26,425,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,455,216 UART: [rt]cmd =0x44504543, len=24
26,488,869 >>> mbox cmd response data (40 bytes)
26,489,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,519,198 UART: [rt]cmd =0x44504543, len=24
26,552,784 >>> mbox cmd response data (40 bytes)
26,553,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,583,191 UART: [rt]cmd =0x44504543, len=24
26,617,026 >>> mbox cmd response data (40 bytes)
26,617,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,647,416 UART: [rt]cmd =0x44504543, len=24
26,653,909 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
192,968 UART:
193,337 UART: Running Caliptra ROM ...
194,468 UART:
604,048 UART: [state] CFI Enabled
618,856 UART: [state] LifecycleState = Unprovisioned
620,732 UART: [state] DebugLocked = No
623,175 UART: [state] WD Timer not started. Device not locked for debugging
626,853 UART: [kat] SHA2-256
806,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,536 UART: [kat] ++
817,982 UART: [kat] sha1
829,364 UART: [kat] SHA2-256
832,411 UART: [kat] SHA2-384
838,977 UART: [kat] SHA2-512-ACC
841,914 UART: [kat] ECC-384
3,281,404 UART: [kat] HMAC-384Kdf
3,293,000 UART: [kat] LMS
3,822,441 UART: [kat] --
3,827,093 UART: [cold-reset] ++
3,828,609 UART: [fht] FHT @ 0x50003400
3,839,397 UART: [idev] ++
3,839,965 UART: [idev] CDI.KEYID = 6
3,840,998 UART: [idev] SUBJECT.KEYID = 7
3,842,099 UART: [idev] UDS.KEYID = 0
3,843,030 ready_for_fw is high
3,843,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,512 UART: [idev] Erasing UDS.KEYID = 0
6,309,687 UART: [idev] Sha1 KeyId Algorithm
6,333,935 UART: [idev] --
6,337,656 UART: [ldev] ++
6,338,229 UART: [ldev] CDI.KEYID = 6
6,339,136 UART: [ldev] SUBJECT.KEYID = 5
6,340,357 UART: [ldev] AUTHORITY.KEYID = 7
6,341,552 UART: [ldev] FE.KEYID = 1
6,351,982 UART: [ldev] Erasing FE.KEYID = 1
8,830,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,399 UART: [ldev] --
10,621,072 UART: [fwproc] Wait for Commands...
10,623,982 UART: [fwproc] Recv command 0x46574c44
10,626,080 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,440 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,632 >>> mbox cmd response: success
14,493,476 UART: [afmc] ++
14,494,072 UART: [afmc] CDI.KEYID = 6
14,494,991 UART: [afmc] SUBJECT.KEYID = 7
14,496,153 UART: [afmc] AUTHORITY.KEYID = 5
16,991,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,824 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,817 UART: [afmc] --
18,787,693 UART: [cold-reset] --
18,791,935 UART: [state] Locking Datavault
18,797,503 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,155 UART: [state] Locking ICCM
18,800,645 UART: [exit] Launching FMC @ 0x40000130
18,809,102 UART:
18,809,346 UART: Running Caliptra FMC ...
18,810,451 UART:
18,810,617 UART: [state] CFI Enabled
18,818,792 UART: [fht] FMC Alias Private Key: 7
20,575,879 UART: [art] Extend RT PCRs Done
20,577,096 UART: [art] Lock RT PCRs Done
20,578,891 UART: [art] Populate DV Done
20,584,518 UART: [fht] FMC Alias Private Key: 7
20,586,203 UART: [art] Derive CDI
20,587,026 UART: [art] Store in in slot 0x4
20,629,742 UART: [art] Derive Key Pair
20,630,745 UART: [art] Store priv key in slot 0x5
23,057,639 UART: [art] Derive Key Pair - Done
23,070,528 UART: [art] Signing Cert with AUTHO
23,071,863 UART: RITY.KEYID = 7
24,777,436 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,944 UART: [art] PUB.X = B4D86A88E3E4E4C617B9E179E9F09DE0F026E24E004B9CD99163654DAD9C58C99405FE1B5AB5B46A6C8DE8094EBF751C
24,786,165 UART: [art] PUB.Y = 25BCFF01222C8FBC8D4C39E5F0E5A906597B4C18D55B18542D3E8A1E130568B6CA26E2AF90462AAE2688B3A5E5020DEA
24,793,475 UART: [art] SIG.R = AC7AF7BC2A41D551ED922FDD94E0DDBF6D3AAA924A48F6ABF98EE94BB7ACE64215F473ED6B2A23FF2F3F9622A1E003FF
24,800,918 UART: [art] SIG.S = 3B634BAD0491695F7A2B826AA0C346A3F0878BC8BFFE003C32C13FCAFA6BAAEB7CAA3D535C0A5E3861A6F4BABD6CE86D
25,779,805 UART: Caliptra RT
25,780,627 UART: [state] CFI Enabled
25,896,554 UART: [rt] RT listening for mailbox commands...
25,898,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,928,734 UART: [rt]cmd =0x44504543, len=24
25,955,034 >>> mbox cmd response data (40 bytes)
25,955,858 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,985,659 UART: [rt]cmd =0x44504543, len=24
26,012,284 >>> mbox cmd response data (40 bytes)
26,012,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,042,690 UART: [rt]cmd =0x44504543, len=24
26,068,539 >>> mbox cmd response data (40 bytes)
26,069,180 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,099,246 UART: [rt]cmd =0x44504543, len=24
26,125,698 >>> mbox cmd response data (40 bytes)
26,126,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,156,363 UART: [rt]cmd =0x44504543, len=24
26,182,832 >>> mbox cmd response data (40 bytes)
26,183,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,213,331 UART: [rt]cmd =0x44504543, len=24
26,239,355 >>> mbox cmd response data (40 bytes)
26,239,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,269,745 UART: [rt]cmd =0x44504543, len=24
26,295,879 >>> mbox cmd response data (40 bytes)
26,296,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,326,413 UART: [rt]cmd =0x44504543, len=24
26,352,396 >>> mbox cmd response data (40 bytes)
26,353,052 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,382,791 UART: [rt]cmd =0x44504543, len=24
26,408,924 >>> mbox cmd response data (40 bytes)
26,409,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,439,405 UART: [rt]cmd =0x44504543, len=24
26,465,840 >>> mbox cmd response data (40 bytes)
26,466,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,496,526 UART: [rt]cmd =0x44504543, len=24
26,522,808 >>> mbox cmd response data (40 bytes)
26,523,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,553,405 UART: [rt]cmd =0x44504543, len=24
26,579,972 >>> mbox cmd response data (40 bytes)
26,580,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,610,686 UART: [rt]cmd =0x44504543, len=24
26,637,095 >>> mbox cmd response data (40 bytes)
26,637,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,667,507 UART: [rt]cmd =0x44504543, len=24
26,694,156 >>> mbox cmd response data (40 bytes)
26,694,780 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,724,732 UART: [rt]cmd =0x44504543, len=24
26,750,945 >>> mbox cmd response data (40 bytes)
26,751,590 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,781,548 UART: [rt]cmd =0x44504543, len=24
26,788,116 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
3,696,346 ready_for_fw is high
3,696,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,258,726 >>> mbox cmd response: success
18,511,466 UART:
18,511,853 UART: Running Caliptra FMC ...
18,513,056 UART:
18,513,238 UART: [state] CFI Enabled
18,520,647 UART: [fht] FMC Alias Private Key: 7
20,277,998 UART: [art] Extend RT PCRs Done
20,279,228 UART: [art] Lock RT PCRs Done
20,280,772 UART: [art] Populate DV Done
20,286,188 UART: [fht] FMC Alias Private Key: 7
20,287,788 UART: [art] Derive CDI
20,288,608 UART: [art] Store in in slot 0x4
20,331,312 UART: [art] Derive Key Pair
20,332,312 UART: [art] Store priv key in slot 0x5
22,759,247 UART: [art] Derive Key Pair - Done
22,772,033 UART: [art] Signing Cert with AUTHO
22,773,341 UART: RITY.KEYID = 7
24,478,417 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,917 UART: [art] PUB.X = F4D86FE23B45B6A0FDBDE1C7638A3E54DFAB2C56F528408216AD2F109F0025B0C5B2C6A3385A9061A7CCC9F80817AD9D
24,487,201 UART: [art] PUB.Y = 02EE52DA607EE245B5BEC90499DF53256B53E022BC2D47CF8792668C255D2293CDA0B36416DDAE4E5060DF20CE8A2DD4
24,494,494 UART: [art] SIG.R = 9A0FD8E568246158864B03A4D0763A9601EB093906125A7330A52B25FFBAF06B26B9349B5468796CE62D82759C4019D9
24,501,871 UART: [art] SIG.S = 541450A046A964246244942D29E78F4FD94CF8384F6AB4553912F99BB9FFBFA19A6B8DDB8FED86B81B6743608D440982
25,480,962 UART: Caliptra RT
25,481,663 UART: [state] CFI Enabled
25,599,611 UART: [rt] RT listening for mailbox commands...
25,601,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,631,431 UART: [rt]cmd =0x44504543, len=24
25,657,645 >>> mbox cmd response data (40 bytes)
25,658,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,688,330 UART: [rt]cmd =0x44504543, len=24
25,714,158 >>> mbox cmd response data (40 bytes)
25,714,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,744,511 UART: [rt]cmd =0x44504543, len=24
25,770,755 >>> mbox cmd response data (40 bytes)
25,771,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,801,296 UART: [rt]cmd =0x44504543, len=24
25,827,112 >>> mbox cmd response data (40 bytes)
25,827,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,857,868 UART: [rt]cmd =0x44504543, len=24
25,883,796 >>> mbox cmd response data (40 bytes)
25,884,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,914,272 UART: [rt]cmd =0x44504543, len=24
25,940,186 >>> mbox cmd response data (40 bytes)
25,940,811 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,970,880 UART: [rt]cmd =0x44504543, len=24
25,996,988 >>> mbox cmd response data (40 bytes)
25,997,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,027,416 UART: [rt]cmd =0x44504543, len=24
26,054,087 >>> mbox cmd response data (40 bytes)
26,054,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,084,688 UART: [rt]cmd =0x44504543, len=24
26,110,850 >>> mbox cmd response data (40 bytes)
26,111,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,141,322 UART: [rt]cmd =0x44504543, len=24
26,167,727 >>> mbox cmd response data (40 bytes)
26,168,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,198,276 UART: [rt]cmd =0x44504543, len=24
26,224,606 >>> mbox cmd response data (40 bytes)
26,225,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,255,197 UART: [rt]cmd =0x44504543, len=24
26,281,612 >>> mbox cmd response data (40 bytes)
26,282,266 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,312,275 UART: [rt]cmd =0x44504543, len=24
26,338,630 >>> mbox cmd response data (40 bytes)
26,339,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,369,261 UART: [rt]cmd =0x44504543, len=24
26,395,485 >>> mbox cmd response data (40 bytes)
26,396,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,426,184 UART: [rt]cmd =0x44504543, len=24
26,452,512 >>> mbox cmd response data (40 bytes)
26,453,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,482,977 UART: [rt]cmd =0x44504543, len=24
26,489,615 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
192,553 UART:
192,917 UART: Running Caliptra ROM ...
194,110 UART:
194,264 UART: [state] CFI Enabled
263,226 UART: [state] LifecycleState = Unprovisioned
265,643 UART: [state] DebugLocked = No
267,534 UART: [state] WD Timer not started. Device not locked for debugging
272,222 UART: [kat] SHA2-256
462,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,926 UART: [kat] ++
473,409 UART: [kat] sha1
484,556 UART: [kat] SHA2-256
487,621 UART: [kat] SHA2-384
494,760 UART: [kat] SHA2-512-ACC
497,343 UART: [kat] ECC-384
2,946,635 UART: [kat] HMAC-384Kdf
2,970,835 UART: [kat] LMS
3,502,629 UART: [kat] --
3,507,481 UART: [cold-reset] ++
3,509,844 UART: [fht] FHT @ 0x50003400
3,521,124 UART: [idev] ++
3,521,864 UART: [idev] CDI.KEYID = 6
3,522,776 UART: [idev] SUBJECT.KEYID = 7
3,523,943 UART: [idev] UDS.KEYID = 0
3,524,866 ready_for_fw is high
3,525,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,916 UART: [idev] Erasing UDS.KEYID = 0
6,030,749 UART: [idev] Sha1 KeyId Algorithm
6,054,181 UART: [idev] --
6,058,554 UART: [ldev] ++
6,059,235 UART: [ldev] CDI.KEYID = 6
6,060,149 UART: [ldev] SUBJECT.KEYID = 5
6,061,355 UART: [ldev] AUTHORITY.KEYID = 7
6,062,538 UART: [ldev] FE.KEYID = 1
6,101,177 UART: [ldev] Erasing FE.KEYID = 1
8,607,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,059 UART: [ldev] --
10,416,114 UART: [fwproc] Wait for Commands...
10,418,527 UART: [fwproc] Recv command 0x46574c44
10,420,782 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,603,543 >>> mbox cmd response: success
14,608,494 UART: [afmc] ++
14,609,204 UART: [afmc] CDI.KEYID = 6
14,610,390 UART: [afmc] SUBJECT.KEYID = 7
14,611,825 UART: [afmc] AUTHORITY.KEYID = 5
17,148,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,611 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,888 UART: [afmc] --
18,948,993 UART: [cold-reset] --
18,953,075 UART: [state] Locking Datavault
18,959,333 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,537 UART: [state] Locking ICCM
18,964,130 UART: [exit] Launching FMC @ 0x40000130
18,972,838 UART:
18,973,069 UART: Running Caliptra FMC ...
18,974,167 UART:
18,974,320 UART: [state] CFI Enabled
19,031,441 UART: [fht] FMC Alias Private Key: 7
20,795,635 UART: [art] Extend RT PCRs Done
20,797,232 UART: [art] Lock RT PCRs Done
20,798,246 UART: [art] Populate DV Done
20,803,712 UART: [fht] FMC Alias Private Key: 7
20,805,361 UART: [art] Derive CDI
20,806,102 UART: [art] Store in in slot 0x4
20,866,386 UART: [art] Derive Key Pair
20,867,386 UART: [art] Store priv key in slot 0x5
23,330,016 UART: [art] Derive Key Pair - Done
23,343,222 UART: [art] Signing Cert with AUTHO
23,344,529 UART: RITY.KEYID = 7
25,055,783 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,325 UART: [art] PUB.X = D17FD625423E8C3467D5D94DC857D0A7ED0155BBE99B4FEA04D313669D416CAF86C6DCA7F8B5A7A36AA0EC3326D4A969
25,064,616 UART: [art] PUB.Y = E5F21CD332EE98B30B3867C50CB6EF4E74C32C54DE15A5AC1D11942C1CE4792DFF5E8200AE8C8F21F30404F6EC625F90
25,071,861 UART: [art] SIG.R = A65B53594FCE5DC4B545C7EDED5377C8B01019110F9C0D3CA36B1542466A3E415D28FD0517B91324B8E73F99AC09E03B
25,079,234 UART: [art] SIG.S = D56A9F608672B45709C6C7F327C24F6A90183FEDCA498529DE8047F14B7543D9CA9B8847CD49063E7383A2EB6D69F714
26,058,322 UART: Caliptra RT
26,059,042 UART: [state] CFI Enabled
26,223,858 UART: [rt] RT listening for mailbox commands...
26,225,787 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,256,649 UART: [rt]cmd =0x44504543, len=24
26,298,112 >>> mbox cmd response data (40 bytes)
26,299,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,671 UART: [rt]cmd =0x44504543, len=24
26,362,409 >>> mbox cmd response data (40 bytes)
26,363,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,392,861 UART: [rt]cmd =0x44504543, len=24
26,426,221 >>> mbox cmd response data (40 bytes)
26,426,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,456,839 UART: [rt]cmd =0x44504543, len=24
26,490,181 >>> mbox cmd response data (40 bytes)
26,490,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,917 UART: [rt]cmd =0x44504543, len=24
26,554,246 >>> mbox cmd response data (40 bytes)
26,554,861 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,584,938 UART: [rt]cmd =0x44504543, len=24
26,618,350 >>> mbox cmd response data (40 bytes)
26,618,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,619 UART: [rt]cmd =0x44504543, len=24
26,682,196 >>> mbox cmd response data (40 bytes)
26,682,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,712,819 UART: [rt]cmd =0x44504543, len=24
26,746,426 >>> mbox cmd response data (40 bytes)
26,747,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,776,941 UART: [rt]cmd =0x44504543, len=24
26,810,497 >>> mbox cmd response data (40 bytes)
26,811,149 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,841,208 UART: [rt]cmd =0x44504543, len=24
26,874,583 >>> mbox cmd response data (40 bytes)
26,875,195 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,905,161 UART: [rt]cmd =0x44504543, len=24
26,938,624 >>> mbox cmd response data (40 bytes)
26,939,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,968,933 UART: [rt]cmd =0x44504543, len=24
27,002,606 >>> mbox cmd response data (40 bytes)
27,003,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,033,183 UART: [rt]cmd =0x44504543, len=24
27,066,787 >>> mbox cmd response data (40 bytes)
27,067,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,097,459 UART: [rt]cmd =0x44504543, len=24
27,130,907 >>> mbox cmd response data (40 bytes)
27,131,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,161,400 UART: [rt]cmd =0x44504543, len=24
27,195,043 >>> mbox cmd response data (40 bytes)
27,195,842 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,225,665 UART: [rt]cmd =0x44504543, len=24
27,232,185 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,438,450 ready_for_fw is high
3,438,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,743,303 >>> mbox cmd response: success
19,023,238 UART:
19,023,633 UART: Running Caliptra FMC ...
19,024,822 UART:
19,024,992 UART: [state] CFI Enabled
19,090,838 UART: [fht] FMC Alias Private Key: 7
20,854,696 UART: [art] Extend RT PCRs Done
20,855,945 UART: [art] Lock RT PCRs Done
20,857,215 UART: [art] Populate DV Done
20,862,470 UART: [fht] FMC Alias Private Key: 7
20,863,953 UART: [art] Derive CDI
20,864,901 UART: [art] Store in in slot 0x4
20,923,439 UART: [art] Derive Key Pair
20,924,496 UART: [art] Store priv key in slot 0x5
23,387,412 UART: [art] Derive Key Pair - Done
23,400,247 UART: [art] Signing Cert with AUTHO
23,401,545 UART: RITY.KEYID = 7
25,113,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,892 UART: [art] PUB.X = F7214ECB246099DF9A397B8D01F8B810EF8BAA81FA119599B5E7DF488AFAF7CAF1AB84678AEF3F75F3D0576ECBC4BD1B
25,122,234 UART: [art] PUB.Y = 28316BBCD7C2B86A811177A9408FAA73DA84D9DB1DB23289DAA49E760EDC690273D0B007EA401FAC24CA84A81F3AA067
25,129,518 UART: [art] SIG.R = DA2D0AD25AFC146DC68E8D8C1161E636C65397BA0652788AABBD19E30233E3659CD6D7A06506CBA0E69D349E4240FDC1
25,136,953 UART: [art] SIG.S = 4623705AD2B8B6BF078F8C607CDEED831EAC8970F9354211C9DC6BC2928626FC74C5BCD372167700CCFDA9D101CA19E6
26,115,940 UART: Caliptra RT
26,116,629 UART: [state] CFI Enabled
26,280,720 UART: [rt] RT listening for mailbox commands...
26,282,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,313,157 UART: [rt]cmd =0x44504543, len=24
26,355,730 >>> mbox cmd response data (40 bytes)
26,356,513 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,386,580 UART: [rt]cmd =0x44504543, len=24
26,420,103 >>> mbox cmd response data (40 bytes)
26,420,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,450,659 UART: [rt]cmd =0x44504543, len=24
26,484,602 >>> mbox cmd response data (40 bytes)
26,485,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,515,210 UART: [rt]cmd =0x44504543, len=24
26,548,600 >>> mbox cmd response data (40 bytes)
26,549,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,579,138 UART: [rt]cmd =0x44504543, len=24
26,612,867 >>> mbox cmd response data (40 bytes)
26,613,484 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,643,543 UART: [rt]cmd =0x44504543, len=24
26,676,866 >>> mbox cmd response data (40 bytes)
26,677,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,707,463 UART: [rt]cmd =0x44504543, len=24
26,740,913 >>> mbox cmd response data (40 bytes)
26,741,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,771,355 UART: [rt]cmd =0x44504543, len=24
26,805,052 >>> mbox cmd response data (40 bytes)
26,805,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,835,704 UART: [rt]cmd =0x44504543, len=24
26,868,997 >>> mbox cmd response data (40 bytes)
26,869,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,899,533 UART: [rt]cmd =0x44504543, len=24
26,933,477 >>> mbox cmd response data (40 bytes)
26,934,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,964,143 UART: [rt]cmd =0x44504543, len=24
26,997,254 >>> mbox cmd response data (40 bytes)
26,997,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,027,906 UART: [rt]cmd =0x44504543, len=24
27,061,372 >>> mbox cmd response data (40 bytes)
27,062,019 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,092,079 UART: [rt]cmd =0x44504543, len=24
27,125,516 >>> mbox cmd response data (40 bytes)
27,126,112 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,156,054 UART: [rt]cmd =0x44504543, len=24
27,189,650 >>> mbox cmd response data (40 bytes)
27,190,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,220,137 UART: [rt]cmd =0x44504543, len=24
27,253,379 >>> mbox cmd response data (40 bytes)
27,254,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,283,955 UART: [rt]cmd =0x44504543, len=24
27,290,569 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
192,880 UART:
193,272 UART: Running Caliptra ROM ...
194,370 UART:
604,225 UART: [state] CFI Enabled
620,225 UART: [state] LifecycleState = Unprovisioned
622,602 UART: [state] DebugLocked = No
624,694 UART: [state] WD Timer not started. Device not locked for debugging
630,153 UART: [kat] SHA2-256
820,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,854 UART: [kat] ++
831,381 UART: [kat] sha1
842,681 UART: [kat] SHA2-256
845,695 UART: [kat] SHA2-384
850,644 UART: [kat] SHA2-512-ACC
853,231 UART: [kat] ECC-384
3,295,148 UART: [kat] HMAC-384Kdf
3,307,666 UART: [kat] LMS
3,839,482 UART: [kat] --
3,843,974 UART: [cold-reset] ++
3,845,693 UART: [fht] FHT @ 0x50003400
3,857,967 UART: [idev] ++
3,858,715 UART: [idev] CDI.KEYID = 6
3,859,604 UART: [idev] SUBJECT.KEYID = 7
3,860,725 UART: [idev] UDS.KEYID = 0
3,861,691 ready_for_fw is high
3,861,880 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,010 UART: [idev] Erasing UDS.KEYID = 0
6,333,563 UART: [idev] Sha1 KeyId Algorithm
6,355,709 UART: [idev] --
6,360,858 UART: [ldev] ++
6,361,544 UART: [ldev] CDI.KEYID = 6
6,362,508 UART: [ldev] SUBJECT.KEYID = 5
6,363,664 UART: [ldev] AUTHORITY.KEYID = 7
6,364,897 UART: [ldev] FE.KEYID = 1
6,376,297 UART: [ldev] Erasing FE.KEYID = 1
8,850,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,325 UART: [ldev] --
10,641,940 UART: [fwproc] Wait for Commands...
10,645,112 UART: [fwproc] Recv command 0x46574c44
10,647,420 UART: [fwproc] Recv'd Img size: 114084 bytes
14,092,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,826,886 >>> mbox cmd response: success
14,831,589 UART: [afmc] ++
14,832,293 UART: [afmc] CDI.KEYID = 6
14,833,404 UART: [afmc] SUBJECT.KEYID = 7
14,834,952 UART: [afmc] AUTHORITY.KEYID = 5
17,337,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,714 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,758 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,469 UART: [afmc] --
19,134,408 UART: [cold-reset] --
19,138,614 UART: [state] Locking Datavault
19,142,550 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,704 UART: [state] Locking ICCM
19,147,401 UART: [exit] Launching FMC @ 0x40000130
19,156,040 UART:
19,156,282 UART: Running Caliptra FMC ...
19,157,389 UART:
19,157,548 UART: [state] CFI Enabled
19,165,758 UART: [fht] FMC Alias Private Key: 7
20,922,137 UART: [art] Extend RT PCRs Done
20,923,360 UART: [art] Lock RT PCRs Done
20,925,203 UART: [art] Populate DV Done
20,930,618 UART: [fht] FMC Alias Private Key: 7
20,932,172 UART: [art] Derive CDI
20,932,940 UART: [art] Store in in slot 0x4
20,975,379 UART: [art] Derive Key Pair
20,976,424 UART: [art] Store priv key in slot 0x5
23,403,346 UART: [art] Derive Key Pair - Done
23,416,132 UART: [art] Signing Cert with AUTHO
23,417,438 UART: RITY.KEYID = 7
25,123,066 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,574 UART: [art] PUB.X = C0A7C1DA0C518EBA83293AFD3FB6D62BD2E746DD258E941302003299530ACD19D2F21C0B5DB6C46A6C10576F7699C905
25,131,823 UART: [art] PUB.Y = 7E0FA0E670DF20D8A89C06DDD9462922A12FF0716C7885DA5BDFFC0D07B27DF3E9194FD747ACF5F74078D8D37B3B418E
25,139,098 UART: [art] SIG.R = 0B0E220FF21E0DDBAF51D925700A96D725BA37810765394D6BF9FD0626BECCF37A842639C6BDFB95BCC1045422058F05
25,146,477 UART: [art] SIG.S = 1B46669D51EAB492A35502FF5AA4B7956A00B13E3156EF18065D434A1507EE1051A7759E096B31FD755177EBE4FC16B8
26,125,354 UART: Caliptra RT
26,126,061 UART: [state] CFI Enabled
26,243,235 UART: [rt] RT listening for mailbox commands...
26,245,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,275,157 UART: [rt]cmd =0x44504543, len=24
26,301,316 >>> mbox cmd response data (40 bytes)
26,302,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,904 UART: [rt]cmd =0x44504543, len=24
26,357,766 >>> mbox cmd response data (40 bytes)
26,358,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,388,097 UART: [rt]cmd =0x44504543, len=24
26,414,353 >>> mbox cmd response data (40 bytes)
26,415,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,445,136 UART: [rt]cmd =0x44504543, len=24
26,471,379 >>> mbox cmd response data (40 bytes)
26,472,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,502,193 UART: [rt]cmd =0x44504543, len=24
26,528,413 >>> mbox cmd response data (40 bytes)
26,529,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,559,045 UART: [rt]cmd =0x44504543, len=24
26,585,023 >>> mbox cmd response data (40 bytes)
26,585,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,615,420 UART: [rt]cmd =0x44504543, len=24
26,641,819 >>> mbox cmd response data (40 bytes)
26,642,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,406 UART: [rt]cmd =0x44504543, len=24
26,698,411 >>> mbox cmd response data (40 bytes)
26,699,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,728,931 UART: [rt]cmd =0x44504543, len=24
26,755,153 >>> mbox cmd response data (40 bytes)
26,755,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,785,507 UART: [rt]cmd =0x44504543, len=24
26,811,760 >>> mbox cmd response data (40 bytes)
26,812,406 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,842,572 UART: [rt]cmd =0x44504543, len=24
26,868,862 >>> mbox cmd response data (40 bytes)
26,869,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,899,429 UART: [rt]cmd =0x44504543, len=24
26,925,370 >>> mbox cmd response data (40 bytes)
26,925,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,955,895 UART: [rt]cmd =0x44504543, len=24
26,982,460 >>> mbox cmd response data (40 bytes)
26,983,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,012,840 UART: [rt]cmd =0x44504543, len=24
27,038,869 >>> mbox cmd response data (40 bytes)
27,039,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,069,606 UART: [rt]cmd =0x44504543, len=24
27,096,094 >>> mbox cmd response data (40 bytes)
27,096,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,126,677 UART: [rt]cmd =0x44504543, len=24
27,133,060 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,604 writing to cptra_bootfsm_go
3,752,375 ready_for_fw is high
3,752,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,933,114 >>> mbox cmd response: success
19,189,946 UART:
19,190,376 UART: Running Caliptra FMC ...
19,191,519 UART:
19,191,683 UART: [state] CFI Enabled
19,199,042 UART: [fht] FMC Alias Private Key: 7
20,955,440 UART: [art] Extend RT PCRs Done
20,956,666 UART: [art] Lock RT PCRs Done
20,958,374 UART: [art] Populate DV Done
20,963,746 UART: [fht] FMC Alias Private Key: 7
20,965,192 UART: [art] Derive CDI
20,965,971 UART: [art] Store in in slot 0x4
21,008,750 UART: [art] Derive Key Pair
21,009,795 UART: [art] Store priv key in slot 0x5
23,436,010 UART: [art] Derive Key Pair - Done
23,449,124 UART: [art] Signing Cert with AUTHO
23,450,427 UART: RITY.KEYID = 7
25,156,404 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,909 UART: [art] PUB.X = 13C70C9BA06903AF717F5D3C8032AA2E833EFB76CAD7EF3647D94D3D9E7D4CB17D7AB657997B0098FF874E157CB0DB8D
25,165,229 UART: [art] PUB.Y = 14F61308AED30E6CDAB29B016646C746F4618D2BB4EDC0E5B7A0DD7AEE75420316E7F9476A5BFFDA0FF9D6CBC71B0522
25,172,462 UART: [art] SIG.R = AE64B5CC93A169AA84F21A5BF7521135383CDAD28E73B77DDEA4F91249295D2B5B8C509A44C35103788F59BA6E4DA0BD
25,179,860 UART: [art] SIG.S = 1891440853C64B949E668A0464C1153C2C54D4BA15AA014DC4D7105AD94FDAE230DED74EB167AB6242A7E17A0E3764CA
26,158,222 UART: Caliptra RT
26,158,910 UART: [state] CFI Enabled
26,275,882 UART: [rt] RT listening for mailbox commands...
26,277,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,307,871 UART: [rt]cmd =0x44504543, len=24
26,334,094 >>> mbox cmd response data (40 bytes)
26,334,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,364,673 UART: [rt]cmd =0x44504543, len=24
26,391,061 >>> mbox cmd response data (40 bytes)
26,391,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,421,452 UART: [rt]cmd =0x44504543, len=24
26,447,709 >>> mbox cmd response data (40 bytes)
26,448,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,478,278 UART: [rt]cmd =0x44504543, len=24
26,504,446 >>> mbox cmd response data (40 bytes)
26,505,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,534,899 UART: [rt]cmd =0x44504543, len=24
26,561,338 >>> mbox cmd response data (40 bytes)
26,561,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,591,732 UART: [rt]cmd =0x44504543, len=24
26,617,614 >>> mbox cmd response data (40 bytes)
26,618,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,231 UART: [rt]cmd =0x44504543, len=24
26,674,746 >>> mbox cmd response data (40 bytes)
26,675,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,705,441 UART: [rt]cmd =0x44504543, len=24
26,732,209 >>> mbox cmd response data (40 bytes)
26,732,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,762,803 UART: [rt]cmd =0x44504543, len=24
26,789,344 >>> mbox cmd response data (40 bytes)
26,789,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,819,927 UART: [rt]cmd =0x44504543, len=24
26,846,182 >>> mbox cmd response data (40 bytes)
26,846,865 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,876,790 UART: [rt]cmd =0x44504543, len=24
26,902,610 >>> mbox cmd response data (40 bytes)
26,903,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,933,139 UART: [rt]cmd =0x44504543, len=24
26,960,010 >>> mbox cmd response data (40 bytes)
26,960,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,990,378 UART: [rt]cmd =0x44504543, len=24
27,016,421 >>> mbox cmd response data (40 bytes)
27,017,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,046,878 UART: [rt]cmd =0x44504543, len=24
27,073,072 >>> mbox cmd response data (40 bytes)
27,073,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,103,446 UART: [rt]cmd =0x44504543, len=24
27,129,988 >>> mbox cmd response data (40 bytes)
27,130,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,160,351 UART: [rt]cmd =0x44504543, len=24
27,166,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,513 UART: [kat] SHA2-256
882,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,559 UART: [kat] ++
886,711 UART: [kat] sha1
891,019 UART: [kat] SHA2-256
892,957 UART: [kat] SHA2-384
895,836 UART: [kat] SHA2-512-ACC
897,737 UART: [kat] ECC-384
903,328 UART: [kat] HMAC-384Kdf
907,696 UART: [kat] LMS
1,475,892 UART: [kat] --
1,476,537 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 ready_for_fw is high
1,481,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,616 UART: [idev] Erasing UDS.KEYID = 0
1,505,428 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,830 UART: [idev] --
1,515,027 UART: [ldev] ++
1,515,195 UART: [ldev] CDI.KEYID = 6
1,515,558 UART: [ldev] SUBJECT.KEYID = 5
1,515,984 UART: [ldev] AUTHORITY.KEYID = 7
1,516,447 UART: [ldev] FE.KEYID = 1
1,521,621 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,590 UART: [ldev] --
1,585,871 UART: [fwproc] Waiting for Commands...
1,586,492 UART: [fwproc] Received command 0x46574c44
1,587,283 UART: [fwproc] Received Image of size 114084 bytes
2,881,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,225 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,080 >>> mbox cmd response: success
3,074,184 UART: [afmc] ++
3,074,352 UART: [afmc] CDI.KEYID = 6
3,074,714 UART: [afmc] SUBJECT.KEYID = 7
3,075,139 UART: [afmc] AUTHORITY.KEYID = 5
3,109,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,228 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,621 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,311 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,088 UART: [afmc] --
3,153,166 UART: [cold-reset] --
3,153,904 UART: [state] Locking Datavault
3,154,965 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,569 UART: [state] Locking ICCM
3,156,085 UART: [exit] Launching FMC @ 0x40000130
3,161,414 UART:
3,161,430 UART: Running Caliptra FMC ...
3,161,838 UART:
3,161,892 UART: [state] CFI Enabled
3,172,591 UART: [fht] FMC Alias Private Key: 7
3,280,088 UART: [art] Extend RT PCRs Done
3,280,516 UART: [art] Lock RT PCRs Done
3,281,964 UART: [art] Populate DV Done
3,290,317 UART: [fht] FMC Alias Private Key: 7
3,291,265 UART: [art] Derive CDI
3,291,545 UART: [art] Store in in slot 0x4
3,377,168 UART: [art] Derive Key Pair
3,377,528 UART: [art] Store priv key in slot 0x5
3,390,390 UART: [art] Derive Key Pair - Done
3,405,234 UART: [art] Signing Cert with AUTHO
3,405,714 UART: RITY.KEYID = 7
3,420,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,421,565 UART: [art] PUB.X = CD532E61A501543A6A4256432A70DB31E081B2AA75BD09EAB697BD16408ABA9607DCEC444FFE0D0CA088D62B17AC898F
3,428,334 UART: [art] PUB.Y = 29D3E0BFB492EE0DBD87175C9CE5046494AEF74A90BB59EE9B946E49D62652FB176F814C005AF4B8211DB905FE2B24F7
3,435,265 UART: [art] SIG.R = D02EAE28E5CF76AC72FBBEFC4A3EE195E4678EB8B41BF10C3BA10D196C7F313424EF8A4E428D4E8581F83F3398D5510E
3,442,044 UART: [art] SIG.S = D7FA57E98790223139C55C14EB938F962174C23610E500FF13B4545C5F0142F4B8DDA63DC97989736AB8F2C1CCC3B6C7
3,465,834 UART: Caliptra RT
3,466,087 UART: [state] CFI Enabled
3,574,563 UART: [rt] RT listening for mailbox commands...
3,575,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,347 UART: [rt]cmd =0x44504543, len=24
3,631,265 >>> mbox cmd response data (40 bytes)
3,631,266 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,881 UART: [rt]cmd =0x44504543, len=24
3,687,317 >>> mbox cmd response data (40 bytes)
3,687,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,805 UART: [rt]cmd =0x44504543, len=24
3,742,955 >>> mbox cmd response data (40 bytes)
3,742,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,585 UART: [rt]cmd =0x44504543, len=24
3,798,745 >>> mbox cmd response data (40 bytes)
3,798,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,423 UART: [rt]cmd =0x44504543, len=24
3,854,561 >>> mbox cmd response data (40 bytes)
3,854,562 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,007 UART: [rt]cmd =0x44504543, len=24
3,910,257 >>> mbox cmd response data (40 bytes)
3,910,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,551 UART: [rt]cmd =0x44504543, len=24
3,965,671 >>> mbox cmd response data (40 bytes)
3,965,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,085 UART: [rt]cmd =0x44504543, len=24
4,021,365 >>> mbox cmd response data (40 bytes)
4,021,366 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,050,651 UART: [rt]cmd =0x44504543, len=24
4,077,089 >>> mbox cmd response data (40 bytes)
4,077,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,106,601 UART: [rt]cmd =0x44504543, len=24
4,133,021 >>> mbox cmd response data (40 bytes)
4,133,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,495 UART: [rt]cmd =0x44504543, len=24
4,189,185 >>> mbox cmd response data (40 bytes)
4,189,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,218,491 UART: [rt]cmd =0x44504543, len=24
4,244,447 >>> mbox cmd response data (40 bytes)
4,244,448 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,613 UART: [rt]cmd =0x44504543, len=24
4,299,879 >>> mbox cmd response data (40 bytes)
4,299,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,329,383 UART: [rt]cmd =0x44504543, len=24
4,355,943 >>> mbox cmd response data (40 bytes)
4,355,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,385,489 UART: [rt]cmd =0x44504543, len=24
4,411,747 >>> mbox cmd response data (40 bytes)
4,411,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,441,085 UART: [rt]cmd =0x44504543, len=24
4,447,959 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,837 ready_for_fw is high
1,362,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,566 >>> mbox cmd response: success
2,986,260 UART:
2,986,276 UART: Running Caliptra FMC ...
2,986,684 UART:
2,986,738 UART: [state] CFI Enabled
2,997,413 UART: [fht] FMC Alias Private Key: 7
3,105,284 UART: [art] Extend RT PCRs Done
3,105,712 UART: [art] Lock RT PCRs Done
3,107,360 UART: [art] Populate DV Done
3,115,717 UART: [fht] FMC Alias Private Key: 7
3,116,867 UART: [art] Derive CDI
3,117,147 UART: [art] Store in in slot 0x4
3,202,808 UART: [art] Derive Key Pair
3,203,168 UART: [art] Store priv key in slot 0x5
3,216,390 UART: [art] Derive Key Pair - Done
3,231,326 UART: [art] Signing Cert with AUTHO
3,231,806 UART: RITY.KEYID = 7
3,246,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,559 UART: [art] PUB.X = 6432462BB8F9D28F7297FA1F4F0B189B7FE12FE7B26388A023280876EC6E461622DBEEDCDE4F25283AB490203D07C4F9
3,254,326 UART: [art] PUB.Y = 464518C6CA19ABBFF8E7687BFF22525720B4D26EB141648C3D2A8A02476BA0510A831E55DABC8BA547A08A9085C2376E
3,261,276 UART: [art] SIG.R = DC89C9425766B4D0F134C41D8A9A441E442A6825E01A22909855535633AC3309C440C1B6E00F542364BF1F87743E62FA
3,268,032 UART: [art] SIG.S = 5CC4D17EF1C5EF80A98D4039ABD7F6EF83D594FBE3DC2085052CADFB86EE5874F88C0E06EB2E8813EA49BAE87CB6F949
3,292,374 UART: Caliptra RT
3,292,627 UART: [state] CFI Enabled
3,401,366 UART: [rt] RT listening for mailbox commands...
3,402,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,872 UART: [rt]cmd =0x44504543, len=24
3,457,688 >>> mbox cmd response data (40 bytes)
3,457,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,258 UART: [rt]cmd =0x44504543, len=24
3,513,088 >>> mbox cmd response data (40 bytes)
3,513,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,618 UART: [rt]cmd =0x44504543, len=24
3,568,198 >>> mbox cmd response data (40 bytes)
3,568,199 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,774 UART: [rt]cmd =0x44504543, len=24
3,624,102 >>> mbox cmd response data (40 bytes)
3,624,103 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,578 UART: [rt]cmd =0x44504543, len=24
3,679,862 >>> mbox cmd response data (40 bytes)
3,679,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,222 UART: [rt]cmd =0x44504543, len=24
3,735,132 >>> mbox cmd response data (40 bytes)
3,735,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,432 UART: [rt]cmd =0x44504543, len=24
3,790,472 >>> mbox cmd response data (40 bytes)
3,790,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,146 UART: [rt]cmd =0x44504543, len=24
3,846,416 >>> mbox cmd response data (40 bytes)
3,846,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,966 UART: [rt]cmd =0x44504543, len=24
3,902,724 >>> mbox cmd response data (40 bytes)
3,902,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,342 UART: [rt]cmd =0x44504543, len=24
3,959,018 >>> mbox cmd response data (40 bytes)
3,959,019 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,662 UART: [rt]cmd =0x44504543, len=24
4,014,958 >>> mbox cmd response data (40 bytes)
4,014,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,270 UART: [rt]cmd =0x44504543, len=24
4,070,334 >>> mbox cmd response data (40 bytes)
4,070,335 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,099,812 UART: [rt]cmd =0x44504543, len=24
4,126,184 >>> mbox cmd response data (40 bytes)
4,126,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,924 UART: [rt]cmd =0x44504543, len=24
4,182,586 >>> mbox cmd response data (40 bytes)
4,182,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,212,082 UART: [rt]cmd =0x44504543, len=24
4,238,594 >>> mbox cmd response data (40 bytes)
4,238,595 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,182 UART: [rt]cmd =0x44504543, len=24
4,275,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,846 UART: [kat] SHA2-256
881,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,892 UART: [kat] ++
886,044 UART: [kat] sha1
890,260 UART: [kat] SHA2-256
892,198 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,728 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,791 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,324 UART: [ldev] ++
1,515,492 UART: [ldev] CDI.KEYID = 6
1,515,855 UART: [ldev] SUBJECT.KEYID = 5
1,516,281 UART: [ldev] AUTHORITY.KEYID = 7
1,516,744 UART: [ldev] FE.KEYID = 1
1,522,032 UART: [ldev] Erasing FE.KEYID = 1
1,547,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,189 UART: [ldev] --
1,586,630 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 114084 bytes
2,883,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,399 >>> mbox cmd response: success
3,076,629 UART: [afmc] ++
3,076,797 UART: [afmc] CDI.KEYID = 6
3,077,159 UART: [afmc] SUBJECT.KEYID = 7
3,077,584 UART: [afmc] AUTHORITY.KEYID = 5
3,112,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,258 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,948 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,967 UART: [afmc] --
3,156,085 UART: [cold-reset] --
3,156,929 UART: [state] Locking Datavault
3,158,298 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,902 UART: [state] Locking ICCM
3,159,384 UART: [exit] Launching FMC @ 0x40000130
3,164,713 UART:
3,164,729 UART: Running Caliptra FMC ...
3,165,137 UART:
3,165,280 UART: [state] CFI Enabled
3,175,539 UART: [fht] FMC Alias Private Key: 7
3,283,678 UART: [art] Extend RT PCRs Done
3,284,106 UART: [art] Lock RT PCRs Done
3,285,564 UART: [art] Populate DV Done
3,293,563 UART: [fht] FMC Alias Private Key: 7
3,294,691 UART: [art] Derive CDI
3,294,971 UART: [art] Store in in slot 0x4
3,380,542 UART: [art] Derive Key Pair
3,380,902 UART: [art] Store priv key in slot 0x5
3,394,154 UART: [art] Derive Key Pair - Done
3,408,712 UART: [art] Signing Cert with AUTHO
3,409,192 UART: RITY.KEYID = 7
3,424,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,607 UART: [art] PUB.X = 6558998B5417BDDA18E8D41915766E6233A09217F691F0D063862DEDA0B9F842CE1D4E032F314C3D66220549B62EAB20
3,432,367 UART: [art] PUB.Y = 5157954B36FD6872B32F8A41F2184FEA55F9521E22C400E0B6250D01366515FE03B1039B91525F7D962DCC68D74F6CBE
3,439,281 UART: [art] SIG.R = 3F582883405AA66F28B1114BF2BB5D1A79BFB93E6445BCE6FA231044F6070A28F1B1BF6C7FF4F874F86209BFAB447DC0
3,446,054 UART: [art] SIG.S = 686057CA13A61B72BA71CFF6C544EA853ED1D2B16E0E18596BA4E8860B6B9FBC41D78555FE9A404621595C3100C5D731
3,470,223 UART: Caliptra RT
3,470,568 UART: [state] CFI Enabled
3,579,532 UART: [rt] RT listening for mailbox commands...
3,580,202 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,034 UART: [rt]cmd =0x44504543, len=24
3,636,208 >>> mbox cmd response data (40 bytes)
3,636,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,740 UART: [rt]cmd =0x44504543, len=24
3,692,228 >>> mbox cmd response data (40 bytes)
3,692,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,744 UART: [rt]cmd =0x44504543, len=24
3,747,776 >>> mbox cmd response data (40 bytes)
3,747,777 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,406 UART: [rt]cmd =0x44504543, len=24
3,803,990 >>> mbox cmd response data (40 bytes)
3,803,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,582 UART: [rt]cmd =0x44504543, len=24
3,859,754 >>> mbox cmd response data (40 bytes)
3,859,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,266 UART: [rt]cmd =0x44504543, len=24
3,915,002 >>> mbox cmd response data (40 bytes)
3,915,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,432 UART: [rt]cmd =0x44504543, len=24
3,970,662 >>> mbox cmd response data (40 bytes)
3,970,663 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,010 UART: [rt]cmd =0x44504543, len=24
4,026,530 >>> mbox cmd response data (40 bytes)
4,026,531 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,074 UART: [rt]cmd =0x44504543, len=24
4,082,628 >>> mbox cmd response data (40 bytes)
4,082,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,111,948 UART: [rt]cmd =0x44504543, len=24
4,138,460 >>> mbox cmd response data (40 bytes)
4,138,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,746 UART: [rt]cmd =0x44504543, len=24
4,194,476 >>> mbox cmd response data (40 bytes)
4,194,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,130 UART: [rt]cmd =0x44504543, len=24
4,250,104 >>> mbox cmd response data (40 bytes)
4,250,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,592 UART: [rt]cmd =0x44504543, len=24
4,305,968 >>> mbox cmd response data (40 bytes)
4,305,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,480 UART: [rt]cmd =0x44504543, len=24
4,362,112 >>> mbox cmd response data (40 bytes)
4,362,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,391,832 UART: [rt]cmd =0x44504543, len=24
4,418,010 >>> mbox cmd response data (40 bytes)
4,418,011 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,672 UART: [rt]cmd =0x44504543, len=24
4,455,062 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,434 ready_for_fw is high
1,362,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,871 >>> mbox cmd response: success
2,986,227 UART:
2,986,243 UART: Running Caliptra FMC ...
2,986,651 UART:
2,986,794 UART: [state] CFI Enabled
2,997,073 UART: [fht] FMC Alias Private Key: 7
3,105,168 UART: [art] Extend RT PCRs Done
3,105,596 UART: [art] Lock RT PCRs Done
3,107,320 UART: [art] Populate DV Done
3,115,569 UART: [fht] FMC Alias Private Key: 7
3,116,499 UART: [art] Derive CDI
3,116,779 UART: [art] Store in in slot 0x4
3,202,188 UART: [art] Derive Key Pair
3,202,548 UART: [art] Store priv key in slot 0x5
3,215,552 UART: [art] Derive Key Pair - Done
3,230,706 UART: [art] Signing Cert with AUTHO
3,231,186 UART: RITY.KEYID = 7
3,246,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,261 UART: [art] PUB.X = 98AD6F5A70289D6536FF433BEDA4A19F8A22299367352D672D2A17C0EC87CAF58AD328B49D72F461FACE4D39B5F3CE81
3,254,043 UART: [art] PUB.Y = 73C09717874A1EA5BD353408B3048324C11E3773DDAB62D9FBD8DF2808B1176A3225F0BF8644A40E834A9234C6205DB2
3,260,979 UART: [art] SIG.R = B74294CA182CF97D0A7850ECA9D1FFB99BF3BBDAF5933F370633F8841A92E844A80D4AE74425C2A18BD7DCE8449BF672
3,267,754 UART: [art] SIG.S = 4CCE28B309C9B7551C9519B81D2C4C86B4B6F181A959375E978484050F58ECA0E8B4CBC052D5DCC051724E7A47450281
3,291,727 UART: Caliptra RT
3,292,072 UART: [state] CFI Enabled
3,400,091 UART: [rt] RT listening for mailbox commands...
3,400,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,507 UART: [rt]cmd =0x44504543, len=24
3,456,887 >>> mbox cmd response data (40 bytes)
3,456,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,563 UART: [rt]cmd =0x44504543, len=24
3,512,707 >>> mbox cmd response data (40 bytes)
3,512,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,041 UART: [rt]cmd =0x44504543, len=24
3,568,267 >>> mbox cmd response data (40 bytes)
3,568,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,651 UART: [rt]cmd =0x44504543, len=24
3,623,765 >>> mbox cmd response data (40 bytes)
3,623,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,653,263 UART: [rt]cmd =0x44504543, len=24
3,679,423 >>> mbox cmd response data (40 bytes)
3,679,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,175 UART: [rt]cmd =0x44504543, len=24
3,735,987 >>> mbox cmd response data (40 bytes)
3,735,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,433 UART: [rt]cmd =0x44504543, len=24
3,791,621 >>> mbox cmd response data (40 bytes)
3,791,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,917 UART: [rt]cmd =0x44504543, len=24
3,847,283 >>> mbox cmd response data (40 bytes)
3,847,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,527 UART: [rt]cmd =0x44504543, len=24
3,902,623 >>> mbox cmd response data (40 bytes)
3,902,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,091 UART: [rt]cmd =0x44504543, len=24
3,958,827 >>> mbox cmd response data (40 bytes)
3,958,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,413 UART: [rt]cmd =0x44504543, len=24
4,015,037 >>> mbox cmd response data (40 bytes)
4,015,038 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,577 UART: [rt]cmd =0x44504543, len=24
4,070,683 >>> mbox cmd response data (40 bytes)
4,070,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,100,247 UART: [rt]cmd =0x44504543, len=24
4,126,567 >>> mbox cmd response data (40 bytes)
4,126,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,155,955 UART: [rt]cmd =0x44504543, len=24
4,182,629 >>> mbox cmd response data (40 bytes)
4,182,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,212,039 UART: [rt]cmd =0x44504543, len=24
4,238,161 >>> mbox cmd response data (40 bytes)
4,238,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,739 UART: [rt]cmd =0x44504543, len=24
4,274,679 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,701 UART: [kat] SHA2-256
903,641 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
917,810 UART: [kat] HMAC-384Kdf
922,556 UART: [kat] LMS
1,170,884 UART: [kat] --
1,171,883 UART: [cold-reset] ++
1,172,447 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 ready_for_fw is high
1,176,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,452 UART: [idev] Erasing UDS.KEYID = 0
1,201,743 UART: [idev] Sha1 KeyId Algorithm
1,210,209 UART: [idev] --
1,211,263 UART: [ldev] ++
1,211,431 UART: [ldev] CDI.KEYID = 6
1,211,794 UART: [ldev] SUBJECT.KEYID = 5
1,212,220 UART: [ldev] AUTHORITY.KEYID = 7
1,212,683 UART: [ldev] FE.KEYID = 1
1,217,791 UART: [ldev] Erasing FE.KEYID = 1
1,243,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,867 UART: [ldev] --
1,283,170 UART: [fwproc] Wait for Commands...
1,283,894 UART: [fwproc] Recv command 0x46574c44
1,284,622 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,083 >>> mbox cmd response: success
2,772,187 UART: [afmc] ++
2,772,355 UART: [afmc] CDI.KEYID = 6
2,772,717 UART: [afmc] SUBJECT.KEYID = 7
2,773,142 UART: [afmc] AUTHORITY.KEYID = 5
2,808,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,216 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,042 UART: [afmc] --
2,852,150 UART: [cold-reset] --
2,852,860 UART: [state] Locking Datavault
2,853,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,439 UART: [state] Locking ICCM
2,854,891 UART: [exit] Launching FMC @ 0x40000130
2,860,220 UART:
2,860,236 UART: Running Caliptra FMC ...
2,860,644 UART:
2,860,698 UART: [state] CFI Enabled
2,871,161 UART: [fht] FMC Alias Private Key: 7
2,978,622 UART: [art] Extend RT PCRs Done
2,979,050 UART: [art] Lock RT PCRs Done
2,980,566 UART: [art] Populate DV Done
2,988,775 UART: [fht] FMC Alias Private Key: 7
2,989,875 UART: [art] Derive CDI
2,990,155 UART: [art] Store in in slot 0x4
3,076,002 UART: [art] Derive Key Pair
3,076,362 UART: [art] Store priv key in slot 0x5
3,089,818 UART: [art] Derive Key Pair - Done
3,104,564 UART: [art] Signing Cert with AUTHO
3,105,044 UART: RITY.KEYID = 7
3,120,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,069 UART: [art] PUB.X = 58F66052ECA780789A53ACE271D691FA9F4256180B23E5728C1C2AE7B675E2F7549AFD32CD78E356334B5EB50DCF20B1
3,127,839 UART: [art] PUB.Y = 19A1B0B59D3817B9116C2BEA5F545CEE66C33C9871382F0FC37D836BBB2E1B225C8EC1B5C42A714A6C5A1695B2F2FCAA
3,134,802 UART: [art] SIG.R = C3689DDFF934A74DA2206A80FE21509F21A4F7A1E6C1FAE06A0747D1BF07A31F3F9A6178AD2D13645364C6A08226BDFE
3,141,578 UART: [art] SIG.S = 0DEB73C625090AC350F105B8154843E0C9C72B1339B17B5B6A097D3B67E13BEB9E6932387688EC94D59CDF6E188AF0CB
3,164,792 UART: Caliptra RT
3,165,045 UART: [state] CFI Enabled
3,274,120 UART: [rt] RT listening for mailbox commands...
3,274,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,924 UART: [rt]cmd =0x44504543, len=24
3,330,976 >>> mbox cmd response data (40 bytes)
3,330,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,564 UART: [rt]cmd =0x44504543, len=24
3,387,212 >>> mbox cmd response data (40 bytes)
3,387,213 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,644 UART: [rt]cmd =0x44504543, len=24
3,442,890 >>> mbox cmd response data (40 bytes)
3,442,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,224 UART: [rt]cmd =0x44504543, len=24
3,498,602 >>> mbox cmd response data (40 bytes)
3,498,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,374 UART: [rt]cmd =0x44504543, len=24
3,554,216 >>> mbox cmd response data (40 bytes)
3,554,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,946 UART: [rt]cmd =0x44504543, len=24
3,610,556 >>> mbox cmd response data (40 bytes)
3,610,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,918 UART: [rt]cmd =0x44504543, len=24
3,666,262 >>> mbox cmd response data (40 bytes)
3,666,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,772 UART: [rt]cmd =0x44504543, len=24
3,721,792 >>> mbox cmd response data (40 bytes)
3,721,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,458 UART: [rt]cmd =0x44504543, len=24
3,777,458 >>> mbox cmd response data (40 bytes)
3,777,459 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,850 UART: [rt]cmd =0x44504543, len=24
3,832,942 >>> mbox cmd response data (40 bytes)
3,832,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,488 UART: [rt]cmd =0x44504543, len=24
3,888,438 >>> mbox cmd response data (40 bytes)
3,888,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,802 UART: [rt]cmd =0x44504543, len=24
3,944,632 >>> mbox cmd response data (40 bytes)
3,944,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,152 UART: [rt]cmd =0x44504543, len=24
4,000,516 >>> mbox cmd response data (40 bytes)
4,000,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,030,036 UART: [rt]cmd =0x44504543, len=24
4,056,366 >>> mbox cmd response data (40 bytes)
4,056,367 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,880 UART: [rt]cmd =0x44504543, len=24
4,112,272 >>> mbox cmd response data (40 bytes)
4,112,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,778 UART: [rt]cmd =0x44504543, len=24
4,148,950 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 ready_for_fw is high
1,060,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,708 >>> mbox cmd response: success
2,684,474 UART:
2,684,490 UART: Running Caliptra FMC ...
2,684,898 UART:
2,684,952 UART: [state] CFI Enabled
2,695,225 UART: [fht] FMC Alias Private Key: 7
2,802,674 UART: [art] Extend RT PCRs Done
2,803,102 UART: [art] Lock RT PCRs Done
2,804,394 UART: [art] Populate DV Done
2,812,633 UART: [fht] FMC Alias Private Key: 7
2,813,759 UART: [art] Derive CDI
2,814,039 UART: [art] Store in in slot 0x4
2,899,728 UART: [art] Derive Key Pair
2,900,088 UART: [art] Store priv key in slot 0x5
2,912,920 UART: [art] Derive Key Pair - Done
2,927,881 UART: [art] Signing Cert with AUTHO
2,928,361 UART: RITY.KEYID = 7
2,943,773 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,538 UART: [art] PUB.X = 3FB4A1A579DBDD4305874F37DDCCAC619FA25141101CA6F605D1D9EED367A1EF14E6DF3DAFFE15041EC30BDE7006739C
2,951,315 UART: [art] PUB.Y = EC912D39163BEC5EAEE8E106ED888ABD8A86DEF3E469FEE8C9A09888CB1EA0C8D958DAA2360E7D042E0C4090D56BC920
2,958,275 UART: [art] SIG.R = 528C0691F1F64DFB4B04070BD7517DEEE44A395660755A952031156441EDC0B6AB0E280DABE31F2274C04A855B7248D3
2,965,027 UART: [art] SIG.S = 140073E4CCA246D9A0BAFE31F9A50AD541F7D1478D6056183D6A26132642489A8C775A07D9B82C0EE1B15793E705BCDD
2,989,274 UART: Caliptra RT
2,989,527 UART: [state] CFI Enabled
3,096,988 UART: [rt] RT listening for mailbox commands...
3,097,658 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,504 UART: [rt]cmd =0x44504543, len=24
3,153,402 >>> mbox cmd response data (40 bytes)
3,153,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,918 UART: [rt]cmd =0x44504543, len=24
3,209,416 >>> mbox cmd response data (40 bytes)
3,209,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,238,976 UART: [rt]cmd =0x44504543, len=24
3,265,118 >>> mbox cmd response data (40 bytes)
3,265,119 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,580 UART: [rt]cmd =0x44504543, len=24
3,320,486 >>> mbox cmd response data (40 bytes)
3,320,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,100 UART: [rt]cmd =0x44504543, len=24
3,376,088 >>> mbox cmd response data (40 bytes)
3,376,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,708 UART: [rt]cmd =0x44504543, len=24
3,431,848 >>> mbox cmd response data (40 bytes)
3,431,849 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,466 UART: [rt]cmd =0x44504543, len=24
3,487,446 >>> mbox cmd response data (40 bytes)
3,487,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,956 UART: [rt]cmd =0x44504543, len=24
3,543,496 >>> mbox cmd response data (40 bytes)
3,543,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,754 UART: [rt]cmd =0x44504543, len=24
3,599,404 >>> mbox cmd response data (40 bytes)
3,599,405 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,878 UART: [rt]cmd =0x44504543, len=24
3,655,350 >>> mbox cmd response data (40 bytes)
3,655,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,714 UART: [rt]cmd =0x44504543, len=24
3,710,818 >>> mbox cmd response data (40 bytes)
3,710,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,364 UART: [rt]cmd =0x44504543, len=24
3,766,948 >>> mbox cmd response data (40 bytes)
3,766,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,328 UART: [rt]cmd =0x44504543, len=24
3,822,578 >>> mbox cmd response data (40 bytes)
3,822,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,058 UART: [rt]cmd =0x44504543, len=24
3,878,136 >>> mbox cmd response data (40 bytes)
3,878,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,734 UART: [rt]cmd =0x44504543, len=24
3,933,752 >>> mbox cmd response data (40 bytes)
3,933,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,258 UART: [rt]cmd =0x44504543, len=24
3,970,386 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
918,199 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,718 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 ready_for_fw is high
1,176,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,190 UART: [idev] --
1,211,304 UART: [ldev] ++
1,211,472 UART: [ldev] CDI.KEYID = 6
1,211,835 UART: [ldev] SUBJECT.KEYID = 5
1,212,261 UART: [ldev] AUTHORITY.KEYID = 7
1,212,724 UART: [ldev] FE.KEYID = 1
1,218,112 UART: [ldev] Erasing FE.KEYID = 1
1,245,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,194 UART: [ldev] --
1,284,533 UART: [fwproc] Wait for Commands...
1,285,305 UART: [fwproc] Recv command 0x46574c44
1,286,033 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,488 >>> mbox cmd response: success
2,774,670 UART: [afmc] ++
2,774,838 UART: [afmc] CDI.KEYID = 6
2,775,200 UART: [afmc] SUBJECT.KEYID = 7
2,775,625 UART: [afmc] AUTHORITY.KEYID = 5
2,811,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,769 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,895 UART: [afmc] --
2,854,895 UART: [cold-reset] --
2,855,897 UART: [state] Locking Datavault
2,856,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,566 UART: [state] Locking ICCM
2,858,110 UART: [exit] Launching FMC @ 0x40000130
2,863,439 UART:
2,863,455 UART: Running Caliptra FMC ...
2,863,863 UART:
2,864,006 UART: [state] CFI Enabled
2,874,571 UART: [fht] FMC Alias Private Key: 7
2,983,224 UART: [art] Extend RT PCRs Done
2,983,652 UART: [art] Lock RT PCRs Done
2,985,158 UART: [art] Populate DV Done
2,993,387 UART: [fht] FMC Alias Private Key: 7
2,994,327 UART: [art] Derive CDI
2,994,607 UART: [art] Store in in slot 0x4
3,079,944 UART: [art] Derive Key Pair
3,080,304 UART: [art] Store priv key in slot 0x5
3,094,180 UART: [art] Derive Key Pair - Done
3,109,074 UART: [art] Signing Cert with AUTHO
3,109,554 UART: RITY.KEYID = 7
3,125,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,003 UART: [art] PUB.X = DB12B3DCA2E3F218E936A41CA7DAF18FAE8A21F6D901C113D1099BD6A275954E07D981F3CA96447BACF1EC682E416935
3,132,778 UART: [art] PUB.Y = BB990ECEB27D8EA4E2F275FCC38E61C752B69B1ECCA95AD9158321DD590A37C334D4D8FED91D58A0EE97F66E2984FD80
3,139,742 UART: [art] SIG.R = 39A35313DEA2753BC15142D0C9A5FBA3661AEE1147FBC0004B321FB4249B812BD74ED213D0B75117227F2C7B5AD360C2
3,146,496 UART: [art] SIG.S = 4140B5F9F56896943DE699EC28F70DEB771779E21B38F24AE4B77167AB262E74B2ABADF69CB1E9F1023506B8D9E4B30B
3,170,527 UART: Caliptra RT
3,170,872 UART: [state] CFI Enabled
3,279,319 UART: [rt] RT listening for mailbox commands...
3,279,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,909 UART: [rt]cmd =0x44504543, len=24
3,335,725 >>> mbox cmd response data (40 bytes)
3,335,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,149 UART: [rt]cmd =0x44504543, len=24
3,391,267 >>> mbox cmd response data (40 bytes)
3,391,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,899 UART: [rt]cmd =0x44504543, len=24
3,447,135 >>> mbox cmd response data (40 bytes)
3,447,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,437 UART: [rt]cmd =0x44504543, len=24
3,502,889 >>> mbox cmd response data (40 bytes)
3,502,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,035 UART: [rt]cmd =0x44504543, len=24
3,558,387 >>> mbox cmd response data (40 bytes)
3,558,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,167 UART: [rt]cmd =0x44504543, len=24
3,614,413 >>> mbox cmd response data (40 bytes)
3,614,414 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,223 UART: [rt]cmd =0x44504543, len=24
3,670,957 >>> mbox cmd response data (40 bytes)
3,670,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,567 UART: [rt]cmd =0x44504543, len=24
3,726,533 >>> mbox cmd response data (40 bytes)
3,726,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,901 UART: [rt]cmd =0x44504543, len=24
3,782,015 >>> mbox cmd response data (40 bytes)
3,782,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,787 UART: [rt]cmd =0x44504543, len=24
3,838,261 >>> mbox cmd response data (40 bytes)
3,838,262 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,699 UART: [rt]cmd =0x44504543, len=24
3,894,067 >>> mbox cmd response data (40 bytes)
3,894,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,489 UART: [rt]cmd =0x44504543, len=24
3,950,147 >>> mbox cmd response data (40 bytes)
3,950,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,979,799 UART: [rt]cmd =0x44504543, len=24
4,006,473 >>> mbox cmd response data (40 bytes)
4,006,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,036,095 UART: [rt]cmd =0x44504543, len=24
4,061,853 >>> mbox cmd response data (40 bytes)
4,061,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,329 UART: [rt]cmd =0x44504543, len=24
4,117,937 >>> mbox cmd response data (40 bytes)
4,117,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,515 UART: [rt]cmd =0x44504543, len=24
4,154,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 ready_for_fw is high
1,061,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,189 >>> mbox cmd response: success
2,687,077 UART:
2,687,093 UART: Running Caliptra FMC ...
2,687,501 UART:
2,687,644 UART: [state] CFI Enabled
2,698,355 UART: [fht] FMC Alias Private Key: 7
2,806,614 UART: [art] Extend RT PCRs Done
2,807,042 UART: [art] Lock RT PCRs Done
2,808,662 UART: [art] Populate DV Done
2,816,891 UART: [fht] FMC Alias Private Key: 7
2,818,057 UART: [art] Derive CDI
2,818,337 UART: [art] Store in in slot 0x4
2,903,972 UART: [art] Derive Key Pair
2,904,332 UART: [art] Store priv key in slot 0x5
2,917,834 UART: [art] Derive Key Pair - Done
2,932,796 UART: [art] Signing Cert with AUTHO
2,933,276 UART: RITY.KEYID = 7
2,948,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,715 UART: [art] PUB.X = 50377714D23FD2C3C5666F636824536BF534F9D377D773D5B5789C52ACE3F15C87073E3DDA10CA89DBEE46692F322EF0
2,956,484 UART: [art] PUB.Y = DC42247415B8B7619A8093625447B8CC608F41E64C9F3B447A88585C3AE7F23A89E00651AD5FCA0CB7A91E8FCDD47554
2,963,432 UART: [art] SIG.R = 9B4A10F53348FB7A210F706DB434DA9552C54E4921458C2359D6CE7A4618DC014B375865022AACCE5B9C39CA5E9E66A6
2,970,197 UART: [art] SIG.S = CAA6B2307136EF7F3511EA0DEEFA19344AB30B0434B37D23AD7BBE82617216C59A7624689ECA1B58A2CE55DA553B7F9E
2,993,653 UART: Caliptra RT
2,993,998 UART: [state] CFI Enabled
3,102,568 UART: [rt] RT listening for mailbox commands...
3,103,238 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,262 UART: [rt]cmd =0x44504543, len=24
3,159,772 >>> mbox cmd response data (40 bytes)
3,159,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,184 UART: [rt]cmd =0x44504543, len=24
3,215,820 >>> mbox cmd response data (40 bytes)
3,215,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,245,288 UART: [rt]cmd =0x44504543, len=24
3,271,562 >>> mbox cmd response data (40 bytes)
3,271,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,324 UART: [rt]cmd =0x44504543, len=24
3,327,824 >>> mbox cmd response data (40 bytes)
3,327,825 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,144 UART: [rt]cmd =0x44504543, len=24
3,383,514 >>> mbox cmd response data (40 bytes)
3,383,515 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,024 UART: [rt]cmd =0x44504543, len=24
3,439,490 >>> mbox cmd response data (40 bytes)
3,439,491 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,904 UART: [rt]cmd =0x44504543, len=24
3,495,420 >>> mbox cmd response data (40 bytes)
3,495,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,798 UART: [rt]cmd =0x44504543, len=24
3,550,504 >>> mbox cmd response data (40 bytes)
3,550,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,908 UART: [rt]cmd =0x44504543, len=24
3,606,104 >>> mbox cmd response data (40 bytes)
3,606,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,564 UART: [rt]cmd =0x44504543, len=24
3,662,316 >>> mbox cmd response data (40 bytes)
3,662,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,626 UART: [rt]cmd =0x44504543, len=24
3,717,936 >>> mbox cmd response data (40 bytes)
3,717,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,747,546 UART: [rt]cmd =0x44504543, len=24
3,773,806 >>> mbox cmd response data (40 bytes)
3,773,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,374 UART: [rt]cmd =0x44504543, len=24
3,829,504 >>> mbox cmd response data (40 bytes)
3,829,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,098 UART: [rt]cmd =0x44504543, len=24
3,885,312 >>> mbox cmd response data (40 bytes)
3,885,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,894 UART: [rt]cmd =0x44504543, len=24
3,941,236 >>> mbox cmd response data (40 bytes)
3,941,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,470 UART: [rt]cmd =0x44504543, len=24
3,977,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 ready_for_fw is high
1,174,481 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,027 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,785 UART: [fwproc] Recv command 0x46574c44
1,282,518 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,843 >>> mbox cmd response: success
2,771,034 UART: [afmc] ++
2,771,202 UART: [afmc] CDI.KEYID = 6
2,771,565 UART: [afmc] SUBJECT.KEYID = 7
2,771,991 UART: [afmc] AUTHORITY.KEYID = 5
2,807,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,257 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,869 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,588 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,221 UART: [afmc] --
2,850,265 UART: [cold-reset] --
2,851,081 UART: [state] Locking Datavault
2,852,122 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,726 UART: [state] Locking ICCM
2,853,356 UART: [exit] Launching FMC @ 0x40000130
2,858,685 UART:
2,858,701 UART: Running Caliptra FMC ...
2,859,109 UART:
2,859,163 UART: [state] CFI Enabled
2,869,392 UART: [fht] FMC Alias Private Key: 7
2,977,571 UART: [art] Extend RT PCRs Done
2,977,999 UART: [art] Lock RT PCRs Done
2,979,275 UART: [art] Populate DV Done
2,987,474 UART: [fht] FMC Alias Private Key: 7
2,988,528 UART: [art] Derive CDI
2,988,808 UART: [art] Store in in slot 0x4
3,074,349 UART: [art] Derive Key Pair
3,074,709 UART: [art] Store priv key in slot 0x5
3,088,141 UART: [art] Derive Key Pair - Done
3,102,949 UART: [art] Signing Cert with AUTHO
3,103,429 UART: RITY.KEYID = 7
3,118,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,428 UART: [art] PUB.X = A0753E9CE1C77B7BC91C57D81CA9734ACA72765EFEA193097C1BB12E725D036A44ED8F36FEA03CEA3F8C5F0E648636BA
3,126,207 UART: [art] PUB.Y = B2796E866B6F25412D4EDCC55B046BF9C6D7540001C62C56641C53A4AD6796A7757BFB4CF07DF24DCE3A4D02B7BB8747
3,133,136 UART: [art] SIG.R = 15CB4C8FC2CAFDA312F154CD0990F96C500D139104CF0B71669F47214B52208BD1ADA488EB3795903D4DCD01E1F3A58D
3,139,901 UART: [art] SIG.S = 35C5253CEFCDDA8F5596720F6B6AF8939D8107B31A93B8A6F969CEC805F59B073A8AFFF6C6DE56410A774DEE18C4A082
3,163,837 UART: Caliptra RT
3,164,090 UART: [state] CFI Enabled
3,271,485 UART: [rt] RT listening for mailbox commands...
3,272,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,161 UART: [rt]cmd =0x44504543, len=24
3,328,133 >>> mbox cmd response data (40 bytes)
3,328,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,773 UART: [rt]cmd =0x44504543, len=24
3,384,367 >>> mbox cmd response data (40 bytes)
3,384,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,955 UART: [rt]cmd =0x44504543, len=24
3,440,259 >>> mbox cmd response data (40 bytes)
3,440,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,905 UART: [rt]cmd =0x44504543, len=24
3,496,219 >>> mbox cmd response data (40 bytes)
3,496,220 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,757 UART: [rt]cmd =0x44504543, len=24
3,551,935 >>> mbox cmd response data (40 bytes)
3,551,936 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,353 UART: [rt]cmd =0x44504543, len=24
3,607,853 >>> mbox cmd response data (40 bytes)
3,607,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,331 UART: [rt]cmd =0x44504543, len=24
3,663,345 >>> mbox cmd response data (40 bytes)
3,663,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,877 UART: [rt]cmd =0x44504543, len=24
3,719,075 >>> mbox cmd response data (40 bytes)
3,719,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,549 UART: [rt]cmd =0x44504543, len=24
3,774,569 >>> mbox cmd response data (40 bytes)
3,774,570 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,873 UART: [rt]cmd =0x44504543, len=24
3,830,387 >>> mbox cmd response data (40 bytes)
3,830,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,877 UART: [rt]cmd =0x44504543, len=24
3,886,073 >>> mbox cmd response data (40 bytes)
3,886,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,411 UART: [rt]cmd =0x44504543, len=24
3,942,009 >>> mbox cmd response data (40 bytes)
3,942,010 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,447 UART: [rt]cmd =0x44504543, len=24
3,997,767 >>> mbox cmd response data (40 bytes)
3,997,768 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,027,347 UART: [rt]cmd =0x44504543, len=24
4,053,753 >>> mbox cmd response data (40 bytes)
4,053,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,195 UART: [rt]cmd =0x44504543, len=24
4,109,721 >>> mbox cmd response data (40 bytes)
4,109,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,139,113 UART: [rt]cmd =0x44504543, len=24
4,146,517 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,100 ready_for_fw is high
1,056,100 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,521 >>> mbox cmd response: success
2,682,239 UART:
2,682,255 UART: Running Caliptra FMC ...
2,682,663 UART:
2,682,717 UART: [state] CFI Enabled
2,693,224 UART: [fht] FMC Alias Private Key: 7
2,801,461 UART: [art] Extend RT PCRs Done
2,801,889 UART: [art] Lock RT PCRs Done
2,803,085 UART: [art] Populate DV Done
2,811,292 UART: [fht] FMC Alias Private Key: 7
2,812,474 UART: [art] Derive CDI
2,812,754 UART: [art] Store in in slot 0x4
2,898,493 UART: [art] Derive Key Pair
2,898,853 UART: [art] Store priv key in slot 0x5
2,912,091 UART: [art] Derive Key Pair - Done
2,927,008 UART: [art] Signing Cert with AUTHO
2,927,488 UART: RITY.KEYID = 7
2,942,780 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,545 UART: [art] PUB.X = C2F3EECA76A42CA20D92BE211367ABEDA46816BA5ACC9465454BDCD4F9DED1CAFD2E4642B033387BC8F25DAB6FB12D0E
2,950,339 UART: [art] PUB.Y = EAD8CF8494CFC609D94D9A32949769A931002A77113EA9C082A22A9D05C4F7D6829213B565553D5F073E864C3D021CBD
2,957,255 UART: [art] SIG.R = 8E82FDE7529F27F19DBD48A6BDD9C177E261AFA1BD5B585F47D3C108765E8CFAADF9AC182499A3A53B594050E61A47C9
2,964,038 UART: [art] SIG.S = 5E45A979832D93187731F77AC1E97A3BA0AD5EBB81A230A65E1113865384B405CA152AE08EEE6FA4877649B09F100A76
2,987,923 UART: Caliptra RT
2,988,176 UART: [state] CFI Enabled
3,096,633 UART: [rt] RT listening for mailbox commands...
3,097,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,005 UART: [rt]cmd =0x44504543, len=24
3,153,027 >>> mbox cmd response data (40 bytes)
3,153,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,703 UART: [rt]cmd =0x44504543, len=24
3,208,863 >>> mbox cmd response data (40 bytes)
3,208,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,238,537 UART: [rt]cmd =0x44504543, len=24
3,264,703 >>> mbox cmd response data (40 bytes)
3,264,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,029 UART: [rt]cmd =0x44504543, len=24
3,320,289 >>> mbox cmd response data (40 bytes)
3,320,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,553 UART: [rt]cmd =0x44504543, len=24
3,375,491 >>> mbox cmd response data (40 bytes)
3,375,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,841 UART: [rt]cmd =0x44504543, len=24
3,431,191 >>> mbox cmd response data (40 bytes)
3,431,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,603 UART: [rt]cmd =0x44504543, len=24
3,487,001 >>> mbox cmd response data (40 bytes)
3,487,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,377 UART: [rt]cmd =0x44504543, len=24
3,542,287 >>> mbox cmd response data (40 bytes)
3,542,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,653 UART: [rt]cmd =0x44504543, len=24
3,598,171 >>> mbox cmd response data (40 bytes)
3,598,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,441 UART: [rt]cmd =0x44504543, len=24
3,653,521 >>> mbox cmd response data (40 bytes)
3,653,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,047 UART: [rt]cmd =0x44504543, len=24
3,709,485 >>> mbox cmd response data (40 bytes)
3,709,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,019 UART: [rt]cmd =0x44504543, len=24
3,765,273 >>> mbox cmd response data (40 bytes)
3,765,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,865 UART: [rt]cmd =0x44504543, len=24
3,821,123 >>> mbox cmd response data (40 bytes)
3,821,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,850,485 UART: [rt]cmd =0x44504543, len=24
3,876,705 >>> mbox cmd response data (40 bytes)
3,876,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,081 UART: [rt]cmd =0x44504543, len=24
3,932,473 >>> mbox cmd response data (40 bytes)
3,932,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,961,879 UART: [rt]cmd =0x44504543, len=24
3,969,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,918 UART: [kat] ++
896,070 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,937 UART: [kat] SHA2-512-ACC
906,838 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,171,014 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,174,994 ready_for_fw is high
1,174,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,588 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,708 UART: [idev] --
1,209,677 UART: [ldev] ++
1,209,845 UART: [ldev] CDI.KEYID = 6
1,210,209 UART: [ldev] SUBJECT.KEYID = 5
1,210,636 UART: [ldev] AUTHORITY.KEYID = 7
1,211,099 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,689 UART: [ldev] --
1,283,157 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,308 >>> mbox cmd response: success
2,771,403 UART: [afmc] ++
2,771,571 UART: [afmc] CDI.KEYID = 6
2,771,934 UART: [afmc] SUBJECT.KEYID = 7
2,772,360 UART: [afmc] AUTHORITY.KEYID = 5
2,807,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,904 UART: [afmc] --
2,850,970 UART: [cold-reset] --
2,851,726 UART: [state] Locking Datavault
2,853,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,621 UART: [state] Locking ICCM
2,854,221 UART: [exit] Launching FMC @ 0x40000130
2,859,550 UART:
2,859,566 UART: Running Caliptra FMC ...
2,859,974 UART:
2,860,117 UART: [state] CFI Enabled
2,870,798 UART: [fht] FMC Alias Private Key: 7
2,978,813 UART: [art] Extend RT PCRs Done
2,979,241 UART: [art] Lock RT PCRs Done
2,981,029 UART: [art] Populate DV Done
2,989,268 UART: [fht] FMC Alias Private Key: 7
2,990,254 UART: [art] Derive CDI
2,990,534 UART: [art] Store in in slot 0x4
3,075,965 UART: [art] Derive Key Pair
3,076,325 UART: [art] Store priv key in slot 0x5
3,089,181 UART: [art] Derive Key Pair - Done
3,103,592 UART: [art] Signing Cert with AUTHO
3,104,072 UART: RITY.KEYID = 7
3,119,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,243 UART: [art] PUB.X = C079EC0153DFD8BB44068E1B54AC98DECD8D6FB805FA644647A4C485F80D1F7C43AA4DC438721953622A31352CB7BF73
3,127,011 UART: [art] PUB.Y = 7AD901BFEC2851FD57D2042A759E77AF99B3F4497073ED365CD2058D62BB3BE3E5AC410F4E2E1FDA4FF2225BB0DDFF1F
3,133,971 UART: [art] SIG.R = 99C0F2BD43C9130F1804449995CC1A8070CEE44CEBCBA51818BD334D948967C37E34C27F214F20E3B421F8E035330B78
3,140,732 UART: [art] SIG.S = B0906E0A7E20DC8412DF43380C7AF4E5722C23CBB0BAA2BB872BDB67907DB0736CF31622A0BF039C05FD44816FB45BE9
3,163,925 UART: Caliptra RT
3,164,270 UART: [state] CFI Enabled
3,273,136 UART: [rt] RT listening for mailbox commands...
3,273,806 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,706 UART: [rt]cmd =0x44504543, len=24
3,330,512 >>> mbox cmd response data (40 bytes)
3,330,513 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,996 UART: [rt]cmd =0x44504543, len=24
3,386,548 >>> mbox cmd response data (40 bytes)
3,386,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,968 UART: [rt]cmd =0x44504543, len=24
3,442,852 >>> mbox cmd response data (40 bytes)
3,442,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,442 UART: [rt]cmd =0x44504543, len=24
3,498,756 >>> mbox cmd response data (40 bytes)
3,498,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,314 UART: [rt]cmd =0x44504543, len=24
3,554,396 >>> mbox cmd response data (40 bytes)
3,554,397 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,022 UART: [rt]cmd =0x44504543, len=24
3,610,582 >>> mbox cmd response data (40 bytes)
3,610,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,966 UART: [rt]cmd =0x44504543, len=24
3,666,298 >>> mbox cmd response data (40 bytes)
3,666,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,046 UART: [rt]cmd =0x44504543, len=24
3,722,426 >>> mbox cmd response data (40 bytes)
3,722,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,778 UART: [rt]cmd =0x44504543, len=24
3,778,264 >>> mbox cmd response data (40 bytes)
3,778,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,392 UART: [rt]cmd =0x44504543, len=24
3,834,052 >>> mbox cmd response data (40 bytes)
3,834,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,582 UART: [rt]cmd =0x44504543, len=24
3,888,990 >>> mbox cmd response data (40 bytes)
3,888,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,284 UART: [rt]cmd =0x44504543, len=24
3,944,642 >>> mbox cmd response data (40 bytes)
3,944,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,156 UART: [rt]cmd =0x44504543, len=24
4,000,910 >>> mbox cmd response data (40 bytes)
4,000,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,030,258 UART: [rt]cmd =0x44504543, len=24
4,056,742 >>> mbox cmd response data (40 bytes)
4,056,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,358 UART: [rt]cmd =0x44504543, len=24
4,112,720 >>> mbox cmd response data (40 bytes)
4,112,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,226 UART: [rt]cmd =0x44504543, len=24
4,149,358 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,739 ready_for_fw is high
1,056,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,044 >>> mbox cmd response: success
2,680,108 UART:
2,680,124 UART: Running Caliptra FMC ...
2,680,532 UART:
2,680,675 UART: [state] CFI Enabled
2,691,322 UART: [fht] FMC Alias Private Key: 7
2,799,441 UART: [art] Extend RT PCRs Done
2,799,869 UART: [art] Lock RT PCRs Done
2,801,545 UART: [art] Populate DV Done
2,809,928 UART: [fht] FMC Alias Private Key: 7
2,810,904 UART: [art] Derive CDI
2,811,184 UART: [art] Store in in slot 0x4
2,896,627 UART: [art] Derive Key Pair
2,896,987 UART: [art] Store priv key in slot 0x5
2,910,117 UART: [art] Derive Key Pair - Done
2,924,614 UART: [art] Signing Cert with AUTHO
2,925,094 UART: RITY.KEYID = 7
2,940,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,475 UART: [art] PUB.X = 9F3C47001278293D745DE290C656C12C7868584A8148A5365BE2B51CC19A3BF87A74677A3B0AB29E14E2D80320CCE1C6
2,948,215 UART: [art] PUB.Y = 52B0323863528D9C42D99C7599F5CF61B108399F7AEB6FBC2CA22EF3F851E2DB0AA7A3B3B594536CF6BD0D2E65AE64DC
2,955,172 UART: [art] SIG.R = 49E0BF50185731A98540B0CB0600667951A41878F73601C5B65E3F982B2F1443D4112DE884774E9F9248B648BCCD0B6C
2,961,903 UART: [art] SIG.S = 441D670390FBF9E0EB4E15B40E60FC165CDC8832B21390191BA195442DB56F40A211DD7D6BE1D2C1E1FB75706033CB33
2,986,058 UART: Caliptra RT
2,986,403 UART: [state] CFI Enabled
3,094,090 UART: [rt] RT listening for mailbox commands...
3,094,760 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,812 UART: [rt]cmd =0x44504543, len=24
3,151,222 >>> mbox cmd response data (40 bytes)
3,151,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,510 UART: [rt]cmd =0x44504543, len=24
3,206,830 >>> mbox cmd response data (40 bytes)
3,206,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,448 UART: [rt]cmd =0x44504543, len=24
3,262,778 >>> mbox cmd response data (40 bytes)
3,262,779 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,292,018 UART: [rt]cmd =0x44504543, len=24
3,318,092 >>> mbox cmd response data (40 bytes)
3,318,093 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,628 UART: [rt]cmd =0x44504543, len=24
3,373,960 >>> mbox cmd response data (40 bytes)
3,373,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,516 UART: [rt]cmd =0x44504543, len=24
3,430,136 >>> mbox cmd response data (40 bytes)
3,430,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,732 UART: [rt]cmd =0x44504543, len=24
3,486,176 >>> mbox cmd response data (40 bytes)
3,486,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,690 UART: [rt]cmd =0x44504543, len=24
3,541,720 >>> mbox cmd response data (40 bytes)
3,541,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,400 UART: [rt]cmd =0x44504543, len=24
3,597,940 >>> mbox cmd response data (40 bytes)
3,597,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,536 UART: [rt]cmd =0x44504543, len=24
3,653,980 >>> mbox cmd response data (40 bytes)
3,653,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,332 UART: [rt]cmd =0x44504543, len=24
3,709,352 >>> mbox cmd response data (40 bytes)
3,709,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,702 UART: [rt]cmd =0x44504543, len=24
3,765,024 >>> mbox cmd response data (40 bytes)
3,765,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,714 UART: [rt]cmd =0x44504543, len=24
3,821,104 >>> mbox cmd response data (40 bytes)
3,821,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,850,644 UART: [rt]cmd =0x44504543, len=24
3,877,340 >>> mbox cmd response data (40 bytes)
3,877,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,906,880 UART: [rt]cmd =0x44504543, len=24
3,933,090 >>> mbox cmd response data (40 bytes)
3,933,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,602 UART: [rt]cmd =0x44504543, len=24
3,969,860 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,159 UART:
192,532 UART: Running Caliptra ROM ...
193,709 UART:
193,861 UART: [state] CFI Enabled
264,883 UART: [state] LifecycleState = Unprovisioned
266,856 UART: [state] DebugLocked = No
269,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,192 UART: [kat] SHA2-256
443,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,387 UART: [kat] ++
454,865 UART: [kat] sha1
467,145 UART: [kat] SHA2-256
469,842 UART: [kat] SHA2-384
475,126 UART: [kat] SHA2-512-ACC
477,492 UART: [kat] ECC-384
2,768,734 UART: [kat] HMAC-384Kdf
2,800,446 UART: [kat] LMS
3,990,756 UART: [kat] --
3,995,620 UART: [cold-reset] ++
3,997,909 UART: [fht] Storing FHT @ 0x50003400
4,009,530 UART: [idev] ++
4,010,097 UART: [idev] CDI.KEYID = 6
4,011,010 UART: [idev] SUBJECT.KEYID = 7
4,012,278 UART: [idev] UDS.KEYID = 0
4,013,315 ready_for_fw is high
4,013,510 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,595 UART: [idev] Erasing UDS.KEYID = 0
7,345,393 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,158 UART: [idev] --
7,371,413 UART: [ldev] ++
7,371,982 UART: [ldev] CDI.KEYID = 6
7,372,940 UART: [ldev] SUBJECT.KEYID = 5
7,374,150 UART: [ldev] AUTHORITY.KEYID = 7
7,375,377 UART: [ldev] FE.KEYID = 1
7,423,933 UART: [ldev] Erasing FE.KEYID = 1
10,752,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,349 UART: [ldev] --
13,116,031 UART: [fwproc] Waiting for Commands...
13,118,184 UART: [fwproc] Received command 0x46574c44
13,120,370 UART: [fwproc] Received Image of size 113760 bytes
17,162,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,624,301 >>> mbox cmd response: success
17,628,664 UART: [afmc] ++
17,629,268 UART: [afmc] CDI.KEYID = 6
17,630,183 UART: [afmc] SUBJECT.KEYID = 7
17,631,398 UART: [afmc] AUTHORITY.KEYID = 5
20,988,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,957 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,340 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,182 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,579 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,996 UART: [afmc] --
23,360,457 UART: [cold-reset] --
23,364,530 UART: [state] Locking Datavault
23,370,099 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,857 UART: [state] Locking ICCM
23,373,577 UART: [exit] Launching FMC @ 0x40000130
23,381,973 UART:
23,382,205 UART: Running Caliptra FMC ...
23,383,302 UART:
23,383,466 UART: [state] CFI Enabled
23,447,075 UART: [fht] FMC Alias Private Key: 7
25,785,012 UART: [art] Extend RT PCRs Done
25,786,236 UART: [art] Lock RT PCRs Done
25,787,851 UART: [art] Populate DV Done
25,793,256 UART: [fht] FMC Alias Private Key: 7
25,794,730 UART: [art] Derive CDI
25,795,467 UART: [art] Store in in slot 0x4
25,855,315 UART: [art] Derive Key Pair
25,856,350 UART: [art] Store priv key in slot 0x5
29,148,616 UART: [art] Derive Key Pair - Done
29,161,722 UART: [art] Signing Cert with AUTHO
29,163,031 UART: RITY.KEYID = 7
31,450,256 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,762 UART: [art] PUB.X = 1AD33BE022565FADA752859295E340DF3DFBA32F978D537CEF57FD06764FBAEC7058EC856A5D5C0A31CB31A1AD73A8EB
31,459,060 UART: [art] PUB.Y = B3573FDB55D15AFA28BE67447342CD7587367CD8715820EFFA6406035FD3922AE98F9C9E3AFF9CDD2324EB4E50FA8265
31,466,294 UART: [art] SIG.R = 7A237C759D8AC63F72C084B0B1EC830C89C360A8822FC967BAECFB793E55B5078B14D9CCA4AB1AAE905A2409AFE5656E
31,473,680 UART: [art] SIG.S = 706DDDC98F89E8E7813DA1004BD2628BBD92830DA409FC1D01CABDF66AE82C1F06600E56E1C90071A51D6E500328D223
32,778,572 UART: Caliptra RT
32,779,297 UART: [state] CFI Enabled
32,939,527 UART: [rt] RT listening for mailbox commands...
32,941,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,972,070 UART: [rt]cmd =0x44504543, len=24
33,012,884 >>> mbox cmd response data (40 bytes)
33,014,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,044,617 UART: [rt]cmd =0x44504543, len=96
33,104,212 >>> mbox cmd response data (56 bytes)
33,105,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,135,816 UART: [rt]cmd =0x44504543, len=96
33,210,748 >>> mbox cmd response data (56 bytes)
33,211,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,126 UART: [rt]cmd =0x44504543, len=96
33,317,789 >>> mbox cmd response data (56 bytes)
33,318,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,349,003 UART: [rt]cmd =0x44504543, len=96
33,424,814 >>> mbox cmd response data (56 bytes)
33,425,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,456,524 UART: [rt]cmd =0x44504543, len=96
33,531,667 >>> mbox cmd response data (56 bytes)
33,532,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,562,868 UART: [rt]cmd =0x44504543, len=96
33,638,313 >>> mbox cmd response data (56 bytes)
33,639,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,669,645 UART: [rt]cmd =0x44504543, len=96
33,745,167 >>> mbox cmd response data (56 bytes)
33,745,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,776,426 UART: [rt]cmd =0x44504543, len=96
33,852,316 >>> mbox cmd response data (56 bytes)
33,853,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,883,414 UART: [rt]cmd =0x44504543, len=96
33,958,875 >>> mbox cmd response data (56 bytes)
33,959,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,990,160 UART: [rt]cmd =0x44504543, len=96
34,065,531 >>> mbox cmd response data (56 bytes)
34,066,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,097,069 UART: [rt]cmd =0x44504543, len=96
34,172,258 >>> mbox cmd response data (56 bytes)
34,172,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,203,512 UART: [rt]cmd =0x44504543, len=96
34,278,903 >>> mbox cmd response data (56 bytes)
34,279,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,310,045 UART: [rt]cmd =0x44504543, len=96
34,385,560 >>> mbox cmd response data (56 bytes)
34,386,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,416,868 UART: [rt]cmd =0x44504543, len=96
34,492,437 >>> mbox cmd response data (56 bytes)
34,493,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,523,533 UART: [rt]cmd =0x44504543, len=96
34,530,015 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,784,845 ready_for_fw is high
3,785,265 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,867,233 >>> mbox cmd response: success
23,564,439 UART:
23,564,843 UART: Running Caliptra FMC ...
23,565,955 UART:
23,566,110 UART: [state] CFI Enabled
23,633,071 UART: [fht] FMC Alias Private Key: 7
25,971,900 UART: [art] Extend RT PCRs Done
25,973,126 UART: [art] Lock RT PCRs Done
25,975,029 UART: [art] Populate DV Done
25,980,179 UART: [fht] FMC Alias Private Key: 7
25,981,721 UART: [art] Derive CDI
25,982,535 UART: [art] Store in in slot 0x4
26,041,424 UART: [art] Derive Key Pair
26,042,428 UART: [art] Store priv key in slot 0x5
29,335,029 UART: [art] Derive Key Pair - Done
29,347,942 UART: [art] Signing Cert with AUTHO
29,349,251 UART: RITY.KEYID = 7
31,637,359 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,869 UART: [art] PUB.X = 8CAB7A5FA9D19DD21C7EC93AB3000014418BFE00910E70B3DDF59B258D255B735DEFCBE8EA1B5D95279EDC9C4A58FD7D
31,646,083 UART: [art] PUB.Y = 42D502893D76125094BA54C8D8341A474E18D6C18624A314089E1315867772990A9DCFAA44CBAD451DF8729C4982F37E
31,653,315 UART: [art] SIG.R = D37C4EFEA55C67D61D513C00A1AEFD3AA08C143BB7C3E4C26B1A74951AA3451064185E97DE177070E8BE512EE9DFE8F6
31,660,681 UART: [art] SIG.S = E6A8039E4EF9BBB5591358B511A39948169EDD04CDFF45CE5AC69AEEF14FA59BAA883243FB6CA333865C7E071EA019A2
32,965,585 UART: Caliptra RT
32,966,300 UART: [state] CFI Enabled
33,128,652 UART: [rt] RT listening for mailbox commands...
33,130,577 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,161,353 UART: [rt]cmd =0x44504543, len=24
33,202,475 >>> mbox cmd response data (40 bytes)
33,203,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,484 UART: [rt]cmd =0x44504543, len=96
33,294,171 >>> mbox cmd response data (56 bytes)
33,294,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,325,588 UART: [rt]cmd =0x44504543, len=96
33,400,917 >>> mbox cmd response data (56 bytes)
33,401,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,431,888 UART: [rt]cmd =0x44504543, len=96
33,507,774 >>> mbox cmd response data (56 bytes)
33,508,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,539,196 UART: [rt]cmd =0x44504543, len=96
33,614,593 >>> mbox cmd response data (56 bytes)
33,615,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,645,585 UART: [rt]cmd =0x44504543, len=96
33,721,764 >>> mbox cmd response data (56 bytes)
33,722,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,752,834 UART: [rt]cmd =0x44504543, len=96
33,828,410 >>> mbox cmd response data (56 bytes)
33,829,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,859,949 UART: [rt]cmd =0x44504543, len=96
33,935,342 >>> mbox cmd response data (56 bytes)
33,936,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,966,824 UART: [rt]cmd =0x44504543, len=96
34,042,243 >>> mbox cmd response data (56 bytes)
34,042,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,073,670 UART: [rt]cmd =0x44504543, len=96
34,148,465 >>> mbox cmd response data (56 bytes)
34,149,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,179,602 UART: [rt]cmd =0x44504543, len=96
34,255,805 >>> mbox cmd response data (56 bytes)
34,256,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,287,114 UART: [rt]cmd =0x44504543, len=96
34,363,145 >>> mbox cmd response data (56 bytes)
34,363,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,394,399 UART: [rt]cmd =0x44504543, len=96
34,469,842 >>> mbox cmd response data (56 bytes)
34,470,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,501,278 UART: [rt]cmd =0x44504543, len=96
34,576,618 >>> mbox cmd response data (56 bytes)
34,577,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,608,002 UART: [rt]cmd =0x44504543, len=96
34,683,867 >>> mbox cmd response data (56 bytes)
34,684,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,715,001 UART: [rt]cmd =0x44504543, len=96
34,721,767 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,823 writing to cptra_bootfsm_go
193,066 UART:
193,440 UART: Running Caliptra ROM ...
194,536 UART:
604,220 UART: [state] CFI Enabled
618,759 UART: [state] LifecycleState = Unprovisioned
620,740 UART: [state] DebugLocked = No
623,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,271 UART: [kat] SHA2-256
797,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,560 UART: [kat] ++
808,006 UART: [kat] sha1
820,087 UART: [kat] SHA2-256
822,808 UART: [kat] SHA2-384
828,294 UART: [kat] SHA2-512-ACC
830,656 UART: [kat] ECC-384
3,115,862 UART: [kat] HMAC-384Kdf
3,126,611 UART: [kat] LMS
4,316,743 UART: [kat] --
4,320,200 UART: [cold-reset] ++
4,321,923 UART: [fht] Storing FHT @ 0x50003400
4,332,901 UART: [idev] ++
4,333,460 UART: [idev] CDI.KEYID = 6
4,334,436 UART: [idev] SUBJECT.KEYID = 7
4,335,673 UART: [idev] UDS.KEYID = 0
4,336,753 ready_for_fw is high
4,336,973 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,429 UART: [idev] Erasing UDS.KEYID = 0
7,619,651 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,270 UART: [idev] --
7,644,778 UART: [ldev] ++
7,645,346 UART: [ldev] CDI.KEYID = 6
7,646,325 UART: [ldev] SUBJECT.KEYID = 5
7,647,535 UART: [ldev] AUTHORITY.KEYID = 7
7,648,763 UART: [ldev] FE.KEYID = 1
7,660,030 UART: [ldev] Erasing FE.KEYID = 1
10,949,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,366 UART: [ldev] --
13,311,760 UART: [fwproc] Waiting for Commands...
13,313,845 UART: [fwproc] Received command 0x46574c44
13,316,076 UART: [fwproc] Received Image of size 113760 bytes
17,364,672 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,829,615 >>> mbox cmd response: success
17,833,340 UART: [afmc] ++
17,833,937 UART: [afmc] CDI.KEYID = 6
17,834,847 UART: [afmc] SUBJECT.KEYID = 7
17,836,059 UART: [afmc] AUTHORITY.KEYID = 5
21,149,153 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,760 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,079 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,937 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,372 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,123 UART: [afmc] --
23,517,692 UART: [cold-reset] --
23,521,554 UART: [state] Locking Datavault
23,527,505 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,259 UART: [state] Locking ICCM
23,531,689 UART: [exit] Launching FMC @ 0x40000130
23,540,090 UART:
23,540,335 UART: Running Caliptra FMC ...
23,541,434 UART:
23,541,600 UART: [state] CFI Enabled
23,549,586 UART: [fht] FMC Alias Private Key: 7
25,880,028 UART: [art] Extend RT PCRs Done
25,881,256 UART: [art] Lock RT PCRs Done
25,883,069 UART: [art] Populate DV Done
25,888,487 UART: [fht] FMC Alias Private Key: 7
25,890,183 UART: [art] Derive CDI
25,890,913 UART: [art] Store in in slot 0x4
25,933,672 UART: [art] Derive Key Pair
25,934,710 UART: [art] Store priv key in slot 0x5
29,176,660 UART: [art] Derive Key Pair - Done
29,189,932 UART: [art] Signing Cert with AUTHO
29,191,255 UART: RITY.KEYID = 7
31,470,489 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,993 UART: [art] PUB.X = BCEB13895F311A613AFD4B0D18233F096FF655A2BF25DC77BD9D30FD83B1936CA1DEBE91574AC47554210DA35E0E4098
31,479,213 UART: [art] PUB.Y = CF6D365461B3A577ACFEFFFFA30D57416F224AD552DC1B8D5972A688D9177709C1CA42A0894AFE83AF99CE3590C87902
31,486,487 UART: [art] SIG.R = 005B3304C510FCC889D90A9B888809324EB8510C1F8F0C2DE1196C7E8982973A06357CB711269BAE64167F9EEE3ED7D6
31,493,800 UART: [art] SIG.S = 65A78EF56D5384899DDC9A7D56A7DE4D5726F582B9A94046075C568E2C6D2C1007398989F655CBDAE3ABDA82405F7099
32,799,181 UART: Caliptra RT
32,799,895 UART: [state] CFI Enabled
32,916,578 UART: [rt] RT listening for mailbox commands...
32,918,486 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,948,356 UART: [rt]cmd =0x44504543, len=24
32,974,417 >>> mbox cmd response data (40 bytes)
32,975,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,006,175 UART: [rt]cmd =0x44504543, len=96
33,046,265 >>> mbox cmd response data (56 bytes)
33,047,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,077,475 UART: [rt]cmd =0x44504543, len=96
33,118,426 >>> mbox cmd response data (56 bytes)
33,119,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,149,743 UART: [rt]cmd =0x44504543, len=96
33,190,414 >>> mbox cmd response data (56 bytes)
33,191,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,221,778 UART: [rt]cmd =0x44504543, len=96
33,263,310 >>> mbox cmd response data (56 bytes)
33,264,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,294,580 UART: [rt]cmd =0x44504543, len=96
33,336,584 >>> mbox cmd response data (56 bytes)
33,337,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,367,850 UART: [rt]cmd =0x44504543, len=96
33,410,394 >>> mbox cmd response data (56 bytes)
33,411,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,441,838 UART: [rt]cmd =0x44504543, len=96
33,483,837 >>> mbox cmd response data (56 bytes)
33,484,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,514,992 UART: [rt]cmd =0x44504543, len=96
33,557,784 >>> mbox cmd response data (56 bytes)
33,558,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,588,959 UART: [rt]cmd =0x44504543, len=96
33,632,175 >>> mbox cmd response data (56 bytes)
33,632,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,663,394 UART: [rt]cmd =0x44504543, len=96
33,706,407 >>> mbox cmd response data (56 bytes)
33,707,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,737,586 UART: [rt]cmd =0x44504543, len=96
33,781,246 >>> mbox cmd response data (56 bytes)
33,781,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,812,622 UART: [rt]cmd =0x44504543, len=96
33,856,637 >>> mbox cmd response data (56 bytes)
33,857,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,888,023 UART: [rt]cmd =0x44504543, len=96
33,931,385 >>> mbox cmd response data (56 bytes)
33,932,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,962,518 UART: [rt]cmd =0x44504543, len=96
34,006,803 >>> mbox cmd response data (56 bytes)
34,007,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,038,170 UART: [rt]cmd =0x44504543, len=96
34,045,109 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
4,130,309 ready_for_fw is high
4,130,911 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,064,962 >>> mbox cmd response: success
23,701,975 UART:
23,702,382 UART: Running Caliptra FMC ...
23,703,585 UART:
23,703,748 UART: [state] CFI Enabled
23,711,520 UART: [fht] FMC Alias Private Key: 7
26,042,436 UART: [art] Extend RT PCRs Done
26,043,674 UART: [art] Lock RT PCRs Done
26,045,277 UART: [art] Populate DV Done
26,050,816 UART: [fht] FMC Alias Private Key: 7
26,052,459 UART: [art] Derive CDI
26,053,206 UART: [art] Store in in slot 0x4
26,095,860 UART: [art] Derive Key Pair
26,096,868 UART: [art] Store priv key in slot 0x5
29,339,054 UART: [art] Derive Key Pair - Done
29,352,282 UART: [art] Signing Cert with AUTHO
29,353,588 UART: RITY.KEYID = 7
31,633,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,062 UART: [art] PUB.X = BC0B0DA6EB83EFFF13D8C8D645FA1BFEBB176E4706749B36ACDBDB46922AE17C89829BFE65FE8D8C70912DD8F1A1C57E
31,642,312 UART: [art] PUB.Y = B2BEF98CD5F3A8D16AED2690B942C1DECE568834C9245B1FF1D9C72FC42C5A1F92A60FB9CB3DF445CCEF5AFB3C29B72E
31,649,585 UART: [art] SIG.R = 422E2F27B46E78DA07504A4AE7B30BAC9F74D8F4619BC39E7B275D3FDE05F54F7A3921C28DAFECD11B9E107B2560B0E8
31,657,015 UART: [art] SIG.S = 36FEA44A6E7443A86E6A5712B0C5F030BC44A885929BA66F938E475558F4EBE4D22CBAFC0503594BAA9FA3E8F7D826DA
32,962,303 UART: Caliptra RT
32,963,008 UART: [state] CFI Enabled
33,079,969 UART: [rt] RT listening for mailbox commands...
33,081,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,111,806 UART: [rt]cmd =0x44504543, len=24
33,137,546 >>> mbox cmd response data (40 bytes)
33,138,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,169,482 UART: [rt]cmd =0x44504543, len=96
33,210,777 >>> mbox cmd response data (56 bytes)
33,211,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,113 UART: [rt]cmd =0x44504543, len=96
33,282,800 >>> mbox cmd response data (56 bytes)
33,283,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,313,936 UART: [rt]cmd =0x44504543, len=96
33,355,170 >>> mbox cmd response data (56 bytes)
33,355,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,386,445 UART: [rt]cmd =0x44504543, len=96
33,427,011 >>> mbox cmd response data (56 bytes)
33,427,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,458,214 UART: [rt]cmd =0x44504543, len=96
33,499,208 >>> mbox cmd response data (56 bytes)
33,499,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,530,479 UART: [rt]cmd =0x44504543, len=96
33,571,905 >>> mbox cmd response data (56 bytes)
33,572,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,603,120 UART: [rt]cmd =0x44504543, len=96
33,644,427 >>> mbox cmd response data (56 bytes)
33,645,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,675,774 UART: [rt]cmd =0x44504543, len=96
33,717,768 >>> mbox cmd response data (56 bytes)
33,718,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,748,738 UART: [rt]cmd =0x44504543, len=96
33,792,081 >>> mbox cmd response data (56 bytes)
33,792,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,823,319 UART: [rt]cmd =0x44504543, len=96
33,866,231 >>> mbox cmd response data (56 bytes)
33,866,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,897,362 UART: [rt]cmd =0x44504543, len=96
33,940,052 >>> mbox cmd response data (56 bytes)
33,940,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,971,287 UART: [rt]cmd =0x44504543, len=96
34,014,302 >>> mbox cmd response data (56 bytes)
34,014,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,045,525 UART: [rt]cmd =0x44504543, len=96
34,088,711 >>> mbox cmd response data (56 bytes)
34,089,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,119,869 UART: [rt]cmd =0x44504543, len=96
34,164,152 >>> mbox cmd response data (56 bytes)
34,164,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,195,359 UART: [rt]cmd =0x44504543, len=96
34,202,087 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
192,738 UART:
193,095 UART: Running Caliptra ROM ...
194,279 UART:
194,429 UART: [state] CFI Enabled
260,489 UART: [state] LifecycleState = Unprovisioned
262,415 UART: [state] DebugLocked = No
264,658 UART: [state] WD Timer not started. Device not locked for debugging
267,624 UART: [kat] SHA2-256
446,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,278 UART: [kat] ++
458,816 UART: [kat] sha1
469,769 UART: [kat] SHA2-256
472,777 UART: [kat] SHA2-384
478,432 UART: [kat] SHA2-512-ACC
481,419 UART: [kat] ECC-384
2,948,426 UART: [kat] HMAC-384Kdf
2,970,279 UART: [kat] LMS
3,499,727 UART: [kat] --
3,504,004 UART: [cold-reset] ++
3,504,943 UART: [fht] FHT @ 0x50003400
3,515,273 UART: [idev] ++
3,515,831 UART: [idev] CDI.KEYID = 6
3,516,816 UART: [idev] SUBJECT.KEYID = 7
3,518,075 UART: [idev] UDS.KEYID = 0
3,519,004 ready_for_fw is high
3,519,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,662,604 UART: [idev] Erasing UDS.KEYID = 0
6,023,606 UART: [idev] Sha1 KeyId Algorithm
6,046,785 UART: [idev] --
6,051,267 UART: [ldev] ++
6,051,836 UART: [ldev] CDI.KEYID = 6
6,052,751 UART: [ldev] SUBJECT.KEYID = 5
6,053,909 UART: [ldev] AUTHORITY.KEYID = 7
6,055,166 UART: [ldev] FE.KEYID = 1
6,099,684 UART: [ldev] Erasing FE.KEYID = 1
8,598,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,374 UART: [ldev] --
10,394,819 UART: [fwproc] Wait for Commands...
10,396,692 UART: [fwproc] Recv command 0x46574c44
10,398,840 UART: [fwproc] Recv'd Img size: 114084 bytes
13,801,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,255,572 >>> mbox cmd response: success
14,259,228 UART: [afmc] ++
14,259,831 UART: [afmc] CDI.KEYID = 6
14,260,739 UART: [afmc] SUBJECT.KEYID = 7
14,261,899 UART: [afmc] AUTHORITY.KEYID = 5
16,807,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,380 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,004 UART: [afmc] --
18,605,226 UART: [cold-reset] --
18,611,081 UART: [state] Locking Datavault
18,617,083 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,730 UART: [state] Locking ICCM
18,620,447 UART: [exit] Launching FMC @ 0x40000130
18,628,838 UART:
18,629,068 UART: Running Caliptra FMC ...
18,630,169 UART:
18,630,326 UART: [state] CFI Enabled
18,688,309 UART: [fht] FMC Alias Private Key: 7
20,452,179 UART: [art] Extend RT PCRs Done
20,453,403 UART: [art] Lock RT PCRs Done
20,454,974 UART: [art] Populate DV Done
20,460,436 UART: [fht] FMC Alias Private Key: 7
20,462,146 UART: [art] Derive CDI
20,462,958 UART: [art] Store in in slot 0x4
20,520,109 UART: [art] Derive Key Pair
20,521,142 UART: [art] Store priv key in slot 0x5
22,984,353 UART: [art] Derive Key Pair - Done
22,997,563 UART: [art] Signing Cert with AUTHO
22,998,863 UART: RITY.KEYID = 7
24,710,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,455 UART: [art] PUB.X = F21BFF9DBB6365EC858AB59645FA30733A59E87B9D012DA4F1EE71F607169B8209397899AD8331EDF50AA52EBB747BF3
24,719,774 UART: [art] PUB.Y = 6438251D9DD75148C4EDD0083C1710B99AFAB345EACF791C44DEC6957F531F18FBD8CD96AF793DF7504A40D034809D2D
24,727,003 UART: [art] SIG.R = C15F3528EA01E92833BAD335CE2552081173FE85D588DE064AC4BA59FC7A540098B901E44E055ECD36DA615BA727F9DE
24,734,388 UART: [art] SIG.S = EB9F907AEDC086F8EED84DB2017257495471CDEEA826252A89BC1D2DBB5E03BF2FEFC4FF7AC93703F4B795A8FBD54CBB
25,713,188 UART: Caliptra RT
25,713,901 UART: [state] CFI Enabled
25,880,072 UART: [rt] RT listening for mailbox commands...
25,882,000 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,912,577 UART: [rt]cmd =0x44504543, len=24
25,953,438 >>> mbox cmd response data (40 bytes)
25,954,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,985,106 UART: [rt]cmd =0x44504543, len=96
26,045,348 >>> mbox cmd response data (56 bytes)
26,046,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,076,695 UART: [rt]cmd =0x44504543, len=96
26,151,767 >>> mbox cmd response data (56 bytes)
26,152,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,182,967 UART: [rt]cmd =0x44504543, len=96
26,258,985 >>> mbox cmd response data (56 bytes)
26,259,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,324 UART: [rt]cmd =0x44504543, len=96
26,366,219 >>> mbox cmd response data (56 bytes)
26,366,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,649 UART: [rt]cmd =0x44504543, len=96
26,472,916 >>> mbox cmd response data (56 bytes)
26,473,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,255 UART: [rt]cmd =0x44504543, len=96
26,580,055 >>> mbox cmd response data (56 bytes)
26,580,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,611,257 UART: [rt]cmd =0x44504543, len=96
26,686,715 >>> mbox cmd response data (56 bytes)
26,687,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,083 UART: [rt]cmd =0x44504543, len=96
26,793,511 >>> mbox cmd response data (56 bytes)
26,794,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,824,618 UART: [rt]cmd =0x44504543, len=96
26,900,408 >>> mbox cmd response data (56 bytes)
26,901,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,931,752 UART: [rt]cmd =0x44504543, len=96
27,007,247 >>> mbox cmd response data (56 bytes)
27,007,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,038,465 UART: [rt]cmd =0x44504543, len=96
27,114,104 >>> mbox cmd response data (56 bytes)
27,114,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,145,381 UART: [rt]cmd =0x44504543, len=96
27,221,398 >>> mbox cmd response data (56 bytes)
27,222,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,252,643 UART: [rt]cmd =0x44504543, len=96
27,328,146 >>> mbox cmd response data (56 bytes)
27,328,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,359,359 UART: [rt]cmd =0x44504543, len=96
27,434,418 >>> mbox cmd response data (56 bytes)
27,435,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,465,830 UART: [rt]cmd =0x44504543, len=96
27,472,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,385,228 ready_for_fw is high
3,385,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,036,957 >>> mbox cmd response: success
18,324,898 UART:
18,325,293 UART: Running Caliptra FMC ...
18,326,482 UART:
18,326,649 UART: [state] CFI Enabled
18,389,958 UART: [fht] FMC Alias Private Key: 7
20,154,301 UART: [art] Extend RT PCRs Done
20,155,526 UART: [art] Lock RT PCRs Done
20,157,203 UART: [art] Populate DV Done
20,162,773 UART: [fht] FMC Alias Private Key: 7
20,164,308 UART: [art] Derive CDI
20,165,116 UART: [art] Store in in slot 0x4
20,222,027 UART: [art] Derive Key Pair
20,223,103 UART: [art] Store priv key in slot 0x5
22,685,685 UART: [art] Derive Key Pair - Done
22,698,584 UART: [art] Signing Cert with AUTHO
22,699,886 UART: RITY.KEYID = 7
24,411,222 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,727 UART: [art] PUB.X = 426CDD00153205479F24AC66EBFA2945DA372297D63D5C29DB0F7AF60DCD7283E1148DD04D3623145A7CA4C8F42365D4
24,420,003 UART: [art] PUB.Y = FA299CB7796705021271C8B30FF9D2A39EFB86CB7E8981EB25B92547B43A56B749C6119B417424F6FF998C405FD696A3
24,427,197 UART: [art] SIG.R = 9549F54948417B533B27EF17FB6F6E1284E71FEBF15CE5CB944AE513107E441AD32245D3DB6D0296673C5B7D57630B7B
24,434,742 UART: [art] SIG.S = 36B1B1C32A64A57A75C6D0D5658A94C74B03371DA3752E86CF57B84953EF6A0BF334CC11F0A4D4FB91EF216515090F59
25,413,825 UART: Caliptra RT
25,414,539 UART: [state] CFI Enabled
25,578,853 UART: [rt] RT listening for mailbox commands...
25,580,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,611,364 UART: [rt]cmd =0x44504543, len=24
25,653,522 >>> mbox cmd response data (40 bytes)
25,654,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,685,214 UART: [rt]cmd =0x44504543, len=96
25,745,010 >>> mbox cmd response data (56 bytes)
25,745,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,776,076 UART: [rt]cmd =0x44504543, len=96
25,851,807 >>> mbox cmd response data (56 bytes)
25,852,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,882,954 UART: [rt]cmd =0x44504543, len=96
25,958,282 >>> mbox cmd response data (56 bytes)
25,959,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,989,452 UART: [rt]cmd =0x44504543, len=96
26,064,959 >>> mbox cmd response data (56 bytes)
26,065,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,173 UART: [rt]cmd =0x44504543, len=96
26,171,902 >>> mbox cmd response data (56 bytes)
26,172,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,203,105 UART: [rt]cmd =0x44504543, len=96
26,279,007 >>> mbox cmd response data (56 bytes)
26,279,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,310,154 UART: [rt]cmd =0x44504543, len=96
26,385,168 >>> mbox cmd response data (56 bytes)
26,385,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,517 UART: [rt]cmd =0x44504543, len=96
26,491,973 >>> mbox cmd response data (56 bytes)
26,492,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,523,427 UART: [rt]cmd =0x44504543, len=96
26,599,116 >>> mbox cmd response data (56 bytes)
26,599,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,630,403 UART: [rt]cmd =0x44504543, len=96
26,705,710 >>> mbox cmd response data (56 bytes)
26,706,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,736,963 UART: [rt]cmd =0x44504543, len=96
26,812,578 >>> mbox cmd response data (56 bytes)
26,813,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,843,850 UART: [rt]cmd =0x44504543, len=96
26,919,456 >>> mbox cmd response data (56 bytes)
26,920,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,950,737 UART: [rt]cmd =0x44504543, len=96
27,026,751 >>> mbox cmd response data (56 bytes)
27,027,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,133 UART: [rt]cmd =0x44504543, len=96
27,133,424 >>> mbox cmd response data (56 bytes)
27,134,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,164,756 UART: [rt]cmd =0x44504543, len=96
27,171,623 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,871 writing to cptra_bootfsm_go
193,133 UART:
193,499 UART: Running Caliptra ROM ...
194,641 UART:
604,440 UART: [state] CFI Enabled
616,201 UART: [state] LifecycleState = Unprovisioned
618,108 UART: [state] DebugLocked = No
620,493 UART: [state] WD Timer not started. Device not locked for debugging
624,324 UART: [kat] SHA2-256
803,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,071 UART: [kat] ++
815,609 UART: [kat] sha1
826,350 UART: [kat] SHA2-256
829,350 UART: [kat] SHA2-384
835,437 UART: [kat] SHA2-512-ACC
838,379 UART: [kat] ECC-384
3,278,466 UART: [kat] HMAC-384Kdf
3,291,741 UART: [kat] LMS
3,821,249 UART: [kat] --
3,825,804 UART: [cold-reset] ++
3,827,521 UART: [fht] FHT @ 0x50003400
3,839,076 UART: [idev] ++
3,839,645 UART: [idev] CDI.KEYID = 6
3,840,533 UART: [idev] SUBJECT.KEYID = 7
3,841,776 UART: [idev] UDS.KEYID = 0
3,842,677 ready_for_fw is high
3,842,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,589 UART: [idev] Erasing UDS.KEYID = 0
6,310,729 UART: [idev] Sha1 KeyId Algorithm
6,333,966 UART: [idev] --
6,336,852 UART: [ldev] ++
6,337,429 UART: [ldev] CDI.KEYID = 6
6,338,352 UART: [ldev] SUBJECT.KEYID = 5
6,339,508 UART: [ldev] AUTHORITY.KEYID = 7
6,340,795 UART: [ldev] FE.KEYID = 1
6,350,687 UART: [ldev] Erasing FE.KEYID = 1
8,825,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,502 UART: [ldev] --
10,613,589 UART: [fwproc] Wait for Commands...
10,615,672 UART: [fwproc] Recv command 0x46574c44
10,617,722 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,479,631 >>> mbox cmd response: success
14,484,548 UART: [afmc] ++
14,485,159 UART: [afmc] CDI.KEYID = 6
14,486,078 UART: [afmc] SUBJECT.KEYID = 7
14,487,250 UART: [afmc] AUTHORITY.KEYID = 5
16,987,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,660 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,536 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,095 UART: [afmc] --
18,785,115 UART: [cold-reset] --
18,790,167 UART: [state] Locking Datavault
18,794,304 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,954 UART: [state] Locking ICCM
18,797,238 UART: [exit] Launching FMC @ 0x40000130
18,805,689 UART:
18,805,936 UART: Running Caliptra FMC ...
18,807,040 UART:
18,807,204 UART: [state] CFI Enabled
18,815,576 UART: [fht] FMC Alias Private Key: 7
20,572,856 UART: [art] Extend RT PCRs Done
20,574,085 UART: [art] Lock RT PCRs Done
20,575,394 UART: [art] Populate DV Done
20,581,023 UART: [fht] FMC Alias Private Key: 7
20,582,570 UART: [art] Derive CDI
20,583,333 UART: [art] Store in in slot 0x4
20,626,045 UART: [art] Derive Key Pair
20,627,108 UART: [art] Store priv key in slot 0x5
23,053,802 UART: [art] Derive Key Pair - Done
23,066,742 UART: [art] Signing Cert with AUTHO
23,068,057 UART: RITY.KEYID = 7
24,773,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,039 UART: [art] PUB.X = 5882389CD99CB8ED26E85D192B0B2047A5092CDA10468CCAB1908915C42A2FFAD97584CCC6F7B1049CCD393C087B5A02
24,782,318 UART: [art] PUB.Y = 82074C26EF328955095CB27DBC5DCC89522D47AB516DEADF97123F54E67F7088D854BEA8D9610E676982A08826E92A88
24,789,522 UART: [art] SIG.R = 508D469F27A0DA7ECFCD62FDE847628175E02D3D48121E07BD6B0D5D0C3AE95635FD1D38CA7C6B7747EA49A29037DC25
24,796,946 UART: [art] SIG.S = 34B547B5246BC38FBEC13AAC3772C9A39827399FCC20C5D61076A120A2240CB58DB12995472F167EE4708D4E39602D3B
25,775,622 UART: Caliptra RT
25,776,316 UART: [state] CFI Enabled
25,892,843 UART: [rt] RT listening for mailbox commands...
25,894,899 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,925,019 UART: [rt]cmd =0x44504543, len=24
25,951,218 >>> mbox cmd response data (40 bytes)
25,952,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,983,166 UART: [rt]cmd =0x44504543, len=96
26,023,885 >>> mbox cmd response data (56 bytes)
26,024,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,055,052 UART: [rt]cmd =0x44504543, len=96
26,096,089 >>> mbox cmd response data (56 bytes)
26,096,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,127,276 UART: [rt]cmd =0x44504543, len=96
26,168,637 >>> mbox cmd response data (56 bytes)
26,169,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,199,677 UART: [rt]cmd =0x44504543, len=96
26,240,563 >>> mbox cmd response data (56 bytes)
26,241,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,271,760 UART: [rt]cmd =0x44504543, len=96
26,313,232 >>> mbox cmd response data (56 bytes)
26,313,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,344,334 UART: [rt]cmd =0x44504543, len=96
26,386,125 >>> mbox cmd response data (56 bytes)
26,386,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,298 UART: [rt]cmd =0x44504543, len=96
26,459,641 >>> mbox cmd response data (56 bytes)
26,460,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,490,954 UART: [rt]cmd =0x44504543, len=96
26,533,294 >>> mbox cmd response data (56 bytes)
26,534,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,564,717 UART: [rt]cmd =0x44504543, len=96
26,607,047 >>> mbox cmd response data (56 bytes)
26,607,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,638,271 UART: [rt]cmd =0x44504543, len=96
26,681,179 >>> mbox cmd response data (56 bytes)
26,681,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,519 UART: [rt]cmd =0x44504543, len=96
26,755,801 >>> mbox cmd response data (56 bytes)
26,756,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,787,208 UART: [rt]cmd =0x44504543, len=96
26,831,459 >>> mbox cmd response data (56 bytes)
26,832,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,862,938 UART: [rt]cmd =0x44504543, len=96
26,906,944 >>> mbox cmd response data (56 bytes)
26,907,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,938,038 UART: [rt]cmd =0x44504543, len=96
26,982,411 >>> mbox cmd response data (56 bytes)
26,983,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,013,602 UART: [rt]cmd =0x44504543, len=96
27,020,368 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,737 writing to cptra_bootfsm_go
3,696,504 ready_for_fw is high
3,696,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,137 >>> mbox cmd response: success
18,522,402 UART:
18,522,835 UART: Running Caliptra FMC ...
18,523,946 UART:
18,524,108 UART: [state] CFI Enabled
18,532,451 UART: [fht] FMC Alias Private Key: 7
20,289,368 UART: [art] Extend RT PCRs Done
20,290,595 UART: [art] Lock RT PCRs Done
20,291,870 UART: [art] Populate DV Done
20,297,474 UART: [fht] FMC Alias Private Key: 7
20,299,181 UART: [art] Derive CDI
20,299,920 UART: [art] Store in in slot 0x4
20,342,518 UART: [art] Derive Key Pair
20,343,564 UART: [art] Store priv key in slot 0x5
22,770,631 UART: [art] Derive Key Pair - Done
22,783,630 UART: [art] Signing Cert with AUTHO
22,784,937 UART: RITY.KEYID = 7
24,490,556 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,059 UART: [art] PUB.X = 9BAF6B1FC392529DD6C763E2C9607B75C6F7C992C24240518CB332354518F3342EF94A9D7918D848AB320679B8F1B5A5
24,499,286 UART: [art] PUB.Y = A5E8098B9F83518C4EDEBCA42EA191A5767C9CAED7107018ED0720C90B60892EDD9EA2A149931F3D2A127A119ACCBCAB
24,506,559 UART: [art] SIG.R = B54A2A0C3F40EC007AF9E9AD359F5DB56E4C245C5A03B9A084AC4735FCBB6FE68945F981BE35B0056F1A9730B1635A88
24,513,980 UART: [art] SIG.S = CBF72DF4DAE9597FA5DCAC6080B04DAC0F32657D72DFD064D746E868403CCB09E293958874703F3113AA8664A6266F24
25,493,192 UART: Caliptra RT
25,493,893 UART: [state] CFI Enabled
25,610,593 UART: [rt] RT listening for mailbox commands...
25,612,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,642,285 UART: [rt]cmd =0x44504543, len=24
25,668,420 >>> mbox cmd response data (40 bytes)
25,669,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,700,024 UART: [rt]cmd =0x44504543, len=96
25,740,031 >>> mbox cmd response data (56 bytes)
25,740,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,771,142 UART: [rt]cmd =0x44504543, len=96
25,812,273 >>> mbox cmd response data (56 bytes)
25,812,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,694 UART: [rt]cmd =0x44504543, len=96
25,884,953 >>> mbox cmd response data (56 bytes)
25,885,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,916,234 UART: [rt]cmd =0x44504543, len=96
25,957,067 >>> mbox cmd response data (56 bytes)
25,957,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,988,193 UART: [rt]cmd =0x44504543, len=96
26,029,763 >>> mbox cmd response data (56 bytes)
26,030,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,061,005 UART: [rt]cmd =0x44504543, len=96
26,103,690 >>> mbox cmd response data (56 bytes)
26,104,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,135,115 UART: [rt]cmd =0x44504543, len=96
26,177,519 >>> mbox cmd response data (56 bytes)
26,178,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,208,719 UART: [rt]cmd =0x44504543, len=96
26,251,014 >>> mbox cmd response data (56 bytes)
26,251,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,157 UART: [rt]cmd =0x44504543, len=96
26,324,557 >>> mbox cmd response data (56 bytes)
26,325,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,863 UART: [rt]cmd =0x44504543, len=96
26,398,878 >>> mbox cmd response data (56 bytes)
26,399,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,430,294 UART: [rt]cmd =0x44504543, len=96
26,473,759 >>> mbox cmd response data (56 bytes)
26,474,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,927 UART: [rt]cmd =0x44504543, len=96
26,548,697 >>> mbox cmd response data (56 bytes)
26,549,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,579,871 UART: [rt]cmd =0x44504543, len=96
26,623,430 >>> mbox cmd response data (56 bytes)
26,624,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,654,690 UART: [rt]cmd =0x44504543, len=96
26,698,699 >>> mbox cmd response data (56 bytes)
26,699,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,730,076 UART: [rt]cmd =0x44504543, len=96
26,736,788 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,426 UART:
192,805 UART: Running Caliptra ROM ...
193,915 UART:
194,056 UART: [state] CFI Enabled
265,050 UART: [state] LifecycleState = Unprovisioned
267,397 UART: [state] DebugLocked = No
269,487 UART: [state] WD Timer not started. Device not locked for debugging
274,814 UART: [kat] SHA2-256
464,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,447 UART: [kat] ++
475,891 UART: [kat] sha1
487,478 UART: [kat] SHA2-256
490,482 UART: [kat] SHA2-384
496,553 UART: [kat] SHA2-512-ACC
499,142 UART: [kat] ECC-384
2,946,326 UART: [kat] HMAC-384Kdf
2,972,906 UART: [kat] LMS
3,504,647 UART: [kat] --
3,509,566 UART: [cold-reset] ++
3,511,133 UART: [fht] FHT @ 0x50003400
3,523,948 UART: [idev] ++
3,524,655 UART: [idev] CDI.KEYID = 6
3,525,642 UART: [idev] SUBJECT.KEYID = 7
3,526,812 UART: [idev] UDS.KEYID = 0
3,527,734 ready_for_fw is high
3,527,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,399 UART: [idev] Erasing UDS.KEYID = 0
6,052,051 UART: [idev] Sha1 KeyId Algorithm
6,074,853 UART: [idev] --
6,080,159 UART: [ldev] ++
6,080,842 UART: [ldev] CDI.KEYID = 6
6,081,753 UART: [ldev] SUBJECT.KEYID = 5
6,082,965 UART: [ldev] AUTHORITY.KEYID = 7
6,084,139 UART: [ldev] FE.KEYID = 1
6,122,113 UART: [ldev] Erasing FE.KEYID = 1
8,627,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,404 UART: [ldev] --
10,436,122 UART: [fwproc] Wait for Commands...
10,438,270 UART: [fwproc] Recv command 0x46574c44
10,440,572 UART: [fwproc] Recv'd Img size: 114084 bytes
13,886,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,080,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,621,444 >>> mbox cmd response: success
14,625,522 UART: [afmc] ++
14,626,236 UART: [afmc] CDI.KEYID = 6
14,627,349 UART: [afmc] SUBJECT.KEYID = 7
14,628,902 UART: [afmc] AUTHORITY.KEYID = 5
17,173,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,345 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,549 UART: [afmc] --
18,971,464 UART: [cold-reset] --
18,976,094 UART: [state] Locking Datavault
18,982,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,352 UART: [state] Locking ICCM
18,986,235 UART: [exit] Launching FMC @ 0x40000130
18,994,870 UART:
18,995,108 UART: Running Caliptra FMC ...
18,996,207 UART:
18,996,363 UART: [state] CFI Enabled
19,053,633 UART: [fht] FMC Alias Private Key: 7
20,817,389 UART: [art] Extend RT PCRs Done
20,818,601 UART: [art] Lock RT PCRs Done
20,820,177 UART: [art] Populate DV Done
20,825,469 UART: [fht] FMC Alias Private Key: 7
20,827,161 UART: [art] Derive CDI
20,827,971 UART: [art] Store in in slot 0x4
20,886,469 UART: [art] Derive Key Pair
20,887,501 UART: [art] Store priv key in slot 0x5
23,351,003 UART: [art] Derive Key Pair - Done
23,363,990 UART: [art] Signing Cert with AUTHO
23,365,286 UART: RITY.KEYID = 7
25,076,449 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,954 UART: [art] PUB.X = 03469F255FE605379F811C7B86A86A10C67493119DDC560820175C01FA045BA02EE9E26936CF0EB0E40C9D587D48655A
25,085,220 UART: [art] PUB.Y = 813FB5B95E1DE0B90794BA11CEFFCA9D8874533BD63078D5AA38465198A7205D812B8AD32B77011DA71B872083F9CD9B
25,092,444 UART: [art] SIG.R = 84EB97282D2E8C1B38A0FB4BB6DD572A3E97E718076045F7632DA1FF8C12E39A7461D782D7852240C5C675F7E0164114
25,099,820 UART: [art] SIG.S = 597B6F258BFB3D697DDAF11C5B21F0A5CB0E065B3286AF55E2A766E9D8F792BA50D9842B2D8C4BF32932E2AD605B4B7E
26,078,480 UART: Caliptra RT
26,079,162 UART: [state] CFI Enabled
26,243,584 UART: [rt] RT listening for mailbox commands...
26,245,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,276,176 UART: [rt]cmd =0x44504543, len=24
26,319,829 >>> mbox cmd response data (40 bytes)
26,320,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,351,484 UART: [rt]cmd =0x44504543, len=96
26,411,159 >>> mbox cmd response data (56 bytes)
26,411,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,355 UART: [rt]cmd =0x44504543, len=96
26,518,524 >>> mbox cmd response data (56 bytes)
26,519,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,549,857 UART: [rt]cmd =0x44504543, len=96
26,624,753 >>> mbox cmd response data (56 bytes)
26,625,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,655,902 UART: [rt]cmd =0x44504543, len=96
26,731,745 >>> mbox cmd response data (56 bytes)
26,732,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,762,998 UART: [rt]cmd =0x44504543, len=96
26,838,560 >>> mbox cmd response data (56 bytes)
26,839,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,869,878 UART: [rt]cmd =0x44504543, len=96
26,945,448 >>> mbox cmd response data (56 bytes)
26,946,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,976,644 UART: [rt]cmd =0x44504543, len=96
27,052,230 >>> mbox cmd response data (56 bytes)
27,052,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,329 UART: [rt]cmd =0x44504543, len=96
27,158,901 >>> mbox cmd response data (56 bytes)
27,159,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,190,014 UART: [rt]cmd =0x44504543, len=96
27,265,990 >>> mbox cmd response data (56 bytes)
27,266,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,297,237 UART: [rt]cmd =0x44504543, len=96
27,373,293 >>> mbox cmd response data (56 bytes)
27,374,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,404,344 UART: [rt]cmd =0x44504543, len=96
27,480,065 >>> mbox cmd response data (56 bytes)
27,480,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,511,243 UART: [rt]cmd =0x44504543, len=96
27,586,777 >>> mbox cmd response data (56 bytes)
27,587,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,617,812 UART: [rt]cmd =0x44504543, len=96
27,694,081 >>> mbox cmd response data (56 bytes)
27,694,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,725,289 UART: [rt]cmd =0x44504543, len=96
27,800,419 >>> mbox cmd response data (56 bytes)
27,801,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,831,686 UART: [rt]cmd =0x44504543, len=96
27,838,292 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,417,925 ready_for_fw is high
3,418,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,710,905 >>> mbox cmd response: success
19,005,918 UART:
19,006,328 UART: Running Caliptra FMC ...
19,007,432 UART:
19,007,589 UART: [state] CFI Enabled
19,074,849 UART: [fht] FMC Alias Private Key: 7
20,839,059 UART: [art] Extend RT PCRs Done
20,840,279 UART: [art] Lock RT PCRs Done
20,842,132 UART: [art] Populate DV Done
20,847,441 UART: [fht] FMC Alias Private Key: 7
20,849,026 UART: [art] Derive CDI
20,849,838 UART: [art] Store in in slot 0x4
20,908,118 UART: [art] Derive Key Pair
20,909,148 UART: [art] Store priv key in slot 0x5
23,372,312 UART: [art] Derive Key Pair - Done
23,385,420 UART: [art] Signing Cert with AUTHO
23,386,751 UART: RITY.KEYID = 7
25,098,402 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,912 UART: [art] PUB.X = 2E8D778D85B1A37B18652C3553D090F84AADE92D5BE051DA135CD617CF6170044EE6119C95D1EB2B9C2DC9C0082C9C14
25,107,175 UART: [art] PUB.Y = C84F7D5EFD636BC338A635F84FC1CEA3FFD89DB3C7BF91F6406EBBC7E53A1340005428B3C800178A123EB9A4E6FAC1BF
25,114,413 UART: [art] SIG.R = AEE9AE06452CDD8729DBF15A818769D56B8FE8AA0A9236B772D1B56AC50977DFA2693B466E5ECCCD19033D5B6AEC1DE1
25,121,843 UART: [art] SIG.S = 7DCB113CCB2813F3007CA965D6A5F71E906362A419F928CE7ECC05980E51ADE0AF7987C942995328DFE3E2FF607563F7
26,100,070 UART: Caliptra RT
26,100,758 UART: [state] CFI Enabled
26,266,954 UART: [rt] RT listening for mailbox commands...
26,268,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,299,390 UART: [rt]cmd =0x44504543, len=24
26,341,864 >>> mbox cmd response data (40 bytes)
26,343,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,373,798 UART: [rt]cmd =0x44504543, len=96
26,433,304 >>> mbox cmd response data (56 bytes)
26,434,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,464,509 UART: [rt]cmd =0x44504543, len=96
26,540,659 >>> mbox cmd response data (56 bytes)
26,541,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,571,980 UART: [rt]cmd =0x44504543, len=96
26,647,031 >>> mbox cmd response data (56 bytes)
26,647,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,678,534 UART: [rt]cmd =0x44504543, len=96
26,753,852 >>> mbox cmd response data (56 bytes)
26,754,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,785,224 UART: [rt]cmd =0x44504543, len=96
26,860,681 >>> mbox cmd response data (56 bytes)
26,861,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,891,989 UART: [rt]cmd =0x44504543, len=96
26,967,218 >>> mbox cmd response data (56 bytes)
26,967,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,998,593 UART: [rt]cmd =0x44504543, len=96
27,073,861 >>> mbox cmd response data (56 bytes)
27,074,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,105,135 UART: [rt]cmd =0x44504543, len=96
27,180,757 >>> mbox cmd response data (56 bytes)
27,181,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,211,853 UART: [rt]cmd =0x44504543, len=96
27,287,743 >>> mbox cmd response data (56 bytes)
27,288,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,318,910 UART: [rt]cmd =0x44504543, len=96
27,394,424 >>> mbox cmd response data (56 bytes)
27,395,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,425,588 UART: [rt]cmd =0x44504543, len=96
27,501,480 >>> mbox cmd response data (56 bytes)
27,502,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,532,640 UART: [rt]cmd =0x44504543, len=96
27,607,836 >>> mbox cmd response data (56 bytes)
27,608,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,639,124 UART: [rt]cmd =0x44504543, len=96
27,715,030 >>> mbox cmd response data (56 bytes)
27,715,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,746,232 UART: [rt]cmd =0x44504543, len=96
27,821,791 >>> mbox cmd response data (56 bytes)
27,822,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,853,202 UART: [rt]cmd =0x44504543, len=96
27,859,781 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
192,996 UART:
193,349 UART: Running Caliptra ROM ...
194,583 UART:
604,039 UART: [state] CFI Enabled
619,056 UART: [state] LifecycleState = Unprovisioned
621,432 UART: [state] DebugLocked = No
624,363 UART: [state] WD Timer not started. Device not locked for debugging
628,491 UART: [kat] SHA2-256
818,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,145 UART: [kat] ++
829,671 UART: [kat] sha1
840,114 UART: [kat] SHA2-256
843,115 UART: [kat] SHA2-384
849,389 UART: [kat] SHA2-512-ACC
851,970 UART: [kat] ECC-384
3,292,936 UART: [kat] HMAC-384Kdf
3,305,953 UART: [kat] LMS
3,837,810 UART: [kat] --
3,842,045 UART: [cold-reset] ++
3,842,846 UART: [fht] FHT @ 0x50003400
3,853,409 UART: [idev] ++
3,854,119 UART: [idev] CDI.KEYID = 6
3,855,115 UART: [idev] SUBJECT.KEYID = 7
3,856,289 UART: [idev] UDS.KEYID = 0
3,857,215 ready_for_fw is high
3,857,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,739 UART: [idev] Erasing UDS.KEYID = 0
6,336,640 UART: [idev] Sha1 KeyId Algorithm
6,358,725 UART: [idev] --
6,362,764 UART: [ldev] ++
6,363,450 UART: [ldev] CDI.KEYID = 6
6,364,361 UART: [ldev] SUBJECT.KEYID = 5
6,365,573 UART: [ldev] AUTHORITY.KEYID = 7
6,366,801 UART: [ldev] FE.KEYID = 1
6,378,166 UART: [ldev] Erasing FE.KEYID = 1
8,860,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,639 UART: [ldev] --
10,652,660 UART: [fwproc] Wait for Commands...
10,654,798 UART: [fwproc] Recv command 0x46574c44
10,657,107 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,258 >>> mbox cmd response: success
14,837,680 UART: [afmc] ++
14,838,385 UART: [afmc] CDI.KEYID = 6
14,839,597 UART: [afmc] SUBJECT.KEYID = 7
14,841,043 UART: [afmc] AUTHORITY.KEYID = 5
17,348,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,268 UART: [afmc] --
19,143,596 UART: [cold-reset] --
19,148,224 UART: [state] Locking Datavault
19,155,370 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,538 UART: [state] Locking ICCM
19,158,939 UART: [exit] Launching FMC @ 0x40000130
19,167,568 UART:
19,167,807 UART: Running Caliptra FMC ...
19,168,933 UART:
19,169,094 UART: [state] CFI Enabled
19,177,418 UART: [fht] FMC Alias Private Key: 7
20,934,657 UART: [art] Extend RT PCRs Done
20,935,881 UART: [art] Lock RT PCRs Done
20,937,265 UART: [art] Populate DV Done
20,942,849 UART: [fht] FMC Alias Private Key: 7
20,944,534 UART: [art] Derive CDI
20,945,278 UART: [art] Store in in slot 0x4
20,988,091 UART: [art] Derive Key Pair
20,989,098 UART: [art] Store priv key in slot 0x5
23,415,983 UART: [art] Derive Key Pair - Done
23,428,919 UART: [art] Signing Cert with AUTHO
23,430,254 UART: RITY.KEYID = 7
25,135,647 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,156 UART: [art] PUB.X = 09D0767DEB0EC190F1DC53A68BDCFAFF6F0BDBD67BF1DE99DDF72B618E8F3EE53F648E5EF0C01C51576BE5A59BE9079B
25,144,502 UART: [art] PUB.Y = 069AED0256E6AB01CE86204BDFB7C6EBCF6837B88A4C2E5460BDE9FDD531002617FF89F7692396E30682F59C35F8DE51
25,151,719 UART: [art] SIG.R = 92D492FCF6ED71846393C075B38F9F29B519185E828E2D93AF8F054CFD6CF511AF19D6F8243C1BCA7073B3072EB6EEFB
25,159,142 UART: [art] SIG.S = C9C7389BBF4A6A9CB8D67EF542D336E2F6762DB6F45BC41ACEDA353C150CEC3EB3424316E0B1A899A3C7C2F758A93E6C
26,138,346 UART: Caliptra RT
26,139,056 UART: [state] CFI Enabled
26,256,224 UART: [rt] RT listening for mailbox commands...
26,258,135 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,288,147 UART: [rt]cmd =0x44504543, len=24
26,314,776 >>> mbox cmd response data (40 bytes)
26,316,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,346,645 UART: [rt]cmd =0x44504543, len=96
26,386,466 >>> mbox cmd response data (56 bytes)
26,387,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,977 UART: [rt]cmd =0x44504543, len=96
26,459,018 >>> mbox cmd response data (56 bytes)
26,459,731 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,490,091 UART: [rt]cmd =0x44504543, len=96
26,531,005 >>> mbox cmd response data (56 bytes)
26,531,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,562,093 UART: [rt]cmd =0x44504543, len=96
26,603,386 >>> mbox cmd response data (56 bytes)
26,604,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,576 UART: [rt]cmd =0x44504543, len=96
26,676,565 >>> mbox cmd response data (56 bytes)
26,677,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,707,590 UART: [rt]cmd =0x44504543, len=96
26,749,991 >>> mbox cmd response data (56 bytes)
26,750,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,781,226 UART: [rt]cmd =0x44504543, len=96
26,823,338 >>> mbox cmd response data (56 bytes)
26,824,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,854,562 UART: [rt]cmd =0x44504543, len=96
26,896,756 >>> mbox cmd response data (56 bytes)
26,897,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,928,014 UART: [rt]cmd =0x44504543, len=96
26,970,844 >>> mbox cmd response data (56 bytes)
26,971,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,002,045 UART: [rt]cmd =0x44504543, len=96
27,044,827 >>> mbox cmd response data (56 bytes)
27,045,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,075,973 UART: [rt]cmd =0x44504543, len=96
27,119,500 >>> mbox cmd response data (56 bytes)
27,120,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,150,642 UART: [rt]cmd =0x44504543, len=96
27,193,952 >>> mbox cmd response data (56 bytes)
27,194,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,225,089 UART: [rt]cmd =0x44504543, len=96
27,269,165 >>> mbox cmd response data (56 bytes)
27,269,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,300,369 UART: [rt]cmd =0x44504543, len=96
27,343,859 >>> mbox cmd response data (56 bytes)
27,344,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,375,217 UART: [rt]cmd =0x44504543, len=96
27,381,727 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
3,758,483 ready_for_fw is high
3,759,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,890 >>> mbox cmd response: success
19,200,576 UART:
19,200,981 UART: Running Caliptra FMC ...
19,202,190 UART:
19,202,367 UART: [state] CFI Enabled
19,210,017 UART: [fht] FMC Alias Private Key: 7
20,967,007 UART: [art] Extend RT PCRs Done
20,968,234 UART: [art] Lock RT PCRs Done
20,970,023 UART: [art] Populate DV Done
20,975,447 UART: [fht] FMC Alias Private Key: 7
20,977,099 UART: [art] Derive CDI
20,977,923 UART: [art] Store in in slot 0x4
21,020,367 UART: [art] Derive Key Pair
21,021,376 UART: [art] Store priv key in slot 0x5
23,448,062 UART: [art] Derive Key Pair - Done
23,461,089 UART: [art] Signing Cert with AUTHO
23,462,407 UART: RITY.KEYID = 7
25,167,940 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,446 UART: [art] PUB.X = 967EA154F0497B26350DD3A089BBBF145290D376852C26AB0000C43A02B7FD801170B3AD322C453D70D954EE8BA082CB
25,176,696 UART: [art] PUB.Y = 8F4D83C838EBB5874D99144746B7D108A0DCD0E18E6F38E0D988237D4930434A035CA5FE3F27D0B9E9F7D0A134F743D6
25,183,923 UART: [art] SIG.R = 1F2F243FBB9B31587A86158AF6E2985C63CBEA8A270D4C9407A5ABE919A74D14C84E39DE1018E73909107B66A3773F71
25,191,314 UART: [art] SIG.S = 14A2BD53CD71EA0BF08B70B0AA50FAE5C67B38E42CB68973C937790C3198D5ADFB475F07FD144DF9FC1A7015D2161903
26,169,764 UART: Caliptra RT
26,170,451 UART: [state] CFI Enabled
26,287,785 UART: [rt] RT listening for mailbox commands...
26,289,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,319,666 UART: [rt]cmd =0x44504543, len=24
26,345,808 >>> mbox cmd response data (40 bytes)
26,347,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,735 UART: [rt]cmd =0x44504543, len=96
26,418,103 >>> mbox cmd response data (56 bytes)
26,418,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,449,742 UART: [rt]cmd =0x44504543, len=96
26,490,285 >>> mbox cmd response data (56 bytes)
26,491,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,636 UART: [rt]cmd =0x44504543, len=96
26,562,387 >>> mbox cmd response data (56 bytes)
26,563,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,546 UART: [rt]cmd =0x44504543, len=96
26,635,056 >>> mbox cmd response data (56 bytes)
26,635,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,666,072 UART: [rt]cmd =0x44504543, len=96
26,708,171 >>> mbox cmd response data (56 bytes)
26,708,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,739,241 UART: [rt]cmd =0x44504543, len=96
26,780,686 >>> mbox cmd response data (56 bytes)
26,781,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,811,998 UART: [rt]cmd =0x44504543, len=96
26,853,718 >>> mbox cmd response data (56 bytes)
26,854,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,884,983 UART: [rt]cmd =0x44504543, len=96
26,927,507 >>> mbox cmd response data (56 bytes)
26,928,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,958,722 UART: [rt]cmd =0x44504543, len=96
27,001,870 >>> mbox cmd response data (56 bytes)
27,002,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,033,409 UART: [rt]cmd =0x44504543, len=96
27,076,306 >>> mbox cmd response data (56 bytes)
27,077,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,107,409 UART: [rt]cmd =0x44504543, len=96
27,150,619 >>> mbox cmd response data (56 bytes)
27,151,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,181,942 UART: [rt]cmd =0x44504543, len=96
27,225,823 >>> mbox cmd response data (56 bytes)
27,226,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,257,032 UART: [rt]cmd =0x44504543, len=96
27,301,108 >>> mbox cmd response data (56 bytes)
27,301,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,332,307 UART: [rt]cmd =0x44504543, len=96
27,376,918 >>> mbox cmd response data (56 bytes)
27,377,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,408,445 UART: [rt]cmd =0x44504543, len=96
27,414,960 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,623 UART: [cold-reset] ++
1,476,985 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,810 UART: [idev] Erasing UDS.KEYID = 0
1,505,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,118 UART: [idev] --
1,515,303 UART: [ldev] ++
1,515,471 UART: [ldev] CDI.KEYID = 6
1,515,834 UART: [ldev] SUBJECT.KEYID = 5
1,516,260 UART: [ldev] AUTHORITY.KEYID = 7
1,516,723 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,964 UART: [ldev] --
1,586,299 UART: [fwproc] Waiting for Commands...
1,587,114 UART: [fwproc] Received command 0x46574c44
1,587,905 UART: [fwproc] Received Image of size 114084 bytes
2,883,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,704 >>> mbox cmd response: success
3,076,810 UART: [afmc] ++
3,076,978 UART: [afmc] CDI.KEYID = 6
3,077,340 UART: [afmc] SUBJECT.KEYID = 7
3,077,765 UART: [afmc] AUTHORITY.KEYID = 5
3,112,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,197 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,887 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,854 UART: [afmc] --
3,155,734 UART: [cold-reset] --
3,156,568 UART: [state] Locking Datavault
3,157,791 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,395 UART: [state] Locking ICCM
3,158,885 UART: [exit] Launching FMC @ 0x40000130
3,164,214 UART:
3,164,230 UART: Running Caliptra FMC ...
3,164,638 UART:
3,164,692 UART: [state] CFI Enabled
3,175,485 UART: [fht] FMC Alias Private Key: 7
3,284,160 UART: [art] Extend RT PCRs Done
3,284,588 UART: [art] Lock RT PCRs Done
3,285,856 UART: [art] Populate DV Done
3,294,255 UART: [fht] FMC Alias Private Key: 7
3,295,379 UART: [art] Derive CDI
3,295,659 UART: [art] Store in in slot 0x4
3,381,404 UART: [art] Derive Key Pair
3,381,764 UART: [art] Store priv key in slot 0x5
3,394,746 UART: [art] Derive Key Pair - Done
3,409,139 UART: [art] Signing Cert with AUTHO
3,409,619 UART: RITY.KEYID = 7
3,424,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,414 UART: [art] PUB.X = 5D435E296E06B87EC81233680591D391E8EA274BECE551BD67DDB26550E987B700163F768BCFD90ED805181F8E95CABA
3,432,156 UART: [art] PUB.Y = 08D0EDE9A56B208BCCEB2E1BBC6320160C345BB3E0700B2A49C5705602128DD059AB922751038F83190AD1E15AA13542
3,439,090 UART: [art] SIG.R = 8869492149CD4A0B89D8B0946FC8DBA0F30DCF6B94D766829D984E17CE07544363F4CE0F7896A978F897392157CB0BE4
3,445,845 UART: [art] SIG.S = 04A1C199EC80A5EB3618A1F8126EC1221F835A0FC3325A4910EC3B34607174DC11E4CAB1894056DE3B68B35B98BEE0E7
3,469,906 UART: Caliptra RT
3,470,159 UART: [state] CFI Enabled
3,577,630 UART: [rt] RT listening for mailbox commands...
3,578,300 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,478 UART: [rt]cmd =0x44504543, len=24
3,635,513 >>> mbox cmd response data (40 bytes)
3,635,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,577 UART: [rt]cmd =0x44504543, len=96
3,705,115 >>> mbox cmd response data (56 bytes)
3,705,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,033 UART: [rt]cmd =0x44504543, len=96
3,775,318 >>> mbox cmd response data (56 bytes)
3,775,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,218 UART: [rt]cmd =0x44504543, len=96
3,846,643 >>> mbox cmd response data (56 bytes)
3,846,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,575 UART: [rt]cmd =0x44504543, len=96
3,918,164 >>> mbox cmd response data (56 bytes)
3,918,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,194 UART: [rt]cmd =0x44504543, len=96
3,989,517 >>> mbox cmd response data (56 bytes)
3,989,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,499 UART: [rt]cmd =0x44504543, len=96
4,061,468 >>> mbox cmd response data (56 bytes)
4,061,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,274 UART: [rt]cmd =0x44504543, len=96
4,132,729 >>> mbox cmd response data (56 bytes)
4,132,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,162,731 UART: [rt]cmd =0x44504543, len=96
4,205,210 >>> mbox cmd response data (56 bytes)
4,205,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,235,006 UART: [rt]cmd =0x44504543, len=96
4,277,051 >>> mbox cmd response data (56 bytes)
4,277,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,306,827 UART: [rt]cmd =0x44504543, len=96
4,349,668 >>> mbox cmd response data (56 bytes)
4,349,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,379,792 UART: [rt]cmd =0x44504543, len=96
4,423,881 >>> mbox cmd response data (56 bytes)
4,423,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,453,643 UART: [rt]cmd =0x44504543, len=96
4,496,926 >>> mbox cmd response data (56 bytes)
4,496,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,526,914 UART: [rt]cmd =0x44504543, len=96
4,571,157 >>> mbox cmd response data (56 bytes)
4,571,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,601,009 UART: [rt]cmd =0x44504543, len=96
4,644,074 >>> mbox cmd response data (56 bytes)
4,644,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,674,162 UART: [rt]cmd =0x44504543, len=96
4,681,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,225 ready_for_fw is high
1,362,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,910 >>> mbox cmd response: success
2,983,454 UART:
2,983,470 UART: Running Caliptra FMC ...
2,983,878 UART:
2,983,932 UART: [state] CFI Enabled
2,994,591 UART: [fht] FMC Alias Private Key: 7
3,102,540 UART: [art] Extend RT PCRs Done
3,102,968 UART: [art] Lock RT PCRs Done
3,104,566 UART: [art] Populate DV Done
3,112,807 UART: [fht] FMC Alias Private Key: 7
3,113,963 UART: [art] Derive CDI
3,114,243 UART: [art] Store in in slot 0x4
3,199,956 UART: [art] Derive Key Pair
3,200,316 UART: [art] Store priv key in slot 0x5
3,213,054 UART: [art] Derive Key Pair - Done
3,227,886 UART: [art] Signing Cert with AUTHO
3,228,366 UART: RITY.KEYID = 7
3,243,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,281 UART: [art] PUB.X = 63F4229AEE6401A5621A6664D1C6F0E2582C6A3D1950A5F450080FCCA3EF1D2C0DA84AB8798E86BE98D30D5789165EFF
3,251,044 UART: [art] PUB.Y = 91B3AFA42965FDA2F4D112B834B8FEF7C953A25F51CBD9A4835059AF16828758ED4B63B1C8E2A405BD97FB521AB325FB
3,258,005 UART: [art] SIG.R = 371D9084CE078F259F519EA48A95B0BEECD5961DD079DF6AB21346DB68EE2287DA9A7EF81745338503C24078A30145DF
3,264,770 UART: [art] SIG.S = B00B918DAFFD4E6EB414DAD31DB7A25AD1440901EAC99442EE3C030D7DEBCD9E3FD043A5ECF7A8251A55C5FFCEEC3FE4
3,288,558 UART: Caliptra RT
3,288,811 UART: [state] CFI Enabled
3,396,680 UART: [rt] RT listening for mailbox commands...
3,397,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,732 UART: [rt]cmd =0x44504543, len=24
3,453,639 >>> mbox cmd response data (40 bytes)
3,453,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,729 UART: [rt]cmd =0x44504543, len=96
3,524,091 >>> mbox cmd response data (56 bytes)
3,524,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,945 UART: [rt]cmd =0x44504543, len=96
3,593,686 >>> mbox cmd response data (56 bytes)
3,593,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,642 UART: [rt]cmd =0x44504543, len=96
3,664,931 >>> mbox cmd response data (56 bytes)
3,664,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,693 UART: [rt]cmd =0x44504543, len=96
3,735,640 >>> mbox cmd response data (56 bytes)
3,735,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,860 UART: [rt]cmd =0x44504543, len=96
3,807,753 >>> mbox cmd response data (56 bytes)
3,807,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,827 UART: [rt]cmd =0x44504543, len=96
3,879,494 >>> mbox cmd response data (56 bytes)
3,879,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,418 UART: [rt]cmd =0x44504543, len=96
3,951,433 >>> mbox cmd response data (56 bytes)
3,951,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,981,299 UART: [rt]cmd =0x44504543, len=96
4,023,890 >>> mbox cmd response data (56 bytes)
4,023,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,053,984 UART: [rt]cmd =0x44504543, len=96
4,096,297 >>> mbox cmd response data (56 bytes)
4,096,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,183 UART: [rt]cmd =0x44504543, len=96
4,168,644 >>> mbox cmd response data (56 bytes)
4,168,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,568 UART: [rt]cmd =0x44504543, len=96
4,240,617 >>> mbox cmd response data (56 bytes)
4,240,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,561 UART: [rt]cmd =0x44504543, len=96
4,313,954 >>> mbox cmd response data (56 bytes)
4,313,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,343,882 UART: [rt]cmd =0x44504543, len=96
4,388,651 >>> mbox cmd response data (56 bytes)
4,388,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,418,653 UART: [rt]cmd =0x44504543, len=96
4,462,436 >>> mbox cmd response data (56 bytes)
4,462,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,492,308 UART: [rt]cmd =0x44504543, len=96
4,499,124 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,971 UART: [kat] HMAC-384Kdf
907,563 UART: [kat] LMS
1,475,759 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,084 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 ready_for_fw is high
1,481,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,721 UART: [idev] --
1,514,802 UART: [ldev] ++
1,514,970 UART: [ldev] CDI.KEYID = 6
1,515,333 UART: [ldev] SUBJECT.KEYID = 5
1,515,759 UART: [ldev] AUTHORITY.KEYID = 7
1,516,222 UART: [ldev] FE.KEYID = 1
1,521,318 UART: [ldev] Erasing FE.KEYID = 1
1,547,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,901 UART: [ldev] --
1,586,386 UART: [fwproc] Waiting for Commands...
1,587,083 UART: [fwproc] Received command 0x46574c44
1,587,874 UART: [fwproc] Received Image of size 114084 bytes
2,882,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,429 >>> mbox cmd response: success
3,076,467 UART: [afmc] ++
3,076,635 UART: [afmc] CDI.KEYID = 6
3,076,997 UART: [afmc] SUBJECT.KEYID = 7
3,077,422 UART: [afmc] AUTHORITY.KEYID = 5
3,112,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,898 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,588 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,449 UART: [afmc] --
3,155,409 UART: [cold-reset] --
3,156,321 UART: [state] Locking Datavault
3,157,272 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,876 UART: [state] Locking ICCM
3,158,452 UART: [exit] Launching FMC @ 0x40000130
3,163,781 UART:
3,163,797 UART: Running Caliptra FMC ...
3,164,205 UART:
3,164,348 UART: [state] CFI Enabled
3,174,909 UART: [fht] FMC Alias Private Key: 7
3,282,752 UART: [art] Extend RT PCRs Done
3,283,180 UART: [art] Lock RT PCRs Done
3,284,902 UART: [art] Populate DV Done
3,293,211 UART: [fht] FMC Alias Private Key: 7
3,294,261 UART: [art] Derive CDI
3,294,541 UART: [art] Store in in slot 0x4
3,379,918 UART: [art] Derive Key Pair
3,380,278 UART: [art] Store priv key in slot 0x5
3,394,204 UART: [art] Derive Key Pair - Done
3,408,696 UART: [art] Signing Cert with AUTHO
3,409,176 UART: RITY.KEYID = 7
3,424,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,495 UART: [art] PUB.X = C96D4DFC156DF6372552724AC6DE76A5C5AA4FBF611F2B4E860E42B38CBF340F4862924AE48156684AA1BB597FB5CFCB
3,432,275 UART: [art] PUB.Y = 3A4634CE18B6F1624053071ACC8EB369DDD1D15B623144421839C56D3D17A240FE3A1CFB4135EBEE0CBC8EADCEDC864B
3,439,237 UART: [art] SIG.R = 7FCE5EFE5A1F8B5DE0877EE936F916B460D5D56C2A154C6BBFF6B8D504952EE7C6CA088F1303822197D6B5555F0F0E45
3,446,004 UART: [art] SIG.S = 2A34F40B241F7AFB3065C7E95FBBFA4BC50234D0AC1B8711653C89892CA7D27A27592BA8AC31059279300DEED6657561
3,469,551 UART: Caliptra RT
3,469,896 UART: [state] CFI Enabled
3,577,694 UART: [rt] RT listening for mailbox commands...
3,578,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,110 UART: [rt]cmd =0x44504543, len=24
3,634,567 >>> mbox cmd response data (40 bytes)
3,634,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,503 UART: [rt]cmd =0x44504543, len=96
3,704,423 >>> mbox cmd response data (56 bytes)
3,704,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,405 UART: [rt]cmd =0x44504543, len=96
3,774,614 >>> mbox cmd response data (56 bytes)
3,774,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,452 UART: [rt]cmd =0x44504543, len=96
3,845,075 >>> mbox cmd response data (56 bytes)
3,845,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,969 UART: [rt]cmd =0x44504543, len=96
3,916,814 >>> mbox cmd response data (56 bytes)
3,916,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,978 UART: [rt]cmd =0x44504543, len=96
3,988,985 >>> mbox cmd response data (56 bytes)
3,988,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,941 UART: [rt]cmd =0x44504543, len=96
4,061,104 >>> mbox cmd response data (56 bytes)
4,061,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,210 UART: [rt]cmd =0x44504543, len=96
4,133,689 >>> mbox cmd response data (56 bytes)
4,133,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,625 UART: [rt]cmd =0x44504543, len=96
4,205,278 >>> mbox cmd response data (56 bytes)
4,205,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,235,172 UART: [rt]cmd =0x44504543, len=96
4,278,035 >>> mbox cmd response data (56 bytes)
4,278,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,307,923 UART: [rt]cmd =0x44504543, len=96
4,350,846 >>> mbox cmd response data (56 bytes)
4,350,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,380,924 UART: [rt]cmd =0x44504543, len=96
4,424,425 >>> mbox cmd response data (56 bytes)
4,424,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,377 UART: [rt]cmd =0x44504543, len=96
4,498,046 >>> mbox cmd response data (56 bytes)
4,498,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,527,998 UART: [rt]cmd =0x44504543, len=96
4,571,911 >>> mbox cmd response data (56 bytes)
4,571,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,601,761 UART: [rt]cmd =0x44504543, len=96
4,646,330 >>> mbox cmd response data (56 bytes)
4,646,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,676,234 UART: [rt]cmd =0x44504543, len=96
4,683,430 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,991 >>> mbox cmd response: success
2,987,297 UART:
2,987,313 UART: Running Caliptra FMC ...
2,987,721 UART:
2,987,864 UART: [state] CFI Enabled
2,998,363 UART: [fht] FMC Alias Private Key: 7
3,106,194 UART: [art] Extend RT PCRs Done
3,106,622 UART: [art] Lock RT PCRs Done
3,108,284 UART: [art] Populate DV Done
3,116,593 UART: [fht] FMC Alias Private Key: 7
3,117,579 UART: [art] Derive CDI
3,117,859 UART: [art] Store in in slot 0x4
3,203,826 UART: [art] Derive Key Pair
3,204,186 UART: [art] Store priv key in slot 0x5
3,217,452 UART: [art] Derive Key Pair - Done
3,232,254 UART: [art] Signing Cert with AUTHO
3,232,734 UART: RITY.KEYID = 7
3,248,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,217 UART: [art] PUB.X = 777A7B7B189B5C6064E48FD20FC9ED3154FFCC82B75C04F32F691AF3592A6B844B864CBDCA619F54ECD11D4350A6F86A
3,255,995 UART: [art] PUB.Y = DD4BBE73CCD270202C13CAD831A9A12826E9F9B6FA8C8C62BA3D987E01BF98EDBB4489C8D9506BBB6481B8B5B49BC0DD
3,262,966 UART: [art] SIG.R = 272C2D3DC22132256810C57C8501B2D6D4BE4246C05B9BC2107DD699DCCAB5DE44A47B5C04D37A9AD2CDE4C8F8074386
3,269,737 UART: [art] SIG.S = B237134D6CE1D5E132A8D6163FC0E79B6F7EA630B353C950C3C59A5181BBCB17ED6C37E949FEB77A640BCA7224BB4385
3,293,155 UART: Caliptra RT
3,293,500 UART: [state] CFI Enabled
3,402,367 UART: [rt] RT listening for mailbox commands...
3,403,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,045 UART: [rt]cmd =0x44504543, len=24
3,459,306 >>> mbox cmd response data (40 bytes)
3,459,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,294 UART: [rt]cmd =0x44504543, len=96
3,528,924 >>> mbox cmd response data (56 bytes)
3,528,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,786 UART: [rt]cmd =0x44504543, len=96
3,599,247 >>> mbox cmd response data (56 bytes)
3,599,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,031 UART: [rt]cmd =0x44504543, len=96
3,670,332 >>> mbox cmd response data (56 bytes)
3,670,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,266 UART: [rt]cmd =0x44504543, len=96
3,741,299 >>> mbox cmd response data (56 bytes)
3,741,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,119 UART: [rt]cmd =0x44504543, len=96
3,812,940 >>> mbox cmd response data (56 bytes)
3,812,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,930 UART: [rt]cmd =0x44504543, len=96
3,884,425 >>> mbox cmd response data (56 bytes)
3,884,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,549 UART: [rt]cmd =0x44504543, len=96
3,956,462 >>> mbox cmd response data (56 bytes)
3,956,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,986,554 UART: [rt]cmd =0x44504543, len=96
4,029,175 >>> mbox cmd response data (56 bytes)
4,029,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,059,249 UART: [rt]cmd =0x44504543, len=96
4,101,850 >>> mbox cmd response data (56 bytes)
4,101,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,131,658 UART: [rt]cmd =0x44504543, len=96
4,174,787 >>> mbox cmd response data (56 bytes)
4,174,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,204,753 UART: [rt]cmd =0x44504543, len=96
4,248,008 >>> mbox cmd response data (56 bytes)
4,248,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,277,922 UART: [rt]cmd =0x44504543, len=96
4,321,289 >>> mbox cmd response data (56 bytes)
4,321,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,351,121 UART: [rt]cmd =0x44504543, len=96
4,394,804 >>> mbox cmd response data (56 bytes)
4,394,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,424,564 UART: [rt]cmd =0x44504543, len=96
4,469,111 >>> mbox cmd response data (56 bytes)
4,469,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,499,173 UART: [rt]cmd =0x44504543, len=96
4,506,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,486 UART: [kat] SHA2-512-ACC
908,387 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,460 UART: [kat] LMS
1,170,788 UART: [kat] --
1,171,577 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,760 UART: [idev] ++
1,174,928 UART: [idev] CDI.KEYID = 6
1,175,288 UART: [idev] SUBJECT.KEYID = 7
1,175,712 UART: [idev] UDS.KEYID = 0
1,176,057 ready_for_fw is high
1,176,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,201,033 UART: [idev] Sha1 KeyId Algorithm
1,209,539 UART: [idev] --
1,210,729 UART: [ldev] ++
1,210,897 UART: [ldev] CDI.KEYID = 6
1,211,260 UART: [ldev] SUBJECT.KEYID = 5
1,211,686 UART: [ldev] AUTHORITY.KEYID = 7
1,212,149 UART: [ldev] FE.KEYID = 1
1,217,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,500 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,106 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,489 >>> mbox cmd response: success
2,771,679 UART: [afmc] ++
2,771,847 UART: [afmc] CDI.KEYID = 6
2,772,209 UART: [afmc] SUBJECT.KEYID = 7
2,772,634 UART: [afmc] AUTHORITY.KEYID = 5
2,808,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,195 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,582 UART: [afmc] --
2,851,602 UART: [cold-reset] --
2,852,412 UART: [state] Locking Datavault
2,853,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,319 UART: [state] Locking ICCM
2,854,883 UART: [exit] Launching FMC @ 0x40000130
2,860,212 UART:
2,860,228 UART: Running Caliptra FMC ...
2,860,636 UART:
2,860,690 UART: [state] CFI Enabled
2,871,179 UART: [fht] FMC Alias Private Key: 7
2,978,928 UART: [art] Extend RT PCRs Done
2,979,356 UART: [art] Lock RT PCRs Done
2,981,024 UART: [art] Populate DV Done
2,989,295 UART: [fht] FMC Alias Private Key: 7
2,990,291 UART: [art] Derive CDI
2,990,571 UART: [art] Store in in slot 0x4
3,076,132 UART: [art] Derive Key Pair
3,076,492 UART: [art] Store priv key in slot 0x5
3,090,222 UART: [art] Derive Key Pair - Done
3,104,950 UART: [art] Signing Cert with AUTHO
3,105,430 UART: RITY.KEYID = 7
3,120,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,681 UART: [art] PUB.X = B7F75485E31F40BDFD928DA6CA396D423BE0F44C0F5521F9605BEFCEC77E93F25D63FD2D7371CAD26D849ADB5F0C66EC
3,128,467 UART: [art] PUB.Y = F2B6F8F8B9A43D6B507867631928D0CECE92812174D81CB7570C04F906BC66B0009A0E02EE1897864C63F471E2DF6A20
3,135,380 UART: [art] SIG.R = FF2091C206E113B822F9D8CAAC4F8E1D026C3E097E0C56ADEF5478058680756E56469153245C7FDD4798204AC13BE294
3,142,135 UART: [art] SIG.S = 69CA6E1B86D3841E0750A3172CDC42D23EBE5F6335E9422EF6BC9905B13ED3F10EF3F55522360C81818B5FCC1F5E462F
3,166,218 UART: Caliptra RT
3,166,471 UART: [state] CFI Enabled
3,274,324 UART: [rt] RT listening for mailbox commands...
3,274,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,772 UART: [rt]cmd =0x44504543, len=24
3,330,705 >>> mbox cmd response data (40 bytes)
3,330,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,809 UART: [rt]cmd =0x44504543, len=96
3,400,751 >>> mbox cmd response data (56 bytes)
3,400,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,447 UART: [rt]cmd =0x44504543, len=96
3,470,892 >>> mbox cmd response data (56 bytes)
3,470,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,708 UART: [rt]cmd =0x44504543, len=96
3,541,593 >>> mbox cmd response data (56 bytes)
3,541,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,503 UART: [rt]cmd =0x44504543, len=96
3,613,102 >>> mbox cmd response data (56 bytes)
3,613,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,072 UART: [rt]cmd =0x44504543, len=96
3,684,487 >>> mbox cmd response data (56 bytes)
3,684,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,605 UART: [rt]cmd =0x44504543, len=96
3,756,580 >>> mbox cmd response data (56 bytes)
3,756,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,324 UART: [rt]cmd =0x44504543, len=96
3,828,521 >>> mbox cmd response data (56 bytes)
3,828,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,447 UART: [rt]cmd =0x44504543, len=96
3,901,074 >>> mbox cmd response data (56 bytes)
3,901,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,030 UART: [rt]cmd =0x44504543, len=96
3,973,019 >>> mbox cmd response data (56 bytes)
3,973,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,047 UART: [rt]cmd =0x44504543, len=96
4,046,060 >>> mbox cmd response data (56 bytes)
4,046,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,120 UART: [rt]cmd =0x44504543, len=96
4,119,001 >>> mbox cmd response data (56 bytes)
4,119,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,005 UART: [rt]cmd =0x44504543, len=96
4,191,840 >>> mbox cmd response data (56 bytes)
4,191,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,748 UART: [rt]cmd =0x44504543, len=96
4,266,499 >>> mbox cmd response data (56 bytes)
4,266,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,371 UART: [rt]cmd =0x44504543, len=96
4,340,328 >>> mbox cmd response data (56 bytes)
4,340,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,092 UART: [rt]cmd =0x44504543, len=96
4,377,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,807 ready_for_fw is high
1,059,807 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,778 >>> mbox cmd response: success
2,684,558 UART:
2,684,574 UART: Running Caliptra FMC ...
2,684,982 UART:
2,685,036 UART: [state] CFI Enabled
2,695,197 UART: [fht] FMC Alias Private Key: 7
2,803,904 UART: [art] Extend RT PCRs Done
2,804,332 UART: [art] Lock RT PCRs Done
2,806,326 UART: [art] Populate DV Done
2,814,681 UART: [fht] FMC Alias Private Key: 7
2,815,625 UART: [art] Derive CDI
2,815,905 UART: [art] Store in in slot 0x4
2,901,828 UART: [art] Derive Key Pair
2,902,188 UART: [art] Store priv key in slot 0x5
2,914,902 UART: [art] Derive Key Pair - Done
2,929,763 UART: [art] Signing Cert with AUTHO
2,930,243 UART: RITY.KEYID = 7
2,945,423 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,188 UART: [art] PUB.X = FB79A80DDD4B589C9D58CD709B5270C3B6B92D099C8870FF30E4CDE8D9868E99A6780FE8E1440E309911F5C3F8AD4021
2,952,954 UART: [art] PUB.Y = 120CCA961DC4ACF7C77C83B06AC71CC4F6E96DD8822EEB9F902F47E1DCD4938256D4847E3CD4FC80DFC2F78AF452A34D
2,959,923 UART: [art] SIG.R = 494172CA538D75F8D127BF4A2E262E51B8D1114DC1E61D69555FC14B8550F0003142FE42CB45261C440D6175108EB06E
2,966,664 UART: [art] SIG.S = 66DCC04CCDDE2616F420936F55A3615BF7E78747DD1082F181020490F443A8A47DDB1D336298CF75944054489D7E04BC
2,990,984 UART: Caliptra RT
2,991,237 UART: [state] CFI Enabled
3,099,822 UART: [rt] RT listening for mailbox commands...
3,100,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,248 UART: [rt]cmd =0x44504543, len=24
3,156,447 >>> mbox cmd response data (40 bytes)
3,156,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,461 UART: [rt]cmd =0x44504543, len=96
3,226,467 >>> mbox cmd response data (56 bytes)
3,226,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,381 UART: [rt]cmd =0x44504543, len=96
3,297,068 >>> mbox cmd response data (56 bytes)
3,297,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,294 UART: [rt]cmd =0x44504543, len=96
3,368,307 >>> mbox cmd response data (56 bytes)
3,368,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,369 UART: [rt]cmd =0x44504543, len=96
3,439,168 >>> mbox cmd response data (56 bytes)
3,439,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,908 UART: [rt]cmd =0x44504543, len=96
3,509,909 >>> mbox cmd response data (56 bytes)
3,509,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,679 UART: [rt]cmd =0x44504543, len=96
3,581,638 >>> mbox cmd response data (56 bytes)
3,581,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,532 UART: [rt]cmd =0x44504543, len=96
3,654,109 >>> mbox cmd response data (56 bytes)
3,654,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,027 UART: [rt]cmd =0x44504543, len=96
3,725,456 >>> mbox cmd response data (56 bytes)
3,725,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,514 UART: [rt]cmd =0x44504543, len=96
3,798,453 >>> mbox cmd response data (56 bytes)
3,798,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,329 UART: [rt]cmd =0x44504543, len=96
3,870,668 >>> mbox cmd response data (56 bytes)
3,870,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,644 UART: [rt]cmd =0x44504543, len=96
3,943,739 >>> mbox cmd response data (56 bytes)
3,943,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,897 UART: [rt]cmd =0x44504543, len=96
4,017,648 >>> mbox cmd response data (56 bytes)
4,017,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,678 UART: [rt]cmd =0x44504543, len=96
4,090,533 >>> mbox cmd response data (56 bytes)
4,090,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,299 UART: [rt]cmd =0x44504543, len=96
4,163,940 >>> mbox cmd response data (56 bytes)
4,163,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,718 UART: [rt]cmd =0x44504543, len=96
4,200,840 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,156 UART: [kat] SHA2-256
904,096 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,799 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 ready_for_fw is high
1,176,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,719 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,210,938 UART: [ldev] ++
1,211,106 UART: [ldev] CDI.KEYID = 6
1,211,469 UART: [ldev] SUBJECT.KEYID = 5
1,211,895 UART: [ldev] AUTHORITY.KEYID = 7
1,212,358 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,243,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,382 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,255 UART: [fwproc] Recv command 0x46574c44
1,283,983 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,548 >>> mbox cmd response: success
2,770,614 UART: [afmc] ++
2,770,782 UART: [afmc] CDI.KEYID = 6
2,771,144 UART: [afmc] SUBJECT.KEYID = 7
2,771,569 UART: [afmc] AUTHORITY.KEYID = 5
2,806,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,907 UART: [afmc] --
2,849,853 UART: [cold-reset] --
2,850,895 UART: [state] Locking Datavault
2,851,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,518 UART: [state] Locking ICCM
2,853,026 UART: [exit] Launching FMC @ 0x40000130
2,858,355 UART:
2,858,371 UART: Running Caliptra FMC ...
2,858,779 UART:
2,858,922 UART: [state] CFI Enabled
2,870,083 UART: [fht] FMC Alias Private Key: 7
2,977,572 UART: [art] Extend RT PCRs Done
2,978,000 UART: [art] Lock RT PCRs Done
2,979,722 UART: [art] Populate DV Done
2,988,289 UART: [fht] FMC Alias Private Key: 7
2,989,327 UART: [art] Derive CDI
2,989,607 UART: [art] Store in in slot 0x4
3,075,474 UART: [art] Derive Key Pair
3,075,834 UART: [art] Store priv key in slot 0x5
3,088,858 UART: [art] Derive Key Pair - Done
3,103,917 UART: [art] Signing Cert with AUTHO
3,104,397 UART: RITY.KEYID = 7
3,119,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,586 UART: [art] PUB.X = 4130060DF37DC046D07D55AA140C1956B436A950E1FB422A6D7A0D3C5306019EFC3D4178CB9B707465F05EA7149D25EF
3,127,340 UART: [art] PUB.Y = E794112C2DC87E40DE0C187D99D26DC7AE21A0C21EDE377C54B186BC3F591AF1C8EAF08BA19D99C3C61DC42F94E5F4CF
3,134,309 UART: [art] SIG.R = AFBBA80349B51081AC7C6AF30F8AB6146D570899CD0A81DCB6A0DA59D00AA157F6A84EFF639EA307CCBC706C7440A7D0
3,141,081 UART: [art] SIG.S = 27654A5BBC97BE7EF05B6CAE5123094FF4DD370DA6D278955299F70382D6DB443201F2129F71B6F61D8F74F67DDFB24A
3,165,110 UART: Caliptra RT
3,165,455 UART: [state] CFI Enabled
3,273,898 UART: [rt] RT listening for mailbox commands...
3,274,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,490 UART: [rt]cmd =0x44504543, len=24
3,330,541 >>> mbox cmd response data (40 bytes)
3,330,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,553 UART: [rt]cmd =0x44504543, len=96
3,401,257 >>> mbox cmd response data (56 bytes)
3,401,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,197 UART: [rt]cmd =0x44504543, len=96
3,471,334 >>> mbox cmd response data (56 bytes)
3,471,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,096 UART: [rt]cmd =0x44504543, len=96
3,541,579 >>> mbox cmd response data (56 bytes)
3,541,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,489 UART: [rt]cmd =0x44504543, len=96
3,612,768 >>> mbox cmd response data (56 bytes)
3,612,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,726 UART: [rt]cmd =0x44504543, len=96
3,683,709 >>> mbox cmd response data (56 bytes)
3,683,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,777 UART: [rt]cmd =0x44504543, len=96
3,755,660 >>> mbox cmd response data (56 bytes)
3,755,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,438 UART: [rt]cmd =0x44504543, len=96
3,827,495 >>> mbox cmd response data (56 bytes)
3,827,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,553 UART: [rt]cmd =0x44504543, len=96
3,900,556 >>> mbox cmd response data (56 bytes)
3,900,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,330 UART: [rt]cmd =0x44504543, len=96
3,973,209 >>> mbox cmd response data (56 bytes)
3,973,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,203 UART: [rt]cmd =0x44504543, len=96
4,046,538 >>> mbox cmd response data (56 bytes)
4,046,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,076,380 UART: [rt]cmd =0x44504543, len=96
4,119,957 >>> mbox cmd response data (56 bytes)
4,119,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,917 UART: [rt]cmd =0x44504543, len=96
4,192,506 >>> mbox cmd response data (56 bytes)
4,192,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,454 UART: [rt]cmd =0x44504543, len=96
4,266,731 >>> mbox cmd response data (56 bytes)
4,266,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,755 UART: [rt]cmd =0x44504543, len=96
4,341,162 >>> mbox cmd response data (56 bytes)
4,341,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,102 UART: [rt]cmd =0x44504543, len=96
4,378,378 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 ready_for_fw is high
1,059,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,463 >>> mbox cmd response: success
2,685,909 UART:
2,685,925 UART: Running Caliptra FMC ...
2,686,333 UART:
2,686,476 UART: [state] CFI Enabled
2,697,425 UART: [fht] FMC Alias Private Key: 7
2,805,632 UART: [art] Extend RT PCRs Done
2,806,060 UART: [art] Lock RT PCRs Done
2,807,466 UART: [art] Populate DV Done
2,815,619 UART: [fht] FMC Alias Private Key: 7
2,816,695 UART: [art] Derive CDI
2,816,975 UART: [art] Store in in slot 0x4
2,902,890 UART: [art] Derive Key Pair
2,903,250 UART: [art] Store priv key in slot 0x5
2,916,188 UART: [art] Derive Key Pair - Done
2,930,785 UART: [art] Signing Cert with AUTHO
2,931,265 UART: RITY.KEYID = 7
2,946,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,418 UART: [art] PUB.X = 1C797437E3EA0ADB5F976362DD8DB9886B2D2293C2F395FAA096B98D79D73A19062AB39F4E6150FA876AC7D864A7F8CB
2,954,192 UART: [art] PUB.Y = 4139AAB3C91DB956B9C529905B29345C60E2729446EE7511E4D25EB46D36261A446B0AAC28590D29715641B7A058A59E
2,961,130 UART: [art] SIG.R = 8C2CFFEBEAFAF5E7F7C905F084897424AA0393B0E6FF35EF0203385334AEA3EF34DED9E53BD3405C47AC301E01C86155
2,967,901 UART: [art] SIG.S = 6C7E3306FC64D6F7A030F16C882E71C35625E94F43ED29C92BDB5454C0FDFF75598AF3FB7D221CCCC543B56025C17917
2,991,715 UART: Caliptra RT
2,992,060 UART: [state] CFI Enabled
3,099,279 UART: [rt] RT listening for mailbox commands...
3,099,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,773 UART: [rt]cmd =0x44504543, len=24
3,155,714 >>> mbox cmd response data (40 bytes)
3,155,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,676 UART: [rt]cmd =0x44504543, len=96
3,225,916 >>> mbox cmd response data (56 bytes)
3,225,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,746 UART: [rt]cmd =0x44504543, len=96
3,296,177 >>> mbox cmd response data (56 bytes)
3,296,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,185 UART: [rt]cmd =0x44504543, len=96
3,366,742 >>> mbox cmd response data (56 bytes)
3,366,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,522 UART: [rt]cmd =0x44504543, len=96
3,437,805 >>> mbox cmd response data (56 bytes)
3,437,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,763 UART: [rt]cmd =0x44504543, len=96
3,509,564 >>> mbox cmd response data (56 bytes)
3,509,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,590 UART: [rt]cmd =0x44504543, len=96
3,581,661 >>> mbox cmd response data (56 bytes)
3,581,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,751 UART: [rt]cmd =0x44504543, len=96
3,653,700 >>> mbox cmd response data (56 bytes)
3,653,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,506 UART: [rt]cmd =0x44504543, len=96
3,725,369 >>> mbox cmd response data (56 bytes)
3,725,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,349 UART: [rt]cmd =0x44504543, len=96
3,798,108 >>> mbox cmd response data (56 bytes)
3,798,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,870 UART: [rt]cmd =0x44504543, len=96
3,870,161 >>> mbox cmd response data (56 bytes)
3,870,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,119 UART: [rt]cmd =0x44504543, len=96
3,943,278 >>> mbox cmd response data (56 bytes)
3,943,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,434 UART: [rt]cmd =0x44504543, len=96
4,017,113 >>> mbox cmd response data (56 bytes)
4,017,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,157 UART: [rt]cmd =0x44504543, len=96
4,090,716 >>> mbox cmd response data (56 bytes)
4,090,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,574 UART: [rt]cmd =0x44504543, len=96
4,164,693 >>> mbox cmd response data (56 bytes)
4,164,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,807 UART: [rt]cmd =0x44504543, len=96
4,201,943 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
919,998 UART: [kat] LMS
1,168,310 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,557 UART: [fht] FHT @ 0x50003400
1,172,159 UART: [idev] ++
1,172,327 UART: [idev] CDI.KEYID = 6
1,172,688 UART: [idev] SUBJECT.KEYID = 7
1,173,113 UART: [idev] UDS.KEYID = 0
1,173,459 ready_for_fw is high
1,173,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,197,639 UART: [idev] Sha1 KeyId Algorithm
1,206,499 UART: [idev] --
1,207,592 UART: [ldev] ++
1,207,760 UART: [ldev] CDI.KEYID = 6
1,208,124 UART: [ldev] SUBJECT.KEYID = 5
1,208,551 UART: [ldev] AUTHORITY.KEYID = 7
1,209,014 UART: [ldev] FE.KEYID = 1
1,214,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,982 UART: [ldev] --
1,279,322 UART: [fwproc] Wait for Commands...
1,279,993 UART: [fwproc] Recv command 0x46574c44
1,280,726 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,173 >>> mbox cmd response: success
2,768,350 UART: [afmc] ++
2,768,518 UART: [afmc] CDI.KEYID = 6
2,768,881 UART: [afmc] SUBJECT.KEYID = 7
2,769,307 UART: [afmc] AUTHORITY.KEYID = 5
2,804,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,127 UART: [afmc] --
2,848,195 UART: [cold-reset] --
2,848,989 UART: [state] Locking Datavault
2,850,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,718 UART: [state] Locking ICCM
2,851,328 UART: [exit] Launching FMC @ 0x40000130
2,856,657 UART:
2,856,673 UART: Running Caliptra FMC ...
2,857,081 UART:
2,857,135 UART: [state] CFI Enabled
2,867,472 UART: [fht] FMC Alias Private Key: 7
2,974,993 UART: [art] Extend RT PCRs Done
2,975,421 UART: [art] Lock RT PCRs Done
2,977,175 UART: [art] Populate DV Done
2,985,374 UART: [fht] FMC Alias Private Key: 7
2,986,418 UART: [art] Derive CDI
2,986,698 UART: [art] Store in in slot 0x4
3,072,237 UART: [art] Derive Key Pair
3,072,597 UART: [art] Store priv key in slot 0x5
3,085,375 UART: [art] Derive Key Pair - Done
3,100,303 UART: [art] Signing Cert with AUTHO
3,100,783 UART: RITY.KEYID = 7
3,116,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,944 UART: [art] PUB.X = 423F76E81AED9A91192045B49A52B85B993EC94F2382D8D7D7ED09192B8509DBF9EB734D87E3740B81D5BFDAF634361A
3,123,711 UART: [art] PUB.Y = F0FAC58D4ECCDFDF2EAB749151720E7F1150790CF95D9759C1B9C97B8DB14F0885308FEAA2FCDBDAF0C0A8EC3D322772
3,130,676 UART: [art] SIG.R = 8EA77829B2C2C63E0BFAF8C88A18E13A65F4E89921D99DC962A9E06595E0CB3A376807B1A293DD9F0EF06A530484DC64
3,137,442 UART: [art] SIG.S = 7D6ADCF8235AB0C60499AEC2888370BFD7C088B6494B4FCD76B7EEBC64EE9D051158A2CC5B273E64FFE32EA3C1672442
3,161,415 UART: Caliptra RT
3,161,668 UART: [state] CFI Enabled
3,269,061 UART: [rt] RT listening for mailbox commands...
3,269,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,997 UART: [rt]cmd =0x44504543, len=24
3,326,280 >>> mbox cmd response data (40 bytes)
3,326,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,262 UART: [rt]cmd =0x44504543, len=96
3,396,416 >>> mbox cmd response data (56 bytes)
3,396,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,426,562 UART: [rt]cmd =0x44504543, len=96
3,466,997 >>> mbox cmd response data (56 bytes)
3,466,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,923 UART: [rt]cmd =0x44504543, len=96
3,537,448 >>> mbox cmd response data (56 bytes)
3,537,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,246 UART: [rt]cmd =0x44504543, len=96
3,608,319 >>> mbox cmd response data (56 bytes)
3,608,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,215 UART: [rt]cmd =0x44504543, len=96
3,680,018 >>> mbox cmd response data (56 bytes)
3,680,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,872 UART: [rt]cmd =0x44504543, len=96
3,750,693 >>> mbox cmd response data (56 bytes)
3,750,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,543 UART: [rt]cmd =0x44504543, len=96
3,823,082 >>> mbox cmd response data (56 bytes)
3,823,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,138 UART: [rt]cmd =0x44504543, len=96
3,894,817 >>> mbox cmd response data (56 bytes)
3,894,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,924,939 UART: [rt]cmd =0x44504543, len=96
3,967,328 >>> mbox cmd response data (56 bytes)
3,967,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,424 UART: [rt]cmd =0x44504543, len=96
4,040,845 >>> mbox cmd response data (56 bytes)
4,040,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,649 UART: [rt]cmd =0x44504543, len=96
4,113,958 >>> mbox cmd response data (56 bytes)
4,113,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,582 UART: [rt]cmd =0x44504543, len=96
4,186,639 >>> mbox cmd response data (56 bytes)
4,186,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,216,571 UART: [rt]cmd =0x44504543, len=96
4,260,666 >>> mbox cmd response data (56 bytes)
4,260,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,290,606 UART: [rt]cmd =0x44504543, len=96
4,333,945 >>> mbox cmd response data (56 bytes)
4,333,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,363,755 UART: [rt]cmd =0x44504543, len=96
4,370,847 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,238 ready_for_fw is high
1,056,238 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,643 >>> mbox cmd response: success
2,678,957 UART:
2,678,973 UART: Running Caliptra FMC ...
2,679,381 UART:
2,679,435 UART: [state] CFI Enabled
2,689,788 UART: [fht] FMC Alias Private Key: 7
2,798,381 UART: [art] Extend RT PCRs Done
2,798,809 UART: [art] Lock RT PCRs Done
2,800,239 UART: [art] Populate DV Done
2,808,608 UART: [fht] FMC Alias Private Key: 7
2,809,604 UART: [art] Derive CDI
2,809,884 UART: [art] Store in in slot 0x4
2,895,487 UART: [art] Derive Key Pair
2,895,847 UART: [art] Store priv key in slot 0x5
2,908,321 UART: [art] Derive Key Pair - Done
2,923,089 UART: [art] Signing Cert with AUTHO
2,923,569 UART: RITY.KEYID = 7
2,938,635 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,400 UART: [art] PUB.X = D5C905DC50E062257ACDBEF373D51BBF2002C2B19FCF47CF59C777FE8DD8D69E58B7222915DE53B839292D8286832226
2,946,170 UART: [art] PUB.Y = F038D130FC0E03DC5E04222641E9E235B87BA6EE97EA7577C25A959A7C1082DB77CAF8D71826C73194699BAE5425A9F7
2,953,115 UART: [art] SIG.R = 5F8442568E9E14070A5BED48DE2F1F0DD38FBACBC3B0ADECF3AB0318E3D8F32BB23FED862FD62028F9D9FB9E2FAFC0F3
2,959,905 UART: [art] SIG.S = 9D424E2885AD8CD2FCAE9D7D17313EDCBAD485C80605A5BECBB9E0620557BEF383EA279DDA280214774A4ED6719AFD4A
2,983,504 UART: Caliptra RT
2,983,757 UART: [state] CFI Enabled
3,092,644 UART: [rt] RT listening for mailbox commands...
3,093,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,240 UART: [rt]cmd =0x44504543, len=24
3,149,757 >>> mbox cmd response data (40 bytes)
3,149,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,729 UART: [rt]cmd =0x44504543, len=96
3,219,465 >>> mbox cmd response data (56 bytes)
3,219,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,249,355 UART: [rt]cmd =0x44504543, len=96
3,290,088 >>> mbox cmd response data (56 bytes)
3,290,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,994 UART: [rt]cmd =0x44504543, len=96
3,360,703 >>> mbox cmd response data (56 bytes)
3,360,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,390,459 UART: [rt]cmd =0x44504543, len=96
3,432,226 >>> mbox cmd response data (56 bytes)
3,432,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,072 UART: [rt]cmd =0x44504543, len=96
3,503,665 >>> mbox cmd response data (56 bytes)
3,503,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,707 UART: [rt]cmd =0x44504543, len=96
3,575,188 >>> mbox cmd response data (56 bytes)
3,575,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,248 UART: [rt]cmd =0x44504543, len=96
3,647,621 >>> mbox cmd response data (56 bytes)
3,647,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,585 UART: [rt]cmd =0x44504543, len=96
3,719,280 >>> mbox cmd response data (56 bytes)
3,719,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,256 UART: [rt]cmd =0x44504543, len=96
3,791,841 >>> mbox cmd response data (56 bytes)
3,791,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,593 UART: [rt]cmd =0x44504543, len=96
3,863,964 >>> mbox cmd response data (56 bytes)
3,863,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,932 UART: [rt]cmd =0x44504543, len=96
3,936,725 >>> mbox cmd response data (56 bytes)
3,936,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,637 UART: [rt]cmd =0x44504543, len=96
4,010,732 >>> mbox cmd response data (56 bytes)
4,010,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,040,860 UART: [rt]cmd =0x44504543, len=96
4,085,215 >>> mbox cmd response data (56 bytes)
4,085,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,115,081 UART: [rt]cmd =0x44504543, len=96
4,158,746 >>> mbox cmd response data (56 bytes)
4,158,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,188,540 UART: [rt]cmd =0x44504543, len=96
4,195,442 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 ready_for_fw is high
1,174,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,079 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,479 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,712 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,212 >>> mbox cmd response: success
2,770,457 UART: [afmc] ++
2,770,625 UART: [afmc] CDI.KEYID = 6
2,770,988 UART: [afmc] SUBJECT.KEYID = 7
2,771,414 UART: [afmc] AUTHORITY.KEYID = 5
2,806,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,004 UART: [afmc] --
2,850,110 UART: [cold-reset] --
2,850,872 UART: [state] Locking Datavault
2,851,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,591 UART: [state] Locking ICCM
2,853,091 UART: [exit] Launching FMC @ 0x40000130
2,858,420 UART:
2,858,436 UART: Running Caliptra FMC ...
2,858,844 UART:
2,858,987 UART: [state] CFI Enabled
2,869,904 UART: [fht] FMC Alias Private Key: 7
2,977,931 UART: [art] Extend RT PCRs Done
2,978,359 UART: [art] Lock RT PCRs Done
2,980,157 UART: [art] Populate DV Done
2,988,348 UART: [fht] FMC Alias Private Key: 7
2,989,406 UART: [art] Derive CDI
2,989,686 UART: [art] Store in in slot 0x4
3,075,143 UART: [art] Derive Key Pair
3,075,503 UART: [art] Store priv key in slot 0x5
3,088,479 UART: [art] Derive Key Pair - Done
3,103,030 UART: [art] Signing Cert with AUTHO
3,103,510 UART: RITY.KEYID = 7
3,119,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,819 UART: [art] PUB.X = DAB7549375C0C4EA1EBB60F00A129BFBAF4AA5B61FB24B2B94E2D405E6001AEC08B9B51F4217013FD5D66DAC88A25D83
3,126,575 UART: [art] PUB.Y = 938E4B75E2637AADCF2500D09B2B749191DF4F08E6817D8AB61DF4DFEA28E15F3E10BE1BFE2102CACF4F1D3A6493E2B6
3,133,517 UART: [art] SIG.R = A91548E817089E8D945BAEE9FE8E96597E8E08946E562322F04BD2A2334433CB06F544D807D11E3E2E4D269E293DE0B5
3,140,275 UART: [art] SIG.S = 11EF798AA74C6C39FB30C60FAD9BD9576150CF100FB737D1A686B7EF4B1DC737643E8B70ED708BB953FFA20E1D4E82F5
3,163,421 UART: Caliptra RT
3,163,766 UART: [state] CFI Enabled
3,271,155 UART: [rt] RT listening for mailbox commands...
3,271,825 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,571 UART: [rt]cmd =0x44504543, len=24
3,328,190 >>> mbox cmd response data (40 bytes)
3,328,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,052 UART: [rt]cmd =0x44504543, len=96
3,397,954 >>> mbox cmd response data (56 bytes)
3,397,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,710 UART: [rt]cmd =0x44504543, len=96
3,468,021 >>> mbox cmd response data (56 bytes)
3,468,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,919 UART: [rt]cmd =0x44504543, len=96
3,539,234 >>> mbox cmd response data (56 bytes)
3,539,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,080 UART: [rt]cmd =0x44504543, len=96
3,610,437 >>> mbox cmd response data (56 bytes)
3,610,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,451 UART: [rt]cmd =0x44504543, len=96
3,682,110 >>> mbox cmd response data (56 bytes)
3,682,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,972 UART: [rt]cmd =0x44504543, len=96
3,753,513 >>> mbox cmd response data (56 bytes)
3,753,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,337 UART: [rt]cmd =0x44504543, len=96
3,825,388 >>> mbox cmd response data (56 bytes)
3,825,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,552 UART: [rt]cmd =0x44504543, len=96
3,897,951 >>> mbox cmd response data (56 bytes)
3,897,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,705 UART: [rt]cmd =0x44504543, len=96
3,970,378 >>> mbox cmd response data (56 bytes)
3,970,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,410 UART: [rt]cmd =0x44504543, len=96
4,043,471 >>> mbox cmd response data (56 bytes)
4,043,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,365 UART: [rt]cmd =0x44504543, len=96
4,117,398 >>> mbox cmd response data (56 bytes)
4,117,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,147,438 UART: [rt]cmd =0x44504543, len=96
4,190,431 >>> mbox cmd response data (56 bytes)
4,190,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,220,185 UART: [rt]cmd =0x44504543, len=96
4,263,452 >>> mbox cmd response data (56 bytes)
4,263,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,293,428 UART: [rt]cmd =0x44504543, len=96
4,337,673 >>> mbox cmd response data (56 bytes)
4,337,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,367,551 UART: [rt]cmd =0x44504543, len=96
4,374,443 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,625 ready_for_fw is high
1,055,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,260 >>> mbox cmd response: success
2,681,584 UART:
2,681,600 UART: Running Caliptra FMC ...
2,682,008 UART:
2,682,151 UART: [state] CFI Enabled
2,692,704 UART: [fht] FMC Alias Private Key: 7
2,800,383 UART: [art] Extend RT PCRs Done
2,800,811 UART: [art] Lock RT PCRs Done
2,802,267 UART: [art] Populate DV Done
2,810,494 UART: [fht] FMC Alias Private Key: 7
2,811,492 UART: [art] Derive CDI
2,811,772 UART: [art] Store in in slot 0x4
2,897,529 UART: [art] Derive Key Pair
2,897,889 UART: [art] Store priv key in slot 0x5
2,911,737 UART: [art] Derive Key Pair - Done
2,926,706 UART: [art] Signing Cert with AUTHO
2,927,186 UART: RITY.KEYID = 7
2,941,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,717 UART: [art] PUB.X = 69BDE7387F9B74FFDB9278438E98EE9DD18A02BE9AA62D96F384A3A01698A8248D1989B2A9846415CAEF56C4CF777DDD
2,949,496 UART: [art] PUB.Y = 54DC3C7BD6CF216E420450564AFC5A47EBF0CFED75CCC7F030BE2A15482163E01819A70DE8F9C8BCD540A7857EA02FE1
2,956,458 UART: [art] SIG.R = E0A01EE6D390B6B59A17C292527EC9BE08403A06D90B90F7C8C633E7D028B2DAA2E430FBDAF915A1EBB8F2E00F186850
2,963,230 UART: [art] SIG.S = 3F16EC93C264FC430C996864B7F19D66FBFCD66D6A158E7EFC22686C85F5AC91D6CFC4782F13A46FC601D859CD174B53
2,987,279 UART: Caliptra RT
2,987,624 UART: [state] CFI Enabled
3,094,859 UART: [rt] RT listening for mailbox commands...
3,095,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,339 UART: [rt]cmd =0x44504543, len=24
3,151,836 >>> mbox cmd response data (40 bytes)
3,151,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,788 UART: [rt]cmd =0x44504543, len=96
3,221,926 >>> mbox cmd response data (56 bytes)
3,221,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,251,846 UART: [rt]cmd =0x44504543, len=96
3,292,737 >>> mbox cmd response data (56 bytes)
3,292,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,995 UART: [rt]cmd =0x44504543, len=96
3,363,896 >>> mbox cmd response data (56 bytes)
3,363,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,902 UART: [rt]cmd =0x44504543, len=96
3,435,507 >>> mbox cmd response data (56 bytes)
3,435,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,733 UART: [rt]cmd =0x44504543, len=96
3,507,786 >>> mbox cmd response data (56 bytes)
3,507,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,854 UART: [rt]cmd =0x44504543, len=96
3,579,663 >>> mbox cmd response data (56 bytes)
3,579,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,937 UART: [rt]cmd =0x44504543, len=96
3,651,704 >>> mbox cmd response data (56 bytes)
3,651,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,874 UART: [rt]cmd =0x44504543, len=96
3,724,327 >>> mbox cmd response data (56 bytes)
3,724,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,573 UART: [rt]cmd =0x44504543, len=96
3,796,968 >>> mbox cmd response data (56 bytes)
3,796,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,828 UART: [rt]cmd =0x44504543, len=96
3,869,891 >>> mbox cmd response data (56 bytes)
3,869,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,971 UART: [rt]cmd =0x44504543, len=96
3,942,934 >>> mbox cmd response data (56 bytes)
3,942,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,782 UART: [rt]cmd =0x44504543, len=96
4,016,065 >>> mbox cmd response data (56 bytes)
4,016,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,879 UART: [rt]cmd =0x44504543, len=96
4,088,856 >>> mbox cmd response data (56 bytes)
4,088,857 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,668 UART: [rt]cmd =0x44504543, len=96
4,163,271 >>> mbox cmd response data (56 bytes)
4,163,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,381 UART: [rt]cmd =0x44504543, len=96
4,200,621 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,015 UART:
192,394 UART: Running Caliptra ROM ...
193,490 UART:
193,635 UART: [state] CFI Enabled
266,906 UART: [state] LifecycleState = Unprovisioned
268,907 UART: [state] DebugLocked = No
270,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,669 UART: [kat] SHA2-256
445,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,911 UART: [kat] ++
456,400 UART: [kat] sha1
467,040 UART: [kat] SHA2-256
469,772 UART: [kat] SHA2-384
475,124 UART: [kat] SHA2-512-ACC
477,501 UART: [kat] ECC-384
2,767,705 UART: [kat] HMAC-384Kdf
2,799,064 UART: [kat] LMS
3,989,399 UART: [kat] --
3,993,814 UART: [cold-reset] ++
3,995,460 UART: [fht] Storing FHT @ 0x50003400
4,007,652 UART: [idev] ++
4,008,223 UART: [idev] CDI.KEYID = 6
4,009,111 UART: [idev] SUBJECT.KEYID = 7
4,010,454 UART: [idev] UDS.KEYID = 0
4,011,417 ready_for_fw is high
4,011,614 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,706 UART: [idev] Erasing UDS.KEYID = 0
7,345,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,633 UART: [idev] --
7,370,511 UART: [ldev] ++
7,371,078 UART: [ldev] CDI.KEYID = 6
7,372,023 UART: [ldev] SUBJECT.KEYID = 5
7,373,292 UART: [ldev] AUTHORITY.KEYID = 7
7,374,446 UART: [ldev] FE.KEYID = 1
7,401,273 UART: [ldev] Erasing FE.KEYID = 1
10,732,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,219 UART: [ldev] --
13,094,009 UART: [fwproc] Waiting for Commands...
13,096,151 UART: [fwproc] Received command 0x46574c44
13,098,343 UART: [fwproc] Received Image of size 113760 bytes
17,144,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,216,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,602,234 >>> mbox cmd response: success
17,606,046 UART: [afmc] ++
17,606,646 UART: [afmc] CDI.KEYID = 6
17,607,589 UART: [afmc] SUBJECT.KEYID = 7
17,608,799 UART: [afmc] AUTHORITY.KEYID = 5
20,962,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,262,731 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,265,045 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,279,441 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,294,282 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,308,680 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,328,568 UART: [afmc] --
23,333,158 UART: [cold-reset] --
23,336,387 UART: [state] Locking Datavault
23,341,968 UART: [state] Locking PCR0, PCR1 and PCR31
23,343,724 UART: [state] Locking ICCM
23,344,959 UART: [exit] Launching FMC @ 0x40000130
23,353,353 UART:
23,353,587 UART: Running Caliptra FMC ...
23,354,694 UART:
23,354,854 UART: [state] CFI Enabled
23,423,338 UART: [fht] FMC Alias Private Key: 7
25,761,663 UART: [art] Extend RT PCRs Done
25,762,889 UART: [art] Lock RT PCRs Done
25,764,835 UART: [art] Populate DV Done
25,770,298 UART: [fht] FMC Alias Private Key: 7
25,771,776 UART: [art] Derive CDI
25,772,510 UART: [art] Store in in slot 0x4
25,832,247 UART: [art] Derive Key Pair
25,833,283 UART: [art] Store priv key in slot 0x5
29,125,850 UART: [art] Derive Key Pair - Done
29,139,166 UART: [art] Signing Cert with AUTHO
29,140,465 UART: RITY.KEYID = 7
31,428,326 UART: [art] Erasing AUTHORITY.KEYID = 7
31,429,829 UART: [art] PUB.X = 73EFDC648B2953FF99A5E52D3D15BEF11A71C402CB838520CDA3D238687DCFF83A66B79FD5E3CE549293B0BC14F374DD
31,437,071 UART: [art] PUB.Y = 7C5A628E621289C330FFD1A52FF1AD24464C46926601F88EACFB341BEAC0581AB2043BDE546A706DDFDD26A80E4AA58F
31,444,351 UART: [art] SIG.R = C56C695C31C6C1D568D687E467C040D47C92F0127236E1D50E3078CCC40E365E2406692528A781F5EC8F6489A429AC13
31,451,748 UART: [art] SIG.S = 12A889C2360E9F4134A7A171DF1E88B91DF909079547324FFDF7F8FF9FD82C640533378C6BCE585DB819E3D4F1E209AA
32,756,396 UART: Caliptra RT
32,757,115 UART: [state] CFI Enabled
32,918,851 UART: [rt] RT listening for mailbox commands...
32,920,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,951,223 UART: [rt]cmd =0x44504543, len=24
32,994,269 >>> mbox cmd response data (40 bytes)
32,995,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,024,957 UART: [rt]cmd =0x44504543, len=24
33,058,157 >>> mbox cmd response data (40 bytes)
33,058,797 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,088,697 UART: [rt]cmd =0x44504543, len=24
33,122,076 >>> mbox cmd response data (40 bytes)
33,122,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,152,536 UART: [rt]cmd =0x44504543, len=24
33,186,452 >>> mbox cmd response data (40 bytes)
33,187,107 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,217,113 UART: [rt]cmd =0x44504543, len=24
33,250,213 >>> mbox cmd response data (40 bytes)
33,251,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,281,219 UART: [rt]cmd =0x44504543, len=24
33,314,109 >>> mbox cmd response data (40 bytes)
33,314,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,344,693 UART: [rt]cmd =0x44504543, len=24
33,378,312 >>> mbox cmd response data (40 bytes)
33,378,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,408,828 UART: [rt]cmd =0x44504543, len=24
33,442,422 >>> mbox cmd response data (40 bytes)
33,443,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,472,935 UART: [rt]cmd =0x44504543, len=24
33,506,420 >>> mbox cmd response data (40 bytes)
33,507,073 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,536,926 UART: [rt]cmd =0x44504543, len=24
33,570,405 >>> mbox cmd response data (40 bytes)
33,571,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,601,058 UART: [rt]cmd =0x44504543, len=24
33,634,932 >>> mbox cmd response data (40 bytes)
33,635,543 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,665,451 UART: [rt]cmd =0x44504543, len=24
33,698,860 >>> mbox cmd response data (40 bytes)
33,699,476 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,729,153 UART: [rt]cmd =0x44504543, len=24
33,763,063 >>> mbox cmd response data (40 bytes)
33,763,739 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,793,748 UART: [rt]cmd =0x44504543, len=24
33,826,769 >>> mbox cmd response data (40 bytes)
33,827,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,857,596 UART: [rt]cmd =0x44504543, len=24
33,891,141 >>> mbox cmd response data (40 bytes)
33,891,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,922,022 UART: [rt]cmd =0x44504543, len=24
33,928,662 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,551 writing to cptra_bootfsm_go
3,784,575 ready_for_fw is high
3,784,948 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,817,125 >>> mbox cmd response: success
23,510,585 UART:
23,510,987 UART: Running Caliptra FMC ...
23,512,090 UART:
23,512,278 UART: [state] CFI Enabled
23,562,776 UART: [fht] FMC Alias Private Key: 7
25,901,166 UART: [art] Extend RT PCRs Done
25,902,391 UART: [art] Lock RT PCRs Done
25,904,183 UART: [art] Populate DV Done
25,909,378 UART: [fht] FMC Alias Private Key: 7
25,910,918 UART: [art] Derive CDI
25,911,659 UART: [art] Store in in slot 0x4
25,970,488 UART: [art] Derive Key Pair
25,971,530 UART: [art] Store priv key in slot 0x5
29,264,455 UART: [art] Derive Key Pair - Done
29,277,510 UART: [art] Signing Cert with AUTHO
29,278,821 UART: RITY.KEYID = 7
31,566,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,402 UART: [art] PUB.X = 5A6FCC054BBAE9BE851EC457945875E2E04A8582E8FACD0DAB0C4E498D81AA6DA25258A1822F9EA18A26F54CDAF7DF2C
31,575,671 UART: [art] PUB.Y = D82D3E6BF5D118B52F7B7045B41D98CA495C5DC4240F672B8E140AD1A343FFECD8FB9659378D9674FC73302653B5C0B4
31,582,892 UART: [art] SIG.R = 6384D7EDB81395E87078E100C4442557D8AC59F6F64517D71CB62DA225C1B8134FA8FB7DA405D8DF4DAADE223E676BDB
31,590,298 UART: [art] SIG.S = A376CA2D993C9F85306CB4AC032885C99201729872888DC4D48C22CE5F9855992080B882FF172E4F90F19143BE139E85
32,895,320 UART: Caliptra RT
32,896,034 UART: [state] CFI Enabled
33,056,612 UART: [rt] RT listening for mailbox commands...
33,058,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,089,105 UART: [rt]cmd =0x44504543, len=24
33,130,601 >>> mbox cmd response data (40 bytes)
33,131,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,161,180 UART: [rt]cmd =0x44504543, len=24
33,194,615 >>> mbox cmd response data (40 bytes)
33,195,252 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,225,223 UART: [rt]cmd =0x44504543, len=24
33,258,525 >>> mbox cmd response data (40 bytes)
33,259,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,289,114 UART: [rt]cmd =0x44504543, len=24
33,322,431 >>> mbox cmd response data (40 bytes)
33,323,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,353,155 UART: [rt]cmd =0x44504543, len=24
33,386,509 >>> mbox cmd response data (40 bytes)
33,387,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,416,865 UART: [rt]cmd =0x44504543, len=24
33,451,067 >>> mbox cmd response data (40 bytes)
33,451,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,481,633 UART: [rt]cmd =0x44504543, len=24
33,515,063 >>> mbox cmd response data (40 bytes)
33,515,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,545,486 UART: [rt]cmd =0x44504543, len=24
33,579,054 >>> mbox cmd response data (40 bytes)
33,579,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,609,592 UART: [rt]cmd =0x44504543, len=24
33,642,572 >>> mbox cmd response data (40 bytes)
33,643,213 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,673,057 UART: [rt]cmd =0x44504543, len=24
33,707,090 >>> mbox cmd response data (40 bytes)
33,707,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,737,923 UART: [rt]cmd =0x44504543, len=24
33,770,872 >>> mbox cmd response data (40 bytes)
33,771,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,801,323 UART: [rt]cmd =0x44504543, len=24
33,835,074 >>> mbox cmd response data (40 bytes)
33,835,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,865,235 UART: [rt]cmd =0x44504543, len=24
33,899,177 >>> mbox cmd response data (40 bytes)
33,899,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,929,651 UART: [rt]cmd =0x44504543, len=24
33,963,385 >>> mbox cmd response data (40 bytes)
33,964,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,993,924 UART: [rt]cmd =0x44504543, len=24
34,027,634 >>> mbox cmd response data (40 bytes)
34,028,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,058,347 UART: [rt]cmd =0x44504543, len=24
34,065,031 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,651 writing to cptra_bootfsm_go
192,762 UART:
193,142 UART: Running Caliptra ROM ...
194,237 UART:
603,924 UART: [state] CFI Enabled
622,717 UART: [state] LifecycleState = Unprovisioned
624,684 UART: [state] DebugLocked = No
626,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,756 UART: [kat] SHA2-256
801,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,023 UART: [kat] ++
812,474 UART: [kat] sha1
824,378 UART: [kat] SHA2-256
827,091 UART: [kat] SHA2-384
834,074 UART: [kat] SHA2-512-ACC
836,434 UART: [kat] ECC-384
3,119,551 UART: [kat] HMAC-384Kdf
3,131,430 UART: [kat] LMS
4,321,597 UART: [kat] --
4,326,749 UART: [cold-reset] ++
4,328,180 UART: [fht] Storing FHT @ 0x50003400
4,339,659 UART: [idev] ++
4,340,237 UART: [idev] CDI.KEYID = 6
4,341,114 UART: [idev] SUBJECT.KEYID = 7
4,342,353 UART: [idev] UDS.KEYID = 0
4,343,303 ready_for_fw is high
4,343,488 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,347 UART: [idev] Erasing UDS.KEYID = 0
7,631,974 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,766 UART: [idev] --
7,656,966 UART: [ldev] ++
7,657,542 UART: [ldev] CDI.KEYID = 6
7,658,555 UART: [ldev] SUBJECT.KEYID = 5
7,659,703 UART: [ldev] AUTHORITY.KEYID = 7
7,660,982 UART: [ldev] FE.KEYID = 1
7,670,191 UART: [ldev] Erasing FE.KEYID = 1
10,955,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,719 UART: [ldev] --
13,316,387 UART: [fwproc] Waiting for Commands...
13,318,794 UART: [fwproc] Received command 0x46574c44
13,321,020 UART: [fwproc] Received Image of size 113760 bytes
17,364,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,584 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,819,865 >>> mbox cmd response: success
17,823,750 UART: [afmc] ++
17,824,340 UART: [afmc] CDI.KEYID = 6
17,825,223 UART: [afmc] SUBJECT.KEYID = 7
17,826,491 UART: [afmc] AUTHORITY.KEYID = 5
21,138,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,704 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,959 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,336 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,211 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,621 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,498,738 UART: [afmc] --
23,502,241 UART: [cold-reset] --
23,504,805 UART: [state] Locking Datavault
23,509,835 UART: [state] Locking PCR0, PCR1 and PCR31
23,511,535 UART: [state] Locking ICCM
23,513,359 UART: [exit] Launching FMC @ 0x40000130
23,521,757 UART:
23,521,997 UART: Running Caliptra FMC ...
23,523,095 UART:
23,523,254 UART: [state] CFI Enabled
23,531,186 UART: [fht] FMC Alias Private Key: 7
25,862,874 UART: [art] Extend RT PCRs Done
25,864,101 UART: [art] Lock RT PCRs Done
25,865,960 UART: [art] Populate DV Done
25,871,478 UART: [fht] FMC Alias Private Key: 7
25,873,013 UART: [art] Derive CDI
25,873,773 UART: [art] Store in in slot 0x4
25,916,364 UART: [art] Derive Key Pair
25,917,401 UART: [art] Store priv key in slot 0x5
29,159,545 UART: [art] Derive Key Pair - Done
29,172,381 UART: [art] Signing Cert with AUTHO
29,173,679 UART: RITY.KEYID = 7
31,453,245 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,753 UART: [art] PUB.X = D7F65986F09CED7A1DEFACA929D1367BC726EABB0E6E9702EDE1CB8274E30F7EA1E796C74C51624C1DC11ABCDEE81FE9
31,462,028 UART: [art] PUB.Y = 3B39CD97409119E6F26E2BAA825B840144318C46EA447F81F961AE6E92B2730952F3BB25E88E93B257B6417FDFBF4D9B
31,469,292 UART: [art] SIG.R = 7F6B10691BC02CCA43E5C0030A5DD1E86C93FE1A1B601F2CE5A7896DA11E8BE488D4449C8EEB1D334878FB2A19DE91BE
31,476,656 UART: [art] SIG.S = 9E1829EBC62E0CAE0435F51FA500A9CFC3993E715D5E724C40822A0C9212A3F9EC56AE040771828C946D5C007DBF2405
32,781,039 UART: Caliptra RT
32,782,227 UART: [state] CFI Enabled
32,899,221 UART: [rt] RT listening for mailbox commands...
32,901,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,931,205 UART: [rt]cmd =0x44504543, len=24
32,957,751 >>> mbox cmd response data (40 bytes)
32,958,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,988,376 UART: [rt]cmd =0x44504543, len=24
33,014,640 >>> mbox cmd response data (40 bytes)
33,015,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,045,178 UART: [rt]cmd =0x44504543, len=24
33,071,538 >>> mbox cmd response data (40 bytes)
33,072,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,102,245 UART: [rt]cmd =0x44504543, len=24
33,128,904 >>> mbox cmd response data (40 bytes)
33,129,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,159,349 UART: [rt]cmd =0x44504543, len=24
33,185,687 >>> mbox cmd response data (40 bytes)
33,186,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,216,435 UART: [rt]cmd =0x44504543, len=24
33,242,470 >>> mbox cmd response data (40 bytes)
33,243,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,273,187 UART: [rt]cmd =0x44504543, len=24
33,299,855 >>> mbox cmd response data (40 bytes)
33,300,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,330,330 UART: [rt]cmd =0x44504543, len=24
33,357,037 >>> mbox cmd response data (40 bytes)
33,357,676 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,387,846 UART: [rt]cmd =0x44504543, len=24
33,414,259 >>> mbox cmd response data (40 bytes)
33,414,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,444,925 UART: [rt]cmd =0x44504543, len=24
33,471,237 >>> mbox cmd response data (40 bytes)
33,471,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,501,866 UART: [rt]cmd =0x44504543, len=24
33,527,650 >>> mbox cmd response data (40 bytes)
33,528,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,558,010 UART: [rt]cmd =0x44504543, len=24
33,583,991 >>> mbox cmd response data (40 bytes)
33,584,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,614,494 UART: [rt]cmd =0x44504543, len=24
33,640,633 >>> mbox cmd response data (40 bytes)
33,641,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,671,073 UART: [rt]cmd =0x44504543, len=24
33,697,694 >>> mbox cmd response data (40 bytes)
33,698,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,728,280 UART: [rt]cmd =0x44504543, len=24
33,754,504 >>> mbox cmd response data (40 bytes)
33,755,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,784,875 UART: [rt]cmd =0x44504543, len=24
33,791,168 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
4,129,970 ready_for_fw is high
4,130,555 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,061,123 >>> mbox cmd response: success
23,695,503 UART:
23,695,893 UART: Running Caliptra FMC ...
23,696,987 UART:
23,697,134 UART: [state] CFI Enabled
23,705,142 UART: [fht] FMC Alias Private Key: 7
26,036,158 UART: [art] Extend RT PCRs Done
26,037,387 UART: [art] Lock RT PCRs Done
26,038,771 UART: [art] Populate DV Done
26,044,131 UART: [fht] FMC Alias Private Key: 7
26,045,727 UART: [art] Derive CDI
26,046,478 UART: [art] Store in in slot 0x4
26,088,916 UART: [art] Derive Key Pair
26,089,916 UART: [art] Store priv key in slot 0x5
29,332,093 UART: [art] Derive Key Pair - Done
29,345,312 UART: [art] Signing Cert with AUTHO
29,346,623 UART: RITY.KEYID = 7
31,625,877 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,411 UART: [art] PUB.X = 0DCD4F70C5C0049287A69986FD978D527099D975612477F7E7B8739789BD500C4D9A5DF25F1B7F2166FC6E9427591112
31,634,662 UART: [art] PUB.Y = 4AD958C3A6CEFF1A0C95755C20496FECD5936E3CB05A0BD920D4B8B658539861451015C8E6E8F61B0CEE83F349310D12
31,641,848 UART: [art] SIG.R = CC0763C057D1F922CA705939A5E8F4EF82723D5BB7DC0D536CD4684A8D60767656D18BA059A248D10841AC640C8C6B7D
31,649,230 UART: [art] SIG.S = E9A26B758F157E24C34F808112BB925FF5C37E3F583EE27673CF90C892BE91ED636C1B45E67E9D951DBB191EB8EF2A7B
32,954,445 UART: Caliptra RT
32,955,168 UART: [state] CFI Enabled
33,071,583 UART: [rt] RT listening for mailbox commands...
33,073,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,103,770 UART: [rt]cmd =0x44504543, len=24
33,130,400 >>> mbox cmd response data (40 bytes)
33,131,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,160,815 UART: [rt]cmd =0x44504543, len=24
33,187,323 >>> mbox cmd response data (40 bytes)
33,187,976 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,217,826 UART: [rt]cmd =0x44504543, len=24
33,244,086 >>> mbox cmd response data (40 bytes)
33,244,751 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,274,871 UART: [rt]cmd =0x44504543, len=24
33,301,464 >>> mbox cmd response data (40 bytes)
33,302,093 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,331,853 UART: [rt]cmd =0x44504543, len=24
33,358,404 >>> mbox cmd response data (40 bytes)
33,359,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,389,094 UART: [rt]cmd =0x44504543, len=24
33,415,566 >>> mbox cmd response data (40 bytes)
33,416,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,446,071 UART: [rt]cmd =0x44504543, len=24
33,472,149 >>> mbox cmd response data (40 bytes)
33,472,784 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,502,702 UART: [rt]cmd =0x44504543, len=24
33,529,192 >>> mbox cmd response data (40 bytes)
33,529,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,559,839 UART: [rt]cmd =0x44504543, len=24
33,586,004 >>> mbox cmd response data (40 bytes)
33,586,629 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,616,363 UART: [rt]cmd =0x44504543, len=24
33,643,368 >>> mbox cmd response data (40 bytes)
33,644,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,673,989 UART: [rt]cmd =0x44504543, len=24
33,700,122 >>> mbox cmd response data (40 bytes)
33,700,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,730,768 UART: [rt]cmd =0x44504543, len=24
33,757,149 >>> mbox cmd response data (40 bytes)
33,757,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,787,690 UART: [rt]cmd =0x44504543, len=24
33,814,451 >>> mbox cmd response data (40 bytes)
33,815,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,845,091 UART: [rt]cmd =0x44504543, len=24
33,871,016 >>> mbox cmd response data (40 bytes)
33,871,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,901,331 UART: [rt]cmd =0x44504543, len=24
33,927,660 >>> mbox cmd response data (40 bytes)
33,928,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,958,197 UART: [rt]cmd =0x44504543, len=24
33,964,960 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,627 UART:
193,056 UART: Running Caliptra ROM ...
194,195 UART:
194,346 UART: [state] CFI Enabled
263,350 UART: [state] LifecycleState = Unprovisioned
265,209 UART: [state] DebugLocked = No
266,736 UART: [state] WD Timer not started. Device not locked for debugging
270,978 UART: [kat] SHA2-256
450,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,722 UART: [kat] ++
462,251 UART: [kat] sha1
472,773 UART: [kat] SHA2-256
475,851 UART: [kat] SHA2-384
481,479 UART: [kat] SHA2-512-ACC
484,425 UART: [kat] ECC-384
2,962,445 UART: [kat] HMAC-384Kdf
2,985,944 UART: [kat] LMS
3,515,378 UART: [kat] --
3,520,673 UART: [cold-reset] ++
3,523,242 UART: [fht] FHT @ 0x50003400
3,534,074 UART: [idev] ++
3,534,645 UART: [idev] CDI.KEYID = 6
3,535,561 UART: [idev] SUBJECT.KEYID = 7
3,536,731 UART: [idev] UDS.KEYID = 0
3,537,724 ready_for_fw is high
3,537,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,681,535 UART: [idev] Erasing UDS.KEYID = 0
6,039,573 UART: [idev] Sha1 KeyId Algorithm
6,061,456 UART: [idev] --
6,065,726 UART: [ldev] ++
6,066,322 UART: [ldev] CDI.KEYID = 6
6,067,234 UART: [ldev] SUBJECT.KEYID = 5
6,068,392 UART: [ldev] AUTHORITY.KEYID = 7
6,069,619 UART: [ldev] FE.KEYID = 1
6,115,429 UART: [ldev] Erasing FE.KEYID = 1
8,621,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,785 UART: [ldev] --
10,427,312 UART: [fwproc] Wait for Commands...
10,430,104 UART: [fwproc] Recv command 0x46574c44
10,432,198 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,785 >>> mbox cmd response: success
14,287,771 UART: [afmc] ++
14,288,363 UART: [afmc] CDI.KEYID = 6
14,289,268 UART: [afmc] SUBJECT.KEYID = 7
14,290,482 UART: [afmc] AUTHORITY.KEYID = 5
16,817,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,542,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,544,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,559,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,575,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,591,748 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,615,056 UART: [afmc] --
18,619,579 UART: [cold-reset] --
18,622,948 UART: [state] Locking Datavault
18,630,133 UART: [state] Locking PCR0, PCR1 and PCR31
18,631,862 UART: [state] Locking ICCM
18,634,475 UART: [exit] Launching FMC @ 0x40000130
18,642,869 UART:
18,643,099 UART: Running Caliptra FMC ...
18,644,198 UART:
18,644,352 UART: [state] CFI Enabled
18,701,365 UART: [fht] FMC Alias Private Key: 7
20,465,891 UART: [art] Extend RT PCRs Done
20,467,113 UART: [art] Lock RT PCRs Done
20,468,929 UART: [art] Populate DV Done
20,474,171 UART: [fht] FMC Alias Private Key: 7
20,475,866 UART: [art] Derive CDI
20,476,672 UART: [art] Store in in slot 0x4
20,534,030 UART: [art] Derive Key Pair
20,535,071 UART: [art] Store priv key in slot 0x5
22,997,969 UART: [art] Derive Key Pair - Done
23,010,723 UART: [art] Signing Cert with AUTHO
23,012,026 UART: RITY.KEYID = 7
24,724,034 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,538 UART: [art] PUB.X = B43D9EDEDF722BE772EC9316F1A021DB2781BFF9265712D6454C91002F04C9AC9A88E10BBD1A1774DCFE541D30D17B5F
24,732,771 UART: [art] PUB.Y = 42B373B723F851E49CDAFE4E249FE86F84F18D8C6C09743B0A82518A36B580C1376D3755E60A988FBFC8F13259FC58ED
24,740,097 UART: [art] SIG.R = 031D5D2F01645460754377E5E408935FADC0E70ABD5F2035011EB65DF44D5E8142EC410A5A4D1C59D78A4928C7B9E1A5
24,747,458 UART: [art] SIG.S = C8DB3B6CF39FBBD3E2899B78A94B93A8513EB5F6E48D179CC587BD9E8B5ACF1FC79B82C2C18DF752FD5DEAAAB91FDCBD
25,726,629 UART: Caliptra RT
25,727,321 UART: [state] CFI Enabled
25,890,714 UART: [rt] RT listening for mailbox commands...
25,892,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,923,238 UART: [rt]cmd =0x44504543, len=24
25,965,609 >>> mbox cmd response data (40 bytes)
25,966,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,996,467 UART: [rt]cmd =0x44504543, len=24
26,029,427 >>> mbox cmd response data (40 bytes)
26,030,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,059,842 UART: [rt]cmd =0x44504543, len=24
26,093,478 >>> mbox cmd response data (40 bytes)
26,094,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,124,089 UART: [rt]cmd =0x44504543, len=24
26,157,562 >>> mbox cmd response data (40 bytes)
26,158,191 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,188,036 UART: [rt]cmd =0x44504543, len=24
26,221,810 >>> mbox cmd response data (40 bytes)
26,222,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,252,358 UART: [rt]cmd =0x44504543, len=24
26,285,740 >>> mbox cmd response data (40 bytes)
26,286,396 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,316,129 UART: [rt]cmd =0x44504543, len=24
26,349,721 >>> mbox cmd response data (40 bytes)
26,350,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,380,035 UART: [rt]cmd =0x44504543, len=24
26,413,904 >>> mbox cmd response data (40 bytes)
26,414,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,444,520 UART: [rt]cmd =0x44504543, len=24
26,477,992 >>> mbox cmd response data (40 bytes)
26,478,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,508,342 UART: [rt]cmd =0x44504543, len=24
26,542,162 >>> mbox cmd response data (40 bytes)
26,542,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,572,875 UART: [rt]cmd =0x44504543, len=24
26,606,095 >>> mbox cmd response data (40 bytes)
26,606,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,636,542 UART: [rt]cmd =0x44504543, len=24
26,669,923 >>> mbox cmd response data (40 bytes)
26,670,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,700,501 UART: [rt]cmd =0x44504543, len=24
26,733,982 >>> mbox cmd response data (40 bytes)
26,734,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,764,452 UART: [rt]cmd =0x44504543, len=24
26,797,804 >>> mbox cmd response data (40 bytes)
26,798,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,828,263 UART: [rt]cmd =0x44504543, len=24
26,862,238 >>> mbox cmd response data (40 bytes)
26,862,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,892,889 UART: [rt]cmd =0x44504543, len=24
26,899,408 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
3,380,018 ready_for_fw is high
3,380,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,064,962 >>> mbox cmd response: success
18,364,042 UART:
18,364,457 UART: Running Caliptra FMC ...
18,365,594 UART:
18,365,753 UART: [state] CFI Enabled
18,431,941 UART: [fht] FMC Alias Private Key: 7
20,195,838 UART: [art] Extend RT PCRs Done
20,197,069 UART: [art] Lock RT PCRs Done
20,198,697 UART: [art] Populate DV Done
20,204,068 UART: [fht] FMC Alias Private Key: 7
20,205,599 UART: [art] Derive CDI
20,206,337 UART: [art] Store in in slot 0x4
20,264,724 UART: [art] Derive Key Pair
20,265,721 UART: [art] Store priv key in slot 0x5
22,728,984 UART: [art] Derive Key Pair - Done
22,741,512 UART: [art] Signing Cert with AUTHO
22,742,815 UART: RITY.KEYID = 7
24,454,416 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,915 UART: [art] PUB.X = 479B941C3DFA4A94F222923280B42AA0DB78171ED2DA8ACD8C307E9D17C324F0997D6D70C40F565A961A410C37B25071
24,463,140 UART: [art] PUB.Y = FB89C94CCBB093AD32427AC49474FB98D2918BC8BE42EA73F0AF688D5F449BD4EBEB1C4F4D600FCC3B221ACDD0C63F78
24,470,469 UART: [art] SIG.R = 3A4C410CDC1B21F33F4E4FABAAA604AD13F4801AD32C7FEE397044999196E3003C2DBE1B802C5F4E0AEF77AA3D1191A9
24,477,844 UART: [art] SIG.S = 1FACA8D78C2AA9828F452CCB4AE043D9324B6A769978CB3D7BE2CDCE7A29587F3F57879CDDB60F3661A003D38496CE6F
25,456,705 UART: Caliptra RT
25,457,408 UART: [state] CFI Enabled
25,622,375 UART: [rt] RT listening for mailbox commands...
25,624,298 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,654,742 UART: [rt]cmd =0x44504543, len=24
25,696,575 >>> mbox cmd response data (40 bytes)
25,697,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,727,285 UART: [rt]cmd =0x44504543, len=24
25,761,142 >>> mbox cmd response data (40 bytes)
25,761,801 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,791,864 UART: [rt]cmd =0x44504543, len=24
25,825,138 >>> mbox cmd response data (40 bytes)
25,825,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,855,756 UART: [rt]cmd =0x44504543, len=24
25,889,217 >>> mbox cmd response data (40 bytes)
25,889,883 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,919,516 UART: [rt]cmd =0x44504543, len=24
25,952,945 >>> mbox cmd response data (40 bytes)
25,953,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,983,312 UART: [rt]cmd =0x44504543, len=24
26,017,260 >>> mbox cmd response data (40 bytes)
26,017,887 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,047,850 UART: [rt]cmd =0x44504543, len=24
26,081,154 >>> mbox cmd response data (40 bytes)
26,081,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,111,704 UART: [rt]cmd =0x44504543, len=24
26,145,303 >>> mbox cmd response data (40 bytes)
26,145,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,175,909 UART: [rt]cmd =0x44504543, len=24
26,209,224 >>> mbox cmd response data (40 bytes)
26,209,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,239,712 UART: [rt]cmd =0x44504543, len=24
26,273,575 >>> mbox cmd response data (40 bytes)
26,274,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,304,201 UART: [rt]cmd =0x44504543, len=24
26,337,659 >>> mbox cmd response data (40 bytes)
26,338,275 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,368,158 UART: [rt]cmd =0x44504543, len=24
26,401,478 >>> mbox cmd response data (40 bytes)
26,402,106 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,431,783 UART: [rt]cmd =0x44504543, len=24
26,465,520 >>> mbox cmd response data (40 bytes)
26,466,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,496,285 UART: [rt]cmd =0x44504543, len=24
26,529,520 >>> mbox cmd response data (40 bytes)
26,530,172 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,560,008 UART: [rt]cmd =0x44504543, len=24
26,593,600 >>> mbox cmd response data (40 bytes)
26,594,202 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,624,273 UART: [rt]cmd =0x44504543, len=24
26,630,657 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
193,015 UART:
193,400 UART: Running Caliptra ROM ...
194,533 UART:
604,320 UART: [state] CFI Enabled
618,779 UART: [state] LifecycleState = Unprovisioned
620,699 UART: [state] DebugLocked = No
622,258 UART: [state] WD Timer not started. Device not locked for debugging
625,597 UART: [kat] SHA2-256
804,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,297 UART: [kat] ++
816,834 UART: [kat] sha1
826,866 UART: [kat] SHA2-256
829,876 UART: [kat] SHA2-384
834,943 UART: [kat] SHA2-512-ACC
837,953 UART: [kat] ECC-384
3,277,040 UART: [kat] HMAC-384Kdf
3,288,604 UART: [kat] LMS
3,818,134 UART: [kat] --
3,823,196 UART: [cold-reset] ++
3,824,001 UART: [fht] FHT @ 0x50003400
3,835,135 UART: [idev] ++
3,835,707 UART: [idev] CDI.KEYID = 6
3,836,611 UART: [idev] SUBJECT.KEYID = 7
3,837,857 UART: [idev] UDS.KEYID = 0
3,838,758 ready_for_fw is high
3,838,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,318 UART: [idev] Erasing UDS.KEYID = 0
6,311,111 UART: [idev] Sha1 KeyId Algorithm
6,334,188 UART: [idev] --
6,338,297 UART: [ldev] ++
6,338,875 UART: [ldev] CDI.KEYID = 6
6,339,761 UART: [ldev] SUBJECT.KEYID = 5
6,340,884 UART: [ldev] AUTHORITY.KEYID = 7
6,342,174 UART: [ldev] FE.KEYID = 1
6,353,014 UART: [ldev] Erasing FE.KEYID = 1
8,830,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,095 UART: [ldev] --
10,621,654 UART: [fwproc] Wait for Commands...
10,624,407 UART: [fwproc] Recv command 0x46574c44
10,626,499 UART: [fwproc] Recv'd Img size: 114084 bytes
14,029,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,485,043 >>> mbox cmd response: success
14,489,210 UART: [afmc] ++
14,489,810 UART: [afmc] CDI.KEYID = 6
14,490,729 UART: [afmc] SUBJECT.KEYID = 7
14,491,897 UART: [afmc] AUTHORITY.KEYID = 5
16,990,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,345 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,450 UART: [afmc] --
18,788,521 UART: [cold-reset] --
18,793,682 UART: [state] Locking Datavault
18,796,570 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,222 UART: [state] Locking ICCM
18,799,292 UART: [exit] Launching FMC @ 0x40000130
18,807,689 UART:
18,807,927 UART: Running Caliptra FMC ...
18,809,030 UART:
18,809,196 UART: [state] CFI Enabled
18,817,352 UART: [fht] FMC Alias Private Key: 7
20,574,891 UART: [art] Extend RT PCRs Done
20,576,122 UART: [art] Lock RT PCRs Done
20,577,532 UART: [art] Populate DV Done
20,583,273 UART: [fht] FMC Alias Private Key: 7
20,584,816 UART: [art] Derive CDI
20,585,639 UART: [art] Store in in slot 0x4
20,627,912 UART: [art] Derive Key Pair
20,628,953 UART: [art] Store priv key in slot 0x5
23,055,815 UART: [art] Derive Key Pair - Done
23,068,828 UART: [art] Signing Cert with AUTHO
23,070,146 UART: RITY.KEYID = 7
24,775,726 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,212 UART: [art] PUB.X = F9368F6CCE12612AD9794D2B942A752DB7A23C62CE1A181BDD50854EB50DB2C13AFBDC1525F75F8C9D93A649C2C1E8A1
24,784,535 UART: [art] PUB.Y = EBE807BEA66D63708D1D6ACD4FFC47A2287BDD5CF6B1F40D16E15E68FF97ECB4E37A7238A04FE398E455D454FBF1D6BC
24,791,794 UART: [art] SIG.R = 38E32694B951A4E1CD755D606782FF2394E0F8F96839F9B8B7786EFB7DC9F0AC027F7C0E1CA537A41904D539A760082A
24,799,214 UART: [art] SIG.S = 13C25DE41C93A4D6C000A3FC92EFF5F8C76BCBF59D7914B6CF98768964DD85E797554C645A9C8C502AEFA23C863679F4
25,778,449 UART: Caliptra RT
25,779,184 UART: [state] CFI Enabled
25,895,868 UART: [rt] RT listening for mailbox commands...
25,897,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,927,423 UART: [rt]cmd =0x44504543, len=24
25,953,939 >>> mbox cmd response data (40 bytes)
25,954,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,984,637 UART: [rt]cmd =0x44504543, len=24
26,010,971 >>> mbox cmd response data (40 bytes)
26,011,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,041,256 UART: [rt]cmd =0x44504543, len=24
26,067,569 >>> mbox cmd response data (40 bytes)
26,068,239 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,097,874 UART: [rt]cmd =0x44504543, len=24
26,124,011 >>> mbox cmd response data (40 bytes)
26,124,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,154,544 UART: [rt]cmd =0x44504543, len=24
26,180,891 >>> mbox cmd response data (40 bytes)
26,181,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,211,419 UART: [rt]cmd =0x44504543, len=24
26,237,109 >>> mbox cmd response data (40 bytes)
26,237,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,267,591 UART: [rt]cmd =0x44504543, len=24
26,294,004 >>> mbox cmd response data (40 bytes)
26,294,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,324,686 UART: [rt]cmd =0x44504543, len=24
26,350,769 >>> mbox cmd response data (40 bytes)
26,351,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,381,139 UART: [rt]cmd =0x44504543, len=24
26,407,897 >>> mbox cmd response data (40 bytes)
26,408,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,438,419 UART: [rt]cmd =0x44504543, len=24
26,464,774 >>> mbox cmd response data (40 bytes)
26,465,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,495,140 UART: [rt]cmd =0x44504543, len=24
26,521,601 >>> mbox cmd response data (40 bytes)
26,522,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,552,133 UART: [rt]cmd =0x44504543, len=24
26,578,680 >>> mbox cmd response data (40 bytes)
26,579,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,609,370 UART: [rt]cmd =0x44504543, len=24
26,635,385 >>> mbox cmd response data (40 bytes)
26,636,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,665,930 UART: [rt]cmd =0x44504543, len=24
26,692,328 >>> mbox cmd response data (40 bytes)
26,692,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,722,988 UART: [rt]cmd =0x44504543, len=24
26,749,443 >>> mbox cmd response data (40 bytes)
26,750,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,779,987 UART: [rt]cmd =0x44504543, len=24
26,786,479 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,700,453 ready_for_fw is high
3,700,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,817 >>> mbox cmd response: success
18,525,233 UART:
18,525,649 UART: Running Caliptra FMC ...
18,526,782 UART:
18,526,936 UART: [state] CFI Enabled
18,534,842 UART: [fht] FMC Alias Private Key: 7
20,291,963 UART: [art] Extend RT PCRs Done
20,293,652 UART: [art] Lock RT PCRs Done
20,295,271 UART: [art] Populate DV Done
20,300,706 UART: [fht] FMC Alias Private Key: 7
20,302,315 UART: [art] Derive CDI
20,303,100 UART: [art] Store in in slot 0x4
20,346,189 UART: [art] Derive Key Pair
20,347,215 UART: [art] Store priv key in slot 0x5
22,773,872 UART: [art] Derive Key Pair - Done
22,787,019 UART: [art] Signing Cert with AUTHO
22,788,354 UART: RITY.KEYID = 7
24,493,977 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,501 UART: [art] PUB.X = 581FD30E4E3B4610B83F73A3B3CC97422017A1251A434FE9AB1986B1D3A57291781492C04353B39E17EB6F5315C1136D
24,502,748 UART: [art] PUB.Y = BA717DD6CB2CD09FF9F27AE18A5BF8626BB400807FBED0DC044DB3D9F5673E0BBA5D3B997C78758DB8C7934169A90158
24,510,000 UART: [art] SIG.R = 5218250B22465A1691A770A70BA0321E9EA4D5E80E751B56D6AB0A66DD030602A0009A3C08518FFDFF810BA76CB7F7A5
24,517,331 UART: [art] SIG.S = 43C08DE6E78102A2770FED885AD6A8573C5B9A3D9DD48A41D16178DA0FC6BE033AF765331B939BBA8F402DB82B630243
25,496,731 UART: Caliptra RT
25,497,429 UART: [state] CFI Enabled
25,614,703 UART: [rt] RT listening for mailbox commands...
25,616,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,646,820 UART: [rt]cmd =0x44504543, len=24
25,673,690 >>> mbox cmd response data (40 bytes)
25,674,509 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,704,252 UART: [rt]cmd =0x44504543, len=24
25,730,619 >>> mbox cmd response data (40 bytes)
25,731,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,761,142 UART: [rt]cmd =0x44504543, len=24
25,787,058 >>> mbox cmd response data (40 bytes)
25,787,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,817,601 UART: [rt]cmd =0x44504543, len=24
25,843,124 >>> mbox cmd response data (40 bytes)
25,843,778 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,873,731 UART: [rt]cmd =0x44504543, len=24
25,900,103 >>> mbox cmd response data (40 bytes)
25,900,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,930,777 UART: [rt]cmd =0x44504543, len=24
25,957,074 >>> mbox cmd response data (40 bytes)
25,957,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,987,665 UART: [rt]cmd =0x44504543, len=24
26,013,665 >>> mbox cmd response data (40 bytes)
26,014,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,044,162 UART: [rt]cmd =0x44504543, len=24
26,070,603 >>> mbox cmd response data (40 bytes)
26,071,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,101,188 UART: [rt]cmd =0x44504543, len=24
26,127,299 >>> mbox cmd response data (40 bytes)
26,127,963 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,157,973 UART: [rt]cmd =0x44504543, len=24
26,184,543 >>> mbox cmd response data (40 bytes)
26,185,163 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,215,077 UART: [rt]cmd =0x44504543, len=24
26,241,296 >>> mbox cmd response data (40 bytes)
26,241,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,271,877 UART: [rt]cmd =0x44504543, len=24
26,297,857 >>> mbox cmd response data (40 bytes)
26,298,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,196 UART: [rt]cmd =0x44504543, len=24
26,354,220 >>> mbox cmd response data (40 bytes)
26,354,829 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,384,793 UART: [rt]cmd =0x44504543, len=24
26,410,904 >>> mbox cmd response data (40 bytes)
26,411,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,441,295 UART: [rt]cmd =0x44504543, len=24
26,467,378 >>> mbox cmd response data (40 bytes)
26,468,033 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,937 UART: [rt]cmd =0x44504543, len=24
26,504,238 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,493 UART:
192,864 UART: Running Caliptra ROM ...
194,068 UART:
194,229 UART: [state] CFI Enabled
263,582 UART: [state] LifecycleState = Unprovisioned
265,621 UART: [state] DebugLocked = No
267,865 UART: [state] WD Timer not started. Device not locked for debugging
271,861 UART: [kat] SHA2-256
461,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,521 UART: [kat] ++
473,000 UART: [kat] sha1
484,612 UART: [kat] SHA2-256
487,678 UART: [kat] SHA2-384
495,242 UART: [kat] SHA2-512-ACC
497,821 UART: [kat] ECC-384
2,947,014 UART: [kat] HMAC-384Kdf
2,970,734 UART: [kat] LMS
3,502,510 UART: [kat] --
3,506,951 UART: [cold-reset] ++
3,507,816 UART: [fht] FHT @ 0x50003400
3,519,308 UART: [idev] ++
3,519,987 UART: [idev] CDI.KEYID = 6
3,520,871 UART: [idev] SUBJECT.KEYID = 7
3,522,138 UART: [idev] UDS.KEYID = 0
3,523,257 ready_for_fw is high
3,523,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,773 UART: [idev] Erasing UDS.KEYID = 0
6,026,170 UART: [idev] Sha1 KeyId Algorithm
6,048,975 UART: [idev] --
6,052,587 UART: [ldev] ++
6,053,264 UART: [ldev] CDI.KEYID = 6
6,054,147 UART: [ldev] SUBJECT.KEYID = 5
6,055,302 UART: [ldev] AUTHORITY.KEYID = 7
6,056,589 UART: [ldev] FE.KEYID = 1
6,098,431 UART: [ldev] Erasing FE.KEYID = 1
8,602,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,496 UART: [ldev] --
10,411,978 UART: [fwproc] Wait for Commands...
10,414,388 UART: [fwproc] Recv command 0x46574c44
10,416,703 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,603,990 >>> mbox cmd response: success
14,608,868 UART: [afmc] ++
14,609,570 UART: [afmc] CDI.KEYID = 6
14,610,821 UART: [afmc] SUBJECT.KEYID = 7
14,612,267 UART: [afmc] AUTHORITY.KEYID = 5
17,149,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,890,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,892,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,923,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,938,235 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,961,638 UART: [afmc] --
18,964,514 UART: [cold-reset] --
18,970,496 UART: [state] Locking Datavault
18,974,851 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,018 UART: [state] Locking ICCM
18,979,334 UART: [exit] Launching FMC @ 0x40000130
18,987,973 UART:
18,988,204 UART: Running Caliptra FMC ...
18,989,300 UART:
18,989,457 UART: [state] CFI Enabled
19,047,708 UART: [fht] FMC Alias Private Key: 7
20,812,758 UART: [art] Extend RT PCRs Done
20,813,975 UART: [art] Lock RT PCRs Done
20,815,485 UART: [art] Populate DV Done
20,820,735 UART: [fht] FMC Alias Private Key: 7
20,822,217 UART: [art] Derive CDI
20,822,953 UART: [art] Store in in slot 0x4
20,880,635 UART: [art] Derive Key Pair
20,881,676 UART: [art] Store priv key in slot 0x5
23,344,405 UART: [art] Derive Key Pair - Done
23,357,143 UART: [art] Signing Cert with AUTHO
23,358,451 UART: RITY.KEYID = 7
25,069,600 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,112 UART: [art] PUB.X = C84122431618BB2F55670F7DF6260E7A71D0284E9DE337AFBA874B220D5A9DF5B98C97D464329BF06E3B8490CEE1C36B
25,078,392 UART: [art] PUB.Y = D9F0C910F60B7BF6736FF9F1AF14A65991629481F663722372A69CA7310A21F53F3805487C9CDACB140E69D7B5B05B8D
25,085,638 UART: [art] SIG.R = 5FC7C1B9814AD582D1F5FA2CE4457C33DCE9F0A91795CFDBEBC6EE8959219512312DE95D603585EF8AC5D8C5CA55AEB1
25,093,063 UART: [art] SIG.S = E8104EEF35DF87363A79973BF513E6934FCE72D52ECA4CDBEACB9A4C677E8EDEF3C272BA349DAB2210B712A26DAD0694
26,071,589 UART: Caliptra RT
26,072,303 UART: [state] CFI Enabled
26,236,263 UART: [rt] RT listening for mailbox commands...
26,238,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,268,695 UART: [rt]cmd =0x44504543, len=24
26,311,344 >>> mbox cmd response data (40 bytes)
26,312,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,342,135 UART: [rt]cmd =0x44504543, len=24
26,375,227 >>> mbox cmd response data (40 bytes)
26,375,868 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,405,891 UART: [rt]cmd =0x44504543, len=24
26,439,197 >>> mbox cmd response data (40 bytes)
26,439,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,469,945 UART: [rt]cmd =0x44504543, len=24
26,503,331 >>> mbox cmd response data (40 bytes)
26,503,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,534,045 UART: [rt]cmd =0x44504543, len=24
26,567,547 >>> mbox cmd response data (40 bytes)
26,568,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,598,173 UART: [rt]cmd =0x44504543, len=24
26,631,719 >>> mbox cmd response data (40 bytes)
26,632,387 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,662,094 UART: [rt]cmd =0x44504543, len=24
26,696,420 >>> mbox cmd response data (40 bytes)
26,697,038 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,727,060 UART: [rt]cmd =0x44504543, len=24
26,760,365 >>> mbox cmd response data (40 bytes)
26,760,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,790,873 UART: [rt]cmd =0x44504543, len=24
26,824,580 >>> mbox cmd response data (40 bytes)
26,825,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,855,020 UART: [rt]cmd =0x44504543, len=24
26,888,733 >>> mbox cmd response data (40 bytes)
26,889,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,919,398 UART: [rt]cmd =0x44504543, len=24
26,952,674 >>> mbox cmd response data (40 bytes)
26,953,281 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,983,349 UART: [rt]cmd =0x44504543, len=24
27,016,922 >>> mbox cmd response data (40 bytes)
27,017,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,047,457 UART: [rt]cmd =0x44504543, len=24
27,081,192 >>> mbox cmd response data (40 bytes)
27,081,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,111,762 UART: [rt]cmd =0x44504543, len=24
27,145,094 >>> mbox cmd response data (40 bytes)
27,145,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,175,585 UART: [rt]cmd =0x44504543, len=24
27,209,061 >>> mbox cmd response data (40 bytes)
27,209,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,239,484 UART: [rt]cmd =0x44504543, len=24
27,245,746 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,438,967 ready_for_fw is high
3,439,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,737,114 >>> mbox cmd response: success
19,023,665 UART:
19,024,086 UART: Running Caliptra FMC ...
19,025,211 UART:
19,025,364 UART: [state] CFI Enabled
19,091,768 UART: [fht] FMC Alias Private Key: 7
20,855,722 UART: [art] Extend RT PCRs Done
20,856,961 UART: [art] Lock RT PCRs Done
20,858,455 UART: [art] Populate DV Done
20,863,822 UART: [fht] FMC Alias Private Key: 7
20,865,359 UART: [art] Derive CDI
20,866,094 UART: [art] Store in in slot 0x4
20,923,309 UART: [art] Derive Key Pair
20,924,349 UART: [art] Store priv key in slot 0x5
23,386,882 UART: [art] Derive Key Pair - Done
23,400,096 UART: [art] Signing Cert with AUTHO
23,401,393 UART: RITY.KEYID = 7
25,113,157 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,673 UART: [art] PUB.X = 9DDD5209A68D827CBB1C3858DD1FAF44ABE8D28FA12115ADEBFAF841DEC9CF03AF8361C627ACD13D7665F665E766E3DF
25,121,960 UART: [art] PUB.Y = 0966C2174EB3D27BC9751E1F84736ED4051F3328029EE881FC2DE398FD01FA78A596364B35ECD7FA29B2739C264443D4
25,129,186 UART: [art] SIG.R = D9B8DE753935CCCCF2A8F9C416EDEEF7EBEBFF4F884CF0CD34EFEFCDF34C8AF8FC39D00EE9246A295DB306CEF89CC9EC
25,136,687 UART: [art] SIG.S = 92572F8C826436248BC19FE77E7DAD548804144AD8F497029E8D58FAF04BFA5DFF9A39A2431F8C2D79F7554D3C88D870
26,116,105 UART: Caliptra RT
26,116,818 UART: [state] CFI Enabled
26,283,195 UART: [rt] RT listening for mailbox commands...
26,285,121 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,315,894 UART: [rt]cmd =0x44504543, len=24
26,356,577 >>> mbox cmd response data (40 bytes)
26,357,406 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,387,473 UART: [rt]cmd =0x44504543, len=24
26,420,823 >>> mbox cmd response data (40 bytes)
26,421,499 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,451,240 UART: [rt]cmd =0x44504543, len=24
26,484,303 >>> mbox cmd response data (40 bytes)
26,484,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,514,847 UART: [rt]cmd =0x44504543, len=24
26,548,819 >>> mbox cmd response data (40 bytes)
26,549,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,579,447 UART: [rt]cmd =0x44504543, len=24
26,612,653 >>> mbox cmd response data (40 bytes)
26,613,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,643,067 UART: [rt]cmd =0x44504543, len=24
26,676,790 >>> mbox cmd response data (40 bytes)
26,677,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,707,231 UART: [rt]cmd =0x44504543, len=24
26,740,775 >>> mbox cmd response data (40 bytes)
26,741,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,771,491 UART: [rt]cmd =0x44504543, len=24
26,804,867 >>> mbox cmd response data (40 bytes)
26,805,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,835,411 UART: [rt]cmd =0x44504543, len=24
26,868,764 >>> mbox cmd response data (40 bytes)
26,869,386 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,899,240 UART: [rt]cmd =0x44504543, len=24
26,933,099 >>> mbox cmd response data (40 bytes)
26,933,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,963,724 UART: [rt]cmd =0x44504543, len=24
26,997,175 >>> mbox cmd response data (40 bytes)
26,997,825 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,027,831 UART: [rt]cmd =0x44504543, len=24
27,061,015 >>> mbox cmd response data (40 bytes)
27,061,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,091,848 UART: [rt]cmd =0x44504543, len=24
27,125,549 >>> mbox cmd response data (40 bytes)
27,126,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,156,121 UART: [rt]cmd =0x44504543, len=24
27,188,987 >>> mbox cmd response data (40 bytes)
27,189,613 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,219,582 UART: [rt]cmd =0x44504543, len=24
27,253,426 >>> mbox cmd response data (40 bytes)
27,254,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,283,962 UART: [rt]cmd =0x44504543, len=24
27,290,369 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
192,920 UART:
193,292 UART: Running Caliptra ROM ...
194,526 UART:
604,103 UART: [state] CFI Enabled
618,549 UART: [state] LifecycleState = Unprovisioned
620,924 UART: [state] DebugLocked = No
623,808 UART: [state] WD Timer not started. Device not locked for debugging
628,769 UART: [kat] SHA2-256
818,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,448 UART: [kat] ++
829,900 UART: [kat] sha1
841,698 UART: [kat] SHA2-256
844,774 UART: [kat] SHA2-384
851,406 UART: [kat] SHA2-512-ACC
853,994 UART: [kat] ECC-384
3,298,075 UART: [kat] HMAC-384Kdf
3,311,105 UART: [kat] LMS
3,842,964 UART: [kat] --
3,847,156 UART: [cold-reset] ++
3,849,247 UART: [fht] FHT @ 0x50003400
3,861,509 UART: [idev] ++
3,862,219 UART: [idev] CDI.KEYID = 6
3,863,254 UART: [idev] SUBJECT.KEYID = 7
3,864,363 UART: [idev] UDS.KEYID = 0
3,865,303 ready_for_fw is high
3,865,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,870 UART: [idev] Erasing UDS.KEYID = 0
6,340,628 UART: [idev] Sha1 KeyId Algorithm
6,363,151 UART: [idev] --
6,367,192 UART: [ldev] ++
6,367,924 UART: [ldev] CDI.KEYID = 6
6,368,841 UART: [ldev] SUBJECT.KEYID = 5
6,369,999 UART: [ldev] AUTHORITY.KEYID = 7
6,371,226 UART: [ldev] FE.KEYID = 1
6,381,515 UART: [ldev] Erasing FE.KEYID = 1
8,857,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,042 UART: [ldev] --
10,650,821 UART: [fwproc] Wait for Commands...
10,653,457 UART: [fwproc] Recv command 0x46574c44
10,655,768 UART: [fwproc] Recv'd Img size: 114084 bytes
14,100,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,020 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,831,840 >>> mbox cmd response: success
14,836,028 UART: [afmc] ++
14,836,740 UART: [afmc] CDI.KEYID = 6
14,837,959 UART: [afmc] SUBJECT.KEYID = 7
14,839,407 UART: [afmc] AUTHORITY.KEYID = 5
17,341,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,875 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,887 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,908 UART: [afmc] --
19,138,673 UART: [cold-reset] --
19,141,247 UART: [state] Locking Datavault
19,145,693 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,844 UART: [state] Locking ICCM
19,149,679 UART: [exit] Launching FMC @ 0x40000130
19,158,362 UART:
19,158,608 UART: Running Caliptra FMC ...
19,159,729 UART:
19,159,889 UART: [state] CFI Enabled
19,167,833 UART: [fht] FMC Alias Private Key: 7
20,925,009 UART: [art] Extend RT PCRs Done
20,926,233 UART: [art] Lock RT PCRs Done
20,927,972 UART: [art] Populate DV Done
20,933,225 UART: [fht] FMC Alias Private Key: 7
20,934,767 UART: [art] Derive CDI
20,935,584 UART: [art] Store in in slot 0x4
20,977,963 UART: [art] Derive Key Pair
20,979,004 UART: [art] Store priv key in slot 0x5
23,405,349 UART: [art] Derive Key Pair - Done
23,418,237 UART: [art] Signing Cert with AUTHO
23,419,546 UART: RITY.KEYID = 7
25,124,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,353 UART: [art] PUB.X = 760E4ABD20EDA429D5B04D69293F5F3402E612360FA885BE7176498F05B1D01D49C73F03D0F65B62CDD4A5E62C197EE0
25,133,644 UART: [art] PUB.Y = E5A6485DE246B908BFAF9BABE27DA596C8C9CC5CF120E01332E2E86F83D45581B8677A33E17EE53B2D4D1B33427B4646
25,140,901 UART: [art] SIG.R = EC36D3A1624EAC25C686FA0E984DFF29E5D062D984A170393946E5ACCF3F5FB508A41F2C63E29C137076410BCE795148
25,148,263 UART: [art] SIG.S = EAA716369A13CC5F6D0A13F0B9C48A51821CFB668E81F256209C9E762091102A06F356B334E3BEC9DD1B323EEC56E2E5
26,127,314 UART: Caliptra RT
26,127,999 UART: [state] CFI Enabled
26,244,834 UART: [rt] RT listening for mailbox commands...
26,246,745 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,276,657 UART: [rt]cmd =0x44504543, len=24
26,303,061 >>> mbox cmd response data (40 bytes)
26,303,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,333,649 UART: [rt]cmd =0x44504543, len=24
26,359,710 >>> mbox cmd response data (40 bytes)
26,360,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,390,255 UART: [rt]cmd =0x44504543, len=24
26,416,719 >>> mbox cmd response data (40 bytes)
26,417,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,447,426 UART: [rt]cmd =0x44504543, len=24
26,473,457 >>> mbox cmd response data (40 bytes)
26,474,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,503,942 UART: [rt]cmd =0x44504543, len=24
26,530,161 >>> mbox cmd response data (40 bytes)
26,530,787 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,560,589 UART: [rt]cmd =0x44504543, len=24
26,587,025 >>> mbox cmd response data (40 bytes)
26,587,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,617,343 UART: [rt]cmd =0x44504543, len=24
26,643,812 >>> mbox cmd response data (40 bytes)
26,644,473 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,674,483 UART: [rt]cmd =0x44504543, len=24
26,700,725 >>> mbox cmd response data (40 bytes)
26,701,340 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,303 UART: [rt]cmd =0x44504543, len=24
26,757,403 >>> mbox cmd response data (40 bytes)
26,758,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,788,160 UART: [rt]cmd =0x44504543, len=24
26,814,258 >>> mbox cmd response data (40 bytes)
26,814,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,844,770 UART: [rt]cmd =0x44504543, len=24
26,870,681 >>> mbox cmd response data (40 bytes)
26,871,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,901,299 UART: [rt]cmd =0x44504543, len=24
26,927,573 >>> mbox cmd response data (40 bytes)
26,928,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,957,941 UART: [rt]cmd =0x44504543, len=24
26,984,592 >>> mbox cmd response data (40 bytes)
26,985,216 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,015,223 UART: [rt]cmd =0x44504543, len=24
27,041,781 >>> mbox cmd response data (40 bytes)
27,042,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,072,465 UART: [rt]cmd =0x44504543, len=24
27,099,578 >>> mbox cmd response data (40 bytes)
27,100,186 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,129,833 UART: [rt]cmd =0x44504543, len=24
27,136,218 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
3,755,036 ready_for_fw is high
3,755,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,941,273 >>> mbox cmd response: success
19,193,494 UART:
19,193,891 UART: Running Caliptra FMC ...
19,195,092 UART:
19,195,272 UART: [state] CFI Enabled
19,203,031 UART: [fht] FMC Alias Private Key: 7
20,959,825 UART: [art] Extend RT PCRs Done
20,961,049 UART: [art] Lock RT PCRs Done
20,962,602 UART: [art] Populate DV Done
20,967,757 UART: [fht] FMC Alias Private Key: 7
20,969,303 UART: [art] Derive CDI
20,970,040 UART: [art] Store in in slot 0x4
21,013,069 UART: [art] Derive Key Pair
21,014,074 UART: [art] Store priv key in slot 0x5
23,440,896 UART: [art] Derive Key Pair - Done
23,454,217 UART: [art] Signing Cert with AUTHO
23,455,526 UART: RITY.KEYID = 7
25,160,757 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,271 UART: [art] PUB.X = 4B57E9660E4B998AB8D1BBE03FF84FC39AF768E1C231434CFE458F3C133DE0F6E58FF261725360B73212672414B903AC
25,169,518 UART: [art] PUB.Y = 091EBE7A4B48B6FCE6EDCA6475C25170FE72B40D0698B3E82581D92783BD11291BE39EE9BFA6C9EAACF9B71896028B85
25,176,747 UART: [art] SIG.R = D7908DED83155A85487F792C56543F2B3DB3D406E637A6E3F3C426B572262E156DACB56E3F5B16F5E5EC5EB1B3837E01
25,184,203 UART: [art] SIG.S = 5272B7F1B5E299E0A7B7394AC4CDE7D42DA25BA70DF11587C1C81591C65331ACD15A1F39449EA526FBC78B0FF7B64B91
26,162,679 UART: Caliptra RT
26,163,369 UART: [state] CFI Enabled
26,280,488 UART: [rt] RT listening for mailbox commands...
26,282,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,312,341 UART: [rt]cmd =0x44504543, len=24
26,338,673 >>> mbox cmd response data (40 bytes)
26,339,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,369,472 UART: [rt]cmd =0x44504543, len=24
26,395,526 >>> mbox cmd response data (40 bytes)
26,396,223 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,425,861 UART: [rt]cmd =0x44504543, len=24
26,451,950 >>> mbox cmd response data (40 bytes)
26,452,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,482,392 UART: [rt]cmd =0x44504543, len=24
26,508,673 >>> mbox cmd response data (40 bytes)
26,509,353 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,539,114 UART: [rt]cmd =0x44504543, len=24
26,564,800 >>> mbox cmd response data (40 bytes)
26,565,427 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,595,379 UART: [rt]cmd =0x44504543, len=24
26,621,471 >>> mbox cmd response data (40 bytes)
26,622,122 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,651,918 UART: [rt]cmd =0x44504543, len=24
26,678,583 >>> mbox cmd response data (40 bytes)
26,679,190 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,709,206 UART: [rt]cmd =0x44504543, len=24
26,734,671 >>> mbox cmd response data (40 bytes)
26,735,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,765,179 UART: [rt]cmd =0x44504543, len=24
26,791,428 >>> mbox cmd response data (40 bytes)
26,792,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,822,057 UART: [rt]cmd =0x44504543, len=24
26,848,627 >>> mbox cmd response data (40 bytes)
26,849,237 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,879,367 UART: [rt]cmd =0x44504543, len=24
26,905,693 >>> mbox cmd response data (40 bytes)
26,906,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,936,364 UART: [rt]cmd =0x44504543, len=24
26,962,803 >>> mbox cmd response data (40 bytes)
26,963,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,993,328 UART: [rt]cmd =0x44504543, len=24
27,019,570 >>> mbox cmd response data (40 bytes)
27,020,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,049,903 UART: [rt]cmd =0x44504543, len=24
27,076,256 >>> mbox cmd response data (40 bytes)
27,076,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,106,837 UART: [rt]cmd =0x44504543, len=24
27,132,859 >>> mbox cmd response data (40 bytes)
27,133,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,163,276 UART: [rt]cmd =0x44504543, len=24
27,169,686 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,738 UART: [state] LifecycleState = Unprovisioned
86,393 UART: [state] DebugLocked = No
87,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,761 UART: [kat] SHA2-256
882,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,807 UART: [kat] ++
886,959 UART: [kat] sha1
891,291 UART: [kat] SHA2-256
893,229 UART: [kat] SHA2-384
895,914 UART: [kat] SHA2-512-ACC
897,815 UART: [kat] ECC-384
903,426 UART: [kat] HMAC-384Kdf
908,036 UART: [kat] LMS
1,476,232 UART: [kat] --
1,476,991 UART: [cold-reset] ++
1,477,455 UART: [fht] Storing FHT @ 0x50003400
1,480,322 UART: [idev] ++
1,480,490 UART: [idev] CDI.KEYID = 6
1,480,850 UART: [idev] SUBJECT.KEYID = 7
1,481,274 UART: [idev] UDS.KEYID = 0
1,481,619 ready_for_fw is high
1,481,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,254 UART: [idev] Erasing UDS.KEYID = 0
1,505,706 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,372 UART: [idev] --
1,515,379 UART: [ldev] ++
1,515,547 UART: [ldev] CDI.KEYID = 6
1,515,910 UART: [ldev] SUBJECT.KEYID = 5
1,516,336 UART: [ldev] AUTHORITY.KEYID = 7
1,516,799 UART: [ldev] FE.KEYID = 1
1,522,175 UART: [ldev] Erasing FE.KEYID = 1
1,547,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,922 UART: [ldev] --
1,587,371 UART: [fwproc] Waiting for Commands...
1,587,986 UART: [fwproc] Received command 0x46574c44
1,588,777 UART: [fwproc] Received Image of size 114084 bytes
2,884,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,487 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,330 >>> mbox cmd response: success
3,077,440 UART: [afmc] ++
3,077,608 UART: [afmc] CDI.KEYID = 6
3,077,970 UART: [afmc] SUBJECT.KEYID = 7
3,078,395 UART: [afmc] AUTHORITY.KEYID = 5
3,113,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,616 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,009 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,699 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,600 UART: [afmc] --
3,156,630 UART: [cold-reset] --
3,157,562 UART: [state] Locking Datavault
3,158,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,295 UART: [state] Locking ICCM
3,159,779 UART: [exit] Launching FMC @ 0x40000130
3,165,108 UART:
3,165,124 UART: Running Caliptra FMC ...
3,165,532 UART:
3,165,586 UART: [state] CFI Enabled
3,175,953 UART: [fht] FMC Alias Private Key: 7
3,283,782 UART: [art] Extend RT PCRs Done
3,284,210 UART: [art] Lock RT PCRs Done
3,285,620 UART: [art] Populate DV Done
3,293,559 UART: [fht] FMC Alias Private Key: 7
3,294,709 UART: [art] Derive CDI
3,294,989 UART: [art] Store in in slot 0x4
3,380,670 UART: [art] Derive Key Pair
3,381,030 UART: [art] Store priv key in slot 0x5
3,394,152 UART: [art] Derive Key Pair - Done
3,409,034 UART: [art] Signing Cert with AUTHO
3,409,514 UART: RITY.KEYID = 7
3,424,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,751 UART: [art] PUB.X = 24C6A0AC04D97E645FCF51969BFB9882D2D306585D773CEC5D414CD482CBCD2991FF64EDB545F1930DF4C50ED36870FB
3,432,523 UART: [art] PUB.Y = 3F27FBDB160B75569E1464E7F44F0624AB0ED18673604DFA93001D393BE922BFDA9BCE1E784145C40C929B91FB63BD42
3,439,447 UART: [art] SIG.R = 6D0DB880A1E6E057E4AA0CAE92C14C135755BFE1C0E8C24765FB6A622FE1D4E707D22B2F77DFDD8C69A376B065E7D7AC
3,446,228 UART: [art] SIG.S = 404293A21F19C4AA9D907D88891D340A0E98DEE4DB4503C6FA51EC3F2CD26567DFD1E05AC30490A58CB3D6E694145A66
3,470,001 UART: Caliptra RT
3,470,254 UART: [state] CFI Enabled
3,578,222 UART: [rt] RT listening for mailbox commands...
3,578,892 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,658 UART: [rt]cmd =0x44504543, len=24
3,634,931 >>> mbox cmd response data (40 bytes)
3,634,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,649 UART: [rt]cmd =0x44504543, len=24
3,691,346 >>> mbox cmd response data (40 bytes)
3,691,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,616 UART: [rt]cmd =0x44504543, len=24
3,746,799 >>> mbox cmd response data (40 bytes)
3,746,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,099 UART: [rt]cmd =0x44504543, len=24
3,802,718 >>> mbox cmd response data (40 bytes)
3,802,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,228 UART: [rt]cmd =0x44504543, len=24
3,858,735 >>> mbox cmd response data (40 bytes)
3,858,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,141 UART: [rt]cmd =0x44504543, len=24
3,914,552 >>> mbox cmd response data (40 bytes)
3,914,553 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,184 UART: [rt]cmd =0x44504543, len=24
3,970,745 >>> mbox cmd response data (40 bytes)
3,970,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,161 UART: [rt]cmd =0x44504543, len=24
4,026,154 >>> mbox cmd response data (40 bytes)
4,026,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,055,696 UART: [rt]cmd =0x44504543, len=24
4,082,387 >>> mbox cmd response data (40 bytes)
4,082,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,025 UART: [rt]cmd =0x44504543, len=24
4,138,392 >>> mbox cmd response data (40 bytes)
4,138,393 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,167,904 UART: [rt]cmd =0x44504543, len=24
4,194,223 >>> mbox cmd response data (40 bytes)
4,194,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,501 UART: [rt]cmd =0x44504543, len=24
4,249,196 >>> mbox cmd response data (40 bytes)
4,249,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,696 UART: [rt]cmd =0x44504543, len=24
4,304,863 >>> mbox cmd response data (40 bytes)
4,304,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,334,321 UART: [rt]cmd =0x44504543, len=24
4,360,486 >>> mbox cmd response data (40 bytes)
4,360,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,390,004 UART: [rt]cmd =0x44504543, len=24
4,416,733 >>> mbox cmd response data (40 bytes)
4,416,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,446,211 UART: [rt]cmd =0x44504543, len=24
4,453,394 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,167 ready_for_fw is high
1,363,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,368 >>> mbox cmd response: success
2,987,768 UART:
2,987,784 UART: Running Caliptra FMC ...
2,988,192 UART:
2,988,246 UART: [state] CFI Enabled
2,998,847 UART: [fht] FMC Alias Private Key: 7
3,106,566 UART: [art] Extend RT PCRs Done
3,106,994 UART: [art] Lock RT PCRs Done
3,108,718 UART: [art] Populate DV Done
3,116,711 UART: [fht] FMC Alias Private Key: 7
3,117,693 UART: [art] Derive CDI
3,117,973 UART: [art] Store in in slot 0x4
3,203,092 UART: [art] Derive Key Pair
3,203,452 UART: [art] Store priv key in slot 0x5
3,216,486 UART: [art] Derive Key Pair - Done
3,231,327 UART: [art] Signing Cert with AUTHO
3,231,807 UART: RITY.KEYID = 7
3,247,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,878 UART: [art] PUB.X = 6B63E4AFAB88F17BF76F74CCEE5B3C95E4F547F205AA771139B0A7D10A76AD0B5B8695431F65AA4EBD6257F226BE0E17
3,254,652 UART: [art] PUB.Y = 45CDE2B45993E2E07831A910D657F237795CDE585BC3763D9B04D25AA3D8603F9A4863EBFD7D8F68539AFE87A75BC154
3,261,605 UART: [art] SIG.R = 5AC7B28497C8D2A2F77F0AD85E8C4336EA9B44681B42F47EA872810E57009ABAD7483A783A331FFBB921CC7E9BAC70BB
3,268,361 UART: [art] SIG.S = 84CCF913E09DFD9595751D269836914ABEEA1C7F36D42BF41D1FFD22A87F94BE3EAC7B67C324923AE0C3592D19EAF39C
3,292,078 UART: Caliptra RT
3,292,331 UART: [state] CFI Enabled
3,401,112 UART: [rt] RT listening for mailbox commands...
3,401,782 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,658 UART: [rt]cmd =0x44504543, len=24
3,457,995 >>> mbox cmd response data (40 bytes)
3,457,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,451 UART: [rt]cmd =0x44504543, len=24
3,513,858 >>> mbox cmd response data (40 bytes)
3,513,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,404 UART: [rt]cmd =0x44504543, len=24
3,569,547 >>> mbox cmd response data (40 bytes)
3,569,548 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,963 UART: [rt]cmd =0x44504543, len=24
3,625,294 >>> mbox cmd response data (40 bytes)
3,625,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,688 UART: [rt]cmd =0x44504543, len=24
3,680,855 >>> mbox cmd response data (40 bytes)
3,680,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,499 UART: [rt]cmd =0x44504543, len=24
3,736,654 >>> mbox cmd response data (40 bytes)
3,736,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,094 UART: [rt]cmd =0x44504543, len=24
3,792,649 >>> mbox cmd response data (40 bytes)
3,792,650 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,089 UART: [rt]cmd =0x44504543, len=24
3,848,500 >>> mbox cmd response data (40 bytes)
3,848,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,866 UART: [rt]cmd =0x44504543, len=24
3,904,333 >>> mbox cmd response data (40 bytes)
3,904,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,743 UART: [rt]cmd =0x44504543, len=24
3,960,226 >>> mbox cmd response data (40 bytes)
3,960,227 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,584 UART: [rt]cmd =0x44504543, len=24
4,016,379 >>> mbox cmd response data (40 bytes)
4,016,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,855 UART: [rt]cmd =0x44504543, len=24
4,072,544 >>> mbox cmd response data (40 bytes)
4,072,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,102,052 UART: [rt]cmd =0x44504543, len=24
4,128,261 >>> mbox cmd response data (40 bytes)
4,128,262 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,877 UART: [rt]cmd =0x44504543, len=24
4,184,178 >>> mbox cmd response data (40 bytes)
4,184,179 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,674 UART: [rt]cmd =0x44504543, len=24
4,240,079 >>> mbox cmd response data (40 bytes)
4,240,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,521 UART: [rt]cmd =0x44504543, len=24
4,276,658 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,610 UART: [kat] SHA2-256
892,548 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
902,457 UART: [kat] HMAC-384Kdf
907,215 UART: [kat] LMS
1,475,411 UART: [kat] --
1,476,390 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,921 UART: [idev] ++
1,480,089 UART: [idev] CDI.KEYID = 6
1,480,449 UART: [idev] SUBJECT.KEYID = 7
1,480,873 UART: [idev] UDS.KEYID = 0
1,481,218 ready_for_fw is high
1,481,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,027 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,669 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,196 UART: [ldev] Erasing FE.KEYID = 1
1,547,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,883 UART: [ldev] --
1,587,286 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 114084 bytes
2,883,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,094 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,041 >>> mbox cmd response: success
3,076,297 UART: [afmc] ++
3,076,465 UART: [afmc] CDI.KEYID = 6
3,076,827 UART: [afmc] SUBJECT.KEYID = 7
3,077,252 UART: [afmc] AUTHORITY.KEYID = 5
3,113,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,604 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,294 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,261 UART: [afmc] --
3,156,257 UART: [cold-reset] --
3,157,039 UART: [state] Locking Datavault
3,158,008 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,612 UART: [state] Locking ICCM
3,159,192 UART: [exit] Launching FMC @ 0x40000130
3,164,521 UART:
3,164,537 UART: Running Caliptra FMC ...
3,164,945 UART:
3,165,088 UART: [state] CFI Enabled
3,175,775 UART: [fht] FMC Alias Private Key: 7
3,284,090 UART: [art] Extend RT PCRs Done
3,284,518 UART: [art] Lock RT PCRs Done
3,286,072 UART: [art] Populate DV Done
3,294,239 UART: [fht] FMC Alias Private Key: 7
3,295,293 UART: [art] Derive CDI
3,295,573 UART: [art] Store in in slot 0x4
3,381,422 UART: [art] Derive Key Pair
3,381,782 UART: [art] Store priv key in slot 0x5
3,395,052 UART: [art] Derive Key Pair - Done
3,409,646 UART: [art] Signing Cert with AUTHO
3,410,126 UART: RITY.KEYID = 7
3,425,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,223 UART: [art] PUB.X = F0F6325FC3B02EB6B850E767FE334CA02B43F41A32B260ED6F32FE3133F5686FC5537B6B403880D8CA63E238F2331CD9
3,432,999 UART: [art] PUB.Y = C7686EE68C8EDF2A7E5765E3BC6B62D348D3EAE7F79033C0B295907660827277BB661E0F8060D336339E0EB20BF67AF0
3,439,944 UART: [art] SIG.R = 9FFFD6D2207C8FC4B40C966A6D80D5603A59FD2C7B9A0682E45962E47FCF53FA0023922BB57965111DB9F652C8FF017A
3,446,691 UART: [art] SIG.S = FC56F8E64E935B0A5EC54AE75904EEE98714E32FBBA897D10BF10464CCDCAD7AC1EE7D55AB568D43C8CFC659FD255991
3,470,222 UART: Caliptra RT
3,470,567 UART: [state] CFI Enabled
3,578,869 UART: [rt] RT listening for mailbox commands...
3,579,539 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,651 UART: [rt]cmd =0x44504543, len=24
3,636,166 >>> mbox cmd response data (40 bytes)
3,636,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,520 UART: [rt]cmd =0x44504543, len=24
3,691,781 >>> mbox cmd response data (40 bytes)
3,691,782 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,567 UART: [rt]cmd =0x44504543, len=24
3,748,098 >>> mbox cmd response data (40 bytes)
3,748,099 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,678 UART: [rt]cmd =0x44504543, len=24
3,804,049 >>> mbox cmd response data (40 bytes)
3,804,050 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,659 UART: [rt]cmd =0x44504543, len=24
3,859,638 >>> mbox cmd response data (40 bytes)
3,859,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,102 UART: [rt]cmd =0x44504543, len=24
3,915,345 >>> mbox cmd response data (40 bytes)
3,915,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,805 UART: [rt]cmd =0x44504543, len=24
3,971,342 >>> mbox cmd response data (40 bytes)
3,971,343 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,658 UART: [rt]cmd =0x44504543, len=24
4,026,911 >>> mbox cmd response data (40 bytes)
4,026,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,475 UART: [rt]cmd =0x44504543, len=24
4,083,014 >>> mbox cmd response data (40 bytes)
4,083,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,618 UART: [rt]cmd =0x44504543, len=24
4,138,951 >>> mbox cmd response data (40 bytes)
4,138,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,551 UART: [rt]cmd =0x44504543, len=24
4,195,064 >>> mbox cmd response data (40 bytes)
4,195,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,354 UART: [rt]cmd =0x44504543, len=24
4,250,545 >>> mbox cmd response data (40 bytes)
4,250,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,279,959 UART: [rt]cmd =0x44504543, len=24
4,306,318 >>> mbox cmd response data (40 bytes)
4,306,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,335,950 UART: [rt]cmd =0x44504543, len=24
4,362,541 >>> mbox cmd response data (40 bytes)
4,362,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,392,121 UART: [rt]cmd =0x44504543, len=24
4,418,452 >>> mbox cmd response data (40 bytes)
4,418,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,447,962 UART: [rt]cmd =0x44504543, len=24
4,454,861 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,624 ready_for_fw is high
1,362,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,157 >>> mbox cmd response: success
2,985,955 UART:
2,985,971 UART: Running Caliptra FMC ...
2,986,379 UART:
2,986,522 UART: [state] CFI Enabled
2,997,095 UART: [fht] FMC Alias Private Key: 7
3,104,432 UART: [art] Extend RT PCRs Done
3,104,860 UART: [art] Lock RT PCRs Done
3,106,528 UART: [art] Populate DV Done
3,115,043 UART: [fht] FMC Alias Private Key: 7
3,116,007 UART: [art] Derive CDI
3,116,287 UART: [art] Store in in slot 0x4
3,202,168 UART: [art] Derive Key Pair
3,202,528 UART: [art] Store priv key in slot 0x5
3,216,334 UART: [art] Derive Key Pair - Done
3,230,935 UART: [art] Signing Cert with AUTHO
3,231,415 UART: RITY.KEYID = 7
3,246,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,076 UART: [art] PUB.X = 72F8F2A909347377A0D4D455EDB6E441E5DED77BDAFF3676C51969B7872BDF2F117B129576D6337F320664069865A0E4
3,253,835 UART: [art] PUB.Y = 1071233E099E128D6C16B650D963B1998008B04DDD3D35B8B5FF13878344AA2748377A87CB0C33B2C22016D730BE5F33
3,260,770 UART: [art] SIG.R = 1F434936A44A8784AE81982E87006C17D3491D18B5DC732BC6D1E9E93DE2A1EEE97994776C8CDD0073FB7F9F87BBE238
3,267,502 UART: [art] SIG.S = 6FF0250239290E2205AF7C5E670224826FDAAE95C7D750166C42B35B8BE7FC41B6E20487FB83D1F56BBA59F6B74B37A1
3,291,576 UART: Caliptra RT
3,291,921 UART: [state] CFI Enabled
3,400,221 UART: [rt] RT listening for mailbox commands...
3,400,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,877 UART: [rt]cmd =0x44504543, len=24
3,457,660 >>> mbox cmd response data (40 bytes)
3,457,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,130 UART: [rt]cmd =0x44504543, len=24
3,513,099 >>> mbox cmd response data (40 bytes)
3,513,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,469 UART: [rt]cmd =0x44504543, len=24
3,569,074 >>> mbox cmd response data (40 bytes)
3,569,075 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,598,520 UART: [rt]cmd =0x44504543, len=24
3,625,023 >>> mbox cmd response data (40 bytes)
3,625,024 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,353 UART: [rt]cmd =0x44504543, len=24
3,680,356 >>> mbox cmd response data (40 bytes)
3,680,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,908 UART: [rt]cmd =0x44504543, len=24
3,736,493 >>> mbox cmd response data (40 bytes)
3,736,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,003 UART: [rt]cmd =0x44504543, len=24
3,792,920 >>> mbox cmd response data (40 bytes)
3,792,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,298 UART: [rt]cmd =0x44504543, len=24
3,848,803 >>> mbox cmd response data (40 bytes)
3,848,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,365 UART: [rt]cmd =0x44504543, len=24
3,904,750 >>> mbox cmd response data (40 bytes)
3,904,751 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,474 UART: [rt]cmd =0x44504543, len=24
3,960,599 >>> mbox cmd response data (40 bytes)
3,960,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,047 UART: [rt]cmd =0x44504543, len=24
4,016,926 >>> mbox cmd response data (40 bytes)
4,016,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,470 UART: [rt]cmd =0x44504543, len=24
4,072,347 >>> mbox cmd response data (40 bytes)
4,072,348 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,823 UART: [rt]cmd =0x44504543, len=24
4,127,902 >>> mbox cmd response data (40 bytes)
4,127,903 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,157,050 UART: [rt]cmd =0x44504543, len=24
4,183,363 >>> mbox cmd response data (40 bytes)
4,183,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,212,715 UART: [rt]cmd =0x44504543, len=24
4,238,872 >>> mbox cmd response data (40 bytes)
4,238,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,302 UART: [rt]cmd =0x44504543, len=24
4,275,907 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,436 UART: [kat] HMAC-384Kdf
922,998 UART: [kat] LMS
1,171,326 UART: [kat] --
1,172,453 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,408 UART: [idev] ++
1,175,576 UART: [idev] CDI.KEYID = 6
1,175,936 UART: [idev] SUBJECT.KEYID = 7
1,176,360 UART: [idev] UDS.KEYID = 0
1,176,705 ready_for_fw is high
1,176,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,746 UART: [idev] Erasing UDS.KEYID = 0
1,202,137 UART: [idev] Sha1 KeyId Algorithm
1,210,623 UART: [idev] --
1,211,523 UART: [ldev] ++
1,211,691 UART: [ldev] CDI.KEYID = 6
1,212,054 UART: [ldev] SUBJECT.KEYID = 5
1,212,480 UART: [ldev] AUTHORITY.KEYID = 7
1,212,943 UART: [ldev] FE.KEYID = 1
1,218,169 UART: [ldev] Erasing FE.KEYID = 1
1,244,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,825 UART: [ldev] --
1,283,248 UART: [fwproc] Wait for Commands...
1,283,904 UART: [fwproc] Recv command 0x46574c44
1,284,632 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,591 >>> mbox cmd response: success
2,771,757 UART: [afmc] ++
2,771,925 UART: [afmc] CDI.KEYID = 6
2,772,287 UART: [afmc] SUBJECT.KEYID = 7
2,772,712 UART: [afmc] AUTHORITY.KEYID = 5
2,808,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,432 UART: [afmc] --
2,851,364 UART: [cold-reset] --
2,852,196 UART: [state] Locking Datavault
2,853,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,037 UART: [state] Locking ICCM
2,854,675 UART: [exit] Launching FMC @ 0x40000130
2,860,004 UART:
2,860,020 UART: Running Caliptra FMC ...
2,860,428 UART:
2,860,482 UART: [state] CFI Enabled
2,870,751 UART: [fht] FMC Alias Private Key: 7
2,978,586 UART: [art] Extend RT PCRs Done
2,979,014 UART: [art] Lock RT PCRs Done
2,980,560 UART: [art] Populate DV Done
2,988,965 UART: [fht] FMC Alias Private Key: 7
2,990,073 UART: [art] Derive CDI
2,990,353 UART: [art] Store in in slot 0x4
3,076,036 UART: [art] Derive Key Pair
3,076,396 UART: [art] Store priv key in slot 0x5
3,090,080 UART: [art] Derive Key Pair - Done
3,104,985 UART: [art] Signing Cert with AUTHO
3,105,465 UART: RITY.KEYID = 7
3,120,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,220 UART: [art] PUB.X = 2A2720101659820C0B0010D9D9D9431C707C4C1211F8C35EE606E85F81E05CD22A25B1C886DB4195A646FABEDB296140
3,127,957 UART: [art] PUB.Y = 4AF815FEEC55561E1CBBFED80B86D694661EA53F1184CC1C579B49AD4B6C68DED2882124E4A24D4BDE292F4159C129B3
3,134,918 UART: [art] SIG.R = 06AB894322ECCFC197D6ADD529C1CEF085A375D341F4F5E4653C5099DE1E981F66144465D7400BBC1606999AE4C5AF39
3,141,685 UART: [art] SIG.S = 90085405AB7AAAD5FC9EE7D716CD90E49FF3CB6E2E37BBD7A1B2425C82054FD871E90BBC81BD16B254781FA196336CAD
3,165,388 UART: Caliptra RT
3,165,641 UART: [state] CFI Enabled
3,273,962 UART: [rt] RT listening for mailbox commands...
3,274,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,444 UART: [rt]cmd =0x44504543, len=24
3,330,737 >>> mbox cmd response data (40 bytes)
3,330,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,193 UART: [rt]cmd =0x44504543, len=24
3,386,216 >>> mbox cmd response data (40 bytes)
3,386,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,712 UART: [rt]cmd =0x44504543, len=24
3,442,293 >>> mbox cmd response data (40 bytes)
3,442,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,575 UART: [rt]cmd =0x44504543, len=24
3,498,320 >>> mbox cmd response data (40 bytes)
3,498,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,946 UART: [rt]cmd =0x44504543, len=24
3,553,967 >>> mbox cmd response data (40 bytes)
3,553,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,591 UART: [rt]cmd =0x44504543, len=24
3,609,950 >>> mbox cmd response data (40 bytes)
3,609,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,452 UART: [rt]cmd =0x44504543, len=24
3,666,141 >>> mbox cmd response data (40 bytes)
3,666,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,591 UART: [rt]cmd =0x44504543, len=24
3,721,710 >>> mbox cmd response data (40 bytes)
3,721,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,148 UART: [rt]cmd =0x44504543, len=24
3,777,265 >>> mbox cmd response data (40 bytes)
3,777,266 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,747 UART: [rt]cmd =0x44504543, len=24
3,832,900 >>> mbox cmd response data (40 bytes)
3,832,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,242 UART: [rt]cmd =0x44504543, len=24
3,888,571 >>> mbox cmd response data (40 bytes)
3,888,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,089 UART: [rt]cmd =0x44504543, len=24
3,944,398 >>> mbox cmd response data (40 bytes)
3,944,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,052 UART: [rt]cmd =0x44504543, len=24
4,000,441 >>> mbox cmd response data (40 bytes)
4,000,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,029,921 UART: [rt]cmd =0x44504543, len=24
4,056,204 >>> mbox cmd response data (40 bytes)
4,056,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,085,400 UART: [rt]cmd =0x44504543, len=24
4,111,845 >>> mbox cmd response data (40 bytes)
4,111,846 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,033 UART: [rt]cmd =0x44504543, len=24
4,148,176 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,436 >>> mbox cmd response: success
2,684,998 UART:
2,685,014 UART: Running Caliptra FMC ...
2,685,422 UART:
2,685,476 UART: [state] CFI Enabled
2,695,851 UART: [fht] FMC Alias Private Key: 7
2,803,158 UART: [art] Extend RT PCRs Done
2,803,586 UART: [art] Lock RT PCRs Done
2,805,052 UART: [art] Populate DV Done
2,813,353 UART: [fht] FMC Alias Private Key: 7
2,814,529 UART: [art] Derive CDI
2,814,809 UART: [art] Store in in slot 0x4
2,900,276 UART: [art] Derive Key Pair
2,900,636 UART: [art] Store priv key in slot 0x5
2,914,134 UART: [art] Derive Key Pair - Done
2,928,642 UART: [art] Signing Cert with AUTHO
2,929,122 UART: RITY.KEYID = 7
2,944,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,387 UART: [art] PUB.X = 50FBF715882F301D96B794083988425F784B3B43033FFCCF71B41D71DC0E926DF3CD41301E34939E72C4AB7CEE28DD7D
2,952,154 UART: [art] PUB.Y = CCD16C8B551BEAFA151343ECE75BB52490DBEAFE7939165CCEE07B61062E527A11764758F830FD7C2D34A779A54DF770
2,959,113 UART: [art] SIG.R = 9F6D58E3F4A4F5AB3A73F4272ECE792A47261CD11A0C6B9857D7F7171CFE70F9CE842B7E0295FC793092E2B9F8B5634F
2,965,887 UART: [art] SIG.S = 9574155775913DF221854A1C41EC102700D794ED5D614356219572D6DD3817FE2A049A209B03A9B9D449BA1DE3340B11
2,990,083 UART: Caliptra RT
2,990,336 UART: [state] CFI Enabled
3,096,994 UART: [rt] RT listening for mailbox commands...
3,097,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,690 UART: [rt]cmd =0x44504543, len=24
3,153,979 >>> mbox cmd response data (40 bytes)
3,153,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,367 UART: [rt]cmd =0x44504543, len=24
3,210,046 >>> mbox cmd response data (40 bytes)
3,210,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,239,518 UART: [rt]cmd =0x44504543, len=24
3,265,785 >>> mbox cmd response data (40 bytes)
3,265,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,295,111 UART: [rt]cmd =0x44504543, len=24
3,321,462 >>> mbox cmd response data (40 bytes)
3,321,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,776 UART: [rt]cmd =0x44504543, len=24
3,377,373 >>> mbox cmd response data (40 bytes)
3,377,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,925 UART: [rt]cmd =0x44504543, len=24
3,433,166 >>> mbox cmd response data (40 bytes)
3,433,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,658 UART: [rt]cmd =0x44504543, len=24
3,489,181 >>> mbox cmd response data (40 bytes)
3,489,182 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,783 UART: [rt]cmd =0x44504543, len=24
3,544,998 >>> mbox cmd response data (40 bytes)
3,544,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,484 UART: [rt]cmd =0x44504543, len=24
3,600,173 >>> mbox cmd response data (40 bytes)
3,600,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,919 UART: [rt]cmd =0x44504543, len=24
3,656,230 >>> mbox cmd response data (40 bytes)
3,656,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,806 UART: [rt]cmd =0x44504543, len=24
3,712,115 >>> mbox cmd response data (40 bytes)
3,712,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,593 UART: [rt]cmd =0x44504543, len=24
3,767,880 >>> mbox cmd response data (40 bytes)
3,767,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,797,222 UART: [rt]cmd =0x44504543, len=24
3,822,981 >>> mbox cmd response data (40 bytes)
3,822,982 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,351 UART: [rt]cmd =0x44504543, len=24
3,878,980 >>> mbox cmd response data (40 bytes)
3,878,981 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,366 UART: [rt]cmd =0x44504543, len=24
3,934,765 >>> mbox cmd response data (40 bytes)
3,934,766 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,187 UART: [rt]cmd =0x44504543, len=24
3,971,120 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
902,030 UART: [kat] SHA2-256
903,970 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 ready_for_fw is high
1,177,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,091 UART: [idev] Erasing UDS.KEYID = 0
1,202,256 UART: [idev] Sha1 KeyId Algorithm
1,210,642 UART: [idev] --
1,211,712 UART: [ldev] ++
1,211,880 UART: [ldev] CDI.KEYID = 6
1,212,243 UART: [ldev] SUBJECT.KEYID = 5
1,212,669 UART: [ldev] AUTHORITY.KEYID = 7
1,213,132 UART: [ldev] FE.KEYID = 1
1,218,366 UART: [ldev] Erasing FE.KEYID = 1
1,245,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,980 UART: [ldev] --
1,284,483 UART: [fwproc] Wait for Commands...
1,285,079 UART: [fwproc] Recv command 0x46574c44
1,285,807 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,928 >>> mbox cmd response: success
2,774,148 UART: [afmc] ++
2,774,316 UART: [afmc] CDI.KEYID = 6
2,774,678 UART: [afmc] SUBJECT.KEYID = 7
2,775,103 UART: [afmc] AUTHORITY.KEYID = 5
2,810,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,911 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,597 UART: [afmc] --
2,853,543 UART: [cold-reset] --
2,854,121 UART: [state] Locking Datavault
2,855,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,920 UART: [state] Locking ICCM
2,856,576 UART: [exit] Launching FMC @ 0x40000130
2,861,905 UART:
2,861,921 UART: Running Caliptra FMC ...
2,862,329 UART:
2,862,472 UART: [state] CFI Enabled
2,873,013 UART: [fht] FMC Alias Private Key: 7
2,981,370 UART: [art] Extend RT PCRs Done
2,981,798 UART: [art] Lock RT PCRs Done
2,983,470 UART: [art] Populate DV Done
2,991,815 UART: [fht] FMC Alias Private Key: 7
2,992,793 UART: [art] Derive CDI
2,993,073 UART: [art] Store in in slot 0x4
3,078,770 UART: [art] Derive Key Pair
3,079,130 UART: [art] Store priv key in slot 0x5
3,092,510 UART: [art] Derive Key Pair - Done
3,107,298 UART: [art] Signing Cert with AUTHO
3,107,778 UART: RITY.KEYID = 7
3,122,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,743 UART: [art] PUB.X = 9F625FB571B96B3F1F1358946E722C031E87A811A7A9CA0270D3748C3A87654BDEBF54F18C3EED7494C1658966F8D510
3,130,507 UART: [art] PUB.Y = 3D485F025A97C951EB6EA02E77180658CFC81DDB8F7ACDD1EE26105DC4D81A3F88F872878004799079DD611E03952AB1
3,137,449 UART: [art] SIG.R = AF5157A79CB2E210300F6000554832A0747DAA0B0871F8F0A85D41DD3EE4D3AAAD8A5E286515EC70380C6458A470525E
3,144,187 UART: [art] SIG.S = 330A37EB1B96F784C95A1B79C80D4DE7DB6904CFE4A373C01444D79F0B09DB6A1B1C15DC9CC2263C9EED65A9674C25ED
3,167,305 UART: Caliptra RT
3,167,650 UART: [state] CFI Enabled
3,275,577 UART: [rt] RT listening for mailbox commands...
3,276,247 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,057 UART: [rt]cmd =0x44504543, len=24
3,332,782 >>> mbox cmd response data (40 bytes)
3,332,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,192 UART: [rt]cmd =0x44504543, len=24
3,388,123 >>> mbox cmd response data (40 bytes)
3,388,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,731 UART: [rt]cmd =0x44504543, len=24
3,444,616 >>> mbox cmd response data (40 bytes)
3,444,617 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,158 UART: [rt]cmd =0x44504543, len=24
3,500,525 >>> mbox cmd response data (40 bytes)
3,500,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,971 UART: [rt]cmd =0x44504543, len=24
3,556,318 >>> mbox cmd response data (40 bytes)
3,556,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,806 UART: [rt]cmd =0x44504543, len=24
3,612,221 >>> mbox cmd response data (40 bytes)
3,612,222 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,669 UART: [rt]cmd =0x44504543, len=24
3,668,216 >>> mbox cmd response data (40 bytes)
3,668,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,564 UART: [rt]cmd =0x44504543, len=24
3,723,739 >>> mbox cmd response data (40 bytes)
3,723,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,177 UART: [rt]cmd =0x44504543, len=24
3,780,082 >>> mbox cmd response data (40 bytes)
3,780,083 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,650 UART: [rt]cmd =0x44504543, len=24
3,835,749 >>> mbox cmd response data (40 bytes)
3,835,750 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,373 UART: [rt]cmd =0x44504543, len=24
3,891,826 >>> mbox cmd response data (40 bytes)
3,891,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,216 UART: [rt]cmd =0x44504543, len=24
3,947,807 >>> mbox cmd response data (40 bytes)
3,947,808 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,977,219 UART: [rt]cmd =0x44504543, len=24
4,003,534 >>> mbox cmd response data (40 bytes)
4,003,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,033,004 UART: [rt]cmd =0x44504543, len=24
4,059,277 >>> mbox cmd response data (40 bytes)
4,059,278 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,905 UART: [rt]cmd =0x44504543, len=24
4,115,438 >>> mbox cmd response data (40 bytes)
4,115,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,894 UART: [rt]cmd =0x44504543, len=24
4,152,207 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,172 ready_for_fw is high
1,060,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,153 >>> mbox cmd response: success
2,688,047 UART:
2,688,063 UART: Running Caliptra FMC ...
2,688,471 UART:
2,688,614 UART: [state] CFI Enabled
2,699,229 UART: [fht] FMC Alias Private Key: 7
2,807,598 UART: [art] Extend RT PCRs Done
2,808,026 UART: [art] Lock RT PCRs Done
2,809,814 UART: [art] Populate DV Done
2,817,913 UART: [fht] FMC Alias Private Key: 7
2,818,985 UART: [art] Derive CDI
2,819,265 UART: [art] Store in in slot 0x4
2,905,432 UART: [art] Derive Key Pair
2,905,792 UART: [art] Store priv key in slot 0x5
2,918,866 UART: [art] Derive Key Pair - Done
2,933,743 UART: [art] Signing Cert with AUTHO
2,934,223 UART: RITY.KEYID = 7
2,949,155 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,920 UART: [art] PUB.X = 047B61185775BBCB9ADE94659C43A6355E6F7079D193A04F2985B2FD0B2CB3FDC8C156802FB264EACD6E861304791C6B
2,956,687 UART: [art] PUB.Y = 452655CB98DFE7B19CE2D564E896420ABC5BFA8FC5D25846C9C01B96E7E0E237243ADF2C5529FA4417694051111228E9
2,963,636 UART: [art] SIG.R = 5360F14D714BCC0D9318581CD150EAE784EC189A41F89D310EDC2C1B12B8BC464F1492697B1967CC2CC54BD8B3920274
2,970,401 UART: [art] SIG.S = B818EABBE7139ADE03147915763370D0C1F6D551E4077729C2BF16EF4BDEE41882B5719DE3291344B850855B2654E4AF
2,994,890 UART: Caliptra RT
2,995,235 UART: [state] CFI Enabled
3,103,866 UART: [rt] RT listening for mailbox commands...
3,104,536 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,502 UART: [rt]cmd =0x44504543, len=24
3,160,429 >>> mbox cmd response data (40 bytes)
3,160,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,109 UART: [rt]cmd =0x44504543, len=24
3,215,912 >>> mbox cmd response data (40 bytes)
3,215,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,245,220 UART: [rt]cmd =0x44504543, len=24
3,271,741 >>> mbox cmd response data (40 bytes)
3,271,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,391 UART: [rt]cmd =0x44504543, len=24
3,327,558 >>> mbox cmd response data (40 bytes)
3,327,559 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,198 UART: [rt]cmd =0x44504543, len=24
3,383,797 >>> mbox cmd response data (40 bytes)
3,383,798 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,413,027 UART: [rt]cmd =0x44504543, len=24
3,439,340 >>> mbox cmd response data (40 bytes)
3,439,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,776 UART: [rt]cmd =0x44504543, len=24
3,495,101 >>> mbox cmd response data (40 bytes)
3,495,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,481 UART: [rt]cmd =0x44504543, len=24
3,550,506 >>> mbox cmd response data (40 bytes)
3,550,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,938 UART: [rt]cmd =0x44504543, len=24
3,606,787 >>> mbox cmd response data (40 bytes)
3,606,788 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,629 UART: [rt]cmd =0x44504543, len=24
3,663,392 >>> mbox cmd response data (40 bytes)
3,663,393 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,786 UART: [rt]cmd =0x44504543, len=24
3,719,617 >>> mbox cmd response data (40 bytes)
3,719,618 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,927 UART: [rt]cmd =0x44504543, len=24
3,775,344 >>> mbox cmd response data (40 bytes)
3,775,345 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,844 UART: [rt]cmd =0x44504543, len=24
3,830,993 >>> mbox cmd response data (40 bytes)
3,830,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,341 UART: [rt]cmd =0x44504543, len=24
3,886,652 >>> mbox cmd response data (40 bytes)
3,886,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,380 UART: [rt]cmd =0x44504543, len=24
3,942,621 >>> mbox cmd response data (40 bytes)
3,942,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,087 UART: [rt]cmd =0x44504543, len=24
3,979,290 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,337 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,174,827 ready_for_fw is high
1,174,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,268 UART: [ldev] ++
1,209,436 UART: [ldev] CDI.KEYID = 6
1,209,800 UART: [ldev] SUBJECT.KEYID = 5
1,210,227 UART: [ldev] AUTHORITY.KEYID = 7
1,210,690 UART: [ldev] FE.KEYID = 1
1,215,980 UART: [ldev] Erasing FE.KEYID = 1
1,242,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,206 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,259 >>> mbox cmd response: success
2,771,368 UART: [afmc] ++
2,771,536 UART: [afmc] CDI.KEYID = 6
2,771,899 UART: [afmc] SUBJECT.KEYID = 7
2,772,325 UART: [afmc] AUTHORITY.KEYID = 5
2,807,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,688 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,271 UART: [afmc] --
2,851,305 UART: [cold-reset] --
2,852,171 UART: [state] Locking Datavault
2,853,344 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,948 UART: [state] Locking ICCM
2,854,466 UART: [exit] Launching FMC @ 0x40000130
2,859,795 UART:
2,859,811 UART: Running Caliptra FMC ...
2,860,219 UART:
2,860,273 UART: [state] CFI Enabled
2,870,842 UART: [fht] FMC Alias Private Key: 7
2,978,883 UART: [art] Extend RT PCRs Done
2,979,311 UART: [art] Lock RT PCRs Done
2,980,929 UART: [art] Populate DV Done
2,989,290 UART: [fht] FMC Alias Private Key: 7
2,990,440 UART: [art] Derive CDI
2,990,720 UART: [art] Store in in slot 0x4
3,076,823 UART: [art] Derive Key Pair
3,077,183 UART: [art] Store priv key in slot 0x5
3,090,749 UART: [art] Derive Key Pair - Done
3,105,456 UART: [art] Signing Cert with AUTHO
3,105,936 UART: RITY.KEYID = 7
3,121,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,011 UART: [art] PUB.X = F861D225634BB5A4619157B918E532D8DD21E783D2C2FA5867A15EF9ECD7D784010B7FF1C42F88B7FEBC696ABC43F8AD
3,128,789 UART: [art] PUB.Y = D8E40929390B2993262E13DF6C7F1C4A302112EC2FBBCED2CDCB3D1BB25D33A3E17ED0745B360F65CB02492C7149A107
3,135,734 UART: [art] SIG.R = 2E097F553C0C59957F62365933A3BD6678D8F63BB9C5A395B218481D34C0185EEF09A579E91C8E8B115AA153EA273D28
3,142,493 UART: [art] SIG.S = EA0CEF978A39888023EF8CD62C939218149225C782F84F359A7E95B92D226E5CC94B943AEA734A735E285F9B83C72A45
3,166,439 UART: Caliptra RT
3,166,692 UART: [state] CFI Enabled
3,274,801 UART: [rt] RT listening for mailbox commands...
3,275,471 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,477 UART: [rt]cmd =0x44504543, len=24
3,331,436 >>> mbox cmd response data (40 bytes)
3,331,437 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,802 UART: [rt]cmd =0x44504543, len=24
3,386,601 >>> mbox cmd response data (40 bytes)
3,386,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,975 UART: [rt]cmd =0x44504543, len=24
3,442,150 >>> mbox cmd response data (40 bytes)
3,442,151 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,646 UART: [rt]cmd =0x44504543, len=24
3,498,001 >>> mbox cmd response data (40 bytes)
3,498,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,455 UART: [rt]cmd =0x44504543, len=24
3,553,832 >>> mbox cmd response data (40 bytes)
3,553,833 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,324 UART: [rt]cmd =0x44504543, len=24
3,609,713 >>> mbox cmd response data (40 bytes)
3,609,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,127 UART: [rt]cmd =0x44504543, len=24
3,665,500 >>> mbox cmd response data (40 bytes)
3,665,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,150 UART: [rt]cmd =0x44504543, len=24
3,721,707 >>> mbox cmd response data (40 bytes)
3,721,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,439 UART: [rt]cmd =0x44504543, len=24
3,778,532 >>> mbox cmd response data (40 bytes)
3,778,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,060 UART: [rt]cmd =0x44504543, len=24
3,834,295 >>> mbox cmd response data (40 bytes)
3,834,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,821 UART: [rt]cmd =0x44504543, len=24
3,890,390 >>> mbox cmd response data (40 bytes)
3,890,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,840 UART: [rt]cmd =0x44504543, len=24
3,946,141 >>> mbox cmd response data (40 bytes)
3,946,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,487 UART: [rt]cmd =0x44504543, len=24
4,002,014 >>> mbox cmd response data (40 bytes)
4,002,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,031,368 UART: [rt]cmd =0x44504543, len=24
4,057,463 >>> mbox cmd response data (40 bytes)
4,057,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,243 UART: [rt]cmd =0x44504543, len=24
4,113,902 >>> mbox cmd response data (40 bytes)
4,113,903 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,542 UART: [rt]cmd =0x44504543, len=24
4,150,507 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,210 ready_for_fw is high
1,057,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,241 >>> mbox cmd response: success
2,681,243 UART:
2,681,259 UART: Running Caliptra FMC ...
2,681,667 UART:
2,681,721 UART: [state] CFI Enabled
2,692,366 UART: [fht] FMC Alias Private Key: 7
2,799,881 UART: [art] Extend RT PCRs Done
2,800,309 UART: [art] Lock RT PCRs Done
2,801,873 UART: [art] Populate DV Done
2,810,280 UART: [fht] FMC Alias Private Key: 7
2,811,450 UART: [art] Derive CDI
2,811,730 UART: [art] Store in in slot 0x4
2,897,339 UART: [art] Derive Key Pair
2,897,699 UART: [art] Store priv key in slot 0x5
2,911,207 UART: [art] Derive Key Pair - Done
2,925,889 UART: [art] Signing Cert with AUTHO
2,926,369 UART: RITY.KEYID = 7
2,941,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,148 UART: [art] PUB.X = 68BA8B54A9669532CDB49186C74CA54026A92B9621CDD10AD1032805D7D7F9BD90894A0A371E8DD146C00F46AC1A9E0B
2,948,906 UART: [art] PUB.Y = 0B2737CB2BD6D6C3325CAE42F97F7B3AE9B5846455025C794E6CA95E2D844330BC5D4901CB2FC1F02554B2BF779EB1A7
2,955,857 UART: [art] SIG.R = 314529F83E29EEDD11E1EF84D682386FD1F3EA60837ABAA481BD5CE5302A8E0229ECA6A6881AE12E0FBB72324E36BA23
2,962,635 UART: [art] SIG.S = A4AE7E13C07F2046B33573849A7A025A2026746EE692686B3D66D9BB128145FFD8F736942676F78A6B57D450C2549C6B
2,986,007 UART: Caliptra RT
2,986,260 UART: [state] CFI Enabled
3,093,679 UART: [rt] RT listening for mailbox commands...
3,094,349 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,453 UART: [rt]cmd =0x44504543, len=24
3,150,858 >>> mbox cmd response data (40 bytes)
3,150,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,174 UART: [rt]cmd =0x44504543, len=24
3,205,723 >>> mbox cmd response data (40 bytes)
3,205,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,283 UART: [rt]cmd =0x44504543, len=24
3,261,300 >>> mbox cmd response data (40 bytes)
3,261,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,748 UART: [rt]cmd =0x44504543, len=24
3,317,059 >>> mbox cmd response data (40 bytes)
3,317,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,581 UART: [rt]cmd =0x44504543, len=24
3,372,428 >>> mbox cmd response data (40 bytes)
3,372,429 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,966 UART: [rt]cmd =0x44504543, len=24
3,427,577 >>> mbox cmd response data (40 bytes)
3,427,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,959 UART: [rt]cmd =0x44504543, len=24
3,483,310 >>> mbox cmd response data (40 bytes)
3,483,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,628 UART: [rt]cmd =0x44504543, len=24
3,538,309 >>> mbox cmd response data (40 bytes)
3,538,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,801 UART: [rt]cmd =0x44504543, len=24
3,593,790 >>> mbox cmd response data (40 bytes)
3,593,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,192 UART: [rt]cmd =0x44504543, len=24
3,649,691 >>> mbox cmd response data (40 bytes)
3,649,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,123 UART: [rt]cmd =0x44504543, len=24
3,705,574 >>> mbox cmd response data (40 bytes)
3,705,575 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,082 UART: [rt]cmd =0x44504543, len=24
3,761,543 >>> mbox cmd response data (40 bytes)
3,761,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,003 UART: [rt]cmd =0x44504543, len=24
3,817,192 >>> mbox cmd response data (40 bytes)
3,817,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,724 UART: [rt]cmd =0x44504543, len=24
3,872,871 >>> mbox cmd response data (40 bytes)
3,872,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,479 UART: [rt]cmd =0x44504543, len=24
3,928,826 >>> mbox cmd response data (40 bytes)
3,928,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,958,426 UART: [rt]cmd =0x44504543, len=24
3,965,659 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,204 UART: [state] WD Timer not started. Device not locked for debugging
88,477 UART: [kat] SHA2-256
892,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,156 UART: [kat] ++
896,308 UART: [kat] sha1
900,580 UART: [kat] SHA2-256
902,520 UART: [kat] SHA2-384
905,297 UART: [kat] SHA2-512-ACC
907,198 UART: [kat] ECC-384
917,053 UART: [kat] HMAC-384Kdf
921,629 UART: [kat] LMS
1,169,941 UART: [kat] --
1,170,770 UART: [cold-reset] ++
1,171,188 UART: [fht] FHT @ 0x50003400
1,174,076 UART: [idev] ++
1,174,244 UART: [idev] CDI.KEYID = 6
1,174,605 UART: [idev] SUBJECT.KEYID = 7
1,175,030 UART: [idev] UDS.KEYID = 0
1,175,376 ready_for_fw is high
1,175,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,116 UART: [idev] Erasing UDS.KEYID = 0
1,200,676 UART: [idev] Sha1 KeyId Algorithm
1,209,546 UART: [idev] --
1,210,743 UART: [ldev] ++
1,210,911 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,803 UART: [ldev] --
1,283,167 UART: [fwproc] Wait for Commands...
1,283,892 UART: [fwproc] Recv command 0x46574c44
1,284,625 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,220 >>> mbox cmd response: success
2,773,347 UART: [afmc] ++
2,773,515 UART: [afmc] CDI.KEYID = 6
2,773,878 UART: [afmc] SUBJECT.KEYID = 7
2,774,304 UART: [afmc] AUTHORITY.KEYID = 5
2,809,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,980 UART: [afmc] --
2,853,046 UART: [cold-reset] --
2,853,860 UART: [state] Locking Datavault
2,854,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,559 UART: [state] Locking ICCM
2,856,229 UART: [exit] Launching FMC @ 0x40000130
2,861,558 UART:
2,861,574 UART: Running Caliptra FMC ...
2,861,982 UART:
2,862,125 UART: [state] CFI Enabled
2,872,658 UART: [fht] FMC Alias Private Key: 7
2,980,585 UART: [art] Extend RT PCRs Done
2,981,013 UART: [art] Lock RT PCRs Done
2,982,815 UART: [art] Populate DV Done
2,991,102 UART: [fht] FMC Alias Private Key: 7
2,992,202 UART: [art] Derive CDI
2,992,482 UART: [art] Store in in slot 0x4
3,077,985 UART: [art] Derive Key Pair
3,078,345 UART: [art] Store priv key in slot 0x5
3,091,067 UART: [art] Derive Key Pair - Done
3,105,548 UART: [art] Signing Cert with AUTHO
3,106,028 UART: RITY.KEYID = 7
3,121,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,069 UART: [art] PUB.X = DD3E4881FC7C945C03B9CD394F0C4BEF798B20ABA9C3E9E268ACD7EB865EDC0E15741EDE2EF63459BEC29122686FA088
3,128,850 UART: [art] PUB.Y = 5B3012DDAF13799C7B27D0579C7CD5188C0F4990CDE1C6F5F901A0D4145E535126DFB1895D6749FC8FF0E08E68A6CC03
3,135,799 UART: [art] SIG.R = 913DCFD50362ACD08DC9204A00C7C0EF1837068EBA1136D7FD22C3383B07BEC0294E33B5C4443E5DE1896729C165BF17
3,142,544 UART: [art] SIG.S = E252A1DA9B0A1DB236F583EC0FF88B18E0DD9876ADCE8CF8AAC1A895957C2E2244493F908CAE1483C47F54CCE98009CF
3,166,292 UART: Caliptra RT
3,166,637 UART: [state] CFI Enabled
3,273,933 UART: [rt] RT listening for mailbox commands...
3,274,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,637 UART: [rt]cmd =0x44504543, len=24
3,330,624 >>> mbox cmd response data (40 bytes)
3,330,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,218 UART: [rt]cmd =0x44504543, len=24
3,386,209 >>> mbox cmd response data (40 bytes)
3,386,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,555 UART: [rt]cmd =0x44504543, len=24
3,442,016 >>> mbox cmd response data (40 bytes)
3,442,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,478 UART: [rt]cmd =0x44504543, len=24
3,497,617 >>> mbox cmd response data (40 bytes)
3,497,618 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,055 UART: [rt]cmd =0x44504543, len=24
3,553,344 >>> mbox cmd response data (40 bytes)
3,553,345 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,806 UART: [rt]cmd =0x44504543, len=24
3,609,293 >>> mbox cmd response data (40 bytes)
3,609,294 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,785 UART: [rt]cmd =0x44504543, len=24
3,665,494 >>> mbox cmd response data (40 bytes)
3,665,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,810 UART: [rt]cmd =0x44504543, len=24
3,721,035 >>> mbox cmd response data (40 bytes)
3,721,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,609 UART: [rt]cmd =0x44504543, len=24
3,777,132 >>> mbox cmd response data (40 bytes)
3,777,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,520 UART: [rt]cmd =0x44504543, len=24
3,832,541 >>> mbox cmd response data (40 bytes)
3,832,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,345 UART: [rt]cmd =0x44504543, len=24
3,889,156 >>> mbox cmd response data (40 bytes)
3,889,157 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,758 UART: [rt]cmd =0x44504543, len=24
3,945,387 >>> mbox cmd response data (40 bytes)
3,945,388 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,933 UART: [rt]cmd =0x44504543, len=24
4,001,122 >>> mbox cmd response data (40 bytes)
4,001,123 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,030,652 UART: [rt]cmd =0x44504543, len=24
4,057,063 >>> mbox cmd response data (40 bytes)
4,057,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,635 UART: [rt]cmd =0x44504543, len=24
4,113,596 >>> mbox cmd response data (40 bytes)
4,113,597 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,962 UART: [rt]cmd =0x44504543, len=24
4,150,055 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,427 ready_for_fw is high
1,056,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,624 >>> mbox cmd response: success
2,681,986 UART:
2,682,002 UART: Running Caliptra FMC ...
2,682,410 UART:
2,682,553 UART: [state] CFI Enabled
2,693,112 UART: [fht] FMC Alias Private Key: 7
2,801,463 UART: [art] Extend RT PCRs Done
2,801,891 UART: [art] Lock RT PCRs Done
2,803,459 UART: [art] Populate DV Done
2,811,618 UART: [fht] FMC Alias Private Key: 7
2,812,608 UART: [art] Derive CDI
2,812,888 UART: [art] Store in in slot 0x4
2,898,391 UART: [art] Derive Key Pair
2,898,751 UART: [art] Store priv key in slot 0x5
2,911,913 UART: [art] Derive Key Pair - Done
2,926,652 UART: [art] Signing Cert with AUTHO
2,927,132 UART: RITY.KEYID = 7
2,942,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,263 UART: [art] PUB.X = F73DA679960DD371E013BB2EE7235F1F619523303C86BDD35DD5A8969403A8DFD92A576ED5AEFAC401A0FA5FAEE7DD8C
2,950,044 UART: [art] PUB.Y = 7FE5AC9BFB460C8B3D7622C05998F0EA55384876AC3147EAB7D3EA5C8283B164A72725FEFD2087067FC367D634850B1D
2,956,991 UART: [art] SIG.R = 699F9F3E7C0903406E97D1BE662A15D70E1F11692BD741C8E8ACA42747067AE32E2120515EE4AD5D69746832574D4D79
2,963,745 UART: [art] SIG.S = D7CC5E3E713B14E01687460DDA7D0DC36628252FFF2F6FA40B92DB3CC9CEDCA07AE3D010993C5974802EB723C009B648
2,987,624 UART: Caliptra RT
2,987,969 UART: [state] CFI Enabled
3,096,174 UART: [rt] RT listening for mailbox commands...
3,096,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,916 UART: [rt]cmd =0x44504543, len=24
3,152,571 >>> mbox cmd response data (40 bytes)
3,152,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,035 UART: [rt]cmd =0x44504543, len=24
3,208,232 >>> mbox cmd response data (40 bytes)
3,208,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,237,796 UART: [rt]cmd =0x44504543, len=24
3,263,861 >>> mbox cmd response data (40 bytes)
3,263,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,293,387 UART: [rt]cmd =0x44504543, len=24
3,319,772 >>> mbox cmd response data (40 bytes)
3,319,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,518 UART: [rt]cmd =0x44504543, len=24
3,375,877 >>> mbox cmd response data (40 bytes)
3,375,878 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,299 UART: [rt]cmd =0x44504543, len=24
3,431,654 >>> mbox cmd response data (40 bytes)
3,431,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,006 UART: [rt]cmd =0x44504543, len=24
3,486,691 >>> mbox cmd response data (40 bytes)
3,486,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,209 UART: [rt]cmd =0x44504543, len=24
3,542,836 >>> mbox cmd response data (40 bytes)
3,542,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,206 UART: [rt]cmd =0x44504543, len=24
3,599,053 >>> mbox cmd response data (40 bytes)
3,599,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,601 UART: [rt]cmd =0x44504543, len=24
3,654,618 >>> mbox cmd response data (40 bytes)
3,654,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,210 UART: [rt]cmd =0x44504543, len=24
3,710,825 >>> mbox cmd response data (40 bytes)
3,710,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,279 UART: [rt]cmd =0x44504543, len=24
3,766,496 >>> mbox cmd response data (40 bytes)
3,766,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,856 UART: [rt]cmd =0x44504543, len=24
3,821,799 >>> mbox cmd response data (40 bytes)
3,821,800 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,851,341 UART: [rt]cmd =0x44504543, len=24
3,877,970 >>> mbox cmd response data (40 bytes)
3,877,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,464 UART: [rt]cmd =0x44504543, len=24
3,933,699 >>> mbox cmd response data (40 bytes)
3,933,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,271 UART: [rt]cmd =0x44504543, len=24
3,970,260 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,154 UART:
192,549 UART: Running Caliptra ROM ...
193,752 UART:
193,909 UART: [state] CFI Enabled
263,002 UART: [state] LifecycleState = Unprovisioned
264,973 UART: [state] DebugLocked = No
267,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,995 UART: [kat] SHA2-256
442,663 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,191 UART: [kat] ++
453,672 UART: [kat] sha1
465,668 UART: [kat] SHA2-256
468,377 UART: [kat] SHA2-384
473,026 UART: [kat] SHA2-512-ACC
475,399 UART: [kat] ECC-384
2,768,261 UART: [kat] HMAC-384Kdf
2,800,295 UART: [kat] LMS
3,990,633 UART: [kat] --
3,995,367 UART: [cold-reset] ++
3,997,589 UART: [fht] Storing FHT @ 0x50003400
4,009,850 UART: [idev] ++
4,010,431 UART: [idev] CDI.KEYID = 6
4,011,350 UART: [idev] SUBJECT.KEYID = 7
4,012,602 UART: [idev] UDS.KEYID = 0
4,013,671 ready_for_fw is high
4,013,886 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,023 UART: [idev] Erasing UDS.KEYID = 0
7,345,343 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,036 UART: [idev] --
7,371,409 UART: [ldev] ++
7,371,980 UART: [ldev] CDI.KEYID = 6
7,372,995 UART: [ldev] SUBJECT.KEYID = 5
7,374,151 UART: [ldev] AUTHORITY.KEYID = 7
7,375,451 UART: [ldev] FE.KEYID = 1
7,421,754 UART: [ldev] Erasing FE.KEYID = 1
10,757,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,194 UART: [ldev] --
13,138,834 UART: [fwproc] Waiting for Commands...
13,141,523 UART: [fwproc] Received command 0x46574c44
13,143,705 UART: [fwproc] Received Image of size 113760 bytes
17,190,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,651,016 >>> mbox cmd response: success
17,655,319 UART: [afmc] ++
17,655,934 UART: [afmc] CDI.KEYID = 6
17,656,850 UART: [afmc] SUBJECT.KEYID = 7
17,658,069 UART: [afmc] AUTHORITY.KEYID = 5
21,030,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,214 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,608 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,457 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,855 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,402 UART: [afmc] --
23,399,912 UART: [cold-reset] --
23,403,338 UART: [state] Locking Datavault
23,408,157 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,855 UART: [state] Locking ICCM
23,411,736 UART: [exit] Launching FMC @ 0x40000130
23,420,136 UART:
23,420,390 UART: Running Caliptra FMC ...
23,421,492 UART:
23,421,657 UART: [state] CFI Enabled
23,488,331 UART: [fht] FMC Alias Private Key: 7
25,826,543 UART: [art] Extend RT PCRs Done
25,827,759 UART: [art] Lock RT PCRs Done
25,829,139 UART: [art] Populate DV Done
25,834,924 UART: [fht] FMC Alias Private Key: 7
25,836,412 UART: [art] Derive CDI
25,837,175 UART: [art] Store in in slot 0x4
25,896,539 UART: [art] Derive Key Pair
25,897,569 UART: [art] Store priv key in slot 0x5
29,191,043 UART: [art] Derive Key Pair - Done
29,203,879 UART: [art] Signing Cert with AUTHO
29,205,177 UART: RITY.KEYID = 7
31,492,959 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,476 UART: [art] PUB.X = 1D7FD8930B22D4D5A26196DED7A1E140B8660525B1DDAE8014130AF41509A1ABF5431ED31B89C236E4D52AAA078F7D0C
31,501,733 UART: [art] PUB.Y = 7E46368F207ADAF9ACF5C945826BBA2E461331ACA997CD8C7719B66176EC7DD4E8D55E416C8D81D097FC21EE2553E001
31,508,991 UART: [art] SIG.R = 7D4C941E1C0021D26F11D8037C6EB7ACE957DFFB2564BE0EE7E69BF6116D71CC23F53ECA8EAE8FFF87AE6F3E543D66E5
31,516,390 UART: [art] SIG.S = B2F2F9EA7011FA8120742ABED01FE123826D3711D40D1CAE4DB9C7B14FAC370A5ECE92258329C4BB41504388D457954C
32,822,197 UART: Caliptra RT
32,822,910 UART: [state] CFI Enabled
32,982,299 UART: [rt] RT listening for mailbox commands...
32,984,396 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,014,713 UART: [rt]cmd =0x49444550, len=8
33,016,838 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,806,640 ready_for_fw is high
3,807,376 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,861,792 >>> mbox cmd response: success
23,548,649 UART:
23,549,045 UART: Running Caliptra FMC ...
23,550,255 UART:
23,550,418 UART: [state] CFI Enabled
23,617,501 UART: [fht] FMC Alias Private Key: 7
25,955,667 UART: [art] Extend RT PCRs Done
25,956,887 UART: [art] Lock RT PCRs Done
25,958,299 UART: [art] Populate DV Done
25,963,663 UART: [fht] FMC Alias Private Key: 7
25,965,312 UART: [art] Derive CDI
25,966,128 UART: [art] Store in in slot 0x4
26,026,080 UART: [art] Derive Key Pair
26,027,098 UART: [art] Store priv key in slot 0x5
29,319,755 UART: [art] Derive Key Pair - Done
29,332,319 UART: [art] Signing Cert with AUTHO
29,333,657 UART: RITY.KEYID = 7
31,622,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,795 UART: [art] PUB.X = 72B048B6F6E486CBBCB7902AECEBFBFA680CA9C6A026F22DF44FC297BBCA701456C56011A08CD440CAF32108E7F31845
31,631,052 UART: [art] PUB.Y = 0F67CFAFC08FD90688767B9C03EABF7F6534E2373B6D5C80325AEAEA5E7A7E022ABD3A5640A384F623E50F14F55B5A61
31,638,310 UART: [art] SIG.R = BC874BA7A8CAF102931C61687A79252DFCB3A87D83835C600CDD750C45E37AB8C1D1B90C54A3B123EA18076C60BB941C
31,645,744 UART: [art] SIG.S = 8D31638F2A5726675F8F26C42BEA50B7F73911A1DE8A52FD4412F1A1188BE3FE631FFD4412EDC3406FAC7FA484C983D7
32,951,126 UART: Caliptra RT
32,951,847 UART: [state] CFI Enabled
33,113,620 UART: [rt] RT listening for mailbox commands...
33,115,966 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,146,162 UART: [rt]cmd =0x49444550, len=8
33,148,555 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
192,927 UART:
193,299 UART: Running Caliptra ROM ...
194,478 UART:
604,241 UART: [state] CFI Enabled
617,622 UART: [state] LifecycleState = Unprovisioned
619,607 UART: [state] DebugLocked = No
621,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,409 UART: [kat] SHA2-256
797,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,720 UART: [kat] ++
808,250 UART: [kat] sha1
818,913 UART: [kat] SHA2-256
821,624 UART: [kat] SHA2-384
826,113 UART: [kat] SHA2-512-ACC
828,472 UART: [kat] ECC-384
3,112,583 UART: [kat] HMAC-384Kdf
3,123,767 UART: [kat] LMS
4,313,900 UART: [kat] --
4,318,823 UART: [cold-reset] ++
4,320,326 UART: [fht] Storing FHT @ 0x50003400
4,331,301 UART: [idev] ++
4,331,882 UART: [idev] CDI.KEYID = 6
4,332,806 UART: [idev] SUBJECT.KEYID = 7
4,334,046 UART: [idev] UDS.KEYID = 0
4,335,092 ready_for_fw is high
4,335,324 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,280 UART: [idev] Erasing UDS.KEYID = 0
7,619,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,509 UART: [idev] --
7,646,157 UART: [ldev] ++
7,646,735 UART: [ldev] CDI.KEYID = 6
7,647,692 UART: [ldev] SUBJECT.KEYID = 5
7,648,904 UART: [ldev] AUTHORITY.KEYID = 7
7,650,186 UART: [ldev] FE.KEYID = 1
7,662,010 UART: [ldev] Erasing FE.KEYID = 1
10,949,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,659 UART: [ldev] --
13,312,134 UART: [fwproc] Waiting for Commands...
13,314,225 UART: [fwproc] Received command 0x46574c44
13,316,559 UART: [fwproc] Received Image of size 113760 bytes
17,363,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,699 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,823,460 >>> mbox cmd response: success
17,827,009 UART: [afmc] ++
17,827,613 UART: [afmc] CDI.KEYID = 6
17,828,518 UART: [afmc] SUBJECT.KEYID = 7
17,829,734 UART: [afmc] AUTHORITY.KEYID = 5
21,146,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,265 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,525 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,858 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,702 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,217 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,731 UART: [afmc] --
23,510,000 UART: [cold-reset] --
23,513,647 UART: [state] Locking Datavault
23,517,654 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,409 UART: [state] Locking ICCM
23,521,768 UART: [exit] Launching FMC @ 0x40000130
23,530,155 UART:
23,530,384 UART: Running Caliptra FMC ...
23,531,426 UART:
23,531,573 UART: [state] CFI Enabled
23,539,587 UART: [fht] FMC Alias Private Key: 7
25,870,648 UART: [art] Extend RT PCRs Done
25,871,870 UART: [art] Lock RT PCRs Done
25,873,680 UART: [art] Populate DV Done
25,879,316 UART: [fht] FMC Alias Private Key: 7
25,881,003 UART: [art] Derive CDI
25,881,832 UART: [art] Store in in slot 0x4
25,924,436 UART: [art] Derive Key Pair
25,925,434 UART: [art] Store priv key in slot 0x5
29,167,050 UART: [art] Derive Key Pair - Done
29,180,160 UART: [art] Signing Cert with AUTHO
29,181,458 UART: RITY.KEYID = 7
31,460,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,120 UART: [art] PUB.X = 175DC7622ABFD5D5CACCB91EA3C70575536678847D4BEDF632288FF077561F0C126D0847ECD64E41D44C1259D5B8F652
31,469,339 UART: [art] PUB.Y = 06BF21E1B438B05E97CD7712E90B069A2FB695C954A03CB2E3D30D821242903D25B69CF695E89405C8C24CA6DF1A5EF1
31,476,687 UART: [art] SIG.R = 1F3DE65D186B486F54E25BE7917C2A531C468C8493DEFD48EDF3A7C5DFC4D449C7103F223A12D3D7A1E3A1B6949F2670
31,483,966 UART: [art] SIG.S = 2CF710CBBCB74CEC584D50A309646AA6ED419EB4F0562DD64393180976EA8DDF83403515612B32C5D455EB0A11C6A468
32,788,804 UART: Caliptra RT
32,789,517 UART: [state] CFI Enabled
32,907,069 UART: [rt] RT listening for mailbox commands...
32,909,410 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,939,272 UART: [rt]cmd =0x49444550, len=8
32,941,472 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
4,127,210 ready_for_fw is high
4,127,604 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,071,362 >>> mbox cmd response: success
23,714,316 UART:
23,714,718 UART: Running Caliptra FMC ...
23,715,849 UART:
23,716,008 UART: [state] CFI Enabled
23,724,132 UART: [fht] FMC Alias Private Key: 7
26,054,632 UART: [art] Extend RT PCRs Done
26,055,861 UART: [art] Lock RT PCRs Done
26,057,361 UART: [art] Populate DV Done
26,062,937 UART: [fht] FMC Alias Private Key: 7
26,064,534 UART: [art] Derive CDI
26,065,354 UART: [art] Store in in slot 0x4
26,108,075 UART: [art] Derive Key Pair
26,109,128 UART: [art] Store priv key in slot 0x5
29,351,458 UART: [art] Derive Key Pair - Done
29,364,524 UART: [art] Signing Cert with AUTHO
29,365,843 UART: RITY.KEYID = 7
31,645,569 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,080 UART: [art] PUB.X = 2F9DE81EF6435D3D207AB6E121ADAE4B374BB94E6C40034D1D102C6DC8BD4ECBD91D29C577C430AEECD3F121FAD335CF
31,654,322 UART: [art] PUB.Y = 491E6F9E0986529BD313400A4567FCA904C7E8F5D416AD078110E8D9422955CD57D7581E0C81A01E1AE6F45E2BDCB93E
31,661,549 UART: [art] SIG.R = 0B648EA176C9CE848580688099BDCEE29949B3108C7A61C07E32D1A380EDD94411A1D73DE050701DAC9CB107ED76E2E9
31,668,933 UART: [art] SIG.S = 15A0E91F699537E1C9A9C51A1928FA3556BC323EB5F4F621857FBE6714646D08BBB6567517CA7675B9B1C0172B0E4580
32,974,101 UART: Caliptra RT
32,974,820 UART: [state] CFI Enabled
33,092,479 UART: [rt] RT listening for mailbox commands...
33,094,868 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,124,661 UART: [rt]cmd =0x49444550, len=8
33,126,959 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
192,480 UART:
192,852 UART: Running Caliptra ROM ...
194,042 UART:
194,222 UART: [state] CFI Enabled
268,403 UART: [state] LifecycleState = Unprovisioned
270,328 UART: [state] DebugLocked = No
272,785 UART: [state] WD Timer not started. Device not locked for debugging
277,387 UART: [kat] SHA2-256
456,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,037 UART: [kat] ++
468,571 UART: [kat] sha1
480,473 UART: [kat] SHA2-256
483,517 UART: [kat] SHA2-384
488,941 UART: [kat] SHA2-512-ACC
491,944 UART: [kat] ECC-384
2,948,280 UART: [kat] HMAC-384Kdf
2,973,826 UART: [kat] LMS
3,503,301 UART: [kat] --
3,508,839 UART: [cold-reset] ++
3,511,150 UART: [fht] FHT @ 0x50003400
3,521,152 UART: [idev] ++
3,521,751 UART: [idev] CDI.KEYID = 6
3,522,649 UART: [idev] SUBJECT.KEYID = 7
3,523,818 UART: [idev] UDS.KEYID = 0
3,524,717 ready_for_fw is high
3,524,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,319 UART: [idev] Erasing UDS.KEYID = 0
6,028,021 UART: [idev] Sha1 KeyId Algorithm
6,050,939 UART: [idev] --
6,054,557 UART: [ldev] ++
6,055,121 UART: [ldev] CDI.KEYID = 6
6,056,006 UART: [ldev] SUBJECT.KEYID = 5
6,057,215 UART: [ldev] AUTHORITY.KEYID = 7
6,058,439 UART: [ldev] FE.KEYID = 1
6,101,736 UART: [ldev] Erasing FE.KEYID = 1
8,603,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,059 UART: [ldev] --
10,414,685 UART: [fwproc] Wait for Commands...
10,416,561 UART: [fwproc] Recv command 0x46574c44
10,418,613 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,307 >>> mbox cmd response: success
14,274,926 UART: [afmc] ++
14,275,521 UART: [afmc] CDI.KEYID = 6
14,276,435 UART: [afmc] SUBJECT.KEYID = 7
14,277,665 UART: [afmc] AUTHORITY.KEYID = 5
16,805,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,928 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,252 UART: [afmc] --
18,607,812 UART: [cold-reset] --
18,613,347 UART: [state] Locking Datavault
18,619,184 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,880 UART: [state] Locking ICCM
18,623,349 UART: [exit] Launching FMC @ 0x40000130
18,631,743 UART:
18,631,972 UART: Running Caliptra FMC ...
18,633,066 UART:
18,633,245 UART: [state] CFI Enabled
18,689,250 UART: [fht] FMC Alias Private Key: 7
20,454,010 UART: [art] Extend RT PCRs Done
20,455,232 UART: [art] Lock RT PCRs Done
20,456,697 UART: [art] Populate DV Done
20,462,155 UART: [fht] FMC Alias Private Key: 7
20,463,633 UART: [art] Derive CDI
20,464,390 UART: [art] Store in in slot 0x4
20,521,582 UART: [art] Derive Key Pair
20,522,624 UART: [art] Store priv key in slot 0x5
22,985,206 UART: [art] Derive Key Pair - Done
22,998,250 UART: [art] Signing Cert with AUTHO
22,999,552 UART: RITY.KEYID = 7
24,710,386 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,883 UART: [art] PUB.X = 72775E149BF3C026CAB0319C4644000204322C818B330933E522F55EAE4EF52C3D999748DCD27842F35292331F615454
24,719,137 UART: [art] PUB.Y = 2A680CFB676E949CC3962C2051D0DD59B2C90657650FEA26F4D6592C5C11157539DBC6A97276B0BB7FDC3CEF89317D7A
24,726,373 UART: [art] SIG.R = 98CEA503F38350687AE1CBB2468701EB8EED147C0F1B50F6CA67A717CF830D2C25FE6450DE62BE71DEAAF821524BF427
24,733,804 UART: [art] SIG.S = 3BE7DB43CE1EF6D139D5FD7D19AA6B5B97A33DCFDAFE8F2C0FEA6DDC20FA0628947F07B5FBD000BFAA9651C51215BDED
25,713,217 UART: Caliptra RT
25,713,913 UART: [state] CFI Enabled
25,877,676 UART: [rt] RT listening for mailbox commands...
25,880,041 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,910,269 UART: [rt]cmd =0x49444550, len=8
25,912,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
3,382,777 ready_for_fw is high
3,383,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,087,322 >>> mbox cmd response: success
18,384,369 UART:
18,384,767 UART: Running Caliptra FMC ...
18,385,961 UART:
18,386,125 UART: [state] CFI Enabled
18,452,493 UART: [fht] FMC Alias Private Key: 7
20,216,086 UART: [art] Extend RT PCRs Done
20,217,315 UART: [art] Lock RT PCRs Done
20,218,963 UART: [art] Populate DV Done
20,224,388 UART: [fht] FMC Alias Private Key: 7
20,226,044 UART: [art] Derive CDI
20,226,857 UART: [art] Store in in slot 0x4
20,284,819 UART: [art] Derive Key Pair
20,285,860 UART: [art] Store priv key in slot 0x5
22,749,188 UART: [art] Derive Key Pair - Done
22,762,297 UART: [art] Signing Cert with AUTHO
22,763,603 UART: RITY.KEYID = 7
24,475,058 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,564 UART: [art] PUB.X = D843D4B4BD4DC349C58308093C4D4B86B4A4270A1F63D4D697F75FDA06F06ADE8466DFD916C11BD9F5912B3F322E405F
24,483,893 UART: [art] PUB.Y = 451336BA47484F1BC07D7FAD77B3C4085DF1B58011A28E68AB5164609A80DE20BEBACDAF21A8FC08192312AA7B72B9F6
24,491,113 UART: [art] SIG.R = 24688E12E3BFB7E6B74BFC375E74A57AF308F73FA65E66E74B113FAEE41BA7813A3B58FAB14938F8D9399C0205BD4D78
24,498,553 UART: [art] SIG.S = 87D7F31DCC65B2FC7C9F9B2C3D746DE5E38C25204003C764593FE2A49A9A61629530CAFD6F01EDF7139CBC1F4FF6F978
25,476,661 UART: Caliptra RT
25,477,366 UART: [state] CFI Enabled
25,643,672 UART: [rt] RT listening for mailbox commands...
25,646,212 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,676,434 UART: [rt]cmd =0x49444550, len=8
25,678,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,713 writing to cptra_bootfsm_go
192,816 UART:
193,204 UART: Running Caliptra ROM ...
194,365 UART:
603,869 UART: [state] CFI Enabled
615,062 UART: [state] LifecycleState = Unprovisioned
616,906 UART: [state] DebugLocked = No
619,578 UART: [state] WD Timer not started. Device not locked for debugging
622,912 UART: [kat] SHA2-256
801,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,599 UART: [kat] ++
814,139 UART: [kat] sha1
825,800 UART: [kat] SHA2-256
828,816 UART: [kat] SHA2-384
834,738 UART: [kat] SHA2-512-ACC
837,742 UART: [kat] ECC-384
3,280,786 UART: [kat] HMAC-384Kdf
3,292,964 UART: [kat] LMS
3,822,477 UART: [kat] --
3,827,014 UART: [cold-reset] ++
3,828,461 UART: [fht] FHT @ 0x50003400
3,839,297 UART: [idev] ++
3,839,863 UART: [idev] CDI.KEYID = 6
3,840,779 UART: [idev] SUBJECT.KEYID = 7
3,841,895 UART: [idev] UDS.KEYID = 0
3,842,937 ready_for_fw is high
3,843,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,512 UART: [idev] Erasing UDS.KEYID = 0
6,317,436 UART: [idev] Sha1 KeyId Algorithm
6,339,597 UART: [idev] --
6,342,347 UART: [ldev] ++
6,342,920 UART: [ldev] CDI.KEYID = 6
6,343,833 UART: [ldev] SUBJECT.KEYID = 5
6,345,064 UART: [ldev] AUTHORITY.KEYID = 7
6,346,308 UART: [ldev] FE.KEYID = 1
6,355,709 UART: [ldev] Erasing FE.KEYID = 1
8,832,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,794 UART: [ldev] --
10,624,206 UART: [fwproc] Wait for Commands...
10,625,814 UART: [fwproc] Recv command 0x46574c44
10,627,913 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,486,538 >>> mbox cmd response: success
14,490,537 UART: [afmc] ++
14,491,147 UART: [afmc] CDI.KEYID = 6
14,492,034 UART: [afmc] SUBJECT.KEYID = 7
14,493,257 UART: [afmc] AUTHORITY.KEYID = 5
16,995,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,850 UART: [afmc] --
18,789,941 UART: [cold-reset] --
18,792,608 UART: [state] Locking Datavault
18,798,338 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,987 UART: [state] Locking ICCM
18,802,434 UART: [exit] Launching FMC @ 0x40000130
18,810,851 UART:
18,811,089 UART: Running Caliptra FMC ...
18,812,121 UART:
18,812,269 UART: [state] CFI Enabled
18,820,748 UART: [fht] FMC Alias Private Key: 7
20,577,363 UART: [art] Extend RT PCRs Done
20,578,590 UART: [art] Lock RT PCRs Done
20,580,136 UART: [art] Populate DV Done
20,585,609 UART: [fht] FMC Alias Private Key: 7
20,587,205 UART: [art] Derive CDI
20,588,021 UART: [art] Store in in slot 0x4
20,630,957 UART: [art] Derive Key Pair
20,632,002 UART: [art] Store priv key in slot 0x5
23,058,736 UART: [art] Derive Key Pair - Done
23,071,736 UART: [art] Signing Cert with AUTHO
23,073,040 UART: RITY.KEYID = 7
24,778,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,210 UART: [art] PUB.X = BB9364DDF1DEB8CF6164166E833A401BC5877086CC486C9AFC0B062A6261C1BBAF3ECAECD6339D6DBE3F9A2A141C0DCD
24,787,534 UART: [art] PUB.Y = 7F81CE63BAF511F336686E82EC028DE012F0B52D2515BCC941DF514B6116F795A4549F7BFD2136D263C550B6A273330C
24,794,791 UART: [art] SIG.R = 989AFFCAFCE6EFDE685B0E5A42DD47408B41D728BA62ABB12158DC5C45837E8CA954FA64C61814AAA1F6DC3C44E7E34E
24,802,158 UART: [art] SIG.S = 35507993DA4847AB98C286C2D30077601DF8A4258FBBC722B1BCCDF645A65F5BF6A74C375ECCDD25F6C973F0740947C4
25,781,020 UART: Caliptra RT
25,781,732 UART: [state] CFI Enabled
25,898,386 UART: [rt] RT listening for mailbox commands...
25,900,711 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,930,657 UART: [rt]cmd =0x49444550, len=8
25,932,933 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,857 writing to cptra_bootfsm_go
3,693,216 ready_for_fw is high
3,693,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,034 >>> mbox cmd response: success
18,525,581 UART:
18,525,958 UART: Running Caliptra FMC ...
18,527,073 UART:
18,527,234 UART: [state] CFI Enabled
18,535,332 UART: [fht] FMC Alias Private Key: 7
20,292,785 UART: [art] Extend RT PCRs Done
20,294,030 UART: [art] Lock RT PCRs Done
20,295,800 UART: [art] Populate DV Done
20,300,831 UART: [fht] FMC Alias Private Key: 7
20,302,434 UART: [art] Derive CDI
20,303,178 UART: [art] Store in in slot 0x4
20,345,885 UART: [art] Derive Key Pair
20,346,932 UART: [art] Store priv key in slot 0x5
22,774,737 UART: [art] Derive Key Pair - Done
22,787,844 UART: [art] Signing Cert with AUTHO
22,789,149 UART: RITY.KEYID = 7
24,494,750 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,256 UART: [art] PUB.X = E3FD3AAC561A4E5BA1A0A2AC107807CBFFDE0413F4F387B6459564805DC4F8FABE13206CFDB07C94163C5B0D4E3434AC
24,503,606 UART: [art] PUB.Y = EA14AF9CE8337BBC13D8C1C73ED8E4AD99AF7BA59FC3479C6F2F670F68D4ACFEB6F8EFE22BD7D7A3C935995819958A0B
24,510,885 UART: [art] SIG.R = 4540F7AA5E435A29EF16A27D46F524F9C57AC651E5FE0B39A525050CE928D51E3C6AFBB647D06A36F93094158FC01C3A
24,518,266 UART: [art] SIG.S = 7F3D259A2C190C663960CA9E0BE631AAFAEDD449C933AA590DE07B82C486C3231F73ABECB928A60A7A5CAD1B693C79BF
25,497,513 UART: Caliptra RT
25,498,245 UART: [state] CFI Enabled
25,614,829 UART: [rt] RT listening for mailbox commands...
25,617,052 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,647,068 UART: [rt]cmd =0x49444550, len=8
25,649,428 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,623 UART:
192,990 UART: Running Caliptra ROM ...
194,176 UART:
194,335 UART: [state] CFI Enabled
261,633 UART: [state] LifecycleState = Unprovisioned
264,005 UART: [state] DebugLocked = No
266,408 UART: [state] WD Timer not started. Device not locked for debugging
271,316 UART: [kat] SHA2-256
461,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,952 UART: [kat] ++
472,444 UART: [kat] sha1
483,035 UART: [kat] SHA2-256
486,056 UART: [kat] SHA2-384
493,115 UART: [kat] SHA2-512-ACC
495,694 UART: [kat] ECC-384
2,947,194 UART: [kat] HMAC-384Kdf
2,970,732 UART: [kat] LMS
3,502,485 UART: [kat] --
3,507,051 UART: [cold-reset] ++
3,508,486 UART: [fht] FHT @ 0x50003400
3,520,453 UART: [idev] ++
3,521,099 UART: [idev] CDI.KEYID = 6
3,522,131 UART: [idev] SUBJECT.KEYID = 7
3,523,301 UART: [idev] UDS.KEYID = 0
3,524,228 ready_for_fw is high
3,524,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,885 UART: [idev] Erasing UDS.KEYID = 0
6,028,336 UART: [idev] Sha1 KeyId Algorithm
6,049,954 UART: [idev] --
6,056,157 UART: [ldev] ++
6,056,833 UART: [ldev] CDI.KEYID = 6
6,057,717 UART: [ldev] SUBJECT.KEYID = 5
6,058,945 UART: [ldev] AUTHORITY.KEYID = 7
6,060,126 UART: [ldev] FE.KEYID = 1
6,099,458 UART: [ldev] Erasing FE.KEYID = 1
8,603,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,751 UART: [ldev] --
10,413,446 UART: [fwproc] Wait for Commands...
10,415,154 UART: [fwproc] Recv command 0x46574c44
10,417,454 UART: [fwproc] Recv'd Img size: 114084 bytes
13,866,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,542 >>> mbox cmd response: success
14,606,378 UART: [afmc] ++
14,607,090 UART: [afmc] CDI.KEYID = 6
14,608,278 UART: [afmc] SUBJECT.KEYID = 7
14,609,771 UART: [afmc] AUTHORITY.KEYID = 5
17,148,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,957 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,340 UART: [afmc] --
18,966,563 UART: [cold-reset] --
18,971,290 UART: [state] Locking Datavault
18,977,141 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,351 UART: [state] Locking ICCM
18,981,000 UART: [exit] Launching FMC @ 0x40000130
18,989,690 UART:
18,989,925 UART: Running Caliptra FMC ...
18,991,021 UART:
18,991,182 UART: [state] CFI Enabled
19,050,364 UART: [fht] FMC Alias Private Key: 7
20,814,467 UART: [art] Extend RT PCRs Done
20,815,715 UART: [art] Lock RT PCRs Done
20,817,418 UART: [art] Populate DV Done
20,822,771 UART: [fht] FMC Alias Private Key: 7
20,824,474 UART: [art] Derive CDI
20,825,283 UART: [art] Store in in slot 0x4
20,883,461 UART: [art] Derive Key Pair
20,884,502 UART: [art] Store priv key in slot 0x5
23,347,882 UART: [art] Derive Key Pair - Done
23,360,933 UART: [art] Signing Cert with AUTHO
23,362,232 UART: RITY.KEYID = 7
25,073,105 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,611 UART: [art] PUB.X = 38E18E2669784F0D32238D7D6622D160D8C738DA9F9C544E506FB5A46D41BBFBBFBD260CFCB505E305353328C65B0B88
25,081,882 UART: [art] PUB.Y = 505427AFA63A92382532A3FE7BD765DBD873ED2F8833A8B609ACDF8A713410F359AC434B9D3F3B7B111267596AA9CBB9
25,089,186 UART: [art] SIG.R = 59A27B6C16113A6761C45E6B8D65EFB134F031D34F433A3DF5664490C173E8C71067686B14E8FD47E9C7F99DEE3155D5
25,096,503 UART: [art] SIG.S = 89D60762851FA888F361D78007C73B460F794B969450EF607DBB5BF18CB845A6C2E9581C7A2B47C83D5DABB89F44E666
26,075,884 UART: Caliptra RT
26,076,579 UART: [state] CFI Enabled
26,240,237 UART: [rt] RT listening for mailbox commands...
26,242,686 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,273,117 UART: [rt]cmd =0x49444550, len=8
26,275,230 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,439,620 ready_for_fw is high
3,440,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,828 >>> mbox cmd response: success
19,028,234 UART:
19,028,635 UART: Running Caliptra FMC ...
19,029,748 UART:
19,029,904 UART: [state] CFI Enabled
19,095,588 UART: [fht] FMC Alias Private Key: 7
20,859,865 UART: [art] Extend RT PCRs Done
20,861,081 UART: [art] Lock RT PCRs Done
20,862,950 UART: [art] Populate DV Done
20,868,144 UART: [fht] FMC Alias Private Key: 7
20,869,734 UART: [art] Derive CDI
20,870,469 UART: [art] Store in in slot 0x4
20,928,321 UART: [art] Derive Key Pair
20,929,359 UART: [art] Store priv key in slot 0x5
23,392,556 UART: [art] Derive Key Pair - Done
23,405,548 UART: [art] Signing Cert with AUTHO
23,406,875 UART: RITY.KEYID = 7
25,118,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,220 UART: [art] PUB.X = 20759AD6A7A9AD5C3B49AADB7325755731531262E28D61B9D52DDFA85CB9603C9EDE38662A0B60D95E9844539B6E5936
25,127,455 UART: [art] PUB.Y = 308209F9F08E030468CE537D7B2327AFC10554F075AFC6967C5E3E48D2F8A067B6911CFF767A0C8FB365A68D419D40B4
25,134,710 UART: [art] SIG.R = 92B94CC2F4442A9F8ED41CE95D7D4FFAACAD793FC985BE7CCD087A66FDF0E09DBEE349ECCB70BC323453E63DAEEAD034
25,142,141 UART: [art] SIG.S = 51771AD41CF6BCE0B1C5854605A928C493F1432723C35A8B00560EDE92ABCD5B129752DABC9B535AB66A56D2DEDB3077
26,120,475 UART: Caliptra RT
26,121,169 UART: [state] CFI Enabled
26,287,962 UART: [rt] RT listening for mailbox commands...
26,290,320 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,320,554 UART: [rt]cmd =0x49444550, len=8
26,322,844 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
193,035 UART:
193,408 UART: Running Caliptra ROM ...
194,535 UART:
604,129 UART: [state] CFI Enabled
617,624 UART: [state] LifecycleState = Unprovisioned
620,003 UART: [state] DebugLocked = No
622,751 UART: [state] WD Timer not started. Device not locked for debugging
627,993 UART: [kat] SHA2-256
817,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,678 UART: [kat] ++
829,284 UART: [kat] sha1
840,658 UART: [kat] SHA2-256
843,691 UART: [kat] SHA2-384
849,403 UART: [kat] SHA2-512-ACC
851,980 UART: [kat] ECC-384
3,293,403 UART: [kat] HMAC-384Kdf
3,306,066 UART: [kat] LMS
3,837,859 UART: [kat] --
3,841,807 UART: [cold-reset] ++
3,843,033 UART: [fht] FHT @ 0x50003400
3,854,559 UART: [idev] ++
3,855,232 UART: [idev] CDI.KEYID = 6
3,856,116 UART: [idev] SUBJECT.KEYID = 7
3,857,360 UART: [idev] UDS.KEYID = 0
3,858,264 ready_for_fw is high
3,858,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,672 UART: [idev] Erasing UDS.KEYID = 0
6,336,141 UART: [idev] Sha1 KeyId Algorithm
6,359,599 UART: [idev] --
6,363,599 UART: [ldev] ++
6,364,281 UART: [ldev] CDI.KEYID = 6
6,365,165 UART: [ldev] SUBJECT.KEYID = 5
6,366,376 UART: [ldev] AUTHORITY.KEYID = 7
6,367,613 UART: [ldev] FE.KEYID = 1
6,378,557 UART: [ldev] Erasing FE.KEYID = 1
8,854,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,847 UART: [ldev] --
10,646,841 UART: [fwproc] Wait for Commands...
10,649,428 UART: [fwproc] Recv command 0x46574c44
10,651,728 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,839,049 >>> mbox cmd response: success
14,842,319 UART: [afmc] ++
14,843,084 UART: [afmc] CDI.KEYID = 6
14,844,284 UART: [afmc] SUBJECT.KEYID = 7
14,845,727 UART: [afmc] AUTHORITY.KEYID = 5
17,350,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,193 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,587 UART: [afmc] --
19,143,247 UART: [cold-reset] --
19,145,734 UART: [state] Locking Datavault
19,149,655 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,867 UART: [state] Locking ICCM
19,153,270 UART: [exit] Launching FMC @ 0x40000130
19,161,906 UART:
19,162,147 UART: Running Caliptra FMC ...
19,163,253 UART:
19,163,415 UART: [state] CFI Enabled
19,171,570 UART: [fht] FMC Alias Private Key: 7
20,929,005 UART: [art] Extend RT PCRs Done
20,930,225 UART: [art] Lock RT PCRs Done
20,931,621 UART: [art] Populate DV Done
20,937,147 UART: [fht] FMC Alias Private Key: 7
20,938,681 UART: [art] Derive CDI
20,939,413 UART: [art] Store in in slot 0x4
20,982,385 UART: [art] Derive Key Pair
20,983,443 UART: [art] Store priv key in slot 0x5
23,410,005 UART: [art] Derive Key Pair - Done
23,423,220 UART: [art] Signing Cert with AUTHO
23,424,520 UART: RITY.KEYID = 7
25,129,936 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,441 UART: [art] PUB.X = 5DFA16D036A1E1070DD371801A004A58BEAA55FA97BE91F837F88A58760904480727C300A751CD306986621468C9C1F9
25,138,655 UART: [art] PUB.Y = C95D6DFD36E9AE0F2ACCBA1DC10BE491B0ACB7EC1FB04D03F50B18660FFCE2D9AD892FAA7BF7C1D06572226B31740BE2
25,145,918 UART: [art] SIG.R = C5AE5BB16B9BC4B34205703E6BF25407823B0CD171ABB20742E5F46B65FD27DA32ADA14AD0D7DB5FE055F55DD37E9B5A
25,153,342 UART: [art] SIG.S = 6F822E75BC3716F7DAB8255A11DB441F5FF1A83E11AE97BA6539F7DFF6F07012F7A0866E5AFD3F900DFA726B8E299ABC
26,131,838 UART: Caliptra RT
26,132,529 UART: [state] CFI Enabled
26,250,037 UART: [rt] RT listening for mailbox commands...
26,252,390 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,281,954 UART: [rt]cmd =0x49444550, len=8
26,284,070 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
3,757,629 ready_for_fw is high
3,758,266 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,990 >>> mbox cmd response: success
19,217,095 UART:
19,217,495 UART: Running Caliptra FMC ...
19,218,638 UART:
19,218,802 UART: [state] CFI Enabled
19,226,806 UART: [fht] FMC Alias Private Key: 7
20,983,693 UART: [art] Extend RT PCRs Done
20,984,911 UART: [art] Lock RT PCRs Done
20,986,646 UART: [art] Populate DV Done
20,992,062 UART: [fht] FMC Alias Private Key: 7
20,993,540 UART: [art] Derive CDI
20,994,476 UART: [art] Store in in slot 0x4
21,037,024 UART: [art] Derive Key Pair
21,038,037 UART: [art] Store priv key in slot 0x5
23,465,228 UART: [art] Derive Key Pair - Done
23,478,338 UART: [art] Signing Cert with AUTHO
23,479,704 UART: RITY.KEYID = 7
25,185,139 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,636 UART: [art] PUB.X = EA5ACA8418A806C82DA5265C7DE2905FF3AB4827BD2E015B4BCC420E3C1B9761E67C19DAA392BF84ED53DFD2C874A932
25,193,928 UART: [art] PUB.Y = 0F42E4CB926775C13A7F45F42DFD1D58ED65C36492439576FCD13768E44B50E2DAFB810F9537C567D144E5AC6E38839B
25,201,220 UART: [art] SIG.R = D89DDCFD91086762C80ECBBEC990C8C49C85A805C80363B2E13452E87DD323769F79D39FB75618E5C765E4125EAF9CEB
25,208,613 UART: [art] SIG.S = 579A0D12331C6BAD56B86EF35A8C407CC36F6F644FC211DB1AEF2C943E853B87B0EE4A676F9CD385A2D92045C10F478B
26,187,778 UART: Caliptra RT
26,188,496 UART: [state] CFI Enabled
26,304,772 UART: [rt] RT listening for mailbox commands...
26,307,110 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,337,176 UART: [rt]cmd =0x49444550, len=8
26,339,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,345 UART: [kat] SHA2-256
892,283 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,394 UART: [kat] HMAC-384Kdf
906,940 UART: [kat] LMS
1,475,136 UART: [kat] --
1,476,177 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 ready_for_fw is high
1,480,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,439 UART: [ldev] Erasing FE.KEYID = 1
1,546,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,756 UART: [ldev] --
1,586,235 UART: [fwproc] Waiting for Commands...
1,587,060 UART: [fwproc] Received command 0x46574c44
1,587,851 UART: [fwproc] Received Image of size 114084 bytes
2,883,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,137 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,078 >>> mbox cmd response: success
3,076,278 UART: [afmc] ++
3,076,446 UART: [afmc] CDI.KEYID = 6
3,076,808 UART: [afmc] SUBJECT.KEYID = 7
3,077,233 UART: [afmc] AUTHORITY.KEYID = 5
3,112,226 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,085 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,775 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,624 UART: [afmc] --
3,155,558 UART: [cold-reset] --
3,156,366 UART: [state] Locking Datavault
3,157,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,101 UART: [state] Locking ICCM
3,158,651 UART: [exit] Launching FMC @ 0x40000130
3,163,980 UART:
3,163,996 UART: Running Caliptra FMC ...
3,164,404 UART:
3,164,458 UART: [state] CFI Enabled
3,175,123 UART: [fht] FMC Alias Private Key: 7
3,283,038 UART: [art] Extend RT PCRs Done
3,283,466 UART: [art] Lock RT PCRs Done
3,284,946 UART: [art] Populate DV Done
3,293,281 UART: [fht] FMC Alias Private Key: 7
3,294,363 UART: [art] Derive CDI
3,294,643 UART: [art] Store in in slot 0x4
3,380,532 UART: [art] Derive Key Pair
3,380,892 UART: [art] Store priv key in slot 0x5
3,393,442 UART: [art] Derive Key Pair - Done
3,408,010 UART: [art] Signing Cert with AUTHO
3,408,490 UART: RITY.KEYID = 7
3,423,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,151 UART: [art] PUB.X = B0E098D892D177A02D5860924BCAFCB968B7E944664FB4AAC1A172BBE7CCE80AB74163D78AB00CF29809549986687204
3,430,913 UART: [art] PUB.Y = 5D944425098D1EC421D5B0532524E9F328D4AB0CC8AEE562019C93E3BA67CFD5782977F9EA07AC90B37411043A6483AD
3,437,850 UART: [art] SIG.R = 45F1F0DE8E9FF967F837FBCBC7E3DF0E3604B8CA57734B8CF4CB762B04D1CBE3FA2E7913DDC2779FA3133A2FBA16F930
3,444,635 UART: [art] SIG.S = F6E22A2B219DBFBB26B3C971C1BE2427E19F3D9141EEEB4C683A5CFA55F7D946B273B310E4564F2DF619590E2CA58563
3,468,447 UART: Caliptra RT
3,468,700 UART: [state] CFI Enabled
3,576,707 UART: [rt] RT listening for mailbox commands...
3,577,377 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,245 UART: [rt]cmd =0x49444550, len=8
3,609,144 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,233 ready_for_fw is high
1,362,233 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,734 >>> mbox cmd response: success
2,984,966 UART:
2,984,982 UART: Running Caliptra FMC ...
2,985,390 UART:
2,985,444 UART: [state] CFI Enabled
2,995,963 UART: [fht] FMC Alias Private Key: 7
3,103,486 UART: [art] Extend RT PCRs Done
3,103,914 UART: [art] Lock RT PCRs Done
3,105,808 UART: [art] Populate DV Done
3,114,031 UART: [fht] FMC Alias Private Key: 7
3,115,089 UART: [art] Derive CDI
3,115,369 UART: [art] Store in in slot 0x4
3,200,970 UART: [art] Derive Key Pair
3,201,330 UART: [art] Store priv key in slot 0x5
3,213,960 UART: [art] Derive Key Pair - Done
3,228,954 UART: [art] Signing Cert with AUTHO
3,229,434 UART: RITY.KEYID = 7
3,245,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,883 UART: [art] PUB.X = 05841A6C806BDE88C2A9D998FAF7FE121D4F37657078EC5D1D378FD6920FF9997B436CB3C333DDA728437847588DC6A1
3,252,651 UART: [art] PUB.Y = A48F3C54900066CE853CDA277283A21867707FEDC2BBF124AF00B416FA7B69BF5C91549D75384A27D2A3A798A32DCF26
3,259,563 UART: [art] SIG.R = 3E406101BA333AC1C5574C15763595B71F03601D3003B4D9E8C9376DCAB45DB28588583B845B5F5C17D10355B9122ED3
3,266,315 UART: [art] SIG.S = 02BFE1CF05F3420190DFC7D8D468C97C050D5746F34E38E19763AB181A5AE1658CA01C0CBCC837BA7559B580BCF3CA8C
3,290,482 UART: Caliptra RT
3,290,735 UART: [state] CFI Enabled
3,399,417 UART: [rt] RT listening for mailbox commands...
3,400,087 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,885 UART: [rt]cmd =0x49444550, len=8
3,431,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,276 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,828 UART: [kat] SHA2-256
881,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,874 UART: [kat] ++
886,026 UART: [kat] sha1
890,360 UART: [kat] SHA2-256
892,298 UART: [kat] SHA2-384
894,953 UART: [kat] SHA2-512-ACC
896,854 UART: [kat] ECC-384
902,661 UART: [kat] HMAC-384Kdf
907,153 UART: [kat] LMS
1,475,349 UART: [kat] --
1,476,090 UART: [cold-reset] ++
1,476,442 UART: [fht] Storing FHT @ 0x50003400
1,479,321 UART: [idev] ++
1,479,489 UART: [idev] CDI.KEYID = 6
1,479,849 UART: [idev] SUBJECT.KEYID = 7
1,480,273 UART: [idev] UDS.KEYID = 0
1,480,618 ready_for_fw is high
1,480,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,359 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,522,104 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,027 UART: [ldev] --
1,586,368 UART: [fwproc] Waiting for Commands...
1,587,101 UART: [fwproc] Received command 0x46574c44
1,587,892 UART: [fwproc] Received Image of size 114084 bytes
2,883,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,069 >>> mbox cmd response: success
3,077,107 UART: [afmc] ++
3,077,275 UART: [afmc] CDI.KEYID = 6
3,077,637 UART: [afmc] SUBJECT.KEYID = 7
3,078,062 UART: [afmc] AUTHORITY.KEYID = 5
3,113,637 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,462 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,152 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,997 UART: [afmc] --
3,156,927 UART: [cold-reset] --
3,158,007 UART: [state] Locking Datavault
3,159,184 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,788 UART: [state] Locking ICCM
3,160,284 UART: [exit] Launching FMC @ 0x40000130
3,165,613 UART:
3,165,629 UART: Running Caliptra FMC ...
3,166,037 UART:
3,166,180 UART: [state] CFI Enabled
3,176,619 UART: [fht] FMC Alias Private Key: 7
3,283,838 UART: [art] Extend RT PCRs Done
3,284,266 UART: [art] Lock RT PCRs Done
3,285,784 UART: [art] Populate DV Done
3,294,169 UART: [fht] FMC Alias Private Key: 7
3,295,321 UART: [art] Derive CDI
3,295,601 UART: [art] Store in in slot 0x4
3,381,062 UART: [art] Derive Key Pair
3,381,422 UART: [art] Store priv key in slot 0x5
3,394,464 UART: [art] Derive Key Pair - Done
3,409,387 UART: [art] Signing Cert with AUTHO
3,409,867 UART: RITY.KEYID = 7
3,424,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,632 UART: [art] PUB.X = 2A9649574268D1225AE1309A34FA29DC8B26B5B9E91C10567ADDE32894058C0348FD95C530F0C70B99DAAFE13ECAFA8E
3,432,403 UART: [art] PUB.Y = E0CD33CCF89984D1151C408F4EAB8F1BAA11469EDADD0B6E9022BA70313B499CB94AFEC21A364612614BA4A14D51C2D8
3,439,366 UART: [art] SIG.R = 5C2AE5F92F412B0951616B9A58A8FF09B6B0A566D59C110B6E09261F279097D70B3966CE78D0881F3933436B67FD9F6E
3,446,119 UART: [art] SIG.S = FEFA49015FD1C00507C1134F846AEFBDA8DE8F11FE337BC0551C1B41C0B8675033709058B46C9AE90D8A0AA7FCED1C69
3,469,965 UART: Caliptra RT
3,470,310 UART: [state] CFI Enabled
3,578,305 UART: [rt] RT listening for mailbox commands...
3,578,975 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,701 UART: [rt]cmd =0x49444550, len=8
3,610,560 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 ready_for_fw is high
1,362,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,455 >>> mbox cmd response: success
2,986,071 UART:
2,986,087 UART: Running Caliptra FMC ...
2,986,495 UART:
2,986,638 UART: [state] CFI Enabled
2,997,223 UART: [fht] FMC Alias Private Key: 7
3,104,976 UART: [art] Extend RT PCRs Done
3,105,404 UART: [art] Lock RT PCRs Done
3,107,180 UART: [art] Populate DV Done
3,115,493 UART: [fht] FMC Alias Private Key: 7
3,116,671 UART: [art] Derive CDI
3,116,951 UART: [art] Store in in slot 0x4
3,202,512 UART: [art] Derive Key Pair
3,202,872 UART: [art] Store priv key in slot 0x5
3,216,370 UART: [art] Derive Key Pair - Done
3,231,120 UART: [art] Signing Cert with AUTHO
3,231,600 UART: RITY.KEYID = 7
3,246,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,059 UART: [art] PUB.X = A0C22C4064555D0C44F342F180612C1188D570D37F064CE5D6EF5B48B25D28C5BEE6972F08DF439F3166C6A888AE52A6
3,253,822 UART: [art] PUB.Y = 4A47347F19959912D592081A1567DE477DC7414FE0C8C8D44D447B683FC7D01C94F822E9E161A465E895E3F995AD083E
3,260,762 UART: [art] SIG.R = 1AAEC53F4657FE68E0A7DFEDFEB6A27D093EB6037FBE4E3CE359C894F927EAD7490529B5BFA73790961F52CA9EA50E96
3,267,540 UART: [art] SIG.S = AA7C52007C4819F11DBC22295BA0777A9E230EFA8901E50238C54A65E7028A2DEF074DFDB1C925E3CA38DC98AB6BB4BD
3,291,572 UART: Caliptra RT
3,291,917 UART: [state] CFI Enabled
3,400,028 UART: [rt] RT listening for mailbox commands...
3,400,698 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,908 UART: [rt]cmd =0x49444550, len=8
3,432,783 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,690 UART: [kat] LMS
1,171,018 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,511 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 ready_for_fw is high
1,176,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,326 UART: [idev] Erasing UDS.KEYID = 0
1,201,397 UART: [idev] Sha1 KeyId Algorithm
1,209,825 UART: [idev] --
1,210,927 UART: [ldev] ++
1,211,095 UART: [ldev] CDI.KEYID = 6
1,211,458 UART: [ldev] SUBJECT.KEYID = 5
1,211,884 UART: [ldev] AUTHORITY.KEYID = 7
1,212,347 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,244,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,203 UART: [ldev] --
1,284,692 UART: [fwproc] Wait for Commands...
1,285,386 UART: [fwproc] Recv command 0x46574c44
1,286,114 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,227 >>> mbox cmd response: success
2,774,485 UART: [afmc] ++
2,774,653 UART: [afmc] CDI.KEYID = 6
2,775,015 UART: [afmc] SUBJECT.KEYID = 7
2,775,440 UART: [afmc] AUTHORITY.KEYID = 5
2,810,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,648 UART: [afmc] --
2,854,632 UART: [cold-reset] --
2,855,434 UART: [state] Locking Datavault
2,856,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,119 UART: [state] Locking ICCM
2,857,569 UART: [exit] Launching FMC @ 0x40000130
2,862,898 UART:
2,862,914 UART: Running Caliptra FMC ...
2,863,322 UART:
2,863,376 UART: [state] CFI Enabled
2,873,605 UART: [fht] FMC Alias Private Key: 7
2,981,366 UART: [art] Extend RT PCRs Done
2,981,794 UART: [art] Lock RT PCRs Done
2,983,066 UART: [art] Populate DV Done
2,991,281 UART: [fht] FMC Alias Private Key: 7
2,992,333 UART: [art] Derive CDI
2,992,613 UART: [art] Store in in slot 0x4
3,078,520 UART: [art] Derive Key Pair
3,078,880 UART: [art] Store priv key in slot 0x5
3,091,784 UART: [art] Derive Key Pair - Done
3,106,302 UART: [art] Signing Cert with AUTHO
3,106,782 UART: RITY.KEYID = 7
3,121,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,611 UART: [art] PUB.X = 09BA8F747CF86D9175A1A6E809967B691ED73DCF43ACFF8081AF3836400837017AE6992E6F44A2093D28939E04C41C85
3,129,361 UART: [art] PUB.Y = F6BA9FFA6D16B529A134E7946DE93F5C5BCDDF3743A878026B90E9B663FAA955309B5BCD839E92FA0BB01B7095EACA57
3,136,323 UART: [art] SIG.R = C76176396069C584DFC7A3A6E0E8B744A0724FD95BE54A4DFE978D07CABBE723BEDDBC7004CE9D4CC70AC294461884A1
3,143,100 UART: [art] SIG.S = B2C98C7D2C75C3A46FB2B3481BFAA69BECA69DC1DAF4154A460CD30F61F469643F0B14EE8C39D46E0D884EA5E7CB59F7
3,166,431 UART: Caliptra RT
3,166,684 UART: [state] CFI Enabled
3,274,230 UART: [rt] RT listening for mailbox commands...
3,274,900 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,790 UART: [rt]cmd =0x49444550, len=8
3,306,813 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,077 ready_for_fw is high
1,061,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,118 >>> mbox cmd response: success
2,685,050 UART:
2,685,066 UART: Running Caliptra FMC ...
2,685,474 UART:
2,685,528 UART: [state] CFI Enabled
2,695,933 UART: [fht] FMC Alias Private Key: 7
2,804,022 UART: [art] Extend RT PCRs Done
2,804,450 UART: [art] Lock RT PCRs Done
2,805,924 UART: [art] Populate DV Done
2,814,179 UART: [fht] FMC Alias Private Key: 7
2,815,261 UART: [art] Derive CDI
2,815,541 UART: [art] Store in in slot 0x4
2,901,024 UART: [art] Derive Key Pair
2,901,384 UART: [art] Store priv key in slot 0x5
2,914,618 UART: [art] Derive Key Pair - Done
2,929,625 UART: [art] Signing Cert with AUTHO
2,930,105 UART: RITY.KEYID = 7
2,945,647 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,412 UART: [art] PUB.X = C80A4ECF5098DAF5C800B3B943192B9051C067E808F9291CB78330DDE1D61C78B32A307F92A80EA84629843495728F0E
2,953,146 UART: [art] PUB.Y = CE5EF784AB8A45FD1B578BA49A5CBDDCEB7ECC210F364E6158FF5A8DC4FAB8EF66E07FAD07F64711E98B60110FF42320
2,960,113 UART: [art] SIG.R = B0F760F04B85F73CD42F39E2FBB8D128615C1BCD04E24B5A3C478F667087EB19DF54627E327DDC08E27264C323CD312C
2,966,885 UART: [art] SIG.S = EB8C0AED90028E62EFF7CCC500205C8AE18BC8D76B27903F12118D8AA87D4C2BA3200999A20753EF860B4E8EFB457EFA
2,990,831 UART: Caliptra RT
2,991,084 UART: [state] CFI Enabled
3,098,962 UART: [rt] RT listening for mailbox commands...
3,099,632 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,674 UART: [rt]cmd =0x49444550, len=8
3,131,421 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
87,269 UART: [kat] SHA2-256
892,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,044 UART: [kat] ++
897,196 UART: [kat] sha1
901,352 UART: [kat] SHA2-256
903,292 UART: [kat] SHA2-384
905,969 UART: [kat] SHA2-512-ACC
907,870 UART: [kat] ECC-384
917,659 UART: [kat] HMAC-384Kdf
922,255 UART: [kat] LMS
1,170,583 UART: [kat] --
1,171,350 UART: [cold-reset] ++
1,171,892 UART: [fht] FHT @ 0x50003400
1,174,623 UART: [idev] ++
1,174,791 UART: [idev] CDI.KEYID = 6
1,175,151 UART: [idev] SUBJECT.KEYID = 7
1,175,575 UART: [idev] UDS.KEYID = 0
1,175,920 ready_for_fw is high
1,175,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,519 UART: [idev] Erasing UDS.KEYID = 0
1,200,648 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,026 UART: [ldev] ++
1,210,194 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,983 UART: [ldev] AUTHORITY.KEYID = 7
1,211,446 UART: [ldev] FE.KEYID = 1
1,216,870 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,498 UART: [ldev] --
1,282,981 UART: [fwproc] Wait for Commands...
1,283,651 UART: [fwproc] Recv command 0x46574c44
1,284,379 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,484 >>> mbox cmd response: success
2,769,646 UART: [afmc] ++
2,769,814 UART: [afmc] CDI.KEYID = 6
2,770,176 UART: [afmc] SUBJECT.KEYID = 7
2,770,601 UART: [afmc] AUTHORITY.KEYID = 5
2,806,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,068 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,501 UART: [afmc] --
2,849,621 UART: [cold-reset] --
2,850,679 UART: [state] Locking Datavault
2,851,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,430 UART: [state] Locking ICCM
2,853,076 UART: [exit] Launching FMC @ 0x40000130
2,858,405 UART:
2,858,421 UART: Running Caliptra FMC ...
2,858,829 UART:
2,858,972 UART: [state] CFI Enabled
2,869,895 UART: [fht] FMC Alias Private Key: 7
2,977,608 UART: [art] Extend RT PCRs Done
2,978,036 UART: [art] Lock RT PCRs Done
2,979,230 UART: [art] Populate DV Done
2,987,469 UART: [fht] FMC Alias Private Key: 7
2,988,475 UART: [art] Derive CDI
2,988,755 UART: [art] Store in in slot 0x4
3,074,266 UART: [art] Derive Key Pair
3,074,626 UART: [art] Store priv key in slot 0x5
3,087,728 UART: [art] Derive Key Pair - Done
3,102,403 UART: [art] Signing Cert with AUTHO
3,102,883 UART: RITY.KEYID = 7
3,117,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,310 UART: [art] PUB.X = C33B7F463DC4C7CC7CADEDAB57148D95F0E3975A0C323A5CCC13EDBFD8E68A8FA66AF8FACB17D4006091DD01E1244D59
3,125,078 UART: [art] PUB.Y = 22A348CD554D04C1077EF20B69A6C47C4A7C0914BE6CD1D20535F658BBA17CABE4FF6F327B620B4C4B76DAF4D4F4C2ED
3,132,030 UART: [art] SIG.R = 904CE232BA7B11DBA030737C70D6EBCA70E1F9C2DAEC5D9F549162CFA56FEDDF6CE1B7583366C5D4DA2763F1834CEC2D
3,138,824 UART: [art] SIG.S = 317EBFE2474B1D99E2B9B341D04E0D2541C729B29C3B49082438A2B5E34507138BA451974ED0DF08B0030AA9CA53EF65
3,162,335 UART: Caliptra RT
3,162,680 UART: [state] CFI Enabled
3,270,249 UART: [rt] RT listening for mailbox commands...
3,270,919 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,943 UART: [rt]cmd =0x49444550, len=8
3,302,910 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,920 ready_for_fw is high
1,060,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,421 >>> mbox cmd response: success
2,688,221 UART:
2,688,237 UART: Running Caliptra FMC ...
2,688,645 UART:
2,688,788 UART: [state] CFI Enabled
2,699,163 UART: [fht] FMC Alias Private Key: 7
2,807,236 UART: [art] Extend RT PCRs Done
2,807,664 UART: [art] Lock RT PCRs Done
2,809,142 UART: [art] Populate DV Done
2,817,491 UART: [fht] FMC Alias Private Key: 7
2,818,485 UART: [art] Derive CDI
2,818,765 UART: [art] Store in in slot 0x4
2,904,672 UART: [art] Derive Key Pair
2,905,032 UART: [art] Store priv key in slot 0x5
2,918,346 UART: [art] Derive Key Pair - Done
2,933,294 UART: [art] Signing Cert with AUTHO
2,933,774 UART: RITY.KEYID = 7
2,949,122 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,887 UART: [art] PUB.X = 49C9053D85ADB67A1426EAD09E9C6613F902F1340F353E4B18F01823AA6DC3046A24835677953FF97E08A3C026019B2E
2,956,635 UART: [art] PUB.Y = 62A21CDBD0D2BF778FFF8877B819F2103A998ABDD67FFAA23191FAAC6B055A6715BE918574E3395270408AEC94C2D2E6
2,963,594 UART: [art] SIG.R = 7D48480BAB4D71CA7585AFCDCD26C3EE08C5F295C52727CD8D58D28D5CB81C4615803F604D7F3320AE8055B70DF065BF
2,970,367 UART: [art] SIG.S = 819FA7D147771EDAD564620CDDD8C87EC184C69A558AB96948AC2572B739227C8F0CF89C8AE23B2C5483E5550AD70401
2,994,429 UART: Caliptra RT
2,994,774 UART: [state] CFI Enabled
3,102,295 UART: [rt] RT listening for mailbox commands...
3,102,965 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,717 UART: [rt]cmd =0x49444550, len=8
3,134,746 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,665 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,174,683 ready_for_fw is high
1,174,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,745 UART: [idev] Erasing UDS.KEYID = 0
1,199,507 UART: [idev] Sha1 KeyId Algorithm
1,208,453 UART: [idev] --
1,209,416 UART: [ldev] ++
1,209,584 UART: [ldev] CDI.KEYID = 6
1,209,948 UART: [ldev] SUBJECT.KEYID = 5
1,210,375 UART: [ldev] AUTHORITY.KEYID = 7
1,210,838 UART: [ldev] FE.KEYID = 1
1,215,922 UART: [ldev] Erasing FE.KEYID = 1
1,242,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,470 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,679 UART: [fwproc] Recv command 0x46574c44
1,283,412 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,007 >>> mbox cmd response: success
2,771,060 UART: [afmc] ++
2,771,228 UART: [afmc] CDI.KEYID = 6
2,771,591 UART: [afmc] SUBJECT.KEYID = 7
2,772,017 UART: [afmc] AUTHORITY.KEYID = 5
2,807,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,329 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,631 UART: [afmc] --
2,850,607 UART: [cold-reset] --
2,851,585 UART: [state] Locking Datavault
2,853,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,622 UART: [state] Locking ICCM
2,854,180 UART: [exit] Launching FMC @ 0x40000130
2,859,509 UART:
2,859,525 UART: Running Caliptra FMC ...
2,859,933 UART:
2,859,987 UART: [state] CFI Enabled
2,870,432 UART: [fht] FMC Alias Private Key: 7
2,977,671 UART: [art] Extend RT PCRs Done
2,978,099 UART: [art] Lock RT PCRs Done
2,979,569 UART: [art] Populate DV Done
2,987,756 UART: [fht] FMC Alias Private Key: 7
2,988,688 UART: [art] Derive CDI
2,988,968 UART: [art] Store in in slot 0x4
3,074,757 UART: [art] Derive Key Pair
3,075,117 UART: [art] Store priv key in slot 0x5
3,088,643 UART: [art] Derive Key Pair - Done
3,103,393 UART: [art] Signing Cert with AUTHO
3,103,873 UART: RITY.KEYID = 7
3,118,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,742 UART: [art] PUB.X = 5140B71705378C0A2FF3FADCE8C3B281909E947EB7AD1833364349DD9852C7101360537C9D2F8D5AB52A50B2158E5DD3
3,126,506 UART: [art] PUB.Y = 2D423927003761F8554B1179F213B05735C35B1546A987CCDD456113E17032EC1145D9161414AA7CFBC8F54730C26CB2
3,133,424 UART: [art] SIG.R = 69BB8861418978CCC9787A8A4C27AC9E55A00BA6DBD6B70DA4111BF91E656640E09D4337D7EA22AB994176912F2D980E
3,140,189 UART: [art] SIG.S = FCF5DD50956FE3B5181C064D095194628C3C85CA4A5D4886E6ED9AEB301ADC04156E0D7987DFB71CA7C1598F32CDDA35
3,163,926 UART: Caliptra RT
3,164,179 UART: [state] CFI Enabled
3,272,608 UART: [rt] RT listening for mailbox commands...
3,273,278 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,280 UART: [rt]cmd =0x49444550, len=8
3,305,183 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,022 ready_for_fw is high
1,056,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,737 >>> mbox cmd response: success
2,680,307 UART:
2,680,323 UART: Running Caliptra FMC ...
2,680,731 UART:
2,680,785 UART: [state] CFI Enabled
2,691,358 UART: [fht] FMC Alias Private Key: 7
2,798,667 UART: [art] Extend RT PCRs Done
2,799,095 UART: [art] Lock RT PCRs Done
2,800,939 UART: [art] Populate DV Done
2,809,240 UART: [fht] FMC Alias Private Key: 7
2,810,258 UART: [art] Derive CDI
2,810,538 UART: [art] Store in in slot 0x4
2,895,775 UART: [art] Derive Key Pair
2,896,135 UART: [art] Store priv key in slot 0x5
2,909,727 UART: [art] Derive Key Pair - Done
2,924,628 UART: [art] Signing Cert with AUTHO
2,925,108 UART: RITY.KEYID = 7
2,940,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,245 UART: [art] PUB.X = CEA744DBB7390CCF1D5AF5ADCD93DE4C63E52B9889820E07DFC969A2A9295A420218B66ED9D5CC3067AA92FFEE33E3AD
2,948,027 UART: [art] PUB.Y = 490590132D9340DB94CEF768120491306604A14E5B5C95621F2699E89FB81593BCCA0A4E26D8D8A082CE695FC941159F
2,954,959 UART: [art] SIG.R = FE140E50DA58495B1F166C343E836656979FB610ACC9F33DD586C1CCC48D47F440017CDCD257E7D3453E521D36125B6E
2,961,727 UART: [art] SIG.S = B45E3ECDF1A859A41078345392CF37BB102A88C12037D4D802942667FA0A3EAA58E1EE3B58ECCB044873179C0B2C4D54
2,985,520 UART: Caliptra RT
2,985,773 UART: [state] CFI Enabled
3,092,979 UART: [rt] RT listening for mailbox commands...
3,093,649 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,607 UART: [rt]cmd =0x49444550, len=8
3,125,424 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,752 UART: [idev] ++
1,173,920 UART: [idev] CDI.KEYID = 6
1,174,281 UART: [idev] SUBJECT.KEYID = 7
1,174,706 UART: [idev] UDS.KEYID = 0
1,175,052 ready_for_fw is high
1,175,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,824 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,431 UART: [ldev] ++
1,209,599 UART: [ldev] CDI.KEYID = 6
1,209,963 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,687 UART: [ldev] --
1,281,997 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,253 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,936 >>> mbox cmd response: success
2,771,167 UART: [afmc] ++
2,771,335 UART: [afmc] CDI.KEYID = 6
2,771,698 UART: [afmc] SUBJECT.KEYID = 7
2,772,124 UART: [afmc] AUTHORITY.KEYID = 5
2,807,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,744 UART: [afmc] --
2,851,792 UART: [cold-reset] --
2,852,514 UART: [state] Locking Datavault
2,853,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,217 UART: [state] Locking ICCM
2,854,833 UART: [exit] Launching FMC @ 0x40000130
2,860,162 UART:
2,860,178 UART: Running Caliptra FMC ...
2,860,586 UART:
2,860,729 UART: [state] CFI Enabled
2,871,510 UART: [fht] FMC Alias Private Key: 7
2,980,061 UART: [art] Extend RT PCRs Done
2,980,489 UART: [art] Lock RT PCRs Done
2,982,145 UART: [art] Populate DV Done
2,990,334 UART: [fht] FMC Alias Private Key: 7
2,991,264 UART: [art] Derive CDI
2,991,544 UART: [art] Store in in slot 0x4
3,077,151 UART: [art] Derive Key Pair
3,077,511 UART: [art] Store priv key in slot 0x5
3,091,413 UART: [art] Derive Key Pair - Done
3,106,307 UART: [art] Signing Cert with AUTHO
3,106,787 UART: RITY.KEYID = 7
3,121,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,636 UART: [art] PUB.X = CDEF7B46364CA8E0A4D7B3CA3F8B84EC2483D5731DFE8BB268F58E1F5FD6781AB994EB30118735870F78D4F66650B2A3
3,129,415 UART: [art] PUB.Y = B9C6156D6EE01794A44B8A7B00AEDBA79A38BA3C19942C1BFB08B4B0BA290FFCE5AD0BBDD7E9CB319989EC9250763512
3,136,354 UART: [art] SIG.R = 09A21342FA016437B61C03A6735E1C11810F16194871F2E8A5D9D30C2A3992057A6B5CC229ED0D85F7DF3EF80B802318
3,143,096 UART: [art] SIG.S = 7838B9D422338586F800D7CEE1B4C11C81A45C5F2A194F06F5879C86B77BFB6D9F3D47A6D3153EA39EA54DE16ED47A2E
3,166,960 UART: Caliptra RT
3,167,305 UART: [state] CFI Enabled
3,276,166 UART: [rt] RT listening for mailbox commands...
3,276,836 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,542 UART: [rt]cmd =0x49444550, len=8
3,308,597 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,991 ready_for_fw is high
1,055,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,500 >>> mbox cmd response: success
2,682,434 UART:
2,682,450 UART: Running Caliptra FMC ...
2,682,858 UART:
2,683,001 UART: [state] CFI Enabled
2,693,620 UART: [fht] FMC Alias Private Key: 7
2,801,861 UART: [art] Extend RT PCRs Done
2,802,289 UART: [art] Lock RT PCRs Done
2,804,021 UART: [art] Populate DV Done
2,812,104 UART: [fht] FMC Alias Private Key: 7
2,813,100 UART: [art] Derive CDI
2,813,380 UART: [art] Store in in slot 0x4
2,898,533 UART: [art] Derive Key Pair
2,898,893 UART: [art] Store priv key in slot 0x5
2,912,227 UART: [art] Derive Key Pair - Done
2,926,971 UART: [art] Signing Cert with AUTHO
2,927,451 UART: RITY.KEYID = 7
2,942,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,234 UART: [art] PUB.X = F3C728A62048B8BAC0CE7925A21A986B48340C9971B1AD39AD03EFF4138D5F1F6A106AF1DDF49534440C1EAED8D5780A
2,950,004 UART: [art] PUB.Y = B957644E3FD244CDB3788D6C989650C03346DD94FF69249437196BFE602A147850951D45813994F6E6661007721D59C4
2,956,935 UART: [art] SIG.R = B1D76C66BEAD7FA7BAB0A4963F4D411B421F73CC518D9F4F9619B9CA185093E04BD31B47EA976964B09AD6872D4D42B4
2,963,717 UART: [art] SIG.S = 8E46DB93BA1536391C7496AA1F047F8E163B8CF95277CA3CE1E256A5F335DF92806658D6544A151D8635BC52DB247768
2,988,263 UART: Caliptra RT
2,988,608 UART: [state] CFI Enabled
3,095,548 UART: [rt] RT listening for mailbox commands...
3,096,218 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,026 UART: [rt]cmd =0x49444550, len=8
3,127,923 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,023 UART:
192,400 UART: Running Caliptra ROM ...
193,580 UART:
193,740 UART: [state] CFI Enabled
264,336 UART: [state] LifecycleState = Unprovisioned
266,315 UART: [state] DebugLocked = No
267,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,502 UART: [kat] SHA2-256
442,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,747 UART: [kat] ++
453,287 UART: [kat] sha1
464,168 UART: [kat] SHA2-256
466,841 UART: [kat] SHA2-384
472,054 UART: [kat] SHA2-512-ACC
474,428 UART: [kat] ECC-384
2,768,541 UART: [kat] HMAC-384Kdf
2,800,666 UART: [kat] LMS
3,991,011 UART: [kat] --
3,994,038 UART: [cold-reset] ++
3,996,334 UART: [fht] Storing FHT @ 0x50003400
4,007,101 UART: [idev] ++
4,007,673 UART: [idev] CDI.KEYID = 6
4,008,592 UART: [idev] SUBJECT.KEYID = 7
4,009,839 UART: [idev] UDS.KEYID = 0
4,010,893 ready_for_fw is high
4,011,098 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,209 UART: [idev] Erasing UDS.KEYID = 0
7,345,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,346 UART: [idev] --
7,370,838 UART: [ldev] ++
7,371,557 UART: [ldev] CDI.KEYID = 6
7,372,548 UART: [ldev] SUBJECT.KEYID = 5
7,373,657 UART: [ldev] AUTHORITY.KEYID = 7
7,374,831 UART: [ldev] FE.KEYID = 1
7,402,137 UART: [ldev] Erasing FE.KEYID = 1
10,734,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,087 UART: [ldev] --
13,096,192 UART: [fwproc] Waiting for Commands...
13,099,044 UART: [fwproc] Received command 0x46574c44
13,101,235 UART: [fwproc] Received Image of size 113760 bytes
17,139,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,212,000 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,280,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,596,536 >>> mbox cmd response: success
17,601,205 UART: [afmc] ++
17,601,804 UART: [afmc] CDI.KEYID = 6
17,602,712 UART: [afmc] SUBJECT.KEYID = 7
17,603,979 UART: [afmc] AUTHORITY.KEYID = 5
20,966,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,263,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,064 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,493 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,314 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,309,763 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,402 UART: [afmc] --
23,336,069 UART: [cold-reset] --
23,339,195 UART: [state] Locking Datavault
23,344,075 UART: [state] Locking PCR0, PCR1 and PCR31
23,345,778 UART: [state] Locking ICCM
23,347,982 UART: [exit] Launching FMC @ 0x40000130
23,356,326 UART:
23,356,560 UART: Running Caliptra FMC ...
23,357,658 UART:
23,357,825 UART: [state] CFI Enabled
23,423,614 UART: [fht] FMC Alias Private Key: 7
25,761,829 UART: [art] Extend RT PCRs Done
25,763,051 UART: [art] Lock RT PCRs Done
25,764,761 UART: [art] Populate DV Done
25,770,225 UART: [fht] FMC Alias Private Key: 7
25,771,721 UART: [art] Derive CDI
25,772,474 UART: [art] Store in in slot 0x4
25,832,172 UART: [art] Derive Key Pair
25,833,193 UART: [art] Store priv key in slot 0x5
29,125,701 UART: [art] Derive Key Pair - Done
29,138,933 UART: [art] Signing Cert with AUTHO
29,140,260 UART: RITY.KEYID = 7
31,426,691 UART: [art] Erasing AUTHORITY.KEYID = 7
31,428,194 UART: [art] PUB.X = 7C52E1FF8D59F4559C002808E64F78C5B1525368DD151A1798DA1276225A9D45151DC63B2163FAB0A41F73DB9C5C95DC
31,435,441 UART: [art] PUB.Y = 96A47A3B17252173143BB3B550483C575F864CAE550272563623A1D2DACD53E3B86E028C58C1879E47B5715564467417
31,442,665 UART: [art] SIG.R = D758DB55B71AD2D960AE2078E3E0B7AE7681C5B5CDAF9C42AB7BB2C16288F26E4C8FF91FE4CFE3E54A790F120DEA2D4B
31,450,045 UART: [art] SIG.S = 328C0497AA369EF0BD00047A2773373F8624F1A70740A392A239378CE678EFBC42A82EB05F7E36D7318DB00B89AD8ACF
32,755,615 UART: Caliptra RT
32,756,328 UART: [state] CFI Enabled
32,917,454 UART: [rt] RT listening for mailbox commands...
32,919,334 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,949,828 UART: [rt]cmd =0x52564348, len=36
32,951,490 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,808,076 ready_for_fw is high
3,808,501 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,862,349 >>> mbox cmd response: success
23,549,480 UART:
23,549,894 UART: Running Caliptra FMC ...
23,551,041 UART:
23,551,211 UART: [state] CFI Enabled
23,614,989 UART: [fht] FMC Alias Private Key: 7
25,952,844 UART: [art] Extend RT PCRs Done
25,954,118 UART: [art] Lock RT PCRs Done
25,955,424 UART: [art] Populate DV Done
25,960,892 UART: [fht] FMC Alias Private Key: 7
25,962,499 UART: [art] Derive CDI
25,963,319 UART: [art] Store in in slot 0x4
26,023,495 UART: [art] Derive Key Pair
26,024,496 UART: [art] Store priv key in slot 0x5
29,317,734 UART: [art] Derive Key Pair - Done
29,330,678 UART: [art] Signing Cert with AUTHO
29,331,976 UART: RITY.KEYID = 7
31,620,192 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,696 UART: [art] PUB.X = 0564256FB5E27053D88963EF5FFDA95C01E918BA8013BB7F7366FFFE7F41C3B2013E96D1889C18C270C89999A7601E54
31,628,965 UART: [art] PUB.Y = 05B70308BC75B42E0F38746E3F69735ACBA196FB2662E2409E566D544BEEA272E4F97E9E76012ED2656C5C088F9BD72B
31,636,201 UART: [art] SIG.R = CD00D0B22D91FBC4D8127C0BC8E27C23ABF77C2D0BBD9E30BCCEF2778A4DFCAFF61E57D4F63F8ABD6928C63BE92CDB68
31,643,614 UART: [art] SIG.S = 9FB0A74CA1BA569EB43155823F01FC17F02A3F88C0484E42E54AE28A90F1074C91934EA4D5DD11481310A91FA44A545B
32,949,073 UART: Caliptra RT
32,949,789 UART: [state] CFI Enabled
33,110,594 UART: [rt] RT listening for mailbox commands...
33,112,485 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,143,332 UART: [rt]cmd =0x52564348, len=36
33,145,104 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,585 writing to cptra_bootfsm_go
192,864 UART:
193,234 UART: Running Caliptra ROM ...
194,426 UART:
604,205 UART: [state] CFI Enabled
618,032 UART: [state] LifecycleState = Unprovisioned
619,915 UART: [state] DebugLocked = No
622,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,572 UART: [kat] SHA2-256
797,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,870 UART: [kat] ++
808,332 UART: [kat] sha1
819,770 UART: [kat] SHA2-256
822,488 UART: [kat] SHA2-384
827,121 UART: [kat] SHA2-512-ACC
829,480 UART: [kat] ECC-384
3,113,378 UART: [kat] HMAC-384Kdf
3,125,767 UART: [kat] LMS
4,315,896 UART: [kat] --
4,318,968 UART: [cold-reset] ++
4,320,004 UART: [fht] Storing FHT @ 0x50003400
4,330,140 UART: [idev] ++
4,330,776 UART: [idev] CDI.KEYID = 6
4,331,686 UART: [idev] SUBJECT.KEYID = 7
4,332,928 UART: [idev] UDS.KEYID = 0
4,333,903 ready_for_fw is high
4,334,093 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,306 UART: [idev] Erasing UDS.KEYID = 0
7,619,860 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,999 UART: [idev] --
7,646,211 UART: [ldev] ++
7,646,833 UART: [ldev] CDI.KEYID = 6
7,647,805 UART: [ldev] SUBJECT.KEYID = 5
7,648,956 UART: [ldev] AUTHORITY.KEYID = 7
7,650,234 UART: [ldev] FE.KEYID = 1
7,660,762 UART: [ldev] Erasing FE.KEYID = 1
10,945,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,474 UART: [ldev] --
13,306,676 UART: [fwproc] Waiting for Commands...
13,309,372 UART: [fwproc] Received command 0x46574c44
13,311,603 UART: [fwproc] Received Image of size 113760 bytes
17,354,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,531 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,005 >>> mbox cmd response: success
17,821,189 UART: [afmc] ++
17,821,782 UART: [afmc] CDI.KEYID = 6
17,822,665 UART: [afmc] SUBJECT.KEYID = 7
17,823,940 UART: [afmc] AUTHORITY.KEYID = 5
21,139,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,435,092 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,449,494 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,464,349 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,763 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,500,143 UART: [afmc] --
23,503,623 UART: [cold-reset] --
23,507,048 UART: [state] Locking Datavault
23,513,326 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,022 UART: [state] Locking ICCM
23,516,936 UART: [exit] Launching FMC @ 0x40000130
23,525,327 UART:
23,525,568 UART: Running Caliptra FMC ...
23,526,589 UART:
23,526,731 UART: [state] CFI Enabled
23,534,664 UART: [fht] FMC Alias Private Key: 7
25,865,677 UART: [art] Extend RT PCRs Done
25,866,893 UART: [art] Lock RT PCRs Done
25,868,650 UART: [art] Populate DV Done
25,873,946 UART: [fht] FMC Alias Private Key: 7
25,875,424 UART: [art] Derive CDI
25,876,172 UART: [art] Store in in slot 0x4
25,918,491 UART: [art] Derive Key Pair
25,919,522 UART: [art] Store priv key in slot 0x5
29,161,398 UART: [art] Derive Key Pair - Done
29,174,118 UART: [art] Signing Cert with AUTHO
29,175,421 UART: RITY.KEYID = 7
31,454,950 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,455 UART: [art] PUB.X = 48CD628A2D62DA8E9F744A452DB41737F93E0EDA9BFC14A1CD02F0C0BE3B791C81185FCEB2D3C8FBB4FF780328ACB055
31,463,721 UART: [art] PUB.Y = EE67D3466DA2771728294A626E7E8DA209D9E331B0086CD38753FC8258C3A0591076C04FC6D47EE7362CCE69EF77E5DD
31,470,970 UART: [art] SIG.R = 93EB563A622110C116C97EE9FF797318D28569FE1D13C092FC204E7E87A000B5D5A8AAA4C378B727759DFAD3075C8192
31,478,336 UART: [art] SIG.S = D7CDF0514F66369A007E117C28B1F85761DF4F4A45598717F0FC499FF1C0850C474907FD681AEF0C809BAD0C93CDD506
32,784,177 UART: Caliptra RT
32,784,890 UART: [state] CFI Enabled
32,902,552 UART: [rt] RT listening for mailbox commands...
32,904,429 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,934,509 UART: [rt]cmd =0x52564348, len=36
32,936,171 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
4,130,536 ready_for_fw is high
4,131,247 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,559 >>> mbox cmd response: success
23,704,689 UART:
23,705,090 UART: Running Caliptra FMC ...
23,706,281 UART:
23,706,452 UART: [state] CFI Enabled
23,714,151 UART: [fht] FMC Alias Private Key: 7
26,045,048 UART: [art] Extend RT PCRs Done
26,046,283 UART: [art] Lock RT PCRs Done
26,048,159 UART: [art] Populate DV Done
26,053,737 UART: [fht] FMC Alias Private Key: 7
26,055,440 UART: [art] Derive CDI
26,056,256 UART: [art] Store in in slot 0x4
26,099,174 UART: [art] Derive Key Pair
26,100,166 UART: [art] Store priv key in slot 0x5
29,342,102 UART: [art] Derive Key Pair - Done
29,355,063 UART: [art] Signing Cert with AUTHO
29,356,388 UART: RITY.KEYID = 7
31,635,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,948 UART: [art] PUB.X = 5AC3444D662C707F4EE876DC2F366B837A9029ED19E89BAD61BDBE0D8A90E6D3DD9E4554220EA9E0A7BF29FDC6CA6B23
31,644,705 UART: [art] PUB.Y = 1C8B7096986C4244A951BA9D9E97E9635AA049DE5419C106DD60DF945B346E1C2AAF3B0B0FD5D9ED3D3D08BAA9D4AD55
31,651,966 UART: [art] SIG.R = B53B282A0C00E588771536805E301F6D1F0EDA0644975D1E6B515AFCFD0AA56A9DEEBB4FB31C2831F662A0F805EEE93E
31,659,360 UART: [art] SIG.S = 2535F214F0A84A195B9151AF45737697D7CDBFB3FE33A7EDA736BE260AEAC83AB694C7AF217C7B267067B624750E2AD1
32,964,164 UART: Caliptra RT
32,964,885 UART: [state] CFI Enabled
33,083,507 UART: [rt] RT listening for mailbox commands...
33,085,401 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,115,527 UART: [rt]cmd =0x52564348, len=36
33,117,287 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,604 UART:
192,972 UART: Running Caliptra ROM ...
194,168 UART:
194,345 UART: [state] CFI Enabled
264,867 UART: [state] LifecycleState = Unprovisioned
266,782 UART: [state] DebugLocked = No
269,094 UART: [state] WD Timer not started. Device not locked for debugging
272,001 UART: [kat] SHA2-256
451,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,668 UART: [kat] ++
463,123 UART: [kat] sha1
472,998 UART: [kat] SHA2-256
476,017 UART: [kat] SHA2-384
483,213 UART: [kat] SHA2-512-ACC
486,145 UART: [kat] ECC-384
2,949,313 UART: [kat] HMAC-384Kdf
2,971,924 UART: [kat] LMS
3,501,336 UART: [kat] --
3,504,270 UART: [cold-reset] ++
3,505,506 UART: [fht] FHT @ 0x50003400
3,515,843 UART: [idev] ++
3,516,409 UART: [idev] CDI.KEYID = 6
3,517,311 UART: [idev] SUBJECT.KEYID = 7
3,518,476 UART: [idev] UDS.KEYID = 0
3,519,519 ready_for_fw is high
3,519,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,171 UART: [idev] Erasing UDS.KEYID = 0
6,025,806 UART: [idev] Sha1 KeyId Algorithm
6,048,684 UART: [idev] --
6,052,686 UART: [ldev] ++
6,053,258 UART: [ldev] CDI.KEYID = 6
6,054,171 UART: [ldev] SUBJECT.KEYID = 5
6,055,323 UART: [ldev] AUTHORITY.KEYID = 7
6,056,609 UART: [ldev] FE.KEYID = 1
6,099,157 UART: [ldev] Erasing FE.KEYID = 1
8,604,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,345 UART: [ldev] --
10,410,712 UART: [fwproc] Wait for Commands...
10,412,650 UART: [fwproc] Recv command 0x46574c44
10,414,740 UART: [fwproc] Recv'd Img size: 114084 bytes
13,817,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,271,990 >>> mbox cmd response: success
14,276,082 UART: [afmc] ++
14,276,686 UART: [afmc] CDI.KEYID = 6
14,277,615 UART: [afmc] SUBJECT.KEYID = 7
14,278,789 UART: [afmc] AUTHORITY.KEYID = 5
16,811,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,723 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,550 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,352 UART: [afmc] --
18,628,470 UART: [cold-reset] --
18,630,610 UART: [state] Locking Datavault
18,635,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,903 UART: [state] Locking ICCM
18,638,351 UART: [exit] Launching FMC @ 0x40000130
18,646,809 UART:
18,647,035 UART: Running Caliptra FMC ...
18,648,135 UART:
18,648,314 UART: [state] CFI Enabled
18,711,277 UART: [fht] FMC Alias Private Key: 7
20,474,947 UART: [art] Extend RT PCRs Done
20,476,173 UART: [art] Lock RT PCRs Done
20,477,502 UART: [art] Populate DV Done
20,483,042 UART: [fht] FMC Alias Private Key: 7
20,484,577 UART: [art] Derive CDI
20,485,387 UART: [art] Store in in slot 0x4
20,544,048 UART: [art] Derive Key Pair
20,545,082 UART: [art] Store priv key in slot 0x5
23,007,976 UART: [art] Derive Key Pair - Done
23,021,080 UART: [art] Signing Cert with AUTHO
23,022,420 UART: RITY.KEYID = 7
24,733,828 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,328 UART: [art] PUB.X = 6E33864197580BE82D2FA5DD59A89779B2EB0D45FB62503DDB26254C2FFE9E89598095BD069B3637AC64F83F15BDC662
24,742,610 UART: [art] PUB.Y = 1B8BD5F3BFD2C92E3B6D4F5BEAAE23B33CEBD5A7A2699E8BDF8B45197FFC7394F998DA06A72A8BE6B513627551A142EE
24,749,894 UART: [art] SIG.R = 24A7835E243375FB0A1971FFB543BBCBAC7338673BB7624A7E6CAC1486176D092A83CCF2BF5BABDA6FCD862A72B9D1BA
24,757,334 UART: [art] SIG.S = 1A123CDB2F9D1E38234A7BF6AD56554C322F22741C61F4DE844F04710A361F49768AF445FCE0D54871B4C0EAEE46E250
25,736,399 UART: Caliptra RT
25,737,098 UART: [state] CFI Enabled
25,900,769 UART: [rt] RT listening for mailbox commands...
25,902,661 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,933,294 UART: [rt]cmd =0x52564348, len=36
25,934,957 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,384,680 ready_for_fw is high
3,385,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,148 >>> mbox cmd response: success
18,345,872 UART:
18,346,282 UART: Running Caliptra FMC ...
18,347,469 UART:
18,347,655 UART: [state] CFI Enabled
18,411,795 UART: [fht] FMC Alias Private Key: 7
20,175,517 UART: [art] Extend RT PCRs Done
20,176,739 UART: [art] Lock RT PCRs Done
20,178,473 UART: [art] Populate DV Done
20,183,937 UART: [fht] FMC Alias Private Key: 7
20,185,475 UART: [art] Derive CDI
20,186,231 UART: [art] Store in in slot 0x4
20,244,030 UART: [art] Derive Key Pair
20,245,067 UART: [art] Store priv key in slot 0x5
22,707,893 UART: [art] Derive Key Pair - Done
22,720,884 UART: [art] Signing Cert with AUTHO
22,722,189 UART: RITY.KEYID = 7
24,433,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,608 UART: [art] PUB.X = 6F0F2E599921F855E4355450959335DA47BABAEB61164B0A14794895874253A90FE45C4B9316F69CD7734E793544C167
24,441,877 UART: [art] PUB.Y = 0D41A94165D0021B1331B61AA3A54A0061E59EE6A70843D27E417B6AA2FDAE74713452F8DEFE0E7FA717F6086679C616
24,449,063 UART: [art] SIG.R = 0F9AA7E8323012CD6A649DE5802E48688A3593781DF865049F467B1E2FF8FA072E9B474E92D77E9D598680540B53263A
24,456,440 UART: [art] SIG.S = AFBE7B9DE97AA691C2A2FF6C220905651F939886168D052D29869AF98118B1985DEC3B2AA448497E8154874948CF7CC3
25,435,432 UART: Caliptra RT
25,436,145 UART: [state] CFI Enabled
25,601,657 UART: [rt] RT listening for mailbox commands...
25,603,548 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,634,144 UART: [rt]cmd =0x52564348, len=36
25,636,377 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
193,039 UART:
193,422 UART: Running Caliptra ROM ...
194,625 UART:
604,324 UART: [state] CFI Enabled
620,041 UART: [state] LifecycleState = Unprovisioned
621,938 UART: [state] DebugLocked = No
624,469 UART: [state] WD Timer not started. Device not locked for debugging
627,520 UART: [kat] SHA2-256
806,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,231 UART: [kat] ++
818,740 UART: [kat] sha1
830,686 UART: [kat] SHA2-256
833,699 UART: [kat] SHA2-384
840,401 UART: [kat] SHA2-512-ACC
843,349 UART: [kat] ECC-384
3,283,009 UART: [kat] HMAC-384Kdf
3,294,620 UART: [kat] LMS
3,824,073 UART: [kat] --
3,827,855 UART: [cold-reset] ++
3,829,506 UART: [fht] FHT @ 0x50003400
3,840,271 UART: [idev] ++
3,840,873 UART: [idev] CDI.KEYID = 6
3,841,944 UART: [idev] SUBJECT.KEYID = 7
3,843,004 UART: [idev] UDS.KEYID = 0
3,843,902 ready_for_fw is high
3,844,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,404 UART: [idev] Erasing UDS.KEYID = 0
6,317,598 UART: [idev] Sha1 KeyId Algorithm
6,339,952 UART: [idev] --
6,343,777 UART: [ldev] ++
6,344,358 UART: [ldev] CDI.KEYID = 6
6,345,272 UART: [ldev] SUBJECT.KEYID = 5
6,346,433 UART: [ldev] AUTHORITY.KEYID = 7
6,347,719 UART: [ldev] FE.KEYID = 1
6,358,585 UART: [ldev] Erasing FE.KEYID = 1
8,831,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,070 UART: [ldev] --
10,625,284 UART: [fwproc] Wait for Commands...
10,627,432 UART: [fwproc] Recv command 0x46574c44
10,629,522 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,506 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,493,813 >>> mbox cmd response: success
14,498,021 UART: [afmc] ++
14,498,804 UART: [afmc] CDI.KEYID = 6
14,499,698 UART: [afmc] SUBJECT.KEYID = 7
14,500,808 UART: [afmc] AUTHORITY.KEYID = 5
17,004,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,902 UART: [afmc] --
18,799,934 UART: [cold-reset] --
18,804,440 UART: [state] Locking Datavault
18,809,096 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,753 UART: [state] Locking ICCM
18,812,801 UART: [exit] Launching FMC @ 0x40000130
18,821,195 UART:
18,821,497 UART: Running Caliptra FMC ...
18,822,614 UART:
18,822,779 UART: [state] CFI Enabled
18,830,668 UART: [fht] FMC Alias Private Key: 7
20,587,610 UART: [art] Extend RT PCRs Done
20,588,815 UART: [art] Lock RT PCRs Done
20,590,490 UART: [art] Populate DV Done
20,595,853 UART: [fht] FMC Alias Private Key: 7
20,597,554 UART: [art] Derive CDI
20,598,295 UART: [art] Store in in slot 0x4
20,641,108 UART: [art] Derive Key Pair
20,642,112 UART: [art] Store priv key in slot 0x5
23,068,901 UART: [art] Derive Key Pair - Done
23,081,745 UART: [art] Signing Cert with AUTHO
23,083,056 UART: RITY.KEYID = 7
24,788,223 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,736 UART: [art] PUB.X = D5D5EB26E39C6E010BF097C7C61BD26D6117CFA3B47B2A1A97C937837B617E9FC1C5F0674C659A67C69AD1640C913ACA
24,797,011 UART: [art] PUB.Y = DD43CB876E243E699AAB44F760E356342674BB510D16288CD02108B962A4180DC831AF7128149D258248F24D4CF09B85
24,804,280 UART: [art] SIG.R = B683D68FEA9F2E12BAD2CED4AAAFF4FECBF4DF01A8D29CB2D36D56BA32F82E5518E39A25B5E3AAEBC2554BD5279DF3CD
24,811,710 UART: [art] SIG.S = AF982B167A169C19B306E1B6F8E5385BBB0ADD29CE96B3A2698B64DDFC1917C14B58510A404895DE990D1348D0CA17BB
25,789,988 UART: Caliptra RT
25,790,699 UART: [state] CFI Enabled
25,907,304 UART: [rt] RT listening for mailbox commands...
25,909,187 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,939,224 UART: [rt]cmd =0x52564348, len=36
25,941,119 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,016 writing to cptra_bootfsm_go
3,697,730 ready_for_fw is high
3,698,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,276,522 >>> mbox cmd response: success
18,528,610 UART:
18,528,991 UART: Running Caliptra FMC ...
18,530,188 UART:
18,530,357 UART: [state] CFI Enabled
18,538,101 UART: [fht] FMC Alias Private Key: 7
20,294,852 UART: [art] Extend RT PCRs Done
20,296,203 UART: [art] Lock RT PCRs Done
20,297,782 UART: [art] Populate DV Done
20,303,035 UART: [fht] FMC Alias Private Key: 7
20,304,746 UART: [art] Derive CDI
20,305,562 UART: [art] Store in in slot 0x4
20,348,372 UART: [art] Derive Key Pair
20,349,372 UART: [art] Store priv key in slot 0x5
22,776,481 UART: [art] Derive Key Pair - Done
22,789,592 UART: [art] Signing Cert with AUTHO
22,790,911 UART: RITY.KEYID = 7
24,496,427 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,913 UART: [art] PUB.X = D3813BC187569DDD47FF36BC757638F8407744ECC42D5484C77C61345DB3AA6A05ED06B8EDBF2A866E98AF53E74F23D5
24,505,181 UART: [art] PUB.Y = 815F5C0451EA9FE36C7383D79DD65128D1D100A3A0F1EABF7F4D78DC0AE83C2DB9ED4A028FB6D22DFC8FC2934D5BF7C4
24,512,470 UART: [art] SIG.R = 2DE817D9F76DEC06E4483C1AA2EDD1F74FAF56AC430B7741BC3434CAC7102102DD828316C97C5A5C54CBE5A92AA38AFB
24,519,906 UART: [art] SIG.S = 56692A586391453DEB5D14948749302B7ECC100DF0D80E1531A3AA9D5BCCBE95AB4920787C9FA91858836239C20819E8
25,498,850 UART: Caliptra RT
25,499,567 UART: [state] CFI Enabled
25,617,222 UART: [rt] RT listening for mailbox commands...
25,619,094 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,649,063 UART: [rt]cmd =0x52564348, len=36
25,650,879 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,332 UART:
192,694 UART: Running Caliptra ROM ...
194,184 UART:
194,342 UART: [state] CFI Enabled
267,054 UART: [state] LifecycleState = Unprovisioned
269,435 UART: [state] DebugLocked = No
272,018 UART: [state] WD Timer not started. Device not locked for debugging
276,492 UART: [kat] SHA2-256
466,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,207 UART: [kat] ++
477,689 UART: [kat] sha1
488,275 UART: [kat] SHA2-256
491,280 UART: [kat] SHA2-384
497,060 UART: [kat] SHA2-512-ACC
499,646 UART: [kat] ECC-384
2,948,219 UART: [kat] HMAC-384Kdf
2,973,455 UART: [kat] LMS
3,505,190 UART: [kat] --
3,508,002 UART: [cold-reset] ++
3,509,871 UART: [fht] FHT @ 0x50003400
3,521,988 UART: [idev] ++
3,522,767 UART: [idev] CDI.KEYID = 6
3,523,658 UART: [idev] SUBJECT.KEYID = 7
3,524,874 UART: [idev] UDS.KEYID = 0
3,525,781 ready_for_fw is high
3,525,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,445 UART: [idev] Erasing UDS.KEYID = 0
6,029,450 UART: [idev] Sha1 KeyId Algorithm
6,052,680 UART: [idev] --
6,058,060 UART: [ldev] ++
6,058,751 UART: [ldev] CDI.KEYID = 6
6,059,690 UART: [ldev] SUBJECT.KEYID = 5
6,060,852 UART: [ldev] AUTHORITY.KEYID = 7
6,062,034 UART: [ldev] FE.KEYID = 1
6,101,308 UART: [ldev] Erasing FE.KEYID = 1
8,609,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,506 UART: [ldev] --
10,415,579 UART: [fwproc] Wait for Commands...
10,418,053 UART: [fwproc] Recv command 0x46574c44
10,420,305 UART: [fwproc] Recv'd Img size: 114084 bytes
13,869,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,690 >>> mbox cmd response: success
14,606,913 UART: [afmc] ++
14,607,623 UART: [afmc] CDI.KEYID = 6
14,608,733 UART: [afmc] SUBJECT.KEYID = 7
14,610,284 UART: [afmc] AUTHORITY.KEYID = 5
17,152,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,623 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,509 UART: [afmc] --
18,951,055 UART: [cold-reset] --
18,954,871 UART: [state] Locking Datavault
18,960,888 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,039 UART: [state] Locking ICCM
18,964,515 UART: [exit] Launching FMC @ 0x40000130
18,973,164 UART:
18,973,393 UART: Running Caliptra FMC ...
18,974,492 UART:
18,974,646 UART: [state] CFI Enabled
19,032,042 UART: [fht] FMC Alias Private Key: 7
20,795,371 UART: [art] Extend RT PCRs Done
20,796,592 UART: [art] Lock RT PCRs Done
20,798,647 UART: [art] Populate DV Done
20,804,276 UART: [fht] FMC Alias Private Key: 7
20,805,862 UART: [art] Derive CDI
20,806,593 UART: [art] Store in in slot 0x4
20,864,067 UART: [art] Derive Key Pair
20,865,109 UART: [art] Store priv key in slot 0x5
23,327,954 UART: [art] Derive Key Pair - Done
23,341,073 UART: [art] Signing Cert with AUTHO
23,342,392 UART: RITY.KEYID = 7
25,053,229 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,743 UART: [art] PUB.X = DDE301E02E9F46C7C290E9D103DE2C95E0EABA756B78C6B90B96C74EB61E55DE3B1EB0BFE9B14A36BAAD75ECCD26D06F
25,062,074 UART: [art] PUB.Y = C651234A42E5EC568E1D286DC40A6595DED161E9F503478FE21D07C62BF1D800891EB643AC40D921738DDA8273670E10
25,069,283 UART: [art] SIG.R = 74EA75E5BBC35A7D45AF7183DDA3F05BEA312257DCA4519D52500589AB8A834ED172E3ED0D5F97C40FD3F908E1668A89
25,076,745 UART: [art] SIG.S = EA8B1A1DDE58219FF70ACE8CEA350CC5D0F971F229148E3AED87635CD0C3969A593B55E96A9EC4B280191329CAC28C88
26,055,686 UART: Caliptra RT
26,056,398 UART: [state] CFI Enabled
26,219,744 UART: [rt] RT listening for mailbox commands...
26,221,641 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,252,132 UART: [rt]cmd =0x52564348, len=36
26,254,013 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,435,538 ready_for_fw is high
3,436,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,733,748 >>> mbox cmd response: success
19,028,101 UART:
19,028,502 UART: Running Caliptra FMC ...
19,029,633 UART:
19,029,793 UART: [state] CFI Enabled
19,091,644 UART: [fht] FMC Alias Private Key: 7
20,855,866 UART: [art] Extend RT PCRs Done
20,857,092 UART: [art] Lock RT PCRs Done
20,858,963 UART: [art] Populate DV Done
20,864,214 UART: [fht] FMC Alias Private Key: 7
20,865,925 UART: [art] Derive CDI
20,866,736 UART: [art] Store in in slot 0x4
20,924,527 UART: [art] Derive Key Pair
20,925,524 UART: [art] Store priv key in slot 0x5
23,388,271 UART: [art] Derive Key Pair - Done
23,401,169 UART: [art] Signing Cert with AUTHO
23,402,474 UART: RITY.KEYID = 7
25,114,800 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,313 UART: [art] PUB.X = 73D7EF0E788CD54CC9D253FB7452F0DB1DD7F7B863F2EA493BFD91CFB70396E80F97A43AE3C5884196EDC386D463878B
25,123,606 UART: [art] PUB.Y = 52D12D1152DB567623FDD8196652AB3648CAF1E441002FD218D2D39164323F6333477B38FA5B71A6AA304E30D51A492D
25,130,837 UART: [art] SIG.R = C79AECEC51827975136686493D538D2CFA17F6EAB2F830D8A617BB81DBF0366694F5B621A3DCD6DD05359D007DE306D8
25,138,180 UART: [art] SIG.S = 34A297FE204E5ECCF3D9F29C84CD8B87B8EF78869F19C55420AC2E7F3F0930C9646AC5667E978C5A5457F7A62DF1F39F
26,117,462 UART: Caliptra RT
26,118,178 UART: [state] CFI Enabled
26,282,979 UART: [rt] RT listening for mailbox commands...
26,284,866 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,315,474 UART: [rt]cmd =0x52564348, len=36
26,317,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
192,983 UART:
193,370 UART: Running Caliptra ROM ...
194,576 UART:
604,302 UART: [state] CFI Enabled
618,750 UART: [state] LifecycleState = Unprovisioned
621,133 UART: [state] DebugLocked = No
623,292 UART: [state] WD Timer not started. Device not locked for debugging
628,532 UART: [kat] SHA2-256
818,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,174 UART: [kat] ++
829,697 UART: [kat] sha1
842,556 UART: [kat] SHA2-256
845,557 UART: [kat] SHA2-384
851,554 UART: [kat] SHA2-512-ACC
854,138 UART: [kat] ECC-384
3,296,070 UART: [kat] HMAC-384Kdf
3,308,599 UART: [kat] LMS
3,840,422 UART: [kat] --
3,845,141 UART: [cold-reset] ++
3,847,439 UART: [fht] FHT @ 0x50003400
3,859,488 UART: [idev] ++
3,860,196 UART: [idev] CDI.KEYID = 6
3,861,148 UART: [idev] SUBJECT.KEYID = 7
3,862,318 UART: [idev] UDS.KEYID = 0
3,863,245 ready_for_fw is high
3,863,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,714 UART: [idev] Erasing UDS.KEYID = 0
6,343,105 UART: [idev] Sha1 KeyId Algorithm
6,365,791 UART: [idev] --
6,372,217 UART: [ldev] ++
6,372,894 UART: [ldev] CDI.KEYID = 6
6,373,776 UART: [ldev] SUBJECT.KEYID = 5
6,374,984 UART: [ldev] AUTHORITY.KEYID = 7
6,376,235 UART: [ldev] FE.KEYID = 1
6,387,127 UART: [ldev] Erasing FE.KEYID = 1
8,868,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,589,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,604,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,278 UART: [ldev] --
10,661,522 UART: [fwproc] Wait for Commands...
10,664,269 UART: [fwproc] Recv command 0x46574c44
10,666,524 UART: [fwproc] Recv'd Img size: 114084 bytes
14,110,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,843,552 >>> mbox cmd response: success
14,847,323 UART: [afmc] ++
14,848,051 UART: [afmc] CDI.KEYID = 6
14,849,169 UART: [afmc] SUBJECT.KEYID = 7
14,850,668 UART: [afmc] AUTHORITY.KEYID = 5
17,353,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,360 UART: [afmc] --
19,149,176 UART: [cold-reset] --
19,153,478 UART: [state] Locking Datavault
19,156,643 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,851 UART: [state] Locking ICCM
19,160,984 UART: [exit] Launching FMC @ 0x40000130
19,169,661 UART:
19,169,918 UART: Running Caliptra FMC ...
19,171,025 UART:
19,171,190 UART: [state] CFI Enabled
19,179,506 UART: [fht] FMC Alias Private Key: 7
20,936,126 UART: [art] Extend RT PCRs Done
20,937,351 UART: [art] Lock RT PCRs Done
20,939,276 UART: [art] Populate DV Done
20,944,739 UART: [fht] FMC Alias Private Key: 7
20,946,335 UART: [art] Derive CDI
20,947,073 UART: [art] Store in in slot 0x4
20,989,611 UART: [art] Derive Key Pair
20,990,649 UART: [art] Store priv key in slot 0x5
23,417,632 UART: [art] Derive Key Pair - Done
23,430,415 UART: [art] Signing Cert with AUTHO
23,431,719 UART: RITY.KEYID = 7
25,137,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,552 UART: [art] PUB.X = 88C31285B29C13E402ADDCDF422DC84CABAFB2C99AD500B60838665F7C4B739E18EF16E44CF950811F2FCB9BB8EA99CC
25,145,781 UART: [art] PUB.Y = 057C9149F94134599FA8A28B4630AA00DD9057C5016B5DCFB8F3E374B5740E8ED7177B0B6F14F131C5416549409F3880
25,153,048 UART: [art] SIG.R = FF812B3FE12BFF6EECD1A86E009C3BC4FE7D051A0BA9042C1D2A9CBF2B6F0A5774603EF47E4C1604C32AD7C4E1432511
25,160,365 UART: [art] SIG.S = E75F0A1C631EAF23F11F468486ABA27CA81FE26567AA19BBADF918F7F8FB634C3CD96B83EED53DEF3CB5809CC1184C13
26,139,067 UART: Caliptra RT
26,139,761 UART: [state] CFI Enabled
26,257,156 UART: [rt] RT listening for mailbox commands...
26,259,039 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,289,065 UART: [rt]cmd =0x52564348, len=36
26,290,721 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
3,755,840 ready_for_fw is high
3,756,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,912 >>> mbox cmd response: success
19,205,927 UART:
19,206,323 UART: Running Caliptra FMC ...
19,207,525 UART:
19,207,701 UART: [state] CFI Enabled
19,215,282 UART: [fht] FMC Alias Private Key: 7
20,972,530 UART: [art] Extend RT PCRs Done
20,973,763 UART: [art] Lock RT PCRs Done
20,975,640 UART: [art] Populate DV Done
20,980,736 UART: [fht] FMC Alias Private Key: 7
20,982,293 UART: [art] Derive CDI
20,983,032 UART: [art] Store in in slot 0x4
21,025,692 UART: [art] Derive Key Pair
21,026,737 UART: [art] Store priv key in slot 0x5
23,453,687 UART: [art] Derive Key Pair - Done
23,466,904 UART: [art] Signing Cert with AUTHO
23,468,206 UART: RITY.KEYID = 7
25,173,828 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,332 UART: [art] PUB.X = FBF47534286484B658A739DCD811C6847BF2B68050C43CD05F9AFDECCF2E2CEC0B66635BBB946552566427A86456A9A5
25,182,574 UART: [art] PUB.Y = 786DCA6AC7722D04F00160A5571E7E78F7F0446D122F64AC37E3D2C0604FABB60E5497D9211A7F58D48332B744643339
25,189,834 UART: [art] SIG.R = D917422199F795F58E939B6D6189783F0AA5B8FB16C83920B4319E8703ED905CBC4F51B0B9899C1A47E03B4FFC905E5E
25,197,235 UART: [art] SIG.S = 081B995E3B0D0FA53DC74894404011C9EC599EB581F08B37EE35A7791809609B902CF4E47542C074102EE68AE3461522
26,176,654 UART: Caliptra RT
26,177,346 UART: [state] CFI Enabled
26,294,581 UART: [rt] RT listening for mailbox commands...
26,296,460 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,326,425 UART: [rt]cmd =0x52564348, len=36
26,328,129 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,191 UART: [kat] SHA2-256
882,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,237 UART: [kat] ++
886,389 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
907,170 UART: [kat] LMS
1,475,366 UART: [kat] --
1,476,209 UART: [cold-reset] ++
1,476,707 UART: [fht] Storing FHT @ 0x50003400
1,479,732 UART: [idev] ++
1,479,900 UART: [idev] CDI.KEYID = 6
1,480,260 UART: [idev] SUBJECT.KEYID = 7
1,480,684 UART: [idev] UDS.KEYID = 0
1,481,029 ready_for_fw is high
1,481,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,582 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,282 UART: [idev] --
1,515,199 UART: [ldev] ++
1,515,367 UART: [ldev] CDI.KEYID = 6
1,515,730 UART: [ldev] SUBJECT.KEYID = 5
1,516,156 UART: [ldev] AUTHORITY.KEYID = 7
1,516,619 UART: [ldev] FE.KEYID = 1
1,522,011 UART: [ldev] Erasing FE.KEYID = 1
1,547,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,252 UART: [ldev] --
1,586,695 UART: [fwproc] Waiting for Commands...
1,587,478 UART: [fwproc] Received command 0x46574c44
1,588,269 UART: [fwproc] Received Image of size 114084 bytes
2,883,781 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,409 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,366 >>> mbox cmd response: success
3,077,616 UART: [afmc] ++
3,077,784 UART: [afmc] CDI.KEYID = 6
3,078,146 UART: [afmc] SUBJECT.KEYID = 7
3,078,571 UART: [afmc] AUTHORITY.KEYID = 5
3,112,958 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,064 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,457 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,147 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,012 UART: [afmc] --
3,156,050 UART: [cold-reset] --
3,156,946 UART: [state] Locking Datavault
3,158,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,715 UART: [state] Locking ICCM
3,159,211 UART: [exit] Launching FMC @ 0x40000130
3,164,540 UART:
3,164,556 UART: Running Caliptra FMC ...
3,164,964 UART:
3,165,018 UART: [state] CFI Enabled
3,175,577 UART: [fht] FMC Alias Private Key: 7
3,283,304 UART: [art] Extend RT PCRs Done
3,283,732 UART: [art] Lock RT PCRs Done
3,285,226 UART: [art] Populate DV Done
3,293,589 UART: [fht] FMC Alias Private Key: 7
3,294,689 UART: [art] Derive CDI
3,294,969 UART: [art] Store in in slot 0x4
3,380,634 UART: [art] Derive Key Pair
3,380,994 UART: [art] Store priv key in slot 0x5
3,394,606 UART: [art] Derive Key Pair - Done
3,409,204 UART: [art] Signing Cert with AUTHO
3,409,684 UART: RITY.KEYID = 7
3,424,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,641 UART: [art] PUB.X = A1D86691A1D2EBC9F3A71E005200FC35B521C4E94B41D7CF617459282930B87F9ECCC6E55E65EB0110E261A5E48611EB
3,432,370 UART: [art] PUB.Y = DB4E5A9EAD01A07EC99B689A70EF78C5D2D9EA2F22712308116EA6DB4F997C44DEC5F46FEA6BFCC8C8B8787B5512D23F
3,439,336 UART: [art] SIG.R = F1C4575D7112FB7DB7A715D8229146A9552442367784D3DC5842348C80DA52DA037D8B502E8B0748DC024A1DB0010752
3,446,083 UART: [art] SIG.S = B822C2063B309A0C707E70DCF92322DF3F8CA8E676E3B33434116ED1D7D395DD208D946ADCAC926132CD1E0E1A8C9E8B
3,470,071 UART: Caliptra RT
3,470,324 UART: [state] CFI Enabled
3,577,382 UART: [rt] RT listening for mailbox commands...
3,578,052 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,844 UART: [rt]cmd =0x52564348, len=36
3,609,123 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,346 >>> mbox cmd response: success
2,984,992 UART:
2,985,008 UART: Running Caliptra FMC ...
2,985,416 UART:
2,985,470 UART: [state] CFI Enabled
2,995,777 UART: [fht] FMC Alias Private Key: 7
3,103,976 UART: [art] Extend RT PCRs Done
3,104,404 UART: [art] Lock RT PCRs Done
3,106,200 UART: [art] Populate DV Done
3,114,601 UART: [fht] FMC Alias Private Key: 7
3,115,537 UART: [art] Derive CDI
3,115,817 UART: [art] Store in in slot 0x4
3,201,528 UART: [art] Derive Key Pair
3,201,888 UART: [art] Store priv key in slot 0x5
3,214,436 UART: [art] Derive Key Pair - Done
3,229,359 UART: [art] Signing Cert with AUTHO
3,229,839 UART: RITY.KEYID = 7
3,244,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,354 UART: [art] PUB.X = FBDC04644D4E146C0C68F5680531E80FFE3F6F9B31B540F47F0692B36C1FCBCE44B3E0402A94B5F128B0089471649B42
3,252,110 UART: [art] PUB.Y = EF8B85CCB5C26F537FCDB0D9F30376BF418DCA660E08036D972DFB5C59C73673B27043F9D3AECD0118A8E2D0D66EE051
3,259,061 UART: [art] SIG.R = 27F79C7758AA650A95BAA8A62C4403A0C9F96D6511A94B52BC9607FF20EB74905A9FC592487DAF4C9649673D62D153CF
3,265,826 UART: [art] SIG.S = 291A83ED4B5ED6FE39BD96E5ACDA5296A6B0B79D97C23C9BDE9A8E6AC36762BA0F25E061874D7BC5547B3FAE05163B0A
3,289,234 UART: Caliptra RT
3,289,487 UART: [state] CFI Enabled
3,396,767 UART: [rt] RT listening for mailbox commands...
3,397,437 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,393 UART: [rt]cmd =0x52564348, len=36
3,428,742 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,522 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,849 UART: [idev] ++
1,480,017 UART: [idev] CDI.KEYID = 6
1,480,377 UART: [idev] SUBJECT.KEYID = 7
1,480,801 UART: [idev] UDS.KEYID = 0
1,481,146 ready_for_fw is high
1,481,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,149 UART: [idev] Erasing UDS.KEYID = 0
1,506,055 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,875 UART: [idev] --
1,515,920 UART: [ldev] ++
1,516,088 UART: [ldev] CDI.KEYID = 6
1,516,451 UART: [ldev] SUBJECT.KEYID = 5
1,516,877 UART: [ldev] AUTHORITY.KEYID = 7
1,517,340 UART: [ldev] FE.KEYID = 1
1,522,706 UART: [ldev] Erasing FE.KEYID = 1
1,548,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,321 UART: [ldev] --
1,587,708 UART: [fwproc] Waiting for Commands...
1,588,345 UART: [fwproc] Received command 0x46574c44
1,589,136 UART: [fwproc] Received Image of size 114084 bytes
2,884,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,345 >>> mbox cmd response: success
3,077,375 UART: [afmc] ++
3,077,543 UART: [afmc] CDI.KEYID = 6
3,077,905 UART: [afmc] SUBJECT.KEYID = 7
3,078,330 UART: [afmc] AUTHORITY.KEYID = 5
3,113,691 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,149 UART: [afmc] --
3,157,279 UART: [cold-reset] --
3,158,127 UART: [state] Locking Datavault
3,159,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,920 UART: [state] Locking ICCM
3,160,506 UART: [exit] Launching FMC @ 0x40000130
3,165,835 UART:
3,165,851 UART: Running Caliptra FMC ...
3,166,259 UART:
3,166,402 UART: [state] CFI Enabled
3,176,873 UART: [fht] FMC Alias Private Key: 7
3,284,372 UART: [art] Extend RT PCRs Done
3,284,800 UART: [art] Lock RT PCRs Done
3,286,492 UART: [art] Populate DV Done
3,294,699 UART: [fht] FMC Alias Private Key: 7
3,295,759 UART: [art] Derive CDI
3,296,039 UART: [art] Store in in slot 0x4
3,381,736 UART: [art] Derive Key Pair
3,382,096 UART: [art] Store priv key in slot 0x5
3,395,334 UART: [art] Derive Key Pair - Done
3,410,040 UART: [art] Signing Cert with AUTHO
3,410,520 UART: RITY.KEYID = 7
3,425,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,217 UART: [art] PUB.X = 57E90002B2DE7E6B11CCBE3B91B8077BB20BD753960F8B76B31AA93A2801824459E66F54844578EF0619E2C9C17010C0
3,432,945 UART: [art] PUB.Y = 105B25B45431CB473DC083E77DFB74E53B61834560A12BB498047477BDAC41F9537F69EE59820DD36FB229518283B914
3,439,883 UART: [art] SIG.R = 8A53060527336E027010582E743F9DFE3B41F95C73B530C4E3856CE9E301E3A2BA9BE4FDF944DEBA581388CB8ADCDD7F
3,446,653 UART: [art] SIG.S = 5384B41438B6CEEA10BBD7998DF2524E23C577A746DEC0543084E7C7AD114EC402D81E1862BC453A94F1925AEC4E1CDB
3,470,541 UART: Caliptra RT
3,470,886 UART: [state] CFI Enabled
3,577,673 UART: [rt] RT listening for mailbox commands...
3,578,343 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,305 UART: [rt]cmd =0x52564348, len=36
3,609,570 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,834 ready_for_fw is high
1,362,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,983 >>> mbox cmd response: success
2,986,623 UART:
2,986,639 UART: Running Caliptra FMC ...
2,987,047 UART:
2,987,190 UART: [state] CFI Enabled
2,997,899 UART: [fht] FMC Alias Private Key: 7
3,106,196 UART: [art] Extend RT PCRs Done
3,106,624 UART: [art] Lock RT PCRs Done
3,108,088 UART: [art] Populate DV Done
3,116,263 UART: [fht] FMC Alias Private Key: 7
3,117,221 UART: [art] Derive CDI
3,117,501 UART: [art] Store in in slot 0x4
3,203,398 UART: [art] Derive Key Pair
3,203,758 UART: [art] Store priv key in slot 0x5
3,216,962 UART: [art] Derive Key Pair - Done
3,231,787 UART: [art] Signing Cert with AUTHO
3,232,267 UART: RITY.KEYID = 7
3,248,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,842 UART: [art] PUB.X = 8A4A8E51E47B8A146D419F6BD55E2CEC10AA28CE5A952B2930B66DF8B38ACE04B832EDD9699EA4D4D3FF2FA0F08D6A90
3,255,631 UART: [art] PUB.Y = 2E43634EE90457AE356028F4B466565F4CC6C04748AECBEF125C7FC2B0A01A528A77735E35AEB86A45F9D2507B5B9800
3,262,560 UART: [art] SIG.R = B83CA815B9274FFBC8C0B999125DD5B80D00D53BDDCB2862ABE984C289015BF5F50E94E339464D83F10D9A5D9DBAAF1F
3,269,314 UART: [art] SIG.S = 83274E4DE58AF5B40B02C6F640F8185200AC7D0B6B6BD8AAB66E1E77507E3F80D72312AF3DCEA9B69016BBB0FF629F74
3,292,998 UART: Caliptra RT
3,293,343 UART: [state] CFI Enabled
3,401,833 UART: [rt] RT listening for mailbox commands...
3,402,503 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,531 UART: [rt]cmd =0x52564348, len=36
3,433,964 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,303 UART: [kat] SHA2-256
904,243 UART: [kat] SHA2-384
907,058 UART: [kat] SHA2-512-ACC
908,959 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
923,022 UART: [kat] LMS
1,171,350 UART: [kat] --
1,172,107 UART: [cold-reset] ++
1,172,645 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,304 UART: [idev] Erasing UDS.KEYID = 0
1,201,161 UART: [idev] Sha1 KeyId Algorithm
1,209,629 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,042 UART: [ldev] SUBJECT.KEYID = 5
1,211,468 UART: [ldev] AUTHORITY.KEYID = 7
1,211,931 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,243,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,914 UART: [fwproc] Wait for Commands...
1,283,736 UART: [fwproc] Recv command 0x46574c44
1,284,464 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,491 >>> mbox cmd response: success
2,772,569 UART: [afmc] ++
2,772,737 UART: [afmc] CDI.KEYID = 6
2,773,099 UART: [afmc] SUBJECT.KEYID = 7
2,773,524 UART: [afmc] AUTHORITY.KEYID = 5
2,808,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,250 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,046 UART: [afmc] --
2,852,088 UART: [cold-reset] --
2,852,972 UART: [state] Locking Datavault
2,853,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,597 UART: [state] Locking ICCM
2,855,191 UART: [exit] Launching FMC @ 0x40000130
2,860,520 UART:
2,860,536 UART: Running Caliptra FMC ...
2,860,944 UART:
2,860,998 UART: [state] CFI Enabled
2,871,541 UART: [fht] FMC Alias Private Key: 7
2,979,544 UART: [art] Extend RT PCRs Done
2,979,972 UART: [art] Lock RT PCRs Done
2,981,720 UART: [art] Populate DV Done
2,990,069 UART: [fht] FMC Alias Private Key: 7
2,991,185 UART: [art] Derive CDI
2,991,465 UART: [art] Store in in slot 0x4
3,077,236 UART: [art] Derive Key Pair
3,077,596 UART: [art] Store priv key in slot 0x5
3,090,910 UART: [art] Derive Key Pair - Done
3,105,579 UART: [art] Signing Cert with AUTHO
3,106,059 UART: RITY.KEYID = 7
3,121,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,302 UART: [art] PUB.X = 3DCF6771C55CD0DDE1B1BFA1BFD503B189DA40E855881633558273FE81C1B957B3F346123EB750F7905E59F559CE4EB0
3,129,077 UART: [art] PUB.Y = 89930EE4CD1CA91937ACE9B98ED6BAF99EC85108534B95D5B7DE82B19DFE0F9DFCDA227DD7FF790B351992D4EB57F539
3,136,035 UART: [art] SIG.R = A3EEDABFC0A0344A4F4C675029E99D865A1AAAB360BAD187A726F348B1C18805F478F9D7F1E98F9103C3396C22E9149D
3,142,809 UART: [art] SIG.S = 280D10EB07009A2C03BCE7A53E4FD8ACA62D89A048E2B45B5919C0404CBBA40978C9A2DD955991395A5943ED5456901D
3,166,748 UART: Caliptra RT
3,167,001 UART: [state] CFI Enabled
3,274,970 UART: [rt] RT listening for mailbox commands...
3,275,640 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,402 UART: [rt]cmd =0x52564348, len=36
3,306,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 ready_for_fw is high
1,060,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,376 >>> mbox cmd response: success
2,685,698 UART:
2,685,714 UART: Running Caliptra FMC ...
2,686,122 UART:
2,686,176 UART: [state] CFI Enabled
2,696,435 UART: [fht] FMC Alias Private Key: 7
2,804,702 UART: [art] Extend RT PCRs Done
2,805,130 UART: [art] Lock RT PCRs Done
2,806,218 UART: [art] Populate DV Done
2,814,721 UART: [fht] FMC Alias Private Key: 7
2,815,883 UART: [art] Derive CDI
2,816,163 UART: [art] Store in in slot 0x4
2,901,746 UART: [art] Derive Key Pair
2,902,106 UART: [art] Store priv key in slot 0x5
2,915,304 UART: [art] Derive Key Pair - Done
2,929,909 UART: [art] Signing Cert with AUTHO
2,930,389 UART: RITY.KEYID = 7
2,945,537 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,302 UART: [art] PUB.X = D3007D31337862911145226DC378C58C81219ECF3B96B868F7F6EE940057675F89B0BEEBDF6B0585FB9242B31A006BCD
2,953,003 UART: [art] PUB.Y = 2BDB2A467DA2E5D18316DD4695861CF840F382C9B293B8377C00E7D69A58FB9B2DF43F7BAB9B541D5AA298EA8CDEFDCF
2,959,953 UART: [art] SIG.R = 9F741A2B9AFC1ED6C94F1E2B2AC1757E7A14D69B59BB47D4BF61D5B3634BF39DB53CAB413236C382F1A3A96FFE9C3BAE
2,966,747 UART: [art] SIG.S = 80E2259346670E2CC93195D8E9A95ED5E35C68C3C4E31C65D8E953C10FE109F2E23E6250EF6029F2A766182BF9AC655A
2,990,951 UART: Caliptra RT
2,991,204 UART: [state] CFI Enabled
3,098,590 UART: [rt] RT listening for mailbox commands...
3,099,260 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,414 UART: [rt]cmd =0x52564348, len=36
3,130,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,182 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
894,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,192 UART: [kat] ++
898,344 UART: [kat] sha1
902,582 UART: [kat] SHA2-256
904,522 UART: [kat] SHA2-384
907,277 UART: [kat] SHA2-512-ACC
909,178 UART: [kat] ECC-384
919,367 UART: [kat] HMAC-384Kdf
924,175 UART: [kat] LMS
1,172,503 UART: [kat] --
1,173,280 UART: [cold-reset] ++
1,173,668 UART: [fht] FHT @ 0x50003400
1,176,151 UART: [idev] ++
1,176,319 UART: [idev] CDI.KEYID = 6
1,176,679 UART: [idev] SUBJECT.KEYID = 7
1,177,103 UART: [idev] UDS.KEYID = 0
1,177,448 ready_for_fw is high
1,177,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,029 UART: [idev] Erasing UDS.KEYID = 0
1,202,102 UART: [idev] Sha1 KeyId Algorithm
1,210,498 UART: [idev] --
1,211,598 UART: [ldev] ++
1,211,766 UART: [ldev] CDI.KEYID = 6
1,212,129 UART: [ldev] SUBJECT.KEYID = 5
1,212,555 UART: [ldev] AUTHORITY.KEYID = 7
1,213,018 UART: [ldev] FE.KEYID = 1
1,218,386 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,180 UART: [ldev] --
1,284,469 UART: [fwproc] Wait for Commands...
1,285,245 UART: [fwproc] Recv command 0x46574c44
1,285,973 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,122 >>> mbox cmd response: success
2,774,158 UART: [afmc] ++
2,774,326 UART: [afmc] CDI.KEYID = 6
2,774,688 UART: [afmc] SUBJECT.KEYID = 7
2,775,113 UART: [afmc] AUTHORITY.KEYID = 5
2,810,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,139 UART: [afmc] --
2,854,245 UART: [cold-reset] --
2,855,219 UART: [state] Locking Datavault
2,856,620 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,224 UART: [state] Locking ICCM
2,857,676 UART: [exit] Launching FMC @ 0x40000130
2,863,005 UART:
2,863,021 UART: Running Caliptra FMC ...
2,863,429 UART:
2,863,572 UART: [state] CFI Enabled
2,874,303 UART: [fht] FMC Alias Private Key: 7
2,982,654 UART: [art] Extend RT PCRs Done
2,983,082 UART: [art] Lock RT PCRs Done
2,984,564 UART: [art] Populate DV Done
2,992,813 UART: [fht] FMC Alias Private Key: 7
2,993,813 UART: [art] Derive CDI
2,994,093 UART: [art] Store in in slot 0x4
3,079,978 UART: [art] Derive Key Pair
3,080,338 UART: [art] Store priv key in slot 0x5
3,093,364 UART: [art] Derive Key Pair - Done
3,108,188 UART: [art] Signing Cert with AUTHO
3,108,668 UART: RITY.KEYID = 7
3,124,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,887 UART: [art] PUB.X = C3AFC902A9F6669F75CDC6AAE29C27BC944B7A9D4FF592DE688F49BC489B1CED699EE2CA7F061E4F85251756A41F80E7
3,131,669 UART: [art] PUB.Y = D0195B5B3B3A923AFE82EBDAACFB69A9538A4BF454041BCB6DE8F07EFF9CDA2A8A6A3CA4627E639789661A7E1D1F3411
3,138,638 UART: [art] SIG.R = 896B0C077D0A8512F1EA930C47FCD9011578E559F8B135708836846BAA62E04386F4A831D4947F713BB7E5C0CB42996A
3,145,389 UART: [art] SIG.S = 7BE1FB456F8D61A9833F2F2C6CE398755FA3838D23471A8D85429AA76A1852BCB12AB54B063C345A5FEF28306DD8C5B7
3,169,083 UART: Caliptra RT
3,169,428 UART: [state] CFI Enabled
3,277,021 UART: [rt] RT listening for mailbox commands...
3,277,691 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,681 UART: [rt]cmd =0x52564348, len=36
3,309,244 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,166 ready_for_fw is high
1,061,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,259 >>> mbox cmd response: success
2,687,513 UART:
2,687,529 UART: Running Caliptra FMC ...
2,687,937 UART:
2,688,080 UART: [state] CFI Enabled
2,698,931 UART: [fht] FMC Alias Private Key: 7
2,807,358 UART: [art] Extend RT PCRs Done
2,807,786 UART: [art] Lock RT PCRs Done
2,809,524 UART: [art] Populate DV Done
2,817,807 UART: [fht] FMC Alias Private Key: 7
2,818,855 UART: [art] Derive CDI
2,819,135 UART: [art] Store in in slot 0x4
2,904,918 UART: [art] Derive Key Pair
2,905,278 UART: [art] Store priv key in slot 0x5
2,918,320 UART: [art] Derive Key Pair - Done
2,933,019 UART: [art] Signing Cert with AUTHO
2,933,499 UART: RITY.KEYID = 7
2,949,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,832 UART: [art] PUB.X = 51696759321C4767491237C8FDD885BE0081C512A26141A05541A3EE02E14BEFF9AECB206CF6D384B59C3F032AE9D4F3
2,956,576 UART: [art] PUB.Y = D430EF8E66FFF9E6843B110FA5D0C6C5D594C91E6916B74759F2D6E72BC5DC9B2D488A0550829C8749B4B81855FCB64D
2,963,528 UART: [art] SIG.R = 299A9275411A1267A3DACBDAB5B883059816869F3A06820C65E41DE7835985DC502E86D031C0B13DCD38F40FB0C6587C
2,970,286 UART: [art] SIG.S = 591858515EE0F7C695877376B0D85135D6994EEBF213E1C0D0E0552291E9BF1C8B843260465F4F460D9F929B879ADF7E
2,993,954 UART: Caliptra RT
2,994,299 UART: [state] CFI Enabled
3,103,250 UART: [rt] RT listening for mailbox commands...
3,103,920 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,540 UART: [rt]cmd =0x52564348, len=36
3,134,645 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,170 UART: [kat] SHA2-512-ACC
906,071 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,234 UART: [kat] LMS
1,168,546 UART: [kat] --
1,169,217 UART: [cold-reset] ++
1,169,663 UART: [fht] FHT @ 0x50003400
1,172,495 UART: [idev] ++
1,172,663 UART: [idev] CDI.KEYID = 6
1,173,024 UART: [idev] SUBJECT.KEYID = 7
1,173,449 UART: [idev] UDS.KEYID = 0
1,173,795 ready_for_fw is high
1,173,795 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,367 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,510 UART: [ldev] --
1,279,826 UART: [fwproc] Wait for Commands...
1,280,439 UART: [fwproc] Recv command 0x46574c44
1,281,172 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,766,653 >>> mbox cmd response: success
2,767,694 UART: [afmc] ++
2,767,862 UART: [afmc] CDI.KEYID = 6
2,768,225 UART: [afmc] SUBJECT.KEYID = 7
2,768,651 UART: [afmc] AUTHORITY.KEYID = 5
2,804,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,850 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,213 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,932 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,713 UART: [afmc] --
2,847,825 UART: [cold-reset] --
2,848,353 UART: [state] Locking Datavault
2,849,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,484 UART: [state] Locking ICCM
2,850,938 UART: [exit] Launching FMC @ 0x40000130
2,856,267 UART:
2,856,283 UART: Running Caliptra FMC ...
2,856,691 UART:
2,856,745 UART: [state] CFI Enabled
2,867,494 UART: [fht] FMC Alias Private Key: 7
2,975,331 UART: [art] Extend RT PCRs Done
2,975,759 UART: [art] Lock RT PCRs Done
2,977,205 UART: [art] Populate DV Done
2,985,330 UART: [fht] FMC Alias Private Key: 7
2,986,272 UART: [art] Derive CDI
2,986,552 UART: [art] Store in in slot 0x4
3,072,113 UART: [art] Derive Key Pair
3,072,473 UART: [art] Store priv key in slot 0x5
3,085,589 UART: [art] Derive Key Pair - Done
3,100,240 UART: [art] Signing Cert with AUTHO
3,100,720 UART: RITY.KEYID = 7
3,115,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,429 UART: [art] PUB.X = CC4A1C9C48D2AD956880EB59B0C64E28A3BB4546D66B2C1ECBA89B18DBC00DB2FD47C88D802AE0C087302A1AE6CBB891
3,123,218 UART: [art] PUB.Y = EB40DD5F34F66774AA4C799959CDE6AADE03410E3AB3D8906C17CCE9529CA082F433A3B4B9FFBF132F63B8CA9F314518
3,130,178 UART: [art] SIG.R = C766710B696812F2D44298C20C7B2129F75BB89574B18C80C8260C27E1FCBF38668BB6D53BC72877452761DD4E967AC8
3,136,935 UART: [art] SIG.S = 691D04D47E797BF2E5EA6BE09263D73F5B8EF40FE7F40EC3E2AD19EA3AB53A9D2D0471803CE20E45D7058A398D7807A1
3,160,735 UART: Caliptra RT
3,160,988 UART: [state] CFI Enabled
3,268,709 UART: [rt] RT listening for mailbox commands...
3,269,379 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,213 UART: [rt]cmd =0x52564348, len=36
3,300,664 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,684 ready_for_fw is high
1,055,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,965 >>> mbox cmd response: success
2,679,265 UART:
2,679,281 UART: Running Caliptra FMC ...
2,679,689 UART:
2,679,743 UART: [state] CFI Enabled
2,690,160 UART: [fht] FMC Alias Private Key: 7
2,797,831 UART: [art] Extend RT PCRs Done
2,798,259 UART: [art] Lock RT PCRs Done
2,799,715 UART: [art] Populate DV Done
2,807,766 UART: [fht] FMC Alias Private Key: 7
2,808,768 UART: [art] Derive CDI
2,809,048 UART: [art] Store in in slot 0x4
2,894,445 UART: [art] Derive Key Pair
2,894,805 UART: [art] Store priv key in slot 0x5
2,907,851 UART: [art] Derive Key Pair - Done
2,922,694 UART: [art] Signing Cert with AUTHO
2,923,174 UART: RITY.KEYID = 7
2,938,344 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,109 UART: [art] PUB.X = 0659C156592E4B0374B579C44648CDE813C1605A7943A4FB1DE4355EA8A9AB787AC07BECF5C4562B3C68F016D673D03C
2,945,877 UART: [art] PUB.Y = 2C0C643B783A89BFADDF870368926B8F575A502C85E822102160C769FB389A41A8F70BB86FD44FB3B21B1F0FF6C5AF4E
2,952,825 UART: [art] SIG.R = D2211F61FAAE5A4992B2DBBC2139A6965EB83B5154624742BED72B8E3342ACA9625DDE8356432A12390522864B6227EF
2,959,592 UART: [art] SIG.S = BF34A05E28AB6248C43ABABA6C354E09FC5BABF47072025C8BDB05D01CF3969D8738FF4303594517FFF10599A0131C57
2,982,836 UART: Caliptra RT
2,983,089 UART: [state] CFI Enabled
3,090,497 UART: [rt] RT listening for mailbox commands...
3,091,167 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,121,123 UART: [rt]cmd =0x52564348, len=36
3,122,400 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
891,273 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,500 UART: [idev] ++
1,173,668 UART: [idev] CDI.KEYID = 6
1,174,029 UART: [idev] SUBJECT.KEYID = 7
1,174,454 UART: [idev] UDS.KEYID = 0
1,174,800 ready_for_fw is high
1,174,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,880 UART: [fwproc] Recv command 0x46574c44
1,283,613 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,410 >>> mbox cmd response: success
2,772,641 UART: [afmc] ++
2,772,809 UART: [afmc] CDI.KEYID = 6
2,773,172 UART: [afmc] SUBJECT.KEYID = 7
2,773,598 UART: [afmc] AUTHORITY.KEYID = 5
2,809,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,537 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,908 UART: [afmc] --
2,852,832 UART: [cold-reset] --
2,853,472 UART: [state] Locking Datavault
2,854,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,027 UART: [state] Locking ICCM
2,855,701 UART: [exit] Launching FMC @ 0x40000130
2,861,030 UART:
2,861,046 UART: Running Caliptra FMC ...
2,861,454 UART:
2,861,597 UART: [state] CFI Enabled
2,872,330 UART: [fht] FMC Alias Private Key: 7
2,980,693 UART: [art] Extend RT PCRs Done
2,981,121 UART: [art] Lock RT PCRs Done
2,982,669 UART: [art] Populate DV Done
2,990,688 UART: [fht] FMC Alias Private Key: 7
2,991,624 UART: [art] Derive CDI
2,991,904 UART: [art] Store in in slot 0x4
3,077,897 UART: [art] Derive Key Pair
3,078,257 UART: [art] Store priv key in slot 0x5
3,091,743 UART: [art] Derive Key Pair - Done
3,106,427 UART: [art] Signing Cert with AUTHO
3,106,907 UART: RITY.KEYID = 7
3,121,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,666 UART: [art] PUB.X = 01A88D760463FE5C42091ADE58616645F50F1F79E1FF558C9CDB609EFEE174C9E66F10B700679D4229ED7E9E9C27D8DB
3,129,410 UART: [art] PUB.Y = 634122B5C6FEB497A2364FCBA120E9D847A2EE66F285EF367A91E00177AB8E4A5FB3CA6D99FE06883389C722C9BEA1B4
3,136,366 UART: [art] SIG.R = 143034BD9AD7E6853254C95C7E66B99105CCC7678E2AF857644F7A3F7F7BA6C101C2DCF346E37F2FE9AAB5834B957FC2
3,143,140 UART: [art] SIG.S = 2E685F85EBFBE50711110C25889EB239D3C0F7DF8E690B711B5ED21EF56FABB8DF81CAAE3E470B1ECE9E2F9C2DC70900
3,166,526 UART: Caliptra RT
3,166,871 UART: [state] CFI Enabled
3,276,164 UART: [rt] RT listening for mailbox commands...
3,276,834 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,038 UART: [rt]cmd =0x52564348, len=36
3,308,493 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,839 ready_for_fw is high
1,056,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,406 >>> mbox cmd response: success
2,681,154 UART:
2,681,170 UART: Running Caliptra FMC ...
2,681,578 UART:
2,681,721 UART: [state] CFI Enabled
2,692,180 UART: [fht] FMC Alias Private Key: 7
2,799,763 UART: [art] Extend RT PCRs Done
2,800,191 UART: [art] Lock RT PCRs Done
2,801,565 UART: [art] Populate DV Done
2,809,656 UART: [fht] FMC Alias Private Key: 7
2,810,670 UART: [art] Derive CDI
2,810,950 UART: [art] Store in in slot 0x4
2,896,463 UART: [art] Derive Key Pair
2,896,823 UART: [art] Store priv key in slot 0x5
2,910,191 UART: [art] Derive Key Pair - Done
2,924,894 UART: [art] Signing Cert with AUTHO
2,925,374 UART: RITY.KEYID = 7
2,940,138 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,903 UART: [art] PUB.X = 481B90BC1D7A9DA38E61D638AE146739E54582EF183B65431713AD6484161ADCE8B33CD8AA297106411D98DF2DBEB42A
2,947,676 UART: [art] PUB.Y = 6B68026AE14CF51656A04563BF100DF1058DE6C308906642DC91221F8CA604C62849AA7D8BA5FA93BAA3471815EB8BA5
2,954,615 UART: [art] SIG.R = F82116014E03E5B894894F6ECE39F95D4EE78A23981C9F1836961D8DF864B774DF7204C9FFC9CA6CFE9FDB91FFC4A8B0
2,961,390 UART: [art] SIG.S = 976CE5129B6EC92B2409C412CACE61E0EE72F37996592C97C528D41F4D3C895A6C4C89F6236F5CC520B4F9B0C1CAD771
2,985,260 UART: Caliptra RT
2,985,605 UART: [state] CFI Enabled
3,093,519 UART: [rt] RT listening for mailbox commands...
3,094,189 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,347 UART: [rt]cmd =0x52564348, len=36
3,125,850 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,166 UART:
192,538 UART: Running Caliptra ROM ...
193,660 UART:
193,808 UART: [state] CFI Enabled
264,740 UART: [state] LifecycleState = Unprovisioned
266,674 UART: [state] DebugLocked = No
269,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,754 UART: [kat] SHA2-256
443,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,994 UART: [kat] ++
454,441 UART: [kat] sha1
464,747 UART: [kat] SHA2-256
467,477 UART: [kat] SHA2-384
472,708 UART: [kat] SHA2-512-ACC
475,082 UART: [kat] ECC-384
2,766,190 UART: [kat] HMAC-384Kdf
2,800,031 UART: [kat] LMS
3,990,337 UART: [kat] --
3,996,208 UART: [cold-reset] ++
3,998,430 UART: [fht] Storing FHT @ 0x50003400
4,010,335 UART: [idev] ++
4,010,981 UART: [idev] CDI.KEYID = 6
4,011,899 UART: [idev] SUBJECT.KEYID = 7
4,013,149 UART: [idev] UDS.KEYID = 0
4,014,238 ready_for_fw is high
4,014,454 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,617 UART: [idev] Erasing UDS.KEYID = 0
7,348,168 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,118 UART: [idev] --
7,374,868 UART: [ldev] ++
7,375,443 UART: [ldev] CDI.KEYID = 6
7,376,391 UART: [ldev] SUBJECT.KEYID = 5
7,377,603 UART: [ldev] AUTHORITY.KEYID = 7
7,378,888 UART: [ldev] FE.KEYID = 1
7,421,798 UART: [ldev] Erasing FE.KEYID = 1
10,754,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,519 UART: [ldev] --
13,115,783 UART: [fwproc] Waiting for Commands...
13,118,313 UART: [fwproc] Received command 0x46574c44
13,120,497 UART: [fwproc] Received Image of size 113760 bytes
17,169,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,626,738 >>> mbox cmd response: success
17,631,725 UART: [afmc] ++
17,632,346 UART: [afmc] CDI.KEYID = 6
17,633,261 UART: [afmc] SUBJECT.KEYID = 7
17,634,484 UART: [afmc] AUTHORITY.KEYID = 5
20,996,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,300,169 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,558 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,416 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,810 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,364,359 UART: [afmc] --
23,367,358 UART: [cold-reset] --
23,372,899 UART: [state] Locking Datavault
23,379,355 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,111 UART: [state] Locking ICCM
23,383,370 UART: [exit] Launching FMC @ 0x40000130
23,391,719 UART:
23,392,003 UART: Running Caliptra FMC ...
23,393,122 UART:
23,393,285 UART: [state] CFI Enabled
23,458,670 UART: [fht] FMC Alias Private Key: 7
25,796,684 UART: [art] Extend RT PCRs Done
25,797,930 UART: [art] Lock RT PCRs Done
25,799,777 UART: [art] Populate DV Done
25,805,294 UART: [fht] FMC Alias Private Key: 7
25,806,775 UART: [art] Derive CDI
25,807,539 UART: [art] Store in in slot 0x4
25,866,794 UART: [art] Derive Key Pair
25,867,785 UART: [art] Store priv key in slot 0x5
29,160,526 UART: [art] Derive Key Pair - Done
29,173,689 UART: [art] Signing Cert with AUTHO
29,174,991 UART: RITY.KEYID = 7
31,461,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,154 UART: [art] PUB.X = 49EB4FA1E2CC2DF29B42BA223560B796651FA4A451D08FB5E9389DACB066AA2F93D04291CFD30D9981018CDED91504CD
31,470,423 UART: [art] PUB.Y = DBB0BD246A2C6D73372A99D654CA98ADC35C7C05C6CAD7F9D623E9E27177CCC55C0FF70ABF152928575A86C982BD8923
31,477,658 UART: [art] SIG.R = 91557F7EBE3AC9664E1C238397CA981774BC7094BB80F3D3C73A261ED00B213A93880DE12D4834A45AD583ECBB688491
31,485,051 UART: [art] SIG.S = A9692ED60830AC84241825F86EA14AED3179884AEA77C192EE4642DD87BDAA54731127347B168513B1C644B4EB617E61
32,790,068 UART: Caliptra RT
32,790,790 UART: [state] CFI Enabled
32,951,368 UART: [rt] RT listening for mailbox commands...
32,953,244 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,984,306 UART: [rt]cmd =0x53574545, len=84
32,985,971 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,784,332 ready_for_fw is high
3,784,716 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,867,787 >>> mbox cmd response: success
23,564,005 UART:
23,564,439 UART: Running Caliptra FMC ...
23,565,546 UART:
23,565,713 UART: [state] CFI Enabled
23,637,336 UART: [fht] FMC Alias Private Key: 7
25,974,655 UART: [art] Extend RT PCRs Done
25,975,889 UART: [art] Lock RT PCRs Done
25,977,496 UART: [art] Populate DV Done
25,982,912 UART: [fht] FMC Alias Private Key: 7
25,984,397 UART: [art] Derive CDI
25,985,137 UART: [art] Store in in slot 0x4
26,045,321 UART: [art] Derive Key Pair
26,046,373 UART: [art] Store priv key in slot 0x5
29,339,204 UART: [art] Derive Key Pair - Done
29,352,364 UART: [art] Signing Cert with AUTHO
29,353,669 UART: RITY.KEYID = 7
31,640,757 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,286 UART: [art] PUB.X = C5E7AFD2A0E6019F0DC5ECDDF834D1F2E1DA819AC06AE659119C4A5FA9935C7D65A01412479A391D210E50BA3CCC3ED3
31,649,560 UART: [art] PUB.Y = BD3F0B21EA8832040E8972AA525EE1A2F20810254BAE159248ED940FAEC07C2D84CAF4130759CA869ECA38F46CFD27F0
31,656,807 UART: [art] SIG.R = 1419753541FB5554F46BE2BF5F5651D6992399EB611D9FB5F545F3A8C647173DDC959F3497C9753903C10D09D1C7BC76
31,664,151 UART: [art] SIG.S = 87545075AD051F87FDB285B06110AB7D4A11CC11CCF6A60C08B8CD4EBCA9ABB6D209550BB7C5B9518D1437296F7FC2D2
32,969,368 UART: Caliptra RT
32,970,085 UART: [state] CFI Enabled
33,132,072 UART: [rt] RT listening for mailbox commands...
33,133,961 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,165,084 UART: [rt]cmd =0x53574545, len=84
33,166,781 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
193,093 UART:
193,456 UART: Running Caliptra ROM ...
194,650 UART:
604,092 UART: [state] CFI Enabled
620,272 UART: [state] LifecycleState = Unprovisioned
622,229 UART: [state] DebugLocked = No
623,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,971 UART: [kat] SHA2-256
797,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,240 UART: [kat] ++
808,758 UART: [kat] sha1
818,889 UART: [kat] SHA2-256
821,611 UART: [kat] SHA2-384
827,891 UART: [kat] SHA2-512-ACC
830,257 UART: [kat] ECC-384
3,114,009 UART: [kat] HMAC-384Kdf
3,125,393 UART: [kat] LMS
4,315,496 UART: [kat] --
4,319,311 UART: [cold-reset] ++
4,321,669 UART: [fht] Storing FHT @ 0x50003400
4,332,858 UART: [idev] ++
4,333,413 UART: [idev] CDI.KEYID = 6
4,334,307 UART: [idev] SUBJECT.KEYID = 7
4,335,615 UART: [idev] UDS.KEYID = 0
4,336,594 ready_for_fw is high
4,336,783 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,086 UART: [idev] Erasing UDS.KEYID = 0
7,622,067 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,927 UART: [idev] --
7,647,572 UART: [ldev] ++
7,648,143 UART: [ldev] CDI.KEYID = 6
7,649,073 UART: [ldev] SUBJECT.KEYID = 5
7,650,337 UART: [ldev] AUTHORITY.KEYID = 7
7,651,535 UART: [ldev] FE.KEYID = 1
7,663,222 UART: [ldev] Erasing FE.KEYID = 1
10,952,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,248 UART: [ldev] --
13,310,369 UART: [fwproc] Waiting for Commands...
13,312,344 UART: [fwproc] Received command 0x46574c44
13,314,518 UART: [fwproc] Received Image of size 113760 bytes
17,357,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,349 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,816,557 >>> mbox cmd response: success
17,821,320 UART: [afmc] ++
17,821,919 UART: [afmc] CDI.KEYID = 6
17,822,828 UART: [afmc] SUBJECT.KEYID = 7
17,824,093 UART: [afmc] AUTHORITY.KEYID = 5
21,141,309 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,433,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,435,518 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,449,876 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,464,727 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,479,170 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,959 UART: [afmc] --
23,504,467 UART: [cold-reset] --
23,509,134 UART: [state] Locking Datavault
23,513,620 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,322 UART: [state] Locking ICCM
23,517,925 UART: [exit] Launching FMC @ 0x40000130
23,526,317 UART:
23,526,549 UART: Running Caliptra FMC ...
23,527,646 UART:
23,527,797 UART: [state] CFI Enabled
23,536,111 UART: [fht] FMC Alias Private Key: 7
25,867,144 UART: [art] Extend RT PCRs Done
25,868,387 UART: [art] Lock RT PCRs Done
25,870,033 UART: [art] Populate DV Done
25,875,395 UART: [fht] FMC Alias Private Key: 7
25,877,023 UART: [art] Derive CDI
25,877,765 UART: [art] Store in in slot 0x4
25,921,213 UART: [art] Derive Key Pair
25,922,208 UART: [art] Store priv key in slot 0x5
29,164,771 UART: [art] Derive Key Pair - Done
29,177,881 UART: [art] Signing Cert with AUTHO
29,179,189 UART: RITY.KEYID = 7
31,458,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,125 UART: [art] PUB.X = D8FAFFC3300167BF5C20AA22B672C3F2A20619DAC571AC019B9297446260553309A7CE126286B7C1FABD6C3DBDAB6CA6
31,467,389 UART: [art] PUB.Y = 7B6D6080F2BEB20C4D7D44E16899099B520AAC988747398877CF0E8532F2ADE705DF218091CB33F990DEB32DA1B85B6D
31,474,646 UART: [art] SIG.R = E13C8060885641359EA72A84FCADC7AD0D5FDD2093379F898EF29006F889AB31F7C86C9F0C2E0790DD971B77D09AC996
31,482,045 UART: [art] SIG.S = 879D95F97EDBC46B44996075724475C2E3ED58CDC1D91D6FBFD394A3F599D05C3035A83A038221F72C7AE101B20FBCC9
32,787,214 UART: Caliptra RT
32,787,928 UART: [state] CFI Enabled
32,906,281 UART: [rt] RT listening for mailbox commands...
32,908,154 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,938,526 UART: [rt]cmd =0x53574545, len=84
32,940,092 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
4,131,295 ready_for_fw is high
4,131,776 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,058,636 >>> mbox cmd response: success
23,696,162 UART:
23,696,555 UART: Running Caliptra FMC ...
23,697,688 UART:
23,697,848 UART: [state] CFI Enabled
23,705,905 UART: [fht] FMC Alias Private Key: 7
26,036,452 UART: [art] Extend RT PCRs Done
26,037,684 UART: [art] Lock RT PCRs Done
26,039,106 UART: [art] Populate DV Done
26,044,325 UART: [fht] FMC Alias Private Key: 7
26,045,875 UART: [art] Derive CDI
26,046,693 UART: [art] Store in in slot 0x4
26,089,238 UART: [art] Derive Key Pair
26,090,286 UART: [art] Store priv key in slot 0x5
29,332,384 UART: [art] Derive Key Pair - Done
29,345,810 UART: [art] Signing Cert with AUTHO
29,347,108 UART: RITY.KEYID = 7
31,626,656 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,173 UART: [art] PUB.X = 4B5B2E50A457AF28DF1722AB4A0425F7CCCC3AB6DA343F77E6C69605ED55BD27B147C6FF9A1C192A73FC62335F9E5071
31,635,419 UART: [art] PUB.Y = BD42CB8555B21C3BE33FA8207582094F1FEA52FD1CAA0F7DE7A0CF5FEA74CAD05414444B36628278A26D184D5F1068A1
31,642,644 UART: [art] SIG.R = 01BB3B536EA43B84337589BA721266919C2FCA8E81AAD225B4F2928B3456A9F696826F694CA26561141C9421CA6EE5A9
31,650,031 UART: [art] SIG.S = 06B71C2D21C1EB15CB015488B8585CB9AE5CB72A4980837E8717C8934EE3455920640B91F2CEA32C3F568C0125338D12
32,954,211 UART: Caliptra RT
32,954,910 UART: [state] CFI Enabled
33,073,270 UART: [rt] RT listening for mailbox commands...
33,075,173 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,105,703 UART: [rt]cmd =0x53574545, len=84
33,107,503 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
192,542 UART:
192,935 UART: Running Caliptra ROM ...
194,162 UART:
194,317 UART: [state] CFI Enabled
265,516 UART: [state] LifecycleState = Unprovisioned
267,423 UART: [state] DebugLocked = No
268,950 UART: [state] WD Timer not started. Device not locked for debugging
272,055 UART: [kat] SHA2-256
451,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,686 UART: [kat] ++
463,222 UART: [kat] sha1
475,304 UART: [kat] SHA2-256
478,373 UART: [kat] SHA2-384
484,568 UART: [kat] SHA2-512-ACC
487,501 UART: [kat] ECC-384
2,951,093 UART: [kat] HMAC-384Kdf
2,974,356 UART: [kat] LMS
3,503,784 UART: [kat] --
3,505,944 UART: [cold-reset] ++
3,507,161 UART: [fht] FHT @ 0x50003400
3,517,852 UART: [idev] ++
3,518,465 UART: [idev] CDI.KEYID = 6
3,519,351 UART: [idev] SUBJECT.KEYID = 7
3,520,469 UART: [idev] UDS.KEYID = 0
3,521,456 ready_for_fw is high
3,521,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,125 UART: [idev] Erasing UDS.KEYID = 0
6,029,744 UART: [idev] Sha1 KeyId Algorithm
6,051,289 UART: [idev] --
6,053,500 UART: [ldev] ++
6,054,068 UART: [ldev] CDI.KEYID = 6
6,055,084 UART: [ldev] SUBJECT.KEYID = 5
6,056,186 UART: [ldev] AUTHORITY.KEYID = 7
6,057,415 UART: [ldev] FE.KEYID = 1
6,101,531 UART: [ldev] Erasing FE.KEYID = 1
8,608,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,476 UART: [ldev] --
10,415,802 UART: [fwproc] Wait for Commands...
10,418,060 UART: [fwproc] Recv command 0x46574c44
10,420,099 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,283,911 >>> mbox cmd response: success
14,287,724 UART: [afmc] ++
14,288,316 UART: [afmc] CDI.KEYID = 6
14,289,246 UART: [afmc] SUBJECT.KEYID = 7
14,290,404 UART: [afmc] AUTHORITY.KEYID = 5
16,832,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,670 UART: [afmc] --
18,631,019 UART: [cold-reset] --
18,633,902 UART: [state] Locking Datavault
18,640,337 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,982 UART: [state] Locking ICCM
18,643,915 UART: [exit] Launching FMC @ 0x40000130
18,652,333 UART:
18,652,610 UART: Running Caliptra FMC ...
18,653,738 UART:
18,653,904 UART: [state] CFI Enabled
18,716,477 UART: [fht] FMC Alias Private Key: 7
20,480,507 UART: [art] Extend RT PCRs Done
20,481,730 UART: [art] Lock RT PCRs Done
20,483,733 UART: [art] Populate DV Done
20,489,255 UART: [fht] FMC Alias Private Key: 7
20,490,833 UART: [art] Derive CDI
20,491,596 UART: [art] Store in in slot 0x4
20,548,636 UART: [art] Derive Key Pair
20,549,635 UART: [art] Store priv key in slot 0x5
23,012,501 UART: [art] Derive Key Pair - Done
23,025,282 UART: [art] Signing Cert with AUTHO
23,026,585 UART: RITY.KEYID = 7
24,737,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,407 UART: [art] PUB.X = 103A6D770F52F68484755D3CA9D722BA88DFD67A64E3215EC35260747205A444A93BF3E6E8A4DAAA4D3AA4C113712E66
24,746,710 UART: [art] PUB.Y = D3CD704145649AF8844AD49716BD3869FD232ED656A31784F7E50E4FCAD9E22528AEE84BC9184013861F28CDFA89DC57
24,753,977 UART: [art] SIG.R = 5F041C450032BA26C4C2BE92F2A2904B9949FD882039305A6E9F75353BE901A0E3B3F9FE553F1B4E48AC0D66E5839E17
24,761,296 UART: [art] SIG.S = 4439D5C2063BCA913A68BF60C3E2621BFC213C46AA77345FC22A67E17C63B0774FBD169410FB783F2612FF271ACA01B9
25,740,337 UART: Caliptra RT
25,741,049 UART: [state] CFI Enabled
25,905,701 UART: [rt] RT listening for mailbox commands...
25,907,593 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,938,720 UART: [rt]cmd =0x53574545, len=84
25,940,467 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,535 writing to cptra_bootfsm_go
3,381,938 ready_for_fw is high
3,382,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,060,085 >>> mbox cmd response: success
18,346,371 UART:
18,346,785 UART: Running Caliptra FMC ...
18,347,987 UART:
18,348,168 UART: [state] CFI Enabled
18,411,460 UART: [fht] FMC Alias Private Key: 7
20,175,286 UART: [art] Extend RT PCRs Done
20,176,508 UART: [art] Lock RT PCRs Done
20,178,243 UART: [art] Populate DV Done
20,183,617 UART: [fht] FMC Alias Private Key: 7
20,185,264 UART: [art] Derive CDI
20,186,078 UART: [art] Store in in slot 0x4
20,244,686 UART: [art] Derive Key Pair
20,245,722 UART: [art] Store priv key in slot 0x5
22,709,249 UART: [art] Derive Key Pair - Done
22,722,142 UART: [art] Signing Cert with AUTHO
22,723,437 UART: RITY.KEYID = 7
24,434,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,356 UART: [art] PUB.X = 19D8DA781B8388D9EA5D825399DED42897AA72FBD0016506BFD0857A931356CF727BC67AD58C5E2EEF55ABC0A66B4593
24,443,623 UART: [art] PUB.Y = B4535AD2DAADEB38A4CBB299EC46B1C9882D070132AE6CE878A08549FF785A9BE45BCC8098DC5D65BB7BD11CAC919183
24,450,932 UART: [art] SIG.R = BD4310FAFCB222BC05800144B9BA3E8154C8C82085BB6048671B728A2BEEE1642421FC394B29D3B9472EBF762CFB3242
24,458,351 UART: [art] SIG.S = 28A652AE0A248700FA5491EDD9F701B60B29597FFCFD2B1DF407F150490CAEF1AF5B9FB013875A7EBED4263778A6B391
25,436,938 UART: Caliptra RT
25,437,653 UART: [state] CFI Enabled
25,603,940 UART: [rt] RT listening for mailbox commands...
25,605,850 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,636,915 UART: [rt]cmd =0x53574545, len=84
25,638,848 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
192,899 UART:
193,286 UART: Running Caliptra ROM ...
194,497 UART:
603,859 UART: [state] CFI Enabled
619,022 UART: [state] LifecycleState = Unprovisioned
620,921 UART: [state] DebugLocked = No
623,383 UART: [state] WD Timer not started. Device not locked for debugging
627,709 UART: [kat] SHA2-256
806,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,401 UART: [kat] ++
818,935 UART: [kat] sha1
830,313 UART: [kat] SHA2-256
833,385 UART: [kat] SHA2-384
838,804 UART: [kat] SHA2-512-ACC
841,740 UART: [kat] ECC-384
3,282,935 UART: [kat] HMAC-384Kdf
3,294,882 UART: [kat] LMS
3,824,421 UART: [kat] --
3,828,147 UART: [cold-reset] ++
3,829,795 UART: [fht] FHT @ 0x50003400
3,839,780 UART: [idev] ++
3,840,354 UART: [idev] CDI.KEYID = 6
3,841,265 UART: [idev] SUBJECT.KEYID = 7
3,842,509 UART: [idev] UDS.KEYID = 0
3,843,434 ready_for_fw is high
3,843,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,328 UART: [idev] Erasing UDS.KEYID = 0
6,311,085 UART: [idev] Sha1 KeyId Algorithm
6,333,630 UART: [idev] --
6,336,280 UART: [ldev] ++
6,336,857 UART: [ldev] CDI.KEYID = 6
6,337,787 UART: [ldev] SUBJECT.KEYID = 5
6,338,944 UART: [ldev] AUTHORITY.KEYID = 7
6,340,173 UART: [ldev] FE.KEYID = 1
6,351,300 UART: [ldev] Erasing FE.KEYID = 1
8,823,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,348 UART: [ldev] --
10,613,595 UART: [fwproc] Wait for Commands...
10,615,352 UART: [fwproc] Recv command 0x46574c44
10,617,449 UART: [fwproc] Recv'd Img size: 114084 bytes
14,013,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,084,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,153,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,470,473 >>> mbox cmd response: success
14,475,500 UART: [afmc] ++
14,476,100 UART: [afmc] CDI.KEYID = 6
14,477,038 UART: [afmc] SUBJECT.KEYID = 7
14,478,208 UART: [afmc] AUTHORITY.KEYID = 5
16,979,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,661 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,773,116 UART: [afmc] --
18,777,343 UART: [cold-reset] --
18,782,402 UART: [state] Locking Datavault
18,788,081 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,745 UART: [state] Locking ICCM
18,791,680 UART: [exit] Launching FMC @ 0x40000130
18,800,081 UART:
18,800,323 UART: Running Caliptra FMC ...
18,801,450 UART:
18,801,615 UART: [state] CFI Enabled
18,809,557 UART: [fht] FMC Alias Private Key: 7
20,566,216 UART: [art] Extend RT PCRs Done
20,567,427 UART: [art] Lock RT PCRs Done
20,569,111 UART: [art] Populate DV Done
20,574,469 UART: [fht] FMC Alias Private Key: 7
20,576,113 UART: [art] Derive CDI
20,576,927 UART: [art] Store in in slot 0x4
20,619,803 UART: [art] Derive Key Pair
20,620,843 UART: [art] Store priv key in slot 0x5
23,047,741 UART: [art] Derive Key Pair - Done
23,060,946 UART: [art] Signing Cert with AUTHO
23,062,252 UART: RITY.KEYID = 7
24,767,546 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,045 UART: [art] PUB.X = E25DB03D09AE3F3A59814401F6554DDCD0A923DA1A6170FEACBCFC6680381AB66CA86F0A5FF97E0E85EA15EE61CA7195
24,776,364 UART: [art] PUB.Y = 583841AB3FF4A405DBDBE4412F6F010A9D1144D529FBE11455EAD118A7275F76C27142F97FCE0726DAE7F4005F2643FF
24,783,582 UART: [art] SIG.R = FF2DD6BBB9D6B788D5FFF320923BEEA42411AB5A3617974AB49DBFDF7C9E9675DDC257F2A9073884529FF974C7F4B770
24,790,999 UART: [art] SIG.S = 9CA3E0FD158DFF99703D85BEEBDFE701C666BD0C5ADA49BE68422BE5FC4517A338F20470EA0B10DAFFF844C4314209CD
25,770,513 UART: Caliptra RT
25,771,213 UART: [state] CFI Enabled
25,888,437 UART: [rt] RT listening for mailbox commands...
25,890,325 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,920,743 UART: [rt]cmd =0x53574545, len=84
25,922,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,853 writing to cptra_bootfsm_go
3,705,486 ready_for_fw is high
3,706,021 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,432 >>> mbox cmd response: success
18,497,005 UART:
18,497,470 UART: Running Caliptra FMC ...
18,498,582 UART:
18,498,742 UART: [state] CFI Enabled
18,506,911 UART: [fht] FMC Alias Private Key: 7
20,263,533 UART: [art] Extend RT PCRs Done
20,264,765 UART: [art] Lock RT PCRs Done
20,266,039 UART: [art] Populate DV Done
20,271,528 UART: [fht] FMC Alias Private Key: 7
20,273,128 UART: [art] Derive CDI
20,273,875 UART: [art] Store in in slot 0x4
20,316,415 UART: [art] Derive Key Pair
20,317,463 UART: [art] Store priv key in slot 0x5
22,743,806 UART: [art] Derive Key Pair - Done
22,756,582 UART: [art] Signing Cert with AUTHO
22,757,895 UART: RITY.KEYID = 7
24,463,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,464,787 UART: [art] PUB.X = B3F31F6267EC322C0AD4ABD60152EA4FFB732AA4A2EFD1C31DA8CF0017484EB15610AB6FA1A2C260DAD4E7B910F3F867
24,472,070 UART: [art] PUB.Y = 31B0E7DC4F694653C7BEE9EF840676757570D571807335750A73D0F7F02B7A495EDD9B39ADE1451437CAD923CBC6043C
24,479,315 UART: [art] SIG.R = F49ED878FECE1EB4859412AC994793D433421D257B8012C48109A900738A954A69A60EA2A06F2674332D3397FAAE9FED
24,486,687 UART: [art] SIG.S = 4E57C95BAEEF69DFB56ACAB1A3F7288DCCDC5553990DC576DF8773055FD9AD4FA55DF5C1556E00BFD1CD7A9B59ED3C0F
25,465,607 UART: Caliptra RT
25,466,318 UART: [state] CFI Enabled
25,583,570 UART: [rt] RT listening for mailbox commands...
25,585,469 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,615,827 UART: [rt]cmd =0x53574545, len=84
25,617,641 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,327 UART:
192,723 UART: Running Caliptra ROM ...
193,878 UART:
194,026 UART: [state] CFI Enabled
259,485 UART: [state] LifecycleState = Unprovisioned
261,853 UART: [state] DebugLocked = No
263,022 UART: [state] WD Timer not started. Device not locked for debugging
266,588 UART: [kat] SHA2-256
456,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,244 UART: [kat] ++
467,878 UART: [kat] sha1
480,387 UART: [kat] SHA2-256
483,401 UART: [kat] SHA2-384
488,323 UART: [kat] SHA2-512-ACC
490,850 UART: [kat] ECC-384
2,947,573 UART: [kat] HMAC-384Kdf
2,971,461 UART: [kat] LMS
3,503,253 UART: [kat] --
3,507,905 UART: [cold-reset] ++
3,509,481 UART: [fht] FHT @ 0x50003400
3,521,239 UART: [idev] ++
3,521,877 UART: [idev] CDI.KEYID = 6
3,522,859 UART: [idev] SUBJECT.KEYID = 7
3,523,973 UART: [idev] UDS.KEYID = 0
3,524,958 ready_for_fw is high
3,525,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,649 UART: [idev] Erasing UDS.KEYID = 0
6,028,019 UART: [idev] Sha1 KeyId Algorithm
6,050,612 UART: [idev] --
6,054,609 UART: [ldev] ++
6,055,305 UART: [ldev] CDI.KEYID = 6
6,056,223 UART: [ldev] SUBJECT.KEYID = 5
6,057,402 UART: [ldev] AUTHORITY.KEYID = 7
6,058,638 UART: [ldev] FE.KEYID = 1
6,100,179 UART: [ldev] Erasing FE.KEYID = 1
8,605,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,966 UART: [ldev] --
10,412,761 UART: [fwproc] Wait for Commands...
10,414,525 UART: [fwproc] Recv command 0x46574c44
10,416,827 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,604,589 >>> mbox cmd response: success
14,609,284 UART: [afmc] ++
14,609,993 UART: [afmc] CDI.KEYID = 6
14,611,184 UART: [afmc] SUBJECT.KEYID = 7
14,612,632 UART: [afmc] AUTHORITY.KEYID = 5
17,150,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,609 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,702 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,303 UART: [afmc] --
18,948,383 UART: [cold-reset] --
18,951,654 UART: [state] Locking Datavault
18,956,968 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,180 UART: [state] Locking ICCM
18,961,211 UART: [exit] Launching FMC @ 0x40000130
18,969,846 UART:
18,970,073 UART: Running Caliptra FMC ...
18,971,104 UART:
18,971,248 UART: [state] CFI Enabled
19,030,639 UART: [fht] FMC Alias Private Key: 7
20,794,777 UART: [art] Extend RT PCRs Done
20,796,002 UART: [art] Lock RT PCRs Done
20,797,500 UART: [art] Populate DV Done
20,803,017 UART: [fht] FMC Alias Private Key: 7
20,804,557 UART: [art] Derive CDI
20,805,292 UART: [art] Store in in slot 0x4
20,863,464 UART: [art] Derive Key Pair
20,864,502 UART: [art] Store priv key in slot 0x5
23,327,030 UART: [art] Derive Key Pair - Done
23,340,258 UART: [art] Signing Cert with AUTHO
23,341,565 UART: RITY.KEYID = 7
25,053,313 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,822 UART: [art] PUB.X = F321A11B65050C2952C2441173C0115197B0A59A315841BCCEB7DDF885B0BC3F2A1284D1BC0E47671503517986367D6A
25,062,105 UART: [art] PUB.Y = BE1F75D4DEE6E45B1C2FA1CD6B34786D2A0B75ED6E2CAA98597EFEC63FC4E8704BA76B76E4B73BF8C78CEAA28B918CB4
25,069,381 UART: [art] SIG.R = AC96B2D30D056B25BAD98DEDD8599AD00AD53AD7E181952106F0824C69D50F861B753FF9AAC952A899A80BC91D909CEA
25,076,752 UART: [art] SIG.S = C50592C388AD5EFD657A4F7DA0E6FC9E4650F3247DCB6E94907046D29D6F8B114F469B36C10225F63CEA98F6E304F6B3
26,055,137 UART: Caliptra RT
26,055,850 UART: [state] CFI Enabled
26,221,888 UART: [rt] RT listening for mailbox commands...
26,223,773 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,254,976 UART: [rt]cmd =0x53574545, len=84
26,256,919 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,437,072 ready_for_fw is high
3,437,452 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,696,255 >>> mbox cmd response: success
18,983,924 UART:
18,984,331 UART: Running Caliptra FMC ...
18,985,469 UART:
18,985,631 UART: [state] CFI Enabled
19,052,243 UART: [fht] FMC Alias Private Key: 7
20,816,611 UART: [art] Extend RT PCRs Done
20,817,825 UART: [art] Lock RT PCRs Done
20,819,557 UART: [art] Populate DV Done
20,825,077 UART: [fht] FMC Alias Private Key: 7
20,826,613 UART: [art] Derive CDI
20,827,372 UART: [art] Store in in slot 0x4
20,885,060 UART: [art] Derive Key Pair
20,886,094 UART: [art] Store priv key in slot 0x5
23,349,131 UART: [art] Derive Key Pair - Done
23,361,854 UART: [art] Signing Cert with AUTHO
23,363,152 UART: RITY.KEYID = 7
25,074,465 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,972 UART: [art] PUB.X = DAF05E097832D56340EF2DB14B046D9CAFF9FB77270BBEAF14A956B7F32917ACB7EEFBDD106C24630AC5FA569BEA6328
25,083,218 UART: [art] PUB.Y = 7104B1B5375AF27496EA9B223284572D45361F511A81C3AECD2C76FF514F5878F2AE4CFDB041565F8788CBFD1EA208E6
25,090,521 UART: [art] SIG.R = 8B8CB631A4FE79132B9EC502CD354D4E0B0AEF329B8BD3422F169E8F28589C5A0E9A46D2B43DF5D23992141418D454EA
25,097,922 UART: [art] SIG.S = 1CF14F1D84627C04304675F6AA804C9AE6529EDCB5171E61E1C1C44D29EF8F96285E5980728A3C7F71704692ABBC440C
26,076,669 UART: Caliptra RT
26,077,378 UART: [state] CFI Enabled
26,243,529 UART: [rt] RT listening for mailbox commands...
26,245,424 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,276,563 UART: [rt]cmd =0x53574545, len=84
26,278,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
192,883 UART:
193,284 UART: Running Caliptra ROM ...
194,488 UART:
604,054 UART: [state] CFI Enabled
618,655 UART: [state] LifecycleState = Unprovisioned
621,037 UART: [state] DebugLocked = No
622,363 UART: [state] WD Timer not started. Device not locked for debugging
627,109 UART: [kat] SHA2-256
817,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,754 UART: [kat] ++
828,361 UART: [kat] sha1
840,805 UART: [kat] SHA2-256
843,796 UART: [kat] SHA2-384
848,593 UART: [kat] SHA2-512-ACC
851,186 UART: [kat] ECC-384
3,292,809 UART: [kat] HMAC-384Kdf
3,305,419 UART: [kat] LMS
3,837,253 UART: [kat] --
3,842,383 UART: [cold-reset] ++
3,843,533 UART: [fht] FHT @ 0x50003400
3,856,377 UART: [idev] ++
3,857,087 UART: [idev] CDI.KEYID = 6
3,857,970 UART: [idev] SUBJECT.KEYID = 7
3,859,216 UART: [idev] UDS.KEYID = 0
3,860,116 ready_for_fw is high
3,860,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,597 UART: [idev] Erasing UDS.KEYID = 0
6,331,947 UART: [idev] Sha1 KeyId Algorithm
6,353,123 UART: [idev] --
6,356,803 UART: [ldev] ++
6,357,490 UART: [ldev] CDI.KEYID = 6
6,358,380 UART: [ldev] SUBJECT.KEYID = 5
6,359,591 UART: [ldev] AUTHORITY.KEYID = 7
6,360,790 UART: [ldev] FE.KEYID = 1
6,371,955 UART: [ldev] Erasing FE.KEYID = 1
8,854,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,151 UART: [ldev] --
10,645,448 UART: [fwproc] Wait for Commands...
10,648,091 UART: [fwproc] Recv command 0x46574c44
10,650,349 UART: [fwproc] Recv'd Img size: 114084 bytes
14,088,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,783 >>> mbox cmd response: success
14,832,581 UART: [afmc] ++
14,833,314 UART: [afmc] CDI.KEYID = 6
14,834,512 UART: [afmc] SUBJECT.KEYID = 7
14,835,952 UART: [afmc] AUTHORITY.KEYID = 5
17,336,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,464 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,129,386 UART: [afmc] --
19,132,332 UART: [cold-reset] --
19,136,417 UART: [state] Locking Datavault
19,143,630 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,782 UART: [state] Locking ICCM
19,148,373 UART: [exit] Launching FMC @ 0x40000130
19,157,055 UART:
19,157,312 UART: Running Caliptra FMC ...
19,158,414 UART:
19,158,571 UART: [state] CFI Enabled
19,166,191 UART: [fht] FMC Alias Private Key: 7
20,922,785 UART: [art] Extend RT PCRs Done
20,924,009 UART: [art] Lock RT PCRs Done
20,925,594 UART: [art] Populate DV Done
20,931,065 UART: [fht] FMC Alias Private Key: 7
20,932,605 UART: [art] Derive CDI
20,933,341 UART: [art] Store in in slot 0x4
20,975,505 UART: [art] Derive Key Pair
20,976,507 UART: [art] Store priv key in slot 0x5
23,403,243 UART: [art] Derive Key Pair - Done
23,416,616 UART: [art] Signing Cert with AUTHO
23,417,921 UART: RITY.KEYID = 7
25,123,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,782 UART: [art] PUB.X = 13A0B459D38F1D6CE77084F612420B014BFAE875B76F1F77B5F3285D0D1151F6B1210EB9626BD493E745C7737DBC49B1
25,132,000 UART: [art] PUB.Y = 726D34EAC45218E5099790EC14781A846E9B6D1DF5ED9F35FA23BAB4A6C3CF3A3D81A20CFA8C2A8249710B6D409E0F8A
25,139,273 UART: [art] SIG.R = 91C1AA703F88B4A46C6498558300EEC59A8ECD44907E58374B4F7FA7990E40FCFB1399EED9CC918ECDA19844C81A3970
25,146,645 UART: [art] SIG.S = 6E2BB2EBAF10524209DDD66C72B45A10676AA80B5BAEC52389336934168CCDA7058C30D9AFDA99E3934985306220D44D
26,125,797 UART: Caliptra RT
26,126,485 UART: [state] CFI Enabled
26,243,332 UART: [rt] RT listening for mailbox commands...
26,245,219 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,275,685 UART: [rt]cmd =0x53574545, len=84
26,277,709 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
3,761,338 ready_for_fw is high
3,761,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,950,153 >>> mbox cmd response: success
19,197,780 UART:
19,198,172 UART: Running Caliptra FMC ...
19,199,366 UART:
19,199,538 UART: [state] CFI Enabled
19,207,325 UART: [fht] FMC Alias Private Key: 7
20,964,195 UART: [art] Extend RT PCRs Done
20,965,446 UART: [art] Lock RT PCRs Done
20,967,089 UART: [art] Populate DV Done
20,972,301 UART: [fht] FMC Alias Private Key: 7
20,973,790 UART: [art] Derive CDI
20,974,528 UART: [art] Store in in slot 0x4
21,017,614 UART: [art] Derive Key Pair
21,018,661 UART: [art] Store priv key in slot 0x5
23,445,326 UART: [art] Derive Key Pair - Done
23,458,340 UART: [art] Signing Cert with AUTHO
23,459,651 UART: RITY.KEYID = 7
25,165,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,794 UART: [art] PUB.X = 54BD898D4A09952E6E40F0BA41E78EBAB003FD1B105ED72A383D53698A3F0462A855F22DF1560E3BDB4EAA51F9FABCB3
25,174,111 UART: [art] PUB.Y = B13644561E1E8E44D3DC4F452675F73A50EF718F35F31C76DA25D7766D9A8D240F7EAAE54DA9998C8F65EB0425F6630B
25,181,320 UART: [art] SIG.R = 065AF28CBAD12D2C903712F46B08CCFE56597ED27F352CEEADC43F9F0E1532658A4A4C3A8D48ABAAF1CA462968434C17
25,188,710 UART: [art] SIG.S = 6C55384C827A5D903DACBA86775941D04FEA308E842B6671421381570C0272D25C9D45A866E852F013745EBBE8B27335
26,168,149 UART: Caliptra RT
26,168,896 UART: [state] CFI Enabled
26,286,109 UART: [rt] RT listening for mailbox commands...
26,287,996 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,318,526 UART: [rt]cmd =0x53574545, len=84
26,320,429 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,353 UART: [kat] SHA2-256
892,291 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,150 UART: [kat] HMAC-384Kdf
906,716 UART: [kat] LMS
1,474,912 UART: [kat] --
1,475,683 UART: [cold-reset] ++
1,476,023 UART: [fht] Storing FHT @ 0x50003400
1,479,014 UART: [idev] ++
1,479,182 UART: [idev] CDI.KEYID = 6
1,479,542 UART: [idev] SUBJECT.KEYID = 7
1,479,966 UART: [idev] UDS.KEYID = 0
1,480,311 ready_for_fw is high
1,480,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,940 UART: [idev] Erasing UDS.KEYID = 0
1,504,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,924 UART: [idev] --
1,513,983 UART: [ldev] ++
1,514,151 UART: [ldev] CDI.KEYID = 6
1,514,514 UART: [ldev] SUBJECT.KEYID = 5
1,514,940 UART: [ldev] AUTHORITY.KEYID = 7
1,515,403 UART: [ldev] FE.KEYID = 1
1,520,745 UART: [ldev] Erasing FE.KEYID = 1
1,545,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,862 UART: [ldev] --
1,585,275 UART: [fwproc] Waiting for Commands...
1,585,934 UART: [fwproc] Received command 0x46574c44
1,586,725 UART: [fwproc] Received Image of size 114084 bytes
2,881,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,875 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,768 >>> mbox cmd response: success
3,075,010 UART: [afmc] ++
3,075,178 UART: [afmc] CDI.KEYID = 6
3,075,540 UART: [afmc] SUBJECT.KEYID = 7
3,075,965 UART: [afmc] AUTHORITY.KEYID = 5
3,111,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,068 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,953 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,643 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,634 UART: [afmc] --
3,154,738 UART: [cold-reset] --
3,155,568 UART: [state] Locking Datavault
3,156,909 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,513 UART: [state] Locking ICCM
3,158,063 UART: [exit] Launching FMC @ 0x40000130
3,163,392 UART:
3,163,408 UART: Running Caliptra FMC ...
3,163,816 UART:
3,163,870 UART: [state] CFI Enabled
3,174,535 UART: [fht] FMC Alias Private Key: 7
3,282,642 UART: [art] Extend RT PCRs Done
3,283,070 UART: [art] Lock RT PCRs Done
3,284,538 UART: [art] Populate DV Done
3,292,709 UART: [fht] FMC Alias Private Key: 7
3,293,651 UART: [art] Derive CDI
3,293,931 UART: [art] Store in in slot 0x4
3,379,446 UART: [art] Derive Key Pair
3,379,806 UART: [art] Store priv key in slot 0x5
3,393,170 UART: [art] Derive Key Pair - Done
3,407,995 UART: [art] Signing Cert with AUTHO
3,408,475 UART: RITY.KEYID = 7
3,424,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,106 UART: [art] PUB.X = 73A83F63C37DAAD3CB4D7F31FD8751F1F401590F51A442A36DE90B050B2DD29C06031C2E1D95670AEF309B988E317ABC
3,431,862 UART: [art] PUB.Y = 76F63E65568C2683279F26BB194B046DC7E3B570205973DD2AA59D32499FA17E985E55AE1EB65E8185EEE40FA6891A2E
3,438,808 UART: [art] SIG.R = D81D8BF36A42EADBA3D56BAC7DD858E29C79E3E67837267281EDDAE34821913803AEABB57ED4BF0768228DBE2B871F97
3,445,588 UART: [art] SIG.S = 2A14A95A06B5EE753151A21B0207D4D06AE8C8E9386504D60BC5E3AC032A2E7805DBE2003A96AE8AEDAB3CDC92CA9FC5
3,468,714 UART: Caliptra RT
3,468,967 UART: [state] CFI Enabled
3,576,666 UART: [rt] RT listening for mailbox commands...
3,577,336 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,752 UART: [rt]cmd =0x53574545, len=84
3,609,236 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,405 ready_for_fw is high
1,362,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,314 >>> mbox cmd response: success
2,985,482 UART:
2,985,498 UART: Running Caliptra FMC ...
2,985,906 UART:
2,985,960 UART: [state] CFI Enabled
2,996,331 UART: [fht] FMC Alias Private Key: 7
3,103,896 UART: [art] Extend RT PCRs Done
3,104,324 UART: [art] Lock RT PCRs Done
3,105,420 UART: [art] Populate DV Done
3,113,771 UART: [fht] FMC Alias Private Key: 7
3,114,817 UART: [art] Derive CDI
3,115,097 UART: [art] Store in in slot 0x4
3,200,606 UART: [art] Derive Key Pair
3,200,966 UART: [art] Store priv key in slot 0x5
3,214,522 UART: [art] Derive Key Pair - Done
3,229,086 UART: [art] Signing Cert with AUTHO
3,229,566 UART: RITY.KEYID = 7
3,244,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,533 UART: [art] PUB.X = 0C791A55F81937FEB174A2AF10DCF5A8625B9FD24FA4B01DA9E13C04BC2953E77D2731D32B8D058AA2706456B2764B70
3,252,300 UART: [art] PUB.Y = E5D90EABF13F98D574D178C39C6E5541E108C91A8C21A24ED6B599BAD02786E6A1F7F28686EBE807683EE3942382E6D8
3,259,247 UART: [art] SIG.R = 20ADA7E7E0AF266CBDAC8C0DE927674E1C455036E305091D9FB4276D11AC8354AF461A2E86038028A073BD07A2055ED5
3,266,005 UART: [art] SIG.S = 6E4A354D10F1E5912C0155B33EA301883685AF798B9F64940844D766E1753A9954307EBF24021E572CD80BA322A2FD8C
3,289,945 UART: Caliptra RT
3,290,198 UART: [state] CFI Enabled
3,398,604 UART: [rt] RT listening for mailbox commands...
3,399,274 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,728 UART: [rt]cmd =0x53574545, len=84
3,430,974 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,758 UART: [kat] SHA2-256
882,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,804 UART: [kat] ++
886,956 UART: [kat] sha1
891,208 UART: [kat] SHA2-256
893,146 UART: [kat] SHA2-384
895,919 UART: [kat] SHA2-512-ACC
897,820 UART: [kat] ECC-384
903,509 UART: [kat] HMAC-384Kdf
908,265 UART: [kat] LMS
1,476,461 UART: [kat] --
1,477,486 UART: [cold-reset] ++
1,477,914 UART: [fht] Storing FHT @ 0x50003400
1,480,715 UART: [idev] ++
1,480,883 UART: [idev] CDI.KEYID = 6
1,481,243 UART: [idev] SUBJECT.KEYID = 7
1,481,667 UART: [idev] UDS.KEYID = 0
1,482,012 ready_for_fw is high
1,482,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,621 UART: [idev] Erasing UDS.KEYID = 0
1,506,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,823 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,600 UART: [ldev] Erasing FE.KEYID = 1
1,548,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,343 UART: [ldev] --
1,587,764 UART: [fwproc] Waiting for Commands...
1,588,591 UART: [fwproc] Received command 0x46574c44
1,589,382 UART: [fwproc] Received Image of size 114084 bytes
2,885,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,304 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,055 >>> mbox cmd response: success
3,078,293 UART: [afmc] ++
3,078,461 UART: [afmc] CDI.KEYID = 6
3,078,823 UART: [afmc] SUBJECT.KEYID = 7
3,079,248 UART: [afmc] AUTHORITY.KEYID = 5
3,114,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,670 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,360 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,095 UART: [afmc] --
3,157,139 UART: [cold-reset] --
3,157,845 UART: [state] Locking Datavault
3,159,040 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,644 UART: [state] Locking ICCM
3,160,162 UART: [exit] Launching FMC @ 0x40000130
3,165,491 UART:
3,165,507 UART: Running Caliptra FMC ...
3,165,915 UART:
3,166,058 UART: [state] CFI Enabled
3,176,691 UART: [fht] FMC Alias Private Key: 7
3,284,752 UART: [art] Extend RT PCRs Done
3,285,180 UART: [art] Lock RT PCRs Done
3,286,958 UART: [art] Populate DV Done
3,295,393 UART: [fht] FMC Alias Private Key: 7
3,296,513 UART: [art] Derive CDI
3,296,793 UART: [art] Store in in slot 0x4
3,382,458 UART: [art] Derive Key Pair
3,382,818 UART: [art] Store priv key in slot 0x5
3,396,042 UART: [art] Derive Key Pair - Done
3,410,587 UART: [art] Signing Cert with AUTHO
3,411,067 UART: RITY.KEYID = 7
3,426,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,154 UART: [art] PUB.X = 33E79CDC28A5721D0277A7BC1A9EBD3B7F41A7475E655B2FBA8461A499E07BEB122826CBDC27801DD716DA6EDD57B402
3,433,932 UART: [art] PUB.Y = 74CE44839CC5ACF4BD592D9C9DA9BFD39DC9AAB029C36FB783F53AB9BF23AE993D79BD43E67B000B14759EFE117C2078
3,440,877 UART: [art] SIG.R = 96D11F10BB1057599EA6E44B0C7F2A41A3B486308E3762D1BDD7122D8A4207A7669AD1FB8E915F801AF5225FEC682A06
3,447,642 UART: [art] SIG.S = 7E913F7C7B699DFA46A7D770DB6E9D22A44C8E3B53B472B17D130AC2C9734B123413E52BB8643111CBC6AA4B74AEBAD2
3,471,376 UART: Caliptra RT
3,471,721 UART: [state] CFI Enabled
3,580,094 UART: [rt] RT listening for mailbox commands...
3,580,764 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,970 UART: [rt]cmd =0x53574545, len=84
3,612,326 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,226 ready_for_fw is high
1,363,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,479 >>> mbox cmd response: success
2,988,425 UART:
2,988,441 UART: Running Caliptra FMC ...
2,988,849 UART:
2,988,992 UART: [state] CFI Enabled
2,999,099 UART: [fht] FMC Alias Private Key: 7
3,107,634 UART: [art] Extend RT PCRs Done
3,108,062 UART: [art] Lock RT PCRs Done
3,109,518 UART: [art] Populate DV Done
3,117,577 UART: [fht] FMC Alias Private Key: 7
3,118,677 UART: [art] Derive CDI
3,118,957 UART: [art] Store in in slot 0x4
3,204,602 UART: [art] Derive Key Pair
3,204,962 UART: [art] Store priv key in slot 0x5
3,218,120 UART: [art] Derive Key Pair - Done
3,232,746 UART: [art] Signing Cert with AUTHO
3,233,226 UART: RITY.KEYID = 7
3,248,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,005 UART: [art] PUB.X = 8C1246907CAA80BDCE955FBC991B4CE872BC7786EFE3BFD50079092B554019F8F694A5F33D2118885A6E4E4331D0FFE3
3,255,758 UART: [art] PUB.Y = 45DEB97D6560B8CFDAD7055DB7E73436D5E88DAE7C5FEDCCBB7BC536C4ECA843480C21453EED11FE07371681C61023D7
3,262,717 UART: [art] SIG.R = DDAFBD025050D94EB201A634C5756DC876D36231CB8A1B42F5E55BE9A6B874A5BF6D4D7FF415AD20C7B50F5845A8C3F7
3,269,494 UART: [art] SIG.S = D87DA7E6ED5DEE0E17E4FAD8EF8376A48FCA4B9BDFC9D5FE7CD0DDD6A549E4196A0B4672FA5FB3940117730052614AF3
3,293,918 UART: Caliptra RT
3,294,263 UART: [state] CFI Enabled
3,403,547 UART: [rt] RT listening for mailbox commands...
3,404,217 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,469 UART: [rt]cmd =0x53574545, len=84
3,435,887 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,200 UART: [kat] SHA2-256
893,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,975 UART: [kat] ++
898,127 UART: [kat] sha1
902,409 UART: [kat] SHA2-256
904,349 UART: [kat] SHA2-384
907,056 UART: [kat] SHA2-512-ACC
908,957 UART: [kat] ECC-384
918,528 UART: [kat] HMAC-384Kdf
923,350 UART: [kat] LMS
1,171,678 UART: [kat] --
1,172,897 UART: [cold-reset] ++
1,173,417 UART: [fht] FHT @ 0x50003400
1,176,064 UART: [idev] ++
1,176,232 UART: [idev] CDI.KEYID = 6
1,176,592 UART: [idev] SUBJECT.KEYID = 7
1,177,016 UART: [idev] UDS.KEYID = 0
1,177,361 ready_for_fw is high
1,177,361 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,828 UART: [idev] Erasing UDS.KEYID = 0
1,201,383 UART: [idev] Sha1 KeyId Algorithm
1,209,991 UART: [idev] --
1,210,887 UART: [ldev] ++
1,211,055 UART: [ldev] CDI.KEYID = 6
1,211,418 UART: [ldev] SUBJECT.KEYID = 5
1,211,844 UART: [ldev] AUTHORITY.KEYID = 7
1,212,307 UART: [ldev] FE.KEYID = 1
1,217,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,495 UART: [ldev] --
1,282,912 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,335 >>> mbox cmd response: success
2,772,519 UART: [afmc] ++
2,772,687 UART: [afmc] CDI.KEYID = 6
2,773,049 UART: [afmc] SUBJECT.KEYID = 7
2,773,474 UART: [afmc] AUTHORITY.KEYID = 5
2,808,399 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,886 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,499 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,902 UART: [afmc] --
2,852,004 UART: [cold-reset] --
2,852,874 UART: [state] Locking Datavault
2,854,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,629 UART: [state] Locking ICCM
2,855,055 UART: [exit] Launching FMC @ 0x40000130
2,860,384 UART:
2,860,400 UART: Running Caliptra FMC ...
2,860,808 UART:
2,860,862 UART: [state] CFI Enabled
2,871,321 UART: [fht] FMC Alias Private Key: 7
2,979,374 UART: [art] Extend RT PCRs Done
2,979,802 UART: [art] Lock RT PCRs Done
2,981,216 UART: [art] Populate DV Done
2,989,305 UART: [fht] FMC Alias Private Key: 7
2,990,351 UART: [art] Derive CDI
2,990,631 UART: [art] Store in in slot 0x4
3,076,680 UART: [art] Derive Key Pair
3,077,040 UART: [art] Store priv key in slot 0x5
3,090,610 UART: [art] Derive Key Pair - Done
3,105,381 UART: [art] Signing Cert with AUTHO
3,105,861 UART: RITY.KEYID = 7
3,121,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,876 UART: [art] PUB.X = A9E2D81F53F80D115DC703562DBF46E45C222DFA3037780ECA626A603C3296D5785B287F5070A5024D54D825828FF37C
3,128,632 UART: [art] PUB.Y = 1A2B3DE6225EC5B11B9BF98778317FE0B970A70A36D6079817888B7C7F9F43678E516DD733591CB46B7770C41ADD0B47
3,135,573 UART: [art] SIG.R = D0A8BCA9C1F7CC30B0F24940E888B95FB75E88D4EE1AA5032BB3D17C4A38BB9E6ABB261E017C6403AD0D389CB0E59150
3,142,349 UART: [art] SIG.S = E48CBDA92E371CCA6F4D5DD2A4A76E5C03DB4CFF09AA9AC053299324EA74CAD9EA866284DFE8D4BBE80ED5DEE76DA3C0
3,166,479 UART: Caliptra RT
3,166,732 UART: [state] CFI Enabled
3,273,968 UART: [rt] RT listening for mailbox commands...
3,274,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,062 UART: [rt]cmd =0x53574545, len=84
3,306,604 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,987 ready_for_fw is high
1,059,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,392 >>> mbox cmd response: success
2,684,436 UART:
2,684,452 UART: Running Caliptra FMC ...
2,684,860 UART:
2,684,914 UART: [state] CFI Enabled
2,695,415 UART: [fht] FMC Alias Private Key: 7
2,802,828 UART: [art] Extend RT PCRs Done
2,803,256 UART: [art] Lock RT PCRs Done
2,804,900 UART: [art] Populate DV Done
2,813,295 UART: [fht] FMC Alias Private Key: 7
2,814,391 UART: [art] Derive CDI
2,814,671 UART: [art] Store in in slot 0x4
2,900,192 UART: [art] Derive Key Pair
2,900,552 UART: [art] Store priv key in slot 0x5
2,913,104 UART: [art] Derive Key Pair - Done
2,927,739 UART: [art] Signing Cert with AUTHO
2,928,219 UART: RITY.KEYID = 7
2,943,295 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,060 UART: [art] PUB.X = D10ED5A59D4E015DB6BCDFDDAA85EA76E2C9D09B49EEBE80390EC15BC72389674E313E2DE57FBA8D820A842C7CD4E6F0
2,950,844 UART: [art] PUB.Y = 83C6EA727A5F129499A3B6797D4667D3844658F4455D647ACDD02F491BFCDAD742DD0176FC1EEFD607ACCEBE1577D031
2,957,800 UART: [art] SIG.R = 036B46A154DFA78D161F8EDE1BEF9456CA8414C89D091E0A75F7DD1CAE61919A0D9AC157B4CD4175F9A801496D734B9C
2,964,567 UART: [art] SIG.S = B980F75E3A8B56BCE8C62925423A0A97C16FF102E435393AB0C91D834CA527390BCD3E4CCAA980C5E27FC65614B5BBAB
2,988,363 UART: Caliptra RT
2,988,616 UART: [state] CFI Enabled
3,096,457 UART: [rt] RT listening for mailbox commands...
3,097,127 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,409 UART: [rt]cmd =0x53574545, len=84
3,128,831 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,955 UART: [kat] SHA2-512-ACC
908,856 UART: [kat] ECC-384
918,515 UART: [kat] HMAC-384Kdf
923,071 UART: [kat] LMS
1,171,399 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,714 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 ready_for_fw is high
1,176,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,305 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,564 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,360 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,090 UART: [ldev] --
1,283,555 UART: [fwproc] Wait for Commands...
1,284,315 UART: [fwproc] Recv command 0x46574c44
1,285,043 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,350 >>> mbox cmd response: success
2,773,374 UART: [afmc] ++
2,773,542 UART: [afmc] CDI.KEYID = 6
2,773,904 UART: [afmc] SUBJECT.KEYID = 7
2,774,329 UART: [afmc] AUTHORITY.KEYID = 5
2,809,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,179 UART: [afmc] --
2,853,259 UART: [cold-reset] --
2,854,171 UART: [state] Locking Datavault
2,855,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,038 UART: [state] Locking ICCM
2,856,628 UART: [exit] Launching FMC @ 0x40000130
2,861,957 UART:
2,861,973 UART: Running Caliptra FMC ...
2,862,381 UART:
2,862,524 UART: [state] CFI Enabled
2,872,993 UART: [fht] FMC Alias Private Key: 7
2,981,460 UART: [art] Extend RT PCRs Done
2,981,888 UART: [art] Lock RT PCRs Done
2,983,118 UART: [art] Populate DV Done
2,991,619 UART: [fht] FMC Alias Private Key: 7
2,992,591 UART: [art] Derive CDI
2,992,871 UART: [art] Store in in slot 0x4
3,078,642 UART: [art] Derive Key Pair
3,079,002 UART: [art] Store priv key in slot 0x5
3,092,624 UART: [art] Derive Key Pair - Done
3,107,148 UART: [art] Signing Cert with AUTHO
3,107,628 UART: RITY.KEYID = 7
3,123,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,939 UART: [art] PUB.X = D2C102F8E7B13AF6803A7F6C2FE4010DA05D5BF377E472364E20F319C67E18217B366859795F47A674D138C99B968B19
3,130,696 UART: [art] PUB.Y = D3F30A83B361A0D41DED936FC2D8F15FD80DFEF5F91569D1C93CAAEC26C61D1B66FDFA969C59BE1292B64529C6E769A3
3,137,660 UART: [art] SIG.R = 14BF8060450E2A1C28799958678E9D0348B2CF2501834B9D12D65F3F9E67761AC5009884F27DE2B4AA81886A816730B2
3,144,389 UART: [art] SIG.S = BEAD20A69703110EBC22A40F244A53C8980AC5B112ABF33E86C8E287EC53FCB6BC5274712E20C51C41ACCE63D8D2887A
3,169,060 UART: Caliptra RT
3,169,405 UART: [state] CFI Enabled
3,277,074 UART: [rt] RT listening for mailbox commands...
3,277,744 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,144 UART: [rt]cmd =0x53574545, len=84
3,309,568 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,268 ready_for_fw is high
1,060,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,359 >>> mbox cmd response: success
2,685,659 UART:
2,685,675 UART: Running Caliptra FMC ...
2,686,083 UART:
2,686,226 UART: [state] CFI Enabled
2,696,517 UART: [fht] FMC Alias Private Key: 7
2,804,066 UART: [art] Extend RT PCRs Done
2,804,494 UART: [art] Lock RT PCRs Done
2,805,920 UART: [art] Populate DV Done
2,813,951 UART: [fht] FMC Alias Private Key: 7
2,815,057 UART: [art] Derive CDI
2,815,337 UART: [art] Store in in slot 0x4
2,901,044 UART: [art] Derive Key Pair
2,901,404 UART: [art] Store priv key in slot 0x5
2,914,316 UART: [art] Derive Key Pair - Done
2,929,335 UART: [art] Signing Cert with AUTHO
2,929,815 UART: RITY.KEYID = 7
2,944,821 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,586 UART: [art] PUB.X = C226C00B971B70483E6B8B893871EFB7C5EE9C59F831C4F31ACD6D5744F672BB3C9B180EAAD698968E799505908CDFA7
2,952,355 UART: [art] PUB.Y = 34A0C8B4B4E23501B397A53565A33516D05638B76D9700BCA432ACB09B5196F6FE854DAA5A05208C0947D313224003C0
2,959,265 UART: [art] SIG.R = 1CEA7EF3D473D7B03B51F07C90F8D32AC6FA3017723A4F0F5CA70DF64A4470DFB75F94180E660D15491EE755A9F4EE9F
2,966,037 UART: [art] SIG.S = A5DA559B270C93AFE2579BB53B322529B6D90B1DBFBFCEDA53552EC412A95CD5EC0C357D1A5F4B5D7D40C86C8E208A72
2,989,743 UART: Caliptra RT
2,990,088 UART: [state] CFI Enabled
3,098,211 UART: [rt] RT listening for mailbox commands...
3,098,881 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,429 UART: [rt]cmd =0x53574545, len=84
3,130,889 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,848 UART: [kat] HMAC-384Kdf
921,532 UART: [kat] LMS
1,169,844 UART: [kat] --
1,170,859 UART: [cold-reset] ++
1,171,329 UART: [fht] FHT @ 0x50003400
1,173,811 UART: [idev] ++
1,173,979 UART: [idev] CDI.KEYID = 6
1,174,340 UART: [idev] SUBJECT.KEYID = 7
1,174,765 UART: [idev] UDS.KEYID = 0
1,175,111 ready_for_fw is high
1,175,111 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,947 UART: [idev] Erasing UDS.KEYID = 0
1,199,917 UART: [idev] Sha1 KeyId Algorithm
1,208,821 UART: [idev] --
1,209,772 UART: [ldev] ++
1,209,940 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,731 UART: [ldev] AUTHORITY.KEYID = 7
1,211,194 UART: [ldev] FE.KEYID = 1
1,216,378 UART: [ldev] Erasing FE.KEYID = 1
1,242,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,703 UART: [fwproc] Recv command 0x46574c44
1,282,436 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,527 >>> mbox cmd response: success
2,770,560 UART: [afmc] ++
2,770,728 UART: [afmc] CDI.KEYID = 6
2,771,091 UART: [afmc] SUBJECT.KEYID = 7
2,771,517 UART: [afmc] AUTHORITY.KEYID = 5
2,807,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,340 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,287 UART: [afmc] --
2,850,337 UART: [cold-reset] --
2,851,043 UART: [state] Locking Datavault
2,852,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,854 UART: [state] Locking ICCM
2,853,302 UART: [exit] Launching FMC @ 0x40000130
2,858,631 UART:
2,858,647 UART: Running Caliptra FMC ...
2,859,055 UART:
2,859,109 UART: [state] CFI Enabled
2,869,396 UART: [fht] FMC Alias Private Key: 7
2,977,711 UART: [art] Extend RT PCRs Done
2,978,139 UART: [art] Lock RT PCRs Done
2,979,809 UART: [art] Populate DV Done
2,988,370 UART: [fht] FMC Alias Private Key: 7
2,989,352 UART: [art] Derive CDI
2,989,632 UART: [art] Store in in slot 0x4
3,075,339 UART: [art] Derive Key Pair
3,075,699 UART: [art] Store priv key in slot 0x5
3,088,627 UART: [art] Derive Key Pair - Done
3,103,336 UART: [art] Signing Cert with AUTHO
3,103,816 UART: RITY.KEYID = 7
3,118,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,593 UART: [art] PUB.X = 6F05E8EEB5F2A92F4A9CDEAEEAAA30CCCE94BFAB3801A0AB2169BF1A23DDF0D50756392019AA663F66EF9475798D5B18
3,126,378 UART: [art] PUB.Y = 26D083E4A8D1B2102941853C002738FB6AAA204A3D43BD5A6113FB4E6A3F44BFDE4C16655E4021E76557A68790FE9BEC
3,133,312 UART: [art] SIG.R = BAD5B62A736A304C4D12DA6FF641D9BDA6D097CB1864F9F08C44059DCF56DF218B44F230B5CAE3747099DA5C2CC93A8E
3,140,097 UART: [art] SIG.S = DDEA2D9FA282EC77BC1DBDFAB503B87E7AC7E14050C486CFB327994B69C4CB29FF313143444CC4B511CE09DB8EEC39E1
3,163,622 UART: Caliptra RT
3,163,875 UART: [state] CFI Enabled
3,272,069 UART: [rt] RT listening for mailbox commands...
3,272,739 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,099 UART: [rt]cmd =0x53574545, len=84
3,304,417 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,915 >>> mbox cmd response: success
2,679,765 UART:
2,679,781 UART: Running Caliptra FMC ...
2,680,189 UART:
2,680,243 UART: [state] CFI Enabled
2,690,652 UART: [fht] FMC Alias Private Key: 7
2,798,669 UART: [art] Extend RT PCRs Done
2,799,097 UART: [art] Lock RT PCRs Done
2,800,603 UART: [art] Populate DV Done
2,808,714 UART: [fht] FMC Alias Private Key: 7
2,809,782 UART: [art] Derive CDI
2,810,062 UART: [art] Store in in slot 0x4
2,895,737 UART: [art] Derive Key Pair
2,896,097 UART: [art] Store priv key in slot 0x5
2,909,783 UART: [art] Derive Key Pair - Done
2,924,367 UART: [art] Signing Cert with AUTHO
2,924,847 UART: RITY.KEYID = 7
2,940,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,816 UART: [art] PUB.X = 37503298FE46D3021EC3500BB700B86B32973D44D7DBD6841ACF20F7EE511734F350D81D1B7BC7AA086D45F4ABABC67A
2,947,565 UART: [art] PUB.Y = 91FF64AEDA30FD5AF73F5FF37D7C0CD52542B4823E459C6731D27061E74EEB98732495397D1670BA2D2A7D1934DF8E70
2,954,518 UART: [art] SIG.R = 72274EEB0D2CEC2D9683893CA384BC85C048348510B3C594F02F73D9A415744B653391E3F8E57B5B7FE8B1884AC39D59
2,961,285 UART: [art] SIG.S = 3AC51C6A64D9086E7DB10293E26E1D40955A0C1315FECA65C21EF03EEAC1FD0456FE027F66CF25DBD69CD878801C8ABA
2,985,233 UART: Caliptra RT
2,985,486 UART: [state] CFI Enabled
3,092,849 UART: [rt] RT listening for mailbox commands...
3,093,519 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,737 UART: [rt]cmd =0x53574545, len=84
3,125,097 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,436 UART: [kat] SHA2-256
902,376 UART: [kat] SHA2-384
905,345 UART: [kat] SHA2-512-ACC
907,246 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,523 UART: [kat] LMS
1,169,835 UART: [kat] --
1,171,088 UART: [cold-reset] ++
1,171,596 UART: [fht] FHT @ 0x50003400
1,174,234 UART: [idev] ++
1,174,402 UART: [idev] CDI.KEYID = 6
1,174,763 UART: [idev] SUBJECT.KEYID = 7
1,175,188 UART: [idev] UDS.KEYID = 0
1,175,534 ready_for_fw is high
1,175,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,209,877 UART: [ldev] ++
1,210,045 UART: [ldev] CDI.KEYID = 6
1,210,409 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,972 UART: [fwproc] Recv command 0x46574c44
1,283,705 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,216 >>> mbox cmd response: success
2,771,381 UART: [afmc] ++
2,771,549 UART: [afmc] CDI.KEYID = 6
2,771,912 UART: [afmc] SUBJECT.KEYID = 7
2,772,338 UART: [afmc] AUTHORITY.KEYID = 5
2,807,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,630 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,038 UART: [afmc] --
2,851,034 UART: [cold-reset] --
2,851,850 UART: [state] Locking Datavault
2,853,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,741 UART: [state] Locking ICCM
2,854,175 UART: [exit] Launching FMC @ 0x40000130
2,859,504 UART:
2,859,520 UART: Running Caliptra FMC ...
2,859,928 UART:
2,860,071 UART: [state] CFI Enabled
2,870,614 UART: [fht] FMC Alias Private Key: 7
2,978,809 UART: [art] Extend RT PCRs Done
2,979,237 UART: [art] Lock RT PCRs Done
2,980,717 UART: [art] Populate DV Done
2,989,050 UART: [fht] FMC Alias Private Key: 7
2,990,184 UART: [art] Derive CDI
2,990,464 UART: [art] Store in in slot 0x4
3,076,147 UART: [art] Derive Key Pair
3,076,507 UART: [art] Store priv key in slot 0x5
3,089,993 UART: [art] Derive Key Pair - Done
3,104,926 UART: [art] Signing Cert with AUTHO
3,105,406 UART: RITY.KEYID = 7
3,121,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,911 UART: [art] PUB.X = AB756A3ABC74DA4ED9E571F9069C4337350A60FD798B3CD1E4494E42BADA026636214188C98C89FD7F21B4AECBDE437F
3,128,686 UART: [art] PUB.Y = CA6595DCA6CF0D79A93FA8DA1B08077595B5FFFB676D4E019E58161510CB8DDB971BD1EBF2435EFBC9AAEFCDE9EEBBA2
3,135,658 UART: [art] SIG.R = E33569998FEC18E55F2C2C1C2ABC1FDB6CEF454D54BC073FBE3B2262462D7C714F279158BB4FE0546A83A1134CE65A30
3,142,437 UART: [art] SIG.S = 30BE6CA421F4C8DBB20539C0AD87049FFA8498CCD08F4C25B814CDB20758948998D2F65E35CC70AB2B23828844628173
3,165,725 UART: Caliptra RT
3,166,070 UART: [state] CFI Enabled
3,273,229 UART: [rt] RT listening for mailbox commands...
3,273,899 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,331 UART: [rt]cmd =0x53574545, len=84
3,305,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,923 ready_for_fw is high
1,056,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,432 >>> mbox cmd response: success
2,681,618 UART:
2,681,634 UART: Running Caliptra FMC ...
2,682,042 UART:
2,682,185 UART: [state] CFI Enabled
2,692,872 UART: [fht] FMC Alias Private Key: 7
2,801,447 UART: [art] Extend RT PCRs Done
2,801,875 UART: [art] Lock RT PCRs Done
2,803,445 UART: [art] Populate DV Done
2,811,676 UART: [fht] FMC Alias Private Key: 7
2,812,676 UART: [art] Derive CDI
2,812,956 UART: [art] Store in in slot 0x4
2,898,855 UART: [art] Derive Key Pair
2,899,215 UART: [art] Store priv key in slot 0x5
2,913,137 UART: [art] Derive Key Pair - Done
2,927,429 UART: [art] Signing Cert with AUTHO
2,927,909 UART: RITY.KEYID = 7
2,943,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,954 UART: [art] PUB.X = E88B636B3D37EC67516B8A29A2C412EEE92720D9CDC23DAD899DAFD66B00950140DD576B5B9E53467FEAB16BFE226EFA
2,950,717 UART: [art] PUB.Y = CFBD3D9340F49D69453995171D65D2CCE36E49AC1E7732B04CC25362C49EEDA3122D00CA154DE4C174E6F00CCBB0641C
2,957,654 UART: [art] SIG.R = 39F1BE0C72245C673FB66AC8BA159F9AD92C92F9380DEBCC013C58A0D965F72A3594F5B12F4637E2EFFD10078B1791C6
2,964,422 UART: [art] SIG.S = A3D04ED082ADB18D874D10045B6C722A01A548CEEB0563F2160E98D05AE02FDE859663F842E4CBAEE858413827E4DDD4
2,988,109 UART: Caliptra RT
2,988,454 UART: [state] CFI Enabled
3,096,245 UART: [rt] RT listening for mailbox commands...
3,096,915 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,135 UART: [rt]cmd =0x53574545, len=84
3,128,489 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,089 UART:
192,468 UART: Running Caliptra ROM ...
193,612 UART:
193,763 UART: [state] CFI Enabled
264,299 UART: [state] LifecycleState = Unprovisioned
266,300 UART: [state] DebugLocked = No
268,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,750 UART: [kat] SHA2-256
443,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,943 UART: [kat] ++
454,463 UART: [kat] sha1
465,975 UART: [kat] SHA2-256
468,651 UART: [kat] SHA2-384
473,861 UART: [kat] SHA2-512-ACC
476,228 UART: [kat] ECC-384
2,765,635 UART: [kat] HMAC-384Kdf
2,778,879 UART: [kat] LMS
3,969,136 UART: [kat] --
3,974,057 UART: [cold-reset] ++
3,976,558 UART: [fht] Storing FHT @ 0x50003400
3,989,101 UART: [idev] ++
3,989,675 UART: [idev] CDI.KEYID = 6
3,990,587 UART: [idev] SUBJECT.KEYID = 7
3,991,835 UART: [idev] UDS.KEYID = 0
3,992,875 ready_for_fw is high
3,993,070 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,146 UART: [idev] Erasing UDS.KEYID = 0
7,324,196 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,106 UART: [idev] --
7,350,194 UART: [ldev] ++
7,350,764 UART: [ldev] CDI.KEYID = 6
7,351,783 UART: [ldev] SUBJECT.KEYID = 5
7,352,943 UART: [ldev] AUTHORITY.KEYID = 7
7,354,172 UART: [ldev] FE.KEYID = 1
7,401,928 UART: [ldev] Erasing FE.KEYID = 1
10,732,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,917 UART: [ldev] --
13,095,292 UART: [fwproc] Waiting for Commands...
13,097,284 UART: [fwproc] Received command 0x46574c44
13,099,471 UART: [fwproc] Received Image of size 113760 bytes
17,154,189 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,228,838 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,297,698 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,613,600 >>> mbox cmd response: success
17,616,911 UART: [afmc] ++
17,617,540 UART: [afmc] CDI.KEYID = 6
17,618,459 UART: [afmc] SUBJECT.KEYID = 7
17,619,677 UART: [afmc] AUTHORITY.KEYID = 5
20,985,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,921 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,360 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,203 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,599 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,827 UART: [afmc] --
23,358,012 UART: [cold-reset] --
23,361,893 UART: [state] Locking Datavault
23,368,441 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,141 UART: [state] Locking ICCM
23,371,375 UART: [exit] Launching FMC @ 0x40000130
23,379,764 UART:
23,380,033 UART: Running Caliptra FMC ...
23,381,143 UART:
23,381,307 UART: [state] CFI Enabled
23,446,134 UART: [fht] FMC Alias Private Key: 7
25,783,720 UART: [art] Extend RT PCRs Done
25,784,942 UART: [art] Lock RT PCRs Done
25,786,728 UART: [art] Populate DV Done
25,792,193 UART: [fht] FMC Alias Private Key: 7
25,793,788 UART: [art] Derive CDI
25,794,607 UART: [art] Store in in slot 0x4
25,854,685 UART: [art] Derive Key Pair
25,855,734 UART: [art] Store priv key in slot 0x5
29,149,473 UART: [art] Derive Key Pair - Done
29,162,638 UART: [art] Signing Cert with AUTHO
29,163,936 UART: RITY.KEYID = 7
31,450,896 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,405 UART: [art] PUB.X = BB86B8EE191A10618A9DD2CAFF352ED42079F19636DC5B999FBE46EF4DD229F28C09004FAEDAF5E31213DB3347447FD2
31,459,725 UART: [art] PUB.Y = 1C9107757C564806ED886F5172778A8A63209A8235E6962356E4B2BAC6EB3EC91ABBACB84058D6CD27EE9CCCE5EC7180
31,466,915 UART: [art] SIG.R = 64358FAC79E112034D60647A41404D69FFB3A8B6AB2C41B601CE6D7909D1D28D0086D88DD9C2896951F4C28386F645D3
31,474,307 UART: [art] SIG.S = 7D9B5AA4F62AD2C3B566DD6EACA58FB8483582FC75025C7DA198CB25430DDC0F5C062EBC15E341C9BD9229E4858EB344
32,779,652 UART: Caliptra RT
32,780,373 UART: [state] CFI Enabled
32,941,535 UART: [rt] RT listening for mailbox commands...
32,943,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,974,914 UART: [rt]cmd =0x4d454153, len=108
32,976,907 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,803,588 ready_for_fw is high
3,804,142 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,866,813 >>> mbox cmd response: success
23,565,511 UART:
23,565,898 UART: Running Caliptra FMC ...
23,567,039 UART:
23,567,208 UART: [state] CFI Enabled
23,636,083 UART: [fht] FMC Alias Private Key: 7
25,972,727 UART: [art] Extend RT PCRs Done
25,973,959 UART: [art] Lock RT PCRs Done
25,975,806 UART: [art] Populate DV Done
25,981,455 UART: [fht] FMC Alias Private Key: 7
25,982,981 UART: [art] Derive CDI
25,983,720 UART: [art] Store in in slot 0x4
26,044,658 UART: [art] Derive Key Pair
26,045,663 UART: [art] Store priv key in slot 0x5
29,338,655 UART: [art] Derive Key Pair - Done
29,351,653 UART: [art] Signing Cert with AUTHO
29,352,987 UART: RITY.KEYID = 7
31,640,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,426 UART: [art] PUB.X = 467C5AD215AC459CEA935157C9D3E0838E456C2427FACC8BF438C2D3B748C0EEF66AACD8E2159E5181742C01D30B82B3
31,649,648 UART: [art] PUB.Y = F1872BF69B14AECF7CDA95032529935FC0113B85173C15EEDF3C4B9425622C4A0CCE588E16C8D6C36DA27765978AEFE9
31,656,901 UART: [art] SIG.R = 6DF2E9D55768E1DC017D0C591F39F50A85276CB5EDD383730B958705B469E44FAF3D825811B9CE6A79D3FB366548ED61
31,664,287 UART: [art] SIG.S = 661F1F5032AE6C12FB53E2E5AADF50048EDF0EC28D9B517BFE40C02B6B9486A5EE918CF3A5384F9BE860B02F28705217
32,968,888 UART: Caliptra RT
32,969,614 UART: [state] CFI Enabled
33,130,925 UART: [rt] RT listening for mailbox commands...
33,132,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,243 UART: [rt]cmd =0x4d454153, len=108
33,166,429 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
192,858 UART:
193,222 UART: Running Caliptra ROM ...
194,321 UART:
604,108 UART: [state] CFI Enabled
615,637 UART: [state] LifecycleState = Unprovisioned
617,581 UART: [state] DebugLocked = No
619,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,088 UART: [kat] SHA2-256
793,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,391 UART: [kat] ++
804,832 UART: [kat] sha1
816,410 UART: [kat] SHA2-256
819,124 UART: [kat] SHA2-384
824,822 UART: [kat] SHA2-512-ACC
827,207 UART: [kat] ECC-384
3,108,726 UART: [kat] HMAC-384Kdf
3,119,741 UART: [kat] LMS
4,309,839 UART: [kat] --
4,315,634 UART: [cold-reset] ++
4,316,999 UART: [fht] Storing FHT @ 0x50003400
4,329,045 UART: [idev] ++
4,329,616 UART: [idev] CDI.KEYID = 6
4,330,501 UART: [idev] SUBJECT.KEYID = 7
4,331,807 UART: [idev] UDS.KEYID = 0
4,332,820 ready_for_fw is high
4,333,030 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,475,935 UART: [idev] Erasing UDS.KEYID = 0
7,617,700 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,943 UART: [idev] --
7,644,253 UART: [ldev] ++
7,644,838 UART: [ldev] CDI.KEYID = 6
7,645,849 UART: [ldev] SUBJECT.KEYID = 5
7,647,005 UART: [ldev] AUTHORITY.KEYID = 7
7,648,234 UART: [ldev] FE.KEYID = 1
7,660,117 UART: [ldev] Erasing FE.KEYID = 1
10,949,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,812 UART: [ldev] --
13,311,848 UART: [fwproc] Waiting for Commands...
13,313,660 UART: [fwproc] Received command 0x46574c44
13,315,836 UART: [fwproc] Received Image of size 113760 bytes
17,360,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,059 >>> mbox cmd response: success
17,831,773 UART: [afmc] ++
17,832,399 UART: [afmc] CDI.KEYID = 6
17,833,309 UART: [afmc] SUBJECT.KEYID = 7
17,834,522 UART: [afmc] AUTHORITY.KEYID = 5
21,146,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,854 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,119 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,465 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,318 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,776 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,162 UART: [afmc] --
23,510,897 UART: [cold-reset] --
23,515,927 UART: [state] Locking Datavault
23,519,741 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,526 UART: [state] Locking ICCM
23,523,736 UART: [exit] Launching FMC @ 0x40000130
23,532,131 UART:
23,532,364 UART: Running Caliptra FMC ...
23,533,462 UART:
23,533,619 UART: [state] CFI Enabled
23,542,015 UART: [fht] FMC Alias Private Key: 7
25,873,448 UART: [art] Extend RT PCRs Done
25,874,667 UART: [art] Lock RT PCRs Done
25,876,294 UART: [art] Populate DV Done
25,881,698 UART: [fht] FMC Alias Private Key: 7
25,883,287 UART: [art] Derive CDI
25,884,022 UART: [art] Store in in slot 0x4
25,926,990 UART: [art] Derive Key Pair
25,928,027 UART: [art] Store priv key in slot 0x5
29,170,383 UART: [art] Derive Key Pair - Done
29,183,449 UART: [art] Signing Cert with AUTHO
29,184,757 UART: RITY.KEYID = 7
31,464,379 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,884 UART: [art] PUB.X = 3C681D2D845C85AEC108370B2A8FD84353187B48EE7FE71E017E88522709AC406F8A5BBB0276EA19B92763B95FB52859
31,473,107 UART: [art] PUB.Y = 11340FD8B843DE85503502853EA0E877902B3DBCA5DD21411D890077ABBC07EAA699DC330D0FC6743BDAD45729D45841
31,480,361 UART: [art] SIG.R = E4492E8091457EAF066B70004E921B66BEAD33A16920290EE288754063001E47E83B76AEFEBC05B95B6F6D834892E9ED
31,487,673 UART: [art] SIG.S = B4E1B50AAEFAA4E9EE5C990A929434D984A50E5F51E3FCF71C5467393A359EDEF557833BD960520FA060642F6E260367
32,792,643 UART: Caliptra RT
32,793,346 UART: [state] CFI Enabled
32,911,262 UART: [rt] RT listening for mailbox commands...
32,913,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,943,908 UART: [rt]cmd =0x4d454153, len=108
32,945,800 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
4,127,249 ready_for_fw is high
4,127,686 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,814 >>> mbox cmd response: success
23,707,180 UART:
23,707,577 UART: Running Caliptra FMC ...
23,708,672 UART:
23,708,845 UART: [state] CFI Enabled
23,716,966 UART: [fht] FMC Alias Private Key: 7
26,048,242 UART: [art] Extend RT PCRs Done
26,049,475 UART: [art] Lock RT PCRs Done
26,051,566 UART: [art] Populate DV Done
26,057,034 UART: [fht] FMC Alias Private Key: 7
26,058,686 UART: [art] Derive CDI
26,059,425 UART: [art] Store in in slot 0x4
26,102,299 UART: [art] Derive Key Pair
26,103,341 UART: [art] Store priv key in slot 0x5
29,345,348 UART: [art] Derive Key Pair - Done
29,358,456 UART: [art] Signing Cert with AUTHO
29,359,756 UART: RITY.KEYID = 7
31,639,235 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,742 UART: [art] PUB.X = 6739AA78E5497106C8CFFD1FBC62FDCCEE9C02722FA8A9C04F723E264BD3094B50D014EC90A040AB62D9CC041E8BA68C
31,648,034 UART: [art] PUB.Y = C0617718F3A944E54AE5C56CC0FF77F2E0AAA525AAA09D0A7ED037B647B242C0B5C406CEE94A00ED87BD0C31268E6322
31,655,288 UART: [art] SIG.R = 5256DD507468A6FA6F8CE1DDB3C56B02D9979BB7220BA9D48A7ABC5385F908DF442608201B9F963DB6F45FC305707B54
31,662,676 UART: [art] SIG.S = A7F94A238B4CA4B233D72AC54550B828ECCEF6AED6FE34295A7E252EA7DF3C007E2684D6182B184BE9DEBB806329BB02
32,968,134 UART: Caliptra RT
32,968,856 UART: [state] CFI Enabled
33,086,219 UART: [rt] RT listening for mailbox commands...
33,088,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,118,881 UART: [rt]cmd =0x4d454153, len=108
33,120,517 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,595 UART:
192,994 UART: Running Caliptra ROM ...
194,185 UART:
194,340 UART: [state] CFI Enabled
267,342 UART: [state] LifecycleState = Unprovisioned
269,116 UART: [state] DebugLocked = No
270,434 UART: [state] WD Timer not started. Device not locked for debugging
274,612 UART: [kat] SHA2-256
453,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,307 UART: [kat] ++
465,831 UART: [kat] sha1
477,278 UART: [kat] SHA2-256
480,279 UART: [kat] SHA2-384
485,973 UART: [kat] SHA2-512-ACC
488,976 UART: [kat] ECC-384
2,948,271 UART: [kat] HMAC-384Kdf
2,971,249 UART: [kat] LMS
3,500,686 UART: [kat] --
3,504,689 UART: [cold-reset] ++
3,505,901 UART: [fht] FHT @ 0x50003400
3,516,325 UART: [idev] ++
3,516,892 UART: [idev] CDI.KEYID = 6
3,517,775 UART: [idev] SUBJECT.KEYID = 7
3,518,899 UART: [idev] UDS.KEYID = 0
3,519,861 ready_for_fw is high
3,520,044 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,537 UART: [idev] Erasing UDS.KEYID = 0
6,024,434 UART: [idev] Sha1 KeyId Algorithm
6,046,639 UART: [idev] --
6,050,613 UART: [ldev] ++
6,051,193 UART: [ldev] CDI.KEYID = 6
6,052,103 UART: [ldev] SUBJECT.KEYID = 5
6,053,283 UART: [ldev] AUTHORITY.KEYID = 7
6,054,580 UART: [ldev] FE.KEYID = 1
6,100,446 UART: [ldev] Erasing FE.KEYID = 1
8,603,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,126 UART: [ldev] --
10,414,305 UART: [fwproc] Wait for Commands...
10,415,910 UART: [fwproc] Recv command 0x46574c44
10,417,994 UART: [fwproc] Recv'd Img size: 114084 bytes
13,818,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,272,582 >>> mbox cmd response: success
14,276,187 UART: [afmc] ++
14,276,805 UART: [afmc] CDI.KEYID = 6
14,277,694 UART: [afmc] SUBJECT.KEYID = 7
14,278,902 UART: [afmc] AUTHORITY.KEYID = 5
16,808,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,088 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,849 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,836 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,724 UART: [afmc] --
18,608,110 UART: [cold-reset] --
18,612,134 UART: [state] Locking Datavault
18,617,753 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,452 UART: [state] Locking ICCM
18,622,031 UART: [exit] Launching FMC @ 0x40000130
18,630,425 UART:
18,630,684 UART: Running Caliptra FMC ...
18,631,786 UART:
18,631,945 UART: [state] CFI Enabled
18,691,442 UART: [fht] FMC Alias Private Key: 7
20,455,237 UART: [art] Extend RT PCRs Done
20,456,461 UART: [art] Lock RT PCRs Done
20,458,112 UART: [art] Populate DV Done
20,463,417 UART: [fht] FMC Alias Private Key: 7
20,464,945 UART: [art] Derive CDI
20,465,671 UART: [art] Store in in slot 0x4
20,523,617 UART: [art] Derive Key Pair
20,524,654 UART: [art] Store priv key in slot 0x5
22,987,427 UART: [art] Derive Key Pair - Done
23,000,604 UART: [art] Signing Cert with AUTHO
23,001,909 UART: RITY.KEYID = 7
24,713,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,283 UART: [art] PUB.X = 9D941F4D922633108D2089D5EAB6C0E7270FC401A3A99A00804410F10C0B90C7D0B311B993DF999E9614F6A9D58ABB87
24,722,462 UART: [art] PUB.Y = 398EA62391637A4A8272E6E8573F56EA10A7EEEFADFCC861511EA8DBD88E8CD5C6BB8C3343556D00337A0EC65687E1AD
24,729,730 UART: [art] SIG.R = 0828348E4745C1EF86650D0E2D4F0E16A7CC36148297364AFA35BF51D60359DD75E5E4A90EBBA8B3AEC9FAA78D86DA1D
24,737,095 UART: [art] SIG.S = 1C7F5A85BB897DC4E506DA3DF3DE590C1FA793D4857034C36344EAD7E4E7F76C259F61B680B9AF333CB32ECFFB34FCB4
25,715,753 UART: Caliptra RT
25,716,465 UART: [state] CFI Enabled
25,879,753 UART: [rt] RT listening for mailbox commands...
25,881,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,912,758 UART: [rt]cmd =0x4d454153, len=108
25,914,843 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
3,362,219 ready_for_fw is high
3,362,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,026,866 >>> mbox cmd response: success
18,319,690 UART:
18,320,098 UART: Running Caliptra FMC ...
18,321,234 UART:
18,321,397 UART: [state] CFI Enabled
18,390,157 UART: [fht] FMC Alias Private Key: 7
20,154,418 UART: [art] Extend RT PCRs Done
20,155,628 UART: [art] Lock RT PCRs Done
20,157,362 UART: [art] Populate DV Done
20,162,663 UART: [fht] FMC Alias Private Key: 7
20,164,199 UART: [art] Derive CDI
20,165,014 UART: [art] Store in in slot 0x4
20,222,832 UART: [art] Derive Key Pair
20,223,835 UART: [art] Store priv key in slot 0x5
22,685,690 UART: [art] Derive Key Pair - Done
22,698,420 UART: [art] Signing Cert with AUTHO
22,699,724 UART: RITY.KEYID = 7
24,410,800 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,287 UART: [art] PUB.X = E4220918CEA96CA94FB1A070CA3B6C293708A1632F43CE9FCC1DF5B0636BAA44D5B7F7BFD41703FA74BE5F40FC278E26
24,419,560 UART: [art] PUB.Y = AFEDC8F48A5E57A3B9D8069E4919A1FD9D21168AA1500789680D572ECFBA501777C7F37AC3894C0AAF6D654F7A689EA2
24,426,850 UART: [art] SIG.R = E61CC2EFFFE84063EE14D54F22E98F0F89BFBB05C04A3E3072A833AECA46C4ABC78A340051AFE9211CE108BA2499CE04
24,434,232 UART: [art] SIG.S = DC9BE9F5772A359727EFCE547F625E384E5FF694D7D315604E623C57DFBED40AAC96778322DAD5B7146AA7AE87A0C805
25,412,720 UART: Caliptra RT
25,413,444 UART: [state] CFI Enabled
25,579,442 UART: [rt] RT listening for mailbox commands...
25,581,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,612,589 UART: [rt]cmd =0x4d454153, len=108
25,614,314 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,882 writing to cptra_bootfsm_go
193,134 UART:
193,515 UART: Running Caliptra ROM ...
194,709 UART:
604,175 UART: [state] CFI Enabled
617,976 UART: [state] LifecycleState = Unprovisioned
619,856 UART: [state] DebugLocked = No
621,608 UART: [state] WD Timer not started. Device not locked for debugging
625,288 UART: [kat] SHA2-256
804,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,978 UART: [kat] ++
816,431 UART: [kat] sha1
827,513 UART: [kat] SHA2-256
830,521 UART: [kat] SHA2-384
836,373 UART: [kat] SHA2-512-ACC
839,338 UART: [kat] ECC-384
3,282,484 UART: [kat] HMAC-384Kdf
3,295,785 UART: [kat] LMS
3,825,251 UART: [kat] --
3,828,771 UART: [cold-reset] ++
3,831,277 UART: [fht] FHT @ 0x50003400
3,842,542 UART: [idev] ++
3,843,112 UART: [idev] CDI.KEYID = 6
3,844,019 UART: [idev] SUBJECT.KEYID = 7
3,845,203 UART: [idev] UDS.KEYID = 0
3,846,256 ready_for_fw is high
3,846,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,746 UART: [idev] Erasing UDS.KEYID = 0
6,315,313 UART: [idev] Sha1 KeyId Algorithm
6,339,245 UART: [idev] --
6,344,700 UART: [ldev] ++
6,345,275 UART: [ldev] CDI.KEYID = 6
6,346,192 UART: [ldev] SUBJECT.KEYID = 5
6,347,352 UART: [ldev] AUTHORITY.KEYID = 7
6,348,582 UART: [ldev] FE.KEYID = 1
6,359,602 UART: [ldev] Erasing FE.KEYID = 1
8,834,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,803 UART: [ldev] --
10,627,905 UART: [fwproc] Wait for Commands...
10,630,426 UART: [fwproc] Recv command 0x46574c44
10,632,465 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,090 >>> mbox cmd response: success
14,492,548 UART: [afmc] ++
14,493,151 UART: [afmc] CDI.KEYID = 6
14,494,034 UART: [afmc] SUBJECT.KEYID = 7
14,495,256 UART: [afmc] AUTHORITY.KEYID = 5
16,992,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,342 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,143 UART: [afmc] --
18,790,905 UART: [cold-reset] --
18,794,931 UART: [state] Locking Datavault
18,798,559 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,261 UART: [state] Locking ICCM
18,802,341 UART: [exit] Launching FMC @ 0x40000130
18,810,736 UART:
18,810,979 UART: Running Caliptra FMC ...
18,812,082 UART:
18,812,244 UART: [state] CFI Enabled
18,820,402 UART: [fht] FMC Alias Private Key: 7
20,576,685 UART: [art] Extend RT PCRs Done
20,577,925 UART: [art] Lock RT PCRs Done
20,579,634 UART: [art] Populate DV Done
20,585,208 UART: [fht] FMC Alias Private Key: 7
20,586,802 UART: [art] Derive CDI
20,587,540 UART: [art] Store in in slot 0x4
20,630,131 UART: [art] Derive Key Pair
20,631,174 UART: [art] Store priv key in slot 0x5
23,057,673 UART: [art] Derive Key Pair - Done
23,070,612 UART: [art] Signing Cert with AUTHO
23,071,916 UART: RITY.KEYID = 7
24,777,044 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,548 UART: [art] PUB.X = 9A3BD07D0A2DAF178EA4F8DC015BAF556BD1E5C09F89ED805B8783CA06FD61A7B4BD3D6A121FEC140F215970CAD51BCC
24,785,876 UART: [art] PUB.Y = 00346F8050A8A05C8206883EC01ACE9A121C4A3884F40786DD7FD3FD3A3DD87FCE23B3ABD9E3B40FF233DBE80D7C3567
24,793,134 UART: [art] SIG.R = F42BB965626474E0E2498DA8C18A07E636B3A534A7DFC3D26FEA176FC1DD49A179C934E0A1AE04D73EE1DEEEF6F40A50
24,800,498 UART: [art] SIG.S = BBC4768988FCC7EC694660404B9FE02295AAC132E89C282FF2E6DF1501CFA99C9C5865A68D97487D076AF55489C6F5C2
25,778,911 UART: Caliptra RT
25,779,646 UART: [state] CFI Enabled
25,896,085 UART: [rt] RT listening for mailbox commands...
25,897,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,928,646 UART: [rt]cmd =0x4d454153, len=108
25,930,171 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
3,694,228 ready_for_fw is high
3,694,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,972 >>> mbox cmd response: success
18,508,715 UART:
18,509,118 UART: Running Caliptra FMC ...
18,510,268 UART:
18,510,435 UART: [state] CFI Enabled
18,518,288 UART: [fht] FMC Alias Private Key: 7
20,274,856 UART: [art] Extend RT PCRs Done
20,276,081 UART: [art] Lock RT PCRs Done
20,278,140 UART: [art] Populate DV Done
20,283,391 UART: [fht] FMC Alias Private Key: 7
20,285,051 UART: [art] Derive CDI
20,285,876 UART: [art] Store in in slot 0x4
20,328,366 UART: [art] Derive Key Pair
20,329,366 UART: [art] Store priv key in slot 0x5
22,755,879 UART: [art] Derive Key Pair - Done
22,768,824 UART: [art] Signing Cert with AUTHO
22,770,128 UART: RITY.KEYID = 7
24,475,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,120 UART: [art] PUB.X = 3A2F7AD6E172C55DB0C162E52612763925DC7DBCF1492E9BF5FA4670B3C2718B16FDE9EFEC3288272244173C5AAB1358
24,484,341 UART: [art] PUB.Y = CBDA663F02F947D394F1AF5B8833AEFB782C1286A547325472ADEBA78CA0BF439B3CC8CAE5AF8EBE9120C456C493C109
24,491,635 UART: [art] SIG.R = 2E10FCCFC3FE23CE98283F6F3A0637E7571A12E0ED63AC8276B6BA16038DBBC2A33725CB6AA3A9DA3727161056888555
24,499,065 UART: [art] SIG.S = AE92ECE2AD21C741A1F94CF697EC9AE39C8CAC514C1AD92F42C4E4295BD672346A5CDAC28920E6A2B6CBA5A4A9E8C9E7
25,478,025 UART: Caliptra RT
25,478,728 UART: [state] CFI Enabled
25,595,734 UART: [rt] RT listening for mailbox commands...
25,597,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,628,494 UART: [rt]cmd =0x4d454153, len=108
25,630,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,399 UART:
192,938 UART: Running Caliptra ROM ...
194,084 UART:
194,252 UART: [state] CFI Enabled
264,258 UART: [state] LifecycleState = Unprovisioned
266,702 UART: [state] DebugLocked = No
269,152 UART: [state] WD Timer not started. Device not locked for debugging
273,575 UART: [kat] SHA2-256
463,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,221 UART: [kat] ++
474,665 UART: [kat] sha1
486,459 UART: [kat] SHA2-256
489,460 UART: [kat] SHA2-384
495,730 UART: [kat] SHA2-512-ACC
498,318 UART: [kat] ECC-384
2,945,769 UART: [kat] HMAC-384Kdf
2,972,311 UART: [kat] LMS
3,504,105 UART: [kat] --
3,509,589 UART: [cold-reset] ++
3,510,750 UART: [fht] FHT @ 0x50003400
3,521,976 UART: [idev] ++
3,522,677 UART: [idev] CDI.KEYID = 6
3,523,627 UART: [idev] SUBJECT.KEYID = 7
3,524,866 UART: [idev] UDS.KEYID = 0
3,525,765 ready_for_fw is high
3,525,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,520 UART: [idev] Erasing UDS.KEYID = 0
6,027,327 UART: [idev] Sha1 KeyId Algorithm
6,049,016 UART: [idev] --
6,054,632 UART: [ldev] ++
6,055,309 UART: [ldev] CDI.KEYID = 6
6,056,248 UART: [ldev] SUBJECT.KEYID = 5
6,057,404 UART: [ldev] AUTHORITY.KEYID = 7
6,058,632 UART: [ldev] FE.KEYID = 1
6,101,403 UART: [ldev] Erasing FE.KEYID = 1
8,612,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,371 UART: [ldev] --
10,412,089 UART: [fwproc] Wait for Commands...
10,413,703 UART: [fwproc] Recv command 0x46574c44
10,415,965 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,597,252 >>> mbox cmd response: success
14,601,420 UART: [afmc] ++
14,602,134 UART: [afmc] CDI.KEYID = 6
14,603,249 UART: [afmc] SUBJECT.KEYID = 7
14,604,825 UART: [afmc] AUTHORITY.KEYID = 5
17,153,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,999 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,109 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,650 UART: [afmc] --
18,970,833 UART: [cold-reset] --
18,976,648 UART: [state] Locking Datavault
18,980,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,653 UART: [state] Locking ICCM
18,985,040 UART: [exit] Launching FMC @ 0x40000130
18,993,692 UART:
18,993,932 UART: Running Caliptra FMC ...
18,995,031 UART:
18,995,209 UART: [state] CFI Enabled
19,052,049 UART: [fht] FMC Alias Private Key: 7
20,815,853 UART: [art] Extend RT PCRs Done
20,817,074 UART: [art] Lock RT PCRs Done
20,818,513 UART: [art] Populate DV Done
20,824,049 UART: [fht] FMC Alias Private Key: 7
20,825,567 UART: [art] Derive CDI
20,826,303 UART: [art] Store in in slot 0x4
20,884,966 UART: [art] Derive Key Pair
20,885,963 UART: [art] Store priv key in slot 0x5
23,348,814 UART: [art] Derive Key Pair - Done
23,361,547 UART: [art] Signing Cert with AUTHO
23,362,843 UART: RITY.KEYID = 7
25,075,212 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,730 UART: [art] PUB.X = 9E40F42FEAE7645A5A9376867111EFA62DB8BEE3C05E0A4B86510BE2CF20ED66BDE53F83054845A53609A7096E884553
25,083,995 UART: [art] PUB.Y = EAF4319421294E36C3264B255F0D0AD96869DB6B8D62976866BC4432BB1CCDB2579AACFBA7530DA14AEC68157F7D96B9
25,091,273 UART: [art] SIG.R = 912D62C5D184F8BA49324B09E637371C4738429F23FE795A2E75C528A6A22C5539B6B3E4838C9AA1749A271DB0F8F36F
25,098,648 UART: [art] SIG.S = 2F460771A70A7C5A21B134BBAE485463C1BBBF27501061D934144B1DF662B94DD44D579BC43ADBD8A3027BAEB7D32400
26,077,573 UART: Caliptra RT
26,078,266 UART: [state] CFI Enabled
26,241,761 UART: [rt] RT listening for mailbox commands...
26,243,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,275,006 UART: [rt]cmd =0x4d454153, len=108
26,277,062 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,438,805 ready_for_fw is high
3,439,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,274 >>> mbox cmd response: success
19,007,937 UART:
19,008,383 UART: Running Caliptra FMC ...
19,009,525 UART:
19,009,690 UART: [state] CFI Enabled
19,078,432 UART: [fht] FMC Alias Private Key: 7
20,841,951 UART: [art] Extend RT PCRs Done
20,843,179 UART: [art] Lock RT PCRs Done
20,844,749 UART: [art] Populate DV Done
20,850,158 UART: [fht] FMC Alias Private Key: 7
20,851,749 UART: [art] Derive CDI
20,852,561 UART: [art] Store in in slot 0x4
20,910,261 UART: [art] Derive Key Pair
20,911,295 UART: [art] Store priv key in slot 0x5
23,374,289 UART: [art] Derive Key Pair - Done
23,387,236 UART: [art] Signing Cert with AUTHO
23,388,694 UART: RITY.KEYID = 7
25,099,250 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,786 UART: [art] PUB.X = CE249CAE3C2ECF27AD572A981ED96D75583F4CF31150CC228597BC8AEBFCFF39BB11C32F7011FA0FD0AADEC517267A97
25,108,035 UART: [art] PUB.Y = 7426DB526CF4F779526C7F8AAEF37426020F1CF92A31BDD3233926836866D8BA652DDC7D895CA4AE9AAC4C912976C7A7
25,115,315 UART: [art] SIG.R = 899698EBD8587EEB22615F255BD2EC05B3558AE343738D69BB85C8A11C6EDADA6EC6D131938E0A2336017D86CF41014E
25,122,675 UART: [art] SIG.S = 96F7DD8014229536FCC29C8A6D9DEB0ECED7CC4B78CF85CFA272813E1E5C2EC77B2E3656BBB9DC3D7812751BCF693422
26,101,900 UART: Caliptra RT
26,102,615 UART: [state] CFI Enabled
26,267,775 UART: [rt] RT listening for mailbox commands...
26,269,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,300,955 UART: [rt]cmd =0x4d454153, len=108
26,302,712 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,769 writing to cptra_bootfsm_go
193,008 UART:
193,383 UART: Running Caliptra ROM ...
194,589 UART:
604,259 UART: [state] CFI Enabled
619,352 UART: [state] LifecycleState = Unprovisioned
621,732 UART: [state] DebugLocked = No
623,607 UART: [state] WD Timer not started. Device not locked for debugging
628,658 UART: [kat] SHA2-256
818,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,347 UART: [kat] ++
829,963 UART: [kat] sha1
841,271 UART: [kat] SHA2-256
844,346 UART: [kat] SHA2-384
850,833 UART: [kat] SHA2-512-ACC
853,424 UART: [kat] ECC-384
3,294,934 UART: [kat] HMAC-384Kdf
3,307,435 UART: [kat] LMS
3,839,281 UART: [kat] --
3,843,558 UART: [cold-reset] ++
3,845,494 UART: [fht] FHT @ 0x50003400
3,857,252 UART: [idev] ++
3,857,970 UART: [idev] CDI.KEYID = 6
3,858,886 UART: [idev] SUBJECT.KEYID = 7
3,860,149 UART: [idev] UDS.KEYID = 0
3,861,076 ready_for_fw is high
3,861,276 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,000 UART: [idev] Erasing UDS.KEYID = 0
6,335,551 UART: [idev] Sha1 KeyId Algorithm
6,358,905 UART: [idev] --
6,363,247 UART: [ldev] ++
6,363,986 UART: [ldev] CDI.KEYID = 6
6,364,902 UART: [ldev] SUBJECT.KEYID = 5
6,366,058 UART: [ldev] AUTHORITY.KEYID = 7
6,367,293 UART: [ldev] FE.KEYID = 1
6,377,182 UART: [ldev] Erasing FE.KEYID = 1
8,855,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,466 UART: [ldev] --
10,645,515 UART: [fwproc] Wait for Commands...
10,648,747 UART: [fwproc] Recv command 0x46574c44
10,651,001 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,833,628 >>> mbox cmd response: success
14,836,923 UART: [afmc] ++
14,837,634 UART: [afmc] CDI.KEYID = 6
14,838,892 UART: [afmc] SUBJECT.KEYID = 7
14,840,350 UART: [afmc] AUTHORITY.KEYID = 5
17,347,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,289 UART: [afmc] --
19,142,406 UART: [cold-reset] --
19,146,016 UART: [state] Locking Datavault
19,152,834 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,044 UART: [state] Locking ICCM
19,157,451 UART: [exit] Launching FMC @ 0x40000130
19,166,145 UART:
19,166,390 UART: Running Caliptra FMC ...
19,167,496 UART:
19,167,655 UART: [state] CFI Enabled
19,175,596 UART: [fht] FMC Alias Private Key: 7
20,932,418 UART: [art] Extend RT PCRs Done
20,933,632 UART: [art] Lock RT PCRs Done
20,935,358 UART: [art] Populate DV Done
20,940,836 UART: [fht] FMC Alias Private Key: 7
20,942,495 UART: [art] Derive CDI
20,943,321 UART: [art] Store in in slot 0x4
20,985,930 UART: [art] Derive Key Pair
20,986,974 UART: [art] Store priv key in slot 0x5
23,414,012 UART: [art] Derive Key Pair - Done
23,427,010 UART: [art] Signing Cert with AUTHO
23,428,315 UART: RITY.KEYID = 7
25,134,121 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,634 UART: [art] PUB.X = 9831390D8EEF579861FCC1B062F86C0E66DE9A00B6C2F097A721E371C93BA289668432A3525EF57BAC50EF2C544B82B7
25,142,854 UART: [art] PUB.Y = 12B8DE5B436436201D6C44A623A41D4E7F4B385A39C2CCAA0FE9F1782BD8404266F3CFE7329A4F8BFB71A882034F1DDB
25,150,148 UART: [art] SIG.R = F1267CBDA1971D223582844C964B012BD333C046D2F72F38487DCBFC9FCAFF9EFFC3C099C4228A96BB48C45BA72500D6
25,157,530 UART: [art] SIG.S = C5CCFED7CF74938EF3099F36986DD884DFDDC2E560EEABEF0F3B36F65D64C3227F62C8963B8595310682B425DCAE02F8
26,136,931 UART: Caliptra RT
26,137,620 UART: [state] CFI Enabled
26,253,927 UART: [rt] RT listening for mailbox commands...
26,255,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,286,406 UART: [rt]cmd =0x4d454153, len=108
26,288,233 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,696 writing to cptra_bootfsm_go
3,752,044 ready_for_fw is high
3,752,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,936,378 >>> mbox cmd response: success
19,187,429 UART:
19,187,810 UART: Running Caliptra FMC ...
19,188,939 UART:
19,189,103 UART: [state] CFI Enabled
19,197,014 UART: [fht] FMC Alias Private Key: 7
20,954,974 UART: [art] Extend RT PCRs Done
20,956,197 UART: [art] Lock RT PCRs Done
20,958,049 UART: [art] Populate DV Done
20,963,484 UART: [fht] FMC Alias Private Key: 7
20,965,192 UART: [art] Derive CDI
20,965,930 UART: [art] Store in in slot 0x4
21,008,803 UART: [art] Derive Key Pair
21,009,817 UART: [art] Store priv key in slot 0x5
23,436,945 UART: [art] Derive Key Pair - Done
23,449,733 UART: [art] Signing Cert with AUTHO
23,451,043 UART: RITY.KEYID = 7
25,156,533 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,051 UART: [art] PUB.X = BB31015E4B329E629972183F27E913D76F14BEE77628AABF0AFEDCBD9E740D4E5AEF7759B0E4DE05EFB74ABF0C26261A
25,165,301 UART: [art] PUB.Y = 58049334265034FD9B2CE0252B4403524B6714E52E993DC254485A1AC882B2CC7CA315D4CE637555EFAEF6CB6C67B73F
25,172,584 UART: [art] SIG.R = 8E865BCA2147A07047CAA1E2E29228B8D946F60DAA660B2703DC0B93C8F50400CB43636C2CB13E04EA085DDCC62D2F20
25,179,987 UART: [art] SIG.S = 322C30C748884A1216BA02846259EBFD75C1BEAB669CA0E318272DBC0BF7CBF16467037B0DDD3A05C20BE97786F52671
26,159,372 UART: Caliptra RT
26,160,070 UART: [state] CFI Enabled
26,277,367 UART: [rt] RT listening for mailbox commands...
26,279,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,310,095 UART: [rt]cmd =0x4d454153, len=108
26,311,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,472 UART: [kat] LMS
1,475,668 UART: [kat] --
1,476,725 UART: [cold-reset] ++
1,477,079 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 ready_for_fw is high
1,481,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,640 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,190 UART: [idev] --
1,515,363 UART: [ldev] ++
1,515,531 UART: [ldev] CDI.KEYID = 6
1,515,894 UART: [ldev] SUBJECT.KEYID = 5
1,516,320 UART: [ldev] AUTHORITY.KEYID = 7
1,516,783 UART: [ldev] FE.KEYID = 1
1,521,861 UART: [ldev] Erasing FE.KEYID = 1
1,546,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,450 UART: [ldev] --
1,585,793 UART: [fwproc] Waiting for Commands...
1,586,540 UART: [fwproc] Received command 0x46574c44
1,587,331 UART: [fwproc] Received Image of size 114084 bytes
2,881,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,849 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,674 >>> mbox cmd response: success
3,073,908 UART: [afmc] ++
3,074,076 UART: [afmc] CDI.KEYID = 6
3,074,438 UART: [afmc] SUBJECT.KEYID = 7
3,074,863 UART: [afmc] AUTHORITY.KEYID = 5
3,110,228 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,587 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,277 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,238 UART: [afmc] --
3,153,266 UART: [cold-reset] --
3,154,298 UART: [state] Locking Datavault
3,155,371 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,975 UART: [state] Locking ICCM
3,156,597 UART: [exit] Launching FMC @ 0x40000130
3,161,926 UART:
3,161,942 UART: Running Caliptra FMC ...
3,162,350 UART:
3,162,404 UART: [state] CFI Enabled
3,172,901 UART: [fht] FMC Alias Private Key: 7
3,281,122 UART: [art] Extend RT PCRs Done
3,281,550 UART: [art] Lock RT PCRs Done
3,282,940 UART: [art] Populate DV Done
3,291,169 UART: [fht] FMC Alias Private Key: 7
3,292,229 UART: [art] Derive CDI
3,292,509 UART: [art] Store in in slot 0x4
3,378,116 UART: [art] Derive Key Pair
3,378,476 UART: [art] Store priv key in slot 0x5
3,392,052 UART: [art] Derive Key Pair - Done
3,407,033 UART: [art] Signing Cert with AUTHO
3,407,513 UART: RITY.KEYID = 7
3,423,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,860 UART: [art] PUB.X = 02A5488084B43D60293854530C7E5A86E147B051EC20D88A4A248C6E5485A4E1E8A2419A2BB3C96E6AF7605AF403750D
3,430,614 UART: [art] PUB.Y = 215B3339EEDAA9133CCC0614B9C4B8A3BBD04EBD77ADBA5A1EF5D8A82F0785C1765B6F3946996EEE1FC74805F86AA9EB
3,437,577 UART: [art] SIG.R = 9A35018C59783C97329A4E5BCB40A5BA4E2BA65BD1EB3DD505BE33ACAB979E8EF9DFCAA5DB0F2C20F87A143CF9064711
3,444,357 UART: [art] SIG.S = B7395473244B4C164A52CA36EBE2680C40621E05C6CBADFE079C73509BD81C2D00AC8460A48D96052E914A9393E7C659
3,468,430 UART: Caliptra RT
3,468,683 UART: [state] CFI Enabled
3,577,441 UART: [rt] RT listening for mailbox commands...
3,578,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,615 UART: [rt]cmd =0x4d454153, len=108
3,610,200 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,701 ready_for_fw is high
1,362,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,764 >>> mbox cmd response: success
2,984,438 UART:
2,984,454 UART: Running Caliptra FMC ...
2,984,862 UART:
2,984,916 UART: [state] CFI Enabled
2,995,571 UART: [fht] FMC Alias Private Key: 7
3,104,070 UART: [art] Extend RT PCRs Done
3,104,498 UART: [art] Lock RT PCRs Done
3,105,934 UART: [art] Populate DV Done
3,113,803 UART: [fht] FMC Alias Private Key: 7
3,114,983 UART: [art] Derive CDI
3,115,263 UART: [art] Store in in slot 0x4
3,201,090 UART: [art] Derive Key Pair
3,201,450 UART: [art] Store priv key in slot 0x5
3,214,596 UART: [art] Derive Key Pair - Done
3,229,448 UART: [art] Signing Cert with AUTHO
3,229,928 UART: RITY.KEYID = 7
3,245,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,129 UART: [art] PUB.X = 73334C5DD98217CC01761120C755A7A793B70D7BCE9AD0D8E3C16802E6786FBA9CFF23823E66E8382FA65F7BA1648119
3,252,892 UART: [art] PUB.Y = D94A29FC202065F89A439CE95DF0DA1156E8AED2C9D8069D73C4D1CE181FC568A043D8DA647377EC450010FC1E45A348
3,259,825 UART: [art] SIG.R = DC2ECD4C4FC461A092384FB059B032BCA684F40AE973260157DEF26143570822BE65936F3BFA0A65B5589C80158EA668
3,266,585 UART: [art] SIG.S = 6FBD57F4CD115EC9EFCEA2AD486AFB8BD61AACD84BB943BFAA82CA525B1E6445A40EF33CD49BA0AE6DCE23D82936F52E
3,290,807 UART: Caliptra RT
3,291,060 UART: [state] CFI Enabled
3,399,033 UART: [rt] RT listening for mailbox commands...
3,399,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,319 UART: [rt]cmd =0x4d454153, len=108
3,431,688 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,351 UART: [state] LifecycleState = Unprovisioned
87,006 UART: [state] DebugLocked = No
87,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,156 UART: [kat] SHA2-256
883,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,202 UART: [kat] ++
887,354 UART: [kat] sha1
891,752 UART: [kat] SHA2-256
893,690 UART: [kat] SHA2-384
896,639 UART: [kat] SHA2-512-ACC
898,540 UART: [kat] ECC-384
904,205 UART: [kat] HMAC-384Kdf
909,007 UART: [kat] LMS
1,477,203 UART: [kat] --
1,477,982 UART: [cold-reset] ++
1,478,548 UART: [fht] Storing FHT @ 0x50003400
1,481,255 UART: [idev] ++
1,481,423 UART: [idev] CDI.KEYID = 6
1,481,783 UART: [idev] SUBJECT.KEYID = 7
1,482,207 UART: [idev] UDS.KEYID = 0
1,482,552 ready_for_fw is high
1,482,552 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,511 UART: [idev] Erasing UDS.KEYID = 0
1,507,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,589 UART: [idev] --
1,516,772 UART: [ldev] ++
1,516,940 UART: [ldev] CDI.KEYID = 6
1,517,303 UART: [ldev] SUBJECT.KEYID = 5
1,517,729 UART: [ldev] AUTHORITY.KEYID = 7
1,518,192 UART: [ldev] FE.KEYID = 1
1,523,576 UART: [ldev] Erasing FE.KEYID = 1
1,549,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,491 UART: [ldev] --
1,588,978 UART: [fwproc] Waiting for Commands...
1,589,743 UART: [fwproc] Received command 0x46574c44
1,590,534 UART: [fwproc] Received Image of size 114084 bytes
2,884,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,209 >>> mbox cmd response: success
3,078,353 UART: [afmc] ++
3,078,521 UART: [afmc] CDI.KEYID = 6
3,078,883 UART: [afmc] SUBJECT.KEYID = 7
3,079,308 UART: [afmc] AUTHORITY.KEYID = 5
3,115,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,756 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,446 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,339 UART: [afmc] --
3,158,417 UART: [cold-reset] --
3,159,425 UART: [state] Locking Datavault
3,160,770 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,374 UART: [state] Locking ICCM
3,161,800 UART: [exit] Launching FMC @ 0x40000130
3,167,129 UART:
3,167,145 UART: Running Caliptra FMC ...
3,167,553 UART:
3,167,696 UART: [state] CFI Enabled
3,178,163 UART: [fht] FMC Alias Private Key: 7
3,286,530 UART: [art] Extend RT PCRs Done
3,286,958 UART: [art] Lock RT PCRs Done
3,288,218 UART: [art] Populate DV Done
3,296,617 UART: [fht] FMC Alias Private Key: 7
3,297,731 UART: [art] Derive CDI
3,298,011 UART: [art] Store in in slot 0x4
3,383,604 UART: [art] Derive Key Pair
3,383,964 UART: [art] Store priv key in slot 0x5
3,397,116 UART: [art] Derive Key Pair - Done
3,412,003 UART: [art] Signing Cert with AUTHO
3,412,483 UART: RITY.KEYID = 7
3,427,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,126 UART: [art] PUB.X = 783CC73AED629D5B5EC5005BE70FBEEB2AF7E5C65610B50E7129701456F5F8E5CA9C84251AAA0356F811CE3697B7DA27
3,434,877 UART: [art] PUB.Y = 96FB0F21CE3775DE3799BAA4ACA56624D26111707BAF771706D225016567CC7D745414E5A0F160387AA429C68EA9CFE6
3,441,820 UART: [art] SIG.R = 8FF1DED15731324D86E8BCB69D5E24543362D51DC51EAF85FB6618CFC13B31A25A4DC5C1B432E1570410DC4DE36A7B8D
3,448,601 UART: [art] SIG.S = C102D9D327DBA9892044D67CBCFBC763D00B11C1C3C9CEEEC71B3EBE06EFB51BBE5B93FB1B08DD4AE03A245447664D2F
3,472,748 UART: Caliptra RT
3,473,093 UART: [state] CFI Enabled
3,582,473 UART: [rt] RT listening for mailbox commands...
3,583,143 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,683 UART: [rt]cmd =0x4d454153, len=108
3,615,030 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,688 ready_for_fw is high
1,362,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,509 >>> mbox cmd response: success
2,987,033 UART:
2,987,049 UART: Running Caliptra FMC ...
2,987,457 UART:
2,987,600 UART: [state] CFI Enabled
2,998,377 UART: [fht] FMC Alias Private Key: 7
3,105,972 UART: [art] Extend RT PCRs Done
3,106,400 UART: [art] Lock RT PCRs Done
3,108,020 UART: [art] Populate DV Done
3,116,053 UART: [fht] FMC Alias Private Key: 7
3,117,001 UART: [art] Derive CDI
3,117,281 UART: [art] Store in in slot 0x4
3,202,942 UART: [art] Derive Key Pair
3,203,302 UART: [art] Store priv key in slot 0x5
3,217,156 UART: [art] Derive Key Pair - Done
3,231,805 UART: [art] Signing Cert with AUTHO
3,232,285 UART: RITY.KEYID = 7
3,247,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,260 UART: [art] PUB.X = 7446F53CDFF62AC6F48366E4620E638740DEBF63A1558CEF63F982FACE6AF0109DF05BDCA1BACFCB559E0264930046E9
3,255,018 UART: [art] PUB.Y = F9185F0EC5CA13377431241E74A6B3EEB8EA7CF9ACF54C5A188FC912B73059E36A7BC086E806847170ED344ECF23ECB1
3,261,974 UART: [art] SIG.R = 99EFBA7818ACD8C0F058A692849C3D40DADA896E9C01DB02E18639FBB6EFBC982949F9D1335835AF963181D336178A4F
3,268,746 UART: [art] SIG.S = 4D007207ECF7DF50BBF40687D4F79856C131D7D8423864D3255E3DF652D5F6389D37F0A35C851D6FF7BE2CF68BF878C2
3,293,063 UART: Caliptra RT
3,293,408 UART: [state] CFI Enabled
3,400,747 UART: [rt] RT listening for mailbox commands...
3,401,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,839 UART: [rt]cmd =0x4d454153, len=108
3,433,366 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,172,133 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,270 UART: [idev] ++
1,175,438 UART: [idev] CDI.KEYID = 6
1,175,798 UART: [idev] SUBJECT.KEYID = 7
1,176,222 UART: [idev] UDS.KEYID = 0
1,176,567 ready_for_fw is high
1,176,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,200,979 UART: [idev] Sha1 KeyId Algorithm
1,209,631 UART: [idev] --
1,210,789 UART: [ldev] ++
1,210,957 UART: [ldev] CDI.KEYID = 6
1,211,320 UART: [ldev] SUBJECT.KEYID = 5
1,211,746 UART: [ldev] AUTHORITY.KEYID = 7
1,212,209 UART: [ldev] FE.KEYID = 1
1,217,299 UART: [ldev] Erasing FE.KEYID = 1
1,243,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,337 UART: [ldev] --
1,282,660 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,565 >>> mbox cmd response: success
2,772,759 UART: [afmc] ++
2,772,927 UART: [afmc] CDI.KEYID = 6
2,773,289 UART: [afmc] SUBJECT.KEYID = 7
2,773,714 UART: [afmc] AUTHORITY.KEYID = 5
2,808,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,640 UART: [afmc] --
2,852,628 UART: [cold-reset] --
2,853,280 UART: [state] Locking Datavault
2,854,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,431 UART: [state] Locking ICCM
2,856,029 UART: [exit] Launching FMC @ 0x40000130
2,861,358 UART:
2,861,374 UART: Running Caliptra FMC ...
2,861,782 UART:
2,861,836 UART: [state] CFI Enabled
2,872,669 UART: [fht] FMC Alias Private Key: 7
2,980,744 UART: [art] Extend RT PCRs Done
2,981,172 UART: [art] Lock RT PCRs Done
2,983,104 UART: [art] Populate DV Done
2,991,243 UART: [fht] FMC Alias Private Key: 7
2,992,277 UART: [art] Derive CDI
2,992,557 UART: [art] Store in in slot 0x4
3,077,936 UART: [art] Derive Key Pair
3,078,296 UART: [art] Store priv key in slot 0x5
3,091,642 UART: [art] Derive Key Pair - Done
3,106,713 UART: [art] Signing Cert with AUTHO
3,107,193 UART: RITY.KEYID = 7
3,121,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,702 UART: [art] PUB.X = C86FBE5E701AF6BD8F3E903C48108C5BCBBD9152DD1FA5E8945EB1C0BBD4750B049161CAC8A2F8359FDA59A23471EF0C
3,129,485 UART: [art] PUB.Y = E7B9E41C8017FE5A16176D2E12D51AC5FFD945991488737E0DB69BEBA96F8F92EE7DAF76A60BB00A1DA852ABB1F72B25
3,136,444 UART: [art] SIG.R = 7B17B3BBE40B1C066F62CCC5030EE9B928137B9FBD0C8FB64FA8DFD38F817A8578573D8DDF7920BFBC2968D5358A9853
3,143,213 UART: [art] SIG.S = 56375008B74925DEDF1AF97D32C3AFEA937615FAC47CE8A2446FC65ACC3331EE70ABE26368DE2AFCCC4E2B6E21EA994E
3,167,121 UART: Caliptra RT
3,167,374 UART: [state] CFI Enabled
3,275,383 UART: [rt] RT listening for mailbox commands...
3,276,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,633 UART: [rt]cmd =0x4d454153, len=108
3,308,304 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,391 ready_for_fw is high
1,060,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,830 >>> mbox cmd response: success
2,683,408 UART:
2,683,424 UART: Running Caliptra FMC ...
2,683,832 UART:
2,683,886 UART: [state] CFI Enabled
2,694,537 UART: [fht] FMC Alias Private Key: 7
2,802,724 UART: [art] Extend RT PCRs Done
2,803,152 UART: [art] Lock RT PCRs Done
2,805,194 UART: [art] Populate DV Done
2,813,331 UART: [fht] FMC Alias Private Key: 7
2,814,501 UART: [art] Derive CDI
2,814,781 UART: [art] Store in in slot 0x4
2,900,698 UART: [art] Derive Key Pair
2,901,058 UART: [art] Store priv key in slot 0x5
2,914,826 UART: [art] Derive Key Pair - Done
2,930,103 UART: [art] Signing Cert with AUTHO
2,930,583 UART: RITY.KEYID = 7
2,945,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,424 UART: [art] PUB.X = 0E44306024E563988E4AC8974BC94AA2BCCF650BE92B9DDC01DAFF440288AD3CEFDE8069538DB514C26383DD6AAAA520
2,953,198 UART: [art] PUB.Y = A9FE38492F88E72046D59CEE5A2B7375F1D34546F53A6EAE9DC0FE0A5C3B4E5103EED701B14B240B028B0ED11D432FC4
2,960,144 UART: [art] SIG.R = 4DDAE62B40A3B6A21525662B723C08FA95B0316FCCDF598AE38FDE76096F75C304669A06A645219F7A920EC406D432CA
2,966,902 UART: [art] SIG.S = 0EBF5EE58F43940DA493BD77805082F16905C14CBBA5786B4F50A9506B762CEAECA85C4BD16A51A78663F54C1C001D83
2,990,410 UART: Caliptra RT
2,990,663 UART: [state] CFI Enabled
3,098,052 UART: [rt] RT listening for mailbox commands...
3,098,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,044 UART: [rt]cmd =0x4d454153, len=108
3,130,495 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,885 UART: [kat] SHA2-512-ACC
908,786 UART: [kat] ECC-384
918,669 UART: [kat] HMAC-384Kdf
923,315 UART: [kat] LMS
1,171,643 UART: [kat] --
1,172,846 UART: [cold-reset] ++
1,173,204 UART: [fht] FHT @ 0x50003400
1,175,863 UART: [idev] ++
1,176,031 UART: [idev] CDI.KEYID = 6
1,176,391 UART: [idev] SUBJECT.KEYID = 7
1,176,815 UART: [idev] UDS.KEYID = 0
1,177,160 ready_for_fw is high
1,177,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,015 UART: [idev] Erasing UDS.KEYID = 0
1,202,090 UART: [idev] Sha1 KeyId Algorithm
1,210,586 UART: [idev] --
1,211,548 UART: [ldev] ++
1,211,716 UART: [ldev] CDI.KEYID = 6
1,212,079 UART: [ldev] SUBJECT.KEYID = 5
1,212,505 UART: [ldev] AUTHORITY.KEYID = 7
1,212,968 UART: [ldev] FE.KEYID = 1
1,218,404 UART: [ldev] Erasing FE.KEYID = 1
1,245,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,724 UART: [ldev] --
1,285,097 UART: [fwproc] Wait for Commands...
1,285,869 UART: [fwproc] Recv command 0x46574c44
1,286,597 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,450 >>> mbox cmd response: success
2,774,568 UART: [afmc] ++
2,774,736 UART: [afmc] CDI.KEYID = 6
2,775,098 UART: [afmc] SUBJECT.KEYID = 7
2,775,523 UART: [afmc] AUTHORITY.KEYID = 5
2,810,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,947 UART: [afmc] --
2,853,867 UART: [cold-reset] --
2,854,935 UART: [state] Locking Datavault
2,856,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,716 UART: [state] Locking ICCM
2,857,156 UART: [exit] Launching FMC @ 0x40000130
2,862,485 UART:
2,862,501 UART: Running Caliptra FMC ...
2,862,909 UART:
2,863,052 UART: [state] CFI Enabled
2,873,653 UART: [fht] FMC Alias Private Key: 7
2,981,596 UART: [art] Extend RT PCRs Done
2,982,024 UART: [art] Lock RT PCRs Done
2,983,574 UART: [art] Populate DV Done
2,991,917 UART: [fht] FMC Alias Private Key: 7
2,993,029 UART: [art] Derive CDI
2,993,309 UART: [art] Store in in slot 0x4
3,079,188 UART: [art] Derive Key Pair
3,079,548 UART: [art] Store priv key in slot 0x5
3,093,012 UART: [art] Derive Key Pair - Done
3,107,651 UART: [art] Signing Cert with AUTHO
3,108,131 UART: RITY.KEYID = 7
3,123,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,872 UART: [art] PUB.X = 6E150DF4C467CF69452BF2B696610C7A90597D57FBE79C990C460D6D2AE37F391103F8C7F7E445A8A11A728717DA3C4C
3,130,631 UART: [art] PUB.Y = FDC0C3DD0128800679B15EABF79FF2672CA2CB1B70EC97CBB2B73651742B99383D94F3170ED66C28D22D453F6F5E3F9E
3,137,584 UART: [art] SIG.R = 10820114A8207B9EEEF3A6F8C0AD9901CCC61A34378D0BF9F14E7AA5ED9004F8415CC71644D1541FEFAFA9E7C285E38E
3,144,356 UART: [art] SIG.S = 56CF9DF2D2CA46810E22EBCEFB6EEB7B1666A8F613DEDC731CD056310F714F120695CB91468B44F2AA56936A4C93A57D
3,168,054 UART: Caliptra RT
3,168,399 UART: [state] CFI Enabled
3,276,650 UART: [rt] RT listening for mailbox commands...
3,277,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,804 UART: [rt]cmd =0x4d454153, len=108
3,309,309 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,660 ready_for_fw is high
1,060,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,433 >>> mbox cmd response: success
2,687,131 UART:
2,687,147 UART: Running Caliptra FMC ...
2,687,555 UART:
2,687,698 UART: [state] CFI Enabled
2,698,465 UART: [fht] FMC Alias Private Key: 7
2,806,426 UART: [art] Extend RT PCRs Done
2,806,854 UART: [art] Lock RT PCRs Done
2,808,072 UART: [art] Populate DV Done
2,816,193 UART: [fht] FMC Alias Private Key: 7
2,817,193 UART: [art] Derive CDI
2,817,473 UART: [art] Store in in slot 0x4
2,902,932 UART: [art] Derive Key Pair
2,903,292 UART: [art] Store priv key in slot 0x5
2,915,880 UART: [art] Derive Key Pair - Done
2,930,743 UART: [art] Signing Cert with AUTHO
2,931,223 UART: RITY.KEYID = 7
2,947,005 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,770 UART: [art] PUB.X = 7768C301B2E4A0BBBC97A94EC36A19E8841979FE29747AF540CFE7876BC61A7945A54861340ADC5308C6D5A289A53E63
2,954,533 UART: [art] PUB.Y = 2964AF97E889205358AC936F38CB5F283743E8E9A2F8B8CBC268D6E1B325632B03BCE777740502E2B775DFDD0E2086EF
2,961,475 UART: [art] SIG.R = EBBF58718A6A759BC602F9F25FAF1465840DD4D8DC4AA4E441D5703260780A9C7BBA22506E1A7CD7C8FE46CAF5A58D8B
2,968,254 UART: [art] SIG.S = 9BC84EAA1B1297DD6602C62CA11A92383CD1A0D8FCC8401A2ED9103767DF4A4365154AA2C2963C192F36A566DD60503A
2,992,428 UART: Caliptra RT
2,992,773 UART: [state] CFI Enabled
3,101,493 UART: [rt] RT listening for mailbox commands...
3,102,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,541 UART: [rt]cmd =0x4d454153, len=108
3,133,860 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,418 UART: [kat] LMS
1,168,730 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,637 UART: [idev] ++
1,172,805 UART: [idev] CDI.KEYID = 6
1,173,166 UART: [idev] SUBJECT.KEYID = 7
1,173,591 UART: [idev] UDS.KEYID = 0
1,173,937 ready_for_fw is high
1,173,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,461 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,451 UART: [idev] --
1,208,420 UART: [ldev] ++
1,208,588 UART: [ldev] CDI.KEYID = 6
1,208,952 UART: [ldev] SUBJECT.KEYID = 5
1,209,379 UART: [ldev] AUTHORITY.KEYID = 7
1,209,842 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,240,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,428 UART: [ldev] --
1,279,886 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,891 >>> mbox cmd response: success
2,769,120 UART: [afmc] ++
2,769,288 UART: [afmc] CDI.KEYID = 6
2,769,651 UART: [afmc] SUBJECT.KEYID = 7
2,770,077 UART: [afmc] AUTHORITY.KEYID = 5
2,805,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,137 UART: [afmc] --
2,849,139 UART: [cold-reset] --
2,849,981 UART: [state] Locking Datavault
2,851,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,608 UART: [state] Locking ICCM
2,852,182 UART: [exit] Launching FMC @ 0x40000130
2,857,511 UART:
2,857,527 UART: Running Caliptra FMC ...
2,857,935 UART:
2,857,989 UART: [state] CFI Enabled
2,868,860 UART: [fht] FMC Alias Private Key: 7
2,976,299 UART: [art] Extend RT PCRs Done
2,976,727 UART: [art] Lock RT PCRs Done
2,978,193 UART: [art] Populate DV Done
2,986,412 UART: [fht] FMC Alias Private Key: 7
2,987,388 UART: [art] Derive CDI
2,987,668 UART: [art] Store in in slot 0x4
3,073,149 UART: [art] Derive Key Pair
3,073,509 UART: [art] Store priv key in slot 0x5
3,086,609 UART: [art] Derive Key Pair - Done
3,101,178 UART: [art] Signing Cert with AUTHO
3,101,658 UART: RITY.KEYID = 7
3,117,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,901 UART: [art] PUB.X = 8700FC6D6CA06617800237125EBC28224DAFFD110801AB668082AAD753214637241CF2E822BA6F0C9E453BA69F8EBF44
3,124,639 UART: [art] PUB.Y = 48E84F03CAD0A80F96C6A8D0B6562FDE5442C98F5F5BACAAA931ACE45D0FC362E48C524F1DDDFF4E3FD1AFFE038C1FE6
3,131,609 UART: [art] SIG.R = 685B9FF46B672DE0C4A0537258AA73053482A203547411DC8604205236D7B014C81A1108B8DED4B78044E56888FDBD5D
3,138,361 UART: [art] SIG.S = 7F713D95D1A4D07CB2EB68C67368E87B4F31630430B264A6F26E42320236E649ACC30A355EC6B53E4F9A60C7AD7F84A8
3,161,961 UART: Caliptra RT
3,162,214 UART: [state] CFI Enabled
3,270,159 UART: [rt] RT listening for mailbox commands...
3,270,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,215 UART: [rt]cmd =0x4d454153, len=108
3,302,724 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,658 ready_for_fw is high
1,056,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,381 >>> mbox cmd response: success
2,681,781 UART:
2,681,797 UART: Running Caliptra FMC ...
2,682,205 UART:
2,682,259 UART: [state] CFI Enabled
2,692,848 UART: [fht] FMC Alias Private Key: 7
2,800,315 UART: [art] Extend RT PCRs Done
2,800,743 UART: [art] Lock RT PCRs Done
2,802,077 UART: [art] Populate DV Done
2,810,392 UART: [fht] FMC Alias Private Key: 7
2,811,534 UART: [art] Derive CDI
2,811,814 UART: [art] Store in in slot 0x4
2,897,311 UART: [art] Derive Key Pair
2,897,671 UART: [art] Store priv key in slot 0x5
2,910,715 UART: [art] Derive Key Pair - Done
2,925,642 UART: [art] Signing Cert with AUTHO
2,926,122 UART: RITY.KEYID = 7
2,941,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,007 UART: [art] PUB.X = 4069E18E64929E6C6F6702B3C17FE5647C439D4805EA08EBA3222716AD6A45F651CD9C2A345E6DB9011198267E594F69
2,948,761 UART: [art] PUB.Y = 6DAB48323306987FC2E00FC6C1141F34B33803B7F4225CCB576837E8E800AA8622E4C6F1569142E0CC20A04C3A097A34
2,955,675 UART: [art] SIG.R = A8FD39F8641FCC631814A2D927B6A03F7FAEF8FEEDA825D70052483E7BDA8EF59B3044B4CBBBD1154FDEA7B5979DAFD1
2,962,449 UART: [art] SIG.S = 0CF0019E860B6BF8E3A0808A415C358188AFB730AFEC5D2E384F9A979E2C53188CD69735D68C3EDF6D5BD47E9BEE3D97
2,986,519 UART: Caliptra RT
2,986,772 UART: [state] CFI Enabled
3,093,403 UART: [rt] RT listening for mailbox commands...
3,094,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,697 UART: [rt]cmd =0x4d454153, len=108
3,126,300 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,783 UART: [state] LifecycleState = Unprovisioned
85,438 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,291 UART: [kat] SHA2-256
890,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,970 UART: [kat] ++
895,122 UART: [kat] sha1
899,346 UART: [kat] SHA2-256
901,286 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 ready_for_fw is high
1,174,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,418 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,223 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,759 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,644 >>> mbox cmd response: success
2,770,883 UART: [afmc] ++
2,771,051 UART: [afmc] CDI.KEYID = 6
2,771,414 UART: [afmc] SUBJECT.KEYID = 7
2,771,840 UART: [afmc] AUTHORITY.KEYID = 5
2,807,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,232 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,961 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,844 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,563 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,314 UART: [afmc] --
2,850,366 UART: [cold-reset] --
2,851,278 UART: [state] Locking Datavault
2,852,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,747 UART: [state] Locking ICCM
2,853,365 UART: [exit] Launching FMC @ 0x40000130
2,858,694 UART:
2,858,710 UART: Running Caliptra FMC ...
2,859,118 UART:
2,859,261 UART: [state] CFI Enabled
2,870,230 UART: [fht] FMC Alias Private Key: 7
2,978,359 UART: [art] Extend RT PCRs Done
2,978,787 UART: [art] Lock RT PCRs Done
2,980,121 UART: [art] Populate DV Done
2,988,332 UART: [fht] FMC Alias Private Key: 7
2,989,336 UART: [art] Derive CDI
2,989,616 UART: [art] Store in in slot 0x4
3,075,637 UART: [art] Derive Key Pair
3,075,997 UART: [art] Store priv key in slot 0x5
3,089,583 UART: [art] Derive Key Pair - Done
3,103,950 UART: [art] Signing Cert with AUTHO
3,104,430 UART: RITY.KEYID = 7
3,119,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,671 UART: [art] PUB.X = E2BD77B13F599DDDA7B555F6B76852430013BFEBBB30E32CDD3EEDF47D6BC0DA16524450EA76729E227F1F6BD2819459
3,127,433 UART: [art] PUB.Y = C720AB99A976B5AAA75359F8A500674A22D23A7275635C8445442627E8FBDC43BCD9BBFACED7D1C8DE42EDA1473AE2FC
3,134,379 UART: [art] SIG.R = 608E8A1810CC69A67C5F82ACADB47EC48308927B801F3E5C299C0210ADCE22A42F8E7123C229F224B63E3A4A0A46DDD3
3,141,150 UART: [art] SIG.S = DF665BE881E8476192898E61BAC69AE5E38973BAE9951139F047F0A49CC17645F2A54F95578706028776477AD778B889
3,165,229 UART: Caliptra RT
3,165,574 UART: [state] CFI Enabled
3,273,443 UART: [rt] RT listening for mailbox commands...
3,274,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,351 UART: [rt]cmd =0x4d454153, len=108
3,305,662 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,445 ready_for_fw is high
1,056,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,920 >>> mbox cmd response: success
2,683,292 UART:
2,683,308 UART: Running Caliptra FMC ...
2,683,716 UART:
2,683,859 UART: [state] CFI Enabled
2,694,288 UART: [fht] FMC Alias Private Key: 7
2,801,733 UART: [art] Extend RT PCRs Done
2,802,161 UART: [art] Lock RT PCRs Done
2,803,699 UART: [art] Populate DV Done
2,811,956 UART: [fht] FMC Alias Private Key: 7
2,812,978 UART: [art] Derive CDI
2,813,258 UART: [art] Store in in slot 0x4
2,898,761 UART: [art] Derive Key Pair
2,899,121 UART: [art] Store priv key in slot 0x5
2,912,993 UART: [art] Derive Key Pair - Done
2,927,852 UART: [art] Signing Cert with AUTHO
2,928,332 UART: RITY.KEYID = 7
2,943,466 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,231 UART: [art] PUB.X = AA588413E56DD064BA65DC54DC5AE80A0F423FEDEF4307FCBC7D3412FF9225A418C496347B5082C2EF0681869403053E
2,950,989 UART: [art] PUB.Y = 00847CE2B625D35AB0E7F6844220A4308A56336365FF436EB8E2750EF8D918646A9BB489CAD30C9D3459019694597019
2,957,898 UART: [art] SIG.R = 85151E90EBE920FE81117A7E3DFE632E4E9447C4B9734C450A002F458DDBA49D9B7B04CE6EA45ED091B98BDF6747469A
2,964,650 UART: [art] SIG.S = BA0AC71A5FCAEC9D1777BC2A724D925256D040D0C1EFF61ED44A68ABC94FD62ADB384E44DC0099112FD49E7D80E10193
2,988,057 UART: Caliptra RT
2,988,402 UART: [state] CFI Enabled
3,095,812 UART: [rt] RT listening for mailbox commands...
3,096,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,032 UART: [rt]cmd =0x4d454153, len=108
3,128,437 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,263 UART:
192,751 UART: Running Caliptra ROM ...
193,918 UART:
194,072 UART: [state] CFI Enabled
266,844 UART: [state] LifecycleState = Unprovisioned
268,780 UART: [state] DebugLocked = No
271,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,466 UART: [kat] SHA2-256
446,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,674 UART: [kat] ++
457,123 UART: [kat] sha1
469,385 UART: [kat] SHA2-256
472,045 UART: [kat] SHA2-384
477,686 UART: [kat] SHA2-512-ACC
480,055 UART: [kat] ECC-384
2,768,831 UART: [kat] HMAC-384Kdf
2,779,873 UART: [kat] LMS
3,970,231 UART: [kat] --
3,974,409 UART: [cold-reset] ++
3,975,784 UART: [fht] Storing FHT @ 0x50003400
3,986,906 UART: [idev] ++
3,987,467 UART: [idev] CDI.KEYID = 6
3,988,500 UART: [idev] SUBJECT.KEYID = 7
3,989,674 UART: [idev] UDS.KEYID = 0
3,990,721 ready_for_fw is high
3,990,941 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,098 UART: [idev] Erasing UDS.KEYID = 0
7,328,443 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,439 UART: [idev] --
7,354,726 UART: [ldev] ++
7,355,292 UART: [ldev] CDI.KEYID = 6
7,356,227 UART: [ldev] SUBJECT.KEYID = 5
7,357,493 UART: [ldev] AUTHORITY.KEYID = 7
7,358,725 UART: [ldev] FE.KEYID = 1
7,403,395 UART: [ldev] Erasing FE.KEYID = 1
10,733,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,747 UART: [ldev] --
13,111,472 UART: [fwproc] Waiting for Commands...
13,114,812 UART: [fwproc] Received command 0x46574c44
13,116,994 UART: [fwproc] Received Image of size 113760 bytes
17,164,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,249 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,625,770 >>> mbox cmd response: success
17,630,334 UART: [afmc] ++
17,630,935 UART: [afmc] CDI.KEYID = 6
17,631,881 UART: [afmc] SUBJECT.KEYID = 7
17,633,106 UART: [afmc] AUTHORITY.KEYID = 5
20,996,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,292,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,294,514 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,930 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,323,757 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,338,211 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,360,220 UART: [afmc] --
23,364,034 UART: [cold-reset] --
23,368,976 UART: [state] Locking Datavault
23,374,509 UART: [state] Locking PCR0, PCR1 and PCR31
23,376,252 UART: [state] Locking ICCM
23,377,491 UART: [exit] Launching FMC @ 0x40000130
23,385,894 UART:
23,386,131 UART: Running Caliptra FMC ...
23,387,251 UART:
23,387,414 UART: [state] CFI Enabled
23,453,542 UART: [fht] FMC Alias Private Key: 7
25,791,989 UART: [art] Extend RT PCRs Done
25,793,208 UART: [art] Lock RT PCRs Done
25,794,668 UART: [art] Populate DV Done
25,799,974 UART: [fht] FMC Alias Private Key: 7
25,801,462 UART: [art] Derive CDI
25,802,225 UART: [art] Store in in slot 0x4
25,862,240 UART: [art] Derive Key Pair
25,863,280 UART: [art] Store priv key in slot 0x5
29,156,323 UART: [art] Derive Key Pair - Done
29,169,487 UART: [art] Signing Cert with AUTHO
29,170,787 UART: RITY.KEYID = 7
31,458,589 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,091 UART: [art] PUB.X = AE3C96C015390F7F972684B754E02210BA9AC5C747EB9DF7ED8D9C55C9DB0D09F7D55609EEA22A9111A1281FD312044D
31,467,367 UART: [art] PUB.Y = E52B901B8A729F68E5D2C656C9E94FDEB63DB700FFD4B51F81FB3FFCA3D173794ADD8A4E043C56B1846E2170DB8B8B4A
31,474,605 UART: [art] SIG.R = B76967D068C3F0BAA6027A983898FDDD3F4BEA868C8FEFC78C5BE2A75BCF8C034CD79BFAECC29CF9612121F04265EAA0
31,481,992 UART: [art] SIG.S = 6C8490735F8E899CF280B1430DC6C422F8EE99BCACDF775D0A65B06B5459835E9826DAEC6110B00CD40DB63939EF60AA
32,787,620 UART: Caliptra RT
32,788,336 UART: [state] CFI Enabled
32,949,621 UART: [rt] RT listening for mailbox commands...
32,951,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,982,795 UART: [rt]cmd =0x4d454153, len=108
33,001,827 >>> mbox cmd response data (12 bytes)
33,002,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,033,019 UART: [rt]cmd =0x4d454153, len=108
33,051,683 >>> mbox cmd response data (12 bytes)
33,052,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,082,802 UART: [rt]cmd =0x4d454153, len=108
33,101,573 >>> mbox cmd response data (12 bytes)
33,102,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,132,726 UART: [rt]cmd =0x4d454153, len=108
33,151,388 >>> mbox cmd response data (12 bytes)
33,151,836 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,182,268 UART: [rt]cmd =0x4d454153, len=108
33,201,252 >>> mbox cmd response data (12 bytes)
33,201,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,232,442 UART: [rt]cmd =0x4d454153, len=108
33,250,822 >>> mbox cmd response data (12 bytes)
33,251,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,281,743 UART: [rt]cmd =0x4d454153, len=108
33,299,921 >>> mbox cmd response data (12 bytes)
33,300,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,331,262 UART: [rt]cmd =0x4d454153, len=108
33,349,868 >>> mbox cmd response data (12 bytes)
33,350,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,380,948 UART: [rt]cmd =0x4d454153, len=108
33,399,175 >>> mbox cmd response data (12 bytes)
33,399,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,430,305 UART: [rt]cmd =0x4d454153, len=108
33,448,856 >>> mbox cmd response data (12 bytes)
33,449,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,480,098 UART: [rt]cmd =0x4d454153, len=108
33,498,420 >>> mbox cmd response data (12 bytes)
33,498,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,529,669 UART: [rt]cmd =0x4d454153, len=108
33,548,325 >>> mbox cmd response data (12 bytes)
33,548,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,579,375 UART: [rt]cmd =0x4d454153, len=108
33,597,762 >>> mbox cmd response data (12 bytes)
33,598,182 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,628,995 UART: [rt]cmd =0x4d454153, len=108
33,647,950 >>> mbox cmd response data (12 bytes)
33,648,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,679,270 UART: [rt]cmd =0x4d454153, len=108
33,698,048 >>> mbox cmd response data (12 bytes)
33,698,515 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,728,886 UART: [rt]cmd =0x4d454153, len=108
33,731,381 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,785,730 ready_for_fw is high
3,786,188 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,840,734 >>> mbox cmd response: success
23,521,400 UART:
23,521,785 UART: Running Caliptra FMC ...
23,522,909 UART:
23,523,060 UART: [state] CFI Enabled
23,590,816 UART: [fht] FMC Alias Private Key: 7
25,928,937 UART: [art] Extend RT PCRs Done
25,930,159 UART: [art] Lock RT PCRs Done
25,931,755 UART: [art] Populate DV Done
25,937,376 UART: [fht] FMC Alias Private Key: 7
25,938,914 UART: [art] Derive CDI
25,939,672 UART: [art] Store in in slot 0x4
25,999,255 UART: [art] Derive Key Pair
26,000,301 UART: [art] Store priv key in slot 0x5
29,292,999 UART: [art] Derive Key Pair - Done
29,305,778 UART: [art] Signing Cert with AUTHO
29,307,630 UART: RITY.KEYID = 7
31,593,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,595,258 UART: [art] PUB.X = A0FA58475272D7EFC0649E5E590FCFE87FD9CA320B90F3CB6CD5EEBF4FDF8CD3384F86CB00611EFF63EB26EEF35B417A
31,602,520 UART: [art] PUB.Y = 2ACCDC8A430E0098F9BEC84D7967168635A3FF1EC8F635A645D020BEA794FD5BB00FF416F613DFA90AEC21E493417DFB
31,609,778 UART: [art] SIG.R = 377B157E5CDB8AEBB2699A9BCA70E5FBBB3C142B53F296996A66A622B2CF6C535B19F256FA78DD1EAE1F5707669441BB
31,617,179 UART: [art] SIG.S = A57A75FE14690716ED4FC80989E6F7AB4DE7F3AE51FC04133018F3E395F37DFDBFD8C1006D113CC1E07674FB22001068
32,922,026 UART: Caliptra RT
32,922,733 UART: [state] CFI Enabled
33,083,034 UART: [rt] RT listening for mailbox commands...
33,084,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,116,398 UART: [rt]cmd =0x4d454153, len=108
33,135,104 >>> mbox cmd response data (12 bytes)
33,135,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,166,577 UART: [rt]cmd =0x4d454153, len=108
33,185,058 >>> mbox cmd response data (12 bytes)
33,185,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,216,220 UART: [rt]cmd =0x4d454153, len=108
33,235,430 >>> mbox cmd response data (12 bytes)
33,235,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,266,659 UART: [rt]cmd =0x4d454153, len=108
33,284,543 >>> mbox cmd response data (12 bytes)
33,284,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,315,755 UART: [rt]cmd =0x4d454153, len=108
33,334,077 >>> mbox cmd response data (12 bytes)
33,334,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,365,331 UART: [rt]cmd =0x4d454153, len=108
33,384,418 >>> mbox cmd response data (12 bytes)
33,384,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,415,333 UART: [rt]cmd =0x4d454153, len=108
33,434,194 >>> mbox cmd response data (12 bytes)
33,434,632 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,465,220 UART: [rt]cmd =0x4d454153, len=108
33,484,024 >>> mbox cmd response data (12 bytes)
33,484,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,514,852 UART: [rt]cmd =0x4d454153, len=108
33,532,329 >>> mbox cmd response data (12 bytes)
33,532,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,563,165 UART: [rt]cmd =0x4d454153, len=108
33,582,187 >>> mbox cmd response data (12 bytes)
33,582,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,613,484 UART: [rt]cmd =0x4d454153, len=108
33,631,500 >>> mbox cmd response data (12 bytes)
33,631,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,662,682 UART: [rt]cmd =0x4d454153, len=108
33,681,828 >>> mbox cmd response data (12 bytes)
33,682,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,712,899 UART: [rt]cmd =0x4d454153, len=108
33,731,649 >>> mbox cmd response data (12 bytes)
33,732,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,762,514 UART: [rt]cmd =0x4d454153, len=108
33,781,281 >>> mbox cmd response data (12 bytes)
33,781,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,812,194 UART: [rt]cmd =0x4d454153, len=108
33,831,588 >>> mbox cmd response data (12 bytes)
33,832,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,862,550 UART: [rt]cmd =0x4d454153, len=108
33,865,207 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
192,914 UART:
193,282 UART: Running Caliptra ROM ...
194,402 UART:
604,033 UART: [state] CFI Enabled
620,398 UART: [state] LifecycleState = Unprovisioned
622,343 UART: [state] DebugLocked = No
624,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,069 UART: [kat] SHA2-256
799,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,385 UART: [kat] ++
810,852 UART: [kat] sha1
822,714 UART: [kat] SHA2-256
825,429 UART: [kat] SHA2-384
832,144 UART: [kat] SHA2-512-ACC
834,552 UART: [kat] ECC-384
3,120,518 UART: [kat] HMAC-384Kdf
3,132,470 UART: [kat] LMS
4,322,538 UART: [kat] --
4,325,564 UART: [cold-reset] ++
4,327,921 UART: [fht] Storing FHT @ 0x50003400
4,339,391 UART: [idev] ++
4,339,957 UART: [idev] CDI.KEYID = 6
4,340,836 UART: [idev] SUBJECT.KEYID = 7
4,342,146 UART: [idev] UDS.KEYID = 0
4,343,088 ready_for_fw is high
4,343,284 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,162 UART: [idev] Erasing UDS.KEYID = 0
7,635,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,658,121 UART: [idev] --
7,663,076 UART: [ldev] ++
7,663,642 UART: [ldev] CDI.KEYID = 6
7,664,623 UART: [ldev] SUBJECT.KEYID = 5
7,665,835 UART: [ldev] AUTHORITY.KEYID = 7
7,667,114 UART: [ldev] FE.KEYID = 1
7,678,041 UART: [ldev] Erasing FE.KEYID = 1
10,962,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,504 UART: [ldev] --
13,322,719 UART: [fwproc] Waiting for Commands...
13,325,619 UART: [fwproc] Received command 0x46574c44
13,327,795 UART: [fwproc] Received Image of size 113760 bytes
17,381,000 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,431 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,955 >>> mbox cmd response: success
17,840,505 UART: [afmc] ++
17,841,103 UART: [afmc] CDI.KEYID = 6
17,842,070 UART: [afmc] SUBJECT.KEYID = 7
17,843,289 UART: [afmc] AUTHORITY.KEYID = 5
21,160,595 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,165 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,615 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,390 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,865 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,280 UART: [afmc] --
23,527,799 UART: [cold-reset] --
23,532,253 UART: [state] Locking Datavault
23,535,611 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,368 UART: [state] Locking ICCM
23,539,804 UART: [exit] Launching FMC @ 0x40000130
23,548,201 UART:
23,548,442 UART: Running Caliptra FMC ...
23,549,750 UART:
23,549,919 UART: [state] CFI Enabled
23,557,557 UART: [fht] FMC Alias Private Key: 7
25,888,001 UART: [art] Extend RT PCRs Done
25,889,232 UART: [art] Lock RT PCRs Done
25,891,013 UART: [art] Populate DV Done
25,896,648 UART: [fht] FMC Alias Private Key: 7
25,898,242 UART: [art] Derive CDI
25,899,054 UART: [art] Store in in slot 0x4
25,941,970 UART: [art] Derive Key Pair
25,942,965 UART: [art] Store priv key in slot 0x5
29,185,693 UART: [art] Derive Key Pair - Done
29,199,013 UART: [art] Signing Cert with AUTHO
29,200,338 UART: RITY.KEYID = 7
31,479,931 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,435 UART: [art] PUB.X = 4060FDC2E6FF50AE3236D6CFE7609473A55A2E16878567E1CAA4C0FCDE8C32B4C0947B815E1EE7F015BFC304811CCC3A
31,488,695 UART: [art] PUB.Y = C4CB84071E3DE87B1662969CBDB847F823887C4A1926FBF3F586116C777B659E6CC0968D9EB0583F08E8FB071066B516
31,495,959 UART: [art] SIG.R = 1CCF11967EB1FA51FCD8087B4C8221F3B2A61F1B07764E7410A64EE62127E7CC1CC0E3D1F0F2FB732D73E92473B59903
31,503,319 UART: [art] SIG.S = 5E811F2915DB329690134CF0AFC6EA8DD2EFE80E799F5400636F827D8E16AA83F0A3810DDBB9D03FF4EE202E37BD7B6D
32,808,560 UART: Caliptra RT
32,809,274 UART: [state] CFI Enabled
32,926,719 UART: [rt] RT listening for mailbox commands...
32,928,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,959,136 UART: [rt]cmd =0x4d454153, len=108
32,977,851 >>> mbox cmd response data (12 bytes)
32,978,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,008,881 UART: [rt]cmd =0x4d454153, len=108
33,026,947 >>> mbox cmd response data (12 bytes)
33,027,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,057,903 UART: [rt]cmd =0x4d454153, len=108
33,075,929 >>> mbox cmd response data (12 bytes)
33,076,393 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,106,933 UART: [rt]cmd =0x4d454153, len=108
33,125,582 >>> mbox cmd response data (12 bytes)
33,125,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,156,644 UART: [rt]cmd =0x4d454153, len=108
33,175,061 >>> mbox cmd response data (12 bytes)
33,175,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,206,132 UART: [rt]cmd =0x4d454153, len=108
33,224,836 >>> mbox cmd response data (12 bytes)
33,225,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,255,796 UART: [rt]cmd =0x4d454153, len=108
33,275,292 >>> mbox cmd response data (12 bytes)
33,275,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,306,367 UART: [rt]cmd =0x4d454153, len=108
33,324,769 >>> mbox cmd response data (12 bytes)
33,325,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,355,757 UART: [rt]cmd =0x4d454153, len=108
33,374,782 >>> mbox cmd response data (12 bytes)
33,375,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,405,790 UART: [rt]cmd =0x4d454153, len=108
33,424,260 >>> mbox cmd response data (12 bytes)
33,424,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,455,323 UART: [rt]cmd =0x4d454153, len=108
33,473,706 >>> mbox cmd response data (12 bytes)
33,474,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,504,918 UART: [rt]cmd =0x4d454153, len=108
33,524,058 >>> mbox cmd response data (12 bytes)
33,524,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,554,909 UART: [rt]cmd =0x4d454153, len=108
33,573,695 >>> mbox cmd response data (12 bytes)
33,574,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,604,789 UART: [rt]cmd =0x4d454153, len=108
33,623,330 >>> mbox cmd response data (12 bytes)
33,623,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,654,563 UART: [rt]cmd =0x4d454153, len=108
33,673,357 >>> mbox cmd response data (12 bytes)
33,673,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,704,479 UART: [rt]cmd =0x4d454153, len=108
33,706,639 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
4,128,498 ready_for_fw is high
4,129,153 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,482 >>> mbox cmd response: success
23,704,000 UART:
23,704,405 UART: Running Caliptra FMC ...
23,705,511 UART:
23,705,663 UART: [state] CFI Enabled
23,713,784 UART: [fht] FMC Alias Private Key: 7
26,044,639 UART: [art] Extend RT PCRs Done
26,045,871 UART: [art] Lock RT PCRs Done
26,047,639 UART: [art] Populate DV Done
26,053,220 UART: [fht] FMC Alias Private Key: 7
26,054,820 UART: [art] Derive CDI
26,055,558 UART: [art] Store in in slot 0x4
26,098,095 UART: [art] Derive Key Pair
26,099,123 UART: [art] Store priv key in slot 0x5
29,340,864 UART: [art] Derive Key Pair - Done
29,354,129 UART: [art] Signing Cert with AUTHO
29,355,429 UART: RITY.KEYID = 7
31,634,611 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,124 UART: [art] PUB.X = 69C52D8FB049FB0709AF881E49E0A8DC06F7F62E021D009A2A2B078EE9B0F43F32A21F6C75157A5AF8CCD9BC81E90FF7
31,643,393 UART: [art] PUB.Y = 695DFEAEB94FE2DABE0CE4DAFBFCA746C9A9EDD3E46FA43837465AF6B8A5B7FD7DED107D7B79129ABB6531E532D83047
31,650,691 UART: [art] SIG.R = 3F94BCD2C8B3C23D01C89EECC681AE430F1F35E87B8EDFF951C18EA0DF6939DC90160C89CFEBDC6F0D1A8A17EEB7FFF9
31,658,080 UART: [art] SIG.S = 8FC9D916946E8675A0E634411FF4A4F5000426AADBB5867EB6F01BE605CA5D2B6C5C499C500C050877F74EFCDE7A3952
32,962,998 UART: Caliptra RT
32,963,711 UART: [state] CFI Enabled
33,082,023 UART: [rt] RT listening for mailbox commands...
33,083,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,114,641 UART: [rt]cmd =0x4d454153, len=108
33,133,198 >>> mbox cmd response data (12 bytes)
33,133,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,171 UART: [rt]cmd =0x4d454153, len=108
33,182,383 >>> mbox cmd response data (12 bytes)
33,182,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,213,423 UART: [rt]cmd =0x4d454153, len=108
33,232,349 >>> mbox cmd response data (12 bytes)
33,232,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,263,699 UART: [rt]cmd =0x4d454153, len=108
33,282,461 >>> mbox cmd response data (12 bytes)
33,282,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,313,578 UART: [rt]cmd =0x4d454153, len=108
33,332,739 >>> mbox cmd response data (12 bytes)
33,333,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,363,952 UART: [rt]cmd =0x4d454153, len=108
33,382,883 >>> mbox cmd response data (12 bytes)
33,383,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,413,976 UART: [rt]cmd =0x4d454153, len=108
33,432,549 >>> mbox cmd response data (12 bytes)
33,432,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,463,477 UART: [rt]cmd =0x4d454153, len=108
33,482,750 >>> mbox cmd response data (12 bytes)
33,483,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,513,711 UART: [rt]cmd =0x4d454153, len=108
33,531,939 >>> mbox cmd response data (12 bytes)
33,532,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,563,014 UART: [rt]cmd =0x4d454153, len=108
33,581,865 >>> mbox cmd response data (12 bytes)
33,582,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,612,990 UART: [rt]cmd =0x4d454153, len=108
33,631,802 >>> mbox cmd response data (12 bytes)
33,632,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,662,761 UART: [rt]cmd =0x4d454153, len=108
33,681,237 >>> mbox cmd response data (12 bytes)
33,681,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,712,405 UART: [rt]cmd =0x4d454153, len=108
33,731,061 >>> mbox cmd response data (12 bytes)
33,731,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,761,894 UART: [rt]cmd =0x4d454153, len=108
33,780,870 >>> mbox cmd response data (12 bytes)
33,781,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,812,046 UART: [rt]cmd =0x4d454153, len=108
33,831,225 >>> mbox cmd response data (12 bytes)
33,831,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,862,287 UART: [rt]cmd =0x4d454153, len=108
33,864,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,579 UART:
192,958 UART: Running Caliptra ROM ...
194,165 UART:
194,319 UART: [state] CFI Enabled
263,343 UART: [state] LifecycleState = Unprovisioned
265,246 UART: [state] DebugLocked = No
266,991 UART: [state] WD Timer not started. Device not locked for debugging
271,330 UART: [kat] SHA2-256
450,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,012 UART: [kat] ++
462,551 UART: [kat] sha1
474,089 UART: [kat] SHA2-256
477,136 UART: [kat] SHA2-384
481,788 UART: [kat] SHA2-512-ACC
484,794 UART: [kat] ECC-384
2,947,064 UART: [kat] HMAC-384Kdf
2,971,892 UART: [kat] LMS
3,501,314 UART: [kat] --
3,505,400 UART: [cold-reset] ++
3,507,973 UART: [fht] FHT @ 0x50003400
3,517,687 UART: [idev] ++
3,518,294 UART: [idev] CDI.KEYID = 6
3,519,204 UART: [idev] SUBJECT.KEYID = 7
3,520,396 UART: [idev] UDS.KEYID = 0
3,521,320 ready_for_fw is high
3,521,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,861 UART: [idev] Erasing UDS.KEYID = 0
6,026,185 UART: [idev] Sha1 KeyId Algorithm
6,050,548 UART: [idev] --
6,055,294 UART: [ldev] ++
6,055,864 UART: [ldev] CDI.KEYID = 6
6,056,776 UART: [ldev] SUBJECT.KEYID = 5
6,057,986 UART: [ldev] AUTHORITY.KEYID = 7
6,059,243 UART: [ldev] FE.KEYID = 1
6,099,831 UART: [ldev] Erasing FE.KEYID = 1
8,605,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,064 UART: [ldev] --
10,411,308 UART: [fwproc] Wait for Commands...
10,413,453 UART: [fwproc] Recv command 0x46574c44
10,415,540 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,272,169 >>> mbox cmd response: success
14,275,963 UART: [afmc] ++
14,276,567 UART: [afmc] CDI.KEYID = 6
14,277,480 UART: [afmc] SUBJECT.KEYID = 7
14,278,636 UART: [afmc] AUTHORITY.KEYID = 5
16,807,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,946 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,847 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,701 UART: [afmc] --
18,602,944 UART: [cold-reset] --
18,605,126 UART: [state] Locking Datavault
18,610,370 UART: [state] Locking PCR0, PCR1 and PCR31
18,612,008 UART: [state] Locking ICCM
18,614,322 UART: [exit] Launching FMC @ 0x40000130
18,622,773 UART:
18,623,005 UART: Running Caliptra FMC ...
18,624,106 UART:
18,624,263 UART: [state] CFI Enabled
18,686,952 UART: [fht] FMC Alias Private Key: 7
20,450,674 UART: [art] Extend RT PCRs Done
20,451,889 UART: [art] Lock RT PCRs Done
20,453,310 UART: [art] Populate DV Done
20,458,618 UART: [fht] FMC Alias Private Key: 7
20,460,152 UART: [art] Derive CDI
20,460,962 UART: [art] Store in in slot 0x4
20,519,694 UART: [art] Derive Key Pair
20,520,727 UART: [art] Store priv key in slot 0x5
22,983,600 UART: [art] Derive Key Pair - Done
22,996,495 UART: [art] Signing Cert with AUTHO
22,997,789 UART: RITY.KEYID = 7
24,708,556 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,058 UART: [art] PUB.X = C658B7D40AE34D1925C4FE344EB290E0C395D58668FC0C76D32099C05A90E14E14AB06D1887D69ACF40FBC77855A7385
24,717,367 UART: [art] PUB.Y = 0AEA8CD901BDDA100DD1F2ED1D70F9F76D9C94D861CFF1062655B0298669D336F17601A6C54C744058BD97B8D3783CAA
24,724,588 UART: [art] SIG.R = 90C16ECB9A60240EA3BA284724A4619A8C4954FAE14C55AFA95322036B884E03CBDBFA1C66D95B98F9A2FACAEB108790
24,732,001 UART: [art] SIG.S = 27C9971CE80E0B31575FCA54DBF7AB8814A8DE321932BB1BB65D0D9CAF084A83577B18FDFAFFF74800009FD0D49A1AE3
25,710,440 UART: Caliptra RT
25,711,140 UART: [state] CFI Enabled
25,875,036 UART: [rt] RT listening for mailbox commands...
25,876,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,908,381 UART: [rt]cmd =0x4d454153, len=108
25,927,833 >>> mbox cmd response data (12 bytes)
25,928,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,959,204 UART: [rt]cmd =0x4d454153, len=108
25,977,717 >>> mbox cmd response data (12 bytes)
25,978,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,008,970 UART: [rt]cmd =0x4d454153, len=108
26,027,239 >>> mbox cmd response data (12 bytes)
26,027,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,058,217 UART: [rt]cmd =0x4d454153, len=108
26,076,561 >>> mbox cmd response data (12 bytes)
26,077,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,107,860 UART: [rt]cmd =0x4d454153, len=108
26,126,362 >>> mbox cmd response data (12 bytes)
26,126,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,157,199 UART: [rt]cmd =0x4d454153, len=108
26,175,463 >>> mbox cmd response data (12 bytes)
26,175,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,206,431 UART: [rt]cmd =0x4d454153, len=108
26,225,250 >>> mbox cmd response data (12 bytes)
26,225,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,256,261 UART: [rt]cmd =0x4d454153, len=108
26,274,201 >>> mbox cmd response data (12 bytes)
26,274,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,305,054 UART: [rt]cmd =0x4d454153, len=108
26,323,882 >>> mbox cmd response data (12 bytes)
26,324,345 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,354,879 UART: [rt]cmd =0x4d454153, len=108
26,373,913 >>> mbox cmd response data (12 bytes)
26,374,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,405,047 UART: [rt]cmd =0x4d454153, len=108
26,423,258 >>> mbox cmd response data (12 bytes)
26,423,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,454,057 UART: [rt]cmd =0x4d454153, len=108
26,472,511 >>> mbox cmd response data (12 bytes)
26,472,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,503,502 UART: [rt]cmd =0x4d454153, len=108
26,522,106 >>> mbox cmd response data (12 bytes)
26,522,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,553,119 UART: [rt]cmd =0x4d454153, len=108
26,572,178 >>> mbox cmd response data (12 bytes)
26,572,608 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,603,082 UART: [rt]cmd =0x4d454153, len=108
26,622,011 >>> mbox cmd response data (12 bytes)
26,622,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,652,875 UART: [rt]cmd =0x4d454153, len=108
26,655,041 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
3,363,443 ready_for_fw is high
3,363,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,045,231 >>> mbox cmd response: success
18,344,553 UART:
18,344,964 UART: Running Caliptra FMC ...
18,346,102 UART:
18,346,264 UART: [state] CFI Enabled
18,410,595 UART: [fht] FMC Alias Private Key: 7
20,174,958 UART: [art] Extend RT PCRs Done
20,176,173 UART: [art] Lock RT PCRs Done
20,177,522 UART: [art] Populate DV Done
20,182,935 UART: [fht] FMC Alias Private Key: 7
20,184,436 UART: [art] Derive CDI
20,185,200 UART: [art] Store in in slot 0x4
20,243,323 UART: [art] Derive Key Pair
20,244,365 UART: [art] Store priv key in slot 0x5
22,706,962 UART: [art] Derive Key Pair - Done
22,719,806 UART: [art] Signing Cert with AUTHO
22,721,106 UART: RITY.KEYID = 7
24,433,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,522 UART: [art] PUB.X = 066D1E8E22AB9A4B52D21B7CE995CACA3C783B95BD4573369ACEC652AC6A6C576CD7E4DDF557C15F80A4E3C7DDB1FCB3
24,441,834 UART: [art] PUB.Y = 8461F0F7689F397FA9815A25C4BA246EEFCE5CFE1C558E410D7E17F96AD60A4E1116B158B1B2C6182232E43FB0E0E752
24,449,054 UART: [art] SIG.R = 4FA784C00B8F800173B6699C37E477EEEC3425FA91BA9C66A226528E7FF245994CE084701B4368541DA8F4D613F7B660
24,456,424 UART: [art] SIG.S = 2FC8D1DB1EC297B9A021917CC83925EDEB8F74A23248F3913792E8EB8EE864450142B09155C47B7373427D9DA35BD5C9
25,435,024 UART: Caliptra RT
25,435,747 UART: [state] CFI Enabled
25,602,441 UART: [rt] RT listening for mailbox commands...
25,604,335 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,636,118 UART: [rt]cmd =0x4d454153, len=108
25,654,777 >>> mbox cmd response data (12 bytes)
25,655,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,685,733 UART: [rt]cmd =0x4d454153, len=108
25,704,446 >>> mbox cmd response data (12 bytes)
25,704,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,735,356 UART: [rt]cmd =0x4d454153, len=108
25,754,324 >>> mbox cmd response data (12 bytes)
25,754,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,785,451 UART: [rt]cmd =0x4d454153, len=108
25,804,241 >>> mbox cmd response data (12 bytes)
25,804,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,835,350 UART: [rt]cmd =0x4d454153, len=108
25,854,878 >>> mbox cmd response data (12 bytes)
25,855,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,886,046 UART: [rt]cmd =0x4d454153, len=108
25,904,816 >>> mbox cmd response data (12 bytes)
25,905,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,935,881 UART: [rt]cmd =0x4d454153, len=108
25,954,050 >>> mbox cmd response data (12 bytes)
25,954,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,985,071 UART: [rt]cmd =0x4d454153, len=108
26,003,386 >>> mbox cmd response data (12 bytes)
26,003,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,034,466 UART: [rt]cmd =0x4d454153, len=108
26,053,160 >>> mbox cmd response data (12 bytes)
26,053,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,084,181 UART: [rt]cmd =0x4d454153, len=108
26,102,780 >>> mbox cmd response data (12 bytes)
26,103,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,133,834 UART: [rt]cmd =0x4d454153, len=108
26,152,901 >>> mbox cmd response data (12 bytes)
26,153,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,184,040 UART: [rt]cmd =0x4d454153, len=108
26,202,764 >>> mbox cmd response data (12 bytes)
26,203,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,233,750 UART: [rt]cmd =0x4d454153, len=108
26,252,891 >>> mbox cmd response data (12 bytes)
26,253,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,283,952 UART: [rt]cmd =0x4d454153, len=108
26,303,066 >>> mbox cmd response data (12 bytes)
26,303,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,132 UART: [rt]cmd =0x4d454153, len=108
26,352,730 >>> mbox cmd response data (12 bytes)
26,353,149 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,531 UART: [rt]cmd =0x4d454153, len=108
26,385,947 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
192,837 UART:
193,203 UART: Running Caliptra ROM ...
194,390 UART:
603,769 UART: [state] CFI Enabled
616,667 UART: [state] LifecycleState = Unprovisioned
618,542 UART: [state] DebugLocked = No
619,788 UART: [state] WD Timer not started. Device not locked for debugging
623,540 UART: [kat] SHA2-256
802,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,230 UART: [kat] ++
814,930 UART: [kat] sha1
826,697 UART: [kat] SHA2-256
829,716 UART: [kat] SHA2-384
835,565 UART: [kat] SHA2-512-ACC
838,572 UART: [kat] ECC-384
3,279,257 UART: [kat] HMAC-384Kdf
3,291,779 UART: [kat] LMS
3,821,255 UART: [kat] --
3,824,707 UART: [cold-reset] ++
3,826,937 UART: [fht] FHT @ 0x50003400
3,838,218 UART: [idev] ++
3,838,789 UART: [idev] CDI.KEYID = 6
3,839,702 UART: [idev] SUBJECT.KEYID = 7
3,840,875 UART: [idev] UDS.KEYID = 0
3,841,800 ready_for_fw is high
3,841,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,283 UART: [idev] Erasing UDS.KEYID = 0
6,320,085 UART: [idev] Sha1 KeyId Algorithm
6,342,498 UART: [idev] --
6,347,113 UART: [ldev] ++
6,347,693 UART: [ldev] CDI.KEYID = 6
6,348,609 UART: [ldev] SUBJECT.KEYID = 5
6,349,770 UART: [ldev] AUTHORITY.KEYID = 7
6,351,056 UART: [ldev] FE.KEYID = 1
6,360,464 UART: [ldev] Erasing FE.KEYID = 1
8,833,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,081 UART: [ldev] --
10,623,953 UART: [fwproc] Wait for Commands...
10,625,995 UART: [fwproc] Recv command 0x46574c44
10,628,087 UART: [fwproc] Recv'd Img size: 114084 bytes
14,027,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,741 >>> mbox cmd response: success
14,494,464 UART: [afmc] ++
14,495,251 UART: [afmc] CDI.KEYID = 6
14,496,176 UART: [afmc] SUBJECT.KEYID = 7
14,497,288 UART: [afmc] AUTHORITY.KEYID = 5
16,996,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,827 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,399 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,736 UART: [afmc] --
18,795,711 UART: [cold-reset] --
18,800,760 UART: [state] Locking Datavault
18,805,692 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,401 UART: [state] Locking ICCM
18,809,876 UART: [exit] Launching FMC @ 0x40000130
18,818,286 UART:
18,818,572 UART: Running Caliptra FMC ...
18,819,687 UART:
18,819,848 UART: [state] CFI Enabled
18,827,865 UART: [fht] FMC Alias Private Key: 7
20,584,524 UART: [art] Extend RT PCRs Done
20,585,748 UART: [art] Lock RT PCRs Done
20,587,046 UART: [art] Populate DV Done
20,592,525 UART: [fht] FMC Alias Private Key: 7
20,593,961 UART: [art] Derive CDI
20,594,726 UART: [art] Store in in slot 0x4
20,637,698 UART: [art] Derive Key Pair
20,638,699 UART: [art] Store priv key in slot 0x5
23,065,153 UART: [art] Derive Key Pair - Done
23,078,206 UART: [art] Signing Cert with AUTHO
23,079,519 UART: RITY.KEYID = 7
24,785,000 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,509 UART: [art] PUB.X = C29CD1F09BEB359F6768B842AF9AF43E09CE9040063E7F56AFF44EE42D2DB001ED16AD1B729C33A1E3355F53EEED2C4D
24,793,844 UART: [art] PUB.Y = DDC0CA8681D732BD5A8B54ECD987E65BA419877A3605E7EBBAA243A70C6B9901BAA5E9736D48CE518FC63379D0370B88
24,801,104 UART: [art] SIG.R = CA5F7208E22D80E6BD66CD2D2F65BDE04712D123198E42FB9C3CB7410CA1FB793A8EAB738E4F8F9AE9CE4A3F350F8BD9
24,808,542 UART: [art] SIG.S = AEFED4BA7AE9CF05B1E60663500513EDF21B451048B3586D9612040EFD1EFBF8FC401695745EBAEC2826BA5D3E126078
25,787,449 UART: Caliptra RT
25,788,153 UART: [state] CFI Enabled
25,906,029 UART: [rt] RT listening for mailbox commands...
25,907,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,938,449 UART: [rt]cmd =0x4d454153, len=108
25,957,420 >>> mbox cmd response data (12 bytes)
25,957,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,988,647 UART: [rt]cmd =0x4d454153, len=108
26,007,308 >>> mbox cmd response data (12 bytes)
26,007,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,038,136 UART: [rt]cmd =0x4d454153, len=108
26,055,969 >>> mbox cmd response data (12 bytes)
26,056,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,086,733 UART: [rt]cmd =0x4d454153, len=108
26,105,125 >>> mbox cmd response data (12 bytes)
26,105,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,136,300 UART: [rt]cmd =0x4d454153, len=108
26,155,391 >>> mbox cmd response data (12 bytes)
26,155,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,186,410 UART: [rt]cmd =0x4d454153, len=108
26,204,618 >>> mbox cmd response data (12 bytes)
26,205,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,235,697 UART: [rt]cmd =0x4d454153, len=108
26,253,379 >>> mbox cmd response data (12 bytes)
26,253,801 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,284,288 UART: [rt]cmd =0x4d454153, len=108
26,303,190 >>> mbox cmd response data (12 bytes)
26,303,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,371 UART: [rt]cmd =0x4d454153, len=108
26,353,269 >>> mbox cmd response data (12 bytes)
26,353,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,384,370 UART: [rt]cmd =0x4d454153, len=108
26,402,974 >>> mbox cmd response data (12 bytes)
26,403,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,434,151 UART: [rt]cmd =0x4d454153, len=108
26,453,058 >>> mbox cmd response data (12 bytes)
26,453,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,917 UART: [rt]cmd =0x4d454153, len=108
26,503,230 >>> mbox cmd response data (12 bytes)
26,503,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,534,453 UART: [rt]cmd =0x4d454153, len=108
26,552,459 >>> mbox cmd response data (12 bytes)
26,552,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,583,470 UART: [rt]cmd =0x4d454153, len=108
26,602,753 >>> mbox cmd response data (12 bytes)
26,603,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,633,830 UART: [rt]cmd =0x4d454153, len=108
26,652,451 >>> mbox cmd response data (12 bytes)
26,652,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,683,527 UART: [rt]cmd =0x4d454153, len=108
26,685,860 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
3,705,215 ready_for_fw is high
3,705,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,284,222 >>> mbox cmd response: success
18,534,580 UART:
18,534,982 UART: Running Caliptra FMC ...
18,536,117 UART:
18,536,297 UART: [state] CFI Enabled
18,544,227 UART: [fht] FMC Alias Private Key: 7
20,301,249 UART: [art] Extend RT PCRs Done
20,302,485 UART: [art] Lock RT PCRs Done
20,304,226 UART: [art] Populate DV Done
20,309,431 UART: [fht] FMC Alias Private Key: 7
20,310,921 UART: [art] Derive CDI
20,311,739 UART: [art] Store in in slot 0x4
20,354,026 UART: [art] Derive Key Pair
20,355,073 UART: [art] Store priv key in slot 0x5
22,781,955 UART: [art] Derive Key Pair - Done
22,795,052 UART: [art] Signing Cert with AUTHO
22,796,391 UART: RITY.KEYID = 7
24,501,834 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,336 UART: [art] PUB.X = 77B793DDB80AD3E83E77CA1033B55CBBBB268371A1431233B23BC3E89DE9A9497150E86414CE5F53A1F0FE2D615167D4
24,510,614 UART: [art] PUB.Y = 3E506DE404D7BA3AD11DF870A5850A2B594186D9F2CB57F0B361885380D0A158F2D6CD0F9FDA9AF0647D7D76CA3E68C2
24,517,857 UART: [art] SIG.R = B1C42A2904FE927D861CD24728C6379A79887EE83DFDDB674E7383FBF57D2937D193932C7E0BBCE8B26B5DCBF906673E
24,525,290 UART: [art] SIG.S = 4614DA332B5B00BFF3EE7A8BD0CB19F54FC21F107F5990A71C86EF88B52FDCE919E3E043748E71DC947E40B960BC90EF
25,504,500 UART: Caliptra RT
25,505,218 UART: [state] CFI Enabled
25,623,275 UART: [rt] RT listening for mailbox commands...
25,625,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,655,747 UART: [rt]cmd =0x4d454153, len=108
25,674,415 >>> mbox cmd response data (12 bytes)
25,674,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,705,504 UART: [rt]cmd =0x4d454153, len=108
25,724,000 >>> mbox cmd response data (12 bytes)
25,724,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,755,151 UART: [rt]cmd =0x4d454153, len=108
25,774,439 >>> mbox cmd response data (12 bytes)
25,774,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,805,409 UART: [rt]cmd =0x4d454153, len=108
25,824,115 >>> mbox cmd response data (12 bytes)
25,824,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,855,103 UART: [rt]cmd =0x4d454153, len=108
25,872,717 >>> mbox cmd response data (12 bytes)
25,873,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,903,684 UART: [rt]cmd =0x4d454153, len=108
25,921,750 >>> mbox cmd response data (12 bytes)
25,922,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,952,801 UART: [rt]cmd =0x4d454153, len=108
25,971,132 >>> mbox cmd response data (12 bytes)
25,971,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,002,145 UART: [rt]cmd =0x4d454153, len=108
26,020,243 >>> mbox cmd response data (12 bytes)
26,020,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,051,432 UART: [rt]cmd =0x4d454153, len=108
26,069,926 >>> mbox cmd response data (12 bytes)
26,070,370 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,100,760 UART: [rt]cmd =0x4d454153, len=108
26,119,888 >>> mbox cmd response data (12 bytes)
26,120,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,150,904 UART: [rt]cmd =0x4d454153, len=108
26,169,241 >>> mbox cmd response data (12 bytes)
26,169,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,200,291 UART: [rt]cmd =0x4d454153, len=108
26,218,139 >>> mbox cmd response data (12 bytes)
26,218,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,249,149 UART: [rt]cmd =0x4d454153, len=108
26,267,622 >>> mbox cmd response data (12 bytes)
26,268,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,298,640 UART: [rt]cmd =0x4d454153, len=108
26,317,418 >>> mbox cmd response data (12 bytes)
26,317,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,348,493 UART: [rt]cmd =0x4d454153, len=108
26,367,044 >>> mbox cmd response data (12 bytes)
26,367,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,397,849 UART: [rt]cmd =0x4d454153, len=108
26,399,883 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,541 UART:
192,909 UART: Running Caliptra ROM ...
194,014 UART:
194,181 UART: [state] CFI Enabled
262,640 UART: [state] LifecycleState = Unprovisioned
264,988 UART: [state] DebugLocked = No
266,863 UART: [state] WD Timer not started. Device not locked for debugging
272,049 UART: [kat] SHA2-256
461,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,721 UART: [kat] ++
473,172 UART: [kat] sha1
484,755 UART: [kat] SHA2-256
487,762 UART: [kat] SHA2-384
494,030 UART: [kat] SHA2-512-ACC
496,611 UART: [kat] ECC-384
2,946,993 UART: [kat] HMAC-384Kdf
2,971,800 UART: [kat] LMS
3,503,576 UART: [kat] --
3,508,111 UART: [cold-reset] ++
3,509,810 UART: [fht] FHT @ 0x50003400
3,522,002 UART: [idev] ++
3,522,647 UART: [idev] CDI.KEYID = 6
3,523,679 UART: [idev] SUBJECT.KEYID = 7
3,524,779 UART: [idev] UDS.KEYID = 0
3,525,820 ready_for_fw is high
3,526,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,661 UART: [idev] Erasing UDS.KEYID = 0
6,029,666 UART: [idev] Sha1 KeyId Algorithm
6,052,685 UART: [idev] --
6,058,565 UART: [ldev] ++
6,059,246 UART: [ldev] CDI.KEYID = 6
6,060,132 UART: [ldev] SUBJECT.KEYID = 5
6,061,343 UART: [ldev] AUTHORITY.KEYID = 7
6,062,575 UART: [ldev] FE.KEYID = 1
6,100,314 UART: [ldev] Erasing FE.KEYID = 1
8,607,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,537 UART: [ldev] --
10,413,233 UART: [fwproc] Wait for Commands...
10,415,534 UART: [fwproc] Recv command 0x46574c44
10,417,793 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,960 >>> mbox cmd response: success
14,600,253 UART: [afmc] ++
14,600,955 UART: [afmc] CDI.KEYID = 6
14,602,064 UART: [afmc] SUBJECT.KEYID = 7
14,603,632 UART: [afmc] AUTHORITY.KEYID = 5
17,128,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,872,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,922 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,358 UART: [afmc] --
18,929,410 UART: [cold-reset] --
18,934,298 UART: [state] Locking Datavault
18,939,832 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,989 UART: [state] Locking ICCM
18,944,358 UART: [exit] Launching FMC @ 0x40000130
18,953,039 UART:
18,953,295 UART: Running Caliptra FMC ...
18,954,398 UART:
18,954,579 UART: [state] CFI Enabled
19,012,785 UART: [fht] FMC Alias Private Key: 7
20,776,870 UART: [art] Extend RT PCRs Done
20,778,087 UART: [art] Lock RT PCRs Done
20,779,773 UART: [art] Populate DV Done
20,785,179 UART: [fht] FMC Alias Private Key: 7
20,786,753 UART: [art] Derive CDI
20,787,526 UART: [art] Store in in slot 0x4
20,845,215 UART: [art] Derive Key Pair
20,846,214 UART: [art] Store priv key in slot 0x5
23,309,947 UART: [art] Derive Key Pair - Done
23,322,619 UART: [art] Signing Cert with AUTHO
23,323,921 UART: RITY.KEYID = 7
25,035,182 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,691 UART: [art] PUB.X = EB0C35D69C4BA08A509F0CA65271C93B97085C102CA1351AEC919D3D6743DB01974D33C5A222C07401B8FB39F8B162AC
25,043,952 UART: [art] PUB.Y = CD6C3B1678AA9D95D8C99AF0419697EC53D2C43A226C109CC2750076202819668DD731A4AD007233B9A58A842099475E
25,051,168 UART: [art] SIG.R = FC4304523B108B56AB9FEDBF2661AFC3388DE45843270EABE9BA2ABB1CDD1D15B23831556669EB046180485D3EE3898E
25,058,539 UART: [art] SIG.S = 322D318C27E45C7B409B5D7EFF03AB7FE4069128D3BF6DDE99022B94DB5AF130113E28B44CFC7745244C783664AB848E
26,037,036 UART: Caliptra RT
26,037,748 UART: [state] CFI Enabled
26,204,444 UART: [rt] RT listening for mailbox commands...
26,206,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,237,615 UART: [rt]cmd =0x4d454153, len=108
26,256,534 >>> mbox cmd response data (12 bytes)
26,257,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,287,847 UART: [rt]cmd =0x4d454153, len=108
26,306,363 >>> mbox cmd response data (12 bytes)
26,306,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,483 UART: [rt]cmd =0x4d454153, len=108
26,355,932 >>> mbox cmd response data (12 bytes)
26,356,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,014 UART: [rt]cmd =0x4d454153, len=108
26,404,597 >>> mbox cmd response data (12 bytes)
26,405,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,435,566 UART: [rt]cmd =0x4d454153, len=108
26,453,843 >>> mbox cmd response data (12 bytes)
26,454,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,485,126 UART: [rt]cmd =0x4d454153, len=108
26,503,604 >>> mbox cmd response data (12 bytes)
26,504,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,534,628 UART: [rt]cmd =0x4d454153, len=108
26,554,271 >>> mbox cmd response data (12 bytes)
26,554,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,585,425 UART: [rt]cmd =0x4d454153, len=108
26,603,981 >>> mbox cmd response data (12 bytes)
26,604,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,635,000 UART: [rt]cmd =0x4d454153, len=108
26,653,057 >>> mbox cmd response data (12 bytes)
26,653,513 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,683,828 UART: [rt]cmd =0x4d454153, len=108
26,703,191 >>> mbox cmd response data (12 bytes)
26,703,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,734,155 UART: [rt]cmd =0x4d454153, len=108
26,752,801 >>> mbox cmd response data (12 bytes)
26,753,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,783,814 UART: [rt]cmd =0x4d454153, len=108
26,802,320 >>> mbox cmd response data (12 bytes)
26,802,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,833,314 UART: [rt]cmd =0x4d454153, len=108
26,852,083 >>> mbox cmd response data (12 bytes)
26,852,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,883,262 UART: [rt]cmd =0x4d454153, len=108
26,901,907 >>> mbox cmd response data (12 bytes)
26,902,386 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,933,375 UART: [rt]cmd =0x4d454153, len=108
26,952,317 >>> mbox cmd response data (12 bytes)
26,952,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,983,533 UART: [rt]cmd =0x4d454153, len=108
26,985,594 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,438,617 ready_for_fw is high
3,438,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,705,918 >>> mbox cmd response: success
18,978,922 UART:
18,979,322 UART: Running Caliptra FMC ...
18,980,464 UART:
18,980,620 UART: [state] CFI Enabled
19,048,942 UART: [fht] FMC Alias Private Key: 7
20,813,305 UART: [art] Extend RT PCRs Done
20,814,534 UART: [art] Lock RT PCRs Done
20,816,270 UART: [art] Populate DV Done
20,821,846 UART: [fht] FMC Alias Private Key: 7
20,823,383 UART: [art] Derive CDI
20,824,193 UART: [art] Store in in slot 0x4
20,881,075 UART: [art] Derive Key Pair
20,882,108 UART: [art] Store priv key in slot 0x5
23,345,558 UART: [art] Derive Key Pair - Done
23,358,402 UART: [art] Signing Cert with AUTHO
23,359,723 UART: RITY.KEYID = 7
25,072,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,541 UART: [art] PUB.X = 3BEC1A554E372F441861323CFC6810440B0F551ED907DADB1EF7DDF6019B50386A177DC8983FC705A30B22049DFDF1FF
25,080,834 UART: [art] PUB.Y = 4DEA6F6AB3620FAA3F49622A52A88C62CD362EBCAA6C3ECC12F73C910B3E82C9A9C89A28FB012A867724053F4EB4D5F8
25,088,112 UART: [art] SIG.R = 18561575A3FC8803D5019F9A042009369E16F016A882C5EA0592AE59A08722953644EA148DA69C2047D19EED7C65A1FE
25,095,494 UART: [art] SIG.S = 94AF9679F5802E6D8004658E67210F2D55A71BAE136E2258F194AF6D4D72968D4A2F5B55A972ED7E1457B6E5DB47555E
26,074,242 UART: Caliptra RT
26,074,953 UART: [state] CFI Enabled
26,239,809 UART: [rt] RT listening for mailbox commands...
26,241,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,273,240 UART: [rt]cmd =0x4d454153, len=108
26,291,800 >>> mbox cmd response data (12 bytes)
26,292,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,322,926 UART: [rt]cmd =0x4d454153, len=108
26,341,459 >>> mbox cmd response data (12 bytes)
26,341,901 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,372,508 UART: [rt]cmd =0x4d454153, len=108
26,390,510 >>> mbox cmd response data (12 bytes)
26,390,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,421,748 UART: [rt]cmd =0x4d454153, len=108
26,439,716 >>> mbox cmd response data (12 bytes)
26,440,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,470,688 UART: [rt]cmd =0x4d454153, len=108
26,489,216 >>> mbox cmd response data (12 bytes)
26,489,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,520,505 UART: [rt]cmd =0x4d454153, len=108
26,538,305 >>> mbox cmd response data (12 bytes)
26,538,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,569,471 UART: [rt]cmd =0x4d454153, len=108
26,588,342 >>> mbox cmd response data (12 bytes)
26,588,768 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,619,473 UART: [rt]cmd =0x4d454153, len=108
26,638,021 >>> mbox cmd response data (12 bytes)
26,638,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,669,101 UART: [rt]cmd =0x4d454153, len=108
26,688,243 >>> mbox cmd response data (12 bytes)
26,688,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,719,151 UART: [rt]cmd =0x4d454153, len=108
26,737,624 >>> mbox cmd response data (12 bytes)
26,738,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,768,696 UART: [rt]cmd =0x4d454153, len=108
26,786,981 >>> mbox cmd response data (12 bytes)
26,787,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,818,085 UART: [rt]cmd =0x4d454153, len=108
26,836,742 >>> mbox cmd response data (12 bytes)
26,837,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,867,695 UART: [rt]cmd =0x4d454153, len=108
26,886,166 >>> mbox cmd response data (12 bytes)
26,886,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,917,352 UART: [rt]cmd =0x4d454153, len=108
26,935,961 >>> mbox cmd response data (12 bytes)
26,936,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,966,967 UART: [rt]cmd =0x4d454153, len=108
26,985,301 >>> mbox cmd response data (12 bytes)
26,985,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,016,151 UART: [rt]cmd =0x4d454153, len=108
27,018,467 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
193,053 UART:
193,418 UART: Running Caliptra ROM ...
194,604 UART:
604,245 UART: [state] CFI Enabled
616,867 UART: [state] LifecycleState = Unprovisioned
619,254 UART: [state] DebugLocked = No
621,777 UART: [state] WD Timer not started. Device not locked for debugging
626,799 UART: [kat] SHA2-256
816,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,425 UART: [kat] ++
828,036 UART: [kat] sha1
839,134 UART: [kat] SHA2-256
842,207 UART: [kat] SHA2-384
847,980 UART: [kat] SHA2-512-ACC
850,571 UART: [kat] ECC-384
3,290,276 UART: [kat] HMAC-384Kdf
3,304,079 UART: [kat] LMS
3,835,962 UART: [kat] --
3,842,521 UART: [cold-reset] ++
3,844,760 UART: [fht] FHT @ 0x50003400
3,856,236 UART: [idev] ++
3,856,882 UART: [idev] CDI.KEYID = 6
3,857,916 UART: [idev] SUBJECT.KEYID = 7
3,859,091 UART: [idev] UDS.KEYID = 0
3,860,176 ready_for_fw is high
3,860,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,637 UART: [idev] Erasing UDS.KEYID = 0
6,335,580 UART: [idev] Sha1 KeyId Algorithm
6,359,400 UART: [idev] --
6,362,854 UART: [ldev] ++
6,363,590 UART: [ldev] CDI.KEYID = 6
6,364,502 UART: [ldev] SUBJECT.KEYID = 5
6,365,664 UART: [ldev] AUTHORITY.KEYID = 7
6,366,893 UART: [ldev] FE.KEYID = 1
6,378,676 UART: [ldev] Erasing FE.KEYID = 1
8,856,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,511 UART: [ldev] --
10,649,784 UART: [fwproc] Wait for Commands...
10,651,392 UART: [fwproc] Recv command 0x46574c44
10,653,701 UART: [fwproc] Recv'd Img size: 114084 bytes
14,102,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,842,403 >>> mbox cmd response: success
14,847,234 UART: [afmc] ++
14,847,944 UART: [afmc] CDI.KEYID = 6
14,849,137 UART: [afmc] SUBJECT.KEYID = 7
14,850,601 UART: [afmc] AUTHORITY.KEYID = 5
17,354,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,038 UART: [afmc] --
19,153,907 UART: [cold-reset] --
19,156,860 UART: [state] Locking Datavault
19,162,559 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,710 UART: [state] Locking ICCM
19,166,391 UART: [exit] Launching FMC @ 0x40000130
19,175,081 UART:
19,175,321 UART: Running Caliptra FMC ...
19,176,426 UART:
19,176,607 UART: [state] CFI Enabled
19,184,943 UART: [fht] FMC Alias Private Key: 7
20,941,956 UART: [art] Extend RT PCRs Done
20,943,547 UART: [art] Lock RT PCRs Done
20,944,665 UART: [art] Populate DV Done
20,950,050 UART: [fht] FMC Alias Private Key: 7
20,951,807 UART: [art] Derive CDI
20,952,626 UART: [art] Store in in slot 0x4
20,995,356 UART: [art] Derive Key Pair
20,996,343 UART: [art] Store priv key in slot 0x5
23,422,940 UART: [art] Derive Key Pair - Done
23,436,157 UART: [art] Signing Cert with AUTHO
23,437,472 UART: RITY.KEYID = 7
25,143,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,835 UART: [art] PUB.X = 93A5FDBF971EAF36E729B651E1E3D54C6D49C7A6C696DA1779FCDE3A199301E4BFA9382EDDC6197A7F7A8F710F15CBDB
25,152,111 UART: [art] PUB.Y = B883D4CC5BAC42C54DB8DECCC243C49B1AC1E7ED261325FED88C4A595883F9F23ACE1454C9E06D39F6097A301D72B9F9
25,159,398 UART: [art] SIG.R = A7CFC785B7524BFBD3BCD3471E4F884B28D4226A573875E3EB4B8EA401D63BE7025153B9CDB821F1012CDD21494F3BCE
25,166,827 UART: [art] SIG.S = 8EADAEB9130EB9932145F96D748AFB152639DDAF8547EEFAD22113B11364CDF64AC186DA8B5147CD7D221DD87B776B0E
26,146,060 UART: Caliptra RT
26,146,773 UART: [state] CFI Enabled
26,263,245 UART: [rt] RT listening for mailbox commands...
26,265,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,295,848 UART: [rt]cmd =0x4d454153, len=108
26,314,291 >>> mbox cmd response data (12 bytes)
26,314,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,345,622 UART: [rt]cmd =0x4d454153, len=108
26,363,351 >>> mbox cmd response data (12 bytes)
26,363,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,394,450 UART: [rt]cmd =0x4d454153, len=108
26,412,979 >>> mbox cmd response data (12 bytes)
26,413,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,444,008 UART: [rt]cmd =0x4d454153, len=108
26,462,202 >>> mbox cmd response data (12 bytes)
26,462,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,493,228 UART: [rt]cmd =0x4d454153, len=108
26,512,189 >>> mbox cmd response data (12 bytes)
26,512,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,543,295 UART: [rt]cmd =0x4d454153, len=108
26,562,423 >>> mbox cmd response data (12 bytes)
26,562,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,593,553 UART: [rt]cmd =0x4d454153, len=108
26,612,916 >>> mbox cmd response data (12 bytes)
26,613,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,643,881 UART: [rt]cmd =0x4d454153, len=108
26,661,978 >>> mbox cmd response data (12 bytes)
26,662,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,693,157 UART: [rt]cmd =0x4d454153, len=108
26,712,114 >>> mbox cmd response data (12 bytes)
26,712,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,743,342 UART: [rt]cmd =0x4d454153, len=108
26,761,465 >>> mbox cmd response data (12 bytes)
26,761,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,792,597 UART: [rt]cmd =0x4d454153, len=108
26,810,530 >>> mbox cmd response data (12 bytes)
26,810,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,841,843 UART: [rt]cmd =0x4d454153, len=108
26,860,717 >>> mbox cmd response data (12 bytes)
26,861,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,891,677 UART: [rt]cmd =0x4d454153, len=108
26,909,721 >>> mbox cmd response data (12 bytes)
26,910,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,940,690 UART: [rt]cmd =0x4d454153, len=108
26,959,789 >>> mbox cmd response data (12 bytes)
26,960,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,990,853 UART: [rt]cmd =0x4d454153, len=108
27,009,834 >>> mbox cmd response data (12 bytes)
27,010,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,041,139 UART: [rt]cmd =0x4d454153, len=108
27,043,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,569 writing to cptra_bootfsm_go
3,753,924 ready_for_fw is high
3,754,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,948,003 >>> mbox cmd response: success
19,199,345 UART:
19,199,770 UART: Running Caliptra FMC ...
19,200,905 UART:
19,201,068 UART: [state] CFI Enabled
19,208,970 UART: [fht] FMC Alias Private Key: 7
20,966,122 UART: [art] Extend RT PCRs Done
20,967,353 UART: [art] Lock RT PCRs Done
20,969,010 UART: [art] Populate DV Done
20,974,383 UART: [fht] FMC Alias Private Key: 7
20,975,877 UART: [art] Derive CDI
20,976,616 UART: [art] Store in in slot 0x4
21,019,162 UART: [art] Derive Key Pair
21,020,205 UART: [art] Store priv key in slot 0x5
23,446,783 UART: [art] Derive Key Pair - Done
23,459,832 UART: [art] Signing Cert with AUTHO
23,461,314 UART: RITY.KEYID = 7
25,167,015 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,557 UART: [art] PUB.X = 0053D672042090C6458A696AB981B42E6C2AEC746100965331D622DE69242E3A0D70B6DD917D7B530DFDA675C15ADA76
25,175,747 UART: [art] PUB.Y = F6F6A0752F2D24C51D5D5B1445B935FD50F2A66113FE57952A6EECF1AA014E63DCCE3B1A1FB80B35253668F80D46FF5D
25,182,978 UART: [art] SIG.R = 9EA452A5BF102CBE03CA9149B576B5060C2167EC8D05850F49682646E526F67EDD7C01ADFF676E7C5F326064E0C77A80
25,190,375 UART: [art] SIG.S = 5C3178CDBF50AD10EC2507ACC0AC367887D48E67F90D728236E2943F1C6BA4BD2E6399E95DE6C97C6E9DB550DF9A8B7C
26,168,942 UART: Caliptra RT
26,169,655 UART: [state] CFI Enabled
26,288,036 UART: [rt] RT listening for mailbox commands...
26,289,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,320,590 UART: [rt]cmd =0x4d454153, len=108
26,339,521 >>> mbox cmd response data (12 bytes)
26,340,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,370,915 UART: [rt]cmd =0x4d454153, len=108
26,389,605 >>> mbox cmd response data (12 bytes)
26,390,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,420,606 UART: [rt]cmd =0x4d454153, len=108
26,438,701 >>> mbox cmd response data (12 bytes)
26,439,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,469,583 UART: [rt]cmd =0x4d454153, len=108
26,487,888 >>> mbox cmd response data (12 bytes)
26,488,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,518,804 UART: [rt]cmd =0x4d454153, len=108
26,537,497 >>> mbox cmd response data (12 bytes)
26,537,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,568,462 UART: [rt]cmd =0x4d454153, len=108
26,586,853 >>> mbox cmd response data (12 bytes)
26,587,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,617,952 UART: [rt]cmd =0x4d454153, len=108
26,636,986 >>> mbox cmd response data (12 bytes)
26,637,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,668,107 UART: [rt]cmd =0x4d454153, len=108
26,685,988 >>> mbox cmd response data (12 bytes)
26,686,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,716,974 UART: [rt]cmd =0x4d454153, len=108
26,735,259 >>> mbox cmd response data (12 bytes)
26,735,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,766,430 UART: [rt]cmd =0x4d454153, len=108
26,785,500 >>> mbox cmd response data (12 bytes)
26,785,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,816,524 UART: [rt]cmd =0x4d454153, len=108
26,834,758 >>> mbox cmd response data (12 bytes)
26,835,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,866,079 UART: [rt]cmd =0x4d454153, len=108
26,884,578 >>> mbox cmd response data (12 bytes)
26,884,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,915,699 UART: [rt]cmd =0x4d454153, len=108
26,934,282 >>> mbox cmd response data (12 bytes)
26,934,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,965,354 UART: [rt]cmd =0x4d454153, len=108
26,983,981 >>> mbox cmd response data (12 bytes)
26,984,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,015,076 UART: [rt]cmd =0x4d454153, len=108
27,034,113 >>> mbox cmd response data (12 bytes)
27,034,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,064,981 UART: [rt]cmd =0x4d454153, len=108
27,067,294 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,563 UART: [kat] SHA2-256
892,501 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,373 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 ready_for_fw is high
1,480,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,874 UART: [idev] Erasing UDS.KEYID = 0
1,505,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,163 UART: [ldev] ++
1,515,331 UART: [ldev] CDI.KEYID = 6
1,515,694 UART: [ldev] SUBJECT.KEYID = 5
1,516,120 UART: [ldev] AUTHORITY.KEYID = 7
1,516,583 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,547,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,026 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,220 UART: [fwproc] Received command 0x46574c44
1,588,011 UART: [fwproc] Received Image of size 114084 bytes
2,883,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,458 >>> mbox cmd response: success
3,076,538 UART: [afmc] ++
3,076,706 UART: [afmc] CDI.KEYID = 6
3,077,068 UART: [afmc] SUBJECT.KEYID = 7
3,077,493 UART: [afmc] AUTHORITY.KEYID = 5
3,113,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,996 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,609 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,299 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,996 UART: [afmc] --
3,156,106 UART: [cold-reset] --
3,156,940 UART: [state] Locking Datavault
3,157,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,495 UART: [state] Locking ICCM
3,159,159 UART: [exit] Launching FMC @ 0x40000130
3,164,488 UART:
3,164,504 UART: Running Caliptra FMC ...
3,164,912 UART:
3,164,966 UART: [state] CFI Enabled
3,175,811 UART: [fht] FMC Alias Private Key: 7
3,284,552 UART: [art] Extend RT PCRs Done
3,284,980 UART: [art] Lock RT PCRs Done
3,286,680 UART: [art] Populate DV Done
3,295,007 UART: [fht] FMC Alias Private Key: 7
3,295,979 UART: [art] Derive CDI
3,296,259 UART: [art] Store in in slot 0x4
3,381,888 UART: [art] Derive Key Pair
3,382,248 UART: [art] Store priv key in slot 0x5
3,395,916 UART: [art] Derive Key Pair - Done
3,411,003 UART: [art] Signing Cert with AUTHO
3,411,483 UART: RITY.KEYID = 7
3,426,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,682 UART: [art] PUB.X = B7079CDE04DB6CAB75A39F749742AEB4009C5A18BED5B55594D1BAF4131E0F261475F0E65EDCACB5107A40F5B497E774
3,434,435 UART: [art] PUB.Y = 4F8273EBE3B93D6B3E648BC82C7D64471B45E49D778F17FFA86D090BC844807BCBA5A6804B3E68250ACEA176F091E681
3,441,384 UART: [art] SIG.R = 8D92094ED4495467E263172F2EE583F44981664A16203509FB2172F3B3BFBFC99CF5DBA3ED616D1C51E114EB2F5ECE75
3,448,154 UART: [art] SIG.S = 28FC556136FF2BD51D7B5F6598775AA24B99E6316D7D90CD30428E905D3ADC4C4CC2A303375F92EE078A03354884E7D4
3,471,902 UART: Caliptra RT
3,472,155 UART: [state] CFI Enabled
3,580,750 UART: [rt] RT listening for mailbox commands...
3,581,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,942 UART: [rt]cmd =0x4d454153, len=108
3,632,739 >>> mbox cmd response data (12 bytes)
3,632,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,777 UART: [rt]cmd =0x4d454153, len=108
3,684,324 >>> mbox cmd response data (12 bytes)
3,684,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,302 UART: [rt]cmd =0x4d454153, len=108
3,735,293 >>> mbox cmd response data (12 bytes)
3,735,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,249 UART: [rt]cmd =0x4d454153, len=108
3,784,982 >>> mbox cmd response data (12 bytes)
3,784,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,772 UART: [rt]cmd =0x4d454153, len=108
3,835,715 >>> mbox cmd response data (12 bytes)
3,835,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,741 UART: [rt]cmd =0x4d454153, len=108
3,886,680 >>> mbox cmd response data (12 bytes)
3,886,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,632 UART: [rt]cmd =0x4d454153, len=108
3,938,137 >>> mbox cmd response data (12 bytes)
3,938,138 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,999 UART: [rt]cmd =0x4d454153, len=108
3,988,598 >>> mbox cmd response data (12 bytes)
3,988,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,568 UART: [rt]cmd =0x4d454153, len=108
4,039,943 >>> mbox cmd response data (12 bytes)
4,039,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,789 UART: [rt]cmd =0x4d454153, len=108
4,090,072 >>> mbox cmd response data (12 bytes)
4,090,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,108 UART: [rt]cmd =0x4d454153, len=108
4,141,561 >>> mbox cmd response data (12 bytes)
4,141,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,511 UART: [rt]cmd =0x4d454153, len=108
4,192,586 >>> mbox cmd response data (12 bytes)
4,192,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,646 UART: [rt]cmd =0x4d454153, len=108
4,242,845 >>> mbox cmd response data (12 bytes)
4,242,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,272,783 UART: [rt]cmd =0x4d454153, len=108
4,293,930 >>> mbox cmd response data (12 bytes)
4,293,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,323,918 UART: [rt]cmd =0x4d454153, len=108
4,345,145 >>> mbox cmd response data (12 bytes)
4,345,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,969 UART: [rt]cmd =0x4d454153, len=108
4,376,921 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,955 ready_for_fw is high
1,361,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,606 >>> mbox cmd response: success
2,984,166 UART:
2,984,182 UART: Running Caliptra FMC ...
2,984,590 UART:
2,984,644 UART: [state] CFI Enabled
2,994,739 UART: [fht] FMC Alias Private Key: 7
3,102,724 UART: [art] Extend RT PCRs Done
3,103,152 UART: [art] Lock RT PCRs Done
3,104,874 UART: [art] Populate DV Done
3,113,151 UART: [fht] FMC Alias Private Key: 7
3,114,273 UART: [art] Derive CDI
3,114,553 UART: [art] Store in in slot 0x4
3,200,310 UART: [art] Derive Key Pair
3,200,670 UART: [art] Store priv key in slot 0x5
3,213,904 UART: [art] Derive Key Pair - Done
3,228,622 UART: [art] Signing Cert with AUTHO
3,229,102 UART: RITY.KEYID = 7
3,244,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,261 UART: [art] PUB.X = 8559AFC00BBE5B150961C8EF4C34833981E317E7090BD0620FDD19AA062D588A2BFC762F8790A0504DFE7C39E858A7DC
3,252,021 UART: [art] PUB.Y = B1886FB132B923F39E2CB722829EC2217C90D1AA6F8B132AC24A95EEDF40F22F49372D36674F560E3205628145E9E9F7
3,258,965 UART: [art] SIG.R = ADEB74C3F4D6215BD0CA8B1E16199B6786406C02A36A1CAB395A36B7FCFA28C934DB760D3DC2D1DABA25E243158D17BC
3,265,749 UART: [art] SIG.S = 1A2D9A0085D108B3D3D483D59BB32F2D39CF451F69C09F7083187F431CA814D0320AEFB017DB82C1CADBBDDC4D6CA8A6
3,289,308 UART: Caliptra RT
3,289,561 UART: [state] CFI Enabled
3,398,346 UART: [rt] RT listening for mailbox commands...
3,399,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,394 UART: [rt]cmd =0x4d454153, len=108
3,450,599 >>> mbox cmd response data (12 bytes)
3,450,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,751 UART: [rt]cmd =0x4d454153, len=108
3,501,522 >>> mbox cmd response data (12 bytes)
3,501,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,626 UART: [rt]cmd =0x4d454153, len=108
3,551,857 >>> mbox cmd response data (12 bytes)
3,551,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,075 UART: [rt]cmd =0x4d454153, len=108
3,602,724 >>> mbox cmd response data (12 bytes)
3,602,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,694 UART: [rt]cmd =0x4d454153, len=108
3,653,453 >>> mbox cmd response data (12 bytes)
3,653,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,567 UART: [rt]cmd =0x4d454153, len=108
3,704,432 >>> mbox cmd response data (12 bytes)
3,704,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,300 UART: [rt]cmd =0x4d454153, len=108
3,754,761 >>> mbox cmd response data (12 bytes)
3,754,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,985 UART: [rt]cmd =0x4d454153, len=108
3,806,302 >>> mbox cmd response data (12 bytes)
3,806,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,340 UART: [rt]cmd =0x4d454153, len=108
3,857,711 >>> mbox cmd response data (12 bytes)
3,857,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,711 UART: [rt]cmd =0x4d454153, len=108
3,908,000 >>> mbox cmd response data (12 bytes)
3,908,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,954 UART: [rt]cmd =0x4d454153, len=108
3,958,663 >>> mbox cmd response data (12 bytes)
3,958,664 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,988,705 UART: [rt]cmd =0x4d454153, len=108
4,009,350 >>> mbox cmd response data (12 bytes)
4,009,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,274 UART: [rt]cmd =0x4d454153, len=108
4,059,847 >>> mbox cmd response data (12 bytes)
4,059,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,101 UART: [rt]cmd =0x4d454153, len=108
4,111,502 >>> mbox cmd response data (12 bytes)
4,111,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,141,630 UART: [rt]cmd =0x4d454153, len=108
4,163,417 >>> mbox cmd response data (12 bytes)
4,163,418 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,539 UART: [rt]cmd =0x4d454153, len=108
4,195,515 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,793 UART: [kat] LMS
1,475,989 UART: [kat] --
1,476,770 UART: [cold-reset] ++
1,477,242 UART: [fht] Storing FHT @ 0x50003400
1,479,897 UART: [idev] ++
1,480,065 UART: [idev] CDI.KEYID = 6
1,480,425 UART: [idev] SUBJECT.KEYID = 7
1,480,849 UART: [idev] UDS.KEYID = 0
1,481,194 ready_for_fw is high
1,481,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,067 UART: [idev] --
1,515,110 UART: [ldev] ++
1,515,278 UART: [ldev] CDI.KEYID = 6
1,515,641 UART: [ldev] SUBJECT.KEYID = 5
1,516,067 UART: [ldev] AUTHORITY.KEYID = 7
1,516,530 UART: [ldev] FE.KEYID = 1
1,521,798 UART: [ldev] Erasing FE.KEYID = 1
1,547,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,547 UART: [ldev] --
1,586,836 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 114084 bytes
2,884,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,421 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,152 >>> mbox cmd response: success
3,077,304 UART: [afmc] ++
3,077,472 UART: [afmc] CDI.KEYID = 6
3,077,834 UART: [afmc] SUBJECT.KEYID = 7
3,078,259 UART: [afmc] AUTHORITY.KEYID = 5
3,112,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,128 UART: [afmc] --
3,156,070 UART: [cold-reset] --
3,156,858 UART: [state] Locking Datavault
3,158,045 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,649 UART: [state] Locking ICCM
3,159,129 UART: [exit] Launching FMC @ 0x40000130
3,164,458 UART:
3,164,474 UART: Running Caliptra FMC ...
3,164,882 UART:
3,165,025 UART: [state] CFI Enabled
3,175,740 UART: [fht] FMC Alias Private Key: 7
3,284,085 UART: [art] Extend RT PCRs Done
3,284,513 UART: [art] Lock RT PCRs Done
3,286,131 UART: [art] Populate DV Done
3,294,520 UART: [fht] FMC Alias Private Key: 7
3,295,610 UART: [art] Derive CDI
3,295,890 UART: [art] Store in in slot 0x4
3,381,923 UART: [art] Derive Key Pair
3,382,283 UART: [art] Store priv key in slot 0x5
3,396,003 UART: [art] Derive Key Pair - Done
3,410,893 UART: [art] Signing Cert with AUTHO
3,411,373 UART: RITY.KEYID = 7
3,426,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,580 UART: [art] PUB.X = 568F7AD2EA55971638D8E2D1486AF43F85F005053319B9FEB4538820A70264226685ECD48CC775D08B86B3A9EF808E11
3,434,337 UART: [art] PUB.Y = 840A7F305BE5A6389D1CAA4DA93D2037A6E870078E4F802E71CBD5C0E5EEE3C6F40B871456ACD49D38CB12EEC8EA6138
3,441,294 UART: [art] SIG.R = 0293E7980E997BC68F882BCA624C71B2CB1B457E893F07CA61D87F588CC7B8014B7281F84EF993CE9A3BA406A0CCFC4B
3,448,061 UART: [art] SIG.S = 26AC2025C561668D961D9CEB4915E61C01AA335D10E540014468394949616BA4665F88F700379993C3D915A308157A6E
3,471,765 UART: Caliptra RT
3,472,110 UART: [state] CFI Enabled
3,580,652 UART: [rt] RT listening for mailbox commands...
3,581,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,820 UART: [rt]cmd =0x4d454153, len=108
3,632,157 >>> mbox cmd response data (12 bytes)
3,632,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,247 UART: [rt]cmd =0x4d454153, len=108
3,682,680 >>> mbox cmd response data (12 bytes)
3,682,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,716 UART: [rt]cmd =0x4d454153, len=108
3,733,329 >>> mbox cmd response data (12 bytes)
3,733,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,431 UART: [rt]cmd =0x4d454153, len=108
3,783,954 >>> mbox cmd response data (12 bytes)
3,783,955 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,940 UART: [rt]cmd =0x4d454153, len=108
3,834,843 >>> mbox cmd response data (12 bytes)
3,834,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,905 UART: [rt]cmd =0x4d454153, len=108
3,885,538 >>> mbox cmd response data (12 bytes)
3,885,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,498 UART: [rt]cmd =0x4d454153, len=108
3,935,871 >>> mbox cmd response data (12 bytes)
3,935,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,727 UART: [rt]cmd =0x4d454153, len=108
3,986,376 >>> mbox cmd response data (12 bytes)
3,986,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,250 UART: [rt]cmd =0x4d454153, len=108
4,036,807 >>> mbox cmd response data (12 bytes)
4,036,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,699 UART: [rt]cmd =0x4d454153, len=108
4,087,662 >>> mbox cmd response data (12 bytes)
4,087,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,656 UART: [rt]cmd =0x4d454153, len=108
4,138,739 >>> mbox cmd response data (12 bytes)
4,138,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,775 UART: [rt]cmd =0x4d454153, len=108
4,189,552 >>> mbox cmd response data (12 bytes)
4,189,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,458 UART: [rt]cmd =0x4d454153, len=108
4,240,643 >>> mbox cmd response data (12 bytes)
4,240,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,495 UART: [rt]cmd =0x4d454153, len=108
4,291,736 >>> mbox cmd response data (12 bytes)
4,291,737 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,908 UART: [rt]cmd =0x4d454153, len=108
4,342,859 >>> mbox cmd response data (12 bytes)
4,342,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,859 UART: [rt]cmd =0x4d454153, len=108
4,374,693 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,502 ready_for_fw is high
1,362,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,565 >>> mbox cmd response: success
2,985,741 UART:
2,985,757 UART: Running Caliptra FMC ...
2,986,165 UART:
2,986,308 UART: [state] CFI Enabled
2,997,261 UART: [fht] FMC Alias Private Key: 7
3,105,116 UART: [art] Extend RT PCRs Done
3,105,544 UART: [art] Lock RT PCRs Done
3,107,222 UART: [art] Populate DV Done
3,115,235 UART: [fht] FMC Alias Private Key: 7
3,116,371 UART: [art] Derive CDI
3,116,651 UART: [art] Store in in slot 0x4
3,202,068 UART: [art] Derive Key Pair
3,202,428 UART: [art] Store priv key in slot 0x5
3,215,382 UART: [art] Derive Key Pair - Done
3,230,299 UART: [art] Signing Cert with AUTHO
3,230,779 UART: RITY.KEYID = 7
3,246,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,788 UART: [art] PUB.X = 64471611CC7DEB9BE11A859BF20904D9E2B30096F33F7A9F943B12566BEB25522893E00B79B760FEB609F57B1E342755
3,253,522 UART: [art] PUB.Y = 6D79879E1E8C7AA85B307F95CC463455193A599BD1C3FDEDC82A4E905C221242AB536D3CA5677C13AE6EA7A8FB04F919
3,260,479 UART: [art] SIG.R = 1A2B16F40DE99596988713E8AA6A8B4B40463A29845E1897C8A8AA0A7E499F97653B24600593494D194B077CC8F94D68
3,267,229 UART: [art] SIG.S = 6008550CDD0505A5C145C857858553D6DB2E201C1AA7E8BD0659BDB680DB9FAE571C19E10BF734E310A7DF329DFD0762
3,291,233 UART: Caliptra RT
3,291,578 UART: [state] CFI Enabled
3,399,384 UART: [rt] RT listening for mailbox commands...
3,400,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,180 UART: [rt]cmd =0x4d454153, len=108
3,450,867 >>> mbox cmd response data (12 bytes)
3,450,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,085 UART: [rt]cmd =0x4d454153, len=108
3,502,406 >>> mbox cmd response data (12 bytes)
3,502,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,508 UART: [rt]cmd =0x4d454153, len=108
3,553,311 >>> mbox cmd response data (12 bytes)
3,553,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,419 UART: [rt]cmd =0x4d454153, len=108
3,603,984 >>> mbox cmd response data (12 bytes)
3,603,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,084 UART: [rt]cmd =0x4d454153, len=108
3,655,433 >>> mbox cmd response data (12 bytes)
3,655,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,513 UART: [rt]cmd =0x4d454153, len=108
3,705,980 >>> mbox cmd response data (12 bytes)
3,705,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,132 UART: [rt]cmd =0x4d454153, len=108
3,756,993 >>> mbox cmd response data (12 bytes)
3,756,994 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,093 UART: [rt]cmd =0x4d454153, len=108
3,807,770 >>> mbox cmd response data (12 bytes)
3,807,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,638 UART: [rt]cmd =0x4d454153, len=108
3,858,245 >>> mbox cmd response data (12 bytes)
3,858,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,419 UART: [rt]cmd =0x4d454153, len=108
3,909,416 >>> mbox cmd response data (12 bytes)
3,909,417 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,540 UART: [rt]cmd =0x4d454153, len=108
3,960,449 >>> mbox cmd response data (12 bytes)
3,960,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,639 UART: [rt]cmd =0x4d454153, len=108
4,011,350 >>> mbox cmd response data (12 bytes)
4,011,351 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,590 UART: [rt]cmd =0x4d454153, len=108
4,062,597 >>> mbox cmd response data (12 bytes)
4,062,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,367 UART: [rt]cmd =0x4d454153, len=108
4,113,570 >>> mbox cmd response data (12 bytes)
4,113,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,702 UART: [rt]cmd =0x4d454153, len=108
4,164,723 >>> mbox cmd response data (12 bytes)
4,164,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,759 UART: [rt]cmd =0x4d454153, len=108
4,196,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,448 UART: [kat] LMS
1,170,776 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,176,137 ready_for_fw is high
1,176,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,907 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,645 UART: [ldev] ++
1,210,813 UART: [ldev] CDI.KEYID = 6
1,211,176 UART: [ldev] SUBJECT.KEYID = 5
1,211,602 UART: [ldev] AUTHORITY.KEYID = 7
1,212,065 UART: [ldev] FE.KEYID = 1
1,217,311 UART: [ldev] Erasing FE.KEYID = 1
1,243,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,649 UART: [ldev] --
1,283,124 UART: [fwproc] Wait for Commands...
1,283,928 UART: [fwproc] Recv command 0x46574c44
1,284,656 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,747 >>> mbox cmd response: success
2,772,769 UART: [afmc] ++
2,772,937 UART: [afmc] CDI.KEYID = 6
2,773,299 UART: [afmc] SUBJECT.KEYID = 7
2,773,724 UART: [afmc] AUTHORITY.KEYID = 5
2,808,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,728 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,238 UART: [afmc] --
2,852,274 UART: [cold-reset] --
2,853,134 UART: [state] Locking Datavault
2,854,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,133 UART: [state] Locking ICCM
2,855,597 UART: [exit] Launching FMC @ 0x40000130
2,860,926 UART:
2,860,942 UART: Running Caliptra FMC ...
2,861,350 UART:
2,861,404 UART: [state] CFI Enabled
2,872,017 UART: [fht] FMC Alias Private Key: 7
2,980,098 UART: [art] Extend RT PCRs Done
2,980,526 UART: [art] Lock RT PCRs Done
2,981,866 UART: [art] Populate DV Done
2,989,937 UART: [fht] FMC Alias Private Key: 7
2,990,995 UART: [art] Derive CDI
2,991,275 UART: [art] Store in in slot 0x4
3,076,588 UART: [art] Derive Key Pair
3,076,948 UART: [art] Store priv key in slot 0x5
3,090,546 UART: [art] Derive Key Pair - Done
3,105,304 UART: [art] Signing Cert with AUTHO
3,105,784 UART: RITY.KEYID = 7
3,120,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,745 UART: [art] PUB.X = AC8C4B991AC0525A3E4C574B4D0FFCD3B6C9F6EC33E4EFE2FE71776B0EE182D2BD171F13C6608F5AD21447DF1B7C0FF1
3,128,530 UART: [art] PUB.Y = 26E99054A9FEDEF730C908A63D73B617983448E47FBA46F52841AECBF9028DFC38EC99E270941161D4CE64364A8C7AB1
3,135,480 UART: [art] SIG.R = 418F6185B497F0AFD0991C97CDE6A6179CE744A925D1CC736935A64F2B908A2C7293452227E91F43DAB4F080B09EA7D0
3,142,252 UART: [art] SIG.S = 89B0628AB295FF59372455E69CB987DD83C8AC9A86110F0523CA9092BAC0734B3383BA150745CDF29C30309DD5CABCAD
3,165,634 UART: Caliptra RT
3,165,887 UART: [state] CFI Enabled
3,273,160 UART: [rt] RT listening for mailbox commands...
3,273,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,326 UART: [rt]cmd =0x4d454153, len=108
3,324,977 >>> mbox cmd response data (12 bytes)
3,324,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,861 UART: [rt]cmd =0x4d454153, len=108
3,375,050 >>> mbox cmd response data (12 bytes)
3,375,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,744 UART: [rt]cmd =0x4d454153, len=108
3,425,025 >>> mbox cmd response data (12 bytes)
3,425,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,909 UART: [rt]cmd =0x4d454153, len=108
3,475,898 >>> mbox cmd response data (12 bytes)
3,475,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,984 UART: [rt]cmd =0x4d454153, len=108
3,527,231 >>> mbox cmd response data (12 bytes)
3,527,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,505 UART: [rt]cmd =0x4d454153, len=108
3,578,176 >>> mbox cmd response data (12 bytes)
3,578,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,358 UART: [rt]cmd =0x4d454153, len=108
3,628,843 >>> mbox cmd response data (12 bytes)
3,628,844 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,015 UART: [rt]cmd =0x4d454153, len=108
3,680,112 >>> mbox cmd response data (12 bytes)
3,680,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,178 UART: [rt]cmd =0x4d454153, len=108
3,730,497 >>> mbox cmd response data (12 bytes)
3,730,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,607 UART: [rt]cmd =0x4d454153, len=108
3,781,212 >>> mbox cmd response data (12 bytes)
3,781,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,368 UART: [rt]cmd =0x4d454153, len=108
3,831,973 >>> mbox cmd response data (12 bytes)
3,831,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,827 UART: [rt]cmd =0x4d454153, len=108
3,883,678 >>> mbox cmd response data (12 bytes)
3,883,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,798 UART: [rt]cmd =0x4d454153, len=108
3,934,821 >>> mbox cmd response data (12 bytes)
3,934,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,741 UART: [rt]cmd =0x4d454153, len=108
3,985,078 >>> mbox cmd response data (12 bytes)
3,985,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,250 UART: [rt]cmd =0x4d454153, len=108
4,036,785 >>> mbox cmd response data (12 bytes)
4,036,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,631 UART: [rt]cmd =0x4d454153, len=108
4,068,755 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,237 ready_for_fw is high
1,060,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,202 >>> mbox cmd response: success
2,683,146 UART:
2,683,162 UART: Running Caliptra FMC ...
2,683,570 UART:
2,683,624 UART: [state] CFI Enabled
2,694,065 UART: [fht] FMC Alias Private Key: 7
2,801,860 UART: [art] Extend RT PCRs Done
2,802,288 UART: [art] Lock RT PCRs Done
2,804,084 UART: [art] Populate DV Done
2,812,371 UART: [fht] FMC Alias Private Key: 7
2,813,471 UART: [art] Derive CDI
2,813,751 UART: [art] Store in in slot 0x4
2,899,944 UART: [art] Derive Key Pair
2,900,304 UART: [art] Store priv key in slot 0x5
2,913,452 UART: [art] Derive Key Pair - Done
2,927,954 UART: [art] Signing Cert with AUTHO
2,928,434 UART: RITY.KEYID = 7
2,943,866 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,631 UART: [art] PUB.X = 234E142BFDA4F69D990570FB702956863D75CB74197F439AA72C48D8DE428086D51C8C2B94F5BF11F438F0FC92A8D16B
2,951,402 UART: [art] PUB.Y = B8412E2FCCDAD510FDE0FC938240BD68BAEB7DE10A9115C2B703C54190238892D9E681B5C0B70205A77B30BFC1588BD6
2,958,352 UART: [art] SIG.R = 03B3BCDD3D6700C1F22CDA2BE89ABD2EA4B64D7B0D584B46CD07AFEAF6E6E65BBD7972514072D587EBEFC124D3A3F6E3
2,965,119 UART: [art] SIG.S = 57928DDB3D6AFEDEB373F4C1165D339C26BFBAE63B00A5149E2892D129CA738E028057DC5D39BE73A442EBF247A09A09
2,989,296 UART: Caliptra RT
2,989,549 UART: [state] CFI Enabled
3,097,252 UART: [rt] RT listening for mailbox commands...
3,097,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,242 UART: [rt]cmd =0x4d454153, len=108
3,149,555 >>> mbox cmd response data (12 bytes)
3,149,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,629 UART: [rt]cmd =0x4d454153, len=108
3,200,398 >>> mbox cmd response data (12 bytes)
3,200,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,324 UART: [rt]cmd =0x4d454153, len=108
3,250,731 >>> mbox cmd response data (12 bytes)
3,250,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,927 UART: [rt]cmd =0x4d454153, len=108
3,302,236 >>> mbox cmd response data (12 bytes)
3,302,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,434 UART: [rt]cmd =0x4d454153, len=108
3,353,123 >>> mbox cmd response data (12 bytes)
3,353,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,383,061 UART: [rt]cmd =0x4d454153, len=108
3,403,906 >>> mbox cmd response data (12 bytes)
3,403,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,974 UART: [rt]cmd =0x4d454153, len=108
3,455,401 >>> mbox cmd response data (12 bytes)
3,455,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,283 UART: [rt]cmd =0x4d454153, len=108
3,506,394 >>> mbox cmd response data (12 bytes)
3,506,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,344 UART: [rt]cmd =0x4d454153, len=108
3,558,015 >>> mbox cmd response data (12 bytes)
3,558,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,971 UART: [rt]cmd =0x4d454153, len=108
3,609,370 >>> mbox cmd response data (12 bytes)
3,609,371 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,456 UART: [rt]cmd =0x4d454153, len=108
3,660,681 >>> mbox cmd response data (12 bytes)
3,660,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,767 UART: [rt]cmd =0x4d454153, len=108
3,711,552 >>> mbox cmd response data (12 bytes)
3,711,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,620 UART: [rt]cmd =0x4d454153, len=108
3,762,355 >>> mbox cmd response data (12 bytes)
3,762,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,349 UART: [rt]cmd =0x4d454153, len=108
3,813,964 >>> mbox cmd response data (12 bytes)
3,813,965 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,994 UART: [rt]cmd =0x4d454153, len=108
3,864,331 >>> mbox cmd response data (12 bytes)
3,864,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,223 UART: [rt]cmd =0x4d454153, len=108
3,896,043 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
893,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,090 UART: [kat] ++
898,242 UART: [kat] sha1
902,662 UART: [kat] SHA2-256
904,602 UART: [kat] SHA2-384
907,339 UART: [kat] SHA2-512-ACC
909,240 UART: [kat] ECC-384
919,045 UART: [kat] HMAC-384Kdf
923,695 UART: [kat] LMS
1,172,023 UART: [kat] --
1,173,030 UART: [cold-reset] ++
1,173,490 UART: [fht] FHT @ 0x50003400
1,176,065 UART: [idev] ++
1,176,233 UART: [idev] CDI.KEYID = 6
1,176,593 UART: [idev] SUBJECT.KEYID = 7
1,177,017 UART: [idev] UDS.KEYID = 0
1,177,362 ready_for_fw is high
1,177,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,075 UART: [idev] Erasing UDS.KEYID = 0
1,202,082 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,532 UART: [ldev] ++
1,211,700 UART: [ldev] CDI.KEYID = 6
1,212,063 UART: [ldev] SUBJECT.KEYID = 5
1,212,489 UART: [ldev] AUTHORITY.KEYID = 7
1,212,952 UART: [ldev] FE.KEYID = 1
1,218,454 UART: [ldev] Erasing FE.KEYID = 1
1,245,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,016 UART: [ldev] --
1,284,377 UART: [fwproc] Wait for Commands...
1,285,171 UART: [fwproc] Recv command 0x46574c44
1,285,899 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,420 >>> mbox cmd response: success
2,773,550 UART: [afmc] ++
2,773,718 UART: [afmc] CDI.KEYID = 6
2,774,080 UART: [afmc] SUBJECT.KEYID = 7
2,774,505 UART: [afmc] AUTHORITY.KEYID = 5
2,810,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,939 UART: [afmc] --
2,853,821 UART: [cold-reset] --
2,854,793 UART: [state] Locking Datavault
2,855,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,402 UART: [state] Locking ICCM
2,857,056 UART: [exit] Launching FMC @ 0x40000130
2,862,385 UART:
2,862,401 UART: Running Caliptra FMC ...
2,862,809 UART:
2,862,952 UART: [state] CFI Enabled
2,873,271 UART: [fht] FMC Alias Private Key: 7
2,981,258 UART: [art] Extend RT PCRs Done
2,981,686 UART: [art] Lock RT PCRs Done
2,982,908 UART: [art] Populate DV Done
2,990,911 UART: [fht] FMC Alias Private Key: 7
2,992,059 UART: [art] Derive CDI
2,992,339 UART: [art] Store in in slot 0x4
3,078,110 UART: [art] Derive Key Pair
3,078,470 UART: [art] Store priv key in slot 0x5
3,091,550 UART: [art] Derive Key Pair - Done
3,106,431 UART: [art] Signing Cert with AUTHO
3,106,911 UART: RITY.KEYID = 7
3,122,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,884 UART: [art] PUB.X = E55BCD5E5C450230BC78BC5D4D43685D3CBAA40B2F79AAC7A02F22A2DB6AB64E6E6D77AC69AD221CD2DF5144EE9CB598
3,129,674 UART: [art] PUB.Y = D979EE3B35575C595CC50130216EA1F915A8EE945D4B8E42ACAF37DEB1FCE44A64F58C86505DB4CA7A5554BB06398AFE
3,136,634 UART: [art] SIG.R = 32B63A2C1E5F2E6533B7BBAA9A5AA3666471476CA7CBD4D2AD4191CDE381C6AE7D780663FE6C39730DC5455CEDAF088F
3,143,413 UART: [art] SIG.S = F553D1228A94A5C08BD78867F60D5C0CB5B0B0BB553E571CC788C8EE8C0C9565518B885F197F6D220CFCC4D096456CB0
3,166,524 UART: Caliptra RT
3,166,869 UART: [state] CFI Enabled
3,275,750 UART: [rt] RT listening for mailbox commands...
3,276,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,804 UART: [rt]cmd =0x4d454153, len=108
3,327,793 >>> mbox cmd response data (12 bytes)
3,327,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,853 UART: [rt]cmd =0x4d454153, len=108
3,378,114 >>> mbox cmd response data (12 bytes)
3,378,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,130 UART: [rt]cmd =0x4d454153, len=108
3,428,389 >>> mbox cmd response data (12 bytes)
3,428,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,458,381 UART: [rt]cmd =0x4d454153, len=108
3,478,430 >>> mbox cmd response data (12 bytes)
3,478,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,296 UART: [rt]cmd =0x4d454153, len=108
3,529,685 >>> mbox cmd response data (12 bytes)
3,529,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,721 UART: [rt]cmd =0x4d454153, len=108
3,580,042 >>> mbox cmd response data (12 bytes)
3,580,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,982 UART: [rt]cmd =0x4d454153, len=108
3,631,761 >>> mbox cmd response data (12 bytes)
3,631,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,793 UART: [rt]cmd =0x4d454153, len=108
3,682,922 >>> mbox cmd response data (12 bytes)
3,682,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,102 UART: [rt]cmd =0x4d454153, len=108
3,734,061 >>> mbox cmd response data (12 bytes)
3,734,062 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,027 UART: [rt]cmd =0x4d454153, len=108
3,785,288 >>> mbox cmd response data (12 bytes)
3,785,289 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,374 UART: [rt]cmd =0x4d454153, len=108
3,836,097 >>> mbox cmd response data (12 bytes)
3,836,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,067 UART: [rt]cmd =0x4d454153, len=108
3,886,876 >>> mbox cmd response data (12 bytes)
3,886,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,906 UART: [rt]cmd =0x4d454153, len=108
3,937,419 >>> mbox cmd response data (12 bytes)
3,937,420 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,357 UART: [rt]cmd =0x4d454153, len=108
3,988,006 >>> mbox cmd response data (12 bytes)
3,988,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,938 UART: [rt]cmd =0x4d454153, len=108
4,038,251 >>> mbox cmd response data (12 bytes)
4,038,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,517 UART: [rt]cmd =0x4d454153, len=108
4,070,257 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,302 ready_for_fw is high
1,061,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,459 >>> mbox cmd response: success
2,686,021 UART:
2,686,037 UART: Running Caliptra FMC ...
2,686,445 UART:
2,686,588 UART: [state] CFI Enabled
2,697,229 UART: [fht] FMC Alias Private Key: 7
2,805,358 UART: [art] Extend RT PCRs Done
2,805,786 UART: [art] Lock RT PCRs Done
2,807,204 UART: [art] Populate DV Done
2,815,403 UART: [fht] FMC Alias Private Key: 7
2,816,455 UART: [art] Derive CDI
2,816,735 UART: [art] Store in in slot 0x4
2,902,488 UART: [art] Derive Key Pair
2,902,848 UART: [art] Store priv key in slot 0x5
2,916,664 UART: [art] Derive Key Pair - Done
2,931,401 UART: [art] Signing Cert with AUTHO
2,931,881 UART: RITY.KEYID = 7
2,946,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,504 UART: [art] PUB.X = E152204C3F0A8E86D255E8E3AF1E9CF6A7E6D329249BFF1884D0C34C6E1F1D4A9B869EC84C3A3331C7EB9CDAC360B4D5
2,954,289 UART: [art] PUB.Y = 300AD14629C435654B2D7CB5EC890B397C0EFB9F27EF7CB599774559F4F0071FED7BB36CCC0DA8047A049810563A80E4
2,961,224 UART: [art] SIG.R = F864824DFF7CDBDA0FBA93B283D71BEAFDFE27D39A44309BF998ECF5C53B872B7AB3AD7F7BE2BAD1D1DDDE7F6B02ED85
2,968,026 UART: [art] SIG.S = 5AEE010CB62D41B429B51F99DD00A5E9A947BC02FE4A440E10B3A7642C53CAD96EBC2B595D4099BF2360235810774CBF
2,991,443 UART: Caliptra RT
2,991,788 UART: [state] CFI Enabled
3,099,403 UART: [rt] RT listening for mailbox commands...
3,100,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,799 UART: [rt]cmd =0x4d454153, len=108
3,151,628 >>> mbox cmd response data (12 bytes)
3,151,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,648 UART: [rt]cmd =0x4d454153, len=108
3,203,123 >>> mbox cmd response data (12 bytes)
3,203,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,215 UART: [rt]cmd =0x4d454153, len=108
3,253,686 >>> mbox cmd response data (12 bytes)
3,253,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,846 UART: [rt]cmd =0x4d454153, len=108
3,304,451 >>> mbox cmd response data (12 bytes)
3,304,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,535 UART: [rt]cmd =0x4d454153, len=108
3,355,028 >>> mbox cmd response data (12 bytes)
3,355,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,040 UART: [rt]cmd =0x4d454153, len=108
3,406,019 >>> mbox cmd response data (12 bytes)
3,406,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,021 UART: [rt]cmd =0x4d454153, len=108
3,457,034 >>> mbox cmd response data (12 bytes)
3,457,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,100 UART: [rt]cmd =0x4d454153, len=108
3,507,941 >>> mbox cmd response data (12 bytes)
3,507,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,879 UART: [rt]cmd =0x4d454153, len=108
3,558,476 >>> mbox cmd response data (12 bytes)
3,558,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,428 UART: [rt]cmd =0x4d454153, len=108
3,608,493 >>> mbox cmd response data (12 bytes)
3,608,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,329 UART: [rt]cmd =0x4d454153, len=108
3,659,092 >>> mbox cmd response data (12 bytes)
3,659,093 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,689,128 UART: [rt]cmd =0x4d454153, len=108
3,709,621 >>> mbox cmd response data (12 bytes)
3,709,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,675 UART: [rt]cmd =0x4d454153, len=108
3,760,194 >>> mbox cmd response data (12 bytes)
3,760,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,324 UART: [rt]cmd =0x4d454153, len=108
3,811,333 >>> mbox cmd response data (12 bytes)
3,811,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,267 UART: [rt]cmd =0x4d454153, len=108
3,862,586 >>> mbox cmd response data (12 bytes)
3,862,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,892,672 UART: [rt]cmd =0x4d454153, len=108
3,894,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,779 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 ready_for_fw is high
1,173,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,177 UART: [idev] Erasing UDS.KEYID = 0
1,198,005 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,241,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,158 UART: [fwproc] Wait for Commands...
1,280,797 UART: [fwproc] Recv command 0x46574c44
1,281,530 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,525 >>> mbox cmd response: success
2,769,622 UART: [afmc] ++
2,769,790 UART: [afmc] CDI.KEYID = 6
2,770,153 UART: [afmc] SUBJECT.KEYID = 7
2,770,579 UART: [afmc] AUTHORITY.KEYID = 5
2,806,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,152 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,035 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,731 UART: [afmc] --
2,849,801 UART: [cold-reset] --
2,850,803 UART: [state] Locking Datavault
2,851,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,550 UART: [state] Locking ICCM
2,853,110 UART: [exit] Launching FMC @ 0x40000130
2,858,439 UART:
2,858,455 UART: Running Caliptra FMC ...
2,858,863 UART:
2,858,917 UART: [state] CFI Enabled
2,869,646 UART: [fht] FMC Alias Private Key: 7
2,977,857 UART: [art] Extend RT PCRs Done
2,978,285 UART: [art] Lock RT PCRs Done
2,979,497 UART: [art] Populate DV Done
2,987,862 UART: [fht] FMC Alias Private Key: 7
2,988,884 UART: [art] Derive CDI
2,989,164 UART: [art] Store in in slot 0x4
3,074,449 UART: [art] Derive Key Pair
3,074,809 UART: [art] Store priv key in slot 0x5
3,088,213 UART: [art] Derive Key Pair - Done
3,103,544 UART: [art] Signing Cert with AUTHO
3,104,024 UART: RITY.KEYID = 7
3,119,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,121 UART: [art] PUB.X = EA5508B975B600226A06D3238D11A390DA96161429DEE5FE871FDE6E861B66F45EA9414CFB05A0ABA6C0DA52FB8115FA
3,126,872 UART: [art] PUB.Y = 579980C0B5170869A23F581A9B504AF48C0B822F6B3E32D411EEDAFAF334553F62AB814E6245D561534EE5EEC35C1339
3,133,818 UART: [art] SIG.R = 1C64A1125FA5F006DF931144D3D7CA8C92EA4CD2F45BB2E299E401079A3CF90E954759C3E18BFEF6A7C558123D9C8515
3,140,584 UART: [art] SIG.S = F9D56DF2059485994966D0B8D5C9FB5D223FE95FA26967BE8C38345FBD751C697C4BE06F58F372DCA22B9B545A0F1978
3,164,241 UART: Caliptra RT
3,164,494 UART: [state] CFI Enabled
3,272,529 UART: [rt] RT listening for mailbox commands...
3,273,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,807 UART: [rt]cmd =0x4d454153, len=108
3,324,188 >>> mbox cmd response data (12 bytes)
3,324,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,342 UART: [rt]cmd =0x4d454153, len=108
3,375,393 >>> mbox cmd response data (12 bytes)
3,375,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,301 UART: [rt]cmd =0x4d454153, len=108
3,425,154 >>> mbox cmd response data (12 bytes)
3,425,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,218 UART: [rt]cmd =0x4d454153, len=108
3,475,609 >>> mbox cmd response data (12 bytes)
3,475,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,435 UART: [rt]cmd =0x4d454153, len=108
3,526,524 >>> mbox cmd response data (12 bytes)
3,526,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,756 UART: [rt]cmd =0x4d454153, len=108
3,576,519 >>> mbox cmd response data (12 bytes)
3,576,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,485 UART: [rt]cmd =0x4d454153, len=108
3,627,444 >>> mbox cmd response data (12 bytes)
3,627,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,464 UART: [rt]cmd =0x4d454153, len=108
3,678,373 >>> mbox cmd response data (12 bytes)
3,678,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,708,279 UART: [rt]cmd =0x4d454153, len=108
3,728,818 >>> mbox cmd response data (12 bytes)
3,728,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,870 UART: [rt]cmd =0x4d454153, len=108
3,778,845 >>> mbox cmd response data (12 bytes)
3,778,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,709 UART: [rt]cmd =0x4d454153, len=108
3,830,386 >>> mbox cmd response data (12 bytes)
3,830,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,436 UART: [rt]cmd =0x4d454153, len=108
3,881,587 >>> mbox cmd response data (12 bytes)
3,881,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,659 UART: [rt]cmd =0x4d454153, len=108
3,932,354 >>> mbox cmd response data (12 bytes)
3,932,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,292 UART: [rt]cmd =0x4d454153, len=108
3,983,097 >>> mbox cmd response data (12 bytes)
3,983,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,037 UART: [rt]cmd =0x4d454153, len=108
4,033,250 >>> mbox cmd response data (12 bytes)
4,033,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,188 UART: [rt]cmd =0x4d454153, len=108
4,065,084 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 ready_for_fw is high
1,055,802 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,871 >>> mbox cmd response: success
2,680,153 UART:
2,680,169 UART: Running Caliptra FMC ...
2,680,577 UART:
2,680,631 UART: [state] CFI Enabled
2,691,250 UART: [fht] FMC Alias Private Key: 7
2,799,233 UART: [art] Extend RT PCRs Done
2,799,661 UART: [art] Lock RT PCRs Done
2,801,387 UART: [art] Populate DV Done
2,809,292 UART: [fht] FMC Alias Private Key: 7
2,810,326 UART: [art] Derive CDI
2,810,606 UART: [art] Store in in slot 0x4
2,896,557 UART: [art] Derive Key Pair
2,896,917 UART: [art] Store priv key in slot 0x5
2,910,345 UART: [art] Derive Key Pair - Done
2,925,403 UART: [art] Signing Cert with AUTHO
2,925,883 UART: RITY.KEYID = 7
2,941,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,980 UART: [art] PUB.X = EE4FF50B4AFA63076035AE790E08CA40396FFF14FF6C4BCB7ECE8F728C664237C92B6FE003CC8D241794D73EDEF9A419
2,948,753 UART: [art] PUB.Y = 88DD76C4D3DE261C0F0C3DE423381D77C953968611FB10A5354BF963063E5878666E7E925577DBD63CE84C1E2F207DAF
2,955,696 UART: [art] SIG.R = 4D9EE691F7B3D671A74DEE6B0D1FA6EE24D6E528CA10D5D3124A58594AFF0CA79034EC36B9A4D77B823273B89FE8D9BA
2,962,478 UART: [art] SIG.S = A71A697581697E1A520E86F0DF3F44771A42E89EF62C9AE5BF7C3BE82893131449174298F3F2E299EF470218433A683B
2,985,785 UART: Caliptra RT
2,986,038 UART: [state] CFI Enabled
3,093,539 UART: [rt] RT listening for mailbox commands...
3,094,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,491 UART: [rt]cmd =0x4d454153, len=108
3,144,100 >>> mbox cmd response data (12 bytes)
3,144,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,106 UART: [rt]cmd =0x4d454153, len=108
3,194,687 >>> mbox cmd response data (12 bytes)
3,194,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,855 UART: [rt]cmd =0x4d454153, len=108
3,246,206 >>> mbox cmd response data (12 bytes)
3,246,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,350 UART: [rt]cmd =0x4d454153, len=108
3,296,985 >>> mbox cmd response data (12 bytes)
3,296,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,081 UART: [rt]cmd =0x4d454153, len=108
3,347,558 >>> mbox cmd response data (12 bytes)
3,347,559 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,750 UART: [rt]cmd =0x4d454153, len=108
3,398,389 >>> mbox cmd response data (12 bytes)
3,398,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,131 UART: [rt]cmd =0x4d454153, len=108
3,448,882 >>> mbox cmd response data (12 bytes)
3,448,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,942 UART: [rt]cmd =0x4d454153, len=108
3,499,599 >>> mbox cmd response data (12 bytes)
3,499,600 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,725 UART: [rt]cmd =0x4d454153, len=108
3,550,884 >>> mbox cmd response data (12 bytes)
3,550,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,858 UART: [rt]cmd =0x4d454153, len=108
3,601,649 >>> mbox cmd response data (12 bytes)
3,601,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,599 UART: [rt]cmd =0x4d454153, len=108
3,653,348 >>> mbox cmd response data (12 bytes)
3,653,349 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,270 UART: [rt]cmd =0x4d454153, len=108
3,704,253 >>> mbox cmd response data (12 bytes)
3,704,254 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,419 UART: [rt]cmd =0x4d454153, len=108
3,755,254 >>> mbox cmd response data (12 bytes)
3,755,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,256 UART: [rt]cmd =0x4d454153, len=108
3,806,139 >>> mbox cmd response data (12 bytes)
3,806,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,157 UART: [rt]cmd =0x4d454153, len=108
3,856,782 >>> mbox cmd response data (12 bytes)
3,856,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,672 UART: [rt]cmd =0x4d454153, len=108
3,888,464 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,393 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 ready_for_fw is high
1,174,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,092 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,215,613 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,353 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,182 >>> mbox cmd response: success
2,770,363 UART: [afmc] ++
2,770,531 UART: [afmc] CDI.KEYID = 6
2,770,894 UART: [afmc] SUBJECT.KEYID = 7
2,771,320 UART: [afmc] AUTHORITY.KEYID = 5
2,807,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,246 UART: [afmc] --
2,850,210 UART: [cold-reset] --
2,851,286 UART: [state] Locking Datavault
2,852,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,085 UART: [state] Locking ICCM
2,853,645 UART: [exit] Launching FMC @ 0x40000130
2,858,974 UART:
2,858,990 UART: Running Caliptra FMC ...
2,859,398 UART:
2,859,541 UART: [state] CFI Enabled
2,870,036 UART: [fht] FMC Alias Private Key: 7
2,977,487 UART: [art] Extend RT PCRs Done
2,977,915 UART: [art] Lock RT PCRs Done
2,979,195 UART: [art] Populate DV Done
2,987,250 UART: [fht] FMC Alias Private Key: 7
2,988,278 UART: [art] Derive CDI
2,988,558 UART: [art] Store in in slot 0x4
3,074,181 UART: [art] Derive Key Pair
3,074,541 UART: [art] Store priv key in slot 0x5
3,087,719 UART: [art] Derive Key Pair - Done
3,102,212 UART: [art] Signing Cert with AUTHO
3,102,692 UART: RITY.KEYID = 7
3,118,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,769 UART: [art] PUB.X = B2FEDAE3BCC62061708BDF35F1071311597E1A5781556C33FF406A679A0CCF037247C390ECA38407FDC2D0BEC9BD15A1
3,125,539 UART: [art] PUB.Y = 1AAE90E7C36F622B3C6775EA2A6FBEFCD05806E38639B50D5AC6D444D4C4917A9C264913D807B1B6AB70256DF5811297
3,132,486 UART: [art] SIG.R = B216FABD078026CCF045F7934366C3FFFDBA9D133CD403A4B34D17A97070A990480C219A01884CBA87DE05188EA767CE
3,139,249 UART: [art] SIG.S = EFBF4E523AA546FCA30BC7414A03957CB3F886DC9324422588EA195602806779AE10D09F5D5050A451ECEB255B69EC33
3,163,037 UART: Caliptra RT
3,163,382 UART: [state] CFI Enabled
3,271,236 UART: [rt] RT listening for mailbox commands...
3,271,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,462 UART: [rt]cmd =0x4d454153, len=108
3,323,893 >>> mbox cmd response data (12 bytes)
3,323,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,173 UART: [rt]cmd =0x4d454153, len=108
3,375,552 >>> mbox cmd response data (12 bytes)
3,375,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,612 UART: [rt]cmd =0x4d454153, len=108
3,427,151 >>> mbox cmd response data (12 bytes)
3,427,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,093 UART: [rt]cmd =0x4d454153, len=108
3,477,886 >>> mbox cmd response data (12 bytes)
3,477,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,042 UART: [rt]cmd =0x4d454153, len=108
3,529,029 >>> mbox cmd response data (12 bytes)
3,529,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,043 UART: [rt]cmd =0x4d454153, len=108
3,579,668 >>> mbox cmd response data (12 bytes)
3,579,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,714 UART: [rt]cmd =0x4d454153, len=108
3,630,839 >>> mbox cmd response data (12 bytes)
3,630,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,867 UART: [rt]cmd =0x4d454153, len=108
3,681,274 >>> mbox cmd response data (12 bytes)
3,681,275 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,278 UART: [rt]cmd =0x4d454153, len=108
3,732,055 >>> mbox cmd response data (12 bytes)
3,732,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,801 UART: [rt]cmd =0x4d454153, len=108
3,782,566 >>> mbox cmd response data (12 bytes)
3,782,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,628 UART: [rt]cmd =0x4d454153, len=108
3,834,139 >>> mbox cmd response data (12 bytes)
3,834,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,205 UART: [rt]cmd =0x4d454153, len=108
3,885,366 >>> mbox cmd response data (12 bytes)
3,885,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,372 UART: [rt]cmd =0x4d454153, len=108
3,935,865 >>> mbox cmd response data (12 bytes)
3,935,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,965 UART: [rt]cmd =0x4d454153, len=108
3,986,384 >>> mbox cmd response data (12 bytes)
3,986,385 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,542 UART: [rt]cmd =0x4d454153, len=108
4,037,365 >>> mbox cmd response data (12 bytes)
4,037,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,387 UART: [rt]cmd =0x4d454153, len=108
4,069,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,145 ready_for_fw is high
1,056,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,602 >>> mbox cmd response: success
2,682,432 UART:
2,682,448 UART: Running Caliptra FMC ...
2,682,856 UART:
2,682,999 UART: [state] CFI Enabled
2,693,718 UART: [fht] FMC Alias Private Key: 7
2,801,955 UART: [art] Extend RT PCRs Done
2,802,383 UART: [art] Lock RT PCRs Done
2,804,141 UART: [art] Populate DV Done
2,812,248 UART: [fht] FMC Alias Private Key: 7
2,813,214 UART: [art] Derive CDI
2,813,494 UART: [art] Store in in slot 0x4
2,899,277 UART: [art] Derive Key Pair
2,899,637 UART: [art] Store priv key in slot 0x5
2,912,371 UART: [art] Derive Key Pair - Done
2,927,338 UART: [art] Signing Cert with AUTHO
2,927,818 UART: RITY.KEYID = 7
2,943,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,881 UART: [art] PUB.X = 11952929025A5FA2EF724CD6D229C0AAD4B83245EA35F307366F8350AE2F8FE2FB0052BE505DADEF2D1F944DD5117E6D
2,950,635 UART: [art] PUB.Y = 5FAA9DE8F59DE8CA2E6C37DD54132927DAB197013D56CAD68723A5A88EADEDCF3DA9D4E5B877927D9FB9B086554EC2F0
2,957,604 UART: [art] SIG.R = 39BFE02727543F22DFA00D46BDDCD59478C39281CD2AC58333A88626C640BBD96EBCFACAB45871609DA316C6F8AA1692
2,964,383 UART: [art] SIG.S = 1212ADB5E2F8D5EA226FF1DC5D1D23DBC5B1FB1E07A44BC210F8AA73822B5E89113C5169ED143966765D2EC676FE73CC
2,988,955 UART: Caliptra RT
2,989,300 UART: [state] CFI Enabled
3,097,411 UART: [rt] RT listening for mailbox commands...
3,098,081 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,279 UART: [rt]cmd =0x4d454153, len=108
3,148,604 >>> mbox cmd response data (12 bytes)
3,148,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,504 UART: [rt]cmd =0x4d454153, len=108
3,199,037 >>> mbox cmd response data (12 bytes)
3,199,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,361 UART: [rt]cmd =0x4d454153, len=108
3,250,296 >>> mbox cmd response data (12 bytes)
3,250,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,412 UART: [rt]cmd =0x4d454153, len=108
3,300,853 >>> mbox cmd response data (12 bytes)
3,300,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,707 UART: [rt]cmd =0x4d454153, len=108
3,351,920 >>> mbox cmd response data (12 bytes)
3,351,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,008 UART: [rt]cmd =0x4d454153, len=108
3,402,705 >>> mbox cmd response data (12 bytes)
3,402,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,533 UART: [rt]cmd =0x4d454153, len=108
3,453,032 >>> mbox cmd response data (12 bytes)
3,453,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,204 UART: [rt]cmd =0x4d454153, len=108
3,503,999 >>> mbox cmd response data (12 bytes)
3,504,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,955 UART: [rt]cmd =0x4d454153, len=108
3,553,988 >>> mbox cmd response data (12 bytes)
3,553,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,940 UART: [rt]cmd =0x4d454153, len=108
3,604,723 >>> mbox cmd response data (12 bytes)
3,604,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,879 UART: [rt]cmd =0x4d454153, len=108
3,655,826 >>> mbox cmd response data (12 bytes)
3,655,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,716 UART: [rt]cmd =0x4d454153, len=108
3,706,695 >>> mbox cmd response data (12 bytes)
3,706,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,443 UART: [rt]cmd =0x4d454153, len=108
3,757,670 >>> mbox cmd response data (12 bytes)
3,757,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,780 UART: [rt]cmd =0x4d454153, len=108
3,808,847 >>> mbox cmd response data (12 bytes)
3,808,848 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,893 UART: [rt]cmd =0x4d454153, len=108
3,859,710 >>> mbox cmd response data (12 bytes)
3,859,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,916 UART: [rt]cmd =0x4d454153, len=108
3,892,162 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
2,217,281 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,361,619 UART:
2,362,034 UART: Running Caliptra ROM ...
2,363,215 UART:
2,363,394 UART: [state] CFI Enabled
2,364,362 UART: [state] LifecycleState = Unprovisioned
2,366,020 UART: [state] DebugLocked = No
2,367,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,370,440 UART: [kat] SHA2-256
2,371,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,374,127 UART: [kat] ++
2,374,624 UART: [kat] sha1
2,375,142 UART: [kat] SHA2-256
2,375,802 UART: [kat] SHA2-384
2,376,457 UART: [kat] SHA2-512-ACC
2,377,281 UART: [kat] ECC-384
2,766,474 UART: [kat] HMAC-384Kdf
2,798,941 UART: [kat] LMS
3,989,238 UART: [kat] --
3,992,384 UART: [cold-reset] ++
3,994,971 UART: [fht] Storing FHT @ 0x50003400
4,006,942 UART: [idev] ++
4,007,511 UART: [idev] CDI.KEYID = 6
4,008,498 UART: [idev] SUBJECT.KEYID = 7
4,009,720 UART: [idev] UDS.KEYID = 0
4,033,236 UART: [idev] Erasing UDS.KEYID = 0
7,344,907 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,759 UART: [idev] --
7,369,212 UART: [ldev] ++
7,369,781 UART: [ldev] CDI.KEYID = 6
7,370,800 UART: [ldev] SUBJECT.KEYID = 5
7,371,984 UART: [ldev] AUTHORITY.KEYID = 7
7,373,220 UART: [ldev] FE.KEYID = 1
7,422,611 UART: [ldev] Erasing FE.KEYID = 1
10,754,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,331 UART: [ldev] --
13,116,891 UART: [fwproc] Waiting for Commands...
13,118,661 UART: [fwproc] Received command 0x46574c44
13,120,849 UART: [fwproc] Received Image of size 113760 bytes
17,169,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,629,027 >>> mbox cmd response: success
17,632,425 UART: [afmc] ++
17,633,039 UART: [afmc] CDI.KEYID = 6
17,633,930 UART: [afmc] SUBJECT.KEYID = 7
17,635,202 UART: [afmc] AUTHORITY.KEYID = 5
21,009,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,799 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,213 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,011 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,469 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,553 UART: [afmc] --
23,378,576 UART: [cold-reset] --
23,381,574 UART: [state] Locking Datavault
23,387,847 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,609 UART: [state] Locking ICCM
23,391,385 UART: [exit] Launching FMC @ 0x40000130
23,399,783 UART:
23,400,033 UART: Running Caliptra FMC ...
23,401,139 UART:
23,401,298 UART: [state] CFI Enabled
23,468,662 UART: [fht] FMC Alias Private Key: 7
25,806,100 UART: [art] Extend RT PCRs Done
25,807,324 UART: [art] Lock RT PCRs Done
25,809,014 UART: [art] Populate DV Done
25,814,215 UART: [fht] FMC Alias Private Key: 7
25,815,859 UART: [art] Derive CDI
25,816,596 UART: [art] Store in in slot 0x4
25,876,394 UART: [art] Derive Key Pair
25,877,429 UART: [art] Store priv key in slot 0x5
29,170,421 UART: [art] Derive Key Pair - Done
29,183,583 UART: [art] Signing Cert with AUTHO
29,184,891 UART: RITY.KEYID = 7
31,471,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,114 UART: [art] PUB.X = 85CE206A19AEEF76E5CE4A9EA61C556B73146ED1FE7BD25DB2075A6E466B069F3D340DD4CC71C3C7F4DB5F111C2345AA
31,480,253 UART: [art] PUB.Y = 7851DD4E12F327553CDA935AE89CE5D90E61732C9410B609332FED416FD157ECA914B0039D2DB0FD833444EC3DCE338A
31,487,490 UART: [art] SIG.R = 379C019B17330D5C6651D223FD64117FFDDC0E10E5AB2EB2715048ECC78341A1119B9C763EB069423F2E7C21251A696F
31,494,828 UART: [art] SIG.S = 80EA84B0CAC5F0FEFADE43EF3E2FCEFEC044D77EF063F502C1C1519201A77E7D7EF77780F30EB845D55D17EB166E6E1C
32,800,036 UART: Caliptra RT
32,800,743 UART: [state] CFI Enabled
32,961,970 UART: [rt] RT listening for mailbox commands...
32,963,891 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,994,558 UART: [rt]cmd =0x44504543, len=92
33,000,804 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,214,251 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,850,905 >>> mbox cmd response: success
23,543,671 UART:
23,544,131 UART: Running Caliptra FMC ...
23,545,255 UART:
23,545,421 UART: [state] CFI Enabled
23,615,165 UART: [fht] FMC Alias Private Key: 7
25,953,224 UART: [art] Extend RT PCRs Done
25,954,446 UART: [art] Lock RT PCRs Done
25,956,347 UART: [art] Populate DV Done
25,961,652 UART: [fht] FMC Alias Private Key: 7
25,963,303 UART: [art] Derive CDI
25,964,122 UART: [art] Store in in slot 0x4
26,023,711 UART: [art] Derive Key Pair
26,024,760 UART: [art] Store priv key in slot 0x5
29,317,472 UART: [art] Derive Key Pair - Done
29,330,902 UART: [art] Signing Cert with AUTHO
29,332,214 UART: RITY.KEYID = 7
31,619,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,344 UART: [art] PUB.X = 3FD571FBFF146FE35AD42C686BDA6CC0EF5C5D4273BD82DABAA4F023E15703B08C8B34946FB6C49F9021D20813ED6EF5
31,628,612 UART: [art] PUB.Y = A9E0E6431295317B8221710EBA388B05E06781D04A39D81F313D81E3546630ADAA9066555852C2CB02C28BF31F26432C
31,635,839 UART: [art] SIG.R = 403ECB7FFA33873F0C08F131E98E0F5371246B3C04618BA0C73D633C6CFE595A856DCD2FDE38A5EDA6E699AC111F4B16
31,643,244 UART: [art] SIG.S = E3A4E90DD6437A2723B44C5A17AB2431AF1CDB913AFA53B47C88B55843B833B20C9A60A0C75081794D4301BDC0C3FD16
32,948,588 UART: Caliptra RT
32,949,307 UART: [state] CFI Enabled
33,113,026 UART: [rt] RT listening for mailbox commands...
33,114,966 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,145,803 UART: [rt]cmd =0x44504543, len=92
33,152,294 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
2,221,346 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,365,155 UART:
2,365,554 UART: Running Caliptra ROM ...
2,366,747 UART:
2,366,922 UART: [state] CFI Enabled
2,367,879 UART: [state] LifecycleState = Unprovisioned
2,369,533 UART: [state] DebugLocked = No
2,370,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,373,944 UART: [kat] SHA2-256
2,374,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,377,620 UART: [kat] ++
2,378,075 UART: [kat] sha1
2,378,590 UART: [kat] SHA2-256
2,379,275 UART: [kat] SHA2-384
2,379,926 UART: [kat] SHA2-512-ACC
2,380,721 UART: [kat] ECC-384
3,114,728 UART: [kat] HMAC-384Kdf
3,125,360 UART: [kat] LMS
4,315,464 UART: [kat] --
4,319,659 UART: [cold-reset] ++
4,322,182 UART: [fht] Storing FHT @ 0x50003400
4,333,127 UART: [idev] ++
4,333,733 UART: [idev] CDI.KEYID = 6
4,334,619 UART: [idev] SUBJECT.KEYID = 7
4,335,724 UART: [idev] UDS.KEYID = 0
4,352,855 UART: [idev] Erasing UDS.KEYID = 0
7,625,239 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,267 UART: [idev] --
7,650,530 UART: [ldev] ++
7,651,107 UART: [ldev] CDI.KEYID = 6
7,652,043 UART: [ldev] SUBJECT.KEYID = 5
7,653,258 UART: [ldev] AUTHORITY.KEYID = 7
7,654,543 UART: [ldev] FE.KEYID = 1
7,665,000 UART: [ldev] Erasing FE.KEYID = 1
10,952,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,903 UART: [ldev] --
13,314,065 UART: [fwproc] Waiting for Commands...
13,315,692 UART: [fwproc] Received command 0x46574c44
13,317,880 UART: [fwproc] Received Image of size 113760 bytes
17,367,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,947 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,826,873 >>> mbox cmd response: success
17,830,651 UART: [afmc] ++
17,831,297 UART: [afmc] CDI.KEYID = 6
17,832,208 UART: [afmc] SUBJECT.KEYID = 7
17,833,425 UART: [afmc] AUTHORITY.KEYID = 5
21,148,280 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,582 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,978 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,809 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,257 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,173 UART: [afmc] --
23,512,528 UART: [cold-reset] --
23,518,166 UART: [state] Locking Datavault
23,523,463 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,216 UART: [state] Locking ICCM
23,527,196 UART: [exit] Launching FMC @ 0x40000130
23,535,597 UART:
23,535,875 UART: Running Caliptra FMC ...
23,536,984 UART:
23,537,139 UART: [state] CFI Enabled
23,545,232 UART: [fht] FMC Alias Private Key: 7
25,876,500 UART: [art] Extend RT PCRs Done
25,877,722 UART: [art] Lock RT PCRs Done
25,879,237 UART: [art] Populate DV Done
25,884,592 UART: [fht] FMC Alias Private Key: 7
25,886,237 UART: [art] Derive CDI
25,887,049 UART: [art] Store in in slot 0x4
25,929,965 UART: [art] Derive Key Pair
25,930,963 UART: [art] Store priv key in slot 0x5
29,173,188 UART: [art] Derive Key Pair - Done
29,186,503 UART: [art] Signing Cert with AUTHO
29,187,802 UART: RITY.KEYID = 7
31,467,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,210 UART: [art] PUB.X = F2C0B8C8C0C4D0B1C96A7DEDEC6A534380642D6000A9F34AD66FF77D44E129042293BCA75744E91E5E54AF16E8943667
31,476,436 UART: [art] PUB.Y = DDD133FE09DA1D48AA6B5542F8EAA6E9DD0429D151DB8CDABC9B7DDFE5B38ED1A6F87661754CB2C9DE416B628301A4D5
31,483,693 UART: [art] SIG.R = 82B022636A40FEEFC4457DEA673EDAEF9C297F6523BF5A99D19047F862F4B872D2575C29FFCC33E3DA411F1864FC4C55
31,491,126 UART: [art] SIG.S = 2D24738FE705336F9FA2900C9ACC398E455E1E5085D9AEDD6D2D69D7BE3AA9656F0B3460565511461E04B9FF840AD492
32,795,939 UART: Caliptra RT
32,796,657 UART: [state] CFI Enabled
32,913,678 UART: [rt] RT listening for mailbox commands...
32,915,601 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,946,082 UART: [rt]cmd =0x44504543, len=92
32,952,869 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
2,224,077 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,051,859 >>> mbox cmd response: success
23,693,237 UART:
23,693,648 UART: Running Caliptra FMC ...
23,694,788 UART:
23,694,950 UART: [state] CFI Enabled
23,702,962 UART: [fht] FMC Alias Private Key: 7
26,033,386 UART: [art] Extend RT PCRs Done
26,034,622 UART: [art] Lock RT PCRs Done
26,036,663 UART: [art] Populate DV Done
26,041,919 UART: [fht] FMC Alias Private Key: 7
26,043,574 UART: [art] Derive CDI
26,044,389 UART: [art] Store in in slot 0x4
26,087,471 UART: [art] Derive Key Pair
26,089,373 UART: [art] Store priv key in slot 0x5
29,330,711 UART: [art] Derive Key Pair - Done
29,343,765 UART: [art] Signing Cert with AUTHO
29,345,076 UART: RITY.KEYID = 7
31,624,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,118 UART: [art] PUB.X = 66F2986149584FCD2093FF36AF38CDA75106AC1FC9755553EABE8241F3F90844FFACEB9B675ECF8440815F2168603CC7
31,633,353 UART: [art] PUB.Y = 53F43935EA03026697324085A4DE677C182D2266EE1036B1EF1A0FF5DA1502AF7F1850229485C7D76186103E392E6387
31,640,594 UART: [art] SIG.R = BCA77581195F6195AEA1566452947B4D0ECDDD87624857B39B88A6206A37BDD6F2A9EA987999ECD3678BA5B449CDAC89
31,647,935 UART: [art] SIG.S = 0E3FF23803811B1EA8EF7CB5C689633323F85F1D0E6400658B3285EC904F3DD87479C30ACA3EB77ECF898624B8374C1D
32,953,091 UART: Caliptra RT
32,953,811 UART: [state] CFI Enabled
33,071,808 UART: [rt] RT listening for mailbox commands...
33,073,729 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,104,185 UART: [rt]cmd =0x44504543, len=92
33,110,698 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,214,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,359,469 UART:
2,359,870 UART: Running Caliptra ROM ...
2,360,956 UART:
2,361,110 UART: [state] CFI Enabled
2,362,026 UART: [state] LifecycleState = Unprovisioned
2,363,692 UART: [state] DebugLocked = No
2,364,720 UART: [state] WD Timer not started. Device not locked for debugging
2,367,200 UART: [kat] SHA2-256
2,367,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,879 UART: [kat] ++
2,371,352 UART: [kat] sha1
2,371,864 UART: [kat] SHA2-256
2,372,519 UART: [kat] SHA2-384
2,373,171 UART: [kat] SHA2-512-ACC
2,374,172 UART: [kat] ECC-384
2,949,315 UART: [kat] HMAC-384Kdf
2,971,948 UART: [kat] LMS
3,501,362 UART: [kat] --
3,505,713 UART: [cold-reset] ++
3,507,860 UART: [fht] FHT @ 0x50003400
3,518,346 UART: [idev] ++
3,518,903 UART: [idev] CDI.KEYID = 6
3,519,840 UART: [idev] SUBJECT.KEYID = 7
3,521,047 UART: [idev] UDS.KEYID = 0
3,543,384 UART: [idev] Erasing UDS.KEYID = 0
6,028,987 UART: [idev] Sha1 KeyId Algorithm
6,051,698 UART: [idev] --
6,055,536 UART: [ldev] ++
6,056,105 UART: [ldev] CDI.KEYID = 6
6,057,016 UART: [ldev] SUBJECT.KEYID = 5
6,058,178 UART: [ldev] AUTHORITY.KEYID = 7
6,059,408 UART: [ldev] FE.KEYID = 1
6,098,137 UART: [ldev] Erasing FE.KEYID = 1
8,603,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,496 UART: [ldev] --
10,413,030 UART: [fwproc] Wait for Commands...
10,414,908 UART: [fwproc] Recv command 0x46574c44
10,416,951 UART: [fwproc] Recv'd Img size: 114084 bytes
13,811,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,264,253 >>> mbox cmd response: success
14,268,108 UART: [afmc] ++
14,268,689 UART: [afmc] CDI.KEYID = 6
14,269,571 UART: [afmc] SUBJECT.KEYID = 7
14,270,784 UART: [afmc] AUTHORITY.KEYID = 5
16,801,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,323 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,191 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,325 UART: [afmc] --
18,601,598 UART: [cold-reset] --
18,603,373 UART: [state] Locking Datavault
18,607,541 UART: [state] Locking PCR0, PCR1 and PCR31
18,609,181 UART: [state] Locking ICCM
18,610,306 UART: [exit] Launching FMC @ 0x40000130
18,618,701 UART:
18,618,933 UART: Running Caliptra FMC ...
18,620,031 UART:
18,620,193 UART: [state] CFI Enabled
18,685,002 UART: [fht] FMC Alias Private Key: 7
20,448,836 UART: [art] Extend RT PCRs Done
20,450,057 UART: [art] Lock RT PCRs Done
20,451,710 UART: [art] Populate DV Done
20,456,901 UART: [fht] FMC Alias Private Key: 7
20,458,542 UART: [art] Derive CDI
20,459,279 UART: [art] Store in in slot 0x4
20,518,262 UART: [art] Derive Key Pair
20,519,323 UART: [art] Store priv key in slot 0x5
22,981,844 UART: [art] Derive Key Pair - Done
22,994,767 UART: [art] Signing Cert with AUTHO
22,996,068 UART: RITY.KEYID = 7
24,708,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,998 UART: [art] PUB.X = 716549FA0F567827B3274CB84B688ABBA7D40BDC943157B1F96E03A786A003AE2290175AC4A8E6678501502571D726C5
24,717,269 UART: [art] PUB.Y = 6C69FDE3F246FE73F97B2109D28CE25BC29C7AA12A04C9346AADF46B13CE3D04D7553B57120CE09A4CD90B1644E4DBAE
24,724,543 UART: [art] SIG.R = 1B4FC0E1BC706B7D4834FB5695245D97EBCC11FF3BB186A97078213766F7554F3233F37FB5C7F05EDE1F5211C95A0BAA
24,731,961 UART: [art] SIG.S = 99E384CFA6748A9D8C512000E132C1395D4464A6B5FB1773AA3476955A7641A32A6E6B427FF54DA25321E19B78C6391A
25,711,164 UART: Caliptra RT
25,711,871 UART: [state] CFI Enabled
25,876,229 UART: [rt] RT listening for mailbox commands...
25,878,172 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,908,941 UART: [rt]cmd =0x44504543, len=92
25,915,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,215,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,986 >>> mbox cmd response: success
18,324,013 UART:
18,324,434 UART: Running Caliptra FMC ...
18,325,572 UART:
18,325,739 UART: [state] CFI Enabled
18,392,895 UART: [fht] FMC Alias Private Key: 7
20,157,205 UART: [art] Extend RT PCRs Done
20,158,426 UART: [art] Lock RT PCRs Done
20,159,941 UART: [art] Populate DV Done
20,165,298 UART: [fht] FMC Alias Private Key: 7
20,166,889 UART: [art] Derive CDI
20,167,721 UART: [art] Store in in slot 0x4
20,226,068 UART: [art] Derive Key Pair
20,227,105 UART: [art] Store priv key in slot 0x5
22,689,877 UART: [art] Derive Key Pair - Done
22,702,767 UART: [art] Signing Cert with AUTHO
22,704,065 UART: RITY.KEYID = 7
24,416,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,587 UART: [art] PUB.X = 94226E1B4CF693726B02C125AC713C00727F5F9427DD62ED9F1E2FAAA54ED39DD5CF6B78DDF883D6240FCA907192C27A
24,424,801 UART: [art] PUB.Y = 16A37D70BF586B3EA232EFEB800F6581F3B913DBA7DA14DF7393160B4E3FF0B41AFA8704422FFA3FF89FB799F32A5DDA
24,432,111 UART: [art] SIG.R = 8D7F20F6F0C3602552A20E56B649BF57211CC3D0B4DEC8F344BCCD16C4AFE14E646E415321DCC3FA570ACBFC05A52BEA
24,439,535 UART: [art] SIG.S = 84298BA4081759790640D8F89E1D57A7FEADC5CA0D9D20BEB74903115EB8BD60CCAC370BC943327797F10EC2B4667BFC
25,418,265 UART: Caliptra RT
25,418,976 UART: [state] CFI Enabled
25,582,790 UART: [rt] RT listening for mailbox commands...
25,584,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,615,225 UART: [rt]cmd =0x44504543, len=92
25,621,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,618 writing to cptra_bootfsm_go
2,218,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,363,730 UART:
2,364,148 UART: Running Caliptra ROM ...
2,365,325 UART:
2,365,502 UART: [state] CFI Enabled
2,366,507 UART: [state] LifecycleState = Unprovisioned
2,368,171 UART: [state] DebugLocked = No
2,369,284 UART: [state] WD Timer not started. Device not locked for debugging
2,371,761 UART: [kat] SHA2-256
2,372,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,375,442 UART: [kat] ++
2,375,898 UART: [kat] sha1
2,376,410 UART: [kat] SHA2-256
2,377,146 UART: [kat] SHA2-384
2,377,812 UART: [kat] SHA2-512-ACC
2,378,652 UART: [kat] ECC-384
3,279,743 UART: [kat] HMAC-384Kdf
3,292,810 UART: [kat] LMS
3,822,274 UART: [kat] --
3,824,154 UART: [cold-reset] ++
3,825,875 UART: [fht] FHT @ 0x50003400
3,838,109 UART: [idev] ++
3,838,683 UART: [idev] CDI.KEYID = 6
3,839,618 UART: [idev] SUBJECT.KEYID = 7
3,840,829 UART: [idev] UDS.KEYID = 0
3,854,080 UART: [idev] Erasing UDS.KEYID = 0
6,315,913 UART: [idev] Sha1 KeyId Algorithm
6,337,893 UART: [idev] --
6,341,807 UART: [ldev] ++
6,342,383 UART: [ldev] CDI.KEYID = 6
6,343,266 UART: [ldev] SUBJECT.KEYID = 5
6,344,482 UART: [ldev] AUTHORITY.KEYID = 7
6,345,714 UART: [ldev] FE.KEYID = 1
6,356,579 UART: [ldev] Erasing FE.KEYID = 1
8,826,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,013 UART: [ldev] --
10,612,769 UART: [fwproc] Wait for Commands...
10,615,242 UART: [fwproc] Recv command 0x46574c44
10,617,338 UART: [fwproc] Recv'd Img size: 114084 bytes
14,016,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,154,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,472,144 >>> mbox cmd response: success
14,477,201 UART: [afmc] ++
14,477,788 UART: [afmc] CDI.KEYID = 6
14,478,673 UART: [afmc] SUBJECT.KEYID = 7
14,479,892 UART: [afmc] AUTHORITY.KEYID = 5
16,973,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,696,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,698,882 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,714,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,730,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,746,553 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,769,591 UART: [afmc] --
18,772,549 UART: [cold-reset] --
18,775,925 UART: [state] Locking Datavault
18,782,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,174 UART: [state] Locking ICCM
18,786,544 UART: [exit] Launching FMC @ 0x40000130
18,794,990 UART:
18,795,233 UART: Running Caliptra FMC ...
18,796,339 UART:
18,796,498 UART: [state] CFI Enabled
18,804,545 UART: [fht] FMC Alias Private Key: 7
20,561,777 UART: [art] Extend RT PCRs Done
20,563,013 UART: [art] Lock RT PCRs Done
20,565,017 UART: [art] Populate DV Done
20,570,432 UART: [fht] FMC Alias Private Key: 7
20,571,966 UART: [art] Derive CDI
20,572,713 UART: [art] Store in in slot 0x4
20,615,257 UART: [art] Derive Key Pair
20,616,262 UART: [art] Store priv key in slot 0x5
23,043,019 UART: [art] Derive Key Pair - Done
23,056,036 UART: [art] Signing Cert with AUTHO
23,057,369 UART: RITY.KEYID = 7
24,762,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,763,821 UART: [art] PUB.X = AF7E7A1338843F917C093AA2A5C1FDAAB27B3073C8DC73FB38F524F4832D74088D83143F3A359514606363E165B549FA
24,771,110 UART: [art] PUB.Y = E58816F472B0B810172806EF84ABB1864B24DA2EEC59AA43BEE45313A133C971E74AB083C8ABA4E4C1BE4F2C4E2CB3A8
24,778,366 UART: [art] SIG.R = 72201B2D5CEA2C8D802F9A85ECC036B8FDB8B2294882C977CEBCA7B64C70FDCF34173C83E44BB8368601E4B961152B43
24,785,742 UART: [art] SIG.S = 20C4E00DD55EC6D1153195922A7E37B15EAF26CFF0A641422B7A14B085E093B61431FC5753F1D559ED1A18338F0F21A1
25,764,825 UART: Caliptra RT
25,765,547 UART: [state] CFI Enabled
25,883,184 UART: [rt] RT listening for mailbox commands...
25,885,109 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,915,769 UART: [rt]cmd =0x44504543, len=92
25,922,501 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
2,219,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,242,885 >>> mbox cmd response: success
18,491,273 UART:
18,491,703 UART: Running Caliptra FMC ...
18,492,820 UART:
18,492,976 UART: [state] CFI Enabled
18,500,718 UART: [fht] FMC Alias Private Key: 7
20,257,607 UART: [art] Extend RT PCRs Done
20,258,824 UART: [art] Lock RT PCRs Done
20,260,586 UART: [art] Populate DV Done
20,265,889 UART: [fht] FMC Alias Private Key: 7
20,267,539 UART: [art] Derive CDI
20,268,279 UART: [art] Store in in slot 0x4
20,310,832 UART: [art] Derive Key Pair
20,311,876 UART: [art] Store priv key in slot 0x5
22,739,164 UART: [art] Derive Key Pair - Done
22,752,296 UART: [art] Signing Cert with AUTHO
22,753,639 UART: RITY.KEYID = 7
24,459,176 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,665 UART: [art] PUB.X = CB0945F3B2E6E02AB2FE60970298F355BAB97284BD9ECBE8D5783348F084A017267F7B7866FD2FCAA1E7E0565E5A0C08
24,467,946 UART: [art] PUB.Y = 9FB8358574C84359161ECAA6CAA5A32A08173829D9274FA5F0A9D5093EECDBFC79CEC70B66AE2A517B21D75406E126A3
24,475,247 UART: [art] SIG.R = C9B77A61F567E952F3A37C19929FC9ED16DBBADC253A5019DA65B70204AF252C83D3874EDC363B1AC4158EAC779EC1FC
24,482,667 UART: [art] SIG.S = F0698C9923E850FE03CBCDA1F36CEC1FD48EB2ECFF1169D3D2C79425E5532BEE884DD8B612C2C7E9AE6C83ABC4519F42
25,461,235 UART: Caliptra RT
25,461,971 UART: [state] CFI Enabled
25,579,921 UART: [rt] RT listening for mailbox commands...
25,581,847 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,612,505 UART: [rt]cmd =0x44504543, len=92
25,619,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,217,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,361,946 UART:
2,362,352 UART: Running Caliptra ROM ...
2,363,525 UART:
2,363,691 UART: [state] CFI Enabled
2,364,657 UART: [state] LifecycleState = Unprovisioned
2,366,315 UART: [state] DebugLocked = No
2,367,421 UART: [state] WD Timer not started. Device not locked for debugging
2,369,891 UART: [kat] SHA2-256
2,370,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,373,564 UART: [kat] ++
2,374,033 UART: [kat] sha1
2,374,554 UART: [kat] SHA2-256
2,375,211 UART: [kat] SHA2-384
2,375,948 UART: [kat] SHA2-512-ACC
2,376,786 UART: [kat] ECC-384
2,947,591 UART: [kat] HMAC-384Kdf
2,972,819 UART: [kat] LMS
3,504,626 UART: [kat] --
3,509,845 UART: [cold-reset] ++
3,511,362 UART: [fht] FHT @ 0x50003400
3,522,625 UART: [idev] ++
3,523,299 UART: [idev] CDI.KEYID = 6
3,524,311 UART: [idev] SUBJECT.KEYID = 7
3,525,462 UART: [idev] UDS.KEYID = 0
3,544,734 UART: [idev] Erasing UDS.KEYID = 0
6,028,680 UART: [idev] Sha1 KeyId Algorithm
6,051,625 UART: [idev] --
6,056,367 UART: [ldev] ++
6,057,067 UART: [ldev] CDI.KEYID = 6
6,057,986 UART: [ldev] SUBJECT.KEYID = 5
6,059,199 UART: [ldev] AUTHORITY.KEYID = 7
6,060,373 UART: [ldev] FE.KEYID = 1
6,100,559 UART: [ldev] Erasing FE.KEYID = 1
8,606,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,476 UART: [ldev] --
10,415,385 UART: [fwproc] Wait for Commands...
10,417,966 UART: [fwproc] Recv command 0x46574c44
10,420,240 UART: [fwproc] Recv'd Img size: 114084 bytes
13,855,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,592,620 >>> mbox cmd response: success
14,595,822 UART: [afmc] ++
14,596,517 UART: [afmc] CDI.KEYID = 6
14,597,758 UART: [afmc] SUBJECT.KEYID = 7
14,599,195 UART: [afmc] AUTHORITY.KEYID = 5
17,128,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,896,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,911,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,936,874 UART: [afmc] --
18,939,883 UART: [cold-reset] --
18,944,313 UART: [state] Locking Datavault
18,950,177 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,336 UART: [state] Locking ICCM
18,954,598 UART: [exit] Launching FMC @ 0x40000130
18,963,284 UART:
18,963,515 UART: Running Caliptra FMC ...
18,964,611 UART:
18,964,771 UART: [state] CFI Enabled
19,021,137 UART: [fht] FMC Alias Private Key: 7
20,785,732 UART: [art] Extend RT PCRs Done
20,786,947 UART: [art] Lock RT PCRs Done
20,788,652 UART: [art] Populate DV Done
20,794,168 UART: [fht] FMC Alias Private Key: 7
20,795,817 UART: [art] Derive CDI
20,796,631 UART: [art] Store in in slot 0x4
20,854,915 UART: [art] Derive Key Pair
20,855,972 UART: [art] Store priv key in slot 0x5
23,319,341 UART: [art] Derive Key Pair - Done
23,331,903 UART: [art] Signing Cert with AUTHO
23,333,210 UART: RITY.KEYID = 7
25,044,659 UART: [art] Erasing AUTHORITY.KEYID = 7
25,046,164 UART: [art] PUB.X = 2FE392715B53A2B0D099ADEFC99E04332B0E27B69B591426414CADB8E86A15267657DFF825D1C240A7162C1F257548FE
25,053,392 UART: [art] PUB.Y = C6F2089AD645D37556361B115D5F59026C3A5B86FB3DE142D2E9F432B500C3829B94F335A2FC5F749E737F8B48357197
25,060,640 UART: [art] SIG.R = 1A9B91A5119BA955C8DB1793288E9FE3CE3F3183ECEE3C4BFC98CC82C2653476D72474EE114C0936BA33741FA76679E8
25,068,013 UART: [art] SIG.S = 8ED837FBD86A7D139E89BCD8F4F336AC67DC799AA9691C3FC320726C6ABF3550831A862A519A10E9AF66B2CD1C0A4615
26,047,618 UART: Caliptra RT
26,048,326 UART: [state] CFI Enabled
26,213,291 UART: [rt] RT listening for mailbox commands...
26,215,207 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,245,706 UART: [rt]cmd =0x44504543, len=92
26,252,052 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,216,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,710,376 >>> mbox cmd response: success
19,004,382 UART:
19,004,796 UART: Running Caliptra FMC ...
19,005,932 UART:
19,006,103 UART: [state] CFI Enabled
19,069,961 UART: [fht] FMC Alias Private Key: 7
20,834,347 UART: [art] Extend RT PCRs Done
20,835,571 UART: [art] Lock RT PCRs Done
20,837,410 UART: [art] Populate DV Done
20,842,874 UART: [fht] FMC Alias Private Key: 7
20,844,579 UART: [art] Derive CDI
20,845,393 UART: [art] Store in in slot 0x4
20,902,651 UART: [art] Derive Key Pair
20,903,697 UART: [art] Store priv key in slot 0x5
23,366,319 UART: [art] Derive Key Pair - Done
23,379,142 UART: [art] Signing Cert with AUTHO
23,380,475 UART: RITY.KEYID = 7
25,092,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,666 UART: [art] PUB.X = 5B451ED190374BA515EA4CCB2FE8D92E13F8ED0A68047C175F3D4D390778842911D23C43E6A9176E4C218AE87897A766
25,100,939 UART: [art] PUB.Y = 56F3572DF20A81E045D79FB48E8FE34B5CA384BB3AA4F8BA3EFF27241E3997F9BBF3A1D6954E64D489CA02CC43AB60E0
25,108,178 UART: [art] SIG.R = 6AF6D3EB9CF1EFD5D170E323B9A14A2284BED00CF49817CE344E31A56B65C0998211B3776007329FD91C2FCECD56F97B
25,115,565 UART: [art] SIG.S = C8BE189E010DADC5CBA9B1E04BD2DF236CE28EC032A7ADBC7E086DA3F9DA6F126AB978EB84A503750159232289B031B5
26,095,086 UART: Caliptra RT
26,095,780 UART: [state] CFI Enabled
26,260,551 UART: [rt] RT listening for mailbox commands...
26,262,469 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,293,082 UART: [rt]cmd =0x44504543, len=92
26,299,806 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
2,222,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,366,592 UART:
2,367,005 UART: Running Caliptra ROM ...
2,368,094 UART:
2,368,252 UART: [state] CFI Enabled
2,369,217 UART: [state] LifecycleState = Unprovisioned
2,370,874 UART: [state] DebugLocked = No
2,372,007 UART: [state] WD Timer not started. Device not locked for debugging
2,374,498 UART: [kat] SHA2-256
2,375,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,190 UART: [kat] ++
2,378,643 UART: [kat] sha1
2,379,155 UART: [kat] SHA2-256
2,379,810 UART: [kat] SHA2-384
2,380,466 UART: [kat] SHA2-512-ACC
2,381,293 UART: [kat] ECC-384
3,290,096 UART: [kat] HMAC-384Kdf
3,303,398 UART: [kat] LMS
3,835,252 UART: [kat] --
3,840,355 UART: [cold-reset] ++
3,842,562 UART: [fht] FHT @ 0x50003400
3,853,550 UART: [idev] ++
3,854,228 UART: [idev] CDI.KEYID = 6
3,855,187 UART: [idev] SUBJECT.KEYID = 7
3,856,404 UART: [idev] UDS.KEYID = 0
3,873,866 UART: [idev] Erasing UDS.KEYID = 0
6,338,494 UART: [idev] Sha1 KeyId Algorithm
6,360,817 UART: [idev] --
6,365,190 UART: [ldev] ++
6,365,879 UART: [ldev] CDI.KEYID = 6
6,366,788 UART: [ldev] SUBJECT.KEYID = 5
6,367,950 UART: [ldev] AUTHORITY.KEYID = 7
6,369,184 UART: [ldev] FE.KEYID = 1
6,378,863 UART: [ldev] Erasing FE.KEYID = 1
8,857,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,505 UART: [ldev] --
10,652,242 UART: [fwproc] Wait for Commands...
10,655,374 UART: [fwproc] Recv command 0x46574c44
10,657,705 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,696 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,832,920 >>> mbox cmd response: success
14,837,685 UART: [afmc] ++
14,838,392 UART: [afmc] CDI.KEYID = 6
14,839,645 UART: [afmc] SUBJECT.KEYID = 7
14,841,094 UART: [afmc] AUTHORITY.KEYID = 5
17,345,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,134 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,044 UART: [afmc] --
19,141,485 UART: [cold-reset] --
19,145,626 UART: [state] Locking Datavault
19,152,184 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,343 UART: [state] Locking ICCM
19,156,504 UART: [exit] Launching FMC @ 0x40000130
19,165,186 UART:
19,165,425 UART: Running Caliptra FMC ...
19,166,532 UART:
19,166,688 UART: [state] CFI Enabled
19,174,790 UART: [fht] FMC Alias Private Key: 7
20,932,158 UART: [art] Extend RT PCRs Done
20,933,389 UART: [art] Lock RT PCRs Done
20,935,231 UART: [art] Populate DV Done
20,940,607 UART: [fht] FMC Alias Private Key: 7
20,942,311 UART: [art] Derive CDI
20,943,049 UART: [art] Store in in slot 0x4
20,985,416 UART: [art] Derive Key Pair
20,986,454 UART: [art] Store priv key in slot 0x5
23,413,264 UART: [art] Derive Key Pair - Done
23,426,252 UART: [art] Signing Cert with AUTHO
23,427,585 UART: RITY.KEYID = 7
25,132,626 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,126 UART: [art] PUB.X = 4FF33C9E4E7CE86EDC4D568320739E9DEF5FC7733F58DE251F60CC2939C86FC61966E2301B2780BFA9DC99FAE472E7D9
25,141,400 UART: [art] PUB.Y = B706BCFDAFD231EE09A41DFF9EABC59D26AE40DF1C71B938226F0B664EF6FE7DC43D16CC9E3E0CDCF18BA995F1923024
25,148,719 UART: [art] SIG.R = 495DA947EF52AB77B8C6CD576103E9E819E835835700909C3EFEFD83E219CAF6D647C85F61368B235BC2B12A47CE50C4
25,156,090 UART: [art] SIG.S = 25C5BC45704F5427C975AB512BAA923F43B6E3A9A4E31A1F92D061E804BCD748E674766DD3B0C86D8D21642640FBAD36
26,135,139 UART: Caliptra RT
26,135,843 UART: [state] CFI Enabled
26,252,602 UART: [rt] RT listening for mailbox commands...
26,254,544 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,285,143 UART: [rt]cmd =0x44504543, len=92
26,291,930 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
2,224,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,817 >>> mbox cmd response: success
19,201,484 UART:
19,201,912 UART: Running Caliptra FMC ...
19,203,051 UART:
19,203,223 UART: [state] CFI Enabled
19,211,076 UART: [fht] FMC Alias Private Key: 7
20,968,081 UART: [art] Extend RT PCRs Done
20,969,322 UART: [art] Lock RT PCRs Done
20,970,739 UART: [art] Populate DV Done
20,976,103 UART: [fht] FMC Alias Private Key: 7
20,977,610 UART: [art] Derive CDI
20,978,348 UART: [art] Store in in slot 0x4
21,020,937 UART: [art] Derive Key Pair
21,021,937 UART: [art] Store priv key in slot 0x5
23,449,229 UART: [art] Derive Key Pair - Done
23,462,615 UART: [art] Signing Cert with AUTHO
23,463,921 UART: RITY.KEYID = 7
25,169,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,296 UART: [art] PUB.X = C36CE730041B76EF9F7FC753C2B9D26CD3D63F5C28D24C05CEA081C7728621E0244CD79CE49A7D4A7A58291BFB04ACFD
25,178,593 UART: [art] PUB.Y = 8825FC414825ED462DA2B8015EB6CA11B4A94CEEC71DF083E4F7FF324B85BF6F0666BA9AC500936B7792F685ED506800
25,185,845 UART: [art] SIG.R = 8FEF76F4FE37D103783453945B4E0A45095D3C7F406036C70514C37AE06BB840CF7BE812CFE28EBDE6D25B08423106CD
25,193,244 UART: [art] SIG.S = B26DAF301DD49DDEBE08AECA03476D273C8DA1EB4EA4BD44577C1B461CC222306B17A6BC523973B6177FB36288C473C5
26,171,940 UART: Caliptra RT
26,172,652 UART: [state] CFI Enabled
26,289,560 UART: [rt] RT listening for mailbox commands...
26,291,482 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,322,131 UART: [rt]cmd =0x44504543, len=92
26,328,469 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,663 UART: [kat] SHA2-256
892,601 UART: [kat] SHA2-384
895,404 UART: [kat] SHA2-512-ACC
897,305 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,488,482 UART: [idev] Erasing UDS.KEYID = 0
1,504,988 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,787 UART: [ldev] ++
1,514,955 UART: [ldev] CDI.KEYID = 6
1,515,318 UART: [ldev] SUBJECT.KEYID = 5
1,515,744 UART: [ldev] AUTHORITY.KEYID = 7
1,516,207 UART: [ldev] FE.KEYID = 1
1,521,295 UART: [ldev] Erasing FE.KEYID = 1
1,546,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,586,089 UART: [fwproc] Waiting for Commands...
1,586,782 UART: [fwproc] Received command 0x46574c44
1,587,573 UART: [fwproc] Received Image of size 114084 bytes
2,882,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,866 >>> mbox cmd response: success
3,076,088 UART: [afmc] ++
3,076,256 UART: [afmc] CDI.KEYID = 6
3,076,618 UART: [afmc] SUBJECT.KEYID = 7
3,077,043 UART: [afmc] AUTHORITY.KEYID = 5
3,111,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,460 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,968 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,853 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,543 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,464 UART: [afmc] --
3,155,476 UART: [cold-reset] --
3,156,368 UART: [state] Locking Datavault
3,157,465 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,069 UART: [state] Locking ICCM
3,158,621 UART: [exit] Launching FMC @ 0x40000130
3,163,950 UART:
3,163,966 UART: Running Caliptra FMC ...
3,164,374 UART:
3,164,428 UART: [state] CFI Enabled
3,174,981 UART: [fht] FMC Alias Private Key: 7
3,282,900 UART: [art] Extend RT PCRs Done
3,283,328 UART: [art] Lock RT PCRs Done
3,285,014 UART: [art] Populate DV Done
3,293,321 UART: [fht] FMC Alias Private Key: 7
3,294,311 UART: [art] Derive CDI
3,294,591 UART: [art] Store in in slot 0x4
3,379,914 UART: [art] Derive Key Pair
3,380,274 UART: [art] Store priv key in slot 0x5
3,393,074 UART: [art] Derive Key Pair - Done
3,408,018 UART: [art] Signing Cert with AUTHO
3,408,498 UART: RITY.KEYID = 7
3,423,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,577 UART: [art] PUB.X = 2D4455590D38465710303D0B34B85132948BE51E37B6DB3A5CCF89BF4AE7774B8721BCC8765AC75750006682CD9AA66B
3,431,317 UART: [art] PUB.Y = A8BEEF08A40784E6AF15AD9D043587525B91330B910B9C499D0D23EC4136D4A48FC1F9D2A8816DB0A85921099F9CA327
3,438,250 UART: [art] SIG.R = 90BD0F335B1EF558BC1BDCF6964DEBA9C6AA61D79581332113758FCA3D9E073AEFE387D530D970B08B57CC1DE4FC1C14
3,445,032 UART: [art] SIG.S = 0D71DDB0A8F7F5CA474732CD00009F836C27A090016F59B9BFBBE8FC08AC7F6832407D9F173916E6A99DB5C7929DBE31
3,468,610 UART: Caliptra RT
3,468,863 UART: [state] CFI Enabled
3,576,388 UART: [rt] RT listening for mailbox commands...
3,577,058 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,358 UART: [rt]cmd =0x44504543, len=92
3,614,348 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,498 >>> mbox cmd response: success
2,986,070 UART:
2,986,086 UART: Running Caliptra FMC ...
2,986,494 UART:
2,986,548 UART: [state] CFI Enabled
2,997,185 UART: [fht] FMC Alias Private Key: 7
3,105,060 UART: [art] Extend RT PCRs Done
3,105,488 UART: [art] Lock RT PCRs Done
3,107,072 UART: [art] Populate DV Done
3,115,439 UART: [fht] FMC Alias Private Key: 7
3,116,525 UART: [art] Derive CDI
3,116,805 UART: [art] Store in in slot 0x4
3,202,180 UART: [art] Derive Key Pair
3,202,540 UART: [art] Store priv key in slot 0x5
3,215,886 UART: [art] Derive Key Pair - Done
3,230,875 UART: [art] Signing Cert with AUTHO
3,231,355 UART: RITY.KEYID = 7
3,246,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,444 UART: [art] PUB.X = 785CD4318CB174D0341B2A6CDD91F60802BE56B31A9AC5FC3DF838F7A1A7C07C4C08C7CAE5EBC2E373BDF9015DC7509F
3,254,222 UART: [art] PUB.Y = FF1383B0D2D2983A978E02B5E089D9C7B1355DF3A0F990417C622E7EB4408BEE97A7FEF8E1C58BB6309A4CBEEB7C4D44
3,261,185 UART: [art] SIG.R = 6369A6150DA4F112EF6E9C7FCE76381A193AA1AF806AA3A8569B096B741BE847C5019600C7D7E34B338A8121F154C427
3,267,924 UART: [art] SIG.S = 8D1E0FC15342CF61AF5958C4DD6D2983A3CB618C85068C70484A1CC3C6C4989D9358225AA5B22A3FDF3CF454A8AFA258
3,292,131 UART: Caliptra RT
3,292,384 UART: [state] CFI Enabled
3,400,427 UART: [rt] RT listening for mailbox commands...
3,401,097 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,727 UART: [rt]cmd =0x44504543, len=92
3,438,963 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
902,973 UART: [kat] HMAC-384Kdf
907,755 UART: [kat] LMS
1,475,951 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,489,447 UART: [idev] Erasing UDS.KEYID = 0
1,506,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,803 UART: [idev] --
1,515,764 UART: [ldev] ++
1,515,932 UART: [ldev] CDI.KEYID = 6
1,516,295 UART: [ldev] SUBJECT.KEYID = 5
1,516,721 UART: [ldev] AUTHORITY.KEYID = 7
1,517,184 UART: [ldev] FE.KEYID = 1
1,522,338 UART: [ldev] Erasing FE.KEYID = 1
1,547,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,591 UART: [ldev] --
1,586,926 UART: [fwproc] Waiting for Commands...
1,587,725 UART: [fwproc] Received command 0x46574c44
1,588,516 UART: [fwproc] Received Image of size 114084 bytes
2,884,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,553 >>> mbox cmd response: success
3,077,637 UART: [afmc] ++
3,077,805 UART: [afmc] CDI.KEYID = 6
3,078,167 UART: [afmc] SUBJECT.KEYID = 7
3,078,592 UART: [afmc] AUTHORITY.KEYID = 5
3,113,723 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,364 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,054 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,981 UART: [afmc] --
3,157,059 UART: [cold-reset] --
3,157,735 UART: [state] Locking Datavault
3,159,046 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,650 UART: [state] Locking ICCM
3,160,206 UART: [exit] Launching FMC @ 0x40000130
3,165,535 UART:
3,165,551 UART: Running Caliptra FMC ...
3,165,959 UART:
3,166,102 UART: [state] CFI Enabled
3,177,069 UART: [fht] FMC Alias Private Key: 7
3,285,006 UART: [art] Extend RT PCRs Done
3,285,434 UART: [art] Lock RT PCRs Done
3,287,232 UART: [art] Populate DV Done
3,295,373 UART: [fht] FMC Alias Private Key: 7
3,296,385 UART: [art] Derive CDI
3,296,665 UART: [art] Store in in slot 0x4
3,382,630 UART: [art] Derive Key Pair
3,382,990 UART: [art] Store priv key in slot 0x5
3,396,742 UART: [art] Derive Key Pair - Done
3,411,719 UART: [art] Signing Cert with AUTHO
3,412,199 UART: RITY.KEYID = 7
3,427,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,264 UART: [art] PUB.X = 35FFFA817DFE5457333EEE8CB14733FC7A308850CFD2A97E2A811BEABB25F853015E18834856EE4196733EFBBF8AC811
3,435,043 UART: [art] PUB.Y = 7AA70C5E90E36EDC9C61F6D2B7D336C51BDCB21F831763DBBFA3CDD86046F427477CFA0A4E0AA052B9348D9BED16DF00
3,441,984 UART: [art] SIG.R = 56D0F313C8A8426FC6D0E94627F38022F25CD7F52C4112225B39D7CE598881FDF70F70DA44E6C8A479DED39906E93E3E
3,448,752 UART: [art] SIG.S = EFCD2673803B2A505DCCFE02DADB5538B54E7415900AC93A995630718295A620E10500D5216CC0BCCE8A889A841491C1
3,472,208 UART: Caliptra RT
3,472,553 UART: [state] CFI Enabled
3,580,316 UART: [rt] RT listening for mailbox commands...
3,580,986 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,564 UART: [rt]cmd =0x44504543, len=92
3,618,724 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,369 >>> mbox cmd response: success
2,986,781 UART:
2,986,797 UART: Running Caliptra FMC ...
2,987,205 UART:
2,987,348 UART: [state] CFI Enabled
2,998,157 UART: [fht] FMC Alias Private Key: 7
3,106,248 UART: [art] Extend RT PCRs Done
3,106,676 UART: [art] Lock RT PCRs Done
3,108,486 UART: [art] Populate DV Done
3,116,949 UART: [fht] FMC Alias Private Key: 7
3,117,923 UART: [art] Derive CDI
3,118,203 UART: [art] Store in in slot 0x4
3,203,748 UART: [art] Derive Key Pair
3,204,108 UART: [art] Store priv key in slot 0x5
3,217,392 UART: [art] Derive Key Pair - Done
3,232,137 UART: [art] Signing Cert with AUTHO
3,232,617 UART: RITY.KEYID = 7
3,247,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,104 UART: [art] PUB.X = 0895F62EF46F768F7EEA97C6BF586F4AAE593B62E36FB948DCF06592C61A4D360F3AA5B9FE7DFA2C483DBF8C8F5F6CB6
3,254,892 UART: [art] PUB.Y = 1830A1E391A074C54E3F0844E480693D7E11109CD8248BF89602A9135494AC4C4C26248670977A464DD3C693A2E906FE
3,261,823 UART: [art] SIG.R = B2A245F0DB617F920B77FF1C9AE65C78FB380B47292B027B78A3B7D2101C16EA41717A6116EE3DDCD39EE7541CBD62F7
3,268,596 UART: [art] SIG.S = 8C962A875E39C01DB2D0384DA56426436AB8214333C599E6ADD6EC80109B5AFB7259F360493D4D2078CBCA0AAA65180B
3,292,065 UART: Caliptra RT
3,292,410 UART: [state] CFI Enabled
3,400,728 UART: [rt] RT listening for mailbox commands...
3,401,398 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,018 UART: [rt]cmd =0x44504543, len=92
3,439,018 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,733 UART: [kat] SHA2-256
903,673 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,074 UART: [kat] LMS
1,170,402 UART: [kat] --
1,170,907 UART: [cold-reset] ++
1,171,377 UART: [fht] FHT @ 0x50003400
1,174,056 UART: [idev] ++
1,174,224 UART: [idev] CDI.KEYID = 6
1,174,584 UART: [idev] SUBJECT.KEYID = 7
1,175,008 UART: [idev] UDS.KEYID = 0
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,881 UART: [idev] Sha1 KeyId Algorithm
1,208,417 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,000 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,468 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,109 >>> mbox cmd response: success
2,770,209 UART: [afmc] ++
2,770,377 UART: [afmc] CDI.KEYID = 6
2,770,739 UART: [afmc] SUBJECT.KEYID = 7
2,771,164 UART: [afmc] AUTHORITY.KEYID = 5
2,805,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,662 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,512 UART: [afmc] --
2,849,588 UART: [cold-reset] --
2,850,512 UART: [state] Locking Datavault
2,851,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,311 UART: [state] Locking ICCM
2,852,903 UART: [exit] Launching FMC @ 0x40000130
2,858,232 UART:
2,858,248 UART: Running Caliptra FMC ...
2,858,656 UART:
2,858,710 UART: [state] CFI Enabled
2,869,363 UART: [fht] FMC Alias Private Key: 7
2,977,534 UART: [art] Extend RT PCRs Done
2,977,962 UART: [art] Lock RT PCRs Done
2,979,450 UART: [art] Populate DV Done
2,987,645 UART: [fht] FMC Alias Private Key: 7
2,988,745 UART: [art] Derive CDI
2,989,025 UART: [art] Store in in slot 0x4
3,074,450 UART: [art] Derive Key Pair
3,074,810 UART: [art] Store priv key in slot 0x5
3,088,804 UART: [art] Derive Key Pair - Done
3,103,406 UART: [art] Signing Cert with AUTHO
3,103,886 UART: RITY.KEYID = 7
3,119,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,933 UART: [art] PUB.X = 9A0ACC0C891EC07E3DD93C5D52E0E18ADDABD8CCA286020C99217A3FAA53F632546A20B51192BE3E4EFFDDEDF01BCACD
3,126,723 UART: [art] PUB.Y = 6BFE5737F265CB228FF4894ABEF4D367D18D0FE2089A3542BBD45CFB44D1AF74BE44DB9DD3DDB90F7ED03F8CA093EA52
3,133,690 UART: [art] SIG.R = 8913D3322B9FA7D64C168B76BE7E78726AACB18B72535D5480C88760AB4D4A451F7402C3133B4BB1E8759587FA865304
3,140,450 UART: [art] SIG.S = F31AE9752B3F4E66C6A2B1F169EEC4A4CB176477F7AE2FA3119863F13196AA25569DCF1C9088778EF5E7B73457C41C35
3,164,491 UART: Caliptra RT
3,164,744 UART: [state] CFI Enabled
3,272,832 UART: [rt] RT listening for mailbox commands...
3,273,502 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,748 UART: [rt]cmd =0x44504543, len=92
3,310,894 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,360 >>> mbox cmd response: success
2,685,624 UART:
2,685,640 UART: Running Caliptra FMC ...
2,686,048 UART:
2,686,102 UART: [state] CFI Enabled
2,696,691 UART: [fht] FMC Alias Private Key: 7
2,804,172 UART: [art] Extend RT PCRs Done
2,804,600 UART: [art] Lock RT PCRs Done
2,806,506 UART: [art] Populate DV Done
2,814,739 UART: [fht] FMC Alias Private Key: 7
2,815,821 UART: [art] Derive CDI
2,816,101 UART: [art] Store in in slot 0x4
2,901,306 UART: [art] Derive Key Pair
2,901,666 UART: [art] Store priv key in slot 0x5
2,914,800 UART: [art] Derive Key Pair - Done
2,929,540 UART: [art] Signing Cert with AUTHO
2,930,020 UART: RITY.KEYID = 7
2,945,068 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,833 UART: [art] PUB.X = FF797E215AB370170357DEA6874029D23BF9A870BAC969879EC8ECDFDA31FCC16B3C25B3D1E98F0CCD4242F991E39F49
2,952,611 UART: [art] PUB.Y = 95B21BF907CD53C34D3A0BE7B340A970D3BD2FCC997DC39E743EC2CB70F5FC93B9C86948BB34CA8ED5A41A0ED1B13D87
2,959,574 UART: [art] SIG.R = DE2B739DCE36B47117C7CD89ABF8D0B1734741204DD02A9ABE57F67CB71FE7D2FABA75A3DA0AFDF5AC39E7EE239E9A15
2,966,369 UART: [art] SIG.S = 35541396DAF85ECD1C058E314A56A2DFB46D1898E20C620B69AB38143F77E693013B45476ADB8618D0A1C17B72711BD8
2,990,454 UART: Caliptra RT
2,990,707 UART: [state] CFI Enabled
3,098,342 UART: [rt] RT listening for mailbox commands...
3,099,012 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,462 UART: [rt]cmd =0x44504543, len=92
3,136,716 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,145 UART: [kat] HMAC-384Kdf
922,719 UART: [kat] LMS
1,171,047 UART: [kat] --
1,171,900 UART: [cold-reset] ++
1,172,342 UART: [fht] FHT @ 0x50003400
1,174,887 UART: [idev] ++
1,175,055 UART: [idev] CDI.KEYID = 6
1,175,415 UART: [idev] SUBJECT.KEYID = 7
1,175,839 UART: [idev] UDS.KEYID = 0
1,183,801 UART: [idev] Erasing UDS.KEYID = 0
1,201,264 UART: [idev] Sha1 KeyId Algorithm
1,209,786 UART: [idev] --
1,210,828 UART: [ldev] ++
1,210,996 UART: [ldev] CDI.KEYID = 6
1,211,359 UART: [ldev] SUBJECT.KEYID = 5
1,211,785 UART: [ldev] AUTHORITY.KEYID = 7
1,212,248 UART: [ldev] FE.KEYID = 1
1,217,558 UART: [ldev] Erasing FE.KEYID = 1
1,244,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,442 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,405 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,140 >>> mbox cmd response: success
2,773,346 UART: [afmc] ++
2,773,514 UART: [afmc] CDI.KEYID = 6
2,773,876 UART: [afmc] SUBJECT.KEYID = 7
2,774,301 UART: [afmc] AUTHORITY.KEYID = 5
2,809,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,129 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,733 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,445 UART: [afmc] --
2,852,503 UART: [cold-reset] --
2,853,319 UART: [state] Locking Datavault
2,854,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,326 UART: [state] Locking ICCM
2,855,842 UART: [exit] Launching FMC @ 0x40000130
2,861,171 UART:
2,861,187 UART: Running Caliptra FMC ...
2,861,595 UART:
2,861,738 UART: [state] CFI Enabled
2,872,419 UART: [fht] FMC Alias Private Key: 7
2,980,710 UART: [art] Extend RT PCRs Done
2,981,138 UART: [art] Lock RT PCRs Done
2,982,742 UART: [art] Populate DV Done
2,990,827 UART: [fht] FMC Alias Private Key: 7
2,991,897 UART: [art] Derive CDI
2,992,177 UART: [art] Store in in slot 0x4
3,077,716 UART: [art] Derive Key Pair
3,078,076 UART: [art] Store priv key in slot 0x5
3,091,468 UART: [art] Derive Key Pair - Done
3,106,190 UART: [art] Signing Cert with AUTHO
3,106,670 UART: RITY.KEYID = 7
3,122,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,953 UART: [art] PUB.X = 6D230F77FCBA245356970319902CAC7CC64AD31A210A00057C2AEE94F924D7544EEACFA708381DDC5A7D4AC1F531116C
3,129,696 UART: [art] PUB.Y = 7CFFB0D33498A80CC8E46C29716B1C61958776F6FF15CEFBF61AF13BE9064A097B49D25D2ECFB0BA22CD2849FEF99E07
3,136,652 UART: [art] SIG.R = 5E378DBD57B6C28A958935877555EED4044195DFD575908CAFCFC251776C566CE6914E682CEE8D910383D2F944917C72
3,143,414 UART: [art] SIG.S = 571E7C833A6A2170397351576360F092FBA8B45720324E60F047F8B7688EB0F2E3332BCD0D719DC8734C7737DCB9C75C
3,167,398 UART: Caliptra RT
3,167,743 UART: [state] CFI Enabled
3,275,936 UART: [rt] RT listening for mailbox commands...
3,276,606 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,146 UART: [rt]cmd =0x44504543, len=92
3,314,688 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,501 >>> mbox cmd response: success
2,686,403 UART:
2,686,419 UART: Running Caliptra FMC ...
2,686,827 UART:
2,686,970 UART: [state] CFI Enabled
2,697,723 UART: [fht] FMC Alias Private Key: 7
2,805,870 UART: [art] Extend RT PCRs Done
2,806,298 UART: [art] Lock RT PCRs Done
2,807,492 UART: [art] Populate DV Done
2,815,749 UART: [fht] FMC Alias Private Key: 7
2,816,757 UART: [art] Derive CDI
2,817,037 UART: [art] Store in in slot 0x4
2,902,638 UART: [art] Derive Key Pair
2,902,998 UART: [art] Store priv key in slot 0x5
2,915,948 UART: [art] Derive Key Pair - Done
2,930,775 UART: [art] Signing Cert with AUTHO
2,931,255 UART: RITY.KEYID = 7
2,946,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,416 UART: [art] PUB.X = 18426DF2D44F6438D918AA8007C37ADEB7764386076A287B6CC475D9AFE2172438D5DE06B5A3FDD27E5CFD9B39E832AB
2,954,187 UART: [art] PUB.Y = CACC60133BDB3E8E716AD5C18CA4D7D7AD141E4478AA4C9771F72E8033B66EC3E45899431E343CC579F15BD4A30FE51E
2,961,148 UART: [art] SIG.R = 648AFDDE90763AFC9AFD7245D277B1316BB8D660E48CEEBC85B6307E644121B5235B0C794EB3878607CFFB811693C52A
2,967,920 UART: [art] SIG.S = B40F1E68AA9E65F75242BE8EB2A98EA0D9AB98B975A78D59B5AE6C95B0833F8E2CF92BF76764D752E29E8C2B377B3319
2,992,260 UART: Caliptra RT
2,992,605 UART: [state] CFI Enabled
3,099,756 UART: [rt] RT listening for mailbox commands...
3,100,426 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,842 UART: [rt]cmd =0x44504543, len=92
3,137,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,547 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,188 UART: [fwproc] Wait for Commands...
1,280,879 UART: [fwproc] Recv command 0x46574c44
1,281,612 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,977 >>> mbox cmd response: success
2,769,006 UART: [afmc] ++
2,769,174 UART: [afmc] CDI.KEYID = 6
2,769,537 UART: [afmc] SUBJECT.KEYID = 7
2,769,963 UART: [afmc] AUTHORITY.KEYID = 5
2,805,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,153 UART: [afmc] --
2,849,241 UART: [cold-reset] --
2,850,185 UART: [state] Locking Datavault
2,851,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,876 UART: [state] Locking ICCM
2,852,324 UART: [exit] Launching FMC @ 0x40000130
2,857,653 UART:
2,857,669 UART: Running Caliptra FMC ...
2,858,077 UART:
2,858,131 UART: [state] CFI Enabled
2,868,684 UART: [fht] FMC Alias Private Key: 7
2,976,475 UART: [art] Extend RT PCRs Done
2,976,903 UART: [art] Lock RT PCRs Done
2,978,479 UART: [art] Populate DV Done
2,986,654 UART: [fht] FMC Alias Private Key: 7
2,987,624 UART: [art] Derive CDI
2,987,904 UART: [art] Store in in slot 0x4
3,073,587 UART: [art] Derive Key Pair
3,073,947 UART: [art] Store priv key in slot 0x5
3,087,641 UART: [art] Derive Key Pair - Done
3,102,324 UART: [art] Signing Cert with AUTHO
3,102,804 UART: RITY.KEYID = 7
3,118,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,803 UART: [art] PUB.X = 47DE9A4F3E0AEB1DF9ADC4A8B7AEFAB10C29E6997A5859F2D233B4C581A6D73261A22A62B2DCEC7467725B8370716468
3,125,579 UART: [art] PUB.Y = CF98C0F8ACC774087CEA8CA14C1B4C02CAA97E596C0DA7FF47B84318EAA29D67222D609685CCE82B521F4F54477E0995
3,132,529 UART: [art] SIG.R = 336E1883043B4B59E6566F7AC569589C3F795FE9BD7F510FA6D10FB70B1A523EE09A6A95D38D008152E0E181F2E46DF9
3,139,269 UART: [art] SIG.S = 2D86DDD994EC474EFFA72637552AF1A34280158D39B1DB390D95D1CABF74AF0963959C706DA2D4B3EC08383592F69DE3
3,162,609 UART: Caliptra RT
3,162,862 UART: [state] CFI Enabled
3,271,429 UART: [rt] RT listening for mailbox commands...
3,272,099 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,121 UART: [rt]cmd =0x44504543, len=92
3,309,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,977 >>> mbox cmd response: success
2,682,409 UART:
2,682,425 UART: Running Caliptra FMC ...
2,682,833 UART:
2,682,887 UART: [state] CFI Enabled
2,693,364 UART: [fht] FMC Alias Private Key: 7
2,801,401 UART: [art] Extend RT PCRs Done
2,801,829 UART: [art] Lock RT PCRs Done
2,803,315 UART: [art] Populate DV Done
2,811,584 UART: [fht] FMC Alias Private Key: 7
2,812,512 UART: [art] Derive CDI
2,812,792 UART: [art] Store in in slot 0x4
2,897,901 UART: [art] Derive Key Pair
2,898,261 UART: [art] Store priv key in slot 0x5
2,910,977 UART: [art] Derive Key Pair - Done
2,925,370 UART: [art] Signing Cert with AUTHO
2,925,850 UART: RITY.KEYID = 7
2,941,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,003 UART: [art] PUB.X = D762DADCBB9A9E4DD9BA3D9FF3C68392F8C1241BE235562B16E0C31383521735A860DDE5C7762B90751DE879BCC08116
2,948,781 UART: [art] PUB.Y = 53FC4D73A6D3C4984F61B93263DA331FBCDAEB5308A8ECC8652E474A99542D58125B6ADA53E0346229D0B94214F31D7A
2,955,734 UART: [art] SIG.R = 6E2A22E44C880D73016E9F671D5A9D3A247A44B52CEC5A0B26CBFF510149EBB3A0E1F115F83388D78E08F7C3E7611D38
2,962,497 UART: [art] SIG.S = B4779CD4D5FCF3987F78B66A73FBD0402C1FE4E7CA89F86451C1906DBF293DF2CA2F31EDB1A56D6609C9A827C4524728
2,986,665 UART: Caliptra RT
2,986,918 UART: [state] CFI Enabled
3,094,041 UART: [rt] RT listening for mailbox commands...
3,094,711 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,229 UART: [rt]cmd =0x44504543, len=92
3,132,439 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,859 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,562 UART: [idev] ++
1,173,730 UART: [idev] CDI.KEYID = 6
1,174,091 UART: [idev] SUBJECT.KEYID = 7
1,174,516 UART: [idev] UDS.KEYID = 0
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,651 UART: [ldev] ++
1,209,819 UART: [ldev] CDI.KEYID = 6
1,210,183 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,617 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,395 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,520 >>> mbox cmd response: success
2,772,709 UART: [afmc] ++
2,772,877 UART: [afmc] CDI.KEYID = 6
2,773,240 UART: [afmc] SUBJECT.KEYID = 7
2,773,666 UART: [afmc] AUTHORITY.KEYID = 5
2,809,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,220 UART: [afmc] --
2,853,228 UART: [cold-reset] --
2,853,912 UART: [state] Locking Datavault
2,855,125 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,729 UART: [state] Locking ICCM
2,856,187 UART: [exit] Launching FMC @ 0x40000130
2,861,516 UART:
2,861,532 UART: Running Caliptra FMC ...
2,861,940 UART:
2,862,083 UART: [state] CFI Enabled
2,872,592 UART: [fht] FMC Alias Private Key: 7
2,980,915 UART: [art] Extend RT PCRs Done
2,981,343 UART: [art] Lock RT PCRs Done
2,983,183 UART: [art] Populate DV Done
2,991,338 UART: [fht] FMC Alias Private Key: 7
2,992,354 UART: [art] Derive CDI
2,992,634 UART: [art] Store in in slot 0x4
3,078,389 UART: [art] Derive Key Pair
3,078,749 UART: [art] Store priv key in slot 0x5
3,092,653 UART: [art] Derive Key Pair - Done
3,107,444 UART: [art] Signing Cert with AUTHO
3,107,924 UART: RITY.KEYID = 7
3,123,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,871 UART: [art] PUB.X = C5DF9F5F29DE438D3D11F70F2F56D86605BD36CE24A0842770C296AEE1A59FCEC7C409440245B52D86B60F3AC8833C67
3,130,634 UART: [art] PUB.Y = 6FF3A924764852E90072FBC3B1FD673212DD5F35206D1C131B63D5551A298614921ECE1E53483F97DE95CD6B41D218D7
3,137,560 UART: [art] SIG.R = B61EE71980DA74228FAB54AD1D6857EBF85D5345B31A48B9C881A52B5292A8B180275F70A8C730F28A0E5CAA2F48ED7D
3,144,337 UART: [art] SIG.S = 9EF436BFC3C803132D0C965B910F559FED2301B778F5CD444BE104C7FC5BBACD60F71A80E4B3593EFEFD84F6B27D4A1B
3,168,637 UART: Caliptra RT
3,168,982 UART: [state] CFI Enabled
3,276,924 UART: [rt] RT listening for mailbox commands...
3,277,594 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,080 UART: [rt]cmd =0x44504543, len=92
3,315,126 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,854 >>> mbox cmd response: success
2,681,868 UART:
2,681,884 UART: Running Caliptra FMC ...
2,682,292 UART:
2,682,435 UART: [state] CFI Enabled
2,692,874 UART: [fht] FMC Alias Private Key: 7
2,800,881 UART: [art] Extend RT PCRs Done
2,801,309 UART: [art] Lock RT PCRs Done
2,802,855 UART: [art] Populate DV Done
2,811,098 UART: [fht] FMC Alias Private Key: 7
2,812,058 UART: [art] Derive CDI
2,812,338 UART: [art] Store in in slot 0x4
2,897,803 UART: [art] Derive Key Pair
2,898,163 UART: [art] Store priv key in slot 0x5
2,911,441 UART: [art] Derive Key Pair - Done
2,925,977 UART: [art] Signing Cert with AUTHO
2,926,457 UART: RITY.KEYID = 7
2,940,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,736 UART: [art] PUB.X = CBEDE7B5457594520FF0F871D8A057857A73ECFF43BC2759FE5D9F952A5BC359AB8F1448A9FE34617D66B166895FC2F2
2,948,513 UART: [art] PUB.Y = 6729208B84ECD603E76D901D1CF1BC6D0A5D0C5CAC5E30C8FF86040FF2DDDCF65776698F053AA2A52AFA162825164170
2,955,455 UART: [art] SIG.R = E5CFE3B82ED336B473DA85C94ADF62DF822A23BE5C9C3D4B315D3C42A804B26D00972D23CB51105C5E612DD0BB318371
2,962,212 UART: [art] SIG.S = C2908A9C0562B3699DDCE0D7257FBF819EE6358193FA6943D9476217D76162398F8CE72580356F1F9515F20B44C6CA8F
2,986,159 UART: Caliptra RT
2,986,504 UART: [state] CFI Enabled
3,093,970 UART: [rt] RT listening for mailbox commands...
3,094,640 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,886 UART: [rt]cmd =0x44504543, len=92
3,132,058 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,002 UART:
192,385 UART: Running Caliptra ROM ...
193,573 UART:
193,730 UART: [state] CFI Enabled
263,476 UART: [state] LifecycleState = Unprovisioned
265,479 UART: [state] DebugLocked = No
267,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,539 UART: [kat] SHA2-256
442,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,756 UART: [kat] ++
453,213 UART: [kat] sha1
463,738 UART: [kat] SHA2-256
466,460 UART: [kat] SHA2-384
471,952 UART: [kat] SHA2-512-ACC
474,327 UART: [kat] ECC-384
2,768,874 UART: [kat] HMAC-384Kdf
2,781,852 UART: [kat] LMS
3,972,121 UART: [kat] --
3,975,576 UART: [cold-reset] ++
3,977,028 UART: [fht] Storing FHT @ 0x50003400
3,988,021 UART: [idev] ++
3,988,589 UART: [idev] CDI.KEYID = 6
3,989,559 UART: [idev] SUBJECT.KEYID = 7
3,990,807 UART: [idev] UDS.KEYID = 0
3,991,777 ready_for_fw is high
3,991,980 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,153 UART: [idev] Erasing UDS.KEYID = 0
7,327,056 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,523 UART: [idev] --
7,353,298 UART: [ldev] ++
7,353,924 UART: [ldev] CDI.KEYID = 6
7,354,851 UART: [ldev] SUBJECT.KEYID = 5
7,356,061 UART: [ldev] AUTHORITY.KEYID = 7
7,357,348 UART: [ldev] FE.KEYID = 1
7,402,839 UART: [ldev] Erasing FE.KEYID = 1
10,735,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,040 UART: [ldev] --
13,097,416 UART: [fwproc] Waiting for Commands...
13,099,462 UART: [fwproc] Received command 0x46574c44
13,101,700 UART: [fwproc] Received Image of size 113760 bytes
17,152,061 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,965 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,617,524 >>> mbox cmd response: success
17,618,057 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,621,923 UART: [afmc] ++
17,622,515 UART: [afmc] CDI.KEYID = 6
17,623,398 UART: [afmc] SUBJECT.KEYID = 7
17,624,675 UART: [afmc] AUTHORITY.KEYID = 5
20,990,917 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,014 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,396 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,234 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,676 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,804 UART: [afmc] --
23,359,241 UART: [cold-reset] --
23,364,447 UART: [state] Locking Datavault
23,369,472 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,184 UART: [state] Locking ICCM
23,373,849 UART: [exit] Launching FMC @ 0x40000130
23,382,235 UART:
23,382,469 UART: Running Caliptra FMC ...
23,383,494 UART:
23,383,640 UART: [state] CFI Enabled
23,449,274 UART: [fht] FMC Alias Private Key: 7
25,787,622 UART: [art] Extend RT PCRs Done
25,789,356 UART: [art] Lock RT PCRs Done
25,790,878 UART: [art] Populate DV Done
25,796,525 UART: [fht] FMC Alias Private Key: 7
25,798,280 UART: [art] Derive CDI
25,799,096 UART: [art] Store in in slot 0x4
25,859,248 UART: [art] Derive Key Pair
25,860,290 UART: [art] Store priv key in slot 0x5
29,153,663 UART: [art] Derive Key Pair - Done
29,166,878 UART: [art] Signing Cert with AUTHO
29,168,177 UART: RITY.KEYID = 7
31,454,579 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,095 UART: [art] PUB.X = 4A1BBBF8386D6A7CB68137001ADFC3C4611FFCEAC04851CEC437939423762364C718C8BD40339E2240D842FC6151F0E2
31,463,347 UART: [art] PUB.Y = D87F2DB745D2A795102616FA2C5564A816A7787BB9A65C84C7D67776EF341588C5764B7D0FBCB6A23166BA3CBC92F232
31,470,578 UART: [art] SIG.R = AEBF6DB989385458073D82EA3362B09D989FEE4FD322CDBD89B282084E27F1F705D6B5C17D857B0793AD514611E66856
31,477,971 UART: [art] SIG.S = 36E83A318DC41D65EB70B7BEE5ECAC18A3CD38A6FFA1174992E40D5E60603B75DF0B17F2C4FE5AB90D588E49C73E9D25
32,783,529 UART: Caliptra RT
32,784,231 UART: [state] CFI Enabled
32,965,298 UART: [rt] RT listening for mailbox commands...
32,997,216 UART: [rt]cmd =0x50435245, len=56
32,998,924 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,784,195 ready_for_fw is high
3,784,576 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,880,680 >>> mbox cmd response: success
17,881,502 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,570,612 UART:
23,571,012 UART: Running Caliptra FMC ...
23,572,223 UART:
23,572,400 UART: [state] CFI Enabled
23,640,895 UART: [fht] FMC Alias Private Key: 7
25,978,690 UART: [art] Extend RT PCRs Done
25,980,052 UART: [art] Lock RT PCRs Done
25,981,666 UART: [art] Populate DV Done
25,986,980 UART: [fht] FMC Alias Private Key: 7
25,988,474 UART: [art] Derive CDI
25,989,213 UART: [art] Store in in slot 0x4
26,049,514 UART: [art] Derive Key Pair
26,050,520 UART: [art] Store priv key in slot 0x5
29,343,225 UART: [art] Derive Key Pair - Done
29,355,817 UART: [art] Signing Cert with AUTHO
29,357,122 UART: RITY.KEYID = 7
31,645,573 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,086 UART: [art] PUB.X = 53888FB501F9F997141D31459A10132204C4EFF72B8EE59168CDE256CC0566741070ABE10CC802141AAB844D7A5B2161
31,654,302 UART: [art] PUB.Y = 954335C49B312975DF8134A80D758DF5CC8B37E4B06265FF07310EB967E314FEC0BAEF9F19745665637645B7CE4D2893
31,661,519 UART: [art] SIG.R = 0D693C9B252F708336BAD5AD9B91DB762FD7A60EBC5E4721EA35CBAB33812E4E255B0F599980E0E1F539DC3B05A4C10A
31,668,929 UART: [art] SIG.S = 19E60A754B267CFE2E2FA3A3E9E8E26193D509D04F467E7A47849666EFF5EDCF6446F96D93CF51C576D1EDD540C36617
32,973,764 UART: Caliptra RT
32,974,465 UART: [state] CFI Enabled
33,137,290 UART: [rt] RT listening for mailbox commands...
33,169,047 UART: [rt]cmd =0x50435245, len=56
33,170,915 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
192,807 UART:
193,173 UART: Running Caliptra ROM ...
194,365 UART:
604,012 UART: [state] CFI Enabled
616,789 UART: [state] LifecycleState = Unprovisioned
618,758 UART: [state] DebugLocked = No
620,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,031 UART: [kat] SHA2-256
795,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,357 UART: [kat] ++
806,886 UART: [kat] sha1
818,161 UART: [kat] SHA2-256
820,882 UART: [kat] SHA2-384
826,795 UART: [kat] SHA2-512-ACC
829,156 UART: [kat] ECC-384
3,113,542 UART: [kat] HMAC-384Kdf
3,125,575 UART: [kat] LMS
4,315,705 UART: [kat] --
4,318,007 UART: [cold-reset] ++
4,319,091 UART: [fht] Storing FHT @ 0x50003400
4,329,502 UART: [idev] ++
4,330,059 UART: [idev] CDI.KEYID = 6
4,331,033 UART: [idev] SUBJECT.KEYID = 7
4,332,278 UART: [idev] UDS.KEYID = 0
4,333,267 ready_for_fw is high
4,333,460 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,342 UART: [idev] Erasing UDS.KEYID = 0
7,623,956 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,963 UART: [idev] --
7,651,508 UART: [ldev] ++
7,652,093 UART: [ldev] CDI.KEYID = 6
7,653,061 UART: [ldev] SUBJECT.KEYID = 5
7,654,278 UART: [ldev] AUTHORITY.KEYID = 7
7,655,508 UART: [ldev] FE.KEYID = 1
7,667,175 UART: [ldev] Erasing FE.KEYID = 1
10,952,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,199 UART: [ldev] --
13,314,322 UART: [fwproc] Waiting for Commands...
13,317,494 UART: [fwproc] Received command 0x46574c44
13,319,668 UART: [fwproc] Received Image of size 113760 bytes
17,364,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,629 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,232 >>> mbox cmd response: success
17,830,810 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,833,880 UART: [afmc] ++
17,834,475 UART: [afmc] CDI.KEYID = 6
17,835,360 UART: [afmc] SUBJECT.KEYID = 7
17,836,546 UART: [afmc] AUTHORITY.KEYID = 5
21,154,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,475 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,789 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,128 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,999 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,468 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,270 UART: [afmc] --
23,519,566 UART: [cold-reset] --
23,522,018 UART: [state] Locking Datavault
23,527,856 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,617 UART: [state] Locking ICCM
23,531,655 UART: [exit] Launching FMC @ 0x40000130
23,540,047 UART:
23,540,282 UART: Running Caliptra FMC ...
23,541,377 UART:
23,541,532 UART: [state] CFI Enabled
23,549,841 UART: [fht] FMC Alias Private Key: 7
25,881,253 UART: [art] Extend RT PCRs Done
25,882,479 UART: [art] Lock RT PCRs Done
25,883,833 UART: [art] Populate DV Done
25,889,102 UART: [fht] FMC Alias Private Key: 7
25,890,591 UART: [art] Derive CDI
25,891,359 UART: [art] Store in in slot 0x4
25,934,599 UART: [art] Derive Key Pair
25,935,600 UART: [art] Store priv key in slot 0x5
29,178,019 UART: [art] Derive Key Pair - Done
29,190,908 UART: [art] Signing Cert with AUTHO
29,192,221 UART: RITY.KEYID = 7
31,471,610 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,118 UART: [art] PUB.X = E6BC2D347F40E0189D81FB7D5AC6EC505F88BE1FD9B6688F8C00B5E203AF9A344BCFC7118CD212B4F64146D1EA835834
31,480,379 UART: [art] PUB.Y = 42C0285836B630631048A005DFBBA091403AE6B5F458051DA246FBEA72DAAE295A3574CC189D2BB49804EB5745664A57
31,487,677 UART: [art] SIG.R = A26E82341AA570CE242FACD6449F5C1700FD696E36323BE45910C0BD436871BAAF2DDDCD113C741546649F30D525BE30
31,495,059 UART: [art] SIG.S = D5EF56FE06B967575D4BBE39A68CA030739B97405CB7B8E4337D7D076D256CE631996FBFF17101A510AC0AB5D3021265
32,799,829 UART: Caliptra RT
32,800,542 UART: [state] CFI Enabled
32,917,818 UART: [rt] RT listening for mailbox commands...
32,949,488 UART: [rt]cmd =0x50435245, len=56
32,951,541 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
4,129,706 ready_for_fw is high
4,130,291 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,061,956 >>> mbox cmd response: success
18,062,647 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,705,597 UART:
23,706,012 UART: Running Caliptra FMC ...
23,707,146 UART:
23,707,304 UART: [state] CFI Enabled
23,715,252 UART: [fht] FMC Alias Private Key: 7
26,045,453 UART: [art] Extend RT PCRs Done
26,046,683 UART: [art] Lock RT PCRs Done
26,048,458 UART: [art] Populate DV Done
26,053,539 UART: [fht] FMC Alias Private Key: 7
26,055,195 UART: [art] Derive CDI
26,055,934 UART: [art] Store in in slot 0x4
26,098,586 UART: [art] Derive Key Pair
26,099,587 UART: [art] Store priv key in slot 0x5
29,341,977 UART: [art] Derive Key Pair - Done
29,354,868 UART: [art] Signing Cert with AUTHO
29,356,171 UART: RITY.KEYID = 7
31,635,742 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,256 UART: [art] PUB.X = 55002B3A37E24083890D47E196473107373AEF7EF708ABD1D9B2874849C13AA3C5B04969EE4B45C8416F18EF7A8E9EB6
31,644,498 UART: [art] PUB.Y = D8F823C9C2F082C7A357FD68C6BDBF918AE8B07090FCA376445EDAB4DDCA7633CE2A7262CCEE6736E9A385F8EC50E4F1
31,651,760 UART: [art] SIG.R = 8A1DBB7D89B88EC9BC58DABA4F44CA30875DD8FD4B1B5ED6B7722D3A175E51D753222134E0039A50F978F1C48C0088A0
31,659,154 UART: [art] SIG.S = CF895C6594C18E0C089958CDF8CBF6C10929F0ADFFFEA6AF03F8EACC06DABA5C58BEDCB992437F10FC1AFEBA4D4883B3
32,964,046 UART: Caliptra RT
32,964,746 UART: [state] CFI Enabled
33,082,401 UART: [rt] RT listening for mailbox commands...
33,114,177 UART: [rt]cmd =0x50435245, len=56
33,115,905 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
192,697 UART:
193,079 UART: Running Caliptra ROM ...
194,286 UART:
194,438 UART: [state] CFI Enabled
263,729 UART: [state] LifecycleState = Unprovisioned
265,663 UART: [state] DebugLocked = No
268,265 UART: [state] WD Timer not started. Device not locked for debugging
271,166 UART: [kat] SHA2-256
450,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,841 UART: [kat] ++
462,304 UART: [kat] sha1
473,776 UART: [kat] SHA2-256
476,819 UART: [kat] SHA2-384
483,658 UART: [kat] SHA2-512-ACC
486,588 UART: [kat] ECC-384
2,949,781 UART: [kat] HMAC-384Kdf
2,971,764 UART: [kat] LMS
3,501,177 UART: [kat] --
3,505,114 UART: [cold-reset] ++
3,507,395 UART: [fht] FHT @ 0x50003400
3,518,180 UART: [idev] ++
3,518,788 UART: [idev] CDI.KEYID = 6
3,519,675 UART: [idev] SUBJECT.KEYID = 7
3,520,876 UART: [idev] UDS.KEYID = 0
3,521,765 ready_for_fw is high
3,521,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,355 UART: [idev] Erasing UDS.KEYID = 0
6,028,867 UART: [idev] Sha1 KeyId Algorithm
6,050,861 UART: [idev] --
6,055,235 UART: [ldev] ++
6,055,814 UART: [ldev] CDI.KEYID = 6
6,056,725 UART: [ldev] SUBJECT.KEYID = 5
6,057,885 UART: [ldev] AUTHORITY.KEYID = 7
6,059,166 UART: [ldev] FE.KEYID = 1
6,101,951 UART: [ldev] Erasing FE.KEYID = 1
8,608,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,697 UART: [ldev] --
10,416,988 UART: [fwproc] Wait for Commands...
10,419,752 UART: [fwproc] Recv command 0x46574c44
10,421,844 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,369 >>> mbox cmd response: success
14,282,934 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,285,875 UART: [afmc] ++
14,286,458 UART: [afmc] CDI.KEYID = 6
14,287,363 UART: [afmc] SUBJECT.KEYID = 7
14,288,576 UART: [afmc] AUTHORITY.KEYID = 5
16,829,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,524 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,627 UART: [afmc] --
18,631,922 UART: [cold-reset] --
18,636,681 UART: [state] Locking Datavault
18,640,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,081 UART: [state] Locking ICCM
18,643,344 UART: [exit] Launching FMC @ 0x40000130
18,651,736 UART:
18,651,963 UART: Running Caliptra FMC ...
18,652,989 UART:
18,653,137 UART: [state] CFI Enabled
18,713,629 UART: [fht] FMC Alias Private Key: 7
20,477,889 UART: [art] Extend RT PCRs Done
20,479,104 UART: [art] Lock RT PCRs Done
20,480,593 UART: [art] Populate DV Done
20,486,108 UART: [fht] FMC Alias Private Key: 7
20,487,657 UART: [art] Derive CDI
20,488,393 UART: [art] Store in in slot 0x4
20,546,632 UART: [art] Derive Key Pair
20,547,626 UART: [art] Store priv key in slot 0x5
23,010,405 UART: [art] Derive Key Pair - Done
23,023,455 UART: [art] Signing Cert with AUTHO
23,024,760 UART: RITY.KEYID = 7
24,736,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,320 UART: [art] PUB.X = 2263C52E5E33935F7E308B109884A45B8C7ADE258000F502CB0F0294F9C976B97B5B4BAEC84C6904EB38666AB88188A2
24,745,546 UART: [art] PUB.Y = 89228DC38147CA6A8C5880ADB701C08F714EC1D5D84624D16BEE5835BA4F05070C93D4D9E34CDBDE7CE9C255DE1DBBCA
24,752,861 UART: [art] SIG.R = 7883A34E665367B2B0C24B153650CEB8ABC2CF9C1A9A2C1973328DB36FAF571C1893B1EB4326D02ADF018B6426E53639
24,760,201 UART: [art] SIG.S = 7A744277FC5D5BCE70087DA76D7B1289DDCE2BFB24399FA22B3AD7AB0EF3F15AE3C5646D609CDEA6A0BF650E1C66BB27
25,739,534 UART: Caliptra RT
25,740,228 UART: [state] CFI Enabled
25,904,877 UART: [rt] RT listening for mailbox commands...
25,936,774 UART: [rt]cmd =0x50435245, len=56
25,938,847 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,517 writing to cptra_bootfsm_go
3,357,537 ready_for_fw is high
3,357,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,044,048 >>> mbox cmd response: success
14,044,824 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,339,944 UART:
18,340,340 UART: Running Caliptra FMC ...
18,341,439 UART:
18,341,591 UART: [state] CFI Enabled
18,409,011 UART: [fht] FMC Alias Private Key: 7
20,173,510 UART: [art] Extend RT PCRs Done
20,174,748 UART: [art] Lock RT PCRs Done
20,176,688 UART: [art] Populate DV Done
20,182,093 UART: [fht] FMC Alias Private Key: 7
20,183,683 UART: [art] Derive CDI
20,184,418 UART: [art] Store in in slot 0x4
20,242,296 UART: [art] Derive Key Pair
20,243,333 UART: [art] Store priv key in slot 0x5
22,706,217 UART: [art] Derive Key Pair - Done
22,719,432 UART: [art] Signing Cert with AUTHO
22,720,729 UART: RITY.KEYID = 7
24,432,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,677 UART: [art] PUB.X = 7576DBC02FA7AE5F1F497D9978880DE9102FC6E77ECB858443DFB2217ADEBABEF30D4854DB75287282AABA4FB8CF1076
24,440,965 UART: [art] PUB.Y = 4193B718E51EFACA8D1B7793A011788238EFB551C43C03B0C35CB9217DEB9525C56FF256CAAF7F4881F80B92D84C190A
24,448,234 UART: [art] SIG.R = 4DBA096B31F4CE6D5BBC1AC56E5CC3CB0B43721D8CB7C2369AE318320F767EC4975B5A8770C24FDB2601C01E88C6FA91
24,455,649 UART: [art] SIG.S = EB9D158077FD0EFFE29B0C13E4F7CDCC41EE9AE69C2324D422EF18479994FAA4453062226331A836F4B94F5B19FD6791
25,434,567 UART: Caliptra RT
25,435,287 UART: [state] CFI Enabled
25,601,759 UART: [rt] RT listening for mailbox commands...
25,633,655 UART: [rt]cmd =0x50435245, len=56
25,635,407 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
193,121 UART:
193,490 UART: Running Caliptra ROM ...
194,689 UART:
604,135 UART: [state] CFI Enabled
619,503 UART: [state] LifecycleState = Unprovisioned
621,380 UART: [state] DebugLocked = No
622,687 UART: [state] WD Timer not started. Device not locked for debugging
626,077 UART: [kat] SHA2-256
805,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,797 UART: [kat] ++
817,249 UART: [kat] sha1
829,471 UART: [kat] SHA2-256
832,479 UART: [kat] SHA2-384
838,683 UART: [kat] SHA2-512-ACC
841,620 UART: [kat] ECC-384
3,285,392 UART: [kat] HMAC-384Kdf
3,297,634 UART: [kat] LMS
3,827,100 UART: [kat] --
3,831,248 UART: [cold-reset] ++
3,832,499 UART: [fht] FHT @ 0x50003400
3,842,843 UART: [idev] ++
3,843,411 UART: [idev] CDI.KEYID = 6
3,844,344 UART: [idev] SUBJECT.KEYID = 7
3,845,517 UART: [idev] UDS.KEYID = 0
3,846,444 ready_for_fw is high
3,846,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,967 UART: [idev] Erasing UDS.KEYID = 0
6,316,711 UART: [idev] Sha1 KeyId Algorithm
6,338,450 UART: [idev] --
6,342,182 UART: [ldev] ++
6,342,758 UART: [ldev] CDI.KEYID = 6
6,343,670 UART: [ldev] SUBJECT.KEYID = 5
6,344,793 UART: [ldev] AUTHORITY.KEYID = 7
6,346,078 UART: [ldev] FE.KEYID = 1
6,355,160 UART: [ldev] Erasing FE.KEYID = 1
8,826,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,255 UART: [ldev] --
10,616,930 UART: [fwproc] Wait for Commands...
10,618,748 UART: [fwproc] Recv command 0x46574c44
10,620,840 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,478,068 >>> mbox cmd response: success
14,478,653 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,482,101 UART: [afmc] ++
14,482,682 UART: [afmc] CDI.KEYID = 6
14,483,564 UART: [afmc] SUBJECT.KEYID = 7
14,484,777 UART: [afmc] AUTHORITY.KEYID = 5
16,985,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,950 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,291 UART: [afmc] --
18,781,240 UART: [cold-reset] --
18,784,833 UART: [state] Locking Datavault
18,791,103 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,793 UART: [state] Locking ICCM
18,795,211 UART: [exit] Launching FMC @ 0x40000130
18,803,668 UART:
18,803,910 UART: Running Caliptra FMC ...
18,804,934 UART:
18,805,079 UART: [state] CFI Enabled
18,813,347 UART: [fht] FMC Alias Private Key: 7
20,570,760 UART: [art] Extend RT PCRs Done
20,571,980 UART: [art] Lock RT PCRs Done
20,573,634 UART: [art] Populate DV Done
20,579,212 UART: [fht] FMC Alias Private Key: 7
20,580,698 UART: [art] Derive CDI
20,581,438 UART: [art] Store in in slot 0x4
20,623,543 UART: [art] Derive Key Pair
20,624,542 UART: [art] Store priv key in slot 0x5
23,050,973 UART: [art] Derive Key Pair - Done
23,064,410 UART: [art] Signing Cert with AUTHO
23,065,741 UART: RITY.KEYID = 7
24,771,234 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,739 UART: [art] PUB.X = 6C4C7E48E16AE7BCE2220CDD287BFDECFB99E215733BB0CB22B03FDBE16194A261CFE8189F179D0AB00192C77E500167
24,780,007 UART: [art] PUB.Y = 006844E422102BF94B4F460A831B46E6747346B18E3C29F0EA5AF9C4C1D83A1E4FF28CC3CF267E3E2AFFCB8AF3299A9A
24,787,261 UART: [art] SIG.R = 5B2F219C35239CB9D4570650F95F6FA448D9C92768E98B4741438EA4819426C2A0D60BD9F7D88CA75F49E3FB8EC74C23
24,794,678 UART: [art] SIG.S = 1884D925FA117EABDEBB87890AC86FE810BDCC6A1E7F8F5227A28D66646DD44133036E4BAD833F785E1CA18E1F2D18D0
25,774,005 UART: Caliptra RT
25,774,718 UART: [state] CFI Enabled
25,891,684 UART: [rt] RT listening for mailbox commands...
25,923,354 UART: [rt]cmd =0x50435245, len=56
25,925,464 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
3,690,577 ready_for_fw is high
3,691,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,598 >>> mbox cmd response: success
14,255,295 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,504,772 UART:
18,505,169 UART: Running Caliptra FMC ...
18,506,266 UART:
18,506,423 UART: [state] CFI Enabled
18,514,747 UART: [fht] FMC Alias Private Key: 7
20,271,805 UART: [art] Extend RT PCRs Done
20,273,045 UART: [art] Lock RT PCRs Done
20,275,024 UART: [art] Populate DV Done
20,280,548 UART: [fht] FMC Alias Private Key: 7
20,282,046 UART: [art] Derive CDI
20,282,789 UART: [art] Store in in slot 0x4
20,325,326 UART: [art] Derive Key Pair
20,326,321 UART: [art] Store priv key in slot 0x5
22,752,446 UART: [art] Derive Key Pair - Done
22,765,793 UART: [art] Signing Cert with AUTHO
22,767,102 UART: RITY.KEYID = 7
24,473,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,571 UART: [art] PUB.X = 41583A927D0558F7F1E3A1E808986AD0C6ECCFD48672B5AC382BED4F92FF77A54B7F68F0F867337F9B3EF8EFFB28E64C
24,481,794 UART: [art] PUB.Y = 9A8698802511C59D08CB3C78820AE7B60224E6A9FC4B3F969B4ACFCE1ED7F04C08264468E3D7765218E487A2687E900F
24,489,227 UART: [art] SIG.R = 880C35CC6306EEB9EEA0AA0A78AF91B7C081268B227E2685B3CE564C4F205F4167301F4A4704A04D5ECF50890EE6D256
24,496,457 UART: [art] SIG.S = F9E2F10BB60E7491E6327D8D2BD80F56868515A613EEAB5AF7C452AC685EE826E88C5F097E06B1FDF748A716FC433D98
25,475,566 UART: Caliptra RT
25,476,310 UART: [state] CFI Enabled
25,592,535 UART: [rt] RT listening for mailbox commands...
25,624,353 UART: [rt]cmd =0x50435245, len=56
25,626,313 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,583 UART:
192,949 UART: Running Caliptra ROM ...
194,158 UART:
194,311 UART: [state] CFI Enabled
262,530 UART: [state] LifecycleState = Unprovisioned
264,977 UART: [state] DebugLocked = No
267,491 UART: [state] WD Timer not started. Device not locked for debugging
272,534 UART: [kat] SHA2-256
462,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,199 UART: [kat] ++
473,641 UART: [kat] sha1
485,223 UART: [kat] SHA2-256
488,227 UART: [kat] SHA2-384
493,022 UART: [kat] SHA2-512-ACC
495,550 UART: [kat] ECC-384
2,948,836 UART: [kat] HMAC-384Kdf
2,971,955 UART: [kat] LMS
3,503,697 UART: [kat] --
3,507,977 UART: [cold-reset] ++
3,509,262 UART: [fht] FHT @ 0x50003400
3,521,083 UART: [idev] ++
3,521,799 UART: [idev] CDI.KEYID = 6
3,522,826 UART: [idev] SUBJECT.KEYID = 7
3,523,922 UART: [idev] UDS.KEYID = 0
3,524,965 ready_for_fw is high
3,525,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,696 UART: [idev] Erasing UDS.KEYID = 0
6,030,845 UART: [idev] Sha1 KeyId Algorithm
6,054,296 UART: [idev] --
6,060,016 UART: [ldev] ++
6,060,712 UART: [ldev] CDI.KEYID = 6
6,061,603 UART: [ldev] SUBJECT.KEYID = 5
6,062,815 UART: [ldev] AUTHORITY.KEYID = 7
6,064,126 UART: [ldev] FE.KEYID = 1
6,093,960 UART: [ldev] Erasing FE.KEYID = 1
8,600,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,405 UART: [ldev] --
10,406,992 UART: [fwproc] Wait for Commands...
10,408,972 UART: [fwproc] Recv command 0x46574c44
10,411,281 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,426 >>> mbox cmd response: success
14,595,993 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,598,850 UART: [afmc] ++
14,599,613 UART: [afmc] CDI.KEYID = 6
14,600,723 UART: [afmc] SUBJECT.KEYID = 7
14,602,274 UART: [afmc] AUTHORITY.KEYID = 5
17,145,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,889,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,890,885 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,906,103 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,921,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,936,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,960,739 UART: [afmc] --
18,964,270 UART: [cold-reset] --
18,968,803 UART: [state] Locking Datavault
18,975,429 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,586 UART: [state] Locking ICCM
18,980,336 UART: [exit] Launching FMC @ 0x40000130
18,989,018 UART:
18,989,248 UART: Running Caliptra FMC ...
18,990,345 UART:
18,990,501 UART: [state] CFI Enabled
19,046,984 UART: [fht] FMC Alias Private Key: 7
20,811,024 UART: [art] Extend RT PCRs Done
20,812,250 UART: [art] Lock RT PCRs Done
20,814,067 UART: [art] Populate DV Done
20,819,476 UART: [fht] FMC Alias Private Key: 7
20,821,061 UART: [art] Derive CDI
20,821,809 UART: [art] Store in in slot 0x4
20,879,849 UART: [art] Derive Key Pair
20,880,912 UART: [art] Store priv key in slot 0x5
23,343,907 UART: [art] Derive Key Pair - Done
23,357,220 UART: [art] Signing Cert with AUTHO
23,358,524 UART: RITY.KEYID = 7
25,069,784 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,292 UART: [art] PUB.X = 94113C568393B80B0E415B296359839326D960678A90C088E0D4BD34EC9140B0D283CA53650B3CD0695F8F4439860DC0
25,078,535 UART: [art] PUB.Y = D6C9B908D5A7596BEF126988973EEF8DDD6668EA4B48CAB9074B5D027E66C00DDEE68304664AB5BC2DBBC29B2B1C9284
25,085,790 UART: [art] SIG.R = 2636CCEE40B5242ABB3F8B83E0CACEB0B1C346B3E7B53A7AF4E9919D246621C952EDAECAAA3B6C1CFAC6C9AEFCA6AEC4
25,093,267 UART: [art] SIG.S = 3B97A1D7C8E449D9F7BEE72AE4F2534754059F3EA3D880884A3BD48C3C8D148BF8258BFA375FC6E08EA5A5764DAEFE83
26,072,369 UART: Caliptra RT
26,073,060 UART: [state] CFI Enabled
26,237,814 UART: [rt] RT listening for mailbox commands...
26,269,712 UART: [rt]cmd =0x50435245, len=56
26,271,519 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
3,437,968 ready_for_fw is high
3,438,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,718,929 >>> mbox cmd response: success
14,719,649 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,002,046 UART:
19,002,462 UART: Running Caliptra FMC ...
19,003,658 UART:
19,003,849 UART: [state] CFI Enabled
19,072,853 UART: [fht] FMC Alias Private Key: 7
20,836,705 UART: [art] Extend RT PCRs Done
20,837,934 UART: [art] Lock RT PCRs Done
20,839,916 UART: [art] Populate DV Done
20,845,226 UART: [fht] FMC Alias Private Key: 7
20,846,816 UART: [art] Derive CDI
20,847,629 UART: [art] Store in in slot 0x4
20,905,681 UART: [art] Derive Key Pair
20,906,725 UART: [art] Store priv key in slot 0x5
23,369,409 UART: [art] Derive Key Pair - Done
23,382,195 UART: [art] Signing Cert with AUTHO
23,383,499 UART: RITY.KEYID = 7
25,095,957 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,460 UART: [art] PUB.X = 8FF42A003A81F34F612744B6893B242BADAEF4FCD56727F8A1DAB382FA338D75DAFD5701BBD2682D7DCA4237C857248C
25,104,741 UART: [art] PUB.Y = D0BB89B25BBC4827B6188D65E7C8E744AB23A6168F78511ECBA1483C3F369BC39463A7D9B0AC60B2C6B8250279D0ECBA
25,112,012 UART: [art] SIG.R = 6F63533A81AE4E04D1CD03033948671184D79CAD9C531E780FB030E6FF3D2842D68DDABFBDC63C199932463BA374741E
25,119,399 UART: [art] SIG.S = 76183BD8ECA5322E9D222BB9424E0764561B34718B723A9C0C994B00588D13517247842462134BD179A6571E9C7A7D99
26,098,165 UART: Caliptra RT
26,098,883 UART: [state] CFI Enabled
26,263,941 UART: [rt] RT listening for mailbox commands...
26,295,680 UART: [rt]cmd =0x50435245, len=56
26,297,360 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
192,900 UART:
193,281 UART: Running Caliptra ROM ...
194,484 UART:
604,272 UART: [state] CFI Enabled
621,011 UART: [state] LifecycleState = Unprovisioned
623,389 UART: [state] DebugLocked = No
624,634 UART: [state] WD Timer not started. Device not locked for debugging
629,735 UART: [kat] SHA2-256
819,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,366 UART: [kat] ++
830,968 UART: [kat] sha1
843,301 UART: [kat] SHA2-256
846,348 UART: [kat] SHA2-384
851,773 UART: [kat] SHA2-512-ACC
854,355 UART: [kat] ECC-384
3,295,482 UART: [kat] HMAC-384Kdf
3,309,023 UART: [kat] LMS
3,840,842 UART: [kat] --
3,844,972 UART: [cold-reset] ++
3,847,613 UART: [fht] FHT @ 0x50003400
3,860,313 UART: [idev] ++
3,860,957 UART: [idev] CDI.KEYID = 6
3,861,914 UART: [idev] SUBJECT.KEYID = 7
3,863,156 UART: [idev] UDS.KEYID = 0
3,864,053 ready_for_fw is high
3,864,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,007,593 UART: [idev] Erasing UDS.KEYID = 0
6,342,247 UART: [idev] Sha1 KeyId Algorithm
6,365,162 UART: [idev] --
6,370,073 UART: [ldev] ++
6,370,776 UART: [ldev] CDI.KEYID = 6
6,371,660 UART: [ldev] SUBJECT.KEYID = 5
6,372,868 UART: [ldev] AUTHORITY.KEYID = 7
6,374,107 UART: [ldev] FE.KEYID = 1
6,384,022 UART: [ldev] Erasing FE.KEYID = 1
8,865,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,106 UART: [ldev] --
10,655,918 UART: [fwproc] Wait for Commands...
10,658,661 UART: [fwproc] Recv command 0x46574c44
10,660,975 UART: [fwproc] Recv'd Img size: 114084 bytes
14,108,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,845,836 >>> mbox cmd response: success
14,846,429 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,849,155 UART: [afmc] ++
14,849,850 UART: [afmc] CDI.KEYID = 6
14,851,043 UART: [afmc] SUBJECT.KEYID = 7
14,852,516 UART: [afmc] AUTHORITY.KEYID = 5
17,353,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,098 UART: [afmc] --
19,147,375 UART: [cold-reset] --
19,151,732 UART: [state] Locking Datavault
19,158,290 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,476 UART: [state] Locking ICCM
19,162,434 UART: [exit] Launching FMC @ 0x40000130
19,171,074 UART:
19,171,314 UART: Running Caliptra FMC ...
19,172,415 UART:
19,172,601 UART: [state] CFI Enabled
19,181,053 UART: [fht] FMC Alias Private Key: 7
20,938,012 UART: [art] Extend RT PCRs Done
20,939,233 UART: [art] Lock RT PCRs Done
20,940,977 UART: [art] Populate DV Done
20,946,285 UART: [fht] FMC Alias Private Key: 7
20,947,884 UART: [art] Derive CDI
20,948,705 UART: [art] Store in in slot 0x4
20,991,145 UART: [art] Derive Key Pair
20,992,148 UART: [art] Store priv key in slot 0x5
23,418,630 UART: [art] Derive Key Pair - Done
23,431,518 UART: [art] Signing Cert with AUTHO
23,432,816 UART: RITY.KEYID = 7
25,138,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,946 UART: [art] PUB.X = 7DEAEFF0390B89FDDFFAFD8B543518D7879FC7D81A513780197625829E54A2E4B2E9CA9A137B264490E2C8990D32F1BE
25,147,211 UART: [art] PUB.Y = 9FD3C5E1D6812B9A235DC08353B6FDB240BDC11332392FF2D7F417E9E4560F5E6530A3378C521E30236C14E6B4C5041D
25,154,489 UART: [art] SIG.R = FD061E8EFD34C062BB07C183A0DC0AFFD0CD48C411838BC47E9F5BF9EB9937080D6B3F15EB13A9A71EDD6CCE91E41E74
25,161,963 UART: [art] SIG.S = 6FC4E75D6A8087E652A5DEA8FAC04EBE27EF84C719BB45EB237869B33F10A55DDE0F63C3E98ADA2CEAD2807F44FBF6FF
26,141,242 UART: Caliptra RT
26,141,943 UART: [state] CFI Enabled
26,259,552 UART: [rt] RT listening for mailbox commands...
26,291,341 UART: [rt]cmd =0x50435245, len=56
26,293,238 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,720 writing to cptra_bootfsm_go
3,755,947 ready_for_fw is high
3,756,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,010 >>> mbox cmd response: success
14,951,626 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,199,680 UART:
19,200,077 UART: Running Caliptra FMC ...
19,201,231 UART:
19,201,388 UART: [state] CFI Enabled
19,209,017 UART: [fht] FMC Alias Private Key: 7
20,965,444 UART: [art] Extend RT PCRs Done
20,966,666 UART: [art] Lock RT PCRs Done
20,968,401 UART: [art] Populate DV Done
20,973,981 UART: [fht] FMC Alias Private Key: 7
20,975,529 UART: [art] Derive CDI
20,976,346 UART: [art] Store in in slot 0x4
21,018,748 UART: [art] Derive Key Pair
21,019,755 UART: [art] Store priv key in slot 0x5
23,446,581 UART: [art] Derive Key Pair - Done
23,459,959 UART: [art] Signing Cert with AUTHO
23,461,272 UART: RITY.KEYID = 7
25,166,818 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,314 UART: [art] PUB.X = 5D84F85733117D20330E2C6D5FF8564827ED4CBC022038F28C77EECDD4013547173059E2C6E7F27B55A7CA2ED98111C2
25,175,613 UART: [art] PUB.Y = 83F131F6C69901540EA48B3B7A379197599A4188FD8352AE42C78C0CCB638686B613A5130170F4D347FB1A5AAAFAF01F
25,182,839 UART: [art] SIG.R = 54C809FF5D30D3318562F95F064B32FE44B3D8FFA9262C5E9E455BB275389334017DFA6B0A12CFD129EF0CFA147F03A9
25,190,228 UART: [art] SIG.S = 8B0FAB12D85DD9D4BF54706E9FB62A7BFEE4BFC75E7D035F07B6E245597F3AD06AA75486AFC80A9BBC4EA4300F113145
26,168,935 UART: Caliptra RT
26,169,652 UART: [state] CFI Enabled
26,286,717 UART: [rt] RT listening for mailbox commands...
26,318,395 UART: [rt]cmd =0x50435245, len=56
26,320,128 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,637 UART: [kat] SHA2-256
881,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,683 UART: [kat] ++
885,835 UART: [kat] sha1
890,083 UART: [kat] SHA2-256
892,021 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,368 UART: [kat] HMAC-384Kdf
907,090 UART: [kat] LMS
1,475,286 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,899 UART: [fht] Storing FHT @ 0x50003400
1,479,694 UART: [idev] ++
1,479,862 UART: [idev] CDI.KEYID = 6
1,480,222 UART: [idev] SUBJECT.KEYID = 7
1,480,646 UART: [idev] UDS.KEYID = 0
1,480,991 ready_for_fw is high
1,480,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,820 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,610 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,521,541 UART: [ldev] Erasing FE.KEYID = 1
1,547,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,988 UART: [ldev] --
1,586,489 UART: [fwproc] Waiting for Commands...
1,587,136 UART: [fwproc] Received command 0x46574c44
1,587,927 UART: [fwproc] Received Image of size 114084 bytes
2,882,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,482 >>> mbox cmd response: success
3,075,482 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,076,624 UART: [afmc] ++
3,076,792 UART: [afmc] CDI.KEYID = 6
3,077,154 UART: [afmc] SUBJECT.KEYID = 7
3,077,579 UART: [afmc] AUTHORITY.KEYID = 5
3,112,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,171 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,861 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,758 UART: [afmc] --
3,155,818 UART: [cold-reset] --
3,156,620 UART: [state] Locking Datavault
3,157,837 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,441 UART: [state] Locking ICCM
3,158,991 UART: [exit] Launching FMC @ 0x40000130
3,164,320 UART:
3,164,336 UART: Running Caliptra FMC ...
3,164,744 UART:
3,164,798 UART: [state] CFI Enabled
3,175,199 UART: [fht] FMC Alias Private Key: 7
3,283,724 UART: [art] Extend RT PCRs Done
3,284,152 UART: [art] Lock RT PCRs Done
3,285,616 UART: [art] Populate DV Done
3,293,737 UART: [fht] FMC Alias Private Key: 7
3,294,847 UART: [art] Derive CDI
3,295,127 UART: [art] Store in in slot 0x4
3,381,028 UART: [art] Derive Key Pair
3,381,388 UART: [art] Store priv key in slot 0x5
3,394,528 UART: [art] Derive Key Pair - Done
3,409,610 UART: [art] Signing Cert with AUTHO
3,410,090 UART: RITY.KEYID = 7
3,424,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,621 UART: [art] PUB.X = DAA4D97A780F6DA094FD3482E20FE5341A40686B780449EB715A8A39C9B36EE6E46514228D45C08336B9737BD814FBF1
3,432,384 UART: [art] PUB.Y = E7FD03FB9A320E96810864A07E4813EA578ECF14CDDADC95D678448867A57245F09C1975D0A85E6232B7FBE96669B7A2
3,439,329 UART: [art] SIG.R = ABBD92FB0DC95A8B3455B20F0257F66A5150CAE0D0F67968AA9C7FC20AC708D29F30EA15166D8059FF80BC9D1A4EAC48
3,446,102 UART: [art] SIG.S = 72FD47DCC37AA4F1E65E347CD6F025823873DA0642494DC93032BF283905FAEAB729FAE1A4B6567ADD5563A51007AB92
3,470,190 UART: Caliptra RT
3,470,443 UART: [state] CFI Enabled
3,578,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,208 UART: [rt]cmd =0x50435245, len=56
3,610,573 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,243 ready_for_fw is high
1,362,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,580 >>> mbox cmd response: success
2,924,580 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,986,502 UART:
2,986,518 UART: Running Caliptra FMC ...
2,986,926 UART:
2,986,980 UART: [state] CFI Enabled
2,997,311 UART: [fht] FMC Alias Private Key: 7
3,106,274 UART: [art] Extend RT PCRs Done
3,106,702 UART: [art] Lock RT PCRs Done
3,108,228 UART: [art] Populate DV Done
3,116,593 UART: [fht] FMC Alias Private Key: 7
3,117,633 UART: [art] Derive CDI
3,117,913 UART: [art] Store in in slot 0x4
3,203,268 UART: [art] Derive Key Pair
3,203,628 UART: [art] Store priv key in slot 0x5
3,216,816 UART: [art] Derive Key Pair - Done
3,231,534 UART: [art] Signing Cert with AUTHO
3,232,014 UART: RITY.KEYID = 7
3,247,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,013 UART: [art] PUB.X = 7D3F07C7AB4372F7654B4A95A2FA7EE8FF0463B70D662CCCE26E00893C268CA0FD420890E836AE7582A500467A494245
3,254,729 UART: [art] PUB.Y = 33E28E73BE35F5F90F815F586B5FAABC8DBE498EBD198462D91DFF6C4F76D94A8211C0EC836B815107DADD602405AB6F
3,261,686 UART: [art] SIG.R = 3BBBBBA5D0E0CEE969BDA7DF880B67B1F64663BAC7AD9BAC83B931118AE95EB5565F6E13A5269E70C00F09A1BAF05944
3,268,469 UART: [art] SIG.S = 2E6C92E88E6F4473E07E47EE9076BD8D59F2603E7E7FEC8859F55A79089422E515AA334B71F690039022EB1ECD2C74E1
3,291,780 UART: Caliptra RT
3,292,033 UART: [state] CFI Enabled
3,400,811 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,721 UART: [rt]cmd =0x50435245, len=56
3,432,900 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,968 UART: [kat] SHA2-256
881,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,014 UART: [kat] ++
886,166 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,669 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,651 UART: [idev] ++
1,479,819 UART: [idev] CDI.KEYID = 6
1,480,179 UART: [idev] SUBJECT.KEYID = 7
1,480,603 UART: [idev] UDS.KEYID = 0
1,480,948 ready_for_fw is high
1,480,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,881 UART: [idev] --
1,514,882 UART: [ldev] ++
1,515,050 UART: [ldev] CDI.KEYID = 6
1,515,413 UART: [ldev] SUBJECT.KEYID = 5
1,515,839 UART: [ldev] AUTHORITY.KEYID = 7
1,516,302 UART: [ldev] FE.KEYID = 1
1,521,440 UART: [ldev] Erasing FE.KEYID = 1
1,547,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,183 UART: [ldev] --
1,586,464 UART: [fwproc] Waiting for Commands...
1,587,281 UART: [fwproc] Received command 0x46574c44
1,588,072 UART: [fwproc] Received Image of size 114084 bytes
2,882,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,018 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,939 >>> mbox cmd response: success
3,074,939 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,076,065 UART: [afmc] ++
3,076,233 UART: [afmc] CDI.KEYID = 6
3,076,595 UART: [afmc] SUBJECT.KEYID = 7
3,077,020 UART: [afmc] AUTHORITY.KEYID = 5
3,112,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,736 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,426 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,237 UART: [afmc] --
3,156,205 UART: [cold-reset] --
3,157,213 UART: [state] Locking Datavault
3,158,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,132 UART: [state] Locking ICCM
3,159,758 UART: [exit] Launching FMC @ 0x40000130
3,165,087 UART:
3,165,103 UART: Running Caliptra FMC ...
3,165,511 UART:
3,165,654 UART: [state] CFI Enabled
3,176,173 UART: [fht] FMC Alias Private Key: 7
3,284,492 UART: [art] Extend RT PCRs Done
3,284,920 UART: [art] Lock RT PCRs Done
3,286,452 UART: [art] Populate DV Done
3,294,675 UART: [fht] FMC Alias Private Key: 7
3,295,771 UART: [art] Derive CDI
3,296,051 UART: [art] Store in in slot 0x4
3,381,472 UART: [art] Derive Key Pair
3,381,832 UART: [art] Store priv key in slot 0x5
3,395,212 UART: [art] Derive Key Pair - Done
3,409,847 UART: [art] Signing Cert with AUTHO
3,410,327 UART: RITY.KEYID = 7
3,425,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,190 UART: [art] PUB.X = BE8F192D1A6FBD536CAF0009C5893C85F00C6D7EF134AD34A4C4B91D1E27B40EF93F1C861CBAF663192633F843BF220A
3,432,940 UART: [art] PUB.Y = B6867C54C585F734D41CCB80E08F5FBA8FFBB5768F49BA53A43F6790756C0E0EA5EEF66006169D51402033C914A66FC3
3,439,887 UART: [art] SIG.R = 1E0511F43C696984C8AA9C2244C5C1D8AD1E22213B2D309821DD4423CA17FF8A054ABE999185B7DEF930FC4DBBE0A454
3,446,661 UART: [art] SIG.S = 4B0D0EFB8AB5C05CBC2095508D1AB62F3AC1F2546A5FFF6944EE12086CD157DFEBE1AC718E2758EC7B45EE13A6214834
3,470,923 UART: Caliptra RT
3,471,268 UART: [state] CFI Enabled
3,580,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,534 UART: [rt]cmd =0x50435245, len=56
3,613,023 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,181 >>> mbox cmd response: success
2,925,181 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,986,985 UART:
2,987,001 UART: Running Caliptra FMC ...
2,987,409 UART:
2,987,552 UART: [state] CFI Enabled
2,997,877 UART: [fht] FMC Alias Private Key: 7
3,105,654 UART: [art] Extend RT PCRs Done
3,106,082 UART: [art] Lock RT PCRs Done
3,107,652 UART: [art] Populate DV Done
3,115,851 UART: [fht] FMC Alias Private Key: 7
3,116,871 UART: [art] Derive CDI
3,117,151 UART: [art] Store in in slot 0x4
3,203,218 UART: [art] Derive Key Pair
3,203,578 UART: [art] Store priv key in slot 0x5
3,216,324 UART: [art] Derive Key Pair - Done
3,231,046 UART: [art] Signing Cert with AUTHO
3,231,526 UART: RITY.KEYID = 7
3,247,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,893 UART: [art] PUB.X = 12B8C10091A0E99009C8613FC6A0EE079B4EA4BC11A6BE50FDB2B277BD3F7AA9D57431988960214B1C0CD69EEFDC45F6
3,254,646 UART: [art] PUB.Y = 828C528A180F7482659A647211E9BC5DA6186E68E1CD9B89CCDDDD7A001F535D5A71325324D468C56460D555D512B24E
3,261,569 UART: [art] SIG.R = 173C8FBC904119E6688F1FD0D9EBF0EB13CD61232B2D739110F9021C0C5DAAC996127AA4D45D2A0B0C542F14C253EE87
3,268,337 UART: [art] SIG.S = 2E7ACDD0A9F9E9AC769B5A899CDC42E43CB83C04F68B99EC2281B66E793E998B08113A99A0C78F4230FDA36FF86F44F2
3,291,974 UART: Caliptra RT
3,292,319 UART: [state] CFI Enabled
3,400,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,137 UART: [rt]cmd =0x50435245, len=56
3,432,740 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
892,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,089 UART: [kat] ++
897,241 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,368 UART: [kat] SHA2-512-ACC
908,269 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,558 UART: [kat] LMS
1,170,886 UART: [kat] --
1,171,985 UART: [cold-reset] ++
1,172,551 UART: [fht] FHT @ 0x50003400
1,175,312 UART: [idev] ++
1,175,480 UART: [idev] CDI.KEYID = 6
1,175,840 UART: [idev] SUBJECT.KEYID = 7
1,176,264 UART: [idev] UDS.KEYID = 0
1,176,609 ready_for_fw is high
1,176,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,870 UART: [idev] Erasing UDS.KEYID = 0
1,200,219 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,209,865 UART: [ldev] ++
1,210,033 UART: [ldev] CDI.KEYID = 6
1,210,396 UART: [ldev] SUBJECT.KEYID = 5
1,210,822 UART: [ldev] AUTHORITY.KEYID = 7
1,211,285 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,474 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,043 >>> mbox cmd response: success
2,769,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,770,201 UART: [afmc] ++
2,770,369 UART: [afmc] CDI.KEYID = 6
2,770,731 UART: [afmc] SUBJECT.KEYID = 7
2,771,156 UART: [afmc] AUTHORITY.KEYID = 5
2,806,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,164 UART: [afmc] --
2,849,202 UART: [cold-reset] --
2,850,042 UART: [state] Locking Datavault
2,851,101 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,705 UART: [state] Locking ICCM
2,852,289 UART: [exit] Launching FMC @ 0x40000130
2,857,618 UART:
2,857,634 UART: Running Caliptra FMC ...
2,858,042 UART:
2,858,096 UART: [state] CFI Enabled
2,868,499 UART: [fht] FMC Alias Private Key: 7
2,976,106 UART: [art] Extend RT PCRs Done
2,976,534 UART: [art] Lock RT PCRs Done
2,977,894 UART: [art] Populate DV Done
2,986,281 UART: [fht] FMC Alias Private Key: 7
2,987,413 UART: [art] Derive CDI
2,987,693 UART: [art] Store in in slot 0x4
3,073,386 UART: [art] Derive Key Pair
3,073,746 UART: [art] Store priv key in slot 0x5
3,086,538 UART: [art] Derive Key Pair - Done
3,101,083 UART: [art] Signing Cert with AUTHO
3,101,563 UART: RITY.KEYID = 7
3,116,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,456 UART: [art] PUB.X = 59A3CB6CD7F8358E75DA1FFA1FA2CD0EB2AF5418D274585ADC2AA2F07E53554931C68CF9343F3DD58679E131A9CF3C1C
3,124,241 UART: [art] PUB.Y = 9E8F3FEFCFFBD75F7567EC0142F442821FB994295A57E3C89270380296B452FFF9ED18D20F27308820473CD57B40BF66
3,131,184 UART: [art] SIG.R = E47B2E94CAD3D6E8C0F003F579E8DD039CC69AD4FFFA6E679F53682715482D13B281DB51664CD8FDF947784AB04E4CC3
3,137,962 UART: [art] SIG.S = F9C3933958D29B695A2FE95D8A0A23612A8354373BFDD5A609AF07C49E845F32579C7F8E040719162AA9C211469C4838
3,160,932 UART: Caliptra RT
3,161,185 UART: [state] CFI Enabled
3,268,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,475 UART: [rt]cmd =0x50435245, len=56
3,300,886 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,803 ready_for_fw is high
1,059,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,054 >>> mbox cmd response: success
2,622,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,684,126 UART:
2,684,142 UART: Running Caliptra FMC ...
2,684,550 UART:
2,684,604 UART: [state] CFI Enabled
2,695,245 UART: [fht] FMC Alias Private Key: 7
2,803,350 UART: [art] Extend RT PCRs Done
2,803,778 UART: [art] Lock RT PCRs Done
2,805,084 UART: [art] Populate DV Done
2,813,229 UART: [fht] FMC Alias Private Key: 7
2,814,341 UART: [art] Derive CDI
2,814,621 UART: [art] Store in in slot 0x4
2,900,208 UART: [art] Derive Key Pair
2,900,568 UART: [art] Store priv key in slot 0x5
2,913,076 UART: [art] Derive Key Pair - Done
2,927,782 UART: [art] Signing Cert with AUTHO
2,928,262 UART: RITY.KEYID = 7
2,943,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,989 UART: [art] PUB.X = 983CE722D00A07F00D8A502E695D47E911D119963914D9F67F0E983848B3E9F68C5C7C2CD8B0DEB2EA5F066D3AAC6634
2,950,750 UART: [art] PUB.Y = 5F1554B8713DBCC8969B7BABF87DB15D6F242DED0BF3D16EAF69FB6B85604961DFE9C3F8FD9E4EE724CC69E40292ECD9
2,957,718 UART: [art] SIG.R = E7374B28CF8F14A97A3C6B2C5A6F1B74020F439ADAEEB869B43174F12BBDB5270A9CCD3E42A3016C5502FFB5A9AD984D
2,964,491 UART: [art] SIG.S = C79D49CC79A2438FB84993857BD7BCC82DCE216D83D108BE85772CABFF0DFE6598E00440E32F506E779213F307E59401
2,988,509 UART: Caliptra RT
2,988,762 UART: [state] CFI Enabled
3,096,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,028 UART: [rt]cmd =0x50435245, len=56
3,128,395 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
918,305 UART: [kat] HMAC-384Kdf
922,903 UART: [kat] LMS
1,171,231 UART: [kat] --
1,171,940 UART: [cold-reset] ++
1,172,374 UART: [fht] FHT @ 0x50003400
1,175,133 UART: [idev] ++
1,175,301 UART: [idev] CDI.KEYID = 6
1,175,661 UART: [idev] SUBJECT.KEYID = 7
1,176,085 UART: [idev] UDS.KEYID = 0
1,176,430 ready_for_fw is high
1,176,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,259 UART: [idev] Erasing UDS.KEYID = 0
1,201,708 UART: [idev] Sha1 KeyId Algorithm
1,210,020 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,243,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,358 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,401 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,800 >>> mbox cmd response: success
2,771,800 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,772,874 UART: [afmc] ++
2,773,042 UART: [afmc] CDI.KEYID = 6
2,773,404 UART: [afmc] SUBJECT.KEYID = 7
2,773,829 UART: [afmc] AUTHORITY.KEYID = 5
2,809,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,320 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,039 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,911 UART: [afmc] --
2,852,809 UART: [cold-reset] --
2,853,485 UART: [state] Locking Datavault
2,854,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,428 UART: [state] Locking ICCM
2,856,072 UART: [exit] Launching FMC @ 0x40000130
2,861,401 UART:
2,861,417 UART: Running Caliptra FMC ...
2,861,825 UART:
2,861,968 UART: [state] CFI Enabled
2,872,519 UART: [fht] FMC Alias Private Key: 7
2,980,990 UART: [art] Extend RT PCRs Done
2,981,418 UART: [art] Lock RT PCRs Done
2,982,868 UART: [art] Populate DV Done
2,991,139 UART: [fht] FMC Alias Private Key: 7
2,992,119 UART: [art] Derive CDI
2,992,399 UART: [art] Store in in slot 0x4
3,077,880 UART: [art] Derive Key Pair
3,078,240 UART: [art] Store priv key in slot 0x5
3,091,240 UART: [art] Derive Key Pair - Done
3,105,713 UART: [art] Signing Cert with AUTHO
3,106,193 UART: RITY.KEYID = 7
3,121,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,954 UART: [art] PUB.X = 7ACD70890B44A88F3C949D41EE4A4D68DE5A73F4AED59A0306D450552A109921BBFEC35D82F58FB3425D55448ED11C1A
3,128,725 UART: [art] PUB.Y = 4F558B6E7F6C923BD4F40A251A373676996868D048D139E0F27903737BBA575333E71246630878F15983BEE73D3051AC
3,135,654 UART: [art] SIG.R = 6D102BFEB2D0ECFBF153197D24B3681A08CC296A7763C92F5EEEE605A983C064E6A3D79779395329A0A952B61F7AA006
3,142,421 UART: [art] SIG.S = 560B353024C60062E51747C7BADD6A5427B3DFE486E513F832D86AD2BFD5CB35AF904A4CC6DAF199149FF88D1CAFCF22
3,166,589 UART: Caliptra RT
3,166,934 UART: [state] CFI Enabled
3,275,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,627 UART: [rt]cmd =0x50435245, len=56
3,308,072 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,386 ready_for_fw is high
1,061,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,749 >>> mbox cmd response: success
2,624,749 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,573 UART:
2,687,589 UART: Running Caliptra FMC ...
2,687,997 UART:
2,688,140 UART: [state] CFI Enabled
2,698,655 UART: [fht] FMC Alias Private Key: 7
2,806,584 UART: [art] Extend RT PCRs Done
2,807,012 UART: [art] Lock RT PCRs Done
2,808,484 UART: [art] Populate DV Done
2,816,559 UART: [fht] FMC Alias Private Key: 7
2,817,621 UART: [art] Derive CDI
2,817,901 UART: [art] Store in in slot 0x4
2,904,078 UART: [art] Derive Key Pair
2,904,438 UART: [art] Store priv key in slot 0x5
2,917,722 UART: [art] Derive Key Pair - Done
2,932,619 UART: [art] Signing Cert with AUTHO
2,933,099 UART: RITY.KEYID = 7
2,948,393 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,158 UART: [art] PUB.X = 6E122B7D016006C461570CA4078615F81E9FAF9D406C610D8F50D22EDC758E5C5A24A77FDC6600BD6325D692A2977D43
2,955,891 UART: [art] PUB.Y = 955412D4FCC2A5F5179176E5206526CB31C18B4B5E4CE4B7520C4377ACDA2CCB83136610327F6CD8B49E5585D15AA048
2,962,840 UART: [art] SIG.R = ADCA5BA7992C2D3F9A01EB555CB7E4756B0F2D9A34F2AF45711174AE801114EC9D58B8468837DE67DA9379A5059788D4
2,969,607 UART: [art] SIG.S = 04ED8C1936A12C490A8C3C0D20A806056E7BC324A65E2CE5FEEE3B36705BB3735057D1C6E9F879375FE11990F2DAD835
2,993,439 UART: Caliptra RT
2,993,784 UART: [state] CFI Enabled
3,101,521 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,329 UART: [rt]cmd =0x50435245, len=56
3,133,554 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,378 UART: [kat] LMS
1,169,690 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,171,049 UART: [fht] FHT @ 0x50003400
1,173,525 UART: [idev] ++
1,173,693 UART: [idev] CDI.KEYID = 6
1,174,054 UART: [idev] SUBJECT.KEYID = 7
1,174,479 UART: [idev] UDS.KEYID = 0
1,174,825 ready_for_fw is high
1,174,825 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,539 UART: [idev] Erasing UDS.KEYID = 0
1,199,461 UART: [idev] Sha1 KeyId Algorithm
1,208,253 UART: [idev] --
1,209,436 UART: [ldev] ++
1,209,604 UART: [ldev] CDI.KEYID = 6
1,209,968 UART: [ldev] SUBJECT.KEYID = 5
1,210,395 UART: [ldev] AUTHORITY.KEYID = 7
1,210,858 UART: [ldev] FE.KEYID = 1
1,215,888 UART: [ldev] Erasing FE.KEYID = 1
1,242,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,229 UART: [fwproc] Recv command 0x46574c44
1,282,962 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,263 >>> mbox cmd response: success
2,770,263 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,771,402 UART: [afmc] ++
2,771,570 UART: [afmc] CDI.KEYID = 6
2,771,933 UART: [afmc] SUBJECT.KEYID = 7
2,772,359 UART: [afmc] AUTHORITY.KEYID = 5
2,807,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,477 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,808 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,581 UART: [afmc] --
2,850,607 UART: [cold-reset] --
2,851,533 UART: [state] Locking Datavault
2,852,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,286 UART: [state] Locking ICCM
2,853,900 UART: [exit] Launching FMC @ 0x40000130
2,859,229 UART:
2,859,245 UART: Running Caliptra FMC ...
2,859,653 UART:
2,859,707 UART: [state] CFI Enabled
2,870,172 UART: [fht] FMC Alias Private Key: 7
2,977,233 UART: [art] Extend RT PCRs Done
2,977,661 UART: [art] Lock RT PCRs Done
2,979,397 UART: [art] Populate DV Done
2,987,764 UART: [fht] FMC Alias Private Key: 7
2,988,736 UART: [art] Derive CDI
2,989,016 UART: [art] Store in in slot 0x4
3,074,447 UART: [art] Derive Key Pair
3,074,807 UART: [art] Store priv key in slot 0x5
3,088,349 UART: [art] Derive Key Pair - Done
3,103,469 UART: [art] Signing Cert with AUTHO
3,103,949 UART: RITY.KEYID = 7
3,119,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,790 UART: [art] PUB.X = C5E4767567F7F13518174BB466DDA899867863DE120C3D43792B93BCF406A641854DE8F5CB5F4C8FFF8D983F7D58A294
3,126,556 UART: [art] PUB.Y = AB11F230DBE2DB0B27FA8A1FA0BA06B0C69EFA0346741D65238DE82134CF5208016044E9E6F47D51E95BDA36B621D87F
3,133,503 UART: [art] SIG.R = 008CCA46F58B7F6D7188A5CED22FBA451C473386B944772ABEE35290655A521AEB7165A6BBF2CBCA880FB1685040086D
3,140,253 UART: [art] SIG.S = 5ACF3C4242FA8B5FF4FACCA033720EF5F5F9833962428BFD4A67D79A56EF3A041DF66F5EED680EAF753881B6555286CB
3,164,003 UART: Caliptra RT
3,164,256 UART: [state] CFI Enabled
3,271,628 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,486 UART: [rt]cmd =0x50435245, len=56
3,304,029 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,104 ready_for_fw is high
1,055,104 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,283 >>> mbox cmd response: success
2,619,283 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,681,319 UART:
2,681,335 UART: Running Caliptra FMC ...
2,681,743 UART:
2,681,797 UART: [state] CFI Enabled
2,692,358 UART: [fht] FMC Alias Private Key: 7
2,800,639 UART: [art] Extend RT PCRs Done
2,801,067 UART: [art] Lock RT PCRs Done
2,802,789 UART: [art] Populate DV Done
2,810,876 UART: [fht] FMC Alias Private Key: 7
2,811,868 UART: [art] Derive CDI
2,812,148 UART: [art] Store in in slot 0x4
2,897,883 UART: [art] Derive Key Pair
2,898,243 UART: [art] Store priv key in slot 0x5
2,910,605 UART: [art] Derive Key Pair - Done
2,925,549 UART: [art] Signing Cert with AUTHO
2,926,029 UART: RITY.KEYID = 7
2,941,217 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,982 UART: [art] PUB.X = 1D2687B2448DB9EA2993ABBD5089CD43A48301637409219E5A39CAE3258EF761AC472B7B3A7E682926427B0E11DCB528
2,948,743 UART: [art] PUB.Y = 15C4A499DF7C03AFA11918EABC72CE7124D3CB59147BD00C211EA554FA7034044810C83C1A9FD726F1E5DB8A71D70480
2,955,689 UART: [art] SIG.R = 9885974BA94B796553E25BFC12CE76EA881213C045915E08B815A5B3A469DA6840C1D5EE818CB9BCD5D7E1C2B57B2F98
2,962,462 UART: [art] SIG.S = CFB97B8F2B9DED55D4FD8EFAD6F4C603437AD389F4C54B25DA1CAEC2C62C75ED239E807895290BDFF5A99425F8C7DC3A
2,985,957 UART: Caliptra RT
2,986,210 UART: [state] CFI Enabled
3,093,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,468 UART: [rt]cmd =0x50435245, len=56
3,126,073 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,461 UART: [kat] SHA2-512-ACC
906,362 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
921,021 UART: [kat] LMS
1,169,333 UART: [kat] --
1,170,176 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,058 UART: [idev] Sha1 KeyId Algorithm
1,207,932 UART: [idev] --
1,209,051 UART: [ldev] ++
1,209,219 UART: [ldev] CDI.KEYID = 6
1,209,583 UART: [ldev] SUBJECT.KEYID = 5
1,210,010 UART: [ldev] AUTHORITY.KEYID = 7
1,210,473 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,241,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,335 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,456 UART: [fwproc] Recv command 0x46574c44
1,282,189 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,382 >>> mbox cmd response: success
2,768,382 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,769,529 UART: [afmc] ++
2,769,697 UART: [afmc] CDI.KEYID = 6
2,770,060 UART: [afmc] SUBJECT.KEYID = 7
2,770,486 UART: [afmc] AUTHORITY.KEYID = 5
2,805,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,960 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,262 UART: [afmc] --
2,849,242 UART: [cold-reset] --
2,849,880 UART: [state] Locking Datavault
2,850,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,497 UART: [state] Locking ICCM
2,851,959 UART: [exit] Launching FMC @ 0x40000130
2,857,288 UART:
2,857,304 UART: Running Caliptra FMC ...
2,857,712 UART:
2,857,855 UART: [state] CFI Enabled
2,868,358 UART: [fht] FMC Alias Private Key: 7
2,976,027 UART: [art] Extend RT PCRs Done
2,976,455 UART: [art] Lock RT PCRs Done
2,977,793 UART: [art] Populate DV Done
2,985,818 UART: [fht] FMC Alias Private Key: 7
2,986,992 UART: [art] Derive CDI
2,987,272 UART: [art] Store in in slot 0x4
3,073,083 UART: [art] Derive Key Pair
3,073,443 UART: [art] Store priv key in slot 0x5
3,086,929 UART: [art] Derive Key Pair - Done
3,101,778 UART: [art] Signing Cert with AUTHO
3,102,258 UART: RITY.KEYID = 7
3,117,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,011 UART: [art] PUB.X = 94197EAF9A5806C0CB2A90AC29E46D52488BCABCFA36ED7ACF541DB0181ABDB9E52B1932A04EDA3DF6678D698C059D25
3,124,795 UART: [art] PUB.Y = E35178E50C45EDFBD8ACE416D0E8958787A7BDA0E0AACC7A69F208D12FBB6BDB579DEA81D33E29EC4B7429CDD5EF6268
3,131,765 UART: [art] SIG.R = 7D2F2A02D02940E7A79B3093268DA8E27076F604E8469407BA241302096069E85B8F285CE9816F9390AC06ACBBEE1FD8
3,138,515 UART: [art] SIG.S = CA6354DA64A90FD77E29B3C17FA59715BF18A7A33F1B84D24F3C0AA35841F1F10AA2AEC9B57B3B9DB549787717DEE811
3,161,845 UART: Caliptra RT
3,162,190 UART: [state] CFI Enabled
3,269,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,171 UART: [rt]cmd =0x50435245, len=56
3,301,472 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 ready_for_fw is high
1,056,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,220 >>> mbox cmd response: success
2,619,220 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,681,730 UART:
2,681,746 UART: Running Caliptra FMC ...
2,682,154 UART:
2,682,297 UART: [state] CFI Enabled
2,692,500 UART: [fht] FMC Alias Private Key: 7
2,800,713 UART: [art] Extend RT PCRs Done
2,801,141 UART: [art] Lock RT PCRs Done
2,802,739 UART: [art] Populate DV Done
2,810,948 UART: [fht] FMC Alias Private Key: 7
2,812,080 UART: [art] Derive CDI
2,812,360 UART: [art] Store in in slot 0x4
2,898,147 UART: [art] Derive Key Pair
2,898,507 UART: [art] Store priv key in slot 0x5
2,912,011 UART: [art] Derive Key Pair - Done
2,926,721 UART: [art] Signing Cert with AUTHO
2,927,201 UART: RITY.KEYID = 7
2,942,935 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,700 UART: [art] PUB.X = DED3CB1D4F1B0D8753E23D9510D964A5AECCF40C3D39B6A695BD9EBE71E407AA96CC919A6FC5F2211B66BDEFDD2749A5
2,950,487 UART: [art] PUB.Y = 48F4D1A9F18344E1AC8858654BD461D6921D58F9522AC80A5D3349B06491B9D1CFE030AED223B87FA9579D5B3210A06D
2,957,436 UART: [art] SIG.R = B198BDCEB75C216A498FF24C84A3A48C8432CE1A705C5433B986FE5C39C621CB686C9F1FC8D67555FA642E51FEC080EB
2,964,220 UART: [art] SIG.S = 9D51C64AAB92095ED019ADD0D214B31C0739421E5343480200FDA9C590308687ECF2254628F522A4CC8FACFBA2BD1425
2,988,136 UART: Caliptra RT
2,988,481 UART: [state] CFI Enabled
3,096,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,889 UART: [rt]cmd =0x50435245, len=56
3,129,128 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,199 UART:
192,586 UART: Running Caliptra ROM ...
193,776 UART:
193,941 UART: [state] CFI Enabled
262,632 UART: [state] LifecycleState = Unprovisioned
264,609 UART: [state] DebugLocked = No
266,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,720 UART: [kat] SHA2-256
440,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,882 UART: [kat] ++
451,382 UART: [kat] sha1
462,994 UART: [kat] SHA2-256
465,706 UART: [kat] SHA2-384
472,765 UART: [kat] SHA2-512-ACC
475,136 UART: [kat] ECC-384
2,768,722 UART: [kat] HMAC-384Kdf
2,801,514 UART: [kat] LMS
3,991,834 UART: [kat] --
3,995,761 UART: [cold-reset] ++
3,997,837 UART: [fht] Storing FHT @ 0x50003400
4,010,318 UART: [idev] ++
4,010,889 UART: [idev] CDI.KEYID = 6
4,011,923 UART: [idev] SUBJECT.KEYID = 7
4,013,101 UART: [idev] UDS.KEYID = 0
4,014,136 ready_for_fw is high
4,014,334 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,780 UART: [idev] Erasing UDS.KEYID = 0
7,348,697 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,214 UART: [idev] --
7,376,243 UART: [ldev] ++
7,376,818 UART: [ldev] CDI.KEYID = 6
7,377,801 UART: [ldev] SUBJECT.KEYID = 5
7,379,028 UART: [ldev] AUTHORITY.KEYID = 7
7,380,240 UART: [ldev] FE.KEYID = 1
7,424,951 UART: [ldev] Erasing FE.KEYID = 1
10,756,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,593 UART: [ldev] --
13,118,651 UART: [fwproc] Waiting for Commands...
13,121,234 UART: [fwproc] Received command 0x46574c44
13,123,480 UART: [fwproc] Received Image of size 113760 bytes
17,171,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,349 >>> mbox cmd response: success
17,627,908 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,632,052 UART: [afmc] ++
17,632,648 UART: [afmc] CDI.KEYID = 6
17,633,562 UART: [afmc] SUBJECT.KEYID = 7
17,634,770 UART: [afmc] AUTHORITY.KEYID = 5
21,005,068 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,984 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,407 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,216 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,674 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,355 UART: [afmc] --
23,380,384 UART: [cold-reset] --
23,384,189 UART: [state] Locking Datavault
23,390,193 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,890 UART: [state] Locking ICCM
23,393,988 UART: [exit] Launching FMC @ 0x40000130
23,402,345 UART:
23,402,588 UART: Running Caliptra FMC ...
23,403,691 UART:
23,403,857 UART: [state] CFI Enabled
23,467,430 UART: [fht] FMC Alias Private Key: 7
25,805,063 UART: [art] Extend RT PCRs Done
25,806,287 UART: [art] Lock RT PCRs Done
25,808,179 UART: [art] Populate DV Done
25,813,695 UART: [fht] FMC Alias Private Key: 7
25,815,339 UART: [art] Derive CDI
25,816,149 UART: [art] Store in in slot 0x4
25,875,802 UART: [art] Derive Key Pair
25,876,841 UART: [art] Store priv key in slot 0x5
29,169,796 UART: [art] Derive Key Pair - Done
29,183,016 UART: [art] Signing Cert with AUTHO
29,184,356 UART: RITY.KEYID = 7
31,472,341 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,856 UART: [art] PUB.X = 183F506E9FBEE81B381CCE2E6593CFF66717CDD228B9093D4947540A21CECA1B8B375E0850E2765AD9489C13D7264748
31,481,104 UART: [art] PUB.Y = 1ECE0E805A2B9FB13FA8E9B0AE3548EDF62A7DED0D46EFCD474E0F105AAC39E7163D3F52A80F90F0053F5B9A7BCF768C
31,488,385 UART: [art] SIG.R = E6431BFF65E334564C324268756C83E9761AFF0A5335F66ACB5DF2A4034760375D330DD59EBA5FF0DB9916E8D481CDF8
31,495,781 UART: [art] SIG.S = 685E8FE6892FE2AC4DD0251B1D4AC102D33DE2FE699F3F95E2DC782A364D74F627A8EB9E1998A2274C939B544007F730
32,801,465 UART: Caliptra RT
32,802,164 UART: [state] CFI Enabled
32,961,968 UART: [rt] RT listening for mailbox commands...
32,993,707 UART: [rt]cmd =0x50435251, len=36
34,169,099 >>> mbox cmd response data (1848 bytes)
34,178,010 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,208,232 UART: [rt]cmd =0x50435245, len=56
34,211,364 >>> mbox cmd response data (8 bytes)
34,212,188 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,242,034 UART: [rt]cmd =0x50435251, len=36
35,406,462 >>> mbox cmd response data (1848 bytes)
35,416,486 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,446,719 UART: [rt]cmd =0x50435245, len=56
35,450,164 >>> mbox cmd response data (8 bytes)
35,450,896 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,480,945 UART: [rt]cmd =0x50435251, len=36
36,643,471 >>> mbox cmd response data (1848 bytes)
36,652,368 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,682,376 UART: [rt]cmd =0x50435245, len=56
36,685,671 >>> mbox cmd response data (8 bytes)
36,686,236 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,716,457 UART: [rt]cmd =0x50435251, len=36
37,880,664 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,805,595 ready_for_fw is high
3,806,258 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,864,437 >>> mbox cmd response: success
17,865,092 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,548,149 UART:
23,548,546 UART: Running Caliptra FMC ...
23,549,660 UART:
23,549,815 UART: [state] CFI Enabled
23,618,042 UART: [fht] FMC Alias Private Key: 7
25,956,341 UART: [art] Extend RT PCRs Done
25,957,574 UART: [art] Lock RT PCRs Done
25,959,336 UART: [art] Populate DV Done
25,964,804 UART: [fht] FMC Alias Private Key: 7
25,966,508 UART: [art] Derive CDI
25,967,324 UART: [art] Store in in slot 0x4
26,026,033 UART: [art] Derive Key Pair
26,027,079 UART: [art] Store priv key in slot 0x5
29,319,725 UART: [art] Derive Key Pair - Done
29,332,832 UART: [art] Signing Cert with AUTHO
29,334,145 UART: RITY.KEYID = 7
31,620,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,421 UART: [art] PUB.X = AF5A43DFA7CBF79406F8A574FE4E48BD7D032C30CC4E2687753930B907E7384908990D3C0079660299FC6A805586508A
31,629,659 UART: [art] PUB.Y = 7C5F761911CAE5BB2C640F219648C5AEB3129656F538E7FADA079CEA379F31B618754027226E4E295226355857B24820
31,636,867 UART: [art] SIG.R = C8F0F276D27AE2412AC1AC04CE5027E3643DDAF20F71F4F563CD9CFC41EB70467C8622EF1CEA97D785DB2F4E082D7C09
31,644,268 UART: [art] SIG.S = 821080E516E043A1C372B65BE3D784B0D64BBB285FEC118276B1190A856F946CCFB64A7A6AA613294FE0226713D370DA
32,949,478 UART: Caliptra RT
32,950,178 UART: [state] CFI Enabled
33,111,651 UART: [rt] RT listening for mailbox commands...
33,143,356 UART: [rt]cmd =0x50435251, len=36
34,317,253 >>> mbox cmd response data (1848 bytes)
34,326,127 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,356,662 UART: [rt]cmd =0x50435245, len=56
34,359,827 >>> mbox cmd response data (8 bytes)
34,360,600 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,390,747 UART: [rt]cmd =0x50435251, len=36
35,554,738 >>> mbox cmd response data (1848 bytes)
35,564,709 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,594,850 UART: [rt]cmd =0x50435245, len=56
35,597,670 >>> mbox cmd response data (8 bytes)
35,598,382 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,628,465 UART: [rt]cmd =0x50435251, len=36
36,792,227 >>> mbox cmd response data (1848 bytes)
36,801,128 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,831,465 UART: [rt]cmd =0x50435245, len=56
36,834,682 >>> mbox cmd response data (8 bytes)
36,835,235 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,865,161 UART: [rt]cmd =0x50435251, len=36
38,029,309 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,544 writing to cptra_bootfsm_go
193,864 UART:
194,233 UART: Running Caliptra ROM ...
195,418 UART:
605,166 UART: [state] CFI Enabled
623,023 UART: [state] LifecycleState = Unprovisioned
624,965 UART: [state] DebugLocked = No
627,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,619 UART: [kat] SHA2-256
802,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,943 UART: [kat] ++
813,425 UART: [kat] sha1
825,504 UART: [kat] SHA2-256
828,156 UART: [kat] SHA2-384
833,804 UART: [kat] SHA2-512-ACC
836,166 UART: [kat] ECC-384
3,118,593 UART: [kat] HMAC-384Kdf
3,131,142 UART: [kat] LMS
4,321,232 UART: [kat] --
4,326,074 UART: [cold-reset] ++
4,327,148 UART: [fht] Storing FHT @ 0x50003400
4,338,977 UART: [idev] ++
4,339,542 UART: [idev] CDI.KEYID = 6
4,340,462 UART: [idev] SUBJECT.KEYID = 7
4,341,698 UART: [idev] UDS.KEYID = 0
4,342,783 ready_for_fw is high
4,343,005 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,941 UART: [idev] Erasing UDS.KEYID = 0
7,632,100 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,427 UART: [idev] --
7,658,784 UART: [ldev] ++
7,659,353 UART: [ldev] CDI.KEYID = 6
7,660,304 UART: [ldev] SUBJECT.KEYID = 5
7,661,509 UART: [ldev] AUTHORITY.KEYID = 7
7,662,794 UART: [ldev] FE.KEYID = 1
7,674,569 UART: [ldev] Erasing FE.KEYID = 1
10,966,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,093 UART: [ldev] --
13,325,760 UART: [fwproc] Waiting for Commands...
13,328,334 UART: [fwproc] Received command 0x46574c44
13,330,514 UART: [fwproc] Received Image of size 113760 bytes
17,377,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,916 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,837,816 >>> mbox cmd response: success
17,838,352 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,841,181 UART: [afmc] ++
17,841,792 UART: [afmc] CDI.KEYID = 6
17,842,703 UART: [afmc] SUBJECT.KEYID = 7
17,843,925 UART: [afmc] AUTHORITY.KEYID = 5
21,154,417 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,540 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,935 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,799 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,233 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,402 UART: [afmc] --
23,521,370 UART: [cold-reset] --
23,525,823 UART: [state] Locking Datavault
23,531,293 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,050 UART: [state] Locking ICCM
23,534,494 UART: [exit] Launching FMC @ 0x40000130
23,542,839 UART:
23,543,070 UART: Running Caliptra FMC ...
23,544,173 UART:
23,544,329 UART: [state] CFI Enabled
23,552,261 UART: [fht] FMC Alias Private Key: 7
25,883,373 UART: [art] Extend RT PCRs Done
25,884,597 UART: [art] Lock RT PCRs Done
25,886,028 UART: [art] Populate DV Done
25,891,451 UART: [fht] FMC Alias Private Key: 7
25,893,042 UART: [art] Derive CDI
25,893,780 UART: [art] Store in in slot 0x4
25,936,262 UART: [art] Derive Key Pair
25,937,318 UART: [art] Store priv key in slot 0x5
29,179,211 UART: [art] Derive Key Pair - Done
29,192,374 UART: [art] Signing Cert with AUTHO
29,193,681 UART: RITY.KEYID = 7
31,472,741 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,245 UART: [art] PUB.X = 11B94F94B6C1635D4198A82D5B4DD259FA309DFADD5B0028E8BE55726EECDD857240F43CD1B641D273D62A0E832A1173
31,481,508 UART: [art] PUB.Y = 91E24060F11E9B1A07D044ADC5EDDA9E3812048B49384E1F8434961A748D6FD7DADF8167BAEA5BF847A9F68626B4FE40
31,488,760 UART: [art] SIG.R = 8C60138616BE8A591EE3464F94FF91B509C944202DF81B228347241744EF6A8E2639D09054DA912D0482FEE6DCA7A07E
31,496,177 UART: [art] SIG.S = 1D094F3B191A2E4CF2B8631C08D8EC1B49EA0FA21067DE22DADD6743AEBDD4E7674EDBA6560F2BA6B4317D271A67EAC5
32,801,561 UART: Caliptra RT
32,802,277 UART: [state] CFI Enabled
32,920,094 UART: [rt] RT listening for mailbox commands...
32,951,940 UART: [rt]cmd =0x50435251, len=36
34,107,346 >>> mbox cmd response data (1848 bytes)
34,116,280 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,146,500 UART: [rt]cmd =0x50435245, len=56
34,149,379 >>> mbox cmd response data (8 bytes)
34,150,190 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,180,277 UART: [rt]cmd =0x50435251, len=36
35,335,652 >>> mbox cmd response data (1848 bytes)
35,345,599 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,375,654 UART: [rt]cmd =0x50435245, len=56
35,378,391 >>> mbox cmd response data (8 bytes)
35,379,004 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,409,053 UART: [rt]cmd =0x50435251, len=36
36,564,634 >>> mbox cmd response data (1848 bytes)
36,573,564 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,603,842 UART: [rt]cmd =0x50435245, len=56
36,606,754 >>> mbox cmd response data (8 bytes)
36,607,241 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,637,254 UART: [rt]cmd =0x50435251, len=36
37,792,527 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,651 writing to cptra_bootfsm_go
4,128,110 ready_for_fw is high
4,128,486 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,067,649 >>> mbox cmd response: success
18,068,246 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,703,619 UART:
23,704,002 UART: Running Caliptra FMC ...
23,705,203 UART:
23,705,366 UART: [state] CFI Enabled
23,713,415 UART: [fht] FMC Alias Private Key: 7
26,044,531 UART: [art] Extend RT PCRs Done
26,045,771 UART: [art] Lock RT PCRs Done
26,047,536 UART: [art] Populate DV Done
26,052,955 UART: [fht] FMC Alias Private Key: 7
26,054,608 UART: [art] Derive CDI
26,055,423 UART: [art] Store in in slot 0x4
26,098,014 UART: [art] Derive Key Pair
26,099,075 UART: [art] Store priv key in slot 0x5
29,340,673 UART: [art] Derive Key Pair - Done
29,353,612 UART: [art] Signing Cert with AUTHO
29,354,947 UART: RITY.KEYID = 7
31,634,775 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,277 UART: [art] PUB.X = B6B6D5B32584022BD04674787D59B35CE8EA95D369E809BD4DC285BB8F4EBF09F5E2043E35D3FA47FC4461CF80D85334
31,643,509 UART: [art] PUB.Y = BAA251D045ACB7E9CA38D6DC4E701632D591C81CC0D8FB834C54B759E8D1F6DB6DB8F79A0974F851239C1FFF96CA156A
31,650,763 UART: [art] SIG.R = 924AB1D1C542161B81114E9E4923EE86AAD553B2DA334A7ABA9BAD92F1FA596AF0BE6389744EE196531A080ECCE01267
31,658,133 UART: [art] SIG.S = 0F2B1B42350211F0FA39BB189F08DF7B31AAEE1ED4761BDC77F30D039725B06E6BE13917D97F8B2252FF74C915D8D834
32,963,902 UART: Caliptra RT
32,964,619 UART: [state] CFI Enabled
33,082,010 UART: [rt] RT listening for mailbox commands...
33,113,903 UART: [rt]cmd =0x50435251, len=36
34,269,352 >>> mbox cmd response data (1848 bytes)
34,278,291 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,308,731 UART: [rt]cmd =0x50435245, len=56
34,311,733 >>> mbox cmd response data (8 bytes)
34,312,565 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,342,815 UART: [rt]cmd =0x50435251, len=36
35,497,810 >>> mbox cmd response data (1848 bytes)
35,507,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,538,001 UART: [rt]cmd =0x50435245, len=56
35,540,986 >>> mbox cmd response data (8 bytes)
35,541,737 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,571,731 UART: [rt]cmd =0x50435251, len=36
36,726,929 >>> mbox cmd response data (1848 bytes)
36,735,850 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,766,240 UART: [rt]cmd =0x50435245, len=56
36,769,154 >>> mbox cmd response data (8 bytes)
36,769,627 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,799,678 UART: [rt]cmd =0x50435251, len=36
37,954,898 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
192,568 UART:
192,961 UART: Running Caliptra ROM ...
194,170 UART:
194,321 UART: [state] CFI Enabled
262,094 UART: [state] LifecycleState = Unprovisioned
264,026 UART: [state] DebugLocked = No
266,843 UART: [state] WD Timer not started. Device not locked for debugging
270,525 UART: [kat] SHA2-256
449,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,211 UART: [kat] ++
461,750 UART: [kat] sha1
474,191 UART: [kat] SHA2-256
477,265 UART: [kat] SHA2-384
483,319 UART: [kat] SHA2-512-ACC
486,326 UART: [kat] ECC-384
2,947,764 UART: [kat] HMAC-384Kdf
2,971,513 UART: [kat] LMS
3,500,911 UART: [kat] --
3,503,336 UART: [cold-reset] ++
3,505,262 UART: [fht] FHT @ 0x50003400
3,515,526 UART: [idev] ++
3,516,101 UART: [idev] CDI.KEYID = 6
3,517,010 UART: [idev] SUBJECT.KEYID = 7
3,518,256 UART: [idev] UDS.KEYID = 0
3,519,177 ready_for_fw is high
3,519,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,662,872 UART: [idev] Erasing UDS.KEYID = 0
6,026,325 UART: [idev] Sha1 KeyId Algorithm
6,049,871 UART: [idev] --
6,053,471 UART: [ldev] ++
6,054,048 UART: [ldev] CDI.KEYID = 6
6,054,934 UART: [ldev] SUBJECT.KEYID = 5
6,056,143 UART: [ldev] AUTHORITY.KEYID = 7
6,057,368 UART: [ldev] FE.KEYID = 1
6,101,051 UART: [ldev] Erasing FE.KEYID = 1
8,603,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,428 UART: [ldev] --
10,416,662 UART: [fwproc] Wait for Commands...
10,419,609 UART: [fwproc] Recv command 0x46574c44
10,421,693 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,277,177 >>> mbox cmd response: success
14,277,740 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,280,759 UART: [afmc] ++
14,281,344 UART: [afmc] CDI.KEYID = 6
14,282,226 UART: [afmc] SUBJECT.KEYID = 7
14,283,438 UART: [afmc] AUTHORITY.KEYID = 5
16,825,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,711 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,631 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,928 UART: [afmc] --
18,627,489 UART: [cold-reset] --
18,629,835 UART: [state] Locking Datavault
18,635,025 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,728 UART: [state] Locking ICCM
18,637,791 UART: [exit] Launching FMC @ 0x40000130
18,646,245 UART:
18,646,474 UART: Running Caliptra FMC ...
18,647,574 UART:
18,647,730 UART: [state] CFI Enabled
18,708,611 UART: [fht] FMC Alias Private Key: 7
20,471,619 UART: [art] Extend RT PCRs Done
20,472,842 UART: [art] Lock RT PCRs Done
20,474,387 UART: [art] Populate DV Done
20,479,898 UART: [fht] FMC Alias Private Key: 7
20,481,375 UART: [art] Derive CDI
20,482,102 UART: [art] Store in in slot 0x4
20,541,111 UART: [art] Derive Key Pair
20,542,148 UART: [art] Store priv key in slot 0x5
23,004,990 UART: [art] Derive Key Pair - Done
23,017,988 UART: [art] Signing Cert with AUTHO
23,019,294 UART: RITY.KEYID = 7
24,730,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,140 UART: [art] PUB.X = C8B6497E99914900E3FE296C382EF680C13594ABD671DDD1F074E19234AE79F2CE5A1466F0BE695C4A4B19850EF717E2
24,739,414 UART: [art] PUB.Y = BD015A1FE9DF9A6185F1F59F25C625623A65D07DF604585989C16B72B92817F6E3E12791EE6576D0FEA4A604387189F5
24,746,681 UART: [art] SIG.R = C1DF825B0C957419E78830E55C4A8246DB8F9C98A52DF60C72A86A10A2AD9771E4DCD3B6A1879F9CC384FA6ECA29B6E8
24,754,120 UART: [art] SIG.S = 1C0988FAA383CC2355891B324463AF7F6895DA22B1ADAF7A9259C152B2780570C9D1CE8C2F8CCC05ACE158F7EEBA93AC
25,732,690 UART: Caliptra RT
25,733,394 UART: [state] CFI Enabled
25,898,604 UART: [rt] RT listening for mailbox commands...
25,930,298 UART: [rt]cmd =0x50435251, len=36
26,858,018 >>> mbox cmd response data (1848 bytes)
26,866,905 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,897,056 UART: [rt]cmd =0x50435245, len=56
26,900,184 >>> mbox cmd response data (8 bytes)
26,900,990 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,930,724 UART: [rt]cmd =0x50435251, len=36
27,839,264 >>> mbox cmd response data (1848 bytes)
27,849,249 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,879,670 UART: [rt]cmd =0x50435245, len=56
27,882,691 >>> mbox cmd response data (8 bytes)
27,883,412 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,913,256 UART: [rt]cmd =0x50435251, len=36
28,841,511 >>> mbox cmd response data (1848 bytes)
28,850,404 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,880,615 UART: [rt]cmd =0x50435245, len=56
28,883,806 >>> mbox cmd response data (8 bytes)
28,884,351 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,914,433 UART: [rt]cmd =0x50435251, len=36
29,823,107 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
3,384,651 ready_for_fw is high
3,385,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,678 >>> mbox cmd response: success
14,064,564 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,346,664 UART:
18,347,075 UART: Running Caliptra FMC ...
18,348,300 UART:
18,348,464 UART: [state] CFI Enabled
18,414,760 UART: [fht] FMC Alias Private Key: 7
20,179,231 UART: [art] Extend RT PCRs Done
20,180,464 UART: [art] Lock RT PCRs Done
20,182,175 UART: [art] Populate DV Done
20,187,425 UART: [fht] FMC Alias Private Key: 7
20,189,025 UART: [art] Derive CDI
20,189,767 UART: [art] Store in in slot 0x4
20,248,191 UART: [art] Derive Key Pair
20,249,235 UART: [art] Store priv key in slot 0x5
22,711,679 UART: [art] Derive Key Pair - Done
22,724,674 UART: [art] Signing Cert with AUTHO
22,725,978 UART: RITY.KEYID = 7
24,438,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,440,062 UART: [art] PUB.X = 946339DA87CDAC82F433A0129CA4AFDBF532E832EEE4F7F01628E6CC82F79E633C219C624189686CCA566660FBE51513
24,447,365 UART: [art] PUB.Y = 2AF3CA11622810A7085E1D3AB9000B554CD674D76DA4EEE8984462E8A7894AA7DA5F9727AD9E818559DF29C2AD5B8C13
24,454,579 UART: [art] SIG.R = DDC753DBF8BCCF43AC2C7AA14335FC214382106D48BA06687E3FF862580D5B17B57CA98D54346DEB4ECD2BB49BBF2018
24,461,973 UART: [art] SIG.S = 9660A0C69353E0AE851437E2CF26B2E5F9B93758E708BFB4FB0AE4EED2986BC48476152E1BD8E0692C026355F61EF584
25,440,308 UART: Caliptra RT
25,441,015 UART: [state] CFI Enabled
25,607,348 UART: [rt] RT listening for mailbox commands...
25,639,199 UART: [rt]cmd =0x50435251, len=36
26,566,515 >>> mbox cmd response data (1848 bytes)
26,575,559 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,606,052 UART: [rt]cmd =0x50435245, len=56
26,609,240 >>> mbox cmd response data (8 bytes)
26,610,045 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,639,970 UART: [rt]cmd =0x50435251, len=36
27,568,580 >>> mbox cmd response data (1848 bytes)
27,578,789 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,608,951 UART: [rt]cmd =0x50435245, len=56
27,612,170 >>> mbox cmd response data (8 bytes)
27,612,906 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,643,165 UART: [rt]cmd =0x50435251, len=36
28,571,131 >>> mbox cmd response data (1848 bytes)
28,580,052 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,610,231 UART: [rt]cmd =0x50435245, len=56
28,613,527 >>> mbox cmd response data (8 bytes)
28,614,070 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,644,051 UART: [rt]cmd =0x50435251, len=36
29,552,884 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
192,953 UART:
193,328 UART: Running Caliptra ROM ...
194,529 UART:
604,232 UART: [state] CFI Enabled
618,680 UART: [state] LifecycleState = Unprovisioned
620,500 UART: [state] DebugLocked = No
622,517 UART: [state] WD Timer not started. Device not locked for debugging
626,691 UART: [kat] SHA2-256
805,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,391 UART: [kat] ++
817,845 UART: [kat] sha1
828,576 UART: [kat] SHA2-256
831,585 UART: [kat] SHA2-384
837,185 UART: [kat] SHA2-512-ACC
840,026 UART: [kat] ECC-384
3,280,309 UART: [kat] HMAC-384Kdf
3,292,965 UART: [kat] LMS
3,822,473 UART: [kat] --
3,827,674 UART: [cold-reset] ++
3,828,758 UART: [fht] FHT @ 0x50003400
3,839,672 UART: [idev] ++
3,840,258 UART: [idev] CDI.KEYID = 6
3,841,174 UART: [idev] SUBJECT.KEYID = 7
3,842,424 UART: [idev] UDS.KEYID = 0
3,843,406 ready_for_fw is high
3,843,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,869 UART: [idev] Erasing UDS.KEYID = 0
6,315,034 UART: [idev] Sha1 KeyId Algorithm
6,337,747 UART: [idev] --
6,341,586 UART: [ldev] ++
6,342,164 UART: [ldev] CDI.KEYID = 6
6,343,086 UART: [ldev] SUBJECT.KEYID = 5
6,344,305 UART: [ldev] AUTHORITY.KEYID = 7
6,345,543 UART: [ldev] FE.KEYID = 1
6,357,280 UART: [ldev] Erasing FE.KEYID = 1
8,827,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,443 UART: [ldev] --
10,618,233 UART: [fwproc] Wait for Commands...
10,619,846 UART: [fwproc] Recv command 0x46574c44
10,621,941 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,482,713 >>> mbox cmd response: success
14,483,291 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,487,131 UART: [afmc] ++
14,487,724 UART: [afmc] CDI.KEYID = 6
14,488,611 UART: [afmc] SUBJECT.KEYID = 7
14,489,827 UART: [afmc] AUTHORITY.KEYID = 5
16,985,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,951 UART: [afmc] --
18,781,963 UART: [cold-reset] --
18,787,068 UART: [state] Locking Datavault
18,792,162 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,865 UART: [state] Locking ICCM
18,796,558 UART: [exit] Launching FMC @ 0x40000130
18,805,011 UART:
18,805,261 UART: Running Caliptra FMC ...
18,806,368 UART:
18,806,534 UART: [state] CFI Enabled
18,814,601 UART: [fht] FMC Alias Private Key: 7
20,571,409 UART: [art] Extend RT PCRs Done
20,572,632 UART: [art] Lock RT PCRs Done
20,574,210 UART: [art] Populate DV Done
20,579,299 UART: [fht] FMC Alias Private Key: 7
20,580,998 UART: [art] Derive CDI
20,581,814 UART: [art] Store in in slot 0x4
20,624,250 UART: [art] Derive Key Pair
20,625,295 UART: [art] Store priv key in slot 0x5
23,052,413 UART: [art] Derive Key Pair - Done
23,065,536 UART: [art] Signing Cert with AUTHO
23,066,852 UART: RITY.KEYID = 7
24,772,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,106 UART: [art] PUB.X = F89D45CC8C7F8F070B3534CE5F700E9A455A1230A7E29439DD5C31BB1FFB284B5B1D845862675F825EC2832ECD67F94E
24,781,375 UART: [art] PUB.Y = 75D03A15B08ABBE14D5411D1DB4891D856056DDC380EDC94BE78E354052BF0159E183B9A5D9CBB360177362ADFFCC0D6
24,788,642 UART: [art] SIG.R = B441357105B43806CB415766AC095B62E9A2E15C4C8E9F5E5E524F9C98E4FDBEE4EF7B1E109F9070769101B1C3C43593
24,796,080 UART: [art] SIG.S = 4875A7FFB3962F7D804B2E4556E27930F5271A27DB9B90190809FE08CD3795ACD2244741F3214EC26C8B002246F4038E
25,775,440 UART: Caliptra RT
25,776,159 UART: [state] CFI Enabled
25,893,787 UART: [rt] RT listening for mailbox commands...
25,925,468 UART: [rt]cmd =0x50435251, len=36
26,833,368 >>> mbox cmd response data (1848 bytes)
26,842,433 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,872,562 UART: [rt]cmd =0x50435245, len=56
26,875,693 >>> mbox cmd response data (8 bytes)
26,876,597 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,906,656 UART: [rt]cmd =0x50435251, len=36
27,814,371 >>> mbox cmd response data (1848 bytes)
27,824,332 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,854,804 UART: [rt]cmd =0x50435245, len=56
27,858,054 >>> mbox cmd response data (8 bytes)
27,858,764 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,888,808 UART: [rt]cmd =0x50435251, len=36
28,796,465 >>> mbox cmd response data (1848 bytes)
28,805,371 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,835,583 UART: [rt]cmd =0x50435245, len=56
28,838,845 >>> mbox cmd response data (8 bytes)
28,839,451 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,869,545 UART: [rt]cmd =0x50435251, len=36
29,776,850 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,010 writing to cptra_bootfsm_go
3,692,511 ready_for_fw is high
3,693,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,248,424 >>> mbox cmd response: success
14,249,094 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,499,100 UART:
18,499,478 UART: Running Caliptra FMC ...
18,500,679 UART:
18,500,867 UART: [state] CFI Enabled
18,508,823 UART: [fht] FMC Alias Private Key: 7
20,265,849 UART: [art] Extend RT PCRs Done
20,267,077 UART: [art] Lock RT PCRs Done
20,268,899 UART: [art] Populate DV Done
20,274,101 UART: [fht] FMC Alias Private Key: 7
20,275,701 UART: [art] Derive CDI
20,276,521 UART: [art] Store in in slot 0x4
20,319,338 UART: [art] Derive Key Pair
20,320,378 UART: [art] Store priv key in slot 0x5
22,747,198 UART: [art] Derive Key Pair - Done
22,759,983 UART: [art] Signing Cert with AUTHO
22,761,298 UART: RITY.KEYID = 7
24,466,637 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,144 UART: [art] PUB.X = 45353EC615494AFCB44FA88C230E26A4646901ADC04192CFE1B182C59FE55E6B45CC6AB2E8FBF25903ED3227D468396D
24,475,418 UART: [art] PUB.Y = 04D50469A169CF62302786C89AE081D1BBB43F60E828AB13179B7054180EC9A9BF0E46F72D474FDF51EAF33A6A027D4F
24,482,674 UART: [art] SIG.R = 3B84A18ED4311FA675283C02B6AB07DE8AEF512569D45924D9F23FD791C3D4134F70F817DB5132DFB2B17D8A28220E50
24,490,045 UART: [art] SIG.S = 10A80DD63EC7816F791C1A2A57182807F281D96AF3E0705431F15E19656CE49EB98602DE9D490D03BC60EECFC9059D12
25,469,436 UART: Caliptra RT
25,470,154 UART: [state] CFI Enabled
25,587,606 UART: [rt] RT listening for mailbox commands...
25,619,182 UART: [rt]cmd =0x50435251, len=36
26,526,981 >>> mbox cmd response data (1848 bytes)
26,535,857 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,566,177 UART: [rt]cmd =0x50435245, len=56
26,569,397 >>> mbox cmd response data (8 bytes)
26,570,274 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,600,402 UART: [rt]cmd =0x50435251, len=36
27,508,098 >>> mbox cmd response data (1848 bytes)
27,518,282 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,548,752 UART: [rt]cmd =0x50435245, len=56
27,551,924 >>> mbox cmd response data (8 bytes)
27,552,654 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,582,586 UART: [rt]cmd =0x50435251, len=36
28,490,703 >>> mbox cmd response data (1848 bytes)
28,499,612 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,529,828 UART: [rt]cmd =0x50435245, len=56
28,532,692 >>> mbox cmd response data (8 bytes)
28,533,245 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,563,467 UART: [rt]cmd =0x50435251, len=36
29,471,533 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,391 UART:
192,760 UART: Running Caliptra ROM ...
193,917 UART:
194,067 UART: [state] CFI Enabled
267,081 UART: [state] LifecycleState = Unprovisioned
269,485 UART: [state] DebugLocked = No
272,385 UART: [state] WD Timer not started. Device not locked for debugging
277,573 UART: [kat] SHA2-256
467,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,249 UART: [kat] ++
478,699 UART: [kat] sha1
490,426 UART: [kat] SHA2-256
493,437 UART: [kat] SHA2-384
500,415 UART: [kat] SHA2-512-ACC
503,007 UART: [kat] ECC-384
2,948,222 UART: [kat] HMAC-384Kdf
2,971,109 UART: [kat] LMS
3,502,833 UART: [kat] --
3,507,066 UART: [cold-reset] ++
3,509,143 UART: [fht] FHT @ 0x50003400
3,519,619 UART: [idev] ++
3,520,242 UART: [idev] CDI.KEYID = 6
3,521,249 UART: [idev] SUBJECT.KEYID = 7
3,522,423 UART: [idev] UDS.KEYID = 0
3,523,346 ready_for_fw is high
3,523,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,017 UART: [idev] Erasing UDS.KEYID = 0
6,027,262 UART: [idev] Sha1 KeyId Algorithm
6,048,068 UART: [idev] --
6,052,968 UART: [ldev] ++
6,053,717 UART: [ldev] CDI.KEYID = 6
6,054,612 UART: [ldev] SUBJECT.KEYID = 5
6,055,691 UART: [ldev] AUTHORITY.KEYID = 7
6,056,989 UART: [ldev] FE.KEYID = 1
6,099,292 UART: [ldev] Erasing FE.KEYID = 1
8,608,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,179 UART: [ldev] --
10,413,983 UART: [fwproc] Wait for Commands...
10,416,710 UART: [fwproc] Recv command 0x46574c44
10,418,976 UART: [fwproc] Recv'd Img size: 114084 bytes
13,869,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,073,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,614,370 >>> mbox cmd response: success
14,614,938 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,618,472 UART: [afmc] ++
14,619,182 UART: [afmc] CDI.KEYID = 6
14,620,426 UART: [afmc] SUBJECT.KEYID = 7
14,621,864 UART: [afmc] AUTHORITY.KEYID = 5
17,150,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,483 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,918 UART: [afmc] --
18,966,454 UART: [cold-reset] --
18,970,478 UART: [state] Locking Datavault
18,976,930 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,131 UART: [state] Locking ICCM
18,981,256 UART: [exit] Launching FMC @ 0x40000130
18,989,905 UART:
18,990,135 UART: Running Caliptra FMC ...
18,991,172 UART:
18,991,318 UART: [state] CFI Enabled
19,051,820 UART: [fht] FMC Alias Private Key: 7
20,815,880 UART: [art] Extend RT PCRs Done
20,817,101 UART: [art] Lock RT PCRs Done
20,818,649 UART: [art] Populate DV Done
20,824,003 UART: [fht] FMC Alias Private Key: 7
20,825,595 UART: [art] Derive CDI
20,826,325 UART: [art] Store in in slot 0x4
20,884,619 UART: [art] Derive Key Pair
20,885,607 UART: [art] Store priv key in slot 0x5
23,348,159 UART: [art] Derive Key Pair - Done
23,361,263 UART: [art] Signing Cert with AUTHO
23,362,556 UART: RITY.KEYID = 7
25,085,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,086,528 UART: [art] PUB.X = 46BFEC627D2F62B4997684C83FD176D8C2CA8BC8D6C93B247A4DAD50D1450372AFDC4C681D352A22758A4400A277CADA
25,093,779 UART: [art] PUB.Y = 05A71B03ED25B37F95AFCC530EECC612F60FD0A7F7CB1BFC5A1F2BADAFB3E93F87BA3FCC6A3A20DBAA7BD8F2F0AD5E67
25,101,141 UART: [art] SIG.R = 0E8BD68E4345BD2283A8A638640BD14B2D41BFDD81C654F99A1E3486A1170F948EFF62C6DAC7DBBAB1B6A3A069122FCA
25,108,534 UART: [art] SIG.S = 9A67B05EC3098AD12952E232271034D919A3007F4CCC42332FFBC388ACDE18D2CF6CA8875FFA480C980A6322A37E9A47
26,086,750 UART: Caliptra RT
26,087,460 UART: [state] CFI Enabled
26,254,527 UART: [rt] RT listening for mailbox commands...
26,286,031 UART: [rt]cmd =0x50435251, len=36
27,213,395 >>> mbox cmd response data (1848 bytes)
27,222,501 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,252,842 UART: [rt]cmd =0x50435245, len=56
27,255,980 >>> mbox cmd response data (8 bytes)
27,256,882 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,286,748 UART: [rt]cmd =0x50435251, len=36
28,194,514 >>> mbox cmd response data (1848 bytes)
28,204,501 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,234,753 UART: [rt]cmd =0x50435245, len=56
28,237,898 >>> mbox cmd response data (8 bytes)
28,238,606 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,268,645 UART: [rt]cmd =0x50435251, len=36
29,197,411 >>> mbox cmd response data (1848 bytes)
29,206,326 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,236,612 UART: [rt]cmd =0x50435245, len=56
29,239,724 >>> mbox cmd response data (8 bytes)
29,240,287 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,269,949 UART: [rt]cmd =0x50435251, len=36
30,178,364 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,415,376 ready_for_fw is high
3,416,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,704,070 >>> mbox cmd response: success
14,704,734 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,985,458 UART:
18,985,854 UART: Running Caliptra FMC ...
18,987,235 UART:
18,987,409 UART: [state] CFI Enabled
19,050,288 UART: [fht] FMC Alias Private Key: 7
20,814,114 UART: [art] Extend RT PCRs Done
20,815,330 UART: [art] Lock RT PCRs Done
20,817,182 UART: [art] Populate DV Done
20,822,647 UART: [fht] FMC Alias Private Key: 7
20,824,183 UART: [art] Derive CDI
20,824,920 UART: [art] Store in in slot 0x4
20,882,967 UART: [art] Derive Key Pair
20,884,036 UART: [art] Store priv key in slot 0x5
23,346,845 UART: [art] Derive Key Pair - Done
23,359,795 UART: [art] Signing Cert with AUTHO
23,361,101 UART: RITY.KEYID = 7
25,071,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,238 UART: [art] PUB.X = 05E3D03F73F55067B1496DD266DBB79D23940614168AF2B2F344B815B1674C2F3692F376EF64ECAE23D8951C38DE03F1
25,080,454 UART: [art] PUB.Y = F7E57527244111586A404FEA5C131A3A7EE5AB2185BC7FBD57FCABB6936420B284B2F00D571271AEF694532C624FF4EE
25,087,710 UART: [art] SIG.R = A25AF64413B8EFA97DC6638A033FB70FC6F0E004793C058263429248A068A5B76A719755D5F69FB0817C9FFA2D0E9E79
25,095,092 UART: [art] SIG.S = B56E76EE1301A2380D4ED124E8DB9BF5B8BA467A028B005F8796F5195DD9A463291712F6BBE77376FE4C7A13BFA152A8
26,073,866 UART: Caliptra RT
26,074,566 UART: [state] CFI Enabled
26,238,309 UART: [rt] RT listening for mailbox commands...
26,269,984 UART: [rt]cmd =0x50435251, len=36
27,198,242 >>> mbox cmd response data (1848 bytes)
27,207,152 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,237,377 UART: [rt]cmd =0x50435245, len=56
27,240,502 >>> mbox cmd response data (8 bytes)
27,241,296 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,271,251 UART: [rt]cmd =0x50435251, len=36
28,179,589 >>> mbox cmd response data (1848 bytes)
28,189,683 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,220,055 UART: [rt]cmd =0x50435245, len=56
28,222,979 >>> mbox cmd response data (8 bytes)
28,223,618 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,254,043 UART: [rt]cmd =0x50435251, len=36
29,181,944 >>> mbox cmd response data (1848 bytes)
29,190,875 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,221,306 UART: [rt]cmd =0x50435245, len=56
29,224,280 >>> mbox cmd response data (8 bytes)
29,224,828 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,254,992 UART: [rt]cmd =0x50435251, len=36
30,162,795 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
192,963 UART:
193,348 UART: Running Caliptra ROM ...
194,540 UART:
604,104 UART: [state] CFI Enabled
619,683 UART: [state] LifecycleState = Unprovisioned
622,053 UART: [state] DebugLocked = No
624,441 UART: [state] WD Timer not started. Device not locked for debugging
628,688 UART: [kat] SHA2-256
818,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,364 UART: [kat] ++
829,987 UART: [kat] sha1
842,009 UART: [kat] SHA2-256
845,027 UART: [kat] SHA2-384
851,313 UART: [kat] SHA2-512-ACC
853,898 UART: [kat] ECC-384
3,293,955 UART: [kat] HMAC-384Kdf
3,307,201 UART: [kat] LMS
3,838,969 UART: [kat] --
3,844,405 UART: [cold-reset] ++
3,845,421 UART: [fht] FHT @ 0x50003400
3,856,930 UART: [idev] ++
3,857,610 UART: [idev] CDI.KEYID = 6
3,858,530 UART: [idev] SUBJECT.KEYID = 7
3,859,776 UART: [idev] UDS.KEYID = 0
3,860,705 ready_for_fw is high
3,860,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,150 UART: [idev] Erasing UDS.KEYID = 0
6,335,819 UART: [idev] Sha1 KeyId Algorithm
6,356,828 UART: [idev] --
6,361,843 UART: [ldev] ++
6,362,524 UART: [ldev] CDI.KEYID = 6
6,363,436 UART: [ldev] SUBJECT.KEYID = 5
6,364,643 UART: [ldev] AUTHORITY.KEYID = 7
6,365,818 UART: [ldev] FE.KEYID = 1
6,377,977 UART: [ldev] Erasing FE.KEYID = 1
8,853,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,422 UART: [ldev] --
10,644,771 UART: [fwproc] Wait for Commands...
10,646,991 UART: [fwproc] Recv command 0x46574c44
10,649,353 UART: [fwproc] Recv'd Img size: 114084 bytes
14,089,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,821,205 >>> mbox cmd response: success
14,821,736 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,825,466 UART: [afmc] ++
14,826,168 UART: [afmc] CDI.KEYID = 6
14,827,360 UART: [afmc] SUBJECT.KEYID = 7
14,828,857 UART: [afmc] AUTHORITY.KEYID = 5
17,331,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,612 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,069,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,084,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,099,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,195 UART: [afmc] --
19,127,747 UART: [cold-reset] --
19,129,773 UART: [state] Locking Datavault
19,135,208 UART: [state] Locking PCR0, PCR1 and PCR31
19,137,418 UART: [state] Locking ICCM
19,139,684 UART: [exit] Launching FMC @ 0x40000130
19,148,322 UART:
19,148,559 UART: Running Caliptra FMC ...
19,149,597 UART:
19,149,744 UART: [state] CFI Enabled
19,157,900 UART: [fht] FMC Alias Private Key: 7
20,915,468 UART: [art] Extend RT PCRs Done
20,916,689 UART: [art] Lock RT PCRs Done
20,918,613 UART: [art] Populate DV Done
20,924,295 UART: [fht] FMC Alias Private Key: 7
20,925,905 UART: [art] Derive CDI
20,926,725 UART: [art] Store in in slot 0x4
20,969,701 UART: [art] Derive Key Pair
20,970,742 UART: [art] Store priv key in slot 0x5
23,397,344 UART: [art] Derive Key Pair - Done
23,410,174 UART: [art] Signing Cert with AUTHO
23,411,483 UART: RITY.KEYID = 7
25,117,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,762 UART: [art] PUB.X = EAEACB9C1AF9365DE28A629FE6DB5F57A87CCA585B5F975E8A89FC5DC11C04D58506B088A814DA4AE14157D3F4F546AB
25,126,091 UART: [art] PUB.Y = E50D4E79A7F367698C44F4F70D47CA34FC10063F1B88F27CC040755326380E5E271249D11166B0C84A7988D2AAB19E72
25,133,352 UART: [art] SIG.R = 66618A3D7F2A2A5C3096B6106A7AA9D996E9218BBDE12979A7176EB30B9BD8E09583E2A4EC8F9A5703FEE39163A73CF6
25,140,727 UART: [art] SIG.S = 0E7CA04BF77FF6FBD96AFD334C8F53D0C8C3575899C4A0F915D5060807C7992D1DA1749F1B7078BCD3F5971E37ED1592
26,119,811 UART: Caliptra RT
26,120,498 UART: [state] CFI Enabled
26,237,931 UART: [rt] RT listening for mailbox commands...
26,269,377 UART: [rt]cmd =0x50435251, len=36
27,177,141 >>> mbox cmd response data (1848 bytes)
27,186,052 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,216,222 UART: [rt]cmd =0x50435245, len=56
27,219,220 >>> mbox cmd response data (8 bytes)
27,220,114 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,249,966 UART: [rt]cmd =0x50435251, len=36
28,157,392 >>> mbox cmd response data (1848 bytes)
28,167,561 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,198,080 UART: [rt]cmd =0x50435245, len=56
28,200,792 >>> mbox cmd response data (8 bytes)
28,201,428 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,231,415 UART: [rt]cmd =0x50435251, len=36
29,138,994 >>> mbox cmd response data (1848 bytes)
29,147,920 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,178,514 UART: [rt]cmd =0x50435245, len=56
29,181,588 >>> mbox cmd response data (8 bytes)
29,182,160 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,212,272 UART: [rt]cmd =0x50435251, len=36
30,120,279 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
3,760,035 ready_for_fw is high
3,760,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,545 >>> mbox cmd response: success
14,950,624 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,200,206 UART:
19,200,624 UART: Running Caliptra FMC ...
19,201,770 UART:
19,201,928 UART: [state] CFI Enabled
19,209,885 UART: [fht] FMC Alias Private Key: 7
20,967,132 UART: [art] Extend RT PCRs Done
20,968,367 UART: [art] Lock RT PCRs Done
20,970,001 UART: [art] Populate DV Done
20,975,482 UART: [fht] FMC Alias Private Key: 7
20,977,136 UART: [art] Derive CDI
20,977,955 UART: [art] Store in in slot 0x4
21,020,483 UART: [art] Derive Key Pair
21,021,503 UART: [art] Store priv key in slot 0x5
23,448,563 UART: [art] Derive Key Pair - Done
23,461,415 UART: [art] Signing Cert with AUTHO
23,462,766 UART: RITY.KEYID = 7
25,168,393 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,932 UART: [art] PUB.X = D828E505BF51CD035CA1F417AC72143269A1191395196DDEE8A498535BE390AF1C095A88012626ECA7D6E057AD4EDF56
25,177,179 UART: [art] PUB.Y = B5AB2F0307F3CC0EA687EA1AC41BE0EA3C07D4126F7E936E259B130E11774A7202D1797F07FDF2198E24BF6391F2EE67
25,184,472 UART: [art] SIG.R = CDD1BF962D52BB811CDF44A033C90B5B036D3C4A66B7D496E823B9EA1BEBF7E14ADF9F5F1B941B60423346DCE5071B01
25,191,842 UART: [art] SIG.S = 330DF92F247B50D99B511F8ACCA998180817BFCA7F23C619ACD0CF962264BDC25B6C0621A94D0C0715ACA3BB6C70790D
26,171,296 UART: Caliptra RT
26,171,991 UART: [state] CFI Enabled
26,288,985 UART: [rt] RT listening for mailbox commands...
26,320,507 UART: [rt]cmd =0x50435251, len=36
27,228,358 >>> mbox cmd response data (1848 bytes)
27,237,358 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,267,378 UART: [rt]cmd =0x50435245, len=56
27,270,562 >>> mbox cmd response data (8 bytes)
27,271,556 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,301,729 UART: [rt]cmd =0x50435251, len=36
28,209,430 >>> mbox cmd response data (1848 bytes)
28,219,391 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,249,894 UART: [rt]cmd =0x50435245, len=56
28,253,036 >>> mbox cmd response data (8 bytes)
28,253,765 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,283,841 UART: [rt]cmd =0x50435251, len=36
29,191,417 >>> mbox cmd response data (1848 bytes)
29,200,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,230,812 UART: [rt]cmd =0x50435245, len=56
29,234,140 >>> mbox cmd response data (8 bytes)
29,234,733 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,264,654 UART: [rt]cmd =0x50435251, len=36
30,172,289 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,778 UART: [kat] SHA2-512-ACC
896,679 UART: [kat] ECC-384
901,978 UART: [kat] HMAC-384Kdf
906,520 UART: [kat] LMS
1,474,716 UART: [kat] --
1,475,585 UART: [cold-reset] ++
1,475,951 UART: [fht] Storing FHT @ 0x50003400
1,478,806 UART: [idev] ++
1,478,974 UART: [idev] CDI.KEYID = 6
1,479,334 UART: [idev] SUBJECT.KEYID = 7
1,479,758 UART: [idev] UDS.KEYID = 0
1,480,103 ready_for_fw is high
1,480,103 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,508 UART: [idev] Erasing UDS.KEYID = 0
1,503,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,530 UART: [idev] --
1,513,475 UART: [ldev] ++
1,513,643 UART: [ldev] CDI.KEYID = 6
1,514,006 UART: [ldev] SUBJECT.KEYID = 5
1,514,432 UART: [ldev] AUTHORITY.KEYID = 7
1,514,895 UART: [ldev] FE.KEYID = 1
1,520,335 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,512 UART: [ldev] --
1,585,965 UART: [fwproc] Waiting for Commands...
1,586,778 UART: [fwproc] Received command 0x46574c44
1,587,569 UART: [fwproc] Received Image of size 114084 bytes
2,882,157 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,511 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,863 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,274 >>> mbox cmd response: success
3,074,274 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,075,380 UART: [afmc] ++
3,075,548 UART: [afmc] CDI.KEYID = 6
3,075,910 UART: [afmc] SUBJECT.KEYID = 7
3,076,335 UART: [afmc] AUTHORITY.KEYID = 5
3,110,640 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,886 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,499 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,189 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,166 UART: [afmc] --
3,154,268 UART: [cold-reset] --
3,155,016 UART: [state] Locking Datavault
3,156,229 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,833 UART: [state] Locking ICCM
3,157,259 UART: [exit] Launching FMC @ 0x40000130
3,162,588 UART:
3,162,604 UART: Running Caliptra FMC ...
3,163,012 UART:
3,163,066 UART: [state] CFI Enabled
3,173,461 UART: [fht] FMC Alias Private Key: 7
3,281,658 UART: [art] Extend RT PCRs Done
3,282,086 UART: [art] Lock RT PCRs Done
3,283,672 UART: [art] Populate DV Done
3,292,003 UART: [fht] FMC Alias Private Key: 7
3,293,117 UART: [art] Derive CDI
3,293,397 UART: [art] Store in in slot 0x4
3,379,228 UART: [art] Derive Key Pair
3,379,588 UART: [art] Store priv key in slot 0x5
3,392,646 UART: [art] Derive Key Pair - Done
3,407,473 UART: [art] Signing Cert with AUTHO
3,407,953 UART: RITY.KEYID = 7
3,423,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,834 UART: [art] PUB.X = 5EC4C6456DB7BA16DD7AF3AAE5B4438422A10580CF8BBDDC23CF99C8020F427C41930E919C67180AEAC62C131731B1F4
3,430,601 UART: [art] PUB.Y = 0FB31A7A20217E8C1777D99EE690E802D53118A599A643610280E1A135530315E5351E254371AC59F6BEDD7D297FCFB6
3,437,535 UART: [art] SIG.R = 27E2D29F9B2361335FBD3D3496B3B486BBCE6DAA9837572247E77213390104586025CE0D3EF50F109EAF59647B8886DB
3,444,291 UART: [art] SIG.S = E2CD1B58EE8034B9A7387E45EDC0EC1643ADA685FEA1972843C14CE381C821E3B31F0027A59F7960F86CAACC071A616A
3,467,851 UART: Caliptra RT
3,468,104 UART: [state] CFI Enabled
3,576,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,701 UART: [rt]cmd =0x50435251, len=36
3,774,150 >>> mbox cmd response data (1848 bytes)
3,774,151 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,888 UART: [rt]cmd =0x50435245, len=56
3,807,494 >>> mbox cmd response data (8 bytes)
3,807,495 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,290 UART: [rt]cmd =0x50435251, len=36
4,004,565 >>> mbox cmd response data (1848 bytes)
4,004,566 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,215 UART: [rt]cmd =0x50435245, len=56
4,037,957 >>> mbox cmd response data (8 bytes)
4,037,958 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,717 UART: [rt]cmd =0x50435251, len=36
4,235,114 >>> mbox cmd response data (1848 bytes)
4,235,115 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,264,864 UART: [rt]cmd =0x50435245, len=56
4,268,316 >>> mbox cmd response data (8 bytes)
4,268,317 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,297,710 UART: [rt]cmd =0x50435251, len=36
4,465,033 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,617 ready_for_fw is high
1,362,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,476 >>> mbox cmd response: success
2,925,476 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,986,244 UART:
2,986,260 UART: Running Caliptra FMC ...
2,986,668 UART:
2,986,722 UART: [state] CFI Enabled
2,997,171 UART: [fht] FMC Alias Private Key: 7
3,105,072 UART: [art] Extend RT PCRs Done
3,105,500 UART: [art] Lock RT PCRs Done
3,107,182 UART: [art] Populate DV Done
3,115,167 UART: [fht] FMC Alias Private Key: 7
3,116,101 UART: [art] Derive CDI
3,116,381 UART: [art] Store in in slot 0x4
3,201,798 UART: [art] Derive Key Pair
3,202,158 UART: [art] Store priv key in slot 0x5
3,214,934 UART: [art] Derive Key Pair - Done
3,229,766 UART: [art] Signing Cert with AUTHO
3,230,246 UART: RITY.KEYID = 7
3,245,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,259 UART: [art] PUB.X = 05C00146D7EFF95555D38E470D7DF02CCC5E2ADECA6FC788106BC49CAD4B118BB560DE4FB92E52D8950AB25449EC7AB6
3,253,037 UART: [art] PUB.Y = 801AA80C0FA5CF6BA5A709EF8837B64D1F0214C82F579C9802A61C0CB3B04CE029DE2CA4A8A1ABB0DFC7787DE870DAC5
3,259,991 UART: [art] SIG.R = E91382B6F878488036569C2051904097353991F3D233446C7C2E2DA8B96909AC53B6F9080D2A2423D8C1EEF3FC318018
3,266,740 UART: [art] SIG.S = 468E6EB3332A7A6994BB87FD2FB83AC1CEE6AEB094CCE557C3AEA23166FCE7EC3A6AAEDD3914752F274DF5CD08B01963
3,290,846 UART: Caliptra RT
3,291,099 UART: [state] CFI Enabled
3,399,676 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,306 UART: [rt]cmd =0x50435251, len=36
3,597,651 >>> mbox cmd response data (1848 bytes)
3,597,652 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,387 UART: [rt]cmd =0x50435245, len=56
3,630,933 >>> mbox cmd response data (8 bytes)
3,630,934 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,595 UART: [rt]cmd =0x50435251, len=36
3,828,104 >>> mbox cmd response data (1848 bytes)
3,828,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,780 UART: [rt]cmd =0x50435245, len=56
3,861,302 >>> mbox cmd response data (8 bytes)
3,861,303 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,894 UART: [rt]cmd =0x50435251, len=36
4,058,277 >>> mbox cmd response data (1848 bytes)
4,058,278 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,843 UART: [rt]cmd =0x50435245, len=56
4,091,351 >>> mbox cmd response data (8 bytes)
4,091,352 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,803 UART: [rt]cmd =0x50435251, len=36
4,288,090 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,158 UART: [kat] SHA2-256
882,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,204 UART: [kat] ++
886,356 UART: [kat] sha1
890,660 UART: [kat] SHA2-256
892,598 UART: [kat] SHA2-384
895,235 UART: [kat] SHA2-512-ACC
897,136 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,451 UART: [kat] LMS
1,475,647 UART: [kat] --
1,476,386 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,811 UART: [idev] Erasing UDS.KEYID = 0
1,505,203 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,825 UART: [idev] --
1,514,866 UART: [ldev] ++
1,515,034 UART: [ldev] CDI.KEYID = 6
1,515,397 UART: [ldev] SUBJECT.KEYID = 5
1,515,823 UART: [ldev] AUTHORITY.KEYID = 7
1,516,286 UART: [ldev] FE.KEYID = 1
1,521,634 UART: [ldev] Erasing FE.KEYID = 1
1,546,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,445 UART: [ldev] --
1,585,928 UART: [fwproc] Waiting for Commands...
1,586,701 UART: [fwproc] Received command 0x46574c44
1,587,492 UART: [fwproc] Received Image of size 114084 bytes
2,882,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,283 >>> mbox cmd response: success
3,075,283 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,076,491 UART: [afmc] ++
3,076,659 UART: [afmc] CDI.KEYID = 6
3,077,021 UART: [afmc] SUBJECT.KEYID = 7
3,077,446 UART: [afmc] AUTHORITY.KEYID = 5
3,113,053 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,570 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,260 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,271 UART: [afmc] --
3,156,239 UART: [cold-reset] --
3,157,141 UART: [state] Locking Datavault
3,158,344 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,948 UART: [state] Locking ICCM
3,159,374 UART: [exit] Launching FMC @ 0x40000130
3,164,703 UART:
3,164,719 UART: Running Caliptra FMC ...
3,165,127 UART:
3,165,270 UART: [state] CFI Enabled
3,175,629 UART: [fht] FMC Alias Private Key: 7
3,283,512 UART: [art] Extend RT PCRs Done
3,283,940 UART: [art] Lock RT PCRs Done
3,285,232 UART: [art] Populate DV Done
3,293,739 UART: [fht] FMC Alias Private Key: 7
3,294,667 UART: [art] Derive CDI
3,294,947 UART: [art] Store in in slot 0x4
3,380,796 UART: [art] Derive Key Pair
3,381,156 UART: [art] Store priv key in slot 0x5
3,395,136 UART: [art] Derive Key Pair - Done
3,409,906 UART: [art] Signing Cert with AUTHO
3,410,386 UART: RITY.KEYID = 7
3,425,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,701 UART: [art] PUB.X = 37896892BE02D2393E3DF1FD78B2AB6A0EA4F1B6D1208725CA6260801F462BB8D19BFA52D2188E6A382A93B3C4169CAF
3,433,473 UART: [art] PUB.Y = C3FED516DAFA5340D9D653F2B7CC7216EDD4B145407D4DBF79F4175844DFAF8387A09326A32096CD49DE0CB729A2C2FE
3,440,436 UART: [art] SIG.R = A7F540D4671C0AA450AA915B5CFC8919D4D42A483ECE84D77A504AF5BEFBD360C5E5BDDA5F57080D21EDB5B6D9B9D267
3,447,219 UART: [art] SIG.S = BCA3F753768BDAF9BDC0C53E338826AD4B7DDD446D9492AC34102462F2D2526F143003CD2475A6D4DFBD98488DC61AB3
3,470,585 UART: Caliptra RT
3,470,930 UART: [state] CFI Enabled
3,579,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,178 UART: [rt]cmd =0x50435251, len=36
3,777,499 >>> mbox cmd response data (1848 bytes)
3,777,500 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,181 UART: [rt]cmd =0x50435245, len=56
3,810,791 >>> mbox cmd response data (8 bytes)
3,810,792 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,377 UART: [rt]cmd =0x50435251, len=36
4,007,614 >>> mbox cmd response data (1848 bytes)
4,007,615 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,312 UART: [rt]cmd =0x50435245, len=56
4,040,884 >>> mbox cmd response data (8 bytes)
4,040,885 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,516 UART: [rt]cmd =0x50435251, len=36
4,238,003 >>> mbox cmd response data (1848 bytes)
4,238,004 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,267,703 UART: [rt]cmd =0x50435245, len=56
4,271,551 >>> mbox cmd response data (8 bytes)
4,271,552 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,301,271 UART: [rt]cmd =0x50435251, len=36
4,468,474 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 ready_for_fw is high
1,363,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,571 >>> mbox cmd response: success
2,925,571 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,987,655 UART:
2,987,671 UART: Running Caliptra FMC ...
2,988,079 UART:
2,988,222 UART: [state] CFI Enabled
2,998,975 UART: [fht] FMC Alias Private Key: 7
3,106,856 UART: [art] Extend RT PCRs Done
3,107,284 UART: [art] Lock RT PCRs Done
3,108,870 UART: [art] Populate DV Done
3,117,201 UART: [fht] FMC Alias Private Key: 7
3,118,237 UART: [art] Derive CDI
3,118,517 UART: [art] Store in in slot 0x4
3,204,452 UART: [art] Derive Key Pair
3,204,812 UART: [art] Store priv key in slot 0x5
3,218,698 UART: [art] Derive Key Pair - Done
3,233,632 UART: [art] Signing Cert with AUTHO
3,234,112 UART: RITY.KEYID = 7
3,249,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,121 UART: [art] PUB.X = BD493A2A76BAD90D75B1EA86383ED4E92D94A31480A51BEDF310B04BD982B8BBC877AFBCAD6BD8D3485E6D0C76FFD14F
3,256,911 UART: [art] PUB.Y = 2DC17F019722CF0F3933ADD56FDA397DC18BC79E4E23482269690EC42935BA23E990BD13C45E7822A5356DFDD81B5190
3,263,856 UART: [art] SIG.R = A11B8C9728AC2B20729E99A5F4A15EAD5D242955593669D84BD18E64B415082FBD91BB6F102DB41502C555E9640FDF7C
3,270,621 UART: [art] SIG.S = 3427B536D09C3F2073392B29BFECE72267B4573B595F0CCF3CD895A4DBB9EFDD1A2C9F36BB57A08350E93AD4C3D35C7A
3,294,307 UART: Caliptra RT
3,294,652 UART: [state] CFI Enabled
3,402,715 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,573 UART: [rt]cmd =0x50435251, len=36
3,600,710 >>> mbox cmd response data (1848 bytes)
3,600,711 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,286 UART: [rt]cmd =0x50435245, len=56
3,633,860 >>> mbox cmd response data (8 bytes)
3,633,861 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,460 UART: [rt]cmd =0x50435251, len=36
3,830,657 >>> mbox cmd response data (1848 bytes)
3,830,658 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,287 UART: [rt]cmd =0x50435245, len=56
3,863,965 >>> mbox cmd response data (8 bytes)
3,863,966 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,411 UART: [rt]cmd =0x50435251, len=36
4,060,798 >>> mbox cmd response data (1848 bytes)
4,060,799 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,512 UART: [rt]cmd =0x50435245, len=56
4,094,076 >>> mbox cmd response data (8 bytes)
4,094,077 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,508 UART: [rt]cmd =0x50435251, len=36
4,290,573 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,582 UART: [kat] SHA2-512-ACC
908,483 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,653 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,590 UART: [idev] ++
1,174,758 UART: [idev] CDI.KEYID = 6
1,175,118 UART: [idev] SUBJECT.KEYID = 7
1,175,542 UART: [idev] UDS.KEYID = 0
1,175,887 ready_for_fw is high
1,175,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,186 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,208,869 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,888 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,619 >>> mbox cmd response: success
2,770,619 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,771,713 UART: [afmc] ++
2,771,881 UART: [afmc] CDI.KEYID = 6
2,772,243 UART: [afmc] SUBJECT.KEYID = 7
2,772,668 UART: [afmc] AUTHORITY.KEYID = 5
2,808,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,296 UART: [afmc] --
2,851,294 UART: [cold-reset] --
2,852,092 UART: [state] Locking Datavault
2,853,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,781 UART: [state] Locking ICCM
2,854,317 UART: [exit] Launching FMC @ 0x40000130
2,859,646 UART:
2,859,662 UART: Running Caliptra FMC ...
2,860,070 UART:
2,860,124 UART: [state] CFI Enabled
2,870,769 UART: [fht] FMC Alias Private Key: 7
2,979,228 UART: [art] Extend RT PCRs Done
2,979,656 UART: [art] Lock RT PCRs Done
2,980,940 UART: [art] Populate DV Done
2,989,263 UART: [fht] FMC Alias Private Key: 7
2,990,425 UART: [art] Derive CDI
2,990,705 UART: [art] Store in in slot 0x4
3,076,414 UART: [art] Derive Key Pair
3,076,774 UART: [art] Store priv key in slot 0x5
3,090,568 UART: [art] Derive Key Pair - Done
3,105,467 UART: [art] Signing Cert with AUTHO
3,105,947 UART: RITY.KEYID = 7
3,121,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,914 UART: [art] PUB.X = 10B7EF99226C23CDAA41570E3829720BD08563C6057AC12B78E4B41FD971892D44CCC82B5A3CA14B4B717BD197C0EB02
3,128,678 UART: [art] PUB.Y = 3C6D8AC1B4C59C80DB6073CAD2288DB8ACA7F093337CADED01979933B51A9B805C2222FBD0C6EC9CCDABB6E733DFEA71
3,135,651 UART: [art] SIG.R = C83F8AF6D234E50B0CBF708D0C68C48724C32FA16CFDEDF3EFBAB4DC7D5978BA7D95BE57AB6F63FA91BB28D5DDC71DB8
3,142,446 UART: [art] SIG.S = A4FE05310EEBE66FD4AF144BD8764B9215CA0CCCFDF74273BB460FD2488E678B240443719DFF96B58D80DEEEE51AB04D
3,166,442 UART: Caliptra RT
3,166,695 UART: [state] CFI Enabled
3,273,819 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,359 UART: [rt]cmd =0x50435251, len=36
3,471,648 >>> mbox cmd response data (1848 bytes)
3,471,649 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,108 UART: [rt]cmd =0x50435245, len=56
3,504,714 >>> mbox cmd response data (8 bytes)
3,504,715 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,366 UART: [rt]cmd =0x50435251, len=36
3,701,809 >>> mbox cmd response data (1848 bytes)
3,701,810 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,731,525 UART: [rt]cmd =0x50435245, len=56
3,734,981 >>> mbox cmd response data (8 bytes)
3,734,982 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,675 UART: [rt]cmd =0x50435251, len=36
3,932,144 >>> mbox cmd response data (1848 bytes)
3,932,145 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,080 UART: [rt]cmd =0x50435245, len=56
3,965,728 >>> mbox cmd response data (8 bytes)
3,965,729 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,444 UART: [rt]cmd =0x50435251, len=36
4,162,525 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,765 ready_for_fw is high
1,060,765 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,230 >>> mbox cmd response: success
2,623,230 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,684,826 UART:
2,684,842 UART: Running Caliptra FMC ...
2,685,250 UART:
2,685,304 UART: [state] CFI Enabled
2,696,065 UART: [fht] FMC Alias Private Key: 7
2,803,994 UART: [art] Extend RT PCRs Done
2,804,422 UART: [art] Lock RT PCRs Done
2,805,946 UART: [art] Populate DV Done
2,814,255 UART: [fht] FMC Alias Private Key: 7
2,815,385 UART: [art] Derive CDI
2,815,665 UART: [art] Store in in slot 0x4
2,900,980 UART: [art] Derive Key Pair
2,901,340 UART: [art] Store priv key in slot 0x5
2,914,238 UART: [art] Derive Key Pair - Done
2,929,249 UART: [art] Signing Cert with AUTHO
2,929,729 UART: RITY.KEYID = 7
2,944,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,048 UART: [art] PUB.X = 3B5CAF606FDB122D3299510C3CA19B51D9D5C6B7CEF16E2CE5433A13563961C751F35CBC46F3288F77A4FEFA14E8039C
2,951,824 UART: [art] PUB.Y = 915C6670EB45609964B486DBAC39C215E4CB6C62EE477ADFC2CA7423934AE9EB7D4093DBC7DFA07613AD04E30D653B98
2,958,780 UART: [art] SIG.R = 18783698AD0758981CE1D05FD29940160A747EB8D15A596EC330D2B1AB8F1CD11C6CCB4E7CF0FABF11A8A8E65B472D4D
2,965,558 UART: [art] SIG.S = 56EC51A46009C5B224A3EF54D8BE1EA0C5CE63C9C060ADDD87E48E41F66EB1A5E45FD2C47624408FBD1EF4B32FD1A082
2,988,946 UART: Caliptra RT
2,989,199 UART: [state] CFI Enabled
3,097,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,912 UART: [rt]cmd =0x50435251, len=36
3,295,245 >>> mbox cmd response data (1848 bytes)
3,295,246 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,951 UART: [rt]cmd =0x50435245, len=56
3,328,515 >>> mbox cmd response data (8 bytes)
3,328,516 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,241 UART: [rt]cmd =0x50435251, len=36
3,525,384 >>> mbox cmd response data (1848 bytes)
3,525,385 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,884 UART: [rt]cmd =0x50435245, len=56
3,558,338 >>> mbox cmd response data (8 bytes)
3,558,339 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,968 UART: [rt]cmd =0x50435251, len=36
3,755,555 >>> mbox cmd response data (1848 bytes)
3,755,556 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,349 UART: [rt]cmd =0x50435245, len=56
3,789,155 >>> mbox cmd response data (8 bytes)
3,789,156 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,751 UART: [rt]cmd =0x50435251, len=36
3,986,226 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
894,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,164 UART: [kat] ++
898,316 UART: [kat] sha1
902,728 UART: [kat] SHA2-256
904,668 UART: [kat] SHA2-384
907,361 UART: [kat] SHA2-512-ACC
909,262 UART: [kat] ECC-384
919,109 UART: [kat] HMAC-384Kdf
923,859 UART: [kat] LMS
1,172,187 UART: [kat] --
1,172,906 UART: [cold-reset] ++
1,173,414 UART: [fht] FHT @ 0x50003400
1,176,203 UART: [idev] ++
1,176,371 UART: [idev] CDI.KEYID = 6
1,176,731 UART: [idev] SUBJECT.KEYID = 7
1,177,155 UART: [idev] UDS.KEYID = 0
1,177,500 ready_for_fw is high
1,177,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,359 UART: [idev] Erasing UDS.KEYID = 0
1,202,226 UART: [idev] Sha1 KeyId Algorithm
1,210,768 UART: [idev] --
1,211,880 UART: [ldev] ++
1,212,048 UART: [ldev] CDI.KEYID = 6
1,212,411 UART: [ldev] SUBJECT.KEYID = 5
1,212,837 UART: [ldev] AUTHORITY.KEYID = 7
1,213,300 UART: [ldev] FE.KEYID = 1
1,218,692 UART: [ldev] Erasing FE.KEYID = 1
1,244,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,938 UART: [ldev] --
1,284,227 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,034 >>> mbox cmd response: success
2,773,034 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,774,274 UART: [afmc] ++
2,774,442 UART: [afmc] CDI.KEYID = 6
2,774,804 UART: [afmc] SUBJECT.KEYID = 7
2,775,229 UART: [afmc] AUTHORITY.KEYID = 5
2,811,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,985 UART: [afmc] --
2,855,007 UART: [cold-reset] --
2,855,775 UART: [state] Locking Datavault
2,857,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,606 UART: [state] Locking ICCM
2,858,210 UART: [exit] Launching FMC @ 0x40000130
2,863,539 UART:
2,863,555 UART: Running Caliptra FMC ...
2,863,963 UART:
2,864,106 UART: [state] CFI Enabled
2,874,963 UART: [fht] FMC Alias Private Key: 7
2,983,644 UART: [art] Extend RT PCRs Done
2,984,072 UART: [art] Lock RT PCRs Done
2,985,858 UART: [art] Populate DV Done
2,993,859 UART: [fht] FMC Alias Private Key: 7
2,995,027 UART: [art] Derive CDI
2,995,307 UART: [art] Store in in slot 0x4
3,080,708 UART: [art] Derive Key Pair
3,081,068 UART: [art] Store priv key in slot 0x5
3,094,960 UART: [art] Derive Key Pair - Done
3,109,691 UART: [art] Signing Cert with AUTHO
3,110,171 UART: RITY.KEYID = 7
3,125,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,806 UART: [art] PUB.X = 4796993455F033286424A6E7F9919C60B7107001615AAA0B50371ADF8D47FEC78B2A007FD9ADA5203AE866C4E500FC1C
3,132,526 UART: [art] PUB.Y = 6C7488DF5FE0F1C197C15FB7839D8103E57778C72064326D23E1520BE6D99C944F4D89A1ED1B3E3C591A08FAE4F0388A
3,139,471 UART: [art] SIG.R = 3EF37DB036980A9205B79FBECC93C9BE4124C6D80770C9A082D49CCC11258680DB3795A457A7F647E864C3CE734A09E9
3,146,233 UART: [art] SIG.S = AED542F90544093EEAB5A77F32D26A50A2AF26D0A6D3D8EBA0C770BFD183082C375FB11AB27FF562949188C2382CB68C
3,170,259 UART: Caliptra RT
3,170,604 UART: [state] CFI Enabled
3,278,191 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,175 UART: [rt]cmd =0x50435251, len=36
3,476,598 >>> mbox cmd response data (1848 bytes)
3,476,599 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,178 UART: [rt]cmd =0x50435245, len=56
3,509,992 >>> mbox cmd response data (8 bytes)
3,509,993 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,566 UART: [rt]cmd =0x50435251, len=36
3,706,959 >>> mbox cmd response data (1848 bytes)
3,706,960 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,599 UART: [rt]cmd =0x50435245, len=56
3,740,331 >>> mbox cmd response data (8 bytes)
3,740,332 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,675 UART: [rt]cmd =0x50435251, len=36
3,937,178 >>> mbox cmd response data (1848 bytes)
3,937,179 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,712 UART: [rt]cmd =0x50435245, len=56
3,970,096 >>> mbox cmd response data (8 bytes)
3,970,097 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,662 UART: [rt]cmd =0x50435251, len=36
4,166,893 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,212 ready_for_fw is high
1,060,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,397 >>> mbox cmd response: success
2,623,397 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,685,479 UART:
2,685,495 UART: Running Caliptra FMC ...
2,685,903 UART:
2,686,046 UART: [state] CFI Enabled
2,696,909 UART: [fht] FMC Alias Private Key: 7
2,804,010 UART: [art] Extend RT PCRs Done
2,804,438 UART: [art] Lock RT PCRs Done
2,805,982 UART: [art] Populate DV Done
2,814,191 UART: [fht] FMC Alias Private Key: 7
2,815,359 UART: [art] Derive CDI
2,815,639 UART: [art] Store in in slot 0x4
2,900,858 UART: [art] Derive Key Pair
2,901,218 UART: [art] Store priv key in slot 0x5
2,915,086 UART: [art] Derive Key Pair - Done
2,929,813 UART: [art] Signing Cert with AUTHO
2,930,293 UART: RITY.KEYID = 7
2,945,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,308 UART: [art] PUB.X = 08DB47EF472130D781E3E4B78761150B76D194994BE3D7C67958E3D3F2966714A4BF95A3480DD17CBDFA35CAB51C4A60
2,953,073 UART: [art] PUB.Y = CAB8C5A1D0AC70F09D2D45E91EE3FCD5D94179C5B2023759CB09D847F547F72203FC7A724F51C23EC35657C2A8AB88EB
2,960,028 UART: [art] SIG.R = 510DF0D1FF2D7524A4D7BF096DEBF962AE4C9A29F1BDFF90F0C3D1EA4F2FD7B530826583DD7C4244ABC89A4180D1F29E
2,966,814 UART: [art] SIG.S = 56ECC87B245769D9651A9EC5406CE9397092E97259587B0203580047414DC34C1627B65041AE78C7AD51E03FDA3AE29E
2,991,351 UART: Caliptra RT
2,991,696 UART: [state] CFI Enabled
3,098,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,653 UART: [rt]cmd =0x50435251, len=36
3,297,156 >>> mbox cmd response data (1848 bytes)
3,297,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,878 UART: [rt]cmd =0x50435245, len=56
3,330,518 >>> mbox cmd response data (8 bytes)
3,330,519 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,054 UART: [rt]cmd =0x50435251, len=36
3,527,273 >>> mbox cmd response data (1848 bytes)
3,527,274 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,977 UART: [rt]cmd =0x50435245, len=56
3,560,677 >>> mbox cmd response data (8 bytes)
3,560,678 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,590,259 UART: [rt]cmd =0x50435251, len=36
3,757,720 >>> mbox cmd response data (1848 bytes)
3,757,721 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,234 UART: [rt]cmd =0x50435245, len=56
3,790,768 >>> mbox cmd response data (8 bytes)
3,790,769 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,390 UART: [rt]cmd =0x50435251, len=36
3,988,029 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,173,883 ready_for_fw is high
1,173,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,413 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,754 UART: [ldev] --
1,281,230 UART: [fwproc] Wait for Commands...
1,281,873 UART: [fwproc] Recv command 0x46574c44
1,282,606 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,471 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,849 >>> mbox cmd response: success
2,769,849 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,770,874 UART: [afmc] ++
2,771,042 UART: [afmc] CDI.KEYID = 6
2,771,405 UART: [afmc] SUBJECT.KEYID = 7
2,771,831 UART: [afmc] AUTHORITY.KEYID = 5
2,807,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,575 UART: [afmc] --
2,850,657 UART: [cold-reset] --
2,851,301 UART: [state] Locking Datavault
2,852,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,844 UART: [state] Locking ICCM
2,853,356 UART: [exit] Launching FMC @ 0x40000130
2,858,685 UART:
2,858,701 UART: Running Caliptra FMC ...
2,859,109 UART:
2,859,163 UART: [state] CFI Enabled
2,869,536 UART: [fht] FMC Alias Private Key: 7
2,977,805 UART: [art] Extend RT PCRs Done
2,978,233 UART: [art] Lock RT PCRs Done
2,979,787 UART: [art] Populate DV Done
2,988,002 UART: [fht] FMC Alias Private Key: 7
2,989,110 UART: [art] Derive CDI
2,989,390 UART: [art] Store in in slot 0x4
3,075,249 UART: [art] Derive Key Pair
3,075,609 UART: [art] Store priv key in slot 0x5
3,088,901 UART: [art] Derive Key Pair - Done
3,103,441 UART: [art] Signing Cert with AUTHO
3,103,921 UART: RITY.KEYID = 7
3,118,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,384 UART: [art] PUB.X = 954597D59105B8DEAA490B0E48AA05E1B82130A2C0D9969A253ED8870E6FBECA9A4191DD9D3D896E724952B556F1D6D3
3,126,145 UART: [art] PUB.Y = FA5C6ABB12461AAD3947065A5CFEA931EA24F97170657621347E48D57F05E54B5309859907AFBBE0B5A6FA80DCC59315
3,133,089 UART: [art] SIG.R = 57708DB2907A1F40B8EED1625D49B8EE0ECF2111F5190DF16834A426FF97ED344CEB74FD7BEC15FC7C905D1CF1A2EE08
3,139,868 UART: [art] SIG.S = F768C98940B4C51915A56C79B6AB23C2AA00E6C9DC7C03F0AD2EEA17449F231DF04C99ED326C21B9CCDA2FE77B12E260
3,164,064 UART: Caliptra RT
3,164,317 UART: [state] CFI Enabled
3,272,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,358 UART: [rt]cmd =0x50435251, len=36
3,470,395 >>> mbox cmd response data (1848 bytes)
3,470,396 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,127 UART: [rt]cmd =0x50435245, len=56
3,503,583 >>> mbox cmd response data (8 bytes)
3,503,584 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,001 UART: [rt]cmd =0x50435251, len=36
3,700,276 >>> mbox cmd response data (1848 bytes)
3,700,277 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,730,006 UART: [rt]cmd =0x50435245, len=56
3,733,762 >>> mbox cmd response data (8 bytes)
3,733,763 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,298 UART: [rt]cmd =0x50435251, len=36
3,930,643 >>> mbox cmd response data (1848 bytes)
3,930,644 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,960,335 UART: [rt]cmd =0x50435245, len=56
3,964,013 >>> mbox cmd response data (8 bytes)
3,964,014 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,993,799 UART: [rt]cmd =0x50435251, len=36
4,160,950 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,436 ready_for_fw is high
1,056,436 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,803 >>> mbox cmd response: success
2,618,803 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,679,977 UART:
2,679,993 UART: Running Caliptra FMC ...
2,680,401 UART:
2,680,455 UART: [state] CFI Enabled
2,690,556 UART: [fht] FMC Alias Private Key: 7
2,798,751 UART: [art] Extend RT PCRs Done
2,799,179 UART: [art] Lock RT PCRs Done
2,800,739 UART: [art] Populate DV Done
2,808,804 UART: [fht] FMC Alias Private Key: 7
2,809,866 UART: [art] Derive CDI
2,810,146 UART: [art] Store in in slot 0x4
2,896,165 UART: [art] Derive Key Pair
2,896,525 UART: [art] Store priv key in slot 0x5
2,909,475 UART: [art] Derive Key Pair - Done
2,924,266 UART: [art] Signing Cert with AUTHO
2,924,746 UART: RITY.KEYID = 7
2,939,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,363 UART: [art] PUB.X = AB6E24E73DD9FD72AA4A74210144715F9FC23B43065B063796BBFEF2A28FE8747CD1185F226576B4B9040105C717CE36
2,947,117 UART: [art] PUB.Y = 63030CCF146E866BF68B1CBC0CAD6CA405A0886AFFA890053CC5DDDF77A8FCC7A1CEA1C37987D572A4B6A496C04FC610
2,954,074 UART: [art] SIG.R = 009A73F063BC9C048A54E17418417E738EE218878F8633C050FDFD208047A8B2246034864CC187DC46D87D3D478C001E
2,960,789 UART: [art] SIG.S = D3E2FBED0F9FAF992887FB1000377079E9BC4C0FE3CE5EEAA10E410362EB4EDEDD11212D9138E04579CCA74DE4FCE209
2,984,591 UART: Caliptra RT
2,984,844 UART: [state] CFI Enabled
3,092,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,260 UART: [rt]cmd =0x50435251, len=36
3,290,993 >>> mbox cmd response data (1848 bytes)
3,290,994 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,907 UART: [rt]cmd =0x50435245, len=56
3,324,581 >>> mbox cmd response data (8 bytes)
3,324,582 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,043 UART: [rt]cmd =0x50435251, len=36
3,521,320 >>> mbox cmd response data (1848 bytes)
3,521,321 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,070 UART: [rt]cmd =0x50435245, len=56
3,554,482 >>> mbox cmd response data (8 bytes)
3,554,483 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,862 UART: [rt]cmd =0x50435251, len=36
3,751,393 >>> mbox cmd response data (1848 bytes)
3,751,394 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,131 UART: [rt]cmd =0x50435245, len=56
3,784,753 >>> mbox cmd response data (8 bytes)
3,784,754 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,357 UART: [rt]cmd =0x50435251, len=36
3,981,556 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,167 UART: [fwproc] Wait for Commands...
1,282,946 UART: [fwproc] Recv command 0x46574c44
1,283,679 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,010 >>> mbox cmd response: success
2,771,010 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,772,151 UART: [afmc] ++
2,772,319 UART: [afmc] CDI.KEYID = 6
2,772,682 UART: [afmc] SUBJECT.KEYID = 7
2,773,108 UART: [afmc] AUTHORITY.KEYID = 5
2,808,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,149 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,798 UART: [afmc] --
2,851,854 UART: [cold-reset] --
2,852,504 UART: [state] Locking Datavault
2,853,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,439 UART: [state] Locking ICCM
2,854,993 UART: [exit] Launching FMC @ 0x40000130
2,860,322 UART:
2,860,338 UART: Running Caliptra FMC ...
2,860,746 UART:
2,860,889 UART: [state] CFI Enabled
2,871,738 UART: [fht] FMC Alias Private Key: 7
2,979,893 UART: [art] Extend RT PCRs Done
2,980,321 UART: [art] Lock RT PCRs Done
2,981,713 UART: [art] Populate DV Done
2,989,994 UART: [fht] FMC Alias Private Key: 7
2,991,130 UART: [art] Derive CDI
2,991,410 UART: [art] Store in in slot 0x4
3,077,103 UART: [art] Derive Key Pair
3,077,463 UART: [art] Store priv key in slot 0x5
3,090,511 UART: [art] Derive Key Pair - Done
3,105,505 UART: [art] Signing Cert with AUTHO
3,105,985 UART: RITY.KEYID = 7
3,121,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,542 UART: [art] PUB.X = 46066AE1F73D087F4EB776D812E9A181039388912C67C028BCE74B3AF9FB971DBF238EFAFBEB91E9263508588ADF2BB9
3,129,310 UART: [art] PUB.Y = 787801B0B5219039DAD3DAB4E8FF2A0C2D93A804F10A12824CB69422EE2AFB4B4F95C001D1799DC5F52A888F3432E844
3,136,251 UART: [art] SIG.R = 0B0444713F89CA9A862F6845AC76CB088A965680F9430B7754A10FA9209BE642FAF007D1D61D473B113A64CE249453C4
3,142,999 UART: [art] SIG.S = A791977372428ABB4127E1FAFE311EDC47EBE7D9CB4EB47A5F075C5F935434583C0430E82DD58854687A98A870C79B01
3,166,997 UART: Caliptra RT
3,167,342 UART: [state] CFI Enabled
3,275,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,419 UART: [rt]cmd =0x50435251, len=36
3,473,700 >>> mbox cmd response data (1848 bytes)
3,473,701 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,562 UART: [rt]cmd =0x50435245, len=56
3,507,428 >>> mbox cmd response data (8 bytes)
3,507,429 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,138 UART: [rt]cmd =0x50435251, len=36
3,704,343 >>> mbox cmd response data (1848 bytes)
3,704,344 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,267 UART: [rt]cmd =0x50435245, len=56
3,737,853 >>> mbox cmd response data (8 bytes)
3,737,854 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,525 UART: [rt]cmd =0x50435251, len=36
3,934,978 >>> mbox cmd response data (1848 bytes)
3,934,979 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,804 UART: [rt]cmd =0x50435245, len=56
3,968,458 >>> mbox cmd response data (8 bytes)
3,968,459 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,998,114 UART: [rt]cmd =0x50435251, len=36
4,165,283 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,857 ready_for_fw is high
1,055,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,136 >>> mbox cmd response: success
2,620,136 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,682,578 UART:
2,682,594 UART: Running Caliptra FMC ...
2,683,002 UART:
2,683,145 UART: [state] CFI Enabled
2,693,630 UART: [fht] FMC Alias Private Key: 7
2,801,319 UART: [art] Extend RT PCRs Done
2,801,747 UART: [art] Lock RT PCRs Done
2,803,043 UART: [art] Populate DV Done
2,811,114 UART: [fht] FMC Alias Private Key: 7
2,812,182 UART: [art] Derive CDI
2,812,462 UART: [art] Store in in slot 0x4
2,898,419 UART: [art] Derive Key Pair
2,898,779 UART: [art] Store priv key in slot 0x5
2,912,131 UART: [art] Derive Key Pair - Done
2,926,911 UART: [art] Signing Cert with AUTHO
2,927,391 UART: RITY.KEYID = 7
2,942,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,948 UART: [art] PUB.X = 4FAC90C9C95C0891A69E7255F0D832E7D7AF9D8F766EC4F98EA60BB3265486BCAD9455201CD7966189CF80AD1911BE9D
2,949,722 UART: [art] PUB.Y = E98A0523B703F667D601CB8BA87F729C74E3EA6B20C232186F28951B6975DF06AC06DD9A1EFFE6D5B9974A1CC7AFD23D
2,956,671 UART: [art] SIG.R = 8798A4A644E74F7C618A0E33BFAA5F5FD5653F490D2EC4FDF0F6F072BF45FA1F834A5A3721DB96956A572E3B35D25F93
2,963,447 UART: [art] SIG.S = 1989C7EE1E0EF456C61C5894FC8C13327545EE093A4CD2DBC2DED4FD5CD6938FB269A33599C43C73102B378657CA5171
2,987,190 UART: Caliptra RT
2,987,535 UART: [state] CFI Enabled
3,095,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,042 UART: [rt]cmd =0x50435251, len=36
3,293,669 >>> mbox cmd response data (1848 bytes)
3,293,670 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,277 UART: [rt]cmd =0x50435245, len=56
3,326,951 >>> mbox cmd response data (8 bytes)
3,326,952 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,721 UART: [rt]cmd =0x50435251, len=36
3,524,358 >>> mbox cmd response data (1848 bytes)
3,524,359 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,282 UART: [rt]cmd =0x50435245, len=56
3,557,748 >>> mbox cmd response data (8 bytes)
3,557,749 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,587,536 UART: [rt]cmd =0x50435251, len=36
3,755,027 >>> mbox cmd response data (1848 bytes)
3,755,028 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,873 UART: [rt]cmd =0x50435245, len=56
3,788,611 >>> mbox cmd response data (8 bytes)
3,788,612 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,137 UART: [rt]cmd =0x50435251, len=36
3,985,526 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,176 UART:
192,546 UART: Running Caliptra ROM ...
193,719 UART:
193,877 UART: [state] CFI Enabled
266,051 UART: [state] LifecycleState = Unprovisioned
267,960 UART: [state] DebugLocked = No
269,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,927 UART: [kat] SHA2-256
444,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,998 UART: [kat] ++
455,451 UART: [kat] sha1
467,337 UART: [kat] SHA2-256
469,989 UART: [kat] SHA2-384
475,485 UART: [kat] SHA2-512-ACC
477,851 UART: [kat] ECC-384
2,768,773 UART: [kat] HMAC-384Kdf
2,779,806 UART: [kat] LMS
3,970,074 UART: [kat] --
3,976,439 UART: [cold-reset] ++
3,978,446 UART: [fht] Storing FHT @ 0x50003400
3,990,282 UART: [idev] ++
3,990,856 UART: [idev] CDI.KEYID = 6
3,991,741 UART: [idev] SUBJECT.KEYID = 7
3,992,984 UART: [idev] UDS.KEYID = 0
3,994,015 ready_for_fw is high
3,994,220 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,137,301 UART: [idev] Erasing UDS.KEYID = 0
7,328,228 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,254 UART: [idev] --
7,354,474 UART: [ldev] ++
7,355,049 UART: [ldev] CDI.KEYID = 6
7,356,033 UART: [ldev] SUBJECT.KEYID = 5
7,357,259 UART: [ldev] AUTHORITY.KEYID = 7
7,358,496 UART: [ldev] FE.KEYID = 1
7,404,528 UART: [ldev] Erasing FE.KEYID = 1
10,736,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,805 UART: [ldev] --
13,100,026 UART: [fwproc] Waiting for Commands...
13,103,316 UART: [fwproc] Received command 0x46574c44
13,105,521 UART: [fwproc] Received Image of size 113760 bytes
17,161,765 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,620,380 >>> mbox cmd response: success
17,620,945 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,623,769 UART: [afmc] ++
17,624,354 UART: [afmc] CDI.KEYID = 6
17,625,372 UART: [afmc] SUBJECT.KEYID = 7
17,626,535 UART: [afmc] AUTHORITY.KEYID = 5
20,987,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,865 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,280 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,144 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,553 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,502 UART: [afmc] --
23,359,857 UART: [cold-reset] --
23,362,959 UART: [state] Locking Datavault
23,368,364 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,068 UART: [state] Locking ICCM
23,371,424 UART: [exit] Launching FMC @ 0x40000130
23,379,821 UART:
23,380,055 UART: Running Caliptra FMC ...
23,381,160 UART:
23,381,325 UART: [state] CFI Enabled
23,446,839 UART: [fht] FMC Alias Private Key: 7
25,784,670 UART: [art] Extend RT PCRs Done
25,785,891 UART: [art] Lock RT PCRs Done
25,787,489 UART: [art] Populate DV Done
25,793,121 UART: [fht] FMC Alias Private Key: 7
25,794,821 UART: [art] Derive CDI
25,795,851 UART: [art] Store in in slot 0x4
25,856,176 UART: [art] Derive Key Pair
25,857,182 UART: [art] Store priv key in slot 0x5
29,150,153 UART: [art] Derive Key Pair - Done
29,163,393 UART: [art] Signing Cert with AUTHO
29,164,768 UART: RITY.KEYID = 7
31,451,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,788 UART: [art] PUB.X = BC885FFAB31A95FBD8AC039B1DB1A6CE690A4032D41F433BC19775868167F8A7144182FBD485EEB374FCEBC8E5B871D5
31,460,666 UART: [art] PUB.Y = EEFAC3E3CC98EFD83B8E37105C76543C57DAD79CC6D4BF12C36998479742F2489954C088701DFF779EB07F085FD4E3F0
31,467,902 UART: [art] SIG.R = A9950C81A563933D12E0997421EF33AE899D7F206635795570D8C3BDAC7ABD48FA65F7C17E238E2CE9CF619CD5FFD84F
31,475,486 UART: [art] SIG.S = 38784547C0727B78C0DCD88763196C8F25500CC453A7F422825EBD016500270768A3EEB9445244C321539FCB985C7D97
32,780,990 UART: Caliptra RT
32,781,688 UART: [state] CFI Enabled
32,956,211 UART: [rt] RT listening for mailbox commands...
32,988,085 UART: [rt]cmd =0x50435245, len=56
32,989,573 >>> mbox cmd response: failed
32,989,975 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,020,259 UART: [rt]cmd =0x50435245, len=56
33,021,781 >>> mbox cmd response: failed
33,022,047 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,052,137 UART: [rt]cmd =0x50435245, len=56
33,053,560 >>> mbox cmd response: failed
33,053,823 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,083,917 UART: [rt]cmd =0x50435245, len=56
33,085,762 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,783,756 ready_for_fw is high
3,784,368 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,842,801 >>> mbox cmd response: success
17,843,460 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,526,364 UART:
23,526,791 UART: Running Caliptra FMC ...
23,527,912 UART:
23,528,070 UART: [state] CFI Enabled
23,598,794 UART: [fht] FMC Alias Private Key: 7
25,936,018 UART: [art] Extend RT PCRs Done
25,937,245 UART: [art] Lock RT PCRs Done
25,939,210 UART: [art] Populate DV Done
25,944,896 UART: [fht] FMC Alias Private Key: 7
25,946,436 UART: [art] Derive CDI
25,947,252 UART: [art] Store in in slot 0x4
26,007,344 UART: [art] Derive Key Pair
26,008,372 UART: [art] Store priv key in slot 0x5
29,300,815 UART: [art] Derive Key Pair - Done
29,313,817 UART: [art] Signing Cert with AUTHO
29,315,123 UART: RITY.KEYID = 7
31,603,378 UART: [art] Erasing AUTHORITY.KEYID = 7
31,604,891 UART: [art] PUB.X = 03616BA65587EC0A0ADBC1B92157381592D4A2850D6167743F8BCBB769D4AEE9F153A9CB354B8C7F98786E9B7FC790B4
31,612,145 UART: [art] PUB.Y = 7A2D6AEF1C43E13A44E79AAC33CA73B8FB06B9CCA1AA6CAF8086AE71FEB3FF3BC237C5D60DDD2CDEF5D034564F906EE5
31,619,441 UART: [art] SIG.R = 8C995FA888F4CC20C97B311044F987FB63459E9158AA7355E7E0ADE82E05167455350316195254656F4D86728B87A91D
31,626,810 UART: [art] SIG.S = E43BD587E8E667CFC7284A01FD0468C50C16297249CEE4DA09F9710DAFF383953C5C2D57E53F94EF4B501CA98CB95CD0
32,931,902 UART: Caliptra RT
32,932,606 UART: [state] CFI Enabled
33,094,731 UART: [rt] RT listening for mailbox commands...
33,126,367 UART: [rt]cmd =0x50435245, len=56
33,128,279 >>> mbox cmd response: failed
33,128,624 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,158,676 UART: [rt]cmd =0x50435245, len=56
33,160,275 >>> mbox cmd response: failed
33,160,543 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,191,004 UART: [rt]cmd =0x50435245, len=56
33,192,492 >>> mbox cmd response: failed
33,192,747 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,222,940 UART: [rt]cmd =0x50435245, len=56
33,224,462 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,613 writing to cptra_bootfsm_go
192,833 UART:
193,220 UART: Running Caliptra ROM ...
194,361 UART:
604,109 UART: [state] CFI Enabled
620,717 UART: [state] LifecycleState = Unprovisioned
622,625 UART: [state] DebugLocked = No
625,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,714 UART: [kat] SHA2-256
800,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,029 UART: [kat] ++
811,503 UART: [kat] sha1
821,591 UART: [kat] SHA2-256
824,312 UART: [kat] SHA2-384
829,870 UART: [kat] SHA2-512-ACC
832,232 UART: [kat] ECC-384
3,115,818 UART: [kat] HMAC-384Kdf
3,128,024 UART: [kat] LMS
4,318,156 UART: [kat] --
4,322,195 UART: [cold-reset] ++
4,324,202 UART: [fht] Storing FHT @ 0x50003400
4,335,679 UART: [idev] ++
4,336,238 UART: [idev] CDI.KEYID = 6
4,337,191 UART: [idev] SUBJECT.KEYID = 7
4,338,425 UART: [idev] UDS.KEYID = 0
4,339,620 ready_for_fw is high
4,339,852 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,466 UART: [idev] Erasing UDS.KEYID = 0
7,626,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,315 UART: [idev] --
7,651,918 UART: [ldev] ++
7,652,524 UART: [ldev] CDI.KEYID = 6
7,653,494 UART: [ldev] SUBJECT.KEYID = 5
7,654,703 UART: [ldev] AUTHORITY.KEYID = 7
7,655,931 UART: [ldev] FE.KEYID = 1
7,666,460 UART: [ldev] Erasing FE.KEYID = 1
10,955,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,165 UART: [ldev] --
13,314,203 UART: [fwproc] Waiting for Commands...
13,317,335 UART: [fwproc] Received command 0x46574c44
13,319,511 UART: [fwproc] Received Image of size 113760 bytes
17,374,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,310 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,833,881 >>> mbox cmd response: success
17,834,425 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,838,080 UART: [afmc] ++
17,838,720 UART: [afmc] CDI.KEYID = 6
17,839,629 UART: [afmc] SUBJECT.KEYID = 7
17,840,895 UART: [afmc] AUTHORITY.KEYID = 5
21,156,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,080 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,492 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,307 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,778 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,351 UART: [afmc] --
23,523,047 UART: [cold-reset] --
23,526,585 UART: [state] Locking Datavault
23,531,342 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,104 UART: [state] Locking ICCM
23,535,895 UART: [exit] Launching FMC @ 0x40000130
23,544,288 UART:
23,544,519 UART: Running Caliptra FMC ...
23,545,615 UART:
23,545,769 UART: [state] CFI Enabled
23,553,756 UART: [fht] FMC Alias Private Key: 7
25,885,587 UART: [art] Extend RT PCRs Done
25,886,804 UART: [art] Lock RT PCRs Done
25,888,639 UART: [art] Populate DV Done
25,894,262 UART: [fht] FMC Alias Private Key: 7
25,895,856 UART: [art] Derive CDI
25,896,680 UART: [art] Store in in slot 0x4
25,939,223 UART: [art] Derive Key Pair
25,940,219 UART: [art] Store priv key in slot 0x5
29,182,893 UART: [art] Derive Key Pair - Done
29,195,575 UART: [art] Signing Cert with AUTHO
29,196,888 UART: RITY.KEYID = 7
31,476,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,643 UART: [art] PUB.X = 1226F42908FE3073B12327CA4EB7D1C111C867C9A1302AF21C735B9A486AC48AC62B3B98ACC44DCE76F69B1801948FBE
31,484,871 UART: [art] PUB.Y = 460A97AEA4853FD078E77D1F41FD9F365941746D1B0C1798205E390D55571B46314C3095E824EE74312E237A57546134
31,492,092 UART: [art] SIG.R = 6BF2686559CDE85937B6D5C2796CBA260BDAC3FA6AE4B709D832F048900AF48EEA828ABF4C07F4A28CED8DEDA3E37E24
31,499,549 UART: [art] SIG.S = DFD72FDA2234B1562E2190E96F898A4B7A3D3A34575BF72BAD8B1B50F436A23FC9E6A1C42C9F088436B9C756A072B62A
32,804,948 UART: Caliptra RT
32,805,649 UART: [state] CFI Enabled
32,924,056 UART: [rt] RT listening for mailbox commands...
32,955,843 UART: [rt]cmd =0x50435245, len=56
32,957,591 >>> mbox cmd response: failed
32,957,926 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,988,554 UART: [rt]cmd =0x50435245, len=56
32,990,359 >>> mbox cmd response: failed
32,990,618 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,020,872 UART: [rt]cmd =0x50435245, len=56
33,022,654 >>> mbox cmd response: failed
33,022,922 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,053,056 UART: [rt]cmd =0x50435245, len=56
33,054,912 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
4,131,589 ready_for_fw is high
4,131,995 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,687 >>> mbox cmd response: success
18,073,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,706,607 UART:
23,706,999 UART: Running Caliptra FMC ...
23,708,129 UART:
23,708,281 UART: [state] CFI Enabled
23,716,230 UART: [fht] FMC Alias Private Key: 7
26,047,031 UART: [art] Extend RT PCRs Done
26,048,261 UART: [art] Lock RT PCRs Done
26,049,997 UART: [art] Populate DV Done
26,055,462 UART: [fht] FMC Alias Private Key: 7
26,057,168 UART: [art] Derive CDI
26,057,986 UART: [art] Store in in slot 0x4
26,100,851 UART: [art] Derive Key Pair
26,101,851 UART: [art] Store priv key in slot 0x5
29,343,373 UART: [art] Derive Key Pair - Done
29,356,232 UART: [art] Signing Cert with AUTHO
29,357,539 UART: RITY.KEYID = 7
31,636,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,631 UART: [art] PUB.X = 1FE20D0DE271C642F51E3D15E46791E582EA843CAE5DD5FBB00868D110DF4865EBA3FBA80443570C6AC8E482FAC36BA0
31,645,747 UART: [art] PUB.Y = B8CA68A59F4E619CDE2EAFB483201E43ED1100DE7789ED30174099DAE338470A81F72D8E5969881A4B33AE0E79D4B055
31,652,971 UART: [art] SIG.R = A1A75E1DBFA0F8086A11E25AD04EBECD9FF6833699AD7E7FE9B6DE2374ADDA614392B947461B7A70C35AA6B889B1C6B4
31,660,408 UART: [art] SIG.S = 636709107209C9CFA09688FB47E7F520FFA1C0978561FE14B0BBF38E77A561B277EDF8367976BAFA8EF9D3E4007DF1B5
32,965,704 UART: Caliptra RT
32,966,411 UART: [state] CFI Enabled
33,083,721 UART: [rt] RT listening for mailbox commands...
33,115,758 UART: [rt]cmd =0x50435245, len=56
33,117,464 >>> mbox cmd response: failed
33,117,765 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,148,020 UART: [rt]cmd =0x50435245, len=56
33,149,939 >>> mbox cmd response: failed
33,150,208 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,180,629 UART: [rt]cmd =0x50435245, len=56
33,182,286 >>> mbox cmd response: failed
33,182,560 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,212,690 UART: [rt]cmd =0x50435245, len=56
33,214,395 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
192,489 UART:
192,871 UART: Running Caliptra ROM ...
194,029 UART:
194,178 UART: [state] CFI Enabled
266,143 UART: [state] LifecycleState = Unprovisioned
268,048 UART: [state] DebugLocked = No
269,512 UART: [state] WD Timer not started. Device not locked for debugging
273,263 UART: [kat] SHA2-256
452,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,966 UART: [kat] ++
464,506 UART: [kat] sha1
475,544 UART: [kat] SHA2-256
478,557 UART: [kat] SHA2-384
484,541 UART: [kat] SHA2-512-ACC
487,539 UART: [kat] ECC-384
2,949,108 UART: [kat] HMAC-384Kdf
2,973,070 UART: [kat] LMS
3,502,522 UART: [kat] --
3,507,234 UART: [cold-reset] ++
3,508,876 UART: [fht] FHT @ 0x50003400
3,520,490 UART: [idev] ++
3,521,047 UART: [idev] CDI.KEYID = 6
3,521,961 UART: [idev] SUBJECT.KEYID = 7
3,523,132 UART: [idev] UDS.KEYID = 0
3,524,123 ready_for_fw is high
3,524,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,909 UART: [idev] Erasing UDS.KEYID = 0
6,030,011 UART: [idev] Sha1 KeyId Algorithm
6,051,517 UART: [idev] --
6,055,272 UART: [ldev] ++
6,055,855 UART: [ldev] CDI.KEYID = 6
6,056,745 UART: [ldev] SUBJECT.KEYID = 5
6,057,902 UART: [ldev] AUTHORITY.KEYID = 7
6,059,182 UART: [ldev] FE.KEYID = 1
6,102,240 UART: [ldev] Erasing FE.KEYID = 1
8,606,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,193 UART: [ldev] --
10,414,213 UART: [fwproc] Wait for Commands...
10,415,720 UART: [fwproc] Recv command 0x46574c44
10,417,823 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,330 >>> mbox cmd response: success
14,282,884 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,287,173 UART: [afmc] ++
14,287,753 UART: [afmc] CDI.KEYID = 6
14,288,663 UART: [afmc] SUBJECT.KEYID = 7
14,289,872 UART: [afmc] AUTHORITY.KEYID = 5
16,831,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,540 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,860 UART: [afmc] --
18,628,942 UART: [cold-reset] --
18,632,743 UART: [state] Locking Datavault
18,637,232 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,924 UART: [state] Locking ICCM
18,640,423 UART: [exit] Launching FMC @ 0x40000130
18,648,813 UART:
18,649,041 UART: Running Caliptra FMC ...
18,650,139 UART:
18,650,296 UART: [state] CFI Enabled
18,711,366 UART: [fht] FMC Alias Private Key: 7
20,475,007 UART: [art] Extend RT PCRs Done
20,476,237 UART: [art] Lock RT PCRs Done
20,478,080 UART: [art] Populate DV Done
20,483,337 UART: [fht] FMC Alias Private Key: 7
20,485,033 UART: [art] Derive CDI
20,485,789 UART: [art] Store in in slot 0x4
20,543,510 UART: [art] Derive Key Pair
20,544,547 UART: [art] Store priv key in slot 0x5
23,007,431 UART: [art] Derive Key Pair - Done
23,020,376 UART: [art] Signing Cert with AUTHO
23,021,680 UART: RITY.KEYID = 7
24,745,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,747,037 UART: [art] PUB.X = 98B3C1B32A73606D7D184C4313B3EB0221BF3DE3AB0A7EF1DD1AF5D8B7C2DA2AD964138A074BD88EE8CE171055819175
24,754,329 UART: [art] PUB.Y = 0430298414408EF25AA166699F604131EF6E83A86AB8E80139F636063CCBB92495F9C70AC265707AF23C053E89805F96
24,761,564 UART: [art] SIG.R = 204D908DBA6D51D01D0E3182E6EC20A9677AE87178BFD31D3416BC409DCCE236EB2C8144AB3DB6399CEE23CBC7F6035E
24,768,955 UART: [art] SIG.S = D5FE29B412669E935720C906CDD5982F5BB5BD191AE2C605A080D2273F62A2DF272FDAE29D13F739E1FD275F837AD901
25,748,317 UART: Caliptra RT
25,749,004 UART: [state] CFI Enabled
25,913,636 UART: [rt] RT listening for mailbox commands...
25,945,557 UART: [rt]cmd =0x50435245, len=56
25,947,425 >>> mbox cmd response: failed
25,947,739 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,978,016 UART: [rt]cmd =0x50435245, len=56
25,979,596 >>> mbox cmd response: failed
25,979,861 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,010,099 UART: [rt]cmd =0x50435245, len=56
26,011,967 >>> mbox cmd response: failed
26,012,228 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,042,428 UART: [rt]cmd =0x50435245, len=56
26,044,164 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,383,809 ready_for_fw is high
3,384,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,063,840 >>> mbox cmd response: success
14,064,565 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,346,571 UART:
18,346,986 UART: Running Caliptra FMC ...
18,348,176 UART:
18,348,342 UART: [state] CFI Enabled
18,411,230 UART: [fht] FMC Alias Private Key: 7
20,175,595 UART: [art] Extend RT PCRs Done
20,176,808 UART: [art] Lock RT PCRs Done
20,178,651 UART: [art] Populate DV Done
20,184,173 UART: [fht] FMC Alias Private Key: 7
20,185,767 UART: [art] Derive CDI
20,186,508 UART: [art] Store in in slot 0x4
20,244,677 UART: [art] Derive Key Pair
20,245,722 UART: [art] Store priv key in slot 0x5
22,708,754 UART: [art] Derive Key Pair - Done
22,721,482 UART: [art] Signing Cert with AUTHO
22,722,787 UART: RITY.KEYID = 7
24,435,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,576 UART: [art] PUB.X = CE65C4D15A4A15C15517EEC0C2106709AE5B5A0CE9931BDC8EB65F13CAD3C6DE0E07B2AC650D93F37A6A372FF12F4A5A
24,443,916 UART: [art] PUB.Y = 62DAF1156A38C9A010B2E1405D890A38F418B23F807C9A9E9E8D6E1478E814FE234060D7EC9BB702934B614551172BF8
24,451,118 UART: [art] SIG.R = 665B7C116E245E773B081BDE304DB92A61C728D147AE0FAE681D5ED2D852C14A9667D4BD650EBC8428505978205669AF
24,458,510 UART: [art] SIG.S = 9D9BD47669BDD3B8FD18DC5F5A32CEA92694E8C8F76AC581E3C6F876B8F2849BB66C0549F7F08E3DF5DF02B919E77B8A
25,437,371 UART: Caliptra RT
25,438,085 UART: [state] CFI Enabled
25,603,917 UART: [rt] RT listening for mailbox commands...
25,635,816 UART: [rt]cmd =0x50435245, len=56
25,637,731 >>> mbox cmd response: failed
25,638,013 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,668,107 UART: [rt]cmd =0x50435245, len=56
25,669,901 >>> mbox cmd response: failed
25,670,164 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,700,028 UART: [rt]cmd =0x50435245, len=56
25,701,841 >>> mbox cmd response: failed
25,702,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,732,302 UART: [rt]cmd =0x50435245, len=56
25,733,691 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,823 writing to cptra_bootfsm_go
193,106 UART:
193,502 UART: Running Caliptra ROM ...
194,703 UART:
604,231 UART: [state] CFI Enabled
620,158 UART: [state] LifecycleState = Unprovisioned
622,039 UART: [state] DebugLocked = No
623,645 UART: [state] WD Timer not started. Device not locked for debugging
628,181 UART: [kat] SHA2-256
807,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,860 UART: [kat] ++
819,402 UART: [kat] sha1
829,648 UART: [kat] SHA2-256
832,656 UART: [kat] SHA2-384
838,992 UART: [kat] SHA2-512-ACC
842,012 UART: [kat] ECC-384
3,280,994 UART: [kat] HMAC-384Kdf
3,293,027 UART: [kat] LMS
3,822,521 UART: [kat] --
3,828,529 UART: [cold-reset] ++
3,829,611 UART: [fht] FHT @ 0x50003400
3,841,055 UART: [idev] ++
3,841,662 UART: [idev] CDI.KEYID = 6
3,842,585 UART: [idev] SUBJECT.KEYID = 7
3,843,768 UART: [idev] UDS.KEYID = 0
3,844,695 ready_for_fw is high
3,844,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,097 UART: [idev] Erasing UDS.KEYID = 0
6,316,528 UART: [idev] Sha1 KeyId Algorithm
6,339,045 UART: [idev] --
6,341,660 UART: [ldev] ++
6,342,240 UART: [ldev] CDI.KEYID = 6
6,343,153 UART: [ldev] SUBJECT.KEYID = 5
6,344,367 UART: [ldev] AUTHORITY.KEYID = 7
6,345,617 UART: [ldev] FE.KEYID = 1
6,355,510 UART: [ldev] Erasing FE.KEYID = 1
8,830,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,904 UART: [ldev] --
10,618,708 UART: [fwproc] Wait for Commands...
10,621,396 UART: [fwproc] Recv command 0x46574c44
10,623,490 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,482,919 >>> mbox cmd response: success
14,483,478 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,487,687 UART: [afmc] ++
14,488,275 UART: [afmc] CDI.KEYID = 6
14,489,165 UART: [afmc] SUBJECT.KEYID = 7
14,490,378 UART: [afmc] AUTHORITY.KEYID = 5
16,989,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,982 UART: [afmc] --
18,783,683 UART: [cold-reset] --
18,787,114 UART: [state] Locking Datavault
18,793,661 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,307 UART: [state] Locking ICCM
18,796,597 UART: [exit] Launching FMC @ 0x40000130
18,805,017 UART:
18,805,299 UART: Running Caliptra FMC ...
18,806,412 UART:
18,806,578 UART: [state] CFI Enabled
18,815,061 UART: [fht] FMC Alias Private Key: 7
20,571,720 UART: [art] Extend RT PCRs Done
20,572,958 UART: [art] Lock RT PCRs Done
20,574,969 UART: [art] Populate DV Done
20,580,437 UART: [fht] FMC Alias Private Key: 7
20,582,034 UART: [art] Derive CDI
20,582,856 UART: [art] Store in in slot 0x4
20,625,721 UART: [art] Derive Key Pair
20,626,723 UART: [art] Store priv key in slot 0x5
23,053,417 UART: [art] Derive Key Pair - Done
23,066,634 UART: [art] Signing Cert with AUTHO
23,067,953 UART: RITY.KEYID = 7
24,773,405 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,916 UART: [art] PUB.X = 58CA94E11737605C740174E2B3612976F6C36F4E087D6E47FB6A112633A50327366D58459B53AC605238774A5F269F07
24,782,132 UART: [art] PUB.Y = 17989BB27B7C9DD7A14D5A273D880B6A4018B821CB237921739B93A30CBBD0ECE41068F562B186C6EA0B8965E4666580
24,789,391 UART: [art] SIG.R = D1A17F429AEBA6FC4709F7FAC7D3D38B9E3CBD5B955C925AACBEAE93C4CDE770BC4ACD98EE931ADA20C5E118FB953693
24,796,818 UART: [art] SIG.S = F20813DE40F1A209696C7524556CE31634A9DFD1E84941A7FA1F78CBEDF661BC94DECB967B68057568C65A7DBB1595F1
25,775,726 UART: Caliptra RT
25,776,428 UART: [state] CFI Enabled
25,892,843 UART: [rt] RT listening for mailbox commands...
25,924,515 UART: [rt]cmd =0x50435245, len=56
25,926,249 >>> mbox cmd response: failed
25,926,553 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,956,587 UART: [rt]cmd =0x50435245, len=56
25,958,290 >>> mbox cmd response: failed
25,958,553 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,988,741 UART: [rt]cmd =0x50435245, len=56
25,990,650 >>> mbox cmd response: failed
25,990,930 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,021,072 UART: [rt]cmd =0x50435245, len=56
26,022,707 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
3,692,349 ready_for_fw is high
3,692,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,256,897 >>> mbox cmd response: success
14,257,513 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,510,883 UART:
18,511,279 UART: Running Caliptra FMC ...
18,512,412 UART:
18,512,572 UART: [state] CFI Enabled
18,520,454 UART: [fht] FMC Alias Private Key: 7
20,277,189 UART: [art] Extend RT PCRs Done
20,278,425 UART: [art] Lock RT PCRs Done
20,279,975 UART: [art] Populate DV Done
20,285,383 UART: [fht] FMC Alias Private Key: 7
20,287,028 UART: [art] Derive CDI
20,287,772 UART: [art] Store in in slot 0x4
20,330,310 UART: [art] Derive Key Pair
20,331,312 UART: [art] Store priv key in slot 0x5
22,757,954 UART: [art] Derive Key Pair - Done
22,771,060 UART: [art] Signing Cert with AUTHO
22,772,374 UART: RITY.KEYID = 7
24,477,855 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,359 UART: [art] PUB.X = 9E6657476927E89767D858BC6DDBA7993BE9311A95C9D11CDB642AD06FA452791E9955A1BFB0F69884F08F94325F805C
24,486,641 UART: [art] PUB.Y = 32931C469B01224A6DE5C8BA1C10758976408B7E51DDEBDC9672955377C496F52DE5C872782BAFEA4BBBE74F6A06FFB6
24,493,923 UART: [art] SIG.R = 6B29D55DBD1CEF996E84903D5C83B5888996D9431B9AE7D0255CA02F18A1204BBC03DC19D2DF4883E53F71CCBEF30400
24,501,294 UART: [art] SIG.S = 4233E8D6794A57BDA0E284FC44FE5B946ED6591D0D5ED8D004B5F809466BEDA21C0723264E0B879A4D2C7DDF74213946
25,479,612 UART: Caliptra RT
25,480,326 UART: [state] CFI Enabled
25,597,630 UART: [rt] RT listening for mailbox commands...
25,629,089 UART: [rt]cmd =0x50435245, len=56
25,630,926 >>> mbox cmd response: failed
25,631,218 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,661,355 UART: [rt]cmd =0x50435245, len=56
25,663,217 >>> mbox cmd response: failed
25,663,479 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,693,719 UART: [rt]cmd =0x50435245, len=56
25,695,517 >>> mbox cmd response: failed
25,695,796 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,725,990 UART: [rt]cmd =0x50435245, len=56
25,727,537 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,547 UART:
192,927 UART: Running Caliptra ROM ...
194,122 UART:
194,276 UART: [state] CFI Enabled
265,568 UART: [state] LifecycleState = Unprovisioned
267,917 UART: [state] DebugLocked = No
270,015 UART: [state] WD Timer not started. Device not locked for debugging
275,273 UART: [kat] SHA2-256
465,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,925 UART: [kat] ++
476,560 UART: [kat] sha1
487,584 UART: [kat] SHA2-256
490,590 UART: [kat] SHA2-384
495,972 UART: [kat] SHA2-512-ACC
498,596 UART: [kat] ECC-384
2,947,667 UART: [kat] HMAC-384Kdf
2,970,488 UART: [kat] LMS
3,502,283 UART: [kat] --
3,506,820 UART: [cold-reset] ++
3,508,397 UART: [fht] FHT @ 0x50003400
3,519,721 UART: [idev] ++
3,520,423 UART: [idev] CDI.KEYID = 6
3,521,449 UART: [idev] SUBJECT.KEYID = 7
3,522,547 UART: [idev] UDS.KEYID = 0
3,523,485 ready_for_fw is high
3,523,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,215 UART: [idev] Erasing UDS.KEYID = 0
6,026,717 UART: [idev] Sha1 KeyId Algorithm
6,048,559 UART: [idev] --
6,055,255 UART: [ldev] ++
6,055,933 UART: [ldev] CDI.KEYID = 6
6,056,871 UART: [ldev] SUBJECT.KEYID = 5
6,058,029 UART: [ldev] AUTHORITY.KEYID = 7
6,059,206 UART: [ldev] FE.KEYID = 1
6,098,922 UART: [ldev] Erasing FE.KEYID = 1
8,608,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,567 UART: [ldev] --
10,411,101 UART: [fwproc] Wait for Commands...
10,413,079 UART: [fwproc] Recv command 0x46574c44
10,415,384 UART: [fwproc] Recv'd Img size: 114084 bytes
13,852,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,587,126 >>> mbox cmd response: success
14,587,655 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,590,906 UART: [afmc] ++
14,591,610 UART: [afmc] CDI.KEYID = 6
14,592,801 UART: [afmc] SUBJECT.KEYID = 7
14,594,243 UART: [afmc] AUTHORITY.KEYID = 5
17,125,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,355 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,972 UART: [afmc] --
18,926,383 UART: [cold-reset] --
18,931,547 UART: [state] Locking Datavault
18,936,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,295 UART: [state] Locking ICCM
18,940,105 UART: [exit] Launching FMC @ 0x40000130
18,948,749 UART:
18,948,984 UART: Running Caliptra FMC ...
18,950,082 UART:
18,950,237 UART: [state] CFI Enabled
19,008,251 UART: [fht] FMC Alias Private Key: 7
20,772,680 UART: [art] Extend RT PCRs Done
20,773,898 UART: [art] Lock RT PCRs Done
20,775,691 UART: [art] Populate DV Done
20,781,254 UART: [fht] FMC Alias Private Key: 7
20,782,953 UART: [art] Derive CDI
20,783,760 UART: [art] Store in in slot 0x4
20,841,643 UART: [art] Derive Key Pair
20,842,676 UART: [art] Store priv key in slot 0x5
23,305,343 UART: [art] Derive Key Pair - Done
23,318,155 UART: [art] Signing Cert with AUTHO
23,319,460 UART: RITY.KEYID = 7
25,031,574 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,137 UART: [art] PUB.X = 31685EEB8E99FC0524223008F5C74C11C7C7816AFFF77937671C75965073DE9463C7EEDE2DF12869921CFE858D3AD00E
25,040,348 UART: [art] PUB.Y = D00A8E6B118D606B11CA3CF0CC8771E3C9914CE510E35F56AB65B845078601DAF2CF70DAC50EA94A0045DB1C51D8D049
25,047,609 UART: [art] SIG.R = 16E45A8F9B156F24FB772EAF436BFCFEFDA86F2E4B9203FEB7C0CF47E74FCEE8B9D6670301E37A727CB66BBF27BE1C49
25,055,056 UART: [art] SIG.S = C15D77E26E3D9A16350B4247D7A0ECFE5B36A22B097E5A1223721B3DB4B6B784ABBD8F0CA137D5BED83C3B017A1B1632
26,034,158 UART: Caliptra RT
26,034,869 UART: [state] CFI Enabled
26,199,645 UART: [rt] RT listening for mailbox commands...
26,231,326 UART: [rt]cmd =0x50435245, len=56
26,233,240 >>> mbox cmd response: failed
26,233,583 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,263,752 UART: [rt]cmd =0x50435245, len=56
26,265,386 >>> mbox cmd response: failed
26,265,656 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,295,641 UART: [rt]cmd =0x50435245, len=56
26,297,347 >>> mbox cmd response: failed
26,297,610 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,327,473 UART: [rt]cmd =0x50435245, len=56
26,329,330 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,439,220 ready_for_fw is high
3,439,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,730,304 >>> mbox cmd response: success
14,730,921 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,023,194 UART:
19,023,603 UART: Running Caliptra FMC ...
19,024,708 UART:
19,024,869 UART: [state] CFI Enabled
19,095,413 UART: [fht] FMC Alias Private Key: 7
20,859,690 UART: [art] Extend RT PCRs Done
20,860,912 UART: [art] Lock RT PCRs Done
20,862,374 UART: [art] Populate DV Done
20,867,783 UART: [fht] FMC Alias Private Key: 7
20,869,482 UART: [art] Derive CDI
20,870,293 UART: [art] Store in in slot 0x4
20,927,727 UART: [art] Derive Key Pair
20,928,759 UART: [art] Store priv key in slot 0x5
23,391,862 UART: [art] Derive Key Pair - Done
23,404,859 UART: [art] Signing Cert with AUTHO
23,406,198 UART: RITY.KEYID = 7
25,117,430 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,936 UART: [art] PUB.X = 4481BA3A4837BF3483ABAF6374A99545A9EC9C8C89B88072FC18C7E03B84F3666B406A424CA1DF59C60F2DA2C1BEBE0E
25,126,193 UART: [art] PUB.Y = 17FB66C2DBBC07097530D0BBC4AE98BD1D75E46A3AE11AA488D2E184A4B6308583F9493D023FD6E2DA483929E8DC8850
25,133,480 UART: [art] SIG.R = 15D1D480F9F4E46F9E968CF41BF55C4CE2D1AF1F0DFB44294DA60AA67DE502333A5A8EA98E09D46442447D281AED0225
25,140,926 UART: [art] SIG.S = 505F199AC4C149DFE9D46F653858E95C575CD08EF0EBF891AC83E345E45A84ED10FE4E47B76AA341CDCEA37B901F4AE4
26,119,805 UART: Caliptra RT
26,120,492 UART: [state] CFI Enabled
26,284,340 UART: [rt] RT listening for mailbox commands...
26,316,180 UART: [rt]cmd =0x50435245, len=56
26,317,879 >>> mbox cmd response: failed
26,318,168 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,348,368 UART: [rt]cmd =0x50435245, len=56
26,349,853 >>> mbox cmd response: failed
26,350,131 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,380,181 UART: [rt]cmd =0x50435245, len=56
26,382,095 >>> mbox cmd response: failed
26,382,364 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,412,439 UART: [rt]cmd =0x50435245, len=56
26,414,038 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,882 UART:
193,255 UART: Running Caliptra ROM ...
194,455 UART:
603,897 UART: [state] CFI Enabled
616,713 UART: [state] LifecycleState = Unprovisioned
619,136 UART: [state] DebugLocked = No
621,827 UART: [state] WD Timer not started. Device not locked for debugging
625,591 UART: [kat] SHA2-256
815,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,285 UART: [kat] ++
826,774 UART: [kat] sha1
837,724 UART: [kat] SHA2-256
840,742 UART: [kat] SHA2-384
847,232 UART: [kat] SHA2-512-ACC
849,814 UART: [kat] ECC-384
3,291,787 UART: [kat] HMAC-384Kdf
3,304,094 UART: [kat] LMS
3,835,917 UART: [kat] --
3,837,638 UART: [cold-reset] ++
3,839,286 UART: [fht] FHT @ 0x50003400
3,850,625 UART: [idev] ++
3,851,342 UART: [idev] CDI.KEYID = 6
3,852,272 UART: [idev] SUBJECT.KEYID = 7
3,853,448 UART: [idev] UDS.KEYID = 0
3,854,378 ready_for_fw is high
3,854,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,997,840 UART: [idev] Erasing UDS.KEYID = 0
6,327,161 UART: [idev] Sha1 KeyId Algorithm
6,348,721 UART: [idev] --
6,353,635 UART: [ldev] ++
6,354,320 UART: [ldev] CDI.KEYID = 6
6,355,210 UART: [ldev] SUBJECT.KEYID = 5
6,356,422 UART: [ldev] AUTHORITY.KEYID = 7
6,357,657 UART: [ldev] FE.KEYID = 1
6,367,347 UART: [ldev] Erasing FE.KEYID = 1
8,849,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,161 UART: [ldev] --
10,641,764 UART: [fwproc] Wait for Commands...
10,643,538 UART: [fwproc] Recv command 0x46574c44
10,645,799 UART: [fwproc] Recv'd Img size: 114084 bytes
14,086,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,279,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,820,654 >>> mbox cmd response: success
14,821,191 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,824,629 UART: [afmc] ++
14,825,325 UART: [afmc] CDI.KEYID = 6
14,826,514 UART: [afmc] SUBJECT.KEYID = 7
14,827,953 UART: [afmc] AUTHORITY.KEYID = 5
17,331,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,050,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,052,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,068,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,083,267 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,098,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,121,612 UART: [afmc] --
19,124,839 UART: [cold-reset] --
19,128,923 UART: [state] Locking Datavault
19,133,911 UART: [state] Locking PCR0, PCR1 and PCR31
19,136,116 UART: [state] Locking ICCM
19,138,331 UART: [exit] Launching FMC @ 0x40000130
19,147,010 UART:
19,147,252 UART: Running Caliptra FMC ...
19,148,355 UART:
19,148,515 UART: [state] CFI Enabled
19,156,914 UART: [fht] FMC Alias Private Key: 7
20,913,692 UART: [art] Extend RT PCRs Done
20,914,915 UART: [art] Lock RT PCRs Done
20,916,975 UART: [art] Populate DV Done
20,922,602 UART: [fht] FMC Alias Private Key: 7
20,924,254 UART: [art] Derive CDI
20,925,072 UART: [art] Store in in slot 0x4
20,968,151 UART: [art] Derive Key Pair
20,969,185 UART: [art] Store priv key in slot 0x5
23,396,394 UART: [art] Derive Key Pair - Done
23,409,493 UART: [art] Signing Cert with AUTHO
23,410,792 UART: RITY.KEYID = 7
25,116,057 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,566 UART: [art] PUB.X = C66C7350415F8409C0FCBEF22CDDB52E82CC12E7F3BD6CB41E05EDBED8F3260846CF033ABD90D3F8ACB84384B3669385
25,124,884 UART: [art] PUB.Y = EFCC53038907F505D6CAFB0CB96622FD1F21E27C841951404818DC024FEC5D71EE340D6AE97FD4A8D9E6A226FAC1149F
25,132,130 UART: [art] SIG.R = 9CEDDBEAD3D1588366217F7ABE3EF87F5D555B7F3D4FBECDDEAEBDEAF4EE5895F47C5993D5CFAA0FD2DAD63B0C26A8C5
25,139,553 UART: [art] SIG.S = A5B74279D7930C6C650D395D152797BE5D98864F2142F2BEAC6467FF137BD102F12F9108C922ED22DE13E979E6D84616
26,118,640 UART: Caliptra RT
26,119,351 UART: [state] CFI Enabled
26,235,981 UART: [rt] RT listening for mailbox commands...
26,267,452 UART: [rt]cmd =0x50435245, len=56
26,269,054 >>> mbox cmd response: failed
26,269,372 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,299,739 UART: [rt]cmd =0x50435245, len=56
26,301,741 >>> mbox cmd response: failed
26,302,040 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,332,184 UART: [rt]cmd =0x50435245, len=56
26,334,039 >>> mbox cmd response: failed
26,334,302 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,364,489 UART: [rt]cmd =0x50435245, len=56
26,366,283 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
3,758,159 ready_for_fw is high
3,758,563 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,940,062 >>> mbox cmd response: success
14,940,883 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,190,011 UART:
19,190,402 UART: Running Caliptra FMC ...
19,191,502 UART:
19,191,658 UART: [state] CFI Enabled
19,199,619 UART: [fht] FMC Alias Private Key: 7
20,955,888 UART: [art] Extend RT PCRs Done
20,957,117 UART: [art] Lock RT PCRs Done
20,958,556 UART: [art] Populate DV Done
20,963,926 UART: [fht] FMC Alias Private Key: 7
20,965,469 UART: [art] Derive CDI
20,966,208 UART: [art] Store in in slot 0x4
21,009,237 UART: [art] Derive Key Pair
21,010,287 UART: [art] Store priv key in slot 0x5
23,437,224 UART: [art] Derive Key Pair - Done
23,450,429 UART: [art] Signing Cert with AUTHO
23,451,737 UART: RITY.KEYID = 7
25,157,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,669 UART: [art] PUB.X = 431A23466E26C76E071F31A8762360636635C398DD698C38F6C0905E6061C987DDDD9360BE33BB2819332753DA2B2A1C
25,165,921 UART: [art] PUB.Y = CA3AB1985D652EA985835BC1DE8EEBA978D4486666AAB7B948ABFA6777B0824847F761338490A4034E8E7D73471EF560
25,173,150 UART: [art] SIG.R = A739D9F9CEC3AF5AB0218F7D8A0C71ACB109CB3383D3539EED12510C9D916DB58C82E47949415B446EA557D9E1E66E43
25,180,521 UART: [art] SIG.S = 6085B836ACF46D9447339A666E4C6CEAD86137D1FB9A60B3CFC9A8E9905E2E3545CCE93C0CCDFFF3E665511F905C8B25
26,159,366 UART: Caliptra RT
26,160,059 UART: [state] CFI Enabled
26,276,981 UART: [rt] RT listening for mailbox commands...
26,308,610 UART: [rt]cmd =0x50435245, len=56
26,310,210 >>> mbox cmd response: failed
26,310,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,340,673 UART: [rt]cmd =0x50435245, len=56
26,342,529 >>> mbox cmd response: failed
26,342,794 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,373,046 UART: [rt]cmd =0x50435245, len=56
26,374,893 >>> mbox cmd response: failed
26,375,161 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,405,461 UART: [rt]cmd =0x50435245, len=56
26,407,012 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,927 UART: [kat] SHA2-256
892,865 UART: [kat] SHA2-384
895,622 UART: [kat] SHA2-512-ACC
897,523 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,658 UART: [kat] LMS
1,475,854 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,281 UART: [fht] Storing FHT @ 0x50003400
1,480,092 UART: [idev] ++
1,480,260 UART: [idev] CDI.KEYID = 6
1,480,620 UART: [idev] SUBJECT.KEYID = 7
1,481,044 UART: [idev] UDS.KEYID = 0
1,481,389 ready_for_fw is high
1,481,389 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,356 UART: [idev] Erasing UDS.KEYID = 0
1,505,594 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,258 UART: [idev] --
1,515,489 UART: [ldev] ++
1,515,657 UART: [ldev] CDI.KEYID = 6
1,516,020 UART: [ldev] SUBJECT.KEYID = 5
1,516,446 UART: [ldev] AUTHORITY.KEYID = 7
1,516,909 UART: [ldev] FE.KEYID = 1
1,522,139 UART: [ldev] Erasing FE.KEYID = 1
1,547,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,214 UART: [ldev] --
1,586,499 UART: [fwproc] Waiting for Commands...
1,587,360 UART: [fwproc] Received command 0x46574c44
1,588,151 UART: [fwproc] Received Image of size 114084 bytes
2,882,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,594 >>> mbox cmd response: success
3,075,594 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,076,660 UART: [afmc] ++
3,076,828 UART: [afmc] CDI.KEYID = 6
3,077,190 UART: [afmc] SUBJECT.KEYID = 7
3,077,615 UART: [afmc] AUTHORITY.KEYID = 5
3,112,360 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,346 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,959 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,649 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,446 UART: [afmc] --
3,155,514 UART: [cold-reset] --
3,156,210 UART: [state] Locking Datavault
3,157,525 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,129 UART: [state] Locking ICCM
3,158,639 UART: [exit] Launching FMC @ 0x40000130
3,163,968 UART:
3,163,984 UART: Running Caliptra FMC ...
3,164,392 UART:
3,164,446 UART: [state] CFI Enabled
3,174,743 UART: [fht] FMC Alias Private Key: 7
3,282,924 UART: [art] Extend RT PCRs Done
3,283,352 UART: [art] Lock RT PCRs Done
3,284,734 UART: [art] Populate DV Done
3,292,761 UART: [fht] FMC Alias Private Key: 7
3,293,815 UART: [art] Derive CDI
3,294,095 UART: [art] Store in in slot 0x4
3,379,742 UART: [art] Derive Key Pair
3,380,102 UART: [art] Store priv key in slot 0x5
3,393,220 UART: [art] Derive Key Pair - Done
3,407,730 UART: [art] Signing Cert with AUTHO
3,408,210 UART: RITY.KEYID = 7
3,423,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,345 UART: [art] PUB.X = 9BAA534EC1EC7781227E1DFF82C323D22F2CA7E6D942A67F71C94092E3B62618E6805B337E14896099A3CB043B0255AA
3,431,111 UART: [art] PUB.Y = 4D7E7D7DD1E2E99AE271AD56998127B3753FC685DB4ED68BE4A9AEC5736220287D1B4E9C0572D72F0701F25F5ED38D5B
3,438,062 UART: [art] SIG.R = 424F7EBC500EA1DF649B33DBAA64EA5989C9514A419B9BBE7E5CE9265EF9CE52289620A2D4331DB89A7280A21C49E86B
3,444,841 UART: [art] SIG.S = 9876C4C407807EA98EAD9CD768AB30C0D282F066F09AE471BFBB8A92CACB1E6777D4B4FDA62A448BF6CC6589D600C33A
3,468,995 UART: Caliptra RT
3,469,248 UART: [state] CFI Enabled
3,576,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,275 UART: [rt]cmd =0x50435245, len=56
3,608,574 >>> mbox cmd response: failed
3,608,574 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,268 UART: [rt]cmd =0x50435245, len=56
3,639,633 >>> mbox cmd response: failed
3,639,633 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,473 UART: [rt]cmd =0x50435245, len=56
3,670,978 >>> mbox cmd response: failed
3,670,978 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,646 UART: [rt]cmd =0x50435245, len=56
3,701,945 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,563 ready_for_fw is high
1,362,563 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,444 >>> mbox cmd response: success
2,925,444 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,987,798 UART:
2,987,814 UART: Running Caliptra FMC ...
2,988,222 UART:
2,988,276 UART: [state] CFI Enabled
2,998,541 UART: [fht] FMC Alias Private Key: 7
3,106,692 UART: [art] Extend RT PCRs Done
3,107,120 UART: [art] Lock RT PCRs Done
3,108,922 UART: [art] Populate DV Done
3,117,135 UART: [fht] FMC Alias Private Key: 7
3,118,213 UART: [art] Derive CDI
3,118,493 UART: [art] Store in in slot 0x4
3,204,342 UART: [art] Derive Key Pair
3,204,702 UART: [art] Store priv key in slot 0x5
3,217,594 UART: [art] Derive Key Pair - Done
3,232,287 UART: [art] Signing Cert with AUTHO
3,232,767 UART: RITY.KEYID = 7
3,248,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,952 UART: [art] PUB.X = 29F2ECBE60D60E0F2DA82DE0D25FCC401A2DBD905FA69F998D2C943E3C7B144760BFC248CE2659503785C05A7189C451
3,255,726 UART: [art] PUB.Y = 9B3A87B5FC3F160FC39415A1B7C85C7E78E3EA3CB5D0B521AA6E7A025C77762FD8E23E9E1FB1B706FEE5137F988447DF
3,262,683 UART: [art] SIG.R = A5D662AE73249C9A3B59AAFBD3748CFA06E80764599879E795F728FA86FBC56407201ACE5F7F2EA80BC2EF630E661FD3
3,269,450 UART: [art] SIG.S = 425F2EC9355B402C3A4162DE5FE2CD05A3B681F187A767D1DCDE550A134B81DB265798B0A7638117AD4F90BFFB19F318
3,293,273 UART: Caliptra RT
3,293,526 UART: [state] CFI Enabled
3,401,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,333 UART: [rt]cmd =0x50435245, len=56
3,433,410 >>> mbox cmd response: failed
3,433,410 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,934 UART: [rt]cmd =0x50435245, len=56
3,464,173 >>> mbox cmd response: failed
3,464,173 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,787 UART: [rt]cmd =0x50435245, len=56
3,494,976 >>> mbox cmd response: failed
3,494,976 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,688 UART: [rt]cmd =0x50435245, len=56
3,525,935 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,136 UART: [kat] SHA2-256
893,074 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,476,722 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,479,971 UART: [idev] ++
1,480,139 UART: [idev] CDI.KEYID = 6
1,480,499 UART: [idev] SUBJECT.KEYID = 7
1,480,923 UART: [idev] UDS.KEYID = 0
1,481,268 ready_for_fw is high
1,481,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,453 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,327 UART: [idev] --
1,516,274 UART: [ldev] ++
1,516,442 UART: [ldev] CDI.KEYID = 6
1,516,805 UART: [ldev] SUBJECT.KEYID = 5
1,517,231 UART: [ldev] AUTHORITY.KEYID = 7
1,517,694 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,995 UART: [ldev] --
1,587,466 UART: [fwproc] Waiting for Commands...
1,588,287 UART: [fwproc] Received command 0x46574c44
1,589,078 UART: [fwproc] Received Image of size 114084 bytes
2,883,848 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,547 >>> mbox cmd response: success
3,076,547 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,077,597 UART: [afmc] ++
3,077,765 UART: [afmc] CDI.KEYID = 6
3,078,127 UART: [afmc] SUBJECT.KEYID = 7
3,078,552 UART: [afmc] AUTHORITY.KEYID = 5
3,114,291 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,179 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,572 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,262 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,207 UART: [afmc] --
3,158,133 UART: [cold-reset] --
3,158,851 UART: [state] Locking Datavault
3,160,182 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,786 UART: [state] Locking ICCM
3,161,370 UART: [exit] Launching FMC @ 0x40000130
3,166,699 UART:
3,166,715 UART: Running Caliptra FMC ...
3,167,123 UART:
3,167,266 UART: [state] CFI Enabled
3,177,927 UART: [fht] FMC Alias Private Key: 7
3,285,654 UART: [art] Extend RT PCRs Done
3,286,082 UART: [art] Lock RT PCRs Done
3,287,466 UART: [art] Populate DV Done
3,295,819 UART: [fht] FMC Alias Private Key: 7
3,296,757 UART: [art] Derive CDI
3,297,037 UART: [art] Store in in slot 0x4
3,383,130 UART: [art] Derive Key Pair
3,383,490 UART: [art] Store priv key in slot 0x5
3,396,352 UART: [art] Derive Key Pair - Done
3,410,939 UART: [art] Signing Cert with AUTHO
3,411,419 UART: RITY.KEYID = 7
3,426,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,338 UART: [art] PUB.X = 6BD04F5D6B294B701BBCA2FB5041560497B446F6B6615C4560B1B4935054C71F11FCEF225FB9C823B0808E752AB0F093
3,434,107 UART: [art] PUB.Y = 83B3C678D9588FD196A76EC2F66EE88FFB0774716D41E0CFF9D009F14198307F6D50BF480C72F4A6C994858DFCD30AC4
3,441,053 UART: [art] SIG.R = F52A4367264A11EA1C9ED9F796453C72CB0FABDDC945B6F7968352869DB7E9025ED809BEFF6F7A601775B93B935A3DE8
3,447,824 UART: [art] SIG.S = 9AA7878C3E53F63C7CAC0C6F280246868ED60213BD26D1482B8B3CD71F4CC298A061B3532B66A809EF20814EA06D5D62
3,471,679 UART: Caliptra RT
3,472,024 UART: [state] CFI Enabled
3,580,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,434 UART: [rt]cmd =0x50435245, len=56
3,612,763 >>> mbox cmd response: failed
3,612,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,353 UART: [rt]cmd =0x50435245, len=56
3,643,824 >>> mbox cmd response: failed
3,643,824 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,646 UART: [rt]cmd =0x50435245, len=56
3,675,275 >>> mbox cmd response: failed
3,675,275 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,827 UART: [rt]cmd =0x50435245, len=56
3,706,304 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,150 ready_for_fw is high
1,363,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,909 >>> mbox cmd response: success
2,925,909 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,987,549 UART:
2,987,565 UART: Running Caliptra FMC ...
2,987,973 UART:
2,988,116 UART: [state] CFI Enabled
2,998,651 UART: [fht] FMC Alias Private Key: 7
3,106,288 UART: [art] Extend RT PCRs Done
3,106,716 UART: [art] Lock RT PCRs Done
3,108,528 UART: [art] Populate DV Done
3,116,679 UART: [fht] FMC Alias Private Key: 7
3,117,773 UART: [art] Derive CDI
3,118,053 UART: [art] Store in in slot 0x4
3,203,610 UART: [art] Derive Key Pair
3,203,970 UART: [art] Store priv key in slot 0x5
3,217,182 UART: [art] Derive Key Pair - Done
3,231,786 UART: [art] Signing Cert with AUTHO
3,232,266 UART: RITY.KEYID = 7
3,247,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,385 UART: [art] PUB.X = 379A8A3D8C595C2D8FC8E9AFA462F327AD622C28AB0CDF8142438E126020C8E75E26679AF9027E4383A089A84723A48B
3,255,151 UART: [art] PUB.Y = 0A2219C7F1A9D578F64496BE1382D66842BBCBC950604AD4587FC6431294E57AC363727A61B20DC8915193C003F95EDE
3,262,090 UART: [art] SIG.R = B892F7DA795AEA4465414E7FD00BF027E84B6A8A6B6930333FB9A842C176F1F3526613F33E53E55B99D6CFAEDFB7C60B
3,268,866 UART: [art] SIG.S = C93AD8DB38DF7FB2F4988EC5D270A2A7488173D376833A6831AA9EF7F6A62330FD2C26C030D19217DABC8BB744E3D13C
3,292,583 UART: Caliptra RT
3,292,928 UART: [state] CFI Enabled
3,401,044 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,686 UART: [rt]cmd =0x50435245, len=56
3,433,261 >>> mbox cmd response: failed
3,433,261 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,985 UART: [rt]cmd =0x50435245, len=56
3,464,198 >>> mbox cmd response: failed
3,464,198 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,766 UART: [rt]cmd =0x50435245, len=56
3,495,089 >>> mbox cmd response: failed
3,495,089 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,827 UART: [rt]cmd =0x50435245, len=56
3,526,260 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
902,273 UART: [kat] SHA2-256
904,213 UART: [kat] SHA2-384
907,020 UART: [kat] SHA2-512-ACC
908,921 UART: [kat] ECC-384
918,490 UART: [kat] HMAC-384Kdf
923,116 UART: [kat] LMS
1,171,444 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,308 UART: [idev] ++
1,175,476 UART: [idev] CDI.KEYID = 6
1,175,836 UART: [idev] SUBJECT.KEYID = 7
1,176,260 UART: [idev] UDS.KEYID = 0
1,176,605 ready_for_fw is high
1,176,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,097 UART: [idev] Sha1 KeyId Algorithm
1,209,505 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,008 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,315 UART: [ldev] --
1,282,806 UART: [fwproc] Wait for Commands...
1,283,556 UART: [fwproc] Recv command 0x46574c44
1,284,284 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,769 >>> mbox cmd response: success
2,769,769 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,770,855 UART: [afmc] ++
2,771,023 UART: [afmc] CDI.KEYID = 6
2,771,385 UART: [afmc] SUBJECT.KEYID = 7
2,771,810 UART: [afmc] AUTHORITY.KEYID = 5
2,807,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,394 UART: [afmc] --
2,850,336 UART: [cold-reset] --
2,851,194 UART: [state] Locking Datavault
2,852,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,101 UART: [state] Locking ICCM
2,853,545 UART: [exit] Launching FMC @ 0x40000130
2,858,874 UART:
2,858,890 UART: Running Caliptra FMC ...
2,859,298 UART:
2,859,352 UART: [state] CFI Enabled
2,869,839 UART: [fht] FMC Alias Private Key: 7
2,978,286 UART: [art] Extend RT PCRs Done
2,978,714 UART: [art] Lock RT PCRs Done
2,980,114 UART: [art] Populate DV Done
2,988,447 UART: [fht] FMC Alias Private Key: 7
2,989,405 UART: [art] Derive CDI
2,989,685 UART: [art] Store in in slot 0x4
3,074,858 UART: [art] Derive Key Pair
3,075,218 UART: [art] Store priv key in slot 0x5
3,088,938 UART: [art] Derive Key Pair - Done
3,103,864 UART: [art] Signing Cert with AUTHO
3,104,344 UART: RITY.KEYID = 7
3,119,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,087 UART: [art] PUB.X = 585AF56834E3778D9E3D2D7900A474645AE67BBDF15C8C3498DD15A210904B1586811102FC71EE8031590588CD235D0C
3,126,820 UART: [art] PUB.Y = E752BF2D829593A47B83DB75102AB2B2F09FF0E68C09431F6F078B577201428829C08AD7D06986B06722996D857225D8
3,133,751 UART: [art] SIG.R = 53E6A90D3F3AEA817822D277423C464485A582E1AC5E4AEF4631852FD98BF089E985615D3D9F1A5ADB6EEE10EF2626BB
3,140,528 UART: [art] SIG.S = AB26C349E599AC216755FD9997640B77677ADFCEFFEEA2F6DE7147C62B1C7D875D6CA7CD3D53F7BDB9F252396B4C3784
3,164,460 UART: Caliptra RT
3,164,713 UART: [state] CFI Enabled
3,273,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,798 UART: [rt]cmd =0x50435245, len=56
3,305,353 >>> mbox cmd response: failed
3,305,353 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,889 UART: [rt]cmd =0x50435245, len=56
3,336,432 >>> mbox cmd response: failed
3,336,432 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,928 UART: [rt]cmd =0x50435245, len=56
3,367,231 >>> mbox cmd response: failed
3,367,231 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,899 UART: [rt]cmd =0x50435245, len=56
3,398,630 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,155 ready_for_fw is high
1,060,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,870 >>> mbox cmd response: success
2,621,870 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,683,286 UART:
2,683,302 UART: Running Caliptra FMC ...
2,683,710 UART:
2,683,764 UART: [state] CFI Enabled
2,694,229 UART: [fht] FMC Alias Private Key: 7
2,802,654 UART: [art] Extend RT PCRs Done
2,803,082 UART: [art] Lock RT PCRs Done
2,804,792 UART: [art] Populate DV Done
2,812,607 UART: [fht] FMC Alias Private Key: 7
2,813,661 UART: [art] Derive CDI
2,813,941 UART: [art] Store in in slot 0x4
2,899,690 UART: [art] Derive Key Pair
2,900,050 UART: [art] Store priv key in slot 0x5
2,912,846 UART: [art] Derive Key Pair - Done
2,927,685 UART: [art] Signing Cert with AUTHO
2,928,165 UART: RITY.KEYID = 7
2,943,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,072 UART: [art] PUB.X = B54A964F2AB9A915B9796F51F8BBF3B1FBDB6A6EA4A569636199D9A57DF1B3347FCF42EA2707AF14732F7F92275C7853
2,950,849 UART: [art] PUB.Y = B288D8F7208941A0C971C5D61B4890B61300B4C2DC0B967563DE8AC3645484C57FEC631F542D52DFB701BBBC1B8D2100
2,957,753 UART: [art] SIG.R = 9FC4539DEDE54D07891C4C942A38EC88CED8FA0677FD4668EF5CFFF9EC23DE72C6A38FFC4ECE620B94224EB2BCECBAB9
2,964,546 UART: [art] SIG.S = 95BD3F3BD7023026606BB558960F99EE18A8CF2802670D54CAD4CAC61D254E54B06BF1D69417A55570F345210F4577C2
2,988,510 UART: Caliptra RT
2,988,763 UART: [state] CFI Enabled
3,096,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,499 UART: [rt]cmd =0x50435245, len=56
3,129,158 >>> mbox cmd response: failed
3,129,158 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,934 UART: [rt]cmd =0x50435245, len=56
3,160,215 >>> mbox cmd response: failed
3,160,215 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,133 UART: [rt]cmd =0x50435245, len=56
3,191,340 >>> mbox cmd response: failed
3,191,340 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,970 UART: [rt]cmd =0x50435245, len=56
3,222,365 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,635 UART: [kat] SHA2-512-ACC
908,536 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,172,098 UART: [cold-reset] ++
1,172,638 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 ready_for_fw is high
1,176,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,109 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,890 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,217,872 UART: [ldev] Erasing FE.KEYID = 1
1,243,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,283,119 UART: [fwproc] Wait for Commands...
1,283,831 UART: [fwproc] Recv command 0x46574c44
1,284,559 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,760 >>> mbox cmd response: success
2,771,760 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,772,876 UART: [afmc] ++
2,773,044 UART: [afmc] CDI.KEYID = 6
2,773,406 UART: [afmc] SUBJECT.KEYID = 7
2,773,831 UART: [afmc] AUTHORITY.KEYID = 5
2,809,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,236 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,625 UART: [afmc] --
2,852,505 UART: [cold-reset] --
2,853,141 UART: [state] Locking Datavault
2,854,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,924 UART: [state] Locking ICCM
2,855,458 UART: [exit] Launching FMC @ 0x40000130
2,860,787 UART:
2,860,803 UART: Running Caliptra FMC ...
2,861,211 UART:
2,861,354 UART: [state] CFI Enabled
2,872,033 UART: [fht] FMC Alias Private Key: 7
2,980,824 UART: [art] Extend RT PCRs Done
2,981,252 UART: [art] Lock RT PCRs Done
2,982,854 UART: [art] Populate DV Done
2,990,999 UART: [fht] FMC Alias Private Key: 7
2,992,111 UART: [art] Derive CDI
2,992,391 UART: [art] Store in in slot 0x4
3,077,680 UART: [art] Derive Key Pair
3,078,040 UART: [art] Store priv key in slot 0x5
3,091,456 UART: [art] Derive Key Pair - Done
3,106,450 UART: [art] Signing Cert with AUTHO
3,106,930 UART: RITY.KEYID = 7
3,122,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,117 UART: [art] PUB.X = ACD48144C1DBC46BA409795796E625C8F680FEF5FC1B3FF7A569A1CBB06B43EBFFA76FDA271B9EF0D075E34A9C1D0C18
3,129,905 UART: [art] PUB.Y = 404B77881EF73A61325D0878C124D764A7A4A0DEDC3D24A58A5E70535BA456EEA8984C5707387D835CC2659BD3A70F3E
3,136,848 UART: [art] SIG.R = 4001A7D50F51591E0615AC84AFC620B372DDBC3A69AD0EA041605080D89A9B46E20B7A6604AC8CD6541122C0340EC17B
3,143,601 UART: [art] SIG.S = 8F220FD0689DF9FFE97FD57157E2C5645735F363E96D2B26D52CB9E35E91E2C28DA23A16541DC79D121180EFB00B2827
3,167,218 UART: Caliptra RT
3,167,563 UART: [state] CFI Enabled
3,275,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,656 UART: [rt]cmd =0x50435245, len=56
3,308,341 >>> mbox cmd response: failed
3,308,341 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,855 UART: [rt]cmd =0x50435245, len=56
3,339,148 >>> mbox cmd response: failed
3,339,148 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,946 UART: [rt]cmd =0x50435245, len=56
3,370,547 >>> mbox cmd response: failed
3,370,547 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,373 UART: [rt]cmd =0x50435245, len=56
3,401,948 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 ready_for_fw is high
1,060,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,105 >>> mbox cmd response: success
2,625,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,919 UART:
2,687,935 UART: Running Caliptra FMC ...
2,688,343 UART:
2,688,486 UART: [state] CFI Enabled
2,699,323 UART: [fht] FMC Alias Private Key: 7
2,807,742 UART: [art] Extend RT PCRs Done
2,808,170 UART: [art] Lock RT PCRs Done
2,809,712 UART: [art] Populate DV Done
2,817,683 UART: [fht] FMC Alias Private Key: 7
2,818,741 UART: [art] Derive CDI
2,819,021 UART: [art] Store in in slot 0x4
2,904,510 UART: [art] Derive Key Pair
2,904,870 UART: [art] Store priv key in slot 0x5
2,917,700 UART: [art] Derive Key Pair - Done
2,932,508 UART: [art] Signing Cert with AUTHO
2,932,988 UART: RITY.KEYID = 7
2,948,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,125 UART: [art] PUB.X = B54E1E7B07E5E6ABFB5320FA1EA058A000290BF90C9107687B3189AB1604980949C3501602EAB7BE9AD3F9D2F6C531E3
2,955,858 UART: [art] PUB.Y = 66297C2A7B2D49D64A4B589E52009E43DE4FEF296F3C28865441C3D25B6381F2FFE7E2412D8DB68E33B23BE5040BFAB5
2,962,788 UART: [art] SIG.R = 37EF95CCD001AF383801F8FA50127F1553CE9D25E9596BEF4749ADCE6F533392C53FFD885CA130F4308ADC140A0BFD4F
2,969,560 UART: [art] SIG.S = 984BEEA8BB1D2755390E65084D45DF1995E536FBD916B2D73E26583519F5D99C43802B2C15AD7938977D979620DD8274
2,993,089 UART: Caliptra RT
2,993,434 UART: [state] CFI Enabled
3,101,475 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,289 UART: [rt]cmd =0x50435245, len=56
3,133,888 >>> mbox cmd response: failed
3,133,888 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,586 UART: [rt]cmd =0x50435245, len=56
3,165,171 >>> mbox cmd response: failed
3,165,171 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,809 UART: [rt]cmd =0x50435245, len=56
3,196,196 >>> mbox cmd response: failed
3,196,196 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,714 UART: [rt]cmd =0x50435245, len=56
3,227,115 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,673 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,587 UART: [idev] ++
1,172,755 UART: [idev] CDI.KEYID = 6
1,173,116 UART: [idev] SUBJECT.KEYID = 7
1,173,541 UART: [idev] UDS.KEYID = 0
1,173,887 ready_for_fw is high
1,173,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,153 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,102 UART: [ldev] ++
1,208,270 UART: [ldev] CDI.KEYID = 6
1,208,634 UART: [ldev] SUBJECT.KEYID = 5
1,209,061 UART: [ldev] AUTHORITY.KEYID = 7
1,209,524 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,474 UART: [fwproc] Wait for Commands...
1,281,127 UART: [fwproc] Recv command 0x46574c44
1,281,860 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,591 >>> mbox cmd response: success
2,768,591 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,769,804 UART: [afmc] ++
2,769,972 UART: [afmc] CDI.KEYID = 6
2,770,335 UART: [afmc] SUBJECT.KEYID = 7
2,770,761 UART: [afmc] AUTHORITY.KEYID = 5
2,805,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,971 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,145 UART: [afmc] --
2,849,181 UART: [cold-reset] --
2,849,959 UART: [state] Locking Datavault
2,851,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,606 UART: [state] Locking ICCM
2,852,090 UART: [exit] Launching FMC @ 0x40000130
2,857,419 UART:
2,857,435 UART: Running Caliptra FMC ...
2,857,843 UART:
2,857,897 UART: [state] CFI Enabled
2,868,658 UART: [fht] FMC Alias Private Key: 7
2,977,125 UART: [art] Extend RT PCRs Done
2,977,553 UART: [art] Lock RT PCRs Done
2,978,897 UART: [art] Populate DV Done
2,987,434 UART: [fht] FMC Alias Private Key: 7
2,988,492 UART: [art] Derive CDI
2,988,772 UART: [art] Store in in slot 0x4
3,074,141 UART: [art] Derive Key Pair
3,074,501 UART: [art] Store priv key in slot 0x5
3,088,129 UART: [art] Derive Key Pair - Done
3,103,166 UART: [art] Signing Cert with AUTHO
3,103,646 UART: RITY.KEYID = 7
3,118,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,731 UART: [art] PUB.X = 48D3402C03572AB0008654659AE7E047C9B52970490404D9A9DBBFFAF75EDEE20CFF81F9E08CF71222B88FD9EFD3C059
3,126,477 UART: [art] PUB.Y = 14AF7A3DFE193A8A50C071DE4CB0EA4A925EB3FA2506AC5935C9A5CAF31AED3D0AAA7E0F08E6F211ED0653A023F39C6E
3,133,438 UART: [art] SIG.R = E926BD14877E275441956F9FD4FC1BC173C48EEDAA20CD9CB08348D14BC67E4F9CB95B9C600415F8E5B38043AE165F03
3,140,212 UART: [art] SIG.S = 244307E3FD6D72394D79EFF0FB72203CC921183511D5131F144C741A85562983D33B9D6A87BB39FCC03B382F082EF8E6
3,163,591 UART: Caliptra RT
3,163,844 UART: [state] CFI Enabled
3,270,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,063 UART: [rt]cmd =0x50435245, len=56
3,302,772 >>> mbox cmd response: failed
3,302,772 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,346 UART: [rt]cmd =0x50435245, len=56
3,333,893 >>> mbox cmd response: failed
3,333,893 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,515 UART: [rt]cmd =0x50435245, len=56
3,364,910 >>> mbox cmd response: failed
3,364,910 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,830 UART: [rt]cmd =0x50435245, len=56
3,396,273 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,150 ready_for_fw is high
1,056,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,001 >>> mbox cmd response: success
2,620,001 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,681,723 UART:
2,681,739 UART: Running Caliptra FMC ...
2,682,147 UART:
2,682,201 UART: [state] CFI Enabled
2,692,746 UART: [fht] FMC Alias Private Key: 7
2,800,811 UART: [art] Extend RT PCRs Done
2,801,239 UART: [art] Lock RT PCRs Done
2,802,947 UART: [art] Populate DV Done
2,811,238 UART: [fht] FMC Alias Private Key: 7
2,812,384 UART: [art] Derive CDI
2,812,664 UART: [art] Store in in slot 0x4
2,898,423 UART: [art] Derive Key Pair
2,898,783 UART: [art] Store priv key in slot 0x5
2,912,223 UART: [art] Derive Key Pair - Done
2,926,966 UART: [art] Signing Cert with AUTHO
2,927,446 UART: RITY.KEYID = 7
2,942,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,593 UART: [art] PUB.X = ECD87A0248B93550F3D4BB72C8544802986F2C3BCBE2673399D29E7D1D945E3C7528995A6440FE753DA1E6AA5A85765B
2,950,359 UART: [art] PUB.Y = BA0C2D8DA8B819D225D3B6BB7DE28045A1BEDA975E5A6D5E52E3F56E31B1A3ECEBD0EF8FA1E2B1D1C64C13C9A216ACA6
2,957,338 UART: [art] SIG.R = AE1D6B73DFB85D077064446D5C9C98FD7208C41E88DA2F38A3F419EEFEE86705A65BA4B81D1F6F25F9AA3B7E2EE24385
2,964,115 UART: [art] SIG.S = 1CE77ED80989D218D47732E0DE7D60F1F6DAF994BE4137817741F7FEA457FF952A03B5C51A958838A1C502AC50E4B5C6
2,987,779 UART: Caliptra RT
2,988,032 UART: [state] CFI Enabled
3,095,309 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,195 UART: [rt]cmd =0x50435245, len=56
3,127,756 >>> mbox cmd response: failed
3,127,756 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,536 UART: [rt]cmd =0x50435245, len=56
3,158,873 >>> mbox cmd response: failed
3,158,873 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,421 UART: [rt]cmd =0x50435245, len=56
3,189,806 >>> mbox cmd response: failed
3,189,806 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,852 UART: [rt]cmd =0x50435245, len=56
3,221,365 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,331 UART: [ldev] Erasing FE.KEYID = 1
1,243,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,061 UART: [ldev] --
1,282,441 UART: [fwproc] Wait for Commands...
1,283,230 UART: [fwproc] Recv command 0x46574c44
1,283,963 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,614 >>> mbox cmd response: success
2,770,614 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,771,785 UART: [afmc] ++
2,771,953 UART: [afmc] CDI.KEYID = 6
2,772,316 UART: [afmc] SUBJECT.KEYID = 7
2,772,742 UART: [afmc] AUTHORITY.KEYID = 5
2,808,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,624 UART: [afmc] --
2,851,678 UART: [cold-reset] --
2,852,648 UART: [state] Locking Datavault
2,853,857 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,461 UART: [state] Locking ICCM
2,855,057 UART: [exit] Launching FMC @ 0x40000130
2,860,386 UART:
2,860,402 UART: Running Caliptra FMC ...
2,860,810 UART:
2,860,953 UART: [state] CFI Enabled
2,871,412 UART: [fht] FMC Alias Private Key: 7
2,980,081 UART: [art] Extend RT PCRs Done
2,980,509 UART: [art] Lock RT PCRs Done
2,981,859 UART: [art] Populate DV Done
2,990,252 UART: [fht] FMC Alias Private Key: 7
2,991,354 UART: [art] Derive CDI
2,991,634 UART: [art] Store in in slot 0x4
3,077,551 UART: [art] Derive Key Pair
3,077,911 UART: [art] Store priv key in slot 0x5
3,090,905 UART: [art] Derive Key Pair - Done
3,105,599 UART: [art] Signing Cert with AUTHO
3,106,079 UART: RITY.KEYID = 7
3,121,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,926 UART: [art] PUB.X = 6FF9F084C9C03A43D7F6EF2F268AE5DE9E0FC4F33EA39540ECF6332F7F2BA699D15DA2EFE53C1F901FFBBE7EDF12A62C
3,128,723 UART: [art] PUB.Y = 668EDF2B54BC3A4E29B115D3E65B0DB6C002E748A109B2680EC471AE6BE4BDE1236797D608FE65D947522E8889286B7E
3,135,664 UART: [art] SIG.R = 7017B6521E774CC22076001E78239E7A2368FD1D9BD7D75F38DECF6453FE5B68D43E44FB890B77D3D132D65EF6C77280
3,142,411 UART: [art] SIG.S = 5ABA645A9939E58B11B72791CA25BC2F6F9D0FB945FDB2A899874DA28D2BC65AE5EACC8E0FE8C72AD6F5B0880F1B9C7D
3,166,107 UART: Caliptra RT
3,166,452 UART: [state] CFI Enabled
3,274,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,663 UART: [rt]cmd =0x50435245, len=56
3,307,062 >>> mbox cmd response: failed
3,307,062 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,766 UART: [rt]cmd =0x50435245, len=56
3,338,425 >>> mbox cmd response: failed
3,338,425 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,187 UART: [rt]cmd =0x50435245, len=56
3,369,686 >>> mbox cmd response: failed
3,369,686 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,426 UART: [rt]cmd =0x50435245, len=56
3,400,919 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,499 ready_for_fw is high
1,055,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,292 >>> mbox cmd response: success
2,619,292 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,682,254 UART:
2,682,270 UART: Running Caliptra FMC ...
2,682,678 UART:
2,682,821 UART: [state] CFI Enabled
2,693,206 UART: [fht] FMC Alias Private Key: 7
2,801,653 UART: [art] Extend RT PCRs Done
2,802,081 UART: [art] Lock RT PCRs Done
2,803,507 UART: [art] Populate DV Done
2,811,650 UART: [fht] FMC Alias Private Key: 7
2,812,794 UART: [art] Derive CDI
2,813,074 UART: [art] Store in in slot 0x4
2,898,757 UART: [art] Derive Key Pair
2,899,117 UART: [art] Store priv key in slot 0x5
2,912,131 UART: [art] Derive Key Pair - Done
2,926,635 UART: [art] Signing Cert with AUTHO
2,927,115 UART: RITY.KEYID = 7
2,942,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,940 UART: [art] PUB.X = 09DAFCD80BE5E82ADED986F7F12EFDD87A5900901222E41ABE0A9235CAD12E52BA56AE8DD3728C5E8D4B2E01AE9FDA87
2,949,702 UART: [art] PUB.Y = 4226B1AC508FBBD765F6D0A5F12459BD23EDE5DE0A7E8EF86820CF0C08CB4545A6FC844F2F2E1CBDF5F8AAA776299CA9
2,956,667 UART: [art] SIG.R = 3CF434FD4645D6062E3ADBF3FCEC8584C5EBFCF255F001999BFA2C5EB03B5938D9A5DD05CC8AE859141D8BFCBED968DA
2,963,456 UART: [art] SIG.S = 31514F5440F7192E95501546C302E975AD88DE0AFF0ABFB271337544BEFE4F7ADE94E9487778A08AE0BCD230BD884572
2,987,052 UART: Caliptra RT
2,987,397 UART: [state] CFI Enabled
3,095,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,222 UART: [rt]cmd =0x50435245, len=56
3,127,701 >>> mbox cmd response: failed
3,127,701 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,353 UART: [rt]cmd =0x50435245, len=56
3,158,578 >>> mbox cmd response: failed
3,158,578 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,488 UART: [rt]cmd =0x50435245, len=56
3,189,629 >>> mbox cmd response: failed
3,189,629 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,333 UART: [rt]cmd =0x50435245, len=56
3,220,822 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,250 UART:
192,618 UART: Running Caliptra ROM ...
193,724 UART:
193,872 UART: [state] CFI Enabled
264,723 UART: [state] LifecycleState = Unprovisioned
266,632 UART: [state] DebugLocked = No
268,871 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,878 UART: [kat] SHA2-256
442,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,076 UART: [kat] ++
453,531 UART: [kat] sha1
463,762 UART: [kat] SHA2-256
466,491 UART: [kat] SHA2-384
472,129 UART: [kat] SHA2-512-ACC
474,502 UART: [kat] ECC-384
2,766,200 UART: [kat] HMAC-384Kdf
2,778,721 UART: [kat] LMS
3,969,027 UART: [kat] --
3,975,516 UART: [cold-reset] ++
3,976,520 UART: [fht] Storing FHT @ 0x50003400
3,987,728 UART: [idev] ++
3,988,290 UART: [idev] CDI.KEYID = 6
3,989,170 UART: [idev] SUBJECT.KEYID = 7
3,990,482 UART: [idev] UDS.KEYID = 0
3,991,435 ready_for_fw is high
3,991,615 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,664 UART: [idev] Erasing UDS.KEYID = 0
7,326,575 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,412 UART: [idev] --
7,353,248 UART: [ldev] ++
7,353,878 UART: [ldev] CDI.KEYID = 6
7,354,797 UART: [ldev] SUBJECT.KEYID = 5
7,356,014 UART: [ldev] AUTHORITY.KEYID = 7
7,357,302 UART: [ldev] FE.KEYID = 1
7,399,924 UART: [ldev] Erasing FE.KEYID = 1
10,733,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,692 UART: [ldev] --
13,095,363 UART: [fwproc] Waiting for Commands...
13,097,671 UART: [fwproc] Received command 0x46574c44
13,099,860 UART: [fwproc] Received Image of size 113760 bytes
17,154,730 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,541 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,614,475 >>> mbox cmd response: success
17,615,013 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,619,106 UART: [afmc] ++
17,619,695 UART: [afmc] CDI.KEYID = 6
17,620,721 UART: [afmc] SUBJECT.KEYID = 7
17,621,902 UART: [afmc] AUTHORITY.KEYID = 5
20,995,298 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,294,629 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,296,884 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,311,297 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,326,121 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,340,561 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,361,805 UART: [afmc] --
23,365,825 UART: [cold-reset] --
23,370,501 UART: [state] Locking Datavault
23,375,246 UART: [state] Locking PCR0, PCR1 and PCR31
23,376,953 UART: [state] Locking ICCM
23,378,705 UART: [exit] Launching FMC @ 0x40000130
23,387,093 UART:
23,387,332 UART: Running Caliptra FMC ...
23,388,354 UART:
23,388,521 UART: [state] CFI Enabled
23,455,639 UART: [fht] FMC Alias Private Key: 7
25,793,858 UART: [art] Extend RT PCRs Done
25,795,087 UART: [art] Lock RT PCRs Done
25,796,527 UART: [art] Populate DV Done
25,802,098 UART: [fht] FMC Alias Private Key: 7
25,803,798 UART: [art] Derive CDI
25,804,607 UART: [art] Store in in slot 0x4
25,863,729 UART: [art] Derive Key Pair
25,864,774 UART: [art] Store priv key in slot 0x5
29,157,510 UART: [art] Derive Key Pair - Done
29,170,619 UART: [art] Signing Cert with AUTHO
29,171,928 UART: RITY.KEYID = 7
31,458,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,191 UART: [art] PUB.X = F5D87C4F86C0990FDF07ACE406B1AFE9B72006ECD9F067C2C9EDECB18F6C167DFA7D05EB800F9C34735F82577500C110
31,467,436 UART: [art] PUB.Y = 85452A4126E479BB12B6B100ECEA8C7A59FEB0B7DC3C579A7FDDE9186871275EADD76E802A6F4B80E589B685781B879F
31,474,691 UART: [art] SIG.R = 869F2B2E727AE4B0AE13A0087C8C16D1C94217E45B5E6CBD2EAA055BE2F05CBF36F9173259E3BD4101641DCD720502C8
31,482,083 UART: [art] SIG.S = 1F760556D8BCD69AA13F0504FDB41903A7065977263A8C36B77F40A7555A374785A0371B82749625B58189AA6E7C246C
32,787,290 UART: Caliptra RT
32,788,019 UART: [state] CFI Enabled
32,947,834 UART: [rt] RT listening for mailbox commands...
32,979,030 UART: [rt]cmd =0x50435252, len=8
32,980,966 >>> mbox cmd response data (8 bytes)
32,981,806 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,012,012 UART: [rt]cmd =0x50435251, len=36
34,175,734 >>> mbox cmd response data (1848 bytes)
34,186,010 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,215,882 UART: [rt]cmd =0x43455246, len=4
34,228,879 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,809,472 ready_for_fw is high
3,809,861 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,890,368 >>> mbox cmd response: success
17,891,300 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,576,964 UART:
23,577,342 UART: Running Caliptra FMC ...
23,578,546 UART:
23,578,751 UART: [state] CFI Enabled
23,646,970 UART: [fht] FMC Alias Private Key: 7
25,985,252 UART: [art] Extend RT PCRs Done
25,986,470 UART: [art] Lock RT PCRs Done
25,988,153 UART: [art] Populate DV Done
25,993,510 UART: [fht] FMC Alias Private Key: 7
25,995,209 UART: [art] Derive CDI
25,996,028 UART: [art] Store in in slot 0x4
26,055,570 UART: [art] Derive Key Pair
26,056,619 UART: [art] Store priv key in slot 0x5
29,349,687 UART: [art] Derive Key Pair - Done
29,363,180 UART: [art] Signing Cert with AUTHO
29,364,493 UART: RITY.KEYID = 7
31,650,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,490 UART: [art] PUB.X = BFC6A93EF9DBA623D3096717C25A8633F8CD6D28D35EF4ECD1C3D87060138C344C31736BAC2F36F51E7FEA3368E90E0F
31,659,749 UART: [art] PUB.Y = A7F652CAD4C25FC06A2A1F5998F5EC2721E182E2BDC1BC53588CDB11716326D7D403C6264366F119346F144446A240F8
31,666,970 UART: [art] SIG.R = F01446104058A8B1875D4870DE59BC592DE5C2B1B3B726600860FF866C56EF1D0837B220C24558C1D26841CA0025F022
31,674,321 UART: [art] SIG.S = 1DEBA54C4762808F6007E121D68154CC3B422FFD2BCC0E50A98187D80C21C3A74A2FC24B4915EB4752DFA08633FCC2A7
32,979,825 UART: Caliptra RT
32,980,530 UART: [state] CFI Enabled
33,139,837 UART: [rt] RT listening for mailbox commands...
33,171,142 UART: [rt]cmd =0x50435252, len=8
33,172,995 >>> mbox cmd response data (8 bytes)
33,173,815 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,203,642 UART: [rt]cmd =0x50435251, len=36
34,368,654 >>> mbox cmd response data (1848 bytes)
34,378,864 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,408,667 UART: [rt]cmd =0x43455246, len=4
34,421,729 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
192,963 UART:
193,315 UART: Running Caliptra ROM ...
194,516 UART:
604,063 UART: [state] CFI Enabled
617,944 UART: [state] LifecycleState = Unprovisioned
619,894 UART: [state] DebugLocked = No
621,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,127 UART: [kat] SHA2-256
796,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,442 UART: [kat] ++
807,881 UART: [kat] sha1
819,384 UART: [kat] SHA2-256
822,023 UART: [kat] SHA2-384
828,089 UART: [kat] SHA2-512-ACC
830,454 UART: [kat] ECC-384
3,113,833 UART: [kat] HMAC-384Kdf
3,124,523 UART: [kat] LMS
4,314,658 UART: [kat] --
4,320,614 UART: [cold-reset] ++
4,322,905 UART: [fht] Storing FHT @ 0x50003400
4,333,746 UART: [idev] ++
4,334,305 UART: [idev] CDI.KEYID = 6
4,335,249 UART: [idev] SUBJECT.KEYID = 7
4,336,484 UART: [idev] UDS.KEYID = 0
4,337,447 ready_for_fw is high
4,337,644 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,526 UART: [idev] Erasing UDS.KEYID = 0
7,624,794 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,302 UART: [idev] --
7,650,328 UART: [ldev] ++
7,650,951 UART: [ldev] CDI.KEYID = 6
7,651,924 UART: [ldev] SUBJECT.KEYID = 5
7,653,073 UART: [ldev] AUTHORITY.KEYID = 7
7,654,355 UART: [ldev] FE.KEYID = 1
7,664,735 UART: [ldev] Erasing FE.KEYID = 1
10,954,904 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,991 UART: [ldev] --
13,315,867 UART: [fwproc] Waiting for Commands...
13,319,246 UART: [fwproc] Received command 0x46574c44
13,321,424 UART: [fwproc] Received Image of size 113760 bytes
17,364,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,685 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,578 >>> mbox cmd response: success
17,828,148 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,832,253 UART: [afmc] ++
17,832,866 UART: [afmc] CDI.KEYID = 6
17,833,775 UART: [afmc] SUBJECT.KEYID = 7
17,834,990 UART: [afmc] AUTHORITY.KEYID = 5
21,146,447 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,281 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,677 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,489 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,917 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,719 UART: [afmc] --
23,511,944 UART: [cold-reset] --
23,515,537 UART: [state] Locking Datavault
23,521,424 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,174 UART: [state] Locking ICCM
23,525,994 UART: [exit] Launching FMC @ 0x40000130
23,534,382 UART:
23,534,637 UART: Running Caliptra FMC ...
23,535,740 UART:
23,535,893 UART: [state] CFI Enabled
23,544,093 UART: [fht] FMC Alias Private Key: 7
25,874,411 UART: [art] Extend RT PCRs Done
25,875,630 UART: [art] Lock RT PCRs Done
25,877,077 UART: [art] Populate DV Done
25,882,277 UART: [fht] FMC Alias Private Key: 7
25,883,871 UART: [art] Derive CDI
25,884,606 UART: [art] Store in in slot 0x4
25,927,786 UART: [art] Derive Key Pair
25,928,822 UART: [art] Store priv key in slot 0x5
29,170,655 UART: [art] Derive Key Pair - Done
29,183,851 UART: [art] Signing Cert with AUTHO
29,185,178 UART: RITY.KEYID = 7
31,464,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,860 UART: [art] PUB.X = 40915FD029FC90BD07E81C04F419C7A10C1C921ABE57B5DF75E33E0B4EC1DFD34BFD6AA721A35E655AC077F065FD2B49
31,473,124 UART: [art] PUB.Y = E753AA9B3A83DE07440648F8C0C6F569F3210FB144D28BCFD647AE4921D8B5BB738211CF613BDE13F7C8198E8059184E
31,480,374 UART: [art] SIG.R = CC81560B71694B0D1744A1381BB2C9788F92305E3335288F4587B21CBD78E1FBA20091BB0FD63E9445BAEE91F6B3C3C9
31,487,726 UART: [art] SIG.S = 9FA386AFBE4A55E5BDAEC1817297489A5681A6FB0812BD12317D3AA16666A5C8861E854BB837FB0F20D0B856ABED0154
32,793,533 UART: Caliptra RT
32,794,255 UART: [state] CFI Enabled
32,911,700 UART: [rt] RT listening for mailbox commands...
32,943,220 UART: [rt]cmd =0x50435252, len=8
32,945,047 >>> mbox cmd response data (8 bytes)
32,946,029 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,976,174 UART: [rt]cmd =0x50435251, len=36
34,131,474 >>> mbox cmd response data (1848 bytes)
34,141,722 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,171,390 UART: [rt]cmd =0x43455246, len=4
34,184,413 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
4,128,024 ready_for_fw is high
4,128,516 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,075,052 >>> mbox cmd response: success
18,075,695 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,715,927 UART:
23,716,312 UART: Running Caliptra FMC ...
23,717,448 UART:
23,717,601 UART: [state] CFI Enabled
23,725,870 UART: [fht] FMC Alias Private Key: 7
26,056,309 UART: [art] Extend RT PCRs Done
26,057,665 UART: [art] Lock RT PCRs Done
26,059,299 UART: [art] Populate DV Done
26,064,876 UART: [fht] FMC Alias Private Key: 7
26,066,581 UART: [art] Derive CDI
26,067,396 UART: [art] Store in in slot 0x4
26,109,829 UART: [art] Derive Key Pair
26,110,829 UART: [art] Store priv key in slot 0x5
29,352,047 UART: [art] Derive Key Pair - Done
29,365,156 UART: [art] Signing Cert with AUTHO
29,366,466 UART: RITY.KEYID = 7
31,645,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,137 UART: [art] PUB.X = 664B0EAA8A52F3085C48E7630E0B5774F9ABE7B90B7AF1A6212BA4708D26857C6508FD41A0FACAD835E3C969ABF38FF5
31,654,369 UART: [art] PUB.Y = A9E53A885F5D96AC1EC99845B4A34AE01E96D78FCCE16AF4803616EE23BF467FF17F496C8669EDE7823AE8179DAB6D84
31,661,621 UART: [art] SIG.R = 7BF693FB7BA902585ED103A7C7EFC180B0BA18B1F7A39CDA3119F3D82C74D6EED4FD25493B8F89957F432C3408024A6B
31,669,034 UART: [art] SIG.S = 80331CAB331404E0E98F9851DAF8AEAC28D7492C923455E518CA6ADE272D5A695B0CBFB19AE576B7049D29B1A8B60891
32,974,697 UART: Caliptra RT
32,975,414 UART: [state] CFI Enabled
33,092,429 UART: [rt] RT listening for mailbox commands...
33,123,568 UART: [rt]cmd =0x50435252, len=8
33,125,340 >>> mbox cmd response data (8 bytes)
33,126,223 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,156,348 UART: [rt]cmd =0x50435251, len=36
34,311,873 >>> mbox cmd response data (1848 bytes)
34,322,063 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,351,876 UART: [rt]cmd =0x43455246, len=4
34,364,755 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,482 UART:
192,846 UART: Running Caliptra ROM ...
194,031 UART:
194,185 UART: [state] CFI Enabled
268,380 UART: [state] LifecycleState = Unprovisioned
270,304 UART: [state] DebugLocked = No
271,550 UART: [state] WD Timer not started. Device not locked for debugging
274,800 UART: [kat] SHA2-256
453,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,505 UART: [kat] ++
466,044 UART: [kat] sha1
476,928 UART: [kat] SHA2-256
479,934 UART: [kat] SHA2-384
484,709 UART: [kat] SHA2-512-ACC
487,639 UART: [kat] ECC-384
2,949,613 UART: [kat] HMAC-384Kdf
2,974,237 UART: [kat] LMS
3,503,713 UART: [kat] --
3,507,747 UART: [cold-reset] ++
3,509,110 UART: [fht] FHT @ 0x50003400
3,521,005 UART: [idev] ++
3,521,576 UART: [idev] CDI.KEYID = 6
3,522,603 UART: [idev] SUBJECT.KEYID = 7
3,523,703 UART: [idev] UDS.KEYID = 0
3,524,697 ready_for_fw is high
3,524,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,474 UART: [idev] Erasing UDS.KEYID = 0
6,027,844 UART: [idev] Sha1 KeyId Algorithm
6,051,881 UART: [idev] --
6,056,823 UART: [ldev] ++
6,057,397 UART: [ldev] CDI.KEYID = 6
6,058,278 UART: [ldev] SUBJECT.KEYID = 5
6,059,507 UART: [ldev] AUTHORITY.KEYID = 7
6,060,736 UART: [ldev] FE.KEYID = 1
6,100,624 UART: [ldev] Erasing FE.KEYID = 1
8,603,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,471 UART: [ldev] --
10,413,596 UART: [fwproc] Wait for Commands...
10,415,957 UART: [fwproc] Recv command 0x46574c44
10,418,042 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,416 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,277,358 >>> mbox cmd response: success
14,277,936 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,282,058 UART: [afmc] ++
14,282,651 UART: [afmc] CDI.KEYID = 6
14,283,530 UART: [afmc] SUBJECT.KEYID = 7
14,284,742 UART: [afmc] AUTHORITY.KEYID = 5
16,830,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,267 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,593,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,609,066 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,624,940 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,647,900 UART: [afmc] --
18,652,192 UART: [cold-reset] --
18,656,101 UART: [state] Locking Datavault
18,660,810 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,451 UART: [state] Locking ICCM
18,665,262 UART: [exit] Launching FMC @ 0x40000130
18,673,660 UART:
18,673,890 UART: Running Caliptra FMC ...
18,674,986 UART:
18,675,140 UART: [state] CFI Enabled
18,731,906 UART: [fht] FMC Alias Private Key: 7
20,496,337 UART: [art] Extend RT PCRs Done
20,497,554 UART: [art] Lock RT PCRs Done
20,499,446 UART: [art] Populate DV Done
20,504,794 UART: [fht] FMC Alias Private Key: 7
20,506,434 UART: [art] Derive CDI
20,507,240 UART: [art] Store in in slot 0x4
20,564,144 UART: [art] Derive Key Pair
20,565,180 UART: [art] Store priv key in slot 0x5
23,027,617 UART: [art] Derive Key Pair - Done
23,040,294 UART: [art] Signing Cert with AUTHO
23,041,619 UART: RITY.KEYID = 7
24,753,416 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,916 UART: [art] PUB.X = 4DCFE11EC4C69CF1C192E8AACF3EC9F3EEC7E1D3B5183F06BDA351409A829BAFF5BBD05CCB3A3737FF7A205EB2B69D52
24,762,236 UART: [art] PUB.Y = 9D4A49A0A7425C79E609AA9A2FBE410D88BCF03A893ADB661888097B7CF8C728E064C308CCA6B4C27537302FBA161EA7
24,769,550 UART: [art] SIG.R = 051ADC29A84A719EEB14948060FC0F0E2657BC5C69B01BEED586B6DA142A4F76CFD2C45E74DB65E428594CD909C5D648
24,776,957 UART: [art] SIG.S = 77743C15EE7296903B9ECB39FD23FD94F04E533F38C5F61F5BDC947F8D83AFC45A28E22BA593C4A787977B0B1D429205
25,756,106 UART: Caliptra RT
25,756,810 UART: [state] CFI Enabled
25,921,587 UART: [rt] RT listening for mailbox commands...
25,952,888 UART: [rt]cmd =0x50435252, len=8
25,954,954 >>> mbox cmd response data (8 bytes)
25,955,707 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,985,684 UART: [rt]cmd =0x50435251, len=36
26,902,711 >>> mbox cmd response data (1848 bytes)
26,912,950 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,942,729 UART: [rt]cmd =0x43455246, len=4
26,955,442 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
3,359,814 ready_for_fw is high
3,360,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,072,158 >>> mbox cmd response: success
14,072,946 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,364,586 UART:
18,364,987 UART: Running Caliptra FMC ...
18,366,121 UART:
18,366,278 UART: [state] CFI Enabled
18,430,838 UART: [fht] FMC Alias Private Key: 7
20,195,523 UART: [art] Extend RT PCRs Done
20,197,283 UART: [art] Lock RT PCRs Done
20,198,623 UART: [art] Populate DV Done
20,204,166 UART: [fht] FMC Alias Private Key: 7
20,205,770 UART: [art] Derive CDI
20,206,590 UART: [art] Store in in slot 0x4
20,263,135 UART: [art] Derive Key Pair
20,264,178 UART: [art] Store priv key in slot 0x5
22,727,212 UART: [art] Derive Key Pair - Done
22,740,173 UART: [art] Signing Cert with AUTHO
22,741,478 UART: RITY.KEYID = 7
24,452,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,750 UART: [art] PUB.X = 2FDFA7514959E118E9ECE685F91A96D2BFFFB674B901B0E131BDA46BBB2BD6A4D11BB7DCF2BCBD7239C0705D05ADB815
24,461,068 UART: [art] PUB.Y = 3E3AEAA09F55C6579223330603F761E6C642B7CD7D21DEF31DE4BE30DFBD3104E70107C8EF29D07A0D81E2C0E1904A44
24,468,317 UART: [art] SIG.R = 06A2972CD3CBA2C508FDC5B7506DF660650DD83F656FF964108C233EE673DCD2F989CD4AF04BEA648F276D8D1C0B7DDD
24,475,685 UART: [art] SIG.S = EE51932141595479B034A8E442EC15F1A3702F16F33FDF3D96DA0AB220AC9C93EC3CBC43069F0C00E5979D103D3FB200
25,454,454 UART: Caliptra RT
25,455,187 UART: [state] CFI Enabled
25,619,599 UART: [rt] RT listening for mailbox commands...
25,650,962 UART: [rt]cmd =0x50435252, len=8
25,653,130 >>> mbox cmd response data (8 bytes)
25,654,253 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,684,436 UART: [rt]cmd =0x50435251, len=36
26,601,767 >>> mbox cmd response data (1848 bytes)
26,611,976 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,641,957 UART: [rt]cmd =0x43455246, len=4
26,654,604 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
192,971 UART:
193,358 UART: Running Caliptra ROM ...
194,736 UART:
604,121 UART: [state] CFI Enabled
616,854 UART: [state] LifecycleState = Unprovisioned
618,762 UART: [state] DebugLocked = No
620,371 UART: [state] WD Timer not started. Device not locked for debugging
624,342 UART: [kat] SHA2-256
803,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,021 UART: [kat] ++
815,569 UART: [kat] sha1
826,880 UART: [kat] SHA2-256
829,967 UART: [kat] SHA2-384
837,397 UART: [kat] SHA2-512-ACC
840,371 UART: [kat] ECC-384
3,284,175 UART: [kat] HMAC-384Kdf
3,295,219 UART: [kat] LMS
3,824,688 UART: [kat] --
3,831,042 UART: [cold-reset] ++
3,833,552 UART: [fht] FHT @ 0x50003400
3,845,947 UART: [idev] ++
3,846,539 UART: [idev] CDI.KEYID = 6
3,847,427 UART: [idev] SUBJECT.KEYID = 7
3,848,600 UART: [idev] UDS.KEYID = 0
3,849,606 ready_for_fw is high
3,849,824 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,197 UART: [idev] Erasing UDS.KEYID = 0
6,324,034 UART: [idev] Sha1 KeyId Algorithm
6,346,991 UART: [idev] --
6,351,905 UART: [ldev] ++
6,352,476 UART: [ldev] CDI.KEYID = 6
6,353,360 UART: [ldev] SUBJECT.KEYID = 5
6,354,575 UART: [ldev] AUTHORITY.KEYID = 7
6,355,841 UART: [ldev] FE.KEYID = 1
6,365,925 UART: [ldev] Erasing FE.KEYID = 1
8,835,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,764 UART: [ldev] --
10,623,684 UART: [fwproc] Wait for Commands...
10,625,613 UART: [fwproc] Recv command 0x46574c44
10,627,707 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,930 >>> mbox cmd response: success
14,484,523 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,487,791 UART: [afmc] ++
14,488,385 UART: [afmc] CDI.KEYID = 6
14,489,299 UART: [afmc] SUBJECT.KEYID = 7
14,490,517 UART: [afmc] AUTHORITY.KEYID = 5
16,991,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,243 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,871 UART: [afmc] --
18,787,893 UART: [cold-reset] --
18,792,186 UART: [state] Locking Datavault
18,798,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,331 UART: [state] Locking ICCM
18,802,128 UART: [exit] Launching FMC @ 0x40000130
18,810,520 UART:
18,810,761 UART: Running Caliptra FMC ...
18,811,800 UART:
18,811,948 UART: [state] CFI Enabled
18,820,095 UART: [fht] FMC Alias Private Key: 7
20,576,279 UART: [art] Extend RT PCRs Done
20,577,502 UART: [art] Lock RT PCRs Done
20,579,152 UART: [art] Populate DV Done
20,584,621 UART: [fht] FMC Alias Private Key: 7
20,586,270 UART: [art] Derive CDI
20,587,086 UART: [art] Store in in slot 0x4
20,629,466 UART: [art] Derive Key Pair
20,630,506 UART: [art] Store priv key in slot 0x5
23,056,608 UART: [art] Derive Key Pair - Done
23,069,509 UART: [art] Signing Cert with AUTHO
23,070,825 UART: RITY.KEYID = 7
24,776,532 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,038 UART: [art] PUB.X = 2FC893DEB2E775A947989A5C281A3228AAD656D6536FD96BECC8ABEBEDC04B3F5EC6FF13E93B61048B815C9AD0626AEA
24,785,310 UART: [art] PUB.Y = 700F4553FC004FBB55F2F05001F9F7FA21B8ACB1915CB725C40DBC73B7353125132853C78EF55A8C16E4E8252A0EF689
24,792,586 UART: [art] SIG.R = B02C7A84273A3B05C0BCA990995A2EAC45E88369856C5E4661FAFB02FC2013EA83AC46631C078944E478F51A0974BD9A
24,799,969 UART: [art] SIG.S = 55EB6E2E673458E9CA1AE3FFF5F29C15B4D61BF467BE9419397E2C32153D62778A613ED6C59342293F2ECA05942F149E
25,779,056 UART: Caliptra RT
25,779,756 UART: [state] CFI Enabled
25,897,263 UART: [rt] RT listening for mailbox commands...
25,928,403 UART: [rt]cmd =0x50435252, len=8
25,930,790 >>> mbox cmd response data (8 bytes)
25,931,556 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,961,659 UART: [rt]cmd =0x50435251, len=36
26,869,263 >>> mbox cmd response data (1848 bytes)
26,879,534 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,909,228 UART: [rt]cmd =0x43455246, len=4
26,921,971 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
3,695,306 ready_for_fw is high
3,695,918 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,381 >>> mbox cmd response: success
14,258,068 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,508,550 UART:
18,508,971 UART: Running Caliptra FMC ...
18,510,120 UART:
18,510,305 UART: [state] CFI Enabled
18,518,269 UART: [fht] FMC Alias Private Key: 7
20,275,480 UART: [art] Extend RT PCRs Done
20,276,701 UART: [art] Lock RT PCRs Done
20,278,519 UART: [art] Populate DV Done
20,283,823 UART: [fht] FMC Alias Private Key: 7
20,285,311 UART: [art] Derive CDI
20,286,086 UART: [art] Store in in slot 0x4
20,328,858 UART: [art] Derive Key Pair
20,329,894 UART: [art] Store priv key in slot 0x5
22,757,155 UART: [art] Derive Key Pair - Done
22,769,660 UART: [art] Signing Cert with AUTHO
22,770,974 UART: RITY.KEYID = 7
24,476,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,726 UART: [art] PUB.X = B25F818F54E4F6C64A9602E6ED7AD5398ABB90D191FA02EDB0D36AE72121EF7C9BC64F8877B9D206B3EB8E690C2026A5
24,485,047 UART: [art] PUB.Y = 565ACA9563D6F3A928335C02CC32486C01857E2ED415E129D1763C13205EADFF66F2E23AE9D93A5D3EC222F77323ADAC
24,492,298 UART: [art] SIG.R = 6F8BEC3B36B3505CE378D0D1A5BCD2EA3EEC8C29DB04C34C632ED5CDC3E6D4E3AB0A46E4021D620411409E77530535E6
24,499,728 UART: [art] SIG.S = FE64963FE35F5DBC60225ED9AE24F5BE8FD2179430932396CE47D6AD9FAB4B9298F7D0C8599D4146F6864B9654CF651B
25,478,460 UART: Caliptra RT
25,479,175 UART: [state] CFI Enabled
25,595,872 UART: [rt] RT listening for mailbox commands...
25,627,178 UART: [rt]cmd =0x50435252, len=8
25,629,078 >>> mbox cmd response data (8 bytes)
25,630,049 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,659,881 UART: [rt]cmd =0x50435251, len=36
26,567,619 >>> mbox cmd response data (1848 bytes)
26,577,817 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,607,668 UART: [rt]cmd =0x43455246, len=4
26,620,357 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
192,489 UART:
192,877 UART: Running Caliptra ROM ...
193,986 UART:
194,148 UART: [state] CFI Enabled
267,649 UART: [state] LifecycleState = Unprovisioned
270,073 UART: [state] DebugLocked = No
272,593 UART: [state] WD Timer not started. Device not locked for debugging
277,140 UART: [kat] SHA2-256
467,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,767 UART: [kat] ++
478,215 UART: [kat] sha1
490,934 UART: [kat] SHA2-256
494,004 UART: [kat] SHA2-384
499,853 UART: [kat] SHA2-512-ACC
502,442 UART: [kat] ECC-384
2,950,848 UART: [kat] HMAC-384Kdf
2,971,754 UART: [kat] LMS
3,503,559 UART: [kat] --
3,509,257 UART: [cold-reset] ++
3,511,273 UART: [fht] FHT @ 0x50003400
3,521,325 UART: [idev] ++
3,522,036 UART: [idev] CDI.KEYID = 6
3,523,034 UART: [idev] SUBJECT.KEYID = 7
3,524,210 UART: [idev] UDS.KEYID = 0
3,525,132 ready_for_fw is high
3,525,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,786 UART: [idev] Erasing UDS.KEYID = 0
6,028,092 UART: [idev] Sha1 KeyId Algorithm
6,050,933 UART: [idev] --
6,057,307 UART: [ldev] ++
6,057,988 UART: [ldev] CDI.KEYID = 6
6,058,888 UART: [ldev] SUBJECT.KEYID = 5
6,060,052 UART: [ldev] AUTHORITY.KEYID = 7
6,061,286 UART: [ldev] FE.KEYID = 1
6,099,880 UART: [ldev] Erasing FE.KEYID = 1
8,609,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,096 UART: [ldev] --
10,413,304 UART: [fwproc] Wait for Commands...
10,415,281 UART: [fwproc] Recv command 0x46574c44
10,417,534 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,595,698 >>> mbox cmd response: success
14,596,267 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,600,047 UART: [afmc] ++
14,600,753 UART: [afmc] CDI.KEYID = 6
14,601,882 UART: [afmc] SUBJECT.KEYID = 7
14,603,380 UART: [afmc] AUTHORITY.KEYID = 5
17,127,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,216 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,212 UART: [afmc] --
18,926,138 UART: [cold-reset] --
18,929,411 UART: [state] Locking Datavault
18,934,784 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,002 UART: [state] Locking ICCM
18,939,432 UART: [exit] Launching FMC @ 0x40000130
18,948,119 UART:
18,948,346 UART: Running Caliptra FMC ...
18,949,463 UART:
18,949,631 UART: [state] CFI Enabled
19,009,512 UART: [fht] FMC Alias Private Key: 7
20,773,060 UART: [art] Extend RT PCRs Done
20,774,554 UART: [art] Lock RT PCRs Done
20,775,829 UART: [art] Populate DV Done
20,781,365 UART: [fht] FMC Alias Private Key: 7
20,782,962 UART: [art] Derive CDI
20,783,738 UART: [art] Store in in slot 0x4
20,841,743 UART: [art] Derive Key Pair
20,842,780 UART: [art] Store priv key in slot 0x5
23,306,671 UART: [art] Derive Key Pair - Done
23,319,618 UART: [art] Signing Cert with AUTHO
23,320,928 UART: RITY.KEYID = 7
25,033,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,642 UART: [art] PUB.X = 3686BC459109C970884EE911C10AA74ABEC4E2F759E08EEE85A15C924327D0D338210DB94D1BDC79B0F4E2ED5A8C8A8D
25,041,874 UART: [art] PUB.Y = D358A7A82FF3EAFC63710E7EB4962F1E671AB94FA9D53FF47F71F9016957544AD707A4E2F7A499C0491C8D803BC27857
25,049,176 UART: [art] SIG.R = E4FA6A3770DA955225F69EF8FE9480A59BCF24CB074DB705479EA444DFE4836D528E2C01BC815A5F6819BAD13C478107
25,056,552 UART: [art] SIG.S = 20EB42A0842FACAA06472F5C753060510959D94B4F9BF513A31A24A079591F434C57BB4687E79F17CE0B451CBD260355
26,035,606 UART: Caliptra RT
26,036,324 UART: [state] CFI Enabled
26,201,031 UART: [rt] RT listening for mailbox commands...
26,232,403 UART: [rt]cmd =0x50435252, len=8
26,234,414 >>> mbox cmd response data (8 bytes)
26,235,528 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,265,729 UART: [rt]cmd =0x50435251, len=36
27,181,752 >>> mbox cmd response data (1848 bytes)
27,192,074 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,221,881 UART: [rt]cmd =0x43455246, len=4
27,234,629 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,436,963 ready_for_fw is high
3,437,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,457 >>> mbox cmd response: success
14,729,221 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,005,434 UART:
19,005,837 UART: Running Caliptra FMC ...
19,006,949 UART:
19,007,125 UART: [state] CFI Enabled
19,076,767 UART: [fht] FMC Alias Private Key: 7
20,841,026 UART: [art] Extend RT PCRs Done
20,842,251 UART: [art] Lock RT PCRs Done
20,843,880 UART: [art] Populate DV Done
20,849,360 UART: [fht] FMC Alias Private Key: 7
20,850,845 UART: [art] Derive CDI
20,851,612 UART: [art] Store in in slot 0x4
20,909,592 UART: [art] Derive Key Pair
20,910,589 UART: [art] Store priv key in slot 0x5
23,373,927 UART: [art] Derive Key Pair - Done
23,386,818 UART: [art] Signing Cert with AUTHO
23,388,125 UART: RITY.KEYID = 7
25,099,876 UART: [art] Erasing AUTHORITY.KEYID = 7
25,101,385 UART: [art] PUB.X = 3002751A1C17E0D6FA17A9FC28E3125C5B3C95EB09C2145AD1BCC8A4292A99804A4EBA1A4E2AE02A8202C3CF7F59ECD5
25,108,673 UART: [art] PUB.Y = 26FBEC1B459C5DA04B82AEDB784263A2ADF43C27DB0061266E5D8ADEDD1B9ABAD01BF781D1C8F1F3FB96CAAED34C2FF8
25,115,926 UART: [art] SIG.R = 0A4EACF0D6799F57DCB05B159EA1D7C1CD2E522396221D360CECF06EAE18EAD4EE05DE937DB74EF9E347987A32107437
25,123,341 UART: [art] SIG.S = 92C57963213429D1390A517908FA735D250AD5F9DF19E627F94C3D0AA8AE6A69C32FCC301F53C5E4E9C9BA4BB279593C
26,102,195 UART: Caliptra RT
26,102,893 UART: [state] CFI Enabled
26,268,194 UART: [rt] RT listening for mailbox commands...
26,299,486 UART: [rt]cmd =0x50435252, len=8
26,301,357 >>> mbox cmd response data (8 bytes)
26,302,179 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,332,162 UART: [rt]cmd =0x50435251, len=36
27,250,170 >>> mbox cmd response data (1848 bytes)
27,260,405 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,290,158 UART: [rt]cmd =0x43455246, len=4
27,302,874 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,684 writing to cptra_bootfsm_go
192,916 UART:
193,281 UART: Running Caliptra ROM ...
194,411 UART:
604,090 UART: [state] CFI Enabled
617,784 UART: [state] LifecycleState = Unprovisioned
620,161 UART: [state] DebugLocked = No
621,398 UART: [state] WD Timer not started. Device not locked for debugging
625,713 UART: [kat] SHA2-256
815,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,361 UART: [kat] ++
826,884 UART: [kat] sha1
839,241 UART: [kat] SHA2-256
842,281 UART: [kat] SHA2-384
847,570 UART: [kat] SHA2-512-ACC
850,154 UART: [kat] ECC-384
3,290,671 UART: [kat] HMAC-384Kdf
3,305,175 UART: [kat] LMS
3,836,983 UART: [kat] --
3,840,976 UART: [cold-reset] ++
3,842,338 UART: [fht] FHT @ 0x50003400
3,853,104 UART: [idev] ++
3,853,825 UART: [idev] CDI.KEYID = 6
3,854,859 UART: [idev] SUBJECT.KEYID = 7
3,855,966 UART: [idev] UDS.KEYID = 0
3,856,892 ready_for_fw is high
3,857,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,436 UART: [idev] Erasing UDS.KEYID = 0
6,334,937 UART: [idev] Sha1 KeyId Algorithm
6,357,297 UART: [idev] --
6,361,720 UART: [ldev] ++
6,362,404 UART: [ldev] CDI.KEYID = 6
6,363,337 UART: [ldev] SUBJECT.KEYID = 5
6,364,499 UART: [ldev] AUTHORITY.KEYID = 7
6,365,677 UART: [ldev] FE.KEYID = 1
6,377,726 UART: [ldev] Erasing FE.KEYID = 1
8,854,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,478 UART: [ldev] --
10,649,719 UART: [fwproc] Wait for Commands...
10,651,927 UART: [fwproc] Recv command 0x46574c44
10,654,236 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,836,277 >>> mbox cmd response: success
14,836,828 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,841,015 UART: [afmc] ++
14,841,757 UART: [afmc] CDI.KEYID = 6
14,842,955 UART: [afmc] SUBJECT.KEYID = 7
14,844,400 UART: [afmc] AUTHORITY.KEYID = 5
17,350,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,665 UART: [afmc] --
19,142,348 UART: [cold-reset] --
19,147,028 UART: [state] Locking Datavault
19,153,208 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,433 UART: [state] Locking ICCM
19,157,859 UART: [exit] Launching FMC @ 0x40000130
19,166,529 UART:
19,166,778 UART: Running Caliptra FMC ...
19,167,882 UART:
19,168,042 UART: [state] CFI Enabled
19,176,199 UART: [fht] FMC Alias Private Key: 7
20,932,844 UART: [art] Extend RT PCRs Done
20,934,058 UART: [art] Lock RT PCRs Done
20,935,847 UART: [art] Populate DV Done
20,941,200 UART: [fht] FMC Alias Private Key: 7
20,942,795 UART: [art] Derive CDI
20,943,613 UART: [art] Store in in slot 0x4
20,986,805 UART: [art] Derive Key Pair
20,987,804 UART: [art] Store priv key in slot 0x5
23,415,010 UART: [art] Derive Key Pair - Done
23,427,973 UART: [art] Signing Cert with AUTHO
23,429,279 UART: RITY.KEYID = 7
25,134,887 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,387 UART: [art] PUB.X = 7FAE323BE1850729380DC71857FFCB6C3D3D71F335A69F40DFC081EC4B47CDF5EB20274E8D7B581F789E3F2B34953FF8
25,143,663 UART: [art] PUB.Y = 85048FDA86333D00E3F1FB8082BBD6D49AE6CE4877FFF63FB5E33E00452BEC49C57BE472239E0F7874F716403D9EDE4E
25,150,913 UART: [art] SIG.R = 486BAC05AEF5A9EF2FB62BEC63C6D69140E2AF589A820A777F90F33AEDF698B395A63D07075E89324B4C5CECC68DB924
25,158,365 UART: [art] SIG.S = 5DD9DF244A04F5BB9ED551D2744FF41338B6DF6FF2C7050635A02F98B0E3ADACDC6BECA85F235DAD2DC4E2401003E974
26,136,860 UART: Caliptra RT
26,137,576 UART: [state] CFI Enabled
26,254,369 UART: [rt] RT listening for mailbox commands...
26,285,985 UART: [rt]cmd =0x50435252, len=8
26,287,806 >>> mbox cmd response data (8 bytes)
26,288,673 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,318,538 UART: [rt]cmd =0x50435251, len=36
27,226,269 >>> mbox cmd response data (1848 bytes)
27,236,521 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,266,481 UART: [rt]cmd =0x43455246, len=4
27,278,903 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
3,755,528 ready_for_fw is high
3,755,933 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,414 >>> mbox cmd response: success
14,955,094 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,204,369 UART:
19,204,754 UART: Running Caliptra FMC ...
19,205,953 UART:
19,206,123 UART: [state] CFI Enabled
19,214,119 UART: [fht] FMC Alias Private Key: 7
20,970,829 UART: [art] Extend RT PCRs Done
20,972,053 UART: [art] Lock RT PCRs Done
20,973,744 UART: [art] Populate DV Done
20,979,048 UART: [fht] FMC Alias Private Key: 7
20,980,716 UART: [art] Derive CDI
20,981,456 UART: [art] Store in in slot 0x4
21,024,601 UART: [art] Derive Key Pair
21,025,667 UART: [art] Store priv key in slot 0x5
23,452,713 UART: [art] Derive Key Pair - Done
23,465,491 UART: [art] Signing Cert with AUTHO
23,466,794 UART: RITY.KEYID = 7
25,171,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,333 UART: [art] PUB.X = C799B6365B9733C6C0FBAD2BE3754F8CB06F1C9CBBC1203CD31719058E81A9C5E0DC96C793DFE2B243C600653A665915
25,180,579 UART: [art] PUB.Y = 1A7895B515356329BA286B947E0D4E083D5444FA9B223B48066B624278C555F88C7C275FFBC9EE0E669714747F55DDC6
25,187,862 UART: [art] SIG.R = 7D05E56D0D45CEA2D5DB55E6856058FA58827AF34614B1FDCAF5237813E4E40873092A8CAD4CF229914BE866CF999151
25,195,241 UART: [art] SIG.S = C98CAFB665498240AE3B3144FCEFB0942F646B7DE9E3E6550A5E8022D0D0DE42D5348F06DCF5F7542C2BC51A2BED8B87
26,174,252 UART: Caliptra RT
26,174,956 UART: [state] CFI Enabled
26,291,185 UART: [rt] RT listening for mailbox commands...
26,322,676 UART: [rt]cmd =0x50435252, len=8
26,324,530 >>> mbox cmd response data (8 bytes)
26,325,348 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,355,487 UART: [rt]cmd =0x50435251, len=36
27,263,140 >>> mbox cmd response data (1848 bytes)
27,273,342 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,303,149 UART: [rt]cmd =0x43455246, len=4
27,315,673 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,473 UART: [kat] SHA2-256
882,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,519 UART: [kat] ++
886,671 UART: [kat] sha1
890,741 UART: [kat] SHA2-256
892,679 UART: [kat] SHA2-384
895,414 UART: [kat] SHA2-512-ACC
897,315 UART: [kat] ECC-384
902,936 UART: [kat] HMAC-384Kdf
907,544 UART: [kat] LMS
1,475,740 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,477,035 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 ready_for_fw is high
1,481,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,800 UART: [idev] Erasing UDS.KEYID = 0
1,504,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,448 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,521,053 UART: [ldev] Erasing FE.KEYID = 1
1,545,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,078 UART: [ldev] --
1,585,425 UART: [fwproc] Waiting for Commands...
1,586,060 UART: [fwproc] Received command 0x46574c44
1,586,851 UART: [fwproc] Received Image of size 114084 bytes
2,881,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,039 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,391 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,952 >>> mbox cmd response: success
3,073,952 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,075,100 UART: [afmc] ++
3,075,268 UART: [afmc] CDI.KEYID = 6
3,075,630 UART: [afmc] SUBJECT.KEYID = 7
3,076,055 UART: [afmc] AUTHORITY.KEYID = 5
3,111,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,067 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,757 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,698 UART: [afmc] --
3,154,732 UART: [cold-reset] --
3,155,796 UART: [state] Locking Datavault
3,156,861 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,465 UART: [state] Locking ICCM
3,158,003 UART: [exit] Launching FMC @ 0x40000130
3,163,332 UART:
3,163,348 UART: Running Caliptra FMC ...
3,163,756 UART:
3,163,810 UART: [state] CFI Enabled
3,174,289 UART: [fht] FMC Alias Private Key: 7
3,282,420 UART: [art] Extend RT PCRs Done
3,282,848 UART: [art] Lock RT PCRs Done
3,284,108 UART: [art] Populate DV Done
3,292,155 UART: [fht] FMC Alias Private Key: 7
3,293,247 UART: [art] Derive CDI
3,293,527 UART: [art] Store in in slot 0x4
3,379,004 UART: [art] Derive Key Pair
3,379,364 UART: [art] Store priv key in slot 0x5
3,391,996 UART: [art] Derive Key Pair - Done
3,406,636 UART: [art] Signing Cert with AUTHO
3,407,116 UART: RITY.KEYID = 7
3,422,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,179 UART: [art] PUB.X = C49195056365D635969AB856A680EF6ABC880868E915F6ACA765F6134663582CADA299A365257021F59D4B49771F1451
3,429,931 UART: [art] PUB.Y = 9A1F23D9EE3D5340DE60668ECC94B45CDD73D1893357A46C395E6598758815AFCAAC6F0333AFD00FC730069FF6A630DF
3,436,882 UART: [art] SIG.R = 797BF08DF25A66E538A974F4EA1C3C10F6EB657EE857FA5C1F48477458E691D832B72622EC13B3FAB5313368C1555010
3,443,652 UART: [art] SIG.S = 3638073F5F3F67AB16F35F9367F8FEABCB454D60B775EA66E41CB4DE5FC01B5C71725CC9DC787ACB624A5F20239FD07B
3,467,738 UART: Caliptra RT
3,467,991 UART: [state] CFI Enabled
3,576,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,853 UART: [rt]cmd =0x50435252, len=8
3,608,499 >>> mbox cmd response data (8 bytes)
3,608,500 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,185 UART: [rt]cmd =0x50435251, len=36
3,805,434 >>> mbox cmd response data (1848 bytes)
3,805,435 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,654 UART: [rt]cmd =0x43455246, len=4
3,846,905 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,379 ready_for_fw is high
1,362,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,776 >>> mbox cmd response: success
2,923,776 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,985,030 UART:
2,985,046 UART: Running Caliptra FMC ...
2,985,454 UART:
2,985,508 UART: [state] CFI Enabled
2,995,913 UART: [fht] FMC Alias Private Key: 7
3,104,104 UART: [art] Extend RT PCRs Done
3,104,532 UART: [art] Lock RT PCRs Done
3,105,952 UART: [art] Populate DV Done
3,113,871 UART: [fht] FMC Alias Private Key: 7
3,115,019 UART: [art] Derive CDI
3,115,299 UART: [art] Store in in slot 0x4
3,201,062 UART: [art] Derive Key Pair
3,201,422 UART: [art] Store priv key in slot 0x5
3,214,946 UART: [art] Derive Key Pair - Done
3,229,631 UART: [art] Signing Cert with AUTHO
3,230,111 UART: RITY.KEYID = 7
3,245,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,974 UART: [art] PUB.X = D090F970F6F550FA277792F53D4F8AC30B1E9DDE0F660D2A9F658667C0CC67B5DD948A13063A8DD3B0A0B4389C892D02
3,252,737 UART: [art] PUB.Y = 907E334FE10FD702DD6DEA5A05635241D635E8815B8D2865A3E4FEE5A7D79F56CDD253BE12E4FCB2FBDE6F74819ED081
3,259,694 UART: [art] SIG.R = E2C83360F95930AF3B8C914D6F2E1C8BFFFA47F178ECA102AC8AF6239EC25C2D2B8253085114A7CA97D70EF4D16C703C
3,266,469 UART: [art] SIG.S = 0AD75FD43A6080C317035E691D150E64B871F46CF95ED239A5008F0CEEFCC9E4192CF28BE1B1C8E8885E1294A224AAC3
3,290,158 UART: Caliptra RT
3,290,411 UART: [state] CFI Enabled
3,398,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,116 UART: [rt]cmd =0x50435252, len=8
3,430,834 >>> mbox cmd response data (8 bytes)
3,430,835 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,408 UART: [rt]cmd =0x50435251, len=36
3,627,823 >>> mbox cmd response data (1848 bytes)
3,627,824 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,325 UART: [rt]cmd =0x43455246, len=4
3,669,636 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,400 UART: [kat] SHA2-256
892,338 UART: [kat] SHA2-384
894,995 UART: [kat] SHA2-512-ACC
896,896 UART: [kat] ECC-384
902,227 UART: [kat] HMAC-384Kdf
906,877 UART: [kat] LMS
1,475,073 UART: [kat] --
1,476,066 UART: [cold-reset] ++
1,476,482 UART: [fht] Storing FHT @ 0x50003400
1,479,233 UART: [idev] ++
1,479,401 UART: [idev] CDI.KEYID = 6
1,479,761 UART: [idev] SUBJECT.KEYID = 7
1,480,185 UART: [idev] UDS.KEYID = 0
1,480,530 ready_for_fw is high
1,480,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,861 UART: [idev] Erasing UDS.KEYID = 0
1,505,115 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,589 UART: [idev] --
1,514,680 UART: [ldev] ++
1,514,848 UART: [ldev] CDI.KEYID = 6
1,515,211 UART: [ldev] SUBJECT.KEYID = 5
1,515,637 UART: [ldev] AUTHORITY.KEYID = 7
1,516,100 UART: [ldev] FE.KEYID = 1
1,521,114 UART: [ldev] Erasing FE.KEYID = 1
1,547,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,149 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,331 UART: [fwproc] Received command 0x46574c44
1,588,122 UART: [fwproc] Received Image of size 114084 bytes
2,882,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,320 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,099 >>> mbox cmd response: success
3,075,099 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,076,115 UART: [afmc] ++
3,076,283 UART: [afmc] CDI.KEYID = 6
3,076,645 UART: [afmc] SUBJECT.KEYID = 7
3,077,070 UART: [afmc] AUTHORITY.KEYID = 5
3,111,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,804 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,494 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,485 UART: [afmc] --
3,155,433 UART: [cold-reset] --
3,156,227 UART: [state] Locking Datavault
3,157,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,888 UART: [state] Locking ICCM
3,158,332 UART: [exit] Launching FMC @ 0x40000130
3,163,661 UART:
3,163,677 UART: Running Caliptra FMC ...
3,164,085 UART:
3,164,228 UART: [state] CFI Enabled
3,175,021 UART: [fht] FMC Alias Private Key: 7
3,282,538 UART: [art] Extend RT PCRs Done
3,282,966 UART: [art] Lock RT PCRs Done
3,284,272 UART: [art] Populate DV Done
3,292,481 UART: [fht] FMC Alias Private Key: 7
3,293,633 UART: [art] Derive CDI
3,293,913 UART: [art] Store in in slot 0x4
3,379,456 UART: [art] Derive Key Pair
3,379,816 UART: [art] Store priv key in slot 0x5
3,393,432 UART: [art] Derive Key Pair - Done
3,407,970 UART: [art] Signing Cert with AUTHO
3,408,450 UART: RITY.KEYID = 7
3,423,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,301 UART: [art] PUB.X = 82A6C9C1D6E3A6B028E5BADF1B78D8A59DA7D4D227E31CF081DB98041B940546DC10B181C4999ADAB64824593141E2A1
3,431,073 UART: [art] PUB.Y = 723C322E102363C1BDD148B8C2279517645264B549E5CAB0E9001B80A7F91A1B3F656E8DB5B238288011FD15A032C41A
3,437,997 UART: [art] SIG.R = 431D3BADABF58F159F6878144D92D54D99746AF26E3A77AFBEB8CF28DC67DB99A8357E0060621B380AD77AC654BE773B
3,444,754 UART: [art] SIG.S = 341B098CEDEEC9DF37DC1B2F01BA44803191C7F46711B296006949FFA18C1153ED0A9B719B5951733D30D37FA13246CF
3,468,590 UART: Caliptra RT
3,468,935 UART: [state] CFI Enabled
3,576,775 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,305 UART: [rt]cmd =0x50435252, len=8
3,608,613 >>> mbox cmd response data (8 bytes)
3,608,614 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,159 UART: [rt]cmd =0x50435251, len=36
3,805,630 >>> mbox cmd response data (1848 bytes)
3,805,631 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,835,156 UART: [rt]cmd =0x43455246, len=4
3,847,503 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,332 ready_for_fw is high
1,363,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,071 >>> mbox cmd response: success
2,926,071 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,987,763 UART:
2,987,779 UART: Running Caliptra FMC ...
2,988,187 UART:
2,988,330 UART: [state] CFI Enabled
2,999,019 UART: [fht] FMC Alias Private Key: 7
3,107,092 UART: [art] Extend RT PCRs Done
3,107,520 UART: [art] Lock RT PCRs Done
3,109,058 UART: [art] Populate DV Done
3,117,267 UART: [fht] FMC Alias Private Key: 7
3,118,363 UART: [art] Derive CDI
3,118,643 UART: [art] Store in in slot 0x4
3,204,398 UART: [art] Derive Key Pair
3,204,758 UART: [art] Store priv key in slot 0x5
3,217,886 UART: [art] Derive Key Pair - Done
3,232,650 UART: [art] Signing Cert with AUTHO
3,233,130 UART: RITY.KEYID = 7
3,248,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,453 UART: [art] PUB.X = 20DDB697C70880FE30B5F5E8A00373E1E5CBA44AD3FE37ABED8A08F0547CF1DAE4FA48669B9D92A8DA67E2CD1D43ABE0
3,256,240 UART: [art] PUB.Y = 8567C257511FA4B9CF909BDB7A928558F79E3167CFDB2D10712A2BEB4D5B38EB992225AE7C8BE562EB0646FCFB71A280
3,263,199 UART: [art] SIG.R = 5D66FDBBF43EF6E640E2F01EFDB1FBD09B2EB34B5595C75414AC55A7B7C88A372F9094D6EA67ED23D10603EBA09560CA
3,269,983 UART: [art] SIG.S = 9113CB6F3DF0C379D0D80934284444DEA551CD55A34F2D6E97E7E6EC66A0EE981F1101416DC012036626848EAF9D2E8E
3,294,187 UART: Caliptra RT
3,294,532 UART: [state] CFI Enabled
3,403,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,977 UART: [rt]cmd =0x50435252, len=8
3,435,873 >>> mbox cmd response data (8 bytes)
3,435,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,469 UART: [rt]cmd =0x50435251, len=36
3,632,846 >>> mbox cmd response data (1848 bytes)
3,632,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,206 UART: [rt]cmd =0x43455246, len=4
3,674,581 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
893,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,187 UART: [kat] ++
897,339 UART: [kat] sha1
901,631 UART: [kat] SHA2-256
903,571 UART: [kat] SHA2-384
906,162 UART: [kat] SHA2-512-ACC
908,063 UART: [kat] ECC-384
917,982 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,775 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,201,013 UART: [idev] Sha1 KeyId Algorithm
1,209,437 UART: [idev] --
1,210,531 UART: [ldev] ++
1,210,699 UART: [ldev] CDI.KEYID = 6
1,211,062 UART: [ldev] SUBJECT.KEYID = 5
1,211,488 UART: [ldev] AUTHORITY.KEYID = 7
1,211,951 UART: [ldev] FE.KEYID = 1
1,217,077 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,304 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,757 >>> mbox cmd response: success
2,770,757 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,771,961 UART: [afmc] ++
2,772,129 UART: [afmc] CDI.KEYID = 6
2,772,491 UART: [afmc] SUBJECT.KEYID = 7
2,772,916 UART: [afmc] AUTHORITY.KEYID = 5
2,808,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,712 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,597 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,208 UART: [afmc] --
2,852,332 UART: [cold-reset] --
2,853,220 UART: [state] Locking Datavault
2,854,113 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,717 UART: [state] Locking ICCM
2,855,339 UART: [exit] Launching FMC @ 0x40000130
2,860,668 UART:
2,860,684 UART: Running Caliptra FMC ...
2,861,092 UART:
2,861,146 UART: [state] CFI Enabled
2,871,525 UART: [fht] FMC Alias Private Key: 7
2,979,742 UART: [art] Extend RT PCRs Done
2,980,170 UART: [art] Lock RT PCRs Done
2,981,558 UART: [art] Populate DV Done
2,989,999 UART: [fht] FMC Alias Private Key: 7
2,990,929 UART: [art] Derive CDI
2,991,209 UART: [art] Store in in slot 0x4
3,076,902 UART: [art] Derive Key Pair
3,077,262 UART: [art] Store priv key in slot 0x5
3,090,366 UART: [art] Derive Key Pair - Done
3,105,242 UART: [art] Signing Cert with AUTHO
3,105,722 UART: RITY.KEYID = 7
3,120,860 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,625 UART: [art] PUB.X = 841E3A491A9C6BECF77843CB82C7D932E11A7A503804689935C0CED46391AD7A48306A5D9D068DEDC8C321288BDB32C6
3,128,395 UART: [art] PUB.Y = EB31CEC3F8930EC582812F80490919F3BE96E02A1A53CA8D25F50876726EA96A64F878A8C9EADB386CDC47F6001DD4E6
3,135,324 UART: [art] SIG.R = BE9E80FC65A5F9B553CA7C87B8B95DE71030B80D01AEAF601DB246911D00B5D3119477BD4960E479F80C2336B85586CE
3,142,069 UART: [art] SIG.S = CC219EF1B0B4C62EDAD26AF13BF8001947DEB4A6CE0C3EE3761B7943403563A252F75C0C9B85EEC765DAE5261F750160
3,166,733 UART: Caliptra RT
3,166,986 UART: [state] CFI Enabled
3,276,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,714 UART: [rt]cmd =0x50435252, len=8
3,308,434 >>> mbox cmd response data (8 bytes)
3,308,435 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,738 UART: [rt]cmd =0x50435251, len=36
3,505,021 >>> mbox cmd response data (1848 bytes)
3,505,022 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,307 UART: [rt]cmd =0x43455246, len=4
3,546,464 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,070 >>> mbox cmd response: success
2,624,070 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,686,130 UART:
2,686,146 UART: Running Caliptra FMC ...
2,686,554 UART:
2,686,608 UART: [state] CFI Enabled
2,697,159 UART: [fht] FMC Alias Private Key: 7
2,805,202 UART: [art] Extend RT PCRs Done
2,805,630 UART: [art] Lock RT PCRs Done
2,807,386 UART: [art] Populate DV Done
2,815,733 UART: [fht] FMC Alias Private Key: 7
2,816,867 UART: [art] Derive CDI
2,817,147 UART: [art] Store in in slot 0x4
2,902,664 UART: [art] Derive Key Pair
2,903,024 UART: [art] Store priv key in slot 0x5
2,915,656 UART: [art] Derive Key Pair - Done
2,930,420 UART: [art] Signing Cert with AUTHO
2,930,900 UART: RITY.KEYID = 7
2,946,078 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,843 UART: [art] PUB.X = 99FA775D24512788F7AA8D62E2DCB7B1CF60B015809AD7472EBB7A7E8A02113905BB1E7A89FBB76BD3536E353FB426EB
2,953,619 UART: [art] PUB.Y = FF66342C8C4FDA56D8CA157439929C62AE86CF555348FD903D6B2652AE5EC861C01C81ADBC2C381BDC8E481FB509C1BA
2,960,582 UART: [art] SIG.R = 40E53625D5BC129EAB2134C2AC9AA81D73CF30943A154F4365E2CAA2D156DF5B5083CCC4545316EC80C43276D4470C07
2,967,350 UART: [art] SIG.S = 4EE1BF6EFB0AA5B639C7E5AD3F233D29A23C745E475A6C93DD7472A158875571CA56D8853988BD16CAFA935C962FC058
2,991,688 UART: Caliptra RT
2,991,941 UART: [state] CFI Enabled
3,099,056 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,470 UART: [rt]cmd =0x50435252, len=8
3,131,142 >>> mbox cmd response data (8 bytes)
3,131,143 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,652 UART: [rt]cmd =0x50435251, len=36
3,327,925 >>> mbox cmd response data (1848 bytes)
3,327,926 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,303 UART: [rt]cmd =0x43455246, len=4
3,369,324 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
893,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,674 UART: [kat] ++
897,826 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,172,958 UART: [fht] FHT @ 0x50003400
1,175,687 UART: [idev] ++
1,175,855 UART: [idev] CDI.KEYID = 6
1,176,215 UART: [idev] SUBJECT.KEYID = 7
1,176,639 UART: [idev] UDS.KEYID = 0
1,176,984 ready_for_fw is high
1,176,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,718 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,290 UART: [ldev] ++
1,211,458 UART: [ldev] CDI.KEYID = 6
1,211,821 UART: [ldev] SUBJECT.KEYID = 5
1,212,247 UART: [ldev] AUTHORITY.KEYID = 7
1,212,710 UART: [ldev] FE.KEYID = 1
1,217,858 UART: [ldev] Erasing FE.KEYID = 1
1,244,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,536 UART: [ldev] --
1,283,859 UART: [fwproc] Wait for Commands...
1,284,567 UART: [fwproc] Recv command 0x46574c44
1,285,295 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,254 >>> mbox cmd response: success
2,772,254 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,773,510 UART: [afmc] ++
2,773,678 UART: [afmc] CDI.KEYID = 6
2,774,040 UART: [afmc] SUBJECT.KEYID = 7
2,774,465 UART: [afmc] AUTHORITY.KEYID = 5
2,809,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,183 UART: [afmc] --
2,853,131 UART: [cold-reset] --
2,853,853 UART: [state] Locking Datavault
2,854,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,534 UART: [state] Locking ICCM
2,856,132 UART: [exit] Launching FMC @ 0x40000130
2,861,461 UART:
2,861,477 UART: Running Caliptra FMC ...
2,861,885 UART:
2,862,028 UART: [state] CFI Enabled
2,872,717 UART: [fht] FMC Alias Private Key: 7
2,980,778 UART: [art] Extend RT PCRs Done
2,981,206 UART: [art] Lock RT PCRs Done
2,982,686 UART: [art] Populate DV Done
2,990,937 UART: [fht] FMC Alias Private Key: 7
2,991,875 UART: [art] Derive CDI
2,992,155 UART: [art] Store in in slot 0x4
3,078,082 UART: [art] Derive Key Pair
3,078,442 UART: [art] Store priv key in slot 0x5
3,091,876 UART: [art] Derive Key Pair - Done
3,106,562 UART: [art] Signing Cert with AUTHO
3,107,042 UART: RITY.KEYID = 7
3,122,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,959 UART: [art] PUB.X = 552D07133FB7E1863DE6B63996FA19FFB2A2206900254578CFC7990D7D3FD70275CFF21498AD620BB2F2658FFC1E07EB
3,129,698 UART: [art] PUB.Y = 560BB400296C2A4FE51F1D62162BE829B647929EAC92F101A1FF78D9607FC0EB7E4C912A63D3E854B1A5D81D0F360F54
3,136,620 UART: [art] SIG.R = B098A6C9AA8AF6F6E01F1BE31D6DFF2D78549DBED0135201FE0D9B9E026787CBB4FEC57CCA8ED4DF3613E841AF3AFA38
3,143,409 UART: [art] SIG.S = B3AA6EA07A647F6314DF4555B675A0098503FDCED1A3F3513BBACC6B46B734856B01CDC4938F3C3A714E7023B37CB6DC
3,167,149 UART: Caliptra RT
3,167,494 UART: [state] CFI Enabled
3,274,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,502 UART: [rt]cmd =0x50435252, len=8
3,307,182 >>> mbox cmd response data (8 bytes)
3,307,183 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,808 UART: [rt]cmd =0x50435251, len=36
3,504,005 >>> mbox cmd response data (1848 bytes)
3,504,006 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,379 UART: [rt]cmd =0x43455246, len=4
3,545,234 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,420 ready_for_fw is high
1,060,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,563 >>> mbox cmd response: success
2,622,563 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,684,677 UART:
2,684,693 UART: Running Caliptra FMC ...
2,685,101 UART:
2,685,244 UART: [state] CFI Enabled
2,695,929 UART: [fht] FMC Alias Private Key: 7
2,803,318 UART: [art] Extend RT PCRs Done
2,803,746 UART: [art] Lock RT PCRs Done
2,805,100 UART: [art] Populate DV Done
2,813,303 UART: [fht] FMC Alias Private Key: 7
2,814,373 UART: [art] Derive CDI
2,814,653 UART: [art] Store in in slot 0x4
2,900,568 UART: [art] Derive Key Pair
2,900,928 UART: [art] Store priv key in slot 0x5
2,914,818 UART: [art] Derive Key Pair - Done
2,929,280 UART: [art] Signing Cert with AUTHO
2,929,760 UART: RITY.KEYID = 7
2,944,954 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,719 UART: [art] PUB.X = BC32C4D6612BB1501EDE6F2B310EBA643CF24A32B1AEEB2FCFB76AD266D1D2FBC1154E061A20669271D5DE50723F6DE6
2,952,503 UART: [art] PUB.Y = FA79157850C520FF5396338EFB04F9D378961D44C12EA811EE6756F613E0D923BA1CB24026A6D84217CD797F98F6B35C
2,959,450 UART: [art] SIG.R = 984704D85C2FEA423052D2782F7D6A6B71EF2571E114FA74B6481AB2EC925C47035071A84C908BDD355D87A8A9964094
2,966,210 UART: [art] SIG.S = FDBD51D165A98C9FA31040453B93B400912B31448F7EF03407F5A4FBCF384BE4435AF632B8E470ECC63134B840517089
2,990,054 UART: Caliptra RT
2,990,399 UART: [state] CFI Enabled
3,097,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,401 UART: [rt]cmd =0x50435252, len=8
3,129,885 >>> mbox cmd response data (8 bytes)
3,129,886 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,149 UART: [rt]cmd =0x50435251, len=36
3,326,584 >>> mbox cmd response data (1848 bytes)
3,326,585 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,956 UART: [rt]cmd =0x43455246, len=4
3,368,077 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,898 UART: [kat] LMS
1,169,210 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,172,817 UART: [idev] ++
1,172,985 UART: [idev] CDI.KEYID = 6
1,173,346 UART: [idev] SUBJECT.KEYID = 7
1,173,771 UART: [idev] UDS.KEYID = 0
1,174,117 ready_for_fw is high
1,174,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,074 UART: [ldev] --
1,280,398 UART: [fwproc] Wait for Commands...
1,281,145 UART: [fwproc] Recv command 0x46574c44
1,281,878 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,499 >>> mbox cmd response: success
2,767,499 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,768,750 UART: [afmc] ++
2,768,918 UART: [afmc] CDI.KEYID = 6
2,769,281 UART: [afmc] SUBJECT.KEYID = 7
2,769,707 UART: [afmc] AUTHORITY.KEYID = 5
2,805,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,050 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,387 UART: [afmc] --
2,848,469 UART: [cold-reset] --
2,849,217 UART: [state] Locking Datavault
2,850,482 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,086 UART: [state] Locking ICCM
2,851,730 UART: [exit] Launching FMC @ 0x40000130
2,857,059 UART:
2,857,075 UART: Running Caliptra FMC ...
2,857,483 UART:
2,857,537 UART: [state] CFI Enabled
2,867,992 UART: [fht] FMC Alias Private Key: 7
2,975,971 UART: [art] Extend RT PCRs Done
2,976,399 UART: [art] Lock RT PCRs Done
2,977,981 UART: [art] Populate DV Done
2,986,272 UART: [fht] FMC Alias Private Key: 7
2,987,432 UART: [art] Derive CDI
2,987,712 UART: [art] Store in in slot 0x4
3,073,161 UART: [art] Derive Key Pair
3,073,521 UART: [art] Store priv key in slot 0x5
3,086,993 UART: [art] Derive Key Pair - Done
3,101,839 UART: [art] Signing Cert with AUTHO
3,102,319 UART: RITY.KEYID = 7
3,117,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,288 UART: [art] PUB.X = 52271527AAB9C5420C4CFEC962FADFB0BBC342E4EBC2DC52E585DC3C48490C1161C3E120C40389CB53ED643591A26D28
3,125,061 UART: [art] PUB.Y = 2459727309FB84A30306AB74C86681D42E9BE62F0B4BDE7D81872A56F8EA4F8D7ADC0036BB04CAE7D32E02B0EF478AB4
3,131,983 UART: [art] SIG.R = 507567BF3C5333747F0B9263A7ABBC79CBEABA7E7881DB5D62719D27576C3AC9809CA2392C757C93A6AEDA6AE2DB69F0
3,138,764 UART: [art] SIG.S = 295F9230C5DFEE6BC0893C8D04362C5735C94DE7A5C6E68841AEFD6F3DEA35E2D13F237612F67AE75F30A3A2C4B0B207
3,162,479 UART: Caliptra RT
3,162,732 UART: [state] CFI Enabled
3,270,579 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,069 UART: [rt]cmd =0x50435252, len=8
3,302,873 >>> mbox cmd response data (8 bytes)
3,302,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,195 UART: [rt]cmd =0x50435251, len=36
3,499,692 >>> mbox cmd response data (1848 bytes)
3,499,693 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,138 UART: [rt]cmd =0x43455246, len=4
3,541,153 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 ready_for_fw is high
1,056,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,361 >>> mbox cmd response: success
2,619,361 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,681,315 UART:
2,681,331 UART: Running Caliptra FMC ...
2,681,739 UART:
2,681,793 UART: [state] CFI Enabled
2,692,474 UART: [fht] FMC Alias Private Key: 7
2,800,091 UART: [art] Extend RT PCRs Done
2,800,519 UART: [art] Lock RT PCRs Done
2,802,227 UART: [art] Populate DV Done
2,810,324 UART: [fht] FMC Alias Private Key: 7
2,811,506 UART: [art] Derive CDI
2,811,786 UART: [art] Store in in slot 0x4
2,897,367 UART: [art] Derive Key Pair
2,897,727 UART: [art] Store priv key in slot 0x5
2,910,791 UART: [art] Derive Key Pair - Done
2,925,159 UART: [art] Signing Cert with AUTHO
2,925,639 UART: RITY.KEYID = 7
2,940,707 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,472 UART: [art] PUB.X = 44684D9E2223C5D40872DB5F02A182C8FFB0031023F79379CE09FAD740FD64823B11D69630159719DE33977EA61AAA59
2,948,226 UART: [art] PUB.Y = 14B1E1FAFBFA95DFC3FC3189AD3F3FFAC9C9A87894AF10B62287F37D844FB8BEC47851950CCCE34F4B831166BD770ADD
2,955,194 UART: [art] SIG.R = 8DCD297C90C9AE7D06F8CB0372111EFA74F2F8D9E8F1FDE645EDFF640B918DA349AF23C1FB5A33A1258A7BF96E14F447
2,961,975 UART: [art] SIG.S = C38CCFCD81CA3334E053D7585B6991CCC6269B0CC9D5012B2AE82820FE367D56E794F7687887B367DA2BAEEF344C804B
2,986,050 UART: Caliptra RT
2,986,303 UART: [state] CFI Enabled
3,094,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,819 UART: [rt]cmd =0x50435252, len=8
3,126,543 >>> mbox cmd response data (8 bytes)
3,126,544 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,157 UART: [rt]cmd =0x50435251, len=36
3,323,700 >>> mbox cmd response data (1848 bytes)
3,323,701 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,352,982 UART: [rt]cmd =0x43455246, len=4
3,365,155 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,624 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,081 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,575 UART: [fwproc] Wait for Commands...
1,282,172 UART: [fwproc] Recv command 0x46574c44
1,282,905 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,322 >>> mbox cmd response: success
2,768,322 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,769,545 UART: [afmc] ++
2,769,713 UART: [afmc] CDI.KEYID = 6
2,770,076 UART: [afmc] SUBJECT.KEYID = 7
2,770,502 UART: [afmc] AUTHORITY.KEYID = 5
2,805,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,618 UART: [afmc] --
2,848,644 UART: [cold-reset] --
2,849,314 UART: [state] Locking Datavault
2,850,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,049 UART: [state] Locking ICCM
2,851,667 UART: [exit] Launching FMC @ 0x40000130
2,856,996 UART:
2,857,012 UART: Running Caliptra FMC ...
2,857,420 UART:
2,857,563 UART: [state] CFI Enabled
2,868,516 UART: [fht] FMC Alias Private Key: 7
2,976,709 UART: [art] Extend RT PCRs Done
2,977,137 UART: [art] Lock RT PCRs Done
2,978,589 UART: [art] Populate DV Done
2,987,014 UART: [fht] FMC Alias Private Key: 7
2,988,128 UART: [art] Derive CDI
2,988,408 UART: [art] Store in in slot 0x4
3,074,485 UART: [art] Derive Key Pair
3,074,845 UART: [art] Store priv key in slot 0x5
3,088,349 UART: [art] Derive Key Pair - Done
3,103,078 UART: [art] Signing Cert with AUTHO
3,103,558 UART: RITY.KEYID = 7
3,118,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,571 UART: [art] PUB.X = AA2456F7949DDD92F90ED03D2A144443814998484A033B4B3BFCD94E1C24B8CA40CA4F8217C5155FEE91EF125C985DAD
3,126,345 UART: [art] PUB.Y = 8B2BD8705A7DBFC3A7BA3FD0D3943C4262B27DB99596468218F8BF6D5E8013B79F2F402F38326EC14B935236FCA4831D
3,133,301 UART: [art] SIG.R = 5DA456F362E99A74E14F09CB456B30DC4624D24DC3BDE6A53D623B6475C8127D06BB4A73617797CDB872DDFC0917642B
3,140,068 UART: [art] SIG.S = F922BEE50A3B979A1F5EA48939A58D1330F006CC2A60E1AA68B465B4BF81A0E5578E8205CC5C7FA8D81E605A1C38E8B4
3,163,818 UART: Caliptra RT
3,164,163 UART: [state] CFI Enabled
3,272,044 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,530 UART: [rt]cmd =0x50435252, len=8
3,304,128 >>> mbox cmd response data (8 bytes)
3,304,129 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,718 UART: [rt]cmd =0x50435251, len=36
3,501,291 >>> mbox cmd response data (1848 bytes)
3,501,292 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,545 UART: [rt]cmd =0x43455246, len=4
3,542,540 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,663 ready_for_fw is high
1,056,663 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,090 >>> mbox cmd response: success
2,620,090 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,681,938 UART:
2,681,954 UART: Running Caliptra FMC ...
2,682,362 UART:
2,682,505 UART: [state] CFI Enabled
2,693,184 UART: [fht] FMC Alias Private Key: 7
2,800,287 UART: [art] Extend RT PCRs Done
2,800,715 UART: [art] Lock RT PCRs Done
2,802,285 UART: [art] Populate DV Done
2,810,452 UART: [fht] FMC Alias Private Key: 7
2,811,400 UART: [art] Derive CDI
2,811,680 UART: [art] Store in in slot 0x4
2,897,171 UART: [art] Derive Key Pair
2,897,531 UART: [art] Store priv key in slot 0x5
2,911,089 UART: [art] Derive Key Pair - Done
2,925,491 UART: [art] Signing Cert with AUTHO
2,925,971 UART: RITY.KEYID = 7
2,941,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,308 UART: [art] PUB.X = 903B0863007FFC6F1BC437303A763A0D5D5A7EED56E0DD4D46409608F87A860757321C7AEFBDAD304E1769BFBE8E338E
2,949,054 UART: [art] PUB.Y = 403252F721E858322693B23AEECDC13C615A6570DF050BA92157BEB6FE7B7A031D6F8F66735FFD9B9ADC548501A95671
2,955,996 UART: [art] SIG.R = 277A1685C8C6DB6E919E642FFB4E06395244EE96F124197BC6CCEC8065194FDC2591BB266350A008124BF7834D99829A
2,962,758 UART: [art] SIG.S = D3846F40C9EB3CF727A01B6817D50F9A067A700513914FFCD4C15E9EAF33D5E9018B26A9E01E9ECEDC1F737BB175FA3C
2,986,073 UART: Caliptra RT
2,986,418 UART: [state] CFI Enabled
3,093,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,143 UART: [rt]cmd =0x50435252, len=8
3,125,777 >>> mbox cmd response data (8 bytes)
3,125,778 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,155,155 UART: [rt]cmd =0x50435251, len=36
3,322,530 >>> mbox cmd response data (1848 bytes)
3,322,531 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,836 UART: [rt]cmd =0x43455246, len=4
3,363,965 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,180 UART:
192,541 UART: Running Caliptra ROM ...
194,143 UART:
194,312 UART: [state] CFI Enabled
267,436 UART: [state] LifecycleState = Unprovisioned
269,371 UART: [state] DebugLocked = No
272,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,700 UART: [kat] SHA2-256
446,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,866 UART: [kat] ++
457,422 UART: [kat] sha1
468,728 UART: [kat] SHA2-256
471,385 UART: [kat] SHA2-384
476,876 UART: [kat] SHA2-512-ACC
479,257 UART: [kat] ECC-384
2,769,596 UART: [kat] HMAC-384Kdf
2,801,135 UART: [kat] LMS
3,991,439 UART: [kat] --
3,996,717 UART: [cold-reset] ++
3,998,215 UART: [fht] Storing FHT @ 0x50003400
4,009,698 UART: [idev] ++
4,010,265 UART: [idev] CDI.KEYID = 6
4,011,229 UART: [idev] SUBJECT.KEYID = 7
4,012,477 UART: [idev] UDS.KEYID = 0
4,013,450 ready_for_fw is high
4,013,674 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,841 UART: [idev] Erasing UDS.KEYID = 0
7,346,520 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,703 UART: [idev] --
7,372,313 UART: [ldev] ++
7,372,882 UART: [ldev] CDI.KEYID = 6
7,373,821 UART: [ldev] SUBJECT.KEYID = 5
7,375,081 UART: [ldev] AUTHORITY.KEYID = 7
7,376,317 UART: [ldev] FE.KEYID = 1
7,423,892 UART: [ldev] Erasing FE.KEYID = 1
10,754,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,084 UART: [ldev] --
13,115,455 UART: [fwproc] Waiting for Commands...
13,117,124 UART: [fwproc] Received command 0x46574c44
13,119,305 UART: [fwproc] Received Image of size 113760 bytes
17,165,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,011 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,631,306 >>> mbox cmd response: success
17,634,945 UART: [afmc] ++
17,635,564 UART: [afmc] CDI.KEYID = 6
17,636,456 UART: [afmc] SUBJECT.KEYID = 7
17,637,730 UART: [afmc] AUTHORITY.KEYID = 5
21,009,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,487 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,931 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,725 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,199 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,662 UART: [afmc] --
23,379,151 UART: [cold-reset] --
23,384,523 UART: [state] Locking Datavault
23,390,143 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,894 UART: [state] Locking ICCM
23,394,490 UART: [exit] Launching FMC @ 0x40000130
23,402,873 UART:
23,403,114 UART: Running Caliptra FMC ...
23,404,217 UART:
23,404,373 UART: [state] CFI Enabled
23,467,092 UART: [fht] FMC Alias Private Key: 7
25,806,206 UART: [art] Extend RT PCRs Done
25,807,422 UART: [art] Lock RT PCRs Done
25,809,178 UART: [art] Populate DV Done
25,814,478 UART: [fht] FMC Alias Private Key: 7
25,816,139 UART: [art] Derive CDI
25,816,953 UART: [art] Store in in slot 0x4
25,875,615 UART: [art] Derive Key Pair
25,876,648 UART: [art] Store priv key in slot 0x5
29,169,735 UART: [art] Derive Key Pair - Done
29,182,414 UART: [art] Signing Cert with AUTHO
29,183,711 UART: RITY.KEYID = 7
31,472,505 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,470 UART: [art] PUB.X = C4ED27EA88024FF3C62ACE0953F3E5E4C57DECE12AEBE0490492E2E5191B05D69633F41D536ABAFCAF8134240B8DE803
31,481,293 UART: [art] PUB.Y = 9CD0989C89D7EEF880AA0CF824D235994215E91E8CDB3980986662A95C39EB0CC2F175DF85C341591B1DBDB6B6540C0F
31,488,572 UART: [art] SIG.R = 86AEA8087277BC661C41B677B9F4041BC092FE5173F325936EFD1FFC8C830AD6AE0A1FB71F38F5F2784B7DA4648BE1C3
31,495,974 UART: [art] SIG.S = 0411BCDA1A83E678DAB9085AF6DD2AF3B03B4A8DC19509912BAE4E15B2D9117AE1F336AA25D74517D9949F7F794906EF
32,801,493 UART: Caliptra RT
32,802,194 UART: [state] CFI Enabled
32,962,815 UART: [rt] RT listening for mailbox commands...
32,964,741 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,995,298 UART: [rt]cmd =0x44504543, len=28
33,038,004 >>> mbox cmd response data (2076 bytes)
33,048,034 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,078,177 UART: [rt]cmd =0x44504543, len=28
33,118,451 >>> mbox cmd response data (2076 bytes)
33,463,184 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,496,196 UART: [rt]cmd =0x49444550, len=354
33,509,903 >>> mbox cmd response data (8 bytes)
33,510,391 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,540,459 UART: [rt]cmd =0x44504543, len=28
33,582,957 >>> mbox cmd response data (2076 bytes)
33,593,021 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,623,160 UART: [rt]cmd =0x44504543, len=28
33,663,920 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,807,011 ready_for_fw is high
3,807,420 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,870,882 >>> mbox cmd response: success
23,569,061 UART:
23,569,450 UART: Running Caliptra FMC ...
23,570,586 UART:
23,570,745 UART: [state] CFI Enabled
23,637,819 UART: [fht] FMC Alias Private Key: 7
25,975,894 UART: [art] Extend RT PCRs Done
25,977,114 UART: [art] Lock RT PCRs Done
25,978,821 UART: [art] Populate DV Done
25,984,009 UART: [fht] FMC Alias Private Key: 7
25,985,656 UART: [art] Derive CDI
25,986,395 UART: [art] Store in in slot 0x4
26,046,794 UART: [art] Derive Key Pair
26,047,838 UART: [art] Store priv key in slot 0x5
29,340,759 UART: [art] Derive Key Pair - Done
29,353,833 UART: [art] Signing Cert with AUTHO
29,355,146 UART: RITY.KEYID = 7
31,643,579 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,094 UART: [art] PUB.X = 221CC2F2D837E095042D22EFE1A3C87A3EA5242F4FD63668F20B40BA7DD7989873BA31B2D49E5B51DDE046BB16AD3000
31,652,308 UART: [art] PUB.Y = 85C9CFE6D1E53328CB121E940A5C84B53004CB9A785A92F1438781A34C8DFE5629360E9B3BF9A74D7206FD13C6ED2CEA
31,659,565 UART: [art] SIG.R = EBF92DEE92280BEA24A4095399CC1958933C04832788A035DF0A3AB73231FB2C75F728BCD1E7CD629749A440455E2012
31,666,966 UART: [art] SIG.S = A034F1FF0C968D2D104BA6B120A07F348A3FE6EEA8845292B4284C03B0CE3773CF7C9770DDCE860743065DBD0726EDAF
32,972,284 UART: Caliptra RT
32,973,008 UART: [state] CFI Enabled
33,134,370 UART: [rt] RT listening for mailbox commands...
33,136,327 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,166,885 UART: [rt]cmd =0x44504543, len=28
33,209,653 >>> mbox cmd response data (2076 bytes)
33,219,686 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,249,749 UART: [rt]cmd =0x44504543, len=28
33,290,272 >>> mbox cmd response data (2076 bytes)
33,634,559 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,667,694 UART: [rt]cmd =0x49444550, len=353
33,681,485 >>> mbox cmd response data (8 bytes)
33,681,995 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,712,036 UART: [rt]cmd =0x44504543, len=28
33,755,023 >>> mbox cmd response data (2076 bytes)
33,765,112 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,795,196 UART: [rt]cmd =0x44504543, len=28
33,836,411 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
192,922 UART:
193,277 UART: Running Caliptra ROM ...
194,460 UART:
604,141 UART: [state] CFI Enabled
620,315 UART: [state] LifecycleState = Unprovisioned
622,292 UART: [state] DebugLocked = No
624,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,318 UART: [kat] SHA2-256
799,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,639 UART: [kat] ++
810,106 UART: [kat] sha1
819,625 UART: [kat] SHA2-256
822,342 UART: [kat] SHA2-384
829,316 UART: [kat] SHA2-512-ACC
831,682 UART: [kat] ECC-384
3,115,234 UART: [kat] HMAC-384Kdf
3,126,492 UART: [kat] LMS
4,316,651 UART: [kat] --
4,321,526 UART: [cold-reset] ++
4,323,385 UART: [fht] Storing FHT @ 0x50003400
4,334,223 UART: [idev] ++
4,334,791 UART: [idev] CDI.KEYID = 6
4,335,768 UART: [idev] SUBJECT.KEYID = 7
4,337,005 UART: [idev] UDS.KEYID = 0
4,337,984 ready_for_fw is high
4,338,210 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,074 UART: [idev] Erasing UDS.KEYID = 0
7,622,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,878 UART: [idev] --
7,648,915 UART: [ldev] ++
7,649,475 UART: [ldev] CDI.KEYID = 6
7,650,404 UART: [ldev] SUBJECT.KEYID = 5
7,651,662 UART: [ldev] AUTHORITY.KEYID = 7
7,652,810 UART: [ldev] FE.KEYID = 1
7,663,801 UART: [ldev] Erasing FE.KEYID = 1
10,954,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,409 UART: [ldev] --
13,313,449 UART: [fwproc] Waiting for Commands...
13,315,537 UART: [fwproc] Received command 0x46574c44
13,317,713 UART: [fwproc] Received Image of size 113760 bytes
17,364,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,721 >>> mbox cmd response: success
17,833,368 UART: [afmc] ++
17,834,017 UART: [afmc] CDI.KEYID = 6
17,834,927 UART: [afmc] SUBJECT.KEYID = 7
17,836,151 UART: [afmc] AUTHORITY.KEYID = 5
21,151,851 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,512 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,890 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,734 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,218 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,545 UART: [afmc] --
23,516,775 UART: [cold-reset] --
23,520,577 UART: [state] Locking Datavault
23,524,857 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,554 UART: [state] Locking ICCM
23,528,700 UART: [exit] Launching FMC @ 0x40000130
23,537,099 UART:
23,537,335 UART: Running Caliptra FMC ...
23,538,429 UART:
23,538,580 UART: [state] CFI Enabled
23,546,652 UART: [fht] FMC Alias Private Key: 7
25,877,639 UART: [art] Extend RT PCRs Done
25,878,859 UART: [art] Lock RT PCRs Done
25,880,697 UART: [art] Populate DV Done
25,885,999 UART: [fht] FMC Alias Private Key: 7
25,887,664 UART: [art] Derive CDI
25,888,405 UART: [art] Store in in slot 0x4
25,930,947 UART: [art] Derive Key Pair
25,931,989 UART: [art] Store priv key in slot 0x5
29,174,258 UART: [art] Derive Key Pair - Done
29,187,750 UART: [art] Signing Cert with AUTHO
29,189,088 UART: RITY.KEYID = 7
31,468,601 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,101 UART: [art] PUB.X = BD397AC32886DD79A0D24F435A54D93C01B251868DB76ED037686CDFD6767BF7ADB8490367E0B1D43D3265362FBCE034
31,477,371 UART: [art] PUB.Y = 034BAF5506FC228D77E8285D8533EB5D00D274F6BDDACCD3BA5FE3688E4A1B772D030319DB9CB9228E26B88DF479AB46
31,484,625 UART: [art] SIG.R = 5BF46149897028B70B4733196BAE1B0A1935BFE7482BD5976DDF0F3C1413EC766DAE4B8F5EEA85C16268604A44434C6F
31,491,992 UART: [art] SIG.S = 6AE62659AAFF82C9F382C8EEA984DC9CFE57A93AE612C8C60A96979870DE5F261196A5AAEB04B3AEA3A20C348719FA7A
32,796,799 UART: Caliptra RT
32,797,501 UART: [state] CFI Enabled
32,915,421 UART: [rt] RT listening for mailbox commands...
32,917,346 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,947,177 UART: [rt]cmd =0x44504543, len=28
32,989,593 >>> mbox cmd response data (2076 bytes)
32,999,596 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,029,647 UART: [rt]cmd =0x44504543, len=28
33,070,297 >>> mbox cmd response data (2076 bytes)
33,415,517 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,449,050 UART: [rt]cmd =0x49444550, len=353
33,462,749 >>> mbox cmd response data (8 bytes)
33,463,232 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,493,081 UART: [rt]cmd =0x44504543, len=28
33,535,834 >>> mbox cmd response data (2076 bytes)
33,545,859 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,576,019 UART: [rt]cmd =0x44504543, len=28
33,616,937 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,628 writing to cptra_bootfsm_go
4,129,386 ready_for_fw is high
4,129,817 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,079,047 >>> mbox cmd response: success
23,725,483 UART:
23,725,882 UART: Running Caliptra FMC ...
23,726,983 UART:
23,727,128 UART: [state] CFI Enabled
23,735,081 UART: [fht] FMC Alias Private Key: 7
26,066,225 UART: [art] Extend RT PCRs Done
26,067,462 UART: [art] Lock RT PCRs Done
26,069,442 UART: [art] Populate DV Done
26,074,722 UART: [fht] FMC Alias Private Key: 7
26,076,374 UART: [art] Derive CDI
26,077,190 UART: [art] Store in in slot 0x4
26,119,517 UART: [art] Derive Key Pair
26,120,560 UART: [art] Store priv key in slot 0x5
29,362,841 UART: [art] Derive Key Pair - Done
29,375,745 UART: [art] Signing Cert with AUTHO
29,377,049 UART: RITY.KEYID = 7
31,656,409 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,912 UART: [art] PUB.X = CC76CD23EE64ADE11DD3ED3E25A01E62C9FDC1AE7BA78CF066EA9E97D7C2F73B30D0FA784DF7FFE36710788B89EE6EE0
31,665,209 UART: [art] PUB.Y = FF84F13CFA4A15B1117CFB0F8B5965CF2D9DB60F61FBEA75A2B715C3CED3BBBE62051A83770F64039801F4ADCE6B3C7B
31,672,493 UART: [art] SIG.R = 669138A46C5BEF70A6CECFD8F3838D1B586650BB1EAC7ED7AF777AB17F7B856CBF975122D8A0FA3190E8C5FF33373D7E
31,679,882 UART: [art] SIG.S = 5E06E2F81F5614CCDC990720336C90E16322E409E30025127EB1C910A7718DF2652DF694C2871F6AA22FA2024A327435
32,984,664 UART: Caliptra RT
32,985,376 UART: [state] CFI Enabled
33,103,945 UART: [rt] RT listening for mailbox commands...
33,105,903 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,135,776 UART: [rt]cmd =0x44504543, len=28
33,178,289 >>> mbox cmd response data (2076 bytes)
33,188,350 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,218,413 UART: [rt]cmd =0x44504543, len=28
33,258,716 >>> mbox cmd response data (2076 bytes)
33,603,703 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,636,970 UART: [rt]cmd =0x49444550, len=354
33,650,847 >>> mbox cmd response data (8 bytes)
33,651,335 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,681,092 UART: [rt]cmd =0x44504543, len=28
33,723,905 >>> mbox cmd response data (2076 bytes)
33,733,846 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,763,859 UART: [rt]cmd =0x44504543, len=28
33,805,250 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,456 UART:
192,816 UART: Running Caliptra ROM ...
194,023 UART:
194,188 UART: [state] CFI Enabled
266,449 UART: [state] LifecycleState = Unprovisioned
268,467 UART: [state] DebugLocked = No
271,216 UART: [state] WD Timer not started. Device not locked for debugging
275,821 UART: [kat] SHA2-256
454,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,520 UART: [kat] ++
467,048 UART: [kat] sha1
477,715 UART: [kat] SHA2-256
480,717 UART: [kat] SHA2-384
486,483 UART: [kat] SHA2-512-ACC
489,414 UART: [kat] ECC-384
2,949,187 UART: [kat] HMAC-384Kdf
2,971,167 UART: [kat] LMS
3,500,640 UART: [kat] --
3,505,043 UART: [cold-reset] ++
3,506,700 UART: [fht] FHT @ 0x50003400
3,517,535 UART: [idev] ++
3,518,096 UART: [idev] CDI.KEYID = 6
3,518,984 UART: [idev] SUBJECT.KEYID = 7
3,520,232 UART: [idev] UDS.KEYID = 0
3,521,130 ready_for_fw is high
3,521,365 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,061 UART: [idev] Erasing UDS.KEYID = 0
6,027,861 UART: [idev] Sha1 KeyId Algorithm
6,051,260 UART: [idev] --
6,054,877 UART: [ldev] ++
6,055,448 UART: [ldev] CDI.KEYID = 6
6,056,373 UART: [ldev] SUBJECT.KEYID = 5
6,057,584 UART: [ldev] AUTHORITY.KEYID = 7
6,058,821 UART: [ldev] FE.KEYID = 1
6,102,863 UART: [ldev] Erasing FE.KEYID = 1
8,604,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,908 UART: [ldev] --
10,413,710 UART: [fwproc] Wait for Commands...
10,415,799 UART: [fwproc] Recv command 0x46574c44
10,417,849 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,885 >>> mbox cmd response: success
14,284,325 UART: [afmc] ++
14,284,925 UART: [afmc] CDI.KEYID = 6
14,285,853 UART: [afmc] SUBJECT.KEYID = 7
14,287,008 UART: [afmc] AUTHORITY.KEYID = 5
16,830,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,593,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,609,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,625,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,649,164 UART: [afmc] --
18,653,288 UART: [cold-reset] --
18,656,664 UART: [state] Locking Datavault
18,662,445 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,089 UART: [state] Locking ICCM
18,666,242 UART: [exit] Launching FMC @ 0x40000130
18,674,689 UART:
18,674,942 UART: Running Caliptra FMC ...
18,676,061 UART:
18,676,228 UART: [state] CFI Enabled
18,732,471 UART: [fht] FMC Alias Private Key: 7
20,496,254 UART: [art] Extend RT PCRs Done
20,497,478 UART: [art] Lock RT PCRs Done
20,499,207 UART: [art] Populate DV Done
20,504,670 UART: [fht] FMC Alias Private Key: 7
20,506,364 UART: [art] Derive CDI
20,507,397 UART: [art] Store in in slot 0x4
20,565,665 UART: [art] Derive Key Pair
20,566,662 UART: [art] Store priv key in slot 0x5
23,029,898 UART: [art] Derive Key Pair - Done
23,043,010 UART: [art] Signing Cert with AUTHO
23,044,323 UART: RITY.KEYID = 7
24,755,213 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,727 UART: [art] PUB.X = E687E8F20B159E50989B1C7B0272772194763A4508D6AE835142CA388FEEA7711DF830143F81C6E6CA1458DC3D09557F
24,764,018 UART: [art] PUB.Y = 9862F7D317C46CBC2F1D2F5901B765E6351E2302CC0370D6CE2258A6A06A5C0D036CBE2CD9EB768EAC277D3A9ED903AF
24,771,228 UART: [art] SIG.R = 37CB6196916ABA4B6A4481E8C857B7AE9449F0896BE440F3199B09C21D3740B9A39509A7A460ABF36D13C4109A2E374B
24,778,609 UART: [art] SIG.S = 06A0D14984827899D85572002188147B53127E2EEA7C4EC56154401E80076120458A14C33C9F891467A961BBE176F43E
25,757,839 UART: Caliptra RT
25,758,548 UART: [state] CFI Enabled
25,922,856 UART: [rt] RT listening for mailbox commands...
25,924,819 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,955,511 UART: [rt]cmd =0x44504543, len=28
25,998,222 >>> mbox cmd response data (2076 bytes)
26,008,259 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,038,240 UART: [rt]cmd =0x44504543, len=28
26,078,847 >>> mbox cmd response data (2076 bytes)
26,423,405 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,456,448 UART: [rt]cmd =0x49444550, len=353
26,470,170 >>> mbox cmd response data (8 bytes)
26,470,656 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,500,356 UART: [rt]cmd =0x44504543, len=28
26,543,323 >>> mbox cmd response data (2076 bytes)
26,553,354 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,583,384 UART: [rt]cmd =0x44504543, len=28
26,623,866 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
3,379,582 ready_for_fw is high
3,380,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,083,255 >>> mbox cmd response: success
18,362,344 UART:
18,362,739 UART: Running Caliptra FMC ...
18,363,877 UART:
18,364,056 UART: [state] CFI Enabled
18,431,942 UART: [fht] FMC Alias Private Key: 7
20,196,104 UART: [art] Extend RT PCRs Done
20,197,307 UART: [art] Lock RT PCRs Done
20,199,034 UART: [art] Populate DV Done
20,204,297 UART: [fht] FMC Alias Private Key: 7
20,205,781 UART: [art] Derive CDI
20,206,538 UART: [art] Store in in slot 0x4
20,264,167 UART: [art] Derive Key Pair
20,265,161 UART: [art] Store priv key in slot 0x5
22,727,993 UART: [art] Derive Key Pair - Done
22,740,570 UART: [art] Signing Cert with AUTHO
22,741,881 UART: RITY.KEYID = 7
24,453,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,161 UART: [art] PUB.X = 4401D8ABD49C64A150A9E4102EF3B03067500BD08B87FFE592604A250A9B391A6F4AEEA75E3B8A04ABAF88707B0D8E44
24,462,450 UART: [art] PUB.Y = 9E2662B8C9B0BC174C709C7BBEA59B7C2A7388F059975879189C96ED424DDED9551BE3BD53B2898F4809E34B95E1A544
24,469,687 UART: [art] SIG.R = 655ED68CC49836AFCAF7D0F541BB9060BFBBBB43B9C13EC3DF48E79A4EAAF036B841F7C6F0E637A1155A61BFC9A03EC8
24,477,127 UART: [art] SIG.S = BFA70F859C08B5DD2CC3A96E29FEAA7B922D0F40918D1B54D68D9D7AE36623742AB6F27E9906EB16DF234CC1755B6723
25,455,918 UART: Caliptra RT
25,456,621 UART: [state] CFI Enabled
25,621,737 UART: [rt] RT listening for mailbox commands...
25,623,694 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,654,414 UART: [rt]cmd =0x44504543, len=28
25,696,800 >>> mbox cmd response data (2076 bytes)
25,706,830 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,736,858 UART: [rt]cmd =0x44504543, len=28
25,777,508 >>> mbox cmd response data (2076 bytes)
26,122,026 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,155,071 UART: [rt]cmd =0x49444550, len=352
26,166,532 >>> mbox cmd response data (8 bytes)
26,166,994 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,196,974 UART: [rt]cmd =0x44504543, len=28
26,239,473 >>> mbox cmd response data (2076 bytes)
26,249,378 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,279,431 UART: [rt]cmd =0x44504543, len=28
26,320,369 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,967 writing to cptra_bootfsm_go
193,263 UART:
193,646 UART: Running Caliptra ROM ...
194,847 UART:
604,360 UART: [state] CFI Enabled
619,800 UART: [state] LifecycleState = Unprovisioned
621,709 UART: [state] DebugLocked = No
623,176 UART: [state] WD Timer not started. Device not locked for debugging
627,611 UART: [kat] SHA2-256
806,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,306 UART: [kat] ++
818,849 UART: [kat] sha1
830,513 UART: [kat] SHA2-256
833,521 UART: [kat] SHA2-384
838,663 UART: [kat] SHA2-512-ACC
841,683 UART: [kat] ECC-384
3,286,029 UART: [kat] HMAC-384Kdf
3,298,841 UART: [kat] LMS
3,828,289 UART: [kat] --
3,832,432 UART: [cold-reset] ++
3,833,442 UART: [fht] FHT @ 0x50003400
3,844,839 UART: [idev] ++
3,845,464 UART: [idev] CDI.KEYID = 6
3,846,365 UART: [idev] SUBJECT.KEYID = 7
3,847,567 UART: [idev] UDS.KEYID = 0
3,848,554 ready_for_fw is high
3,848,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,081 UART: [idev] Erasing UDS.KEYID = 0
6,321,560 UART: [idev] Sha1 KeyId Algorithm
6,343,395 UART: [idev] --
6,348,089 UART: [ldev] ++
6,348,663 UART: [ldev] CDI.KEYID = 6
6,349,580 UART: [ldev] SUBJECT.KEYID = 5
6,350,737 UART: [ldev] AUTHORITY.KEYID = 7
6,352,028 UART: [ldev] FE.KEYID = 1
6,361,761 UART: [ldev] Erasing FE.KEYID = 1
8,835,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,695 UART: [ldev] --
10,627,843 UART: [fwproc] Wait for Commands...
10,630,805 UART: [fwproc] Recv command 0x46574c44
10,632,845 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,490,496 >>> mbox cmd response: success
14,495,340 UART: [afmc] ++
14,495,937 UART: [afmc] CDI.KEYID = 6
14,496,824 UART: [afmc] SUBJECT.KEYID = 7
14,498,041 UART: [afmc] AUTHORITY.KEYID = 5
16,996,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,581 UART: [afmc] --
18,792,415 UART: [cold-reset] --
18,795,423 UART: [state] Locking Datavault
18,801,216 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,866 UART: [state] Locking ICCM
18,804,373 UART: [exit] Launching FMC @ 0x40000130
18,812,773 UART:
18,813,019 UART: Running Caliptra FMC ...
18,814,127 UART:
18,814,285 UART: [state] CFI Enabled
18,822,822 UART: [fht] FMC Alias Private Key: 7
20,579,945 UART: [art] Extend RT PCRs Done
20,581,157 UART: [art] Lock RT PCRs Done
20,582,910 UART: [art] Populate DV Done
20,588,334 UART: [fht] FMC Alias Private Key: 7
20,589,822 UART: [art] Derive CDI
20,590,586 UART: [art] Store in in slot 0x4
20,633,021 UART: [art] Derive Key Pair
20,634,067 UART: [art] Store priv key in slot 0x5
23,060,603 UART: [art] Derive Key Pair - Done
23,073,502 UART: [art] Signing Cert with AUTHO
23,074,823 UART: RITY.KEYID = 7
24,780,164 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,653 UART: [art] PUB.X = D7DC68AD9ABE4A704E7B512AC811BE5CBD295D26DA0ACB95AAA47D258A282F98F301E6AC65FCED6BFA244A235B785D8E
24,788,987 UART: [art] PUB.Y = 090BB01B1F0A96B1D6C0ADB5C608463CAA5751BDCFCC05E659E30C31EC9A0508778546DFF82C2E4F5A9D655FC37089B0
24,796,245 UART: [art] SIG.R = B304BF5F6F1B6B251D7C7A7FC7E772D8949BC375ADD5AE6ABED40D7E96199F2B62461F25118691E2F8D197923E4D66B0
24,803,614 UART: [art] SIG.S = 41699158A681EDEDAF261E98F0DBB6D75233F48609C58AD0ACE0F0481479A1C5A049E0E5F0363D9F23D51901AD0F22FE
25,782,212 UART: Caliptra RT
25,782,926 UART: [state] CFI Enabled
25,900,171 UART: [rt] RT listening for mailbox commands...
25,902,120 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,931,932 UART: [rt]cmd =0x44504543, len=28
25,974,496 >>> mbox cmd response data (2076 bytes)
25,984,712 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,014,966 UART: [rt]cmd =0x44504543, len=28
26,055,213 >>> mbox cmd response data (2076 bytes)
26,398,971 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,432,014 UART: [rt]cmd =0x49444550, len=354
26,445,703 >>> mbox cmd response data (8 bytes)
26,446,204 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,476,191 UART: [rt]cmd =0x44504543, len=28
26,518,750 >>> mbox cmd response data (2076 bytes)
26,528,783 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,558,832 UART: [rt]cmd =0x44504543, len=28
26,599,650 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,885 writing to cptra_bootfsm_go
3,698,898 ready_for_fw is high
3,699,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,852 >>> mbox cmd response: success
18,518,455 UART:
18,518,876 UART: Running Caliptra FMC ...
18,520,074 UART:
18,520,246 UART: [state] CFI Enabled
18,527,869 UART: [fht] FMC Alias Private Key: 7
20,284,944 UART: [art] Extend RT PCRs Done
20,286,182 UART: [art] Lock RT PCRs Done
20,287,553 UART: [art] Populate DV Done
20,293,088 UART: [fht] FMC Alias Private Key: 7
20,294,670 UART: [art] Derive CDI
20,295,450 UART: [art] Store in in slot 0x4
20,338,155 UART: [art] Derive Key Pair
20,339,160 UART: [art] Store priv key in slot 0x5
22,765,849 UART: [art] Derive Key Pair - Done
22,778,636 UART: [art] Signing Cert with AUTHO
22,779,977 UART: RITY.KEYID = 7
24,485,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,184 UART: [art] PUB.X = DA968436C4B9B30D31AB7551FF8D05D00F513E52508B429ED06FB4C936A20589C136077D9B9E396D7BEE833AC94AB083
24,494,417 UART: [art] PUB.Y = E8407EC418D5F9C67E006A000B929E44F380A11AD02247A7E4D2F926C493980B4A6433D25453436653055D865B9AED2B
24,501,595 UART: [art] SIG.R = 3FF9029431F6C9D101E0DB2209BDCB8C044DE1DA9E9C103BDAC9AA6AC5DC72311B187184A2A74FEE355A20BAF85FA166
24,509,023 UART: [art] SIG.S = 67193E0015A24A64292AD122F459117945E39677D6142BF572F961F9A87F4A29237EF1E0EF4FE5ED441FC941176173B5
25,487,690 UART: Caliptra RT
25,488,406 UART: [state] CFI Enabled
25,604,936 UART: [rt] RT listening for mailbox commands...
25,606,901 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,636,714 UART: [rt]cmd =0x44504543, len=28
25,679,503 >>> mbox cmd response data (2076 bytes)
25,689,542 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,719,562 UART: [rt]cmd =0x44504543, len=28
25,760,139 >>> mbox cmd response data (2076 bytes)
26,103,200 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,136,482 UART: [rt]cmd =0x49444550, len=353
26,149,939 >>> mbox cmd response data (8 bytes)
26,150,431 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,180,237 UART: [rt]cmd =0x44504543, len=28
26,223,017 >>> mbox cmd response data (2076 bytes)
26,232,956 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,263,031 UART: [rt]cmd =0x44504543, len=28
26,303,718 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,454 UART:
192,837 UART: Running Caliptra ROM ...
193,950 UART:
194,091 UART: [state] CFI Enabled
262,896 UART: [state] LifecycleState = Unprovisioned
265,320 UART: [state] DebugLocked = No
267,338 UART: [state] WD Timer not started. Device not locked for debugging
272,236 UART: [kat] SHA2-256
462,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,878 UART: [kat] ++
473,372 UART: [kat] sha1
484,886 UART: [kat] SHA2-256
487,885 UART: [kat] SHA2-384
492,613 UART: [kat] SHA2-512-ACC
495,233 UART: [kat] ECC-384
2,949,693 UART: [kat] HMAC-384Kdf
2,973,031 UART: [kat] LMS
3,504,772 UART: [kat] --
3,509,975 UART: [cold-reset] ++
3,512,043 UART: [fht] FHT @ 0x50003400
3,523,093 UART: [idev] ++
3,523,799 UART: [idev] CDI.KEYID = 6
3,524,748 UART: [idev] SUBJECT.KEYID = 7
3,525,990 UART: [idev] UDS.KEYID = 0
3,526,914 ready_for_fw is high
3,527,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,593 UART: [idev] Erasing UDS.KEYID = 0
6,030,667 UART: [idev] Sha1 KeyId Algorithm
6,053,675 UART: [idev] --
6,058,754 UART: [ldev] ++
6,059,438 UART: [ldev] CDI.KEYID = 6
6,060,432 UART: [ldev] SUBJECT.KEYID = 5
6,061,546 UART: [ldev] AUTHORITY.KEYID = 7
6,062,775 UART: [ldev] FE.KEYID = 1
6,100,702 UART: [ldev] Erasing FE.KEYID = 1
8,609,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,895 UART: [ldev] --
10,414,561 UART: [fwproc] Wait for Commands...
10,416,975 UART: [fwproc] Recv command 0x46574c44
10,419,286 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,772 >>> mbox cmd response: success
14,603,146 UART: [afmc] ++
14,603,865 UART: [afmc] CDI.KEYID = 6
14,605,056 UART: [afmc] SUBJECT.KEYID = 7
14,606,498 UART: [afmc] AUTHORITY.KEYID = 5
17,128,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,402 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,167 UART: [afmc] --
18,928,054 UART: [cold-reset] --
18,932,956 UART: [state] Locking Datavault
18,939,078 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,292 UART: [state] Locking ICCM
18,943,499 UART: [exit] Launching FMC @ 0x40000130
18,952,134 UART:
18,952,372 UART: Running Caliptra FMC ...
18,953,469 UART:
18,953,623 UART: [state] CFI Enabled
19,012,362 UART: [fht] FMC Alias Private Key: 7
20,776,228 UART: [art] Extend RT PCRs Done
20,777,453 UART: [art] Lock RT PCRs Done
20,778,835 UART: [art] Populate DV Done
20,784,466 UART: [fht] FMC Alias Private Key: 7
20,786,155 UART: [art] Derive CDI
20,786,891 UART: [art] Store in in slot 0x4
20,845,438 UART: [art] Derive Key Pair
20,846,477 UART: [art] Store priv key in slot 0x5
23,309,773 UART: [art] Derive Key Pair - Done
23,322,445 UART: [art] Signing Cert with AUTHO
23,323,758 UART: RITY.KEYID = 7
25,035,711 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,219 UART: [art] PUB.X = F900E138866008AFA4F5906AE3DA5BF69A534DEC3B8D2A6E5D3083A46FCA343883E09DF8DC740CC84F448CCDA3E14337
25,044,489 UART: [art] PUB.Y = ABAB0E8AB07CC621B83817011296CF1CA63DB61AB7FAAF8C56C9C1125E66AD9752C6FD335EDE23CCB4DB5D3F94C0ECF2
25,051,795 UART: [art] SIG.R = 814B154EF7EB30EA8865108A21D43C15E149A303FECC4997F98C3022F223C466B53A8A0456A8D00FB6B3627B2A9DB7FE
25,059,220 UART: [art] SIG.S = 3F5A2E4574AD2C56F1702E221B2D1120490CFA29809E6734557304EB4F98FFE0A8E624A9DB6050D6FF3E8A47DD86D889
26,038,359 UART: Caliptra RT
26,039,056 UART: [state] CFI Enabled
26,202,887 UART: [rt] RT listening for mailbox commands...
26,204,818 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,235,536 UART: [rt]cmd =0x44504543, len=28
26,278,058 >>> mbox cmd response data (2076 bytes)
26,288,149 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,318,100 UART: [rt]cmd =0x44504543, len=28
26,358,630 >>> mbox cmd response data (2076 bytes)
26,703,160 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,736,182 UART: [rt]cmd =0x49444550, len=353
26,749,708 >>> mbox cmd response data (8 bytes)
26,750,197 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,780,287 UART: [rt]cmd =0x44504543, len=28
26,823,375 >>> mbox cmd response data (2076 bytes)
26,833,417 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,863,643 UART: [rt]cmd =0x44504543, len=28
26,904,388 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,440,390 ready_for_fw is high
3,440,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,710,861 >>> mbox cmd response: success
19,002,196 UART:
19,002,579 UART: Running Caliptra FMC ...
19,003,684 UART:
19,003,840 UART: [state] CFI Enabled
19,073,422 UART: [fht] FMC Alias Private Key: 7
20,837,536 UART: [art] Extend RT PCRs Done
20,838,758 UART: [art] Lock RT PCRs Done
20,840,529 UART: [art] Populate DV Done
20,845,845 UART: [fht] FMC Alias Private Key: 7
20,847,476 UART: [art] Derive CDI
20,848,297 UART: [art] Store in in slot 0x4
20,906,360 UART: [art] Derive Key Pair
20,907,356 UART: [art] Store priv key in slot 0x5
23,370,037 UART: [art] Derive Key Pair - Done
23,382,889 UART: [art] Signing Cert with AUTHO
23,384,212 UART: RITY.KEYID = 7
25,097,037 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,554 UART: [art] PUB.X = 5625C85C1DA4B7AB936CD879447D48A66C5D7B7D50C30A0FDB8202ECC6F2CF75CD5F48AE2168814EC599DCD87D495883
25,105,845 UART: [art] PUB.Y = 4E902F223E26BA67E7687018791A328AB0745E18F5EF6FE57C0B20559C63A3B9E43D71A7F90E2AD8AA44EB8E9929A53B
25,113,118 UART: [art] SIG.R = 2608D172687EB8174BC94E0E585B14C37DC8E2B96107CD5E1C7EF5857E86E8F802E8A5A1F84D9158412124443D1037B6
25,120,454 UART: [art] SIG.S = 3D0EDDB8C51F8077A226FAC8621FFB38305D40A52E16EB3C464EEEEC1E1177EFE25FF591C13EF31D334739C173F68E5B
26,098,920 UART: Caliptra RT
26,099,617 UART: [state] CFI Enabled
26,264,165 UART: [rt] RT listening for mailbox commands...
26,266,105 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,296,437 UART: [rt]cmd =0x44504543, len=28
26,339,202 >>> mbox cmd response data (2076 bytes)
26,349,215 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,379,093 UART: [rt]cmd =0x44504543, len=28
26,419,441 >>> mbox cmd response data (2076 bytes)
26,764,298 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,797,376 UART: [rt]cmd =0x49444550, len=352
26,808,729 >>> mbox cmd response data (8 bytes)
26,809,192 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,838,899 UART: [rt]cmd =0x44504543, len=28
26,881,745 >>> mbox cmd response data (2076 bytes)
26,891,689 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,921,594 UART: [rt]cmd =0x44504543, len=28
26,962,226 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
192,886 UART:
193,272 UART: Running Caliptra ROM ...
194,421 UART:
603,962 UART: [state] CFI Enabled
617,219 UART: [state] LifecycleState = Unprovisioned
619,607 UART: [state] DebugLocked = No
622,477 UART: [state] WD Timer not started. Device not locked for debugging
627,366 UART: [kat] SHA2-256
817,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,013 UART: [kat] ++
828,650 UART: [kat] sha1
839,960 UART: [kat] SHA2-256
842,982 UART: [kat] SHA2-384
849,864 UART: [kat] SHA2-512-ACC
852,460 UART: [kat] ECC-384
3,292,089 UART: [kat] HMAC-384Kdf
3,304,533 UART: [kat] LMS
3,836,331 UART: [kat] --
3,841,313 UART: [cold-reset] ++
3,843,453 UART: [fht] FHT @ 0x50003400
3,856,204 UART: [idev] ++
3,856,850 UART: [idev] CDI.KEYID = 6
3,857,838 UART: [idev] SUBJECT.KEYID = 7
3,859,009 UART: [idev] UDS.KEYID = 0
3,859,938 ready_for_fw is high
3,860,144 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,563 UART: [idev] Erasing UDS.KEYID = 0
6,338,391 UART: [idev] Sha1 KeyId Algorithm
6,360,161 UART: [idev] --
6,364,545 UART: [ldev] ++
6,365,268 UART: [ldev] CDI.KEYID = 6
6,366,185 UART: [ldev] SUBJECT.KEYID = 5
6,367,343 UART: [ldev] AUTHORITY.KEYID = 7
6,368,520 UART: [ldev] FE.KEYID = 1
6,377,925 UART: [ldev] Erasing FE.KEYID = 1
8,856,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,759 UART: [ldev] --
10,649,626 UART: [fwproc] Wait for Commands...
10,651,685 UART: [fwproc] Recv command 0x46574c44
10,653,998 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,833,094 >>> mbox cmd response: success
14,836,596 UART: [afmc] ++
14,837,304 UART: [afmc] CDI.KEYID = 6
14,838,552 UART: [afmc] SUBJECT.KEYID = 7
14,839,993 UART: [afmc] AUTHORITY.KEYID = 5
17,346,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,991 UART: [afmc] --
19,144,032 UART: [cold-reset] --
19,147,960 UART: [state] Locking Datavault
19,152,245 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,394 UART: [state] Locking ICCM
19,156,422 UART: [exit] Launching FMC @ 0x40000130
19,165,118 UART:
19,165,392 UART: Running Caliptra FMC ...
19,166,427 UART:
19,166,574 UART: [state] CFI Enabled
19,174,734 UART: [fht] FMC Alias Private Key: 7
20,931,545 UART: [art] Extend RT PCRs Done
20,932,762 UART: [art] Lock RT PCRs Done
20,934,251 UART: [art] Populate DV Done
20,939,771 UART: [fht] FMC Alias Private Key: 7
20,941,313 UART: [art] Derive CDI
20,942,067 UART: [art] Store in in slot 0x4
20,984,503 UART: [art] Derive Key Pair
20,985,503 UART: [art] Store priv key in slot 0x5
23,412,152 UART: [art] Derive Key Pair - Done
23,425,361 UART: [art] Signing Cert with AUTHO
23,426,660 UART: RITY.KEYID = 7
25,132,210 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,712 UART: [art] PUB.X = C7F8A7227461FD1DE67EDC71F1B9FA87DAD333F7A08EF05F71EDA90A85EB1DB7CF5425DEF0A3B5E7BBDE5986FD4DC50F
25,141,040 UART: [art] PUB.Y = 1AAD58AE1C2214D028AF502185AE4D72ED15FA9DEA8139BCA48D918A7A4EFC0F58DDE5B8EF209A58DC956E21FCB13005
25,148,351 UART: [art] SIG.R = C04229DE1323F2D294C887B6EDA82724632E0255BACEF4A51CA54BC9AF710DCEF29E76CD1356FAB75AB3E0A11F5C4315
25,155,714 UART: [art] SIG.S = 45EA1A5A285393D205B33742BDCCF001CBB24EE12894DC395AFF5888DA885DF94762FA2741201748BFD72D976B5DBD7C
26,135,005 UART: Caliptra RT
26,135,724 UART: [state] CFI Enabled
26,252,897 UART: [rt] RT listening for mailbox commands...
26,254,831 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,284,852 UART: [rt]cmd =0x44504543, len=28
26,327,511 >>> mbox cmd response data (2076 bytes)
26,337,536 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,367,457 UART: [rt]cmd =0x44504543, len=28
26,408,103 >>> mbox cmd response data (2076 bytes)
26,751,356 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,784,688 UART: [rt]cmd =0x49444550, len=352
26,796,081 >>> mbox cmd response data (8 bytes)
26,796,575 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,826,594 UART: [rt]cmd =0x44504543, len=28
26,869,171 >>> mbox cmd response data (2076 bytes)
26,879,210 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,909,183 UART: [rt]cmd =0x44504543, len=28
26,950,202 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
3,760,675 ready_for_fw is high
3,761,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,959,384 >>> mbox cmd response: success
19,213,284 UART:
19,213,717 UART: Running Caliptra FMC ...
19,214,867 UART:
19,215,031 UART: [state] CFI Enabled
19,222,669 UART: [fht] FMC Alias Private Key: 7
20,979,354 UART: [art] Extend RT PCRs Done
20,980,584 UART: [art] Lock RT PCRs Done
20,982,323 UART: [art] Populate DV Done
20,987,685 UART: [fht] FMC Alias Private Key: 7
20,989,284 UART: [art] Derive CDI
20,990,022 UART: [art] Store in in slot 0x4
21,032,460 UART: [art] Derive Key Pair
21,033,463 UART: [art] Store priv key in slot 0x5
23,460,305 UART: [art] Derive Key Pair - Done
23,473,361 UART: [art] Signing Cert with AUTHO
23,474,671 UART: RITY.KEYID = 7
25,179,632 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,162 UART: [art] PUB.X = 994E2E0F332E793F086EB4140B90298008CFDEF00B58000A0E1D214800D228FF61464A5A70364D282E6ADC75FFE44129
25,188,350 UART: [art] PUB.Y = 85622651B3D5FFCFA9FCB59C2DD06C8120E9AA9EB0F213CBE0BBBFA338C3C87082B52ABB75909F2A44CE3833CB869334
25,195,631 UART: [art] SIG.R = 6B9AE0A201074D72E2CB83129395355FD70F90DAE6623BB2F2A4720F5F48BED61D29A110B987F48CC63C4794DCAF7D0F
25,203,025 UART: [art] SIG.S = 36B976313BDF84D49445713BFC29AB326E2A5931BACA89C788E340BA9D9BE2A126E21ADFE777F4E3EF93CD791ACD01A7
26,182,057 UART: Caliptra RT
26,182,789 UART: [state] CFI Enabled
26,300,020 UART: [rt] RT listening for mailbox commands...
26,301,972 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,331,954 UART: [rt]cmd =0x44504543, len=28
26,374,653 >>> mbox cmd response data (2076 bytes)
26,384,707 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,414,856 UART: [rt]cmd =0x44504543, len=28
26,455,717 >>> mbox cmd response data (2076 bytes)
26,799,389 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,832,386 UART: [rt]cmd =0x49444550, len=353
26,845,989 >>> mbox cmd response data (8 bytes)
26,846,466 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,876,415 UART: [rt]cmd =0x44504543, len=28
26,918,808 >>> mbox cmd response data (2076 bytes)
26,928,769 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,958,843 UART: [rt]cmd =0x44504543, len=28
26,999,998 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 ready_for_fw is high
1,480,927 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,380 UART: [idev] Erasing UDS.KEYID = 0
1,504,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,778 UART: [idev] --
1,513,811 UART: [ldev] ++
1,513,979 UART: [ldev] CDI.KEYID = 6
1,514,342 UART: [ldev] SUBJECT.KEYID = 5
1,514,768 UART: [ldev] AUTHORITY.KEYID = 7
1,515,231 UART: [ldev] FE.KEYID = 1
1,520,581 UART: [ldev] Erasing FE.KEYID = 1
1,545,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,874 UART: [ldev] --
1,585,185 UART: [fwproc] Waiting for Commands...
1,585,978 UART: [fwproc] Received command 0x46574c44
1,586,769 UART: [fwproc] Received Image of size 114084 bytes
2,881,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,421 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,206 >>> mbox cmd response: success
3,075,264 UART: [afmc] ++
3,075,432 UART: [afmc] CDI.KEYID = 6
3,075,794 UART: [afmc] SUBJECT.KEYID = 7
3,076,219 UART: [afmc] AUTHORITY.KEYID = 5
3,110,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,466 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,859 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,549 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,574 UART: [afmc] --
3,154,584 UART: [cold-reset] --
3,155,646 UART: [state] Locking Datavault
3,156,991 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,595 UART: [state] Locking ICCM
3,158,173 UART: [exit] Launching FMC @ 0x40000130
3,163,502 UART:
3,163,518 UART: Running Caliptra FMC ...
3,163,926 UART:
3,163,980 UART: [state] CFI Enabled
3,174,209 UART: [fht] FMC Alias Private Key: 7
3,282,064 UART: [art] Extend RT PCRs Done
3,282,492 UART: [art] Lock RT PCRs Done
3,284,158 UART: [art] Populate DV Done
3,292,203 UART: [fht] FMC Alias Private Key: 7
3,293,179 UART: [art] Derive CDI
3,293,459 UART: [art] Store in in slot 0x4
3,379,108 UART: [art] Derive Key Pair
3,379,468 UART: [art] Store priv key in slot 0x5
3,392,564 UART: [art] Derive Key Pair - Done
3,407,337 UART: [art] Signing Cert with AUTHO
3,407,817 UART: RITY.KEYID = 7
3,423,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,034 UART: [art] PUB.X = 6361D88BCECD7118029560CB2042A10A1AE25C3824842E1417B31DD3392BA9DFDBE52830F092942D235E06C7BCC6F47E
3,430,799 UART: [art] PUB.Y = 134D7BAF7EEA8D01807AF4BD5397F75F1848CB3AE8A642FFE8B78BA419373039638DE8A0443D6E742AECD9ABB5AC1617
3,437,762 UART: [art] SIG.R = 08B4A0F0126777A3B41DE1F4631DEEC43CADA8FBB8CBC8E9307B3B6089EC39612B4C30038F93316EB7C2C9DDB25DD4E0
3,444,544 UART: [art] SIG.S = 186A3BBFDFB328E98E1FCC0A56E2513EF7C77B7ADF234A55D0A109C43422048CEA3C2B2AF4C265463CBBFCDBC6E035DA
3,468,550 UART: Caliptra RT
3,468,803 UART: [state] CFI Enabled
3,576,461 UART: [rt] RT listening for mailbox commands...
3,577,131 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,941 UART: [rt]cmd =0x44504543, len=28
3,650,489 >>> mbox cmd response data (2076 bytes)
3,650,490 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,981 UART: [rt]cmd =0x44504543, len=28
3,720,749 >>> mbox cmd response data (2076 bytes)
3,720,750 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,475 UART: [rt]cmd =0x49444550, len=352
3,763,378 >>> mbox cmd response data (8 bytes)
3,763,379 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,842 UART: [rt]cmd =0x44504543, len=28
3,836,134 >>> mbox cmd response data (2076 bytes)
3,836,135 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,484 UART: [rt]cmd =0x44504543, len=28
3,907,008 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,655 ready_for_fw is high
1,362,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,306 >>> mbox cmd response: success
2,984,476 UART:
2,984,492 UART: Running Caliptra FMC ...
2,984,900 UART:
2,984,954 UART: [state] CFI Enabled
2,995,475 UART: [fht] FMC Alias Private Key: 7
3,104,170 UART: [art] Extend RT PCRs Done
3,104,598 UART: [art] Lock RT PCRs Done
3,106,356 UART: [art] Populate DV Done
3,114,763 UART: [fht] FMC Alias Private Key: 7
3,115,771 UART: [art] Derive CDI
3,116,051 UART: [art] Store in in slot 0x4
3,201,630 UART: [art] Derive Key Pair
3,201,990 UART: [art] Store priv key in slot 0x5
3,215,236 UART: [art] Derive Key Pair - Done
3,230,190 UART: [art] Signing Cert with AUTHO
3,230,670 UART: RITY.KEYID = 7
3,245,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,555 UART: [art] PUB.X = 96D13A5C032B7870E88B1866CB4BB34FBA0309259A46BABD541EDAD6F0DA02E8F96FD8649D1CFF91AD472275845809EC
3,253,322 UART: [art] PUB.Y = D556B048622335C2B807742E3521D1B6A97BBA8231B4473A2B5D2C96FAFA1E75B79FB4E38D001772CB48851E7D8F9DB9
3,260,251 UART: [art] SIG.R = E84535C93CE89AE972949C126C7AAE7CDD2F96C1AFC4C7748263509BEF709D8F615A00A670CAABE40E09BBAD963D194B
3,267,009 UART: [art] SIG.S = DFA68BCDC441D403A673F52F9A41941B2BCEB6C0299493070B39A5F62DF1A42F8702C5B08B73A6E9751C35281F26AFEC
3,291,306 UART: Caliptra RT
3,291,559 UART: [state] CFI Enabled
3,400,245 UART: [rt] RT listening for mailbox commands...
3,400,915 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,887 UART: [rt]cmd =0x44504543, len=28
3,474,147 >>> mbox cmd response data (2076 bytes)
3,474,148 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,683 UART: [rt]cmd =0x44504543, len=28
3,544,809 >>> mbox cmd response data (2076 bytes)
3,544,810 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,486 UART: [rt]cmd =0x49444550, len=353
3,589,689 >>> mbox cmd response data (8 bytes)
3,589,690 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,287 UART: [rt]cmd =0x44504543, len=28
3,662,505 >>> mbox cmd response data (2076 bytes)
3,662,506 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,917 UART: [rt]cmd =0x44504543, len=28
3,733,336 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,344 UART: [kat] SHA2-256
882,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,390 UART: [kat] ++
886,542 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
902,927 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,636 UART: [fht] Storing FHT @ 0x50003400
1,479,205 UART: [idev] ++
1,479,373 UART: [idev] CDI.KEYID = 6
1,479,733 UART: [idev] SUBJECT.KEYID = 7
1,480,157 UART: [idev] UDS.KEYID = 0
1,480,502 ready_for_fw is high
1,480,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,193 UART: [idev] Erasing UDS.KEYID = 0
1,505,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,755 UART: [idev] --
1,514,992 UART: [ldev] ++
1,515,160 UART: [ldev] CDI.KEYID = 6
1,515,523 UART: [ldev] SUBJECT.KEYID = 5
1,515,949 UART: [ldev] AUTHORITY.KEYID = 7
1,516,412 UART: [ldev] FE.KEYID = 1
1,521,944 UART: [ldev] Erasing FE.KEYID = 1
1,547,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,859 UART: [ldev] --
1,587,162 UART: [fwproc] Waiting for Commands...
1,587,849 UART: [fwproc] Received command 0x46574c44
1,588,640 UART: [fwproc] Received Image of size 114084 bytes
2,883,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,011 >>> mbox cmd response: success
3,077,031 UART: [afmc] ++
3,077,199 UART: [afmc] CDI.KEYID = 6
3,077,561 UART: [afmc] SUBJECT.KEYID = 7
3,077,986 UART: [afmc] AUTHORITY.KEYID = 5
3,112,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,758 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,448 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,425 UART: [afmc] --
3,156,435 UART: [cold-reset] --
3,157,499 UART: [state] Locking Datavault
3,158,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,360 UART: [state] Locking ICCM
3,160,020 UART: [exit] Launching FMC @ 0x40000130
3,165,349 UART:
3,165,365 UART: Running Caliptra FMC ...
3,165,773 UART:
3,165,916 UART: [state] CFI Enabled
3,176,465 UART: [fht] FMC Alias Private Key: 7
3,284,842 UART: [art] Extend RT PCRs Done
3,285,270 UART: [art] Lock RT PCRs Done
3,286,906 UART: [art] Populate DV Done
3,295,451 UART: [fht] FMC Alias Private Key: 7
3,296,621 UART: [art] Derive CDI
3,296,901 UART: [art] Store in in slot 0x4
3,382,258 UART: [art] Derive Key Pair
3,382,618 UART: [art] Store priv key in slot 0x5
3,396,546 UART: [art] Derive Key Pair - Done
3,411,455 UART: [art] Signing Cert with AUTHO
3,411,935 UART: RITY.KEYID = 7
3,427,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,078 UART: [art] PUB.X = 44BF8EE6EC41CE787B7EBCCCDADDC8E1907A415AE68641C8DB631ED59A5C90D5F937209C1CA9FCE2B177A9A7D2FE3E6F
3,434,878 UART: [art] PUB.Y = 6807D7237E34C1E4A2613FE39B2DA9B89721C3505764CF0D39AB27886C5F1DBB8DF2127C7E205D7A0B146273DB0D9EF9
3,441,822 UART: [art] SIG.R = F9B0C0472420DFB1867A7861E09CB31839269D1070F836E58E53E04284884ADEC28927592ED5C53B34915D796F3968D3
3,448,582 UART: [art] SIG.S = 1F3149165514E59D660949C8A8930917400B647780421C972225F034C78DA41E30DD629E45DED35034BB5E8605B4A77E
3,472,737 UART: Caliptra RT
3,473,082 UART: [state] CFI Enabled
3,581,347 UART: [rt] RT listening for mailbox commands...
3,582,017 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,419 UART: [rt]cmd =0x44504543, len=28
3,655,663 >>> mbox cmd response data (2076 bytes)
3,655,664 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,019 UART: [rt]cmd =0x44504543, len=28
3,726,270 >>> mbox cmd response data (2076 bytes)
3,726,271 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,840 UART: [rt]cmd =0x49444550, len=352
3,768,796 >>> mbox cmd response data (8 bytes)
3,768,797 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,798,342 UART: [rt]cmd =0x44504543, len=28
3,841,576 >>> mbox cmd response data (2076 bytes)
3,841,577 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,980 UART: [rt]cmd =0x44504543, len=28
3,912,761 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,554 ready_for_fw is high
1,363,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,905 >>> mbox cmd response: success
2,988,569 UART:
2,988,585 UART: Running Caliptra FMC ...
2,988,993 UART:
2,989,136 UART: [state] CFI Enabled
2,999,637 UART: [fht] FMC Alias Private Key: 7
3,107,686 UART: [art] Extend RT PCRs Done
3,108,114 UART: [art] Lock RT PCRs Done
3,109,960 UART: [art] Populate DV Done
3,118,171 UART: [fht] FMC Alias Private Key: 7
3,119,265 UART: [art] Derive CDI
3,119,545 UART: [art] Store in in slot 0x4
3,204,804 UART: [art] Derive Key Pair
3,205,164 UART: [art] Store priv key in slot 0x5
3,218,428 UART: [art] Derive Key Pair - Done
3,232,997 UART: [art] Signing Cert with AUTHO
3,233,477 UART: RITY.KEYID = 7
3,248,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,348 UART: [art] PUB.X = C1D19876A3BB99880D79B70743615AE986F4F9E8822398E9DDA6E4F3E17D347A41C02FAC1034CFAEBC1959D1739FCEF4
3,256,122 UART: [art] PUB.Y = 3AF327D3B4CD5FB3C682078D4F520256E496F88911E1023258CE09B879C9382C5EE58899431E42D47A14029E05B71202
3,263,041 UART: [art] SIG.R = 6119577A7F2D1AD70761156716B8D5FC2E57ED14D608E1B4B82120862AE91C985E83AFF835FFF899FDFDF432E19ED410
3,269,811 UART: [art] SIG.S = 643F11EBCD5B8668713F8DE21F2A0F90D0DA1ED7E1CEB8912C5EC19F7C7BF55BE5983EEC13B2DFA9C8319B98AABFE57C
3,293,695 UART: Caliptra RT
3,294,040 UART: [state] CFI Enabled
3,401,874 UART: [rt] RT listening for mailbox commands...
3,402,544 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,660 UART: [rt]cmd =0x44504543, len=28
3,475,628 >>> mbox cmd response data (2076 bytes)
3,475,629 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,022 UART: [rt]cmd =0x44504543, len=28
3,545,832 >>> mbox cmd response data (2076 bytes)
3,545,833 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,445 UART: [rt]cmd =0x49444550, len=353
3,590,608 >>> mbox cmd response data (8 bytes)
3,590,609 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,306 UART: [rt]cmd =0x44504543, len=28
3,663,486 >>> mbox cmd response data (2076 bytes)
3,663,487 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,078 UART: [rt]cmd =0x44504543, len=28
3,734,535 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,551 UART: [kat] SHA2-256
903,491 UART: [kat] SHA2-384
906,120 UART: [kat] SHA2-512-ACC
908,021 UART: [kat] ECC-384
917,672 UART: [kat] HMAC-384Kdf
922,300 UART: [kat] LMS
1,170,628 UART: [kat] --
1,171,661 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 ready_for_fw is high
1,176,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,758 UART: [idev] Erasing UDS.KEYID = 0
1,200,623 UART: [idev] Sha1 KeyId Algorithm
1,209,089 UART: [idev] --
1,210,127 UART: [ldev] ++
1,210,295 UART: [ldev] CDI.KEYID = 6
1,210,658 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,338 UART: [fwproc] Wait for Commands...
1,282,910 UART: [fwproc] Recv command 0x46574c44
1,283,638 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,897 >>> mbox cmd response: success
2,772,921 UART: [afmc] ++
2,773,089 UART: [afmc] CDI.KEYID = 6
2,773,451 UART: [afmc] SUBJECT.KEYID = 7
2,773,876 UART: [afmc] AUTHORITY.KEYID = 5
2,809,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,846 UART: [afmc] --
2,852,746 UART: [cold-reset] --
2,853,740 UART: [state] Locking Datavault
2,854,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,293 UART: [state] Locking ICCM
2,855,839 UART: [exit] Launching FMC @ 0x40000130
2,861,168 UART:
2,861,184 UART: Running Caliptra FMC ...
2,861,592 UART:
2,861,646 UART: [state] CFI Enabled
2,871,911 UART: [fht] FMC Alias Private Key: 7
2,980,250 UART: [art] Extend RT PCRs Done
2,980,678 UART: [art] Lock RT PCRs Done
2,982,296 UART: [art] Populate DV Done
2,990,505 UART: [fht] FMC Alias Private Key: 7
2,991,599 UART: [art] Derive CDI
2,991,879 UART: [art] Store in in slot 0x4
3,077,324 UART: [art] Derive Key Pair
3,077,684 UART: [art] Store priv key in slot 0x5
3,090,252 UART: [art] Derive Key Pair - Done
3,104,970 UART: [art] Signing Cert with AUTHO
3,105,450 UART: RITY.KEYID = 7
3,120,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,357 UART: [art] PUB.X = AB6B7CB686BBC5703A4F139B8250E8E26F4D3B20BB76F25FD75A6D7EFA425294DBBF31555B294CBA0FBC2BC7B2AA8024
3,128,146 UART: [art] PUB.Y = 18886F33F0674CF62B6D7E56282A6E59A31EE7CFB56A93822E89DA089B7F3BAA03F42619C2F2F464C7CC31867D3C4B04
3,135,093 UART: [art] SIG.R = 755116001B6E578E7352185B2DC444765F2F95A5BF048B542B0C60FD53F1DF520D6D3377FF34B727A594C475C92D50F6
3,141,828 UART: [art] SIG.S = 3216012735BF7A2FC664A0684C3A080360D6EEA23B5AF5410232966BCA09862CAF6C44807726AE81BD763FF8D0ED42F2
3,165,502 UART: Caliptra RT
3,165,755 UART: [state] CFI Enabled
3,273,666 UART: [rt] RT listening for mailbox commands...
3,274,336 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,434 UART: [rt]cmd =0x44504543, len=28
3,347,354 >>> mbox cmd response data (2076 bytes)
3,347,355 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,894 UART: [rt]cmd =0x44504543, len=28
3,417,702 >>> mbox cmd response data (2076 bytes)
3,417,703 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,532 UART: [rt]cmd =0x49444550, len=354
3,462,643 >>> mbox cmd response data (8 bytes)
3,462,644 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,059 UART: [rt]cmd =0x44504543, len=28
3,535,177 >>> mbox cmd response data (2076 bytes)
3,535,178 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,807 UART: [rt]cmd =0x44504543, len=28
3,606,296 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,245 ready_for_fw is high
1,060,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,336 >>> mbox cmd response: success
2,687,184 UART:
2,687,200 UART: Running Caliptra FMC ...
2,687,608 UART:
2,687,662 UART: [state] CFI Enabled
2,698,379 UART: [fht] FMC Alias Private Key: 7
2,806,228 UART: [art] Extend RT PCRs Done
2,806,656 UART: [art] Lock RT PCRs Done
2,808,062 UART: [art] Populate DV Done
2,816,223 UART: [fht] FMC Alias Private Key: 7
2,817,153 UART: [art] Derive CDI
2,817,433 UART: [art] Store in in slot 0x4
2,902,940 UART: [art] Derive Key Pair
2,903,300 UART: [art] Store priv key in slot 0x5
2,916,392 UART: [art] Derive Key Pair - Done
2,931,171 UART: [art] Signing Cert with AUTHO
2,931,651 UART: RITY.KEYID = 7
2,947,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,994 UART: [art] PUB.X = E40AF1D85A141B9BE30647028402609338B026043738A6B8A71B5E7529D26405FDC78DB4D3E22B042DC79FCA4B542AEF
2,954,745 UART: [art] PUB.Y = 29452C49D06BB21315D28D22E9F340A05ED5E755731FDB7C9A2955435887D7DBA676816FCD1DABD9A45C8B0C1C8584C9
2,961,698 UART: [art] SIG.R = 47101AD5DE3662AEB72C814BB539CE96C489CDE47032DC1AB2F88C28F01C05A74FA375C2EB91BD95F2A830E03FDF4C7F
2,968,483 UART: [art] SIG.S = 0ECFB4760441BBC64628F3B7415447D4ABFF2BCB6CE84CC47F2E6B461CA1203AE093C4FCEAD1057C77C8B0798F45F59F
2,992,389 UART: Caliptra RT
2,992,642 UART: [state] CFI Enabled
3,100,145 UART: [rt] RT listening for mailbox commands...
3,100,815 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,815 UART: [rt]cmd =0x44504543, len=28
3,173,971 >>> mbox cmd response data (2076 bytes)
3,173,972 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,203,497 UART: [rt]cmd =0x44504543, len=28
3,244,543 >>> mbox cmd response data (2076 bytes)
3,244,544 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,213 UART: [rt]cmd =0x49444550, len=354
3,289,452 >>> mbox cmd response data (8 bytes)
3,289,453 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,808 UART: [rt]cmd =0x44504543, len=28
3,361,992 >>> mbox cmd response data (2076 bytes)
3,361,993 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,391,460 UART: [rt]cmd =0x44504543, len=28
3,432,953 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,491 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,748 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,176,780 ready_for_fw is high
1,176,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,137 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,290 UART: [idev] --
1,211,468 UART: [ldev] ++
1,211,636 UART: [ldev] CDI.KEYID = 6
1,211,999 UART: [ldev] SUBJECT.KEYID = 5
1,212,425 UART: [ldev] AUTHORITY.KEYID = 7
1,212,888 UART: [ldev] FE.KEYID = 1
1,218,316 UART: [ldev] Erasing FE.KEYID = 1
1,246,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,082 UART: [ldev] --
1,285,371 UART: [fwproc] Wait for Commands...
1,286,155 UART: [fwproc] Recv command 0x46574c44
1,286,883 UART: [fwproc] Recv'd Img size: 114084 bytes
2,582,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,828 >>> mbox cmd response: success
2,775,074 UART: [afmc] ++
2,775,242 UART: [afmc] CDI.KEYID = 6
2,775,604 UART: [afmc] SUBJECT.KEYID = 7
2,776,029 UART: [afmc] AUTHORITY.KEYID = 5
2,811,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,956 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,611 UART: [afmc] --
2,854,493 UART: [cold-reset] --
2,855,465 UART: [state] Locking Datavault
2,856,762 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,366 UART: [state] Locking ICCM
2,857,912 UART: [exit] Launching FMC @ 0x40000130
2,863,241 UART:
2,863,257 UART: Running Caliptra FMC ...
2,863,665 UART:
2,863,808 UART: [state] CFI Enabled
2,874,339 UART: [fht] FMC Alias Private Key: 7
2,983,462 UART: [art] Extend RT PCRs Done
2,983,890 UART: [art] Lock RT PCRs Done
2,985,692 UART: [art] Populate DV Done
2,994,117 UART: [fht] FMC Alias Private Key: 7
2,995,165 UART: [art] Derive CDI
2,995,445 UART: [art] Store in in slot 0x4
3,080,834 UART: [art] Derive Key Pair
3,081,194 UART: [art] Store priv key in slot 0x5
3,093,980 UART: [art] Derive Key Pair - Done
3,108,921 UART: [art] Signing Cert with AUTHO
3,109,401 UART: RITY.KEYID = 7
3,124,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,500 UART: [art] PUB.X = BB6F3801CECBCA6F98F1E8276733711AA05610F744E238D1737FF995ED71CBEEBAF669F64F758DA76EE7155F03D74A13
3,132,276 UART: [art] PUB.Y = 458BF543E3B1CFD6103B0B940FE93374A2D135AC94C15B526574FD3EC33B0A1FD5F750EF7E5D7AC9A3B956BBA20810B4
3,139,228 UART: [art] SIG.R = 759E3134A6D0A396BF7A2F9B2E4CF0228E5CE05B91D5D097D8689F305B1E8B8FE20D7B7CEE7A34BB6D531ECEFED31AE9
3,146,017 UART: [art] SIG.S = 0D51C788E71097303F52CCA54C7710D75600BC1D0751F39C2F1C864AE23EDA798FAC4AF781CD8F45824E70E041A65966
3,169,808 UART: Caliptra RT
3,170,153 UART: [state] CFI Enabled
3,277,540 UART: [rt] RT listening for mailbox commands...
3,278,210 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,962 UART: [rt]cmd =0x44504543, len=28
3,351,194 >>> mbox cmd response data (2076 bytes)
3,351,195 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,648 UART: [rt]cmd =0x44504543, len=28
3,421,474 >>> mbox cmd response data (2076 bytes)
3,421,475 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,208 UART: [rt]cmd =0x49444550, len=352
3,464,083 >>> mbox cmd response data (8 bytes)
3,464,084 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,493,611 UART: [rt]cmd =0x44504543, len=28
3,536,563 >>> mbox cmd response data (2076 bytes)
3,536,564 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,059 UART: [rt]cmd =0x44504543, len=28
3,607,719 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,290 ready_for_fw is high
1,061,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,727 >>> mbox cmd response: success
2,686,383 UART:
2,686,399 UART: Running Caliptra FMC ...
2,686,807 UART:
2,686,950 UART: [state] CFI Enabled
2,697,247 UART: [fht] FMC Alias Private Key: 7
2,804,624 UART: [art] Extend RT PCRs Done
2,805,052 UART: [art] Lock RT PCRs Done
2,806,852 UART: [art] Populate DV Done
2,814,899 UART: [fht] FMC Alias Private Key: 7
2,816,039 UART: [art] Derive CDI
2,816,319 UART: [art] Store in in slot 0x4
2,901,830 UART: [art] Derive Key Pair
2,902,190 UART: [art] Store priv key in slot 0x5
2,915,168 UART: [art] Derive Key Pair - Done
2,929,989 UART: [art] Signing Cert with AUTHO
2,930,469 UART: RITY.KEYID = 7
2,945,421 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,186 UART: [art] PUB.X = 1A6617EA258C2A4F0D4D6222DB9CE46E04B919C0BA0D54C95B05AC4D52E4E052384F46A9DC919A7FEF119C4B57DAA59C
2,952,960 UART: [art] PUB.Y = EA6656259C29377BB02A8C83EFB70B15B7EA9BAF7EA13160F99A1B9DA2A3B2745329C82058243D3E3C4DF277806983A3
2,959,911 UART: [art] SIG.R = 890A3EA0D725B648B9E41286F03E25C46C60A6CCA2AB66FAF29100101045C6A9B96EED4A34A8695059235508371E35EB
2,966,653 UART: [art] SIG.S = 36E542EDE887449FF8FA7F00E6AEE19A5324F037A3240F1AFEB88C4E3DE8F532B73EB26B9FB837D8F2C0E455487DC385
2,990,037 UART: Caliptra RT
2,990,382 UART: [state] CFI Enabled
3,097,847 UART: [rt] RT listening for mailbox commands...
3,098,517 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,703 UART: [rt]cmd =0x44504543, len=28
3,171,619 >>> mbox cmd response data (2076 bytes)
3,171,620 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,201,167 UART: [rt]cmd =0x44504543, len=28
3,242,169 >>> mbox cmd response data (2076 bytes)
3,242,170 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,858 UART: [rt]cmd =0x49444550, len=353
3,287,077 >>> mbox cmd response data (8 bytes)
3,287,078 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,605 UART: [rt]cmd =0x44504543, len=28
3,359,651 >>> mbox cmd response data (2076 bytes)
3,359,652 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,285 UART: [rt]cmd =0x44504543, len=28
3,430,654 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,361 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,174,321 ready_for_fw is high
1,174,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,341 UART: [idev] --
1,208,428 UART: [ldev] ++
1,208,596 UART: [ldev] CDI.KEYID = 6
1,208,960 UART: [ldev] SUBJECT.KEYID = 5
1,209,387 UART: [ldev] AUTHORITY.KEYID = 7
1,209,850 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,136 UART: [ldev] --
1,280,434 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,895 >>> mbox cmd response: success
2,770,116 UART: [afmc] ++
2,770,284 UART: [afmc] CDI.KEYID = 6
2,770,647 UART: [afmc] SUBJECT.KEYID = 7
2,771,073 UART: [afmc] AUTHORITY.KEYID = 5
2,807,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,301 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,913 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,632 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,393 UART: [afmc] --
2,850,483 UART: [cold-reset] --
2,851,147 UART: [state] Locking Datavault
2,852,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,926 UART: [state] Locking ICCM
2,853,554 UART: [exit] Launching FMC @ 0x40000130
2,858,883 UART:
2,858,899 UART: Running Caliptra FMC ...
2,859,307 UART:
2,859,361 UART: [state] CFI Enabled
2,869,680 UART: [fht] FMC Alias Private Key: 7
2,977,239 UART: [art] Extend RT PCRs Done
2,977,667 UART: [art] Lock RT PCRs Done
2,979,283 UART: [art] Populate DV Done
2,987,314 UART: [fht] FMC Alias Private Key: 7
2,988,424 UART: [art] Derive CDI
2,988,704 UART: [art] Store in in slot 0x4
3,074,433 UART: [art] Derive Key Pair
3,074,793 UART: [art] Store priv key in slot 0x5
3,088,431 UART: [art] Derive Key Pair - Done
3,103,273 UART: [art] Signing Cert with AUTHO
3,103,753 UART: RITY.KEYID = 7
3,118,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,376 UART: [art] PUB.X = 2794BD99B0E92C5D28EAE4FF356EEFFA5CE80EFB45FE2EE67FA053AFA898E7AEC61AE265468A335DB928F1C3273C5757
3,126,165 UART: [art] PUB.Y = 4FA88CE58B83B56EEEF1928715B250AC40A68E33D9CDB395BD6B988062FD6F5E63376812A0C22FB9D588C5051351D230
3,133,116 UART: [art] SIG.R = FFFEEC8ABF1E9FD63D4CAE41606F11A2E4C0AD11E0B494BBF6F5A872EE21596B96D11040B2F89753ECD6AED7B110C376
3,139,910 UART: [art] SIG.S = 2D1139560303BC741E36FCD40EE9A90429E2673E8A8217BD86084D59036FFB4D535678DD9ED354CF11A1D9F114A14BF4
3,163,177 UART: Caliptra RT
3,163,430 UART: [state] CFI Enabled
3,271,455 UART: [rt] RT listening for mailbox commands...
3,272,125 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,193 UART: [rt]cmd =0x44504543, len=28
3,345,565 >>> mbox cmd response data (2076 bytes)
3,345,566 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,325 UART: [rt]cmd =0x44504543, len=28
3,416,179 >>> mbox cmd response data (2076 bytes)
3,416,180 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,715 UART: [rt]cmd =0x49444550, len=352
3,458,486 >>> mbox cmd response data (8 bytes)
3,458,487 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,040 UART: [rt]cmd =0x44504543, len=28
3,531,560 >>> mbox cmd response data (2076 bytes)
3,531,561 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,090 UART: [rt]cmd =0x44504543, len=28
3,602,732 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,252 ready_for_fw is high
1,056,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,621 >>> mbox cmd response: success
2,680,553 UART:
2,680,569 UART: Running Caliptra FMC ...
2,680,977 UART:
2,681,031 UART: [state] CFI Enabled
2,691,372 UART: [fht] FMC Alias Private Key: 7
2,799,969 UART: [art] Extend RT PCRs Done
2,800,397 UART: [art] Lock RT PCRs Done
2,801,971 UART: [art] Populate DV Done
2,810,244 UART: [fht] FMC Alias Private Key: 7
2,811,318 UART: [art] Derive CDI
2,811,598 UART: [art] Store in in slot 0x4
2,897,165 UART: [art] Derive Key Pair
2,897,525 UART: [art] Store priv key in slot 0x5
2,910,753 UART: [art] Derive Key Pair - Done
2,925,419 UART: [art] Signing Cert with AUTHO
2,925,899 UART: RITY.KEYID = 7
2,940,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,682 UART: [art] PUB.X = 137325F4E34B991E8FFF6854F701C231D3B2F9F2FAFADDA8B034E6EE021A45724FC2095C50F1B09B2917A23341E7EC27
2,948,451 UART: [art] PUB.Y = F6BFA0A86128A715BC18C4C813EB7E25D5AF4032F4A33A10F53AE91291D84A5E41B9AA7E10DBBD96F4AD556323D1AAFD
2,955,421 UART: [art] SIG.R = 26DAFF1524512D909A17FCAAAD30FD923214E24420EB323BEBF543C34139BA3E89FD1EC79ABE75666BC0B75CD9D96D41
2,962,207 UART: [art] SIG.S = 82E78E1378C1CCC687675F0B31FAB99AF20C5F3597132E0CA96857A3F644925A5F2F4CC7166988174A31108377AE0364
2,985,962 UART: Caliptra RT
2,986,215 UART: [state] CFI Enabled
3,093,574 UART: [rt] RT listening for mailbox commands...
3,094,244 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,364 UART: [rt]cmd =0x44504543, len=28
3,167,788 >>> mbox cmd response data (2076 bytes)
3,167,789 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,306 UART: [rt]cmd =0x44504543, len=28
3,238,398 >>> mbox cmd response data (2076 bytes)
3,238,399 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,270,223 UART: [rt]cmd =0x49444550, len=353
3,283,508 >>> mbox cmd response data (8 bytes)
3,283,509 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,952 UART: [rt]cmd =0x44504543, len=28
3,355,980 >>> mbox cmd response data (2076 bytes)
3,355,981 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,362 UART: [rt]cmd =0x44504543, len=28
3,427,031 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,831 UART: [kat] HMAC-384Kdf
921,597 UART: [kat] LMS
1,169,909 UART: [kat] --
1,170,766 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,942 UART: [idev] ++
1,174,110 UART: [idev] CDI.KEYID = 6
1,174,471 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,175,242 ready_for_fw is high
1,175,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,737 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,573 UART: [ldev] --
1,281,989 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,848 >>> mbox cmd response: success
2,770,999 UART: [afmc] ++
2,771,167 UART: [afmc] CDI.KEYID = 6
2,771,530 UART: [afmc] SUBJECT.KEYID = 7
2,771,956 UART: [afmc] AUTHORITY.KEYID = 5
2,808,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,584 UART: [afmc] --
2,851,612 UART: [cold-reset] --
2,852,484 UART: [state] Locking Datavault
2,853,653 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,257 UART: [state] Locking ICCM
2,854,745 UART: [exit] Launching FMC @ 0x40000130
2,860,074 UART:
2,860,090 UART: Running Caliptra FMC ...
2,860,498 UART:
2,860,641 UART: [state] CFI Enabled
2,871,030 UART: [fht] FMC Alias Private Key: 7
2,979,015 UART: [art] Extend RT PCRs Done
2,979,443 UART: [art] Lock RT PCRs Done
2,981,073 UART: [art] Populate DV Done
2,989,386 UART: [fht] FMC Alias Private Key: 7
2,990,370 UART: [art] Derive CDI
2,990,650 UART: [art] Store in in slot 0x4
3,076,599 UART: [art] Derive Key Pair
3,076,959 UART: [art] Store priv key in slot 0x5
3,089,871 UART: [art] Derive Key Pair - Done
3,104,562 UART: [art] Signing Cert with AUTHO
3,105,042 UART: RITY.KEYID = 7
3,120,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,089 UART: [art] PUB.X = 9203E23600F3A43B949228A23FEB88D1D2D806366915AB264C1886DCA97B466507B0A95E83FA47B9D0C5A7A6DB4C82E6
3,127,830 UART: [art] PUB.Y = B827BC96FE624148A5A73C46D987C913F312738E81AD9A95710381B4711661B669F58E8850F619E6D8ADA29E460A4A8E
3,134,770 UART: [art] SIG.R = 95B58A636B35329CEAB27535B422A55AEE3F09A4B5157EAC48838AB55951BC296077C733884FA54AE28C7FB38A21D96A
3,141,541 UART: [art] SIG.S = 2F205D54FA02CA1CAD2A9128837D7CC10F7A896DC70C70493A8A9D1906297155F3A39AB17DCD37E5AE6B66A39CB90704
3,165,056 UART: Caliptra RT
3,165,401 UART: [state] CFI Enabled
3,273,042 UART: [rt] RT listening for mailbox commands...
3,273,712 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,460 UART: [rt]cmd =0x44504543, len=28
3,346,964 >>> mbox cmd response data (2076 bytes)
3,346,965 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,402 UART: [rt]cmd =0x44504543, len=28
3,417,424 >>> mbox cmd response data (2076 bytes)
3,417,425 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,110 UART: [rt]cmd =0x49444550, len=354
3,462,412 >>> mbox cmd response data (8 bytes)
3,462,413 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,884 UART: [rt]cmd =0x44504543, len=28
3,534,970 >>> mbox cmd response data (2076 bytes)
3,534,971 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,614 UART: [rt]cmd =0x44504543, len=28
3,605,864 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,831 ready_for_fw is high
1,054,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,052 >>> mbox cmd response: success
2,683,520 UART:
2,683,536 UART: Running Caliptra FMC ...
2,683,944 UART:
2,684,087 UART: [state] CFI Enabled
2,695,068 UART: [fht] FMC Alias Private Key: 7
2,803,069 UART: [art] Extend RT PCRs Done
2,803,497 UART: [art] Lock RT PCRs Done
2,804,869 UART: [art] Populate DV Done
2,813,104 UART: [fht] FMC Alias Private Key: 7
2,814,228 UART: [art] Derive CDI
2,814,508 UART: [art] Store in in slot 0x4
2,899,893 UART: [art] Derive Key Pair
2,900,253 UART: [art] Store priv key in slot 0x5
2,913,547 UART: [art] Derive Key Pair - Done
2,928,211 UART: [art] Signing Cert with AUTHO
2,928,691 UART: RITY.KEYID = 7
2,943,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,566 UART: [art] PUB.X = 5C5856D09A92D1EA4CC4F2EFAEBB7C0DAD47A79BC246598B553CA8B4D59B60E887CEBB8A9DE6D9A1F59B7518DCAA743F
2,951,361 UART: [art] PUB.Y = D253534EDF0C9282D2E9FE904DC214DA029837B1F002D168B98D02C144CC7DB26ED9FA9A9A842BEC97EAA5F4B737AEF5
2,958,317 UART: [art] SIG.R = BF3424F81B88DED1DBE78BCA0585B1D293BF8E38398F2914405D7EFB30C4A1A229A65D998C4BE97C5B66A094267D76ED
2,965,096 UART: [art] SIG.S = 0CD9F865EA8CE97FAF7F5965716AFC1917C5D099EB707E71A33E94FBDD6C523E065E593B27A0BCAC7508BE7FAC89B763
2,989,114 UART: Caliptra RT
2,989,459 UART: [state] CFI Enabled
3,097,400 UART: [rt] RT listening for mailbox commands...
3,098,070 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,140 UART: [rt]cmd =0x44504543, len=28
3,171,430 >>> mbox cmd response data (2076 bytes)
3,171,431 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,200,998 UART: [rt]cmd =0x44504543, len=28
3,242,396 >>> mbox cmd response data (2076 bytes)
3,242,397 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,095 UART: [rt]cmd =0x49444550, len=353
3,287,178 >>> mbox cmd response data (8 bytes)
3,287,179 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,620 UART: [rt]cmd =0x44504543, len=28
3,359,952 >>> mbox cmd response data (2076 bytes)
3,359,953 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,674 UART: [rt]cmd =0x44504543, len=28
3,431,281 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,015 UART:
192,394 UART: Running Caliptra ROM ...
193,576 UART:
193,737 UART: [state] CFI Enabled
262,252 UART: [state] LifecycleState = Unprovisioned
264,160 UART: [state] DebugLocked = No
267,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,555 UART: [kat] SHA2-256
441,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,742 UART: [kat] ++
452,267 UART: [kat] sha1
463,562 UART: [kat] SHA2-256
466,290 UART: [kat] SHA2-384
470,932 UART: [kat] SHA2-512-ACC
473,321 UART: [kat] ECC-384
2,770,785 UART: [kat] HMAC-384Kdf
2,803,621 UART: [kat] LMS
3,993,932 UART: [kat] --
3,997,283 UART: [cold-reset] ++
3,999,357 UART: [fht] Storing FHT @ 0x50003400
4,011,400 UART: [idev] ++
4,011,975 UART: [idev] CDI.KEYID = 6
4,012,932 UART: [idev] SUBJECT.KEYID = 7
4,014,175 UART: [idev] UDS.KEYID = 0
4,015,137 ready_for_fw is high
4,015,324 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,158,411 UART: [idev] Erasing UDS.KEYID = 0
7,348,011 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,237 UART: [idev] --
7,373,939 UART: [ldev] ++
7,374,530 UART: [ldev] CDI.KEYID = 6
7,375,462 UART: [ldev] SUBJECT.KEYID = 5
7,376,677 UART: [ldev] AUTHORITY.KEYID = 7
7,377,910 UART: [ldev] FE.KEYID = 1
7,425,241 UART: [ldev] Erasing FE.KEYID = 1
10,760,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,749 UART: [ldev] --
13,139,851 UART: [fwproc] Waiting for Commands...
13,142,961 UART: [fwproc] Received command 0x46574c44
13,145,141 UART: [fwproc] Received Image of size 113760 bytes
17,193,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,660,385 >>> mbox cmd response: success
17,664,311 UART: [afmc] ++
17,664,909 UART: [afmc] CDI.KEYID = 6
17,665,823 UART: [afmc] SUBJECT.KEYID = 7
17,667,039 UART: [afmc] AUTHORITY.KEYID = 5
21,032,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,378 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,688 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,056 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,897 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,341 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,636 UART: [afmc] --
23,402,607 UART: [cold-reset] --
23,408,009 UART: [state] Locking Datavault
23,413,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,635 UART: [state] Locking ICCM
23,417,188 UART: [exit] Launching FMC @ 0x40000130
23,425,535 UART:
23,425,775 UART: Running Caliptra FMC ...
23,426,879 UART:
23,427,047 UART: [state] CFI Enabled
23,492,806 UART: [fht] FMC Alias Private Key: 7
25,831,005 UART: [art] Extend RT PCRs Done
25,832,225 UART: [art] Lock RT PCRs Done
25,834,009 UART: [art] Populate DV Done
25,839,474 UART: [fht] FMC Alias Private Key: 7
25,841,116 UART: [art] Derive CDI
25,841,928 UART: [art] Store in in slot 0x4
25,901,449 UART: [art] Derive Key Pair
25,902,486 UART: [art] Store priv key in slot 0x5
29,194,767 UART: [art] Derive Key Pair - Done
29,208,046 UART: [art] Signing Cert with AUTHO
29,209,340 UART: RITY.KEYID = 7
31,496,904 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,408 UART: [art] PUB.X = F45AA27EF354C227B251199CE195E31B053FF1BC599B8F78626F45FED567093B2D7DF5FC82DC4E49D119621510825BDC
31,505,649 UART: [art] PUB.Y = 9C2BC0125AEBFC4F19D9F49A1760AC4432B6BD03CFCAA4765DB81B5349B7EFF3F673ED2A7C0A42E91FF779E0597E9A6F
31,512,930 UART: [art] SIG.R = B38FA98E04E9F9C385E495757E4F06ECCA0E452C57BAF14BDCB02F120EF0FFEFB66E66841FBBAA0D73CC8B881106CD09
31,520,385 UART: [art] SIG.S = EF0DEDAEDADB63EFE3BC8316CD4A939CF517D4F6691F5EB7F48E6BF059D5D20C857148747D6202B14D094A16E5DC2173
32,825,532 UART: Caliptra RT
32,826,247 UART: [state] CFI Enabled
32,987,693 UART: [rt] RT listening for mailbox commands...
32,990,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,021,486 UART: [rt]cmd =0x44504543, len=96
38,806,131 >>> mbox cmd response data (6236 bytes)
38,835,290 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,865,283 UART: [rt]cmd =0x52564348, len=36
38,867,741 >>> mbox cmd response data (8 bytes)
38,868,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,898,872 UART: [rt]cmd =0x44504543, len=96
44,651,780 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,805,944 ready_for_fw is high
3,806,526 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,887,440 >>> mbox cmd response: success
23,591,142 UART:
23,591,535 UART: Running Caliptra FMC ...
23,592,675 UART:
23,592,839 UART: [state] CFI Enabled
23,657,752 UART: [fht] FMC Alias Private Key: 7
25,996,061 UART: [art] Extend RT PCRs Done
25,997,287 UART: [art] Lock RT PCRs Done
25,999,188 UART: [art] Populate DV Done
26,004,606 UART: [fht] FMC Alias Private Key: 7
26,006,155 UART: [art] Derive CDI
26,006,928 UART: [art] Store in in slot 0x4
26,066,108 UART: [art] Derive Key Pair
26,067,155 UART: [art] Store priv key in slot 0x5
29,359,497 UART: [art] Derive Key Pair - Done
29,372,782 UART: [art] Signing Cert with AUTHO
29,374,095 UART: RITY.KEYID = 7
31,661,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,166 UART: [art] PUB.X = A4E306AE5F8E3342C90FA31448FD82B859E14E253BD1B256CE2BE1249A6E0C0FA57A76D1F1B0DAD8FA5C8E96A0F30DBB
31,670,479 UART: [art] PUB.Y = 6DFA9619FC371530F61049CFEFBE03E0810F1C4FA81FA7CA833F554A0B6A218E49E43029F04CA972C5431E9DF6768286
31,677,688 UART: [art] SIG.R = 10914D482C0C0F2EC14923247FDA52A1DB9387F3E514CF945C9C923EDEF5197E91008728D8C3564D225941EA25331A04
31,685,039 UART: [art] SIG.S = D119F6A070536D150AD8F0A1517F10B0A24B476352F11F2122F9F6E2B964816B80460EE1D06AD90AEC3DC41E4C1E38E8
32,990,407 UART: Caliptra RT
32,991,133 UART: [state] CFI Enabled
33,153,149 UART: [rt] RT listening for mailbox commands...
33,155,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,186,667 UART: [rt]cmd =0x44504543, len=96
38,971,202 >>> mbox cmd response data (6236 bytes)
39,000,295 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,030,550 UART: [rt]cmd =0x52564348, len=36
39,032,920 >>> mbox cmd response data (8 bytes)
39,033,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,063,718 UART: [rt]cmd =0x44504543, len=96
44,816,086 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,698 writing to cptra_bootfsm_go
192,775 UART:
193,154 UART: Running Caliptra ROM ...
194,254 UART:
603,879 UART: [state] CFI Enabled
619,255 UART: [state] LifecycleState = Unprovisioned
621,219 UART: [state] DebugLocked = No
622,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,318 UART: [kat] SHA2-256
798,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,560 UART: [kat] ++
809,161 UART: [kat] sha1
819,259 UART: [kat] SHA2-256
821,983 UART: [kat] SHA2-384
828,485 UART: [kat] SHA2-512-ACC
830,850 UART: [kat] ECC-384
3,115,705 UART: [kat] HMAC-384Kdf
3,128,376 UART: [kat] LMS
4,318,470 UART: [kat] --
4,323,243 UART: [cold-reset] ++
4,325,806 UART: [fht] Storing FHT @ 0x50003400
4,338,269 UART: [idev] ++
4,338,926 UART: [idev] CDI.KEYID = 6
4,339,812 UART: [idev] SUBJECT.KEYID = 7
4,341,005 UART: [idev] UDS.KEYID = 0
4,342,034 ready_for_fw is high
4,342,257 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,202 UART: [idev] Erasing UDS.KEYID = 0
7,629,441 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,984 UART: [idev] --
7,656,790 UART: [ldev] ++
7,657,358 UART: [ldev] CDI.KEYID = 6
7,658,291 UART: [ldev] SUBJECT.KEYID = 5
7,659,501 UART: [ldev] AUTHORITY.KEYID = 7
7,660,780 UART: [ldev] FE.KEYID = 1
7,672,905 UART: [ldev] Erasing FE.KEYID = 1
10,961,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,421 UART: [ldev] --
13,323,171 UART: [fwproc] Waiting for Commands...
13,325,046 UART: [fwproc] Received command 0x46574c44
13,327,227 UART: [fwproc] Received Image of size 113760 bytes
17,378,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,488 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,841,837 >>> mbox cmd response: success
17,846,306 UART: [afmc] ++
17,846,909 UART: [afmc] CDI.KEYID = 6
17,847,820 UART: [afmc] SUBJECT.KEYID = 7
17,849,030 UART: [afmc] AUTHORITY.KEYID = 5
21,161,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,203 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,606 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,381 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,814 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,525,424 UART: [afmc] --
23,529,772 UART: [cold-reset] --
23,534,771 UART: [state] Locking Datavault
23,542,501 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,197 UART: [state] Locking ICCM
23,546,088 UART: [exit] Launching FMC @ 0x40000130
23,554,455 UART:
23,554,695 UART: Running Caliptra FMC ...
23,555,794 UART:
23,555,950 UART: [state] CFI Enabled
23,563,839 UART: [fht] FMC Alias Private Key: 7
25,894,847 UART: [art] Extend RT PCRs Done
25,896,074 UART: [art] Lock RT PCRs Done
25,897,725 UART: [art] Populate DV Done
25,903,239 UART: [fht] FMC Alias Private Key: 7
25,904,883 UART: [art] Derive CDI
25,905,689 UART: [art] Store in in slot 0x4
25,948,379 UART: [art] Derive Key Pair
25,949,414 UART: [art] Store priv key in slot 0x5
29,191,764 UART: [art] Derive Key Pair - Done
29,204,328 UART: [art] Signing Cert with AUTHO
29,205,631 UART: RITY.KEYID = 7
31,485,177 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,677 UART: [art] PUB.X = EFBB4D022A468F6D814040DF854666BE421AAE43DA4B275DDDA268AFFD8AEB25399FDDFA8CD9F16FBF2D7CC6C768BD92
31,493,939 UART: [art] PUB.Y = DF99547C1079D751FF403AA9634E5EC5B2BB3D9D3B8AD56493F5D0BF0F948CAD05D61ECAC31EDD93DAC28362FCC71E54
31,501,205 UART: [art] SIG.R = ABA3B8526A78ADA3CE81224CDE86A67FDFCB46791566FF610AF3054C7C9A3B970103A69ADD8D91D3A78C3C25B63A9B6F
31,508,623 UART: [art] SIG.S = 5EB503272533869A9D117B5A47D052FEFB58071F5CFAC038E946718CA3F654B9873BEED0ED66F62A5ACFC82D19D8A762
32,813,678 UART: Caliptra RT
32,814,390 UART: [state] CFI Enabled
32,931,630 UART: [rt] RT listening for mailbox commands...
32,934,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,964,526 UART: [rt]cmd =0x44504543, len=96
38,638,730 >>> mbox cmd response data (6236 bytes)
38,668,046 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,698,067 UART: [rt]cmd =0x52564348, len=36
38,700,679 >>> mbox cmd response data (8 bytes)
38,701,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,731,837 UART: [rt]cmd =0x44504543, len=96
44,404,136 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,552 writing to cptra_bootfsm_go
4,126,436 ready_for_fw is high
4,126,870 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,061,154 >>> mbox cmd response: success
23,698,374 UART:
23,698,749 UART: Running Caliptra FMC ...
23,699,881 UART:
23,700,036 UART: [state] CFI Enabled
23,707,820 UART: [fht] FMC Alias Private Key: 7
26,038,032 UART: [art] Extend RT PCRs Done
26,039,272 UART: [art] Lock RT PCRs Done
26,040,963 UART: [art] Populate DV Done
26,046,322 UART: [fht] FMC Alias Private Key: 7
26,047,982 UART: [art] Derive CDI
26,048,721 UART: [art] Store in in slot 0x4
26,091,315 UART: [art] Derive Key Pair
26,092,319 UART: [art] Store priv key in slot 0x5
29,334,378 UART: [art] Derive Key Pair - Done
29,347,381 UART: [art] Signing Cert with AUTHO
29,348,680 UART: RITY.KEYID = 7
31,628,220 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,723 UART: [art] PUB.X = A40DA033F5E00EF861201C804DA8DA0052687A2325FADEF353CAFB154AEE65BD6E4B4ED06C8A27FF96D22B2068CC99A4
31,636,949 UART: [art] PUB.Y = 2BA18E7F117DDDB9A5A82F1C4C3ADBA1EC8B6DB3DA7762E1DD4B6247804633E39BCEDDDF633B13962238EFE9B8348E0A
31,644,263 UART: [art] SIG.R = C116EB380E96A3A51433E41AFE2C3E7FF94C1DD217B72E33D849C6B6C3BBC592AB7C78AE91E7E94D64E19D4D67EDF00E
31,651,710 UART: [art] SIG.S = A7D41030DDC358C32FB836580293F394F0F25509BCCEE7380AACCADA296DE2987238C5502E3E2F715FEDBFED701F93AF
32,956,540 UART: Caliptra RT
32,957,237 UART: [state] CFI Enabled
33,073,803 UART: [rt] RT listening for mailbox commands...
33,076,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,106,860 UART: [rt]cmd =0x44504543, len=96
38,780,526 >>> mbox cmd response data (6236 bytes)
38,809,589 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,839,753 UART: [rt]cmd =0x52564348, len=36
38,842,481 >>> mbox cmd response data (8 bytes)
38,842,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,873,512 UART: [rt]cmd =0x44504543, len=96
44,547,608 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,695 UART:
193,079 UART: Running Caliptra ROM ...
194,287 UART:
194,440 UART: [state] CFI Enabled
262,431 UART: [state] LifecycleState = Unprovisioned
264,358 UART: [state] DebugLocked = No
266,945 UART: [state] WD Timer not started. Device not locked for debugging
270,478 UART: [kat] SHA2-256
449,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,148 UART: [kat] ++
461,596 UART: [kat] sha1
472,522 UART: [kat] SHA2-256
475,507 UART: [kat] SHA2-384
481,995 UART: [kat] SHA2-512-ACC
484,926 UART: [kat] ECC-384
2,947,355 UART: [kat] HMAC-384Kdf
2,970,261 UART: [kat] LMS
3,499,719 UART: [kat] --
3,503,214 UART: [cold-reset] ++
3,504,928 UART: [fht] FHT @ 0x50003400
3,515,278 UART: [idev] ++
3,515,901 UART: [idev] CDI.KEYID = 6
3,516,787 UART: [idev] SUBJECT.KEYID = 7
3,517,964 UART: [idev] UDS.KEYID = 0
3,518,893 ready_for_fw is high
3,519,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,662,410 UART: [idev] Erasing UDS.KEYID = 0
6,023,187 UART: [idev] Sha1 KeyId Algorithm
6,046,293 UART: [idev] --
6,050,774 UART: [ldev] ++
6,051,350 UART: [ldev] CDI.KEYID = 6
6,052,272 UART: [ldev] SUBJECT.KEYID = 5
6,053,429 UART: [ldev] AUTHORITY.KEYID = 7
6,054,658 UART: [ldev] FE.KEYID = 1
6,100,529 UART: [ldev] Erasing FE.KEYID = 1
8,599,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,914 UART: [ldev] --
10,392,064 UART: [fwproc] Wait for Commands...
10,394,811 UART: [fwproc] Recv command 0x46574c44
10,396,926 UART: [fwproc] Recv'd Img size: 114084 bytes
13,793,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,864,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,933,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,250,275 >>> mbox cmd response: success
14,254,546 UART: [afmc] ++
14,255,143 UART: [afmc] CDI.KEYID = 6
14,256,053 UART: [afmc] SUBJECT.KEYID = 7
14,257,210 UART: [afmc] AUTHORITY.KEYID = 5
16,784,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,824 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,689 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,862 UART: [afmc] --
18,584,264 UART: [cold-reset] --
18,587,631 UART: [state] Locking Datavault
18,593,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,390 UART: [state] Locking ICCM
18,596,435 UART: [exit] Launching FMC @ 0x40000130
18,604,820 UART:
18,605,052 UART: Running Caliptra FMC ...
18,606,149 UART:
18,606,308 UART: [state] CFI Enabled
18,666,719 UART: [fht] FMC Alias Private Key: 7
20,430,790 UART: [art] Extend RT PCRs Done
20,432,010 UART: [art] Lock RT PCRs Done
20,433,827 UART: [art] Populate DV Done
20,439,289 UART: [fht] FMC Alias Private Key: 7
20,440,981 UART: [art] Derive CDI
20,441,790 UART: [art] Store in in slot 0x4
20,499,607 UART: [art] Derive Key Pair
20,500,634 UART: [art] Store priv key in slot 0x5
22,963,400 UART: [art] Derive Key Pair - Done
22,976,718 UART: [art] Signing Cert with AUTHO
22,978,022 UART: RITY.KEYID = 7
24,689,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,072 UART: [art] PUB.X = 50AFD73D22A9F432B2107229618EE579C0379932373C3D009552787E3D8F4E6F1668C951A4FEF6940CC8C4531E2CAF22
24,698,300 UART: [art] PUB.Y = 564EAB8F93B19B903574A411033C954AC0DB245D7BDDAD456E1110757039ABC64C0C1F83B98DBB5C5F834675AE771EDA
24,705,569 UART: [art] SIG.R = 9C59284DE065745785CB3798A07BCF5A740158F0F0D61CBFCBFC122D93F2FBCA35EE78CF2468B29929407A1D7BE409B2
24,713,014 UART: [art] SIG.S = C9D3F16664BCC8B1679EC64276AAD4567B575F0AB317B0866AC65BEDB7F93ECE9CA8504C088057E20C50B3BF748A5069
25,692,034 UART: Caliptra RT
25,692,749 UART: [state] CFI Enabled
25,856,246 UART: [rt] RT listening for mailbox commands...
25,858,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,889,807 UART: [rt]cmd =0x44504543, len=96
30,269,532 >>> mbox cmd response data (6236 bytes)
30,298,734 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,328,870 UART: [rt]cmd =0x52564348, len=36
30,331,511 >>> mbox cmd response data (8 bytes)
30,331,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,362,405 UART: [rt]cmd =0x44504543, len=96
34,726,279 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
3,382,180 ready_for_fw is high
3,382,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,081,977 >>> mbox cmd response: success
18,363,615 UART:
18,364,017 UART: Running Caliptra FMC ...
18,365,130 UART:
18,365,279 UART: [state] CFI Enabled
18,432,412 UART: [fht] FMC Alias Private Key: 7
20,196,491 UART: [art] Extend RT PCRs Done
20,197,710 UART: [art] Lock RT PCRs Done
20,199,280 UART: [art] Populate DV Done
20,204,542 UART: [fht] FMC Alias Private Key: 7
20,206,240 UART: [art] Derive CDI
20,206,972 UART: [art] Store in in slot 0x4
20,265,162 UART: [art] Derive Key Pair
20,266,203 UART: [art] Store priv key in slot 0x5
22,729,852 UART: [art] Derive Key Pair - Done
22,742,685 UART: [art] Signing Cert with AUTHO
22,743,984 UART: RITY.KEYID = 7
24,455,651 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,159 UART: [art] PUB.X = 8FB1AFE84D0B4EDF85DA868538AB437E87E55D17FBE53B6C342A98ED831BA649C99C1B10523B1DD8ABA0D2CB258A29BC
24,464,466 UART: [art] PUB.Y = 643A36748A00D768FE3958EC221747DC1196C18A2231E173B3DBAB6DAB8C3BC2F227AE2D5C90C091D302DF22D990F49B
24,471,752 UART: [art] SIG.R = 54F8FCD444A3A0FF095BCD641DADCE881F266B021D872BF7FCCE9449FB7CE416EE850C85818F535C27DA87C3CDB18087
24,479,170 UART: [art] SIG.S = C276E98B6499965E95E609C4C000879403078D361F824832560E5A7094C9FF4E45ED69869F2CFA726F534C38D15F9617
25,457,750 UART: Caliptra RT
25,458,446 UART: [state] CFI Enabled
25,623,620 UART: [rt] RT listening for mailbox commands...
25,626,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,657,077 UART: [rt]cmd =0x44504543, len=96
30,036,859 >>> mbox cmd response data (6236 bytes)
30,066,178 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,096,493 UART: [rt]cmd =0x52564348, len=36
30,099,451 >>> mbox cmd response data (8 bytes)
30,099,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,130,369 UART: [rt]cmd =0x44504543, len=96
34,494,945 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
192,916 UART:
193,294 UART: Running Caliptra ROM ...
194,393 UART:
604,031 UART: [state] CFI Enabled
619,472 UART: [state] LifecycleState = Unprovisioned
621,356 UART: [state] DebugLocked = No
623,373 UART: [state] WD Timer not started. Device not locked for debugging
626,979 UART: [kat] SHA2-256
806,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,726 UART: [kat] ++
818,178 UART: [kat] sha1
828,691 UART: [kat] SHA2-256
831,769 UART: [kat] SHA2-384
837,756 UART: [kat] SHA2-512-ACC
840,743 UART: [kat] ECC-384
3,283,590 UART: [kat] HMAC-384Kdf
3,296,050 UART: [kat] LMS
3,825,515 UART: [kat] --
3,830,221 UART: [cold-reset] ++
3,832,721 UART: [fht] FHT @ 0x50003400
3,843,058 UART: [idev] ++
3,843,634 UART: [idev] CDI.KEYID = 6
3,844,520 UART: [idev] SUBJECT.KEYID = 7
3,845,763 UART: [idev] UDS.KEYID = 0
3,846,693 ready_for_fw is high
3,846,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,185 UART: [idev] Erasing UDS.KEYID = 0
6,319,859 UART: [idev] Sha1 KeyId Algorithm
6,342,416 UART: [idev] --
6,346,143 UART: [ldev] ++
6,346,735 UART: [ldev] CDI.KEYID = 6
6,347,649 UART: [ldev] SUBJECT.KEYID = 5
6,348,810 UART: [ldev] AUTHORITY.KEYID = 7
6,350,040 UART: [ldev] FE.KEYID = 1
6,360,241 UART: [ldev] Erasing FE.KEYID = 1
8,837,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,307 UART: [ldev] --
10,629,058 UART: [fwproc] Wait for Commands...
10,631,531 UART: [fwproc] Recv command 0x46574c44
10,633,574 UART: [fwproc] Recv'd Img size: 114084 bytes
14,035,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,494,828 >>> mbox cmd response: success
14,498,461 UART: [afmc] ++
14,499,069 UART: [afmc] CDI.KEYID = 6
14,499,959 UART: [afmc] SUBJECT.KEYID = 7
14,501,121 UART: [afmc] AUTHORITY.KEYID = 5
17,001,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,316 UART: [afmc] --
18,798,599 UART: [cold-reset] --
18,801,977 UART: [state] Locking Datavault
18,808,905 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,580 UART: [state] Locking ICCM
18,812,573 UART: [exit] Launching FMC @ 0x40000130
18,821,029 UART:
18,821,271 UART: Running Caliptra FMC ...
18,822,324 UART:
18,822,475 UART: [state] CFI Enabled
18,830,960 UART: [fht] FMC Alias Private Key: 7
20,587,474 UART: [art] Extend RT PCRs Done
20,588,685 UART: [art] Lock RT PCRs Done
20,590,147 UART: [art] Populate DV Done
20,595,509 UART: [fht] FMC Alias Private Key: 7
20,597,102 UART: [art] Derive CDI
20,597,841 UART: [art] Store in in slot 0x4
20,640,312 UART: [art] Derive Key Pair
20,641,350 UART: [art] Store priv key in slot 0x5
23,068,429 UART: [art] Derive Key Pair - Done
23,081,174 UART: [art] Signing Cert with AUTHO
23,082,510 UART: RITY.KEYID = 7
24,788,078 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,563 UART: [art] PUB.X = 2361E2126A6A75D597A5B41858B947B6803C0DC8C67BE7E88422FA2D864BD2694FFB19C28E08CEAED4F6C0A04B31AB6F
24,796,833 UART: [art] PUB.Y = FDEF828D11DC89D87551384C539E0D10C7A8B38147314FA95F8D0EB714CC07925B2CB318C5AFDFC02D9425266CCACB77
24,804,142 UART: [art] SIG.R = 75628AE52E6342DA578D5B077FF828F06F7A81BD346404D4A88D3B29F21529C90AC9054E0CACDE4EF8AD7AD0F1B62D7A
24,811,515 UART: [art] SIG.S = 6AD9C04886E5E01C7774D4DB346BA9E51E1E6FE3EBF93FAC5F03EACD8065E724ADFBAA2BAB782EE36C214369DA6170A7
25,790,293 UART: Caliptra RT
25,791,008 UART: [state] CFI Enabled
25,907,944 UART: [rt] RT listening for mailbox commands...
25,910,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,941,036 UART: [rt]cmd =0x44504543, len=96
30,225,489 >>> mbox cmd response data (6236 bytes)
30,254,588 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,284,771 UART: [rt]cmd =0x52564348, len=36
30,287,419 >>> mbox cmd response data (8 bytes)
30,287,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,318,394 UART: [rt]cmd =0x44504543, len=96
34,602,259 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
3,696,743 ready_for_fw is high
3,697,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,992 >>> mbox cmd response: success
18,510,017 UART:
18,510,407 UART: Running Caliptra FMC ...
18,511,543 UART:
18,511,703 UART: [state] CFI Enabled
18,519,268 UART: [fht] FMC Alias Private Key: 7
20,275,934 UART: [art] Extend RT PCRs Done
20,277,163 UART: [art] Lock RT PCRs Done
20,278,738 UART: [art] Populate DV Done
20,284,201 UART: [fht] FMC Alias Private Key: 7
20,285,872 UART: [art] Derive CDI
20,286,690 UART: [art] Store in in slot 0x4
20,329,393 UART: [art] Derive Key Pair
20,330,397 UART: [art] Store priv key in slot 0x5
22,756,708 UART: [art] Derive Key Pair - Done
22,769,812 UART: [art] Signing Cert with AUTHO
22,771,127 UART: RITY.KEYID = 7
24,476,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,211 UART: [art] PUB.X = 12BC4F75F7447E29DED1A3B153B099051D39C8958386E0A78FBE9D10F1EB84EBB4ED3A932252FEF2F172E7035FD53E09
24,485,503 UART: [art] PUB.Y = 9F6961AA7146C04F90663067D47B39009AF4CC026C6CD40364BA7D136EF9427C108CE5DF01BEF662F6F9C2A4320B2665
24,492,733 UART: [art] SIG.R = 037E508FA71E50F6173C00E8CF65C77CA22DA2016F110D823D3ABC79CDD0AD1B12ED204699964F06BE78400732F06C22
24,500,094 UART: [art] SIG.S = 1546B6970F5F0DA116B20D9EA77DACAD9B56D093EE535DAD9125A19DCF5A79A3DB3394DCBA4FC3165F64ABE466F0E465
25,479,777 UART: Caliptra RT
25,480,483 UART: [state] CFI Enabled
25,597,672 UART: [rt] RT listening for mailbox commands...
25,600,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,631,254 UART: [rt]cmd =0x44504543, len=96
29,914,231 >>> mbox cmd response data (6236 bytes)
29,944,615 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,974,998 UART: [rt]cmd =0x52564348, len=36
29,977,630 >>> mbox cmd response data (8 bytes)
29,978,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,008,767 UART: [rt]cmd =0x44504543, len=96
34,292,560 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,369 UART:
192,770 UART: Running Caliptra ROM ...
193,878 UART:
194,021 UART: [state] CFI Enabled
264,190 UART: [state] LifecycleState = Unprovisioned
266,623 UART: [state] DebugLocked = No
268,994 UART: [state] WD Timer not started. Device not locked for debugging
272,840 UART: [kat] SHA2-256
462,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,503 UART: [kat] ++
474,034 UART: [kat] sha1
486,553 UART: [kat] SHA2-256
489,568 UART: [kat] SHA2-384
495,767 UART: [kat] SHA2-512-ACC
498,343 UART: [kat] ECC-384
2,947,128 UART: [kat] HMAC-384Kdf
2,970,738 UART: [kat] LMS
3,502,543 UART: [kat] --
3,507,203 UART: [cold-reset] ++
3,508,141 UART: [fht] FHT @ 0x50003400
3,519,533 UART: [idev] ++
3,520,240 UART: [idev] CDI.KEYID = 6
3,521,266 UART: [idev] SUBJECT.KEYID = 7
3,522,365 UART: [idev] UDS.KEYID = 0
3,523,405 ready_for_fw is high
3,523,600 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,100 UART: [idev] Erasing UDS.KEYID = 0
6,027,819 UART: [idev] Sha1 KeyId Algorithm
6,050,924 UART: [idev] --
6,055,003 UART: [ldev] ++
6,055,700 UART: [ldev] CDI.KEYID = 6
6,056,624 UART: [ldev] SUBJECT.KEYID = 5
6,057,786 UART: [ldev] AUTHORITY.KEYID = 7
6,059,035 UART: [ldev] FE.KEYID = 1
6,099,497 UART: [ldev] Erasing FE.KEYID = 1
8,607,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,785 UART: [ldev] --
10,413,938 UART: [fwproc] Wait for Commands...
10,415,862 UART: [fwproc] Recv command 0x46574c44
10,418,166 UART: [fwproc] Recv'd Img size: 114084 bytes
13,862,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,819 >>> mbox cmd response: success
14,604,621 UART: [afmc] ++
14,605,352 UART: [afmc] CDI.KEYID = 6
14,606,555 UART: [afmc] SUBJECT.KEYID = 7
14,607,995 UART: [afmc] AUTHORITY.KEYID = 5
17,148,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,885,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,887,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,902,163 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,917,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,932,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,956,099 UART: [afmc] --
18,960,563 UART: [cold-reset] --
18,964,109 UART: [state] Locking Datavault
18,970,457 UART: [state] Locking PCR0, PCR1 and PCR31
18,972,614 UART: [state] Locking ICCM
18,974,555 UART: [exit] Launching FMC @ 0x40000130
18,983,254 UART:
18,983,506 UART: Running Caliptra FMC ...
18,984,606 UART:
18,984,764 UART: [state] CFI Enabled
19,041,281 UART: [fht] FMC Alias Private Key: 7
20,805,450 UART: [art] Extend RT PCRs Done
20,806,673 UART: [art] Lock RT PCRs Done
20,808,412 UART: [art] Populate DV Done
20,813,928 UART: [fht] FMC Alias Private Key: 7
20,815,458 UART: [art] Derive CDI
20,816,268 UART: [art] Store in in slot 0x4
20,873,576 UART: [art] Derive Key Pair
20,874,621 UART: [art] Store priv key in slot 0x5
23,337,371 UART: [art] Derive Key Pair - Done
23,350,312 UART: [art] Signing Cert with AUTHO
23,351,610 UART: RITY.KEYID = 7
25,063,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,064,552 UART: [art] PUB.X = AB5A900A000008F83343F4D938BB4ECB1A8D406B9254197D6D2F4483720ADF529DB9C7B668D2B73CD8C81EF7DE6B0BAD
25,071,711 UART: [art] PUB.Y = F5CC7D8B24E01755B69FD39DF4F11708E9F3DEE501C39A2AC70AB5F7615C5B55F2DEA12531992798B5F6CD6DE5CC4D73
25,079,027 UART: [art] SIG.R = 0FBAC087E19ABB851AE11D9AA5D6392366681200A1E244F2F1BC16832F1A9CE4172FD167E4D4A702E7BF54C0B872E804
25,086,405 UART: [art] SIG.S = 34ECD1E00C7AE57E9AB5D58BA93BF0BC719E6C4E91DCE2809C7C639F537723A1533A4B85C8F329A144C7C6078338BAFB
26,065,281 UART: Caliptra RT
26,065,991 UART: [state] CFI Enabled
26,231,334 UART: [rt] RT listening for mailbox commands...
26,233,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,265,100 UART: [rt]cmd =0x44504543, len=96
30,644,382 >>> mbox cmd response data (6236 bytes)
30,673,487 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,703,779 UART: [rt]cmd =0x52564348, len=36
30,706,523 >>> mbox cmd response data (8 bytes)
30,706,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,737,530 UART: [rt]cmd =0x44504543, len=96
35,102,790 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,435,487 ready_for_fw is high
3,435,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,428 >>> mbox cmd response: success
19,026,845 UART:
19,027,239 UART: Running Caliptra FMC ...
19,028,374 UART:
19,028,534 UART: [state] CFI Enabled
19,093,997 UART: [fht] FMC Alias Private Key: 7
20,858,123 UART: [art] Extend RT PCRs Done
20,859,340 UART: [art] Lock RT PCRs Done
20,861,289 UART: [art] Populate DV Done
20,866,701 UART: [fht] FMC Alias Private Key: 7
20,868,346 UART: [art] Derive CDI
20,869,160 UART: [art] Store in in slot 0x4
20,927,230 UART: [art] Derive Key Pair
20,928,263 UART: [art] Store priv key in slot 0x5
23,391,862 UART: [art] Derive Key Pair - Done
23,405,191 UART: [art] Signing Cert with AUTHO
23,406,513 UART: RITY.KEYID = 7
25,117,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,039 UART: [art] PUB.X = C068F09EC5FA6006755E9024B277CD98057D970CD4B0E9F78749D8C5DCAD3B61F90BD8253DE4D6B116F0FA6C5D94BB68
25,126,316 UART: [art] PUB.Y = 40E8B2F1AEAA8BB5B484A391DC714CD286E67F77BBEA869E2708B99FD871D96301FCC92FD648B53A2C458E9BFA3761D0
25,133,651 UART: [art] SIG.R = 32018309C56E1EDBCE3A511EEDE04A29D521408BEADC2E32BD9AC873D1DFB9FEECEFCD081CFBE3E76C031EC55DA3ADB3
25,141,050 UART: [art] SIG.S = 9E50389247233E8AE7ADBCB111411857D72C90B03ECB1BFDA203EDC248889955433F6CACB7190A3BF6124F642776C230
26,119,744 UART: Caliptra RT
26,120,458 UART: [state] CFI Enabled
26,284,760 UART: [rt] RT listening for mailbox commands...
26,287,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,155 UART: [rt]cmd =0x44504543, len=96
30,676,722 >>> mbox cmd response data (6236 bytes)
30,705,762 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,735,716 UART: [rt]cmd =0x52564348, len=36
30,738,316 >>> mbox cmd response data (8 bytes)
30,738,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,769,366 UART: [rt]cmd =0x44504543, len=96
35,135,537 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
192,940 UART:
193,302 UART: Running Caliptra ROM ...
194,497 UART:
604,200 UART: [state] CFI Enabled
617,639 UART: [state] LifecycleState = Unprovisioned
620,014 UART: [state] DebugLocked = No
621,273 UART: [state] WD Timer not started. Device not locked for debugging
626,174 UART: [kat] SHA2-256
816,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,790 UART: [kat] ++
827,309 UART: [kat] sha1
839,269 UART: [kat] SHA2-256
842,250 UART: [kat] SHA2-384
847,257 UART: [kat] SHA2-512-ACC
849,865 UART: [kat] ECC-384
3,292,638 UART: [kat] HMAC-384Kdf
3,305,439 UART: [kat] LMS
3,837,266 UART: [kat] --
3,842,901 UART: [cold-reset] ++
3,845,542 UART: [fht] FHT @ 0x50003400
3,858,150 UART: [idev] ++
3,858,855 UART: [idev] CDI.KEYID = 6
3,859,808 UART: [idev] SUBJECT.KEYID = 7
3,861,054 UART: [idev] UDS.KEYID = 0
3,861,950 ready_for_fw is high
3,862,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,519 UART: [idev] Erasing UDS.KEYID = 0
6,338,430 UART: [idev] Sha1 KeyId Algorithm
6,360,676 UART: [idev] --
6,366,154 UART: [ldev] ++
6,366,872 UART: [ldev] CDI.KEYID = 6
6,367,794 UART: [ldev] SUBJECT.KEYID = 5
6,368,899 UART: [ldev] AUTHORITY.KEYID = 7
6,370,132 UART: [ldev] FE.KEYID = 1
6,381,642 UART: [ldev] Erasing FE.KEYID = 1
8,857,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,037 UART: [ldev] --
10,647,988 UART: [fwproc] Wait for Commands...
10,650,358 UART: [fwproc] Recv command 0x46574c44
10,652,670 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,821,801 >>> mbox cmd response: success
14,826,644 UART: [afmc] ++
14,827,351 UART: [afmc] CDI.KEYID = 6
14,828,466 UART: [afmc] SUBJECT.KEYID = 7
14,830,018 UART: [afmc] AUTHORITY.KEYID = 5
17,336,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,838 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,940 UART: [afmc] --
19,136,135 UART: [cold-reset] --
19,139,797 UART: [state] Locking Datavault
19,143,549 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,778 UART: [state] Locking ICCM
19,147,287 UART: [exit] Launching FMC @ 0x40000130
19,155,920 UART:
19,156,198 UART: Running Caliptra FMC ...
19,157,255 UART:
19,157,408 UART: [state] CFI Enabled
19,165,789 UART: [fht] FMC Alias Private Key: 7
20,922,826 UART: [art] Extend RT PCRs Done
20,924,049 UART: [art] Lock RT PCRs Done
20,925,596 UART: [art] Populate DV Done
20,930,903 UART: [fht] FMC Alias Private Key: 7
20,932,499 UART: [art] Derive CDI
20,933,318 UART: [art] Store in in slot 0x4
20,976,290 UART: [art] Derive Key Pair
20,977,294 UART: [art] Store priv key in slot 0x5
23,404,268 UART: [art] Derive Key Pair - Done
23,417,116 UART: [art] Signing Cert with AUTHO
23,418,424 UART: RITY.KEYID = 7
25,124,171 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,679 UART: [art] PUB.X = 77C76E3250561499B4EF8CE86765C535170DBE24E46EAA3BCAC762803C2E0286DFFA7CF5FF9DD6DA5836DF0FD866AB2F
25,132,954 UART: [art] PUB.Y = E2398BAAB1EDA857833A64A6C0389769ED8DD8D62FA2E8755421747C88DF52731E3AA0C71EE398110E26E03012C1AC31
25,140,221 UART: [art] SIG.R = E80A518CB78773114FC016B766AC1AD0E8B41B3D839534AE8A2B53B8D8FB0D3F34E892D7D88C372FAC10D0BACB782429
25,147,644 UART: [art] SIG.S = 4CA3082717149B8865AB37F09C64D553DF5343BFF73B59F8DB62C9FEFFD3FB1678645665ADC34B3DF4CFA1327CC0F04E
26,126,518 UART: Caliptra RT
26,127,230 UART: [state] CFI Enabled
26,243,714 UART: [rt] RT listening for mailbox commands...
26,246,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,276,589 UART: [rt]cmd =0x44504543, len=96
30,560,631 >>> mbox cmd response data (6236 bytes)
30,589,677 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,620,013 UART: [rt]cmd =0x52564348, len=36
30,622,543 >>> mbox cmd response data (8 bytes)
30,623,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,653,774 UART: [rt]cmd =0x44504543, len=96
34,937,276 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
3,758,757 ready_for_fw is high
3,759,156 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,446 >>> mbox cmd response: success
19,199,189 UART:
19,199,600 UART: Running Caliptra FMC ...
19,200,751 UART:
19,200,911 UART: [state] CFI Enabled
19,208,647 UART: [fht] FMC Alias Private Key: 7
20,965,004 UART: [art] Extend RT PCRs Done
20,966,234 UART: [art] Lock RT PCRs Done
20,967,863 UART: [art] Populate DV Done
20,973,175 UART: [fht] FMC Alias Private Key: 7
20,974,779 UART: [art] Derive CDI
20,975,619 UART: [art] Store in in slot 0x4
21,018,122 UART: [art] Derive Key Pair
21,019,178 UART: [art] Store priv key in slot 0x5
23,445,648 UART: [art] Derive Key Pair - Done
23,459,026 UART: [art] Signing Cert with AUTHO
23,460,335 UART: RITY.KEYID = 7
25,165,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,084 UART: [art] PUB.X = 2B13DC902149EDFBE7D60186ACA5AE53932DB07A39739E72895B4E438A084218A925AC43054FE8B619F2E0F8036F5ED8
25,174,272 UART: [art] PUB.Y = E81EB8F4064AA5B98509BCEF6DA7D0AFB982863A89486D0EECD68C8A20B906CB1565A774D90C164DE454AC28B5A1454B
25,181,570 UART: [art] SIG.R = 6F8EA23E3B5142475B39BCB270BB302E0251100EB1642B8208F491401DC3294B6EB4EC817A00B718DC71842FAA8468E3
25,188,905 UART: [art] SIG.S = 35A7ABEEAE22282C1F08E718B12C5DD2D02834A5100AA25DA95AB90A2B1F77EA4E1C866C2EBB82A380139DC9ED8FBAFE
26,167,936 UART: Caliptra RT
26,168,632 UART: [state] CFI Enabled
26,285,270 UART: [rt] RT listening for mailbox commands...
26,287,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,337 UART: [rt]cmd =0x44504543, len=96
30,602,309 >>> mbox cmd response data (6236 bytes)
30,631,922 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,662,220 UART: [rt]cmd =0x52564348, len=36
30,664,877 >>> mbox cmd response data (8 bytes)
30,665,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,695,988 UART: [rt]cmd =0x44504543, len=96
34,979,164 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,655 UART: [kat] SHA2-256
881,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,701 UART: [kat] ++
885,853 UART: [kat] sha1
889,933 UART: [kat] SHA2-256
891,871 UART: [kat] SHA2-384
894,564 UART: [kat] SHA2-512-ACC
896,465 UART: [kat] ECC-384
902,366 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,475,851 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,022 UART: [idev] ++
1,479,190 UART: [idev] CDI.KEYID = 6
1,479,550 UART: [idev] SUBJECT.KEYID = 7
1,479,974 UART: [idev] UDS.KEYID = 0
1,480,319 ready_for_fw is high
1,480,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,218 UART: [idev] Erasing UDS.KEYID = 0
1,504,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,452 UART: [idev] --
1,514,363 UART: [ldev] ++
1,514,531 UART: [ldev] CDI.KEYID = 6
1,514,894 UART: [ldev] SUBJECT.KEYID = 5
1,515,320 UART: [ldev] AUTHORITY.KEYID = 7
1,515,783 UART: [ldev] FE.KEYID = 1
1,521,159 UART: [ldev] Erasing FE.KEYID = 1
1,546,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,270 UART: [ldev] --
1,585,625 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 114084 bytes
2,882,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,562 >>> mbox cmd response: success
3,075,818 UART: [afmc] ++
3,075,986 UART: [afmc] CDI.KEYID = 6
3,076,348 UART: [afmc] SUBJECT.KEYID = 7
3,076,773 UART: [afmc] AUTHORITY.KEYID = 5
3,110,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,388 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,781 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,471 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,412 UART: [afmc] --
3,154,450 UART: [cold-reset] --
3,155,380 UART: [state] Locking Datavault
3,156,685 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,289 UART: [state] Locking ICCM
3,157,767 UART: [exit] Launching FMC @ 0x40000130
3,163,096 UART:
3,163,112 UART: Running Caliptra FMC ...
3,163,520 UART:
3,163,574 UART: [state] CFI Enabled
3,173,515 UART: [fht] FMC Alias Private Key: 7
3,281,374 UART: [art] Extend RT PCRs Done
3,281,802 UART: [art] Lock RT PCRs Done
3,283,382 UART: [art] Populate DV Done
3,291,649 UART: [fht] FMC Alias Private Key: 7
3,292,637 UART: [art] Derive CDI
3,292,917 UART: [art] Store in in slot 0x4
3,379,058 UART: [art] Derive Key Pair
3,379,418 UART: [art] Store priv key in slot 0x5
3,393,438 UART: [art] Derive Key Pair - Done
3,407,861 UART: [art] Signing Cert with AUTHO
3,408,341 UART: RITY.KEYID = 7
3,423,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,632 UART: [art] PUB.X = 1441D4F48386EAF5457CC783ED635964E5DBC960DB5BC8E704E6262BE345396AC433687D473DE8A8526D468EF526E1C9
3,431,401 UART: [art] PUB.Y = C56AB2AE2DEF7984124B9EF70C671FDF2A630B246FD359F8A13FE57FB844C5990AA00F3E744A81CF4508C752AA4C6699
3,438,348 UART: [art] SIG.R = 3440012B557204552E63E967F056B86CA3E53B4DF8616B9AA998BFAD41856ECB01045DD13FEF7FFB1C1C9B5377A736E5
3,445,112 UART: [art] SIG.S = 11434892407E5E8B62149183D554AA86DC4AA6080C7E86DBFDA7362573058BAFECEC430D2C6C2514DD2FA2A1434EDFC4
3,468,669 UART: Caliptra RT
3,468,922 UART: [state] CFI Enabled
3,576,160 UART: [rt] RT listening for mailbox commands...
3,576,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,594 UART: [rt]cmd =0x44504543, len=96
3,788,950 >>> mbox cmd response data (6236 bytes)
3,788,951 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,338 UART: [rt]cmd =0x52564348, len=36
3,820,469 >>> mbox cmd response data (8 bytes)
3,820,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,850,465 UART: [rt]cmd =0x44504543, len=96
4,030,603 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 ready_for_fw is high
1,362,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,340 >>> mbox cmd response: success
2,985,038 UART:
2,985,054 UART: Running Caliptra FMC ...
2,985,462 UART:
2,985,516 UART: [state] CFI Enabled
2,995,531 UART: [fht] FMC Alias Private Key: 7
3,103,574 UART: [art] Extend RT PCRs Done
3,104,002 UART: [art] Lock RT PCRs Done
3,105,544 UART: [art] Populate DV Done
3,113,833 UART: [fht] FMC Alias Private Key: 7
3,114,763 UART: [art] Derive CDI
3,115,043 UART: [art] Store in in slot 0x4
3,200,270 UART: [art] Derive Key Pair
3,200,630 UART: [art] Store priv key in slot 0x5
3,213,634 UART: [art] Derive Key Pair - Done
3,228,232 UART: [art] Signing Cert with AUTHO
3,228,712 UART: RITY.KEYID = 7
3,243,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,701 UART: [art] PUB.X = F90385DA08A22CD9D18DB5B7CB863F3D4C1DB721D4570F6EE7DCA3FD5CB3CABF4A998D3368B1D52409F266D0476301CA
3,251,474 UART: [art] PUB.Y = EABC923E5A176DC02ED97A06731989E229A69804DACC7529F42D8CC20B3A3B4645AB91BA5FE0533C713BBFA925D49F81
3,258,427 UART: [art] SIG.R = 641E8EF3DE4D50A35977D69CB1497887812247055DAE2929D15F22D83EFE8C3AB41C8CAC7F66FFD7FCCF142EA50264EA
3,265,205 UART: [art] SIG.S = D472D269BB3B26344A74FDFEF5BEA5E688AC7DBF7DC9D17F65A4CCAA72FFC98450262CA24CCBD2E17F6CCCDDE1D94BDC
3,288,720 UART: Caliptra RT
3,288,973 UART: [state] CFI Enabled
3,396,394 UART: [rt] RT listening for mailbox commands...
3,397,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,424 UART: [rt]cmd =0x44504543, len=96
3,607,489 >>> mbox cmd response data (6236 bytes)
3,607,490 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,167 UART: [rt]cmd =0x52564348, len=36
3,639,278 >>> mbox cmd response data (8 bytes)
3,639,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,669,360 UART: [rt]cmd =0x44504543, len=96
3,849,807 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,477,182 UART: [cold-reset] ++
1,477,540 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 ready_for_fw is high
1,481,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,259 UART: [idev] Erasing UDS.KEYID = 0
1,506,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,636 UART: [ldev] ++
1,515,804 UART: [ldev] CDI.KEYID = 6
1,516,167 UART: [ldev] SUBJECT.KEYID = 5
1,516,593 UART: [ldev] AUTHORITY.KEYID = 7
1,517,056 UART: [ldev] FE.KEYID = 1
1,522,604 UART: [ldev] Erasing FE.KEYID = 1
1,548,115 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,981 UART: [ldev] --
1,587,472 UART: [fwproc] Waiting for Commands...
1,588,217 UART: [fwproc] Received command 0x46574c44
1,589,008 UART: [fwproc] Received Image of size 114084 bytes
2,883,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,403 >>> mbox cmd response: success
3,077,517 UART: [afmc] ++
3,077,685 UART: [afmc] CDI.KEYID = 6
3,078,047 UART: [afmc] SUBJECT.KEYID = 7
3,078,472 UART: [afmc] AUTHORITY.KEYID = 5
3,113,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,904 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,594 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,537 UART: [afmc] --
3,156,543 UART: [cold-reset] --
3,157,505 UART: [state] Locking Datavault
3,158,632 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,236 UART: [state] Locking ICCM
3,159,812 UART: [exit] Launching FMC @ 0x40000130
3,165,141 UART:
3,165,157 UART: Running Caliptra FMC ...
3,165,565 UART:
3,165,708 UART: [state] CFI Enabled
3,176,219 UART: [fht] FMC Alias Private Key: 7
3,284,584 UART: [art] Extend RT PCRs Done
3,285,012 UART: [art] Lock RT PCRs Done
3,286,710 UART: [art] Populate DV Done
3,295,049 UART: [fht] FMC Alias Private Key: 7
3,296,065 UART: [art] Derive CDI
3,296,345 UART: [art] Store in in slot 0x4
3,382,002 UART: [art] Derive Key Pair
3,382,362 UART: [art] Store priv key in slot 0x5
3,396,196 UART: [art] Derive Key Pair - Done
3,410,543 UART: [art] Signing Cert with AUTHO
3,411,023 UART: RITY.KEYID = 7
3,425,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,494 UART: [art] PUB.X = 5BE3218C59CA198074794084269FFC666CF2F9711F7AB9CAD1737837522F29DBE80D1EB2535F9CAA297DFD839634BA2A
3,433,267 UART: [art] PUB.Y = 550F638B559D97BC1C4054A8F2213F057F7D823E26B78FBD4764D887766194E019216F7268D8E5D5740F4EDCD5995557
3,440,200 UART: [art] SIG.R = A634ED08A6AADEA4F63E2CB73058FB507ABDC6FFE272966D00BC70FFF38D487AF3C5A03C7C00124A8FC3582BFFCCA266
3,446,949 UART: [art] SIG.S = EBF398A186480B9F46294311F6D7D9C8957C1B42D5398B41D6CB2DE2239B9D0AA74B5046338868D7A67A0AD5E859E636
3,471,069 UART: Caliptra RT
3,471,414 UART: [state] CFI Enabled
3,579,176 UART: [rt] RT listening for mailbox commands...
3,579,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,258 UART: [rt]cmd =0x44504543, len=96
3,791,933 >>> mbox cmd response data (6236 bytes)
3,791,934 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,381 UART: [rt]cmd =0x52564348, len=36
3,823,596 >>> mbox cmd response data (8 bytes)
3,823,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,502 UART: [rt]cmd =0x44504543, len=96
4,034,923 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,486 ready_for_fw is high
1,362,486 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,125 >>> mbox cmd response: success
2,985,155 UART:
2,985,171 UART: Running Caliptra FMC ...
2,985,579 UART:
2,985,722 UART: [state] CFI Enabled
2,996,239 UART: [fht] FMC Alias Private Key: 7
3,103,856 UART: [art] Extend RT PCRs Done
3,104,284 UART: [art] Lock RT PCRs Done
3,105,906 UART: [art] Populate DV Done
3,114,245 UART: [fht] FMC Alias Private Key: 7
3,115,179 UART: [art] Derive CDI
3,115,459 UART: [art] Store in in slot 0x4
3,200,904 UART: [art] Derive Key Pair
3,201,264 UART: [art] Store priv key in slot 0x5
3,214,192 UART: [art] Derive Key Pair - Done
3,229,333 UART: [art] Signing Cert with AUTHO
3,229,813 UART: RITY.KEYID = 7
3,244,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,752 UART: [art] PUB.X = 5238E1A2CB6AC455BC1501354A71AB117136DB9B0B773187A28585D7F426FA4A05B4EDDA3870D0A7E82465D4FEEB3CF5
3,252,523 UART: [art] PUB.Y = 22AE625421E96F09F2C475D8F96C8A2B6F7BD8771D6AF14A0705A288068F79A80CA1E6DBFC1D091374B979E4229549D0
3,259,457 UART: [art] SIG.R = 5493262205D6A925C402593E28BA45A9DBB3FA9EA780E9F80C21580DD7C5D23D2FE6B4982D033497320BAF2CB9932C2B
3,266,213 UART: [art] SIG.S = 1B89E88F8A145CE20EAC874C998D7AD324DE9B59E87207553DD8A30700A06FF3EBC2584BFB79841A0175A1314708CEC1
3,289,645 UART: Caliptra RT
3,289,990 UART: [state] CFI Enabled
3,398,984 UART: [rt] RT listening for mailbox commands...
3,399,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,176 UART: [rt]cmd =0x44504543, len=96
3,611,402 >>> mbox cmd response data (6236 bytes)
3,611,403 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,864 UART: [rt]cmd =0x52564348, len=36
3,642,713 >>> mbox cmd response data (8 bytes)
3,642,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,549 UART: [rt]cmd =0x44504543, len=96
3,854,215 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,460 UART: [kat] SHA2-512-ACC
908,361 UART: [kat] ECC-384
917,950 UART: [kat] HMAC-384Kdf
922,446 UART: [kat] LMS
1,170,774 UART: [kat] --
1,171,789 UART: [cold-reset] ++
1,172,307 UART: [fht] FHT @ 0x50003400
1,174,888 UART: [idev] ++
1,175,056 UART: [idev] CDI.KEYID = 6
1,175,416 UART: [idev] SUBJECT.KEYID = 7
1,175,840 UART: [idev] UDS.KEYID = 0
1,176,185 ready_for_fw is high
1,176,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,266 UART: [idev] Erasing UDS.KEYID = 0
1,201,405 UART: [idev] Sha1 KeyId Algorithm
1,209,957 UART: [idev] --
1,210,933 UART: [ldev] ++
1,211,101 UART: [ldev] CDI.KEYID = 6
1,211,464 UART: [ldev] SUBJECT.KEYID = 5
1,211,890 UART: [ldev] AUTHORITY.KEYID = 7
1,212,353 UART: [ldev] FE.KEYID = 1
1,217,523 UART: [ldev] Erasing FE.KEYID = 1
1,243,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,439 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,176 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,430 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,285 >>> mbox cmd response: success
2,771,339 UART: [afmc] ++
2,771,507 UART: [afmc] CDI.KEYID = 6
2,771,869 UART: [afmc] SUBJECT.KEYID = 7
2,772,294 UART: [afmc] AUTHORITY.KEYID = 5
2,807,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,658 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,910 UART: [afmc] --
2,850,960 UART: [cold-reset] --
2,851,818 UART: [state] Locking Datavault
2,852,921 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,525 UART: [state] Locking ICCM
2,854,035 UART: [exit] Launching FMC @ 0x40000130
2,859,364 UART:
2,859,380 UART: Running Caliptra FMC ...
2,859,788 UART:
2,859,842 UART: [state] CFI Enabled
2,870,065 UART: [fht] FMC Alias Private Key: 7
2,977,366 UART: [art] Extend RT PCRs Done
2,977,794 UART: [art] Lock RT PCRs Done
2,979,368 UART: [art] Populate DV Done
2,987,749 UART: [fht] FMC Alias Private Key: 7
2,988,785 UART: [art] Derive CDI
2,989,065 UART: [art] Store in in slot 0x4
3,074,448 UART: [art] Derive Key Pair
3,074,808 UART: [art] Store priv key in slot 0x5
3,088,070 UART: [art] Derive Key Pair - Done
3,102,854 UART: [art] Signing Cert with AUTHO
3,103,334 UART: RITY.KEYID = 7
3,118,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,235 UART: [art] PUB.X = C295F9950C132722A51FD1C4F6254E07E775824DA188F7F1FE90B4F119A4D4491FD7446AB394BEEA7B13D3CB9FC686DD
3,126,009 UART: [art] PUB.Y = 1191D434738D55AD7C9CEDD4D1EFF760C36E2909FE778AB5F138604F3590A3945591E9CA3D878008531D1C138A7033F9
3,132,951 UART: [art] SIG.R = 969D7CCFB3C311B5CCCCFE202EAD90D0CAED6C27CE3D1A255EECC84990E42FB5B54B55D4CA7684FA101597C4E553F3BA
3,139,749 UART: [art] SIG.S = A30F402B4F8CE4E3DA8F1BF60A1587D3771118E29E85868EC304B14800358EAEFF3DFB6812DAAD86A915B5BFEEF3F563
3,163,437 UART: Caliptra RT
3,163,690 UART: [state] CFI Enabled
3,271,370 UART: [rt] RT listening for mailbox commands...
3,272,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,294 UART: [rt]cmd =0x44504543, len=96
3,482,585 >>> mbox cmd response data (6236 bytes)
3,482,586 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,287 UART: [rt]cmd =0x52564348, len=36
3,514,496 >>> mbox cmd response data (8 bytes)
3,514,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,432 UART: [rt]cmd =0x44504543, len=96
3,723,193 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,029 ready_for_fw is high
1,060,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,742 >>> mbox cmd response: success
2,683,042 UART:
2,683,058 UART: Running Caliptra FMC ...
2,683,466 UART:
2,683,520 UART: [state] CFI Enabled
2,693,437 UART: [fht] FMC Alias Private Key: 7
2,801,612 UART: [art] Extend RT PCRs Done
2,802,040 UART: [art] Lock RT PCRs Done
2,803,830 UART: [art] Populate DV Done
2,812,345 UART: [fht] FMC Alias Private Key: 7
2,813,497 UART: [art] Derive CDI
2,813,777 UART: [art] Store in in slot 0x4
2,899,242 UART: [art] Derive Key Pair
2,899,602 UART: [art] Store priv key in slot 0x5
2,913,218 UART: [art] Derive Key Pair - Done
2,928,444 UART: [art] Signing Cert with AUTHO
2,928,924 UART: RITY.KEYID = 7
2,944,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,221 UART: [art] PUB.X = DFEE7EC0D50982BE900AE07D06FA8F924A30B39E4EC3412414831351606F9880C777634D7A5CF42409599752671666DC
2,951,973 UART: [art] PUB.Y = D2D257726273B9701C0213BD6ED17BCD07831656E9FF4314FA5C482B308F307E3399DF056A717ABEA4DF7E830C78A4E3
2,958,915 UART: [art] SIG.R = A75282C551A49A530021BF2668A12C45C552917C7D51370266BE712BBA96A7E09CF9B5A18CC85E9FF23F93863633534A
2,965,656 UART: [art] SIG.S = 936078923507C070F091462D9968BF060DD5C11DFD9E3D9407FC710671E8865F657C5C8C7BBAAE2103DC40E3C98A9E17
2,989,641 UART: Caliptra RT
2,989,894 UART: [state] CFI Enabled
3,098,100 UART: [rt] RT listening for mailbox commands...
3,098,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,056 UART: [rt]cmd =0x44504543, len=96
3,309,172 >>> mbox cmd response data (6236 bytes)
3,309,173 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,710 UART: [rt]cmd =0x52564348, len=36
3,340,759 >>> mbox cmd response data (8 bytes)
3,340,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,763 UART: [rt]cmd =0x44504543, len=96
3,551,411 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,843 UART: [state] LifecycleState = Unprovisioned
85,498 UART: [state] DebugLocked = No
86,152 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,670 UART: [kat] SHA2-256
903,610 UART: [kat] SHA2-384
906,241 UART: [kat] SHA2-512-ACC
908,142 UART: [kat] ECC-384
918,043 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,050 UART: [cold-reset] ++
1,172,454 UART: [fht] FHT @ 0x50003400
1,175,181 UART: [idev] ++
1,175,349 UART: [idev] CDI.KEYID = 6
1,175,709 UART: [idev] SUBJECT.KEYID = 7
1,176,133 UART: [idev] UDS.KEYID = 0
1,176,478 ready_for_fw is high
1,176,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,721 UART: [idev] Erasing UDS.KEYID = 0
1,200,974 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,476 UART: [ldev] ++
1,210,644 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,433 UART: [ldev] AUTHORITY.KEYID = 7
1,211,896 UART: [ldev] FE.KEYID = 1
1,217,088 UART: [ldev] Erasing FE.KEYID = 1
1,243,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,402 UART: [ldev] --
1,282,783 UART: [fwproc] Wait for Commands...
1,283,403 UART: [fwproc] Recv command 0x46574c44
1,284,131 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,218 >>> mbox cmd response: success
2,772,266 UART: [afmc] ++
2,772,434 UART: [afmc] CDI.KEYID = 6
2,772,796 UART: [afmc] SUBJECT.KEYID = 7
2,773,221 UART: [afmc] AUTHORITY.KEYID = 5
2,808,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,240 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,959 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,805 UART: [afmc] --
2,851,901 UART: [cold-reset] --
2,852,847 UART: [state] Locking Datavault
2,853,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,586 UART: [state] Locking ICCM
2,855,066 UART: [exit] Launching FMC @ 0x40000130
2,860,395 UART:
2,860,411 UART: Running Caliptra FMC ...
2,860,819 UART:
2,860,962 UART: [state] CFI Enabled
2,871,951 UART: [fht] FMC Alias Private Key: 7
2,979,992 UART: [art] Extend RT PCRs Done
2,980,420 UART: [art] Lock RT PCRs Done
2,982,126 UART: [art] Populate DV Done
2,990,345 UART: [fht] FMC Alias Private Key: 7
2,991,303 UART: [art] Derive CDI
2,991,583 UART: [art] Store in in slot 0x4
3,077,288 UART: [art] Derive Key Pair
3,077,648 UART: [art] Store priv key in slot 0x5
3,090,974 UART: [art] Derive Key Pair - Done
3,106,056 UART: [art] Signing Cert with AUTHO
3,106,536 UART: RITY.KEYID = 7
3,121,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,565 UART: [art] PUB.X = CDC4232A2C386C89E3FD60C47DDA1292BCE87F0749FF7EEC9E26D0AC6DF0B0E1327DA58202AC7CDE4005DBC048A7B2BD
3,129,352 UART: [art] PUB.Y = B7BFA18355E5B27BFE467882A84FAC948D547D7FDED81139DF4B1F3DAC0B91C459A19D1591B7BA78E3B9FECC6B9D6C96
3,136,321 UART: [art] SIG.R = 6633D9E2A604589059F27C1ACA7EAA6D3043C02F1ADF1BFAEE84CA596EFAC18AA920F9C935EA7DE8BBD036FF6CCF8DF9
3,143,118 UART: [art] SIG.S = 0475FCBA0F3A82F866CC75B919C8FE8317FE277EDCA1D976A584AF96FE95077518A848E146A9828354F03C142E76DA65
3,167,302 UART: Caliptra RT
3,167,647 UART: [state] CFI Enabled
3,275,752 UART: [rt] RT listening for mailbox commands...
3,276,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,604 UART: [rt]cmd =0x44504543, len=96
3,486,592 >>> mbox cmd response data (6236 bytes)
3,486,593 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,244 UART: [rt]cmd =0x52564348, len=36
3,518,215 >>> mbox cmd response data (8 bytes)
3,518,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,029 UART: [rt]cmd =0x44504543, len=96
3,728,937 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,506 ready_for_fw is high
1,060,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,015 >>> mbox cmd response: success
2,685,957 UART:
2,685,973 UART: Running Caliptra FMC ...
2,686,381 UART:
2,686,524 UART: [state] CFI Enabled
2,696,869 UART: [fht] FMC Alias Private Key: 7
2,805,158 UART: [art] Extend RT PCRs Done
2,805,586 UART: [art] Lock RT PCRs Done
2,807,230 UART: [art] Populate DV Done
2,815,511 UART: [fht] FMC Alias Private Key: 7
2,816,493 UART: [art] Derive CDI
2,816,773 UART: [art] Store in in slot 0x4
2,902,320 UART: [art] Derive Key Pair
2,902,680 UART: [art] Store priv key in slot 0x5
2,915,096 UART: [art] Derive Key Pair - Done
2,929,606 UART: [art] Signing Cert with AUTHO
2,930,086 UART: RITY.KEYID = 7
2,945,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,991 UART: [art] PUB.X = 707DA9A685577E78C5270D8F9229828BDB598C531A1540D9C3394B4ED14A360D7E36A26DEFBAC99B32CEBE6094DABD5F
2,952,767 UART: [art] PUB.Y = EA99E78FDE01C77C0B97E34DCCDE6A8B8A80C1FE3DAB4C5A78CE057C991D78AF8037D46DABCC1E6CC745510E1FCBBA57
2,959,737 UART: [art] SIG.R = 462744E9EFA7FD3C331D4E634E9237BC569A8458A79940A9B0C21B6C8B746D9B0B7E83FC09807F465375DC875263868B
2,966,499 UART: [art] SIG.S = 22EE13097FCE80D954B5F047E2ECD334A32376A257B3DBDD5FCFB1E02F50FA93221AA441A697B8ADB9B450C8391DD74C
2,990,773 UART: Caliptra RT
2,991,118 UART: [state] CFI Enabled
3,099,299 UART: [rt] RT listening for mailbox commands...
3,099,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,467 UART: [rt]cmd =0x44504543, len=96
3,311,138 >>> mbox cmd response data (6236 bytes)
3,311,139 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,600 UART: [rt]cmd =0x52564348, len=36
3,342,629 >>> mbox cmd response data (8 bytes)
3,342,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,451 UART: [rt]cmd =0x44504543, len=96
3,554,538 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,557 UART: [kat] SHA2-256
901,497 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,539 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,174,427 ready_for_fw is high
1,174,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,427 UART: [idev] Erasing UDS.KEYID = 0
1,199,595 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,534 UART: [ldev] ++
1,209,702 UART: [ldev] CDI.KEYID = 6
1,210,066 UART: [ldev] SUBJECT.KEYID = 5
1,210,493 UART: [ldev] AUTHORITY.KEYID = 7
1,210,956 UART: [ldev] FE.KEYID = 1
1,216,194 UART: [ldev] Erasing FE.KEYID = 1
1,242,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,525 UART: [fwproc] Recv command 0x46574c44
1,283,258 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,769 >>> mbox cmd response: success
2,769,808 UART: [afmc] ++
2,769,976 UART: [afmc] CDI.KEYID = 6
2,770,339 UART: [afmc] SUBJECT.KEYID = 7
2,770,765 UART: [afmc] AUTHORITY.KEYID = 5
2,806,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,641 UART: [afmc] --
2,849,523 UART: [cold-reset] --
2,850,161 UART: [state] Locking Datavault
2,851,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,998 UART: [state] Locking ICCM
2,852,530 UART: [exit] Launching FMC @ 0x40000130
2,857,859 UART:
2,857,875 UART: Running Caliptra FMC ...
2,858,283 UART:
2,858,337 UART: [state] CFI Enabled
2,868,724 UART: [fht] FMC Alias Private Key: 7
2,976,275 UART: [art] Extend RT PCRs Done
2,976,703 UART: [art] Lock RT PCRs Done
2,978,365 UART: [art] Populate DV Done
2,986,442 UART: [fht] FMC Alias Private Key: 7
2,987,476 UART: [art] Derive CDI
2,987,756 UART: [art] Store in in slot 0x4
3,073,281 UART: [art] Derive Key Pair
3,073,641 UART: [art] Store priv key in slot 0x5
3,085,833 UART: [art] Derive Key Pair - Done
3,100,519 UART: [art] Signing Cert with AUTHO
3,100,999 UART: RITY.KEYID = 7
3,116,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,066 UART: [art] PUB.X = D86FFDA61721B59B047ADB8B15632570593BF814F0CAEA373E85FB3F1BAA32B744208BAB923550E63215D2C1DA0B1D98
3,123,840 UART: [art] PUB.Y = 116E8BB9A4069FD70E495AB4EB76CF8408DFF5E7271AA0165ACFDB02F531E2E8356312EEFE67EA49BC1B677805BD1DFD
3,130,795 UART: [art] SIG.R = E5FA65BD8F1B9FCED7E10B8C1DDAB22A2EF6E8FD3CA87FB17D35543D2B324CAC9E5A667A417325C4C511625FCACC2B3A
3,137,592 UART: [art] SIG.S = 6CE5BADFAF5B47A9BE3F4F46BE7516A45B3DBC98D258898EBCE6DA24BF2A19AB4FD979082EF5EFE227ED53F68772BAF7
3,162,152 UART: Caliptra RT
3,162,405 UART: [state] CFI Enabled
3,270,082 UART: [rt] RT listening for mailbox commands...
3,270,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,926 UART: [rt]cmd =0x44504543, len=96
3,482,173 >>> mbox cmd response data (6236 bytes)
3,482,174 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,573 UART: [rt]cmd =0x52564348, len=36
3,513,562 >>> mbox cmd response data (8 bytes)
3,513,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,450 UART: [rt]cmd =0x44504543, len=96
3,725,673 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,048 ready_for_fw is high
1,056,048 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,781 >>> mbox cmd response: success
2,681,463 UART:
2,681,479 UART: Running Caliptra FMC ...
2,681,887 UART:
2,681,941 UART: [state] CFI Enabled
2,692,328 UART: [fht] FMC Alias Private Key: 7
2,800,535 UART: [art] Extend RT PCRs Done
2,800,963 UART: [art] Lock RT PCRs Done
2,802,591 UART: [art] Populate DV Done
2,810,742 UART: [fht] FMC Alias Private Key: 7
2,811,686 UART: [art] Derive CDI
2,811,966 UART: [art] Store in in slot 0x4
2,897,359 UART: [art] Derive Key Pair
2,897,719 UART: [art] Store priv key in slot 0x5
2,910,703 UART: [art] Derive Key Pair - Done
2,925,700 UART: [art] Signing Cert with AUTHO
2,926,180 UART: RITY.KEYID = 7
2,941,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,541 UART: [art] PUB.X = 5CCDAEBDA654019C3E544BE8BF3510B0C71CBBAA2C4BC36358F835359011FD7A7C359A24D4DE794FA21E7D44FAF7BD74
2,949,330 UART: [art] PUB.Y = 2EAC1E2D92DDC0F19AB7CAA1A8C3C7C6E50184AA17121A9E53E3B68A371A89CB017BC659FF87308A7807B28EE9D00768
2,956,282 UART: [art] SIG.R = E9E9DE8D1F6E96E98372C48441B2FE34204FACDC5891F017594F10854B370CD5A1EAC8CE067BA94BE3AAF1246BFA921A
2,963,062 UART: [art] SIG.S = 84E90465C5BECCA1BBD45F70378E7A9500E05E31F3D0F0634E94E331982297AAD51AF7FC050FAB2FEAB1C03C1510FB79
2,986,206 UART: Caliptra RT
2,986,459 UART: [state] CFI Enabled
3,093,977 UART: [rt] RT listening for mailbox commands...
3,094,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,261 UART: [rt]cmd =0x44504543, len=96
3,305,650 >>> mbox cmd response data (6236 bytes)
3,305,651 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,086 UART: [rt]cmd =0x52564348, len=36
3,337,249 >>> mbox cmd response data (8 bytes)
3,337,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,183 UART: [rt]cmd =0x44504543, len=96
3,548,180 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
891,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,763 UART: [kat] SHA2-512-ACC
906,664 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,068 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,291 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,606 >>> mbox cmd response: success
2,770,673 UART: [afmc] ++
2,770,841 UART: [afmc] CDI.KEYID = 6
2,771,204 UART: [afmc] SUBJECT.KEYID = 7
2,771,630 UART: [afmc] AUTHORITY.KEYID = 5
2,807,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,366 UART: [afmc] --
2,850,290 UART: [cold-reset] --
2,851,336 UART: [state] Locking Datavault
2,852,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,263 UART: [state] Locking ICCM
2,853,743 UART: [exit] Launching FMC @ 0x40000130
2,859,072 UART:
2,859,088 UART: Running Caliptra FMC ...
2,859,496 UART:
2,859,639 UART: [state] CFI Enabled
2,870,334 UART: [fht] FMC Alias Private Key: 7
2,978,467 UART: [art] Extend RT PCRs Done
2,978,895 UART: [art] Lock RT PCRs Done
2,980,295 UART: [art] Populate DV Done
2,988,706 UART: [fht] FMC Alias Private Key: 7
2,989,736 UART: [art] Derive CDI
2,990,016 UART: [art] Store in in slot 0x4
3,076,021 UART: [art] Derive Key Pair
3,076,381 UART: [art] Store priv key in slot 0x5
3,089,515 UART: [art] Derive Key Pair - Done
3,104,034 UART: [art] Signing Cert with AUTHO
3,104,514 UART: RITY.KEYID = 7
3,119,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,511 UART: [art] PUB.X = 46928DCC8C8A295CE92588272C8091DB3D5AB45B87364EC4D009D8188B18DF22059F21037E48A57C047551D3DA963F08
3,127,262 UART: [art] PUB.Y = 0B7B34631ED73470404B464237093979B3AEDF8D0EB99896C623313B3FE880044430B78751D9237D967F721B58F250A0
3,134,186 UART: [art] SIG.R = 80C57524FA50090D71003DE22EDA51B749FDE663C784306C0C8DCE45C0F8D233B7E5622FAC956F107E051758416BE5FD
3,140,926 UART: [art] SIG.S = 9B26E3221C2B9B0A69F575D05DA7B7F6905FCF5FE51B099D5AB0842C5689568629A135FA10F2906702274936C363E406
3,164,571 UART: Caliptra RT
3,164,916 UART: [state] CFI Enabled
3,271,996 UART: [rt] RT listening for mailbox commands...
3,272,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,046 UART: [rt]cmd =0x44504543, len=96
3,484,911 >>> mbox cmd response data (6236 bytes)
3,484,912 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,497 UART: [rt]cmd =0x52564348, len=36
3,516,460 >>> mbox cmd response data (8 bytes)
3,516,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,678 UART: [rt]cmd =0x44504543, len=96
3,727,181 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,173 ready_for_fw is high
1,056,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,502 >>> mbox cmd response: success
2,681,004 UART:
2,681,020 UART: Running Caliptra FMC ...
2,681,428 UART:
2,681,571 UART: [state] CFI Enabled
2,691,978 UART: [fht] FMC Alias Private Key: 7
2,800,073 UART: [art] Extend RT PCRs Done
2,800,501 UART: [art] Lock RT PCRs Done
2,802,263 UART: [art] Populate DV Done
2,810,436 UART: [fht] FMC Alias Private Key: 7
2,811,602 UART: [art] Derive CDI
2,811,882 UART: [art] Store in in slot 0x4
2,897,797 UART: [art] Derive Key Pair
2,898,157 UART: [art] Store priv key in slot 0x5
2,911,221 UART: [art] Derive Key Pair - Done
2,925,864 UART: [art] Signing Cert with AUTHO
2,926,344 UART: RITY.KEYID = 7
2,941,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,313 UART: [art] PUB.X = E337636BCA0FA3BCCA734DC3A6F10C808530AABC135F59D5D7889057124C666B38FC1C23171B075D5C724E23A976ECC4
2,949,082 UART: [art] PUB.Y = C4588822BCB642BA80E9CC1E6A92098CDC8DEA1CF4DF37D6DB01424905C3B9C64D3CECF4326EA7A5B2654E949D8FDAA1
2,956,045 UART: [art] SIG.R = 427938E0B96461E10662DA37AEF48CD7D6F3FBD33B66620A40987E222CF57054EFBB6C1E26B1AE1BBB8EC88CD47AD043
2,962,823 UART: [art] SIG.S = B04FC756EF04875D610F24BF8129A49A929F68C57E2D256EAC2F16F99EAA43895D39A0851297A26F0D1E8EC346609D28
2,986,639 UART: Caliptra RT
2,986,984 UART: [state] CFI Enabled
3,094,851 UART: [rt] RT listening for mailbox commands...
3,095,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,749 UART: [rt]cmd =0x44504543, len=96
3,306,691 >>> mbox cmd response data (6236 bytes)
3,306,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,065 UART: [rt]cmd =0x52564348, len=36
3,338,452 >>> mbox cmd response data (8 bytes)
3,338,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,338 UART: [rt]cmd =0x44504543, len=96
3,550,176 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,112 UART:
192,489 UART: Running Caliptra ROM ...
193,622 UART:
193,772 UART: [state] CFI Enabled
264,961 UART: [state] LifecycleState = Unprovisioned
266,934 UART: [state] DebugLocked = No
269,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,396 UART: [kat] SHA2-256
444,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,672 UART: [kat] ++
455,209 UART: [kat] sha1
465,239 UART: [kat] SHA2-256
467,958 UART: [kat] SHA2-384
474,372 UART: [kat] SHA2-512-ACC
476,761 UART: [kat] ECC-384
2,768,272 UART: [kat] HMAC-384Kdf
2,780,297 UART: [kat] LMS
3,970,590 UART: [kat] --
3,973,829 UART: [cold-reset] ++
3,975,199 UART: [fht] Storing FHT @ 0x50003400
3,986,248 UART: [idev] ++
3,986,808 UART: [idev] CDI.KEYID = 6
3,987,723 UART: [idev] SUBJECT.KEYID = 7
3,988,968 UART: [idev] UDS.KEYID = 0
3,989,999 ready_for_fw is high
3,990,201 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,295 UART: [idev] Erasing UDS.KEYID = 0
7,327,359 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,539 UART: [idev] --
7,353,420 UART: [ldev] ++
7,354,009 UART: [ldev] CDI.KEYID = 6
7,354,930 UART: [ldev] SUBJECT.KEYID = 5
7,356,142 UART: [ldev] AUTHORITY.KEYID = 7
7,357,432 UART: [ldev] FE.KEYID = 1
7,404,207 UART: [ldev] Erasing FE.KEYID = 1
10,739,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,859 UART: [ldev] --
13,118,915 UART: [fwproc] Waiting for Commands...
13,121,386 UART: [fwproc] Received command 0x46574c44
13,123,564 UART: [fwproc] Received Image of size 113760 bytes
17,171,209 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,629,305 >>> mbox cmd response: success
17,633,708 UART: [afmc] ++
17,634,327 UART: [afmc] CDI.KEYID = 6
17,635,238 UART: [afmc] SUBJECT.KEYID = 7
17,636,507 UART: [afmc] AUTHORITY.KEYID = 5
20,993,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,307 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,561 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,008 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,804 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,264 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,359,859 UART: [afmc] --
23,363,394 UART: [cold-reset] --
23,366,602 UART: [state] Locking Datavault
23,372,557 UART: [state] Locking PCR0, PCR1 and PCR31
23,374,497 UART: [state] Locking ICCM
23,375,901 UART: [exit] Launching FMC @ 0x40000130
23,384,309 UART:
23,384,548 UART: Running Caliptra FMC ...
23,385,647 UART:
23,385,808 UART: [state] CFI Enabled
23,452,627 UART: [fht] FMC Alias Private Key: 7
25,790,645 UART: [art] Extend RT PCRs Done
25,791,871 UART: [art] Lock RT PCRs Done
25,793,768 UART: [art] Populate DV Done
25,799,013 UART: [fht] FMC Alias Private Key: 7
25,800,509 UART: [art] Derive CDI
25,801,273 UART: [art] Store in in slot 0x4
25,860,909 UART: [art] Derive Key Pair
25,861,950 UART: [art] Store priv key in slot 0x5
29,154,552 UART: [art] Derive Key Pair - Done
29,167,575 UART: [art] Signing Cert with AUTHO
29,168,880 UART: RITY.KEYID = 7
31,456,732 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,245 UART: [art] PUB.X = A2CC890E8F3492213C84055AC44B101170EE17CF88BFC4319342EADFFCDFDCC270EB3151042CDC5C490328843918ED5E
31,465,497 UART: [art] PUB.Y = 26ED6D83F739103DCA741521AED0C8115B8454394FCF75E42759D2210ABD2C06AFED34970F3D1ECE0AA7DD766A78E65C
31,472,781 UART: [art] SIG.R = 877072E310B0EE5A3482940A912574F856C704AF5B4C2EF4771C89DB170930EF266D26D1F7D5BEFD4F4ADC3598D5E2FA
31,480,169 UART: [art] SIG.S = 45E622070AC43CF10B8C9DBBBCC55CE401699F19BA8749A622D64BA4320326D0E40839B9863D4A0F2240C4AAEAE1C524
32,785,438 UART: Caliptra RT
32,786,139 UART: [state] CFI Enabled
32,947,510 UART: [rt] RT listening for mailbox commands...
32,949,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,980,456 UART: [rt]cmd =0x44504543, len=96
38,744,305 >>> mbox cmd response data (6236 bytes)
38,773,422 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,803,588 UART: [rt]cmd =0x52564348, len=36
38,806,189 >>> mbox cmd response data (8 bytes)
38,806,550 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,836,423 UART: [rt]cmd =0x52564348, len=36
38,838,432 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,803,443 ready_for_fw is high
3,804,032 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,864,401 >>> mbox cmd response: success
23,566,158 UART:
23,566,568 UART: Running Caliptra FMC ...
23,567,723 UART:
23,567,887 UART: [state] CFI Enabled
23,638,848 UART: [fht] FMC Alias Private Key: 7
25,977,241 UART: [art] Extend RT PCRs Done
25,978,476 UART: [art] Lock RT PCRs Done
25,980,386 UART: [art] Populate DV Done
25,985,802 UART: [fht] FMC Alias Private Key: 7
25,987,342 UART: [art] Derive CDI
25,988,159 UART: [art] Store in in slot 0x4
26,047,528 UART: [art] Derive Key Pair
26,048,576 UART: [art] Store priv key in slot 0x5
29,341,840 UART: [art] Derive Key Pair - Done
29,354,571 UART: [art] Signing Cert with AUTHO
29,355,877 UART: RITY.KEYID = 7
31,642,845 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,360 UART: [art] PUB.X = A50029801EBB2EB393B155FCA86B4C71855534CBCC180908EA58CD2B4601C30D324F688E4A5EAD6768F21DBC8A5294D4
31,651,639 UART: [art] PUB.Y = 472B225D6D0253EA34E4A6705BA0BC69AA6BD9F1358C16491E57820010110458640A32412EDB266F2630074458DA901E
31,658,828 UART: [art] SIG.R = 285603EF23ACC1D7BA3F62CD7EC487885D787414B775E4B56D2BA477E561162CFD91E1719D7828E3060BC99765BE2E43
31,666,184 UART: [art] SIG.S = A76572A5BF3ABA4B7F79D1E4BF133E69E573D90151B7CB3CE10DC354E497A6BF83962DC612DBE1AA6A1AA4D8DCAA144E
32,970,836 UART: Caliptra RT
32,971,555 UART: [state] CFI Enabled
33,133,713 UART: [rt] RT listening for mailbox commands...
33,135,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,166,733 UART: [rt]cmd =0x44504543, len=96
38,949,921 >>> mbox cmd response data (6236 bytes)
38,979,021 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,009,307 UART: [rt]cmd =0x52564348, len=36
39,011,845 >>> mbox cmd response data (8 bytes)
39,012,279 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,042,348 UART: [rt]cmd =0x52564348, len=36
39,044,053 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
192,754 UART:
193,133 UART: Running Caliptra ROM ...
194,322 UART:
604,101 UART: [state] CFI Enabled
615,555 UART: [state] LifecycleState = Unprovisioned
617,493 UART: [state] DebugLocked = No
619,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,571 UART: [kat] SHA2-256
795,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,905 UART: [kat] ++
806,377 UART: [kat] sha1
817,126 UART: [kat] SHA2-256
819,826 UART: [kat] SHA2-384
826,241 UART: [kat] SHA2-512-ACC
828,603 UART: [kat] ECC-384
3,111,389 UART: [kat] HMAC-384Kdf
3,123,410 UART: [kat] LMS
4,313,496 UART: [kat] --
4,317,013 UART: [cold-reset] ++
4,318,879 UART: [fht] Storing FHT @ 0x50003400
4,330,520 UART: [idev] ++
4,331,116 UART: [idev] CDI.KEYID = 6
4,331,998 UART: [idev] SUBJECT.KEYID = 7
4,333,239 UART: [idev] UDS.KEYID = 0
4,334,211 ready_for_fw is high
4,334,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,131 UART: [idev] Erasing UDS.KEYID = 0
7,623,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,768 UART: [idev] --
7,650,140 UART: [ldev] ++
7,650,760 UART: [ldev] CDI.KEYID = 6
7,651,733 UART: [ldev] SUBJECT.KEYID = 5
7,652,883 UART: [ldev] AUTHORITY.KEYID = 7
7,654,160 UART: [ldev] FE.KEYID = 1
7,664,041 UART: [ldev] Erasing FE.KEYID = 1
10,947,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,654 UART: [ldev] --
13,306,495 UART: [fwproc] Waiting for Commands...
13,308,967 UART: [fwproc] Received command 0x46574c44
13,311,142 UART: [fwproc] Received Image of size 113760 bytes
17,362,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,041 >>> mbox cmd response: success
17,821,184 UART: [afmc] ++
17,821,796 UART: [afmc] CDI.KEYID = 6
17,822,681 UART: [afmc] SUBJECT.KEYID = 7
17,823,946 UART: [afmc] AUTHORITY.KEYID = 5
21,136,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,429,366 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,431,616 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,446,023 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,460,875 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,475,306 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,497,967 UART: [afmc] --
23,501,614 UART: [cold-reset] --
23,503,421 UART: [state] Locking Datavault
23,508,028 UART: [state] Locking PCR0, PCR1 and PCR31
23,509,790 UART: [state] Locking ICCM
23,512,259 UART: [exit] Launching FMC @ 0x40000130
23,520,655 UART:
23,520,886 UART: Running Caliptra FMC ...
23,521,984 UART:
23,522,144 UART: [state] CFI Enabled
23,530,513 UART: [fht] FMC Alias Private Key: 7
25,861,415 UART: [art] Extend RT PCRs Done
25,862,637 UART: [art] Lock RT PCRs Done
25,864,121 UART: [art] Populate DV Done
25,869,391 UART: [fht] FMC Alias Private Key: 7
25,871,089 UART: [art] Derive CDI
25,871,904 UART: [art] Store in in slot 0x4
25,914,340 UART: [art] Derive Key Pair
25,915,335 UART: [art] Store priv key in slot 0x5
29,157,005 UART: [art] Derive Key Pair - Done
29,170,062 UART: [art] Signing Cert with AUTHO
29,171,374 UART: RITY.KEYID = 7
31,450,530 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,045 UART: [art] PUB.X = CCA44742AC8FD74ED225F789D17419B4FC180D233FAB17F61382684F094CEFCE03A6BFE393D8B1A450865678769417B6
31,459,275 UART: [art] PUB.Y = EE9C741E3B53E9B730EB34F326E953952DA8D6246C3070180F5A55B8EF58858416CBD0F1797ECD1F92FFDDD0E49CEAFE
31,466,524 UART: [art] SIG.R = 2DCA4879440F0B236A31A9D6AFF53298073620AE20B79A97C3F85B49635EFC068270F6A34EA3E0E895DAF41FE6ABBB2A
31,473,942 UART: [art] SIG.S = 088B7D3819E469A4CBE52D9B67AF3AF9DD0E3CF642F0324C79C45EBFBF7DF6C2F48E7EE02785D31D1099BBCB6021BA60
32,778,131 UART: Caliptra RT
32,778,833 UART: [state] CFI Enabled
32,895,398 UART: [rt] RT listening for mailbox commands...
32,897,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,928,042 UART: [rt]cmd =0x44504543, len=96
38,599,260 >>> mbox cmd response data (6236 bytes)
38,628,457 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,658,641 UART: [rt]cmd =0x52564348, len=36
38,661,221 >>> mbox cmd response data (8 bytes)
38,661,669 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,691,578 UART: [rt]cmd =0x52564348, len=36
38,693,337 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,610 writing to cptra_bootfsm_go
4,127,663 ready_for_fw is high
4,128,322 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,075,193 >>> mbox cmd response: success
23,719,834 UART:
23,720,255 UART: Running Caliptra FMC ...
23,721,393 UART:
23,721,551 UART: [state] CFI Enabled
23,729,676 UART: [fht] FMC Alias Private Key: 7
26,060,287 UART: [art] Extend RT PCRs Done
26,061,512 UART: [art] Lock RT PCRs Done
26,063,085 UART: [art] Populate DV Done
26,068,446 UART: [fht] FMC Alias Private Key: 7
26,070,106 UART: [art] Derive CDI
26,070,920 UART: [art] Store in in slot 0x4
26,113,469 UART: [art] Derive Key Pair
26,114,469 UART: [art] Store priv key in slot 0x5
29,356,742 UART: [art] Derive Key Pair - Done
29,369,826 UART: [art] Signing Cert with AUTHO
29,371,339 UART: RITY.KEYID = 7
31,650,211 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,744 UART: [art] PUB.X = 4FE481DB44CF3068C1A4AC28F50D170C54D06DD1BB6CBF21EEDA5E30EAD9163CF997634C05B8AB955D5FC30482FFDCE8
31,659,039 UART: [art] PUB.Y = 231379483FBD2C08E553A07B2BE14F4DE57462F63B701591D228D4C17535165F6054251133198DA1EF4297B3BC79B335
31,666,225 UART: [art] SIG.R = B679206B8DD254462A740CE96B4E5B7BAFF8AF98983A10C6328C296C784DD3DE872E6F2A2B34D9273477A1B9D91F4C43
31,673,620 UART: [art] SIG.S = 7D9AC793D5A51DB09C96CB09B9B4E6AB0950D27B514D25520A020CEA866B0CFBDFD8986223B76C13884FCA33A0F71E52
32,978,988 UART: Caliptra RT
32,979,702 UART: [state] CFI Enabled
33,097,644 UART: [rt] RT listening for mailbox commands...
33,099,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,130,431 UART: [rt]cmd =0x44504543, len=96
38,801,789 >>> mbox cmd response data (6236 bytes)
38,831,141 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,861,278 UART: [rt]cmd =0x52564348, len=36
38,863,858 >>> mbox cmd response data (8 bytes)
38,864,204 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,894,434 UART: [rt]cmd =0x52564348, len=36
38,896,247 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,564 UART:
192,937 UART: Running Caliptra ROM ...
194,095 UART:
194,247 UART: [state] CFI Enabled
264,878 UART: [state] LifecycleState = Unprovisioned
266,748 UART: [state] DebugLocked = No
268,275 UART: [state] WD Timer not started. Device not locked for debugging
272,528 UART: [kat] SHA2-256
451,582 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,171 UART: [kat] ++
463,615 UART: [kat] sha1
473,985 UART: [kat] SHA2-256
476,999 UART: [kat] SHA2-384
482,153 UART: [kat] SHA2-512-ACC
485,084 UART: [kat] ECC-384
2,946,903 UART: [kat] HMAC-384Kdf
2,969,309 UART: [kat] LMS
3,498,791 UART: [kat] --
3,503,919 UART: [cold-reset] ++
3,504,777 UART: [fht] FHT @ 0x50003400
3,516,108 UART: [idev] ++
3,516,680 UART: [idev] CDI.KEYID = 6
3,517,562 UART: [idev] SUBJECT.KEYID = 7
3,518,797 UART: [idev] UDS.KEYID = 0
3,519,721 ready_for_fw is high
3,519,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,407 UART: [idev] Erasing UDS.KEYID = 0
6,026,227 UART: [idev] Sha1 KeyId Algorithm
6,049,186 UART: [idev] --
6,053,087 UART: [ldev] ++
6,053,703 UART: [ldev] CDI.KEYID = 6
6,054,593 UART: [ldev] SUBJECT.KEYID = 5
6,055,755 UART: [ldev] AUTHORITY.KEYID = 7
6,056,986 UART: [ldev] FE.KEYID = 1
6,099,709 UART: [ldev] Erasing FE.KEYID = 1
8,602,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,612 UART: [ldev] --
10,412,033 UART: [fwproc] Wait for Commands...
10,413,540 UART: [fwproc] Recv command 0x46574c44
10,415,629 UART: [fwproc] Recv'd Img size: 114084 bytes
13,817,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,271,864 >>> mbox cmd response: success
14,275,925 UART: [afmc] ++
14,276,577 UART: [afmc] CDI.KEYID = 6
14,277,469 UART: [afmc] SUBJECT.KEYID = 7
14,278,630 UART: [afmc] AUTHORITY.KEYID = 5
16,806,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,184 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,697 UART: [afmc] --
18,608,664 UART: [cold-reset] --
18,612,947 UART: [state] Locking Datavault
18,617,786 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,433 UART: [state] Locking ICCM
18,621,689 UART: [exit] Launching FMC @ 0x40000130
18,630,083 UART:
18,630,321 UART: Running Caliptra FMC ...
18,631,420 UART:
18,631,577 UART: [state] CFI Enabled
18,689,938 UART: [fht] FMC Alias Private Key: 7
20,452,811 UART: [art] Extend RT PCRs Done
20,454,036 UART: [art] Lock RT PCRs Done
20,455,686 UART: [art] Populate DV Done
20,460,823 UART: [fht] FMC Alias Private Key: 7
20,462,369 UART: [art] Derive CDI
20,463,179 UART: [art] Store in in slot 0x4
20,522,495 UART: [art] Derive Key Pair
20,523,534 UART: [art] Store priv key in slot 0x5
22,986,544 UART: [art] Derive Key Pair - Done
22,999,966 UART: [art] Signing Cert with AUTHO
23,001,276 UART: RITY.KEYID = 7
24,712,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,028 UART: [art] PUB.X = 9622FAD0CE01511F4EE52EC74946F948546CAFE850295B7FA87DF763343852B08B776B11AFC1D1205ACC7F86EF0AF36E
24,721,298 UART: [art] PUB.Y = 3F9C48757AD622EFB25324FEB5E54531DB8F68BAC4551BAEE7425366C07A518530C1750AC14967AF5657B465A340DB28
24,728,546 UART: [art] SIG.R = 8FF1D20622FE43579C7EE639D50CA5CA4C21BD43B0E7D04F6496B413FD4634DFB4AA1AC7A003E0ED1E33FBDCFD748A06
24,735,991 UART: [art] SIG.S = 5A8AEEE0D86CCCFCFC2CDF3AE491BC43CE8FCC9E67D6A9A7904A0F647AC019A14711AF8A707166AD0296F9344E0E9E71
25,715,245 UART: Caliptra RT
25,715,949 UART: [state] CFI Enabled
25,880,685 UART: [rt] RT listening for mailbox commands...
25,882,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,913,527 UART: [rt]cmd =0x44504543, len=96
30,271,571 >>> mbox cmd response data (6236 bytes)
30,300,719 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,330,777 UART: [rt]cmd =0x52564348, len=36
30,333,554 >>> mbox cmd response data (8 bytes)
30,333,924 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,364,078 UART: [rt]cmd =0x52564348, len=36
30,365,883 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,381,881 ready_for_fw is high
3,382,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,451 >>> mbox cmd response: success
18,345,196 UART:
18,345,606 UART: Running Caliptra FMC ...
18,346,727 UART:
18,346,882 UART: [state] CFI Enabled
18,411,697 UART: [fht] FMC Alias Private Key: 7
20,175,974 UART: [art] Extend RT PCRs Done
20,177,194 UART: [art] Lock RT PCRs Done
20,178,998 UART: [art] Populate DV Done
20,184,561 UART: [fht] FMC Alias Private Key: 7
20,186,163 UART: [art] Derive CDI
20,186,976 UART: [art] Store in in slot 0x4
20,244,602 UART: [art] Derive Key Pair
20,245,596 UART: [art] Store priv key in slot 0x5
22,708,453 UART: [art] Derive Key Pair - Done
22,721,178 UART: [art] Signing Cert with AUTHO
22,722,478 UART: RITY.KEYID = 7
24,434,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,585 UART: [art] PUB.X = B3641EF4D100308D97D8C3B9E9EA7226E08AA18161BC37B84CC2F59CB1C8F0B20C9BBF818024D5BA9909F690320F55D6
24,442,878 UART: [art] PUB.Y = D33657D6BB8FCA1F345150C43520C5EE7D717682C1628199CDE7DDC1A40C93FEA00F01E04E97653E193646C132682ADB
24,450,117 UART: [art] SIG.R = 865F3E5621FF07605DCE09ABFA0C919B6265EE79B34FC594159A88090317FA1B2A5A9D4FD5BB7F2F34053EB3871A1A13
24,457,542 UART: [art] SIG.S = 149E085E345EE632CB2210118711E9C8F899F588A66CD5B50CCB9702018DA951396C283F35EAF93EACC54847C2362F1D
25,436,254 UART: Caliptra RT
25,436,975 UART: [state] CFI Enabled
25,602,420 UART: [rt] RT listening for mailbox commands...
25,604,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,635,517 UART: [rt]cmd =0x44504543, len=96
29,993,090 >>> mbox cmd response data (6236 bytes)
30,022,549 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,052,568 UART: [rt]cmd =0x52564348, len=36
30,054,902 >>> mbox cmd response data (8 bytes)
30,055,236 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,085,297 UART: [rt]cmd =0x52564348, len=36
30,087,053 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,874 UART:
193,253 UART: Running Caliptra ROM ...
194,376 UART:
604,020 UART: [state] CFI Enabled
617,897 UART: [state] LifecycleState = Unprovisioned
619,764 UART: [state] DebugLocked = No
621,282 UART: [state] WD Timer not started. Device not locked for debugging
625,804 UART: [kat] SHA2-256
804,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,484 UART: [kat] ++
816,934 UART: [kat] sha1
828,811 UART: [kat] SHA2-256
831,800 UART: [kat] SHA2-384
837,725 UART: [kat] SHA2-512-ACC
840,732 UART: [kat] ECC-384
3,282,816 UART: [kat] HMAC-384Kdf
3,296,330 UART: [kat] LMS
3,825,805 UART: [kat] --
3,831,930 UART: [cold-reset] ++
3,834,440 UART: [fht] FHT @ 0x50003400
3,846,058 UART: [idev] ++
3,846,625 UART: [idev] CDI.KEYID = 6
3,847,604 UART: [idev] SUBJECT.KEYID = 7
3,848,778 UART: [idev] UDS.KEYID = 0
3,849,704 ready_for_fw is high
3,849,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,588 UART: [idev] Erasing UDS.KEYID = 0
6,320,519 UART: [idev] Sha1 KeyId Algorithm
6,344,515 UART: [idev] --
6,348,536 UART: [ldev] ++
6,349,129 UART: [ldev] CDI.KEYID = 6
6,350,045 UART: [ldev] SUBJECT.KEYID = 5
6,351,211 UART: [ldev] AUTHORITY.KEYID = 7
6,352,498 UART: [ldev] FE.KEYID = 1
6,364,821 UART: [ldev] Erasing FE.KEYID = 1
8,835,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,074 UART: [ldev] --
10,627,892 UART: [fwproc] Wait for Commands...
10,630,152 UART: [fwproc] Recv command 0x46574c44
10,632,246 UART: [fwproc] Recv'd Img size: 114084 bytes
14,036,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,502,181 >>> mbox cmd response: success
14,506,644 UART: [afmc] ++
14,507,288 UART: [afmc] CDI.KEYID = 6
14,508,183 UART: [afmc] SUBJECT.KEYID = 7
14,509,342 UART: [afmc] AUTHORITY.KEYID = 5
17,008,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,651 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,002 UART: [afmc] --
18,804,416 UART: [cold-reset] --
18,808,733 UART: [state] Locking Datavault
18,813,824 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,471 UART: [state] Locking ICCM
18,817,138 UART: [exit] Launching FMC @ 0x40000130
18,825,551 UART:
18,825,834 UART: Running Caliptra FMC ...
18,826,946 UART:
18,827,121 UART: [state] CFI Enabled
18,835,064 UART: [fht] FMC Alias Private Key: 7
20,591,424 UART: [art] Extend RT PCRs Done
20,592,649 UART: [art] Lock RT PCRs Done
20,594,411 UART: [art] Populate DV Done
20,599,930 UART: [fht] FMC Alias Private Key: 7
20,601,632 UART: [art] Derive CDI
20,602,450 UART: [art] Store in in slot 0x4
20,645,208 UART: [art] Derive Key Pair
20,646,224 UART: [art] Store priv key in slot 0x5
23,072,895 UART: [art] Derive Key Pair - Done
23,085,991 UART: [art] Signing Cert with AUTHO
23,087,303 UART: RITY.KEYID = 7
24,793,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,623 UART: [art] PUB.X = BF326ED7FBF9E6EE6020878D2C7CCEDDF6DA4CC7A912D20D46E91828AD9276C79059EF8852FC9F39F804AF381BD5C528
24,801,911 UART: [art] PUB.Y = 713BA784AE6241A5EEC377158B27F5B41366F2833DF29E756F74BED0D7F10B57D5020751B09ADAFFB9EA88301ECB12DB
24,809,173 UART: [art] SIG.R = E4F6F48CE19FCBD3E68FF03317A4398E0EF399A192BAC679D363870B981544BA24A4F703D8DEEC69892A500D3728A4EB
24,816,541 UART: [art] SIG.S = 5361AAA9FFB64AF4E7E82DA151ABF2989C2E323A47C4AB23A2FFCDF34A9B26937E7E8E5A01612C8EC22943E8EA6744EC
25,795,776 UART: Caliptra RT
25,796,470 UART: [state] CFI Enabled
25,912,988 UART: [rt] RT listening for mailbox commands...
25,914,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,945,441 UART: [rt]cmd =0x44504543, len=96
30,228,416 >>> mbox cmd response data (6236 bytes)
30,257,725 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,287,819 UART: [rt]cmd =0x52564348, len=36
30,290,122 >>> mbox cmd response data (8 bytes)
30,290,571 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,320,639 UART: [rt]cmd =0x52564348, len=36
30,322,445 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,742 writing to cptra_bootfsm_go
3,693,838 ready_for_fw is high
3,694,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,254,965 >>> mbox cmd response: success
18,504,961 UART:
18,505,392 UART: Running Caliptra FMC ...
18,506,531 UART:
18,506,694 UART: [state] CFI Enabled
18,514,588 UART: [fht] FMC Alias Private Key: 7
20,271,473 UART: [art] Extend RT PCRs Done
20,272,708 UART: [art] Lock RT PCRs Done
20,274,418 UART: [art] Populate DV Done
20,279,671 UART: [fht] FMC Alias Private Key: 7
20,281,216 UART: [art] Derive CDI
20,281,984 UART: [art] Store in in slot 0x4
20,324,685 UART: [art] Derive Key Pair
20,325,691 UART: [art] Store priv key in slot 0x5
22,752,729 UART: [art] Derive Key Pair - Done
22,765,675 UART: [art] Signing Cert with AUTHO
22,766,980 UART: RITY.KEYID = 7
24,472,446 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,947 UART: [art] PUB.X = 703ED5F3D2F93C3E03763F0038D3DB797BA8C82F8DBAE9605C757B62A805465FCE7E59E854D503CF532C5C83127A3D9C
24,481,237 UART: [art] PUB.Y = 6B76064138DF45E2B3933D47ABD55A24551218E15DBD7F521DFA4917FCC6EE130ABA247FAF7E963EC2E6152F486221F2
24,488,460 UART: [art] SIG.R = B3FF19F0BD37BC53D9AD67D3A0AE40A2BD8F0D8C63D8BE5641F59BB9CC676500E374EA9752F306DFD018E230A63D305A
24,495,868 UART: [art] SIG.S = ADCC586D4878B79EE35E39050888C0460553881DB4A95FC5149C226AB262D9E62FCCC5B7F478CCBD33030C2886CE5A08
25,474,945 UART: Caliptra RT
25,475,648 UART: [state] CFI Enabled
25,593,627 UART: [rt] RT listening for mailbox commands...
25,595,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,626,416 UART: [rt]cmd =0x44504543, len=96
29,909,165 >>> mbox cmd response data (6236 bytes)
29,938,695 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,968,932 UART: [rt]cmd =0x52564348, len=36
29,971,452 >>> mbox cmd response data (8 bytes)
29,971,782 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,001,513 UART: [rt]cmd =0x52564348, len=36
30,003,172 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
192,689 UART:
193,067 UART: Running Caliptra ROM ...
194,265 UART:
194,419 UART: [state] CFI Enabled
261,093 UART: [state] LifecycleState = Unprovisioned
263,512 UART: [state] DebugLocked = No
265,966 UART: [state] WD Timer not started. Device not locked for debugging
270,501 UART: [kat] SHA2-256
460,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,109 UART: [kat] ++
471,592 UART: [kat] sha1
483,530 UART: [kat] SHA2-256
486,541 UART: [kat] SHA2-384
493,187 UART: [kat] SHA2-512-ACC
495,767 UART: [kat] ECC-384
2,949,462 UART: [kat] HMAC-384Kdf
2,972,359 UART: [kat] LMS
3,504,099 UART: [kat] --
3,507,180 UART: [cold-reset] ++
3,508,751 UART: [fht] FHT @ 0x50003400
3,521,503 UART: [idev] ++
3,522,211 UART: [idev] CDI.KEYID = 6
3,523,239 UART: [idev] SUBJECT.KEYID = 7
3,524,438 UART: [idev] UDS.KEYID = 0
3,525,339 ready_for_fw is high
3,525,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,000 UART: [idev] Erasing UDS.KEYID = 0
6,027,162 UART: [idev] Sha1 KeyId Algorithm
6,050,119 UART: [idev] --
6,055,584 UART: [ldev] ++
6,056,321 UART: [ldev] CDI.KEYID = 6
6,057,234 UART: [ldev] SUBJECT.KEYID = 5
6,058,559 UART: [ldev] AUTHORITY.KEYID = 7
6,059,761 UART: [ldev] FE.KEYID = 1
6,099,683 UART: [ldev] Erasing FE.KEYID = 1
8,607,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,097 UART: [ldev] --
10,416,286 UART: [fwproc] Wait for Commands...
10,419,245 UART: [fwproc] Recv command 0x46574c44
10,421,545 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,330 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,354 >>> mbox cmd response: success
14,604,230 UART: [afmc] ++
14,604,957 UART: [afmc] CDI.KEYID = 6
14,606,149 UART: [afmc] SUBJECT.KEYID = 7
14,607,586 UART: [afmc] AUTHORITY.KEYID = 5
17,149,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,172 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,967 UART: [afmc] --
18,948,702 UART: [cold-reset] --
18,952,951 UART: [state] Locking Datavault
18,958,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,173 UART: [state] Locking ICCM
18,962,744 UART: [exit] Launching FMC @ 0x40000130
18,971,428 UART:
18,971,666 UART: Running Caliptra FMC ...
18,972,768 UART:
18,972,923 UART: [state] CFI Enabled
19,032,045 UART: [fht] FMC Alias Private Key: 7
20,796,533 UART: [art] Extend RT PCRs Done
20,797,752 UART: [art] Lock RT PCRs Done
20,799,406 UART: [art] Populate DV Done
20,804,814 UART: [fht] FMC Alias Private Key: 7
20,806,343 UART: [art] Derive CDI
20,807,072 UART: [art] Store in in slot 0x4
20,864,652 UART: [art] Derive Key Pair
20,865,683 UART: [art] Store priv key in slot 0x5
23,328,475 UART: [art] Derive Key Pair - Done
23,341,517 UART: [art] Signing Cert with AUTHO
23,342,854 UART: RITY.KEYID = 7
25,054,974 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,490 UART: [art] PUB.X = 1A42F0BCC00F8E05BE3031ADDE0F3AE91E86E4A6F31548A3793267C306B39327096C142D8C26B03909EC4DBAA9AC8DF4
25,063,719 UART: [art] PUB.Y = 5BAD2964472C19D2641F74AEE7AF8F7F51F15289A5B5F17E42BD0705276B716E67A9AF5D860955916D10F027A0FD4D08
25,071,020 UART: [art] SIG.R = D501A9FA824303ED6B2CE1C4D42A1CF0FFF4D179FB3B54D53459F0149CB08B5B1FEDAAAD39618FCAB042462E8B104A79
25,078,389 UART: [art] SIG.S = 490A943798CA871E7C15F6EF8F38DA37BD9CF3FE124F9E1DC9343887D3FF1DC9DEBCA6FE0691076835232CE600E9B251
26,057,454 UART: Caliptra RT
26,058,168 UART: [state] CFI Enabled
26,223,390 UART: [rt] RT listening for mailbox commands...
26,225,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,256,377 UART: [rt]cmd =0x44504543, len=96
30,614,736 >>> mbox cmd response data (6236 bytes)
30,644,067 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,673,923 UART: [rt]cmd =0x52564348, len=36
30,676,815 >>> mbox cmd response data (8 bytes)
30,677,269 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,707,204 UART: [rt]cmd =0x52564348, len=36
30,709,270 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,442,803 ready_for_fw is high
3,443,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,733,226 >>> mbox cmd response: success
19,049,837 UART:
19,050,251 UART: Running Caliptra FMC ...
19,051,451 UART:
19,051,631 UART: [state] CFI Enabled
19,118,272 UART: [fht] FMC Alias Private Key: 7
20,881,803 UART: [art] Extend RT PCRs Done
20,883,035 UART: [art] Lock RT PCRs Done
20,884,779 UART: [art] Populate DV Done
20,890,235 UART: [fht] FMC Alias Private Key: 7
20,891,947 UART: [art] Derive CDI
20,892,764 UART: [art] Store in in slot 0x4
20,950,339 UART: [art] Derive Key Pair
20,951,347 UART: [art] Store priv key in slot 0x5
23,413,748 UART: [art] Derive Key Pair - Done
23,426,815 UART: [art] Signing Cert with AUTHO
23,428,122 UART: RITY.KEYID = 7
25,139,506 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,012 UART: [art] PUB.X = A1CB959322A870529B0339C0FC8AE478E49D06862848329F85C065FBA1AD252B0DAD095387D8B7505A19A7AAADF1FDAC
25,148,256 UART: [art] PUB.Y = 003222060BF2EC41095AC0CB39F152B68201C5087F50255A19A88D2025C782F970A3B630A4CD125204ABCBB6DF1D461B
25,155,503 UART: [art] SIG.R = 6A7AD30BBFE21A1409E06747F537CBED1749EFAB9C9B69A3EA33873776AA3781CE2A1902EC214CA48BA3A8C04206A010
25,162,918 UART: [art] SIG.S = 58F1DBA89793A473B22DCAAD265B308A4C9489E6307469719FE81C279AE50071351F233B8F28DD4CB3FFACFB283A03F8
26,141,490 UART: Caliptra RT
26,142,192 UART: [state] CFI Enabled
26,308,058 UART: [rt] RT listening for mailbox commands...
26,309,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,130 UART: [rt]cmd =0x44504543, len=96
30,699,490 >>> mbox cmd response data (6236 bytes)
30,728,875 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,759,289 UART: [rt]cmd =0x52564348, len=36
30,761,837 >>> mbox cmd response data (8 bytes)
30,762,256 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,792,278 UART: [rt]cmd =0x52564348, len=36
30,794,095 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,708 writing to cptra_bootfsm_go
193,018 UART:
193,446 UART: Running Caliptra ROM ...
194,608 UART:
604,030 UART: [state] CFI Enabled
617,064 UART: [state] LifecycleState = Unprovisioned
619,448 UART: [state] DebugLocked = No
622,327 UART: [state] WD Timer not started. Device not locked for debugging
627,433 UART: [kat] SHA2-256
817,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,061 UART: [kat] ++
828,666 UART: [kat] sha1
839,996 UART: [kat] SHA2-256
842,970 UART: [kat] SHA2-384
850,389 UART: [kat] SHA2-512-ACC
852,972 UART: [kat] ECC-384
3,295,537 UART: [kat] HMAC-384Kdf
3,307,480 UART: [kat] LMS
3,839,346 UART: [kat] --
3,844,924 UART: [cold-reset] ++
3,845,871 UART: [fht] FHT @ 0x50003400
3,855,999 UART: [idev] ++
3,856,647 UART: [idev] CDI.KEYID = 6
3,857,680 UART: [idev] SUBJECT.KEYID = 7
3,858,856 UART: [idev] UDS.KEYID = 0
3,859,793 ready_for_fw is high
3,859,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,354 UART: [idev] Erasing UDS.KEYID = 0
6,335,577 UART: [idev] Sha1 KeyId Algorithm
6,358,402 UART: [idev] --
6,362,844 UART: [ldev] ++
6,363,531 UART: [ldev] CDI.KEYID = 6
6,364,445 UART: [ldev] SUBJECT.KEYID = 5
6,365,658 UART: [ldev] AUTHORITY.KEYID = 7
6,366,833 UART: [ldev] FE.KEYID = 1
6,378,417 UART: [ldev] Erasing FE.KEYID = 1
8,853,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,531 UART: [ldev] --
10,643,850 UART: [fwproc] Wait for Commands...
10,645,454 UART: [fwproc] Recv command 0x46574c44
10,647,709 UART: [fwproc] Recv'd Img size: 114084 bytes
14,091,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,830,773 >>> mbox cmd response: success
14,834,654 UART: [afmc] ++
14,835,399 UART: [afmc] CDI.KEYID = 6
14,836,532 UART: [afmc] SUBJECT.KEYID = 7
14,838,034 UART: [afmc] AUTHORITY.KEYID = 5
17,338,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,673 UART: [afmc] --
19,136,167 UART: [cold-reset] --
19,139,392 UART: [state] Locking Datavault
19,145,359 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,568 UART: [state] Locking ICCM
19,150,212 UART: [exit] Launching FMC @ 0x40000130
19,158,861 UART:
19,159,143 UART: Running Caliptra FMC ...
19,160,278 UART:
19,160,437 UART: [state] CFI Enabled
19,168,489 UART: [fht] FMC Alias Private Key: 7
20,925,363 UART: [art] Extend RT PCRs Done
20,926,582 UART: [art] Lock RT PCRs Done
20,928,750 UART: [art] Populate DV Done
20,934,272 UART: [fht] FMC Alias Private Key: 7
20,935,812 UART: [art] Derive CDI
20,936,552 UART: [art] Store in in slot 0x4
20,979,625 UART: [art] Derive Key Pair
20,980,626 UART: [art] Store priv key in slot 0x5
23,407,123 UART: [art] Derive Key Pair - Done
23,420,175 UART: [art] Signing Cert with AUTHO
23,421,483 UART: RITY.KEYID = 7
25,126,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,457 UART: [art] PUB.X = B480CB57E6F5893C3820F0780A41782E763BBD8690D6E67E544E87082AB5DF5346D0C59B129BF0CE9B269474DD6E348D
25,135,746 UART: [art] PUB.Y = A22465B6947F153917DB28F7B6FF49FD5C21C5CFC87F082446E86AECA2B687F78A5E6AEFE72278AC3A8D5593287D4FA2
25,142,998 UART: [art] SIG.R = B85C582A0AAA334B97FF5475F498E59D7CB9F46C79244564421F2E0177103EE6059815AC1C3EC623D07368CD671A0642
25,150,368 UART: [art] SIG.S = 528480A1CD9F26A414BBD78BD315AB7A877D8D7A90F56B2D89B273DFAC861EEEB94A8E2D9E380CD421A3FC6B83C394B6
26,128,838 UART: Caliptra RT
26,129,541 UART: [state] CFI Enabled
26,247,466 UART: [rt] RT listening for mailbox commands...
26,249,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,914 UART: [rt]cmd =0x44504543, len=96
30,563,231 >>> mbox cmd response data (6236 bytes)
30,592,456 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,622,484 UART: [rt]cmd =0x52564348, len=36
30,624,843 >>> mbox cmd response data (8 bytes)
30,625,219 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,655,065 UART: [rt]cmd =0x52564348, len=36
30,656,767 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,614 writing to cptra_bootfsm_go
3,759,048 ready_for_fw is high
3,759,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,961,401 >>> mbox cmd response: success
19,212,027 UART:
19,212,429 UART: Running Caliptra FMC ...
19,213,562 UART:
19,213,722 UART: [state] CFI Enabled
19,221,889 UART: [fht] FMC Alias Private Key: 7
20,979,050 UART: [art] Extend RT PCRs Done
20,980,278 UART: [art] Lock RT PCRs Done
20,981,448 UART: [art] Populate DV Done
20,986,652 UART: [fht] FMC Alias Private Key: 7
20,988,252 UART: [art] Derive CDI
20,989,090 UART: [art] Store in in slot 0x4
21,031,693 UART: [art] Derive Key Pair
21,032,703 UART: [art] Store priv key in slot 0x5
23,459,605 UART: [art] Derive Key Pair - Done
23,472,606 UART: [art] Signing Cert with AUTHO
23,473,914 UART: RITY.KEYID = 7
25,179,024 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,533 UART: [art] PUB.X = 25F32D7AC725ADA39CC12766A0B15C92DC205D58B21B47B028DEE99EC964FA942A6C5C8D265987E350C24C8ECCB26DE2
25,187,774 UART: [art] PUB.Y = 0A5FDACB9AD049C0579A81CFD0A1A8E35F5C0C978F1CFAF74D79A3F26895194E8197934B7E1A2BE39D9FF85E6EFFD998
25,195,066 UART: [art] SIG.R = 319457DFD47363DCBFCA4CF802B1A3C553246E532371F2FE4C32312B98A0368860EFCD9205CD7B4FC43B26C39AD89D33
25,202,492 UART: [art] SIG.S = 61BB2552DBEBF650D72E3366BE22EC17AE7DFB7BA241D74A99196D0537C0399D2DB6CF81457DD3A64BC258B223863E9C
26,181,395 UART: Caliptra RT
26,182,083 UART: [state] CFI Enabled
26,299,374 UART: [rt] RT listening for mailbox commands...
26,301,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,755 UART: [rt]cmd =0x44504543, len=96
30,615,038 >>> mbox cmd response data (6236 bytes)
30,644,279 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,674,456 UART: [rt]cmd =0x52564348, len=36
30,677,058 >>> mbox cmd response data (8 bytes)
30,677,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,707,399 UART: [rt]cmd =0x52564348, len=36
30,709,206 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,711 UART: [kat] SHA2-256
881,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,757 UART: [kat] ++
885,909 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
901,958 UART: [kat] HMAC-384Kdf
906,380 UART: [kat] LMS
1,474,576 UART: [kat] --
1,475,561 UART: [cold-reset] ++
1,475,909 UART: [fht] Storing FHT @ 0x50003400
1,478,740 UART: [idev] ++
1,478,908 UART: [idev] CDI.KEYID = 6
1,479,268 UART: [idev] SUBJECT.KEYID = 7
1,479,692 UART: [idev] UDS.KEYID = 0
1,480,037 ready_for_fw is high
1,480,037 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,722 UART: [idev] Erasing UDS.KEYID = 0
1,504,264 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,886 UART: [idev] --
1,514,049 UART: [ldev] ++
1,514,217 UART: [ldev] CDI.KEYID = 6
1,514,580 UART: [ldev] SUBJECT.KEYID = 5
1,515,006 UART: [ldev] AUTHORITY.KEYID = 7
1,515,469 UART: [ldev] FE.KEYID = 1
1,520,769 UART: [ldev] Erasing FE.KEYID = 1
1,545,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,070 UART: [ldev] --
1,584,409 UART: [fwproc] Waiting for Commands...
1,585,238 UART: [fwproc] Received command 0x46574c44
1,586,029 UART: [fwproc] Received Image of size 114084 bytes
2,881,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,700 >>> mbox cmd response: success
3,073,832 UART: [afmc] ++
3,074,000 UART: [afmc] CDI.KEYID = 6
3,074,362 UART: [afmc] SUBJECT.KEYID = 7
3,074,787 UART: [afmc] AUTHORITY.KEYID = 5
3,109,336 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,584 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,137,977 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,667 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,518 UART: [afmc] --
3,152,504 UART: [cold-reset] --
3,153,456 UART: [state] Locking Datavault
3,154,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,139 UART: [state] Locking ICCM
3,155,615 UART: [exit] Launching FMC @ 0x40000130
3,160,944 UART:
3,160,960 UART: Running Caliptra FMC ...
3,161,368 UART:
3,161,422 UART: [state] CFI Enabled
3,171,543 UART: [fht] FMC Alias Private Key: 7
3,280,110 UART: [art] Extend RT PCRs Done
3,280,538 UART: [art] Lock RT PCRs Done
3,282,030 UART: [art] Populate DV Done
3,290,193 UART: [fht] FMC Alias Private Key: 7
3,291,127 UART: [art] Derive CDI
3,291,407 UART: [art] Store in in slot 0x4
3,377,122 UART: [art] Derive Key Pair
3,377,482 UART: [art] Store priv key in slot 0x5
3,391,378 UART: [art] Derive Key Pair - Done
3,406,009 UART: [art] Signing Cert with AUTHO
3,406,489 UART: RITY.KEYID = 7
3,421,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,202 UART: [art] PUB.X = D1E47A6353B354ED1F22F1140F26C71AC448D9B9C6587C31A06CF232A2BBBD16B7C66EDDD61488963CDD046FEEC886CF
3,428,982 UART: [art] PUB.Y = EEFFF60DC71AD318A9DE3A92E23C2E06DF8427BECD5AC77D0301D0BC58030BB6D63C24BAA035AEC132A74BC583E58DE9
3,435,940 UART: [art] SIG.R = 0A978FEE5A185881BF2DE30E8A1BF45651BD97B88FEAE9A62CFDB36F6F68DB04706FED160896ED905514F427E0105C26
3,442,710 UART: [art] SIG.S = 22289B7C17C4C99AEA77ACF43E846CCD3F56B04C9AA8C707F3E1EBDB60FB5D9734FD8F21E5F5F3BD6C43F4AB8E9011DA
3,466,390 UART: Caliptra RT
3,466,643 UART: [state] CFI Enabled
3,575,229 UART: [rt] RT listening for mailbox commands...
3,575,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,551 UART: [rt]cmd =0x44504543, len=96
3,785,882 >>> mbox cmd response data (6236 bytes)
3,785,883 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,322 UART: [rt]cmd =0x52564348, len=36
3,817,655 >>> mbox cmd response data (8 bytes)
3,817,656 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,847,213 UART: [rt]cmd =0x52564348, len=36
3,848,693 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,456 >>> mbox cmd response: success
2,986,076 UART:
2,986,092 UART: Running Caliptra FMC ...
2,986,500 UART:
2,986,554 UART: [state] CFI Enabled
2,997,105 UART: [fht] FMC Alias Private Key: 7
3,104,752 UART: [art] Extend RT PCRs Done
3,105,180 UART: [art] Lock RT PCRs Done
3,106,722 UART: [art] Populate DV Done
3,115,093 UART: [fht] FMC Alias Private Key: 7
3,116,051 UART: [art] Derive CDI
3,116,331 UART: [art] Store in in slot 0x4
3,202,210 UART: [art] Derive Key Pair
3,202,570 UART: [art] Store priv key in slot 0x5
3,215,662 UART: [art] Derive Key Pair - Done
3,230,468 UART: [art] Signing Cert with AUTHO
3,230,948 UART: RITY.KEYID = 7
3,245,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,503 UART: [art] PUB.X = C5C576A71533365903D8A7B8E48D6F40131358AB95B595AD91809BE3384C03D5CE509AD72F669F5E15DAA3D7EE13525B
3,253,269 UART: [art] PUB.Y = A24D8D211D07C2A0095D5E5D21BE686B1757D71AE6DDEEC6C736F2628BB0BCF28167232DF32A317C8E3A7187238E6ED0
3,260,223 UART: [art] SIG.R = 65DD915854F55CA3014AF8A2EA69B4CA4947C4B249919E83AC5277F7AF1CD22D7DA385548F00D14CE24411257691366D
3,266,968 UART: [art] SIG.S = EB43FA23C171E1903BA2A21AD538C85B5127FE8C9CA6B81A04E6E071FDED6D7678BFA83A06B78C6EC0F56FA5EEB17FA6
3,290,695 UART: Caliptra RT
3,290,948 UART: [state] CFI Enabled
3,398,661 UART: [rt] RT listening for mailbox commands...
3,399,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,551 UART: [rt]cmd =0x44504543, len=96
3,609,381 >>> mbox cmd response data (6236 bytes)
3,609,382 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,189 UART: [rt]cmd =0x52564348, len=36
3,641,152 >>> mbox cmd response data (8 bytes)
3,641,153 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,670,836 UART: [rt]cmd =0x52564348, len=36
3,672,388 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,381 UART: [kat] SHA2-512-ACC
897,282 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,741 UART: [kat] LMS
1,475,937 UART: [kat] --
1,476,792 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,881 UART: [idev] Erasing UDS.KEYID = 0
1,505,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,989 UART: [idev] --
1,514,924 UART: [ldev] ++
1,515,092 UART: [ldev] CDI.KEYID = 6
1,515,455 UART: [ldev] SUBJECT.KEYID = 5
1,515,881 UART: [ldev] AUTHORITY.KEYID = 7
1,516,344 UART: [ldev] FE.KEYID = 1
1,521,532 UART: [ldev] Erasing FE.KEYID = 1
1,547,389 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,537 UART: [ldev] --
1,586,998 UART: [fwproc] Waiting for Commands...
1,587,637 UART: [fwproc] Received command 0x46574c44
1,588,428 UART: [fwproc] Received Image of size 114084 bytes
2,884,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,830 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,711 >>> mbox cmd response: success
3,077,901 UART: [afmc] ++
3,078,069 UART: [afmc] CDI.KEYID = 6
3,078,431 UART: [afmc] SUBJECT.KEYID = 7
3,078,856 UART: [afmc] AUTHORITY.KEYID = 5
3,113,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,458 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,148 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,965 UART: [afmc] --
3,156,867 UART: [cold-reset] --
3,157,763 UART: [state] Locking Datavault
3,159,052 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,656 UART: [state] Locking ICCM
3,160,306 UART: [exit] Launching FMC @ 0x40000130
3,165,635 UART:
3,165,651 UART: Running Caliptra FMC ...
3,166,059 UART:
3,166,202 UART: [state] CFI Enabled
3,176,773 UART: [fht] FMC Alias Private Key: 7
3,285,704 UART: [art] Extend RT PCRs Done
3,286,132 UART: [art] Lock RT PCRs Done
3,287,968 UART: [art] Populate DV Done
3,296,153 UART: [fht] FMC Alias Private Key: 7
3,297,217 UART: [art] Derive CDI
3,297,497 UART: [art] Store in in slot 0x4
3,383,126 UART: [art] Derive Key Pair
3,383,486 UART: [art] Store priv key in slot 0x5
3,396,398 UART: [art] Derive Key Pair - Done
3,411,083 UART: [art] Signing Cert with AUTHO
3,411,563 UART: RITY.KEYID = 7
3,427,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,254 UART: [art] PUB.X = 2C52261EE225A5C3EFFD69F36EC1201581476031AB7E070EC9343C66D3436B68CB5C239133D5820D3392FCC387438D74
3,435,011 UART: [art] PUB.Y = D5E1BCBCD351FD01168657DD0960EE5265A347307A5B31EBDDBA1668857F78521DB9B53AB484D0BF374C570DE9FDF38F
3,441,966 UART: [art] SIG.R = D49157E0C85EE67052AFF096F419B47AEE8604AD84A74A766D502DDF8441EA2E6C3A6FE01955D37C013F20A299352E3C
3,448,736 UART: [art] SIG.S = 2F1A8FB6284A3BBCE5D069DC9CB86BED8A37156B6748BC98E79C9B2FC85E1381BB0199014102DBD9727DF6382617CA71
3,472,596 UART: Caliptra RT
3,472,941 UART: [state] CFI Enabled
3,581,280 UART: [rt] RT listening for mailbox commands...
3,581,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,214 UART: [rt]cmd =0x44504543, len=96
3,793,110 >>> mbox cmd response data (6236 bytes)
3,793,111 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,702 UART: [rt]cmd =0x52564348, len=36
3,825,061 >>> mbox cmd response data (8 bytes)
3,825,062 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,741 UART: [rt]cmd =0x52564348, len=36
3,856,113 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 ready_for_fw is high
1,362,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,265 >>> mbox cmd response: success
2,986,667 UART:
2,986,683 UART: Running Caliptra FMC ...
2,987,091 UART:
2,987,234 UART: [state] CFI Enabled
2,997,823 UART: [fht] FMC Alias Private Key: 7
3,105,502 UART: [art] Extend RT PCRs Done
3,105,930 UART: [art] Lock RT PCRs Done
3,107,410 UART: [art] Populate DV Done
3,115,767 UART: [fht] FMC Alias Private Key: 7
3,116,753 UART: [art] Derive CDI
3,117,033 UART: [art] Store in in slot 0x4
3,203,040 UART: [art] Derive Key Pair
3,203,400 UART: [art] Store priv key in slot 0x5
3,216,558 UART: [art] Derive Key Pair - Done
3,231,094 UART: [art] Signing Cert with AUTHO
3,231,574 UART: RITY.KEYID = 7
3,246,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,735 UART: [art] PUB.X = 7D7762C72E250816418C075677828FAC5FE719E147C765C472B113CE7224B9362489AE0ADAB7403D8FF1DD486E54A3CB
3,254,496 UART: [art] PUB.Y = 5EDA2CFA7F9197D4ABF1121E8CDB7BD3DB7163B2E32985FCFF90584581AF7A17D1A6F54EBC2C2F19C5700A9BCE3DD0D6
3,261,469 UART: [art] SIG.R = 74385A0186A1F353129AB875D61919F1EC1653E0B11D8053DB90C46FB78BF7D9B7B7AF0605324E5236F0B168B2E3A48C
3,268,230 UART: [art] SIG.S = F7DA6BC5F20D8E19B32778D41C87CAF091A79336FF2A991CDF1245DF8CC80C506A9C4FB36DC50D9A3AD39F17476DEBB5
3,291,750 UART: Caliptra RT
3,292,095 UART: [state] CFI Enabled
3,400,344 UART: [rt] RT listening for mailbox commands...
3,401,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,372 UART: [rt]cmd =0x44504543, len=96
3,612,186 >>> mbox cmd response data (6236 bytes)
3,612,187 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,516 UART: [rt]cmd =0x52564348, len=36
3,643,497 >>> mbox cmd response data (8 bytes)
3,643,498 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,973 UART: [rt]cmd =0x52564348, len=36
3,674,475 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
922,858 UART: [kat] LMS
1,171,186 UART: [kat] --
1,172,253 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,292 UART: [idev] ++
1,175,460 UART: [idev] CDI.KEYID = 6
1,175,820 UART: [idev] SUBJECT.KEYID = 7
1,176,244 UART: [idev] UDS.KEYID = 0
1,176,589 ready_for_fw is high
1,176,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,974 UART: [idev] Erasing UDS.KEYID = 0
1,201,153 UART: [idev] Sha1 KeyId Algorithm
1,209,589 UART: [idev] --
1,210,503 UART: [ldev] ++
1,210,671 UART: [ldev] CDI.KEYID = 6
1,211,034 UART: [ldev] SUBJECT.KEYID = 5
1,211,460 UART: [ldev] AUTHORITY.KEYID = 7
1,211,923 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,279 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x46574c44
1,284,106 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,901 >>> mbox cmd response: success
2,771,957 UART: [afmc] ++
2,772,125 UART: [afmc] CDI.KEYID = 6
2,772,487 UART: [afmc] SUBJECT.KEYID = 7
2,772,912 UART: [afmc] AUTHORITY.KEYID = 5
2,808,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,108 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,064 UART: [afmc] --
2,852,054 UART: [cold-reset] --
2,852,740 UART: [state] Locking Datavault
2,853,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,507 UART: [state] Locking ICCM
2,855,067 UART: [exit] Launching FMC @ 0x40000130
2,860,396 UART:
2,860,412 UART: Running Caliptra FMC ...
2,860,820 UART:
2,860,874 UART: [state] CFI Enabled
2,871,597 UART: [fht] FMC Alias Private Key: 7
2,979,012 UART: [art] Extend RT PCRs Done
2,979,440 UART: [art] Lock RT PCRs Done
2,981,070 UART: [art] Populate DV Done
2,989,211 UART: [fht] FMC Alias Private Key: 7
2,990,191 UART: [art] Derive CDI
2,990,471 UART: [art] Store in in slot 0x4
3,076,358 UART: [art] Derive Key Pair
3,076,718 UART: [art] Store priv key in slot 0x5
3,089,836 UART: [art] Derive Key Pair - Done
3,104,434 UART: [art] Signing Cert with AUTHO
3,104,914 UART: RITY.KEYID = 7
3,119,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,739 UART: [art] PUB.X = CAE769380E02299260679EF1714FC37ECA121A3634E97D95A78D16D1FF1267B222F4C4997B6269296F089ADB150D091D
3,127,490 UART: [art] PUB.Y = 9B421F3405A897F682D433D6FAFBFA597E6B934D1024203A10D400044225994A1D7F6A4CC494915A37492B1CC1AC3D95
3,134,410 UART: [art] SIG.R = 068D78F4EAEEAEBAC18239179EB75AC2787F65B3F1EDF8FC55DBD756F2ABF7AECC651AB9FDA7DCBA0E616C28CCA5E5EB
3,141,214 UART: [art] SIG.S = A519AAB4C67248AF41350BEB12EC53ADAF50C9AC1B3C65908D2425A2F62788ADEC21E88DC5BF340514634E6029460016
3,164,657 UART: Caliptra RT
3,164,910 UART: [state] CFI Enabled
3,272,411 UART: [rt] RT listening for mailbox commands...
3,273,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,703 UART: [rt]cmd =0x44504543, len=96
3,483,683 >>> mbox cmd response data (6236 bytes)
3,483,684 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,337 UART: [rt]cmd =0x52564348, len=36
3,515,456 >>> mbox cmd response data (8 bytes)
3,515,457 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,004 UART: [rt]cmd =0x52564348, len=36
3,546,712 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 ready_for_fw is high
1,060,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,736 >>> mbox cmd response: success
2,683,808 UART:
2,683,824 UART: Running Caliptra FMC ...
2,684,232 UART:
2,684,286 UART: [state] CFI Enabled
2,694,495 UART: [fht] FMC Alias Private Key: 7
2,802,820 UART: [art] Extend RT PCRs Done
2,803,248 UART: [art] Lock RT PCRs Done
2,804,730 UART: [art] Populate DV Done
2,812,675 UART: [fht] FMC Alias Private Key: 7
2,813,759 UART: [art] Derive CDI
2,814,039 UART: [art] Store in in slot 0x4
2,899,832 UART: [art] Derive Key Pair
2,900,192 UART: [art] Store priv key in slot 0x5
2,914,012 UART: [art] Derive Key Pair - Done
2,928,385 UART: [art] Signing Cert with AUTHO
2,928,865 UART: RITY.KEYID = 7
2,943,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,562 UART: [art] PUB.X = 6BFA3C60E8B3AC43EF0B05044B56EED1911C6CC64250DB6290DA7DC21C68B947A29CD2055CA59A88D49963BE945C3E78
2,951,332 UART: [art] PUB.Y = 5C1EC352AC5727EE3943037AFAA6F40AF5B0C1C47E3A8502253886CDB60082900B73A205BA389EFDA9BD5809A267FA68
2,958,250 UART: [art] SIG.R = D346392A2D8E8C5A25D0BE70DA52565327D745E21F0E4C1E8026A4F8BC37E83568C7EADBAFE77E715A84D70EB32BB590
2,965,026 UART: [art] SIG.S = 879AA5742150C8D3AF2A96950BFCEA12A5807CAE603D343EBEA1FBD7CCE4C55BEAF339E2D8D0821184A0987326529A7B
2,988,970 UART: Caliptra RT
2,989,223 UART: [state] CFI Enabled
3,095,991 UART: [rt] RT listening for mailbox commands...
3,096,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,921 UART: [rt]cmd =0x44504543, len=96
3,307,160 >>> mbox cmd response data (6236 bytes)
3,307,161 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,818 UART: [rt]cmd =0x52564348, len=36
3,339,083 >>> mbox cmd response data (8 bytes)
3,339,084 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,553 UART: [rt]cmd =0x52564348, len=36
3,370,099 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
893,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,728 UART: [kat] ++
897,880 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,225 UART: [kat] LMS
1,171,553 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,690 UART: [fht] FHT @ 0x50003400
1,175,443 UART: [idev] ++
1,175,611 UART: [idev] CDI.KEYID = 6
1,175,971 UART: [idev] SUBJECT.KEYID = 7
1,176,395 UART: [idev] UDS.KEYID = 0
1,176,740 ready_for_fw is high
1,176,740 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,772 UART: [idev] Sha1 KeyId Algorithm
1,210,256 UART: [idev] --
1,211,336 UART: [ldev] ++
1,211,504 UART: [ldev] CDI.KEYID = 6
1,211,867 UART: [ldev] SUBJECT.KEYID = 5
1,212,293 UART: [ldev] AUTHORITY.KEYID = 7
1,212,756 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,245,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,744 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,284,973 UART: [fwproc] Recv command 0x46574c44
1,285,701 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,359 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,896 >>> mbox cmd response: success
2,775,076 UART: [afmc] ++
2,775,244 UART: [afmc] CDI.KEYID = 6
2,775,606 UART: [afmc] SUBJECT.KEYID = 7
2,776,031 UART: [afmc] AUTHORITY.KEYID = 5
2,811,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,280 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,999 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,691 UART: [afmc] --
2,854,753 UART: [cold-reset] --
2,855,615 UART: [state] Locking Datavault
2,856,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,334 UART: [state] Locking ICCM
2,857,986 UART: [exit] Launching FMC @ 0x40000130
2,863,315 UART:
2,863,331 UART: Running Caliptra FMC ...
2,863,739 UART:
2,863,882 UART: [state] CFI Enabled
2,874,631 UART: [fht] FMC Alias Private Key: 7
2,983,060 UART: [art] Extend RT PCRs Done
2,983,488 UART: [art] Lock RT PCRs Done
2,984,622 UART: [art] Populate DV Done
2,992,669 UART: [fht] FMC Alias Private Key: 7
2,993,719 UART: [art] Derive CDI
2,993,999 UART: [art] Store in in slot 0x4
3,079,976 UART: [art] Derive Key Pair
3,080,336 UART: [art] Store priv key in slot 0x5
3,093,676 UART: [art] Derive Key Pair - Done
3,108,280 UART: [art] Signing Cert with AUTHO
3,108,760 UART: RITY.KEYID = 7
3,123,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,647 UART: [art] PUB.X = 89F4E908D41498AC21F1908673C3C0D62CAFBD6C56B1596283FEB602EA10A2FF159C9D198DFA8F0D0324D5F2D2971F29
3,131,413 UART: [art] PUB.Y = BB48406CD59B6C8E0D2094672C63D6DC0A65A3A123B2F2A918C36CFE5BA2E1E66E2496ADD2E77E7EE7362F51793CA34E
3,138,371 UART: [art] SIG.R = FD087DFFECA4209ADCC658CB22AA1C03515B4AD68BF346AAE6D3E3121F7B9DE0F2D809657D827C5B6EE8B2DE4E0E87E3
3,145,155 UART: [art] SIG.S = A967E84C6EFFC723C8701FBDA6C0B4D49FEB1B9FD76D475479134FEF78A1BDF2F63BFB2D04B71A769E489CA362AE5DD9
3,168,955 UART: Caliptra RT
3,169,300 UART: [state] CFI Enabled
3,277,490 UART: [rt] RT listening for mailbox commands...
3,278,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,424 UART: [rt]cmd =0x44504543, len=96
3,488,260 >>> mbox cmd response data (6236 bytes)
3,488,261 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,008 UART: [rt]cmd =0x52564348, len=36
3,519,773 >>> mbox cmd response data (8 bytes)
3,519,774 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,533 UART: [rt]cmd =0x52564348, len=36
3,550,849 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,016 ready_for_fw is high
1,061,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,767 >>> mbox cmd response: success
2,686,601 UART:
2,686,617 UART: Running Caliptra FMC ...
2,687,025 UART:
2,687,168 UART: [state] CFI Enabled
2,697,883 UART: [fht] FMC Alias Private Key: 7
2,805,628 UART: [art] Extend RT PCRs Done
2,806,056 UART: [art] Lock RT PCRs Done
2,807,640 UART: [art] Populate DV Done
2,815,855 UART: [fht] FMC Alias Private Key: 7
2,816,889 UART: [art] Derive CDI
2,817,169 UART: [art] Store in in slot 0x4
2,903,018 UART: [art] Derive Key Pair
2,903,378 UART: [art] Store priv key in slot 0x5
2,917,064 UART: [art] Derive Key Pair - Done
2,932,032 UART: [art] Signing Cert with AUTHO
2,932,512 UART: RITY.KEYID = 7
2,948,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,817 UART: [art] PUB.X = 2AF35BDB31996929C363B4868F9EE1765822B9DDB4C2B7E7BF47069273BE3883CACE23829118AB33B73D901934D399E1
2,955,584 UART: [art] PUB.Y = A2F7F664644524F1CDA8F4B4B36A7E75975B7C5ABBD756B0D3A2F4F1021468B203C4A8EBAEFB546823A27E4AEFA7B637
2,962,544 UART: [art] SIG.R = F0CF52361A06E2CC67B66F4A6166876636E1BDA74AD7DDBC54B60F06BEFB2A4A756F57C359663CD035EB0F5722191E7E
2,969,314 UART: [art] SIG.S = 5B1AB64614D107D6060529F0D0352C97A037C875873D929F90FE37DF3EAEBE119ABE66FF42A977800A5F1365D29FFB74
2,992,913 UART: Caliptra RT
2,993,258 UART: [state] CFI Enabled
3,100,613 UART: [rt] RT listening for mailbox commands...
3,101,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,821 UART: [rt]cmd =0x44504543, len=96
3,312,553 >>> mbox cmd response data (6236 bytes)
3,312,554 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,343 UART: [rt]cmd =0x52564348, len=36
3,344,780 >>> mbox cmd response data (8 bytes)
3,344,781 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,438 UART: [rt]cmd =0x52564348, len=36
3,375,786 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,652 UART: [state] LifecycleState = Unprovisioned
85,307 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
890,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,817 UART: [kat] ++
894,969 UART: [kat] sha1
899,181 UART: [kat] SHA2-256
901,121 UART: [kat] SHA2-384
903,964 UART: [kat] SHA2-512-ACC
905,865 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 ready_for_fw is high
1,174,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,797 UART: [idev] Erasing UDS.KEYID = 0
1,198,635 UART: [idev] Sha1 KeyId Algorithm
1,207,597 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,696 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,711 UART: [fwproc] Recv command 0x46574c44
1,282,444 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,045 >>> mbox cmd response: success
2,770,294 UART: [afmc] ++
2,770,462 UART: [afmc] CDI.KEYID = 6
2,770,825 UART: [afmc] SUBJECT.KEYID = 7
2,771,251 UART: [afmc] AUTHORITY.KEYID = 5
2,807,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,075 UART: [afmc] --
2,851,091 UART: [cold-reset] --
2,851,951 UART: [state] Locking Datavault
2,853,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,864 UART: [state] Locking ICCM
2,854,528 UART: [exit] Launching FMC @ 0x40000130
2,859,857 UART:
2,859,873 UART: Running Caliptra FMC ...
2,860,281 UART:
2,860,335 UART: [state] CFI Enabled
2,870,932 UART: [fht] FMC Alias Private Key: 7
2,978,791 UART: [art] Extend RT PCRs Done
2,979,219 UART: [art] Lock RT PCRs Done
2,980,907 UART: [art] Populate DV Done
2,989,128 UART: [fht] FMC Alias Private Key: 7
2,990,276 UART: [art] Derive CDI
2,990,556 UART: [art] Store in in slot 0x4
3,076,233 UART: [art] Derive Key Pair
3,076,593 UART: [art] Store priv key in slot 0x5
3,090,017 UART: [art] Derive Key Pair - Done
3,104,764 UART: [art] Signing Cert with AUTHO
3,105,244 UART: RITY.KEYID = 7
3,120,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,963 UART: [art] PUB.X = D35085353C46815F7F1D7DEE1B390DB65813A26E6188A6A2C9D9933C5F1F5F164A1621F4850E475F9E4468ABCAF2DBB9
3,127,733 UART: [art] PUB.Y = DDBE53593CE53C69FF043CDABE518CB7DB3AD97AE9EE2A074240C27B81D3F32FDE2B5C2057E0B46E9C3DE08D72C57B39
3,134,701 UART: [art] SIG.R = 79F350494AC0259A8CE4BAB1E3D22A978D990E79E69D9B2239CCA54384E8D9B59BBE960693485EA6967C0C13EC94087D
3,141,463 UART: [art] SIG.S = 49AE2D4A8DA3CB434A9DC021BF9A1D42F62D21306EF20CDC4A4F5D3D89E3E20B226492B3CFE90FBEFD40CA35CEBA266C
3,165,173 UART: Caliptra RT
3,165,426 UART: [state] CFI Enabled
3,273,049 UART: [rt] RT listening for mailbox commands...
3,273,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,141 UART: [rt]cmd =0x44504543, len=96
3,483,662 >>> mbox cmd response data (6236 bytes)
3,483,663 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,366 UART: [rt]cmd =0x52564348, len=36
3,515,757 >>> mbox cmd response data (8 bytes)
3,515,758 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,665 UART: [rt]cmd =0x52564348, len=36
3,547,121 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,138 ready_for_fw is high
1,056,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,295 >>> mbox cmd response: success
2,683,159 UART:
2,683,175 UART: Running Caliptra FMC ...
2,683,583 UART:
2,683,637 UART: [state] CFI Enabled
2,694,182 UART: [fht] FMC Alias Private Key: 7
2,802,275 UART: [art] Extend RT PCRs Done
2,802,703 UART: [art] Lock RT PCRs Done
2,804,415 UART: [art] Populate DV Done
2,812,706 UART: [fht] FMC Alias Private Key: 7
2,813,682 UART: [art] Derive CDI
2,813,962 UART: [art] Store in in slot 0x4
2,899,761 UART: [art] Derive Key Pair
2,900,121 UART: [art] Store priv key in slot 0x5
2,913,451 UART: [art] Derive Key Pair - Done
2,928,315 UART: [art] Signing Cert with AUTHO
2,928,795 UART: RITY.KEYID = 7
2,943,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,318 UART: [art] PUB.X = 851257EA22A8E311B3FB7559A3F2899985496952B30A9349B80083ADA94B4BDEF66F5C51CD035F018A1CDC83BBC53FF0
2,951,063 UART: [art] PUB.Y = 18DDE39D3DE5C4B58694E733F8852DF529AA36E840E7269329253DA917F5BBE3A60DCC2C65BE54182CB5ECC47C914C06
2,958,017 UART: [art] SIG.R = E36646A44769A9E44027DC8EE9A3B21A84766F4CE2BFAC8A20B763DF574AE81730DC12D2CBDB4B8786955F4929F3677E
2,964,795 UART: [art] SIG.S = 951EF9C915E6EDFBF11041CEDAD588143C9686B3B84B39C32811FDB668966541C013CE0F61947B54DBA11670E39B497C
2,988,947 UART: Caliptra RT
2,989,200 UART: [state] CFI Enabled
3,096,496 UART: [rt] RT listening for mailbox commands...
3,097,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,352 UART: [rt]cmd =0x44504543, len=96
3,306,928 >>> mbox cmd response data (6236 bytes)
3,306,929 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,426 UART: [rt]cmd =0x52564348, len=36
3,338,585 >>> mbox cmd response data (8 bytes)
3,338,586 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,875 UART: [rt]cmd =0x52564348, len=36
3,369,335 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 ready_for_fw is high
1,174,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,549 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,483 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,300 >>> mbox cmd response: success
2,771,335 UART: [afmc] ++
2,771,503 UART: [afmc] CDI.KEYID = 6
2,771,866 UART: [afmc] SUBJECT.KEYID = 7
2,772,292 UART: [afmc] AUTHORITY.KEYID = 5
2,808,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,812 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,541 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,154 UART: [afmc] --
2,852,056 UART: [cold-reset] --
2,853,070 UART: [state] Locking Datavault
2,854,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,105 UART: [state] Locking ICCM
2,855,635 UART: [exit] Launching FMC @ 0x40000130
2,860,964 UART:
2,860,980 UART: Running Caliptra FMC ...
2,861,388 UART:
2,861,531 UART: [state] CFI Enabled
2,872,092 UART: [fht] FMC Alias Private Key: 7
2,979,837 UART: [art] Extend RT PCRs Done
2,980,265 UART: [art] Lock RT PCRs Done
2,981,751 UART: [art] Populate DV Done
2,990,154 UART: [fht] FMC Alias Private Key: 7
2,991,216 UART: [art] Derive CDI
2,991,496 UART: [art] Store in in slot 0x4
3,077,229 UART: [art] Derive Key Pair
3,077,589 UART: [art] Store priv key in slot 0x5
3,091,153 UART: [art] Derive Key Pair - Done
3,105,960 UART: [art] Signing Cert with AUTHO
3,106,440 UART: RITY.KEYID = 7
3,121,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,589 UART: [art] PUB.X = 8D20F9F2D03181484AFC883AC3F777DD137269123F8CE28A999FB664B384F3226C88C2C845ED0D23FB7D9CF3787525CF
3,129,360 UART: [art] PUB.Y = CB2239C7E304A0C17EAD4D67B0A83E72A82367CE9911DF1034143A1E197486AC4893A201E912B639891341C8D0CCF6D6
3,136,304 UART: [art] SIG.R = E1A6CA3ACE3DD3974F2440892C75A51021F4A11C93FE4464088F5DFF3C81AB40DD34E32EFE21A784903AFDE6FCB594EC
3,143,089 UART: [art] SIG.S = 7A8A1A257C1B753B5B5751FC47361B23752584D1E4C515BDAF3075E494197CCC42EF20D1E8F3F37F5FC234C1B3AB49A1
3,166,374 UART: Caliptra RT
3,166,719 UART: [state] CFI Enabled
3,274,770 UART: [rt] RT listening for mailbox commands...
3,275,440 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,934 UART: [rt]cmd =0x44504543, len=96
3,487,194 >>> mbox cmd response data (6236 bytes)
3,487,195 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,810 UART: [rt]cmd =0x52564348, len=36
3,518,975 >>> mbox cmd response data (8 bytes)
3,518,976 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,397 UART: [rt]cmd =0x52564348, len=36
3,549,691 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,173 ready_for_fw is high
1,056,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,208 >>> mbox cmd response: success
2,682,474 UART:
2,682,490 UART: Running Caliptra FMC ...
2,682,898 UART:
2,683,041 UART: [state] CFI Enabled
2,693,392 UART: [fht] FMC Alias Private Key: 7
2,801,599 UART: [art] Extend RT PCRs Done
2,802,027 UART: [art] Lock RT PCRs Done
2,803,607 UART: [art] Populate DV Done
2,811,928 UART: [fht] FMC Alias Private Key: 7
2,812,960 UART: [art] Derive CDI
2,813,240 UART: [art] Store in in slot 0x4
2,898,525 UART: [art] Derive Key Pair
2,898,885 UART: [art] Store priv key in slot 0x5
2,912,093 UART: [art] Derive Key Pair - Done
2,927,095 UART: [art] Signing Cert with AUTHO
2,927,575 UART: RITY.KEYID = 7
2,942,485 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,250 UART: [art] PUB.X = F83720CAE63CF6DF9C743D8CC3A7492E2776B2DC5755119EA1A5958446AC944B6F99824BA67CB4DD13DDD09240C89331
2,950,026 UART: [art] PUB.Y = 3FE21D523BCE11EE964B87F5BA6AA7D9EC03C6CB90EF3AC7479725557E7CCD668DA444BDB1BDB357A12FBB9E8E5EE1FF
2,957,003 UART: [art] SIG.R = 39285622998CF10BC6D4130E2FEDAA6CBAF864F30C297F0D692F5C6B99BB8C508423798F0BE6D072E4EF9785F2564036
2,963,762 UART: [art] SIG.S = CCB65EDF0BD0E2447E576E81ED0312D5E4D84C1228B10417244A8366A00393128E7D803B5D441B6BC2DD62968034C34F
2,987,039 UART: Caliptra RT
2,987,384 UART: [state] CFI Enabled
3,094,869 UART: [rt] RT listening for mailbox commands...
3,095,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,737 UART: [rt]cmd =0x44504543, len=96
3,306,166 >>> mbox cmd response data (6236 bytes)
3,306,167 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,546 UART: [rt]cmd =0x52564348, len=36
3,337,907 >>> mbox cmd response data (8 bytes)
3,337,908 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,363 UART: [rt]cmd =0x52564348, len=36
3,368,963 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,270 UART:
192,630 UART: Running Caliptra ROM ...
193,807 UART:
193,982 UART: [state] CFI Enabled
264,124 UART: [state] LifecycleState = Unprovisioned
266,127 UART: [state] DebugLocked = No
268,901 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,134 UART: [kat] SHA2-256
442,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,372 UART: [kat] ++
453,848 UART: [kat] sha1
464,866 UART: [kat] SHA2-256
467,513 UART: [kat] SHA2-384
472,293 UART: [kat] SHA2-512-ACC
474,655 UART: [kat] ECC-384
2,767,188 UART: [kat] HMAC-384Kdf
2,797,915 UART: [kat] LMS
3,988,236 UART: [kat] --
3,992,397 UART: [cold-reset] ++
3,993,297 UART: [fht] Storing FHT @ 0x50003400
4,004,792 UART: [idev] ++
4,005,404 UART: [idev] CDI.KEYID = 6
4,006,297 UART: [idev] SUBJECT.KEYID = 7
4,007,550 UART: [idev] UDS.KEYID = 0
4,008,515 ready_for_fw is high
4,008,706 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,151,641 UART: [idev] Erasing UDS.KEYID = 0
7,343,485 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,947 UART: [idev] --
7,369,801 UART: [ldev] ++
7,370,385 UART: [ldev] CDI.KEYID = 6
7,371,368 UART: [ldev] SUBJECT.KEYID = 5
7,372,525 UART: [ldev] AUTHORITY.KEYID = 7
7,373,806 UART: [ldev] FE.KEYID = 1
7,420,371 UART: [ldev] Erasing FE.KEYID = 1
10,750,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,302 UART: [ldev] --
13,115,080 UART: [fwproc] Waiting for Commands...
13,117,791 UART: [fwproc] Received command 0x46574c44
13,120,019 UART: [fwproc] Received Image of size 113760 bytes
17,172,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,160 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,633,953 >>> mbox cmd response: success
17,638,012 UART: [afmc] ++
17,638,655 UART: [afmc] CDI.KEYID = 6
17,639,569 UART: [afmc] SUBJECT.KEYID = 7
17,640,802 UART: [afmc] AUTHORITY.KEYID = 5
21,004,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,391 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,811 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,648 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,048 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,057 UART: [afmc] --
23,378,072 UART: [cold-reset] --
23,382,853 UART: [state] Locking Datavault
23,387,719 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,468 UART: [state] Locking ICCM
23,391,436 UART: [exit] Launching FMC @ 0x40000130
23,399,833 UART:
23,400,065 UART: Running Caliptra FMC ...
23,401,094 UART:
23,401,264 UART: [state] CFI Enabled
23,465,925 UART: [fht] FMC Alias Private Key: 7
25,803,980 UART: [art] Extend RT PCRs Done
25,805,199 UART: [art] Lock RT PCRs Done
25,806,684 UART: [art] Populate DV Done
25,812,144 UART: [fht] FMC Alias Private Key: 7
25,813,735 UART: [art] Derive CDI
25,814,482 UART: [art] Store in in slot 0x4
25,875,200 UART: [art] Derive Key Pair
25,876,239 UART: [art] Store priv key in slot 0x5
29,168,365 UART: [art] Derive Key Pair - Done
29,181,340 UART: [art] Signing Cert with AUTHO
29,182,649 UART: RITY.KEYID = 7
31,471,121 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,626 UART: [art] PUB.X = CAB7CE2C38AB0443F2719B9BF003639110E33C4A1491CC77993B13CC03A83B989C87367783DA1476D9C0ECC776A06FF7
31,479,874 UART: [art] PUB.Y = A460AD5CAE9FA45EF44359DE3E1698AC36B8946E4F1399D2785AF875AECD7332BA60AA50EEC678C59F1A492B5F52F226
31,487,129 UART: [art] SIG.R = AF6E09DDAD211DFF6866CB67B206A39923A2E60BE069728F7F1BDBB87530C2CC5ABA2B931022585F7503D82DBAFC0C8B
31,494,519 UART: [art] SIG.S = 3AE2FB8C4657318A9B15A4A613E3556AA671F237DA4894E4174CD017CDA29EB35146D5504EC9C02DB94AB6E0DBB98BB1
32,799,774 UART: Caliptra RT
32,800,502 UART: [state] CFI Enabled
32,963,222 UART: [rt] RT listening for mailbox commands...
32,965,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,996,283 UART: [rt]cmd =0x44504543, len=96
38,779,898 >>> mbox cmd response data (6236 bytes)
38,809,295 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,839,366 UART: [rt]cmd =0x52564348, len=36
38,841,758 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,796,400 ready_for_fw is high
3,796,925 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,840,874 >>> mbox cmd response: success
23,541,696 UART:
23,542,138 UART: Running Caliptra FMC ...
23,543,256 UART:
23,543,418 UART: [state] CFI Enabled
23,610,205 UART: [fht] FMC Alias Private Key: 7
25,947,793 UART: [art] Extend RT PCRs Done
25,949,027 UART: [art] Lock RT PCRs Done
25,950,783 UART: [art] Populate DV Done
25,956,360 UART: [fht] FMC Alias Private Key: 7
25,957,958 UART: [art] Derive CDI
25,958,780 UART: [art] Store in in slot 0x4
26,019,075 UART: [art] Derive Key Pair
26,020,126 UART: [art] Store priv key in slot 0x5
29,313,090 UART: [art] Derive Key Pair - Done
29,326,106 UART: [art] Signing Cert with AUTHO
29,327,412 UART: RITY.KEYID = 7
31,614,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,729 UART: [art] PUB.X = 4AA618D998F094BE72951B302A6399D8F2BF279DD377A4829D677A24AE2F0E93B5C195C019CFDA2B02E9F5031C17E36F
31,622,991 UART: [art] PUB.Y = AA76F5EAAD6CE5FD02DFAE077CF64A0D66BB2A216E173E101F8D3FAC1263EF9F1503ED2D964B9E4B5DB4DD87EFCF7D7A
31,630,289 UART: [art] SIG.R = 39EA183BAE39D47B65594F9BF5D1A1B2BF65BCF8067D222808EEB0D03611F235686017590E0E2893938E559E4D428ACA
31,637,631 UART: [art] SIG.S = 87D31E7D2550234EA44F4B379225399F3282DC787FAF0362D6085C0862667B1D2791020AB8C6327A7665BAD900E4719F
32,942,516 UART: Caliptra RT
32,943,233 UART: [state] CFI Enabled
33,103,379 UART: [rt] RT listening for mailbox commands...
33,105,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,136,543 UART: [rt]cmd =0x44504543, len=96
38,920,245 >>> mbox cmd response data (6236 bytes)
38,949,606 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,979,837 UART: [rt]cmd =0x52564348, len=36
38,982,764 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
192,865 UART:
193,238 UART: Running Caliptra ROM ...
194,425 UART:
603,972 UART: [state] CFI Enabled
617,288 UART: [state] LifecycleState = Unprovisioned
619,227 UART: [state] DebugLocked = No
621,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,496 UART: [kat] SHA2-256
796,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,739 UART: [kat] ++
807,253 UART: [kat] sha1
818,049 UART: [kat] SHA2-256
820,767 UART: [kat] SHA2-384
826,321 UART: [kat] SHA2-512-ACC
828,682 UART: [kat] ECC-384
3,112,933 UART: [kat] HMAC-384Kdf
3,124,807 UART: [kat] LMS
4,314,882 UART: [kat] --
4,320,552 UART: [cold-reset] ++
4,321,638 UART: [fht] Storing FHT @ 0x50003400
4,334,713 UART: [idev] ++
4,335,281 UART: [idev] CDI.KEYID = 6
4,336,230 UART: [idev] SUBJECT.KEYID = 7
4,337,468 UART: [idev] UDS.KEYID = 0
4,338,443 ready_for_fw is high
4,338,637 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,498 UART: [idev] Erasing UDS.KEYID = 0
7,623,118 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,527 UART: [idev] --
7,649,794 UART: [ldev] ++
7,650,362 UART: [ldev] CDI.KEYID = 6
7,651,329 UART: [ldev] SUBJECT.KEYID = 5
7,652,538 UART: [ldev] AUTHORITY.KEYID = 7
7,653,765 UART: [ldev] FE.KEYID = 1
7,666,151 UART: [ldev] Erasing FE.KEYID = 1
10,957,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,681 UART: [ldev] --
13,320,613 UART: [fwproc] Waiting for Commands...
13,323,347 UART: [fwproc] Received command 0x46574c44
13,325,526 UART: [fwproc] Received Image of size 113760 bytes
17,373,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,836,498 >>> mbox cmd response: success
17,840,095 UART: [afmc] ++
17,840,720 UART: [afmc] CDI.KEYID = 6
17,841,629 UART: [afmc] SUBJECT.KEYID = 7
17,842,896 UART: [afmc] AUTHORITY.KEYID = 5
21,160,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,595 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,973 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,839 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,240 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,184 UART: [afmc] --
23,524,494 UART: [cold-reset] --
23,528,571 UART: [state] Locking Datavault
23,533,976 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,741 UART: [state] Locking ICCM
23,537,187 UART: [exit] Launching FMC @ 0x40000130
23,545,582 UART:
23,545,818 UART: Running Caliptra FMC ...
23,546,915 UART:
23,547,070 UART: [state] CFI Enabled
23,555,166 UART: [fht] FMC Alias Private Key: 7
25,886,026 UART: [art] Extend RT PCRs Done
25,887,255 UART: [art] Lock RT PCRs Done
25,889,174 UART: [art] Populate DV Done
25,894,552 UART: [fht] FMC Alias Private Key: 7
25,896,254 UART: [art] Derive CDI
25,896,985 UART: [art] Store in in slot 0x4
25,939,793 UART: [art] Derive Key Pair
25,940,828 UART: [art] Store priv key in slot 0x5
29,182,912 UART: [art] Derive Key Pair - Done
29,195,993 UART: [art] Signing Cert with AUTHO
29,197,319 UART: RITY.KEYID = 7
31,476,391 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,898 UART: [art] PUB.X = 6F592C11CDD345793E3A5577633909DA52A9E7FF2E32B90DDA3521E5F0B22A580D8778C121E59B8DFD0BBE192DEE3A5C
31,485,171 UART: [art] PUB.Y = B05020D3755E6AF5424239DD39E63DBEDFDBAB629A8F7B1176F87B807DE808C49DEC03E9501D7781F419A2FEE31D615C
31,492,427 UART: [art] SIG.R = F5BB82A015306C284F09CE0D07D8C98472B6E25912D6D94E9099CDD9AA071AE78AB0312E5EB4C87A010584916687EF5F
31,499,791 UART: [art] SIG.S = C48B7294D68DCB37DCC644459C5EBB1216EEB2E9F9B09C3F70D386B714392EC003735A64E610829DF5DC74FC6EAC488D
32,804,884 UART: Caliptra RT
32,805,606 UART: [state] CFI Enabled
32,923,430 UART: [rt] RT listening for mailbox commands...
32,925,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,956,080 UART: [rt]cmd =0x44504543, len=96
38,628,453 >>> mbox cmd response data (6236 bytes)
38,657,683 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,687,892 UART: [rt]cmd =0x52564348, len=36
38,690,514 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,597 writing to cptra_bootfsm_go
4,129,290 ready_for_fw is high
4,129,719 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,077,534 >>> mbox cmd response: success
23,717,881 UART:
23,718,384 UART: Running Caliptra FMC ...
23,719,496 UART:
23,719,650 UART: [state] CFI Enabled
23,727,279 UART: [fht] FMC Alias Private Key: 7
26,058,782 UART: [art] Extend RT PCRs Done
26,060,017 UART: [art] Lock RT PCRs Done
26,061,786 UART: [art] Populate DV Done
26,067,206 UART: [fht] FMC Alias Private Key: 7
26,068,807 UART: [art] Derive CDI
26,069,625 UART: [art] Store in in slot 0x4
26,112,380 UART: [art] Derive Key Pair
26,113,381 UART: [art] Store priv key in slot 0x5
29,354,722 UART: [art] Derive Key Pair - Done
29,367,617 UART: [art] Signing Cert with AUTHO
29,368,921 UART: RITY.KEYID = 7
31,648,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,589 UART: [art] PUB.X = CFFDC489647EB0E454AA600B97133F6B696B6F8C1FAA2789ACEFE6ABC52F7E5551437300DC05EC9C59B0E98F67910834
31,656,805 UART: [art] PUB.Y = A83213F7A4A1E7DC4D26EF7622D2724A90CC7D9990826C51F6600F5C900321C64566B3CAF0CC2C2951360DFF2040A55A
31,664,080 UART: [art] SIG.R = 25852E0CE657150F7F7FD690DF3DE8BD4090835BA0D864ADE8C120C12AC3AB0CD29E877A5962008A6BDB6791824A15D4
31,671,421 UART: [art] SIG.S = 62306DC63AA3F570A2457FA989F9D130AE407BB198E72AE6FDF851CCDA6F913E679005B4F2A64AAC130F82E39A81F65B
32,977,275 UART: Caliptra RT
32,977,995 UART: [state] CFI Enabled
33,095,677 UART: [rt] RT listening for mailbox commands...
33,097,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,900 UART: [rt]cmd =0x44504543, len=96
38,800,054 >>> mbox cmd response data (6236 bytes)
38,829,285 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,859,311 UART: [rt]cmd =0x52564348, len=36
38,861,938 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,387 UART:
192,782 UART: Running Caliptra ROM ...
193,881 UART:
194,022 UART: [state] CFI Enabled
261,487 UART: [state] LifecycleState = Unprovisioned
263,412 UART: [state] DebugLocked = No
265,852 UART: [state] WD Timer not started. Device not locked for debugging
269,182 UART: [kat] SHA2-256
448,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,839 UART: [kat] ++
460,374 UART: [kat] sha1
472,174 UART: [kat] SHA2-256
475,245 UART: [kat] SHA2-384
480,518 UART: [kat] SHA2-512-ACC
483,524 UART: [kat] ECC-384
2,948,782 UART: [kat] HMAC-384Kdf
2,972,164 UART: [kat] LMS
3,501,637 UART: [kat] --
3,507,466 UART: [cold-reset] ++
3,509,039 UART: [fht] FHT @ 0x50003400
3,520,021 UART: [idev] ++
3,520,588 UART: [idev] CDI.KEYID = 6
3,521,473 UART: [idev] SUBJECT.KEYID = 7
3,522,606 UART: [idev] UDS.KEYID = 0
3,523,590 ready_for_fw is high
3,523,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,369 UART: [idev] Erasing UDS.KEYID = 0
6,028,472 UART: [idev] Sha1 KeyId Algorithm
6,052,400 UART: [idev] --
6,056,693 UART: [ldev] ++
6,057,279 UART: [ldev] CDI.KEYID = 6
6,058,186 UART: [ldev] SUBJECT.KEYID = 5
6,059,349 UART: [ldev] AUTHORITY.KEYID = 7
6,060,553 UART: [ldev] FE.KEYID = 1
6,104,490 UART: [ldev] Erasing FE.KEYID = 1
8,611,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,608 UART: [ldev] --
10,416,406 UART: [fwproc] Wait for Commands...
10,418,003 UART: [fwproc] Recv command 0x46574c44
10,420,036 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,267 >>> mbox cmd response: success
14,284,927 UART: [afmc] ++
14,285,561 UART: [afmc] CDI.KEYID = 6
14,286,472 UART: [afmc] SUBJECT.KEYID = 7
14,287,629 UART: [afmc] AUTHORITY.KEYID = 5
16,830,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,240 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,493 UART: [afmc] --
18,631,137 UART: [cold-reset] --
18,635,315 UART: [state] Locking Datavault
18,642,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,783 UART: [state] Locking ICCM
18,646,253 UART: [exit] Launching FMC @ 0x40000130
18,654,708 UART:
18,654,957 UART: Running Caliptra FMC ...
18,656,057 UART:
18,656,216 UART: [state] CFI Enabled
18,713,491 UART: [fht] FMC Alias Private Key: 7
20,477,231 UART: [art] Extend RT PCRs Done
20,478,458 UART: [art] Lock RT PCRs Done
20,480,188 UART: [art] Populate DV Done
20,485,867 UART: [fht] FMC Alias Private Key: 7
20,487,355 UART: [art] Derive CDI
20,488,112 UART: [art] Store in in slot 0x4
20,545,591 UART: [art] Derive Key Pair
20,546,625 UART: [art] Store priv key in slot 0x5
23,008,568 UART: [art] Derive Key Pair - Done
23,021,524 UART: [art] Signing Cert with AUTHO
23,022,833 UART: RITY.KEYID = 7
24,733,479 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,284 UART: [art] PUB.X = 03EE32CAF39C449A1E4BCDEC0C8A33521725D7EA9AA0925C7AA20137E6C8202B944ACB4BDE096431FC3F9E3E5F460721
24,742,310 UART: [art] PUB.Y = D0660D98577FA2D47332E9AB2D6C87334BB674798193D3B4EA61DDF113C83D066B43DDABE6644EDDBAADF5A0E0597A32
24,749,580 UART: [art] SIG.R = 01EC8F0BDE8936D0D0B5D3DE0AF4BD87F1D9416C594ADEB195E5057D32941C12AB62CE5F227F7A12A8D510E42793D423
24,757,136 UART: [art] SIG.S = 83B6A44AA9AA0C810980CBCD5020C5426CC3D4E962B525B8F9EE3C94626C9ED66546418CA35575C28EC8A28F9917E227
25,735,904 UART: Caliptra RT
25,736,623 UART: [state] CFI Enabled
25,900,214 UART: [rt] RT listening for mailbox commands...
25,902,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,265 UART: [rt]cmd =0x44504543, len=96
30,291,959 >>> mbox cmd response data (6236 bytes)
30,321,798 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,352,154 UART: [rt]cmd =0x52564348, len=36
30,354,874 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,361,468 ready_for_fw is high
3,361,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,741 >>> mbox cmd response: success
18,365,348 UART:
18,365,760 UART: Running Caliptra FMC ...
18,366,953 UART:
18,367,118 UART: [state] CFI Enabled
18,429,691 UART: [fht] FMC Alias Private Key: 7
20,193,146 UART: [art] Extend RT PCRs Done
20,194,371 UART: [art] Lock RT PCRs Done
20,195,842 UART: [art] Populate DV Done
20,201,149 UART: [fht] FMC Alias Private Key: 7
20,202,852 UART: [art] Derive CDI
20,203,662 UART: [art] Store in in slot 0x4
20,263,249 UART: [art] Derive Key Pair
20,264,285 UART: [art] Store priv key in slot 0x5
22,727,135 UART: [art] Derive Key Pair - Done
22,740,360 UART: [art] Signing Cert with AUTHO
22,741,669 UART: RITY.KEYID = 7
24,452,961 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,468 UART: [art] PUB.X = 523BEC606004A8AF9009932F1985163FEBD47D766B788714F77C93837F4FE4B45D99E3A9A9AA0556E19F21C1A06D4898
24,461,705 UART: [art] PUB.Y = 489037BA1360577F8B322D8138AFB73AA90CA64A7A16F9CFAC586F10079154AE3ED5206BB3C26CCD76FFA7FE2C80BE60
24,469,000 UART: [art] SIG.R = F3FCF6206932174A39EAD914834EA1A6D73DED821EF0B9610A1DA1FC02D3EEC8DE94F0900D2479F2EDD6CA0938356796
24,476,375 UART: [art] SIG.S = 763AF8F9775A10A0B030C066844D96AAA71924339A88F7E8EF9FF75CAC39421F1F0CDBD88FCAAB254FED8CE099959BB7
25,455,389 UART: Caliptra RT
25,456,099 UART: [state] CFI Enabled
25,620,781 UART: [rt] RT listening for mailbox commands...
25,622,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,654,010 UART: [rt]cmd =0x44504543, len=96
30,032,230 >>> mbox cmd response data (6236 bytes)
30,061,639 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,091,770 UART: [rt]cmd =0x52564348, len=36
30,094,357 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
193,154 UART:
193,519 UART: Running Caliptra ROM ...
194,704 UART:
604,148 UART: [state] CFI Enabled
620,502 UART: [state] LifecycleState = Unprovisioned
622,301 UART: [state] DebugLocked = No
624,752 UART: [state] WD Timer not started. Device not locked for debugging
628,931 UART: [kat] SHA2-256
808,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,649 UART: [kat] ++
820,194 UART: [kat] sha1
831,005 UART: [kat] SHA2-256
834,026 UART: [kat] SHA2-384
840,162 UART: [kat] SHA2-512-ACC
843,119 UART: [kat] ECC-384
3,283,280 UART: [kat] HMAC-384Kdf
3,295,171 UART: [kat] LMS
3,824,666 UART: [kat] --
3,828,165 UART: [cold-reset] ++
3,829,744 UART: [fht] FHT @ 0x50003400
3,840,521 UART: [idev] ++
3,841,127 UART: [idev] CDI.KEYID = 6
3,842,045 UART: [idev] SUBJECT.KEYID = 7
3,843,222 UART: [idev] UDS.KEYID = 0
3,844,145 ready_for_fw is high
3,844,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,482 UART: [idev] Erasing UDS.KEYID = 0
6,317,259 UART: [idev] Sha1 KeyId Algorithm
6,339,798 UART: [idev] --
6,343,795 UART: [ldev] ++
6,344,391 UART: [ldev] CDI.KEYID = 6
6,345,279 UART: [ldev] SUBJECT.KEYID = 5
6,346,441 UART: [ldev] AUTHORITY.KEYID = 7
6,347,734 UART: [ldev] FE.KEYID = 1
6,357,972 UART: [ldev] Erasing FE.KEYID = 1
8,834,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,281 UART: [ldev] --
10,622,198 UART: [fwproc] Wait for Commands...
10,624,298 UART: [fwproc] Recv command 0x46574c44
10,626,393 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,481,999 >>> mbox cmd response: success
14,485,714 UART: [afmc] ++
14,486,340 UART: [afmc] CDI.KEYID = 6
14,487,254 UART: [afmc] SUBJECT.KEYID = 7
14,488,415 UART: [afmc] AUTHORITY.KEYID = 5
16,989,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,924 UART: [afmc] --
18,786,473 UART: [cold-reset] --
18,791,035 UART: [state] Locking Datavault
18,794,072 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,776 UART: [state] Locking ICCM
18,797,852 UART: [exit] Launching FMC @ 0x40000130
18,806,262 UART:
18,806,502 UART: Running Caliptra FMC ...
18,807,538 UART:
18,807,684 UART: [state] CFI Enabled
18,816,008 UART: [fht] FMC Alias Private Key: 7
20,572,584 UART: [art] Extend RT PCRs Done
20,573,808 UART: [art] Lock RT PCRs Done
20,575,379 UART: [art] Populate DV Done
20,580,791 UART: [fht] FMC Alias Private Key: 7
20,582,439 UART: [art] Derive CDI
20,583,255 UART: [art] Store in in slot 0x4
20,626,067 UART: [art] Derive Key Pair
20,627,068 UART: [art] Store priv key in slot 0x5
23,053,792 UART: [art] Derive Key Pair - Done
23,066,872 UART: [art] Signing Cert with AUTHO
23,068,180 UART: RITY.KEYID = 7
24,773,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,190 UART: [art] PUB.X = 5E21B3830D398995BB4456EB14161D9A881BF578677356A595A843AFB2F939302639D26DE1CF6FFBF180B132BB7E63BF
24,782,410 UART: [art] PUB.Y = 26B8FCA152FBFD70608FC371312ED988F471A707A8988641D2C6D41CDE3970AE11591E6A72E9E006D70FCBFB41AE184D
24,789,719 UART: [art] SIG.R = 840C654B5032F29E43078387B75F0091501DE16562A93638AE825187FB7FD6DE4652FFAA91093C70ECE221216FD5C4D2
24,797,110 UART: [art] SIG.S = CD1CD7F0A0739BA8F30C7ACE721056D0251991BCA355B721FC452CC1D6449655BBA89BDA1C3A5B39806C0807ADE54130
25,775,933 UART: Caliptra RT
25,776,639 UART: [state] CFI Enabled
25,893,488 UART: [rt] RT listening for mailbox commands...
25,895,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,925,785 UART: [rt]cmd =0x44504543, len=96
30,208,027 >>> mbox cmd response data (6236 bytes)
30,237,362 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,267,600 UART: [rt]cmd =0x52564348, len=36
30,270,199 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
3,692,864 ready_for_fw is high
3,693,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,424 >>> mbox cmd response: success
18,506,862 UART:
18,507,282 UART: Running Caliptra FMC ...
18,508,423 UART:
18,508,586 UART: [state] CFI Enabled
18,516,542 UART: [fht] FMC Alias Private Key: 7
20,273,626 UART: [art] Extend RT PCRs Done
20,274,853 UART: [art] Lock RT PCRs Done
20,276,592 UART: [art] Populate DV Done
20,282,171 UART: [fht] FMC Alias Private Key: 7
20,283,770 UART: [art] Derive CDI
20,284,589 UART: [art] Store in in slot 0x4
20,327,025 UART: [art] Derive Key Pair
20,328,078 UART: [art] Store priv key in slot 0x5
22,754,247 UART: [art] Derive Key Pair - Done
22,767,146 UART: [art] Signing Cert with AUTHO
22,768,472 UART: RITY.KEYID = 7
24,473,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,429 UART: [art] PUB.X = 5B01F04048F20EE528677E954BBE8D024D1E2BEF88D9B5D8CC20EAABEB959DA3E045CEBBD33F1E9172C960C62CF2061F
24,482,715 UART: [art] PUB.Y = 15B6DD6C8BEE0CC1CAF6DF9278E0F60A6D071670E87B70B065FCF51BE442934FDE75A2F542B6C1FE9F85086542272487
24,489,999 UART: [art] SIG.R = 973BE48325AD6E7FF7B668E5D3FAE407DDBD5DE5D454E34DF78A3F409DABC32AE295E16152392A08D0FDCDD6B9F60AFB
24,497,432 UART: [art] SIG.S = A7B0818DE6059348B38C8F208FE6556C86C64C502EE702FAA405C817E4BA20172F9D51B0F6C64087FD70D6DFDD8EE8BE
25,476,910 UART: Caliptra RT
25,477,626 UART: [state] CFI Enabled
25,595,054 UART: [rt] RT listening for mailbox commands...
25,596,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,627,652 UART: [rt]cmd =0x44504543, len=96
29,910,544 >>> mbox cmd response data (6236 bytes)
29,939,945 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,970,061 UART: [rt]cmd =0x52564348, len=36
29,972,886 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,316 UART:
192,684 UART: Running Caliptra ROM ...
193,881 UART:
194,034 UART: [state] CFI Enabled
263,358 UART: [state] LifecycleState = Unprovisioned
265,767 UART: [state] DebugLocked = No
267,438 UART: [state] WD Timer not started. Device not locked for debugging
272,213 UART: [kat] SHA2-256
462,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,873 UART: [kat] ++
473,361 UART: [kat] sha1
484,378 UART: [kat] SHA2-256
487,380 UART: [kat] SHA2-384
495,037 UART: [kat] SHA2-512-ACC
497,628 UART: [kat] ECC-384
2,948,795 UART: [kat] HMAC-384Kdf
2,972,690 UART: [kat] LMS
3,504,487 UART: [kat] --
3,507,631 UART: [cold-reset] ++
3,509,489 UART: [fht] FHT @ 0x50003400
3,521,607 UART: [idev] ++
3,522,240 UART: [idev] CDI.KEYID = 6
3,523,270 UART: [idev] SUBJECT.KEYID = 7
3,524,455 UART: [idev] UDS.KEYID = 0
3,525,424 ready_for_fw is high
3,525,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,198 UART: [idev] Erasing UDS.KEYID = 0
6,030,946 UART: [idev] Sha1 KeyId Algorithm
6,054,008 UART: [idev] --
6,059,956 UART: [ldev] ++
6,060,639 UART: [ldev] CDI.KEYID = 6
6,061,534 UART: [ldev] SUBJECT.KEYID = 5
6,062,745 UART: [ldev] AUTHORITY.KEYID = 7
6,063,976 UART: [ldev] FE.KEYID = 1
6,100,536 UART: [ldev] Erasing FE.KEYID = 1
8,607,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,145 UART: [ldev] --
10,415,670 UART: [fwproc] Wait for Commands...
10,418,529 UART: [fwproc] Recv command 0x46574c44
10,420,780 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,972 >>> mbox cmd response: success
14,604,931 UART: [afmc] ++
14,605,672 UART: [afmc] CDI.KEYID = 6
14,606,786 UART: [afmc] SUBJECT.KEYID = 7
14,608,339 UART: [afmc] AUTHORITY.KEYID = 5
17,151,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,225 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,750 UART: [afmc] --
18,946,480 UART: [cold-reset] --
18,951,911 UART: [state] Locking Datavault
18,958,304 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,457 UART: [state] Locking ICCM
18,961,783 UART: [exit] Launching FMC @ 0x40000130
18,970,460 UART:
18,970,696 UART: Running Caliptra FMC ...
18,971,927 UART:
18,972,080 UART: [state] CFI Enabled
19,030,852 UART: [fht] FMC Alias Private Key: 7
20,794,824 UART: [art] Extend RT PCRs Done
20,796,046 UART: [art] Lock RT PCRs Done
20,797,665 UART: [art] Populate DV Done
20,803,021 UART: [fht] FMC Alias Private Key: 7
20,804,721 UART: [art] Derive CDI
20,805,453 UART: [art] Store in in slot 0x4
20,863,518 UART: [art] Derive Key Pair
20,864,556 UART: [art] Store priv key in slot 0x5
23,327,114 UART: [art] Derive Key Pair - Done
23,340,175 UART: [art] Signing Cert with AUTHO
23,341,468 UART: RITY.KEYID = 7
25,052,591 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,104 UART: [art] PUB.X = 57FF6CADFBDF07804447353CCC61359F3DDA8768AB2AB5913E2E9390D655D8ACA5555F1AC0B35B6962A1E86523FBBBB4
25,061,432 UART: [art] PUB.Y = 2F20CD8A223FD6C228B3EBCF2D29A32FB5CD071E49F0AB9322D6018932EEF5BE21B9BED156FBE5F81DCB6F00C4133F43
25,068,732 UART: [art] SIG.R = BCB08881298F2FFC803F5C61D9BAF36B58FC81180F4C8D8704D0F1581C77232C21B39D5D4531C4F54E9AC9131254CFB9
25,076,101 UART: [art] SIG.S = 0BA10343D037415ADF28A2DF74F7351688039D55A2241CC0FD2648E8F3AAC587372C2B6F30EA37F8B5856BAA4BEDA065
26,055,059 UART: Caliptra RT
26,055,799 UART: [state] CFI Enabled
26,220,180 UART: [rt] RT listening for mailbox commands...
26,222,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,560 UART: [rt]cmd =0x44504543, len=96
30,631,073 >>> mbox cmd response data (6236 bytes)
30,660,970 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,691,323 UART: [rt]cmd =0x52564348, len=36
30,694,198 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,439,342 ready_for_fw is high
3,439,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,734,321 >>> mbox cmd response: success
19,048,992 UART:
19,049,426 UART: Running Caliptra FMC ...
19,050,534 UART:
19,050,690 UART: [state] CFI Enabled
19,117,455 UART: [fht] FMC Alias Private Key: 7
20,882,195 UART: [art] Extend RT PCRs Done
20,883,417 UART: [art] Lock RT PCRs Done
20,884,853 UART: [art] Populate DV Done
20,890,214 UART: [fht] FMC Alias Private Key: 7
20,891,857 UART: [art] Derive CDI
20,892,590 UART: [art] Store in in slot 0x4
20,950,160 UART: [art] Derive Key Pair
20,951,238 UART: [art] Store priv key in slot 0x5
23,414,352 UART: [art] Derive Key Pair - Done
23,427,296 UART: [art] Signing Cert with AUTHO
23,428,600 UART: RITY.KEYID = 7
25,140,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,810 UART: [art] PUB.X = B57AE75EECA76AEA8463E9D5364C491D4A27B7D30750EA5DDB99267B9B08AC717E270D623ED997FC7A46DFA5372D8C99
25,149,052 UART: [art] PUB.Y = 5CA1C48A5196CC33A94477B03A9FD55F3F9831A8253E9E77FA5AD2B6035ECAFF1F63371DFBAE344BCDBF700096CC6067
25,156,340 UART: [art] SIG.R = 61E412C2D244527482196E49130233B2F57B6022E460BABB905EBF04D8402FC252E63499C617DEF54C1FD38B0B15005B
25,163,704 UART: [art] SIG.S = 47FE7C9A7887D015EB9F6AFB8BEF206E07C0DAB71641568BB7F130E150487A55DD1F191C76C7F5FA47AEC6BF73F49232
26,141,732 UART: Caliptra RT
26,142,424 UART: [state] CFI Enabled
26,309,246 UART: [rt] RT listening for mailbox commands...
26,311,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,962 UART: [rt]cmd =0x44504543, len=96
30,700,307 >>> mbox cmd response data (6236 bytes)
30,729,413 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,759,547 UART: [rt]cmd =0x52564348, len=36
30,761,963 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,665 writing to cptra_bootfsm_go
192,819 UART:
193,201 UART: Running Caliptra ROM ...
194,327 UART:
603,927 UART: [state] CFI Enabled
619,152 UART: [state] LifecycleState = Unprovisioned
621,529 UART: [state] DebugLocked = No
623,488 UART: [state] WD Timer not started. Device not locked for debugging
628,665 UART: [kat] SHA2-256
818,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,363 UART: [kat] ++
829,970 UART: [kat] sha1
841,844 UART: [kat] SHA2-256
844,865 UART: [kat] SHA2-384
851,110 UART: [kat] SHA2-512-ACC
853,700 UART: [kat] ECC-384
3,295,995 UART: [kat] HMAC-384Kdf
3,309,093 UART: [kat] LMS
3,840,969 UART: [kat] --
3,846,686 UART: [cold-reset] ++
3,848,759 UART: [fht] FHT @ 0x50003400
3,859,166 UART: [idev] ++
3,859,870 UART: [idev] CDI.KEYID = 6
3,860,821 UART: [idev] SUBJECT.KEYID = 7
3,861,995 UART: [idev] UDS.KEYID = 0
3,862,896 ready_for_fw is high
3,863,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,384 UART: [idev] Erasing UDS.KEYID = 0
6,343,018 UART: [idev] Sha1 KeyId Algorithm
6,366,583 UART: [idev] --
6,370,022 UART: [ldev] ++
6,370,711 UART: [ldev] CDI.KEYID = 6
6,371,623 UART: [ldev] SUBJECT.KEYID = 5
6,372,842 UART: [ldev] AUTHORITY.KEYID = 7
6,374,020 UART: [ldev] FE.KEYID = 1
6,383,230 UART: [ldev] Erasing FE.KEYID = 1
8,864,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,193 UART: [ldev] --
10,656,511 UART: [fwproc] Wait for Commands...
10,659,524 UART: [fwproc] Recv command 0x46574c44
10,661,832 UART: [fwproc] Recv'd Img size: 114084 bytes
14,105,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,836,692 >>> mbox cmd response: success
14,839,974 UART: [afmc] ++
14,840,703 UART: [afmc] CDI.KEYID = 6
14,841,919 UART: [afmc] SUBJECT.KEYID = 7
14,843,310 UART: [afmc] AUTHORITY.KEYID = 5
17,347,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,606 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,718 UART: [afmc] --
19,144,803 UART: [cold-reset] --
19,147,915 UART: [state] Locking Datavault
19,152,421 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,637 UART: [state] Locking ICCM
19,156,313 UART: [exit] Launching FMC @ 0x40000130
19,164,965 UART:
19,165,246 UART: Running Caliptra FMC ...
19,166,301 UART:
19,166,452 UART: [state] CFI Enabled
19,174,235 UART: [fht] FMC Alias Private Key: 7
20,930,687 UART: [art] Extend RT PCRs Done
20,931,911 UART: [art] Lock RT PCRs Done
20,933,513 UART: [art] Populate DV Done
20,938,879 UART: [fht] FMC Alias Private Key: 7
20,940,479 UART: [art] Derive CDI
20,941,220 UART: [art] Store in in slot 0x4
20,984,076 UART: [art] Derive Key Pair
20,985,077 UART: [art] Store priv key in slot 0x5
23,411,787 UART: [art] Derive Key Pair - Done
23,424,413 UART: [art] Signing Cert with AUTHO
23,425,715 UART: RITY.KEYID = 7
25,130,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,502 UART: [art] PUB.X = DA7A67BC3C292786AC8CCE4821FE8F4221F4C5387285C5630EE7951BBF698E3D456872CFAC5AB114F4A6EF2902A06166
25,139,795 UART: [art] PUB.Y = 39CBFFD442C31AD793DD55A099E4A07F600133C0CE13123C42C14942AFAD5861A8DBCE062C14009B311C4CDC89B07982
25,146,998 UART: [art] SIG.R = 050A4A586A7AE6AB7B52A27F21F4C0B9468F694DE365B0FD2F3A0B125B604E1E2E67ABF053B1DAB19A489D548A7F16CF
25,154,421 UART: [art] SIG.S = 6B5A815BC9760021DFE7A31DBA87A2463797E2B4FC101462FAE6F5551FBF1EC2F1DF18EE13135297CA150E09D46930E1
26,133,659 UART: Caliptra RT
26,134,378 UART: [state] CFI Enabled
26,251,717 UART: [rt] RT listening for mailbox commands...
26,253,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,288 UART: [rt]cmd =0x44504543, len=96
30,567,105 >>> mbox cmd response data (6236 bytes)
30,596,159 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,626,334 UART: [rt]cmd =0x52564348, len=36
30,629,073 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,698 writing to cptra_bootfsm_go
3,753,899 ready_for_fw is high
3,754,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,854 >>> mbox cmd response: success
19,195,258 UART:
19,195,673 UART: Running Caliptra FMC ...
19,196,989 UART:
19,197,159 UART: [state] CFI Enabled
19,204,738 UART: [fht] FMC Alias Private Key: 7
20,962,029 UART: [art] Extend RT PCRs Done
20,963,257 UART: [art] Lock RT PCRs Done
20,965,004 UART: [art] Populate DV Done
20,970,164 UART: [fht] FMC Alias Private Key: 7
20,971,763 UART: [art] Derive CDI
20,972,505 UART: [art] Store in in slot 0x4
21,015,425 UART: [art] Derive Key Pair
21,016,472 UART: [art] Store priv key in slot 0x5
23,443,582 UART: [art] Derive Key Pair - Done
23,456,751 UART: [art] Signing Cert with AUTHO
23,458,064 UART: RITY.KEYID = 7
25,163,687 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,203 UART: [art] PUB.X = D286B73F47AE6BC4A8E455E606F838E9A5E205D55EE4B7D8AE8D6A539CEB60EBEA7C4E2830F80C5AFC1351417655838C
25,172,456 UART: [art] PUB.Y = 965B44B2ACF0792EEB55C5A81F226470F0DC90C95733AD2A7341D457D48137686446A0CE3BC70A862FD19E467DA6B307
25,179,745 UART: [art] SIG.R = E87DF736D6ADE6E2F2DCEDF5221760612CE006625BBCFC802E12FB80568B5FDD8B0BD1FCFD3818B63DF4B4AAEBC704C9
25,187,136 UART: [art] SIG.S = 921FF1CC7CDE542CC3F07A5929B521F15EC907C1545B4A13908D49FF4DDC24E6DEADD9642324651D7ACB0CFD7727F36E
26,165,963 UART: Caliptra RT
26,166,652 UART: [state] CFI Enabled
26,283,226 UART: [rt] RT listening for mailbox commands...
26,285,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,315,857 UART: [rt]cmd =0x44504543, len=96
30,598,352 >>> mbox cmd response data (6236 bytes)
30,627,433 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,657,549 UART: [rt]cmd =0x52564348, len=36
30,660,442 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
894,888 UART: [kat] SHA2-512-ACC
896,789 UART: [kat] ECC-384
901,986 UART: [kat] HMAC-384Kdf
906,544 UART: [kat] LMS
1,474,740 UART: [kat] --
1,475,439 UART: [cold-reset] ++
1,475,871 UART: [fht] Storing FHT @ 0x50003400
1,478,708 UART: [idev] ++
1,478,876 UART: [idev] CDI.KEYID = 6
1,479,236 UART: [idev] SUBJECT.KEYID = 7
1,479,660 UART: [idev] UDS.KEYID = 0
1,480,005 ready_for_fw is high
1,480,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,654 UART: [idev] Erasing UDS.KEYID = 0
1,504,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,952 UART: [idev] --
1,513,879 UART: [ldev] ++
1,514,047 UART: [ldev] CDI.KEYID = 6
1,514,410 UART: [ldev] SUBJECT.KEYID = 5
1,514,836 UART: [ldev] AUTHORITY.KEYID = 7
1,515,299 UART: [ldev] FE.KEYID = 1
1,520,331 UART: [ldev] Erasing FE.KEYID = 1
1,545,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,448 UART: [ldev] --
1,584,927 UART: [fwproc] Waiting for Commands...
1,585,742 UART: [fwproc] Received command 0x46574c44
1,586,533 UART: [fwproc] Received Image of size 114084 bytes
2,880,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,263 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,112 >>> mbox cmd response: success
3,074,296 UART: [afmc] ++
3,074,464 UART: [afmc] CDI.KEYID = 6
3,074,826 UART: [afmc] SUBJECT.KEYID = 7
3,075,251 UART: [afmc] AUTHORITY.KEYID = 5
3,110,484 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,141 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,831 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,660 UART: [afmc] --
3,153,768 UART: [cold-reset] --
3,154,442 UART: [state] Locking Datavault
3,155,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,203 UART: [state] Locking ICCM
3,156,645 UART: [exit] Launching FMC @ 0x40000130
3,161,974 UART:
3,161,990 UART: Running Caliptra FMC ...
3,162,398 UART:
3,162,452 UART: [state] CFI Enabled
3,172,997 UART: [fht] FMC Alias Private Key: 7
3,280,924 UART: [art] Extend RT PCRs Done
3,281,352 UART: [art] Lock RT PCRs Done
3,283,022 UART: [art] Populate DV Done
3,291,045 UART: [fht] FMC Alias Private Key: 7
3,292,033 UART: [art] Derive CDI
3,292,313 UART: [art] Store in in slot 0x4
3,377,822 UART: [art] Derive Key Pair
3,378,182 UART: [art] Store priv key in slot 0x5
3,391,378 UART: [art] Derive Key Pair - Done
3,406,199 UART: [art] Signing Cert with AUTHO
3,406,679 UART: RITY.KEYID = 7
3,421,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,478 UART: [art] PUB.X = 8FF8A3029CE04ECDEAD7CF664DF2C9D801E42A08563D1B29B9897671713380DD20328D7F2A83101CE3E404F4EA616C88
3,429,242 UART: [art] PUB.Y = D03CE74931371E939EB7D69DF31600C6F8E2A9F423B66B2647573836C5BB7C6D88310606AE48045179B72B9DA0D6C1ED
3,436,161 UART: [art] SIG.R = 1B4B1D0BCBDB4BB245FED6D7D2824A93C6F1615A704696D7D317B2A756F6A39117C9F08A9D366C23E0E51EF73C92D6D3
3,442,940 UART: [art] SIG.S = 5010EA50EF6991481F12540D2B8C1800491221D10226A8A6DE1C9AF1C6CD74A66746E550B7A0245A3CC9EC9CB74D7995
3,466,909 UART: Caliptra RT
3,467,162 UART: [state] CFI Enabled
3,574,502 UART: [rt] RT listening for mailbox commands...
3,575,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,852 UART: [rt]cmd =0x44504543, len=96
3,786,536 >>> mbox cmd response data (6236 bytes)
3,786,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,242 UART: [rt]cmd =0x52564348, len=36
3,818,305 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,569 ready_for_fw is high
1,361,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,018 >>> mbox cmd response: success
2,984,994 UART:
2,985,010 UART: Running Caliptra FMC ...
2,985,418 UART:
2,985,472 UART: [state] CFI Enabled
2,995,923 UART: [fht] FMC Alias Private Key: 7
3,103,936 UART: [art] Extend RT PCRs Done
3,104,364 UART: [art] Lock RT PCRs Done
3,105,962 UART: [art] Populate DV Done
3,114,133 UART: [fht] FMC Alias Private Key: 7
3,115,159 UART: [art] Derive CDI
3,115,439 UART: [art] Store in in slot 0x4
3,201,210 UART: [art] Derive Key Pair
3,201,570 UART: [art] Store priv key in slot 0x5
3,215,052 UART: [art] Derive Key Pair - Done
3,229,845 UART: [art] Signing Cert with AUTHO
3,230,325 UART: RITY.KEYID = 7
3,245,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,356 UART: [art] PUB.X = 5F8ACB1B9D105C739A5392C97442D1A529CE663B22A6FEC24505EDC2B8E874E6313246E60F4E0EF988FF209F1BF43316
3,253,123 UART: [art] PUB.Y = 49DA2EA60043D4D7D99FCEFC4EFF30D2D68755757322BDBC94C2EC6E4F375267E3F0A9A5D4D28455340E8C50DF634605
3,260,055 UART: [art] SIG.R = 6178F1995DE1ED92152542BA8B1FB76975F629D0DAD6A527038E1363C445DB7961705CDE7158746895B4F59D9BDA6D56
3,266,820 UART: [art] SIG.S = B107E142F790D26DC72304FB327CDAEB6CDD21F2CE781862582C492204B0CC782AB3C825E8C41BE30946BA490AEA9598
3,290,210 UART: Caliptra RT
3,290,463 UART: [state] CFI Enabled
3,398,268 UART: [rt] RT listening for mailbox commands...
3,398,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,524 UART: [rt]cmd =0x44504543, len=96
3,608,921 >>> mbox cmd response data (6236 bytes)
3,608,922 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,645 UART: [rt]cmd =0x52564348, len=36
3,640,706 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,892 UART: [kat] SHA2-256
882,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,938 UART: [kat] ++
887,090 UART: [kat] sha1
891,334 UART: [kat] SHA2-256
893,272 UART: [kat] SHA2-384
896,175 UART: [kat] SHA2-512-ACC
898,076 UART: [kat] ECC-384
903,965 UART: [kat] HMAC-384Kdf
908,707 UART: [kat] LMS
1,476,903 UART: [kat] --
1,477,832 UART: [cold-reset] ++
1,478,242 UART: [fht] Storing FHT @ 0x50003400
1,481,093 UART: [idev] ++
1,481,261 UART: [idev] CDI.KEYID = 6
1,481,621 UART: [idev] SUBJECT.KEYID = 7
1,482,045 UART: [idev] UDS.KEYID = 0
1,482,390 ready_for_fw is high
1,482,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,065 UART: [idev] Erasing UDS.KEYID = 0
1,506,247 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,873 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,608 UART: [ldev] Erasing FE.KEYID = 1
1,548,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,091 UART: [ldev] --
1,587,404 UART: [fwproc] Waiting for Commands...
1,588,029 UART: [fwproc] Received command 0x46574c44
1,588,820 UART: [fwproc] Received Image of size 114084 bytes
2,884,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,989 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,341 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,934 >>> mbox cmd response: success
3,078,086 UART: [afmc] ++
3,078,254 UART: [afmc] CDI.KEYID = 6
3,078,616 UART: [afmc] SUBJECT.KEYID = 7
3,079,041 UART: [afmc] AUTHORITY.KEYID = 5
3,114,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,733 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,423 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,446 UART: [afmc] --
3,157,470 UART: [cold-reset] --
3,158,450 UART: [state] Locking Datavault
3,159,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,249 UART: [state] Locking ICCM
3,160,727 UART: [exit] Launching FMC @ 0x40000130
3,166,056 UART:
3,166,072 UART: Running Caliptra FMC ...
3,166,480 UART:
3,166,623 UART: [state] CFI Enabled
3,177,020 UART: [fht] FMC Alias Private Key: 7
3,284,973 UART: [art] Extend RT PCRs Done
3,285,401 UART: [art] Lock RT PCRs Done
3,286,857 UART: [art] Populate DV Done
3,295,352 UART: [fht] FMC Alias Private Key: 7
3,296,514 UART: [art] Derive CDI
3,296,794 UART: [art] Store in in slot 0x4
3,382,893 UART: [art] Derive Key Pair
3,383,253 UART: [art] Store priv key in slot 0x5
3,396,549 UART: [art] Derive Key Pair - Done
3,411,191 UART: [art] Signing Cert with AUTHO
3,411,671 UART: RITY.KEYID = 7
3,426,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,746 UART: [art] PUB.X = E1332785C782C54FD97BA585D1EE0221DCD4E69C3EC689DA1226347C761FEC67A8E96AF4CBB903F5BA8F491A6C48482A
3,434,522 UART: [art] PUB.Y = CEF98CE55ECB57124C8F82320B0658DAAFCD53FCB421AF96C9435E21342094F8A2BE2755E1BDDBCCA9B56F5111F4D66C
3,441,486 UART: [art] SIG.R = A03FE54DB1F39E042EBFEEF015A033E6013FE4B789D30AE70B90A942F301D0396AC3693729880D7A9463B7A4E8B122C8
3,448,244 UART: [art] SIG.S = ADD4359D078161FC2364EA3414BAEF1B1D6BDC9CA87FB9265E826B1ED1B0BA5D122B4C40FD7E2E208011D5A0B467B304
3,471,959 UART: Caliptra RT
3,472,304 UART: [state] CFI Enabled
3,580,062 UART: [rt] RT listening for mailbox commands...
3,580,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,116 UART: [rt]cmd =0x44504543, len=96
3,791,867 >>> mbox cmd response data (6236 bytes)
3,791,868 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,161 UART: [rt]cmd =0x52564348, len=36
3,823,310 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 ready_for_fw is high
1,362,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,403 >>> mbox cmd response: success
2,987,237 UART:
2,987,253 UART: Running Caliptra FMC ...
2,987,661 UART:
2,987,804 UART: [state] CFI Enabled
2,998,661 UART: [fht] FMC Alias Private Key: 7
3,106,368 UART: [art] Extend RT PCRs Done
3,106,796 UART: [art] Lock RT PCRs Done
3,108,352 UART: [art] Populate DV Done
3,116,619 UART: [fht] FMC Alias Private Key: 7
3,117,563 UART: [art] Derive CDI
3,117,843 UART: [art] Store in in slot 0x4
3,203,908 UART: [art] Derive Key Pair
3,204,268 UART: [art] Store priv key in slot 0x5
3,217,254 UART: [art] Derive Key Pair - Done
3,231,974 UART: [art] Signing Cert with AUTHO
3,232,454 UART: RITY.KEYID = 7
3,248,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,781 UART: [art] PUB.X = AC8D2915A256FE00B0D94510EA3711E1C34AFDEFEEC5EA51D343EC0D312F554CA11F4A7E8E3448A1650CD6DB88EF563F
3,255,543 UART: [art] PUB.Y = 3DBF180630B80ED65752E06D4A520CDA428AEF3747909F85B911F93131646763CB4F69459DD793BB543B34214DCD3663
3,262,480 UART: [art] SIG.R = 54305B73CB97C9A4DB4A7C5EBFD6305B9A51782FA50FE67100E6D109FFEB08EA52DF909B4C60F545D615AF438489DA3D
3,269,233 UART: [art] SIG.S = 05BC9DAC3BEDCA00B70563A87DD80B12857025EE5A1099E3D8A7D91857B7566D00CEDD522C0D23A25C6EAA6722258019
3,293,104 UART: Caliptra RT
3,293,449 UART: [state] CFI Enabled
3,401,673 UART: [rt] RT listening for mailbox commands...
3,402,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,771 UART: [rt]cmd =0x44504543, len=96
3,612,783 >>> mbox cmd response data (6236 bytes)
3,612,784 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,309 UART: [rt]cmd =0x52564348, len=36
3,644,304 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
893,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,797 UART: [kat] ++
897,949 UART: [kat] sha1
902,173 UART: [kat] SHA2-256
904,113 UART: [kat] SHA2-384
906,718 UART: [kat] SHA2-512-ACC
908,619 UART: [kat] ECC-384
918,914 UART: [kat] HMAC-384Kdf
923,670 UART: [kat] LMS
1,171,998 UART: [kat] --
1,172,843 UART: [cold-reset] ++
1,173,193 UART: [fht] FHT @ 0x50003400
1,175,720 UART: [idev] ++
1,175,888 UART: [idev] CDI.KEYID = 6
1,176,248 UART: [idev] SUBJECT.KEYID = 7
1,176,672 UART: [idev] UDS.KEYID = 0
1,177,017 ready_for_fw is high
1,177,017 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,366 UART: [idev] Erasing UDS.KEYID = 0
1,201,569 UART: [idev] Sha1 KeyId Algorithm
1,209,915 UART: [idev] --
1,211,069 UART: [ldev] ++
1,211,237 UART: [ldev] CDI.KEYID = 6
1,211,600 UART: [ldev] SUBJECT.KEYID = 5
1,212,026 UART: [ldev] AUTHORITY.KEYID = 7
1,212,489 UART: [ldev] FE.KEYID = 1
1,217,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,045 UART: [ldev] --
1,283,470 UART: [fwproc] Wait for Commands...
1,284,290 UART: [fwproc] Recv command 0x46574c44
1,285,018 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,705 >>> mbox cmd response: success
2,774,879 UART: [afmc] ++
2,775,047 UART: [afmc] CDI.KEYID = 6
2,775,409 UART: [afmc] SUBJECT.KEYID = 7
2,775,834 UART: [afmc] AUTHORITY.KEYID = 5
2,810,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,310 UART: [afmc] --
2,854,286 UART: [cold-reset] --
2,855,354 UART: [state] Locking Datavault
2,856,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,017 UART: [state] Locking ICCM
2,857,517 UART: [exit] Launching FMC @ 0x40000130
2,862,846 UART:
2,862,862 UART: Running Caliptra FMC ...
2,863,270 UART:
2,863,324 UART: [state] CFI Enabled
2,873,811 UART: [fht] FMC Alias Private Key: 7
2,981,548 UART: [art] Extend RT PCRs Done
2,981,976 UART: [art] Lock RT PCRs Done
2,983,712 UART: [art] Populate DV Done
2,991,829 UART: [fht] FMC Alias Private Key: 7
2,992,813 UART: [art] Derive CDI
2,993,093 UART: [art] Store in in slot 0x4
3,078,710 UART: [art] Derive Key Pair
3,079,070 UART: [art] Store priv key in slot 0x5
3,092,272 UART: [art] Derive Key Pair - Done
3,107,038 UART: [art] Signing Cert with AUTHO
3,107,518 UART: RITY.KEYID = 7
3,122,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,943 UART: [art] PUB.X = E74D1C0A075A6CA6D1C90807F709700223675E591CB7049EE56806E3CE66F964563D62B38CA0EAD75CDFE0C3A5994DA3
3,129,695 UART: [art] PUB.Y = EDFBABB585B2E4333A6765AA442531634A9D86118A0F75A546F7D82DF01FFEC77FB0D17ABEB15FB46EF07ACC67BEF9DE
3,136,668 UART: [art] SIG.R = 40C8E01BBB9C232EB915E3A231B3E0DCD3DD1FFCA143D0D500E694AF6FF2DB58CF6632FD06EF55C109256ED51201A3CC
3,143,429 UART: [art] SIG.S = 30A6ACB2FFB0FF9AFDBE56184007C393A0532DE7988DC465271E6E51C15BD18A0C2ADBAC14A7840CF1B283B0139CA095
3,166,899 UART: Caliptra RT
3,167,152 UART: [state] CFI Enabled
3,275,339 UART: [rt] RT listening for mailbox commands...
3,276,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,353 UART: [rt]cmd =0x44504543, len=96
3,485,971 >>> mbox cmd response data (6236 bytes)
3,485,972 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,619 UART: [rt]cmd =0x52564348, len=36
3,517,754 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,988 >>> mbox cmd response: success
2,686,416 UART:
2,686,432 UART: Running Caliptra FMC ...
2,686,840 UART:
2,686,894 UART: [state] CFI Enabled
2,697,057 UART: [fht] FMC Alias Private Key: 7
2,804,714 UART: [art] Extend RT PCRs Done
2,805,142 UART: [art] Lock RT PCRs Done
2,807,168 UART: [art] Populate DV Done
2,815,291 UART: [fht] FMC Alias Private Key: 7
2,816,347 UART: [art] Derive CDI
2,816,627 UART: [art] Store in in slot 0x4
2,902,096 UART: [art] Derive Key Pair
2,902,456 UART: [art] Store priv key in slot 0x5
2,914,894 UART: [art] Derive Key Pair - Done
2,930,000 UART: [art] Signing Cert with AUTHO
2,930,480 UART: RITY.KEYID = 7
2,945,908 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,673 UART: [art] PUB.X = 279637D180BD28624A7D09AEEE68A4A2FC357564287F1CC747CBDD6EDDF5071507640C5261C6A2B3E9ECF0F3E61CDB06
2,953,440 UART: [art] PUB.Y = 8F8B41C9229DF6DE2EBDD19C303CFE2A45F1286EC2B714EEDC076288354C58C83F0BE6AAA42FAD737F34A153BFDED0F7
2,960,408 UART: [art] SIG.R = 23E68222220DE46BC68BEF962333C601A36358C93D13FE631141ACDD927A752EE84808F2D3B373BA6B6F8F7761EC75CF
2,967,173 UART: [art] SIG.S = 3B5D3712BF0D29B7CEFE000C1AB73BA48F02E3702AC6210748A65A438461A6007CEF1F2C7045F03CFADF1B11F1CCCF01
2,990,637 UART: Caliptra RT
2,990,890 UART: [state] CFI Enabled
3,098,737 UART: [rt] RT listening for mailbox commands...
3,099,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,923 UART: [rt]cmd =0x44504543, len=96
3,310,422 >>> mbox cmd response data (6236 bytes)
3,310,423 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,818 UART: [rt]cmd =0x52564348, len=36
3,342,201 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
893,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,488 UART: [kat] ++
897,640 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,193 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,171,876 UART: [cold-reset] ++
1,172,238 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 ready_for_fw is high
1,176,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,897 UART: [idev] Erasing UDS.KEYID = 0
1,200,694 UART: [idev] Sha1 KeyId Algorithm
1,209,238 UART: [idev] --
1,210,334 UART: [ldev] ++
1,210,502 UART: [ldev] CDI.KEYID = 6
1,210,865 UART: [ldev] SUBJECT.KEYID = 5
1,211,291 UART: [ldev] AUTHORITY.KEYID = 7
1,211,754 UART: [ldev] FE.KEYID = 1
1,217,044 UART: [ldev] Erasing FE.KEYID = 1
1,243,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,650 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,791 UART: [fwproc] Recv command 0x46574c44
1,284,519 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,758 >>> mbox cmd response: success
2,771,788 UART: [afmc] ++
2,771,956 UART: [afmc] CDI.KEYID = 6
2,772,318 UART: [afmc] SUBJECT.KEYID = 7
2,772,743 UART: [afmc] AUTHORITY.KEYID = 5
2,808,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,097 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,307 UART: [afmc] --
2,852,333 UART: [cold-reset] --
2,853,331 UART: [state] Locking Datavault
2,854,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,130 UART: [state] Locking ICCM
2,855,668 UART: [exit] Launching FMC @ 0x40000130
2,860,997 UART:
2,861,013 UART: Running Caliptra FMC ...
2,861,421 UART:
2,861,564 UART: [state] CFI Enabled
2,872,135 UART: [fht] FMC Alias Private Key: 7
2,980,058 UART: [art] Extend RT PCRs Done
2,980,486 UART: [art] Lock RT PCRs Done
2,982,340 UART: [art] Populate DV Done
2,990,669 UART: [fht] FMC Alias Private Key: 7
2,991,797 UART: [art] Derive CDI
2,992,077 UART: [art] Store in in slot 0x4
3,077,424 UART: [art] Derive Key Pair
3,077,784 UART: [art] Store priv key in slot 0x5
3,090,868 UART: [art] Derive Key Pair - Done
3,105,839 UART: [art] Signing Cert with AUTHO
3,106,319 UART: RITY.KEYID = 7
3,121,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,352 UART: [art] PUB.X = 31363BB1AD13C4C495116FFCB9123E17503B29F584744BE73609A577985FAC9F399A3AB1EB1264B3ABBB6D4A6227FBB3
3,129,127 UART: [art] PUB.Y = D576C48A694E3BD89EAA11A7813977AAF8E9E679E38EE572CE9EA5290AA99ACE5D8B3373BB3559BCB39704FC755DA1E7
3,136,087 UART: [art] SIG.R = 453636D725C83063C427EAF97FB6D00B79877B9CE50D0AB9CC2C55BC62223BE9E9C203E1C4E4F4806438D89773657723
3,142,843 UART: [art] SIG.S = 54315FE0BD405C1514ADE82E8BD33B5E182CB1219B1D79B26CC3459671571B112A7068C69ED8EA2868B9ACD049A580EA
3,166,490 UART: Caliptra RT
3,166,835 UART: [state] CFI Enabled
3,273,978 UART: [rt] RT listening for mailbox commands...
3,274,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,956 UART: [rt]cmd =0x44504543, len=96
3,486,037 >>> mbox cmd response data (6236 bytes)
3,486,038 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,531 UART: [rt]cmd =0x52564348, len=36
3,517,652 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,386 ready_for_fw is high
1,060,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,207 >>> mbox cmd response: success
2,685,051 UART:
2,685,067 UART: Running Caliptra FMC ...
2,685,475 UART:
2,685,618 UART: [state] CFI Enabled
2,696,463 UART: [fht] FMC Alias Private Key: 7
2,804,320 UART: [art] Extend RT PCRs Done
2,804,748 UART: [art] Lock RT PCRs Done
2,806,418 UART: [art] Populate DV Done
2,814,957 UART: [fht] FMC Alias Private Key: 7
2,815,885 UART: [art] Derive CDI
2,816,165 UART: [art] Store in in slot 0x4
2,902,070 UART: [art] Derive Key Pair
2,902,430 UART: [art] Store priv key in slot 0x5
2,915,542 UART: [art] Derive Key Pair - Done
2,930,223 UART: [art] Signing Cert with AUTHO
2,930,703 UART: RITY.KEYID = 7
2,945,659 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,424 UART: [art] PUB.X = A3155314BE46B768E880111A77C1C569112B372B1F62EDE46BF08988962C3C4325700FF53723719F1A7C2633127AB84B
2,953,181 UART: [art] PUB.Y = 39E15EED8E3AFADE6825AA762218B739272F0E51C8DAE46D31CF81B217717C52F2AD6A31E26FEDCEC66B5FCCF4B89C63
2,960,150 UART: [art] SIG.R = 454C04E7E9854D0EBDC1F8952FC268B49904EC3A03F1D117BEA3AEE2C8EC2202935990257A5EA6431B7871E485780F47
2,966,904 UART: [art] SIG.S = 817B0E630E75F8DD610A341BB65A20C660A526289A819C263927219C86D90473BB6AE22D3D3DDE59AECDBAA9417A2EE3
2,990,853 UART: Caliptra RT
2,991,198 UART: [state] CFI Enabled
3,099,591 UART: [rt] RT listening for mailbox commands...
3,100,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,779 UART: [rt]cmd =0x44504543, len=96
3,311,605 >>> mbox cmd response data (6236 bytes)
3,311,606 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,029 UART: [rt]cmd =0x52564348, len=36
3,343,126 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,174,203 ready_for_fw is high
1,174,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,061 UART: [idev] Sha1 KeyId Algorithm
1,207,131 UART: [idev] --
1,208,212 UART: [ldev] ++
1,208,380 UART: [ldev] CDI.KEYID = 6
1,208,744 UART: [ldev] SUBJECT.KEYID = 5
1,209,171 UART: [ldev] AUTHORITY.KEYID = 7
1,209,634 UART: [ldev] FE.KEYID = 1
1,215,342 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,258 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,775 >>> mbox cmd response: success
2,769,926 UART: [afmc] ++
2,770,094 UART: [afmc] CDI.KEYID = 6
2,770,457 UART: [afmc] SUBJECT.KEYID = 7
2,770,883 UART: [afmc] AUTHORITY.KEYID = 5
2,806,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,283 UART: [afmc] --
2,849,363 UART: [cold-reset] --
2,849,891 UART: [state] Locking Datavault
2,851,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,864 UART: [state] Locking ICCM
2,852,412 UART: [exit] Launching FMC @ 0x40000130
2,857,741 UART:
2,857,757 UART: Running Caliptra FMC ...
2,858,165 UART:
2,858,219 UART: [state] CFI Enabled
2,868,788 UART: [fht] FMC Alias Private Key: 7
2,976,881 UART: [art] Extend RT PCRs Done
2,977,309 UART: [art] Lock RT PCRs Done
2,978,795 UART: [art] Populate DV Done
2,987,062 UART: [fht] FMC Alias Private Key: 7
2,988,218 UART: [art] Derive CDI
2,988,498 UART: [art] Store in in slot 0x4
3,074,505 UART: [art] Derive Key Pair
3,074,865 UART: [art] Store priv key in slot 0x5
3,088,173 UART: [art] Derive Key Pair - Done
3,103,001 UART: [art] Signing Cert with AUTHO
3,103,481 UART: RITY.KEYID = 7
3,117,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,716 UART: [art] PUB.X = E93203C842620D9F1909B3DE83928424DCBDBECFB827561E703E7C71248EBF57116310C6DB3E64F955013B650B7454C2
3,125,469 UART: [art] PUB.Y = 35B90E21E792A271A1D2B89671D3F22EF58877B97BEA0E4C68A3C945BB1F5101B28F8135AB06D683678F9445F3D33EDF
3,132,411 UART: [art] SIG.R = F0176C60A555AE321DA748C62187F5F8661E064FBAD370697B445F6C6D87ABF380A073CEADDF6FA49E6552498149C4EC
3,139,186 UART: [art] SIG.S = ADD851FA37EE6DCA067D45CCF35657CD39F92CE5B8DAE0718BA5045F5CB3C682884C3824A30DE0CA2317AF94810B7239
3,162,623 UART: Caliptra RT
3,162,876 UART: [state] CFI Enabled
3,271,502 UART: [rt] RT listening for mailbox commands...
3,272,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,978 UART: [rt]cmd =0x44504543, len=96
3,482,515 >>> mbox cmd response data (6236 bytes)
3,482,516 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,155 UART: [rt]cmd =0x52564348, len=36
3,514,172 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,056 ready_for_fw is high
1,056,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,481 >>> mbox cmd response: success
2,679,533 UART:
2,679,549 UART: Running Caliptra FMC ...
2,679,957 UART:
2,680,011 UART: [state] CFI Enabled
2,690,326 UART: [fht] FMC Alias Private Key: 7
2,798,823 UART: [art] Extend RT PCRs Done
2,799,251 UART: [art] Lock RT PCRs Done
2,800,799 UART: [art] Populate DV Done
2,809,090 UART: [fht] FMC Alias Private Key: 7
2,810,060 UART: [art] Derive CDI
2,810,340 UART: [art] Store in in slot 0x4
2,895,819 UART: [art] Derive Key Pair
2,896,179 UART: [art] Store priv key in slot 0x5
2,909,553 UART: [art] Derive Key Pair - Done
2,924,129 UART: [art] Signing Cert with AUTHO
2,924,609 UART: RITY.KEYID = 7
2,939,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,462 UART: [art] PUB.X = D3358662469382022CB445B39E3910D497BB7F4F076B617ED86096F986DF7352FD29103A44E71A10581E834FAE3F96FC
2,947,220 UART: [art] PUB.Y = B0940CB2C8743CA227E9C6ACBDAE9EA71335635F9C562B2E8BAB63A022F29B83B803F2ADE169E0F8747B5C6A41A553CE
2,954,180 UART: [art] SIG.R = A3D6F7BDDD3CC38C831D147D478D26C1275BC5D82DCE1EEB5D7DAFAEE247CE02EE55DDBB5EEFF388EAF77D1B6E7F5720
2,960,983 UART: [art] SIG.S = C6A098708249AB52035FB3FF870869CBC38CC83A27ED57BA9BD1EEC5DF2BE5612678DF5D6549D7040CDB75151F7871AB
2,984,516 UART: Caliptra RT
2,984,769 UART: [state] CFI Enabled
3,093,395 UART: [rt] RT listening for mailbox commands...
3,094,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,301 UART: [rt]cmd =0x44504543, len=96
3,305,400 >>> mbox cmd response data (6236 bytes)
3,305,401 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,956 UART: [rt]cmd =0x52564348, len=36
3,336,991 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,174,700 ready_for_fw is high
1,174,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,565 UART: [ldev] ++
1,209,733 UART: [ldev] CDI.KEYID = 6
1,210,097 UART: [ldev] SUBJECT.KEYID = 5
1,210,524 UART: [ldev] AUTHORITY.KEYID = 7
1,210,987 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,818 UART: [fwproc] Recv command 0x46574c44
1,283,551 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,324 >>> mbox cmd response: success
2,770,361 UART: [afmc] ++
2,770,529 UART: [afmc] CDI.KEYID = 6
2,770,892 UART: [afmc] SUBJECT.KEYID = 7
2,771,318 UART: [afmc] AUTHORITY.KEYID = 5
2,806,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,128 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,459 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,128 UART: [afmc] --
2,850,014 UART: [cold-reset] --
2,850,794 UART: [state] Locking Datavault
2,852,001 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,605 UART: [state] Locking ICCM
2,853,189 UART: [exit] Launching FMC @ 0x40000130
2,858,518 UART:
2,858,534 UART: Running Caliptra FMC ...
2,858,942 UART:
2,859,085 UART: [state] CFI Enabled
2,869,732 UART: [fht] FMC Alias Private Key: 7
2,977,627 UART: [art] Extend RT PCRs Done
2,978,055 UART: [art] Lock RT PCRs Done
2,979,489 UART: [art] Populate DV Done
2,987,848 UART: [fht] FMC Alias Private Key: 7
2,988,816 UART: [art] Derive CDI
2,989,096 UART: [art] Store in in slot 0x4
3,074,513 UART: [art] Derive Key Pair
3,074,873 UART: [art] Store priv key in slot 0x5
3,088,239 UART: [art] Derive Key Pair - Done
3,102,757 UART: [art] Signing Cert with AUTHO
3,103,237 UART: RITY.KEYID = 7
3,118,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,838 UART: [art] PUB.X = CF9199CFC3F2A3424C5A3DAEC68A61FA5CD1C7E6552B844415DD3869DA6C6D0AA80FB1B762DF8C2FC562C9788B2395CB
3,125,622 UART: [art] PUB.Y = 6FEEB627859F4AD4F0640C1690CDA042154273F89D719C76D9BB2F99320190D56F8C717725E332DC6B049E45FD9AF804
3,132,560 UART: [art] SIG.R = F9DFB354F3265D537630EC5B5842F0B91EF37366F32CF4637D657B055A79CE1D1819D980FE956AE23BC0207CE45B9A9F
3,139,333 UART: [art] SIG.S = 1F7203961B7C3E48C7C6CE7B9DC14488717AD48303618348C0ED681480C4D559D3B8BE01CECC1AC98B4991E9399242A2
3,162,803 UART: Caliptra RT
3,163,148 UART: [state] CFI Enabled
3,270,475 UART: [rt] RT listening for mailbox commands...
3,271,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,933 UART: [rt]cmd =0x44504543, len=96
3,482,897 >>> mbox cmd response data (6236 bytes)
3,482,898 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,491 UART: [rt]cmd =0x52564348, len=36
3,514,676 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,379 ready_for_fw is high
1,056,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,922 >>> mbox cmd response: success
2,681,830 UART:
2,681,846 UART: Running Caliptra FMC ...
2,682,254 UART:
2,682,397 UART: [state] CFI Enabled
2,693,188 UART: [fht] FMC Alias Private Key: 7
2,801,225 UART: [art] Extend RT PCRs Done
2,801,653 UART: [art] Lock RT PCRs Done
2,803,021 UART: [art] Populate DV Done
2,811,048 UART: [fht] FMC Alias Private Key: 7
2,811,982 UART: [art] Derive CDI
2,812,262 UART: [art] Store in in slot 0x4
2,897,595 UART: [art] Derive Key Pair
2,897,955 UART: [art] Store priv key in slot 0x5
2,911,649 UART: [art] Derive Key Pair - Done
2,926,312 UART: [art] Signing Cert with AUTHO
2,926,792 UART: RITY.KEYID = 7
2,941,870 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,635 UART: [art] PUB.X = 9076BDC249AE8FB35775799842B96D31AEA2C2136F25C08EEED2FA679C2AC0BA35D2E8DC7D1474AD58729159161B6C66
2,949,413 UART: [art] PUB.Y = B8D7D7DD9509EE2B38C86AD29945A8D3626888EBC5A1C88176645648D8A2210BFFF5A99DB20C105BAA229A205D1C42FD
2,956,364 UART: [art] SIG.R = 77422ABBD45B9E6EDBD2ADF6B8F37E6302F6577B4597184800995B82B5AC55ECB2D53B67A56A2CFCBB00546EE210F985
2,963,099 UART: [art] SIG.S = CD1552B3BFA8A4CEBA1E1667AEEE3F5B840A2CB5EEEBB9182ACF5E1021CAB9100A31C1586A7F8F61D55CCA711D4BE700
2,987,112 UART: Caliptra RT
2,987,457 UART: [state] CFI Enabled
3,096,220 UART: [rt] RT listening for mailbox commands...
3,096,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,234 UART: [rt]cmd =0x44504543, len=96
3,307,410 >>> mbox cmd response data (6236 bytes)
3,307,411 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,754 UART: [rt]cmd =0x52564348, len=36
3,338,947 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,296 UART:
192,664 UART: Running Caliptra ROM ...
193,849 UART:
194,006 UART: [state] CFI Enabled
266,787 UART: [state] LifecycleState = Unprovisioned
268,762 UART: [state] DebugLocked = No
270,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,155 UART: [kat] SHA2-256
444,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,357 UART: [kat] ++
455,838 UART: [kat] sha1
466,216 UART: [kat] SHA2-256
468,873 UART: [kat] SHA2-384
473,888 UART: [kat] SHA2-512-ACC
476,260 UART: [kat] ECC-384
2,768,339 UART: [kat] HMAC-384Kdf
2,778,802 UART: [kat] LMS
3,969,089 UART: [kat] --
3,974,101 UART: [cold-reset] ++
3,976,533 UART: [fht] Storing FHT @ 0x50003400
3,988,368 UART: [idev] ++
3,988,938 UART: [idev] CDI.KEYID = 6
3,989,967 UART: [idev] SUBJECT.KEYID = 7
3,991,141 UART: [idev] UDS.KEYID = 0
3,992,172 ready_for_fw is high
3,992,364 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,453 UART: [idev] Erasing UDS.KEYID = 0
7,316,219 UART: [idev] Using Sha1 for KeyId Algorithm
7,338,729 UART: [idev] --
7,343,167 UART: [ldev] ++
7,343,807 UART: [ldev] CDI.KEYID = 6
7,344,871 UART: [ldev] SUBJECT.KEYID = 5
7,345,939 UART: [ldev] AUTHORITY.KEYID = 7
7,347,120 UART: [ldev] FE.KEYID = 1
7,394,060 UART: [ldev] Erasing FE.KEYID = 1
10,724,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,018,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,032,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,047,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,062,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,081,347 UART: [ldev] --
13,085,918 UART: [fwproc] Waiting for Commands...
13,088,372 UART: [fwproc] Received command 0x46574c44
13,090,565 UART: [fwproc] Received Image of size 113760 bytes
17,137,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,212,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,281,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,597,367 >>> mbox cmd response: success
17,600,688 UART: [afmc] ++
17,601,286 UART: [afmc] CDI.KEYID = 6
17,602,256 UART: [afmc] SUBJECT.KEYID = 7
17,603,472 UART: [afmc] AUTHORITY.KEYID = 5
20,973,685 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,280,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,282,278 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,296,705 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,311,540 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,325,968 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,347,439 UART: [afmc] --
23,350,548 UART: [cold-reset] --
23,354,189 UART: [state] Locking Datavault
23,357,721 UART: [state] Locking PCR0, PCR1 and PCR31
23,359,482 UART: [state] Locking ICCM
23,362,065 UART: [exit] Launching FMC @ 0x40000130
23,370,463 UART:
23,370,697 UART: Running Caliptra FMC ...
23,371,800 UART:
23,371,962 UART: [state] CFI Enabled
23,438,772 UART: [fht] FMC Alias Private Key: 7
25,777,074 UART: [art] Extend RT PCRs Done
25,778,314 UART: [art] Lock RT PCRs Done
25,780,024 UART: [art] Populate DV Done
25,785,328 UART: [fht] FMC Alias Private Key: 7
25,786,862 UART: [art] Derive CDI
25,787,600 UART: [art] Store in in slot 0x4
25,847,662 UART: [art] Derive Key Pair
25,848,701 UART: [art] Store priv key in slot 0x5
29,141,481 UART: [art] Derive Key Pair - Done
29,154,484 UART: [art] Signing Cert with AUTHO
29,155,795 UART: RITY.KEYID = 7
31,444,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,445,540 UART: [art] PUB.X = 4B32AFCCB6A329121A13CD11FC9A09F57C9A2FEF7DEE98A114C947C47399FBA438768D9E6A1290BEE22E8945DF93D5B4
31,452,778 UART: [art] PUB.Y = 3486FF01E5770976B36B32F6E3AA26C39663EDC397D1A31B2AEA0A0C9CCBDB7E9B08BEC54455EB1B5C9459F810E04876
31,460,055 UART: [art] SIG.R = 588643F00464C269A24A338392BF0CE404D2C2066C394F7881F7EF49CBD140107F7B3EEC953E23792B1A5E30A9D92B6C
31,467,447 UART: [art] SIG.S = CAF08C660471786E22E885A812732D5FB2178A22B3A69EB7AFA278809579FFB7BA65A440154DFEEEB586259FDEE07BDC
32,772,608 UART: Caliptra RT
32,773,309 UART: [state] CFI Enabled
32,937,122 UART: [rt] RT listening for mailbox commands...
32,938,987 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,969,718 UART: [rt]cmd =0x52564348, len=36
32,971,644 >>> mbox cmd response: failed
32,971,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,002,057 UART: [rt]cmd =0x52564348, len=36
33,003,786 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,802,620 ready_for_fw is high
3,803,252 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,868,379 >>> mbox cmd response: success
23,566,523 UART:
23,566,916 UART: Running Caliptra FMC ...
23,568,056 UART:
23,568,224 UART: [state] CFI Enabled
23,638,814 UART: [fht] FMC Alias Private Key: 7
25,976,375 UART: [art] Extend RT PCRs Done
25,977,603 UART: [art] Lock RT PCRs Done
25,979,462 UART: [art] Populate DV Done
25,984,773 UART: [fht] FMC Alias Private Key: 7
25,986,316 UART: [art] Derive CDI
25,987,132 UART: [art] Store in in slot 0x4
26,047,043 UART: [art] Derive Key Pair
26,048,048 UART: [art] Store priv key in slot 0x5
29,340,300 UART: [art] Derive Key Pair - Done
29,352,921 UART: [art] Signing Cert with AUTHO
29,354,234 UART: RITY.KEYID = 7
31,641,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,203 UART: [art] PUB.X = 00B61B949B91098568AC97DB10B8A128EA630715164AB30FE65D1AAB5C9FB9AAF1E7FF820432C58D747BC9F56EE06A65
31,650,414 UART: [art] PUB.Y = 49D16A1D3FB58C23F860A8DDBDE1F012F6D2279E0AE9DEA3EE45C552D7C32E385365B504C56ADCC6893AB71D0B34B266
31,657,713 UART: [art] SIG.R = 4BBED5E77566134A424A9BA8418AC8426BE90ABF24503CDA9A80B6795F41007CB3219F691ECCD16634D89672177AAE06
31,665,075 UART: [art] SIG.S = 54D5E3AD787AB13520790A49642A8959DDA1CC5464D1DBF86E3E8D832BBBB3376AB2783BD65B83AF30532401840D973A
32,970,964 UART: Caliptra RT
32,971,662 UART: [state] CFI Enabled
33,131,320 UART: [rt] RT listening for mailbox commands...
33,133,199 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,163,808 UART: [rt]cmd =0x52564348, len=36
33,165,960 >>> mbox cmd response: failed
33,166,338 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,196,315 UART: [rt]cmd =0x52564348, len=36
33,198,184 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,600 writing to cptra_bootfsm_go
192,817 UART:
193,183 UART: Running Caliptra ROM ...
194,319 UART:
603,940 UART: [state] CFI Enabled
616,420 UART: [state] LifecycleState = Unprovisioned
618,301 UART: [state] DebugLocked = No
619,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,843 UART: [kat] SHA2-256
794,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,105 UART: [kat] ++
805,550 UART: [kat] sha1
815,137 UART: [kat] SHA2-256
817,873 UART: [kat] SHA2-384
823,720 UART: [kat] SHA2-512-ACC
826,110 UART: [kat] ECC-384
3,111,449 UART: [kat] HMAC-384Kdf
3,123,251 UART: [kat] LMS
4,313,375 UART: [kat] --
4,318,687 UART: [cold-reset] ++
4,321,329 UART: [fht] Storing FHT @ 0x50003400
4,332,448 UART: [idev] ++
4,333,013 UART: [idev] CDI.KEYID = 6
4,333,926 UART: [idev] SUBJECT.KEYID = 7
4,335,166 UART: [idev] UDS.KEYID = 0
4,336,258 ready_for_fw is high
4,336,482 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,413 UART: [idev] Erasing UDS.KEYID = 0
7,621,658 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,534 UART: [idev] --
7,647,041 UART: [ldev] ++
7,647,671 UART: [ldev] CDI.KEYID = 6
7,648,554 UART: [ldev] SUBJECT.KEYID = 5
7,649,815 UART: [ldev] AUTHORITY.KEYID = 7
7,651,097 UART: [ldev] FE.KEYID = 1
7,661,686 UART: [ldev] Erasing FE.KEYID = 1
10,950,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,011 UART: [ldev] --
13,310,450 UART: [fwproc] Waiting for Commands...
13,313,296 UART: [fwproc] Received command 0x46574c44
13,315,472 UART: [fwproc] Received Image of size 113760 bytes
17,365,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,823,000 >>> mbox cmd response: success
17,826,650 UART: [afmc] ++
17,827,243 UART: [afmc] CDI.KEYID = 6
17,828,181 UART: [afmc] SUBJECT.KEYID = 7
17,829,392 UART: [afmc] AUTHORITY.KEYID = 5
21,143,991 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,400 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,661 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,994 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,869 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,304 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,317 UART: [afmc] --
23,511,770 UART: [cold-reset] --
23,516,618 UART: [state] Locking Datavault
23,521,323 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,017 UART: [state] Locking ICCM
23,524,703 UART: [exit] Launching FMC @ 0x40000130
23,533,091 UART:
23,533,325 UART: Running Caliptra FMC ...
23,534,347 UART:
23,534,489 UART: [state] CFI Enabled
23,542,312 UART: [fht] FMC Alias Private Key: 7
25,872,949 UART: [art] Extend RT PCRs Done
25,874,170 UART: [art] Lock RT PCRs Done
25,876,036 UART: [art] Populate DV Done
25,881,399 UART: [fht] FMC Alias Private Key: 7
25,882,936 UART: [art] Derive CDI
25,883,693 UART: [art] Store in in slot 0x4
25,925,957 UART: [art] Derive Key Pair
25,926,977 UART: [art] Store priv key in slot 0x5
29,168,603 UART: [art] Derive Key Pair - Done
29,181,552 UART: [art] Signing Cert with AUTHO
29,182,861 UART: RITY.KEYID = 7
31,462,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,971 UART: [art] PUB.X = C4045F42862F605635403A2869DF462A052EFA8133EDB3947A57D94DE1B68E33AA90B3D1CEB7CC1B8C238173C35AE8A9
31,471,257 UART: [art] PUB.Y = C44792AD301427DCDAD00F4F957C99EF9ED868157485FB30F0E8EE5750691DA7C8EF7B4076788CE044806CB3D67BCF05
31,478,466 UART: [art] SIG.R = 238D2A5BF334E7000C5A5D38CC568D5DBDE0DCA24F7E5D29ADE41CA27E49AD930E1E63A5FF4F2D9576AEAF63358C6746
31,485,893 UART: [art] SIG.S = 356D3325152605337F6CC761C254C8DA017B53767FD3FE5D8BED7EC526DF590B325DFB57F6A5140877548961BD5B0E16
32,791,053 UART: Caliptra RT
32,791,763 UART: [state] CFI Enabled
32,908,467 UART: [rt] RT listening for mailbox commands...
32,910,346 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,939,999 UART: [rt]cmd =0x52564348, len=36
32,942,137 >>> mbox cmd response: failed
32,942,515 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,972,546 UART: [rt]cmd =0x52564348, len=36
32,974,185 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
4,126,325 ready_for_fw is high
4,126,710 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,252 >>> mbox cmd response: success
23,708,589 UART:
23,708,974 UART: Running Caliptra FMC ...
23,710,073 UART:
23,710,224 UART: [state] CFI Enabled
23,718,490 UART: [fht] FMC Alias Private Key: 7
26,049,001 UART: [art] Extend RT PCRs Done
26,050,238 UART: [art] Lock RT PCRs Done
26,052,053 UART: [art] Populate DV Done
26,057,471 UART: [fht] FMC Alias Private Key: 7
26,059,175 UART: [art] Derive CDI
26,059,988 UART: [art] Store in in slot 0x4
26,102,669 UART: [art] Derive Key Pair
26,103,737 UART: [art] Store priv key in slot 0x5
29,345,812 UART: [art] Derive Key Pair - Done
29,359,010 UART: [art] Signing Cert with AUTHO
29,360,355 UART: RITY.KEYID = 7
31,639,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,275 UART: [art] PUB.X = 8E53606722FDFD7B77BE823718A6A91132982A237B0A3A533A79A7253BC11A62DF4223FEC80947077CCC472667ACB011
31,648,512 UART: [art] PUB.Y = EC0AC84AEEEF34616618DC1AEFC51D0CA35DC16FD8FB28460330144BE8A1E2E5B769622B65E4AC445FC829611230A12F
31,655,791 UART: [art] SIG.R = 8A2B59B5849436FA34B4E3142960E0134C6D9B513D134AD26D8C6F54A05F67A2F46F5BF44A902F5BDB386C96F4998944
31,663,164 UART: [art] SIG.S = C9AEEEC57DC54238B16FA702782B93FEA2829BF751178272AD8B7DDF4DCE152BB545D97E71D6C4E3698983C3927F2F87
32,968,598 UART: Caliptra RT
32,969,313 UART: [state] CFI Enabled
33,086,642 UART: [rt] RT listening for mailbox commands...
33,088,514 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,118,712 UART: [rt]cmd =0x52564348, len=36
33,120,556 >>> mbox cmd response: failed
33,120,877 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,150,937 UART: [rt]cmd =0x52564348, len=36
33,152,744 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
192,694 UART:
193,063 UART: Running Caliptra ROM ...
194,257 UART:
194,411 UART: [state] CFI Enabled
265,875 UART: [state] LifecycleState = Unprovisioned
267,724 UART: [state] DebugLocked = No
269,261 UART: [state] WD Timer not started. Device not locked for debugging
272,957 UART: [kat] SHA2-256
452,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,649 UART: [kat] ++
464,147 UART: [kat] sha1
475,683 UART: [kat] SHA2-256
478,698 UART: [kat] SHA2-384
483,764 UART: [kat] SHA2-512-ACC
486,704 UART: [kat] ECC-384
2,948,760 UART: [kat] HMAC-384Kdf
2,972,801 UART: [kat] LMS
3,502,285 UART: [kat] --
3,508,912 UART: [cold-reset] ++
3,509,702 UART: [fht] FHT @ 0x50003400
3,519,399 UART: [idev] ++
3,519,964 UART: [idev] CDI.KEYID = 6
3,520,849 UART: [idev] SUBJECT.KEYID = 7
3,522,106 UART: [idev] UDS.KEYID = 0
3,523,006 ready_for_fw is high
3,523,216 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,781 UART: [idev] Erasing UDS.KEYID = 0
6,025,304 UART: [idev] Sha1 KeyId Algorithm
6,048,584 UART: [idev] --
6,052,958 UART: [ldev] ++
6,054,185 UART: [ldev] CDI.KEYID = 6
6,055,094 UART: [ldev] SUBJECT.KEYID = 5
6,056,216 UART: [ldev] AUTHORITY.KEYID = 7
6,057,321 UART: [ldev] FE.KEYID = 1
6,101,994 UART: [ldev] Erasing FE.KEYID = 1
8,603,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,668 UART: [ldev] --
10,416,874 UART: [fwproc] Wait for Commands...
10,418,964 UART: [fwproc] Recv command 0x46574c44
10,421,050 UART: [fwproc] Recv'd Img size: 114084 bytes
13,817,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,030 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,392 >>> mbox cmd response: success
14,280,401 UART: [afmc] ++
14,280,996 UART: [afmc] CDI.KEYID = 6
14,281,885 UART: [afmc] SUBJECT.KEYID = 7
14,282,981 UART: [afmc] AUTHORITY.KEYID = 5
16,803,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,660 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,621 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,176 UART: [afmc] --
18,606,227 UART: [cold-reset] --
18,610,135 UART: [state] Locking Datavault
18,617,006 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,695 UART: [state] Locking ICCM
18,621,172 UART: [exit] Launching FMC @ 0x40000130
18,629,567 UART:
18,629,798 UART: Running Caliptra FMC ...
18,630,897 UART:
18,631,053 UART: [state] CFI Enabled
18,688,751 UART: [fht] FMC Alias Private Key: 7
20,452,421 UART: [art] Extend RT PCRs Done
20,453,773 UART: [art] Lock RT PCRs Done
20,455,497 UART: [art] Populate DV Done
20,460,852 UART: [fht] FMC Alias Private Key: 7
20,462,388 UART: [art] Derive CDI
20,463,120 UART: [art] Store in in slot 0x4
20,521,396 UART: [art] Derive Key Pair
20,522,389 UART: [art] Store priv key in slot 0x5
22,985,345 UART: [art] Derive Key Pair - Done
22,998,455 UART: [art] Signing Cert with AUTHO
22,999,745 UART: RITY.KEYID = 7
24,710,517 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,020 UART: [art] PUB.X = 56A050AA13E66B8FFF994E65F1141450868334C2881DC9D03C4F2FC86DC03581D01F63696DF3A639AC6E5A9AC899A714
24,719,288 UART: [art] PUB.Y = 6338712B7C30F625C806765A0CF64742D591B950A42B99E3847A435658D1138469AEE6A281593E836BF8421D7AFF8103
24,726,559 UART: [art] SIG.R = 1FCEAB2E451067B3561500C9746336ADACC6334E6E698579BD00A5508437042093D2CECF8F221F114E0F4C1136C71B74
24,733,860 UART: [art] SIG.S = 46C810CE2A62F1A68AF4DA80D67ED85A43F24E14CF1F5BC8576A784B460B2E76897C73ED0F1D6044DC113FE608AD6AE4
25,713,203 UART: Caliptra RT
25,713,900 UART: [state] CFI Enabled
25,878,775 UART: [rt] RT listening for mailbox commands...
25,880,683 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,911,247 UART: [rt]cmd =0x52564348, len=36
25,913,389 >>> mbox cmd response: failed
25,913,700 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,943,489 UART: [rt]cmd =0x52564348, len=36
25,945,143 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
3,380,424 ready_for_fw is high
3,381,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,079,834 >>> mbox cmd response: success
18,367,342 UART:
18,367,816 UART: Running Caliptra FMC ...
18,368,921 UART:
18,369,081 UART: [state] CFI Enabled
18,433,412 UART: [fht] FMC Alias Private Key: 7
20,197,561 UART: [art] Extend RT PCRs Done
20,198,789 UART: [art] Lock RT PCRs Done
20,200,526 UART: [art] Populate DV Done
20,205,945 UART: [fht] FMC Alias Private Key: 7
20,207,487 UART: [art] Derive CDI
20,208,300 UART: [art] Store in in slot 0x4
20,266,150 UART: [art] Derive Key Pair
20,267,196 UART: [art] Store priv key in slot 0x5
22,729,871 UART: [art] Derive Key Pair - Done
22,742,875 UART: [art] Signing Cert with AUTHO
22,744,181 UART: RITY.KEYID = 7
24,455,118 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,648 UART: [art] PUB.X = F6EC0110CF4A6B71483A8A9858339A2FAB5155BC0CF8B3C498909900B1A92D386A1E6EA07A34D17ED9254B150DD8BD27
24,463,929 UART: [art] PUB.Y = AA07871CAC69780A05A0B38BF2FF26AEF7838EF46E96D24258079B505258D2179DAC89CDE2563E7263BF0C43D4266FFC
24,471,162 UART: [art] SIG.R = B435D8B779606100C6C39D02AFF71FEEA8781C9803EF309A0B5C56672F10CC56F53C053CC0C6252395CD5CB13C034134
24,478,522 UART: [art] SIG.S = 1AC16CE3EC76CC1F292C08073EB84F62ECE51AFAEAA6FDD39838EDEF060BDB279EB4D5B6C4CD2375C414E97914225E49
25,457,077 UART: Caliptra RT
25,457,791 UART: [state] CFI Enabled
25,623,279 UART: [rt] RT listening for mailbox commands...
25,625,164 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,655,806 UART: [rt]cmd =0x52564348, len=36
25,657,766 >>> mbox cmd response: failed
25,658,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,687,969 UART: [rt]cmd =0x52564348, len=36
25,689,891 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,745 writing to cptra_bootfsm_go
193,009 UART:
193,400 UART: Running Caliptra ROM ...
194,515 UART:
604,008 UART: [state] CFI Enabled
615,404 UART: [state] LifecycleState = Unprovisioned
617,270 UART: [state] DebugLocked = No
618,661 UART: [state] WD Timer not started. Device not locked for debugging
622,557 UART: [kat] SHA2-256
801,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,242 UART: [kat] ++
813,775 UART: [kat] sha1
824,725 UART: [kat] SHA2-256
827,726 UART: [kat] SHA2-384
833,734 UART: [kat] SHA2-512-ACC
836,643 UART: [kat] ECC-384
3,277,158 UART: [kat] HMAC-384Kdf
3,288,489 UART: [kat] LMS
3,818,026 UART: [kat] --
3,824,176 UART: [cold-reset] ++
3,825,477 UART: [fht] FHT @ 0x50003400
3,837,669 UART: [idev] ++
3,838,246 UART: [idev] CDI.KEYID = 6
3,839,173 UART: [idev] SUBJECT.KEYID = 7
3,840,346 UART: [idev] UDS.KEYID = 0
3,841,395 ready_for_fw is high
3,841,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,989 UART: [idev] Erasing UDS.KEYID = 0
6,314,322 UART: [idev] Sha1 KeyId Algorithm
6,336,522 UART: [idev] --
6,339,812 UART: [ldev] ++
6,340,383 UART: [ldev] CDI.KEYID = 6
6,341,270 UART: [ldev] SUBJECT.KEYID = 5
6,342,483 UART: [ldev] AUTHORITY.KEYID = 7
6,343,712 UART: [ldev] FE.KEYID = 1
6,352,246 UART: [ldev] Erasing FE.KEYID = 1
8,823,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,608 UART: [ldev] --
10,613,584 UART: [fwproc] Wait for Commands...
10,615,354 UART: [fwproc] Recv command 0x46574c44
10,617,396 UART: [fwproc] Recv'd Img size: 114084 bytes
14,015,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,154,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,470,931 >>> mbox cmd response: success
14,475,103 UART: [afmc] ++
14,475,702 UART: [afmc] CDI.KEYID = 6
14,476,646 UART: [afmc] SUBJECT.KEYID = 7
14,477,817 UART: [afmc] AUTHORITY.KEYID = 5
16,978,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,411 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,020 UART: [afmc] --
18,776,012 UART: [cold-reset] --
18,779,447 UART: [state] Locking Datavault
18,784,158 UART: [state] Locking PCR0, PCR1 and PCR31
18,785,808 UART: [state] Locking ICCM
18,787,799 UART: [exit] Launching FMC @ 0x40000130
18,796,257 UART:
18,796,494 UART: Running Caliptra FMC ...
18,797,619 UART:
18,797,779 UART: [state] CFI Enabled
18,805,826 UART: [fht] FMC Alias Private Key: 7
20,562,857 UART: [art] Extend RT PCRs Done
20,564,074 UART: [art] Lock RT PCRs Done
20,566,094 UART: [art] Populate DV Done
20,571,564 UART: [fht] FMC Alias Private Key: 7
20,573,046 UART: [art] Derive CDI
20,573,866 UART: [art] Store in in slot 0x4
20,616,412 UART: [art] Derive Key Pair
20,617,453 UART: [art] Store priv key in slot 0x5
23,044,360 UART: [art] Derive Key Pair - Done
23,057,476 UART: [art] Signing Cert with AUTHO
23,058,786 UART: RITY.KEYID = 7
24,764,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,765,720 UART: [art] PUB.X = 3F58F81CBB09A1797625C488FDAF20CB1D035840F920E987679823E4BFDD813AA014938E543D7CEF8B201BBE3DC32430
24,772,965 UART: [art] PUB.Y = B8C6512E9AAC583639A38859DB55866B20FF2DBD9675497614042FFBD6E20A83FE49BDC8DAECB27185F7C00F913E71DB
24,780,230 UART: [art] SIG.R = 6C66B1A9ADFDC91D0035B48095D5366B1748F98911144E06DDFCA0B90301D8A41B93AC73ABBC2570507A14A9875E6F7D
24,787,601 UART: [art] SIG.S = 4BFCEDF8D5B0C440778C3F3B5170B0B867A3882CFB96C31944158684851463289518C1AA25F3CF487364ED578FC2635C
25,766,888 UART: Caliptra RT
25,767,588 UART: [state] CFI Enabled
25,885,130 UART: [rt] RT listening for mailbox commands...
25,887,012 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,916,985 UART: [rt]cmd =0x52564348, len=36
25,918,803 >>> mbox cmd response: failed
25,919,106 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,949,154 UART: [rt]cmd =0x52564348, len=36
25,950,749 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,697,087 ready_for_fw is high
3,697,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,265,517 >>> mbox cmd response: success
18,517,538 UART:
18,517,937 UART: Running Caliptra FMC ...
18,519,132 UART:
18,519,313 UART: [state] CFI Enabled
18,527,265 UART: [fht] FMC Alias Private Key: 7
20,284,859 UART: [art] Extend RT PCRs Done
20,286,089 UART: [art] Lock RT PCRs Done
20,287,783 UART: [art] Populate DV Done
20,293,195 UART: [fht] FMC Alias Private Key: 7
20,294,743 UART: [art] Derive CDI
20,295,588 UART: [art] Store in in slot 0x4
20,337,925 UART: [art] Derive Key Pair
20,338,970 UART: [art] Store priv key in slot 0x5
22,765,725 UART: [art] Derive Key Pair - Done
22,778,556 UART: [art] Signing Cert with AUTHO
22,779,867 UART: RITY.KEYID = 7
24,485,494 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,000 UART: [art] PUB.X = 382465F77010FD16CE24A0C647CF41780F033D85CF2CE27965BF53BAC56EF51AD481743D131FDF33DE59BBDCA08EEA98
24,494,283 UART: [art] PUB.Y = 6083FCF9FEE47F59FB086AF6A42409484573C5E8354C1663C4F53DF7C7A17763CF72DDC1A7192016C407C7B061800916
24,501,566 UART: [art] SIG.R = 621E2FA326E8D91E3D943641AED0F55AF1C7C05E3A65F254C4199B30A458CB602F7183F5D22B4CFB0D2BCD29758A6C7F
24,508,935 UART: [art] SIG.S = 280B385F4F7A44F08DC92A6768B5A81726D8459E1996C9E2EE1AF7644CB677288A118E22EB14AB172B4EE2A43224B6E1
25,487,332 UART: Caliptra RT
25,488,034 UART: [state] CFI Enabled
25,605,880 UART: [rt] RT listening for mailbox commands...
25,607,778 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,637,698 UART: [rt]cmd =0x52564348, len=36
25,639,420 >>> mbox cmd response: failed
25,639,719 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,669,666 UART: [rt]cmd =0x52564348, len=36
25,671,471 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
192,732 UART:
193,100 UART: Running Caliptra ROM ...
194,290 UART:
194,442 UART: [state] CFI Enabled
266,115 UART: [state] LifecycleState = Unprovisioned
268,536 UART: [state] DebugLocked = No
269,924 UART: [state] WD Timer not started. Device not locked for debugging
274,848 UART: [kat] SHA2-256
464,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,508 UART: [kat] ++
475,996 UART: [kat] sha1
487,158 UART: [kat] SHA2-256
490,167 UART: [kat] SHA2-384
496,443 UART: [kat] SHA2-512-ACC
499,029 UART: [kat] ECC-384
2,948,425 UART: [kat] HMAC-384Kdf
2,975,089 UART: [kat] LMS
3,506,845 UART: [kat] --
3,510,796 UART: [cold-reset] ++
3,512,441 UART: [fht] FHT @ 0x50003400
3,522,930 UART: [idev] ++
3,523,636 UART: [idev] CDI.KEYID = 6
3,524,663 UART: [idev] SUBJECT.KEYID = 7
3,525,786 UART: [idev] UDS.KEYID = 0
3,526,711 ready_for_fw is high
3,526,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,391 UART: [idev] Erasing UDS.KEYID = 0
6,030,325 UART: [idev] Sha1 KeyId Algorithm
6,053,084 UART: [idev] --
6,058,731 UART: [ldev] ++
6,059,420 UART: [ldev] CDI.KEYID = 6
6,060,351 UART: [ldev] SUBJECT.KEYID = 5
6,061,510 UART: [ldev] AUTHORITY.KEYID = 7
6,062,689 UART: [ldev] FE.KEYID = 1
6,103,625 UART: [ldev] Erasing FE.KEYID = 1
8,605,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,240 UART: [ldev] --
10,420,154 UART: [fwproc] Wait for Commands...
10,422,786 UART: [fwproc] Recv command 0x46574c44
10,425,035 UART: [fwproc] Recv'd Img size: 114084 bytes
13,868,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,082 >>> mbox cmd response: success
14,602,395 UART: [afmc] ++
14,603,112 UART: [afmc] CDI.KEYID = 6
14,604,300 UART: [afmc] SUBJECT.KEYID = 7
14,605,743 UART: [afmc] AUTHORITY.KEYID = 5
17,131,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,650 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,598 UART: [afmc] --
18,929,811 UART: [cold-reset] --
18,933,411 UART: [state] Locking Datavault
18,937,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,637 UART: [state] Locking ICCM
18,941,415 UART: [exit] Launching FMC @ 0x40000130
18,950,102 UART:
18,950,340 UART: Running Caliptra FMC ...
18,951,441 UART:
18,951,594 UART: [state] CFI Enabled
19,013,304 UART: [fht] FMC Alias Private Key: 7
20,777,348 UART: [art] Extend RT PCRs Done
20,778,570 UART: [art] Lock RT PCRs Done
20,780,219 UART: [art] Populate DV Done
20,785,579 UART: [fht] FMC Alias Private Key: 7
20,787,058 UART: [art] Derive CDI
20,787,821 UART: [art] Store in in slot 0x4
20,846,260 UART: [art] Derive Key Pair
20,847,258 UART: [art] Store priv key in slot 0x5
23,309,975 UART: [art] Derive Key Pair - Done
23,323,398 UART: [art] Signing Cert with AUTHO
23,324,697 UART: RITY.KEYID = 7
25,035,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,093 UART: [art] PUB.X = 47625B337D6D868E90ECAEE9982C215B94FB3AFF2996808A233671DC981EE3A4F546704BDD12C7566EA5BBF706BCF85E
25,044,381 UART: [art] PUB.Y = 5E6EE48CB12982FF409A61AB8A4CFBE7573BAAE720CD221E5F7E759839629CAFCCC16B876C2E754DA268899593E6247B
25,051,639 UART: [art] SIG.R = 6EEAD03BBD425541AF22B833F802891BC7DA66D340C106F7A7FBA7DC2AE5D9CC2656A9376E082D93A48976D364727797
25,059,017 UART: [art] SIG.S = EBA3534A84F7C4812D3B8CB688B0F6AF8D8B6172F902ECA6CF7FE0D06A65C6C21BE87556CA94B3CBE49F342449383DFF
26,038,494 UART: Caliptra RT
26,039,187 UART: [state] CFI Enabled
26,202,407 UART: [rt] RT listening for mailbox commands...
26,204,319 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,234,936 UART: [rt]cmd =0x52564348, len=36
26,236,777 >>> mbox cmd response: failed
26,237,090 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,267,151 UART: [rt]cmd =0x52564348, len=36
26,268,753 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,441,093 ready_for_fw is high
3,441,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,734,807 >>> mbox cmd response: success
19,046,200 UART:
19,046,585 UART: Running Caliptra FMC ...
19,047,720 UART:
19,047,907 UART: [state] CFI Enabled
19,112,674 UART: [fht] FMC Alias Private Key: 7
20,876,580 UART: [art] Extend RT PCRs Done
20,877,815 UART: [art] Lock RT PCRs Done
20,879,501 UART: [art] Populate DV Done
20,885,018 UART: [fht] FMC Alias Private Key: 7
20,886,614 UART: [art] Derive CDI
20,887,362 UART: [art] Store in in slot 0x4
20,945,540 UART: [art] Derive Key Pair
20,946,531 UART: [art] Store priv key in slot 0x5
23,409,609 UART: [art] Derive Key Pair - Done
23,422,666 UART: [art] Signing Cert with AUTHO
23,423,975 UART: RITY.KEYID = 7
25,134,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,868 UART: [art] PUB.X = DB23D53FE6DCAA47C6D0C230067DDC1DF0537A07D16AB80F12854F86819C46A52929DCA2AC0F956E621F42DBBFAE91F2
25,143,142 UART: [art] PUB.Y = 2556E68FE4A74BD9B2BA8C0293DBA700BB37DCF4B85DD5A219F3A730BEDE4294DA1634501D50B5FE0A59A30BFA22F224
25,150,435 UART: [art] SIG.R = 43B3682E74A194DF1B5A49FB09092EBFCA3045C38EA29CCD571CAA659271EB66FCF48455BCC1ACBC38BF002E26294837
25,157,794 UART: [art] SIG.S = BE6F0E3D265DBF81C07CCA9532292803B3FEA6402047F577EC6E035440A694ACE3CB8B3153FD9EBA60D2777CEC47053E
26,136,544 UART: Caliptra RT
26,137,254 UART: [state] CFI Enabled
26,302,444 UART: [rt] RT listening for mailbox commands...
26,304,343 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,335,082 UART: [rt]cmd =0x52564348, len=36
26,336,941 >>> mbox cmd response: failed
26,337,245 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,367,393 UART: [rt]cmd =0x52564348, len=36
26,369,309 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
192,920 UART:
193,291 UART: Running Caliptra ROM ...
194,494 UART:
604,033 UART: [state] CFI Enabled
618,146 UART: [state] LifecycleState = Unprovisioned
620,529 UART: [state] DebugLocked = No
623,060 UART: [state] WD Timer not started. Device not locked for debugging
628,026 UART: [kat] SHA2-256
817,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,659 UART: [kat] ++
829,268 UART: [kat] sha1
840,528 UART: [kat] SHA2-256
843,548 UART: [kat] SHA2-384
849,753 UART: [kat] SHA2-512-ACC
852,336 UART: [kat] ECC-384
3,296,051 UART: [kat] HMAC-384Kdf
3,309,005 UART: [kat] LMS
3,840,808 UART: [kat] --
3,844,801 UART: [cold-reset] ++
3,845,732 UART: [fht] FHT @ 0x50003400
3,855,648 UART: [idev] ++
3,856,361 UART: [idev] CDI.KEYID = 6
3,857,276 UART: [idev] SUBJECT.KEYID = 7
3,858,520 UART: [idev] UDS.KEYID = 0
3,859,449 ready_for_fw is high
3,859,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,920 UART: [idev] Erasing UDS.KEYID = 0
6,337,021 UART: [idev] Sha1 KeyId Algorithm
6,360,772 UART: [idev] --
6,366,283 UART: [ldev] ++
6,367,022 UART: [ldev] CDI.KEYID = 6
6,367,941 UART: [ldev] SUBJECT.KEYID = 5
6,369,098 UART: [ldev] AUTHORITY.KEYID = 7
6,370,329 UART: [ldev] FE.KEYID = 1
6,379,624 UART: [ldev] Erasing FE.KEYID = 1
8,859,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,812 UART: [ldev] --
10,650,661 UART: [fwproc] Wait for Commands...
10,652,274 UART: [fwproc] Recv command 0x46574c44
10,654,604 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,830,523 >>> mbox cmd response: success
14,834,055 UART: [afmc] ++
14,834,769 UART: [afmc] CDI.KEYID = 6
14,836,022 UART: [afmc] SUBJECT.KEYID = 7
14,837,475 UART: [afmc] AUTHORITY.KEYID = 5
17,339,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,941 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,256 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,252 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,940 UART: [afmc] --
19,138,896 UART: [cold-reset] --
19,142,067 UART: [state] Locking Datavault
19,147,712 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,871 UART: [state] Locking ICCM
19,151,384 UART: [exit] Launching FMC @ 0x40000130
19,160,069 UART:
19,160,310 UART: Running Caliptra FMC ...
19,161,410 UART:
19,161,569 UART: [state] CFI Enabled
19,169,724 UART: [fht] FMC Alias Private Key: 7
20,925,897 UART: [art] Extend RT PCRs Done
20,927,105 UART: [art] Lock RT PCRs Done
20,928,648 UART: [art] Populate DV Done
20,934,114 UART: [fht] FMC Alias Private Key: 7
20,935,764 UART: [art] Derive CDI
20,936,501 UART: [art] Store in in slot 0x4
20,978,788 UART: [art] Derive Key Pair
20,979,830 UART: [art] Store priv key in slot 0x5
23,406,637 UART: [art] Derive Key Pair - Done
23,419,685 UART: [art] Signing Cert with AUTHO
23,420,987 UART: RITY.KEYID = 7
25,126,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,823 UART: [art] PUB.X = 83C6D86DDE8ACC77D4DC033D2E836B4EE18BF8E01333A5359F979ECCD7F03B0DE23F3C5ED52F88B46F4E357896F0D70B
25,135,144 UART: [art] PUB.Y = 0C4D932DDBB72F7E8446374EB3091362843DEC290604BA32B740153AD75C240A8748C5DE0F8D9A34F19253D9DB87EB63
25,142,401 UART: [art] SIG.R = 179A905827F88183883A400562D740DAEAFAF51C29EB1BB3FF508921D252EF3FDE1ECBF49A0659D764A669CF1DCE44FC
25,149,767 UART: [art] SIG.S = D30CD4AD1997FC798ADE934772D696017894D5C10A04E55B7E164BD5199CEEA09DB18EF4DECC736BFA0C3106E6B82B6F
26,128,761 UART: Caliptra RT
26,129,472 UART: [state] CFI Enabled
26,247,315 UART: [rt] RT listening for mailbox commands...
26,249,202 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,279,330 UART: [rt]cmd =0x52564348, len=36
26,281,032 >>> mbox cmd response: failed
26,281,358 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,311,365 UART: [rt]cmd =0x52564348, len=36
26,313,274 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
3,758,290 ready_for_fw is high
3,758,913 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,961,979 >>> mbox cmd response: success
19,213,066 UART:
19,213,475 UART: Running Caliptra FMC ...
19,214,590 UART:
19,214,743 UART: [state] CFI Enabled
19,222,815 UART: [fht] FMC Alias Private Key: 7
20,979,233 UART: [art] Extend RT PCRs Done
20,980,470 UART: [art] Lock RT PCRs Done
20,982,347 UART: [art] Populate DV Done
20,987,990 UART: [fht] FMC Alias Private Key: 7
20,989,484 UART: [art] Derive CDI
20,990,221 UART: [art] Store in in slot 0x4
21,032,954 UART: [art] Derive Key Pair
21,034,007 UART: [art] Store priv key in slot 0x5
23,460,331 UART: [art] Derive Key Pair - Done
23,473,386 UART: [art] Signing Cert with AUTHO
23,474,696 UART: RITY.KEYID = 7
25,180,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,693 UART: [art] PUB.X = 78B70145730DEA9FACA6C283644645718342AC1C7F5D55886592571CBA5A428C36AA301065DD0091C86FF8FE40C0692A
25,188,938 UART: [art] PUB.Y = 09614C2E2504F4BBBF7C395EF332B26BE7836AB5E9AA990146C6AEC59FD79CF2E9130D0351BFBF7F9D2854BA6A3D6A6D
25,196,196 UART: [art] SIG.R = A617F9AF825172585382E8FFC860494AB7B70018E9DD9B4CC3EBE03497191D716C40113D4F4C2B4C1F3911BA76EA7434
25,203,579 UART: [art] SIG.S = B28C45A790F7118C09953E1201CA88A0F7F7CC578F73EA9C38E22F2A695E25234D3B7978FEFB4FA3AD2645D2923C5D01
26,182,231 UART: Caliptra RT
26,182,925 UART: [state] CFI Enabled
26,301,034 UART: [rt] RT listening for mailbox commands...
26,302,915 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,332,938 UART: [rt]cmd =0x52564348, len=36
26,334,584 >>> mbox cmd response: failed
26,334,896 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,364,858 UART: [rt]cmd =0x52564348, len=36
26,366,647 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,101 UART: [kat] SHA2-256
882,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,147 UART: [kat] ++
886,299 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,804 UART: [kat] HMAC-384Kdf
907,420 UART: [kat] LMS
1,475,616 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,912 UART: [idev] ++
1,480,080 UART: [idev] CDI.KEYID = 6
1,480,440 UART: [idev] SUBJECT.KEYID = 7
1,480,864 UART: [idev] UDS.KEYID = 0
1,481,209 ready_for_fw is high
1,481,209 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,120 UART: [idev] Erasing UDS.KEYID = 0
1,505,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,240 UART: [idev] --
1,515,473 UART: [ldev] ++
1,515,641 UART: [ldev] CDI.KEYID = 6
1,516,004 UART: [ldev] SUBJECT.KEYID = 5
1,516,430 UART: [ldev] AUTHORITY.KEYID = 7
1,516,893 UART: [ldev] FE.KEYID = 1
1,521,809 UART: [ldev] Erasing FE.KEYID = 1
1,547,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,854 UART: [ldev] --
1,586,349 UART: [fwproc] Waiting for Commands...
1,587,004 UART: [fwproc] Received command 0x46574c44
1,587,795 UART: [fwproc] Received Image of size 114084 bytes
2,883,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,740 >>> mbox cmd response: success
3,075,768 UART: [afmc] ++
3,075,936 UART: [afmc] CDI.KEYID = 6
3,076,298 UART: [afmc] SUBJECT.KEYID = 7
3,076,723 UART: [afmc] AUTHORITY.KEYID = 5
3,111,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,629 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,319 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,226 UART: [afmc] --
3,155,130 UART: [cold-reset] --
3,156,066 UART: [state] Locking Datavault
3,157,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,741 UART: [state] Locking ICCM
3,158,245 UART: [exit] Launching FMC @ 0x40000130
3,163,574 UART:
3,163,590 UART: Running Caliptra FMC ...
3,163,998 UART:
3,164,052 UART: [state] CFI Enabled
3,174,541 UART: [fht] FMC Alias Private Key: 7
3,282,370 UART: [art] Extend RT PCRs Done
3,282,798 UART: [art] Lock RT PCRs Done
3,284,576 UART: [art] Populate DV Done
3,292,703 UART: [fht] FMC Alias Private Key: 7
3,293,661 UART: [art] Derive CDI
3,293,941 UART: [art] Store in in slot 0x4
3,379,668 UART: [art] Derive Key Pair
3,380,028 UART: [art] Store priv key in slot 0x5
3,392,944 UART: [art] Derive Key Pair - Done
3,407,898 UART: [art] Signing Cert with AUTHO
3,408,378 UART: RITY.KEYID = 7
3,423,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,725 UART: [art] PUB.X = 1D785E6650298AA738510720991795377308C925A2FD567B212E2C9400281B42A7BBED8EE2AD987646EC5D799B1FE471
3,431,459 UART: [art] PUB.Y = 49E05EE14C33918FF58E1C7ABAE6B46EF170ECF85609A40ECD6D4A2F6E3C29D3C7EFF4BAC86BD3288A5EC4AB4354C8C9
3,438,429 UART: [art] SIG.R = 9BC35D15A9AA6B290CEA039A2C7F7D2C57AD332635F64F237BD6ECB08FE2FD6DF6C221C3FE19CB6BF06793E8F64F1951
3,445,213 UART: [art] SIG.S = D5D968966EE9DBB890BD0FEE3AFE77EC0B1D0F75C080E8B9892CEA4B8CB8732352A0455DAF5C08AB43DAC27197379D3A
3,468,992 UART: Caliptra RT
3,469,245 UART: [state] CFI Enabled
3,576,929 UART: [rt] RT listening for mailbox commands...
3,577,599 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,623 UART: [rt]cmd =0x52564348, len=36
3,609,117 >>> mbox cmd response: failed
3,609,117 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,559 UART: [rt]cmd =0x52564348, len=36
3,639,915 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 ready_for_fw is high
1,362,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,342 >>> mbox cmd response: success
2,985,148 UART:
2,985,164 UART: Running Caliptra FMC ...
2,985,572 UART:
2,985,626 UART: [state] CFI Enabled
2,995,907 UART: [fht] FMC Alias Private Key: 7
3,103,866 UART: [art] Extend RT PCRs Done
3,104,294 UART: [art] Lock RT PCRs Done
3,105,842 UART: [art] Populate DV Done
3,114,267 UART: [fht] FMC Alias Private Key: 7
3,115,335 UART: [art] Derive CDI
3,115,615 UART: [art] Store in in slot 0x4
3,201,114 UART: [art] Derive Key Pair
3,201,474 UART: [art] Store priv key in slot 0x5
3,214,916 UART: [art] Derive Key Pair - Done
3,230,071 UART: [art] Signing Cert with AUTHO
3,230,551 UART: RITY.KEYID = 7
3,246,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,920 UART: [art] PUB.X = 2C49D38D131F5EC43946DB23FE1BCF8E3FA4E2FC8B11275E28BA21F9D3BA40C3D0237B792677EE1F6DE4C86E40A76199
3,253,704 UART: [art] PUB.Y = CFE3B85F728E4ECF596A051BC510129FA8D4CC4F8B728D6E9B6B3E7E4D2CBF6A8098B7758A457882D6E21F9358747041
3,260,659 UART: [art] SIG.R = 329C32B78F5C5B3A1751FE91E5F78C26DF419A04D607E8C8F206C54FE72EB57E508151EBE2C28AF2031F8BAEB1FFDA19
3,267,433 UART: [art] SIG.S = CC604C2256C99BD62B4336F78D327887BAB4D6A47255A5A640224CF512343C96B1A28DCBCD23310384D12BF0901C0212
3,291,038 UART: Caliptra RT
3,291,291 UART: [state] CFI Enabled
3,399,466 UART: [rt] RT listening for mailbox commands...
3,400,136 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,148 UART: [rt]cmd =0x52564348, len=36
3,431,500 >>> mbox cmd response: failed
3,431,500 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,306 UART: [rt]cmd =0x52564348, len=36
3,462,534 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,856 UART: [kat] SHA2-256
892,794 UART: [kat] SHA2-384
895,411 UART: [kat] SHA2-512-ACC
897,312 UART: [kat] ECC-384
903,031 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,680 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,917 UART: [idev] ++
1,480,085 UART: [idev] CDI.KEYID = 6
1,480,445 UART: [idev] SUBJECT.KEYID = 7
1,480,869 UART: [idev] UDS.KEYID = 0
1,481,214 ready_for_fw is high
1,481,214 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,505,631 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] --
1,515,062 UART: [ldev] ++
1,515,230 UART: [ldev] CDI.KEYID = 6
1,515,593 UART: [ldev] SUBJECT.KEYID = 5
1,516,019 UART: [ldev] AUTHORITY.KEYID = 7
1,516,482 UART: [ldev] FE.KEYID = 1
1,521,720 UART: [ldev] Erasing FE.KEYID = 1
1,547,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,135 UART: [ldev] --
1,586,498 UART: [fwproc] Waiting for Commands...
1,587,133 UART: [fwproc] Received command 0x46574c44
1,587,924 UART: [fwproc] Received Image of size 114084 bytes
2,882,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,699 >>> mbox cmd response: success
3,075,707 UART: [afmc] ++
3,075,875 UART: [afmc] CDI.KEYID = 6
3,076,237 UART: [afmc] SUBJECT.KEYID = 7
3,076,662 UART: [afmc] AUTHORITY.KEYID = 5
3,112,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,597 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,990 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,680 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,747 UART: [afmc] --
3,155,835 UART: [cold-reset] --
3,156,745 UART: [state] Locking Datavault
3,158,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,772 UART: [state] Locking ICCM
3,159,434 UART: [exit] Launching FMC @ 0x40000130
3,164,763 UART:
3,164,779 UART: Running Caliptra FMC ...
3,165,187 UART:
3,165,330 UART: [state] CFI Enabled
3,175,955 UART: [fht] FMC Alias Private Key: 7
3,284,398 UART: [art] Extend RT PCRs Done
3,284,826 UART: [art] Lock RT PCRs Done
3,286,336 UART: [art] Populate DV Done
3,294,645 UART: [fht] FMC Alias Private Key: 7
3,295,815 UART: [art] Derive CDI
3,296,095 UART: [art] Store in in slot 0x4
3,381,952 UART: [art] Derive Key Pair
3,382,312 UART: [art] Store priv key in slot 0x5
3,395,560 UART: [art] Derive Key Pair - Done
3,410,233 UART: [art] Signing Cert with AUTHO
3,410,713 UART: RITY.KEYID = 7
3,426,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,882 UART: [art] PUB.X = 956494D3DA9AF3EE08A9FFFE96919CE4F6752F58B418098FCB3F5B5EC2A1E9FEC3EEE0C9D46A4809993B18BDFD433F26
3,433,663 UART: [art] PUB.Y = 0D044F360AFB71D05E322853C6631C49F883427132F66E68642A96BF06E14693BD5FBACD3B21C876F9C3C0121F8A1AB4
3,440,603 UART: [art] SIG.R = 0FE945A978AE7857CBBC0E99E794EF3646ACB894406508C4044D8BC3306E6295062F719F31F0E39B8D323893119617B0
3,447,352 UART: [art] SIG.S = DFDE426F94979760E3610BB9EF2B56CD754413FC0E25C743DCEE36383CA057E56DB3A1FEAEF4FC370F7B26C79F455F6F
3,470,792 UART: Caliptra RT
3,471,137 UART: [state] CFI Enabled
3,578,380 UART: [rt] RT listening for mailbox commands...
3,579,050 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,170 UART: [rt]cmd =0x52564348, len=36
3,610,566 >>> mbox cmd response: failed
3,610,566 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,032 UART: [rt]cmd =0x52564348, len=36
3,641,396 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 ready_for_fw is high
1,362,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,721 >>> mbox cmd response: success
2,985,519 UART:
2,985,535 UART: Running Caliptra FMC ...
2,985,943 UART:
2,986,086 UART: [state] CFI Enabled
2,996,571 UART: [fht] FMC Alias Private Key: 7
3,104,448 UART: [art] Extend RT PCRs Done
3,104,876 UART: [art] Lock RT PCRs Done
3,106,334 UART: [art] Populate DV Done
3,114,495 UART: [fht] FMC Alias Private Key: 7
3,115,553 UART: [art] Derive CDI
3,115,833 UART: [art] Store in in slot 0x4
3,201,402 UART: [art] Derive Key Pair
3,201,762 UART: [art] Store priv key in slot 0x5
3,215,198 UART: [art] Derive Key Pair - Done
3,229,803 UART: [art] Signing Cert with AUTHO
3,230,283 UART: RITY.KEYID = 7
3,245,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,632 UART: [art] PUB.X = A02BC060690469A8835B4B9660F5B357B235411ACDD0513667282AE7D8ACF6DDD8B7794924BD5EB3A18F077C66B51207
3,253,393 UART: [art] PUB.Y = FBA7A8BED44D33B42DB41F6302A2DBEC501FB690354B09ACDC25AA8AAB35A6EB6E521F972A955CC3FA6B2C4B7759398B
3,260,361 UART: [art] SIG.R = 3A30D404F62257FF6597CAFB8599D456572C6618DD5CA6898A4D7A07D8AFB7F3B0ADFE4E79ECA01603B331EF84FE7BCD
3,267,140 UART: [art] SIG.S = E763FADD5C9FD075A6DAF553D2FC820F08F498FD2E73509CFD80BE2590B3C2A3D169546B091ED82BFB1B62D35C027847
3,290,687 UART: Caliptra RT
3,291,032 UART: [state] CFI Enabled
3,399,789 UART: [rt] RT listening for mailbox commands...
3,400,459 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,535 UART: [rt]cmd =0x52564348, len=36
3,431,923 >>> mbox cmd response: failed
3,431,923 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,597 UART: [rt]cmd =0x52564348, len=36
3,462,803 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
893,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,207 UART: [kat] ++
897,359 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,740 UART: [kat] HMAC-384Kdf
922,368 UART: [kat] LMS
1,170,696 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,172,033 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 ready_for_fw is high
1,176,103 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,557 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,267 UART: [ldev] ++
1,210,435 UART: [ldev] CDI.KEYID = 6
1,210,798 UART: [ldev] SUBJECT.KEYID = 5
1,211,224 UART: [ldev] AUTHORITY.KEYID = 7
1,211,687 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,902 UART: [fwproc] Wait for Commands...
1,282,526 UART: [fwproc] Recv command 0x46574c44
1,283,254 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,173 >>> mbox cmd response: success
2,770,227 UART: [afmc] ++
2,770,395 UART: [afmc] CDI.KEYID = 6
2,770,757 UART: [afmc] SUBJECT.KEYID = 7
2,771,182 UART: [afmc] AUTHORITY.KEYID = 5
2,806,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,370 UART: [afmc] --
2,850,394 UART: [cold-reset] --
2,851,536 UART: [state] Locking Datavault
2,852,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,169 UART: [state] Locking ICCM
2,853,841 UART: [exit] Launching FMC @ 0x40000130
2,859,170 UART:
2,859,186 UART: Running Caliptra FMC ...
2,859,594 UART:
2,859,648 UART: [state] CFI Enabled
2,869,843 UART: [fht] FMC Alias Private Key: 7
2,977,602 UART: [art] Extend RT PCRs Done
2,978,030 UART: [art] Lock RT PCRs Done
2,979,478 UART: [art] Populate DV Done
2,987,585 UART: [fht] FMC Alias Private Key: 7
2,988,527 UART: [art] Derive CDI
2,988,807 UART: [art] Store in in slot 0x4
3,074,372 UART: [art] Derive Key Pair
3,074,732 UART: [art] Store priv key in slot 0x5
3,087,682 UART: [art] Derive Key Pair - Done
3,102,455 UART: [art] Signing Cert with AUTHO
3,102,935 UART: RITY.KEYID = 7
3,118,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,326 UART: [art] PUB.X = D48884E7F60E12D487C993F38A338FE5C958815E897E1E470617F47CCC0BA80D65569568FD5A71FF8E70E7D12DA9828B
3,126,086 UART: [art] PUB.Y = 20E477BE9738054E43AD4511119D28F19F4414EE05EBE612213D0CFC6C00D24A059A0E9AD67475C1A4D3EED3245FF031
3,133,003 UART: [art] SIG.R = 3ECD7E6911D802C880E62BBAC70528086DE62F775BE290509C6721B9DE837D615BEA0F84D061C4355F77D440FD2E7ED4
3,139,767 UART: [art] SIG.S = 6F8E0D79FCB72067AEF4B39400E9F043267D4CA7AC0DCF2A20011F2EBB073E6CF6E336F1BF2C88E5DADDDD1093600727
3,164,121 UART: Caliptra RT
3,164,374 UART: [state] CFI Enabled
3,271,997 UART: [rt] RT listening for mailbox commands...
3,272,667 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,021 UART: [rt]cmd =0x52564348, len=36
3,304,595 >>> mbox cmd response: failed
3,304,595 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,309 UART: [rt]cmd =0x52564348, len=36
3,335,321 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,325 ready_for_fw is high
1,060,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,282 >>> mbox cmd response: success
2,685,106 UART:
2,685,122 UART: Running Caliptra FMC ...
2,685,530 UART:
2,685,584 UART: [state] CFI Enabled
2,695,599 UART: [fht] FMC Alias Private Key: 7
2,804,032 UART: [art] Extend RT PCRs Done
2,804,460 UART: [art] Lock RT PCRs Done
2,805,940 UART: [art] Populate DV Done
2,814,063 UART: [fht] FMC Alias Private Key: 7
2,815,099 UART: [art] Derive CDI
2,815,379 UART: [art] Store in in slot 0x4
2,900,976 UART: [art] Derive Key Pair
2,901,336 UART: [art] Store priv key in slot 0x5
2,914,156 UART: [art] Derive Key Pair - Done
2,928,836 UART: [art] Signing Cert with AUTHO
2,929,316 UART: RITY.KEYID = 7
2,944,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,207 UART: [art] PUB.X = C8E6C9CDFB76BE17BD19E80A1A01BE3CCF94BBD3535E1E50D6DA2F6A81103D3727F6F5BDDB1B937E606364ADDEEE70A3
2,951,999 UART: [art] PUB.Y = E3EC71D997A8383AA41327DB83792D06EE905DDC82CCDC17CEF773CE6792B444043992C6CEEC51E69CD9E571ADE2CB59
2,958,959 UART: [art] SIG.R = 9A8E5D23B7D5C6A6B8271A1B3DD36D48D618B5C517F0AAC9BC4E4F6354C6E7A7D6EA3B56013B54540967154BE7D63507
2,965,728 UART: [art] SIG.S = 39B757C2DBA8AC26D34E531FEF7B70FB1C3F24EC3030A4BB0256683EF99833824DE3D17A89420D184B998DF5313CD021
2,989,871 UART: Caliptra RT
2,990,124 UART: [state] CFI Enabled
3,097,931 UART: [rt] RT listening for mailbox commands...
3,098,601 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,485 UART: [rt]cmd =0x52564348, len=36
3,129,895 >>> mbox cmd response: failed
3,129,895 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,387 UART: [rt]cmd =0x52564348, len=36
3,160,733 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,882 UART: [kat] SHA2-256
903,822 UART: [kat] SHA2-384
906,545 UART: [kat] SHA2-512-ACC
908,446 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,114 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,025 UART: [idev] Erasing UDS.KEYID = 0
1,201,062 UART: [idev] Sha1 KeyId Algorithm
1,209,412 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,504 UART: [ldev] Erasing FE.KEYID = 1
1,243,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,422 UART: [ldev] --
1,282,853 UART: [fwproc] Wait for Commands...
1,283,669 UART: [fwproc] Recv command 0x46574c44
1,284,397 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,968 >>> mbox cmd response: success
2,773,130 UART: [afmc] ++
2,773,298 UART: [afmc] CDI.KEYID = 6
2,773,660 UART: [afmc] SUBJECT.KEYID = 7
2,774,085 UART: [afmc] AUTHORITY.KEYID = 5
2,809,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,159 UART: [afmc] --
2,853,217 UART: [cold-reset] --
2,853,895 UART: [state] Locking Datavault
2,854,984 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,588 UART: [state] Locking ICCM
2,856,174 UART: [exit] Launching FMC @ 0x40000130
2,861,503 UART:
2,861,519 UART: Running Caliptra FMC ...
2,861,927 UART:
2,862,070 UART: [state] CFI Enabled
2,872,727 UART: [fht] FMC Alias Private Key: 7
2,980,540 UART: [art] Extend RT PCRs Done
2,980,968 UART: [art] Lock RT PCRs Done
2,982,662 UART: [art] Populate DV Done
2,991,135 UART: [fht] FMC Alias Private Key: 7
2,992,143 UART: [art] Derive CDI
2,992,423 UART: [art] Store in in slot 0x4
3,077,684 UART: [art] Derive Key Pair
3,078,044 UART: [art] Store priv key in slot 0x5
3,091,458 UART: [art] Derive Key Pair - Done
3,106,349 UART: [art] Signing Cert with AUTHO
3,106,829 UART: RITY.KEYID = 7
3,121,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,616 UART: [art] PUB.X = A5AE3A5447064348A00B3DE8F6BC317C14CD9B668820E79E3812B2FD1EEC567F1409C93DD77E7189F72AB67F61CA4128
3,129,383 UART: [art] PUB.Y = 29923122B611A5F7B8FF2F995B8129E71BFB41423C11D67C435AABA7DDBA6F447EFD51A92EB0C1B2C1F83E3D9F707243
3,136,345 UART: [art] SIG.R = DE34C3F5F1D980E3D1497534B0EF7F4A84B6975FFA2251857093379D7584876B65A5B26B15EEF759D8D4DA75751F077E
3,143,112 UART: [art] SIG.S = CE24BF9E987BFDB5D6F206AFA0E15C2D0CE10E490B3745A747CD5B3643A8A07A4126F0ECE0DD411C2D8F600D42AEEFCE
3,167,546 UART: Caliptra RT
3,167,891 UART: [state] CFI Enabled
3,276,081 UART: [rt] RT listening for mailbox commands...
3,276,751 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,707 UART: [rt]cmd =0x52564348, len=36
3,307,915 >>> mbox cmd response: failed
3,307,915 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,563 UART: [rt]cmd =0x52564348, len=36
3,338,969 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,304 ready_for_fw is high
1,061,304 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,941 >>> mbox cmd response: success
2,685,433 UART:
2,685,449 UART: Running Caliptra FMC ...
2,685,857 UART:
2,686,000 UART: [state] CFI Enabled
2,696,793 UART: [fht] FMC Alias Private Key: 7
2,804,906 UART: [art] Extend RT PCRs Done
2,805,334 UART: [art] Lock RT PCRs Done
2,807,050 UART: [art] Populate DV Done
2,815,565 UART: [fht] FMC Alias Private Key: 7
2,816,619 UART: [art] Derive CDI
2,816,899 UART: [art] Store in in slot 0x4
2,902,820 UART: [art] Derive Key Pair
2,903,180 UART: [art] Store priv key in slot 0x5
2,916,824 UART: [art] Derive Key Pair - Done
2,931,590 UART: [art] Signing Cert with AUTHO
2,932,070 UART: RITY.KEYID = 7
2,947,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,891 UART: [art] PUB.X = 82CED02BD41F0978EA074A949385AFE82B4A5AF9B1DFDA218D887FB3BB9BA77DC65F0D6412B91E1BC57FAB9417FA9804
2,954,669 UART: [art] PUB.Y = 0EDF3DA0420E7C9D5316107D54D96577CE6AEFCA46D2A3666513E49851F5D55C8EAB2510AB0F7FF8322E22210478354D
2,961,611 UART: [art] SIG.R = 6E7212004E54AAD304E6413106EC9C4B4A1F2FD2889524DC4E32CB1D77FE15E3CEB5A6F8E28A05EB5F4BFF5F33560343
2,968,359 UART: [art] SIG.S = B9D3ED57910B96B9F79A860357E965713A9E7E2975D56E37A774E48DEAA6021955FE1969C59ED88569BAD6F43BDF54B0
2,992,381 UART: Caliptra RT
2,992,726 UART: [state] CFI Enabled
3,100,985 UART: [rt] RT listening for mailbox commands...
3,101,655 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,825 UART: [rt]cmd =0x52564348, len=36
3,133,295 >>> mbox cmd response: failed
3,133,295 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,787 UART: [rt]cmd =0x52564348, len=36
3,164,291 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
891,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,480 UART: [kat] SHA2-512-ACC
906,381 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,169,809 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 ready_for_fw is high
1,174,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,854 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,842 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,981 UART: [fwproc] Recv command 0x46574c44
1,283,714 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,383 >>> mbox cmd response: success
2,772,484 UART: [afmc] ++
2,772,652 UART: [afmc] CDI.KEYID = 6
2,773,015 UART: [afmc] SUBJECT.KEYID = 7
2,773,441 UART: [afmc] AUTHORITY.KEYID = 5
2,809,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,093 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,643 UART: [afmc] --
2,852,573 UART: [cold-reset] --
2,853,379 UART: [state] Locking Datavault
2,854,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,170 UART: [state] Locking ICCM
2,855,734 UART: [exit] Launching FMC @ 0x40000130
2,861,063 UART:
2,861,079 UART: Running Caliptra FMC ...
2,861,487 UART:
2,861,541 UART: [state] CFI Enabled
2,872,082 UART: [fht] FMC Alias Private Key: 7
2,980,163 UART: [art] Extend RT PCRs Done
2,980,591 UART: [art] Lock RT PCRs Done
2,982,231 UART: [art] Populate DV Done
2,990,526 UART: [fht] FMC Alias Private Key: 7
2,991,642 UART: [art] Derive CDI
2,991,922 UART: [art] Store in in slot 0x4
3,077,791 UART: [art] Derive Key Pair
3,078,151 UART: [art] Store priv key in slot 0x5
3,091,539 UART: [art] Derive Key Pair - Done
3,106,376 UART: [art] Signing Cert with AUTHO
3,106,856 UART: RITY.KEYID = 7
3,121,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,401 UART: [art] PUB.X = 5362F6A14A5B76EE28C5F46A4930FB6503B353046747316F1868CB7ED1A102C91B316AC14C283EE0CEB26792B5FE816D
3,129,164 UART: [art] PUB.Y = 95AE4341D5730D873AE810C36141526697226F050F3FF66725DE40B18C4DDFEB168310B73E8A55CB1E2A76A79233DC77
3,136,103 UART: [art] SIG.R = 9ACBAEDC04C3ED55B2CC0C377546C44454F6746D2892BAA40EBFBCFEADB6878D8C08DE8081BB1079583D2F0C2B2639EA
3,142,880 UART: [art] SIG.S = 37D751CD8810C59BC3C2A34697E2A4EFC5C188EFCB514CDE935BB148D9F83D722378ECDF4E6707600C9E36BDDF77C058
3,166,451 UART: Caliptra RT
3,166,704 UART: [state] CFI Enabled
3,274,389 UART: [rt] RT listening for mailbox commands...
3,275,059 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,331 UART: [rt]cmd =0x52564348, len=36
3,306,733 >>> mbox cmd response: failed
3,306,733 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,077 UART: [rt]cmd =0x52564348, len=36
3,337,693 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,480 ready_for_fw is high
1,056,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,683 >>> mbox cmd response: success
2,680,779 UART:
2,680,795 UART: Running Caliptra FMC ...
2,681,203 UART:
2,681,257 UART: [state] CFI Enabled
2,691,626 UART: [fht] FMC Alias Private Key: 7
2,799,321 UART: [art] Extend RT PCRs Done
2,799,749 UART: [art] Lock RT PCRs Done
2,801,201 UART: [art] Populate DV Done
2,809,236 UART: [fht] FMC Alias Private Key: 7
2,810,194 UART: [art] Derive CDI
2,810,474 UART: [art] Store in in slot 0x4
2,896,673 UART: [art] Derive Key Pair
2,897,033 UART: [art] Store priv key in slot 0x5
2,910,229 UART: [art] Derive Key Pair - Done
2,925,092 UART: [art] Signing Cert with AUTHO
2,925,572 UART: RITY.KEYID = 7
2,940,188 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,953 UART: [art] PUB.X = 58DCD52303E1F5F57775D9D52EBCD1737C75E81D2AA335616D3B13D7E0E6F7A1FF8EB29FDE0F3E8AF8EF0459190BEC8D
2,947,731 UART: [art] PUB.Y = 0D8D577B358330807B4AE1A6A677C63B8267EA69B8E892F04799A8DDF1653CA0DEEA3C6BB89FEC90798273E1E8F22881
2,954,684 UART: [art] SIG.R = D59CE3A330496D46C8271E6A6D62D21C2284CFF0773B2798F385B560FE8D8F074DD3920E24CBAE9F88203F61813B13D9
2,961,450 UART: [art] SIG.S = 305FA5BD14AF8DE93B79811B52AA15A5087993A2BFE52D3E5B8401A8E3F8E2C76CFC83A60F7F7D878C15F0FAC9BB436F
2,985,756 UART: Caliptra RT
2,986,009 UART: [state] CFI Enabled
3,094,962 UART: [rt] RT listening for mailbox commands...
3,095,632 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,682 UART: [rt]cmd =0x52564348, len=36
3,126,840 >>> mbox cmd response: failed
3,126,840 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,406 UART: [rt]cmd =0x52564348, len=36
3,158,046 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,174,644 ready_for_fw is high
1,174,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,480 UART: [ldev] AUTHORITY.KEYID = 7
1,210,943 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,395 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,825 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,392 >>> mbox cmd response: success
2,770,529 UART: [afmc] ++
2,770,697 UART: [afmc] CDI.KEYID = 6
2,771,060 UART: [afmc] SUBJECT.KEYID = 7
2,771,486 UART: [afmc] AUTHORITY.KEYID = 5
2,807,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,795 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,506 UART: [afmc] --
2,850,604 UART: [cold-reset] --
2,851,504 UART: [state] Locking Datavault
2,852,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,145 UART: [state] Locking ICCM
2,853,709 UART: [exit] Launching FMC @ 0x40000130
2,859,038 UART:
2,859,054 UART: Running Caliptra FMC ...
2,859,462 UART:
2,859,605 UART: [state] CFI Enabled
2,870,198 UART: [fht] FMC Alias Private Key: 7
2,978,089 UART: [art] Extend RT PCRs Done
2,978,517 UART: [art] Lock RT PCRs Done
2,980,279 UART: [art] Populate DV Done
2,988,490 UART: [fht] FMC Alias Private Key: 7
2,989,640 UART: [art] Derive CDI
2,989,920 UART: [art] Store in in slot 0x4
3,075,595 UART: [art] Derive Key Pair
3,075,955 UART: [art] Store priv key in slot 0x5
3,089,141 UART: [art] Derive Key Pair - Done
3,103,891 UART: [art] Signing Cert with AUTHO
3,104,371 UART: RITY.KEYID = 7
3,120,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,892 UART: [art] PUB.X = 885505C1890782AE310FC6A0592FC8EAB582629225473F681A8F02C17385C7FBAD793085023EA21508A0ABDF6A71A639
3,127,640 UART: [art] PUB.Y = F9075C267A31EE275B41C5971D01AC2E08E0713CE1C3328A55C185597443B6BAA13FDCF74EA940CC8B3156959C6FD878
3,134,585 UART: [art] SIG.R = A9E505E7588A943D1E237869674794E9763206E393A4C06EC0441B6602C20AC905981419C0223E24E2999C5234A8E5BF
3,141,326 UART: [art] SIG.S = 8FCE23C94E6913038D667D73C65EE8080BAE10A32292D9A537E2AFFC10D544325B9AD71E7CA326EF6618A4CDED39726F
3,164,608 UART: Caliptra RT
3,164,953 UART: [state] CFI Enabled
3,272,153 UART: [rt] RT listening for mailbox commands...
3,272,823 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,659 UART: [rt]cmd =0x52564348, len=36
3,304,063 >>> mbox cmd response: failed
3,304,063 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,475 UART: [rt]cmd =0x52564348, len=36
3,334,747 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 ready_for_fw is high
1,056,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,520 >>> mbox cmd response: success
2,681,588 UART:
2,681,604 UART: Running Caliptra FMC ...
2,682,012 UART:
2,682,155 UART: [state] CFI Enabled
2,692,622 UART: [fht] FMC Alias Private Key: 7
2,800,889 UART: [art] Extend RT PCRs Done
2,801,317 UART: [art] Lock RT PCRs Done
2,802,817 UART: [art] Populate DV Done
2,810,900 UART: [fht] FMC Alias Private Key: 7
2,811,988 UART: [art] Derive CDI
2,812,268 UART: [art] Store in in slot 0x4
2,897,895 UART: [art] Derive Key Pair
2,898,255 UART: [art] Store priv key in slot 0x5
2,911,203 UART: [art] Derive Key Pair - Done
2,926,091 UART: [art] Signing Cert with AUTHO
2,926,571 UART: RITY.KEYID = 7
2,942,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,888 UART: [art] PUB.X = 7A17D93CB2D492FDA96091849BDC06A8E385FA8FA58A324BCF364DC57951D738DEBA176A1B0A4C3B2B22A4659285116A
2,949,662 UART: [art] PUB.Y = 66758DB7881332035D9294C3A943720DC95C512389336E552B8664D685D9B8747A19D18991DD77FEE83AC7236D729163
2,956,590 UART: [art] SIG.R = 372DE3664F124D8CE10C95F4476E09A6EBED5C536784B34DD69E82191BD21C915F1008A1FAFC0CC1C142CACC51CB3A56
2,963,362 UART: [art] SIG.S = 77D514A42D7041D6A5AF6D1F0AE1767E459405BEA1F11A73FFA0534C76E25CA1DFA79D95FC29C338207505957BFE435E
2,987,680 UART: Caliptra RT
2,988,025 UART: [state] CFI Enabled
3,095,932 UART: [rt] RT listening for mailbox commands...
3,096,602 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,664 UART: [rt]cmd =0x52564348, len=36
3,128,058 >>> mbox cmd response: failed
3,128,058 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,528 UART: [rt]cmd =0x52564348, len=36
3,158,914 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,254 UART:
192,611 UART: Running Caliptra ROM ...
193,746 UART:
193,898 UART: [state] CFI Enabled
264,647 UART: [state] LifecycleState = Unprovisioned
266,428 UART: [state] DebugLocked = No
269,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,038 UART: [kat] SHA2-256
443,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,240 UART: [kat] ++
454,716 UART: [kat] sha1
466,016 UART: [kat] SHA2-256
468,734 UART: [kat] SHA2-384
474,605 UART: [kat] SHA2-512-ACC
476,975 UART: [kat] ECC-384
2,769,030 UART: [kat] HMAC-384Kdf
2,800,461 UART: [kat] LMS
3,990,763 UART: [kat] --
3,995,510 UART: [cold-reset] ++
3,997,095 UART: [fht] Storing FHT @ 0x50003400
4,009,364 UART: [idev] ++
4,009,937 UART: [idev] CDI.KEYID = 6
4,010,835 UART: [idev] SUBJECT.KEYID = 7
4,012,160 UART: [idev] UDS.KEYID = 0
4,013,209 ready_for_fw is high
4,013,429 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,635 UART: [idev] Erasing UDS.KEYID = 0
7,345,482 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,135 UART: [idev] --
7,372,066 UART: [ldev] ++
7,372,644 UART: [ldev] CDI.KEYID = 6
7,373,626 UART: [ldev] SUBJECT.KEYID = 5
7,374,837 UART: [ldev] AUTHORITY.KEYID = 7
7,376,067 UART: [ldev] FE.KEYID = 1
7,423,349 UART: [ldev] Erasing FE.KEYID = 1
10,754,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,760 UART: [ldev] --
13,113,998 UART: [fwproc] Waiting for Commands...
13,116,639 UART: [fwproc] Received command 0x46574c44
13,118,819 UART: [fwproc] Received Image of size 113760 bytes
21,980,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,065,989 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,134,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,450,131 >>> mbox cmd response: success
22,455,031 UART: [afmc] ++
22,455,637 UART: [afmc] CDI.KEYID = 6
22,456,521 UART: [afmc] SUBJECT.KEYID = 7
22,457,796 UART: [afmc] AUTHORITY.KEYID = 5
25,823,196 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,128,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,130,747 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,145,322 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,160,045 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,174,280 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,195,444 UART: [afmc] --
28,198,997 UART: [cold-reset] --
28,201,666 UART: [state] Locking Datavault
28,206,390 UART: [state] Locking PCR0, PCR1 and PCR31
28,208,142 UART: [state] Locking ICCM
28,209,995 UART: [exit] Launching FMC @ 0x40000130
28,218,382 UART:
28,218,614 UART: Running Caliptra FMC ...
28,219,639 UART:
28,219,785 UART: [state] CFI Enabled
28,288,258 UART: [fht] FMC Alias Private Key: 7
30,625,855 UART: [art] Extend RT PCRs Done
30,627,081 UART: [art] Lock RT PCRs Done
30,628,789 UART: [art] Populate DV Done
30,634,303 UART: [fht] FMC Alias Private Key: 7
30,635,782 UART: [art] Derive CDI
30,636,512 UART: [art] Store in in slot 0x4
30,696,845 UART: [art] Derive Key Pair
30,697,884 UART: [art] Store priv key in slot 0x5
33,991,394 UART: [art] Derive Key Pair - Done
34,004,667 UART: [art] Signing Cert with AUTHO
34,005,979 UART: RITY.KEYID = 7
36,292,688 UART: [art] Erasing AUTHORITY.KEYID = 7
36,294,202 UART: [art] PUB.X = C411D8BEFBD92135C87432B2E7D270B785D81A079A664F03D67B703518973B5DEC141FC5DCFAA4B6F092368F5652BDE9
36,301,391 UART: [art] PUB.Y = 869EBB26DE2146DDB857B4D17813E9C218B3F786E449BFE82ABB0995F8197E6521DA6DAC9090F5ECBEF22BEDDBF18655
36,308,692 UART: [art] SIG.R = E0A539A9B011E4E3652A6FF5F6674DED177655B225A11E6FCE74BD37EBE79B9336FCC0316C2BF037FF7CF35CAFB83847
36,316,083 UART: [art] SIG.S = D616A1D5B8915672202BD94ABAAD18E7B5D9BFD36B3154CC52BF322FCF7925C9FDB89B58DDF3471457EBAB687F498FAD
37,620,652 UART: Caliptra RT
37,621,373 UART: [state] CFI Enabled
37,784,181 UART: [rt] RT listening for mailbox commands...
41,806,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,961,868 UART: [rt]cmd =0x41544d4e, len=14344
50,437,942 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,829 writing to cptra_bootfsm_go
3,783,140 ready_for_fw is high
3,783,530 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,893,349 >>> mbox cmd response: success
27,579,203 UART:
27,579,600 UART: Running Caliptra FMC ...
27,580,808 UART:
27,580,985 UART: [state] CFI Enabled
27,647,793 UART: [fht] FMC Alias Private Key: 7
29,985,742 UART: [art] Extend RT PCRs Done
29,986,988 UART: [art] Lock RT PCRs Done
29,988,866 UART: [art] Populate DV Done
29,994,503 UART: [fht] FMC Alias Private Key: 7
29,996,045 UART: [art] Derive CDI
29,996,814 UART: [art] Store in in slot 0x4
30,055,864 UART: [art] Derive Key Pair
30,056,915 UART: [art] Store priv key in slot 0x5
33,349,605 UART: [art] Derive Key Pair - Done
33,362,218 UART: [art] Signing Cert with AUTHO
33,363,553 UART: RITY.KEYID = 7
35,651,132 UART: [art] Erasing AUTHORITY.KEYID = 7
35,652,640 UART: [art] PUB.X = 788A1780E11161B2704820ED7FA57ED0F305DFB1A809A257157229BD783801D3457A8D442D39136FDB81A385E1DE22B8
35,659,842 UART: [art] PUB.Y = 7034E9EE3211FCE646C3DEA914B4DDC6B0B4176907AE6A2AB0CB10CE46172E37CEB1B2712C8B8786B2A1CE26A8ADB434
35,667,110 UART: [art] SIG.R = EF83E8AC008C8EF177D29BC9E3092AD1FC94D742F62C8560E47FB0AF46D8C922E01AAB352BC9994B956D397B7DF8C1FC
35,674,516 UART: [art] SIG.S = 4FBEC23DE9A035F398E9F68B2343D5CEBC92EACD73C9CC1267C6A82EB9716A4338A51E2FD708F82804EE761A5328400A
36,979,934 UART: Caliptra RT
36,980,664 UART: [state] CFI Enabled
37,140,215 UART: [rt] RT listening for mailbox commands...
41,162,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,318,178 UART: [rt]cmd =0x41544d4e, len=14344
49,716,961 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,630 writing to cptra_bootfsm_go
192,907 UART:
193,288 UART: Running Caliptra ROM ...
194,405 UART:
603,966 UART: [state] CFI Enabled
617,294 UART: [state] LifecycleState = Unprovisioned
619,162 UART: [state] DebugLocked = No
620,690 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,059 UART: [kat] SHA2-256
794,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,361 UART: [kat] ++
805,967 UART: [kat] sha1
816,133 UART: [kat] SHA2-256
818,852 UART: [kat] SHA2-384
823,769 UART: [kat] SHA2-512-ACC
826,092 UART: [kat] ECC-384
3,109,953 UART: [kat] HMAC-384Kdf
3,121,974 UART: [kat] LMS
4,312,134 UART: [kat] --
4,315,722 UART: [cold-reset] ++
4,318,226 UART: [fht] Storing FHT @ 0x50003400
4,330,482 UART: [idev] ++
4,331,116 UART: [idev] CDI.KEYID = 6
4,332,016 UART: [idev] SUBJECT.KEYID = 7
4,333,264 UART: [idev] UDS.KEYID = 0
4,334,237 ready_for_fw is high
4,334,442 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,294 UART: [idev] Erasing UDS.KEYID = 0
7,615,612 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,439 UART: [idev] --
7,643,446 UART: [ldev] ++
7,644,028 UART: [ldev] CDI.KEYID = 6
7,644,993 UART: [ldev] SUBJECT.KEYID = 5
7,646,203 UART: [ldev] AUTHORITY.KEYID = 7
7,647,426 UART: [ldev] FE.KEYID = 1
7,658,873 UART: [ldev] Erasing FE.KEYID = 1
10,947,660 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,547 UART: [ldev] --
13,308,129 UART: [fwproc] Waiting for Commands...
13,311,396 UART: [fwproc] Received command 0x46574c44
13,313,641 UART: [fwproc] Received Image of size 113760 bytes
21,867,885 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,940,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,009,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,326,414 >>> mbox cmd response: success
22,331,405 UART: [afmc] ++
22,332,004 UART: [afmc] CDI.KEYID = 6
22,332,918 UART: [afmc] SUBJECT.KEYID = 7
22,334,129 UART: [afmc] AUTHORITY.KEYID = 5
25,648,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,944,673 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,946,947 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,961,545 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,976,296 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,990,519 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,010,903 UART: [afmc] --
28,014,492 UART: [cold-reset] --
28,017,915 UART: [state] Locking Datavault
28,024,245 UART: [state] Locking PCR0, PCR1 and PCR31
28,026,153 UART: [state] Locking ICCM
28,027,722 UART: [exit] Launching FMC @ 0x40000130
28,036,121 UART:
28,036,367 UART: Running Caliptra FMC ...
28,037,469 UART:
28,037,622 UART: [state] CFI Enabled
28,045,937 UART: [fht] FMC Alias Private Key: 7
30,376,614 UART: [art] Extend RT PCRs Done
30,377,833 UART: [art] Lock RT PCRs Done
30,379,613 UART: [art] Populate DV Done
30,384,966 UART: [fht] FMC Alias Private Key: 7
30,386,528 UART: [art] Derive CDI
30,387,258 UART: [art] Store in in slot 0x4
30,429,416 UART: [art] Derive Key Pair
30,430,453 UART: [art] Store priv key in slot 0x5
33,672,176 UART: [art] Derive Key Pair - Done
33,684,956 UART: [art] Signing Cert with AUTHO
33,686,256 UART: RITY.KEYID = 7
35,965,803 UART: [art] Erasing AUTHORITY.KEYID = 7
35,967,301 UART: [art] PUB.X = 295065D1416883FEFAFC15BCEA2507C1B93751B54159115274736CD0D6757AE8FFB7C6E9C980B5DADC731D90387FA1E3
35,974,510 UART: [art] PUB.Y = A879794A66DCDA913F8C2B40933627247BA6DB25D3294ED298BF711927F8FC4340DD0E23CD4609A4861FC762CBB139F0
35,981,769 UART: [art] SIG.R = 45FFFB7E29B3D75D0FADF96552BADDE2E0C1A3A1269987780389B3FAA9D6CD272A4DEDC5AFB66D53628642E9B749DD11
35,989,182 UART: [art] SIG.S = D1D9C16B2C51CD06DB065ED63F5CC403F1EA42EB1721CD834B977892BCDDEEF2B9C45351AFFDFA3009963898BB7708AA
37,293,986 UART: Caliptra RT
37,294,675 UART: [state] CFI Enabled
37,413,096 UART: [rt] RT listening for mailbox commands...
41,440,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,595,978 UART: [rt]cmd =0x41544d4e, len=14344
50,124,489 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
4,132,641 ready_for_fw is high
4,133,281 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,917,050 >>> mbox cmd response: success
27,558,838 UART:
27,559,229 UART: Running Caliptra FMC ...
27,560,330 UART:
27,560,479 UART: [state] CFI Enabled
27,568,500 UART: [fht] FMC Alias Private Key: 7
29,899,398 UART: [art] Extend RT PCRs Done
29,900,634 UART: [art] Lock RT PCRs Done
29,902,396 UART: [art] Populate DV Done
29,907,967 UART: [fht] FMC Alias Private Key: 7
29,909,580 UART: [art] Derive CDI
29,910,319 UART: [art] Store in in slot 0x4
29,952,650 UART: [art] Derive Key Pair
29,953,650 UART: [art] Store priv key in slot 0x5
33,195,699 UART: [art] Derive Key Pair - Done
33,208,757 UART: [art] Signing Cert with AUTHO
33,210,061 UART: RITY.KEYID = 7
35,489,598 UART: [art] Erasing AUTHORITY.KEYID = 7
35,491,162 UART: [art] PUB.X = ADB41212BDE1E9178126E430E80F9EAA519E159D6369F506DDBC0ACB7933BC32C4330248E3823D8F27A5E337448318B5
35,498,349 UART: [art] PUB.Y = 16DAF1654E6D3E89D6F1CAEA1AD897F3BB108C4A96868C8CD707018BBDF7E118A050A8A3D6581E99AABE304B26A7426C
35,505,584 UART: [art] SIG.R = 60194667BE845E9CD916677E62C9265EC0250D96380CB8B242F558A986A2078705D7F67EFBB47C73350ACEE15460E6FD
35,512,981 UART: [art] SIG.S = D709A914FF164C0E3D482EF75F96935F22D2C617FC8D12D0BCB567A4A27CC6D1D6F381D0B85BE38D7EFDF7F2C4BF555F
36,818,292 UART: Caliptra RT
36,819,007 UART: [state] CFI Enabled
36,936,096 UART: [rt] RT listening for mailbox commands...
40,959,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,114,908 UART: [rt]cmd =0x41544d4e, len=14344
49,565,493 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,548 UART:
192,929 UART: Running Caliptra ROM ...
194,116 UART:
194,272 UART: [state] CFI Enabled
261,812 UART: [state] LifecycleState = Unprovisioned
263,731 UART: [state] DebugLocked = No
265,121 UART: [state] WD Timer not started. Device not locked for debugging
268,370 UART: [kat] SHA2-256
447,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,079 UART: [kat] ++
459,609 UART: [kat] sha1
471,196 UART: [kat] SHA2-256
474,266 UART: [kat] SHA2-384
480,175 UART: [kat] SHA2-512-ACC
483,101 UART: [kat] ECC-384
2,927,186 UART: [kat] HMAC-384Kdf
2,949,458 UART: [kat] LMS
3,478,939 UART: [kat] --
3,482,534 UART: [cold-reset] ++
3,484,828 UART: [fht] FHT @ 0x50003400
3,496,440 UART: [idev] ++
3,497,017 UART: [idev] CDI.KEYID = 6
3,497,940 UART: [idev] SUBJECT.KEYID = 7
3,499,113 UART: [idev] UDS.KEYID = 0
3,500,155 ready_for_fw is high
3,500,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,643,916 UART: [idev] Erasing UDS.KEYID = 0
6,006,464 UART: [idev] Sha1 KeyId Algorithm
6,029,755 UART: [idev] --
6,034,315 UART: [ldev] ++
6,034,889 UART: [ldev] CDI.KEYID = 6
6,035,778 UART: [ldev] SUBJECT.KEYID = 5
6,036,985 UART: [ldev] AUTHORITY.KEYID = 7
6,038,208 UART: [ldev] FE.KEYID = 1
6,079,132 UART: [ldev] Erasing FE.KEYID = 1
8,582,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,438 UART: [ldev] --
10,392,502 UART: [fwproc] Wait for Commands...
10,394,855 UART: [fwproc] Recv command 0x46574c44
10,396,940 UART: [fwproc] Recv'd Img size: 114084 bytes
14,949,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,027,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,096,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,414,303 >>> mbox cmd response: success
15,418,656 UART: [afmc] ++
15,419,251 UART: [afmc] CDI.KEYID = 6
15,420,159 UART: [afmc] SUBJECT.KEYID = 7
15,421,380 UART: [afmc] AUTHORITY.KEYID = 5
17,958,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,234 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,699,224 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,715,176 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,730,945 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,753,573 UART: [afmc] --
19,757,539 UART: [cold-reset] --
19,761,939 UART: [state] Locking Datavault
19,767,505 UART: [state] Locking PCR0, PCR1 and PCR31
19,769,356 UART: [state] Locking ICCM
19,771,892 UART: [exit] Launching FMC @ 0x40000130
19,780,343 UART:
19,780,584 UART: Running Caliptra FMC ...
19,781,684 UART:
19,781,846 UART: [state] CFI Enabled
19,839,881 UART: [fht] FMC Alias Private Key: 7
21,604,143 UART: [art] Extend RT PCRs Done
21,605,377 UART: [art] Lock RT PCRs Done
21,606,867 UART: [art] Populate DV Done
21,612,390 UART: [fht] FMC Alias Private Key: 7
21,613,971 UART: [art] Derive CDI
21,614,709 UART: [art] Store in in slot 0x4
21,672,928 UART: [art] Derive Key Pair
21,673,921 UART: [art] Store priv key in slot 0x5
24,136,881 UART: [art] Derive Key Pair - Done
24,149,564 UART: [art] Signing Cert with AUTHO
24,150,869 UART: RITY.KEYID = 7
25,863,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,686 UART: [art] PUB.X = 9F9D02C7439FB28F9862DD558DB855B7980407120D3A784450F8E6A23264DDE947B84FFCA37B6FD64A9F7877F9685369
25,871,925 UART: [art] PUB.Y = 6E0538512592C37C91D5B0A142CC877256905EB8773C90683E50467CBFDB3937B7E74391288AFAFB6FD46DFC35C6EB8A
25,879,191 UART: [art] SIG.R = 23D252F95534B125C8E26EA015950487A99F00F4F0028D673534FF347B5B2E37597AF81A4970453C6E0BB27C0F5BC735
25,886,576 UART: [art] SIG.S = 1B47CB7CD6AAB1FE5B28449F363D90A8AC06059BA244BCE576743482E6ADC9C81B1AA19FF4568A0C3DC82AA450C6274E
26,864,655 UART: Caliptra RT
26,865,370 UART: [state] CFI Enabled
27,032,686 UART: [rt] RT listening for mailbox commands...
31,053,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,208,892 UART: [rt]cmd =0x41544d4e, len=14344
36,064,705 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
3,359,654 ready_for_fw is high
3,360,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,022,307 >>> mbox cmd response: success
19,300,181 UART:
19,300,574 UART: Running Caliptra FMC ...
19,301,708 UART:
19,301,866 UART: [state] CFI Enabled
19,369,427 UART: [fht] FMC Alias Private Key: 7
21,133,296 UART: [art] Extend RT PCRs Done
21,134,537 UART: [art] Lock RT PCRs Done
21,136,167 UART: [art] Populate DV Done
21,141,363 UART: [fht] FMC Alias Private Key: 7
21,142,956 UART: [art] Derive CDI
21,143,771 UART: [art] Store in in slot 0x4
21,202,921 UART: [art] Derive Key Pair
21,203,958 UART: [art] Store priv key in slot 0x5
23,666,681 UART: [art] Derive Key Pair - Done
23,679,461 UART: [art] Signing Cert with AUTHO
23,680,755 UART: RITY.KEYID = 7
25,392,024 UART: [art] Erasing AUTHORITY.KEYID = 7
25,393,542 UART: [art] PUB.X = 7E258F874AED05BE7546472291195E9E5F099A7CD4F65B087C6F61A9226FAB30761600B048BACA3C4BDA2627A1428AF6
25,400,806 UART: [art] PUB.Y = 5049347393D3E429F0829C678D4D7455478CDCC9CED9B03EA33902C66482528FA6AD9A7AC25B48988D3446D5FD4334E7
25,408,033 UART: [art] SIG.R = EB195764F5187D68EF9F1D6D660C381926EE210F9A73BA924CF1F4CC9B2695B4DE758AA72D4DCF9970355BE4E82D39BA
25,415,396 UART: [art] SIG.S = 9833CC8C1389753C115DF72FB4B9343859288EAF9F789855404B720C8EA0F0ABD3B12EEA92CC17CAE58B3AB9891DC06A
26,394,286 UART: Caliptra RT
26,394,982 UART: [state] CFI Enabled
26,558,576 UART: [rt] RT listening for mailbox commands...
30,585,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,741,665 UART: [rt]cmd =0x41544d4e, len=14344
35,607,892 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,950 writing to cptra_bootfsm_go
193,210 UART:
193,571 UART: Running Caliptra ROM ...
194,756 UART:
604,423 UART: [state] CFI Enabled
620,650 UART: [state] LifecycleState = Unprovisioned
622,567 UART: [state] DebugLocked = No
624,673 UART: [state] WD Timer not started. Device not locked for debugging
627,796 UART: [kat] SHA2-256
806,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,477 UART: [kat] ++
819,016 UART: [kat] sha1
829,477 UART: [kat] SHA2-256
832,492 UART: [kat] SHA2-384
839,071 UART: [kat] SHA2-512-ACC
842,015 UART: [kat] ECC-384
3,284,038 UART: [kat] HMAC-384Kdf
3,296,798 UART: [kat] LMS
3,826,247 UART: [kat] --
3,831,048 UART: [cold-reset] ++
3,833,062 UART: [fht] FHT @ 0x50003400
3,844,545 UART: [idev] ++
3,845,111 UART: [idev] CDI.KEYID = 6
3,846,032 UART: [idev] SUBJECT.KEYID = 7
3,847,212 UART: [idev] UDS.KEYID = 0
3,848,139 ready_for_fw is high
3,848,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,701 UART: [idev] Erasing UDS.KEYID = 0
6,316,711 UART: [idev] Sha1 KeyId Algorithm
6,341,065 UART: [idev] --
6,345,083 UART: [ldev] ++
6,345,668 UART: [ldev] CDI.KEYID = 6
6,346,582 UART: [ldev] SUBJECT.KEYID = 5
6,347,741 UART: [ldev] AUTHORITY.KEYID = 7
6,348,976 UART: [ldev] FE.KEYID = 1
6,359,349 UART: [ldev] Erasing FE.KEYID = 1
8,827,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,871 UART: [ldev] --
10,616,862 UART: [fwproc] Wait for Commands...
10,620,040 UART: [fwproc] Recv command 0x46574c44
10,622,330 UART: [fwproc] Recv'd Img size: 114084 bytes
15,174,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,245,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,314,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,631,636 >>> mbox cmd response: success
15,636,233 UART: [afmc] ++
15,636,832 UART: [afmc] CDI.KEYID = 6
15,637,746 UART: [afmc] SUBJECT.KEYID = 7
15,638,910 UART: [afmc] AUTHORITY.KEYID = 5
18,136,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,857,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,859,372 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,875,364 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,891,309 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,907,106 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,929,997 UART: [afmc] --
19,934,680 UART: [cold-reset] --
19,937,675 UART: [state] Locking Datavault
19,944,130 UART: [state] Locking PCR0, PCR1 and PCR31
19,945,778 UART: [state] Locking ICCM
19,947,389 UART: [exit] Launching FMC @ 0x40000130
19,955,788 UART:
19,956,033 UART: Running Caliptra FMC ...
19,957,141 UART:
19,957,303 UART: [state] CFI Enabled
19,965,029 UART: [fht] FMC Alias Private Key: 7
21,721,628 UART: [art] Extend RT PCRs Done
21,722,856 UART: [art] Lock RT PCRs Done
21,724,489 UART: [art] Populate DV Done
21,729,901 UART: [fht] FMC Alias Private Key: 7
21,731,599 UART: [art] Derive CDI
21,732,363 UART: [art] Store in in slot 0x4
21,774,900 UART: [art] Derive Key Pair
21,775,936 UART: [art] Store priv key in slot 0x5
24,203,089 UART: [art] Derive Key Pair - Done
24,216,201 UART: [art] Signing Cert with AUTHO
24,217,513 UART: RITY.KEYID = 7
25,923,078 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,590 UART: [art] PUB.X = 7A37203E29677EE1F1D67424F4562FCE0C4A2903DD19D4D7D3A16A95660F11228E17AFC7E9169ECEE13277399842B70F
25,931,872 UART: [art] PUB.Y = 36A09C421A55AFD48FBD6AC16F2BD9F4FBB9D39277A4D2C08986A747F4D87D1C91F7FC6E99F1E47F147816EC58E1D12A
25,939,135 UART: [art] SIG.R = C62858F05B97E0BB261C58890D50F92264493E1A0116CC602575B8697D2AE8C25AAC76C3B7A4386E352C835962624D2C
25,946,503 UART: [art] SIG.S = 2E423E652F1589A39A7306E68173769AC24C6CB88867670099EDA6276C6BA27482E97ECDD97BDE526E440C57A84DAAAA
26,925,305 UART: Caliptra RT
26,926,016 UART: [state] CFI Enabled
27,042,333 UART: [rt] RT listening for mailbox commands...
31,064,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,220,403 UART: [rt]cmd =0x41544d4e, len=14344
36,078,433 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
3,694,556 ready_for_fw is high
3,695,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,225,012 >>> mbox cmd response: success
19,475,339 UART:
19,475,730 UART: Running Caliptra FMC ...
19,476,832 UART:
19,476,987 UART: [state] CFI Enabled
19,485,203 UART: [fht] FMC Alias Private Key: 7
21,242,473 UART: [art] Extend RT PCRs Done
21,243,708 UART: [art] Lock RT PCRs Done
21,245,202 UART: [art] Populate DV Done
21,250,505 UART: [fht] FMC Alias Private Key: 7
21,252,113 UART: [art] Derive CDI
21,252,885 UART: [art] Store in in slot 0x4
21,295,445 UART: [art] Derive Key Pair
21,296,506 UART: [art] Store priv key in slot 0x5
23,723,215 UART: [art] Derive Key Pair - Done
23,736,228 UART: [art] Signing Cert with AUTHO
23,737,563 UART: RITY.KEYID = 7
25,442,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,444,125 UART: [art] PUB.X = 50D4DFB53AA131B05EADB94E1BC8A7CF93FFD5E142CABD816A7BBE929E49C0DC9F682B0E76F91CB469F8FF5329380565
25,451,457 UART: [art] PUB.Y = 4B304D70126DA1579609C2B358A677AA3C795EB33327C9B91AA07A64DCFA9D30B384ED58D1171FF75E4DE258949D4C73
25,458,676 UART: [art] SIG.R = 53C91A8D9A768996C0B88CA4126B9CC79602CB2B772C03ABCC92C60B5F9CA105340EBFB22DFB30299574B85BF84F4210
25,466,107 UART: [art] SIG.S = D13BF62A109199C21FDCBFB996EF57EEE7B80F9D456EE7D6F5C6C15C87E3EFF0FF81595D8770873D960F23EC7A299E70
26,445,112 UART: Caliptra RT
26,445,830 UART: [state] CFI Enabled
26,563,455 UART: [rt] RT listening for mailbox commands...
30,588,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,744,322 UART: [rt]cmd =0x41544d4e, len=14344
35,602,592 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,345 UART:
192,701 UART: Running Caliptra ROM ...
193,852 UART:
193,998 UART: [state] CFI Enabled
263,948 UART: [state] LifecycleState = Unprovisioned
266,357 UART: [state] DebugLocked = No
269,169 UART: [state] WD Timer not started. Device not locked for debugging
274,144 UART: [kat] SHA2-256
463,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,739 UART: [kat] ++
475,185 UART: [kat] sha1
487,265 UART: [kat] SHA2-256
490,275 UART: [kat] SHA2-384
496,545 UART: [kat] SHA2-512-ACC
499,193 UART: [kat] ECC-384
2,945,904 UART: [kat] HMAC-384Kdf
2,971,707 UART: [kat] LMS
3,503,479 UART: [kat] --
3,509,329 UART: [cold-reset] ++
3,510,688 UART: [fht] FHT @ 0x50003400
3,522,542 UART: [idev] ++
3,523,256 UART: [idev] CDI.KEYID = 6
3,524,138 UART: [idev] SUBJECT.KEYID = 7
3,525,383 UART: [idev] UDS.KEYID = 0
3,526,455 ready_for_fw is high
3,526,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,226 UART: [idev] Erasing UDS.KEYID = 0
6,030,180 UART: [idev] Sha1 KeyId Algorithm
6,053,301 UART: [idev] --
6,058,516 UART: [ldev] ++
6,059,200 UART: [ldev] CDI.KEYID = 6
6,060,124 UART: [ldev] SUBJECT.KEYID = 5
6,061,285 UART: [ldev] AUTHORITY.KEYID = 7
6,062,515 UART: [ldev] FE.KEYID = 1
6,100,975 UART: [ldev] Erasing FE.KEYID = 1
8,606,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,135 UART: [ldev] --
10,413,235 UART: [fwproc] Wait for Commands...
10,415,864 UART: [fwproc] Recv command 0x46574c44
10,418,120 UART: [fwproc] Recv'd Img size: 114084 bytes
15,060,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,146,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,262,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,803,258 >>> mbox cmd response: success
15,806,601 UART: [afmc] ++
15,807,312 UART: [afmc] CDI.KEYID = 6
15,808,479 UART: [afmc] SUBJECT.KEYID = 7
15,809,974 UART: [afmc] AUTHORITY.KEYID = 5
18,340,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,062,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,064,303 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,079,366 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,094,561 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,109,428 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,134,122 UART: [afmc] --
20,136,923 UART: [cold-reset] --
20,140,956 UART: [state] Locking Datavault
20,144,866 UART: [state] Locking PCR0, PCR1 and PCR31
20,147,078 UART: [state] Locking ICCM
20,148,967 UART: [exit] Launching FMC @ 0x40000130
20,157,650 UART:
20,157,892 UART: Running Caliptra FMC ...
20,158,990 UART:
20,159,145 UART: [state] CFI Enabled
20,220,605 UART: [fht] FMC Alias Private Key: 7
21,984,925 UART: [art] Extend RT PCRs Done
21,986,142 UART: [art] Lock RT PCRs Done
21,987,585 UART: [art] Populate DV Done
21,992,999 UART: [fht] FMC Alias Private Key: 7
21,994,527 UART: [art] Derive CDI
21,995,259 UART: [art] Store in in slot 0x4
22,053,182 UART: [art] Derive Key Pair
22,054,224 UART: [art] Store priv key in slot 0x5
24,517,033 UART: [art] Derive Key Pair - Done
24,529,997 UART: [art] Signing Cert with AUTHO
24,531,322 UART: RITY.KEYID = 7
26,243,379 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,882 UART: [art] PUB.X = D3B5E899FC8B65D53CA18A0D5187B58FC6F497BE6D4CD69E47F87740660E015282E1A3FA08848E78FDE4D926DDDC2F92
26,252,212 UART: [art] PUB.Y = D121E40B00AED84ADC3EB9DFF70D467BB34C4DEF86170092300B83BD545CA87CA9FB17C7418713067FCA3C114E740AB7
26,259,417 UART: [art] SIG.R = 9454D4AA45706EB3379D6A946BB6E5C22E70D9D050341BAFD250F7DC8D88271C021D6181939E7497655E1366E499F806
26,266,790 UART: [art] SIG.S = 53A182ACE6E7B90A4A5E574C75586EA8C2A0151430719CE75648F10156262BD141818ED8E2AE0296E21B26204792C006
27,245,357 UART: Caliptra RT
27,246,053 UART: [state] CFI Enabled
27,410,834 UART: [rt] RT listening for mailbox commands...
31,431,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,586,495 UART: [rt]cmd =0x41544d4e, len=14344
36,436,516 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,437,685 ready_for_fw is high
3,438,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,847,100 >>> mbox cmd response: success
20,137,847 UART:
20,138,246 UART: Running Caliptra FMC ...
20,139,387 UART:
20,139,553 UART: [state] CFI Enabled
20,207,744 UART: [fht] FMC Alias Private Key: 7
21,971,954 UART: [art] Extend RT PCRs Done
21,973,184 UART: [art] Lock RT PCRs Done
21,974,773 UART: [art] Populate DV Done
21,980,028 UART: [fht] FMC Alias Private Key: 7
21,981,719 UART: [art] Derive CDI
21,982,461 UART: [art] Store in in slot 0x4
22,040,146 UART: [art] Derive Key Pair
22,041,147 UART: [art] Store priv key in slot 0x5
24,504,299 UART: [art] Derive Key Pair - Done
24,517,462 UART: [art] Signing Cert with AUTHO
24,518,763 UART: RITY.KEYID = 7
26,229,523 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,031 UART: [art] PUB.X = 339A538356EAF60229F14D7591590CBABFF55B1D083252648110402982EE1F6FD6440BC1D35B89982BB59CF52438C17F
26,238,252 UART: [art] PUB.Y = 507D18724DF1DACAD48D5540E0C0D72027385CD63AC6790F178D821D69DDA1BBC6C6D6E088FA019503C3F9904A89EF71
26,245,542 UART: [art] SIG.R = 731DA63EBAF22EC1C81FBF7404660A46488CB3598EBB2D2A124EF593461200D6034F06F461F18FCF078A84CCC44156EB
26,252,925 UART: [art] SIG.S = 9F031007F0948E6921A8701B26DCF6EF372EC1988D5021643E2261EAC4C128668484C896B5FB8F74BA7FD000B96776B2
27,231,792 UART: Caliptra RT
27,232,489 UART: [state] CFI Enabled
27,399,520 UART: [rt] RT listening for mailbox commands...
31,420,136 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,575,992 UART: [rt]cmd =0x41544d4e, len=14344
36,425,202 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,653 writing to cptra_bootfsm_go
192,741 UART:
193,116 UART: Running Caliptra ROM ...
194,251 UART:
603,818 UART: [state] CFI Enabled
616,009 UART: [state] LifecycleState = Unprovisioned
618,327 UART: [state] DebugLocked = No
619,648 UART: [state] WD Timer not started. Device not locked for debugging
624,189 UART: [kat] SHA2-256
814,105 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,919 UART: [kat] ++
825,374 UART: [kat] sha1
835,635 UART: [kat] SHA2-256
838,647 UART: [kat] SHA2-384
845,351 UART: [kat] SHA2-512-ACC
847,962 UART: [kat] ECC-384
3,290,293 UART: [kat] HMAC-384Kdf
3,302,879 UART: [kat] LMS
3,834,722 UART: [kat] --
3,839,356 UART: [cold-reset] ++
3,840,228 UART: [fht] FHT @ 0x50003400
3,852,350 UART: [idev] ++
3,852,992 UART: [idev] CDI.KEYID = 6
3,853,945 UART: [idev] SUBJECT.KEYID = 7
3,855,188 UART: [idev] UDS.KEYID = 0
3,856,092 ready_for_fw is high
3,856,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,619 UART: [idev] Erasing UDS.KEYID = 0
6,330,800 UART: [idev] Sha1 KeyId Algorithm
6,353,339 UART: [idev] --
6,357,896 UART: [ldev] ++
6,358,607 UART: [ldev] CDI.KEYID = 6
6,359,494 UART: [ldev] SUBJECT.KEYID = 5
6,360,651 UART: [ldev] AUTHORITY.KEYID = 7
6,361,886 UART: [ldev] FE.KEYID = 1
6,372,691 UART: [ldev] Erasing FE.KEYID = 1
8,851,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,126 UART: [ldev] --
10,641,932 UART: [fwproc] Wait for Commands...
10,644,946 UART: [fwproc] Recv command 0x46574c44
10,647,254 UART: [fwproc] Recv'd Img size: 114084 bytes
15,279,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,362,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,478,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,020,130 >>> mbox cmd response: success
16,024,007 UART: [afmc] ++
16,024,752 UART: [afmc] CDI.KEYID = 6
16,025,875 UART: [afmc] SUBJECT.KEYID = 7
16,027,378 UART: [afmc] AUTHORITY.KEYID = 5
18,531,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,254,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,256,372 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,271,422 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,286,615 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,301,489 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,325,398 UART: [afmc] --
20,328,139 UART: [cold-reset] --
20,332,711 UART: [state] Locking Datavault
20,337,054 UART: [state] Locking PCR0, PCR1 and PCR31
20,339,282 UART: [state] Locking ICCM
20,340,742 UART: [exit] Launching FMC @ 0x40000130
20,349,334 UART:
20,349,580 UART: Running Caliptra FMC ...
20,350,693 UART:
20,350,858 UART: [state] CFI Enabled
20,358,965 UART: [fht] FMC Alias Private Key: 7
22,116,194 UART: [art] Extend RT PCRs Done
22,117,399 UART: [art] Lock RT PCRs Done
22,119,291 UART: [art] Populate DV Done
22,124,865 UART: [fht] FMC Alias Private Key: 7
22,126,350 UART: [art] Derive CDI
22,127,112 UART: [art] Store in in slot 0x4
22,169,917 UART: [art] Derive Key Pair
22,170,922 UART: [art] Store priv key in slot 0x5
24,597,181 UART: [art] Derive Key Pair - Done
24,610,035 UART: [art] Signing Cert with AUTHO
24,611,356 UART: RITY.KEYID = 7
26,316,873 UART: [art] Erasing AUTHORITY.KEYID = 7
26,318,374 UART: [art] PUB.X = E4367B7B079826DFB17454157FAFA55E34F4ABDBA1B77CAA7CD009C3E63571D8CD3833754B2D8DD6EFF1FD931328B7CF
26,325,662 UART: [art] PUB.Y = 2D01622FBC0F6FC8863FB645CE07F131516AD28D4ABA05182401D1471C27196913164344B1EF257671C26B03285FA388
26,332,925 UART: [art] SIG.R = 9E9E4873BE277A5054446A68ED4E46125545C16914F9A5038354298B9B8ADB04954BA544AE20097722ACB4912EC72273
26,340,290 UART: [art] SIG.S = D99F64CCAC1975CE57D3FCD8FC3F1D1A660FC712DB95DC5D2FF0C2F559B508DFEB01BAB1F84053A1620D32107D5C2E3B
27,319,046 UART: Caliptra RT
27,319,760 UART: [state] CFI Enabled
27,435,956 UART: [rt] RT listening for mailbox commands...
31,458,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,614,281 UART: [rt]cmd =0x41544d4e, len=14344
36,474,214 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
3,751,772 ready_for_fw is high
3,752,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,054,977 >>> mbox cmd response: success
20,308,271 UART:
20,308,657 UART: Running Caliptra FMC ...
20,309,856 UART:
20,310,035 UART: [state] CFI Enabled
20,317,660 UART: [fht] FMC Alias Private Key: 7
22,074,250 UART: [art] Extend RT PCRs Done
22,075,459 UART: [art] Lock RT PCRs Done
22,077,251 UART: [art] Populate DV Done
22,082,615 UART: [fht] FMC Alias Private Key: 7
22,084,272 UART: [art] Derive CDI
22,085,097 UART: [art] Store in in slot 0x4
22,127,222 UART: [art] Derive Key Pair
22,128,267 UART: [art] Store priv key in slot 0x5
24,555,045 UART: [art] Derive Key Pair - Done
24,567,949 UART: [art] Signing Cert with AUTHO
24,569,277 UART: RITY.KEYID = 7
26,275,112 UART: [art] Erasing AUTHORITY.KEYID = 7
26,276,611 UART: [art] PUB.X = C1E70B0D8795D0FF3C86A639EE8591DDCF3ADB462B669C20B3C1C40C2456336847C5B2E77734BBE615E05363984B2848
26,283,904 UART: [art] PUB.Y = 9B7FD11EBE98DA6C427ADC44A27A23598C922D5E34BD826C4D2116A85526FAAD5524E9AE0BDB21CCA31ABE13D05FCFF2
26,291,188 UART: [art] SIG.R = F2961DE3E48C0EA6BBB5EBDE50C560A1222BBBC95217C258A88501CDAD0B842C97099F13EE6B84A4C8BDA2A04D6BDDBC
26,298,636 UART: [art] SIG.S = DE3CB489A84C29D2FD5709CAB8C2904E5C7AD7CE326AC9EACDDD6919B010E5C6D1E26E9B5C927D6CFDFAFD1B3971592A
27,277,613 UART: Caliptra RT
27,278,337 UART: [state] CFI Enabled
27,394,443 UART: [rt] RT listening for mailbox commands...
31,422,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,578,036 UART: [rt]cmd =0x41544d4e, len=14344
36,444,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,571 UART: [kat] SHA2-256
892,509 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,292 UART: [kat] LMS
1,475,488 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,840 UART: [idev] ++
1,480,008 UART: [idev] CDI.KEYID = 6
1,480,368 UART: [idev] SUBJECT.KEYID = 7
1,480,792 UART: [idev] UDS.KEYID = 0
1,481,137 ready_for_fw is high
1,481,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,736 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,784 UART: [idev] --
1,514,923 UART: [ldev] ++
1,515,091 UART: [ldev] CDI.KEYID = 6
1,515,454 UART: [ldev] SUBJECT.KEYID = 5
1,515,880 UART: [ldev] AUTHORITY.KEYID = 7
1,516,343 UART: [ldev] FE.KEYID = 1
1,521,561 UART: [ldev] Erasing FE.KEYID = 1
1,546,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,398 UART: [ldev] --
1,585,719 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 114084 bytes
5,193,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,222,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,251,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,387,249 >>> mbox cmd response: success
5,388,339 UART: [afmc] ++
5,388,507 UART: [afmc] CDI.KEYID = 6
5,388,869 UART: [afmc] SUBJECT.KEYID = 7
5,389,294 UART: [afmc] AUTHORITY.KEYID = 5
5,424,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,440,238 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,441,018 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,446,727 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,452,619 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,458,320 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,465,952 UART: [afmc] --
5,466,964 UART: [cold-reset] --
5,467,644 UART: [state] Locking Datavault
5,468,741 UART: [state] Locking PCR0, PCR1 and PCR31
5,469,345 UART: [state] Locking ICCM
5,469,975 UART: [exit] Launching FMC @ 0x40000130
5,475,304 UART:
5,475,320 UART: Running Caliptra FMC ...
5,475,728 UART:
5,475,782 UART: [state] CFI Enabled
5,485,820 UART: [fht] FMC Alias Private Key: 7
5,593,580 UART: [art] Extend RT PCRs Done
5,594,008 UART: [art] Lock RT PCRs Done
5,595,576 UART: [art] Populate DV Done
5,603,804 UART: [fht] FMC Alias Private Key: 7
5,604,852 UART: [art] Derive CDI
5,605,132 UART: [art] Store in in slot 0x4
5,690,621 UART: [art] Derive Key Pair
5,690,981 UART: [art] Store priv key in slot 0x5
5,704,891 UART: [art] Derive Key Pair - Done
5,719,717 UART: [art] Signing Cert with AUTHO
5,720,197 UART: RITY.KEYID = 7
5,735,615 UART: [art] Erasing AUTHORITY.KEYID = 7
5,736,380 UART: [art] PUB.X = 2500CF9245D79B1FFEAA04980CA3DD9E668382969355AC6A69C67819D4818F6B4700B18101B5AAAE4D77F6F420A09EF9
5,743,101 UART: [art] PUB.Y = AC305F0D247758DECBBDD8E635386FD1F9EFF4BF35DF8F5A1C2FD41159B2DDB9AEF0160A08FE96444733152E1F823594
5,750,058 UART: [art] SIG.R = DD539A94A56F5B2BC09577D95465655C8E9AD2E888E4549A1FDA9F62AC815BCE17B2EEA1334D97E7B5228A13A457C213
5,756,836 UART: [art] SIG.S = 053717E036DC3E889BE582148B31E40FB67BEA659E0ACDF94D6818AAF6A6AE8F5DB88B8280403F5A8C70C2CE79328487
5,780,834 UART: Caliptra RT
5,781,087 UART: [state] CFI Enabled
5,888,686 UART: [rt] RT listening for mailbox commands...
5,889,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,530 UART: [rt]cmd =0x41544d4e, len=14344
7,416,054 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,725 ready_for_fw is high
1,362,725 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,274,259 >>> mbox cmd response: success
5,335,588 UART:
5,335,604 UART: Running Caliptra FMC ...
5,336,012 UART:
5,336,066 UART: [state] CFI Enabled
5,346,448 UART: [fht] FMC Alias Private Key: 7
5,454,340 UART: [art] Extend RT PCRs Done
5,454,768 UART: [art] Lock RT PCRs Done
5,456,396 UART: [art] Populate DV Done
5,464,512 UART: [fht] FMC Alias Private Key: 7
5,465,492 UART: [art] Derive CDI
5,465,772 UART: [art] Store in in slot 0x4
5,551,331 UART: [art] Derive Key Pair
5,551,691 UART: [art] Store priv key in slot 0x5
5,564,841 UART: [art] Derive Key Pair - Done
5,579,568 UART: [art] Signing Cert with AUTHO
5,580,048 UART: RITY.KEYID = 7
5,595,314 UART: [art] Erasing AUTHORITY.KEYID = 7
5,596,079 UART: [art] PUB.X = B96EC211BAD3AAD7A1D395B15AFAF0C302D7B9CA1F2F44EC0938AB96C2557243750A7DC143361B01E9A35D33FB49949D
5,602,851 UART: [art] PUB.Y = F6DA8874B5E2D5F541E870A37E5940BD82D86654CAE9C89923B4B7F4A39729101B3F8BC23EEBB7D4DF4E34759EF5A4AC
5,609,815 UART: [art] SIG.R = 6F53B0E11BF532DC08AAF4F56455C77B705565A5C544AC7C03967DBA12A94E51B6492C8EFC7EBE6C519DB1E67448A005
5,616,586 UART: [art] SIG.S = E7D6FB590C8073073767736819D94DBA04CA47311C445290F8CFED2421551546790D77CC1CD3BC683A9B14A498F35633
5,640,467 UART: Caliptra RT
5,640,720 UART: [state] CFI Enabled
5,748,715 UART: [rt] RT listening for mailbox commands...
5,749,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,872,573 UART: [rt]cmd =0x41544d4e, len=14344
7,263,730 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
902,803 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,378 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 ready_for_fw is high
1,480,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,685 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,461 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,080 UART: [ldev] Erasing FE.KEYID = 1
1,548,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,989 UART: [ldev] --
1,587,400 UART: [fwproc] Waiting for Commands...
1,588,157 UART: [fwproc] Received command 0x46574c44
1,588,948 UART: [fwproc] Received Image of size 114084 bytes
5,081,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,109,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,273,821 >>> mbox cmd response: success
5,274,873 UART: [afmc] ++
5,275,041 UART: [afmc] CDI.KEYID = 6
5,275,403 UART: [afmc] SUBJECT.KEYID = 7
5,275,828 UART: [afmc] AUTHORITY.KEYID = 5
5,310,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,326,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,327,584 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,333,293 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,339,185 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,344,886 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,352,730 UART: [afmc] --
5,353,764 UART: [cold-reset] --
5,354,562 UART: [state] Locking Datavault
5,355,629 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,233 UART: [state] Locking ICCM
5,356,729 UART: [exit] Launching FMC @ 0x40000130
5,362,058 UART:
5,362,074 UART: Running Caliptra FMC ...
5,362,482 UART:
5,362,625 UART: [state] CFI Enabled
5,373,147 UART: [fht] FMC Alias Private Key: 7
5,480,877 UART: [art] Extend RT PCRs Done
5,481,305 UART: [art] Lock RT PCRs Done
5,482,825 UART: [art] Populate DV Done
5,491,071 UART: [fht] FMC Alias Private Key: 7
5,492,173 UART: [art] Derive CDI
5,492,453 UART: [art] Store in in slot 0x4
5,578,138 UART: [art] Derive Key Pair
5,578,498 UART: [art] Store priv key in slot 0x5
5,591,702 UART: [art] Derive Key Pair - Done
5,606,218 UART: [art] Signing Cert with AUTHO
5,606,698 UART: RITY.KEYID = 7
5,622,072 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,837 UART: [art] PUB.X = CE77CD6AA1A8642254C6B2E887AD9BE5B1CE016B5B699C5143F0655079386ABE93BED0A2C66BD75FD2BB387A28B9C62D
5,629,620 UART: [art] PUB.Y = E29CBD224646BF94C8B27F1CF96F10D6A0F5D7AF8994F2FF66FACFDD146626AF32C3FA2A4DDFF0C79A0A40587C490026
5,636,565 UART: [art] SIG.R = 99592AE0B9E21F34AC0C4C17437E4A1724889A5CB73998C4D22DFB1820EFD243BDE9F5E51AFB318852F63B107A057E6B
5,643,337 UART: [art] SIG.S = 9F44A3DA733A973AEE1340163940CBA7F9F063DEFF43C6D147F4B0CA3EF6D53551AF492D023D70F865ADA2D6C123B472
5,667,341 UART: Caliptra RT
5,667,686 UART: [state] CFI Enabled
5,776,038 UART: [rt] RT listening for mailbox commands...
5,776,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,940 UART: [rt]cmd =0x41544d4e, len=14344
7,307,750 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 ready_for_fw is high
1,363,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,047,293 >>> mbox cmd response: success
5,109,124 UART:
5,109,140 UART: Running Caliptra FMC ...
5,109,548 UART:
5,109,691 UART: [state] CFI Enabled
5,120,233 UART: [fht] FMC Alias Private Key: 7
5,227,755 UART: [art] Extend RT PCRs Done
5,228,183 UART: [art] Lock RT PCRs Done
5,229,775 UART: [art] Populate DV Done
5,238,137 UART: [fht] FMC Alias Private Key: 7
5,239,111 UART: [art] Derive CDI
5,239,391 UART: [art] Store in in slot 0x4
5,325,006 UART: [art] Derive Key Pair
5,325,366 UART: [art] Store priv key in slot 0x5
5,338,384 UART: [art] Derive Key Pair - Done
5,352,968 UART: [art] Signing Cert with AUTHO
5,353,448 UART: RITY.KEYID = 7
5,368,942 UART: [art] Erasing AUTHORITY.KEYID = 7
5,369,707 UART: [art] PUB.X = 0098EB719F50A471637AC68395C7E89DA8FB8192D79EF94B0DA5D580866DE67C50DBCEAFC3739D13D36D4914993EE337
5,376,458 UART: [art] PUB.Y = 276171C34BD3190320BD4C91CBAEFC29274BEF883ADC1C711D45AC39DC89DA349BA93E061E9FC30768E9BF03505F192C
5,383,408 UART: [art] SIG.R = 98C494071C20ADCDA0F66F621F7B26CF702CCF92A1BB8FFD6BFE3F335944D8A6868BF07B5DC1E33A927C2B619633CDBC
5,390,195 UART: [art] SIG.S = 83B175FF234971DC207BE735A87B2C51B1931ABA75C3B9ACFDEF374D32160DA2607209EA7CB31542E0919BA5E17EA748
5,414,346 UART: Caliptra RT
5,414,691 UART: [state] CFI Enabled
5,523,293 UART: [rt] RT listening for mailbox commands...
5,523,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,823 UART: [rt]cmd =0x41544d4e, len=14344
7,037,740 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,601 UART: [kat] SHA2-256
903,541 UART: [kat] SHA2-384
906,190 UART: [kat] SHA2-512-ACC
908,091 UART: [kat] ECC-384
917,674 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,853 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,056 UART: [idev] ++
1,175,224 UART: [idev] CDI.KEYID = 6
1,175,584 UART: [idev] SUBJECT.KEYID = 7
1,176,008 UART: [idev] UDS.KEYID = 0
1,176,353 ready_for_fw is high
1,176,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,556 UART: [idev] Erasing UDS.KEYID = 0
1,200,609 UART: [idev] Sha1 KeyId Algorithm
1,209,053 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,764 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,690 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,008 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,314,739 >>> mbox cmd response: success
3,315,917 UART: [afmc] ++
3,316,085 UART: [afmc] CDI.KEYID = 6
3,316,447 UART: [afmc] SUBJECT.KEYID = 7
3,316,872 UART: [afmc] AUTHORITY.KEYID = 5
3,352,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,619 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,328 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,220 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,931 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,808 UART: [afmc] --
3,395,812 UART: [cold-reset] --
3,396,686 UART: [state] Locking Datavault
3,398,177 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,781 UART: [state] Locking ICCM
3,399,439 UART: [exit] Launching FMC @ 0x40000130
3,404,768 UART:
3,404,784 UART: Running Caliptra FMC ...
3,405,192 UART:
3,405,246 UART: [state] CFI Enabled
3,415,910 UART: [fht] FMC Alias Private Key: 7
3,523,660 UART: [art] Extend RT PCRs Done
3,524,088 UART: [art] Lock RT PCRs Done
3,525,512 UART: [art] Populate DV Done
3,533,888 UART: [fht] FMC Alias Private Key: 7
3,535,016 UART: [art] Derive CDI
3,535,296 UART: [art] Store in in slot 0x4
3,621,041 UART: [art] Derive Key Pair
3,621,401 UART: [art] Store priv key in slot 0x5
3,634,041 UART: [art] Derive Key Pair - Done
3,648,879 UART: [art] Signing Cert with AUTHO
3,649,359 UART: RITY.KEYID = 7
3,664,583 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,348 UART: [art] PUB.X = 584B1265E38517C8FD766068F10347D6C5281A8C86DE48C87098B25D7E4BEFD66E40FE71510503FE7201EC85CED49AD5
3,672,108 UART: [art] PUB.Y = B16E91AB902FA2BAB11C9AC0F787FBB5CC1E3BDCC8DC62858C54C54929878A156524976638027B70413632A0727F933D
3,679,057 UART: [art] SIG.R = 51D03BD16F7C3F7E4612191F78048B51AAFDB39B22EB6C83FAD64BC2AD3CD29C24052746D0AB3DF882CBFED152294CEA
3,685,841 UART: [art] SIG.S = 4729649D5246AE434F8775DD9F55B06DB56ECFB27B2F069375E76D4FAF0DBBDC2110D7565BDCF4CD6B69256159E04524
3,709,954 UART: Caliptra RT
3,710,207 UART: [state] CFI Enabled
3,818,156 UART: [rt] RT listening for mailbox commands...
3,818,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,634 UART: [rt]cmd =0x41544d4e, len=14344
5,340,292 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 ready_for_fw is high
1,060,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,178,376 >>> mbox cmd response: success
3,241,753 UART:
3,241,769 UART: Running Caliptra FMC ...
3,242,177 UART:
3,242,231 UART: [state] CFI Enabled
3,252,735 UART: [fht] FMC Alias Private Key: 7
3,361,277 UART: [art] Extend RT PCRs Done
3,361,705 UART: [art] Lock RT PCRs Done
3,363,637 UART: [art] Populate DV Done
3,371,879 UART: [fht] FMC Alias Private Key: 7
3,373,025 UART: [art] Derive CDI
3,373,305 UART: [art] Store in in slot 0x4
3,459,066 UART: [art] Derive Key Pair
3,459,426 UART: [art] Store priv key in slot 0x5
3,472,314 UART: [art] Derive Key Pair - Done
3,487,074 UART: [art] Signing Cert with AUTHO
3,487,554 UART: RITY.KEYID = 7
3,502,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,947 UART: [art] PUB.X = 59096416215EEED60931F7A03B29B52F8840019996C75147F1E5068346E02E784EEEF6C63914652CDE2D0C47016916B1
3,509,687 UART: [art] PUB.Y = 1E092B0DD7158765F5B584E71E8872B23B2B601CA650316611D052B27C39E75734E15149F72CD0FD4971B98AD0B4E53B
3,516,627 UART: [art] SIG.R = 479F3F7B7F9D78DFA084203F82B4135335B31E809DCE9F5127B820316F3A6ED26D9FC182ED61D2964BC4C1C4CB67E0AA
3,523,407 UART: [art] SIG.S = B4311D2824189B571F6C5F5CD5A73AD23C5A25444CC25BFA33861D1EB69EA4B5EC8B8D784228064C359C6315FEFBF253
3,547,491 UART: Caliptra RT
3,547,744 UART: [state] CFI Enabled
3,655,482 UART: [rt] RT listening for mailbox commands...
3,656,152 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,060 UART: [rt]cmd =0x41544d4e, len=14344
5,172,354 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,006 UART: [kat] SHA2-256
903,946 UART: [kat] SHA2-384
906,707 UART: [kat] SHA2-512-ACC
908,608 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
923,009 UART: [kat] LMS
1,171,337 UART: [kat] --
1,172,268 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 ready_for_fw is high
1,176,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,353 UART: [idev] Erasing UDS.KEYID = 0
1,201,172 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,462 UART: [ldev] ++
1,210,630 UART: [ldev] CDI.KEYID = 6
1,210,993 UART: [ldev] SUBJECT.KEYID = 5
1,211,419 UART: [ldev] AUTHORITY.KEYID = 7
1,211,882 UART: [ldev] FE.KEYID = 1
1,217,288 UART: [ldev] Erasing FE.KEYID = 1
1,243,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,302 UART: [ldev] --
1,282,693 UART: [fwproc] Wait for Commands...
1,283,373 UART: [fwproc] Recv command 0x46574c44
1,284,101 UART: [fwproc] Recv'd Img size: 114084 bytes
3,127,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,320,464 >>> mbox cmd response: success
3,321,534 UART: [afmc] ++
3,321,702 UART: [afmc] CDI.KEYID = 6
3,322,064 UART: [afmc] SUBJECT.KEYID = 7
3,322,489 UART: [afmc] AUTHORITY.KEYID = 5
3,357,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,190 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,899 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,791 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,502 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,231 UART: [afmc] --
3,401,193 UART: [cold-reset] --
3,402,191 UART: [state] Locking Datavault
3,403,218 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,822 UART: [state] Locking ICCM
3,404,252 UART: [exit] Launching FMC @ 0x40000130
3,409,581 UART:
3,409,597 UART: Running Caliptra FMC ...
3,410,005 UART:
3,410,148 UART: [state] CFI Enabled
3,420,986 UART: [fht] FMC Alias Private Key: 7
3,529,562 UART: [art] Extend RT PCRs Done
3,529,990 UART: [art] Lock RT PCRs Done
3,531,186 UART: [art] Populate DV Done
3,539,294 UART: [fht] FMC Alias Private Key: 7
3,540,406 UART: [art] Derive CDI
3,540,686 UART: [art] Store in in slot 0x4
3,626,487 UART: [art] Derive Key Pair
3,626,847 UART: [art] Store priv key in slot 0x5
3,640,141 UART: [art] Derive Key Pair - Done
3,654,856 UART: [art] Signing Cert with AUTHO
3,655,336 UART: RITY.KEYID = 7
3,671,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,861 UART: [art] PUB.X = A9E716BF5042F23C7329C0D96CBB1EF7CFE0DDDAE58ABFD6440298EDF3D4A3BBC8CF2039DDF0ED0A6CC1385C3D2325E0
3,678,655 UART: [art] PUB.Y = 26FE2AF88ACB091BFDDD37D8091DA90214E007DB40275A1D4418F09CCA41DC769627F69AB77E977E569EC20AAEBFD4DC
3,685,610 UART: [art] SIG.R = BFE8BEAB71F884A39C41BEDD99B23EED5C4D11549B109028BF6232E85045FA4A3251485FC74BB1312BFF1CAB93C8D904
3,692,393 UART: [art] SIG.S = 41639188E359033E303A32BB42B37DAA74E651AA327F52527FC17DD6921A02AC8F4CB65BC003042F23C62A2C4C0A5714
3,715,923 UART: Caliptra RT
3,716,268 UART: [state] CFI Enabled
3,824,122 UART: [rt] RT listening for mailbox commands...
3,824,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,984 UART: [rt]cmd =0x41544d4e, len=14344
5,361,520 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 ready_for_fw is high
1,060,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,162,411 >>> mbox cmd response: success
3,224,548 UART:
3,224,564 UART: Running Caliptra FMC ...
3,224,972 UART:
3,225,115 UART: [state] CFI Enabled
3,235,973 UART: [fht] FMC Alias Private Key: 7
3,344,045 UART: [art] Extend RT PCRs Done
3,344,473 UART: [art] Lock RT PCRs Done
3,346,157 UART: [art] Populate DV Done
3,353,953 UART: [fht] FMC Alias Private Key: 7
3,354,931 UART: [art] Derive CDI
3,355,211 UART: [art] Store in in slot 0x4
3,440,472 UART: [art] Derive Key Pair
3,440,832 UART: [art] Store priv key in slot 0x5
3,453,802 UART: [art] Derive Key Pair - Done
3,469,040 UART: [art] Signing Cert with AUTHO
3,469,520 UART: RITY.KEYID = 7
3,484,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,339 UART: [art] PUB.X = 2F6FA58238076F9553717CB06C25408C4E5935BF1576C2442A6F43655D791DFC6C5E959168EE9C0C23CB113E945024AA
3,492,099 UART: [art] PUB.Y = E3F939D5C110F80F829D3F47EFA01910FEDE464BF31B2F9DFF8B7B6441B73786F50DD2650FC5CA4A08AB0FC009F0A942
3,499,047 UART: [art] SIG.R = 7DE0F680B51CCB8CECCC5F50416831A7A03EB7057560987C88A0E216B10C11608157ADB3764F87BF457AE7B49055AE51
3,505,815 UART: [art] SIG.S = 2E33D39939927D7C37C27600CE3F77040A238B40DB03F013AC5CCB04E44ADAB18D47ED208563D27CEC05A74CF63955CF
3,529,785 UART: Caliptra RT
3,530,130 UART: [state] CFI Enabled
3,637,893 UART: [rt] RT listening for mailbox commands...
3,638,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,647 UART: [rt]cmd =0x41544d4e, len=14344
5,158,210 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,412 UART: [kat] SHA2-512-ACC
906,313 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,848 UART: [kat] LMS
1,169,160 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 ready_for_fw is high
1,174,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,465 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,215,910 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,846 UART: [ldev] --
1,281,190 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 114084 bytes
3,121,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,313,904 >>> mbox cmd response: success
3,315,085 UART: [afmc] ++
3,315,253 UART: [afmc] CDI.KEYID = 6
3,315,616 UART: [afmc] SUBJECT.KEYID = 7
3,316,042 UART: [afmc] AUTHORITY.KEYID = 5
3,350,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,585 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,295 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,185 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,896 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,906 UART: [afmc] --
3,394,968 UART: [cold-reset] --
3,395,892 UART: [state] Locking Datavault
3,397,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,665 UART: [state] Locking ICCM
3,398,277 UART: [exit] Launching FMC @ 0x40000130
3,403,606 UART:
3,403,622 UART: Running Caliptra FMC ...
3,404,030 UART:
3,404,084 UART: [state] CFI Enabled
3,414,326 UART: [fht] FMC Alias Private Key: 7
3,521,506 UART: [art] Extend RT PCRs Done
3,521,934 UART: [art] Lock RT PCRs Done
3,523,214 UART: [art] Populate DV Done
3,531,246 UART: [fht] FMC Alias Private Key: 7
3,532,394 UART: [art] Derive CDI
3,532,674 UART: [art] Store in in slot 0x4
3,617,881 UART: [art] Derive Key Pair
3,618,241 UART: [art] Store priv key in slot 0x5
3,631,469 UART: [art] Derive Key Pair - Done
3,646,325 UART: [art] Signing Cert with AUTHO
3,646,805 UART: RITY.KEYID = 7
3,661,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,550 UART: [art] PUB.X = 7E847018972394E166280E77F4D008F18AF412C1FCF8A0CC5CF787F5418FB60D91CB28C8A39883F1284978DD522891A5
3,669,307 UART: [art] PUB.Y = C483E2CD6EC7EADD82152E0F800A18E5E9F271EE503C2219704B7FE9A0403B9500C5B389B9272D9EC083F614CA150DFE
3,676,236 UART: [art] SIG.R = C1105B301C70D8A4C8912F054EBFD1231C298199A1990FB5A1BF896D66294413B84897F34D5508D366CA945E52336A69
3,682,989 UART: [art] SIG.S = 895495AF18433A12F7A1E46A589E65420AD14AC9F682D37A5F4A5FD76EEA022D0A01AF8E031392F9C50019C7C17565C8
3,706,129 UART: Caliptra RT
3,706,382 UART: [state] CFI Enabled
3,814,277 UART: [rt] RT listening for mailbox commands...
3,814,947 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,101 UART: [rt]cmd =0x41544d4e, len=14344
5,343,908 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,924 ready_for_fw is high
1,056,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,246 >>> mbox cmd response: success
3,227,805 UART:
3,227,821 UART: Running Caliptra FMC ...
3,228,229 UART:
3,228,283 UART: [state] CFI Enabled
3,238,673 UART: [fht] FMC Alias Private Key: 7
3,346,623 UART: [art] Extend RT PCRs Done
3,347,051 UART: [art] Lock RT PCRs Done
3,348,445 UART: [art] Populate DV Done
3,356,579 UART: [fht] FMC Alias Private Key: 7
3,357,701 UART: [art] Derive CDI
3,357,981 UART: [art] Store in in slot 0x4
3,443,610 UART: [art] Derive Key Pair
3,443,970 UART: [art] Store priv key in slot 0x5
3,457,644 UART: [art] Derive Key Pair - Done
3,472,638 UART: [art] Signing Cert with AUTHO
3,473,118 UART: RITY.KEYID = 7
3,488,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,927 UART: [art] PUB.X = E943A60AEB78CD4016172227226C4BEBC6305C3055350DF994D0541C611F0483E3F6C4902C90D0C03B619BF2A2ACB0D9
3,495,690 UART: [art] PUB.Y = E01D23C60A3F767D0924C98BFF700ADBE2039C5DB3056279AEF76066AD30822E81537C9BC6943C2FDBA81C878004C42C
3,502,628 UART: [art] SIG.R = 679182DEEA47F86329EEA6D589C3A98EFCC50C82214481B16101F986B799A6F08661537A07E2F5797C31D684C9FA414F
3,509,387 UART: [art] SIG.S = 4E372198F071313DC1AEC3B082AAD84E77E7E399A813527A334A51DFBA38D0ABB467C1502EE244058999AABE3BDAD972
3,533,125 UART: Caliptra RT
3,533,378 UART: [state] CFI Enabled
3,640,305 UART: [rt] RT listening for mailbox commands...
3,640,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,865 UART: [rt]cmd =0x41544d4e, len=14344
5,167,079 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,365 UART: [kat] SHA2-256
891,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,044 UART: [kat] ++
896,196 UART: [kat] sha1
900,276 UART: [kat] SHA2-256
902,216 UART: [kat] SHA2-384
905,065 UART: [kat] SHA2-512-ACC
906,966 UART: [kat] ECC-384
916,901 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
1,169,863 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,594 UART: [idev] ++
1,173,762 UART: [idev] CDI.KEYID = 6
1,174,123 UART: [idev] SUBJECT.KEYID = 7
1,174,548 UART: [idev] UDS.KEYID = 0
1,174,894 ready_for_fw is high
1,174,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,612 UART: [idev] Erasing UDS.KEYID = 0
1,199,874 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,995 UART: [ldev] --
1,282,287 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,794 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,315,575 >>> mbox cmd response: success
3,316,758 UART: [afmc] ++
3,316,926 UART: [afmc] CDI.KEYID = 6
3,317,289 UART: [afmc] SUBJECT.KEYID = 7
3,317,715 UART: [afmc] AUTHORITY.KEYID = 5
3,353,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,256 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,966 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,856 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,567 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,255 UART: [afmc] --
3,397,203 UART: [cold-reset] --
3,398,211 UART: [state] Locking Datavault
3,399,140 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,744 UART: [state] Locking ICCM
3,400,398 UART: [exit] Launching FMC @ 0x40000130
3,405,727 UART:
3,405,743 UART: Running Caliptra FMC ...
3,406,151 UART:
3,406,294 UART: [state] CFI Enabled
3,416,872 UART: [fht] FMC Alias Private Key: 7
3,525,006 UART: [art] Extend RT PCRs Done
3,525,434 UART: [art] Lock RT PCRs Done
3,526,832 UART: [art] Populate DV Done
3,534,994 UART: [fht] FMC Alias Private Key: 7
3,535,922 UART: [art] Derive CDI
3,536,202 UART: [art] Store in in slot 0x4
3,621,711 UART: [art] Derive Key Pair
3,622,071 UART: [art] Store priv key in slot 0x5
3,635,297 UART: [art] Derive Key Pair - Done
3,649,753 UART: [art] Signing Cert with AUTHO
3,650,233 UART: RITY.KEYID = 7
3,665,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,976 UART: [art] PUB.X = EFB9D0CF37869636F6FD1501813071F1EB726EA48AD2A757E104F42C521EA01DA76238BB4915D57DC9972A4BCE1AA337
3,672,748 UART: [art] PUB.Y = 4EB8E3EE496D843372373AD707FB7F28B9EC4F938F6A78A79B6670F8CA451202095BD8F5EEF013728FB6EC034E13FF22
3,679,694 UART: [art] SIG.R = B627F4494E5FDCBA41D4AA05C7515030EA681578540D2CF3F86DF43BB9BE86B596F2A497475FC024DB41F5653EC83D18
3,686,466 UART: [art] SIG.S = BB651438AF1F679732A79A57DCB5E34CC3AA8E66FC1171BC0BA57F705D7AF1CAA254CFD2256617DA7F03B31E8B727EB5
3,709,945 UART: Caliptra RT
3,710,290 UART: [state] CFI Enabled
3,818,839 UART: [rt] RT listening for mailbox commands...
3,819,509 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,629 UART: [rt]cmd =0x41544d4e, len=14344
5,345,893 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,855 ready_for_fw is high
1,056,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,543 >>> mbox cmd response: success
3,222,762 UART:
3,222,778 UART: Running Caliptra FMC ...
3,223,186 UART:
3,223,329 UART: [state] CFI Enabled
3,234,073 UART: [fht] FMC Alias Private Key: 7
3,342,207 UART: [art] Extend RT PCRs Done
3,342,635 UART: [art] Lock RT PCRs Done
3,344,095 UART: [art] Populate DV Done
3,351,963 UART: [fht] FMC Alias Private Key: 7
3,352,951 UART: [art] Derive CDI
3,353,231 UART: [art] Store in in slot 0x4
3,438,846 UART: [art] Derive Key Pair
3,439,206 UART: [art] Store priv key in slot 0x5
3,452,416 UART: [art] Derive Key Pair - Done
3,467,562 UART: [art] Signing Cert with AUTHO
3,468,042 UART: RITY.KEYID = 7
3,483,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,175 UART: [art] PUB.X = 0AD565CCC4B0493D2A0DDB95F8F1261A830AAD0C056653E80DED7252D2F6293663FE64403DE624496E5F53C930CA85AB
3,490,935 UART: [art] PUB.Y = 7E07951FE60BC650F25E0F500553D58A3A6AD5F9980078FDF16672222D996CB5DAA8510DFF6A182C3A728B8017C02D1E
3,497,852 UART: [art] SIG.R = C720D35BEF038B769EA547185048F2600A0E125320F14EA9CFFB43D13D14294F835A572DD7C8F5D3A6AC6E4B20F68E35
3,504,619 UART: [art] SIG.S = 13D3B2525F0E3307B53680632235390F1960FC67974A54A72302F782EC24530CCEBE38BF690EF1DB50F76D387785CF11
3,528,254 UART: Caliptra RT
3,528,599 UART: [state] CFI Enabled
3,635,965 UART: [rt] RT listening for mailbox commands...
3,636,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,761 UART: [rt]cmd =0x41544d4e, len=14344
5,163,089 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,039 UART:
192,407 UART: Running Caliptra ROM ...
193,540 UART:
193,713 UART: [state] CFI Enabled
265,998 UART: [state] LifecycleState = Unprovisioned
267,950 UART: [state] DebugLocked = No
269,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,998 UART: [kat] SHA2-256
443,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,203 UART: [kat] ++
454,681 UART: [kat] sha1
466,980 UART: [kat] SHA2-256
469,634 UART: [kat] SHA2-384
474,489 UART: [kat] SHA2-512-ACC
476,865 UART: [kat] ECC-384
2,769,050 UART: [kat] HMAC-384Kdf
2,800,113 UART: [kat] LMS
3,990,408 UART: [kat] --
3,994,239 UART: [cold-reset] ++
3,996,621 UART: [fht] Storing FHT @ 0x50003400
4,009,453 UART: [idev] ++
4,010,022 UART: [idev] CDI.KEYID = 6
4,010,921 UART: [idev] SUBJECT.KEYID = 7
4,012,238 UART: [idev] UDS.KEYID = 0
4,013,239 ready_for_fw is high
4,013,440 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,601 UART: [idev] Erasing UDS.KEYID = 0
7,349,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,085 UART: [idev] --
7,375,021 UART: [ldev] ++
7,375,593 UART: [ldev] CDI.KEYID = 6
7,376,529 UART: [ldev] SUBJECT.KEYID = 5
7,377,790 UART: [ldev] AUTHORITY.KEYID = 7
7,378,945 UART: [ldev] FE.KEYID = 1
7,424,079 UART: [ldev] Erasing FE.KEYID = 1
10,759,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,268 UART: [ldev] --
13,141,311 UART: [fwproc] Waiting for Commands...
13,144,485 UART: [fwproc] Received command 0x46574c44
13,146,668 UART: [fwproc] Received Image of size 113760 bytes
21,781,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,858,367 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,927,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,243,346 >>> mbox cmd response: success
22,248,335 UART: [afmc] ++
22,248,933 UART: [afmc] CDI.KEYID = 6
22,249,850 UART: [afmc] SUBJECT.KEYID = 7
22,251,085 UART: [afmc] AUTHORITY.KEYID = 5
25,616,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,913,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,916,155 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,930,684 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,945,461 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,959,669 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,981,948 UART: [afmc] --
27,986,511 UART: [cold-reset] --
27,990,545 UART: [state] Locking Datavault
27,995,364 UART: [state] Locking PCR0, PCR1 and PCR31
27,997,117 UART: [state] Locking ICCM
27,998,783 UART: [exit] Launching FMC @ 0x40000130
28,007,179 UART:
28,007,419 UART: Running Caliptra FMC ...
28,008,529 UART:
28,008,720 UART: [state] CFI Enabled
28,073,423 UART: [fht] FMC Alias Private Key: 7
30,411,184 UART: [art] Extend RT PCRs Done
30,412,407 UART: [art] Lock RT PCRs Done
30,413,845 UART: [art] Populate DV Done
30,419,632 UART: [fht] FMC Alias Private Key: 7
30,421,288 UART: [art] Derive CDI
30,422,028 UART: [art] Store in in slot 0x4
30,481,396 UART: [art] Derive Key Pair
30,482,436 UART: [art] Store priv key in slot 0x5
33,774,678 UART: [art] Derive Key Pair - Done
33,788,050 UART: [art] Signing Cert with AUTHO
33,789,353 UART: RITY.KEYID = 7
36,076,377 UART: [art] Erasing AUTHORITY.KEYID = 7
36,077,897 UART: [art] PUB.X = 3A7804C11C65444B6A92E298F52F25AB1640EF17331C0A5F25B8DC9C3C7486715445B90A1FD2F3E35849836EE56D65C1
36,085,101 UART: [art] PUB.Y = 74BC3CDA2A48F017201099D8ADDCCBED9A6C94557037B363EA9757D07EFF2585EFF04C69118A15D5178F415E456F7BD6
36,092,350 UART: [art] SIG.R = BF3B4C2F36CDCA51A0DD5AD0F92074C816E23A9C03DD589BED94DC118E1CEF46BFADD0498C16E59BEE4409B33BE211CD
36,099,746 UART: [art] SIG.S = 2BD9478A0C2F847EABE6FBD9FA27D4F7543368723682D9581BCBA3B69CB4E933309B384718F1DDF340171B830B14B538
37,404,952 UART: Caliptra RT
37,405,673 UART: [state] CFI Enabled
37,566,355 UART: [rt] RT listening for mailbox commands...
37,568,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,724,486 UART: [rt]cmd =0x41544d4e, len=14344
44,176,151 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,782,515 ready_for_fw is high
3,782,941 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,160,570 >>> mbox cmd response: success
27,862,078 UART:
27,862,466 UART: Running Caliptra FMC ...
27,863,660 UART:
27,863,848 UART: [state] CFI Enabled
27,930,451 UART: [fht] FMC Alias Private Key: 7
30,268,403 UART: [art] Extend RT PCRs Done
30,269,672 UART: [art] Lock RT PCRs Done
30,271,552 UART: [art] Populate DV Done
30,277,185 UART: [fht] FMC Alias Private Key: 7
30,278,783 UART: [art] Derive CDI
30,279,598 UART: [art] Store in in slot 0x4
30,339,134 UART: [art] Derive Key Pair
30,340,174 UART: [art] Store priv key in slot 0x5
33,632,972 UART: [art] Derive Key Pair - Done
33,646,174 UART: [art] Signing Cert with AUTHO
33,647,477 UART: RITY.KEYID = 7
35,934,106 UART: [art] Erasing AUTHORITY.KEYID = 7
35,935,608 UART: [art] PUB.X = 95B5FA8A214524665533589EA3AF539EFB7E6855AF296A2F868ECB679B7F5355AF51FC084657F1A9A10F233D5B3F966E
35,942,873 UART: [art] PUB.Y = 37CAD87B19EB40A2E0EFA67071DF9B8C60F1468725A9A5507028C673A6DC57C7D3D9108965B13651B70083AA706657A0
35,950,072 UART: [art] SIG.R = 5CD6771465A8908632CD7E4A305C58CE49146BA39BFF1755FD6A46182101720A1D12A92B8DA184DD649F3545B99624D5
35,957,427 UART: [art] SIG.S = 71EB22E1E863730C374D0BB0115D43CADE1409EFC7DADC0DC8792CC963DDDB149E9495752D8D9AFDAE5A3AD4C1B1A12B
37,262,938 UART: Caliptra RT
37,263,654 UART: [state] CFI Enabled
37,422,939 UART: [rt] RT listening for mailbox commands...
37,425,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,580,527 UART: [rt]cmd =0x41544d4e, len=14344
43,850,776 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,662 writing to cptra_bootfsm_go
192,907 UART:
193,282 UART: Running Caliptra ROM ...
194,393 UART:
604,102 UART: [state] CFI Enabled
618,210 UART: [state] LifecycleState = Unprovisioned
620,097 UART: [state] DebugLocked = No
621,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,047 UART: [kat] SHA2-256
795,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,383 UART: [kat] ++
806,831 UART: [kat] sha1
819,363 UART: [kat] SHA2-256
822,053 UART: [kat] SHA2-384
828,837 UART: [kat] SHA2-512-ACC
831,195 UART: [kat] ECC-384
3,114,969 UART: [kat] HMAC-384Kdf
3,126,427 UART: [kat] LMS
4,316,529 UART: [kat] --
4,323,717 UART: [cold-reset] ++
4,325,076 UART: [fht] Storing FHT @ 0x50003400
4,336,096 UART: [idev] ++
4,336,705 UART: [idev] CDI.KEYID = 6
4,337,616 UART: [idev] SUBJECT.KEYID = 7
4,338,860 UART: [idev] UDS.KEYID = 0
4,339,979 ready_for_fw is high
4,340,200 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,963 UART: [idev] Erasing UDS.KEYID = 0
7,620,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,701 UART: [idev] --
7,646,966 UART: [ldev] ++
7,647,529 UART: [ldev] CDI.KEYID = 6
7,648,489 UART: [ldev] SUBJECT.KEYID = 5
7,649,699 UART: [ldev] AUTHORITY.KEYID = 7
7,650,983 UART: [ldev] FE.KEYID = 1
7,660,378 UART: [ldev] Erasing FE.KEYID = 1
10,951,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,137 UART: [ldev] --
13,311,246 UART: [fwproc] Waiting for Commands...
13,313,816 UART: [fwproc] Received command 0x46574c44
13,316,044 UART: [fwproc] Received Image of size 113760 bytes
22,103,953 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,189,315 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,258,169 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,573,888 >>> mbox cmd response: success
22,578,703 UART: [afmc] ++
22,579,291 UART: [afmc] CDI.KEYID = 6
22,580,311 UART: [afmc] SUBJECT.KEYID = 7
22,581,470 UART: [afmc] AUTHORITY.KEYID = 5
25,895,067 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,187,584 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,189,838 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,204,426 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,219,172 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,233,400 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,254,329 UART: [afmc] --
28,258,346 UART: [cold-reset] --
28,261,730 UART: [state] Locking Datavault
28,268,057 UART: [state] Locking PCR0, PCR1 and PCR31
28,269,816 UART: [state] Locking ICCM
28,271,527 UART: [exit] Launching FMC @ 0x40000130
28,279,918 UART:
28,280,159 UART: Running Caliptra FMC ...
28,281,253 UART:
28,281,406 UART: [state] CFI Enabled
28,289,551 UART: [fht] FMC Alias Private Key: 7
30,620,501 UART: [art] Extend RT PCRs Done
30,621,720 UART: [art] Lock RT PCRs Done
30,623,662 UART: [art] Populate DV Done
30,628,967 UART: [fht] FMC Alias Private Key: 7
30,630,558 UART: [art] Derive CDI
30,631,367 UART: [art] Store in in slot 0x4
30,673,903 UART: [art] Derive Key Pair
30,674,947 UART: [art] Store priv key in slot 0x5
33,916,461 UART: [art] Derive Key Pair - Done
33,929,399 UART: [art] Signing Cert with AUTHO
33,930,692 UART: RITY.KEYID = 7
36,210,131 UART: [art] Erasing AUTHORITY.KEYID = 7
36,211,638 UART: [art] PUB.X = 34FB73ED255B47B40EE65EA0AF32AD2CAD4DE71AC4EBA9D5B6A3401AAC51F58EC5467614D8C0642442BB14C683B5CB22
36,218,904 UART: [art] PUB.Y = 4DF3786B6CCBBD63A801826AC2DB6C3745EDF03A976365D91DB5D76776830A370991911F83A088A191D6CB616AC18A9E
36,226,164 UART: [art] SIG.R = A4D7476F94FB36347F8805CFF276CB37B38C7D9D948293E3B7D5D0A5DABE68C2D838880A6C9A1B2DB46F4C00DCB72081
36,233,546 UART: [art] SIG.S = CFA9452360D7B63097E270D48AA4FF460AB1DC695458C7D9BEC922AEE853786D1EF25485E41E4015CE5B5C93F7F634C1
37,538,795 UART: Caliptra RT
37,539,511 UART: [state] CFI Enabled
37,656,887 UART: [rt] RT listening for mailbox commands...
37,659,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,814,384 UART: [rt]cmd =0x41544d4e, len=14344
44,085,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
4,124,382 ready_for_fw is high
4,124,777 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,014,846 >>> mbox cmd response: success
27,661,223 UART:
27,661,656 UART: Running Caliptra FMC ...
27,662,765 UART:
27,662,925 UART: [state] CFI Enabled
27,671,080 UART: [fht] FMC Alias Private Key: 7
30,001,103 UART: [art] Extend RT PCRs Done
30,002,343 UART: [art] Lock RT PCRs Done
30,004,091 UART: [art] Populate DV Done
30,009,525 UART: [fht] FMC Alias Private Key: 7
30,011,185 UART: [art] Derive CDI
30,011,998 UART: [art] Store in in slot 0x4
30,055,037 UART: [art] Derive Key Pair
30,056,079 UART: [art] Store priv key in slot 0x5
33,297,747 UART: [art] Derive Key Pair - Done
33,310,432 UART: [art] Signing Cert with AUTHO
33,311,746 UART: RITY.KEYID = 7
35,590,915 UART: [art] Erasing AUTHORITY.KEYID = 7
35,592,417 UART: [art] PUB.X = 98F401EC03A0DE476A48AF6DE581FFF3DC3A58D841D3FB1FBB4A6C1517CCF6AE5281DD6D91ADC56B25F744A379C36279
35,599,706 UART: [art] PUB.Y = BA59849DD7F0D460B8BF714801A360C66CEC7BE80563E7D7A2114125B18F7B9644163D2AA79AC571BC62DBD45909F1BB
35,606,953 UART: [art] SIG.R = F41E1BB80C44195E78D15C4660DEA8C5198FB4E9691A05420BC6F14ABD0254C51021C17A68FE3F680F56AF7398A61E64
35,614,347 UART: [art] SIG.S = AB7327A8275A048A9C3018F18A387BC5B73F16BF176981416F5F29A2A2C1880F8508C304616735AC7DFBDD166BD84B4B
36,919,335 UART: Caliptra RT
36,920,052 UART: [state] CFI Enabled
37,037,554 UART: [rt] RT listening for mailbox commands...
37,039,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,194,982 UART: [rt]cmd =0x41544d4e, len=14344
43,387,524 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,813 writing to cptra_bootfsm_go
192,932 UART:
193,316 UART: Running Caliptra ROM ...
194,430 UART:
194,570 UART: [state] CFI Enabled
264,690 UART: [state] LifecycleState = Unprovisioned
266,566 UART: [state] DebugLocked = No
268,516 UART: [state] WD Timer not started. Device not locked for debugging
272,184 UART: [kat] SHA2-256
451,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,908 UART: [kat] ++
463,354 UART: [kat] sha1
475,494 UART: [kat] SHA2-256
478,567 UART: [kat] SHA2-384
483,774 UART: [kat] SHA2-512-ACC
486,774 UART: [kat] ECC-384
2,947,732 UART: [kat] HMAC-384Kdf
2,973,248 UART: [kat] LMS
3,502,712 UART: [kat] --
3,506,660 UART: [cold-reset] ++
3,508,019 UART: [fht] FHT @ 0x50003400
3,519,422 UART: [idev] ++
3,520,004 UART: [idev] CDI.KEYID = 6
3,521,039 UART: [idev] SUBJECT.KEYID = 7
3,522,140 UART: [idev] UDS.KEYID = 0
3,523,064 ready_for_fw is high
3,523,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,770 UART: [idev] Erasing UDS.KEYID = 0
6,025,893 UART: [idev] Sha1 KeyId Algorithm
6,049,340 UART: [idev] --
6,053,496 UART: [ldev] ++
6,054,063 UART: [ldev] CDI.KEYID = 6
6,054,947 UART: [ldev] SUBJECT.KEYID = 5
6,056,075 UART: [ldev] AUTHORITY.KEYID = 7
6,057,419 UART: [ldev] FE.KEYID = 1
6,101,304 UART: [ldev] Erasing FE.KEYID = 1
8,602,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,976 UART: [ldev] --
10,413,315 UART: [fwproc] Wait for Commands...
10,416,383 UART: [fwproc] Recv command 0x46574c44
10,418,467 UART: [fwproc] Recv'd Img size: 114084 bytes
14,984,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,058,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,127,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,445,249 >>> mbox cmd response: success
15,449,399 UART: [afmc] ++
15,449,989 UART: [afmc] CDI.KEYID = 6
15,450,898 UART: [afmc] SUBJECT.KEYID = 7
15,452,052 UART: [afmc] AUTHORITY.KEYID = 5
17,980,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,645 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,603 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,737,598 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,753,367 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,085 UART: [afmc] --
19,779,785 UART: [cold-reset] --
19,783,526 UART: [state] Locking Datavault
19,787,888 UART: [state] Locking PCR0, PCR1 and PCR31
19,789,536 UART: [state] Locking ICCM
19,791,527 UART: [exit] Launching FMC @ 0x40000130
19,799,971 UART:
19,800,201 UART: Running Caliptra FMC ...
19,801,295 UART:
19,801,450 UART: [state] CFI Enabled
19,860,070 UART: [fht] FMC Alias Private Key: 7
21,624,057 UART: [art] Extend RT PCRs Done
21,625,271 UART: [art] Lock RT PCRs Done
21,626,787 UART: [art] Populate DV Done
21,632,141 UART: [fht] FMC Alias Private Key: 7
21,633,689 UART: [art] Derive CDI
21,634,449 UART: [art] Store in in slot 0x4
21,693,161 UART: [art] Derive Key Pair
21,694,151 UART: [art] Store priv key in slot 0x5
24,157,216 UART: [art] Derive Key Pair - Done
24,170,325 UART: [art] Signing Cert with AUTHO
24,171,634 UART: RITY.KEYID = 7
25,883,427 UART: [art] Erasing AUTHORITY.KEYID = 7
25,884,932 UART: [art] PUB.X = AC27D6CBDD95DCB5ADB3843B1F546185B0AE1EA4031E20EF4768A11EFFF21C6665D952EC143FB6FC766C78CE59157595
25,892,209 UART: [art] PUB.Y = 9CCE545ABB11516EFDDA8D567541114141CCFB99AF635DFFD2693FBC9539C3D1BC15E83D2201F096AD4BD060A4479BCF
25,899,533 UART: [art] SIG.R = 6214A9BBB8479D0C9F5B52779BEB2B06F2ECEBEA292ED65EA0DBCC2FCF5922C4D84518DCF589C39BECC3D198A45A8730
25,906,965 UART: [art] SIG.S = 0C1068D81054DFF327AF6FFCAE1BC0B2ECEBD6775F1F1034EE3BFB2401DBA715B9BE26266D4BFB57CB9384932F27ACC3
26,885,773 UART: Caliptra RT
26,886,489 UART: [state] CFI Enabled
27,050,488 UART: [rt] RT listening for mailbox commands...
27,052,793 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,076 UART: [rt]cmd =0x41544d4e, len=14344
30,893,750 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,498 writing to cptra_bootfsm_go
3,359,699 ready_for_fw is high
3,360,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,014,311 >>> mbox cmd response: success
19,304,940 UART:
19,305,345 UART: Running Caliptra FMC ...
19,306,447 UART:
19,306,598 UART: [state] CFI Enabled
19,368,545 UART: [fht] FMC Alias Private Key: 7
21,132,656 UART: [art] Extend RT PCRs Done
21,133,899 UART: [art] Lock RT PCRs Done
21,135,120 UART: [art] Populate DV Done
21,140,318 UART: [fht] FMC Alias Private Key: 7
21,141,858 UART: [art] Derive CDI
21,142,590 UART: [art] Store in in slot 0x4
21,201,317 UART: [art] Derive Key Pair
21,202,358 UART: [art] Store priv key in slot 0x5
23,665,395 UART: [art] Derive Key Pair - Done
23,678,128 UART: [art] Signing Cert with AUTHO
23,679,431 UART: RITY.KEYID = 7
25,391,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,392,878 UART: [art] PUB.X = 4C3C66AED7C34CA1F255365092221F3B1448AF2AFCBA781F44673C253305E459A0C1E81F8D485CA6B11E4438FEBE8596
25,400,153 UART: [art] PUB.Y = 6047390A05D51E38886B8151AB1DE94B613FBECF7632D98E2DAC1EBB3825BB10278DB7C33E189D51B8F5B67DBB4FBAA9
25,407,449 UART: [art] SIG.R = D6AC869A45D756D5A79F74FE1A5373F4F28637173D23CA2C7E3A882A3F2F639732D09028A752976F67C0B200EC072C61
25,415,351 UART: [art] SIG.S = C850951CD9673CA8F6D2E56897BA99D28EAF7D9CBF070BD9BD3B0588A00FC8D4F6267B2B81B70BFAD66F9974BA799E32
26,393,766 UART: Caliptra RT
26,394,483 UART: [state] CFI Enabled
26,558,680 UART: [rt] RT listening for mailbox commands...
26,561,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,716,238 UART: [rt]cmd =0x41544d4e, len=14344
30,385,970 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,834 writing to cptra_bootfsm_go
192,966 UART:
193,339 UART: Running Caliptra ROM ...
194,524 UART:
604,081 UART: [state] CFI Enabled
618,968 UART: [state] LifecycleState = Unprovisioned
620,876 UART: [state] DebugLocked = No
623,591 UART: [state] WD Timer not started. Device not locked for debugging
626,655 UART: [kat] SHA2-256
805,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,344 UART: [kat] ++
817,792 UART: [kat] sha1
830,080 UART: [kat] SHA2-256
833,090 UART: [kat] SHA2-384
839,865 UART: [kat] SHA2-512-ACC
842,871 UART: [kat] ECC-384
3,285,216 UART: [kat] HMAC-384Kdf
3,297,399 UART: [kat] LMS
3,826,934 UART: [kat] --
3,830,864 UART: [cold-reset] ++
3,833,293 UART: [fht] FHT @ 0x50003400
3,843,779 UART: [idev] ++
3,844,350 UART: [idev] CDI.KEYID = 6
3,845,265 UART: [idev] SUBJECT.KEYID = 7
3,846,458 UART: [idev] UDS.KEYID = 0
3,847,362 ready_for_fw is high
3,847,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,910 UART: [idev] Erasing UDS.KEYID = 0
6,320,539 UART: [idev] Sha1 KeyId Algorithm
6,343,489 UART: [idev] --
6,347,853 UART: [ldev] ++
6,348,425 UART: [ldev] CDI.KEYID = 6
6,349,336 UART: [ldev] SUBJECT.KEYID = 5
6,350,548 UART: [ldev] AUTHORITY.KEYID = 7
6,351,782 UART: [ldev] FE.KEYID = 1
6,363,725 UART: [ldev] Erasing FE.KEYID = 1
8,834,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,952 UART: [ldev] --
10,625,473 UART: [fwproc] Wait for Commands...
10,628,597 UART: [fwproc] Recv command 0x46574c44
10,630,701 UART: [fwproc] Recv'd Img size: 114084 bytes
15,200,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,271,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,339,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,656,832 >>> mbox cmd response: success
15,660,266 UART: [afmc] ++
15,660,864 UART: [afmc] CDI.KEYID = 6
15,661,777 UART: [afmc] SUBJECT.KEYID = 7
15,662,941 UART: [afmc] AUTHORITY.KEYID = 5
18,163,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,886,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,888,026 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,904,054 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,919,960 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,935,731 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,957,962 UART: [afmc] --
19,961,883 UART: [cold-reset] --
19,964,724 UART: [state] Locking Datavault
19,970,841 UART: [state] Locking PCR0, PCR1 and PCR31
19,972,494 UART: [state] Locking ICCM
19,975,074 UART: [exit] Launching FMC @ 0x40000130
19,983,480 UART:
19,983,739 UART: Running Caliptra FMC ...
19,984,846 UART:
19,985,012 UART: [state] CFI Enabled
19,993,174 UART: [fht] FMC Alias Private Key: 7
21,750,522 UART: [art] Extend RT PCRs Done
21,751,733 UART: [art] Lock RT PCRs Done
21,753,267 UART: [art] Populate DV Done
21,758,469 UART: [fht] FMC Alias Private Key: 7
21,760,119 UART: [art] Derive CDI
21,760,933 UART: [art] Store in in slot 0x4
21,803,470 UART: [art] Derive Key Pair
21,804,466 UART: [art] Store priv key in slot 0x5
24,230,840 UART: [art] Derive Key Pair - Done
24,243,726 UART: [art] Signing Cert with AUTHO
24,245,080 UART: RITY.KEYID = 7
25,950,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,952,200 UART: [art] PUB.X = 3FF1559E7A423D4712C7247729D2593D0D078713DADEF85F54095BF1CF9E48E5979C0A769C7DD2E50DC66BC769804E29
25,959,490 UART: [art] PUB.Y = 810A77B76E10BFB7E02412156CC16DC5E579D9CD8C4114339E055CFFF477DA2CBEE08D47B950FB4CE7CF42814A63E7C8
25,966,751 UART: [art] SIG.R = 9DC30AA1BEBB058827B8A0A77652F0E0FD9464EC484988B0BCCDF3FFE808E3B85BFC28ECD8CF900222FA4A0A9D556D3A
25,974,179 UART: [art] SIG.S = E8842F890CA0FD0F5E0B47C0A1937A49542FFD6B75DDD6A937BBD900ECB8234B8E01E52331FE993FF351875CDD121D28
26,952,813 UART: Caliptra RT
26,953,514 UART: [state] CFI Enabled
27,070,644 UART: [rt] RT listening for mailbox commands...
27,072,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,059 UART: [rt]cmd =0x41544d4e, len=14344
30,908,439 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,090 writing to cptra_bootfsm_go
3,696,963 ready_for_fw is high
3,697,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,256,845 >>> mbox cmd response: success
19,510,537 UART:
19,510,927 UART: Running Caliptra FMC ...
19,512,137 UART:
19,512,310 UART: [state] CFI Enabled
19,520,306 UART: [fht] FMC Alias Private Key: 7
21,276,540 UART: [art] Extend RT PCRs Done
21,277,766 UART: [art] Lock RT PCRs Done
21,279,291 UART: [art] Populate DV Done
21,284,541 UART: [fht] FMC Alias Private Key: 7
21,286,139 UART: [art] Derive CDI
21,286,961 UART: [art] Store in in slot 0x4
21,329,505 UART: [art] Derive Key Pair
21,330,523 UART: [art] Store priv key in slot 0x5
23,757,353 UART: [art] Derive Key Pair - Done
23,770,737 UART: [art] Signing Cert with AUTHO
23,772,056 UART: RITY.KEYID = 7
25,477,400 UART: [art] Erasing AUTHORITY.KEYID = 7
25,478,905 UART: [art] PUB.X = 7F45AC49760BA57760A551734169E3716EDCBEE9751460875D488F41C26C541F007FD15543E70FFE450C3812390E4740
25,486,148 UART: [art] PUB.Y = F1E4C25A4371A4A789EA88A6EA5D5DF49F529072C42176A50A9880F3DA576F2BAE229C1BE69B07DDDAC558E6652BFAC0
25,493,382 UART: [art] SIG.R = 5EFA11EA9EFE8986FC45C3CC1F4F8773640C3A2CAD5E1105FC0CFDDC002B2F6AF801694FDDD93E21F55EF0000E86D740
25,500,784 UART: [art] SIG.S = 2CB59B664646627A7A419DCF8976EA196DCBEFE64CE773BA3096E6B11F47A5037F4F70C064D2CD3AD2B2F9F01CE4C1E5
26,479,591 UART: Caliptra RT
26,480,282 UART: [state] CFI Enabled
26,597,498 UART: [rt] RT listening for mailbox commands...
26,599,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,755,101 UART: [rt]cmd =0x41544d4e, len=14344
30,424,803 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,468 UART:
192,844 UART: Running Caliptra ROM ...
194,023 UART:
194,180 UART: [state] CFI Enabled
266,586 UART: [state] LifecycleState = Unprovisioned
268,962 UART: [state] DebugLocked = No
270,215 UART: [state] WD Timer not started. Device not locked for debugging
275,334 UART: [kat] SHA2-256
465,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,970 UART: [kat] ++
476,461 UART: [kat] sha1
488,613 UART: [kat] SHA2-256
491,623 UART: [kat] SHA2-384
498,247 UART: [kat] SHA2-512-ACC
500,828 UART: [kat] ECC-384
2,949,408 UART: [kat] HMAC-384Kdf
2,971,531 UART: [kat] LMS
3,503,309 UART: [kat] --
3,506,735 UART: [cold-reset] ++
3,508,097 UART: [fht] FHT @ 0x50003400
3,519,504 UART: [idev] ++
3,520,211 UART: [idev] CDI.KEYID = 6
3,521,164 UART: [idev] SUBJECT.KEYID = 7
3,522,337 UART: [idev] UDS.KEYID = 0
3,523,281 ready_for_fw is high
3,523,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,993 UART: [idev] Erasing UDS.KEYID = 0
6,030,192 UART: [idev] Sha1 KeyId Algorithm
6,053,696 UART: [idev] --
6,058,586 UART: [ldev] ++
6,059,284 UART: [ldev] CDI.KEYID = 6
6,060,216 UART: [ldev] SUBJECT.KEYID = 5
6,061,373 UART: [ldev] AUTHORITY.KEYID = 7
6,062,602 UART: [ldev] FE.KEYID = 1
6,100,691 UART: [ldev] Erasing FE.KEYID = 1
8,609,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,071 UART: [ldev] --
10,413,449 UART: [fwproc] Wait for Commands...
10,415,918 UART: [fwproc] Recv command 0x46574c44
10,418,167 UART: [fwproc] Recv'd Img size: 114084 bytes
15,029,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,108,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,224,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,765,336 >>> mbox cmd response: success
15,768,652 UART: [afmc] ++
15,769,363 UART: [afmc] CDI.KEYID = 6
15,770,473 UART: [afmc] SUBJECT.KEYID = 7
15,772,024 UART: [afmc] AUTHORITY.KEYID = 5
18,297,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,021,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,023,161 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,038,268 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,053,438 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,068,286 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,093,062 UART: [afmc] --
20,097,418 UART: [cold-reset] --
20,101,907 UART: [state] Locking Datavault
20,106,478 UART: [state] Locking PCR0, PCR1 and PCR31
20,108,644 UART: [state] Locking ICCM
20,111,171 UART: [exit] Launching FMC @ 0x40000130
20,119,805 UART:
20,120,036 UART: Running Caliptra FMC ...
20,121,134 UART:
20,121,288 UART: [state] CFI Enabled
20,178,737 UART: [fht] FMC Alias Private Key: 7
21,942,299 UART: [art] Extend RT PCRs Done
21,943,519 UART: [art] Lock RT PCRs Done
21,945,037 UART: [art] Populate DV Done
21,950,300 UART: [fht] FMC Alias Private Key: 7
21,951,885 UART: [art] Derive CDI
21,952,692 UART: [art] Store in in slot 0x4
22,011,345 UART: [art] Derive Key Pair
22,012,404 UART: [art] Store priv key in slot 0x5
24,474,974 UART: [art] Derive Key Pair - Done
24,487,969 UART: [art] Signing Cert with AUTHO
24,489,262 UART: RITY.KEYID = 7
26,200,234 UART: [art] Erasing AUTHORITY.KEYID = 7
26,201,739 UART: [art] PUB.X = 9D42574ABC96B5451087069854842E034DC20520D5B40E46CCE2A6CBF8A6DED33E3B4D77AC168F2913D2028CD643975E
26,209,000 UART: [art] PUB.Y = A7E8327FFCFC4D368EF5C54A85B677E29B8933282AF1C3AD0A74E2593F5ABB5F16E590D3D2CCC427D55FD10384631987
26,216,284 UART: [art] SIG.R = BE48D7A1CCB4AE4139E0BD89FDC2B00839C6AC7C8B006A9406C3962031EBA87C1F26ABD52F6DB5ACE769B93B4EDF6B95
26,223,654 UART: [art] SIG.S = 598105EDF85F67BE241B275023320002DFE1F0C83283F2A1F38F71B34604A45CB7FCE284BBA38D95D2095C2C2A0BF3AD
27,202,973 UART: Caliptra RT
27,203,679 UART: [state] CFI Enabled
27,367,935 UART: [rt] RT listening for mailbox commands...
27,370,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,525,541 UART: [rt]cmd =0x41544d4e, len=14344
31,206,896 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,179 writing to cptra_bootfsm_go
3,438,818 ready_for_fw is high
3,439,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,846,855 >>> mbox cmd response: success
20,130,442 UART:
20,130,861 UART: Running Caliptra FMC ...
20,131,971 UART:
20,132,120 UART: [state] CFI Enabled
20,196,184 UART: [fht] FMC Alias Private Key: 7
21,959,981 UART: [art] Extend RT PCRs Done
21,961,203 UART: [art] Lock RT PCRs Done
21,962,828 UART: [art] Populate DV Done
21,968,134 UART: [fht] FMC Alias Private Key: 7
21,969,641 UART: [art] Derive CDI
21,970,406 UART: [art] Store in in slot 0x4
22,028,912 UART: [art] Derive Key Pair
22,029,955 UART: [art] Store priv key in slot 0x5
24,493,263 UART: [art] Derive Key Pair - Done
24,506,316 UART: [art] Signing Cert with AUTHO
24,507,609 UART: RITY.KEYID = 7
26,233,022 UART: [art] Erasing AUTHORITY.KEYID = 7
26,234,526 UART: [art] PUB.X = 6275D10E60D9B256E808B28E3D9AD9559F43699AE1CDFF8587404D22B2F180DCBB7CC4F552AB3767D1820299A69E142A
26,241,758 UART: [art] PUB.Y = AA832324682FDDFD9C3AC334B7A93077640C49B59F3281657B33618A32EC7ED33BA5388AE6F71F35142838442FC47C51
26,249,035 UART: [art] SIG.R = E59025FFB73686CF2B33D2591EDC07DAF447318A130E6AA2D86D19A14F64AB635CDD320E8B73A37A9EDFE7444038DC0E
26,256,438 UART: [art] SIG.S = 28136367F50A6A4B151523E03C638F4939649C63805A1C384E74E911111F109C860EEB62AA72B3D7E92045AAEB839FC8
27,235,411 UART: Caliptra RT
27,236,107 UART: [state] CFI Enabled
27,399,655 UART: [rt] RT listening for mailbox commands...
27,402,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,654 UART: [rt]cmd =0x41544d4e, len=14344
31,226,567 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
193,064 UART:
193,450 UART: Running Caliptra ROM ...
194,624 UART:
604,361 UART: [state] CFI Enabled
617,671 UART: [state] LifecycleState = Unprovisioned
620,052 UART: [state] DebugLocked = No
621,800 UART: [state] WD Timer not started. Device not locked for debugging
626,043 UART: [kat] SHA2-256
815,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,706 UART: [kat] ++
827,312 UART: [kat] sha1
838,336 UART: [kat] SHA2-256
841,339 UART: [kat] SHA2-384
847,042 UART: [kat] SHA2-512-ACC
849,636 UART: [kat] ECC-384
3,292,300 UART: [kat] HMAC-384Kdf
3,304,121 UART: [kat] LMS
3,835,965 UART: [kat] --
3,838,833 UART: [cold-reset] ++
3,839,775 UART: [fht] FHT @ 0x50003400
3,851,756 UART: [idev] ++
3,852,473 UART: [idev] CDI.KEYID = 6
3,853,399 UART: [idev] SUBJECT.KEYID = 7
3,854,572 UART: [idev] UDS.KEYID = 0
3,855,497 ready_for_fw is high
3,855,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,998,969 UART: [idev] Erasing UDS.KEYID = 0
6,332,937 UART: [idev] Sha1 KeyId Algorithm
6,355,299 UART: [idev] --
6,360,104 UART: [ldev] ++
6,360,787 UART: [ldev] CDI.KEYID = 6
6,361,672 UART: [ldev] SUBJECT.KEYID = 5
6,362,885 UART: [ldev] AUTHORITY.KEYID = 7
6,364,083 UART: [ldev] FE.KEYID = 1
6,374,740 UART: [ldev] Erasing FE.KEYID = 1
8,854,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,892 UART: [ldev] --
10,648,699 UART: [fwproc] Wait for Commands...
10,651,603 UART: [fwproc] Recv command 0x46574c44
10,653,909 UART: [fwproc] Recv'd Img size: 114084 bytes
15,260,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,343,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,459,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,000,060 >>> mbox cmd response: success
16,004,127 UART: [afmc] ++
16,004,862 UART: [afmc] CDI.KEYID = 6
16,005,984 UART: [afmc] SUBJECT.KEYID = 7
16,007,485 UART: [afmc] AUTHORITY.KEYID = 5
18,513,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,235,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,237,565 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,252,655 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,267,844 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,282,695 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,306,549 UART: [afmc] --
20,310,913 UART: [cold-reset] --
20,316,575 UART: [state] Locking Datavault
20,322,738 UART: [state] Locking PCR0, PCR1 and PCR31
20,324,955 UART: [state] Locking ICCM
20,325,921 UART: [exit] Launching FMC @ 0x40000130
20,334,607 UART:
20,334,865 UART: Running Caliptra FMC ...
20,335,973 UART:
20,336,135 UART: [state] CFI Enabled
20,344,237 UART: [fht] FMC Alias Private Key: 7
22,100,980 UART: [art] Extend RT PCRs Done
22,102,193 UART: [art] Lock RT PCRs Done
22,103,956 UART: [art] Populate DV Done
22,109,528 UART: [fht] FMC Alias Private Key: 7
22,111,020 UART: [art] Derive CDI
22,111,756 UART: [art] Store in in slot 0x4
22,154,189 UART: [art] Derive Key Pair
22,155,235 UART: [art] Store priv key in slot 0x5
24,582,049 UART: [art] Derive Key Pair - Done
24,594,667 UART: [art] Signing Cert with AUTHO
24,595,970 UART: RITY.KEYID = 7
26,301,166 UART: [art] Erasing AUTHORITY.KEYID = 7
26,302,687 UART: [art] PUB.X = 4B494EB67D3130833E5B0EAC5FD3BF971B16CF6692E30004468EDEFB2B19117E6716D311D33F188A397AD6BE2F976F88
26,309,908 UART: [art] PUB.Y = 64759590B886531242B53CFC6233610EBCEA7711889C11D08BE25578F7F729AA18C292B04FF997683CE071D2FB2C9EBD
26,317,186 UART: [art] SIG.R = A6D35B4273F3B0061CAD4CE181C5452C84FA2C1E74FA9F0DFB0F0F75C7D4C72538BA6CF4AF7B9D1CFB1E07964B031D0A
26,324,625 UART: [art] SIG.S = 5F2E8988D82FF3A43E29B2CE09F358408A578BC325E33D64ADC3506A2C45F855A09584E61151E816A214B4396D03FB15
27,303,309 UART: Caliptra RT
27,304,011 UART: [state] CFI Enabled
27,420,963 UART: [rt] RT listening for mailbox commands...
27,423,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,043 UART: [rt]cmd =0x41544d4e, len=14344
31,268,511 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,279 writing to cptra_bootfsm_go
3,766,567 ready_for_fw is high
3,767,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,051,779 >>> mbox cmd response: success
20,303,015 UART:
20,303,419 UART: Running Caliptra FMC ...
20,304,533 UART:
20,304,685 UART: [state] CFI Enabled
20,312,531 UART: [fht] FMC Alias Private Key: 7
22,068,614 UART: [art] Extend RT PCRs Done
22,069,857 UART: [art] Lock RT PCRs Done
22,071,812 UART: [art] Populate DV Done
22,077,338 UART: [fht] FMC Alias Private Key: 7
22,078,839 UART: [art] Derive CDI
22,079,577 UART: [art] Store in in slot 0x4
22,121,750 UART: [art] Derive Key Pair
22,122,798 UART: [art] Store priv key in slot 0x5
24,549,863 UART: [art] Derive Key Pair - Done
24,562,918 UART: [art] Signing Cert with AUTHO
24,564,779 UART: RITY.KEYID = 7
26,270,242 UART: [art] Erasing AUTHORITY.KEYID = 7
26,271,734 UART: [art] PUB.X = 57519621C903D36D98F986937F090ABCC6C300E6BDD3D30844832A75C07D2162D36DDDACF83EBF67D555EF71F597E9DF
26,279,025 UART: [art] PUB.Y = 78319C3F3946A37786E7C63600D8DA175BBAD35309117A0D8B24EAFCAC4473E3D5EC7D0BBDE6160903B92123711F2325
26,286,287 UART: [art] SIG.R = 7FC1A2BFFBD80781FBFA3672E4C45E655B11C1A701C04B842C076A6D6DA8E0EEF96FFD9FD03EB971E079D937D3475348
26,293,681 UART: [art] SIG.S = 32320587A4E3A4F8D8231F7CDFD0AC297DA26AA6E9121C5EC787E1A30B86B460DDB16775EC8BC4F33B9495740A4042F5
27,272,599 UART: Caliptra RT
27,273,316 UART: [state] CFI Enabled
27,391,069 UART: [rt] RT listening for mailbox commands...
27,393,404 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,596 UART: [rt]cmd =0x41544d4e, len=14344
31,234,378 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,098 UART: [kat] LMS
1,475,294 UART: [kat] --
1,476,057 UART: [cold-reset] ++
1,476,453 UART: [fht] Storing FHT @ 0x50003400
1,479,212 UART: [idev] ++
1,479,380 UART: [idev] CDI.KEYID = 6
1,479,740 UART: [idev] SUBJECT.KEYID = 7
1,480,164 UART: [idev] UDS.KEYID = 0
1,480,509 ready_for_fw is high
1,480,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,551 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,474 UART: [ldev] --
1,585,757 UART: [fwproc] Waiting for Commands...
1,586,436 UART: [fwproc] Received command 0x46574c44
1,587,227 UART: [fwproc] Received Image of size 114084 bytes
4,966,016 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,995,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,024,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,159,917 >>> mbox cmd response: success
5,160,977 UART: [afmc] ++
5,161,145 UART: [afmc] CDI.KEYID = 6
5,161,507 UART: [afmc] SUBJECT.KEYID = 7
5,161,932 UART: [afmc] AUTHORITY.KEYID = 5
5,197,312 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,213,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,214,012 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,219,721 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,225,613 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,231,314 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,239,080 UART: [afmc] --
5,240,160 UART: [cold-reset] --
5,241,164 UART: [state] Locking Datavault
5,242,259 UART: [state] Locking PCR0, PCR1 and PCR31
5,242,863 UART: [state] Locking ICCM
5,243,447 UART: [exit] Launching FMC @ 0x40000130
5,248,776 UART:
5,248,792 UART: Running Caliptra FMC ...
5,249,200 UART:
5,249,254 UART: [state] CFI Enabled
5,260,196 UART: [fht] FMC Alias Private Key: 7
5,367,792 UART: [art] Extend RT PCRs Done
5,368,220 UART: [art] Lock RT PCRs Done
5,369,968 UART: [art] Populate DV Done
5,378,080 UART: [fht] FMC Alias Private Key: 7
5,379,258 UART: [art] Derive CDI
5,379,538 UART: [art] Store in in slot 0x4
5,465,223 UART: [art] Derive Key Pair
5,465,583 UART: [art] Store priv key in slot 0x5
5,478,777 UART: [art] Derive Key Pair - Done
5,493,710 UART: [art] Signing Cert with AUTHO
5,494,190 UART: RITY.KEYID = 7
5,509,398 UART: [art] Erasing AUTHORITY.KEYID = 7
5,510,163 UART: [art] PUB.X = AEA64F85DD32FFF2AB5D3B6D24B08FD46F8F0B100B08E27A349A293A453434F6681FFCBF18F3189A49E046CF50DA49E5
5,516,940 UART: [art] PUB.Y = BD7D75DBD85777C4A93ED709583853C97B979781B82B52A2CD3B2E8DAACF65296DDE276653E10A4442777F2478939CBF
5,523,888 UART: [art] SIG.R = 19FDFF12877D7BC252CD9FDAFF92CAE9F3CF858C86EAE195EE58DAB13F08643BB0B1E9AE8BC373580A647005A38BC1F1
5,530,673 UART: [art] SIG.S = 83DB59B3AF78CB905639B93953D1A2B0207BF230FA7CCE21F88F1758515B3C49BB6296FA2802794CDD40AD9951AAFC19
5,554,471 UART: Caliptra RT
5,554,724 UART: [state] CFI Enabled
5,663,021 UART: [rt] RT listening for mailbox commands...
5,663,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,805 UART: [rt]cmd =0x41544d4e, len=14344
6,901,802 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,793 ready_for_fw is high
1,362,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,235,823 >>> mbox cmd response: success
5,297,212 UART:
5,297,228 UART: Running Caliptra FMC ...
5,297,636 UART:
5,297,690 UART: [state] CFI Enabled
5,308,352 UART: [fht] FMC Alias Private Key: 7
5,416,566 UART: [art] Extend RT PCRs Done
5,416,994 UART: [art] Lock RT PCRs Done
5,418,424 UART: [art] Populate DV Done
5,426,508 UART: [fht] FMC Alias Private Key: 7
5,427,492 UART: [art] Derive CDI
5,427,772 UART: [art] Store in in slot 0x4
5,513,597 UART: [art] Derive Key Pair
5,513,957 UART: [art] Store priv key in slot 0x5
5,527,061 UART: [art] Derive Key Pair - Done
5,541,629 UART: [art] Signing Cert with AUTHO
5,542,109 UART: RITY.KEYID = 7
5,557,325 UART: [art] Erasing AUTHORITY.KEYID = 7
5,558,090 UART: [art] PUB.X = 689A2923757C567485473977048B5FB89CA1CCCFC8B12AB46B355FF9044961A16829270E9C02E1279EBE3654CFDF942B
5,564,846 UART: [art] PUB.Y = 2FB7B85CFDB849ABEBDA6C9B5F9E586E4733C5C3CC846848C319BD48573F7E018AA258F13B10DA3C09D3883A50DEED40
5,571,808 UART: [art] SIG.R = 59EF6C8A34B7346CAC188F65C26F47818AA433727E8165C69C38D0E95AD2FC7DBDD3975C297F35118FB1EF4737FF39AE
5,578,588 UART: [art] SIG.S = 12A24E648BF0F6D749D64676C6D0463775EA8759D84968A222E35C071FFF9857C59E6CAEFD9E52878F97B82D1F109B18
5,602,458 UART: Caliptra RT
5,602,711 UART: [state] CFI Enabled
5,711,145 UART: [rt] RT listening for mailbox commands...
5,711,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,835,093 UART: [rt]cmd =0x41544d4e, len=14344
6,955,530 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,751 UART: [kat] LMS
1,475,947 UART: [kat] --
1,476,568 UART: [cold-reset] ++
1,476,952 UART: [fht] Storing FHT @ 0x50003400
1,479,623 UART: [idev] ++
1,479,791 UART: [idev] CDI.KEYID = 6
1,480,151 UART: [idev] SUBJECT.KEYID = 7
1,480,575 UART: [idev] UDS.KEYID = 0
1,480,920 ready_for_fw is high
1,480,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,975 UART: [idev] --
1,514,982 UART: [ldev] ++
1,515,150 UART: [ldev] CDI.KEYID = 6
1,515,513 UART: [ldev] SUBJECT.KEYID = 5
1,515,939 UART: [ldev] AUTHORITY.KEYID = 7
1,516,402 UART: [ldev] FE.KEYID = 1
1,521,466 UART: [ldev] Erasing FE.KEYID = 1
1,546,799 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,464 UART: [fwproc] Waiting for Commands...
1,587,181 UART: [fwproc] Received command 0x46574c44
1,587,972 UART: [fwproc] Received Image of size 114084 bytes
5,155,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,183,326 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,212,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,348,283 >>> mbox cmd response: success
5,349,421 UART: [afmc] ++
5,349,589 UART: [afmc] CDI.KEYID = 6
5,349,951 UART: [afmc] SUBJECT.KEYID = 7
5,350,376 UART: [afmc] AUTHORITY.KEYID = 5
5,386,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,006 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,408,715 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,414,607 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,308 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,172 UART: [afmc] --
5,429,300 UART: [cold-reset] --
5,430,152 UART: [state] Locking Datavault
5,431,217 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,821 UART: [state] Locking ICCM
5,432,335 UART: [exit] Launching FMC @ 0x40000130
5,437,664 UART:
5,437,680 UART: Running Caliptra FMC ...
5,438,088 UART:
5,438,231 UART: [state] CFI Enabled
5,448,723 UART: [fht] FMC Alias Private Key: 7
5,556,199 UART: [art] Extend RT PCRs Done
5,556,627 UART: [art] Lock RT PCRs Done
5,558,525 UART: [art] Populate DV Done
5,566,897 UART: [fht] FMC Alias Private Key: 7
5,567,873 UART: [art] Derive CDI
5,568,153 UART: [art] Store in in slot 0x4
5,653,804 UART: [art] Derive Key Pair
5,654,164 UART: [art] Store priv key in slot 0x5
5,667,580 UART: [art] Derive Key Pair - Done
5,682,325 UART: [art] Signing Cert with AUTHO
5,682,805 UART: RITY.KEYID = 7
5,697,639 UART: [art] Erasing AUTHORITY.KEYID = 7
5,698,404 UART: [art] PUB.X = 97C65A2730ACE4B8B7AB6678D039AB95D1833897694EA97FE04607930E7321F578EADCBDBD936B3AE88ABD4900884EC6
5,705,154 UART: [art] PUB.Y = EDEF14A46F57F3524EDF6D5622C8C290841CF011CDF26BFA73C7D087BF002689638E181CDE27B5337BCCE394CC9A9330
5,712,094 UART: [art] SIG.R = A87B3141445F557AAA4521E5F113AF7F8961BE257ABF79D3F60F74607BDF334906D8164039AC64452A1687CD303F908F
5,718,856 UART: [art] SIG.S = 38188A448EE516C15294005904B8265AA2C88EB0D4212CC0B3EEC0B8C900FCA4278A1ED295112621CA5F0EFBA8C8A16A
5,743,419 UART: Caliptra RT
5,743,764 UART: [state] CFI Enabled
5,851,745 UART: [rt] RT listening for mailbox commands...
5,852,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,659 UART: [rt]cmd =0x41544d4e, len=14344
7,115,878 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 ready_for_fw is high
1,363,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,047,899 >>> mbox cmd response: success
5,110,102 UART:
5,110,118 UART: Running Caliptra FMC ...
5,110,526 UART:
5,110,669 UART: [state] CFI Enabled
5,121,005 UART: [fht] FMC Alias Private Key: 7
5,229,285 UART: [art] Extend RT PCRs Done
5,229,713 UART: [art] Lock RT PCRs Done
5,231,209 UART: [art] Populate DV Done
5,239,449 UART: [fht] FMC Alias Private Key: 7
5,240,583 UART: [art] Derive CDI
5,240,863 UART: [art] Store in in slot 0x4
5,326,838 UART: [art] Derive Key Pair
5,327,198 UART: [art] Store priv key in slot 0x5
5,340,288 UART: [art] Derive Key Pair - Done
5,355,053 UART: [art] Signing Cert with AUTHO
5,355,533 UART: RITY.KEYID = 7
5,370,835 UART: [art] Erasing AUTHORITY.KEYID = 7
5,371,600 UART: [art] PUB.X = 1CBF11EFB7D4CC2AF9F613A4B6498B6A6241828B884B7879F0660E2763E0203DCE7F55B6946CD9C2A390D7C2DA50EA31
5,378,377 UART: [art] PUB.Y = E1F09C414C386308E3420F5113A5E04DCD53FAA429DFE19A21AB3CA8A53E6C2A5ABD161D812FA89826C6BEE4F2FEDCC0
5,385,343 UART: [art] SIG.R = 53B27D2FF4AC0506FD2EA812F2DD453EB0071CC9325F392814862710E75982A3E25C5C8256761A244822B9DD4B5BF49D
5,392,104 UART: [art] SIG.S = 6BFB6885833FF8201761C92BCD43DE1097AB57416CE44C40806F903A40695A7895E5CC2F017012991EFE892CB01B2D47
5,416,176 UART: Caliptra RT
5,416,521 UART: [state] CFI Enabled
5,524,885 UART: [rt] RT listening for mailbox commands...
5,525,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,648,617 UART: [rt]cmd =0x41544d4e, len=14344
6,768,628 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,536 UART: [kat] SHA2-512-ACC
908,437 UART: [kat] ECC-384
917,822 UART: [kat] HMAC-384Kdf
922,344 UART: [kat] LMS
1,170,672 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,771 UART: [fht] FHT @ 0x50003400
1,174,642 UART: [idev] ++
1,174,810 UART: [idev] CDI.KEYID = 6
1,175,170 UART: [idev] SUBJECT.KEYID = 7
1,175,594 UART: [idev] UDS.KEYID = 0
1,175,939 ready_for_fw is high
1,175,939 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,622 UART: [idev] Erasing UDS.KEYID = 0
1,200,647 UART: [idev] Sha1 KeyId Algorithm
1,208,983 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,873 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114084 bytes
3,112,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,305,217 >>> mbox cmd response: success
3,306,391 UART: [afmc] ++
3,306,559 UART: [afmc] CDI.KEYID = 6
3,306,921 UART: [afmc] SUBJECT.KEYID = 7
3,307,346 UART: [afmc] AUTHORITY.KEYID = 5
3,342,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,358,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,359,181 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,364,890 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,370,782 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,376,493 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,384,152 UART: [afmc] --
3,385,184 UART: [cold-reset] --
3,386,144 UART: [state] Locking Datavault
3,387,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,387,845 UART: [state] Locking ICCM
3,388,325 UART: [exit] Launching FMC @ 0x40000130
3,393,654 UART:
3,393,670 UART: Running Caliptra FMC ...
3,394,078 UART:
3,394,132 UART: [state] CFI Enabled
3,404,660 UART: [fht] FMC Alias Private Key: 7
3,512,670 UART: [art] Extend RT PCRs Done
3,513,098 UART: [art] Lock RT PCRs Done
3,514,730 UART: [art] Populate DV Done
3,522,986 UART: [fht] FMC Alias Private Key: 7
3,524,048 UART: [art] Derive CDI
3,524,328 UART: [art] Store in in slot 0x4
3,609,879 UART: [art] Derive Key Pair
3,610,239 UART: [art] Store priv key in slot 0x5
3,623,309 UART: [art] Derive Key Pair - Done
3,638,177 UART: [art] Signing Cert with AUTHO
3,638,657 UART: RITY.KEYID = 7
3,653,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,422 UART: [art] PUB.X = D1AA95ECB5793705C6F34DE9388BB4096D849D64ABA1900768F3C4895528BF7537E0B58A0EB506DD42283D6A0138BE69
3,661,176 UART: [art] PUB.Y = E7DCAAD6722B221C5A4B18ECA7344F896ADCD9B6E1B240C971FB311181FEF6F95E826C5E79F36AA1353C351652A3F0AA
3,668,142 UART: [art] SIG.R = 75BDDA45364AA0E4291FE48538462C031C076E772D6DC8025B8FE3927BCC9015E5A12C44445E1A60F6179CB13A0956EC
3,674,902 UART: [art] SIG.S = D59CCC6F4C3599C9EB6B07DC3701E0ADDB81146535B02CCF99C3E6AA685BCDA0955BC88ADDEEF5C97AC016D064FFD915
3,699,107 UART: Caliptra RT
3,699,360 UART: [state] CFI Enabled
3,807,222 UART: [rt] RT listening for mailbox commands...
3,807,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,006 UART: [rt]cmd =0x41544d4e, len=14344
5,051,321 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,055 ready_for_fw is high
1,060,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,948 >>> mbox cmd response: success
3,231,523 UART:
3,231,539 UART: Running Caliptra FMC ...
3,231,947 UART:
3,232,001 UART: [state] CFI Enabled
3,242,451 UART: [fht] FMC Alias Private Key: 7
3,349,851 UART: [art] Extend RT PCRs Done
3,350,279 UART: [art] Lock RT PCRs Done
3,352,063 UART: [art] Populate DV Done
3,360,157 UART: [fht] FMC Alias Private Key: 7
3,361,191 UART: [art] Derive CDI
3,361,471 UART: [art] Store in in slot 0x4
3,446,894 UART: [art] Derive Key Pair
3,447,254 UART: [art] Store priv key in slot 0x5
3,460,328 UART: [art] Derive Key Pair - Done
3,475,386 UART: [art] Signing Cert with AUTHO
3,475,866 UART: RITY.KEYID = 7
3,490,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,477 UART: [art] PUB.X = 156616E5655F3D1CE2D832B60ABFF8AAFA95DB8F1E73BBF0A44B8D6AED28A9E5C1FCCB0FA9C4B28959412FBD95080029
3,498,238 UART: [art] PUB.Y = 836962145F577785FBFEE51C5F884CA46EEA368D72155604974A3E4E2C2AD6B6B8107854D27F161AD1F2E006E533843E
3,505,180 UART: [art] SIG.R = 72AE4D5C4CC32120C7B9EDE995E1B0C740FEB2B27264CDB00F237BD65E916D17F979EE39485A92EFCA8B192319873D4C
3,511,959 UART: [art] SIG.S = 209768E55599583792C88E62FC4F201BAF70300BFC0C1EA4268A79D52C718FC47E631DE6FFEFCB1A9DD3B42C30E330CE
3,535,750 UART: Caliptra RT
3,536,003 UART: [state] CFI Enabled
3,643,544 UART: [rt] RT listening for mailbox commands...
3,644,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,154 UART: [rt]cmd =0x41544d4e, len=14344
4,900,004 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
893,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,684 UART: [kat] ++
897,836 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,959 UART: [kat] HMAC-384Kdf
923,473 UART: [kat] LMS
1,171,801 UART: [kat] --
1,172,768 UART: [cold-reset] ++
1,173,180 UART: [fht] FHT @ 0x50003400
1,175,813 UART: [idev] ++
1,175,981 UART: [idev] CDI.KEYID = 6
1,176,341 UART: [idev] SUBJECT.KEYID = 7
1,176,765 UART: [idev] UDS.KEYID = 0
1,177,110 ready_for_fw is high
1,177,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,801 UART: [idev] Erasing UDS.KEYID = 0
1,201,982 UART: [idev] Sha1 KeyId Algorithm
1,210,608 UART: [idev] --
1,211,728 UART: [ldev] ++
1,211,896 UART: [ldev] CDI.KEYID = 6
1,212,259 UART: [ldev] SUBJECT.KEYID = 5
1,212,685 UART: [ldev] AUTHORITY.KEYID = 7
1,213,148 UART: [ldev] FE.KEYID = 1
1,218,422 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,414 UART: [ldev] --
1,283,881 UART: [fwproc] Wait for Commands...
1,284,621 UART: [fwproc] Recv command 0x46574c44
1,285,349 UART: [fwproc] Recv'd Img size: 114084 bytes
3,131,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,324,513 >>> mbox cmd response: success
3,325,725 UART: [afmc] ++
3,325,893 UART: [afmc] CDI.KEYID = 6
3,326,255 UART: [afmc] SUBJECT.KEYID = 7
3,326,680 UART: [afmc] AUTHORITY.KEYID = 5
3,362,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,323 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,032 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,924 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,635 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,448 UART: [afmc] --
3,405,328 UART: [cold-reset] --
3,406,160 UART: [state] Locking Datavault
3,407,251 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,855 UART: [state] Locking ICCM
3,408,513 UART: [exit] Launching FMC @ 0x40000130
3,413,842 UART:
3,413,858 UART: Running Caliptra FMC ...
3,414,266 UART:
3,414,409 UART: [state] CFI Enabled
3,424,737 UART: [fht] FMC Alias Private Key: 7
3,532,997 UART: [art] Extend RT PCRs Done
3,533,425 UART: [art] Lock RT PCRs Done
3,535,093 UART: [art] Populate DV Done
3,543,147 UART: [fht] FMC Alias Private Key: 7
3,544,111 UART: [art] Derive CDI
3,544,391 UART: [art] Store in in slot 0x4
3,629,866 UART: [art] Derive Key Pair
3,630,226 UART: [art] Store priv key in slot 0x5
3,643,620 UART: [art] Derive Key Pair - Done
3,658,391 UART: [art] Signing Cert with AUTHO
3,658,871 UART: RITY.KEYID = 7
3,673,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,710 UART: [art] PUB.X = 42D136AE50AB61F7D5CAE88B51BEFF01CF4E83B52D8ED881B721E104BCBF305EF4809D35536D1497290F31C88BFA1301
3,681,480 UART: [art] PUB.Y = 0CF42433C0F974E3CB26F4F1E991737EE430122528C8CD408E5512781E75FB86A23A1BA5E9BE632858EFB81DD904E8C7
3,688,428 UART: [art] SIG.R = BD75A5065540D00760AE7109BBFE427AED7C98596188376870D309955F87074ED5190300F7084F02FCADDF022A221918
3,695,141 UART: [art] SIG.S = 040AA2BEDE3BD6C08F05047B6A05B6D82C38C210F9EEDA43A8056BAF4FDEDF52DE617A8D5F6598FC799AE6E8426EA58D
3,718,610 UART: Caliptra RT
3,718,955 UART: [state] CFI Enabled
3,827,195 UART: [rt] RT listening for mailbox commands...
3,827,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,833 UART: [rt]cmd =0x41544d4e, len=14344
5,081,036 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,362 ready_for_fw is high
1,061,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,046 >>> mbox cmd response: success
3,234,333 UART:
3,234,349 UART: Running Caliptra FMC ...
3,234,757 UART:
3,234,900 UART: [state] CFI Enabled
3,245,624 UART: [fht] FMC Alias Private Key: 7
3,354,242 UART: [art] Extend RT PCRs Done
3,354,670 UART: [art] Lock RT PCRs Done
3,356,082 UART: [art] Populate DV Done
3,364,552 UART: [fht] FMC Alias Private Key: 7
3,365,698 UART: [art] Derive CDI
3,365,978 UART: [art] Store in in slot 0x4
3,451,413 UART: [art] Derive Key Pair
3,451,773 UART: [art] Store priv key in slot 0x5
3,465,189 UART: [art] Derive Key Pair - Done
3,479,999 UART: [art] Signing Cert with AUTHO
3,480,479 UART: RITY.KEYID = 7
3,496,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,080 UART: [art] PUB.X = 0FF33D1894DB9009FBD91A5FC46359A233D2DC556A6A3415153B4D6FD463E832AEEE747697FF9FDDE5CFD9DA6152CB86
3,503,860 UART: [art] PUB.Y = A5F637D557EFBE41CCD26CDDAFED908A634060A1B3B3BD4B23F4457E4F5F3CD21C737DE54EEFEF266F38B79E99106BC9
3,510,834 UART: [art] SIG.R = D578DF9424811DBD233E50E4E84F735E4EBC378A7FCFAEC60D20579B0AA5C6DFB55C13F2AE092158BD64553B3E12FB73
3,517,611 UART: [art] SIG.S = 3880E6B57D9EA0B9398D272C58F858B26DF32C722B7159881A64B6CEBCD891BF07C40F1F1BB6F1928B8EFD4CC7178439
3,541,714 UART: Caliptra RT
3,542,059 UART: [state] CFI Enabled
3,648,681 UART: [rt] RT listening for mailbox commands...
3,649,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,273 UART: [rt]cmd =0x41544d4e, len=14344
4,899,545 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,515 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,174,531 ready_for_fw is high
1,174,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,816 UART: [ldev] ++
1,208,984 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,775 UART: [ldev] AUTHORITY.KEYID = 7
1,210,238 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,685 UART: [fwproc] Recv command 0x46574c44
1,282,418 UART: [fwproc] Recv'd Img size: 114084 bytes
3,106,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,134,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,164,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,299,652 >>> mbox cmd response: success
3,300,791 UART: [afmc] ++
3,300,959 UART: [afmc] CDI.KEYID = 6
3,301,322 UART: [afmc] SUBJECT.KEYID = 7
3,301,748 UART: [afmc] AUTHORITY.KEYID = 5
3,336,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,352,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,353,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,359,353 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,365,243 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,370,954 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,378,788 UART: [afmc] --
3,379,848 UART: [cold-reset] --
3,380,632 UART: [state] Locking Datavault
3,381,653 UART: [state] Locking PCR0, PCR1 and PCR31
3,382,257 UART: [state] Locking ICCM
3,382,759 UART: [exit] Launching FMC @ 0x40000130
3,388,088 UART:
3,388,104 UART: Running Caliptra FMC ...
3,388,512 UART:
3,388,566 UART: [state] CFI Enabled
3,399,100 UART: [fht] FMC Alias Private Key: 7
3,507,398 UART: [art] Extend RT PCRs Done
3,507,826 UART: [art] Lock RT PCRs Done
3,509,188 UART: [art] Populate DV Done
3,517,424 UART: [fht] FMC Alias Private Key: 7
3,518,550 UART: [art] Derive CDI
3,518,830 UART: [art] Store in in slot 0x4
3,604,675 UART: [art] Derive Key Pair
3,605,035 UART: [art] Store priv key in slot 0x5
3,618,079 UART: [art] Derive Key Pair - Done
3,632,898 UART: [art] Signing Cert with AUTHO
3,633,378 UART: RITY.KEYID = 7
3,648,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,649,581 UART: [art] PUB.X = 4CDADFAA7ED4E2DC8D8293C4D88B885081ECA532AA772FC5BA33FF90F3BF65399F17ABDCD81F85463571C87412E4DC04
3,656,368 UART: [art] PUB.Y = 47DB36FBB52B28C30979956620E35387D85D027F65DB751218072B1AC4D9C8D7977AD099595D4D9CCC9D155D3AA89909
3,663,304 UART: [art] SIG.R = CD07CA8AAC0C592B1B0C9736BDF6B5C7EBA314C0ADBBBE465B3BE73A7C4170C5F2D97BEB4F5C596CC533AACEC35EBF10
3,670,101 UART: [art] SIG.S = 96324C6E6A0E1E3430AF53C2C5E8A9A7B35958A2BB07356121C1D636CDF1A70B34119E6D05ED2F387F329ACBBEC0FCC2
3,694,480 UART: Caliptra RT
3,694,733 UART: [state] CFI Enabled
3,803,206 UART: [rt] RT listening for mailbox commands...
3,803,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,044 UART: [rt]cmd =0x41544d4e, len=14344
5,054,784 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,052 ready_for_fw is high
1,056,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,341 >>> mbox cmd response: success
3,228,282 UART:
3,228,298 UART: Running Caliptra FMC ...
3,228,706 UART:
3,228,760 UART: [state] CFI Enabled
3,239,370 UART: [fht] FMC Alias Private Key: 7
3,346,994 UART: [art] Extend RT PCRs Done
3,347,422 UART: [art] Lock RT PCRs Done
3,349,078 UART: [art] Populate DV Done
3,357,534 UART: [fht] FMC Alias Private Key: 7
3,358,592 UART: [art] Derive CDI
3,358,872 UART: [art] Store in in slot 0x4
3,444,297 UART: [art] Derive Key Pair
3,444,657 UART: [art] Store priv key in slot 0x5
3,457,491 UART: [art] Derive Key Pair - Done
3,472,389 UART: [art] Signing Cert with AUTHO
3,472,869 UART: RITY.KEYID = 7
3,487,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,532 UART: [art] PUB.X = A5C7F2DF9A178489CE537C02DA389AD12F655E5E8992DDCE324FFED623F021F589AE700976213A2466E3DBB64CEFEF8E
3,495,312 UART: [art] PUB.Y = 461F2164D7F4EC8BD2779B923CF10516BB65822D6385E6EC7C61FE4C390483136662514D523509D7BE00199FCD0ECCA7
3,502,228 UART: [art] SIG.R = D56F4369FD5909C148FFC1BC185BE8E6CBED9615A533A82A5265B65D6C01CA78AA4ABE1E2561A3B4F3DFEE089E4CFD3E
3,509,013 UART: [art] SIG.S = 043DC23FAB7E0477E64D4C69082082EA53A2B029B5049171A20089C23DDB95199A5B02110973173D41E4DB73C197B1E1
3,533,184 UART: Caliptra RT
3,533,437 UART: [state] CFI Enabled
3,640,451 UART: [rt] RT listening for mailbox commands...
3,641,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,093 UART: [rt]cmd =0x41544d4e, len=14344
4,891,721 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,174,530 ready_for_fw is high
1,174,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,341 UART: [ldev] --
1,281,787 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,159 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,744 >>> mbox cmd response: success
3,313,973 UART: [afmc] ++
3,314,141 UART: [afmc] CDI.KEYID = 6
3,314,504 UART: [afmc] SUBJECT.KEYID = 7
3,314,930 UART: [afmc] AUTHORITY.KEYID = 5
3,350,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,635 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,345 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,235 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,946 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,766 UART: [afmc] --
3,393,790 UART: [cold-reset] --
3,394,778 UART: [state] Locking Datavault
3,396,025 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,629 UART: [state] Locking ICCM
3,397,103 UART: [exit] Launching FMC @ 0x40000130
3,402,432 UART:
3,402,448 UART: Running Caliptra FMC ...
3,402,856 UART:
3,402,999 UART: [state] CFI Enabled
3,413,467 UART: [fht] FMC Alias Private Key: 7
3,521,249 UART: [art] Extend RT PCRs Done
3,521,677 UART: [art] Lock RT PCRs Done
3,523,155 UART: [art] Populate DV Done
3,531,271 UART: [fht] FMC Alias Private Key: 7
3,532,421 UART: [art] Derive CDI
3,532,701 UART: [art] Store in in slot 0x4
3,618,354 UART: [art] Derive Key Pair
3,618,714 UART: [art] Store priv key in slot 0x5
3,632,072 UART: [art] Derive Key Pair - Done
3,646,973 UART: [art] Signing Cert with AUTHO
3,647,453 UART: RITY.KEYID = 7
3,662,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,214 UART: [art] PUB.X = 43F4B2D3CD2453901D23B7098AC412E74751CFBC9C129546C1401A7CF764106960D29FD54CE340B5C6B6573A9EDCA24E
3,669,985 UART: [art] PUB.Y = 8B246B8AAB7B7D44D6B68AF3A1BFE4441EE43C395E893FD7077CACA4835C2B8049622A56FAF15DDB1ED3A7A3E0C1BF5C
3,676,956 UART: [art] SIG.R = AA16C7E774FCF2B78BA1EFC04FBB0736042D0BC25A064E3E67288287BF21E3E8ADCEC851ECE2A7FC7C4683EEA8C43971
3,683,736 UART: [art] SIG.S = 6FA264424574791784B1E3B78A96B07CF428DC2005F7EB4CBEC82EA2650F25130DCC0321FF5C5CE3CB411A84972E1CB1
3,707,281 UART: Caliptra RT
3,707,626 UART: [state] CFI Enabled
3,815,324 UART: [rt] RT listening for mailbox commands...
3,815,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,006 UART: [rt]cmd =0x41544d4e, len=14344
5,063,695 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,529 ready_for_fw is high
1,057,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,169,014 >>> mbox cmd response: success
3,232,119 UART:
3,232,135 UART: Running Caliptra FMC ...
3,232,543 UART:
3,232,686 UART: [state] CFI Enabled
3,243,014 UART: [fht] FMC Alias Private Key: 7
3,351,238 UART: [art] Extend RT PCRs Done
3,351,666 UART: [art] Lock RT PCRs Done
3,353,428 UART: [art] Populate DV Done
3,361,656 UART: [fht] FMC Alias Private Key: 7
3,362,604 UART: [art] Derive CDI
3,362,884 UART: [art] Store in in slot 0x4
3,448,641 UART: [art] Derive Key Pair
3,449,001 UART: [art] Store priv key in slot 0x5
3,461,859 UART: [art] Derive Key Pair - Done
3,476,678 UART: [art] Signing Cert with AUTHO
3,477,158 UART: RITY.KEYID = 7
3,492,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,351 UART: [art] PUB.X = F8E5BAAC39B198B1C04F1A6B3AF32A1D313E22B3EBA1D55BFC67E552648B3707DB193A38EECF3C4449483428AE5C674D
3,500,134 UART: [art] PUB.Y = AA30077FBEAE23EE217657A00BB628FF411E9B7B6CD2C239FF9B0223CFC8B60E7790C04912BE52BC3F38E9B77888F851
3,507,084 UART: [art] SIG.R = 503A67C1C8BDB0425ECFE2ED15007819BEA4961805EE8A4A6C3A30936966843CA355BD780F3D243229A873FB0F73AF8C
3,513,829 UART: [art] SIG.S = 6E1C6E65711EC1BBB153CADE36D41833C61249E47FDEC9ACE1E21B22BC9DFF70DEBEA85DEDBE99D72BD468A1F898DD87
3,537,704 UART: Caliptra RT
3,538,049 UART: [state] CFI Enabled
3,644,942 UART: [rt] RT listening for mailbox commands...
3,645,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,928 UART: [rt]cmd =0x41544d4e, len=14344
4,908,369 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,606 UART:
192,961 UART: Running Caliptra ROM ...
194,164 UART:
194,320 UART: [state] CFI Enabled
265,615 UART: [state] LifecycleState = Unprovisioned
267,553 UART: [state] DebugLocked = No
270,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,656 UART: [kat] SHA2-256
444,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,880 UART: [kat] ++
455,363 UART: [kat] sha1
466,977 UART: [kat] SHA2-256
469,679 UART: [kat] SHA2-384
475,819 UART: [kat] SHA2-512-ACC
478,186 UART: [kat] ECC-384
2,765,859 UART: [kat] HMAC-384Kdf
2,777,233 UART: [kat] LMS
3,967,532 UART: [kat] --
3,972,700 UART: [cold-reset] ++
3,974,988 UART: [fht] Storing FHT @ 0x50003400
3,986,345 UART: [idev] ++
3,986,948 UART: [idev] CDI.KEYID = 6
3,987,841 UART: [idev] SUBJECT.KEYID = 7
3,989,087 UART: [idev] UDS.KEYID = 0
3,990,304 ready_for_fw is high
3,990,518 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,504 UART: [idev] Erasing UDS.KEYID = 0
7,313,323 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,902 UART: [idev] --
7,338,143 UART: [ldev] ++
7,338,767 UART: [ldev] CDI.KEYID = 6
7,339,901 UART: [ldev] SUBJECT.KEYID = 5
7,340,966 UART: [ldev] AUTHORITY.KEYID = 7
7,342,207 UART: [ldev] FE.KEYID = 1
7,391,196 UART: [ldev] Erasing FE.KEYID = 1
10,722,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,015,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,030,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,045,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,059,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,078,537 UART: [ldev] --
13,084,127 UART: [fwproc] Waiting for Commands...
13,085,842 UART: [fwproc] Received command 0x46574c44
13,088,074 UART: [fwproc] Received Image of size 113760 bytes
21,086,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,165,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,234,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,550,382 >>> mbox cmd response: success
21,555,300 UART: [afmc] ++
21,555,896 UART: [afmc] CDI.KEYID = 6
21,556,802 UART: [afmc] SUBJECT.KEYID = 7
21,558,075 UART: [afmc] AUTHORITY.KEYID = 5
24,924,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,224,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,226,553 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,241,129 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,255,852 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,270,126 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,291,538 UART: [afmc] --
27,294,704 UART: [cold-reset] --
27,298,080 UART: [state] Locking Datavault
27,302,627 UART: [state] Locking PCR0, PCR1 and PCR31
27,304,324 UART: [state] Locking ICCM
27,306,422 UART: [exit] Launching FMC @ 0x40000130
27,314,818 UART:
27,315,061 UART: Running Caliptra FMC ...
27,316,188 UART:
27,316,352 UART: [state] CFI Enabled
27,384,947 UART: [fht] FMC Alias Private Key: 7
29,722,624 UART: [art] Extend RT PCRs Done
29,723,875 UART: [art] Lock RT PCRs Done
29,725,313 UART: [art] Populate DV Done
29,730,673 UART: [fht] FMC Alias Private Key: 7
29,732,373 UART: [art] Derive CDI
29,733,193 UART: [art] Store in in slot 0x4
29,795,264 UART: [art] Derive Key Pair
29,796,307 UART: [art] Store priv key in slot 0x5
33,089,328 UART: [art] Derive Key Pair - Done
33,102,313 UART: [art] Signing Cert with AUTHO
33,103,640 UART: RITY.KEYID = 7
35,390,556 UART: [art] Erasing AUTHORITY.KEYID = 7
35,392,059 UART: [art] PUB.X = 2C928A1565112FDD40A6D36AAD4AD9DE009457754DB68405713C71058FD429489A0A59E9F1CB1926F477DF5A4F244C3E
35,399,343 UART: [art] PUB.Y = 32B6954486A84698B70CB1717208FA865F197FDCF27B6E1735D8FF0CFFE67816C3725B1047497FB2B82605525C2E9340
35,406,530 UART: [art] SIG.R = 324B49F93D1839745D7A80CEADDCE48222720A84628ACF54525CB3413E146830682277CA8C1C5EA7A70991CD56DE0B61
35,413,922 UART: [art] SIG.S = C5A235C0316BB32B17FA28ACB67227A6C157BDAE9881596A2DC8CEABD2D3B0B6E148596E2811A4AC3516957E7FE512D0
36,719,351 UART: Caliptra RT
36,720,055 UART: [state] CFI Enabled
36,882,419 UART: [rt] RT listening for mailbox commands...
36,884,743 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,040,171 UART: [rt]cmd =0x41544d4e, len=14344
43,492,332 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,807,417 ready_for_fw is high
3,807,844 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,179,535 >>> mbox cmd response: success
27,866,322 UART:
27,867,076 UART: Running Caliptra FMC ...
27,868,205 UART:
27,868,369 UART: [state] CFI Enabled
27,920,120 UART: [fht] FMC Alias Private Key: 7
30,258,025 UART: [art] Extend RT PCRs Done
30,259,263 UART: [art] Lock RT PCRs Done
30,260,970 UART: [art] Populate DV Done
30,266,562 UART: [fht] FMC Alias Private Key: 7
30,268,109 UART: [art] Derive CDI
30,268,845 UART: [art] Store in in slot 0x4
30,329,465 UART: [art] Derive Key Pair
30,330,529 UART: [art] Store priv key in slot 0x5
33,623,353 UART: [art] Derive Key Pair - Done
33,636,518 UART: [art] Signing Cert with AUTHO
33,637,832 UART: RITY.KEYID = 7
35,925,674 UART: [art] Erasing AUTHORITY.KEYID = 7
35,927,186 UART: [art] PUB.X = EBF1EB1DA752042BC863003A2FD411CD361C3C054BD26AF820D8E246F1532A1014E036838F84E5272A67B307774024DD
35,934,407 UART: [art] PUB.Y = 4636950318CAFE2364FD5333A57BC5A47A20E01218A5FDE7266512D1F26DCBDAAFC2432F7D9EA02691F9CED4E5CCA53C
35,941,689 UART: [art] SIG.R = E4675F0519A01947B8849200D7ECD7FF90F7F22E068B33F358C7782FA254F3F366142EC1140058D1BF3832B0FA417986
35,949,049 UART: [art] SIG.S = 9C181C6B0E037FA95E6EC4DA3F65C7ADE333E9FCDD618CFBAE2C87E78DDC2643FB7D80FFAB9E04F075BFF6AB62E0F973
37,253,475 UART: Caliptra RT
37,254,194 UART: [state] CFI Enabled
37,415,726 UART: [rt] RT listening for mailbox commands...
37,418,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,573,559 UART: [rt]cmd =0x41544d4e, len=14344
43,740,342 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,810 writing to cptra_bootfsm_go
193,064 UART:
193,438 UART: Running Caliptra ROM ...
194,559 UART:
604,268 UART: [state] CFI Enabled
618,587 UART: [state] LifecycleState = Unprovisioned
620,552 UART: [state] DebugLocked = No
622,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,229 UART: [kat] SHA2-256
796,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,475 UART: [kat] ++
807,921 UART: [kat] sha1
818,026 UART: [kat] SHA2-256
820,755 UART: [kat] SHA2-384
825,961 UART: [kat] SHA2-512-ACC
828,394 UART: [kat] ECC-384
3,110,987 UART: [kat] HMAC-384Kdf
3,122,310 UART: [kat] LMS
4,312,443 UART: [kat] --
4,316,881 UART: [cold-reset] ++
4,318,887 UART: [fht] Storing FHT @ 0x50003400
4,328,939 UART: [idev] ++
4,329,500 UART: [idev] CDI.KEYID = 6
4,330,526 UART: [idev] SUBJECT.KEYID = 7
4,331,692 UART: [idev] UDS.KEYID = 0
4,332,814 ready_for_fw is high
4,333,049 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,020 UART: [idev] Erasing UDS.KEYID = 0
7,618,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,926 UART: [idev] --
7,644,241 UART: [ldev] ++
7,644,846 UART: [ldev] CDI.KEYID = 6
7,645,819 UART: [ldev] SUBJECT.KEYID = 5
7,647,028 UART: [ldev] AUTHORITY.KEYID = 7
7,648,258 UART: [ldev] FE.KEYID = 1
7,658,035 UART: [ldev] Erasing FE.KEYID = 1
10,951,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,901 UART: [ldev] --
13,313,054 UART: [fwproc] Waiting for Commands...
13,315,910 UART: [fwproc] Received command 0x46574c44
13,318,108 UART: [fwproc] Received Image of size 113760 bytes
22,345,369 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,423,396 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,492,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,807,961 >>> mbox cmd response: success
22,811,476 UART: [afmc] ++
22,812,067 UART: [afmc] CDI.KEYID = 6
22,812,978 UART: [afmc] SUBJECT.KEYID = 7
22,814,244 UART: [afmc] AUTHORITY.KEYID = 5
26,127,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,421,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,424,085 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,438,629 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,453,389 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,467,609 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,488,657 UART: [afmc] --
28,493,082 UART: [cold-reset] --
28,499,218 UART: [state] Locking Datavault
28,503,714 UART: [state] Locking PCR0, PCR1 and PCR31
28,505,468 UART: [state] Locking ICCM
28,507,428 UART: [exit] Launching FMC @ 0x40000130
28,515,816 UART:
28,516,045 UART: Running Caliptra FMC ...
28,517,069 UART:
28,517,217 UART: [state] CFI Enabled
28,525,047 UART: [fht] FMC Alias Private Key: 7
30,856,447 UART: [art] Extend RT PCRs Done
30,857,662 UART: [art] Lock RT PCRs Done
30,859,436 UART: [art] Populate DV Done
30,864,740 UART: [fht] FMC Alias Private Key: 7
30,866,490 UART: [art] Derive CDI
30,867,303 UART: [art] Store in in slot 0x4
30,909,813 UART: [art] Derive Key Pair
30,910,808 UART: [art] Store priv key in slot 0x5
34,152,967 UART: [art] Derive Key Pair - Done
34,166,178 UART: [art] Signing Cert with AUTHO
34,167,486 UART: RITY.KEYID = 7
36,447,323 UART: [art] Erasing AUTHORITY.KEYID = 7
36,448,824 UART: [art] PUB.X = 6E78DBFAC62C7188620BC3A86E334AF307C422D410C77688606422A2BB7676473B0EB3658EBB8A56AABE179FF05DC92A
36,456,041 UART: [art] PUB.Y = A049C2DF72ADE8252DB893EAB9B0801F04BD1926ECB2934CDD1A5389831881564280B4FEAA60D905A0C1A50747360923
36,463,302 UART: [art] SIG.R = A7FC876F5BF99CE0F5962C48E3A893BF159B94C252E63429995DDDFC13F8A99732DD8615E6AE0A5DC95813CA2A09A408
36,470,673 UART: [art] SIG.S = 336B65823B50E91A5F3930E747CCF83E907A7A87064E8B90A45D505D4738D0D7D82B88C7446A0AFC6FA0D43C9960BEA0
37,775,799 UART: Caliptra RT
37,776,501 UART: [state] CFI Enabled
37,894,611 UART: [rt] RT listening for mailbox commands...
37,896,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,052,102 UART: [rt]cmd =0x41544d4e, len=14344
44,477,484 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
4,130,172 ready_for_fw is high
4,130,661 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,122,883 >>> mbox cmd response: success
27,766,434 UART:
27,766,822 UART: Running Caliptra FMC ...
27,768,133 UART:
27,768,302 UART: [state] CFI Enabled
27,776,188 UART: [fht] FMC Alias Private Key: 7
30,106,667 UART: [art] Extend RT PCRs Done
30,107,898 UART: [art] Lock RT PCRs Done
30,109,394 UART: [art] Populate DV Done
30,114,860 UART: [fht] FMC Alias Private Key: 7
30,116,562 UART: [art] Derive CDI
30,117,294 UART: [art] Store in in slot 0x4
30,160,164 UART: [art] Derive Key Pair
30,161,204 UART: [art] Store priv key in slot 0x5
33,402,742 UART: [art] Derive Key Pair - Done
33,415,751 UART: [art] Signing Cert with AUTHO
33,417,052 UART: RITY.KEYID = 7
35,696,479 UART: [art] Erasing AUTHORITY.KEYID = 7
35,697,988 UART: [art] PUB.X = 3596B3903666156519D64FCE2DA75D9311B619B04AB6FFA10E5C296F460ADC0E792EDE2C402592A39BFE9E850941544C
35,705,229 UART: [art] PUB.Y = FFDAB2DD9B6FACC0C8EEA33DB760EFFCA517437022434A51F25B61BC0F997C3C477D8C19BE6940603820FCB9428CDFEA
35,712,484 UART: [art] SIG.R = 74F1F6A0A7F9E22A464DE9F6D9B46BED90DA37286EA170982961D09349144B49E7F95FE86DD2B7A8A94E50CD3DA78DB9
35,719,867 UART: [art] SIG.S = 2539942CA51EC96AE2A7137F6CDDE306822514816E75408B395ADFF564511F998A461DE22B57C60B46A6506CD26860B0
37,024,995 UART: Caliptra RT
37,025,717 UART: [state] CFI Enabled
37,143,459 UART: [rt] RT listening for mailbox commands...
37,145,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,300,916 UART: [rt]cmd =0x41544d4e, len=14344
43,726,594 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
192,624 UART:
193,001 UART: Running Caliptra ROM ...
194,211 UART:
194,369 UART: [state] CFI Enabled
262,660 UART: [state] LifecycleState = Unprovisioned
264,563 UART: [state] DebugLocked = No
266,233 UART: [state] WD Timer not started. Device not locked for debugging
269,264 UART: [kat] SHA2-256
448,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,957 UART: [kat] ++
460,481 UART: [kat] sha1
470,935 UART: [kat] SHA2-256
473,938 UART: [kat] SHA2-384
479,780 UART: [kat] SHA2-512-ACC
482,709 UART: [kat] ECC-384
2,949,743 UART: [kat] HMAC-384Kdf
2,973,136 UART: [kat] LMS
3,502,546 UART: [kat] --
3,507,070 UART: [cold-reset] ++
3,509,572 UART: [fht] FHT @ 0x50003400
3,520,686 UART: [idev] ++
3,521,244 UART: [idev] CDI.KEYID = 6
3,522,235 UART: [idev] SUBJECT.KEYID = 7
3,523,403 UART: [idev] UDS.KEYID = 0
3,524,322 ready_for_fw is high
3,524,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,057 UART: [idev] Erasing UDS.KEYID = 0
6,026,773 UART: [idev] Sha1 KeyId Algorithm
6,050,163 UART: [idev] --
6,052,805 UART: [ldev] ++
6,053,372 UART: [ldev] CDI.KEYID = 6
6,054,283 UART: [ldev] SUBJECT.KEYID = 5
6,055,492 UART: [ldev] AUTHORITY.KEYID = 7
6,056,724 UART: [ldev] FE.KEYID = 1
6,102,544 UART: [ldev] Erasing FE.KEYID = 1
8,607,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,758 UART: [ldev] --
10,413,699 UART: [fwproc] Wait for Commands...
10,415,468 UART: [fwproc] Recv command 0x46574c44
10,417,555 UART: [fwproc] Recv'd Img size: 114084 bytes
14,962,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,040,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,109,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,426,947 >>> mbox cmd response: success
15,430,956 UART: [afmc] ++
15,431,552 UART: [afmc] CDI.KEYID = 6
15,432,453 UART: [afmc] SUBJECT.KEYID = 7
15,433,669 UART: [afmc] AUTHORITY.KEYID = 5
17,973,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,698,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,700,222 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,716,199 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,732,155 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,747,937 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,770,849 UART: [afmc] --
19,775,342 UART: [cold-reset] --
19,778,665 UART: [state] Locking Datavault
19,784,393 UART: [state] Locking PCR0, PCR1 and PCR31
19,786,048 UART: [state] Locking ICCM
19,787,662 UART: [exit] Launching FMC @ 0x40000130
19,796,112 UART:
19,796,342 UART: Running Caliptra FMC ...
19,797,457 UART:
19,797,615 UART: [state] CFI Enabled
19,856,566 UART: [fht] FMC Alias Private Key: 7
21,619,705 UART: [art] Extend RT PCRs Done
21,620,926 UART: [art] Lock RT PCRs Done
21,623,035 UART: [art] Populate DV Done
21,628,283 UART: [fht] FMC Alias Private Key: 7
21,629,812 UART: [art] Derive CDI
21,630,621 UART: [art] Store in in slot 0x4
21,688,748 UART: [art] Derive Key Pair
21,689,785 UART: [art] Store priv key in slot 0x5
24,153,101 UART: [art] Derive Key Pair - Done
24,165,994 UART: [art] Signing Cert with AUTHO
24,167,292 UART: RITY.KEYID = 7
25,878,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,879,858 UART: [art] PUB.X = 92392AA8C8A03AD15A594A1DFB5C75F3FD714191DFCE065A86B7A68841D07D72E255DFEC107A722108763D5B69713DB0
25,887,114 UART: [art] PUB.Y = 3722063AAFDDA5F463F0E104D6DC4F37E753FB03A7324CCB0E1E2230D60034A0B4F892262BBBCD8B69B191B3F68BD5A3
25,894,397 UART: [art] SIG.R = E0F468CB4D2D696AFACBD32E5FE90D904AC6E3B38CD2C56D082D53B6073779A8A12BF59DBA598689C7EDC3FA1B89AD39
25,901,815 UART: [art] SIG.S = C759FDA6CFE988B8835DB5C375D9897A0F8388A267752DA7BA47180E640CE45EC5E3DD03A8A5376170CFB8A9F634BB0F
26,880,899 UART: Caliptra RT
26,881,605 UART: [state] CFI Enabled
27,046,555 UART: [rt] RT listening for mailbox commands...
27,049,023 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,409 UART: [rt]cmd =0x41544d4e, len=14344
30,882,247 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,507 writing to cptra_bootfsm_go
3,379,414 ready_for_fw is high
3,379,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,063,074 >>> mbox cmd response: success
19,340,992 UART:
19,341,399 UART: Running Caliptra FMC ...
19,342,592 UART:
19,342,760 UART: [state] CFI Enabled
19,409,683 UART: [fht] FMC Alias Private Key: 7
21,173,507 UART: [art] Extend RT PCRs Done
21,174,724 UART: [art] Lock RT PCRs Done
21,176,407 UART: [art] Populate DV Done
21,181,487 UART: [fht] FMC Alias Private Key: 7
21,182,988 UART: [art] Derive CDI
21,183,749 UART: [art] Store in in slot 0x4
21,242,581 UART: [art] Derive Key Pair
21,243,623 UART: [art] Store priv key in slot 0x5
23,706,710 UART: [art] Derive Key Pair - Done
23,719,714 UART: [art] Signing Cert with AUTHO
23,721,023 UART: RITY.KEYID = 7
25,432,363 UART: [art] Erasing AUTHORITY.KEYID = 7
25,433,862 UART: [art] PUB.X = 2A61FDE5F2C57399A85E1A26A25A022654EB279DB93F8D95B29692FF535A19CFE41747326DEB7B26245CF7429BFCA3B5
25,441,148 UART: [art] PUB.Y = B69F307D7721AF44AB3289F80180E8906CA9DEF80FF03BB147FBCB1F42809CAEE15036463E540ED36DB984777DF0E595
25,448,522 UART: [art] SIG.R = 7BA78BEBD55331E47813D60E4C0DAAB989229E1ECBDF5C969FF326648F49EDFEB47910B60D91FE3EBE82AADA84AF7604
25,455,868 UART: [art] SIG.S = 3BE78334DE05BBD966B907E415C65A27193E14E9F0EE8370D9551EA0B66A3C50C12220ADEF7AF4CB789CD1A2DD48D7C8
26,434,860 UART: Caliptra RT
26,435,567 UART: [state] CFI Enabled
26,599,273 UART: [rt] RT listening for mailbox commands...
26,601,602 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,756,940 UART: [rt]cmd =0x41544d4e, len=14344
30,437,176 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,894 writing to cptra_bootfsm_go
193,157 UART:
193,525 UART: Running Caliptra ROM ...
194,672 UART:
604,173 UART: [state] CFI Enabled
616,184 UART: [state] LifecycleState = Unprovisioned
617,989 UART: [state] DebugLocked = No
620,874 UART: [state] WD Timer not started. Device not locked for debugging
625,268 UART: [kat] SHA2-256
804,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,969 UART: [kat] ++
816,507 UART: [kat] sha1
828,096 UART: [kat] SHA2-256
831,106 UART: [kat] SHA2-384
837,383 UART: [kat] SHA2-512-ACC
840,328 UART: [kat] ECC-384
3,282,416 UART: [kat] HMAC-384Kdf
3,294,501 UART: [kat] LMS
3,823,957 UART: [kat] --
3,828,208 UART: [cold-reset] ++
3,830,432 UART: [fht] FHT @ 0x50003400
3,841,199 UART: [idev] ++
3,841,764 UART: [idev] CDI.KEYID = 6
3,842,649 UART: [idev] SUBJECT.KEYID = 7
3,843,893 UART: [idev] UDS.KEYID = 0
3,844,819 ready_for_fw is high
3,845,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,285 UART: [idev] Erasing UDS.KEYID = 0
6,321,611 UART: [idev] Sha1 KeyId Algorithm
6,345,018 UART: [idev] --
6,349,557 UART: [ldev] ++
6,350,135 UART: [ldev] CDI.KEYID = 6
6,351,016 UART: [ldev] SUBJECT.KEYID = 5
6,352,232 UART: [ldev] AUTHORITY.KEYID = 7
6,353,466 UART: [ldev] FE.KEYID = 1
6,365,006 UART: [ldev] Erasing FE.KEYID = 1
8,842,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,354 UART: [ldev] --
10,633,409 UART: [fwproc] Wait for Commands...
10,635,984 UART: [fwproc] Recv command 0x46574c44
10,638,080 UART: [fwproc] Recv'd Img size: 114084 bytes
15,219,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,297,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,366,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,683,522 >>> mbox cmd response: success
15,688,480 UART: [afmc] ++
15,689,077 UART: [afmc] CDI.KEYID = 6
15,689,985 UART: [afmc] SUBJECT.KEYID = 7
15,691,156 UART: [afmc] AUTHORITY.KEYID = 5
18,191,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,912,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,914,789 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,930,794 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,946,732 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,962,559 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,986,205 UART: [afmc] --
19,990,017 UART: [cold-reset] --
19,992,855 UART: [state] Locking Datavault
19,995,399 UART: [state] Locking PCR0, PCR1 and PCR31
19,997,045 UART: [state] Locking ICCM
19,998,174 UART: [exit] Launching FMC @ 0x40000130
20,006,628 UART:
20,006,883 UART: Running Caliptra FMC ...
20,008,013 UART:
20,008,178 UART: [state] CFI Enabled
20,016,500 UART: [fht] FMC Alias Private Key: 7
21,772,657 UART: [art] Extend RT PCRs Done
21,773,879 UART: [art] Lock RT PCRs Done
21,775,640 UART: [art] Populate DV Done
21,781,155 UART: [fht] FMC Alias Private Key: 7
21,782,801 UART: [art] Derive CDI
21,783,538 UART: [art] Store in in slot 0x4
21,826,021 UART: [art] Derive Key Pair
21,827,066 UART: [art] Store priv key in slot 0x5
24,254,042 UART: [art] Derive Key Pair - Done
24,266,988 UART: [art] Signing Cert with AUTHO
24,268,297 UART: RITY.KEYID = 7
25,973,339 UART: [art] Erasing AUTHORITY.KEYID = 7
25,974,850 UART: [art] PUB.X = F7DCEEBD580BE5EE2F62E2BCA9177E944C220452C2610889046E197A55A18E385091080BCAC35FCDD9526EE727075548
25,982,150 UART: [art] PUB.Y = F68F87BD56A07E4525E00E34E99F045B875CDF7A5579C2EE0A2610DE1E6E1BF60B2D6920B0C9DC5F3F52ABD0F1D92932
25,989,355 UART: [art] SIG.R = 15F7A35EA1CEFF68C1ED6C6C23302347CD34A0CE73A0BCCB8A2297713A61CD97B917FC9A2BB97747502ADB0F81D4B439
25,996,779 UART: [art] SIG.S = 56E9383511DFB64983A50EDE1578031C3DCFFB62014827A2806AA6991E7FC39A94273E0F5D0C5997724695BFEA04F548
26,976,154 UART: Caliptra RT
26,976,854 UART: [state] CFI Enabled
27,093,713 UART: [rt] RT listening for mailbox commands...
27,096,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,251,214 UART: [rt]cmd =0x41544d4e, len=14344
30,926,651 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
3,696,490 ready_for_fw is high
3,696,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,238,545 >>> mbox cmd response: success
19,481,344 UART:
19,481,733 UART: Running Caliptra FMC ...
19,482,841 UART:
19,482,993 UART: [state] CFI Enabled
19,490,809 UART: [fht] FMC Alias Private Key: 7
21,247,222 UART: [art] Extend RT PCRs Done
21,248,446 UART: [art] Lock RT PCRs Done
21,250,156 UART: [art] Populate DV Done
21,255,788 UART: [fht] FMC Alias Private Key: 7
21,257,338 UART: [art] Derive CDI
21,258,075 UART: [art] Store in in slot 0x4
21,300,724 UART: [art] Derive Key Pair
21,301,746 UART: [art] Store priv key in slot 0x5
23,728,259 UART: [art] Derive Key Pair - Done
23,741,103 UART: [art] Signing Cert with AUTHO
23,742,421 UART: RITY.KEYID = 7
25,448,001 UART: [art] Erasing AUTHORITY.KEYID = 7
25,449,522 UART: [art] PUB.X = 47C9964F4A833F8739D37E9D15AFDFD0993C065BB20569811E743822A409607F927E4024C48D7FE1DE09FA0076382E8B
25,456,750 UART: [art] PUB.Y = C6D33B9F9FE5D635627CFA6FED394EC1E1AE45A5E12F25A69C126140A5DDBD294C50CDEE730645196E4AEFCB4D2F1A1D
25,464,048 UART: [art] SIG.R = 11E37AE63FE6FC79AF22E3E7DB90D5DCAD145980B242A53542B997E79325B8D93171A7D2CEE34E55D504B6856B5F0F90
25,471,417 UART: [art] SIG.S = FB071757887C6E5F43978DA8010242C2CEBAD0EC395D7E3A7CAE70D0588F8F2E3A51A784FDFAAB8A13D00B4FA126F7A5
26,450,034 UART: Caliptra RT
26,450,730 UART: [state] CFI Enabled
26,567,737 UART: [rt] RT listening for mailbox commands...
26,570,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,725,597 UART: [rt]cmd =0x41544d4e, len=14344
30,405,754 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,614 UART:
192,991 UART: Running Caliptra ROM ...
194,085 UART:
194,232 UART: [state] CFI Enabled
265,510 UART: [state] LifecycleState = Unprovisioned
267,951 UART: [state] DebugLocked = No
269,616 UART: [state] WD Timer not started. Device not locked for debugging
274,374 UART: [kat] SHA2-256
464,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,024 UART: [kat] ++
475,474 UART: [kat] sha1
485,372 UART: [kat] SHA2-256
488,426 UART: [kat] SHA2-384
494,989 UART: [kat] SHA2-512-ACC
497,589 UART: [kat] ECC-384
2,946,072 UART: [kat] HMAC-384Kdf
2,969,506 UART: [kat] LMS
3,501,266 UART: [kat] --
3,504,486 UART: [cold-reset] ++
3,506,556 UART: [fht] FHT @ 0x50003400
3,518,238 UART: [idev] ++
3,518,948 UART: [idev] CDI.KEYID = 6
3,519,903 UART: [idev] SUBJECT.KEYID = 7
3,521,143 UART: [idev] UDS.KEYID = 0
3,522,040 ready_for_fw is high
3,522,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,807 UART: [idev] Erasing UDS.KEYID = 0
6,028,897 UART: [idev] Sha1 KeyId Algorithm
6,051,640 UART: [idev] --
6,055,689 UART: [ldev] ++
6,056,392 UART: [ldev] CDI.KEYID = 6
6,057,281 UART: [ldev] SUBJECT.KEYID = 5
6,058,496 UART: [ldev] AUTHORITY.KEYID = 7
6,059,679 UART: [ldev] FE.KEYID = 1
6,099,250 UART: [ldev] Erasing FE.KEYID = 1
8,605,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,671 UART: [ldev] --
10,411,437 UART: [fwproc] Wait for Commands...
10,413,261 UART: [fwproc] Recv command 0x46574c44
10,415,563 UART: [fwproc] Recv'd Img size: 114084 bytes
15,054,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,138,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,254,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,796,238 >>> mbox cmd response: success
15,800,818 UART: [afmc] ++
15,801,530 UART: [afmc] CDI.KEYID = 6
15,802,640 UART: [afmc] SUBJECT.KEYID = 7
15,804,187 UART: [afmc] AUTHORITY.KEYID = 5
18,336,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,061,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,063,518 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,078,574 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,093,761 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,108,654 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,132,107 UART: [afmc] --
20,135,861 UART: [cold-reset] --
20,139,401 UART: [state] Locking Datavault
20,145,310 UART: [state] Locking PCR0, PCR1 and PCR31
20,147,482 UART: [state] Locking ICCM
20,149,716 UART: [exit] Launching FMC @ 0x40000130
20,158,345 UART:
20,158,569 UART: Running Caliptra FMC ...
20,159,599 UART:
20,159,746 UART: [state] CFI Enabled
20,221,241 UART: [fht] FMC Alias Private Key: 7
21,984,982 UART: [art] Extend RT PCRs Done
21,986,205 UART: [art] Lock RT PCRs Done
21,987,644 UART: [art] Populate DV Done
21,993,114 UART: [fht] FMC Alias Private Key: 7
21,994,594 UART: [art] Derive CDI
21,995,354 UART: [art] Store in in slot 0x4
22,053,862 UART: [art] Derive Key Pair
22,054,908 UART: [art] Store priv key in slot 0x5
24,518,278 UART: [art] Derive Key Pair - Done
24,531,836 UART: [art] Signing Cert with AUTHO
24,533,143 UART: RITY.KEYID = 7
26,243,806 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,312 UART: [art] PUB.X = 06BC2833E2749B652E5AA9E3FD731EB1B21C704282065D5AB800438807B74D52E6B8CCD8CDFDCCC816FFAC056FB77D50
26,252,593 UART: [art] PUB.Y = 44AB99E9DDD6DFD66B4E0A4B0F098BE534C2ABCFB9454EA1E7A5AA3D6984DC878BD34363E4FD6CA07CFF0AD4E3A5BBD5
26,259,913 UART: [art] SIG.R = D8B81A3371D7578AD9814C7CDEA2BB307E1F791C05A35D83BA90842BD187ABE48387695C34336D6465BD1B900758F1D5
26,267,288 UART: [art] SIG.S = 8B0BF3FD350885A02DC7E0FA3F17AC75A0288D591F434CD01086368827FF2263BBE43141F5267A225B6EA4C9A4199161
27,246,408 UART: Caliptra RT
27,247,117 UART: [state] CFI Enabled
27,411,601 UART: [rt] RT listening for mailbox commands...
27,413,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,068 UART: [rt]cmd =0x41544d4e, len=14344
31,252,729 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,439,607 ready_for_fw is high
3,439,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,812,276 >>> mbox cmd response: success
20,095,111 UART:
20,095,509 UART: Running Caliptra FMC ...
20,096,646 UART:
20,096,803 UART: [state] CFI Enabled
20,162,359 UART: [fht] FMC Alias Private Key: 7
21,925,774 UART: [art] Extend RT PCRs Done
21,926,992 UART: [art] Lock RT PCRs Done
21,928,614 UART: [art] Populate DV Done
21,933,908 UART: [fht] FMC Alias Private Key: 7
21,935,442 UART: [art] Derive CDI
21,936,254 UART: [art] Store in in slot 0x4
21,994,636 UART: [art] Derive Key Pair
21,995,716 UART: [art] Store priv key in slot 0x5
24,459,920 UART: [art] Derive Key Pair - Done
24,472,770 UART: [art] Signing Cert with AUTHO
24,474,080 UART: RITY.KEYID = 7
26,185,389 UART: [art] Erasing AUTHORITY.KEYID = 7
26,186,894 UART: [art] PUB.X = ACE562EDA8496DD2B655B1C04D9EC91ACBD4A9295F7F5FBE1A83AC56AAB08D7128505E3FACEE74C3B62EE16AA392F9BE
26,194,203 UART: [art] PUB.Y = 2DA46D6AB1F82C1ED8FF17D142B6E26BFDA9BBE42928FDFFC6082A59538DA0EFBFE8A9CF6343B1D0847E8A977D32AFF3
26,201,517 UART: [art] SIG.R = 1021135567D5C13A89191CB1BE33116F57C4C24FD71D11DDED6114C0BC1CD3DE813392666C7DC809FFFF9B54CCCEE000
26,208,876 UART: [art] SIG.S = AF6C88148FDB8AAA5AAB2DD919158772B71E29AB76AAECC96F59DB4DE6E6A4B420C6FAAA20438D240FCE67F710D668C8
27,187,701 UART: Caliptra RT
27,188,422 UART: [state] CFI Enabled
27,353,445 UART: [rt] RT listening for mailbox commands...
27,355,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,511,074 UART: [rt]cmd =0x41544d4e, len=14344
31,198,650 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
192,868 UART:
193,230 UART: Running Caliptra ROM ...
194,301 UART:
604,131 UART: [state] CFI Enabled
617,246 UART: [state] LifecycleState = Unprovisioned
619,681 UART: [state] DebugLocked = No
621,082 UART: [state] WD Timer not started. Device not locked for debugging
625,472 UART: [kat] SHA2-256
815,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,165 UART: [kat] ++
826,775 UART: [kat] sha1
837,730 UART: [kat] SHA2-256
840,743 UART: [kat] SHA2-384
846,807 UART: [kat] SHA2-512-ACC
849,412 UART: [kat] ECC-384
3,290,714 UART: [kat] HMAC-384Kdf
3,304,524 UART: [kat] LMS
3,836,412 UART: [kat] --
3,841,055 UART: [cold-reset] ++
3,843,420 UART: [fht] FHT @ 0x50003400
3,854,471 UART: [idev] ++
3,855,210 UART: [idev] CDI.KEYID = 6
3,856,177 UART: [idev] SUBJECT.KEYID = 7
3,857,363 UART: [idev] UDS.KEYID = 0
3,858,297 ready_for_fw is high
3,858,491 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,805 UART: [idev] Erasing UDS.KEYID = 0
6,335,100 UART: [idev] Sha1 KeyId Algorithm
6,356,602 UART: [idev] --
6,359,954 UART: [ldev] ++
6,360,641 UART: [ldev] CDI.KEYID = 6
6,361,554 UART: [ldev] SUBJECT.KEYID = 5
6,362,716 UART: [ldev] AUTHORITY.KEYID = 7
6,363,947 UART: [ldev] FE.KEYID = 1
6,375,732 UART: [ldev] Erasing FE.KEYID = 1
8,854,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,023 UART: [ldev] --
10,644,407 UART: [fwproc] Wait for Commands...
10,646,837 UART: [fwproc] Recv command 0x46574c44
10,649,147 UART: [fwproc] Recv'd Img size: 114084 bytes
15,243,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,333,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,450,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,990,605 >>> mbox cmd response: success
15,995,482 UART: [afmc] ++
15,996,192 UART: [afmc] CDI.KEYID = 6
15,997,389 UART: [afmc] SUBJECT.KEYID = 7
15,998,833 UART: [afmc] AUTHORITY.KEYID = 5
18,502,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,222,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,223,978 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,239,051 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,254,275 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,269,107 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,292,635 UART: [afmc] --
20,296,661 UART: [cold-reset] --
20,302,322 UART: [state] Locking Datavault
20,308,776 UART: [state] Locking PCR0, PCR1 and PCR31
20,310,986 UART: [state] Locking ICCM
20,311,953 UART: [exit] Launching FMC @ 0x40000130
20,320,301 UART:
20,320,540 UART: Running Caliptra FMC ...
20,321,643 UART:
20,321,803 UART: [state] CFI Enabled
20,329,688 UART: [fht] FMC Alias Private Key: 7
22,086,962 UART: [art] Extend RT PCRs Done
22,088,192 UART: [art] Lock RT PCRs Done
22,089,714 UART: [art] Populate DV Done
22,095,188 UART: [fht] FMC Alias Private Key: 7
22,096,689 UART: [art] Derive CDI
22,097,452 UART: [art] Store in in slot 0x4
22,140,210 UART: [art] Derive Key Pair
22,141,261 UART: [art] Store priv key in slot 0x5
24,568,500 UART: [art] Derive Key Pair - Done
24,581,717 UART: [art] Signing Cert with AUTHO
24,583,020 UART: RITY.KEYID = 7
26,288,430 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,072 UART: [art] PUB.X = A5E63B4AD6872E2C602EE76F257485B451BA87A2DDA7D30669168D35A4BE9CACE8F45FFA7CB3681156E3340E3A5B3B9D
26,297,246 UART: [art] PUB.Y = 4C54598BFC5A037FF0D958487E510083B8785E56A10C4BA4FFB1034705B17B303EC80FD8858B1BC1066F99CADEEF0F1C
26,304,504 UART: [art] SIG.R = 5A0EC8C20B8C8233E8A364DE5A8B36FDF8BE894948AE55893C004296F81133B08CD7374E541F7226C34CC39AC9FEE0CB
26,311,877 UART: [art] SIG.S = 4EBBE7896EE3330E1D641A588D7F56B08AF7A0E9F702E2681C4C0DA567E86D56D2BFBBFDD16B0C6DD63324F1FA0D6FEB
27,291,259 UART: Caliptra RT
27,291,960 UART: [state] CFI Enabled
27,409,165 UART: [rt] RT listening for mailbox commands...
27,411,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,797 UART: [rt]cmd =0x41544d4e, len=14344
31,235,955 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,980 writing to cptra_bootfsm_go
3,756,225 ready_for_fw is high
3,756,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,034,184 >>> mbox cmd response: success
20,279,803 UART:
20,280,253 UART: Running Caliptra FMC ...
20,281,394 UART:
20,281,561 UART: [state] CFI Enabled
20,289,756 UART: [fht] FMC Alias Private Key: 7
22,046,106 UART: [art] Extend RT PCRs Done
22,047,334 UART: [art] Lock RT PCRs Done
22,048,963 UART: [art] Populate DV Done
22,054,443 UART: [fht] FMC Alias Private Key: 7
22,056,106 UART: [art] Derive CDI
22,056,928 UART: [art] Store in in slot 0x4
22,099,156 UART: [art] Derive Key Pair
22,100,205 UART: [art] Store priv key in slot 0x5
24,527,175 UART: [art] Derive Key Pair - Done
24,540,181 UART: [art] Signing Cert with AUTHO
24,541,494 UART: RITY.KEYID = 7
26,246,935 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,453 UART: [art] PUB.X = 838173CCB7E33B6831B5FCD07940D3E2094A8FE2CE16D2BC26C3BC299E2DD04BC3BB109B2F1FC26F7D6695E337BF80E3
26,255,762 UART: [art] PUB.Y = CC76DCF2E3C9DAD492E85BE23207B3A440CDF2DB602BE7BD0D09E63B5471EE8C91BF0FD85412305701B49A8D79710548
26,263,013 UART: [art] SIG.R = 5B8A01F8583E5A64095EB11630ED8048B38EAABAF6DC71BC61A477452D171CE4F60FD48F979C0B82F18EF8A93B21C9A1
26,270,408 UART: [art] SIG.S = 9D3FB0DF17C3E93E5CE12E9D76D44AAFB927163DB0544713E1797FB4C3D64B2D56CC69973792F3FEA642A3D3331037F2
27,249,296 UART: Caliptra RT
27,250,012 UART: [state] CFI Enabled
27,366,639 UART: [rt] RT listening for mailbox commands...
27,368,976 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,524,446 UART: [rt]cmd =0x41544d4e, len=14344
31,213,090 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,703 UART: [kat] SHA2-256
881,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,749 UART: [kat] ++
885,901 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,128 UART: [kat] HMAC-384Kdf
906,658 UART: [kat] LMS
1,474,854 UART: [kat] --
1,475,925 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,479,266 UART: [idev] ++
1,479,434 UART: [idev] CDI.KEYID = 6
1,479,794 UART: [idev] SUBJECT.KEYID = 7
1,480,218 UART: [idev] UDS.KEYID = 0
1,480,563 ready_for_fw is high
1,480,563 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,564 UART: [idev] Erasing UDS.KEYID = 0
1,504,810 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,270 UART: [idev] --
1,514,203 UART: [ldev] ++
1,514,371 UART: [ldev] CDI.KEYID = 6
1,514,734 UART: [ldev] SUBJECT.KEYID = 5
1,515,160 UART: [ldev] AUTHORITY.KEYID = 7
1,515,623 UART: [ldev] FE.KEYID = 1
1,520,901 UART: [ldev] Erasing FE.KEYID = 1
1,545,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,722 UART: [ldev] --
1,584,999 UART: [fwproc] Waiting for Commands...
1,585,728 UART: [fwproc] Received command 0x46574c44
1,586,519 UART: [fwproc] Received Image of size 114084 bytes
5,193,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,221,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,250,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,386,151 >>> mbox cmd response: success
5,387,205 UART: [afmc] ++
5,387,373 UART: [afmc] CDI.KEYID = 6
5,387,735 UART: [afmc] SUBJECT.KEYID = 7
5,388,160 UART: [afmc] AUTHORITY.KEYID = 5
5,423,492 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,439,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,440,498 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,446,207 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,452,099 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,457,800 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,465,772 UART: [afmc] --
5,466,884 UART: [cold-reset] --
5,468,054 UART: [state] Locking Datavault
5,469,205 UART: [state] Locking PCR0, PCR1 and PCR31
5,469,809 UART: [state] Locking ICCM
5,470,405 UART: [exit] Launching FMC @ 0x40000130
5,475,734 UART:
5,475,750 UART: Running Caliptra FMC ...
5,476,158 UART:
5,476,212 UART: [state] CFI Enabled
5,486,264 UART: [fht] FMC Alias Private Key: 7
5,594,364 UART: [art] Extend RT PCRs Done
5,594,792 UART: [art] Lock RT PCRs Done
5,596,474 UART: [art] Populate DV Done
5,604,370 UART: [fht] FMC Alias Private Key: 7
5,605,472 UART: [art] Derive CDI
5,605,752 UART: [art] Store in in slot 0x4
5,691,915 UART: [art] Derive Key Pair
5,692,275 UART: [art] Store priv key in slot 0x5
5,705,097 UART: [art] Derive Key Pair - Done
5,720,095 UART: [art] Signing Cert with AUTHO
5,720,575 UART: RITY.KEYID = 7
5,735,931 UART: [art] Erasing AUTHORITY.KEYID = 7
5,736,696 UART: [art] PUB.X = 32D76A9792DA3B1BC600DC3240E709D1BED072CA64FF797F472DE5910587E7A36A4F5CB07B682EB221805C79E2D9DD46
5,743,446 UART: [art] PUB.Y = A825C1CB101F9548D90D7021D869E896A594DF44AF4EEF8BAE7B2A1A4C007B2152C30252764EE79A8810BEF5FE271309
5,750,371 UART: [art] SIG.R = 17F8FD266E75725E1D5DBDF621B5A6A3823D1BD2354956648745755D72BF3D8280BD2AC6E81060BB300DC3A38D2E6081
5,757,140 UART: [art] SIG.S = 6FFDB7EFE70169D60B2997278015775B900CCD026FF45BF79AFE29D47A7E669EFF5634F042019096A551ACABE8526CAF
5,781,044 UART: Caliptra RT
5,781,297 UART: [state] CFI Enabled
5,890,247 UART: [rt] RT listening for mailbox commands...
5,890,917 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,345 UART: [rt]cmd =0x41544d4e, len=14344
7,144,066 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,527 ready_for_fw is high
1,362,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,010,361 >>> mbox cmd response: success
5,071,494 UART:
5,071,510 UART: Running Caliptra FMC ...
5,071,918 UART:
5,071,972 UART: [state] CFI Enabled
5,082,844 UART: [fht] FMC Alias Private Key: 7
5,190,804 UART: [art] Extend RT PCRs Done
5,191,232 UART: [art] Lock RT PCRs Done
5,192,702 UART: [art] Populate DV Done
5,200,646 UART: [fht] FMC Alias Private Key: 7
5,201,826 UART: [art] Derive CDI
5,202,106 UART: [art] Store in in slot 0x4
5,287,869 UART: [art] Derive Key Pair
5,288,229 UART: [art] Store priv key in slot 0x5
5,301,547 UART: [art] Derive Key Pair - Done
5,316,531 UART: [art] Signing Cert with AUTHO
5,317,011 UART: RITY.KEYID = 7
5,332,017 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,782 UART: [art] PUB.X = B64621C7EB4714CF993C8886C9CD9051017C1EA40ADACEA7A66FBE117EC9A1A0C7D4D5C874EADA66CD7BF89DC3FE6ACF
5,339,576 UART: [art] PUB.Y = 6C7BEBFCA8B4FAF9211B3CE0054DB23218C2C17594953E2CC8A64CD61343B79D0D823E024BDA8405C20063CF03C6110D
5,346,496 UART: [art] SIG.R = EEC9309C2B85694164EB15739A1825FBE74ED09C8198E92C7DF59631E5CBF98D6656A790BD03D507AED9E3ED17973DDF
5,353,270 UART: [art] SIG.S = 0B16AEE19CA33555FD1EC552C6BC785AE7623C162EF0B6D136F8845A5781FE96C61610489E62C52768A7AE21D2A4961B
5,377,006 UART: Caliptra RT
5,377,259 UART: [state] CFI Enabled
5,484,866 UART: [rt] RT listening for mailbox commands...
5,485,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,609,074 UART: [rt]cmd =0x41544d4e, len=14344
6,739,023 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,618 UART: [kat] SHA2-256
892,556 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,120 UART: [cold-reset] ++
1,476,598 UART: [fht] Storing FHT @ 0x50003400
1,479,375 UART: [idev] ++
1,479,543 UART: [idev] CDI.KEYID = 6
1,479,903 UART: [idev] SUBJECT.KEYID = 7
1,480,327 UART: [idev] UDS.KEYID = 0
1,480,672 ready_for_fw is high
1,480,672 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,219 UART: [idev] Erasing UDS.KEYID = 0
1,505,069 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,661 UART: [idev] --
1,514,628 UART: [ldev] ++
1,514,796 UART: [ldev] CDI.KEYID = 6
1,515,159 UART: [ldev] SUBJECT.KEYID = 5
1,515,585 UART: [ldev] AUTHORITY.KEYID = 7
1,516,048 UART: [ldev] FE.KEYID = 1
1,521,408 UART: [ldev] Erasing FE.KEYID = 1
1,547,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,389 UART: [ldev] --
1,586,888 UART: [fwproc] Waiting for Commands...
1,587,549 UART: [fwproc] Received command 0x46574c44
1,588,340 UART: [fwproc] Received Image of size 114084 bytes
5,005,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,033,882 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,063,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,198,631 >>> mbox cmd response: success
5,199,721 UART: [afmc] ++
5,199,889 UART: [afmc] CDI.KEYID = 6
5,200,251 UART: [afmc] SUBJECT.KEYID = 7
5,200,676 UART: [afmc] AUTHORITY.KEYID = 5
5,235,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,252,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,252,792 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,258,501 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,264,393 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,270,094 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,277,770 UART: [afmc] --
5,278,764 UART: [cold-reset] --
5,279,316 UART: [state] Locking Datavault
5,280,471 UART: [state] Locking PCR0, PCR1 and PCR31
5,281,075 UART: [state] Locking ICCM
5,281,721 UART: [exit] Launching FMC @ 0x40000130
5,287,050 UART:
5,287,066 UART: Running Caliptra FMC ...
5,287,474 UART:
5,287,617 UART: [state] CFI Enabled
5,298,415 UART: [fht] FMC Alias Private Key: 7
5,406,445 UART: [art] Extend RT PCRs Done
5,406,873 UART: [art] Lock RT PCRs Done
5,408,421 UART: [art] Populate DV Done
5,416,447 UART: [fht] FMC Alias Private Key: 7
5,417,535 UART: [art] Derive CDI
5,417,815 UART: [art] Store in in slot 0x4
5,503,534 UART: [art] Derive Key Pair
5,503,894 UART: [art] Store priv key in slot 0x5
5,516,626 UART: [art] Derive Key Pair - Done
5,531,729 UART: [art] Signing Cert with AUTHO
5,532,209 UART: RITY.KEYID = 7
5,547,493 UART: [art] Erasing AUTHORITY.KEYID = 7
5,548,258 UART: [art] PUB.X = 381080E126AC00953CC85D9A264285400583D9B722C6390C74C331D6FE1B943E0A2B18DD9A2D299BBFEB418734D6C04C
5,554,997 UART: [art] PUB.Y = 4ED4880591B2694D649BAA497B139695338776089C861A122E3858CA427A7C2FB033A85DFBAA12E5E04E314DEB291E10
5,561,939 UART: [art] SIG.R = 6E9E5D21780F6E8AB1B662B680A0398C1A85537B688C9637C07875BACB6FE5CF2E5136B80FC99A3DBC65B41B8500DB57
5,568,689 UART: [art] SIG.S = 1E568964FC7A18747732B4E942A7E36FCCACC652593B26D6AC8E4788B963EF7FC80F43EB3F77CF370A945B810A7A9B4A
5,592,267 UART: Caliptra RT
5,592,612 UART: [state] CFI Enabled
5,699,950 UART: [rt] RT listening for mailbox commands...
5,700,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,823,502 UART: [rt]cmd =0x41544d4e, len=14344
6,953,053 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 ready_for_fw is high
1,362,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,312,030 >>> mbox cmd response: success
5,373,453 UART:
5,373,469 UART: Running Caliptra FMC ...
5,373,877 UART:
5,374,020 UART: [state] CFI Enabled
5,384,942 UART: [fht] FMC Alias Private Key: 7
5,492,864 UART: [art] Extend RT PCRs Done
5,493,292 UART: [art] Lock RT PCRs Done
5,494,622 UART: [art] Populate DV Done
5,502,924 UART: [fht] FMC Alias Private Key: 7
5,504,022 UART: [art] Derive CDI
5,504,302 UART: [art] Store in in slot 0x4
5,590,371 UART: [art] Derive Key Pair
5,590,731 UART: [art] Store priv key in slot 0x5
5,604,315 UART: [art] Derive Key Pair - Done
5,619,161 UART: [art] Signing Cert with AUTHO
5,619,641 UART: RITY.KEYID = 7
5,635,157 UART: [art] Erasing AUTHORITY.KEYID = 7
5,635,922 UART: [art] PUB.X = B77B04BD9D28942B39E7C3CD76AA63CD70CF1242232426640E9C9F5BFC348C955D790554C2022E210F032F41647ACFDE
5,642,678 UART: [art] PUB.Y = 63FEDE8B52F16CBE018936FCD65A9012E831335DB69F258E95A535D6EFE3B7FF01770244691F1CB68B247411A9E26AC9
5,649,625 UART: [art] SIG.R = 51B445B682FFFF71D6D40CB08903FC4BA8B65183BC323940F0F431574603205055B139EBEC17EAB18251A46246B93D01
5,656,381 UART: [art] SIG.S = 09C6924314CD258C1E6BEBBDA368FB10AECB0D6E1D2FBC7F4CAA8FFEA3A937556A4957EE47BD20460E19874D5DC11DE9
5,680,687 UART: Caliptra RT
5,681,032 UART: [state] CFI Enabled
5,789,512 UART: [rt] RT listening for mailbox commands...
5,790,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,184 UART: [rt]cmd =0x41544d4e, len=14344
7,033,513 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,765 UART: [kat] SHA2-256
903,705 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
918,504 UART: [kat] HMAC-384Kdf
923,032 UART: [kat] LMS
1,171,360 UART: [kat] --
1,172,261 UART: [cold-reset] ++
1,172,643 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 ready_for_fw is high
1,176,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,120 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,217,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,903 UART: [ldev] --
1,283,324 UART: [fwproc] Wait for Commands...
1,284,126 UART: [fwproc] Recv command 0x46574c44
1,284,854 UART: [fwproc] Recv'd Img size: 114084 bytes
3,119,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,621 >>> mbox cmd response: success
3,312,689 UART: [afmc] ++
3,312,857 UART: [afmc] CDI.KEYID = 6
3,313,219 UART: [afmc] SUBJECT.KEYID = 7
3,313,644 UART: [afmc] AUTHORITY.KEYID = 5
3,348,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,029 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,738 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,630 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,341 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,108 UART: [afmc] --
3,392,194 UART: [cold-reset] --
3,392,940 UART: [state] Locking Datavault
3,394,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,909 UART: [state] Locking ICCM
3,395,343 UART: [exit] Launching FMC @ 0x40000130
3,400,672 UART:
3,400,688 UART: Running Caliptra FMC ...
3,401,096 UART:
3,401,150 UART: [state] CFI Enabled
3,411,654 UART: [fht] FMC Alias Private Key: 7
3,519,176 UART: [art] Extend RT PCRs Done
3,519,604 UART: [art] Lock RT PCRs Done
3,521,176 UART: [art] Populate DV Done
3,529,302 UART: [fht] FMC Alias Private Key: 7
3,530,338 UART: [art] Derive CDI
3,530,618 UART: [art] Store in in slot 0x4
3,616,349 UART: [art] Derive Key Pair
3,616,709 UART: [art] Store priv key in slot 0x5
3,629,503 UART: [art] Derive Key Pair - Done
3,644,336 UART: [art] Signing Cert with AUTHO
3,644,816 UART: RITY.KEYID = 7
3,659,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,609 UART: [art] PUB.X = 5AE3BB9A371FFA36747CED89D0D30C300907A4D9811DA221C3212F5A0697364342A2F09A8C05EE019A3F0EDBA3DFF0B7
3,667,370 UART: [art] PUB.Y = 88DB8DE0B3BA048A9FEF4F2535D66DF90396AE16B3EA8C789E39B08774336662E5FEF1BA8399D1C06317D354154DED1B
3,674,324 UART: [art] SIG.R = 74BB8587D04046B58CEE2E5686648C7B770D3197A6C58C52CC606A59836657E3BFC90AD5172AB1702BAA18A90BF95E0A
3,681,086 UART: [art] SIG.S = 2409834522C7AF717FA65D76937FD71B9B050E87D56B83EBE5C606787F1BE42C69F368616259A9287B37BFA0881DE090
3,704,899 UART: Caliptra RT
3,705,152 UART: [state] CFI Enabled
3,813,049 UART: [rt] RT listening for mailbox commands...
3,813,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,971 UART: [rt]cmd =0x41544d4e, len=14344
5,067,172 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 ready_for_fw is high
1,060,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,836 >>> mbox cmd response: success
3,234,789 UART:
3,234,805 UART: Running Caliptra FMC ...
3,235,213 UART:
3,235,267 UART: [state] CFI Enabled
3,245,581 UART: [fht] FMC Alias Private Key: 7
3,354,061 UART: [art] Extend RT PCRs Done
3,354,489 UART: [art] Lock RT PCRs Done
3,356,283 UART: [art] Populate DV Done
3,364,527 UART: [fht] FMC Alias Private Key: 7
3,365,473 UART: [art] Derive CDI
3,365,753 UART: [art] Store in in slot 0x4
3,450,938 UART: [art] Derive Key Pair
3,451,298 UART: [art] Store priv key in slot 0x5
3,464,602 UART: [art] Derive Key Pair - Done
3,479,474 UART: [art] Signing Cert with AUTHO
3,479,954 UART: RITY.KEYID = 7
3,495,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,233 UART: [art] PUB.X = 03D6B369067CAAA2FE1CC1E0A4B852176C09F665BE44DA0BCEFEB349BCABF9E3E8EC313EA34C39DA8FAB93FF53BEAE5D
3,503,027 UART: [art] PUB.Y = D49E45168C370CFFE0D313C30D64D61F1E575DA2BC3DEC0F782B0D620EEBE405EECC77C7DA5087114E2B365F9A4B90E1
3,509,977 UART: [art] SIG.R = 6811DA8BD7B8E3CDA33AA5132B8FA141C197DB2964A7F88BB6285E5EEB7167B8277ED1DDC00D03A60935F326D2AC8EA6
3,516,754 UART: [art] SIG.S = 2159D3C82A69CD37D3C7C898CC58238951303635C7AB40E6CC7710850EC2EDEDD44FDD073E94EC2AA6B7D7C534595218
3,540,323 UART: Caliptra RT
3,540,576 UART: [state] CFI Enabled
3,647,829 UART: [rt] RT listening for mailbox commands...
3,648,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,703 UART: [rt]cmd =0x41544d4e, len=14344
4,898,751 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,445 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,154 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,449 UART: [idev] Erasing UDS.KEYID = 0
1,201,416 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,736 UART: [ldev] ++
1,210,904 UART: [ldev] CDI.KEYID = 6
1,211,267 UART: [ldev] SUBJECT.KEYID = 5
1,211,693 UART: [ldev] AUTHORITY.KEYID = 7
1,212,156 UART: [ldev] FE.KEYID = 1
1,217,614 UART: [ldev] Erasing FE.KEYID = 1
1,244,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,332 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,389 UART: [fwproc] Recv command 0x46574c44
1,285,117 UART: [fwproc] Recv'd Img size: 114084 bytes
3,116,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,309,337 >>> mbox cmd response: success
3,310,501 UART: [afmc] ++
3,310,669 UART: [afmc] CDI.KEYID = 6
3,311,031 UART: [afmc] SUBJECT.KEYID = 7
3,311,456 UART: [afmc] AUTHORITY.KEYID = 5
3,346,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,815 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,524 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,416 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,127 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,006 UART: [afmc] --
3,389,980 UART: [cold-reset] --
3,390,686 UART: [state] Locking Datavault
3,391,799 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,403 UART: [state] Locking ICCM
3,392,995 UART: [exit] Launching FMC @ 0x40000130
3,398,324 UART:
3,398,340 UART: Running Caliptra FMC ...
3,398,748 UART:
3,398,891 UART: [state] CFI Enabled
3,409,323 UART: [fht] FMC Alias Private Key: 7
3,517,157 UART: [art] Extend RT PCRs Done
3,517,585 UART: [art] Lock RT PCRs Done
3,519,043 UART: [art] Populate DV Done
3,527,325 UART: [fht] FMC Alias Private Key: 7
3,528,503 UART: [art] Derive CDI
3,528,783 UART: [art] Store in in slot 0x4
3,614,918 UART: [art] Derive Key Pair
3,615,278 UART: [art] Store priv key in slot 0x5
3,628,840 UART: [art] Derive Key Pair - Done
3,643,742 UART: [art] Signing Cert with AUTHO
3,644,222 UART: RITY.KEYID = 7
3,659,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,403 UART: [art] PUB.X = 069ECEC6F1F2A8C8926B657F7CB3BA5490417935D001314931F080A51D717586A5E33DCEEA8A15AE1203EBDC34AEDEEC
3,667,178 UART: [art] PUB.Y = B20E4C0EC0721342C3203114D9C5F78AD298487011519D57B448A195FD3EDBB2F4D0570434B902D2160BABB6C74842A9
3,674,111 UART: [art] SIG.R = 84319F6A3E440EDEBC4C1DCD981DDA101D4F14D2DC44F51E1E4A7E62CEBDD51B7AB11EF7BF6A92D9783EE8E587CC474A
3,680,906 UART: [art] SIG.S = 3D6D1129FE44A9E8FDFBEE7E52EAD351A2E2F1BC38E15DBC82EF92D68963CEE9320D49A70A584DEC4DDD2B5DCE1DF520
3,705,143 UART: Caliptra RT
3,705,488 UART: [state] CFI Enabled
3,813,722 UART: [rt] RT listening for mailbox commands...
3,814,392 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,464 UART: [rt]cmd =0x41544d4e, len=14344
5,060,216 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,476 ready_for_fw is high
1,061,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,177,552 >>> mbox cmd response: success
3,239,121 UART:
3,239,137 UART: Running Caliptra FMC ...
3,239,545 UART:
3,239,688 UART: [state] CFI Enabled
3,250,256 UART: [fht] FMC Alias Private Key: 7
3,357,966 UART: [art] Extend RT PCRs Done
3,358,394 UART: [art] Lock RT PCRs Done
3,359,970 UART: [art] Populate DV Done
3,368,088 UART: [fht] FMC Alias Private Key: 7
3,369,098 UART: [art] Derive CDI
3,369,378 UART: [art] Store in in slot 0x4
3,455,193 UART: [art] Derive Key Pair
3,455,553 UART: [art] Store priv key in slot 0x5
3,468,835 UART: [art] Derive Key Pair - Done
3,483,689 UART: [art] Signing Cert with AUTHO
3,484,169 UART: RITY.KEYID = 7
3,499,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,846 UART: [art] PUB.X = 9D1ACBF4B937D3A557DA805F4648C5FCE389F3B2692E58B70F5999CFB6B02658E53944E66887A467C9549832028A31B3
3,506,608 UART: [art] PUB.Y = 5F478EE9EA61B06608C38A249A6836A511557E05D94CBDCEB5C7B7161090163107CCD1B1346F51F2C447537974F54BE5
3,513,547 UART: [art] SIG.R = D2EC8163EF36F2FB59AB7BEACB2B99DC071435F60B14E05D64463F9759476E5A4B782DCACE6FD02DE860BBE3E2D6E377
3,520,331 UART: [art] SIG.S = 76B9D58B53BD7F8BEDCB2605C2FB2580BA12A084197EE43CD54BABDCBB6DC3CF6E01CF9E2D82D7036F8D79439A48C00A
3,544,300 UART: Caliptra RT
3,544,645 UART: [state] CFI Enabled
3,652,361 UART: [rt] RT listening for mailbox commands...
3,653,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,909 UART: [rt]cmd =0x41544d4e, len=14344
4,893,543 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,174,079 ready_for_fw is high
1,174,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,172 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,836 UART: [ldev] --
1,281,112 UART: [fwproc] Wait for Commands...
1,281,799 UART: [fwproc] Recv command 0x46574c44
1,282,532 UART: [fwproc] Recv'd Img size: 114084 bytes
3,118,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,383 >>> mbox cmd response: success
3,312,562 UART: [afmc] ++
3,312,730 UART: [afmc] CDI.KEYID = 6
3,313,093 UART: [afmc] SUBJECT.KEYID = 7
3,313,519 UART: [afmc] AUTHORITY.KEYID = 5
3,349,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,622 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,332 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,222 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,933 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,747 UART: [afmc] --
3,392,755 UART: [cold-reset] --
3,393,565 UART: [state] Locking Datavault
3,394,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,422 UART: [state] Locking ICCM
3,395,926 UART: [exit] Launching FMC @ 0x40000130
3,401,255 UART:
3,401,271 UART: Running Caliptra FMC ...
3,401,679 UART:
3,401,733 UART: [state] CFI Enabled
3,412,213 UART: [fht] FMC Alias Private Key: 7
3,520,313 UART: [art] Extend RT PCRs Done
3,520,741 UART: [art] Lock RT PCRs Done
3,522,353 UART: [art] Populate DV Done
3,530,771 UART: [fht] FMC Alias Private Key: 7
3,531,789 UART: [art] Derive CDI
3,532,069 UART: [art] Store in in slot 0x4
3,617,792 UART: [art] Derive Key Pair
3,618,152 UART: [art] Store priv key in slot 0x5
3,631,400 UART: [art] Derive Key Pair - Done
3,646,642 UART: [art] Signing Cert with AUTHO
3,647,122 UART: RITY.KEYID = 7
3,662,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,085 UART: [art] PUB.X = 73A4D7BD72E7FD80A4948739D8DC0F5D5D446D59A1DBFBF8F38ABDA002996E006CA555AF40F5BAFD08C7B2E3AA90C8FE
3,669,850 UART: [art] PUB.Y = BEA6E1CE3CB1CC6A3457DBA8756A0D014B8C81CAE40C23D9A051DC746071E80C64141EF5797B550F32A72ED9B2FFF84C
3,676,803 UART: [art] SIG.R = A20A4945EB53FBEB1C764BF8D28C16EFBC57B78A5E1BCA899C351E039F61BF52C2620E1BB919423C37CD155D4CB2AA35
3,683,582 UART: [art] SIG.S = 6145818ED2F5E99E4BF82CFEB2587409C180F906F0ABD982C6EA99D7D81F0754743548B87AED78AFF0B9B1371C1D3F01
3,707,567 UART: Caliptra RT
3,707,820 UART: [state] CFI Enabled
3,815,020 UART: [rt] RT listening for mailbox commands...
3,815,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,868 UART: [rt]cmd =0x41544d4e, len=14344
5,051,244 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,644 ready_for_fw is high
1,056,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,853 >>> mbox cmd response: success
3,235,404 UART:
3,235,420 UART: Running Caliptra FMC ...
3,235,828 UART:
3,235,882 UART: [state] CFI Enabled
3,246,478 UART: [fht] FMC Alias Private Key: 7
3,354,864 UART: [art] Extend RT PCRs Done
3,355,292 UART: [art] Lock RT PCRs Done
3,356,730 UART: [art] Populate DV Done
3,364,960 UART: [fht] FMC Alias Private Key: 7
3,365,982 UART: [art] Derive CDI
3,366,262 UART: [art] Store in in slot 0x4
3,451,799 UART: [art] Derive Key Pair
3,452,159 UART: [art] Store priv key in slot 0x5
3,465,683 UART: [art] Derive Key Pair - Done
3,480,311 UART: [art] Signing Cert with AUTHO
3,480,791 UART: RITY.KEYID = 7
3,496,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,052 UART: [art] PUB.X = 12379F23296ECCA89FA70E91494583EEE5758CDB391603E795AF1191E5840E6DA7B5826F02DAE4B178ECE7EC0236B088
3,503,811 UART: [art] PUB.Y = E31F3B2CE74E1754B79FAD82454EC1F082341C28F63857D846666A44BECD138CB249A40FE98825510850C4DC966B9B07
3,510,752 UART: [art] SIG.R = 7B29DFA0B28525D25079D285052E4A36F507C49FCD8975325A2BC522858F62187CC2885E954F52B0D51C070FFB085DE4
3,517,505 UART: [art] SIG.S = 7C94F7C79FFF095FC0F0FB98DFABB5449FAD1A05E44FD63F0F5E07C7839453716081E03BBFC7612AA56F01F9F8D2FCBF
3,541,861 UART: Caliptra RT
3,542,114 UART: [state] CFI Enabled
3,649,349 UART: [rt] RT listening for mailbox commands...
3,650,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,023 UART: [rt]cmd =0x41544d4e, len=14344
4,876,203 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,622 UART: [cold-reset] ++
1,170,008 UART: [fht] FHT @ 0x50003400
1,172,768 UART: [idev] ++
1,172,936 UART: [idev] CDI.KEYID = 6
1,173,297 UART: [idev] SUBJECT.KEYID = 7
1,173,722 UART: [idev] UDS.KEYID = 0
1,174,068 ready_for_fw is high
1,174,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,198,984 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,457 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,413 UART: [ldev] --
1,280,819 UART: [fwproc] Wait for Commands...
1,281,556 UART: [fwproc] Recv command 0x46574c44
1,282,289 UART: [fwproc] Recv'd Img size: 114084 bytes
3,116,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,308,415 >>> mbox cmd response: success
3,309,548 UART: [afmc] ++
3,309,716 UART: [afmc] CDI.KEYID = 6
3,310,079 UART: [afmc] SUBJECT.KEYID = 7
3,310,505 UART: [afmc] AUTHORITY.KEYID = 5
3,346,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,480 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,190 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,080 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,791 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,617 UART: [afmc] --
3,389,605 UART: [cold-reset] --
3,390,377 UART: [state] Locking Datavault
3,391,578 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,182 UART: [state] Locking ICCM
3,392,656 UART: [exit] Launching FMC @ 0x40000130
3,397,985 UART:
3,398,001 UART: Running Caliptra FMC ...
3,398,409 UART:
3,398,552 UART: [state] CFI Enabled
3,409,034 UART: [fht] FMC Alias Private Key: 7
3,517,048 UART: [art] Extend RT PCRs Done
3,517,476 UART: [art] Lock RT PCRs Done
3,519,132 UART: [art] Populate DV Done
3,527,340 UART: [fht] FMC Alias Private Key: 7
3,528,470 UART: [art] Derive CDI
3,528,750 UART: [art] Store in in slot 0x4
3,614,433 UART: [art] Derive Key Pair
3,614,793 UART: [art] Store priv key in slot 0x5
3,627,997 UART: [art] Derive Key Pair - Done
3,642,892 UART: [art] Signing Cert with AUTHO
3,643,372 UART: RITY.KEYID = 7
3,658,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,245 UART: [art] PUB.X = 113AC74EE221416C1916EFF88F8629DF61AA2B8069663AE593CAE5872DC543BB1611752FBA2D85B6697F7F609AA03512
3,666,017 UART: [art] PUB.Y = 41DAC41D55CFCEAA92EF3C2018214932246FBAEA8A4D40EEC8A52CFA9338A34221C2804548E9C2BA26725211AA465AA5
3,672,979 UART: [art] SIG.R = 72F154DF8021612175EC3FA9D182E0F2C4A5D1DFB096635A4C327F6AC9890E2B0781762D94661DAA10922CB6BAB0D4E6
3,679,749 UART: [art] SIG.S = B9A79AA886C8E09BF5F6DA78D5E7011FD0A1F682B10894EB9214EFEF173966C0EF951AEDB6BDAF1F59D41519B630553B
3,703,528 UART: Caliptra RT
3,703,873 UART: [state] CFI Enabled
3,811,869 UART: [rt] RT listening for mailbox commands...
3,812,539 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,655 UART: [rt]cmd =0x41544d4e, len=14344
5,070,844 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,659 ready_for_fw is high
1,056,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,933 >>> mbox cmd response: success
3,227,954 UART:
3,227,970 UART: Running Caliptra FMC ...
3,228,378 UART:
3,228,521 UART: [state] CFI Enabled
3,239,229 UART: [fht] FMC Alias Private Key: 7
3,346,835 UART: [art] Extend RT PCRs Done
3,347,263 UART: [art] Lock RT PCRs Done
3,349,021 UART: [art] Populate DV Done
3,356,945 UART: [fht] FMC Alias Private Key: 7
3,357,901 UART: [art] Derive CDI
3,358,181 UART: [art] Store in in slot 0x4
3,444,050 UART: [art] Derive Key Pair
3,444,410 UART: [art] Store priv key in slot 0x5
3,458,014 UART: [art] Derive Key Pair - Done
3,472,562 UART: [art] Signing Cert with AUTHO
3,473,042 UART: RITY.KEYID = 7
3,488,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,873 UART: [art] PUB.X = 270D49FECE7A037FE7CAEFED70F8A2548F90C9C2AEA4B804D44EC26EE387ADEBA27FE0797A284C045D43DD2AFE23C039
3,495,657 UART: [art] PUB.Y = BAFF5FBA67FA08AA559BC04B61DC66D348F9A281D0E901FA4470CD3391F9F7587D9E1B0179BDEE6F9C3311847C2509A2
3,502,609 UART: [art] SIG.R = 125597CA913CDD4D861F0AC44A1577F8492A4784F77D1ACA4960D3C30C6E28DFBED9E95E60B6C5C0EBCC33FE2FCFBB57
3,509,395 UART: [art] SIG.S = 3A890F58112F87270119D739E91CA8F1360718EE909613EF2E87E7F1615A056DB4154FC736533627AC76B682316ACDE2
3,532,864 UART: Caliptra RT
3,533,209 UART: [state] CFI Enabled
3,640,246 UART: [rt] RT listening for mailbox commands...
3,640,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,814 UART: [rt]cmd =0x41544d4e, len=14344
4,891,212 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,027 UART:
192,416 UART: Running Caliptra ROM ...
193,505 UART:
193,650 UART: [state] CFI Enabled
262,240 UART: [state] LifecycleState = Unprovisioned
264,342 UART: [state] DebugLocked = No
266,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,157 UART: [kat] SHA2-256
440,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,343 UART: [kat] ++
451,880 UART: [kat] sha1
462,478 UART: [kat] SHA2-256
465,127 UART: [kat] SHA2-384
471,540 UART: [kat] SHA2-512-ACC
473,905 UART: [kat] ECC-384
2,766,415 UART: [kat] HMAC-384Kdf
2,799,284 UART: [kat] LMS
3,989,542 UART: [kat] --
3,994,263 UART: [cold-reset] ++
3,995,344 UART: [fht] Storing FHT @ 0x50003400
4,005,939 UART: [idev] ++
4,006,507 UART: [idev] CDI.KEYID = 6
4,007,396 UART: [idev] SUBJECT.KEYID = 7
4,008,645 UART: [idev] UDS.KEYID = 0
4,009,607 ready_for_fw is high
4,009,808 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,910 UART: [idev] Erasing UDS.KEYID = 0
7,345,384 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,446 UART: [idev] --
7,372,146 UART: [ldev] ++
7,372,771 UART: [ldev] CDI.KEYID = 6
7,373,693 UART: [ldev] SUBJECT.KEYID = 5
7,374,926 UART: [ldev] AUTHORITY.KEYID = 7
7,376,114 UART: [ldev] FE.KEYID = 1
7,422,309 UART: [ldev] Erasing FE.KEYID = 1
10,753,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,900 UART: [ldev] --
13,115,489 UART: [fwproc] Waiting for Commands...
13,117,970 UART: [fwproc] Received command 0x46574c44
13,120,154 UART: [fwproc] Received Image of size 113760 bytes
21,595,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,676,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,745,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,061,427 >>> mbox cmd response: success
22,066,288 UART: [afmc] ++
22,066,885 UART: [afmc] CDI.KEYID = 6
22,067,832 UART: [afmc] SUBJECT.KEYID = 7
22,069,046 UART: [afmc] AUTHORITY.KEYID = 5
25,442,022 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,742,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,744,612 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,759,133 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,773,915 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,788,129 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,809,326 UART: [afmc] --
27,813,187 UART: [cold-reset] --
27,816,837 UART: [state] Locking Datavault
27,823,540 UART: [state] Locking PCR0, PCR1 and PCR31
27,825,294 UART: [state] Locking ICCM
27,827,769 UART: [exit] Launching FMC @ 0x40000130
27,836,189 UART:
27,836,435 UART: Running Caliptra FMC ...
27,837,540 UART:
27,837,722 UART: [state] CFI Enabled
27,902,634 UART: [fht] FMC Alias Private Key: 7
30,240,881 UART: [art] Extend RT PCRs Done
30,242,105 UART: [art] Lock RT PCRs Done
30,243,978 UART: [art] Populate DV Done
30,249,387 UART: [fht] FMC Alias Private Key: 7
30,250,922 UART: [art] Derive CDI
30,251,656 UART: [art] Store in in slot 0x4
30,311,613 UART: [art] Derive Key Pair
30,312,651 UART: [art] Store priv key in slot 0x5
33,605,247 UART: [art] Derive Key Pair - Done
33,618,238 UART: [art] Signing Cert with AUTHO
33,619,531 UART: RITY.KEYID = 7
35,907,776 UART: [art] Erasing AUTHORITY.KEYID = 7
35,909,284 UART: [art] PUB.X = 52576BD8AF9DB4BD97F83CA1E5BC7F5B3478611E1BDF9BA30D3694E6A2FCF3868EB52D7CAD3C473E8174134C778A0007
35,916,518 UART: [art] PUB.Y = A9316ED4729B073280351D28661BE4B4A56D42B7187E335B2C06CE430DB1DC809DE8CDC8E125E35E6D17004DF0C50867
35,923,742 UART: [art] SIG.R = 0959C17F15C1F7102A53D4B07CBE4FE94782BE6D5FA4FE32B578FCDE73A73C011BD2343E95EA5CB1C2EBA0D8F82E8E13
35,931,188 UART: [art] SIG.S = D3C692B6E2F5B26FD80203C14848B593B32AE5AE257AE0D02FE84E41D66A79F3F1C4F22443EAF81E96529814F9212E46
37,236,465 UART: Caliptra RT
37,237,153 UART: [state] CFI Enabled
37,399,050 UART: [rt] RT listening for mailbox commands...
37,401,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,557,078 UART: [rt]cmd =0x41544d4e, len=14344
37,559,113 >>> mbox cmd response: failed
37,559,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,715,181 UART: [rt]cmd =0x41544d4e, len=14344
37,717,041 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,783,167 ready_for_fw is high
3,783,754 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,258,031 >>> mbox cmd response: success
27,959,952 UART:
27,960,335 UART: Running Caliptra FMC ...
27,961,474 UART:
27,961,659 UART: [state] CFI Enabled
28,026,980 UART: [fht] FMC Alias Private Key: 7
30,364,724 UART: [art] Extend RT PCRs Done
30,365,953 UART: [art] Lock RT PCRs Done
30,367,687 UART: [art] Populate DV Done
30,373,214 UART: [fht] FMC Alias Private Key: 7
30,374,862 UART: [art] Derive CDI
30,375,679 UART: [art] Store in in slot 0x4
30,436,083 UART: [art] Derive Key Pair
30,437,126 UART: [art] Store priv key in slot 0x5
33,729,673 UART: [art] Derive Key Pair - Done
33,742,513 UART: [art] Signing Cert with AUTHO
33,743,822 UART: RITY.KEYID = 7
36,031,598 UART: [art] Erasing AUTHORITY.KEYID = 7
36,033,117 UART: [art] PUB.X = C93ECD42A564B08639758D46E74EE7B11075D0B7283DE30483E4E0668D52DF6EBB7A8565C899E80352426DCB79838156
36,040,326 UART: [art] PUB.Y = D76E18F7B3FCDB41D25A95783366FF1C74A6A21E4218C47BB7097F76F96546B15D33EE02E8549025D8A75170448CFA86
36,047,594 UART: [art] SIG.R = 455491D10F66D1D25B52E5DEC8723CDD61A8F549AE6F19C88BC3CFAAAC220D6C0D749D86AD4491A15E93AAF5825D722D
36,055,000 UART: [art] SIG.S = 5458BA5BA3227D0E4E3580BCEDAF93D1D39A82E45BB82A6E772B8485A557950915564B2C3481C145FECAC141185F3AB0
37,360,631 UART: Caliptra RT
37,361,352 UART: [state] CFI Enabled
37,523,341 UART: [rt] RT listening for mailbox commands...
37,525,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,681,438 UART: [rt]cmd =0x41544d4e, len=14344
37,683,306 >>> mbox cmd response: failed
37,684,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,839,330 UART: [rt]cmd =0x41544d4e, len=14344
37,841,135 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,665 writing to cptra_bootfsm_go
192,811 UART:
193,177 UART: Running Caliptra ROM ...
194,354 UART:
603,923 UART: [state] CFI Enabled
620,426 UART: [state] LifecycleState = Unprovisioned
622,323 UART: [state] DebugLocked = No
624,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,470 UART: [kat] SHA2-256
799,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,755 UART: [kat] ++
810,201 UART: [kat] sha1
820,726 UART: [kat] SHA2-256
823,438 UART: [kat] SHA2-384
829,423 UART: [kat] SHA2-512-ACC
831,789 UART: [kat] ECC-384
3,115,166 UART: [kat] HMAC-384Kdf
3,126,755 UART: [kat] LMS
4,316,878 UART: [kat] --
4,321,674 UART: [cold-reset] ++
4,323,039 UART: [fht] Storing FHT @ 0x50003400
4,334,028 UART: [idev] ++
4,334,618 UART: [idev] CDI.KEYID = 6
4,335,528 UART: [idev] SUBJECT.KEYID = 7
4,336,768 UART: [idev] UDS.KEYID = 0
4,337,751 ready_for_fw is high
4,337,942 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,829 UART: [idev] Erasing UDS.KEYID = 0
7,622,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,726 UART: [idev] --
7,647,220 UART: [ldev] ++
7,647,847 UART: [ldev] CDI.KEYID = 6
7,648,814 UART: [ldev] SUBJECT.KEYID = 5
7,650,014 UART: [ldev] AUTHORITY.KEYID = 7
7,651,242 UART: [ldev] FE.KEYID = 1
7,661,337 UART: [ldev] Erasing FE.KEYID = 1
10,948,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,445 UART: [ldev] --
13,309,080 UART: [fwproc] Waiting for Commands...
13,310,909 UART: [fwproc] Received command 0x46574c44
13,313,083 UART: [fwproc] Received Image of size 113760 bytes
22,100,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,178,811 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,247,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,563,840 >>> mbox cmd response: success
22,567,503 UART: [afmc] ++
22,568,103 UART: [afmc] CDI.KEYID = 6
22,568,991 UART: [afmc] SUBJECT.KEYID = 7
22,570,261 UART: [afmc] AUTHORITY.KEYID = 5
25,880,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,173,141 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,175,392 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,189,962 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,204,713 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,218,922 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,240,519 UART: [afmc] --
28,245,186 UART: [cold-reset] --
28,247,539 UART: [state] Locking Datavault
28,252,140 UART: [state] Locking PCR0, PCR1 and PCR31
28,253,837 UART: [state] Locking ICCM
28,255,333 UART: [exit] Launching FMC @ 0x40000130
28,263,730 UART:
28,263,969 UART: Running Caliptra FMC ...
28,265,069 UART:
28,265,229 UART: [state] CFI Enabled
28,273,540 UART: [fht] FMC Alias Private Key: 7
30,604,237 UART: [art] Extend RT PCRs Done
30,605,450 UART: [art] Lock RT PCRs Done
30,607,339 UART: [art] Populate DV Done
30,612,742 UART: [fht] FMC Alias Private Key: 7
30,614,443 UART: [art] Derive CDI
30,615,253 UART: [art] Store in in slot 0x4
30,657,850 UART: [art] Derive Key Pair
30,658,884 UART: [art] Store priv key in slot 0x5
33,900,956 UART: [art] Derive Key Pair - Done
33,913,897 UART: [art] Signing Cert with AUTHO
33,915,195 UART: RITY.KEYID = 7
36,194,219 UART: [art] Erasing AUTHORITY.KEYID = 7
36,195,720 UART: [art] PUB.X = BEA27EDBE4101C4F672D7B6C556ACF2FF0AD27D9E82D5C4ECA23C8422D032B86DFB3E0DC3C51A65A4962B21E9CB2E047
36,202,990 UART: [art] PUB.Y = B3A6BF87869A1A837DEAC22ED4AE1B861EBEC10188DE87D3512605C57842FF896768B4C91855EDB0E32D00B6CE386A6B
36,210,251 UART: [art] SIG.R = 973BDE21B4720F88CFD0EA0BB8D7E2353DEF6F55F7CFCA0058B7C74177B0518045D5D39C65CB8C6A96F1BED05E97CF21
36,217,661 UART: [art] SIG.S = A689857ECDE25EDE2A3DF1D2F74264F15EDE03FE3BB940FFD92D29BC6C6DAB4C5257673EFFC3A7A4B7652BD6E31325DC
37,522,419 UART: Caliptra RT
37,523,131 UART: [state] CFI Enabled
37,640,782 UART: [rt] RT listening for mailbox commands...
37,643,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,798,788 UART: [rt]cmd =0x41544d4e, len=14344
37,800,759 >>> mbox cmd response: failed
37,801,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,956,744 UART: [rt]cmd =0x41544d4e, len=14344
37,958,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
4,131,574 ready_for_fw is high
4,132,169 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,250,510 >>> mbox cmd response: success
27,884,628 UART:
27,885,020 UART: Running Caliptra FMC ...
27,886,207 UART:
27,886,375 UART: [state] CFI Enabled
27,894,384 UART: [fht] FMC Alias Private Key: 7
30,225,680 UART: [art] Extend RT PCRs Done
30,226,908 UART: [art] Lock RT PCRs Done
30,228,457 UART: [art] Populate DV Done
30,233,822 UART: [fht] FMC Alias Private Key: 7
30,235,520 UART: [art] Derive CDI
30,236,334 UART: [art] Store in in slot 0x4
30,279,267 UART: [art] Derive Key Pair
30,280,330 UART: [art] Store priv key in slot 0x5
33,522,192 UART: [art] Derive Key Pair - Done
33,535,368 UART: [art] Signing Cert with AUTHO
33,536,669 UART: RITY.KEYID = 7
35,816,471 UART: [art] Erasing AUTHORITY.KEYID = 7
35,817,982 UART: [art] PUB.X = A2A4088D20002242285EB41A8F66591F6ED163328B566EF07612CBB451102FF0F46307B7F48C74313C24D52B26E1CBB8
35,825,171 UART: [art] PUB.Y = 5A08F1D496EA38F699C7EA9441D745E06D162CEE402C2AF350D59DE6E4C980B5E48DB8E823BB7AD80A9E5D81425266B3
35,832,458 UART: [art] SIG.R = 7DA347864EC6D452B609345C630CE914F95AD5326F87426AD76E2EE27DE36A63CD16D1613C528387DA8F67EAC7E4EE45
35,839,845 UART: [art] SIG.S = 99CC3EDDADD40A87F93C9E7D5E9F3C694D55380A7D5DA25BD4B07900A86553321586D8090DC3D26CE1F491037EC0E555
37,144,980 UART: Caliptra RT
37,145,691 UART: [state] CFI Enabled
37,263,423 UART: [rt] RT listening for mailbox commands...
37,266,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,421,537 UART: [rt]cmd =0x41544d4e, len=14344
37,423,468 >>> mbox cmd response: failed
37,424,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,579,479 UART: [rt]cmd =0x41544d4e, len=14344
37,581,079 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,516 UART:
192,891 UART: Running Caliptra ROM ...
194,076 UART:
194,242 UART: [state] CFI Enabled
266,286 UART: [state] LifecycleState = Unprovisioned
268,201 UART: [state] DebugLocked = No
271,011 UART: [state] WD Timer not started. Device not locked for debugging
274,979 UART: [kat] SHA2-256
454,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,703 UART: [kat] ++
466,242 UART: [kat] sha1
477,617 UART: [kat] SHA2-256
480,616 UART: [kat] SHA2-384
486,950 UART: [kat] SHA2-512-ACC
489,945 UART: [kat] ECC-384
2,949,187 UART: [kat] HMAC-384Kdf
2,972,998 UART: [kat] LMS
3,502,423 UART: [kat] --
3,505,932 UART: [cold-reset] ++
3,508,139 UART: [fht] FHT @ 0x50003400
3,519,538 UART: [idev] ++
3,520,126 UART: [idev] CDI.KEYID = 6
3,521,043 UART: [idev] SUBJECT.KEYID = 7
3,522,222 UART: [idev] UDS.KEYID = 0
3,523,268 ready_for_fw is high
3,523,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,036 UART: [idev] Erasing UDS.KEYID = 0
6,027,673 UART: [idev] Sha1 KeyId Algorithm
6,050,268 UART: [idev] --
6,054,319 UART: [ldev] ++
6,054,945 UART: [ldev] CDI.KEYID = 6
6,055,852 UART: [ldev] SUBJECT.KEYID = 5
6,056,956 UART: [ldev] AUTHORITY.KEYID = 7
6,058,216 UART: [ldev] FE.KEYID = 1
6,101,780 UART: [ldev] Erasing FE.KEYID = 1
8,603,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,511 UART: [ldev] --
10,413,748 UART: [fwproc] Wait for Commands...
10,416,754 UART: [fwproc] Recv command 0x46574c44
10,418,787 UART: [fwproc] Recv'd Img size: 114084 bytes
14,980,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,055,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,124,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,442,203 >>> mbox cmd response: success
15,447,088 UART: [afmc] ++
15,447,691 UART: [afmc] CDI.KEYID = 6
15,448,600 UART: [afmc] SUBJECT.KEYID = 7
15,449,757 UART: [afmc] AUTHORITY.KEYID = 5
17,982,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,031 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,724,000 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,957 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,741 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,779,590 UART: [afmc] --
19,782,640 UART: [cold-reset] --
19,785,687 UART: [state] Locking Datavault
19,791,632 UART: [state] Locking PCR0, PCR1 and PCR31
19,793,329 UART: [state] Locking ICCM
19,795,817 UART: [exit] Launching FMC @ 0x40000130
19,804,265 UART:
19,804,505 UART: Running Caliptra FMC ...
19,805,601 UART:
19,805,760 UART: [state] CFI Enabled
19,866,175 UART: [fht] FMC Alias Private Key: 7
21,629,831 UART: [art] Extend RT PCRs Done
21,631,051 UART: [art] Lock RT PCRs Done
21,632,891 UART: [art] Populate DV Done
21,638,351 UART: [fht] FMC Alias Private Key: 7
21,639,830 UART: [art] Derive CDI
21,640,590 UART: [art] Store in in slot 0x4
21,698,765 UART: [art] Derive Key Pair
21,699,807 UART: [art] Store priv key in slot 0x5
24,163,370 UART: [art] Derive Key Pair - Done
24,176,363 UART: [art] Signing Cert with AUTHO
24,177,680 UART: RITY.KEYID = 7
25,888,925 UART: [art] Erasing AUTHORITY.KEYID = 7
25,890,443 UART: [art] PUB.X = 0F423B3424D5FE9FA8C02A2E3A202167DF1276C892746ED2ECC2C44FD801AB48E6B059D34B926CBC1BBA5361098E2A7D
25,897,744 UART: [art] PUB.Y = DB2FD54FCA1A081C59166639C2EEA9F3DB99BFA8823D27B001767FC89FBC98032B6AA26C9BE8C934BC72595B3B86E822
25,904,946 UART: [art] SIG.R = 1EAF85970A89FC049030076EEAB11640BDAB5867EBC4E6D0D1AAB295BD953933B83FC71039D11E2DBABE21C3EE24D2C6
25,912,380 UART: [art] SIG.S = D83F74E83D6501C4EF1FA8C30612B7D5074751329F1845D87DD15D273BC07FE8DB1F1A10AB916D1AFBF2B665559B5E34
26,891,052 UART: Caliptra RT
26,891,747 UART: [state] CFI Enabled
27,057,305 UART: [rt] RT listening for mailbox commands...
27,059,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,157 UART: [rt]cmd =0x41544d4e, len=14344
27,217,018 >>> mbox cmd response: failed
27,217,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,373,070 UART: [rt]cmd =0x41544d4e, len=14344
27,374,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,381,983 ready_for_fw is high
3,382,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,054,290 >>> mbox cmd response: success
19,345,774 UART:
19,346,187 UART: Running Caliptra FMC ...
19,347,321 UART:
19,347,478 UART: [state] CFI Enabled
19,413,589 UART: [fht] FMC Alias Private Key: 7
21,177,419 UART: [art] Extend RT PCRs Done
21,178,644 UART: [art] Lock RT PCRs Done
21,180,590 UART: [art] Populate DV Done
21,186,260 UART: [fht] FMC Alias Private Key: 7
21,187,794 UART: [art] Derive CDI
21,188,528 UART: [art] Store in in slot 0x4
21,246,070 UART: [art] Derive Key Pair
21,247,119 UART: [art] Store priv key in slot 0x5
23,710,072 UART: [art] Derive Key Pair - Done
23,722,905 UART: [art] Signing Cert with AUTHO
23,724,243 UART: RITY.KEYID = 7
25,435,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,437,154 UART: [art] PUB.X = D72E9C1F6AD41AAF5245442781DF81AD1E1770AC52BF0C5D4A3BAFA5E2466F528C6C5110F993AF6B15A972DFCF7F891D
25,444,442 UART: [art] PUB.Y = 889CB293A4E335C49BDE25303852B46CE2C54271212A6EC9A0C98AD4B7C80981980014788356A983773B27BEB21A9543
25,451,668 UART: [art] SIG.R = 84EFEE0BDB80AA01D4A65A0156C3F1A500AD23E3A5F0A8D7B550869BE4CCFE7C28E4F954F1166BE87822181AC60E6511
25,459,037 UART: [art] SIG.S = B8D904180C018C56F4BDB906C011F1EC8ECF3F71BB9344CE4B5AE9DB1677AF1516F22CACA4A0400162AF37CA9CD52B9E
26,438,251 UART: Caliptra RT
26,438,949 UART: [state] CFI Enabled
26,602,895 UART: [rt] RT listening for mailbox commands...
26,606,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,761,537 UART: [rt]cmd =0x41544d4e, len=14344
26,763,131 >>> mbox cmd response: failed
26,764,114 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,919,274 UART: [rt]cmd =0x41544d4e, len=14344
26,921,269 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,094 writing to cptra_bootfsm_go
193,225 UART:
193,594 UART: Running Caliptra ROM ...
194,780 UART:
604,314 UART: [state] CFI Enabled
617,295 UART: [state] LifecycleState = Unprovisioned
619,164 UART: [state] DebugLocked = No
621,407 UART: [state] WD Timer not started. Device not locked for debugging
624,529 UART: [kat] SHA2-256
803,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,272 UART: [kat] ++
815,723 UART: [kat] sha1
826,236 UART: [kat] SHA2-256
829,241 UART: [kat] SHA2-384
834,522 UART: [kat] SHA2-512-ACC
837,534 UART: [kat] ECC-384
3,279,048 UART: [kat] HMAC-384Kdf
3,292,919 UART: [kat] LMS
3,822,422 UART: [kat] --
3,827,219 UART: [cold-reset] ++
3,829,228 UART: [fht] FHT @ 0x50003400
3,840,989 UART: [idev] ++
3,841,575 UART: [idev] CDI.KEYID = 6
3,842,544 UART: [idev] SUBJECT.KEYID = 7
3,843,651 UART: [idev] UDS.KEYID = 0
3,844,699 ready_for_fw is high
3,844,914 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,255 UART: [idev] Erasing UDS.KEYID = 0
6,313,773 UART: [idev] Sha1 KeyId Algorithm
6,337,429 UART: [idev] --
6,341,368 UART: [ldev] ++
6,341,944 UART: [ldev] CDI.KEYID = 6
6,342,869 UART: [ldev] SUBJECT.KEYID = 5
6,344,027 UART: [ldev] AUTHORITY.KEYID = 7
6,345,261 UART: [ldev] FE.KEYID = 1
6,357,040 UART: [ldev] Erasing FE.KEYID = 1
8,828,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,089 UART: [ldev] --
10,614,951 UART: [fwproc] Wait for Commands...
10,617,756 UART: [fwproc] Recv command 0x46574c44
10,619,859 UART: [fwproc] Recv'd Img size: 114084 bytes
15,158,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,232,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,301,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,618,205 >>> mbox cmd response: success
15,622,180 UART: [afmc] ++
15,622,787 UART: [afmc] CDI.KEYID = 6
15,623,672 UART: [afmc] SUBJECT.KEYID = 7
15,624,889 UART: [afmc] AUTHORITY.KEYID = 5
18,122,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,841,765 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,843,673 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,859,611 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,875,604 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,891,367 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,912,776 UART: [afmc] --
19,916,116 UART: [cold-reset] --
19,918,902 UART: [state] Locking Datavault
19,925,883 UART: [state] Locking PCR0, PCR1 and PCR31
19,927,531 UART: [state] Locking ICCM
19,930,281 UART: [exit] Launching FMC @ 0x40000130
19,938,734 UART:
19,938,975 UART: Running Caliptra FMC ...
19,940,077 UART:
19,940,236 UART: [state] CFI Enabled
19,948,338 UART: [fht] FMC Alias Private Key: 7
21,704,548 UART: [art] Extend RT PCRs Done
21,705,770 UART: [art] Lock RT PCRs Done
21,707,693 UART: [art] Populate DV Done
21,713,109 UART: [fht] FMC Alias Private Key: 7
21,714,756 UART: [art] Derive CDI
21,715,493 UART: [art] Store in in slot 0x4
21,758,574 UART: [art] Derive Key Pair
21,759,614 UART: [art] Store priv key in slot 0x5
24,185,874 UART: [art] Derive Key Pair - Done
24,198,983 UART: [art] Signing Cert with AUTHO
24,200,291 UART: RITY.KEYID = 7
25,905,506 UART: [art] Erasing AUTHORITY.KEYID = 7
25,907,007 UART: [art] PUB.X = B2DD5D02E0608905909D7298E42788FF3D63D1635BF21837C50233CEC55987CFC125381E5A1DE2CC9695A611B947FCB5
25,914,285 UART: [art] PUB.Y = 441F5149E51AE2E47833DCD9614AAC02EE147BE0C3CB6328040F43DC74711EBA3ABF4B6206EBB94D3D865FD775DB03DE
25,921,543 UART: [art] SIG.R = F6B8BFB4D96B0F782485B948B7579C3642BFA250B0F7B685F060394AAE4E77778071E1AEB6141382E3D90B6836C30ABF
25,928,919 UART: [art] SIG.S = B8FAA59B77A400D34B5874508097D1661A4E726C0D62E88C01A96814F6C2EB7A78F5F465634562CB1D814C0CBDEC1F58
26,907,506 UART: Caliptra RT
26,908,212 UART: [state] CFI Enabled
27,025,562 UART: [rt] RT listening for mailbox commands...
27,028,175 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,183,794 UART: [rt]cmd =0x41544d4e, len=14344
27,185,874 >>> mbox cmd response: failed
27,186,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,341,744 UART: [rt]cmd =0x41544d4e, len=14344
27,343,558 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
3,698,336 ready_for_fw is high
3,698,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,266,415 >>> mbox cmd response: success
19,512,994 UART:
19,513,393 UART: Running Caliptra FMC ...
19,514,542 UART:
19,514,706 UART: [state] CFI Enabled
19,522,543 UART: [fht] FMC Alias Private Key: 7
21,279,275 UART: [art] Extend RT PCRs Done
21,280,506 UART: [art] Lock RT PCRs Done
21,282,144 UART: [art] Populate DV Done
21,287,504 UART: [fht] FMC Alias Private Key: 7
21,289,106 UART: [art] Derive CDI
21,289,928 UART: [art] Store in in slot 0x4
21,332,636 UART: [art] Derive Key Pair
21,333,679 UART: [art] Store priv key in slot 0x5
23,760,096 UART: [art] Derive Key Pair - Done
23,772,773 UART: [art] Signing Cert with AUTHO
23,774,082 UART: RITY.KEYID = 7
25,479,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,481,309 UART: [art] PUB.X = DCC3461CDCD38D0EF2D956BC47BEDB9A6F370C7755E1D094966EF5B68FD975B9CC27FC31194A0BED2B4D4BC815B531E8
25,488,643 UART: [art] PUB.Y = AE5A65DA4512F43E025A15234E92698383FDD4F431A3882A95E21CC6FCE50B25D8AA95AAE22D66A280CABA6E0CA3FBD5
25,495,875 UART: [art] SIG.R = 3CF861257F3C7A9164FA7FC6082EDFA396C2F6ADF91A5789816EFB152D1DB6814D8FF841A7D79CD524DA6ABF27ADF1C4
25,503,312 UART: [art] SIG.S = A04BD7C82C6BF1E91F7D7A1E304CCB4F6344DADBB438BDFB2E571E237C5BEB9F2EAD83CC4EC1B90E5694778C8D915346
26,482,311 UART: Caliptra RT
26,482,997 UART: [state] CFI Enabled
26,599,522 UART: [rt] RT listening for mailbox commands...
26,602,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,757,839 UART: [rt]cmd =0x41544d4e, len=14344
26,759,651 >>> mbox cmd response: failed
26,760,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,915,741 UART: [rt]cmd =0x41544d4e, len=14344
26,917,406 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,644 UART:
193,014 UART: Running Caliptra ROM ...
194,124 UART:
194,286 UART: [state] CFI Enabled
264,722 UART: [state] LifecycleState = Unprovisioned
267,137 UART: [state] DebugLocked = No
268,316 UART: [state] WD Timer not started. Device not locked for debugging
272,207 UART: [kat] SHA2-256
462,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,848 UART: [kat] ++
473,334 UART: [kat] sha1
484,632 UART: [kat] SHA2-256
487,641 UART: [kat] SHA2-384
493,059 UART: [kat] SHA2-512-ACC
495,638 UART: [kat] ECC-384
2,946,832 UART: [kat] HMAC-384Kdf
2,971,926 UART: [kat] LMS
3,503,687 UART: [kat] --
3,506,996 UART: [cold-reset] ++
3,508,377 UART: [fht] FHT @ 0x50003400
3,519,638 UART: [idev] ++
3,520,332 UART: [idev] CDI.KEYID = 6
3,521,283 UART: [idev] SUBJECT.KEYID = 7
3,522,520 UART: [idev] UDS.KEYID = 0
3,523,442 ready_for_fw is high
3,523,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,120 UART: [idev] Erasing UDS.KEYID = 0
6,030,062 UART: [idev] Sha1 KeyId Algorithm
6,051,411 UART: [idev] --
6,054,905 UART: [ldev] ++
6,055,589 UART: [ldev] CDI.KEYID = 6
6,056,475 UART: [ldev] SUBJECT.KEYID = 5
6,057,605 UART: [ldev] AUTHORITY.KEYID = 7
6,058,883 UART: [ldev] FE.KEYID = 1
6,098,566 UART: [ldev] Erasing FE.KEYID = 1
8,606,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,976 UART: [ldev] --
10,412,616 UART: [fwproc] Wait for Commands...
10,415,840 UART: [fwproc] Recv command 0x46574c44
10,418,142 UART: [fwproc] Recv'd Img size: 114084 bytes
15,027,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,103,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,219,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,760,533 >>> mbox cmd response: success
15,763,866 UART: [afmc] ++
15,764,581 UART: [afmc] CDI.KEYID = 6
15,765,692 UART: [afmc] SUBJECT.KEYID = 7
15,767,259 UART: [afmc] AUTHORITY.KEYID = 5
18,298,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,022,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,024,718 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,039,961 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,054,980 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,069,863 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,092,601 UART: [afmc] --
20,095,499 UART: [cold-reset] --
20,099,047 UART: [state] Locking Datavault
20,106,090 UART: [state] Locking PCR0, PCR1 and PCR31
20,108,303 UART: [state] Locking ICCM
20,109,722 UART: [exit] Launching FMC @ 0x40000130
20,118,408 UART:
20,118,637 UART: Running Caliptra FMC ...
20,119,944 UART:
20,120,135 UART: [state] CFI Enabled
20,179,161 UART: [fht] FMC Alias Private Key: 7
21,942,432 UART: [art] Extend RT PCRs Done
21,943,651 UART: [art] Lock RT PCRs Done
21,945,626 UART: [art] Populate DV Done
21,950,920 UART: [fht] FMC Alias Private Key: 7
21,952,557 UART: [art] Derive CDI
21,953,290 UART: [art] Store in in slot 0x4
22,011,789 UART: [art] Derive Key Pair
22,012,833 UART: [art] Store priv key in slot 0x5
24,475,293 UART: [art] Derive Key Pair - Done
24,488,462 UART: [art] Signing Cert with AUTHO
24,489,762 UART: RITY.KEYID = 7
26,200,529 UART: [art] Erasing AUTHORITY.KEYID = 7
26,202,038 UART: [art] PUB.X = 7344E084CBC549F4F72A83A3000FF1F24E80AFBFD8D74A35A04F7A244289A122BFD267930CE92FC4950D3E86B2A3BBAC
26,209,314 UART: [art] PUB.Y = B88B2D114D0E1823EF92351591C3B26A020936FD351EE4FE87E75B96E75D3863A6E080F061F50CEB82CEFC59F929642F
26,216,531 UART: [art] SIG.R = E17AFA7789EDBE195A124A3EC91010C7E30F2E4DBFE6A13E2FAE3FA2C07AF7695AF35AE4E4FA1E376AFFAEB0BC4C0EAE
26,223,950 UART: [art] SIG.S = 491A3BE4B65B0EF961E0F29DD72BC5E651F34D920366BE3419B209CA1636CC38B09F86BE0799DB9073B38F29AE023396
27,202,687 UART: Caliptra RT
27,203,376 UART: [state] CFI Enabled
27,367,200 UART: [rt] RT listening for mailbox commands...
27,369,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,525,315 UART: [rt]cmd =0x41544d4e, len=14344
27,527,245 >>> mbox cmd response: failed
27,527,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,683,274 UART: [rt]cmd =0x41544d4e, len=14344
27,685,202 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,438,738 ready_for_fw is high
3,439,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,844,426 >>> mbox cmd response: success
20,135,634 UART:
20,136,032 UART: Running Caliptra FMC ...
20,137,224 UART:
20,137,411 UART: [state] CFI Enabled
20,201,521 UART: [fht] FMC Alias Private Key: 7
21,965,645 UART: [art] Extend RT PCRs Done
21,966,865 UART: [art] Lock RT PCRs Done
21,968,761 UART: [art] Populate DV Done
21,974,128 UART: [fht] FMC Alias Private Key: 7
21,975,813 UART: [art] Derive CDI
21,976,636 UART: [art] Store in in slot 0x4
22,034,320 UART: [art] Derive Key Pair
22,035,313 UART: [art] Store priv key in slot 0x5
24,498,191 UART: [art] Derive Key Pair - Done
24,510,756 UART: [art] Signing Cert with AUTHO
24,512,054 UART: RITY.KEYID = 7
26,223,215 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,717 UART: [art] PUB.X = DC2408BEE19AEC2D774D774B3B19C5C3CBE4B2D0B73B8FC8E0329C482D1293352FBE67BA4A3DB0F40C8E36F0AD7CF19E
26,231,997 UART: [art] PUB.Y = 04D97F74B48EC8C02CCB90107B542F7A79E67157DFFEFBD64FC0D50FBA1D1C915C0B6512F9FFF2683B31AF69187DA9C8
26,239,262 UART: [art] SIG.R = 5BF02AF6F310DD6DD3898A30C294D9E6225573E54A813BA6A1B0CB932D6601B4F76E687CC1C7497921AA3ABD09AEF7B5
26,246,664 UART: [art] SIG.S = 3F499C0881C1B9FB96C2C783F50A209A1BEF7A854CDCA64D4B424E1D4170942DDB44100F6900776610173E4BDB6DE1D2
27,225,383 UART: Caliptra RT
27,226,106 UART: [state] CFI Enabled
27,390,955 UART: [rt] RT listening for mailbox commands...
27,393,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,850 UART: [rt]cmd =0x41544d4e, len=14344
27,550,461 >>> mbox cmd response: failed
27,551,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,706,601 UART: [rt]cmd =0x41544d4e, len=14344
27,708,473 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,961 UART:
193,350 UART: Running Caliptra ROM ...
194,905 UART:
604,129 UART: [state] CFI Enabled
618,006 UART: [state] LifecycleState = Unprovisioned
620,395 UART: [state] DebugLocked = No
623,137 UART: [state] WD Timer not started. Device not locked for debugging
628,029 UART: [kat] SHA2-256
817,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,673 UART: [kat] ++
829,281 UART: [kat] sha1
842,320 UART: [kat] SHA2-256
845,379 UART: [kat] SHA2-384
851,448 UART: [kat] SHA2-512-ACC
854,037 UART: [kat] ECC-384
3,297,571 UART: [kat] HMAC-384Kdf
3,309,455 UART: [kat] LMS
3,841,338 UART: [kat] --
3,845,832 UART: [cold-reset] ++
3,846,841 UART: [fht] FHT @ 0x50003400
3,859,383 UART: [idev] ++
3,860,020 UART: [idev] CDI.KEYID = 6
3,861,059 UART: [idev] SUBJECT.KEYID = 7
3,862,245 UART: [idev] UDS.KEYID = 0
3,863,182 ready_for_fw is high
3,863,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,692 UART: [idev] Erasing UDS.KEYID = 0
6,340,755 UART: [idev] Sha1 KeyId Algorithm
6,363,722 UART: [idev] --
6,368,075 UART: [ldev] ++
6,368,768 UART: [ldev] CDI.KEYID = 6
6,369,685 UART: [ldev] SUBJECT.KEYID = 5
6,370,846 UART: [ldev] AUTHORITY.KEYID = 7
6,372,024 UART: [ldev] FE.KEYID = 1
6,382,787 UART: [ldev] Erasing FE.KEYID = 1
8,864,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,460 UART: [ldev] --
10,653,423 UART: [fwproc] Wait for Commands...
10,656,545 UART: [fwproc] Recv command 0x46574c44
10,658,859 UART: [fwproc] Recv'd Img size: 114084 bytes
15,292,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,370,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,486,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,026,698 >>> mbox cmd response: success
16,030,346 UART: [afmc] ++
16,031,056 UART: [afmc] CDI.KEYID = 6
16,032,255 UART: [afmc] SUBJECT.KEYID = 7
16,033,754 UART: [afmc] AUTHORITY.KEYID = 5
18,537,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,260,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,262,113 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,277,244 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,292,386 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,307,259 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,330,937 UART: [afmc] --
20,334,653 UART: [cold-reset] --
20,337,929 UART: [state] Locking Datavault
20,344,538 UART: [state] Locking PCR0, PCR1 and PCR31
20,346,696 UART: [state] Locking ICCM
20,349,278 UART: [exit] Launching FMC @ 0x40000130
20,357,914 UART:
20,358,196 UART: Running Caliptra FMC ...
20,359,308 UART:
20,359,469 UART: [state] CFI Enabled
20,367,467 UART: [fht] FMC Alias Private Key: 7
22,124,497 UART: [art] Extend RT PCRs Done
22,125,709 UART: [art] Lock RT PCRs Done
22,127,492 UART: [art] Populate DV Done
22,132,858 UART: [fht] FMC Alias Private Key: 7
22,134,477 UART: [art] Derive CDI
22,135,296 UART: [art] Store in in slot 0x4
22,177,725 UART: [art] Derive Key Pair
22,178,726 UART: [art] Store priv key in slot 0x5
24,605,684 UART: [art] Derive Key Pair - Done
24,618,742 UART: [art] Signing Cert with AUTHO
24,620,044 UART: RITY.KEYID = 7
26,325,692 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,198 UART: [art] PUB.X = B385DCBEAD7A4076ADA5C4E0F78757C7CCBD58CB6AF4D8EF29A91846E8DDE2ED1EAD7376A8994D4F0BFDC49E1A4DD993
26,334,536 UART: [art] PUB.Y = 0BEE85321E1A9DF7FFDE719CB77597B5950C85039227FD4BC5FCA683AE7A006C2C77B7383C2362DFE0447A1CF3C8FA1E
26,341,795 UART: [art] SIG.R = 4A7ECE0FD2C379B76A58A3CC8DFB9636A34D118734E956268EDF42C655FF6A0BB1CDC4995ABCBDE488168A110C561B0F
26,349,223 UART: [art] SIG.S = E42A2C0B14C996B239EC07FF8C31367B617438748680F10E0B6C210B6515E6DD3CFF8B315EFDA13CE9663D6662540776
27,328,271 UART: Caliptra RT
27,329,051 UART: [state] CFI Enabled
27,445,650 UART: [rt] RT listening for mailbox commands...
27,448,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,604,032 UART: [rt]cmd =0x41544d4e, len=14344
27,605,957 >>> mbox cmd response: failed
27,606,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,761,920 UART: [rt]cmd =0x41544d4e, len=14344
27,763,848 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
3,750,490 ready_for_fw is high
3,751,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,055,241 >>> mbox cmd response: success
20,310,337 UART:
20,310,737 UART: Running Caliptra FMC ...
20,311,934 UART:
20,312,110 UART: [state] CFI Enabled
20,319,731 UART: [fht] FMC Alias Private Key: 7
22,076,495 UART: [art] Extend RT PCRs Done
22,077,727 UART: [art] Lock RT PCRs Done
22,079,526 UART: [art] Populate DV Done
22,084,682 UART: [fht] FMC Alias Private Key: 7
22,086,337 UART: [art] Derive CDI
22,087,163 UART: [art] Store in in slot 0x4
22,129,393 UART: [art] Derive Key Pair
22,130,459 UART: [art] Store priv key in slot 0x5
24,557,067 UART: [art] Derive Key Pair - Done
24,569,796 UART: [art] Signing Cert with AUTHO
24,571,106 UART: RITY.KEYID = 7
26,276,905 UART: [art] Erasing AUTHORITY.KEYID = 7
26,278,410 UART: [art] PUB.X = 56BB06E58052A11B728FCE0384FB6B793C8CBBEDE6C97197F88371EED15FD4D8BA0456A7EA5963F8DD0CDE9D67934680
26,285,712 UART: [art] PUB.Y = 15C657203C94B9B74B04EEDC637EC17365F544A78F35C6B4840CA1BB71600209BCD14818B2D9E808276CC13DCCD6A791
26,292,950 UART: [art] SIG.R = FBAD58DC28B3D04DEA02A7E6FA5A3060FB1EE34D27B71991A81C5EEA7A3999BB0BE4FE4AF4053217CDB202393ACF343E
26,300,402 UART: [art] SIG.S = 6C7F1D45FE652E36EEEEA663B34B6F7242663F311288E11915C1F6308EFF0D7F0626EC612D1DE2643984080D14ECA79B
27,278,941 UART: Caliptra RT
27,279,653 UART: [state] CFI Enabled
27,397,301 UART: [rt] RT listening for mailbox commands...
27,399,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,391 UART: [rt]cmd =0x41544d4e, len=14344
27,557,142 >>> mbox cmd response: failed
27,557,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,713,151 UART: [rt]cmd =0x41544d4e, len=14344
27,714,965 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
894,820 UART: [kat] SHA2-512-ACC
896,721 UART: [kat] ECC-384
902,172 UART: [kat] HMAC-384Kdf
906,614 UART: [kat] LMS
1,474,810 UART: [kat] --
1,475,593 UART: [cold-reset] ++
1,476,163 UART: [fht] Storing FHT @ 0x50003400
1,478,850 UART: [idev] ++
1,479,018 UART: [idev] CDI.KEYID = 6
1,479,378 UART: [idev] SUBJECT.KEYID = 7
1,479,802 UART: [idev] UDS.KEYID = 0
1,480,147 ready_for_fw is high
1,480,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,528 UART: [idev] Erasing UDS.KEYID = 0
1,504,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,906 UART: [idev] --
1,513,925 UART: [ldev] ++
1,514,093 UART: [ldev] CDI.KEYID = 6
1,514,456 UART: [ldev] SUBJECT.KEYID = 5
1,514,882 UART: [ldev] AUTHORITY.KEYID = 7
1,515,345 UART: [ldev] FE.KEYID = 1
1,520,155 UART: [ldev] Erasing FE.KEYID = 1
1,545,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,570 UART: [ldev] --
1,584,861 UART: [fwproc] Waiting for Commands...
1,585,518 UART: [fwproc] Received command 0x46574c44
1,586,309 UART: [fwproc] Received Image of size 114084 bytes
5,040,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,070,152 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,099,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,234,895 >>> mbox cmd response: success
5,236,091 UART: [afmc] ++
5,236,259 UART: [afmc] CDI.KEYID = 6
5,236,621 UART: [afmc] SUBJECT.KEYID = 7
5,237,046 UART: [afmc] AUTHORITY.KEYID = 5
5,271,994 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,288,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,289,258 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,294,967 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,300,859 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,306,560 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,314,304 UART: [afmc] --
5,315,342 UART: [cold-reset] --
5,316,204 UART: [state] Locking Datavault
5,317,287 UART: [state] Locking PCR0, PCR1 and PCR31
5,317,891 UART: [state] Locking ICCM
5,318,417 UART: [exit] Launching FMC @ 0x40000130
5,323,746 UART:
5,323,762 UART: Running Caliptra FMC ...
5,324,170 UART:
5,324,224 UART: [state] CFI Enabled
5,334,876 UART: [fht] FMC Alias Private Key: 7
5,442,658 UART: [art] Extend RT PCRs Done
5,443,086 UART: [art] Lock RT PCRs Done
5,444,674 UART: [art] Populate DV Done
5,453,090 UART: [fht] FMC Alias Private Key: 7
5,454,022 UART: [art] Derive CDI
5,454,302 UART: [art] Store in in slot 0x4
5,539,445 UART: [art] Derive Key Pair
5,539,805 UART: [art] Store priv key in slot 0x5
5,553,093 UART: [art] Derive Key Pair - Done
5,567,860 UART: [art] Signing Cert with AUTHO
5,568,340 UART: RITY.KEYID = 7
5,583,426 UART: [art] Erasing AUTHORITY.KEYID = 7
5,584,191 UART: [art] PUB.X = 9239994B00411D36BD3708C646A77855B2D5EEEF9F4AB4437EECA7F0D2F48BAE1AFF41DAE6055A0EBED24E49CA3F7870
5,590,948 UART: [art] PUB.Y = 3C8A32E3A11D5E253E7017F3F9D6A5764A75B99F13103D220B66B31ED78F8492660F42EC6F37983EDABC97307D50B8C8
5,597,894 UART: [art] SIG.R = 82FD028E4477E9418C31E9256155E7A5DF90B491CA016C54D945338D8D4474619FE1B1B94AF2C63BDDE2E2C756AFE645
5,604,662 UART: [art] SIG.S = 39840F4BD4F706D9B908E7F9E1CA9562686AC440D306009BE864BDF2EF2CA3C6A369C46569017AD47F2E62176B6BCA18
5,628,732 UART: Caliptra RT
5,628,985 UART: [state] CFI Enabled
5,736,816 UART: [rt] RT listening for mailbox commands...
5,737,486 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,860,598 UART: [rt]cmd =0x41544d4e, len=14344
5,862,159 >>> mbox cmd response: failed
5,862,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,984,539 UART: [rt]cmd =0x41544d4e, len=14344
5,985,884 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,071 ready_for_fw is high
1,362,071 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,159,883 >>> mbox cmd response: success
5,222,024 UART:
5,222,040 UART: Running Caliptra FMC ...
5,222,448 UART:
5,222,502 UART: [state] CFI Enabled
5,233,154 UART: [fht] FMC Alias Private Key: 7
5,341,028 UART: [art] Extend RT PCRs Done
5,341,456 UART: [art] Lock RT PCRs Done
5,343,024 UART: [art] Populate DV Done
5,351,286 UART: [fht] FMC Alias Private Key: 7
5,352,422 UART: [art] Derive CDI
5,352,702 UART: [art] Store in in slot 0x4
5,438,081 UART: [art] Derive Key Pair
5,438,441 UART: [art] Store priv key in slot 0x5
5,451,201 UART: [art] Derive Key Pair - Done
5,466,134 UART: [art] Signing Cert with AUTHO
5,466,614 UART: RITY.KEYID = 7
5,481,680 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,445 UART: [art] PUB.X = 628C744D568384395E9D3603337F24E8FC9A34D489F5920E7E9BA60CC132E38A5306B272C5D12B8EFD6D3FF3032F871E
5,489,200 UART: [art] PUB.Y = D5BCA540BAEB5B3304F3627E71B843024C0071F91C29043EC14945B287DBD3D48020EFF5E6F254ABC078DC3E2E6066D6
5,496,127 UART: [art] SIG.R = CEEA75A5407D42ADB07972E28B500B0455DDDCD5AF5466677D0340B227A50F7C0698773E67F5FD8B35CF8245AAA838C3
5,502,890 UART: [art] SIG.S = F781F5D570059EEFA19D84E63122880452FA6600B659E89270248E94B75662A7A72EB66E43D8AA7B80AEA6CDE978B84B
5,526,359 UART: Caliptra RT
5,526,612 UART: [state] CFI Enabled
5,634,040 UART: [rt] RT listening for mailbox commands...
5,634,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,694 UART: [rt]cmd =0x41544d4e, len=14344
5,759,435 >>> mbox cmd response: failed
5,759,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,882,095 UART: [rt]cmd =0x41544d4e, len=14344
5,883,608 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,710 UART: [cold-reset] ++
1,477,102 UART: [fht] Storing FHT @ 0x50003400
1,479,757 UART: [idev] ++
1,479,925 UART: [idev] CDI.KEYID = 6
1,480,285 UART: [idev] SUBJECT.KEYID = 7
1,480,709 UART: [idev] UDS.KEYID = 0
1,481,054 ready_for_fw is high
1,481,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,147 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,660 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,523 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,617 UART: [fwproc] Received command 0x46574c44
1,588,408 UART: [fwproc] Received Image of size 114084 bytes
5,080,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,108,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,273,613 >>> mbox cmd response: success
5,274,869 UART: [afmc] ++
5,275,037 UART: [afmc] CDI.KEYID = 6
5,275,399 UART: [afmc] SUBJECT.KEYID = 7
5,275,824 UART: [afmc] AUTHORITY.KEYID = 5
5,310,814 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,326,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,327,720 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,333,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,339,321 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,345,022 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,353,082 UART: [afmc] --
5,354,196 UART: [cold-reset] --
5,354,952 UART: [state] Locking Datavault
5,356,333 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,937 UART: [state] Locking ICCM
5,357,507 UART: [exit] Launching FMC @ 0x40000130
5,362,836 UART:
5,362,852 UART: Running Caliptra FMC ...
5,363,260 UART:
5,363,403 UART: [state] CFI Enabled
5,374,047 UART: [fht] FMC Alias Private Key: 7
5,482,685 UART: [art] Extend RT PCRs Done
5,483,113 UART: [art] Lock RT PCRs Done
5,484,793 UART: [art] Populate DV Done
5,493,017 UART: [fht] FMC Alias Private Key: 7
5,494,075 UART: [art] Derive CDI
5,494,355 UART: [art] Store in in slot 0x4
5,579,954 UART: [art] Derive Key Pair
5,580,314 UART: [art] Store priv key in slot 0x5
5,593,370 UART: [art] Derive Key Pair - Done
5,608,080 UART: [art] Signing Cert with AUTHO
5,608,560 UART: RITY.KEYID = 7
5,623,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,531 UART: [art] PUB.X = 8CC6A87561C291AF787F375C5B36AC18A96787880AF082E17F2022DD28AF3890C528E9246A954E222AF289C8A347E849
5,631,294 UART: [art] PUB.Y = F549C0403CB39F7F414146CD563AFA44C35E3200A86E29D5AE00B82AEB32BE2F41BF5C885E7C599302680752805F4065
5,638,194 UART: [art] SIG.R = 504194B3B980FC7E8DF5E024D1B3BCA65D4E67CF4D007BF26F26172731BF1A404348B2316074DF79C622E426243E8456
5,644,940 UART: [art] SIG.S = 3E4344D02F79EAB1EA5176907D3C349DD77391BE11F769B4B0110C4ED246582A0F35B7DF926344B472DA1C3FA033CDC6
5,668,715 UART: Caliptra RT
5,669,060 UART: [state] CFI Enabled
5,777,350 UART: [rt] RT listening for mailbox commands...
5,778,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,901,158 UART: [rt]cmd =0x41544d4e, len=14344
5,902,593 >>> mbox cmd response: failed
5,902,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,025,287 UART: [rt]cmd =0x41544d4e, len=14344
6,026,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,084 ready_for_fw is high
1,363,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,313,172 >>> mbox cmd response: success
5,375,177 UART:
5,375,193 UART: Running Caliptra FMC ...
5,375,601 UART:
5,375,744 UART: [state] CFI Enabled
5,386,326 UART: [fht] FMC Alias Private Key: 7
5,494,138 UART: [art] Extend RT PCRs Done
5,494,566 UART: [art] Lock RT PCRs Done
5,496,220 UART: [art] Populate DV Done
5,504,396 UART: [fht] FMC Alias Private Key: 7
5,505,510 UART: [art] Derive CDI
5,505,790 UART: [art] Store in in slot 0x4
5,591,861 UART: [art] Derive Key Pair
5,592,221 UART: [art] Store priv key in slot 0x5
5,605,251 UART: [art] Derive Key Pair - Done
5,619,994 UART: [art] Signing Cert with AUTHO
5,620,474 UART: RITY.KEYID = 7
5,635,780 UART: [art] Erasing AUTHORITY.KEYID = 7
5,636,545 UART: [art] PUB.X = BEB6D1AF709445DAB0ACD8426BF8C78B32B05AB42A4CCC29D5D93BABF5E7D642A46C410EF8D48795FDDF57FB7717A5F8
5,643,338 UART: [art] PUB.Y = 23A630FDEBB8B07DAE61C9FD66F172EF44BDA0FFC0A3F83325B1C6A28D2F5D1E4FAFD4112270DEB956EA9D6253632DDE
5,650,314 UART: [art] SIG.R = F387DF7B53D59CB74096BF8E53438214A213BF84D0DBC8B76CE99E919861A93EAEF6BE9132A01529E382DBE047B73E76
5,657,092 UART: [art] SIG.S = 65879770776F6C53CE2FFCADA3733450EDD380DDF8FDD0BDEF9DE04141E779E62240C0C0EABD03CBEF617F531B5A9A04
5,681,313 UART: Caliptra RT
5,681,658 UART: [state] CFI Enabled
5,790,957 UART: [rt] RT listening for mailbox commands...
5,791,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,725 UART: [rt]cmd =0x41544d4e, len=14344
5,916,020 >>> mbox cmd response: failed
5,916,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,038,430 UART: [rt]cmd =0x41544d4e, len=14344
6,039,949 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
917,636 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,629 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 ready_for_fw is high
1,176,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,345 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,685 UART: [ldev] Erasing FE.KEYID = 1
1,244,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,013 UART: [ldev] --
1,283,336 UART: [fwproc] Wait for Commands...
1,284,122 UART: [fwproc] Recv command 0x46574c44
1,284,850 UART: [fwproc] Recv'd Img size: 114084 bytes
3,128,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,321,383 >>> mbox cmd response: success
3,322,551 UART: [afmc] ++
3,322,719 UART: [afmc] CDI.KEYID = 6
3,323,081 UART: [afmc] SUBJECT.KEYID = 7
3,323,506 UART: [afmc] AUTHORITY.KEYID = 5
3,358,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,373 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,082 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,974 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,685 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,494 UART: [afmc] --
3,402,510 UART: [cold-reset] --
3,403,548 UART: [state] Locking Datavault
3,404,639 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,243 UART: [state] Locking ICCM
3,405,671 UART: [exit] Launching FMC @ 0x40000130
3,411,000 UART:
3,411,016 UART: Running Caliptra FMC ...
3,411,424 UART:
3,411,478 UART: [state] CFI Enabled
3,421,750 UART: [fht] FMC Alias Private Key: 7
3,529,226 UART: [art] Extend RT PCRs Done
3,529,654 UART: [art] Lock RT PCRs Done
3,531,424 UART: [art] Populate DV Done
3,539,628 UART: [fht] FMC Alias Private Key: 7
3,540,690 UART: [art] Derive CDI
3,540,970 UART: [art] Store in in slot 0x4
3,626,689 UART: [art] Derive Key Pair
3,627,049 UART: [art] Store priv key in slot 0x5
3,640,061 UART: [art] Derive Key Pair - Done
3,654,746 UART: [art] Signing Cert with AUTHO
3,655,226 UART: RITY.KEYID = 7
3,670,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,899 UART: [art] PUB.X = 5D2CAB01019BE136DB5543A329B89EA34EB8A307811E8E6721A0CFC62D95D46FABB6504FD6E5B95EE37CCE3B8E3FD47E
3,677,680 UART: [art] PUB.Y = 7E739418C7E0337849ECEA0DB19923909DB9BF6862DFA8613AD834826E74D2B1690A96C35BC2C72CCF7FB77D7B404FA6
3,684,632 UART: [art] SIG.R = 1BB23012C6F68DA061D88BDA345D5294286555FB0EF26DB25F8E41BEA5752EA2D9B1346FEA661C0FA98ABE670CF8579A
3,691,407 UART: [art] SIG.S = 154A9546834086C02DE898ECFB0EA59B9E258B74CBD8A74E68B78D97ED032D4D78D6BD9DC408F86EB2C735513B7A5245
3,714,563 UART: Caliptra RT
3,714,816 UART: [state] CFI Enabled
3,822,893 UART: [rt] RT listening for mailbox commands...
3,823,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,605 UART: [rt]cmd =0x41544d4e, len=14344
3,948,356 >>> mbox cmd response: failed
3,948,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,858 UART: [rt]cmd =0x41544d4e, len=14344
4,072,449 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 ready_for_fw is high
1,060,241 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,112 >>> mbox cmd response: success
3,226,845 UART:
3,226,861 UART: Running Caliptra FMC ...
3,227,269 UART:
3,227,323 UART: [state] CFI Enabled
3,237,681 UART: [fht] FMC Alias Private Key: 7
3,345,559 UART: [art] Extend RT PCRs Done
3,345,987 UART: [art] Lock RT PCRs Done
3,347,673 UART: [art] Populate DV Done
3,355,715 UART: [fht] FMC Alias Private Key: 7
3,356,783 UART: [art] Derive CDI
3,357,063 UART: [art] Store in in slot 0x4
3,442,958 UART: [art] Derive Key Pair
3,443,318 UART: [art] Store priv key in slot 0x5
3,456,112 UART: [art] Derive Key Pair - Done
3,471,106 UART: [art] Signing Cert with AUTHO
3,471,586 UART: RITY.KEYID = 7
3,487,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,789 UART: [art] PUB.X = CFAF321687D40414F64133927BE18F6E09B8CD17FBFB8E95BA469D99FCC266A483EE236A07448A287051DC49C5176D81
3,494,554 UART: [art] PUB.Y = 0E6D7DC780E50952129A8830D187BA8A0A08E2FFFEE38E233C72B33586D4793DC7609E95043D220A799DACCCDF679D72
3,501,492 UART: [art] SIG.R = AF278BD90D20EEE800A3999768DA4B9692850CD55C12663FB781298B9D8990EA2947DABF976B823C98F22453600B30CF
3,508,231 UART: [art] SIG.S = 8629D4D89EFEA446E9427C3FA618B10C36036AC718871D2F84EC348A96CCBC161817E01238335956C9DF6E0678204752
3,532,367 UART: Caliptra RT
3,532,620 UART: [state] CFI Enabled
3,639,745 UART: [rt] RT listening for mailbox commands...
3,640,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,473 UART: [rt]cmd =0x41544d4e, len=14344
3,764,984 >>> mbox cmd response: failed
3,764,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,482 UART: [rt]cmd =0x41544d4e, len=14344
3,889,159 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
893,679 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,804 UART: [kat] ++
897,956 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,847 UART: [kat] LMS
1,171,175 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,490 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 ready_for_fw is high
1,176,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,591 UART: [idev] Erasing UDS.KEYID = 0
1,202,174 UART: [idev] Sha1 KeyId Algorithm
1,210,608 UART: [idev] --
1,211,512 UART: [ldev] ++
1,211,680 UART: [ldev] CDI.KEYID = 6
1,212,043 UART: [ldev] SUBJECT.KEYID = 5
1,212,469 UART: [ldev] AUTHORITY.KEYID = 7
1,212,932 UART: [ldev] FE.KEYID = 1
1,218,254 UART: [ldev] Erasing FE.KEYID = 1
1,244,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,140 UART: [ldev] --
1,283,537 UART: [fwproc] Wait for Commands...
1,284,351 UART: [fwproc] Recv command 0x46574c44
1,285,079 UART: [fwproc] Recv'd Img size: 114084 bytes
3,114,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,323 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,307,866 >>> mbox cmd response: success
3,308,912 UART: [afmc] ++
3,309,080 UART: [afmc] CDI.KEYID = 6
3,309,442 UART: [afmc] SUBJECT.KEYID = 7
3,309,867 UART: [afmc] AUTHORITY.KEYID = 5
3,345,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,740 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,449 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,341 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,052 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,809 UART: [afmc] --
3,388,691 UART: [cold-reset] --
3,389,339 UART: [state] Locking Datavault
3,390,264 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,868 UART: [state] Locking ICCM
3,391,298 UART: [exit] Launching FMC @ 0x40000130
3,396,627 UART:
3,396,643 UART: Running Caliptra FMC ...
3,397,051 UART:
3,397,194 UART: [state] CFI Enabled
3,407,870 UART: [fht] FMC Alias Private Key: 7
3,515,700 UART: [art] Extend RT PCRs Done
3,516,128 UART: [art] Lock RT PCRs Done
3,517,608 UART: [art] Populate DV Done
3,525,840 UART: [fht] FMC Alias Private Key: 7
3,526,906 UART: [art] Derive CDI
3,527,186 UART: [art] Store in in slot 0x4
3,612,587 UART: [art] Derive Key Pair
3,612,947 UART: [art] Store priv key in slot 0x5
3,625,643 UART: [art] Derive Key Pair - Done
3,640,395 UART: [art] Signing Cert with AUTHO
3,640,875 UART: RITY.KEYID = 7
3,655,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,750 UART: [art] PUB.X = 2F90A0AB48037A00E5CF9E396B72A1DD98A76BEE0102E9BE19897C025F51405EAF697A701E6CDCFE1BAFCB1DEE023327
3,663,501 UART: [art] PUB.Y = 380CD08E5B0B301045910CA41431F352D571661A95CD6EB9AD01AD271A9FC53F55669EC70C37E6A87F01B33676D69148
3,670,431 UART: [art] SIG.R = 83429475123553FBD66461B328D4517FBE4C14559C9A51D604FB465617924A84CD0BADBB84608A88AB57FFAF5F95B8EE
3,677,199 UART: [art] SIG.S = 842C4DFE3EAD4B52D9A6E207428022D19A3596C4871C38A2714E72052CDCA6F90A0DE6094F690306F265E2641A85682B
3,701,401 UART: Caliptra RT
3,701,746 UART: [state] CFI Enabled
3,809,765 UART: [rt] RT listening for mailbox commands...
3,810,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,407 UART: [rt]cmd =0x41544d4e, len=14344
3,934,882 >>> mbox cmd response: failed
3,934,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,368 UART: [rt]cmd =0x41544d4e, len=14344
4,058,841 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 ready_for_fw is high
1,061,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,758 >>> mbox cmd response: success
3,235,981 UART:
3,235,997 UART: Running Caliptra FMC ...
3,236,405 UART:
3,236,548 UART: [state] CFI Enabled
3,247,120 UART: [fht] FMC Alias Private Key: 7
3,354,620 UART: [art] Extend RT PCRs Done
3,355,048 UART: [art] Lock RT PCRs Done
3,356,572 UART: [art] Populate DV Done
3,364,752 UART: [fht] FMC Alias Private Key: 7
3,365,932 UART: [art] Derive CDI
3,366,212 UART: [art] Store in in slot 0x4
3,451,591 UART: [art] Derive Key Pair
3,451,951 UART: [art] Store priv key in slot 0x5
3,465,625 UART: [art] Derive Key Pair - Done
3,480,411 UART: [art] Signing Cert with AUTHO
3,480,891 UART: RITY.KEYID = 7
3,496,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,924 UART: [art] PUB.X = C0EB7754C42A83FB45FEAEFB9C1002A3F11319F8211E9B2F02451C23DE9F4B8A506155E9F3419D07977373928E7C6586
3,503,685 UART: [art] PUB.Y = AE3D31A4BC7ADCCDE0A223E75A7D0ADE9FD39CF20BD7901F7C858C6B1304813F41A487AAD9FBE1976705A2A8EA14AA7E
3,510,649 UART: [art] SIG.R = 9299FD659B313F6373BE272D99A1C98962095FF5187CB8C12E5C4B85014F63F1F7B196595DAD5481CB37EA9895E95385
3,517,409 UART: [art] SIG.S = 1B4A171882DB535DF898FE9F91F4D03036C09684B5EE89B717A2D0EE3FCEBA0FC671B64FE568587D20B27AA64E1DB0A9
3,541,465 UART: Caliptra RT
3,541,810 UART: [state] CFI Enabled
3,648,660 UART: [rt] RT listening for mailbox commands...
3,649,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,378 UART: [rt]cmd =0x41544d4e, len=14344
3,773,843 >>> mbox cmd response: failed
3,773,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,153 UART: [rt]cmd =0x41544d4e, len=14344
3,897,644 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,903 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,824 UART: [ldev] ++
1,208,992 UART: [ldev] CDI.KEYID = 6
1,209,356 UART: [ldev] SUBJECT.KEYID = 5
1,209,783 UART: [ldev] AUTHORITY.KEYID = 7
1,210,246 UART: [ldev] FE.KEYID = 1
1,215,498 UART: [ldev] Erasing FE.KEYID = 1
1,241,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,275 UART: [fwproc] Recv command 0x46574c44
1,282,008 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,315,249 >>> mbox cmd response: success
3,316,362 UART: [afmc] ++
3,316,530 UART: [afmc] CDI.KEYID = 6
3,316,893 UART: [afmc] SUBJECT.KEYID = 7
3,317,319 UART: [afmc] AUTHORITY.KEYID = 5
3,353,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,846 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,556 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,446 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,157 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,007 UART: [afmc] --
3,397,107 UART: [cold-reset] --
3,397,935 UART: [state] Locking Datavault
3,399,176 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,780 UART: [state] Locking ICCM
3,400,330 UART: [exit] Launching FMC @ 0x40000130
3,405,659 UART:
3,405,675 UART: Running Caliptra FMC ...
3,406,083 UART:
3,406,137 UART: [state] CFI Enabled
3,416,609 UART: [fht] FMC Alias Private Key: 7
3,524,425 UART: [art] Extend RT PCRs Done
3,524,853 UART: [art] Lock RT PCRs Done
3,526,059 UART: [art] Populate DV Done
3,534,111 UART: [fht] FMC Alias Private Key: 7
3,535,039 UART: [art] Derive CDI
3,535,319 UART: [art] Store in in slot 0x4
3,621,106 UART: [art] Derive Key Pair
3,621,466 UART: [art] Store priv key in slot 0x5
3,634,380 UART: [art] Derive Key Pair - Done
3,649,498 UART: [art] Signing Cert with AUTHO
3,649,978 UART: RITY.KEYID = 7
3,665,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,137 UART: [art] PUB.X = E0ACC308AFE6B3CE4A02BC2D400C271C1A1D32F7604D5DA5A2A6C7E6914FA0BEA46242036D89A310C1278B707D236A29
3,672,907 UART: [art] PUB.Y = F9B0D38CF85F5C6744F1F6E11BA44D45A5DEB568BE5E6FB1408012054B574FDF323EDAEC6538EA2032BEB97A11E6F32D
3,679,872 UART: [art] SIG.R = 9938B1776213FF483CD296BF36DE3A5ABA7A7AFDA1088C8946853988C879E523D1681C6F54B03A6BA0412F659A78BAF4
3,686,643 UART: [art] SIG.S = 30A08BEFDD9AC2AE6EBC3CDB10A1393C4F7E18AC46C9F8BCC49BF996E7B8B81B3E25FFE3A8757D69584A81985492D5B3
3,710,388 UART: Caliptra RT
3,710,641 UART: [state] CFI Enabled
3,817,835 UART: [rt] RT listening for mailbox commands...
3,818,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,351 UART: [rt]cmd =0x41544d4e, len=14344
3,942,890 >>> mbox cmd response: failed
3,942,890 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,694 UART: [rt]cmd =0x41544d4e, len=14344
4,067,269 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,646 ready_for_fw is high
1,055,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,159,571 >>> mbox cmd response: success
3,221,984 UART:
3,222,000 UART: Running Caliptra FMC ...
3,222,408 UART:
3,222,462 UART: [state] CFI Enabled
3,232,750 UART: [fht] FMC Alias Private Key: 7
3,340,614 UART: [art] Extend RT PCRs Done
3,341,042 UART: [art] Lock RT PCRs Done
3,342,390 UART: [art] Populate DV Done
3,350,692 UART: [fht] FMC Alias Private Key: 7
3,351,634 UART: [art] Derive CDI
3,351,914 UART: [art] Store in in slot 0x4
3,437,499 UART: [art] Derive Key Pair
3,437,859 UART: [art] Store priv key in slot 0x5
3,450,831 UART: [art] Derive Key Pair - Done
3,466,038 UART: [art] Signing Cert with AUTHO
3,466,518 UART: RITY.KEYID = 7
3,481,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,627 UART: [art] PUB.X = 39EEF202600B55CE7841FD928B0187FEAC211A19F596CF18290E6D9C816C828CA750CF6E893A91E568F25AD0C53D6B54
3,489,391 UART: [art] PUB.Y = E1657927D8FD4E04149C0B0A719EF84F6AC6C776BB9627C79904CCE46D64577437342AD8D325E1EE58426D2D2E5DC5A8
3,496,333 UART: [art] SIG.R = ECD398522607D5E106D027D498A000BA5578A78222C7F64AC7A710F044867A7DA1D61367951BD9BD636DA5CAD07100F5
3,503,053 UART: [art] SIG.S = FD83B504912550BB24DDDB31925D288AA8E14365D2A8FC5CCC993D714363FE3BE143A4DF2D728E64EC9731A5C7FE7BCF
3,526,767 UART: Caliptra RT
3,527,020 UART: [state] CFI Enabled
3,634,949 UART: [rt] RT listening for mailbox commands...
3,635,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,663 UART: [rt]cmd =0x41544d4e, len=14344
3,760,174 >>> mbox cmd response: failed
3,760,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,668 UART: [rt]cmd =0x41544d4e, len=14344
3,884,147 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 ready_for_fw is high
1,174,600 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,967 UART: [ldev] --
1,281,387 UART: [fwproc] Wait for Commands...
1,282,132 UART: [fwproc] Recv command 0x46574c44
1,282,865 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,313,310 >>> mbox cmd response: success
3,314,573 UART: [afmc] ++
3,314,741 UART: [afmc] CDI.KEYID = 6
3,315,104 UART: [afmc] SUBJECT.KEYID = 7
3,315,530 UART: [afmc] AUTHORITY.KEYID = 5
3,350,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,583 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,293 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,183 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,894 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,828 UART: [afmc] --
3,393,824 UART: [cold-reset] --
3,394,466 UART: [state] Locking Datavault
3,395,539 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,143 UART: [state] Locking ICCM
3,396,673 UART: [exit] Launching FMC @ 0x40000130
3,402,002 UART:
3,402,018 UART: Running Caliptra FMC ...
3,402,426 UART:
3,402,569 UART: [state] CFI Enabled
3,413,495 UART: [fht] FMC Alias Private Key: 7
3,521,059 UART: [art] Extend RT PCRs Done
3,521,487 UART: [art] Lock RT PCRs Done
3,523,033 UART: [art] Populate DV Done
3,531,381 UART: [fht] FMC Alias Private Key: 7
3,532,329 UART: [art] Derive CDI
3,532,609 UART: [art] Store in in slot 0x4
3,618,468 UART: [art] Derive Key Pair
3,618,828 UART: [art] Store priv key in slot 0x5
3,632,134 UART: [art] Derive Key Pair - Done
3,646,848 UART: [art] Signing Cert with AUTHO
3,647,328 UART: RITY.KEYID = 7
3,662,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,293 UART: [art] PUB.X = 615A2326EF85F98FEC6A9ABFD5B3A3C2ECCEA90EAFBD8D429D577AC204B614E532EE20DE9FB2B3DC8EA8C2F922EA25D7
3,670,089 UART: [art] PUB.Y = 48EC0ED70FEC74B821A6E770F9696AEA7E9F9D515A2D2DCC69AA6002D688FB19E8A5C9B5BC5D8D602ACC1C6A0D5FE005
3,677,048 UART: [art] SIG.R = 2FEFD07F4512F6A6A680F75124F06B823F250A3576F19E9A65E5AFE906C04468254D35537F6F1C2C4134CCD4ABE428A6
3,683,816 UART: [art] SIG.S = FF2B9F3B807BE7286F1FB5EF773C2E625A060EAAC92D5DB0808332C106B454C9084B18162C8CE8173CAB182ED1B0D044
3,707,737 UART: Caliptra RT
3,708,082 UART: [state] CFI Enabled
3,815,910 UART: [rt] RT listening for mailbox commands...
3,816,580 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,672 UART: [rt]cmd =0x41544d4e, len=14344
3,941,305 >>> mbox cmd response: failed
3,941,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,839 UART: [rt]cmd =0x41544d4e, len=14344
4,065,348 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,701 ready_for_fw is high
1,055,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,163,869 >>> mbox cmd response: success
3,225,684 UART:
3,225,700 UART: Running Caliptra FMC ...
3,226,108 UART:
3,226,251 UART: [state] CFI Enabled
3,236,703 UART: [fht] FMC Alias Private Key: 7
3,344,195 UART: [art] Extend RT PCRs Done
3,344,623 UART: [art] Lock RT PCRs Done
3,346,029 UART: [art] Populate DV Done
3,354,371 UART: [fht] FMC Alias Private Key: 7
3,355,415 UART: [art] Derive CDI
3,355,695 UART: [art] Store in in slot 0x4
3,441,230 UART: [art] Derive Key Pair
3,441,590 UART: [art] Store priv key in slot 0x5
3,455,004 UART: [art] Derive Key Pair - Done
3,470,040 UART: [art] Signing Cert with AUTHO
3,470,520 UART: RITY.KEYID = 7
3,485,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,105 UART: [art] PUB.X = 50A077F362B1586FCB1BF42EE63FFAB5D0346C280DB8138EA6833598B144C4DAD28E744950AA87D11B9CAAAB69471922
3,492,880 UART: [art] PUB.Y = F34D8AABB71965791C940DC5D5C0EA12A0C63599F15B543BF0FA1E9655434BCB500FF661F325D549F95166F4DA68DF56
3,499,832 UART: [art] SIG.R = 821F78A333A17673934335F7765067CE01AB491FE5EFF1F0CB9C6FD7D2155C5D04EFFCCD557019609DD385945197DBA7
3,506,600 UART: [art] SIG.S = 8FEA95E80D6207CF262321DBBFDA4A6824068F6C5317689D56420AD1AD422A71C9421D71CC1F2AD83C56BE6E08F21649
3,530,348 UART: Caliptra RT
3,530,693 UART: [state] CFI Enabled
3,638,226 UART: [rt] RT listening for mailbox commands...
3,638,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,052 UART: [rt]cmd =0x41544d4e, len=14344
3,763,639 >>> mbox cmd response: failed
3,763,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,953 UART: [rt]cmd =0x41544d4e, len=14344
3,887,552 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,196 UART:
192,544 UART: Running Caliptra ROM ...
193,709 UART:
193,858 UART: [state] CFI Enabled
263,301 UART: [state] LifecycleState = Unprovisioned
265,198 UART: [state] DebugLocked = No
266,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,565 UART: [kat] SHA2-256
442,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,797 UART: [kat] ++
453,280 UART: [kat] sha1
465,034 UART: [kat] SHA2-256
467,659 UART: [kat] SHA2-384
473,086 UART: [kat] SHA2-512-ACC
475,468 UART: [kat] ECC-384
2,768,636 UART: [kat] HMAC-384Kdf
2,800,705 UART: [kat] LMS
3,990,972 UART: [kat] --
3,994,640 UART: [cold-reset] ++
3,995,727 UART: [fht] Storing FHT @ 0x50003400
4,006,733 UART: [idev] ++
4,007,300 UART: [idev] CDI.KEYID = 6
4,008,192 UART: [idev] SUBJECT.KEYID = 7
4,009,437 UART: [idev] UDS.KEYID = 0
4,010,396 ready_for_fw is high
4,010,616 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,744 UART: [idev] Erasing UDS.KEYID = 0
7,347,488 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,151 UART: [idev] --
7,373,112 UART: [ldev] ++
7,373,686 UART: [ldev] CDI.KEYID = 6
7,374,654 UART: [ldev] SUBJECT.KEYID = 5
7,375,867 UART: [ldev] AUTHORITY.KEYID = 7
7,377,151 UART: [ldev] FE.KEYID = 1
7,423,287 UART: [ldev] Erasing FE.KEYID = 1
10,756,992 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,117,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,259 UART: [ldev] --
13,140,380 UART: [fwproc] Waiting for Commands...
13,143,673 UART: [fwproc] Received command 0x46574c44
13,145,912 UART: [fwproc] Received Image of size 113760 bytes
21,851,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,933,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,002,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,318,220 >>> mbox cmd response: success
22,321,946 UART: [afmc] ++
22,322,537 UART: [afmc] CDI.KEYID = 6
22,323,450 UART: [afmc] SUBJECT.KEYID = 7
22,324,719 UART: [afmc] AUTHORITY.KEYID = 5
25,678,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,977,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,979,631 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,994,217 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,008,941 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,023,197 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,044,187 UART: [afmc] --
28,048,434 UART: [cold-reset] --
28,052,513 UART: [state] Locking Datavault
28,058,817 UART: [state] Locking PCR0, PCR1 and PCR31
28,060,566 UART: [state] Locking ICCM
28,063,240 UART: [exit] Launching FMC @ 0x40000130
28,071,637 UART:
28,071,874 UART: Running Caliptra FMC ...
28,072,978 UART:
28,073,138 UART: [state] CFI Enabled
28,137,590 UART: [fht] FMC Alias Private Key: 7
30,476,069 UART: [art] Extend RT PCRs Done
30,477,289 UART: [art] Lock RT PCRs Done
30,479,152 UART: [art] Populate DV Done
30,484,561 UART: [fht] FMC Alias Private Key: 7
30,486,072 UART: [art] Derive CDI
30,486,842 UART: [art] Store in in slot 0x4
30,545,995 UART: [art] Derive Key Pair
30,547,036 UART: [art] Store priv key in slot 0x5
33,839,926 UART: [art] Derive Key Pair - Done
33,853,192 UART: [art] Signing Cert with AUTHO
33,854,488 UART: RITY.KEYID = 7
36,140,256 UART: [art] Erasing AUTHORITY.KEYID = 7
36,141,764 UART: [art] PUB.X = D7AB6FAD6B04358287C378F50F8167CFAEC03CAD6F648088E682E7960128999CE0E4EBBE9D990CA177792171F88E0A13
36,149,013 UART: [art] PUB.Y = 7135052CD0B758AA040A6753278EF15F360B7D8C94AE7404CE2BE7AA94751C68D78E88EBF93352CCF4D79E4CAE242B4A
36,156,298 UART: [art] SIG.R = 6155EB768E862754DCD9D2A94816AD26C3E607155741CAACE65A0C715B0C66C4BF5D4486E0CB04BF363C33DB3A726724
36,163,682 UART: [art] SIG.S = 590C2F7B1203020C83222972475F6200A3B493BEB69FEC726575065EECCC031F196BDB5EB756BBEC5590C596920A8A0C
37,468,971 UART: Caliptra RT
37,469,677 UART: [state] CFI Enabled
37,631,403 UART: [rt] RT listening for mailbox commands...
37,633,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,788,934 UART: [rt]cmd =0x41544d4e, len=14344
46,215,232 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,804,285 ready_for_fw is high
3,804,699 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,270,651 >>> mbox cmd response: success
27,959,571 UART:
27,959,965 UART: Running Caliptra FMC ...
27,961,058 UART:
27,961,234 UART: [state] CFI Enabled
28,028,838 UART: [fht] FMC Alias Private Key: 7
30,366,838 UART: [art] Extend RT PCRs Done
30,368,068 UART: [art] Lock RT PCRs Done
30,369,401 UART: [art] Populate DV Done
30,374,854 UART: [fht] FMC Alias Private Key: 7
30,376,450 UART: [art] Derive CDI
30,377,193 UART: [art] Store in in slot 0x4
30,437,806 UART: [art] Derive Key Pair
30,438,857 UART: [art] Store priv key in slot 0x5
33,731,340 UART: [art] Derive Key Pair - Done
33,744,449 UART: [art] Signing Cert with AUTHO
33,745,752 UART: RITY.KEYID = 7
36,033,348 UART: [art] Erasing AUTHORITY.KEYID = 7
36,034,869 UART: [art] PUB.X = BCA283D2F1A0A3674691627A46CA59560AA5DCCBCF4E5A3ADC32F8BF6F818201F9C9123E47688E0408462AC58C4FC387
36,042,136 UART: [art] PUB.Y = 049F3BD952B70E47DEB21FD4984DC50041259A4D1E4AB0D217F4AA5E0501E6C2B063374EDE2C50986C6B24CD0857A292
36,049,386 UART: [art] SIG.R = EE11E22B2D4FCF03DDF685F3C3B4DE7390EA73963113C923F97127E61C9C8A4FB99ED4AE4FE01266953A6ED12E21AB91
36,056,750 UART: [art] SIG.S = C4AFD1A42D58DC9F591FCE4A3FAB43BDD856328FE20749BD38048BE617CBC1629CF09269D19444880A9F43B481B3885F
37,361,608 UART: Caliptra RT
37,362,301 UART: [state] CFI Enabled
37,523,099 UART: [rt] RT listening for mailbox commands...
37,525,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,680,873 UART: [rt]cmd =0x41544d4e, len=14344
46,159,466 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
192,943 UART:
193,309 UART: Running Caliptra ROM ...
194,432 UART:
604,004 UART: [state] CFI Enabled
620,410 UART: [state] LifecycleState = Unprovisioned
622,349 UART: [state] DebugLocked = No
624,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,716 UART: [kat] SHA2-256
798,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,983 UART: [kat] ++
809,428 UART: [kat] sha1
819,754 UART: [kat] SHA2-256
822,468 UART: [kat] SHA2-384
828,609 UART: [kat] SHA2-512-ACC
830,969 UART: [kat] ECC-384
3,113,756 UART: [kat] HMAC-384Kdf
3,125,922 UART: [kat] LMS
4,316,054 UART: [kat] --
4,319,497 UART: [cold-reset] ++
4,321,850 UART: [fht] Storing FHT @ 0x50003400
4,333,322 UART: [idev] ++
4,333,953 UART: [idev] CDI.KEYID = 6
4,334,833 UART: [idev] SUBJECT.KEYID = 7
4,336,068 UART: [idev] UDS.KEYID = 0
4,337,153 ready_for_fw is high
4,337,589 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,746 UART: [idev] Erasing UDS.KEYID = 0
7,622,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,909 UART: [idev] --
7,648,580 UART: [ldev] ++
7,649,147 UART: [ldev] CDI.KEYID = 6
7,650,105 UART: [ldev] SUBJECT.KEYID = 5
7,651,308 UART: [ldev] AUTHORITY.KEYID = 7
7,652,583 UART: [ldev] FE.KEYID = 1
7,665,922 UART: [ldev] Erasing FE.KEYID = 1
10,953,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,087 UART: [ldev] --
13,311,004 UART: [fwproc] Waiting for Commands...
13,313,476 UART: [fwproc] Received command 0x46574c44
13,315,653 UART: [fwproc] Received Image of size 113760 bytes
22,188,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,266,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,335,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,650,852 >>> mbox cmd response: success
22,654,865 UART: [afmc] ++
22,655,461 UART: [afmc] CDI.KEYID = 6
22,656,350 UART: [afmc] SUBJECT.KEYID = 7
22,657,770 UART: [afmc] AUTHORITY.KEYID = 5
25,975,537 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,271,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,273,591 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,288,132 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,302,893 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,317,088 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,338,517 UART: [afmc] --
28,341,457 UART: [cold-reset] --
28,345,292 UART: [state] Locking Datavault
28,350,539 UART: [state] Locking PCR0, PCR1 and PCR31
28,352,291 UART: [state] Locking ICCM
28,353,979 UART: [exit] Launching FMC @ 0x40000130
28,362,369 UART:
28,362,600 UART: Running Caliptra FMC ...
28,363,645 UART:
28,363,791 UART: [state] CFI Enabled
28,371,858 UART: [fht] FMC Alias Private Key: 7
30,702,121 UART: [art] Extend RT PCRs Done
30,703,340 UART: [art] Lock RT PCRs Done
30,705,128 UART: [art] Populate DV Done
30,710,536 UART: [fht] FMC Alias Private Key: 7
30,712,065 UART: [art] Derive CDI
30,712,880 UART: [art] Store in in slot 0x4
30,755,592 UART: [art] Derive Key Pair
30,756,650 UART: [art] Store priv key in slot 0x5
33,998,891 UART: [art] Derive Key Pair - Done
34,012,105 UART: [art] Signing Cert with AUTHO
34,013,409 UART: RITY.KEYID = 7
36,292,832 UART: [art] Erasing AUTHORITY.KEYID = 7
36,294,652 UART: [art] PUB.X = 26FAC880CBA0951895F8FF8D496AAF39831225D8A30A6DADCB528E974BF51C0A9DE6C81B36E8CBE5D9FD058F9FAFC74D
36,301,600 UART: [art] PUB.Y = 27B707BF4F7F1FF3043CCE91776909C2B825385F9CD6D7ECA11E5C4536375AC11CB960424DFD861545B45FDF35A0BFB6
36,308,856 UART: [art] SIG.R = 3C39662EF370F66F1DD911BF72CC79540A9E04DE7AE700D65C99E88D80836E0748078DE7852F906C6FF75B77B63A54D3
36,316,213 UART: [art] SIG.S = ECA1D1DC87B4E5608215F882406D512D99EE1192395C5CB3541DA9D9E9352F3AF3E1F6D7E79092409C58307B63579497
37,621,240 UART: Caliptra RT
37,621,932 UART: [state] CFI Enabled
37,740,113 UART: [rt] RT listening for mailbox commands...
37,742,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,897,814 UART: [rt]cmd =0x41544d4e, len=14344
46,168,771 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
4,127,312 ready_for_fw is high
4,127,711 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,377,775 >>> mbox cmd response: success
28,015,809 UART:
28,016,205 UART: Running Caliptra FMC ...
28,017,315 UART:
28,017,465 UART: [state] CFI Enabled
28,025,554 UART: [fht] FMC Alias Private Key: 7
30,355,855 UART: [art] Extend RT PCRs Done
30,357,084 UART: [art] Lock RT PCRs Done
30,358,684 UART: [art] Populate DV Done
30,364,181 UART: [fht] FMC Alias Private Key: 7
30,365,831 UART: [art] Derive CDI
30,366,670 UART: [art] Store in in slot 0x4
30,409,697 UART: [art] Derive Key Pair
30,410,697 UART: [art] Store priv key in slot 0x5
33,652,890 UART: [art] Derive Key Pair - Done
33,666,057 UART: [art] Signing Cert with AUTHO
33,667,364 UART: RITY.KEYID = 7
35,947,184 UART: [art] Erasing AUTHORITY.KEYID = 7
35,948,849 UART: [art] PUB.X = 64126201CE6F07BBD1A317B91C2293A1C673AE0D12A306DAAFBBE53F6F84659F0799E97EF3195271B2A5C86AEA14BE4E
35,955,973 UART: [art] PUB.Y = CE8C48F5B6D45968C1FBF497BFA8467DFF27E20B50FF31103C99E1341D3A314E2141C559315367110A8E8633D175C018
35,963,157 UART: [art] SIG.R = 75F077C11E2ADBF49416CAF634C0C30542C05EFF2FE2BFB0885AA8745187599F4CF1055F770622EC56B36FBB7B693D1F
35,970,539 UART: [art] SIG.S = 775804ABB730F090E3041BE2AFE0DA036D17CE3CDF11A65EDD975411C2E5253E3DC7389F5A7F713B4FE745D1BB1D37E7
37,276,284 UART: Caliptra RT
37,276,992 UART: [state] CFI Enabled
37,395,686 UART: [rt] RT listening for mailbox commands...
37,397,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,553,520 UART: [rt]cmd =0x41544d4e, len=14344
45,954,394 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
192,581 UART:
192,950 UART: Running Caliptra ROM ...
194,032 UART:
194,178 UART: [state] CFI Enabled
260,657 UART: [state] LifecycleState = Unprovisioned
262,512 UART: [state] DebugLocked = No
264,105 UART: [state] WD Timer not started. Device not locked for debugging
267,156 UART: [kat] SHA2-256
446,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,868 UART: [kat] ++
458,317 UART: [kat] sha1
469,138 UART: [kat] SHA2-256
472,149 UART: [kat] SHA2-384
477,995 UART: [kat] SHA2-512-ACC
480,923 UART: [kat] ECC-384
2,928,330 UART: [kat] HMAC-384Kdf
2,950,237 UART: [kat] LMS
3,479,699 UART: [kat] --
3,485,281 UART: [cold-reset] ++
3,486,505 UART: [fht] FHT @ 0x50003400
3,497,595 UART: [idev] ++
3,498,211 UART: [idev] CDI.KEYID = 6
3,499,135 UART: [idev] SUBJECT.KEYID = 7
3,500,239 UART: [idev] UDS.KEYID = 0
3,501,285 ready_for_fw is high
3,501,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,644,785 UART: [idev] Erasing UDS.KEYID = 0
6,003,833 UART: [idev] Sha1 KeyId Algorithm
6,027,719 UART: [idev] --
6,032,901 UART: [ldev] ++
6,033,538 UART: [ldev] CDI.KEYID = 6
6,034,429 UART: [ldev] SUBJECT.KEYID = 5
6,035,530 UART: [ldev] AUTHORITY.KEYID = 7
6,036,826 UART: [ldev] FE.KEYID = 1
6,078,621 UART: [ldev] Erasing FE.KEYID = 1
8,580,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,519 UART: [ldev] --
10,391,785 UART: [fwproc] Wait for Commands...
10,393,981 UART: [fwproc] Recv command 0x46574c44
10,396,052 UART: [fwproc] Recv'd Img size: 114084 bytes
14,961,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,040,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,109,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,426,878 >>> mbox cmd response: success
15,431,433 UART: [afmc] ++
15,432,031 UART: [afmc] CDI.KEYID = 6
15,432,945 UART: [afmc] SUBJECT.KEYID = 7
15,434,100 UART: [afmc] AUTHORITY.KEYID = 5
17,957,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,458 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,699,359 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,715,351 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,731,118 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,755,180 UART: [afmc] --
19,758,639 UART: [cold-reset] --
19,762,394 UART: [state] Locking Datavault
19,767,318 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,956 UART: [state] Locking ICCM
19,770,159 UART: [exit] Launching FMC @ 0x40000130
19,778,608 UART:
19,778,836 UART: Running Caliptra FMC ...
19,779,861 UART:
19,780,006 UART: [state] CFI Enabled
19,839,877 UART: [fht] FMC Alias Private Key: 7
21,603,182 UART: [art] Extend RT PCRs Done
21,604,391 UART: [art] Lock RT PCRs Done
21,606,041 UART: [art] Populate DV Done
21,611,612 UART: [fht] FMC Alias Private Key: 7
21,613,199 UART: [art] Derive CDI
21,614,007 UART: [art] Store in in slot 0x4
21,672,413 UART: [art] Derive Key Pair
21,673,454 UART: [art] Store priv key in slot 0x5
24,136,161 UART: [art] Derive Key Pair - Done
24,148,892 UART: [art] Signing Cert with AUTHO
24,150,198 UART: RITY.KEYID = 7
25,862,220 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,711 UART: [art] PUB.X = 53F89707F035DF12A0112A6E6A7656150F28A14967EFF5F69BE31A65FA8AAC5E77E7622CE9CC54E7E2F8DCB98C26D696
25,871,001 UART: [art] PUB.Y = D71C5FAE9751DFA46834128BC3D476DA56E75606D92D13C61D80C1EA43F0D8BF34A3AE8F80EB5060406BCCEB9AEE3B5C
25,878,277 UART: [art] SIG.R = 84B8E867719273DEB3ED0264EACCF0CC7B90331B2B04086C7A58B44D46ECBD66B874240A6ABAF6BEA87966E34FFA17BC
25,885,711 UART: [art] SIG.S = C5234A370876D30F60DA6588DB938C2F068BB93A16907B3056B3335A1B6B5E5A28505AF5F5D6926A15395BF80A7D7827
26,864,587 UART: Caliptra RT
26,865,300 UART: [state] CFI Enabled
27,029,183 UART: [rt] RT listening for mailbox commands...
27,031,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,186,799 UART: [rt]cmd =0x41544d4e, len=14344
32,039,850 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
3,381,944 ready_for_fw is high
3,382,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,064,440 >>> mbox cmd response: success
19,346,182 UART:
19,346,628 UART: Running Caliptra FMC ...
19,347,735 UART:
19,347,896 UART: [state] CFI Enabled
19,415,042 UART: [fht] FMC Alias Private Key: 7
21,178,993 UART: [art] Extend RT PCRs Done
21,180,203 UART: [art] Lock RT PCRs Done
21,181,932 UART: [art] Populate DV Done
21,187,341 UART: [fht] FMC Alias Private Key: 7
21,188,934 UART: [art] Derive CDI
21,189,695 UART: [art] Store in in slot 0x4
21,247,601 UART: [art] Derive Key Pair
21,248,640 UART: [art] Store priv key in slot 0x5
23,711,911 UART: [art] Derive Key Pair - Done
23,724,899 UART: [art] Signing Cert with AUTHO
23,726,250 UART: RITY.KEYID = 7
25,437,054 UART: [art] Erasing AUTHORITY.KEYID = 7
25,438,543 UART: [art] PUB.X = 97CB8F20A8182FCADAEC6B4BFAADCF758DBC8FE65AF919629C4FF7AC384A884C8EC0FA61C72072619FB9DDC05B8D33F8
25,445,826 UART: [art] PUB.Y = DDE17F517E1A86448E20F8787118FD3FAC3315662120AF73E58CC8E5BF6091699A242BD89C0620C51C050E1D240053FD
25,453,055 UART: [art] SIG.R = 283FF58A197821E16C67E8BCEABF693516966C0DF215496365FF3D5F339C3263AEB8FFED137061A3551730ECD2BED931
25,460,492 UART: [art] SIG.S = 5FC485B41E824464282A00A3C4BD47937F776EBD1292E667DC4B0430F5C67ED9D27200463B919AFF92F67F074F45120D
26,438,721 UART: Caliptra RT
26,439,571 UART: [state] CFI Enabled
26,605,356 UART: [rt] RT listening for mailbox commands...
26,607,688 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,762,978 UART: [rt]cmd =0x41544d4e, len=14344
31,616,480 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,910 writing to cptra_bootfsm_go
193,085 UART:
193,467 UART: Running Caliptra ROM ...
194,567 UART:
604,065 UART: [state] CFI Enabled
619,521 UART: [state] LifecycleState = Unprovisioned
621,396 UART: [state] DebugLocked = No
623,993 UART: [state] WD Timer not started. Device not locked for debugging
627,539 UART: [kat] SHA2-256
806,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,195 UART: [kat] ++
818,642 UART: [kat] sha1
830,575 UART: [kat] SHA2-256
833,651 UART: [kat] SHA2-384
839,070 UART: [kat] SHA2-512-ACC
842,009 UART: [kat] ECC-384
3,281,809 UART: [kat] HMAC-384Kdf
3,294,399 UART: [kat] LMS
3,823,891 UART: [kat] --
3,826,987 UART: [cold-reset] ++
3,828,081 UART: [fht] FHT @ 0x50003400
3,838,788 UART: [idev] ++
3,839,360 UART: [idev] CDI.KEYID = 6
3,840,269 UART: [idev] SUBJECT.KEYID = 7
3,841,445 UART: [idev] UDS.KEYID = 0
3,842,493 ready_for_fw is high
3,842,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,961 UART: [idev] Erasing UDS.KEYID = 0
6,313,608 UART: [idev] Sha1 KeyId Algorithm
6,337,957 UART: [idev] --
6,343,544 UART: [ldev] ++
6,344,170 UART: [ldev] CDI.KEYID = 6
6,345,059 UART: [ldev] SUBJECT.KEYID = 5
6,346,220 UART: [ldev] AUTHORITY.KEYID = 7
6,347,450 UART: [ldev] FE.KEYID = 1
6,357,613 UART: [ldev] Erasing FE.KEYID = 1
8,831,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,841 UART: [ldev] --
10,623,028 UART: [fwproc] Wait for Commands...
10,624,592 UART: [fwproc] Recv command 0x46574c44
10,626,690 UART: [fwproc] Recv'd Img size: 114084 bytes
15,194,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,654,828 >>> mbox cmd response: success
15,658,342 UART: [afmc] ++
15,658,945 UART: [afmc] CDI.KEYID = 6
15,659,863 UART: [afmc] SUBJECT.KEYID = 7
15,661,031 UART: [afmc] AUTHORITY.KEYID = 5
18,164,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,885,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,887,543 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,903,497 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,919,488 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,935,281 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,958,669 UART: [afmc] --
19,963,243 UART: [cold-reset] --
19,967,386 UART: [state] Locking Datavault
19,970,581 UART: [state] Locking PCR0, PCR1 and PCR31
19,972,231 UART: [state] Locking ICCM
19,973,950 UART: [exit] Launching FMC @ 0x40000130
19,982,401 UART:
19,982,642 UART: Running Caliptra FMC ...
19,983,749 UART:
19,983,906 UART: [state] CFI Enabled
19,992,348 UART: [fht] FMC Alias Private Key: 7
21,748,950 UART: [art] Extend RT PCRs Done
21,750,174 UART: [art] Lock RT PCRs Done
21,751,504 UART: [art] Populate DV Done
21,756,969 UART: [fht] FMC Alias Private Key: 7
21,758,668 UART: [art] Derive CDI
21,759,482 UART: [art] Store in in slot 0x4
21,801,752 UART: [art] Derive Key Pair
21,802,792 UART: [art] Store priv key in slot 0x5
24,229,174 UART: [art] Derive Key Pair - Done
24,242,112 UART: [art] Signing Cert with AUTHO
24,243,422 UART: RITY.KEYID = 7
25,948,717 UART: [art] Erasing AUTHORITY.KEYID = 7
25,950,224 UART: [art] PUB.X = 7DAAF5968E9A2453175B36B6F788730D7BCA865EFD8BA19E9D632837FBB89B9BA6FB72EEA60CC8BCB1B8A8027E7E4F40
25,957,499 UART: [art] PUB.Y = 548D591E88D00861F5451576CA8813980BF5FF5CC37B7E6C7DAC59CD387C821F3032E7BDBBB0CC472672614A299FFCD2
25,964,766 UART: [art] SIG.R = A4FC9F28AEEB73A5A0124AC7F247F49891D91EEA4576795D7A5675E3F4550E405CD6ADF8735B60E8D07751B6A3A7CA5C
25,972,206 UART: [art] SIG.S = 8B6ED9AA60DE1A82FEA6F5B587D9A68D842F6DFEBFD57BED32A8480DE5C5372B7D156D1AB9912C40CB31E9E1A1529752
26,951,198 UART: Caliptra RT
26,951,909 UART: [state] CFI Enabled
27,068,547 UART: [rt] RT listening for mailbox commands...
27,070,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,198 UART: [rt]cmd =0x41544d4e, len=14344
32,083,362 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
3,694,076 ready_for_fw is high
3,694,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,248,799 >>> mbox cmd response: success
19,499,912 UART:
19,500,321 UART: Running Caliptra FMC ...
19,501,427 UART:
19,501,579 UART: [state] CFI Enabled
19,509,484 UART: [fht] FMC Alias Private Key: 7
21,265,597 UART: [art] Extend RT PCRs Done
21,266,819 UART: [art] Lock RT PCRs Done
21,268,328 UART: [art] Populate DV Done
21,273,588 UART: [fht] FMC Alias Private Key: 7
21,275,297 UART: [art] Derive CDI
21,276,041 UART: [art] Store in in slot 0x4
21,318,862 UART: [art] Derive Key Pair
21,319,903 UART: [art] Store priv key in slot 0x5
23,747,054 UART: [art] Derive Key Pair - Done
23,759,782 UART: [art] Signing Cert with AUTHO
23,761,085 UART: RITY.KEYID = 7
25,466,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,468,321 UART: [art] PUB.X = D1B655CCD5E84FC0B368319A94FE2612D2E23AB7E0A83684BFF36F066B39AFF8D6A7BA408F1F9334E421DBBBA53AB880
25,475,592 UART: [art] PUB.Y = D17826A0413FD77A790F28A7AEB4F4A5F64C86FFCD4D18BD1F3D4588ED82C2A9A3570A3F0935F5F0CB086F2049EF71D9
25,482,885 UART: [art] SIG.R = 1CA14DC2F2A956593D3D00878C4C3E38607C9B97AE6CF14210DA4BE9AFBC9A510063D9570E2CAE4978E6C682DFAEAC85
25,490,251 UART: [art] SIG.S = 1E473F3A74A52CA172B32DA75C0DBDC40F3D8C4E7B49C06A6D47C8166DB3A0EEE17A5C0E8DF165B080F8509A1C98483F
26,468,944 UART: Caliptra RT
26,469,660 UART: [state] CFI Enabled
26,587,137 UART: [rt] RT listening for mailbox commands...
26,589,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,744,553 UART: [rt]cmd =0x41544d4e, len=14344
31,604,749 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
192,412 UART:
192,782 UART: Running Caliptra ROM ...
193,936 UART:
194,084 UART: [state] CFI Enabled
265,131 UART: [state] LifecycleState = Unprovisioned
267,554 UART: [state] DebugLocked = No
268,873 UART: [state] WD Timer not started. Device not locked for debugging
273,535 UART: [kat] SHA2-256
463,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,171 UART: [kat] ++
474,697 UART: [kat] sha1
485,933 UART: [kat] SHA2-256
488,938 UART: [kat] SHA2-384
495,236 UART: [kat] SHA2-512-ACC
497,861 UART: [kat] ECC-384
2,947,958 UART: [kat] HMAC-384Kdf
2,972,417 UART: [kat] LMS
3,504,178 UART: [kat] --
3,509,611 UART: [cold-reset] ++
3,511,120 UART: [fht] FHT @ 0x50003400
3,523,513 UART: [idev] ++
3,524,161 UART: [idev] CDI.KEYID = 6
3,525,195 UART: [idev] SUBJECT.KEYID = 7
3,526,259 UART: [idev] UDS.KEYID = 0
3,527,244 ready_for_fw is high
3,527,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,969 UART: [idev] Erasing UDS.KEYID = 0
6,026,597 UART: [idev] Sha1 KeyId Algorithm
6,048,385 UART: [idev] --
6,052,002 UART: [ldev] ++
6,052,686 UART: [ldev] CDI.KEYID = 6
6,053,664 UART: [ldev] SUBJECT.KEYID = 5
6,054,824 UART: [ldev] AUTHORITY.KEYID = 7
6,055,999 UART: [ldev] FE.KEYID = 1
6,100,837 UART: [ldev] Erasing FE.KEYID = 1
8,604,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,627 UART: [ldev] --
10,414,677 UART: [fwproc] Wait for Commands...
10,416,377 UART: [fwproc] Recv command 0x46574c44
10,418,641 UART: [fwproc] Recv'd Img size: 114084 bytes
15,034,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,119,082 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,235,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,776,085 >>> mbox cmd response: success
15,780,684 UART: [afmc] ++
15,781,384 UART: [afmc] CDI.KEYID = 6
15,782,550 UART: [afmc] SUBJECT.KEYID = 7
15,784,044 UART: [afmc] AUTHORITY.KEYID = 5
18,323,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,049,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,051,395 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,066,500 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,081,697 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,096,577 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,121,482 UART: [afmc] --
20,124,483 UART: [cold-reset] --
20,127,917 UART: [state] Locking Datavault
20,133,068 UART: [state] Locking PCR0, PCR1 and PCR31
20,135,234 UART: [state] Locking ICCM
20,136,441 UART: [exit] Launching FMC @ 0x40000130
20,145,129 UART:
20,145,361 UART: Running Caliptra FMC ...
20,146,461 UART:
20,146,619 UART: [state] CFI Enabled
20,206,776 UART: [fht] FMC Alias Private Key: 7
21,970,785 UART: [art] Extend RT PCRs Done
21,972,002 UART: [art] Lock RT PCRs Done
21,973,362 UART: [art] Populate DV Done
21,978,725 UART: [fht] FMC Alias Private Key: 7
21,980,431 UART: [art] Derive CDI
21,981,246 UART: [art] Store in in slot 0x4
22,039,214 UART: [art] Derive Key Pair
22,040,245 UART: [art] Store priv key in slot 0x5
24,503,063 UART: [art] Derive Key Pair - Done
24,516,172 UART: [art] Signing Cert with AUTHO
24,517,483 UART: RITY.KEYID = 7
26,228,189 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,685 UART: [art] PUB.X = 91C3B87F0FBE72EFB53ECD72B2F9701DE45266F796E765FA6401BEAB50BCC513A50DFA27BD291867349A79C675766A1E
26,236,990 UART: [art] PUB.Y = 53C934D8EBFC455707B3462D1B2CAFD0404862EFEC58FCE286D61AA77A1C0409E3C4772766943B08C311080D3E14CB5F
26,244,283 UART: [art] SIG.R = 68707A06F4713A24E0CB9DCEC7AD696FE51F08251682CC85C3F16349561A08F45832B4AFE7DE52878FD168FECC61567E
26,251,641 UART: [art] SIG.S = 923C6C83A4D63C07567D3E9C379E81DE6EA6DDADADA2C2B3F46EFEC5597757163D00796439654819E14B510A3D823804
27,230,929 UART: Caliptra RT
27,231,627 UART: [state] CFI Enabled
27,395,740 UART: [rt] RT listening for mailbox commands...
27,398,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,255 UART: [rt]cmd =0x41544d4e, len=14344
32,405,897 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,437,705 ready_for_fw is high
3,438,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,825,444 >>> mbox cmd response: success
20,114,592 UART:
20,114,986 UART: Running Caliptra FMC ...
20,116,171 UART:
20,116,339 UART: [state] CFI Enabled
20,181,873 UART: [fht] FMC Alias Private Key: 7
21,945,396 UART: [art] Extend RT PCRs Done
21,946,645 UART: [art] Lock RT PCRs Done
21,948,332 UART: [art] Populate DV Done
21,953,781 UART: [fht] FMC Alias Private Key: 7
21,955,262 UART: [art] Derive CDI
21,956,022 UART: [art] Store in in slot 0x4
22,013,662 UART: [art] Derive Key Pair
22,014,709 UART: [art] Store priv key in slot 0x5
24,477,948 UART: [art] Derive Key Pair - Done
24,490,945 UART: [art] Signing Cert with AUTHO
24,492,276 UART: RITY.KEYID = 7
26,202,558 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,066 UART: [art] PUB.X = 2380999E15F7E56D05EBC8E2800195212D17FD2D7C6CE11D64DE9001D76729A8A2E3FD3F72684C031385D758D8246D88
26,211,326 UART: [art] PUB.Y = 7CAECDC2E92A1D5182D6E8059EF678DB1B97DFF38F407B65EED6F1A8E6FCC59BEF7765E1E5FB6D43EF48DF17DCFBA4F1
26,218,673 UART: [art] SIG.R = CAF8B62D32867EB0224381C185E9CDA28914A47F4C51D670191665AC83910D1AAD4A60BD7FDF55ACC346D734133569D3
26,226,049 UART: [art] SIG.S = 2724927865265E0719E53764B2A7949EA0BB5DA8EF952B10D2258EB66A9BF3D7E9F6E715E2F414D48AE3B68C7DFEA4BD
27,204,554 UART: Caliptra RT
27,205,284 UART: [state] CFI Enabled
27,370,104 UART: [rt] RT listening for mailbox commands...
27,372,486 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,527,913 UART: [rt]cmd =0x41544d4e, len=14344
32,388,290 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
192,933 UART:
193,507 UART: Running Caliptra ROM ...
194,649 UART:
603,899 UART: [state] CFI Enabled
614,502 UART: [state] LifecycleState = Unprovisioned
616,856 UART: [state] DebugLocked = No
618,673 UART: [state] WD Timer not started. Device not locked for debugging
624,180 UART: [kat] SHA2-256
814,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,790 UART: [kat] ++
825,316 UART: [kat] sha1
837,040 UART: [kat] SHA2-256
840,114 UART: [kat] SHA2-384
845,545 UART: [kat] SHA2-512-ACC
848,080 UART: [kat] ECC-384
3,292,246 UART: [kat] HMAC-384Kdf
3,305,413 UART: [kat] LMS
3,837,241 UART: [kat] --
3,840,391 UART: [cold-reset] ++
3,841,761 UART: [fht] FHT @ 0x50003400
3,854,944 UART: [idev] ++
3,855,651 UART: [idev] CDI.KEYID = 6
3,856,601 UART: [idev] SUBJECT.KEYID = 7
3,857,769 UART: [idev] UDS.KEYID = 0 3,858,712 ready_for_fw is high
3,858,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,424 UART: [idev] Erasing UDS.KEYID = 0
6,338,459 UART: [idev] Sha1 KeyId Algorithm
6,360,381 UART: [idev] --
6,364,704 UART: [ldev] ++
6,365,404 UART: [ldev] CDI.KEYID = 6
6,366,287 UART: [ldev] SUBJECT.KEYID = 5
6,367,496 UART: [ldev] AUTHORITY.KEYID = 7
6,368,674 UART: [ldev] FE.KEYID = 1
6,380,861 UART: [ldev] Erasing FE.KEYID = 1
8,857,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,066 UART: [ldev] --
10,648,063 UART: [fwproc] Wait for Commands...
10,650,049 UART: [fwproc] Recv command 0x46574c44
10,652,360 UART: [fwproc] Recv'd Img size: 114084 bytes
15,289,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,375,868 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,492,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,033,201 >>> mbox cmd response: success
16,036,620 UART: [afmc] ++
16,037,326 UART: [afmc] CDI.KEYID = 6
16,038,574 UART: [afmc] SUBJECT.KEYID = 7
16,040,017 UART: [afmc] AUTHORITY.KEYID = 5
18,539,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,262,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,264,720 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,279,748 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,294,977 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,309,827 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,333,684 UART: [afmc] --
20,337,932 UART: [cold-reset] --
20,342,276 UART: [state] Locking Datavault
20,349,334 UART: [state] Locking PCR0, PCR1 and PCR31
20,351,517 UART: [state] Locking ICCM
20,352,808 UART: [exit] Launching FMC @ 0x40000130
20,361,439 UART:
20,361,681 UART: Running Caliptra FMC ...
20,362,785 UART:
20,362,959 UART: [state] CFI Enabled
20,371,118 UART: [fht] FMC Alias Private Key: 7
22,128,064 UART: [art] Extend RT PCRs Done
22,129,288 UART: [art] Lock RT PCRs Done
22,131,187 UART: [art] Populate DV Done
22,136,868 UART: [fht] FMC Alias Private Key: 7
22,138,458 UART: [art] Derive CDI
22,139,276 UART: [art] Store in in slot 0x4
22,181,828 UART: [art] Derive Key Pair
22,182,860 UART: [art] Store priv key in slot 0x5
24,609,991 UART: [art] Derive Key Pair - Done
24,622,784 UART: [art] Signing Cert with AUTHO
24,624,094 UART: RITY.KEYID = 7
26,329,698 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,204 UART: [art] PUB.X = 4253C2568BD6C25EBD11AF8982DCD8BCF4F693658C86F6EFE5DC89E54CF99F7344BDA455BE41FB9809239D76D677F26B
26,338,536 UART: [art] PUB.Y = 357735E602ABEABC0A13BCE5E0A8C5C90CC2673015A8B4EACA45CC57E14A173CB5D88FC180026D675F3F35E0B6F5FC29
26,345,781 UART: [art] SIG.R = C8D7D58ADAEC9C834F1DFD89A926458CEC6D23623741FB8122F95CEE4AA8586299CA9D0AB7595706AC7318370344048B
26,353,163 UART: [art] SIG.S = 863CE965010D47A14E1230D6DA076F53BCE75A6BFDA46A9338FC06A31900964DF0DCA86AFA77E4117D9AAB70E919F260
27,332,053 UART: Caliptra RT
27,332,767 UART: [state] CFI Enabled
27,449,514 UART: [rt] RT listening for mailbox commands...
27,451,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,097 UART: [rt]cmd =0x41544d4e, len=14344
32,473,397 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,758,946 ready_for_fw is high
3,759,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,070,398 >>> mbox cmd response: success
20,321,101 UART:
20,321,500 UART: Running Caliptra FMC ...
20,322,693 UART:
20,322,862 UART: [state] CFI Enabled
20,330,830 UART: [fht] FMC Alias Private Key: 7
22,087,683 UART: [art] Extend RT PCRs Done
22,088,911 UART: [art] Lock RT PCRs Done
22,090,492 UART: [art] Populate DV Done
22,095,807 UART: [fht] FMC Alias Private Key: 7
22,097,421 UART: [art] Derive CDI
22,098,249 UART: [art] Store in in slot 0x4
22,140,647 UART: [art] Derive Key Pair
22,141,697 UART: [art] Store priv key in slot 0x5
24,568,806 UART: [art] Derive Key Pair - Done
24,581,862 UART: [art] Signing Cert with AUTHO
24,583,167 UART: RITY.KEYID = 7
26,288,827 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,338 UART: [art] PUB.X = EC8A2D3C664587973091A46DAF06425B2D1BBECADDDC6E0BDA6D9E028CA901081763B2E5C447907DB274BFE172F692CD
26,297,577 UART: [art] PUB.Y = D2E253EA55C4BC0DDC5B02112B99670569C9521DA9F45B5AFB631DBD0D03CE09485800C9A0C8C0A8AAF420A0D5042C6B
26,304,832 UART: [art] SIG.R = 58BFC8A9D2D00D58875DE5799D462302F9569CCF64CE0F5D569A13CB5A4261D2CAF51B8BFCCBB6FF640A4F59802F1A51
26,312,283 UART: [art] SIG.S = 39F2F08322557F079B8E4AF8E2E0628E7FF91C06739127BB1B94E687925E7E63B882BA07A3F301493E760DDA14DAA686
27,291,065 UART: Caliptra RT
27,291,761 UART: [state] CFI Enabled
27,408,362 UART: [rt] RT listening for mailbox commands...
27,410,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,565,881 UART: [rt]cmd =0x41544d4e, len=14344
32,422,338 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,941 UART: [kat] SHA2-256
881,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,987 UART: [kat] ++
886,139 UART: [kat] sha1
890,447 UART: [kat] SHA2-256
892,385 UART: [kat] SHA2-384
895,294 UART: [kat] SHA2-512-ACC
897,195 UART: [kat] ECC-384
902,896 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,477,137 UART: [fht] Storing FHT @ 0x50003400
1,480,116 UART: [idev] ++
1,480,284 UART: [idev] CDI.KEYID = 6
1,480,644 UART: [idev] SUBJECT.KEYID = 7
1,481,068 UART: [idev] UDS.KEYID = 0
1,481,413 ready_for_fw is high
1,481,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,782 UART: [idev] Erasing UDS.KEYID = 0
1,504,944 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,558 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,317 UART: [ldev] Erasing FE.KEYID = 1
1,547,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,364 UART: [ldev] --
1,586,653 UART: [fwproc] Waiting for Commands...
1,587,422 UART: [fwproc] Received command 0x46574c44
1,588,213 UART: [fwproc] Received Image of size 114084 bytes
5,156,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,184,833 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,214,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,349,562 >>> mbox cmd response: success
5,350,630 UART: [afmc] ++
5,350,798 UART: [afmc] CDI.KEYID = 6
5,351,160 UART: [afmc] SUBJECT.KEYID = 7
5,351,585 UART: [afmc] AUTHORITY.KEYID = 5
5,386,847 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,409,352 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,415,244 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,945 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,937 UART: [afmc] --
5,429,907 UART: [cold-reset] --
5,430,729 UART: [state] Locking Datavault
5,432,014 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,618 UART: [state] Locking ICCM
5,433,222 UART: [exit] Launching FMC @ 0x40000130
5,438,551 UART:
5,438,567 UART: Running Caliptra FMC ...
5,438,975 UART:
5,439,029 UART: [state] CFI Enabled
5,449,779 UART: [fht] FMC Alias Private Key: 7
5,558,197 UART: [art] Extend RT PCRs Done
5,558,625 UART: [art] Lock RT PCRs Done
5,560,173 UART: [art] Populate DV Done
5,568,377 UART: [fht] FMC Alias Private Key: 7
5,569,419 UART: [art] Derive CDI
5,569,699 UART: [art] Store in in slot 0x4
5,655,348 UART: [art] Derive Key Pair
5,655,708 UART: [art] Store priv key in slot 0x5
5,669,192 UART: [art] Derive Key Pair - Done
5,684,247 UART: [art] Signing Cert with AUTHO
5,684,727 UART: RITY.KEYID = 7
5,699,503 UART: [art] Erasing AUTHORITY.KEYID = 7
5,700,268 UART: [art] PUB.X = 2F36E90B3B9D27BF16BFD78305221BAD7D15683C03C73C7440912679FEED2C185DA2237C8414CB0DD3B4F8D11A7C8F44
5,707,034 UART: [art] PUB.Y = AACB2353D145A2823308A58C8ABCB27A4B9B3665AB015EA944C224199B3208C93A2AD6B1551335937AAF8811AB1BC315
5,713,979 UART: [art] SIG.R = 5FCC6B598FBE5348E7C34DC75EE6C8EA33BFE52F758685669747CDE85FCF5BB610BEA88E2143643CCE39AB2F7D925803
5,720,762 UART: [art] SIG.S = 14DBBCFDD0931DED52B7A23A28DEA99AAE3CE28E159541EBBAA797A323A3740BA1AB008438FCAD2303DCCB3AF815FEC1
5,744,789 UART: Caliptra RT
5,745,042 UART: [state] CFI Enabled
5,852,164 UART: [rt] RT listening for mailbox commands...
5,852,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,908 UART: [rt]cmd =0x41544d4e, len=14344
7,389,049 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,597 ready_for_fw is high
1,362,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,972,182 >>> mbox cmd response: success
5,033,619 UART:
5,033,635 UART: Running Caliptra FMC ...
5,034,043 UART:
5,034,097 UART: [state] CFI Enabled
5,044,733 UART: [fht] FMC Alias Private Key: 7
5,152,487 UART: [art] Extend RT PCRs Done
5,152,915 UART: [art] Lock RT PCRs Done
5,154,513 UART: [art] Populate DV Done
5,162,779 UART: [fht] FMC Alias Private Key: 7
5,163,777 UART: [art] Derive CDI
5,164,057 UART: [art] Store in in slot 0x4
5,249,886 UART: [art] Derive Key Pair
5,250,246 UART: [art] Store priv key in slot 0x5
5,263,476 UART: [art] Derive Key Pair - Done
5,278,443 UART: [art] Signing Cert with AUTHO
5,278,923 UART: RITY.KEYID = 7
5,294,045 UART: [art] Erasing AUTHORITY.KEYID = 7
5,294,810 UART: [art] PUB.X = 4267B298B56681AF0D6600867B4CF85D312C5955FEA82AD08285FF172E37DD903FF7719CA0DF417563AB5A3AB756BDF6
5,301,561 UART: [art] PUB.Y = 711096454CB5CBA228F23A402A381D39A73DA128B1F1DD03B974FC26490A6714E678DF312D83540624F35B31F3493092
5,308,494 UART: [art] SIG.R = CF402C918C145782FADC5D670A28A181599D50B850A87E87E664F57BA05333F65674B5010D254B65779930595DE3BC3F
5,315,249 UART: [art] SIG.S = 8633CE4710A2F4A04FE7ADDD7B058F1F6FDF2718D611D11663311EAD93C3AD72C3A7FEC3826C6010F4A797ED099B2A4E
5,338,268 UART: Caliptra RT
5,338,521 UART: [state] CFI Enabled
5,447,021 UART: [rt] RT listening for mailbox commands...
5,447,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,570,705 UART: [rt]cmd =0x41544d4e, len=14344
6,970,657 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,591 UART: [kat] SHA2-512-ACC
897,492 UART: [kat] ECC-384
902,799 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,714 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 ready_for_fw is high
1,480,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,525 UART: [idev] Erasing UDS.KEYID = 0
1,505,167 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,669 UART: [idev] --
1,514,794 UART: [ldev] ++
1,514,962 UART: [ldev] CDI.KEYID = 6
1,515,325 UART: [ldev] SUBJECT.KEYID = 5
1,515,751 UART: [ldev] AUTHORITY.KEYID = 7
1,516,214 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,546,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,371 UART: [ldev] --
1,586,774 UART: [fwproc] Waiting for Commands...
1,587,597 UART: [fwproc] Received command 0x46574c44
1,588,388 UART: [fwproc] Received Image of size 114084 bytes
5,308,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,336,724 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,366,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,501,665 >>> mbox cmd response: success
5,502,885 UART: [afmc] ++
5,503,053 UART: [afmc] CDI.KEYID = 6
5,503,415 UART: [afmc] SUBJECT.KEYID = 7
5,503,840 UART: [afmc] AUTHORITY.KEYID = 5
5,538,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,554,904 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,555,684 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,561,393 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,567,285 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,572,986 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,580,960 UART: [afmc] --
5,581,858 UART: [cold-reset] --
5,582,950 UART: [state] Locking Datavault
5,584,205 UART: [state] Locking PCR0, PCR1 and PCR31
5,584,809 UART: [state] Locking ICCM
5,585,415 UART: [exit] Launching FMC @ 0x40000130
5,590,744 UART:
5,590,760 UART: Running Caliptra FMC ...
5,591,168 UART:
5,591,311 UART: [state] CFI Enabled
5,601,643 UART: [fht] FMC Alias Private Key: 7
5,709,717 UART: [art] Extend RT PCRs Done
5,710,145 UART: [art] Lock RT PCRs Done
5,711,447 UART: [art] Populate DV Done
5,719,953 UART: [fht] FMC Alias Private Key: 7
5,721,041 UART: [art] Derive CDI
5,721,321 UART: [art] Store in in slot 0x4
5,807,132 UART: [art] Derive Key Pair
5,807,492 UART: [art] Store priv key in slot 0x5
5,820,774 UART: [art] Derive Key Pair - Done
5,835,268 UART: [art] Signing Cert with AUTHO
5,835,748 UART: RITY.KEYID = 7
5,851,000 UART: [art] Erasing AUTHORITY.KEYID = 7
5,851,765 UART: [art] PUB.X = D3215DBB401AEB8C4DDEC1A8E64D0AC39534E5EBA69023E9F976AECDAD48427E6A4D8AA99EE0615B855436ED35FDC7B2
5,858,556 UART: [art] PUB.Y = D6074E41D5B37F6C7AFA33A08FD6E667B53244D6EC81B60CD4F80E516041233DB06C2E5E904A55CBB0FD7AA9B9E3253A
5,865,511 UART: [art] SIG.R = 3FA7EC74C1EABDAE7603D942CFBDB53F8F19306CBEB8302C1367D5B578AFAAA9E386E596FB93D62367A6EDAC627E0CE7
5,872,301 UART: [art] SIG.S = E14665EF8A8EC4ED187F8D5FE4444BDA2196F28036D5C7D7175ED17B22A77F27CA9873F5465A11424448EC5409547AA4
5,896,247 UART: Caliptra RT
5,896,592 UART: [state] CFI Enabled
6,004,873 UART: [rt] RT listening for mailbox commands...
6,005,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,823 UART: [rt]cmd =0x41544d4e, len=14344
7,521,798 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,472 ready_for_fw is high
1,362,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,199,169 >>> mbox cmd response: success
5,260,564 UART:
5,260,580 UART: Running Caliptra FMC ...
5,260,988 UART:
5,261,131 UART: [state] CFI Enabled
5,271,399 UART: [fht] FMC Alias Private Key: 7
5,379,501 UART: [art] Extend RT PCRs Done
5,379,929 UART: [art] Lock RT PCRs Done
5,381,413 UART: [art] Populate DV Done
5,389,645 UART: [fht] FMC Alias Private Key: 7
5,390,813 UART: [art] Derive CDI
5,391,093 UART: [art] Store in in slot 0x4
5,476,530 UART: [art] Derive Key Pair
5,476,890 UART: [art] Store priv key in slot 0x5
5,490,112 UART: [art] Derive Key Pair - Done
5,504,869 UART: [art] Signing Cert with AUTHO
5,505,349 UART: RITY.KEYID = 7
5,520,331 UART: [art] Erasing AUTHORITY.KEYID = 7
5,521,096 UART: [art] PUB.X = F8CD67ABD95ED922C253F934AFB329E941B44F71069B709BE15E06075C16AE2C7C53B9DBE228AEBE2C40DBDAE5D1DC0D
5,527,878 UART: [art] PUB.Y = C8DF7B740BC289CCF3A663682B3D1BF29F5A9B7664A4EFE561A1C96EC819ADD19A4CCEEB87F17016A696ADA754EC5B46
5,534,847 UART: [art] SIG.R = 1BDC2063CD710097A1F690D7D3112A4B5B9EA885AE5DC27C038153DD0B74F91BD024665BC4D0B76A4052A9C2511B5A0A
5,541,594 UART: [art] SIG.S = F6646EDF60B9B131EE8C8618AE217AB133ACF5888DB612EADD5A62ECE670F13D00B9F5949B0E81E3A62C7710917B98DD
5,565,858 UART: Caliptra RT
5,566,203 UART: [state] CFI Enabled
5,673,956 UART: [rt] RT listening for mailbox commands...
5,674,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,640 UART: [rt]cmd =0x41544d4e, len=14344
7,210,089 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
893,044 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,169 UART: [kat] ++
897,321 UART: [kat] sha1
901,559 UART: [kat] SHA2-256
903,499 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,822 UART: [kat] HMAC-384Kdf
922,204 UART: [kat] LMS
1,170,532 UART: [kat] --
1,171,337 UART: [cold-reset] ++
1,171,729 UART: [fht] FHT @ 0x50003400
1,174,288 UART: [idev] ++
1,174,456 UART: [idev] CDI.KEYID = 6
1,174,816 UART: [idev] SUBJECT.KEYID = 7
1,175,240 UART: [idev] UDS.KEYID = 0
1,175,585 ready_for_fw is high
1,175,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,434 UART: [idev] Erasing UDS.KEYID = 0
1,200,965 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,952 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,444 >>> mbox cmd response: success
3,313,606 UART: [afmc] ++
3,313,774 UART: [afmc] CDI.KEYID = 6
3,314,136 UART: [afmc] SUBJECT.KEYID = 7
3,314,561 UART: [afmc] AUTHORITY.KEYID = 5
3,349,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,094 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,803 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,695 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,406 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,223 UART: [afmc] --
3,393,233 UART: [cold-reset] --
3,393,945 UART: [state] Locking Datavault
3,395,236 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,840 UART: [state] Locking ICCM
3,396,274 UART: [exit] Launching FMC @ 0x40000130
3,401,603 UART:
3,401,619 UART: Running Caliptra FMC ...
3,402,027 UART:
3,402,081 UART: [state] CFI Enabled
3,412,371 UART: [fht] FMC Alias Private Key: 7
3,520,531 UART: [art] Extend RT PCRs Done
3,520,959 UART: [art] Lock RT PCRs Done
3,522,731 UART: [art] Populate DV Done
3,530,989 UART: [fht] FMC Alias Private Key: 7
3,532,057 UART: [art] Derive CDI
3,532,337 UART: [art] Store in in slot 0x4
3,617,916 UART: [art] Derive Key Pair
3,618,276 UART: [art] Store priv key in slot 0x5
3,631,724 UART: [art] Derive Key Pair - Done
3,646,454 UART: [art] Signing Cert with AUTHO
3,646,934 UART: RITY.KEYID = 7
3,661,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,731 UART: [art] PUB.X = F6DB15D8824B1A097A7027A15094677824430FE7D738205ECDFE3EE1451EF56E3DFABCFD95F604AB6610DB455C04DD8E
3,669,501 UART: [art] PUB.Y = 3D1C5C480230A8C32C87256A25CAB256F0D6705D481F29EA475423E5F9DCE319F19A854B5E54A6E3704AF122601CC4F2
3,676,450 UART: [art] SIG.R = C4E7F8ECDEB417295F27CEF1F19D05CF66340C68E6EFE01B387735C009F7663A76F16C2F75D60A0FF0F5EFA924F4A3D1
3,683,221 UART: [art] SIG.S = E8F06A38C979DA3A1BE8366D274B3A3C9A1B11903CCE91442F2FB6279B1C897EDA7FAFDFB4A8B45D7AC3F0C735E609E0
3,707,227 UART: Caliptra RT
3,707,480 UART: [state] CFI Enabled
3,815,259 UART: [rt] RT listening for mailbox commands...
3,815,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,843 UART: [rt]cmd =0x41544d4e, len=14344
5,356,696 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 ready_for_fw is high
1,059,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,167,932 >>> mbox cmd response: success
3,229,841 UART:
3,229,857 UART: Running Caliptra FMC ...
3,230,265 UART:
3,230,319 UART: [state] CFI Enabled
3,240,611 UART: [fht] FMC Alias Private Key: 7
3,348,607 UART: [art] Extend RT PCRs Done
3,349,035 UART: [art] Lock RT PCRs Done
3,350,539 UART: [art] Populate DV Done
3,358,693 UART: [fht] FMC Alias Private Key: 7
3,359,705 UART: [art] Derive CDI
3,359,985 UART: [art] Store in in slot 0x4
3,445,864 UART: [art] Derive Key Pair
3,446,224 UART: [art] Store priv key in slot 0x5
3,459,574 UART: [art] Derive Key Pair - Done
3,474,473 UART: [art] Signing Cert with AUTHO
3,474,953 UART: RITY.KEYID = 7
3,490,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,084 UART: [art] PUB.X = A2FD5D743F2EB9A51BC1D43628AF3458642F3BC361D1B6699A13315A8C6A130C4F9307CD586BBAA0031CE4C512AD8F40
3,497,855 UART: [art] PUB.Y = 8E164B7BD962188C14D8D54F6A257EDB4E680AE67A59167A864DDFF634F7870E00CEDDA08933D9D43582E684896EB77E
3,504,783 UART: [art] SIG.R = E9D888F8C957C8952A972C581E7F6324326C28E511270BFA08240C50504EB9BBA22C9D78EC1D07C97C7AB3D37DB0019F
3,511,542 UART: [art] SIG.S = 1B73D7F021A9772EBB311E8DDA5D47C4A1918331D925D9A461DB630B7C47EFEDC5EC63C5A03B3A4CE032BF5726BDBF6B
3,535,692 UART: Caliptra RT
3,535,945 UART: [state] CFI Enabled
3,643,595 UART: [rt] RT listening for mailbox commands...
3,644,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,341 UART: [rt]cmd =0x41544d4e, len=14344
5,180,034 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,126 UART: [kat] SHA2-256
904,066 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 ready_for_fw is high
1,176,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,341 UART: [idev] Erasing UDS.KEYID = 0
1,201,764 UART: [idev] Sha1 KeyId Algorithm
1,210,138 UART: [idev] --
1,211,234 UART: [ldev] ++
1,211,402 UART: [ldev] CDI.KEYID = 6
1,211,765 UART: [ldev] SUBJECT.KEYID = 5
1,212,191 UART: [ldev] AUTHORITY.KEYID = 7
1,212,654 UART: [ldev] FE.KEYID = 1
1,218,134 UART: [ldev] Erasing FE.KEYID = 1
1,244,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,986 UART: [ldev] --
1,283,281 UART: [fwproc] Wait for Commands...
1,283,949 UART: [fwproc] Recv command 0x46574c44
1,284,677 UART: [fwproc] Recv'd Img size: 114084 bytes
3,114,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,513 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,307,228 >>> mbox cmd response: success
3,308,412 UART: [afmc] ++
3,308,580 UART: [afmc] CDI.KEYID = 6
3,308,942 UART: [afmc] SUBJECT.KEYID = 7
3,309,367 UART: [afmc] AUTHORITY.KEYID = 5
3,345,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,108 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,817 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,709 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,420 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,293 UART: [afmc] --
3,388,305 UART: [cold-reset] --
3,389,095 UART: [state] Locking Datavault
3,390,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,836 UART: [state] Locking ICCM
3,391,402 UART: [exit] Launching FMC @ 0x40000130
3,396,731 UART:
3,396,747 UART: Running Caliptra FMC ...
3,397,155 UART:
3,397,298 UART: [state] CFI Enabled
3,407,766 UART: [fht] FMC Alias Private Key: 7
3,515,676 UART: [art] Extend RT PCRs Done
3,516,104 UART: [art] Lock RT PCRs Done
3,517,880 UART: [art] Populate DV Done
3,525,990 UART: [fht] FMC Alias Private Key: 7
3,527,148 UART: [art] Derive CDI
3,527,428 UART: [art] Store in in slot 0x4
3,613,203 UART: [art] Derive Key Pair
3,613,563 UART: [art] Store priv key in slot 0x5
3,627,401 UART: [art] Derive Key Pair - Done
3,642,254 UART: [art] Signing Cert with AUTHO
3,642,734 UART: RITY.KEYID = 7
3,657,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,533 UART: [art] PUB.X = 1ED0B777A443D3B6C51BC2857DFDEC942E2D118912F632266EFBCA4E0BA1797734071A81CA6802BDA94400B63F091408
3,665,270 UART: [art] PUB.Y = 7C75ABCDF1304143739157AA3EE58706C77D86FF65C37A4010EFB59DB23D9A03CAFFDEE1ECD35EED003A43EA4057EFE5
3,672,214 UART: [art] SIG.R = DB68235F216BA3FFF075E385DA940EE48A0C225DF41B15703C9CC24AD1BFD9E634460B121A0F4EBEFEA077D229B14A15
3,678,988 UART: [art] SIG.S = 813499E9BABB622D22DE1A99AC7C727F3A27084F0226FC6038CE743F85BE92B929415C781DC4C3927E4F29DB528C4CE4
3,703,101 UART: Caliptra RT
3,703,446 UART: [state] CFI Enabled
3,810,245 UART: [rt] RT listening for mailbox commands...
3,810,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,043 UART: [rt]cmd =0x41544d4e, len=14344
5,339,469 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,196 ready_for_fw is high
1,061,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,175 >>> mbox cmd response: success
3,229,106 UART:
3,229,122 UART: Running Caliptra FMC ...
3,229,530 UART:
3,229,673 UART: [state] CFI Enabled
3,240,103 UART: [fht] FMC Alias Private Key: 7
3,348,667 UART: [art] Extend RT PCRs Done
3,349,095 UART: [art] Lock RT PCRs Done
3,350,555 UART: [art] Populate DV Done
3,358,799 UART: [fht] FMC Alias Private Key: 7
3,359,929 UART: [art] Derive CDI
3,360,209 UART: [art] Store in in slot 0x4
3,445,870 UART: [art] Derive Key Pair
3,446,230 UART: [art] Store priv key in slot 0x5
3,459,268 UART: [art] Derive Key Pair - Done
3,473,745 UART: [art] Signing Cert with AUTHO
3,474,225 UART: RITY.KEYID = 7
3,489,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,362 UART: [art] PUB.X = B6903A65DCF721ED9A925440F684D135D65DEE88BDDB60EC1CCD48B74C73A0C3131905395237225FDC987E086771F26D
3,497,130 UART: [art] PUB.Y = 8BD174E1C662F829894703D3FD35C625696D913E1E7E9185CA844689D3D996BD00799E9B52673AD70F9B2385D229345D
3,504,044 UART: [art] SIG.R = 6FBEE6C4225057B45BCFF0701A853067A5144D438339B63FE266DF45D3BE8800C79E953AA8DCFA6595C492744C2448D7
3,510,794 UART: [art] SIG.S = 59C32C6557F58EF3ED09080D86E703AE9F8751C2DD32FF9760E27EA91AD72DFD0B2668ACF9BD580E8BF8ABFB3DD31AA7
3,534,713 UART: Caliptra RT
3,535,058 UART: [state] CFI Enabled
3,642,685 UART: [rt] RT listening for mailbox commands...
3,643,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,285 UART: [rt]cmd =0x41544d4e, len=14344
5,163,868 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,321 UART: [cold-reset] ++
1,169,845 UART: [fht] FHT @ 0x50003400
1,172,319 UART: [idev] ++
1,172,487 UART: [idev] CDI.KEYID = 6
1,172,848 UART: [idev] SUBJECT.KEYID = 7
1,173,273 UART: [idev] UDS.KEYID = 0
1,173,619 ready_for_fw is high
1,173,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,729 UART: [idev] --
1,207,728 UART: [ldev] ++
1,207,896 UART: [ldev] CDI.KEYID = 6
1,208,260 UART: [ldev] SUBJECT.KEYID = 5
1,208,687 UART: [ldev] AUTHORITY.KEYID = 7
1,209,150 UART: [ldev] FE.KEYID = 1
1,214,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,622 UART: [ldev] --
1,280,064 UART: [fwproc] Wait for Commands...
1,280,769 UART: [fwproc] Recv command 0x46574c44
1,281,502 UART: [fwproc] Recv'd Img size: 114084 bytes
3,115,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,308,782 >>> mbox cmd response: success
3,309,847 UART: [afmc] ++
3,310,015 UART: [afmc] CDI.KEYID = 6
3,310,378 UART: [afmc] SUBJECT.KEYID = 7
3,310,804 UART: [afmc] AUTHORITY.KEYID = 5
3,346,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,415 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,125 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,015 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,726 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,420 UART: [afmc] --
3,389,540 UART: [cold-reset] --
3,390,450 UART: [state] Locking Datavault
3,391,563 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,167 UART: [state] Locking ICCM
3,392,711 UART: [exit] Launching FMC @ 0x40000130
3,398,040 UART:
3,398,056 UART: Running Caliptra FMC ...
3,398,464 UART:
3,398,518 UART: [state] CFI Enabled
3,409,262 UART: [fht] FMC Alias Private Key: 7
3,516,936 UART: [art] Extend RT PCRs Done
3,517,364 UART: [art] Lock RT PCRs Done
3,519,168 UART: [art] Populate DV Done
3,527,332 UART: [fht] FMC Alias Private Key: 7
3,528,344 UART: [art] Derive CDI
3,528,624 UART: [art] Store in in slot 0x4
3,614,325 UART: [art] Derive Key Pair
3,614,685 UART: [art] Store priv key in slot 0x5
3,627,709 UART: [art] Derive Key Pair - Done
3,642,232 UART: [art] Signing Cert with AUTHO
3,642,712 UART: RITY.KEYID = 7
3,658,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,927 UART: [art] PUB.X = 15D3193387EEFCE06A694DA091E08C30F2347572CF3580323457EF653FA1D05ABBC05326CD0206FA16F17D8653DDF7B9
3,665,695 UART: [art] PUB.Y = 9EC6165E7CE067FDC63DE2717056EBA21AA4B9A3FA74D8C5BECAEF735C74A5F4699DBE2E2FE05856963C1C11FED22482
3,672,665 UART: [art] SIG.R = 44BD82D3276AC9E08F12C0CFF48DFB72BC97786E1EB1D3A9EE01D421C88DF14E8608718940A688CE3E9397C4DE08B43F
3,679,438 UART: [art] SIG.S = 717DF5A5EA799901A66166D0C1AD743946ABD2E9DC160EC0B6F146A6B0EF23F400CC1270BF49ABBFD499AD2ADB469B6C
3,703,015 UART: Caliptra RT
3,703,268 UART: [state] CFI Enabled
3,810,203 UART: [rt] RT listening for mailbox commands...
3,810,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,915 UART: [rt]cmd =0x41544d4e, len=14344
5,334,661 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,428 ready_for_fw is high
1,055,428 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,158,264 >>> mbox cmd response: success
3,220,331 UART:
3,220,347 UART: Running Caliptra FMC ...
3,220,755 UART:
3,220,809 UART: [state] CFI Enabled
3,231,109 UART: [fht] FMC Alias Private Key: 7
3,338,925 UART: [art] Extend RT PCRs Done
3,339,353 UART: [art] Lock RT PCRs Done
3,340,869 UART: [art] Populate DV Done
3,348,941 UART: [fht] FMC Alias Private Key: 7
3,349,881 UART: [art] Derive CDI
3,350,161 UART: [art] Store in in slot 0x4
3,435,684 UART: [art] Derive Key Pair
3,436,044 UART: [art] Store priv key in slot 0x5
3,449,278 UART: [art] Derive Key Pair - Done
3,464,122 UART: [art] Signing Cert with AUTHO
3,464,602 UART: RITY.KEYID = 7
3,479,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,547 UART: [art] PUB.X = F2752BFE696AE046C3625ECBD64E898CA9CE4C4831E84AD8D375FEA17FA0D02635597BD5FF780A07EDFBCC802E1C88B9
3,487,331 UART: [art] PUB.Y = 82AE358FB05CA34E9C07B8C625C7F26455B96D53D61D9DEBAAA5BD9AFAE35C9A029941398127F4E5CAA9D3FFFB17BB6F
3,494,299 UART: [art] SIG.R = C1E67E7F2409DCD66EC28F2743F659BDDCF08DF61FAAF1CDFFC5B81875347693C0234BD466D80286E1840D3CFB8F8516
3,501,074 UART: [art] SIG.S = 38EA3C6B2A4C65BFE75709E25ED27129A9C731FC605FC74437775C62A84B67D7F6A80E2980AD7EDA3829D059B0FE0853
3,525,012 UART: Caliptra RT
3,525,265 UART: [state] CFI Enabled
3,632,487 UART: [rt] RT listening for mailbox commands...
3,633,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,989 UART: [rt]cmd =0x41544d4e, len=14344
5,151,711 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
921,147 UART: [kat] LMS
1,169,459 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,772 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,174,786 ready_for_fw is high
1,174,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,968 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,899 UART: [ldev] Erasing FE.KEYID = 1
1,243,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,747 UART: [ldev] --
1,283,103 UART: [fwproc] Wait for Commands...
1,283,852 UART: [fwproc] Recv command 0x46574c44
1,284,585 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,860 >>> mbox cmd response: success
3,313,955 UART: [afmc] ++
3,314,123 UART: [afmc] CDI.KEYID = 6
3,314,486 UART: [afmc] SUBJECT.KEYID = 7
3,314,912 UART: [afmc] AUTHORITY.KEYID = 5
3,350,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,805 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,515 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,405 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,116 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,970 UART: [afmc] --
3,393,878 UART: [cold-reset] --
3,394,846 UART: [state] Locking Datavault
3,396,189 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,793 UART: [state] Locking ICCM
3,397,253 UART: [exit] Launching FMC @ 0x40000130
3,402,582 UART:
3,402,598 UART: Running Caliptra FMC ...
3,403,006 UART:
3,403,149 UART: [state] CFI Enabled
3,413,649 UART: [fht] FMC Alias Private Key: 7
3,521,745 UART: [art] Extend RT PCRs Done
3,522,173 UART: [art] Lock RT PCRs Done
3,523,897 UART: [art] Populate DV Done
3,531,867 UART: [fht] FMC Alias Private Key: 7
3,533,033 UART: [art] Derive CDI
3,533,313 UART: [art] Store in in slot 0x4
3,618,690 UART: [art] Derive Key Pair
3,619,050 UART: [art] Store priv key in slot 0x5
3,632,152 UART: [art] Derive Key Pair - Done
3,647,023 UART: [art] Signing Cert with AUTHO
3,647,503 UART: RITY.KEYID = 7
3,662,603 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,368 UART: [art] PUB.X = 3F2A1D9DC3D92F2AB0FFB6DB37BE11CFF46EB3A36C0147BE3DDB5A6CE3A226E6A4FB907BA439CF9AB9E17A4CA241CAC9
3,670,171 UART: [art] PUB.Y = 012A9B18895232BE9676EB7C7B4783D77F87E56F00B9237AB4B6E80A08EC2EBA00872D4485C9DCFB96E54C9ECEC627AE
3,677,080 UART: [art] SIG.R = B7E76AA85D5ACF1EC3A1DCCE677061DB3FBC1492E95C4A6F7EA8E38C662775764FE758A4E732B410B7DC5A5C02C84002
3,683,860 UART: [art] SIG.S = A51D8F41708684BEC3B85F77FD43A4A81216C71958BC63376A71987114FA1665D4A8E70048EC21FE5729516327363F1D
3,707,267 UART: Caliptra RT
3,707,612 UART: [state] CFI Enabled
3,815,635 UART: [rt] RT listening for mailbox commands...
3,816,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,127 UART: [rt]cmd =0x41544d4e, len=14344
5,325,271 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,811 ready_for_fw is high
1,056,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,871 >>> mbox cmd response: success
3,232,156 UART:
3,232,172 UART: Running Caliptra FMC ...
3,232,580 UART:
3,232,723 UART: [state] CFI Enabled
3,243,231 UART: [fht] FMC Alias Private Key: 7
3,351,717 UART: [art] Extend RT PCRs Done
3,352,145 UART: [art] Lock RT PCRs Done
3,353,773 UART: [art] Populate DV Done
3,361,791 UART: [fht] FMC Alias Private Key: 7
3,362,835 UART: [art] Derive CDI
3,363,115 UART: [art] Store in in slot 0x4
3,448,828 UART: [art] Derive Key Pair
3,449,188 UART: [art] Store priv key in slot 0x5
3,462,976 UART: [art] Derive Key Pair - Done
3,478,001 UART: [art] Signing Cert with AUTHO
3,478,481 UART: RITY.KEYID = 7
3,493,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,600 UART: [art] PUB.X = 4D96EF03A2C2754EB84ECEC96979DA470BD18758C2DE65A5408CB4919D401A02E9732A49114C15D531B0BCE68CBC02B0
3,501,366 UART: [art] PUB.Y = 982D8C1E386C5095F8AE71FE5940E35A4B832151D5B33A39509FE651579341456F8DB75BBB466C248A4C476EFB723EBE
3,508,318 UART: [art] SIG.R = F60CC7245076B089C61FE1774202FC4EE833A878539474EE98DA6C97B250E619433CD3672704CB75C2A68391BC1CD31D
3,515,077 UART: [art] SIG.S = 442A76E222056962669622DEB11A7CD632CEF8F2E10D52117C46D86600A06F9CA8EB0C2E62EE20331207B07B2606CBCF
3,539,179 UART: Caliptra RT
3,539,524 UART: [state] CFI Enabled
3,646,732 UART: [rt] RT listening for mailbox commands...
3,647,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,486 UART: [rt]cmd =0x41544d4e, len=14344
5,160,994 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,165 UART:
192,536 UART: Running Caliptra ROM ...
193,626 UART:
193,768 UART: [state] CFI Enabled
265,424 UART: [state] LifecycleState = Unprovisioned
267,327 UART: [state] DebugLocked = No
269,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,284 UART: [kat] SHA2-256
443,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,456 UART: [kat] ++
454,903 UART: [kat] sha1
467,141 UART: [kat] SHA2-256
469,865 UART: [kat] SHA2-384
474,861 UART: [kat] SHA2-512-ACC
477,223 UART: [kat] ECC-384
2,768,837 UART: [kat] HMAC-384Kdf
2,800,411 UART: [kat] LMS
3,990,717 UART: [kat] --
3,996,163 UART: [cold-reset] ++
3,998,676 UART: [fht] Storing FHT @ 0x50003400
4,010,775 UART: [idev] ++
4,011,408 UART: [idev] CDI.KEYID = 6
4,012,345 UART: [idev] SUBJECT.KEYID = 7
4,013,546 UART: [idev] UDS.KEYID = 0
4,014,578 ready_for_fw is high
4,014,784 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,792 UART: [idev] Erasing UDS.KEYID = 0
7,345,097 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,819 UART: [idev] --
7,372,921 UART: [ldev] ++
7,373,504 UART: [ldev] CDI.KEYID = 6
7,374,443 UART: [ldev] SUBJECT.KEYID = 5
7,375,651 UART: [ldev] AUTHORITY.KEYID = 7
7,376,937 UART: [ldev] FE.KEYID = 1
7,422,069 UART: [ldev] Erasing FE.KEYID = 1
10,754,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,930 UART: [ldev] --
13,115,483 UART: [fwproc] Waiting for Commands...
13,117,734 UART: [fwproc] Received command 0x46574c44
13,119,910 UART: [fwproc] Received Image of size 113760 bytes
22,067,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,143,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,212,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,528,546 >>> mbox cmd response: success
22,532,176 UART: [afmc] ++
22,532,775 UART: [afmc] CDI.KEYID = 6
22,533,719 UART: [afmc] SUBJECT.KEYID = 7
22,534,940 UART: [afmc] AUTHORITY.KEYID = 5
25,892,664 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,189,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,191,730 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,206,332 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,221,062 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,235,248 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,257,373 UART: [afmc] --
28,260,547 UART: [cold-reset] --
28,264,736 UART: [state] Locking Datavault
28,271,061 UART: [state] Locking PCR0, PCR1 and PCR31
28,272,760 UART: [state] Locking ICCM
28,274,184 UART: [exit] Launching FMC @ 0x40000130
28,282,575 UART:
28,282,817 UART: Running Caliptra FMC ...
28,283,916 UART:
28,284,074 UART: [state] CFI Enabled
28,349,373 UART: [fht] FMC Alias Private Key: 7
30,687,157 UART: [art] Extend RT PCRs Done
30,688,371 UART: [art] Lock RT PCRs Done
30,690,151 UART: [art] Populate DV Done
30,695,612 UART: [fht] FMC Alias Private Key: 7
30,697,094 UART: [art] Derive CDI
30,697,834 UART: [art] Store in in slot 0x4
30,758,864 UART: [art] Derive Key Pair
30,759,913 UART: [art] Store priv key in slot 0x5
34,053,353 UART: [art] Derive Key Pair - Done
34,066,507 UART: [art] Signing Cert with AUTHO
34,067,806 UART: RITY.KEYID = 7
36,354,973 UART: [art] Erasing AUTHORITY.KEYID = 7
36,356,483 UART: [art] PUB.X = E24CE653D639FAA144965B2858A7984621C5B3770E00FAD31726309A76D5510EA1751E2CD5DCE60F06BCC41916E71931
36,363,670 UART: [art] PUB.Y = 8B0FCC5CC2FA7B720D67017AEA45458476F05E82C1B1D4412D5B6F7A8DB7A4C61A152A73A5D016C5FD22D7F0DDAB38E3
36,370,954 UART: [art] SIG.R = D1B7BA411A80AB8C026C54CBE4C337476EBD318D83066AACFE5D6360A658AD809132DF2FDC2BB218181FCA4574F75734
36,378,403 UART: [art] SIG.S = 8DF9B7BD03B0E59757C5379B5B027FC0627BB18367CC0DC4DF382F41825845C541EDE1AC2EB77D16E4C97AFB677CF6F4
37,684,051 UART: Caliptra RT
37,684,746 UART: [state] CFI Enabled
37,845,703 UART: [rt] RT listening for mailbox commands...
37,848,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,003,343 UART: [rt]cmd =0x41544d4e, len=14344
42,187,794 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,785,799 ready_for_fw is high
3,786,207 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,051,874 >>> mbox cmd response: success
27,747,846 UART:
27,748,236 UART: Running Caliptra FMC ...
27,749,345 UART:
27,749,499 UART: [state] CFI Enabled
27,817,892 UART: [fht] FMC Alias Private Key: 7
30,155,012 UART: [art] Extend RT PCRs Done
30,156,236 UART: [art] Lock RT PCRs Done
30,158,160 UART: [art] Populate DV Done
30,163,601 UART: [fht] FMC Alias Private Key: 7
30,165,201 UART: [art] Derive CDI
30,165,939 UART: [art] Store in in slot 0x4
30,225,141 UART: [art] Derive Key Pair
30,226,182 UART: [art] Store priv key in slot 0x5
33,518,751 UART: [art] Derive Key Pair - Done
33,531,806 UART: [art] Signing Cert with AUTHO
33,533,116 UART: RITY.KEYID = 7
35,820,639 UART: [art] Erasing AUTHORITY.KEYID = 7
35,822,146 UART: [art] PUB.X = EE14C4AF0A2B0ECBC1000D9DAA73BD5039AB2ABD595C3417E95596FCE92E20B777F36A13CEEE2791A5D3BB6B6C90DB41
35,829,408 UART: [art] PUB.Y = D41BD7A19A3BAFC73B64FC052B6C77B9784F180487A643A0A9ECC18F0A4DE89493ED1B1D4C64D733F71A17F53D36D49B
35,836,695 UART: [art] SIG.R = 2CBCE951BEA7503DEDF7F043E2946B5D277EBF4CF5EEF08D13C2BEB94132C8B01F9E0EB5A16F02E62DA405DAA892E7C1
35,844,096 UART: [art] SIG.S = 3285B6EA691F4A09A009D4863275A87642E0AF7882D92E7B7DD08A0C9482AAE5B95AFFE1C89ABB0EE6E0860DD5A4D6A1
37,149,078 UART: Caliptra RT
37,149,801 UART: [state] CFI Enabled
37,312,320 UART: [rt] RT listening for mailbox commands...
37,314,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,469,873 UART: [rt]cmd =0x41544d4e, len=14344
41,707,065 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,950 UART:
193,311 UART: Running Caliptra ROM ...
194,502 UART:
604,144 UART: [state] CFI Enabled
621,847 UART: [state] LifecycleState = Unprovisioned
623,771 UART: [state] DebugLocked = No
625,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,464 UART: [kat] SHA2-256
801,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,755 UART: [kat] ++
812,201 UART: [kat] sha1
822,582 UART: [kat] SHA2-256
825,230 UART: [kat] SHA2-384
831,139 UART: [kat] SHA2-512-ACC
833,496 UART: [kat] ECC-384
3,119,082 UART: [kat] HMAC-384Kdf
3,131,490 UART: [kat] LMS
4,321,575 UART: [kat] --
4,324,813 UART: [cold-reset] ++
4,325,822 UART: [fht] Storing FHT @ 0x50003400
4,336,140 UART: [idev] ++
4,336,695 UART: [idev] CDI.KEYID = 6
4,337,643 UART: [idev] SUBJECT.KEYID = 7
4,338,880 UART: [idev] UDS.KEYID = 0
4,339,807 ready_for_fw is high
4,339,999 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,873 UART: [idev] Erasing UDS.KEYID = 0
7,632,493 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,443 UART: [idev] --
7,657,001 UART: [ldev] ++
7,657,574 UART: [ldev] CDI.KEYID = 6
7,658,538 UART: [ldev] SUBJECT.KEYID = 5
7,659,764 UART: [ldev] AUTHORITY.KEYID = 7
7,660,994 UART: [ldev] FE.KEYID = 1
7,673,253 UART: [ldev] Erasing FE.KEYID = 1
10,959,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,242 UART: [ldev] --
13,319,070 UART: [fwproc] Waiting for Commands...
13,321,758 UART: [fwproc] Received command 0x46574c44
13,323,950 UART: [fwproc] Received Image of size 113760 bytes
22,429,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,513,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,582,735 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,898,126 >>> mbox cmd response: success
22,901,513 UART: [afmc] ++
22,902,109 UART: [afmc] CDI.KEYID = 6
22,903,022 UART: [afmc] SUBJECT.KEYID = 7
22,904,292 UART: [afmc] AUTHORITY.KEYID = 5
26,218,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,514,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,516,647 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,531,189 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,545,930 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,560,213 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,580,254 UART: [afmc] --
28,583,850 UART: [cold-reset] --
28,586,735 UART: [state] Locking Datavault
28,591,709 UART: [state] Locking PCR0, PCR1 and PCR31
28,593,459 UART: [state] Locking ICCM
28,594,557 UART: [exit] Launching FMC @ 0x40000130
28,602,974 UART:
28,603,209 UART: Running Caliptra FMC ...
28,604,308 UART:
28,604,461 UART: [state] CFI Enabled
28,612,692 UART: [fht] FMC Alias Private Key: 7
30,944,292 UART: [art] Extend RT PCRs Done
30,945,522 UART: [art] Lock RT PCRs Done
30,947,121 UART: [art] Populate DV Done
30,952,476 UART: [fht] FMC Alias Private Key: 7
30,953,961 UART: [art] Derive CDI
30,954,690 UART: [art] Store in in slot 0x4
30,997,670 UART: [art] Derive Key Pair
30,998,709 UART: [art] Store priv key in slot 0x5
34,241,026 UART: [art] Derive Key Pair - Done
34,253,978 UART: [art] Signing Cert with AUTHO
34,255,285 UART: RITY.KEYID = 7
36,535,049 UART: [art] Erasing AUTHORITY.KEYID = 7
36,536,561 UART: [art] PUB.X = 32F5B3294927F7CA316712EBB4279BE3E2788DA7057706DA08E8653A91F7BCB25F62D651979FA0568274FB69DFD80689
36,543,791 UART: [art] PUB.Y = 15502FE0BC08FE17215B52C77D8D403D627D258490ED268B2543EE14E280B832F08E5B98959BFBA1A26599F36E8B58FB
36,551,051 UART: [art] SIG.R = D4D47A36DBDBBA23736C88E584E04760A2CA1AFE10E0A9B20A3BF3D3A0D5238FBDB111F2DE7D798A925791C422CB827C
36,558,451 UART: [art] SIG.S = 540D4E58552AFD2AA9E001025AF43EF5C53EA62EC8D6D4FA5DD437B1D39D15B149D05A0C429EDB2DECF78FDA8C9E48A6
37,864,371 UART: Caliptra RT
37,865,090 UART: [state] CFI Enabled
37,982,697 UART: [rt] RT listening for mailbox commands...
37,985,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,140,523 UART: [rt]cmd =0x41544d4e, len=14344
42,247,546 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
4,130,988 ready_for_fw is high
4,131,376 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,252,949 >>> mbox cmd response: success
27,891,781 UART:
27,892,172 UART: Running Caliptra FMC ...
27,893,291 UART:
27,893,443 UART: [state] CFI Enabled
27,901,732 UART: [fht] FMC Alias Private Key: 7
30,232,906 UART: [art] Extend RT PCRs Done
30,234,128 UART: [art] Lock RT PCRs Done
30,235,652 UART: [art] Populate DV Done
30,240,914 UART: [fht] FMC Alias Private Key: 7
30,242,590 UART: [art] Derive CDI
30,243,404 UART: [art] Store in in slot 0x4
30,285,617 UART: [art] Derive Key Pair
30,286,610 UART: [art] Store priv key in slot 0x5
33,528,082 UART: [art] Derive Key Pair - Done
33,540,929 UART: [art] Signing Cert with AUTHO
33,542,227 UART: RITY.KEYID = 7
35,821,981 UART: [art] Erasing AUTHORITY.KEYID = 7
35,823,487 UART: [art] PUB.X = C565E61906415506C1642325033AF8930D67B31D220463611EB47DA9CB52AAD7614A2F96766D4DBC24F9545487347348
35,830,728 UART: [art] PUB.Y = 607FC2D89D3998F4AB213A6C954B621957F01309EC5EC5B1300ED001EBCD2A802BF8735542BB6E1457330E55B3AF0C4A
35,837,975 UART: [art] SIG.R = 37EB25F83402EFA2BB44A4CAAB1FB12A8F28ECA9B1CC04F893EB4E59E348925F40B26BFB83273CB025CB6C66157ACE47
35,845,369 UART: [art] SIG.S = D08751CF36DE7D7A0DBCDE88501CAABD78C5A386140F3F0BF1604F878D872773DFC363174CB5BAE22C464B6EA0BEC7E2
37,150,091 UART: Caliptra RT
37,150,824 UART: [state] CFI Enabled
37,269,298 UART: [rt] RT listening for mailbox commands...
37,271,597 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,052 UART: [rt]cmd =0x41544d4e, len=14344
41,585,668 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,622 UART:
192,999 UART: Running Caliptra ROM ...
194,134 UART:
194,281 UART: [state] CFI Enabled
265,111 UART: [state] LifecycleState = Unprovisioned
267,015 UART: [state] DebugLocked = No
268,765 UART: [state] WD Timer not started. Device not locked for debugging
272,099 UART: [kat] SHA2-256
451,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,816 UART: [kat] ++
463,262 UART: [kat] sha1
474,843 UART: [kat] SHA2-256
477,846 UART: [kat] SHA2-384
484,051 UART: [kat] SHA2-512-ACC
486,985 UART: [kat] ECC-384
2,947,010 UART: [kat] HMAC-384Kdf
2,972,465 UART: [kat] LMS
3,501,942 UART: [kat] --
3,507,859 UART: [cold-reset] ++
3,509,143 UART: [fht] FHT @ 0x50003400
3,520,114 UART: [idev] ++
3,520,680 UART: [idev] CDI.KEYID = 6
3,521,591 UART: [idev] SUBJECT.KEYID = 7
3,522,758 UART: [idev] UDS.KEYID = 0
3,523,677 ready_for_fw is high
3,523,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,468 UART: [idev] Erasing UDS.KEYID = 0
6,027,293 UART: [idev] Sha1 KeyId Algorithm
6,051,054 UART: [idev] --
6,055,265 UART: [ldev] ++
6,055,852 UART: [ldev] CDI.KEYID = 6
6,056,807 UART: [ldev] SUBJECT.KEYID = 5
6,057,966 UART: [ldev] AUTHORITY.KEYID = 7
6,059,197 UART: [ldev] FE.KEYID = 1
6,099,760 UART: [ldev] Erasing FE.KEYID = 1
8,601,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,588 UART: [ldev] --
10,415,005 UART: [fwproc] Wait for Commands...
10,417,800 UART: [fwproc] Recv command 0x46574c44
10,419,875 UART: [fwproc] Recv'd Img size: 114084 bytes
14,971,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,051,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,120,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,438,633 >>> mbox cmd response: success
15,442,425 UART: [afmc] ++
15,443,018 UART: [afmc] CDI.KEYID = 6
15,443,904 UART: [afmc] SUBJECT.KEYID = 7
15,445,113 UART: [afmc] AUTHORITY.KEYID = 5
17,982,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,706,982 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,722,890 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,738,911 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,754,655 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,777,580 UART: [afmc] --
19,780,845 UART: [cold-reset] --
19,783,890 UART: [state] Locking Datavault
19,788,596 UART: [state] Locking PCR0, PCR1 and PCR31
19,790,238 UART: [state] Locking ICCM
19,792,679 UART: [exit] Launching FMC @ 0x40000130
19,801,085 UART:
19,801,320 UART: Running Caliptra FMC ...
19,802,417 UART:
19,802,577 UART: [state] CFI Enabled
19,863,748 UART: [fht] FMC Alias Private Key: 7
21,627,338 UART: [art] Extend RT PCRs Done
21,628,558 UART: [art] Lock RT PCRs Done
21,630,104 UART: [art] Populate DV Done
21,635,512 UART: [fht] FMC Alias Private Key: 7
21,637,146 UART: [art] Derive CDI
21,637,881 UART: [art] Store in in slot 0x4
21,696,107 UART: [art] Derive Key Pair
21,697,145 UART: [art] Store priv key in slot 0x5
24,160,260 UART: [art] Derive Key Pair - Done
24,173,303 UART: [art] Signing Cert with AUTHO
24,174,616 UART: RITY.KEYID = 7
25,886,395 UART: [art] Erasing AUTHORITY.KEYID = 7
25,887,894 UART: [art] PUB.X = 4C158B2EAE8DF1DCA69A76F93C907E9DD7933EC64AAB2A364E782EC88A160EEBB15A5475361AE289A4225FA49B7277BE
25,895,229 UART: [art] PUB.Y = BF148F08110A819B4C72049D37FE9B31805D79000995ED305FB61CE9206FF6C85C6D40EB3BA9DE997F6D40B2E79D301B
25,902,439 UART: [art] SIG.R = 23AA75325F9E49AFA266BA0979A77830944B3064BA1D7CF77C67AF702F96465C178CCD9ECE1BBFF808068144129C59F4
25,909,808 UART: [art] SIG.S = 0D0CDBF5631A7AFBBFC72971A7E714F44506C125C730F49E8B19F09D7FA9A8DFE2A39DC732448A6AB53F772FA4EC5BA1
26,888,571 UART: Caliptra RT
26,889,254 UART: [state] CFI Enabled
27,054,042 UART: [rt] RT listening for mailbox commands...
27,056,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,211,625 UART: [rt]cmd =0x41544d4e, len=14344
29,567,614 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,355,288 ready_for_fw is high
3,355,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,026,582 >>> mbox cmd response: success
19,318,906 UART:
19,319,305 UART: Running Caliptra FMC ...
19,320,441 UART:
19,320,615 UART: [state] CFI Enabled
19,389,549 UART: [fht] FMC Alias Private Key: 7
21,153,782 UART: [art] Extend RT PCRs Done
21,155,004 UART: [art] Lock RT PCRs Done
21,156,584 UART: [art] Populate DV Done
21,161,940 UART: [fht] FMC Alias Private Key: 7
21,163,422 UART: [art] Derive CDI
21,164,234 UART: [art] Store in in slot 0x4
21,222,357 UART: [art] Derive Key Pair
21,223,389 UART: [art] Store priv key in slot 0x5
23,686,699 UART: [art] Derive Key Pair - Done
23,699,590 UART: [art] Signing Cert with AUTHO
23,700,886 UART: RITY.KEYID = 7
25,412,486 UART: [art] Erasing AUTHORITY.KEYID = 7
25,413,989 UART: [art] PUB.X = 94FC5018302F6702B67EF35FE0E40BC40708A33B4BA4DF3C8EE22670BB80F051091166F7DECC3583CD9A40CC8CB9D310
25,421,247 UART: [art] PUB.Y = 2594EA4E871B443DF9B178F0F5D91B4DEF4967F0C6378581B1791518DA5153D1B66AF18BA55E970C8E65DF53053E39F5
25,428,529 UART: [art] SIG.R = 8871EC81F214196734D889A4EE915DE8B89AF3C7FF914552E9CB4EEB336924D623B899BACAC537F0ADA900AB38253D60
25,435,895 UART: [art] SIG.S = 1644810A79D1FF1E02B037B0DB33B36CFD7DFAB07A4CD40EBCCA8E7A44F6BD9D93BB46E31D69DD3A4F2F0A91CDB7C934
26,414,589 UART: Caliptra RT
26,415,300 UART: [state] CFI Enabled
26,580,164 UART: [rt] RT listening for mailbox commands...
26,582,474 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,737,895 UART: [rt]cmd =0x41544d4e, len=14344
29,092,203 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
193,094 UART:
193,481 UART: Running Caliptra ROM ...
194,603 UART:
604,186 UART: [state] CFI Enabled
617,280 UART: [state] LifecycleState = Unprovisioned
619,154 UART: [state] DebugLocked = No
620,625 UART: [state] WD Timer not started. Device not locked for debugging
624,588 UART: [kat] SHA2-256
803,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,269 UART: [kat] ++
815,717 UART: [kat] sha1
827,225 UART: [kat] SHA2-256
830,234 UART: [kat] SHA2-384
836,365 UART: [kat] SHA2-512-ACC
839,303 UART: [kat] ECC-384
3,282,148 UART: [kat] HMAC-384Kdf
3,294,591 UART: [kat] LMS
3,824,023 UART: [kat] --
3,828,179 UART: [cold-reset] ++
3,829,403 UART: [fht] FHT @ 0x50003400
3,841,376 UART: [idev] ++
3,841,951 UART: [idev] CDI.KEYID = 6
3,842,878 UART: [idev] SUBJECT.KEYID = 7
3,844,057 UART: [idev] UDS.KEYID = 0
3,844,964 ready_for_fw is high
3,845,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,452 UART: [idev] Erasing UDS.KEYID = 0
6,316,670 UART: [idev] Sha1 KeyId Algorithm
6,340,015 UART: [idev] --
6,344,122 UART: [ldev] ++
6,344,689 UART: [ldev] CDI.KEYID = 6
6,345,597 UART: [ldev] SUBJECT.KEYID = 5
6,346,759 UART: [ldev] AUTHORITY.KEYID = 7
6,348,042 UART: [ldev] FE.KEYID = 1
6,359,124 UART: [ldev] Erasing FE.KEYID = 1
8,832,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,884 UART: [ldev] --
10,623,947 UART: [fwproc] Wait for Commands...
10,626,745 UART: [fwproc] Recv command 0x46574c44
10,628,838 UART: [fwproc] Recv'd Img size: 114084 bytes
15,217,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,298,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,367,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,684,632 >>> mbox cmd response: success
15,688,149 UART: [afmc] ++
15,688,749 UART: [afmc] CDI.KEYID = 6
15,689,633 UART: [afmc] SUBJECT.KEYID = 7
15,690,761 UART: [afmc] AUTHORITY.KEYID = 5
18,194,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,916,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,918,347 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,934,304 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,950,246 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,966,074 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,988,972 UART: [afmc] --
19,992,957 UART: [cold-reset] --
19,996,068 UART: [state] Locking Datavault
20,001,210 UART: [state] Locking PCR0, PCR1 and PCR31
20,002,863 UART: [state] Locking ICCM
20,005,451 UART: [exit] Launching FMC @ 0x40000130
20,013,858 UART:
20,014,104 UART: Running Caliptra FMC ...
20,015,211 UART:
20,015,374 UART: [state] CFI Enabled
20,023,263 UART: [fht] FMC Alias Private Key: 7
21,779,985 UART: [art] Extend RT PCRs Done
21,781,231 UART: [art] Lock RT PCRs Done
21,782,971 UART: [art] Populate DV Done
21,788,548 UART: [fht] FMC Alias Private Key: 7
21,790,196 UART: [art] Derive CDI
21,791,014 UART: [art] Store in in slot 0x4
21,833,403 UART: [art] Derive Key Pair
21,834,446 UART: [art] Store priv key in slot 0x5
24,261,937 UART: [art] Derive Key Pair - Done
24,275,211 UART: [art] Signing Cert with AUTHO
24,276,522 UART: RITY.KEYID = 7
25,981,985 UART: [art] Erasing AUTHORITY.KEYID = 7
25,983,505 UART: [art] PUB.X = 0A472FF1B27A05F41659774755790EBD2E470ED342E4517985617A0262067BDC402765E51B7E9BFC7EB3A25A956BBC8C
25,990,727 UART: [art] PUB.Y = CC2BE77DBD4D4981FAAC19D6E726676024DED9FF150BDEF9BF9C7F247BA17F49A2E0917F6F61BA2A330ACE044324F9C3
25,997,987 UART: [art] SIG.R = 8EEBEB975C112D2AFB7631EBB39D4E40582810C7241CEA62B8CD7E07C3DE04B6047BA675FAE551F0FB1FE48FC9CDCBC3
26,005,411 UART: [art] SIG.S = B7EF43B79CC89B0C94CE962594F910A0BC01473550DADF20B982556F956AD18E1F6E8883F34D93957B0BA9307B818D90
26,984,240 UART: Caliptra RT
26,984,958 UART: [state] CFI Enabled
27,101,895 UART: [rt] RT listening for mailbox commands...
27,104,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,259,419 UART: [rt]cmd =0x41544d4e, len=14344
29,618,672 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,004 writing to cptra_bootfsm_go
3,693,705 ready_for_fw is high
3,694,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,236,227 >>> mbox cmd response: success
19,482,856 UART:
19,483,252 UART: Running Caliptra FMC ...
19,484,361 UART:
19,484,515 UART: [state] CFI Enabled
19,492,093 UART: [fht] FMC Alias Private Key: 7
21,248,893 UART: [art] Extend RT PCRs Done
21,250,126 UART: [art] Lock RT PCRs Done
21,251,621 UART: [art] Populate DV Done
21,257,264 UART: [fht] FMC Alias Private Key: 7
21,258,906 UART: [art] Derive CDI
21,259,651 UART: [art] Store in in slot 0x4
21,302,035 UART: [art] Derive Key Pair
21,303,039 UART: [art] Store priv key in slot 0x5
23,729,939 UART: [art] Derive Key Pair - Done
23,742,555 UART: [art] Signing Cert with AUTHO
23,743,891 UART: RITY.KEYID = 7
25,449,600 UART: [art] Erasing AUTHORITY.KEYID = 7
25,451,086 UART: [art] PUB.X = 1D763364685C5776EE2B0422DBB8535CC76DBC011E5EAAA06F70072C3B18A22556189AC2D07B8A8A73487C43A7275746
25,458,384 UART: [art] PUB.Y = 462FBE079FDA68F7EC62B5BCE1D4FA03A7A4FA5DE4904C409BC031B4DD100E74D00C5AEF378B8AF66DF09BFF7C3C0D6F
25,465,672 UART: [art] SIG.R = 2300FAD782CFBFC6C8D2DCA3C25976302EE87FC8424ADAD102AB03C2186CF7E81949EEFB43E3CC9B4003FF2AAF8E156E
25,473,054 UART: [art] SIG.S = 24B255FB9987BEF51269BC8A41DB07C3F99BC82F448679DFD3C215083AE9DCFEDD7A5FABB52D424C62AE5E10159986E2
26,452,251 UART: Caliptra RT
26,452,969 UART: [state] CFI Enabled
26,570,301 UART: [rt] RT listening for mailbox commands...
26,572,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,727,877 UART: [rt]cmd =0x41544d4e, len=14344
29,095,901 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,605 writing to cptra_bootfsm_go
193,706 UART:
194,067 UART: Running Caliptra ROM ...
195,277 UART:
195,441 UART: [state] CFI Enabled
262,612 UART: [state] LifecycleState = Unprovisioned
265,007 UART: [state] DebugLocked = No
266,263 UART: [state] WD Timer not started. Device not locked for debugging
270,086 UART: [kat] SHA2-256
459,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,694 UART: [kat] ++
471,171 UART: [kat] sha1
483,279 UART: [kat] SHA2-256
486,256 UART: [kat] SHA2-384
493,312 UART: [kat] SHA2-512-ACC
495,894 UART: [kat] ECC-384
2,949,643 UART: [kat] HMAC-384Kdf
2,971,558 UART: [kat] LMS
3,503,317 UART: [kat] --
3,507,179 UART: [cold-reset] ++
3,508,325 UART: [fht] FHT @ 0x50003400
3,519,092 UART: [idev] ++
3,519,799 UART: [idev] CDI.KEYID = 6
3,520,937 UART: [idev] SUBJECT.KEYID = 7
3,522,079 UART: [idev] UDS.KEYID = 0
3,523,013 ready_for_fw is high
3,523,199 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,535 UART: [idev] Erasing UDS.KEYID = 0
6,027,285 UART: [idev] Sha1 KeyId Algorithm
6,050,739 UART: [idev] --
6,055,490 UART: [ldev] ++
6,056,174 UART: [ldev] CDI.KEYID = 6
6,057,139 UART: [ldev] SUBJECT.KEYID = 5
6,058,264 UART: [ldev] AUTHORITY.KEYID = 7
6,059,515 UART: [ldev] FE.KEYID = 1
6,100,095 UART: [ldev] Erasing FE.KEYID = 1
8,606,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,270 UART: [ldev] --
10,413,171 UART: [fwproc] Wait for Commands...
10,416,238 UART: [fwproc] Recv command 0x46574c44
10,418,541 UART: [fwproc] Recv'd Img size: 114084 bytes
15,053,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,133,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,789,816 >>> mbox cmd response: success
15,794,025 UART: [afmc] ++
15,794,732 UART: [afmc] CDI.KEYID = 6
15,795,846 UART: [afmc] SUBJECT.KEYID = 7
15,797,395 UART: [afmc] AUTHORITY.KEYID = 5
18,337,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,066,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,067,962 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,083,105 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,224 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,105 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,135,685 UART: [afmc] --
20,140,040 UART: [cold-reset] --
20,143,914 UART: [state] Locking Datavault
20,148,361 UART: [state] Locking PCR0, PCR1 and PCR31
20,150,525 UART: [state] Locking ICCM
20,152,564 UART: [exit] Launching FMC @ 0x40000130
20,161,264 UART:
20,161,549 UART: Running Caliptra FMC ...
20,162,573 UART:
20,162,718 UART: [state] CFI Enabled
20,221,909 UART: [fht] FMC Alias Private Key: 7
21,985,557 UART: [art] Extend RT PCRs Done
21,986,784 UART: [art] Lock RT PCRs Done
21,988,456 UART: [art] Populate DV Done
21,993,710 UART: [fht] FMC Alias Private Key: 7
21,995,406 UART: [art] Derive CDI
21,996,144 UART: [art] Store in in slot 0x4
22,054,423 UART: [art] Derive Key Pair
22,055,460 UART: [art] Store priv key in slot 0x5
24,518,371 UART: [art] Derive Key Pair - Done
24,531,378 UART: [art] Signing Cert with AUTHO
24,532,672 UART: RITY.KEYID = 7
26,244,844 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,359 UART: [art] PUB.X = 2623D78F3D88795504CB2035085CB07AE07B77D28DEAF7BFEB2DC05D9271AEAB56CA7C5632A17C172F0528A77DDCB6DA
26,253,628 UART: [art] PUB.Y = 06FE97BBAABF6992982CD440D53354540F85D81C04CC078A5DC8AB8DBD6757C22F24871A0BB88B5524F94CD309A3DE13
26,260,931 UART: [art] SIG.R = 1050249F94EF72F1FD8129C54C495F7A1912101C7698F285BEF4C57E5649F3D1A5C113E07987FD716C1FAABCE3DDD49D
26,268,296 UART: [art] SIG.S = 11F42B44388FB8B88B9B8E011923261C8817423737DF5E3302D88B37AFDF7437C73FB690F1295942E13075F90C446262
27,247,763 UART: Caliptra RT
27,248,475 UART: [state] CFI Enabled
27,412,945 UART: [rt] RT listening for mailbox commands...
27,415,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,436 UART: [rt]cmd =0x41544d4e, len=14344
29,930,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,437,835 ready_for_fw is high
3,438,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,831,840 >>> mbox cmd response: success
20,134,930 UART:
20,135,343 UART: Running Caliptra FMC ...
20,136,536 UART:
20,136,697 UART: [state] CFI Enabled
20,204,775 UART: [fht] FMC Alias Private Key: 7
21,968,947 UART: [art] Extend RT PCRs Done
21,970,171 UART: [art] Lock RT PCRs Done
21,971,905 UART: [art] Populate DV Done
21,977,506 UART: [fht] FMC Alias Private Key: 7
21,979,157 UART: [art] Derive CDI
21,979,971 UART: [art] Store in in slot 0x4
22,037,881 UART: [art] Derive Key Pair
22,038,924 UART: [art] Store priv key in slot 0x5
24,502,035 UART: [art] Derive Key Pair - Done
24,514,756 UART: [art] Signing Cert with AUTHO
24,516,090 UART: RITY.KEYID = 7
26,227,708 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,246 UART: [art] PUB.X = 807DC20B5CD0D2862168A154F90207CD20BD6F1E64E76EF4E8D57D623375E5DC47F98D71BA51EBC37A98D22F057641BA
26,236,483 UART: [art] PUB.Y = 49D69DAAFD6EED79DBCC1DB6AE1FBCDD07A1D2D533682AFFADE314CC2FF08D8A7431B88635F07F95FE30DB1852AF8E25
26,243,771 UART: [art] SIG.R = 717B8D3FB944ACD28EF37B3683D6CD06B8BC251DA847503CD46BD6A910D9BB3E899F5BA1DBAA7C0500A103879B2AB6D1
26,251,136 UART: [art] SIG.S = 7D565FBC754D606868B7E793663BC222033D7EF5DF5FCE50F2A2F6AE63D4DF31C2EB190FCEE4438CAE4F0A798C443A39
27,230,118 UART: Caliptra RT
27,230,815 UART: [state] CFI Enabled
27,395,344 UART: [rt] RT listening for mailbox commands...
27,397,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,137 UART: [rt]cmd =0x41544d4e, len=14344
29,927,636 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
192,929 UART:
193,298 UART: Running Caliptra ROM ...
194,494 UART:
604,059 UART: [state] CFI Enabled
616,398 UART: [state] LifecycleState = Unprovisioned
618,765 UART: [state] DebugLocked = No
621,595 UART: [state] WD Timer not started. Device not locked for debugging
625,470 UART: [kat] SHA2-256
815,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,130 UART: [kat] ++
826,653 UART: [kat] sha1
839,299 UART: [kat] SHA2-256
842,307 UART: [kat] SHA2-384
847,873 UART: [kat] SHA2-512-ACC
850,454 UART: [kat] ECC-384
3,293,676 UART: [kat] HMAC-384Kdf
3,306,771 UART: [kat] LMS
3,838,638 UART: [kat] --
3,843,846 UART: [cold-reset] ++
3,845,516 UART: [fht] FHT @ 0x50003400
3,856,030 UART: [idev] ++
3,856,676 UART: [idev] CDI.KEYID = 6
3,857,728 UART: [idev] SUBJECT.KEYID = 7
3,858,835 UART: [idev] UDS.KEYID = 0
3,859,761 ready_for_fw is high
3,859,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,178 UART: [idev] Erasing UDS.KEYID = 0
6,336,462 UART: [idev] Sha1 KeyId Algorithm
6,358,238 UART: [idev] --
6,362,720 UART: [ldev] ++
6,363,453 UART: [ldev] CDI.KEYID = 6
6,364,364 UART: [ldev] SUBJECT.KEYID = 5
6,365,520 UART: [ldev] AUTHORITY.KEYID = 7
6,366,751 UART: [ldev] FE.KEYID = 1
6,379,236 UART: [ldev] Erasing FE.KEYID = 1
8,855,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,086 UART: [ldev] --
10,646,515 UART: [fwproc] Wait for Commands...
10,649,076 UART: [fwproc] Recv command 0x46574c44
10,651,397 UART: [fwproc] Recv'd Img size: 114084 bytes
15,270,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,354,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,470,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,012,105 >>> mbox cmd response: success
16,017,013 UART: [afmc] ++
16,017,733 UART: [afmc] CDI.KEYID = 6
16,018,928 UART: [afmc] SUBJECT.KEYID = 7
16,020,371 UART: [afmc] AUTHORITY.KEYID = 5
18,526,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,246,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,248,351 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,263,466 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,278,639 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,293,493 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,317,473 UART: [afmc] --
20,321,770 UART: [cold-reset] --
20,327,001 UART: [state] Locking Datavault
20,333,763 UART: [state] Locking PCR0, PCR1 and PCR31
20,335,920 UART: [state] Locking ICCM
20,338,504 UART: [exit] Launching FMC @ 0x40000130
20,347,182 UART:
20,347,431 UART: Running Caliptra FMC ...
20,348,536 UART:
20,348,698 UART: [state] CFI Enabled
20,357,176 UART: [fht] FMC Alias Private Key: 7
22,114,511 UART: [art] Extend RT PCRs Done
22,115,747 UART: [art] Lock RT PCRs Done
22,117,537 UART: [art] Populate DV Done
22,123,001 UART: [fht] FMC Alias Private Key: 7
22,124,542 UART: [art] Derive CDI
22,125,275 UART: [art] Store in in slot 0x4
22,167,873 UART: [art] Derive Key Pair
22,168,918 UART: [art] Store priv key in slot 0x5
24,596,016 UART: [art] Derive Key Pair - Done
24,609,063 UART: [art] Signing Cert with AUTHO
24,610,370 UART: RITY.KEYID = 7
26,315,484 UART: [art] Erasing AUTHORITY.KEYID = 7
26,316,986 UART: [art] PUB.X = ADD59725ABE68E088953CDE39C43B56D6FD8B5E6DB581B1D7F5F92065FF8455522D50401769982F49A1C995ECCCD89AE
26,324,265 UART: [art] PUB.Y = 0029841D1D331A1E6ECB6103B5663B6DB37644F5F27312AB1D802CF8EE67FA426A3500F6458535BBB20DF99771BBB666
26,331,496 UART: [art] SIG.R = E35BCE538783D2679C9C380EEE48357C9B0DCDE3CEF545BF2D0115F050307E833DFADF79F6AFCA1936CC94CF458BA5A4
26,338,882 UART: [art] SIG.S = D544BE8B39B85C76128D03FFD98AD2A75D0D4CD285AFC069DD2EADBDE70B97520119ACAE9B4C0876581973864C0F5F6F
27,317,821 UART: Caliptra RT
27,318,530 UART: [state] CFI Enabled
27,436,398 UART: [rt] RT listening for mailbox commands...
27,438,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,594,008 UART: [rt]cmd =0x41544d4e, len=14344
29,961,733 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
3,754,900 ready_for_fw is high
3,755,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,055,487 >>> mbox cmd response: success
20,311,603 UART:
20,311,995 UART: Running Caliptra FMC ...
20,313,126 UART:
20,313,288 UART: [state] CFI Enabled
20,321,530 UART: [fht] FMC Alias Private Key: 7
22,078,582 UART: [art] Extend RT PCRs Done
22,079,829 UART: [art] Lock RT PCRs Done
22,081,520 UART: [art] Populate DV Done
22,086,700 UART: [fht] FMC Alias Private Key: 7
22,088,249 UART: [art] Derive CDI
22,089,014 UART: [art] Store in in slot 0x4
22,131,780 UART: [art] Derive Key Pair
22,132,824 UART: [art] Store priv key in slot 0x5
24,559,247 UART: [art] Derive Key Pair - Done
24,572,642 UART: [art] Signing Cert with AUTHO
24,573,954 UART: RITY.KEYID = 7
26,279,278 UART: [art] Erasing AUTHORITY.KEYID = 7
26,280,812 UART: [art] PUB.X = 2ECEA84C2218C2EFC359202FDA5B11E451F68A6E78C2C841A6896198EF53C45E554734895080A47250A7E03A7C483FFD
26,288,061 UART: [art] PUB.Y = AE72B3B020796CCD2B1816A2BA74A861F381381327D66E6112CF4F39ADD789B8872D92593B33244C9E5E3B55AAEC3D99
26,295,335 UART: [art] SIG.R = 6C193CF2DBC7EC8BE8A0DB93A734F0F7983DA9CE5340A64FC5AFE88CA152F11413B91A2189E559313C823A2B31D8BDC3
26,302,734 UART: [art] SIG.S = 63A048249AF9F55E3A885BDE030835FA87BBA218B852A086B570A12A544A137C54FB321F57996E750702E0C4517F24BA
27,281,786 UART: Caliptra RT
27,282,500 UART: [state] CFI Enabled
27,399,535 UART: [rt] RT listening for mailbox commands...
27,401,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,556,871 UART: [rt]cmd =0x41544d4e, len=14344
29,925,346 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,976 UART: [kat] SHA2-512-ACC
896,877 UART: [kat] ECC-384
902,116 UART: [kat] HMAC-384Kdf
906,792 UART: [kat] LMS
1,474,988 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,291 UART: [fht] Storing FHT @ 0x50003400
1,479,102 UART: [idev] ++
1,479,270 UART: [idev] CDI.KEYID = 6
1,479,630 UART: [idev] SUBJECT.KEYID = 7
1,480,054 UART: [idev] UDS.KEYID = 0
1,480,399 ready_for_fw is high
1,480,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,942 UART: [idev] Erasing UDS.KEYID = 0
1,504,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,892 UART: [idev] --
1,513,921 UART: [ldev] ++
1,514,089 UART: [ldev] CDI.KEYID = 6
1,514,452 UART: [ldev] SUBJECT.KEYID = 5
1,514,878 UART: [ldev] AUTHORITY.KEYID = 7
1,515,341 UART: [ldev] FE.KEYID = 1
1,520,625 UART: [ldev] Erasing FE.KEYID = 1
1,545,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,296 UART: [ldev] --
1,584,747 UART: [fwproc] Waiting for Commands...
1,585,524 UART: [fwproc] Received command 0x46574c44
1,586,315 UART: [fwproc] Received Image of size 114084 bytes
5,154,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,182,589 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,211,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,347,378 >>> mbox cmd response: success
5,348,408 UART: [afmc] ++
5,348,576 UART: [afmc] CDI.KEYID = 6
5,348,938 UART: [afmc] SUBJECT.KEYID = 7
5,349,363 UART: [afmc] AUTHORITY.KEYID = 5
5,384,901 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,401,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,402,239 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,407,948 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,413,840 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,419,541 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,427,391 UART: [afmc] --
5,428,419 UART: [cold-reset] --
5,429,403 UART: [state] Locking Datavault
5,430,698 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,302 UART: [state] Locking ICCM
5,431,884 UART: [exit] Launching FMC @ 0x40000130
5,437,213 UART:
5,437,229 UART: Running Caliptra FMC ...
5,437,637 UART:
5,437,691 UART: [state] CFI Enabled
5,448,301 UART: [fht] FMC Alias Private Key: 7
5,556,191 UART: [art] Extend RT PCRs Done
5,556,619 UART: [art] Lock RT PCRs Done
5,558,147 UART: [art] Populate DV Done
5,566,339 UART: [fht] FMC Alias Private Key: 7
5,567,321 UART: [art] Derive CDI
5,567,601 UART: [art] Store in in slot 0x4
5,653,238 UART: [art] Derive Key Pair
5,653,598 UART: [art] Store priv key in slot 0x5
5,667,066 UART: [art] Derive Key Pair - Done
5,681,902 UART: [art] Signing Cert with AUTHO
5,682,382 UART: RITY.KEYID = 7
5,697,740 UART: [art] Erasing AUTHORITY.KEYID = 7
5,698,505 UART: [art] PUB.X = D86A80949387C42D606FB17E5BEC56BE6DDA30ABDE9305E352C4B47AD262724E3239FB836872C24F5A7B1162DEB054F2
5,705,280 UART: [art] PUB.Y = 92FA46CBC389F5EFAE085E3150F75BB38E8FD1FCD55BDB7FF79B7746C46A48D353A53C04C92B15E8AC895B3CB802BD81
5,712,241 UART: [art] SIG.R = 5E4CDFC5AE2763085B390EFCDAD3B1A6E1668CF86BE61FBDCD6F181450B6810238252D9F685F7C4D680CB3A6798076C6
5,719,011 UART: [art] SIG.S = AA3EBC716E2B03336977C9F802A19B09682581E291CF2B128AF3B523AC12B4E47E94DE0A3DE1F00F26CC7EA4929268E7
5,742,267 UART: Caliptra RT
5,742,520 UART: [state] CFI Enabled
5,850,209 UART: [rt] RT listening for mailbox commands...
5,850,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,881 UART: [rt]cmd =0x41544d4e, len=14344
6,534,642 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,234,211 >>> mbox cmd response: success
5,295,672 UART:
5,295,688 UART: Running Caliptra FMC ...
5,296,096 UART:
5,296,150 UART: [state] CFI Enabled
5,306,730 UART: [fht] FMC Alias Private Key: 7
5,414,402 UART: [art] Extend RT PCRs Done
5,414,830 UART: [art] Lock RT PCRs Done
5,416,210 UART: [art] Populate DV Done
5,424,592 UART: [fht] FMC Alias Private Key: 7
5,425,710 UART: [art] Derive CDI
5,425,990 UART: [art] Store in in slot 0x4
5,511,741 UART: [art] Derive Key Pair
5,512,101 UART: [art] Store priv key in slot 0x5
5,525,355 UART: [art] Derive Key Pair - Done
5,540,148 UART: [art] Signing Cert with AUTHO
5,540,628 UART: RITY.KEYID = 7
5,555,806 UART: [art] Erasing AUTHORITY.KEYID = 7
5,556,571 UART: [art] PUB.X = 84C0BAF88C5232A0B3612B6AC0045E1AB3BE168FACFDF89F45F3AAE1F53BC86006613DFADE545A6B7D28A10E1E863EBE
5,563,356 UART: [art] PUB.Y = 0D6632D76805BCB88B7359A5D775390B08288698EE99AA192C4F4B4E3833B77CF7781BD0F181F8097E484FD36B128079
5,570,285 UART: [art] SIG.R = 513A0E9BA4EA7160877C6480CBA0683A7B4F065D31CA259A11138CFA29EDA3322DF24431FD2B9773CD2043CAD61A48CA
5,577,059 UART: [art] SIG.S = FE157A8C664CF8549754F4361D0365F354C4D9DAD32D82B067D95A8B55716F5CB01CE57AF4E832D565DF152D22878BA0
5,600,137 UART: Caliptra RT
5,600,390 UART: [state] CFI Enabled
5,707,569 UART: [rt] RT listening for mailbox commands...
5,708,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,831,645 UART: [rt]cmd =0x41544d4e, len=14344
6,382,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,854 UART: [kat] SHA2-256
892,792 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,001 UART: [kat] HMAC-384Kdf
907,569 UART: [kat] LMS
1,475,765 UART: [kat] --
1,476,568 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,479,903 UART: [idev] ++
1,480,071 UART: [idev] CDI.KEYID = 6
1,480,431 UART: [idev] SUBJECT.KEYID = 7
1,480,855 UART: [idev] UDS.KEYID = 0
1,481,200 ready_for_fw is high
1,481,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,410 UART: [ldev] ++
1,515,578 UART: [ldev] CDI.KEYID = 6
1,515,941 UART: [ldev] SUBJECT.KEYID = 5
1,516,367 UART: [ldev] AUTHORITY.KEYID = 7
1,516,830 UART: [ldev] FE.KEYID = 1
1,522,114 UART: [ldev] Erasing FE.KEYID = 1
1,547,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,689 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,783 UART: [fwproc] Received command 0x46574c44
1,588,574 UART: [fwproc] Received Image of size 114084 bytes
5,270,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,298,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,463,640 >>> mbox cmd response: success
5,464,868 UART: [afmc] ++
5,465,036 UART: [afmc] CDI.KEYID = 6
5,465,398 UART: [afmc] SUBJECT.KEYID = 7
5,465,823 UART: [afmc] AUTHORITY.KEYID = 5
5,500,133 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,516,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,516,821 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,522,530 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,528,422 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,534,123 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,541,851 UART: [afmc] --
5,542,757 UART: [cold-reset] --
5,543,553 UART: [state] Locking Datavault
5,544,528 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,132 UART: [state] Locking ICCM
5,545,642 UART: [exit] Launching FMC @ 0x40000130
5,550,971 UART:
5,550,987 UART: Running Caliptra FMC ...
5,551,395 UART:
5,551,538 UART: [state] CFI Enabled
5,562,194 UART: [fht] FMC Alias Private Key: 7
5,669,708 UART: [art] Extend RT PCRs Done
5,670,136 UART: [art] Lock RT PCRs Done
5,671,666 UART: [art] Populate DV Done
5,679,886 UART: [fht] FMC Alias Private Key: 7
5,681,034 UART: [art] Derive CDI
5,681,314 UART: [art] Store in in slot 0x4
5,767,007 UART: [art] Derive Key Pair
5,767,367 UART: [art] Store priv key in slot 0x5
5,780,941 UART: [art] Derive Key Pair - Done
5,795,874 UART: [art] Signing Cert with AUTHO
5,796,354 UART: RITY.KEYID = 7
5,811,428 UART: [art] Erasing AUTHORITY.KEYID = 7
5,812,193 UART: [art] PUB.X = 46FD8664CD96D3281C4FCCAF87FFD96D385E3AC7EA094D017BE2C20F6895DEA6388F2645F775464FE59ACC9D5F615612
5,818,966 UART: [art] PUB.Y = DD723B0E60F6EB0AC94708866D693CEF737F8CD5E35AF9D4E5A85642DA4BBCC10951262C7D3477747E16B853D51C1641
5,825,910 UART: [art] SIG.R = 3AE2DF6D527F9A8C016E8679C34370CE479804E0F7ABA38BD89B009ADF58AD879C35248E96068FA04EC11AB3C3AB8F7C
5,832,663 UART: [art] SIG.S = B60F26BF151D622E5CC4B6C8D3F5C6796C75162156F0811B8B2CBC2EFD22E29851729E2533817FD5C583FECFCF97EAA0
5,856,123 UART: Caliptra RT
5,856,468 UART: [state] CFI Enabled
5,965,261 UART: [rt] RT listening for mailbox commands...
5,965,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,088,641 UART: [rt]cmd =0x41544d4e, len=14344
6,661,617 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 ready_for_fw is high
1,362,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,084,236 >>> mbox cmd response: success
5,146,357 UART:
5,146,373 UART: Running Caliptra FMC ...
5,146,781 UART:
5,146,924 UART: [state] CFI Enabled
5,157,926 UART: [fht] FMC Alias Private Key: 7
5,265,860 UART: [art] Extend RT PCRs Done
5,266,288 UART: [art] Lock RT PCRs Done
5,267,910 UART: [art] Populate DV Done
5,276,088 UART: [fht] FMC Alias Private Key: 7
5,277,262 UART: [art] Derive CDI
5,277,542 UART: [art] Store in in slot 0x4
5,363,369 UART: [art] Derive Key Pair
5,363,729 UART: [art] Store priv key in slot 0x5
5,376,983 UART: [art] Derive Key Pair - Done
5,391,752 UART: [art] Signing Cert with AUTHO
5,392,232 UART: RITY.KEYID = 7
5,407,410 UART: [art] Erasing AUTHORITY.KEYID = 7
5,408,175 UART: [art] PUB.X = B31C3CD5FBA22783371E05FC5A69BAD9BBE8D4ABA9FDB7E0F27D4B9CD3C472403DA39D2B0B0438833CDB98B0C76CD33D
5,414,962 UART: [art] PUB.Y = 36831D2EE142C2AFEA384E41F3FC877006A68C1C9136584FF73662F2B5D4E370F86A04A01C691CD3E977BFC429DDEEFA
5,421,918 UART: [art] SIG.R = AD4B82CE38868695480B32071D370AE0D26435B92AEB430C8ED68B40EFF63DAC16BD64CD7309B812737BC59AC6578BFE
5,428,683 UART: [art] SIG.S = 10E034D54CEEDD05D1DE62D46BB451BC2C1A814089C8EC97A867072FB5810C5F521965ACF26C029AA90B044F7D5C3986
5,452,578 UART: Caliptra RT
5,452,923 UART: [state] CFI Enabled
5,561,806 UART: [rt] RT listening for mailbox commands...
5,562,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,648 UART: [rt]cmd =0x41544d4e, len=14344
6,251,681 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,511 UART: [cold-reset] ++
1,171,873 UART: [fht] FHT @ 0x50003400
1,174,500 UART: [idev] ++
1,174,668 UART: [idev] CDI.KEYID = 6
1,175,028 UART: [idev] SUBJECT.KEYID = 7
1,175,452 UART: [idev] UDS.KEYID = 0
1,175,797 ready_for_fw is high
1,175,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,334 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,897 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,400 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,231 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,545 UART: [ldev] --
1,281,958 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,422 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,967 >>> mbox cmd response: success
3,319,997 UART: [afmc] ++
3,320,165 UART: [afmc] CDI.KEYID = 6
3,320,527 UART: [afmc] SUBJECT.KEYID = 7
3,320,952 UART: [afmc] AUTHORITY.KEYID = 5
3,356,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,725 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,434 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,326 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,037 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,882 UART: [afmc] --
3,399,880 UART: [cold-reset] --
3,400,934 UART: [state] Locking Datavault
3,401,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,553 UART: [state] Locking ICCM
3,403,087 UART: [exit] Launching FMC @ 0x40000130
3,408,416 UART:
3,408,432 UART: Running Caliptra FMC ...
3,408,840 UART:
3,408,894 UART: [state] CFI Enabled
3,419,468 UART: [fht] FMC Alias Private Key: 7
3,527,348 UART: [art] Extend RT PCRs Done
3,527,776 UART: [art] Lock RT PCRs Done
3,529,290 UART: [art] Populate DV Done
3,537,510 UART: [fht] FMC Alias Private Key: 7
3,538,680 UART: [art] Derive CDI
3,538,960 UART: [art] Store in in slot 0x4
3,624,677 UART: [art] Derive Key Pair
3,625,037 UART: [art] Store priv key in slot 0x5
3,638,423 UART: [art] Derive Key Pair - Done
3,653,262 UART: [art] Signing Cert with AUTHO
3,653,742 UART: RITY.KEYID = 7
3,668,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,327 UART: [art] PUB.X = 3D2E756A67035A023BF8EBD8183D0513D8A01128CD6E342BA7DD71C3E030093F8F063065C9195E467726AD1C2B3BA715
3,676,082 UART: [art] PUB.Y = D3214280C47FE69F28A82C77D168547EEB432A38679AC3DEA5CA1CD318019AB3F8E545963963C41475D202F89C1E6EF2
3,683,028 UART: [art] SIG.R = F418AA7C05DF873BFC7B9A3C35D936AE04906232D5D5EA57DCE603C44B60ACFD4E27DF190F3E43B388AEC86D7FE06F0B
3,689,805 UART: [art] SIG.S = 369BECA61AFE408F3885C54843CEA6BF324554F06900F62676EF7ED33A98161DDE51C60DB7A7263CAB86909AAB5B93D0
3,713,725 UART: Caliptra RT
3,713,978 UART: [state] CFI Enabled
3,821,508 UART: [rt] RT listening for mailbox commands...
3,822,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,242 UART: [rt]cmd =0x41544d4e, len=14344
4,508,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 ready_for_fw is high
1,060,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,608 >>> mbox cmd response: success
3,230,373 UART:
3,230,389 UART: Running Caliptra FMC ...
3,230,797 UART:
3,230,851 UART: [state] CFI Enabled
3,241,363 UART: [fht] FMC Alias Private Key: 7
3,348,781 UART: [art] Extend RT PCRs Done
3,349,209 UART: [art] Lock RT PCRs Done
3,350,711 UART: [art] Populate DV Done
3,358,951 UART: [fht] FMC Alias Private Key: 7
3,360,115 UART: [art] Derive CDI
3,360,395 UART: [art] Store in in slot 0x4
3,446,158 UART: [art] Derive Key Pair
3,446,518 UART: [art] Store priv key in slot 0x5
3,460,088 UART: [art] Derive Key Pair - Done
3,474,662 UART: [art] Signing Cert with AUTHO
3,475,142 UART: RITY.KEYID = 7
3,490,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,003 UART: [art] PUB.X = D2F2DF26238AC53E3674D98266A9A46910030D329B9606F0FD0CD8717AEA2E700755820FD51FA11AA10A432AF2ED0F9A
3,497,755 UART: [art] PUB.Y = 475EFDB5BFECB7966C0E9FAEDAAA2BF1E5A5BB90316C7F0AE1DC0E4987877D316E0441E70CF6FC974D8DAAFEA7C227A0
3,504,722 UART: [art] SIG.R = 994A2D5D11BB00C8515F3888EA6D3FBE0FD4640FC957CC824187B9B08B3E98E0135F82A83A1D848DD17BE9C922E31DB0
3,511,474 UART: [art] SIG.S = 29238066C36D720AADD12FCE79980B71175F8F7DAC19D959A1809797205AAD929BDAE06C6E8C058841DC9CA1BF802D9B
3,535,354 UART: Caliptra RT
3,535,607 UART: [state] CFI Enabled
3,642,375 UART: [rt] RT listening for mailbox commands...
3,643,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,993 UART: [rt]cmd =0x41544d4e, len=14344
4,316,310 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,757 UART: [kat] SHA2-512-ACC
908,658 UART: [kat] ECC-384
918,277 UART: [kat] HMAC-384Kdf
922,851 UART: [kat] LMS
1,171,179 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 ready_for_fw is high
1,176,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,201,026 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,372 UART: [ldev] ++
1,210,540 UART: [ldev] CDI.KEYID = 6
1,210,903 UART: [ldev] SUBJECT.KEYID = 5
1,211,329 UART: [ldev] AUTHORITY.KEYID = 7
1,211,792 UART: [ldev] FE.KEYID = 1
1,217,026 UART: [ldev] Erasing FE.KEYID = 1
1,243,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,066 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,279 UART: [fwproc] Recv command 0x46574c44
1,285,007 UART: [fwproc] Recv'd Img size: 114084 bytes
3,127,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,320,631 >>> mbox cmd response: success
3,321,711 UART: [afmc] ++
3,321,879 UART: [afmc] CDI.KEYID = 6
3,322,241 UART: [afmc] SUBJECT.KEYID = 7
3,322,666 UART: [afmc] AUTHORITY.KEYID = 5
3,358,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,525 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,234 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,126 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,837 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,644 UART: [afmc] --
3,401,762 UART: [cold-reset] --
3,402,772 UART: [state] Locking Datavault
3,403,989 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,593 UART: [state] Locking ICCM
3,405,095 UART: [exit] Launching FMC @ 0x40000130
3,410,424 UART:
3,410,440 UART: Running Caliptra FMC ...
3,410,848 UART:
3,410,991 UART: [state] CFI Enabled
3,421,363 UART: [fht] FMC Alias Private Key: 7
3,528,503 UART: [art] Extend RT PCRs Done
3,528,931 UART: [art] Lock RT PCRs Done
3,530,183 UART: [art] Populate DV Done
3,538,639 UART: [fht] FMC Alias Private Key: 7
3,539,655 UART: [art] Derive CDI
3,539,935 UART: [art] Store in in slot 0x4
3,625,586 UART: [art] Derive Key Pair
3,625,946 UART: [art] Store priv key in slot 0x5
3,638,994 UART: [art] Derive Key Pair - Done
3,653,707 UART: [art] Signing Cert with AUTHO
3,654,187 UART: RITY.KEYID = 7
3,669,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,336 UART: [art] PUB.X = E8A652458632A560397B2C53EA9552D0CB556533F66DA65A193413E2311232B70CB3F04FAD106F9CF8491DBF971B3573
3,677,099 UART: [art] PUB.Y = FDB227FDD4ED7C5A306FBB798C04C9C7BAB642B8911D7B5838DB3DAA430628636C94EDD5C2656C2861955AB393E66238
3,684,053 UART: [art] SIG.R = 11B5D98ED5096BC5950D8655363238979681DFC55E874348CAB50A0C664682EB3760C2CE82FCFBE433D8070806C11431
3,690,796 UART: [art] SIG.S = D43813B4CE6E1EE9CF547147C19D91E2E445FA3CDBE4F8DDD471F434A95F089E25BAB5C7295DFF4F931FA116FD285052
3,714,464 UART: Caliptra RT
3,714,809 UART: [state] CFI Enabled
3,821,671 UART: [rt] RT listening for mailbox commands...
3,822,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,483 UART: [rt]cmd =0x41544d4e, len=14344
4,513,423 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,848 ready_for_fw is high
1,060,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,074 >>> mbox cmd response: success
3,234,349 UART:
3,234,365 UART: Running Caliptra FMC ...
3,234,773 UART:
3,234,916 UART: [state] CFI Enabled
3,245,116 UART: [fht] FMC Alias Private Key: 7
3,352,882 UART: [art] Extend RT PCRs Done
3,353,310 UART: [art] Lock RT PCRs Done
3,354,758 UART: [art] Populate DV Done
3,362,678 UART: [fht] FMC Alias Private Key: 7
3,363,856 UART: [art] Derive CDI
3,364,136 UART: [art] Store in in slot 0x4
3,450,011 UART: [art] Derive Key Pair
3,450,371 UART: [art] Store priv key in slot 0x5
3,463,189 UART: [art] Derive Key Pair - Done
3,477,958 UART: [art] Signing Cert with AUTHO
3,478,438 UART: RITY.KEYID = 7
3,493,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,519 UART: [art] PUB.X = 20995DB90E1340DB9E2F6C982F30C31A6065E38999952873A15A403C2A3B1CD0E156E05F126FBC45D6859A106AD66470
3,501,282 UART: [art] PUB.Y = 64570AB04B325E2571B4899696081FD3D3EB3D51221A8F9C0AC94D629ED6FC504E16E56401DC2CAAAA5E9021D51CE238
3,508,226 UART: [art] SIG.R = 35FD2947E1413F6B6F99EEA973E7D7D206CAAC8577910C4AB4494BC446865264D011FF7075F59E5F2CDF3BB672228D4F
3,514,996 UART: [art] SIG.S = 00EDB60DEA08AD3D031FB3578E6B08EF86C38A6661C6A8E898C2B8E5FF7C35CE177F1D86CC24A12F3E25FF2DF4597D1D
3,538,207 UART: Caliptra RT
3,538,552 UART: [state] CFI Enabled
3,646,098 UART: [rt] RT listening for mailbox commands...
3,646,768 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,674 UART: [rt]cmd =0x41544d4e, len=14344
4,332,806 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,170,269 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,609 UART: [idev] ++
1,173,777 UART: [idev] CDI.KEYID = 6
1,174,138 UART: [idev] SUBJECT.KEYID = 7
1,174,563 UART: [idev] UDS.KEYID = 0
1,174,909 ready_for_fw is high
1,174,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,207,999 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,242,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,166 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 114084 bytes
3,116,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,309,822 >>> mbox cmd response: success
3,310,997 UART: [afmc] ++
3,311,165 UART: [afmc] CDI.KEYID = 6
3,311,528 UART: [afmc] SUBJECT.KEYID = 7
3,311,954 UART: [afmc] AUTHORITY.KEYID = 5
3,347,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,961 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,671 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,561 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,272 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,176 UART: [afmc] --
3,391,268 UART: [cold-reset] --
3,392,110 UART: [state] Locking Datavault
3,393,395 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,999 UART: [state] Locking ICCM
3,394,489 UART: [exit] Launching FMC @ 0x40000130
3,399,818 UART:
3,399,834 UART: Running Caliptra FMC ...
3,400,242 UART:
3,400,296 UART: [state] CFI Enabled
3,410,812 UART: [fht] FMC Alias Private Key: 7
3,518,468 UART: [art] Extend RT PCRs Done
3,518,896 UART: [art] Lock RT PCRs Done
3,520,402 UART: [art] Populate DV Done
3,528,596 UART: [fht] FMC Alias Private Key: 7
3,529,724 UART: [art] Derive CDI
3,530,004 UART: [art] Store in in slot 0x4
3,615,853 UART: [art] Derive Key Pair
3,616,213 UART: [art] Store priv key in slot 0x5
3,629,513 UART: [art] Derive Key Pair - Done
3,644,289 UART: [art] Signing Cert with AUTHO
3,644,769 UART: RITY.KEYID = 7
3,660,085 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,850 UART: [art] PUB.X = 02B8F8AA9AD9114FFD14AC8BCDD12A201667F0F60554BFF5894FA06EE783B44914913842D055C8A8C34B460D37F5A3F2
3,667,619 UART: [art] PUB.Y = D4393C0EA02154713AC31DC51187E92A800580C5C4B21DA9E815AFE5C0537B591837458A23898D755F843255C0F89F30
3,674,555 UART: [art] SIG.R = A4798BB875F9C097F4EDFEECD4C5BE8B56CFE908D6B518A2A1E4A60CC18A61A4EBBDD9090A0DB14601F4493A8182B38A
3,681,329 UART: [art] SIG.S = 1762D5903B2BE5ADCA09200CA8F91DA048B36B73A1354508957769C91BA536A7679A05127CC6D9020122535B97A0F92D
3,704,986 UART: Caliptra RT
3,705,239 UART: [state] CFI Enabled
3,812,489 UART: [rt] RT listening for mailbox commands...
3,813,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,029 UART: [rt]cmd =0x41544d4e, len=14344
4,494,507 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,564 ready_for_fw is high
1,055,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,151,977 >>> mbox cmd response: success
3,213,772 UART:
3,213,788 UART: Running Caliptra FMC ...
3,214,196 UART:
3,214,250 UART: [state] CFI Enabled
3,224,812 UART: [fht] FMC Alias Private Key: 7
3,332,872 UART: [art] Extend RT PCRs Done
3,333,300 UART: [art] Lock RT PCRs Done
3,335,116 UART: [art] Populate DV Done
3,343,418 UART: [fht] FMC Alias Private Key: 7
3,344,582 UART: [art] Derive CDI
3,344,862 UART: [art] Store in in slot 0x4
3,430,469 UART: [art] Derive Key Pair
3,430,829 UART: [art] Store priv key in slot 0x5
3,443,901 UART: [art] Derive Key Pair - Done
3,458,949 UART: [art] Signing Cert with AUTHO
3,459,429 UART: RITY.KEYID = 7
3,474,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,475,416 UART: [art] PUB.X = 9E0B7557825763D92C07DA10383807485C49E02DAE899A899744EE63BFE5BD595722B5977985A012446AC61FFF8058B4
3,482,169 UART: [art] PUB.Y = B67BA663E25E82B7C4F00A643E1A11DE149944D305686F29EC912300F4542A86838259AE368D114A15B835E4530306F0
3,489,075 UART: [art] SIG.R = 92F3CA7BC27FC4527C2DC91EBA7ABEB34167AE8362455DE33360F81B12D9DB07B66D0CCFCBB652B2E8E9E33C01C8994B
3,495,856 UART: [art] SIG.S = F3E8859B20B7179D313F0CE6C24163B3F90F91D66B323CD233CE2F8A6DE2EFA7F4E9D9EDCCCF0681DE81DB75F8B9F768
3,519,998 UART: Caliptra RT
3,520,251 UART: [state] CFI Enabled
3,627,440 UART: [rt] RT listening for mailbox commands...
3,628,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,802 UART: [rt]cmd =0x41544d4e, len=14344
4,316,329 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,214 UART: [idev] ++
1,173,382 UART: [idev] CDI.KEYID = 6
1,173,743 UART: [idev] SUBJECT.KEYID = 7
1,174,168 UART: [idev] UDS.KEYID = 0
1,174,514 ready_for_fw is high
1,174,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,295 UART: [ldev] ++
1,209,463 UART: [ldev] CDI.KEYID = 6
1,209,827 UART: [ldev] SUBJECT.KEYID = 5
1,210,254 UART: [ldev] AUTHORITY.KEYID = 7
1,210,717 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,851 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x46574c44
1,283,167 UART: [fwproc] Recv'd Img size: 114084 bytes
3,119,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,712 >>> mbox cmd response: success
3,312,943 UART: [afmc] ++
3,313,111 UART: [afmc] CDI.KEYID = 6
3,313,474 UART: [afmc] SUBJECT.KEYID = 7
3,313,900 UART: [afmc] AUTHORITY.KEYID = 5
3,349,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,323 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,033 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,923 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,634 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,654 UART: [afmc] --
3,392,696 UART: [cold-reset] --
3,393,668 UART: [state] Locking Datavault
3,394,705 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,309 UART: [state] Locking ICCM
3,395,875 UART: [exit] Launching FMC @ 0x40000130
3,401,204 UART:
3,401,220 UART: Running Caliptra FMC ...
3,401,628 UART:
3,401,771 UART: [state] CFI Enabled
3,412,323 UART: [fht] FMC Alias Private Key: 7
3,520,039 UART: [art] Extend RT PCRs Done
3,520,467 UART: [art] Lock RT PCRs Done
3,521,861 UART: [art] Populate DV Done
3,530,207 UART: [fht] FMC Alias Private Key: 7
3,531,177 UART: [art] Derive CDI
3,531,457 UART: [art] Store in in slot 0x4
3,617,388 UART: [art] Derive Key Pair
3,617,748 UART: [art] Store priv key in slot 0x5
3,631,234 UART: [art] Derive Key Pair - Done
3,646,143 UART: [art] Signing Cert with AUTHO
3,646,623 UART: RITY.KEYID = 7
3,661,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,322 UART: [art] PUB.X = BF5CDDAFF20CB9209B2B443E8B39AA3663D0FA8709B73DCF2385CB0FAAF29217E4262A1D5DDBF2ACB11DC10280B7C1ED
3,669,108 UART: [art] PUB.Y = 6F452523BDEB5CF3EC0CF7A0A4EA616857F703BFD117CEB582FADD6E2F439F840CC9DD3171C3AE9BFBECE74EB71DDFA4
3,676,083 UART: [art] SIG.R = 7F3F6732A046496D2872A050ACD0F5A2EF2F73A3C141B9D0724DF6B73E3B4ADCBEEC92983FD2C45958A0F08EA8712EBF
3,682,869 UART: [art] SIG.S = D09A8961399529A5CC92ECA4BC91276D7BE4086E34EFBC6E42F1F75BE65E4090951321CE3BCF169391138F2B2FCEAE3C
3,706,945 UART: Caliptra RT
3,707,290 UART: [state] CFI Enabled
3,815,310 UART: [rt] RT listening for mailbox commands...
3,815,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,990 UART: [rt]cmd =0x41544d4e, len=14344
4,490,181 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,993 >>> mbox cmd response: success
3,227,922 UART:
3,227,938 UART: Running Caliptra FMC ...
3,228,346 UART:
3,228,489 UART: [state] CFI Enabled
3,239,395 UART: [fht] FMC Alias Private Key: 7
3,347,447 UART: [art] Extend RT PCRs Done
3,347,875 UART: [art] Lock RT PCRs Done
3,349,427 UART: [art] Populate DV Done
3,357,617 UART: [fht] FMC Alias Private Key: 7
3,358,631 UART: [art] Derive CDI
3,358,911 UART: [art] Store in in slot 0x4
3,444,702 UART: [art] Derive Key Pair
3,445,062 UART: [art] Store priv key in slot 0x5
3,458,178 UART: [art] Derive Key Pair - Done
3,472,865 UART: [art] Signing Cert with AUTHO
3,473,345 UART: RITY.KEYID = 7
3,488,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,476 UART: [art] PUB.X = 2957F93869FBA33B592C24855EC9BE4C0A99D21EA2FE8DDD118EDF52732494300F669E2A41921B15D662994315DB4798
3,496,238 UART: [art] PUB.Y = 038B799423EA75383F7DEE17C9101A1FD603E27E8488D641C3831674EB6BF01D9FF86C537F377D8E93291E902FD6352D
3,503,180 UART: [art] SIG.R = F793A864F92DA79C59D4290E3CC1A537262A7560CDE8229A5725829F167682B6E548BC7F78C652B81F0B25B29706DCA7
3,509,939 UART: [art] SIG.S = 38CEEF5AAABB1DB27FFCD03A4BC2F868D32518E66393E7A0CEBC9944E60095D6A5FE60396F18F033DBFCFB4D195FA201
3,533,361 UART: Caliptra RT
3,533,706 UART: [state] CFI Enabled
3,641,064 UART: [rt] RT listening for mailbox commands...
3,641,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,692 UART: [rt]cmd =0x41544d4e, len=14344
4,327,720 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,058 UART:
192,431 UART: Running Caliptra ROM ...
193,584 UART:
193,731 UART: [state] CFI Enabled
264,305 UART: [state] LifecycleState = Unprovisioned
266,286 UART: [state] DebugLocked = No
269,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,668 UART: [kat] SHA2-256
443,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,869 UART: [kat] ++
454,391 UART: [kat] sha1
466,419 UART: [kat] SHA2-256
469,074 UART: [kat] SHA2-384
474,143 UART: [kat] SHA2-512-ACC
476,522 UART: [kat] ECC-384
2,768,901 UART: [kat] HMAC-384Kdf
2,799,620 UART: [kat] LMS
3,989,997 UART: [kat] --
3,995,559 UART: [cold-reset] ++
3,996,857 UART: [fht] Storing FHT @ 0x50003400
4,007,416 UART: [idev] ++
4,007,985 UART: [idev] CDI.KEYID = 6
4,008,878 UART: [idev] SUBJECT.KEYID = 7
4,010,200 UART: [idev] UDS.KEYID = 0
4,011,198 ready_for_fw is high
4,011,408 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,563 UART: [idev] Erasing UDS.KEYID = 0
7,346,955 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,524 UART: [idev] --
7,370,172 UART: [ldev] ++
7,370,744 UART: [ldev] CDI.KEYID = 6
7,371,720 UART: [ldev] SUBJECT.KEYID = 5
7,372,927 UART: [ldev] AUTHORITY.KEYID = 7
7,374,162 UART: [ldev] FE.KEYID = 1
7,421,483 UART: [ldev] Erasing FE.KEYID = 1
10,753,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,948 UART: [ldev] --
13,114,458 UART: [fwproc] Waiting for Commands...
13,117,039 UART: [fwproc] Received command 0x46574c44
13,119,252 UART: [fwproc] Received Image of size 113760 bytes
21,591,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,668,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,737,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,053,636 >>> mbox cmd response: success
22,057,697 UART: [afmc] ++
22,058,301 UART: [afmc] CDI.KEYID = 6
22,059,213 UART: [afmc] SUBJECT.KEYID = 7
22,060,489 UART: [afmc] AUTHORITY.KEYID = 5
25,424,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,720,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,723,249 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,737,807 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,752,535 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,766,719 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,788,022 UART: [afmc] --
27,792,397 UART: [cold-reset] --
27,795,829 UART: [state] Locking Datavault
27,802,705 UART: [state] Locking PCR0, PCR1 and PCR31
27,804,489 UART: [state] Locking ICCM
27,807,082 UART: [exit] Launching FMC @ 0x40000130
27,815,478 UART:
27,815,717 UART: Running Caliptra FMC ...
27,816,819 UART:
27,816,977 UART: [state] CFI Enabled
27,881,068 UART: [fht] FMC Alias Private Key: 7
30,219,178 UART: [art] Extend RT PCRs Done
30,220,397 UART: [art] Lock RT PCRs Done
30,221,911 UART: [art] Populate DV Done
30,227,323 UART: [fht] FMC Alias Private Key: 7
30,228,917 UART: [art] Derive CDI
30,229,729 UART: [art] Store in in slot 0x4
30,289,395 UART: [art] Derive Key Pair
30,290,437 UART: [art] Store priv key in slot 0x5
33,583,490 UART: [art] Derive Key Pair - Done
33,596,542 UART: [art] Signing Cert with AUTHO
33,597,850 UART: RITY.KEYID = 7
35,885,546 UART: [art] Erasing AUTHORITY.KEYID = 7
35,887,445 UART: [art] PUB.X = 0039E42EF45BAF72E52FF210E8111448E7D8AEF25DC1E8A57098507749AFD299BBEA55AA629104EE537C08BF6B49DC16
35,894,324 UART: [art] PUB.Y = AA8BB102BFE96F7BECAE40AC7EC87B339AAC57E7E7A1FB1B2F1228C320452CECD5B2F10EB8800936B47846711564B108
35,901,608 UART: [art] SIG.R = 6D2E99A6A7389F2C078BFDCFA6718AD0F51BAB365D2D2AD9E084EC3579D8226156323D44E2C79A1D3C98AF7AD206E4B6
35,908,996 UART: [art] SIG.S = 5D31C44614FEAB8541DC0D12CB477A6CE1389207EAB75C25C4F93A6E0A600EAB7BB4ACB324628F3C11EAFED2AAC75B87
37,213,821 UART: Caliptra RT
37,214,523 UART: [state] CFI Enabled
37,374,938 UART: [rt] RT listening for mailbox commands...
37,377,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,532,328 UART: [rt]cmd =0x41544d4e, len=14344
41,820,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,803,541 ready_for_fw is high
3,803,912 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,134,333 >>> mbox cmd response: success
27,820,911 UART:
27,821,310 UART: Running Caliptra FMC ...
27,822,453 UART:
27,822,614 UART: [state] CFI Enabled
27,893,786 UART: [fht] FMC Alias Private Key: 7
30,231,757 UART: [art] Extend RT PCRs Done
30,232,988 UART: [art] Lock RT PCRs Done
30,234,344 UART: [art] Populate DV Done
30,239,939 UART: [fht] FMC Alias Private Key: 7
30,241,535 UART: [art] Derive CDI
30,242,350 UART: [art] Store in in slot 0x4
30,302,261 UART: [art] Derive Key Pair
30,303,260 UART: [art] Store priv key in slot 0x5
33,596,177 UART: [art] Derive Key Pair - Done
33,609,021 UART: [art] Signing Cert with AUTHO
33,610,336 UART: RITY.KEYID = 7
35,897,793 UART: [art] Erasing AUTHORITY.KEYID = 7
35,899,299 UART: [art] PUB.X = 5459FE202DC966D2EC5BC4000F4E7D48649D0DAA868BEE1AA82CE15764C5EF65EBAE59EA2D936E54EA84E43EEBD0CE60
35,906,558 UART: [art] PUB.Y = 50FAABFC4D534BBA5C460FD5BD00C975A8B15B26F070526A8D71FD17B5D2B5E299666B4E5467F23E9B4A57B2D2020D20
35,913,819 UART: [art] SIG.R = 251952B9646D577CA8119A03CFB8F64213A515FC5BCF3582D957C7D44419D8DD58938B602B45101735D3A3BC59614E9D
35,921,172 UART: [art] SIG.S = 565750BDBA92B91BBFA8479E414751979EE4A15641BF7DE9CCAEA7C5016F9F43DB5F64FF463BCBA6E652BDEFBF9267F2
37,226,412 UART: Caliptra RT
37,227,125 UART: [state] CFI Enabled
37,389,262 UART: [rt] RT listening for mailbox commands...
37,391,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,547,034 UART: [rt]cmd =0x41544d4e, len=14344
41,810,065 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,997 UART:
193,349 UART: Running Caliptra ROM ...
194,545 UART:
604,271 UART: [state] CFI Enabled
616,731 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
620,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,771 UART: [kat] SHA2-256
795,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,077 UART: [kat] ++
806,556 UART: [kat] sha1
818,772 UART: [kat] SHA2-256
821,445 UART: [kat] SHA2-384
826,865 UART: [kat] SHA2-512-ACC
829,226 UART: [kat] ECC-384
3,113,818 UART: [kat] HMAC-384Kdf
3,125,633 UART: [kat] LMS
4,315,742 UART: [kat] --
4,321,381 UART: [cold-reset] ++
4,323,318 UART: [fht] Storing FHT @ 0x50003400
4,334,790 UART: [idev] ++
4,335,347 UART: [idev] CDI.KEYID = 6
4,336,371 UART: [idev] SUBJECT.KEYID = 7
4,337,534 UART: [idev] UDS.KEYID = 0
4,338,597 ready_for_fw is high
4,338,804 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,682 UART: [idev] Erasing UDS.KEYID = 0
7,625,140 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,182 UART: [idev] --
7,650,909 UART: [ldev] ++
7,651,478 UART: [ldev] CDI.KEYID = 6
7,652,410 UART: [ldev] SUBJECT.KEYID = 5
7,653,666 UART: [ldev] AUTHORITY.KEYID = 7
7,654,945 UART: [ldev] FE.KEYID = 1
7,666,701 UART: [ldev] Erasing FE.KEYID = 1
10,956,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,416 UART: [ldev] --
13,317,618 UART: [fwproc] Waiting for Commands...
13,320,519 UART: [fwproc] Received command 0x46574c44
13,322,696 UART: [fwproc] Received Image of size 113760 bytes
22,040,352 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,118,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,187,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,503,895 >>> mbox cmd response: success
22,508,164 UART: [afmc] ++
22,508,754 UART: [afmc] CDI.KEYID = 6
22,509,637 UART: [afmc] SUBJECT.KEYID = 7
22,510,904 UART: [afmc] AUTHORITY.KEYID = 5
25,822,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,114,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,117,154 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,131,747 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,146,480 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,160,695 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,182,776 UART: [afmc] --
28,185,774 UART: [cold-reset] --
28,189,272 UART: [state] Locking Datavault
28,192,680 UART: [state] Locking PCR0, PCR1 and PCR31
28,194,377 UART: [state] Locking ICCM
28,196,070 UART: [exit] Launching FMC @ 0x40000130
28,204,416 UART:
28,204,648 UART: Running Caliptra FMC ...
28,205,747 UART:
28,205,905 UART: [state] CFI Enabled
28,214,214 UART: [fht] FMC Alias Private Key: 7
30,545,202 UART: [art] Extend RT PCRs Done
30,546,423 UART: [art] Lock RT PCRs Done
30,548,397 UART: [art] Populate DV Done
30,553,808 UART: [fht] FMC Alias Private Key: 7
30,555,360 UART: [art] Derive CDI
30,556,125 UART: [art] Store in in slot 0x4
30,598,605 UART: [art] Derive Key Pair
30,599,615 UART: [art] Store priv key in slot 0x5
33,841,370 UART: [art] Derive Key Pair - Done
33,854,419 UART: [art] Signing Cert with AUTHO
33,855,721 UART: RITY.KEYID = 7
36,135,172 UART: [art] Erasing AUTHORITY.KEYID = 7
36,136,677 UART: [art] PUB.X = 95C333CA085221B7FE2290D9E1AAD1369DA408EC89B939ECC8D5E0C2778A03F5A90216E212DEBEB0279BC7C8E17CBBFD
36,143,946 UART: [art] PUB.Y = 4403A0B9ECB1C00F2BB0765CE1182B4E6A978B4F9A0B65D8114CEB6D5502BDBA5669E3D9325B3BF3683E37CF1E0D3305
36,151,186 UART: [art] SIG.R = 69EE850DFE651A32FBF6EAD3C9B317FB4522B874F6AD20C4B8843079E03910B7C39485EB5F8F85992F273DD316C28A88
36,158,569 UART: [art] SIG.S = E0DD348BCF188A3BF70B5037C86726CEB45E4784920FBC383995C98930C683B6971F11489A7D7641CF9C06F5ACC0D104
37,463,784 UART: Caliptra RT
37,464,504 UART: [state] CFI Enabled
37,581,197 UART: [rt] RT listening for mailbox commands...
37,583,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,738,708 UART: [rt]cmd =0x41544d4e, len=14344
41,897,333 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,707 writing to cptra_bootfsm_go
4,126,745 ready_for_fw is high
4,127,130 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,032,862 >>> mbox cmd response: success
27,674,690 UART:
27,675,088 UART: Running Caliptra FMC ...
27,676,296 UART:
27,676,465 UART: [state] CFI Enabled
27,684,620 UART: [fht] FMC Alias Private Key: 7
30,014,901 UART: [art] Extend RT PCRs Done
30,016,134 UART: [art] Lock RT PCRs Done
30,017,951 UART: [art] Populate DV Done
30,023,267 UART: [fht] FMC Alias Private Key: 7
30,024,830 UART: [art] Derive CDI
30,025,596 UART: [art] Store in in slot 0x4
30,067,976 UART: [art] Derive Key Pair
30,068,981 UART: [art] Store priv key in slot 0x5
33,310,871 UART: [art] Derive Key Pair - Done
33,323,871 UART: [art] Signing Cert with AUTHO
33,325,178 UART: RITY.KEYID = 7
35,604,529 UART: [art] Erasing AUTHORITY.KEYID = 7
35,606,042 UART: [art] PUB.X = 258D0DE2633EFA7A7766B44AC91B8F45A2D5A7CE9CFEE01C7DDD0351A30383F9DE81D85794971110EB6087F40D4AB916
35,613,292 UART: [art] PUB.Y = 1D278254D3D88B5FDFC75068539EC930FFDB974A1A3F5447C8EC21E31AAE4E2A858E758B668541E62275A8FF1F940835
35,620,557 UART: [art] SIG.R = 9A3FFDA6DB753E700C6E31BE5C93D452F0667BE2CD40E982FB875238DA94BD5CFA8388379055CB84B499358BA2D6DAC6
35,627,939 UART: [art] SIG.S = AA9DCE34DAC125FE4389E4C94AC365637D7415A4D7844104E5472DA7A9C5BAA48E036EAB4D173D31AC914D5A0F328BC6
36,933,005 UART: Caliptra RT
36,933,711 UART: [state] CFI Enabled
37,051,164 UART: [rt] RT listening for mailbox commands...
37,053,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,208,536 UART: [rt]cmd =0x41544d4e, len=14344
41,341,593 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
192,661 UART:
193,025 UART: Running Caliptra ROM ...
194,132 UART:
194,271 UART: [state] CFI Enabled
265,481 UART: [state] LifecycleState = Unprovisioned
267,687 UART: [state] DebugLocked = No
268,996 UART: [state] WD Timer not started. Device not locked for debugging
272,266 UART: [kat] SHA2-256
451,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,949 UART: [kat] ++
463,468 UART: [kat] sha1
474,556 UART: [kat] SHA2-256
477,635 UART: [kat] SHA2-384
484,403 UART: [kat] SHA2-512-ACC
487,408 UART: [kat] ECC-384
2,948,190 UART: [kat] HMAC-384Kdf
2,971,549 UART: [kat] LMS
3,501,054 UART: [kat] --
3,505,013 UART: [cold-reset] ++
3,506,947 UART: [fht] FHT @ 0x50003400
3,518,839 UART: [idev] ++
3,519,406 UART: [idev] CDI.KEYID = 6
3,520,292 UART: [idev] SUBJECT.KEYID = 7
3,521,532 UART: [idev] UDS.KEYID = 0
3,522,457 ready_for_fw is high
3,522,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,208 UART: [idev] Erasing UDS.KEYID = 0
6,027,288 UART: [idev] Sha1 KeyId Algorithm
6,049,547 UART: [idev] --
6,053,106 UART: [ldev] ++
6,053,683 UART: [ldev] CDI.KEYID = 6
6,054,630 UART: [ldev] SUBJECT.KEYID = 5
6,055,788 UART: [ldev] AUTHORITY.KEYID = 7
6,057,019 UART: [ldev] FE.KEYID = 1
6,098,185 UART: [ldev] Erasing FE.KEYID = 1
8,601,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,905 UART: [ldev] --
10,411,137 UART: [fwproc] Wait for Commands...
10,414,198 UART: [fwproc] Recv command 0x46574c44
10,416,239 UART: [fwproc] Recv'd Img size: 114084 bytes
14,982,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,063,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,131,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,448,913 >>> mbox cmd response: success
15,453,894 UART: [afmc] ++
15,454,487 UART: [afmc] CDI.KEYID = 6
15,455,401 UART: [afmc] SUBJECT.KEYID = 7
15,456,483 UART: [afmc] AUTHORITY.KEYID = 5
17,996,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,719,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,721,287 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,737,252 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,753,198 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,768,946 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,792,832 UART: [afmc] --
19,796,923 UART: [cold-reset] --
19,800,686 UART: [state] Locking Datavault
19,805,557 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,199 UART: [state] Locking ICCM
19,809,150 UART: [exit] Launching FMC @ 0x40000130
19,817,618 UART:
19,817,852 UART: Running Caliptra FMC ...
19,818,946 UART:
19,819,109 UART: [state] CFI Enabled
19,878,885 UART: [fht] FMC Alias Private Key: 7
21,642,801 UART: [art] Extend RT PCRs Done
21,644,004 UART: [art] Lock RT PCRs Done
21,645,302 UART: [art] Populate DV Done
21,650,603 UART: [fht] FMC Alias Private Key: 7
21,652,078 UART: [art] Derive CDI
21,652,839 UART: [art] Store in in slot 0x4
21,711,553 UART: [art] Derive Key Pair
21,712,589 UART: [art] Store priv key in slot 0x5
24,175,247 UART: [art] Derive Key Pair - Done
24,188,414 UART: [art] Signing Cert with AUTHO
24,189,760 UART: RITY.KEYID = 7
25,900,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,902,103 UART: [art] PUB.X = A013612CE1D5E71734DED2DC1925BAE4BCD1A0D02605D74291A36AAEFE6752FF9B61206215C6E7219FE3377724F23340
25,909,331 UART: [art] PUB.Y = 6EF68FF128B894908BD8EDEEF777A36C4DB40F32C8FF3368784567840900151A8B96CE7FEBDD3C5E80F8792B60866CA9
25,916,607 UART: [art] SIG.R = AD3AB595409B0E151DC0BA17174754A98E73B9F7B1AE5159F154A91BAAE5E5D3BE6878AF3D25034F05F8B7973A405359
25,923,987 UART: [art] SIG.S = BB05EDAE238EE1C352D05DADA1BEA359B6EA69D26E308B5A24B08D83219B956E8388EB341DD451765A9860273E89152B
26,902,486 UART: Caliptra RT
26,903,192 UART: [state] CFI Enabled
27,067,606 UART: [rt] RT listening for mailbox commands...
27,069,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,100 UART: [rt]cmd =0x41544d4e, len=14344
29,588,651 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
3,374,999 ready_for_fw is high
3,375,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,031,772 >>> mbox cmd response: success
19,315,665 UART:
19,316,065 UART: Running Caliptra FMC ...
19,317,190 UART:
19,317,350 UART: [state] CFI Enabled
19,384,849 UART: [fht] FMC Alias Private Key: 7
21,148,832 UART: [art] Extend RT PCRs Done
21,150,055 UART: [art] Lock RT PCRs Done
21,151,681 UART: [art] Populate DV Done
21,157,022 UART: [fht] FMC Alias Private Key: 7
21,158,513 UART: [art] Derive CDI
21,159,268 UART: [art] Store in in slot 0x4
21,217,195 UART: [art] Derive Key Pair
21,218,232 UART: [art] Store priv key in slot 0x5
23,680,945 UART: [art] Derive Key Pair - Done
23,693,993 UART: [art] Signing Cert with AUTHO
23,695,297 UART: RITY.KEYID = 7
25,407,981 UART: [art] Erasing AUTHORITY.KEYID = 7
25,409,609 UART: [art] PUB.X = 5FA449D752C3E0983743AA6E3D5B78E440EB2340A5E4C9D825A1FB203509D843AF052B217828382B6F969E6F4FA89225
25,416,702 UART: [art] PUB.Y = 4DE53C4988E61E2F0DAB803B3040B598DE6A91E2F081EEE4A29EE6E0CB06F60899465BA3CFBC9456C53F3E0C28A817F9
25,423,984 UART: [art] SIG.R = B09F4A07D711170A5DA572011E505E43992F7415AD49A2D6EBE171621E66B0B35BA8AF9387A33EA8C2B385F3C98D91A7
25,431,368 UART: [art] SIG.S = DC5E21FB2749138327D819CF9375AC584FA05BE656BD5470548389D1542CEDF771C2280E4DC6AC9C3415EA09E5D8A8E9
26,410,386 UART: Caliptra RT
26,411,085 UART: [state] CFI Enabled
26,574,993 UART: [rt] RT listening for mailbox commands...
26,577,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,732,529 UART: [rt]cmd =0x41544d4e, len=14344
29,091,061 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,893 writing to cptra_bootfsm_go
193,131 UART:
193,484 UART: Running Caliptra ROM ...
194,686 UART:
604,428 UART: [state] CFI Enabled
619,917 UART: [state] LifecycleState = Unprovisioned
621,753 UART: [state] DebugLocked = No
624,699 UART: [state] WD Timer not started. Device not locked for debugging
628,099 UART: [kat] SHA2-256
807,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,809 UART: [kat] ++
819,264 UART: [kat] sha1
831,058 UART: [kat] SHA2-256
834,147 UART: [kat] SHA2-384
839,072 UART: [kat] SHA2-512-ACC
842,014 UART: [kat] ECC-384
3,284,980 UART: [kat] HMAC-384Kdf
3,296,524 UART: [kat] LMS
3,826,031 UART: [kat] --
3,829,898 UART: [cold-reset] ++
3,831,479 UART: [fht] FHT @ 0x50003400
3,842,910 UART: [idev] ++
3,843,480 UART: [idev] CDI.KEYID = 6
3,844,405 UART: [idev] SUBJECT.KEYID = 7
3,845,575 UART: [idev] UDS.KEYID = 0
3,846,496 ready_for_fw is high
3,846,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,057 UART: [idev] Erasing UDS.KEYID = 0
6,319,183 UART: [idev] Sha1 KeyId Algorithm
6,341,662 UART: [idev] --
6,347,055 UART: [ldev] ++
6,347,639 UART: [ldev] CDI.KEYID = 6
6,348,548 UART: [ldev] SUBJECT.KEYID = 5
6,349,765 UART: [ldev] AUTHORITY.KEYID = 7
6,351,003 UART: [ldev] FE.KEYID = 1
6,361,117 UART: [ldev] Erasing FE.KEYID = 1
8,839,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,084 UART: [ldev] --
10,633,399 UART: [fwproc] Wait for Commands...
10,635,174 UART: [fwproc] Recv command 0x46574c44
10,637,269 UART: [fwproc] Recv'd Img size: 114084 bytes
15,214,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,290,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,359,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,675,590 >>> mbox cmd response: success
15,680,650 UART: [afmc] ++
15,681,254 UART: [afmc] CDI.KEYID = 6
15,682,171 UART: [afmc] SUBJECT.KEYID = 7
15,683,341 UART: [afmc] AUTHORITY.KEYID = 5
18,184,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,904,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,906,319 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,922,280 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,938,230 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,954,023 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,977,205 UART: [afmc] --
19,980,353 UART: [cold-reset] --
19,983,800 UART: [state] Locking Datavault
19,989,748 UART: [state] Locking PCR0, PCR1 and PCR31
19,991,453 UART: [state] Locking ICCM
19,992,690 UART: [exit] Launching FMC @ 0x40000130
20,001,143 UART:
20,001,395 UART: Running Caliptra FMC ...
20,002,505 UART:
20,002,672 UART: [state] CFI Enabled
20,011,015 UART: [fht] FMC Alias Private Key: 7
21,767,050 UART: [art] Extend RT PCRs Done
21,768,285 UART: [art] Lock RT PCRs Done
21,769,967 UART: [art] Populate DV Done
21,775,228 UART: [fht] FMC Alias Private Key: 7
21,776,771 UART: [art] Derive CDI
21,777,591 UART: [art] Store in in slot 0x4
21,820,406 UART: [art] Derive Key Pair
21,821,443 UART: [art] Store priv key in slot 0x5
24,248,208 UART: [art] Derive Key Pair - Done
24,261,145 UART: [art] Signing Cert with AUTHO
24,262,454 UART: RITY.KEYID = 7
25,968,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,969,563 UART: [art] PUB.X = A030D0DCE3D1841D20463A1B081D2CA29A3B1CA4280160369E1A3164E48E1D1A6F757F04535C6F854676802DC08F6400
25,976,818 UART: [art] PUB.Y = B549121E1117B0EB101D204950CAA821D3258CC0321C328393E1EB382CBBC8B42CAB5AF238C2F2A92DE1F158D84840A4
25,984,040 UART: [art] SIG.R = 40BC35E21D4ECA4F94B114F99672D5A745BCBB11B3E96AA3FD75F333740DC2A97F6252A04A26E506C60BF6AF8C4DD917
25,991,489 UART: [art] SIG.S = DE4F7FF4A741ED85A9DFA118758F829375CF9DDC88C132BE552FFDCE8A41208F1C094909FA1172CB3419AED99F46F70E
26,970,600 UART: Caliptra RT
26,971,294 UART: [state] CFI Enabled
27,087,858 UART: [rt] RT listening for mailbox commands...
27,090,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,245,771 UART: [rt]cmd =0x41544d4e, len=14344
29,608,536 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
3,699,275 ready_for_fw is high
3,699,896 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,225,965 >>> mbox cmd response: success
19,478,139 UART:
19,478,550 UART: Running Caliptra FMC ...
19,479,753 UART:
19,479,924 UART: [state] CFI Enabled
19,487,718 UART: [fht] FMC Alias Private Key: 7
21,244,734 UART: [art] Extend RT PCRs Done
21,245,964 UART: [art] Lock RT PCRs Done
21,247,770 UART: [art] Populate DV Done
21,253,335 UART: [fht] FMC Alias Private Key: 7
21,254,988 UART: [art] Derive CDI
21,255,810 UART: [art] Store in in slot 0x4
21,298,679 UART: [art] Derive Key Pair
21,299,684 UART: [art] Store priv key in slot 0x5
23,726,653 UART: [art] Derive Key Pair - Done
23,739,570 UART: [art] Signing Cert with AUTHO
23,740,891 UART: RITY.KEYID = 7
25,446,366 UART: [art] Erasing AUTHORITY.KEYID = 7
25,447,881 UART: [art] PUB.X = 1862825C909F59385B714421E12E8AB1692280A2476CAC109B52E54E7237E9A557F04B4387F1961C1AB6BD5538E45FB1
25,455,106 UART: [art] PUB.Y = 339CFF13F069E985973A6C466BB1502B9EC01894D8B2A560C35CCB26236B247EEFC5F4E707990878E33D3346FF73BD24
25,462,355 UART: [art] SIG.R = AE40A82AC17F1C0E4825C37AACD201AFF57005F063295C20AE36E13B0E616F3886DE9170D939BDA622715E155F19BC35
25,469,779 UART: [art] SIG.S = 0847B03FF851636C79CEA47997B48D59F342DBDD8D581885E87C8A0CFB933F7EF22A806309353A0A408E52FD333DAB69
26,448,952 UART: Caliptra RT
26,449,658 UART: [state] CFI Enabled
26,566,722 UART: [rt] RT listening for mailbox commands...
26,569,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,724,112 UART: [rt]cmd =0x41544d4e, len=14344
29,079,822 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
192,675 UART:
193,029 UART: Running Caliptra ROM ...
194,220 UART:
194,369 UART: [state] CFI Enabled
263,559 UART: [state] LifecycleState = Unprovisioned
265,995 UART: [state] DebugLocked = No
268,378 UART: [state] WD Timer not started. Device not locked for debugging
273,567 UART: [kat] SHA2-256
463,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,223 UART: [kat] ++
474,754 UART: [kat] sha1
486,856 UART: [kat] SHA2-256
489,861 UART: [kat] SHA2-384
495,843 UART: [kat] SHA2-512-ACC
498,431 UART: [kat] ECC-384
2,948,277 UART: [kat] HMAC-384Kdf
2,970,095 UART: [kat] LMS
3,501,905 UART: [kat] --
3,507,956 UART: [cold-reset] ++
3,510,163 UART: [fht] FHT @ 0x50003400
3,522,982 UART: [idev] ++
3,523,681 UART: [idev] CDI.KEYID = 6
3,524,628 UART: [idev] SUBJECT.KEYID = 7
3,525,866 UART: [idev] UDS.KEYID = 0
3,526,757 ready_for_fw is high
3,526,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,521 UART: [idev] Erasing UDS.KEYID = 0
6,028,466 UART: [idev] Sha1 KeyId Algorithm
6,050,614 UART: [idev] --
6,055,798 UART: [ldev] ++
6,056,474 UART: [ldev] CDI.KEYID = 6
6,057,355 UART: [ldev] SUBJECT.KEYID = 5
6,058,564 UART: [ldev] AUTHORITY.KEYID = 7
6,060,075 UART: [ldev] FE.KEYID = 1
6,096,796 UART: [ldev] Erasing FE.KEYID = 1
8,603,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,705 UART: [ldev] --
10,411,859 UART: [fwproc] Wait for Commands...
10,415,087 UART: [fwproc] Recv command 0x46574c44
10,417,412 UART: [fwproc] Recv'd Img size: 114084 bytes
15,043,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,119,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,235,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,777,489 >>> mbox cmd response: success
15,781,536 UART: [afmc] ++
15,782,244 UART: [afmc] CDI.KEYID = 6
15,783,357 UART: [afmc] SUBJECT.KEYID = 7
15,784,908 UART: [afmc] AUTHORITY.KEYID = 5
18,316,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,041,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,042,971 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,058,017 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,073,244 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,088,060 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,111,025 UART: [afmc] --
20,114,636 UART: [cold-reset] --
20,119,204 UART: [state] Locking Datavault
20,123,604 UART: [state] Locking PCR0, PCR1 and PCR31
20,125,816 UART: [state] Locking ICCM
20,126,967 UART: [exit] Launching FMC @ 0x40000130
20,135,649 UART:
20,135,878 UART: Running Caliptra FMC ...
20,136,975 UART:
20,137,129 UART: [state] CFI Enabled
20,197,118 UART: [fht] FMC Alias Private Key: 7
21,961,237 UART: [art] Extend RT PCRs Done
21,962,453 UART: [art] Lock RT PCRs Done
21,964,322 UART: [art] Populate DV Done
21,969,735 UART: [fht] FMC Alias Private Key: 7
21,971,333 UART: [art] Derive CDI
21,972,147 UART: [art] Store in in slot 0x4
22,030,558 UART: [art] Derive Key Pair
22,031,597 UART: [art] Store priv key in slot 0x5
24,494,818 UART: [art] Derive Key Pair - Done
24,508,138 UART: [art] Signing Cert with AUTHO
24,509,445 UART: RITY.KEYID = 7
26,220,665 UART: [art] Erasing AUTHORITY.KEYID = 7
26,222,173 UART: [art] PUB.X = 54EA2A07FAC5B32D0277202E53B023A6E5EBB108B31E62E765EABEEFCBD783FBC6C17C946052EE55969DF9AA4F6B169F
26,229,461 UART: [art] PUB.Y = 8D7B869FD6E9F2E449EBE047A1C5A35AC999E38CFE495CFF533F808302720BCB4A8C2470A3484681FBC2D47C8661E3EB
26,236,719 UART: [art] SIG.R = F39F09BBF4CADF95EB345CDA6B295BA3907F8D0A3FA0FB45DAFF583776AB5228C3D09F93E5FB5FE043B24FA68D7BED46
26,244,144 UART: [art] SIG.S = 733F2295A5B2D3ECA2615CD9B07FDA9CA268196203DF915AA6267E8090C0C31DC496D4F4DD4BB47C29A610E83D56E6C3
27,223,428 UART: Caliptra RT
27,224,141 UART: [state] CFI Enabled
27,387,533 UART: [rt] RT listening for mailbox commands...
27,389,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,545,010 UART: [rt]cmd =0x41544d4e, len=14344
29,915,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,436,369 ready_for_fw is high
3,436,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,816,673 >>> mbox cmd response: success
20,119,062 UART:
20,119,470 UART: Running Caliptra FMC ...
20,120,625 UART:
20,120,786 UART: [state] CFI Enabled
20,185,328 UART: [fht] FMC Alias Private Key: 7
21,948,839 UART: [art] Extend RT PCRs Done
21,950,049 UART: [art] Lock RT PCRs Done
21,951,621 UART: [art] Populate DV Done
21,956,712 UART: [fht] FMC Alias Private Key: 7
21,958,413 UART: [art] Derive CDI
21,959,227 UART: [art] Store in in slot 0x4
22,017,568 UART: [art] Derive Key Pair
22,018,611 UART: [art] Store priv key in slot 0x5
24,481,352 UART: [art] Derive Key Pair - Done
24,494,522 UART: [art] Signing Cert with AUTHO
24,495,861 UART: RITY.KEYID = 7
26,207,509 UART: [art] Erasing AUTHORITY.KEYID = 7
26,209,005 UART: [art] PUB.X = A087BDB68BB4091FB9FEBF2770DB609CABFA0D74BE282765CBC89D4B429F8D3760F6E40844EEE78C9D2DB083368565AE
26,216,311 UART: [art] PUB.Y = A8444011C63EE6A0C196EF3A22A72FACDFA7053C0719E5FC6EFA70B3494D5E38E390F69C160CAED5730BA15F369EB5A2
26,223,611 UART: [art] SIG.R = 0205871DFF954247E0A1485A8FD548744063CA2D77AB70E321121795603384C1020EE0498E2EB2BFB8930F1B34625A1B
26,230,974 UART: [art] SIG.S = 06EE22707BE89DA976D876D97373343D1BBE2B3E7E5307983BCD7DFC9B2677C3A97EC3D2B8033FF332275EB6C72000D4
27,209,626 UART: Caliptra RT
27,210,339 UART: [state] CFI Enabled
27,375,254 UART: [rt] RT listening for mailbox commands...
27,377,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,532,788 UART: [rt]cmd =0x41544d4e, len=14344
29,895,721 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
192,990 UART:
193,380 UART: Running Caliptra ROM ...
194,497 UART:
604,208 UART: [state] CFI Enabled
618,305 UART: [state] LifecycleState = Unprovisioned
620,694 UART: [state] DebugLocked = No
622,000 UART: [state] WD Timer not started. Device not locked for debugging
627,252 UART: [kat] SHA2-256
817,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,910 UART: [kat] ++
828,434 UART: [kat] sha1
839,895 UART: [kat] SHA2-256
842,879 UART: [kat] SHA2-384
847,955 UART: [kat] SHA2-512-ACC
850,539 UART: [kat] ECC-384
3,296,877 UART: [kat] HMAC-384Kdf
3,310,141 UART: [kat] LMS
3,841,971 UART: [kat] --
3,847,253 UART: [cold-reset] ++
3,848,618 UART: [fht] FHT @ 0x50003400
3,859,457 UART: [idev] ++
3,860,162 UART: [idev] CDI.KEYID = 6
3,861,044 UART: [idev] SUBJECT.KEYID = 7
3,862,241 UART: [idev] UDS.KEYID = 0
3,863,224 ready_for_fw is high
3,863,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,705 UART: [idev] Erasing UDS.KEYID = 0
6,337,563 UART: [idev] Sha1 KeyId Algorithm
6,359,863 UART: [idev] --
6,365,343 UART: [ldev] ++
6,366,029 UART: [ldev] CDI.KEYID = 6
6,366,943 UART: [ldev] SUBJECT.KEYID = 5
6,368,175 UART: [ldev] AUTHORITY.KEYID = 7
6,369,356 UART: [ldev] FE.KEYID = 1
6,381,350 UART: [ldev] Erasing FE.KEYID = 1
8,858,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,383 UART: [ldev] --
10,650,565 UART: [fwproc] Wait for Commands...
10,653,626 UART: [fwproc] Recv command 0x46574c44
10,655,939 UART: [fwproc] Recv'd Img size: 114084 bytes
15,267,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,344,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,460,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,001,090 >>> mbox cmd response: success
16,005,177 UART: [afmc] ++
16,005,894 UART: [afmc] CDI.KEYID = 6
16,007,091 UART: [afmc] SUBJECT.KEYID = 7
16,008,539 UART: [afmc] AUTHORITY.KEYID = 5
18,509,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,232,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,234,365 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,249,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,264,611 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,279,491 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,303,942 UART: [afmc] --
20,308,038 UART: [cold-reset] --
20,311,801 UART: [state] Locking Datavault
20,316,091 UART: [state] Locking PCR0, PCR1 and PCR31
20,318,244 UART: [state] Locking ICCM
20,320,857 UART: [exit] Launching FMC @ 0x40000130
20,329,514 UART:
20,329,756 UART: Running Caliptra FMC ...
20,330,781 UART:
20,330,930 UART: [state] CFI Enabled
20,339,465 UART: [fht] FMC Alias Private Key: 7
22,096,386 UART: [art] Extend RT PCRs Done
22,097,613 UART: [art] Lock RT PCRs Done
22,099,116 UART: [art] Populate DV Done
22,104,535 UART: [fht] FMC Alias Private Key: 7
22,106,083 UART: [art] Derive CDI
22,106,819 UART: [art] Store in in slot 0x4
22,149,198 UART: [art] Derive Key Pair
22,150,242 UART: [art] Store priv key in slot 0x5
24,576,641 UART: [art] Derive Key Pair - Done
24,589,312 UART: [art] Signing Cert with AUTHO
24,590,807 UART: RITY.KEYID = 7
26,296,159 UART: [art] Erasing AUTHORITY.KEYID = 7
26,297,666 UART: [art] PUB.X = 91C34EF447C5687D692ACBA57414AD83CF6D123263579AC27ECB59C92EB8ED4DD651611EAFDA28B48C90AD1117569906
26,304,948 UART: [art] PUB.Y = B22DDBE37EDCE6170D85E52571F8D15F94CCF39DF55B24D86D3F00E68174B3D119D85E1BFB6AA39406864A8AF64B823F
26,312,208 UART: [art] SIG.R = FB8B4DB429A0632E493077B22BC1738A2D182E72BD7BCFCD346C0DCC48DDCFE773016FCD318035B5AE58F0B4E6E538E6
26,319,580 UART: [art] SIG.S = EEBA1D04D2CA400E6655AE098A8ECF9161B301A3F8CA93173E3A5F6FBE7541CFD765F938BE3068E00CAAE2CE854025EE
27,297,878 UART: Caliptra RT
27,298,568 UART: [state] CFI Enabled
27,415,181 UART: [rt] RT listening for mailbox commands...
27,417,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,653 UART: [rt]cmd =0x41544d4e, len=14344
29,932,535 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,854 writing to cptra_bootfsm_go
3,755,150 ready_for_fw is high
3,755,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,064,457 >>> mbox cmd response: success
20,318,420 UART:
20,318,812 UART: Running Caliptra FMC ...
20,320,016 UART:
20,320,192 UART: [state] CFI Enabled
20,327,985 UART: [fht] FMC Alias Private Key: 7
22,084,791 UART: [art] Extend RT PCRs Done
22,086,005 UART: [art] Lock RT PCRs Done
22,087,644 UART: [art] Populate DV Done
22,093,221 UART: [fht] FMC Alias Private Key: 7
22,094,738 UART: [art] Derive CDI
22,095,523 UART: [art] Store in in slot 0x4
22,137,811 UART: [art] Derive Key Pair
22,138,819 UART: [art] Store priv key in slot 0x5
24,565,903 UART: [art] Derive Key Pair - Done
24,579,062 UART: [art] Signing Cert with AUTHO
24,580,400 UART: RITY.KEYID = 7
26,285,524 UART: [art] Erasing AUTHORITY.KEYID = 7
26,287,029 UART: [art] PUB.X = 650303DEAA6309334EB9370A17DE8AE1FE118B416A1A107C0810C6C1FBDB8AB7207F9505D9CC5D5BF397964F9846C4B7
26,294,285 UART: [art] PUB.Y = EE486DFC63296735EE20CF1662B86150D67EF9AF31F3F024CD6890A91DE6D64946288D21FA3DAA0EA165522D65679B61
26,301,540 UART: [art] SIG.R = E2EC513C62382130594AD2D0A8DE80115BDC1E78624E2A0B08BE51A869A8F80385F2555FBC18F5DA2086B835C2EC159F
26,308,926 UART: [art] SIG.S = 491FCD36C816AC35F67868E1F3B35A0F4B15F6B268E99E45A9D747E1D0C6FB228DB5BE45140FA737ECF2C4E3F08B098B
27,288,104 UART: Caliptra RT
27,288,794 UART: [state] CFI Enabled
27,406,067 UART: [rt] RT listening for mailbox commands...
27,408,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,563,455 UART: [rt]cmd =0x41544d4e, len=14344
29,922,300 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,385 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,722 UART: [kat] HMAC-384Kdf
907,266 UART: [kat] LMS
1,475,462 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,506 UART: [idev] ++
1,479,674 UART: [idev] CDI.KEYID = 6
1,480,034 UART: [idev] SUBJECT.KEYID = 7
1,480,458 UART: [idev] UDS.KEYID = 0
1,480,803 ready_for_fw is high
1,480,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,512 UART: [idev] Erasing UDS.KEYID = 0
1,504,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,242 UART: [idev] --
1,514,253 UART: [ldev] ++
1,514,421 UART: [ldev] CDI.KEYID = 6
1,514,784 UART: [ldev] SUBJECT.KEYID = 5
1,515,210 UART: [ldev] AUTHORITY.KEYID = 7
1,515,673 UART: [ldev] FE.KEYID = 1
1,520,773 UART: [ldev] Erasing FE.KEYID = 1
1,546,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,256 UART: [ldev] --
1,585,567 UART: [fwproc] Waiting for Commands...
1,586,328 UART: [fwproc] Received command 0x46574c44
1,587,119 UART: [fwproc] Received Image of size 114084 bytes
5,381,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,410,041 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,439,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,574,922 >>> mbox cmd response: success
5,576,162 UART: [afmc] ++
5,576,330 UART: [afmc] CDI.KEYID = 6
5,576,692 UART: [afmc] SUBJECT.KEYID = 7
5,577,117 UART: [afmc] AUTHORITY.KEYID = 5
5,612,289 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,628,351 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,629,131 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,634,840 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,640,732 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,646,433 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,654,361 UART: [afmc] --
5,655,469 UART: [cold-reset] --
5,656,227 UART: [state] Locking Datavault
5,657,180 UART: [state] Locking PCR0, PCR1 and PCR31
5,657,784 UART: [state] Locking ICCM
5,658,306 UART: [exit] Launching FMC @ 0x40000130
5,663,635 UART:
5,663,651 UART: Running Caliptra FMC ...
5,664,059 UART:
5,664,113 UART: [state] CFI Enabled
5,674,673 UART: [fht] FMC Alias Private Key: 7
5,781,977 UART: [art] Extend RT PCRs Done
5,782,405 UART: [art] Lock RT PCRs Done
5,783,885 UART: [art] Populate DV Done
5,792,117 UART: [fht] FMC Alias Private Key: 7
5,793,215 UART: [art] Derive CDI
5,793,495 UART: [art] Store in in slot 0x4
5,878,548 UART: [art] Derive Key Pair
5,878,908 UART: [art] Store priv key in slot 0x5
5,892,014 UART: [art] Derive Key Pair - Done
5,906,763 UART: [art] Signing Cert with AUTHO
5,907,243 UART: RITY.KEYID = 7
5,922,411 UART: [art] Erasing AUTHORITY.KEYID = 7
5,923,176 UART: [art] PUB.X = 4334DEB9D7E26681CE66D423C659C0518CA1E0EEC0EEB5E0A82EAC5DF5B811E6981594C8CD58582E54A4505406C4A805
5,929,948 UART: [art] PUB.Y = 559AECC4404078D243E647CF1DA199A28534A92583DDB7EDD094F79F41885365B19E7F95DB188AB2118C0DCB880874BD
5,936,896 UART: [art] SIG.R = F6C9C61213C0772BCC2F141F5167B4091E3385F10CF464A21B826F474F0FC862B1C3162FB3A6A5044615BDB78C6AA025
5,943,656 UART: [art] SIG.S = 04B810FF0EE41730D2F216BA5F6C4A4F6D381E720CD0677CC59FB4699032A9335A332DB59EAD8293B0F3670CDABEF771
5,968,015 UART: Caliptra RT
5,968,268 UART: [state] CFI Enabled
6,076,095 UART: [rt] RT listening for mailbox commands...
6,076,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,199,807 UART: [rt]cmd =0x41544d4e, len=14344
6,758,127 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,929 ready_for_fw is high
1,362,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,198,038 >>> mbox cmd response: success
5,259,153 UART:
5,259,169 UART: Running Caliptra FMC ...
5,259,577 UART:
5,259,631 UART: [state] CFI Enabled
5,269,819 UART: [fht] FMC Alias Private Key: 7
5,377,841 UART: [art] Extend RT PCRs Done
5,378,269 UART: [art] Lock RT PCRs Done
5,379,567 UART: [art] Populate DV Done
5,387,859 UART: [fht] FMC Alias Private Key: 7
5,388,901 UART: [art] Derive CDI
5,389,181 UART: [art] Store in in slot 0x4
5,474,586 UART: [art] Derive Key Pair
5,474,946 UART: [art] Store priv key in slot 0x5
5,488,284 UART: [art] Derive Key Pair - Done
5,503,036 UART: [art] Signing Cert with AUTHO
5,503,516 UART: RITY.KEYID = 7
5,518,776 UART: [art] Erasing AUTHORITY.KEYID = 7
5,519,541 UART: [art] PUB.X = 98D7AF36CAE62C14153A806F28A6629EB409487CED867D7ABD132A78EA7AFCA4E14CA3DDAD7D4BC03363EA8AE3E92DC8
5,526,332 UART: [art] PUB.Y = E44B9AA25B0E286E861E1A98DA9DE41AF5668671072DE8F71C6FE0C87D1B173F36DBE1F48C69638F8CAF7A4D9764FA28
5,533,290 UART: [art] SIG.R = FAFDC69E9E2DA43F8BEA780376056E33B0935A84F6089C2699524F1CD6F32902AAB02922EC47287D507CEC4EF58803CE
5,540,053 UART: [art] SIG.S = ECA0239B54A2CCC3124BF228692057E56336EDE58A23751ADC9393B33825FEA13F1151714A74578953A700BFFC23C5BE
5,563,554 UART: Caliptra RT
5,563,807 UART: [state] CFI Enabled
5,672,601 UART: [rt] RT listening for mailbox commands...
5,673,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,281 UART: [rt]cmd =0x41544d4e, len=14344
6,356,816 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
890,952 UART: [kat] SHA2-256
892,890 UART: [kat] SHA2-384
895,725 UART: [kat] SHA2-512-ACC
897,626 UART: [kat] ECC-384
903,345 UART: [kat] HMAC-384Kdf
907,815 UART: [kat] LMS
1,476,011 UART: [kat] --
1,476,732 UART: [cold-reset] ++
1,477,312 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 ready_for_fw is high
1,481,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,935 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,533 UART: [idev] --
1,515,556 UART: [ldev] ++
1,515,724 UART: [ldev] CDI.KEYID = 6
1,516,087 UART: [ldev] SUBJECT.KEYID = 5
1,516,513 UART: [ldev] AUTHORITY.KEYID = 7
1,516,976 UART: [ldev] FE.KEYID = 1
1,522,280 UART: [ldev] Erasing FE.KEYID = 1
1,548,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,147 UART: [ldev] --
1,587,434 UART: [fwproc] Waiting for Commands...
1,588,129 UART: [fwproc] Received command 0x46574c44
1,588,920 UART: [fwproc] Received Image of size 114084 bytes
5,081,030 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,139,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,274,941 >>> mbox cmd response: success
5,275,955 UART: [afmc] ++
5,276,123 UART: [afmc] CDI.KEYID = 6
5,276,485 UART: [afmc] SUBJECT.KEYID = 7
5,276,910 UART: [afmc] AUTHORITY.KEYID = 5
5,311,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,616 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,396 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,105 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,997 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,698 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,610 UART: [afmc] --
5,355,566 UART: [cold-reset] --
5,356,330 UART: [state] Locking Datavault
5,357,251 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,855 UART: [state] Locking ICCM
5,358,399 UART: [exit] Launching FMC @ 0x40000130
5,363,728 UART:
5,363,744 UART: Running Caliptra FMC ...
5,364,152 UART:
5,364,295 UART: [state] CFI Enabled
5,374,813 UART: [fht] FMC Alias Private Key: 7
5,482,635 UART: [art] Extend RT PCRs Done
5,483,063 UART: [art] Lock RT PCRs Done
5,484,865 UART: [art] Populate DV Done
5,493,261 UART: [fht] FMC Alias Private Key: 7
5,494,337 UART: [art] Derive CDI
5,494,617 UART: [art] Store in in slot 0x4
5,580,746 UART: [art] Derive Key Pair
5,581,106 UART: [art] Store priv key in slot 0x5
5,594,078 UART: [art] Derive Key Pair - Done
5,608,626 UART: [art] Signing Cert with AUTHO
5,609,106 UART: RITY.KEYID = 7
5,624,218 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,983 UART: [art] PUB.X = 9539C6A5CD918882E3D193C68C3491B0452E4786EBEB7CB9600F3B2FE81A0D71A08FBD41C6C2D66D8BC51177CC4D5402
5,631,752 UART: [art] PUB.Y = 8DDB5ACA9A349EDBED3C46D400FBE5B183AD677F38587C743C1C75196652F84C71C60FA7EEAF0333D8AA66DF6375D2E3
5,638,692 UART: [art] SIG.R = 6506FC3A63E08ED0C54808AE3C63D0947C04CA3931B4FCA896F82CB2479E3CE10E4BBAA129829761FC8F51CB7B9857F2
5,645,460 UART: [art] SIG.S = 1289F935263B4ED109F7A234E20445E2E2AF2897BC9000B167FDA84A5D2DC1D878A26D4766C20B774238595A6150A359
5,668,730 UART: Caliptra RT
5,669,075 UART: [state] CFI Enabled
5,777,437 UART: [rt] RT listening for mailbox commands...
5,778,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,949 UART: [rt]cmd =0x41544d4e, len=14344
6,464,017 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,238,120 >>> mbox cmd response: success
5,300,393 UART:
5,300,409 UART: Running Caliptra FMC ...
5,300,817 UART:
5,300,960 UART: [state] CFI Enabled
5,311,810 UART: [fht] FMC Alias Private Key: 7
5,419,914 UART: [art] Extend RT PCRs Done
5,420,342 UART: [art] Lock RT PCRs Done
5,421,762 UART: [art] Populate DV Done
5,429,904 UART: [fht] FMC Alias Private Key: 7
5,430,986 UART: [art] Derive CDI
5,431,266 UART: [art] Store in in slot 0x4
5,517,175 UART: [art] Derive Key Pair
5,517,535 UART: [art] Store priv key in slot 0x5
5,531,075 UART: [art] Derive Key Pair - Done
5,546,148 UART: [art] Signing Cert with AUTHO
5,546,628 UART: RITY.KEYID = 7
5,561,982 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,747 UART: [art] PUB.X = 22BF01FE72CDE50041F19C887DF3840FCADCE3538281C91BBEDEFC83FE27219B416A88549CFA12AE62F12D603E4D9E96
5,569,505 UART: [art] PUB.Y = C72C0CA386A37B29D007ADE295411498D0BAB5055E658FC98811040826A67A5464A36428144440407CF01A556A23FBC5
5,576,432 UART: [art] SIG.R = 3B5EB238F5198416E2C96EB2E96A6E0F809B67389A74D62BF4A5EE80BACCDA67DED73E75AA45D55B735F7E49F06BAAA5
5,583,219 UART: [art] SIG.S = 84B7E1F8878E5B04AD2A6DBF43634E8DCFFA4BC5E38BEC4305A826D140B886B208352E88FF745DE9C6E2AFEDF6559EB7
5,606,771 UART: Caliptra RT
5,607,116 UART: [state] CFI Enabled
5,715,765 UART: [rt] RT listening for mailbox commands...
5,716,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,371 UART: [rt]cmd =0x41544d4e, len=14344
6,392,613 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,216 UART: [kat] SHA2-512-ACC
908,117 UART: [kat] ECC-384
918,200 UART: [kat] HMAC-384Kdf
922,898 UART: [kat] LMS
1,171,226 UART: [kat] --
1,171,875 UART: [cold-reset] ++
1,172,265 UART: [fht] FHT @ 0x50003400
1,174,902 UART: [idev] ++
1,175,070 UART: [idev] CDI.KEYID = 6
1,175,430 UART: [idev] SUBJECT.KEYID = 7
1,175,854 UART: [idev] UDS.KEYID = 0
1,176,199 ready_for_fw is high
1,176,199 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,610 UART: [idev] Erasing UDS.KEYID = 0
1,200,909 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,605 UART: [ldev] ++
1,210,773 UART: [ldev] CDI.KEYID = 6
1,211,136 UART: [ldev] SUBJECT.KEYID = 5
1,211,562 UART: [ldev] AUTHORITY.KEYID = 7
1,212,025 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,002 UART: [fwproc] Recv'd Img size: 114084 bytes
3,112,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,860 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,305,245 >>> mbox cmd response: success
3,306,387 UART: [afmc] ++
3,306,555 UART: [afmc] CDI.KEYID = 6
3,306,917 UART: [afmc] SUBJECT.KEYID = 7
3,307,342 UART: [afmc] AUTHORITY.KEYID = 5
3,342,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,358,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,359,741 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,450 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,342 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,053 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,042 UART: [afmc] --
3,386,030 UART: [cold-reset] --
3,386,950 UART: [state] Locking Datavault
3,388,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,659 UART: [state] Locking ICCM
3,389,189 UART: [exit] Launching FMC @ 0x40000130
3,394,518 UART:
3,394,534 UART: Running Caliptra FMC ...
3,394,942 UART:
3,394,996 UART: [state] CFI Enabled
3,405,768 UART: [fht] FMC Alias Private Key: 7
3,513,184 UART: [art] Extend RT PCRs Done
3,513,612 UART: [art] Lock RT PCRs Done
3,515,226 UART: [art] Populate DV Done
3,523,554 UART: [fht] FMC Alias Private Key: 7
3,524,668 UART: [art] Derive CDI
3,524,948 UART: [art] Store in in slot 0x4
3,610,577 UART: [art] Derive Key Pair
3,610,937 UART: [art] Store priv key in slot 0x5
3,624,045 UART: [art] Derive Key Pair - Done
3,638,635 UART: [art] Signing Cert with AUTHO
3,639,115 UART: RITY.KEYID = 7
3,654,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,314 UART: [art] PUB.X = 5C5F965BCB9781F874D41BC70563BCD9451D562904CE4F9435022DEAB8BD4057B17BD13C03184C95AB644FCBBB70EE20
3,662,082 UART: [art] PUB.Y = 674B94B63067A881BF72253D3943C206C1FF3DED9895FA9489AABBBF7C0D1F92504BD38B9969B61F6371F3E9B1796BAF
3,669,034 UART: [art] SIG.R = 235451300B0E5914ACC3A9C18A9D270962B316205CE0E5EA8D05B447820D384526605C66300DC816F5345A38E648975D
3,675,774 UART: [art] SIG.S = A83736A5E5BEDA921A9E49E1801AEF653F31D92339CC117FB112C5DF4629814C83588B364040A86E2ED300FDD2C0A702
3,699,188 UART: Caliptra RT
3,699,441 UART: [state] CFI Enabled
3,807,567 UART: [rt] RT listening for mailbox commands...
3,808,237 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,221 UART: [rt]cmd =0x41544d4e, len=14344
4,494,211 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,823 >>> mbox cmd response: success
3,222,922 UART:
3,222,938 UART: Running Caliptra FMC ...
3,223,346 UART:
3,223,400 UART: [state] CFI Enabled
3,233,832 UART: [fht] FMC Alias Private Key: 7
3,341,322 UART: [art] Extend RT PCRs Done
3,341,750 UART: [art] Lock RT PCRs Done
3,343,028 UART: [art] Populate DV Done
3,350,948 UART: [fht] FMC Alias Private Key: 7
3,352,014 UART: [art] Derive CDI
3,352,294 UART: [art] Store in in slot 0x4
3,437,981 UART: [art] Derive Key Pair
3,438,341 UART: [art] Store priv key in slot 0x5
3,451,913 UART: [art] Derive Key Pair - Done
3,466,593 UART: [art] Signing Cert with AUTHO
3,467,073 UART: RITY.KEYID = 7
3,481,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,608 UART: [art] PUB.X = C518CDCC91258E08281980BEF24B892A6D8EC5BE62AAAC539A98A46F082AFF0B56A102B70B5E349EB9F67C18771FE8D9
3,489,377 UART: [art] PUB.Y = ED1F74227B448A0B449F34E80D037FC1F349A53C44C079EDFD3E880F135ED10BC600960307077449D0A80C4AADB5439A
3,496,282 UART: [art] SIG.R = 115AB3CC39DBAEDBE2008CFF9EB736DB7B9211D02671BF8BF61CA9955FABED38A8094654CAC902967AF4C5E246B4F61C
3,503,046 UART: [art] SIG.S = 43024C1A3B10F2AE0FDB480566BF4A1EC5FD521B6438A8811A4AD79541C9B1FB8D65D9F4261DB1864AAC584E286F82E0
3,526,974 UART: Caliptra RT
3,527,227 UART: [state] CFI Enabled
3,634,746 UART: [rt] RT listening for mailbox commands...
3,635,416 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,346 UART: [rt]cmd =0x41544d4e, len=14344
4,316,404 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,545 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,374 UART: [cold-reset] ++
1,172,790 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 ready_for_fw is high
1,176,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,629 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,494 UART: [idev] --
1,211,520 UART: [ldev] ++
1,211,688 UART: [ldev] CDI.KEYID = 6
1,212,051 UART: [ldev] SUBJECT.KEYID = 5
1,212,477 UART: [ldev] AUTHORITY.KEYID = 7
1,212,940 UART: [ldev] FE.KEYID = 1
1,217,968 UART: [ldev] Erasing FE.KEYID = 1
1,244,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,698 UART: [ldev] --
1,284,015 UART: [fwproc] Wait for Commands...
1,284,739 UART: [fwproc] Recv command 0x46574c44
1,285,467 UART: [fwproc] Recv'd Img size: 114084 bytes
3,114,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,305,980 >>> mbox cmd response: success
3,306,998 UART: [afmc] ++
3,307,166 UART: [afmc] CDI.KEYID = 6
3,307,528 UART: [afmc] SUBJECT.KEYID = 7
3,307,953 UART: [afmc] AUTHORITY.KEYID = 5
3,343,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,792 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,501 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,104 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,853 UART: [afmc] --
3,386,851 UART: [cold-reset] --
3,387,795 UART: [state] Locking Datavault
3,389,144 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,748 UART: [state] Locking ICCM
3,390,210 UART: [exit] Launching FMC @ 0x40000130
3,395,539 UART:
3,395,555 UART: Running Caliptra FMC ...
3,395,963 UART:
3,396,106 UART: [state] CFI Enabled
3,406,640 UART: [fht] FMC Alias Private Key: 7
3,514,360 UART: [art] Extend RT PCRs Done
3,514,788 UART: [art] Lock RT PCRs Done
3,516,310 UART: [art] Populate DV Done
3,524,296 UART: [fht] FMC Alias Private Key: 7
3,525,366 UART: [art] Derive CDI
3,525,646 UART: [art] Store in in slot 0x4
3,611,291 UART: [art] Derive Key Pair
3,611,651 UART: [art] Store priv key in slot 0x5
3,624,597 UART: [art] Derive Key Pair - Done
3,639,028 UART: [art] Signing Cert with AUTHO
3,639,508 UART: RITY.KEYID = 7
3,654,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,655,511 UART: [art] PUB.X = 337E1E9D7EB551E42D0B8E4AE6CAE07C64189E159926CCAB152380B2A679AE07C6612DEF3AB01DD43C3B2B139FDBE4E9
3,662,293 UART: [art] PUB.Y = 6BF40E5575B1A0902834B06A37861304B8310B003EB8EE1548ECC682E8F5F8EAF1995A90ABAF4E1944752A177DAB5E2B
3,669,218 UART: [art] SIG.R = F0D8CBE5C84F4BC2A6CAE8A74BC0BBD6D05233DC7EDFA7C750CDA28584DEFD145AFD53C7BA7610B3BBB4418D7B9A477B
3,676,022 UART: [art] SIG.S = 1B0F4E954F0B1593FEC92E3BBFED04EE5AA8DA1368F6B27772E8C2DADAFCAFABBDB69EBD1F78FE5961034255D6DA483B
3,700,033 UART: Caliptra RT
3,700,378 UART: [state] CFI Enabled
3,807,420 UART: [rt] RT listening for mailbox commands...
3,808,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,340 UART: [rt]cmd =0x41544d4e, len=14344
4,492,501 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 ready_for_fw is high
1,061,062 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,153,665 >>> mbox cmd response: success
3,215,310 UART:
3,215,326 UART: Running Caliptra FMC ...
3,215,734 UART:
3,215,877 UART: [state] CFI Enabled
3,226,151 UART: [fht] FMC Alias Private Key: 7
3,333,831 UART: [art] Extend RT PCRs Done
3,334,259 UART: [art] Lock RT PCRs Done
3,335,741 UART: [art] Populate DV Done
3,343,873 UART: [fht] FMC Alias Private Key: 7
3,344,973 UART: [art] Derive CDI
3,345,253 UART: [art] Store in in slot 0x4
3,430,862 UART: [art] Derive Key Pair
3,431,222 UART: [art] Store priv key in slot 0x5
3,444,844 UART: [art] Derive Key Pair - Done
3,459,463 UART: [art] Signing Cert with AUTHO
3,459,943 UART: RITY.KEYID = 7
3,475,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,475,786 UART: [art] PUB.X = B3C9D46F6601D61B4E3B4B123D1E4771BBC45BADB27A9F6556819CFEA2398A8666AEADE023F85240302914C7129088D7
3,482,557 UART: [art] PUB.Y = 1FE3626794B48B1148735AD13151EBBAFC659D095905E0A0BEB6D0BF74952BDEF45E11D46DD9702E1C20E94DF8849864
3,489,507 UART: [art] SIG.R = CD6E7B0D1DEFA86FB2DBEED65DCAE05629BCBF6A48CD6D903075666B86DFDC4ED27321A4ABDA1B0EEDD67ACDF02D72F3
3,496,311 UART: [art] SIG.S = 2D765F07ADEF3D312C54C3C0CDB5D08CBABE987DB2FDF20AE2BDA19994F5EACEC290350C654B0357E01896B659418B48
3,520,130 UART: Caliptra RT
3,520,475 UART: [state] CFI Enabled
3,627,443 UART: [rt] RT listening for mailbox commands...
3,628,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,245 UART: [rt]cmd =0x41544d4e, len=14344
4,307,036 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,174,671 ready_for_fw is high
1,174,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,739 UART: [idev] Erasing UDS.KEYID = 0
1,199,623 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,794 UART: [ldev] ++
1,209,962 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,753 UART: [ldev] AUTHORITY.KEYID = 7
1,211,216 UART: [ldev] FE.KEYID = 1
1,216,388 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,206 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114084 bytes
3,115,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,350 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,308,229 >>> mbox cmd response: success
3,309,382 UART: [afmc] ++
3,309,550 UART: [afmc] CDI.KEYID = 6
3,309,913 UART: [afmc] SUBJECT.KEYID = 7
3,310,339 UART: [afmc] AUTHORITY.KEYID = 5
3,345,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,806 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,516 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,406 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,117 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,829 UART: [afmc] --
3,388,895 UART: [cold-reset] --
3,389,597 UART: [state] Locking Datavault
3,390,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,348 UART: [state] Locking ICCM
3,392,008 UART: [exit] Launching FMC @ 0x40000130
3,397,337 UART:
3,397,353 UART: Running Caliptra FMC ...
3,397,761 UART:
3,397,815 UART: [state] CFI Enabled
3,408,431 UART: [fht] FMC Alias Private Key: 7
3,516,259 UART: [art] Extend RT PCRs Done
3,516,687 UART: [art] Lock RT PCRs Done
3,518,339 UART: [art] Populate DV Done
3,526,757 UART: [fht] FMC Alias Private Key: 7
3,527,861 UART: [art] Derive CDI
3,528,141 UART: [art] Store in in slot 0x4
3,613,864 UART: [art] Derive Key Pair
3,614,224 UART: [art] Store priv key in slot 0x5
3,627,036 UART: [art] Derive Key Pair - Done
3,642,070 UART: [art] Signing Cert with AUTHO
3,642,550 UART: RITY.KEYID = 7
3,658,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,815 UART: [art] PUB.X = 7516A9E600E7A66400D913E15DF4CE4956ACA968A9D6F5C4AAA82B7166708DE5721DB815C20AFB03C5276D1AEA3C87B2
3,665,545 UART: [art] PUB.Y = 3D1DCAB38C3339302CB26C3E6B5B37D281408FF9F8ED76281BFBEDA06D1B3BA385560E51A221387A47C9BFAA398D2688
3,672,504 UART: [art] SIG.R = 9CE54A56F59D8589C60679EC3171ECDA77ECA98C4625BE06EC5E9344977F96F80EA85292118FCC649B95A397D9C22D0E
3,679,268 UART: [art] SIG.S = 093D621616C06948109FC4D52A3525CE67AD5C6F6B046B1F8A93EA16CED6D50F94A8F120636AA30A22BBB16387CD01BA
3,702,596 UART: Caliptra RT
3,702,849 UART: [state] CFI Enabled
3,811,347 UART: [rt] RT listening for mailbox commands...
3,812,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,721 UART: [rt]cmd =0x41544d4e, len=14344
4,495,498 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,174 ready_for_fw is high
1,056,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,156,483 >>> mbox cmd response: success
3,218,464 UART:
3,218,480 UART: Running Caliptra FMC ...
3,218,888 UART:
3,218,942 UART: [state] CFI Enabled
3,229,504 UART: [fht] FMC Alias Private Key: 7
3,337,290 UART: [art] Extend RT PCRs Done
3,337,718 UART: [art] Lock RT PCRs Done
3,339,420 UART: [art] Populate DV Done
3,347,458 UART: [fht] FMC Alias Private Key: 7
3,348,584 UART: [art] Derive CDI
3,348,864 UART: [art] Store in in slot 0x4
3,434,671 UART: [art] Derive Key Pair
3,435,031 UART: [art] Store priv key in slot 0x5
3,448,561 UART: [art] Derive Key Pair - Done
3,463,553 UART: [art] Signing Cert with AUTHO
3,464,033 UART: RITY.KEYID = 7
3,478,541 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,306 UART: [art] PUB.X = EE5D687406F5773B1863100A63205CE1A66FACFA6C09488AB98778BF06ED217CB26C672E85B08395C1604FAC0A6238EB
3,486,065 UART: [art] PUB.Y = 409780FBAAA06B7C7470A80D1E1B5FB9C01540FDBB4ACEDC8A3E5D9F230F3989D8C20CECD420AEDFD14C29348482D47E
3,493,028 UART: [art] SIG.R = 3FE9729598FB911BDB3DA13CF58270C1C8A19BC818BACA34644FF80EC3B9AB1F3F93B37D28AA21FC368C3B88012C8747
3,499,806 UART: [art] SIG.S = 430A06B39DDED0941E4B04E119127369C98070F5A323FA3EC89E9FB3EDD8E97FC66347D4AAACAE66248DC0E1CCAD28B6
3,523,296 UART: Caliptra RT
3,523,549 UART: [state] CFI Enabled
3,631,688 UART: [rt] RT listening for mailbox commands...
3,632,358 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,328 UART: [rt]cmd =0x41544d4e, len=14344
4,311,107 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,168 UART: [kat] SHA2-256
902,108 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,583 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,174,734 ready_for_fw is high
1,174,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,252 UART: [fwproc] Recv command 0x46574c44
1,282,985 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,185 >>> mbox cmd response: success
3,312,318 UART: [afmc] ++
3,312,486 UART: [afmc] CDI.KEYID = 6
3,312,849 UART: [afmc] SUBJECT.KEYID = 7
3,313,275 UART: [afmc] AUTHORITY.KEYID = 5
3,349,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,604 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,314 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,204 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,915 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,857 UART: [afmc] --
3,392,763 UART: [cold-reset] --
3,393,481 UART: [state] Locking Datavault
3,394,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,074 UART: [state] Locking ICCM
3,395,498 UART: [exit] Launching FMC @ 0x40000130
3,400,827 UART:
3,400,843 UART: Running Caliptra FMC ...
3,401,251 UART:
3,401,394 UART: [state] CFI Enabled
3,411,916 UART: [fht] FMC Alias Private Key: 7
3,520,408 UART: [art] Extend RT PCRs Done
3,520,836 UART: [art] Lock RT PCRs Done
3,522,212 UART: [art] Populate DV Done
3,530,028 UART: [fht] FMC Alias Private Key: 7
3,531,168 UART: [art] Derive CDI
3,531,448 UART: [art] Store in in slot 0x4
3,617,413 UART: [art] Derive Key Pair
3,617,773 UART: [art] Store priv key in slot 0x5
3,631,625 UART: [art] Derive Key Pair - Done
3,646,231 UART: [art] Signing Cert with AUTHO
3,646,711 UART: RITY.KEYID = 7
3,662,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,784 UART: [art] PUB.X = 2F8F532851437FAA738014E15AB9ED86D80773751EF487BFE8C3EADA7E1FDFEE84FCBF332D6F23D62274DCDB74A43B5E
3,669,571 UART: [art] PUB.Y = 506040FFCC12C275143FF9941786A614D61926B0B4C504E60CFCC21D0E1F01084696745900CA8FDB28A215464CADD763
3,676,482 UART: [art] SIG.R = 4FC68A71E53463E3D5EFFCC5C01FC1B996F41A09702784F482323A123DB5BAB0373C56FC108BBED6306FF1BEAA5DF647
3,683,265 UART: [art] SIG.S = A018D4107EDDB7608FA31CB3202C1D852AE8AA1B9F8A4B026E23514EEA1A42C79047C4FB6DB1E75025CBAFB71F83BAF7
3,707,375 UART: Caliptra RT
3,707,720 UART: [state] CFI Enabled
3,815,484 UART: [rt] RT listening for mailbox commands...
3,816,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,562 UART: [rt]cmd =0x41544d4e, len=14344
4,500,451 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,971 ready_for_fw is high
1,056,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,307 >>> mbox cmd response: success
3,222,612 UART:
3,222,628 UART: Running Caliptra FMC ...
3,223,036 UART:
3,223,179 UART: [state] CFI Enabled
3,233,715 UART: [fht] FMC Alias Private Key: 7
3,341,833 UART: [art] Extend RT PCRs Done
3,342,261 UART: [art] Lock RT PCRs Done
3,343,653 UART: [art] Populate DV Done
3,351,971 UART: [fht] FMC Alias Private Key: 7
3,352,987 UART: [art] Derive CDI
3,353,267 UART: [art] Store in in slot 0x4
3,438,736 UART: [art] Derive Key Pair
3,439,096 UART: [art] Store priv key in slot 0x5
3,451,592 UART: [art] Derive Key Pair - Done
3,466,623 UART: [art] Signing Cert with AUTHO
3,467,103 UART: RITY.KEYID = 7
3,482,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,196 UART: [art] PUB.X = 0024E4F2882D2C7466B9F7873D783D293ADB59F08D754F420419F072CEF51C71602C5E646665BD2356F05E2A1DA46560
3,489,935 UART: [art] PUB.Y = 3CEDE91965E83CEC7A5F295E7733E6654FD7E5C6FCB7282CF84D86F372AE9A9BAED04F043055442B0D5BD28E50672A5D
3,496,893 UART: [art] SIG.R = 2E631AB21F9839E471DB6F78D1CBDEF9673183BF6412BE3B4B1199C365FA70C1EDA23873B8B668CC63B8971593AE0E3A
3,503,670 UART: [art] SIG.S = 02DD56D67856DE412CA3FAA44DAAD9F9E5249AC9161A14BE898D5FFFF2DABA87AF54E959024E2020ED6323CA9A712569
3,527,251 UART: Caliptra RT
3,527,596 UART: [state] CFI Enabled
3,635,673 UART: [rt] RT listening for mailbox commands...
3,636,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,393 UART: [rt]cmd =0x41544d4e, len=14344
4,322,005 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,184 UART:
192,558 UART: Running Caliptra ROM ...
193,755 UART:
193,918 UART: [state] CFI Enabled
266,037 UART: [state] LifecycleState = Unprovisioned
267,950 UART: [state] DebugLocked = No
270,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,346 UART: [kat] SHA2-256
445,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,610 UART: [kat] ++
456,076 UART: [kat] sha1
467,447 UART: [kat] SHA2-256
470,102 UART: [kat] SHA2-384
476,731 UART: [kat] SHA2-512-ACC
479,101 UART: [kat] ECC-384
2,769,099 UART: [kat] HMAC-384Kdf
2,798,816 UART: [kat] LMS
3,989,127 UART: [kat] --
3,993,631 UART: [cold-reset] ++
3,996,271 UART: [fht] Storing FHT @ 0x50003400
4,007,557 UART: [idev] ++
4,008,129 UART: [idev] CDI.KEYID = 6
4,009,124 UART: [idev] SUBJECT.KEYID = 7
4,010,304 UART: [idev] UDS.KEYID = 0
4,011,295 ready_for_fw is high
4,011,487 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,571 UART: [idev] Erasing UDS.KEYID = 0
7,348,597 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,102 UART: [idev] --
7,372,772 UART: [ldev] ++
7,373,380 UART: [ldev] CDI.KEYID = 6
7,374,301 UART: [ldev] SUBJECT.KEYID = 5
7,375,515 UART: [ldev] AUTHORITY.KEYID = 7
7,376,804 UART: [ldev] FE.KEYID = 1
7,422,373 UART: [ldev] Erasing FE.KEYID = 1
10,756,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,711 UART: [ldev] --
13,117,488 UART: [fwproc] Waiting for Commands...
13,119,523 UART: [fwproc] Received command 0x46574c44
13,121,757 UART: [fwproc] Received Image of size 113760 bytes
21,750,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,839,867 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,908,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,224,432 >>> mbox cmd response: success
22,228,162 UART: [afmc] ++
22,228,768 UART: [afmc] CDI.KEYID = 6
22,229,685 UART: [afmc] SUBJECT.KEYID = 7
22,230,977 UART: [afmc] AUTHORITY.KEYID = 5
25,597,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,896,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,898,701 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,913,283 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,928,006 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,942,228 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,963,428 UART: [afmc] --
27,968,155 UART: [cold-reset] --
27,972,554 UART: [state] Locking Datavault
27,978,074 UART: [state] Locking PCR0, PCR1 and PCR31
27,979,831 UART: [state] Locking ICCM
27,982,200 UART: [exit] Launching FMC @ 0x40000130
27,990,594 UART:
27,990,828 UART: Running Caliptra FMC ...
27,991,928 UART:
27,992,112 UART: [state] CFI Enabled
28,056,722 UART: [fht] FMC Alias Private Key: 7
30,394,690 UART: [art] Extend RT PCRs Done
30,395,920 UART: [art] Lock RT PCRs Done
30,397,277 UART: [art] Populate DV Done
30,402,687 UART: [fht] FMC Alias Private Key: 7
30,404,384 UART: [art] Derive CDI
30,405,193 UART: [art] Store in in slot 0x4
30,465,856 UART: [art] Derive Key Pair
30,466,891 UART: [art] Store priv key in slot 0x5
33,759,579 UART: [art] Derive Key Pair - Done
33,772,845 UART: [art] Signing Cert with AUTHO
33,774,175 UART: RITY.KEYID = 7
36,060,894 UART: [art] Erasing AUTHORITY.KEYID = 7
36,062,404 UART: [art] PUB.X = F3AAB2900F065E5283A86D773015A7140A1E9BD3A0732C67660EAA97ECF98EC6B193AD545290E6627E0FE0F968A1BE05
36,069,657 UART: [art] PUB.Y = 39EB9614622DC8B3C8F87941CB861C1DE6C72756421B58D8B1D13CDFF50CA44BE5ED47B59CA674E1D9772A6A585CECC5
36,076,913 UART: [art] SIG.R = D8B77A8412A0F1A0AF0ADD72FBDCA99AE7757B69F330CF754D167A8FF9C706AD376FA6C3B00FAC0AEE884420692956F2
36,084,307 UART: [art] SIG.S = 44A7D7A73BA493E1D7216CE69E820CD67D4528CC5A225CB501FF9BDC259EC1A1A91D9F93EBAE7B810A5B6051FA16B533
37,389,375 UART: Caliptra RT
37,390,098 UART: [state] CFI Enabled
37,549,863 UART: [rt] RT listening for mailbox commands...
41,586,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,742,292 UART: [rt]cmd =0x41544d4e, len=14344
50,271,200 >>> mbox cmd response data (8 bytes)
50,274,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,304,773 UART: [rt]cmd =0x494e464f, len=4
50,309,226 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,807,148 ready_for_fw is high
3,807,833 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,013,061 >>> mbox cmd response: success
27,709,403 UART:
27,709,784 UART: Running Caliptra FMC ...
27,710,921 UART:
27,711,083 UART: [state] CFI Enabled
27,778,652 UART: [fht] FMC Alias Private Key: 7
30,116,397 UART: [art] Extend RT PCRs Done
30,117,647 UART: [art] Lock RT PCRs Done
30,119,228 UART: [art] Populate DV Done
30,124,543 UART: [fht] FMC Alias Private Key: 7
30,126,121 UART: [art] Derive CDI
30,126,948 UART: [art] Store in in slot 0x4
30,180,206 UART: [art] Derive Key Pair
30,181,208 UART: [art] Store priv key in slot 0x5
33,474,020 UART: [art] Derive Key Pair - Done
33,487,142 UART: [art] Signing Cert with AUTHO
33,488,480 UART: RITY.KEYID = 7
35,776,116 UART: [art] Erasing AUTHORITY.KEYID = 7
35,777,626 UART: [art] PUB.X = AB8D0C87F204770CDC2C7E936175C9A0D1C7BA58C80BECAB358F0B6F2C51D58268DD2CC1265B278EE1029614506D2C81
35,784,894 UART: [art] PUB.Y = CDF457425F11829B6AB5C350FFB8F12D3D675B0AE3BBD61F428AA9CCDC9526E021AE59399BA899F95E71FDE835EA8534
35,792,147 UART: [art] SIG.R = 140C37FF749BE3136D8160DFB87C49AD4DA2077BCA8C23EEAA5A7E0D3E26D9FA55D43ACA2017BC3851DD67937A2A16F3
35,799,555 UART: [art] SIG.S = E81E0E671E1E46678E9835BFEED547D0CE4F90FB0BDF707B95822B9297E52C3F6A7679CB1B8103F9A3D233CC37D47D51
37,104,714 UART: Caliptra RT
37,105,422 UART: [state] CFI Enabled
37,265,899 UART: [rt] RT listening for mailbox commands...
41,301,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,456,638 UART: [rt]cmd =0x41544d4e, len=14344
49,907,346 >>> mbox cmd response data (8 bytes)
49,910,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,940,605 UART: [rt]cmd =0x494e464f, len=4
49,944,736 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,583 writing to cptra_bootfsm_go
192,820 UART:
193,183 UART: Running Caliptra ROM ...
194,301 UART:
604,260 UART: [state] CFI Enabled
618,575 UART: [state] LifecycleState = Unprovisioned
620,444 UART: [state] DebugLocked = No
622,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,837 UART: [kat] SHA2-256
797,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,094 UART: [kat] ++
808,544 UART: [kat] sha1
820,478 UART: [kat] SHA2-256
823,199 UART: [kat] SHA2-384
830,463 UART: [kat] SHA2-512-ACC
832,825 UART: [kat] ECC-384
3,117,046 UART: [kat] HMAC-384Kdf
3,127,938 UART: [kat] LMS
4,318,047 UART: [kat] --
4,321,983 UART: [cold-reset] ++
4,323,212 UART: [fht] Storing FHT @ 0x50003400
4,334,334 UART: [idev] ++
4,334,967 UART: [idev] CDI.KEYID = 6
4,335,850 UART: [idev] SUBJECT.KEYID = 7
4,337,112 UART: [idev] UDS.KEYID = 0
4,338,112 ready_for_fw is high
4,338,330 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,306 UART: [idev] Erasing UDS.KEYID = 0
7,627,194 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,354 UART: [idev] --
7,652,137 UART: [ldev] ++
7,652,714 UART: [ldev] CDI.KEYID = 6
7,653,680 UART: [ldev] SUBJECT.KEYID = 5
7,654,835 UART: [ldev] AUTHORITY.KEYID = 7
7,656,116 UART: [ldev] FE.KEYID = 1
7,667,167 UART: [ldev] Erasing FE.KEYID = 1
10,958,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,793 UART: [ldev] --
13,319,896 UART: [fwproc] Waiting for Commands...
13,321,598 UART: [fwproc] Received command 0x46574c44
13,323,794 UART: [fwproc] Received Image of size 113760 bytes
22,424,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,501,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,570,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,886,239 >>> mbox cmd response: success
22,889,829 UART: [afmc] ++
22,890,477 UART: [afmc] CDI.KEYID = 6
22,891,388 UART: [afmc] SUBJECT.KEYID = 7
22,892,604 UART: [afmc] AUTHORITY.KEYID = 5
26,209,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,504,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,507,024 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,521,681 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,536,340 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,550,594 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,571,461 UART: [afmc] --
28,574,836 UART: [cold-reset] --
28,578,423 UART: [state] Locking Datavault
28,583,128 UART: [state] Locking PCR0, PCR1 and PCR31
28,584,833 UART: [state] Locking ICCM
28,586,013 UART: [exit] Launching FMC @ 0x40000130
28,594,410 UART:
28,594,643 UART: Running Caliptra FMC ...
28,595,742 UART:
28,595,898 UART: [state] CFI Enabled
28,604,227 UART: [fht] FMC Alias Private Key: 7
30,934,769 UART: [art] Extend RT PCRs Done
30,935,989 UART: [art] Lock RT PCRs Done
30,937,840 UART: [art] Populate DV Done
30,943,522 UART: [fht] FMC Alias Private Key: 7
30,945,219 UART: [art] Derive CDI
30,946,029 UART: [art] Store in in slot 0x4
30,988,788 UART: [art] Derive Key Pair
30,989,788 UART: [art] Store priv key in slot 0x5
34,231,245 UART: [art] Derive Key Pair - Done
34,244,247 UART: [art] Signing Cert with AUTHO
34,245,551 UART: RITY.KEYID = 7
36,524,815 UART: [art] Erasing AUTHORITY.KEYID = 7
36,526,320 UART: [art] PUB.X = 32554ED18C95947C6E8BBF01CA2783993C3AEB0DB76EDE81F141CB68A8454A4BF108B4741461B69A555DFF2DE8C2D0FF
36,533,600 UART: [art] PUB.Y = 15BC275231FDF4C7DD7975A92FEEB034DDC7129A9B50523E556DC6CF281FAE39BD759C500208DBE0979FC12B14EACC9A
36,540,860 UART: [art] SIG.R = 1B07EDCDFF036BEEE0CC2D15B96785081BF500F0564873707F97790C7B960ECEE2457BE145498A3D07C399DC9255494A
36,548,222 UART: [art] SIG.S = 15402AE10201839E275EE9C8702E4554069322E627E4AB525A0ACCA37E95047BB395BFEEE48CA554F47F27E92FC84BD2
37,853,708 UART: Caliptra RT
37,854,419 UART: [state] CFI Enabled
37,971,892 UART: [rt] RT listening for mailbox commands...
42,006,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,161,568 UART: [rt]cmd =0x41544d4e, len=14344
50,482,167 >>> mbox cmd response data (8 bytes)
50,485,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,515,144 UART: [rt]cmd =0x494e464f, len=4
50,519,596 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
4,128,881 ready_for_fw is high
4,129,566 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,244,163 >>> mbox cmd response: success
27,887,264 UART:
27,887,666 UART: Running Caliptra FMC ...
27,888,761 UART:
27,888,909 UART: [state] CFI Enabled
27,896,959 UART: [fht] FMC Alias Private Key: 7
30,227,267 UART: [art] Extend RT PCRs Done
30,228,496 UART: [art] Lock RT PCRs Done
30,230,255 UART: [art] Populate DV Done
30,236,048 UART: [fht] FMC Alias Private Key: 7
30,237,645 UART: [art] Derive CDI
30,238,381 UART: [art] Store in in slot 0x4
30,280,813 UART: [art] Derive Key Pair
30,281,818 UART: [art] Store priv key in slot 0x5
33,523,434 UART: [art] Derive Key Pair - Done
33,536,278 UART: [art] Signing Cert with AUTHO
33,537,588 UART: RITY.KEYID = 7
35,816,605 UART: [art] Erasing AUTHORITY.KEYID = 7
35,818,113 UART: [art] PUB.X = F97D00D8451058B6F5EE9D629ECD6653DC11B9295F76EAFCDDBE9AA572E4A1E685B42F62278292160ED99397E1A92B78
35,825,358 UART: [art] PUB.Y = C30E2CDDDA54EDBCF760B6F4484D2B130AE6AB892F3131F4EEC210D7A2A7747CE5EAB9F1A87872C98D192B70E13248FC
35,832,641 UART: [art] SIG.R = 9A67F4FAEF4E8AF4B6272EFCBFBE687EF939B9BF8FE260610F10AE5E62C366B4CE8D88C0AE6C49C2107FDF173784244C
35,840,080 UART: [art] SIG.S = 52AAD70B3F96AD971D4028651D6538B978B8CA5AA43C1360C63669ADB0C012CA37E8A7DD688854C8437A4C5730484D48
37,145,592 UART: Caliptra RT
37,146,289 UART: [state] CFI Enabled
37,264,447 UART: [rt] RT listening for mailbox commands...
41,306,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,462,592 UART: [rt]cmd =0x41544d4e, len=14344
49,835,034 >>> mbox cmd response data (8 bytes)
49,838,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,868,185 UART: [rt]cmd =0x494e464f, len=4
49,872,503 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,450 UART:
192,839 UART: Running Caliptra ROM ...
194,053 UART:
194,217 UART: [state] CFI Enabled
263,288 UART: [state] LifecycleState = Unprovisioned
265,126 UART: [state] DebugLocked = No
267,368 UART: [state] WD Timer not started. Device not locked for debugging
271,053 UART: [kat] SHA2-256
450,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,800 UART: [kat] ++
462,340 UART: [kat] sha1
472,219 UART: [kat] SHA2-256
475,217 UART: [kat] SHA2-384
480,773 UART: [kat] SHA2-512-ACC
483,697 UART: [kat] ECC-384
2,947,624 UART: [kat] HMAC-384Kdf
2,970,800 UART: [kat] LMS
3,500,251 UART: [kat] --
3,505,696 UART: [cold-reset] ++
3,506,785 UART: [fht] FHT @ 0x50003400
3,517,783 UART: [idev] ++
3,518,346 UART: [idev] CDI.KEYID = 6
3,519,410 UART: [idev] SUBJECT.KEYID = 7
3,520,510 UART: [idev] UDS.KEYID = 0
3,521,435 ready_for_fw is high
3,521,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,170 UART: [idev] Erasing UDS.KEYID = 0
6,025,106 UART: [idev] Sha1 KeyId Algorithm
6,049,598 UART: [idev] --
6,053,273 UART: [ldev] ++
6,053,896 UART: [ldev] CDI.KEYID = 6
6,054,788 UART: [ldev] SUBJECT.KEYID = 5
6,055,947 UART: [ldev] AUTHORITY.KEYID = 7
6,057,179 UART: [ldev] FE.KEYID = 1
6,098,361 UART: [ldev] Erasing FE.KEYID = 1
8,601,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,451 UART: [ldev] --
10,404,599 UART: [fwproc] Wait for Commands...
10,406,801 UART: [fwproc] Recv command 0x46574c44
10,408,855 UART: [fwproc] Recv'd Img size: 114084 bytes
14,980,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,061,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,129,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,447,421 >>> mbox cmd response: success
15,451,531 UART: [afmc] ++
15,452,119 UART: [afmc] CDI.KEYID = 6
15,452,997 UART: [afmc] SUBJECT.KEYID = 7
15,454,203 UART: [afmc] AUTHORITY.KEYID = 5
17,987,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,715,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,716,933 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,732,888 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,748,849 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,764,628 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,788,035 UART: [afmc] --
19,792,368 UART: [cold-reset] --
19,794,992 UART: [state] Locking Datavault
19,800,020 UART: [state] Locking PCR0, PCR1 and PCR31
19,801,672 UART: [state] Locking ICCM
19,802,798 UART: [exit] Launching FMC @ 0x40000130
19,811,249 UART:
19,811,480 UART: Running Caliptra FMC ...
19,812,581 UART:
19,812,736 UART: [state] CFI Enabled
19,873,909 UART: [fht] FMC Alias Private Key: 7
21,637,703 UART: [art] Extend RT PCRs Done
21,638,925 UART: [art] Lock RT PCRs Done
21,640,684 UART: [art] Populate DV Done
21,645,931 UART: [fht] FMC Alias Private Key: 7
21,647,479 UART: [art] Derive CDI
21,648,290 UART: [art] Store in in slot 0x4
21,706,680 UART: [art] Derive Key Pair
21,707,716 UART: [art] Store priv key in slot 0x5
24,170,622 UART: [art] Derive Key Pair - Done
24,183,564 UART: [art] Signing Cert with AUTHO
24,184,900 UART: RITY.KEYID = 7
25,896,679 UART: [art] Erasing AUTHORITY.KEYID = 7
25,898,186 UART: [art] PUB.X = 35B8E153828362D565CC06F574B37F0EF9E48F78FE36C2CF13E1B046539A8A6F036BBFED71465F6BD0E34095FCBA9487
25,905,519 UART: [art] PUB.Y = 10B9E330178A44CB243CE8AD139B8AE2B7BFC1D0EB7EEDC55CBF2290B6E911D56CE463CC90305F3D2A6982D138FF5611
25,912,788 UART: [art] SIG.R = 595F2407E05CB14D2B321E07717E854AC8BB709F6A3A55EFA0C42F44888313873E10AC9569261B1B0D040CFD34EDD1CC
25,920,182 UART: [art] SIG.S = 3AD96353BDB70CB7F10483B76563AED79B9213986C02D4200E22A587B081A63F825F252303ED45772234FEAAC6B06794
26,898,401 UART: Caliptra RT
26,899,091 UART: [state] CFI Enabled
27,066,180 UART: [rt] RT listening for mailbox commands...
31,108,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,264,679 UART: [rt]cmd =0x41544d4e, len=14344
36,115,648 >>> mbox cmd response data (8 bytes)
36,119,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,148,981 UART: [rt]cmd =0x494e464f, len=4
36,153,333 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
3,358,786 ready_for_fw is high
3,359,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,993,256 >>> mbox cmd response: success
19,280,788 UART:
19,281,175 UART: Running Caliptra FMC ...
19,282,312 UART:
19,282,477 UART: [state] CFI Enabled
19,349,835 UART: [fht] FMC Alias Private Key: 7
21,113,144 UART: [art] Extend RT PCRs Done
21,114,366 UART: [art] Lock RT PCRs Done
21,116,205 UART: [art] Populate DV Done
21,121,503 UART: [fht] FMC Alias Private Key: 7
21,123,101 UART: [art] Derive CDI
21,123,919 UART: [art] Store in in slot 0x4
21,183,451 UART: [art] Derive Key Pair
21,184,451 UART: [art] Store priv key in slot 0x5
23,647,470 UART: [art] Derive Key Pair - Done
23,660,579 UART: [art] Signing Cert with AUTHO
23,661,889 UART: RITY.KEYID = 7
25,373,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,375,204 UART: [art] PUB.X = 8DB7BC9262A113C091A969DD5B4F02EF990876D0D496DC11C6987C9B6A1A371C839EDE35A9DE99F2FF9FC631FC2B420D
25,382,513 UART: [art] PUB.Y = 56C2EFA3C470977D3B9CCFC5351F069B137B8D76D5B439E4468F44FD83B624BBE9C73CCD3D017698E19A9BB245166B47
25,389,814 UART: [art] SIG.R = 1D76CA047CEF2D1C79F12DA48F7DFF605803B821929424C19E70A4E686332359E68125DE680031F101DF20B59401CDF2
25,397,122 UART: [art] SIG.S = E2B70B8E34CDE3C62A54B40C92101E6F9E3725D57E78A70A380A91AF74DD3BD96987D679B84F7E6277C85255CBD0749F
26,376,103 UART: Caliptra RT
26,376,797 UART: [state] CFI Enabled
26,541,674 UART: [rt] RT listening for mailbox commands...
30,576,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,731,792 UART: [rt]cmd =0x41544d4e, len=14344
35,602,289 >>> mbox cmd response data (8 bytes)
35,605,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
35,635,738 UART: [rt]cmd =0x494e464f, len=4
35,640,090 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,885 writing to cptra_bootfsm_go
193,056 UART:
193,439 UART: Running Caliptra ROM ...
194,631 UART:
604,365 UART: [state] CFI Enabled
619,220 UART: [state] LifecycleState = Unprovisioned
621,089 UART: [state] DebugLocked = No
623,971 UART: [state] WD Timer not started. Device not locked for debugging
627,294 UART: [kat] SHA2-256
806,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,947 UART: [kat] ++
818,478 UART: [kat] sha1
829,358 UART: [kat] SHA2-256
832,396 UART: [kat] SHA2-384
838,282 UART: [kat] SHA2-512-ACC
841,296 UART: [kat] ECC-384
3,284,562 UART: [kat] HMAC-384Kdf
3,297,651 UART: [kat] LMS
3,827,168 UART: [kat] --
3,830,808 UART: [cold-reset] ++
3,832,025 UART: [fht] FHT @ 0x50003400
3,843,211 UART: [idev] ++
3,843,770 UART: [idev] CDI.KEYID = 6
3,844,724 UART: [idev] SUBJECT.KEYID = 7
3,845,896 UART: [idev] UDS.KEYID = 0
3,846,869 ready_for_fw is high
3,847,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,358 UART: [idev] Erasing UDS.KEYID = 0
6,323,037 UART: [idev] Sha1 KeyId Algorithm
6,347,236 UART: [idev] --
6,351,342 UART: [ldev] ++
6,352,457 UART: [ldev] CDI.KEYID = 6
6,353,407 UART: [ldev] SUBJECT.KEYID = 5
6,354,454 UART: [ldev] AUTHORITY.KEYID = 7
6,355,634 UART: [ldev] FE.KEYID = 1
6,366,927 UART: [ldev] Erasing FE.KEYID = 1
8,840,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,822 UART: [ldev] --
10,634,355 UART: [fwproc] Wait for Commands...
10,637,421 UART: [fwproc] Recv command 0x46574c44
10,639,511 UART: [fwproc] Recv'd Img size: 114084 bytes
15,184,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,261,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,330,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,647,019 >>> mbox cmd response: success
15,651,524 UART: [afmc] ++
15,652,121 UART: [afmc] CDI.KEYID = 6
15,653,034 UART: [afmc] SUBJECT.KEYID = 7
15,654,198 UART: [afmc] AUTHORITY.KEYID = 5
18,155,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,874,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,876,472 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,892,429 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,908,411 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,924,180 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,946,570 UART: [afmc] --
19,950,657 UART: [cold-reset] --
19,953,341 UART: [state] Locking Datavault
19,959,019 UART: [state] Locking PCR0, PCR1 and PCR31
19,960,739 UART: [state] Locking ICCM
19,963,345 UART: [exit] Launching FMC @ 0x40000130
19,971,803 UART:
19,972,043 UART: Running Caliptra FMC ...
19,973,150 UART:
19,973,314 UART: [state] CFI Enabled
19,981,633 UART: [fht] FMC Alias Private Key: 7
21,739,100 UART: [art] Extend RT PCRs Done
21,740,325 UART: [art] Lock RT PCRs Done
21,741,734 UART: [art] Populate DV Done
21,747,146 UART: [fht] FMC Alias Private Key: 7
21,748,685 UART: [art] Derive CDI
21,749,503 UART: [art] Store in in slot 0x4
21,791,774 UART: [art] Derive Key Pair
21,792,967 UART: [art] Store priv key in slot 0x5
24,219,645 UART: [art] Derive Key Pair - Done
24,232,745 UART: [art] Signing Cert with AUTHO
24,234,074 UART: RITY.KEYID = 7
25,939,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,941,086 UART: [art] PUB.X = EDA6696B5B9207AB04C384F58FF5EE3E748DD5FB837E3D2E0F2C701F37CFB7E3AD5A76EF88A5F72A9FBFCBE28F0A09DB
25,948,366 UART: [art] PUB.Y = E592458F59818A227583A0C0A3063C74A8BA1C50E12208B30C3DCEC96235A1F0F6F9CD58DB375072A58478A60A75F766
25,955,640 UART: [art] SIG.R = 1953F4F186CE42B557CC72E70CE840117946449CE1F151755F34F6398CA01EA20E9832964F84D7D93F1ADE6C689DE5D5
25,963,021 UART: [art] SIG.S = FB8593BDCAE3092642FD682B7EA5392A80EF9E4F8FA34C43B1F98E21D5C12F2084381973D06A9BD5D5BAFE0D22E551F2
26,941,685 UART: Caliptra RT
26,942,371 UART: [state] CFI Enabled
27,058,618 UART: [rt] RT listening for mailbox commands...
31,099,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,255,083 UART: [rt]cmd =0x41544d4e, len=14344
36,105,501 >>> mbox cmd response data (8 bytes)
36,108,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,138,926 UART: [rt]cmd =0x494e464f, len=4
36,143,314 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,853 writing to cptra_bootfsm_go
3,700,214 ready_for_fw is high
3,700,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,263,804 >>> mbox cmd response: success
19,518,053 UART:
19,518,477 UART: Running Caliptra FMC ...
19,519,575 UART:
19,519,747 UART: [state] CFI Enabled
19,527,532 UART: [fht] FMC Alias Private Key: 7
21,284,558 UART: [art] Extend RT PCRs Done
21,285,782 UART: [art] Lock RT PCRs Done
21,287,220 UART: [art] Populate DV Done
21,292,801 UART: [fht] FMC Alias Private Key: 7
21,294,349 UART: [art] Derive CDI
21,295,086 UART: [art] Store in in slot 0x4
21,337,578 UART: [art] Derive Key Pair
21,338,578 UART: [art] Store priv key in slot 0x5
23,765,343 UART: [art] Derive Key Pair - Done
23,778,619 UART: [art] Signing Cert with AUTHO
23,779,923 UART: RITY.KEYID = 7
25,485,597 UART: [art] Erasing AUTHORITY.KEYID = 7
25,487,104 UART: [art] PUB.X = 7C6B40F1F1AAF3F998824F892AA6A05CED54AD5A32D3BAAA8825F5EC9C0EA959CBB6BA1C56DDDC5530CB04D3303020FA
25,494,440 UART: [art] PUB.Y = 67338830567171DCBC8947DC1744C46B20531B462B5E924D3ECEDC5CB9DFC4E689590775CE3B0ACF3154CA257769D1E6
25,501,860 UART: [art] SIG.R = 417651B2987E15D2DD94770CC3B4B673C40C7D0BE2F18C449C7CBCE9A824617ECEF69714EEC9E99698F0993BD01BC388
25,509,096 UART: [art] SIG.S = C3C214C2179AD405764D0FF42B2CBDF1CD8F269E295876BCFD8158247F136E12AAE0671B10FB9B224C6A9972A1151F58
26,487,993 UART: Caliptra RT
26,488,679 UART: [state] CFI Enabled
26,605,685 UART: [rt] RT listening for mailbox commands...
30,639,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,795,567 UART: [rt]cmd =0x41544d4e, len=14344
35,641,555 >>> mbox cmd response data (8 bytes)
35,644,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
35,674,841 UART: [rt]cmd =0x494e464f, len=4
35,679,169 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,347 UART:
192,728 UART: Running Caliptra ROM ...
193,916 UART:
194,082 UART: [state] CFI Enabled
263,691 UART: [state] LifecycleState = Unprovisioned
266,029 UART: [state] DebugLocked = No
268,474 UART: [state] WD Timer not started. Device not locked for debugging
273,868 UART: [kat] SHA2-256
463,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,547 UART: [kat] ++
474,995 UART: [kat] sha1
486,364 UART: [kat] SHA2-256
489,380 UART: [kat] SHA2-384
494,375 UART: [kat] SHA2-512-ACC
496,970 UART: [kat] ECC-384
2,947,968 UART: [kat] HMAC-384Kdf
2,983,190 UART: [kat] LMS
3,514,921 UART: [kat] --
3,522,044 UART: [cold-reset] ++
3,523,632 UART: [fht] FHT @ 0x50003400
3,534,826 UART: [idev] ++
3,535,529 UART: [idev] CDI.KEYID = 6
3,536,561 UART: [idev] SUBJECT.KEYID = 7
3,537,664 UART: [idev] UDS.KEYID = 0
3,538,609 ready_for_fw is high
3,538,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,682,265 UART: [idev] Erasing UDS.KEYID = 0
6,038,760 UART: [idev] Sha1 KeyId Algorithm
6,060,995 UART: [idev] --
6,066,078 UART: [ldev] ++
6,066,779 UART: [ldev] CDI.KEYID = 6
6,067,666 UART: [ldev] SUBJECT.KEYID = 5
6,068,824 UART: [ldev] AUTHORITY.KEYID = 7
6,070,080 UART: [ldev] FE.KEYID = 1
6,112,259 UART: [ldev] Erasing FE.KEYID = 1
8,616,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,517 UART: [ldev] --
10,426,849 UART: [fwproc] Wait for Commands...
10,430,030 UART: [fwproc] Recv command 0x46574c44
10,432,338 UART: [fwproc] Recv'd Img size: 114084 bytes
15,047,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,133,371 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,791,046 >>> mbox cmd response: success
15,794,352 UART: [afmc] ++
15,795,064 UART: [afmc] CDI.KEYID = 6
15,796,361 UART: [afmc] SUBJECT.KEYID = 7
15,797,759 UART: [afmc] AUTHORITY.KEYID = 5
18,332,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,056,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,058,281 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,073,395 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,088,592 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,103,449 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,127,226 UART: [afmc] --
20,131,361 UART: [cold-reset] --
20,135,551 UART: [state] Locking Datavault
20,141,353 UART: [state] Locking PCR0, PCR1 and PCR31
20,143,524 UART: [state] Locking ICCM
20,145,940 UART: [exit] Launching FMC @ 0x40000130
20,154,576 UART:
20,154,816 UART: Running Caliptra FMC ...
20,155,866 UART:
20,156,014 UART: [state] CFI Enabled
20,212,054 UART: [fht] FMC Alias Private Key: 7
21,975,963 UART: [art] Extend RT PCRs Done
21,977,191 UART: [art] Lock RT PCRs Done
21,979,168 UART: [art] Populate DV Done
21,984,474 UART: [fht] FMC Alias Private Key: 7
21,986,112 UART: [art] Derive CDI
21,986,922 UART: [art] Store in in slot 0x4
22,044,563 UART: [art] Derive Key Pair
22,045,606 UART: [art] Store priv key in slot 0x5
24,508,761 UART: [art] Derive Key Pair - Done
24,521,995 UART: [art] Signing Cert with AUTHO
24,523,291 UART: RITY.KEYID = 7
26,233,643 UART: [art] Erasing AUTHORITY.KEYID = 7
26,235,151 UART: [art] PUB.X = 5B0C21B82E64810BC879D7D599B851836B92327C51D172AE0206881B238135F7570CB143CEF63D00BDF36F788CD719A1
26,242,378 UART: [art] PUB.Y = 03D678C4C2C413967E1BFEA02CF69A1D321D85C99D63738D5F3663FCE7724F796834939DAC6F07A594D8F772A3F390BA
26,249,683 UART: [art] SIG.R = 29DEB2F2B539A9477128D966C16B26BD8D4F18317C9B1FA30C57DDE75D7B2938408B0DDC7A05FE216CD4DAB34DFE6199
26,257,064 UART: [art] SIG.S = 77B1CE25AE08338599F9E0A6ADFF71F54F414951AF69B9C90DDFF85017B7A04CDC20B68ACCB69624ACB816E5892270A0
27,235,993 UART: Caliptra RT
27,236,683 UART: [state] CFI Enabled
27,402,448 UART: [rt] RT listening for mailbox commands...
31,443,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,598,847 UART: [rt]cmd =0x41544d4e, len=14344
36,456,860 >>> mbox cmd response data (8 bytes)
36,460,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,489,842 UART: [rt]cmd =0x494e464f, len=4
36,494,041 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,440,410 ready_for_fw is high
3,440,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,828,329 >>> mbox cmd response: success
20,110,873 UART:
20,111,275 UART: Running Caliptra FMC ...
20,112,469 UART:
20,112,636 UART: [state] CFI Enabled
20,182,091 UART: [fht] FMC Alias Private Key: 7
21,945,308 UART: [art] Extend RT PCRs Done
21,946,523 UART: [art] Lock RT PCRs Done
21,948,475 UART: [art] Populate DV Done
21,953,951 UART: [fht] FMC Alias Private Key: 7
21,955,435 UART: [art] Derive CDI
21,956,212 UART: [art] Store in in slot 0x4
22,014,507 UART: [art] Derive Key Pair
22,015,551 UART: [art] Store priv key in slot 0x5
24,478,484 UART: [art] Derive Key Pair - Done
24,491,376 UART: [art] Signing Cert with AUTHO
24,492,688 UART: RITY.KEYID = 7
26,204,460 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,968 UART: [art] PUB.X = CD4ADE6CDD6D235E8F3267D877FE587C03E06F01D06E447BF453DA0C69A6FC495F47348A52F5B501DC09367FB5148610
26,213,203 UART: [art] PUB.Y = 3E9C9B328EEE5FA7182B4897031CB88051975FECDF8C1DAC5BA6CC9FCF3D8273D80D5B226DE54E08EF7374989B9F3EB1
26,220,474 UART: [art] SIG.R = 02352FCF22C6BDDA18CBE18C8A77830940241C90D9CB2256825A629B7B152A6833D71A4A9B109883D8A491CD64208660
26,227,907 UART: [art] SIG.S = 504C6DAEAA036646A3ADF4200CE7BFAA867AF1C87BC4FFB8E19488E279602B488868E8BEF2928E1FEC32D851D3352D73
27,207,137 UART: Caliptra RT
27,207,826 UART: [state] CFI Enabled
27,372,795 UART: [rt] RT listening for mailbox commands...
31,408,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,564,730 UART: [rt]cmd =0x41544d4e, len=14344
36,420,016 >>> mbox cmd response data (8 bytes)
36,423,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,453,911 UART: [rt]cmd =0x494e464f, len=4
36,458,227 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,689 writing to cptra_bootfsm_go
192,934 UART:
193,301 UART: Running Caliptra ROM ...
194,496 UART:
604,226 UART: [state] CFI Enabled
618,608 UART: [state] LifecycleState = Unprovisioned
621,003 UART: [state] DebugLocked = No
622,762 UART: [state] WD Timer not started. Device not locked for debugging
627,874 UART: [kat] SHA2-256
817,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,573 UART: [kat] ++
829,060 UART: [kat] sha1
839,232 UART: [kat] SHA2-256
842,243 UART: [kat] SHA2-384
849,318 UART: [kat] SHA2-512-ACC
851,899 UART: [kat] ECC-384
3,294,835 UART: [kat] HMAC-384Kdf
3,307,725 UART: [kat] LMS
3,839,547 UART: [kat] --
3,843,677 UART: [cold-reset] ++
3,845,818 UART: [fht] FHT @ 0x50003400
3,857,647 UART: [idev] ++
3,858,358 UART: [idev] CDI.KEYID = 6
3,859,311 UART: [idev] SUBJECT.KEYID = 7
3,860,482 UART: [idev] UDS.KEYID = 0
3,861,452 ready_for_fw is high
3,861,664 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,034 UART: [idev] Erasing UDS.KEYID = 0
6,331,499 UART: [idev] Sha1 KeyId Algorithm
6,353,813 UART: [idev] --
6,358,688 UART: [ldev] ++
6,359,370 UART: [ldev] CDI.KEYID = 6
6,360,281 UART: [ldev] SUBJECT.KEYID = 5
6,361,489 UART: [ldev] AUTHORITY.KEYID = 7
6,362,719 UART: [ldev] FE.KEYID = 1
6,374,991 UART: [ldev] Erasing FE.KEYID = 1
8,858,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,433 UART: [ldev] --
10,651,863 UART: [fwproc] Wait for Commands...
10,653,742 UART: [fwproc] Recv command 0x46574c44
10,655,994 UART: [fwproc] Recv'd Img size: 114084 bytes
15,264,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,350,827 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,466,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,007,311 >>> mbox cmd response: success
16,011,700 UART: [afmc] ++
16,012,414 UART: [afmc] CDI.KEYID = 6
16,013,610 UART: [afmc] SUBJECT.KEYID = 7
16,015,056 UART: [afmc] AUTHORITY.KEYID = 5
18,515,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,237,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,239,122 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,254,202 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,269,387 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,284,215 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,307,303 UART: [afmc] --
20,311,123 UART: [cold-reset] --
20,316,352 UART: [state] Locking Datavault
20,322,657 UART: [state] Locking PCR0, PCR1 and PCR31
20,324,813 UART: [state] Locking ICCM
20,326,476 UART: [exit] Launching FMC @ 0x40000130
20,335,152 UART:
20,335,399 UART: Running Caliptra FMC ...
20,336,507 UART:
20,336,664 UART: [state] CFI Enabled
20,344,498 UART: [fht] FMC Alias Private Key: 7
22,101,953 UART: [art] Extend RT PCRs Done
22,103,172 UART: [art] Lock RT PCRs Done
22,104,730 UART: [art] Populate DV Done
22,109,758 UART: [fht] FMC Alias Private Key: 7
22,111,353 UART: [art] Derive CDI
22,112,092 UART: [art] Store in in slot 0x4
22,154,578 UART: [art] Derive Key Pair
22,155,617 UART: [art] Store priv key in slot 0x5
24,582,696 UART: [art] Derive Key Pair - Done
24,595,854 UART: [art] Signing Cert with AUTHO
24,597,162 UART: RITY.KEYID = 7
26,302,489 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,989 UART: [art] PUB.X = 0640529F5BD0EBF4198FAA819AAF7EAE5E9DECED26D7B087CF2787B45526E50932916913413801B24ACB8D6DF5844A6B
26,311,268 UART: [art] PUB.Y = 5387E2D6563BB3C5AF92CE1A012E96ECDAC5BBAB55EA8B409DB794BA7B98E9AEAD40E9F94B8DB259E18D154C4F455467
26,318,530 UART: [art] SIG.R = BB07224314FF6D3A2237C5C16E86581CF16BE6CA8BEC39E6FC24FB30E92E1B0A14D6DB4C875F1C5E4D915E700F9EF550
26,325,955 UART: [art] SIG.S = 7AEBF45E0592465B55D6F0701827C62B5501E40FAE41552E1B66C4CF541E2DB21F5BC94322306EDFB8DA61DFFFE5083D
27,304,958 UART: Caliptra RT
27,305,676 UART: [state] CFI Enabled
27,422,977 UART: [rt] RT listening for mailbox commands...
31,461,092 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,616,483 UART: [rt]cmd =0x41544d4e, len=14344
36,473,152 >>> mbox cmd response data (8 bytes)
36,476,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,506,302 UART: [rt]cmd =0x494e464f, len=4
36,510,610 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,648 writing to cptra_bootfsm_go
3,751,969 ready_for_fw is high
3,752,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,052,726 >>> mbox cmd response: success
20,305,429 UART:
20,305,817 UART: Running Caliptra FMC ...
20,307,017 UART:
20,307,193 UART: [state] CFI Enabled
20,314,653 UART: [fht] FMC Alias Private Key: 7
22,070,959 UART: [art] Extend RT PCRs Done
22,072,188 UART: [art] Lock RT PCRs Done
22,073,829 UART: [art] Populate DV Done
22,078,884 UART: [fht] FMC Alias Private Key: 7
22,080,599 UART: [art] Derive CDI
22,081,445 UART: [art] Store in in slot 0x4
22,124,596 UART: [art] Derive Key Pair
22,125,641 UART: [art] Store priv key in slot 0x5
24,553,125 UART: [art] Derive Key Pair - Done
24,565,962 UART: [art] Signing Cert with AUTHO
24,567,267 UART: RITY.KEYID = 7
26,272,905 UART: [art] Erasing AUTHORITY.KEYID = 7
26,274,417 UART: [art] PUB.X = 669CEA6A96D38351676D47726DF711F414FD6D4E6F8BFC728C6017B1A77048FC9082549E5E8D38B4EBCFDA027F487D83
26,281,665 UART: [art] PUB.Y = FFF8B9D8F61BC2D9A5D950EDA033BB807A05EB7358EDB55F3F672FA2F69898F7AE3F34C6AA5CC5CF0373B573911867D1
26,288,970 UART: [art] SIG.R = 2475BA5388C7A04D023DA31F85A76982D22E3D69B6FD23454865E7EB4D4175D825574CEF8B6ECEEC4203098C395B1EA6
26,296,364 UART: [art] SIG.S = F3323F8D78A8341CD07612080390C106723D236FCCC6ABD1CD753D023A2621FB8FAA645EF26D777D9BDBE850EE4C80F2
27,275,857 UART: Caliptra RT
27,276,553 UART: [state] CFI Enabled
27,394,499 UART: [rt] RT listening for mailbox commands...
31,428,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,583,534 UART: [rt]cmd =0x41544d4e, len=14344
36,449,508 >>> mbox cmd response data (8 bytes)
36,453,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,483,155 UART: [rt]cmd =0x494e464f, len=4
36,487,671 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,223 UART: [kat] SHA2-256
882,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,269 UART: [kat] ++
886,421 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,908 UART: [kat] HMAC-384Kdf
907,456 UART: [kat] LMS
1,475,652 UART: [kat] --
1,476,451 UART: [cold-reset] ++
1,476,999 UART: [fht] Storing FHT @ 0x50003400
1,479,762 UART: [idev] ++
1,479,930 UART: [idev] CDI.KEYID = 6
1,480,290 UART: [idev] SUBJECT.KEYID = 7
1,480,714 UART: [idev] UDS.KEYID = 0
1,481,059 ready_for_fw is high
1,481,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,868 UART: [idev] Erasing UDS.KEYID = 0
1,505,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,124 UART: [idev] --
1,515,149 UART: [ldev] ++
1,515,317 UART: [ldev] CDI.KEYID = 6
1,515,680 UART: [ldev] SUBJECT.KEYID = 5
1,516,106 UART: [ldev] AUTHORITY.KEYID = 7
1,516,569 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,082 UART: [ldev] --
1,586,447 UART: [fwproc] Waiting for Commands...
1,587,266 UART: [fwproc] Received command 0x46574c44
1,588,057 UART: [fwproc] Received Image of size 114084 bytes
4,929,081 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,957,033 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
4,986,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,121,942 >>> mbox cmd response: success
5,123,016 UART: [afmc] ++
5,123,184 UART: [afmc] CDI.KEYID = 6
5,123,546 UART: [afmc] SUBJECT.KEYID = 7
5,123,971 UART: [afmc] AUTHORITY.KEYID = 5
5,159,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,175,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,175,895 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,181,604 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,187,496 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,193,197 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,200,873 UART: [afmc] --
5,201,775 UART: [cold-reset] --
5,202,619 UART: [state] Locking Datavault
5,203,856 UART: [state] Locking PCR0, PCR1 and PCR31
5,204,460 UART: [state] Locking ICCM
5,204,946 UART: [exit] Launching FMC @ 0x40000130
5,210,275 UART:
5,210,291 UART: Running Caliptra FMC ...
5,210,699 UART:
5,210,753 UART: [state] CFI Enabled
5,221,163 UART: [fht] FMC Alias Private Key: 7
5,328,593 UART: [art] Extend RT PCRs Done
5,329,021 UART: [art] Lock RT PCRs Done
5,330,331 UART: [art] Populate DV Done
5,338,173 UART: [fht] FMC Alias Private Key: 7
5,339,251 UART: [art] Derive CDI
5,339,531 UART: [art] Store in in slot 0x4
5,424,888 UART: [art] Derive Key Pair
5,425,248 UART: [art] Store priv key in slot 0x5
5,437,802 UART: [art] Derive Key Pair - Done
5,452,533 UART: [art] Signing Cert with AUTHO
5,453,013 UART: RITY.KEYID = 7
5,467,805 UART: [art] Erasing AUTHORITY.KEYID = 7
5,468,570 UART: [art] PUB.X = 50EB29C6433DC38E51E810791BFA16C6FD8CD0F0766BD13728FCD11BC2453CAB096F97798AE43277196F12830F16576B
5,475,336 UART: [art] PUB.Y = 18EF04A8B87F30D32F4972F5C75568B9F71A223D14FA1F2C3F77B533A291FF28408DA24BFF46437EAA7C8BA57E60E426
5,482,291 UART: [art] SIG.R = C6065C8DA57AFEA4096FE4683336D290DB5D29DD4BD3B2DFEF7DE868FB3682DAEF5364E5E8EC8EEA2674874CA46198B1
5,489,075 UART: [art] SIG.S = 9B002AF287ECAAF1934416C35A8E11A86DEDDF7DADFB0BD7780F5F1ED928A3504F33B03F47F74901548987EC9FE49F32
5,512,731 UART: Caliptra RT
5,512,984 UART: [state] CFI Enabled
5,621,442 UART: [rt] RT listening for mailbox commands...
5,622,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,744,842 UART: [rt]cmd =0x41544d4e, len=14344
7,136,067 >>> mbox cmd response data (8 bytes)
7,136,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,165,389 UART: [rt]cmd =0x494e464f, len=4
7,169,176 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,843 ready_for_fw is high
1,362,843 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,085,181 >>> mbox cmd response: success
5,146,318 UART:
5,146,334 UART: Running Caliptra FMC ...
5,146,742 UART:
5,146,796 UART: [state] CFI Enabled
5,157,700 UART: [fht] FMC Alias Private Key: 7
5,265,416 UART: [art] Extend RT PCRs Done
5,265,844 UART: [art] Lock RT PCRs Done
5,267,540 UART: [art] Populate DV Done
5,275,734 UART: [fht] FMC Alias Private Key: 7
5,276,836 UART: [art] Derive CDI
5,277,116 UART: [art] Store in in slot 0x4
5,362,487 UART: [art] Derive Key Pair
5,362,847 UART: [art] Store priv key in slot 0x5
5,375,697 UART: [art] Derive Key Pair - Done
5,390,282 UART: [art] Signing Cert with AUTHO
5,390,762 UART: RITY.KEYID = 7
5,406,036 UART: [art] Erasing AUTHORITY.KEYID = 7
5,406,801 UART: [art] PUB.X = 665FFA0A51938FCD6CB6EBAFFA09DD4370FDF79A2E631BE4973621AB6E71E1BDCE6BCBBC1AD7B832A66A1385E7370481
5,413,586 UART: [art] PUB.Y = 523B163B5492A9CEA8D1951BD874550B2D7E89E7529841E218C350D1E58D03DD861B8ECABCF0110FEB6ACB03736CCFDC
5,420,538 UART: [art] SIG.R = 83E9CE3B7FC5CC5F63067D012517D88F857EE12A4ABE5B629001DBDB64C06B17B7D6A556C992ECB7295E22F1CD5CCD5F
5,427,317 UART: [art] SIG.S = 1FAF25C960F50766F4F68FFE4AAA2A79984433468AD6734681C68E797F0B29A4E0D9B3B12E54C4542219342C35C4A8D6
5,451,484 UART: Caliptra RT
5,451,737 UART: [state] CFI Enabled
5,559,438 UART: [rt] RT listening for mailbox commands...
5,560,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,683,100 UART: [rt]cmd =0x41544d4e, len=14344
7,067,138 >>> mbox cmd response data (8 bytes)
7,067,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,384 UART: [rt]cmd =0x494e464f, len=4
7,100,221 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,839 UART: [state] LifecycleState = Unprovisioned
85,494 UART: [state] DebugLocked = No
86,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,750 UART: [kat] SHA2-256
881,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,796 UART: [kat] ++
885,948 UART: [kat] sha1
890,220 UART: [kat] SHA2-256
892,158 UART: [kat] SHA2-384
894,937 UART: [kat] SHA2-512-ACC
896,838 UART: [kat] ECC-384
902,585 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,655 UART: [idev] ++
1,479,823 UART: [idev] CDI.KEYID = 6
1,480,183 UART: [idev] SUBJECT.KEYID = 7
1,480,607 UART: [idev] UDS.KEYID = 0
1,480,952 ready_for_fw is high
1,480,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,861 UART: [idev] Erasing UDS.KEYID = 0
1,505,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,193 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,522,000 UART: [ldev] Erasing FE.KEYID = 1
1,547,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,431 UART: [ldev] --
1,586,710 UART: [fwproc] Waiting for Commands...
1,587,373 UART: [fwproc] Received command 0x46574c44
1,588,164 UART: [fwproc] Received Image of size 114084 bytes
4,968,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,996,201 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,025,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,160,974 >>> mbox cmd response: success
5,162,012 UART: [afmc] ++
5,162,180 UART: [afmc] CDI.KEYID = 6
5,162,542 UART: [afmc] SUBJECT.KEYID = 7
5,162,967 UART: [afmc] AUTHORITY.KEYID = 5
5,198,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,214,651 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,215,431 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,221,140 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,227,032 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,232,733 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,240,629 UART: [afmc] --
5,241,585 UART: [cold-reset] --
5,242,395 UART: [state] Locking Datavault
5,243,620 UART: [state] Locking PCR0, PCR1 and PCR31
5,244,224 UART: [state] Locking ICCM
5,244,818 UART: [exit] Launching FMC @ 0x40000130
5,250,147 UART:
5,250,163 UART: Running Caliptra FMC ...
5,250,571 UART:
5,250,714 UART: [state] CFI Enabled
5,261,456 UART: [fht] FMC Alias Private Key: 7
5,369,670 UART: [art] Extend RT PCRs Done
5,370,098 UART: [art] Lock RT PCRs Done
5,371,582 UART: [art] Populate DV Done
5,379,860 UART: [fht] FMC Alias Private Key: 7
5,380,802 UART: [art] Derive CDI
5,381,082 UART: [art] Store in in slot 0x4
5,466,757 UART: [art] Derive Key Pair
5,467,117 UART: [art] Store priv key in slot 0x5
5,480,059 UART: [art] Derive Key Pair - Done
5,494,411 UART: [art] Signing Cert with AUTHO
5,494,891 UART: RITY.KEYID = 7
5,509,933 UART: [art] Erasing AUTHORITY.KEYID = 7
5,510,698 UART: [art] PUB.X = 4C609A58586FA2040DFE24A4B024986322AE66769B06F8869A9D9A301D70A5FC710E8A6E6B7A2C1E3591CE84669E10B7
5,517,456 UART: [art] PUB.Y = 448059847F3267EDD153133ABA0FF22A6D8280AC563BA57257265536F263CAE5A0F593DF265F8E2E45A925B1447EF7B9
5,524,403 UART: [art] SIG.R = 82651369E5D7DE8C447FD42DAE746EAFC2629BB69EFBE14ACE085FA98B804E5649D713C41C0F3F60E216AFB2E575EBD4
5,531,185 UART: [art] SIG.S = 7A1D1B9EB2C598FC5EAA04D77606F1EA9A5D7105933A2E668E5F918666587A01E05D7B667309042FB8A89E3EBE2FC13E
5,553,728 UART: Caliptra RT
5,554,073 UART: [state] CFI Enabled
5,662,422 UART: [rt] RT listening for mailbox commands...
5,663,092 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,082 UART: [rt]cmd =0x41544d4e, len=14344
7,182,183 >>> mbox cmd response data (8 bytes)
7,182,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,211,471 UART: [rt]cmd =0x494e464f, len=4
7,215,144 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,776 ready_for_fw is high
1,362,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,160,756 >>> mbox cmd response: success
5,221,977 UART:
5,221,993 UART: Running Caliptra FMC ...
5,222,401 UART:
5,222,544 UART: [state] CFI Enabled
5,233,164 UART: [fht] FMC Alias Private Key: 7
5,341,206 UART: [art] Extend RT PCRs Done
5,341,634 UART: [art] Lock RT PCRs Done
5,343,062 UART: [art] Populate DV Done
5,351,420 UART: [fht] FMC Alias Private Key: 7
5,352,510 UART: [art] Derive CDI
5,352,790 UART: [art] Store in in slot 0x4
5,438,547 UART: [art] Derive Key Pair
5,438,907 UART: [art] Store priv key in slot 0x5
5,452,019 UART: [art] Derive Key Pair - Done
5,467,047 UART: [art] Signing Cert with AUTHO
5,467,527 UART: RITY.KEYID = 7
5,482,625 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,390 UART: [art] PUB.X = 7C8220EBA33F51302ABA068862C9E1CC96AD48EC837425E737BE8660EAA7A6FB3A6F538AC3C4CA240E640D21A0030EA8
5,490,157 UART: [art] PUB.Y = F8747DC43FEB58C9DF34C4E50528ACA9CE79109B33000E686A2E081550C8207407640D152C9A8C156770FB0052A0231D
5,497,044 UART: [art] SIG.R = 2524C94F47CCCAD06CBA0875D419174F0FB869DF25D7A6DA724266E2276BACC5270F2C42D8C091DE3BF5E4C84A3C3E4F
5,503,821 UART: [art] SIG.S = 62D19A68AD8442FACBB8E8014D8C4CD2EE2E33F849F1AECE93F03EDB18A9ED276010038B921767540EDCD53B4CE7FB0E
5,527,310 UART: Caliptra RT
5,527,655 UART: [state] CFI Enabled
5,636,215 UART: [rt] RT listening for mailbox commands...
5,636,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,161 UART: [rt]cmd =0x41544d4e, len=14344
7,155,898 >>> mbox cmd response data (8 bytes)
7,155,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,185,254 UART: [rt]cmd =0x494e464f, len=4
7,188,805 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,484 UART: [kat] SHA2-512-ACC
908,385 UART: [kat] ECC-384
918,168 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,335 UART: [fht] FHT @ 0x50003400
1,174,992 UART: [idev] ++
1,175,160 UART: [idev] CDI.KEYID = 6
1,175,520 UART: [idev] SUBJECT.KEYID = 7
1,175,944 UART: [idev] UDS.KEYID = 0
1,176,289 ready_for_fw is high
1,176,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,584 UART: [idev] Erasing UDS.KEYID = 0
1,201,481 UART: [idev] Sha1 KeyId Algorithm
1,209,955 UART: [idev] --
1,211,013 UART: [ldev] ++
1,211,181 UART: [ldev] CDI.KEYID = 6
1,211,544 UART: [ldev] SUBJECT.KEYID = 5
1,211,970 UART: [ldev] AUTHORITY.KEYID = 7
1,212,433 UART: [ldev] FE.KEYID = 1
1,217,731 UART: [ldev] Erasing FE.KEYID = 1
1,244,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,047 UART: [ldev] --
1,283,308 UART: [fwproc] Wait for Commands...
1,283,972 UART: [fwproc] Recv command 0x46574c44
1,284,700 UART: [fwproc] Recv'd Img size: 114084 bytes
3,111,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,139,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,168,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,303,814 >>> mbox cmd response: success
3,304,854 UART: [afmc] ++
3,305,022 UART: [afmc] CDI.KEYID = 6
3,305,384 UART: [afmc] SUBJECT.KEYID = 7
3,305,809 UART: [afmc] AUTHORITY.KEYID = 5
3,341,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,357,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,358,314 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,364,023 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,369,915 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,375,626 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,383,499 UART: [afmc] --
3,384,473 UART: [cold-reset] --
3,385,429 UART: [state] Locking Datavault
3,386,468 UART: [state] Locking PCR0, PCR1 and PCR31
3,387,072 UART: [state] Locking ICCM
3,387,590 UART: [exit] Launching FMC @ 0x40000130
3,392,919 UART:
3,392,935 UART: Running Caliptra FMC ...
3,393,343 UART:
3,393,397 UART: [state] CFI Enabled
3,403,699 UART: [fht] FMC Alias Private Key: 7
3,511,155 UART: [art] Extend RT PCRs Done
3,511,583 UART: [art] Lock RT PCRs Done
3,513,321 UART: [art] Populate DV Done
3,521,851 UART: [fht] FMC Alias Private Key: 7
3,522,917 UART: [art] Derive CDI
3,523,197 UART: [art] Store in in slot 0x4
3,609,148 UART: [art] Derive Key Pair
3,609,508 UART: [art] Store priv key in slot 0x5
3,622,748 UART: [art] Derive Key Pair - Done
3,637,436 UART: [art] Signing Cert with AUTHO
3,637,916 UART: RITY.KEYID = 7
3,653,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,249 UART: [art] PUB.X = 9988D76DB9505334666C8D5983C7DADF2016ACCB209046B5065B583186BA6E75B671827860C276257FC0DFB25CA367C0
3,661,012 UART: [art] PUB.Y = F26752E939C5489391429E0E2EB16B96886403911AF8D36CF64866310AC951C06537281552C47B0424F295D7BD6588A8
3,667,934 UART: [art] SIG.R = E248F75526D31087B07AEFFC757231AB7EC9A26194AFC55A52FCD2867445510B7C9B1640F495490D3C002BE374B695CE
3,674,678 UART: [art] SIG.S = 460C2B7197E885BBE5622925AA5B544FB3322DBF0E37E02811754258DA0F4B0D44E0C16DE393FFC39E482FA5656EE48E
3,698,137 UART: Caliptra RT
3,698,390 UART: [state] CFI Enabled
3,805,988 UART: [rt] RT listening for mailbox commands...
3,806,658 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,352 UART: [rt]cmd =0x41544d4e, len=14344
5,335,297 >>> mbox cmd response data (8 bytes)
5,335,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,364,731 UART: [rt]cmd =0x494e464f, len=4
5,368,528 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 ready_for_fw is high
1,060,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,176,376 >>> mbox cmd response: success
3,238,103 UART:
3,238,119 UART: Running Caliptra FMC ...
3,238,527 UART:
3,238,581 UART: [state] CFI Enabled
3,249,143 UART: [fht] FMC Alias Private Key: 7
3,356,055 UART: [art] Extend RT PCRs Done
3,356,483 UART: [art] Lock RT PCRs Done
3,357,929 UART: [art] Populate DV Done
3,366,013 UART: [fht] FMC Alias Private Key: 7
3,367,151 UART: [art] Derive CDI
3,367,431 UART: [art] Store in in slot 0x4
3,453,118 UART: [art] Derive Key Pair
3,453,478 UART: [art] Store priv key in slot 0x5
3,466,668 UART: [art] Derive Key Pair - Done
3,481,740 UART: [art] Signing Cert with AUTHO
3,482,220 UART: RITY.KEYID = 7
3,497,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,425 UART: [art] PUB.X = D6E97A626141F231CF0F7FFC39307B8966558FCF07EEDE1DE628A3119F3ECD3D50AB1158C8188344912C429D2D7AC6D7
3,505,197 UART: [art] PUB.Y = 4887BCD95E8A2568876F2C3C6BD3B12A89A7DE92E7D31B9F97AE19728E64DB177DAD8E58305DBE06CC170C1009D9A6FE
3,512,152 UART: [art] SIG.R = 86EA7E0F29A91F7EB6DBF735D4A0A4BDF9219FF97D6D516F002BED7A42CF077A2C2EFB673A313B4E82B9D3F6E565B121
3,518,914 UART: [art] SIG.S = F8E1B4F3870210B5871051B6839E746ABD7263EDD32F4F8E5A3A80741A4E1EFBB7AA3E04B239DAFA700F381077368617
3,542,460 UART: Caliptra RT
3,542,713 UART: [state] CFI Enabled
3,650,180 UART: [rt] RT listening for mailbox commands...
3,650,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,034 UART: [rt]cmd =0x41544d4e, len=14344
5,175,365 >>> mbox cmd response data (8 bytes)
5,175,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,204,565 UART: [rt]cmd =0x494e464f, len=4
5,208,392 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,031 UART: [state] LifecycleState = Unprovisioned
86,686 UART: [state] DebugLocked = No
87,292 UART: [state] WD Timer not started. Device not locked for debugging
88,489 UART: [kat] SHA2-256
894,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,264 UART: [kat] ++
898,416 UART: [kat] sha1
902,542 UART: [kat] SHA2-256
904,482 UART: [kat] SHA2-384
907,139 UART: [kat] SHA2-512-ACC
909,040 UART: [kat] ECC-384
919,099 UART: [kat] HMAC-384Kdf
923,599 UART: [kat] LMS
1,171,927 UART: [kat] --
1,172,672 UART: [cold-reset] ++
1,173,104 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 ready_for_fw is high
1,177,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,647 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,210,198 UART: [idev] --
1,211,130 UART: [ldev] ++
1,211,298 UART: [ldev] CDI.KEYID = 6
1,211,661 UART: [ldev] SUBJECT.KEYID = 5
1,212,087 UART: [ldev] AUTHORITY.KEYID = 7
1,212,550 UART: [ldev] FE.KEYID = 1
1,217,950 UART: [ldev] Erasing FE.KEYID = 1
1,244,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,274 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,321 UART: [fwproc] Recv command 0x46574c44
1,285,049 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,319,245 >>> mbox cmd response: success
3,320,259 UART: [afmc] ++
3,320,427 UART: [afmc] CDI.KEYID = 6
3,320,789 UART: [afmc] SUBJECT.KEYID = 7
3,321,214 UART: [afmc] AUTHORITY.KEYID = 5
3,357,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,483 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,192 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,084 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,795 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,462 UART: [afmc] --
3,400,486 UART: [cold-reset] --
3,401,356 UART: [state] Locking Datavault
3,402,637 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,241 UART: [state] Locking ICCM
3,403,761 UART: [exit] Launching FMC @ 0x40000130
3,409,090 UART:
3,409,106 UART: Running Caliptra FMC ...
3,409,514 UART:
3,409,657 UART: [state] CFI Enabled
3,420,539 UART: [fht] FMC Alias Private Key: 7
3,528,097 UART: [art] Extend RT PCRs Done
3,528,525 UART: [art] Lock RT PCRs Done
3,530,009 UART: [art] Populate DV Done
3,538,317 UART: [fht] FMC Alias Private Key: 7
3,539,419 UART: [art] Derive CDI
3,539,699 UART: [art] Store in in slot 0x4
3,625,838 UART: [art] Derive Key Pair
3,626,198 UART: [art] Store priv key in slot 0x5
3,639,634 UART: [art] Derive Key Pair - Done
3,654,088 UART: [art] Signing Cert with AUTHO
3,654,568 UART: RITY.KEYID = 7
3,669,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,679 UART: [art] PUB.X = A244CE4DE9D7EEC277C444DF63B253A757F1290355FD6F518CCB123C5DDEA360A0A6827BE660C556B9C5761519BCE65B
3,677,458 UART: [art] PUB.Y = 197F1670E73B5E90D8E745D87355648C286AD053A1F328E87A4DD7FE0E9474642A95C98D6156C149E1AAADDE68021EDA
3,684,406 UART: [art] SIG.R = 7F3B665D2D1232E6657027E698F9A21F176704CF8954D9C31E4984965143F352CFD16AE9B333B3C9EE7C045C61F10F66
3,691,163 UART: [art] SIG.S = 2497BFF4304364ADBB0F215CC1BF502F88B60756975DC608E7B683D22DC1D8CBC67153E4FF008FD306E99B22FC3C0D1C
3,714,937 UART: Caliptra RT
3,715,282 UART: [state] CFI Enabled
3,823,033 UART: [rt] RT listening for mailbox commands...
3,823,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,969 UART: [rt]cmd =0x41544d4e, len=14344
5,354,851 >>> mbox cmd response data (8 bytes)
5,354,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,384,001 UART: [rt]cmd =0x494e464f, len=4
5,387,638 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,074 ready_for_fw is high
1,061,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,169,678 >>> mbox cmd response: success
3,232,269 UART:
3,232,285 UART: Running Caliptra FMC ...
3,232,693 UART:
3,232,836 UART: [state] CFI Enabled
3,243,374 UART: [fht] FMC Alias Private Key: 7
3,351,282 UART: [art] Extend RT PCRs Done
3,351,710 UART: [art] Lock RT PCRs Done
3,353,452 UART: [art] Populate DV Done
3,361,784 UART: [fht] FMC Alias Private Key: 7
3,362,744 UART: [art] Derive CDI
3,363,024 UART: [art] Store in in slot 0x4
3,448,739 UART: [art] Derive Key Pair
3,449,099 UART: [art] Store priv key in slot 0x5
3,462,611 UART: [art] Derive Key Pair - Done
3,477,234 UART: [art] Signing Cert with AUTHO
3,477,714 UART: RITY.KEYID = 7
3,492,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,657 UART: [art] PUB.X = 0A5ED5F98A557AD7813AA469A2C9EA40AC7E18F2E05C8F094B6415FC7B6654799FE819DE28764104A690F545C40F6ADA
3,500,423 UART: [art] PUB.Y = 0ECD45948082484243AB3A10010163B50E8E0626D0D4C0104257868F700C089DC6773308FBD5F0E65ACDFDF87195E82E
3,507,345 UART: [art] SIG.R = 50DE8FC23B0AD4DEA3EF8D2AA8D4FE4F425D28824792A42997000879AE3F5B2146AA8298A0CD664A79AE9D586776658E
3,514,095 UART: [art] SIG.S = 3F060A7A8930FC6E08CE15813C97FFAEFEBAC08D6203A13A849A0A400FBD3B831D97EF7F82E3B3B8100F5A8CE3F65A01
3,538,090 UART: Caliptra RT
3,538,435 UART: [state] CFI Enabled
3,646,112 UART: [rt] RT listening for mailbox commands...
3,646,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,748 UART: [rt]cmd =0x41544d4e, len=14344
5,170,323 >>> mbox cmd response data (8 bytes)
5,170,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,199,689 UART: [rt]cmd =0x494e464f, len=4
5,203,358 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,424 UART: [kat] LMS
1,168,736 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,341 UART: [idev] ++
1,172,509 UART: [idev] CDI.KEYID = 6
1,172,870 UART: [idev] SUBJECT.KEYID = 7
1,173,295 UART: [idev] UDS.KEYID = 0
1,173,641 ready_for_fw is high
1,173,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,311 UART: [idev] Erasing UDS.KEYID = 0
1,197,769 UART: [idev] Sha1 KeyId Algorithm
1,206,705 UART: [idev] --
1,207,580 UART: [ldev] ++
1,207,748 UART: [ldev] CDI.KEYID = 6
1,208,112 UART: [ldev] SUBJECT.KEYID = 5
1,208,539 UART: [ldev] AUTHORITY.KEYID = 7
1,209,002 UART: [ldev] FE.KEYID = 1
1,213,864 UART: [ldev] Erasing FE.KEYID = 1
1,240,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,060 UART: [ldev] --
1,279,508 UART: [fwproc] Wait for Commands...
1,280,225 UART: [fwproc] Recv command 0x46574c44
1,280,958 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,310,717 >>> mbox cmd response: success
3,311,808 UART: [afmc] ++
3,311,976 UART: [afmc] CDI.KEYID = 6
3,312,339 UART: [afmc] SUBJECT.KEYID = 7
3,312,765 UART: [afmc] AUTHORITY.KEYID = 5
3,347,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,008 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,718 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,608 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,319 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,235 UART: [afmc] --
3,391,167 UART: [cold-reset] --
3,391,983 UART: [state] Locking Datavault
3,393,084 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,688 UART: [state] Locking ICCM
3,394,192 UART: [exit] Launching FMC @ 0x40000130
3,399,521 UART:
3,399,537 UART: Running Caliptra FMC ...
3,399,945 UART:
3,399,999 UART: [state] CFI Enabled
3,410,777 UART: [fht] FMC Alias Private Key: 7
3,517,947 UART: [art] Extend RT PCRs Done
3,518,375 UART: [art] Lock RT PCRs Done
3,519,915 UART: [art] Populate DV Done
3,528,507 UART: [fht] FMC Alias Private Key: 7
3,529,653 UART: [art] Derive CDI
3,529,933 UART: [art] Store in in slot 0x4
3,615,342 UART: [art] Derive Key Pair
3,615,702 UART: [art] Store priv key in slot 0x5
3,628,476 UART: [art] Derive Key Pair - Done
3,643,182 UART: [art] Signing Cert with AUTHO
3,643,662 UART: RITY.KEYID = 7
3,659,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,925 UART: [art] PUB.X = 8F0057838C2B0B762C39BBFF04B56E00CAD9A4E8DB28EAD1907E5612B7A16E081A380407C995FB8C0E8FE3FFD425A122
3,666,645 UART: [art] PUB.Y = CB719437DA64A0C45A8CA3C52AFB8FF07B6516E6CA160BC7F0804645DF8F403E5922E13D872CC233F4189369F010B44F
3,673,598 UART: [art] SIG.R = 3FDEBD49160F03F39A76329FCD5D3DE5A4FAC1FE06B8C47D4CA2AD94F8EC67EE7FF00CB40D21495B3A0848734E91B445
3,680,370 UART: [art] SIG.S = ED4853F98DFF3E4ABBE0960081211AC3CFA5E4221E01D148C4656E5B0976C85EFA765F1668CC739883A599B6361251E3
3,704,711 UART: Caliptra RT
3,704,964 UART: [state] CFI Enabled
3,812,630 UART: [rt] RT listening for mailbox commands...
3,813,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,540 UART: [rt]cmd =0x41544d4e, len=14344
5,336,969 >>> mbox cmd response data (8 bytes)
5,336,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,366,387 UART: [rt]cmd =0x494e464f, len=4
5,370,074 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,174 ready_for_fw is high
1,056,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,159,059 >>> mbox cmd response: success
3,221,218 UART:
3,221,234 UART: Running Caliptra FMC ...
3,221,642 UART:
3,221,696 UART: [state] CFI Enabled
3,232,140 UART: [fht] FMC Alias Private Key: 7
3,339,718 UART: [art] Extend RT PCRs Done
3,340,146 UART: [art] Lock RT PCRs Done
3,341,834 UART: [art] Populate DV Done
3,350,402 UART: [fht] FMC Alias Private Key: 7
3,351,366 UART: [art] Derive CDI
3,351,646 UART: [art] Store in in slot 0x4
3,437,307 UART: [art] Derive Key Pair
3,437,667 UART: [art] Store priv key in slot 0x5
3,450,759 UART: [art] Derive Key Pair - Done
3,465,772 UART: [art] Signing Cert with AUTHO
3,466,252 UART: RITY.KEYID = 7
3,481,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,193 UART: [art] PUB.X = B2FB5A0B925956185333CDACC0198833A5E466330726F235FDA9B4FCBF39AA81E575E8C5718350E8991E650928567565
3,488,948 UART: [art] PUB.Y = D6DB9296365C3B5A9D83485D2A8490B5C747FB6216991B76A518F11B1FF5A6D02C9F5D70BBAFAAEEC45B998B74F1930A
3,495,907 UART: [art] SIG.R = 70E15883E8E438103DEDC83F704BC51E283720C20D43F424CB11CD0DD13F401BE9B6D66F20EF172367F9FB432C530D06
3,502,669 UART: [art] SIG.S = 534E05729359E010AF5EE11F4F19F390BFB5E2556C46CE7649CB785D15CAFB6A87D65BA090549BE682F53B34E1CFAE8C
3,526,911 UART: Caliptra RT
3,527,164 UART: [state] CFI Enabled
3,634,569 UART: [rt] RT listening for mailbox commands...
3,635,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,315 UART: [rt]cmd =0x41544d4e, len=14344
5,153,820 >>> mbox cmd response data (8 bytes)
5,153,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,183,266 UART: [rt]cmd =0x494e464f, len=4
5,186,835 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,805 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,169,994 UART: [fht] FHT @ 0x50003400
1,172,718 UART: [idev] ++
1,172,886 UART: [idev] CDI.KEYID = 6
1,173,247 UART: [idev] SUBJECT.KEYID = 7
1,173,672 UART: [idev] UDS.KEYID = 0
1,174,018 ready_for_fw is high
1,174,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,718 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,703 UART: [ldev] ++
1,208,871 UART: [ldev] CDI.KEYID = 6
1,209,235 UART: [ldev] SUBJECT.KEYID = 5
1,209,662 UART: [ldev] AUTHORITY.KEYID = 7
1,210,125 UART: [ldev] FE.KEYID = 1
1,215,301 UART: [ldev] Erasing FE.KEYID = 1
1,241,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,049 UART: [ldev] --
1,280,507 UART: [fwproc] Wait for Commands...
1,281,296 UART: [fwproc] Recv command 0x46574c44
1,282,029 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,362 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,309,902 >>> mbox cmd response: success
3,310,947 UART: [afmc] ++
3,311,115 UART: [afmc] CDI.KEYID = 6
3,311,478 UART: [afmc] SUBJECT.KEYID = 7
3,311,904 UART: [afmc] AUTHORITY.KEYID = 5
3,347,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,929 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,639 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,529 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,240 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,920 UART: [afmc] --
3,390,900 UART: [cold-reset] --
3,391,546 UART: [state] Locking Datavault
3,392,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,141 UART: [state] Locking ICCM
3,393,563 UART: [exit] Launching FMC @ 0x40000130
3,398,892 UART:
3,398,908 UART: Running Caliptra FMC ...
3,399,316 UART:
3,399,459 UART: [state] CFI Enabled
3,410,353 UART: [fht] FMC Alias Private Key: 7
3,517,863 UART: [art] Extend RT PCRs Done
3,518,291 UART: [art] Lock RT PCRs Done
3,519,947 UART: [art] Populate DV Done
3,528,151 UART: [fht] FMC Alias Private Key: 7
3,529,167 UART: [art] Derive CDI
3,529,447 UART: [art] Store in in slot 0x4
3,615,040 UART: [art] Derive Key Pair
3,615,400 UART: [art] Store priv key in slot 0x5
3,628,286 UART: [art] Derive Key Pair - Done
3,643,130 UART: [art] Signing Cert with AUTHO
3,643,610 UART: RITY.KEYID = 7
3,658,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,339 UART: [art] PUB.X = 66B198E2B156E8C544753EB5F6BC323033013E7A950331A54F9C914F2E241AC8B85B0D014EE13A6B965509F46930906D
3,666,088 UART: [art] PUB.Y = 214DF2EBD1403C6DD8BEDA5DAFFBB7F162AACF69421B2BE8D9BF075D640B1865BD08574582CD5C60FB30207A08A45CA9
3,673,048 UART: [art] SIG.R = E1469881B5DEA94B6585A51D4D9FCB129BDF7F2AFA6960920B4420E0A0EC6A3F115040EA190FD0397457B821E6CB201C
3,679,820 UART: [art] SIG.S = B40F3A948301CD88558C574A845652A9E6A7CE4F0644D89E9DCC5F7B4C420E8F36FE82624A7FE5F63F3B6D8168526080
3,703,661 UART: Caliptra RT
3,704,006 UART: [state] CFI Enabled
3,811,311 UART: [rt] RT listening for mailbox commands...
3,811,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,847 UART: [rt]cmd =0x41544d4e, len=14344
5,343,175 >>> mbox cmd response data (8 bytes)
5,343,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,372,705 UART: [rt]cmd =0x494e464f, len=4
5,376,578 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,075 ready_for_fw is high
1,057,075 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,855 >>> mbox cmd response: success
3,222,200 UART:
3,222,216 UART: Running Caliptra FMC ...
3,222,624 UART:
3,222,767 UART: [state] CFI Enabled
3,233,387 UART: [fht] FMC Alias Private Key: 7
3,341,211 UART: [art] Extend RT PCRs Done
3,341,639 UART: [art] Lock RT PCRs Done
3,342,999 UART: [art] Populate DV Done
3,351,211 UART: [fht] FMC Alias Private Key: 7
3,352,335 UART: [art] Derive CDI
3,352,615 UART: [art] Store in in slot 0x4
3,438,318 UART: [art] Derive Key Pair
3,438,678 UART: [art] Store priv key in slot 0x5
3,452,378 UART: [art] Derive Key Pair - Done
3,467,045 UART: [art] Signing Cert with AUTHO
3,467,525 UART: RITY.KEYID = 7
3,482,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,354 UART: [art] PUB.X = C5B4169B18FA8C80FBC440C64A2D507862BFD3D6C076E9DBF4C573A10CB5493F8622F066B3039D5409B4E148F05483C0
3,490,119 UART: [art] PUB.Y = 37651C57737CCA8071502FD30F96011957E4760716A6BBAC21474B2258450E48665EE31FF15FB343D15DC759FED42639
3,497,049 UART: [art] SIG.R = BF2ADEA3EE11A32E510588A8EF5C34D2C004A593799D8B5F26BAB3B33FA58CE9F3758E9DCCC05599B3599657A7A678EB
3,503,829 UART: [art] SIG.S = 54717CE0267085A410865CE5E5F4E73EA26E35287EA631F514311C602274365F1C61C56BE0D53011717AEF8F1B6CC37B
3,527,084 UART: Caliptra RT
3,527,429 UART: [state] CFI Enabled
3,634,603 UART: [rt] RT listening for mailbox commands...
3,635,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,369 UART: [rt]cmd =0x41544d4e, len=14344
5,149,448 >>> mbox cmd response data (8 bytes)
5,149,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,178,986 UART: [rt]cmd =0x494e464f, len=4
5,182,675 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,090 UART:
192,481 UART: Running Caliptra ROM ...
193,586 UART:
193,729 UART: [state] CFI Enabled
262,813 UART: [state] LifecycleState = Unprovisioned
264,748 UART: [state] DebugLocked = No
267,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,661 UART: [kat] SHA2-256
442,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,865 UART: [kat] ++
453,359 UART: [kat] sha1
463,951 UART: [kat] SHA2-256
466,602 UART: [kat] SHA2-384
471,669 UART: [kat] SHA2-512-ACC
474,038 UART: [kat] ECC-384
2,768,421 UART: [kat] HMAC-384Kdf
2,799,849 UART: [kat] LMS
3,990,138 UART: [kat] --
3,995,061 UART: [cold-reset] ++
3,997,351 UART: [fht] Storing FHT @ 0x50003400
4,008,191 UART: [idev] ++
4,008,763 UART: [idev] CDI.KEYID = 6
4,009,748 UART: [idev] SUBJECT.KEYID = 7
4,010,997 UART: [idev] UDS.KEYID = 0
4,012,058 ready_for_fw is high
4,012,258 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,725 UART: [idev] Erasing UDS.KEYID = 0
7,347,136 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,244 UART: [idev] --
7,373,159 UART: [ldev] ++
7,373,726 UART: [ldev] CDI.KEYID = 6
7,374,665 UART: [ldev] SUBJECT.KEYID = 5
7,375,952 UART: [ldev] AUTHORITY.KEYID = 7
7,377,109 UART: [ldev] FE.KEYID = 1
7,422,513 UART: [ldev] Erasing FE.KEYID = 1
10,751,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,145 UART: [ldev] --
13,114,678 UART: [fwproc] Waiting for Commands...
13,117,038 UART: [fwproc] Received command 0x46574c44
13,119,221 UART: [fwproc] Received Image of size 113760 bytes
21,916,526 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,000,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,069,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,385,779 >>> mbox cmd response: success
22,389,731 UART: [afmc] ++
22,390,328 UART: [afmc] CDI.KEYID = 6
22,391,218 UART: [afmc] SUBJECT.KEYID = 7
22,392,488 UART: [afmc] AUTHORITY.KEYID = 5
25,759,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,058,166 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,060,424 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,074,953 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,089,732 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,103,926 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,124,076 UART: [afmc] --
28,128,651 UART: [cold-reset] --
28,133,105 UART: [state] Locking Datavault
28,139,107 UART: [state] Locking PCR0, PCR1 and PCR31
28,140,868 UART: [state] Locking ICCM
28,142,398 UART: [exit] Launching FMC @ 0x40000130
28,150,755 UART:
28,150,992 UART: Running Caliptra FMC ...
28,152,022 UART:
28,152,172 UART: [state] CFI Enabled
28,219,920 UART: [fht] FMC Alias Private Key: 7
30,557,848 UART: [art] Extend RT PCRs Done
30,559,124 UART: [art] Lock RT PCRs Done
30,560,889 UART: [art] Populate DV Done
30,566,257 UART: [fht] FMC Alias Private Key: 7
30,567,741 UART: [art] Derive CDI
30,568,483 UART: [art] Store in in slot 0x4
30,629,151 UART: [art] Derive Key Pair
30,630,188 UART: [art] Store priv key in slot 0x5
33,922,800 UART: [art] Derive Key Pair - Done
33,935,965 UART: [art] Signing Cert with AUTHO
33,937,267 UART: RITY.KEYID = 7
36,224,458 UART: [art] Erasing AUTHORITY.KEYID = 7
36,225,968 UART: [art] PUB.X = 29360730914CF1875BF3246FAE0742200AE97CBA3FB37F845BDBD2106FD9BA81384FE2062FD6BB97300DAC07D6722FB0
36,233,228 UART: [art] PUB.Y = 38C92DE9C5F28F8BBB47E33D5F6E988BCC45A85F3323C590EC7F84C59C291A5780E07BBB53CB1624D42F583FC8E7D02C
36,240,465 UART: [art] SIG.R = 3B1FCD299370858F208BD75E54926B66BD6AAB24A13F955B87BD5291DF9070539C9E7709CE0228022043C188524A90B9
36,247,851 UART: [art] SIG.S = 2454ACD0FF8FB462F1B316570819655288CA953C120BD0DE0800485F75F3814F3F62F5148661F75A0E92077506ACEB3B
37,553,164 UART: Caliptra RT
37,553,876 UART: [state] CFI Enabled
37,716,087 UART: [rt] RT listening for mailbox commands...
37,718,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,873,733 UART: [rt]cmd =0x41544d4e, len=14344
42,187,882 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,807,163 ready_for_fw is high
3,807,557 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,931,328 >>> mbox cmd response: success
27,617,695 UART:
27,618,089 UART: Running Caliptra FMC ...
27,619,405 UART:
27,619,574 UART: [state] CFI Enabled
27,689,985 UART: [fht] FMC Alias Private Key: 7
30,028,518 UART: [art] Extend RT PCRs Done
30,029,753 UART: [art] Lock RT PCRs Done
30,031,556 UART: [art] Populate DV Done
30,036,978 UART: [fht] FMC Alias Private Key: 7
30,038,605 UART: [art] Derive CDI
30,039,348 UART: [art] Store in in slot 0x4
30,099,161 UART: [art] Derive Key Pair
30,100,210 UART: [art] Store priv key in slot 0x5
33,392,720 UART: [art] Derive Key Pair - Done
33,405,398 UART: [art] Signing Cert with AUTHO
33,406,704 UART: RITY.KEYID = 7
35,693,726 UART: [art] Erasing AUTHORITY.KEYID = 7
35,695,234 UART: [art] PUB.X = EDDFB76993953642416BC76EAD044E4BEFBC7E10615094BF26B24153211BDBD9E866E709BA0A3584B888AB180EE8F3D7
35,702,503 UART: [art] PUB.Y = EEDF4A7CBA143C14D92FA69A5E4E636EFD7FF4994663F093674C9B107E52ADABDFEF4D7D894A905F1254965C073B66FB
35,709,784 UART: [art] SIG.R = 9C8A1EB35471FAB827AC467BD8E637BCC69EE3AEE4A4548D0CCCEB4C02417680AC42466935E798BEA9D61CB8E8A2788B
35,717,187 UART: [art] SIG.S = 80091360B2FC9A1C584AC3CAF21193CD2C25408923B8D19B21125E92C6973B552E97EF748747C0AF13B770B3CBC137F2
37,021,955 UART: Caliptra RT
37,022,673 UART: [state] CFI Enabled
37,183,313 UART: [rt] RT listening for mailbox commands...
37,185,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,340,995 UART: [rt]cmd =0x41544d4e, len=14344
41,551,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,121 writing to cptra_bootfsm_go
193,452 UART:
193,826 UART: Running Caliptra ROM ...
194,952 UART:
604,576 UART: [state] CFI Enabled
622,649 UART: [state] LifecycleState = Unprovisioned
624,616 UART: [state] DebugLocked = No
627,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,975 UART: [kat] SHA2-256
802,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
813,281 UART: [kat] ++
813,765 UART: [kat] sha1
825,917 UART: [kat] SHA2-256
828,638 UART: [kat] SHA2-384
835,055 UART: [kat] SHA2-512-ACC
837,424 UART: [kat] ECC-384
3,121,683 UART: [kat] HMAC-384Kdf
3,133,792 UART: [kat] LMS
4,323,901 UART: [kat] --
4,329,123 UART: [cold-reset] ++
4,331,574 UART: [fht] Storing FHT @ 0x50003400
4,343,343 UART: [idev] ++
4,343,922 UART: [idev] CDI.KEYID = 6
4,344,826 UART: [idev] SUBJECT.KEYID = 7
4,346,065 UART: [idev] UDS.KEYID = 0
4,347,080 ready_for_fw is high
4,347,276 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,490,151 UART: [idev] Erasing UDS.KEYID = 0
7,637,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,659,275 UART: [idev] --
7,663,321 UART: [ldev] ++
7,663,884 UART: [ldev] CDI.KEYID = 6
7,664,819 UART: [ldev] SUBJECT.KEYID = 5
7,666,076 UART: [ldev] AUTHORITY.KEYID = 7
7,667,301 UART: [ldev] FE.KEYID = 1
7,675,701 UART: [ldev] Erasing FE.KEYID = 1
10,966,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,289,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,411 UART: [ldev] --
13,325,426 UART: [fwproc] Waiting for Commands...
13,327,567 UART: [fwproc] Received command 0x46574c44
13,329,742 UART: [fwproc] Received Image of size 113760 bytes
21,887,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,971,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,040,515 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,356,708 >>> mbox cmd response: success
22,360,274 UART: [afmc] ++
22,360,924 UART: [afmc] CDI.KEYID = 6
22,361,804 UART: [afmc] SUBJECT.KEYID = 7
22,363,071 UART: [afmc] AUTHORITY.KEYID = 5
25,680,967 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,975,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,977,624 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,992,178 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,006,917 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,021,179 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,043,174 UART: [afmc] --
28,047,630 UART: [cold-reset] --
28,051,272 UART: [state] Locking Datavault
28,057,488 UART: [state] Locking PCR0, PCR1 and PCR31
28,059,188 UART: [state] Locking ICCM
28,061,928 UART: [exit] Launching FMC @ 0x40000130
28,070,270 UART:
28,070,512 UART: Running Caliptra FMC ...
28,071,612 UART:
28,071,770 UART: [state] CFI Enabled
28,079,816 UART: [fht] FMC Alias Private Key: 7
30,411,269 UART: [art] Extend RT PCRs Done
30,412,488 UART: [art] Lock RT PCRs Done
30,414,407 UART: [art] Populate DV Done
30,419,814 UART: [fht] FMC Alias Private Key: 7
30,421,461 UART: [art] Derive CDI
30,422,273 UART: [art] Store in in slot 0x4
30,465,346 UART: [art] Derive Key Pair
30,466,339 UART: [art] Store priv key in slot 0x5
33,708,345 UART: [art] Derive Key Pair - Done
33,721,242 UART: [art] Signing Cert with AUTHO
33,722,546 UART: RITY.KEYID = 7
36,002,043 UART: [art] Erasing AUTHORITY.KEYID = 7
36,003,553 UART: [art] PUB.X = 2A179E4E0972CC850EC859E12C2D418C8D88BB1BF1AE6611EF3775428E714DB278077722FD212AC97C381D018A25D2FB
36,010,790 UART: [art] PUB.Y = C507AF1B54F1F90CA45E01A02C1869A208D19F8CF4BDE42155C5E551757B14B6D8A5848379A7F1BD882C3FEEDFB4425F
36,018,064 UART: [art] SIG.R = 430C80314443D88CF97BD63BC87C908AFC5AD0F8DEC5FAE536AA9A29E8AFFD0315CB1FD3CE97659A4F5D8E6F55A52F04
36,025,428 UART: [art] SIG.S = F3C0F500CDB57B6E1BF78A4FD4591C1CC70D98E9759D6504ACAEE86C1105354378205D336F7CD49B2CC55F6519ED8F3C
37,330,377 UART: Caliptra RT
37,331,092 UART: [state] CFI Enabled
37,449,408 UART: [rt] RT listening for mailbox commands...
37,451,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,606,935 UART: [rt]cmd =0x41544d4e, len=14344
41,895,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,974 writing to cptra_bootfsm_go
4,131,256 ready_for_fw is high
4,131,647 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,392,414 >>> mbox cmd response: success
28,029,890 UART:
28,030,287 UART: Running Caliptra FMC ...
28,031,437 UART:
28,031,597 UART: [state] CFI Enabled
28,039,799 UART: [fht] FMC Alias Private Key: 7
30,370,399 UART: [art] Extend RT PCRs Done
30,371,651 UART: [art] Lock RT PCRs Done
30,373,307 UART: [art] Populate DV Done
30,378,685 UART: [fht] FMC Alias Private Key: 7
30,380,176 UART: [art] Derive CDI
30,380,939 UART: [art] Store in in slot 0x4
30,423,958 UART: [art] Derive Key Pair
30,425,000 UART: [art] Store priv key in slot 0x5
33,666,445 UART: [art] Derive Key Pair - Done
33,679,403 UART: [art] Signing Cert with AUTHO
33,680,719 UART: RITY.KEYID = 7
35,960,185 UART: [art] Erasing AUTHORITY.KEYID = 7
35,961,697 UART: [art] PUB.X = 4B6D264734BC34E8CBE0817FC39FB9E41EBE2DD9E11EF8048EC390FE3D4A5A32DAD008BA425DDF49196FAA24EF60953B
35,968,989 UART: [art] PUB.Y = 61D29AD145A67F9EAE182F41CBAC68D0A4110431527D1CBDCA8E8389487A33E0AFE5779963233D2AE77733D8F0882B54
35,976,242 UART: [art] SIG.R = D56BFAC50F86398E1A5B06A7F2602CF507C68C201BAEFBF64F8C7CF9D4B7BF1E737359BB9B3D7D797ED466B0B6B2ACB6
35,983,637 UART: [art] SIG.S = 5992AC104831F01E932670F23A5916E5697964DA1892D354443575AC644C3DB8C413F82E1F70337673E4E7DD64C52305
37,288,667 UART: Caliptra RT
37,289,378 UART: [state] CFI Enabled
37,408,267 UART: [rt] RT listening for mailbox commands...
37,410,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,566,069 UART: [rt]cmd =0x41544d4e, len=14344
41,750,618 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,588 writing to cptra_bootfsm_go
192,800 UART:
193,162 UART: Running Caliptra ROM ...
194,337 UART:
194,510 UART: [state] CFI Enabled
263,406 UART: [state] LifecycleState = Unprovisioned
265,307 UART: [state] DebugLocked = No
267,401 UART: [state] WD Timer not started. Device not locked for debugging
271,727 UART: [kat] SHA2-256
450,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,447 UART: [kat] ++
462,977 UART: [kat] sha1
474,624 UART: [kat] SHA2-256
477,612 UART: [kat] SHA2-384
484,451 UART: [kat] SHA2-512-ACC
487,382 UART: [kat] ECC-384
2,946,845 UART: [kat] HMAC-384Kdf
2,972,014 UART: [kat] LMS
3,501,486 UART: [kat] --
3,506,477 UART: [cold-reset] ++
3,508,967 UART: [fht] FHT @ 0x50003400
3,519,454 UART: [idev] ++
3,520,023 UART: [idev] CDI.KEYID = 6
3,521,010 UART: [idev] SUBJECT.KEYID = 7
3,522,185 UART: [idev] UDS.KEYID = 0
3,523,103 ready_for_fw is high
3,523,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,768 UART: [idev] Erasing UDS.KEYID = 0
6,029,519 UART: [idev] Sha1 KeyId Algorithm
6,051,730 UART: [idev] --
6,056,315 UART: [ldev] ++
6,056,882 UART: [ldev] CDI.KEYID = 6
6,057,764 UART: [ldev] SUBJECT.KEYID = 5
6,058,941 UART: [ldev] AUTHORITY.KEYID = 7
6,060,229 UART: [ldev] FE.KEYID = 1
6,100,523 UART: [ldev] Erasing FE.KEYID = 1
8,601,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,066 UART: [ldev] --
10,393,940 UART: [fwproc] Wait for Commands...
10,396,246 UART: [fwproc] Recv command 0x46574c44
10,398,282 UART: [fwproc] Recv'd Img size: 114084 bytes
14,973,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,051,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,120,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,436,974 >>> mbox cmd response: success
15,440,631 UART: [afmc] ++
15,441,217 UART: [afmc] CDI.KEYID = 6
15,442,098 UART: [afmc] SUBJECT.KEYID = 7
15,443,330 UART: [afmc] AUTHORITY.KEYID = 5
17,980,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,225 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,142 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,127 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,754,961 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,378 UART: [afmc] --
19,780,026 UART: [cold-reset] --
19,785,666 UART: [state] Locking Datavault
19,790,808 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,455 UART: [state] Locking ICCM
19,795,061 UART: [exit] Launching FMC @ 0x40000130
19,803,512 UART:
19,803,741 UART: Running Caliptra FMC ...
19,804,839 UART:
19,805,011 UART: [state] CFI Enabled
19,863,337 UART: [fht] FMC Alias Private Key: 7
21,627,819 UART: [art] Extend RT PCRs Done
21,629,050 UART: [art] Lock RT PCRs Done
21,630,636 UART: [art] Populate DV Done
21,636,162 UART: [fht] FMC Alias Private Key: 7
21,637,864 UART: [art] Derive CDI
21,638,677 UART: [art] Store in in slot 0x4
21,695,718 UART: [art] Derive Key Pair
21,696,755 UART: [art] Store priv key in slot 0x5
24,159,964 UART: [art] Derive Key Pair - Done
24,172,911 UART: [art] Signing Cert with AUTHO
24,174,214 UART: RITY.KEYID = 7
25,885,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,952 UART: [art] PUB.X = 576BE3BD568CABDFC9DC1F999508BB9FCEF8B7D7FE4E62AC31C4D44D9B92D122C0F568A018DB79E2742EA9FB4EC6B779
25,894,243 UART: [art] PUB.Y = 7EB66A7BBAB4696F3D696DC76BDD8327D3EE5908C3E3A5B9B129C27399342DAA65E3B0E8EE0F93A3E5A8C46E36ACB674
25,901,474 UART: [art] SIG.R = 3D3472622A2AC9BCEFFA9897D640B1658C966937A009342FA7BB5BDAEE524D884282FF051FA21D49A2576F5DA4A6EBA2
25,908,956 UART: [art] SIG.S = 28ED5E0797A16D34AD49638AC7888C433457CEC39649DBB8FC822F908E00C00690A5A93C0F39C5F1C2B00E50E2ED3B7C
26,887,342 UART: Caliptra RT
26,888,074 UART: [state] CFI Enabled
27,053,322 UART: [rt] RT listening for mailbox commands...
27,055,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,211,011 UART: [rt]cmd =0x41544d4e, len=14344
29,567,827 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
3,382,520 ready_for_fw is high
3,382,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,043,752 >>> mbox cmd response: success
19,323,600 UART:
19,323,996 UART: Running Caliptra FMC ...
19,325,198 UART:
19,325,366 UART: [state] CFI Enabled
19,391,285 UART: [fht] FMC Alias Private Key: 7
21,154,941 UART: [art] Extend RT PCRs Done
21,156,168 UART: [art] Lock RT PCRs Done
21,157,694 UART: [art] Populate DV Done
21,163,459 UART: [fht] FMC Alias Private Key: 7
21,165,004 UART: [art] Derive CDI
21,165,773 UART: [art] Store in in slot 0x4
21,223,841 UART: [art] Derive Key Pair
21,224,875 UART: [art] Store priv key in slot 0x5
23,687,927 UART: [art] Derive Key Pair - Done
23,700,548 UART: [art] Signing Cert with AUTHO
23,701,850 UART: RITY.KEYID = 7
25,413,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,415,121 UART: [art] PUB.X = 65624F70707AD0D307C327EF9AB028E15CAB5D42476F6D30907673BF37455FF08227F14D9622FF4754D7EE7F40F67D2F
25,422,418 UART: [art] PUB.Y = 6E9A083A379B3B88D246D4E98C078B313F9DAE550B952CA1B21839D4D96CDBB3FE7069A306EB7C35A988E49FE6F512F6
25,429,651 UART: [art] SIG.R = A2D6EAC6D6FBD3264DC9BB012B976D6F6937B0A56CD286AA77008C578C15425FA5E6D31030DAB25480115A5BD7A55AD1
25,437,085 UART: [art] SIG.S = EB0C054E9CF71B3A583F93964C936708C7DF0D0E8CE79745426041ABBE06845D52D24640DD5E17C49AFD896C782EC778
26,415,904 UART: Caliptra RT
26,416,612 UART: [state] CFI Enabled
26,581,647 UART: [rt] RT listening for mailbox commands...
26,583,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,739,408 UART: [rt]cmd =0x41544d4e, len=14344
29,109,294 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,957 writing to cptra_bootfsm_go
193,172 UART:
193,548 UART: Running Caliptra ROM ...
194,668 UART:
604,110 UART: [state] CFI Enabled
616,639 UART: [state] LifecycleState = Unprovisioned
618,525 UART: [state] DebugLocked = No
620,626 UART: [state] WD Timer not started. Device not locked for debugging
624,746 UART: [kat] SHA2-256
803,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,427 UART: [kat] ++
815,966 UART: [kat] sha1
828,624 UART: [kat] SHA2-256
831,635 UART: [kat] SHA2-384
838,763 UART: [kat] SHA2-512-ACC
841,700 UART: [kat] ECC-384
3,284,447 UART: [kat] HMAC-384Kdf
3,297,053 UART: [kat] LMS
3,826,548 UART: [kat] --
3,831,975 UART: [cold-reset] ++
3,833,342 UART: [fht] FHT @ 0x50003400
3,843,901 UART: [idev] ++
3,844,487 UART: [idev] CDI.KEYID = 6
3,845,371 UART: [idev] SUBJECT.KEYID = 7
3,846,753 UART: [idev] UDS.KEYID = 0
3,847,693 ready_for_fw is high
3,847,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,407 UART: [idev] Erasing UDS.KEYID = 0
6,317,132 UART: [idev] Sha1 KeyId Algorithm
6,340,438 UART: [idev] --
6,345,865 UART: [ldev] ++
6,346,446 UART: [ldev] CDI.KEYID = 6
6,347,334 UART: [ldev] SUBJECT.KEYID = 5
6,348,542 UART: [ldev] AUTHORITY.KEYID = 7
6,349,776 UART: [ldev] FE.KEYID = 1
6,360,237 UART: [ldev] Erasing FE.KEYID = 1
8,832,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,348 UART: [ldev] --
10,622,203 UART: [fwproc] Wait for Commands...
10,624,028 UART: [fwproc] Recv command 0x46574c44
10,626,075 UART: [fwproc] Recv'd Img size: 114084 bytes
15,203,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,276,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,345,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,663,219 >>> mbox cmd response: success
15,668,251 UART: [afmc] ++
15,668,854 UART: [afmc] CDI.KEYID = 6
15,669,926 UART: [afmc] SUBJECT.KEYID = 7
15,671,037 UART: [afmc] AUTHORITY.KEYID = 5
18,172,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,891,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,893,686 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,909,654 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,925,587 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,941,405 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,963,669 UART: [afmc] --
19,966,995 UART: [cold-reset] --
19,970,375 UART: [state] Locking Datavault
19,975,460 UART: [state] Locking PCR0, PCR1 and PCR31
19,977,117 UART: [state] Locking ICCM
19,978,891 UART: [exit] Launching FMC @ 0x40000130
19,987,349 UART:
19,987,587 UART: Running Caliptra FMC ...
19,988,692 UART:
19,988,863 UART: [state] CFI Enabled
19,997,242 UART: [fht] FMC Alias Private Key: 7
21,753,726 UART: [art] Extend RT PCRs Done
21,754,954 UART: [art] Lock RT PCRs Done
21,756,322 UART: [art] Populate DV Done
21,761,951 UART: [fht] FMC Alias Private Key: 7
21,763,487 UART: [art] Derive CDI
21,764,252 UART: [art] Store in in slot 0x4
21,807,163 UART: [art] Derive Key Pair
21,808,205 UART: [art] Store priv key in slot 0x5
24,234,860 UART: [art] Derive Key Pair - Done
24,248,069 UART: [art] Signing Cert with AUTHO
24,249,406 UART: RITY.KEYID = 7
25,954,873 UART: [art] Erasing AUTHORITY.KEYID = 7
25,956,390 UART: [art] PUB.X = 29D6D645E1888AC97CC7AD31E3B8B70E5B9D8C012B0EDE27B34F1CF6729BD2AB93DD9AC0573FB135AC6EA94A8567DA28
25,963,668 UART: [art] PUB.Y = FD89022A1F7416E42C90150144C75E30EEA529DDC91E0AF0C5AC0DC7F231595C908EAD6B1B3B8817F3F9A7FF19A9BC38
25,970,942 UART: [art] SIG.R = 3486F61EA4EAEB1E3591B83FF85ADFF5ADBE0B67709C6CDE15A0F9C3F927C6A0F058C709265379CDD7B7563D6562E1C6
25,978,367 UART: [art] SIG.S = C7662F71ADB38BF25C3B92F9ABD2EE20BFCD80D8CCB2ED6FB7B69AABDE25C57013C9F32F51AA500EEB5BB8DA4971B084
26,957,721 UART: Caliptra RT
26,958,432 UART: [state] CFI Enabled
27,075,190 UART: [rt] RT listening for mailbox commands...
27,077,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,757 UART: [rt]cmd =0x41544d4e, len=14344
29,592,409 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,954 writing to cptra_bootfsm_go
3,701,069 ready_for_fw is high
3,701,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,244,146 >>> mbox cmd response: success
19,496,634 UART:
19,497,031 UART: Running Caliptra FMC ...
19,498,171 UART:
19,498,333 UART: [state] CFI Enabled
19,506,170 UART: [fht] FMC Alias Private Key: 7
21,263,206 UART: [art] Extend RT PCRs Done
21,264,434 UART: [art] Lock RT PCRs Done
21,266,117 UART: [art] Populate DV Done
21,271,449 UART: [fht] FMC Alias Private Key: 7
21,273,176 UART: [art] Derive CDI
21,274,001 UART: [art] Store in in slot 0x4
21,316,571 UART: [art] Derive Key Pair
21,317,606 UART: [art] Store priv key in slot 0x5
23,744,311 UART: [art] Derive Key Pair - Done
23,757,632 UART: [art] Signing Cert with AUTHO
23,758,945 UART: RITY.KEYID = 7
25,464,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,466,067 UART: [art] PUB.X = E9635E836272040276F5FF927482FA80969797F6EEFA29C6542A2314FDFFFF9869D92139809379FECBCBA0FF8BCC3EBC
25,473,357 UART: [art] PUB.Y = 0B6157F367695A31D2BD386A8F7ED484756A09B3C2F1653AD11BEC26D9137BA67061052DAB0A847FE975DD5848BA3085
25,480,543 UART: [art] SIG.R = 24A30E5CB60AA522904AC3E24B5C9E040A6AE28A7996A09003169576F071F3575C31F7DED24BD2865C265A601B3EA0BE
25,487,972 UART: [art] SIG.S = C21F850E3C1A84EDFBBD3517DAB9777D8502CE7287DCE536722F547D03796C27AFFFD20C73FAB4932F746FABF7C69F8D
26,466,915 UART: Caliptra RT
26,467,619 UART: [state] CFI Enabled
26,584,416 UART: [rt] RT listening for mailbox commands...
26,586,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,742,209 UART: [rt]cmd =0x41544d4e, len=14344
29,107,427 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,399 UART:
192,762 UART: Running Caliptra ROM ...
193,868 UART:
194,010 UART: [state] CFI Enabled
264,905 UART: [state] LifecycleState = Unprovisioned
267,251 UART: [state] DebugLocked = No
268,556 UART: [state] WD Timer not started. Device not locked for debugging
273,013 UART: [kat] SHA2-256
462,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,668 UART: [kat] ++
474,122 UART: [kat] sha1
484,143 UART: [kat] SHA2-256
487,154 UART: [kat] SHA2-384
493,708 UART: [kat] SHA2-512-ACC
496,298 UART: [kat] ECC-384
2,948,607 UART: [kat] HMAC-384Kdf
2,970,131 UART: [kat] LMS
3,501,891 UART: [kat] --
3,508,654 UART: [cold-reset] ++
3,511,289 UART: [fht] FHT @ 0x50003400
3,521,906 UART: [idev] ++
3,522,538 UART: [idev] CDI.KEYID = 6
3,523,491 UART: [idev] SUBJECT.KEYID = 7
3,524,731 UART: [idev] UDS.KEYID = 0
3,525,705 ready_for_fw is high
3,525,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,593 UART: [idev] Erasing UDS.KEYID = 0
6,028,675 UART: [idev] Sha1 KeyId Algorithm
6,050,746 UART: [idev] --
6,056,686 UART: [ldev] ++
6,057,367 UART: [ldev] CDI.KEYID = 6
6,058,297 UART: [ldev] SUBJECT.KEYID = 5
6,059,478 UART: [ldev] AUTHORITY.KEYID = 7
6,060,655 UART: [ldev] FE.KEYID = 1
6,100,102 UART: [ldev] Erasing FE.KEYID = 1
8,604,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,658 UART: [ldev] --
10,411,129 UART: [fwproc] Wait for Commands...
10,414,312 UART: [fwproc] Recv command 0x46574c44
10,416,607 UART: [fwproc] Recv'd Img size: 114084 bytes
15,030,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,107,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,223,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,764,245 >>> mbox cmd response: success
15,767,671 UART: [afmc] ++
15,768,381 UART: [afmc] CDI.KEYID = 6
15,769,570 UART: [afmc] SUBJECT.KEYID = 7
15,771,008 UART: [afmc] AUTHORITY.KEYID = 5
18,300,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,026,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,028,651 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,043,711 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,058,917 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,073,737 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,097,563 UART: [afmc] --
20,101,739 UART: [cold-reset] --
20,104,159 UART: [state] Locking Datavault
20,109,698 UART: [state] Locking PCR0, PCR1 and PCR31
20,111,854 UART: [state] Locking ICCM
20,113,677 UART: [exit] Launching FMC @ 0x40000130
20,122,336 UART:
20,122,580 UART: Running Caliptra FMC ...
20,123,685 UART:
20,123,843 UART: [state] CFI Enabled
20,181,833 UART: [fht] FMC Alias Private Key: 7
21,945,614 UART: [art] Extend RT PCRs Done
21,946,839 UART: [art] Lock RT PCRs Done
21,948,412 UART: [art] Populate DV Done
21,953,717 UART: [fht] FMC Alias Private Key: 7
21,955,362 UART: [art] Derive CDI
21,956,174 UART: [art] Store in in slot 0x4
22,014,828 UART: [art] Derive Key Pair
22,015,872 UART: [art] Store priv key in slot 0x5
24,479,130 UART: [art] Derive Key Pair - Done
24,492,236 UART: [art] Signing Cert with AUTHO
24,493,534 UART: RITY.KEYID = 7
26,205,177 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,688 UART: [art] PUB.X = CBC280D4845A5682192596A9AEF085E239B3945A66C745BF6894E1785411D3553AFB06B5580B916EA0CE8AA207BE471F
26,213,974 UART: [art] PUB.Y = E5EF07F88E30BD070B372CFBC1E369496DD3F0A12504BE97DB322D0A76C7995408016798ECA0D619D60EA54D47E5FD6F
26,221,226 UART: [art] SIG.R = F3542050DC96C5AE29FCA0CBF4501F8E8A4348B60DDAF1DC75294FD9DC443C8EF5EDB204FB71D1F006B5A6F9735D0758
26,228,594 UART: [art] SIG.S = DCA183547484CE755AE615A2FFA74632F6BC9BF9D73F2686F77353FC04BB4A7261789B15E547F614ACE601914DC56BF8
27,207,120 UART: Caliptra RT
27,207,835 UART: [state] CFI Enabled
27,373,118 UART: [rt] RT listening for mailbox commands...
27,375,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,017 UART: [rt]cmd =0x41544d4e, len=14344
29,891,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,439,766 ready_for_fw is high
3,440,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,821,190 >>> mbox cmd response: success
20,115,280 UART:
20,115,662 UART: Running Caliptra FMC ...
20,116,807 UART:
20,116,969 UART: [state] CFI Enabled
20,180,951 UART: [fht] FMC Alias Private Key: 7
21,945,090 UART: [art] Extend RT PCRs Done
21,946,314 UART: [art] Lock RT PCRs Done
21,947,997 UART: [art] Populate DV Done
21,953,559 UART: [fht] FMC Alias Private Key: 7
21,955,118 UART: [art] Derive CDI
21,955,932 UART: [art] Store in in slot 0x4
22,013,955 UART: [art] Derive Key Pair
22,014,989 UART: [art] Store priv key in slot 0x5
24,477,798 UART: [art] Derive Key Pair - Done
24,490,637 UART: [art] Signing Cert with AUTHO
24,491,974 UART: RITY.KEYID = 7
26,203,968 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,488 UART: [art] PUB.X = 3E4E370E5EAEB9FB86CE3D9FF5B1CBCB9F74180EF9BCD510639BBA79741E0C36D04926B3B005ECA5CA61300BD041E2E4
26,212,780 UART: [art] PUB.Y = BE6CEDF585D1A29515FBF95C92EE812A7AEEDE93C8CBD230494EBE77E622822EE9F940FE269618E3D46E5AB4C9721ED6
26,220,085 UART: [art] SIG.R = 9D6DBEE98D06CB3965919A101EB1A3477B79FDCEE69AFFBDFED25E5E34B3243363B0A7664FD88B37DA6960CE5A458C21
26,227,467 UART: [art] SIG.S = EE6E425C9F082627B677BACC7DFD0D3736757E91BC488487EA98B277164F09435DE8E27A44AA6EBEB99072A890A2D706
27,207,316 UART: Caliptra RT
27,208,013 UART: [state] CFI Enabled
27,371,080 UART: [rt] RT listening for mailbox commands...
27,373,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,598 UART: [rt]cmd =0x41544d4e, len=14344
29,879,347 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
192,895 UART:
193,300 UART: Running Caliptra ROM ...
194,502 UART:
604,152 UART: [state] CFI Enabled
617,321 UART: [state] LifecycleState = Unprovisioned
619,696 UART: [state] DebugLocked = No
621,868 UART: [state] WD Timer not started. Device not locked for debugging
625,823 UART: [kat] SHA2-256
815,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,508 UART: [kat] ++
827,031 UART: [kat] sha1
837,832 UART: [kat] SHA2-256
840,845 UART: [kat] SHA2-384
846,221 UART: [kat] SHA2-512-ACC
848,806 UART: [kat] ECC-384
3,290,455 UART: [kat] HMAC-384Kdf
3,303,131 UART: [kat] LMS
3,834,946 UART: [kat] --
3,841,149 UART: [cold-reset] ++
3,843,793 UART: [fht] FHT @ 0x50003400
3,855,352 UART: [idev] ++
3,856,032 UART: [idev] CDI.KEYID = 6
3,857,031 UART: [idev] SUBJECT.KEYID = 7
3,858,211 UART: [idev] UDS.KEYID = 0
3,859,142 ready_for_fw is high
3,859,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,485 UART: [idev] Erasing UDS.KEYID = 0
6,334,960 UART: [idev] Sha1 KeyId Algorithm
6,358,256 UART: [idev] --
6,363,948 UART: [ldev] ++
6,364,636 UART: [ldev] CDI.KEYID = 6
6,365,546 UART: [ldev] SUBJECT.KEYID = 5
6,366,708 UART: [ldev] AUTHORITY.KEYID = 7
6,367,948 UART: [ldev] FE.KEYID = 1
6,378,110 UART: [ldev] Erasing FE.KEYID = 1
8,857,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,214 UART: [ldev] --
10,646,478 UART: [fwproc] Wait for Commands...
10,648,201 UART: [fwproc] Recv command 0x46574c44
10,650,513 UART: [fwproc] Recv'd Img size: 114084 bytes
15,292,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,379,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,495,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,037,397 >>> mbox cmd response: success
16,041,240 UART: [afmc] ++
16,041,957 UART: [afmc] CDI.KEYID = 6
16,043,210 UART: [afmc] SUBJECT.KEYID = 7
16,044,651 UART: [afmc] AUTHORITY.KEYID = 5
18,550,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,271,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,273,470 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,288,530 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,303,773 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,318,572 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,342,647 UART: [afmc] --
20,345,368 UART: [cold-reset] --
20,350,273 UART: [state] Locking Datavault
20,354,692 UART: [state] Locking PCR0, PCR1 and PCR31
20,356,856 UART: [state] Locking ICCM
20,358,903 UART: [exit] Launching FMC @ 0x40000130
20,367,586 UART:
20,367,825 UART: Running Caliptra FMC ...
20,368,930 UART:
20,369,089 UART: [state] CFI Enabled
20,377,410 UART: [fht] FMC Alias Private Key: 7
22,134,657 UART: [art] Extend RT PCRs Done
22,135,890 UART: [art] Lock RT PCRs Done
22,137,368 UART: [art] Populate DV Done
22,142,737 UART: [fht] FMC Alias Private Key: 7
22,144,385 UART: [art] Derive CDI
22,145,204 UART: [art] Store in in slot 0x4
22,187,320 UART: [art] Derive Key Pair
22,188,362 UART: [art] Store priv key in slot 0x5
24,615,190 UART: [art] Derive Key Pair - Done
24,628,297 UART: [art] Signing Cert with AUTHO
24,629,602 UART: RITY.KEYID = 7
26,335,117 UART: [art] Erasing AUTHORITY.KEYID = 7
26,336,839 UART: [art] PUB.X = 8D220692FAA78F4718E2B88C1A124FF32BF1CE298D7E9B10DDF685C34FF10FF92C3A2E2246343842AF4106630638F03E
26,343,901 UART: [art] PUB.Y = ADB7FB7824FBE9833E8CC773664CA6A396151295C955A51FC38CEACF4C23DD6F2DE8FF9B5EA596B7E45BF6490EF0F3DA
26,351,163 UART: [art] SIG.R = 48E74EC7B00177205BC4121F37F152E2B028214CF78B2D461DACFA6676F0E050901D01DD188DEC5DA251E625F7EC580D
26,358,540 UART: [art] SIG.S = 46A9004523ED8618615B216725837FFC2CD3C99CC985AF739ECFB640D14708F6781CB0272E70CE16A82C0F0ED94A58CB
27,337,648 UART: Caliptra RT
27,338,360 UART: [state] CFI Enabled
27,456,250 UART: [rt] RT listening for mailbox commands...
27,458,582 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,613,818 UART: [rt]cmd =0x41544d4e, len=14344
29,967,442 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,812 writing to cptra_bootfsm_go
3,756,034 ready_for_fw is high
3,756,455 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,060,007 >>> mbox cmd response: success
20,316,484 UART:
20,316,860 UART: Running Caliptra FMC ...
20,317,961 UART:
20,318,116 UART: [state] CFI Enabled
20,326,240 UART: [fht] FMC Alias Private Key: 7
22,082,864 UART: [art] Extend RT PCRs Done
22,084,108 UART: [art] Lock RT PCRs Done
22,085,751 UART: [art] Populate DV Done
22,091,394 UART: [fht] FMC Alias Private Key: 7
22,093,021 UART: [art] Derive CDI
22,093,799 UART: [art] Store in in slot 0x4
22,136,458 UART: [art] Derive Key Pair
22,137,457 UART: [art] Store priv key in slot 0x5
24,564,747 UART: [art] Derive Key Pair - Done
24,577,651 UART: [art] Signing Cert with AUTHO
24,578,959 UART: RITY.KEYID = 7
26,284,460 UART: [art] Erasing AUTHORITY.KEYID = 7
26,285,973 UART: [art] PUB.X = 0E2EEFB9F6AE1539816629556FCD8D12B852179E40078091FE2E1813BABD3AA01D16685E0B671F388948E6B7DBED2CC1
26,293,217 UART: [art] PUB.Y = B8E3B4F6382DEB180F1E6A9EEF5FBF2488CF1D87CF6687CCF929660F88242A7B78D64ABF2EA4E9B635547530CAA3FEB0
26,300,503 UART: [art] SIG.R = F8315EF4D6655538EC68635BEDF88747FC1919119C733CD112880ABBB68F5A0504D2FFB1437F9A134A21353D9B69DF82
26,307,896 UART: [art] SIG.S = CC19781748D7ED795418F87B29D7F37FEC26E3510C91104B1E502DE49F43CDE2310C8FCA6E578E11C13B28263AD380B2
27,286,701 UART: Caliptra RT
27,287,416 UART: [state] CFI Enabled
27,404,752 UART: [rt] RT listening for mailbox commands...
27,407,180 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,562,586 UART: [rt]cmd =0x41544d4e, len=14344
29,921,280 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,168 UART: [kat] SHA2-512-ACC
897,069 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
907,090 UART: [kat] LMS
1,475,286 UART: [kat] --
1,476,357 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 ready_for_fw is high
1,480,699 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,602 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,198 UART: [idev] --
1,514,329 UART: [ldev] ++
1,514,497 UART: [ldev] CDI.KEYID = 6
1,514,860 UART: [ldev] SUBJECT.KEYID = 5
1,515,286 UART: [ldev] AUTHORITY.KEYID = 7
1,515,749 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,342 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,452 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,616 UART: [fwproc] Received command 0x46574c44
1,587,407 UART: [fwproc] Received Image of size 114084 bytes
5,459,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,486,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,516,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,651,584 >>> mbox cmd response: success
5,652,704 UART: [afmc] ++
5,652,872 UART: [afmc] CDI.KEYID = 6
5,653,234 UART: [afmc] SUBJECT.KEYID = 7
5,653,659 UART: [afmc] AUTHORITY.KEYID = 5
5,688,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,705,033 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,705,813 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,711,522 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,717,414 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,723,115 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,730,979 UART: [afmc] --
5,731,871 UART: [cold-reset] --
5,732,865 UART: [state] Locking Datavault
5,733,926 UART: [state] Locking PCR0, PCR1 and PCR31
5,734,530 UART: [state] Locking ICCM
5,735,004 UART: [exit] Launching FMC @ 0x40000130
5,740,333 UART:
5,740,349 UART: Running Caliptra FMC ...
5,740,757 UART:
5,740,811 UART: [state] CFI Enabled
5,751,663 UART: [fht] FMC Alias Private Key: 7
5,859,733 UART: [art] Extend RT PCRs Done
5,860,161 UART: [art] Lock RT PCRs Done
5,861,745 UART: [art] Populate DV Done
5,869,971 UART: [fht] FMC Alias Private Key: 7
5,871,135 UART: [art] Derive CDI
5,871,415 UART: [art] Store in in slot 0x4
5,956,914 UART: [art] Derive Key Pair
5,957,274 UART: [art] Store priv key in slot 0x5
5,970,178 UART: [art] Derive Key Pair - Done
5,984,849 UART: [art] Signing Cert with AUTHO
5,985,329 UART: RITY.KEYID = 7
6,000,737 UART: [art] Erasing AUTHORITY.KEYID = 7
6,001,502 UART: [art] PUB.X = 48E97584BF0FCED48936320787DB101607DF75A72E156621091DC505628667695EADF7A1F8E6BBA55C9A21D2C01F79C3
6,008,257 UART: [art] PUB.Y = 9565C8F97C8540A66A71111B752390928C2FC6C19B191B0982F197F9ACC485EB3E65C81C3894229FE902FFD9D6EB5752
6,015,199 UART: [art] SIG.R = FE0F14DFA9C5F6A096DA54DC69BBC4C33D89EC405DFE8648F28F551F5350546F8ED9CF72A33652422153AD7ABB610F3A
6,021,979 UART: [art] SIG.S = C063C610818CFB552D5CE8DFE9E3109392AC1C8805F82FF6BF752512DE6846ABCEE87C3868D5DBE549DDF97787F5CE61
6,045,489 UART: Caliptra RT
6,045,742 UART: [state] CFI Enabled
6,153,934 UART: [rt] RT listening for mailbox commands...
6,154,604 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,277,652 UART: [rt]cmd =0x41544d4e, len=14344
6,845,270 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,959 ready_for_fw is high
1,362,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,311,081 >>> mbox cmd response: success
5,372,558 UART:
5,372,574 UART: Running Caliptra FMC ...
5,372,982 UART:
5,373,036 UART: [state] CFI Enabled
5,383,754 UART: [fht] FMC Alias Private Key: 7
5,491,522 UART: [art] Extend RT PCRs Done
5,491,950 UART: [art] Lock RT PCRs Done
5,493,022 UART: [art] Populate DV Done
5,501,106 UART: [fht] FMC Alias Private Key: 7
5,502,142 UART: [art] Derive CDI
5,502,422 UART: [art] Store in in slot 0x4
5,588,343 UART: [art] Derive Key Pair
5,588,703 UART: [art] Store priv key in slot 0x5
5,602,159 UART: [art] Derive Key Pair - Done
5,616,648 UART: [art] Signing Cert with AUTHO
5,617,128 UART: RITY.KEYID = 7
5,631,860 UART: [art] Erasing AUTHORITY.KEYID = 7
5,632,625 UART: [art] PUB.X = 9DD6DA7491D868939BFAA9F5FB0093BC8B72D70D943C818F6BAD92D647D0585BB93B781D03FBC599258F754DAA58D77C
5,639,379 UART: [art] PUB.Y = B7CE3FAE9DC729B7777674B0D4109B112E02337A1F1DD5EBC4E696DBB92902483A05828EBEBDEF8BED5F762CD6A76398
5,646,336 UART: [art] SIG.R = 9C98E3B23FAB26EB7E9D6FFECE2C693C1FC83C53DF40A191107439A36953FD27C59E1D3F5F00D769C30D51AC73F00CAB
5,653,096 UART: [art] SIG.S = 9385E3058297A27E55B6617A56881E0B8CB90CAD43A8D43E04F25C8DD227985E4AAF94647C9F58861ED49E35E8B04E4E
5,677,145 UART: Caliptra RT
5,677,398 UART: [state] CFI Enabled
5,785,438 UART: [rt] RT listening for mailbox commands...
5,786,108 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,909,366 UART: [rt]cmd =0x41544d4e, len=14344
6,465,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,620 UART: [kat] SHA2-256
882,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,666 UART: [kat] ++
886,818 UART: [kat] sha1
891,118 UART: [kat] SHA2-256
893,056 UART: [kat] SHA2-384
895,873 UART: [kat] SHA2-512-ACC
897,774 UART: [kat] ECC-384
903,667 UART: [kat] HMAC-384Kdf
908,437 UART: [kat] LMS
1,476,633 UART: [kat] --
1,477,482 UART: [cold-reset] ++
1,477,910 UART: [fht] Storing FHT @ 0x50003400
1,480,655 UART: [idev] ++
1,480,823 UART: [idev] CDI.KEYID = 6
1,481,183 UART: [idev] SUBJECT.KEYID = 7
1,481,607 UART: [idev] UDS.KEYID = 0
1,481,952 ready_for_fw is high
1,481,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,559 UART: [idev] Erasing UDS.KEYID = 0
1,506,531 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,161 UART: [idev] --
1,516,318 UART: [ldev] ++
1,516,486 UART: [ldev] CDI.KEYID = 6
1,516,849 UART: [ldev] SUBJECT.KEYID = 5
1,517,275 UART: [ldev] AUTHORITY.KEYID = 7
1,517,738 UART: [ldev] FE.KEYID = 1
1,522,994 UART: [ldev] Erasing FE.KEYID = 1
1,548,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,649 UART: [ldev] --
1,587,980 UART: [fwproc] Waiting for Commands...
1,588,671 UART: [fwproc] Received command 0x46574c44
1,589,462 UART: [fwproc] Received Image of size 114084 bytes
5,043,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,071,543 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,100,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,236,500 >>> mbox cmd response: success
5,237,678 UART: [afmc] ++
5,237,846 UART: [afmc] CDI.KEYID = 6
5,238,208 UART: [afmc] SUBJECT.KEYID = 7
5,238,633 UART: [afmc] AUTHORITY.KEYID = 5
5,273,941 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,290,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,291,105 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,296,814 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,706 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,308,407 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,316,281 UART: [afmc] --
5,317,279 UART: [cold-reset] --
5,318,353 UART: [state] Locking Datavault
5,319,640 UART: [state] Locking PCR0, PCR1 and PCR31
5,320,244 UART: [state] Locking ICCM
5,320,838 UART: [exit] Launching FMC @ 0x40000130
5,326,167 UART:
5,326,183 UART: Running Caliptra FMC ...
5,326,591 UART:
5,326,734 UART: [state] CFI Enabled
5,337,276 UART: [fht] FMC Alias Private Key: 7
5,444,872 UART: [art] Extend RT PCRs Done
5,445,300 UART: [art] Lock RT PCRs Done
5,446,858 UART: [art] Populate DV Done
5,454,926 UART: [fht] FMC Alias Private Key: 7
5,455,960 UART: [art] Derive CDI
5,456,240 UART: [art] Store in in slot 0x4
5,541,971 UART: [art] Derive Key Pair
5,542,331 UART: [art] Store priv key in slot 0x5
5,555,679 UART: [art] Derive Key Pair - Done
5,570,414 UART: [art] Signing Cert with AUTHO
5,570,894 UART: RITY.KEYID = 7
5,585,706 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,471 UART: [art] PUB.X = 7300E78D5BD8B2BE2AE9FEA2FBA474E5028890AADAB41B23FF5E4F8FC7724F9478C27CEE33EB1F0CD9E67D838F8FDFF3
5,593,241 UART: [art] PUB.Y = 788259B9BAA9BBBE3E233286A5D0BB6D4D9F5C68856CD4F9BD90791DA5238773083C13302FC4D9558EAB145F20961108
5,600,187 UART: [art] SIG.R = 56723878499D29912110211E5F0714814DD869F2BDEF6EF9F4FD4DFA95CB4AA390FECAB20B801D22001A6CDE46FB84EA
5,606,941 UART: [art] SIG.S = 217836FA8AB21D7F003A0E48B7DC39463B97C0CD1178771D33876378266DEE2E714B9BF6ED794625A1979376CD6072F4
5,631,049 UART: Caliptra RT
5,631,394 UART: [state] CFI Enabled
5,739,206 UART: [rt] RT listening for mailbox commands...
5,739,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,966 UART: [rt]cmd =0x41544d4e, len=14344
6,421,054 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,434 ready_for_fw is high
1,363,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,200,329 >>> mbox cmd response: success
5,261,374 UART:
5,261,390 UART: Running Caliptra FMC ...
5,261,798 UART:
5,261,941 UART: [state] CFI Enabled
5,272,291 UART: [fht] FMC Alias Private Key: 7
5,379,841 UART: [art] Extend RT PCRs Done
5,380,269 UART: [art] Lock RT PCRs Done
5,381,747 UART: [art] Populate DV Done
5,389,975 UART: [fht] FMC Alias Private Key: 7
5,391,125 UART: [art] Derive CDI
5,391,405 UART: [art] Store in in slot 0x4
5,477,554 UART: [art] Derive Key Pair
5,477,914 UART: [art] Store priv key in slot 0x5
5,490,666 UART: [art] Derive Key Pair - Done
5,505,475 UART: [art] Signing Cert with AUTHO
5,505,955 UART: RITY.KEYID = 7
5,521,397 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,162 UART: [art] PUB.X = 33E2428258D3FC4D0932890EA789B5113FC462DDEB184D8F5E46620D3576CEE3C5FA99AA7FAE8A9627B3A78FC1F434D2
5,528,933 UART: [art] PUB.Y = 3071B38C7D7D46C84D23FA9DD9D9418E0955841F6D3A46D11E476652D3C899D7BA53D40474D3E4F67A11803B94651765
5,535,871 UART: [art] SIG.R = C97BCF297390C9C2BA205652A0488B91FD7B08084B1D9419FE9D67B720978DDA161F4A5001E963C40947C6916CFBB031
5,542,629 UART: [art] SIG.S = 39B3FA38D6F10143725B90EAFA05F0BD64F8EBB0B4569344472318FB6FB2B14C1562501BD62F5FAFC2E9A2F1282DF1A0
5,566,316 UART: Caliptra RT
5,566,661 UART: [state] CFI Enabled
5,676,432 UART: [rt] RT listening for mailbox commands...
5,677,102 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,020 UART: [rt]cmd =0x41544d4e, len=14344
6,365,909 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
892,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,071 UART: [kat] ++
897,223 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,156 UART: [kat] SHA2-512-ACC
908,057 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,106 UART: [kat] LMS
1,170,434 UART: [kat] --
1,171,291 UART: [cold-reset] ++
1,171,703 UART: [fht] FHT @ 0x50003400
1,174,494 UART: [idev] ++
1,174,662 UART: [idev] CDI.KEYID = 6
1,175,022 UART: [idev] SUBJECT.KEYID = 7
1,175,446 UART: [idev] UDS.KEYID = 0
1,175,791 ready_for_fw is high
1,175,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,003 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,154 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,047 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,319,833 >>> mbox cmd response: success
3,321,023 UART: [afmc] ++
3,321,191 UART: [afmc] CDI.KEYID = 6
3,321,553 UART: [afmc] SUBJECT.KEYID = 7
3,321,978 UART: [afmc] AUTHORITY.KEYID = 5
3,357,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,231 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,940 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,832 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,543 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,462 UART: [afmc] --
3,400,554 UART: [cold-reset] --
3,401,352 UART: [state] Locking Datavault
3,402,319 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,923 UART: [state] Locking ICCM
3,403,465 UART: [exit] Launching FMC @ 0x40000130
3,408,794 UART:
3,408,810 UART: Running Caliptra FMC ...
3,409,218 UART:
3,409,272 UART: [state] CFI Enabled
3,419,640 UART: [fht] FMC Alias Private Key: 7
3,527,396 UART: [art] Extend RT PCRs Done
3,527,824 UART: [art] Lock RT PCRs Done
3,529,400 UART: [art] Populate DV Done
3,537,360 UART: [fht] FMC Alias Private Key: 7
3,538,452 UART: [art] Derive CDI
3,538,732 UART: [art] Store in in slot 0x4
3,624,349 UART: [art] Derive Key Pair
3,624,709 UART: [art] Store priv key in slot 0x5
3,637,673 UART: [art] Derive Key Pair - Done
3,652,631 UART: [art] Signing Cert with AUTHO
3,653,111 UART: RITY.KEYID = 7
3,668,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,852 UART: [art] PUB.X = 797FA090F5E56E464F3A7F08A97A2D9C517702BEC5C0E6E623E097BCB12B07028B65B3C98A602A2433A950446CFF19A6
3,675,614 UART: [art] PUB.Y = 95D1FFB31B54DE7C2FBF98FA7DE94F0327626157D64912F141661F390DC8634DE10F52BC678D260867929108A33CEF4A
3,682,551 UART: [art] SIG.R = CE20418F4C51DBE0B85FF43D3052CF8EDEE6967ED450F022064DBD276C56AE06963445A4E4AB0991031E7E789080451F
3,689,313 UART: [art] SIG.S = 193AAD0900676C00F2E6FE957211411665E7AC0C9599651B8B86F3F6499B67815EA3B1F21D99A717119A031D4D4FF85B
3,712,817 UART: Caliptra RT
3,713,070 UART: [state] CFI Enabled
3,819,776 UART: [rt] RT listening for mailbox commands...
3,820,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,538 UART: [rt]cmd =0x41544d4e, len=14344
4,509,263 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,107 ready_for_fw is high
1,059,107 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,163,611 >>> mbox cmd response: success
3,226,266 UART:
3,226,282 UART: Running Caliptra FMC ...
3,226,690 UART:
3,226,744 UART: [state] CFI Enabled
3,237,140 UART: [fht] FMC Alias Private Key: 7
3,344,916 UART: [art] Extend RT PCRs Done
3,345,344 UART: [art] Lock RT PCRs Done
3,346,920 UART: [art] Populate DV Done
3,355,064 UART: [fht] FMC Alias Private Key: 7
3,356,054 UART: [art] Derive CDI
3,356,334 UART: [art] Store in in slot 0x4
3,441,999 UART: [art] Derive Key Pair
3,442,359 UART: [art] Store priv key in slot 0x5
3,455,387 UART: [art] Derive Key Pair - Done
3,470,157 UART: [art] Signing Cert with AUTHO
3,470,637 UART: RITY.KEYID = 7
3,485,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,148 UART: [art] PUB.X = 81301822062D75B79EC1F9022A3964249BB727E031BA0618D200050CDAE5EAC3688F1E039DBC5EC1CC3E198F242E7252
3,492,878 UART: [art] PUB.Y = 7F6DB19F376CE5E8F8E7506C8C4EAC2273F3FFCA3B52C0B9A5639C4D36F65DDDB7CD7E1844C0B0C00E2717D1AF6BC10B
3,499,846 UART: [art] SIG.R = CEDFFAF1F20CB7612AFEF8F4B93A6B71B6859273E86D7F632A0A1C598EC131209D033F84D3A4F916E3626A0A58CF128A
3,506,618 UART: [art] SIG.S = C451B20FE196A3FB7EE3F3423AF6FD04781EC59B2E1937B21F9791DF79567581BC5E5B782BE4FE0EE1F9B7FE121D79BC
3,530,634 UART: Caliptra RT
3,530,887 UART: [state] CFI Enabled
3,638,484 UART: [rt] RT listening for mailbox commands...
3,639,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,216 UART: [rt]cmd =0x41544d4e, len=14344
4,320,536 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
919,003 UART: [kat] HMAC-384Kdf
923,709 UART: [kat] LMS
1,172,037 UART: [kat] --
1,173,132 UART: [cold-reset] ++
1,173,662 UART: [fht] FHT @ 0x50003400
1,176,397 UART: [idev] ++
1,176,565 UART: [idev] CDI.KEYID = 6
1,176,925 UART: [idev] SUBJECT.KEYID = 7
1,177,349 UART: [idev] UDS.KEYID = 0
1,177,694 ready_for_fw is high
1,177,694 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,889 UART: [idev] Erasing UDS.KEYID = 0
1,201,816 UART: [idev] Sha1 KeyId Algorithm
1,210,404 UART: [idev] --
1,211,568 UART: [ldev] ++
1,211,736 UART: [ldev] CDI.KEYID = 6
1,212,099 UART: [ldev] SUBJECT.KEYID = 5
1,212,525 UART: [ldev] AUTHORITY.KEYID = 7
1,212,988 UART: [ldev] FE.KEYID = 1
1,218,342 UART: [ldev] Erasing FE.KEYID = 1
1,245,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,756 UART: [ldev] --
1,285,175 UART: [fwproc] Wait for Commands...
1,285,917 UART: [fwproc] Recv command 0x46574c44
1,286,645 UART: [fwproc] Recv'd Img size: 114084 bytes
3,123,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,315,443 >>> mbox cmd response: success
3,316,595 UART: [afmc] ++
3,316,763 UART: [afmc] CDI.KEYID = 6
3,317,125 UART: [afmc] SUBJECT.KEYID = 7
3,317,550 UART: [afmc] AUTHORITY.KEYID = 5
3,353,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,963 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,672 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,564 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,275 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,076 UART: [afmc] --
3,397,118 UART: [cold-reset] --
3,398,136 UART: [state] Locking Datavault
3,399,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,841 UART: [state] Locking ICCM
3,400,391 UART: [exit] Launching FMC @ 0x40000130
3,405,720 UART:
3,405,736 UART: Running Caliptra FMC ...
3,406,144 UART:
3,406,287 UART: [state] CFI Enabled
3,416,725 UART: [fht] FMC Alias Private Key: 7
3,524,685 UART: [art] Extend RT PCRs Done
3,525,113 UART: [art] Lock RT PCRs Done
3,526,673 UART: [art] Populate DV Done
3,534,737 UART: [fht] FMC Alias Private Key: 7
3,535,849 UART: [art] Derive CDI
3,536,129 UART: [art] Store in in slot 0x4
3,621,628 UART: [art] Derive Key Pair
3,621,988 UART: [art] Store priv key in slot 0x5
3,635,114 UART: [art] Derive Key Pair - Done
3,649,585 UART: [art] Signing Cert with AUTHO
3,650,065 UART: RITY.KEYID = 7
3,664,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,540 UART: [art] PUB.X = BC7956F478D46022DB7D1CD1771E3B685A6791057EF17D21F7A7E56BF6B8803DB9E82A7C113A865D743BDC93DB6BB623
3,672,315 UART: [art] PUB.Y = 740626DE820745958901D834D354A03AF0AF35163B0B7DE584D0C08CD58642F490E7E9C6745135256BBF2C9F0B435741
3,679,242 UART: [art] SIG.R = 003A738408FD46353AA803443F6333459786A69C135280CAC738482B1611DDD8D461C2E35CE1109BE2285E0D78A916D0
3,685,971 UART: [art] SIG.S = F50FE0350DF0D19DBBF29AC9A1DCDC795D9AE83939FAEFFFB97E21C34EA562B96841358F93CF320B587C9D0645F5CED9
3,709,926 UART: Caliptra RT
3,710,271 UART: [state] CFI Enabled
3,817,731 UART: [rt] RT listening for mailbox commands...
3,818,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,523 UART: [rt]cmd =0x41544d4e, len=14344
4,497,238 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 ready_for_fw is high
1,061,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,007 >>> mbox cmd response: success
3,234,680 UART:
3,234,696 UART: Running Caliptra FMC ...
3,235,104 UART:
3,235,247 UART: [state] CFI Enabled
3,245,901 UART: [fht] FMC Alias Private Key: 7
3,354,025 UART: [art] Extend RT PCRs Done
3,354,453 UART: [art] Lock RT PCRs Done
3,356,025 UART: [art] Populate DV Done
3,364,431 UART: [fht] FMC Alias Private Key: 7
3,365,565 UART: [art] Derive CDI
3,365,845 UART: [art] Store in in slot 0x4
3,451,516 UART: [art] Derive Key Pair
3,451,876 UART: [art] Store priv key in slot 0x5
3,465,776 UART: [art] Derive Key Pair - Done
3,480,734 UART: [art] Signing Cert with AUTHO
3,481,214 UART: RITY.KEYID = 7
3,496,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,207 UART: [art] PUB.X = 22A47CFDA31429CBE71DF1A19EF900ACECB95EBED50B0580F53B0BEB863003FEEC2456E2D660A8AB0BC74D0FB39D74E4
3,503,963 UART: [art] PUB.Y = B4C00E54EBD7112329C90AA4129AD7E16950BA49881CF78EC8F722B7376CAA9FF84CD14E085D4BC9C5E4B161DCFC1F3A
3,510,922 UART: [art] SIG.R = C1C891734851685B05E9763DC2DCCA7E2B81E27A7639667761C4FC45DD7BAAF1BEDFF02EA26C76D338FF02D798198F23
3,517,696 UART: [art] SIG.S = 56F885C77A1142DDCE332DE4CC325ED7E5F739F1AD3C367B46B133452BA40051E991D167B3FCD2A5659F96F7BB7249EF
3,542,203 UART: Caliptra RT
3,542,548 UART: [state] CFI Enabled
3,651,506 UART: [rt] RT listening for mailbox commands...
3,652,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,256 UART: [rt]cmd =0x41544d4e, len=14344
4,338,218 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,139 UART: [cold-reset] ++
1,169,693 UART: [fht] FHT @ 0x50003400
1,172,313 UART: [idev] ++
1,172,481 UART: [idev] CDI.KEYID = 6
1,172,842 UART: [idev] SUBJECT.KEYID = 7
1,173,267 UART: [idev] UDS.KEYID = 0
1,173,613 ready_for_fw is high
1,173,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,155 UART: [idev] Erasing UDS.KEYID = 0
1,197,969 UART: [idev] Sha1 KeyId Algorithm
1,206,821 UART: [idev] --
1,207,802 UART: [ldev] ++
1,207,970 UART: [ldev] CDI.KEYID = 6
1,208,334 UART: [ldev] SUBJECT.KEYID = 5
1,208,761 UART: [ldev] AUTHORITY.KEYID = 7
1,209,224 UART: [ldev] FE.KEYID = 1
1,214,262 UART: [ldev] Erasing FE.KEYID = 1
1,240,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,092 UART: [ldev] --
1,279,566 UART: [fwproc] Wait for Commands...
1,280,199 UART: [fwproc] Recv command 0x46574c44
1,280,932 UART: [fwproc] Recv'd Img size: 114084 bytes
3,124,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,468 >>> mbox cmd response: success
3,319,581 UART: [afmc] ++
3,319,749 UART: [afmc] CDI.KEYID = 6
3,320,112 UART: [afmc] SUBJECT.KEYID = 7
3,320,538 UART: [afmc] AUTHORITY.KEYID = 5
3,356,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,463 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,173 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,063 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,774 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,370 UART: [afmc] --
3,399,360 UART: [cold-reset] --
3,399,958 UART: [state] Locking Datavault
3,401,003 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,607 UART: [state] Locking ICCM
3,402,043 UART: [exit] Launching FMC @ 0x40000130
3,407,372 UART:
3,407,388 UART: Running Caliptra FMC ...
3,407,796 UART:
3,407,850 UART: [state] CFI Enabled
3,418,172 UART: [fht] FMC Alias Private Key: 7
3,525,886 UART: [art] Extend RT PCRs Done
3,526,314 UART: [art] Lock RT PCRs Done
3,527,988 UART: [art] Populate DV Done
3,536,286 UART: [fht] FMC Alias Private Key: 7
3,537,368 UART: [art] Derive CDI
3,537,648 UART: [art] Store in in slot 0x4
3,623,799 UART: [art] Derive Key Pair
3,624,159 UART: [art] Store priv key in slot 0x5
3,636,909 UART: [art] Derive Key Pair - Done
3,651,573 UART: [art] Signing Cert with AUTHO
3,652,053 UART: RITY.KEYID = 7
3,667,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,100 UART: [art] PUB.X = 24C31546F0B132F71B9770F2A8B3D31554D0063CDA2FDC52EADFEC42E32835894DA996BB7CDE26B7F120B06EF11CE00E
3,674,878 UART: [art] PUB.Y = C676286C9C619B44C8F97D5877853D70DD1955BC1F5B390800BCDFC7FC9039EB2A630446AE29B215BBCC78510F33C43D
3,681,803 UART: [art] SIG.R = C1A20BA0338DEF81F3230F8C30BC468BAAB8183AB6F60189126B44A56B8C3B37AE50C0CA7397BF6FACED730BB5C59EBE
3,688,583 UART: [art] SIG.S = 77083B72677A762CC9E493CB83E123B5C73DB05185F3470EE7F6DB6E2ED227F20816BD3E2AC3933834B93743C689214B
3,712,119 UART: Caliptra RT
3,712,372 UART: [state] CFI Enabled
3,820,492 UART: [rt] RT listening for mailbox commands...
3,821,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,218 UART: [rt]cmd =0x41544d4e, len=14344
4,492,774 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,850 ready_for_fw is high
1,055,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,146 >>> mbox cmd response: success
3,230,275 UART:
3,230,291 UART: Running Caliptra FMC ...
3,230,699 UART:
3,230,753 UART: [state] CFI Enabled
3,241,371 UART: [fht] FMC Alias Private Key: 7
3,349,749 UART: [art] Extend RT PCRs Done
3,350,177 UART: [art] Lock RT PCRs Done
3,351,491 UART: [art] Populate DV Done
3,359,595 UART: [fht] FMC Alias Private Key: 7
3,360,683 UART: [art] Derive CDI
3,360,963 UART: [art] Store in in slot 0x4
3,447,006 UART: [art] Derive Key Pair
3,447,366 UART: [art] Store priv key in slot 0x5
3,460,516 UART: [art] Derive Key Pair - Done
3,475,341 UART: [art] Signing Cert with AUTHO
3,475,821 UART: RITY.KEYID = 7
3,491,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,958 UART: [art] PUB.X = 2E87BE627F65BDBF5FFB25EA42DCC8FCB03774ACBAE9E0A9BC1CB4D209EA7395B423FB9C393C94CA59CB43E2E738EAB2
3,498,757 UART: [art] PUB.Y = 957C66CDF5047EA40F4A2E230060D24555EDC5952BA9FCC04F14924A0CB01253A15BA4627ECFF394D2EFDA9D25AEF941
3,505,690 UART: [art] SIG.R = 9CB07A1EA79E3C985A5C4E8510CD070500A2F3F5DA158C25957EB5EE00209AB9A332E3BFC46FBFAB3686AEA9F99F9025
3,512,426 UART: [art] SIG.S = 8025634832AEDDE711D79C9B16E74AB1E56867F2A84AC380643482E36D327AA33C778D861B05A8F3A44967EAD9D39CBA
3,535,992 UART: Caliptra RT
3,536,245 UART: [state] CFI Enabled
3,643,918 UART: [rt] RT listening for mailbox commands...
3,644,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,694 UART: [rt]cmd =0x41544d4e, len=14344
4,330,588 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 ready_for_fw is high
1,174,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,982 UART: [idev] Sha1 KeyId Algorithm
1,208,858 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,237 UART: [fwproc] Wait for Commands...
1,284,038 UART: [fwproc] Recv command 0x46574c44
1,284,771 UART: [fwproc] Recv'd Img size: 114084 bytes
3,108,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,136,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,166,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,301,507 >>> mbox cmd response: success
3,302,612 UART: [afmc] ++
3,302,780 UART: [afmc] CDI.KEYID = 6
3,303,143 UART: [afmc] SUBJECT.KEYID = 7
3,303,569 UART: [afmc] AUTHORITY.KEYID = 5
3,338,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,355,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,356,064 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,361,774 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,367,664 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,373,375 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,381,097 UART: [afmc] --
3,382,041 UART: [cold-reset] --
3,383,179 UART: [state] Locking Datavault
3,384,392 UART: [state] Locking PCR0, PCR1 and PCR31
3,384,996 UART: [state] Locking ICCM
3,385,520 UART: [exit] Launching FMC @ 0x40000130
3,390,849 UART:
3,390,865 UART: Running Caliptra FMC ...
3,391,273 UART:
3,391,416 UART: [state] CFI Enabled
3,401,932 UART: [fht] FMC Alias Private Key: 7
3,509,982 UART: [art] Extend RT PCRs Done
3,510,410 UART: [art] Lock RT PCRs Done
3,512,042 UART: [art] Populate DV Done
3,520,088 UART: [fht] FMC Alias Private Key: 7
3,521,130 UART: [art] Derive CDI
3,521,410 UART: [art] Store in in slot 0x4
3,607,527 UART: [art] Derive Key Pair
3,607,887 UART: [art] Store priv key in slot 0x5
3,621,813 UART: [art] Derive Key Pair - Done
3,636,486 UART: [art] Signing Cert with AUTHO
3,636,966 UART: RITY.KEYID = 7
3,651,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,652,447 UART: [art] PUB.X = A7E41DC71815073DCD6840A512C1FBA33C351FFFB1A35986618301B5AF7EB54AC2E44741884CE9FFCB73250E4CBDC0D0
3,659,222 UART: [art] PUB.Y = CD6C3B89457DA73D6C2AB8B0E9A4CDB84D82D63DD87D9C002676CD13C11D53E2C19EA03447F450E266ADE7D01CB363EF
3,666,168 UART: [art] SIG.R = CD67C14971F58E3658CAA7403ABCBFA3393E0729CFCED4BBE62C7068413841B25202F93BD16355BEA5440F170315B9CB
3,672,934 UART: [art] SIG.S = DE136BAC09BDE34BF822AD0A7477B76B86D1523D57A3500A43CAE87A11C4CDA38AF0845AADB22FACB493AFC7E6A0A6A0
3,696,462 UART: Caliptra RT
3,696,807 UART: [state] CFI Enabled
3,804,552 UART: [rt] RT listening for mailbox commands...
3,805,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,928,038 UART: [rt]cmd =0x41544d4e, len=14344
4,491,328 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,557 ready_for_fw is high
1,056,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,170,643 >>> mbox cmd response: success
3,232,470 UART:
3,232,486 UART: Running Caliptra FMC ...
3,232,894 UART:
3,233,037 UART: [state] CFI Enabled
3,243,719 UART: [fht] FMC Alias Private Key: 7
3,351,831 UART: [art] Extend RT PCRs Done
3,352,259 UART: [art] Lock RT PCRs Done
3,353,859 UART: [art] Populate DV Done
3,362,041 UART: [fht] FMC Alias Private Key: 7
3,363,133 UART: [art] Derive CDI
3,363,413 UART: [art] Store in in slot 0x4
3,449,214 UART: [art] Derive Key Pair
3,449,574 UART: [art] Store priv key in slot 0x5
3,463,362 UART: [art] Derive Key Pair - Done
3,477,977 UART: [art] Signing Cert with AUTHO
3,478,457 UART: RITY.KEYID = 7
3,494,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,132 UART: [art] PUB.X = CCB601EB6550D54660605E3592E5432282B332506B05AB24D36F2FBA4AB4FA25DCEA5A68F1DDFF967C827F1CD24FB5A0
3,501,910 UART: [art] PUB.Y = 3D0D248797A3A0AF8224EB422795D29AF6AAF023D287353054324BEDC06654E8C49CA2927235C211DC694A5CE087CEF1
3,508,859 UART: [art] SIG.R = 014BF58C7DD853A2A2C4CDBB802FCC46AE7E9552B3B0E9B2EFCE2972F81A20C88E8097DAEC2190D6121982F3D2F1384A
3,515,642 UART: [art] SIG.S = A3D0A8926C50CDA188D3F85302D84AD44E33ECBB4D9AC621EFFE1D84A45B89857C8ED285560169926C46D3E0FDAB3BA2
3,539,459 UART: Caliptra RT
3,539,804 UART: [state] CFI Enabled
3,648,042 UART: [rt] RT listening for mailbox commands...
3,648,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,500 UART: [rt]cmd =0x41544d4e, len=14344
4,332,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,177 UART:
192,538 UART: Running Caliptra ROM ...
193,731 UART:
193,890 UART: [state] CFI Enabled
262,437 UART: [state] LifecycleState = Unprovisioned
264,421 UART: [state] DebugLocked = No
266,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,025 UART: [kat] SHA2-256
440,785 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,245 UART: [kat] ++
451,690 UART: [kat] sha1
464,289 UART: [kat] SHA2-256
467,023 UART: [kat] SHA2-384
473,016 UART: [kat] SHA2-512-ACC
475,388 UART: [kat] ECC-384
2,766,329 UART: [kat] HMAC-384Kdf
2,799,373 UART: [kat] LMS
3,989,678 UART: [kat] --
3,995,778 UART: [cold-reset] ++
3,997,741 UART: [fht] Storing FHT @ 0x50003400
4,009,302 UART: [idev] ++
4,009,882 UART: [idev] CDI.KEYID = 6
4,010,805 UART: [idev] SUBJECT.KEYID = 7
4,012,053 UART: [idev] UDS.KEYID = 0
4,013,155 ready_for_fw is high
4,013,365 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,016 UART: [idev] Erasing UDS.KEYID = 0
7,346,214 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,187 UART: [idev] --
7,373,181 UART: [ldev] ++
7,373,763 UART: [ldev] CDI.KEYID = 6
7,374,880 UART: [ldev] SUBJECT.KEYID = 5
7,375,985 UART: [ldev] AUTHORITY.KEYID = 7
7,377,164 UART: [ldev] FE.KEYID = 1
7,414,645 UART: [ldev] Erasing FE.KEYID = 1
10,748,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,528 UART: [ldev] --
13,128,964 UART: [fwproc] Waiting for Commands...
13,130,576 UART: [fwproc] Received command 0x46574c44
13,132,780 UART: [fwproc] Received Image of size 113760 bytes
22,318,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,400,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,469,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,786,091 >>> mbox cmd response: success
22,789,814 UART: [afmc] ++
22,790,410 UART: [afmc] CDI.KEYID = 6
22,791,297 UART: [afmc] SUBJECT.KEYID = 7
22,792,563 UART: [afmc] AUTHORITY.KEYID = 5
26,160,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,461,234 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,463,492 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,478,094 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,492,830 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,507,020 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,529,347 UART: [afmc] --
28,533,927 UART: [cold-reset] --
28,537,032 UART: [state] Locking Datavault
28,541,258 UART: [state] Locking PCR0, PCR1 and PCR31
28,542,962 UART: [state] Locking ICCM
28,545,222 UART: [exit] Launching FMC @ 0x40000130
28,553,617 UART:
28,553,850 UART: Running Caliptra FMC ...
28,554,951 UART:
28,555,110 UART: [state] CFI Enabled
28,620,223 UART: [fht] FMC Alias Private Key: 7
30,958,153 UART: [art] Extend RT PCRs Done
30,959,381 UART: [art] Lock RT PCRs Done
30,960,984 UART: [art] Populate DV Done
30,966,715 UART: [fht] FMC Alias Private Key: 7
30,968,195 UART: [art] Derive CDI
30,968,938 UART: [art] Store in in slot 0x4
31,029,121 UART: [art] Derive Key Pair
31,030,124 UART: [art] Store priv key in slot 0x5
34,323,099 UART: [art] Derive Key Pair - Done
34,336,211 UART: [art] Signing Cert with AUTHO
34,337,521 UART: RITY.KEYID = 7
36,623,773 UART: [art] Erasing AUTHORITY.KEYID = 7
36,625,279 UART: [art] PUB.X = 105F21271FE31F9209BC7658C84B9448DF341FFE72E4DD6D696946D1D5F11D9E0465CC5182CFF33A7FF4730931C65A92
36,632,524 UART: [art] PUB.Y = 9957D4CB5BB6857CF76DC507CEE9406E931B1ADCCF9269E2922882E9B7AA3F045845B55975E80A25FEA09D62BEBB26BD
36,639,779 UART: [art] SIG.R = C49EAD41025966374358C2D76B2F7D948F6F74318524A27999F61BB7BD8AA4C6D8616136366A436ACC1DD4098421F43A
36,647,121 UART: [art] SIG.S = C59CACD56D50AA5BD048A1E30CB9D3889286E64CD0CCFB944569EA779C58349781B4AC1ACC138020A8296319B49946B8
37,952,685 UART: Caliptra RT
37,953,374 UART: [state] CFI Enabled
38,113,980 UART: [rt] RT listening for mailbox commands...
38,116,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,271,622 UART: [rt]cmd =0x41544d4e, len=14344
40,303,177 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,782,433 ready_for_fw is high
3,782,862 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,884,835 >>> mbox cmd response: success
27,577,621 UART:
27,578,013 UART: Running Caliptra FMC ...
27,579,167 UART:
27,579,329 UART: [state] CFI Enabled
27,645,790 UART: [fht] FMC Alias Private Key: 7
29,983,123 UART: [art] Extend RT PCRs Done
29,984,354 UART: [art] Lock RT PCRs Done
29,985,793 UART: [art] Populate DV Done
29,991,317 UART: [fht] FMC Alias Private Key: 7
29,992,861 UART: [art] Derive CDI
29,993,681 UART: [art] Store in in slot 0x4
30,054,461 UART: [art] Derive Key Pair
30,055,557 UART: [art] Store priv key in slot 0x5
33,348,266 UART: [art] Derive Key Pair - Done
33,361,109 UART: [art] Signing Cert with AUTHO
33,362,430 UART: RITY.KEYID = 7
35,650,494 UART: [art] Erasing AUTHORITY.KEYID = 7
35,652,001 UART: [art] PUB.X = 65584F473F06F508F4FA7B30010C3BE073CA4EA05CF4A98F0490E7B7ECA307C25B021AAD96809AD6CF40E168684A85B5
35,659,263 UART: [art] PUB.Y = D40A5B540A862FFBCEB3FEC9B3BD5757D869C694B05239236B6CC1AD1F3195E38EB829D9218D993AE1B81DF63DB4FD6E
35,666,534 UART: [art] SIG.R = C95DD19E167285635D1C5DB181552966B87EAECCB34F27F3DD37DB586476D9CB48F8AA9E62D9AE4BACBD00A0382BB105
35,673,888 UART: [art] SIG.S = 7F2AA5845D89B784C4F7D1EFEE93EC6BB4B2D3DCB32B8190C4F45DAF2362F73B29DA2DCA6BE3980C5AA7FE50AC194D71
36,979,526 UART: Caliptra RT
36,980,228 UART: [state] CFI Enabled
37,141,357 UART: [rt] RT listening for mailbox commands...
37,143,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,298,966 UART: [rt]cmd =0x41544d4e, len=14344
39,356,163 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
192,791 UART:
193,179 UART: Running Caliptra ROM ...
194,325 UART:
604,195 UART: [state] CFI Enabled
616,368 UART: [state] LifecycleState = Unprovisioned
618,243 UART: [state] DebugLocked = No
620,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,322 UART: [kat] SHA2-256
796,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,624 UART: [kat] ++
807,074 UART: [kat] sha1
817,452 UART: [kat] SHA2-256
820,175 UART: [kat] SHA2-384
825,876 UART: [kat] SHA2-512-ACC
828,230 UART: [kat] ECC-384
3,109,115 UART: [kat] HMAC-384Kdf
3,120,227 UART: [kat] LMS
4,310,387 UART: [kat] --
4,315,881 UART: [cold-reset] ++
4,317,028 UART: [fht] Storing FHT @ 0x50003400
4,329,072 UART: [idev] ++
4,329,630 UART: [idev] CDI.KEYID = 6
4,330,577 UART: [idev] SUBJECT.KEYID = 7
4,331,813 UART: [idev] UDS.KEYID = 0
4,332,809 ready_for_fw is high
4,333,007 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,378 UART: [idev] Erasing UDS.KEYID = 0
7,620,872 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,703 UART: [idev] --
7,644,974 UART: [ldev] ++
7,645,547 UART: [ldev] CDI.KEYID = 6
7,646,480 UART: [ldev] SUBJECT.KEYID = 5
7,647,758 UART: [ldev] AUTHORITY.KEYID = 7
7,648,985 UART: [ldev] FE.KEYID = 1
7,659,837 UART: [ldev] Erasing FE.KEYID = 1
10,945,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,066 UART: [ldev] --
13,306,254 UART: [fwproc] Waiting for Commands...
13,308,871 UART: [fwproc] Received command 0x46574c44
13,311,061 UART: [fwproc] Received Image of size 113760 bytes
22,100,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,179,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,248,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,565,650 >>> mbox cmd response: success
22,569,547 UART: [afmc] ++
22,570,141 UART: [afmc] CDI.KEYID = 6
22,571,162 UART: [afmc] SUBJECT.KEYID = 7
22,572,322 UART: [afmc] AUTHORITY.KEYID = 5
25,885,535 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,180,011 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,182,264 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,196,823 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,211,575 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,225,783 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,248,609 UART: [afmc] --
28,251,880 UART: [cold-reset] --
28,254,928 UART: [state] Locking Datavault
28,260,229 UART: [state] Locking PCR0, PCR1 and PCR31
28,261,981 UART: [state] Locking ICCM
28,263,475 UART: [exit] Launching FMC @ 0x40000130
28,271,843 UART:
28,272,126 UART: Running Caliptra FMC ...
28,273,235 UART:
28,273,393 UART: [state] CFI Enabled
28,281,628 UART: [fht] FMC Alias Private Key: 7
30,612,714 UART: [art] Extend RT PCRs Done
30,613,938 UART: [art] Lock RT PCRs Done
30,615,753 UART: [art] Populate DV Done
30,621,213 UART: [fht] FMC Alias Private Key: 7
30,622,851 UART: [art] Derive CDI
30,623,583 UART: [art] Store in in slot 0x4
30,666,381 UART: [art] Derive Key Pair
30,667,421 UART: [art] Store priv key in slot 0x5
33,909,098 UART: [art] Derive Key Pair - Done
33,922,213 UART: [art] Signing Cert with AUTHO
33,923,559 UART: RITY.KEYID = 7
36,203,352 UART: [art] Erasing AUTHORITY.KEYID = 7
36,204,864 UART: [art] PUB.X = C28C35D683FE6084B6094A2E148EAFD8A7E0D514303CF81244A42A2439FB917BAA02E68485EDC267B14EDBB6F980F7D5
36,212,076 UART: [art] PUB.Y = 79EED590A2CC67F4395FCA2B4E7C3BAA011C27B657302EBDF6155E6A8E14A1BF300777C46FF8E5CFD480EEE59FCFB211
36,219,337 UART: [art] SIG.R = E151C6690980BCBAC9E3CEEF8A5C92A3FB061828710DCFB308F8A45C4030CC35FA401E92C4E302215CE73A70CBBDB8F6
36,226,751 UART: [art] SIG.S = B4D4A5FEA44201EEFB0AA02BE0A111504BBD8BD34A9DF3A10A0A86E58730AC0770DBC1F8B633334CB0E7736089A77434
37,531,588 UART: Caliptra RT
37,532,281 UART: [state] CFI Enabled
37,650,160 UART: [rt] RT listening for mailbox commands...
37,652,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,807,802 UART: [rt]cmd =0x41544d4e, len=14344
39,917,559 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
4,129,881 ready_for_fw is high
4,130,307 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,513,539 >>> mbox cmd response: success
28,154,779 UART:
28,155,203 UART: Running Caliptra FMC ...
28,156,407 UART:
28,156,572 UART: [state] CFI Enabled
28,164,264 UART: [fht] FMC Alias Private Key: 7
30,495,044 UART: [art] Extend RT PCRs Done
30,496,277 UART: [art] Lock RT PCRs Done
30,497,798 UART: [art] Populate DV Done
30,503,206 UART: [fht] FMC Alias Private Key: 7
30,504,691 UART: [art] Derive CDI
30,505,450 UART: [art] Store in in slot 0x4
30,547,712 UART: [art] Derive Key Pair
30,548,713 UART: [art] Store priv key in slot 0x5
33,790,635 UART: [art] Derive Key Pair - Done
33,803,808 UART: [art] Signing Cert with AUTHO
33,805,117 UART: RITY.KEYID = 7
36,084,309 UART: [art] Erasing AUTHORITY.KEYID = 7
36,085,840 UART: [art] PUB.X = 0CD8E6C61966E7E3A7D7F9110BF7BB4D97080DB7F7632686D4EBD5BC3C1EB099FCAC01AA385ACE43F9424878DBF8C50E
36,093,108 UART: [art] PUB.Y = 4AD75F87ED8921DF330461A815BFB83CB7874431AFC2D17B93251B493512AF1488DE6AB02A85D71BB28B16AD83EA54FC
36,100,286 UART: [art] SIG.R = 21366118F83E5999B6133C21F37081E9ADC0B7B629428B6796D55C625C267CAFB5923907595A4CD1378E758F78D2FF87
36,107,672 UART: [art] SIG.S = 60CC033AECFFCD78D0F16A5412CDF75177C60FFCC6C4E0FB56F83EA2C6850FF28F85DE23BDF48E919033BE0C0929F5C5
37,412,435 UART: Caliptra RT
37,413,149 UART: [state] CFI Enabled
37,530,931 UART: [rt] RT listening for mailbox commands...
37,533,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,688,619 UART: [rt]cmd =0x41544d4e, len=14344
39,720,446 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,446 UART:
192,815 UART: Running Caliptra ROM ...
193,902 UART:
194,040 UART: [state] CFI Enabled
261,236 UART: [state] LifecycleState = Unprovisioned
263,062 UART: [state] DebugLocked = No
265,365 UART: [state] WD Timer not started. Device not locked for debugging
268,369 UART: [kat] SHA2-256
447,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,085 UART: [kat] ++
459,540 UART: [kat] sha1
470,621 UART: [kat] SHA2-256
473,689 UART: [kat] SHA2-384
478,892 UART: [kat] SHA2-512-ACC
481,832 UART: [kat] ECC-384
2,945,343 UART: [kat] HMAC-384Kdf
2,969,814 UART: [kat] LMS
3,499,271 UART: [kat] --
3,504,052 UART: [cold-reset] ++
3,505,840 UART: [fht] FHT @ 0x50003400
3,515,602 UART: [idev] ++
3,516,162 UART: [idev] CDI.KEYID = 6
3,517,185 UART: [idev] SUBJECT.KEYID = 7
3,518,300 UART: [idev] UDS.KEYID = 0
3,519,228 ready_for_fw is high
3,519,415 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,001 UART: [idev] Erasing UDS.KEYID = 0
6,021,853 UART: [idev] Sha1 KeyId Algorithm
6,044,060 UART: [idev] --
6,047,304 UART: [ldev] ++
6,047,877 UART: [ldev] CDI.KEYID = 6
6,048,788 UART: [ldev] SUBJECT.KEYID = 5
6,049,943 UART: [ldev] AUTHORITY.KEYID = 7
6,051,226 UART: [ldev] FE.KEYID = 1
6,077,048 UART: [ldev] Erasing FE.KEYID = 1
8,581,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,091 UART: [ldev] --
10,391,426 UART: [fwproc] Wait for Commands...
10,393,406 UART: [fwproc] Recv command 0x46574c44
10,395,524 UART: [fwproc] Recv'd Img size: 114084 bytes
14,974,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,049,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,434,559 >>> mbox cmd response: success
15,438,790 UART: [afmc] ++
15,439,381 UART: [afmc] CDI.KEYID = 6
15,440,260 UART: [afmc] SUBJECT.KEYID = 7
15,441,468 UART: [afmc] AUTHORITY.KEYID = 5
17,979,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,635 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,608 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,382 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,778,695 UART: [afmc] --
19,783,159 UART: [cold-reset] --
19,785,716 UART: [state] Locking Datavault
19,790,905 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,549 UART: [state] Locking ICCM
19,794,971 UART: [exit] Launching FMC @ 0x40000130
19,803,422 UART:
19,803,654 UART: Running Caliptra FMC ...
19,804,754 UART:
19,804,907 UART: [state] CFI Enabled
19,863,864 UART: [fht] FMC Alias Private Key: 7
21,627,768 UART: [art] Extend RT PCRs Done
21,628,985 UART: [art] Lock RT PCRs Done
21,630,573 UART: [art] Populate DV Done
21,635,771 UART: [fht] FMC Alias Private Key: 7
21,637,251 UART: [art] Derive CDI
21,638,010 UART: [art] Store in in slot 0x4
21,696,453 UART: [art] Derive Key Pair
21,697,492 UART: [art] Store priv key in slot 0x5
24,160,552 UART: [art] Derive Key Pair - Done
24,173,543 UART: [art] Signing Cert with AUTHO
24,174,848 UART: RITY.KEYID = 7
25,886,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,888,236 UART: [art] PUB.X = 2B786A526C9C4FFA38870F6D696C38A81D8F5EFEAD8106F53FF0BF8D8267C0230E92D769D63F1D108ACF59DCCEC97CE5
25,895,552 UART: [art] PUB.Y = AF35D5D2DA680EE915226A3521C9E55E2EA885B285A4D516DAB98FA711295CB4BAEC5893B6D38DADA14F073E15342DA6
25,902,764 UART: [art] SIG.R = A3D843D6E501EAE411B56E1E02314B01DB5074BD7EFFD922ABEFFF22ECB92831AF5167AE7E0C001FE27970EC1E06A45B
25,910,147 UART: [art] SIG.S = 4C0175D280BF2B5192D3F8CFFE4CD372236F92161C5132155F341209FCEEE2DF46FC131004CCD98A535EA10836697D28
26,889,215 UART: Caliptra RT
26,889,904 UART: [state] CFI Enabled
27,054,732 UART: [rt] RT listening for mailbox commands...
27,057,048 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,276 UART: [rt]cmd =0x41544d4e, len=14344
28,391,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,380,755 ready_for_fw is high
3,381,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,088,910 >>> mbox cmd response: success
19,385,608 UART:
19,386,004 UART: Running Caliptra FMC ...
19,387,135 UART:
19,387,292 UART: [state] CFI Enabled
19,453,359 UART: [fht] FMC Alias Private Key: 7
21,217,100 UART: [art] Extend RT PCRs Done
21,218,321 UART: [art] Lock RT PCRs Done
21,219,815 UART: [art] Populate DV Done
21,224,925 UART: [fht] FMC Alias Private Key: 7
21,226,599 UART: [art] Derive CDI
21,227,341 UART: [art] Store in in slot 0x4
21,285,847 UART: [art] Derive Key Pair
21,286,959 UART: [art] Store priv key in slot 0x5
23,749,516 UART: [art] Derive Key Pair - Done
23,762,526 UART: [art] Signing Cert with AUTHO
23,763,833 UART: RITY.KEYID = 7
25,475,510 UART: [art] Erasing AUTHORITY.KEYID = 7
25,477,017 UART: [art] PUB.X = A73CE93168D2EC58E4AD076A865A460C51FAB19E0A6DE6F0132845B98EE5BEF7A4D2324F853B26E6173EBF0D819C47F0
25,484,292 UART: [art] PUB.Y = 2B1B9950A73B9E9F7CE87C66D033E698AAA91B3A3D35D3129AE5023F2FFCF41941977FF75E953C807AF938C3A5628F7F
25,491,592 UART: [art] SIG.R = C8CEC95CF6C348A2F8AB0E2373DDB7B06B54C0592B09C29EB5FD18C4C6708584FF282E05CD57BC41134448F9752F7D3D
25,498,970 UART: [art] SIG.S = 9B55E6962476482FD47C2C9683726A15E1AF45FBDA61BE231AB9CA145024FF754C5383E276AE51046249D76975854F50
26,478,242 UART: Caliptra RT
26,478,955 UART: [state] CFI Enabled
26,644,142 UART: [rt] RT listening for mailbox commands...
26,646,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,801,583 UART: [rt]cmd =0x41544d4e, len=14344
27,987,761 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,923 writing to cptra_bootfsm_go
193,042 UART:
193,430 UART: Running Caliptra ROM ...
194,549 UART:
604,089 UART: [state] CFI Enabled
615,292 UART: [state] LifecycleState = Unprovisioned
617,205 UART: [state] DebugLocked = No
619,310 UART: [state] WD Timer not started. Device not locked for debugging
623,585 UART: [kat] SHA2-256
802,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,267 UART: [kat] ++
814,805 UART: [kat] sha1
825,972 UART: [kat] SHA2-256
828,979 UART: [kat] SHA2-384
836,390 UART: [kat] SHA2-512-ACC
839,336 UART: [kat] ECC-384
3,282,281 UART: [kat] HMAC-384Kdf
3,296,137 UART: [kat] LMS
3,825,625 UART: [kat] --
3,831,562 UART: [cold-reset] ++
3,833,430 UART: [fht] FHT @ 0x50003400
3,844,627 UART: [idev] ++
3,845,212 UART: [idev] CDI.KEYID = 6
3,846,120 UART: [idev] SUBJECT.KEYID = 7
3,847,296 UART: [idev] UDS.KEYID = 0
3,848,343 ready_for_fw is high
3,848,547 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,829 UART: [idev] Erasing UDS.KEYID = 0
6,317,038 UART: [idev] Sha1 KeyId Algorithm
6,339,180 UART: [idev] --
6,342,630 UART: [ldev] ++
6,343,201 UART: [ldev] CDI.KEYID = 6
6,344,218 UART: [ldev] SUBJECT.KEYID = 5
6,345,325 UART: [ldev] AUTHORITY.KEYID = 7
6,346,559 UART: [ldev] FE.KEYID = 1
6,357,792 UART: [ldev] Erasing FE.KEYID = 1
8,835,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,776 UART: [ldev] --
10,626,186 UART: [fwproc] Wait for Commands...
10,629,311 UART: [fwproc] Recv command 0x46574c44
10,631,404 UART: [fwproc] Recv'd Img size: 114084 bytes
15,215,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,290,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,358,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,676,615 >>> mbox cmd response: success
15,680,883 UART: [afmc] ++
15,681,485 UART: [afmc] CDI.KEYID = 6
15,682,373 UART: [afmc] SUBJECT.KEYID = 7
15,683,590 UART: [afmc] AUTHORITY.KEYID = 5
18,182,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,902,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,904,170 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,920,120 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,936,107 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,951,818 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,974,648 UART: [afmc] --
19,978,340 UART: [cold-reset] --
19,981,504 UART: [state] Locking Datavault
19,985,248 UART: [state] Locking PCR0, PCR1 and PCR31
19,986,894 UART: [state] Locking ICCM
19,989,073 UART: [exit] Launching FMC @ 0x40000130
19,997,529 UART:
19,997,763 UART: Running Caliptra FMC ...
19,998,791 UART:
19,998,937 UART: [state] CFI Enabled
20,007,145 UART: [fht] FMC Alias Private Key: 7
21,764,026 UART: [art] Extend RT PCRs Done
21,765,247 UART: [art] Lock RT PCRs Done
21,767,277 UART: [art] Populate DV Done
21,772,799 UART: [fht] FMC Alias Private Key: 7
21,774,443 UART: [art] Derive CDI
21,775,181 UART: [art] Store in in slot 0x4
21,817,611 UART: [art] Derive Key Pair
21,818,653 UART: [art] Store priv key in slot 0x5
24,245,407 UART: [art] Derive Key Pair - Done
24,258,452 UART: [art] Signing Cert with AUTHO
24,259,761 UART: RITY.KEYID = 7
25,964,836 UART: [art] Erasing AUTHORITY.KEYID = 7
25,966,344 UART: [art] PUB.X = 0B9F0919EE5DC1CCECB7D33F795AE989308DDBC49BA6FD846BE930DCD4F8253EBB9B2FB3F17EBA7454C9178B9DDE549C
25,973,679 UART: [art] PUB.Y = C197E31667743643176707A6E0FAC683F7048B8F694301342FB43BC36C6390D28055EB860B763A3CAE57C7561954444F
25,980,844 UART: [art] SIG.R = E66C504C2E5696FC5BAD43830A2764B2BB455CB3B4E1838BCE9A673FF4938A1C9F71D54B7B201B1265350C3317B4EC7E
25,988,273 UART: [art] SIG.S = DB79F5555B616A19FA38FED643BF82357FE768BB92F21EA6A38EC066F533B8EC7BB8DAE7482E23E9F2C5A58493CF4AAF
26,967,532 UART: Caliptra RT
26,968,219 UART: [state] CFI Enabled
27,085,979 UART: [rt] RT listening for mailbox commands...
27,088,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,243,894 UART: [rt]cmd =0x41544d4e, len=14344
28,431,197 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
3,700,102 ready_for_fw is high
3,700,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,253,677 >>> mbox cmd response: success
19,507,338 UART:
19,507,765 UART: Running Caliptra FMC ...
19,508,885 UART:
19,509,040 UART: [state] CFI Enabled
19,517,214 UART: [fht] FMC Alias Private Key: 7
21,274,170 UART: [art] Extend RT PCRs Done
21,275,401 UART: [art] Lock RT PCRs Done
21,276,923 UART: [art] Populate DV Done
21,282,268 UART: [fht] FMC Alias Private Key: 7
21,283,895 UART: [art] Derive CDI
21,284,724 UART: [art] Store in in slot 0x4
21,327,440 UART: [art] Derive Key Pair
21,328,485 UART: [art] Store priv key in slot 0x5
23,755,577 UART: [art] Derive Key Pair - Done
23,768,523 UART: [art] Signing Cert with AUTHO
23,769,832 UART: RITY.KEYID = 7
25,475,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,476,906 UART: [art] PUB.X = ED1DEA9647F079EA8FD7F1AD737B410152AD183754377042579F184DD6B40F992C9E94CC5B33D5713DDB9170E01E3D48
25,484,186 UART: [art] PUB.Y = FA976EBB94473912E16709A7D7564F28CBEF8DB6111E072966F7ED6BEAE3FCA26983339124A18AF8D996A40B649CE9E1
25,491,423 UART: [art] SIG.R = 987CD9376E674762E45494152CE502DFB1CD77C40FCC5FC29ABA41754D1AAA2E5C2E496D5921B3523E9706AA1AA2CED2
25,498,861 UART: [art] SIG.S = 4288B2BAB0BD8EF67BC7E10A35259D7DF7202070F6F135BEA370148D1A6935CE86D5C6F1A3D3DD7F9EE64C931F710E5A
26,477,373 UART: Caliptra RT
26,478,098 UART: [state] CFI Enabled
26,595,576 UART: [rt] RT listening for mailbox commands...
26,597,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,753,234 UART: [rt]cmd =0x41544d4e, len=14344
27,933,484 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,453 UART:
192,820 UART: Running Caliptra ROM ...
194,004 UART:
194,168 UART: [state] CFI Enabled
265,546 UART: [state] LifecycleState = Unprovisioned
267,891 UART: [state] DebugLocked = No
270,418 UART: [state] WD Timer not started. Device not locked for debugging
274,546 UART: [kat] SHA2-256
464,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,205 UART: [kat] ++
475,685 UART: [kat] sha1
487,126 UART: [kat] SHA2-256
490,207 UART: [kat] SHA2-384
495,058 UART: [kat] SHA2-512-ACC
497,642 UART: [kat] ECC-384
2,946,164 UART: [kat] HMAC-384Kdf
2,971,000 UART: [kat] LMS
3,502,791 UART: [kat] --
3,508,224 UART: [cold-reset] ++
3,510,441 UART: [fht] FHT @ 0x50003400
3,522,059 UART: [idev] ++
3,522,766 UART: [idev] CDI.KEYID = 6
3,523,830 UART: [idev] SUBJECT.KEYID = 7
3,524,956 UART: [idev] UDS.KEYID = 0
3,525,885 ready_for_fw is high
3,526,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,722 UART: [idev] Erasing UDS.KEYID = 0
6,029,742 UART: [idev] Sha1 KeyId Algorithm
6,053,214 UART: [idev] --
6,057,796 UART: [ldev] ++
6,058,485 UART: [ldev] CDI.KEYID = 6
6,059,397 UART: [ldev] SUBJECT.KEYID = 5
6,060,555 UART: [ldev] AUTHORITY.KEYID = 7
6,061,784 UART: [ldev] FE.KEYID = 1
6,100,187 UART: [ldev] Erasing FE.KEYID = 1
8,605,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,988 UART: [ldev] --
10,410,717 UART: [fwproc] Wait for Commands...
10,413,350 UART: [fwproc] Recv command 0x46574c44
10,415,599 UART: [fwproc] Recv'd Img size: 114084 bytes
15,032,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,111,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,227,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,768,724 >>> mbox cmd response: success
15,773,163 UART: [afmc] ++
15,773,878 UART: [afmc] CDI.KEYID = 6
15,775,048 UART: [afmc] SUBJECT.KEYID = 7
15,776,552 UART: [afmc] AUTHORITY.KEYID = 5
18,323,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,046,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,048,263 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,063,334 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,078,545 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,093,365 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,116,425 UART: [afmc] --
20,119,633 UART: [cold-reset] --
20,121,679 UART: [state] Locking Datavault
20,128,728 UART: [state] Locking PCR0, PCR1 and PCR31
20,130,880 UART: [state] Locking ICCM
20,132,999 UART: [exit] Launching FMC @ 0x40000130
20,141,644 UART:
20,141,876 UART: Running Caliptra FMC ...
20,142,972 UART:
20,143,126 UART: [state] CFI Enabled
20,204,308 UART: [fht] FMC Alias Private Key: 7
21,968,303 UART: [art] Extend RT PCRs Done
21,969,530 UART: [art] Lock RT PCRs Done
21,971,420 UART: [art] Populate DV Done
21,976,935 UART: [fht] FMC Alias Private Key: 7
21,978,518 UART: [art] Derive CDI
21,979,253 UART: [art] Store in in slot 0x4
22,037,214 UART: [art] Derive Key Pair
22,038,258 UART: [art] Store priv key in slot 0x5
24,501,636 UART: [art] Derive Key Pair - Done
24,514,521 UART: [art] Signing Cert with AUTHO
24,515,818 UART: RITY.KEYID = 7
26,226,964 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,478 UART: [art] PUB.X = 3B4C28985D867F1E0BE48529C02ABF6ABD6900A02588C1FD4D065425D4AC010054E2D8980B1221FFC954728BDC88BF4D
26,235,686 UART: [art] PUB.Y = 644A83457483AD91E021AEAE78ED7425B56FA0748D7235CA0582507143A2BAA84519BB3188FBEBA878DC55364C73E974
26,242,932 UART: [art] SIG.R = 2CBD2C11C711DAE762867B792651EB8E3199F3B39A50BEB2A4763BF323448DDEEFCBBFFDAED61604DAFD8944DC3AE9B9
26,250,357 UART: [art] SIG.S = C573720720026C5C0FA8D140B0506633C4E0D0DB22AC72706B770181DDFB95F5625195704E6D2F5BE7758027C07144BF
27,229,615 UART: Caliptra RT
27,230,309 UART: [state] CFI Enabled
27,393,988 UART: [rt] RT listening for mailbox commands...
27,396,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,804 UART: [rt]cmd =0x41544d4e, len=14344
28,738,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,414,407 ready_for_fw is high
3,415,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,802,610 >>> mbox cmd response: success
20,093,752 UART:
20,094,149 UART: Running Caliptra FMC ...
20,095,255 UART:
20,095,411 UART: [state] CFI Enabled
20,162,607 UART: [fht] FMC Alias Private Key: 7
21,926,385 UART: [art] Extend RT PCRs Done
21,927,628 UART: [art] Lock RT PCRs Done
21,929,118 UART: [art] Populate DV Done
21,934,903 UART: [fht] FMC Alias Private Key: 7
21,936,608 UART: [art] Derive CDI
21,937,418 UART: [art] Store in in slot 0x4
21,995,441 UART: [art] Derive Key Pair
21,996,485 UART: [art] Store priv key in slot 0x5
24,459,620 UART: [art] Derive Key Pair - Done
24,472,724 UART: [art] Signing Cert with AUTHO
24,474,065 UART: RITY.KEYID = 7
26,185,989 UART: [art] Erasing AUTHORITY.KEYID = 7
26,187,502 UART: [art] PUB.X = 0A01684A03DC3F2252B2049B04F6F9C940460E4698287C08D455FC00D0F83A7AF962837E37587E67EF23FA4AB055B174
26,194,712 UART: [art] PUB.Y = DAB2FEDA891E91D4FCF5E7C278CBD6B80341116F83168B47EFAAAA4049B66800E43832D2CDDA5B3FB652A90C51924B95
26,201,946 UART: [art] SIG.R = 3747EB533E52AC7B3091205D8F790967C66EA997FF4D0BAA0A16A8ED77580878D94D80D5C015F09563D3A6AC1499A764
26,209,338 UART: [art] SIG.S = F39545FF28F0B178F201548A72DCD401C1CCF8C342F8FA6AABAB74D6832C0800F970FFD278C781397A7678547F111BE2
27,187,872 UART: Caliptra RT
27,188,584 UART: [state] CFI Enabled
27,353,800 UART: [rt] RT listening for mailbox commands...
27,356,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,511,244 UART: [rt]cmd =0x41544d4e, len=14344
28,690,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
193,064 UART:
193,439 UART: Running Caliptra ROM ...
194,589 UART:
604,061 UART: [state] CFI Enabled
621,707 UART: [state] LifecycleState = Unprovisioned
624,087 UART: [state] DebugLocked = No
625,268 UART: [state] WD Timer not started. Device not locked for debugging
628,588 UART: [kat] SHA2-256
818,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,226 UART: [kat] ++
829,781 UART: [kat] sha1
841,543 UART: [kat] SHA2-256
844,609 UART: [kat] SHA2-384
850,261 UART: [kat] SHA2-512-ACC
852,848 UART: [kat] ECC-384
3,296,280 UART: [kat] HMAC-384Kdf
3,307,997 UART: [kat] LMS
3,839,835 UART: [kat] --
3,844,902 UART: [cold-reset] ++
3,847,136 UART: [fht] FHT @ 0x50003400
3,857,690 UART: [idev] ++
3,858,337 UART: [idev] CDI.KEYID = 6
3,859,323 UART: [idev] SUBJECT.KEYID = 7
3,860,499 UART: [idev] UDS.KEYID = 0
3,861,428 ready_for_fw is high
3,861,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,987 UART: [idev] Erasing UDS.KEYID = 0
6,337,817 UART: [idev] Sha1 KeyId Algorithm
6,359,376 UART: [idev] --
6,363,288 UART: [ldev] ++
6,363,979 UART: [ldev] CDI.KEYID = 6
6,364,890 UART: [ldev] SUBJECT.KEYID = 5
6,366,098 UART: [ldev] AUTHORITY.KEYID = 7
6,367,276 UART: [ldev] FE.KEYID = 1
6,379,595 UART: [ldev] Erasing FE.KEYID = 1
8,857,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,484 UART: [ldev] --
10,646,185 UART: [fwproc] Wait for Commands...
10,648,071 UART: [fwproc] Recv command 0x46574c44
10,650,393 UART: [fwproc] Recv'd Img size: 114084 bytes
15,260,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,340,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,457,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,998,083 >>> mbox cmd response: success
16,001,993 UART: [afmc] ++
16,002,713 UART: [afmc] CDI.KEYID = 6
16,003,918 UART: [afmc] SUBJECT.KEYID = 7
16,005,401 UART: [afmc] AUTHORITY.KEYID = 5
18,513,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,233,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,235,604 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,250,690 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,265,926 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,280,758 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,303,873 UART: [afmc] --
20,308,281 UART: [cold-reset] --
20,311,181 UART: [state] Locking Datavault
20,315,634 UART: [state] Locking PCR0, PCR1 and PCR31
20,317,795 UART: [state] Locking ICCM
20,319,326 UART: [exit] Launching FMC @ 0x40000130
20,327,957 UART:
20,328,191 UART: Running Caliptra FMC ...
20,329,218 UART:
20,329,384 UART: [state] CFI Enabled
20,337,819 UART: [fht] FMC Alias Private Key: 7
22,094,582 UART: [art] Extend RT PCRs Done
22,095,808 UART: [art] Lock RT PCRs Done
22,097,788 UART: [art] Populate DV Done
22,103,103 UART: [fht] FMC Alias Private Key: 7
22,104,754 UART: [art] Derive CDI
22,105,575 UART: [art] Store in in slot 0x4
22,148,339 UART: [art] Derive Key Pair
22,149,378 UART: [art] Store priv key in slot 0x5
24,575,560 UART: [art] Derive Key Pair - Done
24,588,657 UART: [art] Signing Cert with AUTHO
24,589,958 UART: RITY.KEYID = 7
26,295,838 UART: [art] Erasing AUTHORITY.KEYID = 7
26,297,701 UART: [art] PUB.X = CAA6769E64C55C333E56E48EB5742D916117AE1F7A18AB9EFF557F8487A05B2B03320E52B21AE4C7876FBF44EC202851
26,304,593 UART: [art] PUB.Y = 29408919B914970816F61B945713E363D154E3F5EDD55F5396D30F47CBF158341D4C5C7D27DBC24D09E886746CD69D95
26,311,814 UART: [art] SIG.R = B7E3511D6C05C4EAE5AF9E665E994099F4175DE8BD3BD0D6C95ED77B65BC383E6A9D1290EF31614261FB5917A4D77968
26,319,243 UART: [art] SIG.S = 384A050EC557568607EC282D840ABB092C3CF4219301E4F47B98CE44119231BBEBF9BD20F70E9133173AFCC83BD1FA73
27,298,945 UART: Caliptra RT
27,299,674 UART: [state] CFI Enabled
27,416,524 UART: [rt] RT listening for mailbox commands...
27,418,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,574,245 UART: [rt]cmd =0x41544d4e, len=14344
28,759,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,652 writing to cptra_bootfsm_go
3,756,781 ready_for_fw is high
3,757,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,053,216 >>> mbox cmd response: success
20,307,300 UART:
20,307,712 UART: Running Caliptra FMC ...
20,308,852 UART:
20,309,015 UART: [state] CFI Enabled
20,316,871 UART: [fht] FMC Alias Private Key: 7
22,074,085 UART: [art] Extend RT PCRs Done
22,075,451 UART: [art] Lock RT PCRs Done
22,076,792 UART: [art] Populate DV Done
22,082,103 UART: [fht] FMC Alias Private Key: 7
22,083,647 UART: [art] Derive CDI
22,084,468 UART: [art] Store in in slot 0x4
22,127,014 UART: [art] Derive Key Pair
22,128,021 UART: [art] Store priv key in slot 0x5
24,554,438 UART: [art] Derive Key Pair - Done
24,567,349 UART: [art] Signing Cert with AUTHO
24,568,658 UART: RITY.KEYID = 7
26,274,012 UART: [art] Erasing AUTHORITY.KEYID = 7
26,275,529 UART: [art] PUB.X = E4592C5622C046DF57A254340F611B5A35C44C0159F8185EF82CE92D01F281FBC391A1450AB673C81238E1CDE2BD3282
26,282,778 UART: [art] PUB.Y = E29FD9E080D8E3C680C7243BE3A06E286ECD8DB0F5FA789849F67B25F4D206C4EEAB69D268C82BD39018DDBEE5E81F01
26,290,075 UART: [art] SIG.R = 950324FF19F4B4C8587FA8724407AE435BF4F798BCE09B6F564811C910A639A337307C32469C88A81CA478A03FC8CA9B
26,297,414 UART: [art] SIG.S = EE6C4007435DC51DF69B485D8ED1DA1FC95ECEBAFD5D7F46B607554BB822900FCD49BDFD700BCC6F1F6AD8BB7D25439D
27,276,120 UART: Caliptra RT
27,276,832 UART: [state] CFI Enabled
27,392,932 UART: [rt] RT listening for mailbox commands...
27,395,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,427 UART: [rt]cmd =0x41544d4e, len=14344
28,739,659 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,947 UART: [kat] SHA2-256
881,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,993 UART: [kat] ++
886,145 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,106 UART: [kat] SHA2-512-ACC
897,007 UART: [kat] ECC-384
902,288 UART: [kat] HMAC-384Kdf
906,974 UART: [kat] LMS
1,475,170 UART: [kat] --
1,475,789 UART: [cold-reset] ++
1,476,351 UART: [fht] Storing FHT @ 0x50003400
1,479,002 UART: [idev] ++
1,479,170 UART: [idev] CDI.KEYID = 6
1,479,530 UART: [idev] SUBJECT.KEYID = 7
1,479,954 UART: [idev] UDS.KEYID = 0
1,480,299 ready_for_fw is high
1,480,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,778 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,020 UART: [idev] --
1,514,049 UART: [ldev] ++
1,514,217 UART: [ldev] CDI.KEYID = 6
1,514,580 UART: [ldev] SUBJECT.KEYID = 5
1,515,006 UART: [ldev] AUTHORITY.KEYID = 7
1,515,469 UART: [ldev] FE.KEYID = 1
1,520,669 UART: [ldev] Erasing FE.KEYID = 1
1,545,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,562 UART: [ldev] --
1,584,873 UART: [fwproc] Waiting for Commands...
1,585,684 UART: [fwproc] Received command 0x46574c44
1,586,475 UART: [fwproc] Received Image of size 114084 bytes
5,116,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,144,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,173,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,309,475 >>> mbox cmd response: success
5,310,535 UART: [afmc] ++
5,310,703 UART: [afmc] CDI.KEYID = 6
5,311,065 UART: [afmc] SUBJECT.KEYID = 7
5,311,490 UART: [afmc] AUTHORITY.KEYID = 5
5,346,136 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,362,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,363,532 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,369,241 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,375,133 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,380,834 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,388,774 UART: [afmc] --
5,389,864 UART: [cold-reset] --
5,390,848 UART: [state] Locking Datavault
5,391,859 UART: [state] Locking PCR0, PCR1 and PCR31
5,392,463 UART: [state] Locking ICCM
5,392,923 UART: [exit] Launching FMC @ 0x40000130
5,398,252 UART:
5,398,268 UART: Running Caliptra FMC ...
5,398,676 UART:
5,398,730 UART: [state] CFI Enabled
5,409,036 UART: [fht] FMC Alias Private Key: 7
5,517,302 UART: [art] Extend RT PCRs Done
5,517,730 UART: [art] Lock RT PCRs Done
5,519,304 UART: [art] Populate DV Done
5,527,512 UART: [fht] FMC Alias Private Key: 7
5,528,538 UART: [art] Derive CDI
5,528,818 UART: [art] Store in in slot 0x4
5,614,641 UART: [art] Derive Key Pair
5,615,001 UART: [art] Store priv key in slot 0x5
5,628,225 UART: [art] Derive Key Pair - Done
5,642,986 UART: [art] Signing Cert with AUTHO
5,643,466 UART: RITY.KEYID = 7
5,659,126 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,891 UART: [art] PUB.X = 31F7B1D151B2E88C00247DB5436FC97DF7EFD4D96D73AFCC25EB0A5C5E626F580E8057F07778E4BA986F0A3D66950980
5,666,635 UART: [art] PUB.Y = 81838E73DCC03D13CDE0286F8010053D231D9BDD14452B5C4325B5301E5A30374D66E0F1D7F0C13C3F84B7456DC69BA4
5,673,584 UART: [art] SIG.R = CAD981057D35FF01721D8D844611D6374AD9201C0EBC696CA498084B69738C135E6D260A5D7CF6CD6B3DF929B3374068
5,680,339 UART: [art] SIG.S = 377B26C7E9DA06CB971439D70ABA79A8D6891D71A1D787E3DC2798214E1427E91FFA18ED1299EDE152E078FE2E2E3C67
5,704,622 UART: Caliptra RT
5,704,875 UART: [state] CFI Enabled
5,812,654 UART: [rt] RT listening for mailbox commands...
5,813,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,470 UART: [rt]cmd =0x41544d4e, len=14344
6,227,394 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,051 ready_for_fw is high
1,363,051 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,313,953 >>> mbox cmd response: success
5,375,580 UART:
5,375,596 UART: Running Caliptra FMC ...
5,376,004 UART:
5,376,058 UART: [state] CFI Enabled
5,386,792 UART: [fht] FMC Alias Private Key: 7
5,495,098 UART: [art] Extend RT PCRs Done
5,495,526 UART: [art] Lock RT PCRs Done
5,497,178 UART: [art] Populate DV Done
5,505,502 UART: [fht] FMC Alias Private Key: 7
5,506,608 UART: [art] Derive CDI
5,506,888 UART: [art] Store in in slot 0x4
5,592,733 UART: [art] Derive Key Pair
5,593,093 UART: [art] Store priv key in slot 0x5
5,606,643 UART: [art] Derive Key Pair - Done
5,621,488 UART: [art] Signing Cert with AUTHO
5,621,968 UART: RITY.KEYID = 7
5,637,700 UART: [art] Erasing AUTHORITY.KEYID = 7
5,638,465 UART: [art] PUB.X = 618D4FBE928AF284F6925F9F57FF34ABBF5AD3E44B9B1F363C2E884CADE4B0ECFEB314B6F487B679A175498251F7B3AB
5,645,255 UART: [art] PUB.Y = 3F53D154E44452CFEDB322DF628A38B2F42C42FA0CEF69EF8E7B3A2988D2EA00F52C55DA2AC92946E01B8A6300F67756
5,652,170 UART: [art] SIG.R = 7CEE67133DFA0BBF674DC23FAFA919C9F44CD7703DE3B167E1ADDA4035186D15EA57C69D4FBED31F51C7860FA91589CD
5,658,956 UART: [art] SIG.S = D259AF2D77FAD1C3BC61160119A308DBF7F4A54C390255A86907FFD04A0AABB8F259C934A6EB88DAE619B6F2BB5D54CA
5,682,568 UART: Caliptra RT
5,682,821 UART: [state] CFI Enabled
5,791,800 UART: [rt] RT listening for mailbox commands...
5,792,470 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,644 UART: [rt]cmd =0x41544d4e, len=14344
6,204,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
890,890 UART: [kat] SHA2-256
892,828 UART: [kat] SHA2-384
895,485 UART: [kat] SHA2-512-ACC
897,386 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,930 UART: [cold-reset] ++
1,477,480 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 ready_for_fw is high
1,481,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,099 UART: [idev] Erasing UDS.KEYID = 0
1,505,645 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,405 UART: [idev] --
1,515,290 UART: [ldev] ++
1,515,458 UART: [ldev] CDI.KEYID = 6
1,515,821 UART: [ldev] SUBJECT.KEYID = 5
1,516,247 UART: [ldev] AUTHORITY.KEYID = 7
1,516,710 UART: [ldev] FE.KEYID = 1
1,522,038 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,983 UART: [ldev] --
1,587,382 UART: [fwproc] Waiting for Commands...
1,588,123 UART: [fwproc] Received command 0x46574c44
1,588,914 UART: [fwproc] Received Image of size 114084 bytes
5,118,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,147,193 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,176,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,311,972 >>> mbox cmd response: success
5,313,054 UART: [afmc] ++
5,313,222 UART: [afmc] CDI.KEYID = 6
5,313,584 UART: [afmc] SUBJECT.KEYID = 7
5,314,009 UART: [afmc] AUTHORITY.KEYID = 5
5,349,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,366,127 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,366,907 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,372,616 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,378,508 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,384,209 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,392,095 UART: [afmc] --
5,393,181 UART: [cold-reset] --
5,394,181 UART: [state] Locking Datavault
5,395,074 UART: [state] Locking PCR0, PCR1 and PCR31
5,395,678 UART: [state] Locking ICCM
5,396,114 UART: [exit] Launching FMC @ 0x40000130
5,401,443 UART:
5,401,459 UART: Running Caliptra FMC ...
5,401,867 UART:
5,402,010 UART: [state] CFI Enabled
5,412,844 UART: [fht] FMC Alias Private Key: 7
5,520,982 UART: [art] Extend RT PCRs Done
5,521,410 UART: [art] Lock RT PCRs Done
5,523,054 UART: [art] Populate DV Done
5,531,252 UART: [fht] FMC Alias Private Key: 7
5,532,372 UART: [art] Derive CDI
5,532,652 UART: [art] Store in in slot 0x4
5,618,337 UART: [art] Derive Key Pair
5,618,697 UART: [art] Store priv key in slot 0x5
5,631,919 UART: [art] Derive Key Pair - Done
5,646,818 UART: [art] Signing Cert with AUTHO
5,647,298 UART: RITY.KEYID = 7
5,662,314 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,079 UART: [art] PUB.X = 8C900A01303F1DC55267BCFB272C57FAB32664EC0F47F8B752B4346DD559A03D7BA95DBACE4B3265ABED2035E8EB3989
5,669,854 UART: [art] PUB.Y = AFF44350DF4A9C41F37EB71B6C8C84E678BBE11E702C7172F8BE84FCD869E7A151666D521E41D7E7C33AE8A3308EB9DD
5,676,820 UART: [art] SIG.R = AE2094B87AB177300405DEF27494038BB852CA721501C35BDB2D4C10642AA88D1EC1BEB8057118BFC445BC4A23A653C0
5,683,581 UART: [art] SIG.S = F84A60233999A0BC531EE750CC252EBDAED2F496499FC587613F330EAE34DA15940212942C363C8CFDE463989EA7E300
5,707,706 UART: Caliptra RT
5,708,051 UART: [state] CFI Enabled
5,816,295 UART: [rt] RT listening for mailbox commands...
5,816,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,753 UART: [rt]cmd =0x41544d4e, len=14344
6,225,207 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,194 ready_for_fw is high
1,363,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,199,469 >>> mbox cmd response: success
5,261,112 UART:
5,261,128 UART: Running Caliptra FMC ...
5,261,536 UART:
5,261,679 UART: [state] CFI Enabled
5,272,305 UART: [fht] FMC Alias Private Key: 7
5,380,603 UART: [art] Extend RT PCRs Done
5,381,031 UART: [art] Lock RT PCRs Done
5,382,587 UART: [art] Populate DV Done
5,390,889 UART: [fht] FMC Alias Private Key: 7
5,391,889 UART: [art] Derive CDI
5,392,169 UART: [art] Store in in slot 0x4
5,477,956 UART: [art] Derive Key Pair
5,478,316 UART: [art] Store priv key in slot 0x5
5,491,854 UART: [art] Derive Key Pair - Done
5,506,262 UART: [art] Signing Cert with AUTHO
5,506,742 UART: RITY.KEYID = 7
5,521,928 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,693 UART: [art] PUB.X = E31A8C770A541CC65C3A728BB1B02CF80BDBF91EC0168A78E13C964A668D226EC6205637B285832AAF0AAAAB28AA2518
5,529,466 UART: [art] PUB.Y = C031419614666FC1DD28AD317742B49EA1B7E554065BC71F94562DBDBA736201A8A27072BF44725E709461ED5499BE67
5,536,406 UART: [art] SIG.R = 2450D82833BE1251EF1552D13C02DF1C0D05C79965FE41C9AF19379112838AF364DA3826C7855C06C470F0553884FEDE
5,543,160 UART: [art] SIG.S = 69E82CC0A6F79989EC0DEC61AC32345D7FF57D0511BC32934DBC2AAA7ECE4A86819DD288828F44B46603D3DE65D382BC
5,567,402 UART: Caliptra RT
5,567,747 UART: [state] CFI Enabled
5,675,925 UART: [rt] RT listening for mailbox commands...
5,676,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,665 UART: [rt]cmd =0x41544d4e, len=14344
6,085,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
892,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,097 UART: [kat] ++
897,249 UART: [kat] sha1
901,407 UART: [kat] SHA2-256
903,347 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,604 UART: [kat] HMAC-384Kdf
922,322 UART: [kat] LMS
1,170,650 UART: [kat] --
1,171,453 UART: [cold-reset] ++
1,171,807 UART: [fht] FHT @ 0x50003400
1,174,310 UART: [idev] ++
1,174,478 UART: [idev] CDI.KEYID = 6
1,174,838 UART: [idev] SUBJECT.KEYID = 7
1,175,262 UART: [idev] UDS.KEYID = 0
1,175,607 ready_for_fw is high
1,175,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,272 UART: [idev] Erasing UDS.KEYID = 0
1,200,779 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,579 UART: [ldev] ++
1,210,747 UART: [ldev] CDI.KEYID = 6
1,211,110 UART: [ldev] SUBJECT.KEYID = 5
1,211,536 UART: [ldev] AUTHORITY.KEYID = 7
1,211,999 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,641 UART: [ldev] --
1,282,938 UART: [fwproc] Wait for Commands...
1,283,656 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 114084 bytes
3,118,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,523 >>> mbox cmd response: success
3,312,611 UART: [afmc] ++
3,312,779 UART: [afmc] CDI.KEYID = 6
3,313,141 UART: [afmc] SUBJECT.KEYID = 7
3,313,566 UART: [afmc] AUTHORITY.KEYID = 5
3,348,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,983 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,692 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,584 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,295 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,024 UART: [afmc] --
3,392,000 UART: [cold-reset] --
3,392,912 UART: [state] Locking Datavault
3,394,181 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,785 UART: [state] Locking ICCM
3,395,337 UART: [exit] Launching FMC @ 0x40000130
3,400,666 UART:
3,400,682 UART: Running Caliptra FMC ...
3,401,090 UART:
3,401,144 UART: [state] CFI Enabled
3,411,680 UART: [fht] FMC Alias Private Key: 7
3,520,354 UART: [art] Extend RT PCRs Done
3,520,782 UART: [art] Lock RT PCRs Done
3,522,480 UART: [art] Populate DV Done
3,530,678 UART: [fht] FMC Alias Private Key: 7
3,531,830 UART: [art] Derive CDI
3,532,110 UART: [art] Store in in slot 0x4
3,617,525 UART: [art] Derive Key Pair
3,617,885 UART: [art] Store priv key in slot 0x5
3,630,981 UART: [art] Derive Key Pair - Done
3,645,990 UART: [art] Signing Cert with AUTHO
3,646,470 UART: RITY.KEYID = 7
3,661,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,209 UART: [art] PUB.X = 44CB1D154C4EB759BD59C611E1688CCDD1959FE39227A894E3351EDF39946BF5F6899A3E69536B7B8025C93FF3AB093F
3,668,982 UART: [art] PUB.Y = 5C239E54DBC8CD260D89992E27FB784621E8B069F4449B3AA310F12E1F590625720A608EA1D1E457259EAF7208C058A8
3,675,918 UART: [art] SIG.R = 98E7818A5A8F39FCAF12AD66631AB9A45BC00F21877BC762F37F74F321811495935DC6A7623547D3F1CCED9F890B3569
3,682,684 UART: [art] SIG.S = 6BE94556378901B8DFFE5B38330EEF93774FF00B9B1A68E2F9330EA7CE08598BB3E0A7072DD48FBC72509EFF6F92AD51
3,706,497 UART: Caliptra RT
3,706,750 UART: [state] CFI Enabled
3,814,050 UART: [rt] RT listening for mailbox commands...
3,814,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,140 UART: [rt]cmd =0x41544d4e, len=14344
4,228,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,395 ready_for_fw is high
1,060,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,170,197 >>> mbox cmd response: success
3,232,712 UART:
3,232,728 UART: Running Caliptra FMC ...
3,233,136 UART:
3,233,190 UART: [state] CFI Enabled
3,243,820 UART: [fht] FMC Alias Private Key: 7
3,352,300 UART: [art] Extend RT PCRs Done
3,352,728 UART: [art] Lock RT PCRs Done
3,354,600 UART: [art] Populate DV Done
3,362,760 UART: [fht] FMC Alias Private Key: 7
3,363,844 UART: [art] Derive CDI
3,364,124 UART: [art] Store in in slot 0x4
3,449,419 UART: [art] Derive Key Pair
3,449,779 UART: [art] Store priv key in slot 0x5
3,462,821 UART: [art] Derive Key Pair - Done
3,477,739 UART: [art] Signing Cert with AUTHO
3,478,219 UART: RITY.KEYID = 7
3,493,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,480 UART: [art] PUB.X = A35A4AD379DAF7A7713EDF22861D5F09F49AED61FEA109ACE37F1078373CD1291E99778D157D14D126FFCDB51ED137F9
3,501,258 UART: [art] PUB.Y = B2D3B43A5080D96A98E00FDF8F375C0D00B2E29492DE16D0023F56BD687BF7577372B9DE96ACF13F3BA3C5B51A40ABF6
3,508,191 UART: [art] SIG.R = 9A13E5CE901E848B7D34A971225649897FF6FBE447950083E99430FB7AB9741F0E118927C1ECEF1B86E9A156242C4F3D
3,514,936 UART: [art] SIG.S = D68F374BCDDE879D5C86BBED600622A075EDD45832C1B5B29C65F9C9768D2B4F3B33F34D2EDE9830D7FCDD1586C72651
3,539,044 UART: Caliptra RT
3,539,297 UART: [state] CFI Enabled
3,647,060 UART: [rt] RT listening for mailbox commands...
3,647,730 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,804 UART: [rt]cmd =0x41544d4e, len=14344
4,062,014 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,925 UART: [state] LifecycleState = Unprovisioned
86,580 UART: [state] DebugLocked = No
87,252 UART: [state] WD Timer not started. Device not locked for debugging
88,601 UART: [kat] SHA2-256
894,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,376 UART: [kat] ++
898,528 UART: [kat] sha1
902,650 UART: [kat] SHA2-256
904,590 UART: [kat] SHA2-384
907,303 UART: [kat] SHA2-512-ACC
909,204 UART: [kat] ECC-384
918,825 UART: [kat] HMAC-384Kdf
923,527 UART: [kat] LMS
1,171,855 UART: [kat] --
1,172,874 UART: [cold-reset] ++
1,173,210 UART: [fht] FHT @ 0x50003400
1,176,001 UART: [idev] ++
1,176,169 UART: [idev] CDI.KEYID = 6
1,176,529 UART: [idev] SUBJECT.KEYID = 7
1,176,953 UART: [idev] UDS.KEYID = 0
1,177,298 ready_for_fw is high
1,177,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,311 UART: [idev] Erasing UDS.KEYID = 0
1,202,534 UART: [idev] Sha1 KeyId Algorithm
1,210,908 UART: [idev] --
1,211,934 UART: [ldev] ++
1,212,102 UART: [ldev] CDI.KEYID = 6
1,212,465 UART: [ldev] SUBJECT.KEYID = 5
1,212,891 UART: [ldev] AUTHORITY.KEYID = 7
1,213,354 UART: [ldev] FE.KEYID = 1
1,218,478 UART: [ldev] Erasing FE.KEYID = 1
1,244,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,284,045 UART: [fwproc] Wait for Commands...
1,284,655 UART: [fwproc] Recv command 0x46574c44
1,285,383 UART: [fwproc] Recv'd Img size: 114084 bytes
3,127,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,321,019 >>> mbox cmd response: success
3,322,207 UART: [afmc] ++
3,322,375 UART: [afmc] CDI.KEYID = 6
3,322,737 UART: [afmc] SUBJECT.KEYID = 7
3,323,162 UART: [afmc] AUTHORITY.KEYID = 5
3,358,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,775 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,484 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,376 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,087 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,832 UART: [afmc] --
3,401,892 UART: [cold-reset] --
3,402,848 UART: [state] Locking Datavault
3,404,069 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,673 UART: [state] Locking ICCM
3,405,299 UART: [exit] Launching FMC @ 0x40000130
3,410,628 UART:
3,410,644 UART: Running Caliptra FMC ...
3,411,052 UART:
3,411,195 UART: [state] CFI Enabled
3,421,537 UART: [fht] FMC Alias Private Key: 7
3,529,511 UART: [art] Extend RT PCRs Done
3,529,939 UART: [art] Lock RT PCRs Done
3,531,493 UART: [art] Populate DV Done
3,539,553 UART: [fht] FMC Alias Private Key: 7
3,540,601 UART: [art] Derive CDI
3,540,881 UART: [art] Store in in slot 0x4
3,626,862 UART: [art] Derive Key Pair
3,627,222 UART: [art] Store priv key in slot 0x5
3,640,392 UART: [art] Derive Key Pair - Done
3,655,239 UART: [art] Signing Cert with AUTHO
3,655,719 UART: RITY.KEYID = 7
3,670,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,360 UART: [art] PUB.X = 05A0A5CB0FF620C8E0118A856CA62767131FD99BE912BE30A2F88C638904DEFC270F0A390E0234B495737EF33415634F
3,678,109 UART: [art] PUB.Y = 6F7744D5248ADE1E6B08A69D0890A37BE7CDA39522589334C728AD2FD91EC9FB1CFF9205449935B094C418308EBACD04
3,685,053 UART: [art] SIG.R = DC23C5AABE9048EA95AAF8A83AD835C647A88EFC724F9BF56ADC5462F4E2E2D6BA442FF20DB86B408F598A9C29412061
3,691,838 UART: [art] SIG.S = 257720C84D80F4C0F38CBEC4E4D5DE5CCBD306A591F2216D0D76FD9B1416D9E5F5619DB5205882C7FCEF876FF67B6067
3,715,957 UART: Caliptra RT
3,716,302 UART: [state] CFI Enabled
3,824,360 UART: [rt] RT listening for mailbox commands...
3,825,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,190 UART: [rt]cmd =0x41544d4e, len=14344
4,234,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,938 ready_for_fw is high
1,059,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,338 >>> mbox cmd response: success
3,226,809 UART:
3,226,825 UART: Running Caliptra FMC ...
3,227,233 UART:
3,227,376 UART: [state] CFI Enabled
3,237,666 UART: [fht] FMC Alias Private Key: 7
3,345,278 UART: [art] Extend RT PCRs Done
3,345,706 UART: [art] Lock RT PCRs Done
3,346,924 UART: [art] Populate DV Done
3,355,318 UART: [fht] FMC Alias Private Key: 7
3,356,368 UART: [art] Derive CDI
3,356,648 UART: [art] Store in in slot 0x4
3,441,881 UART: [art] Derive Key Pair
3,442,241 UART: [art] Store priv key in slot 0x5
3,456,257 UART: [art] Derive Key Pair - Done
3,471,144 UART: [art] Signing Cert with AUTHO
3,471,624 UART: RITY.KEYID = 7
3,486,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,487 UART: [art] PUB.X = DCD3332507AF81798F3ECA2E633283ABC387ACE75736DC692873C957C71FF586D0387CFC3C0720AB28014ED5EF1A5338
3,494,254 UART: [art] PUB.Y = 9BB4CBE4B178E8D9D5E0C3A7EFA202A202F94233CFB6A012BD7070D65D55C3ACA5590DA413E3D07ED209E31FFE65FABC
3,501,216 UART: [art] SIG.R = 36E96106C788A94472351262ABD8B58A3ABCFE49F50803BC85B4E7AA687045A954CCE53E1F6B789843AE953C25ED32D3
3,507,981 UART: [art] SIG.S = BAF1460A08F197EB01EDC88DCBC5F26FB33445ECA9909F9F101665E01BEF8FB5B81A03A9EF7F9E561CD656F914BD5B18
3,531,798 UART: Caliptra RT
3,532,143 UART: [state] CFI Enabled
3,639,853 UART: [rt] RT listening for mailbox commands...
3,640,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,555 UART: [rt]cmd =0x41544d4e, len=14344
4,049,335 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,799 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,174,237 ready_for_fw is high
1,174,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,668 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 114084 bytes
3,125,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,638 >>> mbox cmd response: success
3,319,707 UART: [afmc] ++
3,319,875 UART: [afmc] CDI.KEYID = 6
3,320,238 UART: [afmc] SUBJECT.KEYID = 7
3,320,664 UART: [afmc] AUTHORITY.KEYID = 5
3,356,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,547 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,257 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,147 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,858 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,650 UART: [afmc] --
3,399,668 UART: [cold-reset] --
3,400,580 UART: [state] Locking Datavault
3,401,553 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,157 UART: [state] Locking ICCM
3,402,715 UART: [exit] Launching FMC @ 0x40000130
3,408,044 UART:
3,408,060 UART: Running Caliptra FMC ...
3,408,468 UART:
3,408,522 UART: [state] CFI Enabled
3,419,166 UART: [fht] FMC Alias Private Key: 7
3,525,932 UART: [art] Extend RT PCRs Done
3,526,360 UART: [art] Lock RT PCRs Done
3,528,094 UART: [art] Populate DV Done
3,536,306 UART: [fht] FMC Alias Private Key: 7
3,537,388 UART: [art] Derive CDI
3,537,668 UART: [art] Store in in slot 0x4
3,623,153 UART: [art] Derive Key Pair
3,623,513 UART: [art] Store priv key in slot 0x5
3,637,173 UART: [art] Derive Key Pair - Done
3,651,967 UART: [art] Signing Cert with AUTHO
3,652,447 UART: RITY.KEYID = 7
3,667,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,502 UART: [art] PUB.X = 8194F783FA364580E8528556080FB291786182F1C6F23D2DBB7C6D020FD70638226C48C5FF341AEC12BBEFBD70010C95
3,675,251 UART: [art] PUB.Y = D9F56DC484D3A221BAF9744A69289F0775FAC2FFDF6281F6F71D1C442F89F7ACAF404566056209603A9E29192CE3D1F7
3,682,198 UART: [art] SIG.R = 0DEABED457B32E1F2040C87DF80BBD46B05ADB196A4860A2A0F2EEABA2FA647D8D4106379CFE85DD3D88F40289DCA7AC
3,688,982 UART: [art] SIG.S = B114754B84EF22F1072DFBA0BDC5EF1B4F37613529DC4F8941F6813AD32B268C11BA248DF386D3135CA5887AFB7E97A3
3,712,484 UART: Caliptra RT
3,712,737 UART: [state] CFI Enabled
3,820,781 UART: [rt] RT listening for mailbox commands...
3,821,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,625 UART: [rt]cmd =0x41544d4e, len=14344
4,230,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,328 ready_for_fw is high
1,056,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,169,458 >>> mbox cmd response: success
3,231,585 UART:
3,231,601 UART: Running Caliptra FMC ...
3,232,009 UART:
3,232,063 UART: [state] CFI Enabled
3,242,781 UART: [fht] FMC Alias Private Key: 7
3,350,447 UART: [art] Extend RT PCRs Done
3,350,875 UART: [art] Lock RT PCRs Done
3,352,541 UART: [art] Populate DV Done
3,360,729 UART: [fht] FMC Alias Private Key: 7
3,361,839 UART: [art] Derive CDI
3,362,119 UART: [art] Store in in slot 0x4
3,447,724 UART: [art] Derive Key Pair
3,448,084 UART: [art] Store priv key in slot 0x5
3,461,492 UART: [art] Derive Key Pair - Done
3,476,731 UART: [art] Signing Cert with AUTHO
3,477,211 UART: RITY.KEYID = 7
3,492,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,684 UART: [art] PUB.X = BAD87A93E3B3C7D97593AA46FC8C381CC9C3A74EEB728345478498D75CF1464CCC0BCEF04EE2A8BFFF507159B70E8DA1
3,500,468 UART: [art] PUB.Y = E4868B90CA2D8C8BF29F1FE1503A53FC15E30EE6EB20F57C2124280D99EB4C37CD86BA914389516C26BF098555BDE112
3,507,417 UART: [art] SIG.R = 0054ACAAA5F7FE66730CB3E6E61BBB50D63D0F4BFED11721927C78C3747C8D8106F83DD2B5298018E5DF598DFE54B23A
3,514,170 UART: [art] SIG.S = 89A64BC13FF2825465F49D58A58FE352A9063218CD1587AF6E6D82A74566CA538B6DA95603448FB6C3FD309F9FE48E72
3,537,547 UART: Caliptra RT
3,537,800 UART: [state] CFI Enabled
3,644,870 UART: [rt] RT listening for mailbox commands...
3,645,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,522 UART: [rt]cmd =0x41544d4e, len=14344
4,049,608 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,464 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,724 UART: [idev] ++
1,173,892 UART: [idev] CDI.KEYID = 6
1,174,253 UART: [idev] SUBJECT.KEYID = 7
1,174,678 UART: [idev] UDS.KEYID = 0
1,175,024 ready_for_fw is high
1,175,024 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,754 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,199 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,069 UART: [fwproc] Recv'd Img size: 114084 bytes
3,118,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,205 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,547 >>> mbox cmd response: success
3,312,704 UART: [afmc] ++
3,312,872 UART: [afmc] CDI.KEYID = 6
3,313,235 UART: [afmc] SUBJECT.KEYID = 7
3,313,661 UART: [afmc] AUTHORITY.KEYID = 5
3,349,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,672 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,382 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,272 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,983 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,857 UART: [afmc] --
3,392,921 UART: [cold-reset] --
3,393,695 UART: [state] Locking Datavault
3,394,812 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,416 UART: [state] Locking ICCM
3,395,840 UART: [exit] Launching FMC @ 0x40000130
3,401,169 UART:
3,401,185 UART: Running Caliptra FMC ...
3,401,593 UART:
3,401,736 UART: [state] CFI Enabled
3,412,102 UART: [fht] FMC Alias Private Key: 7
3,519,862 UART: [art] Extend RT PCRs Done
3,520,290 UART: [art] Lock RT PCRs Done
3,521,780 UART: [art] Populate DV Done
3,530,162 UART: [fht] FMC Alias Private Key: 7
3,531,218 UART: [art] Derive CDI
3,531,498 UART: [art] Store in in slot 0x4
3,617,147 UART: [art] Derive Key Pair
3,617,507 UART: [art] Store priv key in slot 0x5
3,631,129 UART: [art] Derive Key Pair - Done
3,645,903 UART: [art] Signing Cert with AUTHO
3,646,383 UART: RITY.KEYID = 7
3,661,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,018 UART: [art] PUB.X = D42580364140D764F26F5A18B2AD7F689B76CB22925293F5B9A2AA3342293D18D0FB57D27F4BA64511F7FF23049D1C7C
3,668,785 UART: [art] PUB.Y = 54D27924829D784D7947373EEE1A590F850482B682616C955057E0C7C43AEE61505F5D2F27C764132A16DA5BBACED76F
3,675,727 UART: [art] SIG.R = 109666B4892134AD8F8EE292BAE51DECFC349A7739EA94D58FA086550F57DCADCF8A126E266C3C8AE3CBCD53881EF0E9
3,682,512 UART: [art] SIG.S = 636D311F6AD049247D8DB0B324589CDBF31EF62FF41B0D2CA63D7018F642008EF2F47339F1D0165A7FC7CCE113122277
3,706,518 UART: Caliptra RT
3,706,863 UART: [state] CFI Enabled
3,813,836 UART: [rt] RT listening for mailbox commands...
3,814,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,478 UART: [rt]cmd =0x41544d4e, len=14344
4,225,649 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 ready_for_fw is high
1,056,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,162,538 >>> mbox cmd response: success
3,224,919 UART:
3,224,935 UART: Running Caliptra FMC ...
3,225,343 UART:
3,225,486 UART: [state] CFI Enabled
3,236,186 UART: [fht] FMC Alias Private Key: 7
3,344,348 UART: [art] Extend RT PCRs Done
3,344,776 UART: [art] Lock RT PCRs Done
3,346,288 UART: [art] Populate DV Done
3,354,508 UART: [fht] FMC Alias Private Key: 7
3,355,688 UART: [art] Derive CDI
3,355,968 UART: [art] Store in in slot 0x4
3,441,915 UART: [art] Derive Key Pair
3,442,275 UART: [art] Store priv key in slot 0x5
3,455,679 UART: [art] Derive Key Pair - Done
3,470,573 UART: [art] Signing Cert with AUTHO
3,471,053 UART: RITY.KEYID = 7
3,486,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,982 UART: [art] PUB.X = 6E4B566DE8CF202982F1D0B81626840092AC00A57BC68FEE00AA1F56C89A15F23B4F4F73A94A7372D1265A564D8BDE53
3,493,692 UART: [art] PUB.Y = 5896D7F6D3CF52A81865259861449B0175733F5FA1EA5B9215D28FEEFCEF5C5D9796383E8F54D121E5F86DDCDB1C7004
3,500,642 UART: [art] SIG.R = 0A0C705BA7E60E074057369C0968A425F50F6692F655C74A602A94B54AC6855246E0D43695E3D104C09B1FC7E5F5A7C0
3,507,387 UART: [art] SIG.S = E0825A0CB2C1A7608B52C771A53C8D4F07E14EA18D50F8F019B55B6194C2453436DC783DD4BC053E9796598F946CB957
3,530,541 UART: Caliptra RT
3,530,886 UART: [state] CFI Enabled
3,637,950 UART: [rt] RT listening for mailbox commands...
3,638,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,732 UART: [rt]cmd =0x41544d4e, len=14344
4,052,116 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,102 UART:
192,473 UART: Running Caliptra ROM ...
193,587 UART:
193,732 UART: [state] CFI Enabled
266,585 UART: [state] LifecycleState = Unprovisioned
268,572 UART: [state] DebugLocked = No
270,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,740 UART: [kat] SHA2-256
444,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,974 UART: [kat] ++
455,425 UART: [kat] sha1
465,662 UART: [kat] SHA2-256
468,388 UART: [kat] SHA2-384
474,088 UART: [kat] SHA2-512-ACC
476,462 UART: [kat] ECC-384
2,767,381 UART: [kat] HMAC-384Kdf
2,800,862 UART: [kat] LMS
3,991,160 UART: [kat] --
3,996,307 UART: [cold-reset] ++
3,997,598 UART: [fht] Storing FHT @ 0x50003400
4,009,258 UART: [idev] ++
4,009,875 UART: [idev] CDI.KEYID = 6
4,010,804 UART: [idev] SUBJECT.KEYID = 7
4,012,058 UART: [idev] UDS.KEYID = 0
4,013,128 ready_for_fw is high
4,013,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,260 UART: [idev] Erasing UDS.KEYID = 0
7,347,687 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,763 UART: [idev] --
7,374,330 UART: [ldev] ++
7,374,911 UART: [ldev] CDI.KEYID = 6
7,375,881 UART: [ldev] SUBJECT.KEYID = 5
7,377,096 UART: [ldev] AUTHORITY.KEYID = 7
7,378,329 UART: [ldev] FE.KEYID = 1
7,423,806 UART: [ldev] Erasing FE.KEYID = 1
10,753,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,638 UART: [ldev] --
13,115,829 UART: [fwproc] Waiting for Commands...
13,119,163 UART: [fwproc] Received command 0x46574c44
13,121,346 UART: [fwproc] Received Image of size 113760 bytes
21,756,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,833,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,902,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,218,582 >>> mbox cmd response: success
22,223,484 UART: [afmc] ++
22,224,083 UART: [afmc] CDI.KEYID = 6
22,225,028 UART: [afmc] SUBJECT.KEYID = 7
22,226,246 UART: [afmc] AUTHORITY.KEYID = 5
25,586,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,887,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,890,191 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,904,775 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,919,509 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,933,714 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,955,947 UART: [afmc] --
27,960,136 UART: [cold-reset] --
27,963,733 UART: [state] Locking Datavault
27,968,279 UART: [state] Locking PCR0, PCR1 and PCR31
27,970,032 UART: [state] Locking ICCM
27,971,592 UART: [exit] Launching FMC @ 0x40000130
27,979,987 UART:
27,980,228 UART: Running Caliptra FMC ...
27,981,330 UART:
27,981,490 UART: [state] CFI Enabled
28,048,344 UART: [fht] FMC Alias Private Key: 7
30,386,552 UART: [art] Extend RT PCRs Done
30,387,770 UART: [art] Lock RT PCRs Done
30,389,341 UART: [art] Populate DV Done
30,394,860 UART: [fht] FMC Alias Private Key: 7
30,396,614 UART: [art] Derive CDI
30,397,427 UART: [art] Store in in slot 0x4
30,456,413 UART: [art] Derive Key Pair
30,457,458 UART: [art] Store priv key in slot 0x5
33,750,078 UART: [art] Derive Key Pair - Done
33,763,070 UART: [art] Signing Cert with AUTHO
33,764,554 UART: RITY.KEYID = 7
36,050,284 UART: [art] Erasing AUTHORITY.KEYID = 7
36,051,805 UART: [art] PUB.X = 846916E881BD5B4BF09CA6EA03B533EED6185C4BBC200B975996B42232F090F3C2963333566FBBE45BE95F1F29105354
36,059,008 UART: [art] PUB.Y = 6795DD8462A34020D22D915364257DE360ADEE21D9DD7274EA39AE1B3A09FD12576A5F36D887CA5C364C257E7ADD0716
36,066,250 UART: [art] SIG.R = 2075536206C73E2F75C7FEDB34DF090B7E80D73F5B99F3C4579B75057329639BA753050FDCD5BF203C8FE261284E51C1
36,073,606 UART: [art] SIG.S = 0C53A71A18BF3DA27A5EDDF4B71BBBFC16093271CA5CFC23BE492987EA496B0195855F9EB970121AAA00B12D09F422CF
37,378,611 UART: Caliptra RT
37,379,301 UART: [state] CFI Enabled
37,540,624 UART: [rt] RT listening for mailbox commands...
37,542,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,698,285 UART: [rt]cmd =0x41544d4e, len=14344
41,095,598 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,809,076 ready_for_fw is high
3,809,663 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,080,871 >>> mbox cmd response: success
27,769,277 UART:
27,769,663 UART: Running Caliptra FMC ...
27,770,880 UART:
27,771,050 UART: [state] CFI Enabled
27,836,821 UART: [fht] FMC Alias Private Key: 7
30,175,031 UART: [art] Extend RT PCRs Done
30,176,253 UART: [art] Lock RT PCRs Done
30,178,045 UART: [art] Populate DV Done
30,183,562 UART: [fht] FMC Alias Private Key: 7
30,185,211 UART: [art] Derive CDI
30,186,026 UART: [art] Store in in slot 0x4
30,245,237 UART: [art] Derive Key Pair
30,246,274 UART: [art] Store priv key in slot 0x5
33,539,203 UART: [art] Derive Key Pair - Done
33,552,470 UART: [art] Signing Cert with AUTHO
33,553,779 UART: RITY.KEYID = 7
35,840,183 UART: [art] Erasing AUTHORITY.KEYID = 7
35,841,699 UART: [art] PUB.X = 6908F7FE68F4D3846C25B11843B1DA3A9CF69B9D4F826006721EED24385EA40DC451114F85A9837C050EB78A4442BA3A
35,848,957 UART: [art] PUB.Y = 4EBD2C2C1A11E844CD44D2CEDF1CD48A9FA37BA2D57D123F890C30C2BA9DA27FEF321D0AD0EA0D9777C1B3AFB76CC749
35,856,196 UART: [art] SIG.R = 7748161C32B4D34A18680C6437F5C4A6060EA028017F4596F6231914C914D5A878534DB7A07E7400505BA4002F756B99
35,863,493 UART: [art] SIG.S = 89B1FE67B3626A3E94897A80456AAC9E2B66D5FBD650E78AB4FDF83BDCE1D2391ED4934CB252838F64A205018E741B55
37,168,618 UART: Caliptra RT
37,169,309 UART: [state] CFI Enabled
37,331,245 UART: [rt] RT listening for mailbox commands...
37,333,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,488,878 UART: [rt]cmd =0x41544d4e, len=14344
40,834,378 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
193,005 UART:
193,379 UART: Running Caliptra ROM ...
194,589 UART:
604,257 UART: [state] CFI Enabled
616,514 UART: [state] LifecycleState = Unprovisioned
618,450 UART: [state] DebugLocked = No
620,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,342 UART: [kat] SHA2-256
795,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,662 UART: [kat] ++
806,135 UART: [kat] sha1
816,435 UART: [kat] SHA2-256
819,160 UART: [kat] SHA2-384
824,220 UART: [kat] SHA2-512-ACC
826,579 UART: [kat] ECC-384
3,109,205 UART: [kat] HMAC-384Kdf
3,121,966 UART: [kat] LMS
4,312,108 UART: [kat] --
4,317,435 UART: [cold-reset] ++
4,319,234 UART: [fht] Storing FHT @ 0x50003400
4,330,285 UART: [idev] ++
4,330,846 UART: [idev] CDI.KEYID = 6
4,331,723 UART: [idev] SUBJECT.KEYID = 7
4,333,031 UART: [idev] UDS.KEYID = 0
4,334,264 ready_for_fw is high
4,334,496 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,486 UART: [idev] Erasing UDS.KEYID = 0
7,615,762 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,127 UART: [idev] --
7,640,573 UART: [ldev] ++
7,641,150 UART: [ldev] CDI.KEYID = 6
7,642,111 UART: [ldev] SUBJECT.KEYID = 5
7,643,318 UART: [ldev] AUTHORITY.KEYID = 7
7,644,601 UART: [ldev] FE.KEYID = 1
7,657,907 UART: [ldev] Erasing FE.KEYID = 1
10,944,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,487 UART: [ldev] --
13,306,352 UART: [fwproc] Waiting for Commands...
13,308,481 UART: [fwproc] Received command 0x46574c44
13,310,664 UART: [fwproc] Received Image of size 113760 bytes
22,018,233 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,094,053 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,162,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,479,436 >>> mbox cmd response: success
22,482,767 UART: [afmc] ++
22,483,373 UART: [afmc] CDI.KEYID = 6
22,484,410 UART: [afmc] SUBJECT.KEYID = 7
22,485,576 UART: [afmc] AUTHORITY.KEYID = 5
25,799,902 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,092,813 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,095,077 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,109,651 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,124,362 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,138,619 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,160,681 UART: [afmc] --
28,164,551 UART: [cold-reset] --
28,168,951 UART: [state] Locking Datavault
28,175,168 UART: [state] Locking PCR0, PCR1 and PCR31
28,176,867 UART: [state] Locking ICCM
28,179,335 UART: [exit] Launching FMC @ 0x40000130
28,187,736 UART:
28,188,012 UART: Running Caliptra FMC ...
28,189,144 UART:
28,189,314 UART: [state] CFI Enabled
28,197,551 UART: [fht] FMC Alias Private Key: 7
30,527,559 UART: [art] Extend RT PCRs Done
30,528,774 UART: [art] Lock RT PCRs Done
30,530,419 UART: [art] Populate DV Done
30,535,986 UART: [fht] FMC Alias Private Key: 7
30,537,571 UART: [art] Derive CDI
30,538,302 UART: [art] Store in in slot 0x4
30,581,265 UART: [art] Derive Key Pair
30,582,260 UART: [art] Store priv key in slot 0x5
33,824,209 UART: [art] Derive Key Pair - Done
33,837,204 UART: [art] Signing Cert with AUTHO
33,838,498 UART: RITY.KEYID = 7
36,118,022 UART: [art] Erasing AUTHORITY.KEYID = 7
36,119,531 UART: [art] PUB.X = 895871E70E608053F8A42BBD39EA465406D1D607C8F3622F833FCFBD21CB920B427C1F856E4BB867F3AC43398976E6F1
36,126,765 UART: [art] PUB.Y = 11C0C0D24D227F93D34D452102DD0945F6386406883E43C76F4C0B52A7000F6CFE546A7B4BA0A3031BA20EDD70FD13EF
36,133,968 UART: [art] SIG.R = 4C2C1210D97840E01176106901721E9BB1E1652303479B35E54EFE3605975866082E526B430189A83739BC426506446C
36,141,326 UART: [art] SIG.S = 585373811E99B7BFF7B9AB690A4FD4AB6FB56FB101F533DA80FA3DE17EFA268E77CFBF4BF9B5392B72D495D77007C2F0
37,446,643 UART: Caliptra RT
37,447,357 UART: [state] CFI Enabled
37,565,132 UART: [rt] RT listening for mailbox commands...
37,567,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,722,545 UART: [rt]cmd =0x41544d4e, len=14344
41,042,468 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
4,132,209 ready_for_fw is high
4,132,847 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,983,180 >>> mbox cmd response: success
27,628,017 UART:
27,628,419 UART: Running Caliptra FMC ...
27,629,522 UART:
27,629,670 UART: [state] CFI Enabled
27,638,006 UART: [fht] FMC Alias Private Key: 7
29,968,202 UART: [art] Extend RT PCRs Done
29,969,430 UART: [art] Lock RT PCRs Done
29,971,241 UART: [art] Populate DV Done
29,976,758 UART: [fht] FMC Alias Private Key: 7
29,978,297 UART: [art] Derive CDI
29,979,066 UART: [art] Store in in slot 0x4
30,022,042 UART: [art] Derive Key Pair
30,023,047 UART: [art] Store priv key in slot 0x5
33,265,255 UART: [art] Derive Key Pair - Done
33,278,077 UART: [art] Signing Cert with AUTHO
33,279,393 UART: RITY.KEYID = 7
35,558,753 UART: [art] Erasing AUTHORITY.KEYID = 7
35,560,249 UART: [art] PUB.X = EFAF1C4EC7AC235B3B1B61AB176D85AD3F8E7C60C86B83B2AA06CBFCB36F8AB8C78F0E186ACA9DBFF35A48B2B77C2165
35,567,554 UART: [art] PUB.Y = 1E6D1687BFC4928E096A9BD9D0E32A1E9F2E5053E34D79396936D8FEAC0C406F11F4F0558173ED04D2C5F1B25A15A5AE
35,574,803 UART: [art] SIG.R = 26532420F5EEDD128F21FDB2A17DDE868BF94DD32418B02D0C3BDDF3F897E7C3BE6188D02D78F8C4D154A79490DF2277
35,582,185 UART: [art] SIG.S = 647CD83AC9EE3B40C88918B03D15176D475244F2214A1258D659E854489A6947938C91D0E445C11628050451D4F6D631
36,888,011 UART: Caliptra RT
36,888,725 UART: [state] CFI Enabled
37,006,669 UART: [rt] RT listening for mailbox commands...
37,009,005 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,164,278 UART: [rt]cmd =0x41544d4e, len=14344
40,535,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,513 UART:
192,884 UART: Running Caliptra ROM ...
194,018 UART:
194,169 UART: [state] CFI Enabled
265,652 UART: [state] LifecycleState = Unprovisioned
267,600 UART: [state] DebugLocked = No
269,570 UART: [state] WD Timer not started. Device not locked for debugging
273,624 UART: [kat] SHA2-256
452,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,274 UART: [kat] ++
464,870 UART: [kat] sha1
475,886 UART: [kat] SHA2-256
478,882 UART: [kat] SHA2-384
484,937 UART: [kat] SHA2-512-ACC
487,909 UART: [kat] ECC-384
2,946,497 UART: [kat] HMAC-384Kdf
2,971,614 UART: [kat] LMS
3,501,021 UART: [kat] --
3,503,894 UART: [cold-reset] ++
3,505,392 UART: [fht] FHT @ 0x50003400
3,517,437 UART: [idev] ++
3,518,022 UART: [idev] CDI.KEYID = 6
3,518,935 UART: [idev] SUBJECT.KEYID = 7
3,520,107 UART: [idev] UDS.KEYID = 0
3,521,028 ready_for_fw is high
3,521,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,718 UART: [idev] Erasing UDS.KEYID = 0
6,027,690 UART: [idev] Sha1 KeyId Algorithm
6,049,787 UART: [idev] --
6,054,114 UART: [ldev] ++
6,054,682 UART: [ldev] CDI.KEYID = 6
6,055,592 UART: [ldev] SUBJECT.KEYID = 5
6,056,751 UART: [ldev] AUTHORITY.KEYID = 7
6,057,980 UART: [ldev] FE.KEYID = 1
6,099,365 UART: [ldev] Erasing FE.KEYID = 1
8,602,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,929 UART: [ldev] --
10,413,073 UART: [fwproc] Wait for Commands...
10,415,184 UART: [fwproc] Recv command 0x46574c44
10,417,222 UART: [fwproc] Recv'd Img size: 114084 bytes
14,981,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,058,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,127,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,444,446 >>> mbox cmd response: success
15,448,874 UART: [afmc] ++
15,449,492 UART: [afmc] CDI.KEYID = 6
15,450,406 UART: [afmc] SUBJECT.KEYID = 7
15,451,570 UART: [afmc] AUTHORITY.KEYID = 5
17,972,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,701,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,703,564 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,719,524 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,735,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,751,249 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,775,000 UART: [afmc] --
19,779,262 UART: [cold-reset] --
19,783,876 UART: [state] Locking Datavault
19,789,284 UART: [state] Locking PCR0, PCR1 and PCR31
19,790,930 UART: [state] Locking ICCM
19,792,783 UART: [exit] Launching FMC @ 0x40000130
19,801,227 UART:
19,801,459 UART: Running Caliptra FMC ...
19,802,558 UART:
19,802,719 UART: [state] CFI Enabled
19,859,140 UART: [fht] FMC Alias Private Key: 7
21,623,325 UART: [art] Extend RT PCRs Done
21,624,540 UART: [art] Lock RT PCRs Done
21,626,106 UART: [art] Populate DV Done
21,631,516 UART: [fht] FMC Alias Private Key: 7
21,633,049 UART: [art] Derive CDI
21,633,866 UART: [art] Store in in slot 0x4
21,691,934 UART: [art] Derive Key Pair
21,692,969 UART: [art] Store priv key in slot 0x5
24,155,647 UART: [art] Derive Key Pair - Done
24,168,530 UART: [art] Signing Cert with AUTHO
24,169,857 UART: RITY.KEYID = 7
25,882,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,883,550 UART: [art] PUB.X = ACA1006DDEED6904688C417635BBC82A8048B0A9772B88CB3CB9806FC55D073D4909E3A77D18E6A6630B54D6DFB8BADF
25,890,839 UART: [art] PUB.Y = 80C373242314AE49C875D115AD17630CFDA95955426FCAB8B7DC7B5A9E67A94ADC07B272D7E472786B9D557EF378DF90
25,898,064 UART: [art] SIG.R = 18226452B6468612B832878ED3332BAAA730C854887F44D40C1A8301F4C5BBBE089F829CC44FE96EB9BDA2A4F7F06BEE
25,905,445 UART: [art] SIG.S = 17015590E3E9F99241EC9B66B9F93252C3BDF3B549B1DFF642F05EFD24B620836130D1989EC8D830703DCF9E971CF3A3
26,884,673 UART: Caliptra RT
26,885,363 UART: [state] CFI Enabled
27,050,541 UART: [rt] RT listening for mailbox commands...
27,052,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,092 UART: [rt]cmd =0x41544d4e, len=14344
29,350,600 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
3,383,102 ready_for_fw is high
3,383,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,050,483 >>> mbox cmd response: success
19,346,671 UART:
19,347,079 UART: Running Caliptra FMC ...
19,348,185 UART:
19,348,336 UART: [state] CFI Enabled
19,413,525 UART: [fht] FMC Alias Private Key: 7
21,177,024 UART: [art] Extend RT PCRs Done
21,178,252 UART: [art] Lock RT PCRs Done
21,180,062 UART: [art] Populate DV Done
21,185,293 UART: [fht] FMC Alias Private Key: 7
21,186,844 UART: [art] Derive CDI
21,187,575 UART: [art] Store in in slot 0x4
21,245,803 UART: [art] Derive Key Pair
21,246,841 UART: [art] Store priv key in slot 0x5
23,709,520 UART: [art] Derive Key Pair - Done
23,722,570 UART: [art] Signing Cert with AUTHO
23,723,899 UART: RITY.KEYID = 7
25,435,545 UART: [art] Erasing AUTHORITY.KEYID = 7
25,437,043 UART: [art] PUB.X = FAC6D94D9BC706713312721984191DA35577B53318B40B4B2669A5D629069984E54A08E0D7CF65FA5EDBA76BCBB2F831
25,444,319 UART: [art] PUB.Y = 8ABEA713086532A2AB5B1FC45FC623C964F2A769E010B13C78E54E963D015DBC42F0E94B8A8030138BD5A63CF45ED451
25,451,542 UART: [art] SIG.R = 5211A292873BDC9BA82E8CA46CB5E7BCCF3607B771885A451B13DC504E2EB5FC35AB013564E8CCF859174E3C06D53E10
25,458,978 UART: [art] SIG.S = 04112A07C33445B5C4F98E85C9588F24339F3B8533E23B005B172C4A5963E245EA4D8195F827C223717D93D3C830CB69
26,437,536 UART: Caliptra RT
26,438,246 UART: [state] CFI Enabled
26,604,172 UART: [rt] RT listening for mailbox commands...
26,606,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,762,212 UART: [rt]cmd =0x41544d4e, len=14344
28,907,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,886 writing to cptra_bootfsm_go
192,980 UART:
193,351 UART: Running Caliptra ROM ...
194,550 UART:
604,044 UART: [state] CFI Enabled
616,862 UART: [state] LifecycleState = Unprovisioned
618,729 UART: [state] DebugLocked = No
620,057 UART: [state] WD Timer not started. Device not locked for debugging
624,672 UART: [kat] SHA2-256
803,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,334 UART: [kat] ++
815,867 UART: [kat] sha1
827,598 UART: [kat] SHA2-256
830,670 UART: [kat] SHA2-384
835,664 UART: [kat] SHA2-512-ACC
838,601 UART: [kat] ECC-384
3,277,945 UART: [kat] HMAC-384Kdf
3,290,458 UART: [kat] LMS
3,820,000 UART: [kat] --
3,825,358 UART: [cold-reset] ++
3,826,227 UART: [fht] FHT @ 0x50003400
3,837,009 UART: [idev] ++
3,837,587 UART: [idev] CDI.KEYID = 6
3,838,500 UART: [idev] SUBJECT.KEYID = 7
3,839,672 UART: [idev] UDS.KEYID = 0
3,840,599 ready_for_fw is high
3,840,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,073 UART: [idev] Erasing UDS.KEYID = 0
6,310,033 UART: [idev] Sha1 KeyId Algorithm
6,332,617 UART: [idev] --
6,335,961 UART: [ldev] ++
6,336,536 UART: [ldev] CDI.KEYID = 6
6,337,446 UART: [ldev] SUBJECT.KEYID = 5
6,338,659 UART: [ldev] AUTHORITY.KEYID = 7
6,339,891 UART: [ldev] FE.KEYID = 1
6,351,077 UART: [ldev] Erasing FE.KEYID = 1
8,826,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,742 UART: [ldev] --
10,616,037 UART: [fwproc] Wait for Commands...
10,618,027 UART: [fwproc] Recv command 0x46574c44
10,620,070 UART: [fwproc] Recv'd Img size: 114084 bytes
15,175,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,253,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,321,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,639,774 >>> mbox cmd response: success
15,644,529 UART: [afmc] ++
15,645,130 UART: [afmc] CDI.KEYID = 6
15,646,045 UART: [afmc] SUBJECT.KEYID = 7
15,647,291 UART: [afmc] AUTHORITY.KEYID = 5
18,144,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,865,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,867,891 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,883,841 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,899,785 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,915,586 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,938,796 UART: [afmc] --
19,943,162 UART: [cold-reset] --
19,948,756 UART: [state] Locking Datavault
19,953,626 UART: [state] Locking PCR0, PCR1 and PCR31
19,955,273 UART: [state] Locking ICCM
19,956,991 UART: [exit] Launching FMC @ 0x40000130
19,965,388 UART:
19,965,624 UART: Running Caliptra FMC ...
19,966,728 UART:
19,966,907 UART: [state] CFI Enabled
19,975,121 UART: [fht] FMC Alias Private Key: 7
21,731,435 UART: [art] Extend RT PCRs Done
21,732,657 UART: [art] Lock RT PCRs Done
21,734,663 UART: [art] Populate DV Done
21,740,293 UART: [fht] FMC Alias Private Key: 7
21,741,955 UART: [art] Derive CDI
21,742,779 UART: [art] Store in in slot 0x4
21,784,948 UART: [art] Derive Key Pair
21,785,988 UART: [art] Store priv key in slot 0x5
24,213,181 UART: [art] Derive Key Pair - Done
24,225,842 UART: [art] Signing Cert with AUTHO
24,227,173 UART: RITY.KEYID = 7
25,932,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,934,288 UART: [art] PUB.X = BB0E4790D3690109FFE60FACBD395C05A94102E463A76F960F445C5CAD22E13B081D95896C2FBF72A438959A56C41E5E
25,941,559 UART: [art] PUB.Y = 60F776F18ABA101AB26A6DABB49891C2350939C45C123A81F0F366C2F97EB1E1FBFEF0DBA756139C7EF5FE46A3F0AFF7
25,948,835 UART: [art] SIG.R = BED71526FB8C064C337D1F512E175352EFDC1F0B80126F4B5808CEC9D32244F69D6AC51AFF0EF4F2D31B785534B9202C
25,956,263 UART: [art] SIG.S = 8FA3569A872E72C1908E038EE45BA5327865B28F4CD9D5A353819F3250F98F92C648D898F20E330D29E68E3868308EAE
26,934,786 UART: Caliptra RT
26,935,491 UART: [state] CFI Enabled
27,052,471 UART: [rt] RT listening for mailbox commands...
27,054,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,866 UART: [rt]cmd =0x41544d4e, len=14344
29,351,489 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
3,695,214 ready_for_fw is high
3,695,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,239,152 >>> mbox cmd response: success
19,490,411 UART:
19,490,806 UART: Running Caliptra FMC ...
19,491,940 UART:
19,492,101 UART: [state] CFI Enabled
19,500,061 UART: [fht] FMC Alias Private Key: 7
21,256,198 UART: [art] Extend RT PCRs Done
21,257,426 UART: [art] Lock RT PCRs Done
21,258,838 UART: [art] Populate DV Done
21,264,319 UART: [fht] FMC Alias Private Key: 7
21,265,811 UART: [art] Derive CDI
21,266,575 UART: [art] Store in in slot 0x4
21,309,282 UART: [art] Derive Key Pair
21,310,285 UART: [art] Store priv key in slot 0x5
23,736,813 UART: [art] Derive Key Pair - Done
23,749,708 UART: [art] Signing Cert with AUTHO
23,751,017 UART: RITY.KEYID = 7
25,456,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,457,879 UART: [art] PUB.X = 0600E1DE50929938459A5379B33372CE6B1EF42E0E104A18932A26964E13BB53B2ED5B2CD06F6C350D31951D57ADBDCF
25,465,105 UART: [art] PUB.Y = 75369AE12A62E2DDCE168A655611BBF79284B387FDF6D0A08536B0BC3D882B6906FF55164018B673C29B88139AF912B5
25,472,400 UART: [art] SIG.R = 264342D5666785967265CD93A019B060551BCB42BFB4FCF3AE05657091179D202487D2E0F05CFFC25E157B04C5DE1601
25,479,792 UART: [art] SIG.S = 3BC0D7BC1DE3D0AB9C26B2288D22368AB2F6B89EC1B8A1A77AF05A92E9E75CEB83834E7BF91924B42E60585A35395E57
26,458,424 UART: Caliptra RT
26,459,129 UART: [state] CFI Enabled
26,576,190 UART: [rt] RT listening for mailbox commands...
26,578,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,733,720 UART: [rt]cmd =0x41544d4e, len=14344
28,876,767 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,524 UART:
192,887 UART: Running Caliptra ROM ...
194,039 UART:
194,191 UART: [state] CFI Enabled
263,243 UART: [state] LifecycleState = Unprovisioned
265,598 UART: [state] DebugLocked = No
266,920 UART: [state] WD Timer not started. Device not locked for debugging
271,953 UART: [kat] SHA2-256
461,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,612 UART: [kat] ++
473,058 UART: [kat] sha1
483,509 UART: [kat] SHA2-256
486,574 UART: [kat] SHA2-384
493,414 UART: [kat] SHA2-512-ACC
495,992 UART: [kat] ECC-384
2,961,876 UART: [kat] HMAC-384Kdf
2,984,840 UART: [kat] LMS
3,516,597 UART: [kat] --
3,519,545 UART: [cold-reset] ++
3,521,403 UART: [fht] FHT @ 0x50003400
3,532,310 UART: [idev] ++
3,533,023 UART: [idev] CDI.KEYID = 6
3,534,054 UART: [idev] SUBJECT.KEYID = 7
3,535,159 UART: [idev] UDS.KEYID = 0
3,536,421 ready_for_fw is high
3,536,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,680,357 UART: [idev] Erasing UDS.KEYID = 0
6,041,622 UART: [idev] Sha1 KeyId Algorithm
6,064,899 UART: [idev] --
6,070,404 UART: [ldev] ++
6,071,077 UART: [ldev] CDI.KEYID = 6
6,071,996 UART: [ldev] SUBJECT.KEYID = 5
6,073,172 UART: [ldev] AUTHORITY.KEYID = 7
6,074,402 UART: [ldev] FE.KEYID = 1
6,113,653 UART: [ldev] Erasing FE.KEYID = 1
8,621,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,147 UART: [ldev] --
10,428,619 UART: [fwproc] Wait for Commands...
10,430,835 UART: [fwproc] Recv command 0x46574c44
10,433,147 UART: [fwproc] Recv'd Img size: 114084 bytes
15,047,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,131,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,247,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,788,037 >>> mbox cmd response: success
15,792,618 UART: [afmc] ++
15,793,328 UART: [afmc] CDI.KEYID = 6
15,794,491 UART: [afmc] SUBJECT.KEYID = 7
15,795,983 UART: [afmc] AUTHORITY.KEYID = 5
18,338,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,062,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,064,823 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,079,929 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,095,085 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,109,997 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,133,242 UART: [afmc] --
20,135,970 UART: [cold-reset] --
20,140,600 UART: [state] Locking Datavault
20,145,970 UART: [state] Locking PCR0, PCR1 and PCR31
20,148,125 UART: [state] Locking ICCM
20,149,468 UART: [exit] Launching FMC @ 0x40000130
20,158,125 UART:
20,158,364 UART: Running Caliptra FMC ...
20,159,463 UART:
20,159,619 UART: [state] CFI Enabled
20,221,398 UART: [fht] FMC Alias Private Key: 7
21,985,189 UART: [art] Extend RT PCRs Done
21,986,407 UART: [art] Lock RT PCRs Done
21,988,170 UART: [art] Populate DV Done
21,993,577 UART: [fht] FMC Alias Private Key: 7
21,995,217 UART: [art] Derive CDI
21,995,955 UART: [art] Store in in slot 0x4
22,054,354 UART: [art] Derive Key Pair
22,055,393 UART: [art] Store priv key in slot 0x5
24,518,604 UART: [art] Derive Key Pair - Done
24,531,825 UART: [art] Signing Cert with AUTHO
24,533,124 UART: RITY.KEYID = 7
26,243,794 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,315 UART: [art] PUB.X = 966A9A17DCEEF663C2787AA70933CC542C776BFF0B19CAB45544E96E4D2D3AC0B5CA7926AEEF53230DFBC3A83FB9A43D
26,252,574 UART: [art] PUB.Y = 48E43F7351F255E5EC8A7A2DF303E7C88C51AB4308BCCEBED84AA0029552756149C4A4F9E395FE91EAAD988F90DB2A70
26,259,889 UART: [art] SIG.R = 389A01B9E47EAB3FD47CF58A89F8ED7D622910CCAD636E6E24B9DB639DC744345F3A581300BAE8182CDB5153FE7C4FBE
26,267,286 UART: [art] SIG.S = BDC86616A0506676E137C12CE9A7BE293DC0A5DA7CAE949BF5B3E6770CF02908936254D25DA63EAF713F82355E71D71B
27,245,402 UART: Caliptra RT
27,246,100 UART: [state] CFI Enabled
27,411,809 UART: [rt] RT listening for mailbox commands...
27,414,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,256 UART: [rt]cmd =0x41544d4e, len=14344
29,716,649 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,438,610 ready_for_fw is high
3,438,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,863,531 >>> mbox cmd response: success
20,149,312 UART:
20,149,709 UART: Running Caliptra FMC ...
20,150,837 UART:
20,150,995 UART: [state] CFI Enabled
20,218,354 UART: [fht] FMC Alias Private Key: 7
21,981,803 UART: [art] Extend RT PCRs Done
21,983,024 UART: [art] Lock RT PCRs Done
21,984,868 UART: [art] Populate DV Done
21,990,220 UART: [fht] FMC Alias Private Key: 7
21,991,715 UART: [art] Derive CDI
21,992,478 UART: [art] Store in in slot 0x4
22,050,915 UART: [art] Derive Key Pair
22,051,920 UART: [art] Store priv key in slot 0x5
24,515,119 UART: [art] Derive Key Pair - Done
24,528,119 UART: [art] Signing Cert with AUTHO
24,529,426 UART: RITY.KEYID = 7
26,241,095 UART: [art] Erasing AUTHORITY.KEYID = 7
26,242,607 UART: [art] PUB.X = 84AF5FF7ED463FBF65C258D7A73A77D1004A0F7769201CFA12864DF20DE8E2AC8463C6F789594BBB57748A994A1F03FB
26,249,822 UART: [art] PUB.Y = FC9C5ABF430A5F6A236F8C46441FF205591B681342671A85214884FEBF86F6DC1C1BC75A6DFFB70083361205D3588AD9
26,257,074 UART: [art] SIG.R = E73F4F43D8D71E8DF900DAFE15BE9ADCF1D88BA93BABF2686C1EA3BD59FE27F8496C682BA6A75DFD1B8409F518173C85
26,264,445 UART: [art] SIG.S = 56C27D5BDDD9E2B06FCF5187DDA5D21323755410B0DB515430D07873BA5FE85526D6493B2CD43E83979215887291C425
27,243,266 UART: Caliptra RT
27,243,975 UART: [state] CFI Enabled
27,409,431 UART: [rt] RT listening for mailbox commands...
27,411,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,401 UART: [rt]cmd =0x41544d4e, len=14344
29,716,704 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
192,962 UART:
193,428 UART: Running Caliptra ROM ...
194,594 UART:
604,333 UART: [state] CFI Enabled
618,426 UART: [state] LifecycleState = Unprovisioned
620,809 UART: [state] DebugLocked = No
623,405 UART: [state] WD Timer not started. Device not locked for debugging
627,436 UART: [kat] SHA2-256
817,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,090 UART: [kat] ++
828,620 UART: [kat] sha1
840,413 UART: [kat] SHA2-256
843,421 UART: [kat] SHA2-384
850,568 UART: [kat] SHA2-512-ACC
853,155 UART: [kat] ECC-384
3,295,184 UART: [kat] HMAC-384Kdf
3,307,427 UART: [kat] LMS
3,839,192 UART: [kat] --
3,844,412 UART: [cold-reset] ++
3,846,786 UART: [fht] FHT @ 0x50003400
3,857,872 UART: [idev] ++
3,858,592 UART: [idev] CDI.KEYID = 6
3,859,547 UART: [idev] SUBJECT.KEYID = 7
3,860,668 UART: [idev] UDS.KEYID = 0
3,861,816 ready_for_fw is high
3,862,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,200 UART: [idev] Erasing UDS.KEYID = 0
6,334,951 UART: [idev] Sha1 KeyId Algorithm
6,357,047 UART: [idev] --
6,362,034 UART: [ldev] ++
6,362,718 UART: [ldev] CDI.KEYID = 6
6,363,628 UART: [ldev] SUBJECT.KEYID = 5
6,364,788 UART: [ldev] AUTHORITY.KEYID = 7
6,366,014 UART: [ldev] FE.KEYID = 1
6,377,579 UART: [ldev] Erasing FE.KEYID = 1
8,850,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,543 UART: [ldev] --
10,640,491 UART: [fwproc] Wait for Commands...
10,643,340 UART: [fwproc] Recv command 0x46574c44
10,645,594 UART: [fwproc] Recv'd Img size: 114084 bytes
15,259,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,335,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,451,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,992,921 >>> mbox cmd response: success
15,996,736 UART: [afmc] ++
15,997,454 UART: [afmc] CDI.KEYID = 6
15,998,647 UART: [afmc] SUBJECT.KEYID = 7
16,000,089 UART: [afmc] AUTHORITY.KEYID = 5
18,506,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,224,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,226,887 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,241,982 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,257,193 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,271,995 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,295,483 UART: [afmc] --
20,299,190 UART: [cold-reset] --
20,304,688 UART: [state] Locking Datavault
20,311,263 UART: [state] Locking PCR0, PCR1 and PCR31
20,313,471 UART: [state] Locking ICCM
20,314,571 UART: [exit] Launching FMC @ 0x40000130
20,323,245 UART:
20,323,488 UART: Running Caliptra FMC ...
20,324,511 UART:
20,324,657 UART: [state] CFI Enabled
20,332,762 UART: [fht] FMC Alias Private Key: 7
22,089,042 UART: [art] Extend RT PCRs Done
22,090,267 UART: [art] Lock RT PCRs Done
22,091,705 UART: [art] Populate DV Done
22,097,174 UART: [fht] FMC Alias Private Key: 7
22,098,719 UART: [art] Derive CDI
22,099,459 UART: [art] Store in in slot 0x4
22,142,107 UART: [art] Derive Key Pair
22,143,108 UART: [art] Store priv key in slot 0x5
24,569,495 UART: [art] Derive Key Pair - Done
24,582,708 UART: [art] Signing Cert with AUTHO
24,584,016 UART: RITY.KEYID = 7
26,289,248 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,752 UART: [art] PUB.X = 9D36AA809F46BCBDAB22D82BD8AEF138C2D8520D953C3BD8185D91699770BBF2D77590B389D023D83BB00B6DCC80EFD0
26,298,030 UART: [art] PUB.Y = 250FE05B547C4A5225774000C1CBD8CB46371B4C692BBDBF684676177FFEA58359470EE5B1177296E22C10A6F6F923FA
26,305,291 UART: [art] SIG.R = 7C2898B66C483FA5C1B21A075187FEEB548F0BF887D1139F0F8B3992D3AB1CF8F827B6E0CACF52041256044D79F183CB
26,312,655 UART: [art] SIG.S = 21B3191E716E74ED00BF937D8EC6AF26B2103503FD89F2D67FD850970B1BF1755DB2CFFDAB681BEB3A4C85692823EC2E
27,291,805 UART: Caliptra RT
27,292,499 UART: [state] CFI Enabled
27,408,845 UART: [rt] RT listening for mailbox commands...
27,411,177 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,322 UART: [rt]cmd =0x41544d4e, len=14344
29,719,509 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,866 writing to cptra_bootfsm_go
3,756,635 ready_for_fw is high
3,757,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,060,782 >>> mbox cmd response: success
20,312,011 UART:
20,312,403 UART: Running Caliptra FMC ...
20,313,552 UART:
20,313,719 UART: [state] CFI Enabled
20,321,647 UART: [fht] FMC Alias Private Key: 7
22,078,727 UART: [art] Extend RT PCRs Done
22,079,943 UART: [art] Lock RT PCRs Done
22,081,638 UART: [art] Populate DV Done
22,087,326 UART: [fht] FMC Alias Private Key: 7
22,088,881 UART: [art] Derive CDI
22,089,621 UART: [art] Store in in slot 0x4
22,132,163 UART: [art] Derive Key Pair
22,133,170 UART: [art] Store priv key in slot 0x5
24,559,641 UART: [art] Derive Key Pair - Done
24,572,644 UART: [art] Signing Cert with AUTHO
24,573,950 UART: RITY.KEYID = 7
26,278,877 UART: [art] Erasing AUTHORITY.KEYID = 7
26,280,371 UART: [art] PUB.X = 7F8FB9C77BAD7EE6F73E321A0712A6A911BCDDA8D24FF6BB46287DA7C77D69DBAAABDAD2418629827FEBDBB6809B00F8
26,287,683 UART: [art] PUB.Y = 89580C3571946F9B3C79B32B0D2AD6498CCB2362857F74E86C73B71D7C462CB8752D7B8B532B0B17B342A1BD6A34420D
26,294,924 UART: [art] SIG.R = DAB66AEEB244614AE3ECC07C86ACED332771B96CE590EB96F0AFA4010FF6B38DCB95527705AC25675297C414B18B877A
26,302,501 UART: [art] SIG.S = 25BB41D681FE98F4A6ABCB5D77AE305F60005C4ED6EB9DF876D80D4E086017C9F9872A457351F066044489F30B3E3391
27,281,073 UART: Caliptra RT
27,281,796 UART: [state] CFI Enabled
27,399,183 UART: [rt] RT listening for mailbox commands...
27,401,549 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,556,911 UART: [rt]cmd =0x41544d4e, len=14344
29,709,197 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,747 UART: [kat] SHA2-256
881,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,793 UART: [kat] ++
885,945 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,972 UART: [kat] LMS
1,475,168 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,615 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 ready_for_fw is high
1,480,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,636 UART: [idev] Erasing UDS.KEYID = 0
1,505,248 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,740 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,693 UART: [ldev] Erasing FE.KEYID = 1
1,547,258 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,206 UART: [ldev] --
1,586,679 UART: [fwproc] Waiting for Commands...
1,587,344 UART: [fwproc] Received command 0x46574c44
1,588,135 UART: [fwproc] Received Image of size 114084 bytes
5,192,948 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,221,488 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,250,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,386,249 >>> mbox cmd response: success
5,387,423 UART: [afmc] ++
5,387,591 UART: [afmc] CDI.KEYID = 6
5,387,953 UART: [afmc] SUBJECT.KEYID = 7
5,388,378 UART: [afmc] AUTHORITY.KEYID = 5
5,423,460 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,439,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,440,398 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,446,107 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,451,999 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,457,700 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,465,572 UART: [afmc] --
5,466,700 UART: [cold-reset] --
5,467,338 UART: [state] Locking Datavault
5,468,637 UART: [state] Locking PCR0, PCR1 and PCR31
5,469,241 UART: [state] Locking ICCM
5,469,849 UART: [exit] Launching FMC @ 0x40000130
5,475,178 UART:
5,475,194 UART: Running Caliptra FMC ...
5,475,602 UART:
5,475,656 UART: [state] CFI Enabled
5,486,310 UART: [fht] FMC Alias Private Key: 7
5,594,140 UART: [art] Extend RT PCRs Done
5,594,568 UART: [art] Lock RT PCRs Done
5,595,820 UART: [art] Populate DV Done
5,603,948 UART: [fht] FMC Alias Private Key: 7
5,604,938 UART: [art] Derive CDI
5,605,218 UART: [art] Store in in slot 0x4
5,691,107 UART: [art] Derive Key Pair
5,691,467 UART: [art] Store priv key in slot 0x5
5,704,481 UART: [art] Derive Key Pair - Done
5,719,358 UART: [art] Signing Cert with AUTHO
5,719,838 UART: RITY.KEYID = 7
5,735,160 UART: [art] Erasing AUTHORITY.KEYID = 7
5,735,925 UART: [art] PUB.X = EC0D824A8DEF9C5198B31A565F3CE21D32F04D5669FD74013DCAE7D709F97C35B3373733ED769DFC9676BE90AC81E913
5,742,696 UART: [art] PUB.Y = 774DD7633B7F16D20ADB389DBFD3DB922CB5AA5C44EE223C2219A5EC8D30946A57B8B7FE8B6055E5AAA8EA9D7715ACB1
5,749,665 UART: [art] SIG.R = AACDC9D45DAA1EC60CD75E49CEDFD2ED4B4DAF83E78AD543A1B9CD35523AA7986C1E40179877A1DAC38569A0BDF928D3
5,756,460 UART: [art] SIG.S = 71B54EA4DDEC9F382BDF2B6FB66C1D0AC70FB1077EADE7D52BFFBAE071FB9A0AA569233093638DD3383F3501E2522EF6
5,780,700 UART: Caliptra RT
5,780,953 UART: [state] CFI Enabled
5,889,508 UART: [rt] RT listening for mailbox commands...
5,890,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,084 UART: [rt]cmd =0x41544d4e, len=14344
6,301,493 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 ready_for_fw is high
1,362,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,010,219 >>> mbox cmd response: success
5,072,438 UART:
5,072,454 UART: Running Caliptra FMC ...
5,072,862 UART:
5,072,916 UART: [state] CFI Enabled
5,083,138 UART: [fht] FMC Alias Private Key: 7
5,190,712 UART: [art] Extend RT PCRs Done
5,191,140 UART: [art] Lock RT PCRs Done
5,192,602 UART: [art] Populate DV Done
5,200,904 UART: [fht] FMC Alias Private Key: 7
5,201,954 UART: [art] Derive CDI
5,202,234 UART: [art] Store in in slot 0x4
5,288,249 UART: [art] Derive Key Pair
5,288,609 UART: [art] Store priv key in slot 0x5
5,301,003 UART: [art] Derive Key Pair - Done
5,315,857 UART: [art] Signing Cert with AUTHO
5,316,337 UART: RITY.KEYID = 7
5,331,997 UART: [art] Erasing AUTHORITY.KEYID = 7
5,332,762 UART: [art] PUB.X = 407D823772BD2F404AF78868069BF0C93A078A25E3AF429A5695D63046104690B49BDB311123B063BEAE4DE88E6B2094
5,339,522 UART: [art] PUB.Y = FBA398EF1B09ACBF3449E1F73D0D6C2B6A765DC2D8005020B61BB30E1662FE4EF5474A637A6402902AA564BDB98943B5
5,346,448 UART: [art] SIG.R = 4AC4147042ADA1DC121D65DC7963F547918E65C6F40DC3443F68C757C6B0F6A58459E44271919E4CAC6671343906A9D6
5,353,208 UART: [art] SIG.S = B5C2DE8BADD2CDA0E6C507E268C611D66AE934AB06F81618B3431558B729F8500F8F5CF1E33EAD9F52D444809F7BFC6A
5,376,690 UART: Caliptra RT
5,376,943 UART: [state] CFI Enabled
5,485,302 UART: [rt] RT listening for mailbox commands...
5,485,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,608,958 UART: [rt]cmd =0x41544d4e, len=14344
5,887,715 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,625 UART: [kat] LMS
1,475,821 UART: [kat] --
1,476,874 UART: [cold-reset] ++
1,477,436 UART: [fht] Storing FHT @ 0x50003400
1,480,121 UART: [idev] ++
1,480,289 UART: [idev] CDI.KEYID = 6
1,480,649 UART: [idev] SUBJECT.KEYID = 7
1,481,073 UART: [idev] UDS.KEYID = 0
1,481,418 ready_for_fw is high
1,481,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,401 UART: [idev] Erasing UDS.KEYID = 0
1,505,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,763 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,742 UART: [ldev] Erasing FE.KEYID = 1
1,548,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,359 UART: [ldev] --
1,587,658 UART: [fwproc] Waiting for Commands...
1,588,523 UART: [fwproc] Received command 0x46574c44
1,589,314 UART: [fwproc] Received Image of size 114084 bytes
5,308,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,337,328 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,366,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,502,103 >>> mbox cmd response: success
5,503,315 UART: [afmc] ++
5,503,483 UART: [afmc] CDI.KEYID = 6
5,503,845 UART: [afmc] SUBJECT.KEYID = 7
5,504,270 UART: [afmc] AUTHORITY.KEYID = 5
5,538,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,555,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,556,378 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,562,087 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,567,979 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,573,680 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,581,562 UART: [afmc] --
5,582,558 UART: [cold-reset] --
5,583,448 UART: [state] Locking Datavault
5,584,911 UART: [state] Locking PCR0, PCR1 and PCR31
5,585,515 UART: [state] Locking ICCM
5,586,135 UART: [exit] Launching FMC @ 0x40000130
5,591,464 UART:
5,591,480 UART: Running Caliptra FMC ...
5,591,888 UART:
5,592,031 UART: [state] CFI Enabled
5,602,997 UART: [fht] FMC Alias Private Key: 7
5,711,387 UART: [art] Extend RT PCRs Done
5,711,815 UART: [art] Lock RT PCRs Done
5,713,243 UART: [art] Populate DV Done
5,721,611 UART: [fht] FMC Alias Private Key: 7
5,722,569 UART: [art] Derive CDI
5,722,849 UART: [art] Store in in slot 0x4
5,808,536 UART: [art] Derive Key Pair
5,808,896 UART: [art] Store priv key in slot 0x5
5,822,120 UART: [art] Derive Key Pair - Done
5,837,130 UART: [art] Signing Cert with AUTHO
5,837,610 UART: RITY.KEYID = 7
5,852,602 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,367 UART: [art] PUB.X = 289BCDF1071C10F0F9ED2A4FECE437258B4819B8B765AFFC206C47C531ECECC1D97F7220FB9BCD7BC6F709FE7EEE203B
5,860,157 UART: [art] PUB.Y = 3C34BD40DB27D47378B45C7C60E56FDF31875F7F45F2108E9F0BDCC8DDBE230B8468B3BCFDFFC71A05F5D28CEAAF675C
5,867,124 UART: [art] SIG.R = 9E7A7B7A882EFE62896F4343AE3E13CDCA90A8BA00B03A4B9E2EE24EB06C618D70E089486A8A4C5A89530AE95A58C1E2
5,873,883 UART: [art] SIG.S = 45804747BC7232B799940AF87A2E434FAA578C69E9F5763810B8471A76431E5675E47B8C708CA3F436423F1AC969FED4
5,897,405 UART: Caliptra RT
5,897,750 UART: [state] CFI Enabled
6,005,287 UART: [rt] RT listening for mailbox commands...
6,005,957 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,128,969 UART: [rt]cmd =0x41544d4e, len=14344
6,419,297 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 ready_for_fw is high
1,362,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,349,401 >>> mbox cmd response: success
5,411,158 UART:
5,411,174 UART: Running Caliptra FMC ...
5,411,582 UART:
5,411,725 UART: [state] CFI Enabled
5,422,629 UART: [fht] FMC Alias Private Key: 7
5,530,569 UART: [art] Extend RT PCRs Done
5,530,997 UART: [art] Lock RT PCRs Done
5,532,625 UART: [art] Populate DV Done
5,541,097 UART: [fht] FMC Alias Private Key: 7
5,542,057 UART: [art] Derive CDI
5,542,337 UART: [art] Store in in slot 0x4
5,627,956 UART: [art] Derive Key Pair
5,628,316 UART: [art] Store priv key in slot 0x5
5,641,246 UART: [art] Derive Key Pair - Done
5,656,096 UART: [art] Signing Cert with AUTHO
5,656,576 UART: RITY.KEYID = 7
5,672,178 UART: [art] Erasing AUTHORITY.KEYID = 7
5,672,943 UART: [art] PUB.X = 3D5EF6AFC2298F734A0E56E1B0CADF7CFA813D5FAD01FD7ACA6AC91CA2201A79F59C5A06C24862253DCA4D00337EE5BF
5,679,708 UART: [art] PUB.Y = 49F024E3C51BA00DD1FEF0CF1FD1449FAB454B6D1CA003DCD1E9D434CE850933F630362FCB98AE7BD3D899A164B2D596
5,686,667 UART: [art] SIG.R = 3E0108849401E63821B1E0A145129F8D52470FE894A77F69B83303BF508E6FD5A518A33F6163B43DC0C485F029B88DC0
5,693,416 UART: [art] SIG.S = F0665FD732BCBECC8A280B5315BA98BD24652431D3B074A1A493C474860529B3B978A1269966347482D2FACB1199D8B2
5,716,323 UART: Caliptra RT
5,716,668 UART: [state] CFI Enabled
5,825,021 UART: [rt] RT listening for mailbox commands...
5,825,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,949,103 UART: [rt]cmd =0x41544d4e, len=14344
6,244,405 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
893,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,385 UART: [kat] ++
897,537 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
917,936 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,491 UART: [cold-reset] ++
1,171,837 UART: [fht] FHT @ 0x50003400
1,174,460 UART: [idev] ++
1,174,628 UART: [idev] CDI.KEYID = 6
1,174,988 UART: [idev] SUBJECT.KEYID = 7
1,175,412 UART: [idev] UDS.KEYID = 0
1,175,757 ready_for_fw is high
1,175,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,475 UART: [idev] Sha1 KeyId Algorithm
1,209,071 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,554 UART: [ldev] SUBJECT.KEYID = 5
1,210,980 UART: [ldev] AUTHORITY.KEYID = 7
1,211,443 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,304 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,742 UART: [fwproc] Recv'd Img size: 114084 bytes
3,118,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,067 >>> mbox cmd response: success
3,312,183 UART: [afmc] ++
3,312,351 UART: [afmc] CDI.KEYID = 6
3,312,713 UART: [afmc] SUBJECT.KEYID = 7
3,313,138 UART: [afmc] AUTHORITY.KEYID = 5
3,347,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,721 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,430 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,322 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,033 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,830 UART: [afmc] --
3,390,734 UART: [cold-reset] --
3,391,770 UART: [state] Locking Datavault
3,392,949 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,553 UART: [state] Locking ICCM
3,394,151 UART: [exit] Launching FMC @ 0x40000130
3,399,480 UART:
3,399,496 UART: Running Caliptra FMC ...
3,399,904 UART:
3,399,958 UART: [state] CFI Enabled
3,410,454 UART: [fht] FMC Alias Private Key: 7
3,518,270 UART: [art] Extend RT PCRs Done
3,518,698 UART: [art] Lock RT PCRs Done
3,520,160 UART: [art] Populate DV Done
3,528,550 UART: [fht] FMC Alias Private Key: 7
3,529,688 UART: [art] Derive CDI
3,529,968 UART: [art] Store in in slot 0x4
3,615,861 UART: [art] Derive Key Pair
3,616,221 UART: [art] Store priv key in slot 0x5
3,629,259 UART: [art] Derive Key Pair - Done
3,644,387 UART: [art] Signing Cert with AUTHO
3,644,867 UART: RITY.KEYID = 7
3,660,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,778 UART: [art] PUB.X = B9BB9B3411F1650CC3AE18E624C286277E76356CF51334912F152B41E658B68818EEB5F87B5836D11819D16F578BB6E0
3,667,541 UART: [art] PUB.Y = 234E539A3F3D79B3B3E69E6AF6017FAD300E0AE01099842A1D7DAB61D845D4A4EAB14FCB82277DD356D9F566FB5DCAF0
3,674,500 UART: [art] SIG.R = 1F9084676E01021B478FA2B5A41A098D09BF325F24508CCFE3C4B5B71C4E8A823D0356A81D46FBB0AB1AC2962FBB7E7F
3,681,267 UART: [art] SIG.S = C718285012ABDDCED394B3EA53E601979203C3C822E4B810150F40F2AB373FFFD88A95F83A2BFD945E929B4311FCBF1D
3,704,307 UART: Caliptra RT
3,704,560 UART: [state] CFI Enabled
3,812,152 UART: [rt] RT listening for mailbox commands...
3,812,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,638 UART: [rt]cmd =0x41544d4e, len=14344
4,228,663 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 ready_for_fw is high
1,060,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,894 >>> mbox cmd response: success
3,235,375 UART:
3,235,391 UART: Running Caliptra FMC ...
3,235,799 UART:
3,235,853 UART: [state] CFI Enabled
3,246,537 UART: [fht] FMC Alias Private Key: 7
3,354,497 UART: [art] Extend RT PCRs Done
3,354,925 UART: [art] Lock RT PCRs Done
3,356,621 UART: [art] Populate DV Done
3,364,895 UART: [fht] FMC Alias Private Key: 7
3,365,825 UART: [art] Derive CDI
3,366,105 UART: [art] Store in in slot 0x4
3,451,684 UART: [art] Derive Key Pair
3,452,044 UART: [art] Store priv key in slot 0x5
3,465,206 UART: [art] Derive Key Pair - Done
3,480,069 UART: [art] Signing Cert with AUTHO
3,480,549 UART: RITY.KEYID = 7
3,495,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,172 UART: [art] PUB.X = 018AD695AAA66D71CC888B16261AFE06D9A2D6408B2C3FE439533AC925AB4B1F3CE89645F61B5B71EAA96C8B65B31290
3,502,946 UART: [art] PUB.Y = E26281F797CD7ABAF31B90F505E0FD703C19C06E8A3FF9266594A6859920A6BC0EF0B7F825D01ACF0B75A654DF307F07
3,509,894 UART: [art] SIG.R = B008BE49D60EDAD8BC76AB5444A7B068EE8D2F6523459CA0C5F3971212B42B567D716E7D1933EAB19986D632978CBB58
3,516,664 UART: [art] SIG.S = FC5B39BD862F61A1B45EEA5EFAD9ACA2B01C0275962A194CE355474127A36B602D047BBE04951974EC78CED7E75DE1CA
3,540,822 UART: Caliptra RT
3,541,075 UART: [state] CFI Enabled
3,648,440 UART: [rt] RT listening for mailbox commands...
3,649,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,930 UART: [rt]cmd =0x41544d4e, len=14344
4,055,359 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
893,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,222 UART: [kat] ++
897,374 UART: [kat] sha1
901,638 UART: [kat] SHA2-256
903,578 UART: [kat] SHA2-384
906,153 UART: [kat] SHA2-512-ACC
908,054 UART: [kat] ECC-384
917,901 UART: [kat] HMAC-384Kdf
922,541 UART: [kat] LMS
1,170,869 UART: [kat] --
1,171,658 UART: [cold-reset] ++
1,172,010 UART: [fht] FHT @ 0x50003400
1,174,671 UART: [idev] ++
1,174,839 UART: [idev] CDI.KEYID = 6
1,175,199 UART: [idev] SUBJECT.KEYID = 7
1,175,623 UART: [idev] UDS.KEYID = 0
1,175,968 ready_for_fw is high
1,175,968 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,649 UART: [idev] Erasing UDS.KEYID = 0
1,200,846 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,384 UART: [ldev] ++
1,210,552 UART: [ldev] CDI.KEYID = 6
1,210,915 UART: [ldev] SUBJECT.KEYID = 5
1,211,341 UART: [ldev] AUTHORITY.KEYID = 7
1,211,804 UART: [ldev] FE.KEYID = 1
1,217,120 UART: [ldev] Erasing FE.KEYID = 1
1,243,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,698 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,785 UART: [fwproc] Recv command 0x46574c44
1,284,513 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,314,061 >>> mbox cmd response: success
3,315,079 UART: [afmc] ++
3,315,247 UART: [afmc] CDI.KEYID = 6
3,315,609 UART: [afmc] SUBJECT.KEYID = 7
3,316,034 UART: [afmc] AUTHORITY.KEYID = 5
3,351,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,677 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,386 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,278 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,989 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,628 UART: [afmc] --
3,394,720 UART: [cold-reset] --
3,395,764 UART: [state] Locking Datavault
3,396,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,397 UART: [state] Locking ICCM
3,397,825 UART: [exit] Launching FMC @ 0x40000130
3,403,154 UART:
3,403,170 UART: Running Caliptra FMC ...
3,403,578 UART:
3,403,721 UART: [state] CFI Enabled
3,414,205 UART: [fht] FMC Alias Private Key: 7
3,522,561 UART: [art] Extend RT PCRs Done
3,522,989 UART: [art] Lock RT PCRs Done
3,524,511 UART: [art] Populate DV Done
3,532,569 UART: [fht] FMC Alias Private Key: 7
3,533,739 UART: [art] Derive CDI
3,534,019 UART: [art] Store in in slot 0x4
3,619,776 UART: [art] Derive Key Pair
3,620,136 UART: [art] Store priv key in slot 0x5
3,633,176 UART: [art] Derive Key Pair - Done
3,647,719 UART: [art] Signing Cert with AUTHO
3,648,199 UART: RITY.KEYID = 7
3,663,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,074 UART: [art] PUB.X = 0C8DCBD0D28B2FAD7C1E452A531932C90E7FB615868395C88AFEB035FE03552A1C4773BEC5C55B521B0E7BEF4EAEE84C
3,670,852 UART: [art] PUB.Y = E972A8924FDEF5CD8C39CD4BBDA06936EB090758286F5002EC9F1570251AB8C418F757998F135D1BC48FFCE458D9B2DD
3,677,805 UART: [art] SIG.R = 2AF4CB6529DCE985AFEAB00D70BA873AC48232124A76C768D3C334745ADAF2E6A29C1889B0C26E8EE090693AD9CC0028
3,684,562 UART: [art] SIG.S = C8DD17862D242C0B0CD918659B2739AD132131C9B44B07BFEE9FC3D0D0436E961F3EDA5E338EAECB02DD6C58D59F4E8A
3,708,073 UART: Caliptra RT
3,708,418 UART: [state] CFI Enabled
3,816,284 UART: [rt] RT listening for mailbox commands...
3,816,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,120 UART: [rt]cmd =0x41544d4e, len=14344
4,232,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,310 ready_for_fw is high
1,060,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,167 >>> mbox cmd response: success
3,235,444 UART:
3,235,460 UART: Running Caliptra FMC ...
3,235,868 UART:
3,236,011 UART: [state] CFI Enabled
3,246,789 UART: [fht] FMC Alias Private Key: 7
3,354,361 UART: [art] Extend RT PCRs Done
3,354,789 UART: [art] Lock RT PCRs Done
3,356,475 UART: [art] Populate DV Done
3,364,785 UART: [fht] FMC Alias Private Key: 7
3,365,763 UART: [art] Derive CDI
3,366,043 UART: [art] Store in in slot 0x4
3,451,888 UART: [art] Derive Key Pair
3,452,248 UART: [art] Store priv key in slot 0x5
3,465,582 UART: [art] Derive Key Pair - Done
3,480,416 UART: [art] Signing Cert with AUTHO
3,480,896 UART: RITY.KEYID = 7
3,496,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,047 UART: [art] PUB.X = 905C45C987F9B525EEBFCA63C69E5BC151964C85A0E29AB0E2064654E52D54AC0494290F7DCCB6C43D3A582FE8FC4D50
3,503,820 UART: [art] PUB.Y = 874B472239CB549DEB83F57D314AC56FC062A5D8E9C22B960EA746DFCD20DF651E83A4D563E9D66D19A2B4AFC1DC6DD6
3,510,785 UART: [art] SIG.R = 2C4B9AB935CAFF0EB856FBB4345879355D00E4D94CDBF9351FAFA77ABD1E6C3ED8E6448B6C23D37B28CA67C2BF82FEDE
3,517,558 UART: [art] SIG.S = 1095FE321131E750324D64204EC49610D403EB5494A7A90F24F9260D82E80F4EDC3A797C4A114ECA7E9B2B7BBF0FC477
3,540,936 UART: Caliptra RT
3,541,281 UART: [state] CFI Enabled
3,648,262 UART: [rt] RT listening for mailbox commands...
3,648,932 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,940 UART: [rt]cmd =0x41544d4e, len=14344
4,052,630 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,009 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
890,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,949 UART: [kat] ++
895,101 UART: [kat] sha1
899,259 UART: [kat] SHA2-256
901,199 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,883 UART: [fht] FHT @ 0x50003400
1,172,389 UART: [idev] ++
1,172,557 UART: [idev] CDI.KEYID = 6
1,172,918 UART: [idev] SUBJECT.KEYID = 7
1,173,343 UART: [idev] UDS.KEYID = 0
1,173,689 ready_for_fw is high
1,173,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,953 UART: [idev] Erasing UDS.KEYID = 0
1,197,941 UART: [idev] Sha1 KeyId Algorithm
1,206,827 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,654 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,372 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114084 bytes
3,114,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,306,455 >>> mbox cmd response: success
3,307,656 UART: [afmc] ++
3,307,824 UART: [afmc] CDI.KEYID = 6
3,308,187 UART: [afmc] SUBJECT.KEYID = 7
3,308,613 UART: [afmc] AUTHORITY.KEYID = 5
3,344,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,144 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,854 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,744 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,455 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,319 UART: [afmc] --
3,387,451 UART: [cold-reset] --
3,388,243 UART: [state] Locking Datavault
3,389,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,096 UART: [state] Locking ICCM
3,390,668 UART: [exit] Launching FMC @ 0x40000130
3,395,997 UART:
3,396,013 UART: Running Caliptra FMC ...
3,396,421 UART:
3,396,475 UART: [state] CFI Enabled
3,407,013 UART: [fht] FMC Alias Private Key: 7
3,515,297 UART: [art] Extend RT PCRs Done
3,515,725 UART: [art] Lock RT PCRs Done
3,517,185 UART: [art] Populate DV Done
3,525,395 UART: [fht] FMC Alias Private Key: 7
3,526,441 UART: [art] Derive CDI
3,526,721 UART: [art] Store in in slot 0x4
3,612,844 UART: [art] Derive Key Pair
3,613,204 UART: [art] Store priv key in slot 0x5
3,625,914 UART: [art] Derive Key Pair - Done
3,640,339 UART: [art] Signing Cert with AUTHO
3,640,819 UART: RITY.KEYID = 7
3,656,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,870 UART: [art] PUB.X = B274B57A384F95A90D305338AC06A02BFAE9D4490E2AE8C3B684926B695D17C0D98B2CA2D01DC278920E673C3C1EC677
3,663,634 UART: [art] PUB.Y = 010164C431E5F0AF09595E57911E696D57B51928F2D6CC849F85CD4EAE3C832DC31BD06BD606924F80F1B23735B635E7
3,670,572 UART: [art] SIG.R = E495C6C4246BBD496ED1975CFCA36A876C09452A7A7351AA5AFCC4C9A8E09D5C5F70629B380BF4FE08EBDF81804BE3D8
3,677,351 UART: [art] SIG.S = DF7D38C49B60A9CE45B1797E698ED244773689F978A94620113432B2A936539A66D9F3E1C38834FAB77610F3CEF8307B
3,700,804 UART: Caliptra RT
3,701,057 UART: [state] CFI Enabled
3,808,160 UART: [rt] RT listening for mailbox commands...
3,808,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,634 UART: [rt]cmd =0x41544d4e, len=14344
4,219,345 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,016 ready_for_fw is high
1,056,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,301 >>> mbox cmd response: success
3,226,196 UART:
3,226,212 UART: Running Caliptra FMC ...
3,226,620 UART:
3,226,674 UART: [state] CFI Enabled
3,237,034 UART: [fht] FMC Alias Private Key: 7
3,345,290 UART: [art] Extend RT PCRs Done
3,345,718 UART: [art] Lock RT PCRs Done
3,347,090 UART: [art] Populate DV Done
3,355,242 UART: [fht] FMC Alias Private Key: 7
3,356,346 UART: [art] Derive CDI
3,356,626 UART: [art] Store in in slot 0x4
3,442,291 UART: [art] Derive Key Pair
3,442,651 UART: [art] Store priv key in slot 0x5
3,455,679 UART: [art] Derive Key Pair - Done
3,470,988 UART: [art] Signing Cert with AUTHO
3,471,468 UART: RITY.KEYID = 7
3,486,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,901 UART: [art] PUB.X = 7D24277CC128DBA911E0E5929BB015AA5ADC55C91AE9146326E2122D945673429F7A6C275A551BA7BB35E110A81558D1
3,493,671 UART: [art] PUB.Y = 0A2F7FABCC22A934AD132176D56F8E5866C1407676CADD43D51E1732B7E8392405BF85733BD26E7F214E59E9846A90FE
3,500,619 UART: [art] SIG.R = 38BEA5BDFA9ADEA294954E0EB5DB8B8FA6438C544BFF133AB5299FCF809CC81043CA4F5D7EE50F099EBEA89BB1C7ADF5
3,507,412 UART: [art] SIG.S = 3CECE583E47052EAE21EFD392C5E0CA646CD1DF62BA569B4E1C5459F7424EE2E88667736824029E4A3FDCF99D4200C76
3,531,565 UART: Caliptra RT
3,531,818 UART: [state] CFI Enabled
3,639,971 UART: [rt] RT listening for mailbox commands...
3,640,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,535 UART: [rt]cmd =0x41544d4e, len=14344
4,056,402 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,255 UART: [kat] SHA2-256
891,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,934 UART: [kat] ++
896,086 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,174,200 ready_for_fw is high
1,174,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,208 UART: [fwproc] Recv command 0x46574c44
1,282,941 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,310,165 >>> mbox cmd response: success
3,311,376 UART: [afmc] ++
3,311,544 UART: [afmc] CDI.KEYID = 6
3,311,907 UART: [afmc] SUBJECT.KEYID = 7
3,312,333 UART: [afmc] AUTHORITY.KEYID = 5
3,348,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,266 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,976 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,866 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,577 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,353 UART: [afmc] --
3,391,333 UART: [cold-reset] --
3,392,087 UART: [state] Locking Datavault
3,393,182 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,786 UART: [state] Locking ICCM
3,394,338 UART: [exit] Launching FMC @ 0x40000130
3,399,667 UART:
3,399,683 UART: Running Caliptra FMC ...
3,400,091 UART:
3,400,234 UART: [state] CFI Enabled
3,410,578 UART: [fht] FMC Alias Private Key: 7
3,518,260 UART: [art] Extend RT PCRs Done
3,518,688 UART: [art] Lock RT PCRs Done
3,520,196 UART: [art] Populate DV Done
3,528,464 UART: [fht] FMC Alias Private Key: 7
3,529,538 UART: [art] Derive CDI
3,529,818 UART: [art] Store in in slot 0x4
3,615,733 UART: [art] Derive Key Pair
3,616,093 UART: [art] Store priv key in slot 0x5
3,629,451 UART: [art] Derive Key Pair - Done
3,643,989 UART: [art] Signing Cert with AUTHO
3,644,469 UART: RITY.KEYID = 7
3,659,421 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,186 UART: [art] PUB.X = 36023924ACC15239B86CA534063BB8646542A7DF49868C55C4C227A75BB9F571EF11F64667723254151421D062DE6A49
3,666,938 UART: [art] PUB.Y = 5BFC7528AA6BC97D03D83FD46A496995CCD97AF82185ACE6022CAF35571ACFC11CC585693E0E39CBEFCAFDC756ED0568
3,673,898 UART: [art] SIG.R = 0A95AF2B4F9EAFDC3FA82B9699484689034BB8F614DFFE13649529D0ACBA16833073C510D6FDB7B69B6C4881975433CD
3,680,670 UART: [art] SIG.S = D1DB849B5C52776463AFF6EE98D087A205C68EC4814C1150112DE9D653E72AAE9515FC87BE9DCACD577579493B26B970
3,704,482 UART: Caliptra RT
3,704,827 UART: [state] CFI Enabled
3,812,289 UART: [rt] RT listening for mailbox commands...
3,812,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,163 UART: [rt]cmd =0x41544d4e, len=14344
4,216,889 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 ready_for_fw is high
1,056,273 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,826 >>> mbox cmd response: success
3,233,691 UART:
3,233,707 UART: Running Caliptra FMC ...
3,234,115 UART:
3,234,258 UART: [state] CFI Enabled
3,244,580 UART: [fht] FMC Alias Private Key: 7
3,352,104 UART: [art] Extend RT PCRs Done
3,352,532 UART: [art] Lock RT PCRs Done
3,353,960 UART: [art] Populate DV Done
3,362,350 UART: [fht] FMC Alias Private Key: 7
3,363,312 UART: [art] Derive CDI
3,363,592 UART: [art] Store in in slot 0x4
3,448,909 UART: [art] Derive Key Pair
3,449,269 UART: [art] Store priv key in slot 0x5
3,462,567 UART: [art] Derive Key Pair - Done
3,477,368 UART: [art] Signing Cert with AUTHO
3,477,848 UART: RITY.KEYID = 7
3,492,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,743 UART: [art] PUB.X = D198BB2C48285DC60CC1B2D7EB919A9D4FED841F5AFC0B55A3B583F0BB603BFD495FA310EB5DAB06FB44BA5F364F23AC
3,500,532 UART: [art] PUB.Y = E5C781A37EDBD0640148F949011182573428F14820F78E86730B43EF376AAE8720CAD044DF12E3DAE6365C8AD9F9CABF
3,507,479 UART: [art] SIG.R = 2E271493E5CAD05AC132F63CB4DEE41336D478A670DB86D74A837A5F6228FE4842637D0C9E99FBCC90F5BB682BC103EF
3,514,255 UART: [art] SIG.S = A32FE8C06FA8EA3CB609B4BD1A9DE3C6261A12373471411202DAA3FEC389EBEFAEB8A027FC381EAE9BBF91919D948E2C
3,537,786 UART: Caliptra RT
3,538,131 UART: [state] CFI Enabled
3,646,517 UART: [rt] RT listening for mailbox commands...
3,647,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,037 UART: [rt]cmd =0x41544d4e, len=14344
4,053,026 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,192 UART:
192,562 UART: Running Caliptra ROM ...
193,661 UART:
193,805 UART: [state] CFI Enabled
261,058 UART: [state] LifecycleState = Unprovisioned
263,114 UART: [state] DebugLocked = No
264,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,280 UART: [kat] SHA2-256
438,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,464 UART: [kat] ++
449,912 UART: [kat] sha1
460,975 UART: [kat] SHA2-256
463,636 UART: [kat] SHA2-384
469,915 UART: [kat] SHA2-512-ACC
472,237 UART: [kat] ECC-384
2,766,787 UART: [kat] HMAC-384Kdf
2,798,426 UART: [kat] LMS
3,988,688 UART: [kat] --
3,995,463 UART: [cold-reset] ++
3,998,033 UART: [fht] Storing FHT @ 0x50003400
4,008,810 UART: [idev] ++
4,009,447 UART: [idev] CDI.KEYID = 6
4,010,414 UART: [idev] SUBJECT.KEYID = 7
4,011,598 UART: [idev] UDS.KEYID = 0
4,012,663 ready_for_fw is high
4,012,860 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,931 UART: [idev] Erasing UDS.KEYID = 0
7,345,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,236 UART: [idev] --
7,369,903 UART: [ldev] ++
7,370,493 UART: [ldev] CDI.KEYID = 6
7,371,378 UART: [ldev] SUBJECT.KEYID = 5
7,372,641 UART: [ldev] AUTHORITY.KEYID = 7
7,373,873 UART: [ldev] FE.KEYID = 1
7,422,716 UART: [ldev] Erasing FE.KEYID = 1
10,754,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,751 UART: [ldev] --
13,115,039 UART: [fwproc] Waiting for Commands...
13,117,728 UART: [fwproc] Received command 0x46574c44
13,119,967 UART: [fwproc] Received Image of size 113760 bytes
17,162,072 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,623,927 >>> mbox cmd response: success
17,628,779 UART: [afmc] ++
17,629,385 UART: [afmc] CDI.KEYID = 6
17,630,303 UART: [afmc] SUBJECT.KEYID = 7
17,631,521 UART: [afmc] AUTHORITY.KEYID = 5
20,988,093 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,893 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,333 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,134 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,592 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,464 UART: [afmc] --
23,360,090 UART: [cold-reset] --
23,365,193 UART: [state] Locking Datavault
23,370,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,318 UART: [state] Locking ICCM
23,373,873 UART: [exit] Launching FMC @ 0x40000130
23,382,233 UART:
23,382,532 UART: Running Caliptra FMC ...
23,383,647 UART:
23,383,810 UART: [state] CFI Enabled
23,447,750 UART: [fht] FMC Alias Private Key: 7
25,785,679 UART: [art] Extend RT PCRs Done
25,786,891 UART: [art] Lock RT PCRs Done
25,788,806 UART: [art] Populate DV Done
25,793,995 UART: [fht] FMC Alias Private Key: 7
25,795,639 UART: [art] Derive CDI
25,796,452 UART: [art] Store in in slot 0x4
25,855,919 UART: [art] Derive Key Pair
25,856,918 UART: [art] Store priv key in slot 0x5
29,149,609 UART: [art] Derive Key Pair - Done
29,162,796 UART: [art] Signing Cert with AUTHO
29,164,108 UART: RITY.KEYID = 7
31,450,513 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,021 UART: [art] PUB.X = D7B5F9BC8297C7486CA2410C7C31D64E1131E9B259F35B5D27D8C1E0ACD929575F6D415B1308D7AFCF1A6DEE6A7E42DB
31,459,265 UART: [art] PUB.Y = 54B82B54B0C51065947558AB7C7129E220E6C895F890B245937B051FBABA932BBA74F5888CB3F042388D96C9C4EE5686
31,466,529 UART: [art] SIG.R = 9A609DC738E5F7690C9CCC4433F0F968B134CE36928C2BA1620AF8F9CC10A4CC57451289D3161297F6AD5A81F4414711
31,473,880 UART: [art] SIG.S = 456B3D6B8AA8230B79B2E002212EFEE360FCC62784E976920AB1067A158F0FEC943395B5D75BFF5EF22E08431D328AD2
32,779,554 UART: Caliptra RT
32,780,267 UART: [state] CFI Enabled
32,939,705 UART: [rt] RT listening for mailbox commands...
32,942,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,097,428 UART: [rt]cmd =0x41544d4e, len=14344
38,397,848 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,806,596 ready_for_fw is high
3,806,986 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,351 >>> mbox cmd response: success
23,550,943 UART:
23,551,349 UART: Running Caliptra FMC ...
23,552,561 UART:
23,552,737 UART: [state] CFI Enabled
23,620,063 UART: [fht] FMC Alias Private Key: 7
25,958,138 UART: [art] Extend RT PCRs Done
25,959,368 UART: [art] Lock RT PCRs Done
25,960,837 UART: [art] Populate DV Done
25,966,411 UART: [fht] FMC Alias Private Key: 7
25,967,959 UART: [art] Derive CDI
25,968,723 UART: [art] Store in in slot 0x4
26,029,332 UART: [art] Derive Key Pair
26,030,401 UART: [art] Store priv key in slot 0x5
29,323,127 UART: [art] Derive Key Pair - Done
29,335,862 UART: [art] Signing Cert with AUTHO
29,337,164 UART: RITY.KEYID = 7
31,625,225 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,728 UART: [art] PUB.X = CFAFEA075D9CA103A873384245768BFEC105C81EDA4BC63433C10D53BBFEEE4C60BF9FE4EC6416E697C97F1BF45FE166
31,633,992 UART: [art] PUB.Y = 4CB2D23A13A6422E17456114FF319FE2B0CEE4A2E15BB1C4BFA0C1C5A5E82D099A2E72763EA052D9F6DE4045C4B5EAEF
31,641,280 UART: [art] SIG.R = 95E7780C079EA4082F0B1D0B2EFB30C6A2BE21D5ED75C45182720211074F252B123D1C7E913EF175E7B4D4657A4EFA10
31,648,640 UART: [art] SIG.S = 4DE847DE46C6248D4A803C53BF889211D35102BED0527D471FAF9FA7BD103D6E543CC3B836AA214956666C36C3280B59
32,953,267 UART: Caliptra RT
32,953,962 UART: [state] CFI Enabled
33,116,508 UART: [rt] RT listening for mailbox commands...
33,118,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,274,062 UART: [rt]cmd =0x41544d4e, len=14344
38,574,839 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,118 writing to cptra_bootfsm_go
193,208 UART:
194,260 UART: Running Caliptra ROM ...
195,477 UART:
604,543 UART: [state] CFI Enabled
620,895 UART: [state] LifecycleState = Unprovisioned
622,851 UART: [state] DebugLocked = No
624,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,819 UART: [kat] SHA2-256
799,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,152 UART: [kat] ++
810,652 UART: [kat] sha1
822,090 UART: [kat] SHA2-256
824,797 UART: [kat] SHA2-384
829,964 UART: [kat] SHA2-512-ACC
832,345 UART: [kat] ECC-384
3,116,854 UART: [kat] HMAC-384Kdf
3,128,019 UART: [kat] LMS
4,318,162 UART: [kat] --
4,323,450 UART: [cold-reset] ++
4,325,185 UART: [fht] Storing FHT @ 0x50003400
4,336,161 UART: [idev] ++
4,336,728 UART: [idev] CDI.KEYID = 6
4,337,756 UART: [idev] SUBJECT.KEYID = 7
4,338,926 UART: [idev] UDS.KEYID = 0
4,340,041 ready_for_fw is high
4,340,285 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,455 UART: [idev] Erasing UDS.KEYID = 0
7,622,945 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,196 UART: [idev] --
7,649,697 UART: [ldev] ++
7,650,266 UART: [ldev] CDI.KEYID = 6
7,651,239 UART: [ldev] SUBJECT.KEYID = 5
7,652,445 UART: [ldev] AUTHORITY.KEYID = 7
7,653,748 UART: [ldev] FE.KEYID = 1
7,664,478 UART: [ldev] Erasing FE.KEYID = 1
10,947,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,343 UART: [ldev] --
13,309,121 UART: [fwproc] Waiting for Commands...
13,311,163 UART: [fwproc] Received command 0x46574c44
13,313,397 UART: [fwproc] Received Image of size 113760 bytes
17,355,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,428,840 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,497,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,812,988 >>> mbox cmd response: success
17,816,583 UART: [afmc] ++
17,817,230 UART: [afmc] CDI.KEYID = 6
17,818,140 UART: [afmc] SUBJECT.KEYID = 7
17,819,352 UART: [afmc] AUTHORITY.KEYID = 5
21,133,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,429,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,431,859 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,446,319 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,461,074 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,475,552 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,497,688 UART: [afmc] --
23,501,825 UART: [cold-reset] --
23,504,394 UART: [state] Locking Datavault
23,509,263 UART: [state] Locking PCR0, PCR1 and PCR31
23,511,015 UART: [state] Locking ICCM
23,512,200 UART: [exit] Launching FMC @ 0x40000130
23,520,577 UART:
23,520,891 UART: Running Caliptra FMC ...
23,522,001 UART:
23,522,169 UART: [state] CFI Enabled
23,530,244 UART: [fht] FMC Alias Private Key: 7
25,860,239 UART: [art] Extend RT PCRs Done
25,861,979 UART: [art] Lock RT PCRs Done
25,863,312 UART: [art] Populate DV Done
25,868,963 UART: [fht] FMC Alias Private Key: 7
25,870,444 UART: [art] Derive CDI
25,871,220 UART: [art] Store in in slot 0x4
25,914,456 UART: [art] Derive Key Pair
25,915,465 UART: [art] Store priv key in slot 0x5
29,157,067 UART: [art] Derive Key Pair - Done
29,170,197 UART: [art] Signing Cert with AUTHO
29,171,542 UART: RITY.KEYID = 7
31,451,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,130 UART: [art] PUB.X = 6643D34DF92AB3EB3B65054FB6E203BE37EFCAB93FD8BFE0E6907F55C9BB3F0055E08EF6C570793C4E777078778123F9
31,459,944 UART: [art] PUB.Y = 90860E0C6D11173DC10A4525296A0AFC3BCCFCDB7EB87AF3088D5DBF4E5A3B15393C609F7BC1259E566110A9F95C5134
31,467,146 UART: [art] SIG.R = B25710293C0E51886A0A78C0942F6F4FB8F9C604652E9908D84ADF5AC0D21766D476FCFC8E8DBA2D8C62FADC27EE7D72
31,474,578 UART: [art] SIG.S = 0E3EBD0E2518B2A75476895935DF5C8D085BBAD4566CA33F828D16CF034F108511F6953D112E0BB1CA053431BF137A4B
32,779,238 UART: Caliptra RT
32,780,318 UART: [state] CFI Enabled
32,897,374 UART: [rt] RT listening for mailbox commands...
32,899,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,055,169 UART: [rt]cmd =0x41544d4e, len=14344
38,355,329 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
4,131,040 ready_for_fw is high
4,131,456 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,221 >>> mbox cmd response: success
23,706,314 UART:
23,706,700 UART: Running Caliptra FMC ...
23,707,817 UART:
23,707,975 UART: [state] CFI Enabled
23,715,849 UART: [fht] FMC Alias Private Key: 7
26,046,067 UART: [art] Extend RT PCRs Done
26,047,296 UART: [art] Lock RT PCRs Done
26,048,900 UART: [art] Populate DV Done
26,054,149 UART: [fht] FMC Alias Private Key: 7
26,055,701 UART: [art] Derive CDI
26,056,467 UART: [art] Store in in slot 0x4
26,099,273 UART: [art] Derive Key Pair
26,100,296 UART: [art] Store priv key in slot 0x5
29,341,772 UART: [art] Derive Key Pair - Done
29,354,779 UART: [art] Signing Cert with AUTHO
29,356,087 UART: RITY.KEYID = 7
31,635,128 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,647 UART: [art] PUB.X = 7AD2DEE5973CF98FA6C54A29DB9D0506A3D89F1ECAFF0468CAAACA7E680BAF751E1F118EC752840B3C6BD7F72B5D4693
31,643,966 UART: [art] PUB.Y = EEB61C804831E6043DDDCF108BB57C4399491BDB54DA421A795D65B79B9B331A63EE70C07D6E9F9B6579165CACABE213
31,651,176 UART: [art] SIG.R = 12C7958BBE17F8B65CA9DCE6111A50855F8E7FC4230D880A805BD264C7F6DD07F5C80E0D30CE0D4B435D81F06BBD59AF
31,658,616 UART: [art] SIG.S = C822D775DDF9A0009436A62B59BC96F01F71F0AF08A0E9B88A4A103980525C47985A515BAD40A75A9D24311A53CBEA94
32,963,783 UART: Caliptra RT
32,964,497 UART: [state] CFI Enabled
33,081,527 UART: [rt] RT listening for mailbox commands...
33,083,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,239,230 UART: [rt]cmd =0x41544d4e, len=14344
38,539,940 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
192,647 UART:
193,014 UART: Running Caliptra ROM ...
194,140 UART:
194,290 UART: [state] CFI Enabled
263,489 UART: [state] LifecycleState = Unprovisioned
265,320 UART: [state] DebugLocked = No
267,558 UART: [state] WD Timer not started. Device not locked for debugging
272,027 UART: [kat] SHA2-256
451,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,729 UART: [kat] ++
463,286 UART: [kat] sha1
474,166 UART: [kat] SHA2-256
477,176 UART: [kat] SHA2-384
483,372 UART: [kat] SHA2-512-ACC
486,297 UART: [kat] ECC-384
2,950,054 UART: [kat] HMAC-384Kdf
2,972,233 UART: [kat] LMS
3,501,632 UART: [kat] --
3,504,982 UART: [cold-reset] ++
3,506,622 UART: [fht] FHT @ 0x50003400
3,517,246 UART: [idev] ++
3,517,805 UART: [idev] CDI.KEYID = 6
3,518,711 UART: [idev] SUBJECT.KEYID = 7
3,519,952 UART: [idev] UDS.KEYID = 0
3,520,870 ready_for_fw is high
3,521,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,669 UART: [idev] Erasing UDS.KEYID = 0
6,026,528 UART: [idev] Sha1 KeyId Algorithm
6,048,421 UART: [idev] --
6,051,608 UART: [ldev] ++
6,052,191 UART: [ldev] CDI.KEYID = 6
6,053,079 UART: [ldev] SUBJECT.KEYID = 5
6,054,293 UART: [ldev] AUTHORITY.KEYID = 7
6,055,522 UART: [ldev] FE.KEYID = 1
6,099,836 UART: [ldev] Erasing FE.KEYID = 1
8,604,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,900 UART: [ldev] --
10,409,699 UART: [fwproc] Wait for Commands...
10,411,587 UART: [fwproc] Recv command 0x46574c44
10,413,676 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,636 >>> mbox cmd response: success
14,285,370 UART: [afmc] ++
14,285,964 UART: [afmc] CDI.KEYID = 6
14,287,045 UART: [afmc] SUBJECT.KEYID = 7
14,288,103 UART: [afmc] AUTHORITY.KEYID = 5
16,824,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,323 UART: [afmc] --
18,625,600 UART: [cold-reset] --
18,628,211 UART: [state] Locking Datavault
18,632,978 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,622 UART: [state] Locking ICCM
18,637,310 UART: [exit] Launching FMC @ 0x40000130
18,645,761 UART:
18,645,993 UART: Running Caliptra FMC ...
18,647,089 UART:
18,647,248 UART: [state] CFI Enabled
18,710,007 UART: [fht] FMC Alias Private Key: 7
20,473,653 UART: [art] Extend RT PCRs Done
20,474,851 UART: [art] Lock RT PCRs Done
20,476,735 UART: [art] Populate DV Done
20,482,134 UART: [fht] FMC Alias Private Key: 7
20,483,772 UART: [art] Derive CDI
20,484,599 UART: [art] Store in in slot 0x4
20,543,149 UART: [art] Derive Key Pair
20,544,184 UART: [art] Store priv key in slot 0x5
23,007,347 UART: [art] Derive Key Pair - Done
23,020,400 UART: [art] Signing Cert with AUTHO
23,021,709 UART: RITY.KEYID = 7
24,732,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,439 UART: [art] PUB.X = 48B2D355DA1845F8DB8A530C03CE40E4F49992FF8525C192BFCA38E39EAA7E5BA4BF8848E866E9DB98D9176F3B19D021
24,741,709 UART: [art] PUB.Y = 53325DCA2B1ECF63E4DD5C3B05A45925532F909757693CBACAA2ECFFBE6B21416C86A21544CBD047726F0E87D80D921B
24,748,976 UART: [art] SIG.R = 9EC84E603CCFDA7558DC64CD9DA3E2F0AD00B58579450D0F4094F32FE2FD0091FACB893D82E6AAF57FBD791B7F6F751C
24,756,358 UART: [art] SIG.S = 002FCC196E3316464307C2D8CB158A96F2BA9E576110FF0375A9BC2FA41528775352FD85B55BEAEC120261088820E3C8
25,735,035 UART: Caliptra RT
25,735,750 UART: [state] CFI Enabled
25,901,672 UART: [rt] RT listening for mailbox commands...
25,903,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,067 UART: [rt]cmd =0x41544d4e, len=14344
30,054,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
3,381,226 ready_for_fw is high
3,381,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,089,442 >>> mbox cmd response: success
18,383,507 UART:
18,383,895 UART: Running Caliptra FMC ...
18,385,007 UART:
18,385,166 UART: [state] CFI Enabled
18,452,239 UART: [fht] FMC Alias Private Key: 7
20,215,917 UART: [art] Extend RT PCRs Done
20,217,118 UART: [art] Lock RT PCRs Done
20,218,981 UART: [art] Populate DV Done
20,224,392 UART: [fht] FMC Alias Private Key: 7
20,225,892 UART: [art] Derive CDI
20,226,638 UART: [art] Store in in slot 0x4
20,284,650 UART: [art] Derive Key Pair
20,285,646 UART: [art] Store priv key in slot 0x5
22,748,643 UART: [art] Derive Key Pair - Done
22,761,377 UART: [art] Signing Cert with AUTHO
22,762,698 UART: RITY.KEYID = 7
24,475,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,674 UART: [art] PUB.X = 8CD3BD360896DC7AE6902BDBAAF2EC22187744DA09DC082E7D78DDEB811451BE62AB3C8E47CFD24CE7D89DFE20303FEA
24,483,952 UART: [art] PUB.Y = 0E4764B4A753731BC4C21DA4E1EE91C47CEF8B2FCE94CD4A5948AD1F3A49170E0FA3BD17E5BBEF98F8512E1E3233CA95
24,491,252 UART: [art] SIG.R = 80A2709DE67FD20D4DD0805E791D08AC7258462E2CD9632909479F0F60A183A226A30A04D6D6F4082B1DDA4E8646416B
24,498,630 UART: [art] SIG.S = C4E781E6E937C75D652BF501D190D53F54EEF5ED61FB1EC9DDB8DD809C337F950A270B74A8FA4C5A00E570C77061497B
25,477,505 UART: Caliptra RT
25,478,194 UART: [state] CFI Enabled
25,642,818 UART: [rt] RT listening for mailbox commands...
25,645,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,801,203 UART: [rt]cmd =0x41544d4e, len=14344
29,796,750 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
192,995 UART:
193,411 UART: Running Caliptra ROM ...
194,545 UART:
603,867 UART: [state] CFI Enabled
617,385 UART: [state] LifecycleState = Unprovisioned
619,254 UART: [state] DebugLocked = No
621,569 UART: [state] WD Timer not started. Device not locked for debugging
625,125 UART: [kat] SHA2-256
804,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,813 UART: [kat] ++
816,351 UART: [kat] sha1
827,304 UART: [kat] SHA2-256
830,324 UART: [kat] SHA2-384
835,697 UART: [kat] SHA2-512-ACC
838,673 UART: [kat] ECC-384
3,281,208 UART: [kat] HMAC-384Kdf
3,295,215 UART: [kat] LMS
3,824,725 UART: [kat] --
3,827,395 UART: [cold-reset] ++
3,829,050 UART: [fht] FHT @ 0x50003400
3,839,818 UART: [idev] ++
3,840,382 UART: [idev] CDI.KEYID = 6
3,841,290 UART: [idev] SUBJECT.KEYID = 7
3,842,465 UART: [idev] UDS.KEYID = 0
3,843,387 ready_for_fw is high
3,843,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,873 UART: [idev] Erasing UDS.KEYID = 0
6,310,818 UART: [idev] Sha1 KeyId Algorithm
6,335,391 UART: [idev] --
6,339,059 UART: [ldev] ++
6,339,630 UART: [ldev] CDI.KEYID = 6
6,340,538 UART: [ldev] SUBJECT.KEYID = 5
6,341,749 UART: [ldev] AUTHORITY.KEYID = 7
6,343,001 UART: [ldev] FE.KEYID = 1
6,353,172 UART: [ldev] Erasing FE.KEYID = 1
8,825,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,554 UART: [ldev] --
10,615,753 UART: [fwproc] Wait for Commands...
10,618,176 UART: [fwproc] Recv command 0x46574c44
10,620,273 UART: [fwproc] Recv'd Img size: 114084 bytes
14,020,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,478,840 >>> mbox cmd response: success
14,483,352 UART: [afmc] ++
14,483,978 UART: [afmc] CDI.KEYID = 6
14,484,898 UART: [afmc] SUBJECT.KEYID = 7
14,486,011 UART: [afmc] AUTHORITY.KEYID = 5
16,984,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,764 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,760 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,077 UART: [afmc] --
18,782,637 UART: [cold-reset] --
18,785,696 UART: [state] Locking Datavault
18,791,107 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,756 UART: [state] Locking ICCM
18,794,581 UART: [exit] Launching FMC @ 0x40000130
18,802,977 UART:
18,803,241 UART: Running Caliptra FMC ...
18,804,296 UART:
18,804,451 UART: [state] CFI Enabled
18,812,819 UART: [fht] FMC Alias Private Key: 7
20,569,964 UART: [art] Extend RT PCRs Done
20,571,175 UART: [art] Lock RT PCRs Done
20,573,094 UART: [art] Populate DV Done
20,578,185 UART: [fht] FMC Alias Private Key: 7
20,579,831 UART: [art] Derive CDI
20,580,649 UART: [art] Store in in slot 0x4
20,623,252 UART: [art] Derive Key Pair
20,624,291 UART: [art] Store priv key in slot 0x5
23,050,285 UART: [art] Derive Key Pair - Done
23,063,607 UART: [art] Signing Cert with AUTHO
23,064,916 UART: RITY.KEYID = 7
24,770,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,618 UART: [art] PUB.X = C9FB95D4D3305B91B3AA0357E24C940C4E7B6DFB25D4DB5AE445CCBA566B901FF9D72CD567F490A358E7205A36B4AAC8
24,778,895 UART: [art] PUB.Y = 8DC2B28881F6F942D0E2DABD4B2D0D778FFE58AF807409BFF5E7B32C06AE72A379AC916B637742EEE56C4CE3ECD2FBF1
24,786,155 UART: [art] SIG.R = 61CC5DA86D3412B1DC9EC10E609EFED8F6233DD5737B128E5209E46302A33788BCD984CC118D6395C423674449F2838D
24,793,523 UART: [art] SIG.S = F4C3B5E72C596F268DECBC861CA4D1DF1CF5F10976609EE6D56072F92F2E14D7EE85A3D344A3483F27EAC8B32E2D987C
25,772,680 UART: Caliptra RT
25,773,369 UART: [state] CFI Enabled
25,890,970 UART: [rt] RT listening for mailbox commands...
25,893,303 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,048,647 UART: [rt]cmd =0x41544d4e, len=14344
30,044,039 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
3,700,869 ready_for_fw is high
3,701,436 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,388 >>> mbox cmd response: success
18,514,605 UART:
18,515,008 UART: Running Caliptra FMC ...
18,516,209 UART:
18,516,380 UART: [state] CFI Enabled
18,524,350 UART: [fht] FMC Alias Private Key: 7
20,281,373 UART: [art] Extend RT PCRs Done
20,282,593 UART: [art] Lock RT PCRs Done
20,284,388 UART: [art] Populate DV Done
20,289,892 UART: [fht] FMC Alias Private Key: 7
20,291,608 UART: [art] Derive CDI
20,292,424 UART: [art] Store in in slot 0x4
20,335,179 UART: [art] Derive Key Pair
20,336,180 UART: [art] Store priv key in slot 0x5
22,762,779 UART: [art] Derive Key Pair - Done
22,775,788 UART: [art] Signing Cert with AUTHO
22,777,093 UART: RITY.KEYID = 7
24,482,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,973 UART: [art] PUB.X = 1B576C020DE75C22CCB0E585A96C7183FF175E4BF60EDAEA2A0A09708E9A57B1538103E225F4457D265170750BBF3D6B
24,491,261 UART: [art] PUB.Y = 48439BE6B4BD683F6007EE9E8BC1E191C279B68AFDE705B01949E9F7FBC6EB2DA8E963049C70DC51C415AC526C89D9AE
24,498,534 UART: [art] SIG.R = F11E12459534F5DDE4FF1C8426BF80C36469A54E14EAA3BA9773F286B5A95F3385DC1D8BBAB7FBF1D2C5F700B69CF1D6
24,505,947 UART: [art] SIG.S = 0304CD5AD4F0A636C24CF34A8A9B3115B0B72631BBAF282EF0628C2F6F3B0D7628C1732793BDE60C71C7C818CFBC2EB9
25,484,609 UART: Caliptra RT
25,485,314 UART: [state] CFI Enabled
25,602,326 UART: [rt] RT listening for mailbox commands...
25,604,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,760,265 UART: [rt]cmd =0x41544d4e, len=14344
29,756,022 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,489 writing to cptra_bootfsm_go
192,556 UART:
192,986 UART: Running Caliptra ROM ...
194,138 UART:
194,284 UART: [state] CFI Enabled
263,633 UART: [state] LifecycleState = Unprovisioned
266,052 UART: [state] DebugLocked = No
267,896 UART: [state] WD Timer not started. Device not locked for debugging
272,014 UART: [kat] SHA2-256
461,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,692 UART: [kat] ++
473,147 UART: [kat] sha1
484,374 UART: [kat] SHA2-256
487,380 UART: [kat] SHA2-384
492,655 UART: [kat] SHA2-512-ACC
495,234 UART: [kat] ECC-384
2,944,817 UART: [kat] HMAC-384Kdf
2,970,272 UART: [kat] LMS
3,502,037 UART: [kat] --
3,505,759 UART: [cold-reset] ++
3,507,338 UART: [fht] FHT @ 0x50003400
3,518,457 UART: [idev] ++
3,519,161 UART: [idev] CDI.KEYID = 6
3,520,157 UART: [idev] SUBJECT.KEYID = 7
3,521,329 UART: [idev] UDS.KEYID = 0
3,522,250 ready_for_fw is high
3,522,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,028 UART: [idev] Erasing UDS.KEYID = 0
6,027,833 UART: [idev] Sha1 KeyId Algorithm
6,050,050 UART: [idev] --
6,054,698 UART: [ldev] ++
6,055,378 UART: [ldev] CDI.KEYID = 6
6,056,308 UART: [ldev] SUBJECT.KEYID = 5
6,057,734 UART: [ldev] AUTHORITY.KEYID = 7
6,058,933 UART: [ldev] FE.KEYID = 1
6,099,119 UART: [ldev] Erasing FE.KEYID = 1
8,609,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,493 UART: [ldev] --
10,414,548 UART: [fwproc] Wait for Commands...
10,416,366 UART: [fwproc] Recv command 0x46574c44
10,418,671 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,594,903 >>> mbox cmd response: success
14,598,991 UART: [afmc] ++
14,599,714 UART: [afmc] CDI.KEYID = 6
14,600,910 UART: [afmc] SUBJECT.KEYID = 7
14,602,351 UART: [afmc] AUTHORITY.KEYID = 5
17,128,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,053 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,368 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,674 UART: [afmc] --
18,926,086 UART: [cold-reset] --
18,929,950 UART: [state] Locking Datavault
18,934,620 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,773 UART: [state] Locking ICCM
18,939,679 UART: [exit] Launching FMC @ 0x40000130
18,948,395 UART:
18,948,632 UART: Running Caliptra FMC ...
18,949,664 UART:
18,949,812 UART: [state] CFI Enabled
19,008,378 UART: [fht] FMC Alias Private Key: 7
20,772,125 UART: [art] Extend RT PCRs Done
20,773,360 UART: [art] Lock RT PCRs Done
20,775,011 UART: [art] Populate DV Done
20,780,264 UART: [fht] FMC Alias Private Key: 7
20,781,785 UART: [art] Derive CDI
20,782,553 UART: [art] Store in in slot 0x4
20,840,560 UART: [art] Derive Key Pair
20,841,555 UART: [art] Store priv key in slot 0x5
23,304,528 UART: [art] Derive Key Pair - Done
23,317,411 UART: [art] Signing Cert with AUTHO
23,318,706 UART: RITY.KEYID = 7
25,029,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,351 UART: [art] PUB.X = B3D64EFAE21A20464D602FD85DD30AC0CF515C35E3A059AF0B71E8A2AAC40854C4795797C54AE80A8BCB2FE9A386CB20
25,038,680 UART: [art] PUB.Y = 5FB9A9A09D7BA8343670D1DEE0822EB26A326A276540838620C16BD7AC754F193BF2647202061AB060049E6DAFA74FB2
25,045,937 UART: [art] SIG.R = A69DCA4817E2618121802AD822B8C9411013ED072BA0A89E02C6B4FEE299C49AAACD7C8D4C742B7C23D58945F5FCDCB0
25,053,311 UART: [art] SIG.S = 59182AF91FE25FBB248FE5ED1718708F5B49BF959BC78E22AC326C7D47FC9612A756FF5870707077867FE79A4877DDA2
26,032,578 UART: Caliptra RT
26,033,301 UART: [state] CFI Enabled
26,197,855 UART: [rt] RT listening for mailbox commands...
26,200,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,355,563 UART: [rt]cmd =0x41544d4e, len=14344
30,351,403 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,440,489 ready_for_fw is high
3,440,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,784,423 >>> mbox cmd response: success
19,063,976 UART:
19,064,376 UART: Running Caliptra FMC ...
19,065,483 UART:
19,065,639 UART: [state] CFI Enabled
19,132,235 UART: [fht] FMC Alias Private Key: 7
20,896,618 UART: [art] Extend RT PCRs Done
20,897,819 UART: [art] Lock RT PCRs Done
20,899,687 UART: [art] Populate DV Done
20,905,087 UART: [fht] FMC Alias Private Key: 7
20,907,064 UART: [art] Derive CDI
20,907,857 UART: [art] Store in in slot 0x4
20,965,522 UART: [art] Derive Key Pair
20,966,550 UART: [art] Store priv key in slot 0x5
23,429,426 UART: [art] Derive Key Pair - Done
23,442,485 UART: [art] Signing Cert with AUTHO
23,443,793 UART: RITY.KEYID = 7
25,155,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,231 UART: [art] PUB.X = F15DCD12C33E48F5B6A914F5DEB90EE0794B6A99157A30B77B8A94494983C05CABDEB41D589EF1812B4E434547C0D70E
25,164,546 UART: [art] PUB.Y = 202FD42E52D2E0A93B6F998860F925CED3691F2C431D77CDF518431D9A21E5DC5A2EACDFCFD5AABEAA70C279BC085287
25,171,823 UART: [art] SIG.R = BF9764A489482C6AFF5994DD701404E5A0213BD2AC85E8F0BE5DB74A916DB9D0137C4F50ED731E7E77824971375FFCAD
25,179,197 UART: [art] SIG.S = 8FEFD2D4CA689D776A631E62E4822995DD1487C956B88574CA8BCDC540EA89754ED7B53EE50B3AFA378B401393B39A39
26,158,367 UART: Caliptra RT
26,159,067 UART: [state] CFI Enabled
26,324,385 UART: [rt] RT listening for mailbox commands...
26,326,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,481,938 UART: [rt]cmd =0x41544d4e, len=14344
30,477,654 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,976 UART:
193,344 UART: Running Caliptra ROM ...
194,489 UART:
604,305 UART: [state] CFI Enabled
616,268 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
620,845 UART: [state] WD Timer not started. Device not locked for debugging
625,586 UART: [kat] SHA2-256
815,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,261 UART: [kat] ++
826,714 UART: [kat] sha1
838,227 UART: [kat] SHA2-256
841,230 UART: [kat] SHA2-384
846,721 UART: [kat] SHA2-512-ACC
849,313 UART: [kat] ECC-384
3,290,279 UART: [kat] HMAC-384Kdf
3,302,655 UART: [kat] LMS
3,834,518 UART: [kat] --
3,838,878 UART: [cold-reset] ++
3,840,599 UART: [fht] FHT @ 0x50003400
3,851,647 UART: [idev] ++
3,852,292 UART: [idev] CDI.KEYID = 6
3,853,246 UART: [idev] SUBJECT.KEYID = 7
3,854,491 UART: [idev] UDS.KEYID = 0
3,855,412 ready_for_fw is high
3,855,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,678 UART: [idev] Erasing UDS.KEYID = 0
6,332,739 UART: [idev] Sha1 KeyId Algorithm
6,354,938 UART: [idev] --
6,359,311 UART: [ldev] ++
6,359,989 UART: [ldev] CDI.KEYID = 6
6,361,009 UART: [ldev] SUBJECT.KEYID = 5
6,362,121 UART: [ldev] AUTHORITY.KEYID = 7
6,363,297 UART: [ldev] FE.KEYID = 1
6,372,654 UART: [ldev] Erasing FE.KEYID = 1
8,848,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,469 UART: [ldev] --
10,637,091 UART: [fwproc] Wait for Commands...
10,640,109 UART: [fwproc] Recv command 0x46574c44
10,642,427 UART: [fwproc] Recv'd Img size: 114084 bytes
14,079,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,271,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,811,948 >>> mbox cmd response: success
14,816,213 UART: [afmc] ++
14,816,926 UART: [afmc] CDI.KEYID = 6
14,818,124 UART: [afmc] SUBJECT.KEYID = 7
14,819,567 UART: [afmc] AUTHORITY.KEYID = 5
17,323,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,046,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,048,852 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,063,992 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,079,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,094,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,117,532 UART: [afmc] --
19,121,192 UART: [cold-reset] --
19,125,066 UART: [state] Locking Datavault
19,130,279 UART: [state] Locking PCR0, PCR1 and PCR31
19,132,438 UART: [state] Locking ICCM
19,134,979 UART: [exit] Launching FMC @ 0x40000130
19,143,659 UART:
19,143,897 UART: Running Caliptra FMC ...
19,144,998 UART:
19,145,157 UART: [state] CFI Enabled
19,153,364 UART: [fht] FMC Alias Private Key: 7
20,910,527 UART: [art] Extend RT PCRs Done
20,911,751 UART: [art] Lock RT PCRs Done
20,913,269 UART: [art] Populate DV Done
20,918,646 UART: [fht] FMC Alias Private Key: 7
20,920,252 UART: [art] Derive CDI
20,921,072 UART: [art] Store in in slot 0x4
20,963,954 UART: [art] Derive Key Pair
20,964,996 UART: [art] Store priv key in slot 0x5
23,391,420 UART: [art] Derive Key Pair - Done
23,404,093 UART: [art] Signing Cert with AUTHO
23,405,398 UART: RITY.KEYID = 7
25,110,621 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,100 UART: [art] PUB.X = 5BBEB79A2FB4AA7DC78181560528FDC7D492437EA08E993E8540BF5C31CAC6C78D05EB34AD1D628726A586543FCC3CCF
25,119,423 UART: [art] PUB.Y = F75C441B57245DA6A836BC3944A77330A28EB34406DF6CD42CDC136D87CDCE4E717245BEFB100A0F6B888A7969CE5A42
25,126,679 UART: [art] SIG.R = C247260082A6D6915BABE10F3F06ECC1A6A24AD7A2E7EE2B6986731D7D9EB5DBCA46E67F6BD8781366D92BEFDA043C0D
25,134,109 UART: [art] SIG.S = B9DA1CFF5976C1663947446FFE94ECF81372A2001C86B90DE362E315A797BA3FAF81C951E6161A659D9CF996E6C0EC9A
26,112,750 UART: Caliptra RT
26,113,465 UART: [state] CFI Enabled
26,230,915 UART: [rt] RT listening for mailbox commands...
26,233,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,388,481 UART: [rt]cmd =0x41544d4e, len=14344
30,383,593 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
3,755,146 ready_for_fw is high
3,755,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,954,703 >>> mbox cmd response: success
19,205,959 UART:
19,206,364 UART: Running Caliptra FMC ...
19,207,556 UART:
19,207,723 UART: [state] CFI Enabled
19,215,759 UART: [fht] FMC Alias Private Key: 7
20,972,563 UART: [art] Extend RT PCRs Done
20,973,880 UART: [art] Lock RT PCRs Done
20,975,543 UART: [art] Populate DV Done
20,980,987 UART: [fht] FMC Alias Private Key: 7
20,982,556 UART: [art] Derive CDI
20,983,382 UART: [art] Store in in slot 0x4
21,025,946 UART: [art] Derive Key Pair
21,026,997 UART: [art] Store priv key in slot 0x5
23,453,577 UART: [art] Derive Key Pair - Done
23,466,742 UART: [art] Signing Cert with AUTHO
23,468,045 UART: RITY.KEYID = 7
25,173,404 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,907 UART: [art] PUB.X = DE466124E25CBB8CE694D16B3BD50B0FD1CB11710ED2525B5CCF83CC181AD3EECD7956B465EC58E6CEE9BCAD9CFA7564
25,182,203 UART: [art] PUB.Y = 293BC3D38085EE53594E8D635E574E38F6A499BE660526DCFC25134272AA42360AB6D1688968963ACC11F62AEEBB154F
25,189,464 UART: [art] SIG.R = AC900BD53ED2D769BFB41E9A077407E03E4A59DE1A0054C06AEDF24911BB2877EE08DB85BDB248208A62ED4E7B67CF49
25,196,859 UART: [art] SIG.S = 4480D7EA4BAF9874D0876E7AF02F2AE6CEC7CCE2B97EDCA6B6D942DF3A4ABD613973EEE0EEC6A3CD489E7D43F8FC936D
26,176,331 UART: Caliptra RT
26,177,048 UART: [state] CFI Enabled
26,294,631 UART: [rt] RT listening for mailbox commands...
26,296,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,452,130 UART: [rt]cmd =0x41544d4e, len=14344
30,448,508 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,579 UART: [kat] SHA2-256
881,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,625 UART: [kat] ++
885,777 UART: [kat] sha1
889,893 UART: [kat] SHA2-256
891,831 UART: [kat] SHA2-384
894,744 UART: [kat] SHA2-512-ACC
896,645 UART: [kat] ECC-384
902,086 UART: [kat] HMAC-384Kdf
906,600 UART: [kat] LMS
1,474,796 UART: [kat] --
1,475,767 UART: [cold-reset] ++
1,476,229 UART: [fht] Storing FHT @ 0x50003400
1,479,136 UART: [idev] ++
1,479,304 UART: [idev] CDI.KEYID = 6
1,479,664 UART: [idev] SUBJECT.KEYID = 7
1,480,088 UART: [idev] UDS.KEYID = 0
1,480,433 ready_for_fw is high
1,480,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,504,854 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,317 UART: [ldev] ++
1,514,485 UART: [ldev] CDI.KEYID = 6
1,514,848 UART: [ldev] SUBJECT.KEYID = 5
1,515,274 UART: [ldev] AUTHORITY.KEYID = 7
1,515,737 UART: [ldev] FE.KEYID = 1
1,521,179 UART: [ldev] Erasing FE.KEYID = 1
1,546,712 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,840 UART: [ldev] --
1,586,213 UART: [fwproc] Waiting for Commands...
1,586,990 UART: [fwproc] Received command 0x46574c44
1,587,781 UART: [fwproc] Received Image of size 114084 bytes
2,882,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,997 >>> mbox cmd response: success
3,075,129 UART: [afmc] ++
3,075,297 UART: [afmc] CDI.KEYID = 6
3,075,659 UART: [afmc] SUBJECT.KEYID = 7
3,076,084 UART: [afmc] AUTHORITY.KEYID = 5
3,110,929 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,178 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,868 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,757 UART: [afmc] --
3,153,653 UART: [cold-reset] --
3,154,565 UART: [state] Locking Datavault
3,155,758 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,362 UART: [state] Locking ICCM
3,156,924 UART: [exit] Launching FMC @ 0x40000130
3,162,253 UART:
3,162,269 UART: Running Caliptra FMC ...
3,162,677 UART:
3,162,731 UART: [state] CFI Enabled
3,172,988 UART: [fht] FMC Alias Private Key: 7
3,280,969 UART: [art] Extend RT PCRs Done
3,281,397 UART: [art] Lock RT PCRs Done
3,282,637 UART: [art] Populate DV Done
3,290,902 UART: [fht] FMC Alias Private Key: 7
3,292,008 UART: [art] Derive CDI
3,292,288 UART: [art] Store in in slot 0x4
3,378,255 UART: [art] Derive Key Pair
3,378,615 UART: [art] Store priv key in slot 0x5
3,392,355 UART: [art] Derive Key Pair - Done
3,406,959 UART: [art] Signing Cert with AUTHO
3,407,439 UART: RITY.KEYID = 7
3,422,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,974 UART: [art] PUB.X = B846B25BFA7B05292FF337638D4DBD23990663237039B5253EF0EEE87013888E88E94260E4C08AAEE57DE72B0F64EEA7
3,429,739 UART: [art] PUB.Y = 54BD0AA224CE6B1F980782DF453199D3099AC864362F15651B45BEAAAA8B1D38699D9E35F79E1C600B96366C7C43C862
3,436,679 UART: [art] SIG.R = E43082ECF18BA330DB7B1CFA546405791B2957ECB96930BAA86A89587809F900A232FB9A9A76602C752C46E49E93709D
3,443,421 UART: [art] SIG.S = 1BB58CB24EB18F61F2E28EF10E0515D69A9F3C60B5BD3FFF6EC6B5211A79C876258263759C7861FD82FED38E0D153C86
3,467,569 UART: Caliptra RT
3,467,822 UART: [state] CFI Enabled
3,575,215 UART: [rt] RT listening for mailbox commands...
3,575,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,823 UART: [rt]cmd =0x41544d4e, len=14344
4,008,762 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,189 ready_for_fw is high
1,362,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,350 >>> mbox cmd response: success
2,986,930 UART:
2,986,946 UART: Running Caliptra FMC ...
2,987,354 UART:
2,987,408 UART: [state] CFI Enabled
2,998,095 UART: [fht] FMC Alias Private Key: 7
3,106,514 UART: [art] Extend RT PCRs Done
3,106,942 UART: [art] Lock RT PCRs Done
3,108,478 UART: [art] Populate DV Done
3,116,809 UART: [fht] FMC Alias Private Key: 7
3,117,747 UART: [art] Derive CDI
3,118,027 UART: [art] Store in in slot 0x4
3,203,846 UART: [art] Derive Key Pair
3,204,206 UART: [art] Store priv key in slot 0x5
3,217,124 UART: [art] Derive Key Pair - Done
3,232,042 UART: [art] Signing Cert with AUTHO
3,232,522 UART: RITY.KEYID = 7
3,247,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,523 UART: [art] PUB.X = 9CE0CFCFDD1112924C73D8F99EE00A6D0ACCBF0A2CDAF7632A55E0CD58C381C50F0716D76666190C248B4FB462A039A1
3,255,291 UART: [art] PUB.Y = 49F438E2CA69ABE546EC36E27323035E2AC52778268366F82AAA4C7C2F2C1291DCF8F1E9828AAFE15DAC41E49FB6ABBD
3,262,256 UART: [art] SIG.R = B127D187146D2327ECA958705B709A31EA7DB0D47F26E826D449E7DB5766C7B2FE6149B656DC0B8F0DC9E59A4819CBF0
3,269,028 UART: [art] SIG.S = 6597B5B3C5191985544DEE5E1E22CA32199B5DEBF8CFE273DB3F2AF62F758C697DAA9E09B1B7EEE426155ECE660765E0
3,292,307 UART: Caliptra RT
3,292,560 UART: [state] CFI Enabled
3,400,933 UART: [rt] RT listening for mailbox commands...
3,401,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,791 UART: [rt]cmd =0x41544d4e, len=14344
3,834,404 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,809 UART: [kat] SHA2-512-ACC
897,710 UART: [kat] ECC-384
903,415 UART: [kat] HMAC-384Kdf
908,107 UART: [kat] LMS
1,476,303 UART: [kat] --
1,477,422 UART: [cold-reset] ++
1,477,776 UART: [fht] Storing FHT @ 0x50003400
1,480,705 UART: [idev] ++
1,480,873 UART: [idev] CDI.KEYID = 6
1,481,233 UART: [idev] SUBJECT.KEYID = 7
1,481,657 UART: [idev] UDS.KEYID = 0
1,482,002 ready_for_fw is high
1,482,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,015 UART: [idev] Erasing UDS.KEYID = 0
1,506,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,547 UART: [idev] --
1,516,682 UART: [ldev] ++
1,516,850 UART: [ldev] CDI.KEYID = 6
1,517,213 UART: [ldev] SUBJECT.KEYID = 5
1,517,639 UART: [ldev] AUTHORITY.KEYID = 7
1,518,102 UART: [ldev] FE.KEYID = 1
1,523,378 UART: [ldev] Erasing FE.KEYID = 1
1,548,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,551 UART: [ldev] --
1,588,020 UART: [fwproc] Waiting for Commands...
1,588,785 UART: [fwproc] Received command 0x46574c44
1,589,576 UART: [fwproc] Received Image of size 114084 bytes
2,885,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,782 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,603 >>> mbox cmd response: success
3,078,817 UART: [afmc] ++
3,078,985 UART: [afmc] CDI.KEYID = 6
3,079,347 UART: [afmc] SUBJECT.KEYID = 7
3,079,772 UART: [afmc] AUTHORITY.KEYID = 5
3,115,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,134 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,824 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,769 UART: [afmc] --
3,158,835 UART: [cold-reset] --
3,159,579 UART: [state] Locking Datavault
3,160,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,296 UART: [state] Locking ICCM
3,161,904 UART: [exit] Launching FMC @ 0x40000130
3,167,233 UART:
3,167,249 UART: Running Caliptra FMC ...
3,167,657 UART:
3,167,800 UART: [state] CFI Enabled
3,178,429 UART: [fht] FMC Alias Private Key: 7
3,286,780 UART: [art] Extend RT PCRs Done
3,287,208 UART: [art] Lock RT PCRs Done
3,289,052 UART: [art] Populate DV Done
3,297,319 UART: [fht] FMC Alias Private Key: 7
3,298,393 UART: [art] Derive CDI
3,298,673 UART: [art] Store in in slot 0x4
3,384,052 UART: [art] Derive Key Pair
3,384,412 UART: [art] Store priv key in slot 0x5
3,397,620 UART: [art] Derive Key Pair - Done
3,412,351 UART: [art] Signing Cert with AUTHO
3,412,831 UART: RITY.KEYID = 7
3,427,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,696 UART: [art] PUB.X = 85DDF805CC5A0868F5A98ECE71004537E6FC4C9857BA138A203EBA3719347E4A6F53F9AB6AC49647742D0C4591087D90
3,435,434 UART: [art] PUB.Y = 44631B5B09DCCEE1CAC93AC1880692BA11F8E1068A47464E4D53252F12CF8940C186C14CAEAB5B0BCEF54A9D28F7131D
3,442,386 UART: [art] SIG.R = D310AD2FC6BAEA3723AA242921BC3E28F90573A784EFE9041367DC0C0A4974A51DF34D60DDDB9491C5632CE6D041F637
3,449,154 UART: [art] SIG.S = 535BCF6461E58D1BC0294685A0DC2FCCCBE36609F6914833AAC516B47EB3A9A401EBC73E4F0E72D3987BF25330BD79A0
3,473,116 UART: Caliptra RT
3,473,461 UART: [state] CFI Enabled
3,581,568 UART: [rt] RT listening for mailbox commands...
3,582,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,366 UART: [rt]cmd =0x41544d4e, len=14344
4,015,619 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,228 ready_for_fw is high
1,363,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,647 >>> mbox cmd response: success
2,987,119 UART:
2,987,135 UART: Running Caliptra FMC ...
2,987,543 UART:
2,987,686 UART: [state] CFI Enabled
2,998,719 UART: [fht] FMC Alias Private Key: 7
3,106,132 UART: [art] Extend RT PCRs Done
3,106,560 UART: [art] Lock RT PCRs Done
3,107,892 UART: [art] Populate DV Done
3,115,965 UART: [fht] FMC Alias Private Key: 7
3,117,013 UART: [art] Derive CDI
3,117,293 UART: [art] Store in in slot 0x4
3,202,898 UART: [art] Derive Key Pair
3,203,258 UART: [art] Store priv key in slot 0x5
3,216,970 UART: [art] Derive Key Pair - Done
3,231,904 UART: [art] Signing Cert with AUTHO
3,232,384 UART: RITY.KEYID = 7
3,247,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,225 UART: [art] PUB.X = 1FB6227D2B80398BE65682E091FDE3D83FB1A076420A612EDDD58039605A2D1A2A791834E563D063A05D6FCA5FC0116B
3,254,996 UART: [art] PUB.Y = 00821AD3B1BF0007BBE5524C0F8C77DBDE659DE93ED53AB608298DCE199C5AAF604087FF5579B6495698748417872575
3,261,893 UART: [art] SIG.R = 67FD55D416E869189D78DF84433012FB4174FB3F0493D10EFE0D0D123C62A24C3B7D71FF6BF4D08E7D0B9797187F6F48
3,268,652 UART: [art] SIG.S = 2DECA4C03EEE519512C0DD81EDE9E6870F9E4DE6ADD3B46893006E2CE7476D45D3F090175636B690B2EABBFE3BDC5F6E
3,292,262 UART: Caliptra RT
3,292,607 UART: [state] CFI Enabled
3,400,573 UART: [rt] RT listening for mailbox commands...
3,401,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,081 UART: [rt]cmd =0x41544d4e, len=14344
3,833,894 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
893,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,281 UART: [kat] ++
897,433 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,050 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,781 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 ready_for_fw is high
1,176,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,094 UART: [idev] Erasing UDS.KEYID = 0
1,201,037 UART: [idev] Sha1 KeyId Algorithm
1,209,397 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,880 UART: [ldev] SUBJECT.KEYID = 5
1,211,306 UART: [ldev] AUTHORITY.KEYID = 7
1,211,769 UART: [ldev] FE.KEYID = 1
1,217,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,121 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,112 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,515 >>> mbox cmd response: success
2,771,541 UART: [afmc] ++
2,771,709 UART: [afmc] CDI.KEYID = 6
2,772,071 UART: [afmc] SUBJECT.KEYID = 7
2,772,496 UART: [afmc] AUTHORITY.KEYID = 5
2,808,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,050 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,960 UART: [afmc] --
2,852,000 UART: [cold-reset] --
2,853,038 UART: [state] Locking Datavault
2,854,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,925 UART: [state] Locking ICCM
2,855,513 UART: [exit] Launching FMC @ 0x40000130
2,860,842 UART:
2,860,858 UART: Running Caliptra FMC ...
2,861,266 UART:
2,861,320 UART: [state] CFI Enabled
2,871,555 UART: [fht] FMC Alias Private Key: 7
2,979,160 UART: [art] Extend RT PCRs Done
2,979,588 UART: [art] Lock RT PCRs Done
2,981,056 UART: [art] Populate DV Done
2,989,117 UART: [fht] FMC Alias Private Key: 7
2,990,149 UART: [art] Derive CDI
2,990,429 UART: [art] Store in in slot 0x4
3,076,502 UART: [art] Derive Key Pair
3,076,862 UART: [art] Store priv key in slot 0x5
3,090,208 UART: [art] Derive Key Pair - Done
3,104,978 UART: [art] Signing Cert with AUTHO
3,105,458 UART: RITY.KEYID = 7
3,120,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,627 UART: [art] PUB.X = CDA880DD3C454B303ABA95BB61AEA3C0CF12E27D3656677B924669D3DE6FB2121E5657065F7950CF8BBA5B1E3E59202B
3,128,406 UART: [art] PUB.Y = 6069E68C22F52399C1425F7532BC562C304937E62C4D73BFA53C85D3176F30066F4EFC026AD046EBB9FA6BD29A26BF4A
3,135,356 UART: [art] SIG.R = 7033920D6D5EB1791DE403441181A95816CB2C216B42E02E13AE898FD61080A6879B326CEEEB19B572382A95F0C8AD24
3,142,118 UART: [art] SIG.S = D4C784FE14EB7641E20D523FC2A328A80FC657FE6302175EDF9C9367F9A67E7FD161D4721411E9DFCA168BB64F86809A
3,165,878 UART: Caliptra RT
3,166,131 UART: [state] CFI Enabled
3,274,314 UART: [rt] RT listening for mailbox commands...
3,274,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,044 UART: [rt]cmd =0x41544d4e, len=14344
3,707,465 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 ready_for_fw is high
1,059,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,278 >>> mbox cmd response: success
2,684,468 UART:
2,684,484 UART: Running Caliptra FMC ...
2,684,892 UART:
2,684,946 UART: [state] CFI Enabled
2,695,257 UART: [fht] FMC Alias Private Key: 7
2,803,330 UART: [art] Extend RT PCRs Done
2,803,758 UART: [art] Lock RT PCRs Done
2,805,202 UART: [art] Populate DV Done
2,813,409 UART: [fht] FMC Alias Private Key: 7
2,814,471 UART: [art] Derive CDI
2,814,751 UART: [art] Store in in slot 0x4
2,900,318 UART: [art] Derive Key Pair
2,900,678 UART: [art] Store priv key in slot 0x5
2,914,478 UART: [art] Derive Key Pair - Done
2,929,267 UART: [art] Signing Cert with AUTHO
2,929,747 UART: RITY.KEYID = 7
2,944,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,626 UART: [art] PUB.X = BBBA8D722B424DDA66A75B7C01A952AA77EF08833DDF66791E2D07C0193AF8FADE0FEE3DE19664640CBD381B440036BF
2,952,377 UART: [art] PUB.Y = 06BC222BA8CF1926922ABBAFA05C894119F7624029F1E099CC92F056E7EF80B7AA633135B6D4F4CECE3CE3EE84D60B14
2,959,335 UART: [art] SIG.R = 722D0A8B6A281FC414F15D065DF19753C5A3C63871866D740AB45F37CAA5CE4AF8581C0E61B89E04FD94F82AF93221AC
2,966,098 UART: [art] SIG.S = 4B2E953AD7E4FE20C25C8313C9C514E52D2DB03D8D385E2F832A0C3663528160305AB0BEFA06F4CE88FA5F172EAB6AE8
2,990,145 UART: Caliptra RT
2,990,398 UART: [state] CFI Enabled
3,097,953 UART: [rt] RT listening for mailbox commands...
3,098,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,889 UART: [rt]cmd =0x41544d4e, len=14344
3,531,502 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,296 UART: [kat] SHA2-256
904,236 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,691 UART: [kat] HMAC-384Kdf
923,241 UART: [kat] LMS
1,171,569 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,790 UART: [fht] FHT @ 0x50003400
1,175,681 UART: [idev] ++
1,175,849 UART: [idev] CDI.KEYID = 6
1,176,209 UART: [idev] SUBJECT.KEYID = 7
1,176,633 UART: [idev] UDS.KEYID = 0
1,176,978 ready_for_fw is high
1,176,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,789 UART: [idev] Erasing UDS.KEYID = 0
1,201,868 UART: [idev] Sha1 KeyId Algorithm
1,210,296 UART: [idev] --
1,211,426 UART: [ldev] ++
1,211,594 UART: [ldev] CDI.KEYID = 6
1,211,957 UART: [ldev] SUBJECT.KEYID = 5
1,212,383 UART: [ldev] AUTHORITY.KEYID = 7
1,212,846 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,012 UART: [ldev] --
1,284,285 UART: [fwproc] Wait for Commands...
1,284,973 UART: [fwproc] Recv command 0x46574c44
1,285,701 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,564 >>> mbox cmd response: success
2,774,654 UART: [afmc] ++
2,774,822 UART: [afmc] CDI.KEYID = 6
2,775,184 UART: [afmc] SUBJECT.KEYID = 7
2,775,609 UART: [afmc] AUTHORITY.KEYID = 5
2,811,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,545 UART: [afmc] --
2,854,561 UART: [cold-reset] --
2,855,437 UART: [state] Locking Datavault
2,856,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,906 UART: [state] Locking ICCM
2,857,434 UART: [exit] Launching FMC @ 0x40000130
2,862,763 UART:
2,862,779 UART: Running Caliptra FMC ...
2,863,187 UART:
2,863,330 UART: [state] CFI Enabled
2,874,237 UART: [fht] FMC Alias Private Key: 7
2,982,302 UART: [art] Extend RT PCRs Done
2,982,730 UART: [art] Lock RT PCRs Done
2,984,060 UART: [art] Populate DV Done
2,992,231 UART: [fht] FMC Alias Private Key: 7
2,993,353 UART: [art] Derive CDI
2,993,633 UART: [art] Store in in slot 0x4
3,079,388 UART: [art] Derive Key Pair
3,079,748 UART: [art] Store priv key in slot 0x5
3,093,126 UART: [art] Derive Key Pair - Done
3,107,763 UART: [art] Signing Cert with AUTHO
3,108,243 UART: RITY.KEYID = 7
3,123,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,230 UART: [art] PUB.X = FDE7E43232C26D9A1079CAC89BA15C8CD1AD2B1E8BC4A8CFFDF512B2F3DCA7CD19D76889F62D61D3B8EFC34BB553691B
3,131,028 UART: [art] PUB.Y = BC7A42D749D2DABA7004E04E95DB06802A50164C40B42E6A6E548FE2CA4692746C9B7ED88FF86D2EB476C1720ED2C8BB
3,137,983 UART: [art] SIG.R = FD6761B49B7B74E778486A8D88033399735C0D8953D18AB70F4D8EB3CBE8335E340F767CF927FDEE1CFCFEFCE7555730
3,144,751 UART: [art] SIG.S = 611A544FED27490025BBCAA2E954CF87DEBC46F6E3A15100CAC1E650CFCAC23660E0AF45C37CE3B60BCA1081D49E9365
3,168,483 UART: Caliptra RT
3,168,828 UART: [state] CFI Enabled
3,276,891 UART: [rt] RT listening for mailbox commands...
3,277,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,611 UART: [rt]cmd =0x41544d4e, len=14344
3,710,868 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,238 ready_for_fw is high
1,060,238 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,987 >>> mbox cmd response: success
2,685,481 UART:
2,685,497 UART: Running Caliptra FMC ...
2,685,905 UART:
2,686,048 UART: [state] CFI Enabled
2,696,787 UART: [fht] FMC Alias Private Key: 7
2,804,306 UART: [art] Extend RT PCRs Done
2,804,734 UART: [art] Lock RT PCRs Done
2,805,956 UART: [art] Populate DV Done
2,814,529 UART: [fht] FMC Alias Private Key: 7
2,815,483 UART: [art] Derive CDI
2,815,763 UART: [art] Store in in slot 0x4
2,901,356 UART: [art] Derive Key Pair
2,901,716 UART: [art] Store priv key in slot 0x5
2,914,424 UART: [art] Derive Key Pair - Done
2,929,098 UART: [art] Signing Cert with AUTHO
2,929,578 UART: RITY.KEYID = 7
2,944,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,515 UART: [art] PUB.X = EC1BB90F408A4ED98E342647706CE9B8053BEE3486F404A742665745365C320D7CCB6730E13522EC8570C49732930D67
2,952,262 UART: [art] PUB.Y = E0E270758347380D2E40EA3615F42619CFCFC048FBB9098DA66BE01C744EEFA2F9A187950C6AD8F9831FD454D45A036E
2,959,208 UART: [art] SIG.R = 1C4DBF8A4D9D530A9FD67BD03BE4787885C796C694F06D3F6612EC843F49563C890F01B5755378BF40196F6B228F1572
2,965,967 UART: [art] SIG.S = D203A64FF9F0F7421F83381A18994A6523BAB96329980B93948E26B606B10ADED956E5066A269C5BEBF41D419D0D5C18
2,989,930 UART: Caliptra RT
2,990,275 UART: [state] CFI Enabled
3,097,844 UART: [rt] RT listening for mailbox commands...
3,098,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,416 UART: [rt]cmd =0x41544d4e, len=14344
3,531,171 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,858 UART: [kat] LMS
1,169,170 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 ready_for_fw is high
1,174,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,725 UART: [fwproc] Recv command 0x46574c44
1,282,458 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,805 >>> mbox cmd response: success
2,770,850 UART: [afmc] ++
2,771,018 UART: [afmc] CDI.KEYID = 6
2,771,381 UART: [afmc] SUBJECT.KEYID = 7
2,771,807 UART: [afmc] AUTHORITY.KEYID = 5
2,806,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,171 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,890 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,761 UART: [afmc] --
2,849,871 UART: [cold-reset] --
2,850,771 UART: [state] Locking Datavault
2,852,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,724 UART: [state] Locking ICCM
2,853,180 UART: [exit] Launching FMC @ 0x40000130
2,858,509 UART:
2,858,525 UART: Running Caliptra FMC ...
2,858,933 UART:
2,858,987 UART: [state] CFI Enabled
2,869,456 UART: [fht] FMC Alias Private Key: 7
2,976,939 UART: [art] Extend RT PCRs Done
2,977,367 UART: [art] Lock RT PCRs Done
2,978,615 UART: [art] Populate DV Done
2,986,860 UART: [fht] FMC Alias Private Key: 7
2,987,956 UART: [art] Derive CDI
2,988,236 UART: [art] Store in in slot 0x4
3,073,759 UART: [art] Derive Key Pair
3,074,119 UART: [art] Store priv key in slot 0x5
3,087,149 UART: [art] Derive Key Pair - Done
3,101,716 UART: [art] Signing Cert with AUTHO
3,102,196 UART: RITY.KEYID = 7
3,117,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,285 UART: [art] PUB.X = F9C7227467988C0A5DDBB7F4AD0D0447A7D53739D74C3EF734579E965ED693B879869A8AC0EA4DAA90C81B360CC53D81
3,125,051 UART: [art] PUB.Y = 9AF52C387330DA944A511F51EA8E48A3068EBBEA27447DA25BF07C4F1605A0EBFE17FC8BAA1FE0E79E58A5057278357E
3,132,006 UART: [art] SIG.R = 502FB0243005BB3E31AD2B342FAADB84A41556193A98E256D7E283B80A1E4B765C59C7A265544798F9E56B0F9B380597
3,138,762 UART: [art] SIG.S = 5D1A08A1357E030560B4D9B51D4512C8334B2D727A8EA14588A0854FBB3C92CC978E92F3D1B1452FB5E23585A50DE138
3,162,613 UART: Caliptra RT
3,162,866 UART: [state] CFI Enabled
3,270,475 UART: [rt] RT listening for mailbox commands...
3,271,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,275 UART: [rt]cmd =0x41544d4e, len=14344
3,704,098 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,816 ready_for_fw is high
1,055,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,767 >>> mbox cmd response: success
2,679,757 UART:
2,679,773 UART: Running Caliptra FMC ...
2,680,181 UART:
2,680,235 UART: [state] CFI Enabled
2,690,504 UART: [fht] FMC Alias Private Key: 7
2,798,415 UART: [art] Extend RT PCRs Done
2,798,843 UART: [art] Lock RT PCRs Done
2,800,431 UART: [art] Populate DV Done
2,808,430 UART: [fht] FMC Alias Private Key: 7
2,809,490 UART: [art] Derive CDI
2,809,770 UART: [art] Store in in slot 0x4
2,895,749 UART: [art] Derive Key Pair
2,896,109 UART: [art] Store priv key in slot 0x5
2,909,003 UART: [art] Derive Key Pair - Done
2,923,662 UART: [art] Signing Cert with AUTHO
2,924,142 UART: RITY.KEYID = 7
2,939,140 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,905 UART: [art] PUB.X = 1D1916EBFDEA983026100EBF35226027368E44C64BD6D9FC3AF5ABEB8C79E5A4BFA15C6A0C5366049EA0DC7047C55C6C
2,946,682 UART: [art] PUB.Y = E805FB1F7067A72A85AE6EF5EC0B128EFF26CF29A44C6CD1BFB18389ADAA7AE2F6D40FBE04410A3E47D8AD4855EC57BC
2,953,645 UART: [art] SIG.R = 08DD75758899C9ECEEB2BCD79D3CF542EC324032B3E9041890265A997E5F8E12458132F25C58AD580860744EDEF58C4D
2,960,408 UART: [art] SIG.S = DBD99ED804F53DD08D760CD25B348C500A0250E273C8BC28A796D610FFCC969E8F66D10719939A6C976F79501FB5280D
2,984,013 UART: Caliptra RT
2,984,266 UART: [state] CFI Enabled
3,091,765 UART: [rt] RT listening for mailbox commands...
3,092,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,377 UART: [rt]cmd =0x41544d4e, len=14344
3,525,522 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,797 UART: [state] LifecycleState = Unprovisioned
85,452 UART: [state] DebugLocked = No
86,018 UART: [state] WD Timer not started. Device not locked for debugging
87,155 UART: [kat] SHA2-256
890,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,834 UART: [kat] ++
894,986 UART: [kat] sha1
899,366 UART: [kat] SHA2-256
901,306 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 ready_for_fw is high
1,174,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,779 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,297 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,026 >>> mbox cmd response: success
2,771,163 UART: [afmc] ++
2,771,331 UART: [afmc] CDI.KEYID = 6
2,771,694 UART: [afmc] SUBJECT.KEYID = 7
2,772,120 UART: [afmc] AUTHORITY.KEYID = 5
2,807,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,004 UART: [afmc] --
2,851,100 UART: [cold-reset] --
2,851,724 UART: [state] Locking Datavault
2,852,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,587 UART: [state] Locking ICCM
2,854,143 UART: [exit] Launching FMC @ 0x40000130
2,859,472 UART:
2,859,488 UART: Running Caliptra FMC ...
2,859,896 UART:
2,860,039 UART: [state] CFI Enabled
2,870,976 UART: [fht] FMC Alias Private Key: 7
2,979,639 UART: [art] Extend RT PCRs Done
2,980,067 UART: [art] Lock RT PCRs Done
2,981,555 UART: [art] Populate DV Done
2,989,604 UART: [fht] FMC Alias Private Key: 7
2,990,544 UART: [art] Derive CDI
2,990,824 UART: [art] Store in in slot 0x4
3,076,441 UART: [art] Derive Key Pair
3,076,801 UART: [art] Store priv key in slot 0x5
3,090,573 UART: [art] Derive Key Pair - Done
3,105,229 UART: [art] Signing Cert with AUTHO
3,105,709 UART: RITY.KEYID = 7
3,120,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,458 UART: [art] PUB.X = 72ABDC500F2353DA8B5495DECBD128441A339704E89FC78480D9E47F618DF0E1DD5BCBD5C7E294A3C4A2306E8AE3319D
3,128,236 UART: [art] PUB.Y = 40F6B7C10A78F86D40A456B1A1F79BAD3775EFF53741E81F906BD0C218004B66CA0E879196D1F425515D03F9F8F3F322
3,135,157 UART: [art] SIG.R = 7CCC6E1C3AC985E7FCE6D52044AD155966C9B753F6A3339C76C070EBC8B56A439D99F83FFD4EADA640E08DEA8E94D5DA
3,141,949 UART: [art] SIG.S = 6EFC82AA3E2DD40950DEF8C3626E8BEFA7F2AD55EFCFB51427F89F389CF992A0A12AD48D28A90A83B38517ACB100143E
3,165,618 UART: Caliptra RT
3,165,963 UART: [state] CFI Enabled
3,274,960 UART: [rt] RT listening for mailbox commands...
3,275,630 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,530 UART: [rt]cmd =0x41544d4e, len=14344
3,708,377 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 ready_for_fw is high
1,056,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,774 >>> mbox cmd response: success
2,679,928 UART:
2,679,944 UART: Running Caliptra FMC ...
2,680,352 UART:
2,680,495 UART: [state] CFI Enabled
2,691,472 UART: [fht] FMC Alias Private Key: 7
2,799,627 UART: [art] Extend RT PCRs Done
2,800,055 UART: [art] Lock RT PCRs Done
2,801,849 UART: [art] Populate DV Done
2,810,422 UART: [fht] FMC Alias Private Key: 7
2,811,452 UART: [art] Derive CDI
2,811,732 UART: [art] Store in in slot 0x4
2,897,313 UART: [art] Derive Key Pair
2,897,673 UART: [art] Store priv key in slot 0x5
2,910,681 UART: [art] Derive Key Pair - Done
2,925,466 UART: [art] Signing Cert with AUTHO
2,925,946 UART: RITY.KEYID = 7
2,941,390 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,155 UART: [art] PUB.X = 4D785F59E417CAA85D931B5269FA985902DB5025F047C5D6AC680B5D097C5577752DE16F99F7A4888D0F08FBE927FB1F
2,948,914 UART: [art] PUB.Y = 614BCBD92130197AE5897153C1C320C0D2D3C4C8A4874FDBDA16B9356954AA2046209A29C7B07AD503FDAA230F3A3433
2,955,862 UART: [art] SIG.R = 32CC383CF7CA725107057A89B3502DDB38EAEB9CC478CDD4559708E0D81B832BF2073E8BAC21ED3FD9DB50A467A5E1A6
2,962,636 UART: [art] SIG.S = 25E1438336E3DF0BEECF182547E06673FF9C7BF4526B4B19B9BA9D7A6BFA44EA2CFCD880DE13254BB1B723CDB18E71B9
2,986,240 UART: Caliptra RT
2,986,585 UART: [state] CFI Enabled
3,094,704 UART: [rt] RT listening for mailbox commands...
3,095,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,398 UART: [rt]cmd =0x41544d4e, len=14344
3,528,031 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,024 UART:
192,407 UART: Running Caliptra ROM ...
193,571 UART:
193,725 UART: [state] CFI Enabled
265,265 UART: [state] LifecycleState = Unprovisioned
267,255 UART: [state] DebugLocked = No
268,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,436 UART: [kat] SHA2-256
443,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,630 UART: [kat] ++
454,106 UART: [kat] sha1
464,484 UART: [kat] SHA2-256
467,146 UART: [kat] SHA2-384
473,780 UART: [kat] SHA2-512-ACC
476,144 UART: [kat] ECC-384
2,770,493 UART: [kat] HMAC-384Kdf
2,800,306 UART: [kat] LMS
3,990,630 UART: [kat] --
3,996,531 UART: [cold-reset] ++
3,997,617 UART: [fht] Storing FHT @ 0x50003400
4,008,493 UART: [idev] ++
4,009,069 UART: [idev] CDI.KEYID = 6
4,010,041 UART: [idev] SUBJECT.KEYID = 7
4,011,290 UART: [idev] UDS.KEYID = 0
4,012,349 ready_for_fw is high
4,012,559 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,107 UART: [idev] Erasing UDS.KEYID = 0
7,347,920 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,216 UART: [idev] --
7,372,965 UART: [ldev] ++
7,373,539 UART: [ldev] CDI.KEYID = 6
7,374,478 UART: [ldev] SUBJECT.KEYID = 5
7,375,662 UART: [ldev] AUTHORITY.KEYID = 7
7,376,992 UART: [ldev] FE.KEYID = 1
7,422,912 UART: [ldev] Erasing FE.KEYID = 1
10,753,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,263 UART: [ldev] --
13,117,473 UART: [fwproc] Waiting for Commands...
13,120,698 UART: [fwproc] Received command 0x46574c44
13,122,878 UART: [fwproc] Received Image of size 113760 bytes
22,310,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,388,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,457,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,773,693 >>> mbox cmd response: success
22,777,054 UART: [afmc] ++
22,777,654 UART: [afmc] CDI.KEYID = 6
22,778,695 UART: [afmc] SUBJECT.KEYID = 7
22,779,861 UART: [afmc] AUTHORITY.KEYID = 5
26,149,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,449,918 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,452,181 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,466,766 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,481,487 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,495,713 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,515,918 UART: [afmc] --
28,520,166 UART: [cold-reset] --
28,523,761 UART: [state] Locking Datavault
28,529,278 UART: [state] Locking PCR0, PCR1 and PCR31
28,531,030 UART: [state] Locking ICCM
28,533,244 UART: [exit] Launching FMC @ 0x40000130
28,541,638 UART:
28,541,880 UART: Running Caliptra FMC ...
28,543,000 UART:
28,543,166 UART: [state] CFI Enabled
28,610,590 UART: [fht] FMC Alias Private Key: 7
30,948,272 UART: [art] Extend RT PCRs Done
30,949,493 UART: [art] Lock RT PCRs Done
30,951,090 UART: [art] Populate DV Done
30,956,295 UART: [fht] FMC Alias Private Key: 7
30,957,941 UART: [art] Derive CDI
30,958,759 UART: [art] Store in in slot 0x4
31,019,907 UART: [art] Derive Key Pair
31,020,953 UART: [art] Store priv key in slot 0x5
34,313,376 UART: [art] Derive Key Pair - Done
34,326,266 UART: [art] Signing Cert with AUTHO
34,327,565 UART: RITY.KEYID = 7
36,615,732 UART: [art] Erasing AUTHORITY.KEYID = 7
36,617,237 UART: [art] PUB.X = 36440C97E5E15D7043385491487D45F21C5F70BB4BAAE8476C852938F65790C133F919B0C948C44AFB28FF52AA64B03E
36,624,496 UART: [art] PUB.Y = E2128071FA9A2FBE873F7CC8F7C9A2340BC9A9F7C2F122CD50E1A320244687876D92EC6F78EF98287CC989EEA4906FDF
36,631,726 UART: [art] SIG.R = 9C4F69307E126DE3EED3D7C351CABDE47B2BBAD28D48A4D776F4F18554B4294420841C1D3D52BB61F03BBAB2BD8CC7A1
36,639,119 UART: [art] SIG.S = DC5377E022E14F9BF271BEB9E9BF8A7820824B06B0A63BD1486565A28488752DD3D6E728568BB7A5F01B95D13B52572B
37,944,954 UART: Caliptra RT
37,945,662 UART: [state] CFI Enabled
38,107,420 UART: [rt] RT listening for mailbox commands...
38,109,725 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,265,196 UART: [rt]cmd =0x41544d4e, len=14344
44,405,446 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,808,640 ready_for_fw is high
3,809,072 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,002,781 >>> mbox cmd response: success
27,684,900 UART:
27,685,312 UART: Running Caliptra FMC ...
27,686,644 UART:
27,686,816 UART: [state] CFI Enabled
27,757,667 UART: [fht] FMC Alias Private Key: 7
30,095,278 UART: [art] Extend RT PCRs Done
30,096,511 UART: [art] Lock RT PCRs Done
30,097,954 UART: [art] Populate DV Done
30,103,584 UART: [fht] FMC Alias Private Key: 7
30,105,288 UART: [art] Derive CDI
30,106,102 UART: [art] Store in in slot 0x4
30,167,022 UART: [art] Derive Key Pair
30,168,051 UART: [art] Store priv key in slot 0x5
33,460,267 UART: [art] Derive Key Pair - Done
33,473,488 UART: [art] Signing Cert with AUTHO
33,474,798 UART: RITY.KEYID = 7
35,762,570 UART: [art] Erasing AUTHORITY.KEYID = 7
35,764,074 UART: [art] PUB.X = 3C5052918D05A9E8D1DCB083D58C875B0CE47D04F80CA7AD7F6CAA468D46D0AED82C1078E162C576958321266A2D1455
35,771,325 UART: [art] PUB.Y = 8EE3C067F57C933DC1FDA2C19EB401718917F1A7DF943F8CC9E8171F9C7545B3ED25F3EEBA52DE679BD6FE6EFB52B978
35,778,570 UART: [art] SIG.R = CF5A2FEC9798D11D58BF83BC07916793B25478C979DD6A842ABE81F584AD63A76FCB353C1FA91E0415937137F8DDE1FC
35,785,922 UART: [art] SIG.S = 49C459BB20DB8DB82196538DF1D3ED291712ADEB3DBA94AB011485CC6D1C593EB5A8D26AE71E6ECB137651349B41FB23
37,090,951 UART: Caliptra RT
37,091,664 UART: [state] CFI Enabled
37,253,368 UART: [rt] RT listening for mailbox commands...
37,255,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,411,006 UART: [rt]cmd =0x41544d4e, len=14344
43,550,637 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
192,794 UART:
193,167 UART: Running Caliptra ROM ...
194,312 UART:
604,043 UART: [state] CFI Enabled
614,115 UART: [state] LifecycleState = Unprovisioned
616,014 UART: [state] DebugLocked = No
618,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,750 UART: [kat] SHA2-256
793,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,044 UART: [kat] ++
804,518 UART: [kat] sha1
815,770 UART: [kat] SHA2-256
818,464 UART: [kat] SHA2-384
824,383 UART: [kat] SHA2-512-ACC
826,683 UART: [kat] ECC-384
3,109,916 UART: [kat] HMAC-384Kdf
3,120,885 UART: [kat] LMS
4,310,959 UART: [kat] --
4,315,675 UART: [cold-reset] ++
4,317,311 UART: [fht] Storing FHT @ 0x50003400
4,330,177 UART: [idev] ++
4,330,830 UART: [idev] CDI.KEYID = 6
4,331,718 UART: [idev] SUBJECT.KEYID = 7
4,332,886 UART: [idev] UDS.KEYID = 0
4,334,037 ready_for_fw is high
4,334,268 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,475 UART: [idev] Erasing UDS.KEYID = 0
7,617,340 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,571 UART: [idev] --
7,643,125 UART: [ldev] ++
7,643,742 UART: [ldev] CDI.KEYID = 6
7,644,670 UART: [ldev] SUBJECT.KEYID = 5
7,645,872 UART: [ldev] AUTHORITY.KEYID = 7
7,647,151 UART: [ldev] FE.KEYID = 1
7,657,705 UART: [ldev] Erasing FE.KEYID = 1
10,943,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,071 UART: [ldev] --
13,307,590 UART: [fwproc] Waiting for Commands...
13,309,956 UART: [fwproc] Received command 0x46574c44
13,312,188 UART: [fwproc] Received Image of size 113760 bytes
21,938,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,022,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,091,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,407,888 >>> mbox cmd response: success
22,412,157 UART: [afmc] ++
22,412,745 UART: [afmc] CDI.KEYID = 6
22,413,687 UART: [afmc] SUBJECT.KEYID = 7
22,414,844 UART: [afmc] AUTHORITY.KEYID = 5
25,726,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,022,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,025,255 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,039,848 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,054,599 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,068,790 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,091,684 UART: [afmc] --
28,095,855 UART: [cold-reset] --
28,099,234 UART: [state] Locking Datavault
28,104,965 UART: [state] Locking PCR0, PCR1 and PCR31
28,106,715 UART: [state] Locking ICCM
28,108,889 UART: [exit] Launching FMC @ 0x40000130
28,117,279 UART:
28,117,518 UART: Running Caliptra FMC ...
28,118,540 UART:
28,118,682 UART: [state] CFI Enabled
28,127,210 UART: [fht] FMC Alias Private Key: 7
30,458,782 UART: [art] Extend RT PCRs Done
30,460,009 UART: [art] Lock RT PCRs Done
30,461,395 UART: [art] Populate DV Done
30,467,033 UART: [fht] FMC Alias Private Key: 7
30,468,677 UART: [art] Derive CDI
30,469,408 UART: [art] Store in in slot 0x4
30,512,434 UART: [art] Derive Key Pair
30,513,473 UART: [art] Store priv key in slot 0x5
33,755,230 UART: [art] Derive Key Pair - Done
33,768,169 UART: [art] Signing Cert with AUTHO
33,769,498 UART: RITY.KEYID = 7
36,048,968 UART: [art] Erasing AUTHORITY.KEYID = 7
36,050,482 UART: [art] PUB.X = D0B925F5DAE0C5558B3F78B84BC0ED371856D60C63F97D2E0426C44D045808E51A0B10A3A4961BB61F620678DFA9F2FF
36,057,693 UART: [art] PUB.Y = FCBF5334FD2143952322D7218733D9EC19E74BFBC9F1B1D7DC5B7AFA53B5A8D91FAFAD22580821AEEB32115B0EAFDDE5
36,064,962 UART: [art] SIG.R = 1C63E396AAD31D9298F0B3B1D2B22B6F117AB4CB5B609752BC8EDB91C0E94F855CB3029E8633FE773C7F5C475941055D
36,072,336 UART: [art] SIG.S = 5DEAE15A9CC8EAA7015C087B05D6F43FB151C335CF25864893C70C6E6ADB42AF03CD2481B496B8043046E4834D01E4D0
37,377,347 UART: Caliptra RT
37,378,033 UART: [state] CFI Enabled
37,495,623 UART: [rt] RT listening for mailbox commands...
37,497,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,652,971 UART: [rt]cmd =0x41544d4e, len=14344
43,922,450 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
4,130,514 ready_for_fw is high
4,130,917 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,657,171 >>> mbox cmd response: success
28,296,290 UART:
28,296,676 UART: Running Caliptra FMC ...
28,297,807 UART:
28,297,967 UART: [state] CFI Enabled
28,305,477 UART: [fht] FMC Alias Private Key: 7
30,636,111 UART: [art] Extend RT PCRs Done
30,637,326 UART: [art] Lock RT PCRs Done
30,639,115 UART: [art] Populate DV Done
30,644,575 UART: [fht] FMC Alias Private Key: 7
30,646,068 UART: [art] Derive CDI
30,646,855 UART: [art] Store in in slot 0x4
30,689,612 UART: [art] Derive Key Pair
30,690,612 UART: [art] Store priv key in slot 0x5
33,932,922 UART: [art] Derive Key Pair - Done
33,945,869 UART: [art] Signing Cert with AUTHO
33,947,170 UART: RITY.KEYID = 7
36,226,515 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,030 UART: [art] PUB.X = 093823553813E11DD8CD60722EE194E45188EBA8995613C5B1F09B7D639BF2A1B82E90B81596B14BDB2AD0B2E5C00B14
36,235,163 UART: [art] PUB.Y = 97EF965E63CF268F3369EF09E738DC6046C43B31FCE6A4A2573D1F96EAB8EA3102A78E753B57941634B73D486E0EB136
36,242,419 UART: [art] SIG.R = 54E190980E6F32DF3A1F8BB0ADC9A768A82CD47609D2CB05A271E1E12949B8A72469BA5AADD59DFF7C846EA30D6CF26E
36,249,790 UART: [art] SIG.S = 7E92F26C0CE9158D43E9FE303830BAED4BC8818880623D2463CD1BA5011EF00E9C8FFD243CD5C5188C8EACCF2E7EF403
37,555,075 UART: Caliptra RT
37,555,791 UART: [state] CFI Enabled
37,673,352 UART: [rt] RT listening for mailbox commands...
37,675,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,830,848 UART: [rt]cmd =0x41544d4e, len=14344
44,126,245 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,369 UART:
192,745 UART: Running Caliptra ROM ...
193,830 UART:
193,967 UART: [state] CFI Enabled
264,279 UART: [state] LifecycleState = Unprovisioned
266,142 UART: [state] DebugLocked = No
267,608 UART: [state] WD Timer not started. Device not locked for debugging
270,881 UART: [kat] SHA2-256
450,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,596 UART: [kat] ++
462,123 UART: [kat] sha1
472,365 UART: [kat] SHA2-256
475,447 UART: [kat] SHA2-384
481,076 UART: [kat] SHA2-512-ACC
484,034 UART: [kat] ECC-384
2,947,656 UART: [kat] HMAC-384Kdf
2,973,157 UART: [kat] LMS
3,502,592 UART: [kat] --
3,506,842 UART: [cold-reset] ++
3,508,790 UART: [fht] FHT @ 0x50003400
3,519,624 UART: [idev] ++
3,520,205 UART: [idev] CDI.KEYID = 6
3,521,120 UART: [idev] SUBJECT.KEYID = 7
3,522,297 UART: [idev] UDS.KEYID = 0
3,523,223 ready_for_fw is high
3,523,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,180 UART: [idev] Erasing UDS.KEYID = 0
6,028,561 UART: [idev] Sha1 KeyId Algorithm
6,051,735 UART: [idev] --
6,055,346 UART: [ldev] ++
6,055,917 UART: [ldev] CDI.KEYID = 6
6,056,828 UART: [ldev] SUBJECT.KEYID = 5
6,057,986 UART: [ldev] AUTHORITY.KEYID = 7
6,059,266 UART: [ldev] FE.KEYID = 1
6,102,165 UART: [ldev] Erasing FE.KEYID = 1
8,608,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,885 UART: [ldev] --
10,418,993 UART: [fwproc] Wait for Commands...
10,421,136 UART: [fwproc] Recv command 0x46574c44
10,423,191 UART: [fwproc] Recv'd Img size: 114084 bytes
14,999,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,079,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,148,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,464,731 >>> mbox cmd response: success
15,468,260 UART: [afmc] ++
15,468,857 UART: [afmc] CDI.KEYID = 6
15,469,768 UART: [afmc] SUBJECT.KEYID = 7
15,470,925 UART: [afmc] AUTHORITY.KEYID = 5
18,006,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,729,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,731,429 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,747,393 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,763,384 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,779,146 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,801,986 UART: [afmc] --
19,806,606 UART: [cold-reset] --
19,809,865 UART: [state] Locking Datavault
19,816,186 UART: [state] Locking PCR0, PCR1 and PCR31
19,817,822 UART: [state] Locking ICCM
19,820,322 UART: [exit] Launching FMC @ 0x40000130
19,828,764 UART:
19,828,992 UART: Running Caliptra FMC ...
19,830,013 UART:
19,830,160 UART: [state] CFI Enabled
19,888,786 UART: [fht] FMC Alias Private Key: 7
21,652,127 UART: [art] Extend RT PCRs Done
21,653,330 UART: [art] Lock RT PCRs Done
21,654,574 UART: [art] Populate DV Done
21,660,092 UART: [fht] FMC Alias Private Key: 7
21,661,627 UART: [art] Derive CDI
21,662,386 UART: [art] Store in in slot 0x4
21,721,532 UART: [art] Derive Key Pair
21,722,586 UART: [art] Store priv key in slot 0x5
24,185,327 UART: [art] Derive Key Pair - Done
24,198,101 UART: [art] Signing Cert with AUTHO
24,199,400 UART: RITY.KEYID = 7
25,911,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,913,185 UART: [art] PUB.X = E53E7D674658E31A59233F849881F7701A7439E00C18A600229A855862470E4AA9A64AC431059764FF141DA62F3A03EA
25,920,401 UART: [art] PUB.Y = 7A559A8411C6255F2BCFE1FF45C0F9C998B2DA738AA3E737ADCB8AADDF37167777123E4572C7DE6C09AB545EEA967F6B
25,927,672 UART: [art] SIG.R = 3677EE0EA71E4084FC099716CA8DDA4F286E9BA6AEE96504AF76B079E3FB7A2FCD2E04DE8F3713FB5B6941D56E905472
25,935,067 UART: [art] SIG.S = 0358C52927CF503CE76D2CD488CC50305446292228667BF6488B7B4DFCC649F14CA529E2E099904A31A2125CB02541B4
26,913,823 UART: Caliptra RT
26,914,510 UART: [state] CFI Enabled
27,079,786 UART: [rt] RT listening for mailbox commands...
27,082,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,237,671 UART: [rt]cmd =0x41544d4e, len=14344
30,806,132 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,573 writing to cptra_bootfsm_go
3,351,562 ready_for_fw is high
3,352,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,011,804 >>> mbox cmd response: success
19,294,577 UART:
19,294,979 UART: Running Caliptra FMC ...
19,296,085 UART:
19,296,240 UART: [state] CFI Enabled
19,363,757 UART: [fht] FMC Alias Private Key: 7
21,127,821 UART: [art] Extend RT PCRs Done
21,129,040 UART: [art] Lock RT PCRs Done
21,130,590 UART: [art] Populate DV Done
21,136,054 UART: [fht] FMC Alias Private Key: 7
21,137,550 UART: [art] Derive CDI
21,138,290 UART: [art] Store in in slot 0x4
21,196,520 UART: [art] Derive Key Pair
21,197,561 UART: [art] Store priv key in slot 0x5
23,660,590 UART: [art] Derive Key Pair - Done
23,673,748 UART: [art] Signing Cert with AUTHO
23,675,051 UART: RITY.KEYID = 7
25,386,234 UART: [art] Erasing AUTHORITY.KEYID = 7
25,387,749 UART: [art] PUB.X = 628791BF57AA95882CCEB41CCBA2AB96D85BD4240B083CF3C5FFD1E254900361857656293C5B79BDC5751429EE893C2B
25,395,022 UART: [art] PUB.Y = DD37CDF3C62B5C27676A3393E3B3A02F39E711DD59A511FD37AA27233A76355F09161C0709164444DC14D20F62AE2491
25,402,219 UART: [art] SIG.R = B06C3593D133E950A313E1061FE5EAB2514E8C311FA1A34F46A1957B73DAA5CB13358BC944EB5AC6F0AD9CB1BBD04F33
25,409,661 UART: [art] SIG.S = 6E049CA673439D59BB51C5830A1B261D6C8D95F345710BC71AA3B127CEE9F896F00C2AA0EDD9397C87D201364D30B14A
26,388,520 UART: Caliptra RT
26,389,226 UART: [state] CFI Enabled
26,555,482 UART: [rt] RT listening for mailbox commands...
26,557,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,713,096 UART: [rt]cmd =0x41544d4e, len=14344
30,277,034 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
193,051 UART:
193,421 UART: Running Caliptra ROM ...
194,563 UART:
604,257 UART: [state] CFI Enabled
618,698 UART: [state] LifecycleState = Unprovisioned
620,569 UART: [state] DebugLocked = No
623,257 UART: [state] WD Timer not started. Device not locked for debugging
626,468 UART: [kat] SHA2-256
805,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,105 UART: [kat] ++
817,561 UART: [kat] sha1
829,510 UART: [kat] SHA2-256
832,556 UART: [kat] SHA2-384
838,623 UART: [kat] SHA2-512-ACC
841,572 UART: [kat] ECC-384
3,282,852 UART: [kat] HMAC-384Kdf
3,295,186 UART: [kat] LMS
3,824,676 UART: [kat] --
3,830,107 UART: [cold-reset] ++
3,832,470 UART: [fht] FHT @ 0x50003400
3,842,808 UART: [idev] ++
3,843,383 UART: [idev] CDI.KEYID = 6
3,844,390 UART: [idev] SUBJECT.KEYID = 7
3,845,495 UART: [idev] UDS.KEYID = 0
3,846,546 ready_for_fw is high
3,846,768 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,561 UART: [idev] Erasing UDS.KEYID = 0
6,318,327 UART: [idev] Sha1 KeyId Algorithm
6,341,075 UART: [idev] --
6,343,737 UART: [ldev] ++
6,344,345 UART: [ldev] CDI.KEYID = 6
6,345,236 UART: [ldev] SUBJECT.KEYID = 5
6,346,338 UART: [ldev] AUTHORITY.KEYID = 7
6,347,627 UART: [ldev] FE.KEYID = 1
6,358,572 UART: [ldev] Erasing FE.KEYID = 1
8,828,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,856 UART: [ldev] --
10,619,370 UART: [fwproc] Wait for Commands...
10,621,198 UART: [fwproc] Recv command 0x46574c44
10,623,235 UART: [fwproc] Recv'd Img size: 114084 bytes
15,174,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,253,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,322,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,639,298 >>> mbox cmd response: success
15,644,404 UART: [afmc] ++
15,645,032 UART: [afmc] CDI.KEYID = 6
15,645,930 UART: [afmc] SUBJECT.KEYID = 7
15,647,091 UART: [afmc] AUTHORITY.KEYID = 5
18,148,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,868,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,870,595 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,886,519 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,902,520 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,918,281 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,940,461 UART: [afmc] --
19,943,852 UART: [cold-reset] --
19,946,956 UART: [state] Locking Datavault
19,951,733 UART: [state] Locking PCR0, PCR1 and PCR31
19,953,383 UART: [state] Locking ICCM
19,955,535 UART: [exit] Launching FMC @ 0x40000130
19,963,997 UART:
19,964,235 UART: Running Caliptra FMC ...
19,965,339 UART:
19,965,498 UART: [state] CFI Enabled
19,973,609 UART: [fht] FMC Alias Private Key: 7
21,729,862 UART: [art] Extend RT PCRs Done
21,731,107 UART: [art] Lock RT PCRs Done
21,733,009 UART: [art] Populate DV Done
21,738,539 UART: [fht] FMC Alias Private Key: 7
21,740,080 UART: [art] Derive CDI
21,740,899 UART: [art] Store in in slot 0x4
21,783,175 UART: [art] Derive Key Pair
21,784,223 UART: [art] Store priv key in slot 0x5
24,210,644 UART: [art] Derive Key Pair - Done
24,223,795 UART: [art] Signing Cert with AUTHO
24,225,132 UART: RITY.KEYID = 7
25,930,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,931,982 UART: [art] PUB.X = 51775EFD370D0A3C620888300C6AA7DD1477BE68D5FDC4972C471065910AD441B85E36A8ED92D4FCAECC3E3B402074A1
25,939,259 UART: [art] PUB.Y = DB760961591095C3328F5266B4823F1C892B0348FE4CEA4EC71F3CBA085252FBC494BF9DF339187BADB2B58DE39E0EBF
25,946,551 UART: [art] SIG.R = D46592396F1869680FC287DB9644E6FE3A7D7468B429D135DCC5CDE280699E7C80543238DFCC1329B35756B1AE85A444
25,953,933 UART: [art] SIG.S = 436F2053AC9AEF4A57099BE4B3494A21EBC3A981815DD560E01B5F09FC7CAF3FE05FB726ECA88F323F1A4E70DE99F9C8
26,932,647 UART: Caliptra RT
26,933,375 UART: [state] CFI Enabled
27,050,435 UART: [rt] RT listening for mailbox commands...
27,052,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,295 UART: [rt]cmd =0x41544d4e, len=14344
30,767,994 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,695,814 ready_for_fw is high
3,696,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,249,985 >>> mbox cmd response: success
19,497,236 UART:
19,497,609 UART: Running Caliptra FMC ...
19,498,816 UART:
19,498,985 UART: [state] CFI Enabled
19,506,980 UART: [fht] FMC Alias Private Key: 7
21,263,697 UART: [art] Extend RT PCRs Done
21,264,923 UART: [art] Lock RT PCRs Done
21,266,712 UART: [art] Populate DV Done
21,272,094 UART: [fht] FMC Alias Private Key: 7
21,273,755 UART: [art] Derive CDI
21,274,577 UART: [art] Store in in slot 0x4
21,317,075 UART: [art] Derive Key Pair
21,318,117 UART: [art] Store priv key in slot 0x5
23,745,035 UART: [art] Derive Key Pair - Done
23,757,984 UART: [art] Signing Cert with AUTHO
23,759,472 UART: RITY.KEYID = 7
25,464,602 UART: [art] Erasing AUTHORITY.KEYID = 7
25,466,104 UART: [art] PUB.X = A14853D9617F1607B924F56F0301C7182D87CE07B9D73CDB07DBFBD0DFC730DC421D5099ED2A65CD26E0B9CA6BACA8F8
25,473,386 UART: [art] PUB.Y = CEA84DAB4DF58BA31D99D136183F4F733437BF54401F6FCFCD28D8701697B10EB600EF07E6A278CFC13153B543DCC142
25,480,621 UART: [art] SIG.R = 0642205D459D9056012A1C8F040D8DB97D91804D1AE02736498857E164AD50EFFF116EB42A017DCC9DDEC3E563932CEF
25,488,048 UART: [art] SIG.S = E9FBCFBBEA81BFADADB1D65769873E51B8757CA56CFDEFBA9429A30086D6E5D03DEC7FF21DF8D20E923F95D49F7C21FA
26,466,860 UART: Caliptra RT
26,467,581 UART: [state] CFI Enabled
26,585,046 UART: [rt] RT listening for mailbox commands...
26,587,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,742,533 UART: [rt]cmd =0x41544d4e, len=14344
30,317,000 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,465 UART:
192,837 UART: Running Caliptra ROM ...
193,985 UART:
194,134 UART: [state] CFI Enabled
262,160 UART: [state] LifecycleState = Unprovisioned
264,516 UART: [state] DebugLocked = No
267,386 UART: [state] WD Timer not started. Device not locked for debugging
271,422 UART: [kat] SHA2-256
461,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,062 UART: [kat] ++
472,514 UART: [kat] sha1
484,594 UART: [kat] SHA2-256
487,604 UART: [kat] SHA2-384
492,742 UART: [kat] SHA2-512-ACC
495,347 UART: [kat] ECC-384
2,948,394 UART: [kat] HMAC-384Kdf
2,971,375 UART: [kat] LMS
3,503,190 UART: [kat] --
3,507,614 UART: [cold-reset] ++
3,508,902 UART: [fht] FHT @ 0x50003400
3,520,087 UART: [idev] ++
3,520,728 UART: [idev] CDI.KEYID = 6
3,521,682 UART: [idev] SUBJECT.KEYID = 7
3,522,926 UART: [idev] UDS.KEYID = 0
3,523,823 ready_for_fw is high
3,524,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,611 UART: [idev] Erasing UDS.KEYID = 0
6,031,768 UART: [idev] Sha1 KeyId Algorithm
6,054,201 UART: [idev] --
6,060,465 UART: [ldev] ++
6,061,198 UART: [ldev] CDI.KEYID = 6
6,062,136 UART: [ldev] SUBJECT.KEYID = 5
6,063,308 UART: [ldev] AUTHORITY.KEYID = 7
6,064,484 UART: [ldev] FE.KEYID = 1
6,101,069 UART: [ldev] Erasing FE.KEYID = 1
8,608,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,547 UART: [ldev] --
10,413,639 UART: [fwproc] Wait for Commands...
10,415,250 UART: [fwproc] Recv command 0x46574c44
10,417,525 UART: [fwproc] Recv'd Img size: 114084 bytes
15,024,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,107,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,223,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,764,900 >>> mbox cmd response: success
15,769,216 UART: [afmc] ++
15,769,945 UART: [afmc] CDI.KEYID = 6
15,771,142 UART: [afmc] SUBJECT.KEYID = 7
15,772,586 UART: [afmc] AUTHORITY.KEYID = 5
18,297,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,024,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,026,839 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,041,891 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,057,145 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,071,954 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,096,752 UART: [afmc] --
20,100,063 UART: [cold-reset] --
20,103,726 UART: [state] Locking Datavault
20,108,079 UART: [state] Locking PCR0, PCR1 and PCR31
20,110,239 UART: [state] Locking ICCM
20,111,500 UART: [exit] Launching FMC @ 0x40000130
20,120,203 UART:
20,120,436 UART: Running Caliptra FMC ...
20,121,463 UART:
20,121,609 UART: [state] CFI Enabled
20,183,321 UART: [fht] FMC Alias Private Key: 7
21,946,657 UART: [art] Extend RT PCRs Done
21,947,879 UART: [art] Lock RT PCRs Done
21,949,829 UART: [art] Populate DV Done
21,955,297 UART: [fht] FMC Alias Private Key: 7
21,956,939 UART: [art] Derive CDI
21,957,752 UART: [art] Store in in slot 0x4
22,016,202 UART: [art] Derive Key Pair
22,017,243 UART: [art] Store priv key in slot 0x5
24,479,930 UART: [art] Derive Key Pair - Done
24,493,088 UART: [art] Signing Cert with AUTHO
24,494,395 UART: RITY.KEYID = 7
26,206,499 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,008 UART: [art] PUB.X = 672B088FF03CE2F9FD508D585457961BD796AD868C001CB6AA19B67CD24696F5204F018F76B100FCC3FA67EEE1ADB703
26,215,226 UART: [art] PUB.Y = 69F90B2709001895336E35272CB3307ED68EDF9F936F0010527FFA27688E7931CEAE9EFE5E2E8D4CF5DD68DC9EA0E7B0
26,222,474 UART: [art] SIG.R = 4362823EB3B7FC2CD938F8535358B30956D886A012666D2E95DAAE6A0996E4AC36E71AE07A04E332920381102DC28C9B
26,229,854 UART: [art] SIG.S = 7374BD355E544375EFA7FC2C99DEBE65610E4687EFAB1E216DA1D2A3741CEE98BF9D61A137287A9A9F4ADA4D9B641FC9
27,208,719 UART: Caliptra RT
27,209,419 UART: [state] CFI Enabled
27,374,031 UART: [rt] RT listening for mailbox commands...
27,376,476 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,532,041 UART: [rt]cmd =0x41544d4e, len=14344
31,106,021 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,417,936 ready_for_fw is high
3,418,494 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,802,370 >>> mbox cmd response: success
20,094,683 UART:
20,095,085 UART: Running Caliptra FMC ...
20,096,195 UART:
20,096,355 UART: [state] CFI Enabled
20,160,138 UART: [fht] FMC Alias Private Key: 7
21,924,046 UART: [art] Extend RT PCRs Done
21,925,275 UART: [art] Lock RT PCRs Done
21,927,359 UART: [art] Populate DV Done
21,932,937 UART: [fht] FMC Alias Private Key: 7
21,934,643 UART: [art] Derive CDI
21,935,459 UART: [art] Store in in slot 0x4
21,993,266 UART: [art] Derive Key Pair
21,994,310 UART: [art] Store priv key in slot 0x5
24,457,168 UART: [art] Derive Key Pair - Done
24,470,600 UART: [art] Signing Cert with AUTHO
24,471,910 UART: RITY.KEYID = 7
26,182,721 UART: [art] Erasing AUTHORITY.KEYID = 7
26,184,343 UART: [art] PUB.X = 5549AE5A9BC3DD949EAF7E7325F1F7B4C9EA050CB60D7A12A432427A19901A293BFC74A9F83025F4C856B3786775F0C4
26,191,496 UART: [art] PUB.Y = 9FC56187FD0D7221A964D59CA8692C520F106C3550AC9FFC5D8B5233E3C91E462FA25C9A2675F51F26D184286646C604
26,198,738 UART: [art] SIG.R = B7E4A840479F033FFFF48EBEF378D2686442808D604265FC58C66E2AD77D05C53B9D3D1E78AD38A3293B310236548ACE
26,206,078 UART: [art] SIG.S = 53B801A4E06703629137CF46480A08E06F17839675415A87FDB54A2755CDEA64811B5E4045744709DABEA1F7699610D9
27,185,186 UART: Caliptra RT
27,185,878 UART: [state] CFI Enabled
27,350,729 UART: [rt] RT listening for mailbox commands...
27,353,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,508,180 UART: [rt]cmd =0x41544d4e, len=14344
31,088,707 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,986 writing to cptra_bootfsm_go
193,116 UART:
193,483 UART: Running Caliptra ROM ...
194,584 UART:
604,364 UART: [state] CFI Enabled
614,643 UART: [state] LifecycleState = Unprovisioned
617,019 UART: [state] DebugLocked = No
618,636 UART: [state] WD Timer not started. Device not locked for debugging
622,448 UART: [kat] SHA2-256
812,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,035 UART: [kat] ++
823,646 UART: [kat] sha1
835,664 UART: [kat] SHA2-256
838,671 UART: [kat] SHA2-384
845,941 UART: [kat] SHA2-512-ACC
848,520 UART: [kat] ECC-384
3,291,396 UART: [kat] HMAC-384Kdf
3,304,462 UART: [kat] LMS
3,836,261 UART: [kat] --
3,839,129 UART: [cold-reset] ++
3,840,871 UART: [fht] FHT @ 0x50003400
3,853,203 UART: [idev] ++
3,853,851 UART: [idev] CDI.KEYID = 6
3,854,885 UART: [idev] SUBJECT.KEYID = 7
3,856,060 UART: [idev] UDS.KEYID = 0
3,857,255 ready_for_fw is high
3,857,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,788 UART: [idev] Erasing UDS.KEYID = 0
6,331,834 UART: [idev] Sha1 KeyId Algorithm
6,353,279 UART: [idev] --
6,358,838 UART: [ldev] ++
6,359,569 UART: [ldev] CDI.KEYID = 6
6,360,495 UART: [ldev] SUBJECT.KEYID = 5
6,361,654 UART: [ldev] AUTHORITY.KEYID = 7
6,362,887 UART: [ldev] FE.KEYID = 1
6,374,935 UART: [ldev] Erasing FE.KEYID = 1
8,852,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,478 UART: [ldev] --
10,642,533 UART: [fwproc] Wait for Commands...
10,645,008 UART: [fwproc] Recv command 0x46574c44
10,647,268 UART: [fwproc] Recv'd Img size: 114084 bytes
15,268,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,351,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,468,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,008,867 >>> mbox cmd response: success
16,012,722 UART: [afmc] ++
16,013,434 UART: [afmc] CDI.KEYID = 6
16,014,633 UART: [afmc] SUBJECT.KEYID = 7
16,016,103 UART: [afmc] AUTHORITY.KEYID = 5
18,519,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,241,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,243,452 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,258,542 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,273,721 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,288,571 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,314,027 UART: [afmc] --
20,317,856 UART: [cold-reset] --
20,320,055 UART: [state] Locking Datavault
20,325,213 UART: [state] Locking PCR0, PCR1 and PCR31
20,327,367 UART: [state] Locking ICCM
20,329,303 UART: [exit] Launching FMC @ 0x40000130
20,337,988 UART:
20,338,233 UART: Running Caliptra FMC ...
20,339,337 UART:
20,339,514 UART: [state] CFI Enabled
20,347,729 UART: [fht] FMC Alias Private Key: 7
22,104,113 UART: [art] Extend RT PCRs Done
22,105,333 UART: [art] Lock RT PCRs Done
22,107,361 UART: [art] Populate DV Done
22,112,928 UART: [fht] FMC Alias Private Key: 7
22,114,411 UART: [art] Derive CDI
22,115,145 UART: [art] Store in in slot 0x4
22,157,626 UART: [art] Derive Key Pair
22,158,663 UART: [art] Store priv key in slot 0x5
24,585,584 UART: [art] Derive Key Pair - Done
24,598,848 UART: [art] Signing Cert with AUTHO
24,600,156 UART: RITY.KEYID = 7
26,305,699 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,206 UART: [art] PUB.X = 0F9B1242B68116F4785A490EE47F98D7176D845FA13C31DDB34098C8FCD6CDD57DC2613D30ABF16246FBE61A913C4CD9
26,314,482 UART: [art] PUB.Y = DD74D309BBE3F47DF94E6410AA5246D925940ED6C0D2B0878E01B50554F59E79ABDDFF82C93279C3B579C5FD31156DD4
26,321,715 UART: [art] SIG.R = E7F3BB478BAED394390100296FA7050E3D11B19140D2E12E25005628D7207F48DDA9AC109B150D7F1F95BC0167F43178
26,329,086 UART: [art] SIG.S = 25684D9624FE79AC1DEE951A9407BFF7C3207A388B31372E8429A6A297E05C5B6820ACA101FEE1D299D22A1A106DE404
27,308,203 UART: Caliptra RT
27,308,892 UART: [state] CFI Enabled
27,425,663 UART: [rt] RT listening for mailbox commands...
27,428,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,583,350 UART: [rt]cmd =0x41544d4e, len=14344
31,156,839 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
3,754,067 ready_for_fw is high
3,754,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,029,557 >>> mbox cmd response: success
20,283,569 UART:
20,283,978 UART: Running Caliptra FMC ...
20,285,085 UART:
20,285,240 UART: [state] CFI Enabled
20,293,348 UART: [fht] FMC Alias Private Key: 7
22,050,154 UART: [art] Extend RT PCRs Done
22,051,418 UART: [art] Lock RT PCRs Done
22,053,280 UART: [art] Populate DV Done
22,058,647 UART: [fht] FMC Alias Private Key: 7
22,060,308 UART: [art] Derive CDI
22,061,131 UART: [art] Store in in slot 0x4
22,103,459 UART: [art] Derive Key Pair
22,104,469 UART: [art] Store priv key in slot 0x5
24,530,904 UART: [art] Derive Key Pair - Done
24,544,017 UART: [art] Signing Cert with AUTHO
24,545,329 UART: RITY.KEYID = 7
26,250,750 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,251 UART: [art] PUB.X = 40E36F116DA65A5DCED2F99E3375E736D962F563C0F6BAE09F22148921BC3107C8BD11ADC8CE40FD68E9E10C9B1292B2
26,259,534 UART: [art] PUB.Y = CACAAFE2AED7A65D98CB8C701BC0CEC52A362796435F67EE10EBD5A6AB54A918784B9C44AA7ABCAFE52402040615ACC2
26,266,789 UART: [art] SIG.R = BA5102FA4170219470B11D5BE7942A7B0DADD8845121E9B06DE2E8605503183233C06CA8487FDE60C4C4BF8019B46AF7
26,274,178 UART: [art] SIG.S = FAC1A5B14F4A415CA664DF1B3D5745D564294098EBD096ADBDD934A966F6D0073BFF488EA9FF767A593807C2BADF7D24
27,252,996 UART: Caliptra RT
27,253,732 UART: [state] CFI Enabled
27,370,967 UART: [rt] RT listening for mailbox commands...
27,373,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,419 UART: [rt]cmd =0x41544d4e, len=14344
31,103,851 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
85,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,403 UART: [kat] SHA2-256
881,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,449 UART: [kat] ++
885,601 UART: [kat] sha1
889,875 UART: [kat] SHA2-256
891,813 UART: [kat] SHA2-384
894,332 UART: [kat] SHA2-512-ACC
896,233 UART: [kat] ECC-384
901,752 UART: [kat] HMAC-384Kdf
906,306 UART: [kat] LMS
1,474,502 UART: [kat] --
1,475,177 UART: [cold-reset] ++
1,475,657 UART: [fht] Storing FHT @ 0x50003400
1,478,328 UART: [idev] ++
1,478,496 UART: [idev] CDI.KEYID = 6
1,478,856 UART: [idev] SUBJECT.KEYID = 7
1,479,280 UART: [idev] UDS.KEYID = 0
1,479,625 ready_for_fw is high
1,479,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,624 UART: [idev] Erasing UDS.KEYID = 0
1,503,964 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,664 UART: [idev] --
1,513,703 UART: [ldev] ++
1,513,871 UART: [ldev] CDI.KEYID = 6
1,514,234 UART: [ldev] SUBJECT.KEYID = 5
1,514,660 UART: [ldev] AUTHORITY.KEYID = 7
1,515,123 UART: [ldev] FE.KEYID = 1
1,520,547 UART: [ldev] Erasing FE.KEYID = 1
1,545,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,730 UART: [ldev] --
1,585,001 UART: [fwproc] Waiting for Commands...
1,585,690 UART: [fwproc] Received command 0x46574c44
1,586,481 UART: [fwproc] Received Image of size 114084 bytes
5,116,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,145,038 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,174,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,309,817 >>> mbox cmd response: success
5,310,921 UART: [afmc] ++
5,311,089 UART: [afmc] CDI.KEYID = 6
5,311,451 UART: [afmc] SUBJECT.KEYID = 7
5,311,876 UART: [afmc] AUTHORITY.KEYID = 5
5,346,976 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,363,090 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,363,870 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,369,579 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,375,471 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,381,172 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,389,118 UART: [afmc] --
5,390,134 UART: [cold-reset] --
5,390,974 UART: [state] Locking Datavault
5,392,071 UART: [state] Locking PCR0, PCR1 and PCR31
5,392,675 UART: [state] Locking ICCM
5,393,297 UART: [exit] Launching FMC @ 0x40000130
5,398,626 UART:
5,398,642 UART: Running Caliptra FMC ...
5,399,050 UART:
5,399,104 UART: [state] CFI Enabled
5,409,502 UART: [fht] FMC Alias Private Key: 7
5,517,534 UART: [art] Extend RT PCRs Done
5,517,962 UART: [art] Lock RT PCRs Done
5,519,848 UART: [art] Populate DV Done
5,528,244 UART: [fht] FMC Alias Private Key: 7
5,529,298 UART: [art] Derive CDI
5,529,578 UART: [art] Store in in slot 0x4
5,615,487 UART: [art] Derive Key Pair
5,615,847 UART: [art] Store priv key in slot 0x5
5,628,865 UART: [art] Derive Key Pair - Done
5,643,687 UART: [art] Signing Cert with AUTHO
5,644,167 UART: RITY.KEYID = 7
5,658,819 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,584 UART: [art] PUB.X = F93494F9127E17711BC19D5258A6BF228FD4314DEC49D6ED63DF40C68F3A1DBC066E051064D1D94F2103A337EA6FEEE3
5,666,355 UART: [art] PUB.Y = BC1B425A88A7495F2049A5D07940E1505956F67B26F01E1BC3DF7DA61E72145F9FBCFDDCC68885771764E3F9B0C39087
5,673,309 UART: [art] SIG.R = 4294CC5E1B605E7F3902044E8A8AE809D0D7AA30376788CFDE6AF48340395291675523C52821BDAD6FB731431F10AAA4
5,680,070 UART: [art] SIG.S = EFBCED43EC4532DFA8B1397DDC9949DC62E9F9A4C46A5B4842EB314C2A08FF54B8D20D6335EF7B4F80E0880CDE10B4CB
5,703,696 UART: Caliptra RT
5,703,949 UART: [state] CFI Enabled
5,812,302 UART: [rt] RT listening for mailbox commands...
5,812,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,068 UART: [rt]cmd =0x41544d4e, len=14344
6,859,319 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 ready_for_fw is high
1,362,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,158,945 >>> mbox cmd response: success
5,219,734 UART:
5,219,750 UART: Running Caliptra FMC ...
5,220,158 UART:
5,220,212 UART: [state] CFI Enabled
5,230,528 UART: [fht] FMC Alias Private Key: 7
5,338,222 UART: [art] Extend RT PCRs Done
5,338,650 UART: [art] Lock RT PCRs Done
5,340,268 UART: [art] Populate DV Done
5,348,506 UART: [fht] FMC Alias Private Key: 7
5,349,670 UART: [art] Derive CDI
5,349,950 UART: [art] Store in in slot 0x4
5,435,441 UART: [art] Derive Key Pair
5,435,801 UART: [art] Store priv key in slot 0x5
5,448,853 UART: [art] Derive Key Pair - Done
5,463,361 UART: [art] Signing Cert with AUTHO
5,463,841 UART: RITY.KEYID = 7
5,479,457 UART: [art] Erasing AUTHORITY.KEYID = 7
5,480,222 UART: [art] PUB.X = 40FB70CF09B2CEF63D6C475E60648C4B81EA2BB83EC42563E14409884CA2D8926ED292070BD61C4ABA5D4423281793EE
5,486,986 UART: [art] PUB.Y = 1F69291B66EFA22AAD54305E693B65D5240083F6BECFCD9C3AFF68298D29673C8C3BA47985EF384A956F0878D2785E13
5,493,915 UART: [art] SIG.R = F429803FFCAAFF9745C49B10E7B80F62BC2F1DC8299DD4E6FEAC29A8D01884225914CAECFBAB4EB89F19D45C41171CD3
5,500,704 UART: [art] SIG.S = CCA9AA654803281464C4C3F2E69A0CECCA2ABBF0FC7E9CE0AADB1B24D1A6E9E210F9BE071D7D41CC39A1B782C7857014
5,524,036 UART: Caliptra RT
5,524,289 UART: [state] CFI Enabled
5,631,765 UART: [rt] RT listening for mailbox commands...
5,632,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,493 UART: [rt]cmd =0x41544d4e, len=14344
6,673,596 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,498 UART: [kat] SHA2-256
882,429 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,544 UART: [kat] ++
886,696 UART: [kat] sha1
891,128 UART: [kat] SHA2-256
893,066 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,061 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,322 UART: [fht] Storing FHT @ 0x50003400
1,480,237 UART: [idev] ++
1,480,405 UART: [idev] CDI.KEYID = 6
1,480,765 UART: [idev] SUBJECT.KEYID = 7
1,481,189 UART: [idev] UDS.KEYID = 0
1,481,534 ready_for_fw is high
1,481,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,381 UART: [idev] Erasing UDS.KEYID = 0
1,506,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,681 UART: [idev] --
1,515,612 UART: [ldev] ++
1,515,780 UART: [ldev] CDI.KEYID = 6
1,516,143 UART: [ldev] SUBJECT.KEYID = 5
1,516,569 UART: [ldev] AUTHORITY.KEYID = 7
1,517,032 UART: [ldev] FE.KEYID = 1
1,522,328 UART: [ldev] Erasing FE.KEYID = 1
1,548,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,453 UART: [ldev] --
1,587,752 UART: [fwproc] Waiting for Commands...
1,588,461 UART: [fwproc] Received command 0x46574c44
1,589,252 UART: [fwproc] Received Image of size 114084 bytes
5,006,562 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,034,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,063,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,199,455 >>> mbox cmd response: success
5,200,687 UART: [afmc] ++
5,200,855 UART: [afmc] CDI.KEYID = 6
5,201,217 UART: [afmc] SUBJECT.KEYID = 7
5,201,642 UART: [afmc] AUTHORITY.KEYID = 5
5,237,272 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,253,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,254,434 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,260,143 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,266,035 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,271,736 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,279,550 UART: [afmc] --
5,280,542 UART: [cold-reset] --
5,281,248 UART: [state] Locking Datavault
5,282,453 UART: [state] Locking PCR0, PCR1 and PCR31
5,283,057 UART: [state] Locking ICCM
5,283,599 UART: [exit] Launching FMC @ 0x40000130
5,288,928 UART:
5,288,944 UART: Running Caliptra FMC ...
5,289,352 UART:
5,289,495 UART: [state] CFI Enabled
5,300,273 UART: [fht] FMC Alias Private Key: 7
5,408,063 UART: [art] Extend RT PCRs Done
5,408,491 UART: [art] Lock RT PCRs Done
5,410,125 UART: [art] Populate DV Done
5,418,485 UART: [fht] FMC Alias Private Key: 7
5,419,611 UART: [art] Derive CDI
5,419,891 UART: [art] Store in in slot 0x4
5,505,294 UART: [art] Derive Key Pair
5,505,654 UART: [art] Store priv key in slot 0x5
5,519,364 UART: [art] Derive Key Pair - Done
5,534,051 UART: [art] Signing Cert with AUTHO
5,534,531 UART: RITY.KEYID = 7
5,549,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,550,324 UART: [art] PUB.X = 6A22C873E681823428EEFD974963CA6FB228E098C3C940E2B6AB7783E0C5EC8B57636CE1B2679B8A97FF1F6739B6B6FC
5,557,102 UART: [art] PUB.Y = FA437F67062DA3C494EDE5BB060C3E4BE0468AF7579F8EB12F902B09F6E05DB9DD2A4114B71CDB64154379AEAA8B3815
5,564,054 UART: [art] SIG.R = 71BAF6F514F651C2BD66616F8923389437FFA09A3A52A452528D7660489C1195CB92034E221F676C3D37CC0B513053C4
5,570,810 UART: [art] SIG.S = 14DBED6BF6E3C2F94878F618BCA8CC038B5549E8413E79BB625A5D4D5AA48B29581C8DD08A87D27F6E8369BFF8A60868
5,594,127 UART: Caliptra RT
5,594,472 UART: [state] CFI Enabled
5,702,366 UART: [rt] RT listening for mailbox commands...
5,703,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,826,092 UART: [rt]cmd =0x41544d4e, len=14344
6,753,755 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,796 ready_for_fw is high
1,363,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,087,846 >>> mbox cmd response: success
5,149,853 UART:
5,149,869 UART: Running Caliptra FMC ...
5,150,277 UART:
5,150,420 UART: [state] CFI Enabled
5,160,792 UART: [fht] FMC Alias Private Key: 7
5,268,202 UART: [art] Extend RT PCRs Done
5,268,630 UART: [art] Lock RT PCRs Done
5,269,956 UART: [art] Populate DV Done
5,278,370 UART: [fht] FMC Alias Private Key: 7
5,279,314 UART: [art] Derive CDI
5,279,594 UART: [art] Store in in slot 0x4
5,365,685 UART: [art] Derive Key Pair
5,366,045 UART: [art] Store priv key in slot 0x5
5,378,989 UART: [art] Derive Key Pair - Done
5,393,662 UART: [art] Signing Cert with AUTHO
5,394,142 UART: RITY.KEYID = 7
5,410,022 UART: [art] Erasing AUTHORITY.KEYID = 7
5,410,787 UART: [art] PUB.X = DD164BA4E5B61313A6CB51540C4525D43EAD3F9089DC9B733361207C2B4B04F16FAED37ABF1A39498A5E3A6C23FDF3BE
5,417,567 UART: [art] PUB.Y = 42F17519E5EB4D9A177C4CEE9486805CEE6E32182D2220C8714B954A4981AA6EA997A6274040A729C063B58E38320716
5,424,506 UART: [art] SIG.R = A69E1025C3DE9F259CDC4ACA21494D5245E4F6107F93536377CB2BC1B4B50E0443C38C7708BA1F886B828A16F48299AE
5,431,271 UART: [art] SIG.S = 12924CF4981DA26F96756AC7921D596D6ED147C9BE52CD45129E0419C72044BC4CAF540F095F3BFBFF29187F05CC3387
5,455,614 UART: Caliptra RT
5,455,959 UART: [state] CFI Enabled
5,564,686 UART: [rt] RT listening for mailbox commands...
5,565,356 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,452 UART: [rt]cmd =0x41544d4e, len=14344
6,612,123 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
893,546 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,671 UART: [kat] ++
897,823 UART: [kat] sha1
902,095 UART: [kat] SHA2-256
904,035 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,864 UART: [kat] LMS
1,171,192 UART: [kat] --
1,172,251 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,474 UART: [idev] ++
1,175,642 UART: [idev] CDI.KEYID = 6
1,176,002 UART: [idev] SUBJECT.KEYID = 7
1,176,426 UART: [idev] UDS.KEYID = 0
1,176,771 ready_for_fw is high
1,176,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,488 UART: [idev] Erasing UDS.KEYID = 0
1,201,201 UART: [idev] Sha1 KeyId Algorithm
1,209,737 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,112 UART: [ldev] SUBJECT.KEYID = 5
1,211,538 UART: [ldev] AUTHORITY.KEYID = 7
1,212,001 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,243,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,625 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,758 UART: [fwproc] Recv command 0x46574c44
1,284,486 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,525 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,928 >>> mbox cmd response: success
3,320,120 UART: [afmc] ++
3,320,288 UART: [afmc] CDI.KEYID = 6
3,320,650 UART: [afmc] SUBJECT.KEYID = 7
3,321,075 UART: [afmc] AUTHORITY.KEYID = 5
3,355,893 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,050 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,759 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,651 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,362 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,251 UART: [afmc] --
3,399,205 UART: [cold-reset] --
3,400,007 UART: [state] Locking Datavault
3,401,570 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,174 UART: [state] Locking ICCM
3,402,642 UART: [exit] Launching FMC @ 0x40000130
3,407,971 UART:
3,407,987 UART: Running Caliptra FMC ...
3,408,395 UART:
3,408,449 UART: [state] CFI Enabled
3,419,043 UART: [fht] FMC Alias Private Key: 7
3,526,227 UART: [art] Extend RT PCRs Done
3,526,655 UART: [art] Lock RT PCRs Done
3,528,159 UART: [art] Populate DV Done
3,536,447 UART: [fht] FMC Alias Private Key: 7
3,537,595 UART: [art] Derive CDI
3,537,875 UART: [art] Store in in slot 0x4
3,623,776 UART: [art] Derive Key Pair
3,624,136 UART: [art] Store priv key in slot 0x5
3,637,012 UART: [art] Derive Key Pair - Done
3,651,797 UART: [art] Signing Cert with AUTHO
3,652,277 UART: RITY.KEYID = 7
3,667,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,134 UART: [art] PUB.X = 9FB21466231627149A07A376F223F001774DD07415BA58563D87F25ADE210514B314CA92B2015F83B579A77686EB89EC
3,674,882 UART: [art] PUB.Y = 3827E9BD383890AD22A9BDBD05A08B7DB10DAF2857A9E337527FFA0485733088F422984F5234B4DF233A4BD3A8BD69FF
3,681,831 UART: [art] SIG.R = F40CF6FBDCBC954E807367E0914C5BF6CEC8FD0D1FB12CF39887EFF16B0FB37D0D2F0D8514614E614D21FDDBB0F6123E
3,688,610 UART: [art] SIG.S = FDA2CDD2846963259C1DDD2BE3521D017F21F77808AC6531A5A7384E24ECB9B318E167772D93035C5563270623B858F5
3,712,581 UART: Caliptra RT
3,712,834 UART: [state] CFI Enabled
3,821,047 UART: [rt] RT listening for mailbox commands...
3,821,717 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,815 UART: [rt]cmd =0x41544d4e, len=14344
4,867,696 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,833 ready_for_fw is high
1,060,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,177,246 >>> mbox cmd response: success
3,238,887 UART:
3,238,903 UART: Running Caliptra FMC ...
3,239,311 UART:
3,239,365 UART: [state] CFI Enabled
3,249,895 UART: [fht] FMC Alias Private Key: 7
3,357,813 UART: [art] Extend RT PCRs Done
3,358,241 UART: [art] Lock RT PCRs Done
3,359,901 UART: [art] Populate DV Done
3,368,291 UART: [fht] FMC Alias Private Key: 7
3,369,243 UART: [art] Derive CDI
3,369,523 UART: [art] Store in in slot 0x4
3,455,280 UART: [art] Derive Key Pair
3,455,640 UART: [art] Store priv key in slot 0x5
3,468,426 UART: [art] Derive Key Pair - Done
3,483,298 UART: [art] Signing Cert with AUTHO
3,483,778 UART: RITY.KEYID = 7
3,499,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,793 UART: [art] PUB.X = BE77AF6E5200B04C8CBE61FC486FF7F51AB6CCAAA2021728E45FFC746CCC988CC8E421137949E94277B583EF8D8639E4
3,506,552 UART: [art] PUB.Y = 5E03E51658255B7DD8AD150826122EA4A1A64977B89000CB35153580C99CAA0643DA58885FDBCD681AE23008D3EB1407
3,513,463 UART: [art] SIG.R = E2721F0BD2E3922003CF65F89AFE22D76BD2BB09A3AC0452D89BB15FF1C2E493CD99DD5EC81A53A634C4632CD5EC1013
3,520,237 UART: [art] SIG.S = D6178159FC230F22D37A43D208909CB10801C67CE76C90414114EAB1DA4C58549538C4542B85C57A4EB9945FD8BDDFA8
3,543,790 UART: Caliptra RT
3,544,043 UART: [state] CFI Enabled
3,651,788 UART: [rt] RT listening for mailbox commands...
3,652,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,404 UART: [rt]cmd =0x41544d4e, len=14344
4,694,045 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
893,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,040 UART: [kat] ++
898,192 UART: [kat] sha1
902,444 UART: [kat] SHA2-256
904,384 UART: [kat] SHA2-384
907,123 UART: [kat] SHA2-512-ACC
909,024 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,253 UART: [kat] LMS
1,171,581 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,956 UART: [fht] FHT @ 0x50003400
1,175,445 UART: [idev] ++
1,175,613 UART: [idev] CDI.KEYID = 6
1,175,973 UART: [idev] SUBJECT.KEYID = 7
1,176,397 UART: [idev] UDS.KEYID = 0
1,176,742 ready_for_fw is high
1,176,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,209,498 UART: [idev] --
1,210,536 UART: [ldev] ++
1,210,704 UART: [ldev] CDI.KEYID = 6
1,211,067 UART: [ldev] SUBJECT.KEYID = 5
1,211,493 UART: [ldev] AUTHORITY.KEYID = 7
1,211,956 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,243,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,142 UART: [ldev] --
1,283,497 UART: [fwproc] Wait for Commands...
1,284,145 UART: [fwproc] Recv command 0x46574c44
1,284,873 UART: [fwproc] Recv'd Img size: 114084 bytes
3,123,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,315,968 >>> mbox cmd response: success
3,316,998 UART: [afmc] ++
3,317,166 UART: [afmc] CDI.KEYID = 6
3,317,528 UART: [afmc] SUBJECT.KEYID = 7
3,317,953 UART: [afmc] AUTHORITY.KEYID = 5
3,353,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,742 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,451 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,343 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,054 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,883 UART: [afmc] --
3,396,795 UART: [cold-reset] --
3,397,461 UART: [state] Locking Datavault
3,398,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,020 UART: [state] Locking ICCM
3,399,628 UART: [exit] Launching FMC @ 0x40000130
3,404,957 UART:
3,404,973 UART: Running Caliptra FMC ...
3,405,381 UART:
3,405,524 UART: [state] CFI Enabled
3,416,196 UART: [fht] FMC Alias Private Key: 7
3,523,796 UART: [art] Extend RT PCRs Done
3,524,224 UART: [art] Lock RT PCRs Done
3,525,722 UART: [art] Populate DV Done
3,533,962 UART: [fht] FMC Alias Private Key: 7
3,534,916 UART: [art] Derive CDI
3,535,196 UART: [art] Store in in slot 0x4
3,620,647 UART: [art] Derive Key Pair
3,621,007 UART: [art] Store priv key in slot 0x5
3,633,937 UART: [art] Derive Key Pair - Done
3,649,010 UART: [art] Signing Cert with AUTHO
3,649,490 UART: RITY.KEYID = 7
3,664,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,497 UART: [art] PUB.X = E88003064290233CDDEF2C1C772A3B456A520E3342A7D13550E2BDED7B23E0944FBD97EE43A5FDF64F32E9C7E73E97A3
3,672,268 UART: [art] PUB.Y = CE88BB37CA1DCF63356329D073B78F7C11FFF361C9E4EEC730F570BB78CE384868E04DBF7660DB4661EEEC3BBE9C0FFC
3,679,239 UART: [art] SIG.R = F635C9B69A2DA5F07E36A2766C685AC32F2E7D9814B2A7A0C6DC51534F408F4A1C027AEA994DCDC47B0A3311A44CAD26
3,686,017 UART: [art] SIG.S = F1C7C629860079B3A94A435281A881950CE663EA41CF24904F4D440E41A04B0548788F0EDB721B82E2F41DE1D6897C55
3,709,774 UART: Caliptra RT
3,710,119 UART: [state] CFI Enabled
3,817,064 UART: [rt] RT listening for mailbox commands...
3,817,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,660 UART: [rt]cmd =0x41544d4e, len=14344
4,856,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,082 ready_for_fw is high
1,061,082 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,567 >>> mbox cmd response: success
3,230,676 UART:
3,230,692 UART: Running Caliptra FMC ...
3,231,100 UART:
3,231,243 UART: [state] CFI Enabled
3,241,613 UART: [fht] FMC Alias Private Key: 7
3,349,663 UART: [art] Extend RT PCRs Done
3,350,091 UART: [art] Lock RT PCRs Done
3,351,443 UART: [art] Populate DV Done
3,359,653 UART: [fht] FMC Alias Private Key: 7
3,360,675 UART: [art] Derive CDI
3,360,955 UART: [art] Store in in slot 0x4
3,446,978 UART: [art] Derive Key Pair
3,447,338 UART: [art] Store priv key in slot 0x5
3,459,924 UART: [art] Derive Key Pair - Done
3,474,636 UART: [art] Signing Cert with AUTHO
3,475,116 UART: RITY.KEYID = 7
3,490,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,123 UART: [art] PUB.X = 8442B38B7E4D99F0A478F02EDD9A90D615CFBB766DA686A3544C75108807C9BD70761E9ABC070309DB217524CB789E3D
3,497,885 UART: [art] PUB.Y = 3C130D6272C6CC77E91C2AE8FACE51781CFC3D97B3950BF5844968820DA2A8BAF370642D08C1BACA12DF000E9DF53CC5
3,504,814 UART: [art] SIG.R = 3A420DA8F5E77BE1CFEAC1414E68B447251FD19A7A9232CC72BD28C1949D677E522AA4075AEB878B23D47F6725C7052A
3,511,583 UART: [art] SIG.S = 4BA55AAF4FBE246272A8242B13777F06A534E6B4DBBACEA2A98BC000A24645AE78D888536BBADF4D09E35B394837697D
3,535,514 UART: Caliptra RT
3,535,859 UART: [state] CFI Enabled
3,643,992 UART: [rt] RT listening for mailbox commands...
3,644,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,760 UART: [rt]cmd =0x41544d4e, len=14344
4,673,072 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
891,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,327 UART: [kat] SHA2-256
902,267 UART: [kat] SHA2-384
905,146 UART: [kat] SHA2-512-ACC
907,047 UART: [kat] ECC-384
916,854 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,663 UART: [cold-reset] ++
1,171,035 UART: [fht] FHT @ 0x50003400
1,173,771 UART: [idev] ++
1,173,939 UART: [idev] CDI.KEYID = 6
1,174,300 UART: [idev] SUBJECT.KEYID = 7
1,174,725 UART: [idev] UDS.KEYID = 0
1,175,071 ready_for_fw is high
1,175,071 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,959 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,242,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,586 UART: [fwproc] Wait for Commands...
1,282,343 UART: [fwproc] Recv command 0x46574c44
1,283,076 UART: [fwproc] Recv'd Img size: 114084 bytes
3,123,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,316,935 >>> mbox cmd response: success
3,317,956 UART: [afmc] ++
3,318,124 UART: [afmc] CDI.KEYID = 6
3,318,487 UART: [afmc] SUBJECT.KEYID = 7
3,318,913 UART: [afmc] AUTHORITY.KEYID = 5
3,353,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,554 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,264 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,154 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,865 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,765 UART: [afmc] --
3,397,827 UART: [cold-reset] --
3,398,523 UART: [state] Locking Datavault
3,399,706 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,310 UART: [state] Locking ICCM
3,400,930 UART: [exit] Launching FMC @ 0x40000130
3,406,259 UART:
3,406,275 UART: Running Caliptra FMC ...
3,406,683 UART:
3,406,737 UART: [state] CFI Enabled
3,417,619 UART: [fht] FMC Alias Private Key: 7
3,525,597 UART: [art] Extend RT PCRs Done
3,526,025 UART: [art] Lock RT PCRs Done
3,527,717 UART: [art] Populate DV Done
3,535,747 UART: [fht] FMC Alias Private Key: 7
3,536,783 UART: [art] Derive CDI
3,537,063 UART: [art] Store in in slot 0x4
3,622,996 UART: [art] Derive Key Pair
3,623,356 UART: [art] Store priv key in slot 0x5
3,636,344 UART: [art] Derive Key Pair - Done
3,650,847 UART: [art] Signing Cert with AUTHO
3,651,327 UART: RITY.KEYID = 7
3,666,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,150 UART: [art] PUB.X = BB903E7C328C3888BF921DF00A4C35579F1018B6C8FEB3F1819BF168371FD4B05905C91ECD8622409BDFF7703D1E6743
3,673,918 UART: [art] PUB.Y = D2EA7174699103C812A67BD05CEA710C22F60A47744957329FB6E7196BB4FE9E167A3C2DAFBCFB47754EA8C27596B342
3,680,865 UART: [art] SIG.R = 05DC6D58A0E38230C01840F166E5A4B95A90597B6997F08806B6EDF714F75F8CF348FBA32B2D6185F38D5892B9A4F268
3,687,629 UART: [art] SIG.S = 00DFD738420C0770E396C814059A51DBD5C550003CEA6B104806F70819C794A626D2585FE9AB86DD0C6F8AA8A35C51A6
3,711,174 UART: Caliptra RT
3,711,427 UART: [state] CFI Enabled
3,819,063 UART: [rt] RT listening for mailbox commands...
3,819,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,951 UART: [rt]cmd =0x41544d4e, len=14344
4,880,174 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,760 ready_for_fw is high
1,055,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,058 >>> mbox cmd response: success
3,227,961 UART:
3,227,977 UART: Running Caliptra FMC ...
3,228,385 UART:
3,228,439 UART: [state] CFI Enabled
3,239,177 UART: [fht] FMC Alias Private Key: 7
3,346,621 UART: [art] Extend RT PCRs Done
3,347,049 UART: [art] Lock RT PCRs Done
3,348,751 UART: [art] Populate DV Done
3,356,983 UART: [fht] FMC Alias Private Key: 7
3,357,989 UART: [art] Derive CDI
3,358,269 UART: [art] Store in in slot 0x4
3,443,528 UART: [art] Derive Key Pair
3,443,888 UART: [art] Store priv key in slot 0x5
3,456,826 UART: [art] Derive Key Pair - Done
3,471,737 UART: [art] Signing Cert with AUTHO
3,472,217 UART: RITY.KEYID = 7
3,487,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,000 UART: [art] PUB.X = A0EAB3EDA780A2125C1370C785D6BA82E3EA5E90F7ADD56570D2958EFAF4CA343B23BCAEEEAA529F68D8542B8C6C9DE0
3,494,796 UART: [art] PUB.Y = B2DE884B27D8EE2BBA4DC0E94B304C0E441AB1FAAEB84E97EC48333D5270F083E487EA157A2D78514AD8C82389BB2ACE
3,501,763 UART: [art] SIG.R = BA33D45455F226C824D7996653468575BC7B55E6E501BE28297F398C05944CF5D8934F102AC7703A58DF762CE3547177
3,508,517 UART: [art] SIG.S = E589CE1D10418643F79265AB925D4779AC92BBF838C32DD110C713774146F4D17C7C48990D895E7CDE7755336743DFF4
3,532,369 UART: Caliptra RT
3,532,622 UART: [state] CFI Enabled
3,639,889 UART: [rt] RT listening for mailbox commands...
3,640,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,705 UART: [rt]cmd =0x41544d4e, len=14344
4,684,221 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,851 UART: [kat] HMAC-384Kdf
921,667 UART: [kat] LMS
1,169,979 UART: [kat] --
1,170,892 UART: [cold-reset] ++
1,171,280 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
1,175,288 ready_for_fw is high
1,175,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,199,364 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,282,137 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114084 bytes
3,119,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,630 >>> mbox cmd response: success
3,312,675 UART: [afmc] ++
3,312,843 UART: [afmc] CDI.KEYID = 6
3,313,206 UART: [afmc] SUBJECT.KEYID = 7
3,313,632 UART: [afmc] AUTHORITY.KEYID = 5
3,349,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,311 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,021 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,911 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,622 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,484 UART: [afmc] --
3,392,562 UART: [cold-reset] --
3,393,396 UART: [state] Locking Datavault
3,394,397 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,001 UART: [state] Locking ICCM
3,395,525 UART: [exit] Launching FMC @ 0x40000130
3,400,854 UART:
3,400,870 UART: Running Caliptra FMC ...
3,401,278 UART:
3,401,421 UART: [state] CFI Enabled
3,412,143 UART: [fht] FMC Alias Private Key: 7
3,520,533 UART: [art] Extend RT PCRs Done
3,520,961 UART: [art] Lock RT PCRs Done
3,522,727 UART: [art] Populate DV Done
3,531,097 UART: [fht] FMC Alias Private Key: 7
3,532,147 UART: [art] Derive CDI
3,532,427 UART: [art] Store in in slot 0x4
3,618,276 UART: [art] Derive Key Pair
3,618,636 UART: [art] Store priv key in slot 0x5
3,632,266 UART: [art] Derive Key Pair - Done
3,646,978 UART: [art] Signing Cert with AUTHO
3,647,458 UART: RITY.KEYID = 7
3,662,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,115 UART: [art] PUB.X = 30263BEA5E95BD9457E7D1D801290A0CBC597F0AAD9D5E118ADD7784D469443BF68CE730BA42C78358C6E87DA10CE0AA
3,669,884 UART: [art] PUB.Y = AF0C477F269360526C8E21B49162B14F2CA7294768221AE4CCB4DBE220E3376F9F82BF990B8705241774E3A35D756041
3,676,819 UART: [art] SIG.R = 576FB0CE0BF055935D1100B853318949D2AAC52F88F59C6FCEE6447F812170B4910774BECA1A83D82520241FD37C5655
3,683,559 UART: [art] SIG.S = 1CED5502A96C338D627A0340607737A1A7A67EE85190733C36CBA6CDBEBCF2731B4E9103F84DF41CF54DD693A70A4881
3,706,982 UART: Caliptra RT
3,707,327 UART: [state] CFI Enabled
3,815,158 UART: [rt] RT listening for mailbox commands...
3,815,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,028 UART: [rt]cmd =0x41544d4e, len=14344
4,873,986 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,997 ready_for_fw is high
1,056,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,156,515 >>> mbox cmd response: success
3,218,914 UART:
3,218,930 UART: Running Caliptra FMC ...
3,219,338 UART:
3,219,481 UART: [state] CFI Enabled
3,230,397 UART: [fht] FMC Alias Private Key: 7
3,339,147 UART: [art] Extend RT PCRs Done
3,339,575 UART: [art] Lock RT PCRs Done
3,341,111 UART: [art] Populate DV Done
3,349,385 UART: [fht] FMC Alias Private Key: 7
3,350,443 UART: [art] Derive CDI
3,350,723 UART: [art] Store in in slot 0x4
3,436,120 UART: [art] Derive Key Pair
3,436,480 UART: [art] Store priv key in slot 0x5
3,449,646 UART: [art] Derive Key Pair - Done
3,464,448 UART: [art] Signing Cert with AUTHO
3,464,928 UART: RITY.KEYID = 7
3,480,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,295 UART: [art] PUB.X = BACA4E67494CB9A9FF3EFE93336D3EA39A663F2BA941253042E31C1616BBA409EC180ABC670E959326268B75140267DF
3,488,059 UART: [art] PUB.Y = 2B9B645174831C1DABA347C1C2C55F51E1B0D995D8C7AF9C8C2E6F1ABBCCC534D8473E0718F9C15A666059F0AF544E82
3,495,018 UART: [art] SIG.R = 184FA515CE6F5A2CEF004A6436B62BE2F547AFA86DBF6F71F9B07F8BB9C4DB39CC4A9C0CC9B992725AD71FE80CE47C05
3,501,781 UART: [art] SIG.S = 67696DD6F05E250EF5907536F41AE25B78738EF1F529E2174B31BF9424C8D16A4F7F4C816C1DDD781A1C9897995F153B
3,526,167 UART: Caliptra RT
3,526,512 UART: [state] CFI Enabled
3,635,071 UART: [rt] RT listening for mailbox commands...
3,635,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,731 UART: [rt]cmd =0x41544d4e, len=14344
4,679,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,418 UART:
192,781 UART: Running Caliptra ROM ...
193,993 UART:
194,155 UART: [state] CFI Enabled
265,476 UART: [state] LifecycleState = Unprovisioned
267,388 UART: [state] DebugLocked = No
268,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,814 UART: [kat] SHA2-256
443,537 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,057 UART: [kat] ++
454,550 UART: [kat] sha1
465,923 UART: [kat] SHA2-256
468,641 UART: [kat] SHA2-384
474,082 UART: [kat] SHA2-512-ACC
476,451 UART: [kat] ECC-384
2,765,232 UART: [kat] HMAC-384Kdf
2,777,856 UART: [kat] LMS
3,968,205 UART: [kat] --
3,973,865 UART: [cold-reset] ++
3,976,012 UART: [fht] Storing FHT @ 0x50003400
3,986,144 UART: [idev] ++
3,986,705 UART: [idev] CDI.KEYID = 6
3,987,589 UART: [idev] SUBJECT.KEYID = 7
3,988,901 UART: [idev] UDS.KEYID = 0
3,989,981 ready_for_fw is high
3,990,186 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,290 UART: [idev] Erasing UDS.KEYID = 0
7,324,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,269 UART: [idev] --
7,351,335 UART: [ldev] ++
7,351,907 UART: [ldev] CDI.KEYID = 6
7,352,881 UART: [ldev] SUBJECT.KEYID = 5
7,354,102 UART: [ldev] AUTHORITY.KEYID = 7
7,355,338 UART: [ldev] FE.KEYID = 1
7,399,369 UART: [ldev] Erasing FE.KEYID = 1
10,730,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,988 UART: [ldev] --
13,091,233 UART: [fwproc] Waiting for Commands...
13,092,948 UART: [fwproc] Received command 0x46574c44
13,095,139 UART: [fwproc] Received Image of size 113760 bytes
21,734,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,813,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,882,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,197,388 >>> mbox cmd response: success
22,202,153 UART: [afmc] ++
22,202,754 UART: [afmc] CDI.KEYID = 6
22,203,722 UART: [afmc] SUBJECT.KEYID = 7
22,204,933 UART: [afmc] AUTHORITY.KEYID = 5
25,569,741 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,871,420 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,873,729 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,888,252 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,903,026 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,917,211 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,939,162 UART: [afmc] --
27,942,916 UART: [cold-reset] --
27,946,359 UART: [state] Locking Datavault
27,950,978 UART: [state] Locking PCR0, PCR1 and PCR31
27,952,732 UART: [state] Locking ICCM
27,955,558 UART: [exit] Launching FMC @ 0x40000130
27,963,952 UART:
27,964,183 UART: Running Caliptra FMC ...
27,965,212 UART:
27,965,359 UART: [state] CFI Enabled
28,030,674 UART: [fht] FMC Alias Private Key: 7
30,369,068 UART: [art] Extend RT PCRs Done
30,370,298 UART: [art] Lock RT PCRs Done
30,371,899 UART: [art] Populate DV Done
30,377,093 UART: [fht] FMC Alias Private Key: 7
30,378,684 UART: [art] Derive CDI
30,379,426 UART: [art] Store in in slot 0x4
30,439,634 UART: [art] Derive Key Pair
30,440,674 UART: [art] Store priv key in slot 0x5
33,733,537 UART: [art] Derive Key Pair - Done
33,746,805 UART: [art] Signing Cert with AUTHO
33,748,112 UART: RITY.KEYID = 7
36,035,861 UART: [art] Erasing AUTHORITY.KEYID = 7
36,037,377 UART: [art] PUB.X = 7F218010E676607B0B4B25846876C77135CB4DB1F54C2BE1019AFE770B58EB7C5AFD3C0889F842392A6CD6F7F9BBE829
36,044,584 UART: [art] PUB.Y = 7C10B3B5E15777F2288326B8C1D7121328B2FDFB70B8CAD72DE502FF88EC4B987554DA138A1B9C664037E536C0416A1B
36,051,817 UART: [art] SIG.R = 6722D7AB8C66ADAF663534B4C3F9050EA2B5A9BAA887948D4AC0D6A9A9AD615959B06F2D666074820BF2F864327C2B22
36,059,209 UART: [art] SIG.S = 560BEA35FF3CBB2974E1815B57B3E6FDDA41F7B7A83076D970CE5D9D7D104E10FF5045552242323303A5D76710B28203
37,364,181 UART: Caliptra RT
37,365,720 UART: [state] CFI Enabled
37,527,808 UART: [rt] RT listening for mailbox commands...
37,530,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,686,392 UART: [rt]cmd =0x41544d4e, len=14344
45,269,869 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,805,261 ready_for_fw is high
3,805,634 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,716,796 >>> mbox cmd response: success
27,405,453 UART:
27,405,842 UART: Running Caliptra FMC ...
27,406,971 UART:
27,407,133 UART: [state] CFI Enabled
27,475,757 UART: [fht] FMC Alias Private Key: 7
29,813,465 UART: [art] Extend RT PCRs Done
29,814,713 UART: [art] Lock RT PCRs Done
29,815,912 UART: [art] Populate DV Done
29,821,706 UART: [fht] FMC Alias Private Key: 7
29,823,241 UART: [art] Derive CDI
29,824,012 UART: [art] Store in in slot 0x4
29,884,250 UART: [art] Derive Key Pair
29,885,245 UART: [art] Store priv key in slot 0x5
33,178,975 UART: [art] Derive Key Pair - Done
33,191,867 UART: [art] Signing Cert with AUTHO
33,193,207 UART: RITY.KEYID = 7
35,480,886 UART: [art] Erasing AUTHORITY.KEYID = 7
35,482,398 UART: [art] PUB.X = 82025AF97DDF649CAA6231CB8E5F458464E8A2EA0537F115A1B440AE87D7D01864D3EAC681626F2C18F369717A142086
35,489,670 UART: [art] PUB.Y = 075C3C73BDA671B52F27BF53EE0956DE8A7C7750280CA2D4EEB03B107D510C233EBA2D883B0CE7C917DB25C4611F08F6
35,496,887 UART: [art] SIG.R = 11E99B5F582511EFF9DE41470FA7E1E12B6227D5915C82976A32E97797639C3A78EE585BA495075B6A284F4346009274
35,504,288 UART: [art] SIG.S = ABACD177A61ABC0E5A032380C3E2D1B02D5B2082E4874E30A01229F35E7F4B17144E5C8EE64FB1484DEE5D83F1D60B14
36,809,484 UART: Caliptra RT
36,810,228 UART: [state] CFI Enabled
36,972,822 UART: [rt] RT listening for mailbox commands...
36,975,136 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,130,277 UART: [rt]cmd =0x41544d4e, len=14344
44,584,007 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,858 writing to cptra_bootfsm_go
194,106 UART:
194,455 UART: Running Caliptra ROM ...
195,648 UART:
605,315 UART: [state] CFI Enabled
617,434 UART: [state] LifecycleState = Unprovisioned
619,382 UART: [state] DebugLocked = No
620,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,043 UART: [kat] SHA2-256
795,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,324 UART: [kat] ++
806,774 UART: [kat] sha1
818,069 UART: [kat] SHA2-256
820,791 UART: [kat] SHA2-384
826,918 UART: [kat] SHA2-512-ACC
829,290 UART: [kat] ECC-384
3,115,111 UART: [kat] HMAC-384Kdf
3,125,534 UART: [kat] LMS
4,315,663 UART: [kat] --
4,319,026 UART: [cold-reset] ++
4,320,388 UART: [fht] Storing FHT @ 0x50003400
4,331,065 UART: [idev] ++
4,331,723 UART: [idev] CDI.KEYID = 6
4,332,647 UART: [idev] SUBJECT.KEYID = 7
4,333,891 UART: [idev] UDS.KEYID = 0
4,334,970 ready_for_fw is high
4,335,216 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,008 UART: [idev] Erasing UDS.KEYID = 0
7,622,047 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,474 UART: [idev] --
7,646,038 UART: [ldev] ++
7,646,619 UART: [ldev] CDI.KEYID = 6
7,647,588 UART: [ldev] SUBJECT.KEYID = 5
7,648,816 UART: [ldev] AUTHORITY.KEYID = 7
7,650,045 UART: [ldev] FE.KEYID = 1
7,661,606 UART: [ldev] Erasing FE.KEYID = 1
10,948,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,219 UART: [ldev] --
13,310,412 UART: [fwproc] Waiting for Commands...
13,313,261 UART: [fwproc] Received command 0x46574c44
13,315,440 UART: [fwproc] Received Image of size 113760 bytes
22,423,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,497,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,566,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,882,398 >>> mbox cmd response: success
22,886,531 UART: [afmc] ++
22,887,126 UART: [afmc] CDI.KEYID = 6
22,888,152 UART: [afmc] SUBJECT.KEYID = 7
22,889,312 UART: [afmc] AUTHORITY.KEYID = 5
26,201,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,495,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,498,103 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,512,695 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,527,432 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,541,652 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,563,632 UART: [afmc] --
28,566,668 UART: [cold-reset] --
28,570,585 UART: [state] Locking Datavault
28,574,219 UART: [state] Locking PCR0, PCR1 and PCR31
28,575,917 UART: [state] Locking ICCM
28,578,360 UART: [exit] Launching FMC @ 0x40000130
28,586,717 UART:
28,586,959 UART: Running Caliptra FMC ...
28,588,056 UART:
28,588,218 UART: [state] CFI Enabled
28,595,936 UART: [fht] FMC Alias Private Key: 7
30,927,464 UART: [art] Extend RT PCRs Done
30,928,695 UART: [art] Lock RT PCRs Done
30,930,266 UART: [art] Populate DV Done
30,935,831 UART: [fht] FMC Alias Private Key: 7
30,937,368 UART: [art] Derive CDI
30,938,177 UART: [art] Store in in slot 0x4
30,980,772 UART: [art] Derive Key Pair
30,981,803 UART: [art] Store priv key in slot 0x5
34,223,600 UART: [art] Derive Key Pair - Done
34,236,597 UART: [art] Signing Cert with AUTHO
34,237,906 UART: RITY.KEYID = 7
36,517,373 UART: [art] Erasing AUTHORITY.KEYID = 7
36,518,885 UART: [art] PUB.X = 499FC9D9F90F1962BF49BD1FB2FED0C0AB66C4730085042492F6546605738A318C95EE3FD52371E12A1FBDF5F1B0D647
36,526,106 UART: [art] PUB.Y = 1EFF2D7F995EA1B09BE0126D4730E3DB3719405139F80AAD1C63BF548A43E32F04E41A638BB9FCB0A364D9CAA4F0D2C5
36,533,357 UART: [art] SIG.R = 1C9A868597398EFBEA35F15294B06C930D154F917B5529CC3502FD7504C8ADC19C4EEAF5417E1C2DB8C5975420B8F549
36,540,780 UART: [art] SIG.S = 75E38E2860ACD4E8D702493CF45306DD35ED8BCB080E3E64AA8EFA3C936A3198D5992DBFB487477057DEEFCA1F1FDB20
37,846,089 UART: Caliptra RT
37,846,801 UART: [state] CFI Enabled
37,964,078 UART: [rt] RT listening for mailbox commands...
37,966,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,121,713 UART: [rt]cmd =0x41544d4e, len=14344
45,678,875 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
4,132,057 ready_for_fw is high
4,132,465 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,584,060 >>> mbox cmd response: success
28,221,497 UART:
28,221,877 UART: Running Caliptra FMC ...
28,222,973 UART:
28,223,124 UART: [state] CFI Enabled
28,231,103 UART: [fht] FMC Alias Private Key: 7
30,562,431 UART: [art] Extend RT PCRs Done
30,563,654 UART: [art] Lock RT PCRs Done
30,564,990 UART: [art] Populate DV Done
30,570,405 UART: [fht] FMC Alias Private Key: 7
30,572,052 UART: [art] Derive CDI
30,572,792 UART: [art] Store in in slot 0x4
30,615,088 UART: [art] Derive Key Pair
30,616,137 UART: [art] Store priv key in slot 0x5
33,857,769 UART: [art] Derive Key Pair - Done
33,871,041 UART: [art] Signing Cert with AUTHO
33,872,345 UART: RITY.KEYID = 7
36,151,843 UART: [art] Erasing AUTHORITY.KEYID = 7
36,153,349 UART: [art] PUB.X = 66A82B3B0E7F9A2F450A3A69D890859B1BEB38FC901E6F5F2A27522FF2E6E9A50A6E286C6BD1CD14F32CF7EEA3525DCA
36,160,643 UART: [art] PUB.Y = 1ADFF2927DDAF55C7638AFD7E85E1C769E30AE2F48B01834FE65D43CF0A2617BDACF05955D309185E940512518275891
36,167,902 UART: [art] SIG.R = F980C0189791D5DC4CA17B2636A052D91FCA420E3743252D419DBE4F7C8CB748D502ADFCAAF70534621ABEFA0365C14D
36,175,228 UART: [art] SIG.S = 2763C9BC7E04B9948AAFB1B399B13684CE61901002FD27B271C0E951370E1D5614D773425C05EF7FAE046A951ECC6C37
37,480,468 UART: Caliptra RT
37,481,182 UART: [state] CFI Enabled
37,599,589 UART: [rt] RT listening for mailbox commands...
37,601,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,757,095 UART: [rt]cmd =0x41544d4e, len=14344
45,211,038 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
192,812 UART:
193,183 UART: Running Caliptra ROM ...
194,370 UART:
194,525 UART: [state] CFI Enabled
264,528 UART: [state] LifecycleState = Unprovisioned
266,408 UART: [state] DebugLocked = No
268,235 UART: [state] WD Timer not started. Device not locked for debugging
271,871 UART: [kat] SHA2-256
450,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,518 UART: [kat] ++
463,052 UART: [kat] sha1
473,297 UART: [kat] SHA2-256
476,306 UART: [kat] SHA2-384
482,499 UART: [kat] SHA2-512-ACC
485,428 UART: [kat] ECC-384
2,947,509 UART: [kat] HMAC-384Kdf
2,972,833 UART: [kat] LMS
3,502,292 UART: [kat] --
3,505,649 UART: [cold-reset] ++
3,508,213 UART: [fht] FHT @ 0x50003400
3,518,332 UART: [idev] ++
3,518,906 UART: [idev] CDI.KEYID = 6
3,519,785 UART: [idev] SUBJECT.KEYID = 7
3,521,025 UART: [idev] UDS.KEYID = 0
3,521,931 ready_for_fw is high
3,522,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,710 UART: [idev] Erasing UDS.KEYID = 0
6,031,811 UART: [idev] Sha1 KeyId Algorithm
6,055,115 UART: [idev] --
6,059,056 UART: [ldev] ++
6,059,626 UART: [ldev] CDI.KEYID = 6
6,060,509 UART: [ldev] SUBJECT.KEYID = 5
6,061,718 UART: [ldev] AUTHORITY.KEYID = 7
6,062,949 UART: [ldev] FE.KEYID = 1
6,100,802 UART: [ldev] Erasing FE.KEYID = 1
8,602,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,245 UART: [ldev] --
10,413,597 UART: [fwproc] Wait for Commands...
10,416,718 UART: [fwproc] Recv command 0x46574c44
10,418,762 UART: [fwproc] Recv'd Img size: 114084 bytes
14,969,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,046,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,115,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,431,901 >>> mbox cmd response: success
15,437,079 UART: [afmc] ++
15,437,672 UART: [afmc] CDI.KEYID = 6
15,438,556 UART: [afmc] SUBJECT.KEYID = 7
15,439,765 UART: [afmc] AUTHORITY.KEYID = 5
17,980,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,811 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,769 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,737,771 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,753,500 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,883 UART: [afmc] --
19,781,484 UART: [cold-reset] --
19,784,804 UART: [state] Locking Datavault
19,791,136 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,834 UART: [state] Locking ICCM
19,794,199 UART: [exit] Launching FMC @ 0x40000130
19,802,642 UART:
19,802,870 UART: Running Caliptra FMC ...
19,803,896 UART:
19,804,043 UART: [state] CFI Enabled
19,864,179 UART: [fht] FMC Alias Private Key: 7
21,627,595 UART: [art] Extend RT PCRs Done
21,628,810 UART: [art] Lock RT PCRs Done
21,630,892 UART: [art] Populate DV Done
21,636,419 UART: [fht] FMC Alias Private Key: 7
21,637,898 UART: [art] Derive CDI
21,638,630 UART: [art] Store in in slot 0x4
21,696,420 UART: [art] Derive Key Pair
21,697,456 UART: [art] Store priv key in slot 0x5
24,159,636 UART: [art] Derive Key Pair - Done
24,172,795 UART: [art] Signing Cert with AUTHO
24,174,132 UART: RITY.KEYID = 7
25,885,827 UART: [art] Erasing AUTHORITY.KEYID = 7
25,887,332 UART: [art] PUB.X = 4A095C37363CE68C5CDB81DBF8F333FBB9CAE7514AB89D875EB5BD0A72FAC8ACB588C20EF275E6D1D1EA1E1C8B18C638
25,894,598 UART: [art] PUB.Y = A3CCAFC729A6B1FB48968DF21CBEDA44E1C4D8541E80B76C80C9ED5D72EACA2AE584371844F6141B19688A187A6CCE00
25,901,867 UART: [art] SIG.R = D0116900FB75ACFFF23509DC2A98E89DD789344909B1F9F67086571C75DD57B870F3B2372507258BBA6087E63BDDD681
25,909,289 UART: [art] SIG.S = DFDD1841A0AD7F5AC36EA56DE02D354F90438C3E99BC219958496E5B2FFE987FB9BC053CF032A7BEF6221DCB33675260
26,887,939 UART: Caliptra RT
26,888,631 UART: [state] CFI Enabled
27,051,970 UART: [rt] RT listening for mailbox commands...
27,054,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,667 UART: [rt]cmd =0x41544d4e, len=14344
31,742,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,273 writing to cptra_bootfsm_go
3,363,329 ready_for_fw is high
3,363,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,044,165 >>> mbox cmd response: success
19,327,041 UART:
19,327,451 UART: Running Caliptra FMC ...
19,328,611 UART:
19,328,776 UART: [state] CFI Enabled
19,396,019 UART: [fht] FMC Alias Private Key: 7
21,159,894 UART: [art] Extend RT PCRs Done
21,161,134 UART: [art] Lock RT PCRs Done
21,162,326 UART: [art] Populate DV Done
21,167,789 UART: [fht] FMC Alias Private Key: 7
21,169,337 UART: [art] Derive CDI
21,170,156 UART: [art] Store in in slot 0x4
21,228,940 UART: [art] Derive Key Pair
21,229,981 UART: [art] Store priv key in slot 0x5
23,693,097 UART: [art] Derive Key Pair - Done
23,706,374 UART: [art] Signing Cert with AUTHO
23,707,685 UART: RITY.KEYID = 7
25,419,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,420,508 UART: [art] PUB.X = C3D272D229CD488A481E0C11EA23F1875C7C06456718E3A809A2810205CF694303B58F609585C6C37FB18C963F998863
25,427,755 UART: [art] PUB.Y = 6D127291CEDEC57B4F1D7FA7F9F878387E791D2C93E383F741FB20B2067696A519A2E5AEDA558AD3B2CE9E5DB8AA454C
25,435,012 UART: [art] SIG.R = B6B0E7FDFC535AD8A211D65DA13ABCE7492F085B15D728BEE36C2D2F6284DE44D46D025DBAC7353F25056B8216AB4685
25,442,531 UART: [art] SIG.S = 6B40F0C7AA6D0CED1B3EEFDF2171152CAFBD0F0B414EB7A0F6389E27327D4D5C82740FC858B30D0EEC8A2B3C9611A89A
26,421,074 UART: Caliptra RT
26,421,773 UART: [state] CFI Enabled
26,587,871 UART: [rt] RT listening for mailbox commands...
26,590,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,745,735 UART: [rt]cmd =0x41544d4e, len=14344
31,285,332 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,122 writing to cptra_bootfsm_go
194,278 UART:
194,647 UART: Running Caliptra ROM ...
195,738 UART:
605,572 UART: [state] CFI Enabled
622,217 UART: [state] LifecycleState = Unprovisioned
624,105 UART: [state] DebugLocked = No
626,000 UART: [state] WD Timer not started. Device not locked for debugging
629,847 UART: [kat] SHA2-256
808,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,524 UART: [kat] ++
821,061 UART: [kat] sha1
832,515 UART: [kat] SHA2-256
835,520 UART: [kat] SHA2-384
841,226 UART: [kat] SHA2-512-ACC
844,161 UART: [kat] ECC-384
3,286,906 UART: [kat] HMAC-384Kdf
3,299,511 UART: [kat] LMS
3,829,001 UART: [kat] --
3,833,441 UART: [cold-reset] ++
3,834,463 UART: [fht] FHT @ 0x50003400
3,844,407 UART: [idev] ++
3,845,029 UART: [idev] CDI.KEYID = 6
3,845,955 UART: [idev] SUBJECT.KEYID = 7
3,847,065 UART: [idev] UDS.KEYID = 0
3,847,999 ready_for_fw is high
3,848,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,307 UART: [idev] Erasing UDS.KEYID = 0
6,323,539 UART: [idev] Sha1 KeyId Algorithm
6,346,773 UART: [idev] --
6,350,445 UART: [ldev] ++
6,351,020 UART: [ldev] CDI.KEYID = 6
6,351,934 UART: [ldev] SUBJECT.KEYID = 5
6,353,149 UART: [ldev] AUTHORITY.KEYID = 7
6,354,382 UART: [ldev] FE.KEYID = 1
6,366,000 UART: [ldev] Erasing FE.KEYID = 1
8,841,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,220 UART: [ldev] --
10,631,651 UART: [fwproc] Wait for Commands...
10,633,367 UART: [fwproc] Recv command 0x46574c44
10,635,412 UART: [fwproc] Recv'd Img size: 114084 bytes
15,179,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,255,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,324,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,642,362 >>> mbox cmd response: success
15,646,365 UART: [afmc] ++
15,646,959 UART: [afmc] CDI.KEYID = 6
15,647,871 UART: [afmc] SUBJECT.KEYID = 7
15,649,086 UART: [afmc] AUTHORITY.KEYID = 5
18,149,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,872,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,874,892 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,890,852 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,906,797 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,922,570 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,945,953 UART: [afmc] --
19,950,052 UART: [cold-reset] --
19,953,219 UART: [state] Locking Datavault
19,959,061 UART: [state] Locking PCR0, PCR1 and PCR31
19,960,727 UART: [state] Locking ICCM
19,962,771 UART: [exit] Launching FMC @ 0x40000130
19,971,175 UART:
19,971,411 UART: Running Caliptra FMC ...
19,972,519 UART:
19,972,681 UART: [state] CFI Enabled
19,981,054 UART: [fht] FMC Alias Private Key: 7
21,737,591 UART: [art] Extend RT PCRs Done
21,738,803 UART: [art] Lock RT PCRs Done
21,740,719 UART: [art] Populate DV Done
21,746,128 UART: [fht] FMC Alias Private Key: 7
21,747,829 UART: [art] Derive CDI
21,748,570 UART: [art] Store in in slot 0x4
21,791,225 UART: [art] Derive Key Pair
21,792,264 UART: [art] Store priv key in slot 0x5
24,218,418 UART: [art] Derive Key Pair - Done
24,231,100 UART: [art] Signing Cert with AUTHO
24,232,411 UART: RITY.KEYID = 7
25,937,977 UART: [art] Erasing AUTHORITY.KEYID = 7
25,939,473 UART: [art] PUB.X = E0F955D585CDE8F76BCD67F89BD7BA3C791C1C98C3303B825AD33F63C2FEC04CDA23DDE706091A93414E2BA7650F813C
25,946,800 UART: [art] PUB.Y = 70DA6EDE6027B34405233A4B26692ABDBBEDC3E19B8BB57ADA325CA54A8C97A2360856A68B33B431F909530C3842F5D2
25,954,061 UART: [art] SIG.R = 57D6F13E23C48DBC51435D9DBD8CAA86E13CCA961067495F39D3F9673226385C343B258A7E4B81CAF8A78824C03D08D8
25,961,442 UART: [art] SIG.S = DB77E86ECC20C73458F2353F45845A7D03164EDA367E892750E4C4449F232126C039CC0365B0D74FDEA5CDA0C91EFA69
26,940,883 UART: Caliptra RT
26,941,601 UART: [state] CFI Enabled
27,058,523 UART: [rt] RT listening for mailbox commands...
27,060,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,216,141 UART: [rt]cmd =0x41544d4e, len=14344
31,752,167 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,031 writing to cptra_bootfsm_go
3,697,873 ready_for_fw is high
3,698,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,241,567 >>> mbox cmd response: success
19,494,993 UART:
19,495,386 UART: Running Caliptra FMC ...
19,496,512 UART:
19,496,675 UART: [state] CFI Enabled
19,505,105 UART: [fht] FMC Alias Private Key: 7
21,261,756 UART: [art] Extend RT PCRs Done
21,263,005 UART: [art] Lock RT PCRs Done
21,264,802 UART: [art] Populate DV Done
21,270,303 UART: [fht] FMC Alias Private Key: 7
21,271,912 UART: [art] Derive CDI
21,272,735 UART: [art] Store in in slot 0x4
21,315,392 UART: [art] Derive Key Pair
21,316,398 UART: [art] Store priv key in slot 0x5
23,743,430 UART: [art] Derive Key Pair - Done
23,756,426 UART: [art] Signing Cert with AUTHO
23,757,731 UART: RITY.KEYID = 7
25,463,420 UART: [art] Erasing AUTHORITY.KEYID = 7
25,464,924 UART: [art] PUB.X = 7DD6A8B009656250104DE48AFDAA54A674614F2F6B294EFDE390DAE869E3E3273ADE8A47932003911D9B9080DFF0CA15
25,472,207 UART: [art] PUB.Y = 24BAF905B0CF1041ACE501B89D856E1392725DAD3173E33D7E0357476E38D1E79665CE5A3AECE764DF464B95EC472C4E
25,479,492 UART: [art] SIG.R = 1BBBCF1EBB7E5F86266D40C406B7EA0D565B553C3861BD430142BA5444EE7225BB332B061B8AFE613360F805C957EBDC
25,486,871 UART: [art] SIG.S = 3BCA1994B4750A608AD59257CD719DB3679ED2E4AAB2D0B53EC13648B38521CC68C8A9021F2A1957E6CEE3CA77E93373
26,465,510 UART: Caliptra RT
26,466,242 UART: [state] CFI Enabled
26,583,500 UART: [rt] RT listening for mailbox commands...
26,585,782 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,741,088 UART: [rt]cmd =0x41544d4e, len=14344
31,281,924 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,353 UART:
192,748 UART: Running Caliptra ROM ...
193,959 UART:
194,108 UART: [state] CFI Enabled
263,689 UART: [state] LifecycleState = Unprovisioned
266,051 UART: [state] DebugLocked = No
268,143 UART: [state] WD Timer not started. Device not locked for debugging
271,888 UART: [kat] SHA2-256
461,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,304 UART: [kat] ++
472,777 UART: [kat] sha1
482,653 UART: [kat] SHA2-256
485,731 UART: [kat] SHA2-384
491,099 UART: [kat] SHA2-512-ACC
493,684 UART: [kat] ECC-384
2,949,856 UART: [kat] HMAC-384Kdf
2,972,678 UART: [kat] LMS
3,504,429 UART: [kat] --
3,508,568 UART: [cold-reset] ++
3,509,851 UART: [fht] FHT @ 0x50003400
3,522,675 UART: [idev] ++
3,523,312 UART: [idev] CDI.KEYID = 6
3,524,267 UART: [idev] SUBJECT.KEYID = 7
3,525,504 UART: [idev] UDS.KEYID = 0
3,526,405 ready_for_fw is high
3,526,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,570 UART: [idev] Erasing UDS.KEYID = 0
6,028,428 UART: [idev] Sha1 KeyId Algorithm
6,051,713 UART: [idev] --
6,056,644 UART: [ldev] ++
6,057,385 UART: [ldev] CDI.KEYID = 6
6,058,298 UART: [ldev] SUBJECT.KEYID = 5
6,059,460 UART: [ldev] AUTHORITY.KEYID = 7
6,060,637 UART: [ldev] FE.KEYID = 1
6,099,852 UART: [ldev] Erasing FE.KEYID = 1
8,604,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,521 UART: [ldev] --
10,411,566 UART: [fwproc] Wait for Commands...
10,413,274 UART: [fwproc] Recv command 0x46574c44
10,415,574 UART: [fwproc] Recv'd Img size: 114084 bytes
15,049,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,136,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,252,183 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,792,578 >>> mbox cmd response: success
15,796,957 UART: [afmc] ++
15,797,665 UART: [afmc] CDI.KEYID = 6
15,798,780 UART: [afmc] SUBJECT.KEYID = 7
15,800,278 UART: [afmc] AUTHORITY.KEYID = 5
18,348,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,091,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,093,815 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,108,941 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,124,098 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,138,922 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,164,089 UART: [afmc] --
20,168,057 UART: [cold-reset] --
20,171,928 UART: [state] Locking Datavault
20,178,020 UART: [state] Locking PCR0, PCR1 and PCR31
20,180,236 UART: [state] Locking ICCM
20,181,464 UART: [exit] Launching FMC @ 0x40000130
20,190,176 UART:
20,190,482 UART: Running Caliptra FMC ...
20,191,523 UART:
20,191,670 UART: [state] CFI Enabled
20,247,273 UART: [fht] FMC Alias Private Key: 7
22,010,762 UART: [art] Extend RT PCRs Done
22,011,967 UART: [art] Lock RT PCRs Done
22,013,508 UART: [art] Populate DV Done
22,019,197 UART: [fht] FMC Alias Private Key: 7
22,020,678 UART: [art] Derive CDI
22,021,413 UART: [art] Store in in slot 0x4
22,079,641 UART: [art] Derive Key Pair
22,080,680 UART: [art] Store priv key in slot 0x5
24,543,729 UART: [art] Derive Key Pair - Done
24,556,458 UART: [art] Signing Cert with AUTHO
24,557,764 UART: RITY.KEYID = 7
26,269,150 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,643 UART: [art] PUB.X = 0CF0AC5234EE7E37C3C93E04AEDCD636191E3C575B360C535400DFAA4B247DE5EE576651261BA6095B746C8E585FED11
26,277,901 UART: [art] PUB.Y = 1AF5D1FC095018B9CA6814D512D8B5DEDE420208E70C9A924C09081C77F1B768D18D9FE7F26150FBF67AAC06C77F4FA2
26,285,200 UART: [art] SIG.R = FAEA457CD6B6EA9AD01AAA6423D1B3C4F151C88EA504AC7BBF8B988FE2B31617A78EB12D328D530AF8914A182BDE7655
26,292,577 UART: [art] SIG.S = 205EBEE753C9A93D8F8F1B8DF4335277825C0E9A147E1F9716D7A521225F0F6820F91E621FC1D7FE6ED631402C6DA0E8
27,271,739 UART: Caliptra RT
27,272,448 UART: [state] CFI Enabled
27,436,254 UART: [rt] RT listening for mailbox commands...
27,438,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,593,768 UART: [rt]cmd =0x41544d4e, len=14344
32,129,945 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
3,437,439 ready_for_fw is high
3,437,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,837,581 >>> mbox cmd response: success
20,128,515 UART:
20,128,910 UART: Running Caliptra FMC ...
20,130,002 UART:
20,130,164 UART: [state] CFI Enabled
20,199,404 UART: [fht] FMC Alias Private Key: 7
21,963,443 UART: [art] Extend RT PCRs Done
21,964,673 UART: [art] Lock RT PCRs Done
21,966,222 UART: [art] Populate DV Done
21,971,701 UART: [fht] FMC Alias Private Key: 7
21,973,245 UART: [art] Derive CDI
21,974,012 UART: [art] Store in in slot 0x4
22,031,814 UART: [art] Derive Key Pair
22,032,860 UART: [art] Store priv key in slot 0x5
24,495,603 UART: [art] Derive Key Pair - Done
24,508,484 UART: [art] Signing Cert with AUTHO
24,509,847 UART: RITY.KEYID = 7
26,223,689 UART: [art] Erasing AUTHORITY.KEYID = 7
26,225,204 UART: [art] PUB.X = B05D5EE82728A81F279AF2BEC0626140DFC075956F38674791F7217EEE1A2EC3C8C1F414610BA04CF0B3105CF12E569C
26,232,449 UART: [art] PUB.Y = C511B0BF940B670C850EA2CF97D99795C47C71FFA2CF922FF3DF69C3024AE8765C3D1F70A7C98BB908DC089C9324EEFD
26,239,719 UART: [art] SIG.R = 45CEE253EB8C5F5CCA1E6D12C912C6F22BB0D5BE2C80D6D06D02D2C562EFB4B8B5C8C86CF63A0CC1F0991AD002881D44
26,247,075 UART: [art] SIG.S = 1CD315186DCEC1DF5CA74DC562A241E3E22C4352C4BFEAA2267583B82F85E250B5D457FA8ACD9E2F5B749D6A79BFE068
27,226,120 UART: Caliptra RT
27,226,832 UART: [state] CFI Enabled
27,390,455 UART: [rt] RT listening for mailbox commands...
27,392,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,378 UART: [rt]cmd =0x41544d4e, len=14344
32,088,291 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,688 writing to cptra_bootfsm_go
192,960 UART:
193,341 UART: Running Caliptra ROM ...
194,449 UART:
604,310 UART: [state] CFI Enabled
619,687 UART: [state] LifecycleState = Unprovisioned
622,066 UART: [state] DebugLocked = No
624,373 UART: [state] WD Timer not started. Device not locked for debugging
628,965 UART: [kat] SHA2-256
818,863 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,664 UART: [kat] ++
830,109 UART: [kat] sha1
842,328 UART: [kat] SHA2-256
845,345 UART: [kat] SHA2-384
850,700 UART: [kat] SHA2-512-ACC
853,284 UART: [kat] ECC-384
3,295,306 UART: [kat] HMAC-384Kdf
3,308,742 UART: [kat] LMS
3,840,568 UART: [kat] --
3,846,351 UART: [cold-reset] ++
3,847,647 UART: [fht] FHT @ 0x50003400
3,859,310 UART: [idev] ++
3,860,067 UART: [idev] CDI.KEYID = 6
3,860,990 UART: [idev] SUBJECT.KEYID = 7
3,862,168 UART: [idev] UDS.KEYID = 0
3,863,093 ready_for_fw is high
3,863,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,446 UART: [idev] Erasing UDS.KEYID = 0
6,338,152 UART: [idev] Sha1 KeyId Algorithm
6,361,875 UART: [idev] --
6,366,091 UART: [ldev] ++
6,366,774 UART: [ldev] CDI.KEYID = 6
6,367,686 UART: [ldev] SUBJECT.KEYID = 5
6,368,840 UART: [ldev] AUTHORITY.KEYID = 7
6,370,072 UART: [ldev] FE.KEYID = 1
6,381,963 UART: [ldev] Erasing FE.KEYID = 1
8,858,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,168 UART: [ldev] --
10,648,003 UART: [fwproc] Wait for Commands...
10,650,368 UART: [fwproc] Recv command 0x46574c44
10,652,677 UART: [fwproc] Recv'd Img size: 114084 bytes
15,245,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,329,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,445,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,985,962 >>> mbox cmd response: success
15,989,741 UART: [afmc] ++
15,990,456 UART: [afmc] CDI.KEYID = 6
15,991,654 UART: [afmc] SUBJECT.KEYID = 7
15,993,104 UART: [afmc] AUTHORITY.KEYID = 5
18,493,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,216,450 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,218,425 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,233,512 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,248,697 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,263,595 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,287,188 UART: [afmc] --
20,291,330 UART: [cold-reset] --
20,294,984 UART: [state] Locking Datavault
20,300,838 UART: [state] Locking PCR0, PCR1 and PCR31
20,303,054 UART: [state] Locking ICCM
20,305,641 UART: [exit] Launching FMC @ 0x40000130
20,314,328 UART:
20,314,566 UART: Running Caliptra FMC ...
20,315,669 UART:
20,315,828 UART: [state] CFI Enabled
20,324,111 UART: [fht] FMC Alias Private Key: 7
22,081,182 UART: [art] Extend RT PCRs Done
22,082,420 UART: [art] Lock RT PCRs Done
22,083,943 UART: [art] Populate DV Done
22,089,305 UART: [fht] FMC Alias Private Key: 7
22,090,908 UART: [art] Derive CDI
22,091,731 UART: [art] Store in in slot 0x4
22,134,446 UART: [art] Derive Key Pair
22,135,491 UART: [art] Store priv key in slot 0x5
24,562,601 UART: [art] Derive Key Pair - Done
24,575,911 UART: [art] Signing Cert with AUTHO
24,577,241 UART: RITY.KEYID = 7
26,282,490 UART: [art] Erasing AUTHORITY.KEYID = 7
26,284,008 UART: [art] PUB.X = 0CCB71DE70B7447F5A07521671B3A8EC2B6C7759E35313351C1D46A8FE8B3126834EB96D4C7C04EE54172E78C9E0EB3C
26,291,298 UART: [art] PUB.Y = B0F0AA0695308E0524D2DD090092C87F893ABC48CD0AF20BB30733F7ECB5640462382504964A759D1C04C2E2931D6510
26,298,517 UART: [art] SIG.R = 77596896E94B2B1032292706E4DEA2961E8CBD62BC8CA84398971F77C8EEA50CDEBEC910CE0FB66F8C5BECC7421FF1EF
26,305,907 UART: [art] SIG.S = A8E4A9B14E5CC6EEFFBEB38381E69A9BA83C3AB2854EF0FCC23C95B72558BD34DD7A47E5C22B810E0FB8FAD45361E57C
27,284,963 UART: Caliptra RT
27,285,678 UART: [state] CFI Enabled
27,402,926 UART: [rt] RT listening for mailbox commands...
27,405,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,560,561 UART: [rt]cmd =0x41544d4e, len=14344
32,095,972 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,820 writing to cptra_bootfsm_go
3,758,050 ready_for_fw is high
3,758,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,073,486 >>> mbox cmd response: success
20,322,844 UART:
20,323,231 UART: Running Caliptra FMC ...
20,324,371 UART:
20,324,536 UART: [state] CFI Enabled
20,332,077 UART: [fht] FMC Alias Private Key: 7
22,089,132 UART: [art] Extend RT PCRs Done
22,090,371 UART: [art] Lock RT PCRs Done
22,091,958 UART: [art] Populate DV Done
22,097,597 UART: [fht] FMC Alias Private Key: 7
22,099,262 UART: [art] Derive CDI
22,100,086 UART: [art] Store in in slot 0x4
22,143,189 UART: [art] Derive Key Pair
22,144,195 UART: [art] Store priv key in slot 0x5
24,571,171 UART: [art] Derive Key Pair - Done
24,584,295 UART: [art] Signing Cert with AUTHO
24,585,607 UART: RITY.KEYID = 7
26,291,320 UART: [art] Erasing AUTHORITY.KEYID = 7
26,292,835 UART: [art] PUB.X = 75F5B5C09CC6C5A508A394670D04A462C33D37805E0D9A7297C0C2A4B900271F5DCC41C6A0DF40C4790B6BC02E468DAF
26,300,083 UART: [art] PUB.Y = 17C868D538E3345A807CD2F7E1F258E32CE76C2DC266B4922E26F38474126E2525DC00C2D8654B0DCBD92D587D203E6B
26,307,321 UART: [art] SIG.R = 1BA4CA1E1A5E0268718C0C595B745F21AEB206AC4C8E83B8111924BC3DC4DD81AF2FF7E99788502280F09E3DF25933A8
26,314,735 UART: [art] SIG.S = BFAD069BAB858E7017269A167181AD29618CDE23BAC77A48B12553B98A44E675A3E58614C4882074C2FA589E85310252
27,293,990 UART: Caliptra RT
27,294,678 UART: [state] CFI Enabled
27,411,060 UART: [rt] RT listening for mailbox commands...
27,413,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,568,801 UART: [rt]cmd =0x41544d4e, len=14344
32,106,095 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,464 UART: [kat] SHA2-512-ACC
897,365 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,746 UART: [idev] ++
1,479,914 UART: [idev] CDI.KEYID = 6
1,480,274 UART: [idev] SUBJECT.KEYID = 7
1,480,698 UART: [idev] UDS.KEYID = 0
1,481,043 ready_for_fw is high
1,481,043 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,820 UART: [idev] Erasing UDS.KEYID = 0
1,505,562 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,370 UART: [idev] --
1,515,227 UART: [ldev] ++
1,515,395 UART: [ldev] CDI.KEYID = 6
1,515,758 UART: [ldev] SUBJECT.KEYID = 5
1,516,184 UART: [ldev] AUTHORITY.KEYID = 7
1,516,647 UART: [ldev] FE.KEYID = 1
1,521,905 UART: [ldev] Erasing FE.KEYID = 1
1,547,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,210 UART: [ldev] --
1,586,645 UART: [fwproc] Waiting for Commands...
1,587,454 UART: [fwproc] Received command 0x46574c44
1,588,245 UART: [fwproc] Received Image of size 114084 bytes
5,269,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,297,986 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,327,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,462,757 >>> mbox cmd response: success
5,463,823 UART: [afmc] ++
5,463,991 UART: [afmc] CDI.KEYID = 6
5,464,353 UART: [afmc] SUBJECT.KEYID = 7
5,464,778 UART: [afmc] AUTHORITY.KEYID = 5
5,499,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,515,524 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,516,304 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,522,013 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,527,905 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,533,606 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,541,320 UART: [afmc] --
5,542,372 UART: [cold-reset] --
5,543,412 UART: [state] Locking Datavault
5,544,755 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,359 UART: [state] Locking ICCM
5,545,951 UART: [exit] Launching FMC @ 0x40000130
5,551,280 UART:
5,551,296 UART: Running Caliptra FMC ...
5,551,704 UART:
5,551,758 UART: [state] CFI Enabled
5,562,292 UART: [fht] FMC Alias Private Key: 7
5,670,390 UART: [art] Extend RT PCRs Done
5,670,818 UART: [art] Lock RT PCRs Done
5,672,388 UART: [art] Populate DV Done
5,680,678 UART: [fht] FMC Alias Private Key: 7
5,681,750 UART: [art] Derive CDI
5,682,030 UART: [art] Store in in slot 0x4
5,767,869 UART: [art] Derive Key Pair
5,768,229 UART: [art] Store priv key in slot 0x5
5,781,097 UART: [art] Derive Key Pair - Done
5,795,946 UART: [art] Signing Cert with AUTHO
5,796,426 UART: RITY.KEYID = 7
5,812,300 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,065 UART: [art] PUB.X = 699C546CE8ED4ECB5E2E2CA9113740D6F9D270EB32BC3AD36DB4275842870F08885F187746C216FAC35F46144D936B97
5,819,831 UART: [art] PUB.Y = 659E78BEA0355F11F5694A2E1D8642EBE4C82BECB68A82D76F32256E32894CC275AD787F230C803B401E70EF36B477D0
5,826,782 UART: [art] SIG.R = 650F710D6DB6A4E6A345C451E30624FCC38527FA9F56F940624D2296DA9380008CAD5B31596D79334018BD3FEB7159E9
5,833,519 UART: [art] SIG.S = F63367A18DDB3BA025D7722D6254BBF68D0C6E86124C8B96CC6ADAF56ED0E98F6F823B0B203E121F88EDDB6F15E70032
5,857,254 UART: Caliptra RT
5,857,507 UART: [state] CFI Enabled
5,966,012 UART: [rt] RT listening for mailbox commands...
5,966,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,089,688 UART: [rt]cmd =0x41544d4e, len=14344
6,999,457 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 ready_for_fw is high
1,362,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,198,082 >>> mbox cmd response: success
5,259,621 UART:
5,259,637 UART: Running Caliptra FMC ...
5,260,045 UART:
5,260,099 UART: [state] CFI Enabled
5,270,713 UART: [fht] FMC Alias Private Key: 7
5,378,933 UART: [art] Extend RT PCRs Done
5,379,361 UART: [art] Lock RT PCRs Done
5,381,087 UART: [art] Populate DV Done
5,389,389 UART: [fht] FMC Alias Private Key: 7
5,390,485 UART: [art] Derive CDI
5,390,765 UART: [art] Store in in slot 0x4
5,476,188 UART: [art] Derive Key Pair
5,476,548 UART: [art] Store priv key in slot 0x5
5,489,724 UART: [art] Derive Key Pair - Done
5,504,531 UART: [art] Signing Cert with AUTHO
5,505,011 UART: RITY.KEYID = 7
5,519,879 UART: [art] Erasing AUTHORITY.KEYID = 7
5,520,644 UART: [art] PUB.X = DD52924B49A0F8BAF681EEB4335A11EE0F1BF5AC83D4419EDF8D03FE990CB3CC2D080D7A9414F152D4FD5D800A8ADB22
5,527,418 UART: [art] PUB.Y = B3AC24BDD13B60888E1507E7D623B1362A3C9F7AA485F076011D8280D753C9321A7860C710EEED1EBC3D1746924236B0
5,534,362 UART: [art] SIG.R = 96A69380E4BE23C5A0BC96528DFEC6E39143DC3C3211CDDBB7C530B29E39C8D4F7717A6F12813665E5B76AD224F3F112
5,541,140 UART: [art] SIG.S = F4727B584B7F479CBBE0C5F5B7BC793592A177B67646C830C7A21F7EC7AB63737A76E8E69A75FA5072E956DAC98C5A0C
5,565,016 UART: Caliptra RT
5,565,269 UART: [state] CFI Enabled
5,673,531 UART: [rt] RT listening for mailbox commands...
5,674,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,365 UART: [rt]cmd =0x41544d4e, len=14344
6,727,160 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,938 UART: [kat] SHA2-256
892,876 UART: [kat] SHA2-384
895,695 UART: [kat] SHA2-512-ACC
897,596 UART: [kat] ECC-384
903,021 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,817 UART: [idev] ++
1,479,985 UART: [idev] CDI.KEYID = 6
1,480,345 UART: [idev] SUBJECT.KEYID = 7
1,480,769 UART: [idev] UDS.KEYID = 0
1,481,114 ready_for_fw is high
1,481,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,537 UART: [idev] Erasing UDS.KEYID = 0
1,504,691 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,387 UART: [idev] --
1,514,292 UART: [ldev] ++
1,514,460 UART: [ldev] CDI.KEYID = 6
1,514,823 UART: [ldev] SUBJECT.KEYID = 5
1,515,249 UART: [ldev] AUTHORITY.KEYID = 7
1,515,712 UART: [ldev] FE.KEYID = 1
1,520,784 UART: [ldev] Erasing FE.KEYID = 1
1,545,991 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,115 UART: [ldev] --
1,585,436 UART: [fwproc] Waiting for Commands...
1,586,199 UART: [fwproc] Received command 0x46574c44
1,586,990 UART: [fwproc] Received Image of size 114084 bytes
5,155,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,183,882 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,213,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,348,665 >>> mbox cmd response: success
5,349,767 UART: [afmc] ++
5,349,935 UART: [afmc] CDI.KEYID = 6
5,350,297 UART: [afmc] SUBJECT.KEYID = 7
5,350,722 UART: [afmc] AUTHORITY.KEYID = 5
5,385,592 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,401,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,402,262 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,407,971 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,413,863 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,419,564 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,427,538 UART: [afmc] --
5,428,638 UART: [cold-reset] --
5,429,430 UART: [state] Locking Datavault
5,430,363 UART: [state] Locking PCR0, PCR1 and PCR31
5,430,967 UART: [state] Locking ICCM
5,431,435 UART: [exit] Launching FMC @ 0x40000130
5,436,764 UART:
5,436,780 UART: Running Caliptra FMC ...
5,437,188 UART:
5,437,331 UART: [state] CFI Enabled
5,448,291 UART: [fht] FMC Alias Private Key: 7
5,556,183 UART: [art] Extend RT PCRs Done
5,556,611 UART: [art] Lock RT PCRs Done
5,557,579 UART: [art] Populate DV Done
5,565,985 UART: [fht] FMC Alias Private Key: 7
5,566,949 UART: [art] Derive CDI
5,567,229 UART: [art] Store in in slot 0x4
5,652,802 UART: [art] Derive Key Pair
5,653,162 UART: [art] Store priv key in slot 0x5
5,666,636 UART: [art] Derive Key Pair - Done
5,681,596 UART: [art] Signing Cert with AUTHO
5,682,076 UART: RITY.KEYID = 7
5,697,286 UART: [art] Erasing AUTHORITY.KEYID = 7
5,698,051 UART: [art] PUB.X = 49C1A67FDAC09B9DD8472E592A3F42C8B142C6599DB70A59B4863510344D8C4584059029BAAA556C03D96F9499A67CB1
5,704,812 UART: [art] PUB.Y = AA9C0C586EE31EE343A6635666F9901EBD0C6554D421AF713BA0EE3082BF011B4F18BD2BC48ED6B77E384CDA91C3B734
5,711,767 UART: [art] SIG.R = 5753B36F705EA679BD4A00A0CD09CBC94183B69F69B1BB923C6F4D2D917447D88CC80F2BC6DE0DEAD478C30F6FC33BFC
5,718,523 UART: [art] SIG.S = C7303E5A0296C860C69CA340BCC5F89A23A10FCB6ECF2E6559DEFC52DA4041C689C77F19C5625DD92095D623F08A39A6
5,742,224 UART: Caliptra RT
5,742,569 UART: [state] CFI Enabled
5,849,904 UART: [rt] RT listening for mailbox commands...
5,850,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,814 UART: [rt]cmd =0x41544d4e, len=14344
6,886,846 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 ready_for_fw is high
1,362,762 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,048,747 >>> mbox cmd response: success
5,110,342 UART:
5,110,358 UART: Running Caliptra FMC ...
5,110,766 UART:
5,110,909 UART: [state] CFI Enabled
5,122,097 UART: [fht] FMC Alias Private Key: 7
5,229,649 UART: [art] Extend RT PCRs Done
5,230,077 UART: [art] Lock RT PCRs Done
5,231,385 UART: [art] Populate DV Done
5,239,489 UART: [fht] FMC Alias Private Key: 7
5,240,469 UART: [art] Derive CDI
5,240,749 UART: [art] Store in in slot 0x4
5,326,134 UART: [art] Derive Key Pair
5,326,494 UART: [art] Store priv key in slot 0x5
5,339,926 UART: [art] Derive Key Pair - Done
5,354,570 UART: [art] Signing Cert with AUTHO
5,355,050 UART: RITY.KEYID = 7
5,370,266 UART: [art] Erasing AUTHORITY.KEYID = 7
5,371,031 UART: [art] PUB.X = AE915AA924D8F469AE7103815D3F70705B35F6E6F44D9D53E77910E1FC7F1B707353D5343B4E2F87993AC5B996ED5175
5,377,798 UART: [art] PUB.Y = 3AB28A0D8615A4FA7ACB9B26C1DADADAE46ADDECD666C0E0DC2B4CFD9EA840A4DDBFDE983C985D8E9DA0C474ADE83182
5,384,785 UART: [art] SIG.R = CE807890CB9BE86D5EF130B5CB4F00025FF992A19968D38D5B72C5780FBA0F21055E2B20803275EA6207C24B22FF5A71
5,391,522 UART: [art] SIG.S = 3ADC88FAFC99FFDBB926CF721434234959A2CC8433BC040A611E19D49BA48822914F09C28AE4E7A786BB3AFC28F7D7BD
5,415,504 UART: Caliptra RT
5,415,849 UART: [state] CFI Enabled
5,523,996 UART: [rt] RT listening for mailbox commands...
5,524,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,647,650 UART: [rt]cmd =0x41544d4e, len=14344
6,560,388 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,298 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,172,053 UART: [cold-reset] ++
1,172,493 UART: [fht] FHT @ 0x50003400
1,175,132 UART: [idev] ++
1,175,300 UART: [idev] CDI.KEYID = 6
1,175,660 UART: [idev] SUBJECT.KEYID = 7
1,176,084 UART: [idev] UDS.KEYID = 0
1,176,429 ready_for_fw is high
1,176,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,968 UART: [idev] Erasing UDS.KEYID = 0
1,201,063 UART: [idev] Sha1 KeyId Algorithm
1,209,669 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,217,299 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,571 UART: [ldev] --
1,283,072 UART: [fwproc] Wait for Commands...
1,283,664 UART: [fwproc] Recv command 0x46574c44
1,284,392 UART: [fwproc] Recv'd Img size: 114084 bytes
3,113,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,306,421 >>> mbox cmd response: success
3,307,595 UART: [afmc] ++
3,307,763 UART: [afmc] CDI.KEYID = 6
3,308,125 UART: [afmc] SUBJECT.KEYID = 7
3,308,550 UART: [afmc] AUTHORITY.KEYID = 5
3,343,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,367 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,076 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,968 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,679 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,350 UART: [afmc] --
3,386,270 UART: [cold-reset] --
3,387,076 UART: [state] Locking Datavault
3,388,267 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,871 UART: [state] Locking ICCM
3,389,417 UART: [exit] Launching FMC @ 0x40000130
3,394,746 UART:
3,394,762 UART: Running Caliptra FMC ...
3,395,170 UART:
3,395,224 UART: [state] CFI Enabled
3,405,876 UART: [fht] FMC Alias Private Key: 7
3,513,842 UART: [art] Extend RT PCRs Done
3,514,270 UART: [art] Lock RT PCRs Done
3,515,866 UART: [art] Populate DV Done
3,524,456 UART: [fht] FMC Alias Private Key: 7
3,525,514 UART: [art] Derive CDI
3,525,794 UART: [art] Store in in slot 0x4
3,611,971 UART: [art] Derive Key Pair
3,612,331 UART: [art] Store priv key in slot 0x5
3,625,597 UART: [art] Derive Key Pair - Done
3,640,502 UART: [art] Signing Cert with AUTHO
3,640,982 UART: RITY.KEYID = 7
3,655,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,655 UART: [art] PUB.X = 08FD3985950D5A8A437D28FD54B9E66CDC7A8BE615112369E6034A5A62634676D3D5D9CCFF4340F499A6055BFF7830FF
3,663,417 UART: [art] PUB.Y = D82845C5490BC3237B4AA09150210EE691744921040916A4B63DEDDB8D7B1723D3875B94A5902D69A43D5AA555ABE159
3,670,351 UART: [art] SIG.R = B86BF6AA164A807FB5B6CFC56E357F0A260BAE3125F46D734C59FADCFED1353AC6AD508550E3FA6E3AB05596458DB33C
3,677,135 UART: [art] SIG.S = 04A04C03ADEA58B0CBFA8B2263288916523073DD3E460CA1E902E11D9CF192CEF73D95D8C0FCA6112F6F76C59FE55DE8
3,700,972 UART: Caliptra RT
3,701,225 UART: [state] CFI Enabled
3,808,817 UART: [rt] RT listening for mailbox commands...
3,809,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,435 UART: [rt]cmd =0x41544d4e, len=14344
4,867,720 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 ready_for_fw is high
1,060,131 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,162,119 >>> mbox cmd response: success
3,224,430 UART:
3,224,446 UART: Running Caliptra FMC ...
3,224,854 UART:
3,224,908 UART: [state] CFI Enabled
3,235,616 UART: [fht] FMC Alias Private Key: 7
3,343,064 UART: [art] Extend RT PCRs Done
3,343,492 UART: [art] Lock RT PCRs Done
3,345,040 UART: [art] Populate DV Done
3,353,344 UART: [fht] FMC Alias Private Key: 7
3,354,286 UART: [art] Derive CDI
3,354,566 UART: [art] Store in in slot 0x4
3,440,515 UART: [art] Derive Key Pair
3,440,875 UART: [art] Store priv key in slot 0x5
3,454,101 UART: [art] Derive Key Pair - Done
3,468,760 UART: [art] Signing Cert with AUTHO
3,469,240 UART: RITY.KEYID = 7
3,483,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,519 UART: [art] PUB.X = BF2E2FE7128011C9116D8ECEAFF4CAF2BC1839650C9BE5FC3D751AB071C8FDE6046FA74C54410876462BE33FA2EF346F
3,491,298 UART: [art] PUB.Y = FAE5E97FA6C58278609D41DB3BFD3D5B822CC3C47669F10523F0D9A9726935E55D9CFFD3C5321A055B5FBDD666181183
3,498,250 UART: [art] SIG.R = B6254E94828216A8B43A0598E0FCC5DE304C0CD2925A9755679A99F8D2266EE56165BC83267E3487F3F0EDC29C87C724
3,505,012 UART: [art] SIG.S = F77353A4AF475126A7949E5E1E4336756AEAA844BBE7808A561B6173B44E30CBC1AB4F59EBD8FF3938DB047700096C30
3,529,165 UART: Caliptra RT
3,529,418 UART: [state] CFI Enabled
3,637,643 UART: [rt] RT listening for mailbox commands...
3,638,313 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,217 UART: [rt]cmd =0x41544d4e, len=14344
4,669,267 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
893,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,782 UART: [kat] ++
897,934 UART: [kat] sha1
902,196 UART: [kat] SHA2-256
904,136 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,171,876 UART: [cold-reset] ++
1,172,334 UART: [fht] FHT @ 0x50003400
1,174,913 UART: [idev] ++
1,175,081 UART: [idev] CDI.KEYID = 6
1,175,441 UART: [idev] SUBJECT.KEYID = 7
1,175,865 UART: [idev] UDS.KEYID = 0
1,176,210 ready_for_fw is high
1,176,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,025 UART: [idev] Erasing UDS.KEYID = 0
1,200,646 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,216,998 UART: [ldev] Erasing FE.KEYID = 1
1,243,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,936 UART: [ldev] --
1,283,209 UART: [fwproc] Wait for Commands...
1,283,941 UART: [fwproc] Recv command 0x46574c44
1,284,669 UART: [fwproc] Recv'd Img size: 114084 bytes
3,125,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,063 >>> mbox cmd response: success
3,319,283 UART: [afmc] ++
3,319,451 UART: [afmc] CDI.KEYID = 6
3,319,813 UART: [afmc] SUBJECT.KEYID = 7
3,320,238 UART: [afmc] AUTHORITY.KEYID = 5
3,356,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,199 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,908 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,800 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,511 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,264 UART: [afmc] --
3,399,384 UART: [cold-reset] --
3,400,148 UART: [state] Locking Datavault
3,401,335 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,939 UART: [state] Locking ICCM
3,402,457 UART: [exit] Launching FMC @ 0x40000130
3,407,786 UART:
3,407,802 UART: Running Caliptra FMC ...
3,408,210 UART:
3,408,353 UART: [state] CFI Enabled
3,418,557 UART: [fht] FMC Alias Private Key: 7
3,526,605 UART: [art] Extend RT PCRs Done
3,527,033 UART: [art] Lock RT PCRs Done
3,528,791 UART: [art] Populate DV Done
3,537,245 UART: [fht] FMC Alias Private Key: 7
3,538,317 UART: [art] Derive CDI
3,538,597 UART: [art] Store in in slot 0x4
3,624,834 UART: [art] Derive Key Pair
3,625,194 UART: [art] Store priv key in slot 0x5
3,638,822 UART: [art] Derive Key Pair - Done
3,653,480 UART: [art] Signing Cert with AUTHO
3,653,960 UART: RITY.KEYID = 7
3,669,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,097 UART: [art] PUB.X = 6045E7BC05AED82EA3EC527DF4ECFD95924AFA31BCE36734F3B592F8F1A0082F2F74DDDEF3B6FC3B18BEE4608AE47DD5
3,676,889 UART: [art] PUB.Y = 333FA1FCF9AE9AB1C96C18C03BDCFAC36AB951AE98E40321C06C0560E73C3821A87CC46B0E56D7EC3C37CDCA8852A707
3,683,847 UART: [art] SIG.R = 59A297E5284F962896A6FE93409D2CE91B18BA3D38AA2092CD74B01C78F13D22DE15417397E962161D33BC94A522F8DF
3,690,617 UART: [art] SIG.S = 0F0012B538116799F2D1CC8CB38CF13C7845B414CA1B33E530B03B875046E1AE323A41790C0D7827ABCBF57FE77E8AED
3,714,445 UART: Caliptra RT
3,714,790 UART: [state] CFI Enabled
3,823,417 UART: [rt] RT listening for mailbox commands...
3,824,087 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,125 UART: [rt]cmd =0x41544d4e, len=14344
4,869,381 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,444 >>> mbox cmd response: success
3,234,409 UART:
3,234,425 UART: Running Caliptra FMC ...
3,234,833 UART:
3,234,976 UART: [state] CFI Enabled
3,245,712 UART: [fht] FMC Alias Private Key: 7
3,353,556 UART: [art] Extend RT PCRs Done
3,353,984 UART: [art] Lock RT PCRs Done
3,355,504 UART: [art] Populate DV Done
3,363,560 UART: [fht] FMC Alias Private Key: 7
3,364,626 UART: [art] Derive CDI
3,364,906 UART: [art] Store in in slot 0x4
3,450,693 UART: [art] Derive Key Pair
3,451,053 UART: [art] Store priv key in slot 0x5
3,464,229 UART: [art] Derive Key Pair - Done
3,479,112 UART: [art] Signing Cert with AUTHO
3,479,592 UART: RITY.KEYID = 7
3,494,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,515 UART: [art] PUB.X = F37FC36E5C7FEE07785E114B913EC986A4EE70B930B7D475D5E4E6AF34341414417696E0B6532925490A1873E50B718C
3,502,272 UART: [art] PUB.Y = 62CDF948E25710C2D300A000155302D773F23EDDCF34F774296EAD320AE28E8248D1F0AC8513AC9B4F9AA5C630ECE5E9
3,509,182 UART: [art] SIG.R = 8430CC9E40CB70C1DD35865903851F50D4A60864466B64EB0E536A3BC5248D1B0BDE9297D705EBA05F36AAAD8E879EB3
3,515,945 UART: [art] SIG.S = E2645C7A005FFF3D7E9726F82F836907F55C7739278AED25F7CF53DEDA8D5FABC807942DFC9ECC1C05D1BA4B7ED00C60
3,539,484 UART: Caliptra RT
3,539,829 UART: [state] CFI Enabled
3,647,124 UART: [rt] RT listening for mailbox commands...
3,647,794 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,662 UART: [rt]cmd =0x41544d4e, len=14344
4,691,009 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,560 UART: [kat] LMS
1,168,872 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,174,143 ready_for_fw is high
1,174,143 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,310 UART: [ldev] ++
1,209,478 UART: [ldev] CDI.KEYID = 6
1,209,842 UART: [ldev] SUBJECT.KEYID = 5
1,210,269 UART: [ldev] AUTHORITY.KEYID = 7
1,210,732 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,548 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,799 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 114084 bytes
3,128,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,320,885 >>> mbox cmd response: success
3,321,996 UART: [afmc] ++
3,322,164 UART: [afmc] CDI.KEYID = 6
3,322,527 UART: [afmc] SUBJECT.KEYID = 7
3,322,953 UART: [afmc] AUTHORITY.KEYID = 5
3,358,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,740 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,450 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,340 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,051 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,869 UART: [afmc] --
3,401,915 UART: [cold-reset] --
3,402,721 UART: [state] Locking Datavault
3,403,808 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,412 UART: [state] Locking ICCM
3,404,900 UART: [exit] Launching FMC @ 0x40000130
3,410,229 UART:
3,410,245 UART: Running Caliptra FMC ...
3,410,653 UART:
3,410,707 UART: [state] CFI Enabled
3,421,207 UART: [fht] FMC Alias Private Key: 7
3,529,541 UART: [art] Extend RT PCRs Done
3,529,969 UART: [art] Lock RT PCRs Done
3,531,595 UART: [art] Populate DV Done
3,539,911 UART: [fht] FMC Alias Private Key: 7
3,540,887 UART: [art] Derive CDI
3,541,167 UART: [art] Store in in slot 0x4
3,626,212 UART: [art] Derive Key Pair
3,626,572 UART: [art] Store priv key in slot 0x5
3,639,930 UART: [art] Derive Key Pair - Done
3,654,810 UART: [art] Signing Cert with AUTHO
3,655,290 UART: RITY.KEYID = 7
3,670,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,089 UART: [art] PUB.X = E46B93B95D01461C6D1F6EE241D9AF5A871E93DA75E129830FCEC1A797F27727627292D927C74D778C44B29945C81DC2
3,677,853 UART: [art] PUB.Y = 2673CE0A3A5476F6EBEA11372FE0145B7EFD50172962019BAF802384F4CC4384D10D8DA66D4B7F7F87C6FAAFD902CAA4
3,684,805 UART: [art] SIG.R = 5D13DB499713E65E3DEB40C652FB84DDD8F9413737F5C5F724B3E0F9B470F82393ECE94FD58C784C44E4B41A1DE1C92F
3,691,587 UART: [art] SIG.S = 7FBCAC881EAE121AC557C260975D1C4B14B76FB4A37EB9F9E4380D97AE36AFC17013DA4C827256EA36FFE0471A6DD766
3,715,151 UART: Caliptra RT
3,715,404 UART: [state] CFI Enabled
3,822,715 UART: [rt] RT listening for mailbox commands...
3,823,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,627 UART: [rt]cmd =0x41544d4e, len=14344
4,879,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,512 ready_for_fw is high
1,056,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,162,930 >>> mbox cmd response: success
3,224,671 UART:
3,224,687 UART: Running Caliptra FMC ...
3,225,095 UART:
3,225,149 UART: [state] CFI Enabled
3,235,643 UART: [fht] FMC Alias Private Key: 7
3,343,007 UART: [art] Extend RT PCRs Done
3,343,435 UART: [art] Lock RT PCRs Done
3,344,883 UART: [art] Populate DV Done
3,353,109 UART: [fht] FMC Alias Private Key: 7
3,354,075 UART: [art] Derive CDI
3,354,355 UART: [art] Store in in slot 0x4
3,439,784 UART: [art] Derive Key Pair
3,440,144 UART: [art] Store priv key in slot 0x5
3,453,548 UART: [art] Derive Key Pair - Done
3,468,209 UART: [art] Signing Cert with AUTHO
3,468,689 UART: RITY.KEYID = 7
3,484,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,824 UART: [art] PUB.X = 5CEA7AE2AF14423DB50A2E02A6DE73406A2854D285C99A8FF2CD73B7600A28E6F1FDF47BC1EE116B3DE1A9BFC30BF4AB
3,491,608 UART: [art] PUB.Y = 4DCAE96BAC7010EA6CB7672585A1F6FBA69071A0D5FFF7C2742A4D92DAF8F48BC03AA31F8CDA7B24BAC08DB320506306
3,498,577 UART: [art] SIG.R = 297DF02E4FFACF4CDC6B0B7F7886F4B52B8A9F057EF31D140A36D0E9A7A0116F832503EE8E2FECBCE8278C2996E6DFAF
3,505,359 UART: [art] SIG.S = BDD302526F293104F137AA10CF8EABAD6D4644052D666F14D6D6E1E7CE729876E5907687C5E7939989EDBDC455B27B7F
3,528,527 UART: Caliptra RT
3,528,780 UART: [state] CFI Enabled
3,636,710 UART: [rt] RT listening for mailbox commands...
3,637,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,354 UART: [rt]cmd =0x41544d4e, len=14344
4,694,963 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,578 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,650 UART: [idev] ++
1,172,818 UART: [idev] CDI.KEYID = 6
1,173,179 UART: [idev] SUBJECT.KEYID = 7
1,173,604 UART: [idev] UDS.KEYID = 0
1,173,950 ready_for_fw is high
1,173,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,424 UART: [idev] Erasing UDS.KEYID = 0
1,198,302 UART: [idev] Sha1 KeyId Algorithm
1,207,072 UART: [idev] --
1,208,019 UART: [ldev] ++
1,208,187 UART: [ldev] CDI.KEYID = 6
1,208,551 UART: [ldev] SUBJECT.KEYID = 5
1,208,978 UART: [ldev] AUTHORITY.KEYID = 7
1,209,441 UART: [ldev] FE.KEYID = 1
1,214,567 UART: [ldev] Erasing FE.KEYID = 1
1,240,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,555 UART: [ldev] --
1,279,835 UART: [fwproc] Wait for Commands...
1,280,460 UART: [fwproc] Recv command 0x46574c44
1,281,193 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,939 >>> mbox cmd response: success
3,313,972 UART: [afmc] ++
3,314,140 UART: [afmc] CDI.KEYID = 6
3,314,503 UART: [afmc] SUBJECT.KEYID = 7
3,314,929 UART: [afmc] AUTHORITY.KEYID = 5
3,351,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,202 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,912 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,802 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,513 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,359 UART: [afmc] --
3,394,361 UART: [cold-reset] --
3,395,095 UART: [state] Locking Datavault
3,396,296 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,900 UART: [state] Locking ICCM
3,397,452 UART: [exit] Launching FMC @ 0x40000130
3,402,781 UART:
3,402,797 UART: Running Caliptra FMC ...
3,403,205 UART:
3,403,348 UART: [state] CFI Enabled
3,413,792 UART: [fht] FMC Alias Private Key: 7
3,522,008 UART: [art] Extend RT PCRs Done
3,522,436 UART: [art] Lock RT PCRs Done
3,524,460 UART: [art] Populate DV Done
3,532,698 UART: [fht] FMC Alias Private Key: 7
3,533,856 UART: [art] Derive CDI
3,534,136 UART: [art] Store in in slot 0x4
3,619,931 UART: [art] Derive Key Pair
3,620,291 UART: [art] Store priv key in slot 0x5
3,633,501 UART: [art] Derive Key Pair - Done
3,648,433 UART: [art] Signing Cert with AUTHO
3,648,913 UART: RITY.KEYID = 7
3,664,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,074 UART: [art] PUB.X = DFAD24ACE58DDF2E017730D858D369C90AA5F5D2E14E0D9567CA9DD2D264DFFE56BE385DD84DC4D085DAD49CA8F0F144
3,671,861 UART: [art] PUB.Y = 7A2079AF9B692D4DC20E238633E561294D4F8F33216412D55974B20982741D980ABF58E5C1B74A1A380BF554D33ABD8A
3,678,797 UART: [art] SIG.R = 3FA5458BCC3259168F1DD611BDA3408B4FCD4AC928E245A786039D23D4454D4D94EF44F2C9AE280193129E3CDB310E66
3,685,564 UART: [art] SIG.S = FCAB3EC52704B0AB475FFC5777C483F3262FC3587942EC31383C3AC46094100E9EAF233EA635DF23F636B2909C6510F7
3,709,185 UART: Caliptra RT
3,709,530 UART: [state] CFI Enabled
3,816,308 UART: [rt] RT listening for mailbox commands...
3,816,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,968 UART: [rt]cmd =0x41544d4e, len=14344
4,869,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,985 ready_for_fw is high
1,055,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,158,909 >>> mbox cmd response: success
3,220,926 UART:
3,220,942 UART: Running Caliptra FMC ...
3,221,350 UART:
3,221,493 UART: [state] CFI Enabled
3,232,363 UART: [fht] FMC Alias Private Key: 7
3,340,653 UART: [art] Extend RT PCRs Done
3,341,081 UART: [art] Lock RT PCRs Done
3,342,545 UART: [art] Populate DV Done
3,350,577 UART: [fht] FMC Alias Private Key: 7
3,351,637 UART: [art] Derive CDI
3,351,917 UART: [art] Store in in slot 0x4
3,437,512 UART: [art] Derive Key Pair
3,437,872 UART: [art] Store priv key in slot 0x5
3,450,660 UART: [art] Derive Key Pair - Done
3,465,618 UART: [art] Signing Cert with AUTHO
3,466,098 UART: RITY.KEYID = 7
3,481,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,481,949 UART: [art] PUB.X = FE28B4996DE0301691AC4F46AB0D81272186B65913B3BC6C3DB3EBAE4F572250FE1BE103E53B12F3AB5808E1AA9DE742
3,488,722 UART: [art] PUB.Y = 82EE9906408F79985E8269F28D8778D511F36E468FBE27888A78258E68A9F823DF5F5FE844232963062C6E06A87558D5
3,495,651 UART: [art] SIG.R = 7F8F56DC7E2E41730999419862BDB79DD1BEF71CF2A0244329995D5963122DC8B5A179B116BF993EEE838A1D7C74E598
3,502,420 UART: [art] SIG.S = 0884A6AE23906D9657CFA91D985B5F8D9EB2E7A2284582C25F164C341A25EE1BFFCDB462AE7D7260D878C848808F3DA1
3,526,450 UART: Caliptra RT
3,526,795 UART: [state] CFI Enabled
3,634,704 UART: [rt] RT listening for mailbox commands...
3,635,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,222 UART: [rt]cmd =0x41544d4e, len=14344
4,675,210 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,091 UART:
192,472 UART: Running Caliptra ROM ...
193,586 UART:
193,728 UART: [state] CFI Enabled
262,284 UART: [state] LifecycleState = Unprovisioned
264,269 UART: [state] DebugLocked = No
266,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,293 UART: [kat] SHA2-256
441,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,552 UART: [kat] ++
452,083 UART: [kat] sha1
464,389 UART: [kat] SHA2-256
467,033 UART: [kat] SHA2-384
472,809 UART: [kat] SHA2-512-ACC
475,171 UART: [kat] ECC-384
2,768,557 UART: [kat] HMAC-384Kdf
2,801,063 UART: [kat] LMS
3,991,376 UART: [kat] --
3,995,824 UART: [cold-reset] ++
3,998,398 UART: [fht] Storing FHT @ 0x50003400
4,009,520 UART: [idev] ++
4,010,100 UART: [idev] CDI.KEYID = 6
4,011,017 UART: [idev] SUBJECT.KEYID = 7
4,012,267 UART: [idev] UDS.KEYID = 0
4,013,329 ready_for_fw is high
4,013,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,615 UART: [idev] Erasing UDS.KEYID = 0
7,346,064 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,229 UART: [idev] --
7,372,901 UART: [ldev] ++
7,373,472 UART: [ldev] CDI.KEYID = 6
7,374,461 UART: [ldev] SUBJECT.KEYID = 5
7,375,676 UART: [ldev] AUTHORITY.KEYID = 7
7,376,913 UART: [ldev] FE.KEYID = 1
7,423,276 UART: [ldev] Erasing FE.KEYID = 1
10,756,182 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,118 UART: [ldev] --
13,116,949 UART: [fwproc] Waiting for Commands...
13,119,150 UART: [fwproc] Received command 0x46574c44
13,121,332 UART: [fwproc] Received Image of size 113760 bytes
17,164,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,625,243 >>> mbox cmd response: success
17,628,579 UART: [afmc] ++
17,629,180 UART: [afmc] CDI.KEYID = 6
17,630,064 UART: [afmc] SUBJECT.KEYID = 7
17,631,335 UART: [afmc] AUTHORITY.KEYID = 5
20,987,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,290,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,274 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,729 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,523 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,978 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,358,149 UART: [afmc] --
23,362,554 UART: [cold-reset] --
23,368,575 UART: [state] Locking Datavault
23,375,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,377,637 UART: [state] Locking ICCM
23,378,877 UART: [exit] Launching FMC @ 0x40000130
23,387,245 UART:
23,387,492 UART: Running Caliptra FMC ...
23,388,519 UART:
23,388,667 UART: [state] CFI Enabled
23,449,680 UART: [fht] FMC Alias Private Key: 7
25,788,169 UART: [art] Extend RT PCRs Done
25,789,388 UART: [art] Lock RT PCRs Done
25,790,826 UART: [art] Populate DV Done
25,796,238 UART: [fht] FMC Alias Private Key: 7
25,797,882 UART: [art] Derive CDI
25,798,615 UART: [art] Store in in slot 0x4
25,858,341 UART: [art] Derive Key Pair
25,859,389 UART: [art] Store priv key in slot 0x5
29,152,032 UART: [art] Derive Key Pair - Done
29,164,872 UART: [art] Signing Cert with AUTHO
29,166,193 UART: RITY.KEYID = 7
31,453,459 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,977 UART: [art] PUB.X = 0220D1BE29B2D8DED35874B7C6F52D23EE8506C3BE13A4143A160E66F7B018771DEFCFA5AF78BE44C44FE5154DDA96EA
31,462,253 UART: [art] PUB.Y = 60683AA7AE4FB9AD058A4245E600DBC3EAFE5FEE85DFB6533D33B089C9C1E50B4322A85141B3197C9CF9C02E743AD390
31,469,497 UART: [art] SIG.R = 2661C7F2A5A7186A75A875011620BDD5B1A7CDDE3BB182B7C4CB2876C270EE41105C4A20A02DE5CEAE35C6D46DDF86D4
31,476,944 UART: [art] SIG.S = B45A398D74669AB3A9FD754485F93D8F3992E1583CF1E829A3D8278B9811A213F06AB1B154CFFFE2BC15959C881E5971
32,782,424 UART: Caliptra RT
32,783,133 UART: [state] CFI Enabled
32,942,230 UART: [rt] RT listening for mailbox commands...
32,944,544 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,099,746 UART: [rt]cmd =0x41544d4e, len=14344
38,400,508 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,805,791 ready_for_fw is high
3,806,204 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,862,134 >>> mbox cmd response: success
23,544,767 UART:
23,545,165 UART: Running Caliptra FMC ...
23,546,302 UART:
23,546,461 UART: [state] CFI Enabled
23,616,221 UART: [fht] FMC Alias Private Key: 7
25,954,338 UART: [art] Extend RT PCRs Done
25,955,559 UART: [art] Lock RT PCRs Done
25,956,673 UART: [art] Populate DV Done
25,961,915 UART: [fht] FMC Alias Private Key: 7
25,963,418 UART: [art] Derive CDI
25,964,155 UART: [art] Store in in slot 0x4
26,024,162 UART: [art] Derive Key Pair
26,025,159 UART: [art] Store priv key in slot 0x5
29,317,195 UART: [art] Derive Key Pair - Done
29,329,984 UART: [art] Signing Cert with AUTHO
29,331,295 UART: RITY.KEYID = 7
31,619,207 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,721 UART: [art] PUB.X = 230BA328139562964656614BCCFBE3DD7AA72BB081B0EBC35C8705A2600CF81ABB4F3969593B03C76611C0FADAD30E31
31,627,987 UART: [art] PUB.Y = 0F5691903BA516265E0808EC40A7C6545D1C3125DE3321F759F47C5D3BAEC219A729BE59DF47EEBD962A67884918392B
31,635,197 UART: [art] SIG.R = 2B672292F2994C6BF80689BA89BF1BD60917D0AE9418CF2F586326F7C1BF7E318C862C3804EC5F72FB948EAC4CA3E9FE
31,642,619 UART: [art] SIG.S = D92917676C7E2266FC7E89181880EB84F72B84912680F348486895A5B3B15B3303D69C0B986B972B7D834A2C5DF72051
32,947,862 UART: Caliptra RT
32,948,570 UART: [state] CFI Enabled
33,108,275 UART: [rt] RT listening for mailbox commands...
33,110,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,265,963 UART: [rt]cmd =0x41544d4e, len=14344
38,566,486 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
192,995 UART:
193,359 UART: Running Caliptra ROM ...
194,576 UART:
604,095 UART: [state] CFI Enabled
619,971 UART: [state] LifecycleState = Unprovisioned
621,921 UART: [state] DebugLocked = No
623,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,006 UART: [kat] SHA2-256
798,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,306 UART: [kat] ++
809,789 UART: [kat] sha1
821,015 UART: [kat] SHA2-256
823,762 UART: [kat] SHA2-384
829,752 UART: [kat] SHA2-512-ACC
832,113 UART: [kat] ECC-384
3,115,617 UART: [kat] HMAC-384Kdf
3,127,513 UART: [kat] LMS
4,317,580 UART: [kat] --
4,322,310 UART: [cold-reset] ++
4,323,391 UART: [fht] Storing FHT @ 0x50003400
4,335,579 UART: [idev] ++
4,336,140 UART: [idev] CDI.KEYID = 6
4,337,167 UART: [idev] SUBJECT.KEYID = 7
4,338,340 UART: [idev] UDS.KEYID = 0
4,339,405 ready_for_fw is high
4,339,601 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,444 UART: [idev] Erasing UDS.KEYID = 0
7,625,170 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,833 UART: [idev] --
7,651,527 UART: [ldev] ++
7,652,095 UART: [ldev] CDI.KEYID = 6
7,653,115 UART: [ldev] SUBJECT.KEYID = 5
7,654,270 UART: [ldev] AUTHORITY.KEYID = 7
7,655,549 UART: [ldev] FE.KEYID = 1
7,665,809 UART: [ldev] Erasing FE.KEYID = 1
10,954,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,217 UART: [ldev] --
13,314,286 UART: [fwproc] Waiting for Commands...
13,317,396 UART: [fwproc] Received command 0x46574c44
13,319,570 UART: [fwproc] Received Image of size 113760 bytes
17,358,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,820,615 >>> mbox cmd response: success
17,825,598 UART: [afmc] ++
17,826,188 UART: [afmc] CDI.KEYID = 6
17,827,151 UART: [afmc] SUBJECT.KEYID = 7
17,828,360 UART: [afmc] AUTHORITY.KEYID = 5
21,140,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,519 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,908 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,754 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,178 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,627 UART: [afmc] --
23,508,924 UART: [cold-reset] --
23,512,963 UART: [state] Locking Datavault
23,519,186 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,960 UART: [state] Locking ICCM
23,523,649 UART: [exit] Launching FMC @ 0x40000130
23,532,052 UART:
23,532,292 UART: Running Caliptra FMC ...
23,533,400 UART:
23,533,559 UART: [state] CFI Enabled
23,541,396 UART: [fht] FMC Alias Private Key: 7
25,872,282 UART: [art] Extend RT PCRs Done
25,873,510 UART: [art] Lock RT PCRs Done
25,875,188 UART: [art] Populate DV Done
25,880,820 UART: [fht] FMC Alias Private Key: 7
25,882,529 UART: [art] Derive CDI
25,883,345 UART: [art] Store in in slot 0x4
25,926,163 UART: [art] Derive Key Pair
25,927,216 UART: [art] Store priv key in slot 0x5
29,169,048 UART: [art] Derive Key Pair - Done
29,182,054 UART: [art] Signing Cert with AUTHO
29,183,365 UART: RITY.KEYID = 7
31,463,204 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,719 UART: [art] PUB.X = 75AE22283BC81C3AFD85FFFA304260D306FD456F3080D89B8020450D1884BF480A43A326997D35A4BA1968F195EEA104
31,471,939 UART: [art] PUB.Y = 74A9124EB3215281DF8DBFB2222DBA183AD25B8A5E4025114343E44BFBDDDB38AD78CBF569BAABFBE5ABBFC8C2A7D16C
31,479,254 UART: [art] SIG.R = CEF08998EAFBE04A3A36620D3EC4894362F7941C3FF60708176EF00BABFBDBC9EC70BE2D403616FE830E1DD738A49519
31,486,624 UART: [art] SIG.S = 275C486682308624475DFEDAD2D5B7F72E35CF124449BCED7B70E28C27912AEE676C3D284B14400E28A1E0A987556416
32,791,796 UART: Caliptra RT
32,792,485 UART: [state] CFI Enabled
32,909,678 UART: [rt] RT listening for mailbox commands...
32,912,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,067,432 UART: [rt]cmd =0x41544d4e, len=14344
38,367,527 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
4,126,017 ready_for_fw is high
4,126,393 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,871 >>> mbox cmd response: success
23,709,331 UART:
23,709,754 UART: Running Caliptra FMC ...
23,710,859 UART:
23,711,007 UART: [state] CFI Enabled
23,718,584 UART: [fht] FMC Alias Private Key: 7
26,050,159 UART: [art] Extend RT PCRs Done
26,051,392 UART: [art] Lock RT PCRs Done
26,053,050 UART: [art] Populate DV Done
26,058,527 UART: [fht] FMC Alias Private Key: 7
26,060,126 UART: [art] Derive CDI
26,060,865 UART: [art] Store in in slot 0x4
26,103,383 UART: [art] Derive Key Pair
26,104,478 UART: [art] Store priv key in slot 0x5
29,346,780 UART: [art] Derive Key Pair - Done
29,359,563 UART: [art] Signing Cert with AUTHO
29,360,899 UART: RITY.KEYID = 7
31,640,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,086 UART: [art] PUB.X = 5034881BFC2314DEF5ED5F40A1B12D102241059FC3223CDEBFE79C210707E1289F6B09162AE3D3434A6165FB57DE17CB
31,649,329 UART: [art] PUB.Y = AE56FC5228BED27EE1DB14DC70251D475F236203C0A80C9A5910F2D5C288B5FA54BB4493C3D651A860B81DE1AD4EE6AC
31,656,591 UART: [art] SIG.R = 684F719026EE46F5F0C72E603B0C84B92861EBFB044587829C31773C2986EABA90D35AC43161E6C4156F6AE97B316460
31,663,978 UART: [art] SIG.S = ECF20792272EB4EC63C8C529B09129CBB3EE47FDEB485E4E8ADEA9CE2D6B589D7CC33FAC30690FA22699D178A726476C
32,969,487 UART: Caliptra RT
32,970,196 UART: [state] CFI Enabled
33,088,030 UART: [rt] RT listening for mailbox commands...
33,090,362 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,245,795 UART: [rt]cmd =0x41544d4e, len=14344
38,546,791 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,518 UART:
192,889 UART: Running Caliptra ROM ...
194,089 UART:
194,251 UART: [state] CFI Enabled
263,089 UART: [state] LifecycleState = Unprovisioned
265,010 UART: [state] DebugLocked = No
267,753 UART: [state] WD Timer not started. Device not locked for debugging
272,236 UART: [kat] SHA2-256
451,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,893 UART: [kat] ++
463,445 UART: [kat] sha1
474,755 UART: [kat] SHA2-256
477,827 UART: [kat] SHA2-384
483,031 UART: [kat] SHA2-512-ACC
485,975 UART: [kat] ECC-384
2,947,524 UART: [kat] HMAC-384Kdf
2,970,632 UART: [kat] LMS
3,500,075 UART: [kat] --
3,506,047 UART: [cold-reset] ++
3,507,537 UART: [fht] FHT @ 0x50003400
3,519,452 UART: [idev] ++
3,520,075 UART: [idev] CDI.KEYID = 6
3,520,972 UART: [idev] SUBJECT.KEYID = 7
3,522,147 UART: [idev] UDS.KEYID = 0
3,523,045 ready_for_fw is high
3,523,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,067 UART: [idev] Erasing UDS.KEYID = 0
6,023,167 UART: [idev] Sha1 KeyId Algorithm
6,044,940 UART: [idev] --
6,050,517 UART: [ldev] ++
6,051,088 UART: [ldev] CDI.KEYID = 6
6,052,005 UART: [ldev] SUBJECT.KEYID = 5
6,053,166 UART: [ldev] AUTHORITY.KEYID = 7
6,054,459 UART: [ldev] FE.KEYID = 1
6,099,602 UART: [ldev] Erasing FE.KEYID = 1
8,602,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,282 UART: [ldev] --
10,413,092 UART: [fwproc] Wait for Commands...
10,415,194 UART: [fwproc] Recv command 0x46574c44
10,417,229 UART: [fwproc] Recv'd Img size: 114084 bytes
13,811,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,270,571 >>> mbox cmd response: success
14,274,915 UART: [afmc] ++
14,275,513 UART: [afmc] CDI.KEYID = 6
14,276,412 UART: [afmc] SUBJECT.KEYID = 7
14,277,624 UART: [afmc] AUTHORITY.KEYID = 5
16,804,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,310 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,549 UART: [afmc] --
18,605,144 UART: [cold-reset] --
18,609,320 UART: [state] Locking Datavault
18,614,509 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,150 UART: [state] Locking ICCM
18,618,324 UART: [exit] Launching FMC @ 0x40000130
18,626,781 UART:
18,627,065 UART: Running Caliptra FMC ...
18,628,119 UART:
18,628,266 UART: [state] CFI Enabled
18,687,379 UART: [fht] FMC Alias Private Key: 7
20,451,631 UART: [art] Extend RT PCRs Done
20,452,855 UART: [art] Lock RT PCRs Done
20,454,773 UART: [art] Populate DV Done
20,460,126 UART: [fht] FMC Alias Private Key: 7
20,461,774 UART: [art] Derive CDI
20,462,569 UART: [art] Store in in slot 0x4
20,520,755 UART: [art] Derive Key Pair
20,521,761 UART: [art] Store priv key in slot 0x5
22,984,605 UART: [art] Derive Key Pair - Done
22,997,664 UART: [art] Signing Cert with AUTHO
22,998,963 UART: RITY.KEYID = 7
24,711,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,656 UART: [art] PUB.X = 97EF28E0E1B55DA4553737105D8B7C82FFF9313B582267B20B88C0962FA217CB920FB20773AB5E8E3701ABAE5CE95830
24,719,962 UART: [art] PUB.Y = 3376F2C7B57D4E8B693EBB08F106B9695502DB284E9863E550B92776DB13B483F349B2F6A3792A899C26722AC38659BB
24,727,167 UART: [art] SIG.R = 3E9029B8B376B9DA7770CCEF7755C6911D72D12A30BA9F703FB4468820711542728B3A2EDEAC0BE5BF43F59330A05A16
24,734,582 UART: [art] SIG.S = 6906BB9054FC02D697647E8CC34AF23E18C4729DD0E1EAEFC41C3981269C51FB9A38C600BA4BEAB699BD5CA8AD5DFB42
25,713,638 UART: Caliptra RT
25,714,328 UART: [state] CFI Enabled
25,879,328 UART: [rt] RT listening for mailbox commands...
25,881,647 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,036,742 UART: [rt]cmd =0x41544d4e, len=14344
30,032,121 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,489 writing to cptra_bootfsm_go
3,383,183 ready_for_fw is high
3,383,571 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,062,134 >>> mbox cmd response: success
18,346,297 UART:
18,346,683 UART: Running Caliptra FMC ...
18,347,885 UART:
18,348,051 UART: [state] CFI Enabled
18,410,706 UART: [fht] FMC Alias Private Key: 7
20,174,913 UART: [art] Extend RT PCRs Done
20,176,151 UART: [art] Lock RT PCRs Done
20,177,622 UART: [art] Populate DV Done
20,183,128 UART: [fht] FMC Alias Private Key: 7
20,184,668 UART: [art] Derive CDI
20,185,479 UART: [art] Store in in slot 0x4
20,243,275 UART: [art] Derive Key Pair
20,244,313 UART: [art] Store priv key in slot 0x5
22,707,152 UART: [art] Derive Key Pair - Done
22,719,776 UART: [art] Signing Cert with AUTHO
22,721,074 UART: RITY.KEYID = 7
24,433,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,603 UART: [art] PUB.X = 70BEA8A07081C5FB803F862EA3174D142DD45FD44A80D69EC45DB8DC3A5BFF5FD5144EE4FA465B30A5E1976EC08206BE
24,441,843 UART: [art] PUB.Y = 91A31CC353B6808A78011535890BB90C9FAE40657B3B750D4D086BF445F9BBE15FF7FC5AF0420F6CFBA90CE7E7E9D1C2
24,449,146 UART: [art] SIG.R = E8D918186A12A6E69D443181E89A6437C7A6F4D57C5CC57512844E1B880A7E9377F0C47A53C55465B56F2429BF2D813C
24,456,553 UART: [art] SIG.S = 13F815F1E5941737BAF056642DF175593F8C96B446FCBDA6C9035F655685C199EA036C99A3F6FA471036331F0670DF0B
25,435,322 UART: Caliptra RT
25,436,080 UART: [state] CFI Enabled
25,601,867 UART: [rt] RT listening for mailbox commands...
25,604,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,759,489 UART: [rt]cmd =0x41544d4e, len=14344
29,755,112 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,882 writing to cptra_bootfsm_go
193,107 UART:
193,472 UART: Running Caliptra ROM ...
194,659 UART:
604,376 UART: [state] CFI Enabled
618,350 UART: [state] LifecycleState = Unprovisioned
620,177 UART: [state] DebugLocked = No
622,480 UART: [state] WD Timer not started. Device not locked for debugging
625,624 UART: [kat] SHA2-256
804,772 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,383 UART: [kat] ++
816,842 UART: [kat] sha1
827,932 UART: [kat] SHA2-256
830,940 UART: [kat] SHA2-384
835,586 UART: [kat] SHA2-512-ACC
838,522 UART: [kat] ECC-384
3,282,215 UART: [kat] HMAC-384Kdf
3,294,303 UART: [kat] LMS
3,823,801 UART: [kat] --
3,829,229 UART: [cold-reset] ++
3,830,102 UART: [fht] FHT @ 0x50003400
3,842,428 UART: [idev] ++
3,843,003 UART: [idev] CDI.KEYID = 6
3,843,925 UART: [idev] SUBJECT.KEYID = 7
3,845,121 UART: [idev] UDS.KEYID = 0
3,846,048 ready_for_fw is high
3,846,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,570 UART: [idev] Erasing UDS.KEYID = 0
6,314,196 UART: [idev] Sha1 KeyId Algorithm
6,336,614 UART: [idev] --
6,341,413 UART: [ldev] ++
6,341,982 UART: [ldev] CDI.KEYID = 6
6,343,044 UART: [ldev] SUBJECT.KEYID = 5
6,344,157 UART: [ldev] AUTHORITY.KEYID = 7
6,345,334 UART: [ldev] FE.KEYID = 1
6,354,629 UART: [ldev] Erasing FE.KEYID = 1
8,829,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,126 UART: [ldev] --
10,620,944 UART: [fwproc] Wait for Commands...
10,623,795 UART: [fwproc] Recv command 0x46574c44
10,625,889 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,474,514 >>> mbox cmd response: success
14,477,971 UART: [afmc] ++
14,478,567 UART: [afmc] CDI.KEYID = 6
14,479,482 UART: [afmc] SUBJECT.KEYID = 7
14,480,642 UART: [afmc] AUTHORITY.KEYID = 5
16,978,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,769,832 UART: [afmc] --
18,773,044 UART: [cold-reset] --
18,776,278 UART: [state] Locking Datavault
18,780,726 UART: [state] Locking PCR0, PCR1 and PCR31
18,782,378 UART: [state] Locking ICCM
18,784,041 UART: [exit] Launching FMC @ 0x40000130
18,792,442 UART:
18,792,686 UART: Running Caliptra FMC ...
18,793,793 UART:
18,793,957 UART: [state] CFI Enabled
18,802,063 UART: [fht] FMC Alias Private Key: 7
20,559,246 UART: [art] Extend RT PCRs Done
20,560,453 UART: [art] Lock RT PCRs Done
20,562,202 UART: [art] Populate DV Done
20,567,620 UART: [fht] FMC Alias Private Key: 7
20,569,324 UART: [art] Derive CDI
20,570,143 UART: [art] Store in in slot 0x4
20,612,914 UART: [art] Derive Key Pair
20,613,956 UART: [art] Store priv key in slot 0x5
23,040,543 UART: [art] Derive Key Pair - Done
23,053,692 UART: [art] Signing Cert with AUTHO
23,055,004 UART: RITY.KEYID = 7
24,760,329 UART: [art] Erasing AUTHORITY.KEYID = 7
24,761,842 UART: [art] PUB.X = 7EDCAF339E479CE918D7A0D9A6AF66664E436ADCE6228EE61BA16AC2152585F9A5835AAD91A422CFD3E9E6662C56A12E
24,769,142 UART: [art] PUB.Y = 6AEF5A1EC4DC1E07A58383F40A02EDBEE3EA19C53243F4D803EDEB4CA6A66451E70E44D82A7470D79F72E84911F7B12D
24,776,360 UART: [art] SIG.R = C4CFA9A329DC59B1FA2DA3F21D891CCF21EF59424487BA1EA5F2BC0C37CE6A9F65B95DA07BA68905F3135DD6D7C517ED
24,783,777 UART: [art] SIG.S = EB07308005EA6209B441793F0C3631380010090842A3B97350539769636A33DCF43B43466818CA91A417531180C5F660
25,762,784 UART: Caliptra RT
25,763,487 UART: [state] CFI Enabled
25,880,200 UART: [rt] RT listening for mailbox commands...
25,882,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,038,198 UART: [rt]cmd =0x41544d4e, len=14344
30,033,877 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
3,691,830 ready_for_fw is high
3,692,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,250,221 >>> mbox cmd response: success
18,501,633 UART:
18,502,046 UART: Running Caliptra FMC ...
18,503,243 UART:
18,503,416 UART: [state] CFI Enabled
18,511,631 UART: [fht] FMC Alias Private Key: 7
20,268,578 UART: [art] Extend RT PCRs Done
20,269,802 UART: [art] Lock RT PCRs Done
20,271,483 UART: [art] Populate DV Done
20,276,664 UART: [fht] FMC Alias Private Key: 7
20,278,375 UART: [art] Derive CDI
20,279,197 UART: [art] Store in in slot 0x4
20,321,746 UART: [art] Derive Key Pair
20,322,745 UART: [art] Store priv key in slot 0x5
22,749,217 UART: [art] Derive Key Pair - Done
22,762,004 UART: [art] Signing Cert with AUTHO
22,763,323 UART: RITY.KEYID = 7
24,468,804 UART: [art] Erasing AUTHORITY.KEYID = 7
24,470,335 UART: [art] PUB.X = 48518CF5E1A3D03AD253FEE1A4EB48008CB8C3844361E9AEA6C473A604B9D6CAD3443FDB4A70A42DBC169AE7520FE33D
24,477,618 UART: [art] PUB.Y = B5920BB987AD485B8D22322560EA984FC7068CB2877CE53CE362D2B644DE10566AFC9EBF08F76FE1F3EA6E4A1DDAC357
24,484,874 UART: [art] SIG.R = 86AFF12AA413A32B03134AA0B536AE53E69D1A7A508C3AD05477445E8D10A09ACB4C131FF5DAF2CD62CE92721EFA929A
24,492,306 UART: [art] SIG.S = 4039D1BE31B606CDB1A561F46568A25460197BF9FD1311A36B855D53CD313CEB8540B41FE2C2C08423DB36C8CE8A5C0C
25,470,977 UART: Caliptra RT
25,471,671 UART: [state] CFI Enabled
25,589,378 UART: [rt] RT listening for mailbox commands...
25,591,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,746,823 UART: [rt]cmd =0x41544d4e, len=14344
29,742,377 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,589 UART:
192,958 UART: Running Caliptra ROM ...
194,104 UART:
194,251 UART: [state] CFI Enabled
262,329 UART: [state] LifecycleState = Unprovisioned
264,747 UART: [state] DebugLocked = No
266,206 UART: [state] WD Timer not started. Device not locked for debugging
271,518 UART: [kat] SHA2-256
461,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,109 UART: [kat] ++
472,595 UART: [kat] sha1
484,749 UART: [kat] SHA2-256
487,754 UART: [kat] SHA2-384
495,446 UART: [kat] SHA2-512-ACC
498,034 UART: [kat] ECC-384
2,950,394 UART: [kat] HMAC-384Kdf
2,973,805 UART: [kat] LMS
3,505,516 UART: [kat] --
3,510,308 UART: [cold-reset] ++
3,512,313 UART: [fht] FHT @ 0x50003400
3,524,519 UART: [idev] ++
3,525,226 UART: [idev] CDI.KEYID = 6
3,526,257 UART: [idev] SUBJECT.KEYID = 7
3,527,360 UART: [idev] UDS.KEYID = 0
3,528,435 ready_for_fw is high
3,528,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,294 UART: [idev] Erasing UDS.KEYID = 0
6,028,848 UART: [idev] Sha1 KeyId Algorithm
6,050,034 UART: [idev] --
6,054,218 UART: [ldev] ++
6,054,914 UART: [ldev] CDI.KEYID = 6
6,055,837 UART: [ldev] SUBJECT.KEYID = 5
6,056,993 UART: [ldev] AUTHORITY.KEYID = 7
6,058,168 UART: [ldev] FE.KEYID = 1
6,102,356 UART: [ldev] Erasing FE.KEYID = 1
8,608,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,776 UART: [ldev] --
10,416,473 UART: [fwproc] Wait for Commands...
10,418,626 UART: [fwproc] Recv command 0x46574c44
10,420,931 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,592,937 >>> mbox cmd response: success
14,597,103 UART: [afmc] ++
14,597,807 UART: [afmc] CDI.KEYID = 6
14,598,995 UART: [afmc] SUBJECT.KEYID = 7
14,600,432 UART: [afmc] AUTHORITY.KEYID = 5
17,132,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,093 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,122 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,456 UART: [afmc] --
18,929,482 UART: [cold-reset] --
18,933,293 UART: [state] Locking Datavault
18,938,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,035 UART: [state] Locking ICCM
18,943,689 UART: [exit] Launching FMC @ 0x40000130
18,952,325 UART:
18,952,565 UART: Running Caliptra FMC ...
18,953,664 UART:
18,953,821 UART: [state] CFI Enabled
19,012,263 UART: [fht] FMC Alias Private Key: 7
20,776,053 UART: [art] Extend RT PCRs Done
20,777,279 UART: [art] Lock RT PCRs Done
20,778,663 UART: [art] Populate DV Done
20,784,348 UART: [fht] FMC Alias Private Key: 7
20,785,826 UART: [art] Derive CDI
20,786,555 UART: [art] Store in in slot 0x4
20,844,667 UART: [art] Derive Key Pair
20,845,664 UART: [art] Store priv key in slot 0x5
23,322,124 UART: [art] Derive Key Pair - Done
23,335,280 UART: [art] Signing Cert with AUTHO
23,336,618 UART: RITY.KEYID = 7
25,048,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,049,580 UART: [art] PUB.X = F4396D97FDD484212CC7BAF66C3345BAA2A066634C956E0AA66AE01F1A15AEEDD8A486E6BAB1E3196EA46D3E2D7736D0
25,056,853 UART: [art] PUB.Y = DC3E102FF378C8EF57FE6F8C1B0B1FCEC9293AB31F1D6BB91772A1ED617C0077CD87564D22765ED71EB91DB2405CD707
25,064,163 UART: [art] SIG.R = 82D614F262CA490E94C99801111726713F500CF23DE60C51BCFB4C384C0D55A4593D95D5A388E76E1CE14CABDF262946
25,071,554 UART: [art] SIG.S = F32BF8EACC96F2256F97CF8AC74A7E4E913ACABBBD4CE36DCB8BC29A20720EF3EB2A798907DE63451B74A4E5C25FB911
26,050,149 UART: Caliptra RT
26,050,869 UART: [state] CFI Enabled
26,215,300 UART: [rt] RT listening for mailbox commands...
26,217,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,372,831 UART: [rt]cmd =0x41544d4e, len=14344
30,368,219 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,439,622 ready_for_fw is high
3,440,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,732,883 >>> mbox cmd response: success
19,022,065 UART:
19,022,493 UART: Running Caliptra FMC ...
19,023,632 UART:
19,023,799 UART: [state] CFI Enabled
19,093,041 UART: [fht] FMC Alias Private Key: 7
20,856,721 UART: [art] Extend RT PCRs Done
20,857,950 UART: [art] Lock RT PCRs Done
20,859,755 UART: [art] Populate DV Done
20,865,386 UART: [fht] FMC Alias Private Key: 7
20,866,871 UART: [art] Derive CDI
20,867,630 UART: [art] Store in in slot 0x4
20,925,745 UART: [art] Derive Key Pair
20,926,747 UART: [art] Store priv key in slot 0x5
23,389,756 UART: [art] Derive Key Pair - Done
23,402,710 UART: [art] Signing Cert with AUTHO
23,404,013 UART: RITY.KEYID = 7
25,115,970 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,471 UART: [art] PUB.X = 89C1447FDE67D40D723ABB6D43D7D69A0ECA8F1D220A31E9E649CE47535FB7EEB945C7627F224764AAF1927E9E3521F5
25,124,706 UART: [art] PUB.Y = 7C98792CAB95D45F0A7E07ABF8760624A09C8D58014C4A629A09FE831F7A5887FAC3D8308C69D8DB74FBE3ACDB492016
25,131,981 UART: [art] SIG.R = 9CCD52CED6F8F53FE64019A901EB378E6831B4990B901B90444144B7EF4CA29AEC5883D9FF8E94807E6E00F1D485514D
25,139,362 UART: [art] SIG.S = D09C39617BBEE0AB629D95A00446D307DB1C916955F1336CBF634EE2483B974E6456ECD2CD20530CA4DB61060EFF5B7E
26,118,577 UART: Caliptra RT
26,119,282 UART: [state] CFI Enabled
26,283,681 UART: [rt] RT listening for mailbox commands...
26,285,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,441,591 UART: [rt]cmd =0x41544d4e, len=14344
30,437,349 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
193,065 UART:
193,443 UART: Running Caliptra ROM ...
194,649 UART:
604,078 UART: [state] CFI Enabled
618,259 UART: [state] LifecycleState = Unprovisioned
620,642 UART: [state] DebugLocked = No
622,963 UART: [state] WD Timer not started. Device not locked for debugging
627,415 UART: [kat] SHA2-256
817,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,105 UART: [kat] ++
828,743 UART: [kat] sha1
840,267 UART: [kat] SHA2-256
843,267 UART: [kat] SHA2-384
850,039 UART: [kat] SHA2-512-ACC
852,634 UART: [kat] ECC-384
3,298,182 UART: [kat] HMAC-384Kdf
3,311,134 UART: [kat] LMS
3,842,992 UART: [kat] --
3,847,703 UART: [cold-reset] ++
3,849,921 UART: [fht] FHT @ 0x50003400
3,862,035 UART: [idev] ++
3,862,747 UART: [idev] CDI.KEYID = 6
3,863,704 UART: [idev] SUBJECT.KEYID = 7
3,864,873 UART: [idev] UDS.KEYID = 0
3,865,832 ready_for_fw is high
3,866,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,009,300 UART: [idev] Erasing UDS.KEYID = 0
6,340,236 UART: [idev] Sha1 KeyId Algorithm
6,363,095 UART: [idev] --
6,367,802 UART: [ldev] ++
6,368,493 UART: [ldev] CDI.KEYID = 6
6,369,410 UART: [ldev] SUBJECT.KEYID = 5
6,370,623 UART: [ldev] AUTHORITY.KEYID = 7
6,371,806 UART: [ldev] FE.KEYID = 1
6,383,157 UART: [ldev] Erasing FE.KEYID = 1
8,857,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,667 UART: [ldev] --
10,649,063 UART: [fwproc] Wait for Commands...
10,652,029 UART: [fwproc] Recv command 0x46574c44
10,654,287 UART: [fwproc] Recv'd Img size: 114084 bytes
14,094,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,967 >>> mbox cmd response: success
14,832,389 UART: [afmc] ++
14,833,097 UART: [afmc] CDI.KEYID = 6
14,834,270 UART: [afmc] SUBJECT.KEYID = 7
14,835,765 UART: [afmc] AUTHORITY.KEYID = 5
17,340,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,057 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,253 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,405 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,389 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,519 UART: [afmc] --
19,139,129 UART: [cold-reset] --
19,143,761 UART: [state] Locking Datavault
19,147,998 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,150 UART: [state] Locking ICCM
19,153,062 UART: [exit] Launching FMC @ 0x40000130
19,161,697 UART:
19,161,944 UART: Running Caliptra FMC ...
19,163,050 UART:
19,163,212 UART: [state] CFI Enabled
19,171,369 UART: [fht] FMC Alias Private Key: 7
20,928,331 UART: [art] Extend RT PCRs Done
20,929,669 UART: [art] Lock RT PCRs Done
20,930,999 UART: [art] Populate DV Done
20,936,435 UART: [fht] FMC Alias Private Key: 7
20,938,028 UART: [art] Derive CDI
20,938,849 UART: [art] Store in in slot 0x4
20,981,457 UART: [art] Derive Key Pair
20,982,499 UART: [art] Store priv key in slot 0x5
23,408,370 UART: [art] Derive Key Pair - Done
23,421,324 UART: [art] Signing Cert with AUTHO
23,422,646 UART: RITY.KEYID = 7
25,127,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,383 UART: [art] PUB.X = 8703130406A7675A31D0D45C7C80C02A9B4CA601547E114E5FB42BD46CFF7F79BA06AA322EB72E60E7BE319F8F1B12F2
25,136,664 UART: [art] PUB.Y = 24646A8C1373A3A80A6E6733ED48C498C2F189169008EFB06BE05A8050E00664E9653C6A367F7ECA375201B46AF8FB44
25,143,921 UART: [art] SIG.R = 1CF89E0075CE2F0A05184AF0D24B2177FD3F0CA0FCCA27747C4F71BA4C532C74516A1265949EB373DF125DA0AC2E1773
25,151,288 UART: [art] SIG.S = AA1DF52C09BBBCFB2CC56F52B4CCDDB2D4CB22B0F9FA8EDC92524C0936A61752A7F69813B729834C170632D7D32A6F91
26,130,121 UART: Caliptra RT
26,130,838 UART: [state] CFI Enabled
26,247,924 UART: [rt] RT listening for mailbox commands...
26,250,232 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,405,336 UART: [rt]cmd =0x41544d4e, len=14344
30,400,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
3,759,920 ready_for_fw is high
3,760,409 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,962,820 >>> mbox cmd response: success
19,211,082 UART:
19,211,476 UART: Running Caliptra FMC ...
19,212,606 UART:
19,212,769 UART: [state] CFI Enabled
19,220,756 UART: [fht] FMC Alias Private Key: 7
20,977,684 UART: [art] Extend RT PCRs Done
20,978,920 UART: [art] Lock RT PCRs Done
20,980,569 UART: [art] Populate DV Done
20,986,197 UART: [fht] FMC Alias Private Key: 7
20,987,753 UART: [art] Derive CDI
20,988,576 UART: [art] Store in in slot 0x4
21,030,970 UART: [art] Derive Key Pair
21,032,019 UART: [art] Store priv key in slot 0x5
23,459,560 UART: [art] Derive Key Pair - Done
23,472,356 UART: [art] Signing Cert with AUTHO
23,473,915 UART: RITY.KEYID = 7
25,178,630 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,158 UART: [art] PUB.X = 437FF9AAEF32650D8D563CE0BF63F8955CF74E65B6FF59DFD91190808EFCE8DF124724BCF02FD384F72A38E22A555E3D
25,187,457 UART: [art] PUB.Y = 3A2793B692243B86452A5C9BD2EEA35B64A2FE61BA3DF684E78101FE412B46FEE9369B6F7E2AD324C7B413BB93C01884
25,194,715 UART: [art] SIG.R = 94B23FD1042E9B4B8708D5C7EADDC2F1347C9114E90DE401ACE03DAB5A57620AC7DBFB62499CD84BD219D36A138B652F
25,202,167 UART: [art] SIG.S = 1E86826F0332FC587A6ACF0332BA497024B1D068916723F0019959B78B37E8CBFECCCFC592C858F5EAA35E38C1ADF74A
26,180,787 UART: Caliptra RT
26,181,491 UART: [state] CFI Enabled
26,298,516 UART: [rt] RT listening for mailbox commands...
26,300,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,455,961 UART: [rt]cmd =0x41544d4e, len=14344
30,451,614 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,337 UART: [kat] SHA2-256
882,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,383 UART: [kat] ++
886,535 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,432 UART: [kat] SHA2-512-ACC
897,333 UART: [kat] ECC-384
903,242 UART: [kat] HMAC-384Kdf
907,830 UART: [kat] LMS
1,476,026 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,910 UART: [idev] ++
1,480,078 UART: [idev] CDI.KEYID = 6
1,480,438 UART: [idev] SUBJECT.KEYID = 7
1,480,862 UART: [idev] UDS.KEYID = 0
1,481,207 ready_for_fw is high
1,481,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,792 UART: [idev] Erasing UDS.KEYID = 0
1,505,312 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,080 UART: [idev] --
1,515,071 UART: [ldev] ++
1,515,239 UART: [ldev] CDI.KEYID = 6
1,515,602 UART: [ldev] SUBJECT.KEYID = 5
1,516,028 UART: [ldev] AUTHORITY.KEYID = 7
1,516,491 UART: [ldev] FE.KEYID = 1
1,521,501 UART: [ldev] Erasing FE.KEYID = 1
1,547,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,910 UART: [ldev] --
1,586,213 UART: [fwproc] Waiting for Commands...
1,586,932 UART: [fwproc] Received command 0x46574c44
1,587,723 UART: [fwproc] Received Image of size 114084 bytes
2,883,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,200 >>> mbox cmd response: success
3,076,330 UART: [afmc] ++
3,076,498 UART: [afmc] CDI.KEYID = 6
3,076,860 UART: [afmc] SUBJECT.KEYID = 7
3,077,285 UART: [afmc] AUTHORITY.KEYID = 5
3,112,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,986 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,494 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,379 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,069 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,980 UART: [afmc] --
3,156,006 UART: [cold-reset] --
3,156,744 UART: [state] Locking Datavault
3,157,803 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,407 UART: [state] Locking ICCM
3,159,067 UART: [exit] Launching FMC @ 0x40000130
3,164,396 UART:
3,164,412 UART: Running Caliptra FMC ...
3,164,820 UART:
3,164,874 UART: [state] CFI Enabled
3,175,519 UART: [fht] FMC Alias Private Key: 7
3,283,740 UART: [art] Extend RT PCRs Done
3,284,168 UART: [art] Lock RT PCRs Done
3,285,846 UART: [art] Populate DV Done
3,294,041 UART: [fht] FMC Alias Private Key: 7
3,294,997 UART: [art] Derive CDI
3,295,277 UART: [art] Store in in slot 0x4
3,381,042 UART: [art] Derive Key Pair
3,381,402 UART: [art] Store priv key in slot 0x5
3,394,678 UART: [art] Derive Key Pair - Done
3,409,191 UART: [art] Signing Cert with AUTHO
3,409,671 UART: RITY.KEYID = 7
3,424,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,302 UART: [art] PUB.X = 12728434428E3281D4E737FCF7DBFE886385DD648311BE4947144C1CB74AF5818884901B6DFED9FFFE10C410CC002B36
3,432,052 UART: [art] PUB.Y = AC7C5EA66F5B85E370DA9B546DB66A0B43558A52FA0099842F33B0A7650A1F5DC14985E75EE2A867B4B5E55FE0361C3A
3,438,984 UART: [art] SIG.R = 8283471FED9FE0E6FC720DDA8294B2E932918FBFB5B9964E58270AA9B24ECF81F4B9259AC519630D6156A5635BEB7A35
3,445,753 UART: [art] SIG.S = B5F7CB9297018573DE2DC6D32353B5395C1EFD585EB9C74636E93DD7970259D4D71B6DBBADD9429546F6988DE9596E6C
3,469,256 UART: Caliptra RT
3,469,509 UART: [state] CFI Enabled
3,576,987 UART: [rt] RT listening for mailbox commands...
3,577,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,663 UART: [rt]cmd =0x41544d4e, len=14344
4,011,496 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,504 >>> mbox cmd response: success
2,986,112 UART:
2,986,128 UART: Running Caliptra FMC ...
2,986,536 UART:
2,986,590 UART: [state] CFI Enabled
2,997,045 UART: [fht] FMC Alias Private Key: 7
3,105,150 UART: [art] Extend RT PCRs Done
3,105,578 UART: [art] Lock RT PCRs Done
3,107,472 UART: [art] Populate DV Done
3,115,723 UART: [fht] FMC Alias Private Key: 7
3,116,885 UART: [art] Derive CDI
3,117,165 UART: [art] Store in in slot 0x4
3,202,758 UART: [art] Derive Key Pair
3,203,118 UART: [art] Store priv key in slot 0x5
3,215,766 UART: [art] Derive Key Pair - Done
3,230,638 UART: [art] Signing Cert with AUTHO
3,231,118 UART: RITY.KEYID = 7
3,245,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,285 UART: [art] PUB.X = B49C69F8FF16A599D5FC95FE7026DA35DBBFE486CFC93B2762B074421DCE4BA7B29A70B1304CF3343AA81EAA2F22031C
3,253,070 UART: [art] PUB.Y = C6167FEE8691F6D834D24D4FA36C745476FEE44F838ED9395D365673C4FD83215555BB472FA072B7AB9C6B34FC654A65
3,260,024 UART: [art] SIG.R = EC98F17F40E7D01922C608E04EBADB7948237C7A581DA746D2C99CC9381B36462FA78498B22D5781FF7D7661A6540E0A
3,266,787 UART: [art] SIG.S = 8A33AD2828C51C2C4A0F31272997E4BF445BF45DD2AE4E7B2953132E8EBCF6804C09CC61C1B65E1EE10DAA2DC69DD865
3,290,785 UART: Caliptra RT
3,291,038 UART: [state] CFI Enabled
3,399,246 UART: [rt] RT listening for mailbox commands...
3,399,916 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,162 UART: [rt]cmd =0x41544d4e, len=14344
3,833,059 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,658 UART: [kat] SHA2-256
882,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,704 UART: [kat] ++
886,856 UART: [kat] sha1
890,964 UART: [kat] SHA2-256
892,902 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,303 UART: [kat] LMS
1,475,499 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,477,014 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,475 UART: [idev] Erasing UDS.KEYID = 0
1,505,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,707 UART: [idev] --
1,514,530 UART: [ldev] ++
1,514,698 UART: [ldev] CDI.KEYID = 6
1,515,061 UART: [ldev] SUBJECT.KEYID = 5
1,515,487 UART: [ldev] AUTHORITY.KEYID = 7
1,515,950 UART: [ldev] FE.KEYID = 1
1,521,250 UART: [ldev] Erasing FE.KEYID = 1
1,546,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,491 UART: [ldev] --
1,585,834 UART: [fwproc] Waiting for Commands...
1,586,629 UART: [fwproc] Received command 0x46574c44
1,587,420 UART: [fwproc] Received Image of size 114084 bytes
2,881,878 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,411 >>> mbox cmd response: success
3,074,581 UART: [afmc] ++
3,074,749 UART: [afmc] CDI.KEYID = 6
3,075,111 UART: [afmc] SUBJECT.KEYID = 7
3,075,536 UART: [afmc] AUTHORITY.KEYID = 5
3,110,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,900 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,590 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,399 UART: [afmc] --
3,153,527 UART: [cold-reset] --
3,154,423 UART: [state] Locking Datavault
3,155,658 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,262 UART: [state] Locking ICCM
3,156,854 UART: [exit] Launching FMC @ 0x40000130
3,162,183 UART:
3,162,199 UART: Running Caliptra FMC ...
3,162,607 UART:
3,162,750 UART: [state] CFI Enabled
3,173,611 UART: [fht] FMC Alias Private Key: 7
3,281,644 UART: [art] Extend RT PCRs Done
3,282,072 UART: [art] Lock RT PCRs Done
3,283,884 UART: [art] Populate DV Done
3,291,933 UART: [fht] FMC Alias Private Key: 7
3,292,983 UART: [art] Derive CDI
3,293,263 UART: [art] Store in in slot 0x4
3,378,386 UART: [art] Derive Key Pair
3,378,746 UART: [art] Store priv key in slot 0x5
3,391,450 UART: [art] Derive Key Pair - Done
3,406,023 UART: [art] Signing Cert with AUTHO
3,406,503 UART: RITY.KEYID = 7
3,421,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,500 UART: [art] PUB.X = 93460B7A3BEDE8B313B2B8060A4A301CA40BADE548B87B8D5FC80B5FE9150A36384C186CC7C5DB99631FAE32BC967EC6
3,429,268 UART: [art] PUB.Y = FCC7DFF3313EDC438A0ED606151D1E4F193E8E753FB9E6536CAE91387201E860354C1D7819439FB2561113183C1EF5EA
3,436,213 UART: [art] SIG.R = 11C450A340A66AE3E9660F8570DBDFF0B3AD89A96E036238D3B8CF03F963BA25DA91EB6D055A661AC3FE2D29B954D071
3,442,983 UART: [art] SIG.S = FBDE0C1F6CBFDA64E23AC69DBC8FD6FDCF5C8E874489B3DA5BCAB78869D485DFCD50D355508CA608C9424DD4387B8EDF
3,466,652 UART: Caliptra RT
3,466,997 UART: [state] CFI Enabled
3,574,610 UART: [rt] RT listening for mailbox commands...
3,575,280 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,094 UART: [rt]cmd =0x41544d4e, len=14344
4,008,059 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 ready_for_fw is high
1,363,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,617 >>> mbox cmd response: success
2,985,897 UART:
2,985,913 UART: Running Caliptra FMC ...
2,986,321 UART:
2,986,464 UART: [state] CFI Enabled
2,996,879 UART: [fht] FMC Alias Private Key: 7
3,105,234 UART: [art] Extend RT PCRs Done
3,105,662 UART: [art] Lock RT PCRs Done
3,106,904 UART: [art] Populate DV Done
3,115,253 UART: [fht] FMC Alias Private Key: 7
3,116,425 UART: [art] Derive CDI
3,116,705 UART: [art] Store in in slot 0x4
3,202,828 UART: [art] Derive Key Pair
3,203,188 UART: [art] Store priv key in slot 0x5
3,216,204 UART: [art] Derive Key Pair - Done
3,231,169 UART: [art] Signing Cert with AUTHO
3,231,649 UART: RITY.KEYID = 7
3,246,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,680 UART: [art] PUB.X = 6AE2A690526BF1AF737F08261C678551E59AED044A8407034FE623FBB8FA088A569F464A63753B7827B63DC7022D3A4A
3,254,432 UART: [art] PUB.Y = 77C1CBB9224B157CC655C81061E6740FD0C7C761137AAA1006CD9E2DBC4471374DE88CB9D22F81B12F4CC3E068831BDD
3,261,386 UART: [art] SIG.R = 07A72DFC8ACDA0E19621ACD35A2828C5DD741581B94EFF0BAC3ECB52C935FDF96F1FC9F8333036C4C3A17C228F04D84B
3,268,167 UART: [art] SIG.S = C06F5AC563EDFB162CDC40904818C9B98AB98B97FDC177D07B136443C00702FE11EE85850235D5ACB4A3EB643F9EDE77
3,291,961 UART: Caliptra RT
3,292,306 UART: [state] CFI Enabled
3,399,947 UART: [rt] RT listening for mailbox commands...
3,400,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,317 UART: [rt]cmd =0x41544d4e, len=14344
3,833,174 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,120 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,172,113 UART: [cold-reset] ++
1,172,605 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 ready_for_fw is high
1,176,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,200,825 UART: [idev] Sha1 KeyId Algorithm
1,209,235 UART: [idev] --
1,210,283 UART: [ldev] ++
1,210,451 UART: [ldev] CDI.KEYID = 6
1,210,814 UART: [ldev] SUBJECT.KEYID = 5
1,211,240 UART: [ldev] AUTHORITY.KEYID = 7
1,211,703 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,807 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,840 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,557 >>> mbox cmd response: success
2,771,799 UART: [afmc] ++
2,771,967 UART: [afmc] CDI.KEYID = 6
2,772,329 UART: [afmc] SUBJECT.KEYID = 7
2,772,754 UART: [afmc] AUTHORITY.KEYID = 5
2,808,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,795 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,402 UART: [afmc] --
2,852,310 UART: [cold-reset] --
2,853,154 UART: [state] Locking Datavault
2,854,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,781 UART: [state] Locking ICCM
2,855,317 UART: [exit] Launching FMC @ 0x40000130
2,860,646 UART:
2,860,662 UART: Running Caliptra FMC ...
2,861,070 UART:
2,861,124 UART: [state] CFI Enabled
2,871,575 UART: [fht] FMC Alias Private Key: 7
2,979,386 UART: [art] Extend RT PCRs Done
2,979,814 UART: [art] Lock RT PCRs Done
2,981,394 UART: [art] Populate DV Done
2,989,427 UART: [fht] FMC Alias Private Key: 7
2,990,537 UART: [art] Derive CDI
2,990,817 UART: [art] Store in in slot 0x4
3,076,548 UART: [art] Derive Key Pair
3,076,908 UART: [art] Store priv key in slot 0x5
3,090,518 UART: [art] Derive Key Pair - Done
3,105,352 UART: [art] Signing Cert with AUTHO
3,105,832 UART: RITY.KEYID = 7
3,121,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,843 UART: [art] PUB.X = 0FECBEAB006F493F5473A5C9EC91590F64FFF5FB2175FAECEAB39F2350529367295BB1688D97FF282C1BE6615468D308
3,128,592 UART: [art] PUB.Y = 8A8D5E154A59456519E1870DBAE0297C872B98368195538A2FB78C3ACF12E076956465A11BF9FDA6FA9C9B904C1967AB
3,135,541 UART: [art] SIG.R = 7182397E7DEEB27256218E6E6CB514783713098E40531F3F4B57D3FE64E388E078755EA6896AD3A9D892DB16F4F23072
3,142,302 UART: [art] SIG.S = 4123E1F74136200639905BEA1BBF96E9AEBD66EFAA08717EB20E47EB9B8F1608EF6CA70C5EE5F0F09DD539F0C19B981A
3,166,434 UART: Caliptra RT
3,166,687 UART: [state] CFI Enabled
3,274,890 UART: [rt] RT listening for mailbox commands...
3,275,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,658 UART: [rt]cmd =0x41544d4e, len=14344
3,708,529 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,525 ready_for_fw is high
1,060,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,600 >>> mbox cmd response: success
2,685,478 UART:
2,685,494 UART: Running Caliptra FMC ...
2,685,902 UART:
2,685,956 UART: [state] CFI Enabled
2,696,337 UART: [fht] FMC Alias Private Key: 7
2,804,444 UART: [art] Extend RT PCRs Done
2,804,872 UART: [art] Lock RT PCRs Done
2,806,500 UART: [art] Populate DV Done
2,814,765 UART: [fht] FMC Alias Private Key: 7
2,815,769 UART: [art] Derive CDI
2,816,049 UART: [art] Store in in slot 0x4
2,901,446 UART: [art] Derive Key Pair
2,901,806 UART: [art] Store priv key in slot 0x5
2,914,718 UART: [art] Derive Key Pair - Done
2,929,648 UART: [art] Signing Cert with AUTHO
2,930,128 UART: RITY.KEYID = 7
2,945,164 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,929 UART: [art] PUB.X = FEBEA389379F3C091FF53E4F932B9C9D38DC5AE7F167396EFA34D6AF9E39BC6E2D4D89049264B301A07B76501920EC79
2,952,700 UART: [art] PUB.Y = EFD499F4EF76DBCFC23CAFDA55506D80096DCAAE0831BF4B9177EF22DB07DD44FD7BF73B5DBDE6ECB6FB1D2467B99F13
2,959,675 UART: [art] SIG.R = C36689F4F7CC15039DF4177EEF67CF75029BD9B230B7B9B84CB81F145706F812D507FCB3A1980B8360A1DA474AC76B96
2,966,436 UART: [art] SIG.S = 3D6574691C1B67043F0FBF299A0DB81B36E88B9AED240D9400DCAA08C35C2FAE82F68F776E791582C7DA26203A55E8B4
2,990,370 UART: Caliptra RT
2,990,623 UART: [state] CFI Enabled
3,097,938 UART: [rt] RT listening for mailbox commands...
3,098,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,816 UART: [rt]cmd =0x41544d4e, len=14344
3,531,953 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,896 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,710 UART: [fht] FHT @ 0x50003400
1,175,191 UART: [idev] ++
1,175,359 UART: [idev] CDI.KEYID = 6
1,175,719 UART: [idev] SUBJECT.KEYID = 7
1,176,143 UART: [idev] UDS.KEYID = 0
1,176,488 ready_for_fw is high
1,176,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,581 UART: [idev] Erasing UDS.KEYID = 0
1,200,788 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,320 UART: [ldev] ++
1,210,488 UART: [ldev] CDI.KEYID = 6
1,210,851 UART: [ldev] SUBJECT.KEYID = 5
1,211,277 UART: [ldev] AUTHORITY.KEYID = 7
1,211,740 UART: [ldev] FE.KEYID = 1
1,216,984 UART: [ldev] Erasing FE.KEYID = 1
1,243,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,603 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46574c44
1,284,047 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,502 >>> mbox cmd response: success
2,772,608 UART: [afmc] ++
2,772,776 UART: [afmc] CDI.KEYID = 6
2,773,138 UART: [afmc] SUBJECT.KEYID = 7
2,773,563 UART: [afmc] AUTHORITY.KEYID = 5
2,809,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,727 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,959 UART: [afmc] --
2,852,933 UART: [cold-reset] --
2,853,813 UART: [state] Locking Datavault
2,855,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,662 UART: [state] Locking ICCM
2,856,152 UART: [exit] Launching FMC @ 0x40000130
2,861,481 UART:
2,861,497 UART: Running Caliptra FMC ...
2,861,905 UART:
2,862,048 UART: [state] CFI Enabled
2,872,663 UART: [fht] FMC Alias Private Key: 7
2,980,274 UART: [art] Extend RT PCRs Done
2,980,702 UART: [art] Lock RT PCRs Done
2,982,190 UART: [art] Populate DV Done
2,990,577 UART: [fht] FMC Alias Private Key: 7
2,991,579 UART: [art] Derive CDI
2,991,859 UART: [art] Store in in slot 0x4
3,077,278 UART: [art] Derive Key Pair
3,077,638 UART: [art] Store priv key in slot 0x5
3,091,732 UART: [art] Derive Key Pair - Done
3,106,678 UART: [art] Signing Cert with AUTHO
3,107,158 UART: RITY.KEYID = 7
3,122,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,689 UART: [art] PUB.X = C254CC1C4462E02F18CBABE434F7E6A414285F276413367B9CFC63E78CA32B00B250E6A72D356A704DFFBB04421084FA
3,130,442 UART: [art] PUB.Y = C3FF9284742643FF8E5C1F28FD9C255DA85656F2209C911F80C3E15226AD52C7A603E0197EF8116B114850620F2C0B47
3,137,379 UART: [art] SIG.R = 7BE98D036F728480D38C45790C9FBDACAEC2B0DB5CE034020C5EF6CDE555679DF9D8C6ED43A901A693FA3B166C799D6D
3,144,152 UART: [art] SIG.S = 3AD382CB0FBE6F0C196815BC38E7BF72B9B7304558E11BC97551AB9E23D3B1AF6E85F2207E58B1AB9D4B5346678F1D43
3,168,273 UART: Caliptra RT
3,168,618 UART: [state] CFI Enabled
3,276,165 UART: [rt] RT listening for mailbox commands...
3,276,835 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,757 UART: [rt]cmd =0x41544d4e, len=14344
3,709,832 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,298 ready_for_fw is high
1,061,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,449 >>> mbox cmd response: success
2,686,923 UART:
2,686,939 UART: Running Caliptra FMC ...
2,687,347 UART:
2,687,490 UART: [state] CFI Enabled
2,698,119 UART: [fht] FMC Alias Private Key: 7
2,805,672 UART: [art] Extend RT PCRs Done
2,806,100 UART: [art] Lock RT PCRs Done
2,807,638 UART: [art] Populate DV Done
2,816,075 UART: [fht] FMC Alias Private Key: 7
2,817,101 UART: [art] Derive CDI
2,817,381 UART: [art] Store in in slot 0x4
2,903,034 UART: [art] Derive Key Pair
2,903,394 UART: [art] Store priv key in slot 0x5
2,917,126 UART: [art] Derive Key Pair - Done
2,932,026 UART: [art] Signing Cert with AUTHO
2,932,506 UART: RITY.KEYID = 7
2,947,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,211 UART: [art] PUB.X = 06E5C0D48FD8ACBECBDC0D7B6F65C20D26C48D0CFD21463E35617FD8B8F86C9F989D8EF5BF3414A63F8AB66AB26C3019
2,954,991 UART: [art] PUB.Y = 7B462BA3D892F1F3CAD590F27C7AAD0B9F52284F544D362E5D4D5E9007899EA0275A26CF1ED212A568948C64C10A0998
2,961,933 UART: [art] SIG.R = BA583C49CA66670F81D0C7F14F3A0862A7313E7300230F8BEBA0F9085B13A0249A25BD647FDA877F4B2EC59797FD721F
2,968,675 UART: [art] SIG.S = 5B3F29CCA1B7CCD78226D99B972707E72BBF1742A7A32A8EECE20C7C510EBDFB40FC39CEC96852DB63EE9939C0CF6BE2
2,992,797 UART: Caliptra RT
2,993,142 UART: [state] CFI Enabled
3,100,019 UART: [rt] RT listening for mailbox commands...
3,100,689 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,065 UART: [rt]cmd =0x41544d4e, len=14344
3,533,672 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
891,450 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,180 UART: [kat] LMS
1,169,492 UART: [kat] --
1,170,233 UART: [cold-reset] ++
1,170,777 UART: [fht] FHT @ 0x50003400
1,173,451 UART: [idev] ++
1,173,619 UART: [idev] CDI.KEYID = 6
1,173,980 UART: [idev] SUBJECT.KEYID = 7
1,174,405 UART: [idev] UDS.KEYID = 0
1,174,751 ready_for_fw is high
1,174,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,425 UART: [idev] --
1,209,358 UART: [ldev] ++
1,209,526 UART: [ldev] CDI.KEYID = 6
1,209,890 UART: [ldev] SUBJECT.KEYID = 5
1,210,317 UART: [ldev] AUTHORITY.KEYID = 7
1,210,780 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,242,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,620 UART: [ldev] --
1,282,094 UART: [fwproc] Wait for Commands...
1,282,759 UART: [fwproc] Recv command 0x46574c44
1,283,492 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,609 >>> mbox cmd response: success
2,769,688 UART: [afmc] ++
2,769,856 UART: [afmc] CDI.KEYID = 6
2,770,219 UART: [afmc] SUBJECT.KEYID = 7
2,770,645 UART: [afmc] AUTHORITY.KEYID = 5
2,806,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,863 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,592 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,093 UART: [afmc] --
2,850,119 UART: [cold-reset] --
2,850,667 UART: [state] Locking Datavault
2,851,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,488 UART: [state] Locking ICCM
2,852,914 UART: [exit] Launching FMC @ 0x40000130
2,858,243 UART:
2,858,259 UART: Running Caliptra FMC ...
2,858,667 UART:
2,858,721 UART: [state] CFI Enabled
2,869,086 UART: [fht] FMC Alias Private Key: 7
2,976,739 UART: [art] Extend RT PCRs Done
2,977,167 UART: [art] Lock RT PCRs Done
2,978,943 UART: [art] Populate DV Done
2,987,060 UART: [fht] FMC Alias Private Key: 7
2,988,132 UART: [art] Derive CDI
2,988,412 UART: [art] Store in in slot 0x4
3,074,405 UART: [art] Derive Key Pair
3,074,765 UART: [art] Store priv key in slot 0x5
3,088,073 UART: [art] Derive Key Pair - Done
3,103,036 UART: [art] Signing Cert with AUTHO
3,103,516 UART: RITY.KEYID = 7
3,118,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,745 UART: [art] PUB.X = 529102AAE8357029E721ABA24FCD2FD08761CF3F905C4AE3B1801DFD49D35D567E5EA4A5DD67E341D39B7A7F4353A926
3,126,522 UART: [art] PUB.Y = 593EB3772BE39AE2BC831836B68493207C3CD899EFE7AB049C3B1D04DDDD73CF97CF81373E5CB41412AEBDBA525EB24D
3,133,484 UART: [art] SIG.R = F248CDEEE1736D95B5B59FDE6BAEAC3AC31E00A1B7C6CB8B428341318944E950A8E5AF82E9C3F01486DCA3DC319C2142
3,140,250 UART: [art] SIG.S = 8E2491DADB21DA079D24C2B9467B0DEEF94479A5F0F7C9791F820140E120742FB48E17A8C64DC2892865F6437008BD28
3,163,757 UART: Caliptra RT
3,164,010 UART: [state] CFI Enabled
3,271,436 UART: [rt] RT listening for mailbox commands...
3,272,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,914 UART: [rt]cmd =0x41544d4e, len=14344
3,704,419 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,700 ready_for_fw is high
1,055,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,983 >>> mbox cmd response: success
2,680,337 UART:
2,680,353 UART: Running Caliptra FMC ...
2,680,761 UART:
2,680,815 UART: [state] CFI Enabled
2,691,406 UART: [fht] FMC Alias Private Key: 7
2,799,595 UART: [art] Extend RT PCRs Done
2,800,023 UART: [art] Lock RT PCRs Done
2,801,263 UART: [art] Populate DV Done
2,809,500 UART: [fht] FMC Alias Private Key: 7
2,810,592 UART: [art] Derive CDI
2,810,872 UART: [art] Store in in slot 0x4
2,896,251 UART: [art] Derive Key Pair
2,896,611 UART: [art] Store priv key in slot 0x5
2,909,121 UART: [art] Derive Key Pair - Done
2,923,934 UART: [art] Signing Cert with AUTHO
2,924,414 UART: RITY.KEYID = 7
2,939,510 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,275 UART: [art] PUB.X = F4CD3774989B614B4BD05FF64A8BEA192D38A1536EB8B6C8B6814CD362F20141FF8B68452153A26D59B16C44C1907B1F
2,947,046 UART: [art] PUB.Y = FAF30D5BBBBB39969CA1E5E6E07CF756F4D1181083305B4D65C2A7A1E8FFBAFD8AD6A03E3C446FE48E7EF194793CCCC2
2,954,019 UART: [art] SIG.R = 1565C2CE79CD1371750105148C78696D835D5BC3D679C579D8D036E8D9B019AEC5E630F37A157CC5770E05916619A575
2,960,769 UART: [art] SIG.S = 501598D8A1F0BAF7A95B121C53E6166AD5758A56D40E23A619FDD841A92A1E81225B6688FBDC13CD065E9C40835A5C9B
2,984,544 UART: Caliptra RT
2,984,797 UART: [state] CFI Enabled
3,091,900 UART: [rt] RT listening for mailbox commands...
3,092,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,215,610 UART: [rt]cmd =0x41544d4e, len=14344
3,525,877 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,169,996 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,174,418 ready_for_fw is high
1,174,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,272 UART: [idev] Erasing UDS.KEYID = 0
1,199,488 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,639 UART: [fwproc] Wait for Commands...
1,282,262 UART: [fwproc] Recv command 0x46574c44
1,282,995 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,508 >>> mbox cmd response: success
2,770,773 UART: [afmc] ++
2,770,941 UART: [afmc] CDI.KEYID = 6
2,771,304 UART: [afmc] SUBJECT.KEYID = 7
2,771,730 UART: [afmc] AUTHORITY.KEYID = 5
2,807,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,590 UART: [afmc] --
2,850,676 UART: [cold-reset] --
2,851,338 UART: [state] Locking Datavault
2,852,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,455 UART: [state] Locking ICCM
2,854,037 UART: [exit] Launching FMC @ 0x40000130
2,859,366 UART:
2,859,382 UART: Running Caliptra FMC ...
2,859,790 UART:
2,859,933 UART: [state] CFI Enabled
2,870,652 UART: [fht] FMC Alias Private Key: 7
2,978,053 UART: [art] Extend RT PCRs Done
2,978,481 UART: [art] Lock RT PCRs Done
2,979,951 UART: [art] Populate DV Done
2,988,172 UART: [fht] FMC Alias Private Key: 7
2,989,118 UART: [art] Derive CDI
2,989,398 UART: [art] Store in in slot 0x4
3,075,285 UART: [art] Derive Key Pair
3,075,645 UART: [art] Store priv key in slot 0x5
3,088,981 UART: [art] Derive Key Pair - Done
3,103,382 UART: [art] Signing Cert with AUTHO
3,103,862 UART: RITY.KEYID = 7
3,118,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,407 UART: [art] PUB.X = 8487F09BFC44635AC322504F7ECB6F4994C8A7202F09B9B0F760D3B350202F87FB62FFC46966003890F91479B8981BD0
3,126,148 UART: [art] PUB.Y = 4D9F38455D69597743D43363583987E1B2BF0BD1B3A8510A08A874B47FF492A89675FF3DB179BD7E61EEC0459F4D7D53
3,133,089 UART: [art] SIG.R = 028D381749E1FC77C6D6BF4E434BD06808A0CD9314CE8BDB45DBD106D1C9783A1485EEF16C51CE2D3E8D87C0C8E45977
3,139,862 UART: [art] SIG.S = 031CF3F65FDD48C9FBD368243C103D43F55DFB816986BD2CA336B51E7A7516202C88E11273AE2244A06121C355ABAACD
3,163,756 UART: Caliptra RT
3,164,101 UART: [state] CFI Enabled
3,271,290 UART: [rt] RT listening for mailbox commands...
3,271,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,020 UART: [rt]cmd =0x41544d4e, len=14344
3,705,011 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,351 ready_for_fw is high
1,056,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,927 >>> mbox cmd response: success
2,681,449 UART:
2,681,465 UART: Running Caliptra FMC ...
2,681,873 UART:
2,682,016 UART: [state] CFI Enabled
2,692,187 UART: [fht] FMC Alias Private Key: 7
2,799,698 UART: [art] Extend RT PCRs Done
2,800,126 UART: [art] Lock RT PCRs Done
2,801,642 UART: [art] Populate DV Done
2,809,945 UART: [fht] FMC Alias Private Key: 7
2,811,023 UART: [art] Derive CDI
2,811,303 UART: [art] Store in in slot 0x4
2,897,142 UART: [art] Derive Key Pair
2,897,502 UART: [art] Store priv key in slot 0x5
2,910,838 UART: [art] Derive Key Pair - Done
2,925,466 UART: [art] Signing Cert with AUTHO
2,925,946 UART: RITY.KEYID = 7
2,941,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,085 UART: [art] PUB.X = 3200BC41EE3A775D34A7A3DF370ED3561C796264EC16CC44465D9286812480C740E554EAED4F3145DF14BD15ADBB3066
2,948,834 UART: [art] PUB.Y = 54E5BC28B21303C14AE96657E7A87E4E2C5DE9E42FE230E3F4E83D610031C0FFC9D475FD04C22A926CE2696D73B3ECBB
2,955,770 UART: [art] SIG.R = 313254990863CB210A965995A7B6DA8EFD6FBD940B9C34D53E1E0EE516267FE4F200C60EF59734F66D6E978EC5A72C39
2,962,507 UART: [art] SIG.S = D58E9AAA330B6C80EC757BFC76C2BF24DDA7A55E51BA8BCEC37594FC2064949E6A97D166CEF9DE1A5F8BD6BD4FF9B27F
2,986,595 UART: Caliptra RT
2,986,940 UART: [state] CFI Enabled
3,094,373 UART: [rt] RT listening for mailbox commands...
3,095,043 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,255 UART: [rt]cmd =0x41544d4e, len=14344
3,528,412 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,068 UART:
192,445 UART: Running Caliptra ROM ...
193,542 UART:
193,685 UART: [state] CFI Enabled
264,018 UART: [state] LifecycleState = Unprovisioned
266,009 UART: [state] DebugLocked = No
267,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,394 UART: [kat] SHA2-256
442,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,596 UART: [kat] ++
453,048 UART: [kat] sha1
462,931 UART: [kat] SHA2-256
465,581 UART: [kat] SHA2-384
472,636 UART: [kat] SHA2-512-ACC
475,001 UART: [kat] ECC-384
2,767,306 UART: [kat] HMAC-384Kdf
2,800,427 UART: [kat] LMS
3,990,730 UART: [kat] --
3,994,605 UART: [cold-reset] ++
3,996,402 UART: [fht] Storing FHT @ 0x50003400
4,008,610 UART: [idev] ++
4,009,225 UART: [idev] CDI.KEYID = 6
4,010,125 UART: [idev] SUBJECT.KEYID = 7
4,011,374 UART: [idev] UDS.KEYID = 0
4,012,418 ready_for_fw is high
4,012,628 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,614 UART: [idev] Erasing UDS.KEYID = 0
7,347,324 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,085 UART: [idev] --
7,375,085 UART: [ldev] ++
7,375,668 UART: [ldev] CDI.KEYID = 6
7,376,705 UART: [ldev] SUBJECT.KEYID = 5
7,377,811 UART: [ldev] AUTHORITY.KEYID = 7
7,379,091 UART: [ldev] FE.KEYID = 1
7,422,653 UART: [ldev] Erasing FE.KEYID = 1
10,755,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,190 UART: [ldev] --
13,117,833 UART: [fwproc] Waiting for Commands...
13,119,436 UART: [fwproc] Received command 0x46574c44
13,121,622 UART: [fwproc] Received Image of size 113760 bytes
21,830,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,908,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,977,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,293,873 >>> mbox cmd response: success
22,298,748 UART: [afmc] ++
22,299,404 UART: [afmc] CDI.KEYID = 6
22,300,292 UART: [afmc] SUBJECT.KEYID = 7
22,301,560 UART: [afmc] AUTHORITY.KEYID = 5
25,659,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,956,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,959,157 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,973,684 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,988,467 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,002,658 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,023,208 UART: [afmc] --
28,027,737 UART: [cold-reset] --
28,032,793 UART: [state] Locking Datavault
28,037,720 UART: [state] Locking PCR0, PCR1 and PCR31
28,039,483 UART: [state] Locking ICCM
28,041,341 UART: [exit] Launching FMC @ 0x40000130
28,049,749 UART:
28,049,988 UART: Running Caliptra FMC ...
28,051,093 UART:
28,051,269 UART: [state] CFI Enabled
28,115,869 UART: [fht] FMC Alias Private Key: 7
30,454,138 UART: [art] Extend RT PCRs Done
30,455,361 UART: [art] Lock RT PCRs Done
30,456,798 UART: [art] Populate DV Done
30,462,207 UART: [fht] FMC Alias Private Key: 7
30,463,685 UART: [art] Derive CDI
30,464,419 UART: [art] Store in in slot 0x4
30,523,997 UART: [art] Derive Key Pair
30,525,036 UART: [art] Store priv key in slot 0x5
33,818,001 UART: [art] Derive Key Pair - Done
33,831,270 UART: [art] Signing Cert with AUTHO
33,832,592 UART: RITY.KEYID = 7
36,120,298 UART: [art] Erasing AUTHORITY.KEYID = 7
36,121,816 UART: [art] PUB.X = AB3AB85E7C692DCCB0700769853F19771205A4C4083D1A0AF52997E714D80BD34FFC8C0348EE6DE67E1759CD83BA2A8A
36,129,001 UART: [art] PUB.Y = 29BBC19BD4A51A4DE3DEE7C7F4DF71B5FF3FBB16FA98EF316BC346D40EACD94EC191E5F0ABFBA1CB39EAA05C063D2F7E
36,136,349 UART: [art] SIG.R = 196B77056D71598FC231804F64C371375B0B3A3612A4EC3FF781E55CC4AF21873F45E56ADB75EAC02DEE31E26ADEE728
36,143,685 UART: [art] SIG.S = 3C34ABE796164C6156B9B14B2D39E610ABB39E942B45CB4FD937A19A009A8952E5B0BA4B7B5A93179D4D196707B4BF22
37,448,874 UART: Caliptra RT
37,449,589 UART: [state] CFI Enabled
37,611,077 UART: [rt] RT listening for mailbox commands...
37,613,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,768,748 UART: [rt]cmd =0x41544d4e, len=14344
37,770,557 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,804,785 ready_for_fw is high
3,805,378 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,114,478 >>> mbox cmd response: success
27,813,150 UART:
27,813,565 UART: Running Caliptra FMC ...
27,814,680 UART:
27,814,839 UART: [state] CFI Enabled
27,882,784 UART: [fht] FMC Alias Private Key: 7
30,221,142 UART: [art] Extend RT PCRs Done
30,222,366 UART: [art] Lock RT PCRs Done
30,223,804 UART: [art] Populate DV Done
30,229,482 UART: [fht] FMC Alias Private Key: 7
30,231,132 UART: [art] Derive CDI
30,231,876 UART: [art] Store in in slot 0x4
30,291,568 UART: [art] Derive Key Pair
30,292,615 UART: [art] Store priv key in slot 0x5
33,585,377 UART: [art] Derive Key Pair - Done
33,598,456 UART: [art] Signing Cert with AUTHO
33,599,766 UART: RITY.KEYID = 7
35,887,472 UART: [art] Erasing AUTHORITY.KEYID = 7
35,888,988 UART: [art] PUB.X = 7428A28C0FD362C8C7ED94EC18B154A3D5F20D481A89140F12B6545CB587F9D63BA95C1C70642356998E9335F9C1B7E3
35,896,255 UART: [art] PUB.Y = 06CF40D13D55160847B46DF21D47C9432D9401719E9C30DE6B2B17F6511BB3F4BBB772E16087D447B8401D402638BCCD
35,903,486 UART: [art] SIG.R = 902A5F6911E0E8F99ED9CA1B96540D11DA96F652E16D05B179481173DBEE68407BC70A99013E727DE28DD79B41413EE9
35,910,846 UART: [art] SIG.S = 2AC60CCC26FBD51327AC3C2084C0E8D2ADC32A0E055AAE288F638FD78341ED3ADDAA2105D1F747FCC2BC41DE125B323D
37,216,078 UART: Caliptra RT
37,216,770 UART: [state] CFI Enabled
37,377,718 UART: [rt] RT listening for mailbox commands...
37,380,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,535,623 UART: [rt]cmd =0x41544d4e, len=14344
37,537,873 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
192,887 UART:
193,270 UART: Running Caliptra ROM ...
194,397 UART:
603,900 UART: [state] CFI Enabled
617,072 UART: [state] LifecycleState = Unprovisioned
618,950 UART: [state] DebugLocked = No
620,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,204 UART: [kat] SHA2-256
794,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,517 UART: [kat] ++
806,006 UART: [kat] sha1
817,524 UART: [kat] SHA2-256
820,229 UART: [kat] SHA2-384
824,873 UART: [kat] SHA2-512-ACC
827,236 UART: [kat] ECC-384
3,110,441 UART: [kat] HMAC-384Kdf
3,122,312 UART: [kat] LMS
4,312,418 UART: [kat] --
4,316,262 UART: [cold-reset] ++
4,318,902 UART: [fht] Storing FHT @ 0x50003400
4,330,520 UART: [idev] ++
4,331,078 UART: [idev] CDI.KEYID = 6
4,332,107 UART: [idev] SUBJECT.KEYID = 7
4,333,275 UART: [idev] UDS.KEYID = 0
4,334,378 ready_for_fw is high
4,334,615 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,573 UART: [idev] Erasing UDS.KEYID = 0
7,620,431 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,669 UART: [idev] --
7,647,251 UART: [ldev] ++
7,647,820 UART: [ldev] CDI.KEYID = 6
7,648,786 UART: [ldev] SUBJECT.KEYID = 5
7,649,995 UART: [ldev] AUTHORITY.KEYID = 7
7,651,276 UART: [ldev] FE.KEYID = 1
7,661,808 UART: [ldev] Erasing FE.KEYID = 1
10,949,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,532 UART: [ldev] --
13,309,639 UART: [fwproc] Waiting for Commands...
13,311,964 UART: [fwproc] Received command 0x46574c44
13,314,155 UART: [fwproc] Received Image of size 113760 bytes
22,504,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,583,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,652,723 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,968,648 >>> mbox cmd response: success
22,972,255 UART: [afmc] ++
22,972,854 UART: [afmc] CDI.KEYID = 6
22,973,764 UART: [afmc] SUBJECT.KEYID = 7
22,974,977 UART: [afmc] AUTHORITY.KEYID = 5
26,291,224 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,584,983 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,587,237 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,601,774 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,616,519 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,630,769 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,653,585 UART: [afmc] --
28,657,503 UART: [cold-reset] --
28,659,897 UART: [state] Locking Datavault
28,664,792 UART: [state] Locking PCR0, PCR1 and PCR31
28,666,554 UART: [state] Locking ICCM
28,669,293 UART: [exit] Launching FMC @ 0x40000130
28,677,693 UART:
28,677,927 UART: Running Caliptra FMC ...
28,679,026 UART:
28,679,189 UART: [state] CFI Enabled
28,687,283 UART: [fht] FMC Alias Private Key: 7
31,018,163 UART: [art] Extend RT PCRs Done
31,019,409 UART: [art] Lock RT PCRs Done
31,021,068 UART: [art] Populate DV Done
31,026,216 UART: [fht] FMC Alias Private Key: 7
31,027,806 UART: [art] Derive CDI
31,028,562 UART: [art] Store in in slot 0x4
31,070,949 UART: [art] Derive Key Pair
31,071,991 UART: [art] Store priv key in slot 0x5
34,314,008 UART: [art] Derive Key Pair - Done
34,327,009 UART: [art] Signing Cert with AUTHO
34,328,321 UART: RITY.KEYID = 7
36,607,319 UART: [art] Erasing AUTHORITY.KEYID = 7
36,608,839 UART: [art] PUB.X = FE99BF7B02175AFDDADB2609AAA1A36DE410A9F68DE715273FC7A9465D23CDF2B3B500B2C629DE3A4C6066C9E1490EAF
36,616,111 UART: [art] PUB.Y = D6C5F3506CF2C18D64E8726FA5FD7D1ECD7916B8380A9434B5D73851F5DD4B11ABC1DB54F8B894C0DF80CDFC4BFBBEEC
36,623,424 UART: [art] SIG.R = 94A7A7BA4F66A1F2FE779BA9C9323641F78FA9B991B7AE849378F6A1FDB78E219B1CA677B137871440C47F7F0C79DEDE
36,630,793 UART: [art] SIG.S = 7B477DE7AB8AF4B2F2CC1447D5764D74509E7B233135137C449B8B7E97762EE41B07733186CE4827834459E1D27A8B45
37,936,396 UART: Caliptra RT
37,937,111 UART: [state] CFI Enabled
38,055,272 UART: [rt] RT listening for mailbox commands...
38,057,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,212,707 UART: [rt]cmd =0x41544d4e, len=14344
38,214,469 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
4,127,553 ready_for_fw is high
4,128,145 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,251,519 >>> mbox cmd response: success
27,891,500 UART:
27,891,893 UART: Running Caliptra FMC ...
27,892,989 UART:
27,893,139 UART: [state] CFI Enabled
27,901,033 UART: [fht] FMC Alias Private Key: 7
30,231,609 UART: [art] Extend RT PCRs Done
30,232,841 UART: [art] Lock RT PCRs Done
30,234,931 UART: [art] Populate DV Done
30,240,395 UART: [fht] FMC Alias Private Key: 7
30,241,933 UART: [art] Derive CDI
30,242,663 UART: [art] Store in in slot 0x4
30,285,105 UART: [art] Derive Key Pair
30,286,148 UART: [art] Store priv key in slot 0x5
33,528,543 UART: [art] Derive Key Pair - Done
33,541,768 UART: [art] Signing Cert with AUTHO
33,543,069 UART: RITY.KEYID = 7
35,822,522 UART: [art] Erasing AUTHORITY.KEYID = 7
35,824,042 UART: [art] PUB.X = 6BAEECF19126EE4B5A02FEF8439AC5A06998D7E911A11A891A4282CB97D8DA2025F270A474B70AFD4E0C3C75A3D8CB12
35,831,297 UART: [art] PUB.Y = 8176F27F7A382D7ABEE22E8346DE7C3EE63453B22916F6F471398991C42685DB617D01AD242C4A8E967E95E19FCB84E6
35,838,527 UART: [art] SIG.R = D366BD20A18AC085B0123870A220485E0A13530DF21F1F53BC4AFDA31BF9A56D11082582D328548EBCCE9BA3D2D4DB8B
35,845,911 UART: [art] SIG.S = ACB99E3FC035828EA69ECEA3E18737FEB50533A6B2DD7570471F68A94854B5E637FED30C4CDF66898DAEB63E6C3D2A0C
37,151,298 UART: Caliptra RT
37,151,994 UART: [state] CFI Enabled
37,269,864 UART: [rt] RT listening for mailbox commands...
37,272,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,665 UART: [rt]cmd =0x41544d4e, len=14344
37,429,583 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,474 UART:
192,845 UART: Running Caliptra ROM ...
194,024 UART:
194,184 UART: [state] CFI Enabled
260,602 UART: [state] LifecycleState = Unprovisioned
262,501 UART: [state] DebugLocked = No
264,739 UART: [state] WD Timer not started. Device not locked for debugging
267,864 UART: [kat] SHA2-256
446,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,569 UART: [kat] ++
459,102 UART: [kat] sha1
469,536 UART: [kat] SHA2-256
472,584 UART: [kat] SHA2-384
478,007 UART: [kat] SHA2-512-ACC
480,947 UART: [kat] ECC-384
2,927,749 UART: [kat] HMAC-384Kdf
2,949,446 UART: [kat] LMS
3,478,899 UART: [kat] --
3,484,239 UART: [cold-reset] ++
3,485,957 UART: [fht] FHT @ 0x50003400
3,497,571 UART: [idev] ++
3,498,130 UART: [idev] CDI.KEYID = 6
3,499,108 UART: [idev] SUBJECT.KEYID = 7
3,500,357 UART: [idev] UDS.KEYID = 0
3,501,283 ready_for_fw is high
3,501,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,644,906 UART: [idev] Erasing UDS.KEYID = 0
6,005,536 UART: [idev] Sha1 KeyId Algorithm
6,028,441 UART: [idev] --
6,032,920 UART: [ldev] ++
6,033,489 UART: [ldev] CDI.KEYID = 6
6,034,430 UART: [ldev] SUBJECT.KEYID = 5
6,035,618 UART: [ldev] AUTHORITY.KEYID = 7
6,036,846 UART: [ldev] FE.KEYID = 1
6,080,597 UART: [ldev] Erasing FE.KEYID = 1
8,584,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,673 UART: [ldev] --
10,392,837 UART: [fwproc] Wait for Commands...
10,394,390 UART: [fwproc] Recv command 0x46574c44
10,396,499 UART: [fwproc] Recv'd Img size: 114084 bytes
14,968,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,049,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,436,077 >>> mbox cmd response: success
15,440,558 UART: [afmc] ++
15,441,154 UART: [afmc] CDI.KEYID = 6
15,442,044 UART: [afmc] SUBJECT.KEYID = 7
15,443,260 UART: [afmc] AUTHORITY.KEYID = 5
17,982,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,856 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,724,821 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,740,776 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,756,568 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,779,719 UART: [afmc] --
19,783,652 UART: [cold-reset] --
19,787,513 UART: [state] Locking Datavault
19,792,325 UART: [state] Locking PCR0, PCR1 and PCR31
19,793,967 UART: [state] Locking ICCM
19,796,143 UART: [exit] Launching FMC @ 0x40000130
19,804,600 UART:
19,804,831 UART: Running Caliptra FMC ...
19,805,927 UART:
19,806,083 UART: [state] CFI Enabled
19,864,657 UART: [fht] FMC Alias Private Key: 7
21,628,784 UART: [art] Extend RT PCRs Done
21,630,004 UART: [art] Lock RT PCRs Done
21,631,745 UART: [art] Populate DV Done
21,637,316 UART: [fht] FMC Alias Private Key: 7
21,638,903 UART: [art] Derive CDI
21,639,663 UART: [art] Store in in slot 0x4
21,697,474 UART: [art] Derive Key Pair
21,698,514 UART: [art] Store priv key in slot 0x5
24,161,425 UART: [art] Derive Key Pair - Done
24,174,580 UART: [art] Signing Cert with AUTHO
24,175,877 UART: RITY.KEYID = 7
25,886,889 UART: [art] Erasing AUTHORITY.KEYID = 7
25,888,400 UART: [art] PUB.X = CFDA42D4DCDF7BBFB2AE7B2D57573DD3AF19172F59B4EC19C6CA7E2862C0E1CC7335CB5EA69C00321A2A7A5743CAF10F
25,895,687 UART: [art] PUB.Y = 2DEF6803FFA977A96F309677F91B31E65A8ED7F03DB87403BD35847E21BEAE966F5564DC491FEE90F0F1BDBC46F0DFB3
25,903,023 UART: [art] SIG.R = 810964C5A992E439D27C485A0E12EE3925C4B4568D2F07F0C1E179FF11BBB8EB4DA8C5FD283993EFD08EEF7E54E85C1C
25,910,427 UART: [art] SIG.S = 1A27561AA99AC0BF3E12B83369F524BDC40825BF711D4F046A4598F7D58C675444008B28CECE923CF8F6F99342220BBF
26,889,480 UART: Caliptra RT
26,890,177 UART: [state] CFI Enabled
27,054,880 UART: [rt] RT listening for mailbox commands...
27,057,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,755 UART: [rt]cmd =0x41544d4e, len=14344
27,214,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,540 writing to cptra_bootfsm_go
3,359,648 ready_for_fw is high
3,360,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,033,404 >>> mbox cmd response: success
19,324,472 UART:
19,324,876 UART: Running Caliptra FMC ...
19,325,983 UART:
19,326,135 UART: [state] CFI Enabled
19,391,387 UART: [fht] FMC Alias Private Key: 7
21,155,342 UART: [art] Extend RT PCRs Done
21,156,566 UART: [art] Lock RT PCRs Done
21,157,948 UART: [art] Populate DV Done
21,163,504 UART: [fht] FMC Alias Private Key: 7
21,165,041 UART: [art] Derive CDI
21,165,824 UART: [art] Store in in slot 0x4
21,224,163 UART: [art] Derive Key Pair
21,225,205 UART: [art] Store priv key in slot 0x5
23,688,526 UART: [art] Derive Key Pair - Done
23,701,683 UART: [art] Signing Cert with AUTHO
23,702,981 UART: RITY.KEYID = 7
25,414,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,415,777 UART: [art] PUB.X = FB5703EC05052B6F54C945C47E7B1FF6344AD6164AE0E45B404D4B2A0D3028B802E16EB8C055933CE9B13936A834AB3F
25,423,043 UART: [art] PUB.Y = AEAC9FABC364ABCB5D498A3F3B7D3C0A5457E09849C7819D4670A9643ABEA7C411A832FF165AE2926EE7CD67ABD71167
25,430,337 UART: [art] SIG.R = DFB84E5DC6DCBA02F1069122504026056D43E00D064ED8BB901CAD2C542885FCAFC3C7F88D385FB798EAADE5679EB7FF
25,437,758 UART: [art] SIG.S = 879027B248D336724AB7627F4FB6EC4E17545F55190F071DA0D6D21A3821767DC54A01A5ED9797D442705261B46E60BB
26,416,132 UART: Caliptra RT
26,416,842 UART: [state] CFI Enabled
26,583,252 UART: [rt] RT listening for mailbox commands...
26,585,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,740,904 UART: [rt]cmd =0x41544d4e, len=14344
26,742,778 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,011 writing to cptra_bootfsm_go
193,178 UART:
193,556 UART: Running Caliptra ROM ...
194,636 UART:
604,373 UART: [state] CFI Enabled
620,462 UART: [state] LifecycleState = Unprovisioned
622,363 UART: [state] DebugLocked = No
624,541 UART: [state] WD Timer not started. Device not locked for debugging
628,187 UART: [kat] SHA2-256
807,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,881 UART: [kat] ++
819,412 UART: [kat] sha1
831,711 UART: [kat] SHA2-256
834,723 UART: [kat] SHA2-384
841,284 UART: [kat] SHA2-512-ACC
844,290 UART: [kat] ECC-384
3,284,421 UART: [kat] HMAC-384Kdf
3,296,087 UART: [kat] LMS
3,825,575 UART: [kat] --
3,829,244 UART: [cold-reset] ++
3,831,321 UART: [fht] FHT @ 0x50003400
3,841,232 UART: [idev] ++
3,841,800 UART: [idev] CDI.KEYID = 6
3,842,681 UART: [idev] SUBJECT.KEYID = 7
3,843,943 UART: [idev] UDS.KEYID = 0
3,844,846 ready_for_fw is high
3,845,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,314 UART: [idev] Erasing UDS.KEYID = 0
6,316,882 UART: [idev] Sha1 KeyId Algorithm
6,339,567 UART: [idev] --
6,342,857 UART: [ldev] ++
6,343,427 UART: [ldev] CDI.KEYID = 6
6,344,339 UART: [ldev] SUBJECT.KEYID = 5
6,345,550 UART: [ldev] AUTHORITY.KEYID = 7
6,346,780 UART: [ldev] FE.KEYID = 1
6,357,481 UART: [ldev] Erasing FE.KEYID = 1
8,832,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,827 UART: [ldev] --
10,622,051 UART: [fwproc] Wait for Commands...
10,623,671 UART: [fwproc] Recv command 0x46574c44
10,625,777 UART: [fwproc] Recv'd Img size: 114084 bytes
15,190,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,656,094 >>> mbox cmd response: success
15,660,690 UART: [afmc] ++
15,661,290 UART: [afmc] CDI.KEYID = 6
15,662,176 UART: [afmc] SUBJECT.KEYID = 7
15,663,396 UART: [afmc] AUTHORITY.KEYID = 5
18,161,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,882,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,884,247 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,900,238 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,916,191 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,931,936 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,953,884 UART: [afmc] --
19,958,084 UART: [cold-reset] --
19,961,843 UART: [state] Locking Datavault
19,967,256 UART: [state] Locking PCR0, PCR1 and PCR31
19,968,958 UART: [state] Locking ICCM
19,970,356 UART: [exit] Launching FMC @ 0x40000130
19,978,828 UART:
19,979,106 UART: Running Caliptra FMC ...
19,980,223 UART:
19,980,385 UART: [state] CFI Enabled
19,988,758 UART: [fht] FMC Alias Private Key: 7
21,745,303 UART: [art] Extend RT PCRs Done
21,746,517 UART: [art] Lock RT PCRs Done
21,748,055 UART: [art] Populate DV Done
21,753,315 UART: [fht] FMC Alias Private Key: 7
21,754,909 UART: [art] Derive CDI
21,755,730 UART: [art] Store in in slot 0x4
21,798,164 UART: [art] Derive Key Pair
21,799,166 UART: [art] Store priv key in slot 0x5
24,225,988 UART: [art] Derive Key Pair - Done
24,239,047 UART: [art] Signing Cert with AUTHO
24,240,364 UART: RITY.KEYID = 7
25,945,877 UART: [art] Erasing AUTHORITY.KEYID = 7
25,947,392 UART: [art] PUB.X = 4B6B3DFCE2B4475E1849381BB15DC6F707284D20FE7B97EFD3A007D0D58B8E821EBE569B29E48558DDD33FDA227F7F31
25,954,674 UART: [art] PUB.Y = 484E5AEDA1A79418A6D285E5DBF904FCF25AB3E81A6CE4C320943F6CCD10A636C07FC0D926165FBA7F366B7EDFE8DA6B
25,961,935 UART: [art] SIG.R = E33D2724E8967CC9264A97CC984E72BAAEF4C323A8D2B20E7E486E699CD83544696F39B56C4B51979ECF9946AA470E55
25,969,358 UART: [art] SIG.S = FE1C2E8F96E4BE786EF54EBD55BEF19155E5330ABC80BF07605F5C717D2C092E2BD634A13C7FB98B69F03713B16D360E
26,947,966 UART: Caliptra RT
26,948,682 UART: [state] CFI Enabled
27,065,392 UART: [rt] RT listening for mailbox commands...
27,067,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,222,902 UART: [rt]cmd =0x41544d4e, len=14344
27,224,941 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,821 writing to cptra_bootfsm_go
3,695,063 ready_for_fw is high
3,695,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,270,237 >>> mbox cmd response: success
19,524,534 UART:
19,524,950 UART: Running Caliptra FMC ...
19,526,088 UART:
19,526,262 UART: [state] CFI Enabled
19,534,157 UART: [fht] FMC Alias Private Key: 7
21,291,298 UART: [art] Extend RT PCRs Done
21,292,512 UART: [art] Lock RT PCRs Done
21,294,471 UART: [art] Populate DV Done
21,299,773 UART: [fht] FMC Alias Private Key: 7
21,301,330 UART: [art] Derive CDI
21,302,260 UART: [art] Store in in slot 0x4
21,344,430 UART: [art] Derive Key Pair
21,345,434 UART: [art] Store priv key in slot 0x5
23,772,237 UART: [art] Derive Key Pair - Done
23,785,513 UART: [art] Signing Cert with AUTHO
23,786,818 UART: RITY.KEYID = 7
25,491,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,493,477 UART: [art] PUB.X = 9A1B651D71A04094D545F10D1247042771A5835571BA93D6CF255C4238BEE35B09F58DCC258CAF50671CC15C9C5C8B61
25,500,757 UART: [art] PUB.Y = 43AB38C826186A91E403CF6D8BC0AD39EF13020AEF63A3508A36AC5E7C09098823D124B3EB3E38D8DEFEA20340A8EF52
25,508,042 UART: [art] SIG.R = 70FE8EF020747EB7704CCE019A8D6F6A0DF470B356DEDC8D8D61C5C8FAC96330C59907BA7F79297EE272770B1A382664
25,515,596 UART: [art] SIG.S = 155A7BB3087DBCBECD525124E5A1AF6BB592B716016E06E5B60062A2E0DE554235AA106FE0EF03AE9CEEAEEAF1D95951
26,494,271 UART: Caliptra RT
26,494,990 UART: [state] CFI Enabled
26,612,871 UART: [rt] RT listening for mailbox commands...
26,615,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,770,402 UART: [rt]cmd =0x41544d4e, len=14344
26,772,420 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
192,712 UART:
193,077 UART: Running Caliptra ROM ...
194,191 UART:
194,354 UART: [state] CFI Enabled
263,836 UART: [state] LifecycleState = Unprovisioned
266,192 UART: [state] DebugLocked = No
268,778 UART: [state] WD Timer not started. Device not locked for debugging
273,667 UART: [kat] SHA2-256
463,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,299 UART: [kat] ++
474,751 UART: [kat] sha1
486,329 UART: [kat] SHA2-256
489,337 UART: [kat] SHA2-384
493,833 UART: [kat] SHA2-512-ACC
496,408 UART: [kat] ECC-384
2,946,264 UART: [kat] HMAC-384Kdf
2,970,224 UART: [kat] LMS
3,502,006 UART: [kat] --
3,504,730 UART: [cold-reset] ++
3,505,725 UART: [fht] FHT @ 0x50003400
3,517,422 UART: [idev] ++
3,518,126 UART: [idev] CDI.KEYID = 6
3,519,154 UART: [idev] SUBJECT.KEYID = 7
3,520,253 UART: [idev] UDS.KEYID = 0
3,521,192 ready_for_fw is high
3,521,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,798 UART: [idev] Erasing UDS.KEYID = 0
6,026,204 UART: [idev] Sha1 KeyId Algorithm
6,047,169 UART: [idev] --
6,052,514 UART: [ldev] ++
6,053,242 UART: [ldev] CDI.KEYID = 6
6,054,129 UART: [ldev] SUBJECT.KEYID = 5
6,055,341 UART: [ldev] AUTHORITY.KEYID = 7
6,056,515 UART: [ldev] FE.KEYID = 1
6,096,408 UART: [ldev] Erasing FE.KEYID = 1
8,603,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,706 UART: [ldev] --
10,409,248 UART: [fwproc] Wait for Commands...
10,411,613 UART: [fwproc] Recv command 0x46574c44
10,413,867 UART: [fwproc] Recv'd Img size: 114084 bytes
15,038,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,118,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,234,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,775,418 >>> mbox cmd response: success
15,780,302 UART: [afmc] ++
15,781,012 UART: [afmc] CDI.KEYID = 6
15,782,262 UART: [afmc] SUBJECT.KEYID = 7
15,783,732 UART: [afmc] AUTHORITY.KEYID = 5
18,316,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,040,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,042,830 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,057,894 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,073,092 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,087,926 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,112,086 UART: [afmc] --
20,116,379 UART: [cold-reset] --
20,119,165 UART: [state] Locking Datavault
20,123,891 UART: [state] Locking PCR0, PCR1 and PCR31
20,126,043 UART: [state] Locking ICCM
20,128,063 UART: [exit] Launching FMC @ 0x40000130
20,136,694 UART:
20,136,932 UART: Running Caliptra FMC ...
20,137,954 UART:
20,138,118 UART: [state] CFI Enabled
20,198,312 UART: [fht] FMC Alias Private Key: 7
21,962,339 UART: [art] Extend RT PCRs Done
21,963,561 UART: [art] Lock RT PCRs Done
21,965,105 UART: [art] Populate DV Done
21,970,622 UART: [fht] FMC Alias Private Key: 7
21,972,154 UART: [art] Derive CDI
21,972,888 UART: [art] Store in in slot 0x4
22,030,901 UART: [art] Derive Key Pair
22,031,944 UART: [art] Store priv key in slot 0x5
24,494,882 UART: [art] Derive Key Pair - Done
24,507,871 UART: [art] Signing Cert with AUTHO
24,509,165 UART: RITY.KEYID = 7
26,220,976 UART: [art] Erasing AUTHORITY.KEYID = 7
26,222,482 UART: [art] PUB.X = 4441C80FF93AADCB5AF5A93B1D9F2869FDBF3D04002D2BFDB67260CF5BC1F11AB71B5D83AAF231BC8A63A754C1E3B013
26,229,812 UART: [art] PUB.Y = 6604C6711453ABEC299EF873999ACCFA11CAC9A7E060DB21C86025C6BD683492E5750AF9ED0EFAB9EFD660BEBD35AD46
26,237,086 UART: [art] SIG.R = D33C5774DD9913E358D3E4D6E8E4E943C93F3B36491E986208BC506660F1E39A095B67027D23E0D5446BAE0C5B0349E0
26,244,406 UART: [art] SIG.S = BB253A1C1C3840EF58B5FDB6728217A3A77978BA8E7FCA3648998C16042DB1760819E8153F40E380B84401BE0A67B3A2
27,223,434 UART: Caliptra RT
27,224,121 UART: [state] CFI Enabled
27,388,589 UART: [rt] RT listening for mailbox commands...
27,390,898 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,546,054 UART: [rt]cmd =0x41544d4e, len=14344
27,547,752 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,356 writing to cptra_bootfsm_go
3,415,821 ready_for_fw is high
3,416,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,811,827 >>> mbox cmd response: success
20,093,628 UART:
20,094,037 UART: Running Caliptra FMC ...
20,095,170 UART:
20,095,332 UART: [state] CFI Enabled
20,160,278 UART: [fht] FMC Alias Private Key: 7
21,923,842 UART: [art] Extend RT PCRs Done
21,925,072 UART: [art] Lock RT PCRs Done
21,926,600 UART: [art] Populate DV Done
21,931,688 UART: [fht] FMC Alias Private Key: 7
21,933,381 UART: [art] Derive CDI
21,934,215 UART: [art] Store in in slot 0x4
21,992,130 UART: [art] Derive Key Pair
21,993,128 UART: [art] Store priv key in slot 0x5
24,456,622 UART: [art] Derive Key Pair - Done
24,469,950 UART: [art] Signing Cert with AUTHO
24,471,252 UART: RITY.KEYID = 7
26,182,073 UART: [art] Erasing AUTHORITY.KEYID = 7
26,183,573 UART: [art] PUB.X = 4AA671180333494E1FF8F85180E9A731A7BAB754834C5C83D90909F70C9240433D642BEE73A28AEAEF247947BB3E7DC3
26,190,821 UART: [art] PUB.Y = B9F8E3CBEFF4B576AD0F5F5C8BB1128D18BE69B14140C3D61D419E9B9981E2AB80443CA8D072C001A075BFFD3DB63D0E
26,198,119 UART: [art] SIG.R = 9DD35CF03CC9FFFD1D5050F700A216F8B1294DC087430D84EF646270BADCC64BB6842C3C1E2F12195B6803DE8FF9CC79
26,205,529 UART: [art] SIG.S = 0358BE8AFAE5EE9D25050C3CB53A5758B753B229F36C36B4154AD513531070A9084FA376A95B6DE2A096574E1C82E998
27,184,440 UART: Caliptra RT
27,185,150 UART: [state] CFI Enabled
27,350,548 UART: [rt] RT listening for mailbox commands...
27,352,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,508,313 UART: [rt]cmd =0x41544d4e, len=14344
27,510,248 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,891 writing to cptra_bootfsm_go
193,078 UART:
193,449 UART: Running Caliptra ROM ...
194,662 UART:
604,380 UART: [state] CFI Enabled
618,641 UART: [state] LifecycleState = Unprovisioned
621,061 UART: [state] DebugLocked = No
622,321 UART: [state] WD Timer not started. Device not locked for debugging
627,366 UART: [kat] SHA2-256
817,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,993 UART: [kat] ++
828,596 UART: [kat] sha1
839,405 UART: [kat] SHA2-256
842,401 UART: [kat] SHA2-384
848,956 UART: [kat] SHA2-512-ACC
851,546 UART: [kat] ECC-384
3,295,443 UART: [kat] HMAC-384Kdf
3,308,683 UART: [kat] LMS
3,840,520 UART: [kat] --
3,845,114 UART: [cold-reset] ++
3,846,485 UART: [fht] FHT @ 0x50003400
3,857,397 UART: [idev] ++
3,858,031 UART: [idev] CDI.KEYID = 6
3,859,065 UART: [idev] SUBJECT.KEYID = 7
3,860,271 UART: [idev] UDS.KEYID = 0
3,861,198 ready_for_fw is high
3,861,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,656 UART: [idev] Erasing UDS.KEYID = 0
6,339,781 UART: [idev] Sha1 KeyId Algorithm
6,362,623 UART: [idev] --
6,368,562 UART: [ldev] ++
6,369,244 UART: [ldev] CDI.KEYID = 6
6,370,154 UART: [ldev] SUBJECT.KEYID = 5
6,371,366 UART: [ldev] AUTHORITY.KEYID = 7
6,372,547 UART: [ldev] FE.KEYID = 1
6,384,748 UART: [ldev] Erasing FE.KEYID = 1
8,864,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,770 UART: [ldev] --
10,653,415 UART: [fwproc] Wait for Commands...
10,655,128 UART: [fwproc] Recv command 0x46574c44
10,657,438 UART: [fwproc] Recv'd Img size: 114084 bytes
15,286,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,366,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,482,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,022,958 >>> mbox cmd response: success
16,027,293 UART: [afmc] ++
16,028,007 UART: [afmc] CDI.KEYID = 6
16,029,208 UART: [afmc] SUBJECT.KEYID = 7
16,030,650 UART: [afmc] AUTHORITY.KEYID = 5
18,535,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,257,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,259,948 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,274,998 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,290,229 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,305,060 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,329,797 UART: [afmc] --
20,333,940 UART: [cold-reset] --
20,337,591 UART: [state] Locking Datavault
20,344,203 UART: [state] Locking PCR0, PCR1 and PCR31
20,346,409 UART: [state] Locking ICCM
20,347,907 UART: [exit] Launching FMC @ 0x40000130
20,356,592 UART:
20,356,827 UART: Running Caliptra FMC ...
20,357,930 UART:
20,358,088 UART: [state] CFI Enabled
20,366,193 UART: [fht] FMC Alias Private Key: 7
22,122,908 UART: [art] Extend RT PCRs Done
22,124,121 UART: [art] Lock RT PCRs Done
22,125,846 UART: [art] Populate DV Done
22,131,470 UART: [fht] FMC Alias Private Key: 7
22,132,955 UART: [art] Derive CDI
22,133,923 UART: [art] Store in in slot 0x4
22,176,210 UART: [art] Derive Key Pair
22,177,218 UART: [art] Store priv key in slot 0x5
24,604,170 UART: [art] Derive Key Pair - Done
24,617,376 UART: [art] Signing Cert with AUTHO
24,618,714 UART: RITY.KEYID = 7
26,323,861 UART: [art] Erasing AUTHORITY.KEYID = 7
26,325,403 UART: [art] PUB.X = CBBADF845CEED26116783C99A6F9AFAF9038D10D2C18E0A4FDF525962600280C4E7AFF9209DE6DEC7D25C72E5AE1241C
26,332,695 UART: [art] PUB.Y = 92C9A36C9C9CC3D20C64295A57EE05BF71CE0CF293EB0D35270CC93787AF7216EF2E18804891CBCC538179F481FD9A8E
26,339,903 UART: [art] SIG.R = 6B9EE1734253034D8E4FA5E81C20474BF3967918FCBADEFBD3FA75C0604C9842E6FFAB5382F629A3047CC98326A6B878
26,347,327 UART: [art] SIG.S = A4700F8B1E9D4051655EA705B3E7442618D167E01256584104CDFE20E11FDAE38D58B1BCB630668D6757FEBF40E7D7A3
27,326,435 UART: Caliptra RT
27,327,146 UART: [state] CFI Enabled
27,443,762 UART: [rt] RT listening for mailbox commands...
27,446,065 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,601,412 UART: [rt]cmd =0x41544d4e, len=14344
27,603,427 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
3,752,104 ready_for_fw is high
3,752,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,069,775 >>> mbox cmd response: success
20,321,438 UART:
20,321,850 UART: Running Caliptra FMC ...
20,322,959 UART:
20,323,114 UART: [state] CFI Enabled
20,331,331 UART: [fht] FMC Alias Private Key: 7
22,087,907 UART: [art] Extend RT PCRs Done
22,089,133 UART: [art] Lock RT PCRs Done
22,090,696 UART: [art] Populate DV Done
22,095,896 UART: [fht] FMC Alias Private Key: 7
22,097,388 UART: [art] Derive CDI
22,098,127 UART: [art] Store in in slot 0x4
22,140,741 UART: [art] Derive Key Pair
22,141,784 UART: [art] Store priv key in slot 0x5
24,568,223 UART: [art] Derive Key Pair - Done
24,580,966 UART: [art] Signing Cert with AUTHO
24,582,282 UART: RITY.KEYID = 7
26,287,695 UART: [art] Erasing AUTHORITY.KEYID = 7
26,289,212 UART: [art] PUB.X = 22E80C776ADC34EEAEBA6ACB701D1856BD3930C572EB1E241524C352B04C3B4CF72F1247A6CE27D7C9C3061091E6BF2A
26,296,462 UART: [art] PUB.Y = 69BB19EB8CB96B95D6529F332B1D97ED1B80E9D38EE98C67A0C5A46F12D045F11682503A5120172221BEED700FDADFF5
26,303,750 UART: [art] SIG.R = AC2D9B6EDD87FE03FD1B1FBBD9A36D3EB071EB51BAD8BA78A43E3255B5689556CCD9625CF537EC88E8149B53FC2D84D0
26,311,149 UART: [art] SIG.S = 7B2CA5E76FC7159E174EA24F9F0337EBA9C94A534A794D7A3FBD6FF06E5A923B17B9B4BABF70B710A1D774B26EC39061
27,290,278 UART: Caliptra RT
27,290,973 UART: [state] CFI Enabled
27,409,252 UART: [rt] RT listening for mailbox commands...
27,411,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,822 UART: [rt]cmd =0x41544d4e, len=14344
27,568,840 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,133 UART: [kat] SHA2-256
882,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,179 UART: [kat] ++
886,331 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,675 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 ready_for_fw is high
1,480,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,505,108 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,677 UART: [ldev] ++
1,514,845 UART: [ldev] CDI.KEYID = 6
1,515,208 UART: [ldev] SUBJECT.KEYID = 5
1,515,634 UART: [ldev] AUTHORITY.KEYID = 7
1,516,097 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,199 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 114084 bytes
5,156,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,184,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,213,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,349,222 >>> mbox cmd response: success
5,350,416 UART: [afmc] ++
5,350,584 UART: [afmc] CDI.KEYID = 6
5,350,946 UART: [afmc] SUBJECT.KEYID = 7
5,351,371 UART: [afmc] AUTHORITY.KEYID = 5
5,386,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,469 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,249 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,408,958 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,414,850 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,551 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,311 UART: [afmc] --
5,429,285 UART: [cold-reset] --
5,430,243 UART: [state] Locking Datavault
5,431,582 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,186 UART: [state] Locking ICCM
5,432,800 UART: [exit] Launching FMC @ 0x40000130
5,438,129 UART:
5,438,145 UART: Running Caliptra FMC ...
5,438,553 UART:
5,438,607 UART: [state] CFI Enabled
5,449,093 UART: [fht] FMC Alias Private Key: 7
5,557,339 UART: [art] Extend RT PCRs Done
5,557,767 UART: [art] Lock RT PCRs Done
5,559,315 UART: [art] Populate DV Done
5,567,531 UART: [fht] FMC Alias Private Key: 7
5,568,631 UART: [art] Derive CDI
5,568,911 UART: [art] Store in in slot 0x4
5,654,718 UART: [art] Derive Key Pair
5,655,078 UART: [art] Store priv key in slot 0x5
5,667,838 UART: [art] Derive Key Pair - Done
5,682,818 UART: [art] Signing Cert with AUTHO
5,683,298 UART: RITY.KEYID = 7
5,698,874 UART: [art] Erasing AUTHORITY.KEYID = 7
5,699,639 UART: [art] PUB.X = DA35B80DD0ABE666C49DD567E58F7437A88A617038782197A13033814216BD655DEC88739A02A129D375BF38A04F8528
5,706,397 UART: [art] PUB.Y = D88F9A6957737EBFB39D80C3397EE29417B104E9FD04AD471C8F8EA5C72FB8F439F36D6877B269C8AB8658C7788269C9
5,713,345 UART: [art] SIG.R = DDF1E78823053235C6B4E119F83DA634C25B8F196D7C3F90679697D4709E2A645F718D2DEFFB4CCB400A4C54AA8B6E80
5,720,117 UART: [art] SIG.S = 55F3D57B5B9FB8A3B2F6BE4551D52D9BD8B77980EB526E959C164F0902FD0F1FA3EAE3CC55501DFB50C81181058955F9
5,743,986 UART: Caliptra RT
5,744,239 UART: [state] CFI Enabled
5,852,694 UART: [rt] RT listening for mailbox commands...
5,853,364 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,376 UART: [rt]cmd =0x41544d4e, len=14344
5,977,897 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,847 ready_for_fw is high
1,362,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,123,354 >>> mbox cmd response: success
5,184,561 UART:
5,184,577 UART: Running Caliptra FMC ...
5,184,985 UART:
5,185,039 UART: [state] CFI Enabled
5,195,617 UART: [fht] FMC Alias Private Key: 7
5,304,255 UART: [art] Extend RT PCRs Done
5,304,683 UART: [art] Lock RT PCRs Done
5,306,511 UART: [art] Populate DV Done
5,314,661 UART: [fht] FMC Alias Private Key: 7
5,315,665 UART: [art] Derive CDI
5,315,945 UART: [art] Store in in slot 0x4
5,401,744 UART: [art] Derive Key Pair
5,402,104 UART: [art] Store priv key in slot 0x5
5,415,560 UART: [art] Derive Key Pair - Done
5,430,704 UART: [art] Signing Cert with AUTHO
5,431,184 UART: RITY.KEYID = 7
5,445,834 UART: [art] Erasing AUTHORITY.KEYID = 7
5,446,599 UART: [art] PUB.X = 3106BFCF804C9F40C427EA3079854032AFEFD9242DB27AADE1C3675EDD73B78430D9F5F152838B81F0E3E9E27ECCA3EB
5,453,382 UART: [art] PUB.Y = 95997FFF37A07EC9A0B6EE9732115F6348382892B1032AFDE2A3B258EF2932076ACA33A223F8A844819B3C9BDAEB27FF
5,460,334 UART: [art] SIG.R = 1B3BF72B7D13AA335089B269EDB2483622BAA7461F93CF6A77CC8862CB560C272845ACF85B2086F7259A5D04DB1FD773
5,467,104 UART: [art] SIG.S = 06A58FCC8AA1FF49698A2173F45A78468E9FBED7BCE4EDF30254470C63C8CDD6D61641ACB78D274B7249AC2E232B3E5B
5,490,506 UART: Caliptra RT
5,490,759 UART: [state] CFI Enabled
5,598,693 UART: [rt] RT listening for mailbox commands...
5,599,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,722,317 UART: [rt]cmd =0x41544d4e, len=14344
5,723,848 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,983 UART: [state] LifecycleState = Unprovisioned
86,638 UART: [state] DebugLocked = No
87,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,676 UART: [kat] SHA2-256
882,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,722 UART: [kat] ++
886,874 UART: [kat] sha1
891,150 UART: [kat] SHA2-256
893,088 UART: [kat] SHA2-384
895,825 UART: [kat] SHA2-512-ACC
897,726 UART: [kat] ECC-384
903,697 UART: [kat] HMAC-384Kdf
908,217 UART: [kat] LMS
1,476,413 UART: [kat] --
1,477,382 UART: [cold-reset] ++
1,477,792 UART: [fht] Storing FHT @ 0x50003400
1,480,541 UART: [idev] ++
1,480,709 UART: [idev] CDI.KEYID = 6
1,481,069 UART: [idev] SUBJECT.KEYID = 7
1,481,493 UART: [idev] UDS.KEYID = 0
1,481,838 ready_for_fw is high
1,481,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,741 UART: [idev] Erasing UDS.KEYID = 0
1,506,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,493 UART: [idev] --
1,516,480 UART: [ldev] ++
1,516,648 UART: [ldev] CDI.KEYID = 6
1,517,011 UART: [ldev] SUBJECT.KEYID = 5
1,517,437 UART: [ldev] AUTHORITY.KEYID = 7
1,517,900 UART: [ldev] FE.KEYID = 1
1,523,126 UART: [ldev] Erasing FE.KEYID = 1
1,548,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,893 UART: [ldev] --
1,588,380 UART: [fwproc] Waiting for Commands...
1,588,997 UART: [fwproc] Received command 0x46574c44
1,589,788 UART: [fwproc] Received Image of size 114084 bytes
5,271,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,403 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,464,962 >>> mbox cmd response: success
5,466,214 UART: [afmc] ++
5,466,382 UART: [afmc] CDI.KEYID = 6
5,466,744 UART: [afmc] SUBJECT.KEYID = 7
5,467,169 UART: [afmc] AUTHORITY.KEYID = 5
5,502,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,518,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,519,419 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,128 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,020 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,536,721 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,544,569 UART: [afmc] --
5,545,483 UART: [cold-reset] --
5,546,619 UART: [state] Locking Datavault
5,547,670 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,274 UART: [state] Locking ICCM
5,548,920 UART: [exit] Launching FMC @ 0x40000130
5,554,249 UART:
5,554,265 UART: Running Caliptra FMC ...
5,554,673 UART:
5,554,816 UART: [state] CFI Enabled
5,565,948 UART: [fht] FMC Alias Private Key: 7
5,674,020 UART: [art] Extend RT PCRs Done
5,674,448 UART: [art] Lock RT PCRs Done
5,675,944 UART: [art] Populate DV Done
5,684,398 UART: [fht] FMC Alias Private Key: 7
5,685,340 UART: [art] Derive CDI
5,685,620 UART: [art] Store in in slot 0x4
5,771,307 UART: [art] Derive Key Pair
5,771,667 UART: [art] Store priv key in slot 0x5
5,785,269 UART: [art] Derive Key Pair - Done
5,800,121 UART: [art] Signing Cert with AUTHO
5,800,601 UART: RITY.KEYID = 7
5,815,513 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,278 UART: [art] PUB.X = B5AA717F0404A07CD83D1A08A29EBA2FB7289862029FCC60372C33E74E5E64DBA47734A092A509683EF94C78FFFCD118
5,823,041 UART: [art] PUB.Y = B48BBAF5FFCA3C71AE93341A51C67D6DA6F407330CDAAA64B9B6146DD1B88751804B0057DEA3367CB0221B1CF71C3126
5,829,977 UART: [art] SIG.R = 437AE831DD4B7E56595C9C150AD8641218C203D6327E514349B24482E5D244590B10E24F4B33D732AA277C3AD8E5EDEC
5,836,738 UART: [art] SIG.S = 1D870CC76391FCD0AD3F7FFAE7CCFEDE33B7CA6FBA45478436E71C995384743D6A89D3B961845BB4437FCB7DEEF26F52
5,860,924 UART: Caliptra RT
5,861,269 UART: [state] CFI Enabled
5,969,385 UART: [rt] RT listening for mailbox commands...
5,970,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,069 UART: [rt]cmd =0x41544d4e, len=14344
6,094,732 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,674 ready_for_fw is high
1,362,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,388,302 >>> mbox cmd response: success
5,449,785 UART:
5,449,801 UART: Running Caliptra FMC ...
5,450,209 UART:
5,450,352 UART: [state] CFI Enabled
5,461,012 UART: [fht] FMC Alias Private Key: 7
5,569,478 UART: [art] Extend RT PCRs Done
5,569,906 UART: [art] Lock RT PCRs Done
5,571,316 UART: [art] Populate DV Done
5,579,450 UART: [fht] FMC Alias Private Key: 7
5,580,616 UART: [art] Derive CDI
5,580,896 UART: [art] Store in in slot 0x4
5,667,109 UART: [art] Derive Key Pair
5,667,469 UART: [art] Store priv key in slot 0x5
5,680,675 UART: [art] Derive Key Pair - Done
5,695,548 UART: [art] Signing Cert with AUTHO
5,696,028 UART: RITY.KEYID = 7
5,711,124 UART: [art] Erasing AUTHORITY.KEYID = 7
5,711,889 UART: [art] PUB.X = A4DFEDC33E150ADB8A0C1D4207FEC3EA9010283B810F675AFF2489A4F9B40A7D449B259B55B8B4629C8204830964684D
5,718,644 UART: [art] PUB.Y = 74E9ADD3A9D010C91BD7474E039CB3C7BFA0644094DE3D74C02AA0958BFAA966AE3B441ACCD019D544B2A9A145CEED71
5,725,611 UART: [art] SIG.R = 9A1B439E14264DB3F1302626DA69A63A81C7226AF6D493EFB1E0EA91DD7695CD2A9647990329193434899198A5C76948
5,732,370 UART: [art] SIG.S = E56C3A13879351C61111204D05CA0D3FC98E6902619B74491C023C99A84F172D6C52FBD9E3AF965F7DE4C84693D07A7A
5,755,555 UART: Caliptra RT
5,755,900 UART: [state] CFI Enabled
5,865,180 UART: [rt] RT listening for mailbox commands...
5,865,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,988,970 UART: [rt]cmd =0x41544d4e, len=14344
5,990,577 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
902,107 UART: [kat] SHA2-256
904,047 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,504 UART: [kat] HMAC-384Kdf
922,960 UART: [kat] LMS
1,171,288 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,799 UART: [fht] FHT @ 0x50003400
1,175,444 UART: [idev] ++
1,175,612 UART: [idev] CDI.KEYID = 6
1,175,972 UART: [idev] SUBJECT.KEYID = 7
1,176,396 UART: [idev] UDS.KEYID = 0
1,176,741 ready_for_fw is high
1,176,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,201,157 UART: [idev] Sha1 KeyId Algorithm
1,209,547 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,168 UART: [ldev] SUBJECT.KEYID = 5
1,211,594 UART: [ldev] AUTHORITY.KEYID = 7
1,212,057 UART: [ldev] FE.KEYID = 1
1,217,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,838 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 114084 bytes
3,125,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,317,906 >>> mbox cmd response: success
3,319,130 UART: [afmc] ++
3,319,298 UART: [afmc] CDI.KEYID = 6
3,319,660 UART: [afmc] SUBJECT.KEYID = 7
3,320,085 UART: [afmc] AUTHORITY.KEYID = 5
3,354,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,344 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,053 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,945 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,656 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,381 UART: [afmc] --
3,398,377 UART: [cold-reset] --
3,399,145 UART: [state] Locking Datavault
3,400,494 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,098 UART: [state] Locking ICCM
3,401,524 UART: [exit] Launching FMC @ 0x40000130
3,406,853 UART:
3,406,869 UART: Running Caliptra FMC ...
3,407,277 UART:
3,407,331 UART: [state] CFI Enabled
3,418,013 UART: [fht] FMC Alias Private Key: 7
3,526,381 UART: [art] Extend RT PCRs Done
3,526,809 UART: [art] Lock RT PCRs Done
3,528,173 UART: [art] Populate DV Done
3,536,145 UART: [fht] FMC Alias Private Key: 7
3,537,093 UART: [art] Derive CDI
3,537,373 UART: [art] Store in in slot 0x4
3,623,288 UART: [art] Derive Key Pair
3,623,648 UART: [art] Store priv key in slot 0x5
3,637,164 UART: [art] Derive Key Pair - Done
3,651,986 UART: [art] Signing Cert with AUTHO
3,652,466 UART: RITY.KEYID = 7
3,667,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,383 UART: [art] PUB.X = FEBB57E8724179B2DFA7919300E22E373F8B0AE7DED9CF32F4450FDFD8335E3323B2A70A5072D6B5DCE9F738977F8532
3,675,132 UART: [art] PUB.Y = B361B8AC3A2C3042DFE298FB30199ACA02EF33A9A9150D2ADA327B280AFE46DD5542673C07B595714C75E3A391FCD80E
3,682,079 UART: [art] SIG.R = 5C95AA72C4436B113CCF4D69218E78B5059E63D922D783F3EF5615EA71943751A0CC8FF2341E88A93CC36AE69286A479
3,688,846 UART: [art] SIG.S = 34110E5E00EBDB12228F70FA51AFBFE9DF030BEA39E25C24FC68C06C66384A99ED47C52275488D3C6D4618B13093BB46
3,713,248 UART: Caliptra RT
3,713,501 UART: [state] CFI Enabled
3,821,020 UART: [rt] RT listening for mailbox commands...
3,821,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,898 UART: [rt]cmd =0x41544d4e, len=14344
3,946,463 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,819 ready_for_fw is high
1,060,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,169,717 >>> mbox cmd response: success
3,231,582 UART:
3,231,598 UART: Running Caliptra FMC ...
3,232,006 UART:
3,232,060 UART: [state] CFI Enabled
3,242,608 UART: [fht] FMC Alias Private Key: 7
3,350,360 UART: [art] Extend RT PCRs Done
3,350,788 UART: [art] Lock RT PCRs Done
3,352,208 UART: [art] Populate DV Done
3,360,476 UART: [fht] FMC Alias Private Key: 7
3,361,490 UART: [art] Derive CDI
3,361,770 UART: [art] Store in in slot 0x4
3,447,221 UART: [art] Derive Key Pair
3,447,581 UART: [art] Store priv key in slot 0x5
3,461,145 UART: [art] Derive Key Pair - Done
3,476,221 UART: [art] Signing Cert with AUTHO
3,476,701 UART: RITY.KEYID = 7
3,492,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,012 UART: [art] PUB.X = 1CF0EB0C44C839A79F6786965F3B161DC7D48157EF304936481FDD61821F2331566EFDDA93C1F12151A29619100B3D2D
3,499,774 UART: [art] PUB.Y = 6DAAE6C8B6599C653D4E0F06402B2A98FB465423F4A7F4A9C9804B7FF3C2D40427B806935DFD4EA900BBECD5579893C4
3,506,700 UART: [art] SIG.R = 7962A741CB3F0F4B33A86A42561AE6CC828617D417776A9226C5D5AAD78A040E57E50AF98CB53593C8464492F8C07200
3,513,432 UART: [art] SIG.S = 16C0BF18EBCC1FB87A9C59425884CB8CDC48FC7255D3A1EEA3A390763E2480025D6421470E105CF1D49A8E24E8EB51E4
3,537,431 UART: Caliptra RT
3,537,684 UART: [state] CFI Enabled
3,646,107 UART: [rt] RT listening for mailbox commands...
3,646,777 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,749 UART: [rt]cmd =0x41544d4e, len=14344
3,771,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,899 UART: [kat] SHA2-512-ACC
908,800 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,172,060 UART: [cold-reset] ++
1,172,420 UART: [fht] FHT @ 0x50003400
1,175,077 UART: [idev] ++
1,175,245 UART: [idev] CDI.KEYID = 6
1,175,605 UART: [idev] SUBJECT.KEYID = 7
1,176,029 UART: [idev] UDS.KEYID = 0
1,176,374 ready_for_fw is high
1,176,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,780 UART: [idev] Sha1 KeyId Algorithm
1,209,300 UART: [idev] --
1,210,332 UART: [ldev] ++
1,210,500 UART: [ldev] CDI.KEYID = 6
1,210,863 UART: [ldev] SUBJECT.KEYID = 5
1,211,289 UART: [ldev] AUTHORITY.KEYID = 7
1,211,752 UART: [ldev] FE.KEYID = 1
1,217,244 UART: [ldev] Erasing FE.KEYID = 1
1,244,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,440 UART: [ldev] --
1,283,843 UART: [fwproc] Wait for Commands...
1,284,433 UART: [fwproc] Recv command 0x46574c44
1,285,161 UART: [fwproc] Recv'd Img size: 114084 bytes
3,124,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,316,956 >>> mbox cmd response: success
3,318,016 UART: [afmc] ++
3,318,184 UART: [afmc] CDI.KEYID = 6
3,318,546 UART: [afmc] SUBJECT.KEYID = 7
3,318,971 UART: [afmc] AUTHORITY.KEYID = 5
3,354,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,766 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,475 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,367 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,078 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,741 UART: [afmc] --
3,397,757 UART: [cold-reset] --
3,398,503 UART: [state] Locking Datavault
3,399,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,260 UART: [state] Locking ICCM
3,400,750 UART: [exit] Launching FMC @ 0x40000130
3,406,079 UART:
3,406,095 UART: Running Caliptra FMC ...
3,406,503 UART:
3,406,646 UART: [state] CFI Enabled
3,417,116 UART: [fht] FMC Alias Private Key: 7
3,524,638 UART: [art] Extend RT PCRs Done
3,525,066 UART: [art] Lock RT PCRs Done
3,526,558 UART: [art] Populate DV Done
3,534,770 UART: [fht] FMC Alias Private Key: 7
3,535,948 UART: [art] Derive CDI
3,536,228 UART: [art] Store in in slot 0x4
3,621,913 UART: [art] Derive Key Pair
3,622,273 UART: [art] Store priv key in slot 0x5
3,636,593 UART: [art] Derive Key Pair - Done
3,651,472 UART: [art] Signing Cert with AUTHO
3,651,952 UART: RITY.KEYID = 7
3,667,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,959 UART: [art] PUB.X = CC56AC6E8A98CD8E3A9DE568F244325A2F92FF8C5822919FA7CD7A51BE9B580E578E63A4D6EEF1CDB98AF36275F63964
3,674,742 UART: [art] PUB.Y = 6CDC58F22A03A64DD72F9B2F0C209045A1FC2EA44A8523C30FD17C5554F8A494534EB111C32C2D46EF45DE88839CFF30
3,681,693 UART: [art] SIG.R = E720E8277A7ADB20F340C76F23C21E4E1954390F07872A8159A38E630EA94BB06110B8E74B1DEB7479F45757322BA5F5
3,688,452 UART: [art] SIG.S = C2487A8EA523D7D66B191AD98072E247EB00684BF90DA11CB23B94F01F815A73495B3746E133D2FB5798D23B9A34D135
3,711,880 UART: Caliptra RT
3,712,225 UART: [state] CFI Enabled
3,818,832 UART: [rt] RT listening for mailbox commands...
3,819,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,454 UART: [rt]cmd =0x41544d4e, len=14344
3,943,853 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,916 >>> mbox cmd response: success
3,228,227 UART:
3,228,243 UART: Running Caliptra FMC ...
3,228,651 UART:
3,228,794 UART: [state] CFI Enabled
3,239,388 UART: [fht] FMC Alias Private Key: 7
3,347,592 UART: [art] Extend RT PCRs Done
3,348,020 UART: [art] Lock RT PCRs Done
3,349,552 UART: [art] Populate DV Done
3,357,546 UART: [fht] FMC Alias Private Key: 7
3,358,548 UART: [art] Derive CDI
3,358,828 UART: [art] Store in in slot 0x4
3,444,493 UART: [art] Derive Key Pair
3,444,853 UART: [art] Store priv key in slot 0x5
3,457,339 UART: [art] Derive Key Pair - Done
3,471,885 UART: [art] Signing Cert with AUTHO
3,472,365 UART: RITY.KEYID = 7
3,487,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,402 UART: [art] PUB.X = B2E5F7D939C72A5DA9325A5B8DD932E4CD3E86419E8FF7BF4538B8FFAC4AEE0AD2CA1CA03018AD2432C38AFBDCC5E1EB
3,495,201 UART: [art] PUB.Y = 0648E674DDD70DDEE0E32C77A6A8FA056B70D895DEADE8BB322E8BE4C79AE65CC860DF00FA0ED94AD36E021A99A819DF
3,502,140 UART: [art] SIG.R = 2F0F378712BEA8AC867F1F19E718B011F9F08173118B938206EF53E20861244846586B6771F33BF8D2FA8EA83ED9B3C2
3,508,899 UART: [art] SIG.S = 8929573137873CB7434AC6FC7EF32FA0869B933B58C67163190595E8C62C3BD07F58165211ABA26E027E693F1582AE2B
3,532,746 UART: Caliptra RT
3,533,091 UART: [state] CFI Enabled
3,641,299 UART: [rt] RT listening for mailbox commands...
3,641,969 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,991 UART: [rt]cmd =0x41544d4e, len=14344
3,766,504 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,722 UART: [kat] SHA2-512-ACC
906,623 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,205 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,174,061 ready_for_fw is high
1,174,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,677 UART: [idev] Erasing UDS.KEYID = 0
1,198,051 UART: [idev] Sha1 KeyId Algorithm
1,206,775 UART: [idev] --
1,207,628 UART: [ldev] ++
1,207,796 UART: [ldev] CDI.KEYID = 6
1,208,160 UART: [ldev] SUBJECT.KEYID = 5
1,208,587 UART: [ldev] AUTHORITY.KEYID = 7
1,209,050 UART: [ldev] FE.KEYID = 1
1,214,474 UART: [ldev] Erasing FE.KEYID = 1
1,240,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,220 UART: [ldev] --
1,279,698 UART: [fwproc] Wait for Commands...
1,280,425 UART: [fwproc] Recv command 0x46574c44
1,281,158 UART: [fwproc] Recv'd Img size: 114084 bytes
3,115,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,308,138 >>> mbox cmd response: success
3,309,249 UART: [afmc] ++
3,309,417 UART: [afmc] CDI.KEYID = 6
3,309,780 UART: [afmc] SUBJECT.KEYID = 7
3,310,206 UART: [afmc] AUTHORITY.KEYID = 5
3,344,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,165 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,875 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,765 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,476 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,176 UART: [afmc] --
3,388,272 UART: [cold-reset] --
3,388,984 UART: [state] Locking Datavault
3,390,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,829 UART: [state] Locking ICCM
3,391,451 UART: [exit] Launching FMC @ 0x40000130
3,396,780 UART:
3,396,796 UART: Running Caliptra FMC ...
3,397,204 UART:
3,397,258 UART: [state] CFI Enabled
3,407,784 UART: [fht] FMC Alias Private Key: 7
3,516,002 UART: [art] Extend RT PCRs Done
3,516,430 UART: [art] Lock RT PCRs Done
3,518,056 UART: [art] Populate DV Done
3,526,318 UART: [fht] FMC Alias Private Key: 7
3,527,266 UART: [art] Derive CDI
3,527,546 UART: [art] Store in in slot 0x4
3,613,095 UART: [art] Derive Key Pair
3,613,455 UART: [art] Store priv key in slot 0x5
3,626,319 UART: [art] Derive Key Pair - Done
3,641,333 UART: [art] Signing Cert with AUTHO
3,641,813 UART: RITY.KEYID = 7
3,656,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,200 UART: [art] PUB.X = 2FFB0CE455F822D0FD437B0C47BBD04205B92DDE1D5D034CB9E5062D2186906985AEED5107C8AC5F97DB5F7E43F8305A
3,663,966 UART: [art] PUB.Y = 9A17150DB6F963D882A001605E487BC7E0F1D56676A2E36B0AD9EFCAAF78F8B3C1D807545AAE3AB4B47D6327FBAB8346
3,670,918 UART: [art] SIG.R = 3342F1DA1AC197889D2DBF6004AC6C2F5F48585EF697A89EAB5364ED572E7AE258D708CDF3093C74619DBC07BDC9007E
3,677,666 UART: [art] SIG.S = 6D7C2253DDACAC2DF4406E6D4766AFDE4C12BCD4110D13A618C689448EFB9175BDBEEA27153329D5482481D9C7D2C3A2
3,701,434 UART: Caliptra RT
3,701,687 UART: [state] CFI Enabled
3,808,496 UART: [rt] RT listening for mailbox commands...
3,809,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,972 UART: [rt]cmd =0x41544d4e, len=14344
3,933,425 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,816 ready_for_fw is high
1,056,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,156,667 >>> mbox cmd response: success
3,219,428 UART:
3,219,444 UART: Running Caliptra FMC ...
3,219,852 UART:
3,219,906 UART: [state] CFI Enabled
3,230,550 UART: [fht] FMC Alias Private Key: 7
3,337,718 UART: [art] Extend RT PCRs Done
3,338,146 UART: [art] Lock RT PCRs Done
3,339,532 UART: [art] Populate DV Done
3,347,632 UART: [fht] FMC Alias Private Key: 7
3,348,640 UART: [art] Derive CDI
3,348,920 UART: [art] Store in in slot 0x4
3,434,569 UART: [art] Derive Key Pair
3,434,929 UART: [art] Store priv key in slot 0x5
3,448,359 UART: [art] Derive Key Pair - Done
3,463,209 UART: [art] Signing Cert with AUTHO
3,463,689 UART: RITY.KEYID = 7
3,479,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,878 UART: [art] PUB.X = 925AB1F75506F8764350E59002057653F153A3C551B15DA3AE739799C83FD65418A07B63DA0D19F04C2940FACD1734BF
3,486,632 UART: [art] PUB.Y = DDE9EE4317C49BC2F463F407FAFCAA2AF48580CD379755EBBCC271C06DDA19E355486B2BDE1B568BC0C3BF75F55CF69A
3,493,605 UART: [art] SIG.R = 43C239569B0964A9A6E183E8E0DC6C686EA5D453C1A827B120F30F9AAF9C5AA0B96F1B18D0FC165B1582B9269F7E5707
3,500,372 UART: [art] SIG.S = 9E1815B3EAC4522CA31106273AEEBC73D55F185AE872B5FF6AAEF05947E8741F87E8D598C4C10CB8459EB05D7106E660
3,524,486 UART: Caliptra RT
3,524,739 UART: [state] CFI Enabled
3,632,681 UART: [rt] RT listening for mailbox commands...
3,633,351 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,085 UART: [rt]cmd =0x41544d4e, len=14344
3,757,448 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,734 UART: [kat] ++
895,886 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,172,998 UART: [idev] ++
1,173,166 UART: [idev] CDI.KEYID = 6
1,173,527 UART: [idev] SUBJECT.KEYID = 7
1,173,952 UART: [idev] UDS.KEYID = 0
1,174,298 ready_for_fw is high
1,174,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,208,763 UART: [ldev] ++
1,208,931 UART: [ldev] CDI.KEYID = 6
1,209,295 UART: [ldev] SUBJECT.KEYID = 5
1,209,722 UART: [ldev] AUTHORITY.KEYID = 7
1,210,185 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,241,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,341 UART: [ldev] --
1,280,731 UART: [fwproc] Wait for Commands...
1,281,392 UART: [fwproc] Recv command 0x46574c44
1,282,125 UART: [fwproc] Recv'd Img size: 114084 bytes
3,118,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,311,108 >>> mbox cmd response: success
3,312,337 UART: [afmc] ++
3,312,505 UART: [afmc] CDI.KEYID = 6
3,312,868 UART: [afmc] SUBJECT.KEYID = 7
3,313,294 UART: [afmc] AUTHORITY.KEYID = 5
3,348,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,053 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,763 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,653 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,364 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,216 UART: [afmc] --
3,392,296 UART: [cold-reset] --
3,393,120 UART: [state] Locking Datavault
3,394,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,823 UART: [state] Locking ICCM
3,395,373 UART: [exit] Launching FMC @ 0x40000130
3,400,702 UART:
3,400,718 UART: Running Caliptra FMC ...
3,401,126 UART:
3,401,269 UART: [state] CFI Enabled
3,411,965 UART: [fht] FMC Alias Private Key: 7
3,519,847 UART: [art] Extend RT PCRs Done
3,520,275 UART: [art] Lock RT PCRs Done
3,521,799 UART: [art] Populate DV Done
3,530,099 UART: [fht] FMC Alias Private Key: 7
3,531,267 UART: [art] Derive CDI
3,531,547 UART: [art] Store in in slot 0x4
3,617,188 UART: [art] Derive Key Pair
3,617,548 UART: [art] Store priv key in slot 0x5
3,630,538 UART: [art] Derive Key Pair - Done
3,645,253 UART: [art] Signing Cert with AUTHO
3,645,733 UART: RITY.KEYID = 7
3,660,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,388 UART: [art] PUB.X = 46955A6B5E4CB75E7B9874C5792E020E63CB87673CDD7BB7D0E96AAAAD6BE4A6B519D03E2D76FCE18D2229039BC5D3BE
3,668,167 UART: [art] PUB.Y = 5589AB7C8FB48953752399782C60180E38F625AAC828B337F9D717D8AA5BF275B5660742D06376312466CBAD9FFB668F
3,675,107 UART: [art] SIG.R = 13F9222F384B9975856760934E4696BBCB361FF60F3E1888B14E340694E9CA6938AEF7E813CCCCACFF41A1C077612C88
3,681,873 UART: [art] SIG.S = 270A0E118EDA72A79DB189034B0CAD43053DCC38C6119C1E4CE09B7CE4F35EAA9C468D0FA6E9BD6F593A1DD7D77BE693
3,705,756 UART: Caliptra RT
3,706,101 UART: [state] CFI Enabled
3,815,254 UART: [rt] RT listening for mailbox commands...
3,815,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,188 UART: [rt]cmd =0x41544d4e, len=14344
3,940,771 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,165 ready_for_fw is high
1,056,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,627 >>> mbox cmd response: success
3,236,034 UART:
3,236,050 UART: Running Caliptra FMC ...
3,236,458 UART:
3,236,601 UART: [state] CFI Enabled
3,247,589 UART: [fht] FMC Alias Private Key: 7
3,355,569 UART: [art] Extend RT PCRs Done
3,355,997 UART: [art] Lock RT PCRs Done
3,357,383 UART: [art] Populate DV Done
3,365,665 UART: [fht] FMC Alias Private Key: 7
3,366,699 UART: [art] Derive CDI
3,366,979 UART: [art] Store in in slot 0x4
3,452,652 UART: [art] Derive Key Pair
3,453,012 UART: [art] Store priv key in slot 0x5
3,466,238 UART: [art] Derive Key Pair - Done
3,481,138 UART: [art] Signing Cert with AUTHO
3,481,618 UART: RITY.KEYID = 7
3,496,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,763 UART: [art] PUB.X = 33CF5DEF6BF2F4E02E143D8E76D49D91422EBE5E5453883AFEF936955900B0553BD380015A91B4BBAFD9886BE25FF6DF
3,504,522 UART: [art] PUB.Y = 7A22A619A2D15A8B6EAEC47E72125F34B9DC87FBD2C3086B067D39373BFF4424845B4565E9CE430EBE563F4738A4D5CE
3,511,473 UART: [art] SIG.R = BC558AAE666A9E912FD91541E8C7F2374A096757BDA8E2FA8E9051F28C8D43E19CBE64E20E3F5EBBE1311B65B98F56A2
3,518,251 UART: [art] SIG.S = B41C7DDB1B32D291E1EDCB53E943D7C08AA325FE3593036F16D654C224994B7347455D7F163E0A5E918421ACEC0133D3
3,541,681 UART: Caliptra RT
3,542,026 UART: [state] CFI Enabled
3,650,363 UART: [rt] RT listening for mailbox commands...
3,651,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,103 UART: [rt]cmd =0x41544d4e, len=14344
3,775,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,103 UART:
192,464 UART: Running Caliptra ROM ...
193,572 UART:
193,717 UART: [state] CFI Enabled
264,536 UART: [state] LifecycleState = Unprovisioned
266,513 UART: [state] DebugLocked = No
267,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,633 UART: [kat] SHA2-256
442,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,853 UART: [kat] ++
453,310 UART: [kat] sha1
465,638 UART: [kat] SHA2-256
468,302 UART: [kat] SHA2-384
473,374 UART: [kat] SHA2-512-ACC
475,746 UART: [kat] ECC-384
2,767,442 UART: [kat] HMAC-384Kdf
2,799,996 UART: [kat] LMS
3,990,273 UART: [kat] --
3,995,787 UART: [cold-reset] ++
3,998,002 UART: [fht] Storing FHT @ 0x50003400
4,010,222 UART: [idev] ++
4,010,830 UART: [idev] CDI.KEYID = 6
4,011,724 UART: [idev] SUBJECT.KEYID = 7
4,012,996 UART: [idev] UDS.KEYID = 0
4,013,979 ready_for_fw is high
4,014,168 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,154 UART: [idev] Erasing UDS.KEYID = 0
7,345,884 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,377 UART: [idev] --
7,373,261 UART: [ldev] ++
7,373,835 UART: [ldev] CDI.KEYID = 6
7,374,775 UART: [ldev] SUBJECT.KEYID = 5
7,375,986 UART: [ldev] AUTHORITY.KEYID = 7
7,377,273 UART: [ldev] FE.KEYID = 1
7,423,268 UART: [ldev] Erasing FE.KEYID = 1
10,756,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,846 UART: [ldev] --
13,138,850 UART: [fwproc] Waiting for Commands...
13,141,535 UART: [fwproc] Received command 0x46574c44
13,143,724 UART: [fwproc] Received Image of size 113760 bytes
22,172,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,251,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,320,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,636,055 >>> mbox cmd response: success
22,639,899 UART: [afmc] ++
22,640,494 UART: [afmc] CDI.KEYID = 6
22,641,407 UART: [afmc] SUBJECT.KEYID = 7
22,642,624 UART: [afmc] AUTHORITY.KEYID = 5
25,999,481 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,298,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,300,603 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,315,206 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,329,924 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,344,116 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,365,195 UART: [afmc] --
28,368,411 UART: [cold-reset] --
28,373,025 UART: [state] Locking Datavault
28,377,256 UART: [state] Locking PCR0, PCR1 and PCR31
28,378,951 UART: [state] Locking ICCM
28,380,723 UART: [exit] Launching FMC @ 0x40000130
28,389,123 UART:
28,389,353 UART: Running Caliptra FMC ...
28,390,458 UART:
28,390,617 UART: [state] CFI Enabled
28,458,383 UART: [fht] FMC Alias Private Key: 7
30,796,031 UART: [art] Extend RT PCRs Done
30,797,248 UART: [art] Lock RT PCRs Done
30,799,089 UART: [art] Populate DV Done
30,804,558 UART: [fht] FMC Alias Private Key: 7
30,806,210 UART: [art] Derive CDI
30,806,948 UART: [art] Store in in slot 0x4
30,867,208 UART: [art] Derive Key Pair
30,868,219 UART: [art] Store priv key in slot 0x5
34,161,018 UART: [art] Derive Key Pair - Done
34,174,423 UART: [art] Signing Cert with AUTHO
34,175,749 UART: RITY.KEYID = 7
36,463,000 UART: [art] Erasing AUTHORITY.KEYID = 7
36,464,518 UART: [art] PUB.X = 98F841203F5FAADAA8A369F36D3FB8BC78C68302E38A908446FD569258B000B937841DD7B6664AAAA64362AF31AC344C
36,471,767 UART: [art] PUB.Y = 48983AD90C5B7C8B19E7EBF0B4CB59FB0192C2486F2810E2C9A96F671B5BEAC6CCF8AF68B28968EAEF67FC3B7104234F
36,479,047 UART: [art] SIG.R = BCDD8B6CF72781B0FCD76DFA4887F7041ADAF80AD322218DAEC4D897548DB1A1FDC4EE02275413CAD4715BC0E2BB64C1
36,486,489 UART: [art] SIG.S = D5FEE5CE8A8F1DE2E2DA1466906E95A5842662B0CF47686723BC59DC51EF79420340397D041D544B7C5838D44A612C77
37,792,177 UART: Caliptra RT
37,792,891 UART: [state] CFI Enabled
37,954,542 UART: [rt] RT listening for mailbox commands...
37,956,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,112,213 UART: [rt]cmd =0x41544d4e, len=14344
38,114,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,806,782 ready_for_fw is high
3,807,173 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,113,256 >>> mbox cmd response: success
27,807,939 UART:
27,808,331 UART: Running Caliptra FMC ...
27,809,457 UART:
27,809,619 UART: [state] CFI Enabled
27,878,560 UART: [fht] FMC Alias Private Key: 7
30,216,273 UART: [art] Extend RT PCRs Done
30,217,503 UART: [art] Lock RT PCRs Done
30,219,132 UART: [art] Populate DV Done
30,224,594 UART: [fht] FMC Alias Private Key: 7
30,226,212 UART: [art] Derive CDI
30,227,031 UART: [art] Store in in slot 0x4
30,287,768 UART: [art] Derive Key Pair
30,288,809 UART: [art] Store priv key in slot 0x5
33,581,851 UART: [art] Derive Key Pair - Done
33,594,583 UART: [art] Signing Cert with AUTHO
33,595,882 UART: RITY.KEYID = 7
35,883,818 UART: [art] Erasing AUTHORITY.KEYID = 7
35,885,325 UART: [art] PUB.X = 4AB143724860ACFA526114A7453652B8DC5BD43027033724F32A406EE8361EE4E912BC2A147EA40AB8D32E4598E0E09D
35,892,541 UART: [art] PUB.Y = B1E83212C6F3487CF1B1152B409C799F8A041B81783914047FBAFD4B53D8BB421EE532EA99542780A2573B396AE52204
35,899,772 UART: [art] SIG.R = 6F57E5757999D8B602514C2EE5984E7817733C879D15320689569A93E21673E1EED55CB4DDCE61A14D13ADFE78292A33
35,907,127 UART: [art] SIG.S = 9FB7B100C37BEDE32D1A73A6377B926A19CE353BFFE1D52609C0DBAB20F4A112249719FA54F1B523C32E55D66AA41E93
37,212,152 UART: Caliptra RT
37,212,870 UART: [state] CFI Enabled
37,372,892 UART: [rt] RT listening for mailbox commands...
37,375,216 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,530,540 UART: [rt]cmd =0x41544d4e, len=14344
37,532,562 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,831 writing to cptra_bootfsm_go
193,096 UART:
193,495 UART: Running Caliptra ROM ...
194,688 UART:
604,292 UART: [state] CFI Enabled
620,603 UART: [state] LifecycleState = Unprovisioned
622,515 UART: [state] DebugLocked = No
625,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,962 UART: [kat] SHA2-256
799,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,280 UART: [kat] ++
810,771 UART: [kat] sha1
821,856 UART: [kat] SHA2-256
824,505 UART: [kat] SHA2-384
830,205 UART: [kat] SHA2-512-ACC
832,588 UART: [kat] ECC-384
3,117,933 UART: [kat] HMAC-384Kdf
3,128,599 UART: [kat] LMS
4,318,683 UART: [kat] --
4,322,984 UART: [cold-reset] ++
4,323,998 UART: [fht] Storing FHT @ 0x50003400
4,336,471 UART: [idev] ++
4,337,029 UART: [idev] CDI.KEYID = 6
4,338,066 UART: [idev] SUBJECT.KEYID = 7
4,339,244 UART: [idev] UDS.KEYID = 0
4,340,309 ready_for_fw is high
4,340,513 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,382 UART: [idev] Erasing UDS.KEYID = 0
7,627,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,794 UART: [idev] --
7,651,029 UART: [ldev] ++
7,651,622 UART: [ldev] CDI.KEYID = 6
7,653,141 UART: [ldev] SUBJECT.KEYID = 5
7,654,267 UART: [ldev] AUTHORITY.KEYID = 7
7,655,442 UART: [ldev] FE.KEYID = 1
7,665,873 UART: [ldev] Erasing FE.KEYID = 1
10,952,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,136 UART: [ldev] --
13,312,964 UART: [fwproc] Waiting for Commands...
13,315,541 UART: [fwproc] Received command 0x46574c44
13,317,718 UART: [fwproc] Received Image of size 113760 bytes
22,187,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,265,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,334,618 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,650,349 >>> mbox cmd response: success
22,655,124 UART: [afmc] ++
22,655,721 UART: [afmc] CDI.KEYID = 6
22,656,627 UART: [afmc] SUBJECT.KEYID = 7
22,657,901 UART: [afmc] AUTHORITY.KEYID = 5
25,974,391 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,268,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,271,038 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,285,585 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,300,358 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,314,576 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,335,147 UART: [afmc] --
28,339,223 UART: [cold-reset] --
28,344,433 UART: [state] Locking Datavault
28,348,867 UART: [state] Locking PCR0, PCR1 and PCR31
28,350,584 UART: [state] Locking ICCM
28,352,187 UART: [exit] Launching FMC @ 0x40000130
28,360,583 UART:
28,360,824 UART: Running Caliptra FMC ...
28,361,929 UART:
28,362,091 UART: [state] CFI Enabled
28,370,358 UART: [fht] FMC Alias Private Key: 7
30,701,458 UART: [art] Extend RT PCRs Done
30,702,685 UART: [art] Lock RT PCRs Done
30,704,470 UART: [art] Populate DV Done
30,709,886 UART: [fht] FMC Alias Private Key: 7
30,711,424 UART: [art] Derive CDI
30,712,234 UART: [art] Store in in slot 0x4
30,754,658 UART: [art] Derive Key Pair
30,755,658 UART: [art] Store priv key in slot 0x5
33,997,353 UART: [art] Derive Key Pair - Done
34,010,432 UART: [art] Signing Cert with AUTHO
34,011,739 UART: RITY.KEYID = 7
36,291,014 UART: [art] Erasing AUTHORITY.KEYID = 7
36,292,665 UART: [art] PUB.X = 5F266A6CE7B3A3C8FFCC6D32EF989EC1F9A770E0E99CB95B081234750E5C07FD9F99BD5FE4311E1A0C67EC66230E8701
36,299,773 UART: [art] PUB.Y = F216E5E52D671CD727A6770967FD5D67D38429BB246238605AE94930171A779252AB4C0A1092FBE5FA31256E7BDB337A
36,306,987 UART: [art] SIG.R = CBEDCABD557CB6820B56155CD97519D6C270C5726649A01E83BDF7513875A547731BB12ED6411DAAB20D4A45C74985BD
36,314,405 UART: [art] SIG.S = C3BD2B727CEFE93CB1F9B8E79375CBBDA846B6F19C8294A43FC098AE36A30846CE062973E4B82802E91F03EF99CB25FC
37,619,455 UART: Caliptra RT
37,620,168 UART: [state] CFI Enabled
37,737,891 UART: [rt] RT listening for mailbox commands...
37,740,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,895,545 UART: [rt]cmd =0x41544d4e, len=14344
37,897,453 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
4,129,592 ready_for_fw is high
4,130,016 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,103,844 >>> mbox cmd response: success
27,746,162 UART:
27,746,561 UART: Running Caliptra FMC ...
27,747,697 UART:
27,747,860 UART: [state] CFI Enabled
27,755,646 UART: [fht] FMC Alias Private Key: 7
30,086,478 UART: [art] Extend RT PCRs Done
30,087,732 UART: [art] Lock RT PCRs Done
30,089,376 UART: [art] Populate DV Done
30,094,844 UART: [fht] FMC Alias Private Key: 7
30,096,493 UART: [art] Derive CDI
30,097,309 UART: [art] Store in in slot 0x4
30,140,403 UART: [art] Derive Key Pair
30,141,445 UART: [art] Store priv key in slot 0x5
33,383,447 UART: [art] Derive Key Pair - Done
33,396,722 UART: [art] Signing Cert with AUTHO
33,398,056 UART: RITY.KEYID = 7
35,677,630 UART: [art] Erasing AUTHORITY.KEYID = 7
35,679,142 UART: [art] PUB.X = 5FB3453D23A69C0AF4321EDCD7BC3BEB4A5559EA9B04DD74E78DFD5E7198B5FC30B85B3B1BB69E9AAEB28BCF502EDFF3
35,686,437 UART: [art] PUB.Y = 15CDD3280B7624558BD19246347DADB1E68609CC50208C2A3971E4F72F327776469BBC9480D186DBE68FBD335A5C1B39
35,693,635 UART: [art] SIG.R = 9AD86A6A664F5476C0DF83A5C3793DA6911CDCB6CA5EBAE58278D8AAFF7407D96E369D976138EFFDDAB0DDAAF9C38E06
35,701,077 UART: [art] SIG.S = FBF289CCDCBDAAD2F58B45F1F0A9A218F71259D0C239296C1F93FAB08A48B41A5643F022508829EEC53E064887F14074
37,006,132 UART: Caliptra RT
37,006,883 UART: [state] CFI Enabled
37,125,688 UART: [rt] RT listening for mailbox commands...
37,128,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,283,455 UART: [rt]cmd =0x41544d4e, len=14344
37,285,475 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,480 UART:
192,849 UART: Running Caliptra ROM ...
193,984 UART:
194,129 UART: [state] CFI Enabled
266,627 UART: [state] LifecycleState = Unprovisioned
268,531 UART: [state] DebugLocked = No
270,065 UART: [state] WD Timer not started. Device not locked for debugging
273,628 UART: [kat] SHA2-256
452,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,344 UART: [kat] ++
464,792 UART: [kat] sha1
475,594 UART: [kat] SHA2-256
478,662 UART: [kat] SHA2-384
484,855 UART: [kat] SHA2-512-ACC
487,783 UART: [kat] ECC-384
2,949,593 UART: [kat] HMAC-384Kdf
2,972,069 UART: [kat] LMS
3,501,524 UART: [kat] --
3,504,594 UART: [cold-reset] ++
3,505,875 UART: [fht] FHT @ 0x50003400
3,516,705 UART: [idev] ++
3,517,262 UART: [idev] CDI.KEYID = 6
3,518,288 UART: [idev] SUBJECT.KEYID = 7
3,519,385 UART: [idev] UDS.KEYID = 0
3,520,426 ready_for_fw is high
3,520,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,597 UART: [idev] Erasing UDS.KEYID = 0
6,028,840 UART: [idev] Sha1 KeyId Algorithm
6,053,027 UART: [idev] --
6,058,644 UART: [ldev] ++
6,059,223 UART: [ldev] CDI.KEYID = 6
6,060,151 UART: [ldev] SUBJECT.KEYID = 5
6,061,308 UART: [ldev] AUTHORITY.KEYID = 7
6,062,537 UART: [ldev] FE.KEYID = 1
6,104,526 UART: [ldev] Erasing FE.KEYID = 1
8,604,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,181 UART: [ldev] --
10,417,635 UART: [fwproc] Wait for Commands...
10,419,840 UART: [fwproc] Recv command 0x46574c44
10,421,938 UART: [fwproc] Recv'd Img size: 114084 bytes
14,985,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,057,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,126,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,443,531 >>> mbox cmd response: success
15,447,249 UART: [afmc] ++
15,447,843 UART: [afmc] CDI.KEYID = 6
15,448,911 UART: [afmc] SUBJECT.KEYID = 7
15,450,219 UART: [afmc] AUTHORITY.KEYID = 5
17,985,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,709,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,711,684 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,727,649 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,743,598 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,759,398 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,781,618 UART: [afmc] --
19,785,913 UART: [cold-reset] --
19,789,012 UART: [state] Locking Datavault
19,795,174 UART: [state] Locking PCR0, PCR1 and PCR31
19,796,827 UART: [state] Locking ICCM
19,799,357 UART: [exit] Launching FMC @ 0x40000130
19,807,750 UART:
19,807,976 UART: Running Caliptra FMC ...
19,809,068 UART:
19,809,231 UART: [state] CFI Enabled
19,870,777 UART: [fht] FMC Alias Private Key: 7
21,634,894 UART: [art] Extend RT PCRs Done
21,636,104 UART: [art] Lock RT PCRs Done
21,637,809 UART: [art] Populate DV Done
21,643,270 UART: [fht] FMC Alias Private Key: 7
21,644,884 UART: [art] Derive CDI
21,645,702 UART: [art] Store in in slot 0x4
21,703,980 UART: [art] Derive Key Pair
21,705,011 UART: [art] Store priv key in slot 0x5
24,168,068 UART: [art] Derive Key Pair - Done
24,181,057 UART: [art] Signing Cert with AUTHO
24,182,393 UART: RITY.KEYID = 7
25,893,829 UART: [art] Erasing AUTHORITY.KEYID = 7
25,895,325 UART: [art] PUB.X = 300C8EF245F40ED637CD21DD2CBA2D43D3D99070237AAC4CAA9C0FBBDCCC46044DDAE50F894AF01BCCA6B362601E65D7
25,902,669 UART: [art] PUB.Y = F878954B822B2A9904972B0AE0ACD32C72652364188C4AF4A6A938853EF3680DAE62C79B01B29A300393FA8562B93DF9
25,909,876 UART: [art] SIG.R = 3DAF2BB19CDCA48138A27C3DAE47DADF0D0874710E8F9DA63A421D8C77780093FC6487FB24E0639CD32046DC19DB0FA0
25,917,291 UART: [art] SIG.S = 651AE3A11D6D9140256E077416E5FC5D3002278787DCFB20AA4DE6FA720302A5BE2DE2029013E193B672BA08A4F32B28
26,896,932 UART: Caliptra RT
26,897,636 UART: [state] CFI Enabled
27,061,621 UART: [rt] RT listening for mailbox commands...
27,063,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,219,209 UART: [rt]cmd =0x41544d4e, len=14344
27,220,959 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
3,382,646 ready_for_fw is high
3,383,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,025,965 >>> mbox cmd response: success
19,305,327 UART:
19,305,727 UART: Running Caliptra FMC ...
19,306,831 UART:
19,306,980 UART: [state] CFI Enabled
19,373,188 UART: [fht] FMC Alias Private Key: 7
21,136,950 UART: [art] Extend RT PCRs Done
21,138,180 UART: [art] Lock RT PCRs Done
21,140,105 UART: [art] Populate DV Done
21,145,330 UART: [fht] FMC Alias Private Key: 7
21,146,867 UART: [art] Derive CDI
21,147,695 UART: [art] Store in in slot 0x4
21,205,709 UART: [art] Derive Key Pair
21,206,742 UART: [art] Store priv key in slot 0x5
23,670,220 UART: [art] Derive Key Pair - Done
23,683,322 UART: [art] Signing Cert with AUTHO
23,684,628 UART: RITY.KEYID = 7
25,395,696 UART: [art] Erasing AUTHORITY.KEYID = 7
25,397,197 UART: [art] PUB.X = FE78FBE3EDEA4273B1803613A38C6C11DA682DB671CEFE8FB92AB8B6C008FB1F72764641415E48961B8C674AA24CA91D
25,404,465 UART: [art] PUB.Y = ECDF388BFB33CBD5A6A33AAFD5AD604C2659AF33AC73EDAEB1875E4E04A26DC676695EDEAB22214DFDBEC5C44BCAF4C9
25,411,794 UART: [art] SIG.R = E6740DF5AE0E736228EB9F27198FE43BCE5EB386A65FDCD4012A6D0537DAB79367B60B4AFEDDDC8B2090EBFFA7E097B3
25,419,243 UART: [art] SIG.S = FF6A70EC0C92F08B84574C547DB66FB9A2C7F0EAD8E9F6018489FC36181FFE95895F08C3F3C3D3120C989B2FE762212B
26,397,649 UART: Caliptra RT
26,398,356 UART: [state] CFI Enabled
26,563,038 UART: [rt] RT listening for mailbox commands...
26,565,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,720,808 UART: [rt]cmd =0x41544d4e, len=14344
26,722,528 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
193,071 UART:
193,458 UART: Running Caliptra ROM ...
194,645 UART:
604,322 UART: [state] CFI Enabled
619,207 UART: [state] LifecycleState = Unprovisioned
621,070 UART: [state] DebugLocked = No
623,516 UART: [state] WD Timer not started. Device not locked for debugging
627,493 UART: [kat] SHA2-256
806,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,196 UART: [kat] ++
818,645 UART: [kat] sha1
830,225 UART: [kat] SHA2-256
833,300 UART: [kat] SHA2-384
840,421 UART: [kat] SHA2-512-ACC
843,360 UART: [kat] ECC-384
3,282,812 UART: [kat] HMAC-384Kdf
3,296,704 UART: [kat] LMS
3,826,181 UART: [kat] --
3,829,908 UART: [cold-reset] ++
3,831,845 UART: [fht] FHT @ 0x50003400
3,842,661 UART: [idev] ++
3,843,288 UART: [idev] CDI.KEYID = 6
3,844,176 UART: [idev] SUBJECT.KEYID = 7
3,845,357 UART: [idev] UDS.KEYID = 0
3,846,341 ready_for_fw is high
3,846,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,716 UART: [idev] Erasing UDS.KEYID = 0
6,315,508 UART: [idev] Sha1 KeyId Algorithm
6,338,463 UART: [idev] --
6,343,645 UART: [ldev] ++
6,344,213 UART: [ldev] CDI.KEYID = 6
6,345,129 UART: [ldev] SUBJECT.KEYID = 5
6,346,360 UART: [ldev] AUTHORITY.KEYID = 7
6,347,597 UART: [ldev] FE.KEYID = 1
6,356,570 UART: [ldev] Erasing FE.KEYID = 1
8,828,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,418 UART: [ldev] --
10,619,330 UART: [fwproc] Wait for Commands...
10,621,315 UART: [fwproc] Recv command 0x46574c44
10,623,407 UART: [fwproc] Recv'd Img size: 114084 bytes
15,200,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,279,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,348,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,665,925 >>> mbox cmd response: success
15,670,228 UART: [afmc] ++
15,670,826 UART: [afmc] CDI.KEYID = 6
15,671,740 UART: [afmc] SUBJECT.KEYID = 7
15,672,903 UART: [afmc] AUTHORITY.KEYID = 5
18,178,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,903,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,905,201 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,921,174 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,937,126 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,952,871 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,975,600 UART: [afmc] --
19,978,655 UART: [cold-reset] --
19,982,037 UART: [state] Locking Datavault
19,985,835 UART: [state] Locking PCR0, PCR1 and PCR31
19,987,483 UART: [state] Locking ICCM
19,989,717 UART: [exit] Launching FMC @ 0x40000130
19,998,145 UART:
19,998,425 UART: Running Caliptra FMC ...
19,999,458 UART:
19,999,606 UART: [state] CFI Enabled
20,007,443 UART: [fht] FMC Alias Private Key: 7
21,764,502 UART: [art] Extend RT PCRs Done
21,765,720 UART: [art] Lock RT PCRs Done
21,767,694 UART: [art] Populate DV Done
21,773,272 UART: [fht] FMC Alias Private Key: 7
21,774,756 UART: [art] Derive CDI
21,775,494 UART: [art] Store in in slot 0x4
21,818,303 UART: [art] Derive Key Pair
21,819,302 UART: [art] Store priv key in slot 0x5
24,245,714 UART: [art] Derive Key Pair - Done
24,258,849 UART: [art] Signing Cert with AUTHO
24,260,153 UART: RITY.KEYID = 7
25,965,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,967,345 UART: [art] PUB.X = 71D89920E7DA61622E30CFD7F6F3C11C7F9BB0AFDB1236536BDE4BAF469899479515FCBF0ECFB7600F4ED8A894347C5C
25,974,615 UART: [art] PUB.Y = 905DCF29B5792511B2F58964FBB72E06CE98B123F5DA61266D7FF421C425330D05B9B150784EC7E50C3DC539B27E37E0
25,981,881 UART: [art] SIG.R = 306D0F77E754A30B8E5254E2EA6EE356A68EF98784CDB9BD9297C47FF9712AB4E578F0BE064E9BFC93A9239784AD04CE
25,989,300 UART: [art] SIG.S = F2E63E125116EB9ED9E0AE62E774682410DB6CF1663C81D08317139603454C0DD51336838739403133F055E0476A7CEB
26,967,770 UART: Caliptra RT
26,968,480 UART: [state] CFI Enabled
27,085,114 UART: [rt] RT listening for mailbox commands...
27,087,450 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,242,871 UART: [rt]cmd =0x41544d4e, len=14344
27,244,677 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,089 writing to cptra_bootfsm_go
3,690,486 ready_for_fw is high
3,691,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,250,404 >>> mbox cmd response: success
19,502,082 UART:
19,502,490 UART: Running Caliptra FMC ...
19,503,695 UART:
19,503,860 UART: [state] CFI Enabled
19,511,472 UART: [fht] FMC Alias Private Key: 7
21,268,015 UART: [art] Extend RT PCRs Done
21,269,248 UART: [art] Lock RT PCRs Done
21,270,718 UART: [art] Populate DV Done
21,276,167 UART: [fht] FMC Alias Private Key: 7
21,277,875 UART: [art] Derive CDI
21,278,616 UART: [art] Store in in slot 0x4
21,321,345 UART: [art] Derive Key Pair
21,322,394 UART: [art] Store priv key in slot 0x5
23,748,920 UART: [art] Derive Key Pair - Done
23,762,089 UART: [art] Signing Cert with AUTHO
23,763,587 UART: RITY.KEYID = 7
25,468,533 UART: [art] Erasing AUTHORITY.KEYID = 7
25,470,039 UART: [art] PUB.X = 474FA421FB3684842594224E2F847E77C5851D004F3278F9D4AEBD1E2C14086D776F003FECD90B5B89A70E1E6A2C9ECA
25,477,264 UART: [art] PUB.Y = 6C31517B965CC9D08F36B91FA041708E8F480D4CCF349F69A24F3E2EDB8F44F24CCA13EBD92ABC4D96F3F3BFE32E55CE
25,484,560 UART: [art] SIG.R = 71DBB49940AC6D7F31243B4BAB1BA1946C2C11C856AF711332ED1E9819D0505C2AA5F1B59CABD6ED9773BC748D34C612
25,491,941 UART: [art] SIG.S = F2CDC92338DAF56DA54B63D4A467B72D36980FB793DA9750718147C3F4F4B78285D1D95A355531174B19EB2F765576D1
26,471,066 UART: Caliptra RT
26,471,774 UART: [state] CFI Enabled
26,588,735 UART: [rt] RT listening for mailbox commands...
26,591,023 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,746,265 UART: [rt]cmd =0x41544d4e, len=14344
26,748,287 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,436 UART:
192,797 UART: Running Caliptra ROM ...
193,943 UART:
194,090 UART: [state] CFI Enabled
261,661 UART: [state] LifecycleState = Unprovisioned
264,085 UART: [state] DebugLocked = No
266,903 UART: [state] WD Timer not started. Device not locked for debugging
270,869 UART: [kat] SHA2-256
460,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,502 UART: [kat] ++
471,950 UART: [kat] sha1
483,252 UART: [kat] SHA2-256
486,256 UART: [kat] SHA2-384
492,685 UART: [kat] SHA2-512-ACC
495,271 UART: [kat] ECC-384
2,949,131 UART: [kat] HMAC-384Kdf
2,971,529 UART: [kat] LMS
3,503,359 UART: [kat] --
3,507,795 UART: [cold-reset] ++
3,509,155 UART: [fht] FHT @ 0x50003400
3,520,563 UART: [idev] ++
3,521,273 UART: [idev] CDI.KEYID = 6
3,522,225 UART: [idev] SUBJECT.KEYID = 7
3,523,466 UART: [idev] UDS.KEYID = 0
3,524,368 ready_for_fw is high
3,524,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,190 UART: [idev] Erasing UDS.KEYID = 0
6,025,522 UART: [idev] Sha1 KeyId Algorithm
6,047,261 UART: [idev] --
6,051,323 UART: [ldev] ++
6,052,011 UART: [ldev] CDI.KEYID = 6
6,052,932 UART: [ldev] SUBJECT.KEYID = 5
6,054,099 UART: [ldev] AUTHORITY.KEYID = 7
6,055,276 UART: [ldev] FE.KEYID = 1
6,099,357 UART: [ldev] Erasing FE.KEYID = 1
8,605,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,269 UART: [ldev] --
10,412,879 UART: [fwproc] Wait for Commands...
10,414,327 UART: [fwproc] Recv command 0x46574c44
10,416,630 UART: [fwproc] Recv'd Img size: 114084 bytes
15,045,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,128,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,244,705 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,785,196 >>> mbox cmd response: success
15,788,633 UART: [afmc] ++
15,789,347 UART: [afmc] CDI.KEYID = 6
15,790,460 UART: [afmc] SUBJECT.KEYID = 7
15,792,007 UART: [afmc] AUTHORITY.KEYID = 5
18,338,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,064,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,066,213 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,081,322 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,096,483 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,111,356 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,134,321 UART: [afmc] --
20,137,299 UART: [cold-reset] --
20,141,062 UART: [state] Locking Datavault
20,147,490 UART: [state] Locking PCR0, PCR1 and PCR31
20,149,661 UART: [state] Locking ICCM
20,151,408 UART: [exit] Launching FMC @ 0x40000130
20,160,037 UART:
20,160,271 UART: Running Caliptra FMC ...
20,161,321 UART:
20,161,468 UART: [state] CFI Enabled
20,220,348 UART: [fht] FMC Alias Private Key: 7
21,984,647 UART: [art] Extend RT PCRs Done
21,985,867 UART: [art] Lock RT PCRs Done
21,987,543 UART: [art] Populate DV Done
21,992,949 UART: [fht] FMC Alias Private Key: 7
21,994,485 UART: [art] Derive CDI
21,995,295 UART: [art] Store in in slot 0x4
22,052,616 UART: [art] Derive Key Pair
22,053,660 UART: [art] Store priv key in slot 0x5
24,516,660 UART: [art] Derive Key Pair - Done
24,529,879 UART: [art] Signing Cert with AUTHO
24,531,371 UART: RITY.KEYID = 7
26,242,272 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,782 UART: [art] PUB.X = 7E3510691D02D5331BEF193A41AC57A0FBB7CE0E823FDC3E2DAC1624BECB5A5D2BDE20D05B4B8E8BBBBBB7577404C00E
26,251,060 UART: [art] PUB.Y = 353AF4208C0113713064DB7BFE155F983D8DD4BF7B5A9C41C313FDB4705A9FB1CAE97C5F920FE6980AAC871A8F5566C4
26,258,312 UART: [art] SIG.R = A8B3F00E82719C050564A89C48D2CDBEFCD74433F14089E7DC96C3EB0088234C13109FBAB7CBB8ED2B8D3C0E1BF436A4
26,265,731 UART: [art] SIG.S = 36309A1C91EEE2CFD0037CF3D6B6D4FFC1E2DBBEC0375F32EADAB6FA36CD68AA773254EF5B8AA8172C198B81BC78FCD1
27,244,503 UART: Caliptra RT
27,245,231 UART: [state] CFI Enabled
27,409,276 UART: [rt] RT listening for mailbox commands...
27,411,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,169 UART: [rt]cmd =0x41544d4e, len=14344
27,569,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,439,566 ready_for_fw is high
3,439,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,799,777 >>> mbox cmd response: success
20,116,696 UART:
20,117,105 UART: Running Caliptra FMC ...
20,118,208 UART:
20,118,365 UART: [state] CFI Enabled
20,181,545 UART: [fht] FMC Alias Private Key: 7
21,945,482 UART: [art] Extend RT PCRs Done
21,946,709 UART: [art] Lock RT PCRs Done
21,948,609 UART: [art] Populate DV Done
21,954,341 UART: [fht] FMC Alias Private Key: 7
21,955,988 UART: [art] Derive CDI
21,956,799 UART: [art] Store in in slot 0x4
22,014,317 UART: [art] Derive Key Pair
22,015,319 UART: [art] Store priv key in slot 0x5
24,478,064 UART: [art] Derive Key Pair - Done
24,490,691 UART: [art] Signing Cert with AUTHO
24,491,999 UART: RITY.KEYID = 7
26,204,792 UART: [art] Erasing AUTHORITY.KEYID = 7
26,206,301 UART: [art] PUB.X = E7B76A0B7EE81171C2E722D4C24701FD3E2499323870178BC5EBFD6FEA60C6DFCA94F63082F74FA0C3AD46E639378C11
26,213,569 UART: [art] PUB.Y = 9458B67825516EA977EB7D68CEB123AC2025A567D15D19E66C921069E2D5814E560BA48B2E548732782D20346764056F
26,220,773 UART: [art] SIG.R = E9A22A0432698515CA026F9FD7A6A7B8D0F5C9657298390533F19E28BB98D2736FA5B8A5FE0E2625CD24E32724B4CFE5
26,228,188 UART: [art] SIG.S = 06820B1ADD2AADAC22E1357A71A672787C9D16A93E56B55F1D7DF4F0781E704651761A871B3D8A355E0B53EE1DF9A892
27,207,427 UART: Caliptra RT
27,208,143 UART: [state] CFI Enabled
27,372,943 UART: [rt] RT listening for mailbox commands...
27,375,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,530,733 UART: [rt]cmd =0x41544d4e, len=14344
27,532,378 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
192,907 UART:
193,266 UART: Running Caliptra ROM ...
194,463 UART:
604,134 UART: [state] CFI Enabled
615,481 UART: [state] LifecycleState = Unprovisioned
617,882 UART: [state] DebugLocked = No
620,259 UART: [state] WD Timer not started. Device not locked for debugging
624,506 UART: [kat] SHA2-256
814,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,181 UART: [kat] ++
825,708 UART: [kat] sha1
837,099 UART: [kat] SHA2-256
840,118 UART: [kat] SHA2-384
845,972 UART: [kat] SHA2-512-ACC
848,555 UART: [kat] ECC-384
3,288,814 UART: [kat] HMAC-384Kdf
3,302,474 UART: [kat] LMS
3,834,317 UART: [kat] --
3,841,802 UART: [cold-reset] ++
3,844,378 UART: [fht] FHT @ 0x50003400
3,856,355 UART: [idev] ++
3,857,070 UART: [idev] CDI.KEYID = 6
3,858,106 UART: [idev] SUBJECT.KEYID = 7
3,859,207 UART: [idev] UDS.KEYID = 0
3,860,138 ready_for_fw is high
3,860,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,980 UART: [idev] Erasing UDS.KEYID = 0
6,332,993 UART: [idev] Sha1 KeyId Algorithm
6,355,787 UART: [idev] --
6,359,893 UART: [ldev] ++
6,360,577 UART: [ldev] CDI.KEYID = 6
6,361,490 UART: [ldev] SUBJECT.KEYID = 5
6,362,701 UART: [ldev] AUTHORITY.KEYID = 7
6,363,885 UART: [ldev] FE.KEYID = 1
6,375,684 UART: [ldev] Erasing FE.KEYID = 1
8,854,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,359 UART: [ldev] --
10,644,683 UART: [fwproc] Wait for Commands...
10,646,618 UART: [fwproc] Recv command 0x46574c44
10,648,946 UART: [fwproc] Recv'd Img size: 114084 bytes
15,276,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,361,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,477,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,019,440 >>> mbox cmd response: success
16,024,182 UART: [afmc] ++
16,024,902 UART: [afmc] CDI.KEYID = 6
16,026,159 UART: [afmc] SUBJECT.KEYID = 7
16,027,609 UART: [afmc] AUTHORITY.KEYID = 5
18,527,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,246,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,248,594 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,263,645 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,278,875 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,293,727 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,318,358 UART: [afmc] --
20,322,470 UART: [cold-reset] --
20,326,937 UART: [state] Locking Datavault
20,331,226 UART: [state] Locking PCR0, PCR1 and PCR31
20,333,378 UART: [state] Locking ICCM
20,335,016 UART: [exit] Launching FMC @ 0x40000130
20,343,703 UART:
20,343,941 UART: Running Caliptra FMC ...
20,345,044 UART:
20,345,205 UART: [state] CFI Enabled
20,353,314 UART: [fht] FMC Alias Private Key: 7
22,110,079 UART: [art] Extend RT PCRs Done
22,111,306 UART: [art] Lock RT PCRs Done
22,112,743 UART: [art] Populate DV Done
22,118,104 UART: [fht] FMC Alias Private Key: 7
22,119,763 UART: [art] Derive CDI
22,120,502 UART: [art] Store in in slot 0x4
22,162,903 UART: [art] Derive Key Pair
22,163,949 UART: [art] Store priv key in slot 0x5
24,590,670 UART: [art] Derive Key Pair - Done
24,603,556 UART: [art] Signing Cert with AUTHO
24,604,861 UART: RITY.KEYID = 7
26,310,339 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,844 UART: [art] PUB.X = 5C7FC18525DBBDD042BF7081DF46DFCA4A36FE598057A444C969B2C7CB4C90D0109BDD0F02B4EEF73BC93F163DC86872
26,319,116 UART: [art] PUB.Y = 7F3CCB3B09CEA19371AA9704F16B1A03C5B0791476F2C0035948E42F6DD3A78365F95CE5546075A9551CC51627D28563
26,326,370 UART: [art] SIG.R = 8B1B520462BFCE00AFC91953AE76057CBABB78549F59CA39C85F6F4C052A879CFA4C7F056001B5B6FAD8285916D4DFC0
26,333,742 UART: [art] SIG.S = AC605FBA548BBB3132D1B7AC5C43CB850508E10EC95BDD88246CA0B0A43FB75B74F7B8F9996963858A2F1A00ECE151DE
27,312,726 UART: Caliptra RT
27,313,429 UART: [state] CFI Enabled
27,430,803 UART: [rt] RT listening for mailbox commands...
27,433,119 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,588,310 UART: [rt]cmd =0x41544d4e, len=14344
27,590,169 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
3,754,115 ready_for_fw is high
3,754,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,069,594 >>> mbox cmd response: success
20,328,023 UART:
20,328,400 UART: Running Caliptra FMC ...
20,329,505 UART:
20,329,659 UART: [state] CFI Enabled
20,337,332 UART: [fht] FMC Alias Private Key: 7
22,093,677 UART: [art] Extend RT PCRs Done
22,094,913 UART: [art] Lock RT PCRs Done
22,096,362 UART: [art] Populate DV Done
22,101,725 UART: [fht] FMC Alias Private Key: 7
22,103,277 UART: [art] Derive CDI
22,104,099 UART: [art] Store in in slot 0x4
22,146,487 UART: [art] Derive Key Pair
22,147,514 UART: [art] Store priv key in slot 0x5
24,574,124 UART: [art] Derive Key Pair - Done
24,587,065 UART: [art] Signing Cert with AUTHO
24,588,372 UART: RITY.KEYID = 7
26,293,338 UART: [art] Erasing AUTHORITY.KEYID = 7
26,294,849 UART: [art] PUB.X = 2080686FDE12487F51758560C54C7885458F9C747F1D7A2ED51A574166A0A9F7B500BB52FFB898A3DADF53DE9332F149
26,302,099 UART: [art] PUB.Y = 6F7480D8DBA6AA2C304466B02C6743E71FE26B7B343E3AF544E855CE47DEB07CCA533655B94F205025667ADA4CD255CD
26,309,307 UART: [art] SIG.R = 7EF73863C7E12A55690FD13F880BE7686581064C95118E9A4BDA1D6355268281971A9CBACDED3DD47E8A059BAA40B892
26,316,740 UART: [art] SIG.S = F0D83B9749E531D295B1598B5D1FD071906C02990D2060955F3685526AFA0C81DD31DB0827356ECCAE0A0A55701D0172
27,295,883 UART: Caliptra RT
27,296,575 UART: [state] CFI Enabled
27,413,848 UART: [rt] RT listening for mailbox commands...
27,416,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,508 UART: [rt]cmd =0x41544d4e, len=14344
27,573,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,462 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,379 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,702 UART: [idev] ++
1,479,870 UART: [idev] CDI.KEYID = 6
1,480,230 UART: [idev] SUBJECT.KEYID = 7
1,480,654 UART: [idev] UDS.KEYID = 0
1,480,999 ready_for_fw is high
1,480,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,499 UART: [ldev] ++
1,514,667 UART: [ldev] CDI.KEYID = 6
1,515,030 UART: [ldev] SUBJECT.KEYID = 5
1,515,456 UART: [ldev] AUTHORITY.KEYID = 7
1,515,919 UART: [ldev] FE.KEYID = 1
1,521,193 UART: [ldev] Erasing FE.KEYID = 1
1,546,382 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,510 UART: [ldev] --
1,585,869 UART: [fwproc] Waiting for Commands...
1,586,520 UART: [fwproc] Received command 0x46574c44
1,587,311 UART: [fwproc] Received Image of size 114084 bytes
5,154,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,183,633 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,212,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,348,456 >>> mbox cmd response: success
5,349,468 UART: [afmc] ++
5,349,636 UART: [afmc] CDI.KEYID = 6
5,349,998 UART: [afmc] SUBJECT.KEYID = 7
5,350,423 UART: [afmc] AUTHORITY.KEYID = 5
5,386,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,241 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,408,950 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,414,842 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,543 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,361 UART: [afmc] --
5,429,295 UART: [cold-reset] --
5,430,079 UART: [state] Locking Datavault
5,431,262 UART: [state] Locking PCR0, PCR1 and PCR31
5,431,866 UART: [state] Locking ICCM
5,432,538 UART: [exit] Launching FMC @ 0x40000130
5,437,867 UART:
5,437,883 UART: Running Caliptra FMC ...
5,438,291 UART:
5,438,345 UART: [state] CFI Enabled
5,448,797 UART: [fht] FMC Alias Private Key: 7
5,556,557 UART: [art] Extend RT PCRs Done
5,556,985 UART: [art] Lock RT PCRs Done
5,558,789 UART: [art] Populate DV Done
5,566,937 UART: [fht] FMC Alias Private Key: 7
5,567,955 UART: [art] Derive CDI
5,568,235 UART: [art] Store in in slot 0x4
5,653,792 UART: [art] Derive Key Pair
5,654,152 UART: [art] Store priv key in slot 0x5
5,667,474 UART: [art] Derive Key Pair - Done
5,682,233 UART: [art] Signing Cert with AUTHO
5,682,713 UART: RITY.KEYID = 7
5,697,683 UART: [art] Erasing AUTHORITY.KEYID = 7
5,698,448 UART: [art] PUB.X = 60CC3E90CEB3A97E1055F1735E1B678A3F5DF82F5B0E94208F4140FFCCBF322427AF78FC58C6B4B746909F1DC71B8859
5,705,225 UART: [art] PUB.Y = 6B21D270A15DB152C51681A7C237E2EDCF282C142ED640C7FCB7A03CDC4826290F903ED1FA51F07735B0BC2EB827C0EC
5,712,186 UART: [art] SIG.R = FBA01F8A1E588D2F84075F33634473CDDA8C4DB368FCB41B4D0576A865E97F36F7D8085143A331B67183E601713AC561
5,718,944 UART: [art] SIG.S = EA9217AC9BDAF538501A136CF8D7CD2F9A1CEC973E6D1354DCBA9C4C70D285089F378FDE432F3E319E56C9AE60AF5327
5,742,290 UART: Caliptra RT
5,742,543 UART: [state] CFI Enabled
5,849,375 UART: [rt] RT listening for mailbox commands...
5,850,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,189 UART: [rt]cmd =0x41544d4e, len=14344
5,974,820 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,272,980 >>> mbox cmd response: success
5,334,987 UART:
5,335,003 UART: Running Caliptra FMC ...
5,335,411 UART:
5,335,465 UART: [state] CFI Enabled
5,346,039 UART: [fht] FMC Alias Private Key: 7
5,453,361 UART: [art] Extend RT PCRs Done
5,453,789 UART: [art] Lock RT PCRs Done
5,455,275 UART: [art] Populate DV Done
5,463,365 UART: [fht] FMC Alias Private Key: 7
5,464,293 UART: [art] Derive CDI
5,464,573 UART: [art] Store in in slot 0x4
5,550,058 UART: [art] Derive Key Pair
5,550,418 UART: [art] Store priv key in slot 0x5
5,563,502 UART: [art] Derive Key Pair - Done
5,578,245 UART: [art] Signing Cert with AUTHO
5,578,725 UART: RITY.KEYID = 7
5,593,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,594,752 UART: [art] PUB.X = A95B43830968B8B321E785F7661FFEE03B292B85027B0561EA3A040F675C61E97262218737A63AFE3275DDDFDA56F763
5,601,505 UART: [art] PUB.Y = A84C730C09B64C1F6B5BDBBAA5715909287E64C49FA44D1239AF71D241438829F595BF3589641F74DAAF691E0DA088CE
5,608,449 UART: [art] SIG.R = 3ADF0DA5C74B684C0637FB5A2A26305E2A27BC355169B2E24625C8B9268BA7D08C415F8E3EEE479180008B0EC0EF4465
5,615,194 UART: [art] SIG.S = A12FFD5BF9158FD5572782130641450E970B9EC2E331E7B787AF6B0686545D1809B1F67416814C560A7E1040D68E4182
5,638,559 UART: Caliptra RT
5,638,812 UART: [state] CFI Enabled
5,746,579 UART: [rt] RT listening for mailbox commands...
5,747,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,870,401 UART: [rt]cmd =0x41544d4e, len=14344
5,871,894 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,144 UART: [kat] SHA2-256
882,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,190 UART: [kat] ++
886,342 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
902,949 UART: [kat] HMAC-384Kdf
907,679 UART: [kat] LMS
1,475,875 UART: [kat] --
1,476,634 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,755 UART: [idev] ++
1,479,923 UART: [idev] CDI.KEYID = 6
1,480,283 UART: [idev] SUBJECT.KEYID = 7
1,480,707 UART: [idev] UDS.KEYID = 0
1,481,052 ready_for_fw is high
1,481,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,389 UART: [idev] Erasing UDS.KEYID = 0
1,505,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,387 UART: [idev] --
1,515,318 UART: [ldev] ++
1,515,486 UART: [ldev] CDI.KEYID = 6
1,515,849 UART: [ldev] SUBJECT.KEYID = 5
1,516,275 UART: [ldev] AUTHORITY.KEYID = 7
1,516,738 UART: [ldev] FE.KEYID = 1
1,522,032 UART: [ldev] Erasing FE.KEYID = 1
1,547,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,087 UART: [ldev] --
1,587,358 UART: [fwproc] Waiting for Commands...
1,588,015 UART: [fwproc] Received command 0x46574c44
1,588,806 UART: [fwproc] Received Image of size 114084 bytes
5,383,366 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,412,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,441,886 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,577,473 >>> mbox cmd response: success
5,578,653 UART: [afmc] ++
5,578,821 UART: [afmc] CDI.KEYID = 6
5,579,183 UART: [afmc] SUBJECT.KEYID = 7
5,579,608 UART: [afmc] AUTHORITY.KEYID = 5
5,615,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,631,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,632,528 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,638,237 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,644,129 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,649,830 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,657,546 UART: [afmc] --
5,658,468 UART: [cold-reset] --
5,659,266 UART: [state] Locking Datavault
5,660,613 UART: [state] Locking PCR0, PCR1 and PCR31
5,661,217 UART: [state] Locking ICCM
5,661,661 UART: [exit] Launching FMC @ 0x40000130
5,666,990 UART:
5,667,006 UART: Running Caliptra FMC ...
5,667,414 UART:
5,667,557 UART: [state] CFI Enabled
5,678,223 UART: [fht] FMC Alias Private Key: 7
5,785,633 UART: [art] Extend RT PCRs Done
5,786,061 UART: [art] Lock RT PCRs Done
5,787,381 UART: [art] Populate DV Done
5,795,601 UART: [fht] FMC Alias Private Key: 7
5,796,571 UART: [art] Derive CDI
5,796,851 UART: [art] Store in in slot 0x4
5,882,538 UART: [art] Derive Key Pair
5,882,898 UART: [art] Store priv key in slot 0x5
5,896,800 UART: [art] Derive Key Pair - Done
5,911,800 UART: [art] Signing Cert with AUTHO
5,912,280 UART: RITY.KEYID = 7
5,927,150 UART: [art] Erasing AUTHORITY.KEYID = 7
5,927,915 UART: [art] PUB.X = 8770A311EB8BB35B4E88FF781724A97CECF80756E1F06E7680A97923985DEA907CAFA46E91E1627C378350F9E167168F
5,934,682 UART: [art] PUB.Y = E6A037ECBB2D11E63BDC8A34C4C134123728B67895D04BE4570CD49C7B33C4BE34CC6F114D1CB112CC0DA5AB273DD6E2
5,941,644 UART: [art] SIG.R = 17B71F1393A350B10EF82BA01A78D4E241E573B15BE16A2CF2EB4B63966B3A3C6A06EBB9E8A18CDE77D5F3052BD88F9C
5,948,421 UART: [art] SIG.S = B3ED75B7A55FCDF201D25CA0ACD02D9A064775119E6C6D700E1010D25A11888AE1A04C6252CD4B6D15482F7B7BB5CC02
5,971,824 UART: Caliptra RT
5,972,169 UART: [state] CFI Enabled
6,080,190 UART: [rt] RT listening for mailbox commands...
6,080,860 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,006 UART: [rt]cmd =0x41544d4e, len=14344
6,205,315 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,532 ready_for_fw is high
1,362,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,236,516 >>> mbox cmd response: success
5,298,343 UART:
5,298,359 UART: Running Caliptra FMC ...
5,298,767 UART:
5,298,910 UART: [state] CFI Enabled
5,309,564 UART: [fht] FMC Alias Private Key: 7
5,417,282 UART: [art] Extend RT PCRs Done
5,417,710 UART: [art] Lock RT PCRs Done
5,419,218 UART: [art] Populate DV Done
5,427,634 UART: [fht] FMC Alias Private Key: 7
5,428,692 UART: [art] Derive CDI
5,428,972 UART: [art] Store in in slot 0x4
5,514,609 UART: [art] Derive Key Pair
5,514,969 UART: [art] Store priv key in slot 0x5
5,528,467 UART: [art] Derive Key Pair - Done
5,543,050 UART: [art] Signing Cert with AUTHO
5,543,530 UART: RITY.KEYID = 7
5,558,812 UART: [art] Erasing AUTHORITY.KEYID = 7
5,559,577 UART: [art] PUB.X = BC5BC50F8998C4DC968720E48581A95977ADB2FA4CBF44B771C57A4CBB5E2268B27496EDD6012D46E38EB673E5BCDA3C
5,566,357 UART: [art] PUB.Y = 4D7EACCE3DF255C72AF6028C5CF2BA49F383523F21348781CA5F25CD85AFEF91BDDD94D5C3A08DF5E935BD06A39E502C
5,573,323 UART: [art] SIG.R = 8B54FE59408CE8A39C31954AD760CCB690C6A4CDF78437795B5B75CCFC2651F975739E7BE9EEAEFEBEA07C342CF44186
5,580,109 UART: [art] SIG.S = 31EF01ACE936A243BB8DF6EDD5A91225E118BFADCAC5E635DB874EE09C6BD2E053FD7F5ED67D50D09F6003B7888C9C1E
5,604,280 UART: Caliptra RT
5,604,625 UART: [state] CFI Enabled
5,713,576 UART: [rt] RT listening for mailbox commands...
5,714,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,146 UART: [rt]cmd =0x41544d4e, len=14344
5,838,719 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
918,226 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,330 UART: [idev] ++
1,175,498 UART: [idev] CDI.KEYID = 6
1,175,858 UART: [idev] SUBJECT.KEYID = 7
1,176,282 UART: [idev] UDS.KEYID = 0
1,176,627 ready_for_fw is high
1,176,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,201,835 UART: [idev] Sha1 KeyId Algorithm
1,210,299 UART: [idev] --
1,211,289 UART: [ldev] ++
1,211,457 UART: [ldev] CDI.KEYID = 6
1,211,820 UART: [ldev] SUBJECT.KEYID = 5
1,212,246 UART: [ldev] AUTHORITY.KEYID = 7
1,212,709 UART: [ldev] FE.KEYID = 1
1,217,935 UART: [ldev] Erasing FE.KEYID = 1
1,244,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,505 UART: [ldev] --
1,283,894 UART: [fwproc] Wait for Commands...
1,284,628 UART: [fwproc] Recv command 0x46574c44
1,285,356 UART: [fwproc] Recv'd Img size: 114084 bytes
3,127,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,320,161 >>> mbox cmd response: success
3,321,241 UART: [afmc] ++
3,321,409 UART: [afmc] CDI.KEYID = 6
3,321,771 UART: [afmc] SUBJECT.KEYID = 7
3,322,196 UART: [afmc] AUTHORITY.KEYID = 5
3,358,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,737 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,446 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,338 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,049 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,782 UART: [afmc] --
3,401,722 UART: [cold-reset] --
3,402,376 UART: [state] Locking Datavault
3,403,595 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,199 UART: [state] Locking ICCM
3,404,867 UART: [exit] Launching FMC @ 0x40000130
3,410,196 UART:
3,410,212 UART: Running Caliptra FMC ...
3,410,620 UART:
3,410,674 UART: [state] CFI Enabled
3,421,144 UART: [fht] FMC Alias Private Key: 7
3,528,968 UART: [art] Extend RT PCRs Done
3,529,396 UART: [art] Lock RT PCRs Done
3,530,540 UART: [art] Populate DV Done
3,538,770 UART: [fht] FMC Alias Private Key: 7
3,539,718 UART: [art] Derive CDI
3,539,998 UART: [art] Store in in slot 0x4
3,625,377 UART: [art] Derive Key Pair
3,625,737 UART: [art] Store priv key in slot 0x5
3,639,489 UART: [art] Derive Key Pair - Done
3,654,322 UART: [art] Signing Cert with AUTHO
3,654,802 UART: RITY.KEYID = 7
3,670,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,765 UART: [art] PUB.X = A1B9C32E6AE5065B286C9C3E80D111A20D8F1FFD74A7CF2A89682FA2820E555D3A105089A469CDB94E130374D6F81EDF
3,677,533 UART: [art] PUB.Y = 61B5572A9B340701AA67D7CCB03041E2BD091363B407B2E9A6C5515C8C36641B2D3D2C889F500D397E17FFBDCA4080E5
3,684,472 UART: [art] SIG.R = D8D9A9658C1313DAD1666CE826B92C2D794FE021F11634E8200E0745FDC099340BB607651A2D07257378D1B9112FACA7
3,691,225 UART: [art] SIG.S = 438CB3498F1F2C0FCECDEE75049320A97E5C2DA38F59C159ECB99BBBDCA5EF14992B0BEF9AB9911DDE1BC9A2A06C69A6
3,715,517 UART: Caliptra RT
3,715,770 UART: [state] CFI Enabled
3,823,654 UART: [rt] RT listening for mailbox commands...
3,824,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,162 UART: [rt]cmd =0x41544d4e, len=14344
3,948,787 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 ready_for_fw is high
1,060,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,168,516 >>> mbox cmd response: success
3,229,913 UART:
3,229,929 UART: Running Caliptra FMC ...
3,230,337 UART:
3,230,391 UART: [state] CFI Enabled
3,240,983 UART: [fht] FMC Alias Private Key: 7
3,348,619 UART: [art] Extend RT PCRs Done
3,349,047 UART: [art] Lock RT PCRs Done
3,350,507 UART: [art] Populate DV Done
3,358,749 UART: [fht] FMC Alias Private Key: 7
3,359,795 UART: [art] Derive CDI
3,360,075 UART: [art] Store in in slot 0x4
3,445,860 UART: [art] Derive Key Pair
3,446,220 UART: [art] Store priv key in slot 0x5
3,459,102 UART: [art] Derive Key Pair - Done
3,474,130 UART: [art] Signing Cert with AUTHO
3,474,610 UART: RITY.KEYID = 7
3,490,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,809 UART: [art] PUB.X = AAF7C638E58241C80BFAB5781211529A8E49585D6D43701E857A21440CB008B7615EC26506B1CAE5175EE7FE06086251
3,497,557 UART: [art] PUB.Y = 0158513DD127D5F2F1DD1F6512F0D3577F86601ECAF0C44E7200D1B928EB583E62E9568B7C7A9173F80F10B1CF41281F
3,504,481 UART: [art] SIG.R = 2B5F5EF928F917FF45C554A5872B90D75E8B1DDA6F065641681ABD4C2355B9567C9E48B36CBC993A65CD32933585ECB1
3,511,254 UART: [art] SIG.S = E59567EC8DA9B079F364DCDBC0D7B6B18AA43CC1D6EB87657205680788DE1E2DA4487F80042608988CC5317DECC67E44
3,534,913 UART: Caliptra RT
3,535,166 UART: [state] CFI Enabled
3,643,234 UART: [rt] RT listening for mailbox commands...
3,643,904 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,126 UART: [rt]cmd =0x41544d4e, len=14344
3,768,707 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,775 UART: [kat] SHA2-512-ACC
908,676 UART: [kat] ECC-384
918,279 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,171,826 UART: [cold-reset] ++
1,172,170 UART: [fht] FHT @ 0x50003400
1,174,717 UART: [idev] ++
1,174,885 UART: [idev] CDI.KEYID = 6
1,175,245 UART: [idev] SUBJECT.KEYID = 7
1,175,669 UART: [idev] UDS.KEYID = 0
1,176,014 ready_for_fw is high
1,176,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,373 UART: [idev] Erasing UDS.KEYID = 0
1,200,846 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,460 UART: [ldev] ++
1,210,628 UART: [ldev] CDI.KEYID = 6
1,210,991 UART: [ldev] SUBJECT.KEYID = 5
1,211,417 UART: [ldev] AUTHORITY.KEYID = 7
1,211,880 UART: [ldev] FE.KEYID = 1
1,217,018 UART: [ldev] Erasing FE.KEYID = 1
1,243,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,744 UART: [ldev] --
1,283,021 UART: [fwproc] Wait for Commands...
1,283,727 UART: [fwproc] Recv command 0x46574c44
1,284,455 UART: [fwproc] Recv'd Img size: 114084 bytes
3,125,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,057 >>> mbox cmd response: success
3,319,147 UART: [afmc] ++
3,319,315 UART: [afmc] CDI.KEYID = 6
3,319,677 UART: [afmc] SUBJECT.KEYID = 7
3,320,102 UART: [afmc] AUTHORITY.KEYID = 5
3,355,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,077 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,786 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,678 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,389 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,244 UART: [afmc] --
3,399,316 UART: [cold-reset] --
3,400,006 UART: [state] Locking Datavault
3,401,541 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,145 UART: [state] Locking ICCM
3,402,583 UART: [exit] Launching FMC @ 0x40000130
3,407,912 UART:
3,407,928 UART: Running Caliptra FMC ...
3,408,336 UART:
3,408,479 UART: [state] CFI Enabled
3,418,941 UART: [fht] FMC Alias Private Key: 7
3,526,263 UART: [art] Extend RT PCRs Done
3,526,691 UART: [art] Lock RT PCRs Done
3,528,087 UART: [art] Populate DV Done
3,536,127 UART: [fht] FMC Alias Private Key: 7
3,537,063 UART: [art] Derive CDI
3,537,343 UART: [art] Store in in slot 0x4
3,623,222 UART: [art] Derive Key Pair
3,623,582 UART: [art] Store priv key in slot 0x5
3,636,590 UART: [art] Derive Key Pair - Done
3,651,133 UART: [art] Signing Cert with AUTHO
3,651,613 UART: RITY.KEYID = 7
3,666,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,606 UART: [art] PUB.X = 38DC37CE9261B7672E3795DD9BB319842A61E615989CBA5BDB2DA06B2739E5ACCAE295C1A91F1988D574497C396A121F
3,674,382 UART: [art] PUB.Y = 2A3A1B4B6703CBA93C499A7492F60E1A0F2059D1E269D88F289CB3B396A9F355A7CEDBF0420479383090864953560FFC
3,681,317 UART: [art] SIG.R = 90C52614B9E5C72742491F5CEB289412B7325F22AEF9AB5D3C2C9063B92DF8F2721CD1895B4E48D7E2914F4F39E8804B
3,688,089 UART: [art] SIG.S = 7D27B61389574B91BB0FC5969F4A5B2659ED547BE5D1CF21D33CDCA8DDE6B0F2277884CBF3AAF5E838223A18098C92C1
3,712,134 UART: Caliptra RT
3,712,479 UART: [state] CFI Enabled
3,819,717 UART: [rt] RT listening for mailbox commands...
3,820,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,399 UART: [rt]cmd =0x41544d4e, len=14344
3,944,858 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,200 ready_for_fw is high
1,060,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,173,719 >>> mbox cmd response: success
3,236,054 UART:
3,236,070 UART: Running Caliptra FMC ...
3,236,478 UART:
3,236,621 UART: [state] CFI Enabled
3,247,083 UART: [fht] FMC Alias Private Key: 7
3,354,933 UART: [art] Extend RT PCRs Done
3,355,361 UART: [art] Lock RT PCRs Done
3,356,617 UART: [art] Populate DV Done
3,364,819 UART: [fht] FMC Alias Private Key: 7
3,365,765 UART: [art] Derive CDI
3,366,045 UART: [art] Store in in slot 0x4
3,451,556 UART: [art] Derive Key Pair
3,451,916 UART: [art] Store priv key in slot 0x5
3,464,654 UART: [art] Derive Key Pair - Done
3,479,237 UART: [art] Signing Cert with AUTHO
3,479,717 UART: RITY.KEYID = 7
3,494,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,556 UART: [art] PUB.X = 22897C72269E1D6D62E50ABB28D221F95434008D7173FF23A27FED5B414986B50611BADC7C4052E84A39A3E35481F0F8
3,502,296 UART: [art] PUB.Y = 135584711298FEDC41DA8D6DC4F57E674C22EA1CE51234B130D8BC13A7A466A0C9E42AE7BB6753D38B1A923CA33D7478
3,509,254 UART: [art] SIG.R = 973FF0F566A55CA293BBC60EBE21054CB787F35F1E56123A63AF3F1D84AB7A4331A4B524EBB5426E6C6F956D0F81533E
3,516,025 UART: [art] SIG.S = 02F4BDF5928BEE6B163EDF650BEC21D4A8774FF41380FB68AE20E2397A212CEA1CCAE8A4DB64859D6D4F9BF9959AA302
3,539,875 UART: Caliptra RT
3,540,220 UART: [state] CFI Enabled
3,647,914 UART: [rt] RT listening for mailbox commands...
3,648,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,350 UART: [rt]cmd =0x41544d4e, len=14344
3,772,729 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,249 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
905,070 UART: [kat] SHA2-512-ACC
906,971 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 ready_for_fw is high
1,174,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,283 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,880 UART: [ldev] ++
1,209,048 UART: [ldev] CDI.KEYID = 6
1,209,412 UART: [ldev] SUBJECT.KEYID = 5
1,209,839 UART: [ldev] AUTHORITY.KEYID = 7
1,210,302 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,293 UART: [fwproc] Recv command 0x46574c44
1,282,026 UART: [fwproc] Recv'd Img size: 114084 bytes
3,116,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,309,088 >>> mbox cmd response: success
3,310,345 UART: [afmc] ++
3,310,513 UART: [afmc] CDI.KEYID = 6
3,310,876 UART: [afmc] SUBJECT.KEYID = 7
3,311,302 UART: [afmc] AUTHORITY.KEYID = 5
3,346,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,665 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,375 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,265 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,976 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,734 UART: [afmc] --
3,389,774 UART: [cold-reset] --
3,390,572 UART: [state] Locking Datavault
3,391,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,137 UART: [state] Locking ICCM
3,392,675 UART: [exit] Launching FMC @ 0x40000130
3,398,004 UART:
3,398,020 UART: Running Caliptra FMC ...
3,398,428 UART:
3,398,482 UART: [state] CFI Enabled
3,409,316 UART: [fht] FMC Alias Private Key: 7
3,517,048 UART: [art] Extend RT PCRs Done
3,517,476 UART: [art] Lock RT PCRs Done
3,519,544 UART: [art] Populate DV Done
3,527,596 UART: [fht] FMC Alias Private Key: 7
3,528,688 UART: [art] Derive CDI
3,528,968 UART: [art] Store in in slot 0x4
3,614,707 UART: [art] Derive Key Pair
3,615,067 UART: [art] Store priv key in slot 0x5
3,628,703 UART: [art] Derive Key Pair - Done
3,643,669 UART: [art] Signing Cert with AUTHO
3,644,149 UART: RITY.KEYID = 7
3,659,601 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,366 UART: [art] PUB.X = B41B4D2D9EF88362B79D5C72B0D91D68CE754847A31005007033B6FED5458209B6983831ACB29BAFBE68405EBCA9FC0D
3,667,113 UART: [art] PUB.Y = 59D4220402E4E043ED7ABB4EE3679D9DCFB9A3AEB32F1B0DF489C975602E612BFC0CCA8DDB5B5267320EA81D016608BC
3,674,060 UART: [art] SIG.R = 6DA15E6F5AF0E0654DF54E74A3D418D8209493E0E88E96540E065F1550F098E38BEC5706A6B26BF3BEFCCDDF70C327D4
3,680,833 UART: [art] SIG.S = F134A5FEF40501C1FC085B5768F110EEFCD59E2AD29445C3BCADC6A7DEF2B2168B7A457D019F3E5EEB3A07C90AE48C28
3,704,334 UART: Caliptra RT
3,704,587 UART: [state] CFI Enabled
3,812,551 UART: [rt] RT listening for mailbox commands...
3,813,221 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,197 UART: [rt]cmd =0x41544d4e, len=14344
3,937,732 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,084 ready_for_fw is high
1,056,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,039 >>> mbox cmd response: success
3,232,346 UART:
3,232,362 UART: Running Caliptra FMC ...
3,232,770 UART:
3,232,824 UART: [state] CFI Enabled
3,243,234 UART: [fht] FMC Alias Private Key: 7
3,351,684 UART: [art] Extend RT PCRs Done
3,352,112 UART: [art] Lock RT PCRs Done
3,353,890 UART: [art] Populate DV Done
3,362,208 UART: [fht] FMC Alias Private Key: 7
3,363,344 UART: [art] Derive CDI
3,363,624 UART: [art] Store in in slot 0x4
3,449,571 UART: [art] Derive Key Pair
3,449,931 UART: [art] Store priv key in slot 0x5
3,463,177 UART: [art] Derive Key Pair - Done
3,478,310 UART: [art] Signing Cert with AUTHO
3,478,790 UART: RITY.KEYID = 7
3,493,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,749 UART: [art] PUB.X = 2F209E374CFC91DE90992F6247D6C738691470A0A32DECB667BB93542B0186365BC8842E4DC9DE1407E4DFAF90E0E3F7
3,501,519 UART: [art] PUB.Y = B7EA2A454922A6EBB2313A532392668382310813C1A58D54B44CDA77F0FD6E77FD1C58A4A60AFDF25A442E29EF4688DD
3,508,471 UART: [art] SIG.R = C89AB5716E37965AD23738A92C265B3B6AA226BF91DA08A7E2FF15507487285910725742FD5EFED00CF7C17191D5D105
3,515,232 UART: [art] SIG.S = 95598F86886A11653ED3DF6BA454A2833BE611D8F32489E210049DE93D789A510F1E018B51B9B636DCEDFCD0506A25DE
3,539,256 UART: Caliptra RT
3,539,509 UART: [state] CFI Enabled
3,647,702 UART: [rt] RT listening for mailbox commands...
3,648,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,396 UART: [rt]cmd =0x41544d4e, len=14344
3,773,061 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,822 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 ready_for_fw is high
1,174,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,208,842 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,016 UART: [ldev] AUTHORITY.KEYID = 7
1,211,479 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,471 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,283,001 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,313,111 >>> mbox cmd response: success
3,314,136 UART: [afmc] ++
3,314,304 UART: [afmc] CDI.KEYID = 6
3,314,667 UART: [afmc] SUBJECT.KEYID = 7
3,315,093 UART: [afmc] AUTHORITY.KEYID = 5
3,350,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,830 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,540 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,430 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,141 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,975 UART: [afmc] --
3,394,059 UART: [cold-reset] --
3,394,867 UART: [state] Locking Datavault
3,395,836 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,440 UART: [state] Locking ICCM
3,396,886 UART: [exit] Launching FMC @ 0x40000130
3,402,215 UART:
3,402,231 UART: Running Caliptra FMC ...
3,402,639 UART:
3,402,782 UART: [state] CFI Enabled
3,413,764 UART: [fht] FMC Alias Private Key: 7
3,521,698 UART: [art] Extend RT PCRs Done
3,522,126 UART: [art] Lock RT PCRs Done
3,523,978 UART: [art] Populate DV Done
3,532,342 UART: [fht] FMC Alias Private Key: 7
3,533,330 UART: [art] Derive CDI
3,533,610 UART: [art] Store in in slot 0x4
3,619,631 UART: [art] Derive Key Pair
3,619,991 UART: [art] Store priv key in slot 0x5
3,633,413 UART: [art] Derive Key Pair - Done
3,648,210 UART: [art] Signing Cert with AUTHO
3,648,690 UART: RITY.KEYID = 7
3,663,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,679 UART: [art] PUB.X = 8C90D08D4DEC1FC0ABC07AA8058838821B96D0648732636C08F04E384C0960CE88CD45538BEA4C6F37FE7B8A859633BF
3,671,446 UART: [art] PUB.Y = 702366EF1034FD7825BE75873FA30EB18390891623C6E51000412F9E586CC25BCCDEF218FAD6ADBAD918204388790477
3,678,366 UART: [art] SIG.R = 8BFE87135D8B6CBC3A9213B0EEC3960594FA3C27FBC10F4206A5C09AB9023BB296461CDA74F89CBB7AA65FC84F3892AF
3,685,142 UART: [art] SIG.S = F6E824A148BC30EBCDB506435B8164E330D2615F513A4B53D874DF8BBC71FE6CCF22135D442B0BF0EEE5F7EC965D39AD
3,708,811 UART: Caliptra RT
3,709,156 UART: [state] CFI Enabled
3,816,033 UART: [rt] RT listening for mailbox commands...
3,816,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,715 UART: [rt]cmd =0x41544d4e, len=14344
3,941,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,991 ready_for_fw is high
1,056,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,959 >>> mbox cmd response: success
3,223,942 UART:
3,223,958 UART: Running Caliptra FMC ...
3,224,366 UART:
3,224,509 UART: [state] CFI Enabled
3,235,447 UART: [fht] FMC Alias Private Key: 7
3,343,191 UART: [art] Extend RT PCRs Done
3,343,619 UART: [art] Lock RT PCRs Done
3,344,937 UART: [art] Populate DV Done
3,353,145 UART: [fht] FMC Alias Private Key: 7
3,354,095 UART: [art] Derive CDI
3,354,375 UART: [art] Store in in slot 0x4
3,439,860 UART: [art] Derive Key Pair
3,440,220 UART: [art] Store priv key in slot 0x5
3,453,978 UART: [art] Derive Key Pair - Done
3,468,348 UART: [art] Signing Cert with AUTHO
3,468,828 UART: RITY.KEYID = 7
3,484,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,921 UART: [art] PUB.X = 1F557DF4E60956F2E694A107B0CFF33EEF0A8180BFBA42ED0DB8EE45971521E91EDA9E2275D0801396293992FA66A855
3,491,685 UART: [art] PUB.Y = 04D1F55DAF18B9CFF0493605981AFFAD8E776A3A69711F81BF29C688B746DC1CAFD64573888F955852B9B2F910763EE9
3,498,635 UART: [art] SIG.R = 0D5A5022940C7AF48133527FE491B116F99C171DA65CC1A4F2A981112E8B6F37EAAFB253274959B909337F71F43FCB6B
3,505,398 UART: [art] SIG.S = 004994E5845CCFB7CCE4B47A098B28EAB3328548BE6B1818589CFA413011BE4E973DB82E6FE3DBBF26854B1E3A519C52
3,529,170 UART: Caliptra RT
3,529,515 UART: [state] CFI Enabled
3,637,430 UART: [rt] RT listening for mailbox commands...
3,638,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,184 UART: [rt]cmd =0x41544d4e, len=14344
3,762,925 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
192,312 UART:
192,665 UART: Running Caliptra ROM ...
193,839 UART:
194,001 UART: [state] CFI Enabled
262,816 UART: [state] LifecycleState = Unprovisioned
264,734 UART: [state] DebugLocked = No
266,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,195 UART: [kat] SHA2-256
440,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,460 UART: [kat] ++
451,939 UART: [kat] sha1
464,053 UART: [kat] SHA2-256
466,755 UART: [kat] SHA2-384
472,461 UART: [kat] SHA2-512-ACC
474,831 UART: [kat] ECC-384
2,767,481 UART: [kat] HMAC-384Kdf
2,798,119 UART: [kat] LMS
3,988,434 UART: [kat] --
3,992,955 UART: [cold-reset] ++
3,994,254 UART: [fht] Storing FHT @ 0x50003400
4,004,882 UART: [idev] ++
4,005,451 UART: [idev] CDI.KEYID = 6
4,006,338 UART: [idev] SUBJECT.KEYID = 7
4,007,659 UART: [idev] UDS.KEYID = 0
4,008,651 ready_for_fw is high
4,008,860 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,151,937 UART: [idev] Erasing UDS.KEYID = 0
7,346,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,501 UART: [idev] --
7,373,871 UART: [ldev] ++
7,374,439 UART: [ldev] CDI.KEYID = 6
7,375,406 UART: [ldev] SUBJECT.KEYID = 5
7,376,615 UART: [ldev] AUTHORITY.KEYID = 7
7,377,902 UART: [ldev] FE.KEYID = 1
7,422,254 UART: [ldev] Erasing FE.KEYID = 1
10,758,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,659 UART: [ldev] --
13,138,218 UART: [fwproc] Waiting for Commands...
13,140,634 UART: [fwproc] Received command 0x46574c44
13,142,869 UART: [fwproc] Received Image of size 113760 bytes
21,777,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,863,647 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,932,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,248,330 >>> mbox cmd response: success
22,252,087 UART: [afmc] ++
22,252,685 UART: [afmc] CDI.KEYID = 6
22,253,602 UART: [afmc] SUBJECT.KEYID = 7
22,254,870 UART: [afmc] AUTHORITY.KEYID = 5
25,612,725 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,912,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,914,369 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,928,889 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,943,669 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,957,924 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,979,062 UART: [afmc] --
27,982,185 UART: [cold-reset] --
27,987,322 UART: [state] Locking Datavault
27,992,415 UART: [state] Locking PCR0, PCR1 and PCR31
27,994,171 UART: [state] Locking ICCM
27,995,760 UART: [exit] Launching FMC @ 0x40000130
28,004,156 UART:
28,004,409 UART: Running Caliptra FMC ...
28,005,518 UART:
28,005,680 UART: [state] CFI Enabled
28,072,490 UART: [fht] FMC Alias Private Key: 7
30,410,021 UART: [art] Extend RT PCRs Done
30,411,250 UART: [art] Lock RT PCRs Done
30,413,017 UART: [art] Populate DV Done
30,418,482 UART: [fht] FMC Alias Private Key: 7
30,420,146 UART: [art] Derive CDI
30,420,960 UART: [art] Store in in slot 0x4
30,480,485 UART: [art] Derive Key Pair
30,481,523 UART: [art] Store priv key in slot 0x5
33,774,130 UART: [art] Derive Key Pair - Done
33,787,077 UART: [art] Signing Cert with AUTHO
33,788,387 UART: RITY.KEYID = 7
36,074,950 UART: [art] Erasing AUTHORITY.KEYID = 7
36,076,459 UART: [art] PUB.X = E842FB9FCF6B132EC294EA2790A3A130DB1543CE6CE5A26FDCCC5A3F6A56F7F06B461D99B93B3267AF149F9D9E3380D9
36,083,707 UART: [art] PUB.Y = 5DF0C48CFA47E093D5E45BB4559E50B87516D22E66F016623224A04BB5E1787DEEEA8BE1B0848335C56BF899A140B92F
36,090,940 UART: [art] SIG.R = DF1C987A86C985870F7A0E7DC8465F70D02A91AD7F27362393ED888DE11B92E35EB1EFAFB2BA1C63455E33025CFC48A5
36,098,344 UART: [art] SIG.S = EA3FC8F5B30026E2EB675BB335D6585D337A340189D837EA5CCE6DAB599D1435077072174029ED4B9A0D152FF3A12181
37,403,510 UART: Caliptra RT
37,404,220 UART: [state] CFI Enabled
37,566,092 UART: [rt] RT listening for mailbox commands...
37,568,431 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,724,031 UART: [rt]cmd =0x41544d4e, len=14344
37,729,360 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,781,589 ready_for_fw is high
3,781,978 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,751,335 >>> mbox cmd response: success
27,446,429 UART:
27,446,849 UART: Running Caliptra FMC ...
27,448,163 UART:
27,448,336 UART: [state] CFI Enabled
27,517,518 UART: [fht] FMC Alias Private Key: 7
29,854,950 UART: [art] Extend RT PCRs Done
29,856,178 UART: [art] Lock RT PCRs Done
29,857,852 UART: [art] Populate DV Done
29,863,329 UART: [fht] FMC Alias Private Key: 7
29,864,923 UART: [art] Derive CDI
29,865,664 UART: [art] Store in in slot 0x4
29,925,779 UART: [art] Derive Key Pair
29,926,780 UART: [art] Store priv key in slot 0x5
33,219,389 UART: [art] Derive Key Pair - Done
33,232,224 UART: [art] Signing Cert with AUTHO
33,233,548 UART: RITY.KEYID = 7
35,521,706 UART: [art] Erasing AUTHORITY.KEYID = 7
35,523,206 UART: [art] PUB.X = 0AD156B3A961A05CB9CD75763446060B7D9CA7AD8CA722E89CEE30D1F37E223A0661244BA83569DC79BE689C7108F20C
35,530,485 UART: [art] PUB.Y = E8DCF22AA1FE0B3D04B2D00086E72D02AF6DE90110A9E5A4B2F018B436C5DC9FE61067216AEC80E5DBD27B9CA36E237A
35,537,740 UART: [art] SIG.R = EF99B1A426D6D2C3C455E4B88B609B2AB3F9E9FE7378C6240770E6BBD7C325DF56060309570F65DE97B83336E8A721B9
35,545,156 UART: [art] SIG.S = DB6C8919A3BE4567B56A5F65F698F3CFB62A7A5278340144F0F3E26636362893C0032C4F74F49661A92B45F37927C62B
36,850,662 UART: Caliptra RT
36,851,388 UART: [state] CFI Enabled
37,011,914 UART: [rt] RT listening for mailbox commands...
37,014,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,169,505 UART: [rt]cmd =0x41544d4e, len=14344
37,174,824 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,521 writing to cptra_bootfsm_go
194,680 UART:
195,041 UART: Running Caliptra ROM ...
196,142 UART:
605,859 UART: [state] CFI Enabled
619,882 UART: [state] LifecycleState = Unprovisioned
621,824 UART: [state] DebugLocked = No
623,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,081 UART: [kat] SHA2-256
798,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,352 UART: [kat] ++
809,830 UART: [kat] sha1
820,339 UART: [kat] SHA2-256
823,061 UART: [kat] SHA2-384
828,484 UART: [kat] SHA2-512-ACC
830,850 UART: [kat] ECC-384
3,117,743 UART: [kat] HMAC-384Kdf
3,128,493 UART: [kat] LMS
4,318,611 UART: [kat] --
4,322,440 UART: [cold-reset] ++
4,324,330 UART: [fht] Storing FHT @ 0x50003400
4,336,382 UART: [idev] ++
4,336,942 UART: [idev] CDI.KEYID = 6
4,337,896 UART: [idev] SUBJECT.KEYID = 7
4,339,134 UART: [idev] UDS.KEYID = 0
4,340,172 ready_for_fw is high
4,340,368 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,252 UART: [idev] Erasing UDS.KEYID = 0
7,629,106 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,773 UART: [idev] --
7,656,198 UART: [ldev] ++
7,656,762 UART: [ldev] CDI.KEYID = 6
7,657,695 UART: [ldev] SUBJECT.KEYID = 5
7,658,953 UART: [ldev] AUTHORITY.KEYID = 7
7,660,233 UART: [ldev] FE.KEYID = 1
7,671,495 UART: [ldev] Erasing FE.KEYID = 1
10,965,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,259,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,274,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,289,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,303,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,322,821 UART: [ldev] --
13,327,650 UART: [fwproc] Waiting for Commands...
13,329,577 UART: [fwproc] Received command 0x46574c44
13,331,757 UART: [fwproc] Received Image of size 113760 bytes
21,962,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,039,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,108,761 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,425,674 >>> mbox cmd response: success
22,430,370 UART: [afmc] ++
22,430,958 UART: [afmc] CDI.KEYID = 6
22,431,861 UART: [afmc] SUBJECT.KEYID = 7
22,433,124 UART: [afmc] AUTHORITY.KEYID = 5
25,745,901 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,037,031 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,039,301 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,053,843 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,068,606 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,082,913 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,103,920 UART: [afmc] --
28,106,925 UART: [cold-reset] --
28,111,541 UART: [state] Locking Datavault
28,117,864 UART: [state] Locking PCR0, PCR1 and PCR31
28,119,625 UART: [state] Locking ICCM
28,120,881 UART: [exit] Launching FMC @ 0x40000130
28,129,272 UART:
28,129,502 UART: Running Caliptra FMC ...
28,130,599 UART:
28,130,757 UART: [state] CFI Enabled
28,138,921 UART: [fht] FMC Alias Private Key: 7
30,469,331 UART: [art] Extend RT PCRs Done
30,470,557 UART: [art] Lock RT PCRs Done
30,472,259 UART: [art] Populate DV Done
30,477,629 UART: [fht] FMC Alias Private Key: 7
30,479,169 UART: [art] Derive CDI
30,479,897 UART: [art] Store in in slot 0x4
30,523,086 UART: [art] Derive Key Pair
30,524,129 UART: [art] Store priv key in slot 0x5
33,765,896 UART: [art] Derive Key Pair - Done
33,779,115 UART: [art] Signing Cert with AUTHO
33,780,416 UART: RITY.KEYID = 7
36,060,012 UART: [art] Erasing AUTHORITY.KEYID = 7
36,061,523 UART: [art] PUB.X = 966E633BFB9DFE241A1BDB061669E6D2FD9FF974D9667CEE2A603686A4B9A7CEA4D819E38A550CF500553D3DC71D6165
36,068,753 UART: [art] PUB.Y = 3A877011BDA120AFD3B7E741D628DB1F71E744B51E52B9630FF2B3898562725E87E6774DEEBFE6183313DF71C9A016D8
36,076,009 UART: [art] SIG.R = 416C125C9595F419B976F12FED273453361071F8FAE2E45DEAF00374F8CE291AC161B3F95A38FB898189554BA84AF564
36,083,420 UART: [art] SIG.S = D09EA3E57CF2CFA99C151EE22E37D3B0300FDA02106D1EAAC92BA0D78827371051E06E8A81E94A0D570126816307DA29
37,388,668 UART: Caliptra RT
37,389,351 UART: [state] CFI Enabled
37,507,157 UART: [rt] RT listening for mailbox commands...
37,509,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,665,491 UART: [rt]cmd =0x41544d4e, len=14344
37,670,818 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
4,125,879 ready_for_fw is high
4,126,465 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,237,178 >>> mbox cmd response: success
27,877,831 UART:
27,878,236 UART: Running Caliptra FMC ...
27,879,364 UART:
27,879,522 UART: [state] CFI Enabled
27,887,140 UART: [fht] FMC Alias Private Key: 7
30,218,315 UART: [art] Extend RT PCRs Done
30,219,536 UART: [art] Lock RT PCRs Done
30,221,078 UART: [art] Populate DV Done
30,226,602 UART: [fht] FMC Alias Private Key: 7
30,228,247 UART: [art] Derive CDI
30,228,980 UART: [art] Store in in slot 0x4
30,272,114 UART: [art] Derive Key Pair
30,273,154 UART: [art] Store priv key in slot 0x5
33,515,300 UART: [art] Derive Key Pair - Done
33,528,680 UART: [art] Signing Cert with AUTHO
33,529,973 UART: RITY.KEYID = 7
35,809,215 UART: [art] Erasing AUTHORITY.KEYID = 7
35,810,718 UART: [art] PUB.X = 492BF4686CE56AFC2299A86A0091C9E0CBD2B2978B8171EC514D0028914F33C55429DE1FC781B2567AF10F183B2D7F31
35,817,903 UART: [art] PUB.Y = 9A621B4CEE6902D2DC620F453C63E41C4C796B528B673478CF55667781A167D6F9D4572A7EC1BDEB36BB05DF2C42D14E
35,825,146 UART: [art] SIG.R = 1C667BEA9A73268D897EAF1849BA275BABAB14B57B7253F18692B294DEE039CE70F5BCBE1B7E66A86499A68A8CB48726
35,832,587 UART: [art] SIG.S = A72BC86A80492B9B55781DF96EB6863EF918B1183EF635A92C8B397B1EA8AD6A3B335CF8AE0243262DB889F78B311B69
37,138,161 UART: Caliptra RT
37,139,351 UART: [state] CFI Enabled
37,257,128 UART: [rt] RT listening for mailbox commands...
37,259,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,414,731 UART: [rt]cmd =0x41544d4e, len=14344
37,419,887 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,403 writing to cptra_bootfsm_go
192,499 UART:
192,863 UART: Running Caliptra ROM ...
193,959 UART:
194,104 UART: [state] CFI Enabled
265,108 UART: [state] LifecycleState = Unprovisioned
267,010 UART: [state] DebugLocked = No
268,957 UART: [state] WD Timer not started. Device not locked for debugging
273,492 UART: [kat] SHA2-256
452,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,239 UART: [kat] ++
464,690 UART: [kat] sha1
475,918 UART: [kat] SHA2-256
478,926 UART: [kat] SHA2-384
486,119 UART: [kat] SHA2-512-ACC
489,121 UART: [kat] ECC-384
2,946,589 UART: [kat] HMAC-384Kdf
2,971,739 UART: [kat] LMS
3,501,229 UART: [kat] --
3,506,587 UART: [cold-reset] ++
3,507,592 UART: [fht] FHT @ 0x50003400
3,518,632 UART: [idev] ++
3,519,192 UART: [idev] CDI.KEYID = 6
3,520,080 UART: [idev] SUBJECT.KEYID = 7
3,521,325 UART: [idev] UDS.KEYID = 0
3,522,226 ready_for_fw is high
3,522,442 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,001 UART: [idev] Erasing UDS.KEYID = 0
6,029,089 UART: [idev] Sha1 KeyId Algorithm
6,051,631 UART: [idev] --
6,054,367 UART: [ldev] ++
6,054,953 UART: [ldev] CDI.KEYID = 6
6,055,842 UART: [ldev] SUBJECT.KEYID = 5
6,056,977 UART: [ldev] AUTHORITY.KEYID = 7
6,058,316 UART: [ldev] FE.KEYID = 1
6,101,395 UART: [ldev] Erasing FE.KEYID = 1
8,602,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,541 UART: [ldev] --
10,413,062 UART: [fwproc] Wait for Commands...
10,415,373 UART: [fwproc] Recv command 0x46574c44
10,417,467 UART: [fwproc] Recv'd Img size: 114084 bytes
14,968,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,044,821 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,113,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,430,908 >>> mbox cmd response: success
15,434,590 UART: [afmc] ++
15,435,183 UART: [afmc] CDI.KEYID = 6
15,436,096 UART: [afmc] SUBJECT.KEYID = 7
15,437,310 UART: [afmc] AUTHORITY.KEYID = 5
17,980,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,065 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,026 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,736,988 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,752,786 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,775,148 UART: [afmc] --
19,779,768 UART: [cold-reset] --
19,785,349 UART: [state] Locking Datavault
19,790,865 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,513 UART: [state] Locking ICCM
19,793,744 UART: [exit] Launching FMC @ 0x40000130
19,802,186 UART:
19,802,431 UART: Running Caliptra FMC ...
19,803,533 UART:
19,803,692 UART: [state] CFI Enabled
19,861,780 UART: [fht] FMC Alias Private Key: 7
21,625,769 UART: [art] Extend RT PCRs Done
21,626,985 UART: [art] Lock RT PCRs Done
21,628,254 UART: [art] Populate DV Done
21,633,824 UART: [fht] FMC Alias Private Key: 7
21,635,374 UART: [art] Derive CDI
21,636,338 UART: [art] Store in in slot 0x4
21,694,565 UART: [art] Derive Key Pair
21,695,567 UART: [art] Store priv key in slot 0x5
24,157,871 UART: [art] Derive Key Pair - Done
24,170,704 UART: [art] Signing Cert with AUTHO
24,171,997 UART: RITY.KEYID = 7
25,885,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,528 UART: [art] PUB.X = FF1508A5498D6B0BD2215321E7A5894E07090B4E00247B6AA50390FA13382A599E217445E7432955E7BDB3456125E9A4
25,893,756 UART: [art] PUB.Y = 7800D3B3BE36C6E961A4255C690B50A06C17A8E9F3FDF83E8201BC70B237468DC3C4ACA72E23289445FC9FE5DFC94B18
25,901,021 UART: [art] SIG.R = 980816273B631E0978D9BB24461DBEE04BEE14085B464F00857A5B719BE91B7027999D2B781B8287C949BF3A07EDCC19
25,908,346 UART: [art] SIG.S = 2CE00A4919B7761F553E69198F3E195599933C7C8543B49B2B909E10072FC3D0EA675CD12308B22F41D13F427EC3E6F9
26,886,856 UART: Caliptra RT
26,887,569 UART: [state] CFI Enabled
27,052,474 UART: [rt] RT listening for mailbox commands...
27,054,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,210,002 UART: [rt]cmd =0x41544d4e, len=14344
27,215,220 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
3,360,071 ready_for_fw is high
3,360,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,030,560 >>> mbox cmd response: success
19,324,356 UART:
19,325,111 UART: Running Caliptra FMC ...
19,326,235 UART:
19,326,385 UART: [state] CFI Enabled
19,394,868 UART: [fht] FMC Alias Private Key: 7
21,158,331 UART: [art] Extend RT PCRs Done
21,159,558 UART: [art] Lock RT PCRs Done
21,161,132 UART: [art] Populate DV Done
21,166,649 UART: [fht] FMC Alias Private Key: 7
21,168,406 UART: [art] Derive CDI
21,169,218 UART: [art] Store in in slot 0x4
21,227,993 UART: [art] Derive Key Pair
21,229,010 UART: [art] Store priv key in slot 0x5
23,691,287 UART: [art] Derive Key Pair - Done
23,704,441 UART: [art] Signing Cert with AUTHO
23,705,736 UART: RITY.KEYID = 7
25,418,528 UART: [art] Erasing AUTHORITY.KEYID = 7
25,420,012 UART: [art] PUB.X = 32A4EB40F36CBFA0D60BD204C67999ECC0C22A4CF8611D5E101015613829DE2829F5DFCD7ED99FE72C71B9DF3E6B5C9F
25,427,308 UART: [art] PUB.Y = EBFAD310003EB84BBBFA83C4D5BFE650BC4BA78C647FBCF95C9DDFC2D1B56BE0568B7DE61A8481425C3EF6C3708E5190
25,434,599 UART: [art] SIG.R = A95C6D6E168E22C74AA98147949E88FF98CD93F4EF18937564D17A7E641C63FE2A1E4D9A9564DB99D10684808B2EE427
25,441,960 UART: [art] SIG.S = 4E781C170EF1799B61E756DBA607473C6A461D937C2E384670C5CACD87581E151D666CDEBBF870A9E1C6411AB964E020
26,420,898 UART: Caliptra RT
26,421,614 UART: [state] CFI Enabled
26,586,019 UART: [rt] RT listening for mailbox commands...
26,588,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,743,754 UART: [rt]cmd =0x41544d4e, len=14344
26,748,803 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,789 writing to cptra_bootfsm_go
193,014 UART:
193,371 UART: Running Caliptra ROM ...
194,562 UART:
603,950 UART: [state] CFI Enabled
620,049 UART: [state] LifecycleState = Unprovisioned
621,926 UART: [state] DebugLocked = No
623,941 UART: [state] WD Timer not started. Device not locked for debugging
626,801 UART: [kat] SHA2-256
805,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,473 UART: [kat] ++
817,924 UART: [kat] sha1
829,150 UART: [kat] SHA2-256
832,162 UART: [kat] SHA2-384
839,221 UART: [kat] SHA2-512-ACC
842,229 UART: [kat] ECC-384
3,282,134 UART: [kat] HMAC-384Kdf
3,294,924 UART: [kat] LMS
3,824,430 UART: [kat] --
3,828,736 UART: [cold-reset] ++
3,830,747 UART: [fht] FHT @ 0x50003400
3,841,895 UART: [idev] ++
3,842,500 UART: [idev] CDI.KEYID = 6
3,843,421 UART: [idev] SUBJECT.KEYID = 7
3,844,545 UART: [idev] UDS.KEYID = 0
3,845,472 ready_for_fw is high
3,845,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,392 UART: [idev] Erasing UDS.KEYID = 0
6,320,893 UART: [idev] Sha1 KeyId Algorithm
6,343,904 UART: [idev] --
6,348,607 UART: [ldev] ++
6,349,183 UART: [ldev] CDI.KEYID = 6
6,350,094 UART: [ldev] SUBJECT.KEYID = 5
6,351,313 UART: [ldev] AUTHORITY.KEYID = 7
6,352,548 UART: [ldev] FE.KEYID = 1
6,365,628 UART: [ldev] Erasing FE.KEYID = 1
8,836,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,905 UART: [ldev] --
10,631,685 UART: [fwproc] Wait for Commands...
10,634,697 UART: [fwproc] Recv command 0x46574c44
10,636,848 UART: [fwproc] Recv'd Img size: 114084 bytes
15,189,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,260,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,328,784 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,645,225 >>> mbox cmd response: success
15,650,276 UART: [afmc] ++
15,650,876 UART: [afmc] CDI.KEYID = 6
15,651,790 UART: [afmc] SUBJECT.KEYID = 7
15,652,952 UART: [afmc] AUTHORITY.KEYID = 5
18,155,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,875,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,877,298 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,893,273 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,909,212 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,925,008 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,949,161 UART: [afmc] --
19,952,599 UART: [cold-reset] --
19,956,306 UART: [state] Locking Datavault
19,961,662 UART: [state] Locking PCR0, PCR1 and PCR31
19,963,363 UART: [state] Locking ICCM
19,964,943 UART: [exit] Launching FMC @ 0x40000130
19,973,340 UART:
19,973,576 UART: Running Caliptra FMC ...
19,974,609 UART:
19,974,756 UART: [state] CFI Enabled
19,983,238 UART: [fht] FMC Alias Private Key: 7
21,739,945 UART: [art] Extend RT PCRs Done
21,741,183 UART: [art] Lock RT PCRs Done
21,742,857 UART: [art] Populate DV Done
21,748,444 UART: [fht] FMC Alias Private Key: 7
21,750,145 UART: [art] Derive CDI
21,750,886 UART: [art] Store in in slot 0x4
21,793,768 UART: [art] Derive Key Pair
21,794,802 UART: [art] Store priv key in slot 0x5
24,221,465 UART: [art] Derive Key Pair - Done
24,234,357 UART: [art] Signing Cert with AUTHO
24,235,858 UART: RITY.KEYID = 7
25,941,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,942,827 UART: [art] PUB.X = 9D4EE724710765A6D44400B9198D7454FB7967D752F9FE4D20F02F43D02A0D359B24187BC7643C472EF883DF18DFB507
25,950,040 UART: [art] PUB.Y = 0C5B96D6EFAB17E96C508FDBB21B212EB738A6D2A66830FFAF5EE26BF61EFE70DC0B1243ABAFA93F03A4CC62137DA4AD
25,957,353 UART: [art] SIG.R = D4FB3EA8B86BDE0DE1442A1956442CB837F7F955BCEE7605153100F01602952A0CBB4B343E1EDBE1CD3FA2C355FB1BEC
25,964,775 UART: [art] SIG.S = 230D8703916D2F7A8F2E10DAA55AE2F143DFF5B516FF401DA07DD409AE03BA44ACE060486E6FAFD97C16A3F719886D90
26,943,837 UART: Caliptra RT
26,944,549 UART: [state] CFI Enabled
27,061,543 UART: [rt] RT listening for mailbox commands...
27,063,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,219,066 UART: [rt]cmd =0x41544d4e, len=14344
27,224,438 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,938 writing to cptra_bootfsm_go
3,694,737 ready_for_fw is high
3,695,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,232,197 >>> mbox cmd response: success
19,482,029 UART:
19,482,432 UART: Running Caliptra FMC ...
19,483,541 UART:
19,483,697 UART: [state] CFI Enabled
19,491,649 UART: [fht] FMC Alias Private Key: 7
21,248,655 UART: [art] Extend RT PCRs Done
21,249,876 UART: [art] Lock RT PCRs Done
21,251,930 UART: [art] Populate DV Done
21,257,322 UART: [fht] FMC Alias Private Key: 7
21,258,921 UART: [art] Derive CDI
21,259,662 UART: [art] Store in in slot 0x4
21,302,143 UART: [art] Derive Key Pair
21,303,149 UART: [art] Store priv key in slot 0x5
23,730,109 UART: [art] Derive Key Pair - Done
23,743,207 UART: [art] Signing Cert with AUTHO
23,744,517 UART: RITY.KEYID = 7
25,449,549 UART: [art] Erasing AUTHORITY.KEYID = 7
25,451,049 UART: [art] PUB.X = D2A87C4DD798C86173D5BE0A436102684F0528961E2FB0C0BB76C6748281E7EC9804C4550A318E67B244DA1B81257C48
25,458,272 UART: [art] PUB.Y = 45AD96C7373BEEA76072221398128E3BC98AF6F913FE90A7D776BF763E7D73021E4D8E3413CD0B874151924A09E2BD20
25,465,519 UART: [art] SIG.R = CC612D1F187C129510DE291C186F19BDA2E52FFF1B0F3011F44C51C8E6DB515BCCCF1919DDA2528A8A9429AD24D2BC74
25,472,986 UART: [art] SIG.S = D653389D38AFA6D6C0815442BA4EF14E8D692415141910C86FE43BF19D648DBB5A0BB0B8C04D42FC6EF79382B56ACFE0
26,451,621 UART: Caliptra RT
26,452,324 UART: [state] CFI Enabled
26,567,893 UART: [rt] RT listening for mailbox commands...
26,570,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,725,874 UART: [rt]cmd =0x41544d4e, len=14344
26,731,188 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,498 UART:
192,866 UART: Running Caliptra ROM ...
194,062 UART:
194,224 UART: [state] CFI Enabled
262,773 UART: [state] LifecycleState = Unprovisioned
265,137 UART: [state] DebugLocked = No
267,809 UART: [state] WD Timer not started. Device not locked for debugging
272,067 UART: [kat] SHA2-256
462,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,767 UART: [kat] ++
473,260 UART: [kat] sha1
483,380 UART: [kat] SHA2-256
486,361 UART: [kat] SHA2-384
492,928 UART: [kat] SHA2-512-ACC
495,515 UART: [kat] ECC-384
2,947,204 UART: [kat] HMAC-384Kdf
2,971,961 UART: [kat] LMS
3,503,724 UART: [kat] --
3,507,740 UART: [cold-reset] ++
3,509,250 UART: [fht] FHT @ 0x50003400
3,520,269 UART: [idev] ++
3,521,035 UART: [idev] CDI.KEYID = 6
3,521,926 UART: [idev] SUBJECT.KEYID = 7
3,523,100 UART: [idev] UDS.KEYID = 0
3,524,043 ready_for_fw is high
3,524,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,683 UART: [idev] Erasing UDS.KEYID = 0
6,029,215 UART: [idev] Sha1 KeyId Algorithm
6,052,614 UART: [idev] --
6,056,940 UART: [ldev] ++
6,057,622 UART: [ldev] CDI.KEYID = 6
6,058,540 UART: [ldev] SUBJECT.KEYID = 5
6,059,703 UART: [ldev] AUTHORITY.KEYID = 7
6,060,934 UART: [ldev] FE.KEYID = 1
6,100,206 UART: [ldev] Erasing FE.KEYID = 1
8,606,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,296 UART: [ldev] --
10,415,138 UART: [fwproc] Wait for Commands...
10,416,687 UART: [fwproc] Recv command 0x46574c44
10,418,941 UART: [fwproc] Recv'd Img size: 114084 bytes
15,057,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,136,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,252,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,794,166 >>> mbox cmd response: success
15,799,066 UART: [afmc] ++
15,799,774 UART: [afmc] CDI.KEYID = 6
15,800,968 UART: [afmc] SUBJECT.KEYID = 7
15,802,465 UART: [afmc] AUTHORITY.KEYID = 5
18,345,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,068,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,070,832 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,085,974 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,101,144 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,115,961 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,139,505 UART: [afmc] --
20,143,202 UART: [cold-reset] --
20,146,150 UART: [state] Locking Datavault
20,151,954 UART: [state] Locking PCR0, PCR1 and PCR31
20,154,122 UART: [state] Locking ICCM
20,155,463 UART: [exit] Launching FMC @ 0x40000130
20,164,085 UART:
20,164,331 UART: Running Caliptra FMC ...
20,165,429 UART:
20,165,587 UART: [state] CFI Enabled
20,227,892 UART: [fht] FMC Alias Private Key: 7
21,992,369 UART: [art] Extend RT PCRs Done
21,993,577 UART: [art] Lock RT PCRs Done
21,995,203 UART: [art] Populate DV Done
22,000,501 UART: [fht] FMC Alias Private Key: 7
22,002,249 UART: [art] Derive CDI
22,003,076 UART: [art] Store in in slot 0x4
22,060,771 UART: [art] Derive Key Pair
22,061,770 UART: [art] Store priv key in slot 0x5
24,524,847 UART: [art] Derive Key Pair - Done
24,537,799 UART: [art] Signing Cert with AUTHO
24,539,111 UART: RITY.KEYID = 7
26,251,068 UART: [art] Erasing AUTHORITY.KEYID = 7
26,252,582 UART: [art] PUB.X = DD4AC6FB8E3E1589AE92ABC34BAABD5D8913F7C26152007D915BB47AF07FC037E144D5B02C9C1D8081215E8E16D91F24
26,259,869 UART: [art] PUB.Y = 10CC4CD4AAEF9BB2CF7D77840F7AC0441EAE348F4147A34F823B9AFC4D9504032B5941039378758AFD5CDDF485422717
26,267,126 UART: [art] SIG.R = CD17281069677615101DE685B90EA6022C1FF23B9DB48EF74B49E5B00793CA32658139D615B12BE912056D61C9FD580B
26,274,483 UART: [art] SIG.S = D9FB788BCA34032D8EB072160D3446816F1BA7966003896EA76D4EB4AB154154AA56E9FACFA920D7CB5D0492B5C87937
27,253,490 UART: Caliptra RT
27,254,184 UART: [state] CFI Enabled
27,417,492 UART: [rt] RT listening for mailbox commands...
27,419,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,575,230 UART: [rt]cmd =0x41544d4e, len=14344
27,580,326 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,437,944 ready_for_fw is high
3,438,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,842,946 >>> mbox cmd response: success
20,156,426 UART:
20,156,821 UART: Running Caliptra FMC ...
20,157,960 UART:
20,158,123 UART: [state] CFI Enabled
20,224,764 UART: [fht] FMC Alias Private Key: 7
21,989,444 UART: [art] Extend RT PCRs Done
21,990,670 UART: [art] Lock RT PCRs Done
21,992,619 UART: [art] Populate DV Done
21,998,196 UART: [fht] FMC Alias Private Key: 7
21,999,886 UART: [art] Derive CDI
22,000,708 UART: [art] Store in in slot 0x4
22,057,431 UART: [art] Derive Key Pair
22,058,434 UART: [art] Store priv key in slot 0x5
24,521,151 UART: [art] Derive Key Pair - Done
24,534,095 UART: [art] Signing Cert with AUTHO
24,535,399 UART: RITY.KEYID = 7
26,247,364 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,872 UART: [art] PUB.X = 4FEE762B328A39B4DC863A7069B8100DFB9F8A991FF351D3C262E42F10FF41B1A1A7DAFA8B4BCB33FB62676023F49233
26,256,150 UART: [art] PUB.Y = 3BF00DE501F27796FDF5C8A4FE500FD7BE249A6466A5638D6A42515B2E2A25575DC5B75A5733A12444099C3959D83BF0
26,263,375 UART: [art] SIG.R = DB8360C7326A2DC62E17174DC526D9AEBEC5DDBDBD9241034B6481F2E5535C961BE587E4BF9C8F910898C7EAC7E5B884
26,270,758 UART: [art] SIG.S = DF5EF44E65C6D651784BCC6A5125A268C37F13E2D42EBB690A1B6E7CC34541A961379F7CDF84BF338C6F2DBE393FF268
27,249,770 UART: Caliptra RT
27,250,465 UART: [state] CFI Enabled
27,414,053 UART: [rt] RT listening for mailbox commands...
27,416,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,571,997 UART: [rt]cmd =0x41544d4e, len=14344
27,577,366 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
193,041 UART:
193,416 UART: Running Caliptra ROM ...
194,554 UART:
604,415 UART: [state] CFI Enabled
618,881 UART: [state] LifecycleState = Unprovisioned
621,302 UART: [state] DebugLocked = No
622,543 UART: [state] WD Timer not started. Device not locked for debugging
627,207 UART: [kat] SHA2-256
817,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,912 UART: [kat] ++
828,361 UART: [kat] sha1
839,891 UART: [kat] SHA2-256
842,910 UART: [kat] SHA2-384
849,330 UART: [kat] SHA2-512-ACC
852,010 UART: [kat] ECC-384
3,294,045 UART: [kat] HMAC-384Kdf
3,307,085 UART: [kat] LMS
3,838,921 UART: [kat] --
3,845,287 UART: [cold-reset] ++
3,846,726 UART: [fht] FHT @ 0x50003400
3,857,353 UART: [idev] ++
3,858,072 UART: [idev] CDI.KEYID = 6
3,859,112 UART: [idev] SUBJECT.KEYID = 7
3,860,221 UART: [idev] UDS.KEYID = 0
3,861,152 ready_for_fw is high
3,861,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,689 UART: [idev] Erasing UDS.KEYID = 0
6,337,806 UART: [idev] Sha1 KeyId Algorithm
6,359,636 UART: [idev] --
6,363,471 UART: [ldev] ++
6,364,157 UART: [ldev] CDI.KEYID = 6
6,365,178 UART: [ldev] SUBJECT.KEYID = 5
6,366,284 UART: [ldev] AUTHORITY.KEYID = 7
6,367,515 UART: [ldev] FE.KEYID = 1
6,378,762 UART: [ldev] Erasing FE.KEYID = 1
8,857,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,566 UART: [ldev] --
10,651,808 UART: [fwproc] Wait for Commands...
10,654,885 UART: [fwproc] Recv command 0x46574c44
10,657,163 UART: [fwproc] Recv'd Img size: 114084 bytes
15,258,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,334,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,451,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,992,843 >>> mbox cmd response: success
15,996,316 UART: [afmc] ++
15,997,030 UART: [afmc] CDI.KEYID = 6
15,998,233 UART: [afmc] SUBJECT.KEYID = 7
15,999,681 UART: [afmc] AUTHORITY.KEYID = 5
18,506,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,227,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,229,310 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,244,392 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,259,571 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,274,417 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,297,900 UART: [afmc] --
20,301,337 UART: [cold-reset] --
20,303,929 UART: [state] Locking Datavault
20,310,330 UART: [state] Locking PCR0, PCR1 and PCR31
20,312,487 UART: [state] Locking ICCM
20,315,072 UART: [exit] Launching FMC @ 0x40000130
20,323,704 UART:
20,323,954 UART: Running Caliptra FMC ...
20,325,059 UART:
20,325,222 UART: [state] CFI Enabled
20,333,056 UART: [fht] FMC Alias Private Key: 7
22,089,912 UART: [art] Extend RT PCRs Done
22,091,135 UART: [art] Lock RT PCRs Done
22,092,793 UART: [art] Populate DV Done
22,098,372 UART: [fht] FMC Alias Private Key: 7
22,099,971 UART: [art] Derive CDI
22,100,791 UART: [art] Store in in slot 0x4
22,143,246 UART: [art] Derive Key Pair
22,144,284 UART: [art] Store priv key in slot 0x5
24,571,434 UART: [art] Derive Key Pair - Done
24,584,542 UART: [art] Signing Cert with AUTHO
24,585,856 UART: RITY.KEYID = 7
26,291,654 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,280 UART: [art] PUB.X = 223F67BB0492705A5E76C914CC45C66FB888B64EA7FB5C6DC8BD3A1A505CBF898BBF25CE52D98E33300F5E86C88B33C5
26,300,446 UART: [art] PUB.Y = 6C13D2EE7C6AAADC2A24D097D7087736A45E4C7968B5355A5C3DA5744D96A0F12BCE5DE7A7BAC402A43248168607C655
26,307,707 UART: [art] SIG.R = B6374A3D55F81488EE73042CEC120B20552137133825F9A56CD1C4B243D1DF81C1A46A3F23B6F8053C151DF78AD7CB18
26,315,077 UART: [art] SIG.S = D66CC0266516740046B7C553EB80C50A0AA1F4F734DD08A4A161BEC029813C8DC5E909DCA3072E483DC0056CF769804E
27,294,050 UART: Caliptra RT
27,294,768 UART: [state] CFI Enabled
27,411,729 UART: [rt] RT listening for mailbox commands...
27,414,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,569,700 UART: [rt]cmd =0x41544d4e, len=14344
27,574,739 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
3,758,046 ready_for_fw is high
3,758,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,064,159 >>> mbox cmd response: success
20,313,176 UART:
20,313,575 UART: Running Caliptra FMC ...
20,314,709 UART:
20,314,876 UART: [state] CFI Enabled
20,323,414 UART: [fht] FMC Alias Private Key: 7
22,080,544 UART: [art] Extend RT PCRs Done
22,081,774 UART: [art] Lock RT PCRs Done
22,083,513 UART: [art] Populate DV Done
22,088,771 UART: [fht] FMC Alias Private Key: 7
22,090,277 UART: [art] Derive CDI
22,091,049 UART: [art] Store in in slot 0x4
22,133,735 UART: [art] Derive Key Pair
22,134,775 UART: [art] Store priv key in slot 0x5
24,561,396 UART: [art] Derive Key Pair - Done
24,574,389 UART: [art] Signing Cert with AUTHO
24,575,731 UART: RITY.KEYID = 7
26,281,335 UART: [art] Erasing AUTHORITY.KEYID = 7
26,282,841 UART: [art] PUB.X = FC1B8E6D583FF45626254E18670FF4FC877CC2C1BEDA586B67E16E4C80E70AAF6AFF08F2D14E0B9FC69897A3A6D7F952
26,290,146 UART: [art] PUB.Y = B0F2AB786467D76141E2278B51450F46A2B897B5BA586C69E03F7FE28E6D93069011978CEF9978A06E79360EC5AB10A5
26,297,396 UART: [art] SIG.R = 785A4D079516E0BE4195FAA86466AF4EBA731DCD496AB2CC65866FA18FD3D661A3722BAFFC295DEBEFEB53BD18F2EC53
26,304,799 UART: [art] SIG.S = 34C90D9994B78B3FE23C14837635A8CE343EE5BDD5C183BD91EB28E0B17727382792A0EF457D74F100D768D3D2D5359C
27,283,700 UART: Caliptra RT
27,284,394 UART: [state] CFI Enabled
27,402,608 UART: [rt] RT listening for mailbox commands...
27,404,988 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,560,328 UART: [rt]cmd =0x41544d4e, len=14344
27,565,319 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,957 UART: [kat] SHA2-256
881,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,003 UART: [kat] ++
886,155 UART: [kat] sha1
890,473 UART: [kat] SHA2-256
892,411 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
903,070 UART: [kat] HMAC-384Kdf
907,814 UART: [kat] LMS
1,476,010 UART: [kat] --
1,476,787 UART: [cold-reset] ++
1,477,221 UART: [fht] Storing FHT @ 0x50003400
1,480,010 UART: [idev] ++
1,480,178 UART: [idev] CDI.KEYID = 6
1,480,538 UART: [idev] SUBJECT.KEYID = 7
1,480,962 UART: [idev] UDS.KEYID = 0
1,481,307 ready_for_fw is high
1,481,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,912 UART: [idev] Erasing UDS.KEYID = 0
1,505,192 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,641 UART: [ldev] ++
1,514,809 UART: [ldev] CDI.KEYID = 6
1,515,172 UART: [ldev] SUBJECT.KEYID = 5
1,515,598 UART: [ldev] AUTHORITY.KEYID = 7
1,516,061 UART: [ldev] FE.KEYID = 1
1,521,105 UART: [ldev] Erasing FE.KEYID = 1
1,545,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,970 UART: [ldev] --
1,585,429 UART: [fwproc] Waiting for Commands...
1,586,146 UART: [fwproc] Received command 0x46574c44
1,586,937 UART: [fwproc] Received Image of size 114084 bytes
5,193,782 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,222,054 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,251,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,386,823 >>> mbox cmd response: success
5,387,913 UART: [afmc] ++
5,388,081 UART: [afmc] CDI.KEYID = 6
5,388,443 UART: [afmc] SUBJECT.KEYID = 7
5,388,868 UART: [afmc] AUTHORITY.KEYID = 5
5,424,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,440,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,441,078 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,446,787 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,452,679 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,458,380 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,466,264 UART: [afmc] --
5,467,198 UART: [cold-reset] --
5,467,988 UART: [state] Locking Datavault
5,468,883 UART: [state] Locking PCR0, PCR1 and PCR31
5,469,487 UART: [state] Locking ICCM
5,470,047 UART: [exit] Launching FMC @ 0x40000130
5,475,376 UART:
5,475,392 UART: Running Caliptra FMC ...
5,475,800 UART:
5,475,854 UART: [state] CFI Enabled
5,486,052 UART: [fht] FMC Alias Private Key: 7
5,593,890 UART: [art] Extend RT PCRs Done
5,594,318 UART: [art] Lock RT PCRs Done
5,595,946 UART: [art] Populate DV Done
5,604,188 UART: [fht] FMC Alias Private Key: 7
5,605,266 UART: [art] Derive CDI
5,605,546 UART: [art] Store in in slot 0x4
5,691,367 UART: [art] Derive Key Pair
5,691,727 UART: [art] Store priv key in slot 0x5
5,704,909 UART: [art] Derive Key Pair - Done
5,719,476 UART: [art] Signing Cert with AUTHO
5,719,956 UART: RITY.KEYID = 7
5,734,726 UART: [art] Erasing AUTHORITY.KEYID = 7
5,735,491 UART: [art] PUB.X = 470D7FBC6A2CE4FC529F1A320DE2162D5EFD51C38E6D1646B8F3AD6F41757DD26581689839A3863E1B70640B85AC9E8D
5,742,260 UART: [art] PUB.Y = 1AB2800607C2B3E2EDF5F55649EC9DC4309D9D2E97B55B1F33D9FD840369B67BA034E280C4C474552469C7D42D0A7473
5,749,200 UART: [art] SIG.R = 228A546FA67C928466DA1DA4CAEB1524A4000B56152D8F6A720F497457DEEB227080996A9F9247B9CB007170264C9947
5,755,914 UART: [art] SIG.S = 65197A7EB5D42645C2CCBAEA527A24233BB451E9E4B8776FE7CD9B235531D24D52F49D19CD373AB0A31A792B4D945B49
5,779,915 UART: Caliptra RT
5,780,168 UART: [state] CFI Enabled
5,887,834 UART: [rt] RT listening for mailbox commands...
5,888,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,608 UART: [rt]cmd =0x41544d4e, len=14344
6,017,891 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,677 ready_for_fw is high
1,362,677 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,198,934 >>> mbox cmd response: success
5,261,033 UART:
5,261,049 UART: Running Caliptra FMC ...
5,261,457 UART:
5,261,511 UART: [state] CFI Enabled
5,271,913 UART: [fht] FMC Alias Private Key: 7
5,379,871 UART: [art] Extend RT PCRs Done
5,380,299 UART: [art] Lock RT PCRs Done
5,381,579 UART: [art] Populate DV Done
5,389,757 UART: [fht] FMC Alias Private Key: 7
5,390,799 UART: [art] Derive CDI
5,391,079 UART: [art] Store in in slot 0x4
5,476,768 UART: [art] Derive Key Pair
5,477,128 UART: [art] Store priv key in slot 0x5
5,490,078 UART: [art] Derive Key Pair - Done
5,504,858 UART: [art] Signing Cert with AUTHO
5,505,338 UART: RITY.KEYID = 7
5,520,256 UART: [art] Erasing AUTHORITY.KEYID = 7
5,521,021 UART: [art] PUB.X = F8C2892BAFB39C6FF003C60E18DB875D66874B5B3C49E604B8D358B40525D56AE9325D50C3A7B9EA00287F211FE4416B
5,527,763 UART: [art] PUB.Y = A3CF2F3CC2F9BB979BC4BB7ECE3D33611E16F05C997CB6B5E26D6BA0DE44D333F61469568E6A1313F3AC1C0B92069DBE
5,534,727 UART: [art] SIG.R = 967CB9DDD672768524A610CBDA8B3AE7B1EBC54DE3DBCF41DE38D39CDC8C494A8C90CE3D536ED55892EC4E199D806990
5,541,517 UART: [art] SIG.S = 2D651751E4C83FD4AB1FD99170EE582A571B68A29A1512A9E60181E9B3E94AB5DFFED28F85F5739226FE2E93E365BE52
5,564,995 UART: Caliptra RT
5,565,248 UART: [state] CFI Enabled
5,673,283 UART: [rt] RT listening for mailbox commands...
5,673,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,925 UART: [rt]cmd =0x41544d4e, len=14344
5,802,974 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,286 UART: [kat] SHA2-256
892,224 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,401 UART: [kat] HMAC-384Kdf
906,931 UART: [kat] LMS
1,475,127 UART: [kat] --
1,475,988 UART: [cold-reset] ++
1,476,390 UART: [fht] Storing FHT @ 0x50003400
1,479,157 UART: [idev] ++
1,479,325 UART: [idev] CDI.KEYID = 6
1,479,685 UART: [idev] SUBJECT.KEYID = 7
1,480,109 UART: [idev] UDS.KEYID = 0
1,480,454 ready_for_fw is high
1,480,454 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,799 UART: [idev] Erasing UDS.KEYID = 0
1,504,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,239 UART: [idev] --
1,514,168 UART: [ldev] ++
1,514,336 UART: [ldev] CDI.KEYID = 6
1,514,699 UART: [ldev] SUBJECT.KEYID = 5
1,515,125 UART: [ldev] AUTHORITY.KEYID = 7
1,515,588 UART: [ldev] FE.KEYID = 1
1,520,888 UART: [ldev] Erasing FE.KEYID = 1
1,546,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,065 UART: [ldev] --
1,585,544 UART: [fwproc] Waiting for Commands...
1,586,297 UART: [fwproc] Received command 0x46574c44
1,587,088 UART: [fwproc] Received Image of size 114084 bytes
5,156,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,184,152 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,213,504 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,349,103 >>> mbox cmd response: success
5,350,289 UART: [afmc] ++
5,350,457 UART: [afmc] CDI.KEYID = 6
5,350,819 UART: [afmc] SUBJECT.KEYID = 7
5,351,244 UART: [afmc] AUTHORITY.KEYID = 5
5,386,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,402,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,292 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,409,001 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,414,893 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,420,594 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,484 UART: [afmc] --
5,429,404 UART: [cold-reset] --
5,430,140 UART: [state] Locking Datavault
5,431,567 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,171 UART: [state] Locking ICCM
5,432,669 UART: [exit] Launching FMC @ 0x40000130
5,437,998 UART:
5,438,014 UART: Running Caliptra FMC ...
5,438,422 UART:
5,438,565 UART: [state] CFI Enabled
5,449,583 UART: [fht] FMC Alias Private Key: 7
5,557,301 UART: [art] Extend RT PCRs Done
5,557,729 UART: [art] Lock RT PCRs Done
5,559,571 UART: [art] Populate DV Done
5,567,497 UART: [fht] FMC Alias Private Key: 7
5,568,549 UART: [art] Derive CDI
5,568,829 UART: [art] Store in in slot 0x4
5,654,676 UART: [art] Derive Key Pair
5,655,036 UART: [art] Store priv key in slot 0x5
5,667,470 UART: [art] Derive Key Pair - Done
5,682,086 UART: [art] Signing Cert with AUTHO
5,682,566 UART: RITY.KEYID = 7
5,697,666 UART: [art] Erasing AUTHORITY.KEYID = 7
5,698,431 UART: [art] PUB.X = 5F038116AA4ACA66B42CF50FACECB8460ECCBC4CC4660759E41245A5D4003D3E53C8F24869392C9C7000AFEB4FC2E1CF
5,705,163 UART: [art] PUB.Y = D25094AB6036D378B6D385B36E7836C546C718EF0D126EBEF2FC446D70CDA73181DB52CD5631921A6A84405BD36CAA09
5,712,113 UART: [art] SIG.R = DD4A23648E9A4A8BB958302507756652B1E783639B76E996EB0DECDC7ABF5FC38F2B41CD202DD60E5C8D5B95665D0624
5,718,879 UART: [art] SIG.S = 2A7F856026C7F549E2EBB262E948AF73A57D7DCBED2EAEFFB51F7E5502BD3E97509CD77F9654E51CEF39CDA1DF6BFE15
5,742,755 UART: Caliptra RT
5,743,100 UART: [state] CFI Enabled
5,851,191 UART: [rt] RT listening for mailbox commands...
5,851,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,985 UART: [rt]cmd =0x41544d4e, len=14344
5,980,628 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,532 ready_for_fw is high
1,362,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,046,417 >>> mbox cmd response: success
5,108,564 UART:
5,108,580 UART: Running Caliptra FMC ...
5,108,988 UART:
5,109,131 UART: [state] CFI Enabled
5,119,597 UART: [fht] FMC Alias Private Key: 7
5,227,225 UART: [art] Extend RT PCRs Done
5,227,653 UART: [art] Lock RT PCRs Done
5,229,215 UART: [art] Populate DV Done
5,237,393 UART: [fht] FMC Alias Private Key: 7
5,238,571 UART: [art] Derive CDI
5,238,851 UART: [art] Store in in slot 0x4
5,324,552 UART: [art] Derive Key Pair
5,324,912 UART: [art] Store priv key in slot 0x5
5,337,620 UART: [art] Derive Key Pair - Done
5,352,526 UART: [art] Signing Cert with AUTHO
5,353,006 UART: RITY.KEYID = 7
5,368,130 UART: [art] Erasing AUTHORITY.KEYID = 7
5,368,895 UART: [art] PUB.X = E98544F0E578F20DA4EE5FE5D1D661E09A2073A29AAB966829002774B56D308AB48B1B07A1844377C32DDE846B789328
5,375,635 UART: [art] PUB.Y = 261E32C9C0FF3527B1B888EE8A5EE4446F57C72BDA0AEC29B89B15F75124FD65D553BAEA4BEE8C966966DCB6F256F568
5,382,598 UART: [art] SIG.R = 8A019C4FF32378484C26642419514D26A3D37E2AC010D35E77C6E79AB7388881925F9D709E200D4DEBB50A69715662E4
5,389,351 UART: [art] SIG.S = DF4E705EA73D046DD4EE6998F91F5F671E58504977199775D64B994C59844AFDB336AAF22883A944108C1E941FD90567
5,413,196 UART: Caliptra RT
5,413,541 UART: [state] CFI Enabled
5,521,935 UART: [rt] RT listening for mailbox commands...
5,522,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,089 UART: [rt]cmd =0x41544d4e, len=14344
5,652,454 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
893,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,279 UART: [kat] ++
897,431 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,940 UART: [kat] LMS
1,171,268 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,338 UART: [idev] ++
1,175,506 UART: [idev] CDI.KEYID = 6
1,175,866 UART: [idev] SUBJECT.KEYID = 7
1,176,290 UART: [idev] UDS.KEYID = 0
1,176,635 ready_for_fw is high
1,176,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,330 UART: [idev] Erasing UDS.KEYID = 0
1,201,779 UART: [idev] Sha1 KeyId Algorithm
1,210,369 UART: [idev] --
1,211,171 UART: [ldev] ++
1,211,339 UART: [ldev] CDI.KEYID = 6
1,211,702 UART: [ldev] SUBJECT.KEYID = 5
1,212,128 UART: [ldev] AUTHORITY.KEYID = 7
1,212,591 UART: [ldev] FE.KEYID = 1
1,217,855 UART: [ldev] Erasing FE.KEYID = 1
1,244,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,603 UART: [ldev] --
1,283,942 UART: [fwproc] Wait for Commands...
1,284,718 UART: [fwproc] Recv command 0x46574c44
1,285,446 UART: [fwproc] Recv'd Img size: 114084 bytes
3,112,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,170,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,305,686 >>> mbox cmd response: success
3,306,836 UART: [afmc] ++
3,307,004 UART: [afmc] CDI.KEYID = 6
3,307,366 UART: [afmc] SUBJECT.KEYID = 7
3,307,791 UART: [afmc] AUTHORITY.KEYID = 5
3,342,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,152 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,365,861 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,753 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,464 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,303 UART: [afmc] --
3,386,223 UART: [cold-reset] --
3,387,155 UART: [state] Locking Datavault
3,388,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,388,894 UART: [state] Locking ICCM
3,389,550 UART: [exit] Launching FMC @ 0x40000130
3,394,879 UART:
3,394,895 UART: Running Caliptra FMC ...
3,395,303 UART:
3,395,357 UART: [state] CFI Enabled
3,405,967 UART: [fht] FMC Alias Private Key: 7
3,514,689 UART: [art] Extend RT PCRs Done
3,515,117 UART: [art] Lock RT PCRs Done
3,516,905 UART: [art] Populate DV Done
3,524,879 UART: [fht] FMC Alias Private Key: 7
3,525,981 UART: [art] Derive CDI
3,526,261 UART: [art] Store in in slot 0x4
3,612,092 UART: [art] Derive Key Pair
3,612,452 UART: [art] Store priv key in slot 0x5
3,625,618 UART: [art] Derive Key Pair - Done
3,640,118 UART: [art] Signing Cert with AUTHO
3,640,598 UART: RITY.KEYID = 7
3,655,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,371 UART: [art] PUB.X = 48DEEA67F7E12D02310A07D147442445322B3F9A831FB46F09D5CE993EAC572FAA9DA8FB20FE14F9545B0178E94612EE
3,663,134 UART: [art] PUB.Y = 3BAAF66EF6D97E3CE8FF3C370DFEC73DE99653AC7FD8387357097C52B85B9C799636713443E0B2D15CEAF42590AD137B
3,670,090 UART: [art] SIG.R = C5724F774FB5CA7D53F9919A7369336C838577E22081C566FAB225E44AF02385A29E182EDB2E0AF503FAB46D66D60FCF
3,676,857 UART: [art] SIG.S = 306791E1B28CF18267E9EC75E984B2B547E048C8A606BC65FD03EA541A52F09AA2768ABC800942CBA5F74B63FA6F13BB
3,700,323 UART: Caliptra RT
3,700,576 UART: [state] CFI Enabled
3,806,880 UART: [rt] RT listening for mailbox commands...
3,807,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,778 UART: [rt]cmd =0x41544d4e, len=14344
3,937,211 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,443 ready_for_fw is high
1,060,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,059 >>> mbox cmd response: success
3,225,414 UART:
3,225,430 UART: Running Caliptra FMC ...
3,225,838 UART:
3,225,892 UART: [state] CFI Enabled
3,236,290 UART: [fht] FMC Alias Private Key: 7
3,343,768 UART: [art] Extend RT PCRs Done
3,344,196 UART: [art] Lock RT PCRs Done
3,345,762 UART: [art] Populate DV Done
3,353,864 UART: [fht] FMC Alias Private Key: 7
3,354,922 UART: [art] Derive CDI
3,355,202 UART: [art] Store in in slot 0x4
3,440,955 UART: [art] Derive Key Pair
3,441,315 UART: [art] Store priv key in slot 0x5
3,454,765 UART: [art] Derive Key Pair - Done
3,469,420 UART: [art] Signing Cert with AUTHO
3,469,900 UART: RITY.KEYID = 7
3,485,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,777 UART: [art] PUB.X = 8E43CF607A3D84B54548ACC1908AAAD77536EDDFBC78DDE0C0A770449BB455A63A8B3E43BCBBD862FE65630253930A25
3,492,555 UART: [art] PUB.Y = 385FD6C2C0D40D19A6DDACBBBB424BADEA640081F70DF99F0049BEC34561DD50349CD040D52DC2E1EC360391B8307F57
3,499,468 UART: [art] SIG.R = F5769DC9E41C1088E58544284BC117D3987CB77025DDE8FD602F5F94C920816BDADB6C08F6B8E851ECD8CC6832F8FA84
3,506,245 UART: [art] SIG.S = 4993063DA62DA29F7C06C15844F080D5B5753519FAEFE53AC4E39732FA647E1CBF2300145F61D270DF6498751B1C29F3
3,530,538 UART: Caliptra RT
3,530,791 UART: [state] CFI Enabled
3,639,133 UART: [rt] RT listening for mailbox commands...
3,639,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,669 UART: [rt]cmd =0x41544d4e, len=14344
3,768,984 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
893,387 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,512 UART: [kat] ++
897,664 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,402 UART: [fht] FHT @ 0x50003400
1,175,095 UART: [idev] ++
1,175,263 UART: [idev] CDI.KEYID = 6
1,175,623 UART: [idev] SUBJECT.KEYID = 7
1,176,047 UART: [idev] UDS.KEYID = 0
1,176,392 ready_for_fw is high
1,176,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,939 UART: [idev] Erasing UDS.KEYID = 0
1,201,004 UART: [idev] Sha1 KeyId Algorithm
1,209,658 UART: [idev] --
1,210,668 UART: [ldev] ++
1,210,836 UART: [ldev] CDI.KEYID = 6
1,211,199 UART: [ldev] SUBJECT.KEYID = 5
1,211,625 UART: [ldev] AUTHORITY.KEYID = 7
1,212,088 UART: [ldev] FE.KEYID = 1
1,217,216 UART: [ldev] Erasing FE.KEYID = 1
1,243,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,782 UART: [ldev] --
1,283,211 UART: [fwproc] Wait for Commands...
1,284,011 UART: [fwproc] Recv command 0x46574c44
1,284,739 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,319,153 >>> mbox cmd response: success
3,320,395 UART: [afmc] ++
3,320,563 UART: [afmc] CDI.KEYID = 6
3,320,925 UART: [afmc] SUBJECT.KEYID = 7
3,321,350 UART: [afmc] AUTHORITY.KEYID = 5
3,357,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,317 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,026 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,918 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,629 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,510 UART: [afmc] --
3,400,620 UART: [cold-reset] --
3,401,468 UART: [state] Locking Datavault
3,402,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,267 UART: [state] Locking ICCM
3,403,805 UART: [exit] Launching FMC @ 0x40000130
3,409,134 UART:
3,409,150 UART: Running Caliptra FMC ...
3,409,558 UART:
3,409,701 UART: [state] CFI Enabled
3,420,385 UART: [fht] FMC Alias Private Key: 7
3,528,165 UART: [art] Extend RT PCRs Done
3,528,593 UART: [art] Lock RT PCRs Done
3,530,157 UART: [art] Populate DV Done
3,538,643 UART: [fht] FMC Alias Private Key: 7
3,539,615 UART: [art] Derive CDI
3,539,895 UART: [art] Store in in slot 0x4
3,625,442 UART: [art] Derive Key Pair
3,625,802 UART: [art] Store priv key in slot 0x5
3,639,010 UART: [art] Derive Key Pair - Done
3,653,415 UART: [art] Signing Cert with AUTHO
3,653,895 UART: RITY.KEYID = 7
3,668,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,732 UART: [art] PUB.X = 0C991E0E78383DB8B0AF7B3E6018391FFF95FD399BB739185EE75445AD135A225B723932190B42EF88B079867BC41FF2
3,676,493 UART: [art] PUB.Y = 1CAAE30886270E17A779CBE228A8FFB6C0D6E449DB6B59CAA225C9CB142260FB6C2A6FD1BEA6A4F1AE830462AA8C2A43
3,683,456 UART: [art] SIG.R = 1FCA9C4EBA85FD12098CFC88A79BDC6191BAF74566E10A1389C37A9DF038C4BD6F725F746EAA0AC2ABA0E76A57AA748A
3,690,241 UART: [art] SIG.S = E39CE156DA6DD9FA92F096A828538139E0766A9259E11E6BB5FEF7699D7C63C8B2B745BAFCB50E881D6201BE128B84FC
3,714,032 UART: Caliptra RT
3,714,377 UART: [state] CFI Enabled
3,821,893 UART: [rt] RT listening for mailbox commands...
3,822,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,255 UART: [rt]cmd =0x41544d4e, len=14344
3,951,724 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 ready_for_fw is high
1,060,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,398 >>> mbox cmd response: success
3,234,159 UART:
3,234,175 UART: Running Caliptra FMC ...
3,234,583 UART:
3,234,726 UART: [state] CFI Enabled
3,245,176 UART: [fht] FMC Alias Private Key: 7
3,353,002 UART: [art] Extend RT PCRs Done
3,353,430 UART: [art] Lock RT PCRs Done
3,355,066 UART: [art] Populate DV Done
3,363,350 UART: [fht] FMC Alias Private Key: 7
3,364,300 UART: [art] Derive CDI
3,364,580 UART: [art] Store in in slot 0x4
3,450,131 UART: [art] Derive Key Pair
3,450,491 UART: [art] Store priv key in slot 0x5
3,463,461 UART: [art] Derive Key Pair - Done
3,478,318 UART: [art] Signing Cert with AUTHO
3,478,798 UART: RITY.KEYID = 7
3,493,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,251 UART: [art] PUB.X = 52FDB68322F29CEE0443D3C3AEBB4CDBD4C1D3EBF726985FBA64463221DD74688A6070D5E510D8332BB25DFA65D9ED92
3,501,034 UART: [art] PUB.Y = 08E65A410FCF45B56E29C7FAF81C91D591B33A560176F10CB1F17311BF141C1C2D350334723B9F4483762E462B7DF56A
3,507,969 UART: [art] SIG.R = 19A048A3FC7FD5D1AFBB5172DD682537C92FABBFC00D099E69E126EC5575F7D41E3B4515F07D692167E33E563F89B415
3,514,741 UART: [art] SIG.S = 7233BE2B1187CC631D25EBAB4542A1FF4FC8936BBBD76E1F51DFB62B71D1741768AB81F6ABB1ADC0E53A990A127BF3AB
3,539,019 UART: Caliptra RT
3,539,364 UART: [state] CFI Enabled
3,647,965 UART: [rt] RT listening for mailbox commands...
3,648,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,665 UART: [rt]cmd =0x41544d4e, len=14344
3,777,906 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,341 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 ready_for_fw is high
1,173,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,153 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,332 UART: [ldev] ++
1,208,500 UART: [ldev] CDI.KEYID = 6
1,208,864 UART: [ldev] SUBJECT.KEYID = 5
1,209,291 UART: [ldev] AUTHORITY.KEYID = 7
1,209,754 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,196 UART: [ldev] --
1,280,598 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,314,172 >>> mbox cmd response: success
3,315,435 UART: [afmc] ++
3,315,603 UART: [afmc] CDI.KEYID = 6
3,315,966 UART: [afmc] SUBJECT.KEYID = 7
3,316,392 UART: [afmc] AUTHORITY.KEYID = 5
3,351,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,629 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,339 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,229 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,940 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,820 UART: [afmc] --
3,394,764 UART: [cold-reset] --
3,395,678 UART: [state] Locking Datavault
3,396,813 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,417 UART: [state] Locking ICCM
3,398,047 UART: [exit] Launching FMC @ 0x40000130
3,403,376 UART:
3,403,392 UART: Running Caliptra FMC ...
3,403,800 UART:
3,403,854 UART: [state] CFI Enabled
3,414,356 UART: [fht] FMC Alias Private Key: 7
3,521,708 UART: [art] Extend RT PCRs Done
3,522,136 UART: [art] Lock RT PCRs Done
3,523,988 UART: [art] Populate DV Done
3,532,188 UART: [fht] FMC Alias Private Key: 7
3,533,232 UART: [art] Derive CDI
3,533,512 UART: [art] Store in in slot 0x4
3,618,569 UART: [art] Derive Key Pair
3,618,929 UART: [art] Store priv key in slot 0x5
3,631,869 UART: [art] Derive Key Pair - Done
3,646,903 UART: [art] Signing Cert with AUTHO
3,647,383 UART: RITY.KEYID = 7
3,662,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,398 UART: [art] PUB.X = 82F0548DEE275B89EC02A1AF471CD973940E73845C2FE9CA7643C3E75B305587DA1ABA7A542420D9A603B298A2690C82
3,670,158 UART: [art] PUB.Y = A062F1736D287F3EDE195D229F672BF80A5EC0CB41A21FE880B9729BCE299DAAA56F8D1A9645F265D12C680D2C700DE2
3,677,111 UART: [art] SIG.R = 171D5D8A0D1C28A52E3CECC00B8B23F23257D2A326771203562236DA37DC746A1B9389521F0C9BAE954B9D7735F7ADCE
3,683,875 UART: [art] SIG.S = DB687FBEF8FECA516BFC3A1C159469FBB72E71533B0DBA2D8C0B829B48C6A935695FFAE263C7B51F3A2A502D8CD4C330
3,707,736 UART: Caliptra RT
3,707,989 UART: [state] CFI Enabled
3,815,381 UART: [rt] RT listening for mailbox commands...
3,816,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,997 UART: [rt]cmd =0x41544d4e, len=14344
3,945,520 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,510 ready_for_fw is high
1,055,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,167,290 >>> mbox cmd response: success
3,229,069 UART:
3,229,085 UART: Running Caliptra FMC ...
3,229,493 UART:
3,229,547 UART: [state] CFI Enabled
3,239,921 UART: [fht] FMC Alias Private Key: 7
3,347,369 UART: [art] Extend RT PCRs Done
3,347,797 UART: [art] Lock RT PCRs Done
3,348,891 UART: [art] Populate DV Done
3,357,171 UART: [fht] FMC Alias Private Key: 7
3,358,177 UART: [art] Derive CDI
3,358,457 UART: [art] Store in in slot 0x4
3,443,838 UART: [art] Derive Key Pair
3,444,198 UART: [art] Store priv key in slot 0x5
3,456,848 UART: [art] Derive Key Pair - Done
3,471,789 UART: [art] Signing Cert with AUTHO
3,472,269 UART: RITY.KEYID = 7
3,487,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,248 UART: [art] PUB.X = 0481D4DAC01F1DD4FE88E8C2C708B76816FFBDC5F91AA3231EED1B388D50F6DE92EA371A2CBBE59B3EF050F8C599B86F
3,495,036 UART: [art] PUB.Y = 4E660A154C8B4990C14C87B9EC634BDF73F8CC4135409F6DAB18619F266B84A0E042B403B6F7FEC4B87BD55DADDADED8
3,501,998 UART: [art] SIG.R = 8F0345DB80A9650DD8923B01D55B016CFF1C5752867CAA1B0F8CB68C4B4C68015A45D447B5FACEE3960619AC81C81D03
3,508,752 UART: [art] SIG.S = 829C69625FE279A6B08A9F9A281685C746F2C83F835E41F2D39D0BBD5DCDEE4E68434FFFE88A026BA7E7A6AAFC6E52CE
3,532,803 UART: Caliptra RT
3,533,056 UART: [state] CFI Enabled
3,641,083 UART: [rt] RT listening for mailbox commands...
3,641,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,879 UART: [rt]cmd =0x41544d4e, len=14344
3,770,876 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,174,842 ready_for_fw is high
1,174,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,196 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,541 UART: [fwproc] Recv'd Img size: 114084 bytes
3,119,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,312,980 >>> mbox cmd response: success
3,314,199 UART: [afmc] ++
3,314,367 UART: [afmc] CDI.KEYID = 6
3,314,730 UART: [afmc] SUBJECT.KEYID = 7
3,315,156 UART: [afmc] AUTHORITY.KEYID = 5
3,350,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,177 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,887 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,777 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,488 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,236 UART: [afmc] --
3,394,366 UART: [cold-reset] --
3,395,284 UART: [state] Locking Datavault
3,396,509 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,113 UART: [state] Locking ICCM
3,397,735 UART: [exit] Launching FMC @ 0x40000130
3,403,064 UART:
3,403,080 UART: Running Caliptra FMC ...
3,403,488 UART:
3,403,631 UART: [state] CFI Enabled
3,413,871 UART: [fht] FMC Alias Private Key: 7
3,521,863 UART: [art] Extend RT PCRs Done
3,522,291 UART: [art] Lock RT PCRs Done
3,523,941 UART: [art] Populate DV Done
3,532,155 UART: [fht] FMC Alias Private Key: 7
3,533,085 UART: [art] Derive CDI
3,533,365 UART: [art] Store in in slot 0x4
3,618,882 UART: [art] Derive Key Pair
3,619,242 UART: [art] Store priv key in slot 0x5
3,632,524 UART: [art] Derive Key Pair - Done
3,647,137 UART: [art] Signing Cert with AUTHO
3,647,617 UART: RITY.KEYID = 7
3,663,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,780 UART: [art] PUB.X = BEE028C8A4C8B7F3410F0DEA02D44D33F1DEFABE3BCA714D4D4441744E2119C2BBFF4CA2AD05107F351F89CDDE08881F
3,670,559 UART: [art] PUB.Y = 11CA9B05E3EC2329439E85C008344A1352648AEAFBDA40570D639DCCB5691E563011FD573085FF4E7CA81708B763BA19
3,677,499 UART: [art] SIG.R = B7245E93D9F6CC130E7064546FFA993A8A947B182EC1D7C4BC3834780CAD3535494CB2B203A2098BA41522C69B7A7C3A
3,684,261 UART: [art] SIG.S = 594FA1CE4AC433ED43AE347609D623CEF274648B77C09C5D1B5151FB0469DA38482CD4368967BFF05DB9220F0DA08FE0
3,708,424 UART: Caliptra RT
3,708,769 UART: [state] CFI Enabled
3,816,327 UART: [rt] RT listening for mailbox commands...
3,816,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,859 UART: [rt]cmd =0x41544d4e, len=14344
3,946,346 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 ready_for_fw is high
1,056,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,160,295 >>> mbox cmd response: success
3,222,904 UART:
3,222,920 UART: Running Caliptra FMC ...
3,223,328 UART:
3,223,471 UART: [state] CFI Enabled
3,233,819 UART: [fht] FMC Alias Private Key: 7
3,341,383 UART: [art] Extend RT PCRs Done
3,341,811 UART: [art] Lock RT PCRs Done
3,343,351 UART: [art] Populate DV Done
3,351,743 UART: [fht] FMC Alias Private Key: 7
3,352,689 UART: [art] Derive CDI
3,352,969 UART: [art] Store in in slot 0x4
3,438,506 UART: [art] Derive Key Pair
3,438,866 UART: [art] Store priv key in slot 0x5
3,452,304 UART: [art] Derive Key Pair - Done
3,467,317 UART: [art] Signing Cert with AUTHO
3,467,797 UART: RITY.KEYID = 7
3,483,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,942 UART: [art] PUB.X = 7A6D298E3BA63CE2359DF752E2C8D3528D4D9AE4CE1ED869E9436FE6EFDAE4C4E2B62EA5EEC635603DC1A5FF84BED1D1
3,490,740 UART: [art] PUB.Y = 22C105FD1C946B73F14496840DE659035DF7932E97483943360BE1748850B23AB0942DEA5E110C8748A0F53213B3E460
3,497,663 UART: [art] SIG.R = 057B558D803AEFA4654BD1E060EB587C3C0626ADA153AAD5C716AE8B7CC57AB6DD0730E3716907129CFADD8BC51DF363
3,504,437 UART: [art] SIG.S = B264D057BCC34544553150B1DC7516AE8015296CFEB14C269FFE74BE81A1ECE0DD38AAA29CCC1CDA03C435299C9BE386
3,528,451 UART: Caliptra RT
3,528,796 UART: [state] CFI Enabled
3,636,670 UART: [rt] RT listening for mailbox commands...
3,637,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,462 UART: [rt]cmd =0x41544d4e, len=14344
3,766,701 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,300 UART:
192,672 UART: Running Caliptra ROM ...
193,775 UART:
193,922 UART: [state] CFI Enabled
265,459 UART: [state] LifecycleState = Unprovisioned
267,380 UART: [state] DebugLocked = No
269,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,977 UART: [kat] SHA2-256
444,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,213 UART: [kat] ++
455,664 UART: [kat] sha1
467,600 UART: [kat] SHA2-256
470,250 UART: [kat] SHA2-384
476,452 UART: [kat] SHA2-512-ACC
478,835 UART: [kat] ECC-384
2,767,649 UART: [kat] HMAC-384Kdf
2,780,024 UART: [kat] LMS
3,970,279 UART: [kat] --
3,973,739 UART: [cold-reset] ++
3,975,534 UART: [fht] Storing FHT @ 0x50003400
3,986,587 UART: [idev] ++
3,987,229 UART: [idev] CDI.KEYID = 6
3,988,110 UART: [idev] SUBJECT.KEYID = 7
3,989,348 UART: [idev] UDS.KEYID = 0
3,990,335 ready_for_fw is high
3,990,525 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,639 UART: [idev] Erasing UDS.KEYID = 0
7,328,368 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,969 UART: [idev] --
7,354,394 UART: [ldev] ++
7,354,984 UART: [ldev] CDI.KEYID = 6
7,355,968 UART: [ldev] SUBJECT.KEYID = 5
7,357,071 UART: [ldev] AUTHORITY.KEYID = 7
7,358,409 UART: [ldev] FE.KEYID = 1
7,403,078 UART: [ldev] Erasing FE.KEYID = 1
10,737,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,383 UART: [ldev] --
13,096,165 UART: [fwproc] Waiting for Commands...
13,097,773 UART: [fwproc] Received command 0x46574c44
13,099,957 UART: [fwproc] Received Image of size 113760 bytes
22,047,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,128,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,197,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,513,645 >>> mbox cmd response: success
22,518,499 UART: [afmc] ++
22,519,093 UART: [afmc] CDI.KEYID = 6
22,519,979 UART: [afmc] SUBJECT.KEYID = 7
22,521,250 UART: [afmc] AUTHORITY.KEYID = 5
25,894,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,194,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,196,268 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,210,844 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,225,574 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,239,821 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,261,906 UART: [afmc] --
28,266,157 UART: [cold-reset] --
28,267,964 UART: [state] Locking Datavault
28,271,436 UART: [state] Locking PCR0, PCR1 and PCR31
28,273,206 UART: [state] Locking ICCM
28,274,254 UART: [exit] Launching FMC @ 0x40000130
28,282,645 UART:
28,282,878 UART: Running Caliptra FMC ...
28,283,903 UART:
28,284,050 UART: [state] CFI Enabled
28,353,264 UART: [fht] FMC Alias Private Key: 7
30,691,705 UART: [art] Extend RT PCRs Done
30,692,923 UART: [art] Lock RT PCRs Done
30,694,632 UART: [art] Populate DV Done
30,700,317 UART: [fht] FMC Alias Private Key: 7
30,701,803 UART: [art] Derive CDI
30,702,565 UART: [art] Store in in slot 0x4
30,764,040 UART: [art] Derive Key Pair
30,765,078 UART: [art] Store priv key in slot 0x5
34,057,831 UART: [art] Derive Key Pair - Done
34,070,688 UART: [art] Signing Cert with AUTHO
34,071,994 UART: RITY.KEYID = 7
36,359,229 UART: [art] Erasing AUTHORITY.KEYID = 7
36,360,736 UART: [art] PUB.X = 38029573AD1EC2734DFCBFCF3E517A3760E2BDEBD700A56548CB6567C1A0FB06FD12115AD2A548B597BA7A2B2F0B5AC9
36,368,041 UART: [art] PUB.Y = 35485C8CB439443EA1EB6E3028861FFD569591076C5D09FCDB66AE241A1E2DC368C453B5C4F506B7547445BEA7BD56DB
36,375,275 UART: [art] SIG.R = B1E7DDDD8602C57E38B5A5D17EF34B209E15EC91C0CFF3EDBAAB402E1F92B7BDF4FB884A57139DB0F184FE416020BFC6
36,382,720 UART: [art] SIG.S = 72960FED4E2F6D7DD26EA766188A6D88BA2F55F9239DE3FC7F531729FE7BD9CC9AAC7EB31F3CAB6F46C3099EA64D0FE0
37,687,815 UART: Caliptra RT
37,688,521 UART: [state] CFI Enabled
37,850,073 UART: [rt] RT listening for mailbox commands...
37,852,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,007,669 UART: [rt]cmd =0x41544d4e, len=14344
39,300,730 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,803,891 ready_for_fw is high
3,804,485 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,176,614 >>> mbox cmd response: success
27,868,230 UART:
27,868,623 UART: Running Caliptra FMC ...
27,869,728 UART:
27,869,888 UART: [state] CFI Enabled
27,920,617 UART: [fht] FMC Alias Private Key: 7
30,257,995 UART: [art] Extend RT PCRs Done
30,259,222 UART: [art] Lock RT PCRs Done
30,260,728 UART: [art] Populate DV Done
30,266,078 UART: [fht] FMC Alias Private Key: 7
30,267,628 UART: [art] Derive CDI
30,268,365 UART: [art] Store in in slot 0x4
30,328,430 UART: [art] Derive Key Pair
30,329,472 UART: [art] Store priv key in slot 0x5
33,622,267 UART: [art] Derive Key Pair - Done
33,635,268 UART: [art] Signing Cert with AUTHO
33,636,594 UART: RITY.KEYID = 7
35,924,226 UART: [art] Erasing AUTHORITY.KEYID = 7
35,925,735 UART: [art] PUB.X = BD1ED8FD37D613C09DC25E33E5F64F07636E07644C656BC0AE8DF4326869119A9D58E2D1D5886DAB967EE705516EC6B9
35,932,991 UART: [art] PUB.Y = 56AD9A7DB0D4C98A2AD0726A37D647380C8C75BD6415A0B4CE2502B323E0A6BBC8DB79D42BBA854BD5465D2CF171C8CB
35,940,268 UART: [art] SIG.R = 5AABBA7005D80B855717186A3DF3EF07510D651CB4420880C90057BFDBFB0C17C033E2911788C5A6B45F945644706537
35,947,617 UART: [art] SIG.S = 8FA263A7CBEB08D647852A8008EA2B51B0B6B0402881236BA256063B168A27CCA3E0CC1480C51CF4BCBC6768668D7B71
37,253,006 UART: Caliptra RT
37,253,709 UART: [state] CFI Enabled
37,414,827 UART: [rt] RT listening for mailbox commands...
37,417,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,572,459 UART: [rt]cmd =0x41544d4e, len=14344
38,865,320 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,639 writing to cptra_bootfsm_go
192,925 UART:
193,358 UART: Running Caliptra ROM ...
194,570 UART:
604,011 UART: [state] CFI Enabled
616,469 UART: [state] LifecycleState = Unprovisioned
618,436 UART: [state] DebugLocked = No
619,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,328 UART: [kat] SHA2-256
794,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,640 UART: [kat] ++
805,315 UART: [kat] sha1
815,641 UART: [kat] SHA2-256
818,368 UART: [kat] SHA2-384
823,790 UART: [kat] SHA2-512-ACC
826,227 UART: [kat] ECC-384
3,109,466 UART: [kat] HMAC-384Kdf
3,122,138 UART: [kat] LMS
4,312,209 UART: [kat] --
4,317,512 UART: [cold-reset] ++
4,319,662 UART: [fht] Storing FHT @ 0x50003400
4,331,027 UART: [idev] ++
4,331,662 UART: [idev] CDI.KEYID = 6
4,332,579 UART: [idev] SUBJECT.KEYID = 7
4,333,825 UART: [idev] UDS.KEYID = 0
4,334,897 ready_for_fw is high
4,335,099 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,839 UART: [idev] Erasing UDS.KEYID = 0
7,619,423 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,384 UART: [idev] --
7,645,367 UART: [ldev] ++
7,645,935 UART: [ldev] CDI.KEYID = 6
7,646,900 UART: [ldev] SUBJECT.KEYID = 5
7,648,109 UART: [ldev] AUTHORITY.KEYID = 7
7,649,389 UART: [ldev] FE.KEYID = 1
7,659,705 UART: [ldev] Erasing FE.KEYID = 1
10,947,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,704 UART: [ldev] --
13,304,487 UART: [fwproc] Waiting for Commands...
13,307,867 UART: [fwproc] Received command 0x46574c44
13,310,050 UART: [fwproc] Received Image of size 113760 bytes
22,261,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,340,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,409,460 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,726,064 >>> mbox cmd response: success
22,729,168 UART: [afmc] ++
22,729,822 UART: [afmc] CDI.KEYID = 6
22,730,731 UART: [afmc] SUBJECT.KEYID = 7
22,731,949 UART: [afmc] AUTHORITY.KEYID = 5
26,044,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,339,675 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,341,939 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,356,488 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,371,234 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,385,446 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,407,943 UART: [afmc] --
28,410,939 UART: [cold-reset] --
28,413,618 UART: [state] Locking Datavault
28,419,726 UART: [state] Locking PCR0, PCR1 and PCR31
28,421,424 UART: [state] Locking ICCM
28,423,407 UART: [exit] Launching FMC @ 0x40000130
28,431,804 UART:
28,432,044 UART: Running Caliptra FMC ...
28,433,145 UART:
28,433,303 UART: [state] CFI Enabled
28,441,263 UART: [fht] FMC Alias Private Key: 7
30,771,775 UART: [art] Extend RT PCRs Done
30,772,994 UART: [art] Lock RT PCRs Done
30,774,639 UART: [art] Populate DV Done
30,780,098 UART: [fht] FMC Alias Private Key: 7
30,781,859 UART: [art] Derive CDI
30,782,594 UART: [art] Store in in slot 0x4
30,825,079 UART: [art] Derive Key Pair
30,826,118 UART: [art] Store priv key in slot 0x5
34,068,082 UART: [art] Derive Key Pair - Done
34,081,141 UART: [art] Signing Cert with AUTHO
34,082,445 UART: RITY.KEYID = 7
36,361,794 UART: [art] Erasing AUTHORITY.KEYID = 7
36,363,302 UART: [art] PUB.X = F179F1D5358A4F39FC8BF936DB0178ACF8CB1D036B24EF91C1F2002F5A2D872ECB13D91E94DFB79FF638C75DB96778D6
36,370,522 UART: [art] PUB.Y = DFD8CFA0D327BBDFE201A339B946842249006A62542234191B786A07ABB308D34ABD15B19D6B8083A8C41791BDFE729F
36,377,785 UART: [art] SIG.R = E8C397A387316D3A657A031BD5FF59FB182A0DBF8CF88C0CFF48684F16C8CC721BB953C71001CC48402417BE18FDFA4D
36,385,149 UART: [art] SIG.S = 910EE20304CAB116CEF019E9C2C3EE6773429FBB363A8970A2DFE427EF351D4D7CB860E154C487B98CAD19450EC6DC92
37,690,220 UART: Caliptra RT
37,690,933 UART: [state] CFI Enabled
37,808,970 UART: [rt] RT listening for mailbox commands...
37,811,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,966,586 UART: [rt]cmd =0x41544d4e, len=14344
39,259,664 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
4,130,837 ready_for_fw is high
4,131,271 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,581,802 >>> mbox cmd response: success
28,223,596 UART:
28,223,981 UART: Running Caliptra FMC ...
28,225,096 UART:
28,225,261 UART: [state] CFI Enabled
28,233,083 UART: [fht] FMC Alias Private Key: 7
30,564,162 UART: [art] Extend RT PCRs Done
30,565,389 UART: [art] Lock RT PCRs Done
30,567,359 UART: [art] Populate DV Done
30,572,446 UART: [fht] FMC Alias Private Key: 7
30,574,155 UART: [art] Derive CDI
30,574,972 UART: [art] Store in in slot 0x4
30,617,370 UART: [art] Derive Key Pair
30,618,412 UART: [art] Store priv key in slot 0x5
33,860,303 UART: [art] Derive Key Pair - Done
33,873,089 UART: [art] Signing Cert with AUTHO
33,874,579 UART: RITY.KEYID = 7
36,154,034 UART: [art] Erasing AUTHORITY.KEYID = 7
36,155,556 UART: [art] PUB.X = C21B665EFE88EA07D778096D7D39388BA51AF1CAA40A8B86732529C4C65A00C096217B2C709B43A06C640E0F838DA8E3
36,162,794 UART: [art] PUB.Y = 917076569978484061B0A652F736D3BF881E39ECE8A920E4382CD079D9219E79615D092918E4DB178C0470B4499C3169
36,170,047 UART: [art] SIG.R = 25AB19EB9FADDB93E2CD33EB1FCDA1F0154CF56B49002ABF7FE93BBC1EF36D7CB780B14CB4229D3E83C182901DC646F1
36,177,445 UART: [art] SIG.S = 7634393D75F4885FC541AF4479EC1D0973CAE4EDA9554990D91802776D1D9116F984FAEEB2E52A728CF88CBDBFC00835
37,483,207 UART: Caliptra RT
37,483,915 UART: [state] CFI Enabled
37,602,079 UART: [rt] RT listening for mailbox commands...
37,604,371 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,759,901 UART: [rt]cmd =0x41544d4e, len=14344
39,053,057 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
192,715 UART:
193,083 UART: Running Caliptra ROM ...
194,180 UART:
194,320 UART: [state] CFI Enabled
265,287 UART: [state] LifecycleState = Unprovisioned
267,199 UART: [state] DebugLocked = No
269,232 UART: [state] WD Timer not started. Device not locked for debugging
273,208 UART: [kat] SHA2-256
452,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,959 UART: [kat] ++
464,496 UART: [kat] sha1
474,389 UART: [kat] SHA2-256
477,392 UART: [kat] SHA2-384
482,239 UART: [kat] SHA2-512-ACC
485,240 UART: [kat] ECC-384
2,946,921 UART: [kat] HMAC-384Kdf
2,972,805 UART: [kat] LMS
3,502,248 UART: [kat] --
3,507,820 UART: [cold-reset] ++
3,510,330 UART: [fht] FHT @ 0x50003400
3,519,902 UART: [idev] ++
3,520,467 UART: [idev] CDI.KEYID = 6
3,521,373 UART: [idev] SUBJECT.KEYID = 7
3,522,613 UART: [idev] UDS.KEYID = 0
3,523,534 ready_for_fw is high
3,523,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,333 UART: [idev] Erasing UDS.KEYID = 0
6,025,824 UART: [idev] Sha1 KeyId Algorithm
6,048,506 UART: [idev] --
6,052,232 UART: [ldev] ++
6,052,802 UART: [ldev] CDI.KEYID = 6
6,053,716 UART: [ldev] SUBJECT.KEYID = 5
6,055,074 UART: [ldev] AUTHORITY.KEYID = 7
6,056,286 UART: [ldev] FE.KEYID = 1
6,101,395 UART: [ldev] Erasing FE.KEYID = 1
8,601,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,150 UART: [ldev] --
10,392,393 UART: [fwproc] Wait for Commands...
10,395,346 UART: [fwproc] Recv command 0x46574c44
10,397,377 UART: [fwproc] Recv'd Img size: 114084 bytes
14,974,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,050,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,119,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,436,491 >>> mbox cmd response: success
15,441,185 UART: [afmc] ++
15,441,783 UART: [afmc] CDI.KEYID = 6
15,442,689 UART: [afmc] SUBJECT.KEYID = 7
15,443,903 UART: [afmc] AUTHORITY.KEYID = 5
17,980,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,708,025 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,723,953 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,739,945 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,755,730 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,777,924 UART: [afmc] --
19,780,865 UART: [cold-reset] --
19,785,036 UART: [state] Locking Datavault
19,791,359 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,997 UART: [state] Locking ICCM
19,794,474 UART: [exit] Launching FMC @ 0x40000130
19,802,917 UART:
19,803,156 UART: Running Caliptra FMC ...
19,804,197 UART:
19,804,346 UART: [state] CFI Enabled
19,864,556 UART: [fht] FMC Alias Private Key: 7
21,628,450 UART: [art] Extend RT PCRs Done
21,629,668 UART: [art] Lock RT PCRs Done
21,631,457 UART: [art] Populate DV Done
21,636,810 UART: [fht] FMC Alias Private Key: 7
21,638,398 UART: [art] Derive CDI
21,639,207 UART: [art] Store in in slot 0x4
21,697,595 UART: [art] Derive Key Pair
21,698,626 UART: [art] Store priv key in slot 0x5
24,161,546 UART: [art] Derive Key Pair - Done
24,174,377 UART: [art] Signing Cert with AUTHO
24,175,672 UART: RITY.KEYID = 7
25,887,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,889,326 UART: [art] PUB.X = FB7407328C5F1788C823BD779B1024EEE41EEEDE754FA41772FB3D4956D5375469CF83FBA585DCD298D394BEB0160861
25,896,650 UART: [art] PUB.Y = 55F4C47BAB09971DFA9DF9258B91338E333FFBB8A8A02888A66D0F67209ADCA049DE07817FD24677BD475A1BD503E083
25,903,870 UART: [art] SIG.R = 76BE119B4E6214998BF6701E2AC92372107BD68CE23FADA19DAE5159672E1803996D751EC285058E3A0A509CB8A181D9
25,911,270 UART: [art] SIG.S = 62C54BC932B17B35062497AD86C0B5EADB2726B9CDAEB3B514546FF6591234EF07DB4D00B0A4B824778ACAE099015F8A
26,890,524 UART: Caliptra RT
26,891,213 UART: [state] CFI Enabled
27,056,698 UART: [rt] RT listening for mailbox commands...
27,059,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,214,254 UART: [rt]cmd =0x41544d4e, len=14344
28,181,385 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,378,587 ready_for_fw is high
3,379,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,052,602 >>> mbox cmd response: success
19,366,193 UART:
19,366,601 UART: Running Caliptra FMC ...
19,367,701 UART:
19,367,851 UART: [state] CFI Enabled
19,435,528 UART: [fht] FMC Alias Private Key: 7
21,199,023 UART: [art] Extend RT PCRs Done
21,200,251 UART: [art] Lock RT PCRs Done
21,201,851 UART: [art] Populate DV Done
21,207,290 UART: [fht] FMC Alias Private Key: 7
21,208,931 UART: [art] Derive CDI
21,209,663 UART: [art] Store in in slot 0x4
21,267,616 UART: [art] Derive Key Pair
21,268,654 UART: [art] Store priv key in slot 0x5
23,731,428 UART: [art] Derive Key Pair - Done
23,744,101 UART: [art] Signing Cert with AUTHO
23,745,400 UART: RITY.KEYID = 7
25,456,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,458,011 UART: [art] PUB.X = CF40CD0DD3DA6371D0BFCFFDA3543681D64A2387EDA263AF97F386D078F794C25CA81B140A0FB88F5E3B897C324A9AA9
25,465,329 UART: [art] PUB.Y = 24965F06CFC37DEA3D794C0C3DA903816165059BD515B19BB92FE090817CF007CAA13E9D967E1CD0A46A504400DF1D35
25,472,572 UART: [art] SIG.R = 8C8436DD260A0E13BA9BBC69AC0FDF07359741A9F05193F58AA768ECB0C5A7A63A6F5606B5EAFEF7361D72423AC5437D
25,480,006 UART: [art] SIG.S = 9535AED41304CE238B5AA018F3A3C607EE1CA486D872310DB7990508CF689DFB30154752A09A503436E3891079414CAD
26,459,179 UART: Caliptra RT
26,459,889 UART: [state] CFI Enabled
26,622,955 UART: [rt] RT listening for mailbox commands...
26,625,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,780,603 UART: [rt]cmd =0x41544d4e, len=14344
27,747,455 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
193,134 UART:
193,510 UART: Running Caliptra ROM ...
194,687 UART:
604,329 UART: [state] CFI Enabled
616,924 UART: [state] LifecycleState = Unprovisioned
618,790 UART: [state] DebugLocked = No
621,162 UART: [state] WD Timer not started. Device not locked for debugging
625,003 UART: [kat] SHA2-256
804,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,685 UART: [kat] ++
816,158 UART: [kat] sha1
827,603 UART: [kat] SHA2-256
830,610 UART: [kat] SHA2-384
837,028 UART: [kat] SHA2-512-ACC
839,976 UART: [kat] ECC-384
3,283,284 UART: [kat] HMAC-384Kdf
3,296,753 UART: [kat] LMS
3,826,305 UART: [kat] --
3,830,309 UART: [cold-reset] ++
3,831,180 UART: [fht] FHT @ 0x50003400
3,842,372 UART: [idev] ++
3,842,950 UART: [idev] CDI.KEYID = 6
3,843,863 UART: [idev] SUBJECT.KEYID = 7
3,845,036 UART: [idev] UDS.KEYID = 0
3,846,087 ready_for_fw is high
3,846,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,560 UART: [idev] Erasing UDS.KEYID = 0
6,317,761 UART: [idev] Sha1 KeyId Algorithm
6,340,212 UART: [idev] --
6,344,169 UART: [ldev] ++
6,344,750 UART: [ldev] CDI.KEYID = 6
6,345,669 UART: [ldev] SUBJECT.KEYID = 5
6,346,828 UART: [ldev] AUTHORITY.KEYID = 7
6,348,120 UART: [ldev] FE.KEYID = 1
6,358,688 UART: [ldev] Erasing FE.KEYID = 1
8,835,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,096 UART: [ldev] --
10,627,202 UART: [fwproc] Wait for Commands...
10,629,266 UART: [fwproc] Recv command 0x46574c44
10,631,374 UART: [fwproc] Recv'd Img size: 114084 bytes
15,214,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,294,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,362,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,680,629 >>> mbox cmd response: success
15,684,138 UART: [afmc] ++
15,684,738 UART: [afmc] CDI.KEYID = 6
15,685,659 UART: [afmc] SUBJECT.KEYID = 7
15,686,880 UART: [afmc] AUTHORITY.KEYID = 5
18,188,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,907,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,909,393 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,925,368 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,941,292 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,957,063 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,980,577 UART: [afmc] --
19,983,588 UART: [cold-reset] --
19,988,161 UART: [state] Locking Datavault
19,994,274 UART: [state] Locking PCR0, PCR1 and PCR31
19,995,920 UART: [state] Locking ICCM
19,997,233 UART: [exit] Launching FMC @ 0x40000130
20,005,681 UART:
20,005,933 UART: Running Caliptra FMC ...
20,007,045 UART:
20,007,227 UART: [state] CFI Enabled
20,015,017 UART: [fht] FMC Alias Private Key: 7
21,771,517 UART: [art] Extend RT PCRs Done
21,772,725 UART: [art] Lock RT PCRs Done
21,774,352 UART: [art] Populate DV Done
21,779,479 UART: [fht] FMC Alias Private Key: 7
21,781,135 UART: [art] Derive CDI
21,781,972 UART: [art] Store in in slot 0x4
21,824,796 UART: [art] Derive Key Pair
21,825,801 UART: [art] Store priv key in slot 0x5
24,252,453 UART: [art] Derive Key Pair - Done
24,265,368 UART: [art] Signing Cert with AUTHO
24,266,702 UART: RITY.KEYID = 7
25,971,868 UART: [art] Erasing AUTHORITY.KEYID = 7
25,973,362 UART: [art] PUB.X = EFDD22E0A791BE8AE925385327F697BD19434C8A06B678A4DF4A6D9396CCA6F7128023509247A098F2159CF86E6C2403
25,980,640 UART: [art] PUB.Y = B26510B091BB9E545CE979BD30F341207887A1DD79A938A6EE576E617C866DFE7F7D0A38EC883ED71F332CCF638D1E91
25,987,910 UART: [art] SIG.R = 6E97BBCCC0CAB4FD668C6770536823A0D235C931BEB66FD4ACEBA39B75965F13666780CD63E8F35947401513D5418F32
25,995,277 UART: [art] SIG.S = 31854F08396297E0C762FEC3C8B48EEB9C33270136AB30438871A01EABD6D82DBA701B1524DAF8CE098F60C18EB9D123
26,974,301 UART: Caliptra RT
26,975,149 UART: [state] CFI Enabled
27,092,250 UART: [rt] RT listening for mailbox commands...
27,094,569 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,249,928 UART: [rt]cmd =0x41544d4e, len=14344
28,217,111 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,965 writing to cptra_bootfsm_go
3,700,232 ready_for_fw is high
3,700,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,231,866 >>> mbox cmd response: success
19,484,068 UART:
19,484,522 UART: Running Caliptra FMC ...
19,485,626 UART:
19,485,791 UART: [state] CFI Enabled
19,493,678 UART: [fht] FMC Alias Private Key: 7
21,250,401 UART: [art] Extend RT PCRs Done
21,251,635 UART: [art] Lock RT PCRs Done
21,253,103 UART: [art] Populate DV Done
21,258,711 UART: [fht] FMC Alias Private Key: 7
21,260,359 UART: [art] Derive CDI
21,261,178 UART: [art] Store in in slot 0x4
21,303,862 UART: [art] Derive Key Pair
21,304,910 UART: [art] Store priv key in slot 0x5
23,731,415 UART: [art] Derive Key Pair - Done
23,744,787 UART: [art] Signing Cert with AUTHO
23,746,102 UART: RITY.KEYID = 7
25,451,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,453,086 UART: [art] PUB.X = 36A4930EC34AF0C204CC3744786C4F7D4A633BC2113A9E2BBD290A143CA07E37B016DD683A1D42AC9C0301BB7D64ECDD
25,460,373 UART: [art] PUB.Y = 623D890CE43E29B9D3DE58141A2037010443CD671E8794D89BF0D98B3836AC57F0F953002EB6CC8A2DB3B1B4A7698232
25,467,611 UART: [art] SIG.R = 4F318641CDCE397FB1B377F8251735B9BBCFDEE7D73EB5866A2A67ED24223692F4389F09DEA2F10FF1C0D9AACC4DBCDE
25,475,039 UART: [art] SIG.S = 80F30EC491472308B4E7E9A63648F5A3162581917F2C0CB2A7BF0B36803E39502B29DF114B8294BACF7F4276667957D6
26,454,153 UART: Caliptra RT
26,454,854 UART: [state] CFI Enabled
26,570,959 UART: [rt] RT listening for mailbox commands...
26,573,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,728,568 UART: [rt]cmd =0x41544d4e, len=14344
27,695,732 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,567 UART:
192,934 UART: Running Caliptra ROM ...
194,043 UART:
194,193 UART: [state] CFI Enabled
265,196 UART: [state] LifecycleState = Unprovisioned
267,632 UART: [state] DebugLocked = No
270,361 UART: [state] WD Timer not started. Device not locked for debugging
275,670 UART: [kat] SHA2-256
465,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,317 UART: [kat] ++
476,762 UART: [kat] sha1
486,596 UART: [kat] SHA2-256
489,644 UART: [kat] SHA2-384
495,640 UART: [kat] SHA2-512-ACC
498,233 UART: [kat] ECC-384
2,946,584 UART: [kat] HMAC-384Kdf
2,971,685 UART: [kat] LMS
3,503,418 UART: [kat] --
3,506,910 UART: [cold-reset] ++
3,508,054 UART: [fht] FHT @ 0x50003400
3,520,443 UART: [idev] ++
3,521,157 UART: [idev] CDI.KEYID = 6
3,522,045 UART: [idev] SUBJECT.KEYID = 7
3,523,292 UART: [idev] UDS.KEYID = 0
3,524,394 ready_for_fw is high
3,524,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,223 UART: [idev] Erasing UDS.KEYID = 0
6,025,914 UART: [idev] Sha1 KeyId Algorithm
6,047,527 UART: [idev] --
6,053,026 UART: [ldev] ++
6,053,767 UART: [ldev] CDI.KEYID = 6
6,054,659 UART: [ldev] SUBJECT.KEYID = 5
6,055,737 UART: [ldev] AUTHORITY.KEYID = 7
6,056,937 UART: [ldev] FE.KEYID = 1
6,099,333 UART: [ldev] Erasing FE.KEYID = 1
8,604,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,420 UART: [ldev] --
10,412,121 UART: [fwproc] Wait for Commands...
10,414,325 UART: [fwproc] Recv command 0x46574c44
10,416,587 UART: [fwproc] Recv'd Img size: 114084 bytes
15,025,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,104,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,220,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,760,971 >>> mbox cmd response: success
15,765,125 UART: [afmc] ++
15,765,853 UART: [afmc] CDI.KEYID = 6
15,766,963 UART: [afmc] SUBJECT.KEYID = 7
15,768,521 UART: [afmc] AUTHORITY.KEYID = 5
18,303,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,027,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,029,826 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,044,887 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,060,090 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,074,901 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,099,423 UART: [afmc] --
20,102,488 UART: [cold-reset] --
20,105,284 UART: [state] Locking Datavault
20,111,735 UART: [state] Locking PCR0, PCR1 and PCR31
20,113,888 UART: [state] Locking ICCM
20,116,281 UART: [exit] Launching FMC @ 0x40000130
20,124,965 UART:
20,125,199 UART: Running Caliptra FMC ...
20,126,223 UART:
20,126,367 UART: [state] CFI Enabled
20,182,640 UART: [fht] FMC Alias Private Key: 7
21,946,691 UART: [art] Extend RT PCRs Done
21,947,910 UART: [art] Lock RT PCRs Done
21,949,726 UART: [art] Populate DV Done
21,955,244 UART: [fht] FMC Alias Private Key: 7
21,956,994 UART: [art] Derive CDI
21,957,805 UART: [art] Store in in slot 0x4
22,015,688 UART: [art] Derive Key Pair
22,016,725 UART: [art] Store priv key in slot 0x5
24,481,566 UART: [art] Derive Key Pair - Done
24,494,464 UART: [art] Signing Cert with AUTHO
24,495,792 UART: RITY.KEYID = 7
26,207,047 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,560 UART: [art] PUB.X = 26D424875B582A8804296F2A99C02D6FA85E4FBD22BF7664D27E83DDA47C919D43A79407C711284EEA8077B353023159
26,215,826 UART: [art] PUB.Y = 9AC75BFB6081AC9A7452FDE5C2871521122BFADB06E0479FDA7A2366992145AA0A1F1D435C1F1E9326B7CE7C44E8ABB2
26,223,074 UART: [art] SIG.R = 23E84AE348EF7705C6A87A55778B41AC83F534C800C212F8B3D1E3AD281B750F185C6D1650D9D1724DFC803D775F097B
26,230,465 UART: [art] SIG.S = C36F47EE9C27E3A7CAA95BFA8D896CCBA7E3BA9F826ED1E8A21B7D36DB4D5682F20BD9C7C2E2B3387F785CBCEFB49659
27,209,923 UART: Caliptra RT
27,210,609 UART: [state] CFI Enabled
27,374,260 UART: [rt] RT listening for mailbox commands...
27,376,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,745 UART: [rt]cmd =0x41544d4e, len=14344
28,498,599 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,437,828 ready_for_fw is high
3,438,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,851,292 >>> mbox cmd response: success
20,144,896 UART:
20,145,303 UART: Running Caliptra FMC ...
20,146,477 UART:
20,146,643 UART: [state] CFI Enabled
20,211,915 UART: [fht] FMC Alias Private Key: 7
21,975,938 UART: [art] Extend RT PCRs Done
21,977,157 UART: [art] Lock RT PCRs Done
21,978,729 UART: [art] Populate DV Done
21,984,194 UART: [fht] FMC Alias Private Key: 7
21,985,895 UART: [art] Derive CDI
21,986,704 UART: [art] Store in in slot 0x4
22,044,883 UART: [art] Derive Key Pair
22,045,931 UART: [art] Store priv key in slot 0x5
24,508,706 UART: [art] Derive Key Pair - Done
24,521,538 UART: [art] Signing Cert with AUTHO
24,522,837 UART: RITY.KEYID = 7
26,235,154 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,673 UART: [art] PUB.X = 686EFF951A997CC5DD09EF7603733FDBB00BBFA231DAF91044446A762D8655FD87951ACF4FA264A96CDB8590FB1A68AE
26,243,912 UART: [art] PUB.Y = 2C673C80228B4C972229402F7064927DBA45AA609B1B212725915EDD3651B38BE2745FEBD518878E5D2BEE9111210411
26,251,168 UART: [art] SIG.R = 2ECFA62C2B6AB4D0287FEF94C1EEE7BCE0DE40AAF0E35909A34473B0A84C6E210B360BBD2D6DFB7C6E2DE686599060B6
26,258,648 UART: [art] SIG.S = 550A31DDF09B99BA5D62BCC06D2723EB247613FAF2CCB677B1B2D3CC30A7016B62254078713E2A29973FDA7E1AF93175
27,237,632 UART: Caliptra RT
27,238,323 UART: [state] CFI Enabled
27,402,147 UART: [rt] RT listening for mailbox commands...
27,404,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,559,811 UART: [rt]cmd =0x41544d4e, len=14344
28,526,276 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
192,749 UART:
193,135 UART: Running Caliptra ROM ...
194,236 UART:
603,851 UART: [state] CFI Enabled
619,657 UART: [state] LifecycleState = Unprovisioned
622,033 UART: [state] DebugLocked = No
624,071 UART: [state] WD Timer not started. Device not locked for debugging
627,895 UART: [kat] SHA2-256
817,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,578 UART: [kat] ++
829,067 UART: [kat] sha1
840,160 UART: [kat] SHA2-256
843,185 UART: [kat] SHA2-384
848,336 UART: [kat] SHA2-512-ACC
850,921 UART: [kat] ECC-384
3,293,236 UART: [kat] HMAC-384Kdf
3,306,191 UART: [kat] LMS
3,837,980 UART: [kat] --
3,843,054 UART: [cold-reset] ++
3,844,715 UART: [fht] FHT @ 0x50003400
3,855,417 UART: [idev] ++
3,856,121 UART: [idev] CDI.KEYID = 6
3,857,077 UART: [idev] SUBJECT.KEYID = 7
3,858,252 UART: [idev] UDS.KEYID = 0
3,859,183 ready_for_fw is high
3,859,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,766 UART: [idev] Erasing UDS.KEYID = 0
6,334,332 UART: [idev] Sha1 KeyId Algorithm
6,357,314 UART: [idev] --
6,363,419 UART: [ldev] ++
6,364,104 UART: [ldev] CDI.KEYID = 6
6,365,014 UART: [ldev] SUBJECT.KEYID = 5
6,366,175 UART: [ldev] AUTHORITY.KEYID = 7
6,367,407 UART: [ldev] FE.KEYID = 1
6,379,405 UART: [ldev] Erasing FE.KEYID = 1
8,856,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,033 UART: [ldev] --
10,648,318 UART: [fwproc] Wait for Commands...
10,650,259 UART: [fwproc] Recv command 0x46574c44
10,652,570 UART: [fwproc] Recv'd Img size: 114084 bytes
15,263,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,343,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,459,594 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,001,139 >>> mbox cmd response: success
16,005,587 UART: [afmc] ++
16,006,304 UART: [afmc] CDI.KEYID = 6
16,007,506 UART: [afmc] SUBJECT.KEYID = 7
16,008,956 UART: [afmc] AUTHORITY.KEYID = 5
18,513,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,233,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,235,649 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,250,738 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,265,973 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,280,790 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,303,639 UART: [afmc] --
20,308,046 UART: [cold-reset] --
20,312,215 UART: [state] Locking Datavault
20,316,912 UART: [state] Locking PCR0, PCR1 and PCR31
20,319,075 UART: [state] Locking ICCM
20,320,148 UART: [exit] Launching FMC @ 0x40000130
20,328,773 UART:
20,329,020 UART: Running Caliptra FMC ...
20,330,131 UART:
20,330,296 UART: [state] CFI Enabled
20,338,511 UART: [fht] FMC Alias Private Key: 7
22,095,190 UART: [art] Extend RT PCRs Done
22,096,409 UART: [art] Lock RT PCRs Done
22,097,960 UART: [art] Populate DV Done
22,103,591 UART: [fht] FMC Alias Private Key: 7
22,105,184 UART: [art] Derive CDI
22,106,008 UART: [art] Store in in slot 0x4
22,148,775 UART: [art] Derive Key Pair
22,149,794 UART: [art] Store priv key in slot 0x5
24,576,369 UART: [art] Derive Key Pair - Done
24,589,112 UART: [art] Signing Cert with AUTHO
24,590,421 UART: RITY.KEYID = 7
26,295,567 UART: [art] Erasing AUTHORITY.KEYID = 7
26,297,075 UART: [art] PUB.X = AA7E709ED65F310CC74B9E216BD7CC26D43A894900544BBC3E4EBC57A25C24575D127F76356B618FD5AC2A1F30017834
26,304,308 UART: [art] PUB.Y = 842AD9FA02B468B56BBC20F3833EC241804DD1CF2BB9E08E4B7E6E699F86A606D6D4B058A3EDEF1A14BFEDA50AA92F98
26,311,580 UART: [art] SIG.R = D773B9C7A484FA33A38C03A3289BCA6F9C18E23F68E91EC52D70A0722B1682CC4B64299F8688BBB69F1ABA0C98371CF2
26,319,034 UART: [art] SIG.S = 5BC3379AEA0B878065EAEBD50BA0DB24257F2B0528252F581A95B70EF3188F03B7E2BE521A4E959CAEF1FAEEFBA325C7
27,297,559 UART: Caliptra RT
27,298,270 UART: [state] CFI Enabled
27,415,816 UART: [rt] RT listening for mailbox commands...
27,418,116 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,573,650 UART: [rt]cmd =0x41544d4e, len=14344
28,540,505 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
3,761,208 ready_for_fw is high
3,761,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,060,725 >>> mbox cmd response: success
20,314,764 UART:
20,315,156 UART: Running Caliptra FMC ...
20,316,268 UART:
20,316,422 UART: [state] CFI Enabled
20,324,039 UART: [fht] FMC Alias Private Key: 7
22,080,856 UART: [art] Extend RT PCRs Done
22,082,087 UART: [art] Lock RT PCRs Done
22,083,480 UART: [art] Populate DV Done
22,089,063 UART: [fht] FMC Alias Private Key: 7
22,090,725 UART: [art] Derive CDI
22,091,465 UART: [art] Store in in slot 0x4
22,134,441 UART: [art] Derive Key Pair
22,135,485 UART: [art] Store priv key in slot 0x5
24,562,192 UART: [art] Derive Key Pair - Done
24,575,361 UART: [art] Signing Cert with AUTHO
24,576,693 UART: RITY.KEYID = 7
26,281,874 UART: [art] Erasing AUTHORITY.KEYID = 7
26,283,380 UART: [art] PUB.X = BFB8285434F47AAE167D7C6E70A9E09A61EA18766E95F0584DE302494A177721F0624F3E3258A2A06F69466F5ED46599
26,290,655 UART: [art] PUB.Y = 6DF7CB07DF2B3345C8FB216A7969A008E9BB0E27D9294CBF295146AEED3666C449A2EEF2171F23D312DADF56D1BC8748
26,297,903 UART: [art] SIG.R = 9218076DF7EDBCEF3624E9BF1EBD53EC0727D4E01425F5B0797F0889A304E356A84B83E8A72E7F79382F7F1A16B43455
26,305,296 UART: [art] SIG.S = 9CE5D8E02CE663705C8710067916C0038CDCD780413269CCDEDB0BD85F0DF0AAA374BF224B09EA7A3DC01AD326117A9F
27,284,457 UART: Caliptra RT
27,285,150 UART: [state] CFI Enabled
27,402,751 UART: [rt] RT listening for mailbox commands...
27,405,216 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,560,346 UART: [rt]cmd =0x41544d4e, len=14344
28,527,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,453 UART: [kat] SHA2-256
882,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,499 UART: [kat] ++
886,651 UART: [kat] sha1
890,939 UART: [kat] SHA2-256
892,877 UART: [kat] SHA2-384
895,772 UART: [kat] SHA2-512-ACC
897,673 UART: [kat] ECC-384
903,532 UART: [kat] HMAC-384Kdf
908,224 UART: [kat] LMS
1,476,420 UART: [kat] --
1,477,485 UART: [cold-reset] ++
1,477,981 UART: [fht] Storing FHT @ 0x50003400
1,480,690 UART: [idev] ++
1,480,858 UART: [idev] CDI.KEYID = 6
1,481,218 UART: [idev] SUBJECT.KEYID = 7
1,481,642 UART: [idev] UDS.KEYID = 0
1,481,987 ready_for_fw is high
1,481,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,774 UART: [idev] Erasing UDS.KEYID = 0
1,506,644 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,090 UART: [idev] --
1,516,115 UART: [ldev] ++
1,516,283 UART: [ldev] CDI.KEYID = 6
1,516,646 UART: [ldev] SUBJECT.KEYID = 5
1,517,072 UART: [ldev] AUTHORITY.KEYID = 7
1,517,535 UART: [ldev] FE.KEYID = 1
1,522,753 UART: [ldev] Erasing FE.KEYID = 1
1,548,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,018 UART: [ldev] --
1,587,487 UART: [fwproc] Waiting for Commands...
1,588,182 UART: [fwproc] Received command 0x46574c44
1,588,973 UART: [fwproc] Received Image of size 114084 bytes
5,044,134 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,071,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,100,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,236,583 >>> mbox cmd response: success
5,237,825 UART: [afmc] ++
5,237,993 UART: [afmc] CDI.KEYID = 6
5,238,355 UART: [afmc] SUBJECT.KEYID = 7
5,238,780 UART: [afmc] AUTHORITY.KEYID = 5
5,273,610 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,290,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,290,826 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,296,535 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,427 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,308,128 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,315,934 UART: [afmc] --
5,316,958 UART: [cold-reset] --
5,317,576 UART: [state] Locking Datavault
5,318,915 UART: [state] Locking PCR0, PCR1 and PCR31
5,319,519 UART: [state] Locking ICCM
5,319,989 UART: [exit] Launching FMC @ 0x40000130
5,325,318 UART:
5,325,334 UART: Running Caliptra FMC ...
5,325,742 UART:
5,325,796 UART: [state] CFI Enabled
5,336,364 UART: [fht] FMC Alias Private Key: 7
5,444,060 UART: [art] Extend RT PCRs Done
5,444,488 UART: [art] Lock RT PCRs Done
5,446,420 UART: [art] Populate DV Done
5,454,462 UART: [fht] FMC Alias Private Key: 7
5,455,402 UART: [art] Derive CDI
5,455,682 UART: [art] Store in in slot 0x4
5,540,961 UART: [art] Derive Key Pair
5,541,321 UART: [art] Store priv key in slot 0x5
5,554,363 UART: [art] Derive Key Pair - Done
5,569,382 UART: [art] Signing Cert with AUTHO
5,569,862 UART: RITY.KEYID = 7
5,585,226 UART: [art] Erasing AUTHORITY.KEYID = 7
5,585,991 UART: [art] PUB.X = 1D6339BCB91816906E5CAECB3E143E661CD3FCB14EE6F2F116880DD724595B1239399D8CB5049ECE5D93460737F2A3B1
5,592,758 UART: [art] PUB.Y = 9618C85B27217ADDF930560B16035BE4BA3D5B558C40C54CC5E9551223038078D0522A98B1832698909DECD054C4FE37
5,599,693 UART: [art] SIG.R = 934E7E73878CFE7C5425477BB6BE9BC45DEBD5F6405460193AE940BEFE6F258CA8BC5371EE2342B156551D73F2841451
5,606,467 UART: [art] SIG.S = 643DE8ADB02F8D94B527A2F8CB2F4161387E243C04F080DBDBD9A1B39278F94B467375FC1BECF48603F84A3123BB29CC
5,629,944 UART: Caliptra RT
5,630,197 UART: [state] CFI Enabled
5,738,640 UART: [rt] RT listening for mailbox commands...
5,739,310 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,344 UART: [rt]cmd =0x41544d4e, len=14344
5,870,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 ready_for_fw is high
1,362,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,933,131 >>> mbox cmd response: success
4,995,340 UART:
4,995,356 UART: Running Caliptra FMC ...
4,995,764 UART:
4,995,818 UART: [state] CFI Enabled
5,006,472 UART: [fht] FMC Alias Private Key: 7
5,114,306 UART: [art] Extend RT PCRs Done
5,114,734 UART: [art] Lock RT PCRs Done
5,116,394 UART: [art] Populate DV Done
5,124,556 UART: [fht] FMC Alias Private Key: 7
5,125,550 UART: [art] Derive CDI
5,125,830 UART: [art] Store in in slot 0x4
5,211,291 UART: [art] Derive Key Pair
5,211,651 UART: [art] Store priv key in slot 0x5
5,224,921 UART: [art] Derive Key Pair - Done
5,239,413 UART: [art] Signing Cert with AUTHO
5,239,893 UART: RITY.KEYID = 7
5,255,277 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,042 UART: [art] PUB.X = FEFF79273B2BF4366C8AA0A01C1042825FFC398940E4E7945ADAB621D8EC58436D88A70AFA93C4565731CB080EF78B8A
5,262,813 UART: [art] PUB.Y = 29898BDF705AF51F215CFB74CB5383D51DF886EC9805232D4229AD8E993636D1C26E679CACB5C700B91225A6925799E0
5,269,738 UART: [art] SIG.R = 0D70319538E7BEE4D2CDBF0AB0193CEEE65AB2F25AF4DFDC5790F2900372F366AAED8316AECB009E1D2F5BF54FB40156
5,276,496 UART: [art] SIG.S = 4C6CB61A196DA6697CE496F32FF6999F76FAB1130BECECD5E986A26ABAACA2B93FE3A6181A563625F1362154B0BC219B
5,300,800 UART: Caliptra RT
5,301,053 UART: [state] CFI Enabled
5,409,223 UART: [rt] RT listening for mailbox commands...
5,409,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,532,843 UART: [rt]cmd =0x41544d4e, len=14344
5,541,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,441 UART: [kat] SHA2-512-ACC
897,342 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,579 UART: [kat] LMS
1,475,775 UART: [kat] --
1,476,538 UART: [cold-reset] ++
1,476,912 UART: [fht] Storing FHT @ 0x50003400
1,479,659 UART: [idev] ++
1,479,827 UART: [idev] CDI.KEYID = 6
1,480,187 UART: [idev] SUBJECT.KEYID = 7
1,480,611 UART: [idev] UDS.KEYID = 0
1,480,956 ready_for_fw is high
1,480,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,571 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,430 UART: [ldev] ++
1,515,598 UART: [ldev] CDI.KEYID = 6
1,515,961 UART: [ldev] SUBJECT.KEYID = 5
1,516,387 UART: [ldev] AUTHORITY.KEYID = 7
1,516,850 UART: [ldev] FE.KEYID = 1
1,522,226 UART: [ldev] Erasing FE.KEYID = 1
1,547,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,459 UART: [ldev] --
1,586,796 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 114084 bytes
4,930,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,957,516 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
4,986,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,122,311 >>> mbox cmd response: success
5,123,391 UART: [afmc] ++
5,123,559 UART: [afmc] CDI.KEYID = 6
5,123,921 UART: [afmc] SUBJECT.KEYID = 7
5,124,346 UART: [afmc] AUTHORITY.KEYID = 5
5,159,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,175,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,176,768 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,182,477 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,188,369 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,194,070 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,202,136 UART: [afmc] --
5,203,138 UART: [cold-reset] --
5,203,892 UART: [state] Locking Datavault
5,205,151 UART: [state] Locking PCR0, PCR1 and PCR31
5,205,755 UART: [state] Locking ICCM
5,206,285 UART: [exit] Launching FMC @ 0x40000130
5,211,614 UART:
5,211,630 UART: Running Caliptra FMC ...
5,212,038 UART:
5,212,181 UART: [state] CFI Enabled
5,222,897 UART: [fht] FMC Alias Private Key: 7
5,330,393 UART: [art] Extend RT PCRs Done
5,330,821 UART: [art] Lock RT PCRs Done
5,332,415 UART: [art] Populate DV Done
5,340,855 UART: [fht] FMC Alias Private Key: 7
5,342,015 UART: [art] Derive CDI
5,342,295 UART: [art] Store in in slot 0x4
5,427,680 UART: [art] Derive Key Pair
5,428,040 UART: [art] Store priv key in slot 0x5
5,441,136 UART: [art] Derive Key Pair - Done
5,456,399 UART: [art] Signing Cert with AUTHO
5,456,879 UART: RITY.KEYID = 7
5,472,225 UART: [art] Erasing AUTHORITY.KEYID = 7
5,472,990 UART: [art] PUB.X = 48D3C75863894959DCCE9C99DB718F628AD1C9AE7BB88EA34331270A4FD0A7DBB7473290B418AC342D14E0BCCB7E66C6
5,479,769 UART: [art] PUB.Y = E1B577C06168A7A638BF1B9096E3C3B0B4373C6DF1E7833998FCEDCB01A459D7C04E251E14FD4C0860ABC154E2A95F20
5,486,723 UART: [art] SIG.R = 84DF1F20E75012BEEFDEDF6BE994C9135B7F6BCEC998BB00AE5FDFFC877333C7BD5BA1BCD2B80155C3563C6DB61A1AF4
5,493,498 UART: [art] SIG.S = 7A7BA2C6A0798175CFFD6476DF7D3EF2BFF5C13FD9AB1B38219CB50A86175132FDE7F044F69F4DEF368BB6AFD2A46416
5,517,722 UART: Caliptra RT
5,518,067 UART: [state] CFI Enabled
5,626,374 UART: [rt] RT listening for mailbox commands...
5,627,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,750,128 UART: [rt]cmd =0x41544d4e, len=14344
5,758,900 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 ready_for_fw is high
1,362,710 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,124,125 >>> mbox cmd response: success
5,186,584 UART:
5,186,600 UART: Running Caliptra FMC ...
5,187,008 UART:
5,187,151 UART: [state] CFI Enabled
5,197,809 UART: [fht] FMC Alias Private Key: 7
5,306,031 UART: [art] Extend RT PCRs Done
5,306,459 UART: [art] Lock RT PCRs Done
5,307,929 UART: [art] Populate DV Done
5,316,001 UART: [fht] FMC Alias Private Key: 7
5,316,955 UART: [art] Derive CDI
5,317,235 UART: [art] Store in in slot 0x4
5,402,870 UART: [art] Derive Key Pair
5,403,230 UART: [art] Store priv key in slot 0x5
5,416,468 UART: [art] Derive Key Pair - Done
5,431,478 UART: [art] Signing Cert with AUTHO
5,431,958 UART: RITY.KEYID = 7
5,447,342 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,107 UART: [art] PUB.X = 4779E7E7AEA1B99F84A62B7916EE439ED4A06C92E2B612268BC92C884491726F34AB65B36EEA52D6A26EE65B5433B3F8
5,454,883 UART: [art] PUB.Y = 64930CE2E2117B84C746159919946199D6629C32C4DD7B95059DC83A15B8E74182FD2DF39E4727429358FDE7E894FACA
5,461,823 UART: [art] SIG.R = ED2605D61DB5434707E050628362D732916A033A105EBB50A3BB44B9FF3F945544A56F5D77CC60C5CBCE2FADD2590C42
5,468,587 UART: [art] SIG.S = 60FBE3B313B3D6371E797A497BFA49A73A6FD6AD180309C6D301020647636A1D118EAC9C58A3590F5DA0A7D3816AD80B
5,492,681 UART: Caliptra RT
5,493,026 UART: [state] CFI Enabled
5,600,985 UART: [rt] RT listening for mailbox commands...
5,601,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,724,737 UART: [rt]cmd =0x41544d4e, len=14344
5,733,259 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,542 UART: [kat] SHA2-512-ACC
908,443 UART: [kat] ECC-384
918,308 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 ready_for_fw is high
1,176,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,687 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,924 UART: [fwproc] Recv command 0x46574c44
1,283,652 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,310,291 >>> mbox cmd response: success
3,311,311 UART: [afmc] ++
3,311,479 UART: [afmc] CDI.KEYID = 6
3,311,841 UART: [afmc] SUBJECT.KEYID = 7
3,312,266 UART: [afmc] AUTHORITY.KEYID = 5
3,347,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,559 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,268 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,160 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,871 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,656 UART: [afmc] --
3,390,720 UART: [cold-reset] --
3,391,676 UART: [state] Locking Datavault
3,392,735 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,339 UART: [state] Locking ICCM
3,393,959 UART: [exit] Launching FMC @ 0x40000130
3,399,288 UART:
3,399,304 UART: Running Caliptra FMC ...
3,399,712 UART:
3,399,766 UART: [state] CFI Enabled
3,410,036 UART: [fht] FMC Alias Private Key: 7
3,517,928 UART: [art] Extend RT PCRs Done
3,518,356 UART: [art] Lock RT PCRs Done
3,519,874 UART: [art] Populate DV Done
3,528,138 UART: [fht] FMC Alias Private Key: 7
3,529,296 UART: [art] Derive CDI
3,529,576 UART: [art] Store in in slot 0x4
3,615,221 UART: [art] Derive Key Pair
3,615,581 UART: [art] Store priv key in slot 0x5
3,628,345 UART: [art] Derive Key Pair - Done
3,643,089 UART: [art] Signing Cert with AUTHO
3,643,569 UART: RITY.KEYID = 7
3,658,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,430 UART: [art] PUB.X = B753BF64868129884111B83AF51CA3F024017B110F2D1441F8749D2895DCEE1B21B62E7D556821FC45AB73B76F7E2FCA
3,666,196 UART: [art] PUB.Y = E0FD76BAD5CA88AE0B7DFD25FE2DBA1C667064841D07BFB2B8BC0792968E39F6F89A24554C563A262414B3601B7B8818
3,673,147 UART: [art] SIG.R = BDD07B5D65B9BAC8B14E5528C4DBF30A63D9CD0281A3A3FA289C215F6C24C71AF7B060AFBE5E72094FCDEC09CD4CC552
3,679,931 UART: [art] SIG.S = 496A2EEF6485EE3FDF15B61D8D5D29E64BE56337212B6EFE7BA9D63482731C44CD1310EC1558BD6587D656187F83DAF4
3,704,110 UART: Caliptra RT
3,704,363 UART: [state] CFI Enabled
3,811,563 UART: [rt] RT listening for mailbox commands...
3,812,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,509 UART: [rt]cmd =0x41544d4e, len=14344
3,943,753 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,458 >>> mbox cmd response: success
3,234,747 UART:
3,234,763 UART: Running Caliptra FMC ...
3,235,171 UART:
3,235,225 UART: [state] CFI Enabled
3,245,561 UART: [fht] FMC Alias Private Key: 7
3,353,613 UART: [art] Extend RT PCRs Done
3,354,041 UART: [art] Lock RT PCRs Done
3,355,629 UART: [art] Populate DV Done
3,364,019 UART: [fht] FMC Alias Private Key: 7
3,365,069 UART: [art] Derive CDI
3,365,349 UART: [art] Store in in slot 0x4
3,451,190 UART: [art] Derive Key Pair
3,451,550 UART: [art] Store priv key in slot 0x5
3,465,022 UART: [art] Derive Key Pair - Done
3,479,941 UART: [art] Signing Cert with AUTHO
3,480,421 UART: RITY.KEYID = 7
3,495,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,780 UART: [art] PUB.X = CE880FCC689E0B6A41FBA2C09E52EFD2A0252C3A4DFE620A8B4342CCAF8417A91D69DCFE5E408584B85DE3428F533650
3,502,557 UART: [art] PUB.Y = 0D556F243D85F25F4BD0A6AF876B4A03BFAA4E2091410E84F4364046F76086C75AC91D35343BF3C2EDC45FDBA4797D15
3,509,506 UART: [art] SIG.R = 8A54C80C33042EFC5AEDCE6779716423302A6DD6D02DB7BD2E8E17792E63E2B597749B87C64A776542A2DE918AE08301
3,516,269 UART: [art] SIG.S = 584C6B56D758DC0DA3F2F17654945C0AC47DDCEF5C65D19321793A92BC5786B751AAC7B26BFAE89458067233FB91AA65
3,540,761 UART: Caliptra RT
3,541,014 UART: [state] CFI Enabled
3,648,786 UART: [rt] RT listening for mailbox commands...
3,649,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,610 UART: [rt]cmd =0x41544d4e, len=14344
3,781,026 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,829 UART: [kat] LMS
1,171,157 UART: [kat] --
1,171,976 UART: [cold-reset] ++
1,172,436 UART: [fht] FHT @ 0x50003400
1,175,057 UART: [idev] ++
1,175,225 UART: [idev] CDI.KEYID = 6
1,175,585 UART: [idev] SUBJECT.KEYID = 7
1,176,009 UART: [idev] UDS.KEYID = 0
1,176,354 ready_for_fw is high
1,176,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,933 UART: [idev] Erasing UDS.KEYID = 0
1,201,554 UART: [idev] Sha1 KeyId Algorithm
1,209,960 UART: [idev] --
1,210,922 UART: [ldev] ++
1,211,090 UART: [ldev] CDI.KEYID = 6
1,211,453 UART: [ldev] SUBJECT.KEYID = 5
1,211,879 UART: [ldev] AUTHORITY.KEYID = 7
1,212,342 UART: [ldev] FE.KEYID = 1
1,217,526 UART: [ldev] Erasing FE.KEYID = 1
1,243,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,164 UART: [ldev] --
1,282,437 UART: [fwproc] Wait for Commands...
1,283,183 UART: [fwproc] Recv command 0x46574c44
1,283,911 UART: [fwproc] Recv'd Img size: 114084 bytes
3,123,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,316,510 >>> mbox cmd response: success
3,317,614 UART: [afmc] ++
3,317,782 UART: [afmc] CDI.KEYID = 6
3,318,144 UART: [afmc] SUBJECT.KEYID = 7
3,318,569 UART: [afmc] AUTHORITY.KEYID = 5
3,354,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,648 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,357 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,249 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,960 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,777 UART: [afmc] --
3,397,677 UART: [cold-reset] --
3,398,419 UART: [state] Locking Datavault
3,399,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,982 UART: [state] Locking ICCM
3,400,626 UART: [exit] Launching FMC @ 0x40000130
3,405,955 UART:
3,405,971 UART: Running Caliptra FMC ...
3,406,379 UART:
3,406,522 UART: [state] CFI Enabled
3,417,228 UART: [fht] FMC Alias Private Key: 7
3,525,368 UART: [art] Extend RT PCRs Done
3,525,796 UART: [art] Lock RT PCRs Done
3,527,508 UART: [art] Populate DV Done
3,535,668 UART: [fht] FMC Alias Private Key: 7
3,536,812 UART: [art] Derive CDI
3,537,092 UART: [art] Store in in slot 0x4
3,622,739 UART: [art] Derive Key Pair
3,623,099 UART: [art] Store priv key in slot 0x5
3,636,447 UART: [art] Derive Key Pair - Done
3,651,282 UART: [art] Signing Cert with AUTHO
3,651,762 UART: RITY.KEYID = 7
3,666,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,681 UART: [art] PUB.X = E740043096361992C815D4E301138F088236CF8D0BCBEA6E264711DD2F5E99CB4F13972C8C39419C47B181B85A160DF3
3,674,432 UART: [art] PUB.Y = B5C312E63F5A56425D48F71FF7D0E13F0F0C4025F9C6B2C53343D710EF46698E200FC37CAE40C1940B1D8D1CD051B675
3,681,376 UART: [art] SIG.R = 3791D7BFD783B9402BC6DCE6B70558A5861D1C6E5A6D0FC62A878C662F0CA5E5958FAECBC746EF866CB7F0D130E24868
3,688,151 UART: [art] SIG.S = E743EDE56687B6E8B0BBD0C21F82AFE88C917C844E2C6832C1CF024DFEB4571C64086CBE87013A93F42C38F73547A847
3,712,325 UART: Caliptra RT
3,712,670 UART: [state] CFI Enabled
3,819,416 UART: [rt] RT listening for mailbox commands...
3,820,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,156 UART: [rt]cmd =0x41544d4e, len=14344
3,951,642 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,251 >>> mbox cmd response: success
3,226,736 UART:
3,226,752 UART: Running Caliptra FMC ...
3,227,160 UART:
3,227,303 UART: [state] CFI Enabled
3,237,935 UART: [fht] FMC Alias Private Key: 7
3,345,751 UART: [art] Extend RT PCRs Done
3,346,179 UART: [art] Lock RT PCRs Done
3,347,471 UART: [art] Populate DV Done
3,355,517 UART: [fht] FMC Alias Private Key: 7
3,356,619 UART: [art] Derive CDI
3,356,899 UART: [art] Store in in slot 0x4
3,442,870 UART: [art] Derive Key Pair
3,443,230 UART: [art] Store priv key in slot 0x5
3,457,150 UART: [art] Derive Key Pair - Done
3,471,566 UART: [art] Signing Cert with AUTHO
3,472,046 UART: RITY.KEYID = 7
3,487,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,813 UART: [art] PUB.X = 0DCD305DC79380D6D3A613C59744C15A24FE4A95E51050E3BBFE40635B94AE1F29D1432EF9CA016FC0D707026A2AC8A5
3,494,581 UART: [art] PUB.Y = 40AC3761E9D492E85662D46E153AA197853AAE65F57C69CAC9080E257304A89C9EC6EC8266C9C2ECB7A253EC69693ABB
3,501,530 UART: [art] SIG.R = B0FD50D4353C45DA00A35ABB79E9FB5CCFD6456143841E0600F797289757E3D3D34A7DFC2C4039E3DBDF3F946C030609
3,508,252 UART: [art] SIG.S = 7FE5C69DF9A8E41615918AEAD34E2DC3FDBEDCE59E9BBB5678756C64704305277B1E279F2A7B0ED8B14B40C2B0C9B911
3,532,335 UART: Caliptra RT
3,532,680 UART: [state] CFI Enabled
3,640,420 UART: [rt] RT listening for mailbox commands...
3,641,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,116 UART: [rt]cmd =0x41544d4e, len=14344
3,772,340 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,766 UART: [state] LifecycleState = Unprovisioned
86,421 UART: [state] DebugLocked = No
86,923 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,169,921 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 ready_for_fw is high
1,174,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,251 UART: [idev] Erasing UDS.KEYID = 0
1,199,437 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,404 UART: [ldev] ++
1,209,572 UART: [ldev] CDI.KEYID = 6
1,209,936 UART: [ldev] SUBJECT.KEYID = 5
1,210,363 UART: [ldev] AUTHORITY.KEYID = 7
1,210,826 UART: [ldev] FE.KEYID = 1
1,216,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,439 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,314,656 >>> mbox cmd response: success
3,315,693 UART: [afmc] ++
3,315,861 UART: [afmc] CDI.KEYID = 6
3,316,224 UART: [afmc] SUBJECT.KEYID = 7
3,316,650 UART: [afmc] AUTHORITY.KEYID = 5
3,351,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,951 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,661 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,551 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,262 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,078 UART: [afmc] --
3,395,122 UART: [cold-reset] --
3,395,968 UART: [state] Locking Datavault
3,396,941 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,545 UART: [state] Locking ICCM
3,398,171 UART: [exit] Launching FMC @ 0x40000130
3,403,500 UART:
3,403,516 UART: Running Caliptra FMC ...
3,403,924 UART:
3,403,978 UART: [state] CFI Enabled
3,414,592 UART: [fht] FMC Alias Private Key: 7
3,522,286 UART: [art] Extend RT PCRs Done
3,522,714 UART: [art] Lock RT PCRs Done
3,524,162 UART: [art] Populate DV Done
3,532,572 UART: [fht] FMC Alias Private Key: 7
3,533,504 UART: [art] Derive CDI
3,533,784 UART: [art] Store in in slot 0x4
3,619,407 UART: [art] Derive Key Pair
3,619,767 UART: [art] Store priv key in slot 0x5
3,632,711 UART: [art] Derive Key Pair - Done
3,647,608 UART: [art] Signing Cert with AUTHO
3,648,088 UART: RITY.KEYID = 7
3,663,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,239 UART: [art] PUB.X = E7F26E87AC33575FF38093973CBB33EE5AA8042E985CFFE19608821F4CFC05F0EE1C3BDFE101B12845F3CB4FC0F20580
3,671,008 UART: [art] PUB.Y = 9072D17CF3B33C4A991BB8CC2C48CB113DB8DD387AB1CA23DF9933BF512C93CA2B37201DE2602215CF61FEAEFB3D2EA6
3,677,980 UART: [art] SIG.R = 020F0075DCDA676CDFEE4761B9AC26F99E196F1BF9D1651F5D1E2C491B597204016ED96B1589A6435A7453CDD288C1BC
3,684,724 UART: [art] SIG.S = 7C10B919DD17F7951355115AE1D0DE6B069139FBCF2087C396BDDB8E5771F299D97F031CF6892047C1F4A65324F8739B
3,708,031 UART: Caliptra RT
3,708,284 UART: [state] CFI Enabled
3,816,665 UART: [rt] RT listening for mailbox commands...
3,817,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,435 UART: [rt]cmd =0x41544d4e, len=14344
3,948,779 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 ready_for_fw is high
1,055,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,761 >>> mbox cmd response: success
3,233,736 UART:
3,233,752 UART: Running Caliptra FMC ...
3,234,160 UART:
3,234,214 UART: [state] CFI Enabled
3,244,492 UART: [fht] FMC Alias Private Key: 7
3,352,732 UART: [art] Extend RT PCRs Done
3,353,160 UART: [art] Lock RT PCRs Done
3,354,352 UART: [art] Populate DV Done
3,362,592 UART: [fht] FMC Alias Private Key: 7
3,363,742 UART: [art] Derive CDI
3,364,022 UART: [art] Store in in slot 0x4
3,449,799 UART: [art] Derive Key Pair
3,450,159 UART: [art] Store priv key in slot 0x5
3,462,883 UART: [art] Derive Key Pair - Done
3,477,763 UART: [art] Signing Cert with AUTHO
3,478,243 UART: RITY.KEYID = 7
3,493,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,220 UART: [art] PUB.X = 6CDF4D3BBC5F6C7B4AE2B6F0BF9976D377DD25529F893F15483DDA373F2A81B1C0BBA899D568C46E23F1D42E7394A2B3
3,501,006 UART: [art] PUB.Y = 43343DF3E3DE2F9A405D7A8E7AD29128E6DADF3604095F654B5CD779DDF7C54694BF1A743707377DC9598189C7B2DB40
3,507,953 UART: [art] SIG.R = 53A503781C1768BF9C15C7C588CE1F436E3F9A245AFBEA2D7AD9E6CD933EC59315262B15428A1A99F1D9081A04D31E9C
3,514,722 UART: [art] SIG.S = 9B75FEF30FEF50B89D19871FE76DD372FC36005DA0B0651F2D2D1B91F965FBF013E46EDCE83D48840DA2FC6F44C7C05B
3,538,825 UART: Caliptra RT
3,539,078 UART: [state] CFI Enabled
3,646,466 UART: [rt] RT listening for mailbox commands...
3,647,136 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,090 UART: [rt]cmd =0x41544d4e, len=14344
3,778,518 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,174,274 ready_for_fw is high
1,174,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,243,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,314,451 >>> mbox cmd response: success
3,315,552 UART: [afmc] ++
3,315,720 UART: [afmc] CDI.KEYID = 6
3,316,083 UART: [afmc] SUBJECT.KEYID = 7
3,316,509 UART: [afmc] AUTHORITY.KEYID = 5
3,352,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,570 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,280 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,170 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,881 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,643 UART: [afmc] --
3,395,659 UART: [cold-reset] --
3,396,519 UART: [state] Locking Datavault
3,397,644 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,248 UART: [state] Locking ICCM
3,398,756 UART: [exit] Launching FMC @ 0x40000130
3,404,085 UART:
3,404,101 UART: Running Caliptra FMC ...
3,404,509 UART:
3,404,652 UART: [state] CFI Enabled
3,415,546 UART: [fht] FMC Alias Private Key: 7
3,524,264 UART: [art] Extend RT PCRs Done
3,524,692 UART: [art] Lock RT PCRs Done
3,526,102 UART: [art] Populate DV Done
3,534,372 UART: [fht] FMC Alias Private Key: 7
3,535,540 UART: [art] Derive CDI
3,535,820 UART: [art] Store in in slot 0x4
3,621,541 UART: [art] Derive Key Pair
3,621,901 UART: [art] Store priv key in slot 0x5
3,634,811 UART: [art] Derive Key Pair - Done
3,649,774 UART: [art] Signing Cert with AUTHO
3,650,254 UART: RITY.KEYID = 7
3,665,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,283 UART: [art] PUB.X = 2F4CAB7319DA58A277ADC099536A4E68136E8D5809DED169C812AE200739DF08D20F1522E5D7583F4D33324CB9D8D5D7
3,673,045 UART: [art] PUB.Y = 72F3AF5429A09172C3B43C98DFCD235E9AEFB3D0800BE913A2FD1C47EB519961B765E440F9D6EAB7E16046F91395D7FE
3,680,004 UART: [art] SIG.R = ACDE42F385367637749148875E6D7D4EB4F6AFED5C2DDF102B671E27CF772F61A3C1225466A7B2AB5E769006511F0302
3,686,767 UART: [art] SIG.S = 9FC8F28B520DF8D176E333C8C93B8559F5973DEF3BE24207122243D83D432B554945CEB65AFC0D395E4C9EE3518814FE
3,710,495 UART: Caliptra RT
3,710,840 UART: [state] CFI Enabled
3,818,961 UART: [rt] RT listening for mailbox commands...
3,819,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,779 UART: [rt]cmd =0x41544d4e, len=14344
3,951,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,923 ready_for_fw is high
1,056,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,174,901 >>> mbox cmd response: success
3,236,768 UART:
3,236,784 UART: Running Caliptra FMC ...
3,237,192 UART:
3,237,335 UART: [state] CFI Enabled
3,247,853 UART: [fht] FMC Alias Private Key: 7
3,355,385 UART: [art] Extend RT PCRs Done
3,355,813 UART: [art] Lock RT PCRs Done
3,357,247 UART: [art] Populate DV Done
3,365,667 UART: [fht] FMC Alias Private Key: 7
3,366,753 UART: [art] Derive CDI
3,367,033 UART: [art] Store in in slot 0x4
3,453,068 UART: [art] Derive Key Pair
3,453,428 UART: [art] Store priv key in slot 0x5
3,465,946 UART: [art] Derive Key Pair - Done
3,480,874 UART: [art] Signing Cert with AUTHO
3,481,354 UART: RITY.KEYID = 7
3,496,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,229 UART: [art] PUB.X = 1DA68B7ED28B1641FE372FA9E3DB979502A32C5C5FBC71DE634A735D98527D8BBEBED612605B99B09A0EA7D4E0D96ADE
3,504,013 UART: [art] PUB.Y = AC9625A7D0455723FF7C5129894132C6874377B683CB0432966AAB5595B403BAF726B0B853F74B97F2E1C1B576B3BA3C
3,510,955 UART: [art] SIG.R = 41BA735ECF1831F7CE1AFF4CEDDF56F7D388E0E9A943E907C0EBE891725656A28F0D31911C3F89AE37D23243B5422F58
3,517,729 UART: [art] SIG.S = 3EF2197FBD6A3E32BFDF86E6E1FF79487D8D50CCA040499834D1FF88E69BC4140C3ED22C1B1B2B1ABDA6516F3C123727
3,542,427 UART: Caliptra RT
3,542,772 UART: [state] CFI Enabled
3,650,091 UART: [rt] RT listening for mailbox commands...
3,650,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,557 UART: [rt]cmd =0x41544d4e, len=14344
3,782,117 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,132 UART:
192,507 UART: Running Caliptra ROM ...
193,671 UART:
193,821 UART: [state] CFI Enabled
250,880 UART: [state] LifecycleState = Unprovisioned
252,794 UART: [state] DebugLocked = No
254,188 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,266 UART: [kat] SHA2-256
428,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,473 UART: [kat] ++
439,938 UART: [kat] sha1
450,601 UART: [kat] SHA2-256
453,326 UART: [kat] SHA2-384
460,906 UART: [kat] SHA2-512-ACC
463,255 UART: [kat] ECC-384
2,766,505 UART: [kat] HMAC-384Kdf
2,778,878 UART: [kat] LMS
3,969,212 UART: [kat] --
3,973,944 UART: [cold-reset] ++
3,976,584 UART: [fht] Storing FHT @ 0x50003400
3,988,298 UART: [idev] ++
3,988,903 UART: [idev] CDI.KEYID = 6
3,989,825 UART: [idev] SUBJECT.KEYID = 7
3,991,070 UART: [idev] UDS.KEYID = 0
3,992,139 ready_for_fw is high
3,992,339 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,325 UART: [idev] Erasing UDS.KEYID = 0
7,329,754 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,445 UART: [idev] --
7,355,735 UART: [ldev] ++
7,356,315 UART: [ldev] CDI.KEYID = 6
7,357,290 UART: [ldev] SUBJECT.KEYID = 5
7,358,451 UART: [ldev] AUTHORITY.KEYID = 7
7,359,736 UART: [ldev] FE.KEYID = 1
7,402,415 UART: [ldev] Erasing FE.KEYID = 1
10,736,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,993 UART: [ldev] --
13,117,923 UART: [fwproc] Waiting for Commands...
13,119,820 UART: [fwproc] Received command 0x46574c44
13,122,002 UART: [fwproc] Received Image of size 113760 bytes
17,176,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,417 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,274 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,637,807 >>> mbox cmd response: success
17,642,181 UART: [afmc] ++
17,642,784 UART: [afmc] CDI.KEYID = 6
17,643,701 UART: [afmc] SUBJECT.KEYID = 7
17,644,972 UART: [afmc] AUTHORITY.KEYID = 5
21,011,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,345 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,715 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,577 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,987 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,834 UART: [afmc] --
23,383,239 UART: [cold-reset] --
23,387,587 UART: [state] Locking Datavault
23,392,672 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,425 UART: [state] Locking ICCM
23,396,796 UART: [exit] Launching FMC @ 0x40000130
23,405,192 UART:
23,405,423 UART: Running Caliptra FMC ...
23,406,522 UART:
23,406,686 UART: [state] CFI Enabled
23,471,182 UART: [fht] FMC Alias Private Key: 7
25,809,278 UART: [art] Extend RT PCRs Done
25,810,500 UART: [art] Lock RT PCRs Done
25,812,158 UART: [art] Populate DV Done
25,817,351 UART: [fht] FMC Alias Private Key: 7
25,819,100 UART: [art] Derive CDI
25,819,934 UART: [art] Store in in slot 0x4
25,879,620 UART: [art] Derive Key Pair
25,880,635 UART: [art] Store priv key in slot 0x5
29,173,931 UART: [art] Derive Key Pair - Done
29,186,952 UART: [art] Signing Cert with AUTHO
29,188,279 UART: RITY.KEYID = 7
31,475,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,500 UART: [art] PUB.X = FDD365FAA444D8814F3AE17554860B965DA7DDBB2E1C5BA0E80078A12E7F3F316DFC9E4C57AA6AEFF81A8BDAF7A59DB6
31,484,755 UART: [art] PUB.Y = 42EF2CA205EE68B8CB118EF377BE5454BC02853EF9D3782A625ED0D5FF2684DA4A98D0B18A1BBF0F90FD97425EF7322F
31,492,042 UART: [art] SIG.R = 439BDEE42D13BB9E0EC81B6C24E83E5CC5FE5BFF70AF1CCD42D3919EEC9CDC7B6885FB0B7AC5302B5B793A5094491AAF
31,499,437 UART: [art] SIG.S = 650A89A99F0D438081C8DF76ED0C921A9DD6F785FB6FBDEC7D84E8AC0908A61A217DAE58027CF524CD0707AB967D61CA
32,804,775 UART: Caliptra RT
32,805,483 UART: [state] CFI Enabled
32,966,987 UART: [rt] RT listening for mailbox commands...
32,969,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,124,809 UART: [rt]cmd =0x41544d4e, len=14344
38,425,363 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,805,038 ready_for_fw is high
3,805,425 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,885,174 >>> mbox cmd response: success
23,574,069 UART:
23,574,466 UART: Running Caliptra FMC ...
23,575,560 UART:
23,575,715 UART: [state] CFI Enabled
23,645,087 UART: [fht] FMC Alias Private Key: 7
25,982,390 UART: [art] Extend RT PCRs Done
25,983,619 UART: [art] Lock RT PCRs Done
25,985,386 UART: [art] Populate DV Done
25,990,633 UART: [fht] FMC Alias Private Key: 7
25,992,129 UART: [art] Derive CDI
25,992,896 UART: [art] Store in in slot 0x4
26,053,942 UART: [art] Derive Key Pair
26,054,991 UART: [art] Store priv key in slot 0x5
29,348,036 UART: [art] Derive Key Pair - Done
29,361,306 UART: [art] Signing Cert with AUTHO
29,362,609 UART: RITY.KEYID = 7
31,649,809 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,317 UART: [art] PUB.X = DB8A8AC783F88A1B8FD5C45E89E5C35A3618BEB6FD7494EC5765D18847A5F0C1C0E6172ACD25D841DB4E844E73576717
31,658,603 UART: [art] PUB.Y = 299104B4BB11DE5D0ACD84C4BF682B1322FE9F76059E249CEFEA41FC68C41A97468AD8F30CFCA050515726F08A256E00
31,665,824 UART: [art] SIG.R = 50334679CABF4CBDD30FF080756ACD808A4069C8C525FD4B22DCCB0767AA68E9378AB609546F0C9E5D27F9750300AC64
31,673,238 UART: [art] SIG.S = CAF49875F616529C37EC686099C6E108B68EA0619C2AA72E64F95ACC574FF5298FF5526C1AB58657D7717318B42D9EEC
32,978,770 UART: Caliptra RT
32,979,482 UART: [state] CFI Enabled
33,141,153 UART: [rt] RT listening for mailbox commands...
33,143,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,298,532 UART: [rt]cmd =0x41544d4e, len=14344
38,599,292 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,789 writing to cptra_bootfsm_go
192,913 UART:
193,270 UART: Running Caliptra ROM ...
194,379 UART:
604,001 UART: [state] CFI Enabled
619,823 UART: [state] LifecycleState = Unprovisioned
621,697 UART: [state] DebugLocked = No
623,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,276 UART: [kat] SHA2-256
799,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,537 UART: [kat] ++
809,986 UART: [kat] sha1
821,605 UART: [kat] SHA2-256
824,300 UART: [kat] SHA2-384
830,862 UART: [kat] SHA2-512-ACC
833,228 UART: [kat] ECC-384
3,117,578 UART: [kat] HMAC-384Kdf
3,128,676 UART: [kat] LMS
4,318,791 UART: [kat] --
4,323,224 UART: [cold-reset] ++
4,325,364 UART: [fht] Storing FHT @ 0x50003400
4,337,681 UART: [idev] ++
4,338,245 UART: [idev] CDI.KEYID = 6
4,339,194 UART: [idev] SUBJECT.KEYID = 7
4,340,431 UART: [idev] UDS.KEYID = 0
4,341,409 ready_for_fw is high
4,341,809 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,530 UART: [idev] Erasing UDS.KEYID = 0
7,625,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,681 UART: [idev] --
7,649,836 UART: [ldev] ++
7,650,407 UART: [ldev] CDI.KEYID = 6
7,651,421 UART: [ldev] SUBJECT.KEYID = 5
7,652,576 UART: [ldev] AUTHORITY.KEYID = 7
7,653,799 UART: [ldev] FE.KEYID = 1
7,664,501 UART: [ldev] Erasing FE.KEYID = 1
10,954,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,270 UART: [ldev] --
13,313,726 UART: [fwproc] Waiting for Commands...
13,315,922 UART: [fwproc] Received command 0x46574c44
13,318,119 UART: [fwproc] Received Image of size 113760 bytes
17,361,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,825,991 >>> mbox cmd response: success
17,829,992 UART: [afmc] ++
17,830,584 UART: [afmc] CDI.KEYID = 6
17,831,546 UART: [afmc] SUBJECT.KEYID = 7
17,832,755 UART: [afmc] AUTHORITY.KEYID = 5
21,143,954 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,438 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,811 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,645 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,095 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,403 UART: [afmc] --
23,509,594 UART: [cold-reset] --
23,514,972 UART: [state] Locking Datavault
23,518,975 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,674 UART: [state] Locking ICCM
23,522,222 UART: [exit] Launching FMC @ 0x40000130
23,530,613 UART:
23,530,846 UART: Running Caliptra FMC ...
23,531,944 UART:
23,532,101 UART: [state] CFI Enabled
23,540,411 UART: [fht] FMC Alias Private Key: 7
25,871,902 UART: [art] Extend RT PCRs Done
25,873,128 UART: [art] Lock RT PCRs Done
25,874,751 UART: [art] Populate DV Done
25,880,055 UART: [fht] FMC Alias Private Key: 7
25,881,541 UART: [art] Derive CDI
25,882,299 UART: [art] Store in in slot 0x4
25,925,064 UART: [art] Derive Key Pair
25,926,066 UART: [art] Store priv key in slot 0x5
29,167,670 UART: [art] Derive Key Pair - Done
29,180,719 UART: [art] Signing Cert with AUTHO
29,182,005 UART: RITY.KEYID = 7
31,461,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,209 UART: [art] PUB.X = C80CD0C2105F8A2C325049864C316826B06E31FCDA84B89A1496A0521C308F7A66CA6B0AB856CB8C2EF46E9C90472DE4
31,470,318 UART: [art] PUB.Y = BB5E1F17B53606612DF456FE944AAB1E5CEE68240EFCCED0D896F0CFDCE0A5AA80DE5C3EA82872BD43D6A159D76FF5EA
31,477,581 UART: [art] SIG.R = 1BD5148DC2963EF9090F0E1333324F323467CB01F2D8DDDACD91B3A03EE4A4CF1993B5E43BACAF6BE9769084A3BC6948
31,484,995 UART: [art] SIG.S = 9DFFFB9CA0F961519B0D33FB2CF38E260CA3A427B2FB46889A09A29FA2DFC0E777C9B140797525723C05C540EAAAB39F
32,790,559 UART: Caliptra RT
32,791,270 UART: [state] CFI Enabled
32,908,866 UART: [rt] RT listening for mailbox commands...
32,911,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,066,353 UART: [rt]cmd =0x41544d4e, len=14344
38,367,054 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
4,129,926 ready_for_fw is high
4,130,460 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,066,468 >>> mbox cmd response: success
23,700,071 UART:
23,700,500 UART: Running Caliptra FMC ...
23,701,650 UART:
23,701,810 UART: [state] CFI Enabled
23,709,647 UART: [fht] FMC Alias Private Key: 7
26,040,273 UART: [art] Extend RT PCRs Done
26,041,507 UART: [art] Lock RT PCRs Done
26,043,572 UART: [art] Populate DV Done
26,048,954 UART: [fht] FMC Alias Private Key: 7
26,050,615 UART: [art] Derive CDI
26,051,436 UART: [art] Store in in slot 0x4
26,093,772 UART: [art] Derive Key Pair
26,094,823 UART: [art] Store priv key in slot 0x5
29,336,389 UART: [art] Derive Key Pair - Done
29,349,295 UART: [art] Signing Cert with AUTHO
29,350,606 UART: RITY.KEYID = 7
31,629,833 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,344 UART: [art] PUB.X = 6CEF93E89C5FD0ED98C6704F3D75DC5065DA88B51CEBB4C64FDE7A163B44FDC882B20604734E285FA08DF4DDA66F06F7
31,638,584 UART: [art] PUB.Y = 546511ADDF294C56E2D2CE558CD691064B55756E2CA6BE1535A4480F21F7833851511769D3489D3E9C07446764BFF005
31,645,846 UART: [art] SIG.R = BC28A22279B8AF260D7C553E46A1F11B5CBCA8AE22A7CDCF1B32C27B9C9F27479C8A70E6B1DFC7FE641A73CB0AC3F595
31,653,230 UART: [art] SIG.S = 4CFA26465A913D0746073141185F8B48E79660156BBB0CC64AE2537285FA7B6C0089E5A1EDDC6B1F4F758EF0B557C8EA
32,959,060 UART: Caliptra RT
32,959,914 UART: [state] CFI Enabled
33,078,063 UART: [rt] RT listening for mailbox commands...
33,080,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,235,718 UART: [rt]cmd =0x41544d4e, len=14344
38,536,438 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,434 UART:
192,831 UART: Running Caliptra ROM ...
193,972 UART:
194,119 UART: [state] CFI Enabled
264,757 UART: [state] LifecycleState = Unprovisioned
266,657 UART: [state] DebugLocked = No
268,616 UART: [state] WD Timer not started. Device not locked for debugging
272,176 UART: [kat] SHA2-256
451,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,879 UART: [kat] ++
463,410 UART: [kat] sha1
475,280 UART: [kat] SHA2-256
478,305 UART: [kat] SHA2-384
484,362 UART: [kat] SHA2-512-ACC
487,365 UART: [kat] ECC-384
2,948,382 UART: [kat] HMAC-384Kdf
2,971,466 UART: [kat] LMS
3,500,883 UART: [kat] --
3,505,904 UART: [cold-reset] ++
3,508,406 UART: [fht] FHT @ 0x50003400
3,519,804 UART: [idev] ++
3,520,363 UART: [idev] CDI.KEYID = 6
3,521,317 UART: [idev] SUBJECT.KEYID = 7
3,522,483 UART: [idev] UDS.KEYID = 0
3,523,450 ready_for_fw is high
3,523,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,214 UART: [idev] Erasing UDS.KEYID = 0
6,025,467 UART: [idev] Sha1 KeyId Algorithm
6,047,909 UART: [idev] --
6,052,475 UART: [ldev] ++
6,053,059 UART: [ldev] CDI.KEYID = 6
6,053,993 UART: [ldev] SUBJECT.KEYID = 5
6,055,070 UART: [ldev] AUTHORITY.KEYID = 7
6,056,403 UART: [ldev] FE.KEYID = 1
6,099,647 UART: [ldev] Erasing FE.KEYID = 1
8,603,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,826 UART: [ldev] --
10,414,656 UART: [fwproc] Wait for Commands...
10,417,727 UART: [fwproc] Recv command 0x46574c44
10,419,765 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,276,332 >>> mbox cmd response: success
14,281,045 UART: [afmc] ++
14,281,643 UART: [afmc] CDI.KEYID = 6
14,282,549 UART: [afmc] SUBJECT.KEYID = 7
14,283,706 UART: [afmc] AUTHORITY.KEYID = 5
16,828,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,383 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,208 UART: [afmc] --
18,626,865 UART: [cold-reset] --
18,630,519 UART: [state] Locking Datavault
18,635,873 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,517 UART: [state] Locking ICCM
18,639,664 UART: [exit] Launching FMC @ 0x40000130
18,648,053 UART:
18,648,287 UART: Running Caliptra FMC ...
18,649,384 UART:
18,649,541 UART: [state] CFI Enabled
18,709,744 UART: [fht] FMC Alias Private Key: 7
20,473,921 UART: [art] Extend RT PCRs Done
20,475,139 UART: [art] Lock RT PCRs Done
20,476,926 UART: [art] Populate DV Done
20,482,342 UART: [fht] FMC Alias Private Key: 7
20,484,038 UART: [art] Derive CDI
20,484,850 UART: [art] Store in in slot 0x4
20,542,426 UART: [art] Derive Key Pair
20,543,483 UART: [art] Store priv key in slot 0x5
23,006,632 UART: [art] Derive Key Pair - Done
23,019,737 UART: [art] Signing Cert with AUTHO
23,021,045 UART: RITY.KEYID = 7
24,732,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,874 UART: [art] PUB.X = 2A53058B1BE91A310B4E28E6C110C6E58DCED8D202657761ED908B19D2FCFED5403188CBDA1FB3137E0C435B74C2AC9B
24,741,198 UART: [art] PUB.Y = 702F63975D36657946B72097266892EE6B57C407A0FF981995B57B96012ED1AEBC9B969EE5AA561249E7A3B133660F25
24,748,391 UART: [art] SIG.R = 0DABA9A7A5B9B6F7AA4D9626676E3B8BA4E298520F990915D7F2D1E10BB5BCEC2F4A107C5AA8736439D528120FC39B13
24,755,773 UART: [art] SIG.S = 539AB71591B109268501F0EA3DE9C240BFF006BDB62B3BF973E84EEC07C291010F3D18792DED197539564313BE0CDCEA
25,734,252 UART: Caliptra RT
25,734,948 UART: [state] CFI Enabled
25,900,070 UART: [rt] RT listening for mailbox commands...
25,902,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,057,929 UART: [rt]cmd =0x41544d4e, len=14344
30,053,446 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,358,924 ready_for_fw is high
3,359,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,049,088 >>> mbox cmd response: success
18,339,629 UART:
18,340,017 UART: Running Caliptra FMC ...
18,341,209 UART:
18,341,376 UART: [state] CFI Enabled
18,409,823 UART: [fht] FMC Alias Private Key: 7
20,174,111 UART: [art] Extend RT PCRs Done
20,175,331 UART: [art] Lock RT PCRs Done
20,177,061 UART: [art] Populate DV Done
20,182,291 UART: [fht] FMC Alias Private Key: 7
20,183,988 UART: [art] Derive CDI
20,184,799 UART: [art] Store in in slot 0x4
20,242,589 UART: [art] Derive Key Pair
20,243,575 UART: [art] Store priv key in slot 0x5
22,706,625 UART: [art] Derive Key Pair - Done
22,719,244 UART: [art] Signing Cert with AUTHO
22,720,565 UART: RITY.KEYID = 7
24,432,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,795 UART: [art] PUB.X = 4A9ABCFF0BFE67B779971BB74DA278E58EE1179810121623026BBF977DD71E6C1977C90E1EF56969D0323FD76012A2FB
24,441,071 UART: [art] PUB.Y = B09BF35751FC3C34893303A050F296929993A05130E472118A7895334CB9E5B4D4F7C154D5104FF91BE114D75A163564
24,448,309 UART: [art] SIG.R = 2E61D19679AE89605EF67639EF7CB8C2A50BA3855FDC1CB83A165AB588D8E0116DFECD4DE2A9B66920DFCB12FAD44319
24,455,687 UART: [art] SIG.S = A356B7FC6318D9227D31151AF4B16B953D06FFF89188DB492AD6F591398D48D1001489EADEFC74D56D4A83834BD12217
25,434,738 UART: Caliptra RT
25,435,436 UART: [state] CFI Enabled
25,600,551 UART: [rt] RT listening for mailbox commands...
25,602,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,758,375 UART: [rt]cmd =0x41544d4e, len=14344
29,753,894 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,942 writing to cptra_bootfsm_go
193,189 UART:
193,543 UART: Running Caliptra ROM ...
194,619 UART:
604,429 UART: [state] CFI Enabled
617,542 UART: [state] LifecycleState = Unprovisioned
619,442 UART: [state] DebugLocked = No
621,336 UART: [state] WD Timer not started. Device not locked for debugging
624,344 UART: [kat] SHA2-256
803,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,041 UART: [kat] ++
815,588 UART: [kat] sha1
825,193 UART: [kat] SHA2-256
828,199 UART: [kat] SHA2-384
834,757 UART: [kat] SHA2-512-ACC
837,712 UART: [kat] ECC-384
3,280,152 UART: [kat] HMAC-384Kdf
3,292,692 UART: [kat] LMS
3,822,221 UART: [kat] --
3,826,649 UART: [cold-reset] ++
3,827,519 UART: [fht] FHT @ 0x50003400
3,838,709 UART: [idev] ++
3,839,284 UART: [idev] CDI.KEYID = 6
3,840,165 UART: [idev] SUBJECT.KEYID = 7
3,841,287 UART: [idev] UDS.KEYID = 0
3,842,275 ready_for_fw is high
3,842,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,297 UART: [idev] Erasing UDS.KEYID = 0
6,317,877 UART: [idev] Sha1 KeyId Algorithm
6,341,049 UART: [idev] --
6,344,943 UART: [ldev] ++
6,345,535 UART: [ldev] CDI.KEYID = 6
6,346,453 UART: [ldev] SUBJECT.KEYID = 5
6,347,607 UART: [ldev] AUTHORITY.KEYID = 7
6,348,837 UART: [ldev] FE.KEYID = 1
6,358,940 UART: [ldev] Erasing FE.KEYID = 1
8,834,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,462 UART: [ldev] --
10,624,293 UART: [fwproc] Wait for Commands...
10,627,530 UART: [fwproc] Recv command 0x46574c44
10,629,624 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,488,516 >>> mbox cmd response: success
14,493,623 UART: [afmc] ++
14,494,233 UART: [afmc] CDI.KEYID = 6
14,495,150 UART: [afmc] SUBJECT.KEYID = 7
14,496,313 UART: [afmc] AUTHORITY.KEYID = 5
17,000,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,275 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,046 UART: [afmc] --
18,793,556 UART: [cold-reset] --
18,796,774 UART: [state] Locking Datavault
18,803,539 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,263 UART: [state] Locking ICCM
18,806,387 UART: [exit] Launching FMC @ 0x40000130
18,814,795 UART:
18,815,036 UART: Running Caliptra FMC ...
18,816,142 UART:
18,816,298 UART: [state] CFI Enabled
18,824,402 UART: [fht] FMC Alias Private Key: 7
20,581,636 UART: [art] Extend RT PCRs Done
20,582,853 UART: [art] Lock RT PCRs Done
20,584,693 UART: [art] Populate DV Done
20,589,946 UART: [fht] FMC Alias Private Key: 7
20,591,590 UART: [art] Derive CDI
20,592,409 UART: [art] Store in in slot 0x4
20,635,017 UART: [art] Derive Key Pair
20,636,062 UART: [art] Store priv key in slot 0x5
23,062,797 UART: [art] Derive Key Pair - Done
23,075,596 UART: [art] Signing Cert with AUTHO
23,076,914 UART: RITY.KEYID = 7
24,782,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,807 UART: [art] PUB.X = A42805F2ED226BB0A239F0EEB7E17B8E34796DF8CE50BC15AD2718FA890DAABAC0DC56881491C26A59AFD154261DAF6F
24,791,085 UART: [art] PUB.Y = EBE80F4787C2B1433DE40A5B4EC5924DC5AA314A253B37867CDF1A975990DCA48E4486EDF02E6E349A59BF676DC4698E
24,798,351 UART: [art] SIG.R = D1841AB8E087D43AFA28CC661962D92652BFE555AD153E6093CB0A79A3699D4348EFA185568892768C689C8BC0953862
24,805,724 UART: [art] SIG.S = 3D763669F7C7EFA12A655DE403BB0FCF36390A84040BE0C21C8AE970221BE0E0D114C55F12CB9E44FC063A5CEB2F74E2
25,784,629 UART: Caliptra RT
25,785,330 UART: [state] CFI Enabled
25,903,028 UART: [rt] RT listening for mailbox commands...
25,905,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,702 UART: [rt]cmd =0x41544d4e, len=14344
30,056,816 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,933 writing to cptra_bootfsm_go
3,699,550 ready_for_fw is high
3,700,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,359 >>> mbox cmd response: success
18,521,118 UART:
18,521,515 UART: Running Caliptra FMC ...
18,522,614 UART:
18,522,789 UART: [state] CFI Enabled
18,530,472 UART: [fht] FMC Alias Private Key: 7
20,288,202 UART: [art] Extend RT PCRs Done
20,289,424 UART: [art] Lock RT PCRs Done
20,290,973 UART: [art] Populate DV Done
20,296,739 UART: [fht] FMC Alias Private Key: 7
20,298,236 UART: [art] Derive CDI
20,299,005 UART: [art] Store in in slot 0x4
20,341,175 UART: [art] Derive Key Pair
20,342,215 UART: [art] Store priv key in slot 0x5
22,769,516 UART: [art] Derive Key Pair - Done
22,782,417 UART: [art] Signing Cert with AUTHO
22,783,720 UART: RITY.KEYID = 7
24,489,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,979 UART: [art] PUB.X = D7CE738F0ACFE4691F4E737F91FEB72D2010DA8B274A0BBA24B1F61DC6FCD076FE266EE73313BA6183AFEBD717926A55
24,498,264 UART: [art] PUB.Y = F0E6B8A2D163860C6C6E01B8F3FBAB504C5E0136755044A14D343CA8ABB3FFFDED1288CB5259C0B2630DCCF2F67506C4
24,505,518 UART: [art] SIG.R = B6EAD23F63F9F407B759B845EB9AC023B53D3B0AA3D5294062B51326000C587C2F92BCA14BEF84F7AE6D0074515A3D3B
24,512,897 UART: [art] SIG.S = F105436FD1C9B02CDF3136CF08C20DED4ADA557C0A2FAAD4A5596B738282E5C9D8FD7D2A7C7672BFCAC4D5F6BB9F2F99
25,492,393 UART: Caliptra RT
25,493,104 UART: [state] CFI Enabled
25,610,493 UART: [rt] RT listening for mailbox commands...
25,612,796 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,768,155 UART: [rt]cmd =0x41544d4e, len=14344
29,763,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,447 UART:
192,804 UART: Running Caliptra ROM ...
194,121 UART:
194,274 UART: [state] CFI Enabled
264,868 UART: [state] LifecycleState = Unprovisioned
267,286 UART: [state] DebugLocked = No
269,735 UART: [state] WD Timer not started. Device not locked for debugging
273,628 UART: [kat] SHA2-256
463,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,314 UART: [kat] ++
474,762 UART: [kat] sha1
486,271 UART: [kat] SHA2-256
489,271 UART: [kat] SHA2-384
494,785 UART: [kat] SHA2-512-ACC
497,363 UART: [kat] ECC-384
2,947,519 UART: [kat] HMAC-384Kdf
2,970,287 UART: [kat] LMS
3,502,066 UART: [kat] --
3,508,219 UART: [cold-reset] ++
3,509,366 UART: [fht] FHT @ 0x50003400
3,521,624 UART: [idev] ++
3,522,328 UART: [idev] CDI.KEYID = 6
3,523,246 UART: [idev] SUBJECT.KEYID = 7
3,524,493 UART: [idev] UDS.KEYID = 0
3,525,414 ready_for_fw is high
3,525,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,196 UART: [idev] Erasing UDS.KEYID = 0
6,027,260 UART: [idev] Sha1 KeyId Algorithm
6,050,925 UART: [idev] --
6,055,375 UART: [ldev] ++
6,056,108 UART: [ldev] CDI.KEYID = 6
6,057,028 UART: [ldev] SUBJECT.KEYID = 5
6,058,193 UART: [ldev] AUTHORITY.KEYID = 7
6,059,371 UART: [ldev] FE.KEYID = 1
6,097,505 UART: [ldev] Erasing FE.KEYID = 1
8,599,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,566 UART: [ldev] --
10,390,676 UART: [fwproc] Wait for Commands...
10,393,151 UART: [fwproc] Recv command 0x46574c44
10,395,462 UART: [fwproc] Recv'd Img size: 114084 bytes
13,839,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,030,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,571,442 >>> mbox cmd response: success
14,575,392 UART: [afmc] ++
14,576,103 UART: [afmc] CDI.KEYID = 6
14,577,344 UART: [afmc] SUBJECT.KEYID = 7
14,578,780 UART: [afmc] AUTHORITY.KEYID = 5
17,102,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,830,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,832,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,848,061 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,863,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,878,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,901,736 UART: [afmc] --
18,904,676 UART: [cold-reset] --
18,908,116 UART: [state] Locking Datavault
18,915,339 UART: [state] Locking PCR0, PCR1 and PCR31
18,917,497 UART: [state] Locking ICCM
18,919,327 UART: [exit] Launching FMC @ 0x40000130
18,928,013 UART:
18,928,251 UART: Running Caliptra FMC ...
18,929,345 UART:
18,929,505 UART: [state] CFI Enabled
18,988,623 UART: [fht] FMC Alias Private Key: 7
20,752,850 UART: [art] Extend RT PCRs Done
20,754,076 UART: [art] Lock RT PCRs Done
20,755,628 UART: [art] Populate DV Done
20,760,870 UART: [fht] FMC Alias Private Key: 7
20,762,615 UART: [art] Derive CDI
20,763,348 UART: [art] Store in in slot 0x4
20,821,462 UART: [art] Derive Key Pair
20,822,499 UART: [art] Store priv key in slot 0x5
23,285,462 UART: [art] Derive Key Pair - Done
23,298,668 UART: [art] Signing Cert with AUTHO
23,299,968 UART: RITY.KEYID = 7
25,011,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,013,405 UART: [art] PUB.X = 908F35ED130AF1B2013706CABE7C772D5F2D77036A2B26C1A6222068EF279BBE9B9E9A5B6A0B11347E161CE4B062847E
25,020,523 UART: [art] PUB.Y = 62C1A9540398E2411C9773F3B49FD7BF7446CC559D3D0F2847841D7B3260C6D2CB3CD3E0970FF664A5F6E9F76BBDC7D5
25,027,787 UART: [art] SIG.R = 0490C6DA4DA809344D54D922F6C0F68E29EF04EB3DD85A13DF47DBB067C4C4B510B0AE7754D36DA6D2D3C942F29763C5
25,035,170 UART: [art] SIG.S = DF7852C5C386A65E24CFEF9B2FBD813EF966FB8BC00A05464DB7A408E2C3781AC6E3FF0832AC7723C76D09EA9F64F97D
26,014,144 UART: Caliptra RT
26,014,847 UART: [state] CFI Enabled
26,180,423 UART: [rt] RT listening for mailbox commands...
26,182,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,338,114 UART: [rt]cmd =0x41544d4e, len=14344
30,334,338 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,437,963 ready_for_fw is high
3,438,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,736,676 >>> mbox cmd response: success
19,023,781 UART:
19,024,213 UART: Running Caliptra FMC ...
19,025,355 UART:
19,025,521 UART: [state] CFI Enabled
19,095,189 UART: [fht] FMC Alias Private Key: 7
20,859,069 UART: [art] Extend RT PCRs Done
20,860,292 UART: [art] Lock RT PCRs Done
20,861,804 UART: [art] Populate DV Done
20,867,371 UART: [fht] FMC Alias Private Key: 7
20,869,123 UART: [art] Derive CDI
20,869,956 UART: [art] Store in in slot 0x4
20,927,221 UART: [art] Derive Key Pair
20,928,282 UART: [art] Store priv key in slot 0x5
23,391,528 UART: [art] Derive Key Pair - Done
23,404,468 UART: [art] Signing Cert with AUTHO
23,405,814 UART: RITY.KEYID = 7
25,117,054 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,559 UART: [art] PUB.X = 13E577EAB8094678B050C78849198132B556887DC2FD6A3B39257A2AB98EACDC5AE4FB30AC0E84814791316F3360F524
25,125,798 UART: [art] PUB.Y = 19EF4ECEAC8BD5F44471FE130E4677BB4F169A45F1CFF172E22AB5CCBBD243C0431246BFE6F294DB3A7302C053F10F11
25,133,085 UART: [art] SIG.R = B556BFC66D029B1A404685A33911817085DA08442200A859F411CBCCA5A22511D22FBD87E1F22E581AD8090401CD3882
25,140,417 UART: [art] SIG.S = 8C9881EE6B266DED7C54A48B56E5D67F36C88B4AA6851F578D2A40C3025ACA5F4680C1AF0F2BDFCA029BC143728AB95E
26,119,065 UART: Caliptra RT
26,119,773 UART: [state] CFI Enabled
26,285,651 UART: [rt] RT listening for mailbox commands...
26,287,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,419 UART: [rt]cmd =0x41544d4e, len=14344
30,438,897 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,787 writing to cptra_bootfsm_go
192,910 UART:
193,326 UART: Running Caliptra ROM ...
194,439 UART:
604,282 UART: [state] CFI Enabled
615,553 UART: [state] LifecycleState = Unprovisioned
617,586 UART: [state] DebugLocked = No
619,405 UART: [state] WD Timer not started. Device not locked for debugging
623,785 UART: [kat] SHA2-256
813,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,422 UART: [kat] ++
825,036 UART: [kat] sha1
837,201 UART: [kat] SHA2-256
840,203 UART: [kat] SHA2-384
847,826 UART: [kat] SHA2-512-ACC
850,416 UART: [kat] ECC-384
3,293,226 UART: [kat] HMAC-384Kdf
3,307,403 UART: [kat] LMS
3,839,195 UART: [kat] --
3,845,092 UART: [cold-reset] ++
3,846,262 UART: [fht] FHT @ 0x50003400
3,859,377 UART: [idev] ++
3,860,020 UART: [idev] CDI.KEYID = 6
3,861,058 UART: [idev] SUBJECT.KEYID = 7
3,862,168 UART: [idev] UDS.KEYID = 0
3,863,270 ready_for_fw is high
3,863,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,699 UART: [idev] Erasing UDS.KEYID = 0
6,334,574 UART: [idev] Sha1 KeyId Algorithm
6,356,890 UART: [idev] --
6,362,805 UART: [ldev] ++
6,363,500 UART: [ldev] CDI.KEYID = 6
6,364,415 UART: [ldev] SUBJECT.KEYID = 5
6,365,579 UART: [ldev] AUTHORITY.KEYID = 7
6,366,759 UART: [ldev] FE.KEYID = 1
6,379,531 UART: [ldev] Erasing FE.KEYID = 1
8,861,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,289 UART: [ldev] --
10,653,876 UART: [fwproc] Wait for Commands...
10,655,375 UART: [fwproc] Recv command 0x46574c44
10,657,683 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,601 >>> mbox cmd response: success
14,838,079 UART: [afmc] ++
14,838,792 UART: [afmc] CDI.KEYID = 6
14,839,927 UART: [afmc] SUBJECT.KEYID = 7
14,841,481 UART: [afmc] AUTHORITY.KEYID = 5
17,347,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,907 UART: [afmc] --
19,144,673 UART: [cold-reset] --
19,148,636 UART: [state] Locking Datavault
19,153,154 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,314 UART: [state] Locking ICCM
19,157,315 UART: [exit] Launching FMC @ 0x40000130
19,165,943 UART:
19,166,181 UART: Running Caliptra FMC ...
19,167,302 UART:
19,167,461 UART: [state] CFI Enabled
19,175,726 UART: [fht] FMC Alias Private Key: 7
20,932,644 UART: [art] Extend RT PCRs Done
20,933,838 UART: [art] Lock RT PCRs Done
20,935,382 UART: [art] Populate DV Done
20,940,950 UART: [fht] FMC Alias Private Key: 7
20,942,594 UART: [art] Derive CDI
20,943,330 UART: [art] Store in in slot 0x4
20,985,638 UART: [art] Derive Key Pair
20,986,687 UART: [art] Store priv key in slot 0x5
23,413,484 UART: [art] Derive Key Pair - Done
23,426,373 UART: [art] Signing Cert with AUTHO
23,427,676 UART: RITY.KEYID = 7
25,133,182 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,677 UART: [art] PUB.X = EECD461C7B0A3A03DA6779D96605BD92AA160523F01302C8B047BAF6693BBD9ED034F1D4FBCBC8718C262AE4C855FF04
25,142,028 UART: [art] PUB.Y = 8DFF19FEA0CD1E80642ED170E96F876C1D46726C04CF7B96572B5C5EF793D023E2B7C4D941EB9DE80A04876FDBA1A30F
25,149,268 UART: [art] SIG.R = C174FD60FECA6C1BC0CFEE5F0CD3AF0BF5827092040DED37BD6F9783F1BC5212D8D84B83286EDF18BC713B16452D26A9
25,156,655 UART: [art] SIG.S = 0CA9C00853399C9133689A37FE04D898080D81C588F287727FE9D206F3BAB210B1E6201037921B582B9DE75885FEB386
26,135,774 UART: Caliptra RT
26,136,483 UART: [state] CFI Enabled
26,253,551 UART: [rt] RT listening for mailbox commands...
26,255,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,411,355 UART: [rt]cmd =0x41544d4e, len=14344
30,406,894 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
3,760,452 ready_for_fw is high
3,760,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,955,133 >>> mbox cmd response: success
19,206,721 UART:
19,207,102 UART: Running Caliptra FMC ...
19,208,204 UART:
19,208,360 UART: [state] CFI Enabled
19,216,208 UART: [fht] FMC Alias Private Key: 7
20,973,282 UART: [art] Extend RT PCRs Done
20,974,503 UART: [art] Lock RT PCRs Done
20,976,430 UART: [art] Populate DV Done
20,981,863 UART: [fht] FMC Alias Private Key: 7
20,983,471 UART: [art] Derive CDI
20,984,215 UART: [art] Store in in slot 0x4
21,027,080 UART: [art] Derive Key Pair
21,028,128 UART: [art] Store priv key in slot 0x5
23,455,473 UART: [art] Derive Key Pair - Done
23,468,318 UART: [art] Signing Cert with AUTHO
23,469,625 UART: RITY.KEYID = 7
25,174,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,405 UART: [art] PUB.X = 37C6A284282C9BBA414DE585C5587A8660830E5650793DEE051494B818412CE11C1383F484247B4473EBDFA3EA535464
25,183,722 UART: [art] PUB.Y = 87D43FA062BF8EDD105908607879489A7A364B10D107155F984C27EE4CD128AA773B0DDBADC7F8DB66F0E979229E1D48
25,190,901 UART: [art] SIG.R = 391887E3CBC2AA120D99EB516AF57C5955478B093DD757D7034FD4ED5DABA8AA7A624377181E013772DC1C900DC50BBC
25,198,300 UART: [art] SIG.S = 3303B55C2186E0FC89B33D5B727014168B80C913404495BF49ED6E7D293FEEF9AE056F66366EB744CE1E863EDDF67683
26,177,650 UART: Caliptra RT
26,178,354 UART: [state] CFI Enabled
26,294,381 UART: [rt] RT listening for mailbox commands...
26,296,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,452,312 UART: [rt]cmd =0x41544d4e, len=14344
30,447,905 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,763 UART: [kat] SHA2-256
881,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,809 UART: [kat] ++
885,961 UART: [kat] sha1
890,261 UART: [kat] SHA2-256
892,199 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,350 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,476,039 UART: [cold-reset] ++
1,476,475 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,150 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,686 UART: [idev] --
1,514,609 UART: [ldev] ++
1,514,777 UART: [ldev] CDI.KEYID = 6
1,515,140 UART: [ldev] SUBJECT.KEYID = 5
1,515,566 UART: [ldev] AUTHORITY.KEYID = 7
1,516,029 UART: [ldev] FE.KEYID = 1
1,521,147 UART: [ldev] Erasing FE.KEYID = 1
1,546,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,226 UART: [ldev] --
1,585,561 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 114084 bytes
2,880,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,491 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,420 >>> mbox cmd response: success
3,074,580 UART: [afmc] ++
3,074,748 UART: [afmc] CDI.KEYID = 6
3,075,110 UART: [afmc] SUBJECT.KEYID = 7
3,075,535 UART: [afmc] AUTHORITY.KEYID = 5
3,109,998 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,441 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,131 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,890 UART: [afmc] --
3,152,798 UART: [cold-reset] --
3,153,574 UART: [state] Locking Datavault
3,154,825 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,429 UART: [state] Locking ICCM
3,155,925 UART: [exit] Launching FMC @ 0x40000130
3,161,254 UART:
3,161,270 UART: Running Caliptra FMC ...
3,161,678 UART:
3,161,732 UART: [state] CFI Enabled
3,172,133 UART: [fht] FMC Alias Private Key: 7
3,279,886 UART: [art] Extend RT PCRs Done
3,280,314 UART: [art] Lock RT PCRs Done
3,282,292 UART: [art] Populate DV Done
3,290,597 UART: [fht] FMC Alias Private Key: 7
3,291,579 UART: [art] Derive CDI
3,291,859 UART: [art] Store in in slot 0x4
3,377,622 UART: [art] Derive Key Pair
3,377,982 UART: [art] Store priv key in slot 0x5
3,391,572 UART: [art] Derive Key Pair - Done
3,406,446 UART: [art] Signing Cert with AUTHO
3,406,926 UART: RITY.KEYID = 7
3,422,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,979 UART: [art] PUB.X = DD6AD8B62034EBE8D08D122B3ECD356095CA98EFE78A5DE8664C2CB0C1C3AD71B3E8047D4AB2A7A983E669D037E1C307
3,429,761 UART: [art] PUB.Y = 62AA96740200F0C53A3A8192150DEC156B360ACF23B837380443146975D80570B5C7DF1526A72E78A41BBCC8C6B392FC
3,436,672 UART: [art] SIG.R = AFB1A218197EA2FBA0D7285CF72A3E11B616F12F2F9C2A78E3ACCFA868E525438C5DA282211125E9F4BA09D24CC18141
3,443,451 UART: [art] SIG.S = 75D9AA455D6359BDC23FDA1CB9B89E32ACFFFF88CBA5E7CEE455B6E33BA87B3FB775F18D26BF20A3C0385B309A576AD5
3,466,686 UART: Caliptra RT
3,466,939 UART: [state] CFI Enabled
3,574,342 UART: [rt] RT listening for mailbox commands...
3,575,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,202 UART: [rt]cmd =0x41544d4e, len=14344
4,007,843 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 ready_for_fw is high
1,362,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,626 >>> mbox cmd response: success
2,984,514 UART:
2,984,530 UART: Running Caliptra FMC ...
2,984,938 UART:
2,984,992 UART: [state] CFI Enabled
2,995,725 UART: [fht] FMC Alias Private Key: 7
3,103,346 UART: [art] Extend RT PCRs Done
3,103,774 UART: [art] Lock RT PCRs Done
3,105,098 UART: [art] Populate DV Done
3,113,021 UART: [fht] FMC Alias Private Key: 7
3,114,039 UART: [art] Derive CDI
3,114,319 UART: [art] Store in in slot 0x4
3,200,030 UART: [art] Derive Key Pair
3,200,390 UART: [art] Store priv key in slot 0x5
3,213,662 UART: [art] Derive Key Pair - Done
3,228,029 UART: [art] Signing Cert with AUTHO
3,228,509 UART: RITY.KEYID = 7
3,243,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,172 UART: [art] PUB.X = DF0E48B404924DB66E71EBFCAF17979025EBF86F2437658BF0E24B352CDFE303EB1FF51CC61031A510018A96124B03EE
3,250,937 UART: [art] PUB.Y = 913E89A293F714D8FCA3FBCB6D9FD98D00F0C03FBACC34FEA9B552937ACCAB74F23E231136F7E1E3B0347C79D56227DE
3,257,885 UART: [art] SIG.R = 0528284F011DA60EF27D884074A4F79C627A21B78FB48D46765946C222F9C33E259944657ACBA55852252BC69E738CD3
3,264,638 UART: [art] SIG.S = 6275224F0191E7464A3EC922BBC05953321A3B1DFBE4500B7FDC1974305FDC24731744C79FD11FFE4C2E959A642E322F
3,288,029 UART: Caliptra RT
3,288,282 UART: [state] CFI Enabled
3,397,118 UART: [rt] RT listening for mailbox commands...
3,397,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,692 UART: [rt]cmd =0x41544d4e, len=14344
3,830,469 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,910 UART: [kat] SHA2-256
881,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,956 UART: [kat] ++
886,108 UART: [kat] sha1
890,248 UART: [kat] SHA2-256
892,186 UART: [kat] SHA2-384
894,891 UART: [kat] SHA2-512-ACC
896,792 UART: [kat] ECC-384
902,381 UART: [kat] HMAC-384Kdf
907,029 UART: [kat] LMS
1,475,225 UART: [kat] --
1,476,194 UART: [cold-reset] ++
1,476,772 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 ready_for_fw is high
1,480,926 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,951 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,714 UART: [ldev] Erasing FE.KEYID = 1
1,546,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,915 UART: [ldev] --
1,586,328 UART: [fwproc] Waiting for Commands...
1,587,137 UART: [fwproc] Received command 0x46574c44
1,587,928 UART: [fwproc] Received Image of size 114084 bytes
2,882,730 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,197 >>> mbox cmd response: success
3,076,391 UART: [afmc] ++
3,076,559 UART: [afmc] CDI.KEYID = 6
3,076,921 UART: [afmc] SUBJECT.KEYID = 7
3,077,346 UART: [afmc] AUTHORITY.KEYID = 5
3,113,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,419 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,304 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,994 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,803 UART: [afmc] --
3,156,885 UART: [cold-reset] --
3,157,861 UART: [state] Locking Datavault
3,159,046 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,650 UART: [state] Locking ICCM
3,160,114 UART: [exit] Launching FMC @ 0x40000130
3,165,443 UART:
3,165,459 UART: Running Caliptra FMC ...
3,165,867 UART:
3,166,010 UART: [state] CFI Enabled
3,176,637 UART: [fht] FMC Alias Private Key: 7
3,284,304 UART: [art] Extend RT PCRs Done
3,284,732 UART: [art] Lock RT PCRs Done
3,286,020 UART: [art] Populate DV Done
3,294,351 UART: [fht] FMC Alias Private Key: 7
3,295,385 UART: [art] Derive CDI
3,295,665 UART: [art] Store in in slot 0x4
3,381,208 UART: [art] Derive Key Pair
3,381,568 UART: [art] Store priv key in slot 0x5
3,394,904 UART: [art] Derive Key Pair - Done
3,409,520 UART: [art] Signing Cert with AUTHO
3,410,000 UART: RITY.KEYID = 7
3,425,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,333 UART: [art] PUB.X = 8C8AFB21429E6083DC3755A8242D1B310FB35D015588291CE73599168D539F9C1D69BDAF76FE5E6E439207FC32FD7027
3,433,094 UART: [art] PUB.Y = 013A17B93A2B4FCB98BE3832F48FB40A4383387360E82DF557938432F90C6E4FF78EE92C322A00939FF5C2207E134F32
3,440,011 UART: [art] SIG.R = 8B528BF4C6E3F74548954E8C63DF6C710B0FC592C2FFA0E6EEE66833E23E630A9DFF069F3CFF4224B9D494049CCED3BB
3,446,784 UART: [art] SIG.S = 0BEE3B4EDAB4C6CFC76B5A56A5F7C84465566EE54121F9932E6573BE9B3E0CE29B06B6BE80CF0DBFA3E94A4E03FF0474
3,470,981 UART: Caliptra RT
3,471,326 UART: [state] CFI Enabled
3,579,675 UART: [rt] RT listening for mailbox commands...
3,580,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,467 UART: [rt]cmd =0x41544d4e, len=14344
4,012,794 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,400 ready_for_fw is high
1,363,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,365 >>> mbox cmd response: success
2,987,179 UART:
2,987,195 UART: Running Caliptra FMC ...
2,987,603 UART:
2,987,746 UART: [state] CFI Enabled
2,998,687 UART: [fht] FMC Alias Private Key: 7
3,106,528 UART: [art] Extend RT PCRs Done
3,106,956 UART: [art] Lock RT PCRs Done
3,108,682 UART: [art] Populate DV Done
3,117,015 UART: [fht] FMC Alias Private Key: 7
3,118,017 UART: [art] Derive CDI
3,118,297 UART: [art] Store in in slot 0x4
3,203,582 UART: [art] Derive Key Pair
3,203,942 UART: [art] Store priv key in slot 0x5
3,217,050 UART: [art] Derive Key Pair - Done
3,231,790 UART: [art] Signing Cert with AUTHO
3,232,270 UART: RITY.KEYID = 7
3,247,296 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,061 UART: [art] PUB.X = 9F50A1FC2C2A2170C476FA5A2627D8C9F21541D67CDB28D09E0F38C284AAEB53EBA48D19AB45D1CC0454E53113FB5165
3,254,837 UART: [art] PUB.Y = E1E129A17C7F48F1C77A217D930D957DB15D41D1BBE8B076F5D0EB8482777299A9023ED927F8DEB6463B13855B795716
3,261,781 UART: [art] SIG.R = 137B53A0BD7ACBCEE2F371543EFED16BB0F95E8F184891A3E5F76E1FA4CBF1C410887B5506DBDAC57DABF5B8F60CFEAA
3,268,577 UART: [art] SIG.S = DD497E40683CAD349ACF55531A5DD96E57ED9CC8F49DC9296EFC13F255D5F9290FFA6B0D6CB72872C8E5D332E4D027B9
3,291,984 UART: Caliptra RT
3,292,329 UART: [state] CFI Enabled
3,400,712 UART: [rt] RT listening for mailbox commands...
3,401,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,592 UART: [rt]cmd =0x41544d4e, len=14344
3,834,139 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
918,130 UART: [kat] HMAC-384Kdf
922,794 UART: [kat] LMS
1,171,122 UART: [kat] --
1,172,025 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,200 UART: [idev] ++
1,175,368 UART: [idev] CDI.KEYID = 6
1,175,728 UART: [idev] SUBJECT.KEYID = 7
1,176,152 UART: [idev] UDS.KEYID = 0
1,176,497 ready_for_fw is high
1,176,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,248 UART: [idev] Erasing UDS.KEYID = 0
1,201,049 UART: [idev] Sha1 KeyId Algorithm
1,209,383 UART: [idev] --
1,210,461 UART: [ldev] ++
1,210,629 UART: [ldev] CDI.KEYID = 6
1,210,992 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,216,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,786 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,563 >>> mbox cmd response: success
2,771,805 UART: [afmc] ++
2,771,973 UART: [afmc] CDI.KEYID = 6
2,772,335 UART: [afmc] SUBJECT.KEYID = 7
2,772,760 UART: [afmc] AUTHORITY.KEYID = 5
2,807,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,096 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,854 UART: [afmc] --
2,850,804 UART: [cold-reset] --
2,851,580 UART: [state] Locking Datavault
2,852,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,381 UART: [state] Locking ICCM
2,853,909 UART: [exit] Launching FMC @ 0x40000130
2,859,238 UART:
2,859,254 UART: Running Caliptra FMC ...
2,859,662 UART:
2,859,716 UART: [state] CFI Enabled
2,870,093 UART: [fht] FMC Alias Private Key: 7
2,977,132 UART: [art] Extend RT PCRs Done
2,977,560 UART: [art] Lock RT PCRs Done
2,979,232 UART: [art] Populate DV Done
2,987,383 UART: [fht] FMC Alias Private Key: 7
2,988,367 UART: [art] Derive CDI
2,988,647 UART: [art] Store in in slot 0x4
3,074,374 UART: [art] Derive Key Pair
3,074,734 UART: [art] Store priv key in slot 0x5
3,087,806 UART: [art] Derive Key Pair - Done
3,102,954 UART: [art] Signing Cert with AUTHO
3,103,434 UART: RITY.KEYID = 7
3,118,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,051 UART: [art] PUB.X = D35D956F3CA7E9637D55C7A764D3D4EA5BE4C06447AEC2E3D0CDC3E4B796B2CDA434AC44FFB4A42C3CE9FD140169FA85
3,125,842 UART: [art] PUB.Y = 063FDE4BE5842DDBC215D3289DAD1BDCDD93F63DC7D586C9ABB6699048133662644BAAC1DB5F55FC07D858A6731AC4AB
3,132,806 UART: [art] SIG.R = 5110C7EA1D7A3A0817A23EB4B15F195E39EC293CC4B5A91E8723EE4503978D712A1F503FBBEC42D7D340D97E3124C305
3,139,573 UART: [art] SIG.S = C2F9E3C9E667599D8621D403EBF678E25B084E51AAB175AABE36A3FB0570C33EEB2E105E6DD2CCB27EA0563A3ECECAE8
3,162,951 UART: Caliptra RT
3,163,204 UART: [state] CFI Enabled
3,270,575 UART: [rt] RT listening for mailbox commands...
3,271,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,189 UART: [rt]cmd =0x41544d4e, len=14344
3,704,388 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,765 ready_for_fw is high
1,060,765 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,882 >>> mbox cmd response: success
2,684,216 UART:
2,684,232 UART: Running Caliptra FMC ...
2,684,640 UART:
2,684,694 UART: [state] CFI Enabled
2,695,145 UART: [fht] FMC Alias Private Key: 7
2,803,580 UART: [art] Extend RT PCRs Done
2,804,008 UART: [art] Lock RT PCRs Done
2,805,752 UART: [art] Populate DV Done
2,814,193 UART: [fht] FMC Alias Private Key: 7
2,815,187 UART: [art] Derive CDI
2,815,467 UART: [art] Store in in slot 0x4
2,901,158 UART: [art] Derive Key Pair
2,901,518 UART: [art] Store priv key in slot 0x5
2,914,950 UART: [art] Derive Key Pair - Done
2,929,913 UART: [art] Signing Cert with AUTHO
2,930,393 UART: RITY.KEYID = 7
2,945,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,462 UART: [art] PUB.X = F44D8B3BFEE7D622A20966A683EA0B9D8C83E27D11BDCD4CC78B271FD3FF8991D13242917D2892264744CDF05CB967D0
2,953,236 UART: [art] PUB.Y = D0BA8FEA1C9E19BE360D44252758459D3BB983426EA03A0D6497EF0E352A4C51ED33A347E87D31ADED74F319ACC5DA7E
2,960,193 UART: [art] SIG.R = 817B85C74F7F6345FA8E0CFCA3A33443F78D181452D56337D0588198C44A9B8E38CCD40A8D4E33D6FBD1D60C4C8A2004
2,966,957 UART: [art] SIG.S = BE39C3F24FFC0AA3BA78619D34831159CE3722174CF4EBA1A5CA7B90835FC7415DFD6A4E67B59F9AA98830A094B960B5
2,990,377 UART: Caliptra RT
2,990,630 UART: [state] CFI Enabled
3,098,288 UART: [rt] RT listening for mailbox commands...
3,098,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,020 UART: [rt]cmd =0x41544d4e, len=14344
3,532,347 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,968 UART: [kat] SHA2-256
903,908 UART: [kat] SHA2-384
906,435 UART: [kat] SHA2-512-ACC
908,336 UART: [kat] ECC-384
917,865 UART: [kat] HMAC-384Kdf
922,477 UART: [kat] LMS
1,170,805 UART: [kat] --
1,171,472 UART: [cold-reset] ++
1,171,894 UART: [fht] FHT @ 0x50003400
1,174,523 UART: [idev] ++
1,174,691 UART: [idev] CDI.KEYID = 6
1,175,051 UART: [idev] SUBJECT.KEYID = 7
1,175,475 UART: [idev] UDS.KEYID = 0
1,175,820 ready_for_fw is high
1,175,820 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,747 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,209,872 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,564 UART: [ldev] Erasing FE.KEYID = 1
1,244,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,298 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,309 UART: [fwproc] Recv command 0x46574c44
1,285,037 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,250 >>> mbox cmd response: success
2,773,466 UART: [afmc] ++
2,773,634 UART: [afmc] CDI.KEYID = 6
2,773,996 UART: [afmc] SUBJECT.KEYID = 7
2,774,421 UART: [afmc] AUTHORITY.KEYID = 5
2,810,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,655 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,689 UART: [afmc] --
2,853,781 UART: [cold-reset] --
2,854,611 UART: [state] Locking Datavault
2,855,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,314 UART: [state] Locking ICCM
2,856,972 UART: [exit] Launching FMC @ 0x40000130
2,862,301 UART:
2,862,317 UART: Running Caliptra FMC ...
2,862,725 UART:
2,862,868 UART: [state] CFI Enabled
2,873,559 UART: [fht] FMC Alias Private Key: 7
2,982,202 UART: [art] Extend RT PCRs Done
2,982,630 UART: [art] Lock RT PCRs Done
2,984,022 UART: [art] Populate DV Done
2,992,281 UART: [fht] FMC Alias Private Key: 7
2,993,243 UART: [art] Derive CDI
2,993,523 UART: [art] Store in in slot 0x4
3,079,238 UART: [art] Derive Key Pair
3,079,598 UART: [art] Store priv key in slot 0x5
3,092,224 UART: [art] Derive Key Pair - Done
3,107,221 UART: [art] Signing Cert with AUTHO
3,107,701 UART: RITY.KEYID = 7
3,123,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,794 UART: [art] PUB.X = 10CB4013D9AAEE6E016B88A0D4AA3EC913D7A593BB96A14164905A9474B379777DA980E91617BA84E364D14FCDC4240A
3,130,564 UART: [art] PUB.Y = 4A3E81037E4C604746AD6AF9C3EEC54E0223AA00BD438366359FBAE71D070251892635F47058B410E96DCFE599CDA871
3,137,482 UART: [art] SIG.R = 75CD8892E8339ED689B0938AA491AF1A99F7F85A64D62C3EF119AFF8486D0E4D89B29DF8EB1EB5E73B86B9CAB6FC25DA
3,144,269 UART: [art] SIG.S = FB8B986E2EB083F3E1AA8B889EDDAA655A180A184711941F42CB4EC109B49BBD800C6F1348DDE093F7774C2F16459E63
3,168,027 UART: Caliptra RT
3,168,372 UART: [state] CFI Enabled
3,277,147 UART: [rt] RT listening for mailbox commands...
3,277,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,637 UART: [rt]cmd =0x41544d4e, len=14344
3,710,404 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,308 ready_for_fw is high
1,060,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,425 >>> mbox cmd response: success
2,685,627 UART:
2,685,643 UART: Running Caliptra FMC ...
2,686,051 UART:
2,686,194 UART: [state] CFI Enabled
2,697,211 UART: [fht] FMC Alias Private Key: 7
2,804,762 UART: [art] Extend RT PCRs Done
2,805,190 UART: [art] Lock RT PCRs Done
2,806,792 UART: [art] Populate DV Done
2,814,805 UART: [fht] FMC Alias Private Key: 7
2,815,827 UART: [art] Derive CDI
2,816,107 UART: [art] Store in in slot 0x4
2,901,610 UART: [art] Derive Key Pair
2,901,970 UART: [art] Store priv key in slot 0x5
2,914,984 UART: [art] Derive Key Pair - Done
2,929,441 UART: [art] Signing Cert with AUTHO
2,929,921 UART: RITY.KEYID = 7
2,945,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,098 UART: [art] PUB.X = ADE4B0AB974E1F67C037E9780E8162C52AFD9EFAED0BA19242CFD02B228F0309366E84CE5B296B08323FE62835FB9133
2,952,863 UART: [art] PUB.Y = 719738563A50191E8BC8466DE524042C320B8A02C74C263E6EB23832E07D57A8096CE7A4B9085B0782F91A0C0CA25D66
2,959,783 UART: [art] SIG.R = 2C44AC6F48ABCF90AB4838A88F2905DF3277949E688BF1AF8391EBBBCE2BE2F41E61F63B8478B2B3B687E2B34280E930
2,966,562 UART: [art] SIG.S = 57376BE3723DB96F718CB030F60EB287D6C0867516BABEA6386D455BAFFE164B5E63635FBAC54FA1B26EBEA82546DB3C
2,990,734 UART: Caliptra RT
2,991,079 UART: [state] CFI Enabled
3,098,892 UART: [rt] RT listening for mailbox commands...
3,099,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,464 UART: [rt]cmd =0x41544d4e, len=14344
3,532,247 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,039 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,268 UART: [ldev] ++
1,208,436 UART: [ldev] CDI.KEYID = 6
1,208,800 UART: [ldev] SUBJECT.KEYID = 5
1,209,227 UART: [ldev] AUTHORITY.KEYID = 7
1,209,690 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,240,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,464 UART: [fwproc] Wait for Commands...
1,281,137 UART: [fwproc] Recv command 0x46574c44
1,281,870 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,461 >>> mbox cmd response: success
2,770,500 UART: [afmc] ++
2,770,668 UART: [afmc] CDI.KEYID = 6
2,771,031 UART: [afmc] SUBJECT.KEYID = 7
2,771,457 UART: [afmc] AUTHORITY.KEYID = 5
2,807,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,912 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,795 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,545 UART: [afmc] --
2,850,453 UART: [cold-reset] --
2,851,319 UART: [state] Locking Datavault
2,852,560 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,164 UART: [state] Locking ICCM
2,853,740 UART: [exit] Launching FMC @ 0x40000130
2,859,069 UART:
2,859,085 UART: Running Caliptra FMC ...
2,859,493 UART:
2,859,547 UART: [state] CFI Enabled
2,869,908 UART: [fht] FMC Alias Private Key: 7
2,977,577 UART: [art] Extend RT PCRs Done
2,978,005 UART: [art] Lock RT PCRs Done
2,979,345 UART: [art] Populate DV Done
2,987,408 UART: [fht] FMC Alias Private Key: 7
2,988,558 UART: [art] Derive CDI
2,988,838 UART: [art] Store in in slot 0x4
3,074,795 UART: [art] Derive Key Pair
3,075,155 UART: [art] Store priv key in slot 0x5
3,087,803 UART: [art] Derive Key Pair - Done
3,102,527 UART: [art] Signing Cert with AUTHO
3,103,007 UART: RITY.KEYID = 7
3,118,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,766 UART: [art] PUB.X = 83996945BEDAB320C12FC855A8790D06CCE5CCFF7B267FE15C83A5AFB511E8B8A6143096986766B264B82A1944A91FC4
3,125,536 UART: [art] PUB.Y = 0DED4402E36EA7AECBD954798E72BBA11222BB44939E8E5FF7B981C4E1344C7FC28A53D9BB5BA0E30C7D7A4B947B494C
3,132,495 UART: [art] SIG.R = 81D6747EF2E3227EBF1C114C3A9F6FE5158F6AEDDEFE6D9F4ED2D453B6C48E4E72299A0E81CC23BE63900CBFFEF5B7A8
3,139,285 UART: [art] SIG.S = A939076857C9FE4C4ADDE7CFEA693166C8E7ED23AFEF33C9EA9375DFADBC9BA207D1929F38BDC60D4F821F31DE302168
3,163,225 UART: Caliptra RT
3,163,478 UART: [state] CFI Enabled
3,271,420 UART: [rt] RT listening for mailbox commands...
3,272,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,260 UART: [rt]cmd =0x41544d4e, len=14344
3,705,369 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,338 ready_for_fw is high
1,056,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,151 >>> mbox cmd response: success
2,681,413 UART:
2,681,429 UART: Running Caliptra FMC ...
2,681,837 UART:
2,681,891 UART: [state] CFI Enabled
2,691,872 UART: [fht] FMC Alias Private Key: 7
2,799,733 UART: [art] Extend RT PCRs Done
2,800,161 UART: [art] Lock RT PCRs Done
2,801,901 UART: [art] Populate DV Done
2,810,162 UART: [fht] FMC Alias Private Key: 7
2,811,126 UART: [art] Derive CDI
2,811,406 UART: [art] Store in in slot 0x4
2,897,353 UART: [art] Derive Key Pair
2,897,713 UART: [art] Store priv key in slot 0x5
2,910,637 UART: [art] Derive Key Pair - Done
2,925,409 UART: [art] Signing Cert with AUTHO
2,925,889 UART: RITY.KEYID = 7
2,940,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,658 UART: [art] PUB.X = ABE9C9B3DDD4567CB9586B5AAE9BA877354BFE192FD10DB32C2EC3A60F478F440231477AE618AE948D5B1F03BF48AE34
2,948,434 UART: [art] PUB.Y = 26883E794F0AD2D51BA33731C23E5CFD2920557070403905A160DF247672F267071C29AEE465437C618DAACA9F109383
2,955,367 UART: [art] SIG.R = 7E7183207096E1275F36F65AA49D0DAF5C3D74432337D3119EF82B67D87977CFAA01F0788DCA80D74F312D7DF245CFBE
2,962,137 UART: [art] SIG.S = 447925AC0D89C57785994D9B56F414A71D8231DD17B7E522CDCFB0EC10235FC56DA4973FB33C987625030541B59BEF1B
2,985,273 UART: Caliptra RT
2,985,526 UART: [state] CFI Enabled
3,093,085 UART: [rt] RT listening for mailbox commands...
3,093,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,941 UART: [rt]cmd =0x41544d4e, len=14344
3,527,024 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,101 UART: [kat] LMS
1,169,413 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,190 UART: [idev] ++
1,173,358 UART: [idev] CDI.KEYID = 6
1,173,719 UART: [idev] SUBJECT.KEYID = 7
1,174,144 UART: [idev] UDS.KEYID = 0
1,174,490 ready_for_fw is high
1,174,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,282,041 UART: [fwproc] Wait for Commands...
1,282,616 UART: [fwproc] Recv command 0x46574c44
1,283,349 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,620 >>> mbox cmd response: success
2,770,793 UART: [afmc] ++
2,770,961 UART: [afmc] CDI.KEYID = 6
2,771,324 UART: [afmc] SUBJECT.KEYID = 7
2,771,750 UART: [afmc] AUTHORITY.KEYID = 5
2,807,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,470 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,706 UART: [afmc] --
2,851,734 UART: [cold-reset] --
2,852,564 UART: [state] Locking Datavault
2,853,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,287 UART: [state] Locking ICCM
2,854,805 UART: [exit] Launching FMC @ 0x40000130
2,860,134 UART:
2,860,150 UART: Running Caliptra FMC ...
2,860,558 UART:
2,860,701 UART: [state] CFI Enabled
2,871,078 UART: [fht] FMC Alias Private Key: 7
2,979,155 UART: [art] Extend RT PCRs Done
2,979,583 UART: [art] Lock RT PCRs Done
2,981,397 UART: [art] Populate DV Done
2,989,528 UART: [fht] FMC Alias Private Key: 7
2,990,508 UART: [art] Derive CDI
2,990,788 UART: [art] Store in in slot 0x4
3,076,569 UART: [art] Derive Key Pair
3,076,929 UART: [art] Store priv key in slot 0x5
3,089,935 UART: [art] Derive Key Pair - Done
3,104,765 UART: [art] Signing Cert with AUTHO
3,105,245 UART: RITY.KEYID = 7
3,120,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,192 UART: [art] PUB.X = 5E3C041ADC9F5BEFD9D3433E58A097AC1DF309EAAD71E12F7D2C46D4264900FAC90A1E42A6A1DB2F0FD58221CD058518
3,127,943 UART: [art] PUB.Y = 5C83848439A7C684586A8A7255274F9E4B422A5E4E2A1CF4600B89EC781D90637839AD5BFA0D423594D77385A860B6C4
3,134,881 UART: [art] SIG.R = EEA9905110D15D8AEB512D2910739577AD6D675F82C8EC059BE394DA5AE120117E1ED2FFC939150467087771A81639F3
3,141,640 UART: [art] SIG.S = 71164CFE053F3A93F8E355B1C0F883B208A2BAA141810690E8E54C7895090D7191993A6D5AB77426541A6B93DA7001D6
3,165,613 UART: Caliptra RT
3,165,958 UART: [state] CFI Enabled
3,272,961 UART: [rt] RT listening for mailbox commands...
3,273,631 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,685 UART: [rt]cmd =0x41544d4e, len=14344
3,706,830 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,803 ready_for_fw is high
1,056,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,940 >>> mbox cmd response: success
2,682,982 UART:
2,682,998 UART: Running Caliptra FMC ...
2,683,406 UART:
2,683,549 UART: [state] CFI Enabled
2,694,270 UART: [fht] FMC Alias Private Key: 7
2,801,841 UART: [art] Extend RT PCRs Done
2,802,269 UART: [art] Lock RT PCRs Done
2,803,867 UART: [art] Populate DV Done
2,812,166 UART: [fht] FMC Alias Private Key: 7
2,813,202 UART: [art] Derive CDI
2,813,482 UART: [art] Store in in slot 0x4
2,899,217 UART: [art] Derive Key Pair
2,899,577 UART: [art] Store priv key in slot 0x5
2,912,865 UART: [art] Derive Key Pair - Done
2,927,248 UART: [art] Signing Cert with AUTHO
2,927,728 UART: RITY.KEYID = 7
2,942,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,743 UART: [art] PUB.X = 19420BF74A97F448273F8025B4D9CDD7D163CB0B8F21038B38DC01197B13524BD6EC4F3AD70659AEA57519F45C97DACA
2,950,506 UART: [art] PUB.Y = 714EE261FCC02AFA573047006DDEE8258E260C9743C84C8FEDCF58A95BE84E9478BA8D9D6A9CADF07E86372EA615A0D1
2,957,447 UART: [art] SIG.R = 2487FEE0C3D7B3FA1E156C423EC855614A63818E49E3DA5FD01846B980C4CF771B4152EFD7FD25D006E8A8BE08DC72E2
2,964,223 UART: [art] SIG.S = A228C38BBE626EEAB5ED867F2D65D40B1F87FD21F02C6794E4636694A5CAA0E7BB99876B93415B29C137390D0CB52DAB
2,988,141 UART: Caliptra RT
2,988,486 UART: [state] CFI Enabled
3,096,859 UART: [rt] RT listening for mailbox commands...
3,097,529 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,747 UART: [rt]cmd =0x41544d4e, len=14344
3,530,778 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,016 UART:
192,456 UART: Running Caliptra ROM ...
193,605 UART:
193,756 UART: [state] CFI Enabled
265,609 UART: [state] LifecycleState = Unprovisioned
267,542 UART: [state] DebugLocked = No
268,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,638 UART: [kat] SHA2-256
444,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,850 UART: [kat] ++
455,379 UART: [kat] sha1
465,765 UART: [kat] SHA2-256
468,445 UART: [kat] SHA2-384
474,242 UART: [kat] SHA2-512-ACC
476,611 UART: [kat] ECC-384
2,767,061 UART: [kat] HMAC-384Kdf
2,779,726 UART: [kat] LMS
3,970,024 UART: [kat] --
3,975,309 UART: [cold-reset] ++
3,976,245 UART: [fht] Storing FHT @ 0x50003400
3,986,229 UART: [idev] ++
3,986,790 UART: [idev] CDI.KEYID = 6
3,987,821 UART: [idev] SUBJECT.KEYID = 7
3,988,997 UART: [idev] UDS.KEYID = 0
3,990,050 ready_for_fw is high
3,990,255 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,336 UART: [idev] Erasing UDS.KEYID = 0
7,322,657 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,764 UART: [idev] --
7,346,688 UART: [ldev] ++
7,347,315 UART: [ldev] CDI.KEYID = 6
7,348,235 UART: [ldev] SUBJECT.KEYID = 5
7,349,447 UART: [ldev] AUTHORITY.KEYID = 7
7,350,726 UART: [ldev] FE.KEYID = 1
7,380,440 UART: [ldev] Erasing FE.KEYID = 1
10,709,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,071,165 UART: [ldev] --
13,075,757 UART: [fwproc] Waiting for Commands...
13,077,848 UART: [fwproc] Received command 0x46574c44
13,080,044 UART: [fwproc] Received Image of size 113760 bytes
21,552,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,630,154 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,699,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,014,958 >>> mbox cmd response: success
22,018,344 UART: [afmc] ++
22,018,949 UART: [afmc] CDI.KEYID = 6
22,019,865 UART: [afmc] SUBJECT.KEYID = 7
22,021,081 UART: [afmc] AUTHORITY.KEYID = 5
25,384,069 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,682,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,684,883 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,699,411 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,714,184 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,728,386 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,750,015 UART: [afmc] --
27,754,210 UART: [cold-reset] --
27,758,128 UART: [state] Locking Datavault
27,761,501 UART: [state] Locking PCR0, PCR1 and PCR31
27,763,201 UART: [state] Locking ICCM
27,765,946 UART: [exit] Launching FMC @ 0x40000130
27,774,291 UART:
27,774,533 UART: Running Caliptra FMC ...
27,775,638 UART:
27,775,803 UART: [state] CFI Enabled
27,842,437 UART: [fht] FMC Alias Private Key: 7
30,180,542 UART: [art] Extend RT PCRs Done
30,181,762 UART: [art] Lock RT PCRs Done
30,183,627 UART: [art] Populate DV Done
30,188,813 UART: [fht] FMC Alias Private Key: 7
30,190,294 UART: [art] Derive CDI
30,191,028 UART: [art] Store in in slot 0x4
30,250,862 UART: [art] Derive Key Pair
30,251,873 UART: [art] Store priv key in slot 0x5
33,544,826 UART: [art] Derive Key Pair - Done
33,558,053 UART: [art] Signing Cert with AUTHO
33,559,400 UART: RITY.KEYID = 7
35,847,185 UART: [art] Erasing AUTHORITY.KEYID = 7
35,848,700 UART: [art] PUB.X = 1A545730D35A384FD0000F2525B1B88935EFAA36774387D36E3FB585D02EC30628E1C802061BAA2415D5293007C5017D
35,855,940 UART: [art] PUB.Y = 4403A220E60235DC72730493B99B9FA8821A6390FD068585164C1A4E116EE7688B0E19E527480DD35334232970FC01EB
35,863,163 UART: [art] SIG.R = 256B9CE054B1C727C9D1DBCD6AE05AAF1F56A628ACAE49B1AD3EC61AE361B3D8E996E75FEA7D082899B79D54148768C6
35,870,555 UART: [art] SIG.S = 1A8FEDECE7F89593F354596584570DDC90C1236E88FFF6F04CA40861052B421411FFAF2C60B75095EF50659DA979C66D
37,175,355 UART: Caliptra RT
37,176,053 UART: [state] CFI Enabled
37,338,848 UART: [rt] RT listening for mailbox commands...
37,341,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,496,283 UART: [rt]cmd =0x41544d4e, len=14344
41,611,831 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,804,798 ready_for_fw is high
3,805,391 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,982,301 >>> mbox cmd response: success
27,681,399 UART:
27,681,799 UART: Running Caliptra FMC ...
27,682,907 UART:
27,683,062 UART: [state] CFI Enabled
27,754,095 UART: [fht] FMC Alias Private Key: 7
30,092,516 UART: [art] Extend RT PCRs Done
30,093,746 UART: [art] Lock RT PCRs Done
30,095,621 UART: [art] Populate DV Done
30,100,977 UART: [fht] FMC Alias Private Key: 7
30,102,629 UART: [art] Derive CDI
30,103,444 UART: [art] Store in in slot 0x4
30,154,426 UART: [art] Derive Key Pair
30,155,447 UART: [art] Store priv key in slot 0x5
33,449,588 UART: [art] Derive Key Pair - Done
33,462,598 UART: [art] Signing Cert with AUTHO
33,463,935 UART: RITY.KEYID = 7
35,751,379 UART: [art] Erasing AUTHORITY.KEYID = 7
35,752,882 UART: [art] PUB.X = 3C0DBDF7722B33536531527F1F24C8219B0F07B3DC1882DFFE7F485E5BC43C89F17788FFCBEC1A72A8A8BA01A539B433
35,760,148 UART: [art] PUB.Y = 0846308AFE5A178DE35F0CB7BA9D534EEFC46CD4180604CF3A5FF884E657F6066D813190C8A062DFF3BEC28B9762FC9B
35,767,426 UART: [art] SIG.R = 346A485C473FAA1FCDF60698B490F8EA0B9F511122AB92EE33BFE60315C907EF1CE9A85C729210FED178FB07FDD50A90
35,774,819 UART: [art] SIG.S = B6475F94520D960A61B4D00FBE6EC64B5CC4F253E46851AF415B7208109A905881EEDE2E4940EC72A1E878AF26815F66
37,079,871 UART: Caliptra RT
37,080,581 UART: [state] CFI Enabled
37,241,784 UART: [rt] RT listening for mailbox commands...
37,244,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,399,495 UART: [rt]cmd =0x41544d4e, len=14344
41,644,253 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
193,119 UART:
193,472 UART: Running Caliptra ROM ...
194,665 UART:
604,375 UART: [state] CFI Enabled
618,932 UART: [state] LifecycleState = Unprovisioned
620,918 UART: [state] DebugLocked = No
623,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,439 UART: [kat] SHA2-256
798,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,766 UART: [kat] ++
809,296 UART: [kat] sha1
820,736 UART: [kat] SHA2-256
823,373 UART: [kat] SHA2-384
829,917 UART: [kat] SHA2-512-ACC
832,284 UART: [kat] ECC-384
3,118,053 UART: [kat] HMAC-384Kdf
3,129,054 UART: [kat] LMS
4,319,180 UART: [kat] --
4,324,259 UART: [cold-reset] ++
4,325,266 UART: [fht] Storing FHT @ 0x50003400
4,337,877 UART: [idev] ++
4,338,443 UART: [idev] CDI.KEYID = 6
4,339,472 UART: [idev] SUBJECT.KEYID = 7
4,340,646 UART: [idev] UDS.KEYID = 0
4,341,697 ready_for_fw is high
4,341,904 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,195 UART: [idev] Erasing UDS.KEYID = 0
7,632,470 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,780 UART: [idev] --
7,657,965 UART: [ldev] ++
7,658,540 UART: [ldev] CDI.KEYID = 6
7,659,472 UART: [ldev] SUBJECT.KEYID = 5
7,660,695 UART: [ldev] AUTHORITY.KEYID = 7
7,661,979 UART: [ldev] FE.KEYID = 1
7,672,918 UART: [ldev] Erasing FE.KEYID = 1
10,960,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,609 UART: [ldev] --
13,320,866 UART: [fwproc] Waiting for Commands...
13,322,899 UART: [fwproc] Received command 0x46574c44
13,325,079 UART: [fwproc] Received Image of size 113760 bytes
22,593,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,666,991 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,735,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
23,051,504 >>> mbox cmd response: success
23,054,905 UART: [afmc] ++
23,055,501 UART: [afmc] CDI.KEYID = 6
23,056,414 UART: [afmc] SUBJECT.KEYID = 7
23,057,683 UART: [afmc] AUTHORITY.KEYID = 5
26,374,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,669,329 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,671,587 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,686,182 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,700,912 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,715,163 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,736,951 UART: [afmc] --
28,740,434 UART: [cold-reset] --
28,744,076 UART: [state] Locking Datavault
28,748,839 UART: [state] Locking PCR0, PCR1 and PCR31
28,750,593 UART: [state] Locking ICCM
28,752,844 UART: [exit] Launching FMC @ 0x40000130
28,761,203 UART:
28,761,437 UART: Running Caliptra FMC ...
28,762,463 UART:
28,762,607 UART: [state] CFI Enabled
28,770,723 UART: [fht] FMC Alias Private Key: 7
31,101,202 UART: [art] Extend RT PCRs Done
31,102,422 UART: [art] Lock RT PCRs Done
31,104,341 UART: [art] Populate DV Done
31,109,851 UART: [fht] FMC Alias Private Key: 7
31,111,382 UART: [art] Derive CDI
31,112,108 UART: [art] Store in in slot 0x4
31,155,068 UART: [art] Derive Key Pair
31,156,065 UART: [art] Store priv key in slot 0x5
34,398,261 UART: [art] Derive Key Pair - Done
34,411,429 UART: [art] Signing Cert with AUTHO
34,412,738 UART: RITY.KEYID = 7
36,692,191 UART: [art] Erasing AUTHORITY.KEYID = 7
36,693,833 UART: [art] PUB.X = 3059B4E88297128AA8514A54BE91A5FC4250B53DB45F5844804E99CCF656949C7C180C089CDB2C085E5FB5E7C8AE392D
36,700,941 UART: [art] PUB.Y = 20D2CAB59AD502638E3C2F841FA53D3B275B1ED6B9B0449B3BDFC4514AA1EE8B5538E4C472CCB71E61563062211944CF
36,708,196 UART: [art] SIG.R = 6B495335C458A4E525D11B9EE6FBC7913DA499866D3B1345EA9A0560889000323FCFF014DA7D9A679807D050851D0338
36,715,567 UART: [art] SIG.S = 5D6CEACA0CED31B6C01E0B25A7D5CCD53F8747C4328DE2BBCAD5ADAB1D2ACE9C0C661D247A0404809DD31A5C9BDCE0B1
38,020,736 UART: Caliptra RT
38,021,450 UART: [state] CFI Enabled
38,139,504 UART: [rt] RT listening for mailbox commands...
38,141,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,297,336 UART: [rt]cmd =0x41544d4e, len=14344
42,698,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
4,128,789 ready_for_fw is high
4,129,213 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,231,264 >>> mbox cmd response: success
27,870,580 UART:
27,870,969 UART: Running Caliptra FMC ...
27,872,076 UART:
27,872,226 UART: [state] CFI Enabled
27,879,679 UART: [fht] FMC Alias Private Key: 7
30,210,332 UART: [art] Extend RT PCRs Done
30,211,552 UART: [art] Lock RT PCRs Done
30,213,531 UART: [art] Populate DV Done
30,218,669 UART: [fht] FMC Alias Private Key: 7
30,220,263 UART: [art] Derive CDI
30,221,011 UART: [art] Store in in slot 0x4
30,263,774 UART: [art] Derive Key Pair
30,264,774 UART: [art] Store priv key in slot 0x5
33,506,985 UART: [art] Derive Key Pair - Done
33,519,937 UART: [art] Signing Cert with AUTHO
33,521,243 UART: RITY.KEYID = 7
35,800,727 UART: [art] Erasing AUTHORITY.KEYID = 7
35,802,235 UART: [art] PUB.X = 9DB5D5193D61C01E0BFABED56B4F8C528791C59EA21274C71F176FC6474B175314ABE97C344EA0E517FBB156637ABE47
35,809,473 UART: [art] PUB.Y = 1CD77D6A59E1AEE0EB5AF452FC53D667C7367032EADF3B724F222B94626D986068AC357F1E5898188C22CDEE9D56E457
35,816,693 UART: [art] SIG.R = 9724186E75E501EF12ED088CC87BA5B337535246BD55E2DAEC32457722506DEAB293E64EEBD9D7EAA8F213B70D590C33
35,824,089 UART: [art] SIG.S = 4D0846444333AC8FA53AD1C2E6746B611FDD08C7AD9CC7516B00C5019319021913468B8071AC0C0795F85DBE8EE97D4B
37,128,580 UART: Caliptra RT
37,129,313 UART: [state] CFI Enabled
37,246,908 UART: [rt] RT listening for mailbox commands...
37,249,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,404,663 UART: [rt]cmd =0x41544d4e, len=14344
41,624,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
192,530 UART:
192,888 UART: Running Caliptra ROM ...
194,063 UART:
194,228 UART: [state] CFI Enabled
265,266 UART: [state] LifecycleState = Unprovisioned
267,174 UART: [state] DebugLocked = No
268,280 UART: [state] WD Timer not started. Device not locked for debugging
271,763 UART: [kat] SHA2-256
450,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,487 UART: [kat] ++
463,025 UART: [kat] sha1
473,767 UART: [kat] SHA2-256
476,773 UART: [kat] SHA2-384
481,903 UART: [kat] SHA2-512-ACC
484,833 UART: [kat] ECC-384
2,946,621 UART: [kat] HMAC-384Kdf
2,971,506 UART: [kat] LMS
3,500,973 UART: [kat] --
3,505,249 UART: [cold-reset] ++
3,507,813 UART: [fht] FHT @ 0x50003400
3,519,000 UART: [idev] ++
3,519,564 UART: [idev] CDI.KEYID = 6
3,520,472 UART: [idev] SUBJECT.KEYID = 7
3,521,640 UART: [idev] UDS.KEYID = 0
3,522,685 ready_for_fw is high
3,522,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,474 UART: [idev] Erasing UDS.KEYID = 0
6,024,565 UART: [idev] Sha1 KeyId Algorithm
6,048,407 UART: [idev] --
6,051,974 UART: [ldev] ++
6,052,548 UART: [ldev] CDI.KEYID = 6
6,053,436 UART: [ldev] SUBJECT.KEYID = 5
6,054,645 UART: [ldev] AUTHORITY.KEYID = 7
6,055,797 UART: [ldev] FE.KEYID = 1
6,098,772 UART: [ldev] Erasing FE.KEYID = 1
8,599,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,317 UART: [ldev] --
10,389,842 UART: [fwproc] Wait for Commands...
10,392,148 UART: [fwproc] Recv command 0x46574c44
10,394,180 UART: [fwproc] Recv'd Img size: 114084 bytes
14,953,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,026,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,095,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,411,568 >>> mbox cmd response: success
15,416,233 UART: [afmc] ++
15,416,870 UART: [afmc] CDI.KEYID = 6
15,417,754 UART: [afmc] SUBJECT.KEYID = 7
15,418,856 UART: [afmc] AUTHORITY.KEYID = 5
17,954,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,680,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,682,367 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,698,353 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,714,253 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,730,049 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,752,296 UART: [afmc] --
19,755,887 UART: [cold-reset] --
19,759,365 UART: [state] Locking Datavault
19,765,046 UART: [state] Locking PCR0, PCR1 and PCR31
19,766,694 UART: [state] Locking ICCM
19,769,223 UART: [exit] Launching FMC @ 0x40000130
19,777,680 UART:
19,777,954 UART: Running Caliptra FMC ...
19,779,062 UART:
19,779,223 UART: [state] CFI Enabled
19,838,995 UART: [fht] FMC Alias Private Key: 7
21,602,996 UART: [art] Extend RT PCRs Done
21,604,219 UART: [art] Lock RT PCRs Done
21,605,918 UART: [art] Populate DV Done
21,611,435 UART: [fht] FMC Alias Private Key: 7
21,612,934 UART: [art] Derive CDI
21,613,749 UART: [art] Store in in slot 0x4
21,672,624 UART: [art] Derive Key Pair
21,673,662 UART: [art] Store priv key in slot 0x5
24,136,761 UART: [art] Derive Key Pair - Done
24,149,645 UART: [art] Signing Cert with AUTHO
24,150,951 UART: RITY.KEYID = 7
25,862,142 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,652 UART: [art] PUB.X = 0C9ACF63DA5EAF1AC9D13906C41217BA2DD18ADE78A6804B9A007AEF591233E6DEDCCCF41BE894F220E517CA4DCA46C1
25,870,936 UART: [art] PUB.Y = 30EECBE2DEC75BE99C6A79CA644E9446B743A4021D78C6FD133D4A7C7854E5241CBC932EA65A0145C8E83448418EDCEF
25,878,238 UART: [art] SIG.R = C5906439C5A7FF8696CF5B1904555023B02B59677AE62AA53453BBBB4F76EB8EE6E5A8192D9C817CA06C9875A6D76A04
25,885,661 UART: [art] SIG.S = 9BBCCF9A0298C80E5F90F47518B3AC4306F82723CAE88C0F85F6F21E65BE504FA8DEBCF6829A1AF6FDB41431EE73B5E1
26,864,544 UART: Caliptra RT
26,865,258 UART: [state] CFI Enabled
27,029,521 UART: [rt] RT listening for mailbox commands...
27,031,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,187,323 UART: [rt]cmd =0x41544d4e, len=14344
29,588,366 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,364,603 ready_for_fw is high
3,365,000 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,022,357 >>> mbox cmd response: success
19,303,406 UART:
19,303,786 UART: Running Caliptra FMC ...
19,304,999 UART:
19,305,169 UART: [state] CFI Enabled
19,371,497 UART: [fht] FMC Alias Private Key: 7
21,134,585 UART: [art] Extend RT PCRs Done
21,135,809 UART: [art] Lock RT PCRs Done
21,137,517 UART: [art] Populate DV Done
21,143,113 UART: [fht] FMC Alias Private Key: 7
21,144,751 UART: [art] Derive CDI
21,145,484 UART: [art] Store in in slot 0x4
21,203,216 UART: [art] Derive Key Pair
21,204,256 UART: [art] Store priv key in slot 0x5
23,667,097 UART: [art] Derive Key Pair - Done
23,679,888 UART: [art] Signing Cert with AUTHO
23,681,199 UART: RITY.KEYID = 7
25,392,797 UART: [art] Erasing AUTHORITY.KEYID = 7
25,394,284 UART: [art] PUB.X = B2077D3EC6F6EE6DBE37959C8C14187FBA4B4AFA40493EEF02AA8E57B7304BA8C54DE9A9B1D784DA6B57140595604142
25,401,578 UART: [art] PUB.Y = 61ACDE472ED56CB925D4DD52D7297A512E3532BC2A7399AA05969C9D2ACE938B34C84FF038D823020246245B9A5A76F4
25,408,799 UART: [art] SIG.R = A968DC2F88F4CEB1DDF399A283AD2C6E20B6D137C4B02E5109C8BC54C7DDF4183B34D7C4FE029E4A9464935E18E63EEB
25,416,246 UART: [art] SIG.S = 1BA4D2F5C09A30303708DA95F289706ECA4D81609BF31E3C4CC6EE9461536D8C8C73EAE4683716E2B0C8C759124F677A
26,395,221 UART: Caliptra RT
26,395,938 UART: [state] CFI Enabled
26,559,335 UART: [rt] RT listening for mailbox commands...
26,561,660 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,716,843 UART: [rt]cmd =0x41544d4e, len=14344
29,114,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
192,905 UART:
193,274 UART: Running Caliptra ROM ...
194,361 UART:
603,983 UART: [state] CFI Enabled
618,199 UART: [state] LifecycleState = Unprovisioned
620,031 UART: [state] DebugLocked = No
621,642 UART: [state] WD Timer not started. Device not locked for debugging
626,188 UART: [kat] SHA2-256
805,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,887 UART: [kat] ++
817,423 UART: [kat] sha1
828,805 UART: [kat] SHA2-256
831,834 UART: [kat] SHA2-384
838,325 UART: [kat] SHA2-512-ACC
841,263 UART: [kat] ECC-384
3,282,923 UART: [kat] HMAC-384Kdf
3,295,799 UART: [kat] LMS
3,825,308 UART: [kat] --
3,831,085 UART: [cold-reset] ++
3,833,458 UART: [fht] FHT @ 0x50003400
3,844,648 UART: [idev] ++
3,845,215 UART: [idev] CDI.KEYID = 6
3,846,132 UART: [idev] SUBJECT.KEYID = 7
3,847,305 UART: [idev] UDS.KEYID = 0
3,848,231 ready_for_fw is high
3,848,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,697 UART: [idev] Erasing UDS.KEYID = 0
6,315,633 UART: [idev] Sha1 KeyId Algorithm
6,338,070 UART: [idev] --
6,341,737 UART: [ldev] ++
6,342,309 UART: [ldev] CDI.KEYID = 6
6,343,216 UART: [ldev] SUBJECT.KEYID = 5
6,344,371 UART: [ldev] AUTHORITY.KEYID = 7
6,345,659 UART: [ldev] FE.KEYID = 1
6,357,360 UART: [ldev] Erasing FE.KEYID = 1
8,836,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,060 UART: [ldev] --
10,630,017 UART: [fwproc] Wait for Commands...
10,633,140 UART: [fwproc] Recv command 0x46574c44
10,635,230 UART: [fwproc] Recv'd Img size: 114084 bytes
15,199,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,275,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,344,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,661,677 >>> mbox cmd response: success
15,666,797 UART: [afmc] ++
15,667,397 UART: [afmc] CDI.KEYID = 6
15,668,313 UART: [afmc] SUBJECT.KEYID = 7
15,669,475 UART: [afmc] AUTHORITY.KEYID = 5
18,172,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,893,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,001 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,910,990 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,926,930 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,942,706 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,965,591 UART: [afmc] --
19,968,923 UART: [cold-reset] --
19,972,756 UART: [state] Locking Datavault
19,978,859 UART: [state] Locking PCR0, PCR1 and PCR31
19,980,525 UART: [state] Locking ICCM
19,983,277 UART: [exit] Launching FMC @ 0x40000130
19,991,733 UART:
19,991,970 UART: Running Caliptra FMC ...
19,993,073 UART:
19,993,238 UART: [state] CFI Enabled
20,001,132 UART: [fht] FMC Alias Private Key: 7
21,758,572 UART: [art] Extend RT PCRs Done
21,759,786 UART: [art] Lock RT PCRs Done
21,761,570 UART: [art] Populate DV Done
21,766,823 UART: [fht] FMC Alias Private Key: 7
21,768,364 UART: [art] Derive CDI
21,769,182 UART: [art] Store in in slot 0x4
21,811,566 UART: [art] Derive Key Pair
21,812,627 UART: [art] Store priv key in slot 0x5
24,238,999 UART: [art] Derive Key Pair - Done
24,252,107 UART: [art] Signing Cert with AUTHO
24,253,409 UART: RITY.KEYID = 7
25,958,616 UART: [art] Erasing AUTHORITY.KEYID = 7
25,960,124 UART: [art] PUB.X = 3A130101CA39D13EF1AC53773A54A7DF48B1FD4AAB38023C9D50BCA24A3563C46FCDB31CB5742F6C22493E350981E7BB
25,967,404 UART: [art] PUB.Y = 2A6907F3C7AA0A1A7748B8A93B6DBA09611BB42B30C5EA75E484D42DBE9621EC83842A5C81C969DB8E1A3365377CF0DE
25,974,706 UART: [art] SIG.R = 44F532558513573008CB656F46ED13095190549CF665F4AC26742E039AF7E576FCDC1F76C7FE263F4FB546900D7B2272
25,982,084 UART: [art] SIG.S = 9936FC8C90E65F647FDA7286698956911DD0DD8DB7BC39C4221A96F83C5DD5F682B5A20A334DEA918283BDEB92B541E1
26,961,215 UART: Caliptra RT
26,961,909 UART: [state] CFI Enabled
27,079,133 UART: [rt] RT listening for mailbox commands...
27,081,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,936 UART: [rt]cmd =0x41544d4e, len=14344
29,630,439 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,141 writing to cptra_bootfsm_go
3,696,881 ready_for_fw is high
3,697,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,261,212 >>> mbox cmd response: success
19,512,546 UART:
19,512,941 UART: Running Caliptra FMC ...
19,514,077 UART:
19,514,242 UART: [state] CFI Enabled
19,522,336 UART: [fht] FMC Alias Private Key: 7
21,278,912 UART: [art] Extend RT PCRs Done
21,280,128 UART: [art] Lock RT PCRs Done
21,281,830 UART: [art] Populate DV Done
21,287,057 UART: [fht] FMC Alias Private Key: 7
21,288,608 UART: [art] Derive CDI
21,289,427 UART: [art] Store in in slot 0x4
21,331,649 UART: [art] Derive Key Pair
21,332,689 UART: [art] Store priv key in slot 0x5
23,759,033 UART: [art] Derive Key Pair - Done
23,771,981 UART: [art] Signing Cert with AUTHO
23,773,291 UART: RITY.KEYID = 7
25,479,067 UART: [art] Erasing AUTHORITY.KEYID = 7
25,480,576 UART: [art] PUB.X = F53DD5255544D31D540D67A7874B877090F5C8AA5F6AE993A5215F92876ECAF829473569DAF65F2D8BCA628B3C3D63C2
25,487,875 UART: [art] PUB.Y = C3A647C6BF9CFFB39F26123C752E9D734254BAF34559B2E3BC6957FD8DB91EDCC143776057C5DC56380D7F2C5A6FF1FA
25,495,122 UART: [art] SIG.R = 361565574A5BB589C21FB28FAB8209E0B04436B402F2A1FCEDD65B01B948F1633DBD6F8B31C58792A10916CE769B62BF
25,502,494 UART: [art] SIG.S = 1F02680029CC06672A37EE972D0AEF277098B9716A11228EE43D01BE9AFF1DD5436C0968C8896490D09CB3FE834097E5
26,481,463 UART: Caliptra RT
26,482,172 UART: [state] CFI Enabled
26,598,824 UART: [rt] RT listening for mailbox commands...
26,601,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,756,499 UART: [rt]cmd =0x41544d4e, len=14344
29,161,988 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,396 UART:
192,759 UART: Running Caliptra ROM ...
193,907 UART:
194,053 UART: [state] CFI Enabled
264,695 UART: [state] LifecycleState = Unprovisioned
267,066 UART: [state] DebugLocked = No
268,577 UART: [state] WD Timer not started. Device not locked for debugging
272,845 UART: [kat] SHA2-256
462,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,450 UART: [kat] ++
473,952 UART: [kat] sha1
486,177 UART: [kat] SHA2-256
489,196 UART: [kat] SHA2-384
495,963 UART: [kat] SHA2-512-ACC
498,541 UART: [kat] ECC-384
2,946,527 UART: [kat] HMAC-384Kdf
2,971,713 UART: [kat] LMS
3,503,518 UART: [kat] --
3,507,257 UART: [cold-reset] ++
3,508,194 UART: [fht] FHT @ 0x50003400
3,521,227 UART: [idev] ++
3,521,860 UART: [idev] CDI.KEYID = 6
3,522,811 UART: [idev] SUBJECT.KEYID = 7
3,524,051 UART: [idev] UDS.KEYID = 0
3,524,951 ready_for_fw is high
3,525,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,727 UART: [idev] Erasing UDS.KEYID = 0
6,027,739 UART: [idev] Sha1 KeyId Algorithm
6,051,477 UART: [idev] --
6,055,907 UART: [ldev] ++
6,056,598 UART: [ldev] CDI.KEYID = 6
6,057,522 UART: [ldev] SUBJECT.KEYID = 5
6,058,682 UART: [ldev] AUTHORITY.KEYID = 7
6,059,937 UART: [ldev] FE.KEYID = 1
6,101,147 UART: [ldev] Erasing FE.KEYID = 1
8,608,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,604 UART: [ldev] --
10,412,433 UART: [fwproc] Wait for Commands...
10,414,271 UART: [fwproc] Recv command 0x46574c44
10,416,529 UART: [fwproc] Recv'd Img size: 114084 bytes
15,053,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,133,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,790,873 >>> mbox cmd response: success
15,794,353 UART: [afmc] ++
15,795,073 UART: [afmc] CDI.KEYID = 6
15,796,322 UART: [afmc] SUBJECT.KEYID = 7
15,797,759 UART: [afmc] AUTHORITY.KEYID = 5
18,323,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,049,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,051,585 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,066,637 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,081,838 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,096,664 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,121,283 UART: [afmc] --
20,124,129 UART: [cold-reset] --
20,128,541 UART: [state] Locking Datavault
20,135,057 UART: [state] Locking PCR0, PCR1 and PCR31
20,137,215 UART: [state] Locking ICCM
20,139,310 UART: [exit] Launching FMC @ 0x40000130
20,147,937 UART:
20,148,166 UART: Running Caliptra FMC ...
20,149,264 UART:
20,149,422 UART: [state] CFI Enabled
20,206,593 UART: [fht] FMC Alias Private Key: 7
21,971,142 UART: [art] Extend RT PCRs Done
21,972,350 UART: [art] Lock RT PCRs Done
21,974,347 UART: [art] Populate DV Done
21,979,756 UART: [fht] FMC Alias Private Key: 7
21,981,452 UART: [art] Derive CDI
21,982,277 UART: [art] Store in in slot 0x4
22,039,322 UART: [art] Derive Key Pair
22,040,360 UART: [art] Store priv key in slot 0x5
24,503,702 UART: [art] Derive Key Pair - Done
24,516,591 UART: [art] Signing Cert with AUTHO
24,517,935 UART: RITY.KEYID = 7
26,229,851 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,357 UART: [art] PUB.X = 1C949DCFF637DC577924E6CC2239812BE3A40CE5A5F99E89203C2445B26DC6427DD0B60BBCCB0D7114871A28299CF31B
26,238,630 UART: [art] PUB.Y = 1F7F236EECB6AFFCC6FA95BB1C41BB9136EB35EF8918DB798C95419E3D2DDA15A7327B09AAB35F5452F027BD94972E5D
26,245,932 UART: [art] SIG.R = DDE0E437F89759DBEF4C18D5F9A904DCE90128615263D2553F51DDBE7F7C14AA37F80DAF844EE94A69BFFDF0E42675D9
26,253,368 UART: [art] SIG.S = 9FF2FED23EE7AD791EB021001A5BBA0F46C410A875CDCB560E9F3A870BCC187CD47C944A51530B1C2CD0337F6B6ACE3D
27,231,935 UART: Caliptra RT
27,232,614 UART: [state] CFI Enabled
27,398,268 UART: [rt] RT listening for mailbox commands...
27,400,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,555,755 UART: [rt]cmd =0x41544d4e, len=14344
29,940,824 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
3,440,433 ready_for_fw is high
3,440,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,835,610 >>> mbox cmd response: success
20,127,587 UART:
20,127,983 UART: Running Caliptra FMC ...
20,129,109 UART:
20,129,267 UART: [state] CFI Enabled
20,180,477 UART: [fht] FMC Alias Private Key: 7
21,943,165 UART: [art] Extend RT PCRs Done
21,944,376 UART: [art] Lock RT PCRs Done
21,946,146 UART: [art] Populate DV Done
21,951,603 UART: [fht] FMC Alias Private Key: 7
21,953,298 UART: [art] Derive CDI
21,954,036 UART: [art] Store in in slot 0x4
22,012,659 UART: [art] Derive Key Pair
22,013,732 UART: [art] Store priv key in slot 0x5
24,477,041 UART: [art] Derive Key Pair - Done
24,489,878 UART: [art] Signing Cert with AUTHO
24,491,174 UART: RITY.KEYID = 7
26,202,712 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,229 UART: [art] PUB.X = 00782A2BF0EF1D9068E08ABF360E600F169E5581F6C5E45A1256B24CB6368DEB790DE1F9331993E19534AE55A8944D52
26,211,468 UART: [art] PUB.Y = 7754BDBE456120684CE999C081FC45616BE807230A859207648661D1980E13C8C999E0512DF09A56BC2AB96A90D40CB8
26,218,722 UART: [art] SIG.R = BAAB0C6B39AF6EE60240ED9979C5FED69E1F51654DAB76867CF8DE5D3CF91079E7CDB89DE0190753B83A38CAA3EDE30D
26,226,107 UART: [art] SIG.S = 97949315348DC1A7532716E5DDE9DD855091066D2766A0310459A151A24DCC87B23C89C837CC47E92E67C5EDFDCADB52
27,205,210 UART: Caliptra RT
27,205,901 UART: [state] CFI Enabled
27,371,758 UART: [rt] RT listening for mailbox commands...
27,374,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,529,244 UART: [rt]cmd =0x41544d4e, len=14344
29,926,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,848 writing to cptra_bootfsm_go
193,096 UART:
193,471 UART: Running Caliptra ROM ...
194,590 UART:
604,435 UART: [state] CFI Enabled
617,254 UART: [state] LifecycleState = Unprovisioned
619,636 UART: [state] DebugLocked = No
621,667 UART: [state] WD Timer not started. Device not locked for debugging
626,618 UART: [kat] SHA2-256
816,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,285 UART: [kat] ++
827,897 UART: [kat] sha1
838,429 UART: [kat] SHA2-256
841,453 UART: [kat] SHA2-384
846,733 UART: [kat] SHA2-512-ACC
849,323 UART: [kat] ECC-384
3,293,096 UART: [kat] HMAC-384Kdf
3,305,976 UART: [kat] LMS
3,837,853 UART: [kat] --
3,839,803 UART: [cold-reset] ++
3,842,235 UART: [fht] FHT @ 0x50003400
3,852,663 UART: [idev] ++
3,853,337 UART: [idev] CDI.KEYID = 6
3,854,252 UART: [idev] SUBJECT.KEYID = 7
3,855,504 UART: [idev] UDS.KEYID = 0
3,856,428 ready_for_fw is high
3,856,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,770 UART: [idev] Erasing UDS.KEYID = 0
6,335,660 UART: [idev] Sha1 KeyId Algorithm
6,357,610 UART: [idev] --
6,363,875 UART: [ldev] ++
6,364,561 UART: [ldev] CDI.KEYID = 6
6,365,471 UART: [ldev] SUBJECT.KEYID = 5
6,366,683 UART: [ldev] AUTHORITY.KEYID = 7
6,367,860 UART: [ldev] FE.KEYID = 1
6,377,670 UART: [ldev] Erasing FE.KEYID = 1
8,856,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,903 UART: [ldev] --
10,649,960 UART: [fwproc] Wait for Commands...
10,652,635 UART: [fwproc] Recv command 0x46574c44
10,654,896 UART: [fwproc] Recv'd Img size: 114084 bytes
15,293,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,385,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,501,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,042,228 >>> mbox cmd response: success
16,046,817 UART: [afmc] ++
16,047,528 UART: [afmc] CDI.KEYID = 6
16,048,640 UART: [afmc] SUBJECT.KEYID = 7
16,050,197 UART: [afmc] AUTHORITY.KEYID = 5
18,548,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,272,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,274,047 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,289,128 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,304,304 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,319,143 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,344,261 UART: [afmc] --
20,347,219 UART: [cold-reset] --
20,351,866 UART: [state] Locking Datavault
20,355,620 UART: [state] Locking PCR0, PCR1 and PCR31
20,357,825 UART: [state] Locking ICCM
20,359,462 UART: [exit] Launching FMC @ 0x40000130
20,368,142 UART:
20,368,378 UART: Running Caliptra FMC ...
20,369,413 UART:
20,369,563 UART: [state] CFI Enabled
20,377,507 UART: [fht] FMC Alias Private Key: 7
22,133,886 UART: [art] Extend RT PCRs Done
22,135,107 UART: [art] Lock RT PCRs Done
22,137,247 UART: [art] Populate DV Done
22,142,550 UART: [fht] FMC Alias Private Key: 7
22,144,092 UART: [art] Derive CDI
22,144,834 UART: [art] Store in in slot 0x4
22,187,371 UART: [art] Derive Key Pair
22,188,426 UART: [art] Store priv key in slot 0x5
24,615,102 UART: [art] Derive Key Pair - Done
24,627,822 UART: [art] Signing Cert with AUTHO
24,629,126 UART: RITY.KEYID = 7
26,334,840 UART: [art] Erasing AUTHORITY.KEYID = 7
26,336,342 UART: [art] PUB.X = 5099924EE50F7B16FE74FAF2E3DA0D3491A07FE8274B40DA8A1AF651D94BD745324BF7E035A94B35A9217510D17718B6
26,343,613 UART: [art] PUB.Y = 45E528BA5EE14C963654FA4B0887757F6DBC60D2AD67F1A3FCCBC2C24E61F3FB18B1BA4ADE578931FE42CEB94D8F9798
26,350,878 UART: [art] SIG.R = 979E30EFF66FD8989165A311BF0CB09B8A737C6E44BE281247A9607CD0E5C468007EFC7E8CC5243285AD6A7A5E7AAF05
26,358,247 UART: [art] SIG.S = 08109238872E77B4AB9A204C06365B06D642F8F7064BA205127EE8313CB174948964DE6343322C9DA2D780CFF2594C4E
27,337,400 UART: Caliptra RT
27,338,091 UART: [state] CFI Enabled
27,455,889 UART: [rt] RT listening for mailbox commands...
27,458,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,613,502 UART: [rt]cmd =0x41544d4e, len=14344
30,011,764 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
3,759,853 ready_for_fw is high
3,760,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,080,091 >>> mbox cmd response: success
20,334,763 UART:
20,335,153 UART: Running Caliptra FMC ...
20,336,555 UART:
20,336,737 UART: [state] CFI Enabled
20,344,518 UART: [fht] FMC Alias Private Key: 7
22,101,250 UART: [art] Extend RT PCRs Done
22,102,478 UART: [art] Lock RT PCRs Done
22,104,139 UART: [art] Populate DV Done
22,109,553 UART: [fht] FMC Alias Private Key: 7
22,111,100 UART: [art] Derive CDI
22,111,843 UART: [art] Store in in slot 0x4
22,154,492 UART: [art] Derive Key Pair
22,155,496 UART: [art] Store priv key in slot 0x5
24,581,974 UART: [art] Derive Key Pair - Done
24,594,665 UART: [art] Signing Cert with AUTHO
24,595,980 UART: RITY.KEYID = 7
26,301,165 UART: [art] Erasing AUTHORITY.KEYID = 7
26,302,673 UART: [art] PUB.X = E5C6A283B0310B40E72C4BDE405E294EA5705A01AE8C960B8B5471A07BD0DDE71D8FD634EDE8ADCB4E96F0E6DF653F66
26,309,997 UART: [art] PUB.Y = D0B93BB4A270C1D247DB2C5B9BDF8DEEBF1139396D5A28692E71D19E69750716E4980B6803AA74A481187F747B4D7EE2
26,317,242 UART: [art] SIG.R = B6D4915B444A01ADAD3C5D73887F396B6BA86F839C026FF59C369E83FE0AE599A40362C896CE2A045845C9E65B70FD30
26,324,579 UART: [art] SIG.S = 4AE7C02260F2E55A0DA112A720E544710B8E280E468DBB89A2F0815C38C4690EE636909F990833F57513EDABC8C2BCB0
27,303,894 UART: Caliptra RT
27,304,609 UART: [state] CFI Enabled
27,420,923 UART: [rt] RT listening for mailbox commands...
27,423,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,578,590 UART: [rt]cmd =0x41544d4e, len=14344
29,981,541 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,300 UART: [kat] LMS
1,475,496 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,770 UART: [idev] ++
1,479,938 UART: [idev] CDI.KEYID = 6
1,480,298 UART: [idev] SUBJECT.KEYID = 7
1,480,722 UART: [idev] UDS.KEYID = 0
1,481,067 ready_for_fw is high
1,481,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,286 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,763 UART: [ldev] ++
1,514,931 UART: [ldev] CDI.KEYID = 6
1,515,294 UART: [ldev] SUBJECT.KEYID = 5
1,515,720 UART: [ldev] AUTHORITY.KEYID = 7
1,516,183 UART: [ldev] FE.KEYID = 1
1,521,601 UART: [ldev] Erasing FE.KEYID = 1
1,547,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,992 UART: [ldev] --
1,586,383 UART: [fwproc] Waiting for Commands...
1,587,026 UART: [fwproc] Received command 0x46574c44
1,587,817 UART: [fwproc] Received Image of size 114084 bytes
5,080,625 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,108,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,273,578 >>> mbox cmd response: success
5,274,706 UART: [afmc] ++
5,274,874 UART: [afmc] CDI.KEYID = 6
5,275,236 UART: [afmc] SUBJECT.KEYID = 7
5,275,661 UART: [afmc] AUTHORITY.KEYID = 5
5,309,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,326,087 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,326,867 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,332,576 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,338,468 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,344,169 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,352,109 UART: [afmc] --
5,353,013 UART: [cold-reset] --
5,353,937 UART: [state] Locking Datavault
5,355,364 UART: [state] Locking PCR0, PCR1 and PCR31
5,355,968 UART: [state] Locking ICCM
5,356,554 UART: [exit] Launching FMC @ 0x40000130
5,361,883 UART:
5,361,899 UART: Running Caliptra FMC ...
5,362,307 UART:
5,362,361 UART: [state] CFI Enabled
5,372,931 UART: [fht] FMC Alias Private Key: 7
5,481,241 UART: [art] Extend RT PCRs Done
5,481,669 UART: [art] Lock RT PCRs Done
5,483,425 UART: [art] Populate DV Done
5,491,605 UART: [fht] FMC Alias Private Key: 7
5,492,559 UART: [art] Derive CDI
5,492,839 UART: [art] Store in in slot 0x4
5,578,142 UART: [art] Derive Key Pair
5,578,502 UART: [art] Store priv key in slot 0x5
5,591,756 UART: [art] Derive Key Pair - Done
5,606,376 UART: [art] Signing Cert with AUTHO
5,606,856 UART: RITY.KEYID = 7
5,621,936 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,701 UART: [art] PUB.X = 7F8F61C903F34338E1C31629197FFE344B853137687D3324F0344140E6949032CF0631337DA0E9AEB2C23258C4A0ED88
5,629,455 UART: [art] PUB.Y = AC3AF442436EF0665C5859C35058489C555B1C41B449D7F6590AE24E6EC096D41AB194BAB8AB0263A5061331FDC40E56
5,636,395 UART: [art] SIG.R = EAE39E2B18F957082EE7B2C2291E18615F8C66505FBB5D29D4513A5329E3330B934670810239032DB3F7D14F4D69FA6C
5,643,151 UART: [art] SIG.S = 193ECFBB136EBDCD4D292765D9A76478A5DF1DCC62B41346CCBAA9FF71392D7054D3587E3037F285F865E5C8511D0F54
5,667,457 UART: Caliptra RT
5,667,710 UART: [state] CFI Enabled
5,776,185 UART: [rt] RT listening for mailbox commands...
5,776,855 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,671 UART: [rt]cmd =0x41544d4e, len=14344
6,549,098 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,089 ready_for_fw is high
1,363,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,085,551 >>> mbox cmd response: success
5,146,486 UART:
5,146,502 UART: Running Caliptra FMC ...
5,146,910 UART:
5,146,964 UART: [state] CFI Enabled
5,157,248 UART: [fht] FMC Alias Private Key: 7
5,264,890 UART: [art] Extend RT PCRs Done
5,265,318 UART: [art] Lock RT PCRs Done
5,267,002 UART: [art] Populate DV Done
5,275,298 UART: [fht] FMC Alias Private Key: 7
5,276,364 UART: [art] Derive CDI
5,276,644 UART: [art] Store in in slot 0x4
5,362,367 UART: [art] Derive Key Pair
5,362,727 UART: [art] Store priv key in slot 0x5
5,376,101 UART: [art] Derive Key Pair - Done
5,391,021 UART: [art] Signing Cert with AUTHO
5,391,501 UART: RITY.KEYID = 7
5,406,611 UART: [art] Erasing AUTHORITY.KEYID = 7
5,407,376 UART: [art] PUB.X = 6CBC54DC900598847D3DA26253D70188B1FDDC4BD015702337500971601C6A33C43AA36147FC812261010159D91FFE9F
5,414,125 UART: [art] PUB.Y = DC1DDA780E5AB37F3153CF40D65029C89AFD4E5DD871BDE29A0E8053D40BDACA969FFA2C6BDE5074EA8F81D9254AFE42
5,421,092 UART: [art] SIG.R = 36FDE2525E639BF6BABAACA18C4708365073A822974BB1AC616771C21BBC78AA02E68682342AFBE4B57966A51EBCFA88
5,427,868 UART: [art] SIG.S = 444695E5D4D8821D2FBBB008946B35B14E37C344DC1B2A62AF44DD6D0EBC088F497678B736DF7BC2184664D7A87289F5
5,451,878 UART: Caliptra RT
5,452,131 UART: [state] CFI Enabled
5,559,885 UART: [rt] RT listening for mailbox commands...
5,560,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,683,705 UART: [rt]cmd =0x41544d4e, len=14344
6,332,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,794 UART: [kat] SHA2-256
881,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,840 UART: [kat] ++
885,992 UART: [kat] sha1
890,086 UART: [kat] SHA2-256
892,024 UART: [kat] SHA2-384
894,695 UART: [kat] SHA2-512-ACC
896,596 UART: [kat] ECC-384
902,049 UART: [kat] HMAC-384Kdf
906,753 UART: [kat] LMS
1,474,949 UART: [kat] --
1,475,812 UART: [cold-reset] ++
1,476,226 UART: [fht] Storing FHT @ 0x50003400
1,479,095 UART: [idev] ++
1,479,263 UART: [idev] CDI.KEYID = 6
1,479,623 UART: [idev] SUBJECT.KEYID = 7
1,480,047 UART: [idev] UDS.KEYID = 0
1,480,392 ready_for_fw is high
1,480,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,387 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,929 UART: [idev] --
1,515,080 UART: [ldev] ++
1,515,248 UART: [ldev] CDI.KEYID = 6
1,515,611 UART: [ldev] SUBJECT.KEYID = 5
1,516,037 UART: [ldev] AUTHORITY.KEYID = 7
1,516,500 UART: [ldev] FE.KEYID = 1
1,521,830 UART: [ldev] Erasing FE.KEYID = 1
1,547,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,543 UART: [ldev] --
1,586,896 UART: [fwproc] Waiting for Commands...
1,587,733 UART: [fwproc] Received command 0x46574c44
1,588,524 UART: [fwproc] Received Image of size 114084 bytes
5,081,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,108,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,273,859 >>> mbox cmd response: success
5,274,959 UART: [afmc] ++
5,275,127 UART: [afmc] CDI.KEYID = 6
5,275,489 UART: [afmc] SUBJECT.KEYID = 7
5,275,914 UART: [afmc] AUTHORITY.KEYID = 5
5,311,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,327,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,328,724 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,334,433 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,325 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,026 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,353,912 UART: [afmc] --
5,354,972 UART: [cold-reset] --
5,355,736 UART: [state] Locking Datavault
5,357,147 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,751 UART: [state] Locking ICCM
5,358,305 UART: [exit] Launching FMC @ 0x40000130
5,363,634 UART:
5,363,650 UART: Running Caliptra FMC ...
5,364,058 UART:
5,364,201 UART: [state] CFI Enabled
5,374,589 UART: [fht] FMC Alias Private Key: 7
5,482,299 UART: [art] Extend RT PCRs Done
5,482,727 UART: [art] Lock RT PCRs Done
5,483,765 UART: [art] Populate DV Done
5,491,979 UART: [fht] FMC Alias Private Key: 7
5,493,143 UART: [art] Derive CDI
5,493,423 UART: [art] Store in in slot 0x4
5,579,178 UART: [art] Derive Key Pair
5,579,538 UART: [art] Store priv key in slot 0x5
5,592,568 UART: [art] Derive Key Pair - Done
5,607,424 UART: [art] Signing Cert with AUTHO
5,607,904 UART: RITY.KEYID = 7
5,622,620 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,385 UART: [art] PUB.X = EECA1FE91E8463541E70B14EBCC2C4F2AC24F4FA1426F3E74BFA885D9A641B8F21D7BD433212CE98F99B4BB81432C70A
5,630,170 UART: [art] PUB.Y = 33F7B2725EB5709EE5DDFC56A3D3BFADD6F5892C875147DDFCCBE1F4F9D2D0A5BF60014819AF43ED7F15F6AE0E834766
5,637,136 UART: [art] SIG.R = 262BCA57A3BE849894D6AF0B3D3ACBDAC84AA29B01BF917A18E979CC968CCEE73BF329585BF53E24CB340B58B7B92EF9
5,643,919 UART: [art] SIG.S = 91B57B14529A7CC82086875044D52572E40D2286136694575BAED682462853937AECF409B7613328350F343F8854CB8C
5,667,921 UART: Caliptra RT
5,668,266 UART: [state] CFI Enabled
5,776,823 UART: [rt] RT listening for mailbox commands...
5,777,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,900,535 UART: [rt]cmd =0x41544d4e, len=14344
6,535,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 ready_for_fw is high
1,363,266 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,086,408 >>> mbox cmd response: success
5,148,519 UART:
5,148,535 UART: Running Caliptra FMC ...
5,148,943 UART:
5,149,086 UART: [state] CFI Enabled
5,159,866 UART: [fht] FMC Alias Private Key: 7
5,267,966 UART: [art] Extend RT PCRs Done
5,268,394 UART: [art] Lock RT PCRs Done
5,269,930 UART: [art] Populate DV Done
5,278,192 UART: [fht] FMC Alias Private Key: 7
5,279,318 UART: [art] Derive CDI
5,279,598 UART: [art] Store in in slot 0x4
5,365,267 UART: [art] Derive Key Pair
5,365,627 UART: [art] Store priv key in slot 0x5
5,379,507 UART: [art] Derive Key Pair - Done
5,394,219 UART: [art] Signing Cert with AUTHO
5,394,699 UART: RITY.KEYID = 7
5,409,903 UART: [art] Erasing AUTHORITY.KEYID = 7
5,410,668 UART: [art] PUB.X = ACD402F1AB12DBA16FCAABACEC3D08BA8E11AF37F8FE4A02E34CA87685F84648DE3AFA68ADEC55EBE5436204E2FB73F6
5,417,460 UART: [art] PUB.Y = 7C4EE7556DE404998BE141E001A73DDD985199FD1D490160B4A255B5D5AA48D1E9811B345FE010D251BA834F0625C169
5,424,398 UART: [art] SIG.R = 88BA12C25AC02352DE4B3EE8395AEE2659253986C275A0DD2F4F1E15C324A91D073AD05BCB418DFD67CE5D42CA40880A
5,431,174 UART: [art] SIG.S = 54F133F9E0D55D3EDA2AEA81FABECA47CEBF4C7AD936856C781A181BD10579B342FF6E943B9AEF52540D99E196E7F5AF
5,455,123 UART: Caliptra RT
5,455,468 UART: [state] CFI Enabled
5,563,375 UART: [rt] RT listening for mailbox commands...
5,564,045 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,687,185 UART: [rt]cmd =0x41544d4e, len=14344
6,331,618 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
892,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,101 UART: [kat] ++
897,253 UART: [kat] sha1
901,263 UART: [kat] SHA2-256
903,203 UART: [kat] SHA2-384
906,088 UART: [kat] SHA2-512-ACC
907,989 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,230 UART: [kat] LMS
1,170,558 UART: [kat] --
1,171,439 UART: [cold-reset] ++
1,171,867 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 ready_for_fw is high
1,175,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,897 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 114084 bytes
3,128,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,321,746 >>> mbox cmd response: success
3,322,942 UART: [afmc] ++
3,323,110 UART: [afmc] CDI.KEYID = 6
3,323,472 UART: [afmc] SUBJECT.KEYID = 7
3,323,897 UART: [afmc] AUTHORITY.KEYID = 5
3,360,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,462 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,171 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,063 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,774 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,427 UART: [afmc] --
3,403,417 UART: [cold-reset] --
3,404,113 UART: [state] Locking Datavault
3,405,316 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,920 UART: [state] Locking ICCM
3,406,508 UART: [exit] Launching FMC @ 0x40000130
3,411,837 UART:
3,411,853 UART: Running Caliptra FMC ...
3,412,261 UART:
3,412,315 UART: [state] CFI Enabled
3,422,893 UART: [fht] FMC Alias Private Key: 7
3,530,949 UART: [art] Extend RT PCRs Done
3,531,377 UART: [art] Lock RT PCRs Done
3,532,937 UART: [art] Populate DV Done
3,541,475 UART: [fht] FMC Alias Private Key: 7
3,542,427 UART: [art] Derive CDI
3,542,707 UART: [art] Store in in slot 0x4
3,628,122 UART: [art] Derive Key Pair
3,628,482 UART: [art] Store priv key in slot 0x5
3,641,782 UART: [art] Derive Key Pair - Done
3,656,545 UART: [art] Signing Cert with AUTHO
3,657,025 UART: RITY.KEYID = 7
3,671,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,702 UART: [art] PUB.X = 8BF6EC33CEDE6D3B5A4792157EDD76A77988EA57615E841B92544612C526AEC5D381472BDF31450FF1AF4646F57F830A
3,679,472 UART: [art] PUB.Y = AA528169783B654C534A54D6249D64C0A9EC1137D15488AF1DB9FEE44A07A4CB252CBAC554BA18CADC2A3D16010F9880
3,686,423 UART: [art] SIG.R = 62E353FC50181DE295D4CB453205FDB4F2EE894D5B381B4C5BBB173A4234995815A06EAAEB77B62F4C3216D3F8CE5710
3,693,198 UART: [art] SIG.S = 908895EAB4800599AFA8F5A0CCEADEBF628A46973608A5ED73166D1B639F41BAE2F16F832103C7D95453DF23FD46F8AB
3,716,682 UART: Caliptra RT
3,716,935 UART: [state] CFI Enabled
3,823,903 UART: [rt] RT listening for mailbox commands...
3,824,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,829 UART: [rt]cmd =0x41544d4e, len=14344
4,583,220 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,667 ready_for_fw is high
1,060,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,787 >>> mbox cmd response: success
3,227,804 UART:
3,227,820 UART: Running Caliptra FMC ...
3,228,228 UART:
3,228,282 UART: [state] CFI Enabled
3,238,720 UART: [fht] FMC Alias Private Key: 7
3,346,032 UART: [art] Extend RT PCRs Done
3,346,460 UART: [art] Lock RT PCRs Done
3,347,976 UART: [art] Populate DV Done
3,356,052 UART: [fht] FMC Alias Private Key: 7
3,356,984 UART: [art] Derive CDI
3,357,264 UART: [art] Store in in slot 0x4
3,442,967 UART: [art] Derive Key Pair
3,443,327 UART: [art] Store priv key in slot 0x5
3,456,179 UART: [art] Derive Key Pair - Done
3,471,131 UART: [art] Signing Cert with AUTHO
3,471,611 UART: RITY.KEYID = 7
3,486,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,614 UART: [art] PUB.X = 2C0748EFDBD0BA4588A8F64F55AA371B5083BBFE85DC404BC6BD1E3EE365FD9BA3E0417C642EB41E1A04DE3D9CA63893
3,494,400 UART: [art] PUB.Y = 60693E7BDB043FF5E4BD2817D39A92F2CFFF4A14E1D55060C8E04C42E69D53E8EE6CD145AF12818912ED8CA0E8E18B91
3,501,361 UART: [art] SIG.R = 4CD24F4D67BF1ED43B205EC392F46F389FB950D54170B8DE8C34AE657AE0B20570C0E9121635E081065A0E4ABE19B003
3,508,125 UART: [art] SIG.S = 3D35F34673A54862F13E740CEF65539926C8C1CFAECCC6F1A2D2C86C123768608743036755A1BC351AEBF1EAB0D8CBBA
3,531,982 UART: Caliptra RT
3,532,235 UART: [state] CFI Enabled
3,640,080 UART: [rt] RT listening for mailbox commands...
3,640,750 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,964 UART: [rt]cmd =0x41544d4e, len=14344
4,420,978 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,334 UART: [kat] SHA2-256
904,274 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
922,969 UART: [kat] LMS
1,171,297 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 ready_for_fw is high
1,176,638 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,351 UART: [idev] Erasing UDS.KEYID = 0
1,201,860 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,188 UART: [ldev] ++
1,211,356 UART: [ldev] CDI.KEYID = 6
1,211,719 UART: [ldev] SUBJECT.KEYID = 5
1,212,145 UART: [ldev] AUTHORITY.KEYID = 7
1,212,608 UART: [ldev] FE.KEYID = 1
1,217,842 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,448 UART: [ldev] --
1,283,763 UART: [fwproc] Wait for Commands...
1,284,489 UART: [fwproc] Recv command 0x46574c44
1,285,217 UART: [fwproc] Recv'd Img size: 114084 bytes
3,124,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,316,448 >>> mbox cmd response: success
3,317,666 UART: [afmc] ++
3,317,834 UART: [afmc] CDI.KEYID = 6
3,318,196 UART: [afmc] SUBJECT.KEYID = 7
3,318,621 UART: [afmc] AUTHORITY.KEYID = 5
3,354,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,910 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,619 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,511 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,222 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,097 UART: [afmc] --
3,398,009 UART: [cold-reset] --
3,398,791 UART: [state] Locking Datavault
3,399,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,490 UART: [state] Locking ICCM
3,401,070 UART: [exit] Launching FMC @ 0x40000130
3,406,399 UART:
3,406,415 UART: Running Caliptra FMC ...
3,406,823 UART:
3,406,966 UART: [state] CFI Enabled
3,417,652 UART: [fht] FMC Alias Private Key: 7
3,525,212 UART: [art] Extend RT PCRs Done
3,525,640 UART: [art] Lock RT PCRs Done
3,527,432 UART: [art] Populate DV Done
3,535,260 UART: [fht] FMC Alias Private Key: 7
3,536,242 UART: [art] Derive CDI
3,536,522 UART: [art] Store in in slot 0x4
3,622,167 UART: [art] Derive Key Pair
3,622,527 UART: [art] Store priv key in slot 0x5
3,635,971 UART: [art] Derive Key Pair - Done
3,651,080 UART: [art] Signing Cert with AUTHO
3,651,560 UART: RITY.KEYID = 7
3,666,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,571 UART: [art] PUB.X = 1B5B5565B709CE89ACC0750AF550A215D0881BA5F57FA6FE482367FED07113253AF7EC3F7501A06FB3D1B27AAC5A1452
3,674,342 UART: [art] PUB.Y = 813685BAF72957A81DD9F83B30EBD0F00E4645EA49D25700AB6978DEDB35E23188FBCD3510DC95F16F0B4A49EC507104
3,681,269 UART: [art] SIG.R = 604B71F29E21FEAB9D36C3097236304327BE8D852EC102D5A356E054AD97223855EB067143FE8B2403BEC271F18D4E77
3,688,025 UART: [art] SIG.S = F69A05C0E7E33CADB50C363B145959F3FD70C52F24A2E3E6AC856BD315A6A0C4D5B988463688196BE026D164C9EBBA07
3,712,141 UART: Caliptra RT
3,712,486 UART: [state] CFI Enabled
3,821,012 UART: [rt] RT listening for mailbox commands...
3,821,682 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,636 UART: [rt]cmd =0x41544d4e, len=14344
4,591,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,630 ready_for_fw is high
1,060,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,151 >>> mbox cmd response: success
3,234,274 UART:
3,234,290 UART: Running Caliptra FMC ...
3,234,698 UART:
3,234,841 UART: [state] CFI Enabled
3,245,577 UART: [fht] FMC Alias Private Key: 7
3,353,527 UART: [art] Extend RT PCRs Done
3,353,955 UART: [art] Lock RT PCRs Done
3,355,645 UART: [art] Populate DV Done
3,364,115 UART: [fht] FMC Alias Private Key: 7
3,365,105 UART: [art] Derive CDI
3,365,385 UART: [art] Store in in slot 0x4
3,450,554 UART: [art] Derive Key Pair
3,450,914 UART: [art] Store priv key in slot 0x5
3,464,448 UART: [art] Derive Key Pair - Done
3,479,311 UART: [art] Signing Cert with AUTHO
3,479,791 UART: RITY.KEYID = 7
3,495,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,122 UART: [art] PUB.X = 02491D11E5AD2893752569FD671642596C4FF2408975C932A9BCCF4FA241355B46E35934321CD35EB0D2059C5BAB0977
3,502,877 UART: [art] PUB.Y = EF893B557B8D935345D27E8972D024861DE2D83D868FAFB304BAAE11647E7DDD5287EFA52E2CD1D30B3E4AA2C0D3F840
3,509,835 UART: [art] SIG.R = 3909584337D1AD92CAEEACEFF0FA28C9330C215C30C41FDA7E6F2CD71E788B9825924C5C3BD00E6F493AEB21527D48C2
3,516,610 UART: [art] SIG.S = AA3B3E0D05D23DCA7DD2F65D048E967385DF6D1D9AF6B6B9D68DF3FCBB300E39A5359ADB263A910022A8888047E76176
3,539,887 UART: Caliptra RT
3,540,232 UART: [state] CFI Enabled
3,648,250 UART: [rt] RT listening for mailbox commands...
3,648,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,830 UART: [rt]cmd =0x41544d4e, len=14344
4,418,802 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
891,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,247 UART: [kat] SHA2-256
902,187 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,174,019 ready_for_fw is high
1,174,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,215,572 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 114084 bytes
3,124,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,198 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,317,073 >>> mbox cmd response: success
3,318,282 UART: [afmc] ++
3,318,450 UART: [afmc] CDI.KEYID = 6
3,318,813 UART: [afmc] SUBJECT.KEYID = 7
3,319,239 UART: [afmc] AUTHORITY.KEYID = 5
3,354,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,746 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,456 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,346 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,057 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,925 UART: [afmc] --
3,398,049 UART: [cold-reset] --
3,398,769 UART: [state] Locking Datavault
3,399,736 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,340 UART: [state] Locking ICCM
3,400,976 UART: [exit] Launching FMC @ 0x40000130
3,406,305 UART:
3,406,321 UART: Running Caliptra FMC ...
3,406,729 UART:
3,406,783 UART: [state] CFI Enabled
3,417,331 UART: [fht] FMC Alias Private Key: 7
3,525,077 UART: [art] Extend RT PCRs Done
3,525,505 UART: [art] Lock RT PCRs Done
3,526,805 UART: [art] Populate DV Done
3,535,185 UART: [fht] FMC Alias Private Key: 7
3,536,191 UART: [art] Derive CDI
3,536,471 UART: [art] Store in in slot 0x4
3,621,998 UART: [art] Derive Key Pair
3,622,358 UART: [art] Store priv key in slot 0x5
3,635,754 UART: [art] Derive Key Pair - Done
3,650,735 UART: [art] Signing Cert with AUTHO
3,651,215 UART: RITY.KEYID = 7
3,666,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,556 UART: [art] PUB.X = EBB75F50557E36439F316151D1F17BBCB144A46594442A94D4B7EA608C7353757B3DD5A6C4DA42A13308D295EBEE3B05
3,674,324 UART: [art] PUB.Y = AE8082B7A04132EB780E6701D9D4BA6D649C54DBCEB5ACE7C7203BC82376785459DF4552EA143E320618BF8BFCA23B2B
3,681,277 UART: [art] SIG.R = 7C730EA7F125C4A130DE27734C0BD3EA6D86220285B7C4128EAB2664D50D981BB718C123C5FFF76BE2F3AB714C5D9232
3,688,043 UART: [art] SIG.S = E28A627BAAB4D52475EA6C8969981373D79CBB75CEA003B81D60EE0DEA0DFF9A4C4C7EB948A3ADC9306A9490148E23CD
3,711,777 UART: Caliptra RT
3,712,030 UART: [state] CFI Enabled
3,820,078 UART: [rt] RT listening for mailbox commands...
3,820,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,726 UART: [rt]cmd =0x41544d4e, len=14344
4,590,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,400 ready_for_fw is high
1,055,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,163,332 >>> mbox cmd response: success
3,224,711 UART:
3,224,727 UART: Running Caliptra FMC ...
3,225,135 UART:
3,225,189 UART: [state] CFI Enabled
3,235,751 UART: [fht] FMC Alias Private Key: 7
3,343,693 UART: [art] Extend RT PCRs Done
3,344,121 UART: [art] Lock RT PCRs Done
3,345,821 UART: [art] Populate DV Done
3,354,219 UART: [fht] FMC Alias Private Key: 7
3,355,375 UART: [art] Derive CDI
3,355,655 UART: [art] Store in in slot 0x4
3,441,444 UART: [art] Derive Key Pair
3,441,804 UART: [art] Store priv key in slot 0x5
3,455,478 UART: [art] Derive Key Pair - Done
3,470,237 UART: [art] Signing Cert with AUTHO
3,470,717 UART: RITY.KEYID = 7
3,485,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,554 UART: [art] PUB.X = E9129B7B3460C7F72CD315863CD0B50C790E0AA15102EC191E8336E69542ECCA8BF55A5DD545B8C894AEC4EAFEC8C353
3,493,326 UART: [art] PUB.Y = 60E5BC97B757537C8259BDE7BAFE987A5081404875922B97C92F2BE8238C1E26FE282B63D0E5264531A8F6E17EE51534
3,500,274 UART: [art] SIG.R = AF38BD8CBE48106EE30000CEB14477866574508DF9BB2ADA4CA19570A9834E6E4FABE1601E7485BE3BA4F45A947B1CBF
3,507,016 UART: [art] SIG.S = 0DB06349C218930743FF91CD3EBA3464061717E34D95B06E1E89B647E57685FD4B257B3790A19C4017783F385246483E
3,530,248 UART: Caliptra RT
3,530,501 UART: [state] CFI Enabled
3,636,983 UART: [rt] RT listening for mailbox commands...
3,637,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,699 UART: [rt]cmd =0x41544d4e, len=14344
4,407,663 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
915,971 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,734 UART: [idev] Sha1 KeyId Algorithm
1,207,800 UART: [idev] --
1,208,777 UART: [ldev] ++
1,208,945 UART: [ldev] CDI.KEYID = 6
1,209,309 UART: [ldev] SUBJECT.KEYID = 5
1,209,736 UART: [ldev] AUTHORITY.KEYID = 7
1,210,199 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,659 UART: [ldev] --
1,282,029 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 114084 bytes
3,114,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,307,066 >>> mbox cmd response: success
3,308,253 UART: [afmc] ++
3,308,421 UART: [afmc] CDI.KEYID = 6
3,308,784 UART: [afmc] SUBJECT.KEYID = 7
3,309,210 UART: [afmc] AUTHORITY.KEYID = 5
3,344,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,451 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,161 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,051 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,762 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,516 UART: [afmc] --
3,387,516 UART: [cold-reset] --
3,388,540 UART: [state] Locking Datavault
3,389,581 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,185 UART: [state] Locking ICCM
3,390,721 UART: [exit] Launching FMC @ 0x40000130
3,396,050 UART:
3,396,066 UART: Running Caliptra FMC ...
3,396,474 UART:
3,396,617 UART: [state] CFI Enabled
3,407,205 UART: [fht] FMC Alias Private Key: 7
3,515,263 UART: [art] Extend RT PCRs Done
3,515,691 UART: [art] Lock RT PCRs Done
3,517,229 UART: [art] Populate DV Done
3,525,541 UART: [fht] FMC Alias Private Key: 7
3,526,537 UART: [art] Derive CDI
3,526,817 UART: [art] Store in in slot 0x4
3,612,578 UART: [art] Derive Key Pair
3,612,938 UART: [art] Store priv key in slot 0x5
3,626,292 UART: [art] Derive Key Pair - Done
3,641,273 UART: [art] Signing Cert with AUTHO
3,641,753 UART: RITY.KEYID = 7
3,656,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,657,258 UART: [art] PUB.X = 776360D61F20A0755C4F207B4855DCF618A7145EB2E29D0BFD8B37428CC5D081FBE38B094663AF8B0B493EEFAFC99EFE
3,664,033 UART: [art] PUB.Y = 707FF5B9950CC0BDAB6EE88C0CA2E24535AAD2A1C776ABD4DEDAD3C55476BA9F3B777291488981464970EFEAC563EF17
3,670,995 UART: [art] SIG.R = EB070187A0EC857329306B1EA6A957F2746020988AA2E0812C9CC1052B7FD86A17711C993760F6522B98FE384754F0EE
3,677,750 UART: [art] SIG.S = 14946DE380518E645C179E3036119A3D209D23C9D8311CF8D044064683B62CDDC39608DAAFF0B2F91E8916076451FB41
3,701,282 UART: Caliptra RT
3,701,627 UART: [state] CFI Enabled
3,809,107 UART: [rt] RT listening for mailbox commands...
3,809,777 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,785 UART: [rt]cmd =0x41544d4e, len=14344
4,567,826 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,421 ready_for_fw is high
1,055,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,154,302 >>> mbox cmd response: success
3,217,079 UART:
3,217,095 UART: Running Caliptra FMC ...
3,217,503 UART:
3,217,646 UART: [state] CFI Enabled
3,228,724 UART: [fht] FMC Alias Private Key: 7
3,336,914 UART: [art] Extend RT PCRs Done
3,337,342 UART: [art] Lock RT PCRs Done
3,338,854 UART: [art] Populate DV Done
3,346,888 UART: [fht] FMC Alias Private Key: 7
3,347,928 UART: [art] Derive CDI
3,348,208 UART: [art] Store in in slot 0x4
3,434,539 UART: [art] Derive Key Pair
3,434,899 UART: [art] Store priv key in slot 0x5
3,448,487 UART: [art] Derive Key Pair - Done
3,463,417 UART: [art] Signing Cert with AUTHO
3,463,897 UART: RITY.KEYID = 7
3,479,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,480,082 UART: [art] PUB.X = FC96F5B2319189C1170DBA034ADB9A18C3132C48C88AD78F73FA5663173826D61DA40B963471B22F0CC9A078DC104792
3,486,840 UART: [art] PUB.Y = BD3AD83233BA0748B66FBB67C88E489EA9313DBBF0C09A4E95D7FFBFCBCD79BBA55D776950FA222FE142F52E2DFA2498
3,493,811 UART: [art] SIG.R = 5BD551CF1D5864D0A9461482018697CB58C1D8DF33E98C412434FE5E3139190A1A6D85E77D62D276827D537CA80D232C
3,500,568 UART: [art] SIG.S = 7144F2350869BAC554718192C14C69D83655A76337E5314D90B546D5757BC0DA602CE1A3287749A0A59FBDBD201C75F2
3,524,450 UART: Caliptra RT
3,524,795 UART: [state] CFI Enabled
3,632,474 UART: [rt] RT listening for mailbox commands...
3,633,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,756,012 UART: [rt]cmd =0x41544d4e, len=14344
4,395,967 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,001 UART:
192,376 UART: Running Caliptra ROM ...
193,514 UART:
193,663 UART: [state] CFI Enabled
267,175 UART: [state] LifecycleState = Unprovisioned
269,730 UART: [state] DebugLocked = No
271,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,304 UART: [kat] SHA2-256
444,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,514 UART: [kat] ++
455,962 UART: [kat] sha1
466,986 UART: [kat] SHA2-256
469,704 UART: [kat] SHA2-384
474,695 UART: [kat] SHA2-512-ACC
477,060 UART: [kat] ECC-384
2,768,805 UART: [kat] HMAC-384Kdf
2,801,020 UART: [kat] LMS
3,991,375 UART: [kat] --
3,995,833 UART: [cold-reset] ++
3,998,266 UART: [fht] Storing FHT @ 0x50003400
4,009,200 UART: [idev] ++
4,009,771 UART: [idev] CDI.KEYID = 6
4,010,660 UART: [idev] SUBJECT.KEYID = 7
4,011,976 UART: [idev] UDS.KEYID = 0
4,012,968 ready_for_fw is high
4,013,168 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,365 UART: [idev] Erasing UDS.KEYID = 0
7,345,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,424 UART: [idev] --
7,370,556 UART: [ldev] ++
7,371,123 UART: [ldev] CDI.KEYID = 6
7,372,063 UART: [ldev] SUBJECT.KEYID = 5
7,373,276 UART: [ldev] AUTHORITY.KEYID = 7
7,374,563 UART: [ldev] FE.KEYID = 1
7,402,155 UART: [ldev] Erasing FE.KEYID = 1
10,735,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,933 UART: [ldev] --
13,097,256 UART: [fwproc] Waiting for Commands...
13,100,159 UART: [fwproc] Received command 0x46574c44
13,102,339 UART: [fwproc] Received Image of size 113760 bytes
21,814,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,898,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,967,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,283,126 >>> mbox cmd response: success
22,287,733 UART: [afmc] ++
22,288,326 UART: [afmc] CDI.KEYID = 6
22,289,209 UART: [afmc] SUBJECT.KEYID = 7
22,290,481 UART: [afmc] AUTHORITY.KEYID = 5
25,659,203 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,960,656 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,962,912 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,977,500 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,992,222 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,006,458 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,027,435 UART: [afmc] --
28,031,562 UART: [cold-reset] --
28,034,863 UART: [state] Locking Datavault
28,039,800 UART: [state] Locking PCR0, PCR1 and PCR31
28,041,498 UART: [state] Locking ICCM
28,043,302 UART: [exit] Launching FMC @ 0x40000130
28,051,697 UART:
28,051,930 UART: Running Caliptra FMC ...
28,052,960 UART:
28,053,111 UART: [state] CFI Enabled
28,119,935 UART: [fht] FMC Alias Private Key: 7
30,457,917 UART: [art] Extend RT PCRs Done
30,459,149 UART: [art] Lock RT PCRs Done
30,460,804 UART: [art] Populate DV Done
30,466,209 UART: [fht] FMC Alias Private Key: 7
30,467,854 UART: [art] Derive CDI
30,468,590 UART: [art] Store in in slot 0x4
30,527,963 UART: [art] Derive Key Pair
30,529,002 UART: [art] Store priv key in slot 0x5
33,823,145 UART: [art] Derive Key Pair - Done
33,836,467 UART: [art] Signing Cert with AUTHO
33,837,768 UART: RITY.KEYID = 7
36,124,056 UART: [art] Erasing AUTHORITY.KEYID = 7
36,125,560 UART: [art] PUB.X = 81ED9700CEE24D605E2CA9B568C5DDB5634D72443A665BC81EE427BD3ED70FCBEACF7108CAD830E6166B323DC1E48B0A
36,132,861 UART: [art] PUB.Y = BD5D89DAA4F6F5AEE5AC458FDDE9F8A893B0E8E637FF27BC93742B032BD7406E6EF6ADC4FF9E29A627B65DF26317D200
36,140,089 UART: [art] SIG.R = 15CF560E603B6BE0580DECF69FC83BF9543D26902BBBD220B80A8F0AD100B57228E169AFCC81E699D8AA8DC0CABF63AF
36,147,500 UART: [art] SIG.S = 1B32E6D4D0E281D587F2C15D2B95F85A1F588C2714D8219BFE0307E8A653E5E805304F14D1792A4F1327B1C18FEE221F
37,452,968 UART: Caliptra RT
37,453,677 UART: [state] CFI Enabled
37,614,885 UART: [rt] RT listening for mailbox commands...
37,617,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,772,682 UART: [rt]cmd =0x41544d4e, len=14344
43,227,501 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,783,611 ready_for_fw is high
3,784,223 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,238,024 >>> mbox cmd response: success
27,938,705 UART:
27,939,124 UART: Running Caliptra FMC ...
27,940,331 UART:
27,940,514 UART: [state] CFI Enabled
28,007,743 UART: [fht] FMC Alias Private Key: 7
30,345,630 UART: [art] Extend RT PCRs Done
30,346,851 UART: [art] Lock RT PCRs Done
30,348,321 UART: [art] Populate DV Done
30,353,681 UART: [fht] FMC Alias Private Key: 7
30,355,331 UART: [art] Derive CDI
30,356,149 UART: [art] Store in in slot 0x4
30,415,949 UART: [art] Derive Key Pair
30,416,987 UART: [art] Store priv key in slot 0x5
33,709,232 UART: [art] Derive Key Pair - Done
33,722,500 UART: [art] Signing Cert with AUTHO
33,723,805 UART: RITY.KEYID = 7
36,011,264 UART: [art] Erasing AUTHORITY.KEYID = 7
36,012,802 UART: [art] PUB.X = 65CDDD238CAD2439C3E8402943A1AC3C484EC5ED21C6D11A082B52691A597DA476BBF2024DC04109C9C83ABDB74A46AF
36,020,018 UART: [art] PUB.Y = 08CCF2888E37E567198F397252E32AF022759AF58AFF98C595DE04A1B042953672D1DC076D0C40E6667DF834F4418C97
36,027,247 UART: [art] SIG.R = 55FC58E05B28EF19EE12AB6BCFB641540CF8324C7A38DFF4A52415AF8DF38283BFD4493E6E15169B3C7A6E040DACB955
36,034,607 UART: [art] SIG.S = 56342C5D939C23DFD47CEA96E2C45E55D64CE91BB960F074017DA1FE3ED70DB63A9FFE7C0FC0E259B8DDBA0856782B4A
37,339,703 UART: Caliptra RT
37,340,415 UART: [state] CFI Enabled
37,501,001 UART: [rt] RT listening for mailbox commands...
37,503,514 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,658,698 UART: [rt]cmd =0x41544d4e, len=14344
43,191,413 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
192,923 UART:
193,280 UART: Running Caliptra ROM ...
194,481 UART:
604,150 UART: [state] CFI Enabled
617,525 UART: [state] LifecycleState = Unprovisioned
619,617 UART: [state] DebugLocked = No
621,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,727 UART: [kat] SHA2-256
796,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,004 UART: [kat] ++
807,491 UART: [kat] sha1
818,573 UART: [kat] SHA2-256
821,288 UART: [kat] SHA2-384
826,069 UART: [kat] SHA2-512-ACC
828,438 UART: [kat] ECC-384
3,113,180 UART: [kat] HMAC-384Kdf
3,123,999 UART: [kat] LMS
4,314,094 UART: [kat] --
4,318,268 UART: [cold-reset] ++
4,320,845 UART: [fht] Storing FHT @ 0x50003400
4,332,109 UART: [idev] ++
4,332,670 UART: [idev] CDI.KEYID = 6
4,333,645 UART: [idev] SUBJECT.KEYID = 7
4,334,814 UART: [idev] UDS.KEYID = 0
4,335,880 ready_for_fw is high
4,336,079 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,956 UART: [idev] Erasing UDS.KEYID = 0
7,622,890 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,826 UART: [idev] --
7,648,894 UART: [ldev] ++
7,649,460 UART: [ldev] CDI.KEYID = 6
7,650,473 UART: [ldev] SUBJECT.KEYID = 5
7,651,625 UART: [ldev] AUTHORITY.KEYID = 7
7,652,901 UART: [ldev] FE.KEYID = 1
7,664,844 UART: [ldev] Erasing FE.KEYID = 1
10,949,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,661 UART: [ldev] --
13,309,920 UART: [fwproc] Waiting for Commands...
13,312,704 UART: [fwproc] Received command 0x46574c44
13,314,882 UART: [fwproc] Received Image of size 113760 bytes
21,787,581 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,864,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,933,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,248,482 >>> mbox cmd response: success
22,252,640 UART: [afmc] ++
22,253,230 UART: [afmc] CDI.KEYID = 6
22,254,212 UART: [afmc] SUBJECT.KEYID = 7
22,255,428 UART: [afmc] AUTHORITY.KEYID = 5
25,571,377 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,866,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,868,763 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,883,302 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,898,043 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,912,329 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,933,224 UART: [afmc] --
27,937,683 UART: [cold-reset] --
27,942,032 UART: [state] Locking Datavault
27,946,741 UART: [state] Locking PCR0, PCR1 and PCR31
27,948,497 UART: [state] Locking ICCM
27,950,366 UART: [exit] Launching FMC @ 0x40000130
27,958,756 UART:
27,958,994 UART: Running Caliptra FMC ...
27,960,113 UART:
27,960,271 UART: [state] CFI Enabled
27,968,147 UART: [fht] FMC Alias Private Key: 7
30,298,874 UART: [art] Extend RT PCRs Done
30,300,217 UART: [art] Lock RT PCRs Done
30,301,567 UART: [art] Populate DV Done
30,307,084 UART: [fht] FMC Alias Private Key: 7
30,308,631 UART: [art] Derive CDI
30,309,442 UART: [art] Store in in slot 0x4
30,351,815 UART: [art] Derive Key Pair
30,352,811 UART: [art] Store priv key in slot 0x5
33,595,127 UART: [art] Derive Key Pair - Done
33,608,401 UART: [art] Signing Cert with AUTHO
33,609,704 UART: RITY.KEYID = 7
35,889,060 UART: [art] Erasing AUTHORITY.KEYID = 7
35,890,570 UART: [art] PUB.X = 50BBF64E3584DBFBB09CBA1A26B671C19639555CD0FEE65F0EED010AD8EED4F03B95AF44D03B3CF2D3EAD2E7264A5E8B
35,897,864 UART: [art] PUB.Y = 977816830148EA55779F946427E305D8323317520611A7F895B644E4CBB7260B74ECF8D1810D822AA9C0D1E0A87278D7
35,905,047 UART: [art] SIG.R = 64861D5A5D6DB76BA9C0C4546C5377E45F327A4E1C4FEF8944685A18C21DBF953493B573359884BF2CA1DCDBB4A24E37
35,912,441 UART: [art] SIG.S = B1544E17A03F8FFF808E9F6E9D681771E3244B7FDFA4CB6D4EA0F81D02E2419ECF3B1FEAB4B42BA6EB6CFBD3B5970F37
37,217,867 UART: Caliptra RT
37,218,574 UART: [state] CFI Enabled
37,336,835 UART: [rt] RT listening for mailbox commands...
37,339,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,494,617 UART: [rt]cmd =0x41544d4e, len=14344
43,001,770 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
4,127,908 ready_for_fw is high
4,128,303 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,322,333 >>> mbox cmd response: success
27,970,499 UART:
27,970,886 UART: Running Caliptra FMC ...
27,972,010 UART:
27,972,180 UART: [state] CFI Enabled
27,980,002 UART: [fht] FMC Alias Private Key: 7
30,310,156 UART: [art] Extend RT PCRs Done
30,311,385 UART: [art] Lock RT PCRs Done
30,313,416 UART: [art] Populate DV Done
30,318,729 UART: [fht] FMC Alias Private Key: 7
30,320,314 UART: [art] Derive CDI
30,321,141 UART: [art] Store in in slot 0x4
30,363,757 UART: [art] Derive Key Pair
30,364,761 UART: [art] Store priv key in slot 0x5
33,607,049 UART: [art] Derive Key Pair - Done
33,619,789 UART: [art] Signing Cert with AUTHO
33,621,089 UART: RITY.KEYID = 7
35,900,488 UART: [art] Erasing AUTHORITY.KEYID = 7
35,902,010 UART: [art] PUB.X = 93C07173AA074139143414C4283C28929D01D675F0CABAB679DE0F95EB31E2E9B2C906B5796344C34A59CB16386DB24F
35,909,204 UART: [art] PUB.Y = D2333A6D435BAE6102EB218F0942C8BF67EAEB89AAD75865D86144AC4648440F57FD0034FB0207CB24505F045985C082
35,916,455 UART: [art] SIG.R = 276B9D0A3932C6923713BEDEFFC6D88A59D52FF5C37173799ED952C03D7A101ADB5A613B302967CFE160F6AA1B170B73
35,923,866 UART: [art] SIG.S = F0D3D841D50D1D28CF010DA696CB01032758B839D7A42A98493715BFD68B2AC2522DD07F759618283E5D8C3D3B8B1C5E
37,229,471 UART: Caliptra RT
37,230,186 UART: [state] CFI Enabled
37,348,013 UART: [rt] RT listening for mailbox commands...
37,350,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,505,624 UART: [rt]cmd =0x41544d4e, len=14344
43,038,069 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
192,597 UART:
192,956 UART: Running Caliptra ROM ...
194,146 UART:
194,304 UART: [state] CFI Enabled
263,208 UART: [state] LifecycleState = Unprovisioned
265,040 UART: [state] DebugLocked = No
267,998 UART: [state] WD Timer not started. Device not locked for debugging
272,411 UART: [kat] SHA2-256
451,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,087 UART: [kat] ++
463,622 UART: [kat] sha1
474,472 UART: [kat] SHA2-256
477,489 UART: [kat] SHA2-384
483,843 UART: [kat] SHA2-512-ACC
486,848 UART: [kat] ECC-384
2,947,409 UART: [kat] HMAC-384Kdf
2,970,011 UART: [kat] LMS
3,499,519 UART: [kat] --
3,505,244 UART: [cold-reset] ++
3,506,652 UART: [fht] FHT @ 0x50003400
3,517,961 UART: [idev] ++
3,518,528 UART: [idev] CDI.KEYID = 6
3,519,410 UART: [idev] SUBJECT.KEYID = 7
3,520,647 UART: [idev] UDS.KEYID = 0
3,521,571 ready_for_fw is high
3,521,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,106 UART: [idev] Erasing UDS.KEYID = 0
6,023,693 UART: [idev] Sha1 KeyId Algorithm
6,046,255 UART: [idev] --
6,050,200 UART: [ldev] ++
6,050,771 UART: [ldev] CDI.KEYID = 6
6,051,684 UART: [ldev] SUBJECT.KEYID = 5
6,052,894 UART: [ldev] AUTHORITY.KEYID = 7
6,054,124 UART: [ldev] FE.KEYID = 1
6,096,701 UART: [ldev] Erasing FE.KEYID = 1
8,597,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,814 UART: [ldev] --
10,410,194 UART: [fwproc] Wait for Commands...
10,412,662 UART: [fwproc] Recv command 0x46574c44
10,414,748 UART: [fwproc] Recv'd Img size: 114084 bytes
14,968,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,041,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,109,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,426,815 >>> mbox cmd response: success
15,430,212 UART: [afmc] ++
15,430,803 UART: [afmc] CDI.KEYID = 6
15,431,711 UART: [afmc] SUBJECT.KEYID = 7
15,432,925 UART: [afmc] AUTHORITY.KEYID = 5
17,978,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,699,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,701,516 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,717,476 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,733,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,749,279 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,771,144 UART: [afmc] --
19,774,743 UART: [cold-reset] --
19,778,298 UART: [state] Locking Datavault
19,783,435 UART: [state] Locking PCR0, PCR1 and PCR31
19,785,075 UART: [state] Locking ICCM
19,786,229 UART: [exit] Launching FMC @ 0x40000130
19,794,678 UART:
19,794,909 UART: Running Caliptra FMC ...
19,796,004 UART:
19,796,169 UART: [state] CFI Enabled
19,859,732 UART: [fht] FMC Alias Private Key: 7
21,624,544 UART: [art] Extend RT PCRs Done
21,625,751 UART: [art] Lock RT PCRs Done
21,627,463 UART: [art] Populate DV Done
21,632,923 UART: [fht] FMC Alias Private Key: 7
21,634,504 UART: [art] Derive CDI
21,635,235 UART: [art] Store in in slot 0x4
21,692,858 UART: [art] Derive Key Pair
21,693,912 UART: [art] Store priv key in slot 0x5
24,157,326 UART: [art] Derive Key Pair - Done
24,170,429 UART: [art] Signing Cert with AUTHO
24,171,727 UART: RITY.KEYID = 7
25,882,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,883,985 UART: [art] PUB.X = 0660126E3D7AABA5177C37B6741C9A1DBB598107961FE50BA7F5BE11CE32941C9285BDA86A154A8B04F01DA31A5878FF
25,891,216 UART: [art] PUB.Y = FAC61E86EA620350AF453C5075E95FCAC77F4C4B293A5ACB9FF80703688B6A9F7B301A0F2CDA3501590453E19EA212B6
25,898,480 UART: [art] SIG.R = CACD6F49BC2BFB4B9DDFC73033EAF3281DE56EAEC97A67947C08827F334D52F5578AE771C661A3BEB19B405867F728BF
25,906,114 UART: [art] SIG.S = C52E89BA2DDB1A3023BC1DBF332854D8157268D2891263A78CE6B53FBDD8D3747EFD785D7CCC7E2EF470A14D6F62CD25
26,884,959 UART: Caliptra RT
26,885,669 UART: [state] CFI Enabled
27,051,226 UART: [rt] RT listening for mailbox commands...
27,053,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,198 UART: [rt]cmd =0x41544d4e, len=14344
30,568,944 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,381,755 ready_for_fw is high
3,382,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,040,810 >>> mbox cmd response: success
19,323,300 UART:
19,323,716 UART: Running Caliptra FMC ...
19,324,851 UART:
19,325,011 UART: [state] CFI Enabled
19,393,759 UART: [fht] FMC Alias Private Key: 7
21,157,759 UART: [art] Extend RT PCRs Done
21,158,994 UART: [art] Lock RT PCRs Done
21,160,303 UART: [art] Populate DV Done
21,165,647 UART: [fht] FMC Alias Private Key: 7
21,167,192 UART: [art] Derive CDI
21,168,005 UART: [art] Store in in slot 0x4
21,226,781 UART: [art] Derive Key Pair
21,227,830 UART: [art] Store priv key in slot 0x5
23,690,635 UART: [art] Derive Key Pair - Done
23,703,474 UART: [art] Signing Cert with AUTHO
23,704,816 UART: RITY.KEYID = 7
25,416,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,418,025 UART: [art] PUB.X = 924FFC11A0121E55B8483C9A6EA85354316A78277AB821F6BE23703D38037F23DB84144CE2FBB17BBB98A2451D2279C9
25,425,276 UART: [art] PUB.Y = 2A20B64716DAFF062F145F74D14641628CB1FE4D278452A550F35A78A11F0C9B03B45632629F8D63A5E45799A91944FD
25,432,514 UART: [art] SIG.R = 3372755A1765631343883075AF2AD9640E86F57D9085A11BA6FD7098076B7EFB59FF85CF6D12714A7C253C3F08E42061
25,439,892 UART: [art] SIG.S = D643B5ECF21991BBAD7AEBA68F1FFD6904DAF37F1123AA3E01D5A7212B92929B38AA08DD611EF6F3FD90420A79DE2447
26,419,442 UART: Caliptra RT
26,420,148 UART: [state] CFI Enabled
26,583,917 UART: [rt] RT listening for mailbox commands...
26,586,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,741,363 UART: [rt]cmd =0x41544d4e, len=14344
30,101,655 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,119 writing to cptra_bootfsm_go
193,292 UART:
193,664 UART: Running Caliptra ROM ...
194,848 UART:
604,469 UART: [state] CFI Enabled
620,354 UART: [state] LifecycleState = Unprovisioned
622,178 UART: [state] DebugLocked = No
623,915 UART: [state] WD Timer not started. Device not locked for debugging
628,191 UART: [kat] SHA2-256
807,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,897 UART: [kat] ++
819,349 UART: [kat] sha1
831,425 UART: [kat] SHA2-256
834,427 UART: [kat] SHA2-384
839,641 UART: [kat] SHA2-512-ACC
842,582 UART: [kat] ECC-384
3,284,727 UART: [kat] HMAC-384Kdf
3,296,683 UART: [kat] LMS
3,826,183 UART: [kat] --
3,831,184 UART: [cold-reset] ++
3,832,995 UART: [fht] FHT @ 0x50003400
3,843,412 UART: [idev] ++
3,843,982 UART: [idev] CDI.KEYID = 6
3,844,892 UART: [idev] SUBJECT.KEYID = 7
3,846,138 UART: [idev] UDS.KEYID = 0
3,847,060 ready_for_fw is high
3,847,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,550 UART: [idev] Erasing UDS.KEYID = 0
6,320,752 UART: [idev] Sha1 KeyId Algorithm
6,343,868 UART: [idev] --
6,347,757 UART: [ldev] ++
6,348,331 UART: [ldev] CDI.KEYID = 6
6,349,213 UART: [ldev] SUBJECT.KEYID = 5
6,350,429 UART: [ldev] AUTHORITY.KEYID = 7
6,351,669 UART: [ldev] FE.KEYID = 1
6,364,933 UART: [ldev] Erasing FE.KEYID = 1
8,838,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,533 UART: [ldev] --
10,629,269 UART: [fwproc] Wait for Commands...
10,632,402 UART: [fwproc] Recv command 0x46574c44
10,634,498 UART: [fwproc] Recv'd Img size: 114084 bytes
15,187,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,264,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,333,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,649,793 >>> mbox cmd response: success
15,654,291 UART: [afmc] ++
15,654,913 UART: [afmc] CDI.KEYID = 6
15,655,830 UART: [afmc] SUBJECT.KEYID = 7
15,657,015 UART: [afmc] AUTHORITY.KEYID = 5
18,152,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,874,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,876,375 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,892,470 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,908,277 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,924,059 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,948,249 UART: [afmc] --
19,952,224 UART: [cold-reset] --
19,955,281 UART: [state] Locking Datavault
19,959,556 UART: [state] Locking PCR0, PCR1 and PCR31
19,961,211 UART: [state] Locking ICCM
19,963,198 UART: [exit] Launching FMC @ 0x40000130
19,971,652 UART:
19,971,889 UART: Running Caliptra FMC ...
19,973,125 UART:
19,973,303 UART: [state] CFI Enabled
19,981,276 UART: [fht] FMC Alias Private Key: 7
21,737,580 UART: [art] Extend RT PCRs Done
21,738,804 UART: [art] Lock RT PCRs Done
21,740,812 UART: [art] Populate DV Done
21,746,329 UART: [fht] FMC Alias Private Key: 7
21,747,934 UART: [art] Derive CDI
21,748,750 UART: [art] Store in in slot 0x4
21,791,614 UART: [art] Derive Key Pair
21,792,614 UART: [art] Store priv key in slot 0x5
24,219,109 UART: [art] Derive Key Pair - Done
24,232,101 UART: [art] Signing Cert with AUTHO
24,233,401 UART: RITY.KEYID = 7
25,939,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,940,530 UART: [art] PUB.X = 954E31FD5806B6E3E03B0F8ABA9339C5C2130F33ECEA37EB2B0796D2C5EFCB1C0AAA24DE1C1F740CB877AF8B5758FE16
25,947,806 UART: [art] PUB.Y = 71819A780C4081DF36CECB26CD0ED7C729E480C6A12F77BBC5B4510B3DE10D737F532B1133A57C76A3E984AEA78940FA
25,955,089 UART: [art] SIG.R = EEE4F3074BF23254F9BCD6CE6B324A700774756EF773146A922BCBCA2F53C764DE0C76DAB63F78BB938264276589C446
25,962,470 UART: [art] SIG.S = 9A767A1DED566D74141D36FB74E7390954CAC3D693AF3B7E47B660207015DAAD132551CF2C8458F2F038CD8AE4E7298D
26,941,715 UART: Caliptra RT
26,942,408 UART: [state] CFI Enabled
27,060,444 UART: [rt] RT listening for mailbox commands...
27,062,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,218,155 UART: [rt]cmd =0x41544d4e, len=14344
30,576,982 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,691,531 ready_for_fw is high
3,691,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,235,697 >>> mbox cmd response: success
19,485,596 UART:
19,485,996 UART: Running Caliptra FMC ...
19,487,187 UART:
19,487,356 UART: [state] CFI Enabled
19,495,310 UART: [fht] FMC Alias Private Key: 7
21,252,388 UART: [art] Extend RT PCRs Done
21,253,618 UART: [art] Lock RT PCRs Done
21,255,305 UART: [art] Populate DV Done
21,260,670 UART: [fht] FMC Alias Private Key: 7
21,262,222 UART: [art] Derive CDI
21,262,996 UART: [art] Store in in slot 0x4
21,305,757 UART: [art] Derive Key Pair
21,306,761 UART: [art] Store priv key in slot 0x5
23,733,554 UART: [art] Derive Key Pair - Done
23,746,714 UART: [art] Signing Cert with AUTHO
23,748,048 UART: RITY.KEYID = 7
25,453,306 UART: [art] Erasing AUTHORITY.KEYID = 7
25,454,815 UART: [art] PUB.X = 5121FE0EA4137C71D32949D91297DCDFD9E865E5FAE740779DEF085EC4A4347932C4074B13D58877C8233730BA623F47
25,462,043 UART: [art] PUB.Y = 33DE7C9ECC02C405E423D322740527D737F887A7739FC569BD148AFA31CF4D74AE29D761A33E4431FC238A372600EC23
25,469,286 UART: [art] SIG.R = C4A1538A2E2C652BA2960A06F0FD02AB9775DF2E58801C891A33F1173BED619F1135DB7AC882977A1644A9477934446A
25,476,652 UART: [art] SIG.S = 8B84FF72D9B3223C1364CF15AF51CF039CB61FE2E7DA7684947EA9A8FF22778D967A43B8D283C04423CF890EF9EDEAFB
26,455,755 UART: Caliptra RT
26,456,466 UART: [state] CFI Enabled
26,574,024 UART: [rt] RT listening for mailbox commands...
26,576,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,731,649 UART: [rt]cmd =0x41544d4e, len=14344
30,094,706 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,414 UART:
192,798 UART: Running Caliptra ROM ...
193,952 UART:
194,102 UART: [state] CFI Enabled
263,035 UART: [state] LifecycleState = Unprovisioned
265,457 UART: [state] DebugLocked = No
267,981 UART: [state] WD Timer not started. Device not locked for debugging
272,234 UART: [kat] SHA2-256
462,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,872 UART: [kat] ++
473,315 UART: [kat] sha1
485,963 UART: [kat] SHA2-256
488,966 UART: [kat] SHA2-384
495,860 UART: [kat] SHA2-512-ACC
498,495 UART: [kat] ECC-384
2,946,341 UART: [kat] HMAC-384Kdf
2,969,480 UART: [kat] LMS
3,501,321 UART: [kat] --
3,507,025 UART: [cold-reset] ++
3,509,311 UART: [fht] FHT @ 0x50003400
3,521,561 UART: [idev] ++
3,522,202 UART: [idev] CDI.KEYID = 6
3,523,234 UART: [idev] SUBJECT.KEYID = 7
3,524,403 UART: [idev] UDS.KEYID = 0
3,525,328 ready_for_fw is high
3,525,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,189 UART: [idev] Erasing UDS.KEYID = 0
6,025,672 UART: [idev] Sha1 KeyId Algorithm
6,047,232 UART: [idev] --
6,051,711 UART: [ldev] ++
6,052,394 UART: [ldev] CDI.KEYID = 6
6,053,308 UART: [ldev] SUBJECT.KEYID = 5
6,054,550 UART: [ldev] AUTHORITY.KEYID = 7
6,055,730 UART: [ldev] FE.KEYID = 1
6,097,104 UART: [ldev] Erasing FE.KEYID = 1
8,601,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,217 UART: [ldev] --
10,408,937 UART: [fwproc] Wait for Commands...
10,410,543 UART: [fwproc] Recv command 0x46574c44
10,412,863 UART: [fwproc] Recv'd Img size: 114084 bytes
15,019,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,097,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,213,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,754,008 >>> mbox cmd response: success
15,758,560 UART: [afmc] ++
15,759,272 UART: [afmc] CDI.KEYID = 6
15,760,525 UART: [afmc] SUBJECT.KEYID = 7
15,761,971 UART: [afmc] AUTHORITY.KEYID = 5
18,297,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,021,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,023,278 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,038,333 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,053,545 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,068,366 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,092,191 UART: [afmc] --
20,096,583 UART: [cold-reset] --
20,100,305 UART: [state] Locking Datavault
20,106,488 UART: [state] Locking PCR0, PCR1 and PCR31
20,108,657 UART: [state] Locking ICCM
20,111,132 UART: [exit] Launching FMC @ 0x40000130
20,119,786 UART:
20,120,024 UART: Running Caliptra FMC ...
20,121,124 UART:
20,121,284 UART: [state] CFI Enabled
20,178,820 UART: [fht] FMC Alias Private Key: 7
21,942,875 UART: [art] Extend RT PCRs Done
21,944,092 UART: [art] Lock RT PCRs Done
21,945,583 UART: [art] Populate DV Done
21,951,159 UART: [fht] FMC Alias Private Key: 7
21,952,854 UART: [art] Derive CDI
21,953,590 UART: [art] Store in in slot 0x4
22,011,822 UART: [art] Derive Key Pair
22,012,862 UART: [art] Store priv key in slot 0x5
24,476,412 UART: [art] Derive Key Pair - Done
24,489,510 UART: [art] Signing Cert with AUTHO
24,490,810 UART: RITY.KEYID = 7
26,201,864 UART: [art] Erasing AUTHORITY.KEYID = 7
26,203,371 UART: [art] PUB.X = CF8AE6D3B9D53B33CE600D4D9924B07E0F71BD0F225FB23A20EA2F707D24DD044BEEF59A41E4B1A518D6B4BB5297F803
26,210,659 UART: [art] PUB.Y = 3AA9754692CE11ADB273B0F5B5665E0A8C9BBA647C90E0686A044B32B4ADA19C8E5FA891EA140A201B43A682EDB75B30
26,217,908 UART: [art] SIG.R = 82EAF63A83DD2DC51A5969B7D22C10BCDC2DA011C86250531FE0057F89F3AF10C81C7A8D2979A0CE11C6FFCD68325AEE
26,225,336 UART: [art] SIG.S = B99DA27E175CB0251B26321C04F941BCDD6749179BF638BB4495E1F07734315987CAF8A894935C69BFD5F9F4938D8546
27,204,233 UART: Caliptra RT
27,204,950 UART: [state] CFI Enabled
27,371,049 UART: [rt] RT listening for mailbox commands...
27,373,492 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,528,839 UART: [rt]cmd =0x41544d4e, len=14344
30,888,401 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,442,481 ready_for_fw is high
3,442,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,805,947 >>> mbox cmd response: success
20,115,693 UART:
20,116,087 UART: Running Caliptra FMC ...
20,117,203 UART:
20,117,365 UART: [state] CFI Enabled
20,185,570 UART: [fht] FMC Alias Private Key: 7
21,949,342 UART: [art] Extend RT PCRs Done
21,950,569 UART: [art] Lock RT PCRs Done
21,952,385 UART: [art] Populate DV Done
21,957,649 UART: [fht] FMC Alias Private Key: 7
21,959,188 UART: [art] Derive CDI
21,959,948 UART: [art] Store in in slot 0x4
22,019,689 UART: [art] Derive Key Pair
22,020,733 UART: [art] Store priv key in slot 0x5
24,484,046 UART: [art] Derive Key Pair - Done
24,497,266 UART: [art] Signing Cert with AUTHO
24,498,565 UART: RITY.KEYID = 7
26,209,314 UART: [art] Erasing AUTHORITY.KEYID = 7
26,210,831 UART: [art] PUB.X = D6132B611BE484302BDC2D02F27AF1E325592EA5D24D1A2202241223533748126DE6A2E112A92F023786EB0033169B25
26,218,069 UART: [art] PUB.Y = E55115ECF0833679ADDE8107380AB44AC8E2B4CE4CBD0E3AFAFB92E9E1F2F3E43200369283841388C7DCD632B0C023DB
26,225,295 UART: [art] SIG.R = 694459A700BB51162E26603B622476B6C0DF8672C80DC70CBBD67626B3F3A7177EA929A7E0A45899E7E80B794E616C5E
26,232,644 UART: [art] SIG.S = 90B2979DDD16F5D69F21863E0CA6B15197CD815F8DB8E522E3D296C8465D4FB4C09367698F5C1EAA4AD8E4301EF2C308
27,211,937 UART: Caliptra RT
27,212,640 UART: [state] CFI Enabled
27,377,312 UART: [rt] RT listening for mailbox commands...
27,379,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,534,861 UART: [rt]cmd =0x41544d4e, len=14344
30,900,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,897 writing to cptra_bootfsm_go
193,137 UART:
193,487 UART: Running Caliptra ROM ...
194,678 UART:
604,412 UART: [state] CFI Enabled
618,302 UART: [state] LifecycleState = Unprovisioned
620,675 UART: [state] DebugLocked = No
622,563 UART: [state] WD Timer not started. Device not locked for debugging
626,584 UART: [kat] SHA2-256
816,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,260 UART: [kat] ++
827,725 UART: [kat] sha1
840,236 UART: [kat] SHA2-256
843,247 UART: [kat] SHA2-384
849,525 UART: [kat] SHA2-512-ACC
852,106 UART: [kat] ECC-384
3,293,713 UART: [kat] HMAC-384Kdf
3,306,232 UART: [kat] LMS
3,838,033 UART: [kat] --
3,843,124 UART: [cold-reset] ++
3,844,705 UART: [fht] FHT @ 0x50003400
3,856,607 UART: [idev] ++
3,857,244 UART: [idev] CDI.KEYID = 6
3,858,279 UART: [idev] SUBJECT.KEYID = 7
3,859,454 UART: [idev] UDS.KEYID = 0
3,860,382 ready_for_fw is high
3,860,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,861 UART: [idev] Erasing UDS.KEYID = 0
6,337,713 UART: [idev] Sha1 KeyId Algorithm
6,360,998 UART: [idev] --
6,365,916 UART: [ldev] ++
6,366,595 UART: [ldev] CDI.KEYID = 6
6,367,614 UART: [ldev] SUBJECT.KEYID = 5
6,368,720 UART: [ldev] AUTHORITY.KEYID = 7
6,369,948 UART: [ldev] FE.KEYID = 1
6,380,539 UART: [ldev] Erasing FE.KEYID = 1
8,860,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,267 UART: [ldev] --
10,650,403 UART: [fwproc] Wait for Commands...
10,652,355 UART: [fwproc] Recv command 0x46574c44
10,654,611 UART: [fwproc] Recv'd Img size: 114084 bytes
15,265,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,347,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,463,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,004,398 >>> mbox cmd response: success
16,008,037 UART: [afmc] ++
16,008,762 UART: [afmc] CDI.KEYID = 6
16,009,878 UART: [afmc] SUBJECT.KEYID = 7
16,011,431 UART: [afmc] AUTHORITY.KEYID = 5
18,517,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,238,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,240,162 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,255,235 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,270,459 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,285,255 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,309,292 UART: [afmc] --
20,313,203 UART: [cold-reset] --
20,318,324 UART: [state] Locking Datavault
20,322,884 UART: [state] Locking PCR0, PCR1 and PCR31
20,325,050 UART: [state] Locking ICCM
20,326,716 UART: [exit] Launching FMC @ 0x40000130
20,335,403 UART:
20,335,641 UART: Running Caliptra FMC ...
20,336,744 UART:
20,336,900 UART: [state] CFI Enabled
20,344,895 UART: [fht] FMC Alias Private Key: 7
22,101,542 UART: [art] Extend RT PCRs Done
22,102,744 UART: [art] Lock RT PCRs Done
22,104,457 UART: [art] Populate DV Done
22,109,863 UART: [fht] FMC Alias Private Key: 7
22,111,345 UART: [art] Derive CDI
22,112,104 UART: [art] Store in in slot 0x4
22,154,746 UART: [art] Derive Key Pair
22,155,783 UART: [art] Store priv key in slot 0x5
24,581,978 UART: [art] Derive Key Pair - Done
24,595,086 UART: [art] Signing Cert with AUTHO
24,596,391 UART: RITY.KEYID = 7
26,301,874 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,361 UART: [art] PUB.X = 60050E32FBE84A510B43670048D996690678AAE86188550045A8725B63F38940701EECB22ECF331B8C65F681CC854A60
26,310,582 UART: [art] PUB.Y = D4199B7FFE738CC9BCFDE46462C62F471CBCA014334BF0F00CD378EA440827931D68C9C7EA914B3CB8397F2E6B611FAF
26,317,855 UART: [art] SIG.R = D99740127D02A5078ADA40042DBF48CF6BAD16E72E832B3D1379076819C76B2C7764163E1A11906BBF0A874F88A552E3
26,325,233 UART: [art] SIG.S = B578E7A2FAEB1025A08E2E5B2B02FC62A800F6B437DAF07A743BF927221EACE1C653808B20E0DABF8BDEF32F66CB0FBB
27,303,922 UART: Caliptra RT
27,304,624 UART: [state] CFI Enabled
27,422,061 UART: [rt] RT listening for mailbox commands...
27,424,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,579,523 UART: [rt]cmd =0x41544d4e, len=14344
30,926,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
3,756,182 ready_for_fw is high
3,756,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,049,000 >>> mbox cmd response: success
20,302,165 UART:
20,302,549 UART: Running Caliptra FMC ...
20,303,660 UART:
20,303,816 UART: [state] CFI Enabled
20,311,980 UART: [fht] FMC Alias Private Key: 7
22,068,283 UART: [art] Extend RT PCRs Done
22,069,513 UART: [art] Lock RT PCRs Done
22,070,900 UART: [art] Populate DV Done
22,076,177 UART: [fht] FMC Alias Private Key: 7
22,077,839 UART: [art] Derive CDI
22,078,585 UART: [art] Store in in slot 0x4
22,121,080 UART: [art] Derive Key Pair
22,122,125 UART: [art] Store priv key in slot 0x5
24,549,223 UART: [art] Derive Key Pair - Done
24,562,378 UART: [art] Signing Cert with AUTHO
24,563,684 UART: RITY.KEYID = 7
26,269,349 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,856 UART: [art] PUB.X = 0887D73FC55E918893F440E7ACF141BB25F98C0A4C691AD6B6210FB8A0785CBB01D25378FE66BAB0600506738B2CBC87
26,278,105 UART: [art] PUB.Y = 7D7B3030D577386CBF8E4D1C496D95287A4672C772C128DC88212FCD28F3EC05A72F8FAA1F99E1B576FF3BD067C3E621
26,285,396 UART: [art] SIG.R = A48460B79FB99B2141D777DCB179F3C4481D1A92C19883E525E6E6372525F16253AEA90D4F76752714EC05A48863AB00
26,292,739 UART: [art] SIG.S = 55FAC2D9E477505C8DCB773262D09CF0EF16B617E67EADD04896D80A07DA349F6DCDD2154A72431C368797E5CE2BD545
27,271,672 UART: Caliptra RT
27,272,362 UART: [state] CFI Enabled
27,391,047 UART: [rt] RT listening for mailbox commands...
27,393,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,774 UART: [rt]cmd =0x41544d4e, len=14344
30,901,373 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,181 UART: [kat] SHA2-256
882,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,227 UART: [kat] ++
886,379 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,156 UART: [kat] SHA2-512-ACC
897,057 UART: [kat] ECC-384
902,326 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,371 UART: [cold-reset] ++
1,476,845 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,504,934 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,632 UART: [idev] --
1,514,695 UART: [ldev] ++
1,514,863 UART: [ldev] CDI.KEYID = 6
1,515,226 UART: [ldev] SUBJECT.KEYID = 5
1,515,652 UART: [ldev] AUTHORITY.KEYID = 7
1,516,115 UART: [ldev] FE.KEYID = 1
1,521,103 UART: [ldev] Erasing FE.KEYID = 1
1,546,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,916 UART: [ldev] --
1,585,353 UART: [fwproc] Waiting for Commands...
1,585,980 UART: [fwproc] Received command 0x46574c44
1,586,771 UART: [fwproc] Received Image of size 114084 bytes
5,117,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,144,662 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,174,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,309,391 >>> mbox cmd response: success
5,310,467 UART: [afmc] ++
5,310,635 UART: [afmc] CDI.KEYID = 6
5,310,997 UART: [afmc] SUBJECT.KEYID = 7
5,311,422 UART: [afmc] AUTHORITY.KEYID = 5
5,346,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,362,442 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,363,222 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,368,931 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,374,823 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,380,524 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,388,594 UART: [afmc] --
5,389,480 UART: [cold-reset] --
5,390,392 UART: [state] Locking Datavault
5,391,649 UART: [state] Locking PCR0, PCR1 and PCR31
5,392,253 UART: [state] Locking ICCM
5,392,821 UART: [exit] Launching FMC @ 0x40000130
5,398,150 UART:
5,398,166 UART: Running Caliptra FMC ...
5,398,574 UART:
5,398,628 UART: [state] CFI Enabled
5,409,346 UART: [fht] FMC Alias Private Key: 7
5,517,254 UART: [art] Extend RT PCRs Done
5,517,682 UART: [art] Lock RT PCRs Done
5,519,416 UART: [art] Populate DV Done
5,527,718 UART: [fht] FMC Alias Private Key: 7
5,528,854 UART: [art] Derive CDI
5,529,134 UART: [art] Store in in slot 0x4
5,615,151 UART: [art] Derive Key Pair
5,615,511 UART: [art] Store priv key in slot 0x5
5,629,119 UART: [art] Derive Key Pair - Done
5,643,733 UART: [art] Signing Cert with AUTHO
5,644,213 UART: RITY.KEYID = 7
5,658,731 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,496 UART: [art] PUB.X = 9FA295EF41A993AF5CCA18E1B5F43BC9F2CEC68455ADABC67A30E4983C5373B87334270AFC3CAA3952B79E2184815424
5,666,273 UART: [art] PUB.Y = A150812A15035713BF3BA2F4BDB87AAD6913DEFC9FDEC3D58B196839A859378CB30A08B955D2E66BA60EE7E520FC6D1B
5,673,227 UART: [art] SIG.R = 9899924AFB7211632C290F4949D32C8D0E9B39E64656E080D8D2BCC359290481D8DF9451D4A71B207045F0C1BB9E05B9
5,679,981 UART: [art] SIG.S = 1A62C5D2152BC589DD8BAC994AB18C55714A850313E3E7531F8D9C77B49D900DCCF8E0E73EA35A4F05F3135C68558465
5,703,729 UART: Caliptra RT
5,703,982 UART: [state] CFI Enabled
5,812,673 UART: [rt] RT listening for mailbox commands...
5,813,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,231 UART: [rt]cmd =0x41544d4e, len=14344
6,578,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,279 ready_for_fw is high
1,362,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,084,743 >>> mbox cmd response: success
5,146,190 UART:
5,146,206 UART: Running Caliptra FMC ...
5,146,614 UART:
5,146,668 UART: [state] CFI Enabled
5,157,210 UART: [fht] FMC Alias Private Key: 7
5,265,126 UART: [art] Extend RT PCRs Done
5,265,554 UART: [art] Lock RT PCRs Done
5,267,048 UART: [art] Populate DV Done
5,275,312 UART: [fht] FMC Alias Private Key: 7
5,276,386 UART: [art] Derive CDI
5,276,666 UART: [art] Store in in slot 0x4
5,362,635 UART: [art] Derive Key Pair
5,362,995 UART: [art] Store priv key in slot 0x5
5,376,257 UART: [art] Derive Key Pair - Done
5,391,164 UART: [art] Signing Cert with AUTHO
5,391,644 UART: RITY.KEYID = 7
5,407,248 UART: [art] Erasing AUTHORITY.KEYID = 7
5,408,013 UART: [art] PUB.X = E62161B71E639DE417EC6F4840FFDDEAE59B06E89FBA892D7ABD14ABA7BD5CF3BC226E5E8F58495D44FB5484C9B25C91
5,414,802 UART: [art] PUB.Y = AE1E8EFB25E966CFA22FAEF8D35D27978C2B4D6A29F044572A9CC014536CFB4D4E0392C03F1D69936F634D34E16E1E00
5,421,739 UART: [art] SIG.R = 2E9172BD0519247A0500BDA5505CF214B799CCC6461A084DAE738BC3A80BC0BA574ABAC42C721700F6E283073562D871
5,428,452 UART: [art] SIG.S = 36D2AFEB0F7D7F420C63DDD747BDB810BFD91D80B22F6B5191B623BAF235C68928DDA03B4702804334D54A1690EE98EB
5,452,208 UART: Caliptra RT
5,452,461 UART: [state] CFI Enabled
5,561,827 UART: [rt] RT listening for mailbox commands...
5,562,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,549 UART: [rt]cmd =0x41544d4e, len=14344
6,335,035 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,450 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,227 UART: [kat] SHA2-512-ACC
897,128 UART: [kat] ECC-384
902,993 UART: [kat] HMAC-384Kdf
907,495 UART: [kat] LMS
1,475,691 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,477,078 UART: [fht] Storing FHT @ 0x50003400
1,479,945 UART: [idev] ++
1,480,113 UART: [idev] CDI.KEYID = 6
1,480,473 UART: [idev] SUBJECT.KEYID = 7
1,480,897 UART: [idev] UDS.KEYID = 0
1,481,242 ready_for_fw is high
1,481,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,773 UART: [idev] Erasing UDS.KEYID = 0
1,505,257 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,942 UART: [ldev] ++
1,515,110 UART: [ldev] CDI.KEYID = 6
1,515,473 UART: [ldev] SUBJECT.KEYID = 5
1,515,899 UART: [ldev] AUTHORITY.KEYID = 7
1,516,362 UART: [ldev] FE.KEYID = 1
1,521,694 UART: [ldev] Erasing FE.KEYID = 1
1,546,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,515 UART: [ldev] --
1,585,816 UART: [fwproc] Waiting for Commands...
1,586,537 UART: [fwproc] Received command 0x46574c44
1,587,328 UART: [fwproc] Received Image of size 114084 bytes
5,155,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,182,974 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,212,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,347,739 >>> mbox cmd response: success
5,348,923 UART: [afmc] ++
5,349,091 UART: [afmc] CDI.KEYID = 6
5,349,453 UART: [afmc] SUBJECT.KEYID = 7
5,349,878 UART: [afmc] AUTHORITY.KEYID = 5
5,384,594 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,400,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,401,330 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,407,039 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,412,931 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,418,632 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,426,676 UART: [afmc] --
5,427,724 UART: [cold-reset] --
5,428,464 UART: [state] Locking Datavault
5,429,449 UART: [state] Locking PCR0, PCR1 and PCR31
5,430,053 UART: [state] Locking ICCM
5,430,693 UART: [exit] Launching FMC @ 0x40000130
5,436,022 UART:
5,436,038 UART: Running Caliptra FMC ...
5,436,446 UART:
5,436,589 UART: [state] CFI Enabled
5,447,005 UART: [fht] FMC Alias Private Key: 7
5,554,521 UART: [art] Extend RT PCRs Done
5,554,949 UART: [art] Lock RT PCRs Done
5,556,185 UART: [art] Populate DV Done
5,564,399 UART: [fht] FMC Alias Private Key: 7
5,565,539 UART: [art] Derive CDI
5,565,819 UART: [art] Store in in slot 0x4
5,651,984 UART: [art] Derive Key Pair
5,652,344 UART: [art] Store priv key in slot 0x5
5,665,884 UART: [art] Derive Key Pair - Done
5,680,678 UART: [art] Signing Cert with AUTHO
5,681,158 UART: RITY.KEYID = 7
5,695,990 UART: [art] Erasing AUTHORITY.KEYID = 7
5,696,755 UART: [art] PUB.X = A276479E2C3F4AF1BA42F86D6500200D91C30BD02200A9C86C2CBCF1AC124DF5DF0EB6F2EA3C219D3E1D1A716A85F5A8
5,703,490 UART: [art] PUB.Y = 58143A762F8C297EB1CF06A6791ECA1A0FF5FD88109344F760FAAC6C835ED9192F886BE289BCC25061AB703F36E89EF3
5,710,444 UART: [art] SIG.R = 3162FFE81B950FF5555A3FC25971F9C6A779BD8E4B16FA213662BBEDF49B68FEDB4B1C51ACB3C6F7C0C30E129251A619
5,717,224 UART: [art] SIG.S = E89C2B1E210021D69AC6F6BD2F695378FA8DCBBA7D37522355610D0A076CDE7B1FDA8A32C8A617B6A45337C860687CD1
5,741,468 UART: Caliptra RT
5,741,813 UART: [state] CFI Enabled
5,851,186 UART: [rt] RT listening for mailbox commands...
5,851,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,840 UART: [rt]cmd =0x41544d4e, len=14344
6,622,103 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,316 ready_for_fw is high
1,363,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,313,528 >>> mbox cmd response: success
5,374,721 UART:
5,374,737 UART: Running Caliptra FMC ...
5,375,145 UART:
5,375,288 UART: [state] CFI Enabled
5,385,990 UART: [fht] FMC Alias Private Key: 7
5,493,688 UART: [art] Extend RT PCRs Done
5,494,116 UART: [art] Lock RT PCRs Done
5,495,778 UART: [art] Populate DV Done
5,504,066 UART: [fht] FMC Alias Private Key: 7
5,505,240 UART: [art] Derive CDI
5,505,520 UART: [art] Store in in slot 0x4
5,591,601 UART: [art] Derive Key Pair
5,591,961 UART: [art] Store priv key in slot 0x5
5,605,255 UART: [art] Derive Key Pair - Done
5,620,233 UART: [art] Signing Cert with AUTHO
5,620,713 UART: RITY.KEYID = 7
5,636,261 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,026 UART: [art] PUB.X = DE2202EEDFADE37D2184BDEB3A23FE9505F701C1BF6F32E71F99151AB5C3525842987EB0FD7C5D4499166A6ADFB6E09F
5,643,805 UART: [art] PUB.Y = 8E9BE5786FD1BD4B7D88EF3991A764FED56F047FD8D99B64C5E421A379141FBFAE01C490119B556A22DBEA345B3FA584
5,650,763 UART: [art] SIG.R = 6A5E872C40AD52600D1DE8F20BB19D209C85DB67E3146B41C6D622B728CEF44B9EAE2F657029769EA74949D406E99EA6
5,657,530 UART: [art] SIG.S = E8F1B19AD629DE24358BA2FA68454A4CACFEE091AE9099FBCAD878644201DAD465836BBDF5AE9E117C0C5325298F5B28
5,680,853 UART: Caliptra RT
5,681,198 UART: [state] CFI Enabled
5,789,339 UART: [rt] RT listening for mailbox commands...
5,790,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,027 UART: [rt]cmd =0x41544d4e, len=14344
6,555,154 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
893,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,713 UART: [kat] ++
897,865 UART: [kat] sha1
902,129 UART: [kat] SHA2-256
904,069 UART: [kat] SHA2-384
906,804 UART: [kat] SHA2-512-ACC
908,705 UART: [kat] ECC-384
918,274 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,172,157 UART: [cold-reset] ++
1,172,519 UART: [fht] FHT @ 0x50003400
1,175,182 UART: [idev] ++
1,175,350 UART: [idev] CDI.KEYID = 6
1,175,710 UART: [idev] SUBJECT.KEYID = 7
1,176,134 UART: [idev] UDS.KEYID = 0
1,176,479 ready_for_fw is high
1,176,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,078 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,131 UART: [ldev] ++
1,210,299 UART: [ldev] CDI.KEYID = 6
1,210,662 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,216,645 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,204 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,738 UART: [fwproc] Recv'd Img size: 114084 bytes
3,117,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,310,651 >>> mbox cmd response: success
3,311,747 UART: [afmc] ++
3,311,915 UART: [afmc] CDI.KEYID = 6
3,312,277 UART: [afmc] SUBJECT.KEYID = 7
3,312,702 UART: [afmc] AUTHORITY.KEYID = 5
3,349,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,213 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,922 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,814 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,525 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,438 UART: [afmc] --
3,392,430 UART: [cold-reset] --
3,393,222 UART: [state] Locking Datavault
3,394,685 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,289 UART: [state] Locking ICCM
3,395,851 UART: [exit] Launching FMC @ 0x40000130
3,401,180 UART:
3,401,196 UART: Running Caliptra FMC ...
3,401,604 UART:
3,401,658 UART: [state] CFI Enabled
3,412,546 UART: [fht] FMC Alias Private Key: 7
3,520,210 UART: [art] Extend RT PCRs Done
3,520,638 UART: [art] Lock RT PCRs Done
3,522,198 UART: [art] Populate DV Done
3,530,390 UART: [fht] FMC Alias Private Key: 7
3,531,402 UART: [art] Derive CDI
3,531,682 UART: [art] Store in in slot 0x4
3,617,329 UART: [art] Derive Key Pair
3,617,689 UART: [art] Store priv key in slot 0x5
3,631,107 UART: [art] Derive Key Pair - Done
3,645,757 UART: [art] Signing Cert with AUTHO
3,646,237 UART: RITY.KEYID = 7
3,661,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,230 UART: [art] PUB.X = 42AE057DBCA6329394EC03B114F30E5843F0A6051161EF7372B5C05E8FB9988E14E0E075CED2FED4062D72A4E926D020
3,668,989 UART: [art] PUB.Y = 4D2587772DE2A0C7761EC61D94D7F8F6884FBFB8A1DEA262880A23219A4B9411C5F75DDA39EDAE0B058831862A65BE08
3,675,935 UART: [art] SIG.R = FD0E3EBCF7E8DFC01896D4B1D0D96BC7CE2F4ED49865638D22478749745C35D3AAE3BFD50FECCAE30550F7506264FEE3
3,682,716 UART: [art] SIG.S = 02BB59D4939AB56AB7E07438366DEE5B7D0C7E48A4CC238F7C8374F921428DC4D4DBDBF8973B5C113F17D158FE15251B
3,706,603 UART: Caliptra RT
3,706,856 UART: [state] CFI Enabled
3,814,138 UART: [rt] RT listening for mailbox commands...
3,814,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,246 UART: [rt]cmd =0x41544d4e, len=14344
4,580,085 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,687 ready_for_fw is high
1,060,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,161,754 >>> mbox cmd response: success
3,224,097 UART:
3,224,113 UART: Running Caliptra FMC ...
3,224,521 UART:
3,224,575 UART: [state] CFI Enabled
3,234,951 UART: [fht] FMC Alias Private Key: 7
3,343,081 UART: [art] Extend RT PCRs Done
3,343,509 UART: [art] Lock RT PCRs Done
3,344,881 UART: [art] Populate DV Done
3,353,063 UART: [fht] FMC Alias Private Key: 7
3,354,063 UART: [art] Derive CDI
3,354,343 UART: [art] Store in in slot 0x4
3,439,660 UART: [art] Derive Key Pair
3,440,020 UART: [art] Store priv key in slot 0x5
3,452,922 UART: [art] Derive Key Pair - Done
3,467,843 UART: [art] Signing Cert with AUTHO
3,468,323 UART: RITY.KEYID = 7
3,483,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,108 UART: [art] PUB.X = 20C24D55D20E908B2D79EE5AEBA046CEF03966023CBB4474E46968B07247CE4343FF4690200DB0A3A60C626EFDBC15BD
3,490,876 UART: [art] PUB.Y = AA60DBAF7A48795ED0D5ADB8C435A07D6629748051FE26A8921FBF3B4520440F0B0A749EB82F6B2BED3EB0CD455B216F
3,497,833 UART: [art] SIG.R = F4E38CF122148477312582325C2FE1E2B97367579FEE97FFE60706C0DD787F6A0E787CDA6A59E99EEB669D65F1F0C47E
3,504,600 UART: [art] SIG.S = 6BCA425DEF7622A1C3C988DAB25F4184BEBE944A00956713B9EC1BC17854AD1132E35A1655DD0911852328548A471680
3,528,210 UART: Caliptra RT
3,528,463 UART: [state] CFI Enabled
3,635,861 UART: [rt] RT listening for mailbox commands...
3,636,531 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,393 UART: [rt]cmd =0x41544d4e, len=14344
4,396,548 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
893,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,688 UART: [kat] ++
897,840 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,173 UART: [kat] LMS
1,171,501 UART: [kat] --
1,172,230 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,589 UART: [idev] Erasing UDS.KEYID = 0
1,201,698 UART: [idev] Sha1 KeyId Algorithm
1,210,070 UART: [idev] --
1,210,988 UART: [ldev] ++
1,211,156 UART: [ldev] CDI.KEYID = 6
1,211,519 UART: [ldev] SUBJECT.KEYID = 5
1,211,945 UART: [ldev] AUTHORITY.KEYID = 7
1,212,408 UART: [ldev] FE.KEYID = 1
1,217,762 UART: [ldev] Erasing FE.KEYID = 1
1,243,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,742 UART: [ldev] --
1,283,185 UART: [fwproc] Wait for Commands...
1,283,903 UART: [fwproc] Recv command 0x46574c44
1,284,631 UART: [fwproc] Recv'd Img size: 114084 bytes
3,133,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,325,520 >>> mbox cmd response: success
3,326,664 UART: [afmc] ++
3,326,832 UART: [afmc] CDI.KEYID = 6
3,327,194 UART: [afmc] SUBJECT.KEYID = 7
3,327,619 UART: [afmc] AUTHORITY.KEYID = 5
3,363,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,156 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,865 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,757 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,468 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,283 UART: [afmc] --
3,406,215 UART: [cold-reset] --
3,407,021 UART: [state] Locking Datavault
3,408,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,930 UART: [state] Locking ICCM
3,409,368 UART: [exit] Launching FMC @ 0x40000130
3,414,697 UART:
3,414,713 UART: Running Caliptra FMC ...
3,415,121 UART:
3,415,264 UART: [state] CFI Enabled
3,426,138 UART: [fht] FMC Alias Private Key: 7
3,534,838 UART: [art] Extend RT PCRs Done
3,535,266 UART: [art] Lock RT PCRs Done
3,536,834 UART: [art] Populate DV Done
3,545,286 UART: [fht] FMC Alias Private Key: 7
3,546,306 UART: [art] Derive CDI
3,546,586 UART: [art] Store in in slot 0x4
3,632,665 UART: [art] Derive Key Pair
3,633,025 UART: [art] Store priv key in slot 0x5
3,646,025 UART: [art] Derive Key Pair - Done
3,660,700 UART: [art] Signing Cert with AUTHO
3,661,180 UART: RITY.KEYID = 7
3,676,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,677,265 UART: [art] PUB.X = 29A266D763E9B937A792DC45A0B8CB1D664BFB141CECA521E5F1906D0E58E84C5CFDCEB4112AA678B1B7C7D1CCE51190
3,684,050 UART: [art] PUB.Y = A11286FFC447FB5767DDDEEB139410DC419AA7F91595DF9F9652C95FF30693A97FD0E6EE62E87E00B632797D4D7DC717
3,690,985 UART: [art] SIG.R = A6B9D4F55F7D19D05D081A52A96D004841BEC9F160C7D017FF8C60D00F2E1E21F15D05EE00569EC489AFD9B5E2228CE4
3,697,714 UART: [art] SIG.S = 3B80795DEAE03802D1140217F62AE965A58509277856A272FC1E363FE837043AE4818261DDAF700E0295D671C61DCFFA
3,721,667 UART: Caliptra RT
3,722,012 UART: [state] CFI Enabled
3,830,214 UART: [rt] RT listening for mailbox commands...
3,830,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,928 UART: [rt]cmd =0x41544d4e, len=14344
4,600,567 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 ready_for_fw is high
1,060,398 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,125 >>> mbox cmd response: success
3,226,432 UART:
3,226,448 UART: Running Caliptra FMC ...
3,226,856 UART:
3,226,999 UART: [state] CFI Enabled
3,237,647 UART: [fht] FMC Alias Private Key: 7
3,346,017 UART: [art] Extend RT PCRs Done
3,346,445 UART: [art] Lock RT PCRs Done
3,348,163 UART: [art] Populate DV Done
3,356,307 UART: [fht] FMC Alias Private Key: 7
3,357,353 UART: [art] Derive CDI
3,357,633 UART: [art] Store in in slot 0x4
3,443,460 UART: [art] Derive Key Pair
3,443,820 UART: [art] Store priv key in slot 0x5
3,457,232 UART: [art] Derive Key Pair - Done
3,471,968 UART: [art] Signing Cert with AUTHO
3,472,448 UART: RITY.KEYID = 7
3,487,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,587 UART: [art] PUB.X = 9B85F1C2A1B2FE42CA9708EF346BE319B833DE9F50094980701A5D221B69B2AEBE875AF9AB56019F606C5098F1D8DD2D
3,495,358 UART: [art] PUB.Y = 91A055BFA9F4320766513DD283A416379FEFEAD398DA3C693DC9A09F82D8CE35183A7BFF3164D8E321F4FCFC40EAF2AA
3,502,323 UART: [art] SIG.R = 8EC4086088BC592EED88F5F70C169F104B64E8F4721496094DB4FD9721A72289D5CC16A1DA25C45C883226E8FB767A69
3,509,084 UART: [art] SIG.S = 9BEC47D8989B854C8DEAB10623B07F8F916EC2D2B86AE2D6B44FBF8AAFF3AB9C94F19886B333B36E082A686AC0818D77
3,533,033 UART: Caliptra RT
3,533,378 UART: [state] CFI Enabled
3,641,421 UART: [rt] RT listening for mailbox commands...
3,642,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,111 UART: [rt]cmd =0x41544d4e, len=14344
4,410,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
903,996 UART: [kat] SHA2-512-ACC
905,897 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,174,219 ready_for_fw is high
1,174,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,997 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,200 UART: [ldev] ++
1,209,368 UART: [ldev] CDI.KEYID = 6
1,209,732 UART: [ldev] SUBJECT.KEYID = 5
1,210,159 UART: [ldev] AUTHORITY.KEYID = 7
1,210,622 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,200 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 114084 bytes
3,128,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,321,229 >>> mbox cmd response: success
3,322,260 UART: [afmc] ++
3,322,428 UART: [afmc] CDI.KEYID = 6
3,322,791 UART: [afmc] SUBJECT.KEYID = 7
3,323,217 UART: [afmc] AUTHORITY.KEYID = 5
3,358,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,460 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,170 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,060 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,771 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,547 UART: [afmc] --
3,401,489 UART: [cold-reset] --
3,402,287 UART: [state] Locking Datavault
3,403,368 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,972 UART: [state] Locking ICCM
3,404,614 UART: [exit] Launching FMC @ 0x40000130
3,409,943 UART:
3,409,959 UART: Running Caliptra FMC ...
3,410,367 UART:
3,410,421 UART: [state] CFI Enabled
3,421,261 UART: [fht] FMC Alias Private Key: 7
3,529,007 UART: [art] Extend RT PCRs Done
3,529,435 UART: [art] Lock RT PCRs Done
3,530,725 UART: [art] Populate DV Done
3,539,151 UART: [fht] FMC Alias Private Key: 7
3,540,261 UART: [art] Derive CDI
3,540,541 UART: [art] Store in in slot 0x4
3,626,300 UART: [art] Derive Key Pair
3,626,660 UART: [art] Store priv key in slot 0x5
3,639,616 UART: [art] Derive Key Pair - Done
3,654,602 UART: [art] Signing Cert with AUTHO
3,655,082 UART: RITY.KEYID = 7
3,669,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,755 UART: [art] PUB.X = 6DC7DE9A3C848543F9D3CB458D80F2BFBEBAD7EAC0E9F589B2F61A7D3C6894F48E5B1C27612B4FECCBFD6FB6DD3310FC
3,677,557 UART: [art] PUB.Y = 585AAB1AF01E0700210266AA35E1DA55E986A7715FCB36B02951202887EAACBE96581367A6634F2AE6F766B8F8F3D09C
3,684,483 UART: [art] SIG.R = 08DF22D700DC3DB3BDC6059C0C0555492F17AEBBA57A54408D3B034D633B383FB4BDFAC88F600B5A14A815557D8DD49E
3,691,227 UART: [art] SIG.S = 99D8BD4722D4761144F7782CD2BC96785E20CAAE5E44CDDCA2344260F4D1CE5F59AFDED7AFF2F3EBD1C3AA66CCE2A4B3
3,715,502 UART: Caliptra RT
3,715,755 UART: [state] CFI Enabled
3,823,635 UART: [rt] RT listening for mailbox commands...
3,824,305 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,515 UART: [rt]cmd =0x41544d4e, len=14344
4,581,727 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,442 ready_for_fw is high
1,055,442 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,163,906 >>> mbox cmd response: success
3,226,395 UART:
3,226,411 UART: Running Caliptra FMC ...
3,226,819 UART:
3,226,873 UART: [state] CFI Enabled
3,237,395 UART: [fht] FMC Alias Private Key: 7
3,345,359 UART: [art] Extend RT PCRs Done
3,345,787 UART: [art] Lock RT PCRs Done
3,347,367 UART: [art] Populate DV Done
3,355,427 UART: [fht] FMC Alias Private Key: 7
3,356,393 UART: [art] Derive CDI
3,356,673 UART: [art] Store in in slot 0x4
3,442,492 UART: [art] Derive Key Pair
3,442,852 UART: [art] Store priv key in slot 0x5
3,455,702 UART: [art] Derive Key Pair - Done
3,470,450 UART: [art] Signing Cert with AUTHO
3,470,930 UART: RITY.KEYID = 7
3,485,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,301 UART: [art] PUB.X = 62DD4636046DBA4970C4C032E7CDFD1BE0A1FC622EF1E355A8E99399A52110AD60AA968E34891B0FF41E82B3CAF60FFA
3,493,078 UART: [art] PUB.Y = 7DA2759DF121FD6BE3804FE1D6471BDB943B8028816EF8264B122AD198ED8B692334E0055F4CF09910AA84DD0A136E9C
3,500,028 UART: [art] SIG.R = 8011528D0E4A6941A05CFB103062EB3DFD9D21597280237D6CBAAEC31970C6DDB2A8749899C640BE33734ACD879B0072
3,506,775 UART: [art] SIG.S = 7FDDA47C7089F9CC3E8D806AC361A813340C063FD791698A39F832470A4F8B98F13BE3E30D8C5C3F91435558EE4F3FD3
3,530,710 UART: Caliptra RT
3,530,963 UART: [state] CFI Enabled
3,639,537 UART: [rt] RT listening for mailbox commands...
3,640,207 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,431 UART: [rt]cmd =0x41544d4e, len=14344
4,407,761 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,974 UART: [kat] ++
896,126 UART: [kat] sha1
900,592 UART: [kat] SHA2-256
902,532 UART: [kat] SHA2-384
905,209 UART: [kat] SHA2-512-ACC
907,110 UART: [kat] ECC-384
917,075 UART: [kat] HMAC-384Kdf
921,703 UART: [kat] LMS
1,170,015 UART: [kat] --
1,170,950 UART: [cold-reset] ++
1,171,494 UART: [fht] FHT @ 0x50003400
1,174,210 UART: [idev] ++
1,174,378 UART: [idev] CDI.KEYID = 6
1,174,739 UART: [idev] SUBJECT.KEYID = 7
1,175,164 UART: [idev] UDS.KEYID = 0
1,175,510 ready_for_fw is high
1,175,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,246 UART: [idev] Erasing UDS.KEYID = 0
1,200,622 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,767 UART: [ldev] ++
1,210,935 UART: [ldev] CDI.KEYID = 6
1,211,299 UART: [ldev] SUBJECT.KEYID = 5
1,211,726 UART: [ldev] AUTHORITY.KEYID = 7
1,212,189 UART: [ldev] FE.KEYID = 1
1,217,419 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,851 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,247 UART: [fwproc] Recv'd Img size: 114084 bytes
3,120,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,747 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,056 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,313,586 >>> mbox cmd response: success
3,314,799 UART: [afmc] ++
3,314,967 UART: [afmc] CDI.KEYID = 6
3,315,330 UART: [afmc] SUBJECT.KEYID = 7
3,315,756 UART: [afmc] AUTHORITY.KEYID = 5
3,351,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,077 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,787 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,677 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,388 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,278 UART: [afmc] --
3,395,230 UART: [cold-reset] --
3,396,184 UART: [state] Locking Datavault
3,397,323 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,927 UART: [state] Locking ICCM
3,398,545 UART: [exit] Launching FMC @ 0x40000130
3,403,874 UART:
3,403,890 UART: Running Caliptra FMC ...
3,404,298 UART:
3,404,441 UART: [state] CFI Enabled
3,415,067 UART: [fht] FMC Alias Private Key: 7
3,522,825 UART: [art] Extend RT PCRs Done
3,523,253 UART: [art] Lock RT PCRs Done
3,525,117 UART: [art] Populate DV Done
3,533,503 UART: [fht] FMC Alias Private Key: 7
3,534,525 UART: [art] Derive CDI
3,534,805 UART: [art] Store in in slot 0x4
3,620,542 UART: [art] Derive Key Pair
3,620,902 UART: [art] Store priv key in slot 0x5
3,633,946 UART: [art] Derive Key Pair - Done
3,648,913 UART: [art] Signing Cert with AUTHO
3,649,393 UART: RITY.KEYID = 7
3,664,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,266 UART: [art] PUB.X = A223915B1CEA7403B9498C4B254A0AC556814E8AF99A93753584C4E674F6F3AC15813E4E1284B012A8081A2AC092378D
3,672,023 UART: [art] PUB.Y = 3C7868472DC7AC79DE87C2C41E58C69E60B6826AC89A6AC2763708EF46D22CD3F25961D2C7AE54FE67DDA5F73FEA05FA
3,678,983 UART: [art] SIG.R = 6D5AD30CF32D160331D453DF267B98CE1FEE3CE1300EB2A4F78C62644F184C9857B55534FE9C4F1591B4C44D21CAEE3C
3,685,756 UART: [art] SIG.S = 3DDE883C7F57B2C9BF9747B7751EB4C78C68FFF974B52D225A9EE35724B2A97607A4DB017E231C898406A8B0542CAE08
3,709,341 UART: Caliptra RT
3,709,686 UART: [state] CFI Enabled
3,817,557 UART: [rt] RT listening for mailbox commands...
3,818,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,331 UART: [rt]cmd =0x41544d4e, len=14344
4,585,783 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,285 ready_for_fw is high
1,056,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,171,107 >>> mbox cmd response: success
3,232,490 UART:
3,232,506 UART: Running Caliptra FMC ...
3,232,914 UART:
3,233,057 UART: [state] CFI Enabled
3,243,531 UART: [fht] FMC Alias Private Key: 7
3,352,529 UART: [art] Extend RT PCRs Done
3,352,957 UART: [art] Lock RT PCRs Done
3,354,641 UART: [art] Populate DV Done
3,362,973 UART: [fht] FMC Alias Private Key: 7
3,364,139 UART: [art] Derive CDI
3,364,419 UART: [art] Store in in slot 0x4
3,450,072 UART: [art] Derive Key Pair
3,450,432 UART: [art] Store priv key in slot 0x5
3,463,474 UART: [art] Derive Key Pair - Done
3,478,252 UART: [art] Signing Cert with AUTHO
3,478,732 UART: RITY.KEYID = 7
3,493,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,509 UART: [art] PUB.X = EEF7659428956070A9D73AA2A40FE631F3F73A9A681DA9E32341D54109C9340061E76AFE501E509EC87FCBF33BC63280
3,501,253 UART: [art] PUB.Y = 08C6080B96ED50B3B9F07EE98B571AE4737BC6C54B3FD25CC623F841F92E4B5D205058EDC58DB61C58602E7ADD344E97
3,508,204 UART: [art] SIG.R = 1DD3965B2265E7F982F8DF98E6DE25868D44B8707E3FDC882BC59AF3A13510A3DE28D97EB1A442E51CE85151F6E536E2
3,514,982 UART: [art] SIG.S = 1C45B54ED75715679DA20B42A021C6D3CC1CE8964A6AC0AF1489E144AC2FCA0872B26CF01845871E60D1E03B3F1C144A
3,538,915 UART: Caliptra RT
3,539,260 UART: [state] CFI Enabled
3,645,839 UART: [rt] RT listening for mailbox commands...
3,646,509 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,435 UART: [rt]cmd =0x41544d4e, len=14344
4,416,692 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,076 UART:
192,468 UART: Running Caliptra ROM ...
193,569 UART:
193,712 UART: [state] CFI Enabled
266,447 UART: [state] LifecycleState = Unprovisioned
268,372 UART: [state] DebugLocked = No
270,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,601 UART: [kat] SHA2-256
446,294 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,812 UART: [kat] ++
457,281 UART: [kat] sha1
467,941 UART: [kat] SHA2-256
470,669 UART: [kat] SHA2-384
476,519 UART: [kat] SHA2-512-ACC
478,887 UART: [kat] ECC-384
2,767,327 UART: [kat] HMAC-384Kdf
2,780,362 UART: [kat] LMS
3,970,718 UART: [kat] --
3,977,064 UART: [cold-reset] ++
3,978,998 UART: [fht] Storing FHT @ 0x50003400
3,989,512 UART: [idev] ++
3,990,087 UART: [idev] CDI.KEYID = 6
3,990,972 UART: [idev] SUBJECT.KEYID = 7
3,992,215 UART: [idev] UDS.KEYID = 0
3,993,204 ready_for_fw is high
3,993,411 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,578 UART: [idev] Erasing UDS.KEYID = 0
7,325,857 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,389 UART: [idev] --
7,353,487 UART: [ldev] ++
7,354,057 UART: [ldev] CDI.KEYID = 6
7,355,177 UART: [ldev] SUBJECT.KEYID = 5
7,356,283 UART: [ldev] AUTHORITY.KEYID = 7
7,357,510 UART: [ldev] FE.KEYID = 1
7,403,949 UART: [ldev] Erasing FE.KEYID = 1
10,736,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,342 UART: [ldev] --
13,098,720 UART: [fwproc] Waiting for Commands...
13,101,680 UART: [fwproc] Received command 0x46574c44
13,103,858 UART: [fwproc] Received Image of size 113760 bytes
17,158,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,014 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,621,481 >>> mbox cmd response: success
17,625,907 UART: [afmc] ++
17,626,507 UART: [afmc] CDI.KEYID = 6
17,627,450 UART: [afmc] SUBJECT.KEYID = 7
17,628,664 UART: [afmc] AUTHORITY.KEYID = 5
20,988,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,131 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,502 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,381 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,780 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,973 UART: [afmc] --
23,358,568 UART: [cold-reset] --
23,363,290 UART: [state] Locking Datavault
23,368,599 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,395 UART: [state] Locking ICCM
23,371,904 UART: [exit] Launching FMC @ 0x40000130
23,380,301 UART:
23,380,537 UART: Running Caliptra FMC ...
23,381,637 UART:
23,381,798 UART: [state] CFI Enabled
23,448,624 UART: [fht] FMC Alias Private Key: 7
25,787,033 UART: [art] Extend RT PCRs Done
25,788,248 UART: [art] Lock RT PCRs Done
25,789,927 UART: [art] Populate DV Done
25,795,283 UART: [fht] FMC Alias Private Key: 7
25,796,873 UART: [art] Derive CDI
25,797,682 UART: [art] Store in in slot 0x4
25,857,589 UART: [art] Derive Key Pair
25,858,622 UART: [art] Store priv key in slot 0x5
29,151,844 UART: [art] Derive Key Pair - Done
29,165,169 UART: [art] Signing Cert with AUTHO
29,166,467 UART: RITY.KEYID = 7
31,453,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,976 UART: [art] PUB.X = B680D26CCE48EC44E5B4939D40BC7BBE2D2144039B88524615D36D7A5C3C93B2531D2DA30AE72D89668B5E74ED4CB400
31,462,234 UART: [art] PUB.Y = 8A599054FFB134BA343A13D5EB73919ECD2B766F2120A2F28043BFAE7CD4FE30AC90382D83E7A766D29778E26FE5ED4F
31,469,512 UART: [art] SIG.R = 51FADF02B9B4F97557EE7C6410FB52F18C5784ED61AB2F0B2EA2035B69E1ED765CA6DF440D5B2569DFEE63D11269F90B
31,476,919 UART: [art] SIG.S = C84AB5E901C8778F8E7970407A4824896506427F42DEF1CE0F9F0AD9CA4513FD0B63CA39DB7B7B1B313E45635E4AB0E3
32,782,058 UART: Caliptra RT
32,782,754 UART: [state] CFI Enabled
32,942,183 UART: [rt] RT listening for mailbox commands...
32,944,517 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,099,896 UART: [rt]cmd =0x41544d4e, len=14344
38,400,478 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,805,506 ready_for_fw is high
3,806,049 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,858,355 >>> mbox cmd response: success
23,565,570 UART:
23,565,965 UART: Running Caliptra FMC ...
23,567,115 UART:
23,567,276 UART: [state] CFI Enabled
23,635,646 UART: [fht] FMC Alias Private Key: 7
25,973,852 UART: [art] Extend RT PCRs Done
25,975,123 UART: [art] Lock RT PCRs Done
25,976,895 UART: [art] Populate DV Done
25,982,530 UART: [fht] FMC Alias Private Key: 7
25,984,023 UART: [art] Derive CDI
25,984,794 UART: [art] Store in in slot 0x4
26,044,317 UART: [art] Derive Key Pair
26,045,347 UART: [art] Store priv key in slot 0x5
29,338,104 UART: [art] Derive Key Pair - Done
29,351,047 UART: [art] Signing Cert with AUTHO
29,352,384 UART: RITY.KEYID = 7
31,639,924 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,431 UART: [art] PUB.X = C2712F389B2A40D9A926B942637023D40B8284C371692F15A6D873B6E5714894491041559D4AD7723552934F5F20F4BF
31,648,641 UART: [art] PUB.Y = 2B9C84CDEB6554954A59336D4E447BBE00B3F14620F11597038F928DA9BC3CBB97F77AC24B83DA4A97A2C256C00709C7
31,655,922 UART: [art] SIG.R = 45B2A4A301F3669A018C7BE12DC0DCB8854F98314B1DCEEFC36814423C4C1689DA753E922DBA8E3B9B33789906F85644
31,663,286 UART: [art] SIG.S = C9BB27D55B887CCE9E15DD7165A5687D6A0A0980F46C0BF1DAAD4C25CE53663F3237527DC3C182E5C8EB1F7546521C25
32,968,699 UART: Caliptra RT
32,969,407 UART: [state] CFI Enabled
33,150,159 UART: [rt] RT listening for mailbox commands...
33,152,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,307,926 UART: [rt]cmd =0x41544d4e, len=14344
38,608,143 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
192,903 UART:
193,267 UART: Running Caliptra ROM ...
194,423 UART:
604,052 UART: [state] CFI Enabled
616,587 UART: [state] LifecycleState = Unprovisioned
618,462 UART: [state] DebugLocked = No
620,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,054 UART: [kat] SHA2-256
795,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,303 UART: [kat] ++
806,821 UART: [kat] sha1
817,047 UART: [kat] SHA2-256
819,765 UART: [kat] SHA2-384
825,388 UART: [kat] SHA2-512-ACC
827,774 UART: [kat] ECC-384
3,110,553 UART: [kat] HMAC-384Kdf
3,122,220 UART: [kat] LMS
4,312,274 UART: [kat] --
4,317,144 UART: [cold-reset] ++
4,319,217 UART: [fht] Storing FHT @ 0x50003400
4,329,412 UART: [idev] ++
4,330,043 UART: [idev] CDI.KEYID = 6
4,330,948 UART: [idev] SUBJECT.KEYID = 7
4,332,188 UART: [idev] UDS.KEYID = 0
4,333,241 ready_for_fw is high
4,333,440 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,313 UART: [idev] Erasing UDS.KEYID = 0
7,618,003 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,546 UART: [idev] --
7,643,364 UART: [ldev] ++
7,643,941 UART: [ldev] CDI.KEYID = 6
7,644,897 UART: [ldev] SUBJECT.KEYID = 5
7,646,106 UART: [ldev] AUTHORITY.KEYID = 7
7,647,383 UART: [ldev] FE.KEYID = 1
7,658,536 UART: [ldev] Erasing FE.KEYID = 1
10,950,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,218 UART: [ldev] --
13,310,268 UART: [fwproc] Waiting for Commands...
13,313,530 UART: [fwproc] Received command 0x46574c44
13,315,718 UART: [fwproc] Received Image of size 113760 bytes
17,371,014 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,828,155 >>> mbox cmd response: success
17,832,212 UART: [afmc] ++
17,832,804 UART: [afmc] CDI.KEYID = 6
17,833,740 UART: [afmc] SUBJECT.KEYID = 7
17,835,010 UART: [afmc] AUTHORITY.KEYID = 5
21,149,988 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,318 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,574 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,951 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,828 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,256 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,636 UART: [afmc] --
23,513,175 UART: [cold-reset] --
23,517,574 UART: [state] Locking Datavault
23,520,871 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,570 UART: [state] Locking ICCM
23,524,408 UART: [exit] Launching FMC @ 0x40000130
23,532,752 UART:
23,532,986 UART: Running Caliptra FMC ...
23,534,094 UART:
23,534,253 UART: [state] CFI Enabled
23,542,432 UART: [fht] FMC Alias Private Key: 7
25,873,409 UART: [art] Extend RT PCRs Done
25,874,632 UART: [art] Lock RT PCRs Done
25,876,146 UART: [art] Populate DV Done
25,881,659 UART: [fht] FMC Alias Private Key: 7
25,883,302 UART: [art] Derive CDI
25,884,118 UART: [art] Store in in slot 0x4
25,926,382 UART: [art] Derive Key Pair
25,927,378 UART: [art] Store priv key in slot 0x5
29,169,413 UART: [art] Derive Key Pair - Done
29,182,842 UART: [art] Signing Cert with AUTHO
29,184,170 UART: RITY.KEYID = 7
31,463,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,925 UART: [art] PUB.X = 648F36E392F2E9D51DD6010E669B9D0E76089076ABF6917A57A4832922DCE7DEC9457B56516F9147C3448C77EC9D5C3E
31,472,157 UART: [art] PUB.Y = 291EE135C4B9B9002213018B7196B11D2A7C9CE82E7F996F2C01F91B42FFAF62E81236E3B5E84F02B7CA33F2C6DE999B
31,479,372 UART: [art] SIG.R = 651775F403923CA5EC093514F10AAC5A35D8D78DB728F8B973A063AFF72FD77E4772DA96FBBFC3E57410E542318D3050
31,486,792 UART: [art] SIG.S = 9864705DC056CF02F537E073842A5338B3B8FE01FADA09EAE400839BEAC6F720B4D19A8EFC4F5636101676B75A4293A4
32,792,123 UART: Caliptra RT
32,792,842 UART: [state] CFI Enabled
32,910,520 UART: [rt] RT listening for mailbox commands...
32,912,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,068,017 UART: [rt]cmd =0x41544d4e, len=14344
38,368,581 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
4,119,120 ready_for_fw is high
4,119,603 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,048,352 >>> mbox cmd response: success
23,690,251 UART:
23,690,982 UART: Running Caliptra FMC ...
23,692,097 UART:
23,692,255 UART: [state] CFI Enabled
23,699,837 UART: [fht] FMC Alias Private Key: 7
26,030,895 UART: [art] Extend RT PCRs Done
26,032,467 UART: [art] Lock RT PCRs Done
26,034,090 UART: [art] Populate DV Done
26,039,272 UART: [fht] FMC Alias Private Key: 7
26,040,833 UART: [art] Derive CDI
26,041,573 UART: [art] Store in in slot 0x4
26,084,294 UART: [art] Derive Key Pair
26,085,344 UART: [art] Store priv key in slot 0x5
29,327,637 UART: [art] Derive Key Pair - Done
29,340,646 UART: [art] Signing Cert with AUTHO
29,341,952 UART: RITY.KEYID = 7
31,621,225 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,731 UART: [art] PUB.X = 502B865BA6257F81D6EAC567B79CCCC13A9760F5DB121A2B835D7DAD81853FCC00C718EF1024C019E888ADB6FE84CF9F
31,629,964 UART: [art] PUB.Y = 0A0722FFBFD1AE097BBD9D146610EAFCDDA6CEAA516C4D1EC37929C34D46DA17CE924645F97FBE43FE86E2600B9918A5
31,637,228 UART: [art] SIG.R = 4156EE24352CC3ABD828F17FA5DA044E94983E3D889B6B55DD25A3B7213FA30EEC05BC8D6F95F6976F8F3FE1D1271A09
31,644,624 UART: [art] SIG.S = 35405117343CE7CA77F74A84358D47F9C13D2251986FD3A0D20E8798302666A03674B0A74A906F988EAAF66A1BCEF2D9
32,949,445 UART: Caliptra RT
32,950,163 UART: [state] CFI Enabled
33,068,449 UART: [rt] RT listening for mailbox commands...
33,070,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,225,947 UART: [rt]cmd =0x41544d4e, len=14344
38,526,415 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,600 UART:
192,981 UART: Running Caliptra ROM ...
194,134 UART:
194,280 UART: [state] CFI Enabled
267,568 UART: [state] LifecycleState = Unprovisioned
269,491 UART: [state] DebugLocked = No
270,809 UART: [state] WD Timer not started. Device not locked for debugging
274,933 UART: [kat] SHA2-256
454,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,601 UART: [kat] ++
466,128 UART: [kat] sha1
477,432 UART: [kat] SHA2-256
480,437 UART: [kat] SHA2-384
486,987 UART: [kat] SHA2-512-ACC
489,988 UART: [kat] ECC-384
2,947,605 UART: [kat] HMAC-384Kdf
2,972,245 UART: [kat] LMS
3,501,694 UART: [kat] --
3,506,708 UART: [cold-reset] ++
3,507,932 UART: [fht] FHT @ 0x50003400
3,519,113 UART: [idev] ++
3,519,674 UART: [idev] CDI.KEYID = 6
3,520,594 UART: [idev] SUBJECT.KEYID = 7
3,521,763 UART: [idev] UDS.KEYID = 0
3,522,696 ready_for_fw is high
3,522,912 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,475 UART: [idev] Erasing UDS.KEYID = 0
6,027,666 UART: [idev] Sha1 KeyId Algorithm
6,051,602 UART: [idev] --
6,054,781 UART: [ldev] ++
6,055,351 UART: [ldev] CDI.KEYID = 6
6,056,268 UART: [ldev] SUBJECT.KEYID = 5
6,057,424 UART: [ldev] AUTHORITY.KEYID = 7
6,058,654 UART: [ldev] FE.KEYID = 1
6,100,036 UART: [ldev] Erasing FE.KEYID = 1
8,604,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,189 UART: [ldev] --
10,413,011 UART: [fwproc] Wait for Commands...
10,416,068 UART: [fwproc] Recv command 0x46574c44
10,418,175 UART: [fwproc] Recv'd Img size: 114084 bytes
13,824,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,280,250 >>> mbox cmd response: success
14,285,334 UART: [afmc] ++
14,285,927 UART: [afmc] CDI.KEYID = 6
14,286,837 UART: [afmc] SUBJECT.KEYID = 7
14,287,989 UART: [afmc] AUTHORITY.KEYID = 5
16,827,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,788 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,564 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,862 UART: [afmc] --
18,630,453 UART: [cold-reset] --
18,634,531 UART: [state] Locking Datavault
18,639,016 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,660 UART: [state] Locking ICCM
18,642,810 UART: [exit] Launching FMC @ 0x40000130
18,651,209 UART:
18,651,447 UART: Running Caliptra FMC ...
18,652,548 UART:
18,652,706 UART: [state] CFI Enabled
18,710,163 UART: [fht] FMC Alias Private Key: 7
20,474,032 UART: [art] Extend RT PCRs Done
20,475,249 UART: [art] Lock RT PCRs Done
20,476,793 UART: [art] Populate DV Done
20,482,362 UART: [fht] FMC Alias Private Key: 7
20,483,962 UART: [art] Derive CDI
20,484,697 UART: [art] Store in in slot 0x4
20,542,919 UART: [art] Derive Key Pair
20,543,955 UART: [art] Store priv key in slot 0x5
23,006,372 UART: [art] Derive Key Pair - Done
23,019,865 UART: [art] Signing Cert with AUTHO
23,021,174 UART: RITY.KEYID = 7
24,732,992 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,647 UART: [art] PUB.X = 3ECC1373F130F8610D54D3491C66D0C003D6BA295135F20D9C2CBBED62B1C56BC0A193984562C82C1F6E429112D2F228
24,741,785 UART: [art] PUB.Y = 67C3C9FEF77E00BB34266D5A17B68307E1E2A0BC818E3975B7CDBB0D7F0F12B20F9DF164B5E5BDD109A19BA8EF6DB127
24,749,031 UART: [art] SIG.R = 257FD62BE2912E479FB3C4023722110500A7250BBA8C6168C92185B4DB9C7A9AA7DF5648C84563C2F8DD58A9B6A6C2D7
24,756,401 UART: [art] SIG.S = 953D3B987A51C92D14AF13E340EB4C0AAB860FD06A0EBB8BE8F8195CF63D6927729DABF9DB7C612D50F83A4F93BE6542
25,735,465 UART: Caliptra RT
25,736,158 UART: [state] CFI Enabled
25,900,094 UART: [rt] RT listening for mailbox commands...
25,902,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,057,667 UART: [rt]cmd =0x41544d4e, len=14344
30,052,815 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
3,361,462 ready_for_fw is high
3,361,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,058,569 >>> mbox cmd response: success
18,336,690 UART:
18,337,080 UART: Running Caliptra FMC ...
18,338,268 UART:
18,338,433 UART: [state] CFI Enabled
18,406,382 UART: [fht] FMC Alias Private Key: 7
20,170,203 UART: [art] Extend RT PCRs Done
20,171,421 UART: [art] Lock RT PCRs Done
20,173,167 UART: [art] Populate DV Done
20,178,559 UART: [fht] FMC Alias Private Key: 7
20,180,151 UART: [art] Derive CDI
20,180,978 UART: [art] Store in in slot 0x4
20,238,238 UART: [art] Derive Key Pair
20,239,278 UART: [art] Store priv key in slot 0x5
22,702,274 UART: [art] Derive Key Pair - Done
22,715,220 UART: [art] Signing Cert with AUTHO
22,716,527 UART: RITY.KEYID = 7
24,427,678 UART: [art] Erasing AUTHORITY.KEYID = 7
24,429,186 UART: [art] PUB.X = DCCD71B3461BFF15D85F7344BD3C41C43D6337C6A217A65DB4345CC5A856F4803110BBC0C9AB1C4774EA3BDA181C0C9E
24,436,461 UART: [art] PUB.Y = FBCF7612DB5D3CAC285D5BB1D3467D6D9EE4D2B2131FAC5DA5CA902D6A2B911A3F533B4BB5175B90288C01B2B8663F1F
24,443,741 UART: [art] SIG.R = C5F29C2EA1925D943A0C9119B6C32421F3B5719F9A32B0A35BD4B88322268A41964931D0E5E2085524C73E68126E5A2E
24,451,164 UART: [art] SIG.S = 5F8C5CF57BC197772AAAE74966AA235A27B7D385F0D98AE810E6ACE89CE1DCE526C67B115CD969D524C7136BDBB7936D
25,430,407 UART: Caliptra RT
25,431,093 UART: [state] CFI Enabled
25,595,348 UART: [rt] RT listening for mailbox commands...
25,597,962 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,753,313 UART: [rt]cmd =0x41544d4e, len=14344
29,748,818 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,885 writing to cptra_bootfsm_go
193,157 UART:
193,518 UART: Running Caliptra ROM ...
194,601 UART:
604,405 UART: [state] CFI Enabled
618,786 UART: [state] LifecycleState = Unprovisioned
620,653 UART: [state] DebugLocked = No
623,174 UART: [state] WD Timer not started. Device not locked for debugging
626,376 UART: [kat] SHA2-256
805,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,039 UART: [kat] ++
817,493 UART: [kat] sha1
828,643 UART: [kat] SHA2-256
831,645 UART: [kat] SHA2-384
837,776 UART: [kat] SHA2-512-ACC
840,720 UART: [kat] ECC-384
3,280,939 UART: [kat] HMAC-384Kdf
3,295,002 UART: [kat] LMS
3,824,480 UART: [kat] --
3,828,787 UART: [cold-reset] ++
3,830,541 UART: [fht] FHT @ 0x50003400
3,841,318 UART: [idev] ++
3,841,894 UART: [idev] CDI.KEYID = 6
3,842,812 UART: [idev] SUBJECT.KEYID = 7
3,843,987 UART: [idev] UDS.KEYID = 0
3,845,038 ready_for_fw is high
3,845,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,579 UART: [idev] Erasing UDS.KEYID = 0
6,319,893 UART: [idev] Sha1 KeyId Algorithm
6,343,500 UART: [idev] --
6,347,338 UART: [ldev] ++
6,347,912 UART: [ldev] CDI.KEYID = 6
6,348,826 UART: [ldev] SUBJECT.KEYID = 5
6,350,003 UART: [ldev] AUTHORITY.KEYID = 7
6,351,242 UART: [ldev] FE.KEYID = 1
6,364,670 UART: [ldev] Erasing FE.KEYID = 1
8,841,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,708 UART: [ldev] --
10,634,530 UART: [fwproc] Wait for Commands...
10,637,656 UART: [fwproc] Recv command 0x46574c44
10,639,745 UART: [fwproc] Recv'd Img size: 114084 bytes
14,038,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,496,994 >>> mbox cmd response: success
14,502,081 UART: [afmc] ++
14,502,686 UART: [afmc] CDI.KEYID = 6
14,503,601 UART: [afmc] SUBJECT.KEYID = 7
14,504,762 UART: [afmc] AUTHORITY.KEYID = 5
17,003,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,806 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,694 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,333 UART: [afmc] --
18,797,525 UART: [cold-reset] --
18,802,043 UART: [state] Locking Datavault
18,807,353 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,066 UART: [state] Locking ICCM
18,811,547 UART: [exit] Launching FMC @ 0x40000130
18,819,971 UART:
18,820,214 UART: Running Caliptra FMC ...
18,821,316 UART:
18,821,473 UART: [state] CFI Enabled
18,829,796 UART: [fht] FMC Alias Private Key: 7
20,586,674 UART: [art] Extend RT PCRs Done
20,587,893 UART: [art] Lock RT PCRs Done
20,589,845 UART: [art] Populate DV Done
20,595,317 UART: [fht] FMC Alias Private Key: 7
20,596,964 UART: [art] Derive CDI
20,597,780 UART: [art] Store in in slot 0x4
20,640,484 UART: [art] Derive Key Pair
20,641,523 UART: [art] Store priv key in slot 0x5
23,068,819 UART: [art] Derive Key Pair - Done
23,081,825 UART: [art] Signing Cert with AUTHO
23,083,135 UART: RITY.KEYID = 7
24,788,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,240 UART: [art] PUB.X = 2E658905A1D4BA3CBD53F0B0A51C73C20EDFD7370D70FC0BD54A2E3038B0AA6ECB772FA702356B2B92347AE52D56DB6D
24,797,567 UART: [art] PUB.Y = 313C2F610CAE3CA360ED9C1F6F1CF15EA53CDB702C8408F7B80EE05BD01B068317A848EC43040264ED19F6A09015C09A
24,804,828 UART: [art] SIG.R = 933EDF9DC3C0A007EFDBFB48E002D82B3F789B3AD58E6E1364CA16F168CFE2CAE9705BB5A278DBCF18C99C5112262C34
24,812,198 UART: [art] SIG.S = 4CACDE73E7E50B5964B4CDE0B61B44564FB536A66B5CD0D2F148CA5C49A42753CEE56F1ECA21601E933AE871D8675018
25,791,113 UART: Caliptra RT
25,791,805 UART: [state] CFI Enabled
25,908,277 UART: [rt] RT listening for mailbox commands...
25,910,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,065,970 UART: [rt]cmd =0x41544d4e, len=14344
30,062,022 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,695,770 ready_for_fw is high
3,696,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,278,320 >>> mbox cmd response: success
18,525,733 UART:
18,526,127 UART: Running Caliptra FMC ...
18,527,263 UART:
18,527,443 UART: [state] CFI Enabled
18,535,596 UART: [fht] FMC Alias Private Key: 7
20,292,594 UART: [art] Extend RT PCRs Done
20,293,816 UART: [art] Lock RT PCRs Done
20,295,147 UART: [art] Populate DV Done
20,300,545 UART: [fht] FMC Alias Private Key: 7
20,302,149 UART: [art] Derive CDI
20,302,889 UART: [art] Store in in slot 0x4
20,345,379 UART: [art] Derive Key Pair
20,346,423 UART: [art] Store priv key in slot 0x5
22,773,126 UART: [art] Derive Key Pair - Done
22,786,121 UART: [art] Signing Cert with AUTHO
22,787,425 UART: RITY.KEYID = 7
24,492,423 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,937 UART: [art] PUB.X = 92EDE6D093038262EA6102502F4323B6665FB9B6207127D5D679DD7CB08DA5D168CDF11CEBEAA1BEB3E93326C8DA2BC6
24,501,248 UART: [art] PUB.Y = D6E63E409BE7CDBF172E35787CBCE73AAAA759AAB94F97E3C8146DA65FC827DE17D4A02345FB93AD8106871FB7E7B624
24,508,511 UART: [art] SIG.R = 4458E444CDAE9384078D63DEE3ECF5489C442AE8B6E5D5D4D340E792E005A2CC49C647805894DBCC457FE018DC615EB5
24,515,894 UART: [art] SIG.S = 9F8AF79B21BF6E6DCBCBD04E108476C98E9DE0BC5160CA14716F847C434E57CA84FDA7B9E2E6F5362FFD8F3A00ED850E
25,494,965 UART: Caliptra RT
25,495,655 UART: [state] CFI Enabled
25,612,311 UART: [rt] RT listening for mailbox commands...
25,614,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,770,170 UART: [rt]cmd =0x41544d4e, len=14344
29,766,135 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,523 UART:
192,916 UART: Running Caliptra ROM ...
194,018 UART:
194,162 UART: [state] CFI Enabled
261,157 UART: [state] LifecycleState = Unprovisioned
263,510 UART: [state] DebugLocked = No
265,173 UART: [state] WD Timer not started. Device not locked for debugging
269,294 UART: [kat] SHA2-256
459,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,957 UART: [kat] ++
470,452 UART: [kat] sha1
480,652 UART: [kat] SHA2-256
483,660 UART: [kat] SHA2-384
489,658 UART: [kat] SHA2-512-ACC
492,241 UART: [kat] ECC-384
2,961,450 UART: [kat] HMAC-384Kdf
2,984,060 UART: [kat] LMS
3,515,867 UART: [kat] --
3,521,573 UART: [cold-reset] ++
3,524,037 UART: [fht] FHT @ 0x50003400
3,536,166 UART: [idev] ++
3,536,873 UART: [idev] CDI.KEYID = 6
3,537,776 UART: [idev] SUBJECT.KEYID = 7
3,539,020 UART: [idev] UDS.KEYID = 0
3,539,942 ready_for_fw is high
3,540,131 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,683,751 UART: [idev] Erasing UDS.KEYID = 0
6,039,869 UART: [idev] Sha1 KeyId Algorithm
6,062,779 UART: [idev] --
6,067,695 UART: [ldev] ++
6,068,376 UART: [ldev] CDI.KEYID = 6
6,069,288 UART: [ldev] SUBJECT.KEYID = 5
6,070,447 UART: [ldev] AUTHORITY.KEYID = 7
6,071,694 UART: [ldev] FE.KEYID = 1
6,112,979 UART: [ldev] Erasing FE.KEYID = 1
8,618,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,713 UART: [ldev] --
10,426,447 UART: [fwproc] Wait for Commands...
10,428,700 UART: [fwproc] Recv command 0x46574c44
10,431,003 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,602,813 >>> mbox cmd response: success
14,607,018 UART: [afmc] ++
14,607,744 UART: [afmc] CDI.KEYID = 6
14,608,935 UART: [afmc] SUBJECT.KEYID = 7
14,610,375 UART: [afmc] AUTHORITY.KEYID = 5
17,144,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,887,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,889,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,904,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,919,405 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,934,447 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,005 UART: [afmc] --
18,962,136 UART: [cold-reset] --
18,966,282 UART: [state] Locking Datavault
18,972,677 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,833 UART: [state] Locking ICCM
18,976,827 UART: [exit] Launching FMC @ 0x40000130
18,985,516 UART:
18,985,764 UART: Running Caliptra FMC ...
18,986,866 UART:
18,987,023 UART: [state] CFI Enabled
19,045,029 UART: [fht] FMC Alias Private Key: 7
20,809,338 UART: [art] Extend RT PCRs Done
20,810,539 UART: [art] Lock RT PCRs Done
20,812,318 UART: [art] Populate DV Done
20,817,723 UART: [fht] FMC Alias Private Key: 7
20,819,204 UART: [art] Derive CDI
20,819,963 UART: [art] Store in in slot 0x4
20,878,188 UART: [art] Derive Key Pair
20,879,221 UART: [art] Store priv key in slot 0x5
23,342,201 UART: [art] Derive Key Pair - Done
23,355,303 UART: [art] Signing Cert with AUTHO
23,356,601 UART: RITY.KEYID = 7
25,068,001 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,522 UART: [art] PUB.X = FCB7055D45DE5049A6B5AB7DC5672633C70C678A824BCC6E77F1AE6D552A5BA18202A2816BB7049ECAF10FAAE466207D
25,076,787 UART: [art] PUB.Y = 2B3A9E45A13F2DC8E85DEB640E60429B7BE3797CFC23812F5BA6C524B78D0343B430944A8FA68119BF360001B00F35EC
25,084,036 UART: [art] SIG.R = 3D327CF2ECED93CDB151E922621EC64A0F518459EBB0FF9E55A6FD116303510F2100569497063F058680147CD228453D
25,091,361 UART: [art] SIG.S = 3DB9B5D85DFC370F74C033252FD930A2F57E104F0EF00EF83869D531F2249D3FA7AFED7DABC343359DAAC1C9D6D5CE30
26,070,622 UART: Caliptra RT
26,071,343 UART: [state] CFI Enabled
26,236,725 UART: [rt] RT listening for mailbox commands...
26,239,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,394,406 UART: [rt]cmd =0x41544d4e, len=14344
30,390,287 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,437,733 ready_for_fw is high
3,438,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,735,848 >>> mbox cmd response: success
19,025,679 UART:
19,026,074 UART: Running Caliptra FMC ...
19,027,179 UART:
19,027,330 UART: [state] CFI Enabled
19,093,230 UART: [fht] FMC Alias Private Key: 7
20,858,028 UART: [art] Extend RT PCRs Done
20,859,243 UART: [art] Lock RT PCRs Done
20,860,869 UART: [art] Populate DV Done
20,866,110 UART: [fht] FMC Alias Private Key: 7
20,867,645 UART: [art] Derive CDI
20,868,458 UART: [art] Store in in slot 0x4
20,926,094 UART: [art] Derive Key Pair
20,927,089 UART: [art] Store priv key in slot 0x5
23,390,410 UART: [art] Derive Key Pair - Done
23,403,456 UART: [art] Signing Cert with AUTHO
23,404,754 UART: RITY.KEYID = 7
25,115,728 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,235 UART: [art] PUB.X = CE8AF19ADA38C44C4F0E80A3D2E205467C8899806A116A0B85199B6750709E3CE56536D968F24638E325C566EDC0FD52
25,124,465 UART: [art] PUB.Y = E9B97119DBE5C8E333222863B25D79BD45EFB0A42BDD27EB4EEB4E7215D1F3788BFEDB32ED146DB97B6445966A1445BC
25,131,754 UART: [art] SIG.R = 405D955784CDCBDBB530A46E0DFACD9266698C63281B7C492A389FEA2EF592D3029534EA8983FA41A97E5FE8E27EC466
25,139,159 UART: [art] SIG.S = 575207B3C30E74444136D1B4C3448BECF020AC08CAA13B3252538B26EEC7B8866AE00835543D2C835E881C1165306F33
26,118,033 UART: Caliptra RT
26,118,740 UART: [state] CFI Enabled
26,284,010 UART: [rt] RT listening for mailbox commands...
26,286,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,441,740 UART: [rt]cmd =0x41544d4e, len=14344
30,437,707 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
192,807 UART:
193,198 UART: Running Caliptra ROM ...
194,393 UART:
604,013 UART: [state] CFI Enabled
621,890 UART: [state] LifecycleState = Unprovisioned
624,257 UART: [state] DebugLocked = No
627,065 UART: [state] WD Timer not started. Device not locked for debugging
631,745 UART: [kat] SHA2-256
821,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,394 UART: [kat] ++
833,021 UART: [kat] sha1
844,486 UART: [kat] SHA2-256
847,572 UART: [kat] SHA2-384
853,708 UART: [kat] SHA2-512-ACC
856,291 UART: [kat] ECC-384
3,299,932 UART: [kat] HMAC-384Kdf
3,313,241 UART: [kat] LMS
3,845,088 UART: [kat] --
3,850,729 UART: [cold-reset] ++
3,852,948 UART: [fht] FHT @ 0x50003400
3,865,160 UART: [idev] ++
3,865,832 UART: [idev] CDI.KEYID = 6
3,866,824 UART: [idev] SUBJECT.KEYID = 7
3,868,002 UART: [idev] UDS.KEYID = 0
3,868,930 ready_for_fw is high
3,869,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,012,351 UART: [idev] Erasing UDS.KEYID = 0
6,341,864 UART: [idev] Sha1 KeyId Algorithm
6,363,097 UART: [idev] --
6,368,068 UART: [ldev] ++
6,368,750 UART: [ldev] CDI.KEYID = 6
6,369,661 UART: [ldev] SUBJECT.KEYID = 5
6,370,816 UART: [ldev] AUTHORITY.KEYID = 7
6,372,046 UART: [ldev] FE.KEYID = 1
6,383,018 UART: [ldev] Erasing FE.KEYID = 1
8,867,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,842 UART: [ldev] --
10,658,808 UART: [fwproc] Wait for Commands...
10,660,543 UART: [fwproc] Recv command 0x46574c44
10,662,951 UART: [fwproc] Recv'd Img size: 114084 bytes
14,106,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,843,946 >>> mbox cmd response: success
14,847,700 UART: [afmc] ++
14,848,418 UART: [afmc] CDI.KEYID = 6
14,849,622 UART: [afmc] SUBJECT.KEYID = 7
14,851,068 UART: [afmc] AUTHORITY.KEYID = 5
17,355,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,450 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,170 UART: [afmc] --
19,151,085 UART: [cold-reset] --
19,155,398 UART: [state] Locking Datavault
19,162,173 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,326 UART: [state] Locking ICCM
19,167,288 UART: [exit] Launching FMC @ 0x40000130
19,175,924 UART:
19,176,162 UART: Running Caliptra FMC ...
19,177,265 UART:
19,177,421 UART: [state] CFI Enabled
19,185,795 UART: [fht] FMC Alias Private Key: 7
20,943,062 UART: [art] Extend RT PCRs Done
20,944,297 UART: [art] Lock RT PCRs Done
20,946,117 UART: [art] Populate DV Done
20,951,585 UART: [fht] FMC Alias Private Key: 7
20,953,071 UART: [art] Derive CDI
20,953,833 UART: [art] Store in in slot 0x4
20,996,658 UART: [art] Derive Key Pair
20,997,703 UART: [art] Store priv key in slot 0x5
23,424,685 UART: [art] Derive Key Pair - Done
23,437,678 UART: [art] Signing Cert with AUTHO
23,438,980 UART: RITY.KEYID = 7
25,144,318 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,818 UART: [art] PUB.X = 2E8A0069B8B489449612CC251518A8915EFC5D8C12F211AB6C87AEF067C331AC02F66D9E4BE983C1C9F68B5C3FF8ADA8
25,153,094 UART: [art] PUB.Y = 025F8901D8ACE3EFC2AE98075D4240A838AEFE1D06A35AD367A2424D9A80D9B07F2D7820D8270ABAE04F0229D54F2819
25,160,355 UART: [art] SIG.R = EC9F20A787A6484AB4F4DAE5036789CCC9EF7338DB669F0B38FA104BE803A47C8E2D2E1C1D724FA3DC9C91A57A40721C
25,167,787 UART: [art] SIG.S = 93E6C748519719B7F4D8C3EDA37CFB171AA315DBF57FF04BB6C48623670B00DF191EC855BCB18B44E9DFF7FCBEBB4068
26,146,423 UART: Caliptra RT
26,147,119 UART: [state] CFI Enabled
26,264,680 UART: [rt] RT listening for mailbox commands...
26,266,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,422,216 UART: [rt]cmd =0x41544d4e, len=14344
30,417,540 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,818 writing to cptra_bootfsm_go
3,758,489 ready_for_fw is high
3,758,874 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,958,614 >>> mbox cmd response: success
19,214,350 UART:
19,214,740 UART: Running Caliptra FMC ...
19,215,934 UART:
19,216,127 UART: [state] CFI Enabled
19,223,854 UART: [fht] FMC Alias Private Key: 7
20,980,596 UART: [art] Extend RT PCRs Done
20,981,826 UART: [art] Lock RT PCRs Done
20,983,461 UART: [art] Populate DV Done
20,988,819 UART: [fht] FMC Alias Private Key: 7
20,990,494 UART: [art] Derive CDI
20,991,315 UART: [art] Store in in slot 0x4
21,033,813 UART: [art] Derive Key Pair
21,034,859 UART: [art] Store priv key in slot 0x5
23,461,583 UART: [art] Derive Key Pair - Done
23,474,584 UART: [art] Signing Cert with AUTHO
23,475,894 UART: RITY.KEYID = 7
25,181,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,933 UART: [art] PUB.X = C07086BE999F26CD4813D02DC05579413385E06122D79DD7658B528A8802BD94CB0A73F971CA4723AC33778E408960B1
25,190,145 UART: [art] PUB.Y = 61DB20CD4743B80E63ED2F36851F24DF2AEF86AC56173B20646A3A2AC559312394D1002281CDA8FB07DF1C13E5A9740C
25,197,387 UART: [art] SIG.R = 6159B7267C6D8C2813C497D5FE7C18F6146188B56A9ECFAC6027DA9C559FB9D22FAB550C47BE1376446D9C153EBDBE06
25,204,789 UART: [art] SIG.S = 12E316D37B68B7D42C041FF84DE2A745B4E98C23B2CC993E315463971EA3C7D9D1BBC0B67484CD8C4B4BD9A08324627C
26,183,391 UART: Caliptra RT
26,184,113 UART: [state] CFI Enabled
26,301,781 UART: [rt] RT listening for mailbox commands...
26,304,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,495 UART: [rt]cmd =0x41544d4e, len=14344
30,455,741 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,856 UART: [kat] HMAC-384Kdf
907,374 UART: [kat] LMS
1,475,570 UART: [kat] --
1,476,357 UART: [cold-reset] ++
1,476,687 UART: [fht] Storing FHT @ 0x50003400
1,479,350 UART: [idev] ++
1,479,518 UART: [idev] CDI.KEYID = 6
1,479,878 UART: [idev] SUBJECT.KEYID = 7
1,480,302 UART: [idev] UDS.KEYID = 0
1,480,647 ready_for_fw is high
1,480,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,436 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,613 UART: [ldev] ++
1,514,781 UART: [ldev] CDI.KEYID = 6
1,515,144 UART: [ldev] SUBJECT.KEYID = 5
1,515,570 UART: [ldev] AUTHORITY.KEYID = 7
1,516,033 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,426 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,702 UART: [fwproc] Received command 0x46574c44
1,587,493 UART: [fwproc] Received Image of size 114084 bytes
2,882,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,101 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,068 >>> mbox cmd response: success
3,075,096 UART: [afmc] ++
3,075,264 UART: [afmc] CDI.KEYID = 6
3,075,626 UART: [afmc] SUBJECT.KEYID = 7
3,076,051 UART: [afmc] AUTHORITY.KEYID = 5
3,110,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,296 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,689 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,379 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,442 UART: [afmc] --
3,154,432 UART: [cold-reset] --
3,155,268 UART: [state] Locking Datavault
3,156,565 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,169 UART: [state] Locking ICCM
3,157,743 UART: [exit] Launching FMC @ 0x40000130
3,163,072 UART:
3,163,088 UART: Running Caliptra FMC ...
3,163,496 UART:
3,163,550 UART: [state] CFI Enabled
3,174,111 UART: [fht] FMC Alias Private Key: 7
3,281,822 UART: [art] Extend RT PCRs Done
3,282,250 UART: [art] Lock RT PCRs Done
3,283,594 UART: [art] Populate DV Done
3,292,051 UART: [fht] FMC Alias Private Key: 7
3,293,029 UART: [art] Derive CDI
3,293,309 UART: [art] Store in in slot 0x4
3,378,912 UART: [art] Derive Key Pair
3,379,272 UART: [art] Store priv key in slot 0x5
3,392,802 UART: [art] Derive Key Pair - Done
3,407,672 UART: [art] Signing Cert with AUTHO
3,408,152 UART: RITY.KEYID = 7
3,422,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,713 UART: [art] PUB.X = 8ABD59A821211AD5FF4CE6ADE2E28E344F98201985AAA666FA2C11B3FE6DE4171A80CF74380D0273926BB90D88A7A963
3,430,484 UART: [art] PUB.Y = 25A887E9FDAD0B09BA086D43E70E6F9F3FF84DCDA0E1A90C9C7A2151258CE408CB357EF60BDC553C94B82B9B4BAF2B9D
3,437,437 UART: [art] SIG.R = D1CC5BAF884EC3AAC36193E0C7EE0047F5F7BDF40EB93490377B49C6F6334EAAE08C9BE2CFBA1DF1A885009B9A8D01ED
3,444,183 UART: [art] SIG.S = 45DF7406B08B43BA37394DFDB48D9A10C6F8AC4584948BA08CEDB5CA6441E0F0C7C5BFDF35ACAFDDED012031DD9EF2BC
3,467,840 UART: Caliptra RT
3,468,093 UART: [state] CFI Enabled
3,576,194 UART: [rt] RT listening for mailbox commands...
3,576,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,124 UART: [rt]cmd =0x41544d4e, len=14344
4,009,821 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,871 ready_for_fw is high
1,362,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,984 >>> mbox cmd response: success
2,984,216 UART:
2,984,232 UART: Running Caliptra FMC ...
2,984,640 UART:
2,984,694 UART: [state] CFI Enabled
2,995,127 UART: [fht] FMC Alias Private Key: 7
3,103,464 UART: [art] Extend RT PCRs Done
3,103,892 UART: [art] Lock RT PCRs Done
3,105,488 UART: [art] Populate DV Done
3,113,643 UART: [fht] FMC Alias Private Key: 7
3,114,743 UART: [art] Derive CDI
3,115,023 UART: [art] Store in in slot 0x4
3,200,444 UART: [art] Derive Key Pair
3,200,804 UART: [art] Store priv key in slot 0x5
3,213,892 UART: [art] Derive Key Pair - Done
3,228,872 UART: [art] Signing Cert with AUTHO
3,229,352 UART: RITY.KEYID = 7
3,244,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,127 UART: [art] PUB.X = A1604120364D9E6C2F9E1E651EF8E2866AC5882752B4037028A1695E935FC470939086590B7CCFB5DD7E31E5D76E5E6F
3,251,889 UART: [art] PUB.Y = 229F7587770139A3DFB1BD8530A1BA0FE1F191E58CAECE36BD294B828F3853DF9114B4C60A0269932E683995D6CA9430
3,258,829 UART: [art] SIG.R = 122F47614A37270A6C42697DFDD40B289A42A03D91E81C18D598613C8A771B4BCD8B1BF5AB57D8A55556FDDA24C149B1
3,265,599 UART: [art] SIG.S = 8B31DB1EB91F8925E0BA62A6886492A42228F1A1D6311E1B1E8BCB11D8DCE8F4EEE698D01EB50DABAE2CD5461EA7626C
3,288,901 UART: Caliptra RT
3,289,154 UART: [state] CFI Enabled
3,397,555 UART: [rt] RT listening for mailbox commands...
3,398,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,155 UART: [rt]cmd =0x41544d4e, len=14344
3,830,450 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,550 UART: [kat] SHA2-256
882,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,596 UART: [kat] ++
886,748 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,873 UART: [kat] SHA2-512-ACC
897,774 UART: [kat] ECC-384
903,465 UART: [kat] HMAC-384Kdf
908,101 UART: [kat] LMS
1,476,297 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,229 UART: [idev] ++
1,480,397 UART: [idev] CDI.KEYID = 6
1,480,757 UART: [idev] SUBJECT.KEYID = 7
1,481,181 UART: [idev] UDS.KEYID = 0
1,481,526 ready_for_fw is high
1,481,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,507 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,309 UART: [idev] --
1,515,504 UART: [ldev] ++
1,515,672 UART: [ldev] CDI.KEYID = 6
1,516,035 UART: [ldev] SUBJECT.KEYID = 5
1,516,461 UART: [ldev] AUTHORITY.KEYID = 7
1,516,924 UART: [ldev] FE.KEYID = 1
1,522,436 UART: [ldev] Erasing FE.KEYID = 1
1,547,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,877 UART: [ldev] --
1,587,168 UART: [fwproc] Waiting for Commands...
1,587,999 UART: [fwproc] Received command 0x46574c44
1,588,790 UART: [fwproc] Received Image of size 114084 bytes
2,883,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,493 >>> mbox cmd response: success
3,076,643 UART: [afmc] ++
3,076,811 UART: [afmc] CDI.KEYID = 6
3,077,173 UART: [afmc] SUBJECT.KEYID = 7
3,077,598 UART: [afmc] AUTHORITY.KEYID = 5
3,113,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,583 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,976 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,666 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,479 UART: [afmc] --
3,156,435 UART: [cold-reset] --
3,157,321 UART: [state] Locking Datavault
3,158,276 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,880 UART: [state] Locking ICCM
3,159,554 UART: [exit] Launching FMC @ 0x40000130
3,164,883 UART:
3,164,899 UART: Running Caliptra FMC ...
3,165,307 UART:
3,165,450 UART: [state] CFI Enabled
3,175,699 UART: [fht] FMC Alias Private Key: 7
3,283,870 UART: [art] Extend RT PCRs Done
3,284,298 UART: [art] Lock RT PCRs Done
3,285,560 UART: [art] Populate DV Done
3,293,851 UART: [fht] FMC Alias Private Key: 7
3,294,835 UART: [art] Derive CDI
3,295,115 UART: [art] Store in in slot 0x4
3,380,658 UART: [art] Derive Key Pair
3,381,018 UART: [art] Store priv key in slot 0x5
3,394,386 UART: [art] Derive Key Pair - Done
3,409,082 UART: [art] Signing Cert with AUTHO
3,409,562 UART: RITY.KEYID = 7
3,424,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,365 UART: [art] PUB.X = 315C3D37468DACE757A14DBA5CDAE01DCBF7E59948189BE6C7A1FCF241266DF6B566B197468C94465E555EF0DD05B5C8
3,432,146 UART: [art] PUB.Y = E669579D21CCA2017F464BC5061BA9F123DCAF72593BE9C24BE760C6EBD12323F1B45249414D0D2B4BEA1FE42681C9A1
3,439,097 UART: [art] SIG.R = 7B6895C96EACD8D1CD4BFE99597A2673D3F47F92F69F2AEC66D9AF85DC837DD8C148E31833000192653C8C232976B6EB
3,445,850 UART: [art] SIG.S = 19599E1C04A5EB24AC6A2C7C6D3F01E0EEC8EB88127E24129DAE96F7366575E775398BD53C10F2D0B80F9D28675E313E
3,469,520 UART: Caliptra RT
3,469,865 UART: [state] CFI Enabled
3,577,349 UART: [rt] RT listening for mailbox commands...
3,578,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,071 UART: [rt]cmd =0x41544d4e, len=14344
4,011,192 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 ready_for_fw is high
1,363,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,729 >>> mbox cmd response: success
2,988,155 UART:
2,988,171 UART: Running Caliptra FMC ...
2,988,579 UART:
2,988,722 UART: [state] CFI Enabled
2,999,345 UART: [fht] FMC Alias Private Key: 7
3,107,856 UART: [art] Extend RT PCRs Done
3,108,284 UART: [art] Lock RT PCRs Done
3,109,962 UART: [art] Populate DV Done
3,118,303 UART: [fht] FMC Alias Private Key: 7
3,119,467 UART: [art] Derive CDI
3,119,747 UART: [art] Store in in slot 0x4
3,205,458 UART: [art] Derive Key Pair
3,205,818 UART: [art] Store priv key in slot 0x5
3,219,164 UART: [art] Derive Key Pair - Done
3,233,872 UART: [art] Signing Cert with AUTHO
3,234,352 UART: RITY.KEYID = 7
3,249,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,607 UART: [art] PUB.X = 0EDC977B84A464875055EDCA1B531EBA8B06A6E56732AA2FF292DFB1F26131FB5F72A7DB594D8323CE0B9D75534D25E9
3,257,380 UART: [art] PUB.Y = C172BACF376A09DA0CDDD8AD89077F7B4627587135E7C3DB663C4C42F2FF5DCB00A530DE23E9058ED3DEE53736A35437
3,264,310 UART: [art] SIG.R = 13F9517273A1FFDC87D1F2F69DD97BD1C35190E6C4B18FF6BA8C2F72805D26D3852F24C8396906582B4509715CA09921
3,271,072 UART: [art] SIG.S = 97AEFBF7B6633365C44DA8EC7CFA6C3188B33F651BE92DCA4C9F483625BC5414558685706E454A6068482FA66D643021
3,294,429 UART: Caliptra RT
3,294,774 UART: [state] CFI Enabled
3,403,669 UART: [rt] RT listening for mailbox commands...
3,404,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,477 UART: [rt]cmd =0x41544d4e, len=14344
3,837,230 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
893,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,415 UART: [kat] ++
897,567 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,802 UART: [kat] SHA2-512-ACC
908,703 UART: [kat] ECC-384
918,320 UART: [kat] HMAC-384Kdf
922,954 UART: [kat] LMS
1,171,282 UART: [kat] --
1,172,243 UART: [cold-reset] ++
1,172,729 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 ready_for_fw is high
1,176,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,201,395 UART: [idev] Sha1 KeyId Algorithm
1,210,037 UART: [idev] --
1,211,129 UART: [ldev] ++
1,211,297 UART: [ldev] CDI.KEYID = 6
1,211,660 UART: [ldev] SUBJECT.KEYID = 5
1,212,086 UART: [ldev] AUTHORITY.KEYID = 7
1,212,549 UART: [ldev] FE.KEYID = 1
1,217,647 UART: [ldev] Erasing FE.KEYID = 1
1,243,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,429 UART: [ldev] --
1,282,752 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,395 >>> mbox cmd response: success
2,770,533 UART: [afmc] ++
2,770,701 UART: [afmc] CDI.KEYID = 6
2,771,063 UART: [afmc] SUBJECT.KEYID = 7
2,771,488 UART: [afmc] AUTHORITY.KEYID = 5
2,807,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,986 UART: [afmc] --
2,850,980 UART: [cold-reset] --
2,851,798 UART: [state] Locking Datavault
2,852,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,501 UART: [state] Locking ICCM
2,854,085 UART: [exit] Launching FMC @ 0x40000130
2,859,414 UART:
2,859,430 UART: Running Caliptra FMC ...
2,859,838 UART:
2,859,892 UART: [state] CFI Enabled
2,870,183 UART: [fht] FMC Alias Private Key: 7
2,977,678 UART: [art] Extend RT PCRs Done
2,978,106 UART: [art] Lock RT PCRs Done
2,979,502 UART: [art] Populate DV Done
2,987,577 UART: [fht] FMC Alias Private Key: 7
2,988,515 UART: [art] Derive CDI
2,988,795 UART: [art] Store in in slot 0x4
3,074,382 UART: [art] Derive Key Pair
3,074,742 UART: [art] Store priv key in slot 0x5
3,088,268 UART: [art] Derive Key Pair - Done
3,102,692 UART: [art] Signing Cert with AUTHO
3,103,172 UART: RITY.KEYID = 7
3,117,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,493 UART: [art] PUB.X = DE4D1C0EAB2DB990FA3AE2E2FBD2DBA1C9938743D34F6BDA6B2DAD62F7A96A29CE0357AC7361EFE47859A970F4465CB2
3,125,283 UART: [art] PUB.Y = FC2B2B5FC5D0B75E1409E141F67BB768DCF1D82F6DD91653DB3626C987BC5AB61E284565EA6EF39EED6909C454845D57
3,132,239 UART: [art] SIG.R = 19BA26C5552387B0F256A709BFACC541224238AE8513C2B4DFB80CABF8929E92007485EC01A392E6A0D88A87AAA7DDEF
3,138,990 UART: [art] SIG.S = B1636EEA3E38B345414358090EF3ADAA834DC86CFCD81C02FF1DEB41C71C9FB0AE6057D5E9115F5A52FB783251FF4584
3,162,886 UART: Caliptra RT
3,163,139 UART: [state] CFI Enabled
3,271,550 UART: [rt] RT listening for mailbox commands...
3,272,220 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,328 UART: [rt]cmd =0x41544d4e, len=14344
3,705,185 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,407 ready_for_fw is high
1,060,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,216 >>> mbox cmd response: success
2,684,510 UART:
2,684,526 UART: Running Caliptra FMC ...
2,684,934 UART:
2,684,988 UART: [state] CFI Enabled
2,695,697 UART: [fht] FMC Alias Private Key: 7
2,803,606 UART: [art] Extend RT PCRs Done
2,804,034 UART: [art] Lock RT PCRs Done
2,805,256 UART: [art] Populate DV Done
2,813,537 UART: [fht] FMC Alias Private Key: 7
2,814,591 UART: [art] Derive CDI
2,814,871 UART: [art] Store in in slot 0x4
2,900,814 UART: [art] Derive Key Pair
2,901,174 UART: [art] Store priv key in slot 0x5
2,914,874 UART: [art] Derive Key Pair - Done
2,929,721 UART: [art] Signing Cert with AUTHO
2,930,201 UART: RITY.KEYID = 7
2,945,413 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,178 UART: [art] PUB.X = 0B3551D17873D33E0D0894C4087026FE7B75D62B266BC0D010A2191145AB2867EE8D14349FC5F91C283A2D0B8E9D1702
2,952,926 UART: [art] PUB.Y = F38EA465B24B0B7DE55B2ED215BE21C2EE4107E1C8F3D8A0B3756AAA12B5FD47D6BDF38188E7227F962CD3DBD27CC9AA
2,959,894 UART: [art] SIG.R = E94BFD5BE0B69D73A3C1C0C86D4B67CED5163C019EFD45E23EDDCD6AD9A20B6DED729F13DFAC5FE93E36C80359DB5501
2,966,680 UART: [art] SIG.S = 020F92A230193D8CFC1ED2555CB233DCFA0C9384C738B708D6B929F346D2F1F1B8BB0CB0CE154309A2A952B82EB71ED8
2,990,017 UART: Caliptra RT
2,990,270 UART: [state] CFI Enabled
3,097,677 UART: [rt] RT listening for mailbox commands...
3,098,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,621 UART: [rt]cmd =0x41544d4e, len=14344
3,531,950 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,687 UART: [kat] SHA2-512-ACC
908,588 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
923,053 UART: [kat] LMS
1,171,381 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,121 UART: [idev] ++
1,175,289 UART: [idev] CDI.KEYID = 6
1,175,649 UART: [idev] SUBJECT.KEYID = 7
1,176,073 UART: [idev] UDS.KEYID = 0
1,176,418 ready_for_fw is high
1,176,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,791 UART: [idev] Erasing UDS.KEYID = 0
1,201,328 UART: [idev] Sha1 KeyId Algorithm
1,209,768 UART: [idev] --
1,210,896 UART: [ldev] ++
1,211,064 UART: [ldev] CDI.KEYID = 6
1,211,427 UART: [ldev] SUBJECT.KEYID = 5
1,211,853 UART: [ldev] AUTHORITY.KEYID = 7
1,212,316 UART: [ldev] FE.KEYID = 1
1,217,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,866 UART: [ldev] --
1,283,349 UART: [fwproc] Wait for Commands...
1,284,103 UART: [fwproc] Recv command 0x46574c44
1,284,831 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,398 >>> mbox cmd response: success
2,773,574 UART: [afmc] ++
2,773,742 UART: [afmc] CDI.KEYID = 6
2,774,104 UART: [afmc] SUBJECT.KEYID = 7
2,774,529 UART: [afmc] AUTHORITY.KEYID = 5
2,810,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,255 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,983 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,868 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,587 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,375 UART: [afmc] --
2,853,371 UART: [cold-reset] --
2,854,031 UART: [state] Locking Datavault
2,855,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,912 UART: [state] Locking ICCM
2,856,448 UART: [exit] Launching FMC @ 0x40000130
2,861,777 UART:
2,861,793 UART: Running Caliptra FMC ...
2,862,201 UART:
2,862,344 UART: [state] CFI Enabled
2,873,067 UART: [fht] FMC Alias Private Key: 7
2,981,230 UART: [art] Extend RT PCRs Done
2,981,658 UART: [art] Lock RT PCRs Done
2,982,900 UART: [art] Populate DV Done
2,991,323 UART: [fht] FMC Alias Private Key: 7
2,992,445 UART: [art] Derive CDI
2,992,725 UART: [art] Store in in slot 0x4
3,078,070 UART: [art] Derive Key Pair
3,078,430 UART: [art] Store priv key in slot 0x5
3,091,942 UART: [art] Derive Key Pair - Done
3,106,604 UART: [art] Signing Cert with AUTHO
3,107,084 UART: RITY.KEYID = 7
3,122,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,859 UART: [art] PUB.X = 6F2CA4579A3FB37AB18D2144FC088D21B467419770006212248187DE161B425A089E4C8C7B600F23830200AE0934A3D1
3,129,560 UART: [art] PUB.Y = 8CBFFA7CB707864D5834758A41A8EAE1E0F9D3EB74B24EBA98A957E3579893BEF115088182D6038A4CCA212B9D4A985A
3,136,511 UART: [art] SIG.R = 6C5856BBF52B47E5B3EC69211DEC3000BF384482899803C2EB7193979F29AFFB30E3216C4849C32E3F6C3D9F81C822B8
3,143,258 UART: [art] SIG.S = 7FCC535674E60404698233E36C6D8E29DAB92D2770277B6BCB64EAB97A1803A295C06DC46FEF39D8084B9C19968C202D
3,166,735 UART: Caliptra RT
3,167,080 UART: [state] CFI Enabled
3,274,583 UART: [rt] RT listening for mailbox commands...
3,275,253 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,047 UART: [rt]cmd =0x41544d4e, len=14344
3,708,154 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,258 ready_for_fw is high
1,060,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,931 >>> mbox cmd response: success
2,687,513 UART:
2,687,529 UART: Running Caliptra FMC ...
2,687,937 UART:
2,688,080 UART: [state] CFI Enabled
2,698,621 UART: [fht] FMC Alias Private Key: 7
2,806,466 UART: [art] Extend RT PCRs Done
2,806,894 UART: [art] Lock RT PCRs Done
2,808,450 UART: [art] Populate DV Done
2,816,471 UART: [fht] FMC Alias Private Key: 7
2,817,575 UART: [art] Derive CDI
2,817,855 UART: [art] Store in in slot 0x4
2,903,394 UART: [art] Derive Key Pair
2,903,754 UART: [art] Store priv key in slot 0x5
2,916,612 UART: [art] Derive Key Pair - Done
2,931,557 UART: [art] Signing Cert with AUTHO
2,932,037 UART: RITY.KEYID = 7
2,946,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,734 UART: [art] PUB.X = 9F63ED5B3CE74684875BD3EC973AB536423ED50DEA33DCCB0061DF5FB8880A2BBEF4BB1FD1F8762774A8A41A632C3F30
2,954,494 UART: [art] PUB.Y = F50BD6D145B37A1076D19057AF7D52B472DD171F686C7D08EFE6D1C100DFC4396C75B5066BE4BCBCD023FC6714CCAEBA
2,961,433 UART: [art] SIG.R = 264C4F0317BF79FA37239C0EE1E3C26C4BC541BE541E42131EBA3DBCB15418BB64AFF248E511BB11403B78129723EA55
2,968,205 UART: [art] SIG.S = 801F2B391242C1E3E33E2F83053839999AA6BEAF26462B7DD4A3267C00E0B001F095E221124785C06FC004E562754984
2,991,961 UART: Caliptra RT
2,992,306 UART: [state] CFI Enabled
3,101,211 UART: [rt] RT listening for mailbox commands...
3,101,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,019 UART: [rt]cmd =0x41544d4e, len=14344
3,534,788 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
921,148 UART: [kat] LMS
1,169,460 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,669 UART: [idev] ++
1,173,837 UART: [idev] CDI.KEYID = 6
1,174,198 UART: [idev] SUBJECT.KEYID = 7
1,174,623 UART: [idev] UDS.KEYID = 0
1,174,969 ready_for_fw is high
1,174,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,230 UART: [ldev] ++
1,209,398 UART: [ldev] CDI.KEYID = 6
1,209,762 UART: [ldev] SUBJECT.KEYID = 5
1,210,189 UART: [ldev] AUTHORITY.KEYID = 7
1,210,652 UART: [ldev] FE.KEYID = 1
1,215,952 UART: [ldev] Erasing FE.KEYID = 1
1,242,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,522 UART: [ldev] --
1,281,846 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,591 >>> mbox cmd response: success
2,771,662 UART: [afmc] ++
2,771,830 UART: [afmc] CDI.KEYID = 6
2,772,193 UART: [afmc] SUBJECT.KEYID = 7
2,772,619 UART: [afmc] AUTHORITY.KEYID = 5
2,807,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,271 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,990 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,865 UART: [afmc] --
2,850,895 UART: [cold-reset] --
2,851,805 UART: [state] Locking Datavault
2,852,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,534 UART: [state] Locking ICCM
2,854,150 UART: [exit] Launching FMC @ 0x40000130
2,859,479 UART:
2,859,495 UART: Running Caliptra FMC ...
2,859,903 UART:
2,859,957 UART: [state] CFI Enabled
2,870,584 UART: [fht] FMC Alias Private Key: 7
2,978,671 UART: [art] Extend RT PCRs Done
2,979,099 UART: [art] Lock RT PCRs Done
2,980,765 UART: [art] Populate DV Done
2,989,044 UART: [fht] FMC Alias Private Key: 7
2,990,100 UART: [art] Derive CDI
2,990,380 UART: [art] Store in in slot 0x4
3,075,909 UART: [art] Derive Key Pair
3,076,269 UART: [art] Store priv key in slot 0x5
3,089,665 UART: [art] Derive Key Pair - Done
3,104,347 UART: [art] Signing Cert with AUTHO
3,104,827 UART: RITY.KEYID = 7
3,120,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,184 UART: [art] PUB.X = EA78D19D34822F5B8FE93802CDB502459DE7AED4632AB7D228CA35E021DC6BAD11FE7E1B3EAEF845BB74CABD1CC6E50E
3,127,973 UART: [art] PUB.Y = 2FDCB65BAC13A203A76CD944998907B16882B35DF109F737FA3F7F9A1B63BC372E38166AE74E39D7D90A571875EC0CF2
3,134,916 UART: [art] SIG.R = 212BA23DBAD150ADFC2301627A21F406BDCCA6292A9C30369E56AC2CC913862A487DFA65F7F6820039EB8CDF305B45EF
3,141,672 UART: [art] SIG.S = 1A0832DABEEB0D3690167116F75D848DFE0AF3B541826DA36714ABA2C5E522FB1D0D3E0CAA2D2D2CDC0232B0195F8F0F
3,165,752 UART: Caliptra RT
3,166,005 UART: [state] CFI Enabled
3,273,362 UART: [rt] RT listening for mailbox commands...
3,274,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,066 UART: [rt]cmd =0x41544d4e, len=14344
3,707,115 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,248 ready_for_fw is high
1,055,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,867 >>> mbox cmd response: success
2,679,981 UART:
2,679,997 UART: Running Caliptra FMC ...
2,680,405 UART:
2,680,459 UART: [state] CFI Enabled
2,691,202 UART: [fht] FMC Alias Private Key: 7
2,798,541 UART: [art] Extend RT PCRs Done
2,798,969 UART: [art] Lock RT PCRs Done
2,800,463 UART: [art] Populate DV Done
2,808,710 UART: [fht] FMC Alias Private Key: 7
2,809,860 UART: [art] Derive CDI
2,810,140 UART: [art] Store in in slot 0x4
2,895,933 UART: [art] Derive Key Pair
2,896,293 UART: [art] Store priv key in slot 0x5
2,909,169 UART: [art] Derive Key Pair - Done
2,923,902 UART: [art] Signing Cert with AUTHO
2,924,382 UART: RITY.KEYID = 7
2,939,608 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,373 UART: [art] PUB.X = 6A264C203BFEC9AB9517515E9D11F159D5B3C3A5AB4F58D163D40F074CAF0EB5B01182A6052E93DCD715E479741E855A
2,947,139 UART: [art] PUB.Y = AE0BDA68F60512332C7A997C876129725DE4FDB6425143D3F458BA50BD6CD941FA0AC0AC18DDB8CF7B163F9BF2488D52
2,954,094 UART: [art] SIG.R = F71F2ABAAF67819AC1D4DBD3315537F9593419A5138040B6988B429DE799ADF72F46B18C0BA7516C0FC2CB1B12E38C05
2,960,863 UART: [art] SIG.S = 7E099A46C1CF1B87C934F4D613C2DFF21EBBE224F5B1C0383AFB9B2D9562CC8995F451E9734352227D25CF7FCE9D0827
2,984,920 UART: Caliptra RT
2,985,173 UART: [state] CFI Enabled
3,092,612 UART: [rt] RT listening for mailbox commands...
3,093,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,336 UART: [rt]cmd =0x41544d4e, len=14344
3,525,533 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,777 UART: [state] LifecycleState = Unprovisioned
85,432 UART: [state] DebugLocked = No
86,078 UART: [state] WD Timer not started. Device not locked for debugging
87,377 UART: [kat] SHA2-256
890,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,056 UART: [kat] ++
895,208 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,849 UART: [kat] SHA2-512-ACC
905,750 UART: [kat] ECC-384
915,569 UART: [kat] HMAC-384Kdf
920,293 UART: [kat] LMS
1,168,605 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,173,806 ready_for_fw is high
1,173,806 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,241,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,743 UART: [ldev] --
1,280,127 UART: [fwproc] Wait for Commands...
1,280,826 UART: [fwproc] Recv command 0x46574c44
1,281,559 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,010 >>> mbox cmd response: success
2,769,265 UART: [afmc] ++
2,769,433 UART: [afmc] CDI.KEYID = 6
2,769,796 UART: [afmc] SUBJECT.KEYID = 7
2,770,222 UART: [afmc] AUTHORITY.KEYID = 5
2,805,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,635 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,364 UART: [afmc] --
2,849,376 UART: [cold-reset] --
2,850,040 UART: [state] Locking Datavault
2,851,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,649 UART: [state] Locking ICCM
2,852,267 UART: [exit] Launching FMC @ 0x40000130
2,857,596 UART:
2,857,612 UART: Running Caliptra FMC ...
2,858,020 UART:
2,858,163 UART: [state] CFI Enabled
2,868,804 UART: [fht] FMC Alias Private Key: 7
2,976,863 UART: [art] Extend RT PCRs Done
2,977,291 UART: [art] Lock RT PCRs Done
2,978,781 UART: [art] Populate DV Done
2,987,380 UART: [fht] FMC Alias Private Key: 7
2,988,472 UART: [art] Derive CDI
2,988,752 UART: [art] Store in in slot 0x4
3,074,851 UART: [art] Derive Key Pair
3,075,211 UART: [art] Store priv key in slot 0x5
3,087,943 UART: [art] Derive Key Pair - Done
3,102,748 UART: [art] Signing Cert with AUTHO
3,103,228 UART: RITY.KEYID = 7
3,118,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,953 UART: [art] PUB.X = 3728EFDDE27573E4722308FE1F5D30FE24AB9D310346CF09D3E206C81ED07A2E13C4D71F214A8C1045B53AC333D5B1F8
3,125,719 UART: [art] PUB.Y = A8492DE1199FA4053D50F9226AFC6AA4B9825BCC4234083854F67DF0B873660CE6DC000CB76532BF97CAA9F40AE53C15
3,132,640 UART: [art] SIG.R = 5D6E9DA46C2DD345A77543176457B1B4E31A3391C25120939857718A14150A11061B6A81E106455B90D998A2061203FB
3,139,379 UART: [art] SIG.S = C6F07F3E7158183614EC824832A10A1AAE24EEF9333AFB821C08547E61CCE24726D70786A3A6F0C7BA1F1DEFFD48EC6D
3,162,909 UART: Caliptra RT
3,163,254 UART: [state] CFI Enabled
3,270,917 UART: [rt] RT listening for mailbox commands...
3,271,587 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,647 UART: [rt]cmd =0x41544d4e, len=14344
3,704,674 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,587 ready_for_fw is high
1,056,587 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,414 >>> mbox cmd response: success
2,682,712 UART:
2,682,728 UART: Running Caliptra FMC ...
2,683,136 UART:
2,683,279 UART: [state] CFI Enabled
2,694,098 UART: [fht] FMC Alias Private Key: 7
2,802,609 UART: [art] Extend RT PCRs Done
2,803,037 UART: [art] Lock RT PCRs Done
2,804,677 UART: [art] Populate DV Done
2,813,206 UART: [fht] FMC Alias Private Key: 7
2,814,194 UART: [art] Derive CDI
2,814,474 UART: [art] Store in in slot 0x4
2,900,189 UART: [art] Derive Key Pair
2,900,549 UART: [art] Store priv key in slot 0x5
2,914,315 UART: [art] Derive Key Pair - Done
2,928,935 UART: [art] Signing Cert with AUTHO
2,929,415 UART: RITY.KEYID = 7
2,944,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,672 UART: [art] PUB.X = 8014363824A902A4C6312ACE32AAF997A7F251C1668AD48B9EA9B1EB761FB75A366A8AA8C7A9FD6B5FEF041D2434B43A
2,952,448 UART: [art] PUB.Y = A3A8171C780FEC5DF419BCD7E5A1D65A360F89485AB0BE94ED7E1525B6071E8C6A4E016409A8B505AAEFBFEBE81C431B
2,959,400 UART: [art] SIG.R = 62D7349B25B207217BF0D8CE12D0FABFEBBB16A8E076B11998F7B62C18C01434CA343303127D4661D3A91230A929B8B1
2,966,166 UART: [art] SIG.S = 086FB5D0D1AD503025A57615FABE08A04381575410FE60ACBFA6C3891D81590994C72E9A7A206DCAA6F804C917AAE6BD
2,990,489 UART: Caliptra RT
2,990,834 UART: [state] CFI Enabled
3,097,517 UART: [rt] RT listening for mailbox commands...
3,098,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,325 UART: [rt]cmd =0x41544d4e, len=14344
3,530,722 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,129 UART:
192,521 UART: Running Caliptra ROM ...
193,627 UART:
193,769 UART: [state] CFI Enabled
263,785 UART: [state] LifecycleState = Unprovisioned
265,729 UART: [state] DebugLocked = No
267,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,931 UART: [kat] SHA2-256
442,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,139 UART: [kat] ++
453,661 UART: [kat] sha1
464,177 UART: [kat] SHA2-256
466,822 UART: [kat] SHA2-384
473,020 UART: [kat] SHA2-512-ACC
475,319 UART: [kat] ECC-384
2,765,278 UART: [kat] HMAC-384Kdf
2,777,383 UART: [kat] LMS
3,967,685 UART: [kat] --
3,971,544 UART: [cold-reset] ++
3,972,977 UART: [fht] Storing FHT @ 0x50003400
3,983,749 UART: [idev] ++
3,984,313 UART: [idev] CDI.KEYID = 6
3,985,385 UART: [idev] SUBJECT.KEYID = 7
3,986,495 UART: [idev] UDS.KEYID = 0
3,987,532 ready_for_fw is high
3,987,742 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,131,361 UART: [idev] Erasing UDS.KEYID = 0
7,322,473 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,950 UART: [idev] --
7,347,882 UART: [ldev] ++
7,348,449 UART: [ldev] CDI.KEYID = 6
7,349,465 UART: [ldev] SUBJECT.KEYID = 5
7,350,619 UART: [ldev] AUTHORITY.KEYID = 7
7,351,867 UART: [ldev] FE.KEYID = 1
7,378,393 UART: [ldev] Erasing FE.KEYID = 1
10,709,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,005,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,020,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,034,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,049,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,067,169 UART: [ldev] --
13,072,585 UART: [fwproc] Waiting for Commands...
13,074,910 UART: [fwproc] Received command 0x46574c44
13,077,147 UART: [fwproc] Received Image of size 113760 bytes
17,125,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,196,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,265,693 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,581,951 >>> mbox cmd response: success
17,586,363 UART: [afmc] ++
17,586,981 UART: [afmc] CDI.KEYID = 6
17,587,891 UART: [afmc] SUBJECT.KEYID = 7
17,589,108 UART: [afmc] AUTHORITY.KEYID = 5
20,958,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,253,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,255,839 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,270,263 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,285,099 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,299,500 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,321,153 UART: [afmc] --
23,324,326 UART: [cold-reset] --
23,328,845 UART: [state] Locking Datavault
23,335,657 UART: [state] Locking PCR0, PCR1 and PCR31
23,337,411 UART: [state] Locking ICCM
23,339,479 UART: [exit] Launching FMC @ 0x40000130
23,347,866 UART:
23,348,129 UART: Running Caliptra FMC ...
23,349,232 UART:
23,349,392 UART: [state] CFI Enabled
23,412,814 UART: [fht] FMC Alias Private Key: 7
25,750,969 UART: [art] Extend RT PCRs Done
25,752,189 UART: [art] Lock RT PCRs Done
25,753,948 UART: [art] Populate DV Done
25,759,358 UART: [fht] FMC Alias Private Key: 7
25,760,950 UART: [art] Derive CDI
25,761,764 UART: [art] Store in in slot 0x4
25,821,501 UART: [art] Derive Key Pair
25,822,538 UART: [art] Store priv key in slot 0x5
29,115,217 UART: [art] Derive Key Pair - Done
29,128,315 UART: [art] Signing Cert with AUTHO
29,129,611 UART: RITY.KEYID = 7
31,416,419 UART: [art] Erasing AUTHORITY.KEYID = 7
31,417,944 UART: [art] PUB.X = 39AB7D3EE51875F74285476E54EDBBF444AD05ABC9B42EEF9B7AFBC0D673BBE6AB96B8C16160B4F939B4F6E68AAE007F
31,425,136 UART: [art] PUB.Y = 1F081A151462E410CD107029A5F8A183F5D32150B638EA0B37A93546040B8B0F9B108BF7E4E173C5CD6BD8040DD39275
31,432,413 UART: [art] SIG.R = F89FF2D68525E22205C226A50B19995B20839165D209C91CFC98CB180F944B35B9F6DE75CC71AFD3BCCCE5E44DA40FE9
31,439,795 UART: [art] SIG.S = 3B53C78C6D16A23E716F2A43D7660118D7503FBFC9765C32DBB2EF61C774237213EAA7EE494B822FF9390F7D94157AB9
32,745,042 UART: Caliptra RT
32,745,768 UART: [state] CFI Enabled
32,906,340 UART: [rt] RT listening for mailbox commands...
32,908,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,939,544 UART: [rt]cmd =0x44504543, len=96
38,723,695 >>> mbox cmd response data (6236 bytes)
38,753,423 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,783,957 UART: [rt]cmd =0x53574545, len=84
44,367,841 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,784,189 ready_for_fw is high
3,784,833 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,845,102 >>> mbox cmd response: success
23,545,862 UART:
23,546,247 UART: Running Caliptra FMC ...
23,547,437 UART:
23,547,606 UART: [state] CFI Enabled
23,615,442 UART: [fht] FMC Alias Private Key: 7
25,953,968 UART: [art] Extend RT PCRs Done
25,955,189 UART: [art] Lock RT PCRs Done
25,956,984 UART: [art] Populate DV Done
25,962,144 UART: [fht] FMC Alias Private Key: 7
25,963,632 UART: [art] Derive CDI
25,964,381 UART: [art] Store in in slot 0x4
26,024,122 UART: [art] Derive Key Pair
26,025,132 UART: [art] Store priv key in slot 0x5
29,317,593 UART: [art] Derive Key Pair - Done
29,330,434 UART: [art] Signing Cert with AUTHO
29,331,769 UART: RITY.KEYID = 7
31,619,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,670 UART: [art] PUB.X = 4C8732A7A2B39615E5FA7CD6C66AEA0B76C8BF40A9A8FC95A1BDABC3E7C1B43FE64947EB9B420100ADEDA3264C0593CD
31,627,946 UART: [art] PUB.Y = 5CD62B90A29A67BAF4DF56B06F4DFEFA672B29658F4153421BE39D8CD3217617F1308FE2991E0472D43E33ADB2144B7A
31,635,188 UART: [art] SIG.R = 0F839D1737F464E2986818A3FD3D0FB7B918E7121BC196A15C078081266D2B1F7ED63BBFACC08D9F91BD8338FE94F2E3
31,642,628 UART: [art] SIG.S = 85648C630DAB8227C69275408E903FEC52371BF42556C1277E4F5C0652D9176F43675F3D4A3236C931806D251847BDB3
32,947,693 UART: Caliptra RT
32,948,417 UART: [state] CFI Enabled
33,111,215 UART: [rt] RT listening for mailbox commands...
33,113,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,144,015 UART: [rt]cmd =0x44504543, len=96
38,927,782 >>> mbox cmd response data (6236 bytes)
38,957,368 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,988,071 UART: [rt]cmd =0x53574545, len=84
44,581,327 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
192,799 UART:
193,180 UART: Running Caliptra ROM ...
194,279 UART:
603,867 UART: [state] CFI Enabled
617,926 UART: [state] LifecycleState = Unprovisioned
619,813 UART: [state] DebugLocked = No
621,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,844 UART: [kat] SHA2-256
795,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,091 UART: [kat] ++
806,541 UART: [kat] sha1
818,716 UART: [kat] SHA2-256
821,403 UART: [kat] SHA2-384
826,405 UART: [kat] SHA2-512-ACC
828,764 UART: [kat] ECC-384
3,112,213 UART: [kat] HMAC-384Kdf
3,123,380 UART: [kat] LMS
4,313,456 UART: [kat] --
4,317,024 UART: [cold-reset] ++
4,318,810 UART: [fht] Storing FHT @ 0x50003400
4,329,877 UART: [idev] ++
4,330,486 UART: [idev] CDI.KEYID = 6
4,331,370 UART: [idev] SUBJECT.KEYID = 7
4,332,633 UART: [idev] UDS.KEYID = 0
4,333,590 ready_for_fw is high
4,333,781 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,865 UART: [idev] Erasing UDS.KEYID = 0
7,619,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,013 UART: [idev] --
7,645,003 UART: [ldev] ++
7,645,635 UART: [ldev] CDI.KEYID = 6
7,646,543 UART: [ldev] SUBJECT.KEYID = 5
7,647,750 UART: [ldev] AUTHORITY.KEYID = 7
7,649,027 UART: [ldev] FE.KEYID = 1
7,658,964 UART: [ldev] Erasing FE.KEYID = 1
10,947,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,384 UART: [ldev] --
13,308,682 UART: [fwproc] Waiting for Commands...
13,310,827 UART: [fwproc] Received command 0x46574c44
13,313,058 UART: [fwproc] Received Image of size 113760 bytes
17,362,435 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,983 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,522 >>> mbox cmd response: success
17,828,862 UART: [afmc] ++
17,829,510 UART: [afmc] CDI.KEYID = 6
17,830,419 UART: [afmc] SUBJECT.KEYID = 7
17,831,631 UART: [afmc] AUTHORITY.KEYID = 5
21,145,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,235 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,662 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,462 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,878 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,132 UART: [afmc] --
23,511,612 UART: [cold-reset] --
23,514,444 UART: [state] Locking Datavault
23,518,770 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,528 UART: [state] Locking ICCM
23,522,114 UART: [exit] Launching FMC @ 0x40000130
23,530,514 UART:
23,530,787 UART: Running Caliptra FMC ...
23,531,813 UART:
23,531,954 UART: [state] CFI Enabled
23,539,756 UART: [fht] FMC Alias Private Key: 7
25,870,628 UART: [art] Extend RT PCRs Done
25,871,847 UART: [art] Lock RT PCRs Done
25,873,562 UART: [art] Populate DV Done
25,879,030 UART: [fht] FMC Alias Private Key: 7
25,880,574 UART: [art] Derive CDI
25,881,333 UART: [art] Store in in slot 0x4
25,923,975 UART: [art] Derive Key Pair
25,924,976 UART: [art] Store priv key in slot 0x5
29,166,796 UART: [art] Derive Key Pair - Done
29,180,115 UART: [art] Signing Cert with AUTHO
29,181,411 UART: RITY.KEYID = 7
31,461,409 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,913 UART: [art] PUB.X = 2D23AB680E5A77AF0041899A02F93405D8891A4F2B843A63DDAA8724D759895CBE41FC8FBFEC0A720C1633D36C7A0600
31,470,130 UART: [art] PUB.Y = 46D1FE4164113354D79E029DCE48223F81B70152217C2B3911B602F7E111C96711818B4EEBB01E6558203E94BDA4EC00
31,477,327 UART: [art] SIG.R = 325C109B1DE1A251200BA46A1E6334A6CFCB316A12606CBEEDCAD0911F3ED9EC4E7A4F9DEE1CED24AA98F3BB4FF0BEED
31,484,741 UART: [art] SIG.S = E6547FEE923A2C3D6A9C54973DB93E85B2DBC5C376D0E7B8C3A1A2679686ECEF7D0770AEAB6F385D291E9C96A18D20A2
32,790,173 UART: Caliptra RT
32,790,896 UART: [state] CFI Enabled
32,908,167 UART: [rt] RT listening for mailbox commands...
32,910,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,940,794 UART: [rt]cmd =0x44504543, len=96
38,613,157 >>> mbox cmd response data (6236 bytes)
38,643,672 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,674,117 UART: [rt]cmd =0x53574545, len=84
44,198,749 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
4,122,261 ready_for_fw is high
4,122,666 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,512 >>> mbox cmd response: success
23,703,039 UART:
23,703,448 UART: Running Caliptra FMC ...
23,704,590 UART:
23,704,755 UART: [state] CFI Enabled
23,713,089 UART: [fht] FMC Alias Private Key: 7
26,043,751 UART: [art] Extend RT PCRs Done
26,044,987 UART: [art] Lock RT PCRs Done
26,046,511 UART: [art] Populate DV Done
26,051,877 UART: [fht] FMC Alias Private Key: 7
26,053,532 UART: [art] Derive CDI
26,054,347 UART: [art] Store in in slot 0x4
26,096,943 UART: [art] Derive Key Pair
26,097,947 UART: [art] Store priv key in slot 0x5
29,339,777 UART: [art] Derive Key Pair - Done
29,353,101 UART: [art] Signing Cert with AUTHO
29,354,420 UART: RITY.KEYID = 7
31,634,072 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,581 UART: [art] PUB.X = D89428E82FF544949011983501092F79B3EA885718D2A2A2D3D11DEB91595480310F5EE742859F0A65B66E82FBBD6263
31,642,788 UART: [art] PUB.Y = E6A1CDD5FE135CDA0550A3FEA87B9B43FF2BDA24546757119253B9F7250C27E5B544A47C68A54AD054A23C6B81BE5DAD
31,650,078 UART: [art] SIG.R = 81342CC1E8C0C45F8C8FB2332D8E50063C8C50BC7E48200CC550DD83E073C94668FB65CFBFC2C7AED1959AB76C1DE54D
31,657,468 UART: [art] SIG.S = 78E8721CB9C2BB8974110208FE97E8245C271DC18BE2832A35E857A6C5F913C081E95381D91E66BB14C4298633B17607
32,962,384 UART: Caliptra RT
32,963,085 UART: [state] CFI Enabled
33,079,624 UART: [rt] RT listening for mailbox commands...
33,081,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,112,098 UART: [rt]cmd =0x44504543, len=96
38,784,384 >>> mbox cmd response data (6236 bytes)
38,814,064 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,844,866 UART: [rt]cmd =0x53574545, len=84
44,369,676 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
192,484 UART:
192,861 UART: Running Caliptra ROM ...
194,065 UART:
194,229 UART: [state] CFI Enabled
265,697 UART: [state] LifecycleState = Unprovisioned
267,600 UART: [state] DebugLocked = No
270,480 UART: [state] WD Timer not started. Device not locked for debugging
275,094 UART: [kat] SHA2-256
454,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,794 UART: [kat] ++
466,327 UART: [kat] sha1
477,862 UART: [kat] SHA2-256
480,870 UART: [kat] SHA2-384
487,140 UART: [kat] SHA2-512-ACC
490,073 UART: [kat] ECC-384
2,949,374 UART: [kat] HMAC-384Kdf
2,973,284 UART: [kat] LMS
3,502,749 UART: [kat] --
3,508,024 UART: [cold-reset] ++
3,509,884 UART: [fht] FHT @ 0x50003400
3,520,926 UART: [idev] ++
3,521,487 UART: [idev] CDI.KEYID = 6
3,522,513 UART: [idev] SUBJECT.KEYID = 7
3,523,611 UART: [idev] UDS.KEYID = 0
3,524,549 ready_for_fw is high
3,524,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,252 UART: [idev] Erasing UDS.KEYID = 0
6,030,881 UART: [idev] Sha1 KeyId Algorithm
6,053,258 UART: [idev] --
6,056,928 UART: [ldev] ++
6,057,498 UART: [ldev] CDI.KEYID = 6
6,058,409 UART: [ldev] SUBJECT.KEYID = 5
6,059,568 UART: [ldev] AUTHORITY.KEYID = 7
6,060,853 UART: [ldev] FE.KEYID = 1
6,103,162 UART: [ldev] Erasing FE.KEYID = 1
8,603,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,626 UART: [ldev] --
10,418,768 UART: [fwproc] Wait for Commands...
10,420,703 UART: [fwproc] Recv command 0x46574c44
10,422,814 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,276,410 >>> mbox cmd response: success
14,280,801 UART: [afmc] ++
14,281,393 UART: [afmc] CDI.KEYID = 6
14,282,302 UART: [afmc] SUBJECT.KEYID = 7
14,283,509 UART: [afmc] AUTHORITY.KEYID = 5
16,811,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,272 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,318 UART: [afmc] --
18,610,158 UART: [cold-reset] --
18,614,994 UART: [state] Locking Datavault
18,618,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,370 UART: [state] Locking ICCM
18,621,602 UART: [exit] Launching FMC @ 0x40000130
18,629,996 UART:
18,630,228 UART: Running Caliptra FMC ...
18,631,325 UART:
18,631,486 UART: [state] CFI Enabled
18,692,390 UART: [fht] FMC Alias Private Key: 7
20,456,368 UART: [art] Extend RT PCRs Done
20,457,574 UART: [art] Lock RT PCRs Done
20,459,301 UART: [art] Populate DV Done
20,464,978 UART: [fht] FMC Alias Private Key: 7
20,466,671 UART: [art] Derive CDI
20,467,482 UART: [art] Store in in slot 0x4
20,525,737 UART: [art] Derive Key Pair
20,526,772 UART: [art] Store priv key in slot 0x5
22,990,124 UART: [art] Derive Key Pair - Done
23,003,281 UART: [art] Signing Cert with AUTHO
23,004,584 UART: RITY.KEYID = 7
24,715,570 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,060 UART: [art] PUB.X = 80F4269DA47D6C82633DE9E219682C53DA5FF132CF64E8EB8046FC7D598385F69EA00EE281947D78490EBEA4363770C5
24,724,288 UART: [art] PUB.Y = 16C3EC5E3B62CE83F253B2C56B60C9A914AC7E6345D914B56E2A1A6170B2922C2734D0623F366FC946649B944FD54992
24,731,544 UART: [art] SIG.R = 8F32898317EF461DBB3F5A5150E785CF9EB644DF4F72DEB7D126D3392FCBA0CE17AA41E8034F418CB6E3EFE65C2F9AAA
24,739,048 UART: [art] SIG.S = 681E4FC379430A7113434E796A38D92674E6F16DA5A84AA542AEBE2CCEE698477A9A7B58AA9061D73274A377FD280F28
25,717,724 UART: Caliptra RT
25,718,448 UART: [state] CFI Enabled
25,882,447 UART: [rt] RT listening for mailbox commands...
25,884,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,664 UART: [rt]cmd =0x44504543, len=96
30,275,622 >>> mbox cmd response data (6236 bytes)
30,305,275 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,335,923 UART: [rt]cmd =0x53574545, len=84
34,513,994 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,359,101 ready_for_fw is high
3,359,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,041,460 >>> mbox cmd response: success
18,318,665 UART:
18,319,067 UART: Running Caliptra FMC ...
18,320,199 UART:
18,320,359 UART: [state] CFI Enabled
18,389,447 UART: [fht] FMC Alias Private Key: 7
20,154,087 UART: [art] Extend RT PCRs Done
20,155,320 UART: [art] Lock RT PCRs Done
20,156,865 UART: [art] Populate DV Done
20,162,280 UART: [fht] FMC Alias Private Key: 7
20,163,892 UART: [art] Derive CDI
20,164,712 UART: [art] Store in in slot 0x4
20,222,681 UART: [art] Derive Key Pair
20,223,724 UART: [art] Store priv key in slot 0x5
22,686,967 UART: [art] Derive Key Pair - Done
22,700,020 UART: [art] Signing Cert with AUTHO
22,701,330 UART: RITY.KEYID = 7
24,412,114 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,620 UART: [art] PUB.X = 7E111D77409F85E37073EFDA8BFBF9331140DEC1C40106039E5DD3E83D094ACFEF8052F13117EFC0A2E47C5EB15182AC
24,420,899 UART: [art] PUB.Y = 37AF68E0CEF69E19D5076E689FCEF4CC2E66CCDEA4D7F21A802FE3138057254A657B05F93B2A3A2F41A3E66A30C0A090
24,428,208 UART: [art] SIG.R = 085EA6555C747BC16EE665CC55E21385A5B493257A1DE434DA9D68501B4DCD2988A613CF79365AF97C88727AA07E36CA
24,435,594 UART: [art] SIG.S = EE86330AD1B24C48C1C3EEEA3969506C94FFD097B5AC7FBB0E5BFD6CF2BBEE7E7B865E555B76430A644C1909EE19EC63
25,414,750 UART: Caliptra RT
25,415,453 UART: [state] CFI Enabled
25,579,757 UART: [rt] RT listening for mailbox commands...
25,581,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,612,722 UART: [rt]cmd =0x44504543, len=96
29,970,185 >>> mbox cmd response data (6236 bytes)
29,999,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,030,780 UART: [rt]cmd =0x53574545, len=84
34,206,541 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
193,088 UART:
193,468 UART: Running Caliptra ROM ...
194,580 UART:
604,228 UART: [state] CFI Enabled
617,183 UART: [state] LifecycleState = Unprovisioned
619,063 UART: [state] DebugLocked = No
621,655 UART: [state] WD Timer not started. Device not locked for debugging
624,901 UART: [kat] SHA2-256
804,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,587 UART: [kat] ++
816,035 UART: [kat] sha1
827,120 UART: [kat] SHA2-256
830,134 UART: [kat] SHA2-384
835,277 UART: [kat] SHA2-512-ACC
838,217 UART: [kat] ECC-384
3,282,266 UART: [kat] HMAC-384Kdf
3,294,928 UART: [kat] LMS
3,824,374 UART: [kat] --
3,828,647 UART: [cold-reset] ++
3,830,227 UART: [fht] FHT @ 0x50003400
3,840,925 UART: [idev] ++
3,841,491 UART: [idev] CDI.KEYID = 6
3,842,374 UART: [idev] SUBJECT.KEYID = 7
3,843,617 UART: [idev] UDS.KEYID = 0
3,844,580 ready_for_fw is high
3,844,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,087 UART: [idev] Erasing UDS.KEYID = 0
6,319,221 UART: [idev] Sha1 KeyId Algorithm
6,341,693 UART: [idev] --
6,346,008 UART: [ldev] ++
6,346,583 UART: [ldev] CDI.KEYID = 6
6,347,493 UART: [ldev] SUBJECT.KEYID = 5
6,348,704 UART: [ldev] AUTHORITY.KEYID = 7
6,349,937 UART: [ldev] FE.KEYID = 1
6,360,964 UART: [ldev] Erasing FE.KEYID = 1
8,834,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,918 UART: [ldev] --
10,624,710 UART: [fwproc] Wait for Commands...
10,627,063 UART: [fwproc] Recv command 0x46574c44
10,629,168 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,479,531 >>> mbox cmd response: success
14,484,637 UART: [afmc] ++
14,485,231 UART: [afmc] CDI.KEYID = 6
14,486,140 UART: [afmc] SUBJECT.KEYID = 7
14,487,307 UART: [afmc] AUTHORITY.KEYID = 5
16,990,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,087 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,047 UART: [afmc] --
18,789,706 UART: [cold-reset] --
18,794,388 UART: [state] Locking Datavault
18,799,100 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,757 UART: [state] Locking ICCM
18,802,637 UART: [exit] Launching FMC @ 0x40000130
18,811,038 UART:
18,811,280 UART: Running Caliptra FMC ...
18,812,386 UART:
18,812,548 UART: [state] CFI Enabled
18,820,920 UART: [fht] FMC Alias Private Key: 7
20,578,194 UART: [art] Extend RT PCRs Done
20,579,693 UART: [art] Lock RT PCRs Done
20,581,094 UART: [art] Populate DV Done
20,586,390 UART: [fht] FMC Alias Private Key: 7
20,587,937 UART: [art] Derive CDI
20,588,674 UART: [art] Store in in slot 0x4
20,631,977 UART: [art] Derive Key Pair
20,633,019 UART: [art] Store priv key in slot 0x5
23,059,842 UART: [art] Derive Key Pair - Done
23,072,766 UART: [art] Signing Cert with AUTHO
23,074,078 UART: RITY.KEYID = 7
24,779,926 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,430 UART: [art] PUB.X = 82EFBEF574A21E8B3EDAF9125E50C7646F2C170AA0BAC74DA5753082AEB712E55449B9DC26F00D763281626A0A656235
24,788,730 UART: [art] PUB.Y = 8010FF47132E87DF89F09DD4E121098AAA2088938497F86F05C93F26338290B7079C9193164E69ADF86ACDB093F7D391
24,795,952 UART: [art] SIG.R = E71A683AE41761DB1C9CA7DE9A6765DAE153C7225075AFAD4FA90C966E07C32BE0232CE3F3255E6A8371969467AAC027
24,803,342 UART: [art] SIG.S = F60A850DF7231C2856A32AB7131194E1B07918641033CA897C30962C3F4A088242AA74CAAC9D1DFB7C81965EABA2989B
25,782,528 UART: Caliptra RT
25,783,242 UART: [state] CFI Enabled
25,900,533 UART: [rt] RT listening for mailbox commands...
25,902,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,321 UART: [rt]cmd =0x44504543, len=96
30,216,780 >>> mbox cmd response data (6236 bytes)
30,246,948 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,277,600 UART: [rt]cmd =0x53574545, len=84
34,413,668 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,441 writing to cptra_bootfsm_go
3,703,748 ready_for_fw is high
3,704,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,262,603 >>> mbox cmd response: success
18,511,567 UART:
18,511,963 UART: Running Caliptra FMC ...
18,513,068 UART:
18,513,224 UART: [state] CFI Enabled
18,520,955 UART: [fht] FMC Alias Private Key: 7
20,278,124 UART: [art] Extend RT PCRs Done
20,279,350 UART: [art] Lock RT PCRs Done
20,280,892 UART: [art] Populate DV Done
20,286,091 UART: [fht] FMC Alias Private Key: 7
20,287,690 UART: [art] Derive CDI
20,288,429 UART: [art] Store in in slot 0x4
20,330,643 UART: [art] Derive Key Pair
20,331,684 UART: [art] Store priv key in slot 0x5
22,758,747 UART: [art] Derive Key Pair - Done
22,771,755 UART: [art] Signing Cert with AUTHO
22,773,059 UART: RITY.KEYID = 7
24,478,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,766 UART: [art] PUB.X = 4E15C1A33C6C53445A9FD137648228462CFD45D72DBCFFDDA112D48947E71846076778013DD4B83255D9CEACDB5271E7
24,487,057 UART: [art] PUB.Y = 9719C761B75CBCDFEB321C779B02C6728F1E5C94D1F37A3B077903318EF139ACA1B1EAA094D14EC5FE85761FE39223DF
24,494,300 UART: [art] SIG.R = AC50666D9AA572D708FF6FDB88C17294D91DDEFE4860F1274AFC80142F664688F2FD410734EFAFC361BAFEA55D778860
24,501,740 UART: [art] SIG.S = F5BDF929ECD0F1E0908CF9BB661EF93E9D18D13C57FEE953C5ECE740B881019BE9B06CDD654E6D9409F9ED0CF0FA922E
25,480,530 UART: Caliptra RT
25,481,249 UART: [state] CFI Enabled
25,598,589 UART: [rt] RT listening for mailbox commands...
25,600,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,631,126 UART: [rt]cmd =0x44504543, len=96
29,912,993 >>> mbox cmd response data (6236 bytes)
29,943,006 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,973,479 UART: [rt]cmd =0x53574545, len=84
34,108,483 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,372 UART:
192,741 UART: Running Caliptra ROM ...
193,848 UART:
193,990 UART: [state] CFI Enabled
269,280 UART: [state] LifecycleState = Unprovisioned
271,643 UART: [state] DebugLocked = No
273,806 UART: [state] WD Timer not started. Device not locked for debugging
277,637 UART: [kat] SHA2-256
467,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,277 UART: [kat] ++
478,766 UART: [kat] sha1
489,572 UART: [kat] SHA2-256
492,583 UART: [kat] SHA2-384
499,429 UART: [kat] SHA2-512-ACC
502,012 UART: [kat] ECC-384
2,949,259 UART: [kat] HMAC-384Kdf
2,972,276 UART: [kat] LMS
3,504,038 UART: [kat] --
3,509,819 UART: [cold-reset] ++
3,510,970 UART: [fht] FHT @ 0x50003400
3,521,628 UART: [idev] ++
3,522,255 UART: [idev] CDI.KEYID = 6
3,523,207 UART: [idev] SUBJECT.KEYID = 7
3,524,451 UART: [idev] UDS.KEYID = 0
3,525,348 ready_for_fw is high
3,525,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,118 UART: [idev] Erasing UDS.KEYID = 0
6,030,121 UART: [idev] Sha1 KeyId Algorithm
6,052,228 UART: [idev] --
6,055,787 UART: [ldev] ++
6,056,484 UART: [ldev] CDI.KEYID = 6
6,057,395 UART: [ldev] SUBJECT.KEYID = 5
6,058,556 UART: [ldev] AUTHORITY.KEYID = 7
6,059,782 UART: [ldev] FE.KEYID = 1
6,101,443 UART: [ldev] Erasing FE.KEYID = 1
8,607,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,158 UART: [ldev] --
10,417,059 UART: [fwproc] Wait for Commands...
10,420,273 UART: [fwproc] Recv command 0x46574c44
10,422,576 UART: [fwproc] Recv'd Img size: 114084 bytes
13,858,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,048,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,589,442 >>> mbox cmd response: success
14,592,818 UART: [afmc] ++
14,593,527 UART: [afmc] CDI.KEYID = 6
14,594,693 UART: [afmc] SUBJECT.KEYID = 7
14,596,185 UART: [afmc] AUTHORITY.KEYID = 5
17,132,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,740 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,142 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,053 UART: [afmc] --
18,948,168 UART: [cold-reset] --
18,951,936 UART: [state] Locking Datavault
18,956,288 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,451 UART: [state] Locking ICCM
18,960,608 UART: [exit] Launching FMC @ 0x40000130
18,969,245 UART:
18,969,482 UART: Running Caliptra FMC ...
18,970,578 UART:
18,970,733 UART: [state] CFI Enabled
19,030,183 UART: [fht] FMC Alias Private Key: 7
20,794,753 UART: [art] Extend RT PCRs Done
20,795,978 UART: [art] Lock RT PCRs Done
20,797,437 UART: [art] Populate DV Done
20,802,850 UART: [fht] FMC Alias Private Key: 7
20,804,492 UART: [art] Derive CDI
20,805,320 UART: [art] Store in in slot 0x4
20,862,965 UART: [art] Derive Key Pair
20,864,005 UART: [art] Store priv key in slot 0x5
23,327,140 UART: [art] Derive Key Pair - Done
23,340,035 UART: [art] Signing Cert with AUTHO
23,341,348 UART: RITY.KEYID = 7
25,052,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,628 UART: [art] PUB.X = 53D5186059D6C95FFAE8915C6446858B4DE7A87841AD9E9EA4C554B2F4A5384EE4D9DC34B1B9349CB569D799A0D0F34F
25,060,888 UART: [art] PUB.Y = 9F6675D2CF27F799940FF12DED4ECD4580F2F8CAB5954A2AC3A36633373DADAAD203BE578C867DC0126E9CE179AE1B7A
25,068,176 UART: [art] SIG.R = 7D7AEA7CCCB2B8ACFF08642C96D42B2EE0AB60034AEBBC99008E131DE6F68E1FAEE2DC358DCE45418BC2683E187A626A
25,075,607 UART: [art] SIG.S = 66EC3204314EC30B65C863CDC9D3944238AA9457E9654FB7659D083FB336A833F3E5C71FEE0C6533A7F97F9110D0C723
26,054,524 UART: Caliptra RT
26,055,235 UART: [state] CFI Enabled
26,220,760 UART: [rt] RT listening for mailbox commands...
26,222,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,860 UART: [rt]cmd =0x44504543, len=96
30,632,004 >>> mbox cmd response data (6236 bytes)
30,661,651 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,692,558 UART: [rt]cmd =0x53574545, len=84
34,871,699 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,439,715 ready_for_fw is high
3,440,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,707,635 >>> mbox cmd response: success
19,003,537 UART:
19,003,950 UART: Running Caliptra FMC ...
19,005,095 UART:
19,005,267 UART: [state] CFI Enabled
19,069,767 UART: [fht] FMC Alias Private Key: 7
20,833,820 UART: [art] Extend RT PCRs Done
20,835,048 UART: [art] Lock RT PCRs Done
20,836,843 UART: [art] Populate DV Done
20,842,331 UART: [fht] FMC Alias Private Key: 7
20,843,889 UART: [art] Derive CDI
20,844,704 UART: [art] Store in in slot 0x4
20,902,504 UART: [art] Derive Key Pair
20,903,500 UART: [art] Store priv key in slot 0x5
23,366,492 UART: [art] Derive Key Pair - Done
23,379,390 UART: [art] Signing Cert with AUTHO
23,380,700 UART: RITY.KEYID = 7
25,092,120 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,634 UART: [art] PUB.X = 3ACD4B42FB0A34A0558260AE82CA729D4D02FE2353B26DA5DF6F9B5DF1A8059D0085419215544BA33EF5F15EE5F705EF
25,100,918 UART: [art] PUB.Y = 74A8919608E63B1A0F00B2CE54EB68613F2A66E324696C092CB5297B0F399AE19B26EB2FBEAAC8DFC8056098AC99AB62
25,108,151 UART: [art] SIG.R = EE8F80DDF705D3F32B6317FBA33FBD063B31933B587F4434D07A3697954F092DCCC755DAC3BAA903E7D2BA1FB06E0590
25,115,529 UART: [art] SIG.S = 5EC4FB4AD7633C7217BB089BE284316A4577975E01563FE990501E633A8D20F919EF4BCFD8C9F9DEDF4C5BB7B225C0CD
26,094,786 UART: Caliptra RT
26,095,504 UART: [state] CFI Enabled
26,259,181 UART: [rt] RT listening for mailbox commands...
26,261,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,247 UART: [rt]cmd =0x44504543, len=96
30,650,928 >>> mbox cmd response data (6236 bytes)
30,680,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,711,041 UART: [rt]cmd =0x53574545, len=84
34,889,628 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,654 writing to cptra_bootfsm_go
192,877 UART:
193,257 UART: Running Caliptra ROM ...
194,460 UART:
603,892 UART: [state] CFI Enabled
620,352 UART: [state] LifecycleState = Unprovisioned
622,731 UART: [state] DebugLocked = No
624,975 UART: [state] WD Timer not started. Device not locked for debugging
630,154 UART: [kat] SHA2-256
820,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,795 UART: [kat] ++
831,320 UART: [kat] sha1
843,550 UART: [kat] SHA2-256
846,598 UART: [kat] SHA2-384
851,960 UART: [kat] SHA2-512-ACC
854,552 UART: [kat] ECC-384
3,295,402 UART: [kat] HMAC-384Kdf
3,308,226 UART: [kat] LMS
3,840,091 UART: [kat] --
3,844,965 UART: [cold-reset] ++
3,845,908 UART: [fht] FHT @ 0x50003400
3,857,192 UART: [idev] ++
3,857,829 UART: [idev] CDI.KEYID = 6
3,858,812 UART: [idev] SUBJECT.KEYID = 7
3,860,067 UART: [idev] UDS.KEYID = 0
3,860,995 ready_for_fw is high
3,861,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,488 UART: [idev] Erasing UDS.KEYID = 0
6,337,668 UART: [idev] Sha1 KeyId Algorithm
6,359,428 UART: [idev] --
6,364,043 UART: [ldev] ++
6,364,736 UART: [ldev] CDI.KEYID = 6
6,365,650 UART: [ldev] SUBJECT.KEYID = 5
6,366,810 UART: [ldev] AUTHORITY.KEYID = 7
6,368,041 UART: [ldev] FE.KEYID = 1
6,379,122 UART: [ldev] Erasing FE.KEYID = 1
8,860,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,546 UART: [ldev] --
10,652,810 UART: [fwproc] Wait for Commands...
10,655,228 UART: [fwproc] Recv command 0x46574c44
10,657,481 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,831,299 >>> mbox cmd response: success
14,834,670 UART: [afmc] ++
14,835,529 UART: [afmc] CDI.KEYID = 6
14,836,556 UART: [afmc] SUBJECT.KEYID = 7
14,838,060 UART: [afmc] AUTHORITY.KEYID = 5
17,343,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,758 UART: [afmc] --
19,142,111 UART: [cold-reset] --
19,146,199 UART: [state] Locking Datavault
19,150,862 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,013 UART: [state] Locking ICCM
19,155,011 UART: [exit] Launching FMC @ 0x40000130
19,163,678 UART:
19,163,927 UART: Running Caliptra FMC ...
19,165,033 UART:
19,165,194 UART: [state] CFI Enabled
19,172,884 UART: [fht] FMC Alias Private Key: 7
20,929,545 UART: [art] Extend RT PCRs Done
20,930,758 UART: [art] Lock RT PCRs Done
20,932,868 UART: [art] Populate DV Done
20,938,115 UART: [fht] FMC Alias Private Key: 7
20,939,657 UART: [art] Derive CDI
20,940,470 UART: [art] Store in in slot 0x4
20,982,848 UART: [art] Derive Key Pair
20,983,853 UART: [art] Store priv key in slot 0x5
23,410,086 UART: [art] Derive Key Pair - Done
23,423,258 UART: [art] Signing Cert with AUTHO
23,424,568 UART: RITY.KEYID = 7
25,130,178 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,686 UART: [art] PUB.X = EEC06B5672E80E3EC1C313C3DCE70F3180EE9B567D220CAE0526AB09A06B8E14A6607B55CF8C87B2D7AF2E312B049D06
25,138,962 UART: [art] PUB.Y = 850665D18D1DDABD73957FE4590DDA90A49E6FC2ECB7BBC3C4240A792F0DF5E9A0111AF8B397D668F734AAFFB32C578A
25,146,283 UART: [art] SIG.R = 3BA7ABACAE2D374AEC83E3B7FF08C127FE5D622A61F291C6FC6406293169B6E00C01829C4E1AE31F413142221C8D8B5E
25,153,672 UART: [art] SIG.S = 62AE3F6638DA283FE928F7C69F4B7E3A3C9575CAB55B1879B07351553ABCAEA84A807DBAE642C6AF20DF3C068D347010
26,132,455 UART: Caliptra RT
26,133,145 UART: [state] CFI Enabled
26,249,695 UART: [rt] RT listening for mailbox commands...
26,251,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,318 UART: [rt]cmd =0x44504543, len=96
30,565,431 >>> mbox cmd response data (6236 bytes)
30,594,865 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,625,657 UART: [rt]cmd =0x53574545, len=84
34,761,008 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
3,758,129 ready_for_fw is high
3,758,535 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,939,616 >>> mbox cmd response: success
19,194,993 UART:
19,195,389 UART: Running Caliptra FMC ...
19,196,588 UART:
19,196,757 UART: [state] CFI Enabled
19,204,719 UART: [fht] FMC Alias Private Key: 7
20,961,817 UART: [art] Extend RT PCRs Done
20,963,034 UART: [art] Lock RT PCRs Done
20,964,562 UART: [art] Populate DV Done
20,970,096 UART: [fht] FMC Alias Private Key: 7
20,971,666 UART: [art] Derive CDI
20,972,489 UART: [art] Store in in slot 0x4
21,015,038 UART: [art] Derive Key Pair
21,016,092 UART: [art] Store priv key in slot 0x5
23,443,080 UART: [art] Derive Key Pair - Done
23,455,829 UART: [art] Signing Cert with AUTHO
23,457,137 UART: RITY.KEYID = 7
25,162,605 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,237 UART: [art] PUB.X = C3BDD7BF8E3497108F41C6155917DBD0529FBD7A3076E25E3477260B8CFE1845AD6F9B845E6C8D31CA2FC6B6C81F5A28
25,171,365 UART: [art] PUB.Y = 0C6B06515D6D769CD0DB47BFA637D32C5537119C7E2079B994A149B392F8FF1897DD900B18566409869D612DF1000DC1
25,178,625 UART: [art] SIG.R = 625021BD4D826A090D5030AD5CDEE70815D983E95479DCD9BD2B366747A847F3DD13484279113E5C0C4CE8795D88A780
25,186,016 UART: [art] SIG.S = D5255141E97CF958EDBE74EF0C9718C08DBB8D1D8F83083C1653C9CE11E6028609BF7C66E37D2A0C422A86F4B1E40440
26,165,215 UART: Caliptra RT
26,165,932 UART: [state] CFI Enabled
26,283,908 UART: [rt] RT listening for mailbox commands...
26,285,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,546 UART: [rt]cmd =0x44504543, len=96
30,598,670 >>> mbox cmd response data (6236 bytes)
30,628,546 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,659,062 UART: [rt]cmd =0x53574545, len=84
34,793,967 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,701 UART: [kat] SHA2-256
881,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,747 UART: [kat] ++
885,899 UART: [kat] sha1
889,913 UART: [kat] SHA2-256
891,851 UART: [kat] SHA2-384
894,676 UART: [kat] SHA2-512-ACC
896,577 UART: [kat] ECC-384
902,096 UART: [kat] HMAC-384Kdf
906,768 UART: [kat] LMS
1,474,964 UART: [kat] --
1,475,631 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,478,948 UART: [idev] ++
1,479,116 UART: [idev] CDI.KEYID = 6
1,479,476 UART: [idev] SUBJECT.KEYID = 7
1,479,900 UART: [idev] UDS.KEYID = 0
1,480,245 ready_for_fw is high
1,480,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,390 UART: [idev] Erasing UDS.KEYID = 0
1,504,128 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,774 UART: [idev] --
1,513,841 UART: [ldev] ++
1,514,009 UART: [ldev] CDI.KEYID = 6
1,514,372 UART: [ldev] SUBJECT.KEYID = 5
1,514,798 UART: [ldev] AUTHORITY.KEYID = 7
1,515,261 UART: [ldev] FE.KEYID = 1
1,520,701 UART: [ldev] Erasing FE.KEYID = 1
1,546,164 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,650 UART: [ldev] --
1,584,983 UART: [fwproc] Waiting for Commands...
1,585,802 UART: [fwproc] Received command 0x46574c44
1,586,593 UART: [fwproc] Received Image of size 114084 bytes
2,880,941 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,038 >>> mbox cmd response: success
3,074,084 UART: [afmc] ++
3,074,252 UART: [afmc] CDI.KEYID = 6
3,074,614 UART: [afmc] SUBJECT.KEYID = 7
3,075,039 UART: [afmc] AUTHORITY.KEYID = 5
3,110,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,202 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,710 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,595 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,285 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,050 UART: [afmc] --
3,153,036 UART: [cold-reset] --
3,154,094 UART: [state] Locking Datavault
3,155,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,971 UART: [state] Locking ICCM
3,156,593 UART: [exit] Launching FMC @ 0x40000130
3,161,922 UART:
3,161,938 UART: Running Caliptra FMC ...
3,162,346 UART:
3,162,400 UART: [state] CFI Enabled
3,172,895 UART: [fht] FMC Alias Private Key: 7
3,281,218 UART: [art] Extend RT PCRs Done
3,281,646 UART: [art] Lock RT PCRs Done
3,283,308 UART: [art] Populate DV Done
3,291,441 UART: [fht] FMC Alias Private Key: 7
3,292,381 UART: [art] Derive CDI
3,292,661 UART: [art] Store in in slot 0x4
3,378,256 UART: [art] Derive Key Pair
3,378,616 UART: [art] Store priv key in slot 0x5
3,391,266 UART: [art] Derive Key Pair - Done
3,406,128 UART: [art] Signing Cert with AUTHO
3,406,608 UART: RITY.KEYID = 7
3,422,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,795 UART: [art] PUB.X = 9471691369E857FF548007D31DE5371589FEBDD7A1535188EF0B61315CE91A106C35D33EFBE38FEF530F9AAB8AA53DA7
3,429,564 UART: [art] PUB.Y = DFC83E6FB6B918A57A3E06EA92C926EDE131DFFADC24FA489B0FD8478706A4944595FEFC944FE0283C58A8C896CD6B55
3,436,523 UART: [art] SIG.R = B53D62CB36345185A6D104EFEF2DBBA83D7653D4E85D0C069B81A8CBE3D17F0D640032BDFC24CF2FCFAEB3942389D1A7
3,443,279 UART: [art] SIG.S = E6A59C7A2A390191716CD90BFAD55A86A55341AEE6A20A8AE23DE69A689C3D932FB58F5F01EB8918C710A7F388894EB3
3,466,948 UART: Caliptra RT
3,467,201 UART: [state] CFI Enabled
3,574,833 UART: [rt] RT listening for mailbox commands...
3,575,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,971 UART: [rt]cmd =0x44504543, len=96
3,784,978 >>> mbox cmd response data (6236 bytes)
3,784,979 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,866 UART: [rt]cmd =0x53574545, len=84
3,840,259 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,351 ready_for_fw is high
1,362,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,478 >>> mbox cmd response: success
2,983,518 UART:
2,983,534 UART: Running Caliptra FMC ...
2,983,942 UART:
2,983,996 UART: [state] CFI Enabled
2,994,487 UART: [fht] FMC Alias Private Key: 7
3,102,256 UART: [art] Extend RT PCRs Done
3,102,684 UART: [art] Lock RT PCRs Done
3,103,924 UART: [art] Populate DV Done
3,112,217 UART: [fht] FMC Alias Private Key: 7
3,113,385 UART: [art] Derive CDI
3,113,665 UART: [art] Store in in slot 0x4
3,199,288 UART: [art] Derive Key Pair
3,199,648 UART: [art] Store priv key in slot 0x5
3,212,776 UART: [art] Derive Key Pair - Done
3,227,860 UART: [art] Signing Cert with AUTHO
3,228,340 UART: RITY.KEYID = 7
3,243,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,241 UART: [art] PUB.X = B9E9480D8C105FCEA326E194D0EBF4D99D7459485DBB1A7B7F3D08DD051D801D28D4494E5141C9C55D1C64EEC13CB5FA
3,251,018 UART: [art] PUB.Y = ECABDF9793DE2B7CCB06C991336274F4993D49251CC012D788F075205CAEA4EE9BC484E342F1FB529A28FEEE4C9A931E
3,257,981 UART: [art] SIG.R = 2FECBCDFAFC59322B3C9C70D2A072F21FC596E3E60934A1C886CA029CAC6C52544C9E76AB3BB5FF792E6C05EEB3D7428
3,264,767 UART: [art] SIG.S = 6C8519DFE68861A0D9540E583A3D69A6D38E24E157A612DBC939BDCDDD082F799BC816FD7160C57F65635D924E549858
3,288,820 UART: Caliptra RT
3,289,073 UART: [state] CFI Enabled
3,397,295 UART: [rt] RT listening for mailbox commands...
3,397,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,247 UART: [rt]cmd =0x44504543, len=96
3,608,460 >>> mbox cmd response data (6236 bytes)
3,608,461 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,246 UART: [rt]cmd =0x53574545, len=84
3,663,535 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,847 UART: [state] LifecycleState = Unprovisioned
86,502 UART: [state] DebugLocked = No
87,018 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,354 UART: [fht] Storing FHT @ 0x50003400
1,480,241 UART: [idev] ++
1,480,409 UART: [idev] CDI.KEYID = 6
1,480,769 UART: [idev] SUBJECT.KEYID = 7
1,481,193 UART: [idev] UDS.KEYID = 0
1,481,538 ready_for_fw is high
1,481,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,781 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,502 UART: [ldev] ++
1,515,670 UART: [ldev] CDI.KEYID = 6
1,516,033 UART: [ldev] SUBJECT.KEYID = 5
1,516,459 UART: [ldev] AUTHORITY.KEYID = 7
1,516,922 UART: [ldev] FE.KEYID = 1
1,522,156 UART: [ldev] Erasing FE.KEYID = 1
1,547,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,095 UART: [ldev] --
1,587,580 UART: [fwproc] Waiting for Commands...
1,588,353 UART: [fwproc] Received command 0x46574c44
1,589,144 UART: [fwproc] Received Image of size 114084 bytes
2,883,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,451 >>> mbox cmd response: success
3,076,575 UART: [afmc] ++
3,076,743 UART: [afmc] CDI.KEYID = 6
3,077,105 UART: [afmc] SUBJECT.KEYID = 7
3,077,530 UART: [afmc] AUTHORITY.KEYID = 5
3,112,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,968 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,658 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,529 UART: [afmc] --
3,155,561 UART: [cold-reset] --
3,156,405 UART: [state] Locking Datavault
3,157,626 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,230 UART: [state] Locking ICCM
3,158,728 UART: [exit] Launching FMC @ 0x40000130
3,164,057 UART:
3,164,073 UART: Running Caliptra FMC ...
3,164,481 UART:
3,164,624 UART: [state] CFI Enabled
3,175,325 UART: [fht] FMC Alias Private Key: 7
3,283,150 UART: [art] Extend RT PCRs Done
3,283,578 UART: [art] Lock RT PCRs Done
3,285,364 UART: [art] Populate DV Done
3,293,491 UART: [fht] FMC Alias Private Key: 7
3,294,503 UART: [art] Derive CDI
3,294,783 UART: [art] Store in in slot 0x4
3,380,320 UART: [art] Derive Key Pair
3,380,680 UART: [art] Store priv key in slot 0x5
3,394,198 UART: [art] Derive Key Pair - Done
3,408,792 UART: [art] Signing Cert with AUTHO
3,409,272 UART: RITY.KEYID = 7
3,424,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,209 UART: [art] PUB.X = 5E0FD44053B1816FF536064940E3F06315C4727E0FAE35C1239B589160164299A53914A590B9B94CF94F5CADE8754C41
3,431,962 UART: [art] PUB.Y = FF2F2303CA062F7C4F2B2D4CDA8CB56EFA5F7F2864D36B7DC887AFEB7120A6CF007B4143E3E2E2DD49A13D2AED73E880
3,438,908 UART: [art] SIG.R = 414470CA4B0BB67D5935B384161C90DB90805AE6D71FC9BE50DDEA86A795C34D922C5D90A4B0BD84947B2627EBA69DB9
3,445,685 UART: [art] SIG.S = 8D1DEFFD2435F05489E302D605EF02895F7825B4D0F4070048BBA3CA9BB15007354039A3F98593B5F1B7D5758DD2EAB2
3,469,595 UART: Caliptra RT
3,469,940 UART: [state] CFI Enabled
3,578,491 UART: [rt] RT listening for mailbox commands...
3,579,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,529 UART: [rt]cmd =0x44504543, len=96
3,790,086 >>> mbox cmd response data (6236 bytes)
3,790,087 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,108 UART: [rt]cmd =0x53574545, len=84
3,846,593 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,460 ready_for_fw is high
1,362,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,481 >>> mbox cmd response: success
2,987,121 UART:
2,987,137 UART: Running Caliptra FMC ...
2,987,545 UART:
2,987,688 UART: [state] CFI Enabled
2,998,293 UART: [fht] FMC Alias Private Key: 7
3,105,596 UART: [art] Extend RT PCRs Done
3,106,024 UART: [art] Lock RT PCRs Done
3,107,320 UART: [art] Populate DV Done
3,115,545 UART: [fht] FMC Alias Private Key: 7
3,116,675 UART: [art] Derive CDI
3,116,955 UART: [art] Store in in slot 0x4
3,202,708 UART: [art] Derive Key Pair
3,203,068 UART: [art] Store priv key in slot 0x5
3,216,218 UART: [art] Derive Key Pair - Done
3,230,975 UART: [art] Signing Cert with AUTHO
3,231,455 UART: RITY.KEYID = 7
3,246,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,138 UART: [art] PUB.X = 970430C499DB54DE135215A609B7CEE14EF5305114D1B29EB2AFB28EF638BE85216394C0B5C932055BA7A60A55C7C04B
3,253,900 UART: [art] PUB.Y = 53A0BFC2E7396C1930531854DE9F296C3847F2E5B98704C75D3C34B664993D8B86A791E81D33495333226D7F74165C4F
3,260,837 UART: [art] SIG.R = 537451AA2CCD62B7918A87058075D660DD7276C5B816A7009104B42392EF8224EA5C536C69A254553F8C20ED68EFF0B5
3,267,575 UART: [art] SIG.S = 5603054FB4894781170E0D8C0699725107E71233E11375E5D63EE56E92D69CCC718E6FA79F44DC905C505D505EE3ACC4
3,291,226 UART: Caliptra RT
3,291,571 UART: [state] CFI Enabled
3,399,501 UART: [rt] RT listening for mailbox commands...
3,400,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,701 UART: [rt]cmd =0x44504543, len=96
3,612,180 >>> mbox cmd response data (6236 bytes)
3,612,181 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,868 UART: [rt]cmd =0x53574545, len=84
3,668,471 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,225 UART: [kat] SHA2-256
904,165 UART: [kat] SHA2-384
907,012 UART: [kat] SHA2-512-ACC
908,913 UART: [kat] ECC-384
918,556 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,327 UART: [cold-reset] ++
1,172,865 UART: [fht] FHT @ 0x50003400
1,175,632 UART: [idev] ++
1,175,800 UART: [idev] CDI.KEYID = 6
1,176,160 UART: [idev] SUBJECT.KEYID = 7
1,176,584 UART: [idev] UDS.KEYID = 0
1,176,929 ready_for_fw is high
1,176,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,623 UART: [idev] Sha1 KeyId Algorithm
1,210,175 UART: [idev] --
1,211,115 UART: [ldev] ++
1,211,283 UART: [ldev] CDI.KEYID = 6
1,211,646 UART: [ldev] SUBJECT.KEYID = 5
1,212,072 UART: [ldev] AUTHORITY.KEYID = 7
1,212,535 UART: [ldev] FE.KEYID = 1
1,217,893 UART: [ldev] Erasing FE.KEYID = 1
1,245,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,423 UART: [ldev] --
1,284,804 UART: [fwproc] Wait for Commands...
1,285,436 UART: [fwproc] Recv command 0x46574c44
1,286,164 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,327 >>> mbox cmd response: success
2,774,553 UART: [afmc] ++
2,774,721 UART: [afmc] CDI.KEYID = 6
2,775,083 UART: [afmc] SUBJECT.KEYID = 7
2,775,508 UART: [afmc] AUTHORITY.KEYID = 5
2,810,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,274 UART: [afmc] --
2,854,376 UART: [cold-reset] --
2,855,118 UART: [state] Locking Datavault
2,856,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,139 UART: [state] Locking ICCM
2,857,741 UART: [exit] Launching FMC @ 0x40000130
2,863,070 UART:
2,863,086 UART: Running Caliptra FMC ...
2,863,494 UART:
2,863,548 UART: [state] CFI Enabled
2,874,043 UART: [fht] FMC Alias Private Key: 7
2,981,736 UART: [art] Extend RT PCRs Done
2,982,164 UART: [art] Lock RT PCRs Done
2,983,704 UART: [art] Populate DV Done
2,991,939 UART: [fht] FMC Alias Private Key: 7
2,992,949 UART: [art] Derive CDI
2,993,229 UART: [art] Store in in slot 0x4
3,078,848 UART: [art] Derive Key Pair
3,079,208 UART: [art] Store priv key in slot 0x5
3,092,868 UART: [art] Derive Key Pair - Done
3,107,501 UART: [art] Signing Cert with AUTHO
3,107,981 UART: RITY.KEYID = 7
3,123,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,938 UART: [art] PUB.X = 75EB5ADCCB0A9E3BD4A6526B03E6F541666F4B9185DF79AD50605E49C7DF98C6326D3FC1FCDC80450E0B423B97B2A1FF
3,130,714 UART: [art] PUB.Y = C4F3E8B492862AE01AB0CF948E542BDEAC2C4E16B002A2C39C9F2B18EDADA0C7B74B9D1522DF4A728F0759C8F8857AE3
3,137,678 UART: [art] SIG.R = 163844FFC0F75AE733C4D8034C62EB95301B9E2EFAB98F3988AF0A51EA8878716FD9FBF8F9AFD291F0BCF103C440101A
3,144,453 UART: [art] SIG.S = 0E65AF509E747D718790BB6B6D079F54AEEC1E281E62A0E2614A93B9A3A095A3CB3DA238C0A38994442DD5995C3A72E4
3,168,098 UART: Caliptra RT
3,168,351 UART: [state] CFI Enabled
3,275,958 UART: [rt] RT listening for mailbox commands...
3,276,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,048 UART: [rt]cmd =0x44504543, len=96
3,486,183 >>> mbox cmd response data (6236 bytes)
3,486,184 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,037 UART: [rt]cmd =0x53574545, len=84
3,541,732 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,573 ready_for_fw is high
1,060,573 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,340 >>> mbox cmd response: success
2,685,524 UART:
2,685,540 UART: Running Caliptra FMC ...
2,685,948 UART:
2,686,002 UART: [state] CFI Enabled
2,696,575 UART: [fht] FMC Alias Private Key: 7
2,804,320 UART: [art] Extend RT PCRs Done
2,804,748 UART: [art] Lock RT PCRs Done
2,806,516 UART: [art] Populate DV Done
2,814,895 UART: [fht] FMC Alias Private Key: 7
2,815,875 UART: [art] Derive CDI
2,816,155 UART: [art] Store in in slot 0x4
2,901,796 UART: [art] Derive Key Pair
2,902,156 UART: [art] Store priv key in slot 0x5
2,915,474 UART: [art] Derive Key Pair - Done
2,930,064 UART: [art] Signing Cert with AUTHO
2,930,544 UART: RITY.KEYID = 7
2,946,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,801 UART: [art] PUB.X = C6248B4A6A134B654D050A5602A86523B1B1F7114A5B2DC15C0A03840BEAFC7CFD3EAB24EBB71502FDB867DA76D1F5B3
2,953,566 UART: [art] PUB.Y = 483C5AA02882E78175E241893F2AC889610FED9E5505416B65AA509589C6F1EE62363ECD15E007C3DE165B7E00BAC6A8
2,960,487 UART: [art] SIG.R = A4C38B074EEEEEADBFABB8684CD504DE39FB27C3FAEEE108F977A325D75003F2C1800DD215553F23C743551B126C16B2
2,967,258 UART: [art] SIG.S = CCB2E0546BD139CA3C2E93FB50D0FD36277D6228CC2F339DAFF20E5D5366AA167BF841454BB2CA1B4A646DC77549EF90
2,991,352 UART: Caliptra RT
2,991,605 UART: [state] CFI Enabled
3,098,145 UART: [rt] RT listening for mailbox commands...
3,098,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,381 UART: [rt]cmd =0x44504543, len=96
3,309,641 >>> mbox cmd response data (6236 bytes)
3,309,642 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,483 UART: [rt]cmd =0x53574545, len=84
3,364,266 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,110 UART: [kat] SHA2-256
904,050 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,935 UART: [kat] HMAC-384Kdf
923,621 UART: [kat] LMS
1,171,949 UART: [kat] --
1,172,810 UART: [cold-reset] ++
1,173,294 UART: [fht] FHT @ 0x50003400
1,175,951 UART: [idev] ++
1,176,119 UART: [idev] CDI.KEYID = 6
1,176,479 UART: [idev] SUBJECT.KEYID = 7
1,176,903 UART: [idev] UDS.KEYID = 0
1,177,248 ready_for_fw is high
1,177,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,851 UART: [idev] Erasing UDS.KEYID = 0
1,202,344 UART: [idev] Sha1 KeyId Algorithm
1,210,766 UART: [idev] --
1,211,766 UART: [ldev] ++
1,211,934 UART: [ldev] CDI.KEYID = 6
1,212,297 UART: [ldev] SUBJECT.KEYID = 5
1,212,723 UART: [ldev] AUTHORITY.KEYID = 7
1,213,186 UART: [ldev] FE.KEYID = 1
1,218,350 UART: [ldev] Erasing FE.KEYID = 1
1,244,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,888 UART: [ldev] --
1,284,281 UART: [fwproc] Wait for Commands...
1,285,087 UART: [fwproc] Recv command 0x46574c44
1,285,815 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,834 >>> mbox cmd response: success
2,773,904 UART: [afmc] ++
2,774,072 UART: [afmc] CDI.KEYID = 6
2,774,434 UART: [afmc] SUBJECT.KEYID = 7
2,774,859 UART: [afmc] AUTHORITY.KEYID = 5
2,811,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,873 UART: [afmc] --
2,854,817 UART: [cold-reset] --
2,855,551 UART: [state] Locking Datavault
2,856,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,560 UART: [state] Locking ICCM
2,857,980 UART: [exit] Launching FMC @ 0x40000130
2,863,309 UART:
2,863,325 UART: Running Caliptra FMC ...
2,863,733 UART:
2,863,876 UART: [state] CFI Enabled
2,874,613 UART: [fht] FMC Alias Private Key: 7
2,982,952 UART: [art] Extend RT PCRs Done
2,983,380 UART: [art] Lock RT PCRs Done
2,985,048 UART: [art] Populate DV Done
2,993,359 UART: [fht] FMC Alias Private Key: 7
2,994,323 UART: [art] Derive CDI
2,994,603 UART: [art] Store in in slot 0x4
3,080,848 UART: [art] Derive Key Pair
3,081,208 UART: [art] Store priv key in slot 0x5
3,094,706 UART: [art] Derive Key Pair - Done
3,109,381 UART: [art] Signing Cert with AUTHO
3,109,861 UART: RITY.KEYID = 7
3,125,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,946 UART: [art] PUB.X = 8FE289B48ACB2BAD74D425084B3BA81DACF9D4194C97DD93E473DFA66E5D3FFAC09CB7F9146938510DC1174F89F2A87D
3,132,728 UART: [art] PUB.Y = B2B220C332E6461F2526081B710F541DF3E6DC2FB4ED7E570C335E85AB62736F210F26F6D4485DDD742D4FDFC9CC0CAB
3,139,677 UART: [art] SIG.R = 0A1E7DEEF476036BAF8AD89F482E707EE6C1B2A9329B10EB51C605C830F589D43D149403CAFC86373BBDC2E40D17898D
3,146,444 UART: [art] SIG.S = 49485C84E831A1564FD847EB26276A14B407DBC13F90C20EA66B3E8787DDD39BD0AA6E0A73FFD0EC1085666D8E9A4545
3,170,050 UART: Caliptra RT
3,170,395 UART: [state] CFI Enabled
3,278,408 UART: [rt] RT listening for mailbox commands...
3,279,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,706 UART: [rt]cmd =0x44504543, len=96
3,490,159 >>> mbox cmd response data (6236 bytes)
3,490,160 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,109 UART: [rt]cmd =0x53574545, len=84
3,545,966 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,540 ready_for_fw is high
1,060,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,797 >>> mbox cmd response: success
2,683,205 UART:
2,683,221 UART: Running Caliptra FMC ...
2,683,629 UART:
2,683,772 UART: [state] CFI Enabled
2,694,689 UART: [fht] FMC Alias Private Key: 7
2,803,178 UART: [art] Extend RT PCRs Done
2,803,606 UART: [art] Lock RT PCRs Done
2,805,052 UART: [art] Populate DV Done
2,813,369 UART: [fht] FMC Alias Private Key: 7
2,814,521 UART: [art] Derive CDI
2,814,801 UART: [art] Store in in slot 0x4
2,900,578 UART: [art] Derive Key Pair
2,900,938 UART: [art] Store priv key in slot 0x5
2,914,904 UART: [art] Derive Key Pair - Done
2,929,958 UART: [art] Signing Cert with AUTHO
2,930,438 UART: RITY.KEYID = 7
2,945,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,583 UART: [art] PUB.X = 4B779AE4E048F6C93CCE8DEA9F567F9E78471A1B8DF921648966B9DA07FE259BB21258253D93F2D60E934103A517DCD0
2,953,350 UART: [art] PUB.Y = 125DE1E5DBEB71912DCB8CE9DE166738DE21EBB70A953E24DBB5CBBACC6EB5CA254730F4C46A5FF186B17351BDFA8272
2,960,323 UART: [art] SIG.R = 18D722EF6754D6C4D444DAD980CD4AFE0CB62316ADE42034E2EC5BE7F03FBF85D63B0DF6D5BE9EED80E4D00E1A7A36D1
2,967,110 UART: [art] SIG.S = 658E117E77C5E3AA642323AA355469DF3527C1F1FE419FDE5D507A9260D2FF26EB0AAA279CA3499827866E1B47BE78E9
2,990,796 UART: Caliptra RT
2,991,141 UART: [state] CFI Enabled
3,099,230 UART: [rt] RT listening for mailbox commands...
3,099,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,292 UART: [rt]cmd =0x44504543, len=96
3,310,430 >>> mbox cmd response data (6236 bytes)
3,310,431 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,470 UART: [rt]cmd =0x53574545, len=84
3,366,139 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,790 UART: [kat] SHA2-512-ACC
906,691 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,174,621 ready_for_fw is high
1,174,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,455 UART: [idev] Erasing UDS.KEYID = 0
1,199,647 UART: [idev] Sha1 KeyId Algorithm
1,208,635 UART: [idev] --
1,209,564 UART: [ldev] ++
1,209,732 UART: [ldev] CDI.KEYID = 6
1,210,096 UART: [ldev] SUBJECT.KEYID = 5
1,210,523 UART: [ldev] AUTHORITY.KEYID = 7
1,210,986 UART: [ldev] FE.KEYID = 1
1,216,240 UART: [ldev] Erasing FE.KEYID = 1
1,242,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,718 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,783 >>> mbox cmd response: success
2,769,806 UART: [afmc] ++
2,769,974 UART: [afmc] CDI.KEYID = 6
2,770,337 UART: [afmc] SUBJECT.KEYID = 7
2,770,763 UART: [afmc] AUTHORITY.KEYID = 5
2,806,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,814 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,416 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,183 UART: [afmc] --
2,849,085 UART: [cold-reset] --
2,849,877 UART: [state] Locking Datavault
2,851,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,724 UART: [state] Locking ICCM
2,852,160 UART: [exit] Launching FMC @ 0x40000130
2,857,489 UART:
2,857,505 UART: Running Caliptra FMC ...
2,857,913 UART:
2,857,967 UART: [state] CFI Enabled
2,868,306 UART: [fht] FMC Alias Private Key: 7
2,976,581 UART: [art] Extend RT PCRs Done
2,977,009 UART: [art] Lock RT PCRs Done
2,978,607 UART: [art] Populate DV Done
2,986,900 UART: [fht] FMC Alias Private Key: 7
2,987,852 UART: [art] Derive CDI
2,988,132 UART: [art] Store in in slot 0x4
3,073,389 UART: [art] Derive Key Pair
3,073,749 UART: [art] Store priv key in slot 0x5
3,086,367 UART: [art] Derive Key Pair - Done
3,101,095 UART: [art] Signing Cert with AUTHO
3,101,575 UART: RITY.KEYID = 7
3,116,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,296 UART: [art] PUB.X = D50C031FD142E39634EB03EEE6A57FC965B5923A297F72CEB4DA6920242DDAC359B6F49CA394B4447BA498FB1D27572C
3,124,067 UART: [art] PUB.Y = C1A30A00A4D3A0796B9714966671BFBA37E3249DBBFAD9287A0D43EEB4F0FB69D45F10BEB5441FAD00BE3AC81C05FAE8
3,130,986 UART: [art] SIG.R = 42C1BEA27DED12C4E2682EC03834571804B80E49455974D30294A465A538E6879E289556DA6B74BE66AE037374E84584
3,137,734 UART: [art] SIG.S = 358AB87862C8C80A9A303C9F50C5B7C76FAF532523D74B8E154E2C9600D85DD5111A7C2075BB6B163B8B7C2CD6660EE2
3,161,065 UART: Caliptra RT
3,161,318 UART: [state] CFI Enabled
3,269,465 UART: [rt] RT listening for mailbox commands...
3,270,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,325 UART: [rt]cmd =0x44504543, len=96
3,481,094 >>> mbox cmd response data (6236 bytes)
3,481,095 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,976 UART: [rt]cmd =0x53574545, len=84
3,536,859 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,076 ready_for_fw is high
1,056,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,313 >>> mbox cmd response: success
2,680,239 UART:
2,680,255 UART: Running Caliptra FMC ...
2,680,663 UART:
2,680,717 UART: [state] CFI Enabled
2,691,366 UART: [fht] FMC Alias Private Key: 7
2,800,123 UART: [art] Extend RT PCRs Done
2,800,551 UART: [art] Lock RT PCRs Done
2,802,125 UART: [art] Populate DV Done
2,810,264 UART: [fht] FMC Alias Private Key: 7
2,811,362 UART: [art] Derive CDI
2,811,642 UART: [art] Store in in slot 0x4
2,897,463 UART: [art] Derive Key Pair
2,897,823 UART: [art] Store priv key in slot 0x5
2,911,787 UART: [art] Derive Key Pair - Done
2,926,429 UART: [art] Signing Cert with AUTHO
2,926,909 UART: RITY.KEYID = 7
2,942,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,102 UART: [art] PUB.X = A8622BEA14033EC162E10BED2ED1F660A02DB8F0F5589FA4A093665CB7181D8F72A6B22FC2199FE5DA005E568B36CD71
2,949,856 UART: [art] PUB.Y = 14BDA1728DAC6FB7D70D8060F20C2FCCDF2539BB7067B8F1E8A52E3A985AEB7CCBC7D2A462EBCD78B1B8896DFDEAA2EE
2,956,834 UART: [art] SIG.R = 03CB5F113FC3B3537C7A7B86879A19DD2F14DD5EF1AA744C72380C4EBCDB57D9EA2997C71FC2A49F4F9F8BD3FD9D4425
2,963,618 UART: [art] SIG.S = 38BB6E3E6E344E1E56CC9B741B61142EC7617489820343FA938AEE65625C764DBA7258E03F131B3DD6A268495B4345D8
2,987,474 UART: Caliptra RT
2,987,727 UART: [state] CFI Enabled
3,095,564 UART: [rt] RT listening for mailbox commands...
3,096,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,540 UART: [rt]cmd =0x44504543, len=96
3,306,098 >>> mbox cmd response data (6236 bytes)
3,306,099 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,066 UART: [rt]cmd =0x53574545, len=84
3,361,613 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,378 UART: [kat] SHA2-256
902,318 UART: [kat] SHA2-384
905,121 UART: [kat] SHA2-512-ACC
907,022 UART: [kat] ECC-384
917,177 UART: [kat] HMAC-384Kdf
921,819 UART: [kat] LMS
1,170,131 UART: [kat] --
1,170,872 UART: [cold-reset] ++
1,171,218 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,175,302 ready_for_fw is high
1,175,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,174 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,679 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,282,986 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,175 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,848 >>> mbox cmd response: success
2,770,923 UART: [afmc] ++
2,771,091 UART: [afmc] CDI.KEYID = 6
2,771,454 UART: [afmc] SUBJECT.KEYID = 7
2,771,880 UART: [afmc] AUTHORITY.KEYID = 5
2,807,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,360 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,972 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,518 UART: [afmc] --
2,851,600 UART: [cold-reset] --
2,852,356 UART: [state] Locking Datavault
2,853,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,157 UART: [state] Locking ICCM
2,854,695 UART: [exit] Launching FMC @ 0x40000130
2,860,024 UART:
2,860,040 UART: Running Caliptra FMC ...
2,860,448 UART:
2,860,591 UART: [state] CFI Enabled
2,871,080 UART: [fht] FMC Alias Private Key: 7
2,979,201 UART: [art] Extend RT PCRs Done
2,979,629 UART: [art] Lock RT PCRs Done
2,981,039 UART: [art] Populate DV Done
2,989,160 UART: [fht] FMC Alias Private Key: 7
2,990,294 UART: [art] Derive CDI
2,990,574 UART: [art] Store in in slot 0x4
3,076,223 UART: [art] Derive Key Pair
3,076,583 UART: [art] Store priv key in slot 0x5
3,090,287 UART: [art] Derive Key Pair - Done
3,104,901 UART: [art] Signing Cert with AUTHO
3,105,381 UART: RITY.KEYID = 7
3,120,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,036 UART: [art] PUB.X = 0EBBD5C9D812D8D692FAFEEC9E076B50B64530115FFC78CAE660539D0ADBDF18997FA4117DD91EE0E737E94DC42D1A94
3,127,817 UART: [art] PUB.Y = 5B04E4AFC88127FB035E882114C79BA1F48BAF1C0B308FC0FBC211BCF322800B8AA2F3A8EE91CC71FC2862C2AA9E7052
3,134,773 UART: [art] SIG.R = 059BA6541BCB24981D6FA8F6AC3921B1AF50F69D683794F6605A74FA86F603DF7F9617609838FD89697AE9D351F96292
3,141,535 UART: [art] SIG.S = 71ACDA949270B02853E4B80692D7B8325BACBE940EFC09E94B0041E95A6F4CF1B1094682BDCFE234397F420A21F037F0
3,165,385 UART: Caliptra RT
3,165,730 UART: [state] CFI Enabled
3,274,077 UART: [rt] RT listening for mailbox commands...
3,274,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,795 UART: [rt]cmd =0x44504543, len=96
3,486,210 >>> mbox cmd response data (6236 bytes)
3,486,211 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,334 UART: [rt]cmd =0x53574545, len=84
3,541,535 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,841 ready_for_fw is high
1,055,841 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,548 >>> mbox cmd response: success
2,681,818 UART:
2,681,834 UART: Running Caliptra FMC ...
2,682,242 UART:
2,682,385 UART: [state] CFI Enabled
2,693,026 UART: [fht] FMC Alias Private Key: 7
2,800,811 UART: [art] Extend RT PCRs Done
2,801,239 UART: [art] Lock RT PCRs Done
2,802,551 UART: [art] Populate DV Done
2,810,686 UART: [fht] FMC Alias Private Key: 7
2,811,822 UART: [art] Derive CDI
2,812,102 UART: [art] Store in in slot 0x4
2,897,605 UART: [art] Derive Key Pair
2,897,965 UART: [art] Store priv key in slot 0x5
2,911,035 UART: [art] Derive Key Pair - Done
2,926,015 UART: [art] Signing Cert with AUTHO
2,926,495 UART: RITY.KEYID = 7
2,941,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,128 UART: [art] PUB.X = 7C5A51E0F8D3C49D67EB5FD653777C199413D2B7B686558BF72B4F3F3A562CD9F3AD2D88E098D3BEE60706507BAA5791
2,948,900 UART: [art] PUB.Y = 3A5FCB19327FDF66D13D6DA88307D28DC74D59293781F164FCF756CF351F15746FD80E40E88E81331ED0BAAEB45EE287
2,955,854 UART: [art] SIG.R = 071750071A4B8A01717FF19B577237C731612ECE8E9CF0D515670084F633A7991235E5D18E5F5A094912DD96AFE1A8D6
2,962,584 UART: [art] SIG.S = A478C27F459CC20509224335113E39FADE28C9C3010E5B6096DF094B51B247EC908C72AB13F76B79CF4AD0494CFFB4C2
2,985,624 UART: Caliptra RT
2,985,969 UART: [state] CFI Enabled
3,093,112 UART: [rt] RT listening for mailbox commands...
3,093,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,068 UART: [rt]cmd =0x44504543, len=96
3,304,913 >>> mbox cmd response data (6236 bytes)
3,304,914 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,825 UART: [rt]cmd =0x53574545, len=84
3,361,156 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,089 UART:
192,474 UART: Running Caliptra ROM ...
193,668 UART:
193,826 UART: [state] CFI Enabled
262,974 UART: [state] LifecycleState = Unprovisioned
264,907 UART: [state] DebugLocked = No
267,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,725 UART: [kat] SHA2-256
442,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,942 UART: [kat] ++
453,413 UART: [kat] sha1
465,426 UART: [kat] SHA2-256
468,079 UART: [kat] SHA2-384
474,493 UART: [kat] SHA2-512-ACC
476,927 UART: [kat] ECC-384
2,765,766 UART: [kat] HMAC-384Kdf
2,778,310 UART: [kat] LMS
3,968,637 UART: [kat] --
3,973,488 UART: [cold-reset] ++
3,974,706 UART: [fht] Storing FHT @ 0x50003400
3,985,682 UART: [idev] ++
3,986,243 UART: [idev] CDI.KEYID = 6
3,987,224 UART: [idev] SUBJECT.KEYID = 7
3,988,465 UART: [idev] UDS.KEYID = 0
3,989,542 ready_for_fw is high
3,989,759 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,132,961 UART: [idev] Erasing UDS.KEYID = 0
7,326,148 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,961 UART: [idev] --
7,352,708 UART: [ldev] ++
7,353,276 UART: [ldev] CDI.KEYID = 6
7,354,215 UART: [ldev] SUBJECT.KEYID = 5
7,355,425 UART: [ldev] AUTHORITY.KEYID = 7
7,356,707 UART: [ldev] FE.KEYID = 1
7,401,529 UART: [ldev] Erasing FE.KEYID = 1
10,733,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,951 UART: [ldev] --
13,094,491 UART: [fwproc] Waiting for Commands...
13,097,631 UART: [fwproc] Received command 0x46574c44
13,099,815 UART: [fwproc] Received Image of size 113760 bytes
17,147,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,072 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,297,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,613,632 >>> mbox cmd response: success
17,618,520 UART: [afmc] ++
17,619,113 UART: [afmc] CDI.KEYID = 6
17,620,021 UART: [afmc] SUBJECT.KEYID = 7
17,621,240 UART: [afmc] AUTHORITY.KEYID = 5
20,985,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,914 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,176 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,600 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,414 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,881 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,854 UART: [afmc] --
23,358,152 UART: [cold-reset] --
23,361,864 UART: [state] Locking Datavault
23,367,377 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,123 UART: [state] Locking ICCM
23,370,953 UART: [exit] Launching FMC @ 0x40000130
23,379,351 UART:
23,379,582 UART: Running Caliptra FMC ...
23,380,682 UART:
23,380,841 UART: [state] CFI Enabled
23,445,453 UART: [fht] FMC Alias Private Key: 7
25,783,314 UART: [art] Extend RT PCRs Done
25,784,541 UART: [art] Lock RT PCRs Done
25,786,143 UART: [art] Populate DV Done
25,791,591 UART: [fht] FMC Alias Private Key: 7
25,793,193 UART: [art] Derive CDI
25,793,957 UART: [art] Store in in slot 0x4
25,853,695 UART: [art] Derive Key Pair
25,854,692 UART: [art] Store priv key in slot 0x5
29,146,653 UART: [art] Derive Key Pair - Done
29,159,329 UART: [art] Signing Cert with AUTHO
29,160,629 UART: RITY.KEYID = 7
31,448,764 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,320 UART: [art] PUB.X = 6098003525525F053717FF7A9E11A660BF4B6F07F36821C56590A0C1FE1FD6573D68DB78B6BC57AAAFC1D784D7BB8053
31,457,514 UART: [art] PUB.Y = A288FFDCD9690A750F96035BD45C0225B3B654AB8DD3080D83FF9873272D90E5B7C0ACF0B76E401E612B543BCDE70EC3
31,464,740 UART: [art] SIG.R = 279DE39B99AF84814DC929CDD103CDB5067BE7A32F09C976DB030842C2D857C5D1B74F22FEB667B449B2C3C629884A03
31,472,197 UART: [art] SIG.S = 312CC952B3B241A5E23769F408407EFCFC43E03FFDF8069878C1FC846EC9E51DCD67E68E0C0776A219CAD91A17C17B38
32,777,476 UART: Caliptra RT
32,778,202 UART: [state] CFI Enabled
32,938,847 UART: [rt] RT listening for mailbox commands...
32,941,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,972,193 UART: [rt]cmd =0x44504543, len=96
38,756,570 >>> mbox cmd response data (6236 bytes)
38,785,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,816,429 UART: [rt]cmd =0x44504543, len=96
38,848,056 >>> mbox cmd response data (56 bytes)
38,848,832 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,878,910 UART: [rt]cmd =0x52564348, len=36
38,881,610 >>> mbox cmd response data (8 bytes)
38,882,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,912,694 UART: [rt]cmd =0x44504543, len=96
44,665,294 >>> mbox cmd response data (6236 bytes)
44,694,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,724,658 UART: [rt]cmd =0x53574545, len=84
50,312,383 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,804,422 ready_for_fw is high
3,805,055 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,865,722 >>> mbox cmd response: success
23,568,567 UART:
23,568,963 UART: Running Caliptra FMC ...
23,570,072 UART:
23,570,233 UART: [state] CFI Enabled
23,638,195 UART: [fht] FMC Alias Private Key: 7
25,976,425 UART: [art] Extend RT PCRs Done
25,977,657 UART: [art] Lock RT PCRs Done
25,979,422 UART: [art] Populate DV Done
25,984,733 UART: [fht] FMC Alias Private Key: 7
25,986,433 UART: [art] Derive CDI
25,987,170 UART: [art] Store in in slot 0x4
26,047,172 UART: [art] Derive Key Pair
26,048,211 UART: [art] Store priv key in slot 0x5
29,340,814 UART: [art] Derive Key Pair - Done
29,353,488 UART: [art] Signing Cert with AUTHO
29,354,805 UART: RITY.KEYID = 7
31,643,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,990 UART: [art] PUB.X = 1D408557547ECC3FAACF08DA1FA6A3C2D532A6334E4D303A5DE1D5F57229E3A6FEED9EE09ED2D52DA0D7248FE67AE4AA
31,652,324 UART: [art] PUB.Y = 433BEC7005ABBD947FB1DE79BF0EB07320872E2CAFC108D8C57D9E46C73E8654576EE5B2F0E30D4F7C98FE45EEEDF16A
31,659,569 UART: [art] SIG.R = 15453AED035BDE81C967AD69E615D517A36924552D273D5D608FFF30B7BC967B6FC4498F4B125D7B167668C76CBD96DA
31,666,933 UART: [art] SIG.S = 74D673C84B0B3EF65F96F2D2D2AD39252B60CA10AA8F0DB1523A5BE8E38AE0C8CDFEF903C30329ACF8D20409C15C7B54
32,971,909 UART: Caliptra RT
32,972,622 UART: [state] CFI Enabled
33,133,585 UART: [rt] RT listening for mailbox commands...
33,135,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,170 UART: [rt]cmd =0x44504543, len=96
38,949,956 >>> mbox cmd response data (6236 bytes)
38,979,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,009,760 UART: [rt]cmd =0x44504543, len=96
39,041,020 >>> mbox cmd response data (56 bytes)
39,041,751 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,071,890 UART: [rt]cmd =0x52564348, len=36
39,074,477 >>> mbox cmd response data (8 bytes)
39,075,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,105,694 UART: [rt]cmd =0x44504543, len=96
44,878,506 >>> mbox cmd response data (6236 bytes)
44,907,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,937,740 UART: [rt]cmd =0x53574545, len=84
50,524,416 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
192,856 UART:
193,221 UART: Running Caliptra ROM ...
194,406 UART:
604,078 UART: [state] CFI Enabled
617,618 UART: [state] LifecycleState = Unprovisioned
619,576 UART: [state] DebugLocked = No
621,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,663 UART: [kat] SHA2-256
797,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,979 UART: [kat] ++
808,430 UART: [kat] sha1
819,084 UART: [kat] SHA2-256
821,753 UART: [kat] SHA2-384
828,383 UART: [kat] SHA2-512-ACC
830,756 UART: [kat] ECC-384
3,113,633 UART: [kat] HMAC-384Kdf
3,124,716 UART: [kat] LMS
4,314,780 UART: [kat] --
4,319,418 UART: [cold-reset] ++
4,321,728 UART: [fht] Storing FHT @ 0x50003400
4,332,715 UART: [idev] ++
4,333,349 UART: [idev] CDI.KEYID = 6
4,334,265 UART: [idev] SUBJECT.KEYID = 7
4,335,501 UART: [idev] UDS.KEYID = 0
4,336,593 ready_for_fw is high
4,336,825 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,762 UART: [idev] Erasing UDS.KEYID = 0
7,621,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,951 UART: [idev] --
7,646,946 UART: [ldev] ++
7,647,512 UART: [ldev] CDI.KEYID = 6
7,648,472 UART: [ldev] SUBJECT.KEYID = 5
7,649,678 UART: [ldev] AUTHORITY.KEYID = 7
7,650,955 UART: [ldev] FE.KEYID = 1
7,663,859 UART: [ldev] Erasing FE.KEYID = 1
10,948,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,940 UART: [ldev] --
13,306,903 UART: [fwproc] Waiting for Commands...
13,309,851 UART: [fwproc] Received command 0x46574c44
13,312,025 UART: [fwproc] Received Image of size 113760 bytes
17,364,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,237 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,831,275 >>> mbox cmd response: success
17,834,624 UART: [afmc] ++
17,835,213 UART: [afmc] CDI.KEYID = 6
17,836,151 UART: [afmc] SUBJECT.KEYID = 7
17,837,414 UART: [afmc] AUTHORITY.KEYID = 5
21,150,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,931 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,314 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,111 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,542 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,680 UART: [afmc] --
23,517,353 UART: [cold-reset] --
23,521,400 UART: [state] Locking Datavault
23,528,307 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,067 UART: [state] Locking ICCM
23,532,836 UART: [exit] Launching FMC @ 0x40000130
23,541,226 UART:
23,541,457 UART: Running Caliptra FMC ...
23,542,478 UART:
23,542,625 UART: [state] CFI Enabled
23,551,046 UART: [fht] FMC Alias Private Key: 7
25,881,778 UART: [art] Extend RT PCRs Done
25,883,009 UART: [art] Lock RT PCRs Done
25,885,054 UART: [art] Populate DV Done
25,890,368 UART: [fht] FMC Alias Private Key: 7
25,891,898 UART: [art] Derive CDI
25,892,625 UART: [art] Store in in slot 0x4
25,935,806 UART: [art] Derive Key Pair
25,936,865 UART: [art] Store priv key in slot 0x5
29,178,981 UART: [art] Derive Key Pair - Done
29,191,713 UART: [art] Signing Cert with AUTHO
29,193,013 UART: RITY.KEYID = 7
31,472,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,595 UART: [art] PUB.X = ADC41759B6D38F2621EEC1314A9F713AFF802F617DAF436E9D9E3D9AD92728661EF242FF389CB800C3B81D71980E0270
31,481,323 UART: [art] PUB.Y = 299F7601ED620A6012D006BC7ADE41249E83C909F246B25F9154088597744D1BF1605DC778A4C38E02316C1EA6CA1065
31,488,588 UART: [art] SIG.R = E4419E27D9F0E06B106630FB9D6B0E8493541550125F21CB0C39097481B8027CF34FA6C5A41CF64E92440DF9FCF5555F
31,495,951 UART: [art] SIG.S = DB79DF286A01892C88ACF1231E2CF6201D51981E3544B4ABEB0C79C1F51C7440734D95E7D3CD7EDF7E4123A1F0E395C7
32,801,444 UART: Caliptra RT
32,802,173 UART: [state] CFI Enabled
32,919,452 UART: [rt] RT listening for mailbox commands...
32,921,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,360 UART: [rt]cmd =0x44504543, len=96
38,625,183 >>> mbox cmd response data (6236 bytes)
38,654,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,685,560 UART: [rt]cmd =0x44504543, len=96
38,716,790 >>> mbox cmd response data (56 bytes)
38,717,516 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,747,533 UART: [rt]cmd =0x52564348, len=36
38,750,382 >>> mbox cmd response data (8 bytes)
38,751,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,781,744 UART: [rt]cmd =0x44504543, len=96
44,454,453 >>> mbox cmd response data (6236 bytes)
44,483,490 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,514,096 UART: [rt]cmd =0x53574545, len=84
50,038,838 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,656 writing to cptra_bootfsm_go
4,126,694 ready_for_fw is high
4,127,293 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,758 >>> mbox cmd response: success
23,706,038 UART:
23,706,434 UART: Running Caliptra FMC ...
23,707,555 UART:
23,707,713 UART: [state] CFI Enabled
23,715,182 UART: [fht] FMC Alias Private Key: 7
26,046,475 UART: [art] Extend RT PCRs Done
26,047,712 UART: [art] Lock RT PCRs Done
26,049,210 UART: [art] Populate DV Done
26,054,577 UART: [fht] FMC Alias Private Key: 7
26,056,235 UART: [art] Derive CDI
26,057,052 UART: [art] Store in in slot 0x4
26,099,707 UART: [art] Derive Key Pair
26,100,913 UART: [art] Store priv key in slot 0x5
29,342,649 UART: [art] Derive Key Pair - Done
29,355,715 UART: [art] Signing Cert with AUTHO
29,357,020 UART: RITY.KEYID = 7
31,636,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,156 UART: [art] PUB.X = AB2B0A0879AC27332A705C58892BC6DE9B739E8D9DD7164AAA03991AB8CE562781DDB7F170CAA97ACD71F42440AE6EF3
31,645,435 UART: [art] PUB.Y = 902A37146492A5EF3931EA4D23846DE256F519902D57996E4E03900CCBA3E808E0C2AAB485DD37B26E2E79F96914B0A0
31,652,649 UART: [art] SIG.R = DB824D71EA71D57E02873199ABECA09C1098955C088D3C89D7C915839E97A7845182A3C0DC66AE58E598FDC688634DA8
31,660,048 UART: [art] SIG.S = 407867B4C7D20E26F41840735E71A8E8752326CAB99B8395785E311648403B9EDE5EA47D97F42A185DCBEE699ADC91B5
32,965,115 UART: Caliptra RT
32,965,819 UART: [state] CFI Enabled
33,082,726 UART: [rt] RT listening for mailbox commands...
33,085,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,115,615 UART: [rt]cmd =0x44504543, len=96
38,788,806 >>> mbox cmd response data (6236 bytes)
38,817,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,848,841 UART: [rt]cmd =0x44504543, len=96
38,880,805 >>> mbox cmd response data (56 bytes)
38,881,535 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,911,631 UART: [rt]cmd =0x52564348, len=36
38,914,060 >>> mbox cmd response data (8 bytes)
38,914,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,945,097 UART: [rt]cmd =0x44504543, len=96
44,619,491 >>> mbox cmd response data (6236 bytes)
44,648,292 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,678,786 UART: [rt]cmd =0x53574545, len=84
50,203,131 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
192,640 UART:
193,005 UART: Running Caliptra ROM ...
194,207 UART:
194,356 UART: [state] CFI Enabled
265,323 UART: [state] LifecycleState = Unprovisioned
267,251 UART: [state] DebugLocked = No
268,427 UART: [state] WD Timer not started. Device not locked for debugging
271,329 UART: [kat] SHA2-256
450,477 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,061 UART: [kat] ++
462,596 UART: [kat] sha1
473,221 UART: [kat] SHA2-256
476,289 UART: [kat] SHA2-384
482,778 UART: [kat] SHA2-512-ACC
485,710 UART: [kat] ECC-384
2,944,410 UART: [kat] HMAC-384Kdf
2,969,837 UART: [kat] LMS
3,499,278 UART: [kat] --
3,502,136 UART: [cold-reset] ++
3,503,795 UART: [fht] FHT @ 0x50003400
3,515,815 UART: [idev] ++
3,516,391 UART: [idev] CDI.KEYID = 6
3,517,300 UART: [idev] SUBJECT.KEYID = 7
3,518,468 UART: [idev] UDS.KEYID = 0
3,519,511 ready_for_fw is high
3,519,713 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,102 UART: [idev] Erasing UDS.KEYID = 0
6,026,555 UART: [idev] Sha1 KeyId Algorithm
6,049,518 UART: [idev] --
6,053,081 UART: [ldev] ++
6,053,652 UART: [ldev] CDI.KEYID = 6
6,054,537 UART: [ldev] SUBJECT.KEYID = 5
6,055,659 UART: [ldev] AUTHORITY.KEYID = 7
6,056,933 UART: [ldev] FE.KEYID = 1
6,096,967 UART: [ldev] Erasing FE.KEYID = 1
8,596,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,643 UART: [ldev] --
10,387,755 UART: [fwproc] Wait for Commands...
10,389,941 UART: [fwproc] Recv command 0x46574c44
10,391,982 UART: [fwproc] Recv'd Img size: 114084 bytes
13,788,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,931,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,247,522 >>> mbox cmd response: success
14,251,813 UART: [afmc] ++
14,252,408 UART: [afmc] CDI.KEYID = 6
14,253,289 UART: [afmc] SUBJECT.KEYID = 7
14,254,503 UART: [afmc] AUTHORITY.KEYID = 5
16,784,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,598,962 UART: [afmc] --
18,601,952 UART: [cold-reset] --
18,604,781 UART: [state] Locking Datavault
18,611,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,613,286 UART: [state] Locking ICCM
18,614,325 UART: [exit] Launching FMC @ 0x40000130
18,622,721 UART:
18,622,948 UART: Running Caliptra FMC ...
18,624,175 UART:
18,624,345 UART: [state] CFI Enabled
18,684,046 UART: [fht] FMC Alias Private Key: 7
20,448,469 UART: [art] Extend RT PCRs Done
20,449,677 UART: [art] Lock RT PCRs Done
20,451,053 UART: [art] Populate DV Done
20,456,521 UART: [fht] FMC Alias Private Key: 7
20,458,211 UART: [art] Derive CDI
20,458,946 UART: [art] Store in in slot 0x4
20,516,719 UART: [art] Derive Key Pair
20,517,781 UART: [art] Store priv key in slot 0x5
22,980,787 UART: [art] Derive Key Pair - Done
22,994,003 UART: [art] Signing Cert with AUTHO
22,995,301 UART: RITY.KEYID = 7
24,707,259 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,765 UART: [art] PUB.X = AE6EF00E1C4661C286E1C7D799D14ED1375497798565FE5F7B3AA7ED83BB6604CE951943FE90516C1CC05A56C0D247CB
24,715,997 UART: [art] PUB.Y = 4E413677C1710C211CF19EF645E7DA7B211C1833470CD54CF3BCD0C58FEC1E92C800143054536F73B84DAA78D884F233
24,723,268 UART: [art] SIG.R = 517A47EDB1A65CD9A2FC04D2304D4B5F0D38696F0FCF507A939D782C4E2B7DB2833CC12758D1184C45669AE1E5C2B388
24,730,645 UART: [art] SIG.S = 8BD01244E652EA766C5666A3FF9FBF7FFB28374F11E2FC9338263E4CB465AEF368BEF9C489306842FA7F7062F52004CA
25,709,852 UART: Caliptra RT
25,710,550 UART: [state] CFI Enabled
25,875,616 UART: [rt] RT listening for mailbox commands...
25,877,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,909,074 UART: [rt]cmd =0x44504543, len=96
30,288,705 >>> mbox cmd response data (6236 bytes)
30,318,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,348,918 UART: [rt]cmd =0x44504543, len=96
30,380,631 >>> mbox cmd response data (56 bytes)
30,381,353 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,411,246 UART: [rt]cmd =0x52564348, len=36
30,413,930 >>> mbox cmd response data (8 bytes)
30,414,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,444,961 UART: [rt]cmd =0x44504543, len=96
34,811,177 >>> mbox cmd response data (6236 bytes)
34,840,011 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,870,806 UART: [rt]cmd =0x53574545, len=84
39,049,095 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
3,381,252 ready_for_fw is high
3,381,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,064,486 >>> mbox cmd response: success
18,343,766 UART:
18,344,246 UART: Running Caliptra FMC ...
18,345,388 UART:
18,345,542 UART: [state] CFI Enabled
18,412,039 UART: [fht] FMC Alias Private Key: 7
20,176,419 UART: [art] Extend RT PCRs Done
20,177,661 UART: [art] Lock RT PCRs Done
20,179,692 UART: [art] Populate DV Done
20,185,212 UART: [fht] FMC Alias Private Key: 7
20,186,717 UART: [art] Derive CDI
20,187,480 UART: [art] Store in in slot 0x4
20,245,167 UART: [art] Derive Key Pair
20,246,211 UART: [art] Store priv key in slot 0x5
22,709,424 UART: [art] Derive Key Pair - Done
22,722,313 UART: [art] Signing Cert with AUTHO
22,723,621 UART: RITY.KEYID = 7
24,435,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,626 UART: [art] PUB.X = 72C3D93F5260B8A47B8C6E394C8B2BA4B0E5F31FEB7C593BE24FA6F346DEF35C8258DE90EB6B6AA0A837FA35D1EEA26E
24,443,914 UART: [art] PUB.Y = 83F9B4437B00C90FE5B4A9AE389ED85962459C68A64E631CD41DF2DC357D32BC52C81921FDFFF93AC77B08F04373977C
24,451,175 UART: [art] SIG.R = 3CBBFA173FD113A417AF7EAC73E5C3DAB78382EB6C348733EEDBE8E144353AD890AAD07F2C1A12387C03542B3378A94C
24,458,619 UART: [art] SIG.S = B233E1AA393FA2AA34D5209BE80B5B955C94AD6E783E2CFD460D3E139D6301687555473C877CA217CFF1E9982C4374D7
25,437,230 UART: Caliptra RT
25,437,931 UART: [state] CFI Enabled
25,603,973 UART: [rt] RT listening for mailbox commands...
25,606,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,637,400 UART: [rt]cmd =0x44504543, len=96
30,015,209 >>> mbox cmd response data (6236 bytes)
30,044,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,075,751 UART: [rt]cmd =0x44504543, len=96
30,106,898 >>> mbox cmd response data (56 bytes)
30,107,658 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,137,741 UART: [rt]cmd =0x52564348, len=36
30,140,496 >>> mbox cmd response data (8 bytes)
30,141,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,171,583 UART: [rt]cmd =0x44504543, len=96
34,536,013 >>> mbox cmd response data (6236 bytes)
34,564,819 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,595,420 UART: [rt]cmd =0x53574545, len=84
38,773,157 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,821 writing to cptra_bootfsm_go
193,102 UART:
193,482 UART: Running Caliptra ROM ...
194,617 UART:
604,337 UART: [state] CFI Enabled
617,941 UART: [state] LifecycleState = Unprovisioned
619,759 UART: [state] DebugLocked = No
621,503 UART: [state] WD Timer not started. Device not locked for debugging
625,958 UART: [kat] SHA2-256
805,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,628 UART: [kat] ++
817,169 UART: [kat] sha1
828,138 UART: [kat] SHA2-256
831,186 UART: [kat] SHA2-384
837,253 UART: [kat] SHA2-512-ACC
840,266 UART: [kat] ECC-384
3,279,712 UART: [kat] HMAC-384Kdf
3,293,008 UART: [kat] LMS
3,822,467 UART: [kat] --
3,827,131 UART: [cold-reset] ++
3,828,652 UART: [fht] FHT @ 0x50003400
3,838,947 UART: [idev] ++
3,839,516 UART: [idev] CDI.KEYID = 6
3,840,427 UART: [idev] SUBJECT.KEYID = 7
3,841,602 UART: [idev] UDS.KEYID = 0
3,842,528 ready_for_fw is high
3,842,738 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,094 UART: [idev] Erasing UDS.KEYID = 0
6,315,605 UART: [idev] Sha1 KeyId Algorithm
6,337,973 UART: [idev] --
6,341,590 UART: [ldev] ++
6,342,162 UART: [ldev] CDI.KEYID = 6
6,343,070 UART: [ldev] SUBJECT.KEYID = 5
6,344,288 UART: [ldev] AUTHORITY.KEYID = 7
6,345,520 UART: [ldev] FE.KEYID = 1
6,355,894 UART: [ldev] Erasing FE.KEYID = 1
8,830,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,827 UART: [ldev] --
10,618,034 UART: [fwproc] Wait for Commands...
10,620,131 UART: [fwproc] Recv command 0x46574c44
10,622,231 UART: [fwproc] Recv'd Img size: 114084 bytes
14,025,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,482,003 >>> mbox cmd response: success
14,485,511 UART: [afmc] ++
14,486,113 UART: [afmc] CDI.KEYID = 6
14,487,002 UART: [afmc] SUBJECT.KEYID = 7
14,488,111 UART: [afmc] AUTHORITY.KEYID = 5
16,986,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,591 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,601 UART: [afmc] --
18,786,531 UART: [cold-reset] --
18,790,343 UART: [state] Locking Datavault
18,795,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,186 UART: [state] Locking ICCM
18,799,446 UART: [exit] Launching FMC @ 0x40000130
18,807,853 UART:
18,808,092 UART: Running Caliptra FMC ...
18,809,197 UART:
18,809,356 UART: [state] CFI Enabled
18,817,478 UART: [fht] FMC Alias Private Key: 7
20,574,492 UART: [art] Extend RT PCRs Done
20,575,710 UART: [art] Lock RT PCRs Done
20,577,308 UART: [art] Populate DV Done
20,582,565 UART: [fht] FMC Alias Private Key: 7
20,584,218 UART: [art] Derive CDI
20,584,961 UART: [art] Store in in slot 0x4
20,627,625 UART: [art] Derive Key Pair
20,628,663 UART: [art] Store priv key in slot 0x5
23,055,198 UART: [art] Derive Key Pair - Done
23,068,073 UART: [art] Signing Cert with AUTHO
23,069,411 UART: RITY.KEYID = 7
24,774,766 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,270 UART: [art] PUB.X = EC7D09466DB3FADBE04BC22F5C9C2FEBABFC9E84EBD2C4EC92C5F74A28E946D2BC6195252AD8463931FE8BB14D52DFAF
24,783,543 UART: [art] PUB.Y = FD30F25E6491822D9E5868D8DD1800B710562615EDCE7B9C4C7AD0648E0A75858FBB21DAC4B3F0559F3EFBBE017782B2
24,790,801 UART: [art] SIG.R = 604C9F0CA4C17377F1C5734CC5BD39FAD5C10697763581C64D6474A32BA9B21075E2DA3DFD63605E6F93BA714193C232
24,798,247 UART: [art] SIG.S = FFC2869B3559B2DF8FBCEB48C0CFB9BB667A609C3F71EF6D471321C72DAC426153A7706826E3A6C080C8FFE4947AEA7B
25,776,841 UART: Caliptra RT
25,777,543 UART: [state] CFI Enabled
25,894,833 UART: [rt] RT listening for mailbox commands...
25,897,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,927,940 UART: [rt]cmd =0x44504543, len=96
30,211,065 >>> mbox cmd response data (6236 bytes)
30,240,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,270,801 UART: [rt]cmd =0x44504543, len=96
30,302,439 >>> mbox cmd response data (56 bytes)
30,303,173 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,333,199 UART: [rt]cmd =0x52564348, len=36
30,336,063 >>> mbox cmd response data (8 bytes)
30,336,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,367,096 UART: [rt]cmd =0x44504543, len=96
34,649,961 >>> mbox cmd response data (6236 bytes)
34,678,960 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,709,620 UART: [rt]cmd =0x53574545, len=84
38,845,411 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,868 writing to cptra_bootfsm_go
3,700,037 ready_for_fw is high
3,700,592 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,271,924 >>> mbox cmd response: success
18,517,939 UART:
18,518,360 UART: Running Caliptra FMC ...
18,519,502 UART:
18,519,672 UART: [state] CFI Enabled
18,527,658 UART: [fht] FMC Alias Private Key: 7
20,284,744 UART: [art] Extend RT PCRs Done
20,285,968 UART: [art] Lock RT PCRs Done
20,287,435 UART: [art] Populate DV Done
20,292,747 UART: [fht] FMC Alias Private Key: 7
20,294,251 UART: [art] Derive CDI
20,295,019 UART: [art] Store in in slot 0x4
20,337,413 UART: [art] Derive Key Pair
20,338,462 UART: [art] Store priv key in slot 0x5
22,765,234 UART: [art] Derive Key Pair - Done
22,778,557 UART: [art] Signing Cert with AUTHO
22,779,867 UART: RITY.KEYID = 7
24,485,305 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,820 UART: [art] PUB.X = BA2D372B060A82307EB5A62652A63564A95E122EAC0C8D68664D03243E62410DEC0EAD49A7CC3EA3D2EE777E5F2D7BA8
24,494,110 UART: [art] PUB.Y = E86D8EF51D490B34330A96E37E93E1760C7E9BD467FFA3C60AAED05FB3E06E45841C58174AD02A8DCCCD7BF6068C54AF
24,501,386 UART: [art] SIG.R = F151A7F4D3F13CAAF52B0B2AD08CC0221CBE9075A349F8A71FE78488944F5F79777BCF8D4103AC98ED6BD91CE2E0FA05
24,508,768 UART: [art] SIG.S = B8A50C648F2BCC1071FA5AF04C34692BCB294CE6B7F65A1D81281AAF2C28DBBE0834E18D94DA12AA40C02BC1543C8042
25,488,031 UART: Caliptra RT
25,488,736 UART: [state] CFI Enabled
25,605,111 UART: [rt] RT listening for mailbox commands...
25,607,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,638,131 UART: [rt]cmd =0x44504543, len=96
29,920,811 >>> mbox cmd response data (6236 bytes)
29,950,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
29,981,244 UART: [rt]cmd =0x44504543, len=96
30,012,599 >>> mbox cmd response data (56 bytes)
30,013,360 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,043,393 UART: [rt]cmd =0x52564348, len=36
30,045,941 >>> mbox cmd response data (8 bytes)
30,046,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,077,028 UART: [rt]cmd =0x44504543, len=96
34,360,791 >>> mbox cmd response data (6236 bytes)
34,389,751 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,420,479 UART: [rt]cmd =0x53574545, len=84
38,555,920 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,536 UART:
192,913 UART: Running Caliptra ROM ...
194,106 UART:
194,281 UART: [state] CFI Enabled
264,849 UART: [state] LifecycleState = Unprovisioned
267,219 UART: [state] DebugLocked = No
268,895 UART: [state] WD Timer not started. Device not locked for debugging
274,058 UART: [kat] SHA2-256
463,943 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,711 UART: [kat] ++
475,206 UART: [kat] sha1
486,226 UART: [kat] SHA2-256
489,236 UART: [kat] SHA2-384
493,949 UART: [kat] SHA2-512-ACC
496,531 UART: [kat] ECC-384
2,947,719 UART: [kat] HMAC-384Kdf
2,971,328 UART: [kat] LMS
3,503,126 UART: [kat] --
3,507,470 UART: [cold-reset] ++
3,508,421 UART: [fht] FHT @ 0x50003400
3,520,479 UART: [idev] ++
3,521,230 UART: [idev] CDI.KEYID = 6
3,522,143 UART: [idev] SUBJECT.KEYID = 7
3,523,390 UART: [idev] UDS.KEYID = 0
3,524,314 ready_for_fw is high
3,524,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,829 UART: [idev] Erasing UDS.KEYID = 0
6,041,558 UART: [idev] Sha1 KeyId Algorithm
6,064,354 UART: [idev] --
6,069,921 UART: [ldev] ++
6,070,600 UART: [ldev] CDI.KEYID = 6
6,071,513 UART: [ldev] SUBJECT.KEYID = 5
6,072,725 UART: [ldev] AUTHORITY.KEYID = 7
6,074,111 UART: [ldev] FE.KEYID = 1
6,115,893 UART: [ldev] Erasing FE.KEYID = 1
8,619,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,623 UART: [ldev] --
10,430,477 UART: [fwproc] Wait for Commands...
10,432,294 UART: [fwproc] Recv command 0x46574c44
10,434,598 UART: [fwproc] Recv'd Img size: 114084 bytes
13,874,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,608,629 >>> mbox cmd response: success
14,611,835 UART: [afmc] ++
14,612,549 UART: [afmc] CDI.KEYID = 6
14,613,790 UART: [afmc] SUBJECT.KEYID = 7
14,615,243 UART: [afmc] AUTHORITY.KEYID = 5
17,159,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,901,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,903,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,918,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,933,886 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,948,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,973,046 UART: [afmc] --
18,975,850 UART: [cold-reset] --
18,981,395 UART: [state] Locking Datavault
18,987,680 UART: [state] Locking PCR0, PCR1 and PCR31
18,989,831 UART: [state] Locking ICCM
18,991,827 UART: [exit] Launching FMC @ 0x40000130
19,000,510 UART:
19,000,746 UART: Running Caliptra FMC ...
19,001,849 UART:
19,002,032 UART: [state] CFI Enabled
19,059,760 UART: [fht] FMC Alias Private Key: 7
20,823,513 UART: [art] Extend RT PCRs Done
20,824,716 UART: [art] Lock RT PCRs Done
20,826,497 UART: [art] Populate DV Done
20,831,794 UART: [fht] FMC Alias Private Key: 7
20,833,322 UART: [art] Derive CDI
20,834,130 UART: [art] Store in in slot 0x4
20,892,409 UART: [art] Derive Key Pair
20,893,439 UART: [art] Store priv key in slot 0x5
23,356,639 UART: [art] Derive Key Pair - Done
23,369,586 UART: [art] Signing Cert with AUTHO
23,370,883 UART: RITY.KEYID = 7
25,082,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,083,526 UART: [art] PUB.X = F652B07DB8C3CE94698E799887730F361D8CAB21749F4EBD387C3006F0AEC420F3A28F7D0D5823FE0F64CB812A3659BF
25,090,783 UART: [art] PUB.Y = 4BFE560FF6A1CC7712D0AFD8832AEF601D3332BA1B4370268CDD1AEC4ACC4F1F2BBBDE242BE6BAEE44802078E3D21079
25,098,109 UART: [art] SIG.R = 593608C1B6898C0F6BB3FC630A9537AA74D0F872EE8D470CAA629A0C6BB14D2D7D8001FA7B4E626F06BE43B62626A07C
25,105,466 UART: [art] SIG.S = 87A72AF31B0D0A4EDAFD7C512FAA04649D7C1216A37C1936C539EF7F7387ADEF0FD7DA64927A2845D07BE3908EC6DB70
26,084,244 UART: Caliptra RT
26,084,961 UART: [state] CFI Enabled
26,249,596 UART: [rt] RT listening for mailbox commands...
26,251,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,282,844 UART: [rt]cmd =0x44504543, len=96
30,661,593 >>> mbox cmd response data (6236 bytes)
30,690,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,721,461 UART: [rt]cmd =0x44504543, len=96
30,752,229 >>> mbox cmd response data (56 bytes)
30,752,969 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,783,152 UART: [rt]cmd =0x52564348, len=36
30,785,425 >>> mbox cmd response data (8 bytes)
30,785,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,816,482 UART: [rt]cmd =0x44504543, len=96
35,184,321 >>> mbox cmd response data (6236 bytes)
35,213,292 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,243,951 UART: [rt]cmd =0x53574545, len=84
39,423,646 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,439,694 ready_for_fw is high
3,440,105 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,712,667 >>> mbox cmd response: success
18,997,270 UART:
18,997,666 UART: Running Caliptra FMC ...
18,998,812 UART:
18,998,965 UART: [state] CFI Enabled
19,065,686 UART: [fht] FMC Alias Private Key: 7
20,829,493 UART: [art] Extend RT PCRs Done
20,830,722 UART: [art] Lock RT PCRs Done
20,832,530 UART: [art] Populate DV Done
20,837,673 UART: [fht] FMC Alias Private Key: 7
20,839,371 UART: [art] Derive CDI
20,840,105 UART: [art] Store in in slot 0x4
20,898,226 UART: [art] Derive Key Pair
20,899,266 UART: [art] Store priv key in slot 0x5
23,362,013 UART: [art] Derive Key Pair - Done
23,374,929 UART: [art] Signing Cert with AUTHO
23,376,231 UART: RITY.KEYID = 7
25,087,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,331 UART: [art] PUB.X = CD06D5843FBAFD5EAED808F6FE7F34C9C939923E9EA134FE007588610B3BC32048255EB1E06B25C2C4E6DCC4FF18803C
25,096,617 UART: [art] PUB.Y = 546C50F8A8B04BEFCC9F4EE9A86AA48CDCB9DA28F82CC1D6D1674EC9607C3441E9F5532F277F440C5D48F2F31AD028F4
25,103,888 UART: [art] SIG.R = 466922BFEE8EED441783FB2D2D1A0DF61C209105471EE9A71CF517C8A16DB591C53B15ECCEBE5D2A4636117698054D96
25,111,287 UART: [art] SIG.S = 9A361103B1E7A92F62394F7D0F969638C09CE2B6C18763406AC9DDA828CD457DE4419EA45FCA71FB975239B0C31D3F40
26,090,093 UART: Caliptra RT
26,090,792 UART: [state] CFI Enabled
26,255,221 UART: [rt] RT listening for mailbox commands...
26,257,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,288,563 UART: [rt]cmd =0x44504543, len=96
30,667,657 >>> mbox cmd response data (6236 bytes)
30,696,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,727,460 UART: [rt]cmd =0x44504543, len=96
30,759,261 >>> mbox cmd response data (56 bytes)
30,760,007 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,790,170 UART: [rt]cmd =0x52564348, len=36
30,792,797 >>> mbox cmd response data (8 bytes)
30,793,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,824,176 UART: [rt]cmd =0x44504543, len=96
35,189,668 >>> mbox cmd response data (6236 bytes)
35,219,088 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,249,497 UART: [rt]cmd =0x53574545, len=84
39,427,905 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
193,001 UART:
193,383 UART: Running Caliptra ROM ...
194,577 UART:
604,329 UART: [state] CFI Enabled
616,075 UART: [state] LifecycleState = Unprovisioned
618,452 UART: [state] DebugLocked = No
620,476 UART: [state] WD Timer not started. Device not locked for debugging
625,524 UART: [kat] SHA2-256
815,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,221 UART: [kat] ++
826,830 UART: [kat] sha1
839,154 UART: [kat] SHA2-256
842,131 UART: [kat] SHA2-384
849,051 UART: [kat] SHA2-512-ACC
851,641 UART: [kat] ECC-384
3,296,133 UART: [kat] HMAC-384Kdf
3,309,239 UART: [kat] LMS
3,840,997 UART: [kat] --
3,843,230 UART: [cold-reset] ++
3,845,112 UART: [fht] FHT @ 0x50003400
3,856,592 UART: [idev] ++
3,857,304 UART: [idev] CDI.KEYID = 6
3,858,338 UART: [idev] SUBJECT.KEYID = 7
3,859,459 UART: [idev] UDS.KEYID = 0
3,860,392 ready_for_fw is high
3,860,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,894 UART: [idev] Erasing UDS.KEYID = 0
6,334,041 UART: [idev] Sha1 KeyId Algorithm
6,355,642 UART: [idev] --
6,360,426 UART: [ldev] ++
6,361,126 UART: [ldev] CDI.KEYID = 6
6,362,064 UART: [ldev] SUBJECT.KEYID = 5
6,363,228 UART: [ldev] AUTHORITY.KEYID = 7
6,364,410 UART: [ldev] FE.KEYID = 1
6,375,196 UART: [ldev] Erasing FE.KEYID = 1
8,856,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,705 UART: [ldev] --
10,647,075 UART: [fwproc] Wait for Commands...
10,648,952 UART: [fwproc] Recv command 0x46574c44
10,651,202 UART: [fwproc] Recv'd Img size: 114084 bytes
14,096,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,865 >>> mbox cmd response: success
14,838,382 UART: [afmc] ++
14,839,088 UART: [afmc] CDI.KEYID = 6
14,840,264 UART: [afmc] SUBJECT.KEYID = 7
14,841,760 UART: [afmc] AUTHORITY.KEYID = 5
17,345,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,364 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,758 UART: [afmc] --
19,139,773 UART: [cold-reset] --
19,142,565 UART: [state] Locking Datavault
19,146,802 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,010 UART: [state] Locking ICCM
19,150,501 UART: [exit] Launching FMC @ 0x40000130
19,159,164 UART:
19,159,409 UART: Running Caliptra FMC ...
19,160,514 UART:
19,160,673 UART: [state] CFI Enabled
19,168,939 UART: [fht] FMC Alias Private Key: 7
20,925,685 UART: [art] Extend RT PCRs Done
20,926,902 UART: [art] Lock RT PCRs Done
20,928,655 UART: [art] Populate DV Done
20,933,961 UART: [fht] FMC Alias Private Key: 7
20,935,461 UART: [art] Derive CDI
20,936,286 UART: [art] Store in in slot 0x4
20,978,667 UART: [art] Derive Key Pair
20,979,670 UART: [art] Store priv key in slot 0x5
23,406,539 UART: [art] Derive Key Pair - Done
23,419,642 UART: [art] Signing Cert with AUTHO
23,420,954 UART: RITY.KEYID = 7
25,126,440 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,955 UART: [art] PUB.X = 9E7F03970526B5A245DD84B8CF6292E62FF7DE529B9D8C7848C6A321148DEFCEEDB366DC970520934703F5815815003A
25,135,186 UART: [art] PUB.Y = 96352D469CAE80B6CA6BB0367FB1DD223D48AA7DED559565EE7BDFC0784A998B9F5E05433BB8CE36D2317AE333A73E30
25,142,445 UART: [art] SIG.R = DA6B9D7D4E296BBBC3C67A5D367C0A7B2273959E774816D701903396DE034F061271D557F8755F2CD9C4EE02FD57BD73
25,149,999 UART: [art] SIG.S = 98C4D197AD1E5E9C908D09AE5EE588D63596D7BF9DC4BDFBF985ABC04C1AC50BF6EB6B432C80ABA4DF66DFC055907F6E
26,128,580 UART: Caliptra RT
26,129,298 UART: [state] CFI Enabled
26,245,842 UART: [rt] RT listening for mailbox commands...
26,248,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,278,808 UART: [rt]cmd =0x44504543, len=96
30,561,650 >>> mbox cmd response data (6236 bytes)
30,591,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,621,821 UART: [rt]cmd =0x44504543, len=96
30,652,995 >>> mbox cmd response data (56 bytes)
30,653,724 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,683,826 UART: [rt]cmd =0x52564348, len=36
30,686,486 >>> mbox cmd response data (8 bytes)
30,687,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,717,635 UART: [rt]cmd =0x44504543, len=96
35,001,859 >>> mbox cmd response data (6236 bytes)
35,030,662 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,061,031 UART: [rt]cmd =0x53574545, len=84
39,196,614 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,756,000 ready_for_fw is high
3,756,389 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,918 >>> mbox cmd response: success
19,207,507 UART:
19,207,922 UART: Running Caliptra FMC ...
19,209,065 UART:
19,209,238 UART: [state] CFI Enabled
19,217,519 UART: [fht] FMC Alias Private Key: 7
20,974,167 UART: [art] Extend RT PCRs Done
20,975,394 UART: [art] Lock RT PCRs Done
20,977,105 UART: [art] Populate DV Done
20,982,635 UART: [fht] FMC Alias Private Key: 7
20,984,198 UART: [art] Derive CDI
20,984,936 UART: [art] Store in in slot 0x4
21,027,529 UART: [art] Derive Key Pair
21,028,541 UART: [art] Store priv key in slot 0x5
23,455,697 UART: [art] Derive Key Pair - Done
23,468,483 UART: [art] Signing Cert with AUTHO
23,469,795 UART: RITY.KEYID = 7
25,175,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,783 UART: [art] PUB.X = AEF7170CC0D678ABEFC638FC3D34233427EFC4A6E2B2E19A9C45473460E3FCE4EDB05486A00E9B9FDE13B3A65184EA09
25,184,090 UART: [art] PUB.Y = EC3BF18CE94E7F6003E5740E51C50709FD52BBE8EE82EBACA9E674CC57E3310FD508A68CD4EFEC32C725637723387345
25,191,325 UART: [art] SIG.R = A84E79C891A76AD7875EA5C3CEFDA8ADCA40139BABF2C48DE08DB26DF9C5D440F59565B35ACC5A47FB36842DB706B011
25,198,782 UART: [art] SIG.S = D9CA8EEAF38552408E9E04F60D0252524238073ADCC0E5D54126D2988DB1FC8BB5F986A8B8A4510A9B2B902AB750CAF3
26,177,886 UART: Caliptra RT
26,178,595 UART: [state] CFI Enabled
26,295,700 UART: [rt] RT listening for mailbox commands...
26,298,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,328,844 UART: [rt]cmd =0x44504543, len=96
30,613,297 >>> mbox cmd response data (6236 bytes)
30,642,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,673,443 UART: [rt]cmd =0x44504543, len=96
30,705,215 >>> mbox cmd response data (56 bytes)
30,705,932 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,735,814 UART: [rt]cmd =0x52564348, len=36
30,738,500 >>> mbox cmd response data (8 bytes)
30,739,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,769,594 UART: [rt]cmd =0x44504543, len=96
35,053,408 >>> mbox cmd response data (6236 bytes)
35,082,193 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,112,896 UART: [rt]cmd =0x53574545, len=84
39,248,070 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,521 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 ready_for_fw is high
1,481,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,112 UART: [idev] Erasing UDS.KEYID = 0
1,505,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,308 UART: [idev] --
1,515,431 UART: [ldev] ++
1,515,599 UART: [ldev] CDI.KEYID = 6
1,515,962 UART: [ldev] SUBJECT.KEYID = 5
1,516,388 UART: [ldev] AUTHORITY.KEYID = 7
1,516,851 UART: [ldev] FE.KEYID = 1
1,522,039 UART: [ldev] Erasing FE.KEYID = 1
1,547,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,623 UART: [fwproc] Waiting for Commands...
1,587,438 UART: [fwproc] Received command 0x46574c44
1,588,229 UART: [fwproc] Received Image of size 114084 bytes
2,883,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,703 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,488 >>> mbox cmd response: success
3,076,572 UART: [afmc] ++
3,076,740 UART: [afmc] CDI.KEYID = 6
3,077,102 UART: [afmc] SUBJECT.KEYID = 7
3,077,527 UART: [afmc] AUTHORITY.KEYID = 5
3,112,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,349 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,039 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,938 UART: [afmc] --
3,156,048 UART: [cold-reset] --
3,156,792 UART: [state] Locking Datavault
3,157,821 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,425 UART: [state] Locking ICCM
3,158,951 UART: [exit] Launching FMC @ 0x40000130
3,164,280 UART:
3,164,296 UART: Running Caliptra FMC ...
3,164,704 UART:
3,164,758 UART: [state] CFI Enabled
3,175,293 UART: [fht] FMC Alias Private Key: 7
3,282,984 UART: [art] Extend RT PCRs Done
3,283,412 UART: [art] Lock RT PCRs Done
3,285,330 UART: [art] Populate DV Done
3,293,641 UART: [fht] FMC Alias Private Key: 7
3,294,599 UART: [art] Derive CDI
3,294,879 UART: [art] Store in in slot 0x4
3,380,336 UART: [art] Derive Key Pair
3,380,696 UART: [art] Store priv key in slot 0x5
3,394,126 UART: [art] Derive Key Pair - Done
3,408,564 UART: [art] Signing Cert with AUTHO
3,409,044 UART: RITY.KEYID = 7
3,424,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,851 UART: [art] PUB.X = FD6FF24F4AEB58E5BD6634E1F75601CE12DB60221638BBE56D52026941CE980F03D605900D99DF16EDC1743EE917DECF
3,431,615 UART: [art] PUB.Y = 7F1309050D20388FE3BE7FB8AEDAB5B7B5DEC0AD97C4E46814CC30111E40F0EBDE8E30C61FC642BFF0D0DAC2193728E3
3,438,578 UART: [art] SIG.R = 9F1851CD39961ED94E19878264AE163AB6BC513AB6C403FEEC8D9348E91ECF73405C0F44A49C56B6A9841F06A74A7100
3,445,321 UART: [art] SIG.S = 7305ADF75E049143F73CFA63B632A4F151256139DA225ECDC0A60CADA4297507775C856D43A7794506D7B3A2192C6B8B
3,469,235 UART: Caliptra RT
3,469,488 UART: [state] CFI Enabled
3,577,597 UART: [rt] RT listening for mailbox commands...
3,578,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,617 UART: [rt]cmd =0x44504543, len=96
3,789,476 >>> mbox cmd response data (6236 bytes)
3,789,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,640 UART: [rt]cmd =0x44504543, len=96
3,850,789 >>> mbox cmd response data (56 bytes)
3,850,790 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,645 UART: [rt]cmd =0x52564348, len=36
3,883,054 >>> mbox cmd response data (8 bytes)
3,883,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,020 UART: [rt]cmd =0x44504543, len=96
4,093,623 >>> mbox cmd response data (6236 bytes)
4,093,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,123,561 UART: [rt]cmd =0x53574545, len=84
4,148,924 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,943 ready_for_fw is high
1,362,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,896 >>> mbox cmd response: success
2,985,788 UART:
2,985,804 UART: Running Caliptra FMC ...
2,986,212 UART:
2,986,266 UART: [state] CFI Enabled
2,997,019 UART: [fht] FMC Alias Private Key: 7
3,105,070 UART: [art] Extend RT PCRs Done
3,105,498 UART: [art] Lock RT PCRs Done
3,107,476 UART: [art] Populate DV Done
3,115,587 UART: [fht] FMC Alias Private Key: 7
3,116,605 UART: [art] Derive CDI
3,116,885 UART: [art] Store in in slot 0x4
3,202,742 UART: [art] Derive Key Pair
3,203,102 UART: [art] Store priv key in slot 0x5
3,216,186 UART: [art] Derive Key Pair - Done
3,230,985 UART: [art] Signing Cert with AUTHO
3,231,465 UART: RITY.KEYID = 7
3,246,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,404 UART: [art] PUB.X = E7FEE72B56B37135041DF9A96B79D330FBE6E34FF27F8598C20FA32FCFB7917B576E1AE1670311541CBDC522F37C79E3
3,254,175 UART: [art] PUB.Y = 8FA061855103DE2D69199DB17F9B57C1213CD481AE62A73316DE4DB6FABEC5FADD5640F23859393815AFF533CD5B12FE
3,261,134 UART: [art] SIG.R = 681BCB15B60A13D65BAFE67AB62DFCC938EF13F7D7AEF56545BDA80C965A0CDA755DA9947C433DE54A28C12063CD9E46
3,267,915 UART: [art] SIG.S = 44F2C9C36BABFAAB0A6C27F1627010B7D38C3AC8E9516A5B15C07A7165ADC1E0BC3A6E5A1A803522BC6A465F5BAE9B8D
3,292,019 UART: Caliptra RT
3,292,272 UART: [state] CFI Enabled
3,400,890 UART: [rt] RT listening for mailbox commands...
3,401,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,982 UART: [rt]cmd =0x44504543, len=96
3,611,931 >>> mbox cmd response data (6236 bytes)
3,611,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,967 UART: [rt]cmd =0x44504543, len=96
3,673,532 >>> mbox cmd response data (56 bytes)
3,673,533 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,182 UART: [rt]cmd =0x52564348, len=36
3,705,515 >>> mbox cmd response data (8 bytes)
3,705,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,209 UART: [rt]cmd =0x44504543, len=96
3,916,647 >>> mbox cmd response data (6236 bytes)
3,916,648 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,635 UART: [rt]cmd =0x53574545, len=84
3,972,676 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,290 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,208 UART: [kat] SHA2-256
892,146 UART: [kat] SHA2-384
895,059 UART: [kat] SHA2-512-ACC
896,960 UART: [kat] ECC-384
902,723 UART: [kat] HMAC-384Kdf
907,365 UART: [kat] LMS
1,475,561 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 ready_for_fw is high
1,481,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,111 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,522,086 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,608 UART: [fwproc] Waiting for Commands...
1,587,435 UART: [fwproc] Received command 0x46574c44
1,588,226 UART: [fwproc] Received Image of size 114084 bytes
2,883,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,028 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,965 >>> mbox cmd response: success
3,077,221 UART: [afmc] ++
3,077,389 UART: [afmc] CDI.KEYID = 6
3,077,751 UART: [afmc] SUBJECT.KEYID = 7
3,078,176 UART: [afmc] AUTHORITY.KEYID = 5
3,113,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,543 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,051 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,936 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,626 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,347 UART: [afmc] --
3,156,321 UART: [cold-reset] --
3,157,353 UART: [state] Locking Datavault
3,158,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,232 UART: [state] Locking ICCM
3,159,870 UART: [exit] Launching FMC @ 0x40000130
3,165,199 UART:
3,165,215 UART: Running Caliptra FMC ...
3,165,623 UART:
3,165,766 UART: [state] CFI Enabled
3,175,955 UART: [fht] FMC Alias Private Key: 7
3,283,314 UART: [art] Extend RT PCRs Done
3,283,742 UART: [art] Lock RT PCRs Done
3,284,928 UART: [art] Populate DV Done
3,293,023 UART: [fht] FMC Alias Private Key: 7
3,294,187 UART: [art] Derive CDI
3,294,467 UART: [art] Store in in slot 0x4
3,380,272 UART: [art] Derive Key Pair
3,380,632 UART: [art] Store priv key in slot 0x5
3,394,258 UART: [art] Derive Key Pair - Done
3,409,338 UART: [art] Signing Cert with AUTHO
3,409,818 UART: RITY.KEYID = 7
3,425,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,011 UART: [art] PUB.X = 7F6263FA34C68BD5A79CFA018DD48766CCA4193A929EB918F3531771271C290340B829B3101528D6BF67D974EB89E52E
3,432,773 UART: [art] PUB.Y = 7BAE77490C23B3D667B41D986F6A40FCA07FB7C0AEF3EB33DCD23283FEB81BAFD8182AAE0CCB8CDAD94EE0068E6DA2B3
3,439,746 UART: [art] SIG.R = 49895E946EB96FED2209DAD74465A01C955F7E6D5B2DE3C51BF7C539FA70DA3F8E5389A9A66351CA03B4C0F57AF96976
3,446,520 UART: [art] SIG.S = BE2E32C8A8B2324819727B644082A5DA752F3CC12D15C0F9992312DB6A5D100BCE701C56226369D715FACCD9D527D59E
3,469,928 UART: Caliptra RT
3,470,273 UART: [state] CFI Enabled
3,578,838 UART: [rt] RT listening for mailbox commands...
3,579,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,330 UART: [rt]cmd =0x44504543, len=96
3,792,504 >>> mbox cmd response data (6236 bytes)
3,792,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,388 UART: [rt]cmd =0x44504543, len=96
3,854,413 >>> mbox cmd response data (56 bytes)
3,854,414 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,884,243 UART: [rt]cmd =0x52564348, len=36
3,886,172 >>> mbox cmd response data (8 bytes)
3,886,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,046 UART: [rt]cmd =0x44504543, len=96
4,097,525 >>> mbox cmd response data (6236 bytes)
4,097,526 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,127,475 UART: [rt]cmd =0x53574545, len=84
4,153,254 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,078 ready_for_fw is high
1,362,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,187 >>> mbox cmd response: success
2,985,339 UART:
2,985,355 UART: Running Caliptra FMC ...
2,985,763 UART:
2,985,906 UART: [state] CFI Enabled
2,996,541 UART: [fht] FMC Alias Private Key: 7
3,104,510 UART: [art] Extend RT PCRs Done
3,104,938 UART: [art] Lock RT PCRs Done
3,106,356 UART: [art] Populate DV Done
3,114,567 UART: [fht] FMC Alias Private Key: 7
3,115,619 UART: [art] Derive CDI
3,115,899 UART: [art] Store in in slot 0x4
3,201,548 UART: [art] Derive Key Pair
3,201,908 UART: [art] Store priv key in slot 0x5
3,215,092 UART: [art] Derive Key Pair - Done
3,229,630 UART: [art] Signing Cert with AUTHO
3,230,110 UART: RITY.KEYID = 7
3,245,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,285 UART: [art] PUB.X = DD948C9CC7BFE50742AE9337942199E7098715E539FEE88B912AF28F61B1B3598C779CB3CC276470FE76718CC0EE2EA4
3,253,055 UART: [art] PUB.Y = 846F74281A8C5700A90F19009F6CF526510BFE8697ECB259FDBD82B9971FB58EEAC6F6A1655A61A5EB64E0E7DE1FB915
3,259,967 UART: [art] SIG.R = BEB742588E1AE267EDBBA021F0E4917DAF90FECD5BE1F06292C92600CDD06C48F9252140ED0CE2E558F917F07DC850E8
3,266,728 UART: [art] SIG.S = 66128937029236B9FC09F0F1A8525804613A94F6A95BCC91D0B443F49D944C804C426A997F460DF27647B0E382623A32
3,290,649 UART: Caliptra RT
3,290,994 UART: [state] CFI Enabled
3,399,725 UART: [rt] RT listening for mailbox commands...
3,400,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,993 UART: [rt]cmd =0x44504543, len=96
3,612,594 >>> mbox cmd response data (6236 bytes)
3,612,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,448 UART: [rt]cmd =0x44504543, len=96
3,673,661 >>> mbox cmd response data (56 bytes)
3,673,662 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,509 UART: [rt]cmd =0x52564348, len=36
3,705,684 >>> mbox cmd response data (8 bytes)
3,705,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,612 UART: [rt]cmd =0x44504543, len=96
3,916,406 >>> mbox cmd response data (6236 bytes)
3,916,407 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,106 UART: [rt]cmd =0x53574545, len=84
3,972,341 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,707 UART: [kat] SHA2-256
903,647 UART: [kat] SHA2-384
906,542 UART: [kat] SHA2-512-ACC
908,443 UART: [kat] ECC-384
918,566 UART: [kat] HMAC-384Kdf
923,384 UART: [kat] LMS
1,171,712 UART: [kat] --
1,172,549 UART: [cold-reset] ++
1,173,037 UART: [fht] FHT @ 0x50003400
1,175,840 UART: [idev] ++
1,176,008 UART: [idev] CDI.KEYID = 6
1,176,368 UART: [idev] SUBJECT.KEYID = 7
1,176,792 UART: [idev] UDS.KEYID = 0
1,177,137 ready_for_fw is high
1,177,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,856 UART: [idev] Erasing UDS.KEYID = 0
1,201,867 UART: [idev] Sha1 KeyId Algorithm
1,210,433 UART: [idev] --
1,211,505 UART: [ldev] ++
1,211,673 UART: [ldev] CDI.KEYID = 6
1,212,036 UART: [ldev] SUBJECT.KEYID = 5
1,212,462 UART: [ldev] AUTHORITY.KEYID = 7
1,212,925 UART: [ldev] FE.KEYID = 1
1,218,111 UART: [ldev] Erasing FE.KEYID = 1
1,245,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,031 UART: [ldev] --
1,284,300 UART: [fwproc] Wait for Commands...
1,285,012 UART: [fwproc] Recv command 0x46574c44
1,285,740 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,073 >>> mbox cmd response: success
2,773,305 UART: [afmc] ++
2,773,473 UART: [afmc] CDI.KEYID = 6
2,773,835 UART: [afmc] SUBJECT.KEYID = 7
2,774,260 UART: [afmc] AUTHORITY.KEYID = 5
2,809,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,000 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,758 UART: [afmc] --
2,852,748 UART: [cold-reset] --
2,853,646 UART: [state] Locking Datavault
2,854,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,389 UART: [state] Locking ICCM
2,856,015 UART: [exit] Launching FMC @ 0x40000130
2,861,344 UART:
2,861,360 UART: Running Caliptra FMC ...
2,861,768 UART:
2,861,822 UART: [state] CFI Enabled
2,872,113 UART: [fht] FMC Alias Private Key: 7
2,980,024 UART: [art] Extend RT PCRs Done
2,980,452 UART: [art] Lock RT PCRs Done
2,982,230 UART: [art] Populate DV Done
2,990,371 UART: [fht] FMC Alias Private Key: 7
2,991,325 UART: [art] Derive CDI
2,991,605 UART: [art] Store in in slot 0x4
3,076,832 UART: [art] Derive Key Pair
3,077,192 UART: [art] Store priv key in slot 0x5
3,090,698 UART: [art] Derive Key Pair - Done
3,105,529 UART: [art] Signing Cert with AUTHO
3,106,009 UART: RITY.KEYID = 7
3,121,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,900 UART: [art] PUB.X = A1B8365E8F6ABFD5D6ADD7E1585626BB25F9CA627A92BEC7D1B666A2B1D9890307CB3970BF94A992176962F5DF2249B5
3,128,674 UART: [art] PUB.Y = 0CFAF306D0E374838668EA7318F6954CC5EA364F0343F4B543C6315522A0EBD3E72FED307B2083B3BEC3F524AA78537E
3,135,621 UART: [art] SIG.R = 2859C4AC5538C3DCD0895F6D0B826297F13441B1E37592631CDF56B3898F848995A2A610A3F53BE443F5E4F10844DF6A
3,142,383 UART: [art] SIG.S = 36E8B22858EE2910DC04E89736A7AE1588260B78FBF3711528DCEA933DC179A84717174A15F8A4F36F96F69C738C1A37
3,166,378 UART: Caliptra RT
3,166,631 UART: [state] CFI Enabled
3,274,102 UART: [rt] RT listening for mailbox commands...
3,274,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,102 UART: [rt]cmd =0x44504543, len=96
3,484,083 >>> mbox cmd response data (6236 bytes)
3,484,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,021 UART: [rt]cmd =0x44504543, len=96
3,545,676 >>> mbox cmd response data (56 bytes)
3,545,677 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,436 UART: [rt]cmd =0x52564348, len=36
3,577,617 >>> mbox cmd response data (8 bytes)
3,577,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,423 UART: [rt]cmd =0x44504543, len=96
3,787,881 >>> mbox cmd response data (6236 bytes)
3,787,882 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,999 UART: [rt]cmd =0x53574545, len=84
3,843,020 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,033 ready_for_fw is high
1,061,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,344 >>> mbox cmd response: success
2,688,038 UART:
2,688,054 UART: Running Caliptra FMC ...
2,688,462 UART:
2,688,516 UART: [state] CFI Enabled
2,699,379 UART: [fht] FMC Alias Private Key: 7
2,806,908 UART: [art] Extend RT PCRs Done
2,807,336 UART: [art] Lock RT PCRs Done
2,808,960 UART: [art] Populate DV Done
2,817,477 UART: [fht] FMC Alias Private Key: 7
2,818,499 UART: [art] Derive CDI
2,818,779 UART: [art] Store in in slot 0x4
2,904,702 UART: [art] Derive Key Pair
2,905,062 UART: [art] Store priv key in slot 0x5
2,917,932 UART: [art] Derive Key Pair - Done
2,932,662 UART: [art] Signing Cert with AUTHO
2,933,142 UART: RITY.KEYID = 7
2,948,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,103 UART: [art] PUB.X = 1FAEEE7D1F5457A1FB03580CB17675CB7449C5470000E9FAAEA4709702C72D13468DD6FBD58A590D6C8F4AD5CDD79107
2,955,826 UART: [art] PUB.Y = F4AA871DF00FC55CBD3807C2BF985BDE6B45B17AADACFE31FA8CAC60BBCC5CF6F082B954062D37CFDF0BFC2C7550C279
2,962,798 UART: [art] SIG.R = 0A2425FA7F135F8A23AF85CC4D9192CE01D487ED046184402E426CC261A42CD9F44B644120011D795449897EE324CF25
2,969,552 UART: [art] SIG.S = EFA4498BDB9B2B10245DA80B4A44F699966E175EE75049ED44C1661F03BF13C095195F859EC5B5BCD4C652EE5FBA3AE9
2,993,005 UART: Caliptra RT
2,993,258 UART: [state] CFI Enabled
3,102,217 UART: [rt] RT listening for mailbox commands...
3,102,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,423 UART: [rt]cmd =0x44504543, len=96
3,314,619 >>> mbox cmd response data (6236 bytes)
3,314,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,575 UART: [rt]cmd =0x44504543, len=96
3,376,388 >>> mbox cmd response data (56 bytes)
3,376,389 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,120 UART: [rt]cmd =0x52564348, len=36
3,408,219 >>> mbox cmd response data (8 bytes)
3,408,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,137 UART: [rt]cmd =0x44504543, len=96
3,617,903 >>> mbox cmd response data (6236 bytes)
3,617,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,897 UART: [rt]cmd =0x53574545, len=84
3,673,254 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,485 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,172,188 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 ready_for_fw is high
1,176,738 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,201,722 UART: [idev] Sha1 KeyId Algorithm
1,210,126 UART: [idev] --
1,211,376 UART: [ldev] ++
1,211,544 UART: [ldev] CDI.KEYID = 6
1,211,907 UART: [ldev] SUBJECT.KEYID = 5
1,212,333 UART: [ldev] AUTHORITY.KEYID = 7
1,212,796 UART: [ldev] FE.KEYID = 1
1,218,196 UART: [ldev] Erasing FE.KEYID = 1
1,244,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,164 UART: [ldev] --
1,284,603 UART: [fwproc] Wait for Commands...
1,285,355 UART: [fwproc] Recv command 0x46574c44
1,286,083 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,742 >>> mbox cmd response: success
2,773,930 UART: [afmc] ++
2,774,098 UART: [afmc] CDI.KEYID = 6
2,774,460 UART: [afmc] SUBJECT.KEYID = 7
2,774,885 UART: [afmc] AUTHORITY.KEYID = 5
2,810,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,937 UART: [afmc] --
2,854,049 UART: [cold-reset] --
2,854,801 UART: [state] Locking Datavault
2,855,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,484 UART: [state] Locking ICCM
2,857,024 UART: [exit] Launching FMC @ 0x40000130
2,862,353 UART:
2,862,369 UART: Running Caliptra FMC ...
2,862,777 UART:
2,862,920 UART: [state] CFI Enabled
2,873,465 UART: [fht] FMC Alias Private Key: 7
2,981,574 UART: [art] Extend RT PCRs Done
2,982,002 UART: [art] Lock RT PCRs Done
2,983,402 UART: [art] Populate DV Done
2,991,643 UART: [fht] FMC Alias Private Key: 7
2,992,771 UART: [art] Derive CDI
2,993,051 UART: [art] Store in in slot 0x4
3,079,186 UART: [art] Derive Key Pair
3,079,546 UART: [art] Store priv key in slot 0x5
3,093,032 UART: [art] Derive Key Pair - Done
3,107,911 UART: [art] Signing Cert with AUTHO
3,108,391 UART: RITY.KEYID = 7
3,123,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,144 UART: [art] PUB.X = B243206FBD01DC471AC8D4D519472885764CE7C77DDA4BF0AA5155A24091FAE0A0D3A9B01AFFA9565A8A63C07060EDD8
3,130,925 UART: [art] PUB.Y = 8B76E1B45E4EE470B2981F625554C89779A278CB3116DA3A9BA2C2F96907682A10BE03B05FB1C5ABDA6801AB002BA066
3,137,850 UART: [art] SIG.R = DD2CD4464F26045F206F91BFB2CBDD28463CFDB48E4A77918FD825DE1E85FECC4D900A20D1D1471BC62C628A32F4341B
3,144,630 UART: [art] SIG.S = B1ABFAE72C03473202FFA11951E63C55416790770D490E49851192A21556D18205C8A30E3B06543F36014FA6E59C39A1
3,168,257 UART: Caliptra RT
3,168,602 UART: [state] CFI Enabled
3,276,562 UART: [rt] RT listening for mailbox commands...
3,277,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,746 UART: [rt]cmd =0x44504543, len=96
3,488,750 >>> mbox cmd response data (6236 bytes)
3,488,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,706 UART: [rt]cmd =0x44504543, len=96
3,550,509 >>> mbox cmd response data (56 bytes)
3,550,510 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,855 UART: [rt]cmd =0x52564348, len=36
3,582,122 >>> mbox cmd response data (8 bytes)
3,582,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,992 UART: [rt]cmd =0x44504543, len=96
3,792,088 >>> mbox cmd response data (6236 bytes)
3,792,089 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,876 UART: [rt]cmd =0x53574545, len=84
3,847,491 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,272 ready_for_fw is high
1,061,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,131 >>> mbox cmd response: success
2,685,393 UART:
2,685,409 UART: Running Caliptra FMC ...
2,685,817 UART:
2,685,960 UART: [state] CFI Enabled
2,696,529 UART: [fht] FMC Alias Private Key: 7
2,804,536 UART: [art] Extend RT PCRs Done
2,804,964 UART: [art] Lock RT PCRs Done
2,806,496 UART: [art] Populate DV Done
2,814,785 UART: [fht] FMC Alias Private Key: 7
2,815,771 UART: [art] Derive CDI
2,816,051 UART: [art] Store in in slot 0x4
2,901,364 UART: [art] Derive Key Pair
2,901,724 UART: [art] Store priv key in slot 0x5
2,915,316 UART: [art] Derive Key Pair - Done
2,930,351 UART: [art] Signing Cert with AUTHO
2,930,831 UART: RITY.KEYID = 7
2,946,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,940 UART: [art] PUB.X = 1EBEB48704500AB9EC85AD5B90B90684CE3E0B69F85C9F1D8F2A86A43E6D50D2F5A3373FB6D77FA54B29E93793780D67
2,953,705 UART: [art] PUB.Y = DBA411AAAA283877112521E2750F0DF9EBC137075A523E8E5C03B8A8E6DF23D2A613E619DF0AD09F2207D8F67A53E926
2,960,645 UART: [art] SIG.R = 64FE7863B64700507364C6DB2E292C5800C7B3C83BB2F25E141EF5504576A90561DC94CCD229A1D5A29D15E6927FCCBD
2,967,372 UART: [art] SIG.S = A533C09F1949363ABEA4F59FF4A65462F932AA7A36CB97A128560009C8BCF065C9E7A8EAFEB6A96D18629CC1070505FA
2,990,897 UART: Caliptra RT
2,991,242 UART: [state] CFI Enabled
3,099,025 UART: [rt] RT listening for mailbox commands...
3,099,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,145 UART: [rt]cmd =0x44504543, len=96
3,312,004 >>> mbox cmd response data (6236 bytes)
3,312,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,014 UART: [rt]cmd =0x44504543, len=96
3,373,743 >>> mbox cmd response data (56 bytes)
3,373,744 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,257 UART: [rt]cmd =0x52564348, len=36
3,405,524 >>> mbox cmd response data (8 bytes)
3,405,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,616 UART: [rt]cmd =0x44504543, len=96
3,616,317 >>> mbox cmd response data (6236 bytes)
3,616,318 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,229 UART: [rt]cmd =0x53574545, len=84
3,672,848 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,174,427 ready_for_fw is high
1,174,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,209,102 UART: [ldev] ++
1,209,270 UART: [ldev] CDI.KEYID = 6
1,209,634 UART: [ldev] SUBJECT.KEYID = 5
1,210,061 UART: [ldev] AUTHORITY.KEYID = 7
1,210,524 UART: [ldev] FE.KEYID = 1
1,215,716 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,360 UART: [fwproc] Wait for Commands...
1,282,139 UART: [fwproc] Recv command 0x46574c44
1,282,872 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,491 >>> mbox cmd response: success
2,770,680 UART: [afmc] ++
2,770,848 UART: [afmc] CDI.KEYID = 6
2,771,211 UART: [afmc] SUBJECT.KEYID = 7
2,771,637 UART: [afmc] AUTHORITY.KEYID = 5
2,806,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,125 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,844 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,597 UART: [afmc] --
2,849,487 UART: [cold-reset] --
2,850,333 UART: [state] Locking Datavault
2,851,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,232 UART: [state] Locking ICCM
2,852,898 UART: [exit] Launching FMC @ 0x40000130
2,858,227 UART:
2,858,243 UART: Running Caliptra FMC ...
2,858,651 UART:
2,858,705 UART: [state] CFI Enabled
2,869,248 UART: [fht] FMC Alias Private Key: 7
2,977,601 UART: [art] Extend RT PCRs Done
2,978,029 UART: [art] Lock RT PCRs Done
2,979,677 UART: [art] Populate DV Done
2,988,038 UART: [fht] FMC Alias Private Key: 7
2,989,074 UART: [art] Derive CDI
2,989,354 UART: [art] Store in in slot 0x4
3,074,957 UART: [art] Derive Key Pair
3,075,317 UART: [art] Store priv key in slot 0x5
3,088,509 UART: [art] Derive Key Pair - Done
3,103,158 UART: [art] Signing Cert with AUTHO
3,103,638 UART: RITY.KEYID = 7
3,118,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,619 UART: [art] PUB.X = 49772E0703C9E3DB065BAF09E5D53F041657E68D1F183CA4F9A1D138F0DD288C126F44D587EEB05D5A77E410E5A8B611
3,126,380 UART: [art] PUB.Y = 15AB6B909FF120D0A6340F4C92639B79FB312DD7F86EF93E4EB538B266C36DA31974778A6FE78A5F3C23A8080F031053
3,133,320 UART: [art] SIG.R = E942AEBDFE251ED5FEC152701C8BCE8EDA62D1597844325B53AA4B861C3D873A35250ADC9C1CDE51192D19CD5D2BB2DC
3,140,109 UART: [art] SIG.S = 5663C3A3F94A074E3CA87F0FE56A3CF04C904CF4063CD30DE2FF29C425C79205A17F3F3523CCB7B8E68430E8BE46EB7B
3,164,257 UART: Caliptra RT
3,164,510 UART: [state] CFI Enabled
3,272,857 UART: [rt] RT listening for mailbox commands...
3,273,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,203 UART: [rt]cmd =0x44504543, len=96
3,485,051 >>> mbox cmd response data (6236 bytes)
3,485,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,107 UART: [rt]cmd =0x44504543, len=96
3,546,646 >>> mbox cmd response data (56 bytes)
3,546,647 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,184 UART: [rt]cmd =0x52564348, len=36
3,578,209 >>> mbox cmd response data (8 bytes)
3,578,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,081 UART: [rt]cmd =0x44504543, len=96
3,789,187 >>> mbox cmd response data (6236 bytes)
3,789,188 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,983 UART: [rt]cmd =0x53574545, len=84
3,844,516 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,378 ready_for_fw is high
1,056,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,915 >>> mbox cmd response: success
2,682,199 UART:
2,682,215 UART: Running Caliptra FMC ...
2,682,623 UART:
2,682,677 UART: [state] CFI Enabled
2,693,328 UART: [fht] FMC Alias Private Key: 7
2,801,525 UART: [art] Extend RT PCRs Done
2,801,953 UART: [art] Lock RT PCRs Done
2,803,505 UART: [art] Populate DV Done
2,811,488 UART: [fht] FMC Alias Private Key: 7
2,812,656 UART: [art] Derive CDI
2,812,936 UART: [art] Store in in slot 0x4
2,898,407 UART: [art] Derive Key Pair
2,898,767 UART: [art] Store priv key in slot 0x5
2,911,831 UART: [art] Derive Key Pair - Done
2,926,454 UART: [art] Signing Cert with AUTHO
2,926,934 UART: RITY.KEYID = 7
2,942,278 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,043 UART: [art] PUB.X = A2B350653E303F1EE7EA7366085F3562D50B33646FF8D776695C88673A9C0E595765400172842A15B353E5DC7F849CEB
2,949,793 UART: [art] PUB.Y = 15E838EA37E343BA33326C3B6759E0CC6375F030B6C4881DA19E44C8EC1F3E67EC342CA947DECEAA424D55FAA6F9B944
2,956,757 UART: [art] SIG.R = 98876718C74E80CC65D93304404E015296CB92A2AE8827A2F58C8D940940BB245C2E85C95C2A0005C590A77B13739F53
2,963,483 UART: [art] SIG.S = F2D1C35075B70A19D723E1C1B07F4E324EF18952C176ECD6BA4B2F4A8B66443831FB56F68BD2F6CCAF28DB9886C4BBA0
2,987,611 UART: Caliptra RT
2,987,864 UART: [state] CFI Enabled
3,095,590 UART: [rt] RT listening for mailbox commands...
3,096,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,858 UART: [rt]cmd =0x44504543, len=96
3,307,668 >>> mbox cmd response data (6236 bytes)
3,307,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,688 UART: [rt]cmd =0x44504543, len=96
3,369,705 >>> mbox cmd response data (56 bytes)
3,369,706 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,467 UART: [rt]cmd =0x52564348, len=36
3,401,534 >>> mbox cmd response data (8 bytes)
3,401,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,436 UART: [rt]cmd =0x44504543, len=96
3,611,473 >>> mbox cmd response data (6236 bytes)
3,611,474 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,391 UART: [rt]cmd =0x53574545, len=84
3,667,474 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 ready_for_fw is high
1,174,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,287 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,258 UART: [fwproc] Recv command 0x46574c44
1,282,991 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,316 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,828 >>> mbox cmd response: success
2,771,869 UART: [afmc] ++
2,772,037 UART: [afmc] CDI.KEYID = 6
2,772,400 UART: [afmc] SUBJECT.KEYID = 7
2,772,826 UART: [afmc] AUTHORITY.KEYID = 5
2,807,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,740 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,071 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,844 UART: [afmc] --
2,850,942 UART: [cold-reset] --
2,851,882 UART: [state] Locking Datavault
2,853,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,977 UART: [state] Locking ICCM
2,854,465 UART: [exit] Launching FMC @ 0x40000130
2,859,794 UART:
2,859,810 UART: Running Caliptra FMC ...
2,860,218 UART:
2,860,361 UART: [state] CFI Enabled
2,870,886 UART: [fht] FMC Alias Private Key: 7
2,979,071 UART: [art] Extend RT PCRs Done
2,979,499 UART: [art] Lock RT PCRs Done
2,981,273 UART: [art] Populate DV Done
2,989,554 UART: [fht] FMC Alias Private Key: 7
2,990,516 UART: [art] Derive CDI
2,990,796 UART: [art] Store in in slot 0x4
3,076,703 UART: [art] Derive Key Pair
3,077,063 UART: [art] Store priv key in slot 0x5
3,090,241 UART: [art] Derive Key Pair - Done
3,105,128 UART: [art] Signing Cert with AUTHO
3,105,608 UART: RITY.KEYID = 7
3,120,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,547 UART: [art] PUB.X = 37D1421834346D064855EB0F605E57C446AD0D2EFA9E34C29CDCCD689FE6FB8171A2A7071EA04F9C44F43981FADDE087
3,128,315 UART: [art] PUB.Y = F12D7BE37B48F3577726C5CD5CFA685031C4A0D7686DCF3FC0F1C11A7424E48417FFDFBA68E80704179BCE7C01AE9344
3,135,268 UART: [art] SIG.R = 1C219CD1530D1EBFD3704DF62B6C5EED5FC08481F2651020AE1C2BAB4B505B9CFB14890EED850FD47954A8F540377C76
3,142,041 UART: [art] SIG.S = A99331BE37ED387A8D6E050FA22D116EE9C43EF7306D862751E06B6A34FB4D3C56DD4E4C22B320446782C5093E2B66E6
3,165,769 UART: Caliptra RT
3,166,114 UART: [state] CFI Enabled
3,273,763 UART: [rt] RT listening for mailbox commands...
3,274,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,103 UART: [rt]cmd =0x44504543, len=96
3,486,425 >>> mbox cmd response data (6236 bytes)
3,486,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,433 UART: [rt]cmd =0x44504543, len=96
3,548,464 >>> mbox cmd response data (56 bytes)
3,548,465 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,894 UART: [rt]cmd =0x52564348, len=36
3,580,009 >>> mbox cmd response data (8 bytes)
3,580,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,051 UART: [rt]cmd =0x44504543, len=96
3,791,385 >>> mbox cmd response data (6236 bytes)
3,791,386 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,367 UART: [rt]cmd =0x53574545, len=84
3,847,066 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 ready_for_fw is high
1,056,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,896 >>> mbox cmd response: success
2,680,796 UART:
2,680,812 UART: Running Caliptra FMC ...
2,681,220 UART:
2,681,363 UART: [state] CFI Enabled
2,691,722 UART: [fht] FMC Alias Private Key: 7
2,799,643 UART: [art] Extend RT PCRs Done
2,800,071 UART: [art] Lock RT PCRs Done
2,801,705 UART: [art] Populate DV Done
2,810,006 UART: [fht] FMC Alias Private Key: 7
2,811,116 UART: [art] Derive CDI
2,811,396 UART: [art] Store in in slot 0x4
2,896,769 UART: [art] Derive Key Pair
2,897,129 UART: [art] Store priv key in slot 0x5
2,911,005 UART: [art] Derive Key Pair - Done
2,925,778 UART: [art] Signing Cert with AUTHO
2,926,258 UART: RITY.KEYID = 7
2,941,696 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,461 UART: [art] PUB.X = C137288E1FC0771F610E53F56553F2F3DA21324C9B63849EC4FD299A0446EC56442513BA53FD16524D04B5F594318C1C
2,949,218 UART: [art] PUB.Y = 82E5FD8D67464A646B892F10D2FF52385C6FA6A7B2D8E857434E13657F304FD57A01221BA948CF9BE5339DF6980E2ABF
2,956,168 UART: [art] SIG.R = 3945AD224EEB28570E6A4A01EFAFA81D200E8E933BCD236C5BB4E8BECE4673E7F819EB252C5FAC31EA96E9981111EB5E
2,962,949 UART: [art] SIG.S = EBBE99B4E2B46B5544392F7B4C1D63C88A6F7BD6A49E6ACBBD3F49DBA633A5AD175899FE51173175C2D5C546DD8FFFCF
2,986,842 UART: Caliptra RT
2,987,187 UART: [state] CFI Enabled
3,095,468 UART: [rt] RT listening for mailbox commands...
3,096,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,482 UART: [rt]cmd =0x44504543, len=96
3,306,704 >>> mbox cmd response data (6236 bytes)
3,306,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,710 UART: [rt]cmd =0x44504543, len=96
3,368,263 >>> mbox cmd response data (56 bytes)
3,368,264 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,673 UART: [rt]cmd =0x52564348, len=36
3,399,918 >>> mbox cmd response data (8 bytes)
3,399,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,724 UART: [rt]cmd =0x44504543, len=96
3,611,227 >>> mbox cmd response data (6236 bytes)
3,611,228 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,327 UART: [rt]cmd =0x53574545, len=84
3,667,222 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,000 UART:
192,405 UART: Running Caliptra ROM ...
193,727 UART:
193,887 UART: [state] CFI Enabled
261,762 UART: [state] LifecycleState = Unprovisioned
263,686 UART: [state] DebugLocked = No
265,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,051 UART: [kat] SHA2-256
439,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,254 UART: [kat] ++
450,862 UART: [kat] sha1
461,818 UART: [kat] SHA2-256
464,539 UART: [kat] SHA2-384
469,673 UART: [kat] SHA2-512-ACC
472,038 UART: [kat] ECC-384
2,765,267 UART: [kat] HMAC-384Kdf
2,779,578 UART: [kat] LMS
3,969,911 UART: [kat] --
3,973,716 UART: [cold-reset] ++
3,975,143 UART: [fht] Storing FHT @ 0x50003400
3,986,620 UART: [idev] ++
3,987,188 UART: [idev] CDI.KEYID = 6
3,988,148 UART: [idev] SUBJECT.KEYID = 7
3,989,412 UART: [idev] UDS.KEYID = 0
3,990,445 ready_for_fw is high
3,990,651 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,846 UART: [idev] Erasing UDS.KEYID = 0
7,326,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,933 UART: [idev] --
7,353,303 UART: [ldev] ++
7,353,875 UART: [ldev] CDI.KEYID = 6
7,354,887 UART: [ldev] SUBJECT.KEYID = 5
7,356,044 UART: [ldev] AUTHORITY.KEYID = 7
7,357,337 UART: [ldev] FE.KEYID = 1
7,402,960 UART: [ldev] Erasing FE.KEYID = 1
10,733,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,392 UART: [ldev] --
13,093,525 UART: [fwproc] Waiting for Commands...
13,095,296 UART: [fwproc] Received command 0x46574c44
13,097,480 UART: [fwproc] Received Image of size 113760 bytes
17,152,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,783 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,606,017 >>> mbox cmd response: success
17,611,028 UART: [afmc] ++
17,611,647 UART: [afmc] CDI.KEYID = 6
17,612,564 UART: [afmc] SUBJECT.KEYID = 7
17,613,778 UART: [afmc] AUTHORITY.KEYID = 5
20,983,436 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,920 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,335 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,146 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,547 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,007 UART: [afmc] --
23,357,553 UART: [cold-reset] --
23,361,097 UART: [state] Locking Datavault
23,367,318 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,016 UART: [state] Locking ICCM
23,371,552 UART: [exit] Launching FMC @ 0x40000130
23,379,933 UART:
23,380,180 UART: Running Caliptra FMC ...
23,381,283 UART:
23,381,445 UART: [state] CFI Enabled
23,445,997 UART: [fht] FMC Alias Private Key: 7
25,783,859 UART: [art] Extend RT PCRs Done
25,785,074 UART: [art] Lock RT PCRs Done
25,786,661 UART: [art] Populate DV Done
25,792,233 UART: [fht] FMC Alias Private Key: 7
25,793,781 UART: [art] Derive CDI
25,794,596 UART: [art] Store in in slot 0x4
25,854,291 UART: [art] Derive Key Pair
25,855,331 UART: [art] Store priv key in slot 0x5
29,148,400 UART: [art] Derive Key Pair - Done
29,161,179 UART: [art] Signing Cert with AUTHO
29,162,477 UART: RITY.KEYID = 7
31,449,264 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,918 UART: [art] PUB.X = CAE4F2632B7C490FFCCD02DDC0AE692EF63D6E6E1914D1923A61A649E333278EB26B4854B8A1A96115587745FB561B96
31,458,006 UART: [art] PUB.Y = 3E72705DF58DA882BEC059211A92999EDF146C9D31FBD80CBD84A22DDF3D33E703424746D5EF4237CA1A0FA75E4CB660
31,465,296 UART: [art] SIG.R = 32E0DDF513CC0DD55CD832F66CAE09E99BD28BE50005ED54C27478EC5DD33519DAC15BD671BF1E22A26AA4B7519CB680
31,472,686 UART: [art] SIG.S = 6BC1819910E256EC4C7BA07D3ECC0E5A204E1768A129D9D5794F9B6D220865116A729908998EC8A9FE16FC5E3F82348B
32,777,608 UART: Caliptra RT
32,778,313 UART: [state] CFI Enabled
32,938,575 UART: [rt] RT listening for mailbox commands...
32,940,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,972,009 UART: [rt]cmd =0x44504543, len=96
38,756,046 >>> mbox cmd response data (6236 bytes)
38,785,178 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,815,588 UART: [rt]cmd =0x53574545, len=84
44,402,607 >>> mbox cmd response data (200 bytes)
44,786,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,817,084 UART: [rt]cmd =0x44504543, len=96
44,848,746 >>> mbox cmd response data (56 bytes)
44,849,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,880,087 UART: [rt]cmd =0x44504543, len=96
44,933,109 >>> mbox cmd response data (24 bytes)
44,933,699 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,964,057 UART: [rt]cmd =0x53574545, len=84
50,546,312 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,804,591 ready_for_fw is high
3,804,982 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,861,159 >>> mbox cmd response: success
23,547,699 UART:
23,548,108 UART: Running Caliptra FMC ...
23,549,308 UART:
23,549,479 UART: [state] CFI Enabled
23,617,322 UART: [fht] FMC Alias Private Key: 7
25,954,547 UART: [art] Extend RT PCRs Done
25,955,774 UART: [art] Lock RT PCRs Done
25,957,592 UART: [art] Populate DV Done
25,962,903 UART: [fht] FMC Alias Private Key: 7
25,964,443 UART: [art] Derive CDI
25,965,259 UART: [art] Store in in slot 0x4
26,026,527 UART: [art] Derive Key Pair
26,027,574 UART: [art] Store priv key in slot 0x5
29,321,837 UART: [art] Derive Key Pair - Done
29,334,570 UART: [art] Signing Cert with AUTHO
29,335,883 UART: RITY.KEYID = 7
31,622,582 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,096 UART: [art] PUB.X = D166CC0CCBE878E6D11567DDDDBB6EAFFD02A63B66848B713E7F8EFD9E52A511C4690CF77D64F88956783BCC08373CDA
31,631,366 UART: [art] PUB.Y = A443C31FFBCAC7EE8B4DAA664C5D8D59D2FCB4A0B7F71A5FE09292452FDBFD3C78AB4643A641A6BA6495F6B4486AF900
31,638,629 UART: [art] SIG.R = FDFBF69CDD31D061D46BD64263A291D2D8CA86FE3C4C2CB7C0AFE4D7F31B4A05ED9E758F75120DC85F482DDA82BBD2AF
31,646,033 UART: [art] SIG.S = A1250BED241FAE2CBEC099477686AAE470890BF7612CE8F90CBD742CAE82E2CDC3C285B046B09FDEFB480FEC22CEB861
32,950,549 UART: Caliptra RT
32,951,251 UART: [state] CFI Enabled
33,112,183 UART: [rt] RT listening for mailbox commands...
33,114,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,145,815 UART: [rt]cmd =0x44504543, len=96
38,930,650 >>> mbox cmd response data (6236 bytes)
38,959,849 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,990,570 UART: [rt]cmd =0x53574545, len=84
44,575,723 >>> mbox cmd response data (200 bytes)
44,963,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,993,943 UART: [rt]cmd =0x44504543, len=96
45,024,881 >>> mbox cmd response data (56 bytes)
45,025,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,056,245 UART: [rt]cmd =0x44504543, len=96
45,105,123 >>> mbox cmd response data (24 bytes)
45,105,714 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,136,176 UART: [rt]cmd =0x53574545, len=84
50,717,841 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
192,910 UART:
193,280 UART: Running Caliptra ROM ...
194,404 UART:
603,974 UART: [state] CFI Enabled
615,642 UART: [state] LifecycleState = Unprovisioned
617,583 UART: [state] DebugLocked = No
619,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,966 UART: [kat] SHA2-256
793,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,260 UART: [kat] ++
804,702 UART: [kat] sha1
814,998 UART: [kat] SHA2-256
817,646 UART: [kat] SHA2-384
822,351 UART: [kat] SHA2-512-ACC
824,749 UART: [kat] ECC-384
3,108,081 UART: [kat] HMAC-384Kdf
3,120,172 UART: [kat] LMS
4,310,285 UART: [kat] --
4,312,663 UART: [cold-reset] ++
4,313,816 UART: [fht] Storing FHT @ 0x50003400
4,324,648 UART: [idev] ++
4,325,204 UART: [idev] CDI.KEYID = 6
4,326,104 UART: [idev] SUBJECT.KEYID = 7
4,327,430 UART: [idev] UDS.KEYID = 0
4,328,401 ready_for_fw is high
4,328,590 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,471,428 UART: [idev] Erasing UDS.KEYID = 0
7,615,243 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,221 UART: [idev] --
7,641,408 UART: [ldev] ++
7,641,983 UART: [ldev] CDI.KEYID = 6
7,642,938 UART: [ldev] SUBJECT.KEYID = 5
7,644,141 UART: [ldev] AUTHORITY.KEYID = 7
7,645,417 UART: [ldev] FE.KEYID = 1
7,656,543 UART: [ldev] Erasing FE.KEYID = 1
10,944,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,512 UART: [ldev] --
13,308,049 UART: [fwproc] Waiting for Commands...
13,310,294 UART: [fwproc] Received command 0x46574c44
13,312,527 UART: [fwproc] Received Image of size 113760 bytes
17,356,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,962 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,740 >>> mbox cmd response: success
17,821,096 UART: [afmc] ++
17,821,692 UART: [afmc] CDI.KEYID = 6
17,822,593 UART: [afmc] SUBJECT.KEYID = 7
17,823,858 UART: [afmc] AUTHORITY.KEYID = 5
21,142,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,282 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,594 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,978 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,804 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,202 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,690 UART: [afmc] --
23,508,741 UART: [cold-reset] --
23,513,248 UART: [state] Locking Datavault
23,517,685 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,439 UART: [state] Locking ICCM
23,521,369 UART: [exit] Launching FMC @ 0x40000130
23,529,762 UART:
23,529,993 UART: Running Caliptra FMC ...
23,531,088 UART:
23,531,248 UART: [state] CFI Enabled
23,539,394 UART: [fht] FMC Alias Private Key: 7
25,870,602 UART: [art] Extend RT PCRs Done
25,871,833 UART: [art] Lock RT PCRs Done
25,873,694 UART: [art] Populate DV Done
25,878,888 UART: [fht] FMC Alias Private Key: 7
25,880,426 UART: [art] Derive CDI
25,881,237 UART: [art] Store in in slot 0x4
25,924,199 UART: [art] Derive Key Pair
25,925,193 UART: [art] Store priv key in slot 0x5
29,167,143 UART: [art] Derive Key Pair - Done
29,179,926 UART: [art] Signing Cert with AUTHO
29,181,221 UART: RITY.KEYID = 7
31,460,339 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,845 UART: [art] PUB.X = 71B1D24FD8744B31247A7FD4AC96FD665807622C6F079414A8A20899BB4363E5EE86A0D1C1595CD5701CA1529DA3558C
31,469,102 UART: [art] PUB.Y = 623948790398948EECB90B1F4E156A202C885B02FFC6B26DDB714862E4060EA51E12D2ECCE0DBB0FCADFCF585395CF55
31,476,308 UART: [art] SIG.R = 9F1519A512F2A0AB1474EA6985DB1932E2346225044251AA9448417B1F83AE5CA005452A5373D37EB45DB5D8CE74E438
31,483,668 UART: [art] SIG.S = 58EE5DF00103634CAD938CB419065A117BCAE10AFB8FF9C89671472556EF123473CA598A53BC880CA9576EA3DD313597
32,789,362 UART: Caliptra RT
32,790,067 UART: [state] CFI Enabled
32,907,945 UART: [rt] RT listening for mailbox commands...
32,910,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,941,153 UART: [rt]cmd =0x44504543, len=96
38,614,344 >>> mbox cmd response data (6236 bytes)
38,643,478 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,674,031 UART: [rt]cmd =0x53574545, len=84
44,198,860 >>> mbox cmd response data (200 bytes)
44,583,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,614,399 UART: [rt]cmd =0x44504543, len=96
44,645,653 >>> mbox cmd response data (56 bytes)
44,646,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,676,955 UART: [rt]cmd =0x44504543, len=96
44,715,340 >>> mbox cmd response data (24 bytes)
44,715,894 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,746,381 UART: [rt]cmd =0x53574545, len=84
50,270,226 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
4,121,676 ready_for_fw is high
4,122,080 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,056,060 >>> mbox cmd response: success
23,691,377 UART:
23,691,752 UART: Running Caliptra FMC ...
23,692,839 UART:
23,692,991 UART: [state] CFI Enabled
23,700,981 UART: [fht] FMC Alias Private Key: 7
26,031,813 UART: [art] Extend RT PCRs Done
26,033,047 UART: [art] Lock RT PCRs Done
26,034,772 UART: [art] Populate DV Done
26,040,235 UART: [fht] FMC Alias Private Key: 7
26,041,893 UART: [art] Derive CDI
26,042,712 UART: [art] Store in in slot 0x4
26,085,418 UART: [art] Derive Key Pair
26,086,419 UART: [art] Store priv key in slot 0x5
29,328,983 UART: [art] Derive Key Pair - Done
29,342,143 UART: [art] Signing Cert with AUTHO
29,343,438 UART: RITY.KEYID = 7
31,622,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,953 UART: [art] PUB.X = C3C34FFA126238D19FF782AF1EF861636A0399254186D8BA1C46478354F14C620AF64E73883AC98761A284516B5FDDB2
31,631,190 UART: [art] PUB.Y = 713286D956A911003A5E0F4C40E914B0836A647EE2F4C65137ECA8E028C96A649356AE882D360683CF749B781967B7F6
31,638,388 UART: [art] SIG.R = 046008A4585AEC377FD45F1E1DBFEE5EE8E8C1F10ED4A46DDE930DDD96F3DA3C759D2211318B7CDAB8CC7A8E620E49C1
31,645,848 UART: [art] SIG.S = 3FD03ABE92B2981918F011A269E1623967E1D669412647A41EB18D3BE332C1DF8B5E8F2973A9D3F902EA8505B07D2EA3
32,951,105 UART: Caliptra RT
32,951,823 UART: [state] CFI Enabled
33,069,911 UART: [rt] RT listening for mailbox commands...
33,072,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,102,923 UART: [rt]cmd =0x44504543, len=96
38,776,136 >>> mbox cmd response data (6236 bytes)
38,805,313 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,835,954 UART: [rt]cmd =0x53574545, len=84
44,360,882 >>> mbox cmd response data (200 bytes)
44,744,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,775,163 UART: [rt]cmd =0x44504543, len=96
44,806,611 >>> mbox cmd response data (56 bytes)
44,807,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,837,920 UART: [rt]cmd =0x44504543, len=96
44,876,944 >>> mbox cmd response data (24 bytes)
44,877,517 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,907,980 UART: [rt]cmd =0x53574545, len=84
50,432,421 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
192,780 UART:
193,141 UART: Running Caliptra ROM ...
194,336 UART:
194,486 UART: [state] CFI Enabled
263,910 UART: [state] LifecycleState = Unprovisioned
265,843 UART: [state] DebugLocked = No
267,235 UART: [state] WD Timer not started. Device not locked for debugging
271,060 UART: [kat] SHA2-256
450,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,736 UART: [kat] ++
462,260 UART: [kat] sha1
473,805 UART: [kat] SHA2-256
476,853 UART: [kat] SHA2-384
483,412 UART: [kat] SHA2-512-ACC
486,343 UART: [kat] ECC-384
2,950,279 UART: [kat] HMAC-384Kdf
2,972,469 UART: [kat] LMS
3,501,914 UART: [kat] --
3,505,140 UART: [cold-reset] ++
3,507,418 UART: [fht] FHT @ 0x50003400
3,518,773 UART: [idev] ++
3,519,372 UART: [idev] CDI.KEYID = 6
3,520,286 UART: [idev] SUBJECT.KEYID = 7
3,521,457 UART: [idev] UDS.KEYID = 0
3,522,503 ready_for_fw is high
3,522,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,478 UART: [idev] Erasing UDS.KEYID = 0
6,029,985 UART: [idev] Sha1 KeyId Algorithm
6,053,873 UART: [idev] --
6,059,005 UART: [ldev] ++
6,059,580 UART: [ldev] CDI.KEYID = 6
6,060,485 UART: [ldev] SUBJECT.KEYID = 5
6,061,695 UART: [ldev] AUTHORITY.KEYID = 7
6,062,932 UART: [ldev] FE.KEYID = 1
6,101,759 UART: [ldev] Erasing FE.KEYID = 1
8,603,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,372 UART: [ldev] --
10,413,053 UART: [fwproc] Wait for Commands...
10,414,716 UART: [fwproc] Recv command 0x46574c44
10,416,819 UART: [fwproc] Recv'd Img size: 114084 bytes
13,821,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,542 >>> mbox cmd response: success
14,286,142 UART: [afmc] ++
14,286,750 UART: [afmc] CDI.KEYID = 6
14,287,661 UART: [afmc] SUBJECT.KEYID = 7
14,288,762 UART: [afmc] AUTHORITY.KEYID = 5
16,825,540 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,331 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,567 UART: [afmc] --
18,630,495 UART: [cold-reset] --
18,633,040 UART: [state] Locking Datavault
18,638,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,111 UART: [state] Locking ICCM
18,641,944 UART: [exit] Launching FMC @ 0x40000130
18,650,348 UART:
18,650,579 UART: Running Caliptra FMC ...
18,651,674 UART:
18,651,828 UART: [state] CFI Enabled
18,711,903 UART: [fht] FMC Alias Private Key: 7
20,476,464 UART: [art] Extend RT PCRs Done
20,477,682 UART: [art] Lock RT PCRs Done
20,479,193 UART: [art] Populate DV Done
20,484,931 UART: [fht] FMC Alias Private Key: 7
20,486,633 UART: [art] Derive CDI
20,487,451 UART: [art] Store in in slot 0x4
20,544,553 UART: [art] Derive Key Pair
20,545,546 UART: [art] Store priv key in slot 0x5
23,008,628 UART: [art] Derive Key Pair - Done
23,021,739 UART: [art] Signing Cert with AUTHO
23,023,063 UART: RITY.KEYID = 7
24,734,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,074 UART: [art] PUB.X = AC37F5D101F6DAD42DCDCB1CBE39707209E9F0242F65CE4358C23126D549174878E05952A0C284189E21B75FF10F278F
24,743,312 UART: [art] PUB.Y = 4EA4445FA6450ECC01830382B524D085C7B451C40D028BBC9BEF2094B8A490470221525FDB34F15D97BD3712DE5BC3FF
24,750,579 UART: [art] SIG.R = 921501E9B31DCE969F8DBB087302DA29516A04E7DDBF7D4643C7607556AB8233E67661A8F83D07A3DC5F1498179155B9
24,757,954 UART: [art] SIG.S = 19988797A73E09C8C7A68D74F86197BE3D0429897BF15EA10E7DF6CCD54C3F78C609BB3B1D0CF5DDEEC892C749189EFE
25,737,006 UART: Caliptra RT
25,737,726 UART: [state] CFI Enabled
25,902,732 UART: [rt] RT listening for mailbox commands...
25,905,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,935,995 UART: [rt]cmd =0x44504543, len=96
30,315,240 >>> mbox cmd response data (6236 bytes)
30,344,329 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,374,655 UART: [rt]cmd =0x53574545, len=84
34,551,778 >>> mbox cmd response data (200 bytes)
34,936,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,967,258 UART: [rt]cmd =0x44504543, len=96
34,999,422 >>> mbox cmd response data (56 bytes)
35,000,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,030,768 UART: [rt]cmd =0x44504543, len=96
35,079,147 >>> mbox cmd response data (24 bytes)
35,079,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,110,068 UART: [rt]cmd =0x53574545, len=84
39,285,772 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,415 writing to cptra_bootfsm_go
3,384,991 ready_for_fw is high
3,385,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,059,215 >>> mbox cmd response: success
18,346,901 UART:
18,347,301 UART: Running Caliptra FMC ...
18,348,413 UART:
18,348,564 UART: [state] CFI Enabled
18,412,691 UART: [fht] FMC Alias Private Key: 7
20,176,170 UART: [art] Extend RT PCRs Done
20,177,386 UART: [art] Lock RT PCRs Done
20,179,171 UART: [art] Populate DV Done
20,184,486 UART: [fht] FMC Alias Private Key: 7
20,186,188 UART: [art] Derive CDI
20,187,024 UART: [art] Store in in slot 0x4
20,244,994 UART: [art] Derive Key Pair
20,246,034 UART: [art] Store priv key in slot 0x5
22,708,928 UART: [art] Derive Key Pair - Done
22,721,544 UART: [art] Signing Cert with AUTHO
22,722,876 UART: RITY.KEYID = 7
24,434,299 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,778 UART: [art] PUB.X = ECD0E60C4C48BAA6023246B476720B156C3299301E4D4CBE4B0CE1F829CA125D63F3A4490D39FEF1631F740018426CB6
24,443,039 UART: [art] PUB.Y = 3B929364572B4FDE7E236DD0DBDC8A802EA38AE4FAE2D93F9E119D4B264A3EF0F210258676B3FF07D17986F84B3F330F
24,450,333 UART: [art] SIG.R = 08CC1356A84F2CB59ECF21E3F728ED7A9DC2F3F9F706D888BE0C6BD63020D28B1ADD78F31F89445C48A44A63942C9742
24,457,751 UART: [art] SIG.S = D7241E5697BEF9AB4F6C5A263A40D057EA8F8BB0EA9611B1F87DB1F36F579B3FA3F6859F4705D77C15D68B5EB1A6E329
25,436,379 UART: Caliptra RT
25,437,097 UART: [state] CFI Enabled
25,602,080 UART: [rt] RT listening for mailbox commands...
25,604,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,635,774 UART: [rt]cmd =0x44504543, len=96
30,013,915 >>> mbox cmd response data (6236 bytes)
30,043,249 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,073,857 UART: [rt]cmd =0x53574545, len=84
34,251,961 >>> mbox cmd response data (200 bytes)
34,634,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,665,679 UART: [rt]cmd =0x44504543, len=96
34,696,687 >>> mbox cmd response data (56 bytes)
34,697,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,728,204 UART: [rt]cmd =0x44504543, len=96
34,781,024 >>> mbox cmd response data (24 bytes)
34,781,591 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,812,039 UART: [rt]cmd =0x53574545, len=84
38,987,797 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,792 writing to cptra_bootfsm_go
193,036 UART:
193,403 UART: Running Caliptra ROM ...
194,587 UART:
604,206 UART: [state] CFI Enabled
620,749 UART: [state] LifecycleState = Unprovisioned
622,567 UART: [state] DebugLocked = No
625,168 UART: [state] WD Timer not started. Device not locked for debugging
628,369 UART: [kat] SHA2-256
807,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,012 UART: [kat] ++
819,467 UART: [kat] sha1
830,477 UART: [kat] SHA2-256
833,555 UART: [kat] SHA2-384
839,117 UART: [kat] SHA2-512-ACC
842,059 UART: [kat] ECC-384
3,280,043 UART: [kat] HMAC-384Kdf
3,292,919 UART: [kat] LMS
3,822,408 UART: [kat] --
3,826,902 UART: [cold-reset] ++
3,827,984 UART: [fht] FHT @ 0x50003400
3,838,444 UART: [idev] ++
3,839,024 UART: [idev] CDI.KEYID = 6
3,839,942 UART: [idev] SUBJECT.KEYID = 7
3,841,118 UART: [idev] UDS.KEYID = 0
3,842,044 ready_for_fw is high
3,842,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,505 UART: [idev] Erasing UDS.KEYID = 0
6,314,146 UART: [idev] Sha1 KeyId Algorithm
6,338,401 UART: [idev] --
6,343,255 UART: [ldev] ++
6,343,828 UART: [ldev] CDI.KEYID = 6
6,344,732 UART: [ldev] SUBJECT.KEYID = 5
6,345,943 UART: [ldev] AUTHORITY.KEYID = 7
6,347,175 UART: [ldev] FE.KEYID = 1
6,358,201 UART: [ldev] Erasing FE.KEYID = 1
8,831,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,618 UART: [ldev] --
10,624,583 UART: [fwproc] Wait for Commands...
10,626,353 UART: [fwproc] Recv command 0x46574c44
10,628,391 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,483,603 >>> mbox cmd response: success
14,488,146 UART: [afmc] ++
14,488,742 UART: [afmc] CDI.KEYID = 6
14,489,660 UART: [afmc] SUBJECT.KEYID = 7
14,490,757 UART: [afmc] AUTHORITY.KEYID = 5
16,989,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,209 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,029 UART: [afmc] --
18,785,143 UART: [cold-reset] --
18,790,470 UART: [state] Locking Datavault
18,796,353 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,010 UART: [state] Locking ICCM
18,799,539 UART: [exit] Launching FMC @ 0x40000130
18,807,940 UART:
18,808,178 UART: Running Caliptra FMC ...
18,809,286 UART:
18,809,447 UART: [state] CFI Enabled
18,817,496 UART: [fht] FMC Alias Private Key: 7
20,574,454 UART: [art] Extend RT PCRs Done
20,575,673 UART: [art] Lock RT PCRs Done
20,577,462 UART: [art] Populate DV Done
20,582,925 UART: [fht] FMC Alias Private Key: 7
20,584,463 UART: [art] Derive CDI
20,585,282 UART: [art] Store in in slot 0x4
20,627,766 UART: [art] Derive Key Pair
20,628,760 UART: [art] Store priv key in slot 0x5
23,055,363 UART: [art] Derive Key Pair - Done
23,068,086 UART: [art] Signing Cert with AUTHO
23,069,420 UART: RITY.KEYID = 7
24,774,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,347 UART: [art] PUB.X = 3B8E08C31BA6A7A975889A79759CF237B98F21985119FF0DD20ACA8548908A757F8551DE732B612A20DE121FD4FBFCC1
24,783,566 UART: [art] PUB.Y = C9C7267304CE9C05D5C8CA41F01690FCA30E0DA5D4A31678F2514A3D2B38E85E927A67CED423941BF197DF75AB70843E
24,790,892 UART: [art] SIG.R = C202DE7A4D0C71837497D0557A6A431862A9679F6501A597633A91CEA3488C07C50F029136FF91EDFB76F7E15852DCC7
24,798,214 UART: [art] SIG.S = 6D6D9995056899645D5A439C2C0EE607E65F7C848417020D3D07D064927F3DFA8DE25FCB344267D0DF5E257908BA7590
25,777,009 UART: Caliptra RT
25,777,727 UART: [state] CFI Enabled
25,895,165 UART: [rt] RT listening for mailbox commands...
25,897,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,161 UART: [rt]cmd =0x44504543, len=96
30,211,524 >>> mbox cmd response data (6236 bytes)
30,240,759 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,271,426 UART: [rt]cmd =0x53574545, len=84
34,407,160 >>> mbox cmd response data (200 bytes)
34,792,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,823,075 UART: [rt]cmd =0x44504543, len=96
34,854,771 >>> mbox cmd response data (56 bytes)
34,855,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,886,166 UART: [rt]cmd =0x44504543, len=96
34,923,854 >>> mbox cmd response data (24 bytes)
34,924,409 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,954,784 UART: [rt]cmd =0x53574545, len=84
39,089,742 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
3,694,329 ready_for_fw is high
3,695,233 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,754 >>> mbox cmd response: success
18,520,471 UART:
18,520,866 UART: Running Caliptra FMC ...
18,522,062 UART:
18,522,245 UART: [state] CFI Enabled
18,530,090 UART: [fht] FMC Alias Private Key: 7
20,286,790 UART: [art] Extend RT PCRs Done
20,288,018 UART: [art] Lock RT PCRs Done
20,289,594 UART: [art] Populate DV Done
20,294,918 UART: [fht] FMC Alias Private Key: 7
20,296,628 UART: [art] Derive CDI
20,297,453 UART: [art] Store in in slot 0x4
20,340,123 UART: [art] Derive Key Pair
20,341,172 UART: [art] Store priv key in slot 0x5
22,767,959 UART: [art] Derive Key Pair - Done
22,781,236 UART: [art] Signing Cert with AUTHO
22,782,544 UART: RITY.KEYID = 7
24,488,094 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,606 UART: [art] PUB.X = 910F3BECD62C7C024DEA9979C6711201635B4910EBDB00460C4E117B4F0FE408E7B9741AD14817BA6F9E95EB44836596
24,496,904 UART: [art] PUB.Y = 2B97179DBC7B34616C2D0B2E0CD7EE358082F4E5C60B5B39CA4D9A8E1C87988E701B1379ED29DE82B666190FB4157E57
24,504,105 UART: [art] SIG.R = 6202764B25123B9C14E2EC8C5F4003BB19E0C93C648DC45C410B5A8501E2A833D72BDFDD962CCCCEB07852712F9645C7
24,511,478 UART: [art] SIG.S = 9D845A4F5C4CDE48322D2FC1707D4268967DFA84E96336D78F56C54807E71756C5B5862B3E5E43F8FF76EF63126DE6F1
25,490,648 UART: Caliptra RT
25,491,355 UART: [state] CFI Enabled
25,608,146 UART: [rt] RT listening for mailbox commands...
25,610,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,641,392 UART: [rt]cmd =0x44504543, len=96
29,924,876 >>> mbox cmd response data (6236 bytes)
29,954,364 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,985,251 UART: [rt]cmd =0x53574545, len=84
34,120,191 >>> mbox cmd response data (200 bytes)
34,505,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,536,659 UART: [rt]cmd =0x44504543, len=96
34,567,800 >>> mbox cmd response data (56 bytes)
34,568,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,598,959 UART: [rt]cmd =0x44504543, len=96
34,637,432 >>> mbox cmd response data (24 bytes)
34,637,992 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,668,534 UART: [rt]cmd =0x53574545, len=84
38,803,318 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,596 UART:
192,973 UART: Running Caliptra ROM ...
194,165 UART:
194,320 UART: [state] CFI Enabled
260,901 UART: [state] LifecycleState = Unprovisioned
263,345 UART: [state] DebugLocked = No
265,025 UART: [state] WD Timer not started. Device not locked for debugging
268,805 UART: [kat] SHA2-256
458,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,221 UART: [kat] ++
469,691 UART: [kat] sha1
481,985 UART: [kat] SHA2-256
484,957 UART: [kat] SHA2-384
490,888 UART: [kat] SHA2-512-ACC
493,540 UART: [kat] ECC-384
2,951,580 UART: [kat] HMAC-384Kdf
2,973,296 UART: [kat] LMS
3,505,034 UART: [kat] --
3,510,220 UART: [cold-reset] ++
3,512,277 UART: [fht] FHT @ 0x50003400
3,522,553 UART: [idev] ++
3,523,259 UART: [idev] CDI.KEYID = 6
3,524,285 UART: [idev] SUBJECT.KEYID = 7
3,525,387 UART: [idev] UDS.KEYID = 0
3,526,318 ready_for_fw is high
3,526,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,919 UART: [idev] Erasing UDS.KEYID = 0
6,030,674 UART: [idev] Sha1 KeyId Algorithm
6,052,345 UART: [idev] --
6,058,066 UART: [ldev] ++
6,058,745 UART: [ldev] CDI.KEYID = 6
6,059,654 UART: [ldev] SUBJECT.KEYID = 5
6,060,808 UART: [ldev] AUTHORITY.KEYID = 7
6,062,033 UART: [ldev] FE.KEYID = 1
6,099,821 UART: [ldev] Erasing FE.KEYID = 1
8,611,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,669 UART: [ldev] --
10,413,912 UART: [fwproc] Wait for Commands...
10,416,922 UART: [fwproc] Recv command 0x46574c44
10,419,189 UART: [fwproc] Recv'd Img size: 114084 bytes
13,865,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,886 >>> mbox cmd response: success
14,604,296 UART: [afmc] ++
14,605,002 UART: [afmc] CDI.KEYID = 6
14,606,118 UART: [afmc] SUBJECT.KEYID = 7
14,607,666 UART: [afmc] AUTHORITY.KEYID = 5
17,148,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,850 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,295 UART: [afmc] --
18,949,340 UART: [cold-reset] --
18,952,253 UART: [state] Locking Datavault
18,956,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,803 UART: [state] Locking ICCM
18,961,389 UART: [exit] Launching FMC @ 0x40000130
18,970,027 UART:
18,970,260 UART: Running Caliptra FMC ...
18,971,354 UART:
18,971,510 UART: [state] CFI Enabled
19,030,024 UART: [fht] FMC Alias Private Key: 7
20,794,191 UART: [art] Extend RT PCRs Done
20,795,402 UART: [art] Lock RT PCRs Done
20,797,215 UART: [art] Populate DV Done
20,802,460 UART: [fht] FMC Alias Private Key: 7
20,804,149 UART: [art] Derive CDI
20,804,881 UART: [art] Store in in slot 0x4
20,862,923 UART: [art] Derive Key Pair
20,863,921 UART: [art] Store priv key in slot 0x5
23,327,166 UART: [art] Derive Key Pair - Done
23,340,000 UART: [art] Signing Cert with AUTHO
23,341,303 UART: RITY.KEYID = 7
25,052,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,313 UART: [art] PUB.X = 9082091CBA7486A86C347C604C00F6CF06420567C21167D9197997B1CB50A091ED29F19EC6B1B9113E220B2A28391DA3
25,061,520 UART: [art] PUB.Y = 9C29E69525481511657BBC618A87A1FAFC5EE42AB286A93D572B76C5901F1692F787664CB6CE3B4DB6FE279A10F96C56
25,068,768 UART: [art] SIG.R = 3985662F52FB9725B0D271FC08890622E268D7464B70840FECF65C229DFF2E23EDCEA6EC36B7498585590F125042D11D
25,076,139 UART: [art] SIG.S = 8A4AF59E02D49A9202551D89641C9B10169DF77732E91AC9B5D231267CDB2C607C9F273AC6DB836C05A382B1E48D3C78
26,055,586 UART: Caliptra RT
26,056,300 UART: [state] CFI Enabled
26,218,669 UART: [rt] RT listening for mailbox commands...
26,220,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,251,978 UART: [rt]cmd =0x44504543, len=96
30,610,560 >>> mbox cmd response data (6236 bytes)
30,639,806 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,670,421 UART: [rt]cmd =0x53574545, len=84
34,849,466 >>> mbox cmd response data (200 bytes)
35,231,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,262,310 UART: [rt]cmd =0x44504543, len=96
35,293,391 >>> mbox cmd response data (56 bytes)
35,294,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,324,631 UART: [rt]cmd =0x44504543, len=96
35,377,964 >>> mbox cmd response data (24 bytes)
35,378,551 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,408,902 UART: [rt]cmd =0x53574545, len=84
39,585,690 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,415,237 ready_for_fw is high
3,415,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,701,971 >>> mbox cmd response: success
19,001,488 UART:
19,001,918 UART: Running Caliptra FMC ...
19,003,055 UART:
19,003,224 UART: [state] CFI Enabled
19,069,289 UART: [fht] FMC Alias Private Key: 7
20,832,810 UART: [art] Extend RT PCRs Done
20,834,037 UART: [art] Lock RT PCRs Done
20,835,931 UART: [art] Populate DV Done
20,841,295 UART: [fht] FMC Alias Private Key: 7
20,842,776 UART: [art] Derive CDI
20,843,534 UART: [art] Store in in slot 0x4
20,901,699 UART: [art] Derive Key Pair
20,902,739 UART: [art] Store priv key in slot 0x5
23,365,266 UART: [art] Derive Key Pair - Done
23,377,855 UART: [art] Signing Cert with AUTHO
23,379,158 UART: RITY.KEYID = 7
25,091,446 UART: [art] Erasing AUTHORITY.KEYID = 7
25,092,961 UART: [art] PUB.X = 9F76DF056531C3E707AC6CA4D6A1A8DA7A152AC45797F8AB54316352DA3E64E8A9BCE9BEF9AF1B0F69B8DD29D397F583
25,100,251 UART: [art] PUB.Y = D1F40D0CDE6C1729D4C0AD247B1BDC90FE23CAFBCFCF11BAE5D9B5A31227A5C376D3C5913D16B054987418D5A7CE2F64
25,107,564 UART: [art] SIG.R = 392ED41448BABE8A312C32FBE46C43F4D7930AC8F8F9A8F6D431A7BF8FE4D1E302E9213C0DAAE3BD1152FAF85D5E3936
25,114,963 UART: [art] SIG.S = 87E9FF623E53E2BDE406EC1873A14A2CDA96CF19DEF102ABB1799C3096E485B5884B1834420AC7D5700753F70FE1EAF6
26,094,697 UART: Caliptra RT
26,095,392 UART: [state] CFI Enabled
26,259,976 UART: [rt] RT listening for mailbox commands...
26,262,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,372 UART: [rt]cmd =0x44504543, len=96
30,671,183 >>> mbox cmd response data (6236 bytes)
30,700,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,731,475 UART: [rt]cmd =0x53574545, len=84
34,908,396 >>> mbox cmd response data (200 bytes)
35,292,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,323,228 UART: [rt]cmd =0x44504543, len=96
35,354,303 >>> mbox cmd response data (56 bytes)
35,355,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,385,801 UART: [rt]cmd =0x44504543, len=96
35,435,604 >>> mbox cmd response data (24 bytes)
35,436,194 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,466,491 UART: [rt]cmd =0x53574545, len=84
39,642,687 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,699 writing to cptra_bootfsm_go
192,961 UART:
193,342 UART: Running Caliptra ROM ...
194,544 UART:
604,011 UART: [state] CFI Enabled
619,171 UART: [state] LifecycleState = Unprovisioned
621,549 UART: [state] DebugLocked = No
623,224 UART: [state] WD Timer not started. Device not locked for debugging
628,687 UART: [kat] SHA2-256
818,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,367 UART: [kat] ++
829,849 UART: [kat] sha1
842,092 UART: [kat] SHA2-256
845,112 UART: [kat] SHA2-384
850,396 UART: [kat] SHA2-512-ACC
852,976 UART: [kat] ECC-384
3,293,685 UART: [kat] HMAC-384Kdf
3,305,928 UART: [kat] LMS
3,837,781 UART: [kat] --
3,843,435 UART: [cold-reset] ++
3,844,800 UART: [fht] FHT @ 0x50003400
3,856,433 UART: [idev] ++
3,857,087 UART: [idev] CDI.KEYID = 6
3,858,128 UART: [idev] SUBJECT.KEYID = 7
3,859,236 UART: [idev] UDS.KEYID = 0
3,860,168 ready_for_fw is high
3,860,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,797 UART: [idev] Erasing UDS.KEYID = 0
6,337,377 UART: [idev] Sha1 KeyId Algorithm
6,360,127 UART: [idev] --
6,365,802 UART: [ldev] ++
6,366,487 UART: [ldev] CDI.KEYID = 6
6,367,372 UART: [ldev] SUBJECT.KEYID = 5
6,368,587 UART: [ldev] AUTHORITY.KEYID = 7
6,369,814 UART: [ldev] FE.KEYID = 1
6,381,215 UART: [ldev] Erasing FE.KEYID = 1
8,858,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,228 UART: [ldev] --
10,650,559 UART: [fwproc] Wait for Commands...
10,653,749 UART: [fwproc] Recv command 0x46574c44
10,656,080 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,832,569 >>> mbox cmd response: success
14,837,459 UART: [afmc] ++
14,838,173 UART: [afmc] CDI.KEYID = 6
14,839,427 UART: [afmc] SUBJECT.KEYID = 7
14,840,873 UART: [afmc] AUTHORITY.KEYID = 5
17,343,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,597 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,789 UART: [afmc] --
19,139,524 UART: [cold-reset] --
19,144,693 UART: [state] Locking Datavault
19,150,170 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,322 UART: [state] Locking ICCM
19,154,481 UART: [exit] Launching FMC @ 0x40000130
19,163,164 UART:
19,163,409 UART: Running Caliptra FMC ...
19,164,511 UART:
19,164,670 UART: [state] CFI Enabled
19,172,667 UART: [fht] FMC Alias Private Key: 7
20,930,402 UART: [art] Extend RT PCRs Done
20,931,614 UART: [art] Lock RT PCRs Done
20,933,050 UART: [art] Populate DV Done
20,938,353 UART: [fht] FMC Alias Private Key: 7
20,939,998 UART: [art] Derive CDI
20,940,734 UART: [art] Store in in slot 0x4
20,983,251 UART: [art] Derive Key Pair
20,984,295 UART: [art] Store priv key in slot 0x5
23,411,135 UART: [art] Derive Key Pair - Done
23,424,192 UART: [art] Signing Cert with AUTHO
23,425,504 UART: RITY.KEYID = 7
25,130,759 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,266 UART: [art] PUB.X = 55859368DA4D2465AD81BF056C8FC5C6D1549EF0D137A4BB108F9A374AD17B37D531B4595BBDE3130924E294CA347009
25,139,537 UART: [art] PUB.Y = 6976511C044ACE66931420F94DD461DD5AA584CF8325136C5C5E9296EEE88DDD181BCADA99F8269DD243FE8C8413DEF2
25,146,790 UART: [art] SIG.R = 66B70E8DC058BD83DAF3CF7241373F855E90B17986EADE3E984E86B3706DC4DF416CB35750E534756727201145744D28
25,154,217 UART: [art] SIG.S = 02A0AE3BB20D58380D93CD2B916A82F036BEBB89B97713A9C0007150D7522739877FB0143D40133864A898F2E8DAA6CF
26,132,850 UART: Caliptra RT
26,133,540 UART: [state] CFI Enabled
26,250,765 UART: [rt] RT listening for mailbox commands...
26,253,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,283,566 UART: [rt]cmd =0x44504543, len=96
30,567,883 >>> mbox cmd response data (6236 bytes)
30,596,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,627,398 UART: [rt]cmd =0x53574545, len=84
34,762,841 >>> mbox cmd response data (200 bytes)
35,148,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,179,130 UART: [rt]cmd =0x44504543, len=96
35,209,818 >>> mbox cmd response data (56 bytes)
35,210,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,241,184 UART: [rt]cmd =0x44504543, len=96
35,279,819 >>> mbox cmd response data (24 bytes)
35,280,405 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,310,708 UART: [rt]cmd =0x53574545, len=84
39,446,540 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
3,756,063 ready_for_fw is high
3,756,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,945,395 >>> mbox cmd response: success
19,201,938 UART:
19,202,328 UART: Running Caliptra FMC ...
19,203,532 UART:
19,203,700 UART: [state] CFI Enabled
19,211,757 UART: [fht] FMC Alias Private Key: 7
20,968,286 UART: [art] Extend RT PCRs Done
20,969,504 UART: [art] Lock RT PCRs Done
20,971,566 UART: [art] Populate DV Done
20,976,816 UART: [fht] FMC Alias Private Key: 7
20,978,575 UART: [art] Derive CDI
20,979,413 UART: [art] Store in in slot 0x4
21,022,116 UART: [art] Derive Key Pair
21,023,121 UART: [art] Store priv key in slot 0x5
23,449,705 UART: [art] Derive Key Pair - Done
23,462,662 UART: [art] Signing Cert with AUTHO
23,463,968 UART: RITY.KEYID = 7
25,169,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,226 UART: [art] PUB.X = 1E45BA73E36A63EA5028D3D58FB51F36F064C5944DCD4F97C16CC3CF054CC518027357FD7173A4D3E007A5D80ED77CE3
25,178,463 UART: [art] PUB.Y = 289A9BCD45F567CB3542A9BF584A80218269794D41E44578EDAECB2953700BFCC489C27A19A0CBF173269A6E53AF4619
25,185,761 UART: [art] SIG.R = 65D8E10253A8A4EF351BD447452D86549A591A1EC6EA557C55A75F4296B5A131CBA5EBEF79D13C7E68169582057B4AF0
25,193,342 UART: [art] SIG.S = 04C59AC159F94B0C7F367AE622413050185AD31548D5C2E0DB3C67594E1151039788F34FC389B5BE202DDED4F101303C
26,172,136 UART: Caliptra RT
26,172,826 UART: [state] CFI Enabled
26,289,139 UART: [rt] RT listening for mailbox commands...
26,291,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,322,317 UART: [rt]cmd =0x44504543, len=96
30,606,536 >>> mbox cmd response data (6236 bytes)
30,635,791 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,666,410 UART: [rt]cmd =0x53574545, len=84
34,801,283 >>> mbox cmd response data (200 bytes)
35,187,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,218,422 UART: [rt]cmd =0x44504543, len=96
35,249,431 >>> mbox cmd response data (56 bytes)
35,250,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,280,685 UART: [rt]cmd =0x44504543, len=96
35,319,112 >>> mbox cmd response data (24 bytes)
35,319,674 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,350,044 UART: [rt]cmd =0x53574545, len=84
39,485,226 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,965 UART: [kat] SHA2-256
881,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,011 UART: [kat] ++
886,163 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,180 UART: [kat] HMAC-384Kdf
906,812 UART: [kat] LMS
1,475,008 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,687 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 ready_for_fw is high
1,480,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,114 UART: [idev] Erasing UDS.KEYID = 0
1,504,624 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,128 UART: [idev] --
1,514,149 UART: [ldev] ++
1,514,317 UART: [ldev] CDI.KEYID = 6
1,514,680 UART: [ldev] SUBJECT.KEYID = 5
1,515,106 UART: [ldev] AUTHORITY.KEYID = 7
1,515,569 UART: [ldev] FE.KEYID = 1
1,520,717 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,879 UART: [fwproc] Waiting for Commands...
1,586,722 UART: [fwproc] Received command 0x46574c44
1,587,513 UART: [fwproc] Received Image of size 114084 bytes
2,882,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,967 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,730 >>> mbox cmd response: success
3,075,768 UART: [afmc] ++
3,075,936 UART: [afmc] CDI.KEYID = 6
3,076,298 UART: [afmc] SUBJECT.KEYID = 7
3,076,723 UART: [afmc] AUTHORITY.KEYID = 5
3,111,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,868 UART: [afmc] --
3,154,920 UART: [cold-reset] --
3,156,012 UART: [state] Locking Datavault
3,157,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,665 UART: [state] Locking ICCM
3,158,309 UART: [exit] Launching FMC @ 0x40000130
3,163,638 UART:
3,163,654 UART: Running Caliptra FMC ...
3,164,062 UART:
3,164,116 UART: [state] CFI Enabled
3,174,825 UART: [fht] FMC Alias Private Key: 7
3,281,686 UART: [art] Extend RT PCRs Done
3,282,114 UART: [art] Lock RT PCRs Done
3,283,476 UART: [art] Populate DV Done
3,291,981 UART: [fht] FMC Alias Private Key: 7
3,293,109 UART: [art] Derive CDI
3,293,389 UART: [art] Store in in slot 0x4
3,379,132 UART: [art] Derive Key Pair
3,379,492 UART: [art] Store priv key in slot 0x5
3,392,754 UART: [art] Derive Key Pair - Done
3,407,678 UART: [art] Signing Cert with AUTHO
3,408,158 UART: RITY.KEYID = 7
3,423,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,897 UART: [art] PUB.X = ECC5373CD21A3F841D6ADC7E18052F26D864358C276DCFE60397935A3573815EF3C6F971CA575EDCD191AFE7AFB94F26
3,430,673 UART: [art] PUB.Y = 5C737D77B15D4BE8138CE9909945E5158CE436FA9E68341635DE9D88F45343AB05AF5C5011C48CD93D263FC501905E18
3,437,615 UART: [art] SIG.R = C594BB8A21B19C6A5D14E12789F5E2D7758E5D4B11E89601D1B3ECDC76608D27CAFB53A052F60956746BE88A832C4892
3,444,383 UART: [art] SIG.S = 6D316834C93EFF6009DB6D5FF96438CB87F55AF6B46837A15269BA8960E628E9F6DF83A05821BFE0CB6BDD02C58D5D4F
3,468,012 UART: Caliptra RT
3,468,265 UART: [state] CFI Enabled
3,576,630 UART: [rt] RT listening for mailbox commands...
3,577,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,044 UART: [rt]cmd =0x44504543, len=96
3,789,914 >>> mbox cmd response data (6236 bytes)
3,789,915 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,802 UART: [rt]cmd =0x53574545, len=84
3,844,301 >>> mbox cmd response data (200 bytes)
3,844,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,275 UART: [rt]cmd =0x44504543, len=96
3,905,468 >>> mbox cmd response data (56 bytes)
3,905,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,516 UART: [rt]cmd =0x44504543, len=96
3,974,732 >>> mbox cmd response data (24 bytes)
3,974,733 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,004,474 UART: [rt]cmd =0x53574545, len=84
4,029,975 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,933 ready_for_fw is high
1,361,933 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,174 >>> mbox cmd response: success
2,984,246 UART:
2,984,262 UART: Running Caliptra FMC ...
2,984,670 UART:
2,984,724 UART: [state] CFI Enabled
2,995,257 UART: [fht] FMC Alias Private Key: 7
3,103,156 UART: [art] Extend RT PCRs Done
3,103,584 UART: [art] Lock RT PCRs Done
3,104,976 UART: [art] Populate DV Done
3,113,383 UART: [fht] FMC Alias Private Key: 7
3,114,313 UART: [art] Derive CDI
3,114,593 UART: [art] Store in in slot 0x4
3,200,424 UART: [art] Derive Key Pair
3,200,784 UART: [art] Store priv key in slot 0x5
3,213,690 UART: [art] Derive Key Pair - Done
3,228,209 UART: [art] Signing Cert with AUTHO
3,228,689 UART: RITY.KEYID = 7
3,243,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,494 UART: [art] PUB.X = 83AFEEDABDDE02D1A21EC4C29486008F8280D984BEBA2D50AFA56641397878B7E869ED47FB7F6374683E9F21E8363B0F
3,251,248 UART: [art] PUB.Y = DA14A10A40B566AED52304F6AD2419420ABB4503C96B25ACAEC55E354C4FD027BBA0CBEC7DBDA32045F5A26A4D2C1A83
3,258,208 UART: [art] SIG.R = 225612338C7F6DAEBB2452F938880BE69636E7B5C199920A52AB472DE6A8A6353B4AEFD751A8F552CE4E762958D3C114
3,264,974 UART: [art] SIG.S = E04855D5B476858C7B4944F8E2CA641EB420633047327646BD6D515D867189D5831D2C4D493D688340573CCA07349D1C
3,288,988 UART: Caliptra RT
3,289,241 UART: [state] CFI Enabled
3,396,996 UART: [rt] RT listening for mailbox commands...
3,397,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,990 UART: [rt]cmd =0x44504543, len=96
3,608,348 >>> mbox cmd response data (6236 bytes)
3,608,349 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,192 UART: [rt]cmd =0x53574545, len=84
3,663,687 >>> mbox cmd response data (200 bytes)
3,663,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,793 UART: [rt]cmd =0x44504543, len=96
3,725,288 >>> mbox cmd response data (56 bytes)
3,725,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,164 UART: [rt]cmd =0x44504543, len=96
3,794,644 >>> mbox cmd response data (24 bytes)
3,794,645 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,692 UART: [rt]cmd =0x53574545, len=84
3,849,665 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,792 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,817 UART: [kat] SHA2-512-ACC
897,718 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,771 UART: [kat] LMS
1,475,967 UART: [kat] --
1,477,124 UART: [cold-reset] ++
1,477,694 UART: [fht] Storing FHT @ 0x50003400
1,480,491 UART: [idev] ++
1,480,659 UART: [idev] CDI.KEYID = 6
1,481,019 UART: [idev] SUBJECT.KEYID = 7
1,481,443 UART: [idev] UDS.KEYID = 0
1,481,788 ready_for_fw is high
1,481,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,961 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,629 UART: [idev] --
1,515,604 UART: [ldev] ++
1,515,772 UART: [ldev] CDI.KEYID = 6
1,516,135 UART: [ldev] SUBJECT.KEYID = 5
1,516,561 UART: [ldev] AUTHORITY.KEYID = 7
1,517,024 UART: [ldev] FE.KEYID = 1
1,522,476 UART: [ldev] Erasing FE.KEYID = 1
1,547,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,917 UART: [ldev] --
1,587,372 UART: [fwproc] Waiting for Commands...
1,588,181 UART: [fwproc] Received command 0x46574c44
1,588,972 UART: [fwproc] Received Image of size 114084 bytes
2,884,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,880 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,601 >>> mbox cmd response: success
3,077,709 UART: [afmc] ++
3,077,877 UART: [afmc] CDI.KEYID = 6
3,078,239 UART: [afmc] SUBJECT.KEYID = 7
3,078,664 UART: [afmc] AUTHORITY.KEYID = 5
3,114,087 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,465 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,245 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,973 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,858 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,548 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,293 UART: [afmc] --
3,157,425 UART: [cold-reset] --
3,158,397 UART: [state] Locking Datavault
3,159,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,282 UART: [state] Locking ICCM
3,160,836 UART: [exit] Launching FMC @ 0x40000130
3,166,165 UART:
3,166,181 UART: Running Caliptra FMC ...
3,166,589 UART:
3,166,732 UART: [state] CFI Enabled
3,177,321 UART: [fht] FMC Alias Private Key: 7
3,285,950 UART: [art] Extend RT PCRs Done
3,286,378 UART: [art] Lock RT PCRs Done
3,288,298 UART: [art] Populate DV Done
3,296,441 UART: [fht] FMC Alias Private Key: 7
3,297,399 UART: [art] Derive CDI
3,297,679 UART: [art] Store in in slot 0x4
3,383,688 UART: [art] Derive Key Pair
3,384,048 UART: [art] Store priv key in slot 0x5
3,397,390 UART: [art] Derive Key Pair - Done
3,412,136 UART: [art] Signing Cert with AUTHO
3,412,616 UART: RITY.KEYID = 7
3,427,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,363 UART: [art] PUB.X = 0D956C3737419FF93B9D75B819575356F5978095EBEED30EB0535FDD3363B42F0703ED1956844BA074E52E8ED0551D8D
3,435,119 UART: [art] PUB.Y = 73B2FAC230053C2015FB6128BA97251E8C3DEDE048E8B440778B9D7773813065EADA369D07EAF03BFE08B52433F84C6F
3,442,066 UART: [art] SIG.R = 8D48A4E4FD0880F7A8D30F7207F453BC47AF19F156EFBAB655545D3DA3558CA947F112B54F280221B197D7DE6F5E7359
3,448,830 UART: [art] SIG.S = 5E08B2ABC63235FAFCE76FFC8DCCA18AB64CDCD0AB0A8A5E413AE65FEFB69F0BD8E20329A188B9F9636D20BED8514CCF
3,472,187 UART: Caliptra RT
3,472,532 UART: [state] CFI Enabled
3,580,407 UART: [rt] RT listening for mailbox commands...
3,581,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,311 UART: [rt]cmd =0x44504543, len=96
3,792,443 >>> mbox cmd response data (6236 bytes)
3,792,444 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,347 UART: [rt]cmd =0x53574545, len=84
3,848,806 >>> mbox cmd response data (200 bytes)
3,848,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,878,938 UART: [rt]cmd =0x44504543, len=96
3,910,355 >>> mbox cmd response data (56 bytes)
3,910,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,355 UART: [rt]cmd =0x44504543, len=96
3,980,925 >>> mbox cmd response data (24 bytes)
3,980,926 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,011,089 UART: [rt]cmd =0x53574545, len=84
4,037,202 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,730 ready_for_fw is high
1,362,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,325 >>> mbox cmd response: success
2,986,167 UART:
2,986,183 UART: Running Caliptra FMC ...
2,986,591 UART:
2,986,734 UART: [state] CFI Enabled
2,997,279 UART: [fht] FMC Alias Private Key: 7
3,104,852 UART: [art] Extend RT PCRs Done
3,105,280 UART: [art] Lock RT PCRs Done
3,106,630 UART: [art] Populate DV Done
3,114,905 UART: [fht] FMC Alias Private Key: 7
3,116,015 UART: [art] Derive CDI
3,116,295 UART: [art] Store in in slot 0x4
3,201,878 UART: [art] Derive Key Pair
3,202,238 UART: [art] Store priv key in slot 0x5
3,215,182 UART: [art] Derive Key Pair - Done
3,229,805 UART: [art] Signing Cert with AUTHO
3,230,285 UART: RITY.KEYID = 7
3,245,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,146 UART: [art] PUB.X = 9A699DBA76AC82BDF8888799635F3014BC9B3F357C7B5E34C7CD314DED0E17D900E29C37592B6EB0F1B96CAB5920FA12
3,252,903 UART: [art] PUB.Y = 7DA0E5FF3556F8ACDAB3C76DEBD637C3DD95D48F5505B9EAD130C0DABE11F68647C555FD3F186F3DD236F8BB7720ECDE
3,259,878 UART: [art] SIG.R = 0E1DD9370D5F4E3EC2A3E7BDC59D40CC3C62A8C2467638F94376082DF16EABA02F296A7830A8F1EFBE7715C48A66FC33
3,266,653 UART: [art] SIG.S = 9F552DC2A61F4DAD1AB81DD4BB7D6758F2F5260BBBE02D579F8586551D9677F5D10519EA8016A61AFFB14B760207E38F
3,290,558 UART: Caliptra RT
3,290,903 UART: [state] CFI Enabled
3,398,146 UART: [rt] RT listening for mailbox commands...
3,398,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,500 UART: [rt]cmd =0x44504543, len=96
3,610,281 >>> mbox cmd response data (6236 bytes)
3,610,282 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,237 UART: [rt]cmd =0x53574545, len=84
3,666,338 >>> mbox cmd response data (200 bytes)
3,666,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,452 UART: [rt]cmd =0x44504543, len=96
3,728,235 >>> mbox cmd response data (56 bytes)
3,728,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,758,043 UART: [rt]cmd =0x44504543, len=96
3,798,069 >>> mbox cmd response data (24 bytes)
3,798,070 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,813 UART: [rt]cmd =0x53574545, len=84
3,854,074 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,650 UART: [kat] SHA2-512-ACC
908,551 UART: [kat] ECC-384
917,876 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,573 UART: [cold-reset] ++
1,172,105 UART: [fht] FHT @ 0x50003400
1,174,662 UART: [idev] ++
1,174,830 UART: [idev] CDI.KEYID = 6
1,175,190 UART: [idev] SUBJECT.KEYID = 7
1,175,614 UART: [idev] UDS.KEYID = 0
1,175,959 ready_for_fw is high
1,175,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,640 UART: [idev] Erasing UDS.KEYID = 0
1,200,659 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,644 UART: [ldev] SUBJECT.KEYID = 5
1,211,070 UART: [ldev] AUTHORITY.KEYID = 7
1,211,533 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,560 UART: [fwproc] Recv command 0x46574c44
1,283,288 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,515 >>> mbox cmd response: success
2,771,685 UART: [afmc] ++
2,771,853 UART: [afmc] CDI.KEYID = 6
2,772,215 UART: [afmc] SUBJECT.KEYID = 7
2,772,640 UART: [afmc] AUTHORITY.KEYID = 5
2,808,129 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,624 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,237 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,836 UART: [afmc] --
2,851,908 UART: [cold-reset] --
2,852,812 UART: [state] Locking Datavault
2,854,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,715 UART: [state] Locking ICCM
2,855,259 UART: [exit] Launching FMC @ 0x40000130
2,860,588 UART:
2,860,604 UART: Running Caliptra FMC ...
2,861,012 UART:
2,861,066 UART: [state] CFI Enabled
2,871,103 UART: [fht] FMC Alias Private Key: 7
2,979,436 UART: [art] Extend RT PCRs Done
2,979,864 UART: [art] Lock RT PCRs Done
2,981,498 UART: [art] Populate DV Done
2,989,727 UART: [fht] FMC Alias Private Key: 7
2,990,827 UART: [art] Derive CDI
2,991,107 UART: [art] Store in in slot 0x4
3,076,472 UART: [art] Derive Key Pair
3,076,832 UART: [art] Store priv key in slot 0x5
3,090,132 UART: [art] Derive Key Pair - Done
3,104,981 UART: [art] Signing Cert with AUTHO
3,105,461 UART: RITY.KEYID = 7
3,120,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,474 UART: [art] PUB.X = 0D5898C5233B91AB09147227140964172F39F9DCD28C05B39104CF5569910C22509026C8C6908C150134F0690F3116BF
3,128,202 UART: [art] PUB.Y = 9FE993FB319553752CF75EBF0FDDE59290C2D7A9D1F28643EB16CCC7E17DCEE151AA5B90B8B9FD60FCACFDE229DF5436
3,135,175 UART: [art] SIG.R = CFF686A715A7A35B7608890422744B6A6967C7A2FA5F9084124AB025B56479B1421A789904A606C4F55FA48E9FEBD54E
3,141,931 UART: [art] SIG.S = 56F05252303D1D3B488FBAAD6B1E01726B3D9DB5706248CEBAFEC2496356451FA2571A25232E128FDCCEC2496E8F616A
3,165,805 UART: Caliptra RT
3,166,058 UART: [state] CFI Enabled
3,273,533 UART: [rt] RT listening for mailbox commands...
3,274,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,693 UART: [rt]cmd =0x44504543, len=96
3,485,005 >>> mbox cmd response data (6236 bytes)
3,485,006 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,943 UART: [rt]cmd =0x53574545, len=84
3,540,472 >>> mbox cmd response data (200 bytes)
3,540,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,624 UART: [rt]cmd =0x44504543, len=96
3,602,731 >>> mbox cmd response data (56 bytes)
3,602,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,507 UART: [rt]cmd =0x44504543, len=96
3,672,325 >>> mbox cmd response data (24 bytes)
3,672,326 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,085 UART: [rt]cmd =0x53574545, len=84
3,728,070 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 ready_for_fw is high
1,060,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,838 >>> mbox cmd response: success
2,684,396 UART:
2,684,412 UART: Running Caliptra FMC ...
2,684,820 UART:
2,684,874 UART: [state] CFI Enabled
2,695,461 UART: [fht] FMC Alias Private Key: 7
2,803,430 UART: [art] Extend RT PCRs Done
2,803,858 UART: [art] Lock RT PCRs Done
2,805,426 UART: [art] Populate DV Done
2,813,737 UART: [fht] FMC Alias Private Key: 7
2,814,849 UART: [art] Derive CDI
2,815,129 UART: [art] Store in in slot 0x4
2,900,814 UART: [art] Derive Key Pair
2,901,174 UART: [art] Store priv key in slot 0x5
2,914,410 UART: [art] Derive Key Pair - Done
2,928,922 UART: [art] Signing Cert with AUTHO
2,929,402 UART: RITY.KEYID = 7
2,944,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,365 UART: [art] PUB.X = 91165DEFD4FEF321DDF1E6DEC1F4D020A14F87420F8371DFC17009ADCD47E333A3E1068522B5484DE137DA1D3EE846B4
2,952,140 UART: [art] PUB.Y = F336C89F15DC14D1AFE5D6113C4EE770EC4A6E5499CAA524270DE94AEA1F4D963C002952FBB10431AFBBCC5DB3A8794B
2,959,082 UART: [art] SIG.R = 6D6EE0E4BE8A0F27A18C4C070B1E25985D1E2C7C0CC9B154AF702810B51B0EF689F9423642C281184FA9C005A4C458D3
2,965,840 UART: [art] SIG.S = 434450C9B7B02F266BAAF040EDAF9BA8D99719A501FCF96773E3D18B8641E24ED08B1D2F6776F7AF37294F6D68FB7B22
2,990,100 UART: Caliptra RT
2,990,353 UART: [state] CFI Enabled
3,098,384 UART: [rt] RT listening for mailbox commands...
3,099,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,654 UART: [rt]cmd =0x44504543, len=96
3,310,297 >>> mbox cmd response data (6236 bytes)
3,310,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,129 UART: [rt]cmd =0x53574545, len=84
3,365,828 >>> mbox cmd response data (200 bytes)
3,365,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,828 UART: [rt]cmd =0x44504543, len=96
3,427,783 >>> mbox cmd response data (56 bytes)
3,427,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,695 UART: [rt]cmd =0x44504543, len=96
3,496,623 >>> mbox cmd response data (24 bytes)
3,496,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,665 UART: [rt]cmd =0x53574545, len=84
3,552,306 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,936 UART: [kat] SHA2-256
903,876 UART: [kat] SHA2-384
906,651 UART: [kat] SHA2-512-ACC
908,552 UART: [kat] ECC-384
918,305 UART: [kat] HMAC-384Kdf
922,983 UART: [kat] LMS
1,171,311 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,207 UART: [idev] ++
1,175,375 UART: [idev] CDI.KEYID = 6
1,175,735 UART: [idev] SUBJECT.KEYID = 7
1,176,159 UART: [idev] UDS.KEYID = 0
1,176,504 ready_for_fw is high
1,176,504 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,534 UART: [idev] Sha1 KeyId Algorithm
1,209,950 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,724 UART: [ldev] Erasing FE.KEYID = 1
1,244,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,158 UART: [ldev] --
1,283,435 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,430 >>> mbox cmd response: success
2,773,622 UART: [afmc] ++
2,773,790 UART: [afmc] CDI.KEYID = 6
2,774,152 UART: [afmc] SUBJECT.KEYID = 7
2,774,577 UART: [afmc] AUTHORITY.KEYID = 5
2,810,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,619 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,347 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,232 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,861 UART: [afmc] --
2,853,875 UART: [cold-reset] --
2,854,757 UART: [state] Locking Datavault
2,855,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,430 UART: [state] Locking ICCM
2,856,888 UART: [exit] Launching FMC @ 0x40000130
2,862,217 UART:
2,862,233 UART: Running Caliptra FMC ...
2,862,641 UART:
2,862,784 UART: [state] CFI Enabled
2,873,259 UART: [fht] FMC Alias Private Key: 7
2,980,840 UART: [art] Extend RT PCRs Done
2,981,268 UART: [art] Lock RT PCRs Done
2,982,928 UART: [art] Populate DV Done
2,991,051 UART: [fht] FMC Alias Private Key: 7
2,992,107 UART: [art] Derive CDI
2,992,387 UART: [art] Store in in slot 0x4
3,077,756 UART: [art] Derive Key Pair
3,078,116 UART: [art] Store priv key in slot 0x5
3,091,270 UART: [art] Derive Key Pair - Done
3,106,171 UART: [art] Signing Cert with AUTHO
3,106,651 UART: RITY.KEYID = 7
3,122,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,280 UART: [art] PUB.X = C5BEAC4BC86559AA58554041FEAA81EEA02EF7F156E7A117385F47FBBE835B1FD337875587E928DC3CBEDA6E9FD4BBD7
3,130,074 UART: [art] PUB.Y = 26F5C951AEFF25B4BD1078CF21CAD4B1F714DCC0323EB8ADB3DCF7EBA21CACF8CE8A1E205F465A1F11CF6BB85F9428D9
3,137,056 UART: [art] SIG.R = E572AE2EB05EF408F5A25604B642D754FAD51C0895A4F741F37EB535866E69E55235C094DF7F2B620198617294EA33A0
3,143,812 UART: [art] SIG.S = 5AFBB679DB3051BA7BF1E3A12B23662D0F4866909BB90768BD80DD84D267352272D0D0D5B03C4C7D6D32F51C996E1138
3,167,195 UART: Caliptra RT
3,167,540 UART: [state] CFI Enabled
3,275,927 UART: [rt] RT listening for mailbox commands...
3,276,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,361 UART: [rt]cmd =0x44504543, len=96
3,488,735 >>> mbox cmd response data (6236 bytes)
3,488,736 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,519 UART: [rt]cmd =0x53574545, len=84
3,543,818 >>> mbox cmd response data (200 bytes)
3,543,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,650 UART: [rt]cmd =0x44504543, len=96
3,605,245 >>> mbox cmd response data (56 bytes)
3,605,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,391 UART: [rt]cmd =0x44504543, len=96
3,675,021 >>> mbox cmd response data (24 bytes)
3,675,022 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,765 UART: [rt]cmd =0x53574545, len=84
3,730,620 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,923 >>> mbox cmd response: success
2,684,637 UART:
2,684,653 UART: Running Caliptra FMC ...
2,685,061 UART:
2,685,204 UART: [state] CFI Enabled
2,696,105 UART: [fht] FMC Alias Private Key: 7
2,803,956 UART: [art] Extend RT PCRs Done
2,804,384 UART: [art] Lock RT PCRs Done
2,805,994 UART: [art] Populate DV Done
2,814,429 UART: [fht] FMC Alias Private Key: 7
2,815,561 UART: [art] Derive CDI
2,815,841 UART: [art] Store in in slot 0x4
2,901,318 UART: [art] Derive Key Pair
2,901,678 UART: [art] Store priv key in slot 0x5
2,914,926 UART: [art] Derive Key Pair - Done
2,929,761 UART: [art] Signing Cert with AUTHO
2,930,241 UART: RITY.KEYID = 7
2,945,379 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,144 UART: [art] PUB.X = 19DC3B2D26B37E169B8C9FCB837AE22423040499849C086C665EB13A0B53CC087704AD94B4E491CCA45A6EFB88EDD414
2,952,904 UART: [art] PUB.Y = 16EB252B4E6BB8762E641A324CF65F5F61CE2E6DC93807CB2E9ED572FABC9970624DE239663ABF25982C431EBBD5C902
2,959,860 UART: [art] SIG.R = A44843A4539D3936D6B4FB29ED5B376DB9679E1663E4ECF5F4912004EBFADF4C0BBC36884ED490DA86D3D32798626BD2
2,966,634 UART: [art] SIG.S = B164508411A71B059F04C2374C4A4BB30F9F117201EC493ABDEAA95006E4687AA160F7439FCA96C077E3C4A43BB94391
2,990,754 UART: Caliptra RT
2,991,099 UART: [state] CFI Enabled
3,099,547 UART: [rt] RT listening for mailbox commands...
3,100,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,831 UART: [rt]cmd =0x44504543, len=96
3,311,963 >>> mbox cmd response data (6236 bytes)
3,311,964 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,861 UART: [rt]cmd =0x53574545, len=84
3,367,720 >>> mbox cmd response data (200 bytes)
3,367,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,418 UART: [rt]cmd =0x44504543, len=96
3,429,141 >>> mbox cmd response data (56 bytes)
3,429,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,149 UART: [rt]cmd =0x44504543, len=96
3,498,577 >>> mbox cmd response data (24 bytes)
3,498,578 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,505 UART: [rt]cmd =0x53574545, len=84
3,553,792 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,527 UART: [idev] ++
1,173,695 UART: [idev] CDI.KEYID = 6
1,174,056 UART: [idev] SUBJECT.KEYID = 7
1,174,481 UART: [idev] UDS.KEYID = 0
1,174,827 ready_for_fw is high
1,174,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,411 UART: [idev] Erasing UDS.KEYID = 0
1,199,765 UART: [idev] Sha1 KeyId Algorithm
1,208,581 UART: [idev] --
1,209,796 UART: [ldev] ++
1,209,964 UART: [ldev] CDI.KEYID = 6
1,210,328 UART: [ldev] SUBJECT.KEYID = 5
1,210,755 UART: [ldev] AUTHORITY.KEYID = 7
1,211,218 UART: [ldev] FE.KEYID = 1
1,216,416 UART: [ldev] Erasing FE.KEYID = 1
1,242,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,456 UART: [fwproc] Wait for Commands...
1,282,175 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,863 >>> mbox cmd response: success
2,771,052 UART: [afmc] ++
2,771,220 UART: [afmc] CDI.KEYID = 6
2,771,583 UART: [afmc] SUBJECT.KEYID = 7
2,772,009 UART: [afmc] AUTHORITY.KEYID = 5
2,807,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,924 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,277 UART: [afmc] --
2,850,185 UART: [cold-reset] --
2,850,841 UART: [state] Locking Datavault
2,852,022 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,626 UART: [state] Locking ICCM
2,853,116 UART: [exit] Launching FMC @ 0x40000130
2,858,445 UART:
2,858,461 UART: Running Caliptra FMC ...
2,858,869 UART:
2,858,923 UART: [state] CFI Enabled
2,869,140 UART: [fht] FMC Alias Private Key: 7
2,977,491 UART: [art] Extend RT PCRs Done
2,977,919 UART: [art] Lock RT PCRs Done
2,979,341 UART: [art] Populate DV Done
2,987,676 UART: [fht] FMC Alias Private Key: 7
2,988,620 UART: [art] Derive CDI
2,988,900 UART: [art] Store in in slot 0x4
3,074,527 UART: [art] Derive Key Pair
3,074,887 UART: [art] Store priv key in slot 0x5
3,087,445 UART: [art] Derive Key Pair - Done
3,102,561 UART: [art] Signing Cert with AUTHO
3,103,041 UART: RITY.KEYID = 7
3,118,279 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,044 UART: [art] PUB.X = F7DDD4EA57B7CD44262DBF835AE4E1A03C1D1BF3494F2A6F8AC5053DE168C8EABDE1E6F3FFD11106365D94BDD839A8BB
3,125,836 UART: [art] PUB.Y = 4CCBF002A3F795C40E0B40D38AAA85209904917F8A397198F87B3B6A375F813F79053D4DF4B6C14C7651CAA1207AA9C0
3,132,775 UART: [art] SIG.R = CAAFAA7A23E77570FA57909572570CC6CC9E34E40E3DF946512BD28616E36653C02A5393F68EDA8E5F4BFCA0EDB28E21
3,139,553 UART: [art] SIG.S = B6363C6620B5805B5A12A87BECC65274873F1304AA25704634DDDF21B49376CE6C13B4ABAE5AB06E9F908808C196BC29
3,163,164 UART: Caliptra RT
3,163,417 UART: [state] CFI Enabled
3,270,741 UART: [rt] RT listening for mailbox commands...
3,271,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,641 UART: [rt]cmd =0x44504543, len=96
3,482,960 >>> mbox cmd response data (6236 bytes)
3,482,961 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,860 UART: [rt]cmd =0x53574545, len=84
3,538,563 >>> mbox cmd response data (200 bytes)
3,538,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,443 UART: [rt]cmd =0x44504543, len=96
3,600,272 >>> mbox cmd response data (56 bytes)
3,600,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,216 UART: [rt]cmd =0x44504543, len=96
3,670,408 >>> mbox cmd response data (24 bytes)
3,670,409 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,470 UART: [rt]cmd =0x53574545, len=84
3,725,671 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,054 ready_for_fw is high
1,056,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,359 >>> mbox cmd response: success
2,683,093 UART:
2,683,109 UART: Running Caliptra FMC ...
2,683,517 UART:
2,683,571 UART: [state] CFI Enabled
2,693,860 UART: [fht] FMC Alias Private Key: 7
2,802,061 UART: [art] Extend RT PCRs Done
2,802,489 UART: [art] Lock RT PCRs Done
2,803,963 UART: [art] Populate DV Done
2,812,032 UART: [fht] FMC Alias Private Key: 7
2,813,098 UART: [art] Derive CDI
2,813,378 UART: [art] Store in in slot 0x4
2,899,069 UART: [art] Derive Key Pair
2,899,429 UART: [art] Store priv key in slot 0x5
2,913,087 UART: [art] Derive Key Pair - Done
2,927,749 UART: [art] Signing Cert with AUTHO
2,928,229 UART: RITY.KEYID = 7
2,943,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,682 UART: [art] PUB.X = 2E3639292B735760CD00759AF2C7E8C221A2903B1C37FCDBA380D390E24969C553055273718479BBD2603007D86DAF86
2,951,416 UART: [art] PUB.Y = EED70BAAF59CE3094FAAF262FA6F76BDA2E8D8798098760BC044BEA47E60ED236B58BA17CED7E95DD72E74FA999263AB
2,958,381 UART: [art] SIG.R = 848AF6DF91D41F28EC2D2F536E67C1F5742C6A331B039389750EB69D502E5D7A18AE696D7E6483281468C318296C578D
2,965,141 UART: [art] SIG.S = 0A418BF32DF71C3494C8803FC2D60F931182CE6A1FA9C5E4531B78534B29A97CAC46511111660B54C3E12BF06F076EC4
2,987,944 UART: Caliptra RT
2,988,197 UART: [state] CFI Enabled
3,096,920 UART: [rt] RT listening for mailbox commands...
3,097,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,328 UART: [rt]cmd =0x44504543, len=96
3,308,573 >>> mbox cmd response data (6236 bytes)
3,308,574 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,117 UART: [rt]cmd =0x53574545, len=84
3,363,870 >>> mbox cmd response data (200 bytes)
3,363,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,840 UART: [rt]cmd =0x44504543, len=96
3,425,743 >>> mbox cmd response data (56 bytes)
3,425,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,605 UART: [rt]cmd =0x44504543, len=96
3,495,497 >>> mbox cmd response data (24 bytes)
3,495,498 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,517 UART: [rt]cmd =0x53574545, len=84
3,551,438 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,859 UART: [state] LifecycleState = Unprovisioned
85,514 UART: [state] DebugLocked = No
86,162 UART: [state] WD Timer not started. Device not locked for debugging
87,341 UART: [kat] SHA2-256
890,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,975 UART: [kat] SHA2-512-ACC
905,876 UART: [kat] ECC-384
915,153 UART: [kat] HMAC-384Kdf
919,849 UART: [kat] LMS
1,168,161 UART: [kat] --
1,169,066 UART: [cold-reset] ++
1,169,422 UART: [fht] FHT @ 0x50003400
1,172,160 UART: [idev] ++
1,172,328 UART: [idev] CDI.KEYID = 6
1,172,689 UART: [idev] SUBJECT.KEYID = 7
1,173,114 UART: [idev] UDS.KEYID = 0
1,173,460 ready_for_fw is high
1,173,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,014 UART: [idev] Erasing UDS.KEYID = 0
1,198,054 UART: [idev] Sha1 KeyId Algorithm
1,206,928 UART: [idev] --
1,208,039 UART: [ldev] ++
1,208,207 UART: [ldev] CDI.KEYID = 6
1,208,571 UART: [ldev] SUBJECT.KEYID = 5
1,208,998 UART: [ldev] AUTHORITY.KEYID = 7
1,209,461 UART: [ldev] FE.KEYID = 1
1,214,807 UART: [ldev] Erasing FE.KEYID = 1
1,240,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,763 UART: [ldev] --
1,280,245 UART: [fwproc] Wait for Commands...
1,280,946 UART: [fwproc] Recv command 0x46574c44
1,281,679 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,310 >>> mbox cmd response: success
2,769,395 UART: [afmc] ++
2,769,563 UART: [afmc] CDI.KEYID = 6
2,769,926 UART: [afmc] SUBJECT.KEYID = 7
2,770,352 UART: [afmc] AUTHORITY.KEYID = 5
2,805,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,237 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,908 UART: [afmc] --
2,848,908 UART: [cold-reset] --
2,849,822 UART: [state] Locking Datavault
2,851,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,753 UART: [state] Locking ICCM
2,852,397 UART: [exit] Launching FMC @ 0x40000130
2,857,726 UART:
2,857,742 UART: Running Caliptra FMC ...
2,858,150 UART:
2,858,293 UART: [state] CFI Enabled
2,868,882 UART: [fht] FMC Alias Private Key: 7
2,976,827 UART: [art] Extend RT PCRs Done
2,977,255 UART: [art] Lock RT PCRs Done
2,978,811 UART: [art] Populate DV Done
2,986,988 UART: [fht] FMC Alias Private Key: 7
2,988,134 UART: [art] Derive CDI
2,988,414 UART: [art] Store in in slot 0x4
3,073,955 UART: [art] Derive Key Pair
3,074,315 UART: [art] Store priv key in slot 0x5
3,087,461 UART: [art] Derive Key Pair - Done
3,102,105 UART: [art] Signing Cert with AUTHO
3,102,585 UART: RITY.KEYID = 7
3,117,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,658 UART: [art] PUB.X = D903C2F279D4A0585851519C149994AA4C649F5331378CC4A5BD9554E1D3675CDD235D63B38572D06E0933842457D7D7
3,125,412 UART: [art] PUB.Y = 75B2F8A750EB03F8985F30AF3C9EA3B393C689220F3DED73FB63C6FF76C2BF34F1973F99D1AEDF76CE0829D35944D4AE
3,132,369 UART: [art] SIG.R = 1FA1F65ACE3841A8548762E3BEF849ADE23F538D9ADF508CB3BC034B9E56F3322504AAB6F228C5E0C0943ED31A0EA4BB
3,139,148 UART: [art] SIG.S = 5F58BB3C67508947620E9435191A995B64B7341FA974963938DA09AC05A731B515FDF413E421D5E4F572116662693C90
3,163,008 UART: Caliptra RT
3,163,353 UART: [state] CFI Enabled
3,270,612 UART: [rt] RT listening for mailbox commands...
3,271,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,596 UART: [rt]cmd =0x44504543, len=96
3,482,969 >>> mbox cmd response data (6236 bytes)
3,482,970 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,875 UART: [rt]cmd =0x53574545, len=84
3,538,276 >>> mbox cmd response data (200 bytes)
3,538,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,542 UART: [rt]cmd =0x44504543, len=96
3,600,059 >>> mbox cmd response data (56 bytes)
3,600,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,091 UART: [rt]cmd =0x44504543, len=96
3,670,459 >>> mbox cmd response data (24 bytes)
3,670,460 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,543 UART: [rt]cmd =0x53574545, len=84
3,726,486 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,957 ready_for_fw is high
1,055,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,670 >>> mbox cmd response: success
2,680,746 UART:
2,680,762 UART: Running Caliptra FMC ...
2,681,170 UART:
2,681,313 UART: [state] CFI Enabled
2,691,794 UART: [fht] FMC Alias Private Key: 7
2,799,525 UART: [art] Extend RT PCRs Done
2,799,953 UART: [art] Lock RT PCRs Done
2,801,441 UART: [art] Populate DV Done
2,809,706 UART: [fht] FMC Alias Private Key: 7
2,810,856 UART: [art] Derive CDI
2,811,136 UART: [art] Store in in slot 0x4
2,896,951 UART: [art] Derive Key Pair
2,897,311 UART: [art] Store priv key in slot 0x5
2,910,633 UART: [art] Derive Key Pair - Done
2,925,253 UART: [art] Signing Cert with AUTHO
2,925,733 UART: RITY.KEYID = 7
2,940,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,210 UART: [art] PUB.X = 7180934D01D2260C75F607BF06447F3952BEDFAAEC006F99BA877A8CEF01CE2EF2F12BDB6BB9C3FA47905D22C976A8F6
2,947,959 UART: [art] PUB.Y = EA5462EA19B702B2C77E43DCD37B9C07EF4BDBF4C3D12514CA0870D761CE6A2B60D4588B5D1899DF2E454A9D77BF0816
2,954,911 UART: [art] SIG.R = 1C716BD1385885C58694D3B8BAEF4542E3CA211A2C9EB9E4CD25C914BD1A7A60626DC74A4AFEA047F2E5E2B5743F2333
2,961,693 UART: [art] SIG.S = FF5518312339CBAB4468A8C3C726E719361862865CA87B990B02A0A112BD150BCC1E04DD9CAA6FAC7B47A2A8228A3FB1
2,984,822 UART: Caliptra RT
2,985,167 UART: [state] CFI Enabled
3,093,698 UART: [rt] RT listening for mailbox commands...
3,094,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,814 UART: [rt]cmd =0x44504543, len=96
3,306,606 >>> mbox cmd response data (6236 bytes)
3,306,607 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,408 UART: [rt]cmd =0x53574545, len=84
3,362,165 >>> mbox cmd response data (200 bytes)
3,362,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,135 UART: [rt]cmd =0x44504543, len=96
3,423,686 >>> mbox cmd response data (56 bytes)
3,423,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,856 UART: [rt]cmd =0x44504543, len=96
3,492,942 >>> mbox cmd response data (24 bytes)
3,492,943 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,996 UART: [rt]cmd =0x53574545, len=84
3,549,319 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,171 UART:
192,536 UART: Running Caliptra ROM ...
193,631 UART:
193,776 UART: [state] CFI Enabled
265,576 UART: [state] LifecycleState = Unprovisioned
267,583 UART: [state] DebugLocked = No
269,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,921 UART: [kat] SHA2-256
443,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,063 UART: [kat] ++
454,520 UART: [kat] sha1
464,824 UART: [kat] SHA2-256
467,476 UART: [kat] SHA2-384
472,756 UART: [kat] SHA2-512-ACC
475,123 UART: [kat] ECC-384
2,766,985 UART: [kat] HMAC-384Kdf
2,778,514 UART: [kat] LMS
3,968,836 UART: [kat] --
3,972,437 UART: [cold-reset] ++
3,974,300 UART: [fht] Storing FHT @ 0x50003400
3,986,344 UART: [idev] ++
3,986,933 UART: [idev] CDI.KEYID = 6
3,987,816 UART: [idev] SUBJECT.KEYID = 7
3,989,059 UART: [idev] UDS.KEYID = 0
3,990,024 ready_for_fw is high
3,990,217 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,288 UART: [idev] Erasing UDS.KEYID = 0
7,327,216 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,394 UART: [idev] --
7,355,411 UART: [ldev] ++
7,355,981 UART: [ldev] CDI.KEYID = 6
7,356,918 UART: [ldev] SUBJECT.KEYID = 5
7,358,127 UART: [ldev] AUTHORITY.KEYID = 7
7,359,410 UART: [ldev] FE.KEYID = 1
7,400,604 UART: [ldev] Erasing FE.KEYID = 1
10,733,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,900 UART: [ldev] --
13,092,028 UART: [fwproc] Waiting for Commands...
13,094,774 UART: [fwproc] Received command 0x46574c44
13,097,010 UART: [fwproc] Received Image of size 113760 bytes
17,150,484 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,614,864 >>> mbox cmd response: success
17,618,406 UART: [afmc] ++
17,619,001 UART: [afmc] CDI.KEYID = 6
17,619,890 UART: [afmc] SUBJECT.KEYID = 7
17,621,164 UART: [afmc] AUTHORITY.KEYID = 5
20,987,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,396 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,789 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,641 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,033 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,575 UART: [afmc] --
23,360,971 UART: [cold-reset] --
23,366,292 UART: [state] Locking Datavault
23,370,675 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,462 UART: [state] Locking ICCM
23,375,060 UART: [exit] Launching FMC @ 0x40000130
23,383,468 UART:
23,383,713 UART: Running Caliptra FMC ...
23,384,814 UART:
23,384,975 UART: [state] CFI Enabled
23,447,989 UART: [fht] FMC Alias Private Key: 7
25,785,751 UART: [art] Extend RT PCRs Done
25,786,978 UART: [art] Lock RT PCRs Done
25,788,733 UART: [art] Populate DV Done
25,793,872 UART: [fht] FMC Alias Private Key: 7
25,795,352 UART: [art] Derive CDI
25,796,090 UART: [art] Store in in slot 0x4
25,856,808 UART: [art] Derive Key Pair
25,857,847 UART: [art] Store priv key in slot 0x5
29,150,866 UART: [art] Derive Key Pair - Done
29,164,020 UART: [art] Signing Cert with AUTHO
29,165,320 UART: RITY.KEYID = 7
31,452,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,441 UART: [art] PUB.X = 6EBB7E3C89BACE3256AB87AA8028A2C24B54A57AADAD163837B068A3A4FF56F5FDAF2493CEAA1EB029CE3B96EBADC052
31,461,680 UART: [art] PUB.Y = F24FC9952B6D524D95D90A50E700A7E03D5EA709DC8D8D6511BE5E20FB4CA20C7EB304457B3CBF21B5243866FC224306
31,468,961 UART: [art] SIG.R = BA29E58B9E3981536FF7B3A71E82903AF411EEE182351991913D001ADB05A08B324DE71FAB4AF819E55B5028D84950D1
31,476,363 UART: [art] SIG.S = 56CE98EC6B518F976A5AE7F4D99F8E39CB1C5071B1409982D21FE6B2847042E09BBA2EB4A564A7D1B50D4BCCEC793808
32,781,593 UART: Caliptra RT
32,782,305 UART: [state] CFI Enabled
32,943,422 UART: [rt] RT listening for mailbox commands...
32,945,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,976,848 UART: [rt]cmd =0x44504543, len=96
38,741,103 >>> mbox cmd response data (6236 bytes)
38,770,284 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,801,063 UART: [rt]cmd =0x53574545, len=84
38,804,618 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,804,024 ready_for_fw is high
3,804,410 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,832,798 >>> mbox cmd response: success
23,531,392 UART:
23,531,814 UART: Running Caliptra FMC ...
23,532,930 UART:
23,533,095 UART: [state] CFI Enabled
23,596,601 UART: [fht] FMC Alias Private Key: 7
25,934,753 UART: [art] Extend RT PCRs Done
25,935,983 UART: [art] Lock RT PCRs Done
25,937,945 UART: [art] Populate DV Done
25,943,315 UART: [fht] FMC Alias Private Key: 7
25,944,965 UART: [art] Derive CDI
25,945,802 UART: [art] Store in in slot 0x4
26,005,400 UART: [art] Derive Key Pair
26,006,452 UART: [art] Store priv key in slot 0x5
29,299,680 UART: [art] Derive Key Pair - Done
29,312,359 UART: [art] Signing Cert with AUTHO
29,313,662 UART: RITY.KEYID = 7
31,601,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,200 UART: [art] PUB.X = A5D9B2F3102667470AB1D2BFD1EA0684158C6B0D1DD6829A5377E488A74BF93DACB229B14B1EC4A4D6C86A0FB9AA4107
31,610,472 UART: [art] PUB.Y = BBBA8A8CE67CF87630BEC4BD5FA1EB31D8F47ED3074A72490AFC3B543AF2B2600440F3C0975CF10249EEC46CF8575108
31,617,735 UART: [art] SIG.R = 0B575F1D654E7959D164B6A6803876329E21E2A8F2C209F188CFC193CD909B075102C8F3F820FC56A1A340326D2E58A4
31,625,085 UART: [art] SIG.S = FFC72AED5B08C346481DC9BF0CB34EE4822DC4CF6F31D1636FCBDE768E2FD87A0B28B24E8D0E3DD37FCC773A55991FA2
32,930,047 UART: Caliptra RT
32,930,772 UART: [state] CFI Enabled
33,091,779 UART: [rt] RT listening for mailbox commands...
33,093,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,124,895 UART: [rt]cmd =0x44504543, len=96
38,888,577 >>> mbox cmd response data (6236 bytes)
38,917,838 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,948,621 UART: [rt]cmd =0x53574545, len=84
38,951,946 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
192,985 UART:
193,361 UART: Running Caliptra ROM ...
194,459 UART:
604,242 UART: [state] CFI Enabled
615,564 UART: [state] LifecycleState = Unprovisioned
617,571 UART: [state] DebugLocked = No
619,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,458 UART: [kat] SHA2-256
793,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,689 UART: [kat] ++
804,210 UART: [kat] sha1
815,004 UART: [kat] SHA2-256
817,737 UART: [kat] SHA2-384
824,433 UART: [kat] SHA2-512-ACC
826,795 UART: [kat] ECC-384
3,112,857 UART: [kat] HMAC-384Kdf
3,124,160 UART: [kat] LMS
4,314,285 UART: [kat] --
4,319,132 UART: [cold-reset] ++
4,320,347 UART: [fht] Storing FHT @ 0x50003400
4,333,380 UART: [idev] ++
4,333,959 UART: [idev] CDI.KEYID = 6
4,334,936 UART: [idev] SUBJECT.KEYID = 7
4,336,171 UART: [idev] UDS.KEYID = 0
4,337,137 ready_for_fw is high
4,337,334 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,234 UART: [idev] Erasing UDS.KEYID = 0
7,625,365 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,036 UART: [idev] --
7,652,816 UART: [ldev] ++
7,653,440 UART: [ldev] CDI.KEYID = 6
7,654,324 UART: [ldev] SUBJECT.KEYID = 5
7,655,579 UART: [ldev] AUTHORITY.KEYID = 7
7,656,970 UART: [ldev] FE.KEYID = 1
7,667,730 UART: [ldev] Erasing FE.KEYID = 1
10,954,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,005 UART: [ldev] --
13,320,209 UART: [fwproc] Waiting for Commands...
13,323,318 UART: [fwproc] Received command 0x46574c44
13,325,491 UART: [fwproc] Received Image of size 113760 bytes
17,367,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,342 >>> mbox cmd response: success
17,827,891 UART: [afmc] ++
17,828,482 UART: [afmc] CDI.KEYID = 6
17,829,363 UART: [afmc] SUBJECT.KEYID = 7
17,830,634 UART: [afmc] AUTHORITY.KEYID = 5
21,146,190 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,935 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,313 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,161 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,580 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,122 UART: [afmc] --
23,508,080 UART: [cold-reset] --
23,512,427 UART: [state] Locking Datavault
23,518,326 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,082 UART: [state] Locking ICCM
23,521,901 UART: [exit] Launching FMC @ 0x40000130
23,530,304 UART:
23,530,539 UART: Running Caliptra FMC ...
23,531,635 UART:
23,531,786 UART: [state] CFI Enabled
23,539,775 UART: [fht] FMC Alias Private Key: 7
25,871,032 UART: [art] Extend RT PCRs Done
25,872,258 UART: [art] Lock RT PCRs Done
25,874,084 UART: [art] Populate DV Done
25,879,448 UART: [fht] FMC Alias Private Key: 7
25,881,032 UART: [art] Derive CDI
25,881,842 UART: [art] Store in in slot 0x4
25,924,327 UART: [art] Derive Key Pair
25,925,365 UART: [art] Store priv key in slot 0x5
29,167,017 UART: [art] Derive Key Pair - Done
29,180,283 UART: [art] Signing Cert with AUTHO
29,181,609 UART: RITY.KEYID = 7
31,461,014 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,521 UART: [art] PUB.X = 8C34082F541F1BE7439EA66759C3C441802983FAEC9116CB85CC733D86B830A17E1B6F094907DB00AA82DCE7B3358061
31,469,732 UART: [art] PUB.Y = 3738D9871DFEB4D104B239DD33E4991993A39E6A5D14B3EF4A7890301CCB0928D299375B9AC22ADA4E6095270CFB8E08
31,476,981 UART: [art] SIG.R = 8FF13BBA326AE70B317C2A6BC749E4F5180A57A41B804005FE178D7226C4986FD679124A8B49E1A6354DC3271589C697
31,484,339 UART: [art] SIG.S = 65FEA978D28B8640320CF3B39A10B891F1636C855AAF3E77131774ABF9B25171489CF5BEDA8DBA6A32F05FA064D38C63
32,789,659 UART: Caliptra RT
32,790,374 UART: [state] CFI Enabled
32,908,515 UART: [rt] RT listening for mailbox commands...
32,910,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,940,980 UART: [rt]cmd =0x44504543, len=96
38,612,546 >>> mbox cmd response data (6236 bytes)
38,641,882 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,672,222 UART: [rt]cmd =0x53574545, len=84
38,676,209 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,814 writing to cptra_bootfsm_go
4,130,439 ready_for_fw is high
4,130,827 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,062,185 >>> mbox cmd response: success
23,705,531 UART:
23,705,935 UART: Running Caliptra FMC ...
23,707,031 UART:
23,707,183 UART: [state] CFI Enabled
23,714,923 UART: [fht] FMC Alias Private Key: 7
26,045,874 UART: [art] Extend RT PCRs Done
26,047,107 UART: [art] Lock RT PCRs Done
26,048,902 UART: [art] Populate DV Done
26,054,008 UART: [fht] FMC Alias Private Key: 7
26,055,511 UART: [art] Derive CDI
26,056,247 UART: [art] Store in in slot 0x4
26,099,069 UART: [art] Derive Key Pair
26,100,113 UART: [art] Store priv key in slot 0x5
29,341,909 UART: [art] Derive Key Pair - Done
29,355,290 UART: [art] Signing Cert with AUTHO
29,356,591 UART: RITY.KEYID = 7
31,636,221 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,731 UART: [art] PUB.X = 72A94D7B2D8150B9C08E4503DDC37A264DDFB36AFB16407E149AF5FB6872D39E0383FF87D99B240D17AC4D89F657A486
31,644,977 UART: [art] PUB.Y = DC6EC554A59D1C06044E18291CB04124CC291F1BAF5833FD2F9542E25D052710D378AAADA6522EE0BDC94BC4AEAD9F97
31,652,262 UART: [art] SIG.R = FA4CB658291EFD127173E51374652E8C73BBFBA20FA17E85562D7B182CF4AD44A7C57D84F09E5D765C83B812ED5F8D9B
31,659,630 UART: [art] SIG.S = B54C740A18C48CB19E751CF7AAE2A8D6BAB70F2CA06B0E96BD6CBAFD06A83C47E74147E5B61A722130974C6FCDD6AA6E
32,964,736 UART: Caliptra RT
32,965,450 UART: [state] CFI Enabled
33,083,651 UART: [rt] RT listening for mailbox commands...
33,085,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,250 UART: [rt]cmd =0x44504543, len=96
38,788,133 >>> mbox cmd response data (6236 bytes)
38,817,488 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,848,135 UART: [rt]cmd =0x53574545, len=84
38,851,647 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,476 UART:
192,849 UART: Running Caliptra ROM ...
193,985 UART:
194,130 UART: [state] CFI Enabled
262,840 UART: [state] LifecycleState = Unprovisioned
264,784 UART: [state] DebugLocked = No
266,397 UART: [state] WD Timer not started. Device not locked for debugging
270,294 UART: [kat] SHA2-256
449,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,931 UART: [kat] ++
461,531 UART: [kat] sha1
472,057 UART: [kat] SHA2-256
475,062 UART: [kat] SHA2-384
479,999 UART: [kat] SHA2-512-ACC
482,928 UART: [kat] ECC-384
2,947,571 UART: [kat] HMAC-384Kdf
2,972,405 UART: [kat] LMS
3,501,858 UART: [kat] --
3,507,697 UART: [cold-reset] ++
3,508,559 UART: [fht] FHT @ 0x50003400
3,519,888 UART: [idev] ++
3,520,446 UART: [idev] CDI.KEYID = 6
3,521,360 UART: [idev] SUBJECT.KEYID = 7
3,522,531 UART: [idev] UDS.KEYID = 0
3,523,574 ready_for_fw is high
3,523,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,277 UART: [idev] Erasing UDS.KEYID = 0
6,029,093 UART: [idev] Sha1 KeyId Algorithm
6,053,464 UART: [idev] --
6,057,208 UART: [ldev] ++
6,057,784 UART: [ldev] CDI.KEYID = 6
6,058,695 UART: [ldev] SUBJECT.KEYID = 5
6,059,910 UART: [ldev] AUTHORITY.KEYID = 7
6,061,138 UART: [ldev] FE.KEYID = 1
6,100,834 UART: [ldev] Erasing FE.KEYID = 1
8,605,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,078 UART: [ldev] --
10,414,930 UART: [fwproc] Wait for Commands...
10,416,413 UART: [fwproc] Recv command 0x46574c44
10,418,508 UART: [fwproc] Recv'd Img size: 114084 bytes
13,818,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,279,897 >>> mbox cmd response: success
14,283,714 UART: [afmc] ++
14,284,321 UART: [afmc] CDI.KEYID = 6
14,285,233 UART: [afmc] SUBJECT.KEYID = 7
14,286,389 UART: [afmc] AUTHORITY.KEYID = 5
16,827,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,805 UART: [afmc] --
18,628,606 UART: [cold-reset] --
18,633,592 UART: [state] Locking Datavault
18,637,942 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,587 UART: [state] Locking ICCM
18,641,736 UART: [exit] Launching FMC @ 0x40000130
18,650,137 UART:
18,650,410 UART: Running Caliptra FMC ...
18,651,515 UART:
18,651,671 UART: [state] CFI Enabled
18,712,401 UART: [fht] FMC Alias Private Key: 7
20,475,428 UART: [art] Extend RT PCRs Done
20,476,651 UART: [art] Lock RT PCRs Done
20,478,496 UART: [art] Populate DV Done
20,483,743 UART: [fht] FMC Alias Private Key: 7
20,485,271 UART: [art] Derive CDI
20,486,078 UART: [art] Store in in slot 0x4
20,544,964 UART: [art] Derive Key Pair
20,546,005 UART: [art] Store priv key in slot 0x5
23,008,356 UART: [art] Derive Key Pair - Done
23,021,527 UART: [art] Signing Cert with AUTHO
23,022,846 UART: RITY.KEYID = 7
24,734,425 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,929 UART: [art] PUB.X = C50F6505642B61148E79C0F3451B15C02EE4378C5AC879924FE70335C1C1F401FE96AC6271330BE2350F9EA913A6FDCD
24,743,147 UART: [art] PUB.Y = 3DE64F7CA8F1E7E2730A5388FFD039189E5250B183F975EA34E92921C4401CFCBAD332AB54A3DBE00CC3CAC1C6E9CD88
24,750,465 UART: [art] SIG.R = D2E07EAAB78EC2868302CB47B82530638580A129DA387E65E821D9D1A237AFEC45295810238EFF140625726914DAFE2D
24,757,823 UART: [art] SIG.S = 26B697E0E82871017E90E94A51846D60B7FD7C1505CB2945FE448CC3DF65D04AF2503371CCD42E1E0FE1D76197C4722A
25,736,945 UART: Caliptra RT
25,737,664 UART: [state] CFI Enabled
25,901,113 UART: [rt] RT listening for mailbox commands...
25,903,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,934,267 UART: [rt]cmd =0x44504543, len=96
30,293,122 >>> mbox cmd response data (6236 bytes)
30,322,453 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,353,242 UART: [rt]cmd =0x53574545, len=84
30,357,169 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,363,499 ready_for_fw is high
3,364,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,033,365 >>> mbox cmd response: success
18,324,098 UART:
18,324,536 UART: Running Caliptra FMC ...
18,325,853 UART:
18,326,020 UART: [state] CFI Enabled
18,390,678 UART: [fht] FMC Alias Private Key: 7
20,154,584 UART: [art] Extend RT PCRs Done
20,155,815 UART: [art] Lock RT PCRs Done
20,157,039 UART: [art] Populate DV Done
20,162,105 UART: [fht] FMC Alias Private Key: 7
20,163,752 UART: [art] Derive CDI
20,164,485 UART: [art] Store in in slot 0x4
20,223,465 UART: [art] Derive Key Pair
20,224,478 UART: [art] Store priv key in slot 0x5
22,688,240 UART: [art] Derive Key Pair - Done
22,700,806 UART: [art] Signing Cert with AUTHO
22,702,099 UART: RITY.KEYID = 7
24,413,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,278 UART: [art] PUB.X = 254B2E95C9C310756117C19C6870AD76DCB2E8F3BF73AB22B770A73849FA5D343C9A25E9BF186FA8F19F00F2615BA344
24,422,548 UART: [art] PUB.Y = F066A5C95F2E87852A2C1D3334858C70A3D1F4032B53EEFB6A1C19039710C4E17AC692841CBA9B3E1BC461CB36330DE5
24,429,825 UART: [art] SIG.R = 2E30562D8C852C8A46F099E106412A9730A5F2BDE4597ECA83B3B9B73F83DAB296AF9CA602ED1A521C3C026FED86A059
24,437,193 UART: [art] SIG.S = 64560967AADF61149D9C1296437FD86FE1AD74365FF5C4F36E478D047CBCCD633513EAF6DC4D6BCC31F534CE7A006E03
25,416,321 UART: Caliptra RT
25,417,040 UART: [state] CFI Enabled
25,581,491 UART: [rt] RT listening for mailbox commands...
25,583,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,614,671 UART: [rt]cmd =0x44504543, len=96
29,974,345 >>> mbox cmd response data (6236 bytes)
30,003,619 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,034,198 UART: [rt]cmd =0x53574545, len=84
30,037,789 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,930 UART:
193,302 UART: Running Caliptra ROM ...
194,428 UART:
604,240 UART: [state] CFI Enabled
615,561 UART: [state] LifecycleState = Unprovisioned
617,466 UART: [state] DebugLocked = No
619,494 UART: [state] WD Timer not started. Device not locked for debugging
622,816 UART: [kat] SHA2-256
801,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,472 UART: [kat] ++
814,014 UART: [kat] sha1
824,189 UART: [kat] SHA2-256
827,263 UART: [kat] SHA2-384
833,465 UART: [kat] SHA2-512-ACC
836,437 UART: [kat] ECC-384
3,276,817 UART: [kat] HMAC-384Kdf
3,288,484 UART: [kat] LMS
3,817,983 UART: [kat] --
3,822,430 UART: [cold-reset] ++
3,823,730 UART: [fht] FHT @ 0x50003400
3,835,843 UART: [idev] ++
3,836,435 UART: [idev] CDI.KEYID = 6
3,837,507 UART: [idev] SUBJECT.KEYID = 7
3,838,620 UART: [idev] UDS.KEYID = 0
3,839,544 ready_for_fw is high
3,839,732 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,983,013 UART: [idev] Erasing UDS.KEYID = 0
6,308,429 UART: [idev] Sha1 KeyId Algorithm
6,331,007 UART: [idev] --
6,334,678 UART: [ldev] ++
6,335,250 UART: [ldev] CDI.KEYID = 6
6,336,159 UART: [ldev] SUBJECT.KEYID = 5
6,337,373 UART: [ldev] AUTHORITY.KEYID = 7
6,338,604 UART: [ldev] FE.KEYID = 1
6,350,708 UART: [ldev] Erasing FE.KEYID = 1
8,822,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,535 UART: [ldev] --
10,612,682 UART: [fwproc] Wait for Commands...
10,615,156 UART: [fwproc] Recv command 0x46574c44
10,617,195 UART: [fwproc] Recv'd Img size: 114084 bytes
14,016,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,474,548 >>> mbox cmd response: success
14,479,258 UART: [afmc] ++
14,479,854 UART: [afmc] CDI.KEYID = 6
14,480,768 UART: [afmc] SUBJECT.KEYID = 7
14,481,929 UART: [afmc] AUTHORITY.KEYID = 5
16,982,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,844 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,327 UART: [afmc] --
18,781,904 UART: [cold-reset] --
18,785,228 UART: [state] Locking Datavault
18,788,704 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,353 UART: [state] Locking ICCM
18,791,747 UART: [exit] Launching FMC @ 0x40000130
18,800,201 UART:
18,800,438 UART: Running Caliptra FMC ...
18,801,539 UART:
18,801,700 UART: [state] CFI Enabled
18,809,857 UART: [fht] FMC Alias Private Key: 7
20,566,476 UART: [art] Extend RT PCRs Done
20,567,702 UART: [art] Lock RT PCRs Done
20,569,442 UART: [art] Populate DV Done
20,575,015 UART: [fht] FMC Alias Private Key: 7
20,576,713 UART: [art] Derive CDI
20,577,526 UART: [art] Store in in slot 0x4
20,620,069 UART: [art] Derive Key Pair
20,621,113 UART: [art] Store priv key in slot 0x5
23,047,960 UART: [art] Derive Key Pair - Done
23,061,125 UART: [art] Signing Cert with AUTHO
23,062,438 UART: RITY.KEYID = 7
24,767,812 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,313 UART: [art] PUB.X = E941BCD3B91C5C59A6A0EF4996EBEB15384E22BE6401AFF1E516218998CFC3C23A231231833E4553F703B049F87365FB
24,776,650 UART: [art] PUB.Y = 4C7478108CDABF7AFCF6201D94C859CD20F17A3B447CE2FB3849BF171A7343FDDF8013467C67EF44C514EEFC67996168
24,783,854 UART: [art] SIG.R = EFF4302E9A6501461FC72F2A4EDBF855CD5492768268F2F93CB66A432B3C260FCBA48893C9DD271B0F36EABA3B9DA1A1
24,791,290 UART: [art] SIG.S = B5B17F3B72BB68D21D327A6D9E5FF64CCD2145ABA299F933DF1969EAF23FA3D9DA3B43E2C9EF1D75621E6DB8CBBD2B82
25,769,940 UART: Caliptra RT
25,770,643 UART: [state] CFI Enabled
25,886,908 UART: [rt] RT listening for mailbox commands...
25,888,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,919,254 UART: [rt]cmd =0x44504543, len=96
30,201,848 >>> mbox cmd response data (6236 bytes)
30,230,917 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,261,521 UART: [rt]cmd =0x53574545, len=84
30,265,564 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
3,694,531 ready_for_fw is high
3,695,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,258,168 >>> mbox cmd response: success
18,507,202 UART:
18,507,643 UART: Running Caliptra FMC ...
18,508,746 UART:
18,508,912 UART: [state] CFI Enabled
18,517,219 UART: [fht] FMC Alias Private Key: 7
20,274,404 UART: [art] Extend RT PCRs Done
20,275,625 UART: [art] Lock RT PCRs Done
20,277,012 UART: [art] Populate DV Done
20,282,701 UART: [fht] FMC Alias Private Key: 7
20,284,412 UART: [art] Derive CDI
20,285,169 UART: [art] Store in in slot 0x4
20,328,142 UART: [art] Derive Key Pair
20,329,149 UART: [art] Store priv key in slot 0x5
22,756,687 UART: [art] Derive Key Pair - Done
22,769,853 UART: [art] Signing Cert with AUTHO
22,771,158 UART: RITY.KEYID = 7
24,476,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,768 UART: [art] PUB.X = 0CB221EF641C8DAAF480D1D45B8734B6C9855F6F6685DAA72FA04351A7E5EC4DA782BD409651B2D175B962023A342497
24,485,050 UART: [art] PUB.Y = EFB1E7BD1B46EE1A98640ACF8283C85F3369096A1469B32A36F47B14603F692442F20768825560E5F8E9E351354B2B27
24,492,293 UART: [art] SIG.R = 010D2134FD1A08C44EFDB8DDCB56691CCF78F2B50F5FAB01B536EC73871BA05041732074FF1C3E231E61567AE4FCA3F6
24,499,672 UART: [art] SIG.S = 1A6B5191D3DEDA7C70F3B60AED878BA03FBB75E4D933DD5F5D0658D12A145D086CF2855E3F5D3E53C78382EAE01F9F70
25,478,892 UART: Caliptra RT
25,479,597 UART: [state] CFI Enabled
25,596,757 UART: [rt] RT listening for mailbox commands...
25,598,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,629,332 UART: [rt]cmd =0x44504543, len=96
29,911,951 >>> mbox cmd response data (6236 bytes)
29,941,293 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,972,026 UART: [rt]cmd =0x53574545, len=84
29,975,402 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,623 writing to cptra_bootfsm_go
192,745 UART:
193,176 UART: Running Caliptra ROM ...
194,446 UART:
194,623 UART: [state] CFI Enabled
263,594 UART: [state] LifecycleState = Unprovisioned
266,023 UART: [state] DebugLocked = No
268,119 UART: [state] WD Timer not started. Device not locked for debugging
272,379 UART: [kat] SHA2-256
462,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,056 UART: [kat] ++
473,510 UART: [kat] sha1
485,343 UART: [kat] SHA2-256
488,340 UART: [kat] SHA2-384
494,902 UART: [kat] SHA2-512-ACC
497,482 UART: [kat] ECC-384
2,948,977 UART: [kat] HMAC-384Kdf
2,972,769 UART: [kat] LMS
3,504,499 UART: [kat] --
3,509,773 UART: [cold-reset] ++
3,510,860 UART: [fht] FHT @ 0x50003400
3,522,636 UART: [idev] ++
3,523,313 UART: [idev] CDI.KEYID = 6
3,524,228 UART: [idev] SUBJECT.KEYID = 7
3,525,468 UART: [idev] UDS.KEYID = 0
3,526,390 ready_for_fw is high
3,526,587 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,958 UART: [idev] Erasing UDS.KEYID = 0
6,028,089 UART: [idev] Sha1 KeyId Algorithm
6,049,873 UART: [idev] --
6,054,789 UART: [ldev] ++
6,055,464 UART: [ldev] CDI.KEYID = 6
6,056,345 UART: [ldev] SUBJECT.KEYID = 5
6,057,576 UART: [ldev] AUTHORITY.KEYID = 7
6,058,700 UART: [ldev] FE.KEYID = 1
6,100,432 UART: [ldev] Erasing FE.KEYID = 1
8,611,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,326 UART: [ldev] --
10,415,966 UART: [fwproc] Wait for Commands...
10,418,918 UART: [fwproc] Recv command 0x46574c44
10,421,174 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,107 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,599,847 >>> mbox cmd response: success
14,603,166 UART: [afmc] ++
14,603,868 UART: [afmc] CDI.KEYID = 6
14,605,111 UART: [afmc] SUBJECT.KEYID = 7
14,606,566 UART: [afmc] AUTHORITY.KEYID = 5
17,148,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,498 UART: [afmc] --
18,950,434 UART: [cold-reset] --
18,955,218 UART: [state] Locking Datavault
18,962,660 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,841 UART: [state] Locking ICCM
18,967,323 UART: [exit] Launching FMC @ 0x40000130
18,975,955 UART:
18,976,184 UART: Running Caliptra FMC ...
18,977,288 UART:
18,977,459 UART: [state] CFI Enabled
19,045,516 UART: [fht] FMC Alias Private Key: 7
20,809,118 UART: [art] Extend RT PCRs Done
20,810,338 UART: [art] Lock RT PCRs Done
20,811,994 UART: [art] Populate DV Done
20,817,450 UART: [fht] FMC Alias Private Key: 7
20,818,925 UART: [art] Derive CDI
20,819,683 UART: [art] Store in in slot 0x4
20,878,556 UART: [art] Derive Key Pair
20,879,587 UART: [art] Store priv key in slot 0x5
23,342,293 UART: [art] Derive Key Pair - Done
23,355,617 UART: [art] Signing Cert with AUTHO
23,357,057 UART: RITY.KEYID = 7
25,068,131 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,631 UART: [art] PUB.X = 4CB79725B3E778C6A169987AA71F41DD7987159334CEDD30CBF8AD4263F6025539CF2784B781A3EA748AF4CBA0ED8D2C
25,076,895 UART: [art] PUB.Y = 5AF0C7B83D106463AD01773958D0710F7BFEA495FA357E2EB6947781AFF5D258910967E911B026B36792750E5485C476
25,084,116 UART: [art] SIG.R = 6F5DD03B9D6D69FD2242879E0D1FDA2277B871E35FDF556910F650D470B0AD54112452FD00B0F64F0258D82342579C05
25,091,478 UART: [art] SIG.S = 1B939A788D807FFEB9446156AF64D926C5563B93AFABB15492917555479D28077D90B4F4A5069B8AC90CFB7463E2D3BD
26,070,774 UART: Caliptra RT
26,071,483 UART: [state] CFI Enabled
26,235,678 UART: [rt] RT listening for mailbox commands...
26,237,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,268,720 UART: [rt]cmd =0x44504543, len=96
30,627,364 >>> mbox cmd response data (6236 bytes)
30,656,649 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,687,263 UART: [rt]cmd =0x53574545, len=84
30,690,715 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,437,263 ready_for_fw is high
3,437,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,161 >>> mbox cmd response: success
19,029,173 UART:
19,029,603 UART: Running Caliptra FMC ...
19,030,807 UART:
19,030,981 UART: [state] CFI Enabled
19,094,891 UART: [fht] FMC Alias Private Key: 7
20,859,815 UART: [art] Extend RT PCRs Done
20,861,034 UART: [art] Lock RT PCRs Done
20,862,503 UART: [art] Populate DV Done
20,868,036 UART: [fht] FMC Alias Private Key: 7
20,869,530 UART: [art] Derive CDI
20,870,292 UART: [art] Store in in slot 0x4
20,927,972 UART: [art] Derive Key Pair
20,928,982 UART: [art] Store priv key in slot 0x5
23,391,971 UART: [art] Derive Key Pair - Done
23,404,917 UART: [art] Signing Cert with AUTHO
23,406,228 UART: RITY.KEYID = 7
25,117,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,877 UART: [art] PUB.X = F42F57182ABF9DA15846F9D0CB76C8594206D26195D5EBB32560EB572F3229522C1A1638414F62506EA62AFDB43416F4
25,126,112 UART: [art] PUB.Y = EFE9C5BC2E89CB5BBB34654BC2B2EADB8F7D480140F277F8F1377738ACF9B010ACED784167BEC9762D8CC18F98BD5651
25,133,382 UART: [art] SIG.R = 007D3A0936BF3F4F7D3BDFDA85AD923AD0A873E812BE28BA76CFE0DFA4ECBFE76F4D783C2BB30D550F248F2B478C8E8E
25,140,768 UART: [art] SIG.S = D3F4140B199277DCE2ABB3B5859B401F542BC45FFB77906E27BC14908C7E64ED2299BC89CF69831B1B6310C92B4A640E
26,120,139 UART: Caliptra RT
26,120,833 UART: [state] CFI Enabled
26,285,511 UART: [rt] RT listening for mailbox commands...
26,287,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,716 UART: [rt]cmd =0x44504543, len=96
30,676,581 >>> mbox cmd response data (6236 bytes)
30,705,885 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,736,563 UART: [rt]cmd =0x53574545, len=84
30,740,476 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,890 writing to cptra_bootfsm_go
192,979 UART:
193,353 UART: Running Caliptra ROM ...
194,557 UART:
603,934 UART: [state] CFI Enabled
614,544 UART: [state] LifecycleState = Unprovisioned
616,919 UART: [state] DebugLocked = No
618,452 UART: [state] WD Timer not started. Device not locked for debugging
622,343 UART: [kat] SHA2-256
812,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,028 UART: [kat] ++
823,478 UART: [kat] sha1
834,367 UART: [kat] SHA2-256
837,371 UART: [kat] SHA2-384
843,292 UART: [kat] SHA2-512-ACC
845,877 UART: [kat] ECC-384
3,288,663 UART: [kat] HMAC-384Kdf
3,301,549 UART: [kat] LMS
3,833,412 UART: [kat] --
3,839,413 UART: [cold-reset] ++
3,841,419 UART: [fht] FHT @ 0x50003400
3,853,830 UART: [idev] ++
3,854,538 UART: [idev] CDI.KEYID = 6
3,855,450 UART: [idev] SUBJECT.KEYID = 7
3,856,695 UART: [idev] UDS.KEYID = 0
3,857,623 ready_for_fw is high
3,857,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,089 UART: [idev] Erasing UDS.KEYID = 0
6,340,166 UART: [idev] Sha1 KeyId Algorithm
6,364,262 UART: [idev] --
6,368,960 UART: [ldev] ++
6,369,642 UART: [ldev] CDI.KEYID = 6
6,370,558 UART: [ldev] SUBJECT.KEYID = 5
6,371,717 UART: [ldev] AUTHORITY.KEYID = 7
6,372,951 UART: [ldev] FE.KEYID = 1
6,384,320 UART: [ldev] Erasing FE.KEYID = 1
8,859,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,183 UART: [ldev] --
10,651,378 UART: [fwproc] Wait for Commands...
10,653,044 UART: [fwproc] Recv command 0x46574c44
10,655,321 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,836,386 >>> mbox cmd response: success
14,840,667 UART: [afmc] ++
14,841,381 UART: [afmc] CDI.KEYID = 6
14,842,577 UART: [afmc] SUBJECT.KEYID = 7
14,844,018 UART: [afmc] AUTHORITY.KEYID = 5
17,347,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,812 UART: [afmc] --
19,144,756 UART: [cold-reset] --
19,147,876 UART: [state] Locking Datavault
19,154,216 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,428 UART: [state] Locking ICCM
19,158,800 UART: [exit] Launching FMC @ 0x40000130
19,167,479 UART:
19,167,717 UART: Running Caliptra FMC ...
19,168,819 UART:
19,168,981 UART: [state] CFI Enabled
19,176,866 UART: [fht] FMC Alias Private Key: 7
20,932,939 UART: [art] Extend RT PCRs Done
20,934,168 UART: [art] Lock RT PCRs Done
20,936,305 UART: [art] Populate DV Done
20,941,659 UART: [fht] FMC Alias Private Key: 7
20,943,234 UART: [art] Derive CDI
20,943,977 UART: [art] Store in in slot 0x4
20,986,478 UART: [art] Derive Key Pair
20,987,489 UART: [art] Store priv key in slot 0x5
23,414,478 UART: [art] Derive Key Pair - Done
23,427,454 UART: [art] Signing Cert with AUTHO
23,428,783 UART: RITY.KEYID = 7
25,134,257 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,770 UART: [art] PUB.X = 54A2793319082D901B81731721C8F8BD40E778FBB9BB6FAA3CEB7EBEF69EB4542570A3E2D1A5922B4B30E3A6571EBF95
25,143,051 UART: [art] PUB.Y = E210070BB8DB4F39A8186F4D6630BD3E41EBFE83B65F0FABF0B549F7FE7DFEF057980F015E3D15A88F2859B7A71A43C7
25,150,371 UART: [art] SIG.R = 9DF431D0BC602387FDD7F6881DC902DA4555D1C37C8DC11FDBADA4DFCA1CB47709709F281DFC285BAC8C21B3725B5A75
25,157,738 UART: [art] SIG.S = 4D227C1F171706C395D7564E6567B77BA01149F3D8CA75A0047BD9F5A955C5A6BBF624A413A3A87337C7766C64AEEF37
26,136,604 UART: Caliptra RT
26,137,293 UART: [state] CFI Enabled
26,254,951 UART: [rt] RT listening for mailbox commands...
26,256,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,287,560 UART: [rt]cmd =0x44504543, len=96
30,570,168 >>> mbox cmd response data (6236 bytes)
30,599,312 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,630,095 UART: [rt]cmd =0x53574545, len=84
30,633,737 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,610 writing to cptra_bootfsm_go
3,757,391 ready_for_fw is high
3,758,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,961,662 >>> mbox cmd response: success
19,212,113 UART:
19,212,504 UART: Running Caliptra FMC ...
19,213,704 UART:
19,213,879 UART: [state] CFI Enabled
19,221,556 UART: [fht] FMC Alias Private Key: 7
20,977,775 UART: [art] Extend RT PCRs Done
20,979,009 UART: [art] Lock RT PCRs Done
20,980,833 UART: [art] Populate DV Done
20,986,199 UART: [fht] FMC Alias Private Key: 7
20,987,702 UART: [art] Derive CDI
20,988,475 UART: [art] Store in in slot 0x4
21,030,856 UART: [art] Derive Key Pair
21,031,862 UART: [art] Store priv key in slot 0x5
23,458,963 UART: [art] Derive Key Pair - Done
23,471,699 UART: [art] Signing Cert with AUTHO
23,473,003 UART: RITY.KEYID = 7
25,178,441 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,952 UART: [art] PUB.X = 72E0D60AD16B3957097B2335AA80C6DC2B867A971F0A4EE45B942DE28F247D40E25E4C9FE23B2C9DC00540FC793C7611
25,187,199 UART: [art] PUB.Y = 794EA7AE7574962722242B0416A8707B8F758962E11274E2EE9D0F7DA7566CFEFFE65E8FA7DBB9CF578E7F111E23F36C
25,194,484 UART: [art] SIG.R = E20D89DA3FB6CFE457CB5777A0820541BDDE6D2073650CAD9775638ED1C7BB85C05653FBB4853D873E6B403CEC66DC51
25,201,915 UART: [art] SIG.S = 8891EBCFFB2DDAB8C6A5B9EC22B7C9E2690A64B52E8A21ED61EF8296F6F2595B009B60B80D583CF8B4AF6A9C53F2361B
26,180,967 UART: Caliptra RT
26,181,674 UART: [state] CFI Enabled
26,298,871 UART: [rt] RT listening for mailbox commands...
26,300,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,379 UART: [rt]cmd =0x44504543, len=96
30,614,310 >>> mbox cmd response data (6236 bytes)
30,643,804 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,674,251 UART: [rt]cmd =0x53574545, len=84
30,677,975 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,805 UART: [cold-reset] ++
1,477,343 UART: [fht] Storing FHT @ 0x50003400
1,480,190 UART: [idev] ++
1,480,358 UART: [idev] CDI.KEYID = 6
1,480,718 UART: [idev] SUBJECT.KEYID = 7
1,481,142 UART: [idev] UDS.KEYID = 0
1,481,487 ready_for_fw is high
1,481,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,202 UART: [idev] Erasing UDS.KEYID = 0
1,505,814 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,552 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,522,041 UART: [ldev] Erasing FE.KEYID = 1
1,547,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,246 UART: [ldev] --
1,587,683 UART: [fwproc] Waiting for Commands...
1,588,318 UART: [fwproc] Received command 0x46574c44
1,589,109 UART: [fwproc] Received Image of size 114084 bytes
2,883,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,020 >>> mbox cmd response: success
3,076,248 UART: [afmc] ++
3,076,416 UART: [afmc] CDI.KEYID = 6
3,076,778 UART: [afmc] SUBJECT.KEYID = 7
3,077,203 UART: [afmc] AUTHORITY.KEYID = 5
3,111,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,014 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,407 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,097 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,220 UART: [afmc] --
3,155,334 UART: [cold-reset] --
3,156,022 UART: [state] Locking Datavault
3,157,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,121 UART: [state] Locking ICCM
3,158,733 UART: [exit] Launching FMC @ 0x40000130
3,164,062 UART:
3,164,078 UART: Running Caliptra FMC ...
3,164,486 UART:
3,164,540 UART: [state] CFI Enabled
3,175,183 UART: [fht] FMC Alias Private Key: 7
3,283,400 UART: [art] Extend RT PCRs Done
3,283,828 UART: [art] Lock RT PCRs Done
3,285,702 UART: [art] Populate DV Done
3,294,055 UART: [fht] FMC Alias Private Key: 7
3,295,061 UART: [art] Derive CDI
3,295,341 UART: [art] Store in in slot 0x4
3,380,952 UART: [art] Derive Key Pair
3,381,312 UART: [art] Store priv key in slot 0x5
3,394,170 UART: [art] Derive Key Pair - Done
3,408,605 UART: [art] Signing Cert with AUTHO
3,409,085 UART: RITY.KEYID = 7
3,424,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,494 UART: [art] PUB.X = DF8006C015B649E970DD5628A8D917748E9A45CE36664C305E51C090CFE6BC39C62C694456C813F4A5D9809CE9EECE4B
3,432,267 UART: [art] PUB.Y = E919CDEA63553E6C222ACE1E02CD9638841170B8A5A693BA904908F3FCFAC5F2AF1DFD0F3E99ACF71FE2ADE1D5A47B47
3,439,232 UART: [art] SIG.R = AC691F260B251EC817E4657DC058ED850FBF0518CF1BD6C0F924C6CFDB18F327A9868509539793B5152B9B97220EC6A4
3,445,991 UART: [art] SIG.S = 3AF26EE101646FD548AE199131B6B05ADADAC9C62BAE3A68A048FFA8377F790EFF43AD4B059551EC39CEC602E4ADF27D
3,469,908 UART: Caliptra RT
3,470,161 UART: [state] CFI Enabled
3,578,738 UART: [rt] RT listening for mailbox commands...
3,579,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,734 UART: [rt]cmd =0x44504543, len=96
3,788,702 >>> mbox cmd response data (6236 bytes)
3,788,703 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,528 UART: [rt]cmd =0x53574545, len=84
3,821,781 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 ready_for_fw is high
1,362,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,552 >>> mbox cmd response: success
2,986,134 UART:
2,986,150 UART: Running Caliptra FMC ...
2,986,558 UART:
2,986,612 UART: [state] CFI Enabled
2,997,115 UART: [fht] FMC Alias Private Key: 7
3,105,164 UART: [art] Extend RT PCRs Done
3,105,592 UART: [art] Lock RT PCRs Done
3,106,894 UART: [art] Populate DV Done
3,115,295 UART: [fht] FMC Alias Private Key: 7
3,116,289 UART: [art] Derive CDI
3,116,569 UART: [art] Store in in slot 0x4
3,202,170 UART: [art] Derive Key Pair
3,202,530 UART: [art] Store priv key in slot 0x5
3,216,112 UART: [art] Derive Key Pair - Done
3,231,082 UART: [art] Signing Cert with AUTHO
3,231,562 UART: RITY.KEYID = 7
3,247,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,893 UART: [art] PUB.X = BAC21827DAFB389B2E6CB74A1EC8EB98B24B1464771588272F8D7133AE2692FB434A844C522CB0A4845E4EBA2C913AD8
3,254,673 UART: [art] PUB.Y = 01DE815D404DC72557CA20A4274E26122A86B155016678F337BE77C257F2CA00FECCE832B00ECCFC0E9E0646E2542CA1
3,261,592 UART: [art] SIG.R = 28FB35667F3CF0C0889272F0CF34A35BC9E90652B683DD7601B42ADB02DA0AAD58B13E52AB30292D139F66CB275318DC
3,268,358 UART: [art] SIG.S = F63D16D88377728551E68FB33EF026227812179585086256EEE9B765549E6CA7DF8A8AFE31BB8D7202CA1FDB8D334771
3,292,007 UART: Caliptra RT
3,292,260 UART: [state] CFI Enabled
3,401,051 UART: [rt] RT listening for mailbox commands...
3,401,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,207 UART: [rt]cmd =0x44504543, len=96
3,611,247 >>> mbox cmd response data (6236 bytes)
3,611,248 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,127 UART: [rt]cmd =0x53574545, len=84
3,644,558 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,666 UART: [kat] SHA2-256
882,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,712 UART: [kat] ++
886,864 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,815 UART: [kat] SHA2-512-ACC
897,716 UART: [kat] ECC-384
903,537 UART: [kat] HMAC-384Kdf
908,089 UART: [kat] LMS
1,476,285 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,646 UART: [fht] Storing FHT @ 0x50003400
1,480,379 UART: [idev] ++
1,480,547 UART: [idev] CDI.KEYID = 6
1,480,907 UART: [idev] SUBJECT.KEYID = 7
1,481,331 UART: [idev] UDS.KEYID = 0
1,481,676 ready_for_fw is high
1,481,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,209 UART: [idev] Erasing UDS.KEYID = 0
1,506,147 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,681 UART: [idev] --
1,515,914 UART: [ldev] ++
1,516,082 UART: [ldev] CDI.KEYID = 6
1,516,445 UART: [ldev] SUBJECT.KEYID = 5
1,516,871 UART: [ldev] AUTHORITY.KEYID = 7
1,517,334 UART: [ldev] FE.KEYID = 1
1,522,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,725 UART: [ldev] --
1,587,066 UART: [fwproc] Waiting for Commands...
1,587,855 UART: [fwproc] Received command 0x46574c44
1,588,646 UART: [fwproc] Received Image of size 114084 bytes
2,884,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,241 >>> mbox cmd response: success
3,078,261 UART: [afmc] ++
3,078,429 UART: [afmc] CDI.KEYID = 6
3,078,791 UART: [afmc] SUBJECT.KEYID = 7
3,079,216 UART: [afmc] AUTHORITY.KEYID = 5
3,114,277 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,385 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,778 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,468 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,301 UART: [afmc] --
3,157,415 UART: [cold-reset] --
3,158,395 UART: [state] Locking Datavault
3,159,628 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,232 UART: [state] Locking ICCM
3,160,818 UART: [exit] Launching FMC @ 0x40000130
3,166,147 UART:
3,166,163 UART: Running Caliptra FMC ...
3,166,571 UART:
3,166,714 UART: [state] CFI Enabled
3,177,671 UART: [fht] FMC Alias Private Key: 7
3,285,412 UART: [art] Extend RT PCRs Done
3,285,840 UART: [art] Lock RT PCRs Done
3,287,468 UART: [art] Populate DV Done
3,295,861 UART: [fht] FMC Alias Private Key: 7
3,296,909 UART: [art] Derive CDI
3,297,189 UART: [art] Store in in slot 0x4
3,382,798 UART: [art] Derive Key Pair
3,383,158 UART: [art] Store priv key in slot 0x5
3,396,254 UART: [art] Derive Key Pair - Done
3,411,240 UART: [art] Signing Cert with AUTHO
3,411,720 UART: RITY.KEYID = 7
3,426,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,755 UART: [art] PUB.X = 10F11EF071518D840F617F9845F5F7CDF446767A2908093D7878F4B4A742F80A5CABBBDC11330F835EEE5A32AB101FEB
3,434,518 UART: [art] PUB.Y = E28A589065E6EF219744AADCCC53A975B58882525830DEF74D15161FE9461B2F6A89B20B7F5071311D819475B147AAF8
3,441,463 UART: [art] SIG.R = 2B351962E987DBFBA024B086EB5960C661BF8FAE67C13C0E7306533C9BC49F6EEE412740F47DE9999F1E166D06013128
3,448,223 UART: [art] SIG.S = F4C28787A24528D49FD05C90B0BCFF2EBEFF71C7A68EBC980E0FF744A950C2A72028948FD5C2588DDC4ECA459D732FAC
3,471,816 UART: Caliptra RT
3,472,161 UART: [state] CFI Enabled
3,579,870 UART: [rt] RT listening for mailbox commands...
3,580,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,108 UART: [rt]cmd =0x44504543, len=96
3,792,137 >>> mbox cmd response data (6236 bytes)
3,792,138 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,967 UART: [rt]cmd =0x53574545, len=84
3,825,002 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,609 >>> mbox cmd response: success
2,985,255 UART:
2,985,271 UART: Running Caliptra FMC ...
2,985,679 UART:
2,985,822 UART: [state] CFI Enabled
2,996,371 UART: [fht] FMC Alias Private Key: 7
3,104,374 UART: [art] Extend RT PCRs Done
3,104,802 UART: [art] Lock RT PCRs Done
3,106,218 UART: [art] Populate DV Done
3,114,385 UART: [fht] FMC Alias Private Key: 7
3,115,439 UART: [art] Derive CDI
3,115,719 UART: [art] Store in in slot 0x4
3,201,586 UART: [art] Derive Key Pair
3,201,946 UART: [art] Store priv key in slot 0x5
3,215,102 UART: [art] Derive Key Pair - Done
3,229,973 UART: [art] Signing Cert with AUTHO
3,230,453 UART: RITY.KEYID = 7
3,245,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,680 UART: [art] PUB.X = 77FEFA08FB634C8920C87ED0A71CD4EAB285F5E22B0B4CBDFD13B568B3FB6DFB84A1DAA700B8B1F5A423F9C57BD7DBB4
3,253,454 UART: [art] PUB.Y = F72CA5D7A121A25F7EC6072B53929B97155DEF671D21EF3D156DEA3FF9F38110BD4D1A51B3D20705CC1EC903A371101C
3,260,402 UART: [art] SIG.R = 6475A270DFA8FFB28BA1B5E07F208C6ED25C31848CD5BFE0EE2EE6E3B931AAF79E2155052A4BFAAAAC76F11B8D2BE2C5
3,267,197 UART: [art] SIG.S = B3B6651885293E5763B61665C40ACEB11A98A417037D4B026761EBB31E2BBF8BBA803FF61571E67ED3AEE99747363591
3,290,775 UART: Caliptra RT
3,291,120 UART: [state] CFI Enabled
3,398,897 UART: [rt] RT listening for mailbox commands...
3,399,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,991 UART: [rt]cmd =0x44504543, len=96
3,610,788 >>> mbox cmd response data (6236 bytes)
3,610,789 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,722 UART: [rt]cmd =0x53574545, len=84
3,643,993 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,807 UART: [kat] SHA2-256
903,747 UART: [kat] SHA2-384
906,520 UART: [kat] SHA2-512-ACC
908,421 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
922,912 UART: [kat] LMS
1,171,240 UART: [kat] --
1,171,955 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 ready_for_fw is high
1,176,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,033 UART: [idev] Sha1 KeyId Algorithm
1,208,555 UART: [idev] --
1,209,511 UART: [ldev] ++
1,209,679 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,468 UART: [ldev] AUTHORITY.KEYID = 7
1,210,931 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,282,074 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,007 >>> mbox cmd response: success
2,772,041 UART: [afmc] ++
2,772,209 UART: [afmc] CDI.KEYID = 6
2,772,571 UART: [afmc] SUBJECT.KEYID = 7
2,772,996 UART: [afmc] AUTHORITY.KEYID = 5
2,808,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,146 UART: [afmc] --
2,851,058 UART: [cold-reset] --
2,851,874 UART: [state] Locking Datavault
2,853,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,741 UART: [state] Locking ICCM
2,854,401 UART: [exit] Launching FMC @ 0x40000130
2,859,730 UART:
2,859,746 UART: Running Caliptra FMC ...
2,860,154 UART:
2,860,208 UART: [state] CFI Enabled
2,870,799 UART: [fht] FMC Alias Private Key: 7
2,978,516 UART: [art] Extend RT PCRs Done
2,978,944 UART: [art] Lock RT PCRs Done
2,980,312 UART: [art] Populate DV Done
2,988,465 UART: [fht] FMC Alias Private Key: 7
2,989,541 UART: [art] Derive CDI
2,989,821 UART: [art] Store in in slot 0x4
3,075,274 UART: [art] Derive Key Pair
3,075,634 UART: [art] Store priv key in slot 0x5
3,088,784 UART: [art] Derive Key Pair - Done
3,103,460 UART: [art] Signing Cert with AUTHO
3,103,940 UART: RITY.KEYID = 7
3,119,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,815 UART: [art] PUB.X = C6D1252E5D823E1CA082114C370249B93C55EC79D07AFFA3D481267493C084EDF9D1EFA809150E6D567870761CC8AB10
3,126,578 UART: [art] PUB.Y = BEF84B171F78721692430F31D5084B46AA2D69A29FD4931E0C9490AF3A854F8A50B981A76326C85937A8B7DA06DCCDB6
3,133,520 UART: [art] SIG.R = 7FF1902931659E00FC6401CE32A07C1B93C8E538266E3ECB1854C3E1CAC21C9D054FF7A576B0B7B69E2928A6542598B0
3,140,264 UART: [art] SIG.S = FC3A9C70EE63FFA46F1557D4DA16E2FA834E9E87E25279C02C5BE62F417CAF69E7F82BFED9C47D0CD3EA317601357838
3,163,795 UART: Caliptra RT
3,164,048 UART: [state] CFI Enabled
3,271,307 UART: [rt] RT listening for mailbox commands...
3,271,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,525 UART: [rt]cmd =0x44504543, len=96
3,482,575 >>> mbox cmd response data (6236 bytes)
3,482,576 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,549 UART: [rt]cmd =0x53574545, len=84
3,515,932 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,235 ready_for_fw is high
1,061,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,232 >>> mbox cmd response: success
2,686,008 UART:
2,686,024 UART: Running Caliptra FMC ...
2,686,432 UART:
2,686,486 UART: [state] CFI Enabled
2,697,235 UART: [fht] FMC Alias Private Key: 7
2,805,138 UART: [art] Extend RT PCRs Done
2,805,566 UART: [art] Lock RT PCRs Done
2,806,946 UART: [art] Populate DV Done
2,815,347 UART: [fht] FMC Alias Private Key: 7
2,816,321 UART: [art] Derive CDI
2,816,601 UART: [art] Store in in slot 0x4
2,902,348 UART: [art] Derive Key Pair
2,902,708 UART: [art] Store priv key in slot 0x5
2,915,444 UART: [art] Derive Key Pair - Done
2,930,508 UART: [art] Signing Cert with AUTHO
2,930,988 UART: RITY.KEYID = 7
2,946,090 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,855 UART: [art] PUB.X = B96A9F8FBDD1941015BB935B01C678D12303991FFE33FA2CFB8D6173B5079F7BB102413D09C5B661BBD16FFAA039E8B3
2,953,622 UART: [art] PUB.Y = 968E6DC487B5FC7F3E4DDBA2857584FBBF5C5376D4455C70834285B10C223FE390CDE95B362B07953F794C70B0D02EB8
2,960,572 UART: [art] SIG.R = 12063E103397BDB5DDA72B0CA371C085A262D6B8C9FDADAF1EBA5D69482EA6DB99B45BD02435286D951CB44761FF33A3
2,967,350 UART: [art] SIG.S = 5899529D0104B1220514F2773383CB86D6CCD1ACE29654F3CCE628C0756B44F81953A18ACDCE48940ABBA864FBDE772A
2,990,883 UART: Caliptra RT
2,991,136 UART: [state] CFI Enabled
3,098,287 UART: [rt] RT listening for mailbox commands...
3,098,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,243 UART: [rt]cmd =0x44504543, len=96
3,308,989 >>> mbox cmd response data (6236 bytes)
3,308,990 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,991 UART: [rt]cmd =0x53574545, len=84
3,342,168 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,743 UART: [kat] HMAC-384Kdf
923,401 UART: [kat] LMS
1,171,729 UART: [kat] --
1,172,502 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,753 UART: [idev] ++
1,175,921 UART: [idev] CDI.KEYID = 6
1,176,281 UART: [idev] SUBJECT.KEYID = 7
1,176,705 UART: [idev] UDS.KEYID = 0
1,177,050 ready_for_fw is high
1,177,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,861 UART: [idev] Erasing UDS.KEYID = 0
1,202,250 UART: [idev] Sha1 KeyId Algorithm
1,210,902 UART: [idev] --
1,211,880 UART: [ldev] ++
1,212,048 UART: [ldev] CDI.KEYID = 6
1,212,411 UART: [ldev] SUBJECT.KEYID = 5
1,212,837 UART: [ldev] AUTHORITY.KEYID = 7
1,213,300 UART: [ldev] FE.KEYID = 1
1,218,674 UART: [ldev] Erasing FE.KEYID = 1
1,245,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,200 UART: [ldev] --
1,285,591 UART: [fwproc] Wait for Commands...
1,286,327 UART: [fwproc] Recv command 0x46574c44
1,287,055 UART: [fwproc] Recv'd Img size: 114084 bytes
2,582,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,774,354 >>> mbox cmd response: success
2,775,466 UART: [afmc] ++
2,775,634 UART: [afmc] CDI.KEYID = 6
2,775,996 UART: [afmc] SUBJECT.KEYID = 7
2,776,421 UART: [afmc] AUTHORITY.KEYID = 5
2,812,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,583 UART: [afmc] --
2,855,529 UART: [cold-reset] --
2,856,391 UART: [state] Locking Datavault
2,857,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,238 UART: [state] Locking ICCM
2,858,750 UART: [exit] Launching FMC @ 0x40000130
2,864,079 UART:
2,864,095 UART: Running Caliptra FMC ...
2,864,503 UART:
2,864,646 UART: [state] CFI Enabled
2,874,907 UART: [fht] FMC Alias Private Key: 7
2,983,156 UART: [art] Extend RT PCRs Done
2,983,584 UART: [art] Lock RT PCRs Done
2,985,102 UART: [art] Populate DV Done
2,993,421 UART: [fht] FMC Alias Private Key: 7
2,994,387 UART: [art] Derive CDI
2,994,667 UART: [art] Store in in slot 0x4
3,080,430 UART: [art] Derive Key Pair
3,080,790 UART: [art] Store priv key in slot 0x5
3,094,394 UART: [art] Derive Key Pair - Done
3,109,257 UART: [art] Signing Cert with AUTHO
3,109,737 UART: RITY.KEYID = 7
3,124,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,374 UART: [art] PUB.X = 79694BD40A7B8DB7416557CC6F92E9B2E3EBA483F91B4A6DEBE10A9AA8C3690239D9867C753F5C42E06843230419330D
3,132,131 UART: [art] PUB.Y = 197084E333DF66FCB311F21531CC7A781BEA9BA46436705223B0FDC3891F502F6DCA31CC3818A461F2708C16B7D8A429
3,139,083 UART: [art] SIG.R = AF48A39170E58373F143BB444E910283ABE91E6AD0241E23A775A02C6D8283383873C6B461975F570A91CBA6DA3FF93E
3,145,847 UART: [art] SIG.S = 9E3C5D84EDEF304CD295D33E7B4827672FB40F95EFF4EDA425C4B477FAA1C2131694218AC6505B934759782DAB937B55
3,169,469 UART: Caliptra RT
3,169,814 UART: [state] CFI Enabled
3,278,394 UART: [rt] RT listening for mailbox commands...
3,279,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,626 UART: [rt]cmd =0x44504543, len=96
3,489,963 >>> mbox cmd response data (6236 bytes)
3,489,964 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,595 UART: [rt]cmd =0x53574545, len=84
3,522,712 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,274 ready_for_fw is high
1,060,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,363 >>> mbox cmd response: success
2,685,153 UART:
2,685,169 UART: Running Caliptra FMC ...
2,685,577 UART:
2,685,720 UART: [state] CFI Enabled
2,696,397 UART: [fht] FMC Alias Private Key: 7
2,804,286 UART: [art] Extend RT PCRs Done
2,804,714 UART: [art] Lock RT PCRs Done
2,806,074 UART: [art] Populate DV Done
2,814,165 UART: [fht] FMC Alias Private Key: 7
2,815,187 UART: [art] Derive CDI
2,815,467 UART: [art] Store in in slot 0x4
2,900,736 UART: [art] Derive Key Pair
2,901,096 UART: [art] Store priv key in slot 0x5
2,914,292 UART: [art] Derive Key Pair - Done
2,929,120 UART: [art] Signing Cert with AUTHO
2,929,600 UART: RITY.KEYID = 7
2,944,820 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,585 UART: [art] PUB.X = EF1F55F8F088E843B69B0C533D6DE8183DD630E3C5932FF9F3FBACEAB2998C43858C293ED90970112024CE51AD3D292A
2,952,359 UART: [art] PUB.Y = 7C2C449B5A8E338CA769F120505D50C2B809AE1BDB4FA267B1C1FDE54BAB1A69FC307044345DA84A435E0387FEEF878A
2,959,317 UART: [art] SIG.R = 96ACAFBABCCD3FA92672C8F5E5EAD5AC38A9880A202D4A28ECA8ABE71F51567097081566D316E11A898902D728E8B2C0
2,966,092 UART: [art] SIG.S = 32A9B54CF9814278D4A3A339F60DF912E454A81AA40568329327FCF92C6BF037A6633DEB06BFDD675ED92F16281EC54F
2,989,554 UART: Caliptra RT
2,989,899 UART: [state] CFI Enabled
3,098,240 UART: [rt] RT listening for mailbox commands...
3,098,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,220 UART: [rt]cmd =0x44504543, len=96
3,310,103 >>> mbox cmd response data (6236 bytes)
3,310,104 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,901 UART: [rt]cmd =0x53574545, len=84
3,343,112 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,145 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,174,247 ready_for_fw is high
1,174,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,518 UART: [ldev] ++
1,208,686 UART: [ldev] CDI.KEYID = 6
1,209,050 UART: [ldev] SUBJECT.KEYID = 5
1,209,477 UART: [ldev] AUTHORITY.KEYID = 7
1,209,940 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,756 UART: [fwproc] Wait for Commands...
1,281,401 UART: [fwproc] Recv command 0x46574c44
1,282,134 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,905 >>> mbox cmd response: success
2,770,152 UART: [afmc] ++
2,770,320 UART: [afmc] CDI.KEYID = 6
2,770,683 UART: [afmc] SUBJECT.KEYID = 7
2,771,109 UART: [afmc] AUTHORITY.KEYID = 5
2,806,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,639 UART: [afmc] --
2,850,547 UART: [cold-reset] --
2,851,529 UART: [state] Locking Datavault
2,852,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,230 UART: [state] Locking ICCM
2,853,780 UART: [exit] Launching FMC @ 0x40000130
2,859,109 UART:
2,859,125 UART: Running Caliptra FMC ...
2,859,533 UART:
2,859,587 UART: [state] CFI Enabled
2,870,184 UART: [fht] FMC Alias Private Key: 7
2,977,699 UART: [art] Extend RT PCRs Done
2,978,127 UART: [art] Lock RT PCRs Done
2,979,369 UART: [art] Populate DV Done
2,987,588 UART: [fht] FMC Alias Private Key: 7
2,988,754 UART: [art] Derive CDI
2,989,034 UART: [art] Store in in slot 0x4
3,074,691 UART: [art] Derive Key Pair
3,075,051 UART: [art] Store priv key in slot 0x5
3,088,783 UART: [art] Derive Key Pair - Done
3,103,818 UART: [art] Signing Cert with AUTHO
3,104,298 UART: RITY.KEYID = 7
3,119,442 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,207 UART: [art] PUB.X = 9B331447B67F99BA899B83E1D536941B7031158A15F7DB9D3D3FA119AE1B0476039E000739578D5EB32C6DD92E709C64
3,126,942 UART: [art] PUB.Y = C44C9A7F6EAC00801A95A2D95979274A925002F73B45C21E625A3C0D77792238AA9DB634EF100EF91CA81D7290E8D48E
3,133,863 UART: [art] SIG.R = CE33E75162372A6E35DDD55011676F85845B41FEDC2633315F064B402DCEF674CBAB647D94780F8E5154D570D0AB7A67
3,140,629 UART: [art] SIG.S = 0ACA15DF9D49C6A6B53258271C57B9EBA8DC39D2D8785CFBEFD9B52CD5CB9BD06E4A167DD675F46BE1DF8DE075DB55F4
3,164,757 UART: Caliptra RT
3,165,010 UART: [state] CFI Enabled
3,273,493 UART: [rt] RT listening for mailbox commands...
3,274,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,543 UART: [rt]cmd =0x44504543, len=96
3,484,701 >>> mbox cmd response data (6236 bytes)
3,484,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,679 UART: [rt]cmd =0x53574545, len=84
3,517,788 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,952 ready_for_fw is high
1,055,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,139 >>> mbox cmd response: success
2,681,349 UART:
2,681,365 UART: Running Caliptra FMC ...
2,681,773 UART:
2,681,827 UART: [state] CFI Enabled
2,692,370 UART: [fht] FMC Alias Private Key: 7
2,800,405 UART: [art] Extend RT PCRs Done
2,800,833 UART: [art] Lock RT PCRs Done
2,802,715 UART: [art] Populate DV Done
2,811,328 UART: [fht] FMC Alias Private Key: 7
2,812,308 UART: [art] Derive CDI
2,812,588 UART: [art] Store in in slot 0x4
2,898,411 UART: [art] Derive Key Pair
2,898,771 UART: [art] Store priv key in slot 0x5
2,911,791 UART: [art] Derive Key Pair - Done
2,926,264 UART: [art] Signing Cert with AUTHO
2,926,744 UART: RITY.KEYID = 7
2,941,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,677 UART: [art] PUB.X = 9CD96EE3584D53F7F8ADA34652F563CE3AB38CD5882CC06B966B7CA88D68A79B840E209500602E5B7DA25F622E46D79D
2,949,430 UART: [art] PUB.Y = 6442A6989089DBBC04E6371B461F0E59D4449933DD32653E316C033F2EA98A993819D0D66A6092BC4AEBDA82C26A3E4D
2,956,373 UART: [art] SIG.R = 215204DA00C918842353C498330770C8CF99FAFA6605281793A0BEB6B9F93AB239C2A152A8372435B7B1B2506F26310C
2,963,101 UART: [art] SIG.S = 675D5B54DD8DF008102B59F9DA2ED4F354160C4665B7947ACC8ECEA9D0C20D303EBACC5AFD824EDF514A27905A836A7B
2,986,809 UART: Caliptra RT
2,987,062 UART: [state] CFI Enabled
3,095,511 UART: [rt] RT listening for mailbox commands...
3,096,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,741 UART: [rt]cmd =0x44504543, len=96
3,306,788 >>> mbox cmd response data (6236 bytes)
3,306,789 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,750 UART: [rt]cmd =0x53574545, len=84
3,339,843 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,445 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,544 UART: [idev] ++
1,173,712 UART: [idev] CDI.KEYID = 6
1,174,073 UART: [idev] SUBJECT.KEYID = 7
1,174,498 UART: [idev] UDS.KEYID = 0
1,174,844 ready_for_fw is high
1,174,844 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,198,782 UART: [idev] Sha1 KeyId Algorithm
1,207,628 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,283 UART: [ldev] Erasing FE.KEYID = 1
1,241,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,407 UART: [ldev] --
1,280,763 UART: [fwproc] Wait for Commands...
1,281,380 UART: [fwproc] Recv command 0x46574c44
1,282,113 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,488 >>> mbox cmd response: success
2,770,547 UART: [afmc] ++
2,770,715 UART: [afmc] CDI.KEYID = 6
2,771,078 UART: [afmc] SUBJECT.KEYID = 7
2,771,504 UART: [afmc] AUTHORITY.KEYID = 5
2,806,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,026 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,638 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,357 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,268 UART: [afmc] --
2,850,366 UART: [cold-reset] --
2,851,338 UART: [state] Locking Datavault
2,852,543 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,147 UART: [state] Locking ICCM
2,853,685 UART: [exit] Launching FMC @ 0x40000130
2,859,014 UART:
2,859,030 UART: Running Caliptra FMC ...
2,859,438 UART:
2,859,581 UART: [state] CFI Enabled
2,870,340 UART: [fht] FMC Alias Private Key: 7
2,978,347 UART: [art] Extend RT PCRs Done
2,978,775 UART: [art] Lock RT PCRs Done
2,980,623 UART: [art] Populate DV Done
2,989,050 UART: [fht] FMC Alias Private Key: 7
2,990,132 UART: [art] Derive CDI
2,990,412 UART: [art] Store in in slot 0x4
3,075,835 UART: [art] Derive Key Pair
3,076,195 UART: [art] Store priv key in slot 0x5
3,089,437 UART: [art] Derive Key Pair - Done
3,104,108 UART: [art] Signing Cert with AUTHO
3,104,588 UART: RITY.KEYID = 7
3,119,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,909 UART: [art] PUB.X = 14FC5C7113A86F4272805C9B5FB48EF7984DED83F52DED8F4F0C263FE8FB33767D41DF83C465BBBA5D2341748E6F52EE
3,126,690 UART: [art] PUB.Y = 41AC6CABF93BD10EB54CA9BA23D77D6EEEC3F72DACC55EA2DAFD1B6C80A699739C34758CCD11E9D3DF42A15AAC400B7E
3,133,668 UART: [art] SIG.R = FDC8A9873572F292A998B444C3AB8F8572BA3EAA9EE3208B29C3293F955C2C1435277048D2126207B87F5D94EC90E1B0
3,140,435 UART: [art] SIG.S = 6685006982EA7569E388F817E3C73F551363294FD1CF3577EF2E938A53484F2AC0CD9D220E52CF9A0140DB35C50804CF
3,164,190 UART: Caliptra RT
3,164,535 UART: [state] CFI Enabled
3,272,870 UART: [rt] RT listening for mailbox commands...
3,273,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,814 UART: [rt]cmd =0x44504543, len=96
3,484,491 >>> mbox cmd response data (6236 bytes)
3,484,492 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,285 UART: [rt]cmd =0x53574545, len=84
3,517,362 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 ready_for_fw is high
1,055,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,022 >>> mbox cmd response: success
2,682,214 UART:
2,682,230 UART: Running Caliptra FMC ...
2,682,638 UART:
2,682,781 UART: [state] CFI Enabled
2,693,450 UART: [fht] FMC Alias Private Key: 7
2,801,115 UART: [art] Extend RT PCRs Done
2,801,543 UART: [art] Lock RT PCRs Done
2,803,075 UART: [art] Populate DV Done
2,811,282 UART: [fht] FMC Alias Private Key: 7
2,812,306 UART: [art] Derive CDI
2,812,586 UART: [art] Store in in slot 0x4
2,898,291 UART: [art] Derive Key Pair
2,898,651 UART: [art] Store priv key in slot 0x5
2,912,001 UART: [art] Derive Key Pair - Done
2,926,823 UART: [art] Signing Cert with AUTHO
2,927,303 UART: RITY.KEYID = 7
2,942,507 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,272 UART: [art] PUB.X = 260296B24661EB76C1E92B250F305A638FD4282C23017732739E327925015B135EF7573B7A3084367DB3FEBE6CB12B3F
2,950,022 UART: [art] PUB.Y = 802F85234D646F8B9ACCE11D31E78EE8A7FC2D3C05FC0760C3B24DE654539789DFF9578F59F1904D09A0FA757D1FD45C
2,956,973 UART: [art] SIG.R = 7BDD756AACA15A705338A12F6355452A986C50B1BBF2A14B5F83FAE841F5AEE92BDE00358899368401D108878F841711
2,963,715 UART: [art] SIG.S = C6522716CD72C9AD8806A5D1C26D73EA6744EA9ABC47B91D3EBA2EA1AA2CBC033C670648F1D369EAE02F4F32E37CF706
2,987,564 UART: Caliptra RT
2,987,909 UART: [state] CFI Enabled
3,096,532 UART: [rt] RT listening for mailbox commands...
3,097,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,482 UART: [rt]cmd =0x44504543, len=96
3,307,805 >>> mbox cmd response data (6236 bytes)
3,307,806 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,841 UART: [rt]cmd =0x53574545, len=84
3,341,140 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,187 UART:
192,623 UART: Running Caliptra ROM ...
193,755 UART:
193,906 UART: [state] CFI Enabled
268,992 UART: [state] LifecycleState = Unprovisioned
270,923 UART: [state] DebugLocked = No
273,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,961 UART: [kat] SHA2-256
448,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,203 UART: [kat] ++
459,683 UART: [kat] sha1
469,635 UART: [kat] SHA2-256
472,288 UART: [kat] SHA2-384
476,857 UART: [kat] SHA2-512-ACC
479,227 UART: [kat] ECC-384
2,768,035 UART: [kat] HMAC-384Kdf
2,780,848 UART: [kat] LMS
3,971,113 UART: [kat] --
3,974,145 UART: [cold-reset] ++
3,975,794 UART: [fht] Storing FHT @ 0x50003400
3,986,775 UART: [idev] ++
3,987,340 UART: [idev] CDI.KEYID = 6
3,988,324 UART: [idev] SUBJECT.KEYID = 7
3,989,566 UART: [idev] UDS.KEYID = 0
3,990,619 ready_for_fw is high
3,990,838 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,025 UART: [idev] Erasing UDS.KEYID = 0
7,327,296 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,243 UART: [idev] --
7,350,566 UART: [ldev] ++
7,351,192 UART: [ldev] CDI.KEYID = 6
7,352,101 UART: [ldev] SUBJECT.KEYID = 5
7,353,313 UART: [ldev] AUTHORITY.KEYID = 7
7,354,617 UART: [ldev] FE.KEYID = 1
7,401,847 UART: [ldev] Erasing FE.KEYID = 1
10,735,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,152 UART: [ldev] --
13,096,714 UART: [fwproc] Waiting for Commands...
13,099,943 UART: [fwproc] Received command 0x46574c44
13,102,128 UART: [fwproc] Received Image of size 113760 bytes
17,147,841 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,606,038 >>> mbox cmd response: success
17,609,903 UART: [afmc] ++
17,610,519 UART: [afmc] CDI.KEYID = 6
17,611,408 UART: [afmc] SUBJECT.KEYID = 7
17,612,624 UART: [afmc] AUTHORITY.KEYID = 5
20,969,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,268,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,270,336 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,284,706 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,299,547 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,314,043 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,335,296 UART: [afmc] --
23,338,352 UART: [cold-reset] --
23,341,943 UART: [state] Locking Datavault
23,345,243 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,994 UART: [state] Locking ICCM
23,348,929 UART: [exit] Launching FMC @ 0x40000130
23,357,331 UART:
23,357,587 UART: Running Caliptra FMC ...
23,358,689 UART:
23,358,847 UART: [state] CFI Enabled
23,428,002 UART: [fht] FMC Alias Private Key: 7
25,765,828 UART: [art] Extend RT PCRs Done
25,767,053 UART: [art] Lock RT PCRs Done
25,768,734 UART: [art] Populate DV Done
25,774,147 UART: [fht] FMC Alias Private Key: 7
25,775,789 UART: [art] Derive CDI
25,776,600 UART: [art] Store in in slot 0x4
25,836,510 UART: [art] Derive Key Pair
25,837,549 UART: [art] Store priv key in slot 0x5
29,129,944 UART: [art] Derive Key Pair - Done
29,143,318 UART: [art] Signing Cert with AUTHO
29,144,799 UART: RITY.KEYID = 7
31,431,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,433,003 UART: [art] PUB.X = AAC603504277B121C7A78D28966DB8B2C284F68EC5EB3E559314C1CED57E4A6AB9A7FCC95C5FFCEFFDA4733446E1C25A
31,440,256 UART: [art] PUB.Y = 9A349BE872C1AD544C78A5448F4F4D09629D6607330FF2619880005D7AC3A024DE5844F1FDFC922EFE599A6004576423
31,447,489 UART: [art] SIG.R = DEB09E7DB7B1286DD4187DEDECDB17949FCE0FCEC716DC4E6FE4710546B6756E7BC165505C4DF1EE44E95AAB0C1236EA
31,454,934 UART: [art] SIG.S = F4E48A8A5DAAEAA701B6BBB868B4F4FB7CA2439189592DF8207EDD4D255BF04875905DC218646EE581BF34C642629DDE
32,760,310 UART: Caliptra RT
32,761,009 UART: [state] CFI Enabled
32,921,217 UART: [rt] RT listening for mailbox commands...
32,923,090 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,954,546 UART: [rt]cmd =0x53574545, len=84
32,958,150 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,808,393 ready_for_fw is high
3,808,761 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,880,233 >>> mbox cmd response: success
23,567,980 UART:
23,568,370 UART: Running Caliptra FMC ...
23,569,571 UART:
23,569,739 UART: [state] CFI Enabled
23,636,084 UART: [fht] FMC Alias Private Key: 7
25,973,554 UART: [art] Extend RT PCRs Done
25,974,775 UART: [art] Lock RT PCRs Done
25,976,462 UART: [art] Populate DV Done
25,981,946 UART: [fht] FMC Alias Private Key: 7
25,983,606 UART: [art] Derive CDI
25,984,423 UART: [art] Store in in slot 0x4
26,044,443 UART: [art] Derive Key Pair
26,045,490 UART: [art] Store priv key in slot 0x5
29,338,596 UART: [art] Derive Key Pair - Done
29,351,645 UART: [art] Signing Cert with AUTHO
29,352,942 UART: RITY.KEYID = 7
31,640,142 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,651 UART: [art] PUB.X = C5A8AA62E5E0A9C7D56243391E6A9CD0FDD571BB569A268345EBA2755531331A161726A915532559FADDC8D1962730BD
31,648,862 UART: [art] PUB.Y = 74497B4446A8CBE6EBF86D14B4D41D6FAC3BA3ACBE5A3659E9DAC408FA3CAB34CCC3F8ED38423401FC4E9CD0A985160C
31,656,161 UART: [art] SIG.R = 638DC2685DDA4C4A4C7C34FBBFEB1B9C95C8F7AE489048D985D32F0A860AE285873397AD16CC4B3853C2B167F9632CE8
31,663,575 UART: [art] SIG.S = 6922D3EFE243D48D35C89C86170AF4E05BD35FD9CE89B6D79BAD34BE2BA3DEFCCE62C7CCE16409084CEBEE12989B5F2B
32,969,033 UART: Caliptra RT
32,969,743 UART: [state] CFI Enabled
33,129,021 UART: [rt] RT listening for mailbox commands...
33,130,927 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,162,020 UART: [rt]cmd =0x53574545, len=84
33,165,740 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
192,879 UART:
193,243 UART: Running Caliptra ROM ...
194,388 UART:
604,276 UART: [state] CFI Enabled
621,311 UART: [state] LifecycleState = Unprovisioned
623,185 UART: [state] DebugLocked = No
625,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,341 UART: [kat] SHA2-256
801,036 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,566 UART: [kat] ++
812,039 UART: [kat] sha1
822,845 UART: [kat] SHA2-256
825,491 UART: [kat] SHA2-384
830,269 UART: [kat] SHA2-512-ACC
832,634 UART: [kat] ECC-384
3,116,794 UART: [kat] HMAC-384Kdf
3,129,027 UART: [kat] LMS
4,319,149 UART: [kat] --
4,324,738 UART: [cold-reset] ++
4,325,901 UART: [fht] Storing FHT @ 0x50003400
4,336,818 UART: [idev] ++
4,337,379 UART: [idev] CDI.KEYID = 6
4,338,403 UART: [idev] SUBJECT.KEYID = 7
4,339,569 UART: [idev] UDS.KEYID = 0
4,340,640 ready_for_fw is high
4,340,870 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,272 UART: [idev] Erasing UDS.KEYID = 0
7,626,429 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,579 UART: [idev] --
7,650,588 UART: [ldev] ++
7,651,220 UART: [ldev] CDI.KEYID = 6
7,652,142 UART: [ldev] SUBJECT.KEYID = 5
7,653,348 UART: [ldev] AUTHORITY.KEYID = 7
7,654,629 UART: [ldev] FE.KEYID = 1
7,666,864 UART: [ldev] Erasing FE.KEYID = 1
10,956,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,730 UART: [ldev] --
13,314,013 UART: [fwproc] Waiting for Commands...
13,316,810 UART: [fwproc] Received command 0x46574c44
13,319,027 UART: [fwproc] Received Image of size 113760 bytes
17,368,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,088 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,832,708 >>> mbox cmd response: success
17,837,040 UART: [afmc] ++
17,837,647 UART: [afmc] CDI.KEYID = 6
17,838,562 UART: [afmc] SUBJECT.KEYID = 7
17,839,801 UART: [afmc] AUTHORITY.KEYID = 5
21,155,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,682 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,050 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,879 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,374 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,030 UART: [afmc] --
23,522,339 UART: [cold-reset] --
23,524,742 UART: [state] Locking Datavault
23,530,850 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,549 UART: [state] Locking ICCM
23,535,341 UART: [exit] Launching FMC @ 0x40000130
23,543,690 UART:
23,543,964 UART: Running Caliptra FMC ...
23,545,011 UART:
23,545,180 UART: [state] CFI Enabled
23,552,959 UART: [fht] FMC Alias Private Key: 7
25,883,548 UART: [art] Extend RT PCRs Done
25,884,767 UART: [art] Lock RT PCRs Done
25,886,630 UART: [art] Populate DV Done
25,891,877 UART: [fht] FMC Alias Private Key: 7
25,893,408 UART: [art] Derive CDI
25,894,142 UART: [art] Store in in slot 0x4
25,937,111 UART: [art] Derive Key Pair
25,938,110 UART: [art] Store priv key in slot 0x5
29,180,161 UART: [art] Derive Key Pair - Done
29,192,941 UART: [art] Signing Cert with AUTHO
29,194,239 UART: RITY.KEYID = 7
31,473,094 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,605 UART: [art] PUB.X = 595F37C1B62C039085E05E89DB0937E98BAE89DEDC14EB4E8988D69932121633C2B0CF8C9E3B6AFD875CEAC846B20AA4
31,481,868 UART: [art] PUB.Y = 32B7F6A515284EF44F33518BFFE628239AB35ADA7B9ED718A37DB10FB607354C2594C4EB1DA98E117D9EA12E9DDBF8C6
31,489,064 UART: [art] SIG.R = 785052E8135106653A4C05F87FC356BEC8ADF05FA31E9F4883208D4961B3CD5FBDBCD85651113970830E50DB5BE1B1E3
31,496,435 UART: [art] SIG.S = DC75F1520E4AC93C8B661A5FFA09B94BAB910705FCB6B893E180E83CD1CA19E52873FDDD2DE813AB3AF5314E1BD4848C
32,802,003 UART: Caliptra RT
32,802,715 UART: [state] CFI Enabled
32,920,054 UART: [rt] RT listening for mailbox commands...
32,921,950 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,952,314 UART: [rt]cmd =0x53574545, len=84
32,955,640 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,563 writing to cptra_bootfsm_go
4,123,765 ready_for_fw is high
4,124,345 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,060,710 >>> mbox cmd response: success
23,709,191 UART:
23,709,635 UART: Running Caliptra FMC ...
23,710,739 UART:
23,710,883 UART: [state] CFI Enabled
23,718,961 UART: [fht] FMC Alias Private Key: 7
26,049,023 UART: [art] Extend RT PCRs Done
26,050,263 UART: [art] Lock RT PCRs Done
26,051,839 UART: [art] Populate DV Done
26,057,007 UART: [fht] FMC Alias Private Key: 7
26,058,561 UART: [art] Derive CDI
26,059,324 UART: [art] Store in in slot 0x4
26,101,809 UART: [art] Derive Key Pair
26,102,808 UART: [art] Store priv key in slot 0x5
29,345,386 UART: [art] Derive Key Pair - Done
29,358,065 UART: [art] Signing Cert with AUTHO
29,359,385 UART: RITY.KEYID = 7
31,638,766 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,280 UART: [art] PUB.X = 45EF87E5843FA35AD60EF9642C7C034C2333EE33869CC98A98BC1379F651FF5776F2A4A173CFFAE79B368369164B0021
31,647,523 UART: [art] PUB.Y = D7EA778850149A44F4DD243A17F1FC3AE2F8B667831F43D015E33DD87EEBF508E554BC1EE54D078FAC8DB0F7C3807021
31,654,798 UART: [art] SIG.R = 0B79A037A1123CA0AACD8642750D431004CF3197CB7EC9A6FA4DF66E1C9E39892CD257E9B55EC167AFE3D52B4632B3C5
31,662,192 UART: [art] SIG.S = 35F00798EC085C35C8C2ABE7A0F03A4577B1AE055034DFA2FEC4BD4F7E0C507434C8C4A1AD58386EC2AB5338FC4F948C
32,966,772 UART: Caliptra RT
32,967,482 UART: [state] CFI Enabled
33,085,024 UART: [rt] RT listening for mailbox commands...
33,086,961 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,117,387 UART: [rt]cmd =0x53574545, len=84
33,121,043 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,483 UART:
192,858 UART: Running Caliptra ROM ...
193,973 UART:
194,111 UART: [state] CFI Enabled
266,018 UART: [state] LifecycleState = Unprovisioned
268,020 UART: [state] DebugLocked = No
269,847 UART: [state] WD Timer not started. Device not locked for debugging
273,106 UART: [kat] SHA2-256
452,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,806 UART: [kat] ++
464,337 UART: [kat] sha1
475,283 UART: [kat] SHA2-256
478,280 UART: [kat] SHA2-384
483,979 UART: [kat] SHA2-512-ACC
486,936 UART: [kat] ECC-384
2,951,186 UART: [kat] HMAC-384Kdf
2,972,243 UART: [kat] LMS
3,501,659 UART: [kat] --
3,505,657 UART: [cold-reset] ++
3,507,441 UART: [fht] FHT @ 0x50003400
3,518,481 UART: [idev] ++
3,519,036 UART: [idev] CDI.KEYID = 6
3,519,985 UART: [idev] SUBJECT.KEYID = 7
3,521,101 UART: [idev] UDS.KEYID = 0
3,522,082 ready_for_fw is high
3,522,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,755 UART: [idev] Erasing UDS.KEYID = 0
6,025,348 UART: [idev] Sha1 KeyId Algorithm
6,048,105 UART: [idev] --
6,051,777 UART: [ldev] ++
6,052,361 UART: [ldev] CDI.KEYID = 6
6,053,246 UART: [ldev] SUBJECT.KEYID = 5
6,054,460 UART: [ldev] AUTHORITY.KEYID = 7
6,055,689 UART: [ldev] FE.KEYID = 1
6,099,639 UART: [ldev] Erasing FE.KEYID = 1
8,605,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,352 UART: [ldev] --
10,411,823 UART: [fwproc] Wait for Commands...
10,414,019 UART: [fwproc] Recv command 0x46574c44
10,416,108 UART: [fwproc] Recv'd Img size: 114084 bytes
13,812,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,271,065 >>> mbox cmd response: success
14,274,888 UART: [afmc] ++
14,275,484 UART: [afmc] CDI.KEYID = 6
14,276,391 UART: [afmc] SUBJECT.KEYID = 7
14,277,598 UART: [afmc] AUTHORITY.KEYID = 5
16,807,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,642 UART: [afmc] --
18,607,814 UART: [cold-reset] --
18,613,780 UART: [state] Locking Datavault
18,618,700 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,364 UART: [state] Locking ICCM
18,621,544 UART: [exit] Launching FMC @ 0x40000130
18,629,998 UART:
18,630,229 UART: Running Caliptra FMC ...
18,631,325 UART:
18,631,486 UART: [state] CFI Enabled
18,689,308 UART: [fht] FMC Alias Private Key: 7
20,453,961 UART: [art] Extend RT PCRs Done
20,455,184 UART: [art] Lock RT PCRs Done
20,456,997 UART: [art] Populate DV Done
20,462,348 UART: [fht] FMC Alias Private Key: 7
20,463,931 UART: [art] Derive CDI
20,464,674 UART: [art] Store in in slot 0x4
20,522,903 UART: [art] Derive Key Pair
20,523,948 UART: [art] Store priv key in slot 0x5
22,986,711 UART: [art] Derive Key Pair - Done
22,999,783 UART: [art] Signing Cert with AUTHO
23,001,086 UART: RITY.KEYID = 7
24,712,757 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,256 UART: [art] PUB.X = 1D55DB19B6C3C5EFC3625FEF2464C6454C12010F3007BEEBB12B75353246FB70B5684E41D8F7B569FCD9707AF83A9E6F
24,721,575 UART: [art] PUB.Y = 39EBCF6DC40F9460F73758C405C4278C852AAD9EF01F603E137A6B9EDAB6D975810928F7D667DEE80D6E6380BF90C79B
24,728,855 UART: [art] SIG.R = 05AED8C02A8C3F77A6A6EA98F35C356D8A9CA74AABFAAC4BCB333E00F19CBFEB0EDD31A6288FF83D0D3BDD3DBB02C65D
24,736,220 UART: [art] SIG.S = 6B50C937B338D13A670A30B9815A44A8992A8C7394113932A0904D9634AD62B601546F5F7220F1420C2E44255522EA7D
25,715,323 UART: Caliptra RT
25,716,033 UART: [state] CFI Enabled
25,881,873 UART: [rt] RT listening for mailbox commands...
25,883,763 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,914,878 UART: [rt]cmd =0x53574545, len=84
25,918,435 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,354,765 ready_for_fw is high
3,355,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,030,435 >>> mbox cmd response: success
18,316,135 UART:
18,316,511 UART: Running Caliptra FMC ...
18,317,648 UART:
18,317,805 UART: [state] CFI Enabled
18,381,354 UART: [fht] FMC Alias Private Key: 7
20,146,047 UART: [art] Extend RT PCRs Done
20,147,259 UART: [art] Lock RT PCRs Done
20,148,829 UART: [art] Populate DV Done
20,154,297 UART: [fht] FMC Alias Private Key: 7
20,155,833 UART: [art] Derive CDI
20,156,644 UART: [art] Store in in slot 0x4
20,213,526 UART: [art] Derive Key Pair
20,214,567 UART: [art] Store priv key in slot 0x5
22,677,576 UART: [art] Derive Key Pair - Done
22,690,523 UART: [art] Signing Cert with AUTHO
22,691,828 UART: RITY.KEYID = 7
24,403,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,255 UART: [art] PUB.X = E6F9E64558DB02FF6431552FA55D118418BB72BF736AD6516157F7354A82E8B29917B46D9CF2E9E9D72455F5426C23D5
24,412,527 UART: [art] PUB.Y = 64CAF09AD7F87AB26739EBFF581AA6F6F0FFFD7CD71EBD2FF9125D0EE8ACADABA115B3A4EC73491CA8511A780C795CB3
24,419,815 UART: [art] SIG.R = 66CEE236F26F4309C27DE46E884FB1CEFE410AD8F996F2B21B28491CFCEF9C7D7D5BA18A869408E9623542FBD5C4A98B
24,427,203 UART: [art] SIG.S = C515C4F73895C0BE400F97D982E13FDAF73BFEC2AD93B7C3A0BAFF4C988AA7EC6B70A8DF481DABC686A02A790BEA8AD2
25,406,485 UART: Caliptra RT
25,407,185 UART: [state] CFI Enabled
25,572,692 UART: [rt] RT listening for mailbox commands...
25,574,585 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,605,866 UART: [rt]cmd =0x53574545, len=84
25,609,475 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
193,088 UART:
193,467 UART: Running Caliptra ROM ...
194,598 UART:
604,022 UART: [state] CFI Enabled
619,809 UART: [state] LifecycleState = Unprovisioned
621,691 UART: [state] DebugLocked = No
622,928 UART: [state] WD Timer not started. Device not locked for debugging
626,821 UART: [kat] SHA2-256
805,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,512 UART: [kat] ++
817,977 UART: [kat] sha1
829,275 UART: [kat] SHA2-256
832,302 UART: [kat] SHA2-384
838,441 UART: [kat] SHA2-512-ACC
841,384 UART: [kat] ECC-384
3,283,018 UART: [kat] HMAC-384Kdf
3,295,683 UART: [kat] LMS
3,825,120 UART: [kat] --
3,828,331 UART: [cold-reset] ++
3,830,124 UART: [fht] FHT @ 0x50003400
3,841,389 UART: [idev] ++
3,841,956 UART: [idev] CDI.KEYID = 6
3,842,865 UART: [idev] SUBJECT.KEYID = 7
3,844,035 UART: [idev] UDS.KEYID = 0
3,845,087 ready_for_fw is high
3,845,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,027 UART: [idev] Erasing UDS.KEYID = 0
6,319,345 UART: [idev] Sha1 KeyId Algorithm
6,340,608 UART: [idev] --
6,344,683 UART: [ldev] ++
6,345,271 UART: [ldev] CDI.KEYID = 6
6,346,189 UART: [ldev] SUBJECT.KEYID = 5
6,347,401 UART: [ldev] AUTHORITY.KEYID = 7
6,348,635 UART: [ldev] FE.KEYID = 1
6,359,985 UART: [ldev] Erasing FE.KEYID = 1
8,830,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,679 UART: [ldev] --
10,624,214 UART: [fwproc] Wait for Commands...
10,626,713 UART: [fwproc] Recv command 0x46574c44
10,628,810 UART: [fwproc] Recv'd Img size: 114084 bytes
14,037,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,494,513 >>> mbox cmd response: success
14,497,980 UART: [afmc] ++
14,498,580 UART: [afmc] CDI.KEYID = 6
14,499,467 UART: [afmc] SUBJECT.KEYID = 7
14,500,690 UART: [afmc] AUTHORITY.KEYID = 5
17,002,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,255 UART: [afmc] --
18,794,852 UART: [cold-reset] --
18,798,496 UART: [state] Locking Datavault
18,801,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,406 UART: [state] Locking ICCM
18,806,161 UART: [exit] Launching FMC @ 0x40000130
18,814,601 UART:
18,814,846 UART: Running Caliptra FMC ...
18,815,950 UART:
18,816,113 UART: [state] CFI Enabled
18,824,054 UART: [fht] FMC Alias Private Key: 7
20,580,856 UART: [art] Extend RT PCRs Done
20,582,089 UART: [art] Lock RT PCRs Done
20,583,722 UART: [art] Populate DV Done
20,589,093 UART: [fht] FMC Alias Private Key: 7
20,590,642 UART: [art] Derive CDI
20,591,481 UART: [art] Store in in slot 0x4
20,634,077 UART: [art] Derive Key Pair
20,635,082 UART: [art] Store priv key in slot 0x5
23,061,581 UART: [art] Derive Key Pair - Done
23,074,597 UART: [art] Signing Cert with AUTHO
23,075,906 UART: RITY.KEYID = 7
24,781,066 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,576 UART: [art] PUB.X = 769F3F09A10E82ADDFDE962400B7C3F7E28247E7050BE451C27BAC3F791562EA5E8C57C303BC8184FA3C1EF3F4ECC9AD
24,789,796 UART: [art] PUB.Y = 187EB8BE6EBB9F817C133D673963F34F8966AD983E4A139377B58F1ACFF504CEE5FD62E762E36C6128CD950797230369
24,797,052 UART: [art] SIG.R = 9C2DD0F56C920F7EDC24CBD8E7BF86ACAC39E92FC395565E9B2E4FB250CD96E13E8BAD7346D60BA34601C308A515C7CA
24,804,472 UART: [art] SIG.S = 14A0167700E542C6DC2A7BDA6BE822A99A55B8FEA3D2506513B7653B71F897F799EE172A86A7DA71D09265092B13A282
25,783,495 UART: Caliptra RT
25,784,196 UART: [state] CFI Enabled
25,900,611 UART: [rt] RT listening for mailbox commands...
25,902,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,933,014 UART: [rt]cmd =0x53574545, len=84
25,936,292 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,756 writing to cptra_bootfsm_go
3,699,386 ready_for_fw is high
3,699,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,277,611 >>> mbox cmd response: success
18,524,192 UART:
18,524,607 UART: Running Caliptra FMC ...
18,525,703 UART:
18,525,870 UART: [state] CFI Enabled
18,533,713 UART: [fht] FMC Alias Private Key: 7
20,290,596 UART: [art] Extend RT PCRs Done
20,291,850 UART: [art] Lock RT PCRs Done
20,293,543 UART: [art] Populate DV Done
20,298,858 UART: [fht] FMC Alias Private Key: 7
20,300,512 UART: [art] Derive CDI
20,301,250 UART: [art] Store in in slot 0x4
20,344,172 UART: [art] Derive Key Pair
20,345,173 UART: [art] Store priv key in slot 0x5
22,772,050 UART: [art] Derive Key Pair - Done
22,784,571 UART: [art] Signing Cert with AUTHO
22,785,886 UART: RITY.KEYID = 7
24,491,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,981 UART: [art] PUB.X = 2392D21BBF242F0BB730A77F239F4852FF275D374421AC78C9A04BB9D45EE8DBA1B372066E902C77229A821A17BA1997
24,500,217 UART: [art] PUB.Y = B1B66B033E50E809E013D462B59CD83396B50A31D97C31BB74147340730E206DB8188546B73F6D4D4C8B47CB685C334F
24,507,441 UART: [art] SIG.R = 5F633386203C2258677A725FB81002215409611AEC26A22E98BA8681A8F4C33C9F30653E5767419117DAB32A83561770
24,514,811 UART: [art] SIG.S = 3580BD1A7A2591EA7329F442035D929DD32225C89FCE399C73BCEAA0A8D1AA4B707AEC47949A0DC0E61AE2005BC38049
25,493,943 UART: Caliptra RT
25,494,663 UART: [state] CFI Enabled
25,611,722 UART: [rt] RT listening for mailbox commands...
25,613,601 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,644,006 UART: [rt]cmd =0x53574545, len=84
25,647,847 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,536 UART:
192,918 UART: Running Caliptra ROM ...
194,025 UART:
194,170 UART: [state] CFI Enabled
263,787 UART: [state] LifecycleState = Unprovisioned
266,164 UART: [state] DebugLocked = No
268,045 UART: [state] WD Timer not started. Device not locked for debugging
271,909 UART: [kat] SHA2-256
461,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,493 UART: [kat] ++
472,942 UART: [kat] sha1
483,526 UART: [kat] SHA2-256
486,530 UART: [kat] SHA2-384
493,152 UART: [kat] SHA2-512-ACC
495,729 UART: [kat] ECC-384
2,948,327 UART: [kat] HMAC-384Kdf
2,973,573 UART: [kat] LMS
3,505,328 UART: [kat] --
3,509,531 UART: [cold-reset] ++
3,510,816 UART: [fht] FHT @ 0x50003400
3,523,638 UART: [idev] ++
3,524,341 UART: [idev] CDI.KEYID = 6
3,525,325 UART: [idev] SUBJECT.KEYID = 7
3,526,519 UART: [idev] UDS.KEYID = 0
3,527,423 ready_for_fw is high
3,527,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,482 UART: [idev] Erasing UDS.KEYID = 0
6,029,872 UART: [idev] Sha1 KeyId Algorithm
6,051,417 UART: [idev] --
6,055,126 UART: [ldev] ++
6,055,814 UART: [ldev] CDI.KEYID = 6
6,056,736 UART: [ldev] SUBJECT.KEYID = 5
6,057,896 UART: [ldev] AUTHORITY.KEYID = 7
6,059,126 UART: [ldev] FE.KEYID = 1
6,100,715 UART: [ldev] Erasing FE.KEYID = 1
8,608,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,492 UART: [ldev] --
10,415,567 UART: [fwproc] Wait for Commands...
10,418,739 UART: [fwproc] Recv command 0x46574c44
10,421,044 UART: [fwproc] Recv'd Img size: 114084 bytes
13,866,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,608,650 >>> mbox cmd response: success
14,612,954 UART: [afmc] ++
14,613,663 UART: [afmc] CDI.KEYID = 6
14,614,854 UART: [afmc] SUBJECT.KEYID = 7
14,616,296 UART: [afmc] AUTHORITY.KEYID = 5
17,149,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,677 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,608 UART: [afmc] --
18,950,606 UART: [cold-reset] --
18,954,201 UART: [state] Locking Datavault
18,959,355 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,521 UART: [state] Locking ICCM
18,963,785 UART: [exit] Launching FMC @ 0x40000130
18,972,473 UART:
18,972,705 UART: Running Caliptra FMC ...
18,973,803 UART:
18,973,967 UART: [state] CFI Enabled
19,031,455 UART: [fht] FMC Alias Private Key: 7
20,796,001 UART: [art] Extend RT PCRs Done
20,797,237 UART: [art] Lock RT PCRs Done
20,798,563 UART: [art] Populate DV Done
20,804,079 UART: [fht] FMC Alias Private Key: 7
20,805,677 UART: [art] Derive CDI
20,806,489 UART: [art] Store in in slot 0x4
20,864,671 UART: [art] Derive Key Pair
20,865,709 UART: [art] Store priv key in slot 0x5
23,328,436 UART: [art] Derive Key Pair - Done
23,341,321 UART: [art] Signing Cert with AUTHO
23,342,612 UART: RITY.KEYID = 7
25,054,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,303 UART: [art] PUB.X = 49DF4A8BAE46FEE6865FECE1BFFD35FBE08B5E878861DDDEF30A432FF73CE07B49C429C96E736F1188850D4E3764B386
25,063,588 UART: [art] PUB.Y = 4AA952400EEA8061658B07C646308C5DA0A6CE7074E7D3F5758C749726C68A4CD06E5A1C62CED144F0A1CE972303A024
25,070,838 UART: [art] SIG.R = DAF59BAAD315CB7E42AEF22744A59134B296493449B4797A10364A8575F795A51F4CDE6E8FDDB86A52E3C85287E7C989
25,078,251 UART: [art] SIG.S = 4CD7140F1C678DD1DAF6B9414796A3CB33F0E3E5189DAE43F49B4212B523633E210D1BFC2C4BF4A4EB1A2E3030BB4F78
26,057,217 UART: Caliptra RT
26,057,912 UART: [state] CFI Enabled
26,222,953 UART: [rt] RT listening for mailbox commands...
26,224,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,255,736 UART: [rt]cmd =0x53574545, len=84
26,259,234 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,439,163 ready_for_fw is high
3,439,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,723,638 >>> mbox cmd response: success
19,003,830 UART:
19,004,313 UART: Running Caliptra FMC ...
19,005,429 UART:
19,005,587 UART: [state] CFI Enabled
19,071,497 UART: [fht] FMC Alias Private Key: 7
20,835,095 UART: [art] Extend RT PCRs Done
20,836,335 UART: [art] Lock RT PCRs Done
20,837,934 UART: [art] Populate DV Done
20,843,259 UART: [fht] FMC Alias Private Key: 7
20,844,905 UART: [art] Derive CDI
20,845,641 UART: [art] Store in in slot 0x4
20,904,624 UART: [art] Derive Key Pair
20,905,660 UART: [art] Store priv key in slot 0x5
23,368,494 UART: [art] Derive Key Pair - Done
23,381,714 UART: [art] Signing Cert with AUTHO
23,383,015 UART: RITY.KEYID = 7
25,094,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,069 UART: [art] PUB.X = 11CFAC6AA1C2AC41DB4E2597A4F6CC74ADB1074DA4CA7FAAEE52D4FCFE4AA262F964171FB639A06B31535076D7F57CBA
25,103,349 UART: [art] PUB.Y = EA02068DEF2565F5E9984F53578429BCAC2F6654049CF4EEAF60FD8572545F0B2249E1E26A04952BD6152701F5C31F05
25,110,584 UART: [art] SIG.R = 14CCBE0A6E09A2C69C59B83BE6C621EE56D41ABAF5F78BF777D347CEA69D561C4A2F0B32FC4C5F5357F111B1F307F4E1
25,118,023 UART: [art] SIG.S = 9688ACCC6CE22C9C9FA8C24FE557B025E7DEC024A02550FD873FE522B13F2EC3F74F71E7FB60C04A2B7A75CD7CCE9BF2
26,097,364 UART: Caliptra RT
26,098,080 UART: [state] CFI Enabled
26,263,753 UART: [rt] RT listening for mailbox commands...
26,265,643 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,296,793 UART: [rt]cmd =0x53574545, len=84
26,300,182 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,922 writing to cptra_bootfsm_go
193,058 UART:
193,480 UART: Running Caliptra ROM ...
194,694 UART:
604,341 UART: [state] CFI Enabled
619,093 UART: [state] LifecycleState = Unprovisioned
621,474 UART: [state] DebugLocked = No
623,852 UART: [state] WD Timer not started. Device not locked for debugging
628,236 UART: [kat] SHA2-256
818,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,926 UART: [kat] ++
829,450 UART: [kat] sha1
842,026 UART: [kat] SHA2-256
845,036 UART: [kat] SHA2-384
849,831 UART: [kat] SHA2-512-ACC
852,416 UART: [kat] ECC-384
3,296,201 UART: [kat] HMAC-384Kdf
3,308,318 UART: [kat] LMS
3,840,200 UART: [kat] --
3,843,130 UART: [cold-reset] ++
3,844,572 UART: [fht] FHT @ 0x50003400
3,857,262 UART: [idev] ++
3,857,971 UART: [idev] CDI.KEYID = 6
3,858,884 UART: [idev] SUBJECT.KEYID = 7
3,860,127 UART: [idev] UDS.KEYID = 0
3,861,205 ready_for_fw is high
3,861,415 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,764 UART: [idev] Erasing UDS.KEYID = 0
6,337,467 UART: [idev] Sha1 KeyId Algorithm
6,359,446 UART: [idev] --
6,364,058 UART: [ldev] ++
6,364,751 UART: [ldev] CDI.KEYID = 6
6,365,660 UART: [ldev] SUBJECT.KEYID = 5
6,366,819 UART: [ldev] AUTHORITY.KEYID = 7
6,368,068 UART: [ldev] FE.KEYID = 1
6,380,014 UART: [ldev] Erasing FE.KEYID = 1
8,856,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,869 UART: [ldev] --
10,648,113 UART: [fwproc] Wait for Commands...
10,650,531 UART: [fwproc] Recv command 0x46574c44
10,652,838 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,835,871 >>> mbox cmd response: success
14,839,375 UART: [afmc] ++
14,840,109 UART: [afmc] CDI.KEYID = 6
14,841,303 UART: [afmc] SUBJECT.KEYID = 7
14,842,803 UART: [afmc] AUTHORITY.KEYID = 5
17,345,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,769 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,633 UART: [afmc] --
19,141,830 UART: [cold-reset] --
19,145,591 UART: [state] Locking Datavault
19,149,543 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,761 UART: [state] Locking ICCM
19,153,920 UART: [exit] Launching FMC @ 0x40000130
19,162,603 UART:
19,162,859 UART: Running Caliptra FMC ...
19,163,964 UART:
19,164,124 UART: [state] CFI Enabled
19,172,282 UART: [fht] FMC Alias Private Key: 7
20,928,809 UART: [art] Extend RT PCRs Done
20,930,033 UART: [art] Lock RT PCRs Done
20,931,770 UART: [art] Populate DV Done
20,936,859 UART: [fht] FMC Alias Private Key: 7
20,938,464 UART: [art] Derive CDI
20,939,287 UART: [art] Store in in slot 0x4
20,982,094 UART: [art] Derive Key Pair
20,983,103 UART: [art] Store priv key in slot 0x5
23,409,420 UART: [art] Derive Key Pair - Done
23,422,362 UART: [art] Signing Cert with AUTHO
23,423,661 UART: RITY.KEYID = 7
25,129,070 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,586 UART: [art] PUB.X = E9B8213B406401749E5C7D921451133803C81000480968FBADF94354BB2FAE8F94F984322B4318686DC2CC1A5DAC5C29
25,137,806 UART: [art] PUB.Y = F6423A645A960609E1993904D4D62DFC4479FCEEB1ACDC7ED2B66D94C41E54FD618D7BC1112D88F2A5466E4626ADDF85
25,145,208 UART: [art] SIG.R = BFD42FDFEF04E3E304D2FF60164E6346B7E771AC504DB6DA134FA0CB1568907E8AEA76817FA3016975065FCBFEAE4193
25,152,543 UART: [art] SIG.S = 6086973A58D3F65CD7ABABDAFDAA6359186CF32A7C2FAB7B209496FECC8654CC4E649F7809DE17B8ADBD7C6F63978E83
26,131,755 UART: Caliptra RT
26,132,459 UART: [state] CFI Enabled
26,249,629 UART: [rt] RT listening for mailbox commands...
26,251,511 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,281,919 UART: [rt]cmd =0x53574545, len=84
26,285,218 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
3,756,751 ready_for_fw is high
3,757,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,947,466 >>> mbox cmd response: success
19,196,544 UART:
19,196,956 UART: Running Caliptra FMC ...
19,198,073 UART:
19,198,232 UART: [state] CFI Enabled
19,206,299 UART: [fht] FMC Alias Private Key: 7
20,962,728 UART: [art] Extend RT PCRs Done
20,963,954 UART: [art] Lock RT PCRs Done
20,965,881 UART: [art] Populate DV Done
20,971,136 UART: [fht] FMC Alias Private Key: 7
20,972,843 UART: [art] Derive CDI
20,973,585 UART: [art] Store in in slot 0x4
21,016,234 UART: [art] Derive Key Pair
21,017,241 UART: [art] Store priv key in slot 0x5
23,443,294 UART: [art] Derive Key Pair - Done
23,456,395 UART: [art] Signing Cert with AUTHO
23,457,701 UART: RITY.KEYID = 7
25,162,948 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,450 UART: [art] PUB.X = FEDA02035EA29DFEB795E359FD452A7D6DF175044CFF67696EEBCB4BCDBB2AA8E6A57A749FF7C334C2317ED2DA52CDCA
25,171,759 UART: [art] PUB.Y = 56C8772663816EDBC7D46A2410BE6DA415808096B34D9CA7509479487187F69A003EDAEE6D52E5B4A0517EA561E20B05
25,178,992 UART: [art] SIG.R = 9F80BFC96FFA6ED88A374D040CDA82DAEC3F4A47A51FE72A0EDAE901266C8A23A240E04AD1C933A9F1F008FF2E8BB313
25,186,416 UART: [art] SIG.S = 7AA61D8F5C0ABA3BD440F8132894C760FB82FD505B79EF5841BDDCDB347FE9FA16344F928E36508D7ECC912718960F76
26,165,893 UART: Caliptra RT
26,166,610 UART: [state] CFI Enabled
26,284,754 UART: [rt] RT listening for mailbox commands...
26,286,633 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,317,155 UART: [rt]cmd =0x53574545, len=84
26,320,842 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,649 UART: [kat] SHA2-256
881,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,695 UART: [kat] ++
885,847 UART: [kat] sha1
889,897 UART: [kat] SHA2-256
891,835 UART: [kat] SHA2-384
894,532 UART: [kat] SHA2-512-ACC
896,433 UART: [kat] ECC-384
902,180 UART: [kat] HMAC-384Kdf
906,932 UART: [kat] LMS
1,475,128 UART: [kat] --
1,475,855 UART: [cold-reset] ++
1,476,359 UART: [fht] Storing FHT @ 0x50003400
1,479,242 UART: [idev] ++
1,479,410 UART: [idev] CDI.KEYID = 6
1,479,770 UART: [idev] SUBJECT.KEYID = 7
1,480,194 UART: [idev] UDS.KEYID = 0
1,480,539 ready_for_fw is high
1,480,539 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,272 UART: [idev] --
1,514,345 UART: [ldev] ++
1,514,513 UART: [ldev] CDI.KEYID = 6
1,514,876 UART: [ldev] SUBJECT.KEYID = 5
1,515,302 UART: [ldev] AUTHORITY.KEYID = 7
1,515,765 UART: [ldev] FE.KEYID = 1
1,520,865 UART: [ldev] Erasing FE.KEYID = 1
1,545,938 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,453 UART: [fwproc] Waiting for Commands...
1,586,160 UART: [fwproc] Received command 0x46574c44
1,586,951 UART: [fwproc] Received Image of size 114084 bytes
2,883,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,965 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,796 >>> mbox cmd response: success
3,077,004 UART: [afmc] ++
3,077,172 UART: [afmc] CDI.KEYID = 6
3,077,534 UART: [afmc] SUBJECT.KEYID = 7
3,077,959 UART: [afmc] AUTHORITY.KEYID = 5
3,112,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,260 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,653 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,343 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,160 UART: [afmc] --
3,156,236 UART: [cold-reset] --
3,156,878 UART: [state] Locking Datavault
3,158,125 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,729 UART: [state] Locking ICCM
3,159,303 UART: [exit] Launching FMC @ 0x40000130
3,164,632 UART:
3,164,648 UART: Running Caliptra FMC ...
3,165,056 UART:
3,165,110 UART: [state] CFI Enabled
3,175,695 UART: [fht] FMC Alias Private Key: 7
3,283,874 UART: [art] Extend RT PCRs Done
3,284,302 UART: [art] Lock RT PCRs Done
3,285,596 UART: [art] Populate DV Done
3,294,063 UART: [fht] FMC Alias Private Key: 7
3,295,163 UART: [art] Derive CDI
3,295,443 UART: [art] Store in in slot 0x4
3,381,306 UART: [art] Derive Key Pair
3,381,666 UART: [art] Store priv key in slot 0x5
3,394,160 UART: [art] Derive Key Pair - Done
3,409,116 UART: [art] Signing Cert with AUTHO
3,409,596 UART: RITY.KEYID = 7
3,424,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,457 UART: [art] PUB.X = C18052572CABAAC5949556B4028817D5260E54DDD845B01C51F5CD1C7F84D04DD544EAB37737935636DB77C6E5E61DBA
3,432,227 UART: [art] PUB.Y = A35251718ACDCAD02E4555ECF151DB58E6AA052E4F6ED10CFB16541FA5995F0AFCCD74C0B09E767BFC5AA8EC07A297C3
3,439,189 UART: [art] SIG.R = B51998BC25C5536F3FEE84A868E08983E14A8666C057A0825B6CA0E88B2A7B23F34898847B7AB6ECADBB30D4AC07E314
3,445,964 UART: [art] SIG.S = 36F2F7F83043AC6C8127A16B18C0B410987A55DF1B332F1F86400D7152321593CFA92A73324FCC9FE4985BC0A4AAD25C
3,470,382 UART: Caliptra RT
3,470,635 UART: [state] CFI Enabled
3,579,466 UART: [rt] RT listening for mailbox commands...
3,580,136 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,456 UART: [rt]cmd =0x53574545, len=84
3,613,648 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,221 ready_for_fw is high
1,362,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,960 >>> mbox cmd response: success
2,983,726 UART:
2,983,742 UART: Running Caliptra FMC ...
2,984,150 UART:
2,984,204 UART: [state] CFI Enabled
2,994,781 UART: [fht] FMC Alias Private Key: 7
3,102,780 UART: [art] Extend RT PCRs Done
3,103,208 UART: [art] Lock RT PCRs Done
3,104,650 UART: [art] Populate DV Done
3,112,785 UART: [fht] FMC Alias Private Key: 7
3,113,801 UART: [art] Derive CDI
3,114,081 UART: [art] Store in in slot 0x4
3,200,028 UART: [art] Derive Key Pair
3,200,388 UART: [art] Store priv key in slot 0x5
3,213,526 UART: [art] Derive Key Pair - Done
3,228,397 UART: [art] Signing Cert with AUTHO
3,228,877 UART: RITY.KEYID = 7
3,244,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,010 UART: [art] PUB.X = 0A7857B5FCDBA1BD2341769DCFDF96BDD49449543B44F3EA11C3E43B174ECD1FA40FBA947B129A9893D66892B2C1318D
3,251,788 UART: [art] PUB.Y = 496D56B18B7BD5A591042F0589E78091EF0159241F948EFA7708142B92E3D6DF7BD2B2FF02F7EFFD3CD357B6A07438E7
3,258,729 UART: [art] SIG.R = FCCF24BD7BBFA1C65DF101C9F4D2296E0932A7EFD4F7BA5CB9C12B58D232C5EC8E3504D0268DED815018CDDB882FB929
3,265,514 UART: [art] SIG.S = 681C73DA47B819B7F43FFDFC520BED5D33664F05E7F521B7134DEB95E54C4F07341ACE410BFD05777DE1BE3A0497DEA4
3,289,287 UART: Caliptra RT
3,289,540 UART: [state] CFI Enabled
3,396,985 UART: [rt] RT listening for mailbox commands...
3,397,655 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,127 UART: [rt]cmd =0x53574545, len=84
3,431,559 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,446 UART: [kat] SHA2-256
882,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,492 UART: [kat] ++
886,644 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,697 UART: [kat] SHA2-512-ACC
897,598 UART: [kat] ECC-384
903,225 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,477,148 UART: [cold-reset] ++
1,477,598 UART: [fht] Storing FHT @ 0x50003400
1,480,323 UART: [idev] ++
1,480,491 UART: [idev] CDI.KEYID = 6
1,480,851 UART: [idev] SUBJECT.KEYID = 7
1,481,275 UART: [idev] UDS.KEYID = 0
1,481,620 ready_for_fw is high
1,481,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,395 UART: [idev] Erasing UDS.KEYID = 0
1,506,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,907 UART: [idev] --
1,515,920 UART: [ldev] ++
1,516,088 UART: [ldev] CDI.KEYID = 6
1,516,451 UART: [ldev] SUBJECT.KEYID = 5
1,516,877 UART: [ldev] AUTHORITY.KEYID = 7
1,517,340 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,547,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,597 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,871 UART: [fwproc] Received command 0x46574c44
1,588,662 UART: [fwproc] Received Image of size 114084 bytes
2,883,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,253 >>> mbox cmd response: success
3,077,333 UART: [afmc] ++
3,077,501 UART: [afmc] CDI.KEYID = 6
3,077,863 UART: [afmc] SUBJECT.KEYID = 7
3,078,288 UART: [afmc] AUTHORITY.KEYID = 5
3,113,685 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,204 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,894 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,717 UART: [afmc] --
3,156,603 UART: [cold-reset] --
3,157,283 UART: [state] Locking Datavault
3,158,352 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,956 UART: [state] Locking ICCM
3,159,582 UART: [exit] Launching FMC @ 0x40000130
3,164,911 UART:
3,164,927 UART: Running Caliptra FMC ...
3,165,335 UART:
3,165,478 UART: [state] CFI Enabled
3,176,423 UART: [fht] FMC Alias Private Key: 7
3,284,386 UART: [art] Extend RT PCRs Done
3,284,814 UART: [art] Lock RT PCRs Done
3,285,966 UART: [art] Populate DV Done
3,293,991 UART: [fht] FMC Alias Private Key: 7
3,295,009 UART: [art] Derive CDI
3,295,289 UART: [art] Store in in slot 0x4
3,380,962 UART: [art] Derive Key Pair
3,381,322 UART: [art] Store priv key in slot 0x5
3,395,156 UART: [art] Derive Key Pair - Done
3,409,897 UART: [art] Signing Cert with AUTHO
3,410,377 UART: RITY.KEYID = 7
3,425,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,714 UART: [art] PUB.X = 4287837ECEEBDF192783E39A0C9DFA24B1B0BD240F7374B23BFA85DCEB2FCB5ADB1F16308FE55DA228EAA1DD5A5CE446
3,433,506 UART: [art] PUB.Y = B4D0198968BD6736BA0AE59C4A2705FE03457567A4B7116E442CBFA243AE90A3C8B7990499AC8923DF54D9C91BFC215C
3,440,450 UART: [art] SIG.R = FFF1F4A072CCC8B5A4E3F0C9DA5B571390309873BF1DD1F451E37799EA8CF1AD3324F5205A04230BB6DD4FC39D7A970F
3,447,227 UART: [art] SIG.S = 16D5254FFEE32CB5D3FFE0E9823B1CB27E65762353A9DCF6B3FE4E13367F4AD742E07B36A5361E260CFD52DC0964A857
3,470,744 UART: Caliptra RT
3,471,089 UART: [state] CFI Enabled
3,578,264 UART: [rt] RT listening for mailbox commands...
3,578,934 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,318 UART: [rt]cmd =0x53574545, len=84
3,612,624 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 ready_for_fw is high
1,363,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,531 >>> mbox cmd response: success
2,988,107 UART:
2,988,123 UART: Running Caliptra FMC ...
2,988,531 UART:
2,988,674 UART: [state] CFI Enabled
2,999,197 UART: [fht] FMC Alias Private Key: 7
3,107,642 UART: [art] Extend RT PCRs Done
3,108,070 UART: [art] Lock RT PCRs Done
3,109,712 UART: [art] Populate DV Done
3,118,009 UART: [fht] FMC Alias Private Key: 7
3,118,939 UART: [art] Derive CDI
3,119,219 UART: [art] Store in in slot 0x4
3,204,848 UART: [art] Derive Key Pair
3,205,208 UART: [art] Store priv key in slot 0x5
3,218,788 UART: [art] Derive Key Pair - Done
3,233,531 UART: [art] Signing Cert with AUTHO
3,234,011 UART: RITY.KEYID = 7
3,249,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,816 UART: [art] PUB.X = 2CB67F25F2263B71EBD2387320E388D97B89EA375519359A1E171729F362E382C98334320D5FB6418292779C1AE960C7
3,256,571 UART: [art] PUB.Y = 6702AC1EFA15FC780ECDB659EA4FF54A1912165A0C1EF5502593F3B1FF2F73BB06D4E6E3AA85A4BB210F0FA14CC34517
3,263,521 UART: [art] SIG.R = 3C0063B5B06A336EF4DA9ACD34F0E08546A943FF032D4D611CD16869BC367980788B881F4565CE3A35291B2A47C9015F
3,270,263 UART: [art] SIG.S = 33167CBD26791D6463D65B24D0BFA92AA0009BD637D7E6055FEABA71C5B540FD475D94FBC72DBBDD606DE66B7D25FDA2
3,293,605 UART: Caliptra RT
3,293,950 UART: [state] CFI Enabled
3,402,256 UART: [rt] RT listening for mailbox commands...
3,402,926 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,310 UART: [rt]cmd =0x53574545, len=84
3,436,448 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,402 UART: [kat] HMAC-384Kdf
923,044 UART: [kat] LMS
1,171,372 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,435 UART: [fht] FHT @ 0x50003400
1,175,220 UART: [idev] ++
1,175,388 UART: [idev] CDI.KEYID = 6
1,175,748 UART: [idev] SUBJECT.KEYID = 7
1,176,172 UART: [idev] UDS.KEYID = 0
1,176,517 ready_for_fw is high
1,176,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,316 UART: [idev] Erasing UDS.KEYID = 0
1,200,881 UART: [idev] Sha1 KeyId Algorithm
1,209,439 UART: [idev] --
1,210,715 UART: [ldev] ++
1,210,883 UART: [ldev] CDI.KEYID = 6
1,211,246 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,687 UART: [ldev] Erasing FE.KEYID = 1
1,244,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,213 UART: [ldev] --
1,283,534 UART: [fwproc] Wait for Commands...
1,284,206 UART: [fwproc] Recv command 0x46574c44
1,284,934 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,655 >>> mbox cmd response: success
2,772,725 UART: [afmc] ++
2,772,893 UART: [afmc] CDI.KEYID = 6
2,773,255 UART: [afmc] SUBJECT.KEYID = 7
2,773,680 UART: [afmc] AUTHORITY.KEYID = 5
2,808,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,801 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,340 UART: [afmc] --
2,852,328 UART: [cold-reset] --
2,853,344 UART: [state] Locking Datavault
2,854,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,041 UART: [state] Locking ICCM
2,855,593 UART: [exit] Launching FMC @ 0x40000130
2,860,922 UART:
2,860,938 UART: Running Caliptra FMC ...
2,861,346 UART:
2,861,400 UART: [state] CFI Enabled
2,871,533 UART: [fht] FMC Alias Private Key: 7
2,979,384 UART: [art] Extend RT PCRs Done
2,979,812 UART: [art] Lock RT PCRs Done
2,981,472 UART: [art] Populate DV Done
2,989,939 UART: [fht] FMC Alias Private Key: 7
2,990,881 UART: [art] Derive CDI
2,991,161 UART: [art] Store in in slot 0x4
3,076,418 UART: [art] Derive Key Pair
3,076,778 UART: [art] Store priv key in slot 0x5
3,089,638 UART: [art] Derive Key Pair - Done
3,104,558 UART: [art] Signing Cert with AUTHO
3,105,038 UART: RITY.KEYID = 7
3,120,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,223 UART: [art] PUB.X = DD5ECD3C258B0DB545B513E89D3DE1331C55ACC18D3F5BA963B68CCC4E1D21F65A8502764FA8AA310C68A968287A1CBA
3,128,002 UART: [art] PUB.Y = 8661C57D2D5F8759BF049DDDC029D90909C57498FBDF135C968A1B79D948F6AA6A2C26EFAB88889EE05FE1C29D92AFB9
3,134,957 UART: [art] SIG.R = 7C65EBB01926D18399E5B082234096FDAA556C045BD697254ADFDD915A0A5C5A84F48EE89A49C1C2F322AF7E9DB62CFC
3,141,735 UART: [art] SIG.S = 0255C34018CE736B6357F235780D6CBDBD8C52C837D7CAF45A1A24A42D0D0B14BECE693B287E9C21E1CF8E417F631CBA
3,165,350 UART: Caliptra RT
3,165,603 UART: [state] CFI Enabled
3,274,224 UART: [rt] RT listening for mailbox commands...
3,274,894 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,164 UART: [rt]cmd =0x53574545, len=84
3,308,194 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,691 ready_for_fw is high
1,059,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,672 >>> mbox cmd response: success
2,683,380 UART:
2,683,396 UART: Running Caliptra FMC ...
2,683,804 UART:
2,683,858 UART: [state] CFI Enabled
2,694,517 UART: [fht] FMC Alias Private Key: 7
2,802,564 UART: [art] Extend RT PCRs Done
2,802,992 UART: [art] Lock RT PCRs Done
2,805,012 UART: [art] Populate DV Done
2,813,167 UART: [fht] FMC Alias Private Key: 7
2,814,339 UART: [art] Derive CDI
2,814,619 UART: [art] Store in in slot 0x4
2,900,468 UART: [art] Derive Key Pair
2,900,828 UART: [art] Store priv key in slot 0x5
2,913,688 UART: [art] Derive Key Pair - Done
2,928,378 UART: [art] Signing Cert with AUTHO
2,928,858 UART: RITY.KEYID = 7
2,944,230 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,995 UART: [art] PUB.X = D98DA147D5963293E8DA7C1E037C3C4FB994692B1016CB5D8B8115BFA4F3621942666D545C9F23872192728E839E5CA8
2,951,758 UART: [art] PUB.Y = 6E6D4C02DC0328713E78527C144779995C11E7F37A72F0375AAC42D37FD3B248B09E419E0CE3DB68FDAEFE6B8D868325
2,958,705 UART: [art] SIG.R = F62A4B4C5AD9DA238EDE697C8C29FED2B82E26ED11CB63FBF386737805596698FC3A4C686B4AE837C6F90A4A7749B606
2,965,478 UART: [art] SIG.S = 355955F3BAF473C8595D1CE2201130243F9219B6D0588903F7DE5D1D9196A0F113D960692BB29BD97B79AC99B48A0466
2,989,453 UART: Caliptra RT
2,989,706 UART: [state] CFI Enabled
3,097,337 UART: [rt] RT listening for mailbox commands...
3,098,007 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,263 UART: [rt]cmd =0x53574545, len=84
3,131,531 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
893,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,222 UART: [kat] ++
897,374 UART: [kat] sha1
901,382 UART: [kat] SHA2-256
903,322 UART: [kat] SHA2-384
906,017 UART: [kat] SHA2-512-ACC
907,918 UART: [kat] ECC-384
917,741 UART: [kat] HMAC-384Kdf
922,397 UART: [kat] LMS
1,170,725 UART: [kat] --
1,171,596 UART: [cold-reset] ++
1,172,018 UART: [fht] FHT @ 0x50003400
1,174,509 UART: [idev] ++
1,174,677 UART: [idev] CDI.KEYID = 6
1,175,037 UART: [idev] SUBJECT.KEYID = 7
1,175,461 UART: [idev] UDS.KEYID = 0
1,175,806 ready_for_fw is high
1,175,806 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,539 UART: [idev] Erasing UDS.KEYID = 0
1,200,766 UART: [idev] Sha1 KeyId Algorithm
1,209,320 UART: [idev] --
1,210,318 UART: [ldev] ++
1,210,486 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,217,102 UART: [ldev] Erasing FE.KEYID = 1
1,243,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,448 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,641 UART: [fwproc] Recv command 0x46574c44
1,284,369 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,886 >>> mbox cmd response: success
2,772,922 UART: [afmc] ++
2,773,090 UART: [afmc] CDI.KEYID = 6
2,773,452 UART: [afmc] SUBJECT.KEYID = 7
2,773,877 UART: [afmc] AUTHORITY.KEYID = 5
2,809,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,091 UART: [afmc] --
2,853,131 UART: [cold-reset] --
2,853,821 UART: [state] Locking Datavault
2,855,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,724 UART: [state] Locking ICCM
2,856,358 UART: [exit] Launching FMC @ 0x40000130
2,861,687 UART:
2,861,703 UART: Running Caliptra FMC ...
2,862,111 UART:
2,862,254 UART: [state] CFI Enabled
2,872,581 UART: [fht] FMC Alias Private Key: 7
2,980,514 UART: [art] Extend RT PCRs Done
2,980,942 UART: [art] Lock RT PCRs Done
2,982,782 UART: [art] Populate DV Done
2,990,937 UART: [fht] FMC Alias Private Key: 7
2,992,049 UART: [art] Derive CDI
2,992,329 UART: [art] Store in in slot 0x4
3,078,258 UART: [art] Derive Key Pair
3,078,618 UART: [art] Store priv key in slot 0x5
3,092,040 UART: [art] Derive Key Pair - Done
3,106,756 UART: [art] Signing Cert with AUTHO
3,107,236 UART: RITY.KEYID = 7
3,122,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,227 UART: [art] PUB.X = B8D4AC5AC131DBB54BEE6AC443E3E760433EB81E4FD8A2118C95B35B83DE06C78E783C4AEC9EDD0C5030ABB3CF596E70
3,130,015 UART: [art] PUB.Y = CD37744B5BAEE467F501003EB13DB6F9D7F9E55BE39716831961827499DB3393DE4635A9A826F1EA7807F4D030F7D0B9
3,136,939 UART: [art] SIG.R = 1DA0E1800B9A6290BFBAEC47F912C0714A4D013179D66EFB46C98966BEDBB1914C975191469A6D2ED0F029ED856FDF12
3,143,713 UART: [art] SIG.S = 48E787FFCD4278EE8F2A2E75B48FB58BDA163E03E0482467BFB09413D501536C0912E6361F5804B442570C58210130D5
3,167,556 UART: Caliptra RT
3,167,901 UART: [state] CFI Enabled
3,275,366 UART: [rt] RT listening for mailbox commands...
3,276,036 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,402 UART: [rt]cmd =0x53574545, len=84
3,309,644 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 ready_for_fw is high
1,060,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,199 >>> mbox cmd response: success
2,686,639 UART:
2,686,655 UART: Running Caliptra FMC ...
2,687,063 UART:
2,687,206 UART: [state] CFI Enabled
2,697,617 UART: [fht] FMC Alias Private Key: 7
2,805,608 UART: [art] Extend RT PCRs Done
2,806,036 UART: [art] Lock RT PCRs Done
2,807,932 UART: [art] Populate DV Done
2,816,241 UART: [fht] FMC Alias Private Key: 7
2,817,391 UART: [art] Derive CDI
2,817,671 UART: [art] Store in in slot 0x4
2,903,410 UART: [art] Derive Key Pair
2,903,770 UART: [art] Store priv key in slot 0x5
2,917,184 UART: [art] Derive Key Pair - Done
2,931,722 UART: [art] Signing Cert with AUTHO
2,932,202 UART: RITY.KEYID = 7
2,947,676 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,441 UART: [art] PUB.X = DC25717EF9003091C22BD82D27E6A0EA38110EEC9D440629AE517458F434139732EEC7483F7D4822E71234BED651A80E
2,955,178 UART: [art] PUB.Y = E0187326D214F58BF6933F7E8A3639E91828F1DD23F847EC5AE8B69447DB96B28C399D313A8A87C72B8F4457D1121405
2,962,121 UART: [art] SIG.R = 7C0D7E0B5158F024A6E9580D4D90C4089028B63256DF6608EEBC662653545F6D00AA9D10A232FCFC79AC922016E4B71F
2,968,856 UART: [art] SIG.S = 33147C94FC4121A5BB23F4B03C4449CF64969565C34A74D461718CE60ABC89D7883D6CA3240ACBC6083D81794BD40C6E
2,992,691 UART: Caliptra RT
2,993,036 UART: [state] CFI Enabled
3,100,887 UART: [rt] RT listening for mailbox commands...
3,101,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,737 UART: [rt]cmd =0x53574545, len=84
3,134,497 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,770 UART: [kat] LMS
1,169,082 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,174,343 ready_for_fw is high
1,174,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,181 UART: [idev] Sha1 KeyId Algorithm
1,208,161 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,216,212 UART: [ldev] Erasing FE.KEYID = 1
1,242,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,186 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,379 UART: [fwproc] Recv command 0x46574c44
1,283,112 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,977 >>> mbox cmd response: success
2,770,038 UART: [afmc] ++
2,770,206 UART: [afmc] CDI.KEYID = 6
2,770,569 UART: [afmc] SUBJECT.KEYID = 7
2,770,995 UART: [afmc] AUTHORITY.KEYID = 5
2,806,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,088 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,625 UART: [afmc] --
2,849,621 UART: [cold-reset] --
2,850,393 UART: [state] Locking Datavault
2,851,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,288 UART: [state] Locking ICCM
2,852,708 UART: [exit] Launching FMC @ 0x40000130
2,858,037 UART:
2,858,053 UART: Running Caliptra FMC ...
2,858,461 UART:
2,858,515 UART: [state] CFI Enabled
2,868,856 UART: [fht] FMC Alias Private Key: 7
2,976,673 UART: [art] Extend RT PCRs Done
2,977,101 UART: [art] Lock RT PCRs Done
2,978,503 UART: [art] Populate DV Done
2,986,754 UART: [fht] FMC Alias Private Key: 7
2,987,764 UART: [art] Derive CDI
2,988,044 UART: [art] Store in in slot 0x4
3,073,461 UART: [art] Derive Key Pair
3,073,821 UART: [art] Store priv key in slot 0x5
3,087,717 UART: [art] Derive Key Pair - Done
3,102,551 UART: [art] Signing Cert with AUTHO
3,103,031 UART: RITY.KEYID = 7
3,118,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,082 UART: [art] PUB.X = 1AA2A4C0E47DCADD90F5B0B0D21FE6DDBEDDC993A9889BC1EE365B354D62D60E646544BC05498117AE4EA56926EC2F01
3,125,863 UART: [art] PUB.Y = 36D4FA22B84D1FF025B4F7D3DE1D53D2ACC48CC160F591BCFDB8EC02AC95AF1893AB7D5DDB02BE6EF895A4D94B835BB5
3,132,837 UART: [art] SIG.R = 5522313C5129AB4D7B60626C77A02B408A15F99EDFA29BB62EE870D1E55261082FBA0EAFF8B8F65534A1FBB1A8EB689D
3,139,613 UART: [art] SIG.S = FA89C5EF78B1B1FA3F8C38904FF8C8BA274B169F8EB5115E65EA53561ED3788F96D44C9357240F2704E60B1E957DA6B5
3,163,235 UART: Caliptra RT
3,163,488 UART: [state] CFI Enabled
3,271,289 UART: [rt] RT listening for mailbox commands...
3,271,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,393 UART: [rt]cmd =0x53574545, len=84
3,305,595 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,258 ready_for_fw is high
1,056,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,829 >>> mbox cmd response: success
2,682,095 UART:
2,682,111 UART: Running Caliptra FMC ...
2,682,519 UART:
2,682,573 UART: [state] CFI Enabled
2,692,784 UART: [fht] FMC Alias Private Key: 7
2,800,597 UART: [art] Extend RT PCRs Done
2,801,025 UART: [art] Lock RT PCRs Done
2,802,759 UART: [art] Populate DV Done
2,811,046 UART: [fht] FMC Alias Private Key: 7
2,812,156 UART: [art] Derive CDI
2,812,436 UART: [art] Store in in slot 0x4
2,898,139 UART: [art] Derive Key Pair
2,898,499 UART: [art] Store priv key in slot 0x5
2,911,105 UART: [art] Derive Key Pair - Done
2,926,240 UART: [art] Signing Cert with AUTHO
2,926,720 UART: RITY.KEYID = 7
2,941,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,237 UART: [art] PUB.X = 0E6E0091EF9E925BD3BEAFC380FD134F013185F4D2C03293485B190553D09572572C068DE61D2379DFF6F1925A12AB95
2,948,973 UART: [art] PUB.Y = AFF759BEF605BC812C8CEE2138B1F28F801FE249F1FF5D3A8922DD04767ED4037F6AF6D29BD7FD27BF7BD48414E17E28
2,955,932 UART: [art] SIG.R = 8E97AF8A8412C051930463596770A5522BC40B0E1A43F01F0849EAE548E6E85CAF6E66A6A0CB2FB647FD49971FE1A5D1
2,962,696 UART: [art] SIG.S = 42186C538AAD6D2A05FDD87D3F125E9A85DB9BD2E507859B6BC53762121A999CBF9E2AFFEAD975516E54BFFCC58EB122
2,986,997 UART: Caliptra RT
2,987,250 UART: [state] CFI Enabled
3,094,021 UART: [rt] RT listening for mailbox commands...
3,094,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,213 UART: [rt]cmd =0x53574545, len=84
3,127,965 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,090 UART: [state] WD Timer not started. Device not locked for debugging
87,391 UART: [kat] SHA2-256
890,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,174,516 ready_for_fw is high
1,174,516 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,089 UART: [ldev] ++
1,209,257 UART: [ldev] CDI.KEYID = 6
1,209,621 UART: [ldev] SUBJECT.KEYID = 5
1,210,048 UART: [ldev] AUTHORITY.KEYID = 7
1,210,511 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,533 UART: [ldev] --
1,282,029 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,383 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,816 >>> mbox cmd response: success
2,770,057 UART: [afmc] ++
2,770,225 UART: [afmc] CDI.KEYID = 6
2,770,588 UART: [afmc] SUBJECT.KEYID = 7
2,771,014 UART: [afmc] AUTHORITY.KEYID = 5
2,805,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,308 UART: [afmc] --
2,849,290 UART: [cold-reset] --
2,850,126 UART: [state] Locking Datavault
2,851,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,891 UART: [state] Locking ICCM
2,852,435 UART: [exit] Launching FMC @ 0x40000130
2,857,764 UART:
2,857,780 UART: Running Caliptra FMC ...
2,858,188 UART:
2,858,331 UART: [state] CFI Enabled
2,868,932 UART: [fht] FMC Alias Private Key: 7
2,976,687 UART: [art] Extend RT PCRs Done
2,977,115 UART: [art] Lock RT PCRs Done
2,978,835 UART: [art] Populate DV Done
2,987,142 UART: [fht] FMC Alias Private Key: 7
2,988,136 UART: [art] Derive CDI
2,988,416 UART: [art] Store in in slot 0x4
3,074,057 UART: [art] Derive Key Pair
3,074,417 UART: [art] Store priv key in slot 0x5
3,087,523 UART: [art] Derive Key Pair - Done
3,102,075 UART: [art] Signing Cert with AUTHO
3,102,555 UART: RITY.KEYID = 7
3,118,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,838 UART: [art] PUB.X = 86E049D79A3CFF566DC8199010EA1D65C85F7555E3353836A5EC22C233FC2366A60DF9DB759FA5A6A946E6B03BC7FF73
3,125,613 UART: [art] PUB.Y = 8E36B573E16B0684DFFFC43661351984CDC89DC6584D83983A635264E6498B87EDFF75203FF4385B54896F4DA8BCFBD4
3,132,564 UART: [art] SIG.R = 58074674D0EE1D52D706AA4B46040E6C11CEF7D49A49605DBF684D3C337CE40561FD068CAD5F1808B6C523215A6096EF
3,139,317 UART: [art] SIG.S = 885A38E350F74160583D85B0A8737905D2096E539B0C549858C63B4E47A00EF4697048D0AF3997970F2426672849698F
3,163,115 UART: Caliptra RT
3,163,460 UART: [state] CFI Enabled
3,271,379 UART: [rt] RT listening for mailbox commands...
3,272,049 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,593 UART: [rt]cmd =0x53574545, len=84
3,305,777 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 ready_for_fw is high
1,056,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,928 >>> mbox cmd response: success
2,683,418 UART:
2,683,434 UART: Running Caliptra FMC ...
2,683,842 UART:
2,683,985 UART: [state] CFI Enabled
2,694,510 UART: [fht] FMC Alias Private Key: 7
2,802,939 UART: [art] Extend RT PCRs Done
2,803,367 UART: [art] Lock RT PCRs Done
2,805,153 UART: [art] Populate DV Done
2,813,316 UART: [fht] FMC Alias Private Key: 7
2,814,290 UART: [art] Derive CDI
2,814,570 UART: [art] Store in in slot 0x4
2,900,417 UART: [art] Derive Key Pair
2,900,777 UART: [art] Store priv key in slot 0x5
2,914,069 UART: [art] Derive Key Pair - Done
2,929,099 UART: [art] Signing Cert with AUTHO
2,929,579 UART: RITY.KEYID = 7
2,944,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,752 UART: [art] PUB.X = E0E1EEEA40CDF9E6FA6A91056A1F3A165F1B90DB53A2813FC9BFD9D02F7362FA8E9893D9638D18737A39589C2A702D23
2,952,531 UART: [art] PUB.Y = 509CC71F54033CCD6DD2B1B085F1CF2DE3040C90A1BBF1E38B4172303678A11EEF5C10FFDE38B58D1455860028428E74
2,959,456 UART: [art] SIG.R = 1E310D1BFC25926DC0173531C7EABD644CC54D590D084784A33AF10B6E49E83CF9F95F4E6FDF0403A348E8019FB90AA9
2,966,212 UART: [art] SIG.S = 6841BA1A2949CB3953E25400D84DBE261EFF9220F42C6FCAFD6C15FC6A7BB726059DA4F6540FDE6EDB1CA6906DA1105A
2,989,677 UART: Caliptra RT
2,990,022 UART: [state] CFI Enabled
3,097,557 UART: [rt] RT listening for mailbox commands...
3,098,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,629 UART: [rt]cmd =0x53574545, len=84
3,131,643 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,258 UART:
192,635 UART: Running Caliptra ROM ...
193,732 UART:
193,875 UART: [state] CFI Enabled
262,434 UART: [state] LifecycleState = Unprovisioned
264,356 UART: [state] DebugLocked = No
266,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,735 UART: [kat] SHA2-256
441,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,982 UART: [kat] ++
452,429 UART: [kat] sha1
463,655 UART: [kat] SHA2-256
466,301 UART: [kat] SHA2-384
473,803 UART: [kat] SHA2-512-ACC
476,110 UART: [kat] ECC-384
2,767,018 UART: [kat] HMAC-384Kdf
2,780,357 UART: [kat] LMS
3,970,677 UART: [kat] --
3,975,195 UART: [cold-reset] ++
3,976,144 UART: [fht] Storing FHT @ 0x50003400
3,988,472 UART: [idev] ++
3,989,039 UART: [idev] CDI.KEYID = 6
3,990,001 UART: [idev] SUBJECT.KEYID = 7
3,991,246 UART: [idev] UDS.KEYID = 0
3,992,262 ready_for_fw is high
3,992,458 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,606 UART: [idev] Erasing UDS.KEYID = 0
7,326,746 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,056 UART: [idev] --
7,351,685 UART: [ldev] ++
7,352,265 UART: [ldev] CDI.KEYID = 6
7,353,228 UART: [ldev] SUBJECT.KEYID = 5
7,354,440 UART: [ldev] AUTHORITY.KEYID = 7
7,355,669 UART: [ldev] FE.KEYID = 1
7,402,501 UART: [ldev] Erasing FE.KEYID = 1
10,736,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,406 UART: [ldev] --
13,096,036 UART: [fwproc] Waiting for Commands...
13,098,352 UART: [fwproc] Received command 0x46574c44
13,100,536 UART: [fwproc] Received Image of size 113760 bytes
17,153,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,857 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,614,872 >>> mbox cmd response: success
17,618,400 UART: [afmc] ++
17,618,996 UART: [afmc] CDI.KEYID = 6
17,619,907 UART: [afmc] SUBJECT.KEYID = 7
17,621,172 UART: [afmc] AUTHORITY.KEYID = 5
20,989,771 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,705 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,131 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,970 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,407 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,769 UART: [afmc] --
23,357,722 UART: [cold-reset] --
23,361,044 UART: [state] Locking Datavault
23,366,203 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,904 UART: [state] Locking ICCM
23,370,000 UART: [exit] Launching FMC @ 0x40000130
23,378,399 UART:
23,378,639 UART: Running Caliptra FMC ...
23,379,743 UART:
23,379,902 UART: [state] CFI Enabled
23,445,512 UART: [fht] FMC Alias Private Key: 7
25,783,070 UART: [art] Extend RT PCRs Done
25,784,292 UART: [art] Lock RT PCRs Done
25,786,078 UART: [art] Populate DV Done
25,791,503 UART: [fht] FMC Alias Private Key: 7
25,793,144 UART: [art] Derive CDI
25,793,881 UART: [art] Store in in slot 0x4
25,854,932 UART: [art] Derive Key Pair
25,855,973 UART: [art] Store priv key in slot 0x5
29,148,827 UART: [art] Derive Key Pair - Done
29,162,087 UART: [art] Signing Cert with AUTHO
29,163,419 UART: RITY.KEYID = 7
31,450,130 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,632 UART: [art] PUB.X = 5F9BE1E06AFD5155BA906653B349A81ED3A85006F5021E9AD19FFC3AF56BF2140855C8C0F7F5420EF3BD35AFE7C88481
31,458,874 UART: [art] PUB.Y = 8ABB06E56D496AFE0337B552B849C3453A40868AE691C3A03F7026FA940062EF9F2B6D1F8EDCEA474D357223900D05A9
31,466,100 UART: [art] SIG.R = B69129E5CDD4AB9475AF1D3BD11BA03218B63908132B369A54F731E0EA3F11B12130277BF536135B185B98F58D89EE38
31,473,495 UART: [art] SIG.S = 81867EE7E5A336E1858A01397FEE7A932BD70D127A44EFB4232431A0FB64B8D5FE15026517DEC16D4C2E5D04CCF633F4
32,778,450 UART: Caliptra RT
32,779,143 UART: [state] CFI Enabled
32,940,753 UART: [rt] RT listening for mailbox commands...
32,943,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,974,338 UART: [rt]cmd =0x44504543, len=96
38,736,997 >>> mbox cmd response data (6236 bytes)
38,766,356 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,797,030 UART: [rt]cmd =0x53574545, len=84
44,381,875 >>> mbox cmd response data (200 bytes)
44,768,200 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,798,615 UART: [rt]cmd =0x52564348, len=36
44,801,000 >>> mbox cmd response data (8 bytes)
44,801,364 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,831,819 UART: [rt]cmd =0x53574545, len=84
44,835,690 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,805,713 ready_for_fw is high
3,806,143 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,865,129 >>> mbox cmd response: success
23,567,121 UART:
23,567,538 UART: Running Caliptra FMC ...
23,568,644 UART:
23,568,803 UART: [state] CFI Enabled
23,635,204 UART: [fht] FMC Alias Private Key: 7
25,973,438 UART: [art] Extend RT PCRs Done
25,974,675 UART: [art] Lock RT PCRs Done
25,976,576 UART: [art] Populate DV Done
25,982,205 UART: [fht] FMC Alias Private Key: 7
25,983,739 UART: [art] Derive CDI
25,984,553 UART: [art] Store in in slot 0x4
26,043,593 UART: [art] Derive Key Pair
26,044,592 UART: [art] Store priv key in slot 0x5
29,337,930 UART: [art] Derive Key Pair - Done
29,351,089 UART: [art] Signing Cert with AUTHO
29,352,399 UART: RITY.KEYID = 7
31,638,729 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,238 UART: [art] PUB.X = 2E472F46D4D9B96E66C59DD44A1A1798DA1FD113FDF809596A1ABE6FEA0600D2F2495138916645213196FBB509BBC56D
31,647,480 UART: [art] PUB.Y = 0DB95971FAFEB0F99576E649DA301A7071F0F857B77A68E855EAAB9F48E4F21E6441F936858D9EA07B54D09F652063E3
31,654,754 UART: [art] SIG.R = 798CD638CE550CF67C77D91C9F8DF519983EDD729F0C58C0146846984CC8A61D86BA296CAECDD8A9ADDFF95DEFDECFDA
31,662,177 UART: [art] SIG.S = 192BC96D0351BECB25D9811FDB736442DE7C05031D55D84E55350E9C86912CEDF2A0CFF933B2EDBCFDD69FF98B5796DC
32,967,521 UART: Caliptra RT
32,968,224 UART: [state] CFI Enabled
33,129,661 UART: [rt] RT listening for mailbox commands...
33,132,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,127 UART: [rt]cmd =0x44504543, len=96
38,945,373 >>> mbox cmd response data (6236 bytes)
38,974,505 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,005,346 UART: [rt]cmd =0x53574545, len=84
44,592,442 >>> mbox cmd response data (200 bytes)
44,974,420 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,005,045 UART: [rt]cmd =0x52564348, len=36
45,007,580 >>> mbox cmd response data (8 bytes)
45,008,041 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,038,564 UART: [rt]cmd =0x53574545, len=84
45,042,047 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
192,902 UART:
193,274 UART: Running Caliptra ROM ...
194,378 UART:
604,267 UART: [state] CFI Enabled
620,348 UART: [state] LifecycleState = Unprovisioned
622,296 UART: [state] DebugLocked = No
624,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,862 UART: [kat] SHA2-256
798,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,164 UART: [kat] ++
809,607 UART: [kat] sha1
820,760 UART: [kat] SHA2-256
823,475 UART: [kat] SHA2-384
828,110 UART: [kat] SHA2-512-ACC
830,470 UART: [kat] ECC-384
3,115,509 UART: [kat] HMAC-384Kdf
3,126,193 UART: [kat] LMS
4,316,330 UART: [kat] --
4,320,486 UART: [cold-reset] ++
4,321,566 UART: [fht] Storing FHT @ 0x50003400
4,333,130 UART: [idev] ++
4,333,685 UART: [idev] CDI.KEYID = 6
4,334,631 UART: [idev] SUBJECT.KEYID = 7
4,335,868 UART: [idev] UDS.KEYID = 0
4,336,819 ready_for_fw is high
4,337,004 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,873 UART: [idev] Erasing UDS.KEYID = 0
7,624,012 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,819 UART: [idev] --
7,649,108 UART: [ldev] ++
7,649,675 UART: [ldev] CDI.KEYID = 6
7,650,630 UART: [ldev] SUBJECT.KEYID = 5
7,651,837 UART: [ldev] AUTHORITY.KEYID = 7
7,653,115 UART: [ldev] FE.KEYID = 1
7,665,120 UART: [ldev] Erasing FE.KEYID = 1
10,954,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,239 UART: [ldev] --
13,314,390 UART: [fwproc] Waiting for Commands...
13,316,695 UART: [fwproc] Received command 0x46574c44
13,318,879 UART: [fwproc] Received Image of size 113760 bytes
17,365,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,792 >>> mbox cmd response: success
17,832,247 UART: [afmc] ++
17,832,844 UART: [afmc] CDI.KEYID = 6
17,833,750 UART: [afmc] SUBJECT.KEYID = 7
17,835,020 UART: [afmc] AUTHORITY.KEYID = 5
21,148,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,019 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,404 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,204 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,669 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,481 UART: [afmc] --
23,514,867 UART: [cold-reset] --
23,519,535 UART: [state] Locking Datavault
23,522,778 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,475 UART: [state] Locking ICCM
23,525,639 UART: [exit] Launching FMC @ 0x40000130
23,533,978 UART:
23,534,216 UART: Running Caliptra FMC ...
23,535,235 UART:
23,535,380 UART: [state] CFI Enabled
23,543,688 UART: [fht] FMC Alias Private Key: 7
25,874,433 UART: [art] Extend RT PCRs Done
25,875,653 UART: [art] Lock RT PCRs Done
25,877,571 UART: [art] Populate DV Done
25,883,250 UART: [fht] FMC Alias Private Key: 7
25,884,943 UART: [art] Derive CDI
25,885,675 UART: [art] Store in in slot 0x4
25,927,778 UART: [art] Derive Key Pair
25,928,806 UART: [art] Store priv key in slot 0x5
29,170,790 UART: [art] Derive Key Pair - Done
29,183,885 UART: [art] Signing Cert with AUTHO
29,185,230 UART: RITY.KEYID = 7
31,464,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,161 UART: [art] PUB.X = 3EE349DDB77CD8BF5D30CC4EC71A1F028A302DC12E2E7CD3398EFE22619900139FF07D2AF1A1B1E5A867CC592CA63DEA
31,473,367 UART: [art] PUB.Y = C28BDD2E765EDF11453D17A56B3D3D7FFF2A8520EFF6DBEAA30E586E8D64D3CFF4DBB114A28D39EB62D1081166466B82
31,480,627 UART: [art] SIG.R = FB89A296EA459C6374C7EA8E5AA5A188490AF051811DDEAE684B9DB7BA2997EBD5EF05B6C5E747B16C85B941E4E39005
31,488,043 UART: [art] SIG.S = 11F0166DFD8F844249F5BB99EAC649687F1C708C1CCCD8A5D1E36B72C52187984E5668B8FF3FA33C22BE42AD81790716
32,793,314 UART: Caliptra RT
32,794,028 UART: [state] CFI Enabled
32,911,684 UART: [rt] RT listening for mailbox commands...
32,914,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,944,764 UART: [rt]cmd =0x44504543, len=96
38,616,534 >>> mbox cmd response data (6236 bytes)
38,646,462 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,676,988 UART: [rt]cmd =0x53574545, len=84
44,201,320 >>> mbox cmd response data (200 bytes)
44,584,978 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,615,328 UART: [rt]cmd =0x52564348, len=36
44,618,138 >>> mbox cmd response data (8 bytes)
44,618,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,649,154 UART: [rt]cmd =0x53574545, len=84
44,652,742 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,771 writing to cptra_bootfsm_go
4,128,739 ready_for_fw is high
4,129,129 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,073,715 >>> mbox cmd response: success
23,711,509 UART:
23,711,911 UART: Running Caliptra FMC ...
23,713,114 UART:
23,713,272 UART: [state] CFI Enabled
23,720,988 UART: [fht] FMC Alias Private Key: 7
26,052,045 UART: [art] Extend RT PCRs Done
26,053,279 UART: [art] Lock RT PCRs Done
26,054,690 UART: [art] Populate DV Done
26,060,256 UART: [fht] FMC Alias Private Key: 7
26,061,968 UART: [art] Derive CDI
26,063,011 UART: [art] Store in in slot 0x4
26,105,080 UART: [art] Derive Key Pair
26,106,085 UART: [art] Store priv key in slot 0x5
29,348,118 UART: [art] Derive Key Pair - Done
29,361,116 UART: [art] Signing Cert with AUTHO
29,362,422 UART: RITY.KEYID = 7
31,641,784 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,307 UART: [art] PUB.X = DA724D4FC72FE7E6150AA985758F879BC37DDD2C05F00C508FEF7554154C0D0FEFAFA912B1EBCE17C22BFD461B670C3D
31,650,545 UART: [art] PUB.Y = E526A45B750199742F4B7A717E7596F6652A0D96D36223C0D050D4E6D185D2B63CAC2F3934EC2C5F5F3A8BD65F6F8BEC
31,657,781 UART: [art] SIG.R = 602E41575ACBEC947D6A4876D731E5C03EE58F2C34315A77B8E42603A2BDFB9E702AFE7ECECA986609B5FA62279CC4F3
31,665,211 UART: [art] SIG.S = 61E85E0FE781E661EB857C1B185C0027A68DABC0C757C3196863B17D94F3172DA726F643012841E2AC4728A4616F2D52
32,970,581 UART: Caliptra RT
32,971,282 UART: [state] CFI Enabled
33,088,565 UART: [rt] RT listening for mailbox commands...
33,090,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,121,607 UART: [rt]cmd =0x44504543, len=96
38,793,110 >>> mbox cmd response data (6236 bytes)
38,822,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,852,792 UART: [rt]cmd =0x53574545, len=84
44,377,233 >>> mbox cmd response data (200 bytes)
44,760,956 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,791,212 UART: [rt]cmd =0x52564348, len=36
44,793,770 >>> mbox cmd response data (8 bytes)
44,794,217 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,824,577 UART: [rt]cmd =0x53574545, len=84
44,828,411 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,466 UART:
192,845 UART: Running Caliptra ROM ...
193,951 UART:
194,094 UART: [state] CFI Enabled
265,478 UART: [state] LifecycleState = Unprovisioned
267,323 UART: [state] DebugLocked = No
268,983 UART: [state] WD Timer not started. Device not locked for debugging
273,021 UART: [kat] SHA2-256
452,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,703 UART: [kat] ++
464,284 UART: [kat] sha1
475,950 UART: [kat] SHA2-256
478,953 UART: [kat] SHA2-384
485,077 UART: [kat] SHA2-512-ACC
488,039 UART: [kat] ECC-384
2,950,009 UART: [kat] HMAC-384Kdf
2,971,996 UART: [kat] LMS
3,501,414 UART: [kat] --
3,507,414 UART: [cold-reset] ++
3,508,998 UART: [fht] FHT @ 0x50003400
3,520,187 UART: [idev] ++
3,520,750 UART: [idev] CDI.KEYID = 6
3,521,672 UART: [idev] SUBJECT.KEYID = 7
3,522,839 UART: [idev] UDS.KEYID = 0
3,523,759 ready_for_fw is high
3,523,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,454 UART: [idev] Erasing UDS.KEYID = 0
6,029,087 UART: [idev] Sha1 KeyId Algorithm
6,051,361 UART: [idev] --
6,054,871 UART: [ldev] ++
6,055,460 UART: [ldev] CDI.KEYID = 6
6,056,373 UART: [ldev] SUBJECT.KEYID = 5
6,057,552 UART: [ldev] AUTHORITY.KEYID = 7
6,058,785 UART: [ldev] FE.KEYID = 1
6,099,950 UART: [ldev] Erasing FE.KEYID = 1
8,604,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,091 UART: [ldev] --
10,413,067 UART: [fwproc] Wait for Commands...
10,415,166 UART: [fwproc] Recv command 0x46574c44
10,417,256 UART: [fwproc] Recv'd Img size: 114084 bytes
13,822,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,282,676 >>> mbox cmd response: success
14,286,378 UART: [afmc] ++
14,287,053 UART: [afmc] CDI.KEYID = 6
14,287,944 UART: [afmc] SUBJECT.KEYID = 7
14,289,040 UART: [afmc] AUTHORITY.KEYID = 5
16,825,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,090 UART: [afmc] --
18,626,680 UART: [cold-reset] --
18,630,970 UART: [state] Locking Datavault
18,636,265 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,984 UART: [state] Locking ICCM
18,638,996 UART: [exit] Launching FMC @ 0x40000130
18,647,449 UART:
18,647,724 UART: Running Caliptra FMC ...
18,648,828 UART:
18,648,982 UART: [state] CFI Enabled
18,708,522 UART: [fht] FMC Alias Private Key: 7
20,472,369 UART: [art] Extend RT PCRs Done
20,473,582 UART: [art] Lock RT PCRs Done
20,475,208 UART: [art] Populate DV Done
20,480,779 UART: [fht] FMC Alias Private Key: 7
20,482,204 UART: [art] Derive CDI
20,482,963 UART: [art] Store in in slot 0x4
20,540,561 UART: [art] Derive Key Pair
20,541,601 UART: [art] Store priv key in slot 0x5
23,004,605 UART: [art] Derive Key Pair - Done
23,017,636 UART: [art] Signing Cert with AUTHO
23,018,946 UART: RITY.KEYID = 7
24,729,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,313 UART: [art] PUB.X = A82E5A912ECF2533F7A569A44926805CE744470A06E0FD209FC4710E9E57DC3DB917539FAFCFD9BEBDBB285775265044
24,738,550 UART: [art] PUB.Y = 60B79486DC7027B1E9D10B638322AF3161B6250FBC520E014ABABBDEB9A5CD095530358FA5BF9B3617DCA02DE238231D
24,745,815 UART: [art] SIG.R = D72C00ECE88BC5ACF5442C5A69D3B3DB887BD27D326D1430D27610A210320579BEDBDE47D6E676CF47ED769F4CAD4367
24,753,201 UART: [art] SIG.S = 0612450BDCFDF5AB10BE93C7A7FE0957FC63B70264E8218CA6CD32D1BA30A2AE31AC69E3C9A203D29B825AB6D610DC4B
25,731,971 UART: Caliptra RT
25,732,667 UART: [state] CFI Enabled
25,896,768 UART: [rt] RT listening for mailbox commands...
25,899,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,930,353 UART: [rt]cmd =0x44504543, len=96
30,289,025 >>> mbox cmd response data (6236 bytes)
30,318,236 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,349,032 UART: [rt]cmd =0x53574545, len=84
34,527,971 >>> mbox cmd response data (200 bytes)
34,911,152 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,941,172 UART: [rt]cmd =0x52564348, len=36
34,943,795 >>> mbox cmd response data (8 bytes)
34,944,138 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,974,355 UART: [rt]cmd =0x53574545, len=84
34,977,506 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,396 writing to cptra_bootfsm_go
3,359,688 ready_for_fw is high
3,360,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,697 >>> mbox cmd response: success
18,363,407 UART:
18,363,811 UART: Running Caliptra FMC ...
18,364,924 UART:
18,365,075 UART: [state] CFI Enabled
18,431,830 UART: [fht] FMC Alias Private Key: 7
20,196,153 UART: [art] Extend RT PCRs Done
20,197,384 UART: [art] Lock RT PCRs Done
20,199,008 UART: [art] Populate DV Done
20,204,157 UART: [fht] FMC Alias Private Key: 7
20,205,695 UART: [art] Derive CDI
20,206,455 UART: [art] Store in in slot 0x4
20,264,471 UART: [art] Derive Key Pair
20,265,512 UART: [art] Store priv key in slot 0x5
22,728,585 UART: [art] Derive Key Pair - Done
22,741,483 UART: [art] Signing Cert with AUTHO
22,742,785 UART: RITY.KEYID = 7
24,453,614 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,127 UART: [art] PUB.X = 0F7FDDD094932923B94FBB93D77BB33D90CD2A2CFB7986A348F20FD0B101BFF130400C0088704123078AFAFCB7329C87
24,462,407 UART: [art] PUB.Y = E0625FDDC00BDA3C847AC17FB3061FC7B4CD827F04FA8029224AA8BD6D4DC8E54B3C0CEFB34E203F41DB53517141C987
24,469,654 UART: [art] SIG.R = 09B3C48D5015221C392A520ED933B5DC29E544759FDF4AB550224CAC63F929D48D770313A44D1BA06796316D4B46CFC7
24,477,034 UART: [art] SIG.S = 87FB93A973672A82373D0A4692CEF46C81E17C339EC765512FF98263E51EC2BB35B3669319CA226ECE588F858A6118DE
25,455,823 UART: Caliptra RT
25,456,540 UART: [state] CFI Enabled
25,621,399 UART: [rt] RT listening for mailbox commands...
25,623,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,654,987 UART: [rt]cmd =0x44504543, len=96
30,013,154 >>> mbox cmd response data (6236 bytes)
30,042,638 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,073,300 UART: [rt]cmd =0x53574545, len=84
34,252,176 >>> mbox cmd response data (200 bytes)
34,635,697 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,666,178 UART: [rt]cmd =0x52564348, len=36
34,668,657 >>> mbox cmd response data (8 bytes)
34,669,115 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,699,472 UART: [rt]cmd =0x53574545, len=84
34,703,151 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
193,028 UART:
193,392 UART: Running Caliptra ROM ...
194,489 UART:
603,960 UART: [state] CFI Enabled
616,612 UART: [state] LifecycleState = Unprovisioned
618,525 UART: [state] DebugLocked = No
621,203 UART: [state] WD Timer not started. Device not locked for debugging
625,242 UART: [kat] SHA2-256
804,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,924 UART: [kat] ++
816,459 UART: [kat] sha1
827,338 UART: [kat] SHA2-256
830,345 UART: [kat] SHA2-384
836,969 UART: [kat] SHA2-512-ACC
839,973 UART: [kat] ECC-384
3,280,618 UART: [kat] HMAC-384Kdf
3,293,840 UART: [kat] LMS
3,823,347 UART: [kat] --
3,826,976 UART: [cold-reset] ++
3,828,620 UART: [fht] FHT @ 0x50003400
3,838,553 UART: [idev] ++
3,839,119 UART: [idev] CDI.KEYID = 6
3,840,072 UART: [idev] SUBJECT.KEYID = 7
3,841,244 UART: [idev] UDS.KEYID = 0
3,842,148 ready_for_fw is high
3,842,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,627 UART: [idev] Erasing UDS.KEYID = 0
6,311,078 UART: [idev] Sha1 KeyId Algorithm
6,333,730 UART: [idev] --
6,337,023 UART: [ldev] ++
6,337,605 UART: [ldev] CDI.KEYID = 6
6,338,518 UART: [ldev] SUBJECT.KEYID = 5
6,339,677 UART: [ldev] AUTHORITY.KEYID = 7
6,340,962 UART: [ldev] FE.KEYID = 1
6,349,392 UART: [ldev] Erasing FE.KEYID = 1
8,823,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,193 UART: [ldev] --
10,614,402 UART: [fwproc] Wait for Commands...
10,616,685 UART: [fwproc] Recv command 0x46574c44
10,618,804 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,481,847 >>> mbox cmd response: success
14,486,914 UART: [afmc] ++
14,487,507 UART: [afmc] CDI.KEYID = 6
14,488,394 UART: [afmc] SUBJECT.KEYID = 7
14,489,499 UART: [afmc] AUTHORITY.KEYID = 5
16,992,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,030 UART: [afmc] --
18,790,962 UART: [cold-reset] --
18,793,634 UART: [state] Locking Datavault
18,800,175 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,822 UART: [state] Locking ICCM
18,804,430 UART: [exit] Launching FMC @ 0x40000130
18,812,826 UART:
18,813,064 UART: Running Caliptra FMC ...
18,814,178 UART:
18,814,337 UART: [state] CFI Enabled
18,822,408 UART: [fht] FMC Alias Private Key: 7
20,579,514 UART: [art] Extend RT PCRs Done
20,580,734 UART: [art] Lock RT PCRs Done
20,582,764 UART: [art] Populate DV Done
20,588,444 UART: [fht] FMC Alias Private Key: 7
20,590,089 UART: [art] Derive CDI
20,590,829 UART: [art] Store in in slot 0x4
20,633,695 UART: [art] Derive Key Pair
20,634,730 UART: [art] Store priv key in slot 0x5
23,060,908 UART: [art] Derive Key Pair - Done
23,073,900 UART: [art] Signing Cert with AUTHO
23,075,214 UART: RITY.KEYID = 7
24,780,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,864 UART: [art] PUB.X = 9E6CCAC5CE8B0918450A9EC4E507188DF447F92A08A780F760DA1E0234769F9BCDCCC6A8B22DBFCB6FA9AD418C706D8B
24,789,134 UART: [art] PUB.Y = EF04AE7BF19BA5B2F3A75FE518B3D88D3B02A4E90A412678306B91B77EDB7196CEF7CB3E78E7621F13DF793440C2CFA6
24,796,445 UART: [art] SIG.R = B0D74267B158A5F51847785334EB80F125DF22164318BA3C417E08937FD83D0FB3B5C1C16E8F8BDAA244B24FE6D2C23E
24,803,823 UART: [art] SIG.S = F23FFC1758AD9CA46C75E1980F5F2DE1B60DB933862E8353118F3822012B00CA9A1DD375ADAE569529A366300A1EFA03
25,782,754 UART: Caliptra RT
25,783,475 UART: [state] CFI Enabled
25,900,265 UART: [rt] RT listening for mailbox commands...
25,902,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,933,162 UART: [rt]cmd =0x44504543, len=96
30,216,279 >>> mbox cmd response data (6236 bytes)
30,245,481 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,275,985 UART: [rt]cmd =0x53574545, len=84
34,411,932 >>> mbox cmd response data (200 bytes)
34,796,179 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,826,423 UART: [rt]cmd =0x52564348, len=36
34,828,838 >>> mbox cmd response data (8 bytes)
34,829,191 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,859,840 UART: [rt]cmd =0x53574545, len=84
34,863,654 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
3,697,822 ready_for_fw is high
3,698,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,271,308 >>> mbox cmd response: success
18,527,885 UART:
18,528,303 UART: Running Caliptra FMC ...
18,529,439 UART:
18,529,604 UART: [state] CFI Enabled
18,537,869 UART: [fht] FMC Alias Private Key: 7
20,294,788 UART: [art] Extend RT PCRs Done
20,296,018 UART: [art] Lock RT PCRs Done
20,297,869 UART: [art] Populate DV Done
20,303,122 UART: [fht] FMC Alias Private Key: 7
20,304,784 UART: [art] Derive CDI
20,305,606 UART: [art] Store in in slot 0x4
20,348,329 UART: [art] Derive Key Pair
20,349,371 UART: [art] Store priv key in slot 0x5
22,776,272 UART: [art] Derive Key Pair - Done
22,789,219 UART: [art] Signing Cert with AUTHO
22,790,708 UART: RITY.KEYID = 7
24,496,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,803 UART: [art] PUB.X = DF50B94BAA0B226697F2E54E9E33CF395B6320288E13101C22889B1DCF57670D2588E5989A53079B2C49086B7B00AA8E
24,505,032 UART: [art] PUB.Y = E3B8483DA714234424B473F94785380CF7F8B82334F8A4E12EDE7280B3CEB3FFDF642C610F1710D92E6A67638EAE30AE
24,512,285 UART: [art] SIG.R = 79E348937D60FB1CBBB096D30EAD6495482FC545E7EB2B1DC130B160B2E6FA2E2B1310A9F0D5874E2173B94048F4C976
24,519,725 UART: [art] SIG.S = 015856A202794CC577E9F3FB465CB2F424BC140ACFDEEED45C0C1D534B8B89FF900AF36118269256DB03FC8E268D084C
25,498,665 UART: Caliptra RT
25,499,374 UART: [state] CFI Enabled
25,617,098 UART: [rt] RT listening for mailbox commands...
25,619,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,650,145 UART: [rt]cmd =0x44504543, len=96
29,932,985 >>> mbox cmd response data (6236 bytes)
29,962,413 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,993,193 UART: [rt]cmd =0x53574545, len=84
34,128,757 >>> mbox cmd response data (200 bytes)
34,516,096 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,546,295 UART: [rt]cmd =0x52564348, len=36
34,548,767 >>> mbox cmd response data (8 bytes)
34,549,207 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,579,607 UART: [rt]cmd =0x53574545, len=84
34,583,319 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,461 UART:
192,837 UART: Running Caliptra ROM ...
194,812 UART:
195,003 UART: [state] CFI Enabled
266,875 UART: [state] LifecycleState = Unprovisioned
269,277 UART: [state] DebugLocked = No
271,371 UART: [state] WD Timer not started. Device not locked for debugging
275,460 UART: [kat] SHA2-256
465,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,159 UART: [kat] ++
476,631 UART: [kat] sha1
487,790 UART: [kat] SHA2-256
490,800 UART: [kat] SHA2-384
497,354 UART: [kat] SHA2-512-ACC
499,998 UART: [kat] ECC-384
2,947,225 UART: [kat] HMAC-384Kdf
2,972,888 UART: [kat] LMS
3,504,621 UART: [kat] --
3,509,043 UART: [cold-reset] ++
3,510,688 UART: [fht] FHT @ 0x50003400
3,520,808 UART: [idev] ++
3,521,534 UART: [idev] CDI.KEYID = 6
3,522,442 UART: [idev] SUBJECT.KEYID = 7
3,523,681 UART: [idev] UDS.KEYID = 0
3,524,601 ready_for_fw is high
3,524,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,273 UART: [idev] Erasing UDS.KEYID = 0
6,028,606 UART: [idev] Sha1 KeyId Algorithm
6,051,141 UART: [idev] --
6,056,467 UART: [ldev] ++
6,057,161 UART: [ldev] CDI.KEYID = 6
6,058,085 UART: [ldev] SUBJECT.KEYID = 5
6,059,246 UART: [ldev] AUTHORITY.KEYID = 7
6,060,476 UART: [ldev] FE.KEYID = 1
6,100,752 UART: [ldev] Erasing FE.KEYID = 1
8,609,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,227 UART: [ldev] --
10,416,243 UART: [fwproc] Wait for Commands...
10,419,033 UART: [fwproc] Recv command 0x46574c44
10,421,340 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,147 >>> mbox cmd response: success
14,601,121 UART: [afmc] ++
14,601,831 UART: [afmc] CDI.KEYID = 6
14,603,019 UART: [afmc] SUBJECT.KEYID = 7
14,604,462 UART: [afmc] AUTHORITY.KEYID = 5
17,129,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,014 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,225 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,204 UART: [afmc] --
18,929,806 UART: [cold-reset] --
18,934,698 UART: [state] Locking Datavault
18,938,509 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,674 UART: [state] Locking ICCM
18,943,585 UART: [exit] Launching FMC @ 0x40000130
18,952,273 UART:
18,952,502 UART: Running Caliptra FMC ...
18,953,594 UART:
18,953,750 UART: [state] CFI Enabled
19,012,601 UART: [fht] FMC Alias Private Key: 7
20,776,764 UART: [art] Extend RT PCRs Done
20,777,981 UART: [art] Lock RT PCRs Done
20,779,950 UART: [art] Populate DV Done
20,785,143 UART: [fht] FMC Alias Private Key: 7
20,786,733 UART: [art] Derive CDI
20,787,542 UART: [art] Store in in slot 0x4
20,845,604 UART: [art] Derive Key Pair
20,846,645 UART: [art] Store priv key in slot 0x5
23,309,545 UART: [art] Derive Key Pair - Done
23,322,322 UART: [art] Signing Cert with AUTHO
23,323,660 UART: RITY.KEYID = 7
25,035,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,851 UART: [art] PUB.X = 0E51678DB3408B7E8057FED1AFEB44C2681D702E0B908133E6418A18FD42B9A812AF4D04AE94F937DB4D828D3C67493C
25,044,159 UART: [art] PUB.Y = AEDBD5FA55EFCCFB0B1A95271FD63218F8F2A146140846DD4931A5EF6E2DDBFE0E845F1CA6BA0047C0E988D0C0EC8AD3
25,051,408 UART: [art] SIG.R = 5818620D4A4C2E60118EBD4F83D121128BA01F10E55599D6A0160F010D3C908CD4393B4E7005DDF79738F874D1B014EB
25,058,774 UART: [art] SIG.S = BF47F78F11A1D082AD6DFE92DD620ECA12883A32B5DF5EBF5BF2A6047CF0F0B1BED1D1D1D827CAABD2F53495FC575E37
26,037,473 UART: Caliptra RT
26,038,194 UART: [state] CFI Enabled
26,202,995 UART: [rt] RT listening for mailbox commands...
26,205,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,236,251 UART: [rt]cmd =0x44504543, len=96
30,594,054 >>> mbox cmd response data (6236 bytes)
30,623,415 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,653,818 UART: [rt]cmd =0x53574545, len=84
34,832,401 >>> mbox cmd response data (200 bytes)
35,215,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,245,961 UART: [rt]cmd =0x52564348, len=36
35,248,173 >>> mbox cmd response data (8 bytes)
35,248,618 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,279,018 UART: [rt]cmd =0x53574545, len=84
35,282,621 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,439,975 ready_for_fw is high
3,440,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,737,659 >>> mbox cmd response: success
19,047,394 UART:
19,047,807 UART: Running Caliptra FMC ...
19,048,923 UART:
19,049,081 UART: [state] CFI Enabled
19,113,313 UART: [fht] FMC Alias Private Key: 7
20,877,888 UART: [art] Extend RT PCRs Done
20,879,113 UART: [art] Lock RT PCRs Done
20,881,037 UART: [art] Populate DV Done
20,886,562 UART: [fht] FMC Alias Private Key: 7
20,888,206 UART: [art] Derive CDI
20,888,945 UART: [art] Store in in slot 0x4
20,945,825 UART: [art] Derive Key Pair
20,946,861 UART: [art] Store priv key in slot 0x5
23,410,108 UART: [art] Derive Key Pair - Done
23,423,222 UART: [art] Signing Cert with AUTHO
23,424,528 UART: RITY.KEYID = 7
25,135,597 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,108 UART: [art] PUB.X = 432A891B66CE37855FDF1A4AC8A6F170D597EABCE2771FDA36C9E75C005E5421CB8B92EACF56C3DF9BAA04793F37EA39
25,144,384 UART: [art] PUB.Y = BAE469522ED3282CFE38198FD2B0E2C9ADE5E4C5D8E52B8EC2E4F699C35FF37A25D737DA6B4C08406F222D686C84D25A
25,151,640 UART: [art] SIG.R = 93FB6AB34D6393E27A64D690F9BA245111516BDB2C3213870926A7668164FB3EA4BC3DE2617F1F3ADAC79EE9144E890B
25,159,062 UART: [art] SIG.S = 3F1E4FDE5E5926AFC0455CC5B51A60E733CD051030A1E70AC2BF21D81F6C8D07AE81D107B5681A46C429BA4C43A17D61
26,138,079 UART: Caliptra RT
26,138,789 UART: [state] CFI Enabled
26,303,843 UART: [rt] RT listening for mailbox commands...
26,306,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,613 UART: [rt]cmd =0x44504543, len=96
30,694,546 >>> mbox cmd response data (6236 bytes)
30,723,724 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,754,241 UART: [rt]cmd =0x53574545, len=84
34,933,093 >>> mbox cmd response data (200 bytes)
35,317,842 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,348,259 UART: [rt]cmd =0x52564348, len=36
35,351,271 >>> mbox cmd response data (8 bytes)
35,351,693 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,382,142 UART: [rt]cmd =0x53574545, len=84
35,385,698 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
193,108 UART:
193,472 UART: Running Caliptra ROM ...
194,673 UART:
604,431 UART: [state] CFI Enabled
618,450 UART: [state] LifecycleState = Unprovisioned
620,820 UART: [state] DebugLocked = No
622,915 UART: [state] WD Timer not started. Device not locked for debugging
627,957 UART: [kat] SHA2-256
817,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,643 UART: [kat] ++
829,250 UART: [kat] sha1
841,901 UART: [kat] SHA2-256
844,908 UART: [kat] SHA2-384
850,330 UART: [kat] SHA2-512-ACC
852,913 UART: [kat] ECC-384
3,293,774 UART: [kat] HMAC-384Kdf
3,307,099 UART: [kat] LMS
3,838,918 UART: [kat] --
3,842,203 UART: [cold-reset] ++
3,843,918 UART: [fht] FHT @ 0x50003400
3,855,392 UART: [idev] ++
3,856,109 UART: [idev] CDI.KEYID = 6
3,857,139 UART: [idev] SUBJECT.KEYID = 7
3,858,244 UART: [idev] UDS.KEYID = 0
3,859,186 ready_for_fw is high
3,859,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,740 UART: [idev] Erasing UDS.KEYID = 0
6,337,959 UART: [idev] Sha1 KeyId Algorithm
6,359,732 UART: [idev] --
6,363,782 UART: [ldev] ++
6,364,460 UART: [ldev] CDI.KEYID = 6
6,365,375 UART: [ldev] SUBJECT.KEYID = 5
6,366,534 UART: [ldev] AUTHORITY.KEYID = 7
6,367,763 UART: [ldev] FE.KEYID = 1
6,380,948 UART: [ldev] Erasing FE.KEYID = 1
8,861,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,411 UART: [ldev] --
10,654,512 UART: [fwproc] Wait for Commands...
10,657,419 UART: [fwproc] Recv command 0x46574c44
10,659,726 UART: [fwproc] Recv'd Img size: 114084 bytes
14,105,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,840,285 >>> mbox cmd response: success
14,843,645 UART: [afmc] ++
14,844,356 UART: [afmc] CDI.KEYID = 6
14,845,525 UART: [afmc] SUBJECT.KEYID = 7
14,847,014 UART: [afmc] AUTHORITY.KEYID = 5
17,353,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,108 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,889 UART: [afmc] --
19,150,387 UART: [cold-reset] --
19,156,415 UART: [state] Locking Datavault
19,160,975 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,129 UART: [state] Locking ICCM
19,165,320 UART: [exit] Launching FMC @ 0x40000130
19,173,995 UART:
19,174,231 UART: Running Caliptra FMC ...
19,175,256 UART:
19,175,404 UART: [state] CFI Enabled
19,183,829 UART: [fht] FMC Alias Private Key: 7
20,940,112 UART: [art] Extend RT PCRs Done
20,941,335 UART: [art] Lock RT PCRs Done
20,943,149 UART: [art] Populate DV Done
20,948,562 UART: [fht] FMC Alias Private Key: 7
20,950,283 UART: [art] Derive CDI
20,951,102 UART: [art] Store in in slot 0x4
20,993,483 UART: [art] Derive Key Pair
20,994,526 UART: [art] Store priv key in slot 0x5
23,420,541 UART: [art] Derive Key Pair - Done
23,433,592 UART: [art] Signing Cert with AUTHO
23,435,077 UART: RITY.KEYID = 7
25,140,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,200 UART: [art] PUB.X = 038935000BBF793128D2448FC40DC401E3714F1641F46DBDD60C27B846B6D0880B9C5A4FE2F10EE0D15767BBFEA87CCB
25,149,477 UART: [art] PUB.Y = 73E35216F48F8630D2E50DFCCD8E2D99D2D5295192414827E3DDF0E3704DE3B48C286BD1AE9499DE1BB3E4B530FC8459
25,156,739 UART: [art] SIG.R = F50AAA7D856F7AF5EE943FFF94ECB582349DBACB6F49B7D84E6CECAE10CD8331B5C0CC973506A5B921AFBE31C25DDB87
25,164,223 UART: [art] SIG.S = 0D7FF4F30AB2FD954E60D07BF39EBDAA5988E92643D618DE7FB1488BC087BC1F76639779440D4D7D6650A3171AD0D520
26,143,032 UART: Caliptra RT
26,143,742 UART: [state] CFI Enabled
26,261,571 UART: [rt] RT listening for mailbox commands...
26,263,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,294,395 UART: [rt]cmd =0x44504543, len=96
30,577,314 >>> mbox cmd response data (6236 bytes)
30,606,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,637,015 UART: [rt]cmd =0x53574545, len=84
34,772,147 >>> mbox cmd response data (200 bytes)
35,157,788 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,187,998 UART: [rt]cmd =0x52564348, len=36
35,190,205 >>> mbox cmd response data (8 bytes)
35,190,572 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,221,011 UART: [rt]cmd =0x53574545, len=84
35,224,549 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
3,754,311 ready_for_fw is high
3,754,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,944,125 >>> mbox cmd response: success
19,199,262 UART:
19,199,651 UART: Running Caliptra FMC ...
19,200,797 UART:
19,200,960 UART: [state] CFI Enabled
19,208,813 UART: [fht] FMC Alias Private Key: 7
20,965,149 UART: [art] Extend RT PCRs Done
20,966,377 UART: [art] Lock RT PCRs Done
20,967,957 UART: [art] Populate DV Done
20,973,397 UART: [fht] FMC Alias Private Key: 7
20,974,905 UART: [art] Derive CDI
20,975,690 UART: [art] Store in in slot 0x4
21,018,453 UART: [art] Derive Key Pair
21,019,463 UART: [art] Store priv key in slot 0x5
23,446,190 UART: [art] Derive Key Pair - Done
23,459,374 UART: [art] Signing Cert with AUTHO
23,460,690 UART: RITY.KEYID = 7
25,166,363 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,867 UART: [art] PUB.X = F8AD2FEE79CF1B7E78CA2AE9E042FF573F64FD7121C41739A73E1322D2A14FB3BACE41D60B8B516B93F617E17C941856
25,175,172 UART: [art] PUB.Y = 8BC4AD91D7B8B61FC29204D19FD5CC58660749107A6E5B1665C4684DDBD8405D85F620FD105B89DF28AE447B2CB2C4FC
25,182,403 UART: [art] SIG.R = D677216FFAAB21F6941274A1BA7326F0F201E604FB89B34F08E0D8FC8237A23A0C9C26AE6662C704011366D41871B70A
25,189,797 UART: [art] SIG.S = 95FC15BCC8EC2944C7913E6BD00B17CFEF644041FD49E214D134DE03CA5F45BE8F08D12541121E6AD1730E9D65CE0BEA
26,168,924 UART: Caliptra RT
26,169,619 UART: [state] CFI Enabled
26,287,147 UART: [rt] RT listening for mailbox commands...
26,289,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,320,095 UART: [rt]cmd =0x44504543, len=96
30,602,923 >>> mbox cmd response data (6236 bytes)
30,632,165 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,662,738 UART: [rt]cmd =0x53574545, len=84
34,798,483 >>> mbox cmd response data (200 bytes)
35,182,655 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,213,096 UART: [rt]cmd =0x52564348, len=36
35,216,084 >>> mbox cmd response data (8 bytes)
35,216,542 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,246,798 UART: [rt]cmd =0x53574545, len=84
35,250,640 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,326 UART: [kat] SHA2-512-ACC
897,227 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,765 UART: [cold-reset] ++
1,477,213 UART: [fht] Storing FHT @ 0x50003400
1,480,090 UART: [idev] ++
1,480,258 UART: [idev] CDI.KEYID = 6
1,480,618 UART: [idev] SUBJECT.KEYID = 7
1,481,042 UART: [idev] UDS.KEYID = 0
1,481,387 ready_for_fw is high
1,481,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,814 UART: [idev] Erasing UDS.KEYID = 0
1,505,308 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,514,761 UART: [ldev] ++
1,514,929 UART: [ldev] CDI.KEYID = 6
1,515,292 UART: [ldev] SUBJECT.KEYID = 5
1,515,718 UART: [ldev] AUTHORITY.KEYID = 7
1,516,181 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,546,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,370 UART: [ldev] --
1,586,779 UART: [fwproc] Waiting for Commands...
1,587,492 UART: [fwproc] Received command 0x46574c44
1,588,283 UART: [fwproc] Received Image of size 114084 bytes
2,882,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,720 >>> mbox cmd response: success
3,075,862 UART: [afmc] ++
3,076,030 UART: [afmc] CDI.KEYID = 6
3,076,392 UART: [afmc] SUBJECT.KEYID = 7
3,076,817 UART: [afmc] AUTHORITY.KEYID = 5
3,111,534 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,587 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,277 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,386 UART: [afmc] --
3,155,360 UART: [cold-reset] --
3,156,164 UART: [state] Locking Datavault
3,157,173 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,777 UART: [state] Locking ICCM
3,158,209 UART: [exit] Launching FMC @ 0x40000130
3,163,538 UART:
3,163,554 UART: Running Caliptra FMC ...
3,163,962 UART:
3,164,016 UART: [state] CFI Enabled
3,174,409 UART: [fht] FMC Alias Private Key: 7
3,282,312 UART: [art] Extend RT PCRs Done
3,282,740 UART: [art] Lock RT PCRs Done
3,284,078 UART: [art] Populate DV Done
3,292,179 UART: [fht] FMC Alias Private Key: 7
3,293,281 UART: [art] Derive CDI
3,293,561 UART: [art] Store in in slot 0x4
3,379,398 UART: [art] Derive Key Pair
3,379,758 UART: [art] Store priv key in slot 0x5
3,392,558 UART: [art] Derive Key Pair - Done
3,407,659 UART: [art] Signing Cert with AUTHO
3,408,139 UART: RITY.KEYID = 7
3,423,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,874 UART: [art] PUB.X = 67662C820FC5D00B87215ECCE405DA713AC9DD277C9DC6547EF88DA44278EA28408C4B24F3B316A502813B8B71443873
3,430,632 UART: [art] PUB.Y = 36E78E311EC474F6B0D2A033C327579CE03818A8D75B5233DE98D5AF3BA62D7FA38AD24415C360854402A2E738547529
3,437,575 UART: [art] SIG.R = 3AA096D06BBCAA87EA51E91D07CF5AA7B997F6ADD72EA3F83D2BDA23C7EFE9B8357A0FDDB1E1148BEC95BB83D578E36B
3,444,371 UART: [art] SIG.S = DCFFCAE9B38C5784238B9D953CA2652D4FEF1BC57C7B8D03CA3E1445AF891BEE7647E5293ABE872A6059BD792574A012
3,468,253 UART: Caliptra RT
3,468,506 UART: [state] CFI Enabled
3,575,905 UART: [rt] RT listening for mailbox commands...
3,576,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,909 UART: [rt]cmd =0x44504543, len=96
3,786,610 >>> mbox cmd response data (6236 bytes)
3,786,611 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,382 UART: [rt]cmd =0x53574545, len=84
3,842,875 >>> mbox cmd response data (200 bytes)
3,842,876 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,872,721 UART: [rt]cmd =0x52564348, len=36
3,874,914 >>> mbox cmd response data (8 bytes)
3,874,915 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,904,862 UART: [rt]cmd =0x53574545, len=84
3,908,016 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 ready_for_fw is high
1,362,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,072 >>> mbox cmd response: success
2,986,088 UART:
2,986,104 UART: Running Caliptra FMC ...
2,986,512 UART:
2,986,566 UART: [state] CFI Enabled
2,997,227 UART: [fht] FMC Alias Private Key: 7
3,104,556 UART: [art] Extend RT PCRs Done
3,104,984 UART: [art] Lock RT PCRs Done
3,106,406 UART: [art] Populate DV Done
3,114,577 UART: [fht] FMC Alias Private Key: 7
3,115,737 UART: [art] Derive CDI
3,116,017 UART: [art] Store in in slot 0x4
3,201,218 UART: [art] Derive Key Pair
3,201,578 UART: [art] Store priv key in slot 0x5
3,214,444 UART: [art] Derive Key Pair - Done
3,229,579 UART: [art] Signing Cert with AUTHO
3,230,059 UART: RITY.KEYID = 7
3,245,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,330 UART: [art] PUB.X = 1C4FE146F595939529D1B9967F91E66C3D0CB6B6B0BF311D497F5A6470DE00A9CE630519B1E3330329BCA13B802ED143
3,253,071 UART: [art] PUB.Y = 5D7DE979517F1C8F2CDD2885408E3A7866BE7453588315F0CA1C4C860D0D42A32CCD58AE9A6C32476E87FA3C1A3D4812
3,260,021 UART: [art] SIG.R = 29D03A5A15D506BFC7C18DED9C8B90976C5AAD29F22004C5B49C744E01CD4F634E5452D304C424EED4DC2A880D61A4E6
3,266,788 UART: [art] SIG.S = 2AF7AFE0DC4553EDE4CB76F509ACF30E301FBE7E575FDC82D506E260A5DABE829446DC17F78EE770C17DC166D446A018
3,291,002 UART: Caliptra RT
3,291,255 UART: [state] CFI Enabled
3,398,705 UART: [rt] RT listening for mailbox commands...
3,399,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,635 UART: [rt]cmd =0x44504543, len=96
3,609,631 >>> mbox cmd response data (6236 bytes)
3,609,632 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,599 UART: [rt]cmd =0x53574545, len=84
3,665,166 >>> mbox cmd response data (200 bytes)
3,665,167 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,622 UART: [rt]cmd =0x52564348, len=36
3,696,951 >>> mbox cmd response data (8 bytes)
3,696,952 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,727,085 UART: [rt]cmd =0x53574545, len=84
3,730,237 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,144 UART: [kat] SHA2-256
882,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,190 UART: [kat] ++
886,342 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,515 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,196 UART: [cold-reset] ++
1,476,660 UART: [fht] Storing FHT @ 0x50003400
1,479,363 UART: [idev] ++
1,479,531 UART: [idev] CDI.KEYID = 6
1,479,891 UART: [idev] SUBJECT.KEYID = 7
1,480,315 UART: [idev] UDS.KEYID = 0
1,480,660 ready_for_fw is high
1,480,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,361 UART: [idev] Erasing UDS.KEYID = 0
1,505,543 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,045 UART: [idev] --
1,515,094 UART: [ldev] ++
1,515,262 UART: [ldev] CDI.KEYID = 6
1,515,625 UART: [ldev] SUBJECT.KEYID = 5
1,516,051 UART: [ldev] AUTHORITY.KEYID = 7
1,516,514 UART: [ldev] FE.KEYID = 1
1,521,472 UART: [ldev] Erasing FE.KEYID = 1
1,546,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,512 UART: [fwproc] Waiting for Commands...
1,587,187 UART: [fwproc] Received command 0x46574c44
1,587,978 UART: [fwproc] Received Image of size 114084 bytes
2,882,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,909 >>> mbox cmd response: success
3,075,983 UART: [afmc] ++
3,076,151 UART: [afmc] CDI.KEYID = 6
3,076,513 UART: [afmc] SUBJECT.KEYID = 7
3,076,938 UART: [afmc] AUTHORITY.KEYID = 5
3,113,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,349 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,129 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,742 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,432 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,161 UART: [afmc] --
3,156,205 UART: [cold-reset] --
3,156,891 UART: [state] Locking Datavault
3,158,088 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,692 UART: [state] Locking ICCM
3,159,166 UART: [exit] Launching FMC @ 0x40000130
3,164,495 UART:
3,164,511 UART: Running Caliptra FMC ...
3,164,919 UART:
3,165,062 UART: [state] CFI Enabled
3,175,495 UART: [fht] FMC Alias Private Key: 7
3,282,942 UART: [art] Extend RT PCRs Done
3,283,370 UART: [art] Lock RT PCRs Done
3,284,918 UART: [art] Populate DV Done
3,293,165 UART: [fht] FMC Alias Private Key: 7
3,294,281 UART: [art] Derive CDI
3,294,561 UART: [art] Store in in slot 0x4
3,380,512 UART: [art] Derive Key Pair
3,380,872 UART: [art] Store priv key in slot 0x5
3,393,710 UART: [art] Derive Key Pair - Done
3,408,414 UART: [art] Signing Cert with AUTHO
3,408,894 UART: RITY.KEYID = 7
3,424,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,851 UART: [art] PUB.X = 15ACFEFD6D556A2A6645C82C44B2D0231AC1518D89FFF109ABCC0CA62CA2B53B127969EFC973009AC1AC6D318D84F128
3,431,609 UART: [art] PUB.Y = 658DAD9599DE9E3B974AD72A97AB60D5B4C44F1DCBBB79A35BA1F0E3CBBC842879D33E618A8FBC95FC60D77EBA22FB6A
3,438,587 UART: [art] SIG.R = 86E7483BFA2EEF0E9FD4DDEC242D98F1597B144FFE43D0F78D0F8D47CAC146C4C67F63D294AC03D83AA60ECADDC8D127
3,445,371 UART: [art] SIG.S = FD09DC507EF7DBD473C9B88EA25D4F3A64C9226628491499D343D11E2DC372EB10B42D1B6CFFD0F789E24B75E8CBFA28
3,469,447 UART: Caliptra RT
3,469,792 UART: [state] CFI Enabled
3,577,020 UART: [rt] RT listening for mailbox commands...
3,577,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,086 UART: [rt]cmd =0x44504543, len=96
3,788,915 >>> mbox cmd response data (6236 bytes)
3,788,916 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,679 UART: [rt]cmd =0x53574545, len=84
3,844,166 >>> mbox cmd response data (200 bytes)
3,844,167 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,873,612 UART: [rt]cmd =0x52564348, len=36
3,875,803 >>> mbox cmd response data (8 bytes)
3,875,804 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,809 UART: [rt]cmd =0x53574545, len=84
3,908,589 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,782 ready_for_fw is high
1,361,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,229 >>> mbox cmd response: success
2,984,101 UART:
2,984,117 UART: Running Caliptra FMC ...
2,984,525 UART:
2,984,668 UART: [state] CFI Enabled
2,995,243 UART: [fht] FMC Alias Private Key: 7
3,102,804 UART: [art] Extend RT PCRs Done
3,103,232 UART: [art] Lock RT PCRs Done
3,104,688 UART: [art] Populate DV Done
3,112,909 UART: [fht] FMC Alias Private Key: 7
3,114,015 UART: [art] Derive CDI
3,114,295 UART: [art] Store in in slot 0x4
3,199,928 UART: [art] Derive Key Pair
3,200,288 UART: [art] Store priv key in slot 0x5
3,213,010 UART: [art] Derive Key Pair - Done
3,227,869 UART: [art] Signing Cert with AUTHO
3,228,349 UART: RITY.KEYID = 7
3,243,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,724 UART: [art] PUB.X = EA2A30FAB27B2CF031FDFAEEE261CFD49397D49221B5DB01EC94223E8281F530D1193B7A28109F330097C0E2C2BE7579
3,251,479 UART: [art] PUB.Y = 90D97CFC23EE564DA354C5DC6D5C7242DEEDE7753E490515A28375DB54B9D0FD5501884B1BC8EDD9B8F5BA432E08A882
3,258,434 UART: [art] SIG.R = 4A336FCE53DC49BF75DA4779340A80B7AEE52C6AC7B20AD8C54C89D5F50CAD834909CFAACA6DE4031381D0D1A5CE3F10
3,265,211 UART: [art] SIG.S = ACECF3DF2A2E990FF0C85F6E09DEF1E3E914B358F5E25162B7AF8F92152850F2EC83400AF9E035B61ADC61B89BBDCB84
3,288,801 UART: Caliptra RT
3,289,146 UART: [state] CFI Enabled
3,397,199 UART: [rt] RT listening for mailbox commands...
3,397,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,153 UART: [rt]cmd =0x44504543, len=96
3,608,890 >>> mbox cmd response data (6236 bytes)
3,608,891 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,942 UART: [rt]cmd =0x53574545, len=84
3,664,011 >>> mbox cmd response data (200 bytes)
3,664,012 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,355 UART: [rt]cmd =0x52564348, len=36
3,695,434 >>> mbox cmd response data (8 bytes)
3,695,435 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,725,172 UART: [rt]cmd =0x53574545, len=84
3,728,352 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,686 UART: [state] LifecycleState = Unprovisioned
86,341 UART: [state] DebugLocked = No
87,055 UART: [state] WD Timer not started. Device not locked for debugging
88,278 UART: [kat] SHA2-256
893,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,053 UART: [kat] ++
898,205 UART: [kat] sha1
902,477 UART: [kat] SHA2-256
904,417 UART: [kat] SHA2-384
907,150 UART: [kat] SHA2-512-ACC
909,051 UART: [kat] ECC-384
918,862 UART: [kat] HMAC-384Kdf
923,400 UART: [kat] LMS
1,171,728 UART: [kat] --
1,172,551 UART: [cold-reset] ++
1,173,083 UART: [fht] FHT @ 0x50003400
1,175,880 UART: [idev] ++
1,176,048 UART: [idev] CDI.KEYID = 6
1,176,408 UART: [idev] SUBJECT.KEYID = 7
1,176,832 UART: [idev] UDS.KEYID = 0
1,177,177 ready_for_fw is high
1,177,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,806 UART: [idev] Erasing UDS.KEYID = 0
1,201,823 UART: [idev] Sha1 KeyId Algorithm
1,210,323 UART: [idev] --
1,211,267 UART: [ldev] ++
1,211,435 UART: [ldev] CDI.KEYID = 6
1,211,798 UART: [ldev] SUBJECT.KEYID = 5
1,212,224 UART: [ldev] AUTHORITY.KEYID = 7
1,212,687 UART: [ldev] FE.KEYID = 1
1,217,969 UART: [ldev] Erasing FE.KEYID = 1
1,244,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,309 UART: [ldev] --
1,283,656 UART: [fwproc] Wait for Commands...
1,284,356 UART: [fwproc] Recv command 0x46574c44
1,285,084 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,461 >>> mbox cmd response: success
2,772,603 UART: [afmc] ++
2,772,771 UART: [afmc] CDI.KEYID = 6
2,773,133 UART: [afmc] SUBJECT.KEYID = 7
2,773,558 UART: [afmc] AUTHORITY.KEYID = 5
2,809,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,480 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,852 UART: [afmc] --
2,852,748 UART: [cold-reset] --
2,853,700 UART: [state] Locking Datavault
2,854,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,503 UART: [state] Locking ICCM
2,856,015 UART: [exit] Launching FMC @ 0x40000130
2,861,344 UART:
2,861,360 UART: Running Caliptra FMC ...
2,861,768 UART:
2,861,822 UART: [state] CFI Enabled
2,872,119 UART: [fht] FMC Alias Private Key: 7
2,980,012 UART: [art] Extend RT PCRs Done
2,980,440 UART: [art] Lock RT PCRs Done
2,981,732 UART: [art] Populate DV Done
2,989,925 UART: [fht] FMC Alias Private Key: 7
2,990,955 UART: [art] Derive CDI
2,991,235 UART: [art] Store in in slot 0x4
3,076,994 UART: [art] Derive Key Pair
3,077,354 UART: [art] Store priv key in slot 0x5
3,091,230 UART: [art] Derive Key Pair - Done
3,105,601 UART: [art] Signing Cert with AUTHO
3,106,081 UART: RITY.KEYID = 7
3,120,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,460 UART: [art] PUB.X = 335EEFC7694E699804AC1185D3C3AC67F6EA7084C8708295DEBED4A25B40D599F75DE19A62C60F70354E8652CA42F2FD
3,128,232 UART: [art] PUB.Y = 9CDD59F9856BC1E8E725F10AC5F037ECE7FA93EB6FDF4C16589FD45A318061FDA2A6DEC7DD47D2CFA8045B2F5721570F
3,135,195 UART: [art] SIG.R = F14B34C1680B61CEF6C5FE86CFBAEB232D35CF0045EB711FC1EDC4FB17FF327D8302AC354B3A31C48C64C62F9D688895
3,141,955 UART: [art] SIG.S = 777266FA0B137AEDAEEE5DF7AF90D87D01EA98D690D90DA2C7206E83C162CA25ECAF2ADBE94DA80DDBEDCCBDDBCAE45D
3,165,764 UART: Caliptra RT
3,166,017 UART: [state] CFI Enabled
3,272,784 UART: [rt] RT listening for mailbox commands...
3,273,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,134 UART: [rt]cmd =0x44504543, len=96
3,484,829 >>> mbox cmd response data (6236 bytes)
3,484,830 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,765 UART: [rt]cmd =0x53574545, len=84
3,540,406 >>> mbox cmd response data (200 bytes)
3,540,407 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,938 UART: [rt]cmd =0x52564348, len=36
3,572,175 >>> mbox cmd response data (8 bytes)
3,572,176 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,601,993 UART: [rt]cmd =0x53574545, len=84
3,604,831 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,651 ready_for_fw is high
1,059,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,774 >>> mbox cmd response: success
2,682,210 UART:
2,682,226 UART: Running Caliptra FMC ...
2,682,634 UART:
2,682,688 UART: [state] CFI Enabled
2,693,325 UART: [fht] FMC Alias Private Key: 7
2,800,688 UART: [art] Extend RT PCRs Done
2,801,116 UART: [art] Lock RT PCRs Done
2,802,750 UART: [art] Populate DV Done
2,810,943 UART: [fht] FMC Alias Private Key: 7
2,811,901 UART: [art] Derive CDI
2,812,181 UART: [art] Store in in slot 0x4
2,897,360 UART: [art] Derive Key Pair
2,897,720 UART: [art] Store priv key in slot 0x5
2,910,766 UART: [art] Derive Key Pair - Done
2,925,713 UART: [art] Signing Cert with AUTHO
2,926,193 UART: RITY.KEYID = 7
2,941,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,032 UART: [art] PUB.X = 371E80A51635B25B37089659585BF6C60B5A554ABFA70BA29C833B5A680249E0EDBAE217270F964D1E88ED4C6E5236F5
2,948,789 UART: [art] PUB.Y = 8313C00CFDF25696CF580F6AB2FE8F080B81A3E1EF8CD74A4651A9FA8F9338C4143A0D26846315A5BD67D2000EC8BA00
2,955,687 UART: [art] SIG.R = E5300A6BC4485BE83DAE6223D154F9BF6516B9342C20456257F2715BF9EAAAC8FA197DDA66B35B156AF7F3D8351AB45B
2,962,466 UART: [art] SIG.S = 06E662DD2A9DBC852B0733EC6F95A2B9671A10D81E91C9BB21EFB462C514663A91D93EDF34A1FDEA109CB6C445B1C3F6
2,985,799 UART: Caliptra RT
2,986,052 UART: [state] CFI Enabled
3,093,099 UART: [rt] RT listening for mailbox commands...
3,093,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,091 UART: [rt]cmd =0x44504543, len=96
3,302,864 >>> mbox cmd response data (6236 bytes)
3,302,865 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,844 UART: [rt]cmd =0x53574545, len=84
3,357,879 >>> mbox cmd response data (200 bytes)
3,357,880 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,473 UART: [rt]cmd =0x52564348, len=36
3,389,454 >>> mbox cmd response data (8 bytes)
3,389,455 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,419,192 UART: [rt]cmd =0x53574545, len=84
3,422,102 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
893,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,800 UART: [kat] ++
897,952 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,639 UART: [kat] SHA2-512-ACC
908,540 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,118 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 ready_for_fw is high
1,176,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,201,788 UART: [idev] Sha1 KeyId Algorithm
1,210,150 UART: [idev] --
1,211,280 UART: [ldev] ++
1,211,448 UART: [ldev] CDI.KEYID = 6
1,211,811 UART: [ldev] SUBJECT.KEYID = 5
1,212,237 UART: [ldev] AUTHORITY.KEYID = 7
1,212,700 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,243,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,480 UART: [ldev] --
1,282,833 UART: [fwproc] Wait for Commands...
1,283,651 UART: [fwproc] Recv command 0x46574c44
1,284,379 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,966 >>> mbox cmd response: success
2,773,060 UART: [afmc] ++
2,773,228 UART: [afmc] CDI.KEYID = 6
2,773,590 UART: [afmc] SUBJECT.KEYID = 7
2,774,015 UART: [afmc] AUTHORITY.KEYID = 5
2,809,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,725 UART: [afmc] --
2,853,637 UART: [cold-reset] --
2,854,649 UART: [state] Locking Datavault
2,855,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,540 UART: [state] Locking ICCM
2,857,088 UART: [exit] Launching FMC @ 0x40000130
2,862,417 UART:
2,862,433 UART: Running Caliptra FMC ...
2,862,841 UART:
2,862,984 UART: [state] CFI Enabled
2,873,351 UART: [fht] FMC Alias Private Key: 7
2,981,524 UART: [art] Extend RT PCRs Done
2,981,952 UART: [art] Lock RT PCRs Done
2,983,594 UART: [art] Populate DV Done
2,991,685 UART: [fht] FMC Alias Private Key: 7
2,992,803 UART: [art] Derive CDI
2,993,083 UART: [art] Store in in slot 0x4
3,078,558 UART: [art] Derive Key Pair
3,078,918 UART: [art] Store priv key in slot 0x5
3,092,492 UART: [art] Derive Key Pair - Done
3,107,429 UART: [art] Signing Cert with AUTHO
3,107,909 UART: RITY.KEYID = 7
3,123,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,064 UART: [art] PUB.X = 66A42BA90A91A801892BEEA73AEF31DF47E5CC6BA5E13CEDF6EB37A7B7F32F1606B8D02CA5E334633F5EB0C6DD82A341
3,130,847 UART: [art] PUB.Y = 6E043ED7958843CC018C0D591B32D2CB67C916A12BD04D0D56AC3976898FB4291ED98F0FDDC5F2ADB541F290F33F05FE
3,137,791 UART: [art] SIG.R = 782D435A74B4B5EB6EDF2932B9526A2C3F8729E47DE9E8AD39C7D962C2CE5FC707459B6E937C2CE7E0B8721C9072D3D9
3,144,568 UART: [art] SIG.S = DB87EF82C6BAC52A043F0EEDBFD0C39E08F4CE4CA4E88CA78CA01F6BC53DD5D5F4D2299E5360E63AA86BB39AAC9B927F
3,168,394 UART: Caliptra RT
3,168,739 UART: [state] CFI Enabled
3,277,152 UART: [rt] RT listening for mailbox commands...
3,277,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,140 UART: [rt]cmd =0x44504543, len=96
3,489,601 >>> mbox cmd response data (6236 bytes)
3,489,602 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,459 UART: [rt]cmd =0x53574545, len=84
3,544,756 >>> mbox cmd response data (200 bytes)
3,544,757 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,238 UART: [rt]cmd =0x52564348, len=36
3,576,139 >>> mbox cmd response data (8 bytes)
3,576,140 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,109 UART: [rt]cmd =0x53574545, len=84
3,609,229 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 ready_for_fw is high
1,060,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,775 >>> mbox cmd response: success
2,686,311 UART:
2,686,327 UART: Running Caliptra FMC ...
2,686,735 UART:
2,686,878 UART: [state] CFI Enabled
2,697,273 UART: [fht] FMC Alias Private Key: 7
2,804,650 UART: [art] Extend RT PCRs Done
2,805,078 UART: [art] Lock RT PCRs Done
2,806,736 UART: [art] Populate DV Done
2,814,815 UART: [fht] FMC Alias Private Key: 7
2,815,949 UART: [art] Derive CDI
2,816,229 UART: [art] Store in in slot 0x4
2,902,214 UART: [art] Derive Key Pair
2,902,574 UART: [art] Store priv key in slot 0x5
2,915,858 UART: [art] Derive Key Pair - Done
2,930,621 UART: [art] Signing Cert with AUTHO
2,931,101 UART: RITY.KEYID = 7
2,946,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,180 UART: [art] PUB.X = 1EC3F9EC2B42A25A1714AC91924942F9AFBA0B9DFBFEEC1CEA8250B3035D51AE3B2A03957237405075E4F5EE7A1F3339
2,953,955 UART: [art] PUB.Y = 7E0D0CC4E4EE760D354CE58C2324E761BDA43CDBE74A29D32C783DC230D7927D043CB1CD2B7E2DBBACCB0970E83871D3
2,960,910 UART: [art] SIG.R = 15A156B538248557F18522D93DA4767B5C797F89159B3B313B579F4C0945BBD79ADE1476FF5B46ABC52A0D578F1FC9E8
2,967,676 UART: [art] SIG.S = CC4141A768E332CCAE11B8146FD54666B8BD26BDD4D5A96F1AE3793383C777202AA06A0A7D509113FEEE812F16B2627A
2,991,716 UART: Caliptra RT
2,992,061 UART: [state] CFI Enabled
3,098,984 UART: [rt] RT listening for mailbox commands...
3,099,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,310 UART: [rt]cmd =0x44504543, len=96
3,311,748 >>> mbox cmd response data (6236 bytes)
3,311,749 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,614 UART: [rt]cmd =0x53574545, len=84
3,367,307 >>> mbox cmd response data (200 bytes)
3,367,308 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,743 UART: [rt]cmd =0x52564348, len=36
3,398,980 >>> mbox cmd response data (8 bytes)
3,398,981 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,760 UART: [rt]cmd =0x53574545, len=84
3,431,784 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
916,472 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 ready_for_fw is high
1,174,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,931 UART: [idev] Erasing UDS.KEYID = 0
1,198,357 UART: [idev] Sha1 KeyId Algorithm
1,207,091 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,214,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,378 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,369 UART: [fwproc] Recv command 0x46574c44
1,282,102 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,873 >>> mbox cmd response: success
2,770,022 UART: [afmc] ++
2,770,190 UART: [afmc] CDI.KEYID = 6
2,770,553 UART: [afmc] SUBJECT.KEYID = 7
2,770,979 UART: [afmc] AUTHORITY.KEYID = 5
2,805,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,709 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,807 UART: [afmc] --
2,848,749 UART: [cold-reset] --
2,849,575 UART: [state] Locking Datavault
2,850,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,228 UART: [state] Locking ICCM
2,851,740 UART: [exit] Launching FMC @ 0x40000130
2,857,069 UART:
2,857,085 UART: Running Caliptra FMC ...
2,857,493 UART:
2,857,547 UART: [state] CFI Enabled
2,868,128 UART: [fht] FMC Alias Private Key: 7
2,976,093 UART: [art] Extend RT PCRs Done
2,976,521 UART: [art] Lock RT PCRs Done
2,978,145 UART: [art] Populate DV Done
2,986,144 UART: [fht] FMC Alias Private Key: 7
2,987,158 UART: [art] Derive CDI
2,987,438 UART: [art] Store in in slot 0x4
3,073,097 UART: [art] Derive Key Pair
3,073,457 UART: [art] Store priv key in slot 0x5
3,086,315 UART: [art] Derive Key Pair - Done
3,100,931 UART: [art] Signing Cert with AUTHO
3,101,411 UART: RITY.KEYID = 7
3,116,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,988 UART: [art] PUB.X = 47B639C18C21108181B0180728A0A23F220BAF56384D7BF095153A7ABE65CBE45C16A948AD74BFEFFA91F770F45291D6
3,123,756 UART: [art] PUB.Y = 210FFEF1DE1D581E0B29DE10B6A69E2903EF27A89DC6F5AA9ADFC36EF6DCCD3763378714FD83F719EA1BF92B20BCBD37
3,130,723 UART: [art] SIG.R = A68F9D52E66CBA5A553154F5641515D2B68454A93F3EF5D29CCFF37134AF091E5043788EC9AC01785C0FA5CA21C6A133
3,137,490 UART: [art] SIG.S = 1A642E81FD7A612AA4DBBCA692B886D823199FD4CFB34D9FE8CAFA131ED8ACC4A266FEC8F45B94F1485D3987AD564EC9
3,161,175 UART: Caliptra RT
3,161,428 UART: [state] CFI Enabled
3,269,579 UART: [rt] RT listening for mailbox commands...
3,270,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,491 UART: [rt]cmd =0x44504543, len=96
3,479,984 >>> mbox cmd response data (6236 bytes)
3,479,985 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,910 UART: [rt]cmd =0x53574545, len=84
3,536,089 >>> mbox cmd response data (200 bytes)
3,536,090 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,687 UART: [rt]cmd =0x52564348, len=36
3,567,694 >>> mbox cmd response data (8 bytes)
3,567,695 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,490 UART: [rt]cmd =0x53574545, len=84
3,600,622 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 ready_for_fw is high
1,055,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,731 >>> mbox cmd response: success
2,678,681 UART:
2,678,697 UART: Running Caliptra FMC ...
2,679,105 UART:
2,679,159 UART: [state] CFI Enabled
2,689,830 UART: [fht] FMC Alias Private Key: 7
2,798,123 UART: [art] Extend RT PCRs Done
2,798,551 UART: [art] Lock RT PCRs Done
2,799,893 UART: [art] Populate DV Done
2,808,000 UART: [fht] FMC Alias Private Key: 7
2,808,984 UART: [art] Derive CDI
2,809,264 UART: [art] Store in in slot 0x4
2,895,329 UART: [art] Derive Key Pair
2,895,689 UART: [art] Store priv key in slot 0x5
2,908,561 UART: [art] Derive Key Pair - Done
2,923,319 UART: [art] Signing Cert with AUTHO
2,923,799 UART: RITY.KEYID = 7
2,938,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,496 UART: [art] PUB.X = 9073651C5DBBDC09CECF24264B28DE1180BCC0AA8686CE24693544A8A7628B66CC3B0906F762FAC19509F7FCB5DCD0B7
2,946,268 UART: [art] PUB.Y = C041532B2158B64C8676B77A89ABF1EEE0AD6B28BB7D2A4EF4EF753C422F9D45FBB70C48E2BB7712514A494BFB6681E2
2,953,229 UART: [art] SIG.R = A109F5D9A911A474C943D43900C21C86C82B59B91767B58FA0AC94F2ADD29DFACCBEB5F5872675E01CBBDC3C16315ED0
2,959,990 UART: [art] SIG.S = 393C9333A20828B01CB6812867C12A47841A6D8DB4E94C7A2D23B0D840616A87862AC68545E3283D825D32A38EDBE2EC
2,983,844 UART: Caliptra RT
2,984,097 UART: [state] CFI Enabled
3,092,130 UART: [rt] RT listening for mailbox commands...
3,092,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,226 UART: [rt]cmd =0x44504543, len=96
3,302,802 >>> mbox cmd response data (6236 bytes)
3,302,803 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,612 UART: [rt]cmd =0x53574545, len=84
3,358,837 >>> mbox cmd response data (200 bytes)
3,358,838 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,388,551 UART: [rt]cmd =0x52564348, len=36
3,390,520 >>> mbox cmd response data (8 bytes)
3,390,521 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,420,562 UART: [rt]cmd =0x53574545, len=84
3,424,046 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,462 UART: [kat] SHA2-256
901,402 UART: [kat] SHA2-384
904,135 UART: [kat] SHA2-512-ACC
906,036 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,356 UART: [cold-reset] ++
1,170,892 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,174,758 ready_for_fw is high
1,174,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,199,774 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,165 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,760 >>> mbox cmd response: success
2,771,923 UART: [afmc] ++
2,772,091 UART: [afmc] CDI.KEYID = 6
2,772,454 UART: [afmc] SUBJECT.KEYID = 7
2,772,880 UART: [afmc] AUTHORITY.KEYID = 5
2,808,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,784 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,503 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,290 UART: [afmc] --
2,852,318 UART: [cold-reset] --
2,853,312 UART: [state] Locking Datavault
2,854,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,239 UART: [state] Locking ICCM
2,855,813 UART: [exit] Launching FMC @ 0x40000130
2,861,142 UART:
2,861,158 UART: Running Caliptra FMC ...
2,861,566 UART:
2,861,709 UART: [state] CFI Enabled
2,872,422 UART: [fht] FMC Alias Private Key: 7
2,981,155 UART: [art] Extend RT PCRs Done
2,981,583 UART: [art] Lock RT PCRs Done
2,982,921 UART: [art] Populate DV Done
2,991,204 UART: [fht] FMC Alias Private Key: 7
2,992,308 UART: [art] Derive CDI
2,992,588 UART: [art] Store in in slot 0x4
3,078,647 UART: [art] Derive Key Pair
3,079,007 UART: [art] Store priv key in slot 0x5
3,092,197 UART: [art] Derive Key Pair - Done
3,107,104 UART: [art] Signing Cert with AUTHO
3,107,584 UART: RITY.KEYID = 7
3,123,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,857 UART: [art] PUB.X = 27FEF020405737DD8948A50B813905773BDDA0A669AA16CD93A7FDC1B7FB133FD79F45A8DB39B37BA1B5162BBD1EB14E
3,130,637 UART: [art] PUB.Y = 7C70050DF4E211BACD062DA7BBAFD2DE17EE270FE426DBBA2D5B78BD9D4F62828863595B54D81CB445F22F0289F49423
3,137,586 UART: [art] SIG.R = 9D0D4C63F3775A88F85D15B6C1A467B101A6941B3CAB4A0016479A470E13CAC9F5167242C3840828464EFA561A3F7926
3,144,318 UART: [art] SIG.S = 03EDDA3293237779C88D5DCA4E901D4EFAE2D98FBE72B6836A852BD02B105AFBD0F31CE47009A9C674B38912015E3251
3,168,626 UART: Caliptra RT
3,168,971 UART: [state] CFI Enabled
3,276,800 UART: [rt] RT listening for mailbox commands...
3,277,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,736 UART: [rt]cmd =0x44504543, len=96
3,488,341 >>> mbox cmd response data (6236 bytes)
3,488,342 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,097 UART: [rt]cmd =0x53574545, len=84
3,543,300 >>> mbox cmd response data (200 bytes)
3,543,301 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,768 UART: [rt]cmd =0x52564348, len=36
3,574,903 >>> mbox cmd response data (8 bytes)
3,574,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,827 UART: [rt]cmd =0x53574545, len=84
3,607,895 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,967 ready_for_fw is high
1,055,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,624 >>> mbox cmd response: success
2,682,148 UART:
2,682,164 UART: Running Caliptra FMC ...
2,682,572 UART:
2,682,715 UART: [state] CFI Enabled
2,693,160 UART: [fht] FMC Alias Private Key: 7
2,802,285 UART: [art] Extend RT PCRs Done
2,802,713 UART: [art] Lock RT PCRs Done
2,803,957 UART: [art] Populate DV Done
2,812,080 UART: [fht] FMC Alias Private Key: 7
2,813,218 UART: [art] Derive CDI
2,813,498 UART: [art] Store in in slot 0x4
2,899,113 UART: [art] Derive Key Pair
2,899,473 UART: [art] Store priv key in slot 0x5
2,912,535 UART: [art] Derive Key Pair - Done
2,927,509 UART: [art] Signing Cert with AUTHO
2,927,989 UART: RITY.KEYID = 7
2,942,763 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,528 UART: [art] PUB.X = A1340283BFD3A1737FE91AE6488389EFCEEAEE65C19AC410BA31CA9CB3225B004BFFCBDD98FAF1123BE63531F59C444B
2,950,295 UART: [art] PUB.Y = D016FF33C118AE518C329B8E99D94206370237D8347D55535D22CC0F18E36526E20906E7C0EF8A90F3499F12D9448017
2,957,220 UART: [art] SIG.R = 520BEBA2E5C219A706AE3398A96EA34FFA132A78E6A5B01F79B0434584508BCBAA6D95AC5ABD03FEF6E2C3FF70150658
2,963,994 UART: [art] SIG.S = 20FEBA0BFB45A50A103B53DB3C9A3D226E76D4824D1758FF1DEF957A28953EE7C98CA483C4B657E97088886A4B0300A6
2,988,080 UART: Caliptra RT
2,988,425 UART: [state] CFI Enabled
3,095,482 UART: [rt] RT listening for mailbox commands...
3,096,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,492 UART: [rt]cmd =0x44504543, len=96
3,306,860 >>> mbox cmd response data (6236 bytes)
3,306,861 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,826 UART: [rt]cmd =0x53574545, len=84
3,362,781 >>> mbox cmd response data (200 bytes)
3,362,782 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,287 UART: [rt]cmd =0x52564348, len=36
3,394,260 >>> mbox cmd response data (8 bytes)
3,394,261 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,424,300 UART: [rt]cmd =0x53574545, len=84
3,427,692 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.22s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,102,495 UART: [fwproc] Received Image of size 78492 bytes
16,731,554 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,807,137 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,876,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,068,304 >>> mbox cmd response: success
17,068,776 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,072,675 UART: [afmc] ++
17,073,312 UART: [afmc] CDI.KEYID = 6
17,074,237 UART: [afmc] SUBJECT.KEYID = 7
17,075,459 UART: [afmc] AUTHORITY.KEYID = 5
20,431,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,733,904 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,736,213 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,750,573 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,765,443 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,779,855 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,802,009 UART: [afmc] --
22,806,096 UART: [cold-reset] --
22,809,636 UART: [state] Locking Datavault
22,815,714 UART: [state] Locking PCR0, PCR1 and PCR31
22,817,416 UART: [state] Locking ICCM
22,819,893 UART: [exit] Launching FMC @ 0x40000130
22,828,296 UART:
22,828,532 UART: Running Caliptra FMC ...
22,829,632 UART:
22,829,795 UART: [state] CFI Enabled
22,892,994 UART: [fht] FMC Alias Private Key: 7
25,230,986 UART: [art] Extend RT PCRs Done
25,232,348 UART: [art] Lock RT PCRs Done
25,234,251 UART: [art] Populate DV Done
25,239,446 UART: [fht] FMC Alias Private Key: 7
25,240,984 UART: [art] Derive CDI
25,241,797 UART: [art] Store in in slot 0x4
25,300,429 UART: [art] Derive Key Pair
25,301,428 UART: [art] Store priv key in slot 0x5
28,594,256 UART: [art] Derive Key Pair - Done
28,607,252 UART: [art] Signing Cert with AUTHO
28,608,563 UART: RITY.KEYID = 7
30,895,497 UART: [art] Erasing AUTHORITY.KEYID = 7
30,897,005 UART: [art] PUB.X = B3D0662A4AC941776E9C585765F4021344E3D3C991B4816B38B89E9C3F4D1B509B09C365A5F0778D52A9FBE4DAB79A0A
30,904,252 UART: [art] PUB.Y = 3CED017D6F4473821A1AF25DF75C20B9765CA29293B07C0E47BE6EEEE30D0ADE1616C4115BFA78C597DB240D5275E8C3
30,911,632 UART: [art] SIG.R = 66E0F27A0A69ED3A1289DC2D5BB13A2C059F3EE19CCD4D5254D194F40A2EA283D2018BEA334054819AD5FE1C700A730A
30,918,904 UART: [art] SIG.S = 5D53080394CADA846BED88E68D776FBEF8C198DD2D5CE1ACA049A25AE24D4C71464D5CBF9D0E12B4E6A49F14DD2D1042
32,223,463 UART: mbox::rt_entry...
32,224,404 UART: ____ _ _ _ ____ _____
32,226,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,228,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,230,333 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,232,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,234,120 UART: |_|
32,234,977 UART:
32,347,974 UART: [rt] Runtime listening for mailbox commands...
32,350,145 >>> mbox cmd response data (48 bytes)
34,404,512 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,548,843 UART:
34,549,223 UART: Running Caliptra ROM ...
34,550,313 UART:
34,550,477 UART: [state] CFI Enabled
34,628,927 UART: [state] LifecycleState = Unprovisioned
34,630,871 UART: [state] DebugLocked = No
34,633,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,639,023 UART: [kat] SHA2-256
34,808,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,819,195 UART: [kat] ++
34,819,737 UART: [kat] sha1
34,829,663 UART: [kat] SHA2-256
34,832,328 UART: [kat] SHA2-384
34,838,096 UART: [kat] SHA2-512-ACC
34,840,464 UART: [kat] ECC-384
37,130,420 UART: [kat] HMAC-384Kdf
37,162,681 UART: [kat] LMS
38,353,035 UART: [kat] --
38,356,827 UART: [update-reset] ++
42,487,054 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,490,239 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,871,219 >>> mbox cmd response: success
42,871,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,872,842 UART: [update-reset] Copying MAN_2 To MAN_1
42,895,287 UART: [update-reset Success] --
42,899,357 UART: [state] Locking Datavault
42,904,120 UART: [state] Locking PCR0, PCR1 and PCR31
42,905,902 UART: [state] Locking ICCM
42,908,301 UART: [exit] Launching FMC @ 0x40000130
42,916,728 UART:
42,917,007 UART: Running Caliptra FMC ...
42,918,048 UART:
42,918,198 UART: [state] CFI Enabled
43,018,710 UART: [art] Extend RT PCRs Done
43,019,895 UART: [art] Lock RT PCRs Done
43,021,062 UART: [art] Populate DV Done
43,026,523 UART: [fht] FMC Alias Private Key: 7
43,028,115 UART: [art] Derive CDI
43,028,932 UART: [art] Store in in slot 0x4
43,088,238 UART: [art] Derive Key Pair
43,089,282 UART: [art] Store priv key in slot 0x5
46,382,005 UART: [art] Derive Key Pair - Done
46,395,273 UART: [art] Signing Cert with AUTHO
46,396,581 UART: RITY.KEYID = 7
48,683,727 UART: [art] Erasing AUTHORITY.KEYID = 7
48,685,231 UART: [art] PUB.X = 1679EBA16C31EF6F5FDF10D0E737E8354857F5B8C0BFCFD876963092A6E8EF3E2B4973466ACD6281999BC87544ECAFD4
48,692,477 UART: [art] PUB.Y = 650F6371AF2047AE752D1304965CA7C120D9B64949CFB27FAC31F3EC7A6253367628A7A70F70B2100067352B86AF1B63
48,699,708 UART: [art] SIG.R = C919AE24454594EE180BDE278E32FFCC5E86FA16E951006E00A9B3CF9990CADE2A260BA390673496846F3281FE57D885
48,707,052 UART: [art] SIG.S = 95F047FD8C17D99298DB093A53E8CDD9D088169454DF56F4965630BD393B15449BAE0D28C0D219D83C15A727C555DDDD
50,012,029 UART: Caliptra RT
50,012,747 UART: [state] CFI Enabled
50,345,512 UART: [rt] RT listening for mailbox commands...
50,377,350 UART: [rt]cmd =0x4d454153, len=108
50,396,252 >>> mbox cmd response data (12 bytes)
52,437,063 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,537,255 UART:
52,537,638 UART: Running Caliptra ROM ...
52,538,689 UART:
52,538,842 UART: [state] CFI Enabled
52,606,065 UART: [state] LifecycleState = Unprovisioned
52,608,012 UART: [state] DebugLocked = No
52,610,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,615,629 UART: [kat] SHA2-256
52,785,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,795,850 UART: [kat] ++
52,796,312 UART: [kat] sha1
52,806,605 UART: [kat] SHA2-256
52,809,291 UART: [kat] SHA2-384
52,816,032 UART: [kat] SHA2-512-ACC
52,818,406 UART: [kat] ECC-384
55,111,761 UART: [kat] HMAC-384Kdf
55,143,443 UART: [kat] LMS
56,333,764 UART: [kat] --
56,336,587 UART: [update-reset] ++
60,042,320 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,046,221 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
60,303,800 >>> mbox cmd response: success
62,342,367 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
62,441,786 UART: [update-reset] Copying MAN_2 To MAN_1
62,443,480 UART: [update-reset Success] --
62,444,647 UART: [state] Locking Datavault
62,445,794 UART: [state] Locking PCR0, PCR1 and PCR31
62,447,353 UART: [state] Locking ICCM
62,448,286 UART: [exit] Launching FMC @ 0x40000130
62,449,720 UART:
62,449,886 UART: Running Caliptra FMC ...
62,450,988 UART:
62,451,146 UART: [state] CFI Enabled
62,452,065 UART: [art] Extend RT PCRs Done
62,453,210 UART: [art] Lock RT PCRs Done
62,454,279 UART: [art] Populate DV Done
62,455,261 UART: [fht] FMC Alias Private Key: 7
62,456,578 UART: [art] Derive CDI
62,457,320 UART: [art] Store in in slot 0x4
62,458,490 UART: [art] Derive Key Pair
62,459,431 UART: [art] Store priv key in slot 0x5
63,808,924 UART: [art] Derive Key Pair - Done
63,822,086 UART: [art] Signing Cert with AUTHO
63,823,414 UART: RITY.KEYID = 7
66,109,784 UART: [art] Erasing AUTHORITY.KEYID = 7
66,111,293 UART: [art] PUB.X = 220D170A8949BF1BB38E24C58945EFEA421D4D7680D47B4FD9293B0E97CC19453D318EAF584301E379AC4C73D6A938E4
66,118,565 UART: [art] PUB.Y = 21C709AF71D9B1788BA0B704F581AB647C21E318D459A48CDBA09E4660C11569BA0C77C53F8A4F34C354DE31349E6F61
66,125,812 UART: [art] SIG.R = DBADE63905D720AF81F6D8BDA1FFA3239C35C185605980EF57A6278A66975D6A81519640F6F91087BD4AF02B28C26427
66,133,150 UART: [art] SIG.S = C1970792FAF7E4D693C23466BBEFE967F79613B4C94EB76C5B43CE0A9F6C7423222968B045E44CAA3E300C9F97DEDE33
67,437,636 UART: mbox::rt_entry...
67,438,587 UART: ____ _ _ _ ____ _____
67,440,694 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,442,702 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,444,585 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,446,518 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,448,375 UART: |_|
67,449,257 UART:
67,732,741 UART: [rt] Runtime listening for mailbox commands...
67,734,850 UART:
67,735,036 UART: Running Caliptra ROM ...
67,736,062 UART:
67,736,667 UART: [state] CFI Enabled
67,797,798 UART: [state] LifecycleState = Unprovisioned
67,799,748 UART: [state] DebugLocked = No
67,801,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,805,985 UART: [kat] SHA2-256
67,975,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,986,150 UART: [kat] ++
67,986,635 UART: [kat] sha1
67,998,006 UART: [kat] SHA2-256
68,000,700 UART: [kat] SHA2-384
68,005,445 UART: [kat] SHA2-512-ACC
68,007,795 UART: [kat] ECC-384
70,297,876 UART: [kat] HMAC-384Kdf
70,330,561 UART: [kat] LMS
71,520,920 UART: [kat] --
71,526,363 UART: [update-reset] ++
75,233,422 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,237,698 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
75,495,282 >>> mbox cmd response: success
75,495,649 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,495,931 UART: [update-reset] Copying MAN_2 To MAN_1
75,517,954 UART: [update-reset Success] --
75,522,516 UART: [state] Locking Datavault
75,526,801 UART: [state] Locking PCR0, PCR1 and PCR31
75,528,556 UART: [state] Locking ICCM
75,530,112 UART: [exit] Launching FMC @ 0x40000130
75,538,563 UART:
75,538,798 UART: Running Caliptra FMC ...
75,539,903 UART:
75,540,060 UART: [state] CFI Enabled
75,632,892 UART: [art] Extend RT PCRs Done
75,634,086 UART: [art] Lock RT PCRs Done
75,635,438 UART: [art] Populate DV Done
75,640,796 UART: [fht] FMC Alias Private Key: 7
75,642,435 UART: [art] Derive CDI
75,643,250 UART: [art] Store in in slot 0x4
75,702,261 UART: [art] Derive Key Pair
75,703,264 UART: [art] Store priv key in slot 0x5
78,995,698 UART: [art] Derive Key Pair - Done
79,008,383 UART: [art] Signing Cert with AUTHO
79,009,700 UART: RITY.KEYID = 7
81,298,047 UART: [art] Erasing AUTHORITY.KEYID = 7
81,299,557 UART: [art] PUB.X = 610F7182F2BA2C780294D6E57CEB55C9E2FA01A961E499EA91393BBDF8DD5C509D98610D9E11B4B64CCC5A0E44D46465
81,306,799 UART: [art] PUB.Y = AFD91A419E3D614AC0DD1A6FDE97A65C0D41EA6289840663D98EDAE78705D150EA0FAB7119EFDCEFD14EE205EECDEB01
81,314,116 UART: [art] SIG.R = 4C8FEA6F5577B7924CC422DB065CD893C678B0FE9FE02A85DD6024C739B45B0B25B166D6C685F4018B8D3511FC5D1C9C
81,321,464 UART: [art] SIG.S = FAEDC3E322CE14430D2A9440009974B1E241C9B396C85AC32390F2D0B2DC57F516BFBDFA65E9F1E0175BAFEF8BD84E49
82,626,177 UART: mbox::rt_entry...
82,627,141 UART: ____ _ _ _ ____ _____
82,629,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,631,142 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,633,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,635,010 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,636,869 UART: |_|
82,637,671 UART:
82,922,653 UART: [rt] Runtime listening for mailbox commands...
82,924,826 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,792,316 ready_for_fw is high
3,792,954 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,134,446 >>> mbox cmd response: success
17,135,016 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,831,226 UART:
22,831,630 UART: Running Caliptra FMC ...
22,832,769 UART:
22,832,927 UART: [state] CFI Enabled
22,889,817 UART: [fht] FMC Alias Private Key: 7
25,228,009 UART: [art] Extend RT PCRs Done
25,229,245 UART: [art] Lock RT PCRs Done
25,231,065 UART: [art] Populate DV Done
25,236,291 UART: [fht] FMC Alias Private Key: 7
25,237,836 UART: [art] Derive CDI
25,238,651 UART: [art] Store in in slot 0x4
25,299,075 UART: [art] Derive Key Pair
25,300,119 UART: [art] Store priv key in slot 0x5
28,593,158 UART: [art] Derive Key Pair - Done
28,605,937 UART: [art] Signing Cert with AUTHO
28,607,243 UART: RITY.KEYID = 7
30,895,311 UART: [art] Erasing AUTHORITY.KEYID = 7
30,896,817 UART: [art] PUB.X = 0254A1ED18218F8804125070EDE882F0A6A4D389836C59CFB2159875A17F4A10FF796F58DD2C54FC847A8BAA4BEA336D
30,904,078 UART: [art] PUB.Y = 6AB5132596EEED1DF6CCFBE01C384D0E3C0B15F85677CCBBFB4CEF835CC2B7B5318816D75A7615D2F62DD02AFE200DC3
30,911,325 UART: [art] SIG.R = 3BEF4E712C2FCF6C70E600022B910A304B31245FDEB1D7500D02301F78E6292E93888B7A3736455AC896618E6F6DC6BA
30,918,668 UART: [art] SIG.S = 604B0D962DC198BD8D5C131E7A054D252841C0175172AD2ABDD5F6B02486257510FA84380026899175BA6E73BFFB0ED8
32,223,726 UART: mbox::rt_entry...
32,224,690 UART: ____ _ _ _ ____ _____
32,226,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,228,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,230,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,232,473 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,234,405 UART: |_|
32,235,215 UART:
32,348,307 UART: [rt] Runtime listening for mailbox commands...
32,350,480 >>> mbox cmd response data (48 bytes)
34,403,992 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,126,734 >>> mbox cmd response: success
43,127,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,162,276 UART:
43,162,601 UART: Running Caliptra FMC ...
43,163,755 UART:
43,163,927 UART: [state] CFI Enabled
43,255,170 UART: [art] Extend RT PCRs Done
43,256,361 UART: [art] Lock RT PCRs Done
43,257,877 UART: [art] Populate DV Done
43,263,447 UART: [fht] FMC Alias Private Key: 7
43,265,201 UART: [art] Derive CDI
43,266,019 UART: [art] Store in in slot 0x4
43,323,988 UART: [art] Derive Key Pair
43,325,033 UART: [art] Store priv key in slot 0x5
46,617,760 UART: [art] Derive Key Pair - Done
46,630,867 UART: [art] Signing Cert with AUTHO
46,632,164 UART: RITY.KEYID = 7
48,918,731 UART: [art] Erasing AUTHORITY.KEYID = 7
48,920,239 UART: [art] PUB.X = DBD82A9C7B01E521B921C938D027AAA4D36124D311A079F88B8C40C572F8DBCC71A0ACFB7066ED05A978FF200E869669
48,927,443 UART: [art] PUB.Y = 5AA621F0BAA7D95548BB4E946807D7F304FD73F99C9F89DBB6379E07952D83D44C0FDA6F216CCE878680187EF74B0ED3
48,934,696 UART: [art] SIG.R = B8613D5ED8B0BF7985B34A154B3A7AFFFC0E1D5DDC7D0C71F32BC71A34F7FEE1AB8FECBF811A7EFCB036C5B292616530
48,942,155 UART: [art] SIG.S = 1C096587E024FBA5C5A44132AAE5A5AFEDEAC6714BDC4A285FDDF18DE5F4B3C3BEADBFE9A0B1D8AD93F7E658E926095F
50,247,304 UART: Caliptra RT
50,248,022 UART: [state] CFI Enabled
50,582,319 UART: [rt] RT listening for mailbox commands...
50,614,512 UART: [rt]cmd =0x4d454153, len=108
50,633,391 >>> mbox cmd response data (12 bytes)
52,676,710 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,624,218 >>> mbox cmd response: success
62,664,107 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
62,763,464 UART:
62,763,842 UART: Running Caliptra FMC ...
62,764,901 UART:
62,765,053 UART: [state] CFI Enabled
62,765,944 UART: [art] Extend RT PCRs Done
62,767,003 UART: [art] Lock RT PCRs Done
62,768,085 UART: [art] Populate DV Done
62,769,067 UART: [fht] FMC Alias Private Key: 7
62,770,390 UART: [art] Derive CDI
62,771,125 UART: [art] Store in in slot 0x4
62,772,212 UART: [art] Derive Key Pair
62,773,205 UART: [art] Store priv key in slot 0x5
64,130,726 UART: [art] Derive Key Pair - Done
64,143,795 UART: [art] Signing Cert with AUTHO
64,145,098 UART: RITY.KEYID = 7
66,431,966 UART: [art] Erasing AUTHORITY.KEYID = 7
66,433,488 UART: [art] PUB.X = EDDEE2FC183E7F064C91EB722083F6BFC5EC8FDF231E63B0A42B0980FBB1062E55AF3BB20C2659875EAD5EA58072E17E
66,440,755 UART: [art] PUB.Y = 2611A080D5BBFDF7669CC85F1D324DC810CB9023FDDDD9AB11D3C5891243F3DAF5F83A074EB5BD7E12FF60A341BC8678
66,448,042 UART: [art] SIG.R = C94E7CC8954ECE6900F621E77A0C4216E3827E7A7CEF5EC889918667A8CA10C4B6847123E18C22C27D6630828FD1FB92
66,455,396 UART: [art] SIG.S = 8D12CE190396932604043E82B5761546CDCC333CF53C8B8C817C3928FA646F36BF465C67C14E469ED7C76653FFA698C4
67,759,915 UART: mbox::rt_entry...
67,760,869 UART: ____ _ _ _ ____ _____
67,762,801 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,764,806 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,766,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,768,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,770,690 UART: |_|
67,771,577 UART:
68,053,732 UART: [rt] Runtime listening for mailbox commands...
75,892,748 >>> mbox cmd response: success
75,893,136 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,928,109 UART:
75,928,516 UART: Running Caliptra FMC ...
75,929,578 UART:
75,929,734 UART: [state] CFI Enabled
76,016,213 UART: [art] Extend RT PCRs Done
76,017,407 UART: [art] Lock RT PCRs Done
76,018,763 UART: [art] Populate DV Done
76,024,009 UART: [fht] FMC Alias Private Key: 7
76,025,494 UART: [art] Derive CDI
76,026,262 UART: [art] Store in in slot 0x4
76,085,110 UART: [art] Derive Key Pair
76,086,117 UART: [art] Store priv key in slot 0x5
79,379,165 UART: [art] Derive Key Pair - Done
79,391,889 UART: [art] Signing Cert with AUTHO
79,393,196 UART: RITY.KEYID = 7
81,680,025 UART: [art] Erasing AUTHORITY.KEYID = 7
81,681,554 UART: [art] PUB.X = E54F3C9D417BBBFAF6B9E8B043CF8A0C62C92CE15467ACAAD12D330478A6F9629C5B7B17226B782EAF4E8B43BA3E5358
81,688,945 UART: [art] PUB.Y = 6410F1DCB15D3DCD8015D2051DC3B9BB0F52C482A053BDB4D4707A2897B4939646D4F241BFF84CF4D1BCEF027A810C9C
81,696,092 UART: [art] SIG.R = AA27AEEA2436432E454A9DA456D9561FF75EF38E3234C0C3EC0CBC89D167FE34C9A6A4A79EA23C1FF07E8E70E39595BE
81,703,448 UART: [art] SIG.S = 86257F817FDBC2B4AEF68DA400BCDAC9422909AE1BD1833DB098242750D565BF65AC4157637EDE66BC598BC57D3E1787
83,008,842 UART: mbox::rt_entry...
83,009,815 UART: ____ _ _ _ ____ _____
83,011,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,013,833 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,015,693 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,017,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,019,676 UART: |_|
83,020,493 UART:
83,305,054 UART: [rt] Runtime listening for mailbox commands...
83,307,231 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.28s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,324,353 UART: [fwproc] Received Image of size 78492 bytes
16,944,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,023,761 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,092,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,286,127 >>> mbox cmd response: success
17,286,757 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,290,592 UART: [afmc] ++
17,291,182 UART: [afmc] CDI.KEYID = 6
17,292,059 UART: [afmc] SUBJECT.KEYID = 7
17,293,330 UART: [afmc] AUTHORITY.KEYID = 5
20,612,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,908,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,910,685 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,925,030 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,939,853 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,954,275 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,975,765 UART: [afmc] --
22,980,063 UART: [cold-reset] --
22,984,948 UART: [state] Locking Datavault
22,991,052 UART: [state] Locking PCR0, PCR1 and PCR31
22,992,808 UART: [state] Locking ICCM
22,994,177 UART: [exit] Launching FMC @ 0x40000130
23,002,517 UART:
23,002,761 UART: Running Caliptra FMC ...
23,003,789 UART:
23,003,937 UART: [state] CFI Enabled
23,011,935 UART: [fht] FMC Alias Private Key: 7
25,342,778 UART: [art] Extend RT PCRs Done
25,344,002 UART: [art] Lock RT PCRs Done
25,345,674 UART: [art] Populate DV Done
25,350,925 UART: [fht] FMC Alias Private Key: 7
25,352,513 UART: [art] Derive CDI
25,353,248 UART: [art] Store in in slot 0x4
25,396,052 UART: [art] Derive Key Pair
25,397,101 UART: [art] Store priv key in slot 0x5
28,639,049 UART: [art] Derive Key Pair - Done
28,651,879 UART: [art] Signing Cert with AUTHO
28,653,212 UART: RITY.KEYID = 7
30,932,818 UART: [art] Erasing AUTHORITY.KEYID = 7
30,934,324 UART: [art] PUB.X = 777A698A9F2ABC9D968263A31D8FE17014281841E1E778A3CC71D07C9AD93E221FA4A61F3596E0C2C1DA296AC3715097
30,941,540 UART: [art] PUB.Y = B718E262D50E65BD73F849A35BEDE17B45D1A2F824155F5D9F4068BC9E902C40D2FB2BC156177FE4B2E0E01BE7EE6873
30,948,799 UART: [art] SIG.R = 20AF6DFBE24B1F77F861DC45201D9D1F485DBFBE47D846CE790BCC4B1BA82B1AD87B1595881DF2A862097F527925E075
30,956,216 UART: [art] SIG.S = 3AB7C7D76F42F918CA7D63AEB404533000DD5285366FDC7E03BCD973D5F72CD67B6C30ECD9FA7C1C96369BC2B4CE2BF0
32,260,849 UART: mbox::rt_entry...
32,261,810 UART: ____ _ _ _ ____ _____
32,263,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,265,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,267,760 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,269,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,271,613 UART: |_|
32,272,420 UART:
32,386,732 UART: [rt] Runtime listening for mailbox commands...
32,388,897 >>> mbox cmd response data (48 bytes)
34,446,365 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,590,235 UART:
34,590,618 UART: Running Caliptra ROM ...
34,591,756 UART:
34,591,927 UART: [state] CFI Enabled
34,608,138 UART: [state] LifecycleState = Unprovisioned
34,610,031 UART: [state] DebugLocked = No
34,611,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,616,756 UART: [kat] SHA2-256
34,786,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,797,028 UART: [kat] ++
34,797,485 UART: [kat] sha1
34,807,988 UART: [kat] SHA2-256
34,810,717 UART: [kat] SHA2-384
34,814,975 UART: [kat] SHA2-512-ACC
34,817,315 UART: [kat] ECC-384
37,100,551 UART: [kat] HMAC-384Kdf
37,112,561 UART: [kat] LMS
38,302,614 UART: [kat] --
38,307,172 UART: [update-reset] ++
42,439,339 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,442,691 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,823,713 >>> mbox cmd response: success
42,824,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,825,144 UART: [update-reset] Copying MAN_2 To MAN_1
42,847,578 UART: [update-reset Success] --
42,851,913 UART: [state] Locking Datavault
42,854,889 UART: [state] Locking PCR0, PCR1 and PCR31
42,856,626 UART: [state] Locking ICCM
42,859,156 UART: [exit] Launching FMC @ 0x40000130
42,867,613 UART:
42,867,848 UART: Running Caliptra FMC ...
42,868,943 UART:
42,869,097 UART: [state] CFI Enabled
42,913,421 UART: [art] Extend RT PCRs Done
42,914,604 UART: [art] Lock RT PCRs Done
42,915,787 UART: [art] Populate DV Done
42,921,182 UART: [fht] FMC Alias Private Key: 7
42,922,826 UART: [art] Derive CDI
42,923,635 UART: [art] Store in in slot 0x4
42,966,062 UART: [art] Derive Key Pair
42,967,275 UART: [art] Store priv key in slot 0x5
46,209,511 UART: [art] Derive Key Pair - Done
46,222,231 UART: [art] Signing Cert with AUTHO
46,223,532 UART: RITY.KEYID = 7
48,502,800 UART: [art] Erasing AUTHORITY.KEYID = 7
48,504,306 UART: [art] PUB.X = 222F8130DC637BFBD882B4505391AFAB8F24CF8412B6F26497079C04A271019A89EB5758A81DE1F1732F0C9938A43636
48,511,530 UART: [art] PUB.Y = 3A763E8EE4A90AC316D7C1FC91FD6E57281D84DD38253DAE2D5C701CF86A787061805E650B9E404B7D9D50CC5E19394C
48,518,781 UART: [art] SIG.R = 1559B8F3C72DA4DE98A1FAE0E7E2DC4D2B8FE73A3FEF1FAA1200BEFB304606AE9FD58017F8B752ED4477D49398EAF3B4
48,526,200 UART: [art] SIG.S = F5E94EA9A63C9FFFA0C6AD69CC2FDBB9D7F230519A14EAECC9EF17515FECF998EE35B913234E0F859D50E4A4EA0F9A7F
49,832,144 UART: Caliptra RT
49,832,866 UART: [state] CFI Enabled
50,124,485 UART: [rt] RT listening for mailbox commands...
50,156,499 UART: [rt]cmd =0x4d454153, len=108
50,175,862 >>> mbox cmd response data (12 bytes)
52,219,669 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,320,009 UART:
52,320,373 UART: Running Caliptra ROM ...
52,321,508 UART:
52,321,675 UART: [state] CFI Enabled
52,334,942 UART: [state] LifecycleState = Unprovisioned
52,336,871 UART: [state] DebugLocked = No
52,338,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,343,565 UART: [kat] SHA2-256
52,513,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,523,823 UART: [kat] ++
52,524,273 UART: [kat] sha1
52,535,365 UART: [kat] SHA2-256
52,538,109 UART: [kat] SHA2-384
52,544,579 UART: [kat] SHA2-512-ACC
52,546,919 UART: [kat] ECC-384
54,833,480 UART: [kat] HMAC-384Kdf
54,846,577 UART: [kat] LMS
56,036,637 UART: [kat] --
56,041,607 UART: [update-reset] ++
59,741,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,745,591 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
60,003,139 >>> mbox cmd response: success
62,046,137 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
62,145,366 UART: [update-reset] Copying MAN_2 To MAN_1
62,147,045 UART: [update-reset Success] --
62,148,210 UART: [state] Locking Datavault
62,149,354 UART: [state] Locking PCR0, PCR1 and PCR31
62,150,885 UART: [state] Locking ICCM
62,151,796 UART: [exit] Launching FMC @ 0x40000130
62,153,219 UART:
62,153,381 UART: Running Caliptra FMC ...
62,154,476 UART:
62,154,627 UART: [state] CFI Enabled
62,155,541 UART: [art] Extend RT PCRs Done
62,156,675 UART: [art] Lock RT PCRs Done
62,157,739 UART: [art] Populate DV Done
62,158,765 UART: [fht] FMC Alias Private Key: 7
62,160,095 UART: [art] Derive CDI
62,160,828 UART: [art] Store in in slot 0x4
62,162,005 UART: [art] Derive Key Pair
62,162,921 UART: [art] Store priv key in slot 0x5
63,388,715 UART: [art] Derive Key Pair - Done
63,401,449 UART: [art] Signing Cert with AUTHO
63,402,748 UART: RITY.KEYID = 7
65,682,376 UART: [art] Erasing AUTHORITY.KEYID = 7
65,683,881 UART: [art] PUB.X = EF46112BB4506011E0719338DB044F450B7378C699D586A793C129489A0A446ABC88EB138955DA30A372DA669CB71BAC
65,691,178 UART: [art] PUB.Y = 09744BA339F328C655D342F95FB5A503B579C66EC39811FD094E2AD39E381D1A11B9871357748EC780635B7D6CCFE240
65,698,338 UART: [art] SIG.R = EA82253B9EA47A1FA86BCF52D6CD0B7C8A95AF5FEF17F791E095B575E68EADE367B55D6B3B305BC12D146F45C0665A69
65,705,759 UART: [art] SIG.S = 80080B7EA04A55D7E2E8211E4BE23211F16CA4C0E372C451C69BDB1E54D1ACF4E3F5F846401103B745D38A83245D825F
67,010,737 UART: mbox::rt_entry...
67,011,673 UART: ____ _ _ _ ____ _____
67,013,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,015,657 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,017,602 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,019,531 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,021,457 UART: |_|
67,022,264 UART:
67,308,777 UART: [rt] Runtime listening for mailbox commands...
67,310,858 UART:
67,311,019 UART: Running Caliptra ROM ...
67,312,038 UART:
67,312,509 UART: [state] CFI Enabled
67,325,478 UART: [state] LifecycleState = Unprovisioned
67,327,355 UART: [state] DebugLocked = No
67,328,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,333,651 UART: [kat] SHA2-256
67,503,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,513,908 UART: [kat] ++
67,514,414 UART: [kat] sha1
67,526,712 UART: [kat] SHA2-256
67,529,390 UART: [kat] SHA2-384
67,534,385 UART: [kat] SHA2-512-ACC
67,536,789 UART: [kat] ECC-384
69,821,818 UART: [kat] HMAC-384Kdf
69,832,572 UART: [kat] LMS
71,022,661 UART: [kat] --
71,028,476 UART: [update-reset] ++
74,731,103 UART: [update-reset] Image verified using Vendor ECC Key Index 0
74,735,262 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
74,992,828 >>> mbox cmd response: success
74,993,190 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
74,994,174 UART: [update-reset] Copying MAN_2 To MAN_1
75,016,609 UART: [update-reset Success] --
75,021,375 UART: [state] Locking Datavault
75,025,384 UART: [state] Locking PCR0, PCR1 and PCR31
75,027,155 UART: [state] Locking ICCM
75,029,573 UART: [exit] Launching FMC @ 0x40000130
75,038,033 UART:
75,038,275 UART: Running Caliptra FMC ...
75,039,375 UART:
75,039,529 UART: [state] CFI Enabled
75,083,821 UART: [art] Extend RT PCRs Done
75,084,996 UART: [art] Lock RT PCRs Done
75,086,227 UART: [art] Populate DV Done
75,091,686 UART: [fht] FMC Alias Private Key: 7
75,093,334 UART: [art] Derive CDI
75,094,145 UART: [art] Store in in slot 0x4
75,136,794 UART: [art] Derive Key Pair
75,137,830 UART: [art] Store priv key in slot 0x5
78,380,293 UART: [art] Derive Key Pair - Done
78,393,458 UART: [art] Signing Cert with AUTHO
78,394,787 UART: RITY.KEYID = 7
80,674,393 UART: [art] Erasing AUTHORITY.KEYID = 7
80,675,901 UART: [art] PUB.X = 1A78A96FA65B2C450DEB46705BE98B704267DF604D6869DBB5C90B1DCC15AB3F5F93C2D064088472FCCF16A23BDD8F31
80,683,121 UART: [art] PUB.Y = 18E02EE2BC229A68B09E34A3C0CA93C1A29B17FC0E30ECDA37A45DE1969EBBC48BA82E687FD6A149C4B34CABE668D24D
80,690,436 UART: [art] SIG.R = 91941BF566508B4C0B4F0C48397109052D9670683825295BBE4174535EEBB566295897EB6794ACD3CEDF6F17100D2603
80,697,751 UART: [art] SIG.S = E5B993877C0238D9F0C74B0DC65F7A9423F8FAB0D2582CD1238C90324EDBB753F9632E14AD9CA61F6CB1A3D17ACB9D85
82,002,543 UART: mbox::rt_entry...
82,003,506 UART: ____ _ _ _ ____ _____
82,005,435 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,007,744 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,009,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,011,550 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,013,407 UART: |_|
82,014,285 UART:
82,298,040 UART: [rt] Runtime listening for mailbox commands...
82,300,161 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
4,126,557 ready_for_fw is high
4,127,032 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,342,607 >>> mbox cmd response: success
17,343,243 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,982,339 UART:
22,982,771 UART: Running Caliptra FMC ...
22,983,871 UART:
22,984,024 UART: [state] CFI Enabled
22,991,871 UART: [fht] FMC Alias Private Key: 7
25,322,619 UART: [art] Extend RT PCRs Done
25,323,851 UART: [art] Lock RT PCRs Done
25,325,645 UART: [art] Populate DV Done
25,331,117 UART: [fht] FMC Alias Private Key: 7
25,332,764 UART: [art] Derive CDI
25,333,577 UART: [art] Store in in slot 0x4
25,375,685 UART: [art] Derive Key Pair
25,376,727 UART: [art] Store priv key in slot 0x5
28,619,002 UART: [art] Derive Key Pair - Done
28,631,956 UART: [art] Signing Cert with AUTHO
28,633,759 UART: RITY.KEYID = 7
30,912,751 UART: [art] Erasing AUTHORITY.KEYID = 7
30,914,261 UART: [art] PUB.X = FD7DF0C50CF872D20B1C09D7693DB1B89FC8C6C6446A2CF1A4D08C46671163D700F2587F5EA1E086BC2CE12359F5894C
30,921,486 UART: [art] PUB.Y = BC5962F91D810772EFA5AD53E1CAEB4D9BE82FCEABD199F20D334271F883C12A1C3DFB52C55B27CDC7C1C4F603BE40F8
30,928,764 UART: [art] SIG.R = 6F1C1FF0A78624270152049672D46CC1394B57EB099BBCD77C4A9B9C70E3A211026B3760BD204A653FE747838FA38CBF
30,936,155 UART: [art] SIG.S = 3A5F5A1B10079D6BCBAADA7B59E349781E113574E6B6004EDDB8B5C7C5BB926423D254E569BAD5A3A941F1191FD34A80
32,240,026 UART: mbox::rt_entry...
32,240,978 UART: ____ _ _ _ ____ _____
32,242,961 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,244,965 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,246,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,248,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,777 UART: |_|
32,251,769 UART:
32,364,903 UART: [rt] Runtime listening for mailbox commands...
32,367,062 >>> mbox cmd response data (48 bytes)
34,424,105 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,073,408 >>> mbox cmd response: success
43,073,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,107,176 UART:
43,107,452 UART: Running Caliptra FMC ...
43,108,484 UART:
43,108,627 UART: [state] CFI Enabled
43,153,256 UART: [art] Extend RT PCRs Done
43,154,448 UART: [art] Lock RT PCRs Done
43,155,828 UART: [art] Populate DV Done
43,161,073 UART: [fht] FMC Alias Private Key: 7
43,162,670 UART: [art] Derive CDI
43,163,484 UART: [art] Store in in slot 0x4
43,206,126 UART: [art] Derive Key Pair
43,207,192 UART: [art] Store priv key in slot 0x5
46,449,606 UART: [art] Derive Key Pair - Done
46,463,046 UART: [art] Signing Cert with AUTHO
46,464,360 UART: RITY.KEYID = 7
48,743,543 UART: [art] Erasing AUTHORITY.KEYID = 7
48,745,051 UART: [art] PUB.X = 67B3527E2A8CA2B8740B7F038720E6A8E00B0C182C78D41DA1945BBE1746B98A71EA3D572B07D2D94ABFB784C81A6AEB
48,752,321 UART: [art] PUB.Y = 9928B0D2A4234DD02C5C5432D06C638CEBEF0A1F94DB106D2B9812BACAA2CD3341487FFCC6FA3133A24E7B4445CEAE34
48,759,590 UART: [art] SIG.R = 1BC34292D52F1D79A154DA8A68072081781DAECAE401322073285C74D51372D1B9998B308D873A645C977EDC3BD99FF0
48,766,925 UART: [art] SIG.S = 252FC0ACD89014F83F17143511D4851FA34EDA746C275FA1CE1C86A73AD8B4BEFD9BE56F4F335366B1C577257B7E52EE
50,072,009 UART: Caliptra RT
50,072,744 UART: [state] CFI Enabled
50,363,288 UART: [rt] RT listening for mailbox commands...
50,395,473 UART: [rt]cmd =0x4d454153, len=108
50,414,111 >>> mbox cmd response data (12 bytes)
52,456,988 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,348,543 >>> mbox cmd response: success
62,392,388 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
62,491,802 UART:
62,492,163 UART: Running Caliptra FMC ...
62,493,208 UART:
62,493,352 UART: [state] CFI Enabled
62,494,235 UART: [art] Extend RT PCRs Done
62,495,380 UART: [art] Lock RT PCRs Done
62,496,392 UART: [art] Populate DV Done
62,497,375 UART: [fht] FMC Alias Private Key: 7
62,498,705 UART: [art] Derive CDI
62,499,431 UART: [art] Store in in slot 0x4
62,500,517 UART: [art] Derive Key Pair
62,501,505 UART: [art] Store priv key in slot 0x5
63,726,082 UART: [art] Derive Key Pair - Done
63,738,848 UART: [art] Signing Cert with AUTHO
63,740,147 UART: RITY.KEYID = 7
66,019,450 UART: [art] Erasing AUTHORITY.KEYID = 7
66,020,989 UART: [art] PUB.X = E1B13890E52F154D6F6AEDD3E941BBD6C2F6DE0C4C5B96BB5DB02E8F2BD3693624EC7939CC66EC4DAF354846563709DC
66,028,233 UART: [art] PUB.Y = A7DB1CDE1D379B97A3013957EFEB6A9F24A0AF3E4C2C3309C4F02D770E4CFF9775AB87A4BFAC783AC56F0DFCFE0DC140
66,035,500 UART: [art] SIG.R = 7CE1B686DF982A9731ED8A45CE468BE4DFBFC2C3899679FE1273068158E9EBE661B29B04E0047835A38953F5D6EE3DD5
66,042,874 UART: [art] SIG.S = 202D29070DAE79452A807DC6F99711BD817393F2AA4191C5721CC3E06D03DFEBA7B1CAE86ED8738E06751D04E756138F
67,347,350 UART: mbox::rt_entry...
67,348,318 UART: ____ _ _ _ ____ _____
67,350,242 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,352,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,354,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,356,271 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,358,207 UART: |_|
67,359,010 UART:
67,642,520 UART: [rt] Runtime listening for mailbox commands...
75,426,567 >>> mbox cmd response: success
75,426,955 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,461,105 UART:
75,461,400 UART: Running Caliptra FMC ...
75,462,521 UART:
75,462,679 UART: [state] CFI Enabled
75,506,209 UART: [art] Extend RT PCRs Done
75,507,355 UART: [art] Lock RT PCRs Done
75,508,962 UART: [art] Populate DV Done
75,514,636 UART: [fht] FMC Alias Private Key: 7
75,516,176 UART: [art] Derive CDI
75,516,940 UART: [art] Store in in slot 0x4
75,559,267 UART: [art] Derive Key Pair
75,560,266 UART: [art] Store priv key in slot 0x5
78,802,450 UART: [art] Derive Key Pair - Done
78,815,235 UART: [art] Signing Cert with AUTHO
78,816,543 UART: RITY.KEYID = 7
81,095,798 UART: [art] Erasing AUTHORITY.KEYID = 7
81,097,310 UART: [art] PUB.X = 964395488ADF24BF2D3CA49E6C8291409DFAC2A48AEF026C68B49FD87A0EB458B421EA49F66DBC06DFB88062EB9263BA
81,104,546 UART: [art] PUB.Y = 8EFFA09BE82CFD6A3B0BFA5FF97259A8AD9D44A404F2BB228738722F6461ED96F26AD6406BE6D400FE15F3D3C5E95A88
81,111,812 UART: [art] SIG.R = 5A45740133D1308C7F01338B7E65C41D5A0D9704260227B6D49EF634D8B1DF584F06E2826C8B2AF5918E79424B958B45
81,119,204 UART: [art] SIG.S = 8762E0ADF5441014166A63D2C0C5A7B06DF043FE2FF9C289AB04CC77BAF24649F2BDF9A398196BA5052C85A6965AB886
82,423,957 UART: mbox::rt_entry...
82,424,909 UART: ____ _ _ _ ____ _____
82,426,879 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,428,891 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,430,763 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,432,687 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,434,618 UART: |_|
82,435,598 UART:
82,715,419 UART: [rt] Runtime listening for mailbox commands...
82,717,563 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 4.25s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,389,602 UART: [ldev] --
10,394,275 UART: [fwproc] Wait for Commands...
10,396,529 UART: [fwproc] Recv command 0x46574c44
10,398,619 UART: [fwproc] Recv'd Img size: 78456 bytes
13,367,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,439,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,508,589 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,700,595 >>> mbox cmd response: success
13,701,077 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,704,773 UART: [afmc] ++
13,705,369 UART: [afmc] CDI.KEYID = 6
13,706,252 UART: [afmc] SUBJECT.KEYID = 7
13,707,483 UART: [afmc] AUTHORITY.KEYID = 5
16,231,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,955,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,957,156 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,972,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,988,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,004,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,028,005 UART: [afmc] --
18,032,471 UART: [cold-reset] --
18,036,332 UART: [state] Locking Datavault
18,041,852 UART: [state] Locking PCR0, PCR1 and PCR31
18,043,498 UART: [state] Locking ICCM
18,045,107 UART: [exit] Launching FMC @ 0x40000130
18,053,522 UART:
18,053,798 UART: Running Caliptra FMC ...
18,054,908 UART:
18,055,086 UART: [state] CFI Enabled
18,114,634 UART: [fht] FMC Alias Private Key: 7
19,878,454 UART: [art] Extend RT PCRs Done
19,879,670 UART: [art] Lock RT PCRs Done
19,881,533 UART: [art] Populate DV Done
19,886,887 UART: [fht] FMC Alias Private Key: 7
19,888,470 UART: [art] Derive CDI
19,889,199 UART: [art] Store in in slot 0x4
19,947,274 UART: [art] Derive Key Pair
19,948,328 UART: [art] Store priv key in slot 0x5
22,411,046 UART: [art] Derive Key Pair - Done
22,424,206 UART: [art] Signing Cert with AUTHO
22,425,505 UART: RITY.KEYID = 7
24,136,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,138,095 UART: [art] PUB.X = 851D7AE0F3A77A89F25DCA7D77D55BA1AB4AD7DBF1FF4F58D3791F64E57C5DEC2B8728A5DA5E384B4FBCB076CFEA88BE
24,145,382 UART: [art] PUB.Y = CAEC91ABDFA9B3A98C3751D45C2516084A3890C119497448255B22E18781913C9C3D92211B6A2F62D9762EF8368E82D4
24,152,613 UART: [art] SIG.R = D98E00100098DE919446A3192047FB8CDF73ADB12803B467F08DA91815BDF26E0B003922F6FF4D0D3971DA5BB03EDD15
24,159,920 UART: [art] SIG.S = D22BEBBC368B9B588AAB3B6F089861C62D8C8CEE35CDDA29F3EB0A96C6E15A6DD2E64112B49C8ECFB85E791DEC914370
25,138,651 UART: mbox::rt_entry...
25,139,615 UART: ____ _ _ _ ____ _____
25,141,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,143,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,145,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,147,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,149,389 UART: |_|
25,150,195 UART:
25,262,582 UART: [rt] Runtime listening for mailbox commands...
25,264,746 >>> mbox cmd response data (48 bytes)
27,321,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,465,722 UART:
27,466,123 UART: Running Caliptra ROM ...
27,467,215 UART:
27,467,373 UART: [state] CFI Enabled
27,523,067 UART: [state] LifecycleState = Unprovisioned
27,524,957 UART: [state] DebugLocked = No
27,526,072 UART: [state] WD Timer not started. Device not locked for debugging
27,530,201 UART: [kat] SHA2-256
27,709,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,720,896 UART: [kat] ++
27,721,433 UART: [kat] sha1
27,732,545 UART: [kat] SHA2-256
27,735,538 UART: [kat] SHA2-384
27,742,796 UART: [kat] SHA2-512-ACC
27,745,741 UART: [kat] ECC-384
30,210,075 UART: [kat] HMAC-384Kdf
30,231,278 UART: [kat] LMS
30,760,732 UART: [kat] --
30,767,328 UART: [update-reset] ++
34,187,160 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,190,967 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,572,970 >>> mbox cmd response: success
34,573,356 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,573,821 UART: [update-reset] Copying MAN_2 To MAN_1
34,596,151 UART: [update-reset Success] --
34,601,030 UART: [state] Locking Datavault
34,603,958 UART: [state] Locking PCR0, PCR1 and PCR31
34,605,601 UART: [state] Locking ICCM
34,607,828 UART: [exit] Launching FMC @ 0x40000130
34,616,248 UART:
34,616,526 UART: Running Caliptra FMC ...
34,617,987 UART:
34,618,170 UART: [state] CFI Enabled
34,721,476 UART: [art] Extend RT PCRs Done
34,722,655 UART: [art] Lock RT PCRs Done
34,724,105 UART: [art] Populate DV Done
34,729,457 UART: [fht] FMC Alias Private Key: 7
34,731,149 UART: [art] Derive CDI
34,731,958 UART: [art] Store in in slot 0x4
34,790,536 UART: [art] Derive Key Pair
34,791,591 UART: [art] Store priv key in slot 0x5
37,254,360 UART: [art] Derive Key Pair - Done
37,267,035 UART: [art] Signing Cert with AUTHO
37,268,335 UART: RITY.KEYID = 7
38,979,653 UART: [art] Erasing AUTHORITY.KEYID = 7
38,981,158 UART: [art] PUB.X = 03B27B938D4DA064A6A46BC748515224B3F9509093BD3ECF7B5ED1A37E5248B927D0E7C3F44214CE46CC41DD85D99E44
38,988,423 UART: [art] PUB.Y = 9B3D59D399A77C521D0B31D3B1B06FB774400FEC6B3F42F03D1A54DCEF3A142C521EF642E4B4976EC9A656DD6A1997FC
38,995,692 UART: [art] SIG.R = F3ACA43403B48AECD2D18B455A98E59E157D33874A81907E2B20BCE3EC36ADCC685591C291E2A17FCBB9156FD71C12E4
39,003,115 UART: [art] SIG.S = FD039A82C9B677FC7FAED1EACD97E8797CD1F5DC8F8C3DA86F89361610327D00A86BCE558858B53FDED9D30A2877CBEF
39,982,134 UART: Caliptra RT
39,982,853 UART: [state] CFI Enabled
40,319,387 UART: [rt] RT listening for mailbox commands...
40,351,726 UART: [rt]cmd =0x4d454153, len=108
40,369,795 >>> mbox cmd response data (12 bytes)
42,412,297 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,512,616 UART:
42,512,974 UART: Running Caliptra ROM ...
42,514,098 UART:
42,514,265 UART: [state] CFI Enabled
42,580,687 UART: [state] LifecycleState = Unprovisioned
42,582,570 UART: [state] DebugLocked = No
42,583,958 UART: [state] WD Timer not started. Device not locked for debugging
42,588,461 UART: [kat] SHA2-256
42,767,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,779,144 UART: [kat] ++
42,779,690 UART: [kat] sha1
42,791,067 UART: [kat] SHA2-256
42,794,084 UART: [kat] SHA2-384
42,800,548 UART: [kat] SHA2-512-ACC
42,803,481 UART: [kat] ECC-384
45,265,619 UART: [kat] HMAC-384Kdf
45,289,147 UART: [kat] LMS
45,818,613 UART: [kat] --
45,823,963 UART: [update-reset] ++
48,810,110 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,813,243 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,070,590 >>> mbox cmd response: success
51,111,130 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
51,210,271 UART: [update-reset] Copying MAN_2 To MAN_1
51,211,958 UART: [update-reset Success] --
51,213,123 UART: [state] Locking Datavault
51,214,272 UART: [state] Locking PCR0, PCR1 and PCR31
51,215,810 UART: [state] Locking ICCM
51,216,699 UART: [exit] Launching FMC @ 0x40000130
51,218,053 UART:
51,218,201 UART: Running Caliptra FMC ...
51,219,256 UART:
51,219,403 UART: [state] CFI Enabled
51,220,267 UART: [art] Extend RT PCRs Done
51,221,423 UART: [art] Lock RT PCRs Done
51,222,414 UART: [art] Populate DV Done
51,223,354 UART: [fht] FMC Alias Private Key: 7
51,224,752 UART: [art] Derive CDI
51,225,488 UART: [art] Store in in slot 0x4
51,226,650 UART: [art] Derive Key Pair
51,227,640 UART: [art] Store priv key in slot 0x5
51,736,837 UART: [art] Derive Key Pair - Done
51,749,895 UART: [art] Signing Cert with AUTHO
51,751,202 UART: RITY.KEYID = 7
53,462,808 UART: [art] Erasing AUTHORITY.KEYID = 7
53,464,305 UART: [art] PUB.X = 9DA726700091B3614A56A1D0A7A8BC1466C4360EB05BE4B0ADFE04FE8D1B476E1D79A06E7EB623DDD57FDA60E501953C
53,471,542 UART: [art] PUB.Y = 6347693D66E272FF05B13FA50B764623C713BE58445D0C9387B5F100305D7047A952331E3D04937DD817A34C0E084292
53,478,756 UART: [art] SIG.R = 2CD7FA06F76763E6D5BD70BA2A9AA081D90BAB2ECD0BA9CE0CFC80958B14E815F3E28782C8C9171C93D6EA12729E8089
53,486,167 UART: [art] SIG.S = 2F0D2820BB387EC5EFE042E12B90563629081D1FA71927872909E9B044EF8366656EBE0A2757AF4D81B5C6A4534A3D21
54,464,656 UART: mbox::rt_entry...
54,465,645 UART: ____ _ _ _ ____ _____
54,467,630 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,469,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,471,562 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,473,486 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,475,410 UART: |_|
54,476,388 UART:
54,763,757 UART: [rt] Runtime listening for mailbox commands...
54,765,823 UART:
54,765,988 UART: Running Caliptra ROM ...
54,767,086 UART:
54,767,246 UART: [state] CFI Enabled
54,823,946 UART: [state] LifecycleState = Unprovisioned
54,825,818 UART: [state] DebugLocked = No
54,827,906 UART: [state] WD Timer not started. Device not locked for debugging
54,830,848 UART: [kat] SHA2-256
55,009,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,021,547 UART: [kat] ++
55,022,009 UART: [kat] sha1
55,033,584 UART: [kat] SHA2-256
55,036,598 UART: [kat] SHA2-384
55,041,986 UART: [kat] SHA2-512-ACC
55,044,932 UART: [kat] ECC-384
57,508,790 UART: [kat] HMAC-384Kdf
57,531,556 UART: [kat] LMS
58,061,004 UART: [kat] --
58,066,312 UART: [update-reset] ++
61,056,376 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,059,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
61,317,323 >>> mbox cmd response: success
61,317,672 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,317,943 UART: [update-reset] Copying MAN_2 To MAN_1
61,339,851 UART: [update-reset Success] --
61,342,820 UART: [state] Locking Datavault
61,346,507 UART: [state] Locking PCR0, PCR1 and PCR31
61,348,201 UART: [state] Locking ICCM
61,350,941 UART: [exit] Launching FMC @ 0x40000130
61,359,400 UART:
61,359,632 UART: Running Caliptra FMC ...
61,360,678 UART:
61,360,825 UART: [state] CFI Enabled
61,467,699 UART: [art] Extend RT PCRs Done
61,468,903 UART: [art] Lock RT PCRs Done
61,470,114 UART: [art] Populate DV Done
61,475,534 UART: [fht] FMC Alias Private Key: 7
61,477,080 UART: [art] Derive CDI
61,477,845 UART: [art] Store in in slot 0x4
61,536,919 UART: [art] Derive Key Pair
61,537,979 UART: [art] Store priv key in slot 0x5
64,000,458 UART: [art] Derive Key Pair - Done
64,013,634 UART: [art] Signing Cert with AUTHO
64,014,936 UART: RITY.KEYID = 7
65,726,336 UART: [art] Erasing AUTHORITY.KEYID = 7
65,727,879 UART: [art] PUB.X = EC86005A2EC4C6429763BC645E285D332E165FADE63DA7185CAF1ADF9ABAFDC59D746E945A31ACB0A036587A0773E3A3
65,735,124 UART: [art] PUB.Y = 7FAD948623856A7343AD6CDBF21CC87F633F01176704168C04DE55407A098CDF0D4BAFC37DF859BE377878766E716ED7
65,742,389 UART: [art] SIG.R = F24A19231F3B0F363A8DB3281D54266315BCCE1AAE8F04CC19DC2A1DA4CB37F9E204F802661CE08FB58B10F172B21441
65,749,764 UART: [art] SIG.S = DF44C80E3278FD10259E96412173B800AA5D3FC0DC62963E844CB6C01BDAFD5C4B5467F9D4742D2F7215802431B213BD
66,729,016 UART: mbox::rt_entry...
66,729,986 UART: ____ _ _ _ ____ _____
66,731,917 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,733,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,735,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,737,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,739,546 UART: |_|
66,740,386 UART:
67,026,653 UART: [rt] Runtime listening for mailbox commands...
67,028,788 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,381,322 ready_for_fw is high
3,381,774 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,501,629 >>> mbox cmd response: success
13,502,384 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,790,453 UART:
17,790,847 UART: Running Caliptra FMC ...
17,792,039 UART:
17,792,215 UART: [state] CFI Enabled
17,857,953 UART: [fht] FMC Alias Private Key: 7
19,621,513 UART: [art] Extend RT PCRs Done
19,622,745 UART: [art] Lock RT PCRs Done
19,624,321 UART: [art] Populate DV Done
19,629,893 UART: [fht] FMC Alias Private Key: 7
19,631,590 UART: [art] Derive CDI
19,632,401 UART: [art] Store in in slot 0x4
19,690,275 UART: [art] Derive Key Pair
19,691,273 UART: [art] Store priv key in slot 0x5
22,153,806 UART: [art] Derive Key Pair - Done
22,166,914 UART: [art] Signing Cert with AUTHO
22,168,224 UART: RITY.KEYID = 7
23,879,058 UART: [art] Erasing AUTHORITY.KEYID = 7
23,880,580 UART: [art] PUB.X = 2CEA7B5F7A8FFC8A7D081F7EF331BBE9497B3BC1787DDDBA3B43C835B4DCC97C8F8D8DB9957237A7BA73A2CB20AC545C
23,887,844 UART: [art] PUB.Y = D3474AE783607B0876AAC28738E4B010ECA9663196418D0E8DB70F52E1B3EB1F8F1652808B83B292E70CA46C42270BCA
23,895,150 UART: [art] SIG.R = 3DB9FFF5C16B3DB22014DF2BCB715F251689042DE6E8397E7F0949F963C2D450D793BD4D0652904A25C76071B4A0983D
23,902,533 UART: [art] SIG.S = C2C99AF8738C9B48032BC6E2E034413974EE0D7A55835203E54C484A04C5B5D89A4AEF6F7FA8BFFA5EB9C72893DC5924
24,880,685 UART: mbox::rt_entry...
24,881,632 UART: ____ _ _ _ ____ _____
24,883,613 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,885,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,887,541 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,889,513 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,891,365 UART: |_|
24,892,163 UART:
25,005,056 UART: [rt] Runtime listening for mailbox commands...
25,007,251 >>> mbox cmd response data (48 bytes)
27,070,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,214,236 >>> mbox cmd response: success
34,214,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,249,711 UART:
34,250,009 UART: Running Caliptra FMC ...
34,251,137 UART:
34,251,292 UART: [state] CFI Enabled
34,339,204 UART: [art] Extend RT PCRs Done
34,340,409 UART: [art] Lock RT PCRs Done
34,341,977 UART: [art] Populate DV Done
34,347,401 UART: [fht] FMC Alias Private Key: 7
34,349,107 UART: [art] Derive CDI
34,349,918 UART: [art] Store in in slot 0x4
34,407,795 UART: [art] Derive Key Pair
34,408,794 UART: [art] Store priv key in slot 0x5
36,872,534 UART: [art] Derive Key Pair - Done
36,885,640 UART: [art] Signing Cert with AUTHO
36,886,941 UART: RITY.KEYID = 7
38,598,335 UART: [art] Erasing AUTHORITY.KEYID = 7
38,599,840 UART: [art] PUB.X = CFD7EE7DCEF45ADC5DD216DBDA2816AB32EFF2ED8DC6848FD3EA0F36A2646CCFB041CB318DFB86CEBB73EE2DDF4C21C9
38,607,194 UART: [art] PUB.Y = 94D6A54F74441984D9DDFBCA9BB15E1C919765AF15A0F98F4872D8ED145DD233D56A5850DF828D42B719508B7529E08D
38,614,409 UART: [art] SIG.R = FB50928FC8D99CC457F4469451F9CA048B47758C167848CF6687F291463AD016F4AC81BBD1E0521986ABC21F55322976
38,621,785 UART: [art] SIG.S = 61C620B5558AD94EA82A20002130230A334CBFA2BAA215FD605C0E0B5FBACD683C46869029BB4682FEB77BEDE72C417C
39,600,555 UART: Caliptra RT
39,601,270 UART: [state] CFI Enabled
39,941,070 UART: [rt] RT listening for mailbox commands...
39,973,376 UART: [rt]cmd =0x4d454153, len=108
39,993,179 >>> mbox cmd response data (12 bytes)
42,036,533 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,539,018 >>> mbox cmd response: success
50,581,655 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,680,808 UART:
50,681,162 UART: Running Caliptra FMC ...
50,682,211 UART:
50,682,360 UART: [state] CFI Enabled
50,683,234 UART: [art] Extend RT PCRs Done
50,684,398 UART: [art] Lock RT PCRs Done
50,685,467 UART: [art] Populate DV Done
50,686,494 UART: [fht] FMC Alias Private Key: 7
50,687,809 UART: [art] Derive CDI
50,688,543 UART: [art] Store in in slot 0x4
50,689,706 UART: [art] Derive Key Pair
50,690,694 UART: [art] Store priv key in slot 0x5
51,208,254 UART: [art] Derive Key Pair - Done
51,221,401 UART: [art] Signing Cert with AUTHO
51,222,727 UART: RITY.KEYID = 7
52,934,240 UART: [art] Erasing AUTHORITY.KEYID = 7
52,935,771 UART: [art] PUB.X = 3A7E6FC040EE856C087AAD481CC5B5B6AC1C574CB0A34CD5B809064DC2C517FF0BCD35AAFB0E34767190EAD8ABD02122
52,943,007 UART: [art] PUB.Y = BEBBED4137D7642042E05E3C606890EE5F7C2ADCA232A3ED751BEFC193BC67A52054DA7A842A3976AAC53F8310DB840B
52,950,290 UART: [art] SIG.R = 5B4BF05936AF0FB01C43ACC44816BE366107667BF6B05D22723C6E5A445ABD94F59EE09FE0E1F5B45094F17784EDEC7F
52,957,709 UART: [art] SIG.S = 3D1B1AB7501BB6514741C2DB370002C700EC7D99E89FFD87301252196A6AFA225E1E2270CEA577D7813EC14C1FC8A68A
53,936,236 UART: mbox::rt_entry...
53,937,199 UART: ____ _ _ _ ____ _____
53,939,180 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,941,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,943,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,945,045 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,946,903 UART: |_|
53,947,779 UART:
54,231,468 UART: [rt] Runtime listening for mailbox commands...
60,630,613 >>> mbox cmd response: success
60,631,017 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,666,471 UART:
60,666,765 UART: Running Caliptra FMC ...
60,667,881 UART:
60,668,037 UART: [state] CFI Enabled
60,767,947 UART: [art] Extend RT PCRs Done
60,769,158 UART: [art] Lock RT PCRs Done
60,770,797 UART: [art] Populate DV Done
60,776,313 UART: [fht] FMC Alias Private Key: 7
60,778,009 UART: [art] Derive CDI
60,778,832 UART: [art] Store in in slot 0x4
60,836,897 UART: [art] Derive Key Pair
60,837,940 UART: [art] Store priv key in slot 0x5
63,300,241 UART: [art] Derive Key Pair - Done
63,313,340 UART: [art] Signing Cert with AUTHO
63,314,637 UART: RITY.KEYID = 7
65,025,935 UART: [art] Erasing AUTHORITY.KEYID = 7
65,027,440 UART: [art] PUB.X = D677711499426EA3BFFEC87FE201362D71DAB14B085BAF2DF80A384B4C5E8522BF9C818CC565E02EAD245CECAF72304E
65,034,722 UART: [art] PUB.Y = 780D20D7CB2B45F140FFD1C56E6E74003B1AB409127F74CCFE33FB43191348A0D8E1F3B9F6B39A4B617CEC33CD3FA742
65,041,990 UART: [art] SIG.R = F4B5A0372323D2276108CD947F849C185C9B521B3822F0BE5FF3D52680602AE77E34E79B060DC4757C633B9B30C78B28
65,049,362 UART: [art] SIG.S = 77AB8D292CD0C3BE3735E73B88B7E1C3B080D36261F051A9600E5D3EB378FAAEBF1DBCC08101166191997768584FDD26
66,027,811 UART: mbox::rt_entry...
66,028,784 UART: ____ _ _ _ ____ _____
66,030,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,032,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,034,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,036,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,038,493 UART: |_|
66,039,379 UART:
66,321,623 UART: [rt] Runtime listening for mailbox commands...
66,323,798 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.43s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,621,838 UART: [ldev] --
10,625,929 UART: [fwproc] Wait for Commands...
10,628,632 UART: [fwproc] Recv command 0x46574c44
10,630,725 UART: [fwproc] Recv'd Img size: 78456 bytes
13,589,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,654,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,723,541 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,915,327 >>> mbox cmd response: success
13,915,801 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,919,216 UART: [afmc] ++
13,919,800 UART: [afmc] CDI.KEYID = 6
13,920,710 UART: [afmc] SUBJECT.KEYID = 7
13,921,926 UART: [afmc] AUTHORITY.KEYID = 5
16,417,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,138,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,140,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,156,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,172,397 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,188,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,210,211 UART: [afmc] --
18,214,083 UART: [cold-reset] --
18,216,112 UART: [state] Locking Datavault
18,222,175 UART: [state] Locking PCR0, PCR1 and PCR31
18,223,907 UART: [state] Locking ICCM
18,225,636 UART: [exit] Launching FMC @ 0x40000130
18,234,095 UART:
18,234,348 UART: Running Caliptra FMC ...
18,235,457 UART:
18,235,621 UART: [state] CFI Enabled
18,243,852 UART: [fht] FMC Alias Private Key: 7
20,000,108 UART: [art] Extend RT PCRs Done
20,001,338 UART: [art] Lock RT PCRs Done
20,003,078 UART: [art] Populate DV Done
20,008,394 UART: [fht] FMC Alias Private Key: 7
20,010,049 UART: [art] Derive CDI
20,010,872 UART: [art] Store in in slot 0x4
20,053,639 UART: [art] Derive Key Pair
20,054,647 UART: [art] Store priv key in slot 0x5
22,481,392 UART: [art] Derive Key Pair - Done
22,494,338 UART: [art] Signing Cert with AUTHO
22,495,646 UART: RITY.KEYID = 7
24,200,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,202,100 UART: [art] PUB.X = BC2757B8F019CE4932873DC154CA5F733D6A3A6213F96A877A7923D5F0D7262F6502B3413C2458A8F0146C00501DACF6
24,209,316 UART: [art] PUB.Y = 9C5252EA5AB356E0ABFF50BD574EA35F49089E2CD71E4568BF3780728799C04797AC56D79AB10C18245E646A1E11A2C3
24,216,576 UART: [art] SIG.R = 61C41B072D1F0E678EB9D5F2CDC239BCD67EF7BB4D49BDD2A7D91DD597A9FA3B4B57A62C141FD0B87A39DE91E908EA5B
24,224,043 UART: [art] SIG.S = 001862DEAA2463A668BC02BD9BE10D984117A752511E72F26D5EC636E6B73DF07E103BCD048B6130A72BBDF4B71B7EBB
25,202,133 UART: mbox::rt_entry...
25,203,087 UART: ____ _ _ _ ____ _____
25,205,016 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,207,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,968 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,901 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,831 UART: |_|
25,213,666 UART:
25,326,257 UART: [rt] Runtime listening for mailbox commands...
25,328,423 >>> mbox cmd response data (48 bytes)
27,386,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,531,552 UART:
27,531,945 UART: Running Caliptra ROM ...
27,533,005 UART:
27,533,166 UART: [state] CFI Enabled
27,548,909 UART: [state] LifecycleState = Unprovisioned
27,550,814 UART: [state] DebugLocked = No
27,552,254 UART: [state] WD Timer not started. Device not locked for debugging
27,556,219 UART: [kat] SHA2-256
27,735,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,746,967 UART: [kat] ++
27,747,513 UART: [kat] sha1
27,757,922 UART: [kat] SHA2-256
27,760,942 UART: [kat] SHA2-384
27,766,443 UART: [kat] SHA2-512-ACC
27,769,351 UART: [kat] ECC-384
30,210,342 UART: [kat] HMAC-384Kdf
30,223,484 UART: [kat] LMS
30,752,981 UART: [kat] --
30,756,536 UART: [update-reset] ++
34,173,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,176,027 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,558,081 >>> mbox cmd response: success
34,558,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,558,902 UART: [update-reset] Copying MAN_2 To MAN_1
34,580,954 UART: [update-reset Success] --
34,584,158 UART: [state] Locking Datavault
34,587,465 UART: [state] Locking PCR0, PCR1 and PCR31
34,589,112 UART: [state] Locking ICCM
34,590,186 UART: [exit] Launching FMC @ 0x40000130
34,598,639 UART:
34,598,898 UART: Running Caliptra FMC ...
34,600,385 UART:
34,600,552 UART: [state] CFI Enabled
34,644,101 UART: [art] Extend RT PCRs Done
34,645,286 UART: [art] Lock RT PCRs Done
34,646,959 UART: [art] Populate DV Done
34,652,367 UART: [fht] FMC Alias Private Key: 7
34,653,963 UART: [art] Derive CDI
34,654,780 UART: [art] Store in in slot 0x4
34,697,643 UART: [art] Derive Key Pair
34,698,642 UART: [art] Store priv key in slot 0x5
37,125,180 UART: [art] Derive Key Pair - Done
37,138,391 UART: [art] Signing Cert with AUTHO
37,139,693 UART: RITY.KEYID = 7
38,845,210 UART: [art] Erasing AUTHORITY.KEYID = 7
38,846,721 UART: [art] PUB.X = BA6BB9F62EE0D24915C838C65789CDB7F4DD3D645F5787826FAFC2FC3981255F1638D0F9D890BDAA601BBBCC8DDFBC7B
38,854,012 UART: [art] PUB.Y = 8DFE54AFE9269AE2955E0729209BE0FD20306B27990651A88EABD8A000308501D4C4A81F1104C89624B5004702816A18
38,861,213 UART: [art] SIG.R = E29525BC317792A0D93DED7C7601525E9C0668F2B1E1D15DB87F9BAC9504FED5F3B9C90E7C7CDFC3C728C8EBD1067CEF
38,868,652 UART: [art] SIG.S = DCEC281F8C14C764B94E6E6C17571930C9024471FC10EA2B3918A2B533654CABD386CB209D1DCF9F66A23427884145B3
39,847,281 UART: Caliptra RT
39,847,985 UART: [state] CFI Enabled
40,139,598 UART: [rt] RT listening for mailbox commands...
40,171,747 UART: [rt]cmd =0x4d454153, len=108
40,190,364 >>> mbox cmd response data (12 bytes)
42,235,780 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,336,217 UART:
42,336,573 UART: Running Caliptra ROM ...
42,337,627 UART:
42,337,780 UART: [state] CFI Enabled
42,350,597 UART: [state] LifecycleState = Unprovisioned
42,352,466 UART: [state] DebugLocked = No
42,355,367 UART: [state] WD Timer not started. Device not locked for debugging
42,358,519 UART: [kat] SHA2-256
42,537,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,549,247 UART: [kat] ++
42,549,795 UART: [kat] sha1
42,561,064 UART: [kat] SHA2-256
42,564,086 UART: [kat] SHA2-384
42,570,130 UART: [kat] SHA2-512-ACC
42,573,072 UART: [kat] ECC-384
45,012,327 UART: [kat] HMAC-384Kdf
45,024,719 UART: [kat] LMS
45,554,245 UART: [kat] --
45,559,477 UART: [update-reset] ++
48,542,967 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,546,083 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
48,803,392 >>> mbox cmd response: success
50,845,631 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,945,014 UART: [update-reset] Copying MAN_2 To MAN_1
50,946,717 UART: [update-reset Success] --
50,947,887 UART: [state] Locking Datavault
50,949,045 UART: [state] Locking PCR0, PCR1 and PCR31
50,950,587 UART: [state] Locking ICCM
50,951,498 UART: [exit] Launching FMC @ 0x40000130
50,952,926 UART:
50,953,090 UART: Running Caliptra FMC ...
50,954,192 UART:
50,954,349 UART: [state] CFI Enabled
50,955,267 UART: [art] Extend RT PCRs Done
50,956,410 UART: [art] Lock RT PCRs Done
50,957,497 UART: [art] Populate DV Done
50,958,532 UART: [fht] FMC Alias Private Key: 7
50,959,850 UART: [art] Derive CDI
50,960,588 UART: [art] Store in in slot 0x4
50,961,757 UART: [art] Derive Key Pair
50,962,753 UART: [art] Store priv key in slot 0x5
51,373,204 UART: [art] Derive Key Pair - Done
51,386,070 UART: [art] Signing Cert with AUTHO
51,387,370 UART: RITY.KEYID = 7
53,093,001 UART: [art] Erasing AUTHORITY.KEYID = 7
53,094,528 UART: [art] PUB.X = 29DF2B27E7D4652B107E2EA41ED7063FDE26B12D9EA8A5A0F3E3CA45C7686140BDCC0100522B3B186579B29D6F8B8CCA
53,101,804 UART: [art] PUB.Y = FBB558D05F795B3040465E30868E7D3CB04936A0FE604C2990789727B146B1F1DB39BC25CD5F765FB4FC04DF76E55A97
53,109,057 UART: [art] SIG.R = 471C432B97BBF573B4E45E862E654B8099254DDE674FC25D8A6C2BBB25A7CC42B923FFD7C753845A14A86985E3997B53
53,116,439 UART: [art] SIG.S = A5E6566033A90F1810B3BD03DA1B9252606DC0C2B11B238A10338D8A09D7D2AF803D7CC20EBB07B3992D6CAF62B2F0C1
54,095,437 UART: mbox::rt_entry...
54,096,382 UART: ____ _ _ _ ____ _____
54,098,390 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,100,406 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,102,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,104,281 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,106,214 UART: |_|
54,107,053 UART:
54,393,928 UART: [rt] Runtime listening for mailbox commands...
54,395,985 UART:
54,396,148 UART: Running Caliptra ROM ...
54,397,166 UART:
54,397,528 UART: [state] CFI Enabled
54,411,625 UART: [state] LifecycleState = Unprovisioned
54,413,462 UART: [state] DebugLocked = No
54,415,597 UART: [state] WD Timer not started. Device not locked for debugging
54,418,532 UART: [kat] SHA2-256
54,597,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
54,609,281 UART: [kat] ++
54,609,829 UART: [kat] sha1
54,621,748 UART: [kat] SHA2-256
54,624,784 UART: [kat] SHA2-384
54,630,920 UART: [kat] SHA2-512-ACC
54,633,870 UART: [kat] ECC-384
57,076,356 UART: [kat] HMAC-384Kdf
57,090,199 UART: [kat] LMS
57,619,684 UART: [kat] --
57,622,994 UART: [update-reset] ++
60,609,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
60,612,854 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
60,870,185 >>> mbox cmd response: success
60,870,553 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,871,270 UART: [update-reset] Copying MAN_2 To MAN_1
60,893,601 UART: [update-reset Success] --
60,899,047 UART: [state] Locking Datavault
60,902,090 UART: [state] Locking PCR0, PCR1 and PCR31
60,903,797 UART: [state] Locking ICCM
60,906,324 UART: [exit] Launching FMC @ 0x40000130
60,914,777 UART:
60,915,014 UART: Running Caliptra FMC ...
60,916,119 UART:
60,916,278 UART: [state] CFI Enabled
60,960,568 UART: [art] Extend RT PCRs Done
60,961,753 UART: [art] Lock RT PCRs Done
60,963,372 UART: [art] Populate DV Done
60,968,942 UART: [fht] FMC Alias Private Key: 7
60,970,479 UART: [art] Derive CDI
60,971,295 UART: [art] Store in in slot 0x4
61,013,998 UART: [art] Derive Key Pair
61,015,003 UART: [art] Store priv key in slot 0x5
63,441,627 UART: [art] Derive Key Pair - Done
63,454,621 UART: [art] Signing Cert with AUTHO
63,455,932 UART: RITY.KEYID = 7
65,161,408 UART: [art] Erasing AUTHORITY.KEYID = 7
65,162,919 UART: [art] PUB.X = CF5DE02B5404DD970F6B1E53C49545CE365D3030A736DBFC24B6BE7115F93DE634DA1AB171A9341D70E9076A18E504B3
65,170,203 UART: [art] PUB.Y = 882B29A90A79E6D26422FEDC43396F782A6429940D5F9A4F90311DF83693A994E15ABAF1BDD58C5AE7080E3FEEB88C93
65,177,463 UART: [art] SIG.R = C77EDB95CB1D212BD99954C351C3214328CEBF124AB614F792B61D4026C3ED0A40D95CD8826EF307020A4821AB34F2EA
65,184,884 UART: [art] SIG.S = 82C4B7AA94EFF4AA46DD9FB0EEB0D09F85EC95A311822915B84919AEA25756EF4EE2F203F04ACEB4BBF4D680E97F632D
66,163,456 UART: mbox::rt_entry...
66,164,401 UART: ____ _ _ _ ____ _____
66,166,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,168,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,170,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,172,117 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,173,967 UART: |_|
66,174,850 UART:
66,456,516 UART: [rt] Runtime listening for mailbox commands...
66,458,633 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
3,693,367 ready_for_fw is high
3,693,978 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,699,851 >>> mbox cmd response: success
13,700,441 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,949,209 UART:
17,949,604 UART: Running Caliptra FMC ...
17,950,714 UART:
17,950,868 UART: [state] CFI Enabled
17,959,037 UART: [fht] FMC Alias Private Key: 7
19,716,176 UART: [art] Extend RT PCRs Done
19,717,399 UART: [art] Lock RT PCRs Done
19,718,741 UART: [art] Populate DV Done
19,724,324 UART: [fht] FMC Alias Private Key: 7
19,725,885 UART: [art] Derive CDI
19,726,621 UART: [art] Store in in slot 0x4
19,769,039 UART: [art] Derive Key Pair
19,770,055 UART: [art] Store priv key in slot 0x5
22,196,670 UART: [art] Derive Key Pair - Done
22,209,396 UART: [art] Signing Cert with AUTHO
22,210,730 UART: RITY.KEYID = 7
23,915,779 UART: [art] Erasing AUTHORITY.KEYID = 7
23,917,290 UART: [art] PUB.X = 578FC58974C1F0C253F428D6059E488313C018AB2392E9DA501CB7A8704DAA92908B2BD1BC7E2D4C5E4D2484897E710C
23,924,520 UART: [art] PUB.Y = F602E7F90AF00568DEE32CE49BBA0D8BE7225B038F37F79F6C98A28294473434484405E638AE23BB603AEECDBB6B4128
23,931,780 UART: [art] SIG.R = DAD500540871940325CE5000050CF56879CEBC1E7376FECCD9F905FEA8086F985980D6C4208E3456FE30BFEB2BDFB974
23,939,144 UART: [art] SIG.S = F4C719D2E08EA517D55AD9D07C99B294C1CA6F5DCCDA8EC1D079400A35059E819CF2B7BC656B602127A95B80EC0DC32D
24,918,081 UART: mbox::rt_entry...
24,919,052 UART: ____ _ _ _ ____ _____
24,921,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,923,058 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,925,012 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,926,987 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,929,130 UART: |_|
24,929,952 UART:
25,041,721 UART: [rt] Runtime listening for mailbox commands...
25,043,839 >>> mbox cmd response data (48 bytes)
27,100,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,146,459 >>> mbox cmd response: success
34,147,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,181,085 UART:
34,181,390 UART: Running Caliptra FMC ...
34,182,427 UART:
34,182,595 UART: [state] CFI Enabled
34,226,422 UART: [art] Extend RT PCRs Done
34,227,614 UART: [art] Lock RT PCRs Done
34,229,259 UART: [art] Populate DV Done
34,234,447 UART: [fht] FMC Alias Private Key: 7
34,236,092 UART: [art] Derive CDI
34,236,832 UART: [art] Store in in slot 0x4
34,279,590 UART: [art] Derive Key Pair
34,280,603 UART: [art] Store priv key in slot 0x5
36,707,581 UART: [art] Derive Key Pair - Done
36,720,526 UART: [art] Signing Cert with AUTHO
36,721,829 UART: RITY.KEYID = 7
38,427,072 UART: [art] Erasing AUTHORITY.KEYID = 7
38,428,582 UART: [art] PUB.X = 1229442D240517E82154929EBFCE701C0EDE77F1798E64FF6EE9FE3E2F3C5A3B5B61CADFA9090FA0C6624E8E195E2252
38,435,836 UART: [art] PUB.Y = CDA1517A4558BA7D6FCE06844E151510C288674359A07DAB2B3EEB5B4E13CD50153141F463B911AF2FBA9784F1E4E66C
38,443,088 UART: [art] SIG.R = 8E7D01B85387B334FE4A87CAD912F1D1D13CCB3CA5352E35F2F89B9174FD804AF7476DB6CDA28BE3DF91B0C4B794420D
38,450,552 UART: [art] SIG.S = 25FC3EC0B26445B8A7257E2DA70EB6F4A4DC7E3E3EA24ED2084E6FC4C0C3CA1A2321A34670F2C0751B4E45F530036710
39,430,022 UART: Caliptra RT
39,430,755 UART: [state] CFI Enabled
39,719,727 UART: [rt] RT listening for mailbox commands...
39,752,054 UART: [rt]cmd =0x4d454153, len=108
39,770,223 >>> mbox cmd response data (12 bytes)
41,816,155 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,253,299 >>> mbox cmd response: success
50,296,546 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,395,730 UART:
50,396,100 UART: Running Caliptra FMC ...
50,397,240 UART:
50,397,414 UART: [state] CFI Enabled
50,398,343 UART: [art] Extend RT PCRs Done
50,399,486 UART: [art] Lock RT PCRs Done
50,400,556 UART: [art] Populate DV Done
50,401,590 UART: [fht] FMC Alias Private Key: 7
50,402,908 UART: [art] Derive CDI
50,403,647 UART: [art] Store in in slot 0x4
50,404,783 UART: [art] Derive Key Pair
50,405,694 UART: [art] Store priv key in slot 0x5
50,815,058 UART: [art] Derive Key Pair - Done
50,827,941 UART: [art] Signing Cert with AUTHO
50,829,248 UART: RITY.KEYID = 7
52,535,081 UART: [art] Erasing AUTHORITY.KEYID = 7
52,536,603 UART: [art] PUB.X = B1934048C88F6BD4E324EEC1DD0691A1CFF182C8B632F66BFB9B4D1E7D768C192FD3C44DF4A45DB4BD7C456165EC78CA
52,543,893 UART: [art] PUB.Y = 7EE0082EB34628039A4D33375A771D90C36D129D611B94AA8BD0D19D86D8CD6C374D987A90895AB4F00EF3A6E8CFE875
52,551,093 UART: [art] SIG.R = A5F24B54B5A1CAD1C6AC3533159009334489CEB1CCC29DC2EDE0571279461E9EC8B707427D3CFD3F1989524B44D08B39
52,558,469 UART: [art] SIG.S = FC0079C80F749432BB6A9BF5737A0F52FBEF7DB3E9DE3419CD469B265648BCD3C960F5D0E301B218781DFAFE72DCBB09
53,537,564 UART: mbox::rt_entry...
53,538,507 UART: ____ _ _ _ ____ _____
53,540,486 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,542,605 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,544,545 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,546,399 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,548,322 UART: |_|
53,549,131 UART:
53,832,173 UART: [rt] Runtime listening for mailbox commands...
60,169,707 >>> mbox cmd response: success
60,170,102 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,204,983 UART:
60,205,310 UART: Running Caliptra FMC ...
60,206,396 UART:
60,206,564 UART: [state] CFI Enabled
60,250,437 UART: [art] Extend RT PCRs Done
60,251,628 UART: [art] Lock RT PCRs Done
60,253,138 UART: [art] Populate DV Done
60,258,652 UART: [fht] FMC Alias Private Key: 7
60,260,137 UART: [art] Derive CDI
60,260,897 UART: [art] Store in in slot 0x4
60,303,667 UART: [art] Derive Key Pair
60,304,712 UART: [art] Store priv key in slot 0x5
62,731,566 UART: [art] Derive Key Pair - Done
62,744,521 UART: [art] Signing Cert with AUTHO
62,745,829 UART: RITY.KEYID = 7
64,451,210 UART: [art] Erasing AUTHORITY.KEYID = 7
64,452,711 UART: [art] PUB.X = 4838CA089F5594630F2EDA49DCFC30E61AF42D35FB26C0B34BAC8565033DEDA3B14DCB79F00C77A7D26A8E6548E7BE64
64,459,968 UART: [art] PUB.Y = 0553D8642D2FDDF63CD70CCFCAC1ABF5D5E260144764966D4FE272262E399A66A2FD3B6006D6809413E8FEB4B6A65DE4
64,467,243 UART: [art] SIG.R = 0EF83A45B7251B3D4F6B2B67EBD5BB3113BFCD029A36B7A3BDD17BE757631A8C4C41411BA0DFF4EF56E8C26970F531B8
64,474,671 UART: [art] SIG.S = 6FA3F09EE9E39F28CCC8623050688082BA89DDBE2FE1FFBC99891033E9B80FD514E523DCB7830529D4C93906082449F8
65,453,338 UART: mbox::rt_entry...
65,454,286 UART: ____ _ _ _ ____ _____
65,456,369 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
65,458,386 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
65,460,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
65,462,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
65,464,120 UART: |_|
65,464,921 UART:
65,748,372 UART: [rt] Runtime listening for mailbox commands...
65,750,543 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.40s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,408,937 UART: [ldev] --
10,415,063 UART: [fwproc] Wait for Commands...
10,416,564 UART: [fwproc] Recv command 0x46574c44
10,418,488 UART: [fwproc] Recv'd Img size: 78456 bytes
13,423,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,495,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,611,266 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,937,633 >>> mbox cmd response: success
13,938,120 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,942,591 UART: [afmc] ++
13,943,300 UART: [afmc] CDI.KEYID = 6
13,944,491 UART: [afmc] SUBJECT.KEYID = 7
13,945,935 UART: [afmc] AUTHORITY.KEYID = 5
16,489,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,214,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,215,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,231,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,246,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,261,226 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,285,548 UART: [afmc] --
18,289,692 UART: [cold-reset] --
18,295,062 UART: [state] Locking Datavault
18,300,072 UART: [state] Locking PCR0, PCR1 and PCR31
18,302,236 UART: [state] Locking ICCM
18,304,879 UART: [exit] Launching FMC @ 0x40000130
18,313,565 UART:
18,313,803 UART: Running Caliptra FMC ...
18,314,902 UART:
18,315,058 UART: [state] CFI Enabled
18,371,306 UART: [fht] FMC Alias Private Key: 7
20,135,198 UART: [art] Extend RT PCRs Done
20,136,414 UART: [art] Lock RT PCRs Done
20,138,142 UART: [art] Populate DV Done
20,143,545 UART: [fht] FMC Alias Private Key: 7
20,145,076 UART: [art] Derive CDI
20,145,817 UART: [art] Store in in slot 0x4
20,196,721 UART: [art] Derive Key Pair
20,197,717 UART: [art] Store priv key in slot 0x5
22,660,770 UART: [art] Derive Key Pair - Done
22,673,876 UART: [art] Signing Cert with AUTHO
22,675,169 UART: RITY.KEYID = 7
24,386,726 UART: [art] Erasing AUTHORITY.KEYID = 7
24,388,223 UART: [art] PUB.X = 00ECFBA9C3EC7170A20CD2632B88E1E5BE1B5C722FD255F8BBAF765249E572CF69F4DA4B7A0241F02D9EECB6AAFE35EF
24,395,488 UART: [art] PUB.Y = BD5C7436A02821A1CA1A05728C3ACA2D78B95FA3031F30792AAE0931B65BFADE1276B5BCC852ECE57EB21D099E4C55E6
24,402,793 UART: [art] SIG.R = 8D6CB3060D62333AB4168481C71A668753F01DBBA83696530B8CFC9868404EBB9EBA1EEB8721A7F5E24BABACA7D209A0
24,410,153 UART: [art] SIG.S = 031D6BFE7CBB363514866BDC82F8F322933085B0407672BC614AFB4DB368BED22937C2A9ED7AD433D00580BCEDD1ADDE
25,388,579 UART: mbox::rt_entry...
25,389,533 UART: ____ _ _ _ ____ _____
25,391,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,393,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,395,432 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,397,357 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,399,278 UART: |_|
25,400,084 UART:
25,513,334 UART: [rt] Runtime listening for mailbox commands...
25,515,454 >>> mbox cmd response data (48 bytes)
27,572,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,716,983 UART:
27,717,358 UART: Running Caliptra ROM ...
27,718,406 UART:
27,718,553 UART: [state] CFI Enabled
27,774,651 UART: [state] LifecycleState = Unprovisioned
27,776,768 UART: [state] DebugLocked = No
27,778,720 UART: [state] WD Timer not started. Device not locked for debugging
27,784,030 UART: [kat] SHA2-256
27,973,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,984,677 UART: [kat] ++
27,985,134 UART: [kat] sha1
27,996,888 UART: [kat] SHA2-256
27,999,904 UART: [kat] SHA2-384
28,005,836 UART: [kat] SHA2-512-ACC
28,008,413 UART: [kat] ECC-384
30,461,495 UART: [kat] HMAC-384Kdf
30,482,871 UART: [kat] LMS
31,014,406 UART: [kat] --
31,019,810 UART: [update-reset] ++
34,475,792 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,479,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,085,923 >>> mbox cmd response: success
35,086,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,087,429 UART: [update-reset] Copying MAN_2 To MAN_1
35,124,967 UART: [update-reset Success] --
35,129,533 UART: [state] Locking Datavault
35,133,668 UART: [state] Locking PCR0, PCR1 and PCR31
35,135,845 UART: [state] Locking ICCM
35,137,189 UART: [exit] Launching FMC @ 0x40000130
35,145,824 UART:
35,146,053 UART: Running Caliptra FMC ...
35,147,366 UART:
35,147,525 UART: [state] CFI Enabled
35,249,595 UART: [art] Extend RT PCRs Done
35,250,789 UART: [art] Lock RT PCRs Done
35,252,515 UART: [art] Populate DV Done
35,258,082 UART: [fht] FMC Alias Private Key: 7
35,259,736 UART: [art] Derive CDI
35,260,546 UART: [art] Store in in slot 0x4
35,319,170 UART: [art] Derive Key Pair
35,320,163 UART: [art] Store priv key in slot 0x5
37,783,514 UART: [art] Derive Key Pair - Done
37,796,573 UART: [art] Signing Cert with AUTHO
37,797,871 UART: RITY.KEYID = 7
39,509,000 UART: [art] Erasing AUTHORITY.KEYID = 7
39,510,512 UART: [art] PUB.X = D8EF15E2D52415FDBF62ED5CA29B961A7AB2298DAB54D39E4F9496FE68AEC7CCCA649B5D6542F7AA05730976CA3FA8AC
39,517,785 UART: [art] PUB.Y = F38E93CE65812A398C60D92602005416AE29B97C0B8F0E0CA920F6ECD4AFF388570ED67051A67F08A14F186732CB9DCF
39,525,048 UART: [art] SIG.R = 0A5E67CFE90F56B55D45AEE634058D99D5713FD24E49698312E1F5E7B1123CE58062B426367DD5A6676EED0A8A505156
39,532,411 UART: [art] SIG.S = 7381F8797AF84691D2D299B5A041A5F638E25B56BB5BA30AF6F7C400AF1C71C8BA806D9CF7ACD36812F117980F2429AA
40,511,613 UART: Caliptra RT
40,512,317 UART: [state] CFI Enabled
40,849,040 UART: [rt] RT listening for mailbox commands...
40,881,209 UART: [rt]cmd =0x4d454153, len=108
40,898,799 >>> mbox cmd response data (12 bytes)
42,942,282 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
43,043,019 UART:
43,043,376 UART: Running Caliptra ROM ...
43,044,432 UART:
43,044,584 UART: [state] CFI Enabled
43,113,695 UART: [state] LifecycleState = Unprovisioned
43,115,757 UART: [state] DebugLocked = No
43,117,779 UART: [state] WD Timer not started. Device not locked for debugging
43,122,010 UART: [kat] SHA2-256
43,311,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,322,632 UART: [kat] ++
43,323,090 UART: [kat] sha1
43,336,038 UART: [kat] SHA2-256
43,339,060 UART: [kat] SHA2-384
43,346,686 UART: [kat] SHA2-512-ACC
43,349,260 UART: [kat] ECC-384
45,797,120 UART: [kat] HMAC-384Kdf
45,820,837 UART: [kat] LMS
46,352,397 UART: [kat] --
46,357,682 UART: [update-reset] ++
49,372,338 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,375,290 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,767,598 >>> mbox cmd response: success
51,809,156 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
51,908,521 UART: [update-reset] Copying MAN_2 To MAN_1
51,910,213 UART: [update-reset Success] --
51,911,373 UART: [state] Locking Datavault
51,912,518 UART: [state] Locking PCR0, PCR1 and PCR31
51,914,052 UART: [state] Locking ICCM
51,914,974 UART: [exit] Launching FMC @ 0x40000130
51,916,395 UART:
51,916,554 UART: Running Caliptra FMC ...
51,917,653 UART:
51,917,803 UART: [state] CFI Enabled
51,918,717 UART: [art] Extend RT PCRs Done
51,919,851 UART: [art] Lock RT PCRs Done
51,920,928 UART: [art] Populate DV Done
51,921,956 UART: [fht] FMC Alias Private Key: 7
51,923,268 UART: [art] Derive CDI
51,924,003 UART: [art] Store in in slot 0x4
51,925,175 UART: [art] Derive Key Pair
51,926,115 UART: [art] Store priv key in slot 0x5
52,461,181 UART: [art] Derive Key Pair - Done
52,474,125 UART: [art] Signing Cert with AUTHO
52,475,420 UART: RITY.KEYID = 7
54,186,929 UART: [art] Erasing AUTHORITY.KEYID = 7
54,188,456 UART: [art] PUB.X = 5330E2B54B1FCA929ADEEAEC102054652FF552CC210ED18DE7717FAC5146CA607FB9DC950A46BA558CC33C1ABAC59138
54,195,728 UART: [art] PUB.Y = 3F0EA65B4AA8B8EC4161E9BCAF957297941811C52985742D7DF1CC01975DE2F9879EA3839ACA560B8DCAE2B0CBF85B81
54,203,038 UART: [art] SIG.R = 635E267E9837E1B9FE9301226C1745B72A9CA96197BB4C04824D253DD92932AA642741DE77A9EF94EDAEF71538AE43C8
54,210,455 UART: [art] SIG.S = 41FC6140463DEDFD7B1D423B6E12507C7F01657C3DF7ED876D792AE2E4F45FE07D438B3185A20B5A29F5ED005B796C63
55,189,547 UART: mbox::rt_entry...
55,190,501 UART: ____ _ _ _ ____ _____
55,192,445 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,194,452 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,196,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,198,234 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,200,118 UART: |_|
55,201,001 UART:
55,484,697 UART: [rt] Runtime listening for mailbox commands...
55,486,729 UART:
55,486,893 UART: Running Caliptra ROM ...
55,487,919 UART:
55,488,061 UART: [state] CFI Enabled
55,551,435 UART: [state] LifecycleState = Unprovisioned
55,553,485 UART: [state] DebugLocked = No
55,555,922 UART: [state] WD Timer not started. Device not locked for debugging
55,559,844 UART: [kat] SHA2-256
55,749,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,760,501 UART: [kat] ++
55,760,949 UART: [kat] sha1
55,772,160 UART: [kat] SHA2-256
55,775,189 UART: [kat] SHA2-384
55,780,207 UART: [kat] SHA2-512-ACC
55,782,778 UART: [kat] ECC-384
58,235,019 UART: [kat] HMAC-384Kdf
58,257,340 UART: [kat] LMS
58,788,907 UART: [kat] --
58,792,951 UART: [update-reset] ++
61,801,433 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,804,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
62,197,126 >>> mbox cmd response: success
62,197,492 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,198,740 UART: [update-reset] Copying MAN_2 To MAN_1
62,236,336 UART: [update-reset Success] --
62,240,737 UART: [state] Locking Datavault
62,244,823 UART: [state] Locking PCR0, PCR1 and PCR31
62,246,981 UART: [state] Locking ICCM
62,248,381 UART: [exit] Launching FMC @ 0x40000130
62,257,071 UART:
62,257,303 UART: Running Caliptra FMC ...
62,258,402 UART:
62,258,554 UART: [state] CFI Enabled
62,365,208 UART: [art] Extend RT PCRs Done
62,366,395 UART: [art] Lock RT PCRs Done
62,367,795 UART: [art] Populate DV Done
62,373,252 UART: [fht] FMC Alias Private Key: 7
62,374,930 UART: [art] Derive CDI
62,375,745 UART: [art] Store in in slot 0x4
62,435,132 UART: [art] Derive Key Pair
62,436,127 UART: [art] Store priv key in slot 0x5
64,898,499 UART: [art] Derive Key Pair - Done
64,911,496 UART: [art] Signing Cert with AUTHO
64,912,798 UART: RITY.KEYID = 7
66,625,418 UART: [art] Erasing AUTHORITY.KEYID = 7
66,626,917 UART: [art] PUB.X = 13A848389FBE7C0DF639399699C24875312669781F920C794C794C7F5FEF8EBF45E9F77404FE692E6BCF8A2A730EF34D
66,634,191 UART: [art] PUB.Y = CEBD254DD70465549E8E7963F094F042127D56F274642C91498AAF17982AE047F21A10FF6604E17222971801F1EEEE87
66,641,384 UART: [art] SIG.R = 55E0A1F68A0681B9E431D1A1000AC61B6A5E68F6CA6588B9ADF712F892DB2C5948E7744E0FEE3D62457A5477A460B730
66,648,794 UART: [art] SIG.S = 5E5B5B96198A65F1FA6DE2E079B6FB40BDC09CFCC980CFC849874BECD4A5CD91EA52615CC8E4C4534562DD035D7599D8
67,627,384 UART: mbox::rt_entry...
67,628,335 UART: ____ _ _ _ ____ _____
67,630,260 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,632,257 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,634,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,636,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,637,965 UART: |_|
67,638,773 UART:
67,917,850 UART: [rt] Runtime listening for mailbox commands...
67,919,988 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,438,130 ready_for_fw is high
3,438,542 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,967,901 >>> mbox cmd response: success
13,968,644 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,278,173 UART:
18,278,570 UART: Running Caliptra FMC ...
18,279,783 UART:
18,279,952 UART: [state] CFI Enabled
18,345,266 UART: [fht] FMC Alias Private Key: 7
20,109,017 UART: [art] Extend RT PCRs Done
20,110,248 UART: [art] Lock RT PCRs Done
20,111,904 UART: [art] Populate DV Done
20,117,544 UART: [fht] FMC Alias Private Key: 7
20,119,189 UART: [art] Derive CDI
20,119,999 UART: [art] Store in in slot 0x4
20,177,708 UART: [art] Derive Key Pair
20,178,706 UART: [art] Store priv key in slot 0x5
22,642,085 UART: [art] Derive Key Pair - Done
22,654,880 UART: [art] Signing Cert with AUTHO
22,656,177 UART: RITY.KEYID = 7
24,367,984 UART: [art] Erasing AUTHORITY.KEYID = 7
24,369,480 UART: [art] PUB.X = 3429EF7FF18DC47B986BCE8A14147861C4805C298C7013DCB84499FD866AA42EEBE2EE84A8A87A01D7169C5F9A15549D
24,376,730 UART: [art] PUB.Y = 7BBACAD69BAC93EE47F5F4AF7378FA5AC07928EDE8D3417986CDAADDB7B2DE746E81147AB7575BB91BD85479AF86EF83
24,384,012 UART: [art] SIG.R = 5A813A42EE8C009E750DC7681052EF8E4D3E67146D9F689603BC3D81BA5BF7FAC0D323FC64918E44728B77C62D61037A
24,391,393 UART: [art] SIG.S = 72707211467D0B5A0D17A6C114F8A598E63EE0BDC85C433D4BF3CDDA9BDEE7E4059ECCE90149785FA04D04CE3EA75949
25,370,035 UART: mbox::rt_entry...
25,370,995 UART: ____ _ _ _ ____ _____
25,372,976 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,374,980 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,376,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,378,865 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,380,997 UART: |_|
25,381,812 UART:
25,494,771 UART: [rt] Runtime listening for mailbox commands...
25,496,931 >>> mbox cmd response data (48 bytes)
27,553,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,360,946 >>> mbox cmd response: success
35,361,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,397,583 UART:
35,397,902 UART: Running Caliptra FMC ...
35,398,942 UART:
35,399,087 UART: [state] CFI Enabled
35,488,106 UART: [art] Extend RT PCRs Done
35,489,293 UART: [art] Lock RT PCRs Done
35,490,825 UART: [art] Populate DV Done
35,496,446 UART: [fht] FMC Alias Private Key: 7
35,498,142 UART: [art] Derive CDI
35,498,876 UART: [art] Store in in slot 0x4
35,557,123 UART: [art] Derive Key Pair
35,558,162 UART: [art] Store priv key in slot 0x5
38,020,713 UART: [art] Derive Key Pair - Done
38,033,891 UART: [art] Signing Cert with AUTHO
38,035,196 UART: RITY.KEYID = 7
39,746,777 UART: [art] Erasing AUTHORITY.KEYID = 7
39,748,288 UART: [art] PUB.X = B83DC090CC5306B1CF5DD9994A5B003D84D37A97EE54B601F01BA5B47EFA1C6876F0E4FA7DDE0BFA70811ECA0444AE32
39,755,576 UART: [art] PUB.Y = 69F7971744CB668F59D8647ED8E0FCC8BDA8833AFF98755815FAFEB6DE5365CC372EC62E4301C81476E2DA7E7A608794
39,762,842 UART: [art] SIG.R = 6C8DCC450B116C4DC402BB50ECD7B1C4F93F626AA0692CC117D19BC2AA20EE39BBBA79E2F5A8C9BC0682EDD6D9FAEA0A
39,770,210 UART: [art] SIG.S = 82496D095E15A61F8A492AE5C14B207E135A5468EAA5E55463D82B96683754905BA388E9A554A93AB37EF3C237BD2B4F
40,749,023 UART: Caliptra RT
40,749,741 UART: [state] CFI Enabled
41,085,101 UART: [rt] RT listening for mailbox commands...
41,117,354 UART: [rt]cmd =0x4d454153, len=108
41,136,497 >>> mbox cmd response data (12 bytes)
43,181,421 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,183,711 >>> mbox cmd response: success
52,228,158 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
52,327,326 UART:
52,327,686 UART: Running Caliptra FMC ...
52,328,815 UART:
52,328,982 UART: [state] CFI Enabled
52,329,901 UART: [art] Extend RT PCRs Done
52,330,959 UART: [art] Lock RT PCRs Done
52,332,023 UART: [art] Populate DV Done
52,332,969 UART: [fht] FMC Alias Private Key: 7
52,334,202 UART: [art] Derive CDI
52,334,995 UART: [art] Store in in slot 0x4
52,336,086 UART: [art] Derive Key Pair
52,337,075 UART: [art] Store priv key in slot 0x5
52,845,310 UART: [art] Derive Key Pair - Done
52,858,239 UART: [art] Signing Cert with AUTHO
52,859,543 UART: RITY.KEYID = 7
54,573,174 UART: [art] Erasing AUTHORITY.KEYID = 7
54,574,681 UART: [art] PUB.X = 9CF5FE5786D555281B61AD6EE1B0E7E352A7EA8323962431E02AD134164E60DAEC18178FBB384CABD30FEBFFB747FB21
54,582,009 UART: [art] PUB.Y = E6D623D49E8453C4CA4E767FA567148C14497BC141B7B4EB377AC9167A3AFCF871BF70BF1A944E6FF58CDBE7D7D6A032
54,589,223 UART: [art] SIG.R = 2E42E9562FF63764551B7B260FB8420EB3E8063BF30596F765CD255B22AA66D35280993C531040731AB18A0B3982663E
54,596,596 UART: [art] SIG.S = 64E67359AFE2E5FD882812D748E6BBDFA4A7153A01E3F56566E6C6ECF55690F1ED40FABB74609A30B2047820FCD9E663
55,574,762 UART: mbox::rt_entry...
55,575,727 UART: ____ _ _ _ ____ _____
55,577,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,579,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,581,511 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,583,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,585,302 UART: |_|
55,586,100 UART:
55,872,220 UART: [rt] Runtime listening for mailbox commands...
62,772,389 >>> mbox cmd response: success
62,772,796 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,807,368 UART:
62,807,624 UART: Running Caliptra FMC ...
62,808,658 UART:
62,808,803 UART: [state] CFI Enabled
62,898,465 UART: [art] Extend RT PCRs Done
62,899,649 UART: [art] Lock RT PCRs Done
62,901,125 UART: [art] Populate DV Done
62,906,573 UART: [fht] FMC Alias Private Key: 7
62,908,054 UART: [art] Derive CDI
62,908,791 UART: [art] Store in in slot 0x4
62,967,325 UART: [art] Derive Key Pair
62,968,321 UART: [art] Store priv key in slot 0x5
65,432,125 UART: [art] Derive Key Pair - Done
65,445,228 UART: [art] Signing Cert with AUTHO
65,446,525 UART: RITY.KEYID = 7
67,157,184 UART: [art] Erasing AUTHORITY.KEYID = 7
67,158,686 UART: [art] PUB.X = 54A07B94536CDE84C60AE4273BB4583C0D3537A80676B14526953D3951CE7DDA8E66CCCC2097FE2C8BC44135D24476F8
67,165,960 UART: [art] PUB.Y = 17831D9F4C559673362FBF2533348C2C70E18F188B53D54594526CAE1B757ECB46658A711B4C7E4176AA08445899FBC0
67,173,230 UART: [art] SIG.R = EE3E86BDACE03663241F07F7C1DB8177BF2D97383FF85DC57B77AB30ABB66A6D252547D51F8762B4253667686353EEBF
67,180,567 UART: [art] SIG.S = 859AC66576F1D4C44D9D7635C2AA06E3A357A06B3DAF13CF812087E4DD077BD419C9C16219777CA90342FA1EA1DFFADD
68,159,678 UART: mbox::rt_entry...
68,160,643 UART: ____ _ _ _ ____ _____
68,162,714 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,164,719 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,166,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,168,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,170,455 UART: |_|
68,171,336 UART:
68,455,132 UART: [rt] Runtime listening for mailbox commands...
68,457,302 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.54s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,639,574 UART: [ldev] --
10,644,320 UART: [fwproc] Wait for Commands...
10,646,363 UART: [fwproc] Recv command 0x46574c44
10,648,672 UART: [fwproc] Recv'd Img size: 78456 bytes
13,652,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,734,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,850,171 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,178,209 >>> mbox cmd response: success
14,178,704 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,183,032 UART: [afmc] ++
14,183,788 UART: [afmc] CDI.KEYID = 6
14,184,895 UART: [afmc] SUBJECT.KEYID = 7
14,186,446 UART: [afmc] AUTHORITY.KEYID = 5
16,692,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,414,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,416,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,431,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,446,747 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,461,777 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,486,277 UART: [afmc] --
18,489,135 UART: [cold-reset] --
18,493,331 UART: [state] Locking Datavault
18,498,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,500,969 UART: [state] Locking ICCM
18,502,933 UART: [exit] Launching FMC @ 0x40000130
18,511,619 UART:
18,511,857 UART: Running Caliptra FMC ...
18,512,959 UART:
18,513,114 UART: [state] CFI Enabled
18,521,158 UART: [fht] FMC Alias Private Key: 7
20,278,280 UART: [art] Extend RT PCRs Done
20,279,498 UART: [art] Lock RT PCRs Done
20,281,368 UART: [art] Populate DV Done
20,286,777 UART: [fht] FMC Alias Private Key: 7
20,288,366 UART: [art] Derive CDI
20,289,116 UART: [art] Store in in slot 0x4
20,331,867 UART: [art] Derive Key Pair
20,332,903 UART: [art] Store priv key in slot 0x5
22,759,757 UART: [art] Derive Key Pair - Done
22,772,970 UART: [art] Signing Cert with AUTHO
22,774,291 UART: RITY.KEYID = 7
24,479,662 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,165 UART: [art] PUB.X = 81AE0E12BD76530F1BC352CE44EDC5B1BFDA3213B7C92716468619E97890D6E628E2E9AAA7BB5BA25B98126E238C9352
24,488,438 UART: [art] PUB.Y = F5552C36A1390177E3D5C59E93F03F09BE4DAF9BA31FBEEBC804D06DA0AF56DF8F8B78FB464860FB31247AD5B8262C0B
24,495,745 UART: [art] SIG.R = 65F8876F77AE21D7827A2ED68DB2A017711C9946A08B23FD2FA470B51F00DE5F35E5062E34F7AF04570D5D22112B862B
24,503,118 UART: [art] SIG.S = CE2ECA7080D19965092BFA28A8B65CD1AA1A647F985852A520F2D590AC9406872E62DA2AD04B1E0A5F536A3F725DAB6A
25,482,161 UART: mbox::rt_entry...
25,483,125 UART: ____ _ _ _ ____ _____
25,485,056 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,487,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,488,921 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,490,848 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,492,904 UART: |_|
25,493,712 UART:
25,606,305 UART: [rt] Runtime listening for mailbox commands...
25,608,472 >>> mbox cmd response data (48 bytes)
27,665,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,809,544 UART:
27,809,958 UART: Running Caliptra ROM ...
27,811,011 UART:
27,811,168 UART: [state] CFI Enabled
27,820,966 UART: [state] LifecycleState = Unprovisioned
27,822,860 UART: [state] DebugLocked = No
27,824,323 UART: [state] WD Timer not started. Device not locked for debugging
27,828,525 UART: [kat] SHA2-256
28,018,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,029,116 UART: [kat] ++
28,029,631 UART: [kat] sha1
28,040,794 UART: [kat] SHA2-256
28,043,814 UART: [kat] SHA2-384
28,050,455 UART: [kat] SHA2-512-ACC
28,053,028 UART: [kat] ECC-384
30,497,078 UART: [kat] HMAC-384Kdf
30,510,937 UART: [kat] LMS
31,042,555 UART: [kat] --
31,044,600 UART: [update-reset] ++
34,498,714 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,502,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,108,083 >>> mbox cmd response: success
35,108,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,109,841 UART: [update-reset] Copying MAN_2 To MAN_1
35,147,412 UART: [update-reset Success] --
35,151,856 UART: [state] Locking Datavault
35,155,952 UART: [state] Locking PCR0, PCR1 and PCR31
35,158,160 UART: [state] Locking ICCM
35,160,326 UART: [exit] Launching FMC @ 0x40000130
35,168,957 UART:
35,169,199 UART: Running Caliptra FMC ...
35,170,462 UART:
35,170,628 UART: [state] CFI Enabled
35,214,500 UART: [art] Extend RT PCRs Done
35,215,684 UART: [art] Lock RT PCRs Done
35,217,142 UART: [art] Populate DV Done
35,222,659 UART: [fht] FMC Alias Private Key: 7
35,224,249 UART: [art] Derive CDI
35,225,065 UART: [art] Store in in slot 0x4
35,267,552 UART: [art] Derive Key Pair
35,268,550 UART: [art] Store priv key in slot 0x5
37,694,994 UART: [art] Derive Key Pair - Done
37,707,557 UART: [art] Signing Cert with AUTHO
37,708,855 UART: RITY.KEYID = 7
39,414,282 UART: [art] Erasing AUTHORITY.KEYID = 7
39,415,795 UART: [art] PUB.X = C25109E42231ABB0A51A7FC2E34BC8080814653A0776CDDCFDE1E821825C2F5E42EE568BC50160804BF5B1833CAC09EE
39,423,060 UART: [art] PUB.Y = 77DA1E71084A61AE6CDC88CB66F57B222C7DCA4996D08830AD859FBA8832CD9EFE47EDD6B77E57630A2FFD6F9AAAF2CE
39,430,376 UART: [art] SIG.R = 92D97C1D16A3FCC54E24AC27548DD04E2B770BF4A5397835E01FAEEA6BE60FA7FCE7A2667477B41F3F4A9C9287E0721C
39,437,845 UART: [art] SIG.S = 37E20A6A69F78083CE33F6F865586C07758F6A1FD7D71D58456D917CAAE8755172D28172B60BDEC9A9082C12042F9642
40,416,260 UART: Caliptra RT
40,416,981 UART: [state] CFI Enabled
40,704,192 UART: [rt] RT listening for mailbox commands...
40,736,468 UART: [rt]cmd =0x4d454153, len=108
40,754,890 >>> mbox cmd response data (12 bytes)
42,799,226 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,899,660 UART:
42,900,025 UART: Running Caliptra ROM ...
42,901,166 UART:
42,901,337 UART: [state] CFI Enabled
42,913,775 UART: [state] LifecycleState = Unprovisioned
42,915,614 UART: [state] DebugLocked = No
42,916,971 UART: [state] WD Timer not started. Device not locked for debugging
42,920,897 UART: [kat] SHA2-256
43,110,784 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,121,574 UART: [kat] ++
43,122,095 UART: [kat] sha1
43,133,745 UART: [kat] SHA2-256
43,136,761 UART: [kat] SHA2-384
43,141,944 UART: [kat] SHA2-512-ACC
43,144,526 UART: [kat] ECC-384
45,586,023 UART: [kat] HMAC-384Kdf
45,599,123 UART: [kat] LMS
46,130,698 UART: [kat] --
46,135,454 UART: [update-reset] ++
49,153,264 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,157,224 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,549,495 >>> mbox cmd response: success
51,592,613 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
51,691,814 UART: [update-reset] Copying MAN_2 To MAN_1
51,693,509 UART: [update-reset Success] --
51,694,636 UART: [state] Locking Datavault
51,695,722 UART: [state] Locking PCR0, PCR1 and PCR31
51,697,263 UART: [state] Locking ICCM
51,698,170 UART: [exit] Launching FMC @ 0x40000130
51,699,625 UART:
51,699,791 UART: Running Caliptra FMC ...
51,700,901 UART:
51,701,075 UART: [state] CFI Enabled
51,702,004 UART: [art] Extend RT PCRs Done
51,703,151 UART: [art] Lock RT PCRs Done
51,704,219 UART: [art] Populate DV Done
51,705,251 UART: [fht] FMC Alias Private Key: 7
51,706,569 UART: [art] Derive CDI
51,707,307 UART: [art] Store in in slot 0x4
51,708,472 UART: [art] Derive Key Pair
51,709,409 UART: [art] Store priv key in slot 0x5
52,136,445 UART: [art] Derive Key Pair - Done
52,149,553 UART: [art] Signing Cert with AUTHO
52,151,052 UART: RITY.KEYID = 7
53,856,200 UART: [art] Erasing AUTHORITY.KEYID = 7
53,857,697 UART: [art] PUB.X = 2F19F22D8D98EB555216D159F95E5035FA06D27EE29D895F21C526DCCB820487557B0D16CF84A9CAC86EA549679A0653
53,864,969 UART: [art] PUB.Y = E6C4F8B8A02C8681AB6FF6E1D2783508C98E3011E7AF7513C5E26E9949BA08F4C3F1A7386FB36A8C11E07844C02111F6
53,872,227 UART: [art] SIG.R = 5EBAACEB62A0310AEE99E4227AE5C936906AB17E8A47D00D8E5E67D53A543D9C248125C7F2904697489EF98255EEACA5
53,879,643 UART: [art] SIG.S = B28D0DB0C90819BB204700680FCCDED7D21695C90EE6438A5C517ECEC177E4275ABBC2B7352F398B946785F53972C46C
54,857,718 UART: mbox::rt_entry...
54,858,687 UART: ____ _ _ _ ____ _____
54,860,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,862,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,864,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,866,547 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,868,480 UART: |_|
54,869,290 UART:
55,155,646 UART: [rt] Runtime listening for mailbox commands...
55,157,724 UART:
55,157,901 UART: Running Caliptra ROM ...
55,159,052 UART:
55,159,348 UART: [state] CFI Enabled
55,175,481 UART: [state] LifecycleState = Unprovisioned
55,177,320 UART: [state] DebugLocked = No
55,179,509 UART: [state] WD Timer not started. Device not locked for debugging
55,184,424 UART: [kat] SHA2-256
55,374,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,385,083 UART: [kat] ++
55,385,628 UART: [kat] sha1
55,396,251 UART: [kat] SHA2-256
55,399,271 UART: [kat] SHA2-384
55,405,099 UART: [kat] SHA2-512-ACC
55,407,675 UART: [kat] ECC-384
57,848,632 UART: [kat] HMAC-384Kdf
57,862,108 UART: [kat] LMS
58,393,709 UART: [kat] --
58,397,980 UART: [update-reset] ++
61,412,535 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,416,403 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
61,808,676 >>> mbox cmd response: success
61,809,032 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,809,746 UART: [update-reset] Copying MAN_2 To MAN_1
61,847,323 UART: [update-reset Success] --
61,852,248 UART: [state] Locking Datavault
61,856,599 UART: [state] Locking PCR0, PCR1 and PCR31
61,858,752 UART: [state] Locking ICCM
61,861,347 UART: [exit] Launching FMC @ 0x40000130
61,869,974 UART:
61,870,217 UART: Running Caliptra FMC ...
61,871,324 UART:
61,871,484 UART: [state] CFI Enabled
61,915,059 UART: [art] Extend RT PCRs Done
61,916,241 UART: [art] Lock RT PCRs Done
61,917,557 UART: [art] Populate DV Done
61,923,190 UART: [fht] FMC Alias Private Key: 7
61,924,891 UART: [art] Derive CDI
61,925,701 UART: [art] Store in in slot 0x4
61,968,727 UART: [art] Derive Key Pair
61,969,731 UART: [art] Store priv key in slot 0x5
64,396,181 UART: [art] Derive Key Pair - Done
64,409,014 UART: [art] Signing Cert with AUTHO
64,410,324 UART: RITY.KEYID = 7
66,115,957 UART: [art] Erasing AUTHORITY.KEYID = 7
66,117,445 UART: [art] PUB.X = E6221F7DDB03AA14823EA28FF0C7E3858843BE976F3A1219484D895838E8875DED49011F29B92D444B21C5B4D10D580C
66,124,716 UART: [art] PUB.Y = F3F0A807F9AA54F9B8EE2A6C251A29FFA18D04A378C3EF19F4F73E1D89D6D16AD1D248FE0EDBDBA7C5F8AF75212857CB
66,132,027 UART: [art] SIG.R = BEE502FF66A24A67DF6B81C8C4E5224E785AB7E012351BF15FB70AAE1B07D921EB3DB9A3E58BDDC623BBA5795023302E
66,139,406 UART: [art] SIG.S = 0491A583B8C00D1DF26A82A6E09D8BD96992471471FBF516A0885B230376A9BE8B071C6C78796CDD087A6A49D47AF924
67,117,806 UART: mbox::rt_entry...
67,118,772 UART: ____ _ _ _ ____ _____
67,120,774 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,122,784 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,124,716 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,126,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,128,579 UART: |_|
67,129,388 UART:
67,414,294 UART: [rt] Runtime listening for mailbox commands...
67,416,466 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
3,760,370 ready_for_fw is high
3,760,943 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,182,675 >>> mbox cmd response: success
14,183,282 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,435,385 UART:
18,435,783 UART: Running Caliptra FMC ...
18,436,985 UART:
18,437,151 UART: [state] CFI Enabled
18,445,204 UART: [fht] FMC Alias Private Key: 7
20,202,420 UART: [art] Extend RT PCRs Done
20,203,651 UART: [art] Lock RT PCRs Done
20,205,390 UART: [art] Populate DV Done
20,211,031 UART: [fht] FMC Alias Private Key: 7
20,212,653 UART: [art] Derive CDI
20,213,474 UART: [art] Store in in slot 0x4
20,256,234 UART: [art] Derive Key Pair
20,257,282 UART: [art] Store priv key in slot 0x5
22,684,392 UART: [art] Derive Key Pair - Done
22,697,727 UART: [art] Signing Cert with AUTHO
22,699,046 UART: RITY.KEYID = 7
24,404,729 UART: [art] Erasing AUTHORITY.KEYID = 7
24,406,236 UART: [art] PUB.X = 2064E5A2829FCC012328BE6A7ABB0FDAE926DD3C1FF3E5B3BF11EEAAF009588E3DD5335B0210A21553C230248C7AD056
24,413,521 UART: [art] PUB.Y = 857A91174280F66A9EFB0DBD6988C5D07AC0C4CE540E2AAA9EF0C34DF573BBD68F455D9DCD13DB55C0B4C831D8EEF6A6
24,420,798 UART: [art] SIG.R = 84F5BBBD3441FE102984C3E15D4F0C3C707FEEBF8567428CDA1ECA9965E10EADD05FCB6CBC4BB602B58C2524CD0ADC3C
24,428,230 UART: [art] SIG.S = 3938ABF5129D75079C86544C5B24C769267BC1CEF60E76DC1D93FB4D58754E21AB8C902796EA2A488C1690624C27457D
25,406,515 UART: mbox::rt_entry...
25,407,488 UART: ____ _ _ _ ____ _____
25,409,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,411,484 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,413,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,415,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,417,335 UART: |_|
25,418,173 UART:
25,531,283 UART: [rt] Runtime listening for mailbox commands...
25,533,458 >>> mbox cmd response data (48 bytes)
27,590,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,310,395 >>> mbox cmd response: success
35,311,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,344,835 UART:
35,345,140 UART: Running Caliptra FMC ...
35,346,262 UART:
35,346,451 UART: [state] CFI Enabled
35,390,863 UART: [art] Extend RT PCRs Done
35,392,025 UART: [art] Lock RT PCRs Done
35,393,428 UART: [art] Populate DV Done
35,398,627 UART: [fht] FMC Alias Private Key: 7
35,400,280 UART: [art] Derive CDI
35,401,097 UART: [art] Store in in slot 0x4
35,443,594 UART: [art] Derive Key Pair
35,444,638 UART: [art] Store priv key in slot 0x5
37,871,694 UART: [art] Derive Key Pair - Done
37,884,587 UART: [art] Signing Cert with AUTHO
37,885,891 UART: RITY.KEYID = 7
39,591,620 UART: [art] Erasing AUTHORITY.KEYID = 7
39,593,109 UART: [art] PUB.X = 492D4BFD7B4A7EC48AAC62B9046EF02D331DD27A13B7DF5D29FE0FF59D0DA3E53B094456F998C7C2E55A79F6395A6F16
39,600,434 UART: [art] PUB.Y = B2FAC3F959BD8B136650A15E7B2C15E703EE6839023D20C505BCAD92ECBF9A10E59B4A7A9003FE75D619A1886A290551
39,607,706 UART: [art] SIG.R = 46B8DE1AE1163C9539B76BF0E3E2497FD79641A003D00E360477B08F7B2A14E9C525F5C8B37148E065C42BC2F3DAECCD
39,615,100 UART: [art] SIG.S = FF7010FF2758B85532862C9E82F4454AADA53D004ADB3220F812B703D3F2C6F0ACEA0BBF56B6F5E6A9A96E92D3825A54
40,593,498 UART: Caliptra RT
40,594,213 UART: [state] CFI Enabled
40,884,730 UART: [rt] RT listening for mailbox commands...
40,916,784 UART: [rt]cmd =0x4d454153, len=108
40,935,887 >>> mbox cmd response data (12 bytes)
42,982,555 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
49,900,975 >>> mbox cmd response: success
51,944,210 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
52,043,442 UART:
52,043,818 UART: Running Caliptra FMC ...
52,044,877 UART:
52,045,031 UART: [state] CFI Enabled
52,045,919 UART: [art] Extend RT PCRs Done
52,046,981 UART: [art] Lock RT PCRs Done
52,048,059 UART: [art] Populate DV Done
52,049,022 UART: [fht] FMC Alias Private Key: 7
52,050,341 UART: [art] Derive CDI
52,051,079 UART: [art] Store in in slot 0x4
52,052,172 UART: [art] Derive Key Pair
52,053,082 UART: [art] Store priv key in slot 0x5
52,464,060 UART: [art] Derive Key Pair - Done
52,477,077 UART: [art] Signing Cert with AUTHO
52,478,417 UART: RITY.KEYID = 7
54,183,940 UART: [art] Erasing AUTHORITY.KEYID = 7
54,185,450 UART: [art] PUB.X = F0160591AC05336D367F9AA9141921AE42E6CFB882818B334497BFC0C4E624D9F4D3A9F6387F289FA0DC17FC6FC3D48F
54,192,742 UART: [art] PUB.Y = D773A2750B408EF70B6B2FCF8846310EFED3915C8E8D89535E2E770A4F590C0D7322994C474B09988AA21E9272F38ACF
54,199,972 UART: [art] SIG.R = 37E19A6655CEA8B4DD459BA3F95E1BEF4A9FCDA852C2D78A9B77DD98E5E4D6FAFC49FD48C65BEA2477F9BB5B0A3D0B2D
54,207,414 UART: [art] SIG.S = 7319473529CD90B5F86F212E6862E5AE48510EB12250015FBD678C3340A069EBA58449D04B01DC589ACD39D2FD65833B
55,186,291 UART: mbox::rt_entry...
55,187,393 UART: ____ _ _ _ ____ _____
55,189,394 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,191,404 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,193,345 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,195,281 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,197,214 UART: |_|
55,198,025 UART:
55,480,266 UART: [rt] Runtime listening for mailbox commands...
62,307,393 >>> mbox cmd response: success
62,307,788 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,344,626 UART:
62,344,905 UART: Running Caliptra FMC ...
62,346,023 UART:
62,346,183 UART: [state] CFI Enabled
62,390,056 UART: [art] Extend RT PCRs Done
62,391,246 UART: [art] Lock RT PCRs Done
62,392,598 UART: [art] Populate DV Done
62,398,128 UART: [fht] FMC Alias Private Key: 7
62,399,665 UART: [art] Derive CDI
62,400,477 UART: [art] Store in in slot 0x4
62,443,238 UART: [art] Derive Key Pair
62,444,237 UART: [art] Store priv key in slot 0x5
64,870,904 UART: [art] Derive Key Pair - Done
64,883,854 UART: [art] Signing Cert with AUTHO
64,885,163 UART: RITY.KEYID = 7
66,590,633 UART: [art] Erasing AUTHORITY.KEYID = 7
66,592,118 UART: [art] PUB.X = 023B4C09AA98737D1D163C70BBF3D25E32E34CFC7CDCD1BB8702AF37FC9C5944E9A0C8BDFCE23CFE4232D476564BEE05
66,599,467 UART: [art] PUB.Y = 0E26E1034792F8DBA546138F2A64DAE75288CBA6B103E511367E1D3256045CC352F61537CB01541B008129517B5891C6
66,606,640 UART: [art] SIG.R = 9FDA5431AB69ADE01898E584D80930FB1793E0E6DFC0A2CE9667B451083EAF73ABAA591DF2B618BE8CB853D2ED5A7787
66,614,026 UART: [art] SIG.S = 31881DB128B2D3916A8A04B8549BD1F601095C36F6CBEAD159A97DE7253D26199358AB5CB587F4A83BB0B141ADEAFCE4
67,592,967 UART: mbox::rt_entry...
67,593,941 UART: ____ _ _ _ ____ _____
67,595,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,597,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,599,835 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,601,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,603,646 UART: |_|
67,604,529 UART:
67,887,016 UART: [rt] Runtime listening for mailbox commands...
67,889,188 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.51s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,501,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,612,834 >>> mbox cmd response: success
2,612,834 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,613,868 UART: [afmc] ++
2,614,036 UART: [afmc] CDI.KEYID = 6
2,614,398 UART: [afmc] SUBJECT.KEYID = 7
2,614,823 UART: [afmc] AUTHORITY.KEYID = 5
2,650,066 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,666,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,672,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,583 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,273 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,308 UART: [afmc] --
2,693,424 UART: [cold-reset] --
2,694,362 UART: [state] Locking Datavault
2,695,457 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,061 UART: [state] Locking ICCM
2,696,641 UART: [exit] Launching FMC @ 0x40000130
2,701,970 UART:
2,701,986 UART: Running Caliptra FMC ...
2,702,394 UART:
2,702,448 UART: [state] CFI Enabled
2,712,879 UART: [fht] FMC Alias Private Key: 7
2,820,754 UART: [art] Extend RT PCRs Done
2,821,182 UART: [art] Lock RT PCRs Done
2,822,978 UART: [art] Populate DV Done
2,831,155 UART: [fht] FMC Alias Private Key: 7
2,832,171 UART: [art] Derive CDI
2,832,451 UART: [art] Store in in slot 0x4
2,918,092 UART: [art] Derive Key Pair
2,918,452 UART: [art] Store priv key in slot 0x5
2,930,982 UART: [art] Derive Key Pair - Done
2,945,425 UART: [art] Signing Cert with AUTHO
2,945,905 UART: RITY.KEYID = 7
2,961,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,884 UART: [art] PUB.X = 505A7B15F427DAEBE0376A14456BCC63591E8262774086110F7C07FA445FCDC29531D4DB121CCF6A3A47ACA1F2E6B99E
2,968,658 UART: [art] PUB.Y = 86F8208D19B274FF06FEC4415C2C3D1C4CC903068BD66F539E8ABF1D0C4A81E061170B45E33BAE214C6060A731175E06
2,975,594 UART: [art] SIG.R = 4846BA768E730B4EB5A72CE5486156199043ED5EBCDF736312E7E92ECD204D130E0A47A215CF1EDF67C98A790E961EFB
2,982,362 UART: [art] SIG.S = B6840EF09499857A979DFFD92F950F4882A3FE88658B4C0C67A0EF3CAE4DDE547F68BA4AB56ABF82BB920CD5AC3422FE
3,006,253 UART: mbox::rt_entry...
3,006,625 UART: ____ _ _ _ ____ _____
3,007,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,209 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,008,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,009,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,010,513 UART: |_|
3,010,825 UART:
3,118,209 UART: [rt] Runtime listening for mailbox commands...
3,119,396 >>> mbox cmd response data (48 bytes)
3,119,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,119,511 UART:
3,119,527 UART: Running Caliptra ROM ...
3,119,935 UART:
3,119,989 UART: [state] CFI Enabled
3,122,629 UART: [state] LifecycleState = Unprovisioned
3,123,284 UART: [state] DebugLocked = No
3,123,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,125,427 UART: [kat] SHA2-256
3,919,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,923,473 UART: [kat] ++
3,923,625 UART: [kat] sha1
3,927,723 UART: [kat] SHA2-256
3,929,661 UART: [kat] SHA2-384
3,932,432 UART: [kat] SHA2-512-ACC
3,934,332 UART: [kat] ECC-384
3,940,115 UART: [kat] HMAC-384Kdf
3,944,725 UART: [kat] LMS
4,512,921 UART: [kat] --
4,513,646 UART: [update-reset] ++
5,845,348 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,846,432 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,995,936 >>> mbox cmd response: success
5,995,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,996,289 UART: [update-reset] Copying MAN_2 To MAN_1
6,004,303 UART: [update-reset Success] --
6,005,310 UART: [state] Locking Datavault
6,006,164 UART: [state] Locking PCR0, PCR1 and PCR31
6,006,768 UART: [state] Locking ICCM
6,007,406 UART: [exit] Launching FMC @ 0x40000130
6,012,735 UART:
6,012,751 UART: Running Caliptra FMC ...
6,013,159 UART:
6,013,213 UART: [state] CFI Enabled
6,101,760 UART: [art] Extend RT PCRs Done
6,102,188 UART: [art] Lock RT PCRs Done
6,103,425 UART: [art] Populate DV Done
6,111,788 UART: [fht] FMC Alias Private Key: 7
6,112,758 UART: [art] Derive CDI
6,113,038 UART: [art] Store in in slot 0x4
6,199,067 UART: [art] Derive Key Pair
6,199,427 UART: [art] Store priv key in slot 0x5
6,212,795 UART: [art] Derive Key Pair - Done
6,227,503 UART: [art] Signing Cert with AUTHO
6,227,983 UART: RITY.KEYID = 7
6,243,255 UART: [art] Erasing AUTHORITY.KEYID = 7
6,244,020 UART: [art] PUB.X = CE9A0371799C7A741BD3202A936CCA634E7768071167EF0B6F1422AC89D052F6743E977CF9E0A5EC26AC7C95981B06B0
6,250,780 UART: [art] PUB.Y = 100320F1467B515E8BD0D47C5E2FCE5F96F1086876151F134C90643377A261EEEF136E16E7283EC54230AEB93B0529A2
6,257,717 UART: [art] SIG.R = 3239D52912C974452F989D17BFA402B1FBEF78CC32A043BE30A124CABB48D6E67C2CA3C69530704372D455B563CC180F
6,264,485 UART: [art] SIG.S = E9660F25B9A62A76398CC7911BA643B697B266BD5A9E9BE8A798DD4202B732D279A32D1B63959B9B23C480847459E0DB
6,287,824 UART: Caliptra RT
6,288,077 UART: [state] CFI Enabled
6,572,908 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,604,210 UART: [rt]cmd =0x4d454153, len=108
6,625,375 >>> mbox cmd response data (12 bytes)
6,625,376 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,288 UART:
6,626,304 UART: Running Caliptra ROM ...
6,626,712 UART:
6,626,766 UART: [state] CFI Enabled
6,629,574 UART: [state] LifecycleState = Unprovisioned
6,630,229 UART: [state] DebugLocked = No
6,630,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,632,448 UART: [kat] SHA2-256
7,426,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,430,494 UART: [kat] ++
7,430,646 UART: [kat] sha1
7,434,820 UART: [kat] SHA2-256
7,436,758 UART: [kat] SHA2-384
7,439,549 UART: [kat] SHA2-512-ACC
7,441,449 UART: [kat] ECC-384
7,446,854 UART: [kat] HMAC-384Kdf
7,451,398 UART: [kat] LMS
8,019,594 UART: [kat] --
8,020,537 UART: [update-reset] ++
8,943,749 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,945,011 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,041,073 >>> mbox cmd response: success
9,041,073 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
9,041,256 UART: [update-reset] Copying MAN_2 To MAN_1
9,049,270 UART: [update-reset Success] --
9,050,213 UART: [state] Locking Datavault
9,050,773 UART: [state] Locking PCR0, PCR1 and PCR31
9,051,377 UART: [state] Locking ICCM
9,051,897 UART: [exit] Launching FMC @ 0x40000130
9,057,226 UART:
9,057,242 UART: Running Caliptra FMC ...
9,057,650 UART:
9,057,704 UART: [state] CFI Enabled
9,146,793 UART: [art] Extend RT PCRs Done
9,147,221 UART: [art] Lock RT PCRs Done
9,148,468 UART: [art] Populate DV Done
9,156,611 UART: [fht] FMC Alias Private Key: 7
9,157,569 UART: [art] Derive CDI
9,157,849 UART: [art] Store in in slot 0x4
9,243,514 UART: [art] Derive Key Pair
9,243,874 UART: [art] Store priv key in slot 0x5
9,257,084 UART: [art] Derive Key Pair - Done
9,271,619 UART: [art] Signing Cert with AUTHO
9,272,099 UART: RITY.KEYID = 7
9,287,051 UART: [art] Erasing AUTHORITY.KEYID = 7
9,287,816 UART: [art] PUB.X = DA32AD7D9E5729BF204CAEEF9D9F74AF4103120D31E4BBEF8ACC6F14DCE6EFFD205725F859731EB294C6DC007342948D
9,294,578 UART: [art] PUB.Y = 7F50122EB80DF7EFC13129912C0DFE22EDD5A36FE7BFBE2DE77F8DD842C28ADBE39DE8DD87EC8EF68F4D6CE73DE05A65
9,301,554 UART: [art] SIG.R = 7A07F3CE9DCD1AD51DE9DB402EDE8DAF7CC69ED850D343C9EF09E3E440A32F5C2D7938B4EA0BD9719A284CF7CC231505
9,308,336 UART: [art] SIG.S = 2088AE63D72F3E93D445F88C6D9C80D9113A8201B5E0042555979779A1E73C37E182554CE4C7DB0E2F107C18F7983B3A
9,332,156 UART: mbox::rt_entry...
9,332,528 UART: ____ _ _ _ ____ _____
9,333,312 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,334,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,334,880 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,335,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,336,416 UART: |_|
9,336,728 UART:
9,614,135 UART: [rt] Runtime listening for mailbox commands...
9,615,102 UART:
9,615,118 UART: Running Caliptra ROM ...
9,615,526 UART:
9,615,580 UART: [state] CFI Enabled
9,617,842 UART: [state] LifecycleState = Unprovisioned
9,618,497 UART: [state] DebugLocked = No
9,619,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,620,874 UART: [kat] SHA2-256
10,414,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,418,920 UART: [kat] ++
10,419,072 UART: [kat] sha1
10,423,284 UART: [kat] SHA2-256
10,425,222 UART: [kat] SHA2-384
10,427,947 UART: [kat] SHA2-512-ACC
10,429,847 UART: [kat] ECC-384
10,435,498 UART: [kat] HMAC-384Kdf
10,440,120 UART: [kat] LMS
11,008,316 UART: [kat] --
11,009,023 UART: [update-reset] ++
11,932,903 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,934,013 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
12,030,075 >>> mbox cmd response: success
12,030,075 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,030,374 UART: [update-reset] Copying MAN_2 To MAN_1
12,038,388 UART: [update-reset Success] --
12,039,355 UART: [state] Locking Datavault
12,040,155 UART: [state] Locking PCR0, PCR1 and PCR31
12,040,759 UART: [state] Locking ICCM
12,041,307 UART: [exit] Launching FMC @ 0x40000130
12,046,636 UART:
12,046,652 UART: Running Caliptra FMC ...
12,047,060 UART:
12,047,114 UART: [state] CFI Enabled
12,136,105 UART: [art] Extend RT PCRs Done
12,136,533 UART: [art] Lock RT PCRs Done
12,137,908 UART: [art] Populate DV Done
12,146,029 UART: [fht] FMC Alias Private Key: 7
12,147,117 UART: [art] Derive CDI
12,147,397 UART: [art] Store in in slot 0x4
12,232,920 UART: [art] Derive Key Pair
12,233,280 UART: [art] Store priv key in slot 0x5
12,246,546 UART: [art] Derive Key Pair - Done
12,261,500 UART: [art] Signing Cert with AUTHO
12,261,980 UART: RITY.KEYID = 7
12,277,168 UART: [art] Erasing AUTHORITY.KEYID = 7
12,277,933 UART: [art] PUB.X = 296BE8C7E65D125968E8D3528EDBE1D313699F754AE027091660B9D382463DA79779A366869F862613E875325A68AD22
12,284,688 UART: [art] PUB.Y = 0ECDB571940D129D4668D0431A6C5904BE0D5B04FA1E6E86704EF682ED67E44854763963DF83D495B9C9439603510AEC
12,291,615 UART: [art] SIG.R = 432A24041F8087C52A92CC8C456B3F814E234E5E3553A7C780CF042582DAC554C04D37931E867E16F24F2DFA7B769276
12,298,375 UART: [art] SIG.S = 9C24F14C8241369905425CD6D90E0380E85102B8688C338C99DE226011E63FC2FB5ADDFCEC2D057945354E675AA79F68
12,321,843 UART: mbox::rt_entry...
12,322,215 UART: ____ _ _ _ ____ _____
12,322,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,323,799 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,324,567 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,325,335 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,326,103 UART: |_|
12,326,415 UART:
12,605,721 UART: [rt] Runtime listening for mailbox commands...
12,606,917 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 ready_for_fw is high
1,362,167 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,460,408 >>> mbox cmd response: success
2,460,408 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,522,318 UART:
2,522,334 UART: Running Caliptra FMC ...
2,522,742 UART:
2,522,796 UART: [state] CFI Enabled
2,533,485 UART: [fht] FMC Alias Private Key: 7
2,641,030 UART: [art] Extend RT PCRs Done
2,641,458 UART: [art] Lock RT PCRs Done
2,642,954 UART: [art] Populate DV Done
2,651,253 UART: [fht] FMC Alias Private Key: 7
2,652,267 UART: [art] Derive CDI
2,652,547 UART: [art] Store in in slot 0x4
2,738,044 UART: [art] Derive Key Pair
2,738,404 UART: [art] Store priv key in slot 0x5
2,751,808 UART: [art] Derive Key Pair - Done
2,766,145 UART: [art] Signing Cert with AUTHO
2,766,625 UART: RITY.KEYID = 7
2,782,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,782,774 UART: [art] PUB.X = C3C299EAD8B8F4BE260A386FA2A00FDC6456B1AA4F7DD6708F27D330FE5CC31CE746FE42B3159D28E76B261D60810EFD
2,789,553 UART: [art] PUB.Y = A35BA4FEAD6FAEAEF06ED747F61DBB75BA44AA2949C7438BEC66C908725F45BF4C4265B1B5803EDC4BD11B5E8323B774
2,796,522 UART: [art] SIG.R = 90CD0AD46825A8A99F0CCE33EA4EF91FE58C91B5284A1A6A216DB39D59DF1DB396C8FE8966AF7A7CC94E772867B14271
2,803,300 UART: [art] SIG.S = 9AF9A8FA60B92A968B1EDF5C09F84148C40C6EA32FFBB1A3B162B35CF19F2C2FBEEE4E48320408BA5B552C11539BAD7C
2,827,313 UART: mbox::rt_entry...
2,827,685 UART: ____ _ _ _ ____ _____
2,828,469 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,829,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,830,037 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,830,805 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,831,573 UART: |_|
2,831,885 UART:
2,939,324 UART: [rt] Runtime listening for mailbox commands...
2,940,511 >>> mbox cmd response data (48 bytes)
2,940,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,699,273 >>> mbox cmd response: success
5,699,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,712,920 UART:
5,712,936 UART: Running Caliptra FMC ...
5,713,344 UART:
5,713,398 UART: [state] CFI Enabled
5,802,197 UART: [art] Extend RT PCRs Done
5,802,625 UART: [art] Lock RT PCRs Done
5,804,004 UART: [art] Populate DV Done
5,812,237 UART: [fht] FMC Alias Private Key: 7
5,813,203 UART: [art] Derive CDI
5,813,483 UART: [art] Store in in slot 0x4
5,899,368 UART: [art] Derive Key Pair
5,899,728 UART: [art] Store priv key in slot 0x5
5,912,360 UART: [art] Derive Key Pair - Done
5,927,402 UART: [art] Signing Cert with AUTHO
5,927,882 UART: RITY.KEYID = 7
5,943,144 UART: [art] Erasing AUTHORITY.KEYID = 7
5,943,909 UART: [art] PUB.X = 2C84B9441F8093F55036AFE373346879D85ED74DFFDDD9FDBFBAD62ECF7EE8679BBC2D55F8CB7EC1C726282BF8E1BFB3
5,950,705 UART: [art] PUB.Y = 931D1F52E83DC52ADA477B18DDD2E32D8BDA327EEC2790A4AED23EB1B55375066F47CE5E0A32C626F390A3D921AAF578
5,957,665 UART: [art] SIG.R = 5E898AFBA83849B87B08F40B199B3F0DBAC4337FCF859C60088C7A3B81C8D2BF9AEF28D5B55D5525E8BCFC248C6D6FA4
5,964,443 UART: [art] SIG.S = EBEFF7239B8B6BE6446AC700EBB612320772BF0A12AA3E8E33A6AC07902EA097F481EE312F3D6C031916E75DE2FD217E
5,988,364 UART: Caliptra RT
5,988,617 UART: [state] CFI Enabled
6,269,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,788 UART: [rt]cmd =0x4d454153, len=108
6,321,739 >>> mbox cmd response data (12 bytes)
6,321,740 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,619,803 >>> mbox cmd response: success
8,619,803 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,633,050 UART:
8,633,066 UART: Running Caliptra FMC ...
8,633,474 UART:
8,633,528 UART: [state] CFI Enabled
8,723,069 UART: [art] Extend RT PCRs Done
8,723,497 UART: [art] Lock RT PCRs Done
8,724,968 UART: [art] Populate DV Done
8,733,251 UART: [fht] FMC Alias Private Key: 7
8,734,257 UART: [art] Derive CDI
8,734,537 UART: [art] Store in in slot 0x4
8,820,726 UART: [art] Derive Key Pair
8,821,086 UART: [art] Store priv key in slot 0x5
8,834,014 UART: [art] Derive Key Pair - Done
8,848,814 UART: [art] Signing Cert with AUTHO
8,849,294 UART: RITY.KEYID = 7
8,864,308 UART: [art] Erasing AUTHORITY.KEYID = 7
8,865,073 UART: [art] PUB.X = C2B0A2EC35C9B440E4A51C3C8B1D5F66822AAA237292915DB3C61A97FFB051DE373B5620F73D5219BF6FE89CDE78C5F6
8,871,857 UART: [art] PUB.Y = E97B18FDBB1D484C5E2BA343675C80FCE560A4178CCD0737537F9A2927552426B5D6E7F70DCFA8B328905BD25F1DF3AF
8,878,813 UART: [art] SIG.R = D7EB3FB8FCD06E69EDB6F1F3AFE8BC5588D3C26EF50C79289F4370F5B95E6ED1251BC6D9129FA27097D8992FFD4E0DE1
8,885,599 UART: [art] SIG.S = CD1FC4ADC49F23D83AADA9F25C226223560CC2CE477DAD0ED8CC26282BA92FCF100A96379784DBA418480DA9836CAA7F
8,909,462 UART: mbox::rt_entry...
8,909,834 UART: ____ _ _ _ ____ _____
8,910,618 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,911,418 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,912,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,912,954 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,913,722 UART: |_|
8,914,034 UART:
9,191,951 UART: [rt] Runtime listening for mailbox commands...
11,489,923 >>> mbox cmd response: success
11,489,923 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,503,658 UART:
11,503,674 UART: Running Caliptra FMC ...
11,504,082 UART:
11,504,136 UART: [state] CFI Enabled
11,592,695 UART: [art] Extend RT PCRs Done
11,593,123 UART: [art] Lock RT PCRs Done
11,594,190 UART: [art] Populate DV Done
11,602,387 UART: [fht] FMC Alias Private Key: 7
11,603,341 UART: [art] Derive CDI
11,603,621 UART: [art] Store in in slot 0x4
11,689,378 UART: [art] Derive Key Pair
11,689,738 UART: [art] Store priv key in slot 0x5
11,703,130 UART: [art] Derive Key Pair - Done
11,718,018 UART: [art] Signing Cert with AUTHO
11,718,498 UART: RITY.KEYID = 7
11,733,308 UART: [art] Erasing AUTHORITY.KEYID = 7
11,734,073 UART: [art] PUB.X = 02081CBBD57A5B6E5880F2DAB22C88B5AE5DDA408B1982FE614CC5B3E2F3B8F9280DD4B79BFAE5E6F2F7B96C5DF367B6
11,740,858 UART: [art] PUB.Y = 1ADACFFD655E5AFE88176B276F55B9C7497D5649FB179B2E02878BFEBC01AF31F1EDBDF83E7C19917D593F6E31FF9384
11,747,820 UART: [art] SIG.R = A4749707AA0F70E8C2403BA353758733B9ED7A2AAB5C13A8B47B36C44258512F82CB6E1D679B19E90C56B2A1FE6DFAC6
11,754,591 UART: [art] SIG.S = C2573D9CB1F7106C50A7FE6FC915700B38B999A9FDB3CD7EE52445F93F54607D099E1B25ADE3A3B8F704800F5534AD4D
11,778,130 UART: mbox::rt_entry...
11,778,502 UART: ____ _ _ _ ____ _____
11,779,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,780,086 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,780,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,781,622 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,782,390 UART: |_|
11,782,702 UART:
12,064,037 UART: [rt] Runtime listening for mailbox commands...
12,065,233 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.56s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,503,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,767 >>> mbox cmd response: success
2,614,767 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,616,027 UART: [afmc] ++
2,616,195 UART: [afmc] CDI.KEYID = 6
2,616,557 UART: [afmc] SUBJECT.KEYID = 7
2,616,982 UART: [afmc] AUTHORITY.KEYID = 5
2,651,643 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,913 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,306 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,996 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,863 UART: [afmc] --
2,694,987 UART: [cold-reset] --
2,695,695 UART: [state] Locking Datavault
2,697,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,612 UART: [state] Locking ICCM
2,698,034 UART: [exit] Launching FMC @ 0x40000130
2,703,363 UART:
2,703,379 UART: Running Caliptra FMC ...
2,703,787 UART:
2,703,930 UART: [state] CFI Enabled
2,714,507 UART: [fht] FMC Alias Private Key: 7
2,822,100 UART: [art] Extend RT PCRs Done
2,822,528 UART: [art] Lock RT PCRs Done
2,823,862 UART: [art] Populate DV Done
2,831,853 UART: [fht] FMC Alias Private Key: 7
2,832,865 UART: [art] Derive CDI
2,833,145 UART: [art] Store in in slot 0x4
2,918,598 UART: [art] Derive Key Pair
2,918,958 UART: [art] Store priv key in slot 0x5
2,932,336 UART: [art] Derive Key Pair - Done
2,947,102 UART: [art] Signing Cert with AUTHO
2,947,582 UART: RITY.KEYID = 7
2,962,918 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,683 UART: [art] PUB.X = B3894380B455A8824030BB4E63E6CD30FD616120CD987635489A4CB0B706BD8EBE72E7A2DCA478647E2EBA0A9C6EA025
2,970,455 UART: [art] PUB.Y = 15A0BF3391A35B13F79BBB93712AEB1718D889EDCF0FFE6BD3E8CB3A9D468777F5F9404AD337C493D09C3F321DAB55ED
2,977,420 UART: [art] SIG.R = 0C109186B170171D41AA0B093EBAB6F2E84E1127D3003FDDF7575970B3AB673788BC911F21D16876482858C9C2518F4D
2,984,155 UART: [art] SIG.S = CFEB98762603978651E5169ACD22715978686C03B4EF6A092C725BC19E10A024087068C027949CB87244E03653C823B0
3,007,494 UART: mbox::rt_entry...
3,007,866 UART: ____ _ _ _ ____ _____
3,008,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,754 UART: |_|
3,012,066 UART:
3,119,158 UART: [rt] Runtime listening for mailbox commands...
3,120,345 >>> mbox cmd response data (48 bytes)
3,120,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,120,460 UART:
3,120,476 UART: Running Caliptra ROM ...
3,120,884 UART:
3,121,025 UART: [state] CFI Enabled
3,123,757 UART: [state] LifecycleState = Unprovisioned
3,124,412 UART: [state] DebugLocked = No
3,124,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,126,573 UART: [kat] SHA2-256
3,920,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,924,619 UART: [kat] ++
3,924,771 UART: [kat] sha1
3,928,951 UART: [kat] SHA2-256
3,930,889 UART: [kat] SHA2-384
3,933,660 UART: [kat] SHA2-512-ACC
3,935,560 UART: [kat] ECC-384
3,941,343 UART: [kat] HMAC-384Kdf
3,945,977 UART: [kat] LMS
4,514,173 UART: [kat] --
4,515,094 UART: [update-reset] ++
5,847,796 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,848,868 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,998,372 >>> mbox cmd response: success
5,998,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,998,505 UART: [update-reset] Copying MAN_2 To MAN_1
6,006,519 UART: [update-reset Success] --
6,007,452 UART: [state] Locking Datavault
6,008,224 UART: [state] Locking PCR0, PCR1 and PCR31
6,008,828 UART: [state] Locking ICCM
6,009,302 UART: [exit] Launching FMC @ 0x40000130
6,014,631 UART:
6,014,647 UART: Running Caliptra FMC ...
6,015,055 UART:
6,015,198 UART: [state] CFI Enabled
6,104,231 UART: [art] Extend RT PCRs Done
6,104,659 UART: [art] Lock RT PCRs Done
6,105,786 UART: [art] Populate DV Done
6,114,083 UART: [fht] FMC Alias Private Key: 7
6,115,069 UART: [art] Derive CDI
6,115,349 UART: [art] Store in in slot 0x4
6,201,096 UART: [art] Derive Key Pair
6,201,456 UART: [art] Store priv key in slot 0x5
6,215,046 UART: [art] Derive Key Pair - Done
6,230,193 UART: [art] Signing Cert with AUTHO
6,230,673 UART: RITY.KEYID = 7
6,245,977 UART: [art] Erasing AUTHORITY.KEYID = 7
6,246,742 UART: [art] PUB.X = EA9DE839B460BA2ABC35159C3AF449ECB53DB764ECE95CDA46827640284164BD3EF9A3FDA2FE17A5BC5E59F834562C23
6,253,530 UART: [art] PUB.Y = BF994006BAC41EE50E35E586F6DC74B573B4E3987F1B26E267591BC967E3CD20CFC9C083A9577206387FE39A1367F388
6,260,473 UART: [art] SIG.R = 7418EF396482340C73B0D7C276F16C2A934F49B43835212DDCA05886C71432F7DD6B9FF4767E16864DA09DB5DE049B29
6,267,235 UART: [art] SIG.S = D216941A823169758AE01979DD844BD7FFE6F3E26B79E30969F5B12215FA736549166883850C70A2F7F72550B323DA7C
6,290,454 UART: Caliptra RT
6,290,799 UART: [state] CFI Enabled
6,574,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,605,742 UART: [rt]cmd =0x4d454153, len=108
6,625,835 >>> mbox cmd response data (12 bytes)
6,625,836 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,774 UART:
6,626,790 UART: Running Caliptra ROM ...
6,627,198 UART:
6,627,339 UART: [state] CFI Enabled
6,629,781 UART: [state] LifecycleState = Unprovisioned
6,630,436 UART: [state] DebugLocked = No
6,631,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,632,601 UART: [kat] SHA2-256
7,426,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,430,647 UART: [kat] ++
7,430,799 UART: [kat] sha1
7,434,987 UART: [kat] SHA2-256
7,436,925 UART: [kat] SHA2-384
7,439,890 UART: [kat] SHA2-512-ACC
7,441,790 UART: [kat] ECC-384
7,447,417 UART: [kat] HMAC-384Kdf
7,452,063 UART: [kat] LMS
8,020,259 UART: [kat] --
8,021,226 UART: [update-reset] ++
8,945,060 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,946,208 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,042,270 >>> mbox cmd response: success
9,042,270 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
9,042,435 UART: [update-reset] Copying MAN_2 To MAN_1
9,050,449 UART: [update-reset Success] --
9,051,448 UART: [state] Locking Datavault
9,052,284 UART: [state] Locking PCR0, PCR1 and PCR31
9,052,888 UART: [state] Locking ICCM
9,053,408 UART: [exit] Launching FMC @ 0x40000130
9,058,737 UART:
9,058,753 UART: Running Caliptra FMC ...
9,059,161 UART:
9,059,304 UART: [state] CFI Enabled
9,147,661 UART: [art] Extend RT PCRs Done
9,148,089 UART: [art] Lock RT PCRs Done
9,149,354 UART: [art] Populate DV Done
9,157,531 UART: [fht] FMC Alias Private Key: 7
9,158,555 UART: [art] Derive CDI
9,158,835 UART: [art] Store in in slot 0x4
9,244,018 UART: [art] Derive Key Pair
9,244,378 UART: [art] Store priv key in slot 0x5
9,257,728 UART: [art] Derive Key Pair - Done
9,272,237 UART: [art] Signing Cert with AUTHO
9,272,717 UART: RITY.KEYID = 7
9,287,833 UART: [art] Erasing AUTHORITY.KEYID = 7
9,288,598 UART: [art] PUB.X = 4B24CB67D9BFCCC24777EA8E72CEF53676CD24D85DE67415F6E77AD6CC49568BEF77456DC4D234607A7F33420AB2B0D4
9,295,379 UART: [art] PUB.Y = 4CF1BD6B350DA1A7FD7656BAF33B8E6052CCFE48006A8D2A5E58774E8ADE177C8C12279B9479A15435B95DE2375C19B9
9,302,314 UART: [art] SIG.R = 7BE7F841876D92A973D7F07CFB07C9D814A9BCCE16F033046FE09A7B2B30CA19BE444212E221A5DB99A4E43EE7EE975B
9,309,092 UART: [art] SIG.S = 00CFA803C971CC9C3425B27EACB1D7F0D5DB3D5BA48D808B6A41858FDD817F4ECCC63A73E2F99D707BDC17D328DC96CB
9,332,482 UART: mbox::rt_entry...
9,332,854 UART: ____ _ _ _ ____ _____
9,333,638 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,334,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,335,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,335,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,336,742 UART: |_|
9,337,054 UART:
9,613,802 UART: [rt] Runtime listening for mailbox commands...
9,614,769 UART:
9,614,785 UART: Running Caliptra ROM ...
9,615,193 UART:
9,615,334 UART: [state] CFI Enabled
9,617,968 UART: [state] LifecycleState = Unprovisioned
9,618,623 UART: [state] DebugLocked = No
9,619,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,620,940 UART: [kat] SHA2-256
10,414,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,418,986 UART: [kat] ++
10,419,138 UART: [kat] sha1
10,423,450 UART: [kat] SHA2-256
10,425,388 UART: [kat] SHA2-384
10,428,201 UART: [kat] SHA2-512-ACC
10,430,101 UART: [kat] ECC-384
10,435,848 UART: [kat] HMAC-384Kdf
10,440,586 UART: [kat] LMS
11,008,782 UART: [kat] --
11,009,647 UART: [update-reset] ++
11,933,625 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,934,857 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
12,030,919 >>> mbox cmd response: success
12,030,919 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,031,110 UART: [update-reset] Copying MAN_2 To MAN_1
12,039,124 UART: [update-reset Success] --
12,039,979 UART: [state] Locking Datavault
12,040,823 UART: [state] Locking PCR0, PCR1 and PCR31
12,041,427 UART: [state] Locking ICCM
12,042,055 UART: [exit] Launching FMC @ 0x40000130
12,047,384 UART:
12,047,400 UART: Running Caliptra FMC ...
12,047,808 UART:
12,047,951 UART: [state] CFI Enabled
12,137,066 UART: [art] Extend RT PCRs Done
12,137,494 UART: [art] Lock RT PCRs Done
12,138,965 UART: [art] Populate DV Done
12,147,228 UART: [fht] FMC Alias Private Key: 7
12,148,404 UART: [art] Derive CDI
12,148,684 UART: [art] Store in in slot 0x4
12,234,607 UART: [art] Derive Key Pair
12,234,967 UART: [art] Store priv key in slot 0x5
12,248,171 UART: [art] Derive Key Pair - Done
12,262,884 UART: [art] Signing Cert with AUTHO
12,263,364 UART: RITY.KEYID = 7
12,278,268 UART: [art] Erasing AUTHORITY.KEYID = 7
12,279,033 UART: [art] PUB.X = 5A02ED61EBA54F903FD21301E0ADA6BDB3AD79FDF450D6B3550B51140E6A3E68686EA170B917E679DD198E291854EFD9
12,285,803 UART: [art] PUB.Y = 3651F8005A21EA544F746F4589AD3E1FF11DED5179C8DED87B4685CDBADB1E1406DAC8C7B96B1BE6DB37385F272C47C0
12,292,744 UART: [art] SIG.R = 71690C36AF7679D6CCC223165EF2EAE6407198AFDDD754A6CC6E55BA0C990055FF6BE236DE0CBC140224772A746EDE76
12,299,492 UART: [art] SIG.S = A972220F6DEEEDA5C8666AC046DB197FF8E01802D43D035CF176F9B1BD720EE0FD03DA7263F8853E5B04C01DE88064E6
12,323,267 UART: mbox::rt_entry...
12,323,639 UART: ____ _ _ _ ____ _____
12,324,423 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,325,223 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,325,991 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,326,759 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,327,527 UART: |_|
12,327,839 UART:
12,604,381 UART: [rt] Runtime listening for mailbox commands...
12,605,577 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,796 ready_for_fw is high
1,362,796 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,131 >>> mbox cmd response: success
2,463,131 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,524,985 UART:
2,525,001 UART: Running Caliptra FMC ...
2,525,409 UART:
2,525,552 UART: [state] CFI Enabled
2,535,985 UART: [fht] FMC Alias Private Key: 7
2,643,992 UART: [art] Extend RT PCRs Done
2,644,420 UART: [art] Lock RT PCRs Done
2,645,734 UART: [art] Populate DV Done
2,654,081 UART: [fht] FMC Alias Private Key: 7
2,655,255 UART: [art] Derive CDI
2,655,535 UART: [art] Store in in slot 0x4
2,741,014 UART: [art] Derive Key Pair
2,741,374 UART: [art] Store priv key in slot 0x5
2,754,796 UART: [art] Derive Key Pair - Done
2,769,373 UART: [art] Signing Cert with AUTHO
2,769,853 UART: RITY.KEYID = 7
2,785,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,834 UART: [art] PUB.X = 945667C93D2AFADD4B4225D2E3B4ED14181E0941669E5289327BF4F91A9EA2B8A812E6CAF2AAD4B1066EB1AF65FF6C27
2,792,612 UART: [art] PUB.Y = 531FF97C56A21CAE6DD389482AA876DEB93D0101A83CEEB1B9F905CF5AD5FD5EFC0A6D7BE498DA9320E015CCB7461847
2,799,570 UART: [art] SIG.R = 9C82E8D1E59526A49D3EA62B99FC468C1A46A8476AF8515F3BD65E6FB269C41E6F37F33FBEB27532308E938C3D052CC6
2,806,345 UART: [art] SIG.S = D626E48D2076588AC55B6194003682E11584760B45AB4D0BB3E625C9D457B84F1E8F72AD79EFAE7363D228AAAF0F998E
2,829,807 UART: mbox::rt_entry...
2,830,179 UART: ____ _ _ _ ____ _____
2,830,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,067 UART: |_|
2,834,379 UART:
2,942,124 UART: [rt] Runtime listening for mailbox commands...
2,943,311 >>> mbox cmd response data (48 bytes)
2,943,312 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,702,316 >>> mbox cmd response: success
5,702,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,715,751 UART:
5,715,767 UART: Running Caliptra FMC ...
5,716,175 UART:
5,716,318 UART: [state] CFI Enabled
5,805,095 UART: [art] Extend RT PCRs Done
5,805,523 UART: [art] Lock RT PCRs Done
5,806,720 UART: [art] Populate DV Done
5,814,841 UART: [fht] FMC Alias Private Key: 7
5,815,951 UART: [art] Derive CDI
5,816,231 UART: [art] Store in in slot 0x4
5,902,126 UART: [art] Derive Key Pair
5,902,486 UART: [art] Store priv key in slot 0x5
5,915,934 UART: [art] Derive Key Pair - Done
5,930,552 UART: [art] Signing Cert with AUTHO
5,931,032 UART: RITY.KEYID = 7
5,946,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,343 UART: [art] PUB.X = 64B2A02D126C6D4BBBCCD6FC8C09BF773521C8C7FB66E65F5C40C1A13CE7AB9BDB647B0FA8714BB1A7441F250DE6CB4F
5,954,130 UART: [art] PUB.Y = 34578BDB1981359F94ADCC1D3CF210CCD07719C443B643881C979BAD9EA13C02BD7328F18BC40A4EDC6F54D5017C84FA
5,961,083 UART: [art] SIG.R = 77709D6E8B42403F52D57EC6794A84CBAFDA110E65AE329AC296A404D48049F76E2F9D3A692920920F58DD14766EB9FE
5,967,848 UART: [art] SIG.S = 0B4EA32E33320AE11961F8B720269023D405E924162B9CF6CF99BB693407BFAB78FDA3F370039C353FBECB839C81F551
5,991,542 UART: Caliptra RT
5,991,887 UART: [state] CFI Enabled
6,278,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,309,917 UART: [rt]cmd =0x4d454153, len=108
6,330,666 >>> mbox cmd response data (12 bytes)
6,330,667 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,630,225 >>> mbox cmd response: success
8,630,225 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,643,452 UART:
8,643,468 UART: Running Caliptra FMC ...
8,643,876 UART:
8,644,019 UART: [state] CFI Enabled
8,733,122 UART: [art] Extend RT PCRs Done
8,733,550 UART: [art] Lock RT PCRs Done
8,735,007 UART: [art] Populate DV Done
8,743,450 UART: [fht] FMC Alias Private Key: 7
8,744,540 UART: [art] Derive CDI
8,744,820 UART: [art] Store in in slot 0x4
8,830,901 UART: [art] Derive Key Pair
8,831,261 UART: [art] Store priv key in slot 0x5
8,844,185 UART: [art] Derive Key Pair - Done
8,858,688 UART: [art] Signing Cert with AUTHO
8,859,168 UART: RITY.KEYID = 7
8,874,044 UART: [art] Erasing AUTHORITY.KEYID = 7
8,874,809 UART: [art] PUB.X = 1A5E82265DA1C6EC7F11C933E3871404D74AB69D266411AC9BA804970E81F28107460BB037F2B126B043869348640EF4
8,881,553 UART: [art] PUB.Y = D34BBF97D4427212435335E3F75398E7DE986BF84615DEFD04F2255B121ADE9505A72B087B5040CC131AEBF8081CB342
8,888,493 UART: [art] SIG.R = 954F47A3F5E34D69C0F0F2C0546D05D6332DBD5966AE3D39874B36AD5C6C0FE492B2082966C9ACB51954E7BA10F242F8
8,895,260 UART: [art] SIG.S = F4FBF821B2FB7B1CEEBDAC0129B636242A188AA553DE9D867E0D5582174D809E1E8492AB8F7484E35457E53674DBE8AA
8,918,767 UART: mbox::rt_entry...
8,919,139 UART: ____ _ _ _ ____ _____
8,919,923 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,920,723 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,921,491 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,922,259 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,923,027 UART: |_|
8,923,339 UART:
9,199,324 UART: [rt] Runtime listening for mailbox commands...
11,497,805 >>> mbox cmd response: success
11,497,805 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,511,016 UART:
11,511,032 UART: Running Caliptra FMC ...
11,511,440 UART:
11,511,583 UART: [state] CFI Enabled
11,600,940 UART: [art] Extend RT PCRs Done
11,601,368 UART: [art] Lock RT PCRs Done
11,602,901 UART: [art] Populate DV Done
11,611,146 UART: [fht] FMC Alias Private Key: 7
11,612,222 UART: [art] Derive CDI
11,612,502 UART: [art] Store in in slot 0x4
11,698,207 UART: [art] Derive Key Pair
11,698,567 UART: [art] Store priv key in slot 0x5
11,712,041 UART: [art] Derive Key Pair - Done
11,726,938 UART: [art] Signing Cert with AUTHO
11,727,418 UART: RITY.KEYID = 7
11,742,660 UART: [art] Erasing AUTHORITY.KEYID = 7
11,743,425 UART: [art] PUB.X = 7607DEF191FD95290F726BAFBEC594537E3BDCE7ABB5EBD96E0974B519B276D40B65B1DBF47F1477686E185B7B04D5B6
11,750,194 UART: [art] PUB.Y = A55C229500A25A01A5AD253FF0FF3B900F30715E0DECA25EB356310E7AA7D7B9E73FB61A523B61DBC98474924F34E3FD
11,757,122 UART: [art] SIG.R = AA6B64F0DECE87C94A3F4E7BD5F8E1A20F9FF52729CD4611AF8915C97A5FD821E164D4963B8EC752845896D0A0E1E3E4
11,763,903 UART: [art] SIG.S = 1E37D7982D458E4D4A128EF5A1F1B3D5BBE5EDE75396A8D9CE011411BF668F31F36690AA6912153F9E8B477C7E5AFE7F
11,787,731 UART: mbox::rt_entry...
11,788,103 UART: ____ _ _ _ ____ _____
11,788,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,789,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,790,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,791,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,791,991 UART: |_|
11,792,303 UART:
12,073,921 UART: [rt] Runtime listening for mailbox commands...
12,075,117 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.57s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,670 UART: [fwproc] Recv'd Img size: 78456 bytes
2,171,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,466 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,559 >>> mbox cmd response: success
2,310,559 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,703 UART: [afmc] ++
2,311,871 UART: [afmc] CDI.KEYID = 6
2,312,233 UART: [afmc] SUBJECT.KEYID = 7
2,312,658 UART: [afmc] AUTHORITY.KEYID = 5
2,348,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,642 UART: [afmc] --
2,391,688 UART: [cold-reset] --
2,392,270 UART: [state] Locking Datavault
2,393,499 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,103 UART: [state] Locking ICCM
2,394,719 UART: [exit] Launching FMC @ 0x40000130
2,400,048 UART:
2,400,064 UART: Running Caliptra FMC ...
2,400,472 UART:
2,400,526 UART: [state] CFI Enabled
2,411,103 UART: [fht] FMC Alias Private Key: 7
2,519,812 UART: [art] Extend RT PCRs Done
2,520,240 UART: [art] Lock RT PCRs Done
2,521,776 UART: [art] Populate DV Done
2,529,871 UART: [fht] FMC Alias Private Key: 7
2,530,847 UART: [art] Derive CDI
2,531,127 UART: [art] Store in in slot 0x4
2,616,606 UART: [art] Derive Key Pair
2,616,966 UART: [art] Store priv key in slot 0x5
2,630,070 UART: [art] Derive Key Pair - Done
2,644,937 UART: [art] Signing Cert with AUTHO
2,645,417 UART: RITY.KEYID = 7
2,660,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,516 UART: [art] PUB.X = 33340D9A12BF9EE8560AED902982E94B176D133F025EBB96B49172EB879D7F157CF08F984D17B8C2BEC7DE051D02A3E5
2,668,279 UART: [art] PUB.Y = ADB657AC816A73E6E108FBF26478B1C5C9388889B16C7E303DC114B2E2AF1798E4F69319B694EB7ED05C3BDF3BF81E22
2,675,238 UART: [art] SIG.R = B08BCE2361CA8AD330B4D910D774631B2EC968D1184EC4610A0245F365F4076ACA41676429642217BDAA94FA4FE3B119
2,682,001 UART: [art] SIG.S = EF5DA2D863A149A71F994BE1006BF9A892EFD29E6EE925F4782CAC3CEEBF20820952CE635C2BCC78510B1165BD544127
2,705,700 UART: mbox::rt_entry...
2,706,072 UART: ____ _ _ _ ____ _____
2,706,856 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,192 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,960 UART: |_|
2,710,272 UART:
2,817,341 UART: [rt] Runtime listening for mailbox commands...
2,818,528 >>> mbox cmd response data (48 bytes)
2,818,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,818,640 UART:
2,818,656 UART: Running Caliptra ROM ...
2,819,064 UART:
2,819,119 UART: [state] CFI Enabled
2,821,667 UART: [state] LifecycleState = Unprovisioned
2,822,322 UART: [state] DebugLocked = No
2,823,018 UART: [state] WD Timer not started. Device not locked for debugging
2,824,316 UART: [kat] SHA2-256
3,629,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,091 UART: [kat] ++
3,634,243 UART: [kat] sha1
3,638,339 UART: [kat] SHA2-256
3,640,279 UART: [kat] SHA2-384
3,642,820 UART: [kat] SHA2-512-ACC
3,644,720 UART: [kat] ECC-384
3,654,491 UART: [kat] HMAC-384Kdf
3,659,027 UART: [kat] LMS
3,907,355 UART: [kat] --
3,908,243 UART: [update-reset] ++
5,217,439 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,218,596 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,368,048 >>> mbox cmd response: success
5,368,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,368,243 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,257 UART: [update-reset Success] --
5,377,158 UART: [state] Locking Datavault
5,377,896 UART: [state] Locking PCR0, PCR1 and PCR31
5,378,500 UART: [state] Locking ICCM
5,379,042 UART: [exit] Launching FMC @ 0x40000130
5,384,371 UART:
5,384,387 UART: Running Caliptra FMC ...
5,384,795 UART:
5,384,849 UART: [state] CFI Enabled
5,474,024 UART: [art] Extend RT PCRs Done
5,474,452 UART: [art] Lock RT PCRs Done
5,475,711 UART: [art] Populate DV Done
5,484,072 UART: [fht] FMC Alias Private Key: 7
5,485,084 UART: [art] Derive CDI
5,485,364 UART: [art] Store in in slot 0x4
5,571,409 UART: [art] Derive Key Pair
5,571,769 UART: [art] Store priv key in slot 0x5
5,584,795 UART: [art] Derive Key Pair - Done
5,599,333 UART: [art] Signing Cert with AUTHO
5,599,813 UART: RITY.KEYID = 7
5,614,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,752 UART: [art] PUB.X = 41DFE39EA4C7EB16B0E3F4D1988198FBCA1AC24693AD17EF9BF475A68E0FF8627751F7D3208E6C694318C26547618358
5,622,523 UART: [art] PUB.Y = 3C38A919A9C5A770E673836E73C2757110C88177A5F3F5E145CA5535286CFA5E57D743C36AD540E12339720BD2233810
5,629,460 UART: [art] SIG.R = 5D52EF028E7433D2EEE6AE73E42BB2F2D44C1DA6941D961F1F3948981A6D869B8303D7C43C17D6CA9FFBC7F2A31132C2
5,636,236 UART: [art] SIG.S = 523875201A55CA79D9F4E750471F9B169E20B1F70E1952D7F26B0EFE3F0BBCDEB064E401C318FD7E8FC2A53299D5E90B
5,659,352 UART: Caliptra RT
5,659,605 UART: [state] CFI Enabled
5,943,020 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,414 UART: [rt]cmd =0x4d454153, len=108
5,995,587 >>> mbox cmd response data (12 bytes)
5,995,588 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,319 UART:
5,996,335 UART: Running Caliptra ROM ...
5,996,743 UART:
5,996,798 UART: [state] CFI Enabled
5,999,636 UART: [state] LifecycleState = Unprovisioned
6,000,291 UART: [state] DebugLocked = No
6,000,975 UART: [state] WD Timer not started. Device not locked for debugging
6,002,257 UART: [kat] SHA2-256
6,807,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,812,032 UART: [kat] ++
6,812,184 UART: [kat] sha1
6,816,432 UART: [kat] SHA2-256
6,818,372 UART: [kat] SHA2-384
6,821,069 UART: [kat] SHA2-512-ACC
6,822,969 UART: [kat] ECC-384
6,832,522 UART: [kat] HMAC-384Kdf
6,837,186 UART: [kat] LMS
7,085,514 UART: [kat] --
7,086,568 UART: [update-reset] ++
7,989,822 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,990,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,086,819 >>> mbox cmd response: success
8,086,819 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,087,162 UART: [update-reset] Copying MAN_2 To MAN_1
8,095,176 UART: [update-reset Success] --
8,096,071 UART: [state] Locking Datavault
8,096,785 UART: [state] Locking PCR0, PCR1 and PCR31
8,097,389 UART: [state] Locking ICCM
8,097,837 UART: [exit] Launching FMC @ 0x40000130
8,103,166 UART:
8,103,182 UART: Running Caliptra FMC ...
8,103,590 UART:
8,103,644 UART: [state] CFI Enabled
8,193,057 UART: [art] Extend RT PCRs Done
8,193,485 UART: [art] Lock RT PCRs Done
8,194,588 UART: [art] Populate DV Done
8,203,015 UART: [fht] FMC Alias Private Key: 7
8,204,059 UART: [art] Derive CDI
8,204,339 UART: [art] Store in in slot 0x4
8,290,172 UART: [art] Derive Key Pair
8,290,532 UART: [art] Store priv key in slot 0x5
8,303,152 UART: [art] Derive Key Pair - Done
8,317,947 UART: [art] Signing Cert with AUTHO
8,318,427 UART: RITY.KEYID = 7
8,333,437 UART: [art] Erasing AUTHORITY.KEYID = 7
8,334,202 UART: [art] PUB.X = F53F6A6474BAAE6517C7BF9307CBDEE1A4DC6160F709583F9FA636356579BCAC0013E7EFD5E5C2A0680660022623EF10
8,340,946 UART: [art] PUB.Y = 507948CF6CBBC0E542AD45253A8B63D2CF152D0F118DB74ABC51CAF08A30A0E2998122C016D70D138BBF768B81A28418
8,347,898 UART: [art] SIG.R = 5F1E7386856983BF7B9D0E63C0E98DB31A0BB15355505D7965728654918C5344D155FC61A168198586CEE6A4263DF527
8,354,652 UART: [art] SIG.S = 30F6F1F87A51D53C717212D64FE704F2AA9428A4294C9962E4AE989A7F166F79FA6A90E383448FCC20F099D639CDD156
8,378,592 UART: mbox::rt_entry...
8,378,964 UART: ____ _ _ _ ____ _____
8,379,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,380,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,381,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,382,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,382,852 UART: |_|
8,383,164 UART:
8,660,786 UART: [rt] Runtime listening for mailbox commands...
8,661,750 UART:
8,661,766 UART: Running Caliptra ROM ...
8,662,174 UART:
8,662,229 UART: [state] CFI Enabled
8,664,649 UART: [state] LifecycleState = Unprovisioned
8,665,304 UART: [state] DebugLocked = No
8,665,798 UART: [state] WD Timer not started. Device not locked for debugging
8,667,114 UART: [kat] SHA2-256
9,472,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,476,889 UART: [kat] ++
9,477,041 UART: [kat] sha1
9,481,031 UART: [kat] SHA2-256
9,482,971 UART: [kat] SHA2-384
9,485,808 UART: [kat] SHA2-512-ACC
9,487,708 UART: [kat] ECC-384
9,497,595 UART: [kat] HMAC-384Kdf
9,502,369 UART: [kat] LMS
9,750,697 UART: [kat] --
9,751,629 UART: [update-reset] ++
10,652,629 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,653,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
10,749,800 >>> mbox cmd response: success
10,749,800 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,750,105 UART: [update-reset] Copying MAN_2 To MAN_1
10,758,119 UART: [update-reset Success] --
10,759,116 UART: [state] Locking Datavault
10,759,866 UART: [state] Locking PCR0, PCR1 and PCR31
10,760,470 UART: [state] Locking ICCM
10,760,994 UART: [exit] Launching FMC @ 0x40000130
10,766,323 UART:
10,766,339 UART: Running Caliptra FMC ...
10,766,747 UART:
10,766,801 UART: [state] CFI Enabled
10,856,018 UART: [art] Extend RT PCRs Done
10,856,446 UART: [art] Lock RT PCRs Done
10,857,729 UART: [art] Populate DV Done
10,866,020 UART: [fht] FMC Alias Private Key: 7
10,867,046 UART: [art] Derive CDI
10,867,326 UART: [art] Store in in slot 0x4
10,952,571 UART: [art] Derive Key Pair
10,952,931 UART: [art] Store priv key in slot 0x5
10,965,773 UART: [art] Derive Key Pair - Done
10,980,455 UART: [art] Signing Cert with AUTHO
10,980,935 UART: RITY.KEYID = 7
10,995,841 UART: [art] Erasing AUTHORITY.KEYID = 7
10,996,606 UART: [art] PUB.X = 96E37F536FF142909D367431E6016A4953BC97698E6ABE6383D0E6986D2B6F8780D2A9F74328B21C90CE852CDBCFA1CE
11,003,377 UART: [art] PUB.Y = D4DD7B5219269928BEA23C19BAA372802348E75FA558E48C5B8149CC052DF423AD8CDD00695524447D196C645C92B169
11,010,300 UART: [art] SIG.R = 2E5050EAF94007F028684609B2C79E7915A189A43267CE0F306233519C94E530E3C8FF30215CCE97F08F73277B135336
11,017,049 UART: [art] SIG.S = E1B824269DBB57CBEE2AEF2D6766F9B7248C33A9D8BED581A505E25DDB5440F6034D1DFC979356DED09384472ED84260
11,041,162 UART: mbox::rt_entry...
11,041,534 UART: ____ _ _ _ ____ _____
11,042,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,043,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,043,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,044,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,045,422 UART: |_|
11,045,734 UART:
11,326,320 UART: [rt] Runtime listening for mailbox commands...
11,327,516 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,331 ready_for_fw is high
1,060,331 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,164,206 >>> mbox cmd response: success
2,164,206 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,226,948 UART:
2,226,964 UART: Running Caliptra FMC ...
2,227,372 UART:
2,227,426 UART: [state] CFI Enabled
2,238,279 UART: [fht] FMC Alias Private Key: 7
2,345,478 UART: [art] Extend RT PCRs Done
2,345,906 UART: [art] Lock RT PCRs Done
2,347,136 UART: [art] Populate DV Done
2,355,273 UART: [fht] FMC Alias Private Key: 7
2,356,429 UART: [art] Derive CDI
2,356,709 UART: [art] Store in in slot 0x4
2,442,480 UART: [art] Derive Key Pair
2,442,840 UART: [art] Store priv key in slot 0x5
2,456,102 UART: [art] Derive Key Pair - Done
2,470,785 UART: [art] Signing Cert with AUTHO
2,471,265 UART: RITY.KEYID = 7
2,486,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,190 UART: [art] PUB.X = 90505055480685D05A82A61BA33036F61714B9B37F7398CB8865E9C3A2711FC41C5F193782D021B56F6F68FAA413DE16
2,493,949 UART: [art] PUB.Y = 0874F208033D7232AE9DC1E4F14CF4508669968F3AED0A342B56867E13893A5455C3856AB7FCDE8FA7AB9CDD212AAF1D
2,500,897 UART: [art] SIG.R = 5858B8051630296CEC53A0BA50147891E4921D532ACC31F0A01378770AADBDC9A214A7EDC4C3060B710CD0578DC55EF7
2,507,656 UART: [art] SIG.S = 5DE3181BEA686F1A9A69F53C81E9C501B2A25846598229401F6C9CD7EEFC6DDEA08FF5003E6077E0426DFC038F9530F9
2,530,599 UART: mbox::rt_entry...
2,530,971 UART: ____ _ _ _ ____ _____
2,531,755 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,555 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,091 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,859 UART: |_|
2,535,171 UART:
2,642,727 UART: [rt] Runtime listening for mailbox commands...
2,643,914 >>> mbox cmd response data (48 bytes)
2,643,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,076,731 >>> mbox cmd response: success
5,076,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,090,155 UART:
5,090,171 UART: Running Caliptra FMC ...
5,090,579 UART:
5,090,633 UART: [state] CFI Enabled
5,179,420 UART: [art] Extend RT PCRs Done
5,179,848 UART: [art] Lock RT PCRs Done
5,181,269 UART: [art] Populate DV Done
5,189,710 UART: [fht] FMC Alias Private Key: 7
5,190,868 UART: [art] Derive CDI
5,191,148 UART: [art] Store in in slot 0x4
5,276,761 UART: [art] Derive Key Pair
5,277,121 UART: [art] Store priv key in slot 0x5
5,290,401 UART: [art] Derive Key Pair - Done
5,305,086 UART: [art] Signing Cert with AUTHO
5,305,566 UART: RITY.KEYID = 7
5,320,620 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,385 UART: [art] PUB.X = F70B80735D6AB5E8A685185DB263E164756D2E400232F0C79999AB646F288116799FA114B994617FA585B7C2B7E372F5
5,328,141 UART: [art] PUB.Y = E4F36F4D94586956370EB46CDC283D85682617B0E2B591409C7B9391C0611857CBE4065E79EF29AD5FAFCD3BC436D163
5,335,087 UART: [art] SIG.R = 46C7C7B6377D68BF9CD0216346A7A29CF4ECBF51210E2F8436E66B4DAFE28FC25D237DB676A808C933326B72562813F6
5,341,855 UART: [art] SIG.S = 89AB507F7DEEAF27B45785909C89310567537FF41FDC23E211773F86442DDFD2258A154B970BB6074F09FE74D5F3158C
5,365,640 UART: Caliptra RT
5,365,893 UART: [state] CFI Enabled
5,644,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,676,392 UART: [rt]cmd =0x4d454153, len=108
5,696,957 >>> mbox cmd response data (12 bytes)
5,696,958 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,669,754 >>> mbox cmd response: success
7,669,754 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,683,076 UART:
7,683,092 UART: Running Caliptra FMC ...
7,683,500 UART:
7,683,554 UART: [state] CFI Enabled
7,772,717 UART: [art] Extend RT PCRs Done
7,773,145 UART: [art] Lock RT PCRs Done
7,774,318 UART: [art] Populate DV Done
7,782,475 UART: [fht] FMC Alias Private Key: 7
7,783,435 UART: [art] Derive CDI
7,783,715 UART: [art] Store in in slot 0x4
7,869,788 UART: [art] Derive Key Pair
7,870,148 UART: [art] Store priv key in slot 0x5
7,883,398 UART: [art] Derive Key Pair - Done
7,897,920 UART: [art] Signing Cert with AUTHO
7,898,400 UART: RITY.KEYID = 7
7,913,930 UART: [art] Erasing AUTHORITY.KEYID = 7
7,914,695 UART: [art] PUB.X = 283825024E08979BC6082F32CE8ED01AC86E8A34A1D8BF75BEA381C6793BE10D79A924160D40794129C0E3BBA5DB12AE
7,921,456 UART: [art] PUB.Y = 83FEC5FE527BC06B4F8F8F4200B734B59F1F3510513D813B14CB7822DA5E5637E985C692D99DD9952AB8377FD2796ADB
7,928,390 UART: [art] SIG.R = 4D3F485FFDE193F6848A151F20946BFC42C43C5F2C2F02D10CFDEB43544A6B1BF81C00CE726877D099E9A27FEDF7AF43
7,935,148 UART: [art] SIG.S = 2ECE06A91800F1C4044A11F65C121865D44E4B68C495D14F1E3F7E534909787C632434DABBF9B239C517C33B3F7CDB8F
7,959,052 UART: mbox::rt_entry...
7,959,424 UART: ____ _ _ _ ____ _____
7,960,208 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,961,008 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,961,776 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,962,544 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,963,312 UART: |_|
7,963,624 UART:
8,245,562 UART: [rt] Runtime listening for mailbox commands...
10,218,381 >>> mbox cmd response: success
10,218,381 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,231,817 UART:
10,231,833 UART: Running Caliptra FMC ...
10,232,241 UART:
10,232,295 UART: [state] CFI Enabled
10,320,782 UART: [art] Extend RT PCRs Done
10,321,210 UART: [art] Lock RT PCRs Done
10,322,393 UART: [art] Populate DV Done
10,330,602 UART: [fht] FMC Alias Private Key: 7
10,331,784 UART: [art] Derive CDI
10,332,064 UART: [art] Store in in slot 0x4
10,417,761 UART: [art] Derive Key Pair
10,418,121 UART: [art] Store priv key in slot 0x5
10,431,609 UART: [art] Derive Key Pair - Done
10,446,400 UART: [art] Signing Cert with AUTHO
10,446,880 UART: RITY.KEYID = 7
10,462,272 UART: [art] Erasing AUTHORITY.KEYID = 7
10,463,037 UART: [art] PUB.X = DB2242F1E20300E51BF9141F4A56D35F2B0D1608EED898688C48FAED754C3693EBC226930120DE70E42DF28DEFB26232
10,469,779 UART: [art] PUB.Y = 316056B8EAFDFACFFF6FBF77FEFE538067ADB7D3F76A5B2E2C01F437278028FBF05797934D1C16248EED321D47464AC8
10,476,742 UART: [art] SIG.R = B6D5EE58C6823AEAE54CB270C1725C412EB0B16F2FE396E0037DE1DF116C4FE21F6BECFE18DBF6A26FAA7344E0C7CDAD
10,483,539 UART: [art] SIG.S = 2C99AFB6B6C067F83E2B96D1A929A137C298C1869FADD16B71C0C3B4821D94F2C59C8D4506F0CDCC6366862A06DEE9DE
10,507,722 UART: mbox::rt_entry...
10,508,094 UART: ____ _ _ _ ____ _____
10,508,878 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,509,678 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,510,446 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,511,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,511,982 UART: |_|
10,512,294 UART:
10,793,636 UART: [rt] Runtime listening for mailbox commands...
10,794,832 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.42s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,259 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,367 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,408 >>> mbox cmd response: success
2,309,408 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,310,476 UART: [afmc] ++
2,310,644 UART: [afmc] CDI.KEYID = 6
2,311,006 UART: [afmc] SUBJECT.KEYID = 7
2,311,431 UART: [afmc] AUTHORITY.KEYID = 5
2,347,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,723 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,055 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,887 UART: [afmc] --
2,390,803 UART: [cold-reset] --
2,391,501 UART: [state] Locking Datavault
2,392,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,338 UART: [state] Locking ICCM
2,393,944 UART: [exit] Launching FMC @ 0x40000130
2,399,273 UART:
2,399,289 UART: Running Caliptra FMC ...
2,399,697 UART:
2,399,840 UART: [state] CFI Enabled
2,410,415 UART: [fht] FMC Alias Private Key: 7
2,518,380 UART: [art] Extend RT PCRs Done
2,518,808 UART: [art] Lock RT PCRs Done
2,520,384 UART: [art] Populate DV Done
2,528,727 UART: [fht] FMC Alias Private Key: 7
2,529,693 UART: [art] Derive CDI
2,529,973 UART: [art] Store in in slot 0x4
2,615,468 UART: [art] Derive Key Pair
2,615,828 UART: [art] Store priv key in slot 0x5
2,628,960 UART: [art] Derive Key Pair - Done
2,643,719 UART: [art] Signing Cert with AUTHO
2,644,199 UART: RITY.KEYID = 7
2,659,095 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,860 UART: [art] PUB.X = 5F629F9E22C7EEFCACE83143FDBE76B7D7056ABF2658492AF9EE71A1D68E8AB832CD3287193AAC5F622FBE76A4ABCAAF
2,666,655 UART: [art] PUB.Y = EA997D30E5A6F0CD8CAC96059B1E86A21543F8BA51E29FABF0303CFF54A6DC35B27519EEC54446B7CCA73EF0632DD6E4
2,673,622 UART: [art] SIG.R = 4745999912B015C519913A7CA73BBDDE5F3A8D717F4BBC3E90DF0FC5B0AFE6407CBB2CF10725411A37F4909E12128DD2
2,680,396 UART: [art] SIG.S = 930D3836FF4780B942FEDDF78CEF0C96B499A848C4481325EEDB65BBF4778EE26AB0BC62EA6F2E1E7EC8F1E7B4BB1BDB
2,704,081 UART: mbox::rt_entry...
2,704,453 UART: ____ _ _ _ ____ _____
2,705,237 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,037 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,341 UART: |_|
2,708,653 UART:
2,815,117 UART: [rt] Runtime listening for mailbox commands...
2,816,304 >>> mbox cmd response data (48 bytes)
2,816,305 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,816,416 UART:
2,816,432 UART: Running Caliptra ROM ...
2,816,840 UART:
2,816,982 UART: [state] CFI Enabled
2,820,010 UART: [state] LifecycleState = Unprovisioned
2,820,665 UART: [state] DebugLocked = No
2,821,367 UART: [state] WD Timer not started. Device not locked for debugging
2,822,539 UART: [kat] SHA2-256
3,628,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,314 UART: [kat] ++
3,632,466 UART: [kat] sha1
3,636,872 UART: [kat] SHA2-256
3,638,812 UART: [kat] SHA2-384
3,641,607 UART: [kat] SHA2-512-ACC
3,643,507 UART: [kat] ECC-384
3,653,366 UART: [kat] HMAC-384Kdf
3,658,036 UART: [kat] LMS
3,906,364 UART: [kat] --
3,907,174 UART: [update-reset] ++
5,216,304 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,217,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,366,807 >>> mbox cmd response: success
5,366,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,366,920 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,934 UART: [update-reset Success] --
5,375,831 UART: [state] Locking Datavault
5,376,465 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,069 UART: [state] Locking ICCM
5,377,721 UART: [exit] Launching FMC @ 0x40000130
5,383,050 UART:
5,383,066 UART: Running Caliptra FMC ...
5,383,474 UART:
5,383,617 UART: [state] CFI Enabled
5,473,126 UART: [art] Extend RT PCRs Done
5,473,554 UART: [art] Lock RT PCRs Done
5,474,763 UART: [art] Populate DV Done
5,482,916 UART: [fht] FMC Alias Private Key: 7
5,483,942 UART: [art] Derive CDI
5,484,222 UART: [art] Store in in slot 0x4
5,570,197 UART: [art] Derive Key Pair
5,570,557 UART: [art] Store priv key in slot 0x5
5,584,175 UART: [art] Derive Key Pair - Done
5,599,268 UART: [art] Signing Cert with AUTHO
5,599,748 UART: RITY.KEYID = 7
5,614,870 UART: [art] Erasing AUTHORITY.KEYID = 7
5,615,635 UART: [art] PUB.X = 61BF24D98B2A6DD115CA3E491D548615011BC5F9DE70713E03AECAEC019A0C5A6445D7B11B5D08898DBA236229E7FC0C
5,622,399 UART: [art] PUB.Y = F6C344F67F9726A8456F5C184BCBAAB617184CD15A8FEC0BCA0C52F41A80C545A5C6418AD407013AC462AC8BFA7CCD72
5,629,355 UART: [art] SIG.R = C25AABA10B8D3260D10262536B4AE189D27FF53D4A37C9CC7B1D3F297FA0F5822D302AC0E8348DFABBA3F501B0DE8693
5,636,132 UART: [art] SIG.S = 04F79D682200A2410B9760B00DDD0CF83C882ED362C85990F1D877DB9DA17AF8F91A9C438EAA01344072473E37503CC6
5,660,126 UART: Caliptra RT
5,660,471 UART: [state] CFI Enabled
5,944,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,984 UART: [rt]cmd =0x4d454153, len=108
5,996,473 >>> mbox cmd response data (12 bytes)
5,996,474 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,239 UART:
5,997,255 UART: Running Caliptra ROM ...
5,997,663 UART:
5,997,805 UART: [state] CFI Enabled
6,000,665 UART: [state] LifecycleState = Unprovisioned
6,001,320 UART: [state] DebugLocked = No
6,002,026 UART: [state] WD Timer not started. Device not locked for debugging
6,003,328 UART: [kat] SHA2-256
6,808,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,813,103 UART: [kat] ++
6,813,255 UART: [kat] sha1
6,817,497 UART: [kat] SHA2-256
6,819,437 UART: [kat] SHA2-384
6,822,294 UART: [kat] SHA2-512-ACC
6,824,194 UART: [kat] ECC-384
6,833,977 UART: [kat] HMAC-384Kdf
6,838,553 UART: [kat] LMS
7,086,881 UART: [kat] --
7,087,679 UART: [update-reset] ++
7,989,829 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,990,940 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,086,950 >>> mbox cmd response: success
8,086,950 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,087,283 UART: [update-reset] Copying MAN_2 To MAN_1
8,095,297 UART: [update-reset Success] --
8,096,342 UART: [state] Locking Datavault
8,097,170 UART: [state] Locking PCR0, PCR1 and PCR31
8,097,774 UART: [state] Locking ICCM
8,098,214 UART: [exit] Launching FMC @ 0x40000130
8,103,543 UART:
8,103,559 UART: Running Caliptra FMC ...
8,103,967 UART:
8,104,110 UART: [state] CFI Enabled
8,193,227 UART: [art] Extend RT PCRs Done
8,193,655 UART: [art] Lock RT PCRs Done
8,195,102 UART: [art] Populate DV Done
8,203,163 UART: [fht] FMC Alias Private Key: 7
8,204,261 UART: [art] Derive CDI
8,204,541 UART: [art] Store in in slot 0x4
8,290,638 UART: [art] Derive Key Pair
8,290,998 UART: [art] Store priv key in slot 0x5
8,303,720 UART: [art] Derive Key Pair - Done
8,318,413 UART: [art] Signing Cert with AUTHO
8,318,893 UART: RITY.KEYID = 7
8,333,855 UART: [art] Erasing AUTHORITY.KEYID = 7
8,334,620 UART: [art] PUB.X = 799D5E6475E234D54C3D90F4478526B2C6B47F3A6D6CC67281D4615AC645BC278DE346FD665F727901EAF00116524349
8,341,378 UART: [art] PUB.Y = 45011A414237F309838C3BCF6CAAED8C515A5E404EAB0FFCEFD0ECEF9A8216381DF39832CB923BB63D5FFB440A165746
8,348,332 UART: [art] SIG.R = 18197E2AE14738A2514D62EDE0F1749B98919E7C481A66A5291FD55F3D9E96D5FD42E56DFEDF78271BFB2575E5E9370D
8,355,105 UART: [art] SIG.S = 78E6F95503B0301AE984E1846DD62E103DD234F5C9A6FB0FF87DB79050661EEC7118D006AAC382654015678725E555D0
8,378,471 UART: mbox::rt_entry...
8,378,843 UART: ____ _ _ _ ____ _____
8,379,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,380,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,381,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,381,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,382,731 UART: |_|
8,383,043 UART:
8,665,417 UART: [rt] Runtime listening for mailbox commands...
8,666,381 UART:
8,666,397 UART: Running Caliptra ROM ...
8,666,805 UART:
8,666,947 UART: [state] CFI Enabled
8,669,799 UART: [state] LifecycleState = Unprovisioned
8,670,454 UART: [state] DebugLocked = No
8,671,062 UART: [state] WD Timer not started. Device not locked for debugging
8,672,294 UART: [kat] SHA2-256
9,477,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,482,069 UART: [kat] ++
9,482,221 UART: [kat] sha1
9,486,579 UART: [kat] SHA2-256
9,488,519 UART: [kat] SHA2-384
9,491,212 UART: [kat] SHA2-512-ACC
9,493,112 UART: [kat] ECC-384
9,502,771 UART: [kat] HMAC-384Kdf
9,507,527 UART: [kat] LMS
9,755,855 UART: [kat] --
9,756,763 UART: [update-reset] ++
10,659,552 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,660,575 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
10,756,585 >>> mbox cmd response: success
10,756,585 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,756,690 UART: [update-reset] Copying MAN_2 To MAN_1
10,764,704 UART: [update-reset Success] --
10,765,737 UART: [state] Locking Datavault
10,766,525 UART: [state] Locking PCR0, PCR1 and PCR31
10,767,129 UART: [state] Locking ICCM
10,767,641 UART: [exit] Launching FMC @ 0x40000130
10,772,970 UART:
10,772,986 UART: Running Caliptra FMC ...
10,773,394 UART:
10,773,537 UART: [state] CFI Enabled
10,863,466 UART: [art] Extend RT PCRs Done
10,863,894 UART: [art] Lock RT PCRs Done
10,865,303 UART: [art] Populate DV Done
10,873,628 UART: [fht] FMC Alias Private Key: 7
10,874,598 UART: [art] Derive CDI
10,874,878 UART: [art] Store in in slot 0x4
10,960,715 UART: [art] Derive Key Pair
10,961,075 UART: [art] Store priv key in slot 0x5
10,974,673 UART: [art] Derive Key Pair - Done
10,989,172 UART: [art] Signing Cert with AUTHO
10,989,652 UART: RITY.KEYID = 7
11,004,770 UART: [art] Erasing AUTHORITY.KEYID = 7
11,005,535 UART: [art] PUB.X = BD4A81A7817F0F83351D1084140E452F571BDDDBA793C3C2A87F63AFE4D4910F0A5C9067F0266397AC778372FB26CF44
11,012,297 UART: [art] PUB.Y = 8FD5F18F57E19282F2D6BC3FC8CF22E1AD79A4B2CFA2049DC3FB405FD1ECD3ACD82B67CC54E8A43E0BB279C71A24C33E
11,019,269 UART: [art] SIG.R = FEB04E8E0C2C2BAB20F8EE4215ECCEEC3FE7EFE4505BD0D288939050ED6329AC95CDDEB0A5E1B6F81E5B8DE53B464AB7
11,026,068 UART: [art] SIG.S = C1BBFFF88FD6D637C5A0340B829BF5EF3ADD6CDBF57026357090508653F07D83F4CA1E5ECA94EFA4EC846F0D65EB6F51
11,049,953 UART: mbox::rt_entry...
11,050,325 UART: ____ _ _ _ ____ _____
11,051,109 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,051,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,052,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,053,445 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,054,213 UART: |_|
11,054,525 UART:
11,336,214 UART: [rt] Runtime listening for mailbox commands...
11,337,410 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,980 ready_for_fw is high
1,059,980 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,162,241 >>> mbox cmd response: success
2,162,241 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,224,701 UART:
2,224,717 UART: Running Caliptra FMC ...
2,225,125 UART:
2,225,268 UART: [state] CFI Enabled
2,235,879 UART: [fht] FMC Alias Private Key: 7
2,343,906 UART: [art] Extend RT PCRs Done
2,344,334 UART: [art] Lock RT PCRs Done
2,345,814 UART: [art] Populate DV Done
2,354,065 UART: [fht] FMC Alias Private Key: 7
2,355,147 UART: [art] Derive CDI
2,355,427 UART: [art] Store in in slot 0x4
2,441,328 UART: [art] Derive Key Pair
2,441,688 UART: [art] Store priv key in slot 0x5
2,454,954 UART: [art] Derive Key Pair - Done
2,469,769 UART: [art] Signing Cert with AUTHO
2,470,249 UART: RITY.KEYID = 7
2,485,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,198 UART: [art] PUB.X = 5E200AD05815141E861F2BF6BA8B0F2D313373E2A242F956206711DA92E84090900E94A4BAADBEA812CD407FB02160DB
2,492,963 UART: [art] PUB.Y = 8A18B8B1A0E2D151DEE36985870032EA640F84ED206F2C884060BCA25256DE00EAD005C1ABE410F31CDEDA60026A5A57
2,499,870 UART: [art] SIG.R = 23231E42135B45BC6C264A8F6AAE82340402D11190D74B893F345028445B53F18BF86477ED8704C37342BEB0C867CB11
2,506,623 UART: [art] SIG.S = 3A3F4F8011608E929285E2C6F294F104C9558AB651A8BA0632AD926D519D494C2E8290158006A034CEED50EDDD7A937B
2,530,961 UART: mbox::rt_entry...
2,531,333 UART: ____ _ _ _ ____ _____
2,532,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,221 UART: |_|
2,535,533 UART:
2,642,301 UART: [rt] Runtime listening for mailbox commands...
2,643,488 >>> mbox cmd response data (48 bytes)
2,643,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,078,049 >>> mbox cmd response: success
5,078,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,091,813 UART:
5,091,829 UART: Running Caliptra FMC ...
5,092,237 UART:
5,092,380 UART: [state] CFI Enabled
5,182,323 UART: [art] Extend RT PCRs Done
5,182,751 UART: [art] Lock RT PCRs Done
5,184,040 UART: [art] Populate DV Done
5,192,277 UART: [fht] FMC Alias Private Key: 7
5,193,331 UART: [art] Derive CDI
5,193,611 UART: [art] Store in in slot 0x4
5,278,966 UART: [art] Derive Key Pair
5,279,326 UART: [art] Store priv key in slot 0x5
5,292,768 UART: [art] Derive Key Pair - Done
5,307,570 UART: [art] Signing Cert with AUTHO
5,308,050 UART: RITY.KEYID = 7
5,323,020 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,785 UART: [art] PUB.X = A4A1574A1A529410CEB85627CFCBA53FC3F9A858D0533A74423BF979B10ACFF94BEE8B34182F16DD4695A7D79C11FD1F
5,330,566 UART: [art] PUB.Y = D703D394222DD993ABABD572BF67041D230600A603410077F269164178A674C14D601A49682D06D247C9A7871B7FF391
5,337,445 UART: [art] SIG.R = 9E72CF3980EBCB51BD7EEF26649206E5D1B94A384897FF7DCB8C2462FD0946243975F7BB62441BC052A861D27E970EF8
5,344,212 UART: [art] SIG.S = F8171C3FE259F956CFF1DDB8A5F823FC05838BC6F7F0C5439B0746793B974C2DF2B26C4BD2B9DA2FC97F8D49F31F4CCE
5,367,461 UART: Caliptra RT
5,367,806 UART: [state] CFI Enabled
5,651,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,682,962 UART: [rt]cmd =0x4d454153, len=108
5,704,191 >>> mbox cmd response data (12 bytes)
5,704,192 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,677,617 >>> mbox cmd response: success
7,677,617 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,691,087 UART:
7,691,103 UART: Running Caliptra FMC ...
7,691,511 UART:
7,691,654 UART: [state] CFI Enabled
7,780,435 UART: [art] Extend RT PCRs Done
7,780,863 UART: [art] Lock RT PCRs Done
7,782,128 UART: [art] Populate DV Done
7,790,371 UART: [fht] FMC Alias Private Key: 7
7,791,347 UART: [art] Derive CDI
7,791,627 UART: [art] Store in in slot 0x4
7,877,602 UART: [art] Derive Key Pair
7,877,962 UART: [art] Store priv key in slot 0x5
7,891,808 UART: [art] Derive Key Pair - Done
7,906,670 UART: [art] Signing Cert with AUTHO
7,907,150 UART: RITY.KEYID = 7
7,922,044 UART: [art] Erasing AUTHORITY.KEYID = 7
7,922,809 UART: [art] PUB.X = BE2AE0A384BC2FC6437DB77F43456EB3BF0751A16B2AC2ABD9E7E96F1BE1DF59A1701C3E10732BED8246AAD8DDEAC5CA
7,929,606 UART: [art] PUB.Y = A40B5A58916C325ABEB9CFCE5F81D9B116E3D3BE409354268D9CEEC7BEDCFE1C5D1FA3F60EB4EBB690A2C50EF0B7F7FD
7,936,581 UART: [art] SIG.R = F3D86B6B0CC8BFA9FA1BF01852E5D9823225D01E01B38846EE186C4B004E787B27AA4B5AEA4278FD7757E10FC054058D
7,943,327 UART: [art] SIG.S = 77BA6168F3B85A2C97CCEF802188422BFB247FB35F198BB68140CF1B4ADA60620A46CF6471B6113924CE86D02BC90F55
7,966,982 UART: mbox::rt_entry...
7,967,354 UART: ____ _ _ _ ____ _____
7,968,138 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,968,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,969,706 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,970,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,971,242 UART: |_|
7,971,554 UART:
8,246,426 UART: [rt] Runtime listening for mailbox commands...
10,221,402 >>> mbox cmd response: success
10,221,402 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,234,436 UART:
10,234,452 UART: Running Caliptra FMC ...
10,234,860 UART:
10,235,003 UART: [state] CFI Enabled
10,324,734 UART: [art] Extend RT PCRs Done
10,325,162 UART: [art] Lock RT PCRs Done
10,326,475 UART: [art] Populate DV Done
10,334,540 UART: [fht] FMC Alias Private Key: 7
10,335,558 UART: [art] Derive CDI
10,335,838 UART: [art] Store in in slot 0x4
10,421,421 UART: [art] Derive Key Pair
10,421,781 UART: [art] Store priv key in slot 0x5
10,435,069 UART: [art] Derive Key Pair - Done
10,449,752 UART: [art] Signing Cert with AUTHO
10,450,232 UART: RITY.KEYID = 7
10,465,724 UART: [art] Erasing AUTHORITY.KEYID = 7
10,466,489 UART: [art] PUB.X = 530F58E82A86A19DCFEC1C4A016507FB0F3FF64AC3BCDC3BEB07957EB794B4C8D6071DA55B5393C434F973C6AD772627
10,473,255 UART: [art] PUB.Y = 5D5AC8A32A053DF33028C6B2C3A4097F24564977F6EFBA8BCACE8DA0077BDC39B9A399B657A04F415D22E4B0C584F39C
10,480,210 UART: [art] SIG.R = 62A1FE8C0644243EE4258EAF85441DE800B7FB8166DCDA69B16F17E075EB40CC0EB4F284ABE3CFD67094F07A9B721B02
10,486,963 UART: [art] SIG.S = 5B0B3402497E75D3F7FA8AA02F933E2D768F08F9FFEC4A380DB99BA1724E28FB734D6B05F42FCF30C9CBEA6BCC3546DD
10,510,385 UART: mbox::rt_entry...
10,510,757 UART: ____ _ _ _ ____ _____
10,511,541 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,512,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,513,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,513,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,514,645 UART: |_|
10,514,957 UART:
10,793,283 UART: [rt] Runtime listening for mailbox commands...
10,794,479 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.55s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,838 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,971 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,051 >>> mbox cmd response: success
2,309,051 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,310,190 UART: [afmc] ++
2,310,358 UART: [afmc] CDI.KEYID = 6
2,310,721 UART: [afmc] SUBJECT.KEYID = 7
2,311,147 UART: [afmc] AUTHORITY.KEYID = 5
2,346,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,199 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,918 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,919 UART: [afmc] --
2,390,035 UART: [cold-reset] --
2,391,069 UART: [state] Locking Datavault
2,392,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,898 UART: [state] Locking ICCM
2,393,356 UART: [exit] Launching FMC @ 0x40000130
2,398,685 UART:
2,398,701 UART: Running Caliptra FMC ...
2,399,109 UART:
2,399,163 UART: [state] CFI Enabled
2,409,740 UART: [fht] FMC Alias Private Key: 7
2,517,861 UART: [art] Extend RT PCRs Done
2,518,289 UART: [art] Lock RT PCRs Done
2,520,175 UART: [art] Populate DV Done
2,528,622 UART: [fht] FMC Alias Private Key: 7
2,529,684 UART: [art] Derive CDI
2,529,964 UART: [art] Store in in slot 0x4
2,615,421 UART: [art] Derive Key Pair
2,615,781 UART: [art] Store priv key in slot 0x5
2,628,307 UART: [art] Derive Key Pair - Done
2,643,252 UART: [art] Signing Cert with AUTHO
2,643,732 UART: RITY.KEYID = 7
2,659,346 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,111 UART: [art] PUB.X = 3D46338350C144C8389223D6F85D5A8E539901461DC7AFBF870913E4F6D5375AD0ECACEBA7EE19CC3193080C5F609240
2,666,871 UART: [art] PUB.Y = F03C32D4C06DCE70645F670B4B5E033250322C8FA37D848B7005B3B2BFD78513E9B8683FB5735C3BE72E0683DFE639CE
2,673,815 UART: [art] SIG.R = 6029F5C6CE9B07E33205D35F205ACB091226757B01F16F0D68F0D397D29345E222C9503EF512A0F7190B3440C381E1D0
2,680,561 UART: [art] SIG.S = 9F101441A5FD2FFDD2345FB63755B1E3E7552C83082E369D2B9BE582FF0599A2B7F2B8E44444FF151DA3F2702E2E4B96
2,703,738 UART: mbox::rt_entry...
2,704,110 UART: ____ _ _ _ ____ _____
2,704,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,694 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,462 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,998 UART: |_|
2,708,310 UART:
2,814,862 UART: [rt] Runtime listening for mailbox commands...
2,816,049 >>> mbox cmd response data (48 bytes)
2,816,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,816,161 UART:
2,816,177 UART: Running Caliptra ROM ...
2,816,585 UART:
2,816,640 UART: [state] CFI Enabled
2,819,364 UART: [state] LifecycleState = Unprovisioned
2,820,019 UART: [state] DebugLocked = No
2,820,725 UART: [state] WD Timer not started. Device not locked for debugging
2,822,033 UART: [kat] SHA2-256
3,625,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,712 UART: [kat] ++
3,629,864 UART: [kat] sha1
3,633,986 UART: [kat] SHA2-256
3,635,926 UART: [kat] SHA2-384
3,638,725 UART: [kat] SHA2-512-ACC
3,640,625 UART: [kat] ECC-384
3,650,388 UART: [kat] HMAC-384Kdf
3,655,026 UART: [kat] LMS
3,903,338 UART: [kat] --
3,904,124 UART: [update-reset] ++
5,213,537 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,214,652 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,364,104 >>> mbox cmd response: success
5,364,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,364,461 UART: [update-reset] Copying MAN_2 To MAN_1
5,372,475 UART: [update-reset Success] --
5,373,468 UART: [state] Locking Datavault
5,374,284 UART: [state] Locking PCR0, PCR1 and PCR31
5,374,888 UART: [state] Locking ICCM
5,375,370 UART: [exit] Launching FMC @ 0x40000130
5,380,699 UART:
5,380,715 UART: Running Caliptra FMC ...
5,381,123 UART:
5,381,177 UART: [state] CFI Enabled
5,470,108 UART: [art] Extend RT PCRs Done
5,470,536 UART: [art] Lock RT PCRs Done
5,472,131 UART: [art] Populate DV Done
5,480,526 UART: [fht] FMC Alias Private Key: 7
5,481,638 UART: [art] Derive CDI
5,481,918 UART: [art] Store in in slot 0x4
5,567,313 UART: [art] Derive Key Pair
5,567,673 UART: [art] Store priv key in slot 0x5
5,581,183 UART: [art] Derive Key Pair - Done
5,595,750 UART: [art] Signing Cert with AUTHO
5,596,230 UART: RITY.KEYID = 7
5,611,550 UART: [art] Erasing AUTHORITY.KEYID = 7
5,612,315 UART: [art] PUB.X = 9EAE569C0FEBA561E6DEFB22EFC6C4126AEC35C916949CD2AB6C5F36ED41BC84BA04F0089825A99233D01D8C4371C443
5,619,092 UART: [art] PUB.Y = 7A46BA6C942FC5F0AC42CD9211EE2C12495E9D4D310919DA7FA1290FD3C72EA17B0B2EC63C89F377984195B147F2239B
5,626,041 UART: [art] SIG.R = A48F6D60417ED938B2353B2752C524A697193D2C9ADC8267F7AC8A7B5D7FC252969E868E89D7D2804FCFC82525E42EEC
5,632,817 UART: [art] SIG.S = E6B9DCD1D5C703A69628D1E2D004548049798926789878167A7EB0788052A2B55EC9FCD7A9686134E2837E273028AA84
5,656,594 UART: Caliptra RT
5,656,847 UART: [state] CFI Enabled
5,939,019 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,970,387 UART: [rt]cmd =0x4d454153, len=108
5,991,170 >>> mbox cmd response data (12 bytes)
5,991,171 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,992,096 UART:
5,992,112 UART: Running Caliptra ROM ...
5,992,520 UART:
5,992,575 UART: [state] CFI Enabled
5,995,063 UART: [state] LifecycleState = Unprovisioned
5,995,718 UART: [state] DebugLocked = No
5,996,232 UART: [state] WD Timer not started. Device not locked for debugging
5,997,344 UART: [kat] SHA2-256
6,800,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,805,023 UART: [kat] ++
6,805,175 UART: [kat] sha1
6,809,275 UART: [kat] SHA2-256
6,811,215 UART: [kat] SHA2-384
6,813,770 UART: [kat] SHA2-512-ACC
6,815,670 UART: [kat] ECC-384
6,825,301 UART: [kat] HMAC-384Kdf
6,829,909 UART: [kat] LMS
7,078,221 UART: [kat] --
7,079,043 UART: [update-reset] ++
7,981,302 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,982,373 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,078,383 >>> mbox cmd response: success
8,078,383 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,078,688 UART: [update-reset] Copying MAN_2 To MAN_1
8,086,702 UART: [update-reset Success] --
8,087,561 UART: [state] Locking Datavault
8,088,529 UART: [state] Locking PCR0, PCR1 and PCR31
8,089,133 UART: [state] Locking ICCM
8,089,805 UART: [exit] Launching FMC @ 0x40000130
8,095,134 UART:
8,095,150 UART: Running Caliptra FMC ...
8,095,558 UART:
8,095,612 UART: [state] CFI Enabled
8,185,167 UART: [art] Extend RT PCRs Done
8,185,595 UART: [art] Lock RT PCRs Done
8,186,974 UART: [art] Populate DV Done
8,195,191 UART: [fht] FMC Alias Private Key: 7
8,196,253 UART: [art] Derive CDI
8,196,533 UART: [art] Store in in slot 0x4
8,281,880 UART: [art] Derive Key Pair
8,282,240 UART: [art] Store priv key in slot 0x5
8,295,474 UART: [art] Derive Key Pair - Done
8,310,296 UART: [art] Signing Cert with AUTHO
8,310,776 UART: RITY.KEYID = 7
8,325,770 UART: [art] Erasing AUTHORITY.KEYID = 7
8,326,535 UART: [art] PUB.X = D4E41EEF1F994678B49C1500C9A637C455C6AF4315FAE579E571DA64380842CD5DF614D7140301C275A9C70E1BF7E983
8,333,273 UART: [art] PUB.Y = 78634795BFE54436B35FEA75872029699E212F84FEDFA5CDF487C5BA0E162E5BC63F7A6CC77D7C5A14FE4AFAC44A2001
8,340,231 UART: [art] SIG.R = 69D0FD2021DDDA45EADDE39969BB4A5C0921F1EE5F9EAE05ED393CED4FBEB2FF52E40AD19A83CCD4A3FF7BBAD73A5B59
8,347,030 UART: [art] SIG.S = D8FD56D718F1BD6253C1E681936E49150C45CBC0AEC3840285B38F26D839B473009A857261A04E51BA20043FCD727210
8,370,560 UART: mbox::rt_entry...
8,370,932 UART: ____ _ _ _ ____ _____
8,371,716 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,372,516 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,373,284 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,374,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,374,820 UART: |_|
8,375,132 UART:
8,655,112 UART: [rt] Runtime listening for mailbox commands...
8,656,076 UART:
8,656,092 UART: Running Caliptra ROM ...
8,656,500 UART:
8,656,555 UART: [state] CFI Enabled
8,659,383 UART: [state] LifecycleState = Unprovisioned
8,660,038 UART: [state] DebugLocked = No
8,660,702 UART: [state] WD Timer not started. Device not locked for debugging
8,661,884 UART: [kat] SHA2-256
9,465,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,469,563 UART: [kat] ++
9,469,715 UART: [kat] sha1
9,473,843 UART: [kat] SHA2-256
9,475,783 UART: [kat] SHA2-384
9,478,448 UART: [kat] SHA2-512-ACC
9,480,348 UART: [kat] ECC-384
9,489,723 UART: [kat] HMAC-384Kdf
9,494,253 UART: [kat] LMS
9,742,565 UART: [kat] --
9,743,553 UART: [update-reset] ++
10,644,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,645,451 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
10,741,461 >>> mbox cmd response: success
10,741,461 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,741,670 UART: [update-reset] Copying MAN_2 To MAN_1
10,749,684 UART: [update-reset Success] --
10,750,793 UART: [state] Locking Datavault
10,751,771 UART: [state] Locking PCR0, PCR1 and PCR31
10,752,375 UART: [state] Locking ICCM
10,753,025 UART: [exit] Launching FMC @ 0x40000130
10,758,354 UART:
10,758,370 UART: Running Caliptra FMC ...
10,758,778 UART:
10,758,832 UART: [state] CFI Enabled
10,848,177 UART: [art] Extend RT PCRs Done
10,848,605 UART: [art] Lock RT PCRs Done
10,849,866 UART: [art] Populate DV Done
10,858,355 UART: [fht] FMC Alias Private Key: 7
10,859,397 UART: [art] Derive CDI
10,859,677 UART: [art] Store in in slot 0x4
10,945,272 UART: [art] Derive Key Pair
10,945,632 UART: [art] Store priv key in slot 0x5
10,959,032 UART: [art] Derive Key Pair - Done
10,973,788 UART: [art] Signing Cert with AUTHO
10,974,268 UART: RITY.KEYID = 7
10,989,610 UART: [art] Erasing AUTHORITY.KEYID = 7
10,990,375 UART: [art] PUB.X = 2E81672E906B574D75023F0B92C150826799103B60E90AD2BC39E4FC635CA14587EEA55976F4D745419C3B456AB8A599
10,997,130 UART: [art] PUB.Y = 5F34D1A9ABDA6596C77FAB21F07526A96472AD660DAC8B571E49BBAD0E240059A184ACE3240F88FA673CDD80FB7A129A
11,004,065 UART: [art] SIG.R = C5DB22C203EA04CEB936D731B97E5A4A801673A518C07C1B2ED652D8AD4293FF0F8ED2EBA0A135BD2D065AB93834F1C7
11,010,839 UART: [art] SIG.S = 3AA1D488477FA5020F5798105ABC8E7F215B5A55DCB572F13CDD1F1E2B533C5BC91A4E25D67AD9DFF993F468DA152179
11,034,834 UART: mbox::rt_entry...
11,035,206 UART: ____ _ _ _ ____ _____
11,035,990 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,036,790 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,037,558 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,038,326 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,039,094 UART: |_|
11,039,406 UART:
11,326,176 UART: [rt] Runtime listening for mailbox commands...
11,327,372 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,130 ready_for_fw is high
1,056,130 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,156,977 >>> mbox cmd response: success
2,156,977 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,219,759 UART:
2,219,775 UART: Running Caliptra FMC ...
2,220,183 UART:
2,220,237 UART: [state] CFI Enabled
2,230,862 UART: [fht] FMC Alias Private Key: 7
2,338,249 UART: [art] Extend RT PCRs Done
2,338,677 UART: [art] Lock RT PCRs Done
2,340,537 UART: [art] Populate DV Done
2,348,570 UART: [fht] FMC Alias Private Key: 7
2,349,746 UART: [art] Derive CDI
2,350,026 UART: [art] Store in in slot 0x4
2,436,147 UART: [art] Derive Key Pair
2,436,507 UART: [art] Store priv key in slot 0x5
2,450,079 UART: [art] Derive Key Pair - Done
2,465,309 UART: [art] Signing Cert with AUTHO
2,465,789 UART: RITY.KEYID = 7
2,480,895 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,660 UART: [art] PUB.X = 0A305E9EBED0F57209B592F5709D85A35EC64C0FEB0F1E6D6C58B04FCB656C88C1E31EEEFEC2B60A111EAD81682A9FDE
2,488,439 UART: [art] PUB.Y = 9994217DC9A069A5884E8C4D0363EB7F52C5A653CEB56758BD47E95DD6174326AB6F763BD5B310C121132D0F9D09B72D
2,495,382 UART: [art] SIG.R = 05DBBB44FC89D57FD3F38379563FCBB51EE39A9F7506ECEDB20AC6CB6348B850D19C17ED64267AACBB51E69253D2C8E4
2,502,163 UART: [art] SIG.S = 563624549251BC565D2F8A201E8EF4D563EC95BF7182EA7D383621712DB6D0BA34B56AEDF641CE43B7B165999970B022
2,526,238 UART: mbox::rt_entry...
2,526,610 UART: ____ _ _ _ ____ _____
2,527,394 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,194 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,962 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,730 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,498 UART: |_|
2,530,810 UART:
2,637,120 UART: [rt] Runtime listening for mailbox commands...
2,638,307 >>> mbox cmd response data (48 bytes)
2,638,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,066,905 >>> mbox cmd response: success
5,066,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,080,427 UART:
5,080,443 UART: Running Caliptra FMC ...
5,080,851 UART:
5,080,905 UART: [state] CFI Enabled
5,169,986 UART: [art] Extend RT PCRs Done
5,170,414 UART: [art] Lock RT PCRs Done
5,171,445 UART: [art] Populate DV Done
5,179,708 UART: [fht] FMC Alias Private Key: 7
5,180,808 UART: [art] Derive CDI
5,181,088 UART: [art] Store in in slot 0x4
5,266,575 UART: [art] Derive Key Pair
5,266,935 UART: [art] Store priv key in slot 0x5
5,279,393 UART: [art] Derive Key Pair - Done
5,294,200 UART: [art] Signing Cert with AUTHO
5,294,680 UART: RITY.KEYID = 7
5,309,840 UART: [art] Erasing AUTHORITY.KEYID = 7
5,310,605 UART: [art] PUB.X = FFD80A309221AD722B2EC4C5B57734E836F9B941DB498931626477AF95C42BDD88E10844F4AB24CC3B4637CDF0F4DD7F
5,317,379 UART: [art] PUB.Y = 5BE4FBF03DE80918BFBC4938B61804EE062F6247F04E9E082B79C5A88CBBE4DBBBF5E9A92AEF66FC2B9E977F563EF101
5,324,336 UART: [art] SIG.R = C83BE2DBC3845983C45E25F1F2AB4EF28F2ACA58B0F53212E54BC0EB45671F4BA5EC8932ED2D6B180C3CCA1248A705CC
5,331,120 UART: [art] SIG.S = 60BA3BD71367F55ECE9FFB4886232E3A85AD8C6F899284A265BBDB0B592F20E8E75BD4833B5D775D93C1D9317A7FBCB7
5,354,950 UART: Caliptra RT
5,355,203 UART: [state] CFI Enabled
5,637,456 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,668,640 UART: [rt]cmd =0x4d454153, len=108
5,689,975 >>> mbox cmd response data (12 bytes)
5,689,976 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,658,827 >>> mbox cmd response: success
7,658,827 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,672,501 UART:
7,672,517 UART: Running Caliptra FMC ...
7,672,925 UART:
7,672,979 UART: [state] CFI Enabled
7,762,030 UART: [art] Extend RT PCRs Done
7,762,458 UART: [art] Lock RT PCRs Done
7,763,731 UART: [art] Populate DV Done
7,772,074 UART: [fht] FMC Alias Private Key: 7
7,773,042 UART: [art] Derive CDI
7,773,322 UART: [art] Store in in slot 0x4
7,859,263 UART: [art] Derive Key Pair
7,859,623 UART: [art] Store priv key in slot 0x5
7,872,063 UART: [art] Derive Key Pair - Done
7,886,883 UART: [art] Signing Cert with AUTHO
7,887,363 UART: RITY.KEYID = 7
7,902,105 UART: [art] Erasing AUTHORITY.KEYID = 7
7,902,870 UART: [art] PUB.X = 262D53BCAAD923B2DF57E144C5C5A2354981961000AA377CC60C2DAE8B25D012E0484D3DB57D3BFE13E6FD537C05066B
7,909,619 UART: [art] PUB.Y = CFF861F428E4B9719A279C1774F082EF6926823C5EFC887AC9DD5EC0769D54863C563816D7FBE1D966CDDD0C76F996E4
7,916,574 UART: [art] SIG.R = 745A3FDDB1A8A597CFB70EADA670072DFA6D69BE96E1E15D6F5A5752E0C98A1787139C41A78CDE37E2F675D47B09CF3E
7,923,353 UART: [art] SIG.S = 95F17DBFED3A032992496AEE8DDEE80CB976F3E00A91B2AE0B0EF4C19BBBE0668AE6F39D044C4A2B20FB87140BBFED07
7,947,008 UART: mbox::rt_entry...
7,947,380 UART: ____ _ _ _ ____ _____
7,948,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,948,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,949,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,950,500 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,951,268 UART: |_|
7,951,580 UART:
8,233,736 UART: [rt] Runtime listening for mailbox commands...
10,202,212 >>> mbox cmd response: success
10,202,212 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,215,666 UART:
10,215,682 UART: Running Caliptra FMC ...
10,216,090 UART:
10,216,144 UART: [state] CFI Enabled
10,305,227 UART: [art] Extend RT PCRs Done
10,305,655 UART: [art] Lock RT PCRs Done
10,306,840 UART: [art] Populate DV Done
10,315,141 UART: [fht] FMC Alias Private Key: 7
10,316,311 UART: [art] Derive CDI
10,316,591 UART: [art] Store in in slot 0x4
10,402,146 UART: [art] Derive Key Pair
10,402,506 UART: [art] Store priv key in slot 0x5
10,415,450 UART: [art] Derive Key Pair - Done
10,430,093 UART: [art] Signing Cert with AUTHO
10,430,573 UART: RITY.KEYID = 7
10,445,311 UART: [art] Erasing AUTHORITY.KEYID = 7
10,446,076 UART: [art] PUB.X = 33F7B5A9DF2D22D708CC3DCC6A59BA2B9C58C3EF17FA0DEE4D3921600233DF47E29B1116610EC22414174CAD79AEB326
10,452,848 UART: [art] PUB.Y = 1DAE7C307CA47471A266E002DCF792D53AFBF1C1124278E45105198A62BB7F3C6975C14FB8A6F9A7BAEE72D18BEB5717
10,459,804 UART: [art] SIG.R = EE37466675B5F836497420F1F8E0457C10DF2FD2D8A49F3FA00806CB9B4F5267BD52D4B3C9BB8CBB042BB3B02557D3F1
10,466,575 UART: [art] SIG.S = 19EAD5DC8301F25C29F5813BEC66F4DABF97FFE59D2CD233141A99C922F066D3BB78000ED9B9FF6BD621792AC9F1960E
10,490,629 UART: mbox::rt_entry...
10,491,001 UART: ____ _ _ _ ____ _____
10,491,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,492,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,493,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,494,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,494,889 UART: |_|
10,495,201 UART:
10,775,011 UART: [rt] Runtime listening for mailbox commands...
10,776,207 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.45s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,281,773 UART: [fwproc] Recv'd Img size: 78456 bytes
2,168,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,292 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,307,266 >>> mbox cmd response: success
2,307,266 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,308,419 UART: [afmc] ++
2,308,587 UART: [afmc] CDI.KEYID = 6
2,308,950 UART: [afmc] SUBJECT.KEYID = 7
2,309,376 UART: [afmc] AUTHORITY.KEYID = 5
2,345,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,336 UART: [afmc] --
2,388,264 UART: [cold-reset] --
2,389,050 UART: [state] Locking Datavault
2,390,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,799 UART: [state] Locking ICCM
2,391,391 UART: [exit] Launching FMC @ 0x40000130
2,396,720 UART:
2,396,736 UART: Running Caliptra FMC ...
2,397,144 UART:
2,397,287 UART: [state] CFI Enabled
2,407,598 UART: [fht] FMC Alias Private Key: 7
2,515,495 UART: [art] Extend RT PCRs Done
2,515,923 UART: [art] Lock RT PCRs Done
2,517,373 UART: [art] Populate DV Done
2,525,482 UART: [fht] FMC Alias Private Key: 7
2,526,664 UART: [art] Derive CDI
2,526,944 UART: [art] Store in in slot 0x4
2,612,573 UART: [art] Derive Key Pair
2,612,933 UART: [art] Store priv key in slot 0x5
2,625,847 UART: [art] Derive Key Pair - Done
2,640,711 UART: [art] Signing Cert with AUTHO
2,641,191 UART: RITY.KEYID = 7
2,656,061 UART: [art] Erasing AUTHORITY.KEYID = 7
2,656,826 UART: [art] PUB.X = 37300B506109EFF173B20399646754C76A8D42285BB1E315F8ECA90B43AFCBA48643FD469533C35880BABBBBE2F717DF
2,663,590 UART: [art] PUB.Y = 6C9B6F9A14114C2FA4EC4A6FAD2B49EEB2EE07757DCD7AC569C0AC4F296A290863E033D62A5A5A19DE22BDF2F210B225
2,670,554 UART: [art] SIG.R = 4B037E2C7D50D8B8350B4B1A2DC4BB0AF1092AAF6AED8C7F8CD9D9D5DE5F9A0AFDA3C24EE83708246C377F9F866AF4CC
2,677,334 UART: [art] SIG.S = A94ECF432FAC118B4A0BCB4EFCBACE563E51C1122230BE248A5B4BC0027466E2613FED2AF49E4A830D3D75B02FE2D95F
2,700,988 UART: mbox::rt_entry...
2,701,360 UART: ____ _ _ _ ____ _____
2,702,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,702,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,703,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,704,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,705,248 UART: |_|
2,705,560 UART:
2,811,540 UART: [rt] Runtime listening for mailbox commands...
2,812,727 >>> mbox cmd response data (48 bytes)
2,812,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,812,839 UART:
2,812,855 UART: Running Caliptra ROM ...
2,813,263 UART:
2,813,405 UART: [state] CFI Enabled
2,816,221 UART: [state] LifecycleState = Unprovisioned
2,816,876 UART: [state] DebugLocked = No
2,817,526 UART: [state] WD Timer not started. Device not locked for debugging
2,818,672 UART: [kat] SHA2-256
3,622,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,626,351 UART: [kat] ++
3,626,503 UART: [kat] sha1
3,630,647 UART: [kat] SHA2-256
3,632,587 UART: [kat] SHA2-384
3,635,168 UART: [kat] SHA2-512-ACC
3,637,068 UART: [kat] ECC-384
3,646,739 UART: [kat] HMAC-384Kdf
3,651,285 UART: [kat] LMS
3,899,597 UART: [kat] --
3,900,385 UART: [update-reset] ++
5,208,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,209,715 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,359,167 >>> mbox cmd response: success
5,359,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,359,344 UART: [update-reset] Copying MAN_2 To MAN_1
5,367,358 UART: [update-reset Success] --
5,368,573 UART: [state] Locking Datavault
5,369,411 UART: [state] Locking PCR0, PCR1 and PCR31
5,370,015 UART: [state] Locking ICCM
5,370,629 UART: [exit] Launching FMC @ 0x40000130
5,375,958 UART:
5,375,974 UART: Running Caliptra FMC ...
5,376,382 UART:
5,376,525 UART: [state] CFI Enabled
5,466,092 UART: [art] Extend RT PCRs Done
5,466,520 UART: [art] Lock RT PCRs Done
5,467,645 UART: [art] Populate DV Done
5,475,772 UART: [fht] FMC Alias Private Key: 7
5,476,866 UART: [art] Derive CDI
5,477,146 UART: [art] Store in in slot 0x4
5,562,807 UART: [art] Derive Key Pair
5,563,167 UART: [art] Store priv key in slot 0x5
5,576,905 UART: [art] Derive Key Pair - Done
5,592,043 UART: [art] Signing Cert with AUTHO
5,592,523 UART: RITY.KEYID = 7
5,607,727 UART: [art] Erasing AUTHORITY.KEYID = 7
5,608,492 UART: [art] PUB.X = E26472B81CFAF446BCE319FA5E37327390E56FA318A840EA2BEAFD32062A1C85F65C6817C85DE55888E3BAEEB651FA26
5,615,273 UART: [art] PUB.Y = E137F19D690AEF35A716B3DEE8466C790201F42BF12F33D40247F4E0953F2178A4C8C7A8C5E1794C00C6B0B243E8EE1A
5,622,195 UART: [art] SIG.R = A1ED17AFCDEBBB98256B3CB151436843B5F4E8A2B949CDD35B0627AF32343BEED2DB4C17588CE825503B8E79F1E9BEDA
5,628,984 UART: [art] SIG.S = E721357FB1BFD9625F237D5784455F928EB75E1BF2C7CF2C44C71DE9357A0075BEE612524A60B2BA6FA75D8BC1C9C416
5,652,623 UART: Caliptra RT
5,652,968 UART: [state] CFI Enabled
5,933,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,964,364 UART: [rt]cmd =0x4d454153, len=108
5,984,925 >>> mbox cmd response data (12 bytes)
5,984,926 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,985,701 UART:
5,985,717 UART: Running Caliptra ROM ...
5,986,125 UART:
5,986,267 UART: [state] CFI Enabled
5,989,147 UART: [state] LifecycleState = Unprovisioned
5,989,802 UART: [state] DebugLocked = No
5,990,454 UART: [state] WD Timer not started. Device not locked for debugging
5,991,620 UART: [kat] SHA2-256
6,795,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,799,299 UART: [kat] ++
6,799,451 UART: [kat] sha1
6,803,605 UART: [kat] SHA2-256
6,805,545 UART: [kat] SHA2-384
6,808,278 UART: [kat] SHA2-512-ACC
6,810,178 UART: [kat] ECC-384
6,820,431 UART: [kat] HMAC-384Kdf
6,824,955 UART: [kat] LMS
7,073,267 UART: [kat] --
7,074,157 UART: [update-reset] ++
7,977,150 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,978,131 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,074,141 >>> mbox cmd response: success
8,074,141 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,074,438 UART: [update-reset] Copying MAN_2 To MAN_1
8,082,452 UART: [update-reset Success] --
8,083,251 UART: [state] Locking Datavault
8,084,123 UART: [state] Locking PCR0, PCR1 and PCR31
8,084,727 UART: [state] Locking ICCM
8,085,285 UART: [exit] Launching FMC @ 0x40000130
8,090,614 UART:
8,090,630 UART: Running Caliptra FMC ...
8,091,038 UART:
8,091,181 UART: [state] CFI Enabled
8,180,396 UART: [art] Extend RT PCRs Done
8,180,824 UART: [art] Lock RT PCRs Done
8,182,117 UART: [art] Populate DV Done
8,190,354 UART: [fht] FMC Alias Private Key: 7
8,191,304 UART: [art] Derive CDI
8,191,584 UART: [art] Store in in slot 0x4
8,277,153 UART: [art] Derive Key Pair
8,277,513 UART: [art] Store priv key in slot 0x5
8,291,369 UART: [art] Derive Key Pair - Done
8,306,302 UART: [art] Signing Cert with AUTHO
8,306,782 UART: RITY.KEYID = 7
8,321,962 UART: [art] Erasing AUTHORITY.KEYID = 7
8,322,727 UART: [art] PUB.X = 67E05BBEFC615120E9391D0F6FFE170C1CC185E8582779BEB0E18CA7230B6FBF54009947E5C4644F935427C520363CE5
8,329,468 UART: [art] PUB.Y = DCF9146BDCD9EB074672C4E65C289DF0D717E2A2AE69A398789FFCDCF2F935E3804E9DB7FDBB787EF43E89C4DE484774
8,336,435 UART: [art] SIG.R = A685677D2BE295505AAA6E721CF2DFBC65C0316A27D0BE4503E6862799ABA829B629FC0669184AFD07BF63F162D0DAF8
8,343,206 UART: [art] SIG.S = C7E36928F01608DADA7554D7B818715AADAC2B98729D3C4062EE1EBCF35D4C77EDF14D1BD0AACEEB87D1C427E3F29BA7
8,367,096 UART: mbox::rt_entry...
8,367,468 UART: ____ _ _ _ ____ _____
8,368,252 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,369,052 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,369,820 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,370,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,371,356 UART: |_|
8,371,668 UART:
8,650,245 UART: [rt] Runtime listening for mailbox commands...
8,651,209 UART:
8,651,225 UART: Running Caliptra ROM ...
8,651,633 UART:
8,651,775 UART: [state] CFI Enabled
8,654,237 UART: [state] LifecycleState = Unprovisioned
8,654,892 UART: [state] DebugLocked = No
8,655,500 UART: [state] WD Timer not started. Device not locked for debugging
8,656,750 UART: [kat] SHA2-256
9,460,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,464,429 UART: [kat] ++
9,464,581 UART: [kat] sha1
9,468,829 UART: [kat] SHA2-256
9,470,769 UART: [kat] SHA2-384
9,473,658 UART: [kat] SHA2-512-ACC
9,475,558 UART: [kat] ECC-384
9,484,879 UART: [kat] HMAC-384Kdf
9,489,509 UART: [kat] LMS
9,737,821 UART: [kat] --
9,738,769 UART: [update-reset] ++
10,639,118 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,640,297 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
10,736,307 >>> mbox cmd response: success
10,736,307 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,736,552 UART: [update-reset] Copying MAN_2 To MAN_1
10,744,566 UART: [update-reset Success] --
10,745,651 UART: [state] Locking Datavault
10,746,593 UART: [state] Locking PCR0, PCR1 and PCR31
10,747,197 UART: [state] Locking ICCM
10,747,717 UART: [exit] Launching FMC @ 0x40000130
10,753,046 UART:
10,753,062 UART: Running Caliptra FMC ...
10,753,470 UART:
10,753,613 UART: [state] CFI Enabled
10,843,240 UART: [art] Extend RT PCRs Done
10,843,668 UART: [art] Lock RT PCRs Done
10,845,121 UART: [art] Populate DV Done
10,853,344 UART: [fht] FMC Alias Private Key: 7
10,854,478 UART: [art] Derive CDI
10,854,758 UART: [art] Store in in slot 0x4
10,940,307 UART: [art] Derive Key Pair
10,940,667 UART: [art] Store priv key in slot 0x5
10,953,669 UART: [art] Derive Key Pair - Done
10,968,128 UART: [art] Signing Cert with AUTHO
10,968,608 UART: RITY.KEYID = 7
10,984,246 UART: [art] Erasing AUTHORITY.KEYID = 7
10,985,011 UART: [art] PUB.X = E73F27DEEA3C7231862C423E31C1CBB5B4CE123F86B3D70052462118B56EA9768242BEA2D5BFA3315D75887067F4B4BB
10,991,765 UART: [art] PUB.Y = 94A12703290D4F7C747B423BF0ED948CEC19CEC3A6750BE7BDBCAD1D44710842A4CD45A77A4A2B81076577C412BA8393
10,998,708 UART: [art] SIG.R = 0731B355F329A1E66D283D3880A7D1D8A216B5D9E3CA7E43F28F6605F307F1C15E4CAEB7F22F7BDBDE5E26277355A0F6
11,005,479 UART: [art] SIG.S = 1863F6E85A97C5FC463D56E6C52B2FE6DE0F4BDACF4859D55022D4ACB4EA3FE12D75511AD160913CEBEB41B596071AC0
11,029,038 UART: mbox::rt_entry...
11,029,410 UART: ____ _ _ _ ____ _____
11,030,194 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,030,994 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,031,762 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,032,530 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,033,298 UART: |_|
11,033,610 UART:
11,313,352 UART: [rt] Runtime listening for mailbox commands...
11,314,548 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,477 ready_for_fw is high
1,056,477 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,156,926 >>> mbox cmd response: success
2,156,926 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,219,510 UART:
2,219,526 UART: Running Caliptra FMC ...
2,219,934 UART:
2,220,077 UART: [state] CFI Enabled
2,230,538 UART: [fht] FMC Alias Private Key: 7
2,338,797 UART: [art] Extend RT PCRs Done
2,339,225 UART: [art] Lock RT PCRs Done
2,340,897 UART: [art] Populate DV Done
2,349,004 UART: [fht] FMC Alias Private Key: 7
2,350,158 UART: [art] Derive CDI
2,350,438 UART: [art] Store in in slot 0x4
2,436,257 UART: [art] Derive Key Pair
2,436,617 UART: [art] Store priv key in slot 0x5
2,450,223 UART: [art] Derive Key Pair - Done
2,465,173 UART: [art] Signing Cert with AUTHO
2,465,653 UART: RITY.KEYID = 7
2,480,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,378 UART: [art] PUB.X = 3403BA06C017A94EABD398CE04DDC3E95D70CB48EBF831E3CA902EF56DC254B0445B712111004D4FCBD213589043E30A
2,488,124 UART: [art] PUB.Y = D450766E01E3D3ECA6D8649FD9478FE095E10A656F04E1C62D88F8D53D1ECABF7068368185E04168A85D7B2FA50923B0
2,495,066 UART: [art] SIG.R = ADC9ABD5A360E30CBF567FE760C7B0E5BF3CDF89470F62EB3179893053FCB188840425761CDDF94ADA45A730F65394B0
2,501,839 UART: [art] SIG.S = D365CE7E59200541DFA465BEAD885BA7116580188A2EC5716D365F529B9AA247C6A589E3B28AD281A641AAB82574FAAD
2,524,365 UART: mbox::rt_entry...
2,524,737 UART: ____ _ _ _ ____ _____
2,525,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,321 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,625 UART: |_|
2,528,937 UART:
2,635,910 UART: [rt] Runtime listening for mailbox commands...
2,637,097 >>> mbox cmd response data (48 bytes)
2,637,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,066,906 >>> mbox cmd response: success
5,066,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,080,620 UART:
5,080,636 UART: Running Caliptra FMC ...
5,081,044 UART:
5,081,187 UART: [state] CFI Enabled
5,170,142 UART: [art] Extend RT PCRs Done
5,170,570 UART: [art] Lock RT PCRs Done
5,171,743 UART: [art] Populate DV Done
5,180,080 UART: [fht] FMC Alias Private Key: 7
5,181,034 UART: [art] Derive CDI
5,181,314 UART: [art] Store in in slot 0x4
5,266,433 UART: [art] Derive Key Pair
5,266,793 UART: [art] Store priv key in slot 0x5
5,280,075 UART: [art] Derive Key Pair - Done
5,294,717 UART: [art] Signing Cert with AUTHO
5,295,197 UART: RITY.KEYID = 7
5,310,115 UART: [art] Erasing AUTHORITY.KEYID = 7
5,310,880 UART: [art] PUB.X = 08AB478189FFE7651BF418E544D1384E35AD9A502F847A7BDBC7773AD032F3836D21F0868DACA5EFA652142D73BFC780
5,317,655 UART: [art] PUB.Y = AD16FD314ED32FE37B448C869DEECBFB30560D2F573F312F6C8D9BB1F4FF4DFD5B733DE3F3819945D9EBE8607954F117
5,324,620 UART: [art] SIG.R = CCD99EA67EF1CC0AB719866589EA9B07D23B61642099F2AE675627BDD7DB9966AE5FCAF73E58A495841BD769E2D742FC
5,331,398 UART: [art] SIG.S = 12F8E6A9E65D58F1AE920E3FD68E7C37373A294D63F0D89E4DC8C2178C2EF587D12EDF581EEAFF2AAF85D297FC2C8C8D
5,355,314 UART: Caliptra RT
5,355,659 UART: [state] CFI Enabled
5,638,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,669,312 UART: [rt]cmd =0x4d454153, len=108
5,689,463 >>> mbox cmd response data (12 bytes)
5,689,464 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,658,526 >>> mbox cmd response: success
7,658,526 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,672,192 UART:
7,672,208 UART: Running Caliptra FMC ...
7,672,616 UART:
7,672,759 UART: [state] CFI Enabled
7,762,174 UART: [art] Extend RT PCRs Done
7,762,602 UART: [art] Lock RT PCRs Done
7,764,001 UART: [art] Populate DV Done
7,772,180 UART: [fht] FMC Alias Private Key: 7
7,773,336 UART: [art] Derive CDI
7,773,616 UART: [art] Store in in slot 0x4
7,859,193 UART: [art] Derive Key Pair
7,859,553 UART: [art] Store priv key in slot 0x5
7,872,959 UART: [art] Derive Key Pair - Done
7,887,365 UART: [art] Signing Cert with AUTHO
7,887,845 UART: RITY.KEYID = 7
7,903,229 UART: [art] Erasing AUTHORITY.KEYID = 7
7,903,994 UART: [art] PUB.X = 4873B7463BDBFA878527259AB017909BC5FB327BB343479ACD0EB87DDB7041CB7492263364AF89309C03205F5CD5A611
7,910,758 UART: [art] PUB.Y = A5D32B0C2CCF804C36C125DBD005BD84D2C49BE5E27D81E11F6FD74DCBD4F36895E792D2F18CD9544C2327178C468460
7,917,712 UART: [art] SIG.R = 085E75AEFA043AAD34CC722F0535C3906E425E973094FD627AF95A79B3CCC6BACE1703A13A455B4EB4190A81168678F6
7,924,473 UART: [art] SIG.S = D57D0A0638EB3875E0573B5FCEC318658C84C7F7110AAD3EC9735E7F10C308C5C766678027B5F9F7CE456EE97107F3C7
7,948,041 UART: mbox::rt_entry...
7,948,413 UART: ____ _ _ _ ____ _____
7,949,197 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,949,997 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,950,765 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,951,533 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,952,301 UART: |_|
7,952,613 UART:
8,232,867 UART: [rt] Runtime listening for mailbox commands...
10,201,284 >>> mbox cmd response: success
10,201,284 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,214,334 UART:
10,214,350 UART: Running Caliptra FMC ...
10,214,758 UART:
10,214,901 UART: [state] CFI Enabled
10,304,010 UART: [art] Extend RT PCRs Done
10,304,438 UART: [art] Lock RT PCRs Done
10,305,475 UART: [art] Populate DV Done
10,313,600 UART: [fht] FMC Alias Private Key: 7
10,314,726 UART: [art] Derive CDI
10,315,006 UART: [art] Store in in slot 0x4
10,401,263 UART: [art] Derive Key Pair
10,401,623 UART: [art] Store priv key in slot 0x5
10,415,521 UART: [art] Derive Key Pair - Done
10,430,226 UART: [art] Signing Cert with AUTHO
10,430,706 UART: RITY.KEYID = 7
10,446,280 UART: [art] Erasing AUTHORITY.KEYID = 7
10,447,045 UART: [art] PUB.X = 29DA827ED238199FC2A08AEDC85C241AA3F838E544DF7777F08813271E5DE9866813072D2A8EEEBB2357BBDFD34C3B16
10,453,822 UART: [art] PUB.Y = 12A570F696BD8057AA7DC953805A505494709AB1694D86BB76F41D3439CC23F48D55F6A687AFBD5BC8FD6E2617897E23
10,460,774 UART: [art] SIG.R = B7AF3EEDF065F0D89B70A27E66F881D6233A0AE6656F47B303626BA259B8B0D14617EEB252B303E69F640E05641D9779
10,467,531 UART: [art] SIG.S = 6BBF1B79AB3CE9F85FDEFAB006CF9FF3C7B25666EE8C5FB4FB4549DB9C06C4DDC6130811B7D01CB4B6833EB7BC0BE53E
10,491,252 UART: mbox::rt_entry...
10,491,624 UART: ____ _ _ _ ____ _____
10,492,408 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,493,208 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,493,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,494,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,495,512 UART: |_|
10,495,824 UART:
10,776,316 UART: [rt] Runtime listening for mailbox commands...
10,777,512 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,237 UART:
192,598 UART: Running Caliptra ROM ...
193,784 UART:
193,943 UART: [state] CFI Enabled
262,267 UART: [state] LifecycleState = Unprovisioned
264,256 UART: [state] DebugLocked = No
266,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,781 UART: [kat] SHA2-256
440,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,968 UART: [kat] ++
451,487 UART: [kat] sha1
462,146 UART: [kat] SHA2-256
464,862 UART: [kat] SHA2-384
470,919 UART: [kat] SHA2-512-ACC
473,292 UART: [kat] ECC-384
2,766,186 UART: [kat] HMAC-384Kdf
2,797,835 UART: [kat] LMS
3,988,155 UART: [kat] --
3,993,715 UART: [cold-reset] ++
3,994,938 UART: [fht] Storing FHT @ 0x50003400
4,006,977 UART: [idev] ++
4,007,559 UART: [idev] CDI.KEYID = 6
4,008,476 UART: [idev] SUBJECT.KEYID = 7
4,009,728 UART: [idev] UDS.KEYID = 0
4,010,733 ready_for_fw is high
4,010,931 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,289 UART: [idev] Erasing UDS.KEYID = 0
7,342,379 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,649 UART: [idev] --
7,366,369 UART: [ldev] ++
7,366,951 UART: [ldev] CDI.KEYID = 6
7,367,929 UART: [ldev] SUBJECT.KEYID = 5
7,369,091 UART: [ldev] AUTHORITY.KEYID = 7
7,370,385 UART: [ldev] FE.KEYID = 1
7,398,700 UART: [ldev] Erasing FE.KEYID = 1
10,734,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,861 UART: [ldev] --
13,114,020 UART: [fwproc] Waiting for Commands...
13,116,599 UART: [fwproc] Received command 0x46574c44
13,118,815 UART: [fwproc] Received Image of size 113760 bytes
17,168,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,783 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,142 >>> mbox cmd response: success
17,631,293 UART: [afmc] ++
17,631,894 UART: [afmc] CDI.KEYID = 6
17,632,804 UART: [afmc] SUBJECT.KEYID = 7
17,634,023 UART: [afmc] AUTHORITY.KEYID = 5
21,002,029 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,301,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,303,415 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,834 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,640 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,347,085 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,367,449 UART: [afmc] --
23,371,860 UART: [cold-reset] --
23,376,325 UART: [state] Locking Datavault
23,382,866 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,623 UART: [state] Locking ICCM
23,386,989 UART: [exit] Launching FMC @ 0x40000130
23,395,389 UART:
23,395,633 UART: Running Caliptra FMC ...
23,396,735 UART:
23,396,896 UART: [state] CFI Enabled
23,460,265 UART: [fht] FMC Alias Private Key: 7
25,798,148 UART: [art] Extend RT PCRs Done
25,799,399 UART: [art] Lock RT PCRs Done
25,801,245 UART: [art] Populate DV Done
25,806,514 UART: [fht] FMC Alias Private Key: 7
25,808,172 UART: [art] Derive CDI
25,808,987 UART: [art] Store in in slot 0x4
25,868,949 UART: [art] Derive Key Pair
25,869,988 UART: [art] Store priv key in slot 0x5
29,162,852 UART: [art] Derive Key Pair - Done
29,175,690 UART: [art] Signing Cert with AUTHO
29,176,990 UART: RITY.KEYID = 7
31,463,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,526 UART: [art] PUB.X = 6AF519FDD41F9937194A8F126A3407F50D8BF2C556ACE80FD06B4D7A616625FB700AF36FE2602300474ED085F22D76AA
31,472,670 UART: [art] PUB.Y = 99E93C406D407440309C921D32D7B4BE1A12851116EF3AA415AE70D847AF2000C531EFABBADA1934983C65CE430A41D0
31,479,902 UART: [art] SIG.R = 03087F0A8A4FB80F2A6FDAE3EA9E30C9222BF8D64AE03C41286B842CE73930FB2739C3555ED005248351E2E4C0D6F6CB
31,487,301 UART: [art] SIG.S = 93CB2CA2133B9A72B332A3847394E995F55ADED77CB238F2AB438D9F74FA09E3A42AAE0869921828DD0A32CEA9865F24
32,792,696 UART: Caliptra RT
32,793,400 UART: [state] CFI Enabled
32,955,854 UART: [rt] RT listening for mailbox commands...
32,957,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,989,082 UART: [rt]cmd =0x4d454153, len=108
33,007,713 >>> mbox cmd response data (12 bytes)
35,059,807 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,160,041 UART:
35,160,414 UART: Running Caliptra ROM ...
35,161,547 UART:
35,161,735 UART: [state] CFI Enabled
35,220,251 UART: [state] LifecycleState = Unprovisioned
35,222,179 UART: [state] DebugLocked = No
35,223,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,228,783 UART: [kat] SHA2-256
35,398,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,408,999 UART: [kat] ++
35,409,499 UART: [kat] sha1
35,421,469 UART: [kat] SHA2-256
35,424,162 UART: [kat] SHA2-384
35,430,306 UART: [kat] SHA2-512-ACC
35,432,715 UART: [kat] ECC-384
37,722,001 UART: [kat] HMAC-384Kdf
37,753,836 UART: [kat] LMS
38,944,218 UART: [kat] --
38,948,104 UART: [update-reset] ++
42,659,401 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,662,862 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,920,406 >>> mbox cmd response: success
42,920,764 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,922,403 UART: [update-reset] Copying MAN_2 To MAN_1
42,944,802 UART: [update-reset Success] --
42,950,280 UART: [state] Locking Datavault
42,954,720 UART: [state] Locking PCR0, PCR1 and PCR31
42,956,571 UART: [state] Locking ICCM
42,958,704 UART: [exit] Launching FMC @ 0x40000130
42,967,151 UART:
42,967,385 UART: Running Caliptra FMC ...
42,968,484 UART:
42,968,642 UART: [state] CFI Enabled
43,058,190 UART: [art] Extend RT PCRs Done
43,059,379 UART: [art] Lock RT PCRs Done
43,060,782 UART: [art] Populate DV Done
43,066,187 UART: [fht] FMC Alias Private Key: 7
43,067,747 UART: [art] Derive CDI
43,068,568 UART: [art] Store in in slot 0x4
43,127,263 UART: [art] Derive Key Pair
43,128,318 UART: [art] Store priv key in slot 0x5
46,421,016 UART: [art] Derive Key Pair - Done
46,433,963 UART: [art] Signing Cert with AUTHO
46,435,258 UART: RITY.KEYID = 7
48,723,433 UART: [art] Erasing AUTHORITY.KEYID = 7
48,724,946 UART: [art] PUB.X = BD2B87BC51B540D124F118021D3F896DF207A376E52E718903E1BFF0A4FCB50291973DF2F2484E529A1074810B060E63
48,732,136 UART: [art] PUB.Y = ABB9106BEAC85D6421D48072D41A0AA19353DFA81059F51C312D3B85376E6A320066B551AF9F4F1735499AC9FCC426E1
48,739,367 UART: [art] SIG.R = 7EB6BA69A2F0E3FF84BC6DD2295EE44896508F638C593CAC77664EC22609DB2D3F2EBD4D173DFF54C5CEE308B46232E8
48,746,766 UART: [art] SIG.S = 5F5744EE98F1DC176DB33888FC793DA029CB2412852B06B445BDCA279499F68E7B05FB9B70CDD0672F4076A9B8024074
50,051,501 UART: mbox::rt_entry...
50,052,473 UART: ____ _ _ _ ____ _____
50,054,407 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,056,422 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,058,280 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,060,208 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,062,260 UART: |_|
50,063,096 UART:
50,350,209 UART: [rt] Runtime listening for mailbox commands...
50,352,383 >>> mbox cmd response data (48 bytes)
50,352,958 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,355,274 >>> mbox cmd response data (48 bytes)
50,356,179 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,370,071 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,784,202 ready_for_fw is high
3,784,581 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,304 >>> mbox cmd response: success
23,539,462 UART:
23,539,855 UART: Running Caliptra FMC ...
23,541,058 UART:
23,541,236 UART: [state] CFI Enabled
23,606,083 UART: [fht] FMC Alias Private Key: 7
25,944,216 UART: [art] Extend RT PCRs Done
25,945,445 UART: [art] Lock RT PCRs Done
25,947,101 UART: [art] Populate DV Done
25,952,564 UART: [fht] FMC Alias Private Key: 7
25,954,104 UART: [art] Derive CDI
25,954,838 UART: [art] Store in in slot 0x4
26,014,449 UART: [art] Derive Key Pair
26,015,496 UART: [art] Store priv key in slot 0x5
29,308,287 UART: [art] Derive Key Pair - Done
29,321,444 UART: [art] Signing Cert with AUTHO
29,322,750 UART: RITY.KEYID = 7
31,608,955 UART: [art] Erasing AUTHORITY.KEYID = 7
31,610,460 UART: [art] PUB.X = 39C7E66ED40E329EB41490A0DDB6D59F322895B24A3CB379B2C8BE3670B1C048D8196BB49F6EB7F2BC88F6CC970290D9
31,617,671 UART: [art] PUB.Y = D4CBF02CA26639B71B1A977BB5536A1CA9119836D5CE92ED32FC4657D8C5F9CDCBFB3379E85368CA8D865DAD0E1ECA37
31,624,986 UART: [art] SIG.R = 5D473F7E4BEC5A0B34F3C1444DC5BEDA114580EC44B9ECDF20EF322F5558159645581F904180DA297A406346E088D6C7
31,632,331 UART: [art] SIG.S = 4CFD1704C0E9C574DCD9A8EDDC0178F51C4FD69CDCD2C85C0AA1311C267D4C4889D3A041C2001F6AD84771B066C6344E
32,937,701 UART: Caliptra RT
32,938,401 UART: [state] CFI Enabled
33,099,398 UART: [rt] RT listening for mailbox commands...
33,101,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,133,218 UART: [rt]cmd =0x4d454153, len=108
33,152,091 >>> mbox cmd response data (12 bytes)
35,204,371 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,177,315 >>> mbox cmd response: success
43,177,790 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,212,443 UART:
43,212,768 UART: Running Caliptra FMC ...
43,213,812 UART:
43,213,966 UART: [state] CFI Enabled
43,316,213 UART: [art] Extend RT PCRs Done
43,317,402 UART: [art] Lock RT PCRs Done
43,318,857 UART: [art] Populate DV Done
43,324,386 UART: [fht] FMC Alias Private Key: 7
43,325,924 UART: [art] Derive CDI
43,326,679 UART: [art] Store in in slot 0x4
43,385,592 UART: [art] Derive Key Pair
43,386,636 UART: [art] Store priv key in slot 0x5
46,679,309 UART: [art] Derive Key Pair - Done
46,692,412 UART: [art] Signing Cert with AUTHO
46,693,713 UART: RITY.KEYID = 7
48,980,462 UART: [art] Erasing AUTHORITY.KEYID = 7
48,981,980 UART: [art] PUB.X = ABC4A5C4C5D04FFFE723C14AB7B46D803DD9A8D30B89B55AE217A8689E39669714B5D37FAC3E6CC7E3EB068C64C01D4C
48,989,248 UART: [art] PUB.Y = BB9C6AD903A46E61A673124ABABAC6EF52CB9F91370D12FA750084254A053BF7089BD9D5014D5B4CEDBDBCE87719F9AC
48,996,483 UART: [art] SIG.R = BB39EE2AD61D5C58431124A56918627EFCAB07BBF32E09FB0879DBBB564E971CF6905E47AB8618C60746654B7019FE85
49,003,882 UART: [art] SIG.S = 599C9D4ECBF250C8A9D6B1E479929223DC0D0B1D6CE3142756A2997D347D6DA6D83CFA45B5B8FD1E8326497BF992D6D8
50,308,749 UART: mbox::rt_entry...
50,310,172 UART: ____ _ _ _ ____ _____
50,312,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,314,171 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,316,105 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,318,062 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,320,010 UART: |_|
50,320,825 UART:
50,602,101 UART: [rt] Runtime listening for mailbox commands...
50,604,254 >>> mbox cmd response data (48 bytes)
50,604,825 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,607,141 >>> mbox cmd response data (48 bytes)
50,608,036 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,621,971 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,746 writing to cptra_bootfsm_go
193,022 UART:
193,395 UART: Running Caliptra ROM ...
194,576 UART:
604,083 UART: [state] CFI Enabled
617,437 UART: [state] LifecycleState = Unprovisioned
619,339 UART: [state] DebugLocked = No
621,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,032 UART: [kat] SHA2-256
795,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,353 UART: [kat] ++
806,831 UART: [kat] sha1
817,204 UART: [kat] SHA2-256
819,929 UART: [kat] SHA2-384
825,722 UART: [kat] SHA2-512-ACC
828,090 UART: [kat] ECC-384
3,111,549 UART: [kat] HMAC-384Kdf
3,123,137 UART: [kat] LMS
4,313,272 UART: [kat] --
4,319,173 UART: [cold-reset] ++
4,321,525 UART: [fht] Storing FHT @ 0x50003400
4,333,065 UART: [idev] ++
4,333,621 UART: [idev] CDI.KEYID = 6
4,334,569 UART: [idev] SUBJECT.KEYID = 7
4,335,807 UART: [idev] UDS.KEYID = 0
4,336,755 ready_for_fw is high
4,336,943 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,158 UART: [idev] Erasing UDS.KEYID = 0
7,622,061 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,187 UART: [idev] --
7,648,976 UART: [ldev] ++
7,649,599 UART: [ldev] CDI.KEYID = 6
7,650,487 UART: [ldev] SUBJECT.KEYID = 5
7,651,743 UART: [ldev] AUTHORITY.KEYID = 7
7,652,967 UART: [ldev] FE.KEYID = 1
7,663,993 UART: [ldev] Erasing FE.KEYID = 1
10,951,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,776 UART: [ldev] --
13,310,896 UART: [fwproc] Waiting for Commands...
13,312,826 UART: [fwproc] Received command 0x46574c44
13,315,000 UART: [fwproc] Received Image of size 113760 bytes
17,353,329 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,536 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,393 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,816,848 >>> mbox cmd response: success
17,821,669 UART: [afmc] ++
17,822,270 UART: [afmc] CDI.KEYID = 6
17,823,191 UART: [afmc] SUBJECT.KEYID = 7
17,824,461 UART: [afmc] AUTHORITY.KEYID = 5
21,136,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,177 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,551 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,399 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,824 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,497,854 UART: [afmc] --
23,502,562 UART: [cold-reset] --
23,506,920 UART: [state] Locking Datavault
23,511,591 UART: [state] Locking PCR0, PCR1 and PCR31
23,513,288 UART: [state] Locking ICCM
23,515,363 UART: [exit] Launching FMC @ 0x40000130
23,523,701 UART:
23,523,930 UART: Running Caliptra FMC ...
23,524,963 UART:
23,525,105 UART: [state] CFI Enabled
23,533,628 UART: [fht] FMC Alias Private Key: 7
25,864,204 UART: [art] Extend RT PCRs Done
25,865,418 UART: [art] Lock RT PCRs Done
25,867,012 UART: [art] Populate DV Done
25,872,313 UART: [fht] FMC Alias Private Key: 7
25,874,011 UART: [art] Derive CDI
25,874,748 UART: [art] Store in in slot 0x4
25,917,448 UART: [art] Derive Key Pair
25,918,486 UART: [art] Store priv key in slot 0x5
29,160,591 UART: [art] Derive Key Pair - Done
29,173,589 UART: [art] Signing Cert with AUTHO
29,175,081 UART: RITY.KEYID = 7
31,454,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,748 UART: [art] PUB.X = FA8B8A431DA6D6749ABD30AE3310C499B86D083166E41C92AF4AD4BD7954398C831A155FF77C696241042BBE916423F5
31,463,020 UART: [art] PUB.Y = 396789CEBD19A7F7112CAD35A9DDDBCE543A848F4A2AB98CCB959B569CF828C3CEF586DA36EECD7569817B6FB3079932
31,470,279 UART: [art] SIG.R = 29308E4ACC136B487BAFD129F1E5F418E592DBCCC732A32E906ADCCD8B7F8047751A8D37F0E87E6F8AA3DD95A8C58E93
31,477,650 UART: [art] SIG.S = 79373C4AC7BC970FC14652EE6E5195907496D5384FDF0BED2BF244169C9B5095A17E1D1C2CA1EA0FC0478CDB26713C8D
32,782,997 UART: Caliptra RT
32,783,695 UART: [state] CFI Enabled
32,901,493 UART: [rt] RT listening for mailbox commands...
32,903,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,934,575 UART: [rt]cmd =0x4d454153, len=108
32,953,879 >>> mbox cmd response data (12 bytes)
35,005,979 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,106,503 UART:
35,106,864 UART: Running Caliptra ROM ...
35,107,998 UART:
35,108,165 UART: [state] CFI Enabled
35,122,211 UART: [state] LifecycleState = Unprovisioned
35,124,160 UART: [state] DebugLocked = No
35,126,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,131,952 UART: [kat] SHA2-256
35,301,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,312,213 UART: [kat] ++
35,312,713 UART: [kat] sha1
35,322,729 UART: [kat] SHA2-256
35,325,466 UART: [kat] SHA2-384
35,331,629 UART: [kat] SHA2-512-ACC
35,334,039 UART: [kat] ECC-384
37,618,133 UART: [kat] HMAC-384Kdf
37,631,281 UART: [kat] LMS
38,821,367 UART: [kat] --
38,826,991 UART: [update-reset] ++
42,527,923 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,531,446 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,789,046 >>> mbox cmd response: success
42,789,411 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,789,689 UART: [update-reset] Copying MAN_2 To MAN_1
42,811,733 UART: [update-reset Success] --
42,815,265 UART: [state] Locking Datavault
42,818,944 UART: [state] Locking PCR0, PCR1 and PCR31
42,820,650 UART: [state] Locking ICCM
42,823,065 UART: [exit] Launching FMC @ 0x40000130
42,831,480 UART:
42,831,721 UART: Running Caliptra FMC ...
42,832,821 UART:
42,832,969 UART: [state] CFI Enabled
42,877,089 UART: [art] Extend RT PCRs Done
42,878,280 UART: [art] Lock RT PCRs Done
42,879,678 UART: [art] Populate DV Done
42,885,135 UART: [fht] FMC Alias Private Key: 7
42,886,654 UART: [art] Derive CDI
42,887,414 UART: [art] Store in in slot 0x4
42,930,055 UART: [art] Derive Key Pair
42,931,055 UART: [art] Store priv key in slot 0x5
46,172,593 UART: [art] Derive Key Pair - Done
46,185,596 UART: [art] Signing Cert with AUTHO
46,186,893 UART: RITY.KEYID = 7
48,466,182 UART: [art] Erasing AUTHORITY.KEYID = 7
48,467,704 UART: [art] PUB.X = D3211E39BBD4A51CFC052D819F9F8C7BAC1649FE65A93A8BFE703DF4CC69799F54CEB4E276E801C3AF9FEB8A9F9B0809
48,474,985 UART: [art] PUB.Y = C60601DBE0FEE9AAB79010B7B513CB8550111496D35DEEA92E86A59BC2A74B2413F2DCA15FE4E427A04301AAF6B73733
48,482,235 UART: [art] SIG.R = 3D19D17AF3784071784B2C3A042860ECFF5C71C3C6EBAE0A25B5BB571A0E7EBEE648177079330824B640D6FD372052A9
48,489,598 UART: [art] SIG.S = 0CD2347F4E9C0E0846738A8D389245C3CE16232491D1E6EE28F0716188606E22EAE9791DE0FB90C0CD996B2BC1A3B90A
49,794,779 UART: mbox::rt_entry...
49,795,751 UART: ____ _ _ _ ____ _____
49,797,734 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,799,736 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,801,674 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,803,607 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,805,454 UART: |_|
49,806,341 UART:
50,088,835 UART: [rt] Runtime listening for mailbox commands...
50,091,010 >>> mbox cmd response data (48 bytes)
50,091,623 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,093,942 >>> mbox cmd response data (48 bytes)
50,094,840 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,108,737 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,769 writing to cptra_bootfsm_go
4,127,461 ready_for_fw is high
4,127,895 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,800 >>> mbox cmd response: success
23,716,963 UART:
23,717,367 UART: Running Caliptra FMC ...
23,718,501 UART:
23,718,660 UART: [state] CFI Enabled
23,726,397 UART: [fht] FMC Alias Private Key: 7
26,056,835 UART: [art] Extend RT PCRs Done
26,058,060 UART: [art] Lock RT PCRs Done
26,060,145 UART: [art] Populate DV Done
26,065,618 UART: [fht] FMC Alias Private Key: 7
26,067,272 UART: [art] Derive CDI
26,068,087 UART: [art] Store in in slot 0x4
26,110,527 UART: [art] Derive Key Pair
26,111,570 UART: [art] Store priv key in slot 0x5
29,353,563 UART: [art] Derive Key Pair - Done
29,366,345 UART: [art] Signing Cert with AUTHO
29,367,641 UART: RITY.KEYID = 7
31,647,161 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,666 UART: [art] PUB.X = 3C0A8F0C14D1E0802F4945684FBF2936182FAE7ABC24B0D3F0DB83BA88C98A2AD3E0FFDB22D1EBD26EA6C49DA52345B1
31,655,940 UART: [art] PUB.Y = C79C8A9FC7A0B9A099F2429A3A418EFEC833FDC59F374E32BC311EB533A45704CE257D00862A303C4E6DFB090D92408A
31,663,186 UART: [art] SIG.R = BFD1A91DD89CB4212148D30A429641C8AF2FC359306E5D0114482D09D92947809CEFED31245F6918E1218441222D645C
31,670,514 UART: [art] SIG.S = 79C1C972E87270278303968EA308DB7A0C1989654CF5D78ABEC841B6A38CE54D8CE6E9B9D539757152B3023708F8A3F7
32,975,908 UART: Caliptra RT
32,976,605 UART: [state] CFI Enabled
33,093,937 UART: [rt] RT listening for mailbox commands...
33,096,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,127,063 UART: [rt]cmd =0x4d454153, len=108
33,145,709 >>> mbox cmd response data (12 bytes)
35,205,248 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,097,281 >>> mbox cmd response: success
43,097,783 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,129,597 UART:
43,129,908 UART: Running Caliptra FMC ...
43,131,035 UART:
43,131,194 UART: [state] CFI Enabled
43,174,778 UART: [art] Extend RT PCRs Done
43,175,944 UART: [art] Lock RT PCRs Done
43,177,326 UART: [art] Populate DV Done
43,182,950 UART: [fht] FMC Alias Private Key: 7
43,184,537 UART: [art] Derive CDI
43,185,346 UART: [art] Store in in slot 0x4
43,228,217 UART: [art] Derive Key Pair
43,229,260 UART: [art] Store priv key in slot 0x5
46,471,195 UART: [art] Derive Key Pair - Done
46,484,045 UART: [art] Signing Cert with AUTHO
46,485,356 UART: RITY.KEYID = 7
48,764,708 UART: [art] Erasing AUTHORITY.KEYID = 7
48,766,219 UART: [art] PUB.X = CAFF1FBE0CA1F0BC1A016A6D25814E489CAD652F14C5BB07C33C7A93D8389D5689B8B0C48435A7F8D43CB9EA68747A3B
48,773,438 UART: [art] PUB.Y = 644128884C89F7874DADA7486827D3A77B71DEC24B78E5FB28E8F9432FA89223E3A768DA9BC4DCA10B1D4718007A983A
48,780,657 UART: [art] SIG.R = 8D35C7C3DAB6F3EBB8B872F26429EBB2EC46385CBAD5F8B102E9EF44C2DB9EB58BBBC8A7E8F38EFA6FA9DD450DBA8B70
48,788,094 UART: [art] SIG.S = 0FF32C3419040F064F05607CAA4FDD4E733711085F932B23AF751885294FFC2DCA10B5FF5146BFB4FE132C6C01B26715
50,092,586 UART: mbox::rt_entry...
50,093,581 UART: ____ _ _ _ ____ _____
50,095,575 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,097,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,099,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,101,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,103,315 UART: |_|
50,104,198 UART:
50,386,603 UART: [rt] Runtime listening for mailbox commands...
50,388,812 >>> mbox cmd response data (48 bytes)
50,389,438 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,391,777 >>> mbox cmd response data (48 bytes)
50,392,612 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,406,617 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,622 UART:
192,997 UART: Running Caliptra ROM ...
194,195 UART:
194,351 UART: [state] CFI Enabled
264,197 UART: [state] LifecycleState = Unprovisioned
266,058 UART: [state] DebugLocked = No
268,491 UART: [state] WD Timer not started. Device not locked for debugging
273,044 UART: [kat] SHA2-256
452,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,703 UART: [kat] ++
464,241 UART: [kat] sha1
474,480 UART: [kat] SHA2-256
477,476 UART: [kat] SHA2-384
484,236 UART: [kat] SHA2-512-ACC
487,184 UART: [kat] ECC-384
2,949,880 UART: [kat] HMAC-384Kdf
2,971,358 UART: [kat] LMS
3,500,807 UART: [kat] --
3,504,094 UART: [cold-reset] ++
3,505,168 UART: [fht] FHT @ 0x50003400
3,517,130 UART: [idev] ++
3,517,692 UART: [idev] CDI.KEYID = 6
3,518,574 UART: [idev] SUBJECT.KEYID = 7
3,519,820 UART: [idev] UDS.KEYID = 0
3,520,719 ready_for_fw is high
3,520,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,394 UART: [idev] Erasing UDS.KEYID = 0
6,028,141 UART: [idev] Sha1 KeyId Algorithm
6,052,128 UART: [idev] --
6,055,854 UART: [ldev] ++
6,056,448 UART: [ldev] CDI.KEYID = 6
6,057,368 UART: [ldev] SUBJECT.KEYID = 5
6,058,529 UART: [ldev] AUTHORITY.KEYID = 7
6,059,758 UART: [ldev] FE.KEYID = 1
6,099,677 UART: [ldev] Erasing FE.KEYID = 1
8,604,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,047 UART: [ldev] --
10,413,419 UART: [fwproc] Wait for Commands...
10,415,634 UART: [fwproc] Recv command 0x46574c44
10,417,731 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,276,950 >>> mbox cmd response: success
14,281,009 UART: [afmc] ++
14,281,613 UART: [afmc] CDI.KEYID = 6
14,282,522 UART: [afmc] SUBJECT.KEYID = 7
14,283,674 UART: [afmc] AUTHORITY.KEYID = 5
16,808,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,282 UART: [afmc] --
18,608,237 UART: [cold-reset] --
18,611,714 UART: [state] Locking Datavault
18,618,247 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,918 UART: [state] Locking ICCM
18,622,501 UART: [exit] Launching FMC @ 0x40000130
18,630,892 UART:
18,631,123 UART: Running Caliptra FMC ...
18,632,169 UART:
18,632,318 UART: [state] CFI Enabled
18,688,278 UART: [fht] FMC Alias Private Key: 7
20,452,456 UART: [art] Extend RT PCRs Done
20,453,675 UART: [art] Lock RT PCRs Done
20,455,187 UART: [art] Populate DV Done
20,460,590 UART: [fht] FMC Alias Private Key: 7
20,462,122 UART: [art] Derive CDI
20,462,931 UART: [art] Store in in slot 0x4
20,520,991 UART: [art] Derive Key Pair
20,522,020 UART: [art] Store priv key in slot 0x5
22,985,333 UART: [art] Derive Key Pair - Done
22,998,389 UART: [art] Signing Cert with AUTHO
22,999,697 UART: RITY.KEYID = 7
24,710,712 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,213 UART: [art] PUB.X = 9B4FFD0AB2F02885DD762CA3B04D95DCA8414EC2552D2EB55601B7143A4013F8570B1BBC7199587E635E4C675A37DC88
24,719,493 UART: [art] PUB.Y = 61BEAFC42027DA700D6C710E9CBC61D2F3BC517900653F2E815C33E6AD7D140C30E64C86365106B2BE0E96BB0D0310EC
24,726,752 UART: [art] SIG.R = 156D4115C383964307B3E771AD7F527A5DC9D70FD3C3B8CF26C5B04F48144AECAB195B123CCB6A7734945E564FED0381
24,734,119 UART: [art] SIG.S = 5077F5ED32604DB809183F6BEBC8004281F3CBE11080EB7ECE0986BF4802EBD44FD2E3DA9D380DA9709919D85C3277D7
25,713,377 UART: Caliptra RT
25,714,089 UART: [state] CFI Enabled
25,878,124 UART: [rt] RT listening for mailbox commands...
25,880,433 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,911,528 UART: [rt]cmd =0x4d454153, len=108
25,929,240 >>> mbox cmd response data (12 bytes)
27,982,496 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,082,693 UART:
28,083,056 UART: Running Caliptra ROM ...
28,084,107 UART:
28,084,259 UART: [state] CFI Enabled
28,137,453 UART: [state] LifecycleState = Unprovisioned
28,139,343 UART: [state] DebugLocked = No
28,141,404 UART: [state] WD Timer not started. Device not locked for debugging
28,144,880 UART: [kat] SHA2-256
28,323,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,335,606 UART: [kat] ++
28,336,065 UART: [kat] sha1
28,346,031 UART: [kat] SHA2-256
28,349,077 UART: [kat] SHA2-384
28,355,716 UART: [kat] SHA2-512-ACC
28,358,675 UART: [kat] ECC-384
30,805,325 UART: [kat] HMAC-384Kdf
30,827,485 UART: [kat] LMS
31,356,939 UART: [kat] --
31,361,025 UART: [update-reset] ++
34,346,346 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,349,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,606,667 >>> mbox cmd response: success
34,607,023 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,607,681 UART: [update-reset] Copying MAN_2 To MAN_1
34,630,011 UART: [update-reset Success] --
34,632,896 UART: [state] Locking Datavault
34,636,522 UART: [state] Locking PCR0, PCR1 and PCR31
34,638,166 UART: [state] Locking ICCM
34,639,271 UART: [exit] Launching FMC @ 0x40000130
34,647,669 UART:
34,647,920 UART: Running Caliptra FMC ...
34,649,018 UART:
34,649,176 UART: [state] CFI Enabled
34,742,774 UART: [art] Extend RT PCRs Done
34,743,949 UART: [art] Lock RT PCRs Done
34,745,512 UART: [art] Populate DV Done
34,751,119 UART: [fht] FMC Alias Private Key: 7
34,752,723 UART: [art] Derive CDI
34,753,539 UART: [art] Store in in slot 0x4
34,812,007 UART: [art] Derive Key Pair
34,813,007 UART: [art] Store priv key in slot 0x5
37,276,281 UART: [art] Derive Key Pair - Done
37,289,485 UART: [art] Signing Cert with AUTHO
37,290,784 UART: RITY.KEYID = 7
39,002,035 UART: [art] Erasing AUTHORITY.KEYID = 7
39,003,547 UART: [art] PUB.X = 35C75198BBF2341423F201F5AF2063271FF7B8CAF0FFB52A141B00716B69A85EB06E30B7BC595E18C18F7F7C6BFAE55E
39,010,781 UART: [art] PUB.Y = FFA7D4EEC65CDFAD5F0843367275D4B7492160DA00877544880630C37E39CFCBFBD7B2B6C25C5634200AEA61CEDBC825
39,018,050 UART: [art] SIG.R = 69317AE1DD14E3C6C1416BE0F167ECD3674E6E1F2F4A83ED23AF623D5DB427133D0CB145CABDD26053C1570A9B649F2D
39,025,442 UART: [art] SIG.S = 83E903C63B643AB9AEE60E406BD827B793789AB04ADD3168B843808F99567ACF2AD39558E7C8A961C61C569108FE8DEF
40,003,538 UART: mbox::rt_entry...
40,004,495 UART: ____ _ _ _ ____ _____
40,006,429 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,008,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,010,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,012,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,014,261 UART: |_|
40,015,071 UART:
40,297,674 UART: [rt] Runtime listening for mailbox commands...
40,299,808 >>> mbox cmd response data (48 bytes)
40,300,383 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,302,703 >>> mbox cmd response data (48 bytes)
40,303,596 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,317,444 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
3,358,237 ready_for_fw is high
3,358,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,056,840 >>> mbox cmd response: success
18,340,939 UART:
18,341,329 UART: Running Caliptra FMC ...
18,342,472 UART:
18,342,629 UART: [state] CFI Enabled
18,408,464 UART: [fht] FMC Alias Private Key: 7
20,173,102 UART: [art] Extend RT PCRs Done
20,174,320 UART: [art] Lock RT PCRs Done
20,176,000 UART: [art] Populate DV Done
20,181,360 UART: [fht] FMC Alias Private Key: 7
20,183,116 UART: [art] Derive CDI
20,183,927 UART: [art] Store in in slot 0x4
20,240,746 UART: [art] Derive Key Pair
20,241,778 UART: [art] Store priv key in slot 0x5
22,705,342 UART: [art] Derive Key Pair - Done
22,718,385 UART: [art] Signing Cert with AUTHO
22,719,718 UART: RITY.KEYID = 7
24,431,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,587 UART: [art] PUB.X = 4C627A4B51FF48D66075C2634382D2D886831297CCBFB0FAA6C970FD794289A2C6663FC50851CB9C34C68A53E7739C6B
24,439,859 UART: [art] PUB.Y = 20418A2D07410997C03C684CEFE615734CDB7AC7BFB20EB4C97161DAC618CA991888270B8E2E4E6687C0A928CCD3AA43
24,447,116 UART: [art] SIG.R = BE0588518F2B30C3A86BC1730715451E7EC41C6C52B333D86B05D767CC89C5CFEF9AA1CD10CCDC3D59EBC3356AECA78B
24,454,540 UART: [art] SIG.S = DF7219559869FE7537C06DBDA4625E43D471727C13B8D0F6CA975C3B40B94E4D31F5A0390CCDB9A3F2B42AB61567B624
25,433,119 UART: Caliptra RT
25,433,841 UART: [state] CFI Enabled
25,598,942 UART: [rt] RT listening for mailbox commands...
25,601,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,632,322 UART: [rt]cmd =0x4d454153, len=108
25,650,827 >>> mbox cmd response data (12 bytes)
27,703,251 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,222,579 >>> mbox cmd response: success
34,223,077 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,255,467 UART:
34,255,794 UART: Running Caliptra FMC ...
34,256,911 UART:
34,257,074 UART: [state] CFI Enabled
34,357,756 UART: [art] Extend RT PCRs Done
34,358,936 UART: [art] Lock RT PCRs Done
34,360,340 UART: [art] Populate DV Done
34,365,694 UART: [fht] FMC Alias Private Key: 7
34,367,396 UART: [art] Derive CDI
34,368,212 UART: [art] Store in in slot 0x4
34,427,097 UART: [art] Derive Key Pair
34,428,149 UART: [art] Store priv key in slot 0x5
36,891,531 UART: [art] Derive Key Pair - Done
36,904,371 UART: [art] Signing Cert with AUTHO
36,905,676 UART: RITY.KEYID = 7
38,617,799 UART: [art] Erasing AUTHORITY.KEYID = 7
38,619,297 UART: [art] PUB.X = 75C1BF63B7330B7CAE74EC7E11245F062089B674DFD5975406CADFEBCE9BA38E312A172727463750704FADBAA9734FC6
38,626,582 UART: [art] PUB.Y = B94E809815B32DC63105E8284FD89731D736ABDE06DD13A986B438D39C4E26D3C44DB549756CCFC1D9AC82CA54361B0C
38,633,842 UART: [art] SIG.R = 070722A9C9C64142E60C6F7A1D944FFE44F8B20CC9A1E90D863D0C50E8BFAAFFB8A20F3F947E842CFA72655BFA01AF21
38,641,254 UART: [art] SIG.S = C81B051C5F90D8AD2359E040F640E55695E64636AA9EB2076EEF111B84162CCEF9E4369FD53BEEB5E2FCE4FEAB8FC5D9
39,619,647 UART: mbox::rt_entry...
39,620,603 UART: ____ _ _ _ ____ _____
39,622,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,624,576 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,626,503 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,628,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,630,364 UART: |_|
39,631,193 UART:
39,915,221 UART: [rt] Runtime listening for mailbox commands...
39,917,398 >>> mbox cmd response data (48 bytes)
39,917,965 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,920,289 >>> mbox cmd response data (48 bytes)
39,921,160 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,935,000 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,985 writing to cptra_bootfsm_go
193,265 UART:
193,713 UART: Running Caliptra ROM ...
194,860 UART:
604,227 UART: [state] CFI Enabled
620,481 UART: [state] LifecycleState = Unprovisioned
622,323 UART: [state] DebugLocked = No
624,767 UART: [state] WD Timer not started. Device not locked for debugging
628,817 UART: [kat] SHA2-256
807,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,539 UART: [kat] ++
819,989 UART: [kat] sha1
831,501 UART: [kat] SHA2-256
834,575 UART: [kat] SHA2-384
839,220 UART: [kat] SHA2-512-ACC
842,236 UART: [kat] ECC-384
3,283,709 UART: [kat] HMAC-384Kdf
3,296,725 UART: [kat] LMS
3,826,206 UART: [kat] --
3,830,009 UART: [cold-reset] ++
3,831,025 UART: [fht] FHT @ 0x50003400
3,842,931 UART: [idev] ++
3,843,505 UART: [idev] CDI.KEYID = 6
3,844,416 UART: [idev] SUBJECT.KEYID = 7
3,845,661 UART: [idev] UDS.KEYID = 0
3,846,587 ready_for_fw is high
3,846,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,173 UART: [idev] Erasing UDS.KEYID = 0
6,319,164 UART: [idev] Sha1 KeyId Algorithm
6,342,389 UART: [idev] --
6,345,091 UART: [ldev] ++
6,345,667 UART: [ldev] CDI.KEYID = 6
6,346,553 UART: [ldev] SUBJECT.KEYID = 5
6,347,626 UART: [ldev] AUTHORITY.KEYID = 7
6,348,966 UART: [ldev] FE.KEYID = 1
6,358,561 UART: [ldev] Erasing FE.KEYID = 1
8,830,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,298 UART: [ldev] --
10,621,329 UART: [fwproc] Wait for Commands...
10,623,595 UART: [fwproc] Recv command 0x46574c44
10,625,691 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,477,612 >>> mbox cmd response: success
14,481,012 UART: [afmc] ++
14,481,609 UART: [afmc] CDI.KEYID = 6
14,482,530 UART: [afmc] SUBJECT.KEYID = 7
14,483,692 UART: [afmc] AUTHORITY.KEYID = 5
16,982,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,714 UART: [afmc] --
18,777,756 UART: [cold-reset] --
18,781,516 UART: [state] Locking Datavault
18,786,009 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,663 UART: [state] Locking ICCM
18,788,813 UART: [exit] Launching FMC @ 0x40000130
18,797,216 UART:
18,797,452 UART: Running Caliptra FMC ...
18,798,495 UART:
18,798,642 UART: [state] CFI Enabled
18,806,639 UART: [fht] FMC Alias Private Key: 7
20,563,631 UART: [art] Extend RT PCRs Done
20,564,850 UART: [art] Lock RT PCRs Done
20,566,484 UART: [art] Populate DV Done
20,571,949 UART: [fht] FMC Alias Private Key: 7
20,573,570 UART: [art] Derive CDI
20,574,389 UART: [art] Store in in slot 0x4
20,617,008 UART: [art] Derive Key Pair
20,618,046 UART: [art] Store priv key in slot 0x5
23,044,517 UART: [art] Derive Key Pair - Done
23,057,240 UART: [art] Signing Cert with AUTHO
23,058,544 UART: RITY.KEYID = 7
24,763,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,764,925 UART: [art] PUB.X = 5A68059821893184B708EFDCA5E87F793110C2F11B12B4336A52A4A860699890CA101783FF7F934C4F7C1051B5DB7783
24,772,208 UART: [art] PUB.Y = 7DFA1E457EE937986CFEE4AAD3218D2C8B453869C524F4D011E61150E4EC2ABE06622204C354A31F2E80C4DD6DE71B6A
24,779,481 UART: [art] SIG.R = B212FC180DE260A00D78F353EC7C0E8762A6C484CAF7476DC5E579CFF524FED6181BD1B1E0482625C3E91671BD9BEE86
24,786,915 UART: [art] SIG.S = 7C5D78D4D98C918DBE808277F36EDF741E84050ED0090E38913D65215365E834015A2D959DC62EEA93FC8CB3DC941F1D
25,765,961 UART: Caliptra RT
25,766,652 UART: [state] CFI Enabled
25,884,671 UART: [rt] RT listening for mailbox commands...
25,886,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,917,682 UART: [rt]cmd =0x4d454153, len=108
25,936,819 >>> mbox cmd response data (12 bytes)
27,989,334 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,089,586 UART:
28,089,963 UART: Running Caliptra ROM ...
28,091,026 UART:
28,091,182 UART: [state] CFI Enabled
28,106,971 UART: [state] LifecycleState = Unprovisioned
28,108,817 UART: [state] DebugLocked = No
28,110,007 UART: [state] WD Timer not started. Device not locked for debugging
28,114,132 UART: [kat] SHA2-256
28,293,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,304,843 UART: [kat] ++
28,305,307 UART: [kat] sha1
28,315,648 UART: [kat] SHA2-256
28,318,723 UART: [kat] SHA2-384
28,324,392 UART: [kat] SHA2-512-ACC
28,327,336 UART: [kat] ECC-384
30,770,955 UART: [kat] HMAC-384Kdf
30,783,542 UART: [kat] LMS
31,313,052 UART: [kat] --
31,317,421 UART: [update-reset] ++
34,309,215 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,313,234 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,570,583 >>> mbox cmd response: success
34,570,962 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,571,242 UART: [update-reset] Copying MAN_2 To MAN_1
34,593,463 UART: [update-reset Success] --
34,596,204 UART: [state] Locking Datavault
34,599,405 UART: [state] Locking PCR0, PCR1 and PCR31
34,601,051 UART: [state] Locking ICCM
34,602,465 UART: [exit] Launching FMC @ 0x40000130
34,610,917 UART:
34,611,154 UART: Running Caliptra FMC ...
34,612,260 UART:
34,612,418 UART: [state] CFI Enabled
34,656,281 UART: [art] Extend RT PCRs Done
34,657,470 UART: [art] Lock RT PCRs Done
34,658,975 UART: [art] Populate DV Done
34,664,274 UART: [fht] FMC Alias Private Key: 7
34,665,918 UART: [art] Derive CDI
34,666,731 UART: [art] Store in in slot 0x4
34,709,736 UART: [art] Derive Key Pair
34,710,786 UART: [art] Store priv key in slot 0x5
37,137,458 UART: [art] Derive Key Pair - Done
37,150,399 UART: [art] Signing Cert with AUTHO
37,151,707 UART: RITY.KEYID = 7
38,857,720 UART: [art] Erasing AUTHORITY.KEYID = 7
38,859,236 UART: [art] PUB.X = 7898F6FE06AFF359B313761617E8D032048FBB6B7D12144B84CDD1801DE0A582834DB84EE28E2722319505B27130463C
38,866,518 UART: [art] PUB.Y = 267FAD0EE0F3A434113FC26D7E1EB35ED36754399E0D7F62954951D9D1B182BB83FA7B95FAB24CB379CCD3BAB91A8846
38,873,777 UART: [art] SIG.R = CC7713937726E14AA1E18A03604E3840A9614DCC33FDCF01E30A185E7BC58B8170A78058D7576829B28969FD5E72A7FE
38,881,152 UART: [art] SIG.S = E78D146038F91765F2AFDE03246F2CA3CAFBCE33157E9B4EEA585BA94A4BD369DBEA7C877893A63C6C44518B6DF051B4
39,859,232 UART: mbox::rt_entry...
39,860,185 UART: ____ _ _ _ ____ _____
39,862,172 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,864,183 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,866,118 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,868,052 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,869,910 UART: |_|
39,870,712 UART:
40,150,559 UART: [rt] Runtime listening for mailbox commands...
40,152,764 >>> mbox cmd response data (48 bytes)
40,153,432 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,155,797 >>> mbox cmd response data (48 bytes)
40,156,652 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,170,519 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
3,698,077 ready_for_fw is high
3,698,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,776 >>> mbox cmd response: success
18,514,518 UART:
18,514,909 UART: Running Caliptra FMC ...
18,516,114 UART:
18,516,281 UART: [state] CFI Enabled
18,523,898 UART: [fht] FMC Alias Private Key: 7
20,280,913 UART: [art] Extend RT PCRs Done
20,282,144 UART: [art] Lock RT PCRs Done
20,283,995 UART: [art] Populate DV Done
20,289,381 UART: [fht] FMC Alias Private Key: 7
20,291,056 UART: [art] Derive CDI
20,291,885 UART: [art] Store in in slot 0x4
20,334,159 UART: [art] Derive Key Pair
20,335,162 UART: [art] Store priv key in slot 0x5
22,761,593 UART: [art] Derive Key Pair - Done
22,774,332 UART: [art] Signing Cert with AUTHO
22,775,672 UART: RITY.KEYID = 7
24,480,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,451 UART: [art] PUB.X = CB4121B576E6C27CB9232C551A70DC6B1B4D359EDCC185C67B8B4C07635DFBC8B7B7267A3B943037DBDF8B1011CCD47F
24,489,787 UART: [art] PUB.Y = B39EE029079F12CC2D6DBDDF7B46A09BAB0338A7B7A05AE132AF7BF1D0B170F35A28CF947703D47AECC10CB557BEB8C4
24,497,028 UART: [art] SIG.R = EBBBC12DAFD42D1537ABE3C57739B2122AA07934911AB92FF1CE43DC0F379980CADE0766DB130F0E83D1965B798280A6
24,504,466 UART: [art] SIG.S = 5C2D220411887C96740B0A73875FAD96F4836A29C7FF9F34F3C64203B382B5B8121A29E9F77D1A6A4C29C1F5222A9890
25,482,973 UART: Caliptra RT
25,483,673 UART: [state] CFI Enabled
25,600,042 UART: [rt] RT listening for mailbox commands...
25,602,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,632,853 UART: [rt]cmd =0x4d454153, len=108
25,651,965 >>> mbox cmd response data (12 bytes)
27,703,920 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,134,737 >>> mbox cmd response: success
34,135,254 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,170,333 UART:
34,170,631 UART: Running Caliptra FMC ...
34,171,749 UART:
34,171,910 UART: [state] CFI Enabled
34,215,560 UART: [art] Extend RT PCRs Done
34,216,750 UART: [art] Lock RT PCRs Done
34,218,158 UART: [art] Populate DV Done
34,223,844 UART: [fht] FMC Alias Private Key: 7
34,225,326 UART: [art] Derive CDI
34,226,090 UART: [art] Store in in slot 0x4
34,268,959 UART: [art] Derive Key Pair
34,269,955 UART: [art] Store priv key in slot 0x5
36,696,834 UART: [art] Derive Key Pair - Done
36,709,775 UART: [art] Signing Cert with AUTHO
36,711,081 UART: RITY.KEYID = 7
38,416,674 UART: [art] Erasing AUTHORITY.KEYID = 7
38,418,193 UART: [art] PUB.X = DA5673CCA396FD6ABF2F23AB60172525B0B7F0B571B0F29DCEC4EE75286C792485E608244B6B1B00566C684B45844A88
38,425,424 UART: [art] PUB.Y = E54F107A5C30E9960A1B83EA3638B2B98223B4AC4DC7D7125AAFD01F24FD7B41A61CE745288ECB2E329ADDE689E5CDBC
38,432,698 UART: [art] SIG.R = E07064B4A0F66630C1B51A64846FC3E8B0A5A4D09528202392335CDBB2F2D4306878CEC50E36FC670F7D2D909DD60DFE
38,440,109 UART: [art] SIG.S = F6D0A50BAFD9395AE9605DD88FE83754B148A88669D10D622B74AE15A56F498B4EAE5ED2B24C3D59AE148FC0DF43C4DA
39,418,479 UART: mbox::rt_entry...
39,419,429 UART: ____ _ _ _ ____ _____
39,421,413 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,423,420 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,425,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,427,284 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,429,220 UART: |_|
39,430,054 UART:
39,713,200 UART: [rt] Runtime listening for mailbox commands...
39,715,362 >>> mbox cmd response data (48 bytes)
39,715,934 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,718,248 >>> mbox cmd response data (48 bytes)
39,719,128 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,733,176 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,585 UART:
192,950 UART: Running Caliptra ROM ...
194,166 UART:
194,320 UART: [state] CFI Enabled
260,928 UART: [state] LifecycleState = Unprovisioned
263,333 UART: [state] DebugLocked = No
264,582 UART: [state] WD Timer not started. Device not locked for debugging
268,410 UART: [kat] SHA2-256
458,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,064 UART: [kat] ++
469,520 UART: [kat] sha1
480,818 UART: [kat] SHA2-256
483,829 UART: [kat] SHA2-384
491,380 UART: [kat] SHA2-512-ACC
493,969 UART: [kat] ECC-384
2,950,348 UART: [kat] HMAC-384Kdf
2,972,600 UART: [kat] LMS
3,504,329 UART: [kat] --
3,506,794 UART: [cold-reset] ++
3,507,972 UART: [fht] FHT @ 0x50003400
3,518,731 UART: [idev] ++
3,519,439 UART: [idev] CDI.KEYID = 6
3,520,323 UART: [idev] SUBJECT.KEYID = 7
3,521,568 UART: [idev] UDS.KEYID = 0
3,522,466 ready_for_fw is high
3,522,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,069 UART: [idev] Erasing UDS.KEYID = 0
6,028,194 UART: [idev] Sha1 KeyId Algorithm
6,050,356 UART: [idev] --
6,056,350 UART: [ldev] ++
6,057,027 UART: [ldev] CDI.KEYID = 6
6,057,911 UART: [ldev] SUBJECT.KEYID = 5
6,059,143 UART: [ldev] AUTHORITY.KEYID = 7
6,060,375 UART: [ldev] FE.KEYID = 1
6,100,300 UART: [ldev] Erasing FE.KEYID = 1
8,605,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,555 UART: [ldev] --
10,416,830 UART: [fwproc] Wait for Commands...
10,419,463 UART: [fwproc] Recv command 0x46574c44
10,421,773 UART: [fwproc] Recv'd Img size: 114084 bytes
13,869,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,608,408 >>> mbox cmd response: success
14,612,871 UART: [afmc] ++
14,613,583 UART: [afmc] CDI.KEYID = 6
14,614,853 UART: [afmc] SUBJECT.KEYID = 7
14,616,190 UART: [afmc] AUTHORITY.KEYID = 5
17,156,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,838 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,002 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,368 UART: [afmc] --
18,971,057 UART: [cold-reset] --
18,974,987 UART: [state] Locking Datavault
18,981,328 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,539 UART: [state] Locking ICCM
18,985,800 UART: [exit] Launching FMC @ 0x40000130
18,994,492 UART:
18,994,727 UART: Running Caliptra FMC ...
18,995,845 UART:
18,996,002 UART: [state] CFI Enabled
19,054,131 UART: [fht] FMC Alias Private Key: 7
20,818,218 UART: [art] Extend RT PCRs Done
20,819,441 UART: [art] Lock RT PCRs Done
20,821,093 UART: [art] Populate DV Done
20,826,393 UART: [fht] FMC Alias Private Key: 7
20,827,979 UART: [art] Derive CDI
20,828,707 UART: [art] Store in in slot 0x4
20,887,469 UART: [art] Derive Key Pair
20,888,507 UART: [art] Store priv key in slot 0x5
23,351,245 UART: [art] Derive Key Pair - Done
23,363,969 UART: [art] Signing Cert with AUTHO
23,365,266 UART: RITY.KEYID = 7
25,077,364 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,888 UART: [art] PUB.X = 7DA37496B1580FBC86923771C62F9C9E85F5F3062EE1A7CE1EB1737F77622F2493099DA70425EE5E50BADB560A656027
25,086,118 UART: [art] PUB.Y = 050F2F58B1B367753B223A7113BBC246382F82B597AF61DF3D76F3FA07825541E0E3F770F4C96A1A9A846EB11006F851
25,093,341 UART: [art] SIG.R = BAA769B7FE33F4EF428B9DB06044FA7EEF5AD602F8096FE43E4258F5842E71C243A85D30D038E3A12A77352C2ACA401B
25,100,752 UART: [art] SIG.S = C4C901A1728BEF24472B3322B5CDF977EA99081E1A55F69C0ED0A0076F410496E46150D94AE91E540F20AFCD3CDDFA47
26,079,519 UART: Caliptra RT
26,080,220 UART: [state] CFI Enabled
26,245,116 UART: [rt] RT listening for mailbox commands...
26,247,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,278,563 UART: [rt]cmd =0x4d454153, len=108
26,296,685 >>> mbox cmd response data (12 bytes)
28,349,191 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,449,715 UART:
28,450,086 UART: Running Caliptra ROM ...
28,451,240 UART:
28,451,406 UART: [state] CFI Enabled
28,509,436 UART: [state] LifecycleState = Unprovisioned
28,511,548 UART: [state] DebugLocked = No
28,514,069 UART: [state] WD Timer not started. Device not locked for debugging
28,517,881 UART: [kat] SHA2-256
28,707,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,718,488 UART: [kat] ++
28,718,939 UART: [kat] sha1
28,730,259 UART: [kat] SHA2-256
28,733,274 UART: [kat] SHA2-384
28,739,423 UART: [kat] SHA2-512-ACC
28,742,000 UART: [kat] ECC-384
31,193,278 UART: [kat] HMAC-384Kdf
31,215,755 UART: [kat] LMS
31,747,309 UART: [kat] --
31,751,205 UART: [update-reset] ++
34,770,924 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,773,486 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,165,762 >>> mbox cmd response: success
35,166,143 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,166,535 UART: [update-reset] Copying MAN_2 To MAN_1
35,204,128 UART: [update-reset Success] --
35,207,267 UART: [state] Locking Datavault
35,210,652 UART: [state] Locking PCR0, PCR1 and PCR31
35,212,814 UART: [state] Locking ICCM
35,215,575 UART: [exit] Launching FMC @ 0x40000130
35,224,270 UART:
35,224,509 UART: Running Caliptra FMC ...
35,225,611 UART:
35,225,767 UART: [state] CFI Enabled
35,322,403 UART: [art] Extend RT PCRs Done
35,323,623 UART: [art] Lock RT PCRs Done
35,324,878 UART: [art] Populate DV Done
35,330,294 UART: [fht] FMC Alias Private Key: 7
35,332,042 UART: [art] Derive CDI
35,332,857 UART: [art] Store in in slot 0x4
35,391,666 UART: [art] Derive Key Pair
35,392,708 UART: [art] Store priv key in slot 0x5
37,855,932 UART: [art] Derive Key Pair - Done
37,869,206 UART: [art] Signing Cert with AUTHO
37,870,512 UART: RITY.KEYID = 7
39,581,218 UART: [art] Erasing AUTHORITY.KEYID = 7
39,582,719 UART: [art] PUB.X = F74A4A09F7F10F4431723DE6D35E5A6EFF3CCC32D0C520860079B988FB4907E8E034B564CA9A82AA57E7E11B99422DCE
39,590,003 UART: [art] PUB.Y = 04B07FDAAC82C3B0BBDCAD4635FF9FAC0CD2B2E735471FE71F00D25B276BCCD305BF0E5FDDFE7FE2A762ECBDD7552988
39,597,265 UART: [art] SIG.R = 6A577A3249567E545F5A6351D18F904687D17DCA6D90FA85338A83DE99BC5FBE813007E2A3FE4261658B5F967BC1F303
39,604,650 UART: [art] SIG.S = 76EEC289423FF639C5EEE22D59E9375EF36F8E209607A044EE4C5892655D49A43D3578F593FC2716947ADFE055B7C435
40,582,865 UART: mbox::rt_entry...
40,583,833 UART: ____ _ _ _ ____ _____
40,585,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,809 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,733 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,661 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,593,587 UART: |_|
40,594,398 UART:
40,876,467 UART: [rt] Runtime listening for mailbox commands...
40,878,639 >>> mbox cmd response data (48 bytes)
40,879,239 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,881,555 >>> mbox cmd response data (48 bytes)
40,882,435 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,896,279 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
3,442,310 ready_for_fw is high
3,442,844 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,718,220 >>> mbox cmd response: success
18,996,062 UART:
18,996,478 UART: Running Caliptra FMC ...
18,997,585 UART:
18,997,735 UART: [state] CFI Enabled
19,064,716 UART: [fht] FMC Alias Private Key: 7
20,828,616 UART: [art] Extend RT PCRs Done
20,829,843 UART: [art] Lock RT PCRs Done
20,831,113 UART: [art] Populate DV Done
20,836,743 UART: [fht] FMC Alias Private Key: 7
20,838,468 UART: [art] Derive CDI
20,839,284 UART: [art] Store in in slot 0x4
20,897,951 UART: [art] Derive Key Pair
20,898,997 UART: [art] Store priv key in slot 0x5
23,361,793 UART: [art] Derive Key Pair - Done
23,374,734 UART: [art] Signing Cert with AUTHO
23,376,036 UART: RITY.KEYID = 7
25,087,905 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,436 UART: [art] PUB.X = 35F0596CEDAA04D434169670989A885ADAD0EBA041E38D07E98A61E658E17F38089EAE3B01D15D6ACCC4C5813DF05DA9
25,096,684 UART: [art] PUB.Y = DCA267F74DAF65AEFE3DA2B808628FB13B477CE6F8A27E91AB40E84AA98970B21EE203AF73B0006F22C87035DDBF0A09
25,103,919 UART: [art] SIG.R = A993D25B5515F34C02E1A26930145EA17B82339EC7D24642D6F33BBEBC2FDA4EE6763F0D4C9D7672D0DE3652BFBE8917
25,111,357 UART: [art] SIG.S = 8E7DD56E920EE90736BD0CFC59028D493D9F5F5E94A2B0F8AC7B0E26B02D974D261536D220896504F76A2B698448AC9F
26,090,498 UART: Caliptra RT
26,091,191 UART: [state] CFI Enabled
26,255,796 UART: [rt] RT listening for mailbox commands...
26,258,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,289,555 UART: [rt]cmd =0x4d454153, len=108
26,308,625 >>> mbox cmd response data (12 bytes)
28,361,888 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,350,846 >>> mbox cmd response: success
35,351,376 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,387,089 UART:
35,387,387 UART: Running Caliptra FMC ...
35,388,505 UART:
35,388,667 UART: [state] CFI Enabled
35,485,199 UART: [art] Extend RT PCRs Done
35,486,383 UART: [art] Lock RT PCRs Done
35,487,933 UART: [art] Populate DV Done
35,493,526 UART: [fht] FMC Alias Private Key: 7
35,495,187 UART: [art] Derive CDI
35,495,998 UART: [art] Store in in slot 0x4
35,554,327 UART: [art] Derive Key Pair
35,555,371 UART: [art] Store priv key in slot 0x5
38,018,683 UART: [art] Derive Key Pair - Done
38,031,737 UART: [art] Signing Cert with AUTHO
38,033,050 UART: RITY.KEYID = 7
39,743,989 UART: [art] Erasing AUTHORITY.KEYID = 7
39,745,496 UART: [art] PUB.X = 75C4C4D8B2B225EFEB5C70BDFA1502F558EAAAF09BE18E00D605EE1F57E5C2A418F59716A3B712A084369A38BC3356C9
39,752,771 UART: [art] PUB.Y = 11466794794E257B6F86F3F87F2AB450734C41190FA8441EACA9682A841AF0E12F6DEA5C8248609181F6C2F684BF2254
39,759,984 UART: [art] SIG.R = 0735B5DEBAA4BBB66B1A679E259EF8DF4AE81B6B0A8D3CF34D122F9DE0D041681938247DF189C62B7EB82FDA7C49A37E
39,767,404 UART: [art] SIG.S = 541F016E4CCAEF1BD8DCBD74DE18049C5E03C7BCA4AC61372E8660D1F372AD066F840AB8C3A55CBB5F9D0A92EFF3386D
40,746,279 UART: mbox::rt_entry...
40,747,249 UART: ____ _ _ _ ____ _____
40,749,236 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,751,264 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,753,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,755,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,756,903 UART: |_|
40,757,891 UART:
41,040,255 UART: [rt] Runtime listening for mailbox commands...
41,042,406 >>> mbox cmd response data (48 bytes)
41,042,988 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,045,302 >>> mbox cmd response data (48 bytes)
41,046,198 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,060,038 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
192,995 UART:
193,372 UART: Running Caliptra ROM ...
194,531 UART:
604,144 UART: [state] CFI Enabled
617,549 UART: [state] LifecycleState = Unprovisioned
619,925 UART: [state] DebugLocked = No
621,957 UART: [state] WD Timer not started. Device not locked for debugging
627,352 UART: [kat] SHA2-256
817,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,009 UART: [kat] ++
828,555 UART: [kat] sha1
840,311 UART: [kat] SHA2-256
843,355 UART: [kat] SHA2-384
848,647 UART: [kat] SHA2-512-ACC
851,230 UART: [kat] ECC-384
3,292,278 UART: [kat] HMAC-384Kdf
3,305,361 UART: [kat] LMS
3,837,230 UART: [kat] --
3,842,573 UART: [cold-reset] ++
3,844,642 UART: [fht] FHT @ 0x50003400
3,855,210 UART: [idev] ++
3,855,922 UART: [idev] CDI.KEYID = 6
3,856,806 UART: [idev] SUBJECT.KEYID = 7
3,858,046 UART: [idev] UDS.KEYID = 0
3,858,947 ready_for_fw is high
3,859,143 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,431 UART: [idev] Erasing UDS.KEYID = 0
6,338,555 UART: [idev] Sha1 KeyId Algorithm
6,362,454 UART: [idev] --
6,367,771 UART: [ldev] ++
6,368,465 UART: [ldev] CDI.KEYID = 6
6,369,378 UART: [ldev] SUBJECT.KEYID = 5
6,370,533 UART: [ldev] AUTHORITY.KEYID = 7
6,371,767 UART: [ldev] FE.KEYID = 1
6,381,871 UART: [ldev] Erasing FE.KEYID = 1
8,865,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,901 UART: [ldev] --
10,656,846 UART: [fwproc] Wait for Commands...
10,658,835 UART: [fwproc] Recv command 0x46574c44
10,661,093 UART: [fwproc] Recv'd Img size: 114084 bytes
14,108,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,845,803 >>> mbox cmd response: success
14,850,179 UART: [afmc] ++
14,850,888 UART: [afmc] CDI.KEYID = 6
14,852,147 UART: [afmc] SUBJECT.KEYID = 7
14,853,593 UART: [afmc] AUTHORITY.KEYID = 5
17,355,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,496 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,279 UART: [afmc] --
19,149,040 UART: [cold-reset] --
19,153,292 UART: [state] Locking Datavault
19,159,209 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,402 UART: [state] Locking ICCM
19,163,861 UART: [exit] Launching FMC @ 0x40000130
19,172,487 UART:
19,172,726 UART: Running Caliptra FMC ...
19,173,827 UART:
19,173,987 UART: [state] CFI Enabled
19,181,678 UART: [fht] FMC Alias Private Key: 7
20,937,886 UART: [art] Extend RT PCRs Done
20,939,099 UART: [art] Lock RT PCRs Done
20,940,592 UART: [art] Populate DV Done
20,946,166 UART: [fht] FMC Alias Private Key: 7
20,947,704 UART: [art] Derive CDI
20,948,442 UART: [art] Store in in slot 0x4
20,990,920 UART: [art] Derive Key Pair
20,991,920 UART: [art] Store priv key in slot 0x5
23,417,974 UART: [art] Derive Key Pair - Done
23,431,022 UART: [art] Signing Cert with AUTHO
23,432,331 UART: RITY.KEYID = 7
25,138,062 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,568 UART: [art] PUB.X = FB318A2875DF4F1D3C156A22B3C0D321F1338E506ADD98A8E5704AEE5963171AC16FE3C89224983F2A03B8AA47887241
25,146,786 UART: [art] PUB.Y = 2D3D56A16C20EDAB2B517C67E30C2006DED7FEB12E543D772A09C1198C95A92DB9A79B49BAE243F2B0B9CAAF4D5A1721
25,154,101 UART: [art] SIG.R = 0C56A88F68FE261B215191A2DA7F320372219BA5781F5944C888D00B7CF73CDF1153374C47D03751D36EF5AB662B76DD
25,161,530 UART: [art] SIG.S = 0230E5F35A70C1C5DA5CDE108113E891B0AFC9007888BEECB937C0AA59F0B97401330E09B062BDD5D0261CCC5F008E9F
26,140,041 UART: Caliptra RT
26,140,751 UART: [state] CFI Enabled
26,258,030 UART: [rt] RT listening for mailbox commands...
26,260,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,291,202 UART: [rt]cmd =0x4d454153, len=108
26,309,958 >>> mbox cmd response data (12 bytes)
28,362,200 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,462,645 UART:
28,463,008 UART: Running Caliptra ROM ...
28,464,064 UART:
28,464,221 UART: [state] CFI Enabled
28,477,021 UART: [state] LifecycleState = Unprovisioned
28,478,877 UART: [state] DebugLocked = No
28,481,526 UART: [state] WD Timer not started. Device not locked for debugging
28,486,595 UART: [kat] SHA2-256
28,676,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,687,247 UART: [kat] ++
28,687,765 UART: [kat] sha1
28,698,652 UART: [kat] SHA2-256
28,701,619 UART: [kat] SHA2-384
28,708,045 UART: [kat] SHA2-512-ACC
28,710,619 UART: [kat] ECC-384
31,154,965 UART: [kat] HMAC-384Kdf
31,168,503 UART: [kat] LMS
31,700,078 UART: [kat] --
31,705,363 UART: [update-reset] ++
34,729,179 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,733,008 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,125,350 >>> mbox cmd response: success
35,125,712 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,126,094 UART: [update-reset] Copying MAN_2 To MAN_1
35,163,677 UART: [update-reset Success] --
35,168,392 UART: [state] Locking Datavault
35,171,337 UART: [state] Locking PCR0, PCR1 and PCR31
35,173,486 UART: [state] Locking ICCM
35,175,350 UART: [exit] Launching FMC @ 0x40000130
35,184,027 UART:
35,184,272 UART: Running Caliptra FMC ...
35,185,297 UART:
35,185,445 UART: [state] CFI Enabled
35,229,135 UART: [art] Extend RT PCRs Done
35,230,281 UART: [art] Lock RT PCRs Done
35,231,916 UART: [art] Populate DV Done
35,237,333 UART: [fht] FMC Alias Private Key: 7
35,239,064 UART: [art] Derive CDI
35,239,807 UART: [art] Store in in slot 0x4
35,282,506 UART: [art] Derive Key Pair
35,283,504 UART: [art] Store priv key in slot 0x5
37,710,584 UART: [art] Derive Key Pair - Done
37,723,674 UART: [art] Signing Cert with AUTHO
37,725,017 UART: RITY.KEYID = 7
39,430,157 UART: [art] Erasing AUTHORITY.KEYID = 7
39,431,660 UART: [art] PUB.X = 897E67CE44C1848F4E94BB0E2349768A0873144D6C19B7B67395581E685C9CDF564841B5F1F7BF9749961A8292378B5D
39,438,878 UART: [art] PUB.Y = BFD53037407FF839473C88D0E09FD39E506AB1EC17ADB9F7916F2592655885583D3E196A6E4C37C830D359E1CE5C061B
39,446,139 UART: [art] SIG.R = 426558FB85C16244A36060CD8B1202F2DBC75169E4F831456A463D5436349936ECD194CD652050CDF6717AED20CFE1F4
39,453,501 UART: [art] SIG.S = AA18BEAB9F0BE673A808B81B1746F03698529C82D195D6004D2D5D1D54C996C22936DC75FE6236CC181CB1956430E852
40,432,111 UART: mbox::rt_entry...
40,433,080 UART: ____ _ _ _ ____ _____
40,435,071 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,437,294 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,439,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,441,172 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,443,103 UART: |_|
40,443,938 UART:
40,724,842 UART: [rt] Runtime listening for mailbox commands...
40,727,010 >>> mbox cmd response data (48 bytes)
40,727,590 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,729,907 >>> mbox cmd response data (48 bytes)
40,730,794 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,744,633 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
3,750,697 ready_for_fw is high
3,751,342 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,950,311 >>> mbox cmd response: success
19,204,396 UART:
19,204,791 UART: Running Caliptra FMC ...
19,205,990 UART:
19,206,163 UART: [state] CFI Enabled
19,213,845 UART: [fht] FMC Alias Private Key: 7
20,971,129 UART: [art] Extend RT PCRs Done
20,972,355 UART: [art] Lock RT PCRs Done
20,974,040 UART: [art] Populate DV Done
20,979,410 UART: [fht] FMC Alias Private Key: 7
20,981,009 UART: [art] Derive CDI
20,981,834 UART: [art] Store in in slot 0x4
21,023,953 UART: [art] Derive Key Pair
21,024,999 UART: [art] Store priv key in slot 0x5
23,451,800 UART: [art] Derive Key Pair - Done
23,464,850 UART: [art] Signing Cert with AUTHO
23,466,162 UART: RITY.KEYID = 7
25,171,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,272 UART: [art] PUB.X = 23E9BEE3E294FFB71D065AAE995B1EB983B3A05E5E9C81CC995C20691D4FB19FD24487EF99EE2FFFBFA091DE2BDDEB59
25,180,573 UART: [art] PUB.Y = 78F3003E28AEA4C7B08C38F5D048AF99449EB6D355B8B1BEAAA1DFD7BC1700F672454446BA140C2B7653E12491E66F6F
25,187,805 UART: [art] SIG.R = B0181FB2D74085C437FB9F7ACFD8D6324EFA24136CB8F958A292C96E9FA34A55D10577A5006811941BB27D1D225A7101
25,195,201 UART: [art] SIG.S = 6A64D42134629D62C1F1BBF3F9880DE5B5F08C16505EF32F6D202F5AC3498FC27FDE2AE22AEE7D9A79B3C1E213C368D6
26,173,619 UART: Caliptra RT
26,174,310 UART: [state] CFI Enabled
26,291,575 UART: [rt] RT listening for mailbox commands...
26,293,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,324,912 UART: [rt]cmd =0x4d454153, len=108
26,343,799 >>> mbox cmd response data (12 bytes)
28,394,703 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,308,166 >>> mbox cmd response: success
35,308,677 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,341,221 UART:
35,341,545 UART: Running Caliptra FMC ...
35,342,674 UART:
35,342,840 UART: [state] CFI Enabled
35,386,218 UART: [art] Extend RT PCRs Done
35,387,372 UART: [art] Lock RT PCRs Done
35,388,879 UART: [art] Populate DV Done
35,394,240 UART: [fht] FMC Alias Private Key: 7
35,395,787 UART: [art] Derive CDI
35,396,823 UART: [art] Store in in slot 0x4
35,439,165 UART: [art] Derive Key Pair
35,440,173 UART: [art] Store priv key in slot 0x5
37,867,089 UART: [art] Derive Key Pair - Done
37,880,077 UART: [art] Signing Cert with AUTHO
37,881,434 UART: RITY.KEYID = 7
39,586,559 UART: [art] Erasing AUTHORITY.KEYID = 7
39,588,061 UART: [art] PUB.X = 7CF476793A5093D10DD4BB8DE093315FEE80683D01C288BBB4777C1F1442E29770DE179753E7F9F6DA20DB2114A180B8
39,595,338 UART: [art] PUB.Y = C7F9B316C0F330FE4BDFDC44793CF448DC70D6850AC5E6A7F5A05F2408A190769DE2508F16A9EC2E887E07F189F14056
39,602,615 UART: [art] SIG.R = F215D0D577044C3B7A2BDEF89D9EC31D3032E42C1BE27CED46F496A9B35227421524C113336200B8D1497377F90F166A
39,609,960 UART: [art] SIG.S = 5280666A9E76C0753B00865692FDE02C56153261273794E26D6219F693A1EECF8478BCA36F69D041070CCF807C7F87FF
40,588,830 UART: mbox::rt_entry...
40,589,797 UART: ____ _ _ _ ____ _____
40,591,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,593,736 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,595,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,597,742 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,599,807 UART: |_|
40,600,624 UART:
40,882,038 UART: [rt] Runtime listening for mailbox commands...
40,884,217 >>> mbox cmd response data (48 bytes)
40,884,814 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,887,139 >>> mbox cmd response data (48 bytes)
40,888,024 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,901,864 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,334 UART: [kat] LMS
1,475,530 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,374 UART: [idev] ++
1,479,542 UART: [idev] CDI.KEYID = 6
1,479,902 UART: [idev] SUBJECT.KEYID = 7
1,480,326 UART: [idev] UDS.KEYID = 0
1,480,671 ready_for_fw is high
1,480,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,182 UART: [idev] Erasing UDS.KEYID = 0
1,505,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] --
1,514,875 UART: [ldev] ++
1,515,043 UART: [ldev] CDI.KEYID = 6
1,515,406 UART: [ldev] SUBJECT.KEYID = 5
1,515,832 UART: [ldev] AUTHORITY.KEYID = 7
1,516,295 UART: [ldev] FE.KEYID = 1
1,521,597 UART: [ldev] Erasing FE.KEYID = 1
1,546,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,558 UART: [ldev] --
1,585,975 UART: [fwproc] Waiting for Commands...
1,586,746 UART: [fwproc] Received command 0x46574c44
1,587,537 UART: [fwproc] Received Image of size 114084 bytes
2,882,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,737 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,468 >>> mbox cmd response: success
3,075,538 UART: [afmc] ++
3,075,706 UART: [afmc] CDI.KEYID = 6
3,076,068 UART: [afmc] SUBJECT.KEYID = 7
3,076,493 UART: [afmc] AUTHORITY.KEYID = 5
3,111,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,987 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,677 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,512 UART: [afmc] --
3,154,608 UART: [cold-reset] --
3,155,564 UART: [state] Locking Datavault
3,156,697 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,301 UART: [state] Locking ICCM
3,157,723 UART: [exit] Launching FMC @ 0x40000130
3,163,052 UART:
3,163,068 UART: Running Caliptra FMC ...
3,163,476 UART:
3,163,530 UART: [state] CFI Enabled
3,173,805 UART: [fht] FMC Alias Private Key: 7
3,282,032 UART: [art] Extend RT PCRs Done
3,282,460 UART: [art] Lock RT PCRs Done
3,283,966 UART: [art] Populate DV Done
3,292,393 UART: [fht] FMC Alias Private Key: 7
3,293,377 UART: [art] Derive CDI
3,293,657 UART: [art] Store in in slot 0x4
3,379,132 UART: [art] Derive Key Pair
3,379,492 UART: [art] Store priv key in slot 0x5
3,392,412 UART: [art] Derive Key Pair - Done
3,407,116 UART: [art] Signing Cert with AUTHO
3,407,596 UART: RITY.KEYID = 7
3,422,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,195 UART: [art] PUB.X = 8024800FF86A37483AEA46E68139CF44D104CBE283799E0E1313E05000C8438C68063C4220FC0D269682A3EBAA408379
3,429,920 UART: [art] PUB.Y = 8CCCF9BEE1DD4D49F55DF52CCECA46C043C5FC78B1CF9845CC974298EF3E6CBEF42D4F2878D7DBC7AB26F752E7AE5A47
3,436,902 UART: [art] SIG.R = 3B698AF244496238BB145BED1E84AAFEBE3BC57E541691B8BF71AC409EF7BBBA9BC0D48427245E6CC10A8E4581210927
3,443,678 UART: [art] SIG.S = 9E41393968176890A6DA591C4CF4313CFA033C06411B8CA63777E6B18DB352998CC472F87790596C2E09F04FD02B6298
3,467,342 UART: Caliptra RT
3,467,595 UART: [state] CFI Enabled
3,575,536 UART: [rt] RT listening for mailbox commands...
3,576,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,818 UART: [rt]cmd =0x4d454153, len=108
3,627,995 >>> mbox cmd response data (12 bytes)
3,627,996 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,742 UART:
3,628,758 UART: Running Caliptra ROM ...
3,629,166 UART:
3,629,220 UART: [state] CFI Enabled
3,631,762 UART: [state] LifecycleState = Unprovisioned
3,632,417 UART: [state] DebugLocked = No
3,632,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,634,600 UART: [kat] SHA2-256
4,428,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,432,646 UART: [kat] ++
4,432,798 UART: [kat] sha1
4,437,112 UART: [kat] SHA2-256
4,439,050 UART: [kat] SHA2-384
4,441,859 UART: [kat] SHA2-512-ACC
4,443,759 UART: [kat] ECC-384
4,449,170 UART: [kat] HMAC-384Kdf
4,453,796 UART: [kat] LMS
5,021,992 UART: [kat] --
5,022,887 UART: [update-reset] ++
5,946,243 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,947,363 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,043,425 >>> mbox cmd response: success
6,043,425 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,043,582 UART: [update-reset] Copying MAN_2 To MAN_1
6,051,596 UART: [update-reset Success] --
6,052,619 UART: [state] Locking Datavault
6,053,401 UART: [state] Locking PCR0, PCR1 and PCR31
6,054,005 UART: [state] Locking ICCM
6,054,427 UART: [exit] Launching FMC @ 0x40000130
6,059,756 UART:
6,059,772 UART: Running Caliptra FMC ...
6,060,180 UART:
6,060,234 UART: [state] CFI Enabled
6,149,865 UART: [art] Extend RT PCRs Done
6,150,293 UART: [art] Lock RT PCRs Done
6,151,420 UART: [art] Populate DV Done
6,159,415 UART: [fht] FMC Alias Private Key: 7
6,160,351 UART: [art] Derive CDI
6,160,631 UART: [art] Store in in slot 0x4
6,246,508 UART: [art] Derive Key Pair
6,246,868 UART: [art] Store priv key in slot 0x5
6,260,098 UART: [art] Derive Key Pair - Done
6,274,818 UART: [art] Signing Cert with AUTHO
6,275,298 UART: RITY.KEYID = 7
6,290,156 UART: [art] Erasing AUTHORITY.KEYID = 7
6,290,921 UART: [art] PUB.X = FDD38E96F75F3CE2042CB63895ABE8D858D60DCA325DAB7B0FCC91F9E23B63F0928F121DA27159AA74C0D25ACDCAEF4C
6,297,708 UART: [art] PUB.Y = 5BB58F03CFBD1C1F51568312FE6064ECA9DEE596A3A584150335A03564004CAD3708AEE8E71096620D4EC78E2DEA6B63
6,304,632 UART: [art] SIG.R = 54D7E066DD2D9A76FDB02758434A25A703D1645A14D3ADD07FE137B799A6E90B84E83C7298E4C2E1064BEBDEB4F3FFF2
6,311,407 UART: [art] SIG.S = 0CD10B4863D44DACD64A33F7838B73885A13DC964B7079B7EA7B1AA3699657BD8C72E26C5736A79068338C5899221C80
6,334,672 UART: mbox::rt_entry...
6,335,044 UART: ____ _ _ _ ____ _____
6,335,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,336,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,337,396 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,338,164 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,338,932 UART: |_|
6,339,244 UART:
6,620,019 UART: [rt] Runtime listening for mailbox commands...
6,621,209 >>> mbox cmd response data (48 bytes)
6,621,210 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,623,993 >>> mbox cmd response data (48 bytes)
6,623,994 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,639,131 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,633 ready_for_fw is high
1,362,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,828 >>> mbox cmd response: success
2,984,668 UART:
2,984,684 UART: Running Caliptra FMC ...
2,985,092 UART:
2,985,146 UART: [state] CFI Enabled
2,995,323 UART: [fht] FMC Alias Private Key: 7
3,102,682 UART: [art] Extend RT PCRs Done
3,103,110 UART: [art] Lock RT PCRs Done
3,104,402 UART: [art] Populate DV Done
3,112,627 UART: [fht] FMC Alias Private Key: 7
3,113,663 UART: [art] Derive CDI
3,113,943 UART: [art] Store in in slot 0x4
3,199,700 UART: [art] Derive Key Pair
3,200,060 UART: [art] Store priv key in slot 0x5
3,213,302 UART: [art] Derive Key Pair - Done
3,228,054 UART: [art] Signing Cert with AUTHO
3,228,534 UART: RITY.KEYID = 7
3,243,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,477 UART: [art] PUB.X = EE481566B9F992F8C2222C9832D097696698642E0B45E350E31367CB1CBCCC520A0B65E34EDAB2A71878EB932C839627
3,251,236 UART: [art] PUB.Y = CD7078E8C39A8202143F736D987DE44AB0DE79C3B33A365664BE42DC99AB6A9F36BE789323FA7A285EFFCC1C90F21999
3,258,193 UART: [art] SIG.R = DCB78D3D0F41294B32D9EB96E768E638D7501BA3BB108FD27DDF3C6B28C505CB93C78EEDFBFFE5F98CE62477A9B5AE67
3,264,981 UART: [art] SIG.S = 2D8FD9AC3B554E564FED40F5D7608430A59F5BCBEB4AB6D02FF6631E5B02A3AE0157891E0F3764FE296B21ABCCECE497
3,288,631 UART: Caliptra RT
3,288,884 UART: [state] CFI Enabled
3,396,243 UART: [rt] RT listening for mailbox commands...
3,396,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,361 UART: [rt]cmd =0x4d454153, len=108
3,447,988 >>> mbox cmd response data (12 bytes)
3,447,989 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,744,442 >>> mbox cmd response: success
5,744,442 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,757,887 UART:
5,757,903 UART: Running Caliptra FMC ...
5,758,311 UART:
5,758,365 UART: [state] CFI Enabled
5,847,580 UART: [art] Extend RT PCRs Done
5,848,008 UART: [art] Lock RT PCRs Done
5,849,211 UART: [art] Populate DV Done
5,857,286 UART: [fht] FMC Alias Private Key: 7
5,858,454 UART: [art] Derive CDI
5,858,734 UART: [art] Store in in slot 0x4
5,944,275 UART: [art] Derive Key Pair
5,944,635 UART: [art] Store priv key in slot 0x5
5,958,421 UART: [art] Derive Key Pair - Done
5,972,952 UART: [art] Signing Cert with AUTHO
5,973,432 UART: RITY.KEYID = 7
5,988,676 UART: [art] Erasing AUTHORITY.KEYID = 7
5,989,441 UART: [art] PUB.X = 8E98B400652710B25110B5440EB075DD88B6E0B0EA9EB65AB25A78A268F54C38F65E7FE6BDF8BFB1A625561B12FCE3DF
5,996,200 UART: [art] PUB.Y = 40CEAE84C8F20CC5144A10CBBDE863763C310696FDFB7CE816D6C6F33391203BA1BDA020772CE05887FF558365DCB043
6,003,154 UART: [art] SIG.R = 61CE44DCE8566EC52E2F394CA079F13287C68C519B1E71C3B47901CF50B0BD5A3B58773A27305B6400EB72FFC734DBCF
6,009,909 UART: [art] SIG.S = F290AAFA5AA0330B523FCC9E77915A9E4FAB8848608EBFC1A2D0F1A7C1CB3672D0D4F6DFE26E538C5347C9C0773336CC
6,033,185 UART: mbox::rt_entry...
6,033,557 UART: ____ _ _ _ ____ _____
6,034,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,035,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,035,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,036,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,037,445 UART: |_|
6,037,757 UART:
6,314,651 UART: [rt] Runtime listening for mailbox commands...
6,315,841 >>> mbox cmd response data (48 bytes)
6,315,842 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,318,625 >>> mbox cmd response data (48 bytes)
6,318,626 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,333,763 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,031 UART: [kat] SHA2-512-ACC
896,932 UART: [kat] ECC-384
902,439 UART: [kat] HMAC-384Kdf
907,101 UART: [kat] LMS
1,475,297 UART: [kat] --
1,476,358 UART: [cold-reset] ++
1,476,796 UART: [fht] Storing FHT @ 0x50003400
1,479,489 UART: [idev] ++
1,479,657 UART: [idev] CDI.KEYID = 6
1,480,017 UART: [idev] SUBJECT.KEYID = 7
1,480,441 UART: [idev] UDS.KEYID = 0
1,480,786 ready_for_fw is high
1,480,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,545 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,453 UART: [idev] --
1,515,622 UART: [ldev] ++
1,515,790 UART: [ldev] CDI.KEYID = 6
1,516,153 UART: [ldev] SUBJECT.KEYID = 5
1,516,579 UART: [ldev] AUTHORITY.KEYID = 7
1,517,042 UART: [ldev] FE.KEYID = 1
1,522,456 UART: [ldev] Erasing FE.KEYID = 1
1,548,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,413 UART: [ldev] --
1,587,878 UART: [fwproc] Waiting for Commands...
1,588,513 UART: [fwproc] Received command 0x46574c44
1,589,304 UART: [fwproc] Received Image of size 114084 bytes
2,884,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,435 >>> mbox cmd response: success
3,077,619 UART: [afmc] ++
3,077,787 UART: [afmc] CDI.KEYID = 6
3,078,149 UART: [afmc] SUBJECT.KEYID = 7
3,078,574 UART: [afmc] AUTHORITY.KEYID = 5
3,113,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,094 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,784 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,897 UART: [afmc] --
3,156,783 UART: [cold-reset] --
3,157,583 UART: [state] Locking Datavault
3,158,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,290 UART: [state] Locking ICCM
3,159,950 UART: [exit] Launching FMC @ 0x40000130
3,165,279 UART:
3,165,295 UART: Running Caliptra FMC ...
3,165,703 UART:
3,165,846 UART: [state] CFI Enabled
3,176,745 UART: [fht] FMC Alias Private Key: 7
3,284,722 UART: [art] Extend RT PCRs Done
3,285,150 UART: [art] Lock RT PCRs Done
3,286,590 UART: [art] Populate DV Done
3,295,233 UART: [fht] FMC Alias Private Key: 7
3,296,357 UART: [art] Derive CDI
3,296,637 UART: [art] Store in in slot 0x4
3,382,440 UART: [art] Derive Key Pair
3,382,800 UART: [art] Store priv key in slot 0x5
3,395,908 UART: [art] Derive Key Pair - Done
3,410,709 UART: [art] Signing Cert with AUTHO
3,411,189 UART: RITY.KEYID = 7
3,426,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,864 UART: [art] PUB.X = 12346B3B7E5878F52B2EDB3CBD01DD2556C5410C266D8447BFCAF64AE299C807AAC3CC98F24D2970C6654DFCC3A20BAE
3,433,640 UART: [art] PUB.Y = F5FB0A8894386F9111CDB53ACF7E31B71F387C1237BC6F04E6B83F15BBFF1BAEAAACA9233C0F2760F31269E23F28A8D5
3,440,599 UART: [art] SIG.R = 65F5E0B4C70F35D6752BB353BFF547C053D644EBA36F487D975B7E7E43622C71B3425D08D15BEE75C944B42DBEFE6D6C
3,447,375 UART: [art] SIG.S = 946288F947C5E72F95D7BC3D5F94708150B7EF5C009549C8315A4FCD5FA7A341E992C73EDEAA126D1C87DAF5E6D13148
3,471,272 UART: Caliptra RT
3,471,617 UART: [state] CFI Enabled
3,579,594 UART: [rt] RT listening for mailbox commands...
3,580,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,612 UART: [rt]cmd =0x4d454153, len=108
3,631,245 >>> mbox cmd response data (12 bytes)
3,631,246 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,166 UART:
3,632,182 UART: Running Caliptra ROM ...
3,632,590 UART:
3,632,731 UART: [state] CFI Enabled
3,635,991 UART: [state] LifecycleState = Unprovisioned
3,636,646 UART: [state] DebugLocked = No
3,637,266 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,638,809 UART: [kat] SHA2-256
4,432,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,436,855 UART: [kat] ++
4,437,007 UART: [kat] sha1
4,441,141 UART: [kat] SHA2-256
4,443,079 UART: [kat] SHA2-384
4,445,838 UART: [kat] SHA2-512-ACC
4,447,738 UART: [kat] ECC-384
4,453,337 UART: [kat] HMAC-384Kdf
4,458,131 UART: [kat] LMS
5,026,327 UART: [kat] --
5,027,138 UART: [update-reset] ++
5,951,446 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,952,554 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,048,616 >>> mbox cmd response: success
6,048,616 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,048,883 UART: [update-reset] Copying MAN_2 To MAN_1
6,056,897 UART: [update-reset Success] --
6,057,836 UART: [state] Locking Datavault
6,058,472 UART: [state] Locking PCR0, PCR1 and PCR31
6,059,076 UART: [state] Locking ICCM
6,059,726 UART: [exit] Launching FMC @ 0x40000130
6,065,055 UART:
6,065,071 UART: Running Caliptra FMC ...
6,065,479 UART:
6,065,622 UART: [state] CFI Enabled
6,154,345 UART: [art] Extend RT PCRs Done
6,154,773 UART: [art] Lock RT PCRs Done
6,156,100 UART: [art] Populate DV Done
6,164,457 UART: [fht] FMC Alias Private Key: 7
6,165,405 UART: [art] Derive CDI
6,165,685 UART: [art] Store in in slot 0x4
6,251,066 UART: [art] Derive Key Pair
6,251,426 UART: [art] Store priv key in slot 0x5
6,264,406 UART: [art] Derive Key Pair - Done
6,278,978 UART: [art] Signing Cert with AUTHO
6,279,458 UART: RITY.KEYID = 7
6,294,536 UART: [art] Erasing AUTHORITY.KEYID = 7
6,295,301 UART: [art] PUB.X = 97AC47B0B2F89E5DE1D572E7217EA9E99789C6169B37A0E288F00565CEBD9E86556A72A992FA222E3A8A3A9C8025D176
6,302,072 UART: [art] PUB.Y = 7E4BF8231DBD4A58F136FDB6A5CDA3A6CDC1ACB9F3AD865E5D785A343F40114DB3C3CC3F405034A5E41DD0B875A740B4
6,309,044 UART: [art] SIG.R = C744953CB61C5108B46E1D33CF4A4B95933497C2DBD01D13D8A87F115A5B072E0B85707AD88573B97E95D5FBC8747A27
6,315,807 UART: [art] SIG.S = 82A667E73414CF67ACD59CA3B1552CE76612FCCFCB108B80471F00FCA41F840C615CA8DD0B71B9F693D79AB1B8B1FBFE
6,339,384 UART: mbox::rt_entry...
6,339,756 UART: ____ _ _ _ ____ _____
6,340,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,341,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,342,108 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,342,876 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,343,644 UART: |_|
6,343,956 UART:
6,623,613 UART: [rt] Runtime listening for mailbox commands...
6,624,803 >>> mbox cmd response data (48 bytes)
6,624,804 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,627,587 >>> mbox cmd response data (48 bytes)
6,627,588 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,642,725 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 ready_for_fw is high
1,363,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,857 >>> mbox cmd response: success
2,986,105 UART:
2,986,121 UART: Running Caliptra FMC ...
2,986,529 UART:
2,986,672 UART: [state] CFI Enabled
2,997,437 UART: [fht] FMC Alias Private Key: 7
3,105,856 UART: [art] Extend RT PCRs Done
3,106,284 UART: [art] Lock RT PCRs Done
3,107,616 UART: [art] Populate DV Done
3,116,031 UART: [fht] FMC Alias Private Key: 7
3,117,123 UART: [art] Derive CDI
3,117,403 UART: [art] Store in in slot 0x4
3,203,030 UART: [art] Derive Key Pair
3,203,390 UART: [art] Store priv key in slot 0x5
3,216,396 UART: [art] Derive Key Pair - Done
3,231,073 UART: [art] Signing Cert with AUTHO
3,231,553 UART: RITY.KEYID = 7
3,246,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,498 UART: [art] PUB.X = C68AC58710FAF063FF993CA05D7C3C9E756DF135295E27BEE377DE705D84268C8A3B52034BD9CB606BAA5044DC3DDDD3
3,254,281 UART: [art] PUB.Y = 0CBE59A9E1C80B11996B4E42D371A2EFF43BFEEC2C95935745512D8477158032910C507C4DC023862BF9A6B3140EB267
3,261,219 UART: [art] SIG.R = ADF7AF78D2ED8B72C63A56B02BF951563A77D6936C41DDAE7AF70C537ABD322ECE02A722E9201A95F78362055F08AC46
3,267,989 UART: [art] SIG.S = D959ABC23D105A429E509E40042C939E8D0DC19D99FCA62B9EE1F3FEECD0AB6660E59D68B6D7B5DD84DB546DB1839B20
3,291,294 UART: Caliptra RT
3,291,639 UART: [state] CFI Enabled
3,400,251 UART: [rt] RT listening for mailbox commands...
3,400,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,297 UART: [rt]cmd =0x4d454153, len=108
3,451,322 >>> mbox cmd response data (12 bytes)
3,451,323 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,749,437 >>> mbox cmd response: success
5,749,437 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,762,750 UART:
5,762,766 UART: Running Caliptra FMC ...
5,763,174 UART:
5,763,317 UART: [state] CFI Enabled
5,853,026 UART: [art] Extend RT PCRs Done
5,853,454 UART: [art] Lock RT PCRs Done
5,854,599 UART: [art] Populate DV Done
5,862,984 UART: [fht] FMC Alias Private Key: 7
5,863,982 UART: [art] Derive CDI
5,864,262 UART: [art] Store in in slot 0x4
5,950,033 UART: [art] Derive Key Pair
5,950,393 UART: [art] Store priv key in slot 0x5
5,963,447 UART: [art] Derive Key Pair - Done
5,978,251 UART: [art] Signing Cert with AUTHO
5,978,731 UART: RITY.KEYID = 7
5,994,031 UART: [art] Erasing AUTHORITY.KEYID = 7
5,994,796 UART: [art] PUB.X = 8E50549DC4210C75B753D1580DE0C7CBD972513D46314F61CDA2A9A88B246090C38D4AEB77B7DFB74408300D7279CD48
6,001,556 UART: [art] PUB.Y = B66652807F88D45C82598666AF55A0176F8FD5CBC0D055B5EC4181BAF0C630CBC30E5A3E388DAF8526379B261BB2C319
6,008,509 UART: [art] SIG.R = A3BB1B199E373EF3388D13652E1BF14035B9E36DA9456D9044042ECF82766E3522D4F695285B1D0D56B7DC8DDEEBD475
6,015,279 UART: [art] SIG.S = 856C7EF17E037F2FD33A5362F455A0BB009BCEA0D46DD74540A2887BA61B6293C8B5106762E13B9CE64ACAAD608A7A34
6,039,185 UART: mbox::rt_entry...
6,039,557 UART: ____ _ _ _ ____ _____
6,040,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,041,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,041,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,042,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,043,445 UART: |_|
6,043,757 UART:
6,324,210 UART: [rt] Runtime listening for mailbox commands...
6,325,400 >>> mbox cmd response data (48 bytes)
6,325,401 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,328,184 >>> mbox cmd response data (48 bytes)
6,328,185 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,343,322 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,696 UART: [state] LifecycleState = Unprovisioned
86,351 UART: [state] DebugLocked = No
87,037 UART: [state] WD Timer not started. Device not locked for debugging
88,398 UART: [kat] SHA2-256
894,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,173 UART: [kat] ++
898,325 UART: [kat] sha1
902,439 UART: [kat] SHA2-256
904,379 UART: [kat] SHA2-384
907,164 UART: [kat] SHA2-512-ACC
909,065 UART: [kat] ECC-384
918,966 UART: [kat] HMAC-384Kdf
923,452 UART: [kat] LMS
1,171,780 UART: [kat] --
1,172,731 UART: [cold-reset] ++
1,173,117 UART: [fht] FHT @ 0x50003400
1,175,750 UART: [idev] ++
1,175,918 UART: [idev] CDI.KEYID = 6
1,176,278 UART: [idev] SUBJECT.KEYID = 7
1,176,702 UART: [idev] UDS.KEYID = 0
1,177,047 ready_for_fw is high
1,177,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,720 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,701 UART: [idev] --
1,210,939 UART: [ldev] ++
1,211,107 UART: [ldev] CDI.KEYID = 6
1,211,470 UART: [ldev] SUBJECT.KEYID = 5
1,211,896 UART: [ldev] AUTHORITY.KEYID = 7
1,212,359 UART: [ldev] FE.KEYID = 1
1,217,609 UART: [ldev] Erasing FE.KEYID = 1
1,244,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,151 UART: [ldev] --
1,283,576 UART: [fwproc] Wait for Commands...
1,284,364 UART: [fwproc] Recv command 0x46574c44
1,285,092 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,643 >>> mbox cmd response: success
2,773,759 UART: [afmc] ++
2,773,927 UART: [afmc] CDI.KEYID = 6
2,774,289 UART: [afmc] SUBJECT.KEYID = 7
2,774,714 UART: [afmc] AUTHORITY.KEYID = 5
2,809,817 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,272 UART: [afmc] --
2,853,154 UART: [cold-reset] --
2,854,160 UART: [state] Locking Datavault
2,855,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,079 UART: [state] Locking ICCM
2,856,731 UART: [exit] Launching FMC @ 0x40000130
2,862,060 UART:
2,862,076 UART: Running Caliptra FMC ...
2,862,484 UART:
2,862,538 UART: [state] CFI Enabled
2,873,043 UART: [fht] FMC Alias Private Key: 7
2,980,550 UART: [art] Extend RT PCRs Done
2,980,978 UART: [art] Lock RT PCRs Done
2,982,696 UART: [art] Populate DV Done
2,991,031 UART: [fht] FMC Alias Private Key: 7
2,992,015 UART: [art] Derive CDI
2,992,295 UART: [art] Store in in slot 0x4
3,077,930 UART: [art] Derive Key Pair
3,078,290 UART: [art] Store priv key in slot 0x5
3,091,280 UART: [art] Derive Key Pair - Done
3,105,906 UART: [art] Signing Cert with AUTHO
3,106,386 UART: RITY.KEYID = 7
3,121,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,145 UART: [art] PUB.X = 414552335268299DC6FB87898956233F4E5F143C4BB4F6FAF5E713EF2857A743293B538EE5301AF8520EEBB9ECB1625C
3,128,912 UART: [art] PUB.Y = D208E224DF0538B873DEBBC42DE9A2635781BEFC9105FB64ED71C30BF86B4233D2DC443C34824AFBCC826FCC62D0B8B8
3,135,868 UART: [art] SIG.R = 70A051CF9DECBE4B704A690DC40D2EB844B23FD55D35848DD755CBDE7E6129B310605D4486EC1B60764DC680D6BA8BDD
3,142,648 UART: [art] SIG.S = 9C52387D208E290D62B2407D446A4E378AD482C6E5029D8D1000345BC41F988521C2B33165B5EAF16679615447D7DB3C
3,166,325 UART: Caliptra RT
3,166,578 UART: [state] CFI Enabled
3,274,751 UART: [rt] RT listening for mailbox commands...
3,275,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,891 UART: [rt]cmd =0x4d454153, len=108
3,326,738 >>> mbox cmd response data (12 bytes)
3,326,739 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,696 UART:
3,327,712 UART: Running Caliptra ROM ...
3,328,120 UART:
3,328,175 UART: [state] CFI Enabled
3,330,521 UART: [state] LifecycleState = Unprovisioned
3,331,176 UART: [state] DebugLocked = No
3,331,730 UART: [state] WD Timer not started. Device not locked for debugging
3,333,036 UART: [kat] SHA2-256
4,138,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,142,811 UART: [kat] ++
4,142,963 UART: [kat] sha1
4,147,175 UART: [kat] SHA2-256
4,149,115 UART: [kat] SHA2-384
4,152,060 UART: [kat] SHA2-512-ACC
4,153,960 UART: [kat] ECC-384
4,163,813 UART: [kat] HMAC-384Kdf
4,168,447 UART: [kat] LMS
4,416,775 UART: [kat] --
4,417,583 UART: [update-reset] ++
5,319,211 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,320,256 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,416,266 >>> mbox cmd response: success
5,416,266 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,511 UART: [update-reset] Copying MAN_2 To MAN_1
5,424,525 UART: [update-reset Success] --
5,425,526 UART: [state] Locking Datavault
5,426,390 UART: [state] Locking PCR0, PCR1 and PCR31
5,426,994 UART: [state] Locking ICCM
5,427,614 UART: [exit] Launching FMC @ 0x40000130
5,432,943 UART:
5,432,959 UART: Running Caliptra FMC ...
5,433,367 UART:
5,433,421 UART: [state] CFI Enabled
5,522,088 UART: [art] Extend RT PCRs Done
5,522,516 UART: [art] Lock RT PCRs Done
5,524,073 UART: [art] Populate DV Done
5,532,442 UART: [fht] FMC Alias Private Key: 7
5,533,560 UART: [art] Derive CDI
5,533,840 UART: [art] Store in in slot 0x4
5,619,371 UART: [art] Derive Key Pair
5,619,731 UART: [art] Store priv key in slot 0x5
5,632,435 UART: [art] Derive Key Pair - Done
5,647,172 UART: [art] Signing Cert with AUTHO
5,647,652 UART: RITY.KEYID = 7
5,662,564 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,329 UART: [art] PUB.X = FE01B75C4187EE74D1F54B9550C2E46046156114B7387A5D971D4F61839EF875320DFAA13B56985B50238EA762954E23
5,670,085 UART: [art] PUB.Y = 9A937B318304FAE05D889CC85200BC75B5A170ED9A5B1F8734EED72FA87A3FD13DCE3AD9B78888171860CAD5C0026255
5,677,015 UART: [art] SIG.R = A3F1FD7D36A1A7355685F432ACB8C6643D879E3E0EE541D3D2D7476572D133D1B8873A86986431191F9738BA42A5107C
5,683,778 UART: [art] SIG.S = 7BDF95598F10449AE0EA03B5308186A610F474D12835E16DD1C280EC8475812C00BBA75E1266EEBA3B873E208751BC21
5,707,478 UART: mbox::rt_entry...
5,707,850 UART: ____ _ _ _ ____ _____
5,708,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,709,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,710,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,710,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,711,738 UART: |_|
5,712,050 UART:
5,991,542 UART: [rt] Runtime listening for mailbox commands...
5,992,732 >>> mbox cmd response data (48 bytes)
5,992,733 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,995,516 >>> mbox cmd response data (48 bytes)
5,995,517 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,010,654 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,093 ready_for_fw is high
1,060,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,722 >>> mbox cmd response: success
2,685,892 UART:
2,685,908 UART: Running Caliptra FMC ...
2,686,316 UART:
2,686,370 UART: [state] CFI Enabled
2,697,045 UART: [fht] FMC Alias Private Key: 7
2,804,756 UART: [art] Extend RT PCRs Done
2,805,184 UART: [art] Lock RT PCRs Done
2,806,504 UART: [art] Populate DV Done
2,814,587 UART: [fht] FMC Alias Private Key: 7
2,815,589 UART: [art] Derive CDI
2,815,869 UART: [art] Store in in slot 0x4
2,901,634 UART: [art] Derive Key Pair
2,901,994 UART: [art] Store priv key in slot 0x5
2,915,120 UART: [art] Derive Key Pair - Done
2,929,867 UART: [art] Signing Cert with AUTHO
2,930,347 UART: RITY.KEYID = 7
2,945,511 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,276 UART: [art] PUB.X = 19E3BBB1F66EE3B5FAFF293BA374DD85C3CBC29B507D824EB078E3EA11CC3F7ACF585F0AD92963E84ECDD1435174D095
2,953,065 UART: [art] PUB.Y = 4A3D046AA5336213DA314BC1C68E1482C9643380AEF82FE861FEFF7213D74F43A4B8055393E5A10DECEE61ACCB8E0F75
2,960,015 UART: [art] SIG.R = 6321CD8C4C536CEFF41017C1FB054A2A24C7B154B8DB99EF460EA044D8B5E5AF5E4C11A230730FB88FA5E7E1A6C9A73E
2,966,794 UART: [art] SIG.S = 206CB7655B72A013959560A00B54ADE4E540571A296147DB0D70006DEBF443AB91943443AD26C4FB6F44ACD7660105AC
2,990,539 UART: Caliptra RT
2,990,792 UART: [state] CFI Enabled
3,098,941 UART: [rt] RT listening for mailbox commands...
3,099,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,873 UART: [rt]cmd =0x4d454153, len=108
3,149,946 >>> mbox cmd response data (12 bytes)
3,149,947 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,124,869 >>> mbox cmd response: success
5,124,869 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,138,357 UART:
5,138,373 UART: Running Caliptra FMC ...
5,138,781 UART:
5,138,835 UART: [state] CFI Enabled
5,228,356 UART: [art] Extend RT PCRs Done
5,228,784 UART: [art] Lock RT PCRs Done
5,230,033 UART: [art] Populate DV Done
5,238,232 UART: [fht] FMC Alias Private Key: 7
5,239,204 UART: [art] Derive CDI
5,239,484 UART: [art] Store in in slot 0x4
5,325,087 UART: [art] Derive Key Pair
5,325,447 UART: [art] Store priv key in slot 0x5
5,338,219 UART: [art] Derive Key Pair - Done
5,352,966 UART: [art] Signing Cert with AUTHO
5,353,446 UART: RITY.KEYID = 7
5,368,452 UART: [art] Erasing AUTHORITY.KEYID = 7
5,369,217 UART: [art] PUB.X = F40C7BB93D4AB4028143FA886C6A954283F3ACF1A74F70ECB53DF3B928DEBA6603BB9C79E89EB879FE13CA085946A5CD
5,375,993 UART: [art] PUB.Y = 88D20B033EA9A43FEF93E0D71030D0ED7D301A927743CF5D27D85953AF83CDD1A57C1E95252700A60683C44C891077DE
5,382,914 UART: [art] SIG.R = 27114F9C0E336AA20C057C87B1F2604979B55F867CC8AAE916C5519A6E44B9E2DBBE85C310C9C721E90E7B6FE12DC1F1
5,389,682 UART: [art] SIG.S = 35AC7D04B4DD6D567A4D77B30A2E46A8FC2EB8ADC9884F1BEE3B1FD76518DBAEC326737AE0CAD43167570B063FF77504
5,413,682 UART: mbox::rt_entry...
5,414,054 UART: ____ _ _ _ ____ _____
5,414,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,415,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,416,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,417,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,417,942 UART: |_|
5,418,254 UART:
5,699,240 UART: [rt] Runtime listening for mailbox commands...
5,700,430 >>> mbox cmd response data (48 bytes)
5,700,431 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,703,214 >>> mbox cmd response data (48 bytes)
5,703,215 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,718,352 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,454 UART: [kat] SHA2-256
904,394 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
919,105 UART: [kat] HMAC-384Kdf
923,755 UART: [kat] LMS
1,172,083 UART: [kat] --
1,173,010 UART: [cold-reset] ++
1,173,366 UART: [fht] FHT @ 0x50003400
1,175,947 UART: [idev] ++
1,176,115 UART: [idev] CDI.KEYID = 6
1,176,475 UART: [idev] SUBJECT.KEYID = 7
1,176,899 UART: [idev] UDS.KEYID = 0
1,177,244 ready_for_fw is high
1,177,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,097 UART: [idev] Erasing UDS.KEYID = 0
1,202,366 UART: [idev] Sha1 KeyId Algorithm
1,210,724 UART: [idev] --
1,211,770 UART: [ldev] ++
1,211,938 UART: [ldev] CDI.KEYID = 6
1,212,301 UART: [ldev] SUBJECT.KEYID = 5
1,212,727 UART: [ldev] AUTHORITY.KEYID = 7
1,213,190 UART: [ldev] FE.KEYID = 1
1,218,628 UART: [ldev] Erasing FE.KEYID = 1
1,245,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,680 UART: [ldev] --
1,284,993 UART: [fwproc] Wait for Commands...
1,285,613 UART: [fwproc] Recv command 0x46574c44
1,286,341 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,404 >>> mbox cmd response: success
2,773,552 UART: [afmc] ++
2,773,720 UART: [afmc] CDI.KEYID = 6
2,774,082 UART: [afmc] SUBJECT.KEYID = 7
2,774,507 UART: [afmc] AUTHORITY.KEYID = 5
2,810,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,711 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,324 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,043 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,717 UART: [afmc] --
2,853,785 UART: [cold-reset] --
2,854,637 UART: [state] Locking Datavault
2,855,744 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,348 UART: [state] Locking ICCM
2,856,980 UART: [exit] Launching FMC @ 0x40000130
2,862,309 UART:
2,862,325 UART: Running Caliptra FMC ...
2,862,733 UART:
2,862,876 UART: [state] CFI Enabled
2,873,153 UART: [fht] FMC Alias Private Key: 7
2,981,262 UART: [art] Extend RT PCRs Done
2,981,690 UART: [art] Lock RT PCRs Done
2,983,224 UART: [art] Populate DV Done
2,991,475 UART: [fht] FMC Alias Private Key: 7
2,992,537 UART: [art] Derive CDI
2,992,817 UART: [art] Store in in slot 0x4
3,078,660 UART: [art] Derive Key Pair
3,079,020 UART: [art] Store priv key in slot 0x5
3,092,724 UART: [art] Derive Key Pair - Done
3,107,543 UART: [art] Signing Cert with AUTHO
3,108,023 UART: RITY.KEYID = 7
3,123,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,094 UART: [art] PUB.X = 557EC79B16131F20F0F9B3C0FA8BA39676F09ADFCBB3314394677B680668BBDACAED0C1E34C79BFD02D5AB4AC8A31D0B
3,130,874 UART: [art] PUB.Y = EF38BC49AAE660473AE159BEE0008EB6DD406CF4A8994D4081269EF6CA52A169C83BC29AF5D0B07BEE504D3E239B2DD8
3,137,820 UART: [art] SIG.R = 9DF00C6D780BB6ED0F90A51688410D9E18C414823E610D86A84DA07BD992DD4A372F8AB85A14DF9E1472574BB049C448
3,144,579 UART: [art] SIG.S = 7C94AF6BDE1A082D77E132F4A1D183970F4FDD4A5B6ABF26F0EBD9BF20274C29323754FBE8F96520BDE6C903DBFEAC7D
3,168,367 UART: Caliptra RT
3,168,712 UART: [state] CFI Enabled
3,276,001 UART: [rt] RT listening for mailbox commands...
3,276,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,235 UART: [rt]cmd =0x4d454153, len=108
3,327,494 >>> mbox cmd response data (12 bytes)
3,327,495 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,094 UART:
3,328,110 UART: Running Caliptra ROM ...
3,328,518 UART:
3,328,660 UART: [state] CFI Enabled
3,331,410 UART: [state] LifecycleState = Unprovisioned
3,332,065 UART: [state] DebugLocked = No
3,332,715 UART: [state] WD Timer not started. Device not locked for debugging
3,334,053 UART: [kat] SHA2-256
4,139,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,143,828 UART: [kat] ++
4,143,980 UART: [kat] sha1
4,148,294 UART: [kat] SHA2-256
4,150,234 UART: [kat] SHA2-384
4,152,943 UART: [kat] SHA2-512-ACC
4,154,843 UART: [kat] ECC-384
4,164,850 UART: [kat] HMAC-384Kdf
4,169,492 UART: [kat] LMS
4,417,820 UART: [kat] --
4,418,728 UART: [update-reset] ++
5,320,460 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,321,653 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,417,663 >>> mbox cmd response: success
5,417,663 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,417,776 UART: [update-reset] Copying MAN_2 To MAN_1
5,425,790 UART: [update-reset Success] --
5,426,847 UART: [state] Locking Datavault
5,427,545 UART: [state] Locking PCR0, PCR1 and PCR31
5,428,149 UART: [state] Locking ICCM
5,428,715 UART: [exit] Launching FMC @ 0x40000130
5,434,044 UART:
5,434,060 UART: Running Caliptra FMC ...
5,434,468 UART:
5,434,611 UART: [state] CFI Enabled
5,524,198 UART: [art] Extend RT PCRs Done
5,524,626 UART: [art] Lock RT PCRs Done
5,526,059 UART: [art] Populate DV Done
5,534,350 UART: [fht] FMC Alias Private Key: 7
5,535,348 UART: [art] Derive CDI
5,535,628 UART: [art] Store in in slot 0x4
5,621,283 UART: [art] Derive Key Pair
5,621,643 UART: [art] Store priv key in slot 0x5
5,634,541 UART: [art] Derive Key Pair - Done
5,649,251 UART: [art] Signing Cert with AUTHO
5,649,731 UART: RITY.KEYID = 7
5,664,881 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,646 UART: [art] PUB.X = FB9E77270A0C83603C83047EE908194D32886817EE9FB20627C35A5854A7FFEB3570AF3D9AC41F406C185A6DC736F93C
5,672,403 UART: [art] PUB.Y = C73CCE306A975EF0F209CEF2A439691387C48E36BE1E6820C0279328552CB5BFE097727B70882113154534DBBAAF71F9
5,679,350 UART: [art] SIG.R = 1D495A49DDC28DA76BA8109D208AA3DF51404B28561ADC9F4D878E73B7BD131B329DA104C94F0F54A2A6F728CF8B40EE
5,686,128 UART: [art] SIG.S = B843DC947A0B035233A212BC9B6454F3362AAA28CDB18D0D5E46B3EDFB1AE61B60A238622014062D7907D38191DDAD4D
5,710,678 UART: mbox::rt_entry...
5,711,050 UART: ____ _ _ _ ____ _____
5,711,834 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,712,634 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,713,402 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,714,170 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,714,938 UART: |_|
5,715,250 UART:
5,997,774 UART: [rt] Runtime listening for mailbox commands...
5,998,964 >>> mbox cmd response data (48 bytes)
5,998,965 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,001,748 >>> mbox cmd response data (48 bytes)
6,001,749 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,016,886 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,928 ready_for_fw is high
1,060,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,787 >>> mbox cmd response: success
2,687,849 UART:
2,687,865 UART: Running Caliptra FMC ...
2,688,273 UART:
2,688,416 UART: [state] CFI Enabled
2,698,799 UART: [fht] FMC Alias Private Key: 7
2,806,978 UART: [art] Extend RT PCRs Done
2,807,406 UART: [art] Lock RT PCRs Done
2,808,614 UART: [art] Populate DV Done
2,816,813 UART: [fht] FMC Alias Private Key: 7
2,817,913 UART: [art] Derive CDI
2,818,193 UART: [art] Store in in slot 0x4
2,904,222 UART: [art] Derive Key Pair
2,904,582 UART: [art] Store priv key in slot 0x5
2,917,946 UART: [art] Derive Key Pair - Done
2,932,600 UART: [art] Signing Cert with AUTHO
2,933,080 UART: RITY.KEYID = 7
2,948,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,039 UART: [art] PUB.X = CFDE534C35587FF2B072E514142F48028E878EF7B74CC274876DA2F1C8ED3F387A2718E857DE31239539391C1D97745C
2,955,804 UART: [art] PUB.Y = A17BA86C7A3E501B61E815B3A8E7A47219EFD4A38C1CDD4DC3EAECE5C5D837EAEAF029DF4991D71C4704D74CFC74CB45
2,962,777 UART: [art] SIG.R = 15C81FC60FA968F24141158210310C295D56D05FD4D5FD89764F7B4233FEF2D80AD293D73191A22D856DA4CD15F807D7
2,969,535 UART: [art] SIG.S = 37C65D1B5C44F82DCB8243AD4FDA76A703C3B4EDF4C48348144A5C3001CD1ECBE01F3AFB3EEF1E27CA234633AA86D6AE
2,993,492 UART: Caliptra RT
2,993,837 UART: [state] CFI Enabled
3,101,650 UART: [rt] RT listening for mailbox commands...
3,102,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,754 UART: [rt]cmd =0x4d454153, len=108
3,153,729 >>> mbox cmd response data (12 bytes)
3,153,730 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,125,225 >>> mbox cmd response: success
5,125,225 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,138,413 UART:
5,138,429 UART: Running Caliptra FMC ...
5,138,837 UART:
5,138,980 UART: [state] CFI Enabled
5,228,341 UART: [art] Extend RT PCRs Done
5,228,769 UART: [art] Lock RT PCRs Done
5,230,238 UART: [art] Populate DV Done
5,238,453 UART: [fht] FMC Alias Private Key: 7
5,239,411 UART: [art] Derive CDI
5,239,691 UART: [art] Store in in slot 0x4
5,325,280 UART: [art] Derive Key Pair
5,325,640 UART: [art] Store priv key in slot 0x5
5,339,008 UART: [art] Derive Key Pair - Done
5,353,544 UART: [art] Signing Cert with AUTHO
5,354,024 UART: RITY.KEYID = 7
5,369,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,343 UART: [art] PUB.X = 9EE7182817B3E7FE5B4021EBC615579193D742D93C6EAA28BF50E7F71135EAA0493326C950637ED4537C6AB5E2E597A3
5,377,115 UART: [art] PUB.Y = 33374D794C4B216CAE32995B6D1264418D432343A93CEB3EA765699FCB9C8BA3C255C3FB1EF186F02C9B7EBC5A5C1D06
5,384,072 UART: [art] SIG.R = 03BE1C884155AE6554752F2F170DB07E1742395C19D22BEAEA1CAB1DCE3C726EB217A4899059A4CFE42487113EEE4CAD
5,390,848 UART: [art] SIG.S = 9746908017D2768FBBBA01EBCDD77DF56871A0E339C879BCEC75CA65F7B906068A75AAD6AF6CC2D1A42258D5A2A57942
5,413,920 UART: mbox::rt_entry...
5,414,292 UART: ____ _ _ _ ____ _____
5,415,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,415,876 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,416,644 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,417,412 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,418,180 UART: |_|
5,418,492 UART:
5,697,584 UART: [rt] Runtime listening for mailbox commands...
5,698,774 >>> mbox cmd response data (48 bytes)
5,698,775 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,701,558 >>> mbox cmd response data (48 bytes)
5,701,559 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,716,696 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 ready_for_fw is high
1,174,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,313 UART: [idev] Sha1 KeyId Algorithm
1,208,125 UART: [idev] --
1,209,054 UART: [ldev] ++
1,209,222 UART: [ldev] CDI.KEYID = 6
1,209,586 UART: [ldev] SUBJECT.KEYID = 5
1,210,013 UART: [ldev] AUTHORITY.KEYID = 7
1,210,476 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,769 UART: [fwproc] Recv command 0x46574c44
1,282,502 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,255 >>> mbox cmd response: success
2,770,436 UART: [afmc] ++
2,770,604 UART: [afmc] CDI.KEYID = 6
2,770,967 UART: [afmc] SUBJECT.KEYID = 7
2,771,393 UART: [afmc] AUTHORITY.KEYID = 5
2,806,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,043 UART: [afmc] --
2,850,045 UART: [cold-reset] --
2,850,957 UART: [state] Locking Datavault
2,852,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,784 UART: [state] Locking ICCM
2,853,270 UART: [exit] Launching FMC @ 0x40000130
2,858,599 UART:
2,858,615 UART: Running Caliptra FMC ...
2,859,023 UART:
2,859,077 UART: [state] CFI Enabled
2,869,438 UART: [fht] FMC Alias Private Key: 7
2,977,887 UART: [art] Extend RT PCRs Done
2,978,315 UART: [art] Lock RT PCRs Done
2,979,653 UART: [art] Populate DV Done
2,987,666 UART: [fht] FMC Alias Private Key: 7
2,988,650 UART: [art] Derive CDI
2,988,930 UART: [art] Store in in slot 0x4
3,074,741 UART: [art] Derive Key Pair
3,075,101 UART: [art] Store priv key in slot 0x5
3,088,139 UART: [art] Derive Key Pair - Done
3,102,626 UART: [art] Signing Cert with AUTHO
3,103,106 UART: RITY.KEYID = 7
3,118,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,989 UART: [art] PUB.X = 2987AB07878DBA7C891F91B543793064D20E811A54ED055C12258C2ACCE555C3DD061FCD60C5529C13567D1DF9401DEA
3,125,751 UART: [art] PUB.Y = 375C5229DF8F1DF29A350523A8F5FDA7ACA439029C08B7863837866B891037B1C977D29BFCA2EECE430262AA2BABB0AC
3,132,701 UART: [art] SIG.R = 709C7595C9E1393A06E038F50936924B4BB0783C1A69835B684B3540015525C4AF0EE632A71058C14251BBD4844F4D7B
3,139,449 UART: [art] SIG.S = 17A46796D2718E9C009114308131ED5C53FC7FE77FA878800CE720E691E0DF2DA0F6697C91D46CD50FDAB79B1925197B
3,163,454 UART: Caliptra RT
3,163,707 UART: [state] CFI Enabled
3,271,410 UART: [rt] RT listening for mailbox commands...
3,272,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,796 UART: [rt]cmd =0x4d454153, len=108
3,323,587 >>> mbox cmd response data (12 bytes)
3,323,588 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,257 UART:
3,324,273 UART: Running Caliptra ROM ...
3,324,681 UART:
3,324,736 UART: [state] CFI Enabled
3,326,954 UART: [state] LifecycleState = Unprovisioned
3,327,609 UART: [state] DebugLocked = No
3,328,321 UART: [state] WD Timer not started. Device not locked for debugging
3,329,581 UART: [kat] SHA2-256
4,133,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,137,260 UART: [kat] ++
4,137,412 UART: [kat] sha1
4,141,724 UART: [kat] SHA2-256
4,143,664 UART: [kat] SHA2-384
4,146,527 UART: [kat] SHA2-512-ACC
4,148,427 UART: [kat] ECC-384
4,157,950 UART: [kat] HMAC-384Kdf
4,162,672 UART: [kat] LMS
4,410,984 UART: [kat] --
4,411,756 UART: [update-reset] ++
5,314,747 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,315,718 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,411,728 >>> mbox cmd response: success
5,411,728 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,412,085 UART: [update-reset] Copying MAN_2 To MAN_1
5,420,099 UART: [update-reset Success] --
5,421,172 UART: [state] Locking Datavault
5,421,822 UART: [state] Locking PCR0, PCR1 and PCR31
5,422,426 UART: [state] Locking ICCM
5,422,982 UART: [exit] Launching FMC @ 0x40000130
5,428,311 UART:
5,428,327 UART: Running Caliptra FMC ...
5,428,735 UART:
5,428,789 UART: [state] CFI Enabled
5,518,036 UART: [art] Extend RT PCRs Done
5,518,464 UART: [art] Lock RT PCRs Done
5,519,883 UART: [art] Populate DV Done
5,528,022 UART: [fht] FMC Alias Private Key: 7
5,529,028 UART: [art] Derive CDI
5,529,308 UART: [art] Store in in slot 0x4
5,614,645 UART: [art] Derive Key Pair
5,615,005 UART: [art] Store priv key in slot 0x5
5,628,291 UART: [art] Derive Key Pair - Done
5,643,117 UART: [art] Signing Cert with AUTHO
5,643,597 UART: RITY.KEYID = 7
5,658,895 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,660 UART: [art] PUB.X = 484B51302259D72AD0A2C8A823C112E14D3062076C9B39FA151DAC7023D4427441F46D3D16550D739B359B7D62F1EDE5
5,666,420 UART: [art] PUB.Y = 59325AC3D391E49EACBFA6D6682B86403E08FFA71B8F6920F5C177CD7E5ED7A0757DB326CEB4334EE647AB59D178A395
5,673,379 UART: [art] SIG.R = 5550B7A09F3C295162B802C6B314B0E17DFE50F6417C1ACF16ABAEFF9E67081B69BDE9FEB599937A5692306AC2FD8B8A
5,680,157 UART: [art] SIG.S = BC2ABD8519401ECF195DC933D40D59E4EC785809A28800172D4297763BE7275B60157A0D0A4E9A0B8EEB32159CF75302
5,704,378 UART: mbox::rt_entry...
5,704,750 UART: ____ _ _ _ ____ _____
5,705,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,706,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,707,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,707,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,708,638 UART: |_|
5,708,950 UART:
5,991,226 UART: [rt] Runtime listening for mailbox commands...
5,992,416 >>> mbox cmd response data (48 bytes)
5,992,417 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,995,200 >>> mbox cmd response data (48 bytes)
5,995,201 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,010,338 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,206 ready_for_fw is high
1,056,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,853 >>> mbox cmd response: success
2,681,665 UART:
2,681,681 UART: Running Caliptra FMC ...
2,682,089 UART:
2,682,143 UART: [state] CFI Enabled
2,692,348 UART: [fht] FMC Alias Private Key: 7
2,800,003 UART: [art] Extend RT PCRs Done
2,800,431 UART: [art] Lock RT PCRs Done
2,801,879 UART: [art] Populate DV Done
2,810,250 UART: [fht] FMC Alias Private Key: 7
2,811,356 UART: [art] Derive CDI
2,811,636 UART: [art] Store in in slot 0x4
2,897,287 UART: [art] Derive Key Pair
2,897,647 UART: [art] Store priv key in slot 0x5
2,910,929 UART: [art] Derive Key Pair - Done
2,925,678 UART: [art] Signing Cert with AUTHO
2,926,158 UART: RITY.KEYID = 7
2,941,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,197 UART: [art] PUB.X = 783AB42DCE87112DBEE3242EF80B49496674C51FBDF3B49E6A8FE4645342867BE91424762CC62DA0C5A93D2EAFCE4042
2,948,974 UART: [art] PUB.Y = CC05283C5E7A4931B4FAAAA1008E208FB550CC0EF43BF36C0006B9CF7245E7EA9DA646C18FFAB249234AFA1ECB7DB537
2,955,893 UART: [art] SIG.R = 04726AB710E8C5EB36A011C121315090CEE355531480C373670AC7318212DE870C4A5EC5E5D0A49E794D36FA043D721A
2,962,647 UART: [art] SIG.S = EAC318222782810F5BEB34B27AADCF43591186D7FEABE74384F37C530897A853F141E313F0089FE1A23E79D4ECDA58A3
2,986,221 UART: Caliptra RT
2,986,474 UART: [state] CFI Enabled
3,094,305 UART: [rt] RT listening for mailbox commands...
3,094,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,615 UART: [rt]cmd =0x4d454153, len=108
3,145,890 >>> mbox cmd response data (12 bytes)
3,145,891 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,115,238 >>> mbox cmd response: success
5,115,238 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,128,452 UART:
5,128,468 UART: Running Caliptra FMC ...
5,128,876 UART:
5,128,930 UART: [state] CFI Enabled
5,218,181 UART: [art] Extend RT PCRs Done
5,218,609 UART: [art] Lock RT PCRs Done
5,219,610 UART: [art] Populate DV Done
5,227,833 UART: [fht] FMC Alias Private Key: 7
5,228,997 UART: [art] Derive CDI
5,229,277 UART: [art] Store in in slot 0x4
5,315,010 UART: [art] Derive Key Pair
5,315,370 UART: [art] Store priv key in slot 0x5
5,328,148 UART: [art] Derive Key Pair - Done
5,343,330 UART: [art] Signing Cert with AUTHO
5,343,810 UART: RITY.KEYID = 7
5,358,608 UART: [art] Erasing AUTHORITY.KEYID = 7
5,359,373 UART: [art] PUB.X = C368A350D8919282EEBA257901EDD0D028ABC76BDED90BDE7C174BC75A1CAE74C600DEBA09A68D5E7147BE0CDE00D990
5,366,109 UART: [art] PUB.Y = C9B8061449B3FF059D44316EAFAB89C626C7EA8A6B4D4D9C622852EE2D1C0EBC0813E177905BBEFEF60476BB43D3F28C
5,373,060 UART: [art] SIG.R = 43A17791BF6071608DFB38C6522456BDDC2BA67DC4464A5783482ED3D61B5DE571D896D53366780D492E8B4950F6F820
5,379,823 UART: [art] SIG.S = 534ED8E9A305C486DBDCF1D6952B86DA6F7449AFF562124B450809A0B5AC1E4571DCEF7F5DB8E42D015ADD8CCD6F151F
5,402,918 UART: mbox::rt_entry...
5,403,290 UART: ____ _ _ _ ____ _____
5,404,074 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,404,874 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,405,642 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,406,410 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,407,178 UART: |_|
5,407,490 UART:
5,686,586 UART: [rt] Runtime listening for mailbox commands...
5,687,776 >>> mbox cmd response data (48 bytes)
5,687,777 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,690,560 >>> mbox cmd response data (48 bytes)
5,690,561 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,705,698 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,358 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,174,270 ready_for_fw is high
1,174,270 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,666 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,215 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,056 >>> mbox cmd response: success
2,772,083 UART: [afmc] ++
2,772,251 UART: [afmc] CDI.KEYID = 6
2,772,614 UART: [afmc] SUBJECT.KEYID = 7
2,773,040 UART: [afmc] AUTHORITY.KEYID = 5
2,808,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,682 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,214 UART: [afmc] --
2,851,102 UART: [cold-reset] --
2,852,056 UART: [state] Locking Datavault
2,853,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,937 UART: [state] Locking ICCM
2,854,371 UART: [exit] Launching FMC @ 0x40000130
2,859,700 UART:
2,859,716 UART: Running Caliptra FMC ...
2,860,124 UART:
2,860,267 UART: [state] CFI Enabled
2,870,920 UART: [fht] FMC Alias Private Key: 7
2,979,543 UART: [art] Extend RT PCRs Done
2,979,971 UART: [art] Lock RT PCRs Done
2,981,431 UART: [art] Populate DV Done
2,989,614 UART: [fht] FMC Alias Private Key: 7
2,990,610 UART: [art] Derive CDI
2,990,890 UART: [art] Store in in slot 0x4
3,076,711 UART: [art] Derive Key Pair
3,077,071 UART: [art] Store priv key in slot 0x5
3,090,659 UART: [art] Derive Key Pair - Done
3,105,411 UART: [art] Signing Cert with AUTHO
3,105,891 UART: RITY.KEYID = 7
3,121,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,012 UART: [art] PUB.X = D358659026A9D069FC38D26D26C921E2BB0BEDD094796B3A7C7F16BD4AA22664D01F745212CAB6E9D375777105695DD9
3,128,778 UART: [art] PUB.Y = 843750A32E62732E9D0B87EF0CA3241ACA2EA6C19561755B165A46633257FF1C62B5A6682CBB9222661CE39C894DD74A
3,135,722 UART: [art] SIG.R = CB933EC4C50B962D23093238CE20EDF098FEDF7842F68E5FE711A1D0CB948BA7D81A2966227CF6A7FC721455E51F53A2
3,142,496 UART: [art] SIG.S = FED9587F75FF78381ACA2A360A64B2E37ABE94A7B438EC1E99627506FD841D031E0885FEA90F3B39985A275E7DDC91FE
3,166,872 UART: Caliptra RT
3,167,217 UART: [state] CFI Enabled
3,275,281 UART: [rt] RT listening for mailbox commands...
3,275,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,841 UART: [rt]cmd =0x4d454153, len=108
3,328,100 >>> mbox cmd response data (12 bytes)
3,328,101 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,732 UART:
3,328,748 UART: Running Caliptra ROM ...
3,329,156 UART:
3,329,298 UART: [state] CFI Enabled
3,332,192 UART: [state] LifecycleState = Unprovisioned
3,332,847 UART: [state] DebugLocked = No
3,333,581 UART: [state] WD Timer not started. Device not locked for debugging
3,334,713 UART: [kat] SHA2-256
4,138,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,142,392 UART: [kat] ++
4,142,544 UART: [kat] sha1
4,146,646 UART: [kat] SHA2-256
4,148,586 UART: [kat] SHA2-384
4,151,341 UART: [kat] SHA2-512-ACC
4,153,241 UART: [kat] ECC-384
4,163,272 UART: [kat] HMAC-384Kdf
4,167,828 UART: [kat] LMS
4,416,140 UART: [kat] --
4,417,064 UART: [update-reset] ++
5,318,031 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,319,114 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,415,124 >>> mbox cmd response: success
5,415,124 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,415,467 UART: [update-reset] Copying MAN_2 To MAN_1
5,423,481 UART: [update-reset Success] --
5,424,472 UART: [state] Locking Datavault
5,425,252 UART: [state] Locking PCR0, PCR1 and PCR31
5,425,856 UART: [state] Locking ICCM
5,426,470 UART: [exit] Launching FMC @ 0x40000130
5,431,799 UART:
5,431,815 UART: Running Caliptra FMC ...
5,432,223 UART:
5,432,366 UART: [state] CFI Enabled
5,521,347 UART: [art] Extend RT PCRs Done
5,521,775 UART: [art] Lock RT PCRs Done
5,523,278 UART: [art] Populate DV Done
5,531,343 UART: [fht] FMC Alias Private Key: 7
5,532,297 UART: [art] Derive CDI
5,532,577 UART: [art] Store in in slot 0x4
5,618,590 UART: [art] Derive Key Pair
5,618,950 UART: [art] Store priv key in slot 0x5
5,632,610 UART: [art] Derive Key Pair - Done
5,647,225 UART: [art] Signing Cert with AUTHO
5,647,705 UART: RITY.KEYID = 7
5,662,843 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,608 UART: [art] PUB.X = 7F93ED6456010B733B31CFC67103BFD7C33366D1192E29F61CDE217DB10F2A7DA426E6C563FE43E643A6B0459CFBEDF3
5,670,378 UART: [art] PUB.Y = B54F026CE730EBA99776675746F7B1F9479774FDA9C1138AA95020AEB9DB6E1D8F4CA507AEF169E49BD12FB9900CE425
5,677,329 UART: [art] SIG.R = 6DADE6195B9C652A363FE356B167C9838CE7BCABC6AAB7F5DCB19E9C9F181975E883A1177BB00E61EDBCBCA6355F3581
5,684,116 UART: [art] SIG.S = 421CAEBC30DC8B1E30060B40A9FDEFE9E3204DA98BAEC50C93709B890766AA64C54F68F6E515E838A80757A8FF0132BD
5,707,479 UART: mbox::rt_entry...
5,707,851 UART: ____ _ _ _ ____ _____
5,708,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,709,435 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,710,203 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,710,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,711,739 UART: |_|
5,712,051 UART:
5,989,475 UART: [rt] Runtime listening for mailbox commands...
5,990,665 >>> mbox cmd response data (48 bytes)
5,990,666 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,993,449 >>> mbox cmd response data (48 bytes)
5,993,450 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,008,587 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,025 ready_for_fw is high
1,057,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,962 >>> mbox cmd response: success
2,681,342 UART:
2,681,358 UART: Running Caliptra FMC ...
2,681,766 UART:
2,681,909 UART: [state] CFI Enabled
2,692,334 UART: [fht] FMC Alias Private Key: 7
2,800,507 UART: [art] Extend RT PCRs Done
2,800,935 UART: [art] Lock RT PCRs Done
2,802,359 UART: [art] Populate DV Done
2,810,610 UART: [fht] FMC Alias Private Key: 7
2,811,774 UART: [art] Derive CDI
2,812,054 UART: [art] Store in in slot 0x4
2,897,697 UART: [art] Derive Key Pair
2,898,057 UART: [art] Store priv key in slot 0x5
2,910,989 UART: [art] Derive Key Pair - Done
2,925,956 UART: [art] Signing Cert with AUTHO
2,926,436 UART: RITY.KEYID = 7
2,942,014 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,779 UART: [art] PUB.X = 43D868BFA8F72E005ADC643C097DF766494E474895C944A3DD9C9CD257530CC5E2FCDABF749686CFB4EB845F446C8F36
2,949,533 UART: [art] PUB.Y = 4C1D36738C0C56AB3E1B622A298B4D1F4D8FD6CEB6AAFB36DAAD9F25AA344FF87D304CBF6A4C587AEBA7C0070B1262FA
2,956,502 UART: [art] SIG.R = 206A2049EAAC5A0D61CAEA7D3A278C5E3CAD648AC459274BB1BE5DE1DEA160FBDB6DF0285D1927E348F70BD693C9289D
2,963,288 UART: [art] SIG.S = D5ADE4EABA546DAAB98EB341C17E005F6B17652F422C738ED2139CDCFDB98E5A74C584FCE7312A31A31EBDB0358D0A35
2,987,156 UART: Caliptra RT
2,987,501 UART: [state] CFI Enabled
3,094,892 UART: [rt] RT listening for mailbox commands...
3,095,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,104 UART: [rt]cmd =0x4d454153, len=108
3,146,445 >>> mbox cmd response data (12 bytes)
3,146,446 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,115,746 >>> mbox cmd response: success
5,115,746 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,129,468 UART:
5,129,484 UART: Running Caliptra FMC ...
5,129,892 UART:
5,130,035 UART: [state] CFI Enabled
5,218,864 UART: [art] Extend RT PCRs Done
5,219,292 UART: [art] Lock RT PCRs Done
5,220,405 UART: [art] Populate DV Done
5,228,638 UART: [fht] FMC Alias Private Key: 7
5,229,730 UART: [art] Derive CDI
5,230,010 UART: [art] Store in in slot 0x4
5,315,289 UART: [art] Derive Key Pair
5,315,649 UART: [art] Store priv key in slot 0x5
5,329,267 UART: [art] Derive Key Pair - Done
5,344,168 UART: [art] Signing Cert with AUTHO
5,344,648 UART: RITY.KEYID = 7
5,359,794 UART: [art] Erasing AUTHORITY.KEYID = 7
5,360,559 UART: [art] PUB.X = 3D129B0882E525CCA7C585A9201378D9EB7D8C058D13AE49EA0B72960D54861F821C88F5F2084476CA76ACFACCCCD324
5,367,322 UART: [art] PUB.Y = 356948EA4FFA2988258F86EAFB1ECAE1D74E396FEBFA3CE244234CA44FD377C3DDBF23C432D9C463ADFB6D2D95ECBD67
5,374,300 UART: [art] SIG.R = 1A98BB6DE9B44C298C013325C9B9187AFC3887C22158BAFB061462B064F3555DC3C42F7CF6EAADE2AD69058A19D0EA19
5,381,073 UART: [art] SIG.S = 361B8E9E929A6A786C109279A3C578EE2F55F08D39D22D8678D3CE68D27D2F40D50C2617B44E003A8414BDAD084EF2C6
5,404,770 UART: mbox::rt_entry...
5,405,142 UART: ____ _ _ _ ____ _____
5,405,926 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,406,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,407,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,408,262 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,409,030 UART: |_|
5,409,342 UART:
5,688,620 UART: [rt] Runtime listening for mailbox commands...
5,689,810 >>> mbox cmd response data (48 bytes)
5,689,811 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,692,594 >>> mbox cmd response data (48 bytes)
5,692,595 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,707,732 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,118 UART:
192,498 UART: Running Caliptra ROM ...
193,599 UART:
193,748 UART: [state] CFI Enabled
265,149 UART: [state] LifecycleState = Unprovisioned
267,151 UART: [state] DebugLocked = No
269,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,531 UART: [kat] SHA2-256
443,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,685 UART: [kat] ++
454,141 UART: [kat] sha1
464,378 UART: [kat] SHA2-256
467,104 UART: [kat] SHA2-384
471,824 UART: [kat] SHA2-512-ACC
474,194 UART: [kat] ECC-384
2,764,944 UART: [kat] HMAC-384Kdf
2,778,627 UART: [kat] LMS
3,968,925 UART: [kat] --
3,973,894 UART: [cold-reset] ++
3,975,825 UART: [fht] Storing FHT @ 0x50003400
3,987,443 UART: [idev] ++
3,988,027 UART: [idev] CDI.KEYID = 6
3,988,959 UART: [idev] SUBJECT.KEYID = 7
3,990,212 UART: [idev] UDS.KEYID = 0
3,991,280 ready_for_fw is high
3,991,498 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,656 UART: [idev] Erasing UDS.KEYID = 0
7,324,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,042 UART: [idev] --
7,350,446 UART: [ldev] ++
7,351,027 UART: [ldev] CDI.KEYID = 6
7,352,047 UART: [ldev] SUBJECT.KEYID = 5
7,353,207 UART: [ldev] AUTHORITY.KEYID = 7
7,354,435 UART: [ldev] FE.KEYID = 1
7,402,773 UART: [ldev] Erasing FE.KEYID = 1
10,733,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,083 UART: [ldev] --
13,095,933 UART: [fwproc] Waiting for Commands...
13,099,114 UART: [fwproc] Received command 0x46574c44
13,101,298 UART: [fwproc] Received Image of size 113760 bytes
17,142,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,606,406 >>> mbox cmd response: success
17,606,958 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,611,225 UART: [afmc] ++
17,611,872 UART: [afmc] CDI.KEYID = 6
17,612,789 UART: [afmc] SUBJECT.KEYID = 7
17,614,002 UART: [afmc] AUTHORITY.KEYID = 5
20,988,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,208 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,630 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,457 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,931 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,534 UART: [afmc] --
23,358,456 UART: [cold-reset] --
23,362,863 UART: [state] Locking Datavault
23,366,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,077 UART: [state] Locking ICCM
23,370,880 UART: [exit] Launching FMC @ 0x40000130
23,379,276 UART:
23,379,514 UART: Running Caliptra FMC ...
23,380,617 UART:
23,380,774 UART: [state] CFI Enabled
23,447,126 UART: [fht] FMC Alias Private Key: 7
25,784,995 UART: [art] Extend RT PCRs Done
25,786,215 UART: [art] Lock RT PCRs Done
25,787,973 UART: [art] Populate DV Done
25,793,382 UART: [fht] FMC Alias Private Key: 7
25,795,083 UART: [art] Derive CDI
25,795,899 UART: [art] Store in in slot 0x4
25,855,022 UART: [art] Derive Key Pair
25,856,062 UART: [art] Store priv key in slot 0x5
29,148,485 UART: [art] Derive Key Pair - Done
29,161,640 UART: [art] Signing Cert with AUTHO
29,162,940 UART: RITY.KEYID = 7
31,450,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,258 UART: [art] PUB.X = 779D5E56DC80EFF144B5D3360F936E7961F6408C91BA249E410AB46AACD002FBE7ADA997DD288EA1E820697A02915F22
31,459,496 UART: [art] PUB.Y = 3DA92E4337EB655002815DA995BB1538E256ED7902EBF7BC46346C28FFDFB913D86994A603199FA6DD386A2961C3112F
31,466,718 UART: [art] SIG.R = C9D958204F4CF2610737DD623671C9B20197E2882FDEACB5AD4938C54D50B89C1C069381C9E6580D47BE51E4F5BE9713
31,474,122 UART: [art] SIG.S = 9381F9DD9F3BF4437424834BDE9F3C4BB580CA0629C82E881B1B389710A067470ECF45C8537EAA5E013CBDDEC07A0873
32,779,749 UART: Caliptra RT
32,780,452 UART: [state] CFI Enabled
32,961,899 UART: [rt] RT listening for mailbox commands...
32,993,310 UART: [rt]cmd =0x54514754, len=24
32,995,683 >>> mbox cmd response data (8 bytes)
32,996,119 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,025,920 UART: [rt]cmd =0x54514754, len=24
33,027,722 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,786,665 ready_for_fw is high
3,787,273 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,831,647 >>> mbox cmd response: success
17,832,311 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,525,205 UART:
23,525,591 UART: Running Caliptra FMC ...
23,526,700 UART:
23,526,853 UART: [state] CFI Enabled
23,595,218 UART: [fht] FMC Alias Private Key: 7
25,933,076 UART: [art] Extend RT PCRs Done
25,934,309 UART: [art] Lock RT PCRs Done
25,936,072 UART: [art] Populate DV Done
25,941,547 UART: [fht] FMC Alias Private Key: 7
25,943,198 UART: [art] Derive CDI
25,944,023 UART: [art] Store in in slot 0x4
26,003,649 UART: [art] Derive Key Pair
26,004,703 UART: [art] Store priv key in slot 0x5
29,297,883 UART: [art] Derive Key Pair - Done
29,310,769 UART: [art] Signing Cert with AUTHO
29,312,104 UART: RITY.KEYID = 7
31,599,523 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,026 UART: [art] PUB.X = D78BF1AEFC10AFC49326949E3C6AE1DBC931AC9D3655826BC1E07FA0F74859A5C89DA417236D8CF4194088495DC7A68C
31,608,290 UART: [art] PUB.Y = 99652AE06BD333BB30E3137CD3921075B3DDB7F696677FB46089F13EF2D7A38836177C32D2D8712E0E667584B3287795
31,615,535 UART: [art] SIG.R = DF06F5D1085FC97FB5F8DE85543C1466CFEA46AF70BEFB99F10D5FA3FD173783DED880D078BF62F3E385B73CD4333D4C
31,622,954 UART: [art] SIG.S = D244EC3DDD67086B30BAE3BEA00A0C6B56AE25E2951835E0F9F1E2CE208CDF3C7AA90DEAF2C49828E59450DD42D15CD9
32,928,071 UART: Caliptra RT
32,928,795 UART: [state] CFI Enabled
33,090,602 UART: [rt] RT listening for mailbox commands...
33,121,833 UART: [rt]cmd =0x54514754, len=24
33,124,377 >>> mbox cmd response data (8 bytes)
33,124,915 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,154,776 UART: [rt]cmd =0x54514754, len=24
33,156,781 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,624 writing to cptra_bootfsm_go
192,852 UART:
193,255 UART: Running Caliptra ROM ...
194,399 UART:
603,908 UART: [state] CFI Enabled
618,810 UART: [state] LifecycleState = Unprovisioned
620,726 UART: [state] DebugLocked = No
623,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,823 UART: [kat] SHA2-256
798,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,069 UART: [kat] ++
809,545 UART: [kat] sha1
820,629 UART: [kat] SHA2-256
823,348 UART: [kat] SHA2-384
829,617 UART: [kat] SHA2-512-ACC
831,988 UART: [kat] ECC-384
3,114,959 UART: [kat] HMAC-384Kdf
3,126,561 UART: [kat] LMS
4,316,702 UART: [kat] --
4,319,070 UART: [cold-reset] ++
4,320,732 UART: [fht] Storing FHT @ 0x50003400
4,333,763 UART: [idev] ++
4,334,322 UART: [idev] CDI.KEYID = 6
4,335,273 UART: [idev] SUBJECT.KEYID = 7
4,336,513 UART: [idev] UDS.KEYID = 0
4,337,520 ready_for_fw is high
4,337,741 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,738 UART: [idev] Erasing UDS.KEYID = 0
7,625,229 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,110 UART: [idev] --
7,650,042 UART: [ldev] ++
7,650,653 UART: [ldev] CDI.KEYID = 6
7,651,581 UART: [ldev] SUBJECT.KEYID = 5
7,652,788 UART: [ldev] AUTHORITY.KEYID = 7
7,654,031 UART: [ldev] FE.KEYID = 1
7,663,812 UART: [ldev] Erasing FE.KEYID = 1
10,953,020 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,752 UART: [ldev] --
13,309,957 UART: [fwproc] Waiting for Commands...
13,311,675 UART: [fwproc] Received command 0x46574c44
13,313,903 UART: [fwproc] Received Image of size 113760 bytes
17,361,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,665 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,556 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,816,845 >>> mbox cmd response: success
17,817,436 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,821,620 UART: [afmc] ++
17,822,207 UART: [afmc] CDI.KEYID = 6
17,823,115 UART: [afmc] SUBJECT.KEYID = 7
17,824,383 UART: [afmc] AUTHORITY.KEYID = 5
21,138,864 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,429,557 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,431,815 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,446,197 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,461,014 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,475,451 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,495,807 UART: [afmc] --
23,499,798 UART: [cold-reset] --
23,504,367 UART: [state] Locking Datavault
23,511,018 UART: [state] Locking PCR0, PCR1 and PCR31
23,512,774 UART: [state] Locking ICCM
23,514,597 UART: [exit] Launching FMC @ 0x40000130
23,522,956 UART:
23,523,202 UART: Running Caliptra FMC ...
23,524,302 UART:
23,524,457 UART: [state] CFI Enabled
23,532,393 UART: [fht] FMC Alias Private Key: 7
25,862,938 UART: [art] Extend RT PCRs Done
25,864,158 UART: [art] Lock RT PCRs Done
25,865,994 UART: [art] Populate DV Done
25,871,509 UART: [fht] FMC Alias Private Key: 7
25,872,996 UART: [art] Derive CDI
25,873,753 UART: [art] Store in in slot 0x4
25,916,133 UART: [art] Derive Key Pair
25,917,174 UART: [art] Store priv key in slot 0x5
29,159,699 UART: [art] Derive Key Pair - Done
29,172,744 UART: [art] Signing Cert with AUTHO
29,174,083 UART: RITY.KEYID = 7
31,453,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,340 UART: [art] PUB.X = 5AA75DFB46986797DA245CDAA27ED47070DD1D1A70EEF0BC132A185085F4130FB1537486F022AF53E5E5DE5D7FF4B8CC
31,462,613 UART: [art] PUB.Y = D570817C47BCA37F438112D46BBD325721FE53F7DE044B67BF5FA3DBFA38C303A07A5670DB80200DF0AF7E605D49AD64
31,469,876 UART: [art] SIG.R = 31AAF4C4651A63FD49213B424E5EB4FF805C6668E0F77396CDC94B7F96592B415AE61664F27163D39F636360A6755453
31,477,232 UART: [art] SIG.S = 5B636E5C1668B8347C4554AFAD0FB392D07B5021751486A69208C28427A6A55EB9BB52BC5774C86339C957DD6D1DFE14
32,782,373 UART: Caliptra RT
32,783,078 UART: [state] CFI Enabled
32,900,138 UART: [rt] RT listening for mailbox commands...
32,931,491 UART: [rt]cmd =0x54514754, len=24
32,934,055 >>> mbox cmd response data (8 bytes)
32,934,596 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,964,446 UART: [rt]cmd =0x54514754, len=24
32,966,040 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,658 writing to cptra_bootfsm_go
4,127,936 ready_for_fw is high
4,128,601 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,058,797 >>> mbox cmd response: success
18,059,495 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,702,701 UART:
23,703,111 UART: Running Caliptra FMC ...
23,704,292 UART:
23,704,446 UART: [state] CFI Enabled
23,711,952 UART: [fht] FMC Alias Private Key: 7
26,042,419 UART: [art] Extend RT PCRs Done
26,043,644 UART: [art] Lock RT PCRs Done
26,045,108 UART: [art] Populate DV Done
26,050,575 UART: [fht] FMC Alias Private Key: 7
26,052,120 UART: [art] Derive CDI
26,052,881 UART: [art] Store in in slot 0x4
26,095,756 UART: [art] Derive Key Pair
26,096,805 UART: [art] Store priv key in slot 0x5
29,338,350 UART: [art] Derive Key Pair - Done
29,351,250 UART: [art] Signing Cert with AUTHO
29,352,550 UART: RITY.KEYID = 7
31,631,385 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,900 UART: [art] PUB.X = 961443EFCDD9F488DC90D4C54D3E37A99164CAC01DDA8EC6AA27EC379D653105B992FB2187AC8EF24FEB3671A8DE4797
31,640,195 UART: [art] PUB.Y = 1EE1DA59F664BCF92CD18CB3D84407FDDCA7617C586600CD32466C9E600F93992D4278C168DE1D122400D3DA6196935C
31,647,368 UART: [art] SIG.R = DDF59581D93EF021D1B62D721D66CFF8F756BB3575F6E963547BE77BABBFA257D24C7CAF71E08EB23E4E0D381244199A
31,654,804 UART: [art] SIG.S = 49F1BC5A08D7B3FE61FD5460F7AFC18B7E6A8A7151FCC48EE5F16495038D75C1DB3166D3B898F4B164B31BFC1E314758
32,960,184 UART: Caliptra RT
32,960,901 UART: [state] CFI Enabled
33,078,792 UART: [rt] RT listening for mailbox commands...
33,110,157 UART: [rt]cmd =0x54514754, len=24
33,113,009 >>> mbox cmd response data (8 bytes)
33,113,534 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,143,445 UART: [rt]cmd =0x54514754, len=24
33,145,017 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,339 writing to cptra_bootfsm_go
193,569 UART:
193,941 UART: Running Caliptra ROM ...
195,137 UART:
195,292 UART: [state] CFI Enabled
262,900 UART: [state] LifecycleState = Unprovisioned
264,903 UART: [state] DebugLocked = No
266,355 UART: [state] WD Timer not started. Device not locked for debugging
269,474 UART: [kat] SHA2-256
448,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,184 UART: [kat] ++
460,650 UART: [kat] sha1
471,591 UART: [kat] SHA2-256
474,591 UART: [kat] SHA2-384
480,717 UART: [kat] SHA2-512-ACC
483,720 UART: [kat] ECC-384
2,926,436 UART: [kat] HMAC-384Kdf
2,952,066 UART: [kat] LMS
3,481,533 UART: [kat] --
3,485,980 UART: [cold-reset] ++
3,488,130 UART: [fht] FHT @ 0x50003400
3,499,601 UART: [idev] ++
3,500,163 UART: [idev] CDI.KEYID = 6
3,501,086 UART: [idev] SUBJECT.KEYID = 7
3,502,261 UART: [idev] UDS.KEYID = 0
3,503,310 ready_for_fw is high
3,503,535 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,647,116 UART: [idev] Erasing UDS.KEYID = 0
6,005,413 UART: [idev] Sha1 KeyId Algorithm
6,028,130 UART: [idev] --
6,031,158 UART: [ldev] ++
6,031,733 UART: [ldev] CDI.KEYID = 6
6,032,652 UART: [ldev] SUBJECT.KEYID = 5
6,033,829 UART: [ldev] AUTHORITY.KEYID = 7
6,035,104 UART: [ldev] FE.KEYID = 1
6,080,465 UART: [ldev] Erasing FE.KEYID = 1
8,588,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,455 UART: [ldev] --
10,393,629 UART: [fwproc] Wait for Commands...
10,395,502 UART: [fwproc] Recv command 0x46574c44
10,397,589 UART: [fwproc] Recv'd Img size: 114084 bytes
13,796,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,254,783 >>> mbox cmd response: success
14,255,370 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,258,993 UART: [afmc] ++
14,259,589 UART: [afmc] CDI.KEYID = 6
14,260,469 UART: [afmc] SUBJECT.KEYID = 7
14,261,678 UART: [afmc] AUTHORITY.KEYID = 5
16,784,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,527,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,543,257 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,559,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,582,239 UART: [afmc] --
18,586,608 UART: [cold-reset] --
18,590,031 UART: [state] Locking Datavault
18,594,416 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,060 UART: [state] Locking ICCM
18,597,500 UART: [exit] Launching FMC @ 0x40000130
18,605,893 UART:
18,606,136 UART: Running Caliptra FMC ...
18,607,237 UART:
18,607,392 UART: [state] CFI Enabled
18,666,934 UART: [fht] FMC Alias Private Key: 7
20,430,390 UART: [art] Extend RT PCRs Done
20,431,607 UART: [art] Lock RT PCRs Done
20,433,096 UART: [art] Populate DV Done
20,438,733 UART: [fht] FMC Alias Private Key: 7
20,440,376 UART: [art] Derive CDI
20,441,188 UART: [art] Store in in slot 0x4
20,498,896 UART: [art] Derive Key Pair
20,499,926 UART: [art] Store priv key in slot 0x5
22,962,933 UART: [art] Derive Key Pair - Done
22,975,878 UART: [art] Signing Cert with AUTHO
22,977,194 UART: RITY.KEYID = 7
24,688,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,938 UART: [art] PUB.X = A3523DC7196F4528ED5B5768D062E26BA576D42C4817F3449D31EDE5CA34E464E854E6F80BFC38BEE1CC4F3F9EA9FD59
24,697,222 UART: [art] PUB.Y = 4845C817FD9DBD1C69C59C99DEEB96333F10B2A122385624177B2AB542491A9CB366C1D2CC723E8DE50BD01636E5DDFE
24,704,486 UART: [art] SIG.R = 4678E667D9BD82A8808760EF8049C1E3B376CDBA63414C2D2B43B0F500E87A60D833C7152B1BB485A6E89FFD07B6D6B1
24,711,832 UART: [art] SIG.S = F4112734353D21C8F1CABC2B7ED1BBAFC83DEEE68209EEE8DB7864ADF137082FDF7DF49F6A4A373588D290C4ADE7A743
25,691,122 UART: Caliptra RT
25,691,818 UART: [state] CFI Enabled
25,856,411 UART: [rt] RT listening for mailbox commands...
25,887,904 UART: [rt]cmd =0x54514754, len=24
25,890,712 >>> mbox cmd response data (8 bytes)
25,891,240 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,921,210 UART: [rt]cmd =0x54514754, len=24
25,923,010 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,379,904 ready_for_fw is high
3,380,503 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,086,001 >>> mbox cmd response: success
14,086,750 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,367,150 UART:
18,367,553 UART: Running Caliptra FMC ...
18,368,887 UART:
18,369,052 UART: [state] CFI Enabled
18,433,862 UART: [fht] FMC Alias Private Key: 7
20,198,049 UART: [art] Extend RT PCRs Done
20,199,275 UART: [art] Lock RT PCRs Done
20,200,901 UART: [art] Populate DV Done
20,206,200 UART: [fht] FMC Alias Private Key: 7
20,207,918 UART: [art] Derive CDI
20,208,939 UART: [art] Store in in slot 0x4
20,266,785 UART: [art] Derive Key Pair
20,267,783 UART: [art] Store priv key in slot 0x5
22,731,268 UART: [art] Derive Key Pair - Done
22,744,156 UART: [art] Signing Cert with AUTHO
22,745,448 UART: RITY.KEYID = 7
24,456,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,375 UART: [art] PUB.X = 4F915842B0F6E5A9EAFC79588EB4E00A0B616743DE46D84EF8F7241F81275E265259552477E2C34A38EF0A0C5C571667
24,465,643 UART: [art] PUB.Y = 03BCF4942F2EC82E7207F521C978E6AC040E746DEC02AD79893AF5474A0AC66EDDEB4ABF03A5EE05D218F762607FBF7E
24,472,922 UART: [art] SIG.R = 06132B6D94F3F19BC7581AF13BDBB5C0000550B151171817DF4AABABE5DAFCEC7E7D3530D27499FCFF3E8852853910C0
24,480,285 UART: [art] SIG.S = 95B3F4746EF52E4A2D55A1EA87EDA177B325C0780E05BD51E3043214AB1C0DF63C6E58FC8FB4090FE4DC350335B2CD9D
25,459,265 UART: Caliptra RT
25,459,982 UART: [state] CFI Enabled
25,626,410 UART: [rt] RT listening for mailbox commands...
25,658,144 UART: [rt]cmd =0x54514754, len=24
25,660,933 >>> mbox cmd response data (8 bytes)
25,661,454 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,691,457 UART: [rt]cmd =0x54514754, len=24
25,693,268 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
193,050 UART:
193,428 UART: Running Caliptra ROM ...
194,583 UART:
604,367 UART: [state] CFI Enabled
616,324 UART: [state] LifecycleState = Unprovisioned
618,209 UART: [state] DebugLocked = No
619,456 UART: [state] WD Timer not started. Device not locked for debugging
622,498 UART: [kat] SHA2-256
801,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,177 UART: [kat] ++
813,627 UART: [kat] sha1
823,956 UART: [kat] SHA2-256
827,001 UART: [kat] SHA2-384
832,724 UART: [kat] SHA2-512-ACC
835,662 UART: [kat] ECC-384
3,276,642 UART: [kat] HMAC-384Kdf
3,288,378 UART: [kat] LMS
3,817,870 UART: [kat] --
3,821,975 UART: [cold-reset] ++
3,823,140 UART: [fht] FHT @ 0x50003400
3,835,185 UART: [idev] ++
3,835,745 UART: [idev] CDI.KEYID = 6
3,836,698 UART: [idev] SUBJECT.KEYID = 7
3,837,869 UART: [idev] UDS.KEYID = 0
3,838,843 ready_for_fw is high
3,839,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,321 UART: [idev] Erasing UDS.KEYID = 0
6,312,066 UART: [idev] Sha1 KeyId Algorithm
6,334,809 UART: [idev] --
6,339,097 UART: [ldev] ++
6,339,684 UART: [ldev] CDI.KEYID = 6
6,340,565 UART: [ldev] SUBJECT.KEYID = 5
6,341,780 UART: [ldev] AUTHORITY.KEYID = 7
6,343,025 UART: [ldev] FE.KEYID = 1
6,354,042 UART: [ldev] Erasing FE.KEYID = 1
8,826,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,242 UART: [ldev] --
10,616,534 UART: [fwproc] Wait for Commands...
10,619,719 UART: [fwproc] Recv command 0x46574c44
10,621,762 UART: [fwproc] Recv'd Img size: 114084 bytes
14,023,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,479,916 >>> mbox cmd response: success
14,480,484 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,483,553 UART: [afmc] ++
14,484,155 UART: [afmc] CDI.KEYID = 6
14,485,075 UART: [afmc] SUBJECT.KEYID = 7
14,486,241 UART: [afmc] AUTHORITY.KEYID = 5
16,987,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,910 UART: [afmc] --
18,781,810 UART: [cold-reset] --
18,785,891 UART: [state] Locking Datavault
18,790,813 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,460 UART: [state] Locking ICCM
18,794,556 UART: [exit] Launching FMC @ 0x40000130
18,803,016 UART:
18,803,279 UART: Running Caliptra FMC ...
18,804,391 UART:
18,804,557 UART: [state] CFI Enabled
18,812,498 UART: [fht] FMC Alias Private Key: 7
20,569,278 UART: [art] Extend RT PCRs Done
20,570,495 UART: [art] Lock RT PCRs Done
20,571,961 UART: [art] Populate DV Done
20,577,482 UART: [fht] FMC Alias Private Key: 7
20,579,059 UART: [art] Derive CDI
20,579,888 UART: [art] Store in in slot 0x4
20,622,486 UART: [art] Derive Key Pair
20,623,489 UART: [art] Store priv key in slot 0x5
23,050,180 UART: [art] Derive Key Pair - Done
23,063,337 UART: [art] Signing Cert with AUTHO
23,064,680 UART: RITY.KEYID = 7
24,770,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,598 UART: [art] PUB.X = 75E6FA467EC629B4B93434F628311A3542AD0DFC2FD747D8D639D539E8BB9263E8C90493F0B97370DB93115824555D1A
24,778,828 UART: [art] PUB.Y = 64356238301140D4F8B1B2381E367537489078F44263C24510222473F9080F2BA9A0046E3A7ED86EAE92197812E40D50
24,786,032 UART: [art] SIG.R = 691D4EAFDB86AF0915F5E243323E86746F3DF0BC2CD81015979C8E1956BFE2CA5710BA4D6B4F457C4367A9949CDABA61
24,793,452 UART: [art] SIG.S = 429E5B00E6EF11C26E8197CC61FA470621BB12C3964CD0D491A6B1D02B4B11526D8967C023B667FA58906DEEF1CFC5DD
25,772,555 UART: Caliptra RT
25,773,253 UART: [state] CFI Enabled
25,889,818 UART: [rt] RT listening for mailbox commands...
25,921,285 UART: [rt]cmd =0x54514754, len=24
25,923,980 >>> mbox cmd response data (8 bytes)
25,924,518 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,954,482 UART: [rt]cmd =0x54514754, len=24
25,956,331 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,941 writing to cptra_bootfsm_go
3,697,622 ready_for_fw is high
3,698,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,258,926 >>> mbox cmd response: success
14,259,587 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,506,552 UART:
18,506,945 UART: Running Caliptra FMC ...
18,508,140 UART:
18,508,305 UART: [state] CFI Enabled
18,516,098 UART: [fht] FMC Alias Private Key: 7
20,272,855 UART: [art] Extend RT PCRs Done
20,274,088 UART: [art] Lock RT PCRs Done
20,275,937 UART: [art] Populate DV Done
20,281,305 UART: [fht] FMC Alias Private Key: 7
20,283,017 UART: [art] Derive CDI
20,283,842 UART: [art] Store in in slot 0x4
20,326,841 UART: [art] Derive Key Pair
20,327,882 UART: [art] Store priv key in slot 0x5
22,754,212 UART: [art] Derive Key Pair - Done
22,767,152 UART: [art] Signing Cert with AUTHO
22,768,459 UART: RITY.KEYID = 7
24,474,040 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,543 UART: [art] PUB.X = 69DA747EF676241F194617F5DF903F49A973BEC836A9BB159B2A60C2BB2351C8F8FB31834645BA8A6C66CCBE38AB60DE
24,482,816 UART: [art] PUB.Y = D6152E7631ABC3AA3ABDCEB87EA695B0992F2A5E1D1B8EAD349D5D965D9E8C2A30F6FB1FFB859EB30735EC404472318C
24,490,097 UART: [art] SIG.R = B4A0745E0CAC1043B7BE179C3115BF0ED073361E36D70FCD43601CE3C4A210CF6F4BB23EBE6FC1E9F30B3C012CA1A879
24,497,499 UART: [art] SIG.S = 8E37D706E4954FA1EA421027AC21A442B5E992AE585CD96CDD1BC25EABE8BEE0FF222A0D8B78E9D60DD8FF72563BF524
25,476,362 UART: Caliptra RT
25,477,065 UART: [state] CFI Enabled
25,594,367 UART: [rt] RT listening for mailbox commands...
25,625,730 UART: [rt]cmd =0x54514754, len=24
25,628,210 >>> mbox cmd response data (8 bytes)
25,628,670 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,658,457 UART: [rt]cmd =0x54514754, len=24
25,660,306 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,568 UART:
192,982 UART: Running Caliptra ROM ...
194,185 UART:
194,339 UART: [state] CFI Enabled
264,505 UART: [state] LifecycleState = Unprovisioned
266,916 UART: [state] DebugLocked = No
269,713 UART: [state] WD Timer not started. Device not locked for debugging
274,253 UART: [kat] SHA2-256
464,143 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,928 UART: [kat] ++
475,389 UART: [kat] sha1
486,971 UART: [kat] SHA2-256
489,994 UART: [kat] SHA2-384
496,420 UART: [kat] SHA2-512-ACC
499,002 UART: [kat] ECC-384
2,947,474 UART: [kat] HMAC-384Kdf
2,971,077 UART: [kat] LMS
3,502,809 UART: [kat] --
3,508,594 UART: [cold-reset] ++
3,511,127 UART: [fht] FHT @ 0x50003400
3,522,821 UART: [idev] ++
3,523,525 UART: [idev] CDI.KEYID = 6
3,524,476 UART: [idev] SUBJECT.KEYID = 7
3,525,642 UART: [idev] UDS.KEYID = 0
3,526,638 ready_for_fw is high
3,526,820 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,275 UART: [idev] Erasing UDS.KEYID = 0
6,024,639 UART: [idev] Sha1 KeyId Algorithm
6,048,403 UART: [idev] --
6,053,223 UART: [ldev] ++
6,053,963 UART: [ldev] CDI.KEYID = 6
6,054,856 UART: [ldev] SUBJECT.KEYID = 5
6,055,965 UART: [ldev] AUTHORITY.KEYID = 7
6,057,249 UART: [ldev] FE.KEYID = 1
6,099,125 UART: [ldev] Erasing FE.KEYID = 1
8,604,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,546 UART: [ldev] --
10,414,674 UART: [fwproc] Wait for Commands...
10,416,166 UART: [fwproc] Recv command 0x46574c44
10,418,468 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,598,534 >>> mbox cmd response: success
14,599,067 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,602,626 UART: [afmc] ++
14,603,333 UART: [afmc] CDI.KEYID = 6
14,604,497 UART: [afmc] SUBJECT.KEYID = 7
14,605,994 UART: [afmc] AUTHORITY.KEYID = 5
17,149,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,516 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,680 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,669 UART: [afmc] --
18,968,007 UART: [cold-reset] --
18,972,690 UART: [state] Locking Datavault
18,980,048 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,203 UART: [state] Locking ICCM
18,984,067 UART: [exit] Launching FMC @ 0x40000130
18,992,770 UART:
18,992,999 UART: Running Caliptra FMC ...
18,994,021 UART:
18,994,171 UART: [state] CFI Enabled
19,049,655 UART: [fht] FMC Alias Private Key: 7
20,813,409 UART: [art] Extend RT PCRs Done
20,814,643 UART: [art] Lock RT PCRs Done
20,816,186 UART: [art] Populate DV Done
20,821,809 UART: [fht] FMC Alias Private Key: 7
20,823,286 UART: [art] Derive CDI
20,824,019 UART: [art] Store in in slot 0x4
20,882,647 UART: [art] Derive Key Pair
20,883,674 UART: [art] Store priv key in slot 0x5
23,346,817 UART: [art] Derive Key Pair - Done
23,359,700 UART: [art] Signing Cert with AUTHO
23,361,000 UART: RITY.KEYID = 7
25,072,506 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,001 UART: [art] PUB.X = CEEB9B112476E0E20625AB6491C21768071B2439B381423A621DFB09C1494316ACE5806F804A611804391D21F0627E52
25,081,211 UART: [art] PUB.Y = CC679DD6E117095EE2CC6FA6C42EF320BB07128955FE42B1F1EECB15071B4AA77FCFED3D56FABA689D542F5D4570059C
25,088,520 UART: [art] SIG.R = E3F3ADDF7C994D293EF5227E22A8C7127E3836951147E037C154009D71A740A2A1587036F658244121A1855B1DB79752
25,095,831 UART: [art] SIG.S = 7E8CE6BEBDDB515DC3B13E83A0483F3E88F90051F8C6F13299778DA2967768474589E60CB5096A92BDDE0B86CDAC0C1C
26,074,739 UART: Caliptra RT
26,075,457 UART: [state] CFI Enabled
26,239,428 UART: [rt] RT listening for mailbox commands...
26,270,949 UART: [rt]cmd =0x54514754, len=24
26,273,478 >>> mbox cmd response data (8 bytes)
26,274,021 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,304,083 UART: [rt]cmd =0x54514754, len=24
26,305,793 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,437,236 ready_for_fw is high
3,437,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,734,467 >>> mbox cmd response: success
14,735,067 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,029,143 UART:
19,029,541 UART: Running Caliptra FMC ...
19,030,684 UART:
19,030,844 UART: [state] CFI Enabled
19,095,235 UART: [fht] FMC Alias Private Key: 7
20,858,999 UART: [art] Extend RT PCRs Done
20,860,218 UART: [art] Lock RT PCRs Done
20,861,680 UART: [art] Populate DV Done
20,867,259 UART: [fht] FMC Alias Private Key: 7
20,868,864 UART: [art] Derive CDI
20,869,677 UART: [art] Store in in slot 0x4
20,928,198 UART: [art] Derive Key Pair
20,929,197 UART: [art] Store priv key in slot 0x5
23,392,508 UART: [art] Derive Key Pair - Done
23,405,564 UART: [art] Signing Cert with AUTHO
23,406,870 UART: RITY.KEYID = 7
25,120,554 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,066 UART: [art] PUB.X = 40F0A49815571EA17EE293E7A417730942E3050B2E8F365737199547F13E4CFE6858F8CBC4D405E4F0A4748769F2E61D
25,129,301 UART: [art] PUB.Y = E9E311CF1EF6E1D20D0595895A8E2E99DFF67FFAFA5B5465E0529478198270FF9394BDD332959A59D6DC73F3FB3E7B99
25,136,576 UART: [art] SIG.R = 28FAEDEEBFB5EE8C6CFE00F54C67146F9F2F157DA0E3CEF83204F1D591DBDE52696D8B76FB1F29FBA5125F194274E109
25,143,967 UART: [art] SIG.S = E048EE32E2623015A43DD02B3B2E67364728C38DA6C225E789CA6C05806B5A39A64FE63128503E1F8C8E46E6CE6B161B
26,122,892 UART: Caliptra RT
26,123,599 UART: [state] CFI Enabled
26,287,945 UART: [rt] RT listening for mailbox commands...
26,319,508 UART: [rt]cmd =0x54514754, len=24
26,322,237 >>> mbox cmd response data (8 bytes)
26,322,752 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,352,754 UART: [rt]cmd =0x54514754, len=24
26,354,569 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,668 writing to cptra_bootfsm_go
192,947 UART:
193,325 UART: Running Caliptra ROM ...
194,465 UART:
604,169 UART: [state] CFI Enabled
620,244 UART: [state] LifecycleState = Unprovisioned
622,628 UART: [state] DebugLocked = No
625,013 UART: [state] WD Timer not started. Device not locked for debugging
628,985 UART: [kat] SHA2-256
818,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,678 UART: [kat] ++
830,284 UART: [kat] sha1
842,303 UART: [kat] SHA2-256
845,307 UART: [kat] SHA2-384
851,015 UART: [kat] SHA2-512-ACC
853,541 UART: [kat] ECC-384
3,296,572 UART: [kat] HMAC-384Kdf
3,309,766 UART: [kat] LMS
3,841,592 UART: [kat] --
3,845,459 UART: [cold-reset] ++
3,846,474 UART: [fht] FHT @ 0x50003400
3,858,592 UART: [idev] ++
3,859,310 UART: [idev] CDI.KEYID = 6
3,860,230 UART: [idev] SUBJECT.KEYID = 7
3,861,403 UART: [idev] UDS.KEYID = 0
3,862,307 ready_for_fw is high
3,862,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,883 UART: [idev] Erasing UDS.KEYID = 0
6,337,237 UART: [idev] Sha1 KeyId Algorithm
6,358,291 UART: [idev] --
6,363,773 UART: [ldev] ++
6,364,455 UART: [ldev] CDI.KEYID = 6
6,365,357 UART: [ldev] SUBJECT.KEYID = 5
6,366,568 UART: [ldev] AUTHORITY.KEYID = 7
6,367,748 UART: [ldev] FE.KEYID = 1
6,379,391 UART: [ldev] Erasing FE.KEYID = 1
8,857,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,279 UART: [ldev] --
10,649,351 UART: [fwproc] Wait for Commands...
10,651,980 UART: [fwproc] Recv command 0x46574c44
10,654,231 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,840,073 >>> mbox cmd response: success
14,840,618 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,843,308 UART: [afmc] ++
14,844,003 UART: [afmc] CDI.KEYID = 6
14,845,197 UART: [afmc] SUBJECT.KEYID = 7
14,846,639 UART: [afmc] AUTHORITY.KEYID = 5
17,348,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,570 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,661 UART: [afmc] --
19,144,397 UART: [cold-reset] --
19,149,830 UART: [state] Locking Datavault
19,157,262 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,497 UART: [state] Locking ICCM
19,161,930 UART: [exit] Launching FMC @ 0x40000130
19,170,558 UART:
19,170,795 UART: Running Caliptra FMC ...
19,171,898 UART:
19,172,055 UART: [state] CFI Enabled
19,180,188 UART: [fht] FMC Alias Private Key: 7
20,937,389 UART: [art] Extend RT PCRs Done
20,938,600 UART: [art] Lock RT PCRs Done
20,940,039 UART: [art] Populate DV Done
20,945,614 UART: [fht] FMC Alias Private Key: 7
20,947,311 UART: [art] Derive CDI
20,948,048 UART: [art] Store in in slot 0x4
20,990,908 UART: [art] Derive Key Pair
20,991,943 UART: [art] Store priv key in slot 0x5
23,418,978 UART: [art] Derive Key Pair - Done
23,431,612 UART: [art] Signing Cert with AUTHO
23,432,912 UART: RITY.KEYID = 7
25,138,550 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,059 UART: [art] PUB.X = BBE2FD9DFC2FE1405D78E03135C4990919894E57FCA1861A9B789A166F51B5E801BAC8B6DA32B415CB020CECC9868E6C
25,147,351 UART: [art] PUB.Y = C9424265B95B5CF9F69B76440F0D4DBB876CDBBA782EB0C81A6ECC8C4F392A7F17F168173E9BF932338B287471009637
25,154,569 UART: [art] SIG.R = AE31F5E612496A28659654C0C399AE151EFA204A18C69CED96C34355072D8ACF709C83F862807E785C4D1B3EC8A19B9D
25,161,995 UART: [art] SIG.S = B8CA3D32C8104B293CA7BAB7D5A57B3E9B072EDEB16F50D8B1801FDC59853ED7EA07787DEE55AFD0D7393D731F130C05
26,141,053 UART: Caliptra RT
26,141,743 UART: [state] CFI Enabled
26,259,656 UART: [rt] RT listening for mailbox commands...
26,290,993 UART: [rt]cmd =0x54514754, len=24
26,293,614 >>> mbox cmd response data (8 bytes)
26,294,079 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,323,818 UART: [rt]cmd =0x54514754, len=24
26,325,790 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,534 writing to cptra_bootfsm_go
3,761,187 ready_for_fw is high
3,761,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,946,918 >>> mbox cmd response: success
14,947,532 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,198,008 UART:
19,198,398 UART: Running Caliptra FMC ...
19,199,499 UART:
19,199,650 UART: [state] CFI Enabled
19,207,826 UART: [fht] FMC Alias Private Key: 7
20,964,566 UART: [art] Extend RT PCRs Done
20,965,799 UART: [art] Lock RT PCRs Done
20,967,620 UART: [art] Populate DV Done
20,973,258 UART: [fht] FMC Alias Private Key: 7
20,974,909 UART: [art] Derive CDI
20,975,645 UART: [art] Store in in slot 0x4
21,018,032 UART: [art] Derive Key Pair
21,019,082 UART: [art] Store priv key in slot 0x5
23,445,616 UART: [art] Derive Key Pair - Done
23,458,447 UART: [art] Signing Cert with AUTHO
23,459,755 UART: RITY.KEYID = 7
25,165,317 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,825 UART: [art] PUB.X = CA5AD0096E1BBA22917B963ABF3A66D246ABBED7C53BB9F5124760A492401C8A15E532590DC63C869C0B12E54BEC98DD
25,174,063 UART: [art] PUB.Y = 8AC8B19135BB01EC9E275158F1FDE8374D01161E2712C8D223B8B993991EF76534F6F88ACFF67F29B1D9C2D0F80D831E
25,181,329 UART: [art] SIG.R = 55E3072EFE7E27A54B47435CA2AC1783F5AE3C854BE8775C5262BB2C5E3081390ED73807170CF46E53498B80B75488D4
25,188,712 UART: [art] SIG.S = 76AD6AD1634AFF2B469F8EAD43CDB444A65F124C0AFC4A862B5E1EEC09AA6BF9EBB249CAF17ACA74114FD9FDF3B77550
26,167,740 UART: Caliptra RT
26,168,445 UART: [state] CFI Enabled
26,286,444 UART: [rt] RT listening for mailbox commands...
26,317,860 UART: [rt]cmd =0x54514754, len=24
26,320,451 >>> mbox cmd response data (8 bytes)
26,320,875 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,350,611 UART: [rt]cmd =0x54514754, len=24
26,352,328 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,035 UART: [kat] SHA2-256
881,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,081 UART: [kat] ++
886,233 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,070 UART: [kat] SHA2-512-ACC
896,971 UART: [kat] ECC-384
902,896 UART: [kat] HMAC-384Kdf
907,392 UART: [kat] LMS
1,475,588 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,945 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,512 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,944 UART: [idev] --
1,515,009 UART: [ldev] ++
1,515,177 UART: [ldev] CDI.KEYID = 6
1,515,540 UART: [ldev] SUBJECT.KEYID = 5
1,515,966 UART: [ldev] AUTHORITY.KEYID = 7
1,516,429 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,546,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,242 UART: [ldev] --
1,585,525 UART: [fwproc] Waiting for Commands...
1,586,296 UART: [fwproc] Received command 0x46574c44
1,587,087 UART: [fwproc] Received Image of size 114084 bytes
2,882,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,501 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,434 >>> mbox cmd response: success
3,074,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,075,582 UART: [afmc] ++
3,075,750 UART: [afmc] CDI.KEYID = 6
3,076,112 UART: [afmc] SUBJECT.KEYID = 7
3,076,537 UART: [afmc] AUTHORITY.KEYID = 5
3,112,206 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,370 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,878 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,763 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,453 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,152 UART: [afmc] --
3,155,202 UART: [cold-reset] --
3,156,090 UART: [state] Locking Datavault
3,157,159 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,763 UART: [state] Locking ICCM
3,158,367 UART: [exit] Launching FMC @ 0x40000130
3,163,696 UART:
3,163,712 UART: Running Caliptra FMC ...
3,164,120 UART:
3,164,174 UART: [state] CFI Enabled
3,174,581 UART: [fht] FMC Alias Private Key: 7
3,282,392 UART: [art] Extend RT PCRs Done
3,282,820 UART: [art] Lock RT PCRs Done
3,284,398 UART: [art] Populate DV Done
3,292,689 UART: [fht] FMC Alias Private Key: 7
3,293,793 UART: [art] Derive CDI
3,294,073 UART: [art] Store in in slot 0x4
3,379,614 UART: [art] Derive Key Pair
3,379,974 UART: [art] Store priv key in slot 0x5
3,393,162 UART: [art] Derive Key Pair - Done
3,408,498 UART: [art] Signing Cert with AUTHO
3,408,978 UART: RITY.KEYID = 7
3,423,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,559 UART: [art] PUB.X = 7D9B9F74D42F364195AFD9E203E04D2C3E662F3796FF5DA10181E8FB0DEE968BAC51A2D92B1B39D301AC25AB134BBC84
3,431,333 UART: [art] PUB.Y = B4C267E795FD628D687373EADD553E6C580C94DCE1712B48BE46FABD317A5F91882195C4EFDC787924EB505AE5C9A34F
3,438,292 UART: [art] SIG.R = 0C007115AA1B93B7106B8E6926C84E2E2B6C009CC99622F358CAD9F3EECAB27234C4E891DB1F43F162069B93AA9163C9
3,445,018 UART: [art] SIG.S = 1B396DDDBF8079F7EF30199146B8DC83BF63FE5F0B18800EF0792E59D30FA95EE84E38F9FB9FDB10C3A6B232A89707F0
3,468,809 UART: Caliptra RT
3,469,062 UART: [state] CFI Enabled
3,576,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,068 UART: [rt]cmd =0x54514754, len=24
3,609,489 >>> mbox cmd response data (8 bytes)
3,609,490 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,945 UART: [rt]cmd =0x54514754, len=24
3,640,171 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,855 ready_for_fw is high
1,362,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,430 >>> mbox cmd response: success
2,923,430 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,985,318 UART:
2,985,334 UART: Running Caliptra FMC ...
2,985,742 UART:
2,985,796 UART: [state] CFI Enabled
2,996,523 UART: [fht] FMC Alias Private Key: 7
3,104,620 UART: [art] Extend RT PCRs Done
3,105,048 UART: [art] Lock RT PCRs Done
3,106,726 UART: [art] Populate DV Done
3,114,867 UART: [fht] FMC Alias Private Key: 7
3,115,847 UART: [art] Derive CDI
3,116,127 UART: [art] Store in in slot 0x4
3,201,634 UART: [art] Derive Key Pair
3,201,994 UART: [art] Store priv key in slot 0x5
3,215,352 UART: [art] Derive Key Pair - Done
3,230,066 UART: [art] Signing Cert with AUTHO
3,230,546 UART: RITY.KEYID = 7
3,245,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,695 UART: [art] PUB.X = FABC52237EF185C2D789408BD8E0BE390AAD8BB1B3B3E6E6AE859C32C67B4DB869CD2F6DACBEEEBBD12C915A97CDDDB6
3,253,498 UART: [art] PUB.Y = A88ECDD801A1B4E48405FEDB70516A26B5B12D22E9A490D47A422B54097B7D133E4EFE37283E9AAA8F43C30B62603968
3,260,442 UART: [art] SIG.R = E5D1447424FDAD6E61EF74677D36929391360E734FE53DADEBD095AE5307320C1521B6E32BCB1BA8ED6AF4F4DDE4E479
3,267,217 UART: [art] SIG.S = 9459D14C10FE39319BF30267523F9A6333CCF942424037E6D87F53AD8012D1B677654C80191C03E59379A4C3F84E8D42
3,290,360 UART: Caliptra RT
3,290,613 UART: [state] CFI Enabled
3,397,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,301 UART: [rt]cmd =0x54514754, len=24
3,430,696 >>> mbox cmd response data (8 bytes)
3,430,697 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,060 UART: [rt]cmd =0x54514754, len=24
3,461,482 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,604 UART: [kat] SHA2-256
882,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,650 UART: [kat] ++
886,802 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,225 UART: [idev] ++
1,480,393 UART: [idev] CDI.KEYID = 6
1,480,753 UART: [idev] SUBJECT.KEYID = 7
1,481,177 UART: [idev] UDS.KEYID = 0
1,481,522 ready_for_fw is high
1,481,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,343 UART: [idev] --
1,515,448 UART: [ldev] ++
1,515,616 UART: [ldev] CDI.KEYID = 6
1,515,979 UART: [ldev] SUBJECT.KEYID = 5
1,516,405 UART: [ldev] AUTHORITY.KEYID = 7
1,516,868 UART: [ldev] FE.KEYID = 1
1,522,316 UART: [ldev] Erasing FE.KEYID = 1
1,547,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,617 UART: [ldev] --
1,586,960 UART: [fwproc] Waiting for Commands...
1,587,715 UART: [fwproc] Received command 0x46574c44
1,588,506 UART: [fwproc] Received Image of size 114084 bytes
2,883,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,476 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,207 >>> mbox cmd response: success
3,075,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,231 UART: [afmc] ++
3,076,399 UART: [afmc] CDI.KEYID = 6
3,076,761 UART: [afmc] SUBJECT.KEYID = 7
3,077,186 UART: [afmc] AUTHORITY.KEYID = 5
3,112,325 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,772 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,462 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,375 UART: [afmc] --
3,155,407 UART: [cold-reset] --
3,156,355 UART: [state] Locking Datavault
3,157,366 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,970 UART: [state] Locking ICCM
3,158,462 UART: [exit] Launching FMC @ 0x40000130
3,163,791 UART:
3,163,807 UART: Running Caliptra FMC ...
3,164,215 UART:
3,164,358 UART: [state] CFI Enabled
3,174,953 UART: [fht] FMC Alias Private Key: 7
3,282,918 UART: [art] Extend RT PCRs Done
3,283,346 UART: [art] Lock RT PCRs Done
3,285,108 UART: [art] Populate DV Done
3,293,177 UART: [fht] FMC Alias Private Key: 7
3,294,241 UART: [art] Derive CDI
3,294,521 UART: [art] Store in in slot 0x4
3,380,470 UART: [art] Derive Key Pair
3,380,830 UART: [art] Store priv key in slot 0x5
3,394,334 UART: [art] Derive Key Pair - Done
3,409,187 UART: [art] Signing Cert with AUTHO
3,409,667 UART: RITY.KEYID = 7
3,424,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,550 UART: [art] PUB.X = C01956730DF5ACEE153111323ACFE0368344416FC27468FAAB8945467344AB64535587872D1B64B0B0E7CA0102D56C8E
3,432,307 UART: [art] PUB.Y = C5DCACFAE38F734E69BA2623BD7F2347F5AF483EC92284F28764A529E16ED2BC251AB4B652C96C0750E7637B6E5D3BEE
3,439,270 UART: [art] SIG.R = A9A20D800DB461B4B565E70F94D16E32208535C24B845A528C39CA2032405AE6975F2F64225EC9FC14548F66D3BBAF5B
3,446,033 UART: [art] SIG.S = 73B6159FBF5237224BE0A73D226400A5C32FBF03F3081D01114733EA71BED8F1611E16ED389E6B200B1846FADEB76682
3,469,554 UART: Caliptra RT
3,469,899 UART: [state] CFI Enabled
3,578,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,176 UART: [rt]cmd =0x54514754, len=24
3,611,367 >>> mbox cmd response data (8 bytes)
3,611,368 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,811 UART: [rt]cmd =0x54514754, len=24
3,642,073 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,998 ready_for_fw is high
1,362,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,079 >>> mbox cmd response: success
2,926,079 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,085 UART:
2,988,101 UART: Running Caliptra FMC ...
2,988,509 UART:
2,988,652 UART: [state] CFI Enabled
2,999,097 UART: [fht] FMC Alias Private Key: 7
3,107,308 UART: [art] Extend RT PCRs Done
3,107,736 UART: [art] Lock RT PCRs Done
3,108,968 UART: [art] Populate DV Done
3,116,897 UART: [fht] FMC Alias Private Key: 7
3,118,057 UART: [art] Derive CDI
3,118,337 UART: [art] Store in in slot 0x4
3,204,150 UART: [art] Derive Key Pair
3,204,510 UART: [art] Store priv key in slot 0x5
3,217,854 UART: [art] Derive Key Pair - Done
3,232,782 UART: [art] Signing Cert with AUTHO
3,233,262 UART: RITY.KEYID = 7
3,248,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,661 UART: [art] PUB.X = 6F34E6AB13633A750EA95E070DC60C8FDD23428881DC9C52F1E04C585C43BD0352DC835FCB4DC875C83EE3EE7F4D3F51
3,256,430 UART: [art] PUB.Y = 36369548628817BFD6C8D6AEED0A3A43A71D86E49234C9C65B45C59B8D8C7D6E02DD4B527A22EF9337A68FD3083B1AD7
3,263,379 UART: [art] SIG.R = 2F841B206E09F23BD552ACFE4E94D16D6B6739CA29876E6598BAE8C1AAF16CC5081112757A5FC756021A6BB5E03CE418
3,270,148 UART: [art] SIG.S = 4592D2C996E2582826B9D5ED420128D9D96B0555A4BCAFBD8199FC2E1AE3E7E78182733F243A4FBAFC7A394B2E1AA870
3,294,005 UART: Caliptra RT
3,294,350 UART: [state] CFI Enabled
3,403,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,176 UART: [rt]cmd =0x54514754, len=24
3,436,289 >>> mbox cmd response data (8 bytes)
3,436,290 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,717 UART: [rt]cmd =0x54514754, len=24
3,467,243 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,861 UART: [kat] SHA2-256
903,801 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,448 UART: [kat] HMAC-384Kdf
923,108 UART: [kat] LMS
1,171,436 UART: [kat] --
1,172,211 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,496 UART: [idev] ++
1,175,664 UART: [idev] CDI.KEYID = 6
1,176,024 UART: [idev] SUBJECT.KEYID = 7
1,176,448 UART: [idev] UDS.KEYID = 0
1,176,793 ready_for_fw is high
1,176,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,746 UART: [idev] Erasing UDS.KEYID = 0
1,201,971 UART: [idev] Sha1 KeyId Algorithm
1,210,399 UART: [idev] --
1,211,373 UART: [ldev] ++
1,211,541 UART: [ldev] CDI.KEYID = 6
1,211,904 UART: [ldev] SUBJECT.KEYID = 5
1,212,330 UART: [ldev] AUTHORITY.KEYID = 7
1,212,793 UART: [ldev] FE.KEYID = 1
1,217,797 UART: [ldev] Erasing FE.KEYID = 1
1,243,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,489 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,889 >>> mbox cmd response: success
2,769,889 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,105 UART: [afmc] ++
2,771,273 UART: [afmc] CDI.KEYID = 6
2,771,635 UART: [afmc] SUBJECT.KEYID = 7
2,772,060 UART: [afmc] AUTHORITY.KEYID = 5
2,807,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,326 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,438 UART: [afmc] --
2,850,536 UART: [cold-reset] --
2,851,510 UART: [state] Locking Datavault
2,852,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,261 UART: [state] Locking ICCM
2,853,871 UART: [exit] Launching FMC @ 0x40000130
2,859,200 UART:
2,859,216 UART: Running Caliptra FMC ...
2,859,624 UART:
2,859,678 UART: [state] CFI Enabled
2,870,431 UART: [fht] FMC Alias Private Key: 7
2,978,090 UART: [art] Extend RT PCRs Done
2,978,518 UART: [art] Lock RT PCRs Done
2,980,058 UART: [art] Populate DV Done
2,988,277 UART: [fht] FMC Alias Private Key: 7
2,989,231 UART: [art] Derive CDI
2,989,511 UART: [art] Store in in slot 0x4
3,074,982 UART: [art] Derive Key Pair
3,075,342 UART: [art] Store priv key in slot 0x5
3,088,130 UART: [art] Derive Key Pair - Done
3,102,984 UART: [art] Signing Cert with AUTHO
3,103,464 UART: RITY.KEYID = 7
3,118,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,509 UART: [art] PUB.X = 603A86035C09BD403742A1E5A0D56F34364B5EA9FF5CB1E60F3EF8E666282FE5F4020E10A20EB2BAB9157CD998B66312
3,126,267 UART: [art] PUB.Y = 4D42C68C65BF2270E14430B5B4D0D0B6089638FA5573D4193491B58E58B1159BDB47E681E8A12F2C77362867AD3A1DF3
3,133,212 UART: [art] SIG.R = F635539227914C76FE33978B8822D9662D02AC0A543ED0E7C8373C29CC583094A1B0984601D88258706B47EE5CA30718
3,139,958 UART: [art] SIG.S = C030C84F30BD9EBA2F1AF0D6E724FC1AD4FAF4856AB8FDD4DDF586A637C4C74791D31CF81BDD60D5FF0B6E08C66E28FE
3,163,445 UART: Caliptra RT
3,163,698 UART: [state] CFI Enabled
3,271,816 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,446 UART: [rt]cmd =0x54514754, len=24
3,304,485 >>> mbox cmd response data (8 bytes)
3,304,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,069 UART: [rt]cmd =0x54514754, len=24
3,335,437 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 ready_for_fw is high
1,060,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,416 >>> mbox cmd response: success
2,623,416 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,184 UART:
2,685,200 UART: Running Caliptra FMC ...
2,685,608 UART:
2,685,662 UART: [state] CFI Enabled
2,696,311 UART: [fht] FMC Alias Private Key: 7
2,804,762 UART: [art] Extend RT PCRs Done
2,805,190 UART: [art] Lock RT PCRs Done
2,806,676 UART: [art] Populate DV Done
2,814,869 UART: [fht] FMC Alias Private Key: 7
2,815,817 UART: [art] Derive CDI
2,816,097 UART: [art] Store in in slot 0x4
2,901,884 UART: [art] Derive Key Pair
2,902,244 UART: [art] Store priv key in slot 0x5
2,915,010 UART: [art] Derive Key Pair - Done
2,929,673 UART: [art] Signing Cert with AUTHO
2,930,153 UART: RITY.KEYID = 7
2,945,157 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,922 UART: [art] PUB.X = E3578CC0A8CAABC560A4A1E537AB181215DE4817A1C7BF2557A80214BB070CE1D9783F32E340A284BF5BA67B75A9CDB6
2,952,697 UART: [art] PUB.Y = 7943090D346ACB2F2CDF4265C2FD91C009C7A2BE9E96DA87D4F7FEA1CF2A3F56BA40D9C15D9CB939EF0E23F8A00C279B
2,959,654 UART: [art] SIG.R = A775ABCEEA9A88189B90E198666433990D58341CE146F5CC2364BC7EFFAC52C7186FF0232DC4F776E85E2ACDBD296994
2,966,431 UART: [art] SIG.S = E71BC3A0BF4361CFE5E4C72EAB5AD5B0AE86DE2D761068738D2EA5452ACEB1EC2C6AF94A135D7BDE54B7F74DA2113A27
2,990,194 UART: Caliptra RT
2,990,447 UART: [state] CFI Enabled
3,097,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,215 UART: [rt]cmd =0x54514754, len=24
3,130,554 >>> mbox cmd response data (8 bytes)
3,130,555 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,944 UART: [rt]cmd =0x54514754, len=24
3,161,412 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,132 UART: [state] WD Timer not started. Device not locked for debugging
88,457 UART: [kat] SHA2-256
894,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,232 UART: [kat] ++
898,384 UART: [kat] sha1
902,692 UART: [kat] SHA2-256
904,632 UART: [kat] SHA2-384
907,271 UART: [kat] SHA2-512-ACC
909,172 UART: [kat] ECC-384
919,175 UART: [kat] HMAC-384Kdf
923,775 UART: [kat] LMS
1,172,103 UART: [kat] --
1,172,830 UART: [cold-reset] ++
1,173,244 UART: [fht] FHT @ 0x50003400
1,175,853 UART: [idev] ++
1,176,021 UART: [idev] CDI.KEYID = 6
1,176,381 UART: [idev] SUBJECT.KEYID = 7
1,176,805 UART: [idev] UDS.KEYID = 0
1,177,150 ready_for_fw is high
1,177,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,939 UART: [idev] Erasing UDS.KEYID = 0
1,202,656 UART: [idev] Sha1 KeyId Algorithm
1,211,214 UART: [idev] --
1,212,264 UART: [ldev] ++
1,212,432 UART: [ldev] CDI.KEYID = 6
1,212,795 UART: [ldev] SUBJECT.KEYID = 5
1,213,221 UART: [ldev] AUTHORITY.KEYID = 7
1,213,684 UART: [ldev] FE.KEYID = 1
1,218,992 UART: [ldev] Erasing FE.KEYID = 1
1,245,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,218 UART: [ldev] --
1,284,609 UART: [fwproc] Wait for Commands...
1,285,225 UART: [fwproc] Recv command 0x46574c44
1,285,953 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,603 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,282 >>> mbox cmd response: success
2,772,282 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,352 UART: [afmc] ++
2,773,520 UART: [afmc] CDI.KEYID = 6
2,773,882 UART: [afmc] SUBJECT.KEYID = 7
2,774,307 UART: [afmc] AUTHORITY.KEYID = 5
2,809,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,825 UART: [afmc] --
2,852,859 UART: [cold-reset] --
2,853,597 UART: [state] Locking Datavault
2,854,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,330 UART: [state] Locking ICCM
2,855,858 UART: [exit] Launching FMC @ 0x40000130
2,861,187 UART:
2,861,203 UART: Running Caliptra FMC ...
2,861,611 UART:
2,861,754 UART: [state] CFI Enabled
2,872,177 UART: [fht] FMC Alias Private Key: 7
2,980,194 UART: [art] Extend RT PCRs Done
2,980,622 UART: [art] Lock RT PCRs Done
2,982,230 UART: [art] Populate DV Done
2,990,651 UART: [fht] FMC Alias Private Key: 7
2,991,691 UART: [art] Derive CDI
2,991,971 UART: [art] Store in in slot 0x4
3,077,700 UART: [art] Derive Key Pair
3,078,060 UART: [art] Store priv key in slot 0x5
3,091,248 UART: [art] Derive Key Pair - Done
3,105,827 UART: [art] Signing Cert with AUTHO
3,106,307 UART: RITY.KEYID = 7
3,121,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,222 UART: [art] PUB.X = 0D5D8E13F43827E8E89F2BD3093E15BCD2C056CF92BADB594CC45030721E28B93A0C9E4D1715C2EE4CD719FB6A0D22AB
3,128,996 UART: [art] PUB.Y = F18BC86730FE5A79A8C54DF2586497957722643B8D9F6FE652FF697A3318AC5C979254382DE03727B73495EA9408F8F3
3,135,937 UART: [art] SIG.R = F30BA2B5EF6A5D3F02BD616F698AD8BD87A320D9DCDEFC91F6C9ED2A1656D0DA28593E7C331B6DE1309425963870DEDD
3,142,721 UART: [art] SIG.S = 155D925B7DEEF9998422D36B1D627720DCC84E76B6EAC6A6B8EDB4C2383008328ACBB6D11D281B1F3F405C6F713E8D7A
3,167,335 UART: Caliptra RT
3,167,680 UART: [state] CFI Enabled
3,275,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,167 UART: [rt]cmd =0x54514754, len=24
3,308,342 >>> mbox cmd response data (8 bytes)
3,308,343 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,922 UART: [rt]cmd =0x54514754, len=24
3,339,606 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,112 ready_for_fw is high
1,060,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,717 >>> mbox cmd response: success
2,624,717 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,075 UART:
2,686,091 UART: Running Caliptra FMC ...
2,686,499 UART:
2,686,642 UART: [state] CFI Enabled
2,697,435 UART: [fht] FMC Alias Private Key: 7
2,805,712 UART: [art] Extend RT PCRs Done
2,806,140 UART: [art] Lock RT PCRs Done
2,807,646 UART: [art] Populate DV Done
2,815,763 UART: [fht] FMC Alias Private Key: 7
2,816,939 UART: [art] Derive CDI
2,817,219 UART: [art] Store in in slot 0x4
2,903,014 UART: [art] Derive Key Pair
2,903,374 UART: [art] Store priv key in slot 0x5
2,916,458 UART: [art] Derive Key Pair - Done
2,931,183 UART: [art] Signing Cert with AUTHO
2,931,663 UART: RITY.KEYID = 7
2,946,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,394 UART: [art] PUB.X = 45EC3BB36B8F042EB283DA42C86216B0C179BA81D823CFE8EC0930D4972AB475B799F34043B6721377F7E750CC7DCE16
2,954,164 UART: [art] PUB.Y = 5DA97FDF1EF84B4F425F476844F1B8AEFFD14ADB6C254EB1A87607A958E731C3F9D6D2C6C0ED7F665A4ED3668F13AE2B
2,961,133 UART: [art] SIG.R = 7DDDA80CDD544E209C97675E6855E8C2D984BF84A70B377C5DA4228EA92D97AB1341CC5C8B27F6B2734785764BE77C28
2,967,903 UART: [art] SIG.S = 84C314A163598728574164F6B262692353ECD4537DBD063AC0DE67FCAE4ADA07E26EAC8E28D37EA38FF0C9774EF02BF2
2,991,848 UART: Caliptra RT
2,992,193 UART: [state] CFI Enabled
3,100,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,086 UART: [rt]cmd =0x54514754, len=24
3,133,305 >>> mbox cmd response data (8 bytes)
3,133,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,827 UART: [rt]cmd =0x54514754, len=24
3,164,319 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,931 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,208,976 UART: [ldev] ++
1,209,144 UART: [ldev] CDI.KEYID = 6
1,209,508 UART: [ldev] SUBJECT.KEYID = 5
1,209,935 UART: [ldev] AUTHORITY.KEYID = 7
1,210,398 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,280,934 UART: [fwproc] Wait for Commands...
1,281,619 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,619 >>> mbox cmd response: success
2,767,619 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,768,770 UART: [afmc] ++
2,768,938 UART: [afmc] CDI.KEYID = 6
2,769,301 UART: [afmc] SUBJECT.KEYID = 7
2,769,727 UART: [afmc] AUTHORITY.KEYID = 5
2,805,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,003 UART: [afmc] --
2,849,009 UART: [cold-reset] --
2,849,885 UART: [state] Locking Datavault
2,850,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,402 UART: [state] Locking ICCM
2,851,890 UART: [exit] Launching FMC @ 0x40000130
2,857,219 UART:
2,857,235 UART: Running Caliptra FMC ...
2,857,643 UART:
2,857,697 UART: [state] CFI Enabled
2,868,340 UART: [fht] FMC Alias Private Key: 7
2,976,195 UART: [art] Extend RT PCRs Done
2,976,623 UART: [art] Lock RT PCRs Done
2,978,003 UART: [art] Populate DV Done
2,986,294 UART: [fht] FMC Alias Private Key: 7
2,987,476 UART: [art] Derive CDI
2,987,756 UART: [art] Store in in slot 0x4
3,073,139 UART: [art] Derive Key Pair
3,073,499 UART: [art] Store priv key in slot 0x5
3,086,779 UART: [art] Derive Key Pair - Done
3,101,509 UART: [art] Signing Cert with AUTHO
3,101,989 UART: RITY.KEYID = 7
3,117,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,160 UART: [art] PUB.X = F2B536EF1D85A5649F858FBA2A22F1002D24C6870FC35550A58DADDAF007F70F9A8FC238DB0F21D4D2BE39D8027F018B
3,124,904 UART: [art] PUB.Y = 7A5A18BA8758A19F8B872F6A65A408B7A0DE7EB892C6ACB820127A919A603273BFEE42A3A68CC6D6D038AEA2DDF8DA46
3,131,869 UART: [art] SIG.R = 281A9A6081970DA08023B99DB4175A2D9902B5ACFA29A56DBE30863EBFA6019ECEFDF33DDD96F5A9FBE376BF245644FF
3,138,648 UART: [art] SIG.S = FF13BC8B7CD6050A061FF2061D21931FD5C8878E859B05D28663D4C49AD400EEDA05673876ECA994CDF1FA7B26452383
3,162,413 UART: Caliptra RT
3,162,666 UART: [state] CFI Enabled
3,270,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,797 UART: [rt]cmd =0x54514754, len=24
3,302,692 >>> mbox cmd response data (8 bytes)
3,302,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,340 UART: [rt]cmd =0x54514754, len=24
3,333,808 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,878 ready_for_fw is high
1,055,878 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,273 >>> mbox cmd response: success
2,619,273 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,680,865 UART:
2,680,881 UART: Running Caliptra FMC ...
2,681,289 UART:
2,681,343 UART: [state] CFI Enabled
2,691,892 UART: [fht] FMC Alias Private Key: 7
2,799,769 UART: [art] Extend RT PCRs Done
2,800,197 UART: [art] Lock RT PCRs Done
2,801,661 UART: [art] Populate DV Done
2,810,002 UART: [fht] FMC Alias Private Key: 7
2,811,016 UART: [art] Derive CDI
2,811,296 UART: [art] Store in in slot 0x4
2,896,731 UART: [art] Derive Key Pair
2,897,091 UART: [art] Store priv key in slot 0x5
2,910,235 UART: [art] Derive Key Pair - Done
2,924,959 UART: [art] Signing Cert with AUTHO
2,925,439 UART: RITY.KEYID = 7
2,940,499 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,264 UART: [art] PUB.X = AB1059A094C7A695D26E147A186F4D8D7F4D602061C9EA426B1FBE360B57381F1AFF725801D05DD4C11B616A0DFDCB90
2,948,035 UART: [art] PUB.Y = 9713FE9064555B0451429661E727B0138E317D8659C4539901E9589F80F88F2A406E7F1DB22DA94CB046B6E0C2906213
2,954,965 UART: [art] SIG.R = 4D06E1BB3364182CCEB5C1270F9F044E21A6C113323B6C3B54975DBBC01D4C05163FE0AE96770AC2A866D752687CDE5B
2,961,728 UART: [art] SIG.S = 424682F1AEC39E4761BE63941918607BACE076F2C0EE60815C435E8B16EC87CA3E46B0348133A54730D496A9627034B4
2,985,343 UART: Caliptra RT
2,985,596 UART: [state] CFI Enabled
3,094,205 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,731 UART: [rt]cmd =0x54514754, len=24
3,126,766 >>> mbox cmd response data (8 bytes)
3,126,767 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,198 UART: [rt]cmd =0x54514754, len=24
3,157,576 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,831 UART: [kat] SHA2-512-ACC
906,732 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,174,330 ready_for_fw is high
1,174,330 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,530 UART: [idev] --
1,208,519 UART: [ldev] ++
1,208,687 UART: [ldev] CDI.KEYID = 6
1,209,051 UART: [ldev] SUBJECT.KEYID = 5
1,209,478 UART: [ldev] AUTHORITY.KEYID = 7
1,209,941 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,779 UART: [ldev] --
1,281,071 UART: [fwproc] Wait for Commands...
1,281,862 UART: [fwproc] Recv command 0x46574c44
1,282,595 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,836 >>> mbox cmd response: success
2,769,836 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,027 UART: [afmc] ++
2,771,195 UART: [afmc] CDI.KEYID = 6
2,771,558 UART: [afmc] SUBJECT.KEYID = 7
2,771,984 UART: [afmc] AUTHORITY.KEYID = 5
2,807,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,258 UART: [afmc] --
2,851,178 UART: [cold-reset] --
2,851,988 UART: [state] Locking Datavault
2,852,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,595 UART: [state] Locking ICCM
2,854,145 UART: [exit] Launching FMC @ 0x40000130
2,859,474 UART:
2,859,490 UART: Running Caliptra FMC ...
2,859,898 UART:
2,860,041 UART: [state] CFI Enabled
2,870,710 UART: [fht] FMC Alias Private Key: 7
2,978,239 UART: [art] Extend RT PCRs Done
2,978,667 UART: [art] Lock RT PCRs Done
2,980,399 UART: [art] Populate DV Done
2,988,574 UART: [fht] FMC Alias Private Key: 7
2,989,590 UART: [art] Derive CDI
2,989,870 UART: [art] Store in in slot 0x4
3,075,449 UART: [art] Derive Key Pair
3,075,809 UART: [art] Store priv key in slot 0x5
3,089,223 UART: [art] Derive Key Pair - Done
3,103,601 UART: [art] Signing Cert with AUTHO
3,104,081 UART: RITY.KEYID = 7
3,119,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,766 UART: [art] PUB.X = 3021DD44F7A48773E2DF0AC2ACEED816594F95F4BBF2E7147E5816AA8488ECA087D92C4651A75A08FA81EA76771104E3
3,126,535 UART: [art] PUB.Y = 02CBF77FC49DBB54E2051D7D26110D606C4A26D8027AC18AC2EDA0B81E551BD1FADE561EC40F9FB54BDCFC3585A3D6F8
3,133,494 UART: [art] SIG.R = 487128ADCFC39320870DC1F88AFB6ECF9C8D4C62245B92B309E2CCA9F1BC5DF585C9132AE70D3B2BB7A3234DC9701293
3,140,269 UART: [art] SIG.S = 80A247A98B88C52B221023CC17AB68979E98BE52EFEEA61F1D36145574A3985D8AC791AA3849D2258B1CB7A23A198FD8
3,163,990 UART: Caliptra RT
3,164,335 UART: [state] CFI Enabled
3,272,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,984 UART: [rt]cmd =0x54514754, len=24
3,305,165 >>> mbox cmd response data (8 bytes)
3,305,166 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,647 UART: [rt]cmd =0x54514754, len=24
3,336,217 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,209 ready_for_fw is high
1,056,209 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,676 >>> mbox cmd response: success
2,619,676 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,680,898 UART:
2,680,914 UART: Running Caliptra FMC ...
2,681,322 UART:
2,681,465 UART: [state] CFI Enabled
2,692,320 UART: [fht] FMC Alias Private Key: 7
2,800,849 UART: [art] Extend RT PCRs Done
2,801,277 UART: [art] Lock RT PCRs Done
2,802,911 UART: [art] Populate DV Done
2,811,176 UART: [fht] FMC Alias Private Key: 7
2,812,172 UART: [art] Derive CDI
2,812,452 UART: [art] Store in in slot 0x4
2,898,307 UART: [art] Derive Key Pair
2,898,667 UART: [art] Store priv key in slot 0x5
2,912,469 UART: [art] Derive Key Pair - Done
2,927,587 UART: [art] Signing Cert with AUTHO
2,928,067 UART: RITY.KEYID = 7
2,943,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,130 UART: [art] PUB.X = 87F400C2ED22DA37EA68D0C2376201CCC1836A2F864874C154D7E3B9D13D68FB7CBC2177D5A89EBB80BC4412A427F6F3
2,950,885 UART: [art] PUB.Y = A2C46FC8FBFE17BF9F8FA755CDBBDDD8D67CDC4FF9FE24E9DC47EDC255C15F411EF3D27D11B50086E1AFD250DDA15871
2,957,847 UART: [art] SIG.R = F1ADCEF6AD98B4546DB6F304B1916B0EBF6E47B423BE82D14E5BA93A9CDD860E99A97199DC4817FD37D53F122891AC32
2,964,624 UART: [art] SIG.S = 4723FCA8568546CA1F6820BE310706EC3C86DAF2630506D4C99BD528D6E408996D6D142D1460039767EEE74947588018
2,988,447 UART: Caliptra RT
2,988,792 UART: [state] CFI Enabled
3,097,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,457 UART: [rt]cmd =0x54514754, len=24
3,129,288 >>> mbox cmd response data (8 bytes)
3,129,289 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,670 UART: [rt]cmd =0x54514754, len=24
3,160,176 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,007 UART:
192,406 UART: Running Caliptra ROM ...
193,712 UART:
193,872 UART: [state] CFI Enabled
266,303 UART: [state] LifecycleState = Unprovisioned
268,295 UART: [state] DebugLocked = No
271,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,686 UART: [kat] SHA2-256
445,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,897 UART: [kat] ++
456,499 UART: [kat] sha1
467,309 UART: [kat] SHA2-256
470,024 UART: [kat] SHA2-384
475,730 UART: [kat] SHA2-512-ACC
478,095 UART: [kat] ECC-384
2,765,645 UART: [kat] HMAC-384Kdf
2,777,820 UART: [kat] LMS
3,968,141 UART: [kat] --
3,971,037 UART: [cold-reset] ++
3,973,212 UART: [fht] Storing FHT @ 0x50003400
3,985,760 UART: [idev] ++
3,986,326 UART: [idev] CDI.KEYID = 6
3,987,309 UART: [idev] SUBJECT.KEYID = 7
3,988,482 UART: [idev] UDS.KEYID = 0
3,989,481 ready_for_fw is high
3,989,670 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,132,749 UART: [idev] Erasing UDS.KEYID = 0
7,326,457 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,420 UART: [idev] --
7,350,553 UART: [ldev] ++
7,351,120 UART: [ldev] CDI.KEYID = 6
7,352,095 UART: [ldev] SUBJECT.KEYID = 5
7,353,309 UART: [ldev] AUTHORITY.KEYID = 7
7,354,538 UART: [ldev] FE.KEYID = 1
7,402,562 UART: [ldev] Erasing FE.KEYID = 1
10,733,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,802 UART: [ldev] --
13,096,119 UART: [fwproc] Waiting for Commands...
13,098,760 UART: [fwproc] Received command 0x46574c44
13,100,947 UART: [fwproc] Received Image of size 113760 bytes
17,144,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,216,640 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,601,148 >>> mbox cmd response: success
17,601,691 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,605,089 UART: [afmc] ++
17,605,683 UART: [afmc] CDI.KEYID = 6
17,606,651 UART: [afmc] SUBJECT.KEYID = 7
17,607,870 UART: [afmc] AUTHORITY.KEYID = 5
20,963,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,262,754 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,265,024 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,279,474 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,294,301 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,308,738 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,330,581 UART: [afmc] --
23,335,150 UART: [cold-reset] --
23,339,443 UART: [state] Locking Datavault
23,346,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,348,062 UART: [state] Locking ICCM
23,349,298 UART: [exit] Launching FMC @ 0x40000130
23,357,690 UART:
23,357,927 UART: Running Caliptra FMC ...
23,359,027 UART:
23,359,196 UART: [state] CFI Enabled
23,421,804 UART: [fht] FMC Alias Private Key: 7
25,759,451 UART: [art] Extend RT PCRs Done
25,760,676 UART: [art] Lock RT PCRs Done
25,762,047 UART: [art] Populate DV Done
25,767,578 UART: [fht] FMC Alias Private Key: 7
25,769,167 UART: [art] Derive CDI
25,770,129 UART: [art] Store in in slot 0x4
25,829,594 UART: [art] Derive Key Pair
25,830,598 UART: [art] Store priv key in slot 0x5
29,123,156 UART: [art] Derive Key Pair - Done
29,136,149 UART: [art] Signing Cert with AUTHO
29,137,485 UART: RITY.KEYID = 7
31,424,547 UART: [art] Erasing AUTHORITY.KEYID = 7
31,426,053 UART: [art] PUB.X = 58859295549F9F52A70D91D4179BE1FF98FAE23EFCC54CAB4427F0F3BE500A7825F669532712932B4B8799CAB2E77FF5
31,433,301 UART: [art] PUB.Y = 2AD40DB94DC27168DEC2B67AD128F85CFD5E043E61FE539165AE9397727BAE0468E20A71F9765529468DD442989BAA22
31,440,527 UART: [art] SIG.R = A062327DA717B13583FA0CEFAD9663CE5E4D42E52F01F7E24E1F6F7A8E7168985A912E3A750E18CC3674EB2078EC7AEA
31,447,921 UART: [art] SIG.S = 594EE0FFC1D22D0331F3DC1F1727D8251B9725073518D20E48FA03A6CF4F161CD7F1205CCEDAAEB3A75F9343FBAFDEAA
32,753,591 UART: Caliptra RT
32,754,310 UART: [state] CFI Enabled
32,914,136 UART: [rt] RT listening for mailbox commands...
32,945,664 UART: [rt]cmd =0x47544744, len=8
32,947,597 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,781,957 ready_for_fw is high
3,782,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,823,186 >>> mbox cmd response: success
17,823,995 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,526,254 UART:
23,526,647 UART: Running Caliptra FMC ...
23,527,786 UART:
23,527,949 UART: [state] CFI Enabled
23,593,836 UART: [fht] FMC Alias Private Key: 7
25,931,841 UART: [art] Extend RT PCRs Done
25,933,067 UART: [art] Lock RT PCRs Done
25,934,566 UART: [art] Populate DV Done
25,939,877 UART: [fht] FMC Alias Private Key: 7
25,941,364 UART: [art] Derive CDI
25,942,128 UART: [art] Store in in slot 0x4
26,003,962 UART: [art] Derive Key Pair
26,005,012 UART: [art] Store priv key in slot 0x5
29,299,105 UART: [art] Derive Key Pair - Done
29,312,042 UART: [art] Signing Cert with AUTHO
29,313,381 UART: RITY.KEYID = 7
31,600,395 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,902 UART: [art] PUB.X = 2512F9A586F5A50407AC7663BA229C56A3DC553A526DF280EE5F2D9ABC16B86E3DC44E2A6C5C2959DC69F70839B36A58
31,609,167 UART: [art] PUB.Y = AD585E9CF72660E5930430A132511E00FF87D12252270BB5BCC27FEA9AD1868B55FA00A71B35D8B38662F269B363E978
31,616,360 UART: [art] SIG.R = 7A04605B28DFB7BA6109FDC8C4ACBF12FCECA98BC6452F9FC41872AC7E1ADCA579C831434CD85551A839CD1C954EFB25
31,623,915 UART: [art] SIG.S = AD74634C0364129BBA53B5BFE8F65E7581B68F09755327810D90E65600A696DCEF4F6FBAE3506E69EE77887BB77F2115
32,929,034 UART: Caliptra RT
32,929,755 UART: [state] CFI Enabled
33,091,981 UART: [rt] RT listening for mailbox commands...
33,123,193 UART: [rt]cmd =0x47544744, len=8
33,125,188 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
193,039 UART:
193,406 UART: Running Caliptra ROM ...
194,506 UART:
604,150 UART: [state] CFI Enabled
616,185 UART: [state] LifecycleState = Unprovisioned
618,052 UART: [state] DebugLocked = No
620,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,297 UART: [kat] SHA2-256
794,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,571 UART: [kat] ++
805,083 UART: [kat] sha1
816,662 UART: [kat] SHA2-256
819,312 UART: [kat] SHA2-384
825,507 UART: [kat] SHA2-512-ACC
827,863 UART: [kat] ECC-384
3,112,190 UART: [kat] HMAC-384Kdf
3,123,504 UART: [kat] LMS
4,313,602 UART: [kat] --
4,318,259 UART: [cold-reset] ++
4,319,906 UART: [fht] Storing FHT @ 0x50003400
4,331,525 UART: [idev] ++
4,332,087 UART: [idev] CDI.KEYID = 6
4,333,117 UART: [idev] SUBJECT.KEYID = 7
4,334,287 UART: [idev] UDS.KEYID = 0
4,335,336 ready_for_fw is high
4,335,530 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,369 UART: [idev] Erasing UDS.KEYID = 0
7,617,963 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,553 UART: [idev] --
7,642,621 UART: [ldev] ++
7,643,183 UART: [ldev] CDI.KEYID = 6
7,644,119 UART: [ldev] SUBJECT.KEYID = 5
7,645,381 UART: [ldev] AUTHORITY.KEYID = 7
7,646,605 UART: [ldev] FE.KEYID = 1
7,656,922 UART: [ldev] Erasing FE.KEYID = 1
10,948,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,844 UART: [ldev] --
13,310,265 UART: [fwproc] Waiting for Commands...
13,311,976 UART: [fwproc] Received command 0x46574c44
13,314,210 UART: [fwproc] Received Image of size 113760 bytes
17,359,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,051 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,639 >>> mbox cmd response: success
17,818,201 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,821,051 UART: [afmc] ++
17,821,693 UART: [afmc] CDI.KEYID = 6
17,822,574 UART: [afmc] SUBJECT.KEYID = 7
17,823,795 UART: [afmc] AUTHORITY.KEYID = 5
21,134,597 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,427,102 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,429,356 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,443,782 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,458,548 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,473,032 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,493,911 UART: [afmc] --
23,497,717 UART: [cold-reset] --
23,501,087 UART: [state] Locking Datavault
23,504,835 UART: [state] Locking PCR0, PCR1 and PCR31
23,506,580 UART: [state] Locking ICCM
23,507,818 UART: [exit] Launching FMC @ 0x40000130
23,516,217 UART:
23,516,448 UART: Running Caliptra FMC ...
23,517,494 UART:
23,517,643 UART: [state] CFI Enabled
23,525,635 UART: [fht] FMC Alias Private Key: 7
25,856,869 UART: [art] Extend RT PCRs Done
25,858,089 UART: [art] Lock RT PCRs Done
25,860,040 UART: [art] Populate DV Done
25,865,351 UART: [fht] FMC Alias Private Key: 7
25,866,992 UART: [art] Derive CDI
25,867,722 UART: [art] Store in in slot 0x4
25,910,370 UART: [art] Derive Key Pair
25,911,411 UART: [art] Store priv key in slot 0x5
29,152,800 UART: [art] Derive Key Pair - Done
29,165,953 UART: [art] Signing Cert with AUTHO
29,167,257 UART: RITY.KEYID = 7
31,447,021 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,525 UART: [art] PUB.X = 4235E16455BCDA3B2206CBAE8ED3E4094DE8C73D9EE00E23D1D29A7FEFA40C0C9B4E88A90FAAA7487C1740F2A95D9C98
31,455,844 UART: [art] PUB.Y = 0A84CD5FAB453D0FA75231321DA2DCDA0415DDC190E80D591F69BD486F7ACBD4AD43E7C16D40003318D84BFD52AB527F
31,463,098 UART: [art] SIG.R = B34726C03A160E1BB36154AA9509F6CE1F2146C0034982C832C6199FA13604C34BAD43E2662FCB3677D9F52A74028F9B
31,470,458 UART: [art] SIG.S = 79BFFF1F078424EC43E405530AED9D44D158FDC5131895F4C3AD2797DC7A3C381AC594CA4B3EB2B842D1BBFF66BD373F
32,776,220 UART: Caliptra RT
32,776,925 UART: [state] CFI Enabled
32,894,450 UART: [rt] RT listening for mailbox commands...
32,925,819 UART: [rt]cmd =0x47544744, len=8
32,927,756 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,588 writing to cptra_bootfsm_go
4,127,485 ready_for_fw is high
4,127,895 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,060,000 >>> mbox cmd response: success
18,060,906 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,700,515 UART:
23,700,904 UART: Running Caliptra FMC ...
23,702,041 UART:
23,702,196 UART: [state] CFI Enabled
23,709,929 UART: [fht] FMC Alias Private Key: 7
26,040,849 UART: [art] Extend RT PCRs Done
26,042,085 UART: [art] Lock RT PCRs Done
26,043,827 UART: [art] Populate DV Done
26,049,351 UART: [fht] FMC Alias Private Key: 7
26,050,954 UART: [art] Derive CDI
26,051,771 UART: [art] Store in in slot 0x4
26,094,256 UART: [art] Derive Key Pair
26,095,261 UART: [art] Store priv key in slot 0x5
29,337,328 UART: [art] Derive Key Pair - Done
29,350,077 UART: [art] Signing Cert with AUTHO
29,351,384 UART: RITY.KEYID = 7
31,631,149 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,657 UART: [art] PUB.X = F095842304A0AF1DA4CD3596D9A553F762B05DD879A93A049B73F16594F9D7F5888580DD6A7B55F7EA675C76E9DCB6E9
31,639,894 UART: [art] PUB.Y = 2E3969ACA61189996FE6AF01F14B74BBD975208C231FD9ED9A355955FF325FF20DD179C97A1533BFF3863A4B2E24386C
31,647,116 UART: [art] SIG.R = 8DAE42EDCFF141C37427C31823A25B7F71F7BF3AE078D00D1263D25477467A8779B4E2A678F5801255510EB75756D431
31,654,497 UART: [art] SIG.S = 9A0201B8F1C7B099FE34CF8E580F4F9069E7507EAE171FDC39F6E5C0F0D3E4966510626C296283CCB2AABECD9B3091CF
32,959,662 UART: Caliptra RT
32,960,386 UART: [state] CFI Enabled
33,077,417 UART: [rt] RT listening for mailbox commands...
33,108,789 UART: [rt]cmd =0x47544744, len=8
33,110,624 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,539 writing to cptra_bootfsm_go
192,743 UART:
193,113 UART: Running Caliptra ROM ...
194,318 UART:
194,467 UART: [state] CFI Enabled
260,084 UART: [state] LifecycleState = Unprovisioned
261,942 UART: [state] DebugLocked = No
263,194 UART: [state] WD Timer not started. Device not locked for debugging
267,156 UART: [kat] SHA2-256
446,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,823 UART: [kat] ++
458,446 UART: [kat] sha1
470,342 UART: [kat] SHA2-256
473,377 UART: [kat] SHA2-384
479,867 UART: [kat] SHA2-512-ACC
482,867 UART: [kat] ECC-384
2,947,820 UART: [kat] HMAC-384Kdf
2,970,295 UART: [kat] LMS
3,499,768 UART: [kat] --
3,503,637 UART: [cold-reset] ++
3,504,511 UART: [fht] FHT @ 0x50003400
3,516,693 UART: [idev] ++
3,517,254 UART: [idev] CDI.KEYID = 6
3,518,160 UART: [idev] SUBJECT.KEYID = 7
3,519,331 UART: [idev] UDS.KEYID = 0
3,520,372 ready_for_fw is high
3,520,584 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,044 UART: [idev] Erasing UDS.KEYID = 0
6,024,719 UART: [idev] Sha1 KeyId Algorithm
6,048,024 UART: [idev] --
6,051,980 UART: [ldev] ++
6,052,549 UART: [ldev] CDI.KEYID = 6
6,053,457 UART: [ldev] SUBJECT.KEYID = 5
6,054,556 UART: [ldev] AUTHORITY.KEYID = 7
6,055,915 UART: [ldev] FE.KEYID = 1
6,099,191 UART: [ldev] Erasing FE.KEYID = 1
8,601,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,263 UART: [ldev] --
10,391,208 UART: [fwproc] Wait for Commands...
10,393,314 UART: [fwproc] Recv command 0x46574c44
10,395,369 UART: [fwproc] Recv'd Img size: 114084 bytes
13,792,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,253,473 >>> mbox cmd response: success
14,254,017 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,257,929 UART: [afmc] ++
14,258,510 UART: [afmc] CDI.KEYID = 6
14,259,423 UART: [afmc] SUBJECT.KEYID = 7
14,260,630 UART: [afmc] AUTHORITY.KEYID = 5
16,806,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,126 UART: [afmc] --
18,624,799 UART: [cold-reset] --
18,627,588 UART: [state] Locking Datavault
18,632,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,043 UART: [state] Locking ICCM
18,636,463 UART: [exit] Launching FMC @ 0x40000130
18,644,912 UART:
18,645,139 UART: Running Caliptra FMC ...
18,646,233 UART:
18,646,395 UART: [state] CFI Enabled
18,707,544 UART: [fht] FMC Alias Private Key: 7
20,471,034 UART: [art] Extend RT PCRs Done
20,472,258 UART: [art] Lock RT PCRs Done
20,474,095 UART: [art] Populate DV Done
20,479,726 UART: [fht] FMC Alias Private Key: 7
20,481,373 UART: [art] Derive CDI
20,482,112 UART: [art] Store in in slot 0x4
20,539,739 UART: [art] Derive Key Pair
20,540,781 UART: [art] Store priv key in slot 0x5
23,003,644 UART: [art] Derive Key Pair - Done
23,016,865 UART: [art] Signing Cert with AUTHO
23,018,171 UART: RITY.KEYID = 7
24,729,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,846 UART: [art] PUB.X = ECBDC66EDD0F3608A56400F7D5BD83C605B4A128BCE66DF44C6936D80829D2290402BF2051E1E57CD3ED3BE638465210
24,738,127 UART: [art] PUB.Y = CB87B2651B34B792EA896B2F37207F4ED1DC0800CF8E0F884A506131FE471963CDE9014265711845EAE1A443FA1D3491
24,745,329 UART: [art] SIG.R = 095DF3C9BCF563F3150CFF41045986DDFDBEB6CFED21D2598D36FB6F8BDE309DD8FBE2BA3A6D245C06DFA801EE8FFE62
24,752,745 UART: [art] SIG.S = ABE1969ABBB1659A73E05CDF769DBC4C775F312F00786E46BC2886361779793582E039C9B259168945C587703C925284
25,731,999 UART: Caliptra RT
25,732,700 UART: [state] CFI Enabled
25,898,574 UART: [rt] RT listening for mailbox commands...
25,930,096 UART: [rt]cmd =0x47544744, len=8
25,932,134 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,382,300 ready_for_fw is high
3,382,698 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,090,562 >>> mbox cmd response: success
14,091,389 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,385,764 UART:
18,386,159 UART: Running Caliptra FMC ...
18,387,345 UART:
18,387,517 UART: [state] CFI Enabled
18,452,584 UART: [fht] FMC Alias Private Key: 7
20,216,623 UART: [art] Extend RT PCRs Done
20,217,841 UART: [art] Lock RT PCRs Done
20,219,412 UART: [art] Populate DV Done
20,224,880 UART: [fht] FMC Alias Private Key: 7
20,226,483 UART: [art] Derive CDI
20,227,298 UART: [art] Store in in slot 0x4
20,285,122 UART: [art] Derive Key Pair
20,286,170 UART: [art] Store priv key in slot 0x5
22,749,317 UART: [art] Derive Key Pair - Done
22,762,104 UART: [art] Signing Cert with AUTHO
22,763,410 UART: RITY.KEYID = 7
24,474,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,273 UART: [art] PUB.X = C5F6DBC860A5F48689A5782CDE8C78388EDA39D3B77C4DB2F7FECFA71B31DA315FFE1771913073697FC88115B7A581B8
24,483,560 UART: [art] PUB.Y = B25C33B58E13D9C09C1224E6C32E38DB43E5DAF7A718A2F5D7DA69185A4A383DC09297AB8443413501CA078180BCE9A1
24,490,851 UART: [art] SIG.R = 74F327F22C77D567AE9560DD4C4AC9E5B37F9D73BE5D965D22BAD446488CEDD1BBB7E766197B479CD5AF7D6B2BE9782E
24,498,281 UART: [art] SIG.S = 2479DF940A06028633FA59C89FB78D2DCD7948CA6979701B875F6C58D2B92BBDFA450A75E3095DBD372AB069032F3A12
25,476,761 UART: Caliptra RT
25,477,474 UART: [state] CFI Enabled
25,641,848 UART: [rt] RT listening for mailbox commands...
25,673,150 UART: [rt]cmd =0x47544744, len=8
25,675,028 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,897 writing to cptra_bootfsm_go
193,134 UART:
193,494 UART: Running Caliptra ROM ...
194,593 UART:
604,404 UART: [state] CFI Enabled
620,709 UART: [state] LifecycleState = Unprovisioned
622,603 UART: [state] DebugLocked = No
624,065 UART: [state] WD Timer not started. Device not locked for debugging
628,605 UART: [kat] SHA2-256
807,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,277 UART: [kat] ++
819,814 UART: [kat] sha1
829,581 UART: [kat] SHA2-256
832,624 UART: [kat] SHA2-384
839,189 UART: [kat] SHA2-512-ACC
842,198 UART: [kat] ECC-384
3,283,900 UART: [kat] HMAC-384Kdf
3,296,976 UART: [kat] LMS
3,826,475 UART: [kat] --
3,831,458 UART: [cold-reset] ++
3,834,023 UART: [fht] FHT @ 0x50003400
3,846,087 UART: [idev] ++
3,846,667 UART: [idev] CDI.KEYID = 6
3,847,552 UART: [idev] SUBJECT.KEYID = 7
3,848,795 UART: [idev] UDS.KEYID = 0
3,849,698 ready_for_fw is high
3,849,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,179 UART: [idev] Erasing UDS.KEYID = 0
6,323,345 UART: [idev] Sha1 KeyId Algorithm
6,345,964 UART: [idev] --
6,349,451 UART: [ldev] ++
6,350,031 UART: [ldev] CDI.KEYID = 6
6,350,951 UART: [ldev] SUBJECT.KEYID = 5
6,352,114 UART: [ldev] AUTHORITY.KEYID = 7
6,353,347 UART: [ldev] FE.KEYID = 1
6,364,313 UART: [ldev] Erasing FE.KEYID = 1
8,836,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,912 UART: [ldev] --
10,628,937 UART: [fwproc] Wait for Commands...
10,631,519 UART: [fwproc] Recv command 0x46574c44
10,633,559 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,493,991 >>> mbox cmd response: success
14,494,482 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,497,690 UART: [afmc] ++
14,498,275 UART: [afmc] CDI.KEYID = 6
14,499,156 UART: [afmc] SUBJECT.KEYID = 7
14,500,388 UART: [afmc] AUTHORITY.KEYID = 5
17,005,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,743,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,759,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,775,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,418 UART: [afmc] --
18,802,341 UART: [cold-reset] --
18,806,743 UART: [state] Locking Datavault
18,811,502 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,149 UART: [state] Locking ICCM
18,814,169 UART: [exit] Launching FMC @ 0x40000130
18,822,565 UART:
18,822,803 UART: Running Caliptra FMC ...
18,823,907 UART:
18,824,085 UART: [state] CFI Enabled
18,832,090 UART: [fht] FMC Alias Private Key: 7
20,588,988 UART: [art] Extend RT PCRs Done
20,590,213 UART: [art] Lock RT PCRs Done
20,591,956 UART: [art] Populate DV Done
20,597,159 UART: [fht] FMC Alias Private Key: 7
20,598,658 UART: [art] Derive CDI
20,599,396 UART: [art] Store in in slot 0x4
20,641,929 UART: [art] Derive Key Pair
20,642,926 UART: [art] Store priv key in slot 0x5
23,069,138 UART: [art] Derive Key Pair - Done
23,082,241 UART: [art] Signing Cert with AUTHO
23,083,546 UART: RITY.KEYID = 7
24,789,326 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,842 UART: [art] PUB.X = A5E1A86F7BA97DE42618F358B9B4E0D01B5AD3C37601A408510F12EDC77DC6AEE88D7C20431FB08FA91850BDFBD2D10E
24,798,112 UART: [art] PUB.Y = 0CCD48ABAB8A740F74FDD76E8249EED03CA1CF771A362F2FB88BF6665696EB342288EDC819DEE72F8D373577D96EFD40
24,805,384 UART: [art] SIG.R = 889294D9E31D5C85B32B63ADE7E0BE753C99D53673F82DA940F0F2FCD3FD3C97292D133556A1387E2EEC7DBF06284217
24,812,819 UART: [art] SIG.S = D1C9F15B06D784896A6919A69112BDF7A252778B8CFA35A844AC658C5646AF5D392BFE98DF4EF33C5ABA7D5A7C44AAF7
25,791,679 UART: Caliptra RT
25,792,387 UART: [state] CFI Enabled
25,909,720 UART: [rt] RT listening for mailbox commands...
25,941,241 UART: [rt]cmd =0x47544744, len=8
25,943,064 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,915 writing to cptra_bootfsm_go
3,693,632 ready_for_fw is high
3,694,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,258,136 >>> mbox cmd response: success
14,258,778 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,506,968 UART:
18,507,353 UART: Running Caliptra FMC ...
18,508,549 UART:
18,508,714 UART: [state] CFI Enabled
18,516,815 UART: [fht] FMC Alias Private Key: 7
20,273,220 UART: [art] Extend RT PCRs Done
20,274,447 UART: [art] Lock RT PCRs Done
20,275,991 UART: [art] Populate DV Done
20,281,187 UART: [fht] FMC Alias Private Key: 7
20,282,785 UART: [art] Derive CDI
20,283,602 UART: [art] Store in in slot 0x4
20,325,986 UART: [art] Derive Key Pair
20,327,024 UART: [art] Store priv key in slot 0x5
22,753,836 UART: [art] Derive Key Pair - Done
22,766,840 UART: [art] Signing Cert with AUTHO
22,768,158 UART: RITY.KEYID = 7
24,473,622 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,117 UART: [art] PUB.X = 89490D769395803A02F14334016FEA7EAEC8745EFB1A77792D0BBE3BEBF5C9F7016008042D7815AFA7B782F7CC1C560B
24,482,386 UART: [art] PUB.Y = E4BB00BECE37969DDCEA2B340976B07B089D29913D69FC0BD322E025D3051070877568F201FEA9C2E0D5338B6B35D251
24,489,618 UART: [art] SIG.R = 185F478906F050BE8C25AE0BF6F4F536D545BF63A7AD2B9DAFE84A8F28A5DBDDECCB277AA0255914A6481C6C69ABE9A4
24,497,043 UART: [art] SIG.S = 774F563425F42F4475D2AFA4DA524B833815484DA9EB9FE73CEDC7A890A2E5AE83529D0F12818F419A3279D146E64F68
25,475,803 UART: Caliptra RT
25,476,509 UART: [state] CFI Enabled
25,593,417 UART: [rt] RT listening for mailbox commands...
25,624,883 UART: [rt]cmd =0x47544744, len=8
25,626,931 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,358 UART:
192,750 UART: Running Caliptra ROM ...
193,899 UART:
194,046 UART: [state] CFI Enabled
263,881 UART: [state] LifecycleState = Unprovisioned
266,299 UART: [state] DebugLocked = No
268,755 UART: [state] WD Timer not started. Device not locked for debugging
273,872 UART: [kat] SHA2-256
463,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,591 UART: [kat] ++
475,066 UART: [kat] sha1
486,580 UART: [kat] SHA2-256
489,598 UART: [kat] SHA2-384
495,304 UART: [kat] SHA2-512-ACC
497,885 UART: [kat] ECC-384
2,950,636 UART: [kat] HMAC-384Kdf
2,972,118 UART: [kat] LMS
3,503,939 UART: [kat] --
3,507,508 UART: [cold-reset] ++
3,510,074 UART: [fht] FHT @ 0x50003400
3,521,426 UART: [idev] ++
3,522,143 UART: [idev] CDI.KEYID = 6
3,523,054 UART: [idev] SUBJECT.KEYID = 7
3,524,232 UART: [idev] UDS.KEYID = 0
3,525,158 ready_for_fw is high
3,525,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,832 UART: [idev] Erasing UDS.KEYID = 0
6,030,644 UART: [idev] Sha1 KeyId Algorithm
6,054,039 UART: [idev] --
6,057,989 UART: [ldev] ++
6,058,670 UART: [ldev] CDI.KEYID = 6
6,059,610 UART: [ldev] SUBJECT.KEYID = 5
6,060,766 UART: [ldev] AUTHORITY.KEYID = 7
6,061,995 UART: [ldev] FE.KEYID = 1
6,099,800 UART: [ldev] Erasing FE.KEYID = 1
8,607,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,370 UART: [ldev] --
10,411,088 UART: [fwproc] Wait for Commands...
10,414,259 UART: [fwproc] Recv command 0x46574c44
10,416,560 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,333 >>> mbox cmd response: success
14,590,881 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,595,049 UART: [afmc] ++
14,595,761 UART: [afmc] CDI.KEYID = 6
14,596,873 UART: [afmc] SUBJECT.KEYID = 7
14,598,445 UART: [afmc] AUTHORITY.KEYID = 5
17,130,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,594 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,764 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,591 UART: [afmc] --
18,946,293 UART: [cold-reset] --
18,951,077 UART: [state] Locking Datavault
18,958,280 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,499 UART: [state] Locking ICCM
18,963,496 UART: [exit] Launching FMC @ 0x40000130
18,972,179 UART:
18,972,406 UART: Running Caliptra FMC ...
18,973,426 UART:
18,973,590 UART: [state] CFI Enabled
19,029,088 UART: [fht] FMC Alias Private Key: 7
20,793,116 UART: [art] Extend RT PCRs Done
20,794,331 UART: [art] Lock RT PCRs Done
20,796,093 UART: [art] Populate DV Done
20,801,664 UART: [fht] FMC Alias Private Key: 7
20,803,200 UART: [art] Derive CDI
20,803,934 UART: [art] Store in in slot 0x4
20,861,861 UART: [art] Derive Key Pair
20,862,895 UART: [art] Store priv key in slot 0x5
23,325,697 UART: [art] Derive Key Pair - Done
23,338,636 UART: [art] Signing Cert with AUTHO
23,339,934 UART: RITY.KEYID = 7
25,050,996 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,507 UART: [art] PUB.X = 87FBBEAA139DEFB07B87F390565497183B74729CFDF010D0E7F84BBB9DADBDCC862F7974086BB847D40242E70B03081D
25,059,775 UART: [art] PUB.Y = 3D9B4737E396F50F2880EB2418C72EEFAAA18B4B6E6E25E7F3E72F7E58616E4886FC5308CE408FA4D6BD04E3446F9B7E
25,067,077 UART: [art] SIG.R = A434253950FBB2096CF43D62A95AAA7FE079E22C2EFCB3F457A7CD79541979C1268ABCC98E7CE20E9166D6C7ADB14B18
25,074,451 UART: [art] SIG.S = B2FA104744B5A03653A6649453CBEC3581F399D4FF3463AC6958EB84801AB95BA351345D7F42114DF6B7FD7403641CB7
26,053,089 UART: Caliptra RT
26,053,807 UART: [state] CFI Enabled
26,219,340 UART: [rt] RT listening for mailbox commands...
26,250,644 UART: [rt]cmd =0x47544744, len=8
26,252,846 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,437,463 ready_for_fw is high
3,437,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,733,196 >>> mbox cmd response: success
14,733,932 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,032,328 UART:
19,032,720 UART: Running Caliptra FMC ...
19,033,829 UART:
19,033,981 UART: [state] CFI Enabled
19,095,683 UART: [fht] FMC Alias Private Key: 7
20,859,644 UART: [art] Extend RT PCRs Done
20,860,874 UART: [art] Lock RT PCRs Done
20,862,257 UART: [art] Populate DV Done
20,867,894 UART: [fht] FMC Alias Private Key: 7
20,869,541 UART: [art] Derive CDI
20,870,274 UART: [art] Store in in slot 0x4
20,928,585 UART: [art] Derive Key Pair
20,929,619 UART: [art] Store priv key in slot 0x5
23,392,859 UART: [art] Derive Key Pair - Done
23,405,845 UART: [art] Signing Cert with AUTHO
23,407,197 UART: RITY.KEYID = 7
25,119,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,656 UART: [art] PUB.X = 8B9D385EBAABF3CD695CA2F6335F62F6ADD8EEF002E1A3C44CDA401F7E7CB7B15216A53F24AE8BED805A215C621F1FE9
25,127,942 UART: [art] PUB.Y = 466D354F240A50DC38D1B52C7CC737BC915D996CE85ACE7633CFE4D278F6A6EF3443738ADEC3F183CBD7CA4E3A21D828
25,135,237 UART: [art] SIG.R = 2EDAB03F406FE4679B315938375EAEC6047029831B2D1090526184F019510E6B8F2B6E9D6E5F65826DB6CC3F3EEAFAA7
25,142,585 UART: [art] SIG.S = C792D3A626E76FBB5E514196FE369DE19248EC1B273F873C1B6AE6158ABB8257855CA424F21BAB68E318CC60E151F8CB
26,121,973 UART: Caliptra RT
26,122,841 UART: [state] CFI Enabled
26,286,974 UART: [rt] RT listening for mailbox commands...
26,318,337 UART: [rt]cmd =0x47544744, len=8
26,320,589 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,769 writing to cptra_bootfsm_go
192,889 UART:
193,299 UART: Running Caliptra ROM ...
194,444 UART:
603,905 UART: [state] CFI Enabled
618,708 UART: [state] LifecycleState = Unprovisioned
621,082 UART: [state] DebugLocked = No
624,031 UART: [state] WD Timer not started. Device not locked for debugging
629,274 UART: [kat] SHA2-256
819,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,905 UART: [kat] ++
830,428 UART: [kat] sha1
841,675 UART: [kat] SHA2-256
844,650 UART: [kat] SHA2-384
851,148 UART: [kat] SHA2-512-ACC
853,732 UART: [kat] ECC-384
3,294,513 UART: [kat] HMAC-384Kdf
3,306,213 UART: [kat] LMS
3,838,071 UART: [kat] --
3,843,936 UART: [cold-reset] ++
3,845,950 UART: [fht] FHT @ 0x50003400
3,857,998 UART: [idev] ++
3,858,636 UART: [idev] CDI.KEYID = 6
3,859,666 UART: [idev] SUBJECT.KEYID = 7
3,860,846 UART: [idev] UDS.KEYID = 0
3,861,783 ready_for_fw is high
3,861,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,386 UART: [idev] Erasing UDS.KEYID = 0
6,335,541 UART: [idev] Sha1 KeyId Algorithm
6,358,920 UART: [idev] --
6,362,731 UART: [ldev] ++
6,363,416 UART: [ldev] CDI.KEYID = 6
6,364,332 UART: [ldev] SUBJECT.KEYID = 5
6,365,488 UART: [ldev] AUTHORITY.KEYID = 7
6,366,735 UART: [ldev] FE.KEYID = 1
6,378,622 UART: [ldev] Erasing FE.KEYID = 1
8,857,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,364 UART: [ldev] --
10,648,257 UART: [fwproc] Wait for Commands...
10,651,429 UART: [fwproc] Recv command 0x46574c44
10,653,735 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,534 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,259 >>> mbox cmd response: success
14,828,788 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,831,685 UART: [afmc] ++
14,832,388 UART: [afmc] CDI.KEYID = 6
14,833,646 UART: [afmc] SUBJECT.KEYID = 7
14,835,089 UART: [afmc] AUTHORITY.KEYID = 5
17,342,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,813 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,157 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,146 UART: [afmc] --
19,134,824 UART: [cold-reset] --
19,139,446 UART: [state] Locking Datavault
19,145,132 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,283 UART: [state] Locking ICCM
19,149,847 UART: [exit] Launching FMC @ 0x40000130
19,158,491 UART:
19,158,772 UART: Running Caliptra FMC ...
19,159,803 UART:
19,159,952 UART: [state] CFI Enabled
19,168,509 UART: [fht] FMC Alias Private Key: 7
20,925,589 UART: [art] Extend RT PCRs Done
20,926,805 UART: [art] Lock RT PCRs Done
20,928,453 UART: [art] Populate DV Done
20,933,863 UART: [fht] FMC Alias Private Key: 7
20,935,352 UART: [art] Derive CDI
20,936,112 UART: [art] Store in in slot 0x4
20,978,490 UART: [art] Derive Key Pair
20,979,487 UART: [art] Store priv key in slot 0x5
23,406,556 UART: [art] Derive Key Pair - Done
23,419,342 UART: [art] Signing Cert with AUTHO
23,420,645 UART: RITY.KEYID = 7
25,126,278 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,784 UART: [art] PUB.X = 1191A7E383C44C5EC024FAF79C2E79246E1C69CE97F1D5BB9FA30A270E3237ACF216E379F638FA0BFDCEF77CBBAB646B
25,135,055 UART: [art] PUB.Y = EC5E7D340424340BEE91D566D31962AFC4FD3B01AAAD951D8D28B5022ACFEEA5FC115E025D81128DF4713797F79C2E9E
25,142,363 UART: [art] SIG.R = 2E300E2FFDDDD27A94D18CFA3CE60D6860E31294CC7B326010EF2D1FF5CEAF1D802D3494974B5B568C53365CA302054B
25,149,726 UART: [art] SIG.S = 70D4C18C7049623A55C474BA7AF8AF1E4F2A1699989F3E8EB659BAA061BB10FA3F59D23603FDAF4772F84C8814B38B84
26,128,926 UART: Caliptra RT
26,129,613 UART: [state] CFI Enabled
26,246,828 UART: [rt] RT listening for mailbox commands...
26,278,548 UART: [rt]cmd =0x47544744, len=8
26,280,400 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
3,754,467 ready_for_fw is high
3,754,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,948,603 >>> mbox cmd response: success
14,949,193 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,196,758 UART:
19,197,151 UART: Running Caliptra FMC ...
19,198,270 UART:
19,198,424 UART: [state] CFI Enabled
19,206,328 UART: [fht] FMC Alias Private Key: 7
20,962,720 UART: [art] Extend RT PCRs Done
20,963,947 UART: [art] Lock RT PCRs Done
20,965,603 UART: [art] Populate DV Done
20,970,914 UART: [fht] FMC Alias Private Key: 7
20,972,462 UART: [art] Derive CDI
20,973,281 UART: [art] Store in in slot 0x4
21,015,850 UART: [art] Derive Key Pair
21,016,901 UART: [art] Store priv key in slot 0x5
23,443,603 UART: [art] Derive Key Pair - Done
23,456,555 UART: [art] Signing Cert with AUTHO
23,457,865 UART: RITY.KEYID = 7
25,163,367 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,870 UART: [art] PUB.X = 3A9B6FBBFEBC1ED29E8A4C6B7A9E945572A418C6324CA4D95FEE2934A90E71405CD209A4450D3E93A22B55C2F6A7D680
25,172,118 UART: [art] PUB.Y = 4B886F354D0BB18ACC2E6EE860EFB20A82AF9E77674F7AF9C68746D027157D2C93642E839C954926AD45C6F2DD5A2282
25,179,404 UART: [art] SIG.R = A50957E1EDB3C0551AB13FC8FA767965A13B77E4D643A9EC052FF72D2BC5F741185391DBFEC9257E3D269AA633152384
25,186,776 UART: [art] SIG.S = DDE2868358FAE4FD17BC21534D6C425AF6066D784436E27574CC96DB11C36E04A43D7D296EC7032D9397055FB38577F3
26,166,125 UART: Caliptra RT
26,166,829 UART: [state] CFI Enabled
26,284,125 UART: [rt] RT listening for mailbox commands...
26,315,434 UART: [rt]cmd =0x47544744, len=8
26,317,432 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,415 UART: [kat] SHA2-256
892,353 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,590 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,451 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,590 UART: [idev] Erasing UDS.KEYID = 0
1,505,730 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,438 UART: [idev] --
1,515,359 UART: [ldev] ++
1,515,527 UART: [ldev] CDI.KEYID = 6
1,515,890 UART: [ldev] SUBJECT.KEYID = 5
1,516,316 UART: [ldev] AUTHORITY.KEYID = 7
1,516,779 UART: [ldev] FE.KEYID = 1
1,521,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,936 UART: [ldev] --
1,586,263 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 114084 bytes
2,882,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,978 >>> mbox cmd response: success
3,074,978 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,076,176 UART: [afmc] ++
3,076,344 UART: [afmc] CDI.KEYID = 6
3,076,706 UART: [afmc] SUBJECT.KEYID = 7
3,077,131 UART: [afmc] AUTHORITY.KEYID = 5
3,112,052 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,712 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,105 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,795 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,594 UART: [afmc] --
3,155,716 UART: [cold-reset] --
3,156,370 UART: [state] Locking Datavault
3,157,567 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,171 UART: [state] Locking ICCM
3,158,695 UART: [exit] Launching FMC @ 0x40000130
3,164,024 UART:
3,164,040 UART: Running Caliptra FMC ...
3,164,448 UART:
3,164,502 UART: [state] CFI Enabled
3,175,109 UART: [fht] FMC Alias Private Key: 7
3,283,124 UART: [art] Extend RT PCRs Done
3,283,552 UART: [art] Lock RT PCRs Done
3,285,240 UART: [art] Populate DV Done
3,293,165 UART: [fht] FMC Alias Private Key: 7
3,294,325 UART: [art] Derive CDI
3,294,605 UART: [art] Store in in slot 0x4
3,380,174 UART: [art] Derive Key Pair
3,380,534 UART: [art] Store priv key in slot 0x5
3,394,242 UART: [art] Derive Key Pair - Done
3,409,222 UART: [art] Signing Cert with AUTHO
3,409,702 UART: RITY.KEYID = 7
3,424,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,475 UART: [art] PUB.X = 7C824D2FF12CEBE4036EC6A61921C2984D85CDE8B49F297AF217F6394378DBF12A448CCADE254AFEFB9A028DAB50DC4C
3,432,261 UART: [art] PUB.Y = D64ABCAA4C1774F1B4EC539B396B8D5436A287581ED0475CE4B392C00AE1153355DA5530EEF0738756DB29CBFA8B69B3
3,439,218 UART: [art] SIG.R = 0FBE48096948D1A1C8C45A0FCE2C3D8E51310D59CB9C94A35205E654F335C93B452AD9F079FC3EA92491FFCB5405231D
3,445,978 UART: [art] SIG.S = 85278E946BB0EDF31AD51ECEDC095F1943F3A33370FF45EEA44CE70FB57ACD06C45B9FF6E46DDE2B8222ADA9A133525F
3,470,350 UART: Caliptra RT
3,470,603 UART: [state] CFI Enabled
3,578,254 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,032 UART: [rt]cmd =0x47544744, len=8
3,610,693 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,920 >>> mbox cmd response: success
2,923,920 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,984,378 UART:
2,984,394 UART: Running Caliptra FMC ...
2,984,802 UART:
2,984,856 UART: [state] CFI Enabled
2,995,255 UART: [fht] FMC Alias Private Key: 7
3,102,350 UART: [art] Extend RT PCRs Done
3,102,778 UART: [art] Lock RT PCRs Done
3,104,088 UART: [art] Populate DV Done
3,112,435 UART: [fht] FMC Alias Private Key: 7
3,113,375 UART: [art] Derive CDI
3,113,655 UART: [art] Store in in slot 0x4
3,199,324 UART: [art] Derive Key Pair
3,199,684 UART: [art] Store priv key in slot 0x5
3,213,122 UART: [art] Derive Key Pair - Done
3,227,767 UART: [art] Signing Cert with AUTHO
3,228,247 UART: RITY.KEYID = 7
3,243,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,342 UART: [art] PUB.X = CDF0720F1504CBEE800D0BEEA0E34EB07D92AC77C27F890D755FB23721A596C0EFBDF6E31DFE833295216F4BCFB8B935
3,251,117 UART: [art] PUB.Y = 0009A46897B5ABF62F2214515CB0C5BDFE6C6277F5DC359E74B86475D2DCAD046E1D44A0BDFCBBAC30BDA251A8894C70
3,258,057 UART: [art] SIG.R = 67BBE4FD8341FD0D37E65B06A02D9D802D945F15728E4A8BCD0CA2DCD45C6BF199B184B187B83B5617355EC77CB15D08
3,264,827 UART: [art] SIG.S = 3584FD46BE71D83D2378A8A9B9FEFD2D274555A6D6DDCD21CE6EF94F3DC86A4A3CC02B3982136EBAFD43D36952E71069
3,288,710 UART: Caliptra RT
3,288,963 UART: [state] CFI Enabled
3,397,807 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,009 UART: [rt]cmd =0x47544744, len=8
3,429,588 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,002 UART: [kat] SHA2-256
881,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,048 UART: [kat] ++
886,200 UART: [kat] sha1
890,530 UART: [kat] SHA2-256
892,468 UART: [kat] SHA2-384
895,185 UART: [kat] SHA2-512-ACC
897,086 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,210 UART: [cold-reset] ++
1,476,638 UART: [fht] Storing FHT @ 0x50003400
1,479,309 UART: [idev] ++
1,479,477 UART: [idev] CDI.KEYID = 6
1,479,837 UART: [idev] SUBJECT.KEYID = 7
1,480,261 UART: [idev] UDS.KEYID = 0
1,480,606 ready_for_fw is high
1,480,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,511 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,472 UART: [ldev] Erasing FE.KEYID = 1
1,546,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,111 UART: [ldev] --
1,586,514 UART: [fwproc] Waiting for Commands...
1,587,333 UART: [fwproc] Received command 0x46574c44
1,588,124 UART: [fwproc] Received Image of size 114084 bytes
2,883,950 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,153 >>> mbox cmd response: success
3,077,153 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,078,165 UART: [afmc] ++
3,078,333 UART: [afmc] CDI.KEYID = 6
3,078,695 UART: [afmc] SUBJECT.KEYID = 7
3,079,120 UART: [afmc] AUTHORITY.KEYID = 5
3,115,367 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,756 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,446 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,297 UART: [afmc] --
3,158,421 UART: [cold-reset] --
3,159,323 UART: [state] Locking Datavault
3,160,564 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,168 UART: [state] Locking ICCM
3,161,774 UART: [exit] Launching FMC @ 0x40000130
3,167,103 UART:
3,167,119 UART: Running Caliptra FMC ...
3,167,527 UART:
3,167,670 UART: [state] CFI Enabled
3,178,135 UART: [fht] FMC Alias Private Key: 7
3,286,012 UART: [art] Extend RT PCRs Done
3,286,440 UART: [art] Lock RT PCRs Done
3,287,802 UART: [art] Populate DV Done
3,296,009 UART: [fht] FMC Alias Private Key: 7
3,296,981 UART: [art] Derive CDI
3,297,261 UART: [art] Store in in slot 0x4
3,382,886 UART: [art] Derive Key Pair
3,383,246 UART: [art] Store priv key in slot 0x5
3,397,102 UART: [art] Derive Key Pair - Done
3,412,095 UART: [art] Signing Cert with AUTHO
3,412,575 UART: RITY.KEYID = 7
3,427,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,700 UART: [art] PUB.X = 816B01457948CBECB66210B678D0E70E9AC6D4ED5C9038AD0AB1D4F1E9916D9F55CE1D4AB4A80EAB1E147DB994ECD7B9
3,435,478 UART: [art] PUB.Y = E9954F52322570F17BB4639417672F2D4E562B2704A79767472F5960E10478120C4BBE9C8580C29E4E4F952673E1708A
3,442,403 UART: [art] SIG.R = 9275BC7EC085F2CCA4FEA7C83EA3AF4B01102FCB0EE59E3F410F2119F812F3ECA6EBBE6E78D44CCFB2C080C9867C8687
3,449,188 UART: [art] SIG.S = 2179656335D69B12425C25545F77EEEAFFB61D68408D64FF1A4CAFCCBB7E1836DE9D6080258FDAA72F60EA6155385568
3,473,581 UART: Caliptra RT
3,473,926 UART: [state] CFI Enabled
3,582,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,859 UART: [rt]cmd =0x47544744, len=8
3,614,466 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 ready_for_fw is high
1,362,740 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,063 >>> mbox cmd response: success
2,925,063 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,986,899 UART:
2,986,915 UART: Running Caliptra FMC ...
2,987,323 UART:
2,987,466 UART: [state] CFI Enabled
2,998,297 UART: [fht] FMC Alias Private Key: 7
3,106,114 UART: [art] Extend RT PCRs Done
3,106,542 UART: [art] Lock RT PCRs Done
3,108,038 UART: [art] Populate DV Done
3,116,327 UART: [fht] FMC Alias Private Key: 7
3,117,311 UART: [art] Derive CDI
3,117,591 UART: [art] Store in in slot 0x4
3,203,154 UART: [art] Derive Key Pair
3,203,514 UART: [art] Store priv key in slot 0x5
3,216,850 UART: [art] Derive Key Pair - Done
3,231,522 UART: [art] Signing Cert with AUTHO
3,232,002 UART: RITY.KEYID = 7
3,247,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,869 UART: [art] PUB.X = 006A8EA5D0D4EFE0535E6A48857CC634E0F00D163BA64A58CE3FBE0FF710B4F293874BB6D1D5CDB0EF3D2C343872B2BF
3,254,631 UART: [art] PUB.Y = 7497DFD0655A8B7BC2D4CBFD4120A733D425BC95DDB7D55F505D0F990AE304ED09F1296A4024048A1426DF798D7B19E6
3,261,574 UART: [art] SIG.R = 824B21D569684C41DD44AA219C53F10241E9A6ED91E874ECF99CC01FF15EA694E7FA9E38A2436390C845A1124D023E5F
3,268,342 UART: [art] SIG.S = CD47A5F4AD1CF05FF005F2751462E8E1E48C27228E1BB705F470DD09D6BFC2DF3767D434EA53EFBEBCD768882A19581B
3,292,508 UART: Caliptra RT
3,292,853 UART: [state] CFI Enabled
3,400,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,537 UART: [rt]cmd =0x47544744, len=8
3,433,084 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
918,052 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,174,760 UART: [idev] ++
1,174,928 UART: [idev] CDI.KEYID = 6
1,175,288 UART: [idev] SUBJECT.KEYID = 7
1,175,712 UART: [idev] UDS.KEYID = 0
1,176,057 ready_for_fw is high
1,176,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,724 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,997 UART: [ldev] ++
1,210,165 UART: [ldev] CDI.KEYID = 6
1,210,528 UART: [ldev] SUBJECT.KEYID = 5
1,210,954 UART: [ldev] AUTHORITY.KEYID = 7
1,211,417 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,379 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,947 >>> mbox cmd response: success
2,770,947 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,772,079 UART: [afmc] ++
2,772,247 UART: [afmc] CDI.KEYID = 6
2,772,609 UART: [afmc] SUBJECT.KEYID = 7
2,773,034 UART: [afmc] AUTHORITY.KEYID = 5
2,808,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,660 UART: [afmc] --
2,852,618 UART: [cold-reset] --
2,853,514 UART: [state] Locking Datavault
2,854,669 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,273 UART: [state] Locking ICCM
2,855,867 UART: [exit] Launching FMC @ 0x40000130
2,861,196 UART:
2,861,212 UART: Running Caliptra FMC ...
2,861,620 UART:
2,861,674 UART: [state] CFI Enabled
2,872,427 UART: [fht] FMC Alias Private Key: 7
2,980,422 UART: [art] Extend RT PCRs Done
2,980,850 UART: [art] Lock RT PCRs Done
2,982,634 UART: [art] Populate DV Done
2,990,593 UART: [fht] FMC Alias Private Key: 7
2,991,739 UART: [art] Derive CDI
2,992,019 UART: [art] Store in in slot 0x4
3,077,056 UART: [art] Derive Key Pair
3,077,416 UART: [art] Store priv key in slot 0x5
3,089,866 UART: [art] Derive Key Pair - Done
3,104,502 UART: [art] Signing Cert with AUTHO
3,104,982 UART: RITY.KEYID = 7
3,120,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,775 UART: [art] PUB.X = B16BF46896C6919AB0ADE045D9556108EFD248362718B0FC8BA76E5EC4C381CC1AC5A590F96A3B176BD78AEF1E8DAF9A
3,127,560 UART: [art] PUB.Y = 4D40CB75CA017E06580B165764EBAF395615797B51B10A435CC0304C49F12475379C3182D8253DEA85B53FBB50702697
3,134,490 UART: [art] SIG.R = 9C3C8C9B9B62321B2F9A4FD7CE390BC680B3FCF60BBD315A5D0B3333EB6DD9B55B744631BC956F04049B13BE722D1827
3,141,257 UART: [art] SIG.S = DD768849CD25B6EF5285725C0D80025C8A75AFD7CF753F4062D70D85827D57B0AC0AA111ABEF8FDA8B2402F5829411DA
3,165,343 UART: Caliptra RT
3,165,596 UART: [state] CFI Enabled
3,273,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,826 UART: [rt]cmd =0x47544744, len=8
3,305,651 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,671 ready_for_fw is high
1,060,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,762 >>> mbox cmd response: success
2,623,762 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,408 UART:
2,685,424 UART: Running Caliptra FMC ...
2,685,832 UART:
2,685,886 UART: [state] CFI Enabled
2,696,103 UART: [fht] FMC Alias Private Key: 7
2,803,924 UART: [art] Extend RT PCRs Done
2,804,352 UART: [art] Lock RT PCRs Done
2,805,702 UART: [art] Populate DV Done
2,814,087 UART: [fht] FMC Alias Private Key: 7
2,815,057 UART: [art] Derive CDI
2,815,337 UART: [art] Store in in slot 0x4
2,900,880 UART: [art] Derive Key Pair
2,901,240 UART: [art] Store priv key in slot 0x5
2,914,346 UART: [art] Derive Key Pair - Done
2,928,943 UART: [art] Signing Cert with AUTHO
2,929,423 UART: RITY.KEYID = 7
2,945,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,972 UART: [art] PUB.X = 66B7BD392FD97AEA5137E0EDD93F5A791A2D88B19AB47CD1B1F3680767116D66E31F979CD87F2D5B5AD2E3068B93DA84
2,952,748 UART: [art] PUB.Y = 0C3A23F51C863722FD720CDE0BAFBE3CFB9D6850AC973B555D45C6B1193B2A26588130E63876A062C80AE201C902BCDE
2,959,690 UART: [art] SIG.R = 1004CB61E20629F9AEAAED8B2E4503D208F0A9B2256A070B6C34090C887A3FAB0E5E1C986526598AF2A6399E312E1716
2,966,435 UART: [art] SIG.S = DE18879C8EDB16D3FD4D3FF5E12054B5E4D8146FF1416E8B62D7762C9CEAEFC735750670AF0D0B8DE3B908A4B6EEEC22
2,990,354 UART: Caliptra RT
2,990,607 UART: [state] CFI Enabled
3,098,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,372 UART: [rt]cmd =0x47544744, len=8
3,130,957 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
893,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,962 UART: [kat] ++
898,114 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,673 UART: [kat] HMAC-384Kdf
923,349 UART: [kat] LMS
1,171,677 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,850 UART: [fht] FHT @ 0x50003400
1,175,541 UART: [idev] ++
1,175,709 UART: [idev] CDI.KEYID = 6
1,176,069 UART: [idev] SUBJECT.KEYID = 7
1,176,493 UART: [idev] UDS.KEYID = 0
1,176,838 ready_for_fw is high
1,176,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,699 UART: [idev] Erasing UDS.KEYID = 0
1,202,104 UART: [idev] Sha1 KeyId Algorithm
1,210,466 UART: [idev] --
1,211,614 UART: [ldev] ++
1,211,782 UART: [ldev] CDI.KEYID = 6
1,212,145 UART: [ldev] SUBJECT.KEYID = 5
1,212,571 UART: [ldev] AUTHORITY.KEYID = 7
1,213,034 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,245,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,156 UART: [ldev] --
1,284,595 UART: [fwproc] Wait for Commands...
1,285,327 UART: [fwproc] Recv command 0x46574c44
1,286,055 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,432 >>> mbox cmd response: success
2,772,432 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,773,618 UART: [afmc] ++
2,773,786 UART: [afmc] CDI.KEYID = 6
2,774,148 UART: [afmc] SUBJECT.KEYID = 7
2,774,573 UART: [afmc] AUTHORITY.KEYID = 5
2,809,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,111 UART: [afmc] --
2,853,189 UART: [cold-reset] --
2,853,855 UART: [state] Locking Datavault
2,854,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,522 UART: [state] Locking ICCM
2,856,162 UART: [exit] Launching FMC @ 0x40000130
2,861,491 UART:
2,861,507 UART: Running Caliptra FMC ...
2,861,915 UART:
2,862,058 UART: [state] CFI Enabled
2,872,611 UART: [fht] FMC Alias Private Key: 7
2,980,462 UART: [art] Extend RT PCRs Done
2,980,890 UART: [art] Lock RT PCRs Done
2,982,286 UART: [art] Populate DV Done
2,990,555 UART: [fht] FMC Alias Private Key: 7
2,991,707 UART: [art] Derive CDI
2,991,987 UART: [art] Store in in slot 0x4
3,077,656 UART: [art] Derive Key Pair
3,078,016 UART: [art] Store priv key in slot 0x5
3,091,198 UART: [art] Derive Key Pair - Done
3,105,746 UART: [art] Signing Cert with AUTHO
3,106,226 UART: RITY.KEYID = 7
3,121,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,177 UART: [art] PUB.X = 7FB986ADCE465C2B71EEAEE67E2312FF8C7581FAB3CB95E30726C9426CB026CF49CBF9DCBFB3FF9770E8C8A5A12B7551
3,128,968 UART: [art] PUB.Y = 3788EB0A8A0AD0589B623E15FF851A78F926A91273E3E318A22CB2D214538DA9BF081D872D88B0561CF71488D0077301
3,135,899 UART: [art] SIG.R = 777841B103B3D94934D7F20FA0814C5FCDFCF5A17D84EF72D5700AE69E37C6846360C224569B2B5189743E46C6B1F11F
3,142,660 UART: [art] SIG.S = ACCDFCB1BAB875FB90A20C281C37D620B46BBD85A648BBCD0334FCF90B7E0C4419D11103C493CFDD0E12639458E436C1
3,165,855 UART: Caliptra RT
3,166,200 UART: [state] CFI Enabled
3,273,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,215 UART: [rt]cmd =0x47544744, len=8
3,305,944 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,436 ready_for_fw is high
1,061,436 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,899 >>> mbox cmd response: success
2,622,899 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,695 UART:
2,685,711 UART: Running Caliptra FMC ...
2,686,119 UART:
2,686,262 UART: [state] CFI Enabled
2,696,907 UART: [fht] FMC Alias Private Key: 7
2,804,804 UART: [art] Extend RT PCRs Done
2,805,232 UART: [art] Lock RT PCRs Done
2,806,846 UART: [art] Populate DV Done
2,815,265 UART: [fht] FMC Alias Private Key: 7
2,816,369 UART: [art] Derive CDI
2,816,649 UART: [art] Store in in slot 0x4
2,902,120 UART: [art] Derive Key Pair
2,902,480 UART: [art] Store priv key in slot 0x5
2,916,106 UART: [art] Derive Key Pair - Done
2,930,760 UART: [art] Signing Cert with AUTHO
2,931,240 UART: RITY.KEYID = 7
2,946,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,907 UART: [art] PUB.X = 2DB01583EC58E1C77333260984DEA056709881A22AE0FEAC78208966B7070AA0B28D08D44488E3D40CDB3EF7B044C434
2,953,662 UART: [art] PUB.Y = B6C536F0391F68A5AB5CF273BFE031A27AC61818FF5194EE9653DB7EACB731F62304E986C425F5C5552490BC27D5510E
2,960,612 UART: [art] SIG.R = 041594BB8517270A720BDFC000285CDEC0F6E9E421AB3C3305632CF4F32F90C0FE3AF891106A3527D55CE9627D355B85
2,967,350 UART: [art] SIG.S = 9062511563D700D59F2BD4C2D3EE755231E9B94617C46C1CF736A656274D492301B60C3F8C1CC0ABE5F94AB3ED064176
2,991,170 UART: Caliptra RT
2,991,515 UART: [state] CFI Enabled
3,099,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,842 UART: [rt]cmd =0x47544744, len=8
3,131,595 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
915,780 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,087 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,538 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,786 UART: [fwproc] Wait for Commands...
1,281,545 UART: [fwproc] Recv command 0x46574c44
1,282,278 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,703 >>> mbox cmd response: success
2,769,703 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,770,728 UART: [afmc] ++
2,770,896 UART: [afmc] CDI.KEYID = 6
2,771,259 UART: [afmc] SUBJECT.KEYID = 7
2,771,685 UART: [afmc] AUTHORITY.KEYID = 5
2,807,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,213 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,355 UART: [afmc] --
2,850,365 UART: [cold-reset] --
2,851,259 UART: [state] Locking Datavault
2,852,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,144 UART: [state] Locking ICCM
2,853,750 UART: [exit] Launching FMC @ 0x40000130
2,859,079 UART:
2,859,095 UART: Running Caliptra FMC ...
2,859,503 UART:
2,859,557 UART: [state] CFI Enabled
2,870,130 UART: [fht] FMC Alias Private Key: 7
2,977,895 UART: [art] Extend RT PCRs Done
2,978,323 UART: [art] Lock RT PCRs Done
2,979,723 UART: [art] Populate DV Done
2,987,954 UART: [fht] FMC Alias Private Key: 7
2,988,904 UART: [art] Derive CDI
2,989,184 UART: [art] Store in in slot 0x4
3,074,733 UART: [art] Derive Key Pair
3,075,093 UART: [art] Store priv key in slot 0x5
3,088,503 UART: [art] Derive Key Pair - Done
3,103,073 UART: [art] Signing Cert with AUTHO
3,103,553 UART: RITY.KEYID = 7
3,119,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,810 UART: [art] PUB.X = 8B2B7CFB954323DAB1FC5DC69269453B156647E9FBB665343F6E9EB2D5476DE42F1C85D3E6BB4D30ACE5C0E604D5BA5D
3,126,595 UART: [art] PUB.Y = BD9897B43DA7DCA144ABC7CCEBBBFD06828400455F5D3A9A5769547D34A9C9188EBC685B743868C183BD71E55229A4F5
3,133,530 UART: [art] SIG.R = 86C9FE6A958298C9F00C01155860097318AF8A99C6E61E6587606156ADB1BDE709600FAC94AD735AA6FE961ECCB704BC
3,140,288 UART: [art] SIG.S = DBCA69FE4A7ECF080837993892082DF7FBBD3760451F03DC458C37F0589EFAFEF6FEEE56DD0C525583DA85E7DB2C1BCE
3,163,824 UART: Caliptra RT
3,164,077 UART: [state] CFI Enabled
3,271,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,243 UART: [rt]cmd =0x47544744, len=8
3,303,894 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 ready_for_fw is high
1,055,944 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,079 >>> mbox cmd response: success
2,619,079 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,681,753 UART:
2,681,769 UART: Running Caliptra FMC ...
2,682,177 UART:
2,682,231 UART: [state] CFI Enabled
2,692,720 UART: [fht] FMC Alias Private Key: 7
2,800,985 UART: [art] Extend RT PCRs Done
2,801,413 UART: [art] Lock RT PCRs Done
2,803,277 UART: [art] Populate DV Done
2,811,904 UART: [fht] FMC Alias Private Key: 7
2,813,020 UART: [art] Derive CDI
2,813,300 UART: [art] Store in in slot 0x4
2,898,883 UART: [art] Derive Key Pair
2,899,243 UART: [art] Store priv key in slot 0x5
2,912,207 UART: [art] Derive Key Pair - Done
2,926,927 UART: [art] Signing Cert with AUTHO
2,927,407 UART: RITY.KEYID = 7
2,942,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,346 UART: [art] PUB.X = F5B67AE8EC36C2FF56ABEDA3939E64783CECC6F3972A818A0598D26B80D8B04D539900DA86F1969692120CCE48610479
2,950,089 UART: [art] PUB.Y = 9EFC2E161A9613100F9B880EA67AA6A529DA117747AB2BFA59E898C796327A95F3D355B72E7541D2FF3BAC11B2F40929
2,957,036 UART: [art] SIG.R = 38CBB336640CA516867A6E516BE710B3AA591D1F45DFCC24EF7459FCA47D3AB5BDC948E8D5E06998CCD8E2AF79212F5C
2,963,821 UART: [art] SIG.S = 632B436C85D654D3F660FCA9637E6D376CEF10BB61AC8121E395E667DDD6FF3B4966F254081F4697F2888D731A704D29
2,987,773 UART: Caliptra RT
2,988,026 UART: [state] CFI Enabled
3,096,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,859 UART: [rt]cmd =0x47544744, len=8
3,128,358 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,915 UART: [kat] LMS
1,169,227 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,174,658 ready_for_fw is high
1,174,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,424 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,216,219 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,138 UART: [fwproc] Recv command 0x46574c44
1,283,871 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,548 >>> mbox cmd response: success
2,770,548 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,771,605 UART: [afmc] ++
2,771,773 UART: [afmc] CDI.KEYID = 6
2,772,136 UART: [afmc] SUBJECT.KEYID = 7
2,772,562 UART: [afmc] AUTHORITY.KEYID = 5
2,808,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,638 UART: [afmc] --
2,851,592 UART: [cold-reset] --
2,852,444 UART: [state] Locking Datavault
2,853,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,045 UART: [state] Locking ICCM
2,854,675 UART: [exit] Launching FMC @ 0x40000130
2,860,004 UART:
2,860,020 UART: Running Caliptra FMC ...
2,860,428 UART:
2,860,571 UART: [state] CFI Enabled
2,870,924 UART: [fht] FMC Alias Private Key: 7
2,979,029 UART: [art] Extend RT PCRs Done
2,979,457 UART: [art] Lock RT PCRs Done
2,981,131 UART: [art] Populate DV Done
2,989,272 UART: [fht] FMC Alias Private Key: 7
2,990,440 UART: [art] Derive CDI
2,990,720 UART: [art] Store in in slot 0x4
3,076,405 UART: [art] Derive Key Pair
3,076,765 UART: [art] Store priv key in slot 0x5
3,089,949 UART: [art] Derive Key Pair - Done
3,104,923 UART: [art] Signing Cert with AUTHO
3,105,403 UART: RITY.KEYID = 7
3,120,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,126 UART: [art] PUB.X = FD1792F29972DB0D8E974C4D587DE1ED58822FF77BC3CFCDEF61005F8B311E238D1377A0B9724B91484DABECC1B61411
3,127,883 UART: [art] PUB.Y = D94AF1AB0473338B2A38ECEF4E5BC7D984AE3EF15B690AFA890C5AAC2CE678F5D85DFB608309D16378CE30DF6CDF7829
3,134,843 UART: [art] SIG.R = 43B0EF3F27BD1D15774EC7730EA21F13DEADB5FF6539F8F1B61EFC4C9C763450029D034FC7A54390A8F2249F1495F975
3,141,612 UART: [art] SIG.S = 641AFA966AE62A5667646B90B63FD5ED545E7FAB765CF6C60EB38576CA2069980D0AA55D0E4D01BD830C8B7561DE909C
3,165,033 UART: Caliptra RT
3,165,378 UART: [state] CFI Enabled
3,274,873 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,387 UART: [rt]cmd =0x47544744, len=8
3,306,964 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 ready_for_fw is high
1,056,121 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,658 >>> mbox cmd response: success
2,618,658 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,681,382 UART:
2,681,398 UART: Running Caliptra FMC ...
2,681,806 UART:
2,681,949 UART: [state] CFI Enabled
2,692,166 UART: [fht] FMC Alias Private Key: 7
2,800,321 UART: [art] Extend RT PCRs Done
2,800,749 UART: [art] Lock RT PCRs Done
2,802,187 UART: [art] Populate DV Done
2,810,454 UART: [fht] FMC Alias Private Key: 7
2,811,576 UART: [art] Derive CDI
2,811,856 UART: [art] Store in in slot 0x4
2,897,469 UART: [art] Derive Key Pair
2,897,829 UART: [art] Store priv key in slot 0x5
2,911,443 UART: [art] Derive Key Pair - Done
2,926,318 UART: [art] Signing Cert with AUTHO
2,926,798 UART: RITY.KEYID = 7
2,942,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,987 UART: [art] PUB.X = 572383651D1FFB6BBAF5C6921210D52E2D441640841B4043BD7788AB9CA86B7288BE52425C2650BEBAF44D6B5E17C483
2,949,759 UART: [art] PUB.Y = 88118478D4FE379E4CE6ADC6D2890327E9377480C0BA1DCBE2F11C0A469D04E26794A5667F4089D0ACED874463F352D2
2,956,702 UART: [art] SIG.R = 1436E46E9DB64A6BA73309C649F0E701CAAA181CA11D0EEB919145E5FCDBAE43D887B56C525288D2F983BE872F8AEC72
2,963,477 UART: [art] SIG.S = 2730C5BFC2DAE48004FB79DFAD6A4024CD1D5A42877818BF76AC5D1A555194D04274645FB2580787FD3110757A204C55
2,987,746 UART: Caliptra RT
2,988,091 UART: [state] CFI Enabled
3,096,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,172 UART: [rt]cmd =0x47544744, len=8
3,128,629 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,058 UART:
192,422 UART: Running Caliptra ROM ...
193,959 UART:
194,118 UART: [state] CFI Enabled
267,842 UART: [state] LifecycleState = Unprovisioned
269,796 UART: [state] DebugLocked = No
272,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,132 UART: [kat] SHA2-256
446,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,346 UART: [kat] ++
457,828 UART: [kat] sha1
470,264 UART: [kat] SHA2-256
472,991 UART: [kat] SHA2-384
477,919 UART: [kat] SHA2-512-ACC
480,288 UART: [kat] ECC-384
2,769,878 UART: [kat] HMAC-384Kdf
2,801,451 UART: [kat] LMS
3,991,757 UART: [kat] --
3,997,337 UART: [cold-reset] ++
3,999,843 UART: [fht] Storing FHT @ 0x50003400
4,009,759 UART: [idev] ++
4,010,327 UART: [idev] CDI.KEYID = 6
4,011,249 UART: [idev] SUBJECT.KEYID = 7
4,012,495 UART: [idev] UDS.KEYID = 0
4,013,581 ready_for_fw is high
4,013,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,972 UART: [idev] Erasing UDS.KEYID = 0
7,349,614 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,730 UART: [idev] --
7,374,941 UART: [ldev] ++
7,375,512 UART: [ldev] CDI.KEYID = 6
7,376,480 UART: [ldev] SUBJECT.KEYID = 5
7,377,715 UART: [ldev] AUTHORITY.KEYID = 7
7,378,948 UART: [ldev] FE.KEYID = 1
7,427,573 UART: [ldev] Erasing FE.KEYID = 1
10,756,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,616 UART: [ldev] --
13,120,824 UART: [fwproc] Waiting for Commands...
13,123,833 UART: [fwproc] Received command 0x46574c44
13,126,065 UART: [fwproc] Received Image of size 113760 bytes
17,176,894 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,434 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,642,539 >>> mbox cmd response: success
17,643,097 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,647,079 UART: [afmc] ++
17,647,671 UART: [afmc] CDI.KEYID = 6
17,648,554 UART: [afmc] SUBJECT.KEYID = 7
17,649,823 UART: [afmc] AUTHORITY.KEYID = 5
21,013,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,313,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,315,651 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,330,074 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,344,916 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,359,357 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,380,858 UART: [afmc] --
23,384,068 UART: [cold-reset] --
23,388,248 UART: [state] Locking Datavault
23,393,613 UART: [state] Locking PCR0, PCR1 and PCR31
23,395,405 UART: [state] Locking ICCM
23,397,560 UART: [exit] Launching FMC @ 0x40000130
23,405,964 UART:
23,406,210 UART: Running Caliptra FMC ...
23,407,311 UART:
23,407,471 UART: [state] CFI Enabled
23,471,958 UART: [fht] FMC Alias Private Key: 7
25,810,214 UART: [art] Extend RT PCRs Done
25,811,454 UART: [art] Lock RT PCRs Done
25,812,919 UART: [art] Populate DV Done
25,818,386 UART: [fht] FMC Alias Private Key: 7
25,820,028 UART: [art] Derive CDI
25,820,843 UART: [art] Store in in slot 0x4
25,880,016 UART: [art] Derive Key Pair
25,881,061 UART: [art] Store priv key in slot 0x5
29,173,347 UART: [art] Derive Key Pair - Done
29,186,236 UART: [art] Signing Cert with AUTHO
29,187,555 UART: RITY.KEYID = 7
31,474,862 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,366 UART: [art] PUB.X = 0E50F3D0C68A25E807B224289FF841D5BE619D3A1D0E5EEACDDADD9DA0AA3BBE7190D974D06BCEC42EDDA433FA5830FF
31,483,634 UART: [art] PUB.Y = 71EEDE3ED57E435CFBF98946D1CB25803D8A4F522DC69584697510D473103C1B401408547246F1915A54295AA642A72B
31,490,868 UART: [art] SIG.R = 5E61CB8CA825C81EF231A5B18056B742AFF5E76F6F020D0650B55FC69F160D0F79CF1BCBA5AE1F105E82D9E952D51BF3
31,498,261 UART: [art] SIG.S = DE06F2F19D546F1C3C9F04A6AD8413A7155E8A9BA05A4A035FE73D203F8E672FEF254A1AF8BA4C96A38EC04CE52FA41F
32,803,799 UART: Caliptra RT
32,804,523 UART: [state] CFI Enabled
32,967,570 UART: [rt] RT listening for mailbox commands...
32,998,973 UART: [rt]cmd =0x54514754, len=24
33,001,488 >>> mbox cmd response data (8 bytes)
33,002,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,032,338 UART: [rt]cmd =0x54514754, len=24
33,034,371 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,780,232 ready_for_fw is high
3,780,767 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,408 >>> mbox cmd response: success
17,848,078 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,543,275 UART:
23,543,675 UART: Running Caliptra FMC ...
23,544,775 UART:
23,544,928 UART: [state] CFI Enabled
23,615,922 UART: [fht] FMC Alias Private Key: 7
25,953,994 UART: [art] Extend RT PCRs Done
25,955,221 UART: [art] Lock RT PCRs Done
25,956,671 UART: [art] Populate DV Done
25,961,987 UART: [fht] FMC Alias Private Key: 7
25,963,633 UART: [art] Derive CDI
25,964,374 UART: [art] Store in in slot 0x4
26,024,520 UART: [art] Derive Key Pair
26,025,522 UART: [art] Store priv key in slot 0x5
29,318,621 UART: [art] Derive Key Pair - Done
29,331,776 UART: [art] Signing Cert with AUTHO
29,333,095 UART: RITY.KEYID = 7
31,620,644 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,155 UART: [art] PUB.X = 2D3091AACEF2ADF5F4FC7D4E7D1EBAD2494BFAB55C9368FD1A720D68ED3AE5A6BCB0400BC5C2969771A81B1490F66E21
31,629,412 UART: [art] PUB.Y = 0BFC6933EAB1AE35C10805E4E21AB8EFB70F549753A5E5B53D39375B71315BB63F79D67525A6E90BB1417CC235F60DE4
31,636,689 UART: [art] SIG.R = 198A255FAD022E6CA19352B36A9E913CC68C6B7672351DC0BD8CBD4D07636F807B0AE6B3896E3F1EAE49A33D2A94D0A3
31,644,056 UART: [art] SIG.S = 2929E68631890642337E16C3BA4058AC92019808B0F3A2DC664B52786B44344CEB3B7FFD8120CD1A982311740F6DEADC
32,949,210 UART: Caliptra RT
32,949,929 UART: [state] CFI Enabled
33,109,844 UART: [rt] RT listening for mailbox commands...
33,141,313 UART: [rt]cmd =0x54514754, len=24
33,143,900 >>> mbox cmd response data (8 bytes)
33,144,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,174,108 UART: [rt]cmd =0x54514754, len=24
33,176,492 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
192,921 UART:
193,295 UART: Running Caliptra ROM ...
194,426 UART:
604,158 UART: [state] CFI Enabled
617,409 UART: [state] LifecycleState = Unprovisioned
619,355 UART: [state] DebugLocked = No
622,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,663 UART: [kat] SHA2-256
797,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,972 UART: [kat] ++
808,461 UART: [kat] sha1
820,280 UART: [kat] SHA2-256
822,936 UART: [kat] SHA2-384
830,231 UART: [kat] SHA2-512-ACC
832,565 UART: [kat] ECC-384
3,118,300 UART: [kat] HMAC-384Kdf
3,130,276 UART: [kat] LMS
4,320,368 UART: [kat] --
4,326,068 UART: [cold-reset] ++
4,327,650 UART: [fht] Storing FHT @ 0x50003400
4,338,487 UART: [idev] ++
4,339,045 UART: [idev] CDI.KEYID = 6
4,340,026 UART: [idev] SUBJECT.KEYID = 7
4,341,269 UART: [idev] UDS.KEYID = 0
4,342,357 ready_for_fw is high
4,342,587 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,580 UART: [idev] Erasing UDS.KEYID = 0
7,627,830 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,328 UART: [idev] --
7,652,732 UART: [ldev] ++
7,653,297 UART: [ldev] CDI.KEYID = 6
7,654,254 UART: [ldev] SUBJECT.KEYID = 5
7,655,458 UART: [ldev] AUTHORITY.KEYID = 7
7,656,741 UART: [ldev] FE.KEYID = 1
7,666,683 UART: [ldev] Erasing FE.KEYID = 1
10,955,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,750 UART: [ldev] --
13,314,814 UART: [fwproc] Waiting for Commands...
13,318,171 UART: [fwproc] Received command 0x46574c44
13,320,354 UART: [fwproc] Received Image of size 113760 bytes
17,364,166 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,258 >>> mbox cmd response: success
17,827,817 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,831,822 UART: [afmc] ++
17,832,415 UART: [afmc] CDI.KEYID = 6
17,833,319 UART: [afmc] SUBJECT.KEYID = 7
17,834,592 UART: [afmc] AUTHORITY.KEYID = 5
21,150,945 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,657 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,040 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,844 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,324 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,901 UART: [afmc] --
23,515,057 UART: [cold-reset] --
23,518,968 UART: [state] Locking Datavault
23,522,914 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,673 UART: [state] Locking ICCM
23,527,119 UART: [exit] Launching FMC @ 0x40000130
23,535,507 UART:
23,535,750 UART: Running Caliptra FMC ...
23,536,789 UART:
23,536,931 UART: [state] CFI Enabled
23,545,141 UART: [fht] FMC Alias Private Key: 7
25,875,957 UART: [art] Extend RT PCRs Done
25,877,182 UART: [art] Lock RT PCRs Done
25,878,779 UART: [art] Populate DV Done
25,884,244 UART: [fht] FMC Alias Private Key: 7
25,885,753 UART: [art] Derive CDI
25,886,571 UART: [art] Store in in slot 0x4
25,929,484 UART: [art] Derive Key Pair
25,930,482 UART: [art] Store priv key in slot 0x5
29,172,891 UART: [art] Derive Key Pair - Done
29,185,999 UART: [art] Signing Cert with AUTHO
29,187,303 UART: RITY.KEYID = 7
31,466,510 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,151 UART: [art] PUB.X = D8419720B451A786D5B5B08C123DA21E281162AA7665B9F26907DE720F0A5B2AA0253AF143300E7F2B02373BDD51B19E
31,475,253 UART: [art] PUB.Y = 3EC64DAC42270865B67FE29B4615F5C113C81D55E8FB9444D7E8B8292FB27BD9DE919E91436A3F73518E5B01E35728EF
31,482,506 UART: [art] SIG.R = 823928892BF5DFFCCD02AA9BD052CA2CA07C95991E8DFAC89700D2E22A79DD773AA4416BDF1FEF9781610CC07123844E
31,489,862 UART: [art] SIG.S = B074C6B4C6B445F3F3D348B8FCB20610AD5825C876F4E1CF8FE56EDF8986F19D8593769C49A8330D4C287C602F1D3AD7
32,795,251 UART: Caliptra RT
32,795,966 UART: [state] CFI Enabled
32,913,801 UART: [rt] RT listening for mailbox commands...
32,945,435 UART: [rt]cmd =0x54514754, len=24
32,948,316 >>> mbox cmd response data (8 bytes)
32,948,781 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,978,843 UART: [rt]cmd =0x54514754, len=24
32,981,357 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
4,125,828 ready_for_fw is high
4,126,349 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,072,440 >>> mbox cmd response: success
18,073,128 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,714,842 UART:
23,715,234 UART: Running Caliptra FMC ...
23,716,327 UART:
23,716,477 UART: [state] CFI Enabled
23,724,384 UART: [fht] FMC Alias Private Key: 7
26,054,487 UART: [art] Extend RT PCRs Done
26,055,725 UART: [art] Lock RT PCRs Done
26,057,527 UART: [art] Populate DV Done
26,062,974 UART: [fht] FMC Alias Private Key: 7
26,064,523 UART: [art] Derive CDI
26,065,261 UART: [art] Store in in slot 0x4
26,107,851 UART: [art] Derive Key Pair
26,108,850 UART: [art] Store priv key in slot 0x5
29,350,819 UART: [art] Derive Key Pair - Done
29,363,765 UART: [art] Signing Cert with AUTHO
29,365,065 UART: RITY.KEYID = 7
31,645,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,006 UART: [art] PUB.X = D093EF4A081A9E0D8FF352899CD2B0D2C5C5C830FE2FA954ED53631B9E41A23CA261EF9E0AD9D14CA660680F6EB6BC9B
31,653,858 UART: [art] PUB.Y = BE3DFED616C249C71551C1AEB4DAB00C355715F0555DB6477D246B395E35748079F76A5B28C8DF54FE81ADE7F506E697
31,661,146 UART: [art] SIG.R = 2B486A8BA6CB7CB40D4FDF3602E94D0F5593241C203020E54FD2E5128052A321C0E968EB0FA206DF49BB44FC4FDB4F2B
31,668,543 UART: [art] SIG.S = E95A55586FCD57A85B666E6546216E04D7D482519BD5D0EDD7A9AB20D40E24BFCBF9E14AEE429F43898AE0FA19D8DFEC
32,973,415 UART: Caliptra RT
32,974,380 UART: [state] CFI Enabled
33,091,844 UART: [rt] RT listening for mailbox commands...
33,123,310 UART: [rt]cmd =0x54514754, len=24
33,125,927 >>> mbox cmd response data (8 bytes)
33,126,555 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,156,743 UART: [rt]cmd =0x54514754, len=24
33,159,154 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,591 UART:
192,975 UART: Running Caliptra ROM ...
194,090 UART:
194,238 UART: [state] CFI Enabled
267,886 UART: [state] LifecycleState = Unprovisioned
269,753 UART: [state] DebugLocked = No
272,198 UART: [state] WD Timer not started. Device not locked for debugging
276,734 UART: [kat] SHA2-256
455,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,431 UART: [kat] ++
467,959 UART: [kat] sha1
478,693 UART: [kat] SHA2-256
481,686 UART: [kat] SHA2-384
488,514 UART: [kat] SHA2-512-ACC
491,514 UART: [kat] ECC-384
2,950,127 UART: [kat] HMAC-384Kdf
2,972,526 UART: [kat] LMS
3,501,990 UART: [kat] --
3,506,338 UART: [cold-reset] ++
3,508,899 UART: [fht] FHT @ 0x50003400
3,519,451 UART: [idev] ++
3,520,035 UART: [idev] CDI.KEYID = 6
3,520,993 UART: [idev] SUBJECT.KEYID = 7
3,522,091 UART: [idev] UDS.KEYID = 0
3,523,134 ready_for_fw is high
3,523,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,819 UART: [idev] Erasing UDS.KEYID = 0
6,027,107 UART: [idev] Sha1 KeyId Algorithm
6,049,632 UART: [idev] --
6,054,113 UART: [ldev] ++
6,054,678 UART: [ldev] CDI.KEYID = 6
6,055,604 UART: [ldev] SUBJECT.KEYID = 5
6,056,810 UART: [ldev] AUTHORITY.KEYID = 7
6,058,039 UART: [ldev] FE.KEYID = 1
6,100,567 UART: [ldev] Erasing FE.KEYID = 1
8,603,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,948 UART: [ldev] --
10,414,269 UART: [fwproc] Wait for Commands...
10,416,140 UART: [fwproc] Recv command 0x46574c44
10,418,225 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,281,685 >>> mbox cmd response: success
14,282,237 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,285,230 UART: [afmc] ++
14,285,826 UART: [afmc] CDI.KEYID = 6
14,286,733 UART: [afmc] SUBJECT.KEYID = 7
14,288,008 UART: [afmc] AUTHORITY.KEYID = 5
16,831,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,937 UART: [afmc] --
18,630,548 UART: [cold-reset] --
18,634,841 UART: [state] Locking Datavault
18,639,873 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,512 UART: [state] Locking ICCM
18,644,252 UART: [exit] Launching FMC @ 0x40000130
18,652,697 UART:
18,652,932 UART: Running Caliptra FMC ...
18,654,031 UART:
18,654,198 UART: [state] CFI Enabled
18,711,179 UART: [fht] FMC Alias Private Key: 7
20,475,735 UART: [art] Extend RT PCRs Done
20,476,939 UART: [art] Lock RT PCRs Done
20,478,451 UART: [art] Populate DV Done
20,484,020 UART: [fht] FMC Alias Private Key: 7
20,485,555 UART: [art] Derive CDI
20,486,309 UART: [art] Store in in slot 0x4
20,544,070 UART: [art] Derive Key Pair
20,545,107 UART: [art] Store priv key in slot 0x5
23,007,592 UART: [art] Derive Key Pair - Done
23,020,479 UART: [art] Signing Cert with AUTHO
23,021,781 UART: RITY.KEYID = 7
24,733,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,171 UART: [art] PUB.X = 8A2C20B518E0BC97618DFEC219E77BE577902978EC8323F8AB67B4B8E6B6FB669D82EEB2793C3CAA018FDF98A0CBD135
24,742,525 UART: [art] PUB.Y = DCA8FA722DDDACFB4C7C89FF3887EEFF314A27CDAF1069F5C2E89A6BC6A03BC33C1FB8E653346A04D86BDB55F4F05016
24,749,788 UART: [art] SIG.R = 19DEF476B00C66B4D9FB38255D7049099490E3A5E2A5BCE219065FD99E641BAEFDBE982732D759A07A026FD38D31C599
24,757,171 UART: [art] SIG.S = A452635F407A4986247858F179FFA48DC55D082EA7DB86DE4FB2D983FF385476B292CC48AF0C242189A92711D1990088
25,736,104 UART: Caliptra RT
25,736,802 UART: [state] CFI Enabled
25,902,002 UART: [rt] RT listening for mailbox commands...
25,933,307 UART: [rt]cmd =0x54514754, len=24
25,935,783 >>> mbox cmd response data (8 bytes)
25,936,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,966,120 UART: [rt]cmd =0x54514754, len=24
25,968,668 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,359,568 ready_for_fw is high
3,359,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,047,659 >>> mbox cmd response: success
14,048,515 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,342,748 UART:
18,343,156 UART: Running Caliptra FMC ...
18,344,349 UART:
18,344,515 UART: [state] CFI Enabled
18,409,558 UART: [fht] FMC Alias Private Key: 7
20,173,503 UART: [art] Extend RT PCRs Done
20,174,719 UART: [art] Lock RT PCRs Done
20,176,452 UART: [art] Populate DV Done
20,181,761 UART: [fht] FMC Alias Private Key: 7
20,183,302 UART: [art] Derive CDI
20,184,115 UART: [art] Store in in slot 0x4
20,242,547 UART: [art] Derive Key Pair
20,243,590 UART: [art] Store priv key in slot 0x5
22,706,880 UART: [art] Derive Key Pair - Done
22,719,662 UART: [art] Signing Cert with AUTHO
22,720,969 UART: RITY.KEYID = 7
24,432,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,129 UART: [art] PUB.X = 349A34F8B98DA0037B5E786489845589D25DBB9E7DE60B1575835E0DD8E292DE84B87BD64625109AE990E4DCDE2F780D
24,441,401 UART: [art] PUB.Y = 504CDFBFE16D01BC8F072FD9AE5D99CB84367D4874A9B4D0A53E4224EFAF56B4B51DB9381D6736191092B7886A491441
24,448,678 UART: [art] SIG.R = 1C663187CCB096E4B38515860BB79411A2800C52603C45497F5F7A9DA25078A98026C23B4C53260846DC66E8C885CA91
24,455,993 UART: [art] SIG.S = F63A1E0BAACABC1382194194E935ADD8E9C2C0D8740DE12E043600CEC121D51D7B49C9AF9C0B821C811F226523E1A367
25,434,660 UART: Caliptra RT
25,435,371 UART: [state] CFI Enabled
25,599,013 UART: [rt] RT listening for mailbox commands...
25,630,631 UART: [rt]cmd =0x54514754, len=24
25,633,567 >>> mbox cmd response data (8 bytes)
25,633,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,663,791 UART: [rt]cmd =0x54514754, len=24
25,665,933 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
193,077 UART:
193,506 UART: Running Caliptra ROM ...
194,685 UART:
604,338 UART: [state] CFI Enabled
616,233 UART: [state] LifecycleState = Unprovisioned
618,117 UART: [state] DebugLocked = No
620,574 UART: [state] WD Timer not started. Device not locked for debugging
624,833 UART: [kat] SHA2-256
803,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,510 UART: [kat] ++
816,042 UART: [kat] sha1
828,561 UART: [kat] SHA2-256
831,569 UART: [kat] SHA2-384
839,283 UART: [kat] SHA2-512-ACC
842,221 UART: [kat] ECC-384
3,285,911 UART: [kat] HMAC-384Kdf
3,298,927 UART: [kat] LMS
3,828,384 UART: [kat] --
3,832,941 UART: [cold-reset] ++
3,834,730 UART: [fht] FHT @ 0x50003400
3,845,707 UART: [idev] ++
3,846,276 UART: [idev] CDI.KEYID = 6
3,847,312 UART: [idev] SUBJECT.KEYID = 7
3,848,418 UART: [idev] UDS.KEYID = 0
3,849,358 ready_for_fw is high
3,849,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,877 UART: [idev] Erasing UDS.KEYID = 0
6,318,178 UART: [idev] Sha1 KeyId Algorithm
6,340,700 UART: [idev] --
6,344,062 UART: [ldev] ++
6,344,647 UART: [ldev] CDI.KEYID = 6
6,345,560 UART: [ldev] SUBJECT.KEYID = 5
6,346,719 UART: [ldev] AUTHORITY.KEYID = 7
6,348,002 UART: [ldev] FE.KEYID = 1
6,360,004 UART: [ldev] Erasing FE.KEYID = 1
8,837,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,590 UART: [ldev] --
10,630,569 UART: [fwproc] Wait for Commands...
10,632,381 UART: [fwproc] Recv command 0x46574c44
10,634,483 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,485,208 >>> mbox cmd response: success
14,485,750 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,490,284 UART: [afmc] ++
14,490,874 UART: [afmc] CDI.KEYID = 6
14,491,759 UART: [afmc] SUBJECT.KEYID = 7
14,492,975 UART: [afmc] AUTHORITY.KEYID = 5
16,991,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,230 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,693 UART: [afmc] --
18,785,667 UART: [cold-reset] --
18,789,227 UART: [state] Locking Datavault
18,794,678 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,334 UART: [state] Locking ICCM
18,798,484 UART: [exit] Launching FMC @ 0x40000130
18,806,893 UART:
18,807,134 UART: Running Caliptra FMC ...
18,808,239 UART:
18,808,402 UART: [state] CFI Enabled
18,817,050 UART: [fht] FMC Alias Private Key: 7
20,573,618 UART: [art] Extend RT PCRs Done
20,574,843 UART: [art] Lock RT PCRs Done
20,576,629 UART: [art] Populate DV Done
20,581,936 UART: [fht] FMC Alias Private Key: 7
20,583,539 UART: [art] Derive CDI
20,584,279 UART: [art] Store in in slot 0x4
20,626,817 UART: [art] Derive Key Pair
20,628,019 UART: [art] Store priv key in slot 0x5
23,054,532 UART: [art] Derive Key Pair - Done
23,067,266 UART: [art] Signing Cert with AUTHO
23,068,579 UART: RITY.KEYID = 7
24,773,563 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,051 UART: [art] PUB.X = D5F52EF9945DBA5B53DD48C84A908F6E0A0CEF2BF03CDC98F89ACD4D14D8857B0956755D81FC91823750192CE2C9A4FA
24,782,382 UART: [art] PUB.Y = DE06CE0DE4D65298DA1416C56B1A3BEAD5794013B7882CB2A21910DEB1D1934F5332A425C1D6E5116E3B93B0F93DBACA
24,789,657 UART: [art] SIG.R = C33008FD3ED2A73274F4FCA0C17626F0BA6C0625C9B7B384493D9258660CFB6F535EC04079B353E381CFACB4D062741A
24,797,037 UART: [art] SIG.S = 9ACC65B0E86A7B9C63B1D31F23D45C539FD26CA586D0FFE1BA2102DF06989F1A155F14AC82E4017AFE0FEE2A6D10C7F6
25,776,373 UART: Caliptra RT
25,777,084 UART: [state] CFI Enabled
25,894,255 UART: [rt] RT listening for mailbox commands...
25,925,716 UART: [rt]cmd =0x54514754, len=24
25,928,387 >>> mbox cmd response data (8 bytes)
25,928,845 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,958,761 UART: [rt]cmd =0x54514754, len=24
25,960,919 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
3,689,613 ready_for_fw is high
3,690,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,248 >>> mbox cmd response: success
14,257,916 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,506,549 UART:
18,506,961 UART: Running Caliptra FMC ...
18,508,070 UART:
18,508,224 UART: [state] CFI Enabled
18,516,443 UART: [fht] FMC Alias Private Key: 7
20,272,811 UART: [art] Extend RT PCRs Done
20,274,068 UART: [art] Lock RT PCRs Done
20,275,622 UART: [art] Populate DV Done
20,281,265 UART: [fht] FMC Alias Private Key: 7
20,282,756 UART: [art] Derive CDI
20,283,496 UART: [art] Store in in slot 0x4
20,325,875 UART: [art] Derive Key Pair
20,326,879 UART: [art] Store priv key in slot 0x5
22,754,023 UART: [art] Derive Key Pair - Done
22,767,023 UART: [art] Signing Cert with AUTHO
22,768,331 UART: RITY.KEYID = 7
24,473,813 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,323 UART: [art] PUB.X = 0F1229C15EB4D92A72E70B1726E0F8704AE808C9CC97C1B0455C4B682255532F4BA091B52B6433443F5F063B05033C11
24,482,547 UART: [art] PUB.Y = FFE0901D07AE31B13E558B8A19C1AFBF9534BA103D3A435B15CA28CDE72907A3D29C5E1E81D4ED7444370EC4F5909B4F
24,489,833 UART: [art] SIG.R = FAE6ED1E279D3268F821C770EC24AF01CF284513CFD507C15B6DFB25F755FD0FBD5401B2C77CB38AFFAA26501328CB02
24,497,211 UART: [art] SIG.S = 2B6FE2C23417C0C88FAD631F9BA7AFC6AA9BD8272F31022E92ED20DDDBEC2E04684873EA06B74D2F04678CDD5F5DD6E4
25,475,732 UART: Caliptra RT
25,476,437 UART: [state] CFI Enabled
25,593,395 UART: [rt] RT listening for mailbox commands...
25,624,971 UART: [rt]cmd =0x54514754, len=24
25,627,775 >>> mbox cmd response data (8 bytes)
25,628,328 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,658,182 UART: [rt]cmd =0x54514754, len=24
25,660,540 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,532 UART:
192,901 UART: Running Caliptra ROM ...
194,093 UART:
194,253 UART: [state] CFI Enabled
264,422 UART: [state] LifecycleState = Unprovisioned
266,835 UART: [state] DebugLocked = No
269,716 UART: [state] WD Timer not started. Device not locked for debugging
273,444 UART: [kat] SHA2-256
463,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,892 UART: [kat] ++
474,337 UART: [kat] sha1
486,024 UART: [kat] SHA2-256
489,035 UART: [kat] SHA2-384
495,875 UART: [kat] SHA2-512-ACC
498,463 UART: [kat] ECC-384
2,948,901 UART: [kat] HMAC-384Kdf
2,973,996 UART: [kat] LMS
3,505,783 UART: [kat] --
3,511,001 UART: [cold-reset] ++
3,513,442 UART: [fht] FHT @ 0x50003400
3,524,987 UART: [idev] ++
3,525,691 UART: [idev] CDI.KEYID = 6
3,526,668 UART: [idev] SUBJECT.KEYID = 7
3,527,837 UART: [idev] UDS.KEYID = 0
3,528,737 ready_for_fw is high
3,528,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,456 UART: [idev] Erasing UDS.KEYID = 0
6,033,547 UART: [idev] Sha1 KeyId Algorithm
6,056,023 UART: [idev] --
6,061,331 UART: [ldev] ++
6,062,018 UART: [ldev] CDI.KEYID = 6
6,062,932 UART: [ldev] SUBJECT.KEYID = 5
6,064,090 UART: [ldev] AUTHORITY.KEYID = 7
6,065,317 UART: [ldev] FE.KEYID = 1
6,101,837 UART: [ldev] Erasing FE.KEYID = 1
8,608,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,458 UART: [ldev] --
10,416,601 UART: [fwproc] Wait for Commands...
10,418,596 UART: [fwproc] Recv command 0x46574c44
10,420,909 UART: [fwproc] Recv'd Img size: 114084 bytes
13,862,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,169 >>> mbox cmd response: success
14,596,724 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,599,413 UART: [afmc] ++
14,600,108 UART: [afmc] CDI.KEYID = 6
14,601,293 UART: [afmc] SUBJECT.KEYID = 7
14,602,787 UART: [afmc] AUTHORITY.KEYID = 5
17,130,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,885,108 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,900,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,006 UART: [afmc] --
18,926,793 UART: [cold-reset] --
18,930,335 UART: [state] Locking Datavault
18,935,658 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,809 UART: [state] Locking ICCM
18,940,072 UART: [exit] Launching FMC @ 0x40000130
18,948,760 UART:
18,948,997 UART: Running Caliptra FMC ...
18,950,054 UART:
18,950,214 UART: [state] CFI Enabled
19,010,175 UART: [fht] FMC Alias Private Key: 7
20,774,292 UART: [art] Extend RT PCRs Done
20,775,510 UART: [art] Lock RT PCRs Done
20,777,212 UART: [art] Populate DV Done
20,782,692 UART: [fht] FMC Alias Private Key: 7
20,784,281 UART: [art] Derive CDI
20,785,029 UART: [art] Store in in slot 0x4
20,842,589 UART: [art] Derive Key Pair
20,843,636 UART: [art] Store priv key in slot 0x5
23,306,151 UART: [art] Derive Key Pair - Done
23,318,782 UART: [art] Signing Cert with AUTHO
23,320,084 UART: RITY.KEYID = 7
25,031,948 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,463 UART: [art] PUB.X = 14D91A20E1575F856F3B2160CBF0CC0DD7127C0083F6589ADC109DCD1C5E9B6865CDC3F831428669224A3B3B9F9FEC31
25,040,726 UART: [art] PUB.Y = 1F1FCCDB41474202B11D6527D85490DC08C0252BB3A0D95CCF39E0B7A3BDC8F516897A4EF58D387582B8138228085505
25,047,976 UART: [art] SIG.R = 506E9986946E04295B58308CC9B5FF8C8E1D092CF72037FA9DBD9424010A4161270D3BD3866FE087688D2D7B8C1F7305
25,055,356 UART: [art] SIG.S = 2871D2A27EA6054FCBB311128A27C491CAFC2E55101DA6C17ADC0FB7F145F94DD939ADC651D8E259A94DE08AE0C7232A
26,033,692 UART: Caliptra RT
26,034,398 UART: [state] CFI Enabled
26,199,344 UART: [rt] RT listening for mailbox commands...
26,230,880 UART: [rt]cmd =0x54514754, len=24
26,233,525 >>> mbox cmd response data (8 bytes)
26,233,973 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,263,776 UART: [rt]cmd =0x54514754, len=24
26,266,165 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,438,766 ready_for_fw is high
3,439,312 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,716,756 >>> mbox cmd response: success
14,717,419 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,998,346 UART:
18,998,729 UART: Running Caliptra FMC ...
18,999,923 UART:
19,000,095 UART: [state] CFI Enabled
19,066,876 UART: [fht] FMC Alias Private Key: 7
20,830,366 UART: [art] Extend RT PCRs Done
20,831,589 UART: [art] Lock RT PCRs Done
20,833,322 UART: [art] Populate DV Done
20,838,754 UART: [fht] FMC Alias Private Key: 7
20,840,239 UART: [art] Derive CDI
20,841,000 UART: [art] Store in in slot 0x4
20,899,205 UART: [art] Derive Key Pair
20,900,247 UART: [art] Store priv key in slot 0x5
23,363,479 UART: [art] Derive Key Pair - Done
23,376,546 UART: [art] Signing Cert with AUTHO
23,377,845 UART: RITY.KEYID = 7
25,089,415 UART: [art] Erasing AUTHORITY.KEYID = 7
25,090,947 UART: [art] PUB.X = 53DF2640B7DA8CA02418D1F1C078FF9C45C38D9F71B660C7027E186B84E96088644D45A5D8E7B7A759E3DAD4FE5A5C9E
25,098,208 UART: [art] PUB.Y = 9B9AF1C3ABC2CD2A5B666D876308DD6729276DE09D3E87A0ADE6603E1775685B36141DD462EE3A13BAE1A4D5356C563C
25,105,455 UART: [art] SIG.R = 99CD3BAB529AD997F4A440EE061D32A31A11AF77D362A9C97725024D4A83630C66E1FBD8CA93CD3C1232EC990D21FA9C
25,112,859 UART: [art] SIG.S = C58B17EBFF588E970936CEEAF5EA14E0DA1C89AAD367BF5100BE7E428D34CDBF2815AAD201E127C700705E696EF8ACB2
26,092,405 UART: Caliptra RT
26,093,119 UART: [state] CFI Enabled
26,257,084 UART: [rt] RT listening for mailbox commands...
26,288,579 UART: [rt]cmd =0x54514754, len=24
26,291,276 >>> mbox cmd response data (8 bytes)
26,291,788 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,321,804 UART: [rt]cmd =0x54514754, len=24
26,324,092 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
192,942 UART:
193,333 UART: Running Caliptra ROM ...
194,470 UART:
604,176 UART: [state] CFI Enabled
617,696 UART: [state] LifecycleState = Unprovisioned
620,091 UART: [state] DebugLocked = No
622,567 UART: [state] WD Timer not started. Device not locked for debugging
626,961 UART: [kat] SHA2-256
816,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,652 UART: [kat] ++
828,257 UART: [kat] sha1
840,580 UART: [kat] SHA2-256
843,559 UART: [kat] SHA2-384
849,414 UART: [kat] SHA2-512-ACC
851,998 UART: [kat] ECC-384
3,295,297 UART: [kat] HMAC-384Kdf
3,308,025 UART: [kat] LMS
3,839,827 UART: [kat] --
3,841,758 UART: [cold-reset] ++
3,844,195 UART: [fht] FHT @ 0x50003400
3,856,737 UART: [idev] ++
3,857,473 UART: [idev] CDI.KEYID = 6
3,858,394 UART: [idev] SUBJECT.KEYID = 7
3,859,568 UART: [idev] UDS.KEYID = 0
3,860,496 ready_for_fw is high
3,860,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,574 UART: [idev] Erasing UDS.KEYID = 0
6,337,668 UART: [idev] Sha1 KeyId Algorithm
6,359,806 UART: [idev] --
6,363,667 UART: [ldev] ++
6,364,354 UART: [ldev] CDI.KEYID = 6
6,365,243 UART: [ldev] SUBJECT.KEYID = 5
6,366,456 UART: [ldev] AUTHORITY.KEYID = 7
6,367,685 UART: [ldev] FE.KEYID = 1
6,377,871 UART: [ldev] Erasing FE.KEYID = 1
8,855,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,481 UART: [ldev] --
10,647,260 UART: [fwproc] Wait for Commands...
10,649,247 UART: [fwproc] Recv command 0x46574c44
10,651,563 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,855 >>> mbox cmd response: success
14,835,417 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,839,675 UART: [afmc] ++
14,840,380 UART: [afmc] CDI.KEYID = 6
14,841,572 UART: [afmc] SUBJECT.KEYID = 7
14,843,069 UART: [afmc] AUTHORITY.KEYID = 5
17,344,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,128 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,580 UART: [afmc] --
19,143,362 UART: [cold-reset] --
19,147,831 UART: [state] Locking Datavault
19,153,256 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,444 UART: [state] Locking ICCM
19,157,559 UART: [exit] Launching FMC @ 0x40000130
19,166,197 UART:
19,166,442 UART: Running Caliptra FMC ...
19,167,544 UART:
19,167,701 UART: [state] CFI Enabled
19,175,710 UART: [fht] FMC Alias Private Key: 7
20,931,971 UART: [art] Extend RT PCRs Done
20,933,217 UART: [art] Lock RT PCRs Done
20,934,866 UART: [art] Populate DV Done
20,940,168 UART: [fht] FMC Alias Private Key: 7
20,941,871 UART: [art] Derive CDI
20,942,608 UART: [art] Store in in slot 0x4
20,985,737 UART: [art] Derive Key Pair
20,986,736 UART: [art] Store priv key in slot 0x5
23,414,172 UART: [art] Derive Key Pair - Done
23,426,947 UART: [art] Signing Cert with AUTHO
23,428,256 UART: RITY.KEYID = 7
25,133,559 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,059 UART: [art] PUB.X = 2421FC677DC3BA7179F767FF08F7BD49F3E8787A76F210348287E027B41427DF4A75970E07B85A2E1A4A6196D6E56293
25,142,340 UART: [art] PUB.Y = BB5F41C1B3B492BEDCC77D18D9BEC0705DDC23E7AC1A8F4E5127CA3A19B263CB5C09BA2F31CB5704DF9FD0EA0B66F6E9
25,149,650 UART: [art] SIG.R = 68233E395EE6F0ECF4CB5B8086D6B469ED2F2D1CBDD8B369629AD841035D251EA9B91717AEBCF0A088C3E332831D2235
25,157,063 UART: [art] SIG.S = 6D7D0484305DDFC67D8F214080FF74CEF7DD27E3493FD1B1D8E1169A746C4BEBC49A05A01DE219BD141870E8B5051B1D
26,135,802 UART: Caliptra RT
26,136,490 UART: [state] CFI Enabled
26,253,712 UART: [rt] RT listening for mailbox commands...
26,285,095 UART: [rt]cmd =0x54514754, len=24
26,287,542 >>> mbox cmd response data (8 bytes)
26,288,039 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,318,131 UART: [rt]cmd =0x54514754, len=24
26,320,593 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
3,753,867 ready_for_fw is high
3,754,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,951,486 >>> mbox cmd response: success
14,952,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,206,179 UART:
19,206,563 UART: Running Caliptra FMC ...
19,207,693 UART:
19,207,858 UART: [state] CFI Enabled
19,215,762 UART: [fht] FMC Alias Private Key: 7
20,972,632 UART: [art] Extend RT PCRs Done
20,973,864 UART: [art] Lock RT PCRs Done
20,975,452 UART: [art] Populate DV Done
20,981,038 UART: [fht] FMC Alias Private Key: 7
20,982,529 UART: [art] Derive CDI
20,983,291 UART: [art] Store in in slot 0x4
21,025,893 UART: [art] Derive Key Pair
21,026,942 UART: [art] Store priv key in slot 0x5
23,453,471 UART: [art] Derive Key Pair - Done
23,466,687 UART: [art] Signing Cert with AUTHO
23,467,996 UART: RITY.KEYID = 7
25,173,709 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,218 UART: [art] PUB.X = 4B3A122B350F08879BA9D883ADA49D0B88AC28CBECE2006FE7DEB6AE33E819B2B1F909AAF8034C54C15C0A2333EDF871
25,182,512 UART: [art] PUB.Y = F21BA0BCFAA231B6C0791BE75B7EFC0131CCA1689406AB5965038D506F7D0A5B3B71087D8AFA5F9448C32E9ECD3CF2CD
25,189,743 UART: [art] SIG.R = 1F3E070ACA35AE99D7E4810ED91D436AE186C9F30E58A9A3D49245E336D9EDCF432A64530C5C509C64D9D5DED07AE71F
25,197,187 UART: [art] SIG.S = 3A18CEFD90DE0AA7080D08E69C94DC5DB5ECE92FAF3F22F0BC00E2E1F1570DDAD1C1C7B28F069EB9B4BF8A38FE464D17
26,175,817 UART: Caliptra RT
26,176,509 UART: [state] CFI Enabled
26,293,696 UART: [rt] RT listening for mailbox commands...
26,325,434 UART: [rt]cmd =0x54514754, len=24
26,327,967 >>> mbox cmd response data (8 bytes)
26,328,433 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,358,499 UART: [rt]cmd =0x54514754, len=24
26,360,911 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,737 UART: [kat] SHA2-256
892,675 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,058 UART: [kat] LMS
1,475,254 UART: [kat] --
1,476,189 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 ready_for_fw is high
1,480,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,972 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,546,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,428 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,442 UART: [fwproc] Received command 0x46574c44
1,587,233 UART: [fwproc] Received Image of size 114084 bytes
2,881,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,029 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,980 >>> mbox cmd response: success
3,073,980 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,075,090 UART: [afmc] ++
3,075,258 UART: [afmc] CDI.KEYID = 6
3,075,620 UART: [afmc] SUBJECT.KEYID = 7
3,076,045 UART: [afmc] AUTHORITY.KEYID = 5
3,111,348 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,144 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,757 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,447 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,420 UART: [afmc] --
3,154,396 UART: [cold-reset] --
3,155,280 UART: [state] Locking Datavault
3,156,187 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,791 UART: [state] Locking ICCM
3,157,375 UART: [exit] Launching FMC @ 0x40000130
3,162,704 UART:
3,162,720 UART: Running Caliptra FMC ...
3,163,128 UART:
3,163,182 UART: [state] CFI Enabled
3,173,289 UART: [fht] FMC Alias Private Key: 7
3,281,894 UART: [art] Extend RT PCRs Done
3,282,322 UART: [art] Lock RT PCRs Done
3,283,928 UART: [art] Populate DV Done
3,292,079 UART: [fht] FMC Alias Private Key: 7
3,293,063 UART: [art] Derive CDI
3,293,343 UART: [art] Store in in slot 0x4
3,378,738 UART: [art] Derive Key Pair
3,379,098 UART: [art] Store priv key in slot 0x5
3,391,332 UART: [art] Derive Key Pair - Done
3,406,350 UART: [art] Signing Cert with AUTHO
3,406,830 UART: RITY.KEYID = 7
3,422,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,839 UART: [art] PUB.X = AD20C81BB03B2C43DCAED68C570B9D4DDC50B63A3EF44BDF196645819FED27E3EEB3703F9C53039022403D6085544391
3,429,611 UART: [art] PUB.Y = 0ADAD46C075E4382C319A0791BCE299B96261BCB848276327FBC5E0DAF2634C847C5F15B4D9203F8D1BE37BA5E6A7740
3,436,557 UART: [art] SIG.R = EB6EAA37E7CD65F704A3EA451F1CA7A281F7A7D035556AC66809DAD86AF40770B29F63C4FEEE1E36DC4FA2FCEA13E1BB
3,443,346 UART: [art] SIG.S = 70E6F5737BF5822BDB150C9AC8747DB90EDBF5762E498546B2CE307E357E61B5D10050661196645075A5A34AEAC2DB66
3,466,915 UART: Caliptra RT
3,467,168 UART: [state] CFI Enabled
3,575,199 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,817 UART: [rt]cmd =0x54514754, len=24
3,608,096 >>> mbox cmd response data (8 bytes)
3,608,097 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,470 UART: [rt]cmd =0x54514754, len=24
3,639,303 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,973 ready_for_fw is high
1,362,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,378 >>> mbox cmd response: success
2,924,378 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,630 UART:
2,986,646 UART: Running Caliptra FMC ...
2,987,054 UART:
2,987,108 UART: [state] CFI Enabled
2,997,737 UART: [fht] FMC Alias Private Key: 7
3,105,998 UART: [art] Extend RT PCRs Done
3,106,426 UART: [art] Lock RT PCRs Done
3,107,994 UART: [art] Populate DV Done
3,116,019 UART: [fht] FMC Alias Private Key: 7
3,116,981 UART: [art] Derive CDI
3,117,261 UART: [art] Store in in slot 0x4
3,202,784 UART: [art] Derive Key Pair
3,203,144 UART: [art] Store priv key in slot 0x5
3,216,136 UART: [art] Derive Key Pair - Done
3,230,831 UART: [art] Signing Cert with AUTHO
3,231,311 UART: RITY.KEYID = 7
3,246,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,082 UART: [art] PUB.X = E7F83D28E21B16B8E4183043DDFBB7F9F340DCD366BA097382392F8AF876F4441333550D81BA026D0DD7D33BE9824C10
3,253,844 UART: [art] PUB.Y = EAA96FAFB5ED0E9A27FB06E2E456D68C4A0A8C54ABFBFBEE3971B1CF705C2F522B93E464D53C98F4DDCA146C9E5E7B1C
3,260,817 UART: [art] SIG.R = E4AEE50EBF81F24637C7686B4CE87EF268C5686049FF8AB28DBFB62F784A865FF5D5A065B8EAE3EFCE3EFC8A487E5A61
3,267,608 UART: [art] SIG.S = 6166DC6DF28E50587DE7F42F43A186FB2FAD642B79241709A5E3B63ADD3F99577CDB86A56A8976EF1AFED50AC2DF6311
3,291,205 UART: Caliptra RT
3,291,458 UART: [state] CFI Enabled
3,399,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,325 UART: [rt]cmd =0x54514754, len=24
3,432,266 >>> mbox cmd response data (8 bytes)
3,432,267 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,846 UART: [rt]cmd =0x54514754, len=24
3,463,973 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,754 UART: [kat] SHA2-256
892,692 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
903,251 UART: [kat] HMAC-384Kdf
907,951 UART: [kat] LMS
1,476,147 UART: [kat] --
1,477,026 UART: [cold-reset] ++
1,477,500 UART: [fht] Storing FHT @ 0x50003400
1,480,509 UART: [idev] ++
1,480,677 UART: [idev] CDI.KEYID = 6
1,481,037 UART: [idev] SUBJECT.KEYID = 7
1,481,461 UART: [idev] UDS.KEYID = 0
1,481,806 ready_for_fw is high
1,481,806 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,547 UART: [idev] Erasing UDS.KEYID = 0
1,506,781 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,363 UART: [idev] --
1,516,522 UART: [ldev] ++
1,516,690 UART: [ldev] CDI.KEYID = 6
1,517,053 UART: [ldev] SUBJECT.KEYID = 5
1,517,479 UART: [ldev] AUTHORITY.KEYID = 7
1,517,942 UART: [ldev] FE.KEYID = 1
1,523,106 UART: [ldev] Erasing FE.KEYID = 1
1,548,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,507 UART: [ldev] --
1,587,878 UART: [fwproc] Waiting for Commands...
1,588,579 UART: [fwproc] Received command 0x46574c44
1,589,370 UART: [fwproc] Received Image of size 114084 bytes
2,883,728 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,759 >>> mbox cmd response: success
3,075,759 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,907 UART: [afmc] ++
3,077,075 UART: [afmc] CDI.KEYID = 6
3,077,437 UART: [afmc] SUBJECT.KEYID = 7
3,077,862 UART: [afmc] AUTHORITY.KEYID = 5
3,112,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,895 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,623 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,508 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,198 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,091 UART: [afmc] --
3,156,185 UART: [cold-reset] --
3,157,059 UART: [state] Locking Datavault
3,158,242 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,846 UART: [state] Locking ICCM
3,159,400 UART: [exit] Launching FMC @ 0x40000130
3,164,729 UART:
3,164,745 UART: Running Caliptra FMC ...
3,165,153 UART:
3,165,296 UART: [state] CFI Enabled
3,176,315 UART: [fht] FMC Alias Private Key: 7
3,284,628 UART: [art] Extend RT PCRs Done
3,285,056 UART: [art] Lock RT PCRs Done
3,286,458 UART: [art] Populate DV Done
3,294,811 UART: [fht] FMC Alias Private Key: 7
3,295,879 UART: [art] Derive CDI
3,296,159 UART: [art] Store in in slot 0x4
3,381,744 UART: [art] Derive Key Pair
3,382,104 UART: [art] Store priv key in slot 0x5
3,394,784 UART: [art] Derive Key Pair - Done
3,409,449 UART: [art] Signing Cert with AUTHO
3,409,929 UART: RITY.KEYID = 7
3,425,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,550 UART: [art] PUB.X = 9CF34B5045A9B29F7580052581B9ABC9C8BCFC277EC5014AE60E180DF8A7153A7C49BAEBE26F868F0485E1F6A0E3BDC0
3,433,321 UART: [art] PUB.Y = 64B01B008C071C750E0F4D1D039186A99A32F440D068F75CB831A23E323B5DA6F042E2AFCBDE49FBC8459BCC6E0C3D6E
3,440,248 UART: [art] SIG.R = 0B7E66320DCA585A9024C2DA4B139B051BC8055DCFB84748F71D181F37222FF1DF8CB5462AC46027E0298CCF48B80A7B
3,447,011 UART: [art] SIG.S = 8F7961DA5358AD1335CD97BCA8205E38A6A4B7D03C922CF265E33B9FC9E25F8ECC697FF3FB3E8E390A5B877D71264095
3,470,511 UART: Caliptra RT
3,470,856 UART: [state] CFI Enabled
3,579,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,779 UART: [rt]cmd =0x54514754, len=24
3,611,854 >>> mbox cmd response data (8 bytes)
3,611,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,262 UART: [rt]cmd =0x54514754, len=24
3,643,125 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,316 ready_for_fw is high
1,362,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,575 >>> mbox cmd response: success
2,925,575 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,709 UART:
2,987,725 UART: Running Caliptra FMC ...
2,988,133 UART:
2,988,276 UART: [state] CFI Enabled
2,998,935 UART: [fht] FMC Alias Private Key: 7
3,107,706 UART: [art] Extend RT PCRs Done
3,108,134 UART: [art] Lock RT PCRs Done
3,109,780 UART: [art] Populate DV Done
3,117,857 UART: [fht] FMC Alias Private Key: 7
3,118,799 UART: [art] Derive CDI
3,119,079 UART: [art] Store in in slot 0x4
3,204,676 UART: [art] Derive Key Pair
3,205,036 UART: [art] Store priv key in slot 0x5
3,219,012 UART: [art] Derive Key Pair - Done
3,233,483 UART: [art] Signing Cert with AUTHO
3,233,963 UART: RITY.KEYID = 7
3,249,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,046 UART: [art] PUB.X = 5623098256F443499F3EFDF4A057729F77C96827687118328D4A8939F0B3768B80139589D4E8CAC51CAB4BBF3743979C
3,256,803 UART: [art] PUB.Y = E575EB445F4D05277F3760E8E38DE1297FB1C84B0A21B155EF22F0FD0DD930A8B2AB5321640C4658BBD67AE79135F5DC
3,263,751 UART: [art] SIG.R = 6E527BBCF51422E9DEC1760C19E989662E235D48C4606CB89D179D6DB7F96F41A0074598A5006BEB9C2F4954686422DD
3,270,493 UART: [art] SIG.S = B4A28902BB7CA24D8CDAD1887EEE01A96737A6A1A6E1BCD678766F123C5CC01E16A0AB2ECE157016203566F289A7C204
3,294,293 UART: Caliptra RT
3,294,638 UART: [state] CFI Enabled
3,403,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,217 UART: [rt]cmd =0x54514754, len=24
3,436,164 >>> mbox cmd response data (8 bytes)
3,436,165 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,798 UART: [rt]cmd =0x54514754, len=24
3,467,853 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
893,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,815 UART: [kat] ++
897,967 UART: [kat] sha1
902,441 UART: [kat] SHA2-256
904,381 UART: [kat] SHA2-384
907,082 UART: [kat] SHA2-512-ACC
908,983 UART: [kat] ECC-384
918,658 UART: [kat] HMAC-384Kdf
923,458 UART: [kat] LMS
1,171,786 UART: [kat] --
1,172,813 UART: [cold-reset] ++
1,173,189 UART: [fht] FHT @ 0x50003400
1,175,842 UART: [idev] ++
1,176,010 UART: [idev] CDI.KEYID = 6
1,176,370 UART: [idev] SUBJECT.KEYID = 7
1,176,794 UART: [idev] UDS.KEYID = 0
1,177,139 ready_for_fw is high
1,177,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,584 UART: [idev] Erasing UDS.KEYID = 0
1,202,187 UART: [idev] Sha1 KeyId Algorithm
1,210,831 UART: [idev] --
1,211,947 UART: [ldev] ++
1,212,115 UART: [ldev] CDI.KEYID = 6
1,212,478 UART: [ldev] SUBJECT.KEYID = 5
1,212,904 UART: [ldev] AUTHORITY.KEYID = 7
1,213,367 UART: [ldev] FE.KEYID = 1
1,218,427 UART: [ldev] Erasing FE.KEYID = 1
1,244,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,555 UART: [ldev] --
1,283,986 UART: [fwproc] Wait for Commands...
1,284,776 UART: [fwproc] Recv command 0x46574c44
1,285,504 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,812 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,453 >>> mbox cmd response: success
2,770,453 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,533 UART: [afmc] ++
2,771,701 UART: [afmc] CDI.KEYID = 6
2,772,063 UART: [afmc] SUBJECT.KEYID = 7
2,772,488 UART: [afmc] AUTHORITY.KEYID = 5
2,808,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,033 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,526 UART: [afmc] --
2,851,518 UART: [cold-reset] --
2,852,366 UART: [state] Locking Datavault
2,853,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,933 UART: [state] Locking ICCM
2,854,535 UART: [exit] Launching FMC @ 0x40000130
2,859,864 UART:
2,859,880 UART: Running Caliptra FMC ...
2,860,288 UART:
2,860,342 UART: [state] CFI Enabled
2,871,081 UART: [fht] FMC Alias Private Key: 7
2,979,188 UART: [art] Extend RT PCRs Done
2,979,616 UART: [art] Lock RT PCRs Done
2,981,438 UART: [art] Populate DV Done
2,989,487 UART: [fht] FMC Alias Private Key: 7
2,990,547 UART: [art] Derive CDI
2,990,827 UART: [art] Store in in slot 0x4
3,076,448 UART: [art] Derive Key Pair
3,076,808 UART: [art] Store priv key in slot 0x5
3,089,878 UART: [art] Derive Key Pair - Done
3,104,700 UART: [art] Signing Cert with AUTHO
3,105,180 UART: RITY.KEYID = 7
3,120,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,133 UART: [art] PUB.X = 2384361F2440302C7BB6F6666A9B39C3E160FA4E1AE1A80F1A4A1824C7C8F53A4C4779C722B4DB1262D2153445C86F23
3,127,898 UART: [art] PUB.Y = F8BA008FE982350EB231B7A10C16CFF5684C6E8B64D4B5915EA7157857D7243E3EFCC9D9AE19A40F02DFDFFDA2466882
3,134,828 UART: [art] SIG.R = F9C4CA97E7596B1E6AE4C9AE8A973161F69CC9EE3F395D47B3228D7C79B0843EA626B493039EAABACC1C898EF41A8003
3,141,606 UART: [art] SIG.S = 5F1F9643C339B6038E7EADEA48A7ABF0A2006D1302D048B4780F036D13869A1690CDFE697F9C278F120750DBCC6C9651
3,165,712 UART: Caliptra RT
3,165,965 UART: [state] CFI Enabled
3,273,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,968 UART: [rt]cmd =0x54514754, len=24
3,306,295 >>> mbox cmd response data (8 bytes)
3,306,296 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,743 UART: [rt]cmd =0x54514754, len=24
3,337,536 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,945 ready_for_fw is high
1,058,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,500 >>> mbox cmd response: success
2,620,500 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,862 UART:
2,682,878 UART: Running Caliptra FMC ...
2,683,286 UART:
2,683,340 UART: [state] CFI Enabled
2,693,579 UART: [fht] FMC Alias Private Key: 7
2,801,884 UART: [art] Extend RT PCRs Done
2,802,312 UART: [art] Lock RT PCRs Done
2,803,628 UART: [art] Populate DV Done
2,811,743 UART: [fht] FMC Alias Private Key: 7
2,812,733 UART: [art] Derive CDI
2,813,013 UART: [art] Store in in slot 0x4
2,898,516 UART: [art] Derive Key Pair
2,898,876 UART: [art] Store priv key in slot 0x5
2,912,178 UART: [art] Derive Key Pair - Done
2,926,875 UART: [art] Signing Cert with AUTHO
2,927,355 UART: RITY.KEYID = 7
2,942,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,494 UART: [art] PUB.X = 215792618FF3BB6FAE1FD2067C1453066261C24C4337AA449F6582C15C75D03DA22445C1B0FCD3940F23C6997F250ABD
2,950,252 UART: [art] PUB.Y = F7BB8B0AF2B1742F176A893D374915A17F6358A815B799134C56531C7AC95C895D0ADFC7B90486FFDC2B1BB440127A2A
2,957,199 UART: [art] SIG.R = 46C892EAD10E8FB37D86E488D1460A7C6E71E53431680A1DBC198AC94B4D90E172E5D5B26A8835A6BF07DA45FCD231F8
2,963,967 UART: [art] SIG.S = 4F09B6329A485F02A08F84AF8753EB1E5BB92DF4E46CD9F35DEC58C9B624461DEEA9B5E71C398163CFD36A4C7A1A3EF7
2,988,236 UART: Caliptra RT
2,988,489 UART: [state] CFI Enabled
3,096,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,594 UART: [rt]cmd =0x54514754, len=24
3,128,703 >>> mbox cmd response data (8 bytes)
3,128,704 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,191 UART: [rt]cmd =0x54514754, len=24
3,160,180 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
893,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,878 UART: [kat] ++
898,030 UART: [kat] sha1
902,336 UART: [kat] SHA2-256
904,276 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,601 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,590 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,691 UART: [idev] ++
1,175,859 UART: [idev] CDI.KEYID = 6
1,176,219 UART: [idev] SUBJECT.KEYID = 7
1,176,643 UART: [idev] UDS.KEYID = 0
1,176,988 ready_for_fw is high
1,176,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,739 UART: [idev] Erasing UDS.KEYID = 0
1,201,826 UART: [idev] Sha1 KeyId Algorithm
1,210,226 UART: [idev] --
1,211,384 UART: [ldev] ++
1,211,552 UART: [ldev] CDI.KEYID = 6
1,211,915 UART: [ldev] SUBJECT.KEYID = 5
1,212,341 UART: [ldev] AUTHORITY.KEYID = 7
1,212,804 UART: [ldev] FE.KEYID = 1
1,218,296 UART: [ldev] Erasing FE.KEYID = 1
1,244,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,270 UART: [ldev] --
1,283,751 UART: [fwproc] Wait for Commands...
1,284,439 UART: [fwproc] Recv command 0x46574c44
1,285,167 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,554 >>> mbox cmd response: success
2,772,554 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,580 UART: [afmc] ++
2,773,748 UART: [afmc] CDI.KEYID = 6
2,774,110 UART: [afmc] SUBJECT.KEYID = 7
2,774,535 UART: [afmc] AUTHORITY.KEYID = 5
2,809,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,885 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,770 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,489 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,237 UART: [afmc] --
2,853,261 UART: [cold-reset] --
2,854,417 UART: [state] Locking Datavault
2,855,762 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,366 UART: [state] Locking ICCM
2,857,024 UART: [exit] Launching FMC @ 0x40000130
2,862,353 UART:
2,862,369 UART: Running Caliptra FMC ...
2,862,777 UART:
2,862,920 UART: [state] CFI Enabled
2,873,727 UART: [fht] FMC Alias Private Key: 7
2,981,906 UART: [art] Extend RT PCRs Done
2,982,334 UART: [art] Lock RT PCRs Done
2,983,830 UART: [art] Populate DV Done
2,991,843 UART: [fht] FMC Alias Private Key: 7
2,992,989 UART: [art] Derive CDI
2,993,269 UART: [art] Store in in slot 0x4
3,078,906 UART: [art] Derive Key Pair
3,079,266 UART: [art] Store priv key in slot 0x5
3,092,828 UART: [art] Derive Key Pair - Done
3,107,612 UART: [art] Signing Cert with AUTHO
3,108,092 UART: RITY.KEYID = 7
3,123,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,287 UART: [art] PUB.X = 170CA6DE4ED231D9CAF9E0BAFE2238C2A88BEA4914446E4935904B0385DF04E9C6773DAA7366719B1F80C7526752AF99
3,131,054 UART: [art] PUB.Y = 762813F574AB92AF885C53705A6BB666FE6E3EB478C147238631D5370991B4C73BFD52410621ED469E9314065A3FB2FE
3,137,991 UART: [art] SIG.R = FC3B463AE9DD1E4F0B691D8AD817119C6AF74CE06380ACE595538564A6D6AA41FA0B2DA28FC15C75861F27D8A3CF5FE0
3,144,773 UART: [art] SIG.S = A85BF0055065C90C622FFFD21606580C5E6195498466D5C3508FF5991600FD1C6FBA8A2E8C6ADDB850B50BFAF8AEF06A
3,168,835 UART: Caliptra RT
3,169,180 UART: [state] CFI Enabled
3,277,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,638 UART: [rt]cmd =0x54514754, len=24
3,310,831 >>> mbox cmd response data (8 bytes)
3,310,832 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,325 UART: [rt]cmd =0x54514754, len=24
3,342,294 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,728 ready_for_fw is high
1,059,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,429 >>> mbox cmd response: success
2,623,429 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,867 UART:
2,685,883 UART: Running Caliptra FMC ...
2,686,291 UART:
2,686,434 UART: [state] CFI Enabled
2,696,947 UART: [fht] FMC Alias Private Key: 7
2,804,052 UART: [art] Extend RT PCRs Done
2,804,480 UART: [art] Lock RT PCRs Done
2,805,772 UART: [art] Populate DV Done
2,814,113 UART: [fht] FMC Alias Private Key: 7
2,815,177 UART: [art] Derive CDI
2,815,457 UART: [art] Store in in slot 0x4
2,900,830 UART: [art] Derive Key Pair
2,901,190 UART: [art] Store priv key in slot 0x5
2,914,072 UART: [art] Derive Key Pair - Done
2,928,630 UART: [art] Signing Cert with AUTHO
2,929,110 UART: RITY.KEYID = 7
2,944,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,863 UART: [art] PUB.X = 9CE385A4F2EDBC26D03B5866687240FFCF2CD494BFA49BE3469A0C070C1EF27640F96C497F71FA0BFC3A947CB7441229
2,951,633 UART: [art] PUB.Y = 7BD41180D6A450E2DC13C9AD0EB9A6DFE7C6D349402604FD2163BC521675AC04B40E43AEB5520595D66C45217CEFDAD2
2,958,580 UART: [art] SIG.R = D5627A4DB45CCCB42EF4715244526A8B9C966F38747FE928FD1D5C9FB3E682C0869E25BDDE399F805F043F64D6C6C4A0
2,965,357 UART: [art] SIG.S = 6F2891BE7E990889563A3B449EA5F379A497F073A5C0F74DCFC6C72A53A4B0EAA828BE54A3965E2D9534A6F1BE1B140D
2,988,644 UART: Caliptra RT
2,988,989 UART: [state] CFI Enabled
3,097,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,804 UART: [rt]cmd =0x54514754, len=24
3,130,039 >>> mbox cmd response data (8 bytes)
3,130,040 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,399 UART: [rt]cmd =0x54514754, len=24
3,161,240 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,236 UART: [ldev] ++
1,209,404 UART: [ldev] CDI.KEYID = 6
1,209,768 UART: [ldev] SUBJECT.KEYID = 5
1,210,195 UART: [ldev] AUTHORITY.KEYID = 7
1,210,658 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,960 UART: [ldev] --
1,281,336 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,559 >>> mbox cmd response: success
2,769,559 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,796 UART: [afmc] ++
2,770,964 UART: [afmc] CDI.KEYID = 6
2,771,327 UART: [afmc] SUBJECT.KEYID = 7
2,771,753 UART: [afmc] AUTHORITY.KEYID = 5
2,807,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,573 UART: [afmc] --
2,850,635 UART: [cold-reset] --
2,851,401 UART: [state] Locking Datavault
2,852,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,024 UART: [state] Locking ICCM
2,853,648 UART: [exit] Launching FMC @ 0x40000130
2,858,977 UART:
2,858,993 UART: Running Caliptra FMC ...
2,859,401 UART:
2,859,455 UART: [state] CFI Enabled
2,870,074 UART: [fht] FMC Alias Private Key: 7
2,977,623 UART: [art] Extend RT PCRs Done
2,978,051 UART: [art] Lock RT PCRs Done
2,979,629 UART: [art] Populate DV Done
2,987,924 UART: [fht] FMC Alias Private Key: 7
2,989,036 UART: [art] Derive CDI
2,989,316 UART: [art] Store in in slot 0x4
3,074,761 UART: [art] Derive Key Pair
3,075,121 UART: [art] Store priv key in slot 0x5
3,087,791 UART: [art] Derive Key Pair - Done
3,102,256 UART: [art] Signing Cert with AUTHO
3,102,736 UART: RITY.KEYID = 7
3,118,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,829 UART: [art] PUB.X = EA00702317F5CE747C604D0B2FDF18DDFF02F6AF4ADCEDB68D8D6AAB6B686DB8DC0DFD79A42BDCBDC1CBF612242D1F66
3,125,604 UART: [art] PUB.Y = BEBF1D5FD9DF055A22061E9431A3DF484CC48E759D06BC2BB5C5A8A795D66B4662BFA7035FF108FF5943664400121CE2
3,132,527 UART: [art] SIG.R = 6FF5BB7A2EA8A07CA93A4CA0A3794DD1E81319AC80A1AA72766063B13517378D75ABF54F7CEFB3BF491D237EF0607364
3,139,309 UART: [art] SIG.S = 485DEE65F62CA8F66DF13163A575AB338330DDEF0E3740161F6FBED5629966332724B54229827F026BEDBAC07C462CDC
3,163,320 UART: Caliptra RT
3,163,573 UART: [state] CFI Enabled
3,271,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,364 UART: [rt]cmd =0x54514754, len=24
3,304,357 >>> mbox cmd response data (8 bytes)
3,304,358 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,711 UART: [rt]cmd =0x54514754, len=24
3,335,712 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,602 ready_for_fw is high
1,055,602 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,471 >>> mbox cmd response: success
2,617,471 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,678,727 UART:
2,678,743 UART: Running Caliptra FMC ...
2,679,151 UART:
2,679,205 UART: [state] CFI Enabled
2,689,762 UART: [fht] FMC Alias Private Key: 7
2,798,437 UART: [art] Extend RT PCRs Done
2,798,865 UART: [art] Lock RT PCRs Done
2,800,487 UART: [art] Populate DV Done
2,808,972 UART: [fht] FMC Alias Private Key: 7
2,810,146 UART: [art] Derive CDI
2,810,426 UART: [art] Store in in slot 0x4
2,896,081 UART: [art] Derive Key Pair
2,896,441 UART: [art] Store priv key in slot 0x5
2,909,277 UART: [art] Derive Key Pair - Done
2,924,348 UART: [art] Signing Cert with AUTHO
2,924,828 UART: RITY.KEYID = 7
2,939,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,527 UART: [art] PUB.X = 73087D8A53469530C7FCC51BAF744E4BF27D7455ECCE9D365073733A27E61A7E076692D8ECC3400226E80702E6B02005
2,947,275 UART: [art] PUB.Y = 56230E49578B2EFF77F66EE1273D840BB0B5E41C12C987508FDFCA1586D67993DD8AE2B907E1F52F4894B4A75E5626B5
2,954,220 UART: [art] SIG.R = 0BD8DEABF5CBFA65CA9CEA81C8E0CF342242B0AD18C0ECCB04D832E9C001EF03FCD39CBF7FD060AA7630A080F6274351
2,961,006 UART: [art] SIG.S = 15366DF8644B46BD257A7FFC0F24F960621AAFE33D5F501B963415678EA8F03E36D6F8184E29BCD0D59BC56B2AD1C6C1
2,985,114 UART: Caliptra RT
2,985,367 UART: [state] CFI Enabled
3,093,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,186 UART: [rt]cmd =0x54514754, len=24
3,126,461 >>> mbox cmd response data (8 bytes)
3,126,462 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,189 UART: [rt]cmd =0x54514754, len=24
3,157,986 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,528 UART: [cold-reset] ++
1,169,948 UART: [fht] FHT @ 0x50003400
1,172,632 UART: [idev] ++
1,172,800 UART: [idev] CDI.KEYID = 6
1,173,161 UART: [idev] SUBJECT.KEYID = 7
1,173,586 UART: [idev] UDS.KEYID = 0
1,173,932 ready_for_fw is high
1,173,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,666 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,215,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,889 UART: [ldev] --
1,282,327 UART: [fwproc] Wait for Commands...
1,283,050 UART: [fwproc] Recv command 0x46574c44
1,283,783 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,874 >>> mbox cmd response: success
2,769,874 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,101 UART: [afmc] ++
2,771,269 UART: [afmc] CDI.KEYID = 6
2,771,632 UART: [afmc] SUBJECT.KEYID = 7
2,772,058 UART: [afmc] AUTHORITY.KEYID = 5
2,808,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,312 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,654 UART: [afmc] --
2,851,666 UART: [cold-reset] --
2,852,482 UART: [state] Locking Datavault
2,853,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,207 UART: [state] Locking ICCM
2,854,635 UART: [exit] Launching FMC @ 0x40000130
2,859,964 UART:
2,859,980 UART: Running Caliptra FMC ...
2,860,388 UART:
2,860,531 UART: [state] CFI Enabled
2,871,076 UART: [fht] FMC Alias Private Key: 7
2,978,911 UART: [art] Extend RT PCRs Done
2,979,339 UART: [art] Lock RT PCRs Done
2,980,745 UART: [art] Populate DV Done
2,989,054 UART: [fht] FMC Alias Private Key: 7
2,990,096 UART: [art] Derive CDI
2,990,376 UART: [art] Store in in slot 0x4
3,076,429 UART: [art] Derive Key Pair
3,076,789 UART: [art] Store priv key in slot 0x5
3,089,623 UART: [art] Derive Key Pair - Done
3,104,484 UART: [art] Signing Cert with AUTHO
3,104,964 UART: RITY.KEYID = 7
3,120,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,281 UART: [art] PUB.X = D7C50F4B05B35D09E440FF09B3B4E87F0501A100CF3C62EDD00E6C2A3D656F49F44BB4AD5D03D276DE49D9B20A5FC502
3,128,015 UART: [art] PUB.Y = 3B73B85DAD340272FCEF114D52B9F84E3271602B8BBBC7ED01AF6A3B64F5AC72D853637E232A962FE71B77650696436B
3,134,962 UART: [art] SIG.R = FEF7E12FC534613FB835EA927122BDC5BC3606F311FE1E3F7384E57AEF6750701EFE4480D58BB35702874759CBD58FB6
3,141,734 UART: [art] SIG.S = DD87BFED7A00DEE44FFB9BDB1BF89F0382A223DC8ACEB525ABCE7D467B79AA236B77C31D4EA75E6F0D31E7B7A1E2AA1E
3,165,365 UART: Caliptra RT
3,165,710 UART: [state] CFI Enabled
3,273,234 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,690 UART: [rt]cmd =0x54514754, len=24
3,306,059 >>> mbox cmd response data (8 bytes)
3,306,060 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,587 UART: [rt]cmd =0x54514754, len=24
3,337,590 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,359 ready_for_fw is high
1,055,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,716 >>> mbox cmd response: success
2,619,716 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,696 UART:
2,681,712 UART: Running Caliptra FMC ...
2,682,120 UART:
2,682,263 UART: [state] CFI Enabled
2,692,922 UART: [fht] FMC Alias Private Key: 7
2,800,925 UART: [art] Extend RT PCRs Done
2,801,353 UART: [art] Lock RT PCRs Done
2,802,977 UART: [art] Populate DV Done
2,811,110 UART: [fht] FMC Alias Private Key: 7
2,812,102 UART: [art] Derive CDI
2,812,382 UART: [art] Store in in slot 0x4
2,898,217 UART: [art] Derive Key Pair
2,898,577 UART: [art] Store priv key in slot 0x5
2,912,103 UART: [art] Derive Key Pair - Done
2,926,657 UART: [art] Signing Cert with AUTHO
2,927,137 UART: RITY.KEYID = 7
2,942,293 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,058 UART: [art] PUB.X = 73C928BA06F647B78F956E098EC3E7C09C98B535B3A2EED7F0051FA36CCA8E86C44C1375A47DF7FAB6C81CCABE9D4925
2,949,837 UART: [art] PUB.Y = 2707767FD6E2246CCA0611E20D7BC9EF56D83D9CD811822A5B928E9FC4C0DD27635EC79C1C67F55A9172000A578D663A
2,956,757 UART: [art] SIG.R = 7D2005DB91483D5FCCBA0B9F1AFD366C7E2476D7A5E4424077D6F7522331FC645DAEB664668FDCCCFD50828AFA376F5C
2,963,537 UART: [art] SIG.S = 2B7161A70C7FF138E24AD60FB5D0DDE51B84D12D49AE03FDF6E00A94B4AA51CF4F4E71AC6D4B68F2E768A2B46DB4E330
2,986,932 UART: Caliptra RT
2,987,277 UART: [state] CFI Enabled
3,094,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,608 UART: [rt]cmd =0x54514754, len=24
3,127,867 >>> mbox cmd response data (8 bytes)
3,127,868 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,469 UART: [rt]cmd =0x54514754, len=24
3,159,306 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,158 UART:
192,525 UART: Running Caliptra ROM ...
193,714 UART:
193,867 UART: [state] CFI Enabled
264,077 UART: [state] LifecycleState = Unprovisioned
265,991 UART: [state] DebugLocked = No
268,875 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,533 UART: [kat] SHA2-256
443,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,734 UART: [kat] ++
454,184 UART: [kat] sha1
464,871 UART: [kat] SHA2-256
467,566 UART: [kat] SHA2-384
474,697 UART: [kat] SHA2-512-ACC
477,066 UART: [kat] ECC-384
2,768,419 UART: [kat] HMAC-384Kdf
2,799,354 UART: [kat] LMS
3,989,659 UART: [kat] --
3,994,815 UART: [cold-reset] ++
3,996,460 UART: [fht] Storing FHT @ 0x50003400
4,007,443 UART: [idev] ++
4,008,023 UART: [idev] CDI.KEYID = 6
4,008,946 UART: [idev] SUBJECT.KEYID = 7
4,010,196 UART: [idev] UDS.KEYID = 0
4,011,255 ready_for_fw is high
4,011,461 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,577 UART: [idev] Erasing UDS.KEYID = 0
7,345,531 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,885 UART: [idev] --
7,371,473 UART: [ldev] ++
7,372,042 UART: [ldev] CDI.KEYID = 6
7,372,991 UART: [ldev] SUBJECT.KEYID = 5
7,374,198 UART: [ldev] AUTHORITY.KEYID = 7
7,375,488 UART: [ldev] FE.KEYID = 1
7,421,437 UART: [ldev] Erasing FE.KEYID = 1
10,754,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,965 UART: [ldev] --
13,133,825 UART: [fwproc] Waiting for Commands...
13,136,615 UART: [fwproc] Received command 0x46574c44
13,138,846 UART: [fwproc] Received Image of size 113760 bytes
17,187,911 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,005 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,647,213 >>> mbox cmd response: success
17,647,773 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,651,736 UART: [afmc] ++
17,652,326 UART: [afmc] CDI.KEYID = 6
17,653,263 UART: [afmc] SUBJECT.KEYID = 7
17,654,535 UART: [afmc] AUTHORITY.KEYID = 5
21,030,820 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,197 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,455 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,911 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,703 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,154 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,579 UART: [afmc] --
23,395,333 UART: [cold-reset] --
23,400,109 UART: [state] Locking Datavault
23,405,086 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,845 UART: [state] Locking ICCM
23,409,379 UART: [exit] Launching FMC @ 0x40000130
23,417,775 UART:
23,418,009 UART: Running Caliptra FMC ...
23,419,114 UART:
23,419,273 UART: [state] CFI Enabled
23,486,570 UART: [fht] FMC Alias Private Key: 7
25,824,136 UART: [art] Extend RT PCRs Done
25,825,357 UART: [art] Lock RT PCRs Done
25,827,380 UART: [art] Populate DV Done
25,832,843 UART: [fht] FMC Alias Private Key: 7
25,834,377 UART: [art] Derive CDI
25,835,113 UART: [art] Store in in slot 0x4
25,894,661 UART: [art] Derive Key Pair
25,895,661 UART: [art] Store priv key in slot 0x5
29,188,757 UART: [art] Derive Key Pair - Done
29,201,813 UART: [art] Signing Cert with AUTHO
29,203,119 UART: RITY.KEYID = 7
31,489,796 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,300 UART: [art] PUB.X = 6148A0CBAE2A3088915962B8892CB91E1C1C70074ABDB1904119AAAE405D579F707440E64B8EB3D58D11FA5584A46660
31,498,548 UART: [art] PUB.Y = 50AD090B8D055EFE7E5005DD440AA8A34E8D4B17AB92DEFDDD0D44C43C60884AC6FA38ED21B11BB2DBB69E25A904FA32
31,505,860 UART: [art] SIG.R = C79A6B71106ED04C936DB506C2B4EF01254823206359354E851C08BB5B90A2BC5C239693804431035410918B0515A5C9
31,513,205 UART: [art] SIG.S = 590ABE07C04CEA23E037D4E6092B3E6071DE167C961D0B5F8EE3DB383407B62523887448960EC39F476E53B575A21453
32,817,616 UART: Caliptra RT
32,818,327 UART: [state] CFI Enabled
32,979,149 UART: [rt] RT listening for mailbox commands...
33,010,775 UART: [rt]cmd =0x54514754, len=24
33,013,418 >>> mbox cmd response data (8 bytes)
33,013,864 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,043,541 UART: [rt]cmd =0x47544744, len=8
33,046,348 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,855 writing to cptra_bootfsm_go
3,806,033 ready_for_fw is high
3,806,425 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,889,303 >>> mbox cmd response: success
17,890,103 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,589,048 UART:
23,589,433 UART: Running Caliptra FMC ...
23,590,571 UART:
23,590,736 UART: [state] CFI Enabled
23,657,194 UART: [fht] FMC Alias Private Key: 7
25,995,372 UART: [art] Extend RT PCRs Done
25,996,909 UART: [art] Lock RT PCRs Done
25,998,447 UART: [art] Populate DV Done
26,003,889 UART: [fht] FMC Alias Private Key: 7
26,005,640 UART: [art] Derive CDI
26,006,391 UART: [art] Store in in slot 0x4
26,068,493 UART: [art] Derive Key Pair
26,069,496 UART: [art] Store priv key in slot 0x5
29,363,183 UART: [art] Derive Key Pair - Done
29,375,984 UART: [art] Signing Cert with AUTHO
29,377,302 UART: RITY.KEYID = 7
31,664,320 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,846 UART: [art] PUB.X = 6D7B654B0503872A8394B686796B75DADBB9735CB0BA21A9C6DD42000DC1BADE984ED429A0E1BCCC8B90692C50584219
31,673,116 UART: [art] PUB.Y = 374CC1808D1BB1DC9EF86F0B248FF9E4B526BE9963F9A6D465B64CDE0F6182B0D556BA9713D6614021E352B808C6B27F
31,680,371 UART: [art] SIG.R = 03D83CFB1545595EC4F35F36497A46E0BF60215F66A604C6DCEAC757460A770B16151319FE7F7034428138F01D6E295C
31,687,764 UART: [art] SIG.S = 0998EAC3770685F8877A8D03A1FFD0FA275EC71337589E2A671EC7CB9BB34BD712FF3A6865D67C6E40044D4AB0A312E5
32,992,801 UART: Caliptra RT
32,993,516 UART: [state] CFI Enabled
33,154,052 UART: [rt] RT listening for mailbox commands...
33,185,476 UART: [rt]cmd =0x54514754, len=24
33,188,062 >>> mbox cmd response data (8 bytes)
33,188,568 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,218,558 UART: [rt]cmd =0x47544744, len=8
33,221,686 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,620 writing to cptra_bootfsm_go
192,884 UART:
193,260 UART: Running Caliptra ROM ...
194,695 UART:
603,968 UART: [state] CFI Enabled
619,090 UART: [state] LifecycleState = Unprovisioned
621,052 UART: [state] DebugLocked = No
623,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,586 UART: [kat] SHA2-256
797,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,861 UART: [kat] ++
808,381 UART: [kat] sha1
818,964 UART: [kat] SHA2-256
821,683 UART: [kat] SHA2-384
828,022 UART: [kat] SHA2-512-ACC
830,389 UART: [kat] ECC-384
3,112,929 UART: [kat] HMAC-384Kdf
3,124,874 UART: [kat] LMS
4,315,023 UART: [kat] --
4,322,283 UART: [cold-reset] ++
4,324,214 UART: [fht] Storing FHT @ 0x50003400
4,335,421 UART: [idev] ++
4,336,052 UART: [idev] CDI.KEYID = 6
4,336,933 UART: [idev] SUBJECT.KEYID = 7
4,338,242 UART: [idev] UDS.KEYID = 0
4,339,185 ready_for_fw is high
4,339,376 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,251 UART: [idev] Erasing UDS.KEYID = 0
7,625,872 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,634 UART: [idev] --
7,651,915 UART: [ldev] ++
7,652,492 UART: [ldev] CDI.KEYID = 6
7,653,468 UART: [ldev] SUBJECT.KEYID = 5
7,654,671 UART: [ldev] AUTHORITY.KEYID = 7
7,655,947 UART: [ldev] FE.KEYID = 1
7,666,482 UART: [ldev] Erasing FE.KEYID = 1
10,956,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,605 UART: [ldev] --
13,320,172 UART: [fwproc] Waiting for Commands...
13,321,996 UART: [fwproc] Received command 0x46574c44
13,324,179 UART: [fwproc] Received Image of size 113760 bytes
17,364,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,368 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,501 >>> mbox cmd response: success
17,828,072 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,832,296 UART: [afmc] ++
17,832,879 UART: [afmc] CDI.KEYID = 6
17,833,841 UART: [afmc] SUBJECT.KEYID = 7
17,835,072 UART: [afmc] AUTHORITY.KEYID = 5
21,151,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,791 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,166 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,034 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,497 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,699 UART: [afmc] --
23,517,969 UART: [cold-reset] --
23,520,690 UART: [state] Locking Datavault
23,524,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,330 UART: [state] Locking ICCM
23,527,476 UART: [exit] Launching FMC @ 0x40000130
23,535,868 UART:
23,536,099 UART: Running Caliptra FMC ...
23,537,198 UART:
23,537,381 UART: [state] CFI Enabled
23,545,267 UART: [fht] FMC Alias Private Key: 7
25,876,661 UART: [art] Extend RT PCRs Done
25,877,877 UART: [art] Lock RT PCRs Done
25,879,589 UART: [art] Populate DV Done
25,885,050 UART: [fht] FMC Alias Private Key: 7
25,886,692 UART: [art] Derive CDI
25,887,420 UART: [art] Store in in slot 0x4
25,929,960 UART: [art] Derive Key Pair
25,930,957 UART: [art] Store priv key in slot 0x5
29,173,029 UART: [art] Derive Key Pair - Done
29,186,238 UART: [art] Signing Cert with AUTHO
29,187,538 UART: RITY.KEYID = 7
31,466,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,359 UART: [art] PUB.X = 3F3A501716D424F480FDFE1E2A03360E1D00A975971D54BBC8655C171FD7D41C4D05E73BCE9FBC01B9F6A0A771AE0F6C
31,475,658 UART: [art] PUB.Y = E1B0C4F07CE71EE330B02E32E1368D4D1CB4E801643AF9E0E7F8BD00F8108101B2E26492F4F04D89BC3774B8A32B7986
31,482,836 UART: [art] SIG.R = E4E2CE9F227CD92E9D9D1762EF006DE56482F4289EFF2E8EE4E43C9E2046D4227516C5A25A90EFA78A83C5F191C0D0BB
31,490,200 UART: [art] SIG.S = 16B0B6A835A9D0950958DE0B226BABF16697F2A76E32597E48C5F47DC151A743681D5D3F9C04FB54F64DF93C2E3844B4
32,795,318 UART: Caliptra RT
32,796,035 UART: [state] CFI Enabled
32,912,968 UART: [rt] RT listening for mailbox commands...
32,944,627 UART: [rt]cmd =0x54514754, len=24
32,946,999 >>> mbox cmd response data (8 bytes)
32,947,536 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
32,977,313 UART: [rt]cmd =0x47544744, len=8
32,980,514 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
4,124,500 ready_for_fw is high
4,124,924 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,064,987 >>> mbox cmd response: success
18,065,839 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,704,163 UART:
23,704,600 UART: Running Caliptra FMC ...
23,705,702 UART:
23,705,852 UART: [state] CFI Enabled
23,713,647 UART: [fht] FMC Alias Private Key: 7
26,044,396 UART: [art] Extend RT PCRs Done
26,045,628 UART: [art] Lock RT PCRs Done
26,047,538 UART: [art] Populate DV Done
26,052,909 UART: [fht] FMC Alias Private Key: 7
26,054,404 UART: [art] Derive CDI
26,055,138 UART: [art] Store in in slot 0x4
26,097,510 UART: [art] Derive Key Pair
26,098,505 UART: [art] Store priv key in slot 0x5
29,340,606 UART: [art] Derive Key Pair - Done
29,353,279 UART: [art] Signing Cert with AUTHO
29,354,587 UART: RITY.KEYID = 7
31,634,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,527 UART: [art] PUB.X = F0BF4939533D6B1260B267FC1C054E4D85B5AD9ECC6AC80FFC54FA344202F9932C54DA7397D511995043D521CAE55AFA
31,642,842 UART: [art] PUB.Y = 04F511F5500C03B9020E08D43228CB16F4E6C33AD4DD2B0816576372B0A94E6CD19705CD0445AB8A167773844B2016F2
31,650,021 UART: [art] SIG.R = D435973F6B52A8D900A3832A45B55E63793244BAFDFD1E253EF52B74A8AFDCAEE146EAC666B86AD7447EBAD4E51054EA
31,657,416 UART: [art] SIG.S = A6FD56393D0F084ADCC83F5F697A58943A8E330857011C4B3E7059D3F691E510E131AD8FE33E417255574D0FE70FABBC
32,962,245 UART: Caliptra RT
32,962,945 UART: [state] CFI Enabled
33,080,918 UART: [rt] RT listening for mailbox commands...
33,112,119 UART: [rt]cmd =0x54514754, len=24
33,114,867 >>> mbox cmd response data (8 bytes)
33,115,395 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,145,061 UART: [rt]cmd =0x47544744, len=8
33,148,045 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
192,436 UART:
192,977 UART: Running Caliptra ROM ...
194,194 UART:
194,350 UART: [state] CFI Enabled
265,832 UART: [state] LifecycleState = Unprovisioned
267,693 UART: [state] DebugLocked = No
269,423 UART: [state] WD Timer not started. Device not locked for debugging
272,920 UART: [kat] SHA2-256
451,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,455 UART: [kat] ++
463,903 UART: [kat] sha1
475,131 UART: [kat] SHA2-256
478,158 UART: [kat] SHA2-384
485,633 UART: [kat] SHA2-512-ACC
488,565 UART: [kat] ECC-384
2,949,241 UART: [kat] HMAC-384Kdf
2,971,090 UART: [kat] LMS
3,500,515 UART: [kat] --
3,505,800 UART: [cold-reset] ++
3,507,654 UART: [fht] FHT @ 0x50003400
3,517,774 UART: [idev] ++
3,518,332 UART: [idev] CDI.KEYID = 6
3,519,235 UART: [idev] SUBJECT.KEYID = 7
3,520,399 UART: [idev] UDS.KEYID = 0
3,521,440 ready_for_fw is high
3,521,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,099 UART: [idev] Erasing UDS.KEYID = 0
6,030,644 UART: [idev] Sha1 KeyId Algorithm
6,054,323 UART: [idev] --
6,057,915 UART: [ldev] ++
6,058,495 UART: [ldev] CDI.KEYID = 6
6,059,409 UART: [ldev] SUBJECT.KEYID = 5
6,060,587 UART: [ldev] AUTHORITY.KEYID = 7
6,061,817 UART: [ldev] FE.KEYID = 1
6,100,058 UART: [ldev] Erasing FE.KEYID = 1
8,600,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,427 UART: [ldev] --
10,392,636 UART: [fwproc] Wait for Commands...
10,394,941 UART: [fwproc] Recv command 0x46574c44
10,396,997 UART: [fwproc] Recv'd Img size: 114084 bytes
13,802,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,873,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,259,672 >>> mbox cmd response: success
14,260,183 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,264,547 UART: [afmc] ++
14,265,140 UART: [afmc] CDI.KEYID = 6
14,266,024 UART: [afmc] SUBJECT.KEYID = 7
14,267,235 UART: [afmc] AUTHORITY.KEYID = 5
16,806,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,351 UART: [afmc] --
18,608,859 UART: [cold-reset] --
18,611,591 UART: [state] Locking Datavault
18,616,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,039 UART: [state] Locking ICCM
18,620,240 UART: [exit] Launching FMC @ 0x40000130
18,628,692 UART:
18,628,918 UART: Running Caliptra FMC ...
18,630,012 UART:
18,630,169 UART: [state] CFI Enabled
18,690,824 UART: [fht] FMC Alias Private Key: 7
20,454,778 UART: [art] Extend RT PCRs Done
20,455,998 UART: [art] Lock RT PCRs Done
20,457,477 UART: [art] Populate DV Done
20,462,992 UART: [fht] FMC Alias Private Key: 7
20,464,521 UART: [art] Derive CDI
20,465,246 UART: [art] Store in in slot 0x4
20,523,891 UART: [art] Derive Key Pair
20,524,932 UART: [art] Store priv key in slot 0x5
22,988,157 UART: [art] Derive Key Pair - Done
23,000,928 UART: [art] Signing Cert with AUTHO
23,002,263 UART: RITY.KEYID = 7
24,714,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,667 UART: [art] PUB.X = 4101DF527CC6C9327D33727C3E785383A75C6C634FFF072A6BB4EEAF9D57F663B43743AD22487D08013632F0069F3040
24,722,899 UART: [art] PUB.Y = 59B5536CB3180C6DDFB624C7BC2930A7719486C60DA3273ED0797836F53C9D2131F66D908377C7BB704FFC0F8BEB5072
24,730,163 UART: [art] SIG.R = A3A1EC7085EEC493EE877AB6FD1D2767D5DA3D3643478BF616E5E5A1478B6BFC953D5412B6FF510750EEE2DED8E0480C
24,737,524 UART: [art] SIG.S = F4C9E2FF44CCA2C3C44BC64E0C6569AF01965837FDA02E285F94F1D4DE5BB3279A04A9BC1B5D7871795C8B569A6526F4
25,716,901 UART: Caliptra RT
25,717,617 UART: [state] CFI Enabled
25,882,592 UART: [rt] RT listening for mailbox commands...
25,914,240 UART: [rt]cmd =0x54514754, len=24
25,916,672 >>> mbox cmd response data (8 bytes)
25,917,142 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,946,976 UART: [rt]cmd =0x47544744, len=8
25,950,074 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,382,280 ready_for_fw is high
3,382,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,066,109 >>> mbox cmd response: success
14,066,903 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,359,694 UART:
18,360,113 UART: Running Caliptra FMC ...
18,361,311 UART:
18,361,493 UART: [state] CFI Enabled
18,429,237 UART: [fht] FMC Alias Private Key: 7
20,192,887 UART: [art] Extend RT PCRs Done
20,194,128 UART: [art] Lock RT PCRs Done
20,195,701 UART: [art] Populate DV Done
20,200,942 UART: [fht] FMC Alias Private Key: 7
20,202,643 UART: [art] Derive CDI
20,203,449 UART: [art] Store in in slot 0x4
20,262,404 UART: [art] Derive Key Pair
20,263,402 UART: [art] Store priv key in slot 0x5
22,726,579 UART: [art] Derive Key Pair - Done
22,739,690 UART: [art] Signing Cert with AUTHO
22,740,999 UART: RITY.KEYID = 7
24,451,965 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,486 UART: [art] PUB.X = 18CCEBFD4CC7F6DBE94F262FF14ED93F3F110CE0B39AF4F227EEAE5A0C7BF15D891F1E142FA81D7E0D1E6447311185E5
24,460,782 UART: [art] PUB.Y = 156B31FAC8882B205E1DD6F743A4660B8FA98307F112188C6754CD02693516D992A8D772AD788D06EBC8AFBAB40BCFEA
24,468,020 UART: [art] SIG.R = E597A35ECF6ACFDDDDF9E30ED7012E068D637623DF755B78367EAB7A68C54BC4E818E7DD7FF72E10C143F5D4795D3A57
24,475,417 UART: [art] SIG.S = 9B9488DAFAEA6B76ADE415B5B30E76680155EB1CC6DD09881B3F07E6E54556862134404B267A710564BD3C63060A3954
25,454,601 UART: Caliptra RT
25,455,301 UART: [state] CFI Enabled
25,620,233 UART: [rt] RT listening for mailbox commands...
25,651,625 UART: [rt]cmd =0x54514754, len=24
25,654,247 >>> mbox cmd response data (8 bytes)
25,654,803 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,684,362 UART: [rt]cmd =0x47544744, len=8
25,687,196 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
192,981 UART:
193,363 UART: Running Caliptra ROM ...
194,494 UART:
603,987 UART: [state] CFI Enabled
614,182 UART: [state] LifecycleState = Unprovisioned
616,063 UART: [state] DebugLocked = No
617,883 UART: [state] WD Timer not started. Device not locked for debugging
622,210 UART: [kat] SHA2-256
801,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,895 UART: [kat] ++
813,436 UART: [kat] sha1
823,650 UART: [kat] SHA2-256
826,699 UART: [kat] SHA2-384
831,987 UART: [kat] SHA2-512-ACC
834,926 UART: [kat] ECC-384
3,277,461 UART: [kat] HMAC-384Kdf
3,290,853 UART: [kat] LMS
3,820,371 UART: [kat] --
3,825,145 UART: [cold-reset] ++
3,826,507 UART: [fht] FHT @ 0x50003400
3,837,700 UART: [idev] ++
3,838,267 UART: [idev] CDI.KEYID = 6
3,839,180 UART: [idev] SUBJECT.KEYID = 7
3,840,298 UART: [idev] UDS.KEYID = 0
3,841,334 ready_for_fw is high
3,841,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,152 UART: [idev] Erasing UDS.KEYID = 0
6,313,559 UART: [idev] Sha1 KeyId Algorithm
6,335,494 UART: [idev] --
6,340,665 UART: [ldev] ++
6,341,270 UART: [ldev] CDI.KEYID = 6
6,342,158 UART: [ldev] SUBJECT.KEYID = 5
6,343,312 UART: [ldev] AUTHORITY.KEYID = 7
6,344,600 UART: [ldev] FE.KEYID = 1
6,356,141 UART: [ldev] Erasing FE.KEYID = 1
8,829,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,641 UART: [ldev] --
10,619,588 UART: [fwproc] Wait for Commands...
10,621,092 UART: [fwproc] Recv command 0x46574c44
10,623,206 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,089,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,214 >>> mbox cmd response: success
14,475,770 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,479,114 UART: [afmc] ++
14,479,698 UART: [afmc] CDI.KEYID = 6
14,480,609 UART: [afmc] SUBJECT.KEYID = 7
14,481,707 UART: [afmc] AUTHORITY.KEYID = 5
16,979,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,140 UART: [afmc] --
18,777,093 UART: [cold-reset] --
18,781,389 UART: [state] Locking Datavault
18,786,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,238 UART: [state] Locking ICCM
18,789,373 UART: [exit] Launching FMC @ 0x40000130
18,797,772 UART:
18,798,019 UART: Running Caliptra FMC ...
18,799,130 UART:
18,799,284 UART: [state] CFI Enabled
18,807,112 UART: [fht] FMC Alias Private Key: 7
20,563,336 UART: [art] Extend RT PCRs Done
20,564,560 UART: [art] Lock RT PCRs Done
20,566,108 UART: [art] Populate DV Done
20,571,576 UART: [fht] FMC Alias Private Key: 7
20,573,220 UART: [art] Derive CDI
20,573,974 UART: [art] Store in in slot 0x4
20,616,463 UART: [art] Derive Key Pair
20,617,507 UART: [art] Store priv key in slot 0x5
23,044,024 UART: [art] Derive Key Pair - Done
23,057,121 UART: [art] Signing Cert with AUTHO
23,058,453 UART: RITY.KEYID = 7
24,764,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,765,691 UART: [art] PUB.X = 95E67295F093808EA29BC66C78320D3D716DA122BFD4E8561CF8542F36F701902BBE48D52D488AB308DE708D55FACFF6
24,772,963 UART: [art] PUB.Y = C3178CBE76FB2A26CB352D587A12D85C1CCAF8FC19A5DC598D642E822154A5F6D5CBF1955D6C7B513B831D2DE82F93A8
24,780,266 UART: [art] SIG.R = 5C60518830B0A3393B801A446068170D69F7F0373F2D71AD13D5D6110304A181B9F898C5F9FBAE48CF595DD5556FAA0B
24,787,630 UART: [art] SIG.S = 95F8D345DE81BA975A037F627FF0F16791969F55DD6510FC670A83B3F4F8070AFB0222A8BC5CC2C5C4CC8E962EB2BFE0
25,766,393 UART: Caliptra RT
25,767,109 UART: [state] CFI Enabled
25,883,806 UART: [rt] RT listening for mailbox commands...
25,915,331 UART: [rt]cmd =0x54514754, len=24
25,917,918 >>> mbox cmd response data (8 bytes)
25,918,379 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,948,263 UART: [rt]cmd =0x47544744, len=8
25,951,121 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,794 writing to cptra_bootfsm_go
3,691,984 ready_for_fw is high
3,692,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,543 >>> mbox cmd response: success
14,256,544 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,505,572 UART:
18,505,980 UART: Running Caliptra FMC ...
18,507,090 UART:
18,507,248 UART: [state] CFI Enabled
18,515,739 UART: [fht] FMC Alias Private Key: 7
20,272,126 UART: [art] Extend RT PCRs Done
20,273,354 UART: [art] Lock RT PCRs Done
20,275,116 UART: [art] Populate DV Done
20,280,532 UART: [fht] FMC Alias Private Key: 7
20,282,124 UART: [art] Derive CDI
20,282,869 UART: [art] Store in in slot 0x4
20,325,271 UART: [art] Derive Key Pair
20,326,292 UART: [art] Store priv key in slot 0x5
22,752,716 UART: [art] Derive Key Pair - Done
22,765,547 UART: [art] Signing Cert with AUTHO
22,766,874 UART: RITY.KEYID = 7
24,471,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,500 UART: [art] PUB.X = 411C1AFEDB05C790C56F56922F03C98DC19643CF84D14B07C43EE677956551917E427F7C30F28B49789C75E7FF785B58
24,480,778 UART: [art] PUB.Y = 3C30FE5681B85D84EA51B30719EBC489F96C287FCC19D89C3C5E1C39BAF08EB8B0AFA59791AB842584E08D41E1D98257
24,488,007 UART: [art] SIG.R = 42E04ACC01137DD0B11CDEBE784AFD16F550674E2B7ACDB04D5EF7634597855A3C5553397CE90E865FAD8495F5481F13
24,495,447 UART: [art] SIG.S = 6F2EEC43940870DACBA482069DB59E6254F9E0DD09DAE11620F6911DB400283DD7FA040B045D7FB5674DC7F5D3DD9F1D
25,474,791 UART: Caliptra RT
25,475,507 UART: [state] CFI Enabled
25,592,698 UART: [rt] RT listening for mailbox commands...
25,624,382 UART: [rt]cmd =0x54514754, len=24
25,627,127 >>> mbox cmd response data (8 bytes)
25,627,550 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,657,600 UART: [rt]cmd =0x47544744, len=8
25,660,691 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,457 UART:
192,843 UART: Running Caliptra ROM ...
193,941 UART:
194,084 UART: [state] CFI Enabled
268,650 UART: [state] LifecycleState = Unprovisioned
271,076 UART: [state] DebugLocked = No
273,396 UART: [state] WD Timer not started. Device not locked for debugging
278,018 UART: [kat] SHA2-256
467,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,673 UART: [kat] ++
479,162 UART: [kat] sha1
490,057 UART: [kat] SHA2-256
493,111 UART: [kat] SHA2-384
500,114 UART: [kat] SHA2-512-ACC
502,638 UART: [kat] ECC-384
2,948,003 UART: [kat] HMAC-384Kdf
2,972,491 UART: [kat] LMS
3,504,295 UART: [kat] --
3,508,643 UART: [cold-reset] ++
3,510,573 UART: [fht] FHT @ 0x50003400
3,522,681 UART: [idev] ++
3,523,392 UART: [idev] CDI.KEYID = 6
3,524,299 UART: [idev] SUBJECT.KEYID = 7
3,525,704 UART: [idev] UDS.KEYID = 0
3,526,700 ready_for_fw is high
3,526,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,250 UART: [idev] Erasing UDS.KEYID = 0
6,031,973 UART: [idev] Sha1 KeyId Algorithm
6,053,658 UART: [idev] --
6,058,000 UART: [ldev] ++
6,058,691 UART: [ldev] CDI.KEYID = 6
6,059,606 UART: [ldev] SUBJECT.KEYID = 5
6,060,767 UART: [ldev] AUTHORITY.KEYID = 7
6,061,992 UART: [ldev] FE.KEYID = 1
6,099,547 UART: [ldev] Erasing FE.KEYID = 1
8,603,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,867 UART: [ldev] --
10,414,385 UART: [fwproc] Wait for Commands...
10,417,458 UART: [fwproc] Recv command 0x46574c44
10,419,762 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,317 >>> mbox cmd response: success
14,596,869 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,599,917 UART: [afmc] ++
14,600,621 UART: [afmc] CDI.KEYID = 6
14,601,870 UART: [afmc] SUBJECT.KEYID = 7
14,603,315 UART: [afmc] AUTHORITY.KEYID = 5
17,126,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,365 UART: [afmc] --
18,926,089 UART: [cold-reset] --
18,929,275 UART: [state] Locking Datavault
18,933,789 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,010 UART: [state] Locking ICCM
18,938,057 UART: [exit] Launching FMC @ 0x40000130
18,946,744 UART:
18,946,972 UART: Running Caliptra FMC ...
18,948,068 UART:
18,948,225 UART: [state] CFI Enabled
19,010,674 UART: [fht] FMC Alias Private Key: 7
20,774,194 UART: [art] Extend RT PCRs Done
20,775,416 UART: [art] Lock RT PCRs Done
20,776,878 UART: [art] Populate DV Done
20,782,394 UART: [fht] FMC Alias Private Key: 7
20,784,045 UART: [art] Derive CDI
20,784,861 UART: [art] Store in in slot 0x4
20,843,561 UART: [art] Derive Key Pair
20,844,617 UART: [art] Store priv key in slot 0x5
23,307,909 UART: [art] Derive Key Pair - Done
23,320,519 UART: [art] Signing Cert with AUTHO
23,321,821 UART: RITY.KEYID = 7
25,033,788 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,304 UART: [art] PUB.X = 93BA01F286540EE506EDE675A65B6CA1D1210BFCB9F553BF548E379E9C144A4F3F6CEB11284C4F155BAF6C38BE3A2534
25,042,571 UART: [art] PUB.Y = 12F7397AC9B25B50AC1D77F29C1EF858643A92EA3C81090496CAD276DE1652BDA5F026618676568B116429D3F89FAE34
25,049,805 UART: [art] SIG.R = 1B61E1178595D9EB47B74A4D39F641CE899D994DC5D8794BC3B04BE6BA4569401F8ABE274A28F5C5059C797E032CF9CE
25,057,236 UART: [art] SIG.S = 5D4246A3B7F71F5699A67D8E620325ED828FC5A39DE04F0C67CD7C7BAD13BE22D843202948D360547AFDFFF258508F0C
26,035,515 UART: Caliptra RT
26,036,227 UART: [state] CFI Enabled
26,202,770 UART: [rt] RT listening for mailbox commands...
26,234,400 UART: [rt]cmd =0x54514754, len=24
26,237,259 >>> mbox cmd response data (8 bytes)
26,237,713 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,267,218 UART: [rt]cmd =0x47544744, len=8
26,269,824 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,441,697 ready_for_fw is high
3,442,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,531 >>> mbox cmd response: success
14,725,160 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,005,999 UART:
19,006,413 UART: Running Caliptra FMC ...
19,007,552 UART:
19,007,709 UART: [state] CFI Enabled
19,071,521 UART: [fht] FMC Alias Private Key: 7
20,835,793 UART: [art] Extend RT PCRs Done
20,837,016 UART: [art] Lock RT PCRs Done
20,838,807 UART: [art] Populate DV Done
20,844,229 UART: [fht] FMC Alias Private Key: 7
20,845,928 UART: [art] Derive CDI
20,846,738 UART: [art] Store in in slot 0x4
20,904,301 UART: [art] Derive Key Pair
20,905,344 UART: [art] Store priv key in slot 0x5
23,367,717 UART: [art] Derive Key Pair - Done
23,380,773 UART: [art] Signing Cert with AUTHO
23,382,073 UART: RITY.KEYID = 7
25,094,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,524 UART: [art] PUB.X = 293AA90456CAC71A05E7BF349719CF66F8E468C96A9FB729951D608E8DEB0A40307F38728B3BF7EAEC40F2452D183F28
25,102,753 UART: [art] PUB.Y = E365A04718F322A7C8957E86DBE3560424ED333E1EB1C234ABAB6E1CF29232C00FAA79179828577EA4A3DB7FFC3B5BFB
25,110,033 UART: [art] SIG.R = DBB689E847E1B3F5900C83C28235E66EC87F5ECCA18E138B30A11B49DC826BF7FC34E5F7F37CA59B799EA26ECC48200D
25,117,480 UART: [art] SIG.S = 040C49BFF78FCC7EDD5579ED904B4A7AFAFA668220DB6487162778C64ECE11DACFD1265DD47AEE7BFF753F52E839B879
26,096,125 UART: Caliptra RT
26,096,820 UART: [state] CFI Enabled
26,260,881 UART: [rt] RT listening for mailbox commands...
26,292,401 UART: [rt]cmd =0x54514754, len=24
26,295,308 >>> mbox cmd response data (8 bytes)
26,295,821 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,325,552 UART: [rt]cmd =0x47544744, len=8
26,328,400 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,762 writing to cptra_bootfsm_go
192,975 UART:
193,344 UART: Running Caliptra ROM ...
194,537 UART:
604,233 UART: [state] CFI Enabled
619,342 UART: [state] LifecycleState = Unprovisioned
621,717 UART: [state] DebugLocked = No
623,176 UART: [state] WD Timer not started. Device not locked for debugging
627,855 UART: [kat] SHA2-256
817,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,563 UART: [kat] ++
829,163 UART: [kat] sha1
839,477 UART: [kat] SHA2-256
842,482 UART: [kat] SHA2-384
848,542 UART: [kat] SHA2-512-ACC
851,128 UART: [kat] ECC-384
3,293,991 UART: [kat] HMAC-384Kdf
3,307,646 UART: [kat] LMS
3,839,414 UART: [kat] --
3,845,341 UART: [cold-reset] ++
3,846,353 UART: [fht] FHT @ 0x50003400
3,857,480 UART: [idev] ++
3,858,191 UART: [idev] CDI.KEYID = 6
3,859,222 UART: [idev] SUBJECT.KEYID = 7
3,860,326 UART: [idev] UDS.KEYID = 0
3,861,253 ready_for_fw is high
3,861,442 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,733 UART: [idev] Erasing UDS.KEYID = 0
6,334,639 UART: [idev] Sha1 KeyId Algorithm
6,357,164 UART: [idev] --
6,362,186 UART: [ldev] ++
6,362,872 UART: [ldev] CDI.KEYID = 6
6,363,812 UART: [ldev] SUBJECT.KEYID = 5
6,364,979 UART: [ldev] AUTHORITY.KEYID = 7
6,366,157 UART: [ldev] FE.KEYID = 1
6,378,907 UART: [ldev] Erasing FE.KEYID = 1
8,857,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,723 UART: [ldev] --
10,649,869 UART: [fwproc] Wait for Commands...
10,651,371 UART: [fwproc] Recv command 0x46574c44
10,653,680 UART: [fwproc] Recv'd Img size: 114084 bytes
14,094,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,827,794 >>> mbox cmd response: success
14,828,345 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,831,524 UART: [afmc] ++
14,832,216 UART: [afmc] CDI.KEYID = 6
14,833,407 UART: [afmc] SUBJECT.KEYID = 7
14,834,854 UART: [afmc] AUTHORITY.KEYID = 5
17,334,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,240 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,102,404 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,945 UART: [afmc] --
19,129,251 UART: [cold-reset] --
19,133,500 UART: [state] Locking Datavault
19,138,108 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,279 UART: [state] Locking ICCM
19,141,793 UART: [exit] Launching FMC @ 0x40000130
19,150,460 UART:
19,150,708 UART: Running Caliptra FMC ...
19,151,810 UART:
19,151,969 UART: [state] CFI Enabled
19,159,805 UART: [fht] FMC Alias Private Key: 7
20,916,893 UART: [art] Extend RT PCRs Done
20,918,125 UART: [art] Lock RT PCRs Done
20,920,094 UART: [art] Populate DV Done
20,925,459 UART: [fht] FMC Alias Private Key: 7
20,927,106 UART: [art] Derive CDI
20,927,844 UART: [art] Store in in slot 0x4
20,970,276 UART: [art] Derive Key Pair
20,971,315 UART: [art] Store priv key in slot 0x5
23,398,288 UART: [art] Derive Key Pair - Done
23,411,410 UART: [art] Signing Cert with AUTHO
23,412,710 UART: RITY.KEYID = 7
25,117,879 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,377 UART: [art] PUB.X = EEEB8C3E98A6B7A077480DE36D771C1323C4C950D8C36D5CB606C999A554FDA50C16EBF6FE46101780953670397E0D66
25,126,659 UART: [art] PUB.Y = 5A2297E3A5DC8D279FE503A3A6D3FC835C5069E2DC92A0C79F3118F817B25044042E63BEBDB0A6C498966984326711C6
25,133,920 UART: [art] SIG.R = 6C98E3C49E7B0495E4DAD749809E587477B0C2683852A1E18A58EE7E192CC6A7D2FFBF17BC1539609E5DCEF2B8B0E9C2
25,141,290 UART: [art] SIG.S = B42A0761A839F2D2C22317D3379CC32A7DF8AF6D854CCFDDD60CA21884CA9D7A33B8061D025D5A019066CA341C64C3BA
26,120,370 UART: Caliptra RT
26,121,052 UART: [state] CFI Enabled
26,238,983 UART: [rt] RT listening for mailbox commands...
26,270,603 UART: [rt]cmd =0x54514754, len=24
26,273,073 >>> mbox cmd response data (8 bytes)
26,273,623 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,303,339 UART: [rt]cmd =0x47544744, len=8
26,306,407 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,755,227 ready_for_fw is high
3,755,853 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,472 >>> mbox cmd response: success
14,953,096 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,202,972 UART:
19,203,358 UART: Running Caliptra FMC ...
19,204,499 UART:
19,204,662 UART: [state] CFI Enabled
19,212,879 UART: [fht] FMC Alias Private Key: 7
20,969,884 UART: [art] Extend RT PCRs Done
20,971,102 UART: [art] Lock RT PCRs Done
20,972,787 UART: [art] Populate DV Done
20,978,204 UART: [fht] FMC Alias Private Key: 7
20,979,858 UART: [art] Derive CDI
20,980,679 UART: [art] Store in in slot 0x4
21,023,371 UART: [art] Derive Key Pair
21,024,442 UART: [art] Store priv key in slot 0x5
23,451,553 UART: [art] Derive Key Pair - Done
23,464,504 UART: [art] Signing Cert with AUTHO
23,465,815 UART: RITY.KEYID = 7
25,171,344 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,855 UART: [art] PUB.X = 7E9A985C11A23CCDE84497E1FB690976F608F6D7D05ADADB904DC7CE3613F56B3AB29B17D566639FAD88B53DCCDA295F
25,180,153 UART: [art] PUB.Y = 57CA62042DE2E83C99A1D68F02D7BA9AC03F67FFF0BCD9D38EAE4FD797C8AC5C024519EF26639F9F5611679D1E6177D2
25,187,435 UART: [art] SIG.R = F34AA82091F34F5AC469394B3322181CD3822735DA2F7B915D151098F83A60BC6717EB435415D0EBE4143FA7BA3C33CE
25,194,822 UART: [art] SIG.S = 45EFA148EF23CFA8E46DF0F5E9FF3C2DBAFADB16CAC743B6CB1691234FD3DE0D3C940008F37086341A88EB91E4C0BC74
26,173,646 UART: Caliptra RT
26,174,340 UART: [state] CFI Enabled
26,291,043 UART: [rt] RT listening for mailbox commands...
26,322,508 UART: [rt]cmd =0x54514754, len=24
26,325,418 >>> mbox cmd response data (8 bytes)
26,325,922 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,355,637 UART: [rt]cmd =0x47544744, len=8
26,358,546 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,265 UART: [kat] SHA2-256
882,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,311 UART: [kat] ++
886,463 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,322 UART: [kat] SHA2-512-ACC
897,223 UART: [kat] ECC-384
903,022 UART: [kat] HMAC-384Kdf
907,690 UART: [kat] LMS
1,475,886 UART: [kat] --
1,476,519 UART: [cold-reset] ++
1,476,977 UART: [fht] Storing FHT @ 0x50003400
1,479,624 UART: [idev] ++
1,479,792 UART: [idev] CDI.KEYID = 6
1,480,152 UART: [idev] SUBJECT.KEYID = 7
1,480,576 UART: [idev] UDS.KEYID = 0
1,480,921 ready_for_fw is high
1,480,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,112 UART: [idev] --
1,514,257 UART: [ldev] ++
1,514,425 UART: [ldev] CDI.KEYID = 6
1,514,788 UART: [ldev] SUBJECT.KEYID = 5
1,515,214 UART: [ldev] AUTHORITY.KEYID = 7
1,515,677 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,545,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,642 UART: [ldev] --
1,585,125 UART: [fwproc] Waiting for Commands...
1,585,952 UART: [fwproc] Received command 0x46574c44
1,586,743 UART: [fwproc] Received Image of size 114084 bytes
2,881,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,900 >>> mbox cmd response: success
3,072,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,074,054 UART: [afmc] ++
3,074,222 UART: [afmc] CDI.KEYID = 6
3,074,584 UART: [afmc] SUBJECT.KEYID = 7
3,075,009 UART: [afmc] AUTHORITY.KEYID = 5
3,109,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,290 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,070 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,683 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,373 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,184 UART: [afmc] --
3,153,232 UART: [cold-reset] --
3,154,046 UART: [state] Locking Datavault
3,155,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,715 UART: [state] Locking ICCM
3,156,145 UART: [exit] Launching FMC @ 0x40000130
3,161,474 UART:
3,161,490 UART: Running Caliptra FMC ...
3,161,898 UART:
3,161,952 UART: [state] CFI Enabled
3,172,701 UART: [fht] FMC Alias Private Key: 7
3,280,626 UART: [art] Extend RT PCRs Done
3,281,054 UART: [art] Lock RT PCRs Done
3,282,688 UART: [art] Populate DV Done
3,290,857 UART: [fht] FMC Alias Private Key: 7
3,291,847 UART: [art] Derive CDI
3,292,127 UART: [art] Store in in slot 0x4
3,377,910 UART: [art] Derive Key Pair
3,378,270 UART: [art] Store priv key in slot 0x5
3,391,446 UART: [art] Derive Key Pair - Done
3,406,474 UART: [art] Signing Cert with AUTHO
3,406,954 UART: RITY.KEYID = 7
3,421,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,457 UART: [art] PUB.X = 8DAAB39A774774046BE1246CCD71F9E297BB5F2E11F8C7FD698ACC3DE525A60DBFC5B2AF89112B6CD7F510ECA3D22F63
3,429,243 UART: [art] PUB.Y = B4370DB43F1F480A9A3424963FCB8297BAC82ECEF69FEC9BC83E43FD0AE8B505F4DEF46B60152595EA17CC63B5F70323
3,436,194 UART: [art] SIG.R = 006533120A4E12047841F4387E1D89615DE3B4D6F185BBFA7B1D7BE76CC0DD4F10D095D98E69327228B02978BC29AD4C
3,442,938 UART: [art] SIG.S = CE091077A9699F9E50AF00E04BDF18F8F633E0533399ED882AEE3574A5A8F1A091DC7DA4A01D138F800D2F2913D0FD07
3,466,810 UART: Caliptra RT
3,467,063 UART: [state] CFI Enabled
3,576,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,978 UART: [rt]cmd =0x54514754, len=24
3,609,109 >>> mbox cmd response data (8 bytes)
3,609,110 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,638,605 UART: [rt]cmd =0x47544744, len=8
3,641,033 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,863 ready_for_fw is high
1,362,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,808 >>> mbox cmd response: success
2,922,808 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,984,926 UART:
2,984,942 UART: Running Caliptra FMC ...
2,985,350 UART:
2,985,404 UART: [state] CFI Enabled
2,995,769 UART: [fht] FMC Alias Private Key: 7
3,103,530 UART: [art] Extend RT PCRs Done
3,103,958 UART: [art] Lock RT PCRs Done
3,105,386 UART: [art] Populate DV Done
3,113,635 UART: [fht] FMC Alias Private Key: 7
3,114,581 UART: [art] Derive CDI
3,114,861 UART: [art] Store in in slot 0x4
3,200,342 UART: [art] Derive Key Pair
3,200,702 UART: [art] Store priv key in slot 0x5
3,213,826 UART: [art] Derive Key Pair - Done
3,228,759 UART: [art] Signing Cert with AUTHO
3,229,239 UART: RITY.KEYID = 7
3,244,357 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,122 UART: [art] PUB.X = 72D4DF4ACCD4E6D75A9A16F963FF5DCCCC1B6467A883ADACDD5F971117701B94DD10A47C874FD52401F10AF4EA2595D3
3,251,906 UART: [art] PUB.Y = DA77A92CD87B42E2BBD9193AD17147649F77F083EE9EB2F29052A907FF5F48D284BA42D7DF4F293530FC7B566D1A1698
3,258,861 UART: [art] SIG.R = 64E90C93CCF1D1A5CD83D5650BB07B9F697BFF13ACE24528811F18AE21E20DB65AE504AE6B96D9E4B012827BB0F298CF
3,265,635 UART: [art] SIG.S = 235A2501CE28EA73B0163FC041B4EE863B0F39BAAD83AB2B41D3B117D4B0380256A40C1C9009F1B53294C5ECEDEEB55B
3,289,237 UART: Caliptra RT
3,289,490 UART: [state] CFI Enabled
3,397,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,466 UART: [rt]cmd =0x54514754, len=24
3,430,647 >>> mbox cmd response data (8 bytes)
3,430,648 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,951 UART: [rt]cmd =0x47544744, len=8
3,462,317 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,652 UART: [kat] SHA2-256
882,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,698 UART: [kat] ++
886,850 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,323 UART: [kat] LMS
1,475,519 UART: [kat] --
1,476,436 UART: [cold-reset] ++
1,476,830 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,757 UART: [idev] Erasing UDS.KEYID = 0
1,505,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,375 UART: [idev] --
1,515,536 UART: [ldev] ++
1,515,704 UART: [ldev] CDI.KEYID = 6
1,516,067 UART: [ldev] SUBJECT.KEYID = 5
1,516,493 UART: [ldev] AUTHORITY.KEYID = 7
1,516,956 UART: [ldev] FE.KEYID = 1
1,522,198 UART: [ldev] Erasing FE.KEYID = 1
1,547,723 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,879 UART: [ldev] --
1,587,232 UART: [fwproc] Waiting for Commands...
1,588,007 UART: [fwproc] Received command 0x46574c44
1,588,798 UART: [fwproc] Received Image of size 114084 bytes
2,884,098 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,448 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,403 >>> mbox cmd response: success
3,076,403 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,467 UART: [afmc] ++
3,077,635 UART: [afmc] CDI.KEYID = 6
3,077,997 UART: [afmc] SUBJECT.KEYID = 7
3,078,422 UART: [afmc] AUTHORITY.KEYID = 5
3,114,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,581 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,361 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,089 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,974 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,664 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,723 UART: [afmc] --
3,157,751 UART: [cold-reset] --
3,158,709 UART: [state] Locking Datavault
3,159,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,584 UART: [state] Locking ICCM
3,161,070 UART: [exit] Launching FMC @ 0x40000130
3,166,399 UART:
3,166,415 UART: Running Caliptra FMC ...
3,166,823 UART:
3,166,966 UART: [state] CFI Enabled
3,177,415 UART: [fht] FMC Alias Private Key: 7
3,285,386 UART: [art] Extend RT PCRs Done
3,285,814 UART: [art] Lock RT PCRs Done
3,287,356 UART: [art] Populate DV Done
3,295,623 UART: [fht] FMC Alias Private Key: 7
3,296,717 UART: [art] Derive CDI
3,296,997 UART: [art] Store in in slot 0x4
3,383,106 UART: [art] Derive Key Pair
3,383,466 UART: [art] Store priv key in slot 0x5
3,397,094 UART: [art] Derive Key Pair - Done
3,411,814 UART: [art] Signing Cert with AUTHO
3,412,294 UART: RITY.KEYID = 7
3,427,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,059 UART: [art] PUB.X = 2495A0B1F1F6633A08893F88F6DE1E7BB810E3E0E03B4929B9344FC76F8ADEB904E4B5EA9B969D60C216D73E8A57DDB2
3,434,835 UART: [art] PUB.Y = B8753589704207E691F433E82F86B0D7BF817C3FE5EEEC80E82D1DD373F215A915AE7A4C11AF67325315CDE48BE27661
3,441,786 UART: [art] SIG.R = A1EE51EA0302A06670CFCCF2FBE0DAA782C8888725B9D58D2AEA46B1E3C1029EAC653BCFE8F7A0609F6FC170ED921E33
3,448,569 UART: [art] SIG.S = 001DD1FD29C835EDDFF419CFE5B98A8940CEE8FB3D4AE047BE6085614CD1A7E15431B3F69F8540983292421691AD8939
3,472,452 UART: Caliptra RT
3,472,797 UART: [state] CFI Enabled
3,580,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,796 UART: [rt]cmd =0x54514754, len=24
3,614,209 >>> mbox cmd response data (8 bytes)
3,614,210 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,781 UART: [rt]cmd =0x47544744, len=8
3,646,469 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,448 ready_for_fw is high
1,363,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,027 >>> mbox cmd response: success
2,925,027 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,389 UART:
2,986,405 UART: Running Caliptra FMC ...
2,986,813 UART:
2,986,956 UART: [state] CFI Enabled
2,997,251 UART: [fht] FMC Alias Private Key: 7
3,105,216 UART: [art] Extend RT PCRs Done
3,105,644 UART: [art] Lock RT PCRs Done
3,107,178 UART: [art] Populate DV Done
3,115,361 UART: [fht] FMC Alias Private Key: 7
3,116,505 UART: [art] Derive CDI
3,116,785 UART: [art] Store in in slot 0x4
3,202,458 UART: [art] Derive Key Pair
3,202,818 UART: [art] Store priv key in slot 0x5
3,215,992 UART: [art] Derive Key Pair - Done
3,230,764 UART: [art] Signing Cert with AUTHO
3,231,244 UART: RITY.KEYID = 7
3,246,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,597 UART: [art] PUB.X = B823B4FDC408A23D3326081D7202F8A95BE283D72A889A5ED0E1F8A31AA4F842096D81EDFA53169EA176B402072000B7
3,254,329 UART: [art] PUB.Y = 30046F939D76F1B1D18CF0C766A44204E524EDF21C176BF8D5C42E53C86FF5F87BB857A2E20C3681A44B6E5C6C02F320
3,261,273 UART: [art] SIG.R = 0F7952D99904240347D91D8709B953310B724745E76C9EDD9A6B1EB41C79D3E56F405C92A496C6AE59FD63F94B778976
3,268,022 UART: [art] SIG.S = 1C247556E7F2722C77F1E94F247063FFD065BD8D8FAE967B7952431AD47C0672E46E835677F914EE273E95F5E7D3B908
3,291,563 UART: Caliptra RT
3,291,908 UART: [state] CFI Enabled
3,400,178 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,760 UART: [rt]cmd =0x54514754, len=24
3,432,883 >>> mbox cmd response data (8 bytes)
3,432,884 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,223 UART: [rt]cmd =0x47544744, len=8
3,464,613 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,761 UART: [kat] SHA2-256
903,701 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
917,688 UART: [kat] HMAC-384Kdf
922,284 UART: [kat] LMS
1,170,612 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,171,895 UART: [fht] FHT @ 0x50003400
1,174,586 UART: [idev] ++
1,174,754 UART: [idev] CDI.KEYID = 6
1,175,114 UART: [idev] SUBJECT.KEYID = 7
1,175,538 UART: [idev] UDS.KEYID = 0
1,175,883 ready_for_fw is high
1,175,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,534 UART: [idev] Erasing UDS.KEYID = 0
1,200,433 UART: [idev] Sha1 KeyId Algorithm
1,208,727 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,294 UART: [ldev] SUBJECT.KEYID = 5
1,210,720 UART: [ldev] AUTHORITY.KEYID = 7
1,211,183 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,544 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,030 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,617 >>> mbox cmd response: success
2,770,617 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,763 UART: [afmc] ++
2,771,931 UART: [afmc] CDI.KEYID = 6
2,772,293 UART: [afmc] SUBJECT.KEYID = 7
2,772,718 UART: [afmc] AUTHORITY.KEYID = 5
2,807,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,966 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,264 UART: [afmc] --
2,851,374 UART: [cold-reset] --
2,852,362 UART: [state] Locking Datavault
2,853,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,751 UART: [state] Locking ICCM
2,854,413 UART: [exit] Launching FMC @ 0x40000130
2,859,742 UART:
2,859,758 UART: Running Caliptra FMC ...
2,860,166 UART:
2,860,220 UART: [state] CFI Enabled
2,870,573 UART: [fht] FMC Alias Private Key: 7
2,978,226 UART: [art] Extend RT PCRs Done
2,978,654 UART: [art] Lock RT PCRs Done
2,979,848 UART: [art] Populate DV Done
2,988,053 UART: [fht] FMC Alias Private Key: 7
2,989,209 UART: [art] Derive CDI
2,989,489 UART: [art] Store in in slot 0x4
3,074,852 UART: [art] Derive Key Pair
3,075,212 UART: [art] Store priv key in slot 0x5
3,088,612 UART: [art] Derive Key Pair - Done
3,103,265 UART: [art] Signing Cert with AUTHO
3,103,745 UART: RITY.KEYID = 7
3,119,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,988 UART: [art] PUB.X = 1178E720F0B2DB668CCFB9B8029F74F0BF429EFA5389BC0503D6EACF78EB377531FA9B32391D88032CA158709A818150
3,126,750 UART: [art] PUB.Y = 91F51CC9D279B8CAFD06EEBC580BC2F0D294FA26495419AEA8A64326BDFDADB20AFB9A6AB8980962D473CE0F61240E89
3,133,702 UART: [art] SIG.R = CF08D961946514EA33693A5E92B9A508125F9AFA82D6A73625922E6119DC5E34596EC7898986BCDC4313B274A3672EE1
3,140,462 UART: [art] SIG.S = 532B8815CC6EA170DFC218B867DC935175BA71A2B2DD34C86ED32597CF4A78210FA80E4CFE168DA85F4E7BFDDD507711
3,164,227 UART: Caliptra RT
3,164,480 UART: [state] CFI Enabled
3,273,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,633 UART: [rt]cmd =0x54514754, len=24
3,305,626 >>> mbox cmd response data (8 bytes)
3,305,627 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,066 UART: [rt]cmd =0x47544744, len=8
3,337,622 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,709 ready_for_fw is high
1,060,709 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,428 >>> mbox cmd response: success
2,623,428 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,208 UART:
2,685,224 UART: Running Caliptra FMC ...
2,685,632 UART:
2,685,686 UART: [state] CFI Enabled
2,696,011 UART: [fht] FMC Alias Private Key: 7
2,803,812 UART: [art] Extend RT PCRs Done
2,804,240 UART: [art] Lock RT PCRs Done
2,805,802 UART: [art] Populate DV Done
2,814,147 UART: [fht] FMC Alias Private Key: 7
2,815,257 UART: [art] Derive CDI
2,815,537 UART: [art] Store in in slot 0x4
2,901,322 UART: [art] Derive Key Pair
2,901,682 UART: [art] Store priv key in slot 0x5
2,915,166 UART: [art] Derive Key Pair - Done
2,929,746 UART: [art] Signing Cert with AUTHO
2,930,226 UART: RITY.KEYID = 7
2,944,930 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,695 UART: [art] PUB.X = 616125BFFF7993C7E3402E9ECB28873BD4C2E018CAC8B11772F5F0E69FBBB2E7D26D1C2C2C174A5B8CD48A30369A17B4
2,952,479 UART: [art] PUB.Y = 636FBF96586D00AF9DF0F8BA21EA56BF704F621B3B16A0B3A613A76851B15757BE4A7E988181964A61A8101683C02185
2,959,405 UART: [art] SIG.R = 67E6BA2813CC50EF10DECEABB6638B09715970B711C5E19932406A115206AEF5F106553B822F2EE4371AC3EE22281961
2,966,166 UART: [art] SIG.S = 26849DF5D05B6BED6384D34C32452279DA529DB3017F214F145B82C5C063D4361665973636F8E419150BAED82A38978B
2,990,095 UART: Caliptra RT
2,990,348 UART: [state] CFI Enabled
3,097,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,323 UART: [rt]cmd =0x54514754, len=24
3,130,314 >>> mbox cmd response data (8 bytes)
3,130,315 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,870 UART: [rt]cmd =0x47544744, len=8
3,162,304 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
893,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,754 UART: [kat] ++
897,906 UART: [kat] sha1
902,310 UART: [kat] SHA2-256
904,250 UART: [kat] SHA2-384
906,867 UART: [kat] SHA2-512-ACC
908,768 UART: [kat] ECC-384
918,263 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,264 UART: [cold-reset] ++
1,172,782 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 ready_for_fw is high
1,176,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,556 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,580 UART: [ldev] --
1,284,065 UART: [fwproc] Wait for Commands...
1,284,785 UART: [fwproc] Recv command 0x46574c44
1,285,513 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,530 >>> mbox cmd response: success
2,773,530 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,684 UART: [afmc] ++
2,774,852 UART: [afmc] CDI.KEYID = 6
2,775,214 UART: [afmc] SUBJECT.KEYID = 7
2,775,639 UART: [afmc] AUTHORITY.KEYID = 5
2,811,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,025 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,919 UART: [afmc] --
2,854,803 UART: [cold-reset] --
2,855,669 UART: [state] Locking Datavault
2,856,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,490 UART: [state] Locking ICCM
2,858,032 UART: [exit] Launching FMC @ 0x40000130
2,863,361 UART:
2,863,377 UART: Running Caliptra FMC ...
2,863,785 UART:
2,863,928 UART: [state] CFI Enabled
2,874,421 UART: [fht] FMC Alias Private Key: 7
2,982,446 UART: [art] Extend RT PCRs Done
2,982,874 UART: [art] Lock RT PCRs Done
2,984,648 UART: [art] Populate DV Done
2,993,103 UART: [fht] FMC Alias Private Key: 7
2,994,275 UART: [art] Derive CDI
2,994,555 UART: [art] Store in in slot 0x4
3,080,084 UART: [art] Derive Key Pair
3,080,444 UART: [art] Store priv key in slot 0x5
3,094,022 UART: [art] Derive Key Pair - Done
3,108,693 UART: [art] Signing Cert with AUTHO
3,109,173 UART: RITY.KEYID = 7
3,125,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,790 UART: [art] PUB.X = 245B7E26CD7B82936BCE3AE2D32ED2AC64410AE4E317C6A98E3963D035C2E994CECDF0188991BFFA9C63EF8096110D80
3,132,566 UART: [art] PUB.Y = 6D88F11A56CA0FDBDCD2D3E72427E9E04EF1890F0680A21B4775CA6659873D554BBDA5982001CD3C5F958711115EBE58
3,139,510 UART: [art] SIG.R = 54AD6337AF5A17DB1B6711454452AE8DBB66EC5DD69A856232D31C777E93155355042CAA0D58295CBBF712A3FEB58E56
3,146,280 UART: [art] SIG.S = E3CFC08F7844A0CB043C8AB059A106263E793982058C24C9DCA4F20E931209D2C30568FCB43C7E598C81374AAE9900D8
3,169,957 UART: Caliptra RT
3,170,302 UART: [state] CFI Enabled
3,277,411 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,249 UART: [rt]cmd =0x54514754, len=24
3,310,148 >>> mbox cmd response data (8 bytes)
3,310,149 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,448 UART: [rt]cmd =0x47544744, len=8
3,342,152 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,314 ready_for_fw is high
1,061,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,207 >>> mbox cmd response: success
2,622,207 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,559 UART:
2,683,575 UART: Running Caliptra FMC ...
2,683,983 UART:
2,684,126 UART: [state] CFI Enabled
2,694,967 UART: [fht] FMC Alias Private Key: 7
2,803,150 UART: [art] Extend RT PCRs Done
2,803,578 UART: [art] Lock RT PCRs Done
2,805,096 UART: [art] Populate DV Done
2,813,315 UART: [fht] FMC Alias Private Key: 7
2,814,391 UART: [art] Derive CDI
2,814,671 UART: [art] Store in in slot 0x4
2,900,604 UART: [art] Derive Key Pair
2,900,964 UART: [art] Store priv key in slot 0x5
2,914,238 UART: [art] Derive Key Pair - Done
2,928,725 UART: [art] Signing Cert with AUTHO
2,929,205 UART: RITY.KEYID = 7
2,944,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,072 UART: [art] PUB.X = 5774A7CCBEEC7BF15C165AD098D1A40769A6ABA547DAF616ADF05BEC0CFBD45C984D8695F2B3943E54B1FB3DFA218C8C
2,951,862 UART: [art] PUB.Y = 97DA53444676842161C3D3FA035FAB8ECC0F8005B58AA211A6F586DFE1E211603596DFB3667E71C939ED71B5C2F9A882
2,958,807 UART: [art] SIG.R = C4AC0964241115D03040E5E16F1A79036AB62263B47B0873CBB90A5D2260F5B15497C0DAE585D63198613DE89D054CB1
2,965,558 UART: [art] SIG.S = FF4575B435EC381F599E2323BA9EF612335BCAD1E26F01CE043F85474F9B4499A3486CE78C456C7E516BD9BA763E30D5
2,989,425 UART: Caliptra RT
2,989,770 UART: [state] CFI Enabled
3,097,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,394 UART: [rt]cmd =0x54514754, len=24
3,130,661 >>> mbox cmd response data (8 bytes)
3,130,662 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,195 UART: [rt]cmd =0x47544744, len=8
3,162,455 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,071 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,174,491 ready_for_fw is high
1,174,491 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,955 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,209,020 UART: [ldev] ++
1,209,188 UART: [ldev] CDI.KEYID = 6
1,209,552 UART: [ldev] SUBJECT.KEYID = 5
1,209,979 UART: [ldev] AUTHORITY.KEYID = 7
1,210,442 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,094 UART: [ldev] --
1,280,594 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,905 >>> mbox cmd response: success
2,767,905 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,769,120 UART: [afmc] ++
2,769,288 UART: [afmc] CDI.KEYID = 6
2,769,651 UART: [afmc] SUBJECT.KEYID = 7
2,770,077 UART: [afmc] AUTHORITY.KEYID = 5
2,805,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,183 UART: [afmc] --
2,849,217 UART: [cold-reset] --
2,849,899 UART: [state] Locking Datavault
2,851,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,864 UART: [state] Locking ICCM
2,852,418 UART: [exit] Launching FMC @ 0x40000130
2,857,747 UART:
2,857,763 UART: Running Caliptra FMC ...
2,858,171 UART:
2,858,225 UART: [state] CFI Enabled
2,869,190 UART: [fht] FMC Alias Private Key: 7
2,976,309 UART: [art] Extend RT PCRs Done
2,976,737 UART: [art] Lock RT PCRs Done
2,978,249 UART: [art] Populate DV Done
2,986,470 UART: [fht] FMC Alias Private Key: 7
2,987,498 UART: [art] Derive CDI
2,987,778 UART: [art] Store in in slot 0x4
3,073,921 UART: [art] Derive Key Pair
3,074,281 UART: [art] Store priv key in slot 0x5
3,088,149 UART: [art] Derive Key Pair - Done
3,102,880 UART: [art] Signing Cert with AUTHO
3,103,360 UART: RITY.KEYID = 7
3,118,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,009 UART: [art] PUB.X = 9EB0FC078A0ED8E061B18F6E2A96B9DF184ABCE05FE3A9BB9D74A48112ECA9503376B68E1729D877AFE423B55483E667
3,125,785 UART: [art] PUB.Y = CFD904284D50AB7EADDAAC191530A70D932D4A8ABDA50E873FB257DD7986487FA71CC1073274DDE8FBFB9ADF2636F1D0
3,132,745 UART: [art] SIG.R = 3428E0DF80D9CE99B639927BF5191052F0D85BEAD670B7199BB7F9862EC94E1E42E82A5B0FA75FFC125CB8597C30A0D4
3,139,522 UART: [art] SIG.S = 79492B10F8B74AED89493743FE21792CDE59DE1A45E27E48CC8096AEFE09440F455AD6890B26B50E42353976098CB2F5
3,163,470 UART: Caliptra RT
3,163,723 UART: [state] CFI Enabled
3,272,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,198 UART: [rt]cmd =0x54514754, len=24
3,305,199 >>> mbox cmd response data (8 bytes)
3,305,200 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,623 UART: [rt]cmd =0x47544744, len=8
3,337,001 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,318 ready_for_fw is high
1,055,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,957 >>> mbox cmd response: success
2,618,957 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,239 UART:
2,681,255 UART: Running Caliptra FMC ...
2,681,663 UART:
2,681,717 UART: [state] CFI Enabled
2,692,336 UART: [fht] FMC Alias Private Key: 7
2,800,127 UART: [art] Extend RT PCRs Done
2,800,555 UART: [art] Lock RT PCRs Done
2,802,063 UART: [art] Populate DV Done
2,810,344 UART: [fht] FMC Alias Private Key: 7
2,811,492 UART: [art] Derive CDI
2,811,772 UART: [art] Store in in slot 0x4
2,897,533 UART: [art] Derive Key Pair
2,897,893 UART: [art] Store priv key in slot 0x5
2,911,399 UART: [art] Derive Key Pair - Done
2,926,243 UART: [art] Signing Cert with AUTHO
2,926,723 UART: RITY.KEYID = 7
2,941,951 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,716 UART: [art] PUB.X = 30B0DE9F522F088143C795C712456323BCA0F6E89661D7EC0B68F0EA9FA6EC963C3C9EE7055B8359A0953F7F930E3C32
2,949,478 UART: [art] PUB.Y = DB6A7A076B35497E15CE099833041ADD59AF3D0CAB4DDAC8131A5C71CF1A98D1E77EFDA8851B7014074A33590336B41C
2,956,420 UART: [art] SIG.R = 78F437638C4A93315DADAFEBA44507AAC6E7B07DC85131D9E61E229DAA64EACB347FED07BF8C03B82569B17B1A09CDFA
2,963,200 UART: [art] SIG.S = E06FE2D871EE2680C931AAAEF3596883E58E36754CF90770BD60F24486C52F94817AACE9D5CF8DBDC17B04B4F8D3E146
2,986,283 UART: Caliptra RT
2,986,536 UART: [state] CFI Enabled
3,094,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,305 UART: [rt]cmd =0x54514754, len=24
3,127,564 >>> mbox cmd response data (8 bytes)
3,127,565 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,764 UART: [rt]cmd =0x47544744, len=8
3,159,210 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,174,632 ready_for_fw is high
1,174,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,029 UART: [ldev] --
1,281,391 UART: [fwproc] Wait for Commands...
1,282,140 UART: [fwproc] Recv command 0x46574c44
1,282,873 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,524 >>> mbox cmd response: success
2,769,524 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,701 UART: [afmc] ++
2,770,869 UART: [afmc] CDI.KEYID = 6
2,771,232 UART: [afmc] SUBJECT.KEYID = 7
2,771,658 UART: [afmc] AUTHORITY.KEYID = 5
2,807,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,599 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,026 UART: [afmc] --
2,851,142 UART: [cold-reset] --
2,852,170 UART: [state] Locking Datavault
2,853,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,861 UART: [state] Locking ICCM
2,854,435 UART: [exit] Launching FMC @ 0x40000130
2,859,764 UART:
2,859,780 UART: Running Caliptra FMC ...
2,860,188 UART:
2,860,331 UART: [state] CFI Enabled
2,870,856 UART: [fht] FMC Alias Private Key: 7
2,978,999 UART: [art] Extend RT PCRs Done
2,979,427 UART: [art] Lock RT PCRs Done
2,981,253 UART: [art] Populate DV Done
2,989,362 UART: [fht] FMC Alias Private Key: 7
2,990,374 UART: [art] Derive CDI
2,990,654 UART: [art] Store in in slot 0x4
3,076,675 UART: [art] Derive Key Pair
3,077,035 UART: [art] Store priv key in slot 0x5
3,090,297 UART: [art] Derive Key Pair - Done
3,105,024 UART: [art] Signing Cert with AUTHO
3,105,504 UART: RITY.KEYID = 7
3,121,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,771 UART: [art] PUB.X = 20B8F12EEFB8F3645CA301099AB05FDBE2E4E452E0D9E43D4FA18881DD8C748135C5A203B2E80DF2DF2D601C189C3291
3,128,541 UART: [art] PUB.Y = 00FA3D11A18673C397E0C8C0936BA3F036B9CC2CDDAB80C928F798EB824375441B21EE61BC1FD909D83C65305236FB8C
3,135,474 UART: [art] SIG.R = 01B6343AA21C38FA6A16B5485ED35F4BFB5B0DBA133847B07D931312C9099E15942886202BDB50B0ADB8C1843F4113AE
3,142,239 UART: [art] SIG.S = E659A89F4AABF46D3D5321ECAFB317508404217888956146A7B8B6FF5C52610DEF3A808F7F259D43026A6C5DE246D3A0
3,165,933 UART: Caliptra RT
3,166,278 UART: [state] CFI Enabled
3,273,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,929 UART: [rt]cmd =0x54514754, len=24
3,306,222 >>> mbox cmd response data (8 bytes)
3,306,223 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,818 UART: [rt]cmd =0x47544744, len=8
3,338,398 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,605 ready_for_fw is high
1,056,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,400 >>> mbox cmd response: success
2,619,400 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,270 UART:
2,681,286 UART: Running Caliptra FMC ...
2,681,694 UART:
2,681,837 UART: [state] CFI Enabled
2,692,454 UART: [fht] FMC Alias Private Key: 7
2,799,983 UART: [art] Extend RT PCRs Done
2,800,411 UART: [art] Lock RT PCRs Done
2,802,077 UART: [art] Populate DV Done
2,810,028 UART: [fht] FMC Alias Private Key: 7
2,811,066 UART: [art] Derive CDI
2,811,346 UART: [art] Store in in slot 0x4
2,897,179 UART: [art] Derive Key Pair
2,897,539 UART: [art] Store priv key in slot 0x5
2,911,013 UART: [art] Derive Key Pair - Done
2,925,776 UART: [art] Signing Cert with AUTHO
2,926,256 UART: RITY.KEYID = 7
2,941,922 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,687 UART: [art] PUB.X = 809E5D2C179B47036F7902C290BE5F788C69F90EC1C90D5BB808AD1858003D38E431563CF17C1A784E2F82DDC3C1F933
2,949,422 UART: [art] PUB.Y = E7C85EDC148F9AC52DA7FE5B5B769EE44E68076913D7E42B64137E829247E010205B19031FF0CF3A576A069A74C8DC94
2,956,367 UART: [art] SIG.R = C1E60A8A9AE283B067C7424BA1AB84065CB61CD45E065FC86F127F352AA8D23FFF80D39BE424EE97510437740BF47757
2,963,128 UART: [art] SIG.S = DA6064406BB5602376A6D289141044BB5D77AD60518FAE456DDDD2B5D0E0B39E10301D5B5F1713373152F2C64B820198
2,987,276 UART: Caliptra RT
2,987,621 UART: [state] CFI Enabled
3,095,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,127 UART: [rt]cmd =0x54514754, len=24
3,128,164 >>> mbox cmd response data (8 bytes)
3,128,165 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,704 UART: [rt]cmd =0x47544744, len=8
3,160,054 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,034 writing to cptra_bootfsm_go
193,132 UART:
193,518 UART: Running Caliptra ROM ...
194,648 UART:
194,802 UART: [state] CFI Enabled
260,386 UART: [state] LifecycleState = Unprovisioned
262,306 UART: [state] DebugLocked = No
264,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,914 UART: [kat] SHA2-256
439,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,177 UART: [kat] ++
450,709 UART: [kat] sha1
462,020 UART: [kat] SHA2-256
464,747 UART: [kat] SHA2-384
470,235 UART: [kat] SHA2-512-ACC
472,599 UART: [kat] ECC-384
2,768,918 UART: [kat] HMAC-384Kdf
2,801,080 UART: [kat] LMS
3,991,407 UART: [kat] --
3,995,834 UART: [cold-reset] ++
3,997,982 UART: [fht] Storing FHT @ 0x50003400
4,009,904 UART: [idev] ++
4,010,510 UART: [idev] CDI.KEYID = 6
4,011,428 UART: [idev] SUBJECT.KEYID = 7
4,012,675 UART: [idev] UDS.KEYID = 0
4,013,710 ready_for_fw is high
4,013,908 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,843 UART: [idev] Erasing UDS.KEYID = 0
7,346,911 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,905 UART: [idev] --
7,371,770 UART: [ldev] ++
7,372,353 UART: [ldev] CDI.KEYID = 6
7,373,321 UART: [ldev] SUBJECT.KEYID = 5
7,374,553 UART: [ldev] AUTHORITY.KEYID = 7
7,375,787 UART: [ldev] FE.KEYID = 1
7,401,391 UART: [ldev] Erasing FE.KEYID = 1
10,732,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,196 UART: [ldev] --
13,095,462 UART: [fwproc] Waiting for Commands...
13,097,881 UART: [fwproc] Received command 0x46574c44
13,100,066 UART: [fwproc] Received Image of size 113760 bytes
17,149,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,609,195 >>> mbox cmd response: success
17,609,738 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,613,580 UART: [afmc] ++
17,614,179 UART: [afmc] CDI.KEYID = 6
17,615,091 UART: [afmc] SUBJECT.KEYID = 7
17,616,313 UART: [afmc] AUTHORITY.KEYID = 5
20,989,354 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,255 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,569 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,361 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,772 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,778 UART: [afmc] --
23,361,393 UART: [cold-reset] --
23,363,930 UART: [state] Locking Datavault
23,368,364 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,127 UART: [state] Locking ICCM
23,372,156 UART: [exit] Launching FMC @ 0x40000130
23,380,525 UART:
23,380,765 UART: Running Caliptra FMC ...
23,381,867 UART:
23,382,052 UART: [state] CFI Enabled
23,450,653 UART: [fht] FMC Alias Private Key: 7
25,789,270 UART: [art] Extend RT PCRs Done
25,790,569 UART: [art] Lock RT PCRs Done
25,792,170 UART: [art] Populate DV Done
25,797,476 UART: [fht] FMC Alias Private Key: 7
25,799,012 UART: [art] Derive CDI
25,799,799 UART: [art] Store in in slot 0x4
25,859,627 UART: [art] Derive Key Pair
25,860,672 UART: [art] Store priv key in slot 0x5
29,137,595 UART: [art] Derive Key Pair - Done
29,150,764 UART: [art] Signing Cert with AUTHO
29,152,137 UART: RITY.KEYID = 7
31,445,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,806 UART: [art] PUB.X = F43778377EF2FF91D6EE2CE66F58B6975F2B5C9659B82AF6F74E1160E62A97D8F4EAB02FDAAF8988EFBFFB239A941344
31,454,567 UART: [art] PUB.Y = E791CFCBA619AEB86C7D73304BC5CDEE72345904DE695214632D5CE718754D12294DD69E7A894AA44EFCACDF38A047A6
31,461,798 UART: [art] SIG.R = F6B08EC8C7BA35F922C2A450CB1AC7355B3BCBCAAF99B4E618759E97154E6186C838966F995A0C4800EACFE803D8E098
31,469,193 UART: [art] SIG.S = B5587675743F5EE364AAEA3489D6137D941147A2366CBB8106F787A3530315B44E92840812BD7413E818C1BC9ECE6210
32,774,323 UART: Caliptra RT
32,775,050 UART: [state] CFI Enabled
32,943,555 UART: [rt] RT listening for mailbox commands...
32,975,181 UART: [rt]cmd =0x54514754, len=24
32,977,743 >>> mbox cmd response data (8 bytes)
32,979,022 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,009,365 UART: [rt]cmd =0x44504543, len=36
33,046,485 >>> mbox cmd response data (24 bytes)
33,047,171 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,077,167 UART: [rt]cmd =0x47544744, len=8
33,079,247 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,807,676 ready_for_fw is high
3,808,077 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,865,690 >>> mbox cmd response: success
17,866,394 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,567,070 UART:
23,567,467 UART: Running Caliptra FMC ...
23,568,601 UART:
23,568,758 UART: [state] CFI Enabled
23,637,614 UART: [fht] FMC Alias Private Key: 7
25,975,030 UART: [art] Extend RT PCRs Done
25,976,259 UART: [art] Lock RT PCRs Done
25,977,995 UART: [art] Populate DV Done
25,983,520 UART: [fht] FMC Alias Private Key: 7
25,985,059 UART: [art] Derive CDI
25,985,898 UART: [art] Store in in slot 0x4
26,046,112 UART: [art] Derive Key Pair
26,047,157 UART: [art] Store priv key in slot 0x5
29,339,866 UART: [art] Derive Key Pair - Done
29,352,551 UART: [art] Signing Cert with AUTHO
29,353,857 UART: RITY.KEYID = 7
31,641,966 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,479 UART: [art] PUB.X = A7231B4B672ACFF9835B8068E5D8DF91793FD79EDB145DECB03A0BD175D392D42596BB7BB0D82BE3CE4FAF3112A91F8B
31,650,743 UART: [art] PUB.Y = FA3D3A7DFA8766C243D3C3FCB5D14E730F9F21F8BB70CED4FC95AF31F5657E533CEF746093F99CAFAD1DB7EB3BCB8DED
31,658,043 UART: [art] SIG.R = 4521001B4B913CB8020FA46DAE9D3582FD73CFE7DF1F266B8AB9090CDFD37C17FCD3CA8BAE8FEEA30535CA437C0EDB48
31,665,446 UART: [art] SIG.S = 5B71A32FBA0B82C1C330EDB9B4C192D16F88DA815020F5634E7A2BE2929B3485C005E5208AA34E46F2719B88678487BA
32,970,914 UART: Caliptra RT
32,971,627 UART: [state] CFI Enabled
33,133,214 UART: [rt] RT listening for mailbox commands...
33,164,789 UART: [rt]cmd =0x54514754, len=24
33,167,490 >>> mbox cmd response data (8 bytes)
33,168,335 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,198,157 UART: [rt]cmd =0x44504543, len=36
33,234,900 >>> mbox cmd response data (24 bytes)
33,235,621 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,265,456 UART: [rt]cmd =0x47544744, len=8
33,267,237 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
192,900 UART:
193,268 UART: Running Caliptra ROM ...
194,455 UART:
604,026 UART: [state] CFI Enabled
619,701 UART: [state] LifecycleState = Unprovisioned
621,643 UART: [state] DebugLocked = No
623,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,082 UART: [kat] SHA2-256
797,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,336 UART: [kat] ++
808,812 UART: [kat] sha1
821,526 UART: [kat] SHA2-256
824,247 UART: [kat] SHA2-384
829,759 UART: [kat] SHA2-512-ACC
832,163 UART: [kat] ECC-384
3,118,685 UART: [kat] HMAC-384Kdf
3,130,945 UART: [kat] LMS
4,321,080 UART: [kat] --
4,325,217 UART: [cold-reset] ++
4,326,938 UART: [fht] Storing FHT @ 0x50003400
4,338,058 UART: [idev] ++
4,338,627 UART: [idev] CDI.KEYID = 6
4,339,652 UART: [idev] SUBJECT.KEYID = 7
4,340,820 UART: [idev] UDS.KEYID = 0
4,341,892 ready_for_fw is high
4,342,117 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,079 UART: [idev] Erasing UDS.KEYID = 0
7,628,379 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,039 UART: [idev] --
7,653,172 UART: [ldev] ++
7,653,795 UART: [ldev] CDI.KEYID = 6
7,654,772 UART: [ldev] SUBJECT.KEYID = 5
7,655,944 UART: [ldev] AUTHORITY.KEYID = 7
7,657,223 UART: [ldev] FE.KEYID = 1
7,669,214 UART: [ldev] Erasing FE.KEYID = 1
10,957,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,976 UART: [ldev] --
13,316,625 UART: [fwproc] Waiting for Commands...
13,319,912 UART: [fwproc] Received command 0x46574c44
13,322,094 UART: [fwproc] Received Image of size 113760 bytes
17,371,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,110 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,835,376 >>> mbox cmd response: success
17,835,944 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,838,703 UART: [afmc] ++
17,839,290 UART: [afmc] CDI.KEYID = 6
17,840,257 UART: [afmc] SUBJECT.KEYID = 7
17,841,407 UART: [afmc] AUTHORITY.KEYID = 5
21,155,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,272 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,540 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,913 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,747 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,228 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,258 UART: [afmc] --
23,520,290 UART: [cold-reset] --
23,524,472 UART: [state] Locking Datavault
23,531,228 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,929 UART: [state] Locking ICCM
23,534,338 UART: [exit] Launching FMC @ 0x40000130
23,542,737 UART:
23,542,972 UART: Running Caliptra FMC ...
23,544,067 UART:
23,544,229 UART: [state] CFI Enabled
23,552,117 UART: [fht] FMC Alias Private Key: 7
25,883,008 UART: [art] Extend RT PCRs Done
25,884,246 UART: [art] Lock RT PCRs Done
25,885,977 UART: [art] Populate DV Done
25,891,279 UART: [fht] FMC Alias Private Key: 7
25,892,758 UART: [art] Derive CDI
25,893,512 UART: [art] Store in in slot 0x4
25,936,044 UART: [art] Derive Key Pair
25,937,044 UART: [art] Store priv key in slot 0x5
29,179,988 UART: [art] Derive Key Pair - Done
29,193,043 UART: [art] Signing Cert with AUTHO
29,194,370 UART: RITY.KEYID = 7
31,473,520 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,036 UART: [art] PUB.X = BFBD5CF98F12CD38F63C95A6AE5B4B6091B94364CF978D0751EEAFD9B01F986814F20B6E75B4B64B6D1921FF2CB29BDB
31,482,316 UART: [art] PUB.Y = 74EA9650FF5BDF7EC06EA6E20BC62FBAE7B01C10FACBCD505AFB9B85E311EFF2016E52933A1DC9C660645FE315AF3F4C
31,489,573 UART: [art] SIG.R = DCA34C1AE5A0B3785C31FB07F72D76525D5688B21613B19CF5BE5AF438F27E7265682CCB60774BE7CFC62940C917F598
31,496,933 UART: [art] SIG.S = 5F9479B3ADACFB25A36D797BF2911E5F33C30809A9C8E7399611422B74CA3A90F5A5464F7EF2FDD05702C5905B086C0D
32,802,765 UART: Caliptra RT
32,803,479 UART: [state] CFI Enabled
32,921,210 UART: [rt] RT listening for mailbox commands...
32,952,623 UART: [rt]cmd =0x54514754, len=24
32,955,044 >>> mbox cmd response data (8 bytes)
32,956,046 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
32,986,159 UART: [rt]cmd =0x44504543, len=36
33,023,376 >>> mbox cmd response data (24 bytes)
33,024,023 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,053,859 UART: [rt]cmd =0x47544744, len=8
33,055,716 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
4,122,992 ready_for_fw is high
4,123,393 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,060,909 >>> mbox cmd response: success
18,061,527 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,701,246 UART:
23,701,633 UART: Running Caliptra FMC ...
23,702,724 UART:
23,702,871 UART: [state] CFI Enabled
23,710,880 UART: [fht] FMC Alias Private Key: 7
26,041,824 UART: [art] Extend RT PCRs Done
26,043,058 UART: [art] Lock RT PCRs Done
26,044,712 UART: [art] Populate DV Done
26,049,973 UART: [fht] FMC Alias Private Key: 7
26,051,589 UART: [art] Derive CDI
26,052,326 UART: [art] Store in in slot 0x4
26,094,978 UART: [art] Derive Key Pair
26,095,978 UART: [art] Store priv key in slot 0x5
29,338,334 UART: [art] Derive Key Pair - Done
29,351,606 UART: [art] Signing Cert with AUTHO
29,352,907 UART: RITY.KEYID = 7
31,632,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,537 UART: [art] PUB.X = A71F0699EEE844AD99F2BFBE28FE8DA6396C1EA7FD6149FDC2FC6CCB8928816D680F9331B733DF8785F806CB144C8688
31,640,791 UART: [art] PUB.Y = 56AAEC9E2C35D8DC41EFDB36436804F443DB0C78AA1AED364D34E06AD6573F6599D5FA2986360087B2B55014F6D37CA9
31,647,981 UART: [art] SIG.R = 1499378771C0296D9590812B2F5460B6FCE7DAACCDE2373A6C2768682EE7D46666AFBE0640D3EB269B001C1F9353F7D3
31,655,367 UART: [art] SIG.S = AFBFB0DAB736C645D6F96EBD33112BB4892E1DFEABF0571DE069AE774C353B9CB5F691C60B51E058AA4E0CB1D0F70A6F
32,960,200 UART: Caliptra RT
32,960,904 UART: [state] CFI Enabled
33,077,815 UART: [rt] RT listening for mailbox commands...
33,109,067 UART: [rt]cmd =0x54514754, len=24
33,111,566 >>> mbox cmd response data (8 bytes)
33,112,407 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,142,397 UART: [rt]cmd =0x44504543, len=36
33,180,066 >>> mbox cmd response data (24 bytes)
33,180,758 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,210,372 UART: [rt]cmd =0x47544744, len=8
33,211,994 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,705 UART:
193,074 UART: Running Caliptra ROM ...
194,272 UART:
194,434 UART: [state] CFI Enabled
262,468 UART: [state] LifecycleState = Unprovisioned
264,387 UART: [state] DebugLocked = No
266,011 UART: [state] WD Timer not started. Device not locked for debugging
269,196 UART: [kat] SHA2-256
448,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,908 UART: [kat] ++
460,442 UART: [kat] sha1
470,684 UART: [kat] SHA2-256
473,710 UART: [kat] SHA2-384
480,554 UART: [kat] SHA2-512-ACC
483,558 UART: [kat] ECC-384
2,946,766 UART: [kat] HMAC-384Kdf
2,971,024 UART: [kat] LMS
3,500,420 UART: [kat] --
3,506,261 UART: [cold-reset] ++
3,508,624 UART: [fht] FHT @ 0x50003400
3,519,666 UART: [idev] ++
3,520,228 UART: [idev] CDI.KEYID = 6
3,521,154 UART: [idev] SUBJECT.KEYID = 7
3,522,324 UART: [idev] UDS.KEYID = 0
3,523,313 ready_for_fw is high
3,523,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,037 UART: [idev] Erasing UDS.KEYID = 0
6,026,783 UART: [idev] Sha1 KeyId Algorithm
6,049,744 UART: [idev] --
6,052,869 UART: [ldev] ++
6,053,437 UART: [ldev] CDI.KEYID = 6
6,054,369 UART: [ldev] SUBJECT.KEYID = 5
6,055,524 UART: [ldev] AUTHORITY.KEYID = 7
6,056,808 UART: [ldev] FE.KEYID = 1
6,098,310 UART: [ldev] Erasing FE.KEYID = 1
8,602,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,650 UART: [ldev] --
10,413,373 UART: [fwproc] Wait for Commands...
10,414,868 UART: [fwproc] Recv command 0x46574c44
10,416,954 UART: [fwproc] Recv'd Img size: 114084 bytes
13,815,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,540 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,278,175 >>> mbox cmd response: success
14,278,700 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,281,766 UART: [afmc] ++
14,282,365 UART: [afmc] CDI.KEYID = 6
14,283,246 UART: [afmc] SUBJECT.KEYID = 7
14,284,399 UART: [afmc] AUTHORITY.KEYID = 5
16,823,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,980 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,617 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,455 UART: [afmc] --
18,625,570 UART: [cold-reset] --
18,629,218 UART: [state] Locking Datavault
18,635,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,749 UART: [state] Locking ICCM
18,638,518 UART: [exit] Launching FMC @ 0x40000130
18,646,910 UART:
18,647,149 UART: Running Caliptra FMC ...
18,648,244 UART:
18,648,400 UART: [state] CFI Enabled
18,709,108 UART: [fht] FMC Alias Private Key: 7
20,473,708 UART: [art] Extend RT PCRs Done
20,474,937 UART: [art] Lock RT PCRs Done
20,476,781 UART: [art] Populate DV Done
20,482,349 UART: [fht] FMC Alias Private Key: 7
20,483,827 UART: [art] Derive CDI
20,484,588 UART: [art] Store in in slot 0x4
20,542,857 UART: [art] Derive Key Pair
20,543,893 UART: [art] Store priv key in slot 0x5
23,007,050 UART: [art] Derive Key Pair - Done
23,020,336 UART: [art] Signing Cert with AUTHO
23,021,828 UART: RITY.KEYID = 7
24,732,427 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,928 UART: [art] PUB.X = 8B812D08751ED8F26A54EFD21995D075A86A7CD59305CE09860F34A22BB608FEFB2ACCA4FCFE470B01CCB37475913590
24,741,217 UART: [art] PUB.Y = 819B5E3E42CCDD801F7F28D23F77FDDCAE44D94A6BAB2C6B5684F05956389E6675B094EA70EF3616384DE9B438C7C75E
24,748,489 UART: [art] SIG.R = 22E0D45A2867B43668FFEF470566578260F661EB688C77FF19D79F8DDE798879548DD613B511A4864A780ED9C0A22396
24,755,820 UART: [art] SIG.S = 0F7829C6198AA6DBBE39737E5B8E13F642848875C694349B6DF90E9015364B0F66EE56F3FB2CD17D101659ED0FBA04A7
25,734,811 UART: Caliptra RT
25,735,516 UART: [state] CFI Enabled
25,899,656 UART: [rt] RT listening for mailbox commands...
25,930,934 UART: [rt]cmd =0x54514754, len=24
25,933,527 >>> mbox cmd response data (8 bytes)
25,934,539 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,964,834 UART: [rt]cmd =0x44504543, len=36
26,002,067 >>> mbox cmd response data (24 bytes)
26,002,741 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,032,352 UART: [rt]cmd =0x47544744, len=8
26,034,412 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
3,382,615 ready_for_fw is high
3,383,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,085,849 >>> mbox cmd response: success
14,086,564 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,386,340 UART:
18,386,733 UART: Running Caliptra FMC ...
18,387,836 UART:
18,387,989 UART: [state] CFI Enabled
18,453,251 UART: [fht] FMC Alias Private Key: 7
20,216,696 UART: [art] Extend RT PCRs Done
20,217,916 UART: [art] Lock RT PCRs Done
20,219,565 UART: [art] Populate DV Done
20,224,882 UART: [fht] FMC Alias Private Key: 7
20,226,525 UART: [art] Derive CDI
20,227,260 UART: [art] Store in in slot 0x4
20,285,140 UART: [art] Derive Key Pair
20,286,171 UART: [art] Store priv key in slot 0x5
22,748,709 UART: [art] Derive Key Pair - Done
22,761,655 UART: [art] Signing Cert with AUTHO
22,762,960 UART: RITY.KEYID = 7
24,474,248 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,752 UART: [art] PUB.X = B9A98EAA258649C46E5BD08A89B1DA6FAEE61B506BEB0B133FF44E47A4A9A4192E5E8A1993E2BE96FD6A69C800AF69DE
24,483,070 UART: [art] PUB.Y = 6F8512D7AB6612FEE341742B97BC48EC637B39724CD5000E9D6C56BFB16F559841B923B03608DEF44B480CD3DC66DB98
24,490,293 UART: [art] SIG.R = 312F82F4090BF4A8947286F9FF94AA9C6556C6FC574F6E7C21105BDCABB446BF7441981E723B3A17E8F683205725C8A5
24,497,663 UART: [art] SIG.S = 5D3CB4840502026F665B1E2A56599DFF8FA30DD3159C9E6A634705F842EE20B31D0C92CA860550A1FE14173030E72284
25,476,913 UART: Caliptra RT
25,477,623 UART: [state] CFI Enabled
25,641,989 UART: [rt] RT listening for mailbox commands...
25,673,448 UART: [rt]cmd =0x54514754, len=24
25,676,399 >>> mbox cmd response data (8 bytes)
25,677,589 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,707,827 UART: [rt]cmd =0x44504543, len=36
25,744,697 >>> mbox cmd response data (24 bytes)
25,745,365 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,775,249 UART: [rt]cmd =0x47544744, len=8
25,777,411 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,899 writing to cptra_bootfsm_go
192,982 UART:
193,348 UART: Running Caliptra ROM ...
194,489 UART:
604,084 UART: [state] CFI Enabled
617,809 UART: [state] LifecycleState = Unprovisioned
619,678 UART: [state] DebugLocked = No
621,479 UART: [state] WD Timer not started. Device not locked for debugging
625,879 UART: [kat] SHA2-256
805,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,613 UART: [kat] ++
817,147 UART: [kat] sha1
826,817 UART: [kat] SHA2-256
829,889 UART: [kat] SHA2-384
836,657 UART: [kat] SHA2-512-ACC
839,603 UART: [kat] ECC-384
3,279,294 UART: [kat] HMAC-384Kdf
3,292,397 UART: [kat] LMS
3,821,871 UART: [kat] --
3,824,894 UART: [cold-reset] ++
3,826,781 UART: [fht] FHT @ 0x50003400
3,837,120 UART: [idev] ++
3,837,684 UART: [idev] CDI.KEYID = 6
3,838,673 UART: [idev] SUBJECT.KEYID = 7
3,839,847 UART: [idev] UDS.KEYID = 0
3,840,770 ready_for_fw is high
3,840,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,341 UART: [idev] Erasing UDS.KEYID = 0
6,312,678 UART: [idev] Sha1 KeyId Algorithm
6,335,853 UART: [idev] --
6,339,140 UART: [ldev] ++
6,339,706 UART: [ldev] CDI.KEYID = 6
6,340,619 UART: [ldev] SUBJECT.KEYID = 5
6,341,828 UART: [ldev] AUTHORITY.KEYID = 7
6,343,061 UART: [ldev] FE.KEYID = 1
6,353,922 UART: [ldev] Erasing FE.KEYID = 1
8,827,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,543 UART: [ldev] --
10,619,657 UART: [fwproc] Wait for Commands...
10,621,268 UART: [fwproc] Recv command 0x46574c44
10,623,360 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,482,488 >>> mbox cmd response: success
14,483,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,487,024 UART: [afmc] ++
14,487,625 UART: [afmc] CDI.KEYID = 6
14,488,530 UART: [afmc] SUBJECT.KEYID = 7
14,489,701 UART: [afmc] AUTHORITY.KEYID = 5
16,994,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,398 UART: [afmc] --
18,792,753 UART: [cold-reset] --
18,796,395 UART: [state] Locking Datavault
18,801,368 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,073 UART: [state] Locking ICCM
18,804,900 UART: [exit] Launching FMC @ 0x40000130
18,813,304 UART:
18,813,542 UART: Running Caliptra FMC ...
18,814,668 UART:
18,814,830 UART: [state] CFI Enabled
18,822,987 UART: [fht] FMC Alias Private Key: 7
20,580,099 UART: [art] Extend RT PCRs Done
20,581,329 UART: [art] Lock RT PCRs Done
20,582,978 UART: [art] Populate DV Done
20,588,550 UART: [fht] FMC Alias Private Key: 7
20,590,206 UART: [art] Derive CDI
20,590,947 UART: [art] Store in in slot 0x4
20,633,494 UART: [art] Derive Key Pair
20,634,534 UART: [art] Store priv key in slot 0x5
23,061,770 UART: [art] Derive Key Pair - Done
23,074,825 UART: [art] Signing Cert with AUTHO
23,076,134 UART: RITY.KEYID = 7
24,781,947 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,442 UART: [art] PUB.X = D547099F6390EF6A99682D32595CF113585A0FE6AB2E267644FCEE1CFD5C889CFCD46594DA6AB6D05FE90DE71D3603EE
24,790,739 UART: [art] PUB.Y = 5D929AB94242BAADEA3AA869E6AB2F4F98E15F472B635DDBECFDED9DD5C471291AF1779D53E732821A5AD607102A21F8
24,797,999 UART: [art] SIG.R = 44CF0F96601CF799F028AC56A87876FACD082FF7F53E9FC40C00BECEAFB10CF7499F656A89BA627F0A6085875EAEAFCB
24,805,429 UART: [art] SIG.S = 557716FF94BE39BAAE68B1767E5640E242202C7FACF0BF8CD2C0C6B0D8B9DDAAED20F46F844034B89A06D47CF4F1B8A5
25,784,686 UART: Caliptra RT
25,785,386 UART: [state] CFI Enabled
25,902,869 UART: [rt] RT listening for mailbox commands...
25,934,392 UART: [rt]cmd =0x54514754, len=24
25,936,708 >>> mbox cmd response data (8 bytes)
25,937,750 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,967,678 UART: [rt]cmd =0x44504543, len=36
26,005,134 >>> mbox cmd response data (24 bytes)
26,005,757 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,035,590 UART: [rt]cmd =0x47544744, len=8
26,037,635 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,921 writing to cptra_bootfsm_go
3,698,844 ready_for_fw is high
3,699,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,262,903 >>> mbox cmd response: success
14,263,750 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,508,622 UART:
18,509,034 UART: Running Caliptra FMC ...
18,510,226 UART:
18,510,396 UART: [state] CFI Enabled
18,517,910 UART: [fht] FMC Alias Private Key: 7
20,275,010 UART: [art] Extend RT PCRs Done
20,276,239 UART: [art] Lock RT PCRs Done
20,277,866 UART: [art] Populate DV Done
20,283,332 UART: [fht] FMC Alias Private Key: 7
20,284,936 UART: [art] Derive CDI
20,285,758 UART: [art] Store in in slot 0x4
20,328,149 UART: [art] Derive Key Pair
20,329,189 UART: [art] Store priv key in slot 0x5
22,755,903 UART: [art] Derive Key Pair - Done
22,769,121 UART: [art] Signing Cert with AUTHO
22,770,425 UART: RITY.KEYID = 7
24,476,113 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,606 UART: [art] PUB.X = 18A947871A9774D559A1EE2986A25D0AC3B28BC382C6F3F9DC82A0F5E93AB06D40FDCD3BE773121F3C42DF8CF76A7788
24,484,876 UART: [art] PUB.Y = 04A628C0ADEE5D8FDBB1D37390A5059271EBD0D971D2B7743733A77189910040D83BCA08B02D7AB57844EE37CABE2098
24,492,151 UART: [art] SIG.R = D388C1BEE1E3A686C33265962FD9201ABD995948A4521C9A94677A468E72029FB9D2C9A4F42810FBA4B014C37AAC4EC6
24,499,524 UART: [art] SIG.S = B8BB1C53285ED496278D5E56873C9A3D7A8C194A3D2CB56579EFB764851F0B76C72A7DC3D962BE368175D50796044333
25,478,422 UART: Caliptra RT
25,479,133 UART: [state] CFI Enabled
25,596,694 UART: [rt] RT listening for mailbox commands...
25,628,215 UART: [rt]cmd =0x54514754, len=24
25,630,802 >>> mbox cmd response data (8 bytes)
25,631,719 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,661,935 UART: [rt]cmd =0x44504543, len=36
25,699,182 >>> mbox cmd response data (24 bytes)
25,699,813 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,729,475 UART: [rt]cmd =0x47544744, len=8
25,731,420 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
192,582 UART:
192,956 UART: Running Caliptra ROM ...
194,147 UART:
194,300 UART: [state] CFI Enabled
264,415 UART: [state] LifecycleState = Unprovisioned
266,775 UART: [state] DebugLocked = No
269,092 UART: [state] WD Timer not started. Device not locked for debugging
274,429 UART: [kat] SHA2-256
464,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,112 UART: [kat] ++
475,556 UART: [kat] sha1
486,765 UART: [kat] SHA2-256
489,814 UART: [kat] SHA2-384
494,245 UART: [kat] SHA2-512-ACC
496,827 UART: [kat] ECC-384
2,946,926 UART: [kat] HMAC-384Kdf
2,970,161 UART: [kat] LMS
3,501,894 UART: [kat] --
3,506,764 UART: [cold-reset] ++
3,507,766 UART: [fht] FHT @ 0x50003400
3,520,541 UART: [idev] ++
3,521,295 UART: [idev] CDI.KEYID = 6
3,522,178 UART: [idev] SUBJECT.KEYID = 7
3,523,423 UART: [idev] UDS.KEYID = 0
3,524,322 ready_for_fw is high
3,524,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,905 UART: [idev] Erasing UDS.KEYID = 0
6,027,172 UART: [idev] Sha1 KeyId Algorithm
6,049,379 UART: [idev] --
6,053,859 UART: [ldev] ++
6,054,589 UART: [ldev] CDI.KEYID = 6
6,055,476 UART: [ldev] SUBJECT.KEYID = 5
6,056,684 UART: [ldev] AUTHORITY.KEYID = 7
6,057,824 UART: [ldev] FE.KEYID = 1
6,097,862 UART: [ldev] Erasing FE.KEYID = 1
8,607,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,040 UART: [ldev] --
10,414,747 UART: [fwproc] Wait for Commands...
10,416,467 UART: [fwproc] Recv command 0x46574c44
10,418,827 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,597,425 >>> mbox cmd response: success
14,597,985 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,600,750 UART: [afmc] ++
14,601,446 UART: [afmc] CDI.KEYID = 6
14,602,633 UART: [afmc] SUBJECT.KEYID = 7
14,604,128 UART: [afmc] AUTHORITY.KEYID = 5
17,146,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,425 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,881 UART: [afmc] --
18,949,119 UART: [cold-reset] --
18,953,587 UART: [state] Locking Datavault
18,958,527 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,724 UART: [state] Locking ICCM
18,963,758 UART: [exit] Launching FMC @ 0x40000130
18,972,394 UART:
18,972,633 UART: Running Caliptra FMC ...
18,973,730 UART:
18,973,886 UART: [state] CFI Enabled
19,030,707 UART: [fht] FMC Alias Private Key: 7
20,795,232 UART: [art] Extend RT PCRs Done
20,796,442 UART: [art] Lock RT PCRs Done
20,797,929 UART: [art] Populate DV Done
20,803,126 UART: [fht] FMC Alias Private Key: 7
20,804,809 UART: [art] Derive CDI
20,805,641 UART: [art] Store in in slot 0x4
20,863,790 UART: [art] Derive Key Pair
20,864,788 UART: [art] Store priv key in slot 0x5
23,327,872 UART: [art] Derive Key Pair - Done
23,340,754 UART: [art] Signing Cert with AUTHO
23,342,042 UART: RITY.KEYID = 7
25,053,599 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,120 UART: [art] PUB.X = 49BF19CF7C046A271111D98F144EAE37B8E598A4F08FA8C8B3F4448BEFB554283447E25929C04D4CEF98A3B7A73B359F
25,062,329 UART: [art] PUB.Y = B692B902E01F6CE2FD4CC449A9BA7621184D8B8B0F73B3D7505FF4A6EAC88CED78FD0ACAF1F6DC01B1BEBF008224E2B5
25,069,635 UART: [art] SIG.R = E252750BDDB3005C795EE72BA5DF85CD5DBB8B61D3363908A95CEE14245EF12C442BD8D3FECAA527AB73FF55F017E29E
25,077,003 UART: [art] SIG.S = CD957DF4E58C3A1C07DE8421BEFCE8A990F4A0C2C63FD2564A2FED1782735F8F35F7BA7D38D73C209FB66F84320D0E6E
26,056,029 UART: Caliptra RT
26,056,726 UART: [state] CFI Enabled
26,222,144 UART: [rt] RT listening for mailbox commands...
26,253,760 UART: [rt]cmd =0x54514754, len=24
26,256,426 >>> mbox cmd response data (8 bytes)
26,257,359 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,287,327 UART: [rt]cmd =0x44504543, len=36
26,324,292 >>> mbox cmd response data (24 bytes)
26,324,950 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,354,619 UART: [rt]cmd =0x47544744, len=8
26,356,399 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,419,586 ready_for_fw is high
3,420,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,700,565 >>> mbox cmd response: success
14,701,278 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,983,359 UART:
18,983,749 UART: Running Caliptra FMC ...
18,984,936 UART:
18,985,106 UART: [state] CFI Enabled
19,051,005 UART: [fht] FMC Alias Private Key: 7
20,815,364 UART: [art] Extend RT PCRs Done
20,816,580 UART: [art] Lock RT PCRs Done
20,818,479 UART: [art] Populate DV Done
20,823,947 UART: [fht] FMC Alias Private Key: 7
20,825,609 UART: [art] Derive CDI
20,826,427 UART: [art] Store in in slot 0x4
20,884,695 UART: [art] Derive Key Pair
20,885,691 UART: [art] Store priv key in slot 0x5
23,348,800 UART: [art] Derive Key Pair - Done
23,362,018 UART: [art] Signing Cert with AUTHO
23,363,345 UART: RITY.KEYID = 7
25,075,167 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,684 UART: [art] PUB.X = 8DAF8C11F1A51B6BD261CF6E577F23FD3ABA4C5B1E5F1FA0D7B273B8AE7B89525EC10D63F4A135503FB28818058F8282
25,083,969 UART: [art] PUB.Y = DE5912F14BBD2C889016E98D046F43ECEE39648FDD46E8959A02B128977EF02E45AA95B03FAD69E0284F50BE4BCC5B43
25,091,188 UART: [art] SIG.R = F0452627A04BBA19616E67002B437B789204423EEF8292879BC724F707778CCDDD1887C240911A1660C44721ADFAF7C1
25,098,517 UART: [art] SIG.S = C8753EA89E05C599F90A82A9D3D3313C4D9FA655A052BB0D7B3EFE2FB3F8A4334DEFD2726B349EBA0C770F1A711124B7
26,077,306 UART: Caliptra RT
26,078,036 UART: [state] CFI Enabled
26,242,923 UART: [rt] RT listening for mailbox commands...
26,274,530 UART: [rt]cmd =0x54514754, len=24
26,277,319 >>> mbox cmd response data (8 bytes)
26,278,308 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,308,228 UART: [rt]cmd =0x44504543, len=36
26,345,790 >>> mbox cmd response data (24 bytes)
26,346,453 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,376,340 UART: [rt]cmd =0x47544744, len=8
26,378,362 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
192,811 UART:
193,193 UART: Running Caliptra ROM ...
194,331 UART:
604,023 UART: [state] CFI Enabled
619,197 UART: [state] LifecycleState = Unprovisioned
621,577 UART: [state] DebugLocked = No
623,811 UART: [state] WD Timer not started. Device not locked for debugging
628,412 UART: [kat] SHA2-256
818,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,075 UART: [kat] ++
829,535 UART: [kat] sha1
840,532 UART: [kat] SHA2-256
843,490 UART: [kat] SHA2-384
848,634 UART: [kat] SHA2-512-ACC
851,285 UART: [kat] ECC-384
3,296,336 UART: [kat] HMAC-384Kdf
3,308,713 UART: [kat] LMS
3,840,530 UART: [kat] --
3,844,736 UART: [cold-reset] ++
3,846,809 UART: [fht] FHT @ 0x50003400
3,857,997 UART: [idev] ++
3,858,716 UART: [idev] CDI.KEYID = 6
3,859,625 UART: [idev] SUBJECT.KEYID = 7
3,860,869 UART: [idev] UDS.KEYID = 0
3,861,769 ready_for_fw is high
3,861,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,424 UART: [idev] Erasing UDS.KEYID = 0
6,339,922 UART: [idev] Sha1 KeyId Algorithm
6,363,961 UART: [idev] --
6,367,666 UART: [ldev] ++
6,368,356 UART: [ldev] CDI.KEYID = 6
6,369,269 UART: [ldev] SUBJECT.KEYID = 5
6,370,430 UART: [ldev] AUTHORITY.KEYID = 7
6,371,665 UART: [ldev] FE.KEYID = 1
6,382,584 UART: [ldev] Erasing FE.KEYID = 1
8,862,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,596 UART: [ldev] --
10,652,471 UART: [fwproc] Wait for Commands...
10,654,457 UART: [fwproc] Recv command 0x46574c44
10,656,769 UART: [fwproc] Recv'd Img size: 114084 bytes
14,101,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,835,086 >>> mbox cmd response: success
14,835,643 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,838,610 UART: [afmc] ++
14,839,303 UART: [afmc] CDI.KEYID = 6
14,840,494 UART: [afmc] SUBJECT.KEYID = 7
14,841,996 UART: [afmc] AUTHORITY.KEYID = 5
17,342,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,554 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,559 UART: [afmc] --
19,140,371 UART: [cold-reset] --
19,144,516 UART: [state] Locking Datavault
19,150,681 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,612 UART: [state] Locking ICCM
19,154,832 UART: [exit] Launching FMC @ 0x40000130
19,163,515 UART:
19,163,761 UART: Running Caliptra FMC ...
19,164,867 UART:
19,165,031 UART: [state] CFI Enabled
19,173,054 UART: [fht] FMC Alias Private Key: 7
20,929,843 UART: [art] Extend RT PCRs Done
20,931,051 UART: [art] Lock RT PCRs Done
20,932,572 UART: [art] Populate DV Done
20,937,947 UART: [fht] FMC Alias Private Key: 7
20,939,539 UART: [art] Derive CDI
20,940,356 UART: [art] Store in in slot 0x4
20,982,568 UART: [art] Derive Key Pair
20,983,571 UART: [art] Store priv key in slot 0x5
23,410,698 UART: [art] Derive Key Pair - Done
23,423,430 UART: [art] Signing Cert with AUTHO
23,424,738 UART: RITY.KEYID = 7
25,130,074 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,571 UART: [art] PUB.X = 93B072C48A965A67724D3D689421A162DF5F28F30CF378C637A4DA41CABD8604BA0DAE1CC82C23047138836DDBE29BAE
25,138,894 UART: [art] PUB.Y = 2D737C29779698D244ADE3A14F199FD90C39B5C7D2831D97BF754EBAEACA8D585C691456AFEB7B71E8C648A1F574A7BA
25,146,151 UART: [art] SIG.R = 0F6D48A2D54DD152B50AB18B8C3FCD149655962A210A402BF9944A22A18473F6DCDEA45D02E294644D56C29157833F5B
25,153,550 UART: [art] SIG.S = 471F86BA714AAA457F242D5A0C090D32790A0A10EA69086578E6287B07A3E77A462A8F1949EE5789E58B086EFD0FA66C
26,132,717 UART: Caliptra RT
26,133,425 UART: [state] CFI Enabled
26,250,434 UART: [rt] RT listening for mailbox commands...
26,282,182 UART: [rt]cmd =0x54514754, len=24
26,284,581 >>> mbox cmd response data (8 bytes)
26,285,406 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,315,514 UART: [rt]cmd =0x44504543, len=36
26,353,016 >>> mbox cmd response data (24 bytes)
26,353,703 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,383,479 UART: [rt]cmd =0x47544744, len=8
26,385,479 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
3,751,913 ready_for_fw is high
3,752,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,953,765 >>> mbox cmd response: success
14,954,409 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,209,728 UART:
19,210,118 UART: Running Caliptra FMC ...
19,211,315 UART:
19,211,476 UART: [state] CFI Enabled
19,219,327 UART: [fht] FMC Alias Private Key: 7
20,976,621 UART: [art] Extend RT PCRs Done
20,977,842 UART: [art] Lock RT PCRs Done
20,979,531 UART: [art] Populate DV Done
20,984,968 UART: [fht] FMC Alias Private Key: 7
20,986,465 UART: [art] Derive CDI
20,987,230 UART: [art] Store in in slot 0x4
21,029,985 UART: [art] Derive Key Pair
21,030,992 UART: [art] Store priv key in slot 0x5
23,457,724 UART: [art] Derive Key Pair - Done
23,470,280 UART: [art] Signing Cert with AUTHO
23,471,586 UART: RITY.KEYID = 7
25,176,971 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,491 UART: [art] PUB.X = 1C959986A2CDFF5E5B3CB41AB5BD16D9C0DE62B5568AA9AD860FC08DAF68F61C6F8F8D0E1D7076DD88CB79BE74805E9D
25,185,789 UART: [art] PUB.Y = 112C1125821A8212705BD1F9500C3780F3685894FD811C5BF51C22162BBE35E298D76B19982710CD1ECEBE30E533642D
25,193,018 UART: [art] SIG.R = D95D1E14C0BEF2CE5992BA08039FD9AB16F73BD66E9D2D7168876C1D7BE8EC17AFE136B58D1DB1426935270AD5BD0D27
25,200,452 UART: [art] SIG.S = 6FE8CE574C48E46CF6EDB7862F078EAE73D698EA7800F90B3C1CED2A6290CF25374BAFF685C9AA9063D8DE76EA1A9B71
26,178,932 UART: Caliptra RT
26,179,628 UART: [state] CFI Enabled
26,296,039 UART: [rt] RT listening for mailbox commands...
26,327,579 UART: [rt]cmd =0x54514754, len=24
26,330,165 >>> mbox cmd response data (8 bytes)
26,331,190 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,361,121 UART: [rt]cmd =0x44504543, len=36
26,398,201 >>> mbox cmd response data (24 bytes)
26,398,828 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,428,554 UART: [rt]cmd =0x47544744, len=8
26,430,530 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,937 UART: [kat] SHA2-256
892,875 UART: [kat] SHA2-384
895,776 UART: [kat] SHA2-512-ACC
897,677 UART: [kat] ECC-384
903,434 UART: [kat] HMAC-384Kdf
908,044 UART: [kat] LMS
1,476,240 UART: [kat] --
1,477,141 UART: [cold-reset] ++
1,477,713 UART: [fht] Storing FHT @ 0x50003400
1,480,572 UART: [idev] ++
1,480,740 UART: [idev] CDI.KEYID = 6
1,481,100 UART: [idev] SUBJECT.KEYID = 7
1,481,524 UART: [idev] UDS.KEYID = 0
1,481,869 ready_for_fw is high
1,481,869 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,460 UART: [idev] Erasing UDS.KEYID = 0
1,505,626 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,248 UART: [idev] --
1,515,345 UART: [ldev] ++
1,515,513 UART: [ldev] CDI.KEYID = 6
1,515,876 UART: [ldev] SUBJECT.KEYID = 5
1,516,302 UART: [ldev] AUTHORITY.KEYID = 7
1,516,765 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,547,200 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,236 UART: [ldev] --
1,586,627 UART: [fwproc] Waiting for Commands...
1,587,454 UART: [fwproc] Received command 0x46574c44
1,588,245 UART: [fwproc] Received Image of size 114084 bytes
2,883,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,276 >>> mbox cmd response: success
3,075,276 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,372 UART: [afmc] ++
3,076,540 UART: [afmc] CDI.KEYID = 6
3,076,902 UART: [afmc] SUBJECT.KEYID = 7
3,077,327 UART: [afmc] AUTHORITY.KEYID = 5
3,112,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,926 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,319 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,009 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,792 UART: [afmc] --
3,155,832 UART: [cold-reset] --
3,156,510 UART: [state] Locking Datavault
3,157,753 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,357 UART: [state] Locking ICCM
3,158,997 UART: [exit] Launching FMC @ 0x40000130
3,164,326 UART:
3,164,342 UART: Running Caliptra FMC ...
3,164,750 UART:
3,164,804 UART: [state] CFI Enabled
3,175,293 UART: [fht] FMC Alias Private Key: 7
3,283,472 UART: [art] Extend RT PCRs Done
3,283,900 UART: [art] Lock RT PCRs Done
3,285,380 UART: [art] Populate DV Done
3,293,567 UART: [fht] FMC Alias Private Key: 7
3,294,637 UART: [art] Derive CDI
3,294,917 UART: [art] Store in in slot 0x4
3,381,296 UART: [art] Derive Key Pair
3,381,656 UART: [art] Store priv key in slot 0x5
3,394,968 UART: [art] Derive Key Pair - Done
3,409,907 UART: [art] Signing Cert with AUTHO
3,410,387 UART: RITY.KEYID = 7
3,425,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,634 UART: [art] PUB.X = E327BC0908BB3401CEE67FC2CE02356C55F8280B5A3C3B179F40F04B14BC4F5B3F4EB0AA48DA090ABB72B5046A2A8F8A
3,433,398 UART: [art] PUB.Y = 98045F93DEACA3DD1D5FBA6F9FAC7D9271435CA434DAC32D65D09248ED9B8581E39BBD16A3C56BD2382CC967D8FF2E78
3,440,365 UART: [art] SIG.R = CABBCC09CEC9636F63382D3DB9F4CCD3B410B4D95B588B13AA33EF4BDDF430E098B1D24A99043B74DA7C45768817C288
3,447,145 UART: [art] SIG.S = D83388069F23A482B9BB3B82A380B63C651BEECE70F92C77F9EA9B83FB055BFAAD30BDC6A1ECFD9CBC11306FFAC646FF
3,471,160 UART: Caliptra RT
3,471,413 UART: [state] CFI Enabled
3,580,185 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,943 UART: [rt]cmd =0x54514754, len=24
3,613,042 >>> mbox cmd response data (8 bytes)
3,613,043 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,522 UART: [rt]cmd =0x44504543, len=36
3,680,749 >>> mbox cmd response data (24 bytes)
3,680,750 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,135 UART: [rt]cmd =0x47544744, len=8
3,711,606 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,168 >>> mbox cmd response: success
2,925,168 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,552 UART:
2,986,568 UART: Running Caliptra FMC ...
2,986,976 UART:
2,987,030 UART: [state] CFI Enabled
2,997,647 UART: [fht] FMC Alias Private Key: 7
3,105,366 UART: [art] Extend RT PCRs Done
3,105,794 UART: [art] Lock RT PCRs Done
3,107,228 UART: [art] Populate DV Done
3,115,321 UART: [fht] FMC Alias Private Key: 7
3,116,415 UART: [art] Derive CDI
3,116,695 UART: [art] Store in in slot 0x4
3,202,596 UART: [art] Derive Key Pair
3,202,956 UART: [art] Store priv key in slot 0x5
3,215,816 UART: [art] Derive Key Pair - Done
3,230,664 UART: [art] Signing Cert with AUTHO
3,231,144 UART: RITY.KEYID = 7
3,246,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,925 UART: [art] PUB.X = 22DB98D61EA1E7352DA75C76DD925F36DB99A66F82577EA434422CE124039D36EB29C5C54D490A96BD3926CC2852A792
3,253,691 UART: [art] PUB.Y = 67BE32F1CCD9DD3002EC6890479C998BD81B04A48380BD715CE0871A830A13C9229292690EC0529AD6A9E1A73516D0A0
3,260,629 UART: [art] SIG.R = C942EEDDCB1B3487393CC55348412E806442E01C6E10964E875BBF96DF3508EE4F219887BF536C026B01F64C7638EFF3
3,267,392 UART: [art] SIG.S = 7E01D9BE29ED44851790ED317FFBD63FC8B18028D328BE280984B3228CEF45253EA17E7E80561C1BB5FC8012B365717A
3,291,347 UART: Caliptra RT
3,291,600 UART: [state] CFI Enabled
3,398,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,821 UART: [rt]cmd =0x54514754, len=24
3,432,002 >>> mbox cmd response data (8 bytes)
3,432,003 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,462 UART: [rt]cmd =0x44504543, len=36
3,500,017 >>> mbox cmd response data (24 bytes)
3,500,018 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,429 UART: [rt]cmd =0x47544744, len=8
3,531,298 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,887 UART: [kat] SHA2-512-ACC
897,788 UART: [kat] ECC-384
903,551 UART: [kat] HMAC-384Kdf
908,253 UART: [kat] LMS
1,476,449 UART: [kat] --
1,477,350 UART: [cold-reset] ++
1,477,912 UART: [fht] Storing FHT @ 0x50003400
1,480,773 UART: [idev] ++
1,480,941 UART: [idev] CDI.KEYID = 6
1,481,301 UART: [idev] SUBJECT.KEYID = 7
1,481,725 UART: [idev] UDS.KEYID = 0
1,482,070 ready_for_fw is high
1,482,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,797 UART: [idev] Erasing UDS.KEYID = 0
1,507,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,995 UART: [idev] --
1,517,018 UART: [ldev] ++
1,517,186 UART: [ldev] CDI.KEYID = 6
1,517,549 UART: [ldev] SUBJECT.KEYID = 5
1,517,975 UART: [ldev] AUTHORITY.KEYID = 7
1,518,438 UART: [ldev] FE.KEYID = 1
1,523,858 UART: [ldev] Erasing FE.KEYID = 1
1,549,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,447 UART: [ldev] --
1,588,756 UART: [fwproc] Waiting for Commands...
1,589,605 UART: [fwproc] Received command 0x46574c44
1,590,396 UART: [fwproc] Received Image of size 114084 bytes
2,886,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,078,503 >>> mbox cmd response: success
3,078,503 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,643 UART: [afmc] ++
3,079,811 UART: [afmc] CDI.KEYID = 6
3,080,173 UART: [afmc] SUBJECT.KEYID = 7
3,080,598 UART: [afmc] AUTHORITY.KEYID = 5
3,115,513 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,264 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,954 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,801 UART: [afmc] --
3,158,875 UART: [cold-reset] --
3,159,563 UART: [state] Locking Datavault
3,160,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,162 UART: [state] Locking ICCM
3,161,606 UART: [exit] Launching FMC @ 0x40000130
3,166,935 UART:
3,166,951 UART: Running Caliptra FMC ...
3,167,359 UART:
3,167,502 UART: [state] CFI Enabled
3,177,869 UART: [fht] FMC Alias Private Key: 7
3,286,100 UART: [art] Extend RT PCRs Done
3,286,528 UART: [art] Lock RT PCRs Done
3,287,980 UART: [art] Populate DV Done
3,296,233 UART: [fht] FMC Alias Private Key: 7
3,297,367 UART: [art] Derive CDI
3,297,647 UART: [art] Store in in slot 0x4
3,383,278 UART: [art] Derive Key Pair
3,383,638 UART: [art] Store priv key in slot 0x5
3,396,652 UART: [art] Derive Key Pair - Done
3,411,264 UART: [art] Signing Cert with AUTHO
3,411,744 UART: RITY.KEYID = 7
3,426,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,675 UART: [art] PUB.X = AC76FEFF73169C80F0CB349A62F2695E2E671C3E5D8C121B6CD837212EBFFE7AC1851C87B6AB21B95167308DD02066B4
3,434,455 UART: [art] PUB.Y = 9B29BAFC3F7FFACA97BFA75D703F3BE40CE8A66228DBF44FFE6D95A391CB1444D3CFF1FE68FF522F1C865129A0F1121A
3,441,428 UART: [art] SIG.R = 9BC1EBEBC6F2D14C3AAB26935D023CD9E4B438B40095FB88878547123EB2977B4525E1888C1039BE04ECD00CAE28E80B
3,448,174 UART: [art] SIG.S = A8920B74BE09E5FA77202EBE44522FE2C8B13625D9A715C9106B161CBA31DD8BBF22587F67604EF32A2DAD2C15E1847B
3,472,463 UART: Caliptra RT
3,472,808 UART: [state] CFI Enabled
3,581,054 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,610 UART: [rt]cmd =0x54514754, len=24
3,613,817 >>> mbox cmd response data (8 bytes)
3,613,818 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,183 UART: [rt]cmd =0x44504543, len=36
3,681,646 >>> mbox cmd response data (24 bytes)
3,681,647 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,872 UART: [rt]cmd =0x47544744, len=8
3,712,443 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,548 ready_for_fw is high
1,362,548 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,929 >>> mbox cmd response: success
2,924,929 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,325 UART:
2,987,341 UART: Running Caliptra FMC ...
2,987,749 UART:
2,987,892 UART: [state] CFI Enabled
2,998,507 UART: [fht] FMC Alias Private Key: 7
3,106,452 UART: [art] Extend RT PCRs Done
3,106,880 UART: [art] Lock RT PCRs Done
3,108,280 UART: [art] Populate DV Done
3,116,749 UART: [fht] FMC Alias Private Key: 7
3,117,737 UART: [art] Derive CDI
3,118,017 UART: [art] Store in in slot 0x4
3,203,514 UART: [art] Derive Key Pair
3,203,874 UART: [art] Store priv key in slot 0x5
3,217,720 UART: [art] Derive Key Pair - Done
3,232,413 UART: [art] Signing Cert with AUTHO
3,232,893 UART: RITY.KEYID = 7
3,248,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,804 UART: [art] PUB.X = 60AD4612354ACAF4734DF08C81BD20A835849CD18EDEACD93917E5246DD56532B7DBFF07B3B5D3077E180428A2D50366
3,255,568 UART: [art] PUB.Y = 47B5780EBF0C17720A4AAC11746EA52DA323097222DF1CFB8E633C1EAFB250FE6F1F1B0264B8EC193130136FDCB61F0D
3,262,514 UART: [art] SIG.R = F59AD346A2856FF0D95F72F11E94B3B52FA7978F0CFE407D6E9CB197466D037344359A1E1869CF65355D4D6C9F22F7A1
3,269,282 UART: [art] SIG.S = ECF1F58C7D737E44784D4EDA9C7A8B6147EFE9C6DAD55433A99B3F6C4AA64CB8604C02C2077E08EA2C2D57435C0DA2C5
3,293,083 UART: Caliptra RT
3,293,428 UART: [state] CFI Enabled
3,401,658 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,656 UART: [rt]cmd =0x54514754, len=24
3,434,759 >>> mbox cmd response data (8 bytes)
3,434,760 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,381 UART: [rt]cmd =0x44504543, len=36
3,501,162 >>> mbox cmd response data (24 bytes)
3,501,163 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,324 UART: [rt]cmd =0x47544744, len=8
3,531,811 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,468 UART: [kat] SHA2-512-ACC
908,369 UART: [kat] ECC-384
917,874 UART: [kat] HMAC-384Kdf
922,480 UART: [kat] LMS
1,170,808 UART: [kat] --
1,171,599 UART: [cold-reset] ++
1,172,101 UART: [fht] FHT @ 0x50003400
1,174,688 UART: [idev] ++
1,174,856 UART: [idev] CDI.KEYID = 6
1,175,216 UART: [idev] SUBJECT.KEYID = 7
1,175,640 UART: [idev] UDS.KEYID = 0
1,175,985 ready_for_fw is high
1,175,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,623 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,433 UART: [ldev] ++
1,210,601 UART: [ldev] CDI.KEYID = 6
1,210,964 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,217,163 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,340 UART: [fwproc] Wait for Commands...
1,283,094 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,997 >>> mbox cmd response: success
2,770,997 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,113 UART: [afmc] ++
2,772,281 UART: [afmc] CDI.KEYID = 6
2,772,643 UART: [afmc] SUBJECT.KEYID = 7
2,773,068 UART: [afmc] AUTHORITY.KEYID = 5
2,808,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,780 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,393 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,970 UART: [afmc] --
2,851,874 UART: [cold-reset] --
2,852,734 UART: [state] Locking Datavault
2,853,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,569 UART: [state] Locking ICCM
2,855,201 UART: [exit] Launching FMC @ 0x40000130
2,860,530 UART:
2,860,546 UART: Running Caliptra FMC ...
2,860,954 UART:
2,861,008 UART: [state] CFI Enabled
2,871,279 UART: [fht] FMC Alias Private Key: 7
2,978,992 UART: [art] Extend RT PCRs Done
2,979,420 UART: [art] Lock RT PCRs Done
2,981,210 UART: [art] Populate DV Done
2,989,407 UART: [fht] FMC Alias Private Key: 7
2,990,347 UART: [art] Derive CDI
2,990,627 UART: [art] Store in in slot 0x4
3,076,088 UART: [art] Derive Key Pair
3,076,448 UART: [art] Store priv key in slot 0x5
3,089,186 UART: [art] Derive Key Pair - Done
3,104,143 UART: [art] Signing Cert with AUTHO
3,104,623 UART: RITY.KEYID = 7
3,120,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,820 UART: [art] PUB.X = 6E13EF3F81E0ACC770292D478967C593D02AE96C77677D46307536EFF45F9A0772CADDB331C293833C06ABBA17D13DF8
3,127,590 UART: [art] PUB.Y = EF839B202438E4E38A4559FAAC7017788B8BC623394AB3C2428F1706553A054CD42F5DD3433B8D3D0BC13359A6274B75
3,134,529 UART: [art] SIG.R = 4D209C4154E281D8DAE7412510364B10C43D3547DDBCA0DC8972D5F1B08FB2A934A44984542ED9772EF8ECBCC5CB5E64
3,141,309 UART: [art] SIG.S = 0729D752C681B641A27D7FDDA8C586E35FD5388FAC3B0FA54662E53E83A0789FCB10682357F731F31C3E14098DBD9CD0
3,165,287 UART: Caliptra RT
3,165,540 UART: [state] CFI Enabled
3,273,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,251 UART: [rt]cmd =0x54514754, len=24
3,306,472 >>> mbox cmd response data (8 bytes)
3,306,473 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,052 UART: [rt]cmd =0x44504543, len=36
3,374,153 >>> mbox cmd response data (24 bytes)
3,374,154 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,427 UART: [rt]cmd =0x47544744, len=8
3,405,152 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,549 ready_for_fw is high
1,060,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,806 >>> mbox cmd response: success
2,621,806 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,280 UART:
2,683,296 UART: Running Caliptra FMC ...
2,683,704 UART:
2,683,758 UART: [state] CFI Enabled
2,694,691 UART: [fht] FMC Alias Private Key: 7
2,803,214 UART: [art] Extend RT PCRs Done
2,803,642 UART: [art] Lock RT PCRs Done
2,804,992 UART: [art] Populate DV Done
2,812,905 UART: [fht] FMC Alias Private Key: 7
2,814,055 UART: [art] Derive CDI
2,814,335 UART: [art] Store in in slot 0x4
2,900,074 UART: [art] Derive Key Pair
2,900,434 UART: [art] Store priv key in slot 0x5
2,913,350 UART: [art] Derive Key Pair - Done
2,928,348 UART: [art] Signing Cert with AUTHO
2,928,828 UART: RITY.KEYID = 7
2,944,258 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,023 UART: [art] PUB.X = 24D116398D9B02B6685850A91F1D9BD7B88BBE191CB6AA35FC077F9315EA276EAE91FB5B2F0254DAA2AAFE34288E6D33
2,951,798 UART: [art] PUB.Y = 68469EB6A76DE58D4678A804D6FEB489BCCBF3033094EE1ED284C3736039F015FCF851D895610F5D6AED19E154502672
2,958,741 UART: [art] SIG.R = 82D0C227F5ACDA27F5F5A28AAE8B7FF33A99C750CA3040BE2BA179EC421281CB7075AB9A1E9279C175FF59E660DFFCDD
2,965,533 UART: [art] SIG.S = 13EDC470CA1B70601C9CEDC5A085D1B9F133A71A4D5922247259BB8DCE3832B7E151D62A12EFEB4040DEECD8DA269194
2,990,024 UART: Caliptra RT
2,990,277 UART: [state] CFI Enabled
3,097,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,236 UART: [rt]cmd =0x54514754, len=24
3,130,505 >>> mbox cmd response data (8 bytes)
3,130,506 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,959 UART: [rt]cmd =0x44504543, len=36
3,197,950 >>> mbox cmd response data (24 bytes)
3,197,951 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,074 UART: [rt]cmd =0x47544744, len=8
3,228,625 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,159 UART: [kat] SHA2-256
893,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,934 UART: [kat] ++
898,086 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,443 UART: [kat] LMS
1,171,771 UART: [kat] --
1,172,914 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,035 UART: [idev] ++
1,176,203 UART: [idev] CDI.KEYID = 6
1,176,563 UART: [idev] SUBJECT.KEYID = 7
1,176,987 UART: [idev] UDS.KEYID = 0
1,177,332 ready_for_fw is high
1,177,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,250 UART: [ldev] ++
1,211,418 UART: [ldev] CDI.KEYID = 6
1,211,781 UART: [ldev] SUBJECT.KEYID = 5
1,212,207 UART: [ldev] AUTHORITY.KEYID = 7
1,212,670 UART: [ldev] FE.KEYID = 1
1,217,516 UART: [ldev] Erasing FE.KEYID = 1
1,244,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,570 UART: [ldev] --
1,283,953 UART: [fwproc] Wait for Commands...
1,284,591 UART: [fwproc] Recv command 0x46574c44
1,285,319 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,258 >>> mbox cmd response: success
2,771,258 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,490 UART: [afmc] ++
2,772,658 UART: [afmc] CDI.KEYID = 6
2,773,020 UART: [afmc] SUBJECT.KEYID = 7
2,773,445 UART: [afmc] AUTHORITY.KEYID = 5
2,809,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,806 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,283 UART: [afmc] --
2,852,261 UART: [cold-reset] --
2,853,019 UART: [state] Locking Datavault
2,854,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,674 UART: [state] Locking ICCM
2,855,266 UART: [exit] Launching FMC @ 0x40000130
2,860,595 UART:
2,860,611 UART: Running Caliptra FMC ...
2,861,019 UART:
2,861,162 UART: [state] CFI Enabled
2,872,019 UART: [fht] FMC Alias Private Key: 7
2,980,014 UART: [art] Extend RT PCRs Done
2,980,442 UART: [art] Lock RT PCRs Done
2,981,870 UART: [art] Populate DV Done
2,989,795 UART: [fht] FMC Alias Private Key: 7
2,990,749 UART: [art] Derive CDI
2,991,029 UART: [art] Store in in slot 0x4
3,077,054 UART: [art] Derive Key Pair
3,077,414 UART: [art] Store priv key in slot 0x5
3,091,158 UART: [art] Derive Key Pair - Done
3,105,872 UART: [art] Signing Cert with AUTHO
3,106,352 UART: RITY.KEYID = 7
3,121,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,365 UART: [art] PUB.X = 225B84CA33CEB6A709213566AA3C8CD9BD20E0FB3FDAB3052D285A52FA709534F0E88EF21097CF9BDD281F4CEC869565
3,129,143 UART: [art] PUB.Y = BD985625F5BE724A0A025FDA5195636D8E631359CD67F6C30E4A31A3D997E0CFA5FCAE7C70DCEAEC29D29AA58E7F9DE5
3,136,106 UART: [art] SIG.R = E1DC35595F89ECAAC0C0FE9494B7B7C643D410750A20738E8D9748A2FE1E22BF0A081F6FB3759B61CAE4D54AEC9AE6F4
3,142,885 UART: [art] SIG.S = 194078A9A9693C38515E2584523BED60869DDD61775B314C09996A5F43A574B6ECB857725A9AB629B952B617CFF6483E
3,166,617 UART: Caliptra RT
3,166,962 UART: [state] CFI Enabled
3,274,295 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,735 UART: [rt]cmd =0x54514754, len=24
3,306,922 >>> mbox cmd response data (8 bytes)
3,306,923 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,520 UART: [rt]cmd =0x44504543, len=36
3,374,453 >>> mbox cmd response data (24 bytes)
3,374,454 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,581 UART: [rt]cmd =0x47544744, len=8
3,405,366 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,087 >>> mbox cmd response: success
2,624,087 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,587 UART:
2,686,603 UART: Running Caliptra FMC ...
2,687,011 UART:
2,687,154 UART: [state] CFI Enabled
2,697,711 UART: [fht] FMC Alias Private Key: 7
2,805,500 UART: [art] Extend RT PCRs Done
2,805,928 UART: [art] Lock RT PCRs Done
2,807,424 UART: [art] Populate DV Done
2,815,589 UART: [fht] FMC Alias Private Key: 7
2,816,687 UART: [art] Derive CDI
2,816,967 UART: [art] Store in in slot 0x4
2,902,532 UART: [art] Derive Key Pair
2,902,892 UART: [art] Store priv key in slot 0x5
2,916,152 UART: [art] Derive Key Pair - Done
2,931,105 UART: [art] Signing Cert with AUTHO
2,931,585 UART: RITY.KEYID = 7
2,947,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,780 UART: [art] PUB.X = 907A52F5D4257BB27FCDFF276D0DAC5AB8F8BECB70E4C7764613BF178C1BD3F82885EE9E6E6BF0CD364B3CB7165D0770
2,954,564 UART: [art] PUB.Y = 548CA5CA29799E120E9DB474915666E91192C529178B7B2B8A1EA967054938E0BC414B2A3C2CB246226901E8D7C208EF
2,961,498 UART: [art] SIG.R = 56FA4571F711E4A72C7B93059C312D188F003AB0F51EB64D2398DD95AC821655F759C1BC2A962B9789DE7FDA5FB80977
2,968,244 UART: [art] SIG.S = 9D3FB49E73D815A569224FFC7DA1239AA6E748385A8A366FB192C63210161CBAD76464BB4DBE212F072DB0118ABB02D8
2,992,111 UART: Caliptra RT
2,992,456 UART: [state] CFI Enabled
3,100,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,907 UART: [rt]cmd =0x54514754, len=24
3,132,818 >>> mbox cmd response data (8 bytes)
3,132,819 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,212 UART: [rt]cmd =0x44504543, len=36
3,199,917 >>> mbox cmd response data (24 bytes)
3,199,918 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,387 UART: [rt]cmd =0x47544744, len=8
3,231,002 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,674 UART: [kat] HMAC-384Kdf
920,136 UART: [kat] LMS
1,168,448 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,769 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,173,659 ready_for_fw is high
1,173,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,345 UART: [idev] Erasing UDS.KEYID = 0
1,197,845 UART: [idev] Sha1 KeyId Algorithm
1,206,837 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,240,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,346 UART: [fwproc] Wait for Commands...
1,281,159 UART: [fwproc] Recv command 0x46574c44
1,281,892 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,525 >>> mbox cmd response: success
2,768,525 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,769,738 UART: [afmc] ++
2,769,906 UART: [afmc] CDI.KEYID = 6
2,770,269 UART: [afmc] SUBJECT.KEYID = 7
2,770,695 UART: [afmc] AUTHORITY.KEYID = 5
2,806,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,809 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,528 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,381 UART: [afmc] --
2,849,501 UART: [cold-reset] --
2,850,287 UART: [state] Locking Datavault
2,851,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,834 UART: [state] Locking ICCM
2,852,354 UART: [exit] Launching FMC @ 0x40000130
2,857,683 UART:
2,857,699 UART: Running Caliptra FMC ...
2,858,107 UART:
2,858,161 UART: [state] CFI Enabled
2,868,150 UART: [fht] FMC Alias Private Key: 7
2,975,305 UART: [art] Extend RT PCRs Done
2,975,733 UART: [art] Lock RT PCRs Done
2,977,393 UART: [art] Populate DV Done
2,985,482 UART: [fht] FMC Alias Private Key: 7
2,986,664 UART: [art] Derive CDI
2,986,944 UART: [art] Store in in slot 0x4
3,072,657 UART: [art] Derive Key Pair
3,073,017 UART: [art] Store priv key in slot 0x5
3,086,127 UART: [art] Derive Key Pair - Done
3,100,875 UART: [art] Signing Cert with AUTHO
3,101,355 UART: RITY.KEYID = 7
3,116,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,436 UART: [art] PUB.X = 6612073AE961762B723D7B5E9293A22BDE1D6FA44A8ACEC52A0DA139917A00479ACEEDAF597113512DC61AE58A1030DA
3,124,188 UART: [art] PUB.Y = 44B166488EB3BC64A0830FB415B47EE62BC0925B8261A763DCD5192F03DFB44AFAC9F64BD18AC610A1646A313E27DC90
3,131,142 UART: [art] SIG.R = 0B396C5EB55E0685466BA2707236685129971D5541F5281DB92F2D2B339DCF3C3838D33F10FD5DE671E07CF2D15E7D29
3,137,904 UART: [art] SIG.S = 4A1ED65B5C9F82A2D028F9B7B477E45794A882DE37093114E495DC8E69AC3834AE0FF32EFF2CA9D61F132456D7DB80F2
3,162,363 UART: Caliptra RT
3,162,616 UART: [state] CFI Enabled
3,270,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,613 UART: [rt]cmd =0x54514754, len=24
3,302,536 >>> mbox cmd response data (8 bytes)
3,302,537 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,332,116 UART: [rt]cmd =0x44504543, len=36
3,369,851 >>> mbox cmd response data (24 bytes)
3,369,852 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,085 UART: [rt]cmd =0x47544744, len=8
3,400,828 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,114 ready_for_fw is high
1,056,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,241 >>> mbox cmd response: success
2,619,241 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,009 UART:
2,681,025 UART: Running Caliptra FMC ...
2,681,433 UART:
2,681,487 UART: [state] CFI Enabled
2,691,862 UART: [fht] FMC Alias Private Key: 7
2,799,801 UART: [art] Extend RT PCRs Done
2,800,229 UART: [art] Lock RT PCRs Done
2,801,933 UART: [art] Populate DV Done
2,810,094 UART: [fht] FMC Alias Private Key: 7
2,811,148 UART: [art] Derive CDI
2,811,428 UART: [art] Store in in slot 0x4
2,897,249 UART: [art] Derive Key Pair
2,897,609 UART: [art] Store priv key in slot 0x5
2,910,805 UART: [art] Derive Key Pair - Done
2,925,581 UART: [art] Signing Cert with AUTHO
2,926,061 UART: RITY.KEYID = 7
2,941,175 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,940 UART: [art] PUB.X = 261432D253049519FB8022685C11DE9BA55260E430E08725BCC3589F1457DE9E406F3FC296AE149AE37726CB533BA55B
2,948,703 UART: [art] PUB.Y = 0E334E2117AD56D5596B9A744A58CAE183DDEF5943227FD70F5F54D429C3A5A4E6885C4DCE866849448034EC77EF5BD0
2,955,653 UART: [art] SIG.R = B63912F95D4D202522A5CE8FC92AA864236F02EF9CAB2F3C1A4B319AD574D0C78822F04830218FC896C6B4CE8E2EC978
2,962,428 UART: [art] SIG.S = BB418E7ADE5655B5D46302CD42129B63D205D91D03408B192C98913960EF1CC2C6C65788498CEDCC04AF54766655FC60
2,986,583 UART: Caliptra RT
2,986,836 UART: [state] CFI Enabled
3,094,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,018 UART: [rt]cmd =0x54514754, len=24
3,126,953 >>> mbox cmd response data (8 bytes)
3,126,954 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,431 UART: [rt]cmd =0x44504543, len=36
3,194,474 >>> mbox cmd response data (24 bytes)
3,194,475 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,986 UART: [rt]cmd =0x47544744, len=8
3,225,585 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,174,498 ready_for_fw is high
1,174,498 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,908 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,371 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,848 >>> mbox cmd response: success
2,771,848 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,863 UART: [afmc] ++
2,773,031 UART: [afmc] CDI.KEYID = 6
2,773,394 UART: [afmc] SUBJECT.KEYID = 7
2,773,820 UART: [afmc] AUTHORITY.KEYID = 5
2,809,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,558 UART: [afmc] --
2,852,584 UART: [cold-reset] --
2,853,428 UART: [state] Locking Datavault
2,854,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,059 UART: [state] Locking ICCM
2,855,525 UART: [exit] Launching FMC @ 0x40000130
2,860,854 UART:
2,860,870 UART: Running Caliptra FMC ...
2,861,278 UART:
2,861,421 UART: [state] CFI Enabled
2,872,380 UART: [fht] FMC Alias Private Key: 7
2,980,489 UART: [art] Extend RT PCRs Done
2,980,917 UART: [art] Lock RT PCRs Done
2,982,871 UART: [art] Populate DV Done
2,991,014 UART: [fht] FMC Alias Private Key: 7
2,992,060 UART: [art] Derive CDI
2,992,340 UART: [art] Store in in slot 0x4
3,077,881 UART: [art] Derive Key Pair
3,078,241 UART: [art] Store priv key in slot 0x5
3,091,719 UART: [art] Derive Key Pair - Done
3,106,633 UART: [art] Signing Cert with AUTHO
3,107,113 UART: RITY.KEYID = 7
3,122,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,466 UART: [art] PUB.X = 5D8DE80CE9FD499C0999FAC95B5DB7B9D4173E102B67CA9E90387FA7790A1DC831D09A6E72EFCB20D8F2F083D88EFDE8
3,130,247 UART: [art] PUB.Y = AA6C06572B29ECCD4134BD684CFE4382A2BDA0379DF3A174463FDE85230D3F91551FE8915DAA10AFF2CCE892413DDE97
3,137,207 UART: [art] SIG.R = 745065B88AD5933182AAE8F48C80FEBCDD2793F13E9FA73DEEB97818BF7CCED3C996A33A7A499A7D2BD2658D6CF9A90C
3,143,994 UART: [art] SIG.S = 2596F091EE02328D705E7BEDDC2832D5A49656D1BD71AF72C364BC6F2AE20E6CF43A21EAC233B3B002BEFA8B1730FC04
3,168,061 UART: Caliptra RT
3,168,406 UART: [state] CFI Enabled
3,276,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,005 UART: [rt]cmd =0x54514754, len=24
3,309,226 >>> mbox cmd response data (8 bytes)
3,309,227 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,970 UART: [rt]cmd =0x44504543, len=36
3,376,719 >>> mbox cmd response data (24 bytes)
3,376,720 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,151 UART: [rt]cmd =0x47544744, len=8
3,407,708 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,195 ready_for_fw is high
1,057,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,306 >>> mbox cmd response: success
2,621,306 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,030 UART:
2,683,046 UART: Running Caliptra FMC ...
2,683,454 UART:
2,683,597 UART: [state] CFI Enabled
2,693,762 UART: [fht] FMC Alias Private Key: 7
2,802,177 UART: [art] Extend RT PCRs Done
2,802,605 UART: [art] Lock RT PCRs Done
2,804,149 UART: [art] Populate DV Done
2,812,232 UART: [fht] FMC Alias Private Key: 7
2,813,208 UART: [art] Derive CDI
2,813,488 UART: [art] Store in in slot 0x4
2,899,331 UART: [art] Derive Key Pair
2,899,691 UART: [art] Store priv key in slot 0x5
2,913,237 UART: [art] Derive Key Pair - Done
2,928,193 UART: [art] Signing Cert with AUTHO
2,928,673 UART: RITY.KEYID = 7
2,944,061 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,826 UART: [art] PUB.X = D0A37BF5C38DBBE4B060D65E1BCA85F7382D284707BCF0E48977CE3631340F038187C4A0DAB0E93678F349ED4211EFEE
2,951,599 UART: [art] PUB.Y = 1E12CE260FB4BE568FE1697678781411EC251E0034175BD53AF67A0A0BBFDF2B48CEF5499AD3FFAA56A1CE8B66D99690
2,958,532 UART: [art] SIG.R = 143B8394849F25FA92B77D941307ADD793C132AB07AB28923956D0AADEEBFF1FF0E22B16CBEE6A570974D506735D9238
2,965,296 UART: [art] SIG.S = 542D0DAE8602B5FDF1A6369D569F0195F0D78A3727D86F63E1F02C275DBE7F8352B3E7235BE0A20EF14EA8741E4E90EB
2,989,195 UART: Caliptra RT
2,989,540 UART: [state] CFI Enabled
3,097,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,877 UART: [rt]cmd =0x54514754, len=24
3,129,790 >>> mbox cmd response data (8 bytes)
3,129,791 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,572 UART: [rt]cmd =0x44504543, len=36
3,197,913 >>> mbox cmd response data (24 bytes)
3,197,914 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,299 UART: [rt]cmd =0x47544744, len=8
3,228,700 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,166 UART:
192,520 UART: Running Caliptra ROM ...
193,702 UART:
193,856 UART: [state] CFI Enabled
263,066 UART: [state] LifecycleState = Unprovisioned
264,992 UART: [state] DebugLocked = No
267,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,025 UART: [kat] SHA2-256
440,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,271 UART: [kat] ++
451,720 UART: [kat] sha1
463,157 UART: [kat] SHA2-256
465,884 UART: [kat] SHA2-384
472,298 UART: [kat] SHA2-512-ACC
474,698 UART: [kat] ECC-384
2,768,233 UART: [kat] HMAC-384Kdf
2,798,106 UART: [kat] LMS
3,988,418 UART: [kat] --
3,993,988 UART: [cold-reset] ++
3,996,040 UART: [fht] Storing FHT @ 0x50003400
4,006,915 UART: [idev] ++
4,007,494 UART: [idev] CDI.KEYID = 6
4,008,388 UART: [idev] SUBJECT.KEYID = 7
4,009,707 UART: [idev] UDS.KEYID = 0
4,010,717 ready_for_fw is high
4,010,922 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,915 UART: [idev] Erasing UDS.KEYID = 0
7,345,691 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,979 UART: [idev] --
7,370,330 UART: [ldev] ++
7,370,913 UART: [ldev] CDI.KEYID = 6
7,371,855 UART: [ldev] SUBJECT.KEYID = 5
7,373,032 UART: [ldev] AUTHORITY.KEYID = 7
7,374,320 UART: [ldev] FE.KEYID = 1
7,420,898 UART: [ldev] Erasing FE.KEYID = 1
10,758,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,186 UART: [ldev] --
13,135,755 UART: [fwproc] Waiting for Commands...
13,138,336 UART: [fwproc] Received command 0x46574c44
13,140,516 UART: [fwproc] Received Image of size 113760 bytes
17,186,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,463 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,648,347 >>> mbox cmd response: success
17,648,866 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,652,507 UART: [afmc] ++
17,653,099 UART: [afmc] CDI.KEYID = 6
17,654,042 UART: [afmc] SUBJECT.KEYID = 7
17,655,285 UART: [afmc] AUTHORITY.KEYID = 5
21,027,918 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,885 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,154 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,572 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,383 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,833 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,254 UART: [afmc] --
23,397,005 UART: [cold-reset] --
23,401,299 UART: [state] Locking Datavault
23,407,847 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,542 UART: [state] Locking ICCM
23,412,313 UART: [exit] Launching FMC @ 0x40000130
23,420,700 UART:
23,420,930 UART: Running Caliptra FMC ...
23,421,955 UART:
23,422,121 UART: [state] CFI Enabled
23,487,536 UART: [fht] FMC Alias Private Key: 7
25,825,778 UART: [art] Extend RT PCRs Done
25,826,997 UART: [art] Lock RT PCRs Done
25,828,705 UART: [art] Populate DV Done
25,834,169 UART: [fht] FMC Alias Private Key: 7
25,835,798 UART: [art] Derive CDI
25,836,540 UART: [art] Store in in slot 0x4
25,895,599 UART: [art] Derive Key Pair
25,896,596 UART: [art] Store priv key in slot 0x5
29,189,676 UART: [art] Derive Key Pair - Done
29,202,506 UART: [art] Signing Cert with AUTHO
29,203,837 UART: RITY.KEYID = 7
31,489,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,506 UART: [art] PUB.X = 9A2CEA930039C32AF137C346C9C2F4959318EB64786D1340C11C7D1FFD12D9C736FDA6384A460232522494F11F07503C
31,498,763 UART: [art] PUB.Y = 1B34A590659296C788375A55E2CF1232675EB5331A0EE8FC5A4BCD102CAA4B850E251EAA8B3AE1326F036C55FC57E985
31,505,960 UART: [art] SIG.R = 8905B7787D815FE35868F6D2DD5C3C5E5099B565137893917C097D3D3C1981ABE1D4C4B9E854527C4D50B2C5A7C89FF9
31,513,347 UART: [art] SIG.S = AB9EBC7970F246FB9FA2C164B7CBAC8E60F387F63D9D95EE2603974D9B97B77930B3B4605F233696EC517B2A4EF559FC
32,818,776 UART: Caliptra RT
32,819,486 UART: [state] CFI Enabled
32,980,853 UART: [rt] RT listening for mailbox commands...
33,012,537 UART: [rt]cmd =0x54514754, len=24
33,014,782 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,780,819 ready_for_fw is high
3,781,419 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,849,726 >>> mbox cmd response: success
17,850,375 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,547,923 UART:
23,548,711 UART: Running Caliptra FMC ...
23,549,850 UART:
23,550,003 UART: [state] CFI Enabled
23,615,158 UART: [fht] FMC Alias Private Key: 7
25,952,886 UART: [art] Extend RT PCRs Done
25,954,115 UART: [art] Lock RT PCRs Done
25,955,718 UART: [art] Populate DV Done
25,961,196 UART: [fht] FMC Alias Private Key: 7
25,962,692 UART: [art] Derive CDI
25,963,459 UART: [art] Store in in slot 0x4
26,023,992 UART: [art] Derive Key Pair
26,025,039 UART: [art] Store priv key in slot 0x5
29,317,334 UART: [art] Derive Key Pair - Done
29,330,495 UART: [art] Signing Cert with AUTHO
29,331,828 UART: RITY.KEYID = 7
31,619,981 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,508 UART: [art] PUB.X = 0476463E1FAF6578B78285B87A4B8C1AA6B2DA7B7CF224F9FB08E1FF889D6492A93643C5D251A4F7C0AA55862D20D12B
31,628,777 UART: [art] PUB.Y = 90ABD774C0033668A8C27AE27ADE7144EE5FADB2A9D5ADF1FD54854488CF749029BC48F7EF165F04003099EBDD1631E4
31,636,021 UART: [art] SIG.R = D0C3C827A02783B9011A9DC839B22BFD854486EB58780D66E722D6C1C38B2D76B43F9F82FD846931250F267254648B7E
31,643,375 UART: [art] SIG.S = 00A477005CC127EF47D58A56A8AC88A9B1BCDE4CF5AFD9BC3BC83C8265E5AE840A3C79AD02B30AC1F5881759ED90EDF6
32,948,226 UART: Caliptra RT
32,948,930 UART: [state] CFI Enabled
33,111,322 UART: [rt] RT listening for mailbox commands...
33,143,171 UART: [rt]cmd =0x54514754, len=24
33,145,640 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,601 writing to cptra_bootfsm_go
192,813 UART:
193,182 UART: Running Caliptra ROM ...
194,285 UART:
603,874 UART: [state] CFI Enabled
619,108 UART: [state] LifecycleState = Unprovisioned
620,984 UART: [state] DebugLocked = No
623,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,800 UART: [kat] SHA2-256
797,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,067 UART: [kat] ++
808,518 UART: [kat] sha1
818,674 UART: [kat] SHA2-256
821,388 UART: [kat] SHA2-384
827,801 UART: [kat] SHA2-512-ACC
830,163 UART: [kat] ECC-384
3,113,915 UART: [kat] HMAC-384Kdf
3,124,235 UART: [kat] LMS
4,314,342 UART: [kat] --
4,317,440 UART: [cold-reset] ++
4,319,652 UART: [fht] Storing FHT @ 0x50003400
4,332,543 UART: [idev] ++
4,333,107 UART: [idev] CDI.KEYID = 6
4,334,013 UART: [idev] SUBJECT.KEYID = 7
4,335,256 UART: [idev] UDS.KEYID = 0
4,336,234 ready_for_fw is high
4,336,444 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,335 UART: [idev] Erasing UDS.KEYID = 0
7,625,315 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,683 UART: [idev] --
7,649,096 UART: [ldev] ++
7,649,691 UART: [ldev] CDI.KEYID = 6
7,650,631 UART: [ldev] SUBJECT.KEYID = 5
7,651,756 UART: [ldev] AUTHORITY.KEYID = 7
7,653,138 UART: [ldev] FE.KEYID = 1
7,663,537 UART: [ldev] Erasing FE.KEYID = 1
10,954,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,636 UART: [ldev] --
13,315,541 UART: [fwproc] Waiting for Commands...
13,317,298 UART: [fwproc] Received command 0x46574c44
13,319,488 UART: [fwproc] Received Image of size 113760 bytes
17,362,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,202 >>> mbox cmd response: success
17,827,751 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,830,941 UART: [afmc] ++
17,831,521 UART: [afmc] CDI.KEYID = 6
17,832,454 UART: [afmc] SUBJECT.KEYID = 7
17,833,717 UART: [afmc] AUTHORITY.KEYID = 5
21,147,741 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,027 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,440 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,280 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,721 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,498 UART: [afmc] --
23,512,929 UART: [cold-reset] --
23,515,759 UART: [state] Locking Datavault
23,520,728 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,479 UART: [state] Locking ICCM
23,524,812 UART: [exit] Launching FMC @ 0x40000130
23,533,201 UART:
23,533,438 UART: Running Caliptra FMC ...
23,534,538 UART:
23,534,692 UART: [state] CFI Enabled
23,542,839 UART: [fht] FMC Alias Private Key: 7
25,874,065 UART: [art] Extend RT PCRs Done
25,875,426 UART: [art] Lock RT PCRs Done
25,876,898 UART: [art] Populate DV Done
25,882,287 UART: [fht] FMC Alias Private Key: 7
25,883,891 UART: [art] Derive CDI
25,884,701 UART: [art] Store in in slot 0x4
25,926,915 UART: [art] Derive Key Pair
25,927,910 UART: [art] Store priv key in slot 0x5
29,169,621 UART: [art] Derive Key Pair - Done
29,182,727 UART: [art] Signing Cert with AUTHO
29,184,034 UART: RITY.KEYID = 7
31,463,127 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,639 UART: [art] PUB.X = F8E5FBB730D701C21C5517FF103146009946BE4F3D22257AA9CA17A71C4C9929AC8D6E55C3E705F44D0FABB6871F9ED3
31,471,892 UART: [art] PUB.Y = 577D75AA5DC6B4489F827A8B7E5731221A404AE982AB2E546E369CAC86475030D46AB2FFE495853E73452C1B9B726A28
31,479,120 UART: [art] SIG.R = 42843E41D22C7C157C868C0A8BB7EB5F9D86A846FC9754BD257232319A449FABB74D620C6C0ADE576F437A5342B0BCAF
31,486,542 UART: [art] SIG.S = 2F97F6FA0431274B974D9D2F1053F33A8073D598DB52690D8AEEB3A1FED085234E05D6152B36E95C5D43DC532DC7E4A8
32,792,301 UART: Caliptra RT
32,792,992 UART: [state] CFI Enabled
32,910,210 UART: [rt] RT listening for mailbox commands...
32,941,358 UART: [rt]cmd =0x54514754, len=24
32,943,898 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,709 writing to cptra_bootfsm_go
4,127,601 ready_for_fw is high
4,128,108 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,053,936 >>> mbox cmd response: success
18,054,618 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,692,424 UART:
23,692,833 UART: Running Caliptra FMC ...
23,693,939 UART:
23,694,108 UART: [state] CFI Enabled
23,702,121 UART: [fht] FMC Alias Private Key: 7
26,033,818 UART: [art] Extend RT PCRs Done
26,035,046 UART: [art] Lock RT PCRs Done
26,036,893 UART: [art] Populate DV Done
26,042,425 UART: [fht] FMC Alias Private Key: 7
26,044,021 UART: [art] Derive CDI
26,044,839 UART: [art] Store in in slot 0x4
26,087,550 UART: [art] Derive Key Pair
26,088,595 UART: [art] Store priv key in slot 0x5
29,330,446 UART: [art] Derive Key Pair - Done
29,343,394 UART: [art] Signing Cert with AUTHO
29,344,752 UART: RITY.KEYID = 7
31,624,056 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,569 UART: [art] PUB.X = 027524FF9E07FE9B84B15C509D7943C386D76C8039AD8E883CA90F0B5B2225252903095C650C809951EBC3E4A252CA14
31,632,794 UART: [art] PUB.Y = 823B267FE48CABB270DC42AB2CA6F06AC838C0B8E264CC0A3245B7AC2A5E891899737A18BD599F59748BF363A8B512DA
31,640,066 UART: [art] SIG.R = A6AA79F1FA91A67D805C9ED1790AC817D094EFC380BD7D6C31634191141A0F594C2105230679A810976C34B5ED7A9F69
31,647,462 UART: [art] SIG.S = 590A402D9432EEED01F3C69F91BAFBE506682472E80880C285FFA786329ECB5717BA394F36F9C9D9686471D561BF3421
32,952,543 UART: Caliptra RT
32,953,261 UART: [state] CFI Enabled
33,070,597 UART: [rt] RT listening for mailbox commands...
33,101,923 UART: [rt]cmd =0x54514754, len=24
33,104,031 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,451 UART:
192,840 UART: Running Caliptra ROM ...
193,990 UART:
194,142 UART: [state] CFI Enabled
263,682 UART: [state] LifecycleState = Unprovisioned
265,520 UART: [state] DebugLocked = No
267,481 UART: [state] WD Timer not started. Device not locked for debugging
271,043 UART: [kat] SHA2-256
450,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,687 UART: [kat] ++
462,220 UART: [kat] sha1
472,957 UART: [kat] SHA2-256
475,957 UART: [kat] SHA2-384
483,286 UART: [kat] SHA2-512-ACC
486,223 UART: [kat] ECC-384
2,948,508 UART: [kat] HMAC-384Kdf
2,971,355 UART: [kat] LMS
3,500,764 UART: [kat] --
3,507,337 UART: [cold-reset] ++
3,509,694 UART: [fht] FHT @ 0x50003400
3,520,461 UART: [idev] ++
3,521,025 UART: [idev] CDI.KEYID = 6
3,521,938 UART: [idev] SUBJECT.KEYID = 7
3,523,128 UART: [idev] UDS.KEYID = 0
3,524,105 ready_for_fw is high
3,524,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,910 UART: [idev] Erasing UDS.KEYID = 0
6,029,733 UART: [idev] Sha1 KeyId Algorithm
6,053,415 UART: [idev] --
6,057,192 UART: [ldev] ++
6,057,758 UART: [ldev] CDI.KEYID = 6
6,058,645 UART: [ldev] SUBJECT.KEYID = 5
6,059,827 UART: [ldev] AUTHORITY.KEYID = 7
6,061,076 UART: [ldev] FE.KEYID = 1
6,097,956 UART: [ldev] Erasing FE.KEYID = 1
8,603,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,850 UART: [ldev] --
10,411,114 UART: [fwproc] Wait for Commands...
10,412,923 UART: [fwproc] Recv command 0x46574c44
10,415,018 UART: [fwproc] Recv'd Img size: 114084 bytes
13,807,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,267,408 >>> mbox cmd response: success
14,267,974 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,271,166 UART: [afmc] ++
14,271,763 UART: [afmc] CDI.KEYID = 6
14,272,646 UART: [afmc] SUBJECT.KEYID = 7
14,273,747 UART: [afmc] AUTHORITY.KEYID = 5
16,804,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,524 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,752 UART: [afmc] --
18,602,751 UART: [cold-reset] --
18,605,363 UART: [state] Locking Datavault
18,610,333 UART: [state] Locking PCR0, PCR1 and PCR31
18,611,970 UART: [state] Locking ICCM
18,613,225 UART: [exit] Launching FMC @ 0x40000130
18,621,666 UART:
18,621,903 UART: Running Caliptra FMC ...
18,622,925 UART:
18,623,069 UART: [state] CFI Enabled
18,685,021 UART: [fht] FMC Alias Private Key: 7
20,449,097 UART: [art] Extend RT PCRs Done
20,450,338 UART: [art] Lock RT PCRs Done
20,451,939 UART: [art] Populate DV Done
20,457,400 UART: [fht] FMC Alias Private Key: 7
20,458,877 UART: [art] Derive CDI
20,459,605 UART: [art] Store in in slot 0x4
20,517,156 UART: [art] Derive Key Pair
20,518,197 UART: [art] Store priv key in slot 0x5
22,980,666 UART: [art] Derive Key Pair - Done
22,993,933 UART: [art] Signing Cert with AUTHO
22,995,233 UART: RITY.KEYID = 7
24,706,516 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,017 UART: [art] PUB.X = 90B565347A53FFA3BEC7A92CCD0B1B91432B8F4B48C5D74BBE988DF0BF84A366A44338E558C6F696B7C0F5E79352B393
24,715,303 UART: [art] PUB.Y = 5A98C4E59C80BB501B0560964F443C0CDB6AA00EC4C9A075B6EAFEFF6D5749EA40CC9DF3E6FC0E90B8BE0C6479E7302D
24,722,618 UART: [art] SIG.R = E0CCFCE62551ED888D52376FBF43DA50159526D642911F197F7247BD3B596B61EA527F44A63BC8BCEC25F4EBE5925377
24,730,053 UART: [art] SIG.S = 14E7B4FBAC5E825728AF76DB5C7CDED67FE71660004C6808620BAF56FC95F67C3F3DE5B2424B9F5446BFF55EE1D30B85
25,708,849 UART: Caliptra RT
25,709,566 UART: [state] CFI Enabled
25,875,359 UART: [rt] RT listening for mailbox commands...
25,906,762 UART: [rt]cmd =0x54514754, len=24
25,908,946 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
3,360,521 ready_for_fw is high
3,361,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,061,479 >>> mbox cmd response: success
14,062,233 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,341,927 UART:
18,342,325 UART: Running Caliptra FMC ...
18,343,468 UART:
18,343,626 UART: [state] CFI Enabled
18,409,384 UART: [fht] FMC Alias Private Key: 7
20,173,766 UART: [art] Extend RT PCRs Done
20,174,984 UART: [art] Lock RT PCRs Done
20,176,606 UART: [art] Populate DV Done
20,181,909 UART: [fht] FMC Alias Private Key: 7
20,183,387 UART: [art] Derive CDI
20,184,147 UART: [art] Store in in slot 0x4
20,241,433 UART: [art] Derive Key Pair
20,242,474 UART: [art] Store priv key in slot 0x5
22,705,112 UART: [art] Derive Key Pair - Done
22,717,902 UART: [art] Signing Cert with AUTHO
22,719,230 UART: RITY.KEYID = 7
24,430,757 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,240 UART: [art] PUB.X = 24F957724AABE863FEE6DA99A5E07ED9845C2A230C0A95FE1443E4FAFD7A940572096DA416A0606E917FD5184182BA16
24,439,511 UART: [art] PUB.Y = 5A8692EC1BDBFC458E1CC56A17C6B59E62FC5201F427248B70FD9BEF3E3EF715CD3DDD95EFABB347C87F48C72970098F
24,446,812 UART: [art] SIG.R = D4940A2DC3DA2D7177FE8F1E891388520CE255E3E3FA0F4A7489E49B62F1CC37B784D41186CF3B60C9BC8D4BD967EBCC
24,454,190 UART: [art] SIG.S = 15345893BA257D6CF28420D4F2AC79F9AF4A13A4E52AD6C8CB9424CF0F16B2641E44A7835E711AD9E7F562E9E88B9ABB
25,432,858 UART: Caliptra RT
25,433,581 UART: [state] CFI Enabled
25,598,053 UART: [rt] RT listening for mailbox commands...
25,630,017 UART: [rt]cmd =0x54514754, len=24
25,632,533 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,966 writing to cptra_bootfsm_go
193,138 UART:
193,526 UART: Running Caliptra ROM ...
194,745 UART:
604,178 UART: [state] CFI Enabled
616,420 UART: [state] LifecycleState = Unprovisioned
618,227 UART: [state] DebugLocked = No
620,954 UART: [state] WD Timer not started. Device not locked for debugging
624,846 UART: [kat] SHA2-256
804,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,534 UART: [kat] ++
815,985 UART: [kat] sha1
827,352 UART: [kat] SHA2-256
830,430 UART: [kat] SHA2-384
837,134 UART: [kat] SHA2-512-ACC
840,070 UART: [kat] ECC-384
3,282,720 UART: [kat] HMAC-384Kdf
3,295,240 UART: [kat] LMS
3,824,768 UART: [kat] --
3,830,945 UART: [cold-reset] ++
3,832,248 UART: [fht] FHT @ 0x50003400
3,843,337 UART: [idev] ++
3,843,940 UART: [idev] CDI.KEYID = 6
3,844,863 UART: [idev] SUBJECT.KEYID = 7
3,845,907 UART: [idev] UDS.KEYID = 0
3,846,876 ready_for_fw is high
3,847,103 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,803 UART: [idev] Erasing UDS.KEYID = 0
6,323,065 UART: [idev] Sha1 KeyId Algorithm
6,346,142 UART: [idev] --
6,349,923 UART: [ldev] ++
6,350,507 UART: [ldev] CDI.KEYID = 6
6,351,427 UART: [ldev] SUBJECT.KEYID = 5
6,352,584 UART: [ldev] AUTHORITY.KEYID = 7
6,353,832 UART: [ldev] FE.KEYID = 1
6,363,945 UART: [ldev] Erasing FE.KEYID = 1
8,835,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,930 UART: [ldev] --
10,627,600 UART: [fwproc] Wait for Commands...
10,630,406 UART: [fwproc] Recv command 0x46574c44
10,632,496 UART: [fwproc] Recv'd Img size: 114084 bytes
14,033,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,996 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,497,829 >>> mbox cmd response: success
14,498,438 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,501,460 UART: [afmc] ++
14,502,055 UART: [afmc] CDI.KEYID = 6
14,502,950 UART: [afmc] SUBJECT.KEYID = 7
14,504,110 UART: [afmc] AUTHORITY.KEYID = 5
17,005,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,981 UART: [afmc] --
18,802,266 UART: [cold-reset] --
18,805,753 UART: [state] Locking Datavault
18,811,169 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,871 UART: [state] Locking ICCM
18,814,405 UART: [exit] Launching FMC @ 0x40000130
18,822,817 UART:
18,823,055 UART: Running Caliptra FMC ...
18,824,164 UART:
18,824,324 UART: [state] CFI Enabled
18,832,430 UART: [fht] FMC Alias Private Key: 7
20,589,491 UART: [art] Extend RT PCRs Done
20,590,708 UART: [art] Lock RT PCRs Done
20,592,413 UART: [art] Populate DV Done
20,597,771 UART: [fht] FMC Alias Private Key: 7
20,599,306 UART: [art] Derive CDI
20,600,225 UART: [art] Store in in slot 0x4
20,642,939 UART: [art] Derive Key Pair
20,643,981 UART: [art] Store priv key in slot 0x5
23,070,537 UART: [art] Derive Key Pair - Done
23,083,370 UART: [art] Signing Cert with AUTHO
23,084,674 UART: RITY.KEYID = 7
24,790,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,960 UART: [art] PUB.X = 97D421F80D9402F5D28FE15058BBD4E2B94778817C4275C8E348CB490D09BA1E1EDA5FE60391D2E9A4C39571FD309EDB
24,799,214 UART: [art] PUB.Y = 20D76CD8FF368D520D544E3878553F1A72FD844720571401F0CF5BFB1D596575CFC191DCC2FF9693600B3824073C24FB
24,806,437 UART: [art] SIG.R = 0A36D1BBD68A6B5B41301BCFCD62014BF397DB036D4147779C4AD196578D2F6455EC143BAAA4F39AD67F23426E52798A
24,813,857 UART: [art] SIG.S = C67A84C7C420859B7FA9B206EDE26E88D736D4D93FE0613D8A5756B5FB2979B7B1F88F9591C1C8802B63B7EC18E4F347
25,793,001 UART: Caliptra RT
25,793,704 UART: [state] CFI Enabled
25,910,498 UART: [rt] RT listening for mailbox commands...
25,942,279 UART: [rt]cmd =0x54514754, len=24
25,944,605 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
3,693,883 ready_for_fw is high
3,694,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,265 >>> mbox cmd response: success
14,259,868 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,508,370 UART:
18,508,769 UART: Running Caliptra FMC ...
18,509,897 UART:
18,510,078 UART: [state] CFI Enabled
18,517,813 UART: [fht] FMC Alias Private Key: 7
20,274,776 UART: [art] Extend RT PCRs Done
20,276,006 UART: [art] Lock RT PCRs Done
20,277,865 UART: [art] Populate DV Done
20,283,285 UART: [fht] FMC Alias Private Key: 7
20,284,945 UART: [art] Derive CDI
20,285,766 UART: [art] Store in in slot 0x4
20,328,634 UART: [art] Derive Key Pair
20,329,676 UART: [art] Store priv key in slot 0x5
22,756,061 UART: [art] Derive Key Pair - Done
22,769,116 UART: [art] Signing Cert with AUTHO
22,770,419 UART: RITY.KEYID = 7
24,476,157 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,664 UART: [art] PUB.X = 18CE7CB41ACD26AD9B296BE7E29B179B46F1F36EE37DBB57DF119CBC20D47FDD5AC4F53442BE7E55B33392BC94C08A3A
24,484,964 UART: [art] PUB.Y = 7B1F934DD2EE0A77FE1EA619322948618C23F496C7ABD414001EC343A25C412C4B613839B912EB566ECBA3A0DF9A85A1
24,492,208 UART: [art] SIG.R = 4CBF6B14CC2B7F4528B1272D9F18F738B7BA01C55C86843823BAB43E65F4DC50EA98CAA839555CCD2861A0360095F2E6
24,499,582 UART: [art] SIG.S = 769284EEBC63A9D9E756A78D16F90D81B04B62F6EC4B32845A3BE64ADA3EAED961BEB16D24CEA45B320B6752EE878642
25,478,956 UART: Caliptra RT
25,479,660 UART: [state] CFI Enabled
25,596,556 UART: [rt] RT listening for mailbox commands...
25,627,924 UART: [rt]cmd =0x54514754, len=24
25,630,122 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,441 UART:
192,818 UART: Running Caliptra ROM ...
193,913 UART:
194,056 UART: [state] CFI Enabled
265,508 UART: [state] LifecycleState = Unprovisioned
267,908 UART: [state] DebugLocked = No
270,276 UART: [state] WD Timer not started. Device not locked for debugging
275,545 UART: [kat] SHA2-256
465,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,167 UART: [kat] ++
476,642 UART: [kat] sha1
488,156 UART: [kat] SHA2-256
491,240 UART: [kat] SHA2-384
497,153 UART: [kat] SHA2-512-ACC
499,743 UART: [kat] ECC-384
2,961,899 UART: [kat] HMAC-384Kdf
2,985,178 UART: [kat] LMS
3,516,968 UART: [kat] --
3,520,133 UART: [cold-reset] ++
3,521,499 UART: [fht] FHT @ 0x50003400
3,534,455 UART: [idev] ++
3,535,155 UART: [idev] CDI.KEYID = 6
3,536,157 UART: [idev] SUBJECT.KEYID = 7
3,537,328 UART: [idev] UDS.KEYID = 0
3,538,250 ready_for_fw is high
3,538,455 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,682,016 UART: [idev] Erasing UDS.KEYID = 0
6,043,632 UART: [idev] Sha1 KeyId Algorithm
6,065,408 UART: [idev] --
6,071,383 UART: [ldev] ++
6,072,128 UART: [ldev] CDI.KEYID = 6
6,073,058 UART: [ldev] SUBJECT.KEYID = 5
6,074,164 UART: [ldev] AUTHORITY.KEYID = 7
6,075,390 UART: [ldev] FE.KEYID = 1
6,113,363 UART: [ldev] Erasing FE.KEYID = 1
8,618,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,074 UART: [ldev] --
10,424,851 UART: [fwproc] Wait for Commands...
10,427,258 UART: [fwproc] Recv command 0x46574c44
10,429,563 UART: [fwproc] Recv'd Img size: 114084 bytes
13,873,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,608,828 >>> mbox cmd response: success
14,609,363 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,613,212 UART: [afmc] ++
14,613,919 UART: [afmc] CDI.KEYID = 6
14,615,030 UART: [afmc] SUBJECT.KEYID = 7
14,616,588 UART: [afmc] AUTHORITY.KEYID = 5
17,146,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,888,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,890,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,905,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,920,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,935,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,130 UART: [afmc] --
18,962,159 UART: [cold-reset] --
18,964,509 UART: [state] Locking Datavault
18,970,697 UART: [state] Locking PCR0, PCR1 and PCR31
18,972,851 UART: [state] Locking ICCM
18,975,903 UART: [exit] Launching FMC @ 0x40000130
18,984,578 UART:
18,984,806 UART: Running Caliptra FMC ...
18,985,899 UART:
18,986,051 UART: [state] CFI Enabled
19,046,118 UART: [fht] FMC Alias Private Key: 7
20,810,074 UART: [art] Extend RT PCRs Done
20,811,298 UART: [art] Lock RT PCRs Done
20,813,001 UART: [art] Populate DV Done
20,818,414 UART: [fht] FMC Alias Private Key: 7
20,820,009 UART: [art] Derive CDI
20,820,823 UART: [art] Store in in slot 0x4
20,879,185 UART: [art] Derive Key Pair
20,880,218 UART: [art] Store priv key in slot 0x5
23,343,171 UART: [art] Derive Key Pair - Done
23,356,278 UART: [art] Signing Cert with AUTHO
23,357,579 UART: RITY.KEYID = 7
25,069,217 UART: [art] Erasing AUTHORITY.KEYID = 7
25,070,730 UART: [art] PUB.X = 3856A9382F4560D05761A011972332F48167E9427037D036B837F4B5FC68AC865D7F6A19FE3D2097A00DCA1C0B594D59
25,078,000 UART: [art] PUB.Y = 020F0C002E845371F6C7AFDFAF36125A8BF68517C2BE8FBE118416E6AF2E1D14F9BD368D82CD23F7D6E065AAECBD6F4E
25,085,255 UART: [art] SIG.R = 401325004AAB8772AE294D8D5A98840C39290F716911CF871E057AF177552BBCD55DF94779727B9D044D71C303E2CA55
25,092,627 UART: [art] SIG.S = 9A5168882B299570B8258BCE118CA04F806590F7308C7E48698D572DF94FB4606DCB053D2DA9630FAB6526250DD49D66
26,071,699 UART: Caliptra RT
26,072,386 UART: [state] CFI Enabled
26,237,735 UART: [rt] RT listening for mailbox commands...
26,268,791 UART: [rt]cmd =0x54514754, len=24
26,271,194 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,435,721 ready_for_fw is high
3,436,092 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,708,267 >>> mbox cmd response: success
14,709,140 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,001,739 UART:
19,002,148 UART: Running Caliptra FMC ...
19,003,321 UART:
19,003,492 UART: [state] CFI Enabled
19,070,549 UART: [fht] FMC Alias Private Key: 7
20,834,523 UART: [art] Extend RT PCRs Done
20,835,749 UART: [art] Lock RT PCRs Done
20,837,432 UART: [art] Populate DV Done
20,842,797 UART: [fht] FMC Alias Private Key: 7
20,844,496 UART: [art] Derive CDI
20,845,307 UART: [art] Store in in slot 0x4
20,903,244 UART: [art] Derive Key Pair
20,904,286 UART: [art] Store priv key in slot 0x5
23,367,665 UART: [art] Derive Key Pair - Done
23,380,936 UART: [art] Signing Cert with AUTHO
23,382,244 UART: RITY.KEYID = 7
25,092,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,011 UART: [art] PUB.X = 25F06F5374EC54AFB85EC0A19F3849B7AD3E3CA84EBAD2ACDF62480F6CEF52662F777BC496A017C921C926B92701E4C2
25,101,328 UART: [art] PUB.Y = F784F3A223E3719643C1B4788E5A31B49C4E256A9F921FD494DA2D435B8ACC3DEA440A321CDDD85313DB4822AF40C3F1
25,108,525 UART: [art] SIG.R = CC4985E95ABB13FA6AB9F921917C2E67954D5466C5E374EAB65BBC6273289456876AFE5F91CB35F210FE56BC3D583E33
25,115,969 UART: [art] SIG.S = 6F29C5554D7C93CFB53EED831B3D957B3EEE04A7671974BB7F83AF5EDBB28304CEE5382450DCD1D30FB340EA90D449FB
26,094,848 UART: Caliptra RT
26,095,563 UART: [state] CFI Enabled
26,260,828 UART: [rt] RT listening for mailbox commands...
26,292,361 UART: [rt]cmd =0x54514754, len=24
26,294,522 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
192,890 UART:
193,232 UART: Running Caliptra ROM ...
194,444 UART:
604,171 UART: [state] CFI Enabled
619,474 UART: [state] LifecycleState = Unprovisioned
621,826 UART: [state] DebugLocked = No
623,994 UART: [state] WD Timer not started. Device not locked for debugging
629,165 UART: [kat] SHA2-256
819,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,854 UART: [kat] ++
830,311 UART: [kat] sha1
840,473 UART: [kat] SHA2-256
843,484 UART: [kat] SHA2-384
849,050 UART: [kat] SHA2-512-ACC
851,647 UART: [kat] ECC-384
3,291,282 UART: [kat] HMAC-384Kdf
3,304,524 UART: [kat] LMS
3,836,389 UART: [kat] --
3,841,899 UART: [cold-reset] ++
3,843,622 UART: [fht] FHT @ 0x50003400
3,853,756 UART: [idev] ++
3,854,467 UART: [idev] CDI.KEYID = 6
3,855,392 UART: [idev] SUBJECT.KEYID = 7
3,856,565 UART: [idev] UDS.KEYID = 0
3,857,492 ready_for_fw is high
3,857,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,323 UART: [idev] Erasing UDS.KEYID = 0
6,332,465 UART: [idev] Sha1 KeyId Algorithm
6,354,495 UART: [idev] --
6,360,141 UART: [ldev] ++
6,360,887 UART: [ldev] CDI.KEYID = 6
6,361,792 UART: [ldev] SUBJECT.KEYID = 5
6,362,948 UART: [ldev] AUTHORITY.KEYID = 7
6,364,175 UART: [ldev] FE.KEYID = 1
6,374,790 UART: [ldev] Erasing FE.KEYID = 1
8,853,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,245 UART: [ldev] --
10,643,284 UART: [fwproc] Wait for Commands...
10,646,467 UART: [fwproc] Recv command 0x46574c44
10,648,779 UART: [fwproc] Recv'd Img size: 114084 bytes
14,082,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,822,719 >>> mbox cmd response: success
14,823,269 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,826,187 UART: [afmc] ++
14,826,908 UART: [afmc] CDI.KEYID = 6
14,828,099 UART: [afmc] SUBJECT.KEYID = 7
14,829,545 UART: [afmc] AUTHORITY.KEYID = 5
17,332,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,054,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,056,507 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,071,725 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,086,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,101,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,125,952 UART: [afmc] --
19,128,635 UART: [cold-reset] --
19,132,018 UART: [state] Locking Datavault
19,138,844 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,992 UART: [state] Locking ICCM
19,143,417 UART: [exit] Launching FMC @ 0x40000130
19,152,094 UART:
19,152,351 UART: Running Caliptra FMC ...
19,153,456 UART:
19,153,618 UART: [state] CFI Enabled
19,161,637 UART: [fht] FMC Alias Private Key: 7
20,918,630 UART: [art] Extend RT PCRs Done
20,919,850 UART: [art] Lock RT PCRs Done
20,921,472 UART: [art] Populate DV Done
20,926,669 UART: [fht] FMC Alias Private Key: 7
20,928,266 UART: [art] Derive CDI
20,929,081 UART: [art] Store in in slot 0x4
20,971,461 UART: [art] Derive Key Pair
20,972,503 UART: [art] Store priv key in slot 0x5
23,399,296 UART: [art] Derive Key Pair - Done
23,412,089 UART: [art] Signing Cert with AUTHO
23,413,402 UART: RITY.KEYID = 7
25,118,532 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,066 UART: [art] PUB.X = 3EB356CE1437F41C6BA6216E679BDB1FACE32E7D970A5B725A37820158C8A8533F18180D09692B1E0B7380FC91924438
25,127,286 UART: [art] PUB.Y = CECF3944F2CC0C4EE694B282ADF5D630F86CE48E0CFE6BE2D1D3BD12AC7539AD4BC7D52F38BF91152812CFAB9FD2E62E
25,134,549 UART: [art] SIG.R = 685A942865F00F8A78F0935266CB9B5D15068BDA9F70E2F29EAE1BAF19FAE1A79730E8A9338524131175C0D5A5E67169
25,141,961 UART: [art] SIG.S = 5C3ED31B6AF0573B09C93A98769E2E9E0BBDDADCB3E69DF8C9A7E95A4CCDDA1C98DCF2DC7DD6611369C92B80ECF6D381
26,120,728 UART: Caliptra RT
26,121,418 UART: [state] CFI Enabled
26,238,898 UART: [rt] RT listening for mailbox commands...
26,270,690 UART: [rt]cmd =0x54514754, len=24
26,273,045 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,639 writing to cptra_bootfsm_go
3,755,709 ready_for_fw is high
3,756,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,675 >>> mbox cmd response: success
14,950,337 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,201,074 UART:
19,201,484 UART: Running Caliptra FMC ...
19,202,589 UART:
19,202,741 UART: [state] CFI Enabled
19,210,536 UART: [fht] FMC Alias Private Key: 7
20,966,932 UART: [art] Extend RT PCRs Done
20,968,159 UART: [art] Lock RT PCRs Done
20,969,886 UART: [art] Populate DV Done
20,975,324 UART: [fht] FMC Alias Private Key: 7
20,976,924 UART: [art] Derive CDI
20,977,660 UART: [art] Store in in slot 0x4
21,020,249 UART: [art] Derive Key Pair
21,021,249 UART: [art] Store priv key in slot 0x5
23,447,854 UART: [art] Derive Key Pair - Done
23,460,882 UART: [art] Signing Cert with AUTHO
23,462,198 UART: RITY.KEYID = 7
25,167,625 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,430 UART: [art] PUB.X = 03DAF3C24D65B859F16CD7074967CDBE0A5631D4C8F2A1798FC793461267EF08969DA24B76FA2F9460A2FBE2D822C011
25,176,402 UART: [art] PUB.Y = 2FEBA144F0394BCA12ABF2DA9BC8FD9D925B87F61A466C314687FF6AA9DBE40C6EE97D9E6751FE68E1B7D7B723142ACC
25,183,707 UART: [art] SIG.R = A8C934ABE2405DDFD2017C57DA4EB9F8DDE6C7FB78625B254D74F4C6EC1F6FD539EF0CF27AC9791799CCF9942195D4DE
25,191,150 UART: [art] SIG.S = 1F526E9962DB497E337F44A62E72F9ADF2C7F3F1D96C5557302CF7E88A058FA95F30FD8DE0567A7D06E815750E415FB7
26,169,661 UART: Caliptra RT
26,170,560 UART: [state] CFI Enabled
26,286,942 UART: [rt] RT listening for mailbox commands...
26,318,308 UART: [rt]cmd =0x54514754, len=24
26,320,769 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,731 UART: [kat] SHA2-256
892,669 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
903,076 UART: [kat] HMAC-384Kdf
907,646 UART: [kat] LMS
1,475,842 UART: [kat] --
1,476,703 UART: [cold-reset] ++
1,477,279 UART: [fht] Storing FHT @ 0x50003400
1,480,166 UART: [idev] ++
1,480,334 UART: [idev] CDI.KEYID = 6
1,480,694 UART: [idev] SUBJECT.KEYID = 7
1,481,118 UART: [idev] UDS.KEYID = 0
1,481,463 ready_for_fw is high
1,481,463 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,212 UART: [idev] Erasing UDS.KEYID = 0
1,505,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,388 UART: [idev] --
1,515,507 UART: [ldev] ++
1,515,675 UART: [ldev] CDI.KEYID = 6
1,516,038 UART: [ldev] SUBJECT.KEYID = 5
1,516,464 UART: [ldev] AUTHORITY.KEYID = 7
1,516,927 UART: [ldev] FE.KEYID = 1
1,521,827 UART: [ldev] Erasing FE.KEYID = 1
1,547,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,986 UART: [ldev] --
1,586,483 UART: [fwproc] Waiting for Commands...
1,587,150 UART: [fwproc] Received command 0x46574c44
1,587,941 UART: [fwproc] Received Image of size 114084 bytes
2,883,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,288 >>> mbox cmd response: success
3,076,288 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,396 UART: [afmc] ++
3,077,564 UART: [afmc] CDI.KEYID = 6
3,077,926 UART: [afmc] SUBJECT.KEYID = 7
3,078,351 UART: [afmc] AUTHORITY.KEYID = 5
3,114,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,664 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,057 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,747 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,574 UART: [afmc] --
3,157,484 UART: [cold-reset] --
3,158,212 UART: [state] Locking Datavault
3,159,543 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,147 UART: [state] Locking ICCM
3,160,781 UART: [exit] Launching FMC @ 0x40000130
3,166,110 UART:
3,166,126 UART: Running Caliptra FMC ...
3,166,534 UART:
3,166,588 UART: [state] CFI Enabled
3,177,087 UART: [fht] FMC Alias Private Key: 7
3,285,706 UART: [art] Extend RT PCRs Done
3,286,134 UART: [art] Lock RT PCRs Done
3,287,702 UART: [art] Populate DV Done
3,296,091 UART: [fht] FMC Alias Private Key: 7
3,297,023 UART: [art] Derive CDI
3,297,303 UART: [art] Store in in slot 0x4
3,382,972 UART: [art] Derive Key Pair
3,383,332 UART: [art] Store priv key in slot 0x5
3,396,878 UART: [art] Derive Key Pair - Done
3,411,548 UART: [art] Signing Cert with AUTHO
3,412,028 UART: RITY.KEYID = 7
3,427,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,351 UART: [art] PUB.X = 10E9A5945A088ECC31B1AB131604FFCCA375F44BD37C76C061B807B8001B789FFA3D8502526F9CEA6FAD75D0C76A1A5B
3,435,101 UART: [art] PUB.Y = D4BEC69EF26BA04DA59FF77F2B7A68EB721BC72A2AEF9252EE3457F5409FDCFF5F0742804BEF3763A8CF75464137CCCC
3,442,070 UART: [art] SIG.R = E68B7344F7628235224321EE774A39347D34480B32C0B8A7B53377AC8D4CBB643D1F07DD837BEB872A11E13345B9AE27
3,448,832 UART: [art] SIG.S = 1C9A83B558A398A3A538E49198E8009A9D7586A72E2C3F8A91919B29171891E4CF2177572B7F4D988686B06A8293B019
3,472,255 UART: Caliptra RT
3,472,508 UART: [state] CFI Enabled
3,580,471 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,465 UART: [rt]cmd =0x54514754, len=24
3,613,523 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,867 ready_for_fw is high
1,362,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,466 >>> mbox cmd response: success
2,925,466 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,582 UART:
2,987,598 UART: Running Caliptra FMC ...
2,988,006 UART:
2,988,060 UART: [state] CFI Enabled
2,998,391 UART: [fht] FMC Alias Private Key: 7
3,106,148 UART: [art] Extend RT PCRs Done
3,106,576 UART: [art] Lock RT PCRs Done
3,108,028 UART: [art] Populate DV Done
3,116,353 UART: [fht] FMC Alias Private Key: 7
3,117,377 UART: [art] Derive CDI
3,117,657 UART: [art] Store in in slot 0x4
3,203,616 UART: [art] Derive Key Pair
3,203,976 UART: [art] Store priv key in slot 0x5
3,216,740 UART: [art] Derive Key Pair - Done
3,231,616 UART: [art] Signing Cert with AUTHO
3,232,096 UART: RITY.KEYID = 7
3,246,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,413 UART: [art] PUB.X = 5210DE87222C6FE155CB1361632BB0A04E735F84DA8CCFF3BF7EA446820E80BDB27B31114AD4B64805A1CBDA324E3DC8
3,254,191 UART: [art] PUB.Y = DE1CBF7F6B7E1EA61B5F9F2BE041A7C3A805D4361523484177BE3D4C9601D7B0FE7F51911CBB111F875B6326FC8C71E2
3,261,147 UART: [art] SIG.R = F064BB4D1DCE8DA31FFBCE169B80CB115FEC8EBC0DD65EF27B270AFC0E7B42B657F710F3D6D9A7FABA51E5709974E51E
3,267,938 UART: [art] SIG.S = 302E5FCE4A3A954FF8A889B3F50E5BD9A8A8D3C4BAB9216230216B15F5DAB638BD5BB5F0BCA49F1335B77401D4440B09
3,292,341 UART: Caliptra RT
3,292,594 UART: [state] CFI Enabled
3,401,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,211 UART: [rt]cmd =0x54514754, len=24
3,434,025 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,203 UART: [kat] SHA2-512-ACC
897,104 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,477,010 UART: [fht] Storing FHT @ 0x50003400
1,479,843 UART: [idev] ++
1,480,011 UART: [idev] CDI.KEYID = 6
1,480,371 UART: [idev] SUBJECT.KEYID = 7
1,480,795 UART: [idev] UDS.KEYID = 0
1,481,140 ready_for_fw is high
1,481,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,693 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,077 UART: [idev] --
1,515,018 UART: [ldev] ++
1,515,186 UART: [ldev] CDI.KEYID = 6
1,515,549 UART: [ldev] SUBJECT.KEYID = 5
1,515,975 UART: [ldev] AUTHORITY.KEYID = 7
1,516,438 UART: [ldev] FE.KEYID = 1
1,521,872 UART: [ldev] Erasing FE.KEYID = 1
1,547,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,154 UART: [fwproc] Waiting for Commands...
1,588,015 UART: [fwproc] Received command 0x46574c44
1,588,806 UART: [fwproc] Received Image of size 114084 bytes
2,883,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,649 >>> mbox cmd response: success
3,075,649 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,897 UART: [afmc] ++
3,077,065 UART: [afmc] CDI.KEYID = 6
3,077,427 UART: [afmc] SUBJECT.KEYID = 7
3,077,852 UART: [afmc] AUTHORITY.KEYID = 5
3,112,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,703 UART: [afmc] --
3,155,779 UART: [cold-reset] --
3,156,325 UART: [state] Locking Datavault
3,157,454 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,058 UART: [state] Locking ICCM
3,158,578 UART: [exit] Launching FMC @ 0x40000130
3,163,907 UART:
3,163,923 UART: Running Caliptra FMC ...
3,164,331 UART:
3,164,474 UART: [state] CFI Enabled
3,174,731 UART: [fht] FMC Alias Private Key: 7
3,282,796 UART: [art] Extend RT PCRs Done
3,283,224 UART: [art] Lock RT PCRs Done
3,285,214 UART: [art] Populate DV Done
3,293,545 UART: [fht] FMC Alias Private Key: 7
3,294,599 UART: [art] Derive CDI
3,294,879 UART: [art] Store in in slot 0x4
3,380,608 UART: [art] Derive Key Pair
3,380,968 UART: [art] Store priv key in slot 0x5
3,394,080 UART: [art] Derive Key Pair - Done
3,408,961 UART: [art] Signing Cert with AUTHO
3,409,441 UART: RITY.KEYID = 7
3,424,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,470 UART: [art] PUB.X = AC3A49774F21816B705BCA56D2D87BC5B16E1C3371E495B8EC16D67436B99D0BC28AE013EE251F6BE460790486C8123C
3,432,238 UART: [art] PUB.Y = 2FD352F200024E706FF2DFCDB44D6168C37B06A27D3A9EEAE7841B0F5B1737926025FAB076DF52484322E62479B028E9
3,439,159 UART: [art] SIG.R = E084841AED797EED48142A1AEFE7BDCD23997585FE941DB5892D50D7993FDE975ECDA7CA05E64BA0EABC73C0F9B78D97
3,445,948 UART: [art] SIG.S = 727A4EC4A80A428039278DDC9CEFF21F336541D59BA68E3A5F938B14B53C6045563F6B9B85CFD67C84230ACF490D9E6D
3,469,832 UART: Caliptra RT
3,470,177 UART: [state] CFI Enabled
3,578,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,272 UART: [rt]cmd =0x54514754, len=24
3,611,034 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 ready_for_fw is high
1,362,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,567 >>> mbox cmd response: success
2,925,567 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,171 UART:
2,987,187 UART: Running Caliptra FMC ...
2,987,595 UART:
2,987,738 UART: [state] CFI Enabled
2,998,175 UART: [fht] FMC Alias Private Key: 7
3,106,294 UART: [art] Extend RT PCRs Done
3,106,722 UART: [art] Lock RT PCRs Done
3,108,256 UART: [art] Populate DV Done
3,116,505 UART: [fht] FMC Alias Private Key: 7
3,117,639 UART: [art] Derive CDI
3,117,919 UART: [art] Store in in slot 0x4
3,203,638 UART: [art] Derive Key Pair
3,203,998 UART: [art] Store priv key in slot 0x5
3,217,920 UART: [art] Derive Key Pair - Done
3,232,692 UART: [art] Signing Cert with AUTHO
3,233,172 UART: RITY.KEYID = 7
3,248,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,275 UART: [art] PUB.X = 52F37E30AF4528AACAB3E4615062139D1DBE9D119D50817FAABD25E1D61D86CEE69C0DA1524A188345D2C89F4D00A846
3,256,030 UART: [art] PUB.Y = C4D8300BC998938BD55CD80829E34DCEC53F69A8C4FD829CA3C88EB5E46BBEB766D53FA13E3303CACAA0E65A5AFCBCEF
3,263,001 UART: [art] SIG.R = 056DF2B416E5E6C5C3230692675DB18210D8E6AA74CEB9E2097C2C0CF771ACC87BC49A680E37F70C02638DE6D5B8C366
3,269,758 UART: [art] SIG.S = ED46941F031A1F100B9EC7DCBE389C9F511BED1FFD16D69005EF9785F60BDBF59657C4ED5B1CE251C19A8788CEC77BDC
3,293,335 UART: Caliptra RT
3,293,680 UART: [state] CFI Enabled
3,402,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,281 UART: [rt]cmd =0x54514754, len=24
3,435,251 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,198 UART: [kat] SHA2-512-ACC
908,099 UART: [kat] ECC-384
917,612 UART: [kat] HMAC-384Kdf
922,388 UART: [kat] LMS
1,170,716 UART: [kat] --
1,171,509 UART: [cold-reset] ++
1,171,951 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 ready_for_fw is high
1,176,017 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,858 UART: [idev] Erasing UDS.KEYID = 0
1,200,855 UART: [idev] Sha1 KeyId Algorithm
1,209,297 UART: [idev] --
1,210,297 UART: [ldev] ++
1,210,465 UART: [ldev] CDI.KEYID = 6
1,210,828 UART: [ldev] SUBJECT.KEYID = 5
1,211,254 UART: [ldev] AUTHORITY.KEYID = 7
1,211,717 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,243,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,282,974 UART: [fwproc] Wait for Commands...
1,283,728 UART: [fwproc] Recv command 0x46574c44
1,284,456 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,425 >>> mbox cmd response: success
2,770,425 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,673 UART: [afmc] ++
2,771,841 UART: [afmc] CDI.KEYID = 6
2,772,203 UART: [afmc] SUBJECT.KEYID = 7
2,772,628 UART: [afmc] AUTHORITY.KEYID = 5
2,808,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,056 UART: [afmc] --
2,852,042 UART: [cold-reset] --
2,852,850 UART: [state] Locking Datavault
2,853,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,535 UART: [state] Locking ICCM
2,855,011 UART: [exit] Launching FMC @ 0x40000130
2,860,340 UART:
2,860,356 UART: Running Caliptra FMC ...
2,860,764 UART:
2,860,818 UART: [state] CFI Enabled
2,871,163 UART: [fht] FMC Alias Private Key: 7
2,979,552 UART: [art] Extend RT PCRs Done
2,979,980 UART: [art] Lock RT PCRs Done
2,981,254 UART: [art] Populate DV Done
2,989,689 UART: [fht] FMC Alias Private Key: 7
2,990,617 UART: [art] Derive CDI
2,990,897 UART: [art] Store in in slot 0x4
3,076,526 UART: [art] Derive Key Pair
3,076,886 UART: [art] Store priv key in slot 0x5
3,089,868 UART: [art] Derive Key Pair - Done
3,104,936 UART: [art] Signing Cert with AUTHO
3,105,416 UART: RITY.KEYID = 7
3,120,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,215 UART: [art] PUB.X = 2B44B3E7D6BC5E75E26580E337420863DECED929832A3E7A0287174BFEFE05630F75517E46B7B9442A0B7E11C18A362B
3,127,972 UART: [art] PUB.Y = C94DCD9A4B25A8D75CE3E538FED381112DA107FDC722C225FC618B93A18431148D76E1638EA09994E51392202E441A37
3,134,919 UART: [art] SIG.R = 9CA910AC58339AA5394585EF2C06D859630E1B611755C3E4AC47B6573140F31D91546AFA938BD6369AC3879E6F16D0F2
3,141,681 UART: [art] SIG.S = F6B031460E9562D41AF46330AC19BB5EA86D36BE4DCDEC93354AD6CCFAF9C028B3914809E74E95FB5FBCFEF6F038908F
3,165,334 UART: Caliptra RT
3,165,587 UART: [state] CFI Enabled
3,272,441 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,705 UART: [rt]cmd =0x54514754, len=24
3,304,817 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,305 ready_for_fw is high
1,060,305 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,460 >>> mbox cmd response: success
2,622,460 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,518 UART:
2,684,534 UART: Running Caliptra FMC ...
2,684,942 UART:
2,684,996 UART: [state] CFI Enabled
2,695,341 UART: [fht] FMC Alias Private Key: 7
2,803,136 UART: [art] Extend RT PCRs Done
2,803,564 UART: [art] Lock RT PCRs Done
2,804,948 UART: [art] Populate DV Done
2,813,225 UART: [fht] FMC Alias Private Key: 7
2,814,295 UART: [art] Derive CDI
2,814,575 UART: [art] Store in in slot 0x4
2,900,652 UART: [art] Derive Key Pair
2,901,012 UART: [art] Store priv key in slot 0x5
2,913,846 UART: [art] Derive Key Pair - Done
2,928,689 UART: [art] Signing Cert with AUTHO
2,929,169 UART: RITY.KEYID = 7
2,944,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,224 UART: [art] PUB.X = 8BCB3BAA035212294C1BF0A0EC6D4C1B265A43C2CAC4788CF4C40634304F311A99E9C540C7D0188D8A1AE3D87060EFF6
2,952,000 UART: [art] PUB.Y = A815899D53C754A38445EABF5752EADD61D974DD4D08253B6B89435BBD8D89DB9597E5261A430B4E8BA7198A58F47D7B
2,958,950 UART: [art] SIG.R = D269CB4DD8FACD0C1ACC93E713F7715A6232D255C639AF02CC35FD830869733DC6A2D1D7F3648E7E111D16D94E4DC195
2,965,723 UART: [art] SIG.S = C5973AA9B2EEFF6632612C43F09273BC7C271EA5F65FD98276AF4D98BE6F82DA0C4B30B76D0A6A8DE192C45311DCA363
2,989,766 UART: Caliptra RT
2,990,019 UART: [state] CFI Enabled
3,097,991 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,381 UART: [rt]cmd =0x54514754, len=24
3,130,243 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,762 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 ready_for_fw is high
1,176,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,410 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,211,018 UART: [ldev] ++
1,211,186 UART: [ldev] CDI.KEYID = 6
1,211,549 UART: [ldev] SUBJECT.KEYID = 5
1,211,975 UART: [ldev] AUTHORITY.KEYID = 7
1,212,438 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,243,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,788 UART: [ldev] --
1,283,163 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,585 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,032 >>> mbox cmd response: success
2,772,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,066 UART: [afmc] ++
2,773,234 UART: [afmc] CDI.KEYID = 6
2,773,596 UART: [afmc] SUBJECT.KEYID = 7
2,774,021 UART: [afmc] AUTHORITY.KEYID = 5
2,810,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,236 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,735 UART: [afmc] --
2,853,757 UART: [cold-reset] --
2,854,385 UART: [state] Locking Datavault
2,855,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,316 UART: [state] Locking ICCM
2,856,900 UART: [exit] Launching FMC @ 0x40000130
2,862,229 UART:
2,862,245 UART: Running Caliptra FMC ...
2,862,653 UART:
2,862,796 UART: [state] CFI Enabled
2,873,423 UART: [fht] FMC Alias Private Key: 7
2,981,746 UART: [art] Extend RT PCRs Done
2,982,174 UART: [art] Lock RT PCRs Done
2,983,552 UART: [art] Populate DV Done
2,991,841 UART: [fht] FMC Alias Private Key: 7
2,992,865 UART: [art] Derive CDI
2,993,145 UART: [art] Store in in slot 0x4
3,078,716 UART: [art] Derive Key Pair
3,079,076 UART: [art] Store priv key in slot 0x5
3,092,386 UART: [art] Derive Key Pair - Done
3,107,194 UART: [art] Signing Cert with AUTHO
3,107,674 UART: RITY.KEYID = 7
3,122,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,719 UART: [art] PUB.X = C977A4BB23F242E098DC5FE18C63A2D6F3669DB8E0E74A9CCFA1C06DD5F4CB75C7D2FC7260F27CDE8B181F5D00A941D2
3,130,489 UART: [art] PUB.Y = 60AAA0D744AA08E5E041E30BEDD7B8FBE88983602E1A931CC141DD9AC6269D612A13714E871D2FD2D5F56001D30A85CB
3,137,439 UART: [art] SIG.R = 8B8D562A7D9B432043FC0962D4889BE605DE394CFEFFA8238D842C26561AAA50CBFD8B80954649F049F7A0E8D7F4B6CF
3,144,215 UART: [art] SIG.S = 8EF8FA9DEEEB6DEC5EC930D8C5421A36C0228E76BEFAF451D219A60816F54AA226BA55A351911D279695E434CFAB8624
3,167,705 UART: Caliptra RT
3,168,050 UART: [state] CFI Enabled
3,276,504 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,036 UART: [rt]cmd =0x54514754, len=24
3,308,846 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,554 ready_for_fw is high
1,060,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,003 >>> mbox cmd response: success
2,622,003 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,473 UART:
2,683,489 UART: Running Caliptra FMC ...
2,683,897 UART:
2,684,040 UART: [state] CFI Enabled
2,694,503 UART: [fht] FMC Alias Private Key: 7
2,802,338 UART: [art] Extend RT PCRs Done
2,802,766 UART: [art] Lock RT PCRs Done
2,804,360 UART: [art] Populate DV Done
2,812,461 UART: [fht] FMC Alias Private Key: 7
2,813,507 UART: [art] Derive CDI
2,813,787 UART: [art] Store in in slot 0x4
2,899,708 UART: [art] Derive Key Pair
2,900,068 UART: [art] Store priv key in slot 0x5
2,913,282 UART: [art] Derive Key Pair - Done
2,928,162 UART: [art] Signing Cert with AUTHO
2,928,642 UART: RITY.KEYID = 7
2,943,926 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,691 UART: [art] PUB.X = 3D74DE879ADB678F91834D69AEF2F6DE6FE20180CE704FC1834BDD103C22FDFA3841FB29A60A425F5DECABFE7FC3F47F
2,951,481 UART: [art] PUB.Y = D1EA55D6DE0D0A71815E69D7EEF5C1E62ACD89663B3F71F6DC91BC56D429C506ABCF89EB7D248971219FB7C0EFF41635
2,958,440 UART: [art] SIG.R = 4BAA4A6CE7B6F1B994232C49DD22F79BC3C1AA232C7E1ADA4ED8F33D0FEAADAFDD54E4FD6BBDC9A985D2EE7D51D5A3CD
2,965,249 UART: [art] SIG.S = 6FF0DE8D3E3869928D3452A9F7FD9B96078A57EEAC6EE947FF1D7D769F5B26E49C9399180044FD2EDAB476755D047308
2,988,793 UART: Caliptra RT
2,989,138 UART: [state] CFI Enabled
3,097,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,595 UART: [rt]cmd =0x54514754, len=24
3,130,451 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,252 UART: [kat] SHA2-256
891,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,931 UART: [kat] ++
896,083 UART: [kat] sha1
900,451 UART: [kat] SHA2-256
902,391 UART: [kat] SHA2-384
905,102 UART: [kat] SHA2-512-ACC
907,003 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,413 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,138 UART: [ldev] ++
1,208,306 UART: [ldev] CDI.KEYID = 6
1,208,670 UART: [ldev] SUBJECT.KEYID = 5
1,209,097 UART: [ldev] AUTHORITY.KEYID = 7
1,209,560 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,406 UART: [ldev] --
1,279,758 UART: [fwproc] Wait for Commands...
1,280,351 UART: [fwproc] Recv command 0x46574c44
1,281,084 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,101 >>> mbox cmd response: success
2,768,101 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,769,192 UART: [afmc] ++
2,769,360 UART: [afmc] CDI.KEYID = 6
2,769,723 UART: [afmc] SUBJECT.KEYID = 7
2,770,149 UART: [afmc] AUTHORITY.KEYID = 5
2,805,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,962 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,564 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,551 UART: [afmc] --
2,849,659 UART: [cold-reset] --
2,850,487 UART: [state] Locking Datavault
2,851,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,312 UART: [state] Locking ICCM
2,852,984 UART: [exit] Launching FMC @ 0x40000130
2,858,313 UART:
2,858,329 UART: Running Caliptra FMC ...
2,858,737 UART:
2,858,791 UART: [state] CFI Enabled
2,869,446 UART: [fht] FMC Alias Private Key: 7
2,977,325 UART: [art] Extend RT PCRs Done
2,977,753 UART: [art] Lock RT PCRs Done
2,979,575 UART: [art] Populate DV Done
2,987,670 UART: [fht] FMC Alias Private Key: 7
2,988,760 UART: [art] Derive CDI
2,989,040 UART: [art] Store in in slot 0x4
3,074,805 UART: [art] Derive Key Pair
3,075,165 UART: [art] Store priv key in slot 0x5
3,088,509 UART: [art] Derive Key Pair - Done
3,103,072 UART: [art] Signing Cert with AUTHO
3,103,552 UART: RITY.KEYID = 7
3,118,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,351 UART: [art] PUB.X = C9AE413392165E3C17A3A05D4F4D0A371D4314D58C81B3FD08439CC143A6AE274196BCC1B308BB1CDA16EC35572D93CE
3,126,122 UART: [art] PUB.Y = C0836394FDC36A2885FA95AE0D4A3943F2A9ECF627D67013A46B991506961521F3145A0CA102C53022E787724AF06D32
3,133,054 UART: [art] SIG.R = EE56BBDB0614EF6BC710F55B01172F2CA36C244B955832EB171CE8BC596B61F29F4A5E8DBDF823C0692AE675556C85C8
3,139,830 UART: [art] SIG.S = E51F170FC3ACEB8850FBDEFC9B51644657734D90101177F9C6907B8895681117C3893E7B91157CA37562BD44637EC09A
3,163,782 UART: Caliptra RT
3,164,035 UART: [state] CFI Enabled
3,272,671 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,521 UART: [rt]cmd =0x54514754, len=24
3,305,397 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,676 ready_for_fw is high
1,055,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,653 >>> mbox cmd response: success
2,617,653 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,679,817 UART:
2,679,833 UART: Running Caliptra FMC ...
2,680,241 UART:
2,680,295 UART: [state] CFI Enabled
2,690,832 UART: [fht] FMC Alias Private Key: 7
2,798,789 UART: [art] Extend RT PCRs Done
2,799,217 UART: [art] Lock RT PCRs Done
2,800,779 UART: [art] Populate DV Done
2,808,982 UART: [fht] FMC Alias Private Key: 7
2,809,910 UART: [art] Derive CDI
2,810,190 UART: [art] Store in in slot 0x4
2,895,385 UART: [art] Derive Key Pair
2,895,745 UART: [art] Store priv key in slot 0x5
2,908,859 UART: [art] Derive Key Pair - Done
2,923,504 UART: [art] Signing Cert with AUTHO
2,923,984 UART: RITY.KEYID = 7
2,939,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,167 UART: [art] PUB.X = 8D4A1D122F19FA6547A7A22DC2346F47D4EEB5038AB305B1EAB95D4643011AB2BD02F2668A2A989B67FBA3358F65A8F1
2,946,935 UART: [art] PUB.Y = 3AF63DC0A5D1774E5B1335A7DA9C7064CB87D2EFE379986161D24D065381E4CAB3C16C05A573B9D9DA5204ABEF02A771
2,953,883 UART: [art] SIG.R = 31E0ED471397E8E8CD8BE814058C21ACFC702141D2607734692493DED8B06038326D2369C1EAC11B7872A7AC4D100784
2,960,643 UART: [art] SIG.S = 809447C07F29DE8B4B71076B1A4E184E1452F2B4529302D2BBFEE6DF073CA07016E1C9B4E7231BD8FD92CB8577BF3098
2,984,595 UART: Caliptra RT
2,984,848 UART: [state] CFI Enabled
3,092,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,151 UART: [rt]cmd =0x54514754, len=24
3,124,969 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,445 UART: [kat] LMS
1,169,757 UART: [kat] --
1,170,652 UART: [cold-reset] ++
1,171,194 UART: [fht] FHT @ 0x50003400
1,173,894 UART: [idev] ++
1,174,062 UART: [idev] CDI.KEYID = 6
1,174,423 UART: [idev] SUBJECT.KEYID = 7
1,174,848 UART: [idev] UDS.KEYID = 0
1,175,194 ready_for_fw is high
1,175,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,028 UART: [idev] Erasing UDS.KEYID = 0
1,200,282 UART: [idev] Sha1 KeyId Algorithm
1,209,228 UART: [idev] --
1,210,411 UART: [ldev] ++
1,210,579 UART: [ldev] CDI.KEYID = 6
1,210,943 UART: [ldev] SUBJECT.KEYID = 5
1,211,370 UART: [ldev] AUTHORITY.KEYID = 7
1,211,833 UART: [ldev] FE.KEYID = 1
1,217,299 UART: [ldev] Erasing FE.KEYID = 1
1,243,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,403 UART: [fwproc] Wait for Commands...
1,283,096 UART: [fwproc] Recv command 0x46574c44
1,283,829 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,358 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,794 >>> mbox cmd response: success
2,769,794 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,981 UART: [afmc] ++
2,771,149 UART: [afmc] CDI.KEYID = 6
2,771,512 UART: [afmc] SUBJECT.KEYID = 7
2,771,938 UART: [afmc] AUTHORITY.KEYID = 5
2,808,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,738 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,878 UART: [afmc] --
2,852,008 UART: [cold-reset] --
2,852,666 UART: [state] Locking Datavault
2,853,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,387 UART: [state] Locking ICCM
2,854,869 UART: [exit] Launching FMC @ 0x40000130
2,860,198 UART:
2,860,214 UART: Running Caliptra FMC ...
2,860,622 UART:
2,860,765 UART: [state] CFI Enabled
2,871,450 UART: [fht] FMC Alias Private Key: 7
2,979,889 UART: [art] Extend RT PCRs Done
2,980,317 UART: [art] Lock RT PCRs Done
2,981,867 UART: [art] Populate DV Done
2,990,012 UART: [fht] FMC Alias Private Key: 7
2,991,104 UART: [art] Derive CDI
2,991,384 UART: [art] Store in in slot 0x4
3,077,231 UART: [art] Derive Key Pair
3,077,591 UART: [art] Store priv key in slot 0x5
3,090,785 UART: [art] Derive Key Pair - Done
3,105,755 UART: [art] Signing Cert with AUTHO
3,106,235 UART: RITY.KEYID = 7
3,121,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,666 UART: [art] PUB.X = E911EED7CA0DFFAB4C03750BFD7330E7C6D8EE3D204D456F696365BBCC4F229187B728CB5A9AD1D7709056137413CF0A
3,129,438 UART: [art] PUB.Y = 81A8A8D391E27E94A7A0B89371EF1E5D200D270250D20D6005B3A09F4C1293445FD7D65567B72E1C7795CEED812739FD
3,136,376 UART: [art] SIG.R = 2AA8B274D9DC63D941205789E5A0F8817ACF0CC7B9E6A69C348D2CA3B3DB5DC0C513ABA7543F5F93FCC60C9609F72921
3,143,151 UART: [art] SIG.S = F546BFE0234E15B8A38251377689F83BC273D35D2E335B27D352C819372407F0EC11BB37DC8CF1F9753E7CF5A6B32316
3,166,605 UART: Caliptra RT
3,166,950 UART: [state] CFI Enabled
3,275,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,161 UART: [rt]cmd =0x54514754, len=24
3,308,155 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,683 ready_for_fw is high
1,056,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,656 >>> mbox cmd response: success
2,620,656 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,582 UART:
2,682,598 UART: Running Caliptra FMC ...
2,683,006 UART:
2,683,149 UART: [state] CFI Enabled
2,693,692 UART: [fht] FMC Alias Private Key: 7
2,801,217 UART: [art] Extend RT PCRs Done
2,801,645 UART: [art] Lock RT PCRs Done
2,802,901 UART: [art] Populate DV Done
2,811,034 UART: [fht] FMC Alias Private Key: 7
2,812,206 UART: [art] Derive CDI
2,812,486 UART: [art] Store in in slot 0x4
2,898,207 UART: [art] Derive Key Pair
2,898,567 UART: [art] Store priv key in slot 0x5
2,912,349 UART: [art] Derive Key Pair - Done
2,927,097 UART: [art] Signing Cert with AUTHO
2,927,577 UART: RITY.KEYID = 7
2,943,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,882 UART: [art] PUB.X = 35E862A99286CBEF365F787FBF059977E36262E089610160918D1B74320944DED9B6DD3EB49497C373BEB3AB4577900B
2,950,636 UART: [art] PUB.Y = E34E1FDB4E6DEBE860739474914E9F4ADAD9C645480DE1E5C22C88E660A7565BE0F98DF1D70969AA5124042391C16F0A
2,957,582 UART: [art] SIG.R = 7EC308096826C2377F9220A125639B53CC77A107FAFA248DAD8A2D050939B1053D1C63751CEDA30BD067BB08A67D5767
2,964,328 UART: [art] SIG.S = 10D199F3DF94299C43BA92A3EC23A594D8815A8FC62F76DC75EABF9EC9B8E640FB4B5D471F3C0D2D8F648148C77CB53D
2,988,088 UART: Caliptra RT
2,988,433 UART: [state] CFI Enabled
3,096,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,044 UART: [rt]cmd =0x54514754, len=24
3,129,078 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,104 UART:
192,485 UART: Running Caliptra ROM ...
193,575 UART:
193,718 UART: [state] CFI Enabled
266,267 UART: [state] LifecycleState = Unprovisioned
268,269 UART: [state] DebugLocked = No
270,077 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,162 UART: [kat] SHA2-256
443,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,402 UART: [kat] ++
454,850 UART: [kat] sha1
466,714 UART: [kat] SHA2-256
469,365 UART: [kat] SHA2-384
475,782 UART: [kat] SHA2-512-ACC
478,150 UART: [kat] ECC-384
2,765,854 UART: [kat] HMAC-384Kdf
2,799,137 UART: [kat] LMS
3,989,419 UART: [kat] --
3,992,512 UART: [cold-reset] ++
3,994,732 UART: [fht] Storing FHT @ 0x50003400
4,006,158 UART: [idev] ++
4,006,781 UART: [idev] CDI.KEYID = 6
4,007,701 UART: [idev] SUBJECT.KEYID = 7
4,008,943 UART: [idev] UDS.KEYID = 0
4,009,925 ready_for_fw is high
4,010,134 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,315 UART: [idev] Erasing UDS.KEYID = 0
7,350,983 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,677 UART: [idev] --
7,377,210 UART: [ldev] ++
7,377,777 UART: [ldev] CDI.KEYID = 6
7,378,741 UART: [ldev] SUBJECT.KEYID = 5
7,379,954 UART: [ldev] AUTHORITY.KEYID = 7
7,381,183 UART: [ldev] FE.KEYID = 1
7,425,375 UART: [ldev] Erasing FE.KEYID = 1
10,760,398 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,073,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,281 UART: [ldev] --
13,140,250 UART: [fwproc] Waiting for Commands...
13,143,532 UART: [fwproc] Received command 0x46574c44
13,145,769 UART: [fwproc] Received Image of size 113760 bytes
17,187,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,645 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,644,098 >>> mbox cmd response: success
17,644,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,647,392 UART: [afmc] ++
17,648,040 UART: [afmc] CDI.KEYID = 6
17,648,956 UART: [afmc] SUBJECT.KEYID = 7
17,650,192 UART: [afmc] AUTHORITY.KEYID = 5
21,013,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,892 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,311 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,143 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,567 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,332 UART: [afmc] --
23,381,325 UART: [cold-reset] --
23,384,560 UART: [state] Locking Datavault
23,389,690 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,448 UART: [state] Locking ICCM
23,393,947 UART: [exit] Launching FMC @ 0x40000130
23,402,388 UART:
23,402,631 UART: Running Caliptra FMC ...
23,403,733 UART:
23,403,912 UART: [state] CFI Enabled
23,471,417 UART: [fht] FMC Alias Private Key: 7
25,809,677 UART: [art] Extend RT PCRs Done
25,810,896 UART: [art] Lock RT PCRs Done
25,812,793 UART: [art] Populate DV Done
25,818,420 UART: [fht] FMC Alias Private Key: 7
25,820,064 UART: [art] Derive CDI
25,820,881 UART: [art] Store in in slot 0x4
25,880,479 UART: [art] Derive Key Pair
25,881,518 UART: [art] Store priv key in slot 0x5
29,174,891 UART: [art] Derive Key Pair - Done
29,187,670 UART: [art] Signing Cert with AUTHO
29,188,976 UART: RITY.KEYID = 7
31,477,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,965 UART: [art] PUB.X = 8E4C7F9CD9C4C754DABF9CE0448B166D56F1FB67C8289595E383EF24BF5237A08FB9DA12A66334B4FB21D533BC3A490C
31,486,203 UART: [art] PUB.Y = AA8016B2F4454B4AA53AA144BEB08D2B224703B9EB0F0BE73F41EBE73926E486C0AF0D0D156AD42D2C84DE2942446EA4
31,493,445 UART: [art] SIG.R = 306A64C3F075B7266DFBA08AAC945B24243C3825EAA49BD85E2913935B97AFC50CA2255D3E505DCDCD86EE5045271866
31,500,840 UART: [art] SIG.S = 2253947D2E4653DBB63390E3CF17B550949C0C72BD2902CA94DA0B63C32518A29E7A64F2053F4B81092FD27A8C760632
32,806,699 UART: Caliptra RT
32,807,408 UART: [state] CFI Enabled
32,968,296 UART: [rt] RT listening for mailbox commands...
32,999,866 UART: [rt]cmd =0x44504543, len=96
33,048,820 >>> mbox cmd response data (56 bytes)
33,050,183 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,080,023 UART: [rt]cmd =0x54514754, len=24
33,082,371 >>> mbox cmd response: failed
33,082,806 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,112,770 UART: [rt]cmd =0x54514754, len=24
33,114,936 >>> mbox cmd response data (8 bytes)
33,115,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,145,868 UART: [rt]cmd =0x44504543, len=96
33,197,686 >>> mbox cmd response data (56 bytes)
33,198,408 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,227,977 UART: [rt]cmd =0x47544744, len=8
33,230,838 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,819,573 ready_for_fw is high
3,819,977 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,897,313 >>> mbox cmd response: success
17,898,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,579,106 UART:
23,579,501 UART: Running Caliptra FMC ...
23,580,617 UART:
23,580,781 UART: [state] CFI Enabled
23,649,024 UART: [fht] FMC Alias Private Key: 7
25,987,441 UART: [art] Extend RT PCRs Done
25,988,668 UART: [art] Lock RT PCRs Done
25,990,457 UART: [art] Populate DV Done
25,995,926 UART: [fht] FMC Alias Private Key: 7
25,997,524 UART: [art] Derive CDI
25,998,340 UART: [art] Store in in slot 0x4
26,057,255 UART: [art] Derive Key Pair
26,058,307 UART: [art] Store priv key in slot 0x5
29,350,982 UART: [art] Derive Key Pair - Done
29,363,657 UART: [art] Signing Cert with AUTHO
29,364,967 UART: RITY.KEYID = 7
31,652,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,654,228 UART: [art] PUB.X = B5C9ACCC5125B0675221DB54CB04C1745E8AE0E2533F0178A7D1D4C2C6D35E4B7D5AE256C332E8E69CAD4F1B215255A9
31,661,494 UART: [art] PUB.Y = 5B048D2AC9890E63B49396FB95B28EEAB7E1EB2817EBAD4742A8C54DF01B75EB92B45CBD4E3A0DAC28ED3B8632AB3BDD
31,668,794 UART: [art] SIG.R = 7E82978A72D77FA1B5C50DA3F3B4BA626022D8FBFD91EE22F2583C4D97FCC12E9FD8D664C7BFECF81E7C2DA09414151E
31,676,190 UART: [art] SIG.S = 0B4568AC0FD9D31DC0AA86997B3A7131A4714E9EE836BF13A3304B56966C414B3F4ADB69AB02CEACADB6F586F0EB4C26
32,981,617 UART: Caliptra RT
32,982,337 UART: [state] CFI Enabled
33,144,130 UART: [rt] RT listening for mailbox commands...
33,176,188 UART: [rt]cmd =0x44504543, len=96
33,224,012 >>> mbox cmd response data (56 bytes)
33,225,420 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,255,421 UART: [rt]cmd =0x54514754, len=24
33,257,870 >>> mbox cmd response: failed
33,258,302 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,288,096 UART: [rt]cmd =0x54514754, len=24
33,290,530 >>> mbox cmd response data (8 bytes)
33,291,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,321,458 UART: [rt]cmd =0x44504543, len=96
33,372,943 >>> mbox cmd response data (56 bytes)
33,373,639 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,403,541 UART: [rt]cmd =0x47544744, len=8
33,406,454 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,617 writing to cptra_bootfsm_go
193,008 UART:
193,398 UART: Running Caliptra ROM ...
194,598 UART:
604,191 UART: [state] CFI Enabled
618,428 UART: [state] LifecycleState = Unprovisioned
620,370 UART: [state] DebugLocked = No
622,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,734 UART: [kat] SHA2-256
796,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,024 UART: [kat] ++
807,476 UART: [kat] sha1
818,772 UART: [kat] SHA2-256
821,416 UART: [kat] SHA2-384
827,540 UART: [kat] SHA2-512-ACC
829,909 UART: [kat] ECC-384
3,113,760 UART: [kat] HMAC-384Kdf
3,125,288 UART: [kat] LMS
4,315,430 UART: [kat] --
4,318,111 UART: [cold-reset] ++
4,319,200 UART: [fht] Storing FHT @ 0x50003400
4,330,084 UART: [idev] ++
4,330,661 UART: [idev] CDI.KEYID = 6
4,331,542 UART: [idev] SUBJECT.KEYID = 7
4,332,854 UART: [idev] UDS.KEYID = 0
4,333,808 ready_for_fw is high
4,333,998 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,476,871 UART: [idev] Erasing UDS.KEYID = 0
7,620,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,263 UART: [idev] --
7,645,331 UART: [ldev] ++
7,645,952 UART: [ldev] CDI.KEYID = 6
7,646,925 UART: [ldev] SUBJECT.KEYID = 5
7,648,075 UART: [ldev] AUTHORITY.KEYID = 7
7,649,385 UART: [ldev] FE.KEYID = 1
7,662,007 UART: [ldev] Erasing FE.KEYID = 1
10,953,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,003 UART: [ldev] --
13,313,113 UART: [fwproc] Waiting for Commands...
13,315,043 UART: [fwproc] Received command 0x46574c44
13,317,274 UART: [fwproc] Received Image of size 113760 bytes
17,366,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,825,159 >>> mbox cmd response: success
17,825,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,830,138 UART: [afmc] ++
17,830,782 UART: [afmc] CDI.KEYID = 6
17,831,663 UART: [afmc] SUBJECT.KEYID = 7
17,832,929 UART: [afmc] AUTHORITY.KEYID = 5
21,146,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,113 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,503 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,318 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,760 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,995 UART: [afmc] --
23,514,138 UART: [cold-reset] --
23,518,851 UART: [state] Locking Datavault
23,524,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,674 UART: [state] Locking ICCM
23,528,905 UART: [exit] Launching FMC @ 0x40000130
23,537,321 UART:
23,537,561 UART: Running Caliptra FMC ...
23,538,660 UART:
23,538,814 UART: [state] CFI Enabled
23,546,646 UART: [fht] FMC Alias Private Key: 7
25,877,465 UART: [art] Extend RT PCRs Done
25,878,690 UART: [art] Lock RT PCRs Done
25,880,530 UART: [art] Populate DV Done
25,886,044 UART: [fht] FMC Alias Private Key: 7
25,887,578 UART: [art] Derive CDI
25,888,386 UART: [art] Store in in slot 0x4
25,930,978 UART: [art] Derive Key Pair
25,932,014 UART: [art] Store priv key in slot 0x5
29,173,810 UART: [art] Derive Key Pair - Done
29,186,912 UART: [art] Signing Cert with AUTHO
29,188,216 UART: RITY.KEYID = 7
31,467,490 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,995 UART: [art] PUB.X = 2FD2F6FFD81C4F5F307C32D39060A14B18129C0D9CAE6C95F0E43BE8DC689730F70BF8F75577DF133684A1C6E9F26BBC
31,476,263 UART: [art] PUB.Y = BEDFC2F7E8ACDCC4AA3098C1498963531443027B6E58936C098B51068A98C030557683BF04BF80BCC2B3890BC7A08C1A
31,483,458 UART: [art] SIG.R = E0B5616AABF962EACC0B21CDD4ED8EEA90554B103C9D56BE887A6288D4682D6B00903157378AA3619F08C92239BFC730
31,490,824 UART: [art] SIG.S = 6AD847F8B2156007F0AD4A1287466037C849CA42558411CE6C6D5F9995AE56425D33B4850009FFF2BC19CCAD0894FD79
32,795,220 UART: Caliptra RT
32,795,940 UART: [state] CFI Enabled
32,913,845 UART: [rt] RT listening for mailbox commands...
32,945,871 UART: [rt]cmd =0x44504543, len=96
32,981,086 >>> mbox cmd response data (56 bytes)
32,982,424 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,012,301 UART: [rt]cmd =0x54514754, len=24
33,014,835 >>> mbox cmd response: failed
33,015,252 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,045,283 UART: [rt]cmd =0x54514754, len=24
33,047,693 >>> mbox cmd response data (8 bytes)
33,048,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,078,790 UART: [rt]cmd =0x44504543, len=96
33,115,098 >>> mbox cmd response data (56 bytes)
33,115,841 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,145,506 UART: [rt]cmd =0x47544744, len=8
33,148,432 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
4,127,307 ready_for_fw is high
4,127,715 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,053,116 >>> mbox cmd response: success
18,054,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,692,992 UART:
23,693,417 UART: Running Caliptra FMC ...
23,694,566 UART:
23,694,715 UART: [state] CFI Enabled
23,702,675 UART: [fht] FMC Alias Private Key: 7
26,033,688 UART: [art] Extend RT PCRs Done
26,034,918 UART: [art] Lock RT PCRs Done
26,036,571 UART: [art] Populate DV Done
26,042,264 UART: [fht] FMC Alias Private Key: 7
26,043,808 UART: [art] Derive CDI
26,044,570 UART: [art] Store in in slot 0x4
26,086,995 UART: [art] Derive Key Pair
26,087,997 UART: [art] Store priv key in slot 0x5
29,330,664 UART: [art] Derive Key Pair - Done
29,343,558 UART: [art] Signing Cert with AUTHO
29,344,864 UART: RITY.KEYID = 7
31,624,072 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,607 UART: [art] PUB.X = 37C7F2DE5C222C2E100A663DB4627825414F8E1025D4F22FBC5299C7951DCF532EB4378193372A39F38C4EC7E02D9676
31,632,790 UART: [art] PUB.Y = 7F021206A734E9FA2FF63A5B75238DBB9EA8CFD10131E03D56A4F0F6962A6707D198D8A894BAE60998EF3860CF679B96
31,640,011 UART: [art] SIG.R = 66163C877667E8AE8304791BF6150414B0EC16B2EF25C05BC2FE0DA6393C953BF1821D7D3A8437D178D15E8D2A14D7B7
31,647,409 UART: [art] SIG.S = 6A50AC09D90C4964A5052E682DF46789E7A0F43E4341DA6CB6D4D5FCF71DC1440AAA9261570A5F9C4836D16F6AA707A2
32,953,050 UART: Caliptra RT
32,953,773 UART: [state] CFI Enabled
33,071,953 UART: [rt] RT listening for mailbox commands...
33,103,937 UART: [rt]cmd =0x44504543, len=96
33,140,563 >>> mbox cmd response data (56 bytes)
33,141,886 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,171,758 UART: [rt]cmd =0x54514754, len=24
33,174,288 >>> mbox cmd response: failed
33,174,702 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,204,437 UART: [rt]cmd =0x54514754, len=24
33,206,817 >>> mbox cmd response data (8 bytes)
33,207,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,237,743 UART: [rt]cmd =0x44504543, len=96
33,273,721 >>> mbox cmd response data (56 bytes)
33,274,433 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,304,275 UART: [rt]cmd =0x47544744, len=8
33,307,243 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
192,899 UART:
193,277 UART: Running Caliptra ROM ...
194,476 UART:
194,628 UART: [state] CFI Enabled
261,985 UART: [state] LifecycleState = Unprovisioned
263,889 UART: [state] DebugLocked = No
266,552 UART: [state] WD Timer not started. Device not locked for debugging
270,509 UART: [kat] SHA2-256
449,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,217 UART: [kat] ++
461,751 UART: [kat] sha1
473,295 UART: [kat] SHA2-256
476,337 UART: [kat] SHA2-384
482,966 UART: [kat] SHA2-512-ACC
485,905 UART: [kat] ECC-384
2,947,909 UART: [kat] HMAC-384Kdf
2,971,390 UART: [kat] LMS
3,500,864 UART: [kat] --
3,503,368 UART: [cold-reset] ++
3,505,228 UART: [fht] FHT @ 0x50003400
3,517,500 UART: [idev] ++
3,518,096 UART: [idev] CDI.KEYID = 6
3,519,008 UART: [idev] SUBJECT.KEYID = 7
3,520,190 UART: [idev] UDS.KEYID = 0
3,521,111 ready_for_fw is high
3,521,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,626 UART: [idev] Erasing UDS.KEYID = 0
6,026,772 UART: [idev] Sha1 KeyId Algorithm
6,050,480 UART: [idev] --
6,055,345 UART: [ldev] ++
6,055,914 UART: [ldev] CDI.KEYID = 6
6,056,831 UART: [ldev] SUBJECT.KEYID = 5
6,058,009 UART: [ldev] AUTHORITY.KEYID = 7
6,059,262 UART: [ldev] FE.KEYID = 1
6,099,784 UART: [ldev] Erasing FE.KEYID = 1
8,601,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,991 UART: [ldev] --
10,411,507 UART: [fwproc] Wait for Commands...
10,414,585 UART: [fwproc] Recv command 0x46574c44
10,416,672 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,272,285 >>> mbox cmd response: success
14,272,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,277,102 UART: [afmc] ++
14,277,684 UART: [afmc] CDI.KEYID = 6
14,278,595 UART: [afmc] SUBJECT.KEYID = 7
14,279,803 UART: [afmc] AUTHORITY.KEYID = 5
16,808,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,514 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,308 UART: [afmc] --
18,609,336 UART: [cold-reset] --
18,615,241 UART: [state] Locking Datavault
18,620,320 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,961 UART: [state] Locking ICCM
18,623,350 UART: [exit] Launching FMC @ 0x40000130
18,631,733 UART:
18,632,016 UART: Running Caliptra FMC ...
18,633,129 UART:
18,633,291 UART: [state] CFI Enabled
18,692,160 UART: [fht] FMC Alias Private Key: 7
20,456,063 UART: [art] Extend RT PCRs Done
20,457,268 UART: [art] Lock RT PCRs Done
20,459,096 UART: [art] Populate DV Done
20,464,505 UART: [fht] FMC Alias Private Key: 7
20,466,036 UART: [art] Derive CDI
20,466,850 UART: [art] Store in in slot 0x4
20,524,459 UART: [art] Derive Key Pair
20,525,494 UART: [art] Store priv key in slot 0x5
22,988,177 UART: [art] Derive Key Pair - Done
23,001,118 UART: [art] Signing Cert with AUTHO
23,002,423 UART: RITY.KEYID = 7
24,713,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,120 UART: [art] PUB.X = D9DAB3E75E8DAEE304A523F8FAB6B265E604514733EC2EABA35F987A879AAFD3AA4A98CF6AAD013F3F33A94453DD45DE
24,722,387 UART: [art] PUB.Y = C68F23D1A3FCB6B6ED881E27E8595EA84C87C81EB70C4574448C170AF60C64C75AC6D35F01396D6A7C4643222A1C78DA
24,729,661 UART: [art] SIG.R = 66F71B5416D67C39BB6A61D6FE9298663F2562AB5F13010B5EC6C80E36794187B03E03B3172B384572CC03F2CBB78A6A
24,737,035 UART: [art] SIG.S = 8D17FE4D96DB6236C6A442E793B6E3F6564ED99EEC5960304D47727BB2362D5397DA336C0CE574BBCDD8291FDD427439
25,716,429 UART: Caliptra RT
25,717,129 UART: [state] CFI Enabled
25,882,265 UART: [rt] RT listening for mailbox commands...
25,914,203 UART: [rt]cmd =0x44504543, len=96
25,961,646 >>> mbox cmd response data (56 bytes)
25,962,965 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,992,628 UART: [rt]cmd =0x54514754, len=24
25,994,983 >>> mbox cmd response: failed
25,995,414 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,025,365 UART: [rt]cmd =0x54514754, len=24
26,027,905 >>> mbox cmd response data (8 bytes)
26,028,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,058,790 UART: [rt]cmd =0x44504543, len=96
26,111,041 >>> mbox cmd response data (56 bytes)
26,111,778 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,141,331 UART: [rt]cmd =0x47544744, len=8
26,144,479 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,358,999 ready_for_fw is high
3,359,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,037,770 >>> mbox cmd response: success
14,038,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,323,652 UART:
18,324,070 UART: Running Caliptra FMC ...
18,325,178 UART:
18,325,332 UART: [state] CFI Enabled
18,390,110 UART: [fht] FMC Alias Private Key: 7
20,153,487 UART: [art] Extend RT PCRs Done
20,154,703 UART: [art] Lock RT PCRs Done
20,156,262 UART: [art] Populate DV Done
20,161,513 UART: [fht] FMC Alias Private Key: 7
20,163,206 UART: [art] Derive CDI
20,163,939 UART: [art] Store in in slot 0x4
20,222,100 UART: [art] Derive Key Pair
20,223,138 UART: [art] Store priv key in slot 0x5
22,685,963 UART: [art] Derive Key Pair - Done
22,698,873 UART: [art] Signing Cert with AUTHO
22,700,177 UART: RITY.KEYID = 7
24,412,020 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,509 UART: [art] PUB.X = E7F3CD772EDFC4F6515973BE7C10E7CA4CE44A76F86109BC935CD1CA04203A6A798B4DF2AA3A2E590F33326CD4189BF8
24,420,849 UART: [art] PUB.Y = F0D8E6220FB9BA976DE0D7D185C8276251EDB1A67A9BB659D2FD7CC17701B5D7B9B797E3F6DD60688D7CE8DC8E34EE2F
24,428,136 UART: [art] SIG.R = 4C5D3767039F87B6225B7EFA41B4B2652521B1C72F33355433548AC60260245ACD1D200FD58A76E0B1EA02F1670C32A8
24,435,499 UART: [art] SIG.S = 89146814FF15C7FA3460A99D74CE796A396F86B3BC919BD5858E680EF1270BC5B6ACBDCE52E2A3A18BE37E1D1D7CBE32
25,413,680 UART: Caliptra RT
25,414,398 UART: [state] CFI Enabled
25,578,784 UART: [rt] RT listening for mailbox commands...
25,610,948 UART: [rt]cmd =0x44504543, len=96
25,660,458 >>> mbox cmd response data (56 bytes)
25,661,772 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,691,848 UART: [rt]cmd =0x54514754, len=24
25,694,046 >>> mbox cmd response: failed
25,694,794 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,724,859 UART: [rt]cmd =0x54514754, len=24
25,727,217 >>> mbox cmd response data (8 bytes)
25,727,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,758,268 UART: [rt]cmd =0x44504543, len=96
25,809,095 >>> mbox cmd response data (56 bytes)
25,809,843 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,839,394 UART: [rt]cmd =0x47544744, len=8
25,842,224 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,961 writing to cptra_bootfsm_go
193,098 UART:
193,484 UART: Running Caliptra ROM ...
194,615 UART:
604,338 UART: [state] CFI Enabled
619,710 UART: [state] LifecycleState = Unprovisioned
621,594 UART: [state] DebugLocked = No
623,058 UART: [state] WD Timer not started. Device not locked for debugging
626,186 UART: [kat] SHA2-256
805,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,904 UART: [kat] ++
817,354 UART: [kat] sha1
827,869 UART: [kat] SHA2-256
830,879 UART: [kat] SHA2-384
836,159 UART: [kat] SHA2-512-ACC
839,113 UART: [kat] ECC-384
3,280,772 UART: [kat] HMAC-384Kdf
3,293,441 UART: [kat] LMS
3,822,967 UART: [kat] --
3,826,964 UART: [cold-reset] ++
3,829,318 UART: [fht] FHT @ 0x50003400
3,840,438 UART: [idev] ++
3,841,012 UART: [idev] CDI.KEYID = 6
3,841,923 UART: [idev] SUBJECT.KEYID = 7
3,843,097 UART: [idev] UDS.KEYID = 0
3,844,044 ready_for_fw is high
3,844,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,537 UART: [idev] Erasing UDS.KEYID = 0
6,314,575 UART: [idev] Sha1 KeyId Algorithm
6,337,560 UART: [idev] --
6,340,052 UART: [ldev] ++
6,340,632 UART: [ldev] CDI.KEYID = 6
6,341,519 UART: [ldev] SUBJECT.KEYID = 5
6,342,730 UART: [ldev] AUTHORITY.KEYID = 7
6,343,962 UART: [ldev] FE.KEYID = 1
6,353,313 UART: [ldev] Erasing FE.KEYID = 1
8,827,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,646 UART: [ldev] --
10,618,547 UART: [fwproc] Wait for Commands...
10,621,673 UART: [fwproc] Recv command 0x46574c44
10,623,768 UART: [fwproc] Recv'd Img size: 114084 bytes
14,022,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,390 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,477,038 >>> mbox cmd response: success
14,477,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,481,601 UART: [afmc] ++
14,482,190 UART: [afmc] CDI.KEYID = 6
14,483,071 UART: [afmc] SUBJECT.KEYID = 7
14,484,289 UART: [afmc] AUTHORITY.KEYID = 5
16,981,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,719,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,735,029 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,773,619 UART: [afmc] --
18,778,256 UART: [cold-reset] --
18,782,547 UART: [state] Locking Datavault
18,788,875 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,518 UART: [state] Locking ICCM
18,791,720 UART: [exit] Launching FMC @ 0x40000130
18,800,121 UART:
18,800,359 UART: Running Caliptra FMC ...
18,801,462 UART:
18,801,619 UART: [state] CFI Enabled
18,809,775 UART: [fht] FMC Alias Private Key: 7
20,566,643 UART: [art] Extend RT PCRs Done
20,567,845 UART: [art] Lock RT PCRs Done
20,569,623 UART: [art] Populate DV Done
20,574,982 UART: [fht] FMC Alias Private Key: 7
20,576,691 UART: [art] Derive CDI
20,577,428 UART: [art] Store in in slot 0x4
20,620,239 UART: [art] Derive Key Pair
20,621,276 UART: [art] Store priv key in slot 0x5
23,047,672 UART: [art] Derive Key Pair - Done
23,060,671 UART: [art] Signing Cert with AUTHO
23,061,974 UART: RITY.KEYID = 7
24,767,550 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,062 UART: [art] PUB.X = 8B14E35E48A7D5B94C86FF5429322477D32B096AFC78A9D07F3905CC634DBE0068A10C48F828A83D7BB6C710448332B4
24,776,325 UART: [art] PUB.Y = A963FF0A28252B2742FDAFD5C30C26C76A4461499DC2EE0B2CC4C6E1DE27C864D0BEA6D52E93382A27252BAA39B60312
24,783,581 UART: [art] SIG.R = CF2A8AFB0E95DF7C0A43EB3736A8457750ACB2E897021B5A0D84CA5D3804537D340FE474C58C1A9BC06F2E45D2138459
24,790,948 UART: [art] SIG.S = 50761398DDCEC98B595C9204FF4371C5515492A408D7541DF467926565863001BF42985E0410977D2923FF9C34F14119
25,769,889 UART: Caliptra RT
25,770,604 UART: [state] CFI Enabled
25,889,169 UART: [rt] RT listening for mailbox commands...
25,921,234 UART: [rt]cmd =0x44504543, len=96
25,957,032 >>> mbox cmd response data (56 bytes)
25,958,502 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,988,324 UART: [rt]cmd =0x54514754, len=24
25,990,688 >>> mbox cmd response: failed
25,991,192 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,021,039 UART: [rt]cmd =0x54514754, len=24
26,023,746 >>> mbox cmd response data (8 bytes)
26,024,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,054,741 UART: [rt]cmd =0x44504543, len=96
26,091,072 >>> mbox cmd response data (56 bytes)
26,091,792 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,121,636 UART: [rt]cmd =0x47544744, len=8
26,124,383 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
3,700,495 ready_for_fw is high
3,701,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,308 >>> mbox cmd response: success
14,268,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,513,078 UART:
18,513,500 UART: Running Caliptra FMC ...
18,514,698 UART:
18,514,867 UART: [state] CFI Enabled
18,522,811 UART: [fht] FMC Alias Private Key: 7
20,279,849 UART: [art] Extend RT PCRs Done
20,281,074 UART: [art] Lock RT PCRs Done
20,282,494 UART: [art] Populate DV Done
20,287,914 UART: [fht] FMC Alias Private Key: 7
20,289,391 UART: [art] Derive CDI
20,290,162 UART: [art] Store in in slot 0x4
20,332,710 UART: [art] Derive Key Pair
20,333,718 UART: [art] Store priv key in slot 0x5
22,760,630 UART: [art] Derive Key Pair - Done
22,773,631 UART: [art] Signing Cert with AUTHO
22,774,970 UART: RITY.KEYID = 7
24,479,993 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,519 UART: [art] PUB.X = 6EB8A593268CCB5061056077786BF69B6B1E7898C92E3139B09601AF6C4D37DD33731BDC2F497D88A9BD55C1F2590FF3
24,488,798 UART: [art] PUB.Y = DEEA1A89E79D6FEFEBBA9A86F75956B5A765DB17BDB6529A92400C5251382A56E629B3F98FAB074BDAB87BABF618E803
24,496,083 UART: [art] SIG.R = 6A09DC50A4F34D881C1CE1E064FA0AAB60CFE03C4215CFFC659243575BAB856614AC90ADECF3F3398A92525C85289733
24,503,460 UART: [art] SIG.S = 5841159A3EF174225305662EAF038A3D8A3B32B8D09AFA5578EEBCA205F9FAE4DA773D16A32EBFFDF223DE3AB872ADED
25,482,364 UART: Caliptra RT
25,483,067 UART: [state] CFI Enabled
25,600,191 UART: [rt] RT listening for mailbox commands...
25,632,494 UART: [rt]cmd =0x44504543, len=96
25,667,810 >>> mbox cmd response data (56 bytes)
25,669,158 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,699,458 UART: [rt]cmd =0x54514754, len=24
25,701,828 >>> mbox cmd response: failed
25,702,482 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,732,337 UART: [rt]cmd =0x54514754, len=24
25,735,024 >>> mbox cmd response data (8 bytes)
25,735,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,765,974 UART: [rt]cmd =0x44504543, len=96
25,801,599 >>> mbox cmd response data (56 bytes)
25,802,304 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,831,887 UART: [rt]cmd =0x47544744, len=8
25,834,863 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,327 UART:
192,723 UART: Running Caliptra ROM ...
193,917 UART:
194,074 UART: [state] CFI Enabled
264,695 UART: [state] LifecycleState = Unprovisioned
267,127 UART: [state] DebugLocked = No
269,450 UART: [state] WD Timer not started. Device not locked for debugging
273,278 UART: [kat] SHA2-256
463,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,937 UART: [kat] ++
474,381 UART: [kat] sha1
485,465 UART: [kat] SHA2-256
488,538 UART: [kat] SHA2-384
494,099 UART: [kat] SHA2-512-ACC
496,679 UART: [kat] ECC-384
2,948,375 UART: [kat] HMAC-384Kdf
2,973,700 UART: [kat] LMS
3,505,529 UART: [kat] --
3,508,743 UART: [cold-reset] ++
3,510,028 UART: [fht] FHT @ 0x50003400
3,520,242 UART: [idev] ++
3,520,958 UART: [idev] CDI.KEYID = 6
3,521,890 UART: [idev] SUBJECT.KEYID = 7
3,523,060 UART: [idev] UDS.KEYID = 0
3,523,983 ready_for_fw is high
3,524,178 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,738 UART: [idev] Erasing UDS.KEYID = 0
6,031,876 UART: [idev] Sha1 KeyId Algorithm
6,055,442 UART: [idev] --
6,061,057 UART: [ldev] ++
6,061,738 UART: [ldev] CDI.KEYID = 6
6,062,644 UART: [ldev] SUBJECT.KEYID = 5
6,063,857 UART: [ldev] AUTHORITY.KEYID = 7
6,065,031 UART: [ldev] FE.KEYID = 1
6,103,368 UART: [ldev] Erasing FE.KEYID = 1
8,608,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,282 UART: [ldev] --
10,419,537 UART: [fwproc] Wait for Commands...
10,422,400 UART: [fwproc] Recv command 0x46574c44
10,424,749 UART: [fwproc] Recv'd Img size: 114084 bytes
13,869,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,601,651 >>> mbox cmd response: success
14,602,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,605,759 UART: [afmc] ++
14,606,454 UART: [afmc] CDI.KEYID = 6
14,607,636 UART: [afmc] SUBJECT.KEYID = 7
14,609,152 UART: [afmc] AUTHORITY.KEYID = 5
17,152,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,911 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,026 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,871 UART: [afmc] --
18,953,162 UART: [cold-reset] --
18,956,226 UART: [state] Locking Datavault
18,961,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,125 UART: [state] Locking ICCM
18,966,595 UART: [exit] Launching FMC @ 0x40000130
18,975,277 UART:
18,975,512 UART: Running Caliptra FMC ...
18,976,610 UART:
18,976,785 UART: [state] CFI Enabled
19,033,841 UART: [fht] FMC Alias Private Key: 7
20,797,307 UART: [art] Extend RT PCRs Done
20,798,515 UART: [art] Lock RT PCRs Done
20,800,620 UART: [art] Populate DV Done
20,805,812 UART: [fht] FMC Alias Private Key: 7
20,807,505 UART: [art] Derive CDI
20,808,309 UART: [art] Store in in slot 0x4
20,866,289 UART: [art] Derive Key Pair
20,867,319 UART: [art] Store priv key in slot 0x5
23,330,705 UART: [art] Derive Key Pair - Done
23,343,486 UART: [art] Signing Cert with AUTHO
23,344,791 UART: RITY.KEYID = 7
25,056,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,661 UART: [art] PUB.X = B8FE80070F4D6BD2E830514F605E5D44EE77F470F0433ABAA91FE3414C2DF208ADC9346F154BC09219057B72176AADC9
25,064,948 UART: [art] PUB.Y = A37A61B9F1D1FA6AF407F1768AFEE93D3CA71B69C5206038E046F198C64775535AD351C3E57967870B9FAF2344289003
25,072,174 UART: [art] SIG.R = C05AFA28FFFB540575C6A89E6C1A5E3B8DC70F0A220A36AC0777701CF893BE5792DD86C66C9F9402FAB16425590BDE5C
25,079,600 UART: [art] SIG.S = 5C020FBE89805F8EA095FEF26FF6B231D30458097A605BCE398696CCF40EFA74CC142D72C598866A417CA49764A9F09C
26,058,412 UART: Caliptra RT
26,059,133 UART: [state] CFI Enabled
26,222,678 UART: [rt] RT listening for mailbox commands...
26,254,586 UART: [rt]cmd =0x44504543, len=96
26,305,015 >>> mbox cmd response data (56 bytes)
26,306,389 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,336,483 UART: [rt]cmd =0x54514754, len=24
26,338,847 >>> mbox cmd response: failed
26,339,328 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,369,258 UART: [rt]cmd =0x54514754, len=24
26,372,053 >>> mbox cmd response data (8 bytes)
26,372,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,357 UART: [rt]cmd =0x44504543, len=96
26,453,885 >>> mbox cmd response data (56 bytes)
26,454,653 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,484,212 UART: [rt]cmd =0x47544744, len=8
26,487,094 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
3,438,678 ready_for_fw is high
3,439,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,731,784 >>> mbox cmd response: success
14,732,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,030,855 UART:
19,031,280 UART: Running Caliptra FMC ...
19,032,400 UART:
19,032,562 UART: [state] CFI Enabled
19,100,478 UART: [fht] FMC Alias Private Key: 7
20,864,237 UART: [art] Extend RT PCRs Done
20,865,464 UART: [art] Lock RT PCRs Done
20,866,934 UART: [art] Populate DV Done
20,872,563 UART: [fht] FMC Alias Private Key: 7
20,874,022 UART: [art] Derive CDI
20,874,795 UART: [art] Store in in slot 0x4
20,932,625 UART: [art] Derive Key Pair
20,933,673 UART: [art] Store priv key in slot 0x5
23,396,415 UART: [art] Derive Key Pair - Done
23,409,094 UART: [art] Signing Cert with AUTHO
23,410,409 UART: RITY.KEYID = 7
25,122,820 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,330 UART: [art] PUB.X = BC2DB99CB79D2848135139407F44319C321E91AD10F14B02954B2FE53D3CE915B44C5EFC0E382D4F7803DFF22D158070
25,131,547 UART: [art] PUB.Y = 0DFD0CD8E9F9DE71DFA6F83BBD288059405A1D78E2893564F97781A949F0D95F23E04F9713A563E7A841DF3698A01BDB
25,138,823 UART: [art] SIG.R = 33DF405E7D65DE8B0126C5D568C2CA19D2A49C2A8C10D6A386EA5D712D2A9B181A126D7500C02F2A3BB185E32A64E0CB
25,146,210 UART: [art] SIG.S = 19D3895DA4C6E7E0C11DAD2B6D7CF3000FE726D2C1F2526D6BFE2E8F1BE3659429CAB392F2D881EEE89E094BA5D2480B
26,125,019 UART: Caliptra RT
26,125,744 UART: [state] CFI Enabled
26,291,188 UART: [rt] RT listening for mailbox commands...
26,323,087 UART: [rt]cmd =0x44504543, len=96
26,372,793 >>> mbox cmd response data (56 bytes)
26,374,203 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,404,219 UART: [rt]cmd =0x54514754, len=24
26,406,741 >>> mbox cmd response: failed
26,407,243 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,437,220 UART: [rt]cmd =0x54514754, len=24
26,440,062 >>> mbox cmd response data (8 bytes)
26,440,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,488 UART: [rt]cmd =0x44504543, len=96
26,522,214 >>> mbox cmd response data (56 bytes)
26,522,937 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,552,762 UART: [rt]cmd =0x47544744, len=8
26,555,643 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,003 writing to cptra_bootfsm_go
193,230 UART:
193,596 UART: Running Caliptra ROM ...
194,808 UART:
604,645 UART: [state] CFI Enabled
617,612 UART: [state] LifecycleState = Unprovisioned
620,009 UART: [state] DebugLocked = No
621,628 UART: [state] WD Timer not started. Device not locked for debugging
625,955 UART: [kat] SHA2-256
815,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,655 UART: [kat] ++
827,177 UART: [kat] sha1
838,761 UART: [kat] SHA2-256
841,771 UART: [kat] SHA2-384
846,983 UART: [kat] SHA2-512-ACC
849,582 UART: [kat] ECC-384
3,290,340 UART: [kat] HMAC-384Kdf
3,303,072 UART: [kat] LMS
3,834,938 UART: [kat] --
3,839,787 UART: [cold-reset] ++
3,841,653 UART: [fht] FHT @ 0x50003400
3,853,697 UART: [idev] ++
3,854,339 UART: [idev] CDI.KEYID = 6
3,855,373 UART: [idev] SUBJECT.KEYID = 7
3,856,550 UART: [idev] UDS.KEYID = 0
3,857,478 ready_for_fw is high
3,857,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,929 UART: [idev] Erasing UDS.KEYID = 0
6,335,257 UART: [idev] Sha1 KeyId Algorithm
6,358,484 UART: [idev] --
6,362,856 UART: [ldev] ++
6,363,554 UART: [ldev] CDI.KEYID = 6
6,364,468 UART: [ldev] SUBJECT.KEYID = 5
6,365,625 UART: [ldev] AUTHORITY.KEYID = 7
6,366,855 UART: [ldev] FE.KEYID = 1
6,380,313 UART: [ldev] Erasing FE.KEYID = 1
8,857,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,273 UART: [ldev] --
10,652,622 UART: [fwproc] Wait for Commands...
10,655,317 UART: [fwproc] Recv command 0x46574c44
10,657,575 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,826,626 >>> mbox cmd response: success
14,827,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,831,189 UART: [afmc] ++
14,831,889 UART: [afmc] CDI.KEYID = 6
14,833,082 UART: [afmc] SUBJECT.KEYID = 7
14,834,525 UART: [afmc] AUTHORITY.KEYID = 5
17,342,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,259 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,563 UART: [afmc] --
19,135,245 UART: [cold-reset] --
19,138,577 UART: [state] Locking Datavault
19,143,100 UART: [state] Locking PCR0, PCR1 and PCR31
19,145,262 UART: [state] Locking ICCM
19,147,363 UART: [exit] Launching FMC @ 0x40000130
19,156,040 UART:
19,156,278 UART: Running Caliptra FMC ...
19,157,383 UART:
19,157,546 UART: [state] CFI Enabled
19,165,704 UART: [fht] FMC Alias Private Key: 7
20,922,483 UART: [art] Extend RT PCRs Done
20,924,015 UART: [art] Lock RT PCRs Done
20,925,472 UART: [art] Populate DV Done
20,930,638 UART: [fht] FMC Alias Private Key: 7
20,932,229 UART: [art] Derive CDI
20,932,987 UART: [art] Store in in slot 0x4
20,975,698 UART: [art] Derive Key Pair
20,976,704 UART: [art] Store priv key in slot 0x5
23,403,085 UART: [art] Derive Key Pair - Done
23,415,967 UART: [art] Signing Cert with AUTHO
23,417,297 UART: RITY.KEYID = 7
25,122,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,272 UART: [art] PUB.X = 81FF4962269A2313D905CA2B546DDCD3E1140BC4BF6BA3894E3327B6D8B3C864477D0BDBC634161C1D54CE2F6294B1AF
25,131,594 UART: [art] PUB.Y = B6EEF7A215D97629A28B31583311F409271234A0B5566FACFD99ECBE3B13FD8B61570EE6B04F9CFA8E872B4596EC28CB
25,138,855 UART: [art] SIG.R = 6C4610CA67B5378702A1BE10382AF7F00E825C63D465108F0EFBE180A01E52AF3382C866D8B30A46E239DE862C3007A6
25,146,219 UART: [art] SIG.S = B2BE8216839E4DDCADFF7B3E45A3E296BAD0AB8EF41FA37237DEEA4959423BA6DC2552681E441B5DEA6E8BAD1B7A9B8C
26,125,199 UART: Caliptra RT
26,125,906 UART: [state] CFI Enabled
26,244,172 UART: [rt] RT listening for mailbox commands...
26,276,242 UART: [rt]cmd =0x44504543, len=96
26,312,417 >>> mbox cmd response data (56 bytes)
26,314,043 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,343,983 UART: [rt]cmd =0x54514754, len=24
26,346,235 >>> mbox cmd response: failed
26,346,752 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,376,739 UART: [rt]cmd =0x54514754, len=24
26,379,312 >>> mbox cmd response data (8 bytes)
26,379,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,410,503 UART: [rt]cmd =0x44504543, len=96
26,446,253 >>> mbox cmd response data (56 bytes)
26,446,941 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,477,003 UART: [rt]cmd =0x47544744, len=8
26,480,078 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,982 writing to cptra_bootfsm_go
3,754,850 ready_for_fw is high
3,755,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,962,023 >>> mbox cmd response: success
14,962,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,208,862 UART:
19,209,263 UART: Running Caliptra FMC ...
19,210,460 UART:
19,210,644 UART: [state] CFI Enabled
19,218,268 UART: [fht] FMC Alias Private Key: 7
20,974,872 UART: [art] Extend RT PCRs Done
20,976,104 UART: [art] Lock RT PCRs Done
20,977,866 UART: [art] Populate DV Done
20,983,184 UART: [fht] FMC Alias Private Key: 7
20,984,732 UART: [art] Derive CDI
20,985,465 UART: [art] Store in in slot 0x4
21,027,799 UART: [art] Derive Key Pair
21,028,843 UART: [art] Store priv key in slot 0x5
23,455,571 UART: [art] Derive Key Pair - Done
23,468,887 UART: [art] Signing Cert with AUTHO
23,470,196 UART: RITY.KEYID = 7
25,175,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,677 UART: [art] PUB.X = C669EF005836DF7ABF15D800C58FF3B2683FCB6270CBEA73A6B100076D03C643A2B739D432B07CC851831BBFE3937C51
25,183,904 UART: [art] PUB.Y = F9D04CDCFD5C0E76A3C6B11CCD4F1C393917DD0369A13688D6F617A544989B91E0EB10A09A1B42618651DA6D40D81F61
25,191,129 UART: [art] SIG.R = 86C255F825739446F39B68DAFF534B74C5E18F4B5307330CC0776D1CED9E232BDEF47E8FD1FC700BED74B36DBD97650A
25,198,566 UART: [art] SIG.S = 9EFD4EA991122AC456E72237AC08F658D69E5A2FB0DFE2E019468922DBCB1C2F2C623281BB4A26045D1963DDD183B6AD
26,177,201 UART: Caliptra RT
26,177,890 UART: [state] CFI Enabled
26,295,372 UART: [rt] RT listening for mailbox commands...
26,327,512 UART: [rt]cmd =0x44504543, len=96
26,363,852 >>> mbox cmd response data (56 bytes)
26,365,297 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,395,381 UART: [rt]cmd =0x54514754, len=24
26,397,700 >>> mbox cmd response: failed
26,398,121 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,427,906 UART: [rt]cmd =0x54514754, len=24
26,430,503 >>> mbox cmd response data (8 bytes)
26,430,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,600 UART: [rt]cmd =0x44504543, len=96
26,498,063 >>> mbox cmd response data (56 bytes)
26,498,779 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,528,517 UART: [rt]cmd =0x47544744, len=8
26,531,438 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,694 UART: [kat] SHA2-512-ACC
897,595 UART: [kat] ECC-384
903,276 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,795 UART: [cold-reset] ++
1,477,375 UART: [fht] Storing FHT @ 0x50003400
1,480,254 UART: [idev] ++
1,480,422 UART: [idev] CDI.KEYID = 6
1,480,782 UART: [idev] SUBJECT.KEYID = 7
1,481,206 UART: [idev] UDS.KEYID = 0
1,481,551 ready_for_fw is high
1,481,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,872 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,523 UART: [ldev] ++
1,514,691 UART: [ldev] CDI.KEYID = 6
1,515,054 UART: [ldev] SUBJECT.KEYID = 5
1,515,480 UART: [ldev] AUTHORITY.KEYID = 7
1,515,943 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,926 UART: [ldev] --
1,586,187 UART: [fwproc] Waiting for Commands...
1,586,898 UART: [fwproc] Received command 0x46574c44
1,587,689 UART: [fwproc] Received Image of size 114084 bytes
2,881,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,193 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,072 >>> mbox cmd response: success
3,073,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,074,286 UART: [afmc] ++
3,074,454 UART: [afmc] CDI.KEYID = 6
3,074,816 UART: [afmc] SUBJECT.KEYID = 7
3,075,241 UART: [afmc] AUTHORITY.KEYID = 5
3,110,052 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,709 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,399 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,324 UART: [afmc] --
3,153,428 UART: [cold-reset] --
3,154,366 UART: [state] Locking Datavault
3,155,335 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,939 UART: [state] Locking ICCM
3,156,529 UART: [exit] Launching FMC @ 0x40000130
3,161,858 UART:
3,161,874 UART: Running Caliptra FMC ...
3,162,282 UART:
3,162,336 UART: [state] CFI Enabled
3,172,639 UART: [fht] FMC Alias Private Key: 7
3,280,160 UART: [art] Extend RT PCRs Done
3,280,588 UART: [art] Lock RT PCRs Done
3,282,146 UART: [art] Populate DV Done
3,290,385 UART: [fht] FMC Alias Private Key: 7
3,291,549 UART: [art] Derive CDI
3,291,829 UART: [art] Store in in slot 0x4
3,377,406 UART: [art] Derive Key Pair
3,377,766 UART: [art] Store priv key in slot 0x5
3,391,574 UART: [art] Derive Key Pair - Done
3,406,530 UART: [art] Signing Cert with AUTHO
3,407,010 UART: RITY.KEYID = 7
3,421,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,617 UART: [art] PUB.X = F175E5BE3CB5C0527952037CDFFB60274F1B6157CD273B5069BD29BA49DB972C9D8852A45784FACA2FFA77F97681444B
3,429,392 UART: [art] PUB.Y = DBA52F0738F77468021A7FD6843B9F7090EA4C6D8029018A54A065690542058660B011A7B9108D5B4F701D1371DCCED4
3,436,321 UART: [art] SIG.R = 80C4167227B804AE12C606A8D984AA9AF81C7F09128680BF640734EC3A0003358DD7DDBA10C3A2B77FC839B4305B0BD0
3,443,055 UART: [art] SIG.S = 0948572C571E86F9373F93586B249C441D40FE4E54D0A1F4CA556517645917C590E9D69C67CA7AB92574D7653E5C5E0A
3,467,072 UART: Caliptra RT
3,467,325 UART: [state] CFI Enabled
3,575,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,892 UART: [rt]cmd =0x44504543, len=96
3,643,180 >>> mbox cmd response data (56 bytes)
3,643,181 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,578 UART: [rt]cmd =0x54514754, len=24
3,674,404 >>> mbox cmd response: failed
3,674,404 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,686 UART: [rt]cmd =0x54514754, len=24
3,705,818 >>> mbox cmd response data (8 bytes)
3,705,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,742 UART: [rt]cmd =0x44504543, len=96
3,771,771 >>> mbox cmd response data (56 bytes)
3,771,772 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,287 UART: [rt]cmd =0x47544744, len=8
3,803,581 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,609 ready_for_fw is high
1,362,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,058 >>> mbox cmd response: success
2,924,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,985,736 UART:
2,985,752 UART: Running Caliptra FMC ...
2,986,160 UART:
2,986,214 UART: [state] CFI Enabled
2,996,213 UART: [fht] FMC Alias Private Key: 7
3,104,216 UART: [art] Extend RT PCRs Done
3,104,644 UART: [art] Lock RT PCRs Done
3,106,488 UART: [art] Populate DV Done
3,114,463 UART: [fht] FMC Alias Private Key: 7
3,115,507 UART: [art] Derive CDI
3,115,787 UART: [art] Store in in slot 0x4
3,201,254 UART: [art] Derive Key Pair
3,201,614 UART: [art] Store priv key in slot 0x5
3,215,430 UART: [art] Derive Key Pair - Done
3,230,170 UART: [art] Signing Cert with AUTHO
3,230,650 UART: RITY.KEYID = 7
3,245,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,739 UART: [art] PUB.X = 67554FC5B03E5B8F0DE0EFBFA22B56C0778F0A28701A483FD6C6D11057620A2430ACF61F9B417D2150CEFA26060CAA11
3,253,504 UART: [art] PUB.Y = A8E72F0DFA67B21305536868197BCEA2D3DEAACBC717D68BCD3E0D493F5C001F5857948A1896289BC5C1942C55099E91
3,260,426 UART: [art] SIG.R = 3D02E8FCE6ED0CAD35B7369D65A9B708B4CB3CD0ECD36B67FF49463B6EB3CC02A91BA9A9F96BA60B17E00354A14A18C2
3,267,200 UART: [art] SIG.S = A174AE2FBCB05366E90C4A37A792A726E68AB0E2413056B257EE804F3060134A376F38244D007C1AEB46C196427F8372
3,290,586 UART: Caliptra RT
3,290,839 UART: [state] CFI Enabled
3,399,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,748 UART: [rt]cmd =0x44504543, len=96
3,467,490 >>> mbox cmd response data (56 bytes)
3,467,491 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,496,858 UART: [rt]cmd =0x54514754, len=24
3,498,694 >>> mbox cmd response: failed
3,498,694 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,148 UART: [rt]cmd =0x54514754, len=24
3,530,172 >>> mbox cmd response data (8 bytes)
3,530,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,140 UART: [rt]cmd =0x44504543, len=96
3,596,405 >>> mbox cmd response data (56 bytes)
3,596,406 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,815 UART: [rt]cmd =0x47544744, len=8
3,628,225 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,355 UART: [kat] SHA2-512-ACC
897,256 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,199 UART: [kat] LMS
1,475,395 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,481 UART: [idev] ++
1,479,649 UART: [idev] CDI.KEYID = 6
1,480,009 UART: [idev] SUBJECT.KEYID = 7
1,480,433 UART: [idev] UDS.KEYID = 0
1,480,778 ready_for_fw is high
1,480,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,057 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,368 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,383 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,427 UART: [fwproc] Received command 0x46574c44
1,588,218 UART: [fwproc] Received Image of size 114084 bytes
2,883,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,353 >>> mbox cmd response: success
3,076,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,077,581 UART: [afmc] ++
3,077,749 UART: [afmc] CDI.KEYID = 6
3,078,111 UART: [afmc] SUBJECT.KEYID = 7
3,078,536 UART: [afmc] AUTHORITY.KEYID = 5
3,113,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,423 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,203 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,931 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,816 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,506 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,465 UART: [afmc] --
3,156,355 UART: [cold-reset] --
3,157,227 UART: [state] Locking Datavault
3,158,278 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,882 UART: [state] Locking ICCM
3,159,336 UART: [exit] Launching FMC @ 0x40000130
3,164,665 UART:
3,164,681 UART: Running Caliptra FMC ...
3,165,089 UART:
3,165,232 UART: [state] CFI Enabled
3,176,107 UART: [fht] FMC Alias Private Key: 7
3,284,218 UART: [art] Extend RT PCRs Done
3,284,646 UART: [art] Lock RT PCRs Done
3,286,000 UART: [art] Populate DV Done
3,294,311 UART: [fht] FMC Alias Private Key: 7
3,295,317 UART: [art] Derive CDI
3,295,597 UART: [art] Store in in slot 0x4
3,381,208 UART: [art] Derive Key Pair
3,381,568 UART: [art] Store priv key in slot 0x5
3,395,570 UART: [art] Derive Key Pair - Done
3,409,991 UART: [art] Signing Cert with AUTHO
3,410,471 UART: RITY.KEYID = 7
3,425,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,332 UART: [art] PUB.X = B42F6AD823D67A24FF73E51D975C2F8845B1DD88A3C58F585443BB1CA39A9C328A10CF0DA220321ED6BA89EB420F8B81
3,433,108 UART: [art] PUB.Y = 4E96A61AA0284CB4D7FEA64E0C564F4AC416883CABC1A1B397DACD9AC8B68E2819A7665A02461C6E58248B018842CCFD
3,440,063 UART: [art] SIG.R = 927C70AACA4912AA6B5999BB8CA5B56C5E567D44DBBA651DB2598BC0051C02D08FA1A94B7467AFA2954FC6FA15545A74
3,446,841 UART: [art] SIG.S = E0E3C5BD5319D733AF5FBDB39A800BBB7C1F42DC99E80FC4D1217FE86C14EB9BABF246A6B27B08E8BFB4CA2E133F4DBB
3,471,177 UART: Caliptra RT
3,471,522 UART: [state] CFI Enabled
3,579,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,828 UART: [rt]cmd =0x44504543, len=96
3,646,918 >>> mbox cmd response data (56 bytes)
3,646,919 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,402 UART: [rt]cmd =0x54514754, len=24
3,678,066 >>> mbox cmd response: failed
3,678,066 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,544 UART: [rt]cmd =0x54514754, len=24
3,709,844 >>> mbox cmd response data (8 bytes)
3,709,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,936 UART: [rt]cmd =0x44504543, len=96
3,776,461 >>> mbox cmd response data (56 bytes)
3,776,462 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,675 UART: [rt]cmd =0x47544744, len=8
3,808,277 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,632 ready_for_fw is high
1,362,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,001 >>> mbox cmd response: success
2,924,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,984,331 UART:
2,984,347 UART: Running Caliptra FMC ...
2,984,755 UART:
2,984,898 UART: [state] CFI Enabled
2,996,071 UART: [fht] FMC Alias Private Key: 7
3,104,164 UART: [art] Extend RT PCRs Done
3,104,592 UART: [art] Lock RT PCRs Done
3,106,118 UART: [art] Populate DV Done
3,114,433 UART: [fht] FMC Alias Private Key: 7
3,115,509 UART: [art] Derive CDI
3,115,789 UART: [art] Store in in slot 0x4
3,201,730 UART: [art] Derive Key Pair
3,202,090 UART: [art] Store priv key in slot 0x5
3,214,934 UART: [art] Derive Key Pair - Done
3,229,988 UART: [art] Signing Cert with AUTHO
3,230,468 UART: RITY.KEYID = 7
3,246,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,783 UART: [art] PUB.X = 3BE7C09EE633278822AB6C2502DE1A9DAA10A753CDC6B107AD1F6FC63E4AE45C1A2595EE238777E3372CF58D4FA21810
3,253,559 UART: [art] PUB.Y = A14BE72F1A8FBC8BD2DA416C1DE3833F3837A7CE68E3E541CAF474C8999114ADBEFC92A52E26A8958DF43B69C210EC19
3,260,527 UART: [art] SIG.R = 3D7D3A0C09E9E5F40B64E17AC7CD507969DE52292457BE2735006EF4C809D59B167D6DE4C654EAD613C398D9F8F9DFC8
3,267,273 UART: [art] SIG.S = C927B124C8C75F9775F250CD86F0E6C566C730110723A478AECF2AAE4763BE57BAB125DAE5F301ABFE8A1A1BDF6504BE
3,290,513 UART: Caliptra RT
3,290,858 UART: [state] CFI Enabled
3,398,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,399 UART: [rt]cmd =0x44504543, len=96
3,466,471 >>> mbox cmd response data (56 bytes)
3,466,472 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,749 UART: [rt]cmd =0x54514754, len=24
3,497,387 >>> mbox cmd response: failed
3,497,387 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,827 UART: [rt]cmd =0x54514754, len=24
3,528,811 >>> mbox cmd response data (8 bytes)
3,528,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,023 UART: [rt]cmd =0x44504543, len=96
3,595,288 >>> mbox cmd response data (56 bytes)
3,595,289 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,868 UART: [rt]cmd =0x47544744, len=8
3,627,456 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
893,594 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,719 UART: [kat] ++
897,871 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,826 UART: [kat] SHA2-512-ACC
908,727 UART: [kat] ECC-384
918,258 UART: [kat] HMAC-384Kdf
922,814 UART: [kat] LMS
1,171,142 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,246 UART: [idev] ++
1,175,414 UART: [idev] CDI.KEYID = 6
1,175,774 UART: [idev] SUBJECT.KEYID = 7
1,176,198 UART: [idev] UDS.KEYID = 0
1,176,543 ready_for_fw is high
1,176,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,136 UART: [idev] Erasing UDS.KEYID = 0
1,200,845 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,859 UART: [ldev] Erasing FE.KEYID = 1
1,243,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,031 UART: [ldev] --
1,283,520 UART: [fwproc] Wait for Commands...
1,284,288 UART: [fwproc] Recv command 0x46574c44
1,285,016 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,253 >>> mbox cmd response: success
2,771,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,271 UART: [afmc] ++
2,772,439 UART: [afmc] CDI.KEYID = 6
2,772,801 UART: [afmc] SUBJECT.KEYID = 7
2,773,226 UART: [afmc] AUTHORITY.KEYID = 5
2,808,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,239 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,958 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,680 UART: [afmc] --
2,851,636 UART: [cold-reset] --
2,852,438 UART: [state] Locking Datavault
2,853,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,947 UART: [state] Locking ICCM
2,854,569 UART: [exit] Launching FMC @ 0x40000130
2,859,898 UART:
2,859,914 UART: Running Caliptra FMC ...
2,860,322 UART:
2,860,376 UART: [state] CFI Enabled
2,870,931 UART: [fht] FMC Alias Private Key: 7
2,978,710 UART: [art] Extend RT PCRs Done
2,979,138 UART: [art] Lock RT PCRs Done
2,980,550 UART: [art] Populate DV Done
2,988,677 UART: [fht] FMC Alias Private Key: 7
2,989,751 UART: [art] Derive CDI
2,990,031 UART: [art] Store in in slot 0x4
3,075,886 UART: [art] Derive Key Pair
3,076,246 UART: [art] Store priv key in slot 0x5
3,089,344 UART: [art] Derive Key Pair - Done
3,104,042 UART: [art] Signing Cert with AUTHO
3,104,522 UART: RITY.KEYID = 7
3,119,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,405 UART: [art] PUB.X = F48A4DC9C14768E65FFD46869D3C78FDBE11331FB2A0E4F89D048C4ED606C604168198F7D289E417B9B5670A3FCA7DF0
3,127,173 UART: [art] PUB.Y = 520D2D010B791234DB28DEF59DE3EF4188343E1BAF24FCBF74EDD8F3517873AD6F6D8869B37EDB24F850C2BE3F1851A9
3,134,128 UART: [art] SIG.R = 32CC38D148A134B6E21ED7FC0C4661B8BF5926AB7A1C22AEE436EEE3CD117368520B8B542E8A9DA66D169360B1FE74A0
3,140,904 UART: [art] SIG.S = 29C06C94A14959D2D728474C64EF933816CE69C2976E54D8A6D65F736EF57DDA2AD877E890E1A750FBDAAB3E0FD22072
3,164,942 UART: Caliptra RT
3,165,195 UART: [state] CFI Enabled
3,272,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,786 UART: [rt]cmd =0x44504543, len=96
3,339,810 >>> mbox cmd response data (56 bytes)
3,339,811 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,328 UART: [rt]cmd =0x54514754, len=24
3,371,102 >>> mbox cmd response: failed
3,371,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,650 UART: [rt]cmd =0x54514754, len=24
3,402,768 >>> mbox cmd response data (8 bytes)
3,402,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,594 UART: [rt]cmd =0x44504543, len=96
3,468,659 >>> mbox cmd response data (56 bytes)
3,468,660 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,253 UART: [rt]cmd =0x47544744, len=8
3,500,825 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,715 ready_for_fw is high
1,060,715 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,524 >>> mbox cmd response: success
2,621,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,683,804 UART:
2,683,820 UART: Running Caliptra FMC ...
2,684,228 UART:
2,684,282 UART: [state] CFI Enabled
2,695,157 UART: [fht] FMC Alias Private Key: 7
2,802,532 UART: [art] Extend RT PCRs Done
2,802,960 UART: [art] Lock RT PCRs Done
2,804,778 UART: [art] Populate DV Done
2,812,915 UART: [fht] FMC Alias Private Key: 7
2,813,877 UART: [art] Derive CDI
2,814,157 UART: [art] Store in in slot 0x4
2,899,686 UART: [art] Derive Key Pair
2,900,046 UART: [art] Store priv key in slot 0x5
2,912,828 UART: [art] Derive Key Pair - Done
2,927,693 UART: [art] Signing Cert with AUTHO
2,928,173 UART: RITY.KEYID = 7
2,943,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,428 UART: [art] PUB.X = 649284ACEB5E306C8455A027F204D95B02FD0374ED921FFFF0DA6492D3E4000680347D29A9993624D6A4DAFB96E0BCB9
2,951,170 UART: [art] PUB.Y = 28A13A41472B1F8AAC21C546C688A7A44DA9D7668C974B50CA4B761BBAF81069076CF4DC2A50487A686210FBB9BB9CD8
2,958,127 UART: [art] SIG.R = 1421BB1412A930027A99870531B464323F753A55C15E414ECB77C39DE5DEC82FEE729E6D0FA67DD857CA45CA2A5D89BE
2,964,896 UART: [art] SIG.S = 16A54837D64D414FA641F9EC06365063FED962622471F2FBED2402BFE401DC8DD7BAC5675FE2E06C090830D2E5147560
2,988,648 UART: Caliptra RT
2,988,901 UART: [state] CFI Enabled
3,096,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,920 UART: [rt]cmd =0x44504543, len=96
3,164,608 >>> mbox cmd response data (56 bytes)
3,164,609 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,176 UART: [rt]cmd =0x54514754, len=24
3,196,034 >>> mbox cmd response: failed
3,196,034 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,410 UART: [rt]cmd =0x54514754, len=24
3,227,566 >>> mbox cmd response data (8 bytes)
3,227,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,396 UART: [rt]cmd =0x44504543, len=96
3,294,473 >>> mbox cmd response data (56 bytes)
3,294,474 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,863 UART: [rt]cmd =0x47544744, len=8
3,326,229 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
906,821 UART: [kat] SHA2-512-ACC
908,722 UART: [kat] ECC-384
918,311 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,406 UART: [cold-reset] ++
1,172,740 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 ready_for_fw is high
1,176,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,753 UART: [idev] Erasing UDS.KEYID = 0
1,202,246 UART: [idev] Sha1 KeyId Algorithm
1,210,760 UART: [idev] --
1,211,954 UART: [ldev] ++
1,212,122 UART: [ldev] CDI.KEYID = 6
1,212,485 UART: [ldev] SUBJECT.KEYID = 5
1,212,911 UART: [ldev] AUTHORITY.KEYID = 7
1,213,374 UART: [ldev] FE.KEYID = 1
1,218,944 UART: [ldev] Erasing FE.KEYID = 1
1,245,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,296 UART: [ldev] --
1,284,809 UART: [fwproc] Wait for Commands...
1,285,575 UART: [fwproc] Recv command 0x46574c44
1,286,303 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,602 >>> mbox cmd response: success
2,772,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,844 UART: [afmc] ++
2,774,012 UART: [afmc] CDI.KEYID = 6
2,774,374 UART: [afmc] SUBJECT.KEYID = 7
2,774,799 UART: [afmc] AUTHORITY.KEYID = 5
2,810,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,712 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,259 UART: [afmc] --
2,854,185 UART: [cold-reset] --
2,854,991 UART: [state] Locking Datavault
2,856,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,828 UART: [state] Locking ICCM
2,857,288 UART: [exit] Launching FMC @ 0x40000130
2,862,617 UART:
2,862,633 UART: Running Caliptra FMC ...
2,863,041 UART:
2,863,184 UART: [state] CFI Enabled
2,874,069 UART: [fht] FMC Alias Private Key: 7
2,982,040 UART: [art] Extend RT PCRs Done
2,982,468 UART: [art] Lock RT PCRs Done
2,983,904 UART: [art] Populate DV Done
2,992,051 UART: [fht] FMC Alias Private Key: 7
2,993,101 UART: [art] Derive CDI
2,993,381 UART: [art] Store in in slot 0x4
3,079,296 UART: [art] Derive Key Pair
3,079,656 UART: [art] Store priv key in slot 0x5
3,092,692 UART: [art] Derive Key Pair - Done
3,107,296 UART: [art] Signing Cert with AUTHO
3,107,776 UART: RITY.KEYID = 7
3,123,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,985 UART: [art] PUB.X = 10E26E88D10C9D5339322D33DE0DC0EA7468CFA1DF3F64AF1E1A2335B177C83010ACB97C8F6C30FA53C692B69970E02A
3,130,759 UART: [art] PUB.Y = E8552BAF153F9326FD6EB784636E6DA396C4CEF7118DEB2AA812E81B7B963A8253C2EF42F5F45108B8EFF0D3B7D8F040
3,137,720 UART: [art] SIG.R = 7B0B5A1FDC07999904A5B668B428E966BBA859BB5EC7412C5C12E3A50B49D160DCFD61B31372A7E669E7988F05F3E566
3,144,481 UART: [art] SIG.S = DA63753B6B4C126521C19887D9A822E80FCDB5E92F7D71B595B97C3E154F9DDAA74D76B9F398F8CA48B9AAA575FF9A26
3,168,563 UART: Caliptra RT
3,168,908 UART: [state] CFI Enabled
3,277,025 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,243 UART: [rt]cmd =0x44504543, len=96
3,344,343 >>> mbox cmd response data (56 bytes)
3,344,344 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,861 UART: [rt]cmd =0x54514754, len=24
3,375,739 >>> mbox cmd response: failed
3,375,739 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,303 UART: [rt]cmd =0x54514754, len=24
3,407,545 >>> mbox cmd response data (8 bytes)
3,407,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,687 UART: [rt]cmd =0x44504543, len=96
3,474,530 >>> mbox cmd response data (56 bytes)
3,474,531 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,968 UART: [rt]cmd =0x47544744, len=8
3,506,590 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 ready_for_fw is high
1,061,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,545 >>> mbox cmd response: success
2,622,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,683,943 UART:
2,683,959 UART: Running Caliptra FMC ...
2,684,367 UART:
2,684,510 UART: [state] CFI Enabled
2,695,389 UART: [fht] FMC Alias Private Key: 7
2,802,946 UART: [art] Extend RT PCRs Done
2,803,374 UART: [art] Lock RT PCRs Done
2,804,954 UART: [art] Populate DV Done
2,812,877 UART: [fht] FMC Alias Private Key: 7
2,813,805 UART: [art] Derive CDI
2,814,085 UART: [art] Store in in slot 0x4
2,899,810 UART: [art] Derive Key Pair
2,900,170 UART: [art] Store priv key in slot 0x5
2,913,682 UART: [art] Derive Key Pair - Done
2,928,887 UART: [art] Signing Cert with AUTHO
2,929,367 UART: RITY.KEYID = 7
2,944,443 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,208 UART: [art] PUB.X = C6D5BAD30DD4185568FA9E85F3217D420A4788703A6B04611E7CA5FE7F1FB2C083E1248199458774FF5DF285B493EA4A
2,951,973 UART: [art] PUB.Y = 6520F24B93275B5D16DC2F57364C11F48551EA2617E96743E545440C18D54A74FA36FE25EA7D40176D4459399773DFBE
2,958,914 UART: [art] SIG.R = A630F8C82545543A541F10A185F9711153C74610571ABA058F0DF3B16942CF9A8AFD909A951E8EDAF68A8653CA9B78D7
2,965,680 UART: [art] SIG.S = B6C86B4A1C0A1F1F5DDE788D5DE575A46580803BB8DB8D64A69E337726388B5E342C3AF8FD24E898B1226C0CCB66BBC8
2,989,683 UART: Caliptra RT
2,990,028 UART: [state] CFI Enabled
3,098,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,358 UART: [rt]cmd =0x44504543, len=96
3,166,422 >>> mbox cmd response data (56 bytes)
3,166,423 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,195,994 UART: [rt]cmd =0x54514754, len=24
3,197,730 >>> mbox cmd response: failed
3,197,730 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,324 UART: [rt]cmd =0x54514754, len=24
3,229,498 >>> mbox cmd response data (8 bytes)
3,229,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,259,676 UART: [rt]cmd =0x44504543, len=96
3,296,193 >>> mbox cmd response data (56 bytes)
3,296,194 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,695 UART: [rt]cmd =0x47544744, len=8
3,328,087 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,951 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,173,133 UART: [idev] ++
1,173,301 UART: [idev] CDI.KEYID = 6
1,173,662 UART: [idev] SUBJECT.KEYID = 7
1,174,087 UART: [idev] UDS.KEYID = 0
1,174,433 ready_for_fw is high
1,174,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,794 UART: [ldev] ++
1,208,962 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,753 UART: [ldev] AUTHORITY.KEYID = 7
1,210,216 UART: [ldev] FE.KEYID = 1
1,215,326 UART: [ldev] Erasing FE.KEYID = 1
1,240,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,100 UART: [ldev] --
1,280,416 UART: [fwproc] Wait for Commands...
1,281,037 UART: [fwproc] Recv command 0x46574c44
1,281,770 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,601 >>> mbox cmd response: success
2,767,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,768,652 UART: [afmc] ++
2,768,820 UART: [afmc] CDI.KEYID = 6
2,769,183 UART: [afmc] SUBJECT.KEYID = 7
2,769,609 UART: [afmc] AUTHORITY.KEYID = 5
2,805,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,373 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,359 UART: [afmc] --
2,848,299 UART: [cold-reset] --
2,849,241 UART: [state] Locking Datavault
2,850,646 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,250 UART: [state] Locking ICCM
2,851,846 UART: [exit] Launching FMC @ 0x40000130
2,857,175 UART:
2,857,191 UART: Running Caliptra FMC ...
2,857,599 UART:
2,857,653 UART: [state] CFI Enabled
2,867,668 UART: [fht] FMC Alias Private Key: 7
2,974,937 UART: [art] Extend RT PCRs Done
2,975,365 UART: [art] Lock RT PCRs Done
2,976,849 UART: [art] Populate DV Done
2,985,120 UART: [fht] FMC Alias Private Key: 7
2,986,078 UART: [art] Derive CDI
2,986,358 UART: [art] Store in in slot 0x4
3,072,207 UART: [art] Derive Key Pair
3,072,567 UART: [art] Store priv key in slot 0x5
3,085,389 UART: [art] Derive Key Pair - Done
3,100,195 UART: [art] Signing Cert with AUTHO
3,100,675 UART: RITY.KEYID = 7
3,115,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,464 UART: [art] PUB.X = D40023FAFCEC451C62B29C3A9ADBEF9B84A6F9F44078C620D3C175DC00028BADEA02A27C28E58033243351881C4F4EB5
3,123,196 UART: [art] PUB.Y = F4A01F3206AC7CD5426883DCC0D103B817BE7A5C2F2E71186EDDEE7480F9A79B451FF8694591CFE416C7E1550E747623
3,130,143 UART: [art] SIG.R = 34D73AC8715E03B5D7140CD0DDFB2FD66047A8728B8CE70E9F598505B9664114774F280125F4B6E0191952ABE05BB3A5
3,136,898 UART: [art] SIG.S = 1FEC2510B2758ECC1F177E724B1F962A7D2FBFE7FC6CE8E64FDFC5FE1BEFEAD31E35ABB9503BD7799B45E8FD350E7D02
3,160,851 UART: Caliptra RT
3,161,104 UART: [state] CFI Enabled
3,269,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,409 UART: [rt]cmd =0x44504543, len=96
3,337,297 >>> mbox cmd response data (56 bytes)
3,337,298 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,717 UART: [rt]cmd =0x54514754, len=24
3,368,551 >>> mbox cmd response: failed
3,368,551 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,179 UART: [rt]cmd =0x54514754, len=24
3,400,375 >>> mbox cmd response data (8 bytes)
3,400,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,319 UART: [rt]cmd =0x44504543, len=96
3,466,484 >>> mbox cmd response data (56 bytes)
3,466,485 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,802 UART: [rt]cmd =0x47544744, len=8
3,498,534 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,708 ready_for_fw is high
1,056,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,365 >>> mbox cmd response: success
2,620,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,681,921 UART:
2,681,937 UART: Running Caliptra FMC ...
2,682,345 UART:
2,682,399 UART: [state] CFI Enabled
2,692,940 UART: [fht] FMC Alias Private Key: 7
2,800,337 UART: [art] Extend RT PCRs Done
2,800,765 UART: [art] Lock RT PCRs Done
2,802,617 UART: [art] Populate DV Done
2,810,938 UART: [fht] FMC Alias Private Key: 7
2,812,118 UART: [art] Derive CDI
2,812,398 UART: [art] Store in in slot 0x4
2,897,589 UART: [art] Derive Key Pair
2,897,949 UART: [art] Store priv key in slot 0x5
2,911,507 UART: [art] Derive Key Pair - Done
2,926,433 UART: [art] Signing Cert with AUTHO
2,926,913 UART: RITY.KEYID = 7
2,942,219 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,984 UART: [art] PUB.X = BA2B3AA6F861331C41D316718F00A2A092070F77DC850E198ADFBD29F0A8EB43CCCCECEE79C88E754B738455971F28FD
2,949,737 UART: [art] PUB.Y = 5D99ED504A56BAFB14A8C18ED6D39F77D86A962FDE5877FEFC95BA61852E11027D080008C7625001F80C20BDFE390AC7
2,956,657 UART: [art] SIG.R = 29315023280EA28080B014D13888A9873F305D1A5940DBA0719073542F9181360473BEC97E8B85DB191B7DC1332E3E5B
2,963,409 UART: [art] SIG.S = 0D17080983A1405CDDFE345009F45CA5DAE5BB08827750C64BD4AA444B2F7E82F5911E090933538DE799FF328832F5A4
2,987,055 UART: Caliptra RT
2,987,308 UART: [state] CFI Enabled
3,095,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,241 UART: [rt]cmd =0x44504543, len=96
3,163,957 >>> mbox cmd response data (56 bytes)
3,163,958 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,231 UART: [rt]cmd =0x54514754, len=24
3,195,081 >>> mbox cmd response: failed
3,195,081 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,473 UART: [rt]cmd =0x54514754, len=24
3,226,589 >>> mbox cmd response data (8 bytes)
3,226,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,256,539 UART: [rt]cmd =0x44504543, len=96
3,292,710 >>> mbox cmd response data (56 bytes)
3,292,711 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,104 UART: [rt]cmd =0x47544744, len=8
3,324,774 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
891,733 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,862 UART: [kat] ++
896,014 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,548 UART: [idev] ++
1,173,716 UART: [idev] CDI.KEYID = 6
1,174,077 UART: [idev] SUBJECT.KEYID = 7
1,174,502 UART: [idev] UDS.KEYID = 0
1,174,848 ready_for_fw is high
1,174,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,662 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,401 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,343 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,782 >>> mbox cmd response: success
2,769,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,770,799 UART: [afmc] ++
2,770,967 UART: [afmc] CDI.KEYID = 6
2,771,330 UART: [afmc] SUBJECT.KEYID = 7
2,771,756 UART: [afmc] AUTHORITY.KEYID = 5
2,807,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,320 UART: [afmc] --
2,850,446 UART: [cold-reset] --
2,851,138 UART: [state] Locking Datavault
2,852,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,939 UART: [state] Locking ICCM
2,853,417 UART: [exit] Launching FMC @ 0x40000130
2,858,746 UART:
2,858,762 UART: Running Caliptra FMC ...
2,859,170 UART:
2,859,313 UART: [state] CFI Enabled
2,869,662 UART: [fht] FMC Alias Private Key: 7
2,977,605 UART: [art] Extend RT PCRs Done
2,978,033 UART: [art] Lock RT PCRs Done
2,979,737 UART: [art] Populate DV Done
2,987,784 UART: [fht] FMC Alias Private Key: 7
2,988,918 UART: [art] Derive CDI
2,989,198 UART: [art] Store in in slot 0x4
3,075,359 UART: [art] Derive Key Pair
3,075,719 UART: [art] Store priv key in slot 0x5
3,089,117 UART: [art] Derive Key Pair - Done
3,103,507 UART: [art] Signing Cert with AUTHO
3,103,987 UART: RITY.KEYID = 7
3,119,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,934 UART: [art] PUB.X = 27533010EF1E53127A961EAA50C85B67AEA9D28781F19D62728E63AAC9587188CE1FCF60C58653E0615C217662A9B091
3,126,700 UART: [art] PUB.Y = 9EEC9F3539B5AC5183FC1E89C271F729D36ED4F1609B6BD530794A8AEE51F730E97CB7CBB270AB2BBD353A538F9AE657
3,133,666 UART: [art] SIG.R = 1385D8F8E09FBCA5BB8BC9C4B02E09C839103E892CC79CA8F0BDFB185D10DE7D9BB5186E9EEA0190A35CBF6E3507B4EC
3,140,451 UART: [art] SIG.S = 8138047ADE2BE4943CE1A38DB67F906AB7F124AC723D078D9C786154C466BA0E01DC77735F1A52BF7E9CE7244356CF50
3,164,916 UART: Caliptra RT
3,165,261 UART: [state] CFI Enabled
3,273,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,826 UART: [rt]cmd =0x44504543, len=96
3,341,264 >>> mbox cmd response data (56 bytes)
3,341,265 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,584 UART: [rt]cmd =0x54514754, len=24
3,372,584 >>> mbox cmd response: failed
3,372,584 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,066 UART: [rt]cmd =0x54514754, len=24
3,404,050 >>> mbox cmd response data (8 bytes)
3,404,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,042 UART: [rt]cmd =0x44504543, len=96
3,469,761 >>> mbox cmd response data (56 bytes)
3,469,762 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,169 UART: [rt]cmd =0x47544744, len=8
3,501,615 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,773 ready_for_fw is high
1,056,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,722 >>> mbox cmd response: success
2,620,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,682,892 UART:
2,682,908 UART: Running Caliptra FMC ...
2,683,316 UART:
2,683,459 UART: [state] CFI Enabled
2,693,840 UART: [fht] FMC Alias Private Key: 7
2,801,797 UART: [art] Extend RT PCRs Done
2,802,225 UART: [art] Lock RT PCRs Done
2,803,425 UART: [art] Populate DV Done
2,811,762 UART: [fht] FMC Alias Private Key: 7
2,812,944 UART: [art] Derive CDI
2,813,224 UART: [art] Store in in slot 0x4
2,898,905 UART: [art] Derive Key Pair
2,899,265 UART: [art] Store priv key in slot 0x5
2,912,655 UART: [art] Derive Key Pair - Done
2,927,333 UART: [art] Signing Cert with AUTHO
2,927,813 UART: RITY.KEYID = 7
2,942,703 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,468 UART: [art] PUB.X = C922D3171FC1D6C65AE6F31E857833C6FE80F95266E1ABBFB292E424C54DADB59501B452A75E6ACC00C69E4B1F4AC51E
2,950,229 UART: [art] PUB.Y = 8366818F61AF2823754D6F79A8B47256A3A52FA7E24F9C601468E816F6C8475A6F57F9087FE5897824FFB85BCA278910
2,957,170 UART: [art] SIG.R = 0E79AF895F30DFA3F2202E397FD6462E24F6906DDF1A0F1C191F79DFD72FB344FA4E3AE04125F149779B1B35B63D22AA
2,963,946 UART: [art] SIG.S = 3CF869BFA7585F82692467560C502A8C36064C9CE81DAEF1527C52FE289538ED9D6F4C11F1BD46465DB8A685E15AAA86
2,987,523 UART: Caliptra RT
2,987,868 UART: [state] CFI Enabled
3,095,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,375 UART: [rt]cmd =0x44504543, len=96
3,162,403 >>> mbox cmd response data (56 bytes)
3,162,404 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,977 UART: [rt]cmd =0x54514754, len=24
3,193,723 >>> mbox cmd response: failed
3,193,723 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,485 UART: [rt]cmd =0x54514754, len=24
3,225,547 >>> mbox cmd response data (8 bytes)
3,225,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,395 UART: [rt]cmd =0x44504543, len=96
3,291,770 >>> mbox cmd response data (56 bytes)
3,291,771 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,321,452 UART: [rt]cmd =0x47544744, len=8
3,323,958 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,979 UART:
192,345 UART: Running Caliptra ROM ...
193,663 UART:
193,820 UART: [state] CFI Enabled
262,915 UART: [state] LifecycleState = Unprovisioned
264,856 UART: [state] DebugLocked = No
267,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,746 UART: [kat] SHA2-256
441,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,912 UART: [kat] ++
452,363 UART: [kat] sha1
464,798 UART: [kat] SHA2-256
467,520 UART: [kat] SHA2-384
474,016 UART: [kat] SHA2-512-ACC
476,391 UART: [kat] ECC-384
2,769,723 UART: [kat] HMAC-384Kdf
2,802,207 UART: [kat] LMS
3,992,507 UART: [kat] --
3,994,837 UART: [cold-reset] ++
3,997,131 UART: [fht] Storing FHT @ 0x50003400
4,008,825 UART: [idev] ++
4,009,392 UART: [idev] CDI.KEYID = 6
4,010,360 UART: [idev] SUBJECT.KEYID = 7
4,011,615 UART: [idev] UDS.KEYID = 0
4,012,626 ready_for_fw is high
4,012,842 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,111,783 UART: [idev] Erasing UDS.KEYID = 0
7,351,227 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,605 UART: [idev] --
7,376,440 UART: [ldev] ++
7,377,012 UART: [ldev] CDI.KEYID = 6
7,377,951 UART: [ldev] SUBJECT.KEYID = 5
7,379,215 UART: [ldev] AUTHORITY.KEYID = 7
7,380,370 UART: [ldev] FE.KEYID = 1
7,425,143 UART: [ldev] Erasing FE.KEYID = 1
10,758,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,637 UART: [ldev] --
13,118,718 UART: [fwproc] Waiting for Commands...
13,120,757 UART: [fwproc] Received command 0x46574c44
13,122,938 UART: [fwproc] Received Image of size 78492 bytes
16,743,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,817,368 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,886,286 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,078,669 >>> mbox cmd response: success
17,079,148 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,083,219 UART: [afmc] ++
17,083,883 UART: [afmc] CDI.KEYID = 6
17,084,799 UART: [afmc] SUBJECT.KEYID = 7
17,086,059 UART: [afmc] AUTHORITY.KEYID = 5
20,452,485 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,756,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,758,344 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,772,763 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,787,592 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,802,033 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,823,984 UART: [afmc] --
22,827,526 UART: [cold-reset] --
22,829,766 UART: [state] Locking Datavault
22,833,719 UART: [state] Locking PCR0, PCR1 and PCR31
22,835,460 UART: [state] Locking ICCM
22,838,208 UART: [exit] Launching FMC @ 0x40000130
22,846,601 UART:
22,846,864 UART: Running Caliptra FMC ...
22,847,966 UART:
22,848,130 UART: [state] CFI Enabled
22,915,200 UART: [fht] FMC Alias Private Key: 7
25,253,412 UART: [art] Extend RT PCRs Done
25,254,641 UART: [art] Lock RT PCRs Done
25,256,078 UART: [art] Populate DV Done
25,261,706 UART: [fht] FMC Alias Private Key: 7
25,263,242 UART: [art] Derive CDI
25,263,978 UART: [art] Store in in slot 0x4
25,323,804 UART: [art] Derive Key Pair
25,324,843 UART: [art] Store priv key in slot 0x5
28,617,858 UART: [art] Derive Key Pair - Done
28,630,748 UART: [art] Signing Cert with AUTHO
28,632,056 UART: RITY.KEYID = 7
30,920,281 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,814 UART: [art] PUB.X = 75905BA39AD17D1774A04B6EB37D596FA77BAF7B6AD93ABDC156724ACEC286FC88067D31ADE96564D25D0788F001A202
30,928,998 UART: [art] PUB.Y = CC33CB4D771FB2D8A84F8242F7906F49104E9303A9BA4728E7875C7874BF7473DC3F11F2E0C800381C05DE3CC09FF7F4
30,936,277 UART: [art] SIG.R = 5759BA27E16AFF55797B3D7B1C13B98C5F3D99C21B6687842D68422A12F117C5CE648ED10C9249F2E01C94487D5942C6
30,943,670 UART: [art] SIG.S = B3B095A46E59741FB3A8E100139EB2BFA666F7D92DE09011114031F5DF72DCC7A386889F9D1F1190C7846B516828EFAC
32,247,580 UART: mbox::rt_entry...
32,248,537 UART: ____ _ _ _ ____ _____
32,250,465 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,248 UART: |_|
32,259,083 UART:
32,372,555 UART: [rt] Runtime listening for mailbox commands...
32,374,575 >>> mbox cmd response data (0 bytes)
34,429,105 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,573,051 UART:
34,573,441 UART: Running Caliptra ROM ...
34,574,498 UART:
34,574,650 UART: [state] CFI Enabled
34,632,249 UART: [state] LifecycleState = Unprovisioned
34,634,189 UART: [state] DebugLocked = No
34,636,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,641,690 UART: [kat] SHA2-256
34,811,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,821,867 UART: [kat] ++
34,822,321 UART: [kat] sha1
34,832,959 UART: [kat] SHA2-256
34,835,634 UART: [kat] SHA2-384
34,840,444 UART: [kat] SHA2-512-ACC
34,842,800 UART: [kat] ECC-384
37,135,590 UART: [kat] HMAC-384Kdf
37,168,390 UART: [kat] LMS
38,358,685 UART: [kat] --
38,363,539 UART: [update-reset] ++
42,500,078 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,504,183 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,885,171 >>> mbox cmd response: success
42,889,716 UART: [update-reset] Copying MAN_2 To MAN_1
42,908,416 UART: [update-reset Success] --
42,913,742 UART: [state] Locking Datavault
42,918,297 UART: [state] Locking PCR0, PCR1 and PCR31
42,920,088 UART: [state] Locking ICCM
42,921,198 UART: [exit] Launching FMC @ 0x40000130
42,929,649 UART:
42,929,880 UART: Running Caliptra FMC ...
42,930,906 UART:
42,931,054 UART: [state] CFI Enabled
43,025,853 UART: [art] Extend RT PCRs Done
43,027,050 UART: [art] Lock RT PCRs Done
43,028,488 UART: [art] Populate DV Done
43,034,117 UART: [fht] FMC Alias Private Key: 7
43,035,707 UART: [art] Derive CDI
43,036,446 UART: [art] Store in in slot 0x4
43,095,194 UART: [art] Derive Key Pair
43,096,260 UART: [art] Store priv key in slot 0x5
46,388,788 UART: [art] Derive Key Pair - Done
46,401,800 UART: [art] Signing Cert with AUTHO
46,403,110 UART: RITY.KEYID = 7
48,691,169 UART: [art] Erasing AUTHORITY.KEYID = 7
48,692,678 UART: [art] PUB.X = 27A800D5B86D0BC9D098BF4F4FB98A4557C7186C51182BE05A042310481B5DD0A4536542BBF2BE13ACDFFB4258E3DB5E
48,699,925 UART: [art] PUB.Y = 80B51D6F3875782BAD0EC8FF44231EB3AFC81276C3A2AA254BC928E551BF93E63D45ABEC07462131A9ACF38D43083407
48,707,212 UART: [art] SIG.R = CFE094E06C78EECFEF865843F697D0AAE690739B645951E3A95A79295B60D58E13E314FB16FC3C147394BB8BEDDC61D2
48,714,605 UART: [art] SIG.S = 6B2EC5A8CB28EC5BB1597919C996BBFBE3672302B279613C9F4B0F87EE4822E123257B3D97CA1CAF3059413ADDFF3080
50,019,926 UART: Caliptra RT
50,020,649 UART: [state] CFI Enabled
50,352,676 UART: [rt] RT failed reset flow
50,354,002 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,804,284 ready_for_fw is high
3,804,926 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,147,106 >>> mbox cmd response: success
17,147,711 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,843,240 UART:
22,843,627 UART: Running Caliptra FMC ...
22,844,823 UART:
22,844,995 UART: [state] CFI Enabled
22,909,923 UART: [fht] FMC Alias Private Key: 7
25,247,338 UART: [art] Extend RT PCRs Done
25,248,603 UART: [art] Lock RT PCRs Done
25,250,285 UART: [art] Populate DV Done
25,255,985 UART: [fht] FMC Alias Private Key: 7
25,257,634 UART: [art] Derive CDI
25,258,374 UART: [art] Store in in slot 0x4
25,318,150 UART: [art] Derive Key Pair
25,319,196 UART: [art] Store priv key in slot 0x5
28,611,739 UART: [art] Derive Key Pair - Done
28,625,120 UART: [art] Signing Cert with AUTHO
28,626,432 UART: RITY.KEYID = 7
30,913,367 UART: [art] Erasing AUTHORITY.KEYID = 7
30,914,876 UART: [art] PUB.X = 2A84B3F6875F04193CF8D715C76BD145677BFB0E0A3CE7ABB2000D99A630CD05751A1029D9FFA05D950E5516F0C3D557
30,922,075 UART: [art] PUB.Y = 61DC731F2D574DFA0FC601F6B7B1BBB114C7C6DBE87791056243761874815ACC3D250A73D5A9703C82E756BD111CBEA3
30,929,324 UART: [art] SIG.R = 3C6C9C3036A614DA8DD0C878BBE177055D74AAEB4110E8A4325CF0B608591CC232D80BA45904B0D37EBE0BA8779E4AF0
30,936,730 UART: [art] SIG.S = AD568FBE1E37436E2267C8AE734D11FAD5748CE9F23E1F3917B43F3D044EC8E6E615E81C10D0D62A7E8018EF3D41FE19
32,241,351 UART: mbox::rt_entry...
32,242,298 UART: ____ _ _ _ ____ _____
32,244,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,246,307 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,248,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,250,207 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,252,065 UART: |_|
32,252,872 UART:
32,366,684 UART: [rt] Runtime listening for mailbox commands...
32,368,715 >>> mbox cmd response data (0 bytes)
34,422,996 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,122,026 >>> mbox cmd response: success
43,157,835 UART:
43,158,198 UART: Running Caliptra FMC ...
43,159,354 UART:
43,159,530 UART: [state] CFI Enabled
43,247,867 UART: [art] Extend RT PCRs Done
43,249,061 UART: [art] Lock RT PCRs Done
43,250,635 UART: [art] Populate DV Done
43,256,152 UART: [fht] FMC Alias Private Key: 7
43,257,632 UART: [art] Derive CDI
43,258,400 UART: [art] Store in in slot 0x4
43,317,494 UART: [art] Derive Key Pair
43,318,534 UART: [art] Store priv key in slot 0x5
46,611,257 UART: [art] Derive Key Pair - Done
46,624,480 UART: [art] Signing Cert with AUTHO
46,625,788 UART: RITY.KEYID = 7
48,913,163 UART: [art] Erasing AUTHORITY.KEYID = 7
48,914,675 UART: [art] PUB.X = BDBE83CE6040319F709987402638317C8A0EC9F8088EF27AB39377DF5CADE1E3BEA22308CC85638F89B5ACFB62110BF0
48,921,884 UART: [art] PUB.Y = EE55ACE1901EB6D7D95CB99DE203DE9DF95F81A3012482F394731575897B9E59F94F2703C7D64E7B4998F0AFCB82C078
48,929,159 UART: [art] SIG.R = C07CA5CBF964430C2692A939D250BB9EE6E638B86DBB975AD8D7A22CD43AB0A9451BE1D4D3DAF5C4CAF934938383737F
48,936,515 UART: [art] SIG.S = 37D772F0D538247D6B73AF928DCD4581D284A6FA01F317EDD4151AA9660AC5DD008C7B2A87AB3E0B9B4129CC1AF01336
50,241,783 UART: Caliptra RT
50,242,496 UART: [state] CFI Enabled
50,573,877 UART: [rt] RT failed reset flow
50,575,066 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,594 writing to cptra_bootfsm_go
192,722 UART:
193,083 UART: Running Caliptra ROM ...
194,272 UART:
604,102 UART: [state] CFI Enabled
618,188 UART: [state] LifecycleState = Unprovisioned
620,123 UART: [state] DebugLocked = No
621,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,689 UART: [kat] SHA2-256
795,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,996 UART: [kat] ++
806,439 UART: [kat] sha1
818,675 UART: [kat] SHA2-256
821,394 UART: [kat] SHA2-384
827,460 UART: [kat] SHA2-512-ACC
829,827 UART: [kat] ECC-384
3,113,852 UART: [kat] HMAC-384Kdf
3,126,093 UART: [kat] LMS
4,316,202 UART: [kat] --
4,321,781 UART: [cold-reset] ++
4,323,497 UART: [fht] Storing FHT @ 0x50003400
4,334,713 UART: [idev] ++
4,335,311 UART: [idev] CDI.KEYID = 6
4,336,245 UART: [idev] SUBJECT.KEYID = 7
4,337,416 UART: [idev] UDS.KEYID = 0
4,338,505 ready_for_fw is high
4,338,738 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,437,432 UART: [idev] Erasing UDS.KEYID = 0
7,624,314 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,601 UART: [idev] --
7,648,736 UART: [ldev] ++
7,649,304 UART: [ldev] CDI.KEYID = 6
7,650,276 UART: [ldev] SUBJECT.KEYID = 5
7,651,483 UART: [ldev] AUTHORITY.KEYID = 7
7,652,761 UART: [ldev] FE.KEYID = 1
7,665,775 UART: [ldev] Erasing FE.KEYID = 1
10,953,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,741 UART: [ldev] --
13,316,128 UART: [fwproc] Waiting for Commands...
13,318,437 UART: [fwproc] Received command 0x46574c44
13,320,613 UART: [fwproc] Received Image of size 78492 bytes
16,948,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,022,504 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,091,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,284,486 >>> mbox cmd response: success
17,285,012 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,288,904 UART: [afmc] ++
17,289,483 UART: [afmc] CDI.KEYID = 6
17,290,455 UART: [afmc] SUBJECT.KEYID = 7
17,291,664 UART: [afmc] AUTHORITY.KEYID = 5
20,603,678 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,895,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,898,173 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,912,561 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,927,433 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,941,870 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,963,316 UART: [afmc] --
22,968,040 UART: [cold-reset] --
22,970,286 UART: [state] Locking Datavault
22,974,458 UART: [state] Locking PCR0, PCR1 and PCR31
22,976,255 UART: [state] Locking ICCM
22,977,437 UART: [exit] Launching FMC @ 0x40000130
22,985,835 UART:
22,986,069 UART: Running Caliptra FMC ...
22,987,171 UART:
22,987,327 UART: [state] CFI Enabled
22,995,212 UART: [fht] FMC Alias Private Key: 7
25,326,056 UART: [art] Extend RT PCRs Done
25,327,286 UART: [art] Lock RT PCRs Done
25,328,971 UART: [art] Populate DV Done
25,334,328 UART: [fht] FMC Alias Private Key: 7
25,335,970 UART: [art] Derive CDI
25,336,781 UART: [art] Store in in slot 0x4
25,379,753 UART: [art] Derive Key Pair
25,380,792 UART: [art] Store priv key in slot 0x5
28,622,858 UART: [art] Derive Key Pair - Done
28,635,867 UART: [art] Signing Cert with AUTHO
28,637,175 UART: RITY.KEYID = 7
30,916,537 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,052 UART: [art] PUB.X = 0231BEF5069332FFC98F35B86F33D16CD3F6B6E939423A01C6B7E1830753AA7881B302FCA1C6562D8904438D97B42453
30,925,274 UART: [art] PUB.Y = 52F98E7963B93516C28C120B2BD945CCDCA552838212A82B62BE326E0FE7352837AF488E0BFBACE4468728D614906C46
30,932,522 UART: [art] SIG.R = B700F5809CCC1D75A39478A46BE3B950A723621278DD605E6EA1340DC1E20A1B8E72D42BDBC2EB6142E5FD0F98627F6E
30,939,943 UART: [art] SIG.S = 223944BABDBD3C37CDF8BCB7C65787C09035E2F7004BB92471FF4979E1B5938ED582008B3CF9ED981BB8244264767DF3
32,244,734 UART: mbox::rt_entry...
32,245,702 UART: ____ _ _ _ ____ _____
32,247,686 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,613 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,255,670 UART: |_|
32,256,511 UART:
32,369,545 UART: [rt] Runtime listening for mailbox commands...
32,371,544 >>> mbox cmd response data (0 bytes)
34,427,532 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,571,325 UART:
34,571,684 UART: Running Caliptra ROM ...
34,572,827 UART:
34,572,995 UART: [state] CFI Enabled
34,587,377 UART: [state] LifecycleState = Unprovisioned
34,589,316 UART: [state] DebugLocked = No
34,591,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,595,712 UART: [kat] SHA2-256
34,765,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,775,967 UART: [kat] ++
34,776,425 UART: [kat] sha1
34,787,252 UART: [kat] SHA2-256
34,789,991 UART: [kat] SHA2-384
34,796,672 UART: [kat] SHA2-512-ACC
34,799,023 UART: [kat] ECC-384
37,083,829 UART: [kat] HMAC-384Kdf
37,094,601 UART: [kat] LMS
38,284,666 UART: [kat] --
38,287,917 UART: [update-reset] ++
42,426,300 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,429,208 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,810,229 >>> mbox cmd response: success
42,815,226 UART: [update-reset] Copying MAN_2 To MAN_1
42,833,804 UART: [update-reset Success] --
42,838,916 UART: [state] Locking Datavault
42,842,284 UART: [state] Locking PCR0, PCR1 and PCR31
42,844,022 UART: [state] Locking ICCM
42,845,929 UART: [exit] Launching FMC @ 0x40000130
42,854,387 UART:
42,854,632 UART: Running Caliptra FMC ...
42,855,734 UART:
42,855,893 UART: [state] CFI Enabled
42,900,275 UART: [art] Extend RT PCRs Done
42,901,466 UART: [art] Lock RT PCRs Done
42,902,916 UART: [art] Populate DV Done
42,908,534 UART: [fht] FMC Alias Private Key: 7
42,910,060 UART: [art] Derive CDI
42,910,873 UART: [art] Store in in slot 0x4
42,953,730 UART: [art] Derive Key Pair
42,954,725 UART: [art] Store priv key in slot 0x5
46,197,211 UART: [art] Derive Key Pair - Done
46,210,276 UART: [art] Signing Cert with AUTHO
46,211,587 UART: RITY.KEYID = 7
48,491,033 UART: [art] Erasing AUTHORITY.KEYID = 7
48,492,556 UART: [art] PUB.X = 7217D21E03EC0CACF53826D6F30692AB840498AA394F26390EB42B86E686FE23C9BECC490ACADA47B6DD5784D23298E2
48,499,846 UART: [art] PUB.Y = 34178B7687C43E9BC916BC5778AF5FB8D8B99D96D51CB86EC03BF6D314490D92F7C0B1718D979AF5F77696370093EE04
48,507,048 UART: [art] SIG.R = ED244D39E377E84D3D694122BE22E2AF10FC88768C712CEE7E80F13D75DB5EC6037ADE70DC9E3CCCB2AF97BFA7DD0B84
48,514,462 UART: [art] SIG.S = A3CA0BFC8E44424CAC3C643CCCCEFC3DBFF1BC55A1E96439E4353494B09B70592E9DC60F1F077D0279D34350AE440DCE
49,819,507 UART: Caliptra RT
49,820,225 UART: [state] CFI Enabled
50,109,199 UART: [rt] RT failed reset flow
50,110,393 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,128,592 ready_for_fw is high
4,129,218 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,328,896 >>> mbox cmd response: success
17,329,529 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,967,911 UART:
22,968,376 UART: Running Caliptra FMC ...
22,969,512 UART:
22,969,670 UART: [state] CFI Enabled
22,977,557 UART: [fht] FMC Alias Private Key: 7
25,308,552 UART: [art] Extend RT PCRs Done
25,309,786 UART: [art] Lock RT PCRs Done
25,311,223 UART: [art] Populate DV Done
25,316,592 UART: [fht] FMC Alias Private Key: 7
25,318,077 UART: [art] Derive CDI
25,318,813 UART: [art] Store in in slot 0x4
25,361,507 UART: [art] Derive Key Pair
25,362,501 UART: [art] Store priv key in slot 0x5
28,604,443 UART: [art] Derive Key Pair - Done
28,617,603 UART: [art] Signing Cert with AUTHO
28,618,906 UART: RITY.KEYID = 7
30,898,157 UART: [art] Erasing AUTHORITY.KEYID = 7
30,899,829 UART: [art] PUB.X = 9BA539975F53ADB369E2F26F657E7C52F6E3D9BDC5162AB4F232B8C23D90B0E7317C95F2EC029C2AAB75755673342576
30,906,918 UART: [art] PUB.Y = 4F0A61CA589039E28963AB82E6BBA8CE82A1D32551AD2C66BC6B58DF71BFEF97FCB23BB326CC65A215218FD73371DB58
30,914,147 UART: [art] SIG.R = B353855DFE5A8F4D1B637932EBCA1A26C9D1AD668FBACBA2BCE2A54F611CBBDFA00E08EEDDEAA1961C2AA113F8A5E360
30,921,580 UART: [art] SIG.S = 0939D6CF1723CAC9622C3AEBE396655E409F703B3B01F8D11B7EBB65EE67CC7CC8F5D7E2B5207C5EA62CD560B8951ABD
32,226,183 UART: mbox::rt_entry...
32,227,126 UART: ____ _ _ _ ____ _____
32,229,053 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,231,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,232,920 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,234,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,236,736 UART: |_|
32,237,618 UART:
32,351,788 UART: [rt] Runtime listening for mailbox commands...
32,353,794 >>> mbox cmd response data (0 bytes)
34,408,255 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,052,317 >>> mbox cmd response: success
43,089,236 UART:
43,089,566 UART: Running Caliptra FMC ...
43,090,698 UART:
43,090,867 UART: [state] CFI Enabled
43,134,185 UART: [art] Extend RT PCRs Done
43,135,324 UART: [art] Lock RT PCRs Done
43,136,663 UART: [art] Populate DV Done
43,142,196 UART: [fht] FMC Alias Private Key: 7
43,143,892 UART: [art] Derive CDI
43,144,716 UART: [art] Store in in slot 0x4
43,187,204 UART: [art] Derive Key Pair
43,188,201 UART: [art] Store priv key in slot 0x5
46,430,333 UART: [art] Derive Key Pair - Done
46,443,252 UART: [art] Signing Cert with AUTHO
46,444,554 UART: RITY.KEYID = 7
48,723,419 UART: [art] Erasing AUTHORITY.KEYID = 7
48,724,929 UART: [art] PUB.X = D822EA51670468F1A380F98BDD1A13195347196C1DC69873FE7994DD809AE21D4C50AF1B74CA6F2E30285B9CB98F0A26
48,732,162 UART: [art] PUB.Y = 909BBF46FF4B81CDF6002C8E9BED34064DB1C3E4860453C11D568B950A6A917CCDBCF4D3DEAEA35DDE88E2CE9CBE3E13
48,739,578 UART: [art] SIG.R = C1A9181257D1567BFDB63746F6D505C3E5C4A3D1CBF69B9FA4FAE8644E23C543D9BAEB7DD77DE03273A36FAFD465CCF3
48,746,862 UART: [art] SIG.S = 4E21AE6D00A2B21BE8590DCE44F162B65C4E2BC08E1F703F8D2149BDE13B80F5AF7512F37969E20F6C909FC008108D36
50,052,230 UART: Caliptra RT
50,052,948 UART: [state] CFI Enabled
50,336,523 UART: [rt] RT failed reset flow
50,337,718 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,551 UART:
192,932 UART: Running Caliptra ROM ...
194,113 UART:
194,268 UART: [state] CFI Enabled
266,515 UART: [state] LifecycleState = Unprovisioned
268,438 UART: [state] DebugLocked = No
269,901 UART: [state] WD Timer not started. Device not locked for debugging
274,078 UART: [kat] SHA2-256
453,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,829 UART: [kat] ++
465,363 UART: [kat] sha1
475,179 UART: [kat] SHA2-256
478,202 UART: [kat] SHA2-384
484,185 UART: [kat] SHA2-512-ACC
487,187 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,972,226 UART: [kat] LMS
3,501,684 UART: [kat] --
3,507,163 UART: [cold-reset] ++
3,508,590 UART: [fht] FHT @ 0x50003400
3,521,336 UART: [idev] ++
3,521,901 UART: [idev] CDI.KEYID = 6
3,522,813 UART: [idev] SUBJECT.KEYID = 7
3,523,982 UART: [idev] UDS.KEYID = 0
3,525,026 ready_for_fw is high
3,525,222 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,624,168 UART: [idev] Erasing UDS.KEYID = 0
6,027,052 UART: [idev] Sha1 KeyId Algorithm
6,050,634 UART: [idev] --
6,053,774 UART: [ldev] ++
6,054,343 UART: [ldev] CDI.KEYID = 6
6,055,252 UART: [ldev] SUBJECT.KEYID = 5
6,056,411 UART: [ldev] AUTHORITY.KEYID = 7
6,057,638 UART: [ldev] FE.KEYID = 1
6,100,268 UART: [ldev] Erasing FE.KEYID = 1
8,602,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,521 UART: [ldev] --
10,414,413 UART: [fwproc] Wait for Commands...
10,416,352 UART: [fwproc] Recv command 0x46574c44
10,418,445 UART: [fwproc] Recv'd Img size: 78456 bytes
13,385,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,459,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,527,986 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,720,204 >>> mbox cmd response: success
13,720,710 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,723,678 UART: [afmc] ++
13,724,275 UART: [afmc] CDI.KEYID = 6
13,725,157 UART: [afmc] SUBJECT.KEYID = 7
13,726,262 UART: [afmc] AUTHORITY.KEYID = 5
16,252,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,973,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,975,579 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,991,360 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,007,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,023,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,045,240 UART: [afmc] --
18,048,912 UART: [cold-reset] --
18,053,108 UART: [state] Locking Datavault
18,058,949 UART: [state] Locking PCR0, PCR1 and PCR31
18,060,594 UART: [state] Locking ICCM
18,061,989 UART: [exit] Launching FMC @ 0x40000130
18,070,445 UART:
18,070,689 UART: Running Caliptra FMC ...
18,071,789 UART:
18,071,949 UART: [state] CFI Enabled
18,132,803 UART: [fht] FMC Alias Private Key: 7
19,897,166 UART: [art] Extend RT PCRs Done
19,898,385 UART: [art] Lock RT PCRs Done
19,899,876 UART: [art] Populate DV Done
19,905,120 UART: [fht] FMC Alias Private Key: 7
19,906,597 UART: [art] Derive CDI
19,907,326 UART: [art] Store in in slot 0x4
19,965,435 UART: [art] Derive Key Pair
19,966,477 UART: [art] Store priv key in slot 0x5
22,429,566 UART: [art] Derive Key Pair - Done
22,442,882 UART: [art] Signing Cert with AUTHO
22,444,180 UART: RITY.KEYID = 7
24,155,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,156,862 UART: [art] PUB.X = 4649F11ED118D568D4AEA5906EEC929E9736CA7A932BF877C79A60D1F138E03EBFB3C29A9B55EA8CF937CFFD57EEC323
24,164,124 UART: [art] PUB.Y = FC7A4BB9271519F2D5494039F3F3373ADD84A90FE997C717AF6EB9596D989462BF279006A0052969E763E071300209D6
24,171,423 UART: [art] SIG.R = B2CCB94ED5470684C7AA17FE1FC4C290C002048A2492F969329F361A6B741E36022A5B0A15940E97A207A3E769F54101
24,178,759 UART: [art] SIG.S = 756439E5FC53C17BE4CF12F8CBE9A011A5061A5928FA4553A92BF69C1C10B239AD4D297BE4CEE7502B1537606B31679F
25,156,868 UART: mbox::rt_entry...
25,157,836 UART: ____ _ _ _ ____ _____
25,159,766 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,161,768 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,163,619 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,165,540 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,167,410 UART: |_|
25,168,289 UART:
25,280,348 UART: [rt] Runtime listening for mailbox commands...
25,282,349 >>> mbox cmd response data (0 bytes)
27,336,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,481,178 UART:
27,481,563 UART: Running Caliptra ROM ...
27,482,616 UART:
27,482,765 UART: [state] CFI Enabled
27,545,110 UART: [state] LifecycleState = Unprovisioned
27,547,021 UART: [state] DebugLocked = No
27,548,488 UART: [state] WD Timer not started. Device not locked for debugging
27,551,477 UART: [kat] SHA2-256
27,730,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,742,136 UART: [kat] ++
27,742,593 UART: [kat] sha1
27,754,178 UART: [kat] SHA2-256
27,757,240 UART: [kat] SHA2-384
27,764,730 UART: [kat] SHA2-512-ACC
27,767,775 UART: [kat] ECC-384
30,226,723 UART: [kat] HMAC-384Kdf
30,252,741 UART: [kat] LMS
30,782,217 UART: [kat] --
30,787,610 UART: [update-reset] ++
34,205,605 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,209,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,591,625 >>> mbox cmd response: success
34,596,144 UART: [update-reset] Copying MAN_2 To MAN_1
34,614,411 UART: [update-reset Success] --
34,619,578 UART: [state] Locking Datavault
34,622,513 UART: [state] Locking PCR0, PCR1 and PCR31
34,624,155 UART: [state] Locking ICCM
34,626,062 UART: [exit] Launching FMC @ 0x40000130
34,634,513 UART:
34,634,741 UART: Running Caliptra FMC ...
34,636,080 UART:
34,636,242 UART: [state] CFI Enabled
34,725,045 UART: [art] Extend RT PCRs Done
34,726,268 UART: [art] Lock RT PCRs Done
34,727,593 UART: [art] Populate DV Done
34,732,941 UART: [fht] FMC Alias Private Key: 7
34,734,539 UART: [art] Derive CDI
34,735,296 UART: [art] Store in in slot 0x4
34,793,787 UART: [art] Derive Key Pair
34,794,783 UART: [art] Store priv key in slot 0x5
37,257,614 UART: [art] Derive Key Pair - Done
37,270,296 UART: [art] Signing Cert with AUTHO
37,271,601 UART: RITY.KEYID = 7
38,983,243 UART: [art] Erasing AUTHORITY.KEYID = 7
38,984,746 UART: [art] PUB.X = D5063DB0B7D0B5C6611388F23B8E26DFB9C4EA726A7A8526E793222EF6FCA564317B602548BF844C094CA6110A2D0F3A
38,992,034 UART: [art] PUB.Y = 99FDFD1E2AC3C31664F7D7A20F3BFD4B98A7FCECFE1FBC94821958563D249F96AFFDDA823786E7C8206B03FEFC3A09FA
38,999,321 UART: [art] SIG.R = E0CB4024666A0D8F8BC021B5AE0A76BCB29565D2F75203FA9295C3AD9C7285AC6EC79200FBC5F56B3F3931AFD9ED22FC
39,006,700 UART: [art] SIG.S = 2CE2B372994B9D3236854917640A23BA1ED40BB6E19DE90F5AEA01E74F31325071B2D17A2C260F4D6C8304841BF58457
39,986,070 UART: Caliptra RT
39,986,815 UART: [state] CFI Enabled
40,317,237 UART: [rt] RT failed reset flow
40,318,444 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,366,768 ready_for_fw is high
3,367,189 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,507,215 >>> mbox cmd response: success
13,508,101 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,790,438 UART:
17,790,824 UART: Running Caliptra FMC ...
17,791,957 UART:
17,792,117 UART: [state] CFI Enabled
17,857,031 UART: [fht] FMC Alias Private Key: 7
19,621,079 UART: [art] Extend RT PCRs Done
19,622,287 UART: [art] Lock RT PCRs Done
19,624,321 UART: [art] Populate DV Done
19,629,965 UART: [fht] FMC Alias Private Key: 7
19,631,558 UART: [art] Derive CDI
19,632,372 UART: [art] Store in in slot 0x4
19,688,894 UART: [art] Derive Key Pair
19,689,895 UART: [art] Store priv key in slot 0x5
22,152,713 UART: [art] Derive Key Pair - Done
22,165,461 UART: [art] Signing Cert with AUTHO
22,166,764 UART: RITY.KEYID = 7
23,878,564 UART: [art] Erasing AUTHORITY.KEYID = 7
23,880,057 UART: [art] PUB.X = 30AD1FACED3425FFCF0B210E8EC74B171B56AF6EC088E6BCF3D8B0AFE6494005CCA75606F04EC81EB23BB050D5E0789A
23,887,342 UART: [art] PUB.Y = 762C40278B9D9710A7EC178E2F937980B9DD39F51475B15AE7694EE9048887DD85B2B9FE6CCAFCE87F6773B6D2A9DB3B
23,894,655 UART: [art] SIG.R = D7E755035F90397C13FAFD4F8994D965B38A636838D13B15BCC78D8ECDEED5D50E6D8C05DAB94B9451A716D8A47A9BEA
23,902,023 UART: [art] SIG.S = E84BC11D5C297580E1803538797B5E6AD542A41293D62A312A661858E54AB64EBF16B6E10D10C779886605B79CE18188
24,880,569 UART: mbox::rt_entry...
24,881,542 UART: ____ _ _ _ ____ _____
24,883,468 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,885,471 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,887,325 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,889,286 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,891,167 UART: |_|
24,892,052 UART:
25,004,025 UART: [rt] Runtime listening for mailbox commands...
25,006,058 >>> mbox cmd response data (0 bytes)
27,060,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,180,390 >>> mbox cmd response: success
34,216,136 UART:
34,216,483 UART: Running Caliptra FMC ...
34,217,606 UART:
34,217,777 UART: [state] CFI Enabled
34,315,905 UART: [art] Extend RT PCRs Done
34,317,094 UART: [art] Lock RT PCRs Done
34,318,442 UART: [art] Populate DV Done
34,323,843 UART: [fht] FMC Alias Private Key: 7
34,325,428 UART: [art] Derive CDI
34,326,255 UART: [art] Store in in slot 0x4
34,384,646 UART: [art] Derive Key Pair
34,385,694 UART: [art] Store priv key in slot 0x5
36,848,301 UART: [art] Derive Key Pair - Done
36,861,527 UART: [art] Signing Cert with AUTHO
36,862,833 UART: RITY.KEYID = 7
38,574,016 UART: [art] Erasing AUTHORITY.KEYID = 7
38,575,514 UART: [art] PUB.X = F3F7C060356475F42BCCC8334CEE0CD64962D3E27C5B726129A577DD8DA2F7111C805E290BDBA9A85B3D384EDCDB64B5
38,583,288 UART: [art] PUB.Y = C499F16977BF6930708EB7EFB19419754E948316C77D532A9E971EA36F38DD2A165BE7FE911F6CD59EA5F220EF409E29
38,590,065 UART: [art] SIG.R = 193CF6EDF02D30626F05718C129A9926804088DF2A8DCC1155493802AF4403C706BCD0B7A6C0B809C9626E350CF3BE40
38,597,461 UART: [art] SIG.S = 5C1722439D1CE6D9A3718B84A83C7DF95FBFC144AC03A5351ABE337D56EA129790E51E48086348828DDA2B30454CB664
39,576,142 UART: Caliptra RT
39,576,842 UART: [state] CFI Enabled
39,913,921 UART: [rt] RT failed reset flow
39,915,125 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
193,055 UART:
193,431 UART: Running Caliptra ROM ...
194,529 UART:
604,062 UART: [state] CFI Enabled
616,951 UART: [state] LifecycleState = Unprovisioned
618,833 UART: [state] DebugLocked = No
620,720 UART: [state] WD Timer not started. Device not locked for debugging
624,816 UART: [kat] SHA2-256
803,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,515 UART: [kat] ++
815,968 UART: [kat] sha1
827,477 UART: [kat] SHA2-256
830,555 UART: [kat] SHA2-384
836,690 UART: [kat] SHA2-512-ACC
839,625 UART: [kat] ECC-384
3,279,839 UART: [kat] HMAC-384Kdf
3,293,065 UART: [kat] LMS
3,822,544 UART: [kat] --
3,828,386 UART: [cold-reset] ++
3,829,750 UART: [fht] FHT @ 0x50003400
3,839,806 UART: [idev] ++
3,840,382 UART: [idev] CDI.KEYID = 6
3,841,360 UART: [idev] SUBJECT.KEYID = 7
3,842,539 UART: [idev] UDS.KEYID = 0
3,843,469 ready_for_fw is high
3,843,659 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,942,257 UART: [idev] Erasing UDS.KEYID = 0
6,313,374 UART: [idev] Sha1 KeyId Algorithm
6,335,627 UART: [idev] --
6,340,925 UART: [ldev] ++
6,341,499 UART: [ldev] CDI.KEYID = 6
6,342,433 UART: [ldev] SUBJECT.KEYID = 5
6,343,597 UART: [ldev] AUTHORITY.KEYID = 7
6,344,831 UART: [ldev] FE.KEYID = 1
6,353,099 UART: [ldev] Erasing FE.KEYID = 1
8,825,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,413 UART: [ldev] --
10,617,896 UART: [fwproc] Wait for Commands...
10,619,671 UART: [fwproc] Recv command 0x46574c44
10,621,764 UART: [fwproc] Recv'd Img size: 78456 bytes
13,593,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,664,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,733,039 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,926,078 >>> mbox cmd response: success
13,926,602 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,930,335 UART: [afmc] ++
13,930,919 UART: [afmc] CDI.KEYID = 6
13,931,836 UART: [afmc] SUBJECT.KEYID = 7
13,932,999 UART: [afmc] AUTHORITY.KEYID = 5
16,432,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,155,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,157,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,173,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,189,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,205,213 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,228,018 UART: [afmc] --
18,231,284 UART: [cold-reset] --
18,236,023 UART: [state] Locking Datavault
18,239,874 UART: [state] Locking PCR0, PCR1 and PCR31
18,241,541 UART: [state] Locking ICCM
18,243,745 UART: [exit] Launching FMC @ 0x40000130
18,252,203 UART:
18,252,443 UART: Running Caliptra FMC ...
18,253,545 UART:
18,253,706 UART: [state] CFI Enabled
18,262,344 UART: [fht] FMC Alias Private Key: 7
20,018,975 UART: [art] Extend RT PCRs Done
20,020,205 UART: [art] Lock RT PCRs Done
20,021,836 UART: [art] Populate DV Done
20,027,365 UART: [fht] FMC Alias Private Key: 7
20,029,078 UART: [art] Derive CDI
20,029,941 UART: [art] Store in in slot 0x4
20,072,484 UART: [art] Derive Key Pair
20,073,625 UART: [art] Store priv key in slot 0x5
22,500,125 UART: [art] Derive Key Pair - Done
22,513,090 UART: [art] Signing Cert with AUTHO
22,514,397 UART: RITY.KEYID = 7
24,219,733 UART: [art] Erasing AUTHORITY.KEYID = 7
24,221,242 UART: [art] PUB.X = A082C200520ACAB285E8E9339233FF1580585629E019BB02D8920131DD95AA540667898848D11C4B9D0C021D7F9AAA5A
24,228,492 UART: [art] PUB.Y = 08108CF99C3D026089E0FF2EF9CA142841467467919663EDD9081648ED47722CCC3BAE8766C5B0AC9239171289AF3C51
24,235,703 UART: [art] SIG.R = 103135A7D0A57F5EBE3032C8FE351AF578E77FFC8796F441C48BE7669ED602D68DC7304A6D35F2FCCE3002525835BBB8
24,243,137 UART: [art] SIG.S = D6DE2937FE04BF48577F8C71673F327D6CB4C170E197A5C53DB26C0EA922AF44CDD3016F12E80377C0C45792C2C6A2CC
25,221,100 UART: mbox::rt_entry...
25,222,066 UART: ____ _ _ _ ____ _____
25,224,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,226,022 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,227,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,229,894 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,231,825 UART: |_|
25,232,632 UART:
25,346,431 UART: [rt] Runtime listening for mailbox commands...
25,348,463 >>> mbox cmd response data (0 bytes)
27,405,377 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,549,843 UART:
27,550,233 UART: Running Caliptra ROM ...
27,551,378 UART:
27,551,552 UART: [state] CFI Enabled
27,564,904 UART: [state] LifecycleState = Unprovisioned
27,566,748 UART: [state] DebugLocked = No
27,569,641 UART: [state] WD Timer not started. Device not locked for debugging
27,574,087 UART: [kat] SHA2-256
27,753,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,764,824 UART: [kat] ++
27,765,283 UART: [kat] sha1
27,777,463 UART: [kat] SHA2-256
27,780,476 UART: [kat] SHA2-384
27,786,570 UART: [kat] SHA2-512-ACC
27,789,518 UART: [kat] ECC-384
30,230,221 UART: [kat] HMAC-384Kdf
30,241,431 UART: [kat] LMS
30,770,932 UART: [kat] --
30,773,894 UART: [update-reset] ++
34,192,671 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,195,518 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,577,551 >>> mbox cmd response: success
34,582,019 UART: [update-reset] Copying MAN_2 To MAN_1
34,600,498 UART: [update-reset Success] --
34,604,578 UART: [state] Locking Datavault
34,607,562 UART: [state] Locking PCR0, PCR1 and PCR31
34,609,265 UART: [state] Locking ICCM
34,611,545 UART: [exit] Launching FMC @ 0x40000130
34,619,938 UART:
34,620,173 UART: Running Caliptra FMC ...
34,621,462 UART:
34,621,620 UART: [state] CFI Enabled
34,665,658 UART: [art] Extend RT PCRs Done
34,666,828 UART: [art] Lock RT PCRs Done
34,668,339 UART: [art] Populate DV Done
34,673,537 UART: [fht] FMC Alias Private Key: 7
34,675,150 UART: [art] Derive CDI
34,675,970 UART: [art] Store in in slot 0x4
34,718,444 UART: [art] Derive Key Pair
34,719,492 UART: [art] Store priv key in slot 0x5
37,146,641 UART: [art] Derive Key Pair - Done
37,159,493 UART: [art] Signing Cert with AUTHO
37,160,801 UART: RITY.KEYID = 7
38,866,964 UART: [art] Erasing AUTHORITY.KEYID = 7
38,868,476 UART: [art] PUB.X = E650E2385273A37317EDEAE632EA9259FA140C78B39AAA54AF7696E6E1F965CC39D30922C39AE05764DF604747C43DAB
38,875,756 UART: [art] PUB.Y = 184B32EFC995D2D5C54984C4E3A644B0716963D1E8561AB7F461749630F1FFB25D75AEC71129B443DAD745219D9A4534
38,883,020 UART: [art] SIG.R = A326A2560D51429D66FCF38139B959B18B65866855DA70F0EE6AAE110BA7FD2E795A1003FBA7771020935696C020456E
38,890,391 UART: [art] SIG.S = 58F4F5AAD07BB033F7F8F9C413BF4A3FB48CD85EF01D16A0217F073EE69DD3356CD70AA7E9A690D29AEC586410D1499F
39,869,267 UART: Caliptra RT
39,869,990 UART: [state] CFI Enabled
40,156,374 UART: [rt] RT failed reset flow
40,157,696 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,913 writing to cptra_bootfsm_go
3,698,005 ready_for_fw is high
3,698,567 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,708,717 >>> mbox cmd response: success
13,709,302 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,958,705 UART:
17,959,092 UART: Running Caliptra FMC ...
17,960,294 UART:
17,960,485 UART: [state] CFI Enabled
17,968,379 UART: [fht] FMC Alias Private Key: 7
19,725,160 UART: [art] Extend RT PCRs Done
19,726,384 UART: [art] Lock RT PCRs Done
19,727,957 UART: [art] Populate DV Done
19,733,385 UART: [fht] FMC Alias Private Key: 7
19,734,941 UART: [art] Derive CDI
19,735,765 UART: [art] Store in in slot 0x4
19,778,311 UART: [art] Derive Key Pair
19,779,354 UART: [art] Store priv key in slot 0x5
22,206,025 UART: [art] Derive Key Pair - Done
22,218,595 UART: [art] Signing Cert with AUTHO
22,219,894 UART: RITY.KEYID = 7
23,925,272 UART: [art] Erasing AUTHORITY.KEYID = 7
23,926,774 UART: [art] PUB.X = 71D35F9458F2014C2419EFCBF956CB644312341F2CAF60A672CE30F8A8354F68951AAAFDB9C2313967ACBB53E57947F2
23,934,040 UART: [art] PUB.Y = A7D12CEB2249A91AC6265A2D847463B9E9DFD86DDB848737368E7E20BED8997F1FD553281427B1A52A7254030854C262
23,941,314 UART: [art] SIG.R = 6C9D3C9F57787A46135A6F8F52A952195C26DACBC1CB2C1E08EE1340C56CE8F210631F3502425262A23D4C23AE990761
23,948,691 UART: [art] SIG.S = 2D61599B97F1BDB4F6A873B10B507340DDEA2025FB2628FDF02F69C337353821C7599AEA9A1FA35467B9AF4EF2847A08
24,928,033 UART: mbox::rt_entry...
24,928,985 UART: ____ _ _ _ ____ _____
24,930,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,932,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,934,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,936,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,938,820 UART: |_|
24,939,657 UART:
25,052,764 UART: [rt] Runtime listening for mailbox commands...
25,054,799 >>> mbox cmd response data (0 bytes)
27,109,213 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,151,117 >>> mbox cmd response: success
34,186,014 UART:
34,186,328 UART: Running Caliptra FMC ...
34,187,376 UART:
34,187,528 UART: [state] CFI Enabled
34,231,565 UART: [art] Extend RT PCRs Done
34,232,759 UART: [art] Lock RT PCRs Done
34,234,027 UART: [art] Populate DV Done
34,239,283 UART: [fht] FMC Alias Private Key: 7
34,240,928 UART: [art] Derive CDI
34,241,666 UART: [art] Store in in slot 0x4
34,284,206 UART: [art] Derive Key Pair
34,285,211 UART: [art] Store priv key in slot 0x5
36,712,477 UART: [art] Derive Key Pair - Done
36,725,481 UART: [art] Signing Cert with AUTHO
36,726,819 UART: RITY.KEYID = 7
38,432,521 UART: [art] Erasing AUTHORITY.KEYID = 7
38,434,029 UART: [art] PUB.X = 7A90D71B1F2B54493F003D149701A36284A7C04353BB00C52951395F59545FBE0C9685E173EC93DE78E2C251FD9EE960
38,441,255 UART: [art] PUB.Y = E48061EA427098F75BC8168E3CDDC72901A59BD74E24BA1F7BD514C6F1C9212F6073846C9213A2BC9234B64A4A9747D6
38,448,502 UART: [art] SIG.R = 60B42E9C7C44D216A224C0104F554EED067503C4AC3756314D37C910B8E4E1F1750C32D6F3C4C8B27772F8C18604BA3D
38,455,860 UART: [art] SIG.S = AE0FAE1AFF849D76B30DF8A7B1E8831B9CAAF2B7318CCEA8C66A120A8CDEC4D3561E26BC8C8698A3AA2D26010D594F4B
39,434,949 UART: Caliptra RT
39,435,644 UART: [state] CFI Enabled
39,722,285 UART: [rt] RT failed reset flow
39,723,496 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,358 UART:
192,732 UART: Running Caliptra ROM ...
193,820 UART:
193,963 UART: [state] CFI Enabled
263,852 UART: [state] LifecycleState = Unprovisioned
266,297 UART: [state] DebugLocked = No
268,958 UART: [state] WD Timer not started. Device not locked for debugging
273,219 UART: [kat] SHA2-256
463,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,839 UART: [kat] ++
474,300 UART: [kat] sha1
484,819 UART: [kat] SHA2-256
487,833 UART: [kat] SHA2-384
492,472 UART: [kat] SHA2-512-ACC
495,062 UART: [kat] ECC-384
2,949,350 UART: [kat] HMAC-384Kdf
2,973,826 UART: [kat] LMS
3,505,585 UART: [kat] --
3,509,355 UART: [cold-reset] ++
3,511,208 UART: [fht] FHT @ 0x50003400
3,522,324 UART: [idev] ++
3,523,024 UART: [idev] CDI.KEYID = 6
3,524,018 UART: [idev] SUBJECT.KEYID = 7
3,525,191 UART: [idev] UDS.KEYID = 0
3,526,110 ready_for_fw is high
3,526,309 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,625,209 UART: [idev] Erasing UDS.KEYID = 0
6,031,464 UART: [idev] Sha1 KeyId Algorithm
6,053,888 UART: [idev] --
6,059,908 UART: [ldev] ++
6,060,653 UART: [ldev] CDI.KEYID = 6
6,061,565 UART: [ldev] SUBJECT.KEYID = 5
6,062,729 UART: [ldev] AUTHORITY.KEYID = 7
6,063,927 UART: [ldev] FE.KEYID = 1
6,101,578 UART: [ldev] Erasing FE.KEYID = 1
8,607,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,147 UART: [ldev] --
10,413,127 UART: [fwproc] Wait for Commands...
10,415,731 UART: [fwproc] Recv command 0x46574c44
10,417,992 UART: [fwproc] Recv'd Img size: 78456 bytes
13,424,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,500,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,617,013 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,943,378 >>> mbox cmd response: success
13,943,878 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,947,763 UART: [afmc] ++
13,948,468 UART: [afmc] CDI.KEYID = 6
13,949,722 UART: [afmc] SUBJECT.KEYID = 7
13,951,167 UART: [afmc] AUTHORITY.KEYID = 5
16,491,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,213,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,215,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,231,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,246,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,261,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,285,033 UART: [afmc] --
18,288,193 UART: [cold-reset] --
18,293,423 UART: [state] Locking Datavault
18,297,814 UART: [state] Locking PCR0, PCR1 and PCR31
18,299,981 UART: [state] Locking ICCM
18,302,295 UART: [exit] Launching FMC @ 0x40000130
18,310,980 UART:
18,311,210 UART: Running Caliptra FMC ...
18,312,306 UART:
18,312,463 UART: [state] CFI Enabled
18,371,041 UART: [fht] FMC Alias Private Key: 7
20,134,889 UART: [art] Extend RT PCRs Done
20,136,106 UART: [art] Lock RT PCRs Done
20,137,402 UART: [art] Populate DV Done
20,142,968 UART: [fht] FMC Alias Private Key: 7
20,144,525 UART: [art] Derive CDI
20,145,339 UART: [art] Store in in slot 0x4
20,203,747 UART: [art] Derive Key Pair
20,204,738 UART: [art] Store priv key in slot 0x5
22,667,696 UART: [art] Derive Key Pair - Done
22,681,080 UART: [art] Signing Cert with AUTHO
22,682,393 UART: RITY.KEYID = 7
24,392,423 UART: [art] Erasing AUTHORITY.KEYID = 7
24,393,929 UART: [art] PUB.X = 60E4CAE595A2FC9882DCDCFCE993FC2C8A3B0232222C688FB3D949A7590CCD0636D149611404280177B65E8C1B55EDD4
24,401,248 UART: [art] PUB.Y = 6AA544A5195326CCBD706371E80ED2EBDFDF93636BAADC6A551FA871116B1D5EFC66D5DCFF5E6689AE1705EE5AF727AF
24,408,496 UART: [art] SIG.R = B821AE73C42D43903D6B3E3C6AA2ABE02F5309E60E840C4555525E3953824A625330474F8DA7057D02122928F7E199D3
24,415,851 UART: [art] SIG.S = 2F5071BB7D45105B4FBB39B9A83D8C9593BD5CD186C381DBBB93FFFA3020E4B1A5882415A7F5498A878FEA1C11EFBBC2
25,393,793 UART: mbox::rt_entry...
25,394,764 UART: ____ _ _ _ ____ _____
25,396,698 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,398,699 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,400,576 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,402,501 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,404,385 UART: |_|
25,405,209 UART:
25,518,749 UART: [rt] Runtime listening for mailbox commands...
25,520,761 >>> mbox cmd response data (0 bytes)
27,576,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,720,262 UART:
27,720,641 UART: Running Caliptra ROM ...
27,721,689 UART:
27,721,862 UART: [state] CFI Enabled
27,781,255 UART: [state] LifecycleState = Unprovisioned
27,783,372 UART: [state] DebugLocked = No
27,785,859 UART: [state] WD Timer not started. Device not locked for debugging
27,789,979 UART: [kat] SHA2-256
27,979,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,990,602 UART: [kat] ++
27,991,058 UART: [kat] sha1
28,002,708 UART: [kat] SHA2-256
28,005,703 UART: [kat] SHA2-384
28,011,824 UART: [kat] SHA2-512-ACC
28,014,456 UART: [kat] ECC-384
30,468,305 UART: [kat] HMAC-384Kdf
30,490,755 UART: [kat] LMS
31,022,325 UART: [kat] --
31,027,775 UART: [update-reset] ++
34,477,363 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,479,937 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,086,004 >>> mbox cmd response: success
35,090,605 UART: [update-reset] Copying MAN_2 To MAN_1
35,125,600 UART: [update-reset Success] --
35,129,582 UART: [state] Locking Datavault
35,132,420 UART: [state] Locking PCR0, PCR1 and PCR31
35,134,574 UART: [state] Locking ICCM
35,136,947 UART: [exit] Launching FMC @ 0x40000130
35,145,581 UART:
35,145,811 UART: Running Caliptra FMC ...
35,147,079 UART:
35,147,259 UART: [state] CFI Enabled
35,237,043 UART: [art] Extend RT PCRs Done
35,238,246 UART: [art] Lock RT PCRs Done
35,239,697 UART: [art] Populate DV Done
35,245,270 UART: [fht] FMC Alias Private Key: 7
35,247,020 UART: [art] Derive CDI
35,247,828 UART: [art] Store in in slot 0x4
35,306,102 UART: [art] Derive Key Pair
35,307,152 UART: [art] Store priv key in slot 0x5
37,770,387 UART: [art] Derive Key Pair - Done
37,783,404 UART: [art] Signing Cert with AUTHO
37,784,717 UART: RITY.KEYID = 7
39,495,689 UART: [art] Erasing AUTHORITY.KEYID = 7
39,497,199 UART: [art] PUB.X = A231C4D3EFA8740C04A1532A2DB10B2FEA6008F6A99D2435B7C8CE594CD4C7259D079CA885E2DBFEC2F6F8AA629D81D4
39,504,468 UART: [art] PUB.Y = 6BAB3AFBD09C2494E7B67F3479C5CF327681D5C89840E841D7E6AD029B5BA1E413F477E80776519D4F9F4CC317F8B25F
39,511,778 UART: [art] SIG.R = 85515E99EF851E8ACDFBC3DE602CC22B1339773A37B69AD1528A30A7BAA958864959EDBECA90F5CA5701706531DC35B0
39,519,173 UART: [art] SIG.S = CAC053C3C03AB98223B8055CEBFAC2A0E2E64658AFE4F7FE84963C2E841B21D5BC73D60CAD643AF34691EF151C126ADA
40,498,287 UART: Caliptra RT
40,499,033 UART: [state] CFI Enabled
40,834,778 UART: [rt] RT failed reset flow
40,835,976 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,107 writing to cptra_bootfsm_go
3,417,037 ready_for_fw is high
3,417,429 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,945,308 >>> mbox cmd response: success
13,946,069 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,241,277 UART:
18,241,664 UART: Running Caliptra FMC ...
18,243,007 UART:
18,243,181 UART: [state] CFI Enabled
18,308,653 UART: [fht] FMC Alias Private Key: 7
20,072,486 UART: [art] Extend RT PCRs Done
20,073,717 UART: [art] Lock RT PCRs Done
20,075,197 UART: [art] Populate DV Done
20,080,631 UART: [fht] FMC Alias Private Key: 7
20,082,249 UART: [art] Derive CDI
20,083,096 UART: [art] Store in in slot 0x4
20,141,148 UART: [art] Derive Key Pair
20,142,142 UART: [art] Store priv key in slot 0x5
22,604,935 UART: [art] Derive Key Pair - Done
22,617,987 UART: [art] Signing Cert with AUTHO
22,619,286 UART: RITY.KEYID = 7
24,331,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,333,025 UART: [art] PUB.X = E4EBEE35288830BEFD0A59EFAFA36E1E9AFA7559B43E18AAB655A4C6DA947700483F0F32BC7AF051144D05703FF6D0B4
24,340,325 UART: [art] PUB.Y = 8CF8F50474E6F92517FBC6D57861B161304FE7222A47A60690406C123320FF37C401D4196576A4D2FCEA7F75EFC7CB85
24,347,567 UART: [art] SIG.R = 8FD91D2A613294EB68A055B65E105FEE75F7FAB6FF9BDD216CF7C1BBC90ABE52A0A8D1F3BD8F9E4F484D15B2CA3A0AE1
24,354,978 UART: [art] SIG.S = E78857B3027E1358F59EDBD573EE1086711BB700E8B2464D18F3CDBD12D8C386F58C4BC113506475E069282990677F77
25,333,439 UART: mbox::rt_entry...
25,334,410 UART: ____ _ _ _ ____ _____
25,336,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,338,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,340,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,342,250 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,344,095 UART: |_|
25,344,929 UART:
25,457,705 UART: [rt] Runtime listening for mailbox commands...
25,459,716 >>> mbox cmd response data (0 bytes)
27,514,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,299,655 >>> mbox cmd response: success
35,332,649 UART:
35,332,963 UART: Running Caliptra FMC ...
35,334,098 UART:
35,334,271 UART: [state] CFI Enabled
35,432,565 UART: [art] Extend RT PCRs Done
35,433,746 UART: [art] Lock RT PCRs Done
35,435,209 UART: [art] Populate DV Done
35,440,779 UART: [fht] FMC Alias Private Key: 7
35,442,426 UART: [art] Derive CDI
35,443,397 UART: [art] Store in in slot 0x4
35,501,794 UART: [art] Derive Key Pair
35,502,788 UART: [art] Store priv key in slot 0x5
37,965,811 UART: [art] Derive Key Pair - Done
37,978,595 UART: [art] Signing Cert with AUTHO
37,979,897 UART: RITY.KEYID = 7
39,691,791 UART: [art] Erasing AUTHORITY.KEYID = 7
39,693,305 UART: [art] PUB.X = 22D5F3E9D5BDF4EDC4FF047F679CB4F605DAB853170F70D4E9533D1519177A49B0942EACBE9BA1A72DAD382E08E1C888
39,700,635 UART: [art] PUB.Y = 5E45DEF1841945E2B95EF6F642EF056A56861C997D05769B8DEA024D82138211875533152EF7E950FA444754D3EB42C8
39,707,865 UART: [art] SIG.R = 4B97F191FA96CCF3169A3AD21168416EEFEEF022733EDAD3EF681A762100BF9C6BA80A450FAB3244673288F98A857BE2
39,715,201 UART: [art] SIG.S = EF903BA3DF82E4F227009A630DA6E7B311B754AC88392DCE2D147ABAFBC96C46DBF116359C1365165124D8B74AF8E0EB
40,694,296 UART: Caliptra RT
40,695,005 UART: [state] CFI Enabled
41,035,869 UART: [rt] RT failed reset flow
41,037,059 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,737 writing to cptra_bootfsm_go
192,996 UART:
193,374 UART: Running Caliptra ROM ...
194,572 UART:
604,040 UART: [state] CFI Enabled
615,808 UART: [state] LifecycleState = Unprovisioned
618,179 UART: [state] DebugLocked = No
620,916 UART: [state] WD Timer not started. Device not locked for debugging
625,734 UART: [kat] SHA2-256
815,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,423 UART: [kat] ++
827,035 UART: [kat] sha1
838,795 UART: [kat] SHA2-256
841,807 UART: [kat] SHA2-384
847,446 UART: [kat] SHA2-512-ACC
850,025 UART: [kat] ECC-384
3,291,786 UART: [kat] HMAC-384Kdf
3,305,298 UART: [kat] LMS
3,837,134 UART: [kat] --
3,841,909 UART: [cold-reset] ++
3,843,342 UART: [fht] FHT @ 0x50003400
3,854,887 UART: [idev] ++
3,855,604 UART: [idev] CDI.KEYID = 6
3,856,518 UART: [idev] SUBJECT.KEYID = 7
3,857,693 UART: [idev] UDS.KEYID = 0
3,858,623 ready_for_fw is high
3,858,814 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,957,405 UART: [idev] Erasing UDS.KEYID = 0
6,326,828 UART: [idev] Sha1 KeyId Algorithm
6,349,040 UART: [idev] --
6,352,559 UART: [ldev] ++
6,353,244 UART: [ldev] CDI.KEYID = 6
6,354,154 UART: [ldev] SUBJECT.KEYID = 5
6,355,314 UART: [ldev] AUTHORITY.KEYID = 7
6,356,546 UART: [ldev] FE.KEYID = 1
6,368,818 UART: [ldev] Erasing FE.KEYID = 1
8,846,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,016 UART: [ldev] --
10,635,066 UART: [fwproc] Wait for Commands...
10,638,289 UART: [fwproc] Recv command 0x46574c44
10,640,577 UART: [fwproc] Recv'd Img size: 78456 bytes
13,639,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,712,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,829,027 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,156,034 >>> mbox cmd response: success
14,156,507 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
14,159,946 UART: [afmc] ++
14,160,643 UART: [afmc] CDI.KEYID = 6
14,161,891 UART: [afmc] SUBJECT.KEYID = 7
14,163,329 UART: [afmc] AUTHORITY.KEYID = 5
16,664,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,384,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,386,890 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,402,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,417,234 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,432,273 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,456,664 UART: [afmc] --
18,459,891 UART: [cold-reset] --
18,464,850 UART: [state] Locking Datavault
18,470,121 UART: [state] Locking PCR0, PCR1 and PCR31
18,472,330 UART: [state] Locking ICCM
18,475,302 UART: [exit] Launching FMC @ 0x40000130
18,483,966 UART:
18,484,215 UART: Running Caliptra FMC ...
18,485,245 UART:
18,485,393 UART: [state] CFI Enabled
18,493,357 UART: [fht] FMC Alias Private Key: 7
20,249,975 UART: [art] Extend RT PCRs Done
20,251,195 UART: [art] Lock RT PCRs Done
20,252,575 UART: [art] Populate DV Done
20,257,889 UART: [fht] FMC Alias Private Key: 7
20,259,541 UART: [art] Derive CDI
20,260,299 UART: [art] Store in in slot 0x4
20,303,166 UART: [art] Derive Key Pair
20,304,165 UART: [art] Store priv key in slot 0x5
22,731,434 UART: [art] Derive Key Pair - Done
22,744,699 UART: [art] Signing Cert with AUTHO
22,746,006 UART: RITY.KEYID = 7
24,451,140 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,652 UART: [art] PUB.X = B2B64AD8F74AB422291516C83A9FD112FBC6E6077562433E5FCB3CF6B330604EFFA79ED181866594ABF3ED8BBC0B253B
24,459,932 UART: [art] PUB.Y = 86C8D1D7515484237290BCD9E119F20C98B1EED428BA3C4790B7A00D80D2E3EBB7964F4756EB68D056097B5C91AE4E5D
24,467,244 UART: [art] SIG.R = 88F07F4CB29EF74DF0A968E076FE17B5CD76D5E8277E9135913079110903D3BB7C257B0ED3BD124F9470CFCCAFE3303B
24,474,606 UART: [art] SIG.S = E08F0260B425F419C4BE3A55B66C2BDDB17A4DC338A9C1111094C171E1AF3C1F2A0484BB62324B4DDBB8CEE4330C7043
25,453,241 UART: mbox::rt_entry...
25,454,210 UART: ____ _ _ _ ____ _____
25,456,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,458,151 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,460,088 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,462,043 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,463,980 UART: |_|
25,464,813 UART:
25,578,535 UART: [rt] Runtime listening for mailbox commands...
25,580,544 >>> mbox cmd response data (0 bytes)
27,636,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,781,041 UART:
27,781,418 UART: Running Caliptra ROM ...
27,782,509 UART:
27,782,672 UART: [state] CFI Enabled
27,799,128 UART: [state] LifecycleState = Unprovisioned
27,800,977 UART: [state] DebugLocked = No
27,802,740 UART: [state] WD Timer not started. Device not locked for debugging
27,807,816 UART: [kat] SHA2-256
27,997,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,008,461 UART: [kat] ++
28,008,920 UART: [kat] sha1
28,020,840 UART: [kat] SHA2-256
28,023,860 UART: [kat] SHA2-384
28,028,723 UART: [kat] SHA2-512-ACC
28,031,305 UART: [kat] ECC-384
30,471,307 UART: [kat] HMAC-384Kdf
30,483,486 UART: [kat] LMS
31,015,065 UART: [kat] --
31,019,160 UART: [update-reset] ++
34,482,367 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,486,410 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,092,479 >>> mbox cmd response: success
35,096,981 UART: [update-reset] Copying MAN_2 To MAN_1
35,131,485 UART: [update-reset Success] --
35,134,969 UART: [state] Locking Datavault
35,138,895 UART: [state] Locking PCR0, PCR1 and PCR31
35,141,108 UART: [state] Locking ICCM
35,142,401 UART: [exit] Launching FMC @ 0x40000130
35,151,084 UART:
35,151,327 UART: Running Caliptra FMC ...
35,152,580 UART:
35,152,751 UART: [state] CFI Enabled
35,196,507 UART: [art] Extend RT PCRs Done
35,197,706 UART: [art] Lock RT PCRs Done
35,199,165 UART: [art] Populate DV Done
35,204,469 UART: [fht] FMC Alias Private Key: 7
35,205,953 UART: [art] Derive CDI
35,206,770 UART: [art] Store in in slot 0x4
35,249,368 UART: [art] Derive Key Pair
35,250,371 UART: [art] Store priv key in slot 0x5
37,677,539 UART: [art] Derive Key Pair - Done
37,690,440 UART: [art] Signing Cert with AUTHO
37,691,746 UART: RITY.KEYID = 7
39,397,576 UART: [art] Erasing AUTHORITY.KEYID = 7
39,399,062 UART: [art] PUB.X = 079AF46E1AEAC231E4981C629D3F4F71ADD91CDDEFF87C5BE92F54CB19CE7B78C27969124C84E9F48070CE1D27E172DC
39,406,395 UART: [art] PUB.Y = E00D2E0A32B2CF231533586CD090FACBB803097974E69FD9671A014CA45FBB07E30E8DFF7D800F7394A40631678EBD12
39,413,651 UART: [art] SIG.R = 48A1C76EC04B2C835D43679D3537631237323413E2F4286CE80293BCB1CFD3F374E1F58F33EAB394E5A1E1696AAE3D9B
39,421,021 UART: [art] SIG.S = 5F3303C4211B490A8890EAD2BC005ACCEACE01AA2D7D4D6F4815AA7AA03256DDF286C5DE29A05711399952D1C9F03704
40,399,895 UART: Caliptra RT
40,400,601 UART: [state] CFI Enabled
40,687,893 UART: [rt] RT failed reset flow
40,689,087 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,560 writing to cptra_bootfsm_go
3,755,315 ready_for_fw is high
3,755,714 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,187,036 >>> mbox cmd response: success
14,187,815 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,444,828 UART:
18,445,218 UART: Running Caliptra FMC ...
18,446,352 UART:
18,446,514 UART: [state] CFI Enabled
18,454,295 UART: [fht] FMC Alias Private Key: 7
20,211,421 UART: [art] Extend RT PCRs Done
20,212,633 UART: [art] Lock RT PCRs Done
20,214,049 UART: [art] Populate DV Done
20,219,526 UART: [fht] FMC Alias Private Key: 7
20,221,012 UART: [art] Derive CDI
20,221,777 UART: [art] Store in in slot 0x4
20,264,102 UART: [art] Derive Key Pair
20,265,143 UART: [art] Store priv key in slot 0x5
22,691,471 UART: [art] Derive Key Pair - Done
22,704,765 UART: [art] Signing Cert with AUTHO
22,706,071 UART: RITY.KEYID = 7
24,411,711 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,215 UART: [art] PUB.X = 6B8ABC1D39B83013A6695946B123CE4C2AF19EA901D73AE62A0B384D07C6DF4F99A0BCAD8B255F07D200D96062BF12D2
24,420,510 UART: [art] PUB.Y = 627DD87C625DC4131E2F7D5AD3865AFAB6F29C7D7AD180DD3C5A403B4E26B235D5D9FF10B4803FDB104F003578A1CB8F
24,427,778 UART: [art] SIG.R = D89D9E5172C8BA424711DEED1AE8D8C43BE37BF3C8FC2B518887736C57978FD69E4C61D93D4FFFC50A2EF9EEC6E96C64
24,435,180 UART: [art] SIG.S = 791155985EE20D2A92CAD75BA0FAB2FB36AB5508A9485876C862A228CF427FF96BB56DCBD20ACB9DD42843BE6CF698BF
25,413,427 UART: mbox::rt_entry...
25,414,403 UART: ____ _ _ _ ____ _____
25,416,334 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,343 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,050 UART: |_|
25,424,885 UART:
25,537,803 UART: [rt] Runtime listening for mailbox commands...
25,539,825 >>> mbox cmd response data (0 bytes)
27,595,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,317,192 >>> mbox cmd response: success
35,352,210 UART:
35,352,524 UART: Running Caliptra FMC ...
35,353,570 UART:
35,353,717 UART: [state] CFI Enabled
35,398,242 UART: [art] Extend RT PCRs Done
35,399,433 UART: [art] Lock RT PCRs Done
35,400,665 UART: [art] Populate DV Done
35,406,135 UART: [fht] FMC Alias Private Key: 7
35,407,729 UART: [art] Derive CDI
35,408,487 UART: [art] Store in in slot 0x4
35,451,412 UART: [art] Derive Key Pair
35,452,410 UART: [art] Store priv key in slot 0x5
37,879,462 UART: [art] Derive Key Pair - Done
37,891,980 UART: [art] Signing Cert with AUTHO
37,893,291 UART: RITY.KEYID = 7
39,598,865 UART: [art] Erasing AUTHORITY.KEYID = 7
39,600,371 UART: [art] PUB.X = 23BC6D3A92FE29954A7B0EB64FC3D6DD24589AD925C243163BD0F3B40CB72DCA1660709980F9DA22DBC9E06E5D865133
39,607,672 UART: [art] PUB.Y = A4EE37ED65CA29A5F4179CBF475E566E131602001C69C2B487CC80DCC4DD1D2BA58DC1ED41195AB9EA669ED4E5DB9DC0
39,614,962 UART: [art] SIG.R = 6744F66D1D539466AB38F1A28FDE3E19D2EC2D7DF434C842DC4EEFF8EF6BA5BE71197542F763690111D9639C23BA06E7
39,622,381 UART: [art] SIG.S = B6F0B746EACD41E5D02E54D8A7C99017FFBFBEB83FE33C738597FDCFA660D4B29AD773A9ADC1F7138CD04B0B9CC0755F
40,601,900 UART: Caliptra RT
40,602,598 UART: [state] CFI Enabled
40,891,882 UART: [rt] RT failed reset flow
40,893,075 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,721 UART: [kat] SHA2-256
881,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,767 UART: [kat] ++
885,919 UART: [kat] sha1
890,389 UART: [kat] SHA2-256
892,327 UART: [kat] SHA2-384
895,208 UART: [kat] SHA2-512-ACC
897,109 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,690 UART: [idev] ++
1,479,858 UART: [idev] CDI.KEYID = 6
1,480,218 UART: [idev] SUBJECT.KEYID = 7
1,480,642 UART: [idev] UDS.KEYID = 0
1,480,987 ready_for_fw is high
1,480,987 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,534 UART: [idev] Erasing UDS.KEYID = 0
1,505,498 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,010 UART: [idev] --
1,515,269 UART: [ldev] ++
1,515,437 UART: [ldev] CDI.KEYID = 6
1,515,800 UART: [ldev] SUBJECT.KEYID = 5
1,516,226 UART: [ldev] AUTHORITY.KEYID = 7
1,516,689 UART: [ldev] FE.KEYID = 1
1,521,739 UART: [ldev] Erasing FE.KEYID = 1
1,547,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,587,158 UART: [fwproc] Received command 0x46574c44
1,587,949 UART: [fwproc] Received Image of size 78456 bytes
2,475,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,674 >>> mbox cmd response: success
2,614,674 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,615,886 UART: [afmc] ++
2,616,054 UART: [afmc] CDI.KEYID = 6
2,616,416 UART: [afmc] SUBJECT.KEYID = 7
2,616,841 UART: [afmc] AUTHORITY.KEYID = 5
2,652,478 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,840 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,233 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,923 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,898 UART: [afmc] --
2,695,976 UART: [cold-reset] --
2,697,010 UART: [state] Locking Datavault
2,698,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,977 UART: [state] Locking ICCM
2,699,571 UART: [exit] Launching FMC @ 0x40000130
2,704,900 UART:
2,704,916 UART: Running Caliptra FMC ...
2,705,324 UART:
2,705,378 UART: [state] CFI Enabled
2,715,697 UART: [fht] FMC Alias Private Key: 7
2,823,236 UART: [art] Extend RT PCRs Done
2,823,664 UART: [art] Lock RT PCRs Done
2,825,268 UART: [art] Populate DV Done
2,833,413 UART: [fht] FMC Alias Private Key: 7
2,834,525 UART: [art] Derive CDI
2,834,805 UART: [art] Store in in slot 0x4
2,921,056 UART: [art] Derive Key Pair
2,921,416 UART: [art] Store priv key in slot 0x5
2,934,430 UART: [art] Derive Key Pair - Done
2,949,372 UART: [art] Signing Cert with AUTHO
2,949,852 UART: RITY.KEYID = 7
2,965,400 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,165 UART: [art] PUB.X = 32EF0F4F6024DEF42F0200A39BD5B5B315C9863B74C22BFD9B84D5BC90F516B19923ECA76C85473B086F7749E1890287
2,972,903 UART: [art] PUB.Y = EDE647678804F47D22E6F32A0939D74722C458F1AE006B17311AC1190FB2FA5F2F7EC3D9EFDF300DE1C716F062409BE1
2,979,827 UART: [art] SIG.R = 0981D9BFD61139E7FDE1E36C1E6CB159A0F0427D3CEC40DF14903311EC4F3F3602F8CA93AF0EC639221C84E44CDF8FF5
2,986,604 UART: [art] SIG.S = 26F127ABA7B8130C6430A7EE327FFA931EF6F9A344E037C1A6C9E83E3BCF80D2C92B95115EA5786465E8DE06DDA2CB19
3,010,207 UART: mbox::rt_entry...
3,010,579 UART: ____ _ _ _ ____ _____
3,011,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,931 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,467 UART: |_|
3,014,779 UART:
3,121,636 UART: [rt] Runtime listening for mailbox commands...
3,122,570 >>> mbox cmd response data (0 bytes)
3,122,571 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,122,685 UART:
3,122,701 UART: Running Caliptra ROM ...
3,123,109 UART:
3,123,163 UART: [state] CFI Enabled
3,125,903 UART: [state] LifecycleState = Unprovisioned
3,126,558 UART: [state] DebugLocked = No
3,127,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,128,775 UART: [kat] SHA2-256
3,922,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,926,821 UART: [kat] ++
3,926,973 UART: [kat] sha1
3,931,357 UART: [kat] SHA2-256
3,933,295 UART: [kat] SHA2-384
3,936,140 UART: [kat] SHA2-512-ACC
3,938,040 UART: [kat] ECC-384
3,943,903 UART: [kat] HMAC-384Kdf
3,948,483 UART: [kat] LMS
4,516,679 UART: [kat] --
4,517,754 UART: [update-reset] ++
5,848,954 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,850,098 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,999,602 >>> mbox cmd response: success
5,999,871 UART: [update-reset] Copying MAN_2 To MAN_1
6,007,885 UART: [update-reset Success] --
6,008,958 UART: [state] Locking Datavault
6,009,800 UART: [state] Locking PCR0, PCR1 and PCR31
6,010,404 UART: [state] Locking ICCM
6,011,020 UART: [exit] Launching FMC @ 0x40000130
6,016,349 UART:
6,016,365 UART: Running Caliptra FMC ...
6,016,773 UART:
6,016,827 UART: [state] CFI Enabled
6,106,082 UART: [art] Extend RT PCRs Done
6,106,510 UART: [art] Lock RT PCRs Done
6,107,785 UART: [art] Populate DV Done
6,116,132 UART: [fht] FMC Alias Private Key: 7
6,117,120 UART: [art] Derive CDI
6,117,400 UART: [art] Store in in slot 0x4
6,203,415 UART: [art] Derive Key Pair
6,203,775 UART: [art] Store priv key in slot 0x5
6,216,199 UART: [art] Derive Key Pair - Done
6,230,803 UART: [art] Signing Cert with AUTHO
6,231,283 UART: RITY.KEYID = 7
6,246,375 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,140 UART: [art] PUB.X = 09E58EFFC72A8F7804C257514648E821DBA64514D11182294BF783A16AB5C05F3030AE6C0C92057AC188C1996912524C
6,253,892 UART: [art] PUB.Y = D0A8C0E6D5F5A44947FED30BAEAE8A436F045CB1368ADDD7792D39AC154D1BD3453850F8DC9AA2C01359CAF28A3414C5
6,260,854 UART: [art] SIG.R = 0FDEB4994DD68251D5102959F62FAD9ED3EDD0F48B4C2DDF91569203D5FF51AEED6581D5A4FB65458802A856B3B8EF95
6,267,629 UART: [art] SIG.S = B944EF4360CACBD4C2FFBA73A162A63FB449304CBE8EB6C5F9E822D5E5D9734B6BD892C8B0C1AC84441C28C4A575A1AD
6,290,794 UART: Caliptra RT
6,291,047 UART: [state] CFI Enabled
6,574,393 UART: [rt] RT failed reset flow
6,574,824 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,486 >>> mbox cmd response: success
2,463,486 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,524,696 UART:
2,524,712 UART: Running Caliptra FMC ...
2,525,120 UART:
2,525,174 UART: [state] CFI Enabled
2,535,507 UART: [fht] FMC Alias Private Key: 7
2,643,290 UART: [art] Extend RT PCRs Done
2,643,718 UART: [art] Lock RT PCRs Done
2,644,968 UART: [art] Populate DV Done
2,653,161 UART: [fht] FMC Alias Private Key: 7
2,654,317 UART: [art] Derive CDI
2,654,597 UART: [art] Store in in slot 0x4
2,739,910 UART: [art] Derive Key Pair
2,740,270 UART: [art] Store priv key in slot 0x5
2,753,208 UART: [art] Derive Key Pair - Done
2,768,339 UART: [art] Signing Cert with AUTHO
2,768,819 UART: RITY.KEYID = 7
2,784,111 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,876 UART: [art] PUB.X = 69D070BA11C3AEE1D2E4B76E313AD4F05FA1C01B9A739370E0B630CD2DC500DAD7D764C04F7066BE5F623AF5DAC3887E
2,791,642 UART: [art] PUB.Y = 39A418D76D74D0A60F3AE33A7486176BA0C822C2ACAE49759FCC8226248C8038EE1263F70F2C4CDCE8868A1F9A22689D
2,798,592 UART: [art] SIG.R = A127C9CEB107D4D3D61F3AE7BD7845D88E966811F39DBBDA7E1CBD746839D3003102AA3207C973EB05FDF43F4CC203F5
2,805,339 UART: [art] SIG.S = A5050EB016BDE0FBA931C8EB884BBE2C826E41063122EEFB9697E901836F365FE43ED73E9AE9EDD715771DF9E4418F98
2,828,768 UART: mbox::rt_entry...
2,829,140 UART: ____ _ _ _ ____ _____
2,829,924 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,830,724 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,492 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,028 UART: |_|
2,833,340 UART:
2,939,571 UART: [rt] Runtime listening for mailbox commands...
2,940,505 >>> mbox cmd response data (0 bytes)
2,940,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,698,785 >>> mbox cmd response: success
5,712,162 UART:
5,712,178 UART: Running Caliptra FMC ...
5,712,586 UART:
5,712,640 UART: [state] CFI Enabled
5,801,961 UART: [art] Extend RT PCRs Done
5,802,389 UART: [art] Lock RT PCRs Done
5,803,672 UART: [art] Populate DV Done
5,811,929 UART: [fht] FMC Alias Private Key: 7
5,812,861 UART: [art] Derive CDI
5,813,141 UART: [art] Store in in slot 0x4
5,898,518 UART: [art] Derive Key Pair
5,898,878 UART: [art] Store priv key in slot 0x5
5,912,034 UART: [art] Derive Key Pair - Done
5,926,557 UART: [art] Signing Cert with AUTHO
5,927,037 UART: RITY.KEYID = 7
5,942,085 UART: [art] Erasing AUTHORITY.KEYID = 7
5,942,850 UART: [art] PUB.X = A7B9120B432BF82C3C33C605719F949D0702A83D9308D1B0284C72CDC687E4775948D8FEA204EFCE111DE0C7A2007EF5
5,949,584 UART: [art] PUB.Y = 76497E54848267E748DB2B70BBA5554024D7DCF031C3B21A21EA6C721FEF332696E7F5C827C969A2C13BCE82247F1899
5,956,534 UART: [art] SIG.R = ED79789E38B2B5C3E156F80832735D5E7ECE36143CA8467A1097274BC064614E0F43D92CA8892A758B6C3FE369178A03
5,963,291 UART: [art] SIG.S = E48D7FFCA72470EC8DE63F6B968115A7F16132F11D8B4532087B216A3EA99D350B382D4C3DC0A60B186BE3F80C2FD192
5,987,626 UART: Caliptra RT
5,987,879 UART: [state] CFI Enabled
6,269,748 UART: [rt] RT failed reset flow
6,270,179 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,785 UART: [kat] SHA2-512-ACC
897,686 UART: [kat] ECC-384
903,603 UART: [kat] HMAC-384Kdf
908,357 UART: [kat] LMS
1,476,553 UART: [kat] --
1,477,148 UART: [cold-reset] ++
1,477,568 UART: [fht] Storing FHT @ 0x50003400
1,480,339 UART: [idev] ++
1,480,507 UART: [idev] CDI.KEYID = 6
1,480,867 UART: [idev] SUBJECT.KEYID = 7
1,481,291 UART: [idev] UDS.KEYID = 0
1,481,636 ready_for_fw is high
1,481,636 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,506,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,589 UART: [idev] --
1,515,652 UART: [ldev] ++
1,515,820 UART: [ldev] CDI.KEYID = 6
1,516,183 UART: [ldev] SUBJECT.KEYID = 5
1,516,609 UART: [ldev] AUTHORITY.KEYID = 7
1,517,072 UART: [ldev] FE.KEYID = 1
1,522,208 UART: [ldev] Erasing FE.KEYID = 1
1,547,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,831 UART: [ldev] --
1,587,216 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 78456 bytes
2,476,410 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,600 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,952 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,971 >>> mbox cmd response: success
2,614,971 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,616,079 UART: [afmc] ++
2,616,247 UART: [afmc] CDI.KEYID = 6
2,616,609 UART: [afmc] SUBJECT.KEYID = 7
2,617,034 UART: [afmc] AUTHORITY.KEYID = 5
2,652,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,821 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,706 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,396 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,367 UART: [afmc] --
2,695,421 UART: [cold-reset] --
2,696,293 UART: [state] Locking Datavault
2,697,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,994 UART: [state] Locking ICCM
2,698,512 UART: [exit] Launching FMC @ 0x40000130
2,703,841 UART:
2,703,857 UART: Running Caliptra FMC ...
2,704,265 UART:
2,704,408 UART: [state] CFI Enabled
2,715,049 UART: [fht] FMC Alias Private Key: 7
2,823,362 UART: [art] Extend RT PCRs Done
2,823,790 UART: [art] Lock RT PCRs Done
2,825,226 UART: [art] Populate DV Done
2,833,451 UART: [fht] FMC Alias Private Key: 7
2,834,391 UART: [art] Derive CDI
2,834,671 UART: [art] Store in in slot 0x4
2,919,998 UART: [art] Derive Key Pair
2,920,358 UART: [art] Store priv key in slot 0x5
2,934,266 UART: [art] Derive Key Pair - Done
2,949,028 UART: [art] Signing Cert with AUTHO
2,949,508 UART: RITY.KEYID = 7
2,964,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,089 UART: [art] PUB.X = 73DA32C75980A893C87D50AD578CD0D33DFB0A721CCA1D21534DB9AB0374682AF9516A9969ECECE590AC17BE8968CE93
2,971,865 UART: [art] PUB.Y = 322EB90DC122F96FD85D19D6091CBAA0DA5DFE1D3E89A22D1BB08A3F2E321A79550A1F8A93C1C354F60F048429E769FD
2,978,814 UART: [art] SIG.R = 3E587E208379DE6E5EEAD7FE79E6592EA8D0572294F72CFC0B6269AE1C3702627B29FC8A74BDD402ADA65B52F3EBC3EE
2,985,593 UART: [art] SIG.S = EB7940FA187D20964AA7CED9D007115BBA45F1549AD491AE4D8BD6FEE01CF6736E6D12A1F04FAC505F31A07EF1042F67
3,009,760 UART: mbox::rt_entry...
3,010,132 UART: ____ _ _ _ ____ _____
3,010,916 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,716 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,252 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,020 UART: |_|
3,014,332 UART:
3,121,404 UART: [rt] Runtime listening for mailbox commands...
3,122,338 >>> mbox cmd response data (0 bytes)
3,122,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,122,453 UART:
3,122,469 UART: Running Caliptra ROM ...
3,122,877 UART:
3,123,018 UART: [state] CFI Enabled
3,126,244 UART: [state] LifecycleState = Unprovisioned
3,126,899 UART: [state] DebugLocked = No
3,127,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,144 UART: [kat] SHA2-256
3,923,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,190 UART: [kat] ++
3,927,342 UART: [kat] sha1
3,931,640 UART: [kat] SHA2-256
3,933,578 UART: [kat] SHA2-384
3,936,301 UART: [kat] SHA2-512-ACC
3,938,201 UART: [kat] ECC-384
3,943,798 UART: [kat] HMAC-384Kdf
3,948,352 UART: [kat] LMS
4,516,548 UART: [kat] --
4,517,433 UART: [update-reset] ++
5,848,787 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,849,883 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,999,387 >>> mbox cmd response: success
5,999,698 UART: [update-reset] Copying MAN_2 To MAN_1
6,007,712 UART: [update-reset Success] --
6,008,601 UART: [state] Locking Datavault
6,009,453 UART: [state] Locking PCR0, PCR1 and PCR31
6,010,057 UART: [state] Locking ICCM
6,010,533 UART: [exit] Launching FMC @ 0x40000130
6,015,862 UART:
6,015,878 UART: Running Caliptra FMC ...
6,016,286 UART:
6,016,429 UART: [state] CFI Enabled
6,105,984 UART: [art] Extend RT PCRs Done
6,106,412 UART: [art] Lock RT PCRs Done
6,107,565 UART: [art] Populate DV Done
6,115,878 UART: [fht] FMC Alias Private Key: 7
6,116,914 UART: [art] Derive CDI
6,117,194 UART: [art] Store in in slot 0x4
6,202,233 UART: [art] Derive Key Pair
6,202,593 UART: [art] Store priv key in slot 0x5
6,216,055 UART: [art] Derive Key Pair - Done
6,231,030 UART: [art] Signing Cert with AUTHO
6,231,510 UART: RITY.KEYID = 7
6,246,892 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,657 UART: [art] PUB.X = 97454A262D5EAC5EA49EEFC02D5126B9D98F14A02DFE1DF128B38C6809BBD66BC869314506EC1AA75BC53F8C4EE1983B
6,254,437 UART: [art] PUB.Y = EF3A93C2DB8436FD2A1D33149C1C469A7E2BA9375837FB8F307288B03E24F2849ED4DC895C9D00751482BDB456357E27
6,261,367 UART: [art] SIG.R = 2A199EF94B12EAAC782828E1025281D548A58599B64834811CCF7B7CB93C143D4448069DE171A60912065D5FCCBD762D
6,268,123 UART: [art] SIG.S = FB33256533BB6E32EB2AB7B55AE4A855110AE0AD4B89AC1B0A4A48CF565CF26E55568F1D99ADBBF7FB81F10E455527D1
6,291,667 UART: Caliptra RT
6,292,012 UART: [state] CFI Enabled
6,575,018 UART: [rt] RT failed reset flow
6,575,449 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,464,187 >>> mbox cmd response: success
2,464,187 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,525,679 UART:
2,525,695 UART: Running Caliptra FMC ...
2,526,103 UART:
2,526,246 UART: [state] CFI Enabled
2,536,503 UART: [fht] FMC Alias Private Key: 7
2,644,788 UART: [art] Extend RT PCRs Done
2,645,216 UART: [art] Lock RT PCRs Done
2,646,738 UART: [art] Populate DV Done
2,654,755 UART: [fht] FMC Alias Private Key: 7
2,655,915 UART: [art] Derive CDI
2,656,195 UART: [art] Store in in slot 0x4
2,742,164 UART: [art] Derive Key Pair
2,742,524 UART: [art] Store priv key in slot 0x5
2,755,702 UART: [art] Derive Key Pair - Done
2,770,487 UART: [art] Signing Cert with AUTHO
2,770,967 UART: RITY.KEYID = 7
2,786,417 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,182 UART: [art] PUB.X = 21BACC114B99A6BD41B720D9075575B6FF28DCBAB79D3D189C88A5BBD7F5467363DDF859B64058B7EFB2197DD7FE2457
2,793,963 UART: [art] PUB.Y = 6642FBA3F9201B87CFAE3E70B3A8A96680F7FE97AF80DF3FD0AB161765AFF1E658C1147BABC05675E544B5B73EF75A1E
2,800,931 UART: [art] SIG.R = BAED2B7AED5BCC328E37F61A2E120564F0790060853426D991FB332C857775D22D35E9D9B1F30C82D950D4C808F5D23A
2,807,674 UART: [art] SIG.S = 60239DEB981406636BFC839A0A0BD3E70DE2EB8DDAC95AA739B604FCDA91EC26B7FAA21CC48681BA6BFB58AEE5004B53
2,831,236 UART: mbox::rt_entry...
2,831,608 UART: ____ _ _ _ ____ _____
2,832,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,192 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,728 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,496 UART: |_|
2,835,808 UART:
2,943,310 UART: [rt] Runtime listening for mailbox commands...
2,944,244 >>> mbox cmd response data (0 bytes)
2,944,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,701,587 >>> mbox cmd response: success
5,714,796 UART:
5,714,812 UART: Running Caliptra FMC ...
5,715,220 UART:
5,715,363 UART: [state] CFI Enabled
5,804,668 UART: [art] Extend RT PCRs Done
5,805,096 UART: [art] Lock RT PCRs Done
5,806,423 UART: [art] Populate DV Done
5,814,882 UART: [fht] FMC Alias Private Key: 7
5,815,846 UART: [art] Derive CDI
5,816,126 UART: [art] Store in in slot 0x4
5,902,161 UART: [art] Derive Key Pair
5,902,521 UART: [art] Store priv key in slot 0x5
5,915,877 UART: [art] Derive Key Pair - Done
5,930,626 UART: [art] Signing Cert with AUTHO
5,931,106 UART: RITY.KEYID = 7
5,946,746 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,511 UART: [art] PUB.X = 1D2A46D637157D42FC22E07F959AD1F2AE4A4A2318C45AEBD19588C9E94EC4CE3A8EB11EF46F4738B6C6FE692CBCBA5C
5,954,303 UART: [art] PUB.Y = 5E82AF2B113C2959DAB5875DB0078784B04F9014920C08A989B71112B6E24ED499B7087751F7110A8189AE282A847244
5,961,226 UART: [art] SIG.R = 9066ABACC1A6BAFC87BCE7664CCCBDAACA2CE80D949A4487D9C79985A7BCEC0863173CE77C80407BDBFD6BD02073A2CE
5,968,020 UART: [art] SIG.S = 331D68B74AF46900B4726CB91FD2A26D5C869B21A31EFBF34072E7D4965ABE67D6ED7919D20D0109BD17373836C8002C
5,991,616 UART: Caliptra RT
5,991,961 UART: [state] CFI Enabled
6,273,011 UART: [rt] RT failed reset flow
6,273,442 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
893,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,297 UART: [kat] ++
897,449 UART: [kat] sha1
901,757 UART: [kat] SHA2-256
903,697 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
918,306 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,171,903 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,168 UART: [idev] ++
1,175,336 UART: [idev] CDI.KEYID = 6
1,175,696 UART: [idev] SUBJECT.KEYID = 7
1,176,120 UART: [idev] UDS.KEYID = 0
1,176,465 ready_for_fw is high
1,176,465 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,242,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,834 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 78456 bytes
2,169,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,130 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,225 >>> mbox cmd response: success
2,308,225 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,309,377 UART: [afmc] ++
2,309,545 UART: [afmc] CDI.KEYID = 6
2,309,907 UART: [afmc] SUBJECT.KEYID = 7
2,310,332 UART: [afmc] AUTHORITY.KEYID = 5
2,345,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,546 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,052 UART: [afmc] --
2,389,088 UART: [cold-reset] --
2,389,918 UART: [state] Locking Datavault
2,391,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,859 UART: [state] Locking ICCM
2,392,327 UART: [exit] Launching FMC @ 0x40000130
2,397,656 UART:
2,397,672 UART: Running Caliptra FMC ...
2,398,080 UART:
2,398,134 UART: [state] CFI Enabled
2,408,919 UART: [fht] FMC Alias Private Key: 7
2,516,528 UART: [art] Extend RT PCRs Done
2,516,956 UART: [art] Lock RT PCRs Done
2,518,316 UART: [art] Populate DV Done
2,526,475 UART: [fht] FMC Alias Private Key: 7
2,527,497 UART: [art] Derive CDI
2,527,777 UART: [art] Store in in slot 0x4
2,613,462 UART: [art] Derive Key Pair
2,613,822 UART: [art] Store priv key in slot 0x5
2,627,376 UART: [art] Derive Key Pair - Done
2,641,936 UART: [art] Signing Cert with AUTHO
2,642,416 UART: RITY.KEYID = 7
2,657,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,397 UART: [art] PUB.X = F41A27F2B86DF0787AC70589E00B15E20AA8C596E304C09B4603333BBC3E9D1D8918EDE07BE321C7FC03BA6359621AC3
2,665,157 UART: [art] PUB.Y = 5C098A6B378A6CBD1E5A185B7BB932B8E856D863D5EEFCFF81A9E1937227C506E03AF66166B4299DC63FF74021098491
2,672,102 UART: [art] SIG.R = 12901EBE904D3B0C4EA63C653D948FDBB3565067CC54E83061F438CF591654CFF7811166453B94C2FD2876BCED3FA2FC
2,678,877 UART: [art] SIG.S = F6E03487985E468C9475F68A43DFE059C4778145B3CD2594D94E6C571C5F5E6C8BBEE9A047F33C50952BEC0AA3F71AA8
2,702,671 UART: mbox::rt_entry...
2,703,043 UART: ____ _ _ _ ____ _____
2,703,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,931 UART: |_|
2,707,243 UART:
2,814,395 UART: [rt] Runtime listening for mailbox commands...
2,815,329 >>> mbox cmd response data (0 bytes)
2,815,330 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,815,441 UART:
2,815,457 UART: Running Caliptra ROM ...
2,815,865 UART:
2,815,920 UART: [state] CFI Enabled
2,818,686 UART: [state] LifecycleState = Unprovisioned
2,819,341 UART: [state] DebugLocked = No
2,819,909 UART: [state] WD Timer not started. Device not locked for debugging
2,821,167 UART: [kat] SHA2-256
3,626,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,630,942 UART: [kat] ++
3,631,094 UART: [kat] sha1
3,635,196 UART: [kat] SHA2-256
3,637,136 UART: [kat] SHA2-384
3,639,941 UART: [kat] SHA2-512-ACC
3,641,841 UART: [kat] ECC-384
3,651,272 UART: [kat] HMAC-384Kdf
3,655,806 UART: [kat] LMS
3,904,134 UART: [kat] --
3,905,150 UART: [update-reset] ++
5,215,030 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,111 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,365,563 >>> mbox cmd response: success
5,365,782 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,796 UART: [update-reset Success] --
5,374,933 UART: [state] Locking Datavault
5,375,645 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,249 UART: [state] Locking ICCM
5,376,813 UART: [exit] Launching FMC @ 0x40000130
5,382,142 UART:
5,382,158 UART: Running Caliptra FMC ...
5,382,566 UART:
5,382,620 UART: [state] CFI Enabled
5,471,489 UART: [art] Extend RT PCRs Done
5,471,917 UART: [art] Lock RT PCRs Done
5,473,328 UART: [art] Populate DV Done
5,481,577 UART: [fht] FMC Alias Private Key: 7
5,482,621 UART: [art] Derive CDI
5,482,901 UART: [art] Store in in slot 0x4
5,568,802 UART: [art] Derive Key Pair
5,569,162 UART: [art] Store priv key in slot 0x5
5,582,644 UART: [art] Derive Key Pair - Done
5,597,228 UART: [art] Signing Cert with AUTHO
5,597,708 UART: RITY.KEYID = 7
5,612,846 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,611 UART: [art] PUB.X = DB04165AA9225E2A45F9F7CA2E5D8E3260AD93DD3421908D12341248C2344D47742F878532BE99F3FCAB5C6B18EC89B2
5,620,382 UART: [art] PUB.Y = 05E9F96582B97573BC2099E31381D9DFA6AAB3060FBD1AA5FD869D552754B4A86F78F9194717F10517E982B019FF41FF
5,627,322 UART: [art] SIG.R = 982827742D7E6667BE0779D03193F8AE27A60A04485A2AC8B34B9E39A69EB73BE3ACB60F786FE19460D4C0AD42403D75
5,634,082 UART: [art] SIG.S = 8E638EF729C99C65A3B351AE34C05217702D6D66B6BA9C344C3BCBE1B33ECAC17C14C6829EB71723BF660B55A48487B6
5,657,548 UART: Caliptra RT
5,657,801 UART: [state] CFI Enabled
5,940,562 UART: [rt] RT failed reset flow
5,940,993 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,162,274 >>> mbox cmd response: success
2,162,274 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,224,794 UART:
2,224,810 UART: Running Caliptra FMC ...
2,225,218 UART:
2,225,272 UART: [state] CFI Enabled
2,235,865 UART: [fht] FMC Alias Private Key: 7
2,343,976 UART: [art] Extend RT PCRs Done
2,344,404 UART: [art] Lock RT PCRs Done
2,345,896 UART: [art] Populate DV Done
2,353,987 UART: [fht] FMC Alias Private Key: 7
2,355,059 UART: [art] Derive CDI
2,355,339 UART: [art] Store in in slot 0x4
2,440,454 UART: [art] Derive Key Pair
2,440,814 UART: [art] Store priv key in slot 0x5
2,453,984 UART: [art] Derive Key Pair - Done
2,468,661 UART: [art] Signing Cert with AUTHO
2,469,141 UART: RITY.KEYID = 7
2,484,475 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,240 UART: [art] PUB.X = FB2B098CD0B1ADBB7017E4E92876ED5BE43B618B1197A9DD3041434194457C8F049C8FD9A2C58B5BF3BAC929F9FAD982
2,492,018 UART: [art] PUB.Y = 2528FF9CE1A4F44049C2702E6CF783F72F4C44D5ABA47B64D57904D1077C6849070E60603F2E3A56004BA7698FAFDE60
2,498,936 UART: [art] SIG.R = 93854BFE263F8A89F193A0FCFC1BC18AB88B6647E67A434866892F57D5A15F013A81928A8744372D1E8EB2C2B884C986
2,505,703 UART: [art] SIG.S = CC951D767CB9891A8084C3C83740291BB6CD1322E92B64E102D6F007097A86EAA2C8E9CC2347A979979F90AD10A3224A
2,529,379 UART: mbox::rt_entry...
2,529,751 UART: ____ _ _ _ ____ _____
2,530,535 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,335 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,103 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,871 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,639 UART: |_|
2,533,951 UART:
2,641,082 UART: [rt] Runtime listening for mailbox commands...
2,642,016 >>> mbox cmd response data (0 bytes)
2,642,017 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,074,195 >>> mbox cmd response: success
5,087,801 UART:
5,087,817 UART: Running Caliptra FMC ...
5,088,225 UART:
5,088,279 UART: [state] CFI Enabled
5,177,090 UART: [art] Extend RT PCRs Done
5,177,518 UART: [art] Lock RT PCRs Done
5,178,901 UART: [art] Populate DV Done
5,187,418 UART: [fht] FMC Alias Private Key: 7
5,188,542 UART: [art] Derive CDI
5,188,822 UART: [art] Store in in slot 0x4
5,274,071 UART: [art] Derive Key Pair
5,274,431 UART: [art] Store priv key in slot 0x5
5,287,669 UART: [art] Derive Key Pair - Done
5,302,459 UART: [art] Signing Cert with AUTHO
5,302,939 UART: RITY.KEYID = 7
5,318,501 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,266 UART: [art] PUB.X = 41AAFB38EDA909B4EF1D636428AECCE9921E8ED7369B7BAB157DDA0A6CE3CEFD77FAFBE426E43396AA59068708B117DC
5,326,050 UART: [art] PUB.Y = 787100E4A79216B8EC00504C1BCD807C58D887CA44FEFB8B5AE29E8DA1570D3064F71E0E91821E7A54065433A145AB52
5,332,949 UART: [art] SIG.R = D6D8DA966EB71840121817CC633B16A4ADBF553BC750EB5B9107209EDAB396AB34807FC4C0B8ADF3CE0CCC3C36ACA093
5,339,733 UART: [art] SIG.S = 301AFCEB85F93A60B40D869F1E1C8ACC28FB086F5ABF3933F35B74459F3BFCAA2D0A3B995EBD2F43E6B6403AB1736657
5,363,447 UART: Caliptra RT
5,363,700 UART: [state] CFI Enabled
5,644,258 UART: [rt] RT failed reset flow
5,644,689 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
901,902 UART: [kat] SHA2-256
903,842 UART: [kat] SHA2-384
906,473 UART: [kat] SHA2-512-ACC
908,374 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
922,955 UART: [kat] LMS
1,171,283 UART: [kat] --
1,171,912 UART: [cold-reset] ++
1,172,456 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,383 UART: [idev] Erasing UDS.KEYID = 0
1,201,242 UART: [idev] Sha1 KeyId Algorithm
1,209,638 UART: [idev] --
1,210,886 UART: [ldev] ++
1,211,054 UART: [ldev] CDI.KEYID = 6
1,211,417 UART: [ldev] SUBJECT.KEYID = 5
1,211,843 UART: [ldev] AUTHORITY.KEYID = 7
1,212,306 UART: [ldev] FE.KEYID = 1
1,217,930 UART: [ldev] Erasing FE.KEYID = 1
1,244,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,224 UART: [ldev] --
1,283,613 UART: [fwproc] Wait for Commands...
1,284,317 UART: [fwproc] Recv command 0x46574c44
1,285,045 UART: [fwproc] Recv'd Img size: 78456 bytes
2,171,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,087 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,200 >>> mbox cmd response: success
2,310,200 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,311,352 UART: [afmc] ++
2,311,520 UART: [afmc] CDI.KEYID = 6
2,311,882 UART: [afmc] SUBJECT.KEYID = 7
2,312,307 UART: [afmc] AUTHORITY.KEYID = 5
2,348,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,823 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,061 UART: [afmc] --
2,391,189 UART: [cold-reset] --
2,392,205 UART: [state] Locking Datavault
2,393,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,864 UART: [state] Locking ICCM
2,394,488 UART: [exit] Launching FMC @ 0x40000130
2,399,817 UART:
2,399,833 UART: Running Caliptra FMC ...
2,400,241 UART:
2,400,384 UART: [state] CFI Enabled
2,411,121 UART: [fht] FMC Alias Private Key: 7
2,519,050 UART: [art] Extend RT PCRs Done
2,519,478 UART: [art] Lock RT PCRs Done
2,520,822 UART: [art] Populate DV Done
2,529,135 UART: [fht] FMC Alias Private Key: 7
2,530,087 UART: [art] Derive CDI
2,530,367 UART: [art] Store in in slot 0x4
2,616,108 UART: [art] Derive Key Pair
2,616,468 UART: [art] Store priv key in slot 0x5
2,629,664 UART: [art] Derive Key Pair - Done
2,644,378 UART: [art] Signing Cert with AUTHO
2,644,858 UART: RITY.KEYID = 7
2,660,284 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,049 UART: [art] PUB.X = 17226B510A4021F0175B8249FE71B4195610F57C657D17B6A13546B551269B43C16B277E6A962C936CF2A8C3730E2A66
2,667,801 UART: [art] PUB.Y = 1B54135E58751C5F4E823B45F7EB8C8C58D4A373B4014CA64ED9EA593BBAAC44341DDC4CF162D912D25633FB44E4919C
2,674,758 UART: [art] SIG.R = 6E28A1811C28555FCE99E4D38D8C8467C1F1E460CC111E102063C78A988C08DE7635A583D2D3E8D2847E7246CC8181F9
2,681,523 UART: [art] SIG.S = 62730BCE9710D4EA181BD60EA89F3D9C1C79FE70FFD7534F1376F90419339E77D7719CF56B6328FB5306414350EA9402
2,705,431 UART: mbox::rt_entry...
2,705,803 UART: ____ _ _ _ ____ _____
2,706,587 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,387 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,155 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,923 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,691 UART: |_|
2,710,003 UART:
2,815,785 UART: [rt] Runtime listening for mailbox commands...
2,816,719 >>> mbox cmd response data (0 bytes)
2,816,720 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,816,831 UART:
2,816,847 UART: Running Caliptra ROM ...
2,817,255 UART:
2,817,397 UART: [state] CFI Enabled
2,820,169 UART: [state] LifecycleState = Unprovisioned
2,820,824 UART: [state] DebugLocked = No
2,821,520 UART: [state] WD Timer not started. Device not locked for debugging
2,822,850 UART: [kat] SHA2-256
3,628,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,625 UART: [kat] ++
3,632,777 UART: [kat] sha1
3,636,923 UART: [kat] SHA2-256
3,638,863 UART: [kat] SHA2-384
3,641,432 UART: [kat] SHA2-512-ACC
3,643,332 UART: [kat] ECC-384
3,653,195 UART: [kat] HMAC-384Kdf
3,658,017 UART: [kat] LMS
3,906,345 UART: [kat] --
3,907,233 UART: [update-reset] ++
5,216,243 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,217,238 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,366,690 >>> mbox cmd response: success
5,366,913 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,927 UART: [update-reset Success] --
5,376,066 UART: [state] Locking Datavault
5,376,788 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,392 UART: [state] Locking ICCM
5,377,858 UART: [exit] Launching FMC @ 0x40000130
5,383,187 UART:
5,383,203 UART: Running Caliptra FMC ...
5,383,611 UART:
5,383,754 UART: [state] CFI Enabled
5,472,809 UART: [art] Extend RT PCRs Done
5,473,237 UART: [art] Lock RT PCRs Done
5,474,490 UART: [art] Populate DV Done
5,482,917 UART: [fht] FMC Alias Private Key: 7
5,483,999 UART: [art] Derive CDI
5,484,279 UART: [art] Store in in slot 0x4
5,569,742 UART: [art] Derive Key Pair
5,570,102 UART: [art] Store priv key in slot 0x5
5,583,094 UART: [art] Derive Key Pair - Done
5,597,659 UART: [art] Signing Cert with AUTHO
5,598,139 UART: RITY.KEYID = 7
5,613,401 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,166 UART: [art] PUB.X = 64373290817BAE42C7DDDC14637061E15D14468448D9300BE765E6AEADF0C371DE41DFA2C33A81E4FFCF3936857C0651
5,620,934 UART: [art] PUB.Y = A4EB031E07F21FA54514F338711D3DE4C0850B8D5A85CD51B9A3E4C507700E6680E466C1D62DF405311A9EE1EC451EF7
5,627,872 UART: [art] SIG.R = FB15F37D1F851AAADD39DC060FEC2D9AEA77D7D5764641BA6261F59197E666B40137D7AD71BAAFF1A4C09EB6E3CF210D
5,634,652 UART: [art] SIG.S = 5500E1A3956D654D6EE7AE85962206CD3B735D9CE54FA060DADC63578EEFFCCFFA2813BFF3EB8D4DB3739F98C308FDF8
5,658,173 UART: Caliptra RT
5,658,518 UART: [state] CFI Enabled
5,937,288 UART: [rt] RT failed reset flow
5,937,719 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,262 ready_for_fw is high
1,060,262 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,163,471 >>> mbox cmd response: success
2,163,471 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,225,867 UART:
2,225,883 UART: Running Caliptra FMC ...
2,226,291 UART:
2,226,434 UART: [state] CFI Enabled
2,237,179 UART: [fht] FMC Alias Private Key: 7
2,345,678 UART: [art] Extend RT PCRs Done
2,346,106 UART: [art] Lock RT PCRs Done
2,347,604 UART: [art] Populate DV Done
2,355,689 UART: [fht] FMC Alias Private Key: 7
2,356,755 UART: [art] Derive CDI
2,357,035 UART: [art] Store in in slot 0x4
2,442,914 UART: [art] Derive Key Pair
2,443,274 UART: [art] Store priv key in slot 0x5
2,456,428 UART: [art] Derive Key Pair - Done
2,471,392 UART: [art] Signing Cert with AUTHO
2,471,872 UART: RITY.KEYID = 7
2,486,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,743 UART: [art] PUB.X = 6E66AC41EAEA2C8F548E784499DCC79595DC70A9F9265A21659CA009E05F4C4CFAAED3E062ED8C58D373B4FC819A7A81
2,494,526 UART: [art] PUB.Y = CEED4475C08E036427EC1B7A3AA80E3F23EE2F3AF0E804FA316B69F5F63E1D9FA1C13C06AEA37F9AB34A4A50AF481B1A
2,501,488 UART: [art] SIG.R = 0E1AC82BC1B4B680A66FD85473E13E64CC152053492F6DE56A4134D03F34785DE387ADA2C825ACEE66091A97DC51BF2A
2,508,262 UART: [art] SIG.S = DD5FEC2C72EC7DE4A3E859E67D2C573E8BD69A3D00E867BED32666BB299A957DBE0258BDD55926374E0C4580FE5E47DB
2,532,103 UART: mbox::rt_entry...
2,532,475 UART: ____ _ _ _ ____ _____
2,533,259 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,595 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,363 UART: |_|
2,536,675 UART:
2,643,479 UART: [rt] Runtime listening for mailbox commands...
2,644,413 >>> mbox cmd response data (0 bytes)
2,644,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,078,113 >>> mbox cmd response: success
5,091,325 UART:
5,091,341 UART: Running Caliptra FMC ...
5,091,749 UART:
5,091,892 UART: [state] CFI Enabled
5,181,247 UART: [art] Extend RT PCRs Done
5,181,675 UART: [art] Lock RT PCRs Done
5,182,860 UART: [art] Populate DV Done
5,190,943 UART: [fht] FMC Alias Private Key: 7
5,191,889 UART: [art] Derive CDI
5,192,169 UART: [art] Store in in slot 0x4
5,277,712 UART: [art] Derive Key Pair
5,278,072 UART: [art] Store priv key in slot 0x5
5,291,304 UART: [art] Derive Key Pair - Done
5,306,011 UART: [art] Signing Cert with AUTHO
5,306,491 UART: RITY.KEYID = 7
5,321,379 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,144 UART: [art] PUB.X = A5B62CB3B31F53D8FBA7010E5C64E14054FD29BF67F55E67D94C2C5811468D1794439728814AAB76FD92B5E410CFE5C7
5,328,914 UART: [art] PUB.Y = 44251C75036D47B77DD9FE35C1DB8F9386D719916444FF77E2705A76F4374E0C0719F1EF388BA206948C6CBF3865AA1C
5,335,852 UART: [art] SIG.R = DCB289387E4D97ABF43A3F2F72136AE0805A0430A746B04E5589B8FC487C13BA698150A498C7538733451FE2ED60F3D8
5,342,619 UART: [art] SIG.S = AF069131305C2D709A868CCB68182CE0B86E065108CB3C8CFCBB32C92F89E2173210226A8BFFF6EA618C03A8C62EAD27
5,366,780 UART: Caliptra RT
5,367,125 UART: [state] CFI Enabled
5,644,998 UART: [rt] RT failed reset flow
5,645,429 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,602 UART: [state] LifecycleState = Unprovisioned
86,257 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,884 UART: [kat] SHA2-512-ACC
906,785 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,206 UART: [kat] LMS
1,169,518 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,827 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,174,797 ready_for_fw is high
1,174,797 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,495 UART: [idev] Erasing UDS.KEYID = 0
1,199,543 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,612 UART: [ldev] ++
1,209,780 UART: [ldev] CDI.KEYID = 6
1,210,144 UART: [ldev] SUBJECT.KEYID = 5
1,210,571 UART: [ldev] AUTHORITY.KEYID = 7
1,211,034 UART: [ldev] FE.KEYID = 1
1,216,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,868 UART: [fwproc] Wait for Commands...
1,281,563 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: [fwproc] Recv'd Img size: 78456 bytes
2,169,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,796 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,105 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,187 >>> mbox cmd response: success
2,308,187 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,309,412 UART: [afmc] ++
2,309,580 UART: [afmc] CDI.KEYID = 6
2,309,943 UART: [afmc] SUBJECT.KEYID = 7
2,310,369 UART: [afmc] AUTHORITY.KEYID = 5
2,345,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,927 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,539 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,258 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,291 UART: [afmc] --
2,389,397 UART: [cold-reset] --
2,390,029 UART: [state] Locking Datavault
2,391,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,756 UART: [state] Locking ICCM
2,392,268 UART: [exit] Launching FMC @ 0x40000130
2,397,597 UART:
2,397,613 UART: Running Caliptra FMC ...
2,398,021 UART:
2,398,075 UART: [state] CFI Enabled
2,408,848 UART: [fht] FMC Alias Private Key: 7
2,517,433 UART: [art] Extend RT PCRs Done
2,517,861 UART: [art] Lock RT PCRs Done
2,519,179 UART: [art] Populate DV Done
2,527,238 UART: [fht] FMC Alias Private Key: 7
2,528,172 UART: [art] Derive CDI
2,528,452 UART: [art] Store in in slot 0x4
2,613,501 UART: [art] Derive Key Pair
2,613,861 UART: [art] Store priv key in slot 0x5
2,627,195 UART: [art] Derive Key Pair - Done
2,641,959 UART: [art] Signing Cert with AUTHO
2,642,439 UART: RITY.KEYID = 7
2,657,577 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,342 UART: [art] PUB.X = F5FB906371FA6FFF0C187873FA97BB3640234C658F3DE584A7110C863B62A6DE2B0EAC6CECAC2CF2E4A57C8C635C4B49
2,665,121 UART: [art] PUB.Y = 3A7F6C725CB08A695DCFBAA0BC2A9895854B4A13E60D126A233E939614A4F00BEF2E2A4AF0EEA84C2E5F2DE564CCD9EE
2,672,089 UART: [art] SIG.R = FAD987D4E46392296907410428B5E956CB7AF02829651D504790AF265EB944542727C8B0491F3EEC010D0EF7D7195B9F
2,678,838 UART: [art] SIG.S = 817E1B0CB6B78592EE3BC568AB5E8B38B76FAFEDFC6413EE6F0C1A74E4CE9D8FB59C3343B857C32A1AC533851080C0FB
2,702,463 UART: mbox::rt_entry...
2,702,835 UART: ____ _ _ _ ____ _____
2,703,619 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,419 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,187 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,955 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,723 UART: |_|
2,707,035 UART:
2,813,470 UART: [rt] Runtime listening for mailbox commands...
2,814,404 >>> mbox cmd response data (0 bytes)
2,814,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,814,516 UART:
2,814,532 UART: Running Caliptra ROM ...
2,814,940 UART:
2,814,995 UART: [state] CFI Enabled
2,817,383 UART: [state] LifecycleState = Unprovisioned
2,818,038 UART: [state] DebugLocked = No
2,818,640 UART: [state] WD Timer not started. Device not locked for debugging
2,819,980 UART: [kat] SHA2-256
3,623,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,627,659 UART: [kat] ++
3,627,811 UART: [kat] sha1
3,631,911 UART: [kat] SHA2-256
3,633,851 UART: [kat] SHA2-384
3,636,568 UART: [kat] SHA2-512-ACC
3,638,468 UART: [kat] ECC-384
3,648,039 UART: [kat] HMAC-384Kdf
3,652,815 UART: [kat] LMS
3,901,127 UART: [kat] --
3,902,157 UART: [update-reset] ++
5,212,072 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,213,231 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,362,683 >>> mbox cmd response: success
5,362,888 UART: [update-reset] Copying MAN_2 To MAN_1
5,370,902 UART: [update-reset Success] --
5,371,759 UART: [state] Locking Datavault
5,372,583 UART: [state] Locking PCR0, PCR1 and PCR31
5,373,187 UART: [state] Locking ICCM
5,373,743 UART: [exit] Launching FMC @ 0x40000130
5,379,072 UART:
5,379,088 UART: Running Caliptra FMC ...
5,379,496 UART:
5,379,550 UART: [state] CFI Enabled
5,468,137 UART: [art] Extend RT PCRs Done
5,468,565 UART: [art] Lock RT PCRs Done
5,469,808 UART: [art] Populate DV Done
5,477,959 UART: [fht] FMC Alias Private Key: 7
5,478,895 UART: [art] Derive CDI
5,479,175 UART: [art] Store in in slot 0x4
5,564,956 UART: [art] Derive Key Pair
5,565,316 UART: [art] Store priv key in slot 0x5
5,578,156 UART: [art] Derive Key Pair - Done
5,593,106 UART: [art] Signing Cert with AUTHO
5,593,586 UART: RITY.KEYID = 7
5,608,664 UART: [art] Erasing AUTHORITY.KEYID = 7
5,609,429 UART: [art] PUB.X = D0BBE517AD64EA29DE2425928CEF9A3CED3240280244CD0C784D622F456946F04DDB47DB5F9B1A0EE703FE067EDD20D9
5,616,200 UART: [art] PUB.Y = 21951EBF4456CC6CF73C77E2D2A2BDC942CD587685D91C363D356F7D5CE911D0A5497A069CB3A2107B7E8B1F79980E63
5,623,150 UART: [art] SIG.R = 1AF94D574E1A2AC21E2DCCB27B7C99133846A30754F446E91B15640AE689A4F758993576900D79C2F0BD3473D73EA753
5,629,909 UART: [art] SIG.S = 8D72CFCE64B4F63A12695620DA7D4170092F486E71316FFF2F443A255E0E9B7122269FE54D5CC7D9604D5049A9470394
5,653,631 UART: Caliptra RT
5,653,884 UART: [state] CFI Enabled
5,935,224 UART: [rt] RT failed reset flow
5,935,655 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,996 ready_for_fw is high
1,055,996 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,157,847 >>> mbox cmd response: success
2,157,847 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,219,769 UART:
2,219,785 UART: Running Caliptra FMC ...
2,220,193 UART:
2,220,247 UART: [state] CFI Enabled
2,230,882 UART: [fht] FMC Alias Private Key: 7
2,338,741 UART: [art] Extend RT PCRs Done
2,339,169 UART: [art] Lock RT PCRs Done
2,340,647 UART: [art] Populate DV Done
2,348,914 UART: [fht] FMC Alias Private Key: 7
2,349,978 UART: [art] Derive CDI
2,350,258 UART: [art] Store in in slot 0x4
2,435,823 UART: [art] Derive Key Pair
2,436,183 UART: [art] Store priv key in slot 0x5
2,449,389 UART: [art] Derive Key Pair - Done
2,463,912 UART: [art] Signing Cert with AUTHO
2,464,392 UART: RITY.KEYID = 7
2,479,534 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,299 UART: [art] PUB.X = 17FBA204994322A4D795BF9D5995B7F28E61FC8D55909DF8A7A2ADACCABBEE5FB61461F3E6F8E42582541C105F65D693
2,487,078 UART: [art] PUB.Y = 577093F6723A21CA0CC74A6AB96E269B820B98C5C160E6F62CB221F230D656FB72D1438E89D7B29BE886D6D331A1F366
2,494,024 UART: [art] SIG.R = 46A2279CA8D198B81F967AA4B477755996C5897ACAF7744A9F0A901D7D1F8C7F73C09DA57ED343D4D06F4427ACF8D8B1
2,500,799 UART: [art] SIG.S = EA871ADABD369DE76227F110FD3E0B2EEA0C3A78CA42C639C36CFE7FD6A328B51810AB64D2D6CD07BAEC87743D505EC9
2,524,471 UART: mbox::rt_entry...
2,524,843 UART: ____ _ _ _ ____ _____
2,525,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,731 UART: |_|
2,529,043 UART:
2,635,457 UART: [rt] Runtime listening for mailbox commands...
2,636,391 >>> mbox cmd response data (0 bytes)
2,636,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,066,735 >>> mbox cmd response: success
5,080,279 UART:
5,080,295 UART: Running Caliptra FMC ...
5,080,703 UART:
5,080,757 UART: [state] CFI Enabled
5,169,494 UART: [art] Extend RT PCRs Done
5,169,922 UART: [art] Lock RT PCRs Done
5,171,151 UART: [art] Populate DV Done
5,179,096 UART: [fht] FMC Alias Private Key: 7
5,180,188 UART: [art] Derive CDI
5,180,468 UART: [art] Store in in slot 0x4
5,266,583 UART: [art] Derive Key Pair
5,266,943 UART: [art] Store priv key in slot 0x5
5,279,827 UART: [art] Derive Key Pair - Done
5,294,657 UART: [art] Signing Cert with AUTHO
5,295,137 UART: RITY.KEYID = 7
5,310,269 UART: [art] Erasing AUTHORITY.KEYID = 7
5,311,034 UART: [art] PUB.X = 571B9976D5A38467531BCDD20AACD6743D6A43DA76C78EB9B98DC0713A9778B4E3CE843100F8CC40D56383BE83513FC3
5,317,785 UART: [art] PUB.Y = BFED8AE1DABBDB281ECE06742906E720400BAAFCBFDBC0A004C733B240E5748342C4581F67A87888F449436417572D1A
5,324,733 UART: [art] SIG.R = A19FF2D6153D82A0FA9D93E334682B8D672F40A2A56DB633EE95E1F8FD24F99CDBE01E7E0E612B017396760A752B69F7
5,331,502 UART: [art] SIG.S = 4A1ED560899682B282F1EB3B5FA119D16066FE7BFDBD04C26C64151877DB4054251F987473AA2793756B71DE8D67B2FD
5,355,434 UART: Caliptra RT
5,355,687 UART: [state] CFI Enabled
5,639,949 UART: [rt] RT failed reset flow
5,640,380 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,951 UART: [state] LifecycleState = Unprovisioned
85,606 UART: [state] DebugLocked = No
86,096 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,196 UART: [fht] FHT @ 0x50003400
1,172,768 UART: [idev] ++
1,172,936 UART: [idev] CDI.KEYID = 6
1,173,297 UART: [idev] SUBJECT.KEYID = 7
1,173,722 UART: [idev] UDS.KEYID = 0
1,174,068 ready_for_fw is high
1,174,068 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,944 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,216,007 UART: [ldev] Erasing FE.KEYID = 1
1,242,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,567 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,550 UART: [fwproc] Recv command 0x46574c44
1,283,283 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,092 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,132 >>> mbox cmd response: success
2,309,132 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,310,251 UART: [afmc] ++
2,310,419 UART: [afmc] CDI.KEYID = 6
2,310,782 UART: [afmc] SUBJECT.KEYID = 7
2,311,208 UART: [afmc] AUTHORITY.KEYID = 5
2,346,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,380 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,099 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,892 UART: [afmc] --
2,389,944 UART: [cold-reset] --
2,391,028 UART: [state] Locking Datavault
2,392,199 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,803 UART: [state] Locking ICCM
2,393,443 UART: [exit] Launching FMC @ 0x40000130
2,398,772 UART:
2,398,788 UART: Running Caliptra FMC ...
2,399,196 UART:
2,399,339 UART: [state] CFI Enabled
2,409,796 UART: [fht] FMC Alias Private Key: 7
2,518,009 UART: [art] Extend RT PCRs Done
2,518,437 UART: [art] Lock RT PCRs Done
2,520,129 UART: [art] Populate DV Done
2,528,402 UART: [fht] FMC Alias Private Key: 7
2,529,542 UART: [art] Derive CDI
2,529,822 UART: [art] Store in in slot 0x4
2,615,333 UART: [art] Derive Key Pair
2,615,693 UART: [art] Store priv key in slot 0x5
2,629,577 UART: [art] Derive Key Pair - Done
2,644,667 UART: [art] Signing Cert with AUTHO
2,645,147 UART: RITY.KEYID = 7
2,660,253 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,018 UART: [art] PUB.X = 1A0B59FEB5CF2142F0D91843CF2A25F9BE8DEFBA4BAF4CE195A390BD521084B08A01B84F8CC3D4D2E552E37B4FC01255
2,667,802 UART: [art] PUB.Y = C74AFCF7F00CC435DE606C177D709ECDA71CFFBE76A9218F20C1EF4DF519B503D7E55F22E8E46BD0E5BB4807AA1D4AD4
2,674,769 UART: [art] SIG.R = C61213B014D006CBAF9AFF6F4799A4BE3A2224836EDA325C66EA6E4B1DE42B894EA912EEF3E9B3F82D98F2362E0AA3D6
2,681,551 UART: [art] SIG.S = 6E2D45FB0EA8792D2F595EF2D691CE9318A56B12C3F19CEC3844901ACF70B8274991DCD4AEE928EC6E80E36A02C30399
2,705,779 UART: mbox::rt_entry...
2,706,151 UART: ____ _ _ _ ____ _____
2,706,935 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,735 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,503 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,271 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,039 UART: |_|
2,710,351 UART:
2,816,191 UART: [rt] Runtime listening for mailbox commands...
2,817,125 >>> mbox cmd response data (0 bytes)
2,817,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,817,237 UART:
2,817,253 UART: Running Caliptra ROM ...
2,817,661 UART:
2,817,803 UART: [state] CFI Enabled
2,820,539 UART: [state] LifecycleState = Unprovisioned
2,821,194 UART: [state] DebugLocked = No
2,821,792 UART: [state] WD Timer not started. Device not locked for debugging
2,822,982 UART: [kat] SHA2-256
3,626,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,661 UART: [kat] ++
3,630,813 UART: [kat] sha1
3,635,087 UART: [kat] SHA2-256
3,637,027 UART: [kat] SHA2-384
3,639,734 UART: [kat] SHA2-512-ACC
3,641,634 UART: [kat] ECC-384
3,651,745 UART: [kat] HMAC-384Kdf
3,656,519 UART: [kat] LMS
3,904,831 UART: [kat] --
3,905,809 UART: [update-reset] ++
5,215,284 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,379 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,365,831 >>> mbox cmd response: success
5,365,974 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,988 UART: [update-reset Success] --
5,375,065 UART: [state] Locking Datavault
5,375,827 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,431 UART: [state] Locking ICCM
5,376,993 UART: [exit] Launching FMC @ 0x40000130
5,382,322 UART:
5,382,338 UART: Running Caliptra FMC ...
5,382,746 UART:
5,382,889 UART: [state] CFI Enabled
5,472,310 UART: [art] Extend RT PCRs Done
5,472,738 UART: [art] Lock RT PCRs Done
5,474,003 UART: [art] Populate DV Done
5,482,192 UART: [fht] FMC Alias Private Key: 7
5,483,154 UART: [art] Derive CDI
5,483,434 UART: [art] Store in in slot 0x4
5,568,987 UART: [art] Derive Key Pair
5,569,347 UART: [art] Store priv key in slot 0x5
5,582,377 UART: [art] Derive Key Pair - Done
5,597,723 UART: [art] Signing Cert with AUTHO
5,598,203 UART: RITY.KEYID = 7
5,613,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,324 UART: [art] PUB.X = 5E6E13ABDD55319790FA83391A6C10DF1088182939934EA19D078264E47DD693D4F9417C629374C4907462C604D29C8B
5,621,078 UART: [art] PUB.Y = 51A0F4F7A2239E3CEC62E5B5B96714FCD369A1915D838F84436F0F478669D9DD80FBA819537899F6F83B96E66B51CCDD
5,628,031 UART: [art] SIG.R = E9DDC976FA587E94368D99C207A024C0787E55A2C59F7C28A8A37DE0CF67C2321DD3BD2F6B8FAEA286EB3650DB1D777C
5,634,814 UART: [art] SIG.S = 7D0D07F9C7C4EE62F58F8D35CB822F5F78CFAFD82D209D8368648784020B6E2E0F83E36E1C1875C9E285F0B47B81297B
5,658,788 UART: Caliptra RT
5,659,133 UART: [state] CFI Enabled
5,943,491 UART: [rt] RT failed reset flow
5,943,922 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,771 ready_for_fw is high
1,056,771 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,362 >>> mbox cmd response: success
2,158,362 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,220,856 UART:
2,220,872 UART: Running Caliptra FMC ...
2,221,280 UART:
2,221,423 UART: [state] CFI Enabled
2,232,278 UART: [fht] FMC Alias Private Key: 7
2,340,673 UART: [art] Extend RT PCRs Done
2,341,101 UART: [art] Lock RT PCRs Done
2,342,745 UART: [art] Populate DV Done
2,350,976 UART: [fht] FMC Alias Private Key: 7
2,351,914 UART: [art] Derive CDI
2,352,194 UART: [art] Store in in slot 0x4
2,437,777 UART: [art] Derive Key Pair
2,438,137 UART: [art] Store priv key in slot 0x5
2,451,663 UART: [art] Derive Key Pair - Done
2,466,340 UART: [art] Signing Cert with AUTHO
2,466,820 UART: RITY.KEYID = 7
2,482,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,913 UART: [art] PUB.X = 4B74B3FD5019D2293A6E254F654DFC121535F428CF72DB21891091E5AC734CAC4CB282ABDCCA21EDAD5B4C34F465929C
2,489,697 UART: [art] PUB.Y = 3E98E2847D06539F0BA45764FE3CA58240819CD0B0C4CF66CDE37645EB1AB46C1E64FBBEECCC95EB6DB72B99DC401FEF
2,496,665 UART: [art] SIG.R = B296DA860FD97167D0AC4FA895850D5C695B7E25A84582418AB030D506065BD649BD544AE39A050D463B235239271E8B
2,503,413 UART: [art] SIG.S = A8F26E4E06ACD840C6E6BFAD3EBAB923DBAE81F0E070A22443257378E8F2D9CB4DB74F1F6D2E5D90B078A865B3FE7036
2,526,775 UART: mbox::rt_entry...
2,527,147 UART: ____ _ _ _ ____ _____
2,527,931 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,731 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,267 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,035 UART: |_|
2,531,347 UART:
2,639,248 UART: [rt] Runtime listening for mailbox commands...
2,640,182 >>> mbox cmd response data (0 bytes)
2,640,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,070,431 >>> mbox cmd response: success
5,083,531 UART:
5,083,547 UART: Running Caliptra FMC ...
5,083,955 UART:
5,084,098 UART: [state] CFI Enabled
5,173,691 UART: [art] Extend RT PCRs Done
5,174,119 UART: [art] Lock RT PCRs Done
5,175,566 UART: [art] Populate DV Done
5,183,687 UART: [fht] FMC Alias Private Key: 7
5,184,779 UART: [art] Derive CDI
5,185,059 UART: [art] Store in in slot 0x4
5,271,038 UART: [art] Derive Key Pair
5,271,398 UART: [art] Store priv key in slot 0x5
5,284,538 UART: [art] Derive Key Pair - Done
5,299,168 UART: [art] Signing Cert with AUTHO
5,299,648 UART: RITY.KEYID = 7
5,315,406 UART: [art] Erasing AUTHORITY.KEYID = 7
5,316,171 UART: [art] PUB.X = 846D3BDB33875CC287EA5A487B7CB61EEC435518A80084FFB39ADDD29FADBA3687B2B565F0C43EF36A649AF10508395B
5,322,927 UART: [art] PUB.Y = 8C0A7B8DB28F750703445A4A3A984D6FE999754ECF0E962AE8591A89AA676A5323F77CE9073C5D5F4EF16CB7229AD9A1
5,329,870 UART: [art] SIG.R = 0E94B43388D37BF1B2DD9A892337CE746CF6A3C8662D8BB083E34CFA19F696765A5AC3CFC8C9E51BBC3C631DC7C9A6D6
5,336,655 UART: [art] SIG.S = 0335B6C0303B986DD4C00FB13BBE448D932B018B5E8AEFD29B11F8856FE75B0AF565C7F297194A209A18C34FD9A1B652
5,360,762 UART: Caliptra RT
5,361,107 UART: [state] CFI Enabled
5,645,335 UART: [rt] RT failed reset flow
5,645,766 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,993 UART:
192,359 UART: Running Caliptra ROM ...
193,541 UART:
193,720 UART: [state] CFI Enabled
266,346 UART: [state] LifecycleState = Unprovisioned
268,269 UART: [state] DebugLocked = No
269,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,929 UART: [kat] SHA2-256
443,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,148 UART: [kat] ++
454,595 UART: [kat] sha1
465,749 UART: [kat] SHA2-256
468,404 UART: [kat] SHA2-384
473,543 UART: [kat] SHA2-512-ACC
475,909 UART: [kat] ECC-384
2,769,452 UART: [kat] HMAC-384Kdf
2,800,510 UART: [kat] LMS
3,990,794 UART: [kat] --
3,995,730 UART: [cold-reset] ++
3,996,973 UART: [fht] Storing FHT @ 0x50003400
4,008,808 UART: [idev] ++
4,009,384 UART: [idev] CDI.KEYID = 6
4,010,422 UART: [idev] SUBJECT.KEYID = 7
4,011,600 UART: [idev] UDS.KEYID = 0
4,012,596 ready_for_fw is high
4,012,789 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,111,996 UART: [idev] Erasing UDS.KEYID = 0
7,346,959 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,917 UART: [idev] --
7,372,906 UART: [ldev] ++
7,373,473 UART: [ldev] CDI.KEYID = 6
7,374,440 UART: [ldev] SUBJECT.KEYID = 5
7,375,650 UART: [ldev] AUTHORITY.KEYID = 7
7,376,878 UART: [ldev] FE.KEYID = 1
7,423,687 UART: [ldev] Erasing FE.KEYID = 1
10,755,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,663 UART: [ldev] --
13,120,087 UART: [fwproc] Waiting for Commands...
13,121,855 UART: [fwproc] Received command 0x46574c44
13,124,043 UART: [fwproc] Received Image of size 78492 bytes
16,751,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,826,980 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,895,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,088,912 >>> mbox cmd response: success
17,089,386 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,093,203 UART: [afmc] ++
17,093,795 UART: [afmc] CDI.KEYID = 6
17,094,729 UART: [afmc] SUBJECT.KEYID = 7
17,095,954 UART: [afmc] AUTHORITY.KEYID = 5
20,451,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,755,369 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,769,783 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,784,610 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,058 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,819,873 UART: [afmc] --
22,823,631 UART: [cold-reset] --
22,828,788 UART: [state] Locking Datavault
22,834,469 UART: [state] Locking PCR0, PCR1 and PCR31
22,836,266 UART: [state] Locking ICCM
22,837,938 UART: [exit] Launching FMC @ 0x40000130
22,846,335 UART:
22,846,571 UART: Running Caliptra FMC ...
22,847,688 UART:
22,847,847 UART: [state] CFI Enabled
22,914,494 UART: [fht] FMC Alias Private Key: 7
25,252,728 UART: [art] Extend RT PCRs Done
25,253,943 UART: [art] Lock RT PCRs Done
25,255,375 UART: [art] Populate DV Done
25,260,693 UART: [fht] FMC Alias Private Key: 7
25,262,223 UART: [art] Derive CDI
25,263,036 UART: [art] Store in in slot 0x4
25,322,769 UART: [art] Derive Key Pair
25,323,801 UART: [art] Store priv key in slot 0x5
28,616,786 UART: [art] Derive Key Pair - Done
28,630,051 UART: [art] Signing Cert with AUTHO
28,631,363 UART: RITY.KEYID = 7
30,918,392 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,897 UART: [art] PUB.X = 755C35BD77E01B1D736CD82B0C71B8103EFB0B7B22BAEDF3199258A575B4106A2F29BE4C6FF4E02E296284B479D3A167
30,927,155 UART: [art] PUB.Y = 16E89059EF0A3B14B44D8905D41E3ADCB243CA0AE5D8D28BB22AE62AC7B5A275AE011AF51907984071C9763EA55BC948
30,934,387 UART: [art] SIG.R = E500ED22DE76BAB348C3D06FC6A97692818187F08D0754C8081A8669D75336D201B190B1CB3A46C2C5A3745D3C1D7D3C
30,941,777 UART: [art] SIG.S = 0BE95993A4316EFEAE2AD58638E46F084B6C13285691D247502F6A9006B86AC3D7312C4F50E57F2D426EAADBCB500799
32,246,224 UART: mbox::rt_entry...
32,247,194 UART: ____ _ _ _ ____ _____
32,249,182 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,199 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,933 UART: |_|
32,257,736 UART:
32,371,806 UART: [rt] Runtime listening for mailbox commands...
32,374,044 >>> mbox cmd response data (0 bytes)
34,432,773 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,576,688 UART:
34,577,053 UART: Running Caliptra ROM ...
34,578,198 UART:
34,578,367 UART: [state] CFI Enabled
34,652,474 UART: [state] LifecycleState = Unprovisioned
34,654,450 UART: [state] DebugLocked = No
34,656,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,660,383 UART: [kat] SHA2-256
34,830,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,840,606 UART: [kat] ++
34,841,152 UART: [kat] sha1
34,851,402 UART: [kat] SHA2-256
34,854,063 UART: [kat] SHA2-384
34,860,219 UART: [kat] SHA2-512-ACC
34,862,619 UART: [kat] ECC-384
37,156,695 UART: [kat] HMAC-384Kdf
37,167,953 UART: [kat] LMS
38,358,248 UART: [kat] --
38,361,162 UART: [update-reset] ++
42,495,523 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,499,149 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,880,158 >>> mbox cmd response: success
42,884,811 UART: [update-reset] Copying MAN_2 To MAN_1
42,903,079 UART: [update-reset Success] --
42,908,436 UART: [state] Locking Datavault
42,910,614 UART: [state] Locking PCR0, PCR1 and PCR31
42,913,045 UART: [state] Locking ICCM
42,914,222 UART: [exit] Launching FMC @ 0x40000130
42,922,625 UART:
42,922,861 UART: Running Caliptra FMC ...
42,923,964 UART:
42,924,123 UART: [state] CFI Enabled
43,024,070 UART: [art] Extend RT PCRs Done
43,025,272 UART: [art] Lock RT PCRs Done
43,026,732 UART: [art] Populate DV Done
43,032,203 UART: [fht] FMC Alias Private Key: 7
43,033,803 UART: [art] Derive CDI
43,034,623 UART: [art] Store in in slot 0x4
43,093,169 UART: [art] Derive Key Pair
43,094,217 UART: [art] Store priv key in slot 0x5
46,387,162 UART: [art] Derive Key Pair - Done
46,400,065 UART: [art] Signing Cert with AUTHO
46,401,368 UART: RITY.KEYID = 7
48,689,018 UART: [art] Erasing AUTHORITY.KEYID = 7
48,690,531 UART: [art] PUB.X = CBFD7B63C4D47265E2B7276D3AD487A0C30657CE113F311E489D2F430A73B267220D20A14D87CB0F24FC7495A2C18DCD
48,697,793 UART: [art] PUB.Y = CEDAA5B1138199D4758D5203BD1FC09FE449F3313DF4B3893FF9CB37EC3DD5983A1E5BCE8E7B442DE9DED13165B616AA
48,705,084 UART: [art] SIG.R = 5D19776333110DF5A916B4307CB0D2F9141CCE6864A1D60F7C18CFCB5AF33267CBBCB5A60A7A09A8F2D052D2AAD00603
48,712,420 UART: [art] SIG.S = 27A5760737F7D1DBB3106EA92749664B467FB5D0CB9076562FDB1C6F96338E10795642856B5F68E7FC21BD84A57C5C60
50,017,658 UART: Caliptra RT
50,018,374 UART: [state] CFI Enabled
50,349,622 UART: [rt] RT failed reset flow
50,350,820 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,806,510 ready_for_fw is high
3,806,915 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,157,037 >>> mbox cmd response: success
17,157,577 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,839,681 UART:
22,840,076 UART: Running Caliptra FMC ...
22,841,214 UART:
22,841,375 UART: [state] CFI Enabled
22,911,551 UART: [fht] FMC Alias Private Key: 7
25,248,233 UART: [art] Extend RT PCRs Done
25,249,464 UART: [art] Lock RT PCRs Done
25,251,256 UART: [art] Populate DV Done
25,256,675 UART: [fht] FMC Alias Private Key: 7
25,258,278 UART: [art] Derive CDI
25,259,100 UART: [art] Store in in slot 0x4
25,319,572 UART: [art] Derive Key Pair
25,320,575 UART: [art] Store priv key in slot 0x5
28,613,336 UART: [art] Derive Key Pair - Done
28,626,258 UART: [art] Signing Cert with AUTHO
28,627,566 UART: RITY.KEYID = 7
30,914,465 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,982 UART: [art] PUB.X = E11FE84E903B21BC7C30A145A69BF2F742FECE3CADFEAEF814EC8E8D05A30B98ECD0CBF04A7AD442A22218E1D9EE96D1
30,923,243 UART: [art] PUB.Y = 70F4D28EB60EA0827CEF14C9B0CB3FF8C4545E23E6D51C48F1FA3F08EC247E19CC0429D4852DBD23AFBE60D81CFAB87C
30,930,538 UART: [art] SIG.R = F1251DDEF14588E83817A6AE5B90327D1C02F95DA606DB1C7E0C69FD4AF5BF73438FBD005010744CB717D4162C8B7F48
30,937,899 UART: [art] SIG.S = 6EBB9FE37AB6CA1B128E44550C8D88AE99ED371080AC6239837AB8E4D618270D4BC9DCF61A44EF676F065BF9960F4638
32,241,909 UART: mbox::rt_entry...
32,242,889 UART: ____ _ _ _ ____ _____
32,244,798 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,246,816 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,248,752 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,250,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,252,662 UART: |_|
32,253,479 UART:
32,367,425 UART: [rt] Runtime listening for mailbox commands...
32,369,679 >>> mbox cmd response data (0 bytes)
34,421,603 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,118,467 >>> mbox cmd response: success
43,152,617 UART:
43,152,937 UART: Running Caliptra FMC ...
43,154,058 UART:
43,154,234 UART: [state] CFI Enabled
43,249,147 UART: [art] Extend RT PCRs Done
43,250,351 UART: [art] Lock RT PCRs Done
43,251,650 UART: [art] Populate DV Done
43,257,285 UART: [fht] FMC Alias Private Key: 7
43,258,768 UART: [art] Derive CDI
43,259,561 UART: [art] Store in in slot 0x4
43,317,910 UART: [art] Derive Key Pair
43,318,912 UART: [art] Store priv key in slot 0x5
46,611,082 UART: [art] Derive Key Pair - Done
46,623,880 UART: [art] Signing Cert with AUTHO
46,625,195 UART: RITY.KEYID = 7
48,912,683 UART: [art] Erasing AUTHORITY.KEYID = 7
48,914,189 UART: [art] PUB.X = 0551877FF56F2D0F70A1393A3EEC654C19E5AC78E5B93601CC086400FED26E1110B70D85AC742A61836E8194489400D8
48,921,405 UART: [art] PUB.Y = 20B9981D0357184DE4049CDE2D7936FBC9905043FD2CFA30238219BC8DCC5FD9D7FAE929B5D979DD862C4CCA509BB55D
48,928,700 UART: [art] SIG.R = 53E7BA279A47F0C163C63A3AFBBD9D52AB3DC9A213D3D916D6496AAE6665032672CB5C629D69C85F2B89465D543424B3
48,936,113 UART: [art] SIG.S = ACACED99D279A63A6A48BBFEF0D6B8CD2EA062B4861F6950080619C343123382EBAC02D312A60765E20E77319042A412
50,241,090 UART: Caliptra RT
50,241,824 UART: [state] CFI Enabled
50,571,829 UART: [rt] RT failed reset flow
50,573,031 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,754 writing to cptra_bootfsm_go
192,993 UART:
193,374 UART: Running Caliptra ROM ...
194,498 UART:
604,153 UART: [state] CFI Enabled
617,955 UART: [state] LifecycleState = Unprovisioned
619,896 UART: [state] DebugLocked = No
622,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,869 UART: [kat] SHA2-256
796,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,123 UART: [kat] ++
807,642 UART: [kat] sha1
818,103 UART: [kat] SHA2-256
820,791 UART: [kat] SHA2-384
826,358 UART: [kat] SHA2-512-ACC
828,729 UART: [kat] ECC-384
3,110,319 UART: [kat] HMAC-384Kdf
3,122,518 UART: [kat] LMS
4,312,620 UART: [kat] --
4,316,208 UART: [cold-reset] ++
4,317,573 UART: [fht] Storing FHT @ 0x50003400
4,329,043 UART: [idev] ++
4,329,612 UART: [idev] CDI.KEYID = 6
4,330,552 UART: [idev] SUBJECT.KEYID = 7
4,331,796 UART: [idev] UDS.KEYID = 0
4,332,892 ready_for_fw is high
4,333,113 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,431,983 UART: [idev] Erasing UDS.KEYID = 0
7,617,801 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,751 UART: [idev] --
7,643,877 UART: [ldev] ++
7,644,445 UART: [ldev] CDI.KEYID = 6
7,645,415 UART: [ldev] SUBJECT.KEYID = 5
7,646,623 UART: [ldev] AUTHORITY.KEYID = 7
7,647,898 UART: [ldev] FE.KEYID = 1
7,657,675 UART: [ldev] Erasing FE.KEYID = 1
10,946,733 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,814 UART: [ldev] --
13,306,056 UART: [fwproc] Waiting for Commands...
13,308,749 UART: [fwproc] Received command 0x46574c44
13,310,982 UART: [fwproc] Received Image of size 78492 bytes
16,925,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,003,347 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,072,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,264,915 >>> mbox cmd response: success
17,265,406 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,268,788 UART: [afmc] ++
17,269,382 UART: [afmc] CDI.KEYID = 6
17,270,315 UART: [afmc] SUBJECT.KEYID = 7
17,271,579 UART: [afmc] AUTHORITY.KEYID = 5
20,585,637 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,880,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,883,184 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,897,553 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,912,386 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,926,819 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,948,459 UART: [afmc] --
22,951,723 UART: [cold-reset] --
22,955,692 UART: [state] Locking Datavault
22,961,910 UART: [state] Locking PCR0, PCR1 and PCR31
22,963,667 UART: [state] Locking ICCM
22,965,164 UART: [exit] Launching FMC @ 0x40000130
22,973,550 UART:
22,973,788 UART: Running Caliptra FMC ...
22,974,885 UART:
22,975,039 UART: [state] CFI Enabled
22,983,139 UART: [fht] FMC Alias Private Key: 7
25,313,880 UART: [art] Extend RT PCRs Done
25,315,103 UART: [art] Lock RT PCRs Done
25,316,996 UART: [art] Populate DV Done
25,322,461 UART: [fht] FMC Alias Private Key: 7
25,324,165 UART: [art] Derive CDI
25,324,976 UART: [art] Store in in slot 0x4
25,367,732 UART: [art] Derive Key Pair
25,368,726 UART: [art] Store priv key in slot 0x5
28,610,774 UART: [art] Derive Key Pair - Done
28,623,609 UART: [art] Signing Cert with AUTHO
28,624,902 UART: RITY.KEYID = 7
30,904,005 UART: [art] Erasing AUTHORITY.KEYID = 7
30,905,518 UART: [art] PUB.X = 179D6463EBAF610F224149B1585D5325064E57700DA7E4C54085603D787AC7F3958511B447C8E6988355706D1F853C29
30,912,736 UART: [art] PUB.Y = 094A12CA8D5155F8EB919CDEE5522FBEBC5C4E86E286AA9654F3E821FD6F5D9CA30A764EB698596CAA38F09A35346388
30,919,937 UART: [art] SIG.R = C50CA192E939A459286D7C37059791A7A4E9413BDABB2DE7CC5483EFB6770872465810C52B726265D1D7DE6E376F41DA
30,927,350 UART: [art] SIG.S = 68AA5B6B1A530D5F852F0ACDC57510037FD35337CF77F006660B967F4CF98A75FAB5E261612BD04E1252CE6ED59FB9B9
32,232,179 UART: mbox::rt_entry...
32,233,121 UART: ____ _ _ _ ____ _____
32,235,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,237,045 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,238,903 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,240,821 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,242,671 UART: |_|
32,243,544 UART:
32,357,438 UART: [rt] Runtime listening for mailbox commands...
32,359,649 >>> mbox cmd response data (0 bytes)
34,413,940 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,557,853 UART:
34,558,226 UART: Running Caliptra ROM ...
34,559,275 UART:
34,559,479 UART: [state] CFI Enabled
34,571,592 UART: [state] LifecycleState = Unprovisioned
34,573,545 UART: [state] DebugLocked = No
34,575,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,579,946 UART: [kat] SHA2-256
34,749,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,760,208 UART: [kat] ++
34,760,694 UART: [kat] sha1
34,772,172 UART: [kat] SHA2-256
34,774,859 UART: [kat] SHA2-384
34,781,652 UART: [kat] SHA2-512-ACC
34,784,004 UART: [kat] ECC-384
37,066,935 UART: [kat] HMAC-384Kdf
37,078,791 UART: [kat] LMS
38,268,867 UART: [kat] --
38,274,178 UART: [update-reset] ++
42,406,936 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,410,775 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,791,808 >>> mbox cmd response: success
42,796,406 UART: [update-reset] Copying MAN_2 To MAN_1
42,815,085 UART: [update-reset Success] --
42,819,636 UART: [state] Locking Datavault
42,822,908 UART: [state] Locking PCR0, PCR1 and PCR31
42,824,659 UART: [state] Locking ICCM
42,826,403 UART: [exit] Launching FMC @ 0x40000130
42,834,866 UART:
42,835,109 UART: Running Caliptra FMC ...
42,836,206 UART:
42,836,358 UART: [state] CFI Enabled
42,880,797 UART: [art] Extend RT PCRs Done
42,881,937 UART: [art] Lock RT PCRs Done
42,883,435 UART: [art] Populate DV Done
42,888,889 UART: [fht] FMC Alias Private Key: 7
42,890,421 UART: [art] Derive CDI
42,891,229 UART: [art] Store in in slot 0x4
42,933,972 UART: [art] Derive Key Pair
42,935,015 UART: [art] Store priv key in slot 0x5
46,177,386 UART: [art] Derive Key Pair - Done
46,190,067 UART: [art] Signing Cert with AUTHO
46,191,381 UART: RITY.KEYID = 7
48,470,778 UART: [art] Erasing AUTHORITY.KEYID = 7
48,472,283 UART: [art] PUB.X = 5912E3EC212DA451148A1A2D3DAC16B2871074882322F0BF2FA0060E1F1FDE2A4249A4C9911277A503AB4CFF7D8548F5
48,479,553 UART: [art] PUB.Y = CE55651C8E28F1046D383C043846E475E99D754CA3567FBA94B89FC513E1C7FCE09BF6C89F19D8869233B577C5CFE0C3
48,486,804 UART: [art] SIG.R = 30EBC50A9A7D4255D7F84AA5E2181AE87E1FEDFA845F3182D36F255131F3FE3BAFF880AE8C88F38561270B3735C0E797
48,494,171 UART: [art] SIG.S = 1D90CDA9EF8A65132110DE73E25232DA9907DC54CAE9C960E21259A94B8991C49884BFBD80CD1F8A8E184D69D3EABEC4
49,799,431 UART: Caliptra RT
49,800,137 UART: [state] CFI Enabled
50,087,489 UART: [rt] RT failed reset flow
50,088,695 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,670 writing to cptra_bootfsm_go
4,130,005 ready_for_fw is high
4,130,400 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,352,021 >>> mbox cmd response: success
17,352,634 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,992,535 UART:
22,992,910 UART: Running Caliptra FMC ...
22,994,036 UART:
22,994,196 UART: [state] CFI Enabled
23,002,177 UART: [fht] FMC Alias Private Key: 7
25,332,826 UART: [art] Extend RT PCRs Done
25,334,053 UART: [art] Lock RT PCRs Done
25,336,060 UART: [art] Populate DV Done
25,341,526 UART: [fht] FMC Alias Private Key: 7
25,343,229 UART: [art] Derive CDI
25,344,042 UART: [art] Store in in slot 0x4
25,386,828 UART: [art] Derive Key Pair
25,387,865 UART: [art] Store priv key in slot 0x5
28,630,089 UART: [art] Derive Key Pair - Done
28,642,931 UART: [art] Signing Cert with AUTHO
28,644,227 UART: RITY.KEYID = 7
30,923,594 UART: [art] Erasing AUTHORITY.KEYID = 7
30,925,096 UART: [art] PUB.X = 22926E2A81960DD36D073246C5426F42368282668F4B2090290F0E77C1FA2898EEF1DA50A34FC2210E037749F8B956DE
30,932,347 UART: [art] PUB.Y = 4209B688014280B3FC2023BDEABBAD56D095DE57D2FEB3DAF1A383E328000F3449BB9AB2FD868D13A2FA2C6F95DACA67
30,939,622 UART: [art] SIG.R = 2316469B589CE8B48704FC0570871422562A84169B8BB8D116B0A90B16F8982255EDAC37287F720D6F342396C531E802
30,946,948 UART: [art] SIG.S = D536B206DB8F47FC59D3691B1A805D00AAC175CF73A3CE74BBB8893C19C7633A2B62CBBE46F1861CAF4A34EB555F071B
32,251,860 UART: mbox::rt_entry...
32,252,827 UART: ____ _ _ _ ____ _____
32,254,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,256,810 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,258,741 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,260,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,262,573 UART: |_|
32,263,588 UART:
32,376,819 UART: [rt] Runtime listening for mailbox commands...
32,378,995 >>> mbox cmd response data (0 bytes)
34,432,224 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,075,927 >>> mbox cmd response: success
43,109,846 UART:
43,110,151 UART: Running Caliptra FMC ...
43,111,273 UART:
43,111,438 UART: [state] CFI Enabled
43,155,462 UART: [art] Extend RT PCRs Done
43,156,651 UART: [art] Lock RT PCRs Done
43,158,129 UART: [art] Populate DV Done
43,163,810 UART: [fht] FMC Alias Private Key: 7
43,165,503 UART: [art] Derive CDI
43,166,313 UART: [art] Store in in slot 0x4
43,209,173 UART: [art] Derive Key Pair
43,210,164 UART: [art] Store priv key in slot 0x5
46,452,149 UART: [art] Derive Key Pair - Done
46,464,833 UART: [art] Signing Cert with AUTHO
46,466,139 UART: RITY.KEYID = 7
48,745,250 UART: [art] Erasing AUTHORITY.KEYID = 7
48,746,767 UART: [art] PUB.X = 97BF13ED44366C16DA468E12D357163CCB86ACFEDDD16486AB3E5009966AF71B334422ED6006EB5AB4917C99AF8D6935
48,754,009 UART: [art] PUB.Y = 5E0772A908645A829C7A2DAE8D9B32FF79B43C440F6B1C004977DF75B64CCEE86B9F00CA0D439FCEBF7AFEA39A78A38A
48,761,244 UART: [art] SIG.R = 220223E3164030F05F0FC98E767CA9950C7EA7D65642F7A1D256B13EF86FA99535266063ECFA19FC47A92486D44E5C12
48,768,625 UART: [art] SIG.S = 9085199BD8407511D270DBAA346B5B28AAD4BCD313B8A1B5BDE12834C99856A3CD0954F91323640235EAE17BAB2EA083
50,073,811 UART: Caliptra RT
50,074,515 UART: [state] CFI Enabled
50,361,554 UART: [rt] RT failed reset flow
50,362,743 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,491 writing to cptra_bootfsm_go
192,692 UART:
193,053 UART: Running Caliptra ROM ...
194,253 UART:
194,410 UART: [state] CFI Enabled
263,137 UART: [state] LifecycleState = Unprovisioned
265,048 UART: [state] DebugLocked = No
267,081 UART: [state] WD Timer not started. Device not locked for debugging
270,339 UART: [kat] SHA2-256
449,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,008 UART: [kat] ++
461,545 UART: [kat] sha1
471,527 UART: [kat] SHA2-256
474,580 UART: [kat] SHA2-384
481,425 UART: [kat] SHA2-512-ACC
484,435 UART: [kat] ECC-384
2,947,774 UART: [kat] HMAC-384Kdf
2,971,340 UART: [kat] LMS
3,500,751 UART: [kat] --
3,504,419 UART: [cold-reset] ++
3,506,112 UART: [fht] FHT @ 0x50003400
3,516,603 UART: [idev] ++
3,517,163 UART: [idev] CDI.KEYID = 6
3,518,146 UART: [idev] SUBJECT.KEYID = 7
3,519,314 UART: [idev] UDS.KEYID = 0
3,520,238 ready_for_fw is high
3,520,440 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,619,669 UART: [idev] Erasing UDS.KEYID = 0
6,029,015 UART: [idev] Sha1 KeyId Algorithm
6,053,603 UART: [idev] --
6,057,595 UART: [ldev] ++
6,058,165 UART: [ldev] CDI.KEYID = 6
6,059,075 UART: [ldev] SUBJECT.KEYID = 5
6,060,290 UART: [ldev] AUTHORITY.KEYID = 7
6,061,523 UART: [ldev] FE.KEYID = 1
6,100,070 UART: [ldev] Erasing FE.KEYID = 1
8,603,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,732 UART: [ldev] --
10,410,802 UART: [fwproc] Wait for Commands...
10,412,944 UART: [fwproc] Recv command 0x46574c44
10,415,032 UART: [fwproc] Recv'd Img size: 78456 bytes
13,376,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,447,029 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,515,826 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,707,397 >>> mbox cmd response: success
13,707,902 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,711,868 UART: [afmc] ++
13,712,475 UART: [afmc] CDI.KEYID = 6
13,713,387 UART: [afmc] SUBJECT.KEYID = 7
13,714,542 UART: [afmc] AUTHORITY.KEYID = 5
16,251,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,976,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,978,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,994,036 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,010,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,025,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,049,119 UART: [afmc] --
18,052,005 UART: [cold-reset] --
18,054,732 UART: [state] Locking Datavault
18,060,513 UART: [state] Locking PCR0, PCR1 and PCR31
18,062,210 UART: [state] Locking ICCM
18,064,181 UART: [exit] Launching FMC @ 0x40000130
18,072,571 UART:
18,072,827 UART: Running Caliptra FMC ...
18,073,859 UART:
18,074,006 UART: [state] CFI Enabled
18,135,364 UART: [fht] FMC Alias Private Key: 7
19,900,441 UART: [art] Extend RT PCRs Done
19,901,655 UART: [art] Lock RT PCRs Done
19,903,359 UART: [art] Populate DV Done
19,908,864 UART: [fht] FMC Alias Private Key: 7
19,910,464 UART: [art] Derive CDI
19,911,205 UART: [art] Store in in slot 0x4
19,968,428 UART: [art] Derive Key Pair
19,969,429 UART: [art] Store priv key in slot 0x5
22,432,517 UART: [art] Derive Key Pair - Done
22,445,036 UART: [art] Signing Cert with AUTHO
22,446,347 UART: RITY.KEYID = 7
24,158,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,160,361 UART: [art] PUB.X = D033AAF294C17992BC8D4FA549215A60CA0DEB8D3C54BE5DD4AF7EEA89B2938C09D99023806FE7E22F47F66A727FEFBA
24,167,622 UART: [art] PUB.Y = E3ABF4EC07C3B86E8FDE60250052E648C8FAE35AC19754CCC446FAF858205F1DDC629C72527029C7E4E1A306146214B6
24,174,889 UART: [art] SIG.R = F538981B6B9E82CB32B43242123ECF9E2BB28898472C54661A5BE21B06A5D97A81A71EF1CF0160CA2367419511F5BA0E
24,182,257 UART: [art] SIG.S = C25A0DE0438F24BFC2AAB18EE21595C1524317C30A73EC6C36449764A86AF73D439F5FD995BF629CE14F65C5E5984F0B
25,161,312 UART: mbox::rt_entry...
25,162,279 UART: ____ _ _ _ ____ _____
25,164,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,166,228 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,168,162 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,170,089 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,172,013 UART: |_|
25,172,846 UART:
25,286,753 UART: [rt] Runtime listening for mailbox commands...
25,288,929 >>> mbox cmd response data (0 bytes)
27,342,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,487,365 UART:
27,487,764 UART: Running Caliptra ROM ...
27,488,898 UART:
27,489,064 UART: [state] CFI Enabled
27,565,743 UART: [state] LifecycleState = Unprovisioned
27,567,636 UART: [state] DebugLocked = No
27,569,561 UART: [state] WD Timer not started. Device not locked for debugging
27,572,660 UART: [kat] SHA2-256
27,751,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,763,373 UART: [kat] ++
27,763,912 UART: [kat] sha1
27,774,342 UART: [kat] SHA2-256
27,777,414 UART: [kat] SHA2-384
27,783,443 UART: [kat] SHA2-512-ACC
27,786,377 UART: [kat] ECC-384
30,248,025 UART: [kat] HMAC-384Kdf
30,270,805 UART: [kat] LMS
30,800,281 UART: [kat] --
30,805,214 UART: [update-reset] ++
34,232,916 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,236,558 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,618,588 >>> mbox cmd response: success
34,623,278 UART: [update-reset] Copying MAN_2 To MAN_1
34,641,988 UART: [update-reset Success] --
34,646,565 UART: [state] Locking Datavault
34,649,721 UART: [state] Locking PCR0, PCR1 and PCR31
34,651,425 UART: [state] Locking ICCM
34,654,010 UART: [exit] Launching FMC @ 0x40000130
34,662,464 UART:
34,662,695 UART: Running Caliptra FMC ...
34,664,165 UART:
34,664,334 UART: [state] CFI Enabled
34,761,154 UART: [art] Extend RT PCRs Done
34,762,353 UART: [art] Lock RT PCRs Done
34,764,032 UART: [art] Populate DV Done
34,769,654 UART: [fht] FMC Alias Private Key: 7
34,771,301 UART: [art] Derive CDI
34,772,108 UART: [art] Store in in slot 0x4
34,830,230 UART: [art] Derive Key Pair
34,831,313 UART: [art] Store priv key in slot 0x5
37,294,468 UART: [art] Derive Key Pair - Done
37,307,199 UART: [art] Signing Cert with AUTHO
37,308,508 UART: RITY.KEYID = 7
39,019,811 UART: [art] Erasing AUTHORITY.KEYID = 7
39,021,318 UART: [art] PUB.X = 4BBBBC1C116D01D4F21167A95D67D7825B02F9BC64E3269A2C92CEC79BBA628E8897B58378C82F746E9C7CB1D2FD0080
39,028,581 UART: [art] PUB.Y = E58D03447626DA809B89214138241E69A573B12CE07EDA7166D6E6263F961E4321C3BA5FF54E848511BD1C524890B47A
39,035,801 UART: [art] SIG.R = D75D75EB55964AA21A0EA17C773B01A3E3480DB43B13AFD07C3CFF029A0B4BCE43A81DFB51546B964C20044D503F9B5A
39,043,219 UART: [art] SIG.S = 3F68FFF3E25FADD3B3703B633630B013D614A6D8573C0F074654331E665C24BDF449C38D7A42FFAA65AAEC7327BEC35D
40,021,855 UART: Caliptra RT
40,022,562 UART: [state] CFI Enabled
40,360,732 UART: [rt] RT failed reset flow
40,361,925 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,357,914 ready_for_fw is high
3,358,540 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,488,813 >>> mbox cmd response: success
13,489,405 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,767,809 UART:
17,768,197 UART: Running Caliptra FMC ...
17,769,320 UART:
17,769,475 UART: [state] CFI Enabled
17,836,988 UART: [fht] FMC Alias Private Key: 7
19,601,127 UART: [art] Extend RT PCRs Done
19,602,354 UART: [art] Lock RT PCRs Done
19,603,710 UART: [art] Populate DV Done
19,608,913 UART: [fht] FMC Alias Private Key: 7
19,610,664 UART: [art] Derive CDI
19,611,475 UART: [art] Store in in slot 0x4
19,669,735 UART: [art] Derive Key Pair
19,670,780 UART: [art] Store priv key in slot 0x5
22,133,994 UART: [art] Derive Key Pair - Done
22,147,116 UART: [art] Signing Cert with AUTHO
22,148,414 UART: RITY.KEYID = 7
23,859,679 UART: [art] Erasing AUTHORITY.KEYID = 7
23,861,191 UART: [art] PUB.X = EFA79216EE35A0DFD7E38D60DB852DA9152B5CD3422B6A178039E6EB0FEAF83FE5A7F66285B1C5427C839CD10957EBEF
23,868,475 UART: [art] PUB.Y = 05C92B21A0A59FB172887AC9DFDA1104938C7372567C54E9612B62FBF9CBA703FAAE1C31BB496C428E56611728863123
23,875,740 UART: [art] SIG.R = D9D1B3DAE16C910EBF47C9508B290CEB3D1885B425D7CC9BC1C9D1896363D6198BAA798E27AA1722C06E346CED6BED48
23,883,111 UART: [art] SIG.S = 66E9404B50B9ACFE28BAE2F05F0D30942B80FBA74A87D830A1752CD41DE848746CEA2DA7277E88C3E976F69221FD6042
24,861,813 UART: mbox::rt_entry...
24,862,780 UART: ____ _ _ _ ____ _____
24,864,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,866,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,868,606 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,870,566 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,872,495 UART: |_|
24,873,480 UART:
24,986,185 UART: [rt] Runtime listening for mailbox commands...
24,988,369 >>> mbox cmd response data (0 bytes)
27,041,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,176,096 >>> mbox cmd response: success
34,213,240 UART:
34,213,593 UART: Running Caliptra FMC ...
34,214,641 UART:
34,214,788 UART: [state] CFI Enabled
34,320,808 UART: [art] Extend RT PCRs Done
34,321,999 UART: [art] Lock RT PCRs Done
34,323,387 UART: [art] Populate DV Done
34,328,951 UART: [fht] FMC Alias Private Key: 7
34,330,643 UART: [art] Derive CDI
34,331,398 UART: [art] Store in in slot 0x4
34,389,625 UART: [art] Derive Key Pair
34,390,667 UART: [art] Store priv key in slot 0x5
36,853,470 UART: [art] Derive Key Pair - Done
36,866,522 UART: [art] Signing Cert with AUTHO
36,867,818 UART: RITY.KEYID = 7
38,579,430 UART: [art] Erasing AUTHORITY.KEYID = 7
38,580,921 UART: [art] PUB.X = 94F0D8A07F18C9D30059CA2B3CCF58DCFF82568625BDF5BE138129150E0F3D2F8FD50B2BF5BF40CD912067827B2A78B2
38,588,187 UART: [art] PUB.Y = DBF1EDB7FC9514657E1C7AEE3F0197C076A91335D0E1EF5F0A794C91FAE155A855F34D2F70300101174558ADA1CBE6CC
38,595,477 UART: [art] SIG.R = 18F3852E6AA1B0EC8E1C47942B6F402DB32AC180F425232157EDA6220B9DF5795142871D35968DC74608C5142D41BF3A
38,602,848 UART: [art] SIG.S = CFC79BB825C6238E1BA14ED1F4954A16C3CCB563DBE4342DD3743E108249D6414E83104EEC0E5A8010877D476740BA39
39,581,527 UART: Caliptra RT
39,582,236 UART: [state] CFI Enabled
39,913,305 UART: [rt] RT failed reset flow
39,914,509 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,958 writing to cptra_bootfsm_go
193,238 UART:
193,614 UART: Running Caliptra ROM ...
194,717 UART:
604,225 UART: [state] CFI Enabled
618,524 UART: [state] LifecycleState = Unprovisioned
620,435 UART: [state] DebugLocked = No
622,894 UART: [state] WD Timer not started. Device not locked for debugging
626,717 UART: [kat] SHA2-256
805,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,460 UART: [kat] ++
818,020 UART: [kat] sha1
827,914 UART: [kat] SHA2-256
830,920 UART: [kat] SHA2-384
837,338 UART: [kat] SHA2-512-ACC
840,283 UART: [kat] ECC-384
3,282,254 UART: [kat] HMAC-384Kdf
3,295,489 UART: [kat] LMS
3,824,943 UART: [kat] --
3,829,150 UART: [cold-reset] ++
3,830,583 UART: [fht] FHT @ 0x50003400
3,841,780 UART: [idev] ++
3,842,343 UART: [idev] CDI.KEYID = 6
3,843,226 UART: [idev] SUBJECT.KEYID = 7
3,844,469 UART: [idev] UDS.KEYID = 0
3,845,368 ready_for_fw is high
3,845,569 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,944,215 UART: [idev] Erasing UDS.KEYID = 0
6,314,881 UART: [idev] Sha1 KeyId Algorithm
6,338,590 UART: [idev] --
6,342,308 UART: [ldev] ++
6,342,879 UART: [ldev] CDI.KEYID = 6
6,343,791 UART: [ldev] SUBJECT.KEYID = 5
6,344,952 UART: [ldev] AUTHORITY.KEYID = 7
6,346,241 UART: [ldev] FE.KEYID = 1
6,358,454 UART: [ldev] Erasing FE.KEYID = 1
8,831,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,498 UART: [ldev] --
10,623,462 UART: [fwproc] Wait for Commands...
10,626,443 UART: [fwproc] Recv command 0x46574c44
10,628,550 UART: [fwproc] Recv'd Img size: 78456 bytes
13,595,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,671,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,739,955 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,931,856 >>> mbox cmd response: success
13,932,370 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,936,821 UART: [afmc] ++
13,937,406 UART: [afmc] CDI.KEYID = 6
13,938,316 UART: [afmc] SUBJECT.KEYID = 7
13,939,477 UART: [afmc] AUTHORITY.KEYID = 5
16,441,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,160,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,162,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,178,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,194,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,210,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,231,796 UART: [afmc] --
18,235,189 UART: [cold-reset] --
18,240,029 UART: [state] Locking Datavault
18,248,149 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,797 UART: [state] Locking ICCM
18,252,435 UART: [exit] Launching FMC @ 0x40000130
18,260,887 UART:
18,261,131 UART: Running Caliptra FMC ...
18,262,238 UART:
18,262,395 UART: [state] CFI Enabled
18,270,684 UART: [fht] FMC Alias Private Key: 7
20,027,447 UART: [art] Extend RT PCRs Done
20,028,667 UART: [art] Lock RT PCRs Done
20,030,535 UART: [art] Populate DV Done
20,035,840 UART: [fht] FMC Alias Private Key: 7
20,037,510 UART: [art] Derive CDI
20,038,335 UART: [art] Store in in slot 0x4
20,081,216 UART: [art] Derive Key Pair
20,082,377 UART: [art] Store priv key in slot 0x5
22,509,333 UART: [art] Derive Key Pair - Done
22,522,049 UART: [art] Signing Cert with AUTHO
22,523,355 UART: RITY.KEYID = 7
24,228,781 UART: [art] Erasing AUTHORITY.KEYID = 7
24,230,283 UART: [art] PUB.X = 2DB4DB9340E23F32A5A29766AEE944C1265803BA8A2D56255F81D57311C540EE1A9427F61EDA8903F45C5C51105C8E8C
24,237,552 UART: [art] PUB.Y = 6568C9136EDBEB592EAA5747F3839D89532721B266A1396ACFD16EA25E74C4B57CDE3248BF620E6DA262599760FDD672
24,244,812 UART: [art] SIG.R = A355638468F3F9A0643F3C293B72FF63868FCDBF7B96315D6DDF4327414032897ABE4DDB3D6CDBC4D4CB1B267C80D47A
24,252,221 UART: [art] SIG.S = 46349D0E632A6824E17AC8D37395BC36ACA8EBCA1C0A18F58A8E3E0C071E68FFA7EF13D762A3662450FE912B45E6071F
25,230,641 UART: mbox::rt_entry...
25,231,615 UART: ____ _ _ _ ____ _____
25,233,550 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,235,560 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,237,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,239,363 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,241,247 UART: |_|
25,242,134 UART:
25,355,103 UART: [rt] Runtime listening for mailbox commands...
25,357,279 >>> mbox cmd response data (0 bytes)
27,411,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,556,103 UART:
27,556,493 UART: Running Caliptra ROM ...
27,557,544 UART:
27,557,718 UART: [state] CFI Enabled
27,573,394 UART: [state] LifecycleState = Unprovisioned
27,575,340 UART: [state] DebugLocked = No
27,577,188 UART: [state] WD Timer not started. Device not locked for debugging
27,581,427 UART: [kat] SHA2-256
27,760,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,772,214 UART: [kat] ++
27,772,671 UART: [kat] sha1
27,783,555 UART: [kat] SHA2-256
27,786,629 UART: [kat] SHA2-384
27,793,212 UART: [kat] SHA2-512-ACC
27,796,156 UART: [kat] ECC-384
30,240,218 UART: [kat] HMAC-384Kdf
30,252,660 UART: [kat] LMS
30,782,159 UART: [kat] --
30,785,121 UART: [update-reset] ++
34,211,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,213,807 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,595,829 >>> mbox cmd response: success
34,600,440 UART: [update-reset] Copying MAN_2 To MAN_1
34,618,528 UART: [update-reset Success] --
34,622,968 UART: [state] Locking Datavault
34,626,829 UART: [state] Locking PCR0, PCR1 and PCR31
34,628,482 UART: [state] Locking ICCM
34,631,014 UART: [exit] Launching FMC @ 0x40000130
34,639,420 UART:
34,639,667 UART: Running Caliptra FMC ...
34,641,129 UART:
34,641,320 UART: [state] CFI Enabled
34,685,290 UART: [art] Extend RT PCRs Done
34,686,440 UART: [art] Lock RT PCRs Done
34,688,053 UART: [art] Populate DV Done
34,693,466 UART: [fht] FMC Alias Private Key: 7
34,695,076 UART: [art] Derive CDI
34,695,834 UART: [art] Store in in slot 0x4
34,738,321 UART: [art] Derive Key Pair
34,739,331 UART: [art] Store priv key in slot 0x5
37,165,795 UART: [art] Derive Key Pair - Done
37,178,952 UART: [art] Signing Cert with AUTHO
37,180,294 UART: RITY.KEYID = 7
38,885,794 UART: [art] Erasing AUTHORITY.KEYID = 7
38,887,296 UART: [art] PUB.X = 7DEBA94B643CBA7BCDED41C7F861F7D2CFF9E84DDAD5EE78F2826E41D8A3E072CF2592D57DDA529F4A2177968DFC6A54
38,894,622 UART: [art] PUB.Y = BB2D3F6969A5935F4C6B47D1261C1029A144F837B5E6D7A49E04ED1F93E644487FE816F5764983B43E6823AC62CCD369
38,901,839 UART: [art] SIG.R = 2A7D54F1A6B6E435033D9E3B803381A8DEC47AD8FF3E7CD1AB89A90EC988FB39EB0651D65A70A1A9EDE05CA48133B355
38,909,280 UART: [art] SIG.S = 57C4214A0DD234503B86CC8D403DA5D6F2EFED090C7D4F53C8EB1F3B4ECF1C25B9EB8E26EBB943EC372612E5F5405B17
39,888,175 UART: Caliptra RT
39,888,892 UART: [state] CFI Enabled
40,177,563 UART: [rt] RT failed reset flow
40,178,754 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,934 writing to cptra_bootfsm_go
3,700,886 ready_for_fw is high
3,701,304 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,718,653 >>> mbox cmd response: success
13,719,224 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,968,491 UART:
17,968,880 UART: Running Caliptra FMC ...
17,970,026 UART:
17,970,196 UART: [state] CFI Enabled
17,978,687 UART: [fht] FMC Alias Private Key: 7
19,735,791 UART: [art] Extend RT PCRs Done
19,737,015 UART: [art] Lock RT PCRs Done
19,738,538 UART: [art] Populate DV Done
19,743,813 UART: [fht] FMC Alias Private Key: 7
19,745,469 UART: [art] Derive CDI
19,746,293 UART: [art] Store in in slot 0x4
19,788,615 UART: [art] Derive Key Pair
19,789,674 UART: [art] Store priv key in slot 0x5
22,216,915 UART: [art] Derive Key Pair - Done
22,229,742 UART: [art] Signing Cert with AUTHO
22,231,047 UART: RITY.KEYID = 7
23,936,368 UART: [art] Erasing AUTHORITY.KEYID = 7
23,937,879 UART: [art] PUB.X = C2E9A7F64566FAABD36787CB839DE592443EAA21B679412900E10DFE8C05D246C4D3A988092EA3EABCDA706CC6931FC1
23,945,392 UART: [art] PUB.Y = 0A0D27187A229F3F010C7344496E0F0CFEF283931879F5C4B4B05FF090F18DB944CB979FDCFDA6A876974361356C6AC0
23,952,394 UART: [art] SIG.R = AF1D33CB07BBEEB81DBE4F26F0018DD77D4D721D0D4BE6985F88AC729091C783A87E4B0F5ABCFB9A80A622017C3873DD
23,959,822 UART: [art] SIG.S = FC0EB6B5558DF8B6B636B522BED815845FEE934851A44CECECA834E21EF119E14DAB2CDFF82BAF3BB047CD0A686C1E45
24,937,736 UART: mbox::rt_entry...
24,938,700 UART: ____ _ _ _ ____ _____
24,940,688 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,942,718 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,944,659 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,946,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,948,564 UART: |_|
24,949,370 UART:
25,062,064 UART: [rt] Runtime listening for mailbox commands...
25,064,236 >>> mbox cmd response data (0 bytes)
27,123,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,171,017 >>> mbox cmd response: success
34,206,477 UART:
34,206,817 UART: Running Caliptra FMC ...
34,207,861 UART:
34,208,031 UART: [state] CFI Enabled
34,251,466 UART: [art] Extend RT PCRs Done
34,252,622 UART: [art] Lock RT PCRs Done
34,254,101 UART: [art] Populate DV Done
34,259,668 UART: [fht] FMC Alias Private Key: 7
34,261,367 UART: [art] Derive CDI
34,262,103 UART: [art] Store in in slot 0x4
34,304,277 UART: [art] Derive Key Pair
34,305,320 UART: [art] Store priv key in slot 0x5
36,732,340 UART: [art] Derive Key Pair - Done
36,745,293 UART: [art] Signing Cert with AUTHO
36,746,637 UART: RITY.KEYID = 7
38,452,118 UART: [art] Erasing AUTHORITY.KEYID = 7
38,453,626 UART: [art] PUB.X = 6855F0DD444473A80E1FF3511C9383A015732728B7E33CAEE894EA2DE2E50FA1274329690081880680513D1E7234EC1E
38,460,868 UART: [art] PUB.Y = D275D90F8820C4394B443E1040B6F9E9CF346BBFAD715F0E5F8D02DB93823399BD9A2E08078A159678EC8BAB0EE84945
38,468,079 UART: [art] SIG.R = 1DCB3D7C63C21EFD832C771A356D682935D7D3E243E6AF981AE0DFE54536DF22FAE34205FC9860D0F0D9E4513C40081D
38,475,461 UART: [art] SIG.S = 6A95B4379E8A7DD36A739A750875AFE61EF773797E8CF9611007B5A0E72D7015B15611E3ADB35FE8682C805103E2688D
39,453,850 UART: Caliptra RT
39,454,561 UART: [state] CFI Enabled
39,744,523 UART: [rt] RT failed reset flow
39,745,730 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
192,592 UART:
192,985 UART: Running Caliptra ROM ...
194,116 UART:
194,266 UART: [state] CFI Enabled
265,252 UART: [state] LifecycleState = Unprovisioned
267,625 UART: [state] DebugLocked = No
269,232 UART: [state] WD Timer not started. Device not locked for debugging
274,491 UART: [kat] SHA2-256
464,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,158 UART: [kat] ++
475,640 UART: [kat] sha1
486,090 UART: [kat] SHA2-256
489,106 UART: [kat] SHA2-384
496,029 UART: [kat] SHA2-512-ACC
498,612 UART: [kat] ECC-384
2,948,154 UART: [kat] HMAC-384Kdf
2,972,327 UART: [kat] LMS
3,504,085 UART: [kat] --
3,509,008 UART: [cold-reset] ++
3,511,297 UART: [fht] FHT @ 0x50003400
3,524,118 UART: [idev] ++
3,524,843 UART: [idev] CDI.KEYID = 6
3,525,754 UART: [idev] SUBJECT.KEYID = 7
3,526,998 UART: [idev] UDS.KEYID = 0
3,527,920 ready_for_fw is high
3,528,100 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,626,913 UART: [idev] Erasing UDS.KEYID = 0
6,030,129 UART: [idev] Sha1 KeyId Algorithm
6,052,638 UART: [idev] --
6,057,104 UART: [ldev] ++
6,057,798 UART: [ldev] CDI.KEYID = 6
6,058,717 UART: [ldev] SUBJECT.KEYID = 5
6,059,877 UART: [ldev] AUTHORITY.KEYID = 7
6,061,104 UART: [ldev] FE.KEYID = 1
6,101,292 UART: [ldev] Erasing FE.KEYID = 1
8,603,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,123 UART: [ldev] --
10,415,229 UART: [fwproc] Wait for Commands...
10,416,884 UART: [fwproc] Recv command 0x46574c44
10,419,190 UART: [fwproc] Recv'd Img size: 78456 bytes
13,422,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,618,200 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,945,427 >>> mbox cmd response: success
13,945,946 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,949,276 UART: [afmc] ++
13,949,982 UART: [afmc] CDI.KEYID = 6
13,951,227 UART: [afmc] SUBJECT.KEYID = 7
13,952,678 UART: [afmc] AUTHORITY.KEYID = 5
16,488,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,214,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,216,428 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,231,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,246,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,261,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,286,219 UART: [afmc] --
18,290,408 UART: [cold-reset] --
18,294,667 UART: [state] Locking Datavault
18,300,968 UART: [state] Locking PCR0, PCR1 and PCR31
18,303,125 UART: [state] Locking ICCM
18,305,369 UART: [exit] Launching FMC @ 0x40000130
18,313,998 UART:
18,314,226 UART: Running Caliptra FMC ...
18,315,271 UART:
18,315,419 UART: [state] CFI Enabled
18,369,893 UART: [fht] FMC Alias Private Key: 7
20,133,678 UART: [art] Extend RT PCRs Done
20,134,886 UART: [art] Lock RT PCRs Done
20,136,749 UART: [art] Populate DV Done
20,142,102 UART: [fht] FMC Alias Private Key: 7
20,143,683 UART: [art] Derive CDI
20,144,411 UART: [art] Store in in slot 0x4
20,202,849 UART: [art] Derive Key Pair
20,203,881 UART: [art] Store priv key in slot 0x5
22,666,945 UART: [art] Derive Key Pair - Done
22,679,510 UART: [art] Signing Cert with AUTHO
22,680,844 UART: RITY.KEYID = 7
24,393,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,394,629 UART: [art] PUB.X = BB8AD387D89985E3BC678FAFF5CE40202E947D63A1AC1E2B8FF1AF944F7EC8F7E14229216DA055D4B82D46029A252E3F
24,401,892 UART: [art] PUB.Y = 8329FC9A7AAD2C8603EFCC1DB7696972E973E5A32D146050DE7AEE3705BC574AA2446B6C67486B1C64EA9FA914CF22F9
24,409,192 UART: [art] SIG.R = 5087E18A8BB472F0E8B753464BD9632384B21BA37040C37977B7B0115F37F6DA51CC0E6140AA5C0DEE11AB18A7CB6D37
24,416,602 UART: [art] SIG.S = 646BDC14403C790424BE9F3CA53DDC76814ED5DD6DCBD7932FB5883951C878DE1B94F75F6AFDC53D9822118CD0FB2FA4
25,395,322 UART: mbox::rt_entry...
25,396,292 UART: ____ _ _ _ ____ _____
25,398,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,400,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,402,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,404,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,406,113 UART: |_|
25,406,916 UART:
25,518,844 UART: [rt] Runtime listening for mailbox commands...
25,521,010 >>> mbox cmd response data (0 bytes)
27,574,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,718,784 UART:
27,719,157 UART: Running Caliptra ROM ...
27,720,287 UART:
27,720,451 UART: [state] CFI Enabled
27,781,113 UART: [state] LifecycleState = Unprovisioned
27,783,179 UART: [state] DebugLocked = No
27,784,882 UART: [state] WD Timer not started. Device not locked for debugging
27,789,283 UART: [kat] SHA2-256
27,979,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,989,895 UART: [kat] ++
27,990,380 UART: [kat] sha1
28,002,514 UART: [kat] SHA2-256
28,005,551 UART: [kat] SHA2-384
28,012,036 UART: [kat] SHA2-512-ACC
28,014,633 UART: [kat] ECC-384
30,465,468 UART: [kat] HMAC-384Kdf
30,490,396 UART: [kat] LMS
31,021,959 UART: [kat] --
31,026,132 UART: [update-reset] ++
34,480,189 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,484,229 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,090,303 >>> mbox cmd response: success
35,094,948 UART: [update-reset] Copying MAN_2 To MAN_1
35,129,195 UART: [update-reset Success] --
35,133,277 UART: [state] Locking Datavault
35,135,258 UART: [state] Locking PCR0, PCR1 and PCR31
35,137,438 UART: [state] Locking ICCM
35,139,382 UART: [exit] Launching FMC @ 0x40000130
35,148,014 UART:
35,148,249 UART: Running Caliptra FMC ...
35,149,527 UART:
35,149,688 UART: [state] CFI Enabled
35,238,229 UART: [art] Extend RT PCRs Done
35,239,440 UART: [art] Lock RT PCRs Done
35,240,734 UART: [art] Populate DV Done
35,246,353 UART: [fht] FMC Alias Private Key: 7
35,247,989 UART: [art] Derive CDI
35,248,748 UART: [art] Store in in slot 0x4
35,307,244 UART: [art] Derive Key Pair
35,308,241 UART: [art] Store priv key in slot 0x5
37,771,146 UART: [art] Derive Key Pair - Done
37,784,276 UART: [art] Signing Cert with AUTHO
37,785,618 UART: RITY.KEYID = 7
39,497,790 UART: [art] Erasing AUTHORITY.KEYID = 7
39,499,343 UART: [art] PUB.X = 9A9C8F3A85447FCBD6D03657F0D951E3669576199C62DEC1554FA085CE98296FA8710EA09B6FD7F8B4759641C0154229
39,506,559 UART: [art] PUB.Y = 4B773AE8286119E03B276DBD8378F6D4393CE5182C28732DF9147CA555957589233DE013F34027F5FB62EFBD22B13FD8
39,513,754 UART: [art] SIG.R = 3EBB5E708E8379855610AE0B2B9F480427414CC78506FC3E60767E21A5F100653FB754E7B6942B257936CDB5B8F8A739
39,521,125 UART: [art] SIG.S = BFCC2FC5602D6D7D90E1A1CA5593B83A82F164BADFF6BBE392FF5C4682DF309F114158D0909330E40BAB888EFE01A67D
40,500,208 UART: Caliptra RT
40,501,243 UART: [state] CFI Enabled
40,840,345 UART: [rt] RT failed reset flow
40,841,540 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,439,185 ready_for_fw is high
3,439,782 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,966,742 >>> mbox cmd response: success
13,967,352 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,274,527 UART:
18,274,956 UART: Running Caliptra FMC ...
18,276,243 UART:
18,276,406 UART: [state] CFI Enabled
18,346,364 UART: [fht] FMC Alias Private Key: 7
20,110,256 UART: [art] Extend RT PCRs Done
20,111,493 UART: [art] Lock RT PCRs Done
20,113,020 UART: [art] Populate DV Done
20,118,214 UART: [fht] FMC Alias Private Key: 7
20,119,689 UART: [art] Derive CDI
20,120,461 UART: [art] Store in in slot 0x4
20,178,450 UART: [art] Derive Key Pair
20,179,447 UART: [art] Store priv key in slot 0x5
22,642,560 UART: [art] Derive Key Pair - Done
22,655,835 UART: [art] Signing Cert with AUTHO
22,657,135 UART: RITY.KEYID = 7
24,368,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,370,100 UART: [art] PUB.X = 63B64A9BC34F00022530028523FA795B6E4DDA1ED55B1EDC2FD59CC37DD035A2FE42077C158F3F8063C6747A39BEE152
24,377,336 UART: [art] PUB.Y = DDEF7923EC8639C78C8A002CB528EC5C2233B05572E5C84CBF14D4C7F4405D794BD7F080AD669B4CC0F41816E086DBB6
24,384,590 UART: [art] SIG.R = EC8E5BB341E10AA74EF950BCA4A11530E4A86705AF421D57C9499AFECB747169A3F100DD8AAF41D868C742860C39E02D
24,391,930 UART: [art] SIG.S = AD887186B05673D93EF46A8A6142D90841D640E2315B1DD86D25C9CE762A91B88EDEA85DE3CA418959A5276E2E101D53
25,369,881 UART: mbox::rt_entry...
25,370,837 UART: ____ _ _ _ ____ _____
25,372,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,374,777 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,376,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,378,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,380,644 UART: |_|
25,381,452 UART:
25,494,182 UART: [rt] Runtime listening for mailbox commands...
25,496,403 >>> mbox cmd response data (0 bytes)
27,549,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,360,086 >>> mbox cmd response: success
35,396,987 UART:
35,397,333 UART: Running Caliptra FMC ...
35,398,460 UART:
35,398,650 UART: [state] CFI Enabled
35,487,751 UART: [art] Extend RT PCRs Done
35,488,938 UART: [art] Lock RT PCRs Done
35,490,448 UART: [art] Populate DV Done
35,496,011 UART: [fht] FMC Alias Private Key: 7
35,497,654 UART: [art] Derive CDI
35,498,463 UART: [art] Store in in slot 0x4
35,556,867 UART: [art] Derive Key Pair
35,557,900 UART: [art] Store priv key in slot 0x5
38,020,652 UART: [art] Derive Key Pair - Done
38,033,773 UART: [art] Signing Cert with AUTHO
38,035,075 UART: RITY.KEYID = 7
39,747,825 UART: [art] Erasing AUTHORITY.KEYID = 7
39,749,335 UART: [art] PUB.X = 81179E73103100D3B475587201C1B55753ABFC5C15EAE8AE7459EE2FF8334BF2AC25A30ED61A5EDAB26D96E5E3A7E100
39,756,560 UART: [art] PUB.Y = E8931F24EE24C06CBEC749F4FFF239B5B5B934B7AE9E4D5E99AE53D503FC0DFBE93D4E69F87992FFE97EB1024130BF59
39,763,873 UART: [art] SIG.R = 1737C905F21170B2DD8E0AAA29E64D0F825BE56CA9C9A6C5F2D1995CF34551A2B86C10C7FA6C6A4E08588B9B2EABFCAC
39,771,282 UART: [art] SIG.S = 65FDFAA3C7768213B329DCB8325DAB3AE182D2EF1C6F32363049E9085F9C3D52F674BB2512AAA32ABB91F679694E6637
40,750,729 UART: Caliptra RT
40,751,437 UART: [state] CFI Enabled
41,084,933 UART: [rt] RT failed reset flow
41,086,135 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,647 writing to cptra_bootfsm_go
192,884 UART:
193,248 UART: Running Caliptra ROM ...
194,450 UART:
604,145 UART: [state] CFI Enabled
612,863 UART: [state] LifecycleState = Unprovisioned
615,284 UART: [state] DebugLocked = No
616,682 UART: [state] WD Timer not started. Device not locked for debugging
621,587 UART: [kat] SHA2-256
811,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,302 UART: [kat] ++
822,750 UART: [kat] sha1
833,832 UART: [kat] SHA2-256
836,841 UART: [kat] SHA2-384
841,343 UART: [kat] SHA2-512-ACC
843,924 UART: [kat] ECC-384
3,286,504 UART: [kat] HMAC-384Kdf
3,299,638 UART: [kat] LMS
3,831,468 UART: [kat] --
3,835,330 UART: [cold-reset] ++
3,837,766 UART: [fht] FHT @ 0x50003400
3,849,456 UART: [idev] ++
3,850,191 UART: [idev] CDI.KEYID = 6
3,851,079 UART: [idev] SUBJECT.KEYID = 7
3,852,326 UART: [idev] UDS.KEYID = 0
3,853,228 ready_for_fw is high
3,853,418 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,952,017 UART: [idev] Erasing UDS.KEYID = 0
6,325,752 UART: [idev] Sha1 KeyId Algorithm
6,348,121 UART: [idev] --
6,353,309 UART: [ldev] ++
6,353,990 UART: [ldev] CDI.KEYID = 6
6,354,872 UART: [ldev] SUBJECT.KEYID = 5
6,356,081 UART: [ldev] AUTHORITY.KEYID = 7
6,357,315 UART: [ldev] FE.KEYID = 1
6,366,428 UART: [ldev] Erasing FE.KEYID = 1
8,843,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,639 UART: [ldev] --
10,634,698 UART: [fwproc] Wait for Commands...
10,637,766 UART: [fwproc] Recv command 0x46574c44
10,640,019 UART: [fwproc] Recv'd Img size: 78456 bytes
13,643,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,722,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,838,156 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,164,798 >>> mbox cmd response: success
14,165,295 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
14,169,260 UART: [afmc] ++
14,169,964 UART: [afmc] CDI.KEYID = 6
14,171,131 UART: [afmc] SUBJECT.KEYID = 7
14,172,682 UART: [afmc] AUTHORITY.KEYID = 5
16,674,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,398,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,400,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,415,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,430,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,445,976 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,470,542 UART: [afmc] --
18,474,961 UART: [cold-reset] --
18,480,723 UART: [state] Locking Datavault
18,486,791 UART: [state] Locking PCR0, PCR1 and PCR31
18,488,943 UART: [state] Locking ICCM
18,491,507 UART: [exit] Launching FMC @ 0x40000130
18,500,184 UART:
18,500,422 UART: Running Caliptra FMC ...
18,501,523 UART:
18,501,682 UART: [state] CFI Enabled
18,509,666 UART: [fht] FMC Alias Private Key: 7
20,266,278 UART: [art] Extend RT PCRs Done
20,267,511 UART: [art] Lock RT PCRs Done
20,269,053 UART: [art] Populate DV Done
20,274,412 UART: [fht] FMC Alias Private Key: 7
20,275,895 UART: [art] Derive CDI
20,276,633 UART: [art] Store in in slot 0x4
20,319,239 UART: [art] Derive Key Pair
20,320,284 UART: [art] Store priv key in slot 0x5
22,747,000 UART: [art] Derive Key Pair - Done
22,760,000 UART: [art] Signing Cert with AUTHO
22,761,310 UART: RITY.KEYID = 7
24,466,628 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,130 UART: [art] PUB.X = 26C337C0653718C7F3519BA8CD6D3D8856452029C768CDF17BEB9EF98B778193E30659C6FAF077611E80436A8CDC404F
24,475,339 UART: [art] PUB.Y = 77B1D44705EF73032A3613412CF4FC9689E4DC4387720BEB9F3BBAF6C21555C10B17D45A3C6C875641CD7AC26BDAA96E
24,482,647 UART: [art] SIG.R = C4494AAC2CC2FEDD94FD518FBB80C5845B5DC68465234AB81EE2CFD7745C2FD18488E1785D6D80ED46F0A4B510D4A9A6
24,490,090 UART: [art] SIG.S = 08429D53D436183B69DCF77F8EF0CDF692D32B3C9E754ACC50EDCD44F05FC67FEEA0FDF79F74F5851901B7439B319672
25,468,776 UART: mbox::rt_entry...
25,469,729 UART: ____ _ _ _ ____ _____
25,471,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,473,667 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,475,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,477,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,479,381 UART: |_|
25,480,217 UART:
25,593,292 UART: [rt] Runtime listening for mailbox commands...
25,595,455 >>> mbox cmd response data (0 bytes)
27,649,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,793,916 UART:
27,794,306 UART: Running Caliptra ROM ...
27,795,364 UART:
27,795,516 UART: [state] CFI Enabled
27,810,927 UART: [state] LifecycleState = Unprovisioned
27,812,809 UART: [state] DebugLocked = No
27,815,088 UART: [state] WD Timer not started. Device not locked for debugging
27,819,852 UART: [kat] SHA2-256
28,009,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,020,494 UART: [kat] ++
28,021,011 UART: [kat] sha1
28,032,930 UART: [kat] SHA2-256
28,035,909 UART: [kat] SHA2-384
28,042,234 UART: [kat] SHA2-512-ACC
28,044,832 UART: [kat] ECC-384
30,485,940 UART: [kat] HMAC-384Kdf
30,498,448 UART: [kat] LMS
31,030,071 UART: [kat] --
31,035,143 UART: [update-reset] ++
34,496,458 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,499,775 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,105,831 >>> mbox cmd response: success
35,110,396 UART: [update-reset] Copying MAN_2 To MAN_1
35,144,144 UART: [update-reset Success] --
35,149,378 UART: [state] Locking Datavault
35,152,109 UART: [state] Locking PCR0, PCR1 and PCR31
35,154,289 UART: [state] Locking ICCM
35,156,887 UART: [exit] Launching FMC @ 0x40000130
35,165,571 UART:
35,165,819 UART: Running Caliptra FMC ...
35,167,104 UART:
35,167,269 UART: [state] CFI Enabled
35,211,197 UART: [art] Extend RT PCRs Done
35,212,388 UART: [art] Lock RT PCRs Done
35,213,984 UART: [art] Populate DV Done
35,219,555 UART: [fht] FMC Alias Private Key: 7
35,221,046 UART: [art] Derive CDI
35,221,781 UART: [art] Store in in slot 0x4
35,264,568 UART: [art] Derive Key Pair
35,265,614 UART: [art] Store priv key in slot 0x5
37,692,476 UART: [art] Derive Key Pair - Done
37,705,478 UART: [art] Signing Cert with AUTHO
37,706,807 UART: RITY.KEYID = 7
39,412,407 UART: [art] Erasing AUTHORITY.KEYID = 7
39,413,911 UART: [art] PUB.X = 6A90A0927BF2C84429C8AC538C05A0523BBE4FFDC91599727E6571CCF84F4B752C4F8CF9B584D0D5B6F85347DB635874
39,421,196 UART: [art] PUB.Y = 6AB34F6F27F932B26B7F1AFF7F9AF4BD27593E9E0BA6FE19F8A6B8F5DD4F4934F905165CBE053B3FD31DE4B1BC7FFB6C
39,428,468 UART: [art] SIG.R = 00D06E29E5E8C0E2646204C82C72843A687D9C17A7469FBAAC36D89951C104B9CBA85215E4871BE260F40D990C0645B6
39,435,835 UART: [art] SIG.S = F24BAF7D0523B64EF6682483ED6911ADCF6E969357E550EC63756B970EA31914B1BCC3E93A718C8F816CD9807BEE7941
40,414,645 UART: Caliptra RT
40,415,341 UART: [state] CFI Enabled
40,702,641 UART: [rt] RT failed reset flow
40,703,862 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
3,755,855 ready_for_fw is high
3,756,500 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,183,575 >>> mbox cmd response: success
14,184,179 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,437,146 UART:
18,437,521 UART: Running Caliptra FMC ...
18,438,619 UART:
18,438,777 UART: [state] CFI Enabled
18,446,898 UART: [fht] FMC Alias Private Key: 7
20,203,644 UART: [art] Extend RT PCRs Done
20,204,876 UART: [art] Lock RT PCRs Done
20,206,589 UART: [art] Populate DV Done
20,212,186 UART: [fht] FMC Alias Private Key: 7
20,213,783 UART: [art] Derive CDI
20,214,609 UART: [art] Store in in slot 0x4
20,257,048 UART: [art] Derive Key Pair
20,258,063 UART: [art] Store priv key in slot 0x5
22,685,251 UART: [art] Derive Key Pair - Done
22,697,885 UART: [art] Signing Cert with AUTHO
22,699,204 UART: RITY.KEYID = 7
24,404,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,406,057 UART: [art] PUB.X = 3C916988BBE430A31E8EFC33266EF650BF90AAE991CEBFC85F72BE117B968636FFA53BA0E048ED267B9D45B0670A9696
24,413,338 UART: [art] PUB.Y = 69F45AD7A8F927F151079B7F510B29FA4E6B92F2F72C5B7E64CFE77ED1E703AFA6D3FDA406DD85F62DA3BD94473D5849
24,420,571 UART: [art] SIG.R = 9BF73EFF8CBE41A29CF95BADE590135C1E0FDF8C97DD62624C32F95274E83F1454A2BABE5B11A7977A94959F65DDCEEA
24,428,017 UART: [art] SIG.S = 4253407265E3312E22F4CA00AFAE5ABE6A2A0310D11535CCCBF7B1F03ED2DB100199C27EC4CC97A224669D9735F15A10
25,406,495 UART: mbox::rt_entry...
25,407,451 UART: ____ _ _ _ ____ _____
25,409,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,411,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,413,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,415,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,417,277 UART: |_|
25,418,113 UART:
25,531,023 UART: [rt] Runtime listening for mailbox commands...
25,533,204 >>> mbox cmd response data (0 bytes)
27,586,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,314,013 >>> mbox cmd response: success
35,348,363 UART:
35,348,684 UART: Running Caliptra FMC ...
35,349,812 UART:
35,349,980 UART: [state] CFI Enabled
35,394,255 UART: [art] Extend RT PCRs Done
35,395,448 UART: [art] Lock RT PCRs Done
35,397,018 UART: [art] Populate DV Done
35,402,652 UART: [fht] FMC Alias Private Key: 7
35,404,189 UART: [art] Derive CDI
35,405,025 UART: [art] Store in in slot 0x4
35,447,626 UART: [art] Derive Key Pair
35,448,630 UART: [art] Store priv key in slot 0x5
37,876,082 UART: [art] Derive Key Pair - Done
37,889,145 UART: [art] Signing Cert with AUTHO
37,890,452 UART: RITY.KEYID = 7
39,595,983 UART: [art] Erasing AUTHORITY.KEYID = 7
39,597,489 UART: [art] PUB.X = C75C30B3A5E025D606C8843F825CA2053B8DF7D6AB2F55DEB1BF2A7BB767F91BCF294C23DFA8B4E9CDDE70D4F911F083
39,604,796 UART: [art] PUB.Y = 59A05ABF00D4B3955BBBDFABAE25F976C54FA500E5D5C6276A3073334865E85A57B7D5FC1891495047E84E723D8F52A5
39,611,962 UART: [art] SIG.R = E6EB846991E188C552D749B0EC258C4162D92E596EE6A9D1D0993CF99CD1A8DDF242B798619E23DA4AB7F2F3C41AD057
39,619,359 UART: [art] SIG.S = D39F6C35171C37CE4558DDB5582528A82CE6AFD26F6D606EC2CE481774FF468BB6F3A78687F419E858179EA56CCB67EC
40,598,868 UART: Caliptra RT
40,599,572 UART: [state] CFI Enabled
40,889,461 UART: [rt] RT failed reset flow
40,890,657 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,655 UART: [kat] SHA2-256
892,593 UART: [kat] SHA2-384
895,320 UART: [kat] SHA2-512-ACC
897,221 UART: [kat] ECC-384
903,066 UART: [kat] HMAC-384Kdf
907,644 UART: [kat] LMS
1,475,840 UART: [kat] --
1,476,519 UART: [cold-reset] ++
1,477,017 UART: [fht] Storing FHT @ 0x50003400
1,479,808 UART: [idev] ++
1,479,976 UART: [idev] CDI.KEYID = 6
1,480,336 UART: [idev] SUBJECT.KEYID = 7
1,480,760 UART: [idev] UDS.KEYID = 0
1,481,105 ready_for_fw is high
1,481,105 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,648 UART: [idev] Erasing UDS.KEYID = 0
1,504,868 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,274 UART: [idev] --
1,514,449 UART: [ldev] ++
1,514,617 UART: [ldev] CDI.KEYID = 6
1,514,980 UART: [ldev] SUBJECT.KEYID = 5
1,515,406 UART: [ldev] AUTHORITY.KEYID = 7
1,515,869 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,810 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,842 UART: [fwproc] Received command 0x46574c44
1,586,633 UART: [fwproc] Received Image of size 78456 bytes
2,474,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,501,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,612,660 >>> mbox cmd response: success
2,612,660 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,613,708 UART: [afmc] ++
2,613,876 UART: [afmc] CDI.KEYID = 6
2,614,238 UART: [afmc] SUBJECT.KEYID = 7
2,614,663 UART: [afmc] AUTHORITY.KEYID = 5
2,650,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,504 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,897 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,587 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,454 UART: [afmc] --
2,693,380 UART: [cold-reset] --
2,694,312 UART: [state] Locking Datavault
2,695,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,193 UART: [state] Locking ICCM
2,696,739 UART: [exit] Launching FMC @ 0x40000130
2,702,068 UART:
2,702,084 UART: Running Caliptra FMC ...
2,702,492 UART:
2,702,546 UART: [state] CFI Enabled
2,713,061 UART: [fht] FMC Alias Private Key: 7
2,820,108 UART: [art] Extend RT PCRs Done
2,820,536 UART: [art] Lock RT PCRs Done
2,822,164 UART: [art] Populate DV Done
2,830,145 UART: [fht] FMC Alias Private Key: 7
2,831,167 UART: [art] Derive CDI
2,831,447 UART: [art] Store in in slot 0x4
2,916,740 UART: [art] Derive Key Pair
2,917,100 UART: [art] Store priv key in slot 0x5
2,930,530 UART: [art] Derive Key Pair - Done
2,945,440 UART: [art] Signing Cert with AUTHO
2,945,920 UART: RITY.KEYID = 7
2,961,190 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,955 UART: [art] PUB.X = 0396AB990704C07236276D29D033507BF687EE54D685C67F00E939927B931558FD72BC6D081B29E63D5DAEE75909D1F3
2,968,682 UART: [art] PUB.Y = 8FC839C96ACDCDEF91FF179B6229D26874DAC41D9815272C5DF1E1966CA5D95AB2595ED1511536CB003C025044A5230F
2,975,610 UART: [art] SIG.R = C3B44B20EBA049CB2E1D1C26A9651FFED1E2D2827DA156F4D3CEE3BAB61157F9E4B744032D07B3D0CCC2CAEE58D59F76
2,982,398 UART: [art] SIG.S = 246465DF12FD8028822CB1CC0C52F2EF33E0023D60274F28A2A414E817458EC034A48193E58E07439B9B29B6CBAA1BA5
3,005,656 UART: mbox::rt_entry...
3,006,028 UART: ____ _ _ _ ____ _____
3,006,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,007,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,008,380 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,009,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,009,916 UART: |_|
3,010,228 UART:
3,117,306 UART: [rt] Runtime listening for mailbox commands...
3,118,457 >>> mbox cmd response data (0 bytes)
3,118,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,118,573 UART:
3,118,589 UART: Running Caliptra ROM ...
3,118,997 UART:
3,119,051 UART: [state] CFI Enabled
3,121,495 UART: [state] LifecycleState = Unprovisioned
3,122,150 UART: [state] DebugLocked = No
3,122,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,124,283 UART: [kat] SHA2-256
3,918,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,922,329 UART: [kat] ++
3,922,481 UART: [kat] sha1
3,926,723 UART: [kat] SHA2-256
3,928,661 UART: [kat] SHA2-384
3,931,584 UART: [kat] SHA2-512-ACC
3,933,484 UART: [kat] ECC-384
3,939,339 UART: [kat] HMAC-384Kdf
3,943,751 UART: [kat] LMS
4,511,947 UART: [kat] --
4,512,890 UART: [update-reset] ++
5,843,984 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,845,180 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,994,684 >>> mbox cmd response: success
5,994,935 UART: [update-reset] Copying MAN_2 To MAN_1
6,002,949 UART: [update-reset Success] --
6,003,794 UART: [state] Locking Datavault
6,004,704 UART: [state] Locking PCR0, PCR1 and PCR31
6,005,308 UART: [state] Locking ICCM
6,005,934 UART: [exit] Launching FMC @ 0x40000130
6,011,263 UART:
6,011,279 UART: Running Caliptra FMC ...
6,011,687 UART:
6,011,741 UART: [state] CFI Enabled
6,100,826 UART: [art] Extend RT PCRs Done
6,101,254 UART: [art] Lock RT PCRs Done
6,102,389 UART: [art] Populate DV Done
6,110,616 UART: [fht] FMC Alias Private Key: 7
6,111,682 UART: [art] Derive CDI
6,111,962 UART: [art] Store in in slot 0x4
6,197,323 UART: [art] Derive Key Pair
6,197,683 UART: [art] Store priv key in slot 0x5
6,211,353 UART: [art] Derive Key Pair - Done
6,226,299 UART: [art] Signing Cert with AUTHO
6,226,779 UART: RITY.KEYID = 7
6,241,889 UART: [art] Erasing AUTHORITY.KEYID = 7
6,242,654 UART: [art] PUB.X = 5D123DF89ACDC081B7CA2781E3F85E1B2E26AD3FD873EFED1439CBAA42800BAE4B67C1528743F934095F94A46C909603
6,249,425 UART: [art] PUB.Y = 00775E1C31C2AA1FEB2F9D76B476D0C2FB36747D7A4B7A9DA410AD60FA53E16C5386C788F5DAF5F16D994FDA76780B53
6,256,364 UART: [art] SIG.R = A239D0A38E9DA6F0B89A7B2967C3F36FFCDDAA2174A30CD183C354B45BA9ED71EFD35F2CC72B76E1ADDEA5072866ED23
6,263,152 UART: [art] SIG.S = 60898F60AB874848059AE609D248AA2FC79CC34CD73DC9DCD6093D13787DE4346E3FF48CD6F5502ACF61618F2F9ADE8C
6,287,732 UART: Caliptra RT
6,287,985 UART: [state] CFI Enabled
6,570,015 UART: [rt] RT failed reset flow
6,570,446 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,041 ready_for_fw is high
1,362,041 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,462,350 >>> mbox cmd response: success
2,462,350 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,523,824 UART:
2,523,840 UART: Running Caliptra FMC ...
2,524,248 UART:
2,524,302 UART: [state] CFI Enabled
2,534,595 UART: [fht] FMC Alias Private Key: 7
2,642,154 UART: [art] Extend RT PCRs Done
2,642,582 UART: [art] Lock RT PCRs Done
2,644,054 UART: [art] Populate DV Done
2,652,431 UART: [fht] FMC Alias Private Key: 7
2,653,423 UART: [art] Derive CDI
2,653,703 UART: [art] Store in in slot 0x4
2,739,206 UART: [art] Derive Key Pair
2,739,566 UART: [art] Store priv key in slot 0x5
2,753,162 UART: [art] Derive Key Pair - Done
2,768,041 UART: [art] Signing Cert with AUTHO
2,768,521 UART: RITY.KEYID = 7
2,783,785 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,550 UART: [art] PUB.X = 0405E23CB89B5B7FF5FCC9BD14A530A174B2104FFFA36C39D891C9F842CC2723B230AB2A67CD3B272F106DB37546123C
2,791,324 UART: [art] PUB.Y = 1106EAE925C3B46295C4F0B1E193CEADBF335DD783954B04FAD31BDE106B78FA0A67562498BA31826FC21D953492787B
2,798,271 UART: [art] SIG.R = 136C8A3CBCF4F3142A9DF76F23AD04DED0FD27C0691EC0B3012A1D993092A2CAE6FE5516952253878CE335E892B39C07
2,805,040 UART: [art] SIG.S = 052FD56FCA9B2FF8DBDB4EC387B28711C0788F06585DB254A036721AE11D319EA1988D1723ADD2D98C5F27835CECA9FB
2,828,925 UART: mbox::rt_entry...
2,829,297 UART: ____ _ _ _ ____ _____
2,830,081 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,830,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,649 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,417 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,185 UART: |_|
2,833,497 UART:
2,939,194 UART: [rt] Runtime listening for mailbox commands...
2,940,345 >>> mbox cmd response data (0 bytes)
2,940,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,698,386 >>> mbox cmd response: success
5,711,747 UART:
5,711,763 UART: Running Caliptra FMC ...
5,712,171 UART:
5,712,225 UART: [state] CFI Enabled
5,801,300 UART: [art] Extend RT PCRs Done
5,801,728 UART: [art] Lock RT PCRs Done
5,803,061 UART: [art] Populate DV Done
5,810,918 UART: [fht] FMC Alias Private Key: 7
5,812,070 UART: [art] Derive CDI
5,812,350 UART: [art] Store in in slot 0x4
5,897,897 UART: [art] Derive Key Pair
5,898,257 UART: [art] Store priv key in slot 0x5
5,911,461 UART: [art] Derive Key Pair - Done
5,925,815 UART: [art] Signing Cert with AUTHO
5,926,295 UART: RITY.KEYID = 7
5,941,647 UART: [art] Erasing AUTHORITY.KEYID = 7
5,942,412 UART: [art] PUB.X = 996E95322544A6E56C4675E4598052C3615070B3C67F367D2E61D281FC34F542638EA6D082614D340E606AC1E43DBC30
5,949,169 UART: [art] PUB.Y = CC74B9892556A9E3488657858F47EEBE72218283CE6DB6F022A5B36FD3077DA77998AEAB2EA8DABDB3FFF00CC806E904
5,956,121 UART: [art] SIG.R = BB7EB0060AC3DB1A0FDF11F93AF445DDCAA5404A61C3C84A3E7716AEDC41FE32E99F7908CB546E7170F5F14CD7F42693
5,962,899 UART: [art] SIG.S = A3FF56DD3071F61E844B7EC079A26F48FDE686F82CDBA162D499C5E371B5B9F434E0E8A773019EA3E08D092B6365D53E
5,986,250 UART: Caliptra RT
5,986,503 UART: [state] CFI Enabled
6,269,674 UART: [rt] RT failed reset flow
6,270,105 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,676 UART: [kat] SHA2-256
882,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,722 UART: [kat] ++
886,874 UART: [kat] sha1
891,278 UART: [kat] SHA2-256
893,216 UART: [kat] SHA2-384
895,839 UART: [kat] SHA2-512-ACC
897,740 UART: [kat] ECC-384
903,451 UART: [kat] HMAC-384Kdf
908,045 UART: [kat] LMS
1,476,241 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,316 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 ready_for_fw is high
1,481,164 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,521 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,160 UART: [ldev] ++
1,515,328 UART: [ldev] CDI.KEYID = 6
1,515,691 UART: [ldev] SUBJECT.KEYID = 5
1,516,117 UART: [ldev] AUTHORITY.KEYID = 7
1,516,580 UART: [ldev] FE.KEYID = 1
1,522,004 UART: [ldev] Erasing FE.KEYID = 1
1,547,755 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,575 UART: [ldev] --
1,587,048 UART: [fwproc] Waiting for Commands...
1,587,811 UART: [fwproc] Received command 0x46574c44
1,588,602 UART: [fwproc] Received Image of size 78456 bytes
2,475,410 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,516 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,613,897 >>> mbox cmd response: success
2,613,897 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,615,121 UART: [afmc] ++
2,615,289 UART: [afmc] CDI.KEYID = 6
2,615,651 UART: [afmc] SUBJECT.KEYID = 7
2,616,076 UART: [afmc] AUTHORITY.KEYID = 5
2,650,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,569 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,077 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,962 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,652 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,545 UART: [afmc] --
2,694,461 UART: [cold-reset] --
2,695,245 UART: [state] Locking Datavault
2,696,522 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,126 UART: [state] Locking ICCM
2,697,622 UART: [exit] Launching FMC @ 0x40000130
2,702,951 UART:
2,702,967 UART: Running Caliptra FMC ...
2,703,375 UART:
2,703,518 UART: [state] CFI Enabled
2,714,601 UART: [fht] FMC Alias Private Key: 7
2,823,412 UART: [art] Extend RT PCRs Done
2,823,840 UART: [art] Lock RT PCRs Done
2,824,976 UART: [art] Populate DV Done
2,833,409 UART: [fht] FMC Alias Private Key: 7
2,834,401 UART: [art] Derive CDI
2,834,681 UART: [art] Store in in slot 0x4
2,920,354 UART: [art] Derive Key Pair
2,920,714 UART: [art] Store priv key in slot 0x5
2,933,744 UART: [art] Derive Key Pair - Done
2,948,384 UART: [art] Signing Cert with AUTHO
2,948,864 UART: RITY.KEYID = 7
2,963,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,587 UART: [art] PUB.X = 3079411BD947E2B758EEDCACBA67A64E61A0265EC8601501577776C876FAE7DB391E18DEDE09AE38AFBDC3AEF9D6DB99
2,971,371 UART: [art] PUB.Y = 3FA8CBEAA3DE86A567313DEE0ED280C60E01CC59ED1C64C059D8FEC6D7D0DE0B6780E8FB6B020027E0CE096D69400EB8
2,978,300 UART: [art] SIG.R = 6132D15606172377CAA3B9FA5A4FFBCFFEB19B9E957ED8112DF5CECBFC80B78B5A28C3761F5CFF03BEB96A549967E31B
2,985,086 UART: [art] SIG.S = D4351CB2E75C68EE5515EA6E284EDEBC94D99372E1A05F7AD23BB9BEFBED8378892121BFE6C8D7934A05328091A223B4
3,008,900 UART: mbox::rt_entry...
3,009,272 UART: ____ _ _ _ ____ _____
3,010,056 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,856 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,624 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,392 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,160 UART: |_|
3,013,472 UART:
3,120,450 UART: [rt] Runtime listening for mailbox commands...
3,121,601 >>> mbox cmd response data (0 bytes)
3,121,602 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,121,717 UART:
3,121,733 UART: Running Caliptra ROM ...
3,122,141 UART:
3,122,282 UART: [state] CFI Enabled
3,125,268 UART: [state] LifecycleState = Unprovisioned
3,125,923 UART: [state] DebugLocked = No
3,126,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,128,180 UART: [kat] SHA2-256
3,922,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,926,226 UART: [kat] ++
3,926,378 UART: [kat] sha1
3,930,444 UART: [kat] SHA2-256
3,932,382 UART: [kat] SHA2-384
3,935,109 UART: [kat] SHA2-512-ACC
3,937,009 UART: [kat] ECC-384
3,942,572 UART: [kat] HMAC-384Kdf
3,947,030 UART: [kat] LMS
4,515,226 UART: [kat] --
4,515,815 UART: [update-reset] ++
5,847,363 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,848,535 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
5,998,039 >>> mbox cmd response: success
5,998,298 UART: [update-reset] Copying MAN_2 To MAN_1
6,006,312 UART: [update-reset Success] --
6,007,411 UART: [state] Locking Datavault
6,008,015 UART: [state] Locking PCR0, PCR1 and PCR31
6,008,619 UART: [state] Locking ICCM
6,009,113 UART: [exit] Launching FMC @ 0x40000130
6,014,442 UART:
6,014,458 UART: Running Caliptra FMC ...
6,014,866 UART:
6,015,009 UART: [state] CFI Enabled
6,104,226 UART: [art] Extend RT PCRs Done
6,104,654 UART: [art] Lock RT PCRs Done
6,106,081 UART: [art] Populate DV Done
6,114,276 UART: [fht] FMC Alias Private Key: 7
6,115,380 UART: [art] Derive CDI
6,115,660 UART: [art] Store in in slot 0x4
6,201,531 UART: [art] Derive Key Pair
6,201,891 UART: [art] Store priv key in slot 0x5
6,215,303 UART: [art] Derive Key Pair - Done
6,229,898 UART: [art] Signing Cert with AUTHO
6,230,378 UART: RITY.KEYID = 7
6,245,470 UART: [art] Erasing AUTHORITY.KEYID = 7
6,246,235 UART: [art] PUB.X = 54208936CC5DBEADB067E8569AF4DC3F58BD88C9B7FCFE6D770B4F8ED0CB9ABA57550B53E97529EFE1E4D46FF18E0D12
6,253,020 UART: [art] PUB.Y = BCF54F9F0CF114C50C415020B23C68699E3D6A429097C942524BC18DA1C60D7007C2FE9B78C6BC2F86294F9586DDF682
6,259,962 UART: [art] SIG.R = BD7FDE4B7DE5F69AEB0FFEE6FEEBB57ED81FF3C9FF07C6B2E6C0DC3901CAC84F1F21191635C83D6258A5257734959464
6,266,745 UART: [art] SIG.S = 3F7F8CCB4B90CF7B67FCC1730CA36013079460EBC07EA30F318F9B68FA43D4F21B6AAB3F9FED5151A38B2F9B317043C8
6,290,419 UART: Caliptra RT
6,290,764 UART: [state] CFI Enabled
6,568,088 UART: [rt] RT failed reset flow
6,568,519 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,192 ready_for_fw is high
1,363,192 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,214 >>> mbox cmd response: success
2,463,214 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,523,928 UART:
2,523,944 UART: Running Caliptra FMC ...
2,524,352 UART:
2,524,495 UART: [state] CFI Enabled
2,535,122 UART: [fht] FMC Alias Private Key: 7
2,642,631 UART: [art] Extend RT PCRs Done
2,643,059 UART: [art] Lock RT PCRs Done
2,644,383 UART: [art] Populate DV Done
2,652,770 UART: [fht] FMC Alias Private Key: 7
2,653,878 UART: [art] Derive CDI
2,654,158 UART: [art] Store in in slot 0x4
2,739,557 UART: [art] Derive Key Pair
2,739,917 UART: [art] Store priv key in slot 0x5
2,752,957 UART: [art] Derive Key Pair - Done
2,767,649 UART: [art] Signing Cert with AUTHO
2,768,129 UART: RITY.KEYID = 7
2,783,857 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,622 UART: [art] PUB.X = B74AF5077D2D142464D452C85DA6C586AC24146F6056C8A0F140F2153A4675DB36160D692D18526902A1F4F0C27AF828
2,791,377 UART: [art] PUB.Y = F167C976495778354000BFCF84A88B34661EAFE1C2B3A66815EFFFB986D58A742D36A4BF3C685D7D273D2F904DA81DBE
2,798,315 UART: [art] SIG.R = 0E48067F82E78D2D6C0D3DE45EE62AFCDEC05CB801E476ECB6B51F738F31437782ADA568ABC0A57242D53B98B44DD1CE
2,805,091 UART: [art] SIG.S = CA15AE6356779428E4E05D82FDFFFD4594FE23E5BDA298036B3643F7A0084051D508FC6CDDA3A965502CDF9AA38233CC
2,828,481 UART: mbox::rt_entry...
2,828,853 UART: ____ _ _ _ ____ _____
2,829,637 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,830,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,205 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,831,973 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,832,741 UART: |_|
2,833,053 UART:
2,939,541 UART: [rt] Runtime listening for mailbox commands...
2,940,692 >>> mbox cmd response data (0 bytes)
2,940,693 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,700,644 >>> mbox cmd response: success
5,713,909 UART:
5,713,925 UART: Running Caliptra FMC ...
5,714,333 UART:
5,714,476 UART: [state] CFI Enabled
5,803,601 UART: [art] Extend RT PCRs Done
5,804,029 UART: [art] Lock RT PCRs Done
5,805,478 UART: [art] Populate DV Done
5,813,841 UART: [fht] FMC Alias Private Key: 7
5,814,867 UART: [art] Derive CDI
5,815,147 UART: [art] Store in in slot 0x4
5,901,010 UART: [art] Derive Key Pair
5,901,370 UART: [art] Store priv key in slot 0x5
5,914,830 UART: [art] Derive Key Pair - Done
5,929,705 UART: [art] Signing Cert with AUTHO
5,930,185 UART: RITY.KEYID = 7
5,945,349 UART: [art] Erasing AUTHORITY.KEYID = 7
5,946,114 UART: [art] PUB.X = 68102A378A5A1F64BB54A7CB374B8BE33390CD161360A0AF664AE92C8BA617029B3FA0458BAD9F1CD215DA355DB3E4A7
5,952,893 UART: [art] PUB.Y = C595D123B9B9059C2876846AA66B4744E9332D06ED5CA13BD834BFB17785C33A4347CB18B727A33C32006F0E92EC8354
5,959,810 UART: [art] SIG.R = 57D205AB2AFF067D3D893354E7AC006F50F26B8D63317F21DB1C94E3A0583F7FDFD3E040790137DF6C09FFCC8F067B50
5,966,553 UART: [art] SIG.S = F7D41EABBC9006040C5E21F6C0E63CE437ACBC67FBA7CB572B332B009C6B16DC2E0064FDB2856BE9676FDABC680136B9
5,990,508 UART: Caliptra RT
5,990,853 UART: [state] CFI Enabled
6,272,539 UART: [rt] RT failed reset flow
6,272,970 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
902,101 UART: [kat] SHA2-256
904,041 UART: [kat] SHA2-384
906,898 UART: [kat] SHA2-512-ACC
908,799 UART: [kat] ECC-384
918,518 UART: [kat] HMAC-384Kdf
923,288 UART: [kat] LMS
1,171,616 UART: [kat] --
1,172,521 UART: [cold-reset] ++
1,173,083 UART: [fht] FHT @ 0x50003400
1,175,854 UART: [idev] ++
1,176,022 UART: [idev] CDI.KEYID = 6
1,176,382 UART: [idev] SUBJECT.KEYID = 7
1,176,806 UART: [idev] UDS.KEYID = 0
1,177,151 ready_for_fw is high
1,177,151 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,754 UART: [idev] Erasing UDS.KEYID = 0
1,201,031 UART: [idev] Sha1 KeyId Algorithm
1,209,593 UART: [idev] --
1,210,547 UART: [ldev] ++
1,210,715 UART: [ldev] CDI.KEYID = 6
1,211,078 UART: [ldev] SUBJECT.KEYID = 5
1,211,504 UART: [ldev] AUTHORITY.KEYID = 7
1,211,967 UART: [ldev] FE.KEYID = 1
1,216,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,916 UART: [fwproc] Recv command 0x46574c44
1,283,644 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,066 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,111 >>> mbox cmd response: success
2,309,111 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,310,283 UART: [afmc] ++
2,310,451 UART: [afmc] CDI.KEYID = 6
2,310,813 UART: [afmc] SUBJECT.KEYID = 7
2,311,238 UART: [afmc] AUTHORITY.KEYID = 5
2,347,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,404 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,017 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,736 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,534 UART: [afmc] --
2,390,556 UART: [cold-reset] --
2,391,498 UART: [state] Locking Datavault
2,392,575 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,179 UART: [state] Locking ICCM
2,393,757 UART: [exit] Launching FMC @ 0x40000130
2,399,086 UART:
2,399,102 UART: Running Caliptra FMC ...
2,399,510 UART:
2,399,564 UART: [state] CFI Enabled
2,410,529 UART: [fht] FMC Alias Private Key: 7
2,518,212 UART: [art] Extend RT PCRs Done
2,518,640 UART: [art] Lock RT PCRs Done
2,520,250 UART: [art] Populate DV Done
2,528,185 UART: [fht] FMC Alias Private Key: 7
2,529,261 UART: [art] Derive CDI
2,529,541 UART: [art] Store in in slot 0x4
2,615,450 UART: [art] Derive Key Pair
2,615,810 UART: [art] Store priv key in slot 0x5
2,628,772 UART: [art] Derive Key Pair - Done
2,643,852 UART: [art] Signing Cert with AUTHO
2,644,332 UART: RITY.KEYID = 7
2,659,252 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,017 UART: [art] PUB.X = 22E7A00B18C6C6CAE4BAC4C99C6601010B5EDC399F2D3EDBDA7F3E4193CC4BF28DE368B08094DAC3B761A53F57BB6B4E
2,666,799 UART: [art] PUB.Y = 969AAF93F24C9B75FEF8219E48AFB15824B21C3842FB7947E1FF381E6EC09BAEA5AD424F67AC4A7204B64D5929A8F82D
2,673,760 UART: [art] SIG.R = C8278E85DCE957D3D3071B08675FAB82B75D0DEE0ADEBD009271ABCC327C8B76FE9A88F5AA3ADFC12E9B05DA5D754AEC
2,680,521 UART: [art] SIG.S = 3393D5ECDB867DC3205B987C76FD8AD8081A093ED49E6D9F5AAF2FA8770747DE5B0A1C7076E2EF59D13F0312B46B6958
2,703,757 UART: mbox::rt_entry...
2,704,129 UART: ____ _ _ _ ____ _____
2,704,913 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,481 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,017 UART: |_|
2,708,329 UART:
2,815,955 UART: [rt] Runtime listening for mailbox commands...
2,817,106 >>> mbox cmd response data (0 bytes)
2,817,107 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,817,219 UART:
2,817,235 UART: Running Caliptra ROM ...
2,817,643 UART:
2,817,698 UART: [state] CFI Enabled
2,820,460 UART: [state] LifecycleState = Unprovisioned
2,821,115 UART: [state] DebugLocked = No
2,821,621 UART: [state] WD Timer not started. Device not locked for debugging
2,822,739 UART: [kat] SHA2-256
3,628,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,514 UART: [kat] ++
3,632,666 UART: [kat] sha1
3,636,908 UART: [kat] SHA2-256
3,638,848 UART: [kat] SHA2-384
3,641,565 UART: [kat] SHA2-512-ACC
3,643,465 UART: [kat] ECC-384
3,653,442 UART: [kat] HMAC-384Kdf
3,658,056 UART: [kat] LMS
3,906,384 UART: [kat] --
3,906,904 UART: [update-reset] ++
5,215,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,361 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,365,813 >>> mbox cmd response: success
5,366,008 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,022 UART: [update-reset Success] --
5,375,029 UART: [state] Locking Datavault
5,375,859 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,463 UART: [state] Locking ICCM
5,377,035 UART: [exit] Launching FMC @ 0x40000130
5,382,364 UART:
5,382,380 UART: Running Caliptra FMC ...
5,382,788 UART:
5,382,842 UART: [state] CFI Enabled
5,471,781 UART: [art] Extend RT PCRs Done
5,472,209 UART: [art] Lock RT PCRs Done
5,473,722 UART: [art] Populate DV Done
5,482,093 UART: [fht] FMC Alias Private Key: 7
5,483,191 UART: [art] Derive CDI
5,483,471 UART: [art] Store in in slot 0x4
5,568,736 UART: [art] Derive Key Pair
5,569,096 UART: [art] Store priv key in slot 0x5
5,582,516 UART: [art] Derive Key Pair - Done
5,597,632 UART: [art] Signing Cert with AUTHO
5,598,112 UART: RITY.KEYID = 7
5,613,270 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,035 UART: [art] PUB.X = 3BBBB681829EE4CC5076598CE8C0B23246B84AC55D7D205B05B715AC9106D7DB385CF322B50F36D9545F50CB86ACEA65
5,620,806 UART: [art] PUB.Y = BE1D7C5605B61A952CBF6B5AA7D3A58996D213DACFE436B8F7FA600DDD3FB608D2E7B72DAF6D77A4DCFF9306D57BE191
5,627,770 UART: [art] SIG.R = 50F1F9BAB290AB1973E400C2DC6EEFF25810A586849A23BC44F5263CBFD8C0B23146AA1F35288F9AE547EE61C64E8CA5
5,634,532 UART: [art] SIG.S = 45C0402C049AD18ADFBD5D860AC58C730855957D905C3BC1B5020027DDDB47ABDA1462D4D99C37D59FD408003BB16402
5,658,229 UART: Caliptra RT
5,658,482 UART: [state] CFI Enabled
5,939,932 UART: [rt] RT failed reset flow
5,940,363 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,013 ready_for_fw is high
1,059,013 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,160,254 >>> mbox cmd response: success
2,160,254 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,222,938 UART:
2,222,954 UART: Running Caliptra FMC ...
2,223,362 UART:
2,223,416 UART: [state] CFI Enabled
2,234,159 UART: [fht] FMC Alias Private Key: 7
2,341,472 UART: [art] Extend RT PCRs Done
2,341,900 UART: [art] Lock RT PCRs Done
2,343,706 UART: [art] Populate DV Done
2,351,735 UART: [fht] FMC Alias Private Key: 7
2,352,889 UART: [art] Derive CDI
2,353,169 UART: [art] Store in in slot 0x4
2,438,470 UART: [art] Derive Key Pair
2,438,830 UART: [art] Store priv key in slot 0x5
2,451,634 UART: [art] Derive Key Pair - Done
2,466,625 UART: [art] Signing Cert with AUTHO
2,467,105 UART: RITY.KEYID = 7
2,482,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,282 UART: [art] PUB.X = 92C019A4CBAA0D83E26C3D16649A3BCF8BE6C7C320E9D78AB13D9780A61818D18688E78676CBC6988C07B4C66E1FB96A
2,490,056 UART: [art] PUB.Y = 2D92A551638BC9061CF8F58BF3AD40A6619E4B9DC9C2945A2F6AC425E4340F2435D51009FF1C67A556423A71147DAA99
2,496,999 UART: [art] SIG.R = 2F7FB147DBFF60ADF98833A865F7C431F414B5219C816FB0EA63D62F01ED055086A9776108CE9DB6CD242A5FAC2E1A7B
2,503,774 UART: [art] SIG.S = D059E7CB0962ABACCA2446FCC50129E13DDF595307CEF7C842B55882CA5EFCC40EDF355C00AE5C30BD58E98643377035
2,527,865 UART: mbox::rt_entry...
2,528,237 UART: ____ _ _ _ ____ _____
2,529,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,821 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,357 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,125 UART: |_|
2,532,437 UART:
2,638,765 UART: [rt] Runtime listening for mailbox commands...
2,639,916 >>> mbox cmd response data (0 bytes)
2,639,917 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,074,826 >>> mbox cmd response: success
5,088,030 UART:
5,088,046 UART: Running Caliptra FMC ...
5,088,454 UART:
5,088,508 UART: [state] CFI Enabled
5,177,971 UART: [art] Extend RT PCRs Done
5,178,399 UART: [art] Lock RT PCRs Done
5,179,646 UART: [art] Populate DV Done
5,187,647 UART: [fht] FMC Alias Private Key: 7
5,188,741 UART: [art] Derive CDI
5,189,021 UART: [art] Store in in slot 0x4
5,274,950 UART: [art] Derive Key Pair
5,275,310 UART: [art] Store priv key in slot 0x5
5,288,452 UART: [art] Derive Key Pair - Done
5,303,547 UART: [art] Signing Cert with AUTHO
5,304,027 UART: RITY.KEYID = 7
5,319,291 UART: [art] Erasing AUTHORITY.KEYID = 7
5,320,056 UART: [art] PUB.X = 4D3D4EE708415243C9CC3D50B0351D049978B3961106A437D9CFC90731EDDE470C7BDCEAAABA1C22F05FDA90409C8099
5,326,821 UART: [art] PUB.Y = A76F07FB1309748906F6624D8ACF576C0786C3F1524705FF7CAB98370D61A124FB60364A33FDE8864F9E4354ED53148F
5,333,751 UART: [art] SIG.R = 76E603BB51EE44E6BC461C985309FE69F26BFAC6B6561D7C9480B64DDEAF95A725336D216366B552C68A34AE7AAF7A3B
5,340,527 UART: [art] SIG.S = 666C2E716D1F55507475777F5969D836B185A31EE9422D075187723B455A87756B063089EEF0F4D8B0FD44A68C3F9EAA
5,364,084 UART: Caliptra RT
5,364,337 UART: [state] CFI Enabled
5,647,089 UART: [rt] RT failed reset flow
5,647,520 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,896 UART: [cold-reset] ++
1,173,404 UART: [fht] FHT @ 0x50003400
1,175,999 UART: [idev] ++
1,176,167 UART: [idev] CDI.KEYID = 6
1,176,527 UART: [idev] SUBJECT.KEYID = 7
1,176,951 UART: [idev] UDS.KEYID = 0
1,177,296 ready_for_fw is high
1,177,296 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,895 UART: [idev] Erasing UDS.KEYID = 0
1,201,520 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,210,904 UART: [ldev] ++
1,211,072 UART: [ldev] CDI.KEYID = 6
1,211,435 UART: [ldev] SUBJECT.KEYID = 5
1,211,861 UART: [ldev] AUTHORITY.KEYID = 7
1,212,324 UART: [ldev] FE.KEYID = 1
1,217,620 UART: [ldev] Erasing FE.KEYID = 1
1,244,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,608 UART: [ldev] --
1,284,123 UART: [fwproc] Wait for Commands...
1,284,759 UART: [fwproc] Recv command 0x46574c44
1,285,487 UART: [fwproc] Recv'd Img size: 78456 bytes
2,172,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,103 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,311,200 >>> mbox cmd response: success
2,311,200 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,312,414 UART: [afmc] ++
2,312,582 UART: [afmc] CDI.KEYID = 6
2,312,944 UART: [afmc] SUBJECT.KEYID = 7
2,313,369 UART: [afmc] AUTHORITY.KEYID = 5
2,349,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,475 UART: [afmc] --
2,392,475 UART: [cold-reset] --
2,393,247 UART: [state] Locking Datavault
2,394,790 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,394 UART: [state] Locking ICCM
2,395,898 UART: [exit] Launching FMC @ 0x40000130
2,401,227 UART:
2,401,243 UART: Running Caliptra FMC ...
2,401,651 UART:
2,401,794 UART: [state] CFI Enabled
2,412,651 UART: [fht] FMC Alias Private Key: 7
2,520,326 UART: [art] Extend RT PCRs Done
2,520,754 UART: [art] Lock RT PCRs Done
2,522,214 UART: [art] Populate DV Done
2,530,353 UART: [fht] FMC Alias Private Key: 7
2,531,315 UART: [art] Derive CDI
2,531,595 UART: [art] Store in in slot 0x4
2,617,218 UART: [art] Derive Key Pair
2,617,578 UART: [art] Store priv key in slot 0x5
2,631,532 UART: [art] Derive Key Pair - Done
2,646,329 UART: [art] Signing Cert with AUTHO
2,646,809 UART: RITY.KEYID = 7
2,662,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,824 UART: [art] PUB.X = 45F8FF0AC5AE5105968719E3D152D20500034FD3F2C6AAB6B064A71BE7177A0628CCEF1D02EEE0BDEE3C590C2D7C25D5
2,669,567 UART: [art] PUB.Y = B8271188456298DC5368C9B9E872F94F559B154F17BC2D64A647E4EC71DD4491DDB1FA7B45688EEA4B2018D5CF7D1971
2,676,521 UART: [art] SIG.R = 2E3BCF6E563F8C88407B9D0390A10AF49CE27ACFF380350FEEDD651A6C5FD812A3EFCEED1FB512F675B6735068421636
2,683,296 UART: [art] SIG.S = AF47D464EECC034F6DBAC759ED817A7D605F068E02E50EA2DBEFE61989EF2F57D2A57A8E77630D96A6530BD7DA12E8A0
2,707,245 UART: mbox::rt_entry...
2,707,617 UART: ____ _ _ _ ____ _____
2,708,401 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,201 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,969 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,505 UART: |_|
2,711,817 UART:
2,817,669 UART: [rt] Runtime listening for mailbox commands...
2,818,820 >>> mbox cmd response data (0 bytes)
2,818,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,818,933 UART:
2,818,949 UART: Running Caliptra ROM ...
2,819,357 UART:
2,819,499 UART: [state] CFI Enabled
2,822,233 UART: [state] LifecycleState = Unprovisioned
2,822,888 UART: [state] DebugLocked = No
2,823,388 UART: [state] WD Timer not started. Device not locked for debugging
2,824,516 UART: [kat] SHA2-256
3,630,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,291 UART: [kat] ++
3,634,443 UART: [kat] sha1
3,638,645 UART: [kat] SHA2-256
3,640,585 UART: [kat] SHA2-384
3,643,468 UART: [kat] SHA2-512-ACC
3,645,368 UART: [kat] ECC-384
3,655,467 UART: [kat] HMAC-384Kdf
3,660,081 UART: [kat] LMS
3,908,409 UART: [kat] --
3,909,191 UART: [update-reset] ++
5,219,503 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,652 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,370,104 >>> mbox cmd response: success
5,370,235 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,249 UART: [update-reset Success] --
5,379,468 UART: [state] Locking Datavault
5,380,126 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,730 UART: [state] Locking ICCM
5,381,230 UART: [exit] Launching FMC @ 0x40000130
5,386,559 UART:
5,386,575 UART: Running Caliptra FMC ...
5,386,983 UART:
5,387,126 UART: [state] CFI Enabled
5,476,521 UART: [art] Extend RT PCRs Done
5,476,949 UART: [art] Lock RT PCRs Done
5,478,158 UART: [art] Populate DV Done
5,486,479 UART: [fht] FMC Alias Private Key: 7
5,487,591 UART: [art] Derive CDI
5,487,871 UART: [art] Store in in slot 0x4
5,573,572 UART: [art] Derive Key Pair
5,573,932 UART: [art] Store priv key in slot 0x5
5,587,168 UART: [art] Derive Key Pair - Done
5,601,834 UART: [art] Signing Cert with AUTHO
5,602,314 UART: RITY.KEYID = 7
5,617,834 UART: [art] Erasing AUTHORITY.KEYID = 7
5,618,599 UART: [art] PUB.X = 8626C00CF53FCD4BB2F1CABC70BD8E4D314DE8DA372C165FA7556A8D1EA882EBAB5EAEC23F5A9007FB3B19596CDDF2E5
5,625,393 UART: [art] PUB.Y = 57E0F7AE34BE2E98A138D3525E50ED43A3988A3B71ACCB6EA1E75E319B3A3CC7DFDBC19BF8135171BE6F801997222219
5,632,355 UART: [art] SIG.R = A1D114DD2772CD90A91286ADAC11A4827D8DC0ADB5468A02A8F79E134B53ABFB90FABF3424A79F61E0C150D86028596A
5,639,134 UART: [art] SIG.S = 58D24B65CBE851A3FD5ABE2C89C12B83FDC257EF13918059B9618E4555B3C5DBCD4EFA21D081EAFE9B0B9AC918F0A088
5,662,948 UART: Caliptra RT
5,663,293 UART: [state] CFI Enabled
5,944,793 UART: [rt] RT failed reset flow
5,945,224 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,974 ready_for_fw is high
1,060,974 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,161,663 >>> mbox cmd response: success
2,161,663 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,795 UART:
2,223,811 UART: Running Caliptra FMC ...
2,224,219 UART:
2,224,362 UART: [state] CFI Enabled
2,234,819 UART: [fht] FMC Alias Private Key: 7
2,343,074 UART: [art] Extend RT PCRs Done
2,343,502 UART: [art] Lock RT PCRs Done
2,345,012 UART: [art] Populate DV Done
2,353,537 UART: [fht] FMC Alias Private Key: 7
2,354,615 UART: [art] Derive CDI
2,354,895 UART: [art] Store in in slot 0x4
2,440,390 UART: [art] Derive Key Pair
2,440,750 UART: [art] Store priv key in slot 0x5
2,453,768 UART: [art] Derive Key Pair - Done
2,468,376 UART: [art] Signing Cert with AUTHO
2,468,856 UART: RITY.KEYID = 7
2,483,680 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,445 UART: [art] PUB.X = 8D81B55E87BA3DD9ECA83666B87F76F08CB2513BAD7F4F3AD1C56E97872E935FE4E25FBAE8172571E5E1516C4EE19C24
2,491,229 UART: [art] PUB.Y = C90C478A1BC3202143E9F86608CBD7646CA22B658B3FDC41CF0CAB68BE40366B0CFC0CA31E130DEDE208858AE83292F0
2,498,172 UART: [art] SIG.R = AD088D12F2BF84F8AF2D59073A244AEF174E2A3AF2478A0A294DE3D014EB0049280999C049DD2A93E03496CB1127DDB5
2,504,916 UART: [art] SIG.S = 44353ACA0C0CFC834CC81058A6D123B62E641E2CCFAF7E26F440E12FA5F57D8E3EB044ADF9D2B5DF20E618B8E226D2AD
2,528,677 UART: mbox::rt_entry...
2,529,049 UART: ____ _ _ _ ____ _____
2,529,833 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,633 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,401 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,169 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,937 UART: |_|
2,533,249 UART:
2,639,273 UART: [rt] Runtime listening for mailbox commands...
2,640,424 >>> mbox cmd response data (0 bytes)
2,640,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,074,063 >>> mbox cmd response: success
5,087,193 UART:
5,087,209 UART: Running Caliptra FMC ...
5,087,617 UART:
5,087,760 UART: [state] CFI Enabled
5,177,131 UART: [art] Extend RT PCRs Done
5,177,559 UART: [art] Lock RT PCRs Done
5,178,618 UART: [art] Populate DV Done
5,186,801 UART: [fht] FMC Alias Private Key: 7
5,187,779 UART: [art] Derive CDI
5,188,059 UART: [art] Store in in slot 0x4
5,274,066 UART: [art] Derive Key Pair
5,274,426 UART: [art] Store priv key in slot 0x5
5,287,730 UART: [art] Derive Key Pair - Done
5,302,536 UART: [art] Signing Cert with AUTHO
5,303,016 UART: RITY.KEYID = 7
5,318,474 UART: [art] Erasing AUTHORITY.KEYID = 7
5,319,239 UART: [art] PUB.X = 9423E929523BAEC4057CA914C81BB63CF5EE981DBC5609A110C49BC174D35749A535ABE6CEC57EE8E6193580E687E4A0
5,326,011 UART: [art] PUB.Y = 5D3FA6B90F484766B5DA0A0D35204272A01A49FD1560E0B2F43AD45DAE2FF1AB5710D2F154E7CEA4D52FE02AC7B7A28C
5,332,970 UART: [art] SIG.R = 83F998CD9A637A55C5515339D189FFBFDEFC3AD1802965CA5369A8FD5EEA0A390B3AA1E47E0C2581A15D60AEEE90F004
5,339,744 UART: [art] SIG.S = 400670F5AE9C0F29054715343890088E974BEAFD4C10DE65CD563CE205CF43E8346A4B06903604724D2E46C7C216F455
5,363,178 UART: Caliptra RT
5,363,523 UART: [state] CFI Enabled
5,643,517 UART: [rt] RT failed reset flow
5,643,948 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,676 UART: [state] LifecycleState = Unprovisioned
85,331 UART: [state] DebugLocked = No
86,007 UART: [state] WD Timer not started. Device not locked for debugging
87,270 UART: [kat] SHA2-256
890,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,949 UART: [kat] ++
895,101 UART: [kat] sha1
899,359 UART: [kat] SHA2-256
901,299 UART: [kat] SHA2-384
904,052 UART: [kat] SHA2-512-ACC
905,953 UART: [kat] ECC-384
915,216 UART: [kat] HMAC-384Kdf
919,720 UART: [kat] LMS
1,168,032 UART: [kat] --
1,169,003 UART: [cold-reset] ++
1,169,373 UART: [fht] FHT @ 0x50003400
1,171,819 UART: [idev] ++
1,171,987 UART: [idev] CDI.KEYID = 6
1,172,348 UART: [idev] SUBJECT.KEYID = 7
1,172,773 UART: [idev] UDS.KEYID = 0
1,173,119 ready_for_fw is high
1,173,119 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,180,767 UART: [idev] Erasing UDS.KEYID = 0
1,197,579 UART: [idev] Sha1 KeyId Algorithm
1,206,521 UART: [idev] --
1,207,688 UART: [ldev] ++
1,207,856 UART: [ldev] CDI.KEYID = 6
1,208,220 UART: [ldev] SUBJECT.KEYID = 5
1,208,647 UART: [ldev] AUTHORITY.KEYID = 7
1,209,110 UART: [ldev] FE.KEYID = 1
1,214,314 UART: [ldev] Erasing FE.KEYID = 1
1,240,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,532 UART: [ldev] --
1,279,808 UART: [fwproc] Wait for Commands...
1,280,453 UART: [fwproc] Recv command 0x46574c44
1,281,186 UART: [fwproc] Recv'd Img size: 78456 bytes
2,168,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,079 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,307,009 >>> mbox cmd response: success
2,307,009 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,308,052 UART: [afmc] ++
2,308,220 UART: [afmc] CDI.KEYID = 6
2,308,583 UART: [afmc] SUBJECT.KEYID = 7
2,309,009 UART: [afmc] AUTHORITY.KEYID = 5
2,345,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,051 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,193 UART: [afmc] --
2,388,117 UART: [cold-reset] --
2,389,083 UART: [state] Locking Datavault
2,390,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,102 UART: [state] Locking ICCM
2,391,582 UART: [exit] Launching FMC @ 0x40000130
2,396,911 UART:
2,396,927 UART: Running Caliptra FMC ...
2,397,335 UART:
2,397,389 UART: [state] CFI Enabled
2,408,010 UART: [fht] FMC Alias Private Key: 7
2,516,365 UART: [art] Extend RT PCRs Done
2,516,793 UART: [art] Lock RT PCRs Done
2,518,321 UART: [art] Populate DV Done
2,526,530 UART: [fht] FMC Alias Private Key: 7
2,527,520 UART: [art] Derive CDI
2,527,800 UART: [art] Store in in slot 0x4
2,613,429 UART: [art] Derive Key Pair
2,613,789 UART: [art] Store priv key in slot 0x5
2,627,215 UART: [art] Derive Key Pair - Done
2,642,086 UART: [art] Signing Cert with AUTHO
2,642,566 UART: RITY.KEYID = 7
2,657,390 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,155 UART: [art] PUB.X = 2C0397FB00DAC92C0FDBAF6E686573BB532C452417741BBFDDF3A3EAB50C12B8D6C14869107A041D338B64A02F4C0EA2
2,664,902 UART: [art] PUB.Y = 7C0517686AE9954F27222FBAABA7543EFA7146161DE703F4C31FAB3DE83402CB4A92BB2949AA2FA33586B2505303A05F
2,671,846 UART: [art] SIG.R = B50FFFAE20972BE5BEB0CA2FEDAA197ABF85719C19B928A9B2FEA23490A58A9DE38E55396BCEAC11F0D3F58177FDC63F
2,678,641 UART: [art] SIG.S = 6E282FD40D7DF28CFB94F2C55B8A0A341114B22E77125A44DBE7AC9843DF5F755C24531CFD86ABCDF8156829B82818A0
2,702,516 UART: mbox::rt_entry...
2,702,888 UART: ____ _ _ _ ____ _____
2,703,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,776 UART: |_|
2,707,088 UART:
2,813,630 UART: [rt] Runtime listening for mailbox commands...
2,814,781 >>> mbox cmd response data (0 bytes)
2,814,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,814,894 UART:
2,814,910 UART: Running Caliptra ROM ...
2,815,318 UART:
2,815,373 UART: [state] CFI Enabled
2,817,759 UART: [state] LifecycleState = Unprovisioned
2,818,414 UART: [state] DebugLocked = No
2,819,014 UART: [state] WD Timer not started. Device not locked for debugging
2,820,358 UART: [kat] SHA2-256
3,623,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,628,037 UART: [kat] ++
3,628,189 UART: [kat] sha1
3,632,377 UART: [kat] SHA2-256
3,634,317 UART: [kat] SHA2-384
3,637,230 UART: [kat] SHA2-512-ACC
3,639,130 UART: [kat] ECC-384
3,648,869 UART: [kat] HMAC-384Kdf
3,653,571 UART: [kat] LMS
3,901,883 UART: [kat] --
3,902,897 UART: [update-reset] ++
5,212,238 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,213,223 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,362,675 >>> mbox cmd response: success
5,362,840 UART: [update-reset] Copying MAN_2 To MAN_1
5,370,854 UART: [update-reset Success] --
5,371,753 UART: [state] Locking Datavault
5,372,615 UART: [state] Locking PCR0, PCR1 and PCR31
5,373,219 UART: [state] Locking ICCM
5,373,715 UART: [exit] Launching FMC @ 0x40000130
5,379,044 UART:
5,379,060 UART: Running Caliptra FMC ...
5,379,468 UART:
5,379,522 UART: [state] CFI Enabled
5,468,711 UART: [art] Extend RT PCRs Done
5,469,139 UART: [art] Lock RT PCRs Done
5,470,298 UART: [art] Populate DV Done
5,478,695 UART: [fht] FMC Alias Private Key: 7
5,479,825 UART: [art] Derive CDI
5,480,105 UART: [art] Store in in slot 0x4
5,565,672 UART: [art] Derive Key Pair
5,566,032 UART: [art] Store priv key in slot 0x5
5,579,632 UART: [art] Derive Key Pair - Done
5,594,469 UART: [art] Signing Cert with AUTHO
5,594,949 UART: RITY.KEYID = 7
5,610,099 UART: [art] Erasing AUTHORITY.KEYID = 7
5,610,864 UART: [art] PUB.X = 1E6C077E397F731D49D32E2D6BA3665E1F8F9D715E07749D85A1865DB25C462CA9D0465595D2FF5832E7DA4BFF0E48F3
5,617,631 UART: [art] PUB.Y = 3CCB4F9A8C7C280F350BABD7BF95A45016E4257A2F77D58359A2539FF08BDBB046AF5F73FEEA587B4CB42CD14E431EA3
5,624,595 UART: [art] SIG.R = F717CF2A8DEFA52D3DA40719E8291C8127C3818940E74C47B49966C43064F048D2C6CC2F4FB788A899C8BE6C6D498D81
5,631,366 UART: [art] SIG.S = E120766FC550DE2C369D09CF026B1DFD7EA74AAC59BCE1C071B76844A50DB0E0B2B52E9FB30CD0FDF841BCC19C134F1E
5,655,105 UART: Caliptra RT
5,655,358 UART: [state] CFI Enabled
5,939,773 UART: [rt] RT failed reset flow
5,940,204 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,664 ready_for_fw is high
1,055,664 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,156,711 >>> mbox cmd response: success
2,156,711 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,219,293 UART:
2,219,309 UART: Running Caliptra FMC ...
2,219,717 UART:
2,219,771 UART: [state] CFI Enabled
2,230,414 UART: [fht] FMC Alias Private Key: 7
2,338,041 UART: [art] Extend RT PCRs Done
2,338,469 UART: [art] Lock RT PCRs Done
2,340,069 UART: [art] Populate DV Done
2,348,198 UART: [fht] FMC Alias Private Key: 7
2,349,352 UART: [art] Derive CDI
2,349,632 UART: [art] Store in in slot 0x4
2,435,201 UART: [art] Derive Key Pair
2,435,561 UART: [art] Store priv key in slot 0x5
2,449,653 UART: [art] Derive Key Pair - Done
2,464,585 UART: [art] Signing Cert with AUTHO
2,465,065 UART: RITY.KEYID = 7
2,479,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,562 UART: [art] PUB.X = 9A1EDAEEC7E45A309C5D4D83A77810BC27B0FC942EF43FD6ADB7BD20AF873FDA3FAA92CD3F8BA5D1F370BF0EAB69B396
2,487,363 UART: [art] PUB.Y = DD3B12A65B1DB9ED3DB66989F0FDE34E80C66ACF8CE25096C68CF3261174DE42EA65BBEEC94A75FA08BB9275464BD26A
2,494,332 UART: [art] SIG.R = 00E38D117043CA7A9E78B14D16CA3D3A61FA5A6BD3D41694016EA6149101636840406C1E2DF6D3FFBEE008A326BA0DD7
2,501,076 UART: [art] SIG.S = 7217377B33CE8EB48F51A83D1653D314C635317264287B6206B4B3BBCF59F322B44F974161D9A7E78E070C1CD0DFC34B
2,524,688 UART: mbox::rt_entry...
2,525,060 UART: ____ _ _ _ ____ _____
2,525,844 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,644 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,948 UART: |_|
2,529,260 UART:
2,636,609 UART: [rt] Runtime listening for mailbox commands...
2,637,760 >>> mbox cmd response data (0 bytes)
2,637,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,067,383 >>> mbox cmd response: success
5,080,687 UART:
5,080,703 UART: Running Caliptra FMC ...
5,081,111 UART:
5,081,165 UART: [state] CFI Enabled
5,170,362 UART: [art] Extend RT PCRs Done
5,170,790 UART: [art] Lock RT PCRs Done
5,172,029 UART: [art] Populate DV Done
5,180,324 UART: [fht] FMC Alias Private Key: 7
5,181,446 UART: [art] Derive CDI
5,181,726 UART: [art] Store in in slot 0x4
5,267,501 UART: [art] Derive Key Pair
5,267,861 UART: [art] Store priv key in slot 0x5
5,281,175 UART: [art] Derive Key Pair - Done
5,295,944 UART: [art] Signing Cert with AUTHO
5,296,424 UART: RITY.KEYID = 7
5,311,404 UART: [art] Erasing AUTHORITY.KEYID = 7
5,312,169 UART: [art] PUB.X = C918BCD4F76112F9912154890EB1182F240864E877D9C94316130DDF0E2FE4BE2E9817A5C32E37697038D724F5A9275B
5,318,921 UART: [art] PUB.Y = C433D0DA3EF3AD57C24DE6511D8CEB2E2319EAEDE7A067F1BDD1949E67DC866EAF1DA9E0A6A5991B1D7034D928A06469
5,325,891 UART: [art] SIG.R = 796FBD0D4F539EFD7A501CEFECECDAB05975B1C04EC3AF9078126694122200158145C389A2B856728A33ED918583C9A2
5,332,640 UART: [art] SIG.S = DFA1FE6B781DBB879395FE9F06A5B2DEB6B16CDB9E39E9526678F8AC575D43EF324FABB429D419C098CAB6139D4AAF6F
5,356,454 UART: Caliptra RT
5,356,707 UART: [state] CFI Enabled
5,639,991 UART: [rt] RT failed reset flow
5,640,422 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 ready_for_fw is high
1,174,436 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,207,930 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,213 UART: [fwproc] Wait for Commands...
1,281,918 UART: [fwproc] Recv command 0x46574c44
1,282,651 UART: [fwproc] Recv'd Img size: 78456 bytes
2,168,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,224,990 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,306,962 >>> mbox cmd response: success
2,306,962 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,308,093 UART: [afmc] ++
2,308,261 UART: [afmc] CDI.KEYID = 6
2,308,624 UART: [afmc] SUBJECT.KEYID = 7
2,309,050 UART: [afmc] AUTHORITY.KEYID = 5
2,344,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,124 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,736 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,172 UART: [afmc] --
2,388,142 UART: [cold-reset] --
2,389,116 UART: [state] Locking Datavault
2,390,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,029 UART: [state] Locking ICCM
2,391,603 UART: [exit] Launching FMC @ 0x40000130
2,396,932 UART:
2,396,948 UART: Running Caliptra FMC ...
2,397,356 UART:
2,397,499 UART: [state] CFI Enabled
2,408,242 UART: [fht] FMC Alias Private Key: 7
2,516,267 UART: [art] Extend RT PCRs Done
2,516,695 UART: [art] Lock RT PCRs Done
2,517,997 UART: [art] Populate DV Done
2,526,218 UART: [fht] FMC Alias Private Key: 7
2,527,280 UART: [art] Derive CDI
2,527,560 UART: [art] Store in in slot 0x4
2,613,049 UART: [art] Derive Key Pair
2,613,409 UART: [art] Store priv key in slot 0x5
2,626,973 UART: [art] Derive Key Pair - Done
2,642,075 UART: [art] Signing Cert with AUTHO
2,642,555 UART: RITY.KEYID = 7
2,657,867 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,632 UART: [art] PUB.X = 1E23170BF897B16AD84D1737615749B157839A8BCF36171CD900E03D38A83C6850C2F3F3A68B0666E40CC800AF634BC9
2,665,347 UART: [art] PUB.Y = D4E6700722BA792E740B5273CA2C356DBAE820341B1DB2AF3D5A0FCC99C24251DC87C470D7CFC31B0E809DFE1109034E
2,672,291 UART: [art] SIG.R = 1803CC9AC5370F4B12CC2035605CFF5FE41630D546DE2FF14191D5D0FC42214D324F167658A2A78D501064C9F8ED9B4B
2,679,059 UART: [art] SIG.S = 04C178AD78A04691DE49746B03657318B291AB5E898E9C2D4C90E23D2ADA7579EEE25FCCEA5D037C7A7BB9339B950710
2,702,760 UART: mbox::rt_entry...
2,703,132 UART: ____ _ _ _ ____ _____
2,703,916 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,716 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,252 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,020 UART: |_|
2,707,332 UART:
2,813,162 UART: [rt] Runtime listening for mailbox commands...
2,814,313 >>> mbox cmd response data (0 bytes)
2,814,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,814,426 UART:
2,814,442 UART: Running Caliptra ROM ...
2,814,850 UART:
2,814,992 UART: [state] CFI Enabled
2,817,736 UART: [state] LifecycleState = Unprovisioned
2,818,391 UART: [state] DebugLocked = No
2,818,911 UART: [state] WD Timer not started. Device not locked for debugging
2,820,263 UART: [kat] SHA2-256
3,623,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,627,942 UART: [kat] ++
3,628,094 UART: [kat] sha1
3,632,346 UART: [kat] SHA2-256
3,634,286 UART: [kat] SHA2-384
3,637,201 UART: [kat] SHA2-512-ACC
3,639,101 UART: [kat] ECC-384
3,649,086 UART: [kat] HMAC-384Kdf
3,653,554 UART: [kat] LMS
3,901,866 UART: [kat] --
3,902,794 UART: [update-reset] ++
5,211,405 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,212,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,361,866 >>> mbox cmd response: success
5,362,153 UART: [update-reset] Copying MAN_2 To MAN_1
5,370,167 UART: [update-reset Success] --
5,371,384 UART: [state] Locking Datavault
5,372,108 UART: [state] Locking PCR0, PCR1 and PCR31
5,372,712 UART: [state] Locking ICCM
5,373,174 UART: [exit] Launching FMC @ 0x40000130
5,378,503 UART:
5,378,519 UART: Running Caliptra FMC ...
5,378,927 UART:
5,379,070 UART: [state] CFI Enabled
5,468,269 UART: [art] Extend RT PCRs Done
5,468,697 UART: [art] Lock RT PCRs Done
5,469,834 UART: [art] Populate DV Done
5,478,033 UART: [fht] FMC Alias Private Key: 7
5,478,993 UART: [art] Derive CDI
5,479,273 UART: [art] Store in in slot 0x4
5,564,874 UART: [art] Derive Key Pair
5,565,234 UART: [art] Store priv key in slot 0x5
5,578,628 UART: [art] Derive Key Pair - Done
5,593,553 UART: [art] Signing Cert with AUTHO
5,594,033 UART: RITY.KEYID = 7
5,609,383 UART: [art] Erasing AUTHORITY.KEYID = 7
5,610,148 UART: [art] PUB.X = B7738F14BD13DBDAC08BA811F1BB3855D913AFE4315998114F80D6494A6901BA64C600AEA83FF6BAD8888FCE664FDC89
5,616,907 UART: [art] PUB.Y = 62313D548102F093BF3D68D4B053F159DF6440FFCAB1F1558BC03850390A6663D57647B075FC4E4016068AC5F36915D5
5,623,842 UART: [art] SIG.R = 9AC06FAF6E6DE470E85BCB7CE98902F7448FD6A50501BC7404C105360C13E67216BFC33330EBF2BCC1C15C51A9902AA1
5,630,606 UART: [art] SIG.S = 0914FF3665BE3437E23BE1A2C3B9B366FF0A173A424CF4D5D6CD4943CA025193D0B8E116E8667897E6F53E04EB721C9A
5,654,527 UART: Caliptra RT
5,654,872 UART: [state] CFI Enabled
5,934,152 UART: [rt] RT failed reset flow
5,934,583 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,650 >>> mbox cmd response: success
2,158,650 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,221,448 UART:
2,221,464 UART: Running Caliptra FMC ...
2,221,872 UART:
2,222,015 UART: [state] CFI Enabled
2,232,584 UART: [fht] FMC Alias Private Key: 7
2,340,563 UART: [art] Extend RT PCRs Done
2,340,991 UART: [art] Lock RT PCRs Done
2,342,319 UART: [art] Populate DV Done
2,350,924 UART: [fht] FMC Alias Private Key: 7
2,351,956 UART: [art] Derive CDI
2,352,236 UART: [art] Store in in slot 0x4
2,437,771 UART: [art] Derive Key Pair
2,438,131 UART: [art] Store priv key in slot 0x5
2,450,853 UART: [art] Derive Key Pair - Done
2,465,457 UART: [art] Signing Cert with AUTHO
2,465,937 UART: RITY.KEYID = 7
2,481,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,928 UART: [art] PUB.X = B095A87682E1AEDF08A8756BD3F17F61893E3B78C5460031E92CF79F75FF32A2806D2EFDE89E5A809084D8A92AC0F427
2,488,679 UART: [art] PUB.Y = 9C1A8FCAEDF4BF0504D995D58FBD5A60DD5E07FA11928E2CAE02683B4A77E8188E86E41C9A46F687C9AB286398BCAE6D
2,495,637 UART: [art] SIG.R = E835360DE5E60CFEDC39C7326ABA5C6A0D72C778999455551DE01DB945776B4987F72178CD99A25CDDA1D2C362438EC5
2,502,404 UART: [art] SIG.S = C6AF69CEBA4D07E5B40F5D7B722B34C47003E88C6C95A969856FD22DED0DBF566306D60948C02B901FD4D3E5E0CC6E37
2,525,239 UART: mbox::rt_entry...
2,525,611 UART: ____ _ _ _ ____ _____
2,526,395 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,195 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,963 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,731 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,499 UART: |_|
2,529,811 UART:
2,637,072 UART: [rt] Runtime listening for mailbox commands...
2,638,223 >>> mbox cmd response data (0 bytes)
2,638,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,065,593 >>> mbox cmd response: success
5,078,811 UART:
5,078,827 UART: Running Caliptra FMC ...
5,079,235 UART:
5,079,378 UART: [state] CFI Enabled
5,168,137 UART: [art] Extend RT PCRs Done
5,168,565 UART: [art] Lock RT PCRs Done
5,169,968 UART: [art] Populate DV Done
5,178,249 UART: [fht] FMC Alias Private Key: 7
5,179,239 UART: [art] Derive CDI
5,179,519 UART: [art] Store in in slot 0x4
5,264,840 UART: [art] Derive Key Pair
5,265,200 UART: [art] Store priv key in slot 0x5
5,279,222 UART: [art] Derive Key Pair - Done
5,293,859 UART: [art] Signing Cert with AUTHO
5,294,339 UART: RITY.KEYID = 7
5,309,989 UART: [art] Erasing AUTHORITY.KEYID = 7
5,310,754 UART: [art] PUB.X = B2A2457BA466B91535A011EB863ECD389F3822E5E3470439CFE50B765FB58BBCBF51BD6C45DC0F7DFF39BE553F670C87
5,317,526 UART: [art] PUB.Y = 1531F2A636E96C29B05095DBB8114F35A5D2EA61F120E9AC4828742163819789D3A3AD2B1507B152D753A14C1FC41FF2
5,324,471 UART: [art] SIG.R = 9FA1F4677D342BCC434751D501B241C41D53CBC2071BED9B008D45CAA45DC0AEAEEF1AECBEEBE5601D1803AFBB83AB51
5,331,238 UART: [art] SIG.S = 402CD41FBB79907C70B0E3CDB9CDE17D1B7E7A407EC86EE2AAB3FAF57C73D019E26B5F4BC90CAE75DFAEC8A649D5A3D8
5,355,118 UART: Caliptra RT
5,355,463 UART: [state] CFI Enabled
5,639,055 UART: [rt] RT failed reset flow
5,639,486 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
191,980 UART:
192,345 UART: Running Caliptra ROM ...
193,433 UART:
193,578 UART: [state] CFI Enabled
261,950 UART: [state] LifecycleState = Unprovisioned
263,813 UART: [state] DebugLocked = No
265,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,577 UART: [kat] SHA2-256
440,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,788 UART: [kat] ++
451,237 UART: [kat] sha1
461,897 UART: [kat] SHA2-256
464,618 UART: [kat] SHA2-384
470,398 UART: [kat] SHA2-512-ACC
472,776 UART: [kat] ECC-384
2,767,434 UART: [kat] HMAC-384Kdf
2,779,533 UART: [kat] LMS
3,969,896 UART: [kat] --
3,974,420 UART: [cold-reset] ++
3,976,931 UART: [fht] Storing FHT @ 0x50003400
3,987,350 UART: [idev] ++
3,987,911 UART: [idev] CDI.KEYID = 6
3,988,886 UART: [idev] SUBJECT.KEYID = 7
3,990,060 UART: [idev] UDS.KEYID = 0
3,991,027 ready_for_fw is high
3,991,225 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,090,129 UART: [idev] Erasing UDS.KEYID = 0
7,326,388 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,298 UART: [idev] --
7,353,372 UART: [ldev] ++
7,353,994 UART: [ldev] CDI.KEYID = 6
7,354,904 UART: [ldev] SUBJECT.KEYID = 5
7,356,115 UART: [ldev] AUTHORITY.KEYID = 7
7,357,398 UART: [ldev] FE.KEYID = 1
7,402,020 UART: [ldev] Erasing FE.KEYID = 1
10,734,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,292 UART: [ldev] --
13,097,556 UART: [fwproc] Waiting for Commands...
13,099,335 UART: [fwproc] Received command 0x46574c44
13,101,520 UART: [fwproc] Received Image of size 78492 bytes
16,718,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,784,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,853,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,045,864 >>> mbox cmd response: success
17,046,336 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,050,795 UART: [afmc] ++
17,051,380 UART: [afmc] CDI.KEYID = 6
17,052,293 UART: [afmc] SUBJECT.KEYID = 7
17,053,565 UART: [afmc] AUTHORITY.KEYID = 5
20,411,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,714,724 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,716,984 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,731,408 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,746,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,760,723 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,782,076 UART: [afmc] --
22,786,213 UART: [cold-reset] --
22,791,529 UART: [state] Locking Datavault
22,795,480 UART: [state] Locking PCR0, PCR1 and PCR31
22,797,235 UART: [state] Locking ICCM
22,799,116 UART: [exit] Launching FMC @ 0x40000130
22,807,509 UART:
22,807,750 UART: Running Caliptra FMC ...
22,808,850 UART:
22,809,012 UART: [state] CFI Enabled
22,874,055 UART: [fht] FMC Alias Private Key: 7
25,212,226 UART: [art] Extend RT PCRs Done
25,213,460 UART: [art] Lock RT PCRs Done
25,214,870 UART: [art] Populate DV Done
25,220,497 UART: [fht] FMC Alias Private Key: 7
25,222,090 UART: [art] Derive CDI
25,222,908 UART: [art] Store in in slot 0x4
25,283,170 UART: [art] Derive Key Pair
25,284,210 UART: [art] Store priv key in slot 0x5
28,576,784 UART: [art] Derive Key Pair - Done
28,589,773 UART: [art] Signing Cert with AUTHO
28,591,109 UART: RITY.KEYID = 7
30,878,808 UART: [art] Erasing AUTHORITY.KEYID = 7
30,880,319 UART: [art] PUB.X = 820246F4D5041C3AF4D3FD13C7E5AF15F389762D0A30383D093FB41EB0D15122865B5417CE13CF9C2DDE0D35923A6288
30,887,561 UART: [art] PUB.Y = 27A847052FF1763C37E4B2E9B43FDFE06C5754F908455018654556FF7602FDB294C77293F849A0C79E069CFF9F7B7AF9
30,894,791 UART: [art] SIG.R = 8284733F0A0C6075408806F0D31B9F4D6F91742B14CF41E337AADC67EFD7ABB9EAA9DC9C26D434BFB08B4D8B24720D66
30,902,186 UART: [art] SIG.S = 03C24609FED06E8122F0E477B886CA0D717C1E34DE38B2405D73BEE6B2D204017EF58C7984BF23177D618F707FD6A192
32,206,840 UART: mbox::rt_entry...
32,207,786 UART: ____ _ _ _ ____ _____
32,209,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,211,776 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,213,704 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,215,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,217,558 UART: |_|
32,218,389 UART:
32,330,647 UART: [rt] Runtime listening for mailbox commands...
32,336,494 >>> mbox cmd response data (3272 bytes)
32,352,354 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,385,758 >>> mbox cmd response data (0 bytes)
34,445,055 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,588,822 UART:
34,589,194 UART: Running Caliptra ROM ...
34,591,061 UART:
34,591,238 UART: [state] CFI Enabled
34,653,751 UART: [state] LifecycleState = Unprovisioned
34,655,653 UART: [state] DebugLocked = No
34,657,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,662,312 UART: [kat] SHA2-256
34,832,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,842,500 UART: [kat] ++
34,842,982 UART: [kat] sha1
34,854,520 UART: [kat] SHA2-256
34,857,214 UART: [kat] SHA2-384
34,862,252 UART: [kat] SHA2-512-ACC
34,864,664 UART: [kat] ECC-384
37,160,079 UART: [kat] HMAC-384Kdf
37,190,513 UART: [kat] LMS
38,380,864 UART: [kat] --
38,384,999 UART: [update-reset] ++
42,520,416 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,523,984 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,904,973 >>> mbox cmd response: success
42,910,514 UART: [update-reset] Copying MAN_2 To MAN_1
42,927,847 UART: [update-reset Success] --
42,931,021 UART: [state] Locking Datavault
42,933,442 UART: [state] Locking PCR0, PCR1 and PCR31
42,935,155 UART: [state] Locking ICCM
42,936,877 UART: [exit] Launching FMC @ 0x40000130
42,945,337 UART:
42,945,578 UART: Running Caliptra FMC ...
42,946,679 UART:
42,946,838 UART: [state] CFI Enabled
43,048,683 UART: [art] Extend RT PCRs Done
43,049,886 UART: [art] Lock RT PCRs Done
43,051,508 UART: [art] Populate DV Done
43,057,240 UART: [fht] FMC Alias Private Key: 7
43,058,774 UART: [art] Derive CDI
43,059,592 UART: [art] Store in in slot 0x4
43,117,707 UART: [art] Derive Key Pair
43,118,745 UART: [art] Store priv key in slot 0x5
46,411,673 UART: [art] Derive Key Pair - Done
46,424,635 UART: [art] Signing Cert with AUTHO
46,425,947 UART: RITY.KEYID = 7
48,714,193 UART: [art] Erasing AUTHORITY.KEYID = 7
48,715,705 UART: [art] PUB.X = 4364A95EDF81227D1D3AA2F85843D5208C69518FF776A56B221DE6CE35D11330476A021978B95FE4E613CF9CE0293578
48,722,919 UART: [art] PUB.Y = 7317A749DA10CEEFD3BC830DD93653B8C319B2A3B994E0DA0E3FA3BD09C09940F3252C6C5C127252D604CC1CC6030637
48,730,170 UART: [art] SIG.R = 384A5E479484B3EC5F197BFC656872CAA545BD4FBADEF65C21D9863DB7FD2012067AEDB8A88D35894CB86977DBDA6B38
48,737,525 UART: [art] SIG.S = 652504E8EC4F97189F42C115E73BDB1CC61263C51AFF9D8BC43F6ECDCC47BD13E3EACBAEBEC250694E0E74CB759F5844
50,043,473 UART: Caliptra RT
50,044,192 UART: [state] CFI Enabled
53,665,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,667,356 UART: [rt] RT listening for mailbox commands...
53,698,806 UART: [rt]cmd =0x494e464f, len=4
53,703,347 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,784,495 ready_for_fw is high
3,784,881 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,136,361 >>> mbox cmd response: success
17,137,111 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,819,235 UART:
22,819,622 UART: Running Caliptra FMC ...
22,820,822 UART:
22,820,992 UART: [state] CFI Enabled
22,890,377 UART: [fht] FMC Alias Private Key: 7
25,228,904 UART: [art] Extend RT PCRs Done
25,230,125 UART: [art] Lock RT PCRs Done
25,231,857 UART: [art] Populate DV Done
25,237,172 UART: [fht] FMC Alias Private Key: 7
25,238,767 UART: [art] Derive CDI
25,239,580 UART: [art] Store in in slot 0x4
25,298,496 UART: [art] Derive Key Pair
25,299,536 UART: [art] Store priv key in slot 0x5
28,592,563 UART: [art] Derive Key Pair - Done
28,605,566 UART: [art] Signing Cert with AUTHO
28,606,872 UART: RITY.KEYID = 7
30,893,941 UART: [art] Erasing AUTHORITY.KEYID = 7
30,895,448 UART: [art] PUB.X = 339C1FA4E830172FF0948792D5A8CED401EB0091EE58A467E318FCEAE0F0FDF952AEF1318D6CBFDC667EB26D50FFAB33
30,902,714 UART: [art] PUB.Y = D7D3800D5236E198EFA8763074A356C9470813FB845AD03B8B136B247B7F437095DBAA94440645766D82594E7FFB071F
30,909,951 UART: [art] SIG.R = 683C103B68432F9C5625868EC2AD1C15A2A894D8E5311BBF2E08166D9A013A56F35F883836A9A27D0D234E4D249F51EB
30,917,371 UART: [art] SIG.S = 09FA14EE45AEF4BEADFC75A8C12BBB94725CD58FCCD957B76E6A07D0987F6AE3272D116C6EB2AB9EC1A9A389537F7EA0
32,222,240 UART: mbox::rt_entry...
32,223,204 UART: ____ _ _ _ ____ _____
32,225,322 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,227,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,229,231 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,231,191 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,233,049 UART: |_|
32,233,882 UART:
32,347,272 UART: [rt] Runtime listening for mailbox commands...
32,353,125 >>> mbox cmd response data (3272 bytes)
32,368,815 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,402,218 >>> mbox cmd response data (0 bytes)
34,460,480 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,191,682 >>> mbox cmd response: success
43,227,302 UART:
43,227,612 UART: Running Caliptra FMC ...
43,228,657 UART:
43,228,808 UART: [state] CFI Enabled
43,316,978 UART: [art] Extend RT PCRs Done
43,318,172 UART: [art] Lock RT PCRs Done
43,319,826 UART: [art] Populate DV Done
43,325,504 UART: [fht] FMC Alias Private Key: 7
43,327,156 UART: [art] Derive CDI
43,327,898 UART: [art] Store in in slot 0x4
43,386,289 UART: [art] Derive Key Pair
43,387,332 UART: [art] Store priv key in slot 0x5
46,679,316 UART: [art] Derive Key Pair - Done
46,691,959 UART: [art] Signing Cert with AUTHO
46,693,265 UART: RITY.KEYID = 7
48,981,999 UART: [art] Erasing AUTHORITY.KEYID = 7
48,983,511 UART: [art] PUB.X = 9FA8254C64CED551069B39329C06D964330A5D1C0C0DA64F390E5EE7A089F659FA356486EFB1579B2C1F5F950378FBEA
48,990,778 UART: [art] PUB.Y = AFE1483F2EE13F59A68DEEA8F8CFA6A15CA4AF6242EFC569DEC2B16C0474673009874996996E34ECEBF0E35AA4090A80
48,998,013 UART: [art] SIG.R = 90DFFCC851C1990A390DAEE165BDFD8DE5AEFF6EF5C9DE15FED1021B2C27CCB409305C6A6A9B350AFD08B4DACCCD5635
49,005,465 UART: [art] SIG.S = CC90FA045E84DFB9B9174DC099474365E90AE549D409281259434C820D257EA4A30212287B031F9E0934A2D359E4885E
50,310,636 UART: Caliptra RT
50,311,351 UART: [state] CFI Enabled
53,910,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,912,076 UART: [rt] RT listening for mailbox commands...
53,943,356 UART: [rt]cmd =0x494e464f, len=4
53,947,586 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
192,865 UART:
193,231 UART: Running Caliptra ROM ...
194,421 UART:
604,143 UART: [state] CFI Enabled
619,514 UART: [state] LifecycleState = Unprovisioned
621,452 UART: [state] DebugLocked = No
624,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,902 UART: [kat] SHA2-256
798,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,218 UART: [kat] ++
809,745 UART: [kat] sha1
821,262 UART: [kat] SHA2-256
823,984 UART: [kat] SHA2-384
828,974 UART: [kat] SHA2-512-ACC
831,333 UART: [kat] ECC-384
3,116,972 UART: [kat] HMAC-384Kdf
3,128,665 UART: [kat] LMS
4,318,778 UART: [kat] --
4,323,719 UART: [cold-reset] ++
4,326,081 UART: [fht] Storing FHT @ 0x50003400
4,337,135 UART: [idev] ++
4,337,705 UART: [idev] CDI.KEYID = 6
4,338,612 UART: [idev] SUBJECT.KEYID = 7
4,339,849 UART: [idev] UDS.KEYID = 0
4,340,829 ready_for_fw is high
4,341,014 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,439,665 UART: [idev] Erasing UDS.KEYID = 0
7,627,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,038 UART: [idev] --
7,653,012 UART: [ldev] ++
7,653,598 UART: [ldev] CDI.KEYID = 6
7,654,560 UART: [ldev] SUBJECT.KEYID = 5
7,655,785 UART: [ldev] AUTHORITY.KEYID = 7
7,657,020 UART: [ldev] FE.KEYID = 1
7,666,908 UART: [ldev] Erasing FE.KEYID = 1
10,953,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,220 UART: [ldev] --
13,314,097 UART: [fwproc] Waiting for Commands...
13,315,815 UART: [fwproc] Received command 0x46574c44
13,317,998 UART: [fwproc] Received Image of size 78492 bytes
16,923,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,995,779 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,064,660 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,257,797 >>> mbox cmd response: success
17,258,276 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,262,836 UART: [afmc] ++
17,263,422 UART: [afmc] CDI.KEYID = 6
17,264,387 UART: [afmc] SUBJECT.KEYID = 7
17,265,601 UART: [afmc] AUTHORITY.KEYID = 5
20,580,555 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,877,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,879,865 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,894,250 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,909,067 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,923,504 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,946,174 UART: [afmc] --
22,950,698 UART: [cold-reset] --
22,952,989 UART: [state] Locking Datavault
22,956,724 UART: [state] Locking PCR0, PCR1 and PCR31
22,958,475 UART: [state] Locking ICCM
22,959,560 UART: [exit] Launching FMC @ 0x40000130
22,967,962 UART:
22,968,193 UART: Running Caliptra FMC ...
22,969,299 UART:
22,969,452 UART: [state] CFI Enabled
22,977,817 UART: [fht] FMC Alias Private Key: 7
25,308,842 UART: [art] Extend RT PCRs Done
25,310,067 UART: [art] Lock RT PCRs Done
25,311,934 UART: [art] Populate DV Done
25,317,229 UART: [fht] FMC Alias Private Key: 7
25,318,761 UART: [art] Derive CDI
25,319,488 UART: [art] Store in in slot 0x4
25,361,922 UART: [art] Derive Key Pair
25,362,960 UART: [art] Store priv key in slot 0x5
28,605,087 UART: [art] Derive Key Pair - Done
28,617,865 UART: [art] Signing Cert with AUTHO
28,619,183 UART: RITY.KEYID = 7
30,898,802 UART: [art] Erasing AUTHORITY.KEYID = 7
30,900,309 UART: [art] PUB.X = 9323FDE841F7810B1C280AC96C641F58C237120FD8B6D05A083A71F36F55175409003685E7CD451455722AA9CE1535CB
30,907,518 UART: [art] PUB.Y = DC5E1BB3B8D814D727E79702CBF16A6E08A743DA6A2C182A6489847A9B583063EA8E3BC15ADF65F1C464D4F1D0AC3408
30,914,769 UART: [art] SIG.R = 3FD4ADE95236DF144AF477CCF5AB0A7AFFE08B7E0568106EBCD26B4384FF107BA587B005A012FF4DC49886A482FA69AA
30,922,182 UART: [art] SIG.S = E4F0772E322D71234C3C667B4A70E0C83522F89DFD982917FED9537F165712CBDBDB3558E3C072A7BD125F7EA6F7090B
32,226,900 UART: mbox::rt_entry...
32,227,837 UART: ____ _ _ _ ____ _____
32,229,945 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,231,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,233,799 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,235,718 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,237,566 UART: |_|
32,238,441 UART:
32,351,076 UART: [rt] Runtime listening for mailbox commands...
32,356,923 >>> mbox cmd response data (3272 bytes)
32,372,786 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,406,183 >>> mbox cmd response data (0 bytes)
34,464,597 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,608,493 UART:
34,608,854 UART: Running Caliptra ROM ...
34,609,905 UART:
34,610,110 UART: [state] CFI Enabled
34,624,761 UART: [state] LifecycleState = Unprovisioned
34,626,709 UART: [state] DebugLocked = No
34,628,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,633,461 UART: [kat] SHA2-256
34,803,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,813,724 UART: [kat] ++
34,814,181 UART: [kat] sha1
34,826,518 UART: [kat] SHA2-256
34,829,259 UART: [kat] SHA2-384
34,835,413 UART: [kat] SHA2-512-ACC
34,837,815 UART: [kat] ECC-384
37,122,206 UART: [kat] HMAC-384Kdf
37,134,010 UART: [kat] LMS
38,324,057 UART: [kat] --
38,329,628 UART: [update-reset] ++
42,460,466 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,463,558 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,844,600 >>> mbox cmd response: success
42,849,261 UART: [update-reset] Copying MAN_2 To MAN_1
42,867,619 UART: [update-reset Success] --
42,873,542 UART: [state] Locking Datavault
42,876,145 UART: [state] Locking PCR0, PCR1 and PCR31
42,877,904 UART: [state] Locking ICCM
42,880,189 UART: [exit] Launching FMC @ 0x40000130
42,888,632 UART:
42,888,863 UART: Running Caliptra FMC ...
42,889,898 UART:
42,890,036 UART: [state] CFI Enabled
42,934,106 UART: [art] Extend RT PCRs Done
42,935,294 UART: [art] Lock RT PCRs Done
42,936,397 UART: [art] Populate DV Done
42,941,871 UART: [fht] FMC Alias Private Key: 7
42,943,406 UART: [art] Derive CDI
42,944,136 UART: [art] Store in in slot 0x4
42,986,723 UART: [art] Derive Key Pair
42,987,721 UART: [art] Store priv key in slot 0x5
46,229,389 UART: [art] Derive Key Pair - Done
46,242,498 UART: [art] Signing Cert with AUTHO
46,243,805 UART: RITY.KEYID = 7
48,523,456 UART: [art] Erasing AUTHORITY.KEYID = 7
48,525,099 UART: [art] PUB.X = 27091E3F0E6427CC24AD4706E301B29A278B4AB42BB9C9EBF30375E907F4007CAD3F200A4478EA7243905033F28F7A35
48,532,201 UART: [art] PUB.Y = F95986F5A9CC261E4CCB8D79D51A5A53080E9168A4E275C531285DBEE7A661CE574E0B0A084A87920FBFF894DC26EC06
48,539,446 UART: [art] SIG.R = C9BCCFD6B5F5FACE4501F76D5CAAE26F132F009E27DD1E0BC17E8017EF01F46B80E9D21494A73CBD52EB3324F7261C1D
48,546,870 UART: [art] SIG.S = BCAF2DFD662EA1EEF28C7C7063095E1559A62A91CE5697FE3E6364BA88D15218F70AE6CA77D2F91F63E1145FB83EB73C
49,852,095 UART: Caliptra RT
49,852,813 UART: [state] CFI Enabled
53,374,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,375,525 UART: [rt] RT listening for mailbox commands...
53,406,916 UART: [rt]cmd =0x494e464f, len=4
53,411,169 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
4,129,645 ready_for_fw is high
4,130,023 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,347,829 >>> mbox cmd response: success
17,348,529 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,989,710 UART:
22,990,101 UART: Running Caliptra FMC ...
22,991,230 UART:
22,991,379 UART: [state] CFI Enabled
22,999,307 UART: [fht] FMC Alias Private Key: 7
25,330,645 UART: [art] Extend RT PCRs Done
25,331,919 UART: [art] Lock RT PCRs Done
25,333,356 UART: [art] Populate DV Done
25,338,672 UART: [fht] FMC Alias Private Key: 7
25,340,233 UART: [art] Derive CDI
25,340,968 UART: [art] Store in in slot 0x4
25,384,001 UART: [art] Derive Key Pair
25,385,055 UART: [art] Store priv key in slot 0x5
28,626,465 UART: [art] Derive Key Pair - Done
28,639,401 UART: [art] Signing Cert with AUTHO
28,640,737 UART: RITY.KEYID = 7
30,919,922 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,435 UART: [art] PUB.X = 991E420B90903A2C0E72C8BAEF983E8D4F49278C35BD581899145B838AB17308EBD184BE303D3A2410B2447D78C575FA
30,928,669 UART: [art] PUB.Y = E82BB240B2B755043EC354A749D1515D7943021FBD90E9DE9E70EF734786FD68D845A46B783532C8D174D6D478F873B5
30,935,869 UART: [art] SIG.R = C6EAB606513D365AB8BE4F75FE0E73250E004F4A098A850F0BF5AD4FADA43C07686A5A40B7C5046662BED4196F27F985
30,943,260 UART: [art] SIG.S = 33B1BD9C3402660F12F03A94DF06BF8250CA58AF06DC1A9AD77C1B710459BE3992797FB3C391559B787E753CE9AE6FEE
32,247,860 UART: mbox::rt_entry...
32,248,807 UART: ____ _ _ _ ____ _____
32,250,903 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,774 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,586 UART: |_|
32,259,463 UART:
32,372,272 UART: [rt] Runtime listening for mailbox commands...
32,378,117 >>> mbox cmd response data (3272 bytes)
32,393,874 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,427,938 >>> mbox cmd response data (0 bytes)
34,484,858 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,128,463 >>> mbox cmd response: success
43,164,696 UART:
43,165,015 UART: Running Caliptra FMC ...
43,166,085 UART:
43,166,236 UART: [state] CFI Enabled
43,210,761 UART: [art] Extend RT PCRs Done
43,211,949 UART: [art] Lock RT PCRs Done
43,213,566 UART: [art] Populate DV Done
43,219,029 UART: [fht] FMC Alias Private Key: 7
43,220,620 UART: [art] Derive CDI
43,221,434 UART: [art] Store in in slot 0x4
43,264,186 UART: [art] Derive Key Pair
43,265,183 UART: [art] Store priv key in slot 0x5
46,507,919 UART: [art] Derive Key Pair - Done
46,520,818 UART: [art] Signing Cert with AUTHO
46,522,129 UART: RITY.KEYID = 7
48,801,853 UART: [art] Erasing AUTHORITY.KEYID = 7
48,803,361 UART: [art] PUB.X = 85FEFB0BF0A9B981465AA9E3FD64871E1F1BB53B9E250086EABE0AA19389918522025872080921E388550E6E7A2EA9E1
48,810,601 UART: [art] PUB.Y = 2357457A712F84E5023DA0420C62C85D08E8F82D77CD8071D2D3116658D3610B3FB12275E71381FF7A4F546BDEBA012E
48,817,843 UART: [art] SIG.R = D59231EF2A622F5F54151FBAF600B5C4F4B8E8D05497900B96D6715AE22B01113898CFA74C53E7913242A4791CE64AC5
48,825,170 UART: [art] SIG.S = 0AF1334450196F2E80D444C15D9EF2AD42B05820E4643E661EFD8FCEA7C226D1A2A4B75EEBE4872DD76AC5064FB91E73
50,130,307 UART: Caliptra RT
50,131,026 UART: [state] CFI Enabled
53,644,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,645,867 UART: [rt] RT listening for mailbox commands...
53,677,105 UART: [rt]cmd =0x494e464f, len=4
53,681,261 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,536 UART:
192,909 UART: Running Caliptra ROM ...
194,006 UART:
194,159 UART: [state] CFI Enabled
265,145 UART: [state] LifecycleState = Unprovisioned
267,061 UART: [state] DebugLocked = No
268,515 UART: [state] WD Timer not started. Device not locked for debugging
272,761 UART: [kat] SHA2-256
451,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,401 UART: [kat] ++
463,847 UART: [kat] sha1
474,930 UART: [kat] SHA2-256
478,000 UART: [kat] SHA2-384
483,568 UART: [kat] SHA2-512-ACC
486,505 UART: [kat] ECC-384
2,946,884 UART: [kat] HMAC-384Kdf
2,972,563 UART: [kat] LMS
3,502,014 UART: [kat] --
3,506,151 UART: [cold-reset] ++
3,507,157 UART: [fht] FHT @ 0x50003400
3,518,003 UART: [idev] ++
3,518,567 UART: [idev] CDI.KEYID = 6
3,519,481 UART: [idev] SUBJECT.KEYID = 7
3,520,651 UART: [idev] UDS.KEYID = 0
3,521,572 ready_for_fw is high
3,521,755 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,620,719 UART: [idev] Erasing UDS.KEYID = 0
6,025,786 UART: [idev] Sha1 KeyId Algorithm
6,048,371 UART: [idev] --
6,053,232 UART: [ldev] ++
6,053,806 UART: [ldev] CDI.KEYID = 6
6,054,723 UART: [ldev] SUBJECT.KEYID = 5
6,055,881 UART: [ldev] AUTHORITY.KEYID = 7
6,057,163 UART: [ldev] FE.KEYID = 1
6,099,667 UART: [ldev] Erasing FE.KEYID = 1
8,603,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,714 UART: [ldev] --
10,412,951 UART: [fwproc] Wait for Commands...
10,415,029 UART: [fwproc] Recv command 0x46574c44
10,417,161 UART: [fwproc] Recv'd Img size: 78456 bytes
13,376,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,448,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,517,432 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,709,308 >>> mbox cmd response: success
13,709,778 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,713,092 UART: [afmc] ++
13,713,683 UART: [afmc] CDI.KEYID = 6
13,714,757 UART: [afmc] SUBJECT.KEYID = 7
13,715,881 UART: [afmc] AUTHORITY.KEYID = 5
16,252,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,976,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,977,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,993,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,009,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,025,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,047,531 UART: [afmc] --
18,050,582 UART: [cold-reset] --
18,054,875 UART: [state] Locking Datavault
18,057,746 UART: [state] Locking PCR0, PCR1 and PCR31
18,059,391 UART: [state] Locking ICCM
18,061,217 UART: [exit] Launching FMC @ 0x40000130
18,069,614 UART:
18,069,847 UART: Running Caliptra FMC ...
18,070,944 UART:
18,071,123 UART: [state] CFI Enabled
18,135,776 UART: [fht] FMC Alias Private Key: 7
19,899,525 UART: [art] Extend RT PCRs Done
19,900,738 UART: [art] Lock RT PCRs Done
19,902,370 UART: [art] Populate DV Done
19,907,890 UART: [fht] FMC Alias Private Key: 7
19,909,421 UART: [art] Derive CDI
19,910,232 UART: [art] Store in in slot 0x4
19,968,368 UART: [art] Derive Key Pair
19,969,425 UART: [art] Store priv key in slot 0x5
22,432,941 UART: [art] Derive Key Pair - Done
22,446,048 UART: [art] Signing Cert with AUTHO
22,447,352 UART: RITY.KEYID = 7
24,158,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,160,407 UART: [art] PUB.X = 42192A807841D9C584E1C162F5949BB4B6FB6CCACA7DD0ECE6D182955AA7E671BCC637E67FC097654FC03E93AA3DDB0C
24,167,685 UART: [art] PUB.Y = F3F5009412230146445BC5A546CA39E89C9A123D6915ADAA3ED660C8D0BBDC2169376C8E87459AE659F8ADEDE74D83A4
24,174,997 UART: [art] SIG.R = D71C645B76B9B98D7A9B9E99DA1ACC2D358C0A069B17E225CB32557AC23D42F053195A72626702D7BE4146C6CFB6922A
24,182,341 UART: [art] SIG.S = 1D682D0885B49194B335728B84EEFAD378B7A503210C259E410D60508FE6FD27ACB04447CE42A195EABCB21519DCB27B
25,160,994 UART: mbox::rt_entry...
25,161,972 UART: ____ _ _ _ ____ _____
25,163,956 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,165,959 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,167,886 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,169,810 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,171,732 UART: |_|
25,172,539 UART:
25,285,770 UART: [rt] Runtime listening for mailbox commands...
25,291,613 >>> mbox cmd response data (3272 bytes)
25,307,355 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,340,798 >>> mbox cmd response data (0 bytes)
27,401,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,545,743 UART:
27,546,104 UART: Running Caliptra ROM ...
27,547,157 UART:
27,547,311 UART: [state] CFI Enabled
27,608,745 UART: [state] LifecycleState = Unprovisioned
27,610,785 UART: [state] DebugLocked = No
27,612,479 UART: [state] WD Timer not started. Device not locked for debugging
27,616,281 UART: [kat] SHA2-256
27,795,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,806,944 UART: [kat] ++
27,807,399 UART: [kat] sha1
27,819,917 UART: [kat] SHA2-256
27,822,942 UART: [kat] SHA2-384
27,828,549 UART: [kat] SHA2-512-ACC
27,831,497 UART: [kat] ECC-384
30,277,477 UART: [kat] HMAC-384Kdf
30,298,567 UART: [kat] LMS
30,828,005 UART: [kat] --
30,832,376 UART: [update-reset] ++
34,254,882 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,257,882 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,639,877 >>> mbox cmd response: success
34,644,512 UART: [update-reset] Copying MAN_2 To MAN_1
34,663,511 UART: [update-reset Success] --
34,668,233 UART: [state] Locking Datavault
34,671,062 UART: [state] Locking PCR0, PCR1 and PCR31
34,672,766 UART: [state] Locking ICCM
34,674,455 UART: [exit] Launching FMC @ 0x40000130
34,682,849 UART:
34,683,085 UART: Running Caliptra FMC ...
34,684,516 UART:
34,684,681 UART: [state] CFI Enabled
34,790,265 UART: [art] Extend RT PCRs Done
34,791,463 UART: [art] Lock RT PCRs Done
34,793,188 UART: [art] Populate DV Done
34,798,918 UART: [fht] FMC Alias Private Key: 7
34,800,453 UART: [art] Derive CDI
34,801,265 UART: [art] Store in in slot 0x4
34,859,298 UART: [art] Derive Key Pair
34,860,373 UART: [art] Store priv key in slot 0x5
37,323,311 UART: [art] Derive Key Pair - Done
37,336,004 UART: [art] Signing Cert with AUTHO
37,337,321 UART: RITY.KEYID = 7
39,049,133 UART: [art] Erasing AUTHORITY.KEYID = 7
39,050,759 UART: [art] PUB.X = 14EA38F195923F83099DA23C498B169698E6C797DA0124E24DA484452CD531EC77726B3B02D11E0591079D58CB7B8443
39,057,900 UART: [art] PUB.Y = 1CEABCD667C5B7934A39CE791C7B2DD32A682EA26A70BB8F96BB08A471C495795C8BBA1E544C1F24E6CC49F39B4161AE
39,065,172 UART: [art] SIG.R = C984C4F92B8876F9DD78CD67ACBE74B14A32ADEE4E061E4BC72C6148C75F3BD33A6D581DC2B8C79699511BD2951D2C7A
39,072,546 UART: [art] SIG.S = 53AB1607726F3694F9AC7D55F5F8F0D9EFD44C181C9A1B2D4EEF167BD473B6D7BFA4F484C389486F91F345B4B1E4C951
40,052,136 UART: Caliptra RT
40,052,850 UART: [state] CFI Enabled
42,829,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,831,179 UART: [rt] RT listening for mailbox commands...
42,862,249 UART: [rt]cmd =0x494e464f, len=4
42,866,528 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,380,599 ready_for_fw is high
3,381,000 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,533,464 >>> mbox cmd response: success
13,534,019 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,829,422 UART:
17,829,823 UART: Running Caliptra FMC ...
17,830,957 UART:
17,831,114 UART: [state] CFI Enabled
17,898,424 UART: [fht] FMC Alias Private Key: 7
19,662,281 UART: [art] Extend RT PCRs Done
19,663,528 UART: [art] Lock RT PCRs Done
19,665,045 UART: [art] Populate DV Done
19,670,293 UART: [fht] FMC Alias Private Key: 7
19,671,782 UART: [art] Derive CDI
19,672,545 UART: [art] Store in in slot 0x4
19,731,249 UART: [art] Derive Key Pair
19,732,283 UART: [art] Store priv key in slot 0x5
22,194,744 UART: [art] Derive Key Pair - Done
22,207,794 UART: [art] Signing Cert with AUTHO
22,209,101 UART: RITY.KEYID = 7
23,920,976 UART: [art] Erasing AUTHORITY.KEYID = 7
23,922,490 UART: [art] PUB.X = 982F0BD95C1BE47775A8D599BE20062FBF6EE714227934136BE3BA1AF5A2D4F0E695B23B2DAD6F63B8C5157F76AF8430
23,929,767 UART: [art] PUB.Y = 9AF9DE0FE999FF8EABFF4D5DFCA1C3E019ECCEFC6CD696715FF3BA19E3E96B1366B83DBD7E8C4B1632F9E9C0AFC8FDDD
23,937,075 UART: [art] SIG.R = CFF716D373F12D4DAF8078EDBB74E022967E1CF0FBE9607970E747653392984379A92C198AF0B8EE56692028C3174721
23,944,459 UART: [art] SIG.S = 31558F10F069A7B7A2B4C1C736B0D3D8EEC93650F9159B47B5468CDB615EE1292CBDDE0BF211E07D2E7613051243D5B9
24,923,145 UART: mbox::rt_entry...
24,924,138 UART: ____ _ _ _ ____ _____
24,926,125 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,928,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,930,054 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,932,016 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,933,951 UART: |_|
24,934,759 UART:
25,047,355 UART: [rt] Runtime listening for mailbox commands...
25,053,218 >>> mbox cmd response data (3272 bytes)
25,068,788 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,102,205 >>> mbox cmd response data (0 bytes)
27,160,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,276,442 >>> mbox cmd response: success
34,311,687 UART:
34,311,995 UART: Running Caliptra FMC ...
34,313,115 UART:
34,313,283 UART: [state] CFI Enabled
34,401,253 UART: [art] Extend RT PCRs Done
34,402,447 UART: [art] Lock RT PCRs Done
34,403,765 UART: [art] Populate DV Done
34,409,338 UART: [fht] FMC Alias Private Key: 7
34,410,871 UART: [art] Derive CDI
34,411,603 UART: [art] Store in in slot 0x4
34,470,429 UART: [art] Derive Key Pair
34,471,474 UART: [art] Store priv key in slot 0x5
36,934,474 UART: [art] Derive Key Pair - Done
36,947,537 UART: [art] Signing Cert with AUTHO
36,948,840 UART: RITY.KEYID = 7
38,659,593 UART: [art] Erasing AUTHORITY.KEYID = 7
38,661,093 UART: [art] PUB.X = FB4D069722B32388FDE795C12709B1C5EF1D5ED50770FBDB98211EE0475C6835645B25CD1FE2DB4739E14B62D2A476B3
38,668,384 UART: [art] PUB.Y = 4669E9D470DA5A25CF56E989565C679879AEBD7174DF65B2659074829D7F3066D0A366D638F946DDAA1D8ED10C008B4A
38,675,614 UART: [art] SIG.R = DE3D223998F874AAC585B0059F2A73A221A9E620C0CB0CD8D5FAADE2D69D951F90B998EF17E21538A5FD43A8B7680FB7
38,683,007 UART: [art] SIG.S = 54514C1E7B9611FB7948847F7094D256CC3F8740B37D0AF0F6B4ED409326716A5D66257F7D1FEF5A6B237DE764886812
39,661,832 UART: Caliptra RT
39,662,601 UART: [state] CFI Enabled
42,456,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,457,770 UART: [rt] RT listening for mailbox commands...
42,489,289 UART: [rt]cmd =0x494e464f, len=4
42,493,575 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
193,129 UART:
193,514 UART: Running Caliptra ROM ...
194,612 UART:
604,184 UART: [state] CFI Enabled
613,085 UART: [state] LifecycleState = Unprovisioned
614,966 UART: [state] DebugLocked = No
617,706 UART: [state] WD Timer not started. Device not locked for debugging
621,735 UART: [kat] SHA2-256
800,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,421 UART: [kat] ++
812,957 UART: [kat] sha1
823,773 UART: [kat] SHA2-256
826,851 UART: [kat] SHA2-384
833,216 UART: [kat] SHA2-512-ACC
836,192 UART: [kat] ECC-384
3,278,107 UART: [kat] HMAC-384Kdf
3,290,161 UART: [kat] LMS
3,819,645 UART: [kat] --
3,824,562 UART: [cold-reset] ++
3,826,346 UART: [fht] FHT @ 0x50003400
3,836,396 UART: [idev] ++
3,836,964 UART: [idev] CDI.KEYID = 6
3,837,919 UART: [idev] SUBJECT.KEYID = 7
3,839,093 UART: [idev] UDS.KEYID = 0
3,839,996 ready_for_fw is high
3,840,211 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,938,946 UART: [idev] Erasing UDS.KEYID = 0
6,314,118 UART: [idev] Sha1 KeyId Algorithm
6,336,806 UART: [idev] --
6,341,129 UART: [ldev] ++
6,341,703 UART: [ldev] CDI.KEYID = 6
6,342,635 UART: [ldev] SUBJECT.KEYID = 5
6,343,796 UART: [ldev] AUTHORITY.KEYID = 7
6,345,025 UART: [ldev] FE.KEYID = 1
6,355,172 UART: [ldev] Erasing FE.KEYID = 1
8,830,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,951 UART: [ldev] --
10,617,975 UART: [fwproc] Wait for Commands...
10,620,074 UART: [fwproc] Recv command 0x46574c44
10,622,172 UART: [fwproc] Recv'd Img size: 78456 bytes
13,590,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,665,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,733,951 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,926,074 >>> mbox cmd response: success
13,926,588 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,929,633 UART: [afmc] ++
13,930,215 UART: [afmc] CDI.KEYID = 6
13,931,100 UART: [afmc] SUBJECT.KEYID = 7
13,932,315 UART: [afmc] AUTHORITY.KEYID = 5
16,433,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,155,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,157,533 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,173,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,189,328 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,205,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,228,028 UART: [afmc] --
18,231,789 UART: [cold-reset] --
18,235,593 UART: [state] Locking Datavault
18,240,190 UART: [state] Locking PCR0, PCR1 and PCR31
18,241,860 UART: [state] Locking ICCM
18,243,752 UART: [exit] Launching FMC @ 0x40000130
18,252,150 UART:
18,252,387 UART: Running Caliptra FMC ...
18,253,486 UART:
18,253,650 UART: [state] CFI Enabled
18,261,401 UART: [fht] FMC Alias Private Key: 7
20,018,212 UART: [art] Extend RT PCRs Done
20,019,440 UART: [art] Lock RT PCRs Done
20,020,960 UART: [art] Populate DV Done
20,026,386 UART: [fht] FMC Alias Private Key: 7
20,028,097 UART: [art] Derive CDI
20,028,928 UART: [art] Store in in slot 0x4
20,071,436 UART: [art] Derive Key Pair
20,072,582 UART: [art] Store priv key in slot 0x5
22,499,113 UART: [art] Derive Key Pair - Done
22,512,086 UART: [art] Signing Cert with AUTHO
22,513,588 UART: RITY.KEYID = 7
24,218,689 UART: [art] Erasing AUTHORITY.KEYID = 7
24,220,193 UART: [art] PUB.X = DF0FB914FF00C52DA5FD0BE8A8D94182BD5A09FB39BA7832599B50C19E8B7C48269C74D6B42D1E1E50FD97AAE95CEFD9
24,227,460 UART: [art] PUB.Y = 4DD33FF5FF2744E395FD64E76FFD55D92DF34856792A1F5D431EFD3E6783B26BC3DFCF5AF96DB965CE67F8DE8915AD0D
24,234,770 UART: [art] SIG.R = 6383376B7DA9D8E97EA533714FFE09A375F63424ACE2A4122B8489BBED4CBB34114F5A831E5D47849258E2C250285A2E
24,242,144 UART: [art] SIG.S = BDE9476B38C1D0C3B88F9056A775F385ECF7E8860A520787FEF9E4614A2EC304241D54026261B9CD5FEA3C4B64CF0C98
25,220,204 UART: mbox::rt_entry...
25,221,175 UART: ____ _ _ _ ____ _____
25,223,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,225,182 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,227,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,229,048 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,230,979 UART: |_|
25,231,808 UART:
25,344,980 UART: [rt] Runtime listening for mailbox commands...
25,350,798 >>> mbox cmd response data (3272 bytes)
25,366,609 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,400,017 >>> mbox cmd response data (0 bytes)
27,459,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,603,600 UART:
27,604,000 UART: Running Caliptra ROM ...
27,605,144 UART:
27,605,314 UART: [state] CFI Enabled
27,617,367 UART: [state] LifecycleState = Unprovisioned
27,619,213 UART: [state] DebugLocked = No
27,621,536 UART: [state] WD Timer not started. Device not locked for debugging
27,625,014 UART: [kat] SHA2-256
27,804,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,815,800 UART: [kat] ++
27,816,259 UART: [kat] sha1
27,827,249 UART: [kat] SHA2-256
27,830,275 UART: [kat] SHA2-384
27,837,292 UART: [kat] SHA2-512-ACC
27,840,235 UART: [kat] ECC-384
30,282,105 UART: [kat] HMAC-384Kdf
30,294,721 UART: [kat] LMS
30,824,228 UART: [kat] --
30,828,109 UART: [update-reset] ++
34,249,267 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,251,838 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,633,831 >>> mbox cmd response: success
34,638,377 UART: [update-reset] Copying MAN_2 To MAN_1
34,656,567 UART: [update-reset Success] --
34,660,539 UART: [state] Locking Datavault
34,663,107 UART: [state] Locking PCR0, PCR1 and PCR31
34,664,760 UART: [state] Locking ICCM
34,666,215 UART: [exit] Launching FMC @ 0x40000130
34,674,664 UART:
34,674,949 UART: Running Caliptra FMC ...
34,676,406 UART:
34,676,573 UART: [state] CFI Enabled
34,719,780 UART: [art] Extend RT PCRs Done
34,720,924 UART: [art] Lock RT PCRs Done
34,722,663 UART: [art] Populate DV Done
34,728,180 UART: [fht] FMC Alias Private Key: 7
34,729,716 UART: [art] Derive CDI
34,730,532 UART: [art] Store in in slot 0x4
34,773,227 UART: [art] Derive Key Pair
34,774,272 UART: [art] Store priv key in slot 0x5
37,200,930 UART: [art] Derive Key Pair - Done
37,214,037 UART: [art] Signing Cert with AUTHO
37,215,343 UART: RITY.KEYID = 7
38,920,981 UART: [art] Erasing AUTHORITY.KEYID = 7
38,922,494 UART: [art] PUB.X = D89E5FE09F05C67E3F39C25043BE5E1B63C47972777F815CE9077C491A2A7BD9B1002C43DC659E520E84066859F072DA
38,929,744 UART: [art] PUB.Y = 2C2709F155D361C3CF3A43696F7978E93DC7C797FEDF79D58B293CC8BF6780AB0C5E32E6AD533532A3E4E63325783676
38,937,035 UART: [art] SIG.R = 8F76841968222282E1C99F4C9BB32586D5A7B6D3CA165FCAD18E688B44623A0FFB25DDB8A9182FAF5742097C37FCF3B8
38,944,393 UART: [art] SIG.S = C8813906A5BC364313B0B10B61964F383254419E9F437CF4327BF7EC28895C20984F9881A6B38B82AD7B0A6EC8656588
39,923,116 UART: Caliptra RT
39,923,821 UART: [state] CFI Enabled
42,626,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,627,432 UART: [rt] RT listening for mailbox commands...
42,658,816 UART: [rt]cmd =0x494e464f, len=4
42,663,359 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,695,781 ready_for_fw is high
3,696,190 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,706,484 >>> mbox cmd response: success
13,707,273 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,957,697 UART:
17,958,081 UART: Running Caliptra FMC ...
17,959,190 UART:
17,959,365 UART: [state] CFI Enabled
17,967,431 UART: [fht] FMC Alias Private Key: 7
19,724,293 UART: [art] Extend RT PCRs Done
19,725,523 UART: [art] Lock RT PCRs Done
19,727,337 UART: [art] Populate DV Done
19,732,603 UART: [fht] FMC Alias Private Key: 7
19,734,260 UART: [art] Derive CDI
19,735,083 UART: [art] Store in in slot 0x4
19,777,789 UART: [art] Derive Key Pair
19,778,793 UART: [art] Store priv key in slot 0x5
22,205,368 UART: [art] Derive Key Pair - Done
22,218,322 UART: [art] Signing Cert with AUTHO
22,219,623 UART: RITY.KEYID = 7
23,925,050 UART: [art] Erasing AUTHORITY.KEYID = 7
23,926,560 UART: [art] PUB.X = F541596E2A9AD8175A13366BEB34D2FA3A0860CEA098E4E8F0587245895C622ECD89422CDDEB0D22D6F92E7A27980C2F
23,933,838 UART: [art] PUB.Y = 98DA0E3534EBEF933D6D6CA1ABE00AFE01649D342277CC8EC6568B51C090A4AB58E588C192E710D179BB7BD5CBF889E7
23,941,129 UART: [art] SIG.R = DA52C84797251073ABDE8BAF69B1A9D2EB1EDB5BC9755957FF91E21CB3E1F4A8E476F5E3880026FD5E511E2E690A3C8D
23,948,507 UART: [art] SIG.S = 647938045297EE7072F3DD07009AA21C9890C5E5C4C3AFB5CF23444214A2BAF72B5295C2928EF3A1EDF4C5531DE3E28F
24,927,071 UART: mbox::rt_entry...
24,928,027 UART: ____ _ _ _ ____ _____
24,929,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,931,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,933,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,935,781 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,937,835 UART: |_|
24,938,645 UART:
25,050,692 UART: [rt] Runtime listening for mailbox commands...
25,056,540 >>> mbox cmd response data (3272 bytes)
25,072,324 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,105,728 >>> mbox cmd response data (0 bytes)
27,164,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,205,349 >>> mbox cmd response: success
34,239,993 UART:
34,240,306 UART: Running Caliptra FMC ...
34,241,428 UART:
34,241,598 UART: [state] CFI Enabled
34,285,361 UART: [art] Extend RT PCRs Done
34,286,550 UART: [art] Lock RT PCRs Done
34,287,960 UART: [art] Populate DV Done
34,293,482 UART: [fht] FMC Alias Private Key: 7
34,295,181 UART: [art] Derive CDI
34,296,000 UART: [art] Store in in slot 0x4
34,338,769 UART: [art] Derive Key Pair
34,339,772 UART: [art] Store priv key in slot 0x5
36,766,809 UART: [art] Derive Key Pair - Done
36,779,280 UART: [art] Signing Cert with AUTHO
36,780,599 UART: RITY.KEYID = 7
38,486,774 UART: [art] Erasing AUTHORITY.KEYID = 7
38,488,283 UART: [art] PUB.X = 1844C84E0A02850823ACEBA5D1331F533FA7941A7F8E36CEE77ECEA806032EC90EB08F913963289086E949B43DA3EFEA
38,495,537 UART: [art] PUB.Y = 8D819944FDA616B5F466EF9F5A57FF952B13408E164A9337DA8121C754D6EE99BF6F29A6E492321738009A139C22C047
38,502,783 UART: [art] SIG.R = 0021BCA35558F0E8920FCE5242D2627C17108E8061788BEAFF1641EFD16057445C34BD78BD7F6F155DECABA8CD76F505
38,510,128 UART: [art] SIG.S = 71DD1EF21DCCEC2C9878F61C9D8DF56A2526AC2C7171EE7B6FEA6DE56329FB387B0D77CBA828148FB9C892D7C9C65016
39,489,225 UART: Caliptra RT
39,489,918 UART: [state] CFI Enabled
42,194,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,196,266 UART: [rt] RT listening for mailbox commands...
42,227,716 UART: [rt]cmd =0x494e464f, len=4
42,232,122 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,344 UART:
192,728 UART: Running Caliptra ROM ...
193,829 UART:
193,970 UART: [state] CFI Enabled
263,890 UART: [state] LifecycleState = Unprovisioned
266,254 UART: [state] DebugLocked = No
268,762 UART: [state] WD Timer not started. Device not locked for debugging
273,020 UART: [kat] SHA2-256
462,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,629 UART: [kat] ++
474,107 UART: [kat] sha1
485,265 UART: [kat] SHA2-256
488,274 UART: [kat] SHA2-384
493,551 UART: [kat] SHA2-512-ACC
496,130 UART: [kat] ECC-384
2,949,548 UART: [kat] HMAC-384Kdf
2,973,012 UART: [kat] LMS
3,504,747 UART: [kat] --
3,510,168 UART: [cold-reset] ++
3,512,448 UART: [fht] FHT @ 0x50003400
3,523,633 UART: [idev] ++
3,524,334 UART: [idev] CDI.KEYID = 6
3,525,359 UART: [idev] SUBJECT.KEYID = 7
3,526,459 UART: [idev] UDS.KEYID = 0
3,527,502 ready_for_fw is high
3,527,719 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,626,550 UART: [idev] Erasing UDS.KEYID = 0
6,032,218 UART: [idev] Sha1 KeyId Algorithm
6,053,813 UART: [idev] --
6,057,871 UART: [ldev] ++
6,058,551 UART: [ldev] CDI.KEYID = 6
6,059,473 UART: [ldev] SUBJECT.KEYID = 5
6,060,629 UART: [ldev] AUTHORITY.KEYID = 7
6,061,855 UART: [ldev] FE.KEYID = 1
6,101,019 UART: [ldev] Erasing FE.KEYID = 1
8,607,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,705 UART: [ldev] --
10,414,823 UART: [fwproc] Wait for Commands...
10,417,738 UART: [fwproc] Recv command 0x46574c44
10,419,992 UART: [fwproc] Recv'd Img size: 78456 bytes
13,423,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,505,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,621,328 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,949,277 >>> mbox cmd response: success
13,949,771 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,952,607 UART: [afmc] ++
13,953,333 UART: [afmc] CDI.KEYID = 6
13,954,526 UART: [afmc] SUBJECT.KEYID = 7
13,955,966 UART: [afmc] AUTHORITY.KEYID = 5
16,486,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,211,532 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,213,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,228,648 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,243,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,258,800 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,282,441 UART: [afmc] --
18,285,505 UART: [cold-reset] --
18,289,970 UART: [state] Locking Datavault
18,294,903 UART: [state] Locking PCR0, PCR1 and PCR31
18,297,058 UART: [state] Locking ICCM
18,298,620 UART: [exit] Launching FMC @ 0x40000130
18,307,273 UART:
18,307,507 UART: Running Caliptra FMC ...
18,308,605 UART:
18,308,761 UART: [state] CFI Enabled
18,369,749 UART: [fht] FMC Alias Private Key: 7
20,134,096 UART: [art] Extend RT PCRs Done
20,135,323 UART: [art] Lock RT PCRs Done
20,137,061 UART: [art] Populate DV Done
20,142,444 UART: [fht] FMC Alias Private Key: 7
20,143,984 UART: [art] Derive CDI
20,144,720 UART: [art] Store in in slot 0x4
20,202,543 UART: [art] Derive Key Pair
20,203,583 UART: [art] Store priv key in slot 0x5
22,666,500 UART: [art] Derive Key Pair - Done
22,679,448 UART: [art] Signing Cert with AUTHO
22,680,796 UART: RITY.KEYID = 7
24,392,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,394,116 UART: [art] PUB.X = 87FCBFD24B574E6B20E1C6D03C4253434D63C46E3687000F551940EE8BD582E66151E0CF4AC7E419223FF8554639BD7F
24,401,387 UART: [art] PUB.Y = 414AB0EF8097A2333176E122380A8406960013B9A302D2B118A433C00D5926A20FAB14E3CC887EADFEFDD47D255FEB17
24,408,631 UART: [art] SIG.R = D97E183C38770737AB385136C65261393A1D1A9C823560764FDF14465C4EB964EA446E794D831D5DDC12A00BC1928317
24,415,999 UART: [art] SIG.S = 1D180479A135B487E539E06674179DEE3DE1354D19494D3D792022579AFB2DC2CB0EDFFAC48877CF0ADBB9F478F299B1
25,394,633 UART: mbox::rt_entry...
25,395,609 UART: ____ _ _ _ ____ _____
25,397,592 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,399,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,401,536 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,403,458 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,405,381 UART: |_|
25,406,189 UART:
25,518,565 UART: [rt] Runtime listening for mailbox commands...
25,524,418 >>> mbox cmd response data (3272 bytes)
25,540,067 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,573,480 >>> mbox cmd response data (0 bytes)
27,633,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,777,522 UART:
27,777,916 UART: Running Caliptra ROM ...
27,779,044 UART:
27,779,214 UART: [state] CFI Enabled
27,846,710 UART: [state] LifecycleState = Unprovisioned
27,848,831 UART: [state] DebugLocked = No
27,851,025 UART: [state] WD Timer not started. Device not locked for debugging
27,855,903 UART: [kat] SHA2-256
28,045,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,056,523 UART: [kat] ++
28,057,010 UART: [kat] sha1
28,067,964 UART: [kat] SHA2-256
28,070,996 UART: [kat] SHA2-384
28,077,799 UART: [kat] SHA2-512-ACC
28,080,372 UART: [kat] ECC-384
30,528,679 UART: [kat] HMAC-384Kdf
30,551,373 UART: [kat] LMS
31,082,985 UART: [kat] --
31,085,600 UART: [update-reset] ++
34,542,895 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,545,853 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,152,264 >>> mbox cmd response: success
35,156,849 UART: [update-reset] Copying MAN_2 To MAN_1
35,189,793 UART: [update-reset Success] --
35,194,670 UART: [state] Locking Datavault
35,199,466 UART: [state] Locking PCR0, PCR1 and PCR31
35,201,625 UART: [state] Locking ICCM
35,203,330 UART: [exit] Launching FMC @ 0x40000130
35,211,978 UART:
35,212,212 UART: Running Caliptra FMC ...
35,213,303 UART:
35,213,450 UART: [state] CFI Enabled
35,319,522 UART: [art] Extend RT PCRs Done
35,320,724 UART: [art] Lock RT PCRs Done
35,321,721 UART: [art] Populate DV Done
35,327,338 UART: [fht] FMC Alias Private Key: 7
35,328,928 UART: [art] Derive CDI
35,329,734 UART: [art] Store in in slot 0x4
35,388,604 UART: [art] Derive Key Pair
35,389,598 UART: [art] Store priv key in slot 0x5
37,852,416 UART: [art] Derive Key Pair - Done
37,865,475 UART: [art] Signing Cert with AUTHO
37,866,783 UART: RITY.KEYID = 7
39,578,328 UART: [art] Erasing AUTHORITY.KEYID = 7
39,579,854 UART: [art] PUB.X = 9E3CD837826161271393C7BACD78827AEF77C2CA449241D105902D69A733B217F29B913B74CF5B305B7EEDFE9CFBF6B7
39,587,085 UART: [art] PUB.Y = 15BB2887B11BFD80FB09164DD15088221444BCA15CDEA21ABA1A0BAAEC3440D8C6C729C430ED06C6905A7199709EFAF2
39,594,386 UART: [art] SIG.R = 1DA5C131F49A0D9F3B0F7F0E18549C1FC9735DA7A3DED468EE74ED3846A1E752B6B97DCEE947CC091AB4D7CC82AF6C96
39,601,752 UART: [art] SIG.S = 081BE7EA9F3AF16919699011C3D31E01429C6D93A6BAE11764ECAB01F3E73D0F018A719A919E946A15B979FC6A1FD539
40,580,140 UART: Caliptra RT
40,580,840 UART: [state] CFI Enabled
43,355,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,356,415 UART: [rt] RT listening for mailbox commands...
43,387,971 UART: [rt]cmd =0x494e464f, len=4
43,392,196 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,440,242 ready_for_fw is high
3,440,649 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,972,021 >>> mbox cmd response: success
13,972,615 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,281,048 UART:
18,281,443 UART: Running Caliptra FMC ...
18,282,541 UART:
18,282,691 UART: [state] CFI Enabled
18,346,115 UART: [fht] FMC Alias Private Key: 7
20,110,297 UART: [art] Extend RT PCRs Done
20,111,526 UART: [art] Lock RT PCRs Done
20,113,152 UART: [art] Populate DV Done
20,118,459 UART: [fht] FMC Alias Private Key: 7
20,120,055 UART: [art] Derive CDI
20,120,872 UART: [art] Store in in slot 0x4
20,179,036 UART: [art] Derive Key Pair
20,180,076 UART: [art] Store priv key in slot 0x5
22,643,396 UART: [art] Derive Key Pair - Done
22,656,716 UART: [art] Signing Cert with AUTHO
22,658,048 UART: RITY.KEYID = 7
24,369,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,371,094 UART: [art] PUB.X = E3D87698623849C3D46383422CAF634D4015FF6E66E3E1D0F712FECCE4D6B8C8CB1954BC5BFF5CEFAABC0697FA20296F
24,378,369 UART: [art] PUB.Y = E815334632A298A3478BA1AD32DB64FE7DD93CB8389C70CE0668D36154EAA2393ABF4866FB7ED73F05D180251604AF0E
24,385,652 UART: [art] SIG.R = 8E6E8AC9FEC47E1E532206CA7C12E11B5F6F42583BEC9FAEEDDB4CFACE6BC8F9D9954DEC55E4ACC1E6E11712EE938246
24,393,063 UART: [art] SIG.S = 58DED4E520C617E1C42C4533BDAC801789914E9AD9E0FB846A945A496D3C6E0A53B01C739EAB15B9FDABA482A3CBE837
25,371,880 UART: mbox::rt_entry...
25,372,850 UART: ____ _ _ _ ____ _____
25,374,834 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,376,791 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,378,727 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,380,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,382,843 UART: |_|
25,383,653 UART:
25,496,996 UART: [rt] Runtime listening for mailbox commands...
25,502,844 >>> mbox cmd response data (3272 bytes)
25,518,711 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,552,143 >>> mbox cmd response data (0 bytes)
27,610,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,421,453 >>> mbox cmd response: success
35,457,203 UART:
35,457,514 UART: Running Caliptra FMC ...
35,458,562 UART:
35,458,710 UART: [state] CFI Enabled
35,555,826 UART: [art] Extend RT PCRs Done
35,557,043 UART: [art] Lock RT PCRs Done
35,558,373 UART: [art] Populate DV Done
35,564,057 UART: [fht] FMC Alias Private Key: 7
35,565,664 UART: [art] Derive CDI
35,566,419 UART: [art] Store in in slot 0x4
35,625,313 UART: [art] Derive Key Pair
35,626,355 UART: [art] Store priv key in slot 0x5
38,089,031 UART: [art] Derive Key Pair - Done
38,102,031 UART: [art] Signing Cert with AUTHO
38,103,364 UART: RITY.KEYID = 7
39,814,927 UART: [art] Erasing AUTHORITY.KEYID = 7
39,816,427 UART: [art] PUB.X = C6E98317B7315BA50E259A40C2867826E50DE43B9327CDF653C965BD0186E0D2A3431859A158432421103956099EA9D6
39,823,655 UART: [art] PUB.Y = 1C911CB24297BE5160CFE7F236F0542F0FDC9C626591C29D2FA70128DB4C1FB58EE255EC4C97ADBAF5BA66806C9F8EAE
39,830,977 UART: [art] SIG.R = 495C4726CAE7EA9CA87C986B66D479F52019234615CC10B25AD8F78E20EF0BC6C23FE18CC683AA0ED9EB399398689C72
39,838,357 UART: [art] SIG.S = 1B0F528245DADECB315CB74EC07E9BD84EBCF25A32921E29E06A224ADE819D29287054C8A512F33C6598D148E64BB196
40,817,386 UART: Caliptra RT
40,818,096 UART: [state] CFI Enabled
43,614,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,615,891 UART: [rt] RT listening for mailbox commands...
43,647,024 UART: [rt]cmd =0x494e464f, len=4
43,651,297 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
192,951 UART:
193,323 UART: Running Caliptra ROM ...
194,523 UART:
604,040 UART: [state] CFI Enabled
619,263 UART: [state] LifecycleState = Unprovisioned
621,626 UART: [state] DebugLocked = No
623,006 UART: [state] WD Timer not started. Device not locked for debugging
626,899 UART: [kat] SHA2-256
816,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,570 UART: [kat] ++
828,021 UART: [kat] sha1
838,543 UART: [kat] SHA2-256
841,571 UART: [kat] SHA2-384
846,858 UART: [kat] SHA2-512-ACC
849,448 UART: [kat] ECC-384
3,292,524 UART: [kat] HMAC-384Kdf
3,306,225 UART: [kat] LMS
3,838,051 UART: [kat] --
3,840,558 UART: [cold-reset] ++
3,842,065 UART: [fht] FHT @ 0x50003400
3,853,216 UART: [idev] ++
3,853,966 UART: [idev] CDI.KEYID = 6
3,854,855 UART: [idev] SUBJECT.KEYID = 7
3,856,103 UART: [idev] UDS.KEYID = 0
3,857,005 ready_for_fw is high
3,857,208 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,957,205 UART: [idev] Erasing UDS.KEYID = 0
6,334,079 UART: [idev] Sha1 KeyId Algorithm
6,356,520 UART: [idev] --
6,361,874 UART: [ldev] ++
6,362,556 UART: [ldev] CDI.KEYID = 6
6,363,494 UART: [ldev] SUBJECT.KEYID = 5
6,364,649 UART: [ldev] AUTHORITY.KEYID = 7
6,365,884 UART: [ldev] FE.KEYID = 1
6,377,753 UART: [ldev] Erasing FE.KEYID = 1
8,857,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,784 UART: [ldev] --
10,649,671 UART: [fwproc] Wait for Commands...
10,652,531 UART: [fwproc] Recv command 0x46574c44
10,654,829 UART: [fwproc] Recv'd Img size: 78456 bytes
13,656,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,734,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,850,539 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,176,927 >>> mbox cmd response: success
14,177,393 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,181,076 UART: [afmc] ++
14,181,778 UART: [afmc] CDI.KEYID = 6
14,182,975 UART: [afmc] SUBJECT.KEYID = 7
14,184,418 UART: [afmc] AUTHORITY.KEYID = 5
16,691,299 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,412,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,414,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,429,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,444,940 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,459,977 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,484,342 UART: [afmc] --
18,488,718 UART: [cold-reset] --
18,492,381 UART: [state] Locking Datavault
18,497,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,499,893 UART: [state] Locking ICCM
18,501,539 UART: [exit] Launching FMC @ 0x40000130
18,510,217 UART:
18,510,454 UART: Running Caliptra FMC ...
18,511,558 UART:
18,511,717 UART: [state] CFI Enabled
18,519,603 UART: [fht] FMC Alias Private Key: 7
20,276,731 UART: [art] Extend RT PCRs Done
20,277,958 UART: [art] Lock RT PCRs Done
20,279,715 UART: [art] Populate DV Done
20,285,507 UART: [fht] FMC Alias Private Key: 7
20,287,047 UART: [art] Derive CDI
20,287,815 UART: [art] Store in in slot 0x4
20,330,422 UART: [art] Derive Key Pair
20,331,431 UART: [art] Store priv key in slot 0x5
22,758,381 UART: [art] Derive Key Pair - Done
22,771,644 UART: [art] Signing Cert with AUTHO
22,772,948 UART: RITY.KEYID = 7
24,478,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,531 UART: [art] PUB.X = 4FB8E5D8947E6865730E56993EDCEB9E13EDDF666823AD2DE04413754E97015937DE45364ACF4FF072A519D8AA9C4C0E
24,486,802 UART: [art] PUB.Y = 5E203BFAB4E043A2CC55EB6422D5DBBF2B0CF5AEB562B1F6CA8FF0101EB15FFFB2F5AEECCC427792C9B1EFED7C98C48A
24,494,147 UART: [art] SIG.R = 53F09D8D4AB101A5FBFCAF3DB44B538596B85A843A35505F192C07DA0766B71DB2C1667288955D4E6B8E1AB69A073C50
24,501,521 UART: [art] SIG.S = 6A756751728F250B811DE771965CAFF6E0D28B2234D3CC053D0C4E439429B7F02351B8C6483D3B1D08619BC452F6CD86
25,480,153 UART: mbox::rt_entry...
25,481,105 UART: ____ _ _ _ ____ _____
25,483,086 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,485,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,486,975 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,488,831 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,490,774 UART: |_|
25,491,583 UART:
25,604,323 UART: [rt] Runtime listening for mailbox commands...
25,610,116 >>> mbox cmd response data (3272 bytes)
25,626,052 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,659,459 >>> mbox cmd response data (0 bytes)
27,717,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,861,775 UART:
27,862,169 UART: Running Caliptra ROM ...
27,863,212 UART:
27,863,388 UART: [state] CFI Enabled
27,876,163 UART: [state] LifecycleState = Unprovisioned
27,878,004 UART: [state] DebugLocked = No
27,879,261 UART: [state] WD Timer not started. Device not locked for debugging
27,883,863 UART: [kat] SHA2-256
28,073,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,084,508 UART: [kat] ++
28,084,973 UART: [kat] sha1
28,096,419 UART: [kat] SHA2-256
28,099,380 UART: [kat] SHA2-384
28,105,232 UART: [kat] SHA2-512-ACC
28,107,810 UART: [kat] ECC-384
30,545,333 UART: [kat] HMAC-384Kdf
30,558,649 UART: [kat] LMS
31,090,268 UART: [kat] --
31,094,857 UART: [update-reset] ++
34,550,304 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,553,950 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,160,042 >>> mbox cmd response: success
35,164,620 UART: [update-reset] Copying MAN_2 To MAN_1
35,198,040 UART: [update-reset Success] --
35,200,854 UART: [state] Locking Datavault
35,204,888 UART: [state] Locking PCR0, PCR1 and PCR31
35,207,043 UART: [state] Locking ICCM
35,209,183 UART: [exit] Launching FMC @ 0x40000130
35,217,839 UART:
35,218,132 UART: Running Caliptra FMC ...
35,219,231 UART:
35,219,401 UART: [state] CFI Enabled
35,262,781 UART: [art] Extend RT PCRs Done
35,263,932 UART: [art] Lock RT PCRs Done
35,265,463 UART: [art] Populate DV Done
35,271,026 UART: [fht] FMC Alias Private Key: 7
35,272,570 UART: [art] Derive CDI
35,273,303 UART: [art] Store in in slot 0x4
35,316,043 UART: [art] Derive Key Pair
35,317,094 UART: [art] Store priv key in slot 0x5
37,743,815 UART: [art] Derive Key Pair - Done
37,756,667 UART: [art] Signing Cert with AUTHO
37,757,978 UART: RITY.KEYID = 7
39,463,315 UART: [art] Erasing AUTHORITY.KEYID = 7
39,464,829 UART: [art] PUB.X = B18B97D62DA05CBFCB69B7120080382C97B806F3053F1CFBA0CD8A70D12AF8FFC24713250BEECDFFB3419102D8588CEF
39,472,095 UART: [art] PUB.Y = E9FF93BD81F430D24CEBFC5C544DF5CF30267FC6BFBC2CC071C050D1768BE84832B4648A9375D7A676DBAEB262EFA3CA
39,479,392 UART: [art] SIG.R = 1B52F876FD60AB9E1E92BBC246DD8C45B4CE26A599C498042FEB261D7ADC9A6B3992A8FBBA1840E0F69C271F0049FE7E
39,486,812 UART: [art] SIG.S = AABC1F66AD00502EE4C4BC4C8C7128EBC665BEAD744907D3B2D28BDA3FC3257D6E6482208940B4BD721AF7F48D666673
40,465,972 UART: Caliptra RT
40,466,679 UART: [state] CFI Enabled
43,173,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,174,829 UART: [rt] RT listening for mailbox commands...
43,205,741 UART: [rt]cmd =0x494e464f, len=4
43,209,965 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
3,756,134 ready_for_fw is high
3,756,525 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,173,015 >>> mbox cmd response: success
14,174,001 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,426,571 UART:
18,426,968 UART: Running Caliptra FMC ...
18,428,079 UART:
18,428,240 UART: [state] CFI Enabled
18,436,511 UART: [fht] FMC Alias Private Key: 7
20,193,309 UART: [art] Extend RT PCRs Done
20,194,534 UART: [art] Lock RT PCRs Done
20,196,299 UART: [art] Populate DV Done
20,201,621 UART: [fht] FMC Alias Private Key: 7
20,203,241 UART: [art] Derive CDI
20,204,062 UART: [art] Store in in slot 0x4
20,246,675 UART: [art] Derive Key Pair
20,247,712 UART: [art] Store priv key in slot 0x5
22,674,731 UART: [art] Derive Key Pair - Done
22,687,669 UART: [art] Signing Cert with AUTHO
22,689,095 UART: RITY.KEYID = 7
24,394,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,396,142 UART: [art] PUB.X = BF9938EB7D802C0BEDDAA2ED0FA54AC66CE61AEAE53551259239E310DE9C281625C146BB9DB7FC3C199BA0A780F29B3B
24,403,416 UART: [art] PUB.Y = 34970D58A404E4FA30FBA6DC8C70C385536ABC5280B4DE88565BE5BE0719F6D0FF1027B63BA2312A9D15A54D0364EA4F
24,410,707 UART: [art] SIG.R = 186ADC2D26534D2508C4D427218E8458D78B985B99B18EDEF3C2CAF195F7F20365D884869B3411118B3D2432C2894756
24,418,044 UART: [art] SIG.S = 46A3A47A98A8FF9596F327E847C74735FDEDBE19FA1912177EEA656BBC40E8BDEB9BE1B7C75A142658C92D154F532D26
25,396,652 UART: mbox::rt_entry...
25,397,629 UART: ____ _ _ _ ____ _____
25,399,532 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,401,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,403,443 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,405,409 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,407,294 UART: |_|
25,408,129 UART:
25,521,977 UART: [rt] Runtime listening for mailbox commands...
25,527,834 >>> mbox cmd response data (3272 bytes)
25,543,712 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,577,134 >>> mbox cmd response data (0 bytes)
27,635,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,362,331 >>> mbox cmd response: success
35,397,653 UART:
35,397,967 UART: Running Caliptra FMC ...
35,399,112 UART:
35,399,284 UART: [state] CFI Enabled
35,442,945 UART: [art] Extend RT PCRs Done
35,444,139 UART: [art] Lock RT PCRs Done
35,445,710 UART: [art] Populate DV Done
35,451,338 UART: [fht] FMC Alias Private Key: 7
35,452,873 UART: [art] Derive CDI
35,453,692 UART: [art] Store in in slot 0x4
35,496,456 UART: [art] Derive Key Pair
35,497,496 UART: [art] Store priv key in slot 0x5
37,924,312 UART: [art] Derive Key Pair - Done
37,937,157 UART: [art] Signing Cert with AUTHO
37,938,474 UART: RITY.KEYID = 7
39,643,915 UART: [art] Erasing AUTHORITY.KEYID = 7
39,645,418 UART: [art] PUB.X = B27F0DE6E40A57F941E61FBF3AB4508E61F1E85FC09D2D3789DC46A9DC6DFD0AF9242F0752A3CF7992AF0E46F3B71295
39,652,726 UART: [art] PUB.Y = 684CBFDE635AD836E60F324EF7463E690EEFD4AB3B4A3CAD367A6A9F5D369C2343CF2AB92C189BCAFEE31BA2BF2256EE
39,659,998 UART: [art] SIG.R = 58F5AF28CE9369A6F3EEE62F50E32098CF6A6649BFE38495ADE594C06F62ACEBBD3FB7CE2D0CDEADDDB9180C8254685C
39,667,419 UART: [art] SIG.S = E91B9C09DDAC86D508CFC70DCF6CFA8AAE13BB3505132E6F7E6C904AA25C7474AA15A0F0A1F7F7965079DC18603F8B49
40,646,046 UART: Caliptra RT
40,646,759 UART: [state] CFI Enabled
43,349,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,351,098 UART: [rt] RT listening for mailbox commands...
43,382,101 UART: [rt]cmd =0x494e464f, len=4
43,386,335 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,660 UART: [idev] ++
1,479,828 UART: [idev] CDI.KEYID = 6
1,480,188 UART: [idev] SUBJECT.KEYID = 7
1,480,612 UART: [idev] UDS.KEYID = 0
1,480,957 ready_for_fw is high
1,480,957 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,788 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,874 UART: [idev] --
1,514,955 UART: [ldev] ++
1,515,123 UART: [ldev] CDI.KEYID = 6
1,515,486 UART: [ldev] SUBJECT.KEYID = 5
1,515,912 UART: [ldev] AUTHORITY.KEYID = 7
1,516,375 UART: [ldev] FE.KEYID = 1
1,521,801 UART: [ldev] Erasing FE.KEYID = 1
1,547,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,882 UART: [ldev] --
1,587,293 UART: [fwproc] Waiting for Commands...
1,588,110 UART: [fwproc] Received command 0x46574c44
1,588,901 UART: [fwproc] Received Image of size 78456 bytes
2,476,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,421 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,615,712 >>> mbox cmd response: success
2,615,712 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,858 UART: [afmc] ++
2,617,026 UART: [afmc] CDI.KEYID = 6
2,617,388 UART: [afmc] SUBJECT.KEYID = 7
2,617,813 UART: [afmc] AUTHORITY.KEYID = 5
2,652,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,435 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,125 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,130 UART: [afmc] --
2,696,142 UART: [cold-reset] --
2,697,032 UART: [state] Locking Datavault
2,698,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,711 UART: [state] Locking ICCM
2,699,273 UART: [exit] Launching FMC @ 0x40000130
2,704,602 UART:
2,704,618 UART: Running Caliptra FMC ...
2,705,026 UART:
2,705,080 UART: [state] CFI Enabled
2,715,743 UART: [fht] FMC Alias Private Key: 7
2,822,624 UART: [art] Extend RT PCRs Done
2,823,052 UART: [art] Lock RT PCRs Done
2,824,812 UART: [art] Populate DV Done
2,832,815 UART: [fht] FMC Alias Private Key: 7
2,833,873 UART: [art] Derive CDI
2,834,153 UART: [art] Store in in slot 0x4
2,919,948 UART: [art] Derive Key Pair
2,920,308 UART: [art] Store priv key in slot 0x5
2,933,588 UART: [art] Derive Key Pair - Done
2,948,338 UART: [art] Signing Cert with AUTHO
2,948,818 UART: RITY.KEYID = 7
2,964,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,181 UART: [art] PUB.X = 88BECF6B133C2E0E90D7BC538EC9CFFF415B6042CBD71D402BB9C5799A242D9A6B8EA0D44D1E977E4BD25F0C9A3B2619
2,971,965 UART: [art] PUB.Y = FB10C7678A60F4B2C13E9DFC6BE7332E9851B93923DC834B01F471DAD2247B0D64C6BED524CD8CCBBCBBEA972D6D3F08
2,978,928 UART: [art] SIG.R = CAF5585B937C5B54B607456944B30505505FEA30E93EF673043A671B1B152AB8DC3B942483007F2829208E39394BACE0
2,985,658 UART: [art] SIG.S = 6A5E6A09C412B23AD1405B19CDEDD75DEC2374F2D46C61660781F1355A1FD634A853A4D41D24F24B05B481EC280246B9
3,008,839 UART: mbox::rt_entry...
3,009,211 UART: ____ _ _ _ ____ _____
3,009,995 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,795 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,563 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,099 UART: |_|
3,013,411 UART:
3,119,943 UART: [rt] Runtime listening for mailbox commands...
3,124,911 >>> mbox cmd response data (3272 bytes)
3,124,912 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,998 >>> mbox cmd response data (0 bytes)
3,147,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,148,119 UART:
3,148,135 UART: Running Caliptra ROM ...
3,148,543 UART:
3,148,597 UART: [state] CFI Enabled
3,151,363 UART: [state] LifecycleState = Unprovisioned
3,152,018 UART: [state] DebugLocked = No
3,152,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,154,197 UART: [kat] SHA2-256
3,948,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,952,243 UART: [kat] ++
3,952,395 UART: [kat] sha1
3,956,517 UART: [kat] SHA2-256
3,958,455 UART: [kat] SHA2-384
3,961,204 UART: [kat] SHA2-512-ACC
3,963,104 UART: [kat] ECC-384
3,968,907 UART: [kat] HMAC-384Kdf
3,973,373 UART: [kat] LMS
4,541,569 UART: [kat] --
4,542,246 UART: [update-reset] ++
5,875,234 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,876,324 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,025,828 >>> mbox cmd response: success
6,026,087 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,101 UART: [update-reset Success] --
6,035,238 UART: [state] Locking Datavault
6,036,232 UART: [state] Locking PCR0, PCR1 and PCR31
6,036,836 UART: [state] Locking ICCM
6,037,356 UART: [exit] Launching FMC @ 0x40000130
6,042,685 UART:
6,042,701 UART: Running Caliptra FMC ...
6,043,109 UART:
6,043,163 UART: [state] CFI Enabled
6,132,838 UART: [art] Extend RT PCRs Done
6,133,266 UART: [art] Lock RT PCRs Done
6,134,277 UART: [art] Populate DV Done
6,142,420 UART: [fht] FMC Alias Private Key: 7
6,143,532 UART: [art] Derive CDI
6,143,812 UART: [art] Store in in slot 0x4
6,229,669 UART: [art] Derive Key Pair
6,230,029 UART: [art] Store priv key in slot 0x5
6,243,277 UART: [art] Derive Key Pair - Done
6,257,844 UART: [art] Signing Cert with AUTHO
6,258,324 UART: RITY.KEYID = 7
6,273,362 UART: [art] Erasing AUTHORITY.KEYID = 7
6,274,127 UART: [art] PUB.X = 2369CE8D1A36D5BFA9F0F0DA865C611AABEC3AE7F6AEECF8868E67D9C5C24E0D5D6ADD218B670D8F8AF86A75EB3AA615
6,280,921 UART: [art] PUB.Y = A26DE22569F81D5F8AE6955A98F4986126F876B7D34A183715E71C6BD4E17436C71B4F80CC78D5F76D53DDC358389BF0
6,287,873 UART: [art] SIG.R = 80CCD56CE14C736E56899650DF3CD6374E549CE2DB26D9B54FB6EDB152E45353D725D545D055A2A98A666F14AE345D3B
6,294,651 UART: [art] SIG.S = 86A61C4114BFBD1BD5A2702D791C9F27DBC5BE5645A8380D088BA0EA19BD3E568D8D5400E0881CE23C4FF6A48B2C5855
6,318,428 UART: Caliptra RT
6,318,681 UART: [state] CFI Enabled
6,606,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,607,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,638,095 UART: [rt]cmd =0x494e464f, len=4
6,641,774 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,415 ready_for_fw is high
1,362,415 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,462,678 >>> mbox cmd response: success
2,462,678 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,400 UART:
2,524,416 UART: Running Caliptra FMC ...
2,524,824 UART:
2,524,878 UART: [state] CFI Enabled
2,535,295 UART: [fht] FMC Alias Private Key: 7
2,642,618 UART: [art] Extend RT PCRs Done
2,643,046 UART: [art] Lock RT PCRs Done
2,644,576 UART: [art] Populate DV Done
2,652,741 UART: [fht] FMC Alias Private Key: 7
2,653,887 UART: [art] Derive CDI
2,654,167 UART: [art] Store in in slot 0x4
2,739,938 UART: [art] Derive Key Pair
2,740,298 UART: [art] Store priv key in slot 0x5
2,752,822 UART: [art] Derive Key Pair - Done
2,767,350 UART: [art] Signing Cert with AUTHO
2,767,830 UART: RITY.KEYID = 7
2,782,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,783,413 UART: [art] PUB.X = AEC9CE6FFE3698D94B5A88BBE75A93357819EA9D4EF193C1C051964602C537A61FBF1C72A06EDE43F19A4D1315C8CD6E
2,790,196 UART: [art] PUB.Y = 95BAD0D711BDCF5DCE7B3930A077065E7CDE911D1DF652F9D35FC8630C9C8B1848F64BFE01026D848E43AF4E6E359111
2,797,146 UART: [art] SIG.R = E26921168B89F21F753FF9869584002CF15B82451DD6D7FF747C5D3E308565FF3B469F96E7B2DED61CE95C2761DA1937
2,803,894 UART: [art] SIG.S = C3BC0047AFCD87542B53791FC478DFB5FEAD08CCBBD6B5B0A59914BF53430D88E5885E4940DE63C94CB23EA64EB5F56A
2,827,851 UART: mbox::rt_entry...
2,828,223 UART: ____ _ _ _ ____ _____
2,829,007 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,829,807 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,830,575 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,831,343 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,832,111 UART: |_|
2,832,423 UART:
2,939,144 UART: [rt] Runtime listening for mailbox commands...
2,944,112 >>> mbox cmd response data (3272 bytes)
2,944,113 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,967,199 >>> mbox cmd response data (0 bytes)
2,967,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,725,665 >>> mbox cmd response: success
5,738,704 UART:
5,738,720 UART: Running Caliptra FMC ...
5,739,128 UART:
5,739,182 UART: [state] CFI Enabled
5,828,189 UART: [art] Extend RT PCRs Done
5,828,617 UART: [art] Lock RT PCRs Done
5,830,040 UART: [art] Populate DV Done
5,838,149 UART: [fht] FMC Alias Private Key: 7
5,839,193 UART: [art] Derive CDI
5,839,473 UART: [art] Store in in slot 0x4
5,925,308 UART: [art] Derive Key Pair
5,925,668 UART: [art] Store priv key in slot 0x5
5,938,912 UART: [art] Derive Key Pair - Done
5,953,439 UART: [art] Signing Cert with AUTHO
5,953,919 UART: RITY.KEYID = 7
5,969,531 UART: [art] Erasing AUTHORITY.KEYID = 7
5,970,296 UART: [art] PUB.X = 6F5C13DDD458C0C4A37FC3D28821358A65910923666B85FF4CCA9929CF8E5C6BC5B2138E667FF02803DC4CA207642F31
5,977,061 UART: [art] PUB.Y = 52EA9A6AC17BACBAFDB44DD409583FF9A9A5B4805B9908B56368DE0478D850DC34627B076D6E115D009D10C72C62F19F
5,983,987 UART: [art] SIG.R = 01F0532CC86AE3C45BED8E5D8F4EAFDCABF8CD2A11666F29BA3D2C0DE3F21A1B7A7EDD1D735356B5375DE895A10F6755
5,990,772 UART: [art] SIG.S = 5A86A840D271D6468775A0655ACE54E373408619F3C886410D3780AB56B9123BB648EECA7E7F043C364AA5C401766D53
6,014,396 UART: Caliptra RT
6,014,649 UART: [state] CFI Enabled
6,295,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,296,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,326,931 UART: [rt]cmd =0x494e464f, len=4
6,330,698 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,477,100 UART: [cold-reset] ++
1,477,426 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 ready_for_fw is high
1,481,524 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,489,251 UART: [idev] Erasing UDS.KEYID = 0
1,505,701 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,323 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,286 UART: [ldev] Erasing FE.KEYID = 1
1,547,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,581 UART: [ldev] --
1,586,964 UART: [fwproc] Waiting for Commands...
1,587,619 UART: [fwproc] Received command 0x46574c44
1,588,410 UART: [fwproc] Received Image of size 78456 bytes
2,475,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,899 >>> mbox cmd response: success
2,614,899 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,157 UART: [afmc] ++
2,616,325 UART: [afmc] CDI.KEYID = 6
2,616,687 UART: [afmc] SUBJECT.KEYID = 7
2,617,112 UART: [afmc] AUTHORITY.KEYID = 5
2,652,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,400 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,090 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,803 UART: [afmc] --
2,695,751 UART: [cold-reset] --
2,696,463 UART: [state] Locking Datavault
2,697,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,182 UART: [state] Locking ICCM
2,698,776 UART: [exit] Launching FMC @ 0x40000130
2,704,105 UART:
2,704,121 UART: Running Caliptra FMC ...
2,704,529 UART:
2,704,672 UART: [state] CFI Enabled
2,715,105 UART: [fht] FMC Alias Private Key: 7
2,822,786 UART: [art] Extend RT PCRs Done
2,823,214 UART: [art] Lock RT PCRs Done
2,824,808 UART: [art] Populate DV Done
2,833,047 UART: [fht] FMC Alias Private Key: 7
2,834,011 UART: [art] Derive CDI
2,834,291 UART: [art] Store in in slot 0x4
2,919,988 UART: [art] Derive Key Pair
2,920,348 UART: [art] Store priv key in slot 0x5
2,933,580 UART: [art] Derive Key Pair - Done
2,948,115 UART: [art] Signing Cert with AUTHO
2,948,595 UART: RITY.KEYID = 7
2,963,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,630 UART: [art] PUB.X = 5B4C14740C777395B292789EB293C0A0A5320FA1A9FBCFD23155D4125CD89788F13C46572DD7160E1433CC56B5A06419
2,971,387 UART: [art] PUB.Y = 4D612EF744B1328831992BC4296F79624B5011119B263EF38725D9791E7710ED901CC4A4613C4DEEAD9ADCB391BBE282
2,978,337 UART: [art] SIG.R = 0157739AC30C7E362487E3A7A8D881C758B5D0F0D0F5C8CDAFDE66EB84E8FEBD396D573BD9E629F4462205A20DEF564A
2,985,109 UART: [art] SIG.S = 3E976BCF25F01A91F1355E7B0FF87808A1D2420F0018A005A0AF0D815527677D7F1F2A2F5B75DEBC7E613DEE933FAD09
3,008,534 UART: mbox::rt_entry...
3,008,906 UART: ____ _ _ _ ____ _____
3,009,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,258 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,026 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,794 UART: |_|
3,013,106 UART:
3,119,001 UART: [rt] Runtime listening for mailbox commands...
3,123,969 >>> mbox cmd response data (3272 bytes)
3,123,970 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,056 >>> mbox cmd response data (0 bytes)
3,147,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,147,177 UART:
3,147,193 UART: Running Caliptra ROM ...
3,147,601 UART:
3,147,742 UART: [state] CFI Enabled
3,150,650 UART: [state] LifecycleState = Unprovisioned
3,151,305 UART: [state] DebugLocked = No
3,151,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,332 UART: [kat] SHA2-256
3,947,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,378 UART: [kat] ++
3,951,530 UART: [kat] sha1
3,955,804 UART: [kat] SHA2-256
3,957,742 UART: [kat] SHA2-384
3,960,443 UART: [kat] SHA2-512-ACC
3,962,343 UART: [kat] ECC-384
3,968,028 UART: [kat] HMAC-384Kdf
3,972,704 UART: [kat] LMS
4,540,900 UART: [kat] --
4,541,837 UART: [update-reset] ++
5,872,947 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,874,155 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,023,659 >>> mbox cmd response: success
6,023,862 UART: [update-reset] Copying MAN_2 To MAN_1
6,031,876 UART: [update-reset Success] --
6,033,013 UART: [state] Locking Datavault
6,033,739 UART: [state] Locking PCR0, PCR1 and PCR31
6,034,343 UART: [state] Locking ICCM
6,034,765 UART: [exit] Launching FMC @ 0x40000130
6,040,094 UART:
6,040,110 UART: Running Caliptra FMC ...
6,040,518 UART:
6,040,661 UART: [state] CFI Enabled
6,130,034 UART: [art] Extend RT PCRs Done
6,130,462 UART: [art] Lock RT PCRs Done
6,131,817 UART: [art] Populate DV Done
6,140,384 UART: [fht] FMC Alias Private Key: 7
6,141,484 UART: [art] Derive CDI
6,141,764 UART: [art] Store in in slot 0x4
6,226,803 UART: [art] Derive Key Pair
6,227,163 UART: [art] Store priv key in slot 0x5
6,240,583 UART: [art] Derive Key Pair - Done
6,254,981 UART: [art] Signing Cert with AUTHO
6,255,461 UART: RITY.KEYID = 7
6,270,999 UART: [art] Erasing AUTHORITY.KEYID = 7
6,271,764 UART: [art] PUB.X = 6576A1AA423587214754DD089960789CB9FBE22EF8663DFE0DB3BD96F80BAE52C3015800FAB8BB89B51EEE749710616A
6,278,506 UART: [art] PUB.Y = B355872727B9303DEE66BEB126E9B6C83D894247E2E4FB984F6867215FE21F0FCEA0B2335DE0374EEF342526E6631630
6,285,453 UART: [art] SIG.R = 808F4807C3A237CB304325DA1180318210EC98555217FC347DC4A0EBE1D2ABE78CB18CDC421DFF497CCA93DCA3F29D6E
6,292,234 UART: [art] SIG.S = DA9C5F8334D5DF4A07FDBC84533E66A0434D19917B50B5ED2B581804090284C66EBEE239E15B3477912E5F3E6557781F
6,316,105 UART: Caliptra RT
6,316,450 UART: [state] CFI Enabled
6,601,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,603,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,633,774 UART: [rt]cmd =0x494e464f, len=4
6,637,385 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,158 ready_for_fw is high
1,363,158 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,195 >>> mbox cmd response: success
2,463,195 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,525,491 UART:
2,525,507 UART: Running Caliptra FMC ...
2,525,915 UART:
2,526,058 UART: [state] CFI Enabled
2,536,539 UART: [fht] FMC Alias Private Key: 7
2,645,304 UART: [art] Extend RT PCRs Done
2,645,732 UART: [art] Lock RT PCRs Done
2,647,240 UART: [art] Populate DV Done
2,655,389 UART: [fht] FMC Alias Private Key: 7
2,656,491 UART: [art] Derive CDI
2,656,771 UART: [art] Store in in slot 0x4
2,742,380 UART: [art] Derive Key Pair
2,742,740 UART: [art] Store priv key in slot 0x5
2,756,224 UART: [art] Derive Key Pair - Done
2,770,943 UART: [art] Signing Cert with AUTHO
2,771,423 UART: RITY.KEYID = 7
2,787,167 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,932 UART: [art] PUB.X = 69A81FADE05BBF091E2C367B8F96687BF1B46ED1252D7405621D1C845FA2C0584D5192DD670E71F2C603C28E97094532
2,794,687 UART: [art] PUB.Y = EA2411EC72D3C42F5C064E5E689671E60E999054E91729530B1C7D2404229ED3828F898A839E1856F36FDCB2E6145493
2,801,617 UART: [art] SIG.R = 1938CB74D811BD1C6132099AD753A5172FF226CC2DC17695AF7C91DC34BD7F2BFC22FB701389EB28526C126529C5C413
2,808,388 UART: [art] SIG.S = CD754074D63A8E220AE46DBF5CD7730617D58B3079298C8DE8E4616402EAAAD39AA71B55E37946391D63FAB0EC2F93D0
2,832,428 UART: mbox::rt_entry...
2,832,800 UART: ____ _ _ _ ____ _____
2,833,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,384 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,152 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,920 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,688 UART: |_|
2,837,000 UART:
2,943,782 UART: [rt] Runtime listening for mailbox commands...
2,948,750 >>> mbox cmd response data (3272 bytes)
2,948,751 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,837 >>> mbox cmd response data (0 bytes)
2,971,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,731,274 >>> mbox cmd response: success
5,744,761 UART:
5,744,777 UART: Running Caliptra FMC ...
5,745,185 UART:
5,745,328 UART: [state] CFI Enabled
5,834,969 UART: [art] Extend RT PCRs Done
5,835,397 UART: [art] Lock RT PCRs Done
5,836,692 UART: [art] Populate DV Done
5,844,857 UART: [fht] FMC Alias Private Key: 7
5,845,811 UART: [art] Derive CDI
5,846,091 UART: [art] Store in in slot 0x4
5,931,480 UART: [art] Derive Key Pair
5,931,840 UART: [art] Store priv key in slot 0x5
5,945,644 UART: [art] Derive Key Pair - Done
5,960,471 UART: [art] Signing Cert with AUTHO
5,960,951 UART: RITY.KEYID = 7
5,976,335 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,100 UART: [art] PUB.X = E618741ACD0B72DD99E6D85BEB13C952F83603FC6199AA7F08EB65AC884420A5AFBEADC6EFB5F832BFABF1B723DF4F99
5,983,887 UART: [art] PUB.Y = 6C904D3621FB03DC3076505B04B989837D48669A170A2AD97E89C9A96231D96FFC642C3630B11F73D020422BDBA9B8DA
5,990,828 UART: [art] SIG.R = 96C2A356B94824469AB0157A308D4FB74DD37BB822F178A63CC8811F991A1AFD0FC5E288C9EA0023266869C71F16DACB
5,997,579 UART: [art] SIG.S = C457C43AFFFE71AD8740EDF2BAF66AE105913BF1F45FE3BF3C9A162C1891F72AA2D9A7FD941DE8E1ACC8448F4E683F9E
6,020,935 UART: Caliptra RT
6,021,280 UART: [state] CFI Enabled
6,303,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,304,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,335,098 UART: [rt]cmd =0x494e464f, len=4
6,338,677 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
893,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,531 UART: [kat] ++
897,683 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
918,482 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,307 UART: [cold-reset] ++
1,172,833 UART: [fht] FHT @ 0x50003400
1,175,378 UART: [idev] ++
1,175,546 UART: [idev] CDI.KEYID = 6
1,175,906 UART: [idev] SUBJECT.KEYID = 7
1,176,330 UART: [idev] UDS.KEYID = 0
1,176,675 ready_for_fw is high
1,176,675 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,015 UART: [idev] Sha1 KeyId Algorithm
1,209,443 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,982 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,216,971 UART: [ldev] Erasing FE.KEYID = 1
1,243,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,695 UART: [ldev] --
1,283,080 UART: [fwproc] Wait for Commands...
1,283,694 UART: [fwproc] Recv command 0x46574c44
1,284,422 UART: [fwproc] Recv'd Img size: 78456 bytes
2,172,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,162 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,312,187 >>> mbox cmd response: success
2,312,187 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,289 UART: [afmc] ++
2,313,457 UART: [afmc] CDI.KEYID = 6
2,313,819 UART: [afmc] SUBJECT.KEYID = 7
2,314,244 UART: [afmc] AUTHORITY.KEYID = 5
2,348,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,592 UART: [afmc] --
2,392,502 UART: [cold-reset] --
2,393,420 UART: [state] Locking Datavault
2,394,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,333 UART: [state] Locking ICCM
2,395,893 UART: [exit] Launching FMC @ 0x40000130
2,401,222 UART:
2,401,238 UART: Running Caliptra FMC ...
2,401,646 UART:
2,401,700 UART: [state] CFI Enabled
2,412,199 UART: [fht] FMC Alias Private Key: 7
2,520,534 UART: [art] Extend RT PCRs Done
2,520,962 UART: [art] Lock RT PCRs Done
2,522,664 UART: [art] Populate DV Done
2,530,689 UART: [fht] FMC Alias Private Key: 7
2,531,871 UART: [art] Derive CDI
2,532,151 UART: [art] Store in in slot 0x4
2,617,806 UART: [art] Derive Key Pair
2,618,166 UART: [art] Store priv key in slot 0x5
2,631,192 UART: [art] Derive Key Pair - Done
2,646,438 UART: [art] Signing Cert with AUTHO
2,646,918 UART: RITY.KEYID = 7
2,662,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,157 UART: [art] PUB.X = 07032ED731F97912EDA586F4C24C94156AAE4B90BEDA205207559F3CC1A6A862D2C699473ADCC86175009BFB77026F3C
2,669,897 UART: [art] PUB.Y = 823DE866CD39F0CB18E2F5E10784B77FB2012D140F869B5275EF585D20D1D43FF7A9AC5137511006814886F0B8F1E05D
2,676,835 UART: [art] SIG.R = BD08B1401A092319EEB211046BEDB81E9BBF0478328B8FFC080843B0ECDE5BF7C44DC712B6548D27C5890278BDB687FB
2,683,596 UART: [art] SIG.S = 6DBCD45D11C28C04D9E6C9C7F784713B4886575CA7250487BC153A466B879B46B4BBA628DEAAAB4C05C0562980512160
2,707,084 UART: mbox::rt_entry...
2,707,456 UART: ____ _ _ _ ____ _____
2,708,240 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,576 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,344 UART: |_|
2,711,656 UART:
2,817,980 UART: [rt] Runtime listening for mailbox commands...
2,822,948 >>> mbox cmd response data (3272 bytes)
2,822,949 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,035 >>> mbox cmd response data (0 bytes)
2,846,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,846,153 UART:
2,846,169 UART: Running Caliptra ROM ...
2,846,577 UART:
2,846,632 UART: [state] CFI Enabled
2,849,520 UART: [state] LifecycleState = Unprovisioned
2,850,175 UART: [state] DebugLocked = No
2,850,799 UART: [state] WD Timer not started. Device not locked for debugging
2,851,957 UART: [kat] SHA2-256
3,657,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,732 UART: [kat] ++
3,661,884 UART: [kat] sha1
3,666,058 UART: [kat] SHA2-256
3,667,998 UART: [kat] SHA2-384
3,670,783 UART: [kat] SHA2-512-ACC
3,672,683 UART: [kat] ECC-384
3,682,422 UART: [kat] HMAC-384Kdf
3,687,000 UART: [kat] LMS
3,935,328 UART: [kat] --
3,936,218 UART: [update-reset] ++
5,244,636 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,245,713 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,395,165 >>> mbox cmd response: success
5,395,272 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,286 UART: [update-reset Success] --
5,404,171 UART: [state] Locking Datavault
5,405,035 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,639 UART: [state] Locking ICCM
5,406,191 UART: [exit] Launching FMC @ 0x40000130
5,411,520 UART:
5,411,536 UART: Running Caliptra FMC ...
5,411,944 UART:
5,411,998 UART: [state] CFI Enabled
5,501,185 UART: [art] Extend RT PCRs Done
5,501,613 UART: [art] Lock RT PCRs Done
5,502,898 UART: [art] Populate DV Done
5,511,069 UART: [fht] FMC Alias Private Key: 7
5,512,077 UART: [art] Derive CDI
5,512,357 UART: [art] Store in in slot 0x4
5,598,314 UART: [art] Derive Key Pair
5,598,674 UART: [art] Store priv key in slot 0x5
5,611,532 UART: [art] Derive Key Pair - Done
5,626,334 UART: [art] Signing Cert with AUTHO
5,626,814 UART: RITY.KEYID = 7
5,641,786 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,551 UART: [art] PUB.X = 33CC6EC6C902DAC54C560E64405D578CE8EDD945AE3F5342703B4CAC6BF49CB5BBAD86093720148C9A8A64DB667A4A9F
5,649,328 UART: [art] PUB.Y = 08E9975BAF44F429421387A46D5DD31B16BA13262D6E762CDD47FBC54EF8B704FFA8EB495F36D066E8C705217F6BC465
5,656,277 UART: [art] SIG.R = DF6AB8927B793206DADAE18394F0551F72383C4DED1D5B70E767267ABE25E0D817EDCECDE517B76ADAA8F8C5A0814FEA
5,663,066 UART: [art] SIG.S = 5FE51C36C6188D65D30F3978BC2021FE88833D38F1ED9674A6C9657EA6B69C82EDF564C0BE0AAA1907DFC92CA65D60C0
5,687,046 UART: Caliptra RT
5,687,299 UART: [state] CFI Enabled
5,970,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,972,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,026 UART: [rt]cmd =0x494e464f, len=4
6,006,775 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,555 ready_for_fw is high
1,060,555 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,161,148 >>> mbox cmd response: success
2,161,148 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,384 UART:
2,223,400 UART: Running Caliptra FMC ...
2,223,808 UART:
2,223,862 UART: [state] CFI Enabled
2,234,441 UART: [fht] FMC Alias Private Key: 7
2,342,584 UART: [art] Extend RT PCRs Done
2,343,012 UART: [art] Lock RT PCRs Done
2,344,594 UART: [art] Populate DV Done
2,352,859 UART: [fht] FMC Alias Private Key: 7
2,353,861 UART: [art] Derive CDI
2,354,141 UART: [art] Store in in slot 0x4
2,439,774 UART: [art] Derive Key Pair
2,440,134 UART: [art] Store priv key in slot 0x5
2,453,246 UART: [art] Derive Key Pair - Done
2,468,062 UART: [art] Signing Cert with AUTHO
2,468,542 UART: RITY.KEYID = 7
2,483,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,365 UART: [art] PUB.X = 5ED98F3F8B263B321432E6FE53A5AB7724A8CB312B79EABAE9793E29B4FCE5CDC8ED75B3EB1ECF27AD4723F2BA00ECA0
2,491,141 UART: [art] PUB.Y = 785D187F51C447AB6D757A02007B9765FA2AC7C7D1AD6AC1774A68209754E847F7C26246129BFD295E65A03D765C7DC3
2,498,066 UART: [art] SIG.R = 4F2B47526828C4ECFAF62337BD59DF79F0EFB858989FDFC8DBB57AEE3938AF63DFF0ECC501DCEB40BD4D8C046C46423D
2,504,856 UART: [art] SIG.S = 84D2250B991C51AB834FE88BB2D055F40D0A2CEA14C0F3A7144E39056FC2459BDCE3C6D866437A9EABBB67C0800613B8
2,528,654 UART: mbox::rt_entry...
2,529,026 UART: ____ _ _ _ ____ _____
2,529,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,914 UART: |_|
2,533,226 UART:
2,638,584 UART: [rt] Runtime listening for mailbox commands...
2,643,552 >>> mbox cmd response data (3272 bytes)
2,643,553 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,639 >>> mbox cmd response data (0 bytes)
2,666,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,100,528 >>> mbox cmd response: success
5,113,882 UART:
5,113,898 UART: Running Caliptra FMC ...
5,114,306 UART:
5,114,360 UART: [state] CFI Enabled
5,203,611 UART: [art] Extend RT PCRs Done
5,204,039 UART: [art] Lock RT PCRs Done
5,205,074 UART: [art] Populate DV Done
5,213,461 UART: [fht] FMC Alias Private Key: 7
5,214,395 UART: [art] Derive CDI
5,214,675 UART: [art] Store in in slot 0x4
5,300,314 UART: [art] Derive Key Pair
5,300,674 UART: [art] Store priv key in slot 0x5
5,313,578 UART: [art] Derive Key Pair - Done
5,328,370 UART: [art] Signing Cert with AUTHO
5,328,850 UART: RITY.KEYID = 7
5,343,930 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,695 UART: [art] PUB.X = D572EBAA0B09BDEB1760A0DC0BDCFE997F85E8B92CAC8BCFE16DD78107BC4F28FFB1F300D0997BD5DF61A48B766FA864
5,351,461 UART: [art] PUB.Y = AC7C3E573ADAD96C6AEB7493DFE7164DAD5AA6A0B7878A6B578EBB8855873E2DC5D2C514792FA104AA7F0F6B33465750
5,358,421 UART: [art] SIG.R = ABB8264EDB130850F93EA235DA2EC8CD5C900CC5C57C0CC873C49176AC986F66828F89026A3BF3AF1982609535AFF3A3
5,365,189 UART: [art] SIG.S = D5676FABEFF67125AECEA4EF2EAC76FC6B60D8DE657E4DEDAB5F5D905FC4F263EC0125293522B0D01CFEF59D9C755D69
5,389,525 UART: Caliptra RT
5,389,778 UART: [state] CFI Enabled
5,671,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,673,300 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,703,694 UART: [rt]cmd =0x494e464f, len=4
5,707,397 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,269 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,171,882 UART: [cold-reset] ++
1,172,298 UART: [fht] FHT @ 0x50003400
1,174,953 UART: [idev] ++
1,175,121 UART: [idev] CDI.KEYID = 6
1,175,481 UART: [idev] SUBJECT.KEYID = 7
1,175,905 UART: [idev] UDS.KEYID = 0
1,176,250 ready_for_fw is high
1,176,250 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,805 UART: [idev] Erasing UDS.KEYID = 0
1,200,838 UART: [idev] Sha1 KeyId Algorithm
1,209,336 UART: [idev] --
1,210,568 UART: [ldev] ++
1,210,736 UART: [ldev] CDI.KEYID = 6
1,211,099 UART: [ldev] SUBJECT.KEYID = 5
1,211,525 UART: [ldev] AUTHORITY.KEYID = 7
1,211,988 UART: [ldev] FE.KEYID = 1
1,217,542 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,908 UART: [ldev] --
1,283,273 UART: [fwproc] Wait for Commands...
1,284,003 UART: [fwproc] Recv command 0x46574c44
1,284,731 UART: [fwproc] Recv'd Img size: 78456 bytes
2,173,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,969 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,982 >>> mbox cmd response: success
2,310,982 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,126 UART: [afmc] ++
2,312,294 UART: [afmc] CDI.KEYID = 6
2,312,656 UART: [afmc] SUBJECT.KEYID = 7
2,313,081 UART: [afmc] AUTHORITY.KEYID = 5
2,348,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,643 UART: [afmc] --
2,391,703 UART: [cold-reset] --
2,392,603 UART: [state] Locking Datavault
2,393,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,256 UART: [state] Locking ICCM
2,394,904 UART: [exit] Launching FMC @ 0x40000130
2,400,233 UART:
2,400,249 UART: Running Caliptra FMC ...
2,400,657 UART:
2,400,800 UART: [state] CFI Enabled
2,411,827 UART: [fht] FMC Alias Private Key: 7
2,520,254 UART: [art] Extend RT PCRs Done
2,520,682 UART: [art] Lock RT PCRs Done
2,522,152 UART: [art] Populate DV Done
2,530,465 UART: [fht] FMC Alias Private Key: 7
2,531,433 UART: [art] Derive CDI
2,531,713 UART: [art] Store in in slot 0x4
2,617,488 UART: [art] Derive Key Pair
2,617,848 UART: [art] Store priv key in slot 0x5
2,631,180 UART: [art] Derive Key Pair - Done
2,645,881 UART: [art] Signing Cert with AUTHO
2,646,361 UART: RITY.KEYID = 7
2,661,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,256 UART: [art] PUB.X = D0AEBBB4192926046117BFB6C6918CEA49489753EE7DEFF2588810714EBDBEB56E2CCEABA143B9CB9880E0567245EF2C
2,669,039 UART: [art] PUB.Y = FD7D465FCE938487E3DA6CE0A30CE668C2E75C55B09C7973DAEC5ACAA7115065C451079A749C56E27810DCB758515DEC
2,675,995 UART: [art] SIG.R = F9A1469C130852D4E08957E4A0B135B534A725B279C8C668C7DA8696EE054FCE07B8A2486CCF4DABC83E94EC17BE2F42
2,682,766 UART: [art] SIG.S = 3D4BD0BB059EF164F62AD80A13D3747AB32BD1110EF1132ACAB4A4F33EE87DD084B949984E0205FCFA23BCA6454DBCD0
2,706,456 UART: mbox::rt_entry...
2,706,828 UART: ____ _ _ _ ____ _____
2,707,612 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,412 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,180 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,948 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,716 UART: |_|
2,711,028 UART:
2,817,574 UART: [rt] Runtime listening for mailbox commands...
2,822,542 >>> mbox cmd response data (3272 bytes)
2,822,543 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,629 >>> mbox cmd response data (0 bytes)
2,845,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,845,747 UART:
2,845,763 UART: Running Caliptra ROM ...
2,846,171 UART:
2,846,313 UART: [state] CFI Enabled
2,848,867 UART: [state] LifecycleState = Unprovisioned
2,849,522 UART: [state] DebugLocked = No
2,850,124 UART: [state] WD Timer not started. Device not locked for debugging
2,851,434 UART: [kat] SHA2-256
3,657,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,209 UART: [kat] ++
3,661,361 UART: [kat] sha1
3,665,479 UART: [kat] SHA2-256
3,667,419 UART: [kat] SHA2-384
3,670,112 UART: [kat] SHA2-512-ACC
3,672,012 UART: [kat] ECC-384
3,682,089 UART: [kat] HMAC-384Kdf
3,686,759 UART: [kat] LMS
3,935,087 UART: [kat] --
3,935,921 UART: [update-reset] ++
5,246,199 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,182 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,396,634 >>> mbox cmd response: success
5,396,895 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,909 UART: [update-reset Success] --
5,405,886 UART: [state] Locking Datavault
5,406,640 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,244 UART: [state] Locking ICCM
5,407,792 UART: [exit] Launching FMC @ 0x40000130
5,413,121 UART:
5,413,137 UART: Running Caliptra FMC ...
5,413,545 UART:
5,413,688 UART: [state] CFI Enabled
5,502,435 UART: [art] Extend RT PCRs Done
5,502,863 UART: [art] Lock RT PCRs Done
5,504,186 UART: [art] Populate DV Done
5,512,379 UART: [fht] FMC Alias Private Key: 7
5,513,393 UART: [art] Derive CDI
5,513,673 UART: [art] Store in in slot 0x4
5,599,138 UART: [art] Derive Key Pair
5,599,498 UART: [art] Store priv key in slot 0x5
5,612,358 UART: [art] Derive Key Pair - Done
5,627,297 UART: [art] Signing Cert with AUTHO
5,627,777 UART: RITY.KEYID = 7
5,643,179 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,944 UART: [art] PUB.X = 7D65BC648ABF5FD2AB9C569C43D6F8F0003232005C021449FF0F1C18C9FBF5356A7A6CD801C06F6DD632B47F2D468C39
5,650,671 UART: [art] PUB.Y = B5866C71ED24750B938713E75138DF55834458737A1E8B2FF87AD4C2D6B5C04E06FC5EAD8D1C225D0350C0A4D75F7B71
5,657,616 UART: [art] SIG.R = 3E8985C643854748A9CE6C0B8AA2BBAE7CE2FE8854F6FFDCC532E06009493DA20D27D1423D9F7274C8DB844EE3BD5071
5,664,389 UART: [art] SIG.S = A909BB0AE82EE47D9593A6E71C047EC3022DD24B7EC1877B58B07A458821964DCE994D0D58F41702041BB7770CF4A289
5,687,936 UART: Caliptra RT
5,688,281 UART: [state] CFI Enabled
5,966,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,968,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,658 UART: [rt]cmd =0x494e464f, len=4
6,002,255 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,094 ready_for_fw is high
1,061,094 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,164,213 >>> mbox cmd response: success
2,164,213 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,226,475 UART:
2,226,491 UART: Running Caliptra FMC ...
2,226,899 UART:
2,227,042 UART: [state] CFI Enabled
2,237,811 UART: [fht] FMC Alias Private Key: 7
2,345,824 UART: [art] Extend RT PCRs Done
2,346,252 UART: [art] Lock RT PCRs Done
2,347,920 UART: [art] Populate DV Done
2,356,321 UART: [fht] FMC Alias Private Key: 7
2,357,287 UART: [art] Derive CDI
2,357,567 UART: [art] Store in in slot 0x4
2,443,520 UART: [art] Derive Key Pair
2,443,880 UART: [art] Store priv key in slot 0x5
2,457,494 UART: [art] Derive Key Pair - Done
2,471,983 UART: [art] Signing Cert with AUTHO
2,472,463 UART: RITY.KEYID = 7
2,487,973 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,738 UART: [art] PUB.X = 5FB0830DF826769165372165C890E9068F998B2C7AD30938E554F729966B5A597C35CF285B4A4BE301C285F5F55FDFA3
2,495,492 UART: [art] PUB.Y = 4F55AB9DC96AE2F6F08536E831F7A569208DE0A4E0878F6F1CEA22D0645C717E99E1A6C8910CF82D9BACA37E2AE0630D
2,502,450 UART: [art] SIG.R = 2780B08F06D1BDE3B4D4F778A943C9D198BB924144FACD25C9B578892618EFFBE731573C5BAE23051011644A2AC13E1A
2,509,220 UART: [art] SIG.S = A73D61A8EB4BEDEF3F5CF950DF2DB0EACE42DF88CD3B46EEE0A8FC4C5B94958120615AD6E92C971226218B8A1FB557DB
2,532,899 UART: mbox::rt_entry...
2,533,271 UART: ____ _ _ _ ____ _____
2,534,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,623 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,391 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,537,159 UART: |_|
2,537,471 UART:
2,644,289 UART: [rt] Runtime listening for mailbox commands...
2,649,257 >>> mbox cmd response data (3272 bytes)
2,649,258 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,672,344 >>> mbox cmd response data (0 bytes)
2,672,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,104,988 >>> mbox cmd response: success
5,118,512 UART:
5,118,528 UART: Running Caliptra FMC ...
5,118,936 UART:
5,119,079 UART: [state] CFI Enabled
5,208,100 UART: [art] Extend RT PCRs Done
5,208,528 UART: [art] Lock RT PCRs Done
5,209,591 UART: [art] Populate DV Done
5,218,006 UART: [fht] FMC Alias Private Key: 7
5,219,058 UART: [art] Derive CDI
5,219,338 UART: [art] Store in in slot 0x4
5,305,437 UART: [art] Derive Key Pair
5,305,797 UART: [art] Store priv key in slot 0x5
5,318,863 UART: [art] Derive Key Pair - Done
5,333,748 UART: [art] Signing Cert with AUTHO
5,334,228 UART: RITY.KEYID = 7
5,349,678 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,443 UART: [art] PUB.X = B267EF0791810696E512E9345C46907805D7FC0087E6F02687C8002BF1323BFAE0B56A6D8A560CDD65BAD58032BAFBEB
5,357,163 UART: [art] PUB.Y = 7C5232A7FE4C141D1F32EBBB370B27C08585A46AEDE72E7A1FE3CCD22F15EDE432CAAA31518BC94C155FBDECF99D28FF
5,364,138 UART: [art] SIG.R = 949323FE99B8CF8C94EDC8F7C18CA0C189271860C8439E9044F2CC992F9435CADB299EA0AB611B4C29073133875BDA21
5,370,909 UART: [art] SIG.S = F6122DC7DD733716C2C82E55F1CF13BD8B62A46898B3DBDD90B31952C0457336B62002227D8F63368B9D10E64B15AE50
5,395,029 UART: Caliptra RT
5,395,374 UART: [state] CFI Enabled
5,677,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,678,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,709,044 UART: [rt]cmd =0x494e464f, len=4
5,712,791 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,530 UART: [kat] HMAC-384Kdf
919,912 UART: [kat] LMS
1,168,224 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,735 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,173,621 ready_for_fw is high
1,173,621 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,169 UART: [idev] Erasing UDS.KEYID = 0
1,197,821 UART: [idev] Sha1 KeyId Algorithm
1,206,667 UART: [idev] --
1,207,508 UART: [ldev] ++
1,207,676 UART: [ldev] CDI.KEYID = 6
1,208,040 UART: [ldev] SUBJECT.KEYID = 5
1,208,467 UART: [ldev] AUTHORITY.KEYID = 7
1,208,930 UART: [ldev] FE.KEYID = 1
1,214,230 UART: [ldev] Erasing FE.KEYID = 1
1,240,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,512 UART: [ldev] --
1,279,848 UART: [fwproc] Wait for Commands...
1,280,545 UART: [fwproc] Recv command 0x46574c44
1,281,278 UART: [fwproc] Recv'd Img size: 78456 bytes
2,168,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,013 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,306,927 >>> mbox cmd response: success
2,306,927 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,308,072 UART: [afmc] ++
2,308,240 UART: [afmc] CDI.KEYID = 6
2,308,603 UART: [afmc] SUBJECT.KEYID = 7
2,309,029 UART: [afmc] AUTHORITY.KEYID = 5
2,344,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,361,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,339 UART: [afmc] --
2,388,303 UART: [cold-reset] --
2,389,159 UART: [state] Locking Datavault
2,390,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,952 UART: [state] Locking ICCM
2,391,416 UART: [exit] Launching FMC @ 0x40000130
2,396,745 UART:
2,396,761 UART: Running Caliptra FMC ...
2,397,169 UART:
2,397,223 UART: [state] CFI Enabled
2,407,714 UART: [fht] FMC Alias Private Key: 7
2,516,163 UART: [art] Extend RT PCRs Done
2,516,591 UART: [art] Lock RT PCRs Done
2,518,153 UART: [art] Populate DV Done
2,526,394 UART: [fht] FMC Alias Private Key: 7
2,527,546 UART: [art] Derive CDI
2,527,826 UART: [art] Store in in slot 0x4
2,613,545 UART: [art] Derive Key Pair
2,613,905 UART: [art] Store priv key in slot 0x5
2,626,627 UART: [art] Derive Key Pair - Done
2,641,206 UART: [art] Signing Cert with AUTHO
2,641,686 UART: RITY.KEYID = 7
2,656,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,487 UART: [art] PUB.X = 35D7F2AE5EE4A24D044CF887CE469730E799070CA0AB42EF73D924BDFB9281D7F44856A7EE4436394991647D932B2421
2,664,248 UART: [art] PUB.Y = 35DAEBF1B9EA949E88A1B677D3B7603C24D725869DFAD863EE640EECCB8B2FCACB24D37B66B635648CD3C7F81AC6B7D4
2,671,219 UART: [art] SIG.R = 20AB6B6C92F08F7654FA5C141A12DF6BA253B8612BD276EBF5531DC7A9075407047726BE4C943CEA7C4F93C7889A8D6B
2,677,988 UART: [art] SIG.S = A3CD0C8D2B90DAB02D33492CA712D347FFA7343861EA8EB1FB33A48A580239203D395133BC4ECF3ECD5A1613778E71BF
2,701,975 UART: mbox::rt_entry...
2,702,347 UART: ____ _ _ _ ____ _____
2,703,131 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,703,931 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,467 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,235 UART: |_|
2,706,547 UART:
2,813,003 UART: [rt] Runtime listening for mailbox commands...
2,817,971 >>> mbox cmd response data (3272 bytes)
2,817,972 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,841,058 >>> mbox cmd response data (0 bytes)
2,841,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,841,176 UART:
2,841,192 UART: Running Caliptra ROM ...
2,841,600 UART:
2,841,655 UART: [state] CFI Enabled
2,844,289 UART: [state] LifecycleState = Unprovisioned
2,844,944 UART: [state] DebugLocked = No
2,845,486 UART: [state] WD Timer not started. Device not locked for debugging
2,846,602 UART: [kat] SHA2-256
3,650,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,281 UART: [kat] ++
3,654,433 UART: [kat] sha1
3,658,751 UART: [kat] SHA2-256
3,660,691 UART: [kat] SHA2-384
3,663,554 UART: [kat] SHA2-512-ACC
3,665,454 UART: [kat] ECC-384
3,675,485 UART: [kat] HMAC-384Kdf
3,679,907 UART: [kat] LMS
3,928,219 UART: [kat] --
3,929,257 UART: [update-reset] ++
5,239,460 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,240,531 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,389,983 >>> mbox cmd response: success
5,390,288 UART: [update-reset] Copying MAN_2 To MAN_1
5,398,302 UART: [update-reset Success] --
5,399,405 UART: [state] Locking Datavault
5,400,077 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,681 UART: [state] Locking ICCM
5,401,267 UART: [exit] Launching FMC @ 0x40000130
5,406,596 UART:
5,406,612 UART: Running Caliptra FMC ...
5,407,020 UART:
5,407,074 UART: [state] CFI Enabled
5,495,659 UART: [art] Extend RT PCRs Done
5,496,087 UART: [art] Lock RT PCRs Done
5,497,150 UART: [art] Populate DV Done
5,505,269 UART: [fht] FMC Alias Private Key: 7
5,506,223 UART: [art] Derive CDI
5,506,503 UART: [art] Store in in slot 0x4
5,592,006 UART: [art] Derive Key Pair
5,592,366 UART: [art] Store priv key in slot 0x5
5,605,372 UART: [art] Derive Key Pair - Done
5,620,235 UART: [art] Signing Cert with AUTHO
5,620,715 UART: RITY.KEYID = 7
5,635,831 UART: [art] Erasing AUTHORITY.KEYID = 7
5,636,596 UART: [art] PUB.X = CEE72C4590E011ED2753A1032E5821577F8AC18BE6D6C5C07573AB81841AEBC3CC09BD68B00D9CC134B726567BF55003
5,643,360 UART: [art] PUB.Y = 79702D0830A57EA253F4AA876F90B35541CAB03FF3E5222839B1F8EDCD55FA84FBD33BF467D277B48DE872EEEB604A57
5,650,319 UART: [art] SIG.R = 0DDFF62D4F5004E0DA133AE46D17F875F559D27A6B5D3FDE6F710C03EC7C3A0FFCAF8AEB536AE9927D8FEB578449BC0B
5,657,097 UART: [art] SIG.S = EB9F735CA6F6641DCCCD38D49C3E79C7D7F904BFA58286B0E396AC5B2B6C9B5DE428C221CC73C3C4F3480A9EB3489628
5,681,044 UART: Caliptra RT
5,681,297 UART: [state] CFI Enabled
5,960,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,961,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,992,590 UART: [rt]cmd =0x494e464f, len=4
5,996,257 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,848 ready_for_fw is high
1,056,848 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,159,623 >>> mbox cmd response: success
2,159,623 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,695 UART:
2,220,711 UART: Running Caliptra FMC ...
2,221,119 UART:
2,221,173 UART: [state] CFI Enabled
2,231,570 UART: [fht] FMC Alias Private Key: 7
2,339,687 UART: [art] Extend RT PCRs Done
2,340,115 UART: [art] Lock RT PCRs Done
2,341,571 UART: [art] Populate DV Done
2,349,676 UART: [fht] FMC Alias Private Key: 7
2,350,704 UART: [art] Derive CDI
2,350,984 UART: [art] Store in in slot 0x4
2,436,777 UART: [art] Derive Key Pair
2,437,137 UART: [art] Store priv key in slot 0x5
2,450,295 UART: [art] Derive Key Pair - Done
2,465,289 UART: [art] Signing Cert with AUTHO
2,465,769 UART: RITY.KEYID = 7
2,481,183 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,948 UART: [art] PUB.X = 57F7DB039394F800589ECB8C4DA946AA41F0ABBA18ABAF35B45DD48829FA631D24E849A3C1EDB59961F25788E5443DDB
2,488,707 UART: [art] PUB.Y = 103C6EADC7D564317C93AC7C596B40CBE5BB6A01BCA21DAD9D365345579EAE69D3C8895A3DF231270E0620AB67F178D1
2,495,660 UART: [art] SIG.R = 586FBA2E6B48BBA0CBFE586C60FD3EF7ECADB33AF893FE7CFFB631822BF58EEFE13A4AF32A944770978F47980095BD2F
2,502,434 UART: [art] SIG.S = F80E747F1321980C674E6F222B92D4E640D187B001BD6BF227EC1F4DB5BAFD20A7A62537A04E7653D1988D3A6EDACB5D
2,525,998 UART: mbox::rt_entry...
2,526,370 UART: ____ _ _ _ ____ _____
2,527,154 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,954 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,722 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,258 UART: |_|
2,530,570 UART:
2,636,926 UART: [rt] Runtime listening for mailbox commands...
2,641,894 >>> mbox cmd response data (3272 bytes)
2,641,895 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,664,981 >>> mbox cmd response data (0 bytes)
2,664,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,096,109 >>> mbox cmd response: success
5,109,573 UART:
5,109,589 UART: Running Caliptra FMC ...
5,109,997 UART:
5,110,051 UART: [state] CFI Enabled
5,199,008 UART: [art] Extend RT PCRs Done
5,199,436 UART: [art] Lock RT PCRs Done
5,200,747 UART: [art] Populate DV Done
5,208,826 UART: [fht] FMC Alias Private Key: 7
5,209,844 UART: [art] Derive CDI
5,210,124 UART: [art] Store in in slot 0x4
5,295,105 UART: [art] Derive Key Pair
5,295,465 UART: [art] Store priv key in slot 0x5
5,308,125 UART: [art] Derive Key Pair - Done
5,323,213 UART: [art] Signing Cert with AUTHO
5,323,693 UART: RITY.KEYID = 7
5,339,475 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,240 UART: [art] PUB.X = 099233ECD762425889EBDC43CD9DC709B5537166916E0CCB7842ACB486421826042D87B8B490B2513D4AC4D9764CD6B5
5,346,996 UART: [art] PUB.Y = ADDE0734F62796ACB8948F7EAEF90FA0BB5D6EC6F5A475704FE884461800349399CAA54376DFAF92A953278EABB37A23
5,353,930 UART: [art] SIG.R = 7644C6F849A36A9CBC194EC3C9FA0B744F8C34ACB012CD16F3391B710B3C26314AA97C9A8554B07BE7AFA33043DA565D
5,360,706 UART: [art] SIG.S = 695E0DF7075999938AACB200CE9E154F75DEC7AA41B36189903D92D7C080311577F3183953B0ECA9B5D55441242B8517
5,384,409 UART: Caliptra RT
5,384,662 UART: [state] CFI Enabled
5,669,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,670,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,700,941 UART: [rt]cmd =0x494e464f, len=4
5,704,698 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,056 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,858 UART: [kat] ++
896,010 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,891 UART: [kat] SHA2-512-ACC
906,792 UART: [kat] ECC-384
916,399 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,173,024 UART: [idev] ++
1,173,192 UART: [idev] CDI.KEYID = 6
1,173,553 UART: [idev] SUBJECT.KEYID = 7
1,173,978 UART: [idev] UDS.KEYID = 0
1,174,324 ready_for_fw is high
1,174,324 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,100 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,515 UART: [ldev] ++
1,209,683 UART: [ldev] CDI.KEYID = 6
1,210,047 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,321 UART: [fwproc] Wait for Commands...
1,281,992 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 78456 bytes
2,169,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,512 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,562 >>> mbox cmd response: success
2,308,562 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,309,739 UART: [afmc] ++
2,309,907 UART: [afmc] CDI.KEYID = 6
2,310,270 UART: [afmc] SUBJECT.KEYID = 7
2,310,696 UART: [afmc] AUTHORITY.KEYID = 5
2,345,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,176 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,136 UART: [afmc] --
2,389,104 UART: [cold-reset] --
2,390,062 UART: [state] Locking Datavault
2,391,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,739 UART: [state] Locking ICCM
2,392,189 UART: [exit] Launching FMC @ 0x40000130
2,397,518 UART:
2,397,534 UART: Running Caliptra FMC ...
2,397,942 UART:
2,398,085 UART: [state] CFI Enabled
2,408,546 UART: [fht] FMC Alias Private Key: 7
2,516,419 UART: [art] Extend RT PCRs Done
2,516,847 UART: [art] Lock RT PCRs Done
2,518,409 UART: [art] Populate DV Done
2,526,594 UART: [fht] FMC Alias Private Key: 7
2,527,534 UART: [art] Derive CDI
2,527,814 UART: [art] Store in in slot 0x4
2,613,281 UART: [art] Derive Key Pair
2,613,641 UART: [art] Store priv key in slot 0x5
2,627,361 UART: [art] Derive Key Pair - Done
2,642,151 UART: [art] Signing Cert with AUTHO
2,642,631 UART: RITY.KEYID = 7
2,657,641 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,406 UART: [art] PUB.X = FB897D335F9E46A2B22DD58CA557ED75C210E94593C95AD09EFED0B685E3CF897E00C1BE9598058789563B3B49345CF1
2,665,157 UART: [art] PUB.Y = 429249E2CB9CF9302A2B2AB147E10DD3F32E24EADD62CDB522B0D3A72E279A2881BC81900FF89790478C260A86E86786
2,672,102 UART: [art] SIG.R = A014B957BFB4DD1B118A24A250A64B94CED833D805D1978557CE212ECF0DCE8540C3A76BD50ECE30176472F9E222D070
2,678,871 UART: [art] SIG.S = 978DD8935A00539A40D23D73C4D2442D4F4431385E726F1E321E01724481CA7A343C0FD3FAE64F7533D2CE1F48277F76
2,702,410 UART: mbox::rt_entry...
2,702,782 UART: ____ _ _ _ ____ _____
2,703,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,366 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,134 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,670 UART: |_|
2,706,982 UART:
2,815,289 UART: [rt] Runtime listening for mailbox commands...
2,820,257 >>> mbox cmd response data (3272 bytes)
2,820,258 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,344 >>> mbox cmd response data (0 bytes)
2,843,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,462 UART:
2,843,478 UART: Running Caliptra ROM ...
2,843,886 UART:
2,844,028 UART: [state] CFI Enabled
2,846,514 UART: [state] LifecycleState = Unprovisioned
2,847,169 UART: [state] DebugLocked = No
2,847,725 UART: [state] WD Timer not started. Device not locked for debugging
2,848,963 UART: [kat] SHA2-256
3,652,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,642 UART: [kat] ++
3,656,794 UART: [kat] sha1
3,661,048 UART: [kat] SHA2-256
3,662,988 UART: [kat] SHA2-384
3,665,817 UART: [kat] SHA2-512-ACC
3,667,717 UART: [kat] ECC-384
3,677,300 UART: [kat] HMAC-384Kdf
3,681,876 UART: [kat] LMS
3,930,188 UART: [kat] --
3,931,212 UART: [update-reset] ++
5,240,839 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,241,956 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,391,408 >>> mbox cmd response: success
5,391,765 UART: [update-reset] Copying MAN_2 To MAN_1
5,399,779 UART: [update-reset Success] --
5,400,904 UART: [state] Locking Datavault
5,401,768 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,372 UART: [state] Locking ICCM
5,402,808 UART: [exit] Launching FMC @ 0x40000130
5,408,137 UART:
5,408,153 UART: Running Caliptra FMC ...
5,408,561 UART:
5,408,704 UART: [state] CFI Enabled
5,497,833 UART: [art] Extend RT PCRs Done
5,498,261 UART: [art] Lock RT PCRs Done
5,499,682 UART: [art] Populate DV Done
5,508,171 UART: [fht] FMC Alias Private Key: 7
5,509,101 UART: [art] Derive CDI
5,509,381 UART: [art] Store in in slot 0x4
5,594,904 UART: [art] Derive Key Pair
5,595,264 UART: [art] Store priv key in slot 0x5
5,608,256 UART: [art] Derive Key Pair - Done
5,622,881 UART: [art] Signing Cert with AUTHO
5,623,361 UART: RITY.KEYID = 7
5,638,605 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,370 UART: [art] PUB.X = 65DBAD7E50A46057231B3AD766CF714C8084735E55AEEB982932CB15C760357F8240D9AAFB1C3AA55D379FF2F09564F8
5,646,146 UART: [art] PUB.Y = CA35FD20807CD11E9E8B554F67AA2D0D428BE5476DE99AD2FD1F3CDC80488CF91790ECA54931887CD2D67A2674F4810F
5,653,102 UART: [art] SIG.R = 93DE1146D884A78C1572BE5B687F6E0CC390AD8F7258020079F2CD91C89513C19ADEBB86E13AD5BA1E7BA80A9728D1EE
5,659,853 UART: [art] SIG.S = 1B567B5CDAE71B4B8F72CDDDCA68A019B25BE50B9FB20C927F89D0C38605EE39972758179BDB72DB7FA59A65C38148EE
5,683,351 UART: Caliptra RT
5,683,696 UART: [state] CFI Enabled
5,971,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,972,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,495 UART: [rt]cmd =0x494e464f, len=4
6,007,234 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,181 ready_for_fw is high
1,057,181 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,160 >>> mbox cmd response: success
2,158,160 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,330 UART:
2,220,346 UART: Running Caliptra FMC ...
2,220,754 UART:
2,220,897 UART: [state] CFI Enabled
2,231,512 UART: [fht] FMC Alias Private Key: 7
2,338,979 UART: [art] Extend RT PCRs Done
2,339,407 UART: [art] Lock RT PCRs Done
2,340,931 UART: [art] Populate DV Done
2,349,284 UART: [fht] FMC Alias Private Key: 7
2,350,374 UART: [art] Derive CDI
2,350,654 UART: [art] Store in in slot 0x4
2,436,595 UART: [art] Derive Key Pair
2,436,955 UART: [art] Store priv key in slot 0x5
2,450,183 UART: [art] Derive Key Pair - Done
2,464,900 UART: [art] Signing Cert with AUTHO
2,465,380 UART: RITY.KEYID = 7
2,480,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,777 UART: [art] PUB.X = 1F27D94EAE26A9E8EC3E0419B61EB787BD10A9B6EF509626A0B0B6ACF543F9EC60FE480D194E903C2834D1D383DABFCD
2,487,561 UART: [art] PUB.Y = DD96DA0DC63A985804A4D1656B12CEA428A16678C16D75D70206EDBF02D6909730E5E7A907B0BA9D61D848CB01C6C93C
2,494,498 UART: [art] SIG.R = 413662D684EC7AE3E0A654FE215593F3EB535B1948D9A70D9017142506ACBA0A2AEBBED3195988B6071E296F52B20A7A
2,501,257 UART: [art] SIG.S = 66A53E51849B57DD41C4720EF2B421D8AA4E9391940FAC220005DDDAB7A96C4038F72ABF9155668BE3E72BBC01FDD607
2,525,001 UART: mbox::rt_entry...
2,525,373 UART: ____ _ _ _ ____ _____
2,526,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,261 UART: |_|
2,529,573 UART:
2,635,595 UART: [rt] Runtime listening for mailbox commands...
2,640,563 >>> mbox cmd response data (3272 bytes)
2,640,564 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,650 >>> mbox cmd response data (0 bytes)
2,663,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,094,755 >>> mbox cmd response: success
5,108,183 UART:
5,108,199 UART: Running Caliptra FMC ...
5,108,607 UART:
5,108,750 UART: [state] CFI Enabled
5,198,607 UART: [art] Extend RT PCRs Done
5,199,035 UART: [art] Lock RT PCRs Done
5,200,528 UART: [art] Populate DV Done
5,208,553 UART: [fht] FMC Alias Private Key: 7
5,209,607 UART: [art] Derive CDI
5,209,887 UART: [art] Store in in slot 0x4
5,295,394 UART: [art] Derive Key Pair
5,295,754 UART: [art] Store priv key in slot 0x5
5,308,890 UART: [art] Derive Key Pair - Done
5,323,868 UART: [art] Signing Cert with AUTHO
5,324,348 UART: RITY.KEYID = 7
5,339,532 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,297 UART: [art] PUB.X = C1F19F1BBDBAAFE812BA13271B421D2E03F10D77578FABEA70CAC54C3454F734794E8AAC0A8BE9B6A9D7C09D38D87F14
5,347,080 UART: [art] PUB.Y = 711A2E66BDB48E6D3637148D3F5C969D6F4CCDA737164CA6C3307DEDD5E811A4A6A1E0ECE87D02CB3B46D4D11561026E
5,354,038 UART: [art] SIG.R = C7B9865B0075053A49F493652718250C0C4AD400E7E83AF7192E6EA1D240DED80360A3D84210456DB7F539C2E7944F2E
5,360,748 UART: [art] SIG.S = 43611ED59ADF6EB75D58DE344E5EAA3507EF7B3C259C5A77B3DB2B97DAA5D9AA96618F794158882C2C046BCCA4E46392
5,384,533 UART: Caliptra RT
5,384,878 UART: [state] CFI Enabled
5,667,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,669,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,699,973 UART: [rt]cmd =0x494e464f, len=4
5,703,796 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,177 UART:
192,655 UART: Running Caliptra ROM ...
194,274 UART:
194,439 UART: [state] CFI Enabled
267,199 UART: [state] LifecycleState = Unprovisioned
269,148 UART: [state] DebugLocked = No
271,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,915 UART: [kat] SHA2-256
446,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,147 UART: [kat] ++
457,635 UART: [kat] sha1
468,985 UART: [kat] SHA2-256
471,641 UART: [kat] SHA2-384
478,341 UART: [kat] SHA2-512-ACC
480,725 UART: [kat] ECC-384
2,766,926 UART: [kat] HMAC-384Kdf
2,779,110 UART: [kat] LMS
3,969,428 UART: [kat] --
3,975,090 UART: [cold-reset] ++
3,976,606 UART: [fht] Storing FHT @ 0x50003400
3,987,375 UART: [idev] ++
3,988,016 UART: [idev] CDI.KEYID = 6
3,988,930 UART: [idev] SUBJECT.KEYID = 7
3,990,170 UART: [idev] UDS.KEYID = 0
3,991,235 ready_for_fw is high
3,991,453 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,090,384 UART: [idev] Erasing UDS.KEYID = 0
7,323,815 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,921 UART: [idev] --
7,349,533 UART: [ldev] ++
7,350,124 UART: [ldev] CDI.KEYID = 6
7,351,141 UART: [ldev] SUBJECT.KEYID = 5
7,352,299 UART: [ldev] AUTHORITY.KEYID = 7
7,353,532 UART: [ldev] FE.KEYID = 1
7,379,787 UART: [ldev] Erasing FE.KEYID = 1
10,710,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,963 UART: [ldev] --
13,075,962 UART: [fwproc] Waiting for Commands...
13,078,906 UART: [fwproc] Received command 0x46574c44
13,081,096 UART: [fwproc] Received Image of size 78492 bytes
16,701,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,781,426 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,850,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,042,685 >>> mbox cmd response: success
17,043,180 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,047,580 UART: [afmc] ++
17,048,173 UART: [afmc] CDI.KEYID = 6
17,049,085 UART: [afmc] SUBJECT.KEYID = 7
17,050,307 UART: [afmc] AUTHORITY.KEYID = 5
20,412,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,712,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,714,820 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,729,186 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,744,034 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,758,532 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,779,836 UART: [afmc] --
22,784,085 UART: [cold-reset] --
22,787,789 UART: [state] Locking Datavault
22,792,675 UART: [state] Locking PCR0, PCR1 and PCR31
22,794,435 UART: [state] Locking ICCM
22,797,017 UART: [exit] Launching FMC @ 0x40000130
22,805,422 UART:
22,805,659 UART: Running Caliptra FMC ...
22,806,761 UART:
22,806,922 UART: [state] CFI Enabled
22,872,223 UART: [fht] FMC Alias Private Key: 7
25,209,706 UART: [art] Extend RT PCRs Done
25,210,928 UART: [art] Lock RT PCRs Done
25,212,822 UART: [art] Populate DV Done
25,218,451 UART: [fht] FMC Alias Private Key: 7
25,220,037 UART: [art] Derive CDI
25,220,852 UART: [art] Store in in slot 0x4
25,279,863 UART: [art] Derive Key Pair
25,280,900 UART: [art] Store priv key in slot 0x5
28,573,266 UART: [art] Derive Key Pair - Done
28,586,324 UART: [art] Signing Cert with AUTHO
28,587,634 UART: RITY.KEYID = 7
30,874,382 UART: [art] Erasing AUTHORITY.KEYID = 7
30,875,898 UART: [art] PUB.X = 6FF45225C5B9541F81E2B9BA3C26F40E0C1F8FDA3614648616E5B5FB9CC894F54E3F9714BFC41E00C67BA310C13A0DBC
30,883,089 UART: [art] PUB.Y = F8CD7987A072FCF5239037E21456997E273D6A889290DC213F52DC617CD13D22764BDF506661D1DDB829B3B06D2B9830
30,890,372 UART: [art] SIG.R = C8435511AB51FD1519FE74BD269DCBE034B79DD3D55A5AFFB338B66ED5C1335364BCBC62B09A602A46BE6D3B79A7F068
30,897,750 UART: [art] SIG.S = A5F6BCCAC799F234FC25B0181E62C5D7EAEC7ED6147E91AE350181437F29C9FBE6F3CBCC3134222A09A711A03CCD7884
32,202,777 UART: mbox::rt_entry...
32,203,723 UART: ____ _ _ _ ____ _____
32,205,657 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,207,663 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,209,524 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,211,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,213,332 UART: |_|
32,214,159 UART:
32,327,413 UART: [rt] Runtime listening for mailbox commands...
32,333,258 >>> mbox cmd response data (3272 bytes)
32,349,008 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,383,013 >>> mbox cmd response data (0 bytes)
34,442,700 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,586,418 UART:
34,586,791 UART: Running Caliptra ROM ...
34,587,931 UART:
34,588,106 UART: [state] CFI Enabled
34,649,166 UART: [state] LifecycleState = Unprovisioned
34,651,120 UART: [state] DebugLocked = No
34,653,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,657,679 UART: [kat] SHA2-256
34,827,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,837,880 UART: [kat] ++
34,838,343 UART: [kat] sha1
34,850,146 UART: [kat] SHA2-256
34,852,834 UART: [kat] SHA2-384
34,858,496 UART: [kat] SHA2-512-ACC
34,860,851 UART: [kat] ECC-384
37,151,324 UART: [kat] HMAC-384Kdf
37,183,011 UART: [kat] LMS
38,373,314 UART: [kat] --
38,377,802 UART: [update-reset] ++
42,516,333 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,520,715 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,901,697 >>> mbox cmd response: success
42,906,368 UART: [update-reset] Copying MAN_2 To MAN_1
42,924,666 UART: [update-reset Success] --
42,928,736 UART: [state] Locking Datavault
42,931,466 UART: [state] Locking PCR0, PCR1 and PCR31
42,933,226 UART: [state] Locking ICCM
42,935,927 UART: [exit] Launching FMC @ 0x40000130
42,944,383 UART:
42,944,623 UART: Running Caliptra FMC ...
42,945,724 UART:
42,945,885 UART: [state] CFI Enabled
43,039,491 UART: [art] Extend RT PCRs Done
43,040,716 UART: [art] Lock RT PCRs Done
43,041,910 UART: [art] Populate DV Done
43,047,541 UART: [fht] FMC Alias Private Key: 7
43,049,079 UART: [art] Derive CDI
43,049,898 UART: [art] Store in in slot 0x4
43,107,894 UART: [art] Derive Key Pair
43,108,946 UART: [art] Store priv key in slot 0x5
46,402,250 UART: [art] Derive Key Pair - Done
46,415,207 UART: [art] Signing Cert with AUTHO
46,416,517 UART: RITY.KEYID = 7
48,702,746 UART: [art] Erasing AUTHORITY.KEYID = 7
48,704,267 UART: [art] PUB.X = E55C5152D4CA1349D9D3FFF6A09ADFE21D5047A23852B4E3BAC02691C16C436D4BB108B840CDF27E2CDB19B036A93D38
48,711,534 UART: [art] PUB.Y = 1286803A19379E0E66EB344366AFC67C31A30A84DFCC61856492B79EF0B5AD91E1944715DF38A02838A61853BD9F8FB7
48,718,733 UART: [art] SIG.R = F957DB35032022BEB5A5093596E339D9F3251DAF5A4554BD99338FC3CD5CA78C108C78D1D4D63A804D69033957CE8BBE
48,726,141 UART: [art] SIG.S = E89A54AAA07FCE9C426381736D5BB47A9A6D6AB8401AC52D9EC1E36328D2BB4E3CE37F847E79A206576FA9738F1DF619
50,031,550 UART: Caliptra RT
50,032,293 UART: [state] CFI Enabled
53,418,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,419,941 UART: [rt] RT listening for mailbox commands...
53,451,177 UART: [rt]cmd =0x494e464f, len=4
53,455,665 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,784,444 ready_for_fw is high
3,784,839 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,120,934 >>> mbox cmd response: success
17,121,464 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,819,718 UART:
22,820,146 UART: Running Caliptra FMC ...
22,821,249 UART:
22,821,408 UART: [state] CFI Enabled
22,889,049 UART: [fht] FMC Alias Private Key: 7
25,226,933 UART: [art] Extend RT PCRs Done
25,228,168 UART: [art] Lock RT PCRs Done
25,229,674 UART: [art] Populate DV Done
25,235,157 UART: [fht] FMC Alias Private Key: 7
25,236,805 UART: [art] Derive CDI
25,237,620 UART: [art] Store in in slot 0x4
25,298,585 UART: [art] Derive Key Pair
25,299,625 UART: [art] Store priv key in slot 0x5
28,592,267 UART: [art] Derive Key Pair - Done
28,605,429 UART: [art] Signing Cert with AUTHO
28,606,741 UART: RITY.KEYID = 7
30,893,423 UART: [art] Erasing AUTHORITY.KEYID = 7
30,894,930 UART: [art] PUB.X = BFED042AD6B6A545E11D3911C7295D84F999363466F47AFE2C28C8D93FF68F8246D0D6DB474793A336D2C96E0D67AC21
30,902,138 UART: [art] PUB.Y = 32B0CFF92B977CB13252DFE39157FE1CFB497E0AC832A4E2A669F809FE3287565669DDB69DA79FB49DC17FEC869FF397
30,909,432 UART: [art] SIG.R = EC0631889FFA295A8FDBB7479DDA9A16459C1FC47B77A91A8D130F1642A6A574029CA9BE52F26B41C432CC59A3BA8D3A
30,916,835 UART: [art] SIG.S = 49C4C0C2DD1965DB97FEAF224D3F6B769DFCAB6CCDF55861AAA263196295AF7C3DB22524248982F88195E93BFB3C70F7
32,221,752 UART: mbox::rt_entry...
32,222,695 UART: ____ _ _ _ ____ _____
32,224,702 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,228,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,230,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,232,599 UART: |_|
32,233,423 UART:
32,346,545 UART: [rt] Runtime listening for mailbox commands...
32,352,399 >>> mbox cmd response data (3272 bytes)
32,368,091 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,401,515 >>> mbox cmd response data (0 bytes)
34,459,123 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,185,161 >>> mbox cmd response: success
43,220,014 UART:
43,220,368 UART: Running Caliptra FMC ...
43,221,420 UART:
43,221,572 UART: [state] CFI Enabled
43,315,156 UART: [art] Extend RT PCRs Done
43,316,345 UART: [art] Lock RT PCRs Done
43,317,725 UART: [art] Populate DV Done
43,323,409 UART: [fht] FMC Alias Private Key: 7
43,325,054 UART: [art] Derive CDI
43,325,796 UART: [art] Store in in slot 0x4
43,383,869 UART: [art] Derive Key Pair
43,384,913 UART: [art] Store priv key in slot 0x5
46,677,326 UART: [art] Derive Key Pair - Done
46,690,326 UART: [art] Signing Cert with AUTHO
46,691,633 UART: RITY.KEYID = 7
48,978,559 UART: [art] Erasing AUTHORITY.KEYID = 7
48,980,091 UART: [art] PUB.X = 1691A8EF1ABB878616100DC4BB23175137F8B12AAAF2C1B8903114DA194E54B37094E2A4E442DAAC5A1A688C7C15669C
48,987,301 UART: [art] PUB.Y = D6D9D6E513A246F11EDF38B3E1C83C5C1F5F8CCC7D6EA14604708FBA38F5A0152A78100D97E98FE807BD2DADF68183B5
48,994,598 UART: [art] SIG.R = 9AC71AB6441F6FB2DBA43FDD30AA5FFCE00B3A8E458BE15B33B7ECB3E81BF6AA7A33F70EC80756ED11A75FFBA8FD8D5E
49,001,993 UART: [art] SIG.S = 88F437F3379D69E3115B886B81C65584822A0FFBCE66C37CB582B582EB3BF0B87070F72062601F78E143B035684ED10B
50,307,421 UART: Caliptra RT
50,308,140 UART: [state] CFI Enabled
53,714,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,715,707 UART: [rt] RT listening for mailbox commands...
53,747,083 UART: [rt]cmd =0x494e464f, len=4
53,751,460 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
192,929 UART:
193,295 UART: Running Caliptra ROM ...
194,481 UART:
604,082 UART: [state] CFI Enabled
617,486 UART: [state] LifecycleState = Unprovisioned
619,431 UART: [state] DebugLocked = No
620,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,389 UART: [kat] SHA2-256
796,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,652 UART: [kat] ++
807,187 UART: [kat] sha1
817,989 UART: [kat] SHA2-256
820,716 UART: [kat] SHA2-384
826,488 UART: [kat] SHA2-512-ACC
828,851 UART: [kat] ECC-384
3,113,095 UART: [kat] HMAC-384Kdf
3,124,632 UART: [kat] LMS
4,314,700 UART: [kat] --
4,319,548 UART: [cold-reset] ++
4,321,646 UART: [fht] Storing FHT @ 0x50003400
4,331,561 UART: [idev] ++
4,332,123 UART: [idev] CDI.KEYID = 6
4,333,114 UART: [idev] SUBJECT.KEYID = 7
4,334,356 UART: [idev] UDS.KEYID = 0
4,335,445 ready_for_fw is high
4,335,676 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,434,553 UART: [idev] Erasing UDS.KEYID = 0
7,623,905 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,051 UART: [idev] --
7,648,390 UART: [ldev] ++
7,649,023 UART: [ldev] CDI.KEYID = 6
7,649,910 UART: [ldev] SUBJECT.KEYID = 5
7,651,173 UART: [ldev] AUTHORITY.KEYID = 7
7,652,399 UART: [ldev] FE.KEYID = 1
7,661,961 UART: [ldev] Erasing FE.KEYID = 1
10,952,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,508 UART: [ldev] --
13,312,963 UART: [fwproc] Waiting for Commands...
13,316,010 UART: [fwproc] Received command 0x46574c44
13,318,249 UART: [fwproc] Received Image of size 78492 bytes
16,942,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,023,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,092,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,284,614 >>> mbox cmd response: success
17,285,103 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,288,792 UART: [afmc] ++
17,289,430 UART: [afmc] CDI.KEYID = 6
17,290,331 UART: [afmc] SUBJECT.KEYID = 7
17,291,598 UART: [afmc] AUTHORITY.KEYID = 5
20,602,612 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,896,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,898,296 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,912,711 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,927,478 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,941,922 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,964,004 UART: [afmc] --
22,967,066 UART: [cold-reset] --
22,972,056 UART: [state] Locking Datavault
22,977,141 UART: [state] Locking PCR0, PCR1 and PCR31
22,978,894 UART: [state] Locking ICCM
22,981,308 UART: [exit] Launching FMC @ 0x40000130
22,989,705 UART:
22,989,937 UART: Running Caliptra FMC ...
22,991,207 UART:
22,991,382 UART: [state] CFI Enabled
22,999,277 UART: [fht] FMC Alias Private Key: 7
25,330,235 UART: [art] Extend RT PCRs Done
25,331,459 UART: [art] Lock RT PCRs Done
25,333,107 UART: [art] Populate DV Done
25,338,621 UART: [fht] FMC Alias Private Key: 7
25,340,261 UART: [art] Derive CDI
25,341,075 UART: [art] Store in in slot 0x4
25,383,296 UART: [art] Derive Key Pair
25,384,298 UART: [art] Store priv key in slot 0x5
28,626,558 UART: [art] Derive Key Pair - Done
28,639,447 UART: [art] Signing Cert with AUTHO
28,640,740 UART: RITY.KEYID = 7
30,919,981 UART: [art] Erasing AUTHORITY.KEYID = 7
30,921,485 UART: [art] PUB.X = 335673D7BE6ED0CD7758F9AF730C0D85815A7A8DA666F05C1385AD410C76FA961F4016D7C08ED10956CB1B8067E252AD
30,928,762 UART: [art] PUB.Y = E3A8F01F09FE6BEA7E719B83A49324F0E96ABB2E769225CF19DE5622366106FDA2F14EDEAF4F1FA25CBE7D3149E563F4
30,936,026 UART: [art] SIG.R = 996AD9F717DA2E1947CBF0E070099D8A713C7B09DF0A96E6E419DBFE6CF041BB4284DCDA6663F5DFAB3A1AF8C813A47D
30,943,387 UART: [art] SIG.S = 622DA945434CD174B0F42A97EBBA6865A657F8A23A1A28702D5032B268417488C9ABBDB5182E8499301483BC07C354DE
32,247,667 UART: mbox::rt_entry...
32,248,629 UART: ____ _ _ _ ____ _____
32,250,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,252,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,254,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,256,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,258,337 UART: |_|
32,259,164 UART:
32,373,054 UART: [rt] Runtime listening for mailbox commands...
32,378,860 >>> mbox cmd response data (3272 bytes)
32,394,373 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,427,751 >>> mbox cmd response data (0 bytes)
34,486,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,630,650 UART:
34,631,010 UART: Running Caliptra ROM ...
34,632,146 UART:
34,632,316 UART: [state] CFI Enabled
34,646,206 UART: [state] LifecycleState = Unprovisioned
34,648,092 UART: [state] DebugLocked = No
34,649,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,655,399 UART: [kat] SHA2-256
34,825,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,835,613 UART: [kat] ++
34,836,139 UART: [kat] sha1
34,847,346 UART: [kat] SHA2-256
34,850,088 UART: [kat] SHA2-384
34,854,344 UART: [kat] SHA2-512-ACC
34,856,752 UART: [kat] ECC-384
37,140,435 UART: [kat] HMAC-384Kdf
37,151,739 UART: [kat] LMS
38,341,848 UART: [kat] --
38,346,505 UART: [update-reset] ++
42,494,755 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,498,975 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,880,009 >>> mbox cmd response: success
42,884,704 UART: [update-reset] Copying MAN_2 To MAN_1
42,903,876 UART: [update-reset Success] --
42,908,499 UART: [state] Locking Datavault
42,911,893 UART: [state] Locking PCR0, PCR1 and PCR31
42,913,664 UART: [state] Locking ICCM
42,914,960 UART: [exit] Launching FMC @ 0x40000130
42,923,361 UART:
42,923,594 UART: Running Caliptra FMC ...
42,924,690 UART:
42,924,851 UART: [state] CFI Enabled
42,969,235 UART: [art] Extend RT PCRs Done
42,970,378 UART: [art] Lock RT PCRs Done
42,971,714 UART: [art] Populate DV Done
42,977,221 UART: [fht] FMC Alias Private Key: 7
42,978,748 UART: [art] Derive CDI
42,979,508 UART: [art] Store in in slot 0x4
43,022,585 UART: [art] Derive Key Pair
43,023,629 UART: [art] Store priv key in slot 0x5
46,266,055 UART: [art] Derive Key Pair - Done
46,278,742 UART: [art] Signing Cert with AUTHO
46,280,073 UART: RITY.KEYID = 7
48,559,375 UART: [art] Erasing AUTHORITY.KEYID = 7
48,560,883 UART: [art] PUB.X = 83F7B4E9D8702D3B6AA42335E508A15B6FFB699FA4A4C9C3256A1033D39B60A7EEAAE473973AAA512CBEE8DBA259A589
48,568,161 UART: [art] PUB.Y = F0489193B871574464FD6C0D0F253960E8B1E4358A735DAEC6FD53D67F3620D94EEC492000054AC007845C9E39BE5E9C
48,575,362 UART: [art] SIG.R = 6B009D7C404DAD62B7AABDFC4301CF4B1ED10E7B268878A4A9A4FF19F89022F48308D28233B722AA534865F1FB8C7FD7
48,582,773 UART: [art] SIG.S = D8C375432C145DB9FF21F397B8D3C98AD0430BE11B9A43C4CC7AC0FA86604D789433808A2C1E4FDA206F981CE0340F1A
49,887,620 UART: Caliptra RT
49,888,319 UART: [state] CFI Enabled
53,182,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,184,192 UART: [rt] RT listening for mailbox commands...
53,215,418 UART: [rt]cmd =0x494e464f, len=4
53,219,800 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
4,131,075 ready_for_fw is high
4,131,552 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,342,195 >>> mbox cmd response: success
17,342,758 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,978,940 UART:
22,979,328 UART: Running Caliptra FMC ...
22,980,451 UART:
22,980,611 UART: [state] CFI Enabled
22,988,557 UART: [fht] FMC Alias Private Key: 7
25,319,454 UART: [art] Extend RT PCRs Done
25,320,682 UART: [art] Lock RT PCRs Done
25,321,876 UART: [art] Populate DV Done
25,327,568 UART: [fht] FMC Alias Private Key: 7
25,329,109 UART: [art] Derive CDI
25,329,944 UART: [art] Store in in slot 0x4
25,372,665 UART: [art] Derive Key Pair
25,373,718 UART: [art] Store priv key in slot 0x5
28,615,890 UART: [art] Derive Key Pair - Done
28,628,789 UART: [art] Signing Cert with AUTHO
28,630,086 UART: RITY.KEYID = 7
30,909,568 UART: [art] Erasing AUTHORITY.KEYID = 7
30,911,088 UART: [art] PUB.X = CFDE37149B42C40C12521B03A5D289F6C092560C70B40A044B9979B9FA91FB373A3BA6E023B6EE37063BB1E782AD6BCE
30,918,315 UART: [art] PUB.Y = EA6B9DFDC959FD947C46459698206303803581C34BA9F0F8E7A87FDD3CFCAB5C8B0068333D19E6078F20328E448A81CA
30,925,577 UART: [art] SIG.R = 2DEAD474A6A774C8F1DA37643411AE593C06350FAFE13466309D567A0B7A1CB48C8F591C7E57401D51DAD0E4E3914B70
30,932,970 UART: [art] SIG.S = E4A72FDBB3FE6B6817D152493F1D7AC854D621F6E2F8CB95AAD4986D2ABAB0B7156D065FF36F11943C1F6E28907F8429
32,237,003 UART: mbox::rt_entry...
32,237,972 UART: ____ _ _ _ ____ _____
32,239,910 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,241,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,243,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,245,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,247,767 UART: |_|
32,248,757 UART:
32,362,937 UART: [rt] Runtime listening for mailbox commands...
32,368,752 >>> mbox cmd response data (3272 bytes)
32,384,400 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,417,799 >>> mbox cmd response data (0 bytes)
34,475,833 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,131,828 >>> mbox cmd response: success
43,166,019 UART:
43,166,337 UART: Running Caliptra FMC ...
43,167,458 UART:
43,167,642 UART: [state] CFI Enabled
43,211,682 UART: [art] Extend RT PCRs Done
43,212,872 UART: [art] Lock RT PCRs Done
43,214,059 UART: [art] Populate DV Done
43,219,475 UART: [fht] FMC Alias Private Key: 7
43,221,064 UART: [art] Derive CDI
43,221,875 UART: [art] Store in in slot 0x4
43,264,737 UART: [art] Derive Key Pair
43,265,738 UART: [art] Store priv key in slot 0x5
46,507,604 UART: [art] Derive Key Pair - Done
46,520,555 UART: [art] Signing Cert with AUTHO
46,521,856 UART: RITY.KEYID = 7
48,801,198 UART: [art] Erasing AUTHORITY.KEYID = 7
48,802,706 UART: [art] PUB.X = 75489AA5DA2248747448CB959E35BD4C1B1A07CEC7E5B4B0910275958FAC5F2ED1F1978ABE64B5F8F0DFDD5E5877CFBA
48,809,996 UART: [art] PUB.Y = 0907009650453769829C08FA853D6D31E42E1C3E859E8F915F650BF03D49706ED723F47CC54382F5C24A77C14FFA66BC
48,817,226 UART: [art] SIG.R = 6343513B385D84656F94A4DE35443AFDA9DDDCF42AE8FA8063D3129EB863B030F11EDD17D0AD743C616CFD2CE9492E7B
48,824,702 UART: [art] SIG.S = AA1D14A912098E68CCC1A7FD9ABC0647172256CE81DCB507D4F604F8E141FB9EDDF3E187C5788E0E00B48DF5C0B180AA
50,130,317 UART: Caliptra RT
50,131,030 UART: [state] CFI Enabled
53,425,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,426,763 UART: [rt] RT listening for mailbox commands...
53,458,067 UART: [rt]cmd =0x494e464f, len=4
53,462,226 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,458 UART:
192,828 UART: Running Caliptra ROM ...
193,928 UART:
194,068 UART: [state] CFI Enabled
264,028 UART: [state] LifecycleState = Unprovisioned
265,883 UART: [state] DebugLocked = No
267,904 UART: [state] WD Timer not started. Device not locked for debugging
272,080 UART: [kat] SHA2-256
451,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,842 UART: [kat] ++
463,296 UART: [kat] sha1
473,882 UART: [kat] SHA2-256
476,891 UART: [kat] SHA2-384
481,980 UART: [kat] SHA2-512-ACC
484,984 UART: [kat] ECC-384
2,949,414 UART: [kat] HMAC-384Kdf
2,971,311 UART: [kat] LMS
3,500,748 UART: [kat] --
3,505,068 UART: [cold-reset] ++
3,507,428 UART: [fht] FHT @ 0x50003400
3,518,471 UART: [idev] ++
3,519,038 UART: [idev] CDI.KEYID = 6
3,520,071 UART: [idev] SUBJECT.KEYID = 7
3,521,174 UART: [idev] UDS.KEYID = 0
3,522,104 ready_for_fw is high
3,522,296 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,621,313 UART: [idev] Erasing UDS.KEYID = 0
6,025,071 UART: [idev] Sha1 KeyId Algorithm
6,049,295 UART: [idev] --
6,053,370 UART: [ldev] ++
6,053,948 UART: [ldev] CDI.KEYID = 6
6,054,880 UART: [ldev] SUBJECT.KEYID = 5
6,056,048 UART: [ldev] AUTHORITY.KEYID = 7
6,057,282 UART: [ldev] FE.KEYID = 1
6,100,449 UART: [ldev] Erasing FE.KEYID = 1
8,605,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,226 UART: [ldev] --
10,414,649 UART: [fwproc] Wait for Commands...
10,416,792 UART: [fwproc] Recv command 0x46574c44
10,418,887 UART: [fwproc] Recv'd Img size: 78456 bytes
13,382,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,456,607 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,525,409 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,717,985 >>> mbox cmd response: success
13,718,485 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,722,403 UART: [afmc] ++
13,722,983 UART: [afmc] CDI.KEYID = 6
13,723,886 UART: [afmc] SUBJECT.KEYID = 7
13,725,095 UART: [afmc] AUTHORITY.KEYID = 5
16,251,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,974,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,976,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,992,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,008,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,024,438 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,046,923 UART: [afmc] --
18,051,382 UART: [cold-reset] --
18,054,727 UART: [state] Locking Datavault
18,060,301 UART: [state] Locking PCR0, PCR1 and PCR31
18,061,943 UART: [state] Locking ICCM
18,064,252 UART: [exit] Launching FMC @ 0x40000130
18,072,649 UART:
18,072,889 UART: Running Caliptra FMC ...
18,073,993 UART:
18,074,161 UART: [state] CFI Enabled
18,133,523 UART: [fht] FMC Alias Private Key: 7
19,897,623 UART: [art] Extend RT PCRs Done
19,898,856 UART: [art] Lock RT PCRs Done
19,900,342 UART: [art] Populate DV Done
19,905,482 UART: [fht] FMC Alias Private Key: 7
19,907,173 UART: [art] Derive CDI
19,907,982 UART: [art] Store in in slot 0x4
19,966,498 UART: [art] Derive Key Pair
19,967,567 UART: [art] Store priv key in slot 0x5
22,430,672 UART: [art] Derive Key Pair - Done
22,443,757 UART: [art] Signing Cert with AUTHO
22,445,059 UART: RITY.KEYID = 7
24,156,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,157,594 UART: [art] PUB.X = 82A3587B63AAA5D8B347F7E93D8E2139B3E4EA91648044E34B3EF60CAEBE1E221F5131789301E7961D8AB9DD94CFC148
24,164,854 UART: [art] PUB.Y = 60068A95E012822851E50486C362422B5098ED2048FFA1476FB41E42CA696290AD5326605087486D226DC4992CA97559
24,172,061 UART: [art] SIG.R = EBB24F8A1EF2E5D6B33A342560207220BE50B1D363248A0D44894403DCA394E870B762EDF6A082653EFA3DB5F1668BD4
24,179,617 UART: [art] SIG.S = 7E4DA52BC6AA7A55E56F4DB1204EB57CB62C6B2569E577F5CF37FCF53D8CC10BAE101EE0BC5959B720E75606F3F92986
25,158,433 UART: mbox::rt_entry...
25,159,386 UART: ____ _ _ _ ____ _____
25,161,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,163,383 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,165,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,167,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,169,100 UART: |_|
25,169,948 UART:
25,283,353 UART: [rt] Runtime listening for mailbox commands...
25,289,199 >>> mbox cmd response data (3272 bytes)
25,305,218 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,338,633 >>> mbox cmd response data (0 bytes)
27,398,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,543,295 UART:
27,543,722 UART: Running Caliptra ROM ...
27,544,800 UART:
27,544,964 UART: [state] CFI Enabled
27,610,352 UART: [state] LifecycleState = Unprovisioned
27,612,207 UART: [state] DebugLocked = No
27,613,480 UART: [state] WD Timer not started. Device not locked for debugging
27,616,480 UART: [kat] SHA2-256
27,795,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,807,184 UART: [kat] ++
27,807,725 UART: [kat] sha1
27,817,860 UART: [kat] SHA2-256
27,820,927 UART: [kat] SHA2-384
27,827,551 UART: [kat] SHA2-512-ACC
27,830,494 UART: [kat] ECC-384
30,291,707 UART: [kat] HMAC-384Kdf
30,314,411 UART: [kat] LMS
30,843,867 UART: [kat] --
30,849,098 UART: [update-reset] ++
34,277,506 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,280,093 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,662,091 >>> mbox cmd response: success
34,666,611 UART: [update-reset] Copying MAN_2 To MAN_1
34,686,106 UART: [update-reset Success] --
34,690,038 UART: [state] Locking Datavault
34,693,726 UART: [state] Locking PCR0, PCR1 and PCR31
34,695,371 UART: [state] Locking ICCM
34,696,495 UART: [exit] Launching FMC @ 0x40000130
34,704,886 UART:
34,705,125 UART: Running Caliptra FMC ...
34,706,542 UART:
34,706,711 UART: [state] CFI Enabled
34,804,986 UART: [art] Extend RT PCRs Done
34,806,176 UART: [art] Lock RT PCRs Done
34,807,417 UART: [art] Populate DV Done
34,812,927 UART: [fht] FMC Alias Private Key: 7
34,814,511 UART: [art] Derive CDI
34,815,317 UART: [art] Store in in slot 0x4
34,874,205 UART: [art] Derive Key Pair
34,875,261 UART: [art] Store priv key in slot 0x5
37,338,162 UART: [art] Derive Key Pair - Done
37,351,118 UART: [art] Signing Cert with AUTHO
37,352,430 UART: RITY.KEYID = 7
39,063,364 UART: [art] Erasing AUTHORITY.KEYID = 7
39,064,875 UART: [art] PUB.X = C67C6316D693577BA35F223CFF0ACD7D4ABBB2A03FE96592B1960BC8E2FCB7F2781F7A643509B2F2712B98DC1DB87695
39,072,169 UART: [art] PUB.Y = B82CEC0E063F7E70FD5D869E52C97A9E96D68D67957855BDE3A7770636D80B87180EC90D681868077296F34ECBEFC83F
39,079,387 UART: [art] SIG.R = 18A182ED3037E6FCE1F532CD9CF13C3BC07094714CC07C1C43B30869C3D8C53D4E68984B0061A60C1DD810D5DDCAD08F
39,086,829 UART: [art] SIG.S = 2B6FE1FA1003863F4F2148D3EBF31C2A013F5784CCE963EC5D3D147B8AAD7C3FE2F1FE4E78C433CB57270817ADCB557E
40,065,894 UART: Caliptra RT
40,066,622 UART: [state] CFI Enabled
42,627,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,628,905 UART: [rt] RT listening for mailbox commands...
42,660,258 UART: [rt]cmd =0x494e464f, len=4
42,664,516 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
3,383,387 ready_for_fw is high
3,383,971 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,478,799 >>> mbox cmd response: success
13,479,417 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,768,415 UART:
17,768,802 UART: Running Caliptra FMC ...
17,769,908 UART:
17,770,059 UART: [state] CFI Enabled
17,835,101 UART: [fht] FMC Alias Private Key: 7
19,598,739 UART: [art] Extend RT PCRs Done
19,599,970 UART: [art] Lock RT PCRs Done
19,601,631 UART: [art] Populate DV Done
19,606,996 UART: [fht] FMC Alias Private Key: 7
19,608,540 UART: [art] Derive CDI
19,609,272 UART: [art] Store in in slot 0x4
19,667,751 UART: [art] Derive Key Pair
19,668,787 UART: [art] Store priv key in slot 0x5
22,131,858 UART: [art] Derive Key Pair - Done
22,144,660 UART: [art] Signing Cert with AUTHO
22,145,967 UART: RITY.KEYID = 7
23,856,987 UART: [art] Erasing AUTHORITY.KEYID = 7
23,858,492 UART: [art] PUB.X = 40B6B38E46F45F7685AFFB0945483A409F3B84E9C9EB93DFB6B9E193AD0DBD29DC210A770AA04A89C51513DB76ACFB5F
23,865,810 UART: [art] PUB.Y = DF55028947D54C803CCF13964C87F997842CC243B2FB3CCB4A17B87F2CADF8085769B975CBB31A6C0E1AE25AECDA690E
23,873,066 UART: [art] SIG.R = 79C94AA2BF0148D25A2C7890BFF381C65A055F0CBB7369C3AB396225CC2359FDA2C6B080683A6F2FFED5485C4B39E654
23,880,434 UART: [art] SIG.S = 505BF92DFC5604960A4FFCA324E236B208A069FD4E939A233B3CED18AE36732228A8713A12BA678E0F85D66987A9F76C
24,858,971 UART: mbox::rt_entry...
24,859,932 UART: ____ _ _ _ ____ _____
24,861,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,863,864 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,865,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,867,672 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,869,552 UART: |_|
24,870,381 UART:
24,982,948 UART: [rt] Runtime listening for mailbox commands...
24,988,826 >>> mbox cmd response data (3272 bytes)
25,004,516 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,037,916 >>> mbox cmd response data (0 bytes)
27,094,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,227,847 >>> mbox cmd response: success
34,263,551 UART:
34,263,885 UART: Running Caliptra FMC ...
34,264,930 UART:
34,265,078 UART: [state] CFI Enabled
34,359,258 UART: [art] Extend RT PCRs Done
34,360,452 UART: [art] Lock RT PCRs Done
34,362,018 UART: [art] Populate DV Done
34,367,609 UART: [fht] FMC Alias Private Key: 7
34,369,196 UART: [art] Derive CDI
34,370,005 UART: [art] Store in in slot 0x4
34,428,079 UART: [art] Derive Key Pair
34,429,113 UART: [art] Store priv key in slot 0x5
36,892,256 UART: [art] Derive Key Pair - Done
36,904,977 UART: [art] Signing Cert with AUTHO
36,906,307 UART: RITY.KEYID = 7
38,617,732 UART: [art] Erasing AUTHORITY.KEYID = 7
38,619,239 UART: [art] PUB.X = C5BD2F1A37B2BD7A40DD6D761290C2EDCBA011C6832CF4457BD0B4062D20CA006062AA09DF5512C406D2BB6ED688595D
38,626,518 UART: [art] PUB.Y = 04E799389C6993A4CFEA80E7101426D4246B725EC72A4B96CF401C26DDAD2504D0E9C89D2440887622E0FF044C63437C
38,633,788 UART: [art] SIG.R = A4715F77B24CA6E2584977056EA2408810F20756C0C6BFDCD7F328DE88482DE42E9895CBDE5E350607DF4A0E618C5D45
38,641,141 UART: [art] SIG.S = 44EB49F6F6461E3EF957E3D72FE5C1332104A1690C036DD73C1EC2F4A70B59DFA6BC136BCCAEB2F4DD0FC9B4986591C6
39,620,451 UART: Caliptra RT
39,621,171 UART: [state] CFI Enabled
42,181,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,183,540 UART: [rt] RT listening for mailbox commands...
42,214,933 UART: [rt]cmd =0x494e464f, len=4
42,219,215 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
193,137 UART:
193,519 UART: Running Caliptra ROM ...
194,659 UART:
604,145 UART: [state] CFI Enabled
621,382 UART: [state] LifecycleState = Unprovisioned
623,268 UART: [state] DebugLocked = No
625,941 UART: [state] WD Timer not started. Device not locked for debugging
629,901 UART: [kat] SHA2-256
809,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,530 UART: [kat] ++
821,070 UART: [kat] sha1
832,954 UART: [kat] SHA2-256
835,988 UART: [kat] SHA2-384
841,272 UART: [kat] SHA2-512-ACC
844,210 UART: [kat] ECC-384
3,285,140 UART: [kat] HMAC-384Kdf
3,298,024 UART: [kat] LMS
3,827,501 UART: [kat] --
3,831,957 UART: [cold-reset] ++
3,833,397 UART: [fht] FHT @ 0x50003400
3,845,887 UART: [idev] ++
3,846,450 UART: [idev] CDI.KEYID = 6
3,847,331 UART: [idev] SUBJECT.KEYID = 7
3,848,609 UART: [idev] UDS.KEYID = 0
3,849,607 ready_for_fw is high
3,849,812 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,948,425 UART: [idev] Erasing UDS.KEYID = 0
6,319,072 UART: [idev] Sha1 KeyId Algorithm
6,343,041 UART: [idev] --
6,347,668 UART: [ldev] ++
6,348,246 UART: [ldev] CDI.KEYID = 6
6,349,132 UART: [ldev] SUBJECT.KEYID = 5
6,350,297 UART: [ldev] AUTHORITY.KEYID = 7
6,351,644 UART: [ldev] FE.KEYID = 1
6,361,453 UART: [ldev] Erasing FE.KEYID = 1
8,832,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,963 UART: [ldev] --
10,619,687 UART: [fwproc] Wait for Commands...
10,621,781 UART: [fwproc] Recv command 0x46574c44
10,623,877 UART: [fwproc] Recv'd Img size: 78456 bytes
13,584,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,657,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,726,033 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,919,118 >>> mbox cmd response: success
13,919,623 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,922,776 UART: [afmc] ++
13,923,362 UART: [afmc] CDI.KEYID = 6
13,924,249 UART: [afmc] SUBJECT.KEYID = 7
13,925,466 UART: [afmc] AUTHORITY.KEYID = 5
16,427,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,150,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,152,407 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,168,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,184,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,200,029 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,221,605 UART: [afmc] --
18,225,441 UART: [cold-reset] --
18,229,897 UART: [state] Locking Datavault
18,235,573 UART: [state] Locking PCR0, PCR1 and PCR31
18,237,226 UART: [state] Locking ICCM
18,239,056 UART: [exit] Launching FMC @ 0x40000130
18,247,454 UART:
18,247,694 UART: Running Caliptra FMC ...
18,249,010 UART:
18,249,178 UART: [state] CFI Enabled
18,256,822 UART: [fht] FMC Alias Private Key: 7
20,012,778 UART: [art] Extend RT PCRs Done
20,014,011 UART: [art] Lock RT PCRs Done
20,015,668 UART: [art] Populate DV Done
20,021,079 UART: [fht] FMC Alias Private Key: 7
20,022,791 UART: [art] Derive CDI
20,023,533 UART: [art] Store in in slot 0x4
20,065,813 UART: [art] Derive Key Pair
20,066,951 UART: [art] Store priv key in slot 0x5
22,493,437 UART: [art] Derive Key Pair - Done
22,506,328 UART: [art] Signing Cert with AUTHO
22,507,630 UART: RITY.KEYID = 7
24,212,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,214,427 UART: [art] PUB.X = D869EF6DA7286AEFE57D1537B4ABA97795C81FF9BBDF25AB2F36A8DC9EDDF7882295004FB940928CBFFFDBD2DFF0FFA9
24,221,753 UART: [art] PUB.Y = ED453D3D5EC1E1266EF57A4346CD0971E662063DE18384E5A4A5A287BB284F0EEE2329A2A75D06C489E7870B8BF45AC4
24,229,008 UART: [art] SIG.R = DA39FA3F60F42F9F453CECBC094CB5B7F8C5BB8ECA7CEC1C95CB8AEC1CBF8FA4BFF3C6D10E7AB36E0E95EB62BB76E568
24,236,437 UART: [art] SIG.S = C25723DD6699FF7845A115E159396D560AFAEEA667CC4EB381103B9FC12219FCFC29BA90C278F55B7A0B9F8A1507E1F5
25,214,640 UART: mbox::rt_entry...
25,215,615 UART: ____ _ _ _ ____ _____
25,217,550 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,219,557 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,221,490 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,223,423 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,225,375 UART: |_|
25,226,211 UART:
25,339,243 UART: [rt] Runtime listening for mailbox commands...
25,345,093 >>> mbox cmd response data (3272 bytes)
25,360,666 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,394,071 >>> mbox cmd response data (0 bytes)
27,454,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,599,056 UART:
27,599,445 UART: Running Caliptra ROM ...
27,600,582 UART:
27,600,774 UART: [state] CFI Enabled
27,616,578 UART: [state] LifecycleState = Unprovisioned
27,618,467 UART: [state] DebugLocked = No
27,619,644 UART: [state] WD Timer not started. Device not locked for debugging
27,623,014 UART: [kat] SHA2-256
27,802,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,813,731 UART: [kat] ++
27,814,270 UART: [kat] sha1
27,825,218 UART: [kat] SHA2-256
27,828,235 UART: [kat] SHA2-384
27,833,519 UART: [kat] SHA2-512-ACC
27,836,462 UART: [kat] ECC-384
30,280,471 UART: [kat] HMAC-384Kdf
30,292,788 UART: [kat] LMS
30,822,289 UART: [kat] --
30,825,250 UART: [update-reset] ++
34,255,399 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,258,950 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,641,007 >>> mbox cmd response: success
34,645,636 UART: [update-reset] Copying MAN_2 To MAN_1
34,665,134 UART: [update-reset Success] --
34,670,402 UART: [state] Locking Datavault
34,673,290 UART: [state] Locking PCR0, PCR1 and PCR31
34,675,006 UART: [state] Locking ICCM
34,676,198 UART: [exit] Launching FMC @ 0x40000130
34,684,659 UART:
34,684,899 UART: Running Caliptra FMC ...
34,686,416 UART:
34,686,606 UART: [state] CFI Enabled
34,729,867 UART: [art] Extend RT PCRs Done
34,731,070 UART: [art] Lock RT PCRs Done
34,732,324 UART: [art] Populate DV Done
34,737,802 UART: [fht] FMC Alias Private Key: 7
34,739,515 UART: [art] Derive CDI
34,740,339 UART: [art] Store in in slot 0x4
34,783,109 UART: [art] Derive Key Pair
34,784,110 UART: [art] Store priv key in slot 0x5
37,211,186 UART: [art] Derive Key Pair - Done
37,224,364 UART: [art] Signing Cert with AUTHO
37,225,673 UART: RITY.KEYID = 7
38,931,398 UART: [art] Erasing AUTHORITY.KEYID = 7
38,932,908 UART: [art] PUB.X = 005A35120F09031321571EA937F50D6F22C87BD54599E857EC1CC419A7A8A2D688CCA56512BC422D32CC2B7683F8850A
38,940,105 UART: [art] PUB.Y = 05B6D7F31E0A579B7416D2394D80657A05256378DD57A287624630B5502AD39B181567EA4B39606862B2AFEDB3FE2B51
38,947,349 UART: [art] SIG.R = BA962A78D283653E37FA6C65E078D540FD935D159B99636DA1308462D517F08B098FA0D00FDE651DC3EA0C7F7808B4FE
38,954,778 UART: [art] SIG.S = CC13B6E7A73B22BF0C82016F213A1A526DFB676FD97C55364DA665333FBC8893BE02D1015F1E3F03E10CA3317F8C8550
39,933,775 UART: Caliptra RT
39,934,493 UART: [state] CFI Enabled
42,412,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,413,938 UART: [rt] RT listening for mailbox commands...
42,445,229 UART: [rt]cmd =0x494e464f, len=4
42,449,666 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
3,692,948 ready_for_fw is high
3,693,588 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,702,952 >>> mbox cmd response: success
13,703,893 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,954,136 UART:
17,954,556 UART: Running Caliptra FMC ...
17,955,662 UART:
17,955,814 UART: [state] CFI Enabled
17,963,639 UART: [fht] FMC Alias Private Key: 7
19,720,673 UART: [art] Extend RT PCRs Done
19,721,890 UART: [art] Lock RT PCRs Done
19,723,460 UART: [art] Populate DV Done
19,728,850 UART: [fht] FMC Alias Private Key: 7
19,730,380 UART: [art] Derive CDI
19,731,127 UART: [art] Store in in slot 0x4
19,773,826 UART: [art] Derive Key Pair
19,774,825 UART: [art] Store priv key in slot 0x5
22,201,523 UART: [art] Derive Key Pair - Done
22,214,780 UART: [art] Signing Cert with AUTHO
22,216,124 UART: RITY.KEYID = 7
23,921,686 UART: [art] Erasing AUTHORITY.KEYID = 7
23,923,208 UART: [art] PUB.X = 3472B9EBF41A69F4C63096DE33D3156E13760D679CF2F69B9D076C83776536DD0072142DE2BC6D1E91F10874C172C36D
23,930,433 UART: [art] PUB.Y = B950D9E099C93310127005ACDAAF5D9D65DE4D428592F693B2A862B4162CD368823C75198C581CF21C1811C06989B5C7
23,937,641 UART: [art] SIG.R = 9A1A0A20CAED3A4A4D8753B479ABCCC8713F5110B6F53A2BC0CB0A6B0D6940AB2A50CD8A1D8DEA5720B073C8DCC15CFB
23,945,064 UART: [art] SIG.S = DA399EB272536F3B47698B1B1BA8CF8DF095F5C2E90BFCDA5E9CCED584A507AA2AB98F6928DD0A6F8F4CC9C5B030E949
24,923,309 UART: mbox::rt_entry...
24,924,259 UART: ____ _ _ _ ____ _____
24,926,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,928,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,930,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,932,514 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,934,464 UART: |_|
24,935,272 UART:
25,048,357 UART: [rt] Runtime listening for mailbox commands...
25,054,179 >>> mbox cmd response data (3272 bytes)
25,069,985 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,103,407 >>> mbox cmd response data (0 bytes)
27,161,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,189,450 >>> mbox cmd response: success
34,223,224 UART:
34,223,590 UART: Running Caliptra FMC ...
34,224,727 UART:
34,224,899 UART: [state] CFI Enabled
34,269,033 UART: [art] Extend RT PCRs Done
34,270,184 UART: [art] Lock RT PCRs Done
34,271,860 UART: [art] Populate DV Done
34,277,434 UART: [fht] FMC Alias Private Key: 7
34,279,081 UART: [art] Derive CDI
34,279,902 UART: [art] Store in in slot 0x4
34,322,722 UART: [art] Derive Key Pair
34,323,766 UART: [art] Store priv key in slot 0x5
36,750,176 UART: [art] Derive Key Pair - Done
36,763,225 UART: [art] Signing Cert with AUTHO
36,764,528 UART: RITY.KEYID = 7
38,469,914 UART: [art] Erasing AUTHORITY.KEYID = 7
38,471,419 UART: [art] PUB.X = 6D11CAB3AE7D4E23B313B2355403957840D32AB4B1244A9728EAF0C3824DCAF6EC78D23F4598E21288BA51E27D97F397
38,478,700 UART: [art] PUB.Y = 468FF815AF09F4F7D99D757CE237978ADF5CCC1575EE4CCB4BF54667D9E755B0A62A86169F971B708663467F5A5419F7
38,485,943 UART: [art] SIG.R = AD49D6065C540A8BF4254D153211B586533119CC458AEE8972C8175CD6A077EF3A374D3990BBC5CE89122BE45319E5A0
38,493,346 UART: [art] SIG.S = 175082264A47EC2504E5C95EBBCFBBE0171C18AA0E427DBF13DFA661DBCAF119E647F32FA0C59E8F7B5BCD4158558460
39,471,885 UART: Caliptra RT
39,472,571 UART: [state] CFI Enabled
41,951,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,952,853 UART: [rt] RT listening for mailbox commands...
41,984,085 UART: [rt]cmd =0x494e464f, len=4
41,988,240 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,509 UART:
192,881 UART: Running Caliptra ROM ...
193,974 UART:
194,114 UART: [state] CFI Enabled
267,084 UART: [state] LifecycleState = Unprovisioned
269,441 UART: [state] DebugLocked = No
270,968 UART: [state] WD Timer not started. Device not locked for debugging
275,804 UART: [kat] SHA2-256
465,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,511 UART: [kat] ++
476,959 UART: [kat] sha1
488,330 UART: [kat] SHA2-256
491,330 UART: [kat] SHA2-384
497,991 UART: [kat] SHA2-512-ACC
500,549 UART: [kat] ECC-384
2,948,016 UART: [kat] HMAC-384Kdf
2,971,697 UART: [kat] LMS
3,503,520 UART: [kat] --
3,509,290 UART: [cold-reset] ++
3,511,442 UART: [fht] FHT @ 0x50003400
3,522,507 UART: [idev] ++
3,523,217 UART: [idev] CDI.KEYID = 6
3,524,246 UART: [idev] SUBJECT.KEYID = 7
3,525,344 UART: [idev] UDS.KEYID = 0
3,526,270 ready_for_fw is high
3,526,460 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,625,412 UART: [idev] Erasing UDS.KEYID = 0
6,027,091 UART: [idev] Sha1 KeyId Algorithm
6,050,446 UART: [idev] --
6,056,061 UART: [ldev] ++
6,056,745 UART: [ldev] CDI.KEYID = 6
6,057,662 UART: [ldev] SUBJECT.KEYID = 5
6,058,822 UART: [ldev] AUTHORITY.KEYID = 7
6,060,058 UART: [ldev] FE.KEYID = 1
6,098,912 UART: [ldev] Erasing FE.KEYID = 1
8,607,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,265 UART: [ldev] --
10,416,022 UART: [fwproc] Wait for Commands...
10,418,433 UART: [fwproc] Recv command 0x46574c44
10,420,743 UART: [fwproc] Recv'd Img size: 78456 bytes
13,433,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,515,762 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,631,939 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,959,717 >>> mbox cmd response: success
13,960,178 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,963,970 UART: [afmc] ++
13,964,681 UART: [afmc] CDI.KEYID = 6
13,965,928 UART: [afmc] SUBJECT.KEYID = 7
13,967,385 UART: [afmc] AUTHORITY.KEYID = 5
16,509,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,233,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,235,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,250,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,265,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,280,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,306,350 UART: [afmc] --
18,310,591 UART: [cold-reset] --
18,315,374 UART: [state] Locking Datavault
18,320,644 UART: [state] Locking PCR0, PCR1 and PCR31
18,322,798 UART: [state] Locking ICCM
18,324,309 UART: [exit] Launching FMC @ 0x40000130
18,332,997 UART:
18,333,228 UART: Running Caliptra FMC ...
18,334,324 UART:
18,334,498 UART: [state] CFI Enabled
18,388,821 UART: [fht] FMC Alias Private Key: 7
20,152,967 UART: [art] Extend RT PCRs Done
20,154,185 UART: [art] Lock RT PCRs Done
20,155,889 UART: [art] Populate DV Done
20,161,190 UART: [fht] FMC Alias Private Key: 7
20,162,895 UART: [art] Derive CDI
20,163,707 UART: [art] Store in in slot 0x4
20,221,105 UART: [art] Derive Key Pair
20,222,148 UART: [art] Store priv key in slot 0x5
22,685,605 UART: [art] Derive Key Pair - Done
22,698,928 UART: [art] Signing Cert with AUTHO
22,700,235 UART: RITY.KEYID = 7
24,411,075 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,591 UART: [art] PUB.X = 71BB572D627EA97A13264209FC328F91CC389DA59BEC52E8DEE16CB9C32B5B8E1B3DB42CDD60F53310CAE658A4D8066A
24,419,886 UART: [art] PUB.Y = 5A5F6E824C093D27CAD9FC5D09E6BBFFFF306F8BEE76F0D6550A873D498AA3A97966E44ED6489C439F7A4047EDCFB984
24,427,125 UART: [art] SIG.R = A1D907BE65E6E12F12E4E88F68E49EF240F000076F47D08E6AF0EB84741F7F5B7630D130520BA3FF5AA940D65A71EB6F
24,434,539 UART: [art] SIG.S = 3C5B0DDBD041DC88A083121F2A92A809811BC3DB0808E89138A0AE32D05A4BF3ABB152B9D76D9FE3C8719E29FBA2ECF6
25,412,963 UART: mbox::rt_entry...
25,413,931 UART: ____ _ _ _ ____ _____
25,415,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,417,868 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,419,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,421,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,423,568 UART: |_|
25,424,554 UART:
25,536,476 UART: [rt] Runtime listening for mailbox commands...
25,542,278 >>> mbox cmd response data (3272 bytes)
25,557,735 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,591,124 >>> mbox cmd response data (0 bytes)
27,649,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,793,776 UART:
27,794,138 UART: Running Caliptra ROM ...
27,795,268 UART:
27,795,433 UART: [state] CFI Enabled
27,862,850 UART: [state] LifecycleState = Unprovisioned
27,864,962 UART: [state] DebugLocked = No
27,866,921 UART: [state] WD Timer not started. Device not locked for debugging
27,871,269 UART: [kat] SHA2-256
28,061,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,071,905 UART: [kat] ++
28,072,361 UART: [kat] sha1
28,084,407 UART: [kat] SHA2-256
28,087,431 UART: [kat] SHA2-384
28,093,582 UART: [kat] SHA2-512-ACC
28,096,216 UART: [kat] ECC-384
30,546,276 UART: [kat] HMAC-384Kdf
30,570,554 UART: [kat] LMS
31,102,134 UART: [kat] --
31,108,118 UART: [update-reset] ++
34,568,841 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,571,421 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,177,490 >>> mbox cmd response: success
35,182,204 UART: [update-reset] Copying MAN_2 To MAN_1
35,215,656 UART: [update-reset Success] --
35,221,334 UART: [state] Locking Datavault
35,224,410 UART: [state] Locking PCR0, PCR1 and PCR31
35,226,574 UART: [state] Locking ICCM
35,227,869 UART: [exit] Launching FMC @ 0x40000130
35,236,559 UART:
35,236,790 UART: Running Caliptra FMC ...
35,237,959 UART:
35,238,115 UART: [state] CFI Enabled
35,339,033 UART: [art] Extend RT PCRs Done
35,340,229 UART: [art] Lock RT PCRs Done
35,341,793 UART: [art] Populate DV Done
35,347,248 UART: [fht] FMC Alias Private Key: 7
35,348,946 UART: [art] Derive CDI
35,349,752 UART: [art] Store in in slot 0x4
35,407,801 UART: [art] Derive Key Pair
35,408,865 UART: [art] Store priv key in slot 0x5
37,872,715 UART: [art] Derive Key Pair - Done
37,885,829 UART: [art] Signing Cert with AUTHO
37,887,137 UART: RITY.KEYID = 7
39,598,635 UART: [art] Erasing AUTHORITY.KEYID = 7
39,600,121 UART: [art] PUB.X = 276194BF4A86DF7F0678D7DBE973372B783B1122CF142F5385B4E098276B9A1126C4931AC0693B82B09A46E084843B90
39,607,387 UART: [art] PUB.Y = 83F56C9456B6349BF7C6A366DCB4C5EF7D248D3A5325E7D867F973ACC4CADAE28BBC43B372C762D2FA56A338E7498625
39,614,692 UART: [art] SIG.R = A3CCEBB31D59B0E97EB9E4700DAC9C8B0A663027F576DBF2E123CB8027F0C9AEFF5238FA9B6E291FBC7DBCE8CF9662E9
39,622,143 UART: [art] SIG.S = 10A3E60BD75CB3794C2E18DEC0D9447115A1FA80402197E42C8A4FA73CB3E7F39678922F59000156AE93B827BB1BD50D
40,601,110 UART: Caliptra RT
40,601,827 UART: [state] CFI Enabled
43,162,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,163,501 UART: [rt] RT listening for mailbox commands...
43,194,949 UART: [rt]cmd =0x494e464f, len=4
43,199,495 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,323 writing to cptra_bootfsm_go
3,416,456 ready_for_fw is high
3,417,004 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,933,993 >>> mbox cmd response: success
13,934,663 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,215,059 UART:
18,215,478 UART: Running Caliptra FMC ...
18,216,587 UART:
18,216,737 UART: [state] CFI Enabled
18,280,657 UART: [fht] FMC Alias Private Key: 7
20,044,784 UART: [art] Extend RT PCRs Done
20,046,030 UART: [art] Lock RT PCRs Done
20,047,744 UART: [art] Populate DV Done
20,052,891 UART: [fht] FMC Alias Private Key: 7
20,054,487 UART: [art] Derive CDI
20,055,225 UART: [art] Store in in slot 0x4
20,112,825 UART: [art] Derive Key Pair
20,113,858 UART: [art] Store priv key in slot 0x5
22,576,671 UART: [art] Derive Key Pair - Done
22,589,682 UART: [art] Signing Cert with AUTHO
22,590,981 UART: RITY.KEYID = 7
24,302,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,303,906 UART: [art] PUB.X = C7CFEA593CA50AAC7860196C106BFA26C04F9C53EA5C28B64D4454DF4D0C5B152BDC5037B5901E8321BC3E47FA9CCCCF
24,311,151 UART: [art] PUB.Y = B35E2D48C4A9630118140FFFB383BF5BBF7F7CD2A9C1BE1DEFC28CD5ECD5761749C8131F4E2B163E4CCA944FDFE77CE6
24,318,485 UART: [art] SIG.R = 0E18F9FDBCDFB3585F88CA3429C20D0976879A091EAF1BB476BD3027095429EB6FF63CCFE98728AA27330B5BDD750AE6
24,325,926 UART: [art] SIG.S = ADA8E86AB5411502654330F632D63DA943E7EBF94FBC7947AAFBA721CF7AC3909F9203BEBFDA9A21A5CB258C8FCBDEEF
25,305,040 UART: mbox::rt_entry...
25,306,023 UART: ____ _ _ _ ____ _____
25,307,958 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,309,963 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,311,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,313,776 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,315,664 UART: |_|
25,316,545 UART:
25,428,984 UART: [rt] Runtime listening for mailbox commands...
25,434,823 >>> mbox cmd response data (3272 bytes)
25,450,640 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,484,050 >>> mbox cmd response data (0 bytes)
27,543,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,345,611 >>> mbox cmd response: success
35,381,626 UART:
35,381,969 UART: Running Caliptra FMC ...
35,383,096 UART:
35,383,267 UART: [state] CFI Enabled
35,484,686 UART: [art] Extend RT PCRs Done
35,485,876 UART: [art] Lock RT PCRs Done
35,487,554 UART: [art] Populate DV Done
35,492,798 UART: [fht] FMC Alias Private Key: 7
35,494,446 UART: [art] Derive CDI
35,495,255 UART: [art] Store in in slot 0x4
35,553,704 UART: [art] Derive Key Pair
35,554,744 UART: [art] Store priv key in slot 0x5
38,017,437 UART: [art] Derive Key Pair - Done
38,030,228 UART: [art] Signing Cert with AUTHO
38,031,537 UART: RITY.KEYID = 7
39,742,932 UART: [art] Erasing AUTHORITY.KEYID = 7
39,744,439 UART: [art] PUB.X = 1B994E3CFDC9E58ADA45D94803CB7038125D47DFD5F9549E44D3CD3C23A5DE0E21D1E4BE4376BA77B5F96672AF5152BC
39,751,732 UART: [art] PUB.Y = 456354864E975B62EC4FDECB8355F9E8957047772B664F66BF4034C37D342209FC65AF5D5BA980ED22DD9EADC358FB28
39,759,000 UART: [art] SIG.R = C3B8DBE4646457A393BE23801C871CD1F3C1B31434999103D913B3AA5E24AE48FA5F7DCD42DD2BC9E524AB8590806D92
39,766,433 UART: [art] SIG.S = B6688A4A10E7F54323854CB2E9856826DE116F9829349D9E83F92EB308AE3776557EEA2819EFFAAB50BB7CD1F5770E87
40,745,699 UART: Caliptra RT
40,746,414 UART: [state] CFI Enabled
43,306,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,307,465 UART: [rt] RT listening for mailbox commands...
43,338,751 UART: [rt]cmd =0x494e464f, len=4
43,343,141 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
192,759 UART:
193,126 UART: Running Caliptra ROM ...
194,247 UART:
603,988 UART: [state] CFI Enabled
618,499 UART: [state] LifecycleState = Unprovisioned
620,865 UART: [state] DebugLocked = No
623,743 UART: [state] WD Timer not started. Device not locked for debugging
628,412 UART: [kat] SHA2-256
818,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,122 UART: [kat] ++
829,727 UART: [kat] sha1
841,053 UART: [kat] SHA2-256
844,039 UART: [kat] SHA2-384
850,114 UART: [kat] SHA2-512-ACC
852,701 UART: [kat] ECC-384
3,293,689 UART: [kat] HMAC-384Kdf
3,305,857 UART: [kat] LMS
3,837,700 UART: [kat] --
3,840,531 UART: [cold-reset] ++
3,842,193 UART: [fht] FHT @ 0x50003400
3,853,605 UART: [idev] ++
3,854,316 UART: [idev] CDI.KEYID = 6
3,855,202 UART: [idev] SUBJECT.KEYID = 7
3,856,444 UART: [idev] UDS.KEYID = 0
3,857,371 ready_for_fw is high
3,857,569 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,956,327 UART: [idev] Erasing UDS.KEYID = 0
6,333,027 UART: [idev] Sha1 KeyId Algorithm
6,355,509 UART: [idev] --
6,360,612 UART: [ldev] ++
6,361,354 UART: [ldev] CDI.KEYID = 6
6,362,239 UART: [ldev] SUBJECT.KEYID = 5
6,363,342 UART: [ldev] AUTHORITY.KEYID = 7
6,364,628 UART: [ldev] FE.KEYID = 1
6,374,187 UART: [ldev] Erasing FE.KEYID = 1
8,853,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,302 UART: [ldev] --
10,644,787 UART: [fwproc] Wait for Commands...
10,647,313 UART: [fwproc] Recv command 0x46574c44
10,649,567 UART: [fwproc] Recv'd Img size: 78456 bytes
13,652,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,736,931 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,853,102 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,179,473 >>> mbox cmd response: success
14,180,034 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,182,987 UART: [afmc] ++
14,183,705 UART: [afmc] CDI.KEYID = 6
14,184,814 UART: [afmc] SUBJECT.KEYID = 7
14,186,364 UART: [afmc] AUTHORITY.KEYID = 5
16,686,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,407,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,409,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,425,116 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,440,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,455,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,477,428 UART: [afmc] --
18,481,400 UART: [cold-reset] --
18,483,438 UART: [state] Locking Datavault
18,490,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,492,465 UART: [state] Locking ICCM
18,494,888 UART: [exit] Launching FMC @ 0x40000130
18,503,566 UART:
18,503,828 UART: Running Caliptra FMC ...
18,504,938 UART:
18,505,096 UART: [state] CFI Enabled
18,513,093 UART: [fht] FMC Alias Private Key: 7
20,270,316 UART: [art] Extend RT PCRs Done
20,271,533 UART: [art] Lock RT PCRs Done
20,273,240 UART: [art] Populate DV Done
20,279,039 UART: [fht] FMC Alias Private Key: 7
20,280,514 UART: [art] Derive CDI
20,281,285 UART: [art] Store in in slot 0x4
20,324,421 UART: [art] Derive Key Pair
20,325,424 UART: [art] Store priv key in slot 0x5
22,752,480 UART: [art] Derive Key Pair - Done
22,765,685 UART: [art] Signing Cert with AUTHO
22,767,027 UART: RITY.KEYID = 7
24,472,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,482 UART: [art] PUB.X = 05BB1CF64A237488874E0C659C4A5572C5C03B92E1EF0D8543F491D759334BC15CC87FE8DB672954E149A3E6349450D7
24,481,698 UART: [art] PUB.Y = 259CFE5A9B635A68F656BC5FA0544F24EDE0D840A396D09AF1FC72080AAEDBF2E43408E0BE2514947FD6E7A0B9843F4A
24,488,960 UART: [art] SIG.R = E9BEE24E59DE6349590F01DA2506D0B0A8C0FCC9CC9BE3D980EED8C9CE0EB5342FAF062497B528F4A6C88D4B46CFEB15
24,496,378 UART: [art] SIG.S = D57656707AA52D5A3814C4C6329BAC781C7FFFF4E8D55DBA9C24984DBB3B40CBED4B117E28F651DA8140A80C128FD36B
25,474,715 UART: mbox::rt_entry...
25,475,664 UART: ____ _ _ _ ____ _____
25,477,651 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,479,657 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,481,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,483,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,485,443 UART: |_|
25,486,429 UART:
25,599,568 UART: [rt] Runtime listening for mailbox commands...
25,605,410 >>> mbox cmd response data (3272 bytes)
25,621,278 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,654,690 >>> mbox cmd response data (0 bytes)
27,713,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,858,066 UART:
27,858,449 UART: Running Caliptra ROM ...
27,859,588 UART:
27,859,770 UART: [state] CFI Enabled
27,873,721 UART: [state] LifecycleState = Unprovisioned
27,875,668 UART: [state] DebugLocked = No
27,877,438 UART: [state] WD Timer not started. Device not locked for debugging
27,881,539 UART: [kat] SHA2-256
28,071,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,082,156 UART: [kat] ++
28,082,677 UART: [kat] sha1
28,094,609 UART: [kat] SHA2-256
28,097,633 UART: [kat] SHA2-384
28,104,223 UART: [kat] SHA2-512-ACC
28,106,805 UART: [kat] ECC-384
30,549,644 UART: [kat] HMAC-384Kdf
30,563,075 UART: [kat] LMS
31,094,659 UART: [kat] --
31,099,588 UART: [update-reset] ++
34,562,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,566,454 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,172,490 >>> mbox cmd response: success
35,177,143 UART: [update-reset] Copying MAN_2 To MAN_1
35,210,407 UART: [update-reset Success] --
35,214,775 UART: [state] Locking Datavault
35,217,406 UART: [state] Locking PCR0, PCR1 and PCR31
35,219,565 UART: [state] Locking ICCM
35,221,835 UART: [exit] Launching FMC @ 0x40000130
35,230,521 UART:
35,230,758 UART: Running Caliptra FMC ...
35,231,940 UART:
35,232,105 UART: [state] CFI Enabled
35,276,004 UART: [art] Extend RT PCRs Done
35,277,202 UART: [art] Lock RT PCRs Done
35,278,609 UART: [art] Populate DV Done
35,284,182 UART: [fht] FMC Alias Private Key: 7
35,285,722 UART: [art] Derive CDI
35,286,558 UART: [art] Store in in slot 0x4
35,329,245 UART: [art] Derive Key Pair
35,330,329 UART: [art] Store priv key in slot 0x5
37,756,666 UART: [art] Derive Key Pair - Done
37,769,463 UART: [art] Signing Cert with AUTHO
37,770,769 UART: RITY.KEYID = 7
39,476,448 UART: [art] Erasing AUTHORITY.KEYID = 7
39,477,952 UART: [art] PUB.X = 77230A9884EBF81A70E308439F4EDB193C7F089EF0B9B3E6B7293D24D36CA6B05560D81A411FF337B6A2AF6879023AFB
39,485,209 UART: [art] PUB.Y = EE587F7549C28F9F9D231B410AA60E07B8D3543D52E263E7301678E4B9E9CB685E4E04866760BFB23660A5AE0DB6001A
39,492,454 UART: [art] SIG.R = 03051236741234067480208EB4288B1D4C388553539FDD6D8B33545BA3AE065B4131303BED17BDEAC2A071BEAEC8D4F8
39,499,856 UART: [art] SIG.S = AC3AF015B7A7DA34032CF61D53B7FACB45304B4D73556F83DDD2F65653F235FADF92422B02D1F4A64E2FE7A478C0C135
40,479,317 UART: Caliptra RT
40,480,020 UART: [state] CFI Enabled
42,958,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,959,731 UART: [rt] RT listening for mailbox commands...
42,991,123 UART: [rt]cmd =0x494e464f, len=4
42,995,377 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
3,758,517 ready_for_fw is high
3,759,091 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,195,151 >>> mbox cmd response: success
14,195,743 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,445,561 UART:
18,445,938 UART: Running Caliptra FMC ...
18,447,141 UART:
18,447,305 UART: [state] CFI Enabled
18,455,196 UART: [fht] FMC Alias Private Key: 7
20,212,137 UART: [art] Extend RT PCRs Done
20,213,386 UART: [art] Lock RT PCRs Done
20,214,704 UART: [art] Populate DV Done
20,219,806 UART: [fht] FMC Alias Private Key: 7
20,221,509 UART: [art] Derive CDI
20,222,329 UART: [art] Store in in slot 0x4
20,264,660 UART: [art] Derive Key Pair
20,265,677 UART: [art] Store priv key in slot 0x5
22,692,166 UART: [art] Derive Key Pair - Done
22,705,184 UART: [art] Signing Cert with AUTHO
22,706,516 UART: RITY.KEYID = 7
24,412,363 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,867 UART: [art] PUB.X = A6E372DA1F4B27BEDEF185A49A9C7440B37B1883416FD8BFCF955A9809DE9E310A63495E6DDCED767F6B31F757DCB344
24,421,162 UART: [art] PUB.Y = 8C66E01B83E67BB92A2D0A7BE4CF593A4B0CB6236FA7025BFEBC16911455054DFCBD7BD7D57F302E66A61FBADAB36072
24,428,459 UART: [art] SIG.R = BD8F249F123372FE85D449D98FD889EAD34836B1E1C36B30153D687A38C0EF7C66CD73A280186A9FC04EB517A5F2AA60
24,435,861 UART: [art] SIG.S = AF213B81395A07B26D098A2CA793EBE3526EDC7F8E60088497206133C545292574FB6225E466F4CAA7551FE296346F8D
25,414,304 UART: mbox::rt_entry...
25,415,290 UART: ____ _ _ _ ____ _____
25,417,279 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,419,287 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,421,221 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,423,337 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,425,303 UART: |_|
25,426,146 UART:
25,538,140 UART: [rt] Runtime listening for mailbox commands...
25,543,987 >>> mbox cmd response data (3272 bytes)
25,559,754 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,593,158 >>> mbox cmd response data (0 bytes)
27,654,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,378,097 >>> mbox cmd response: success
35,413,345 UART:
35,413,657 UART: Running Caliptra FMC ...
35,414,779 UART:
35,414,946 UART: [state] CFI Enabled
35,458,497 UART: [art] Extend RT PCRs Done
35,459,682 UART: [art] Lock RT PCRs Done
35,461,042 UART: [art] Populate DV Done
35,466,459 UART: [fht] FMC Alias Private Key: 7
35,468,108 UART: [art] Derive CDI
35,468,920 UART: [art] Store in in slot 0x4
35,511,367 UART: [art] Derive Key Pair
35,512,432 UART: [art] Store priv key in slot 0x5
37,939,105 UART: [art] Derive Key Pair - Done
37,951,941 UART: [art] Signing Cert with AUTHO
37,953,241 UART: RITY.KEYID = 7
39,658,218 UART: [art] Erasing AUTHORITY.KEYID = 7
39,659,704 UART: [art] PUB.X = C3102F46DF36D260850401786EE5284630AE68EEB5155FC6A6F30FA3F1571D4A9DBBA27D87CFCA5E9A7444DD8C9F1713
39,667,030 UART: [art] PUB.Y = C3DEB01DF6B6FE68C8C79ADF544BEDF11EC5852CA50DC40EC630C90DB3F28B5AD1654D75815539D8BC7A33053CC7715E
39,674,236 UART: [art] SIG.R = 5DB50FFF4D379D1EB2669B7D43E63EEE5093E0F9193E4ED7545AB70BB6082D91D60B8E4B0452D39A7E33E20A0E90830E
39,681,651 UART: [art] SIG.S = A5A2FCD0D027D2E28920B04F36B30AACD813329DA8708D3C44296F45A1C96EDEEFD9F3A374C20DB38A268085657AC64F
40,660,289 UART: Caliptra RT
40,660,989 UART: [state] CFI Enabled
43,139,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,140,161 UART: [rt] RT listening for mailbox commands...
43,171,296 UART: [rt]cmd =0x494e464f, len=4
43,175,416 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,506 UART: [state] LifecycleState = Unprovisioned
85,161 UART: [state] DebugLocked = No
85,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,313 UART: [kat] SHA2-256
881,244 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,359 UART: [kat] ++
885,511 UART: [kat] sha1
889,699 UART: [kat] SHA2-256
891,637 UART: [kat] SHA2-384
894,364 UART: [kat] SHA2-512-ACC
896,265 UART: [kat] ECC-384
902,212 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,475,817 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,479,052 UART: [idev] ++
1,479,220 UART: [idev] CDI.KEYID = 6
1,479,580 UART: [idev] SUBJECT.KEYID = 7
1,480,004 UART: [idev] UDS.KEYID = 0
1,480,349 ready_for_fw is high
1,480,349 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,168 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,515,083 UART: [ldev] ++
1,515,251 UART: [ldev] CDI.KEYID = 6
1,515,614 UART: [ldev] SUBJECT.KEYID = 5
1,516,040 UART: [ldev] AUTHORITY.KEYID = 7
1,516,503 UART: [ldev] FE.KEYID = 1
1,521,805 UART: [ldev] Erasing FE.KEYID = 1
1,546,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,720 UART: [ldev] --
1,586,027 UART: [fwproc] Waiting for Commands...
1,586,786 UART: [fwproc] Received command 0x46574c44
1,587,577 UART: [fwproc] Received Image of size 78456 bytes
2,474,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,503 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,613,922 >>> mbox cmd response: success
2,613,922 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,615,174 UART: [afmc] ++
2,615,342 UART: [afmc] CDI.KEYID = 6
2,615,704 UART: [afmc] SUBJECT.KEYID = 7
2,616,129 UART: [afmc] AUTHORITY.KEYID = 5
2,651,412 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,372 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,152 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,880 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,765 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,455 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,506 UART: [afmc] --
2,694,632 UART: [cold-reset] --
2,695,380 UART: [state] Locking Datavault
2,696,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,923 UART: [state] Locking ICCM
2,697,415 UART: [exit] Launching FMC @ 0x40000130
2,702,744 UART:
2,702,760 UART: Running Caliptra FMC ...
2,703,168 UART:
2,703,222 UART: [state] CFI Enabled
2,713,837 UART: [fht] FMC Alias Private Key: 7
2,821,782 UART: [art] Extend RT PCRs Done
2,822,210 UART: [art] Lock RT PCRs Done
2,823,792 UART: [art] Populate DV Done
2,831,961 UART: [fht] FMC Alias Private Key: 7
2,832,967 UART: [art] Derive CDI
2,833,247 UART: [art] Store in in slot 0x4
2,918,794 UART: [art] Derive Key Pair
2,919,154 UART: [art] Store priv key in slot 0x5
2,932,026 UART: [art] Derive Key Pair - Done
2,946,856 UART: [art] Signing Cert with AUTHO
2,947,336 UART: RITY.KEYID = 7
2,962,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,167 UART: [art] PUB.X = D91DDDF075E7260C74DAFD37AC8E0892C84920F7D1AE44E24345FE18D604C8D58E82658961573E5D3973E84F3ED31DB1
2,969,934 UART: [art] PUB.Y = 9CFFD99AE04FE27FA9FE9907D55CA0F2A6254AB923DA891886638523A533BB99D770CF052BBCE26348C704401AB85D9C
2,976,885 UART: [art] SIG.R = FFF97F91006EE7E844F210B73D727CD9EE33F4490EFD9BA707A321F536505A59CE3FE0A14BFF5A80464C7D0733726EB8
2,983,634 UART: [art] SIG.S = 6E6EA4F044370F1097D9A157AADA57CB301E38C8A7E12C3206473204FFD7E10666C46AEA78A12CA78694BC279292122A
3,007,773 UART: mbox::rt_entry...
3,008,145 UART: ____ _ _ _ ____ _____
3,008,929 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,729 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,497 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,265 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,033 UART: |_|
3,012,345 UART:
3,119,389 UART: [rt] Runtime listening for mailbox commands...
3,124,357 >>> mbox cmd response data (3272 bytes)
3,124,358 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,444 >>> mbox cmd response data (0 bytes)
3,147,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,147,565 UART:
3,147,581 UART: Running Caliptra ROM ...
3,147,989 UART:
3,148,043 UART: [state] CFI Enabled
3,150,935 UART: [state] LifecycleState = Unprovisioned
3,151,590 UART: [state] DebugLocked = No
3,152,092 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,657 UART: [kat] SHA2-256
3,947,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,703 UART: [kat] ++
3,951,855 UART: [kat] sha1
3,956,197 UART: [kat] SHA2-256
3,958,135 UART: [kat] SHA2-384
3,960,834 UART: [kat] SHA2-512-ACC
3,962,734 UART: [kat] ECC-384
3,968,307 UART: [kat] HMAC-384Kdf
3,972,893 UART: [kat] LMS
4,541,089 UART: [kat] --
4,541,740 UART: [update-reset] ++
5,874,710 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,875,846 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,025,350 >>> mbox cmd response: success
6,025,687 UART: [update-reset] Copying MAN_2 To MAN_1
6,033,701 UART: [update-reset Success] --
6,034,818 UART: [state] Locking Datavault
6,035,830 UART: [state] Locking PCR0, PCR1 and PCR31
6,036,434 UART: [state] Locking ICCM
6,037,052 UART: [exit] Launching FMC @ 0x40000130
6,042,381 UART:
6,042,397 UART: Running Caliptra FMC ...
6,042,805 UART:
6,042,859 UART: [state] CFI Enabled
6,131,748 UART: [art] Extend RT PCRs Done
6,132,176 UART: [art] Lock RT PCRs Done
6,133,347 UART: [art] Populate DV Done
6,141,560 UART: [fht] FMC Alias Private Key: 7
6,142,714 UART: [art] Derive CDI
6,142,994 UART: [art] Store in in slot 0x4
6,228,603 UART: [art] Derive Key Pair
6,228,963 UART: [art] Store priv key in slot 0x5
6,242,089 UART: [art] Derive Key Pair - Done
6,257,375 UART: [art] Signing Cert with AUTHO
6,257,855 UART: RITY.KEYID = 7
6,272,931 UART: [art] Erasing AUTHORITY.KEYID = 7
6,273,696 UART: [art] PUB.X = FBE4172DB8CF29D9FE6A6D1A39C9F769ECA8DE408FB00E560898D307897BBA9C92E764E1CB0EC2B9DE1B01A843B62874
6,280,469 UART: [art] PUB.Y = E0CA183C07ADEF217C6A0BC60E4940DD523AAAF9B8AF6D1EFC419F5E7CBB17D970A582EE9442AAA503B6CEB9097969DD
6,287,430 UART: [art] SIG.R = 350D9A9CCC87411AC95325CA4755D350545311C56CA7578601A0EF782A2C728B8E658556D3AAA673F747092F543143AE
6,294,185 UART: [art] SIG.S = 5390AAEAAE2E1F2AAD717336C3939FD2F2FDA5A8EEF15EBA8CBA41E2551937F7B4AD9B73B65DCFC1581AEA1243BD1DF3
6,318,340 UART: Caliptra RT
6,318,593 UART: [state] CFI Enabled
6,382,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,383,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,413,745 UART: [rt]cmd =0x494e464f, len=4
6,417,294 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,937 ready_for_fw is high
1,361,937 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,376 >>> mbox cmd response: success
2,463,376 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,818 UART:
2,524,834 UART: Running Caliptra FMC ...
2,525,242 UART:
2,525,296 UART: [state] CFI Enabled
2,535,713 UART: [fht] FMC Alias Private Key: 7
2,643,568 UART: [art] Extend RT PCRs Done
2,643,996 UART: [art] Lock RT PCRs Done
2,645,534 UART: [art] Populate DV Done
2,653,713 UART: [fht] FMC Alias Private Key: 7
2,654,867 UART: [art] Derive CDI
2,655,147 UART: [art] Store in in slot 0x4
2,741,038 UART: [art] Derive Key Pair
2,741,398 UART: [art] Store priv key in slot 0x5
2,754,434 UART: [art] Derive Key Pair - Done
2,769,123 UART: [art] Signing Cert with AUTHO
2,769,603 UART: RITY.KEYID = 7
2,784,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,598 UART: [art] PUB.X = 80C72EAE509A8D10B959D5F2A54382C579C1B914F343267415E758A99942C6E3B0EE6ABE36D1E038B8C20DDFD0039C0B
2,792,365 UART: [art] PUB.Y = 37E28489DF1B8A2448A665A46B607B96490D78197D83F59E726D91643D3FA43A95E732321E58057433FB3A0026D8BDBF
2,799,281 UART: [art] SIG.R = 89D914B616D70346EE24353C6F42FBACBA0EFE6B456D805A84D87769B4CD15041B255EBE41E267F9EA4066B9B5A96621
2,806,048 UART: [art] SIG.S = C79B2FB13C0A3C3652F0C2AAEE9AC0958F0EAE8B190C9E549B8207EFB673A39E74878F3A83D105E2DE27424901759BDF
2,829,921 UART: mbox::rt_entry...
2,830,293 UART: ____ _ _ _ ____ _____
2,831,077 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,877 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,645 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,181 UART: |_|
2,834,493 UART:
2,941,660 UART: [rt] Runtime listening for mailbox commands...
2,946,628 >>> mbox cmd response data (3272 bytes)
2,946,629 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,969,715 >>> mbox cmd response data (0 bytes)
2,969,716 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,728,049 >>> mbox cmd response: success
5,741,572 UART:
5,741,588 UART: Running Caliptra FMC ...
5,741,996 UART:
5,742,050 UART: [state] CFI Enabled
5,831,003 UART: [art] Extend RT PCRs Done
5,831,431 UART: [art] Lock RT PCRs Done
5,832,548 UART: [art] Populate DV Done
5,841,025 UART: [fht] FMC Alias Private Key: 7
5,842,123 UART: [art] Derive CDI
5,842,403 UART: [art] Store in in slot 0x4
5,928,246 UART: [art] Derive Key Pair
5,928,606 UART: [art] Store priv key in slot 0x5
5,941,856 UART: [art] Derive Key Pair - Done
5,956,639 UART: [art] Signing Cert with AUTHO
5,957,119 UART: RITY.KEYID = 7
5,972,007 UART: [art] Erasing AUTHORITY.KEYID = 7
5,972,772 UART: [art] PUB.X = D42D52BEEA15E77B9422D443D61E0D7525D68826B21A73D79F2479B903C2A728379D19CF75695B788E6F4C5ECD81095E
5,979,533 UART: [art] PUB.Y = AA7CD4E4532085209735D621C05801D63687DD3D3C3F2FAB14E2C2007FAA161B2EF74AA87F02778791D94C619453F298
5,986,453 UART: [art] SIG.R = B4CF3E745D8FF9D557F7817C0D031DB7D933CE0EC3B838D995CB7334CAB92AA0599CDA6A05333634998C983CC841F318
5,993,219 UART: [art] SIG.S = B59FE74F9C957D429A7C93F773FDA918B3B597A0777405E57FEA3B957A3DDD55386EDBDEABC6932BDB3F1F187983AAA6
6,016,751 UART: Caliptra RT
6,017,004 UART: [state] CFI Enabled
6,080,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,082,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,112,640 UART: [rt]cmd =0x494e464f, len=4
6,116,251 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,926 UART: [fht] Storing FHT @ 0x50003400
1,479,791 UART: [idev] ++
1,479,959 UART: [idev] CDI.KEYID = 6
1,480,319 UART: [idev] SUBJECT.KEYID = 7
1,480,743 UART: [idev] UDS.KEYID = 0
1,481,088 ready_for_fw is high
1,481,088 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,603 UART: [idev] Erasing UDS.KEYID = 0
1,505,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,709 UART: [idev] --
1,514,914 UART: [ldev] ++
1,515,082 UART: [ldev] CDI.KEYID = 6
1,515,445 UART: [ldev] SUBJECT.KEYID = 5
1,515,871 UART: [ldev] AUTHORITY.KEYID = 7
1,516,334 UART: [ldev] FE.KEYID = 1
1,521,756 UART: [ldev] Erasing FE.KEYID = 1
1,548,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,963 UART: [ldev] --
1,587,376 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 78456 bytes
2,476,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,899 >>> mbox cmd response: success
2,614,899 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,089 UART: [afmc] ++
2,616,257 UART: [afmc] CDI.KEYID = 6
2,616,619 UART: [afmc] SUBJECT.KEYID = 7
2,617,044 UART: [afmc] AUTHORITY.KEYID = 5
2,652,107 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,647 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,040 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,730 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,767 UART: [afmc] --
2,695,653 UART: [cold-reset] --
2,696,543 UART: [state] Locking Datavault
2,697,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,186 UART: [state] Locking ICCM
2,698,712 UART: [exit] Launching FMC @ 0x40000130
2,704,041 UART:
2,704,057 UART: Running Caliptra FMC ...
2,704,465 UART:
2,704,608 UART: [state] CFI Enabled
2,715,371 UART: [fht] FMC Alias Private Key: 7
2,823,354 UART: [art] Extend RT PCRs Done
2,823,782 UART: [art] Lock RT PCRs Done
2,825,062 UART: [art] Populate DV Done
2,833,317 UART: [fht] FMC Alias Private Key: 7
2,834,441 UART: [art] Derive CDI
2,834,721 UART: [art] Store in in slot 0x4
2,920,450 UART: [art] Derive Key Pair
2,920,810 UART: [art] Store priv key in slot 0x5
2,933,858 UART: [art] Derive Key Pair - Done
2,948,849 UART: [art] Signing Cert with AUTHO
2,949,329 UART: RITY.KEYID = 7
2,964,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,214 UART: [art] PUB.X = C489D8A59B9DF5160F410A3C3F28E906E9C52CE616C710A8EE38F4548C1D86C8D877EF4E5FE774B017F4C1F1BC6D9719
2,971,985 UART: [art] PUB.Y = 0F67FADE0FD81FD730BC4BCB53AC70E44542B1395ACD34CCB3F7973D90262B6F8C6A4CA24E2BD4B88637BBEA7E58AB60
2,978,953 UART: [art] SIG.R = 29B44B1CEE21BF862839D0404DFAFA8E42CCCDF19AE3F76F24EB3AD69B4434BA5EEF9C690171175EB60B2B0D02A1B516
2,985,731 UART: [art] SIG.S = B2DA567F6422CB6DF026290911F009B2E6D7B19075416134B35E573E89C44AE741186F108E1454C2F34BD4923210F066
3,009,222 UART: mbox::rt_entry...
3,009,594 UART: ____ _ _ _ ____ _____
3,010,378 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,946 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,714 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,482 UART: |_|
3,013,794 UART:
3,121,098 UART: [rt] Runtime listening for mailbox commands...
3,126,066 >>> mbox cmd response data (3272 bytes)
3,126,067 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,153 >>> mbox cmd response data (0 bytes)
3,149,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,149,274 UART:
3,149,290 UART: Running Caliptra ROM ...
3,149,698 UART:
3,149,839 UART: [state] CFI Enabled
3,152,695 UART: [state] LifecycleState = Unprovisioned
3,153,350 UART: [state] DebugLocked = No
3,153,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,497 UART: [kat] SHA2-256
3,949,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,543 UART: [kat] ++
3,953,695 UART: [kat] sha1
3,957,973 UART: [kat] SHA2-256
3,959,911 UART: [kat] SHA2-384
3,962,666 UART: [kat] SHA2-512-ACC
3,964,566 UART: [kat] ECC-384
3,970,287 UART: [kat] HMAC-384Kdf
3,974,785 UART: [kat] LMS
4,542,981 UART: [kat] --
4,543,874 UART: [update-reset] ++
5,875,514 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,876,718 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,026,222 >>> mbox cmd response: success
6,026,391 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,405 UART: [update-reset Success] --
6,035,496 UART: [state] Locking Datavault
6,036,168 UART: [state] Locking PCR0, PCR1 and PCR31
6,036,772 UART: [state] Locking ICCM
6,037,238 UART: [exit] Launching FMC @ 0x40000130
6,042,567 UART:
6,042,583 UART: Running Caliptra FMC ...
6,042,991 UART:
6,043,134 UART: [state] CFI Enabled
6,132,243 UART: [art] Extend RT PCRs Done
6,132,671 UART: [art] Lock RT PCRs Done
6,133,988 UART: [art] Populate DV Done
6,142,457 UART: [fht] FMC Alias Private Key: 7
6,143,451 UART: [art] Derive CDI
6,143,731 UART: [art] Store in in slot 0x4
6,229,416 UART: [art] Derive Key Pair
6,229,776 UART: [art] Store priv key in slot 0x5
6,242,848 UART: [art] Derive Key Pair - Done
6,257,843 UART: [art] Signing Cert with AUTHO
6,258,323 UART: RITY.KEYID = 7
6,274,035 UART: [art] Erasing AUTHORITY.KEYID = 7
6,274,800 UART: [art] PUB.X = 448EE39DA42E77A234C4F21A4FA869A2FD1B781CDF973D220BA6B262631E79DB67C6E84E6720396E8556ADA5055D407F
6,281,570 UART: [art] PUB.Y = F9728D34848820E9A62C51D0E43609C3588A41ADA191F08D70C0BD741506886386E59BD8A017ECFE8F8C2D0A90A98AB5
6,288,513 UART: [art] SIG.R = EB472DE5BC754E7D83A764E33685BEF802515F30719D8C49458CA90F0AC94366703E3578B74A2214D82F0444879034A1
6,295,263 UART: [art] SIG.S = 4DE8EB12AB7FA53610AEA86459780CF5ABEB6B26A431104D26AE38379008825544955990527695C0328119CAE6430CE3
6,318,573 UART: Caliptra RT
6,318,918 UART: [state] CFI Enabled
6,381,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,382,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,413,405 UART: [rt]cmd =0x494e464f, len=4
6,417,196 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,396 ready_for_fw is high
1,362,396 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,479 >>> mbox cmd response: success
2,463,479 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,909 UART:
2,524,925 UART: Running Caliptra FMC ...
2,525,333 UART:
2,525,476 UART: [state] CFI Enabled
2,535,915 UART: [fht] FMC Alias Private Key: 7
2,642,988 UART: [art] Extend RT PCRs Done
2,643,416 UART: [art] Lock RT PCRs Done
2,644,906 UART: [art] Populate DV Done
2,653,037 UART: [fht] FMC Alias Private Key: 7
2,654,063 UART: [art] Derive CDI
2,654,343 UART: [art] Store in in slot 0x4
2,739,916 UART: [art] Derive Key Pair
2,740,276 UART: [art] Store priv key in slot 0x5
2,753,748 UART: [art] Derive Key Pair - Done
2,768,512 UART: [art] Signing Cert with AUTHO
2,768,992 UART: RITY.KEYID = 7
2,784,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,991 UART: [art] PUB.X = FD1BD29B9326F60BA2B1B2036DA41F0E72B93362D74C710E71113BCDFFD6A290ADF52C52D3A1F4E3C4780FE5AA9AF7D9
2,791,766 UART: [art] PUB.Y = 1E1603BD1FAE1980FD308853B25186249ACAEFF37B1963677ED54208E3C3C8150C7DD9F524090616CA0E761A66FC8D5B
2,798,702 UART: [art] SIG.R = 8FC437466564722A535D1ED0895E1A9E7D5ABDFCE48762B07D01703EE7A35696A286D3108F187680915D91C314FB4F74
2,805,465 UART: [art] SIG.S = 687043452C54F855C9623F3ECF40A1B11DDF8D65D36CC28507494A98468F6A3E80783365070EDB0E26C25326ED5C5AAB
2,829,180 UART: mbox::rt_entry...
2,829,552 UART: ____ _ _ _ ____ _____
2,830,336 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,136 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,904 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,672 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,440 UART: |_|
2,833,752 UART:
2,940,832 UART: [rt] Runtime listening for mailbox commands...
2,945,800 >>> mbox cmd response data (3272 bytes)
2,945,801 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,968,887 >>> mbox cmd response data (0 bytes)
2,968,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,727,584 >>> mbox cmd response: success
5,740,717 UART:
5,740,733 UART: Running Caliptra FMC ...
5,741,141 UART:
5,741,284 UART: [state] CFI Enabled
5,830,243 UART: [art] Extend RT PCRs Done
5,830,671 UART: [art] Lock RT PCRs Done
5,832,096 UART: [art] Populate DV Done
5,840,069 UART: [fht] FMC Alias Private Key: 7
5,841,217 UART: [art] Derive CDI
5,841,497 UART: [art] Store in in slot 0x4
5,927,342 UART: [art] Derive Key Pair
5,927,702 UART: [art] Store priv key in slot 0x5
5,940,706 UART: [art] Derive Key Pair - Done
5,955,353 UART: [art] Signing Cert with AUTHO
5,955,833 UART: RITY.KEYID = 7
5,970,701 UART: [art] Erasing AUTHORITY.KEYID = 7
5,971,466 UART: [art] PUB.X = F49B5E3E9858E87C31BD2CD3EA3E01AB618716471BAC8691A649582FC4472C38D5F7E6AEE1F9BA06AA899E88BE357ABE
5,978,246 UART: [art] PUB.Y = 9148E5F55E73782DB4C3BAB32BC8D449F894F3B919DDF5D16B5B5C6F945D87FEE75AB27792D0BC9C98AF04FA8EA5F749
5,985,211 UART: [art] SIG.R = F344F6A4303672525A47EF45D6C8436AE665AC02036588F4BB9F57CAAAC576CE030EFE9EC5B5D120BB7E3FB6D88CEEDF
5,991,989 UART: [art] SIG.S = 59FE698B4A24E7FF73C778505E2A25584E30621E19171601D01FB9ED8F24D9C803B217712FBC93AAA0048F94A8503BB9
6,016,369 UART: Caliptra RT
6,016,714 UART: [state] CFI Enabled
6,079,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,081,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,111,687 UART: [rt]cmd =0x494e464f, len=4
6,115,290 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
902,031 UART: [kat] SHA2-256
903,971 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,114 UART: [kat] HMAC-384Kdf
922,846 UART: [kat] LMS
1,171,174 UART: [kat] --
1,171,943 UART: [cold-reset] ++
1,172,455 UART: [fht] FHT @ 0x50003400
1,175,162 UART: [idev] ++
1,175,330 UART: [idev] CDI.KEYID = 6
1,175,690 UART: [idev] SUBJECT.KEYID = 7
1,176,114 UART: [idev] UDS.KEYID = 0
1,176,459 ready_for_fw is high
1,176,459 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,201,303 UART: [idev] Sha1 KeyId Algorithm
1,209,773 UART: [idev] --
1,210,999 UART: [ldev] ++
1,211,167 UART: [ldev] CDI.KEYID = 6
1,211,530 UART: [ldev] SUBJECT.KEYID = 5
1,211,956 UART: [ldev] AUTHORITY.KEYID = 7
1,212,419 UART: [ldev] FE.KEYID = 1
1,217,671 UART: [ldev] Erasing FE.KEYID = 1
1,244,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,496 UART: [fwproc] Wait for Commands...
1,284,146 UART: [fwproc] Recv command 0x46574c44
1,284,874 UART: [fwproc] Recv'd Img size: 78456 bytes
2,171,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,212 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,119 >>> mbox cmd response: success
2,310,119 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,359 UART: [afmc] ++
2,311,527 UART: [afmc] CDI.KEYID = 6
2,311,889 UART: [afmc] SUBJECT.KEYID = 7
2,312,314 UART: [afmc] AUTHORITY.KEYID = 5
2,347,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,164 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,714 UART: [afmc] --
2,390,738 UART: [cold-reset] --
2,391,622 UART: [state] Locking Datavault
2,393,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,657 UART: [state] Locking ICCM
2,394,133 UART: [exit] Launching FMC @ 0x40000130
2,399,462 UART:
2,399,478 UART: Running Caliptra FMC ...
2,399,886 UART:
2,399,940 UART: [state] CFI Enabled
2,410,443 UART: [fht] FMC Alias Private Key: 7
2,518,138 UART: [art] Extend RT PCRs Done
2,518,566 UART: [art] Lock RT PCRs Done
2,520,310 UART: [art] Populate DV Done
2,528,365 UART: [fht] FMC Alias Private Key: 7
2,529,471 UART: [art] Derive CDI
2,529,751 UART: [art] Store in in slot 0x4
2,615,446 UART: [art] Derive Key Pair
2,615,806 UART: [art] Store priv key in slot 0x5
2,629,174 UART: [art] Derive Key Pair - Done
2,644,533 UART: [art] Signing Cert with AUTHO
2,645,013 UART: RITY.KEYID = 7
2,660,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,104 UART: [art] PUB.X = B3FBEB025B2D858B206A1088F14976243373856F7D42CA2D2198C0A6E16AB6804CCA3A220D911496FDF3BD088638CB69
2,667,867 UART: [art] PUB.Y = 4FE415926DB617FCC318930416028EB1BC29FFC6668EB72BB2768401A4CD57A99275DA96B602DD85B9866372AC165DBE
2,674,809 UART: [art] SIG.R = D44D1DAC75690745B781E2BFFC9EBCF364AA2D970B21F3825EA0AED5BC063A8BFB4D033E8BD4F03626B6903D22409CC8
2,681,585 UART: [art] SIG.S = 38DEE1807D2ED11ED6C44955050D6362BA989ACD70948ABCB100E44FA7917DB28AA34B8279AD41D7C34A29DB9ED856EA
2,704,954 UART: mbox::rt_entry...
2,705,326 UART: ____ _ _ _ ____ _____
2,706,110 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,910 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,678 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,446 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,214 UART: |_|
2,709,526 UART:
2,815,572 UART: [rt] Runtime listening for mailbox commands...
2,820,540 >>> mbox cmd response data (3272 bytes)
2,820,541 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,627 >>> mbox cmd response data (0 bytes)
2,843,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,745 UART:
2,843,761 UART: Running Caliptra ROM ...
2,844,169 UART:
2,844,224 UART: [state] CFI Enabled
2,846,926 UART: [state] LifecycleState = Unprovisioned
2,847,581 UART: [state] DebugLocked = No
2,848,109 UART: [state] WD Timer not started. Device not locked for debugging
2,849,327 UART: [kat] SHA2-256
3,654,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,659,102 UART: [kat] ++
3,659,254 UART: [kat] sha1
3,663,422 UART: [kat] SHA2-256
3,665,362 UART: [kat] SHA2-384
3,668,081 UART: [kat] SHA2-512-ACC
3,669,981 UART: [kat] ECC-384
3,679,784 UART: [kat] HMAC-384Kdf
3,684,170 UART: [kat] LMS
3,932,498 UART: [kat] --
3,933,410 UART: [update-reset] ++
5,243,106 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,253 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,393,705 >>> mbox cmd response: success
5,393,984 UART: [update-reset] Copying MAN_2 To MAN_1
5,401,998 UART: [update-reset Success] --
5,403,075 UART: [state] Locking Datavault
5,403,983 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,587 UART: [state] Locking ICCM
5,405,163 UART: [exit] Launching FMC @ 0x40000130
5,410,492 UART:
5,410,508 UART: Running Caliptra FMC ...
5,410,916 UART:
5,410,970 UART: [state] CFI Enabled
5,499,905 UART: [art] Extend RT PCRs Done
5,500,333 UART: [art] Lock RT PCRs Done
5,501,466 UART: [art] Populate DV Done
5,509,709 UART: [fht] FMC Alias Private Key: 7
5,510,773 UART: [art] Derive CDI
5,511,053 UART: [art] Store in in slot 0x4
5,596,630 UART: [art] Derive Key Pair
5,596,990 UART: [art] Store priv key in slot 0x5
5,609,506 UART: [art] Derive Key Pair - Done
5,624,491 UART: [art] Signing Cert with AUTHO
5,624,971 UART: RITY.KEYID = 7
5,640,221 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,986 UART: [art] PUB.X = 7DD8FCB638CA2B5BABB9C7846E6FC9B18F347C9364A315B9E98945AB4A694148D40994EA595023894D4501ADFDAAD159
5,647,760 UART: [art] PUB.Y = 07AC97ED388C93859F163E09F1ABF1572089CAF1C1327FB4926AA1828372AC0852177D6770829776DB3622598BE58D8E
5,654,695 UART: [art] SIG.R = 8ACD3D4B0B66D7894D52CE34167A3A988635D9DC5DCE40C470ABA2F705F6B05F8722F4E118102CC56A14D1F42229EA28
5,661,467 UART: [art] SIG.S = EF4C8877A533B5DE7EF4C86500B095C8CBC80D0B0D008ABEE0E71F2B11DDA77D01F146B4320BF4410E2F4FD186C0DC7D
5,685,382 UART: Caliptra RT
5,685,635 UART: [state] CFI Enabled
5,749,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,751,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,781,531 UART: [rt]cmd =0x494e464f, len=4
5,785,192 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 ready_for_fw is high
1,060,527 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,162,440 >>> mbox cmd response: success
2,162,440 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,602 UART:
2,224,618 UART: Running Caliptra FMC ...
2,225,026 UART:
2,225,080 UART: [state] CFI Enabled
2,235,465 UART: [fht] FMC Alias Private Key: 7
2,343,248 UART: [art] Extend RT PCRs Done
2,343,676 UART: [art] Lock RT PCRs Done
2,345,114 UART: [art] Populate DV Done
2,353,259 UART: [fht] FMC Alias Private Key: 7
2,354,413 UART: [art] Derive CDI
2,354,693 UART: [art] Store in in slot 0x4
2,440,264 UART: [art] Derive Key Pair
2,440,624 UART: [art] Store priv key in slot 0x5
2,453,518 UART: [art] Derive Key Pair - Done
2,468,240 UART: [art] Signing Cert with AUTHO
2,468,720 UART: RITY.KEYID = 7
2,483,658 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,423 UART: [art] PUB.X = C149F1260F84AC55224FC21865B45F6E0A7B4EEADA14E4274DD79C934B7078560F19EA920D6D4B9D424557F198461211
2,491,179 UART: [art] PUB.Y = 1D63199016ABE3D98577153D55AE068A08663F0853AE279DC65D19271F096AAFF823B2CF077DF01053F5DCD6469DF09F
2,498,116 UART: [art] SIG.R = 3B56D60D028D9EE54A969C5CCFD40EDD14EDEEEB2366FD64BC10CD26A67636F527507141B5746525DCD0BA0173DE62A8
2,504,888 UART: [art] SIG.S = 51A0C5690A0B8968D4B49C73439FB172FD7161D1F54F12633790AE252B9E8FCD527BB7CE58E32590224478583EC191D4
2,528,259 UART: mbox::rt_entry...
2,528,631 UART: ____ _ _ _ ____ _____
2,529,415 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,983 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,519 UART: |_|
2,532,831 UART:
2,638,445 UART: [rt] Runtime listening for mailbox commands...
2,643,413 >>> mbox cmd response data (3272 bytes)
2,643,414 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,500 >>> mbox cmd response data (0 bytes)
2,666,501 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,100,051 >>> mbox cmd response: success
5,113,773 UART:
5,113,789 UART: Running Caliptra FMC ...
5,114,197 UART:
5,114,251 UART: [state] CFI Enabled
5,203,064 UART: [art] Extend RT PCRs Done
5,203,492 UART: [art] Lock RT PCRs Done
5,204,795 UART: [art] Populate DV Done
5,212,924 UART: [fht] FMC Alias Private Key: 7
5,214,066 UART: [art] Derive CDI
5,214,346 UART: [art] Store in in slot 0x4
5,300,131 UART: [art] Derive Key Pair
5,300,491 UART: [art] Store priv key in slot 0x5
5,313,547 UART: [art] Derive Key Pair - Done
5,328,604 UART: [art] Signing Cert with AUTHO
5,329,084 UART: RITY.KEYID = 7
5,344,100 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,865 UART: [art] PUB.X = 40E556FB67EE214823B8C89A8825F6535F02750965F9FD6001034D39EBF20B88D71991B3DECC17B9015BD64B5C5D7EED
5,351,621 UART: [art] PUB.Y = DAD27D95C86DCD8F1BEF2BA86702E9C743F58E8FB507AB4D374A08317808F4E762A8619BC4F9014D12A8092B2B3AAF5F
5,358,567 UART: [art] SIG.R = 09581AA5B5A4C11E69202928794FB22DF2C43F726849874448A2802920C24C2CD4A1C590436A40FB273B9707A511537B
5,365,319 UART: [art] SIG.S = 8222700D0AEB6D180CD2564DFA034968E106BBC311163EC6270FE0C3EB5298F10CD05B981CCA02812AAC89CD60465C92
5,389,200 UART: Caliptra RT
5,389,453 UART: [state] CFI Enabled
5,451,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,453,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,483,822 UART: [rt]cmd =0x494e464f, len=4
5,487,603 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,943 UART: [state] LifecycleState = Unprovisioned
86,598 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
894,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,196 UART: [kat] ++
898,348 UART: [kat] sha1
902,708 UART: [kat] SHA2-256
904,648 UART: [kat] SHA2-384
907,437 UART: [kat] SHA2-512-ACC
909,338 UART: [kat] ECC-384
919,095 UART: [kat] HMAC-384Kdf
923,817 UART: [kat] LMS
1,172,145 UART: [kat] --
1,173,006 UART: [cold-reset] ++
1,173,470 UART: [fht] FHT @ 0x50003400
1,176,221 UART: [idev] ++
1,176,389 UART: [idev] CDI.KEYID = 6
1,176,749 UART: [idev] SUBJECT.KEYID = 7
1,177,173 UART: [idev] UDS.KEYID = 0
1,177,518 ready_for_fw is high
1,177,518 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,184,887 UART: [idev] Erasing UDS.KEYID = 0
1,201,954 UART: [idev] Sha1 KeyId Algorithm
1,210,388 UART: [idev] --
1,211,356 UART: [ldev] ++
1,211,524 UART: [ldev] CDI.KEYID = 6
1,211,887 UART: [ldev] SUBJECT.KEYID = 5
1,212,313 UART: [ldev] AUTHORITY.KEYID = 7
1,212,776 UART: [ldev] FE.KEYID = 1
1,217,836 UART: [ldev] Erasing FE.KEYID = 1
1,243,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,948 UART: [ldev] --
1,282,415 UART: [fwproc] Wait for Commands...
1,283,117 UART: [fwproc] Recv command 0x46574c44
1,283,845 UART: [fwproc] Recv'd Img size: 78456 bytes
2,171,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,453 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,416 >>> mbox cmd response: success
2,309,416 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,310,518 UART: [afmc] ++
2,310,686 UART: [afmc] CDI.KEYID = 6
2,311,048 UART: [afmc] SUBJECT.KEYID = 7
2,311,473 UART: [afmc] AUTHORITY.KEYID = 5
2,346,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,563 UART: [afmc] --
2,390,689 UART: [cold-reset] --
2,391,523 UART: [state] Locking Datavault
2,392,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,438 UART: [state] Locking ICCM
2,394,108 UART: [exit] Launching FMC @ 0x40000130
2,399,437 UART:
2,399,453 UART: Running Caliptra FMC ...
2,399,861 UART:
2,400,004 UART: [state] CFI Enabled
2,411,125 UART: [fht] FMC Alias Private Key: 7
2,518,906 UART: [art] Extend RT PCRs Done
2,519,334 UART: [art] Lock RT PCRs Done
2,520,848 UART: [art] Populate DV Done
2,529,231 UART: [fht] FMC Alias Private Key: 7
2,530,301 UART: [art] Derive CDI
2,530,581 UART: [art] Store in in slot 0x4
2,616,610 UART: [art] Derive Key Pair
2,616,970 UART: [art] Store priv key in slot 0x5
2,630,218 UART: [art] Derive Key Pair - Done
2,644,861 UART: [art] Signing Cert with AUTHO
2,645,341 UART: RITY.KEYID = 7
2,660,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,374 UART: [art] PUB.X = 2A7A3A902CE9CA5D21E04D65846E9A70C1E9B5F8440657C54EB79FF803EBA731C6DC5BC676667F78EACBBD6A8CC4C1EA
2,668,160 UART: [art] PUB.Y = 772D5BC145B67DC31926880344924D334BFB523DDCC56883B8FDB588AE5343B8AF52150BF3D1BC7BC16631E8D30FAE62
2,675,109 UART: [art] SIG.R = A56BF6B5DADD63727B894E61D105DA84CA396814E8A51B8C30F7F09AC0DF2A10EEA3FBACDD7641BED808DB8AE676912F
2,681,897 UART: [art] SIG.S = E0F020BC614B780E282FF8F8ECB31B8B7F0DF645A87908B9A8A3229792DF9D3CDD4E84C45C539481AC235DC8CEDE1F7F
2,705,449 UART: mbox::rt_entry...
2,705,821 UART: ____ _ _ _ ____ _____
2,706,605 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,173 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,941 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,709 UART: |_|
2,710,021 UART:
2,816,408 UART: [rt] Runtime listening for mailbox commands...
2,821,376 >>> mbox cmd response data (3272 bytes)
2,821,377 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,463 >>> mbox cmd response data (0 bytes)
2,844,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,844,581 UART:
2,844,597 UART: Running Caliptra ROM ...
2,845,005 UART:
2,845,147 UART: [state] CFI Enabled
2,848,311 UART: [state] LifecycleState = Unprovisioned
2,848,966 UART: [state] DebugLocked = No
2,849,532 UART: [state] WD Timer not started. Device not locked for debugging
2,850,814 UART: [kat] SHA2-256
3,656,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,660,589 UART: [kat] ++
3,660,741 UART: [kat] sha1
3,665,009 UART: [kat] SHA2-256
3,666,949 UART: [kat] SHA2-384
3,669,790 UART: [kat] SHA2-512-ACC
3,671,690 UART: [kat] ECC-384
3,681,321 UART: [kat] HMAC-384Kdf
3,686,125 UART: [kat] LMS
3,934,453 UART: [kat] --
3,935,293 UART: [update-reset] ++
5,246,603 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,247,744 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,397,196 >>> mbox cmd response: success
5,397,313 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,327 UART: [update-reset Success] --
5,406,440 UART: [state] Locking Datavault
5,407,284 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,888 UART: [state] Locking ICCM
5,408,432 UART: [exit] Launching FMC @ 0x40000130
5,413,761 UART:
5,413,777 UART: Running Caliptra FMC ...
5,414,185 UART:
5,414,328 UART: [state] CFI Enabled
5,504,155 UART: [art] Extend RT PCRs Done
5,504,583 UART: [art] Lock RT PCRs Done
5,505,698 UART: [art] Populate DV Done
5,514,081 UART: [fht] FMC Alias Private Key: 7
5,515,175 UART: [art] Derive CDI
5,515,455 UART: [art] Store in in slot 0x4
5,601,316 UART: [art] Derive Key Pair
5,601,676 UART: [art] Store priv key in slot 0x5
5,614,950 UART: [art] Derive Key Pair - Done
5,629,778 UART: [art] Signing Cert with AUTHO
5,630,258 UART: RITY.KEYID = 7
5,645,534 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,299 UART: [art] PUB.X = 9C6767A855CB2B40FD085A39CBA17FE78FC0A3C62B3BC54726E36C69962DDEBABAA94DFF1AF57713CAAC5DBAC0981960
5,653,090 UART: [art] PUB.Y = B90544F619AC45504C873092F00F40276523794917CCA5F36A1C13CC9E721A8547F9AB97A1C78FA4CCBEA0CE50B1A66D
5,660,040 UART: [art] SIG.R = 8314E2CEAB5108580ECCCF390A6F22B7DE05DC96AC4DE7C0CDDEA84A719D039898756B60AB06E50F1CDE6255131B45FF
5,666,807 UART: [art] SIG.S = 7ECE155E08BC6EE539A29B49225AEEC08EF5C72C447094461961D69BC03D0C2A8FDFD1002AF60B03E75A88236F931029
5,690,196 UART: Caliptra RT
5,690,541 UART: [state] CFI Enabled
5,753,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,754,900 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,785,444 UART: [rt]cmd =0x494e464f, len=4
5,789,257 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,178 ready_for_fw is high
1,061,178 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,162,745 >>> mbox cmd response: success
2,162,745 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,985 UART:
2,226,001 UART: Running Caliptra FMC ...
2,226,409 UART:
2,226,552 UART: [state] CFI Enabled
2,237,245 UART: [fht] FMC Alias Private Key: 7
2,345,768 UART: [art] Extend RT PCRs Done
2,346,196 UART: [art] Lock RT PCRs Done
2,348,016 UART: [art] Populate DV Done
2,356,087 UART: [fht] FMC Alias Private Key: 7
2,357,081 UART: [art] Derive CDI
2,357,361 UART: [art] Store in in slot 0x4
2,443,236 UART: [art] Derive Key Pair
2,443,596 UART: [art] Store priv key in slot 0x5
2,456,276 UART: [art] Derive Key Pair - Done
2,471,344 UART: [art] Signing Cert with AUTHO
2,471,824 UART: RITY.KEYID = 7
2,486,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,487,651 UART: [art] PUB.X = A14DE0020050C31C98099C614B57B4DD37A9887C015D88D580B142D028A092EC815AFF344A57EB0D13D4D986278CDB7F
2,494,389 UART: [art] PUB.Y = D31240B915544907AEEB85D7CB138EA1C5EF3D36582BE5E2E905B403E560DE877ACCFBCF66ADBF57BEC678CD44697166
2,501,346 UART: [art] SIG.R = 71EF275A68AF875ACE89E7CE0FBC1A3E6A003F91F95D043CC5F7AEE533D62D345FEB3B5664E32DBA143398A2A5D3994A
2,508,106 UART: [art] SIG.S = 95626BDDF43CA9EEF6A269B0269F8BF8ED4D85AC9B53EF4B4E439D45673803FCB8098BFA14BE67584D2BA35065732623
2,531,891 UART: mbox::rt_entry...
2,532,263 UART: ____ _ _ _ ____ _____
2,533,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,533,847 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,534,615 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,535,383 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,151 UART: |_|
2,536,463 UART:
2,643,761 UART: [rt] Runtime listening for mailbox commands...
2,648,729 >>> mbox cmd response data (3272 bytes)
2,648,730 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,671,816 >>> mbox cmd response data (0 bytes)
2,671,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,105,270 >>> mbox cmd response: success
5,118,836 UART:
5,118,852 UART: Running Caliptra FMC ...
5,119,260 UART:
5,119,403 UART: [state] CFI Enabled
5,208,958 UART: [art] Extend RT PCRs Done
5,209,386 UART: [art] Lock RT PCRs Done
5,210,643 UART: [art] Populate DV Done
5,218,930 UART: [fht] FMC Alias Private Key: 7
5,219,996 UART: [art] Derive CDI
5,220,276 UART: [art] Store in in slot 0x4
5,306,279 UART: [art] Derive Key Pair
5,306,639 UART: [art] Store priv key in slot 0x5
5,320,073 UART: [art] Derive Key Pair - Done
5,334,881 UART: [art] Signing Cert with AUTHO
5,335,361 UART: RITY.KEYID = 7
5,350,727 UART: [art] Erasing AUTHORITY.KEYID = 7
5,351,492 UART: [art] PUB.X = 8C5A9B74FC3486BAC0871777CB1837F06D388FC7C284C130689301EE76A9249D861C3BACC63AFDBA2B770F706DE1D2FA
5,358,268 UART: [art] PUB.Y = CF353431D477582C5690023F028FECE03340A2835E55B53397D1F75E5B08D0AFDBCF1F4D285317176CD2E6D4C84767EF
5,365,211 UART: [art] SIG.R = F9E4837871AD48E6351C344196E0C0AC89DBDAF65F92A2D715EDE7E11422BB5ED015AA7C518434C217BA1042F500856F
5,371,965 UART: [art] SIG.S = 6FC560A44E037CCC16F3483C5D8B58CF8DED700D947BDA58E98F8CE8A2E69524AE95F6E4010872E592FE78EF9FEAB300
5,395,510 UART: Caliptra RT
5,395,855 UART: [state] CFI Enabled
5,458,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,460,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,490,516 UART: [rt]cmd =0x494e464f, len=4
5,494,103 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,644 UART: [kat] HMAC-384Kdf
920,268 UART: [kat] LMS
1,168,580 UART: [kat] --
1,169,273 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 ready_for_fw is high
1,173,933 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,433 UART: [idev] --
1,208,580 UART: [ldev] ++
1,208,748 UART: [ldev] CDI.KEYID = 6
1,209,112 UART: [ldev] SUBJECT.KEYID = 5
1,209,539 UART: [ldev] AUTHORITY.KEYID = 7
1,210,002 UART: [ldev] FE.KEYID = 1
1,215,240 UART: [ldev] Erasing FE.KEYID = 1
1,241,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,506 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,037 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,987 >>> mbox cmd response: success
2,309,987 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,112 UART: [afmc] ++
2,311,280 UART: [afmc] CDI.KEYID = 6
2,311,643 UART: [afmc] SUBJECT.KEYID = 7
2,312,069 UART: [afmc] AUTHORITY.KEYID = 5
2,348,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,269 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,881 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,600 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,325 UART: [afmc] --
2,391,451 UART: [cold-reset] --
2,392,429 UART: [state] Locking Datavault
2,393,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,138 UART: [state] Locking ICCM
2,394,694 UART: [exit] Launching FMC @ 0x40000130
2,400,023 UART:
2,400,039 UART: Running Caliptra FMC ...
2,400,447 UART:
2,400,501 UART: [state] CFI Enabled
2,410,780 UART: [fht] FMC Alias Private Key: 7
2,519,197 UART: [art] Extend RT PCRs Done
2,519,625 UART: [art] Lock RT PCRs Done
2,521,009 UART: [art] Populate DV Done
2,529,028 UART: [fht] FMC Alias Private Key: 7
2,529,996 UART: [art] Derive CDI
2,530,276 UART: [art] Store in in slot 0x4
2,616,059 UART: [art] Derive Key Pair
2,616,419 UART: [art] Store priv key in slot 0x5
2,629,607 UART: [art] Derive Key Pair - Done
2,644,397 UART: [art] Signing Cert with AUTHO
2,644,877 UART: RITY.KEYID = 7
2,660,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,002 UART: [art] PUB.X = D4B463CA12C6C50A9F22D63E89BCA45E4E919DA949FEEA6BC25434736B4CF4BAC5135065CCD453C7A14D1AB79269CD64
2,667,785 UART: [art] PUB.Y = 672E9951AF0653C38D3A7A1A74DA37E3887F812143EBFB1DF2BE1BC9FCBE50610EFEBC61BE999EAC61CD211AB2FA0A8E
2,674,752 UART: [art] SIG.R = 3FCB35FF0EF5C970BD9B33F2038C88EA15FDE0B9F1CF14BAB0D290C0C851E6178E21F83752F2E6EBC77EF9FEDAAF519E
2,681,544 UART: [art] SIG.S = 4C1ADABDE523CA2F04B923283A410511D1BADD9A997045A2FC9023DA2A0BE1252DDACA280CAFC566694B5E83DC0B55CA
2,705,574 UART: mbox::rt_entry...
2,705,946 UART: ____ _ _ _ ____ _____
2,706,730 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,530 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,298 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,066 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,834 UART: |_|
2,710,146 UART:
2,817,764 UART: [rt] Runtime listening for mailbox commands...
2,822,732 >>> mbox cmd response data (3272 bytes)
2,822,733 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,819 >>> mbox cmd response data (0 bytes)
2,845,820 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,845,937 UART:
2,845,953 UART: Running Caliptra ROM ...
2,846,361 UART:
2,846,416 UART: [state] CFI Enabled
2,848,862 UART: [state] LifecycleState = Unprovisioned
2,849,517 UART: [state] DebugLocked = No
2,850,219 UART: [state] WD Timer not started. Device not locked for debugging
2,851,495 UART: [kat] SHA2-256
3,655,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,174 UART: [kat] ++
3,659,326 UART: [kat] sha1
3,663,424 UART: [kat] SHA2-256
3,665,364 UART: [kat] SHA2-384
3,668,269 UART: [kat] SHA2-512-ACC
3,670,169 UART: [kat] ECC-384
3,679,694 UART: [kat] HMAC-384Kdf
3,684,112 UART: [kat] LMS
3,932,424 UART: [kat] --
3,933,462 UART: [update-reset] ++
5,243,745 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,958 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,394,410 >>> mbox cmd response: success
5,394,763 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,777 UART: [update-reset Success] --
5,403,932 UART: [state] Locking Datavault
5,404,724 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,328 UART: [state] Locking ICCM
5,405,780 UART: [exit] Launching FMC @ 0x40000130
5,411,109 UART:
5,411,125 UART: Running Caliptra FMC ...
5,411,533 UART:
5,411,587 UART: [state] CFI Enabled
5,500,352 UART: [art] Extend RT PCRs Done
5,500,780 UART: [art] Lock RT PCRs Done
5,502,153 UART: [art] Populate DV Done
5,510,326 UART: [fht] FMC Alias Private Key: 7
5,511,364 UART: [art] Derive CDI
5,511,644 UART: [art] Store in in slot 0x4
5,597,483 UART: [art] Derive Key Pair
5,597,843 UART: [art] Store priv key in slot 0x5
5,610,589 UART: [art] Derive Key Pair - Done
5,625,324 UART: [art] Signing Cert with AUTHO
5,625,804 UART: RITY.KEYID = 7
5,640,880 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,645 UART: [art] PUB.X = EE9D8D39392819D7052A984C4117AC72EC20F15D8C1007F75E55FC0B15E14C4A6320D560F1DD1177C363407CD7F18325
5,648,404 UART: [art] PUB.Y = 7CEB39D513CF95AD8C0ED92112D900B4AF028DBA3C3A8AD216BF860D53C823D0EA9A5BB6F5965FFC840240BC4448A7E3
5,655,338 UART: [art] SIG.R = E85F03E1622E6497606AF090721F7C4C4586AC7A1A4CCC24C5694D7DB0FB64E53F00088EFD6B2C602F8D53512E4FEFA2
5,662,090 UART: [art] SIG.S = 0602148C06011DC6C99CF6021382A3C414A1A9CF9C92163E2F098ABDE8355A68749570B5BE70BE9DF72FE2E2C11E2EC1
5,686,029 UART: Caliptra RT
5,686,282 UART: [state] CFI Enabled
5,748,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,750,005 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,780,473 UART: [rt]cmd =0x494e464f, len=4
5,784,190 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,374 ready_for_fw is high
1,056,374 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,127 >>> mbox cmd response: success
2,158,127 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,541 UART:
2,220,557 UART: Running Caliptra FMC ...
2,220,965 UART:
2,221,019 UART: [state] CFI Enabled
2,231,474 UART: [fht] FMC Alias Private Key: 7
2,339,811 UART: [art] Extend RT PCRs Done
2,340,239 UART: [art] Lock RT PCRs Done
2,341,739 UART: [art] Populate DV Done
2,350,108 UART: [fht] FMC Alias Private Key: 7
2,351,186 UART: [art] Derive CDI
2,351,466 UART: [art] Store in in slot 0x4
2,436,807 UART: [art] Derive Key Pair
2,437,167 UART: [art] Store priv key in slot 0x5
2,450,245 UART: [art] Derive Key Pair - Done
2,465,407 UART: [art] Signing Cert with AUTHO
2,465,887 UART: RITY.KEYID = 7
2,481,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,968 UART: [art] PUB.X = 6F807FF1F6FFCF8971129AAC8B5663D771CE38AEB05DEC35FA20BBE4ED38E7B9BC34EC4FCAB93D5F17A2ADB5D51EB9F4
2,488,772 UART: [art] PUB.Y = FA47FFEB190E844D688D4E7454B75F93BD9C904A5AB6520F152ADF3AEBE90722113F667491B9010217C5721C73C9C321
2,495,709 UART: [art] SIG.R = 883865585A1B0BDC6D7D4A91578B8E9DF3927CB3B626926914826C2F0C1A1D18F5A9B153EB528AF9570A4C5A4EBC3645
2,502,474 UART: [art] SIG.S = EF006299219934C42533B8824473BAD3DD9C14A1B27A49A3B5621203A1404D389BAD02602412E93F341BF803B158DECB
2,526,152 UART: mbox::rt_entry...
2,526,524 UART: ____ _ _ _ ____ _____
2,527,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,412 UART: |_|
2,530,724 UART:
2,637,633 UART: [rt] Runtime listening for mailbox commands...
2,642,601 >>> mbox cmd response data (3272 bytes)
2,642,602 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,688 >>> mbox cmd response data (0 bytes)
2,665,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,095,312 >>> mbox cmd response: success
5,108,656 UART:
5,108,672 UART: Running Caliptra FMC ...
5,109,080 UART:
5,109,134 UART: [state] CFI Enabled
5,198,675 UART: [art] Extend RT PCRs Done
5,199,103 UART: [art] Lock RT PCRs Done
5,200,238 UART: [art] Populate DV Done
5,208,371 UART: [fht] FMC Alias Private Key: 7
5,209,369 UART: [art] Derive CDI
5,209,649 UART: [art] Store in in slot 0x4
5,294,960 UART: [art] Derive Key Pair
5,295,320 UART: [art] Store priv key in slot 0x5
5,308,656 UART: [art] Derive Key Pair - Done
5,323,453 UART: [art] Signing Cert with AUTHO
5,323,933 UART: RITY.KEYID = 7
5,339,115 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,880 UART: [art] PUB.X = 83A3D4920BDEB7684AF631225AC4003B56044D34662D2B3F9D5662F0628A96D935538C71560B4E87ADCAF94DE8767A86
5,346,617 UART: [art] PUB.Y = AB1FC9FC2386AB3BE275416C163DA78BFC2DA6483540601EB8BB9FD1CC0D562690836277A5453CE7315E365C225CC56A
5,353,572 UART: [art] SIG.R = DC597550D5D3609C7525BA2CB670A3CC81C6AF4DA6A75009F7E9517BD80BF359C57CD177D5BBD2EB305A8B638E84F757
5,360,348 UART: [art] SIG.S = 1EF0C5C4F7D26FB3FCCB841F5350FE926327263AA2BEF01AC08B2786EBFD88F90178DCF5B91A46F9809B695B596B1ACC
5,384,338 UART: Caliptra RT
5,384,591 UART: [state] CFI Enabled
5,447,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,449,498 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,480,348 UART: [rt]cmd =0x494e464f, len=4
5,484,235 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,573 UART: [kat] SHA2-512-ACC
906,474 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,790 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 ready_for_fw is high
1,174,096 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,758 UART: [idev] Erasing UDS.KEYID = 0
1,198,504 UART: [idev] Sha1 KeyId Algorithm
1,207,330 UART: [idev] --
1,208,489 UART: [ldev] ++
1,208,657 UART: [ldev] CDI.KEYID = 6
1,209,021 UART: [ldev] SUBJECT.KEYID = 5
1,209,448 UART: [ldev] AUTHORITY.KEYID = 7
1,209,911 UART: [ldev] FE.KEYID = 1
1,215,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,457 UART: [fwproc] Wait for Commands...
1,282,226 UART: [fwproc] Recv command 0x46574c44
1,282,959 UART: [fwproc] Recv'd Img size: 78456 bytes
2,169,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,836 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,307,806 >>> mbox cmd response: success
2,307,806 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,308,995 UART: [afmc] ++
2,309,163 UART: [afmc] CDI.KEYID = 6
2,309,526 UART: [afmc] SUBJECT.KEYID = 7
2,309,952 UART: [afmc] AUTHORITY.KEYID = 5
2,345,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,950 UART: [afmc] --
2,388,852 UART: [cold-reset] --
2,389,726 UART: [state] Locking Datavault
2,391,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,613 UART: [state] Locking ICCM
2,392,143 UART: [exit] Launching FMC @ 0x40000130
2,397,472 UART:
2,397,488 UART: Running Caliptra FMC ...
2,397,896 UART:
2,398,039 UART: [state] CFI Enabled
2,409,130 UART: [fht] FMC Alias Private Key: 7
2,516,953 UART: [art] Extend RT PCRs Done
2,517,381 UART: [art] Lock RT PCRs Done
2,518,859 UART: [art] Populate DV Done
2,527,020 UART: [fht] FMC Alias Private Key: 7
2,528,098 UART: [art] Derive CDI
2,528,378 UART: [art] Store in in slot 0x4
2,613,815 UART: [art] Derive Key Pair
2,614,175 UART: [art] Store priv key in slot 0x5
2,626,691 UART: [art] Derive Key Pair - Done
2,641,880 UART: [art] Signing Cert with AUTHO
2,642,360 UART: RITY.KEYID = 7
2,657,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,357 UART: [art] PUB.X = AB7CED27AF8D998A923F397B059BB07FDE5ADA93EC163B3E2EA667F733F8240E54649A9B29C96931ACD3C802A29AC6DB
2,665,136 UART: [art] PUB.Y = 8F8AABCB47DF18DC252C0C61684901501089D716BEC8C30C08BFC78339E6F65B24E0B2D867BD52B195D06684075919B2
2,672,073 UART: [art] SIG.R = 71E96E5D8BD1AB62B3B88C4A6BCF86C527C795C839F1E81EDAC022029B39721EA38E79388481BD69C45641BF97D17C71
2,678,846 UART: [art] SIG.S = DF4F553EF3639A245C1A3EBA2132E358A8CBD8AE4EB9058F2AC20DF076E69FABE2921F7731571888E435C2CBB8B2568E
2,702,591 UART: mbox::rt_entry...
2,702,963 UART: ____ _ _ _ ____ _____
2,703,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,083 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,851 UART: |_|
2,707,163 UART:
2,813,507 UART: [rt] Runtime listening for mailbox commands...
2,818,475 >>> mbox cmd response data (3272 bytes)
2,818,476 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,841,562 >>> mbox cmd response data (0 bytes)
2,841,563 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,841,680 UART:
2,841,696 UART: Running Caliptra ROM ...
2,842,104 UART:
2,842,246 UART: [state] CFI Enabled
2,845,210 UART: [state] LifecycleState = Unprovisioned
2,845,865 UART: [state] DebugLocked = No
2,846,347 UART: [state] WD Timer not started. Device not locked for debugging
2,847,583 UART: [kat] SHA2-256
3,651,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,262 UART: [kat] ++
3,655,414 UART: [kat] sha1
3,659,768 UART: [kat] SHA2-256
3,661,708 UART: [kat] SHA2-384
3,664,321 UART: [kat] SHA2-512-ACC
3,666,221 UART: [kat] ECC-384
3,676,190 UART: [kat] HMAC-384Kdf
3,680,704 UART: [kat] LMS
3,929,016 UART: [kat] --
3,930,008 UART: [update-reset] ++
5,239,021 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,240,190 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,389,642 >>> mbox cmd response: success
5,389,969 UART: [update-reset] Copying MAN_2 To MAN_1
5,397,983 UART: [update-reset Success] --
5,398,982 UART: [state] Locking Datavault
5,399,756 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,360 UART: [state] Locking ICCM
5,400,854 UART: [exit] Launching FMC @ 0x40000130
5,406,183 UART:
5,406,199 UART: Running Caliptra FMC ...
5,406,607 UART:
5,406,750 UART: [state] CFI Enabled
5,496,007 UART: [art] Extend RT PCRs Done
5,496,435 UART: [art] Lock RT PCRs Done
5,497,566 UART: [art] Populate DV Done
5,505,643 UART: [fht] FMC Alias Private Key: 7
5,506,691 UART: [art] Derive CDI
5,506,971 UART: [art] Store in in slot 0x4
5,592,396 UART: [art] Derive Key Pair
5,592,756 UART: [art] Store priv key in slot 0x5
5,605,864 UART: [art] Derive Key Pair - Done
5,620,551 UART: [art] Signing Cert with AUTHO
5,621,031 UART: RITY.KEYID = 7
5,636,413 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,178 UART: [art] PUB.X = 6169A41B161184959DBDD0686E20CAA8285964E1F3B2659F318AF76458747559AB91BC61DF1349FB08C99C061A7DD634
5,643,938 UART: [art] PUB.Y = D7B9AAA72F3F50E778BCDC2CD2DE081EF1A3ED4E47B5C561E44F80451EA63DE8750BF7CC208ACC0BD006479556F06100
5,650,872 UART: [art] SIG.R = 5586AB2A5A3CAA146493C99758E854D4E7287AE9C26C21C6400706C815FA52EF58181A55A075F942B6478634C7615EFE
5,657,632 UART: [art] SIG.S = B5FC6E06F0B3D875023280678BF122D78002612694DA07D3AF3C7207010B723C5679A2734947FE4D16F9166F56AABFF5
5,681,790 UART: Caliptra RT
5,682,135 UART: [state] CFI Enabled
5,746,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,747,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,778,382 UART: [rt]cmd =0x494e464f, len=4
5,782,247 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,257 ready_for_fw is high
1,055,257 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,158,120 >>> mbox cmd response: success
2,158,120 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,219,890 UART:
2,219,906 UART: Running Caliptra FMC ...
2,220,314 UART:
2,220,457 UART: [state] CFI Enabled
2,231,196 UART: [fht] FMC Alias Private Key: 7
2,339,053 UART: [art] Extend RT PCRs Done
2,339,481 UART: [art] Lock RT PCRs Done
2,341,077 UART: [art] Populate DV Done
2,349,504 UART: [fht] FMC Alias Private Key: 7
2,350,652 UART: [art] Derive CDI
2,350,932 UART: [art] Store in in slot 0x4
2,436,867 UART: [art] Derive Key Pair
2,437,227 UART: [art] Store priv key in slot 0x5
2,450,659 UART: [art] Derive Key Pair - Done
2,465,243 UART: [art] Signing Cert with AUTHO
2,465,723 UART: RITY.KEYID = 7
2,480,679 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,444 UART: [art] PUB.X = B2A712C5C37C0118B256782636BFAA15C6717BAC63B8D214BE3764520DC5E326ED7CF3F74A909F7588E29E9E2428B80F
2,488,209 UART: [art] PUB.Y = 9DFEC19D145CB148F0AAAA291303895C37F3AEB4A7C6FA96027C8CE4E33C4A34B153B5799A9F73C205D73A86A4C40B05
2,495,156 UART: [art] SIG.R = CE9BDF8BDE7AA1A7A459655D2E238AA8CBC1B7D679C528EF88554B1928080642103BCAAE61840E673DB6538ADE563C56
2,501,929 UART: [art] SIG.S = 12EEA5967A16F9EC6C2D3D393C6EF0EE31C2B363115C2465C2598BA8EDCC5C360424C8BB972C05C625DB20805AB947F9
2,525,530 UART: mbox::rt_entry...
2,525,902 UART: ____ _ _ _ ____ _____
2,526,686 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,486 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,254 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,022 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,790 UART: |_|
2,530,102 UART:
2,635,730 UART: [rt] Runtime listening for mailbox commands...
2,640,698 >>> mbox cmd response data (3272 bytes)
2,640,699 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,785 >>> mbox cmd response data (0 bytes)
2,663,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,093,362 >>> mbox cmd response: success
5,106,962 UART:
5,106,978 UART: Running Caliptra FMC ...
5,107,386 UART:
5,107,529 UART: [state] CFI Enabled
5,196,888 UART: [art] Extend RT PCRs Done
5,197,316 UART: [art] Lock RT PCRs Done
5,198,653 UART: [art] Populate DV Done
5,207,086 UART: [fht] FMC Alias Private Key: 7
5,208,230 UART: [art] Derive CDI
5,208,510 UART: [art] Store in in slot 0x4
5,294,093 UART: [art] Derive Key Pair
5,294,453 UART: [art] Store priv key in slot 0x5
5,308,067 UART: [art] Derive Key Pair - Done
5,323,157 UART: [art] Signing Cert with AUTHO
5,323,637 UART: RITY.KEYID = 7
5,338,555 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,320 UART: [art] PUB.X = 16DEB2DC6E3ECDFFB259EAD2F2A6ECA546466DB62B146F75D9CDE61E8636DBDF6A27ECFA55F02AB380BDEE78F2AE745B
5,346,126 UART: [art] PUB.Y = 3C31A7A57FCABC862AC8104E88F45CCA1E8C848646FCAEFAA03C6F4F4971DF75F6C3B73D3644D0DC478D2A826E4C3525
5,353,094 UART: [art] SIG.R = 11135FE003D920A6F3FAB517765E5A348B1ADEFA81725557613493A6A4AB4EC11C7BA0F80ED0CAE0BE0DD0BB8D891E82
5,359,871 UART: [art] SIG.S = 95B671477F19E3F6A4D9EF54E1925FF964E0C82657EDDFD33DB2F9FD20919D65BF8081869DBF804CCECCECF805F35A2D
5,383,625 UART: Caliptra RT
5,383,970 UART: [state] CFI Enabled
5,447,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,448,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,479,039 UART: [rt]cmd =0x494e464f, len=4
5,482,696 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,953 UART:
192,311 UART: Running Caliptra ROM ...
193,421 UART:
193,566 UART: [state] CFI Enabled
264,079 UART: [state] LifecycleState = Unprovisioned
266,070 UART: [state] DebugLocked = No
267,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,531 UART: [kat] SHA2-256
442,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,707 UART: [kat] ++
453,233 UART: [kat] sha1
464,172 UART: [kat] SHA2-256
466,870 UART: [kat] SHA2-384
473,509 UART: [kat] SHA2-512-ACC
475,881 UART: [kat] ECC-384
2,778,914 UART: [kat] HMAC-384Kdf
2,791,082 UART: [kat] LMS
3,981,390 UART: [kat] --
3,984,168 UART: [cold-reset] ++
3,985,754 UART: [fht] Storing FHT @ 0x50003400
3,997,021 UART: [idev] ++
3,997,590 UART: [idev] CDI.KEYID = 6
3,998,551 UART: [idev] SUBJECT.KEYID = 7
3,999,846 UART: [idev] UDS.KEYID = 0
4,000,850 ready_for_fw is high
4,001,063 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,100,002 UART: [idev] Erasing UDS.KEYID = 0
7,340,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,331 UART: [idev] --
7,366,164 UART: [ldev] ++
7,366,733 UART: [ldev] CDI.KEYID = 6
7,367,703 UART: [ldev] SUBJECT.KEYID = 5
7,368,912 UART: [ldev] AUTHORITY.KEYID = 7
7,370,192 UART: [ldev] FE.KEYID = 1
7,416,320 UART: [ldev] Erasing FE.KEYID = 1
10,750,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,776 UART: [ldev] --
13,134,309 UART: [fwproc] Waiting for Commands...
13,137,425 UART: [fwproc] Received command 0x46574c44
13,139,607 UART: [fwproc] Received Image of size 78492 bytes
16,748,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,819,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,888,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,080,821 >>> mbox cmd response: success
17,081,288 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,084,526 UART: [afmc] ++
17,085,134 UART: [afmc] CDI.KEYID = 6
17,086,050 UART: [afmc] SUBJECT.KEYID = 7
17,087,270 UART: [afmc] AUTHORITY.KEYID = 5
20,446,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,746,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,749,027 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,763,444 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,778,259 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,792,716 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,814,879 UART: [afmc] --
22,819,122 UART: [cold-reset] --
22,823,415 UART: [state] Locking Datavault
22,828,176 UART: [state] Locking PCR0, PCR1 and PCR31
22,829,932 UART: [state] Locking ICCM
22,831,974 UART: [exit] Launching FMC @ 0x40000130
22,840,371 UART:
22,840,627 UART: Running Caliptra FMC ...
22,841,733 UART:
22,841,894 UART: [state] CFI Enabled
22,905,303 UART: [fht] FMC Alias Private Key: 7
25,242,750 UART: [art] Extend RT PCRs Done
25,243,982 UART: [art] Lock RT PCRs Done
25,245,903 UART: [art] Populate DV Done
25,251,531 UART: [fht] FMC Alias Private Key: 7
25,253,218 UART: [art] Derive CDI
25,253,959 UART: [art] Store in in slot 0x4
25,314,001 UART: [art] Derive Key Pair
25,315,004 UART: [art] Store priv key in slot 0x5
28,608,465 UART: [art] Derive Key Pair - Done
28,621,831 UART: [art] Signing Cert with AUTHO
28,623,152 UART: RITY.KEYID = 7
30,909,769 UART: [art] Erasing AUTHORITY.KEYID = 7
30,911,300 UART: [art] PUB.X = AB08081FEAE29770D7EE160F55C4404C5AA000003422F07544CB096562093C1197ECF586150CE6968526FDD1C6A020F1
30,918,435 UART: [art] PUB.Y = 51ACD4EB466FFF538777E5F2750637064021279B5AA3C6C90DB39B8C14AC362DC885CABCF4C57CA06B85559EAE9E0738
30,925,715 UART: [art] SIG.R = A49E81F5FF8D9C6552B886A362E1D1C5EEC4A5DB2D6103634888BA2C91746FC750EC782009A6F9F3384AA0D459647BA0
30,933,138 UART: [art] SIG.S = 509FCED866595752A7BD87AF0C75B9AE35AD9F6C4448D8966F57C794BD6284F1512BD4ACE7AE185A2090BDA2489FF3DC
32,237,847 UART: mbox::rt_entry...
32,238,791 UART: ____ _ _ _ ____ _____
32,240,773 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,242,778 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,244,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,246,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,248,503 UART: |_|
32,249,305 UART:
32,363,015 UART: [rt] Runtime listening for mailbox commands...
32,368,870 >>> mbox cmd response data (3272 bytes)
32,384,766 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,418,177 >>> mbox cmd response data (0 bytes)
34,477,576 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,621,536 UART:
34,621,925 UART: Running Caliptra ROM ...
34,622,978 UART:
34,623,131 UART: [state] CFI Enabled
34,686,060 UART: [state] LifecycleState = Unprovisioned
34,687,956 UART: [state] DebugLocked = No
34,689,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,694,034 UART: [kat] SHA2-256
34,863,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,874,224 UART: [kat] ++
34,874,686 UART: [kat] sha1
34,886,164 UART: [kat] SHA2-256
34,888,857 UART: [kat] SHA2-384
34,893,927 UART: [kat] SHA2-512-ACC
34,896,276 UART: [kat] ECC-384
37,190,689 UART: [kat] HMAC-384Kdf
37,222,740 UART: [kat] LMS
38,413,121 UART: [kat] --
38,417,449 UART: [update-reset] ++
42,552,087 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,555,540 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,936,511 >>> mbox cmd response: success
42,941,072 UART: [update-reset] Copying MAN_2 To MAN_1
42,960,667 UART: [update-reset Success] --
42,966,310 UART: [state] Locking Datavault
42,970,707 UART: [state] Locking PCR0, PCR1 and PCR31
42,972,412 UART: [state] Locking ICCM
42,973,651 UART: [exit] Launching FMC @ 0x40000130
42,982,044 UART:
42,982,283 UART: Running Caliptra FMC ...
42,983,382 UART:
42,983,538 UART: [state] CFI Enabled
43,080,963 UART: [art] Extend RT PCRs Done
43,082,183 UART: [art] Lock RT PCRs Done
43,083,597 UART: [art] Populate DV Done
43,089,225 UART: [fht] FMC Alias Private Key: 7
43,090,974 UART: [art] Derive CDI
43,091,775 UART: [art] Store in in slot 0x4
43,149,524 UART: [art] Derive Key Pair
43,150,530 UART: [art] Store priv key in slot 0x5
46,443,601 UART: [art] Derive Key Pair - Done
46,456,612 UART: [art] Signing Cert with AUTHO
46,457,953 UART: RITY.KEYID = 7
48,745,045 UART: [art] Erasing AUTHORITY.KEYID = 7
48,746,557 UART: [art] PUB.X = 47B360B98A51945EA8F8E3502A8875F24D70909CE3B54A2F115A2A5975451645417E1B59ABA4EDE5590888B448A6BA47
48,753,783 UART: [art] PUB.Y = AA7C53FC9136ABE77FA8CF9E45E92EA38F459DA5F16A5F74B5CC0C5DE261D7C78C0D7AE6C9E90A54A579C4F4DD45DA39
48,761,079 UART: [art] SIG.R = C00E8B3A5979AAE581C89529F0AC6F387225A62E29F940D79599E1DAAAE245AE18E83ABC01612EBE4181371F0AA77739
48,768,479 UART: [art] SIG.S = 62D2759BD01BC300005B87A8892A4C977D123966B24B4A7ED52DA50BEDB104726B31D3479D53B4DEB855989E8A39CB1E
50,073,288 UART: Caliptra RT
50,074,006 UART: [state] CFI Enabled
53,778,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,780,271 UART: [rt] RT listening for mailbox commands...
53,811,720 UART: [rt]cmd =0x494e464f, len=4
53,816,051 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,788,190 ready_for_fw is high
3,788,747 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,150,843 >>> mbox cmd response: success
17,151,439 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,843,481 UART:
22,843,873 UART: Running Caliptra FMC ...
22,844,975 UART:
22,845,131 UART: [state] CFI Enabled
22,911,302 UART: [fht] FMC Alias Private Key: 7
25,249,332 UART: [art] Extend RT PCRs Done
25,250,556 UART: [art] Lock RT PCRs Done
25,251,946 UART: [art] Populate DV Done
25,257,372 UART: [fht] FMC Alias Private Key: 7
25,259,075 UART: [art] Derive CDI
25,259,896 UART: [art] Store in in slot 0x4
25,321,052 UART: [art] Derive Key Pair
25,322,106 UART: [art] Store priv key in slot 0x5
28,614,737 UART: [art] Derive Key Pair - Done
28,627,739 UART: [art] Signing Cert with AUTHO
28,629,049 UART: RITY.KEYID = 7
30,916,369 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,880 UART: [art] PUB.X = 8458C7109B5531C72CD236C45EDA927880B3780DCA079A039FCF9CD850AF805E212A9EAE52A107D43CB74B7257942B00
30,925,084 UART: [art] PUB.Y = 6F630AC272EBED573AEE1B99EBAF2579DD4F7C9B8C8E20CCCA5352C1D33490B8D6CAC104D3899E6DF0E9B081EB0AC6C4
30,932,344 UART: [art] SIG.R = 4B4CBCB800225059B12B0072E1C54E96E4022FF0C1C542A119235E1F30BC62448B22B8246739CABA2DF4EA0C46202800
30,939,691 UART: [art] SIG.S = 60C485628C59624083C30693745B82ECB66F6690FBBF9D2BAC76EE53219DB7D41905673A41741775ECD18D8D55E107E7
32,245,340 UART: mbox::rt_entry...
32,246,293 UART: ____ _ _ _ ____ _____
32,248,320 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,250,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,266 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,145 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,013 UART: |_|
32,256,845 UART:
32,369,305 UART: [rt] Runtime listening for mailbox commands...
32,375,173 >>> mbox cmd response data (3272 bytes)
32,390,918 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,424,303 >>> mbox cmd response data (0 bytes)
34,482,599 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,189,893 >>> mbox cmd response: success
43,223,469 UART:
43,223,795 UART: Running Caliptra FMC ...
43,224,916 UART:
43,225,104 UART: [state] CFI Enabled
43,321,121 UART: [art] Extend RT PCRs Done
43,322,321 UART: [art] Lock RT PCRs Done
43,323,485 UART: [art] Populate DV Done
43,328,897 UART: [fht] FMC Alias Private Key: 7
43,330,651 UART: [art] Derive CDI
43,331,387 UART: [art] Store in in slot 0x4
43,390,214 UART: [art] Derive Key Pair
43,391,254 UART: [art] Store priv key in slot 0x5
46,683,899 UART: [art] Derive Key Pair - Done
46,696,949 UART: [art] Signing Cert with AUTHO
46,698,261 UART: RITY.KEYID = 7
48,985,231 UART: [art] Erasing AUTHORITY.KEYID = 7
48,986,752 UART: [art] PUB.X = D2EB7953F389672FA0DC2F90EEF49866C67B01E309CC3163B4AB166A8436A5857B0BC6591A3A83583B5142F0E806E59C
48,993,991 UART: [art] PUB.Y = 1F6A9AC3E60390FBEB6C7518EDCF8ADE022195FB7F591B07C600BB95296833B3EE3F4DF63FC5513C1BA1C2B53B27F3F0
49,001,240 UART: [art] SIG.R = 5540F7115FD05E9D0DAD9A82AE7C9E91652CEF0A1C255284EB8410C508896468C3F5ED5DF95EC01F098BBC4D3557F437
49,008,651 UART: [art] SIG.S = 6FF3EC0E11E3645F98F13B8062DEDFA9EDE9B31E2BF6121303CB49428555C8D42A93266143C9BB4D042E010858010DE0
50,313,453 UART: Caliptra RT
50,314,156 UART: [state] CFI Enabled
53,999,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,000,824 UART: [rt] RT listening for mailbox commands...
54,031,766 UART: [rt]cmd =0x494e464f, len=4
54,036,025 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,577 writing to cptra_bootfsm_go
193,087 UART:
193,495 UART: Running Caliptra ROM ...
194,630 UART:
604,127 UART: [state] CFI Enabled
620,766 UART: [state] LifecycleState = Unprovisioned
622,739 UART: [state] DebugLocked = No
624,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,611 UART: [kat] SHA2-256
800,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,870 UART: [kat] ++
811,340 UART: [kat] sha1
822,231 UART: [kat] SHA2-256
824,946 UART: [kat] SHA2-384
831,139 UART: [kat] SHA2-512-ACC
833,525 UART: [kat] ECC-384
3,115,834 UART: [kat] HMAC-384Kdf
3,127,588 UART: [kat] LMS
4,317,737 UART: [kat] --
4,321,816 UART: [cold-reset] ++
4,324,274 UART: [fht] Storing FHT @ 0x50003400
4,336,107 UART: [idev] ++
4,336,669 UART: [idev] CDI.KEYID = 6
4,337,658 UART: [idev] SUBJECT.KEYID = 7
4,338,830 UART: [idev] UDS.KEYID = 0
4,340,017 ready_for_fw is high
4,340,268 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,441,399 UART: [idev] Erasing UDS.KEYID = 0
7,633,097 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,640 UART: [idev] --
7,658,319 UART: [ldev] ++
7,658,878 UART: [ldev] CDI.KEYID = 6
7,659,817 UART: [ldev] SUBJECT.KEYID = 5
7,661,020 UART: [ldev] AUTHORITY.KEYID = 7
7,662,304 UART: [ldev] FE.KEYID = 1
7,673,299 UART: [ldev] Erasing FE.KEYID = 1
10,963,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,386 UART: [ldev] --
13,321,486 UART: [fwproc] Waiting for Commands...
13,324,501 UART: [fwproc] Received command 0x46574c44
13,326,698 UART: [fwproc] Received Image of size 78492 bytes
16,944,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,021,451 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,090,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 53788
17,282,640 >>> mbox cmd response: success
17,283,172 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,286,121 UART: [afmc] ++
17,286,700 UART: [afmc] CDI.KEYID = 6
17,287,664 UART: [afmc] SUBJECT.KEYID = 7
17,288,874 UART: [afmc] AUTHORITY.KEYID = 5
20,605,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,901,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,903,832 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,918,211 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,933,020 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,947,454 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,969,348 UART: [afmc] --
22,973,644 UART: [cold-reset] --
22,977,288 UART: [state] Locking Datavault
22,982,641 UART: [state] Locking PCR0, PCR1 and PCR31
22,984,394 UART: [state] Locking ICCM
22,986,106 UART: [exit] Launching FMC @ 0x40000130
22,994,507 UART:
22,994,793 UART: Running Caliptra FMC ...
22,995,905 UART:
22,996,061 UART: [state] CFI Enabled
23,003,995 UART: [fht] FMC Alias Private Key: 7
25,335,326 UART: [art] Extend RT PCRs Done
25,336,848 UART: [art] Lock RT PCRs Done
25,338,404 UART: [art] Populate DV Done
25,343,668 UART: [fht] FMC Alias Private Key: 7
25,345,376 UART: [art] Derive CDI
25,346,214 UART: [art] Store in in slot 0x4
25,388,750 UART: [art] Derive Key Pair
25,389,747 UART: [art] Store priv key in slot 0x5
28,631,396 UART: [art] Derive Key Pair - Done
28,644,559 UART: [art] Signing Cert with AUTHO
28,645,853 UART: RITY.KEYID = 7
30,924,966 UART: [art] Erasing AUTHORITY.KEYID = 7
30,926,484 UART: [art] PUB.X = 629A11DC828FAF186420362A772E420E709867CD8AA640641F7D786E038A5F11484DB6ECC9104ABDA96BB2FBCCFCB86C
30,933,705 UART: [art] PUB.Y = 7A87C463ED4A8AAF945F3C6366C8B8138ED9F9DEB936BAF1E97FF81E8132054D0348EEE95B05C9417F1A0E306E1371A5
30,940,961 UART: [art] SIG.R = DFAF7567934953927B980E846DEAB0CDB89CE5DD0AB176D3FE7720D92C0662262C015FA43EFCD19D0B3D773A53CF2D0C
30,948,372 UART: [art] SIG.S = 8683867470EF58BD90D125762C44256DC28F4A3B5CDD54C9C6E3D98CA6E2E05B6D8780971E1BBB815FF72A3FEB9793B4
32,252,801 UART: mbox::rt_entry...
32,253,765 UART: ____ _ _ _ ____ _____
32,255,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,257,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,259,689 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,261,632 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,263,489 UART: |_|
32,264,370 UART:
32,377,770 UART: [rt] Runtime listening for mailbox commands...
32,383,646 >>> mbox cmd response data (3272 bytes)
32,399,684 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,433,389 >>> mbox cmd response data (0 bytes)
34,493,490 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,637,438 UART:
34,637,790 UART: Running Caliptra ROM ...
34,638,948 UART:
34,639,117 UART: [state] CFI Enabled
34,654,570 UART: [state] LifecycleState = Unprovisioned
34,656,462 UART: [state] DebugLocked = No
34,659,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,663,981 UART: [kat] SHA2-256
34,833,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,844,228 UART: [kat] ++
34,844,761 UART: [kat] sha1
34,856,510 UART: [kat] SHA2-256
34,859,191 UART: [kat] SHA2-384
34,863,929 UART: [kat] SHA2-512-ACC
34,866,337 UART: [kat] ECC-384
37,152,631 UART: [kat] HMAC-384Kdf
37,165,371 UART: [kat] LMS
38,355,396 UART: [kat] --
38,358,603 UART: [update-reset] ++
42,489,737 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,493,043 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
42,874,007 >>> mbox cmd response: success
42,878,579 UART: [update-reset] Copying MAN_2 To MAN_1
42,897,692 UART: [update-reset Success] --
42,903,674 UART: [state] Locking Datavault
42,905,632 UART: [state] Locking PCR0, PCR1 and PCR31
42,907,384 UART: [state] Locking ICCM
42,909,016 UART: [exit] Launching FMC @ 0x40000130
42,917,446 UART:
42,917,741 UART: Running Caliptra FMC ...
42,918,866 UART:
42,919,022 UART: [state] CFI Enabled
42,963,362 UART: [art] Extend RT PCRs Done
42,964,506 UART: [art] Lock RT PCRs Done
42,965,683 UART: [art] Populate DV Done
42,971,354 UART: [fht] FMC Alias Private Key: 7
42,973,102 UART: [art] Derive CDI
42,973,914 UART: [art] Store in in slot 0x4
43,016,704 UART: [art] Derive Key Pair
43,017,753 UART: [art] Store priv key in slot 0x5
46,259,885 UART: [art] Derive Key Pair - Done
46,273,099 UART: [art] Signing Cert with AUTHO
46,274,604 UART: RITY.KEYID = 7
48,553,585 UART: [art] Erasing AUTHORITY.KEYID = 7
48,555,097 UART: [art] PUB.X = 88553DB5C37B0C30A55FD3408DD576C58D268B036237318CF61477EA719B46577391760BBC112F64C986E6B6F04EBB62
48,562,360 UART: [art] PUB.Y = D7C92F5C3F5DA4FBB3EBC0939842C08DC53ECC775E56C50078115926992B1A91F704D178C358FB51CEE3FFD78B31F25A
48,569,569 UART: [art] SIG.R = 7CDC91333439DF79D44C6C97297F36B6F3ADD25376C5B7CF4F042CA73823F5F38759322142332B01A8FD3DE102F6C807
48,576,986 UART: [art] SIG.S = 43AE6E64482A3F1919BA389FFFB04321654891B6194FA18C2E942777881E02D5F7B3BFDAB0C8CF366713263ADDE0699B
49,881,926 UART: Caliptra RT
49,882,661 UART: [state] CFI Enabled
53,467,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,469,374 UART: [rt] RT listening for mailbox commands...
53,500,443 UART: [rt]cmd =0x494e464f, len=4
53,504,755 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
4,126,497 ready_for_fw is high
4,127,111 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
17,348,867 >>> mbox cmd response: success
17,349,530 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,992,431 UART:
22,992,822 UART: Running Caliptra FMC ...
22,993,918 UART:
22,994,064 UART: [state] CFI Enabled
23,002,237 UART: [fht] FMC Alias Private Key: 7
25,332,899 UART: [art] Extend RT PCRs Done
25,334,143 UART: [art] Lock RT PCRs Done
25,335,777 UART: [art] Populate DV Done
25,341,246 UART: [fht] FMC Alias Private Key: 7
25,342,688 UART: [art] Derive CDI
25,343,610 UART: [art] Store in in slot 0x4
25,386,266 UART: [art] Derive Key Pair
25,387,305 UART: [art] Store priv key in slot 0x5
28,629,610 UART: [art] Derive Key Pair - Done
28,642,721 UART: [art] Signing Cert with AUTHO
28,644,029 UART: RITY.KEYID = 7
30,923,657 UART: [art] Erasing AUTHORITY.KEYID = 7
30,925,167 UART: [art] PUB.X = 56CCA884222CDDBE42621D1CEA24077392F6534E96DFDE26D9CF69FE93695DB1395BA0842863ED59AD5C22E0651AC706
30,932,433 UART: [art] PUB.Y = B6E2B3D1960FCB8A8BC857DF949E18D5F7A6DBD7DAF61ADF38B000D3DC60875864E94F533178458B19E3C3836A7F1B1F
30,939,644 UART: [art] SIG.R = 106C341B1BD7FE619711CCC388DCB9E6DD339D5D7A293491846C7ADD1A7CA3CB4DB73CE935BACF34D29AAAF7F7222DCC
30,947,082 UART: [art] SIG.S = 6D6363163ED1AC2FE06E08EF3AE24290E10B724BBBDE991161EA9E425650CE1A37B4ABA8A3095AD5C320E28170F64943
32,252,168 UART: mbox::rt_entry...
32,253,395 UART: ____ _ _ _ ____ _____
32,255,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,257,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,259,159 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,261,115 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,263,056 UART: |_|
32,263,868 UART:
32,377,076 UART: [rt] Runtime listening for mailbox commands...
32,382,906 >>> mbox cmd response data (3272 bytes)
32,398,764 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,432,191 >>> mbox cmd response data (0 bytes)
34,490,500 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
43,131,933 >>> mbox cmd response: success
43,166,986 UART:
43,167,315 UART: Running Caliptra FMC ...
43,168,438 UART:
43,168,598 UART: [state] CFI Enabled
43,212,463 UART: [art] Extend RT PCRs Done
43,213,652 UART: [art] Lock RT PCRs Done
43,214,841 UART: [art] Populate DV Done
43,220,626 UART: [fht] FMC Alias Private Key: 7
43,222,163 UART: [art] Derive CDI
43,222,975 UART: [art] Store in in slot 0x4
43,265,350 UART: [art] Derive Key Pair
43,266,346 UART: [art] Store priv key in slot 0x5
46,508,310 UART: [art] Derive Key Pair - Done
46,521,531 UART: [art] Signing Cert with AUTHO
46,522,829 UART: RITY.KEYID = 7
48,802,033 UART: [art] Erasing AUTHORITY.KEYID = 7
48,803,545 UART: [art] PUB.X = 2AF606D29E608247B73210EF16C6DF7402BD9B77D1A603FBDC2207F810863D4C972695875BDA9A31022DB4E8FA36A424
48,810,798 UART: [art] PUB.Y = DF30ACB9EE5DA719B96DE37AFA480360FE5C76684E4C6497AF4443F6A0C02129E44D84F6ECCC68DEF6F1C032184E0153
48,818,082 UART: [art] SIG.R = 4C95D0B0DF5960F3015A08ADA3A40C1C317135963F17434162A1DCA526DFC0624AF9EB6410B135BA30BE6B227B0CB93F
48,825,423 UART: [art] SIG.S = 8138BE5E727CFA04C769C58D2C0EDB4E5AE69C46FB0C74FAAA3E2E74AB76ECE490AEE7DB89C69A367C7E434881E3B8FA
50,130,659 UART: Caliptra RT
50,131,376 UART: [state] CFI Enabled
53,722,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,723,894 UART: [rt] RT listening for mailbox commands...
53,755,448 UART: [rt]cmd =0x494e464f, len=4
53,759,887 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,583 UART:
192,961 UART: Running Caliptra ROM ...
194,164 UART:
194,319 UART: [state] CFI Enabled
262,399 UART: [state] LifecycleState = Unprovisioned
264,235 UART: [state] DebugLocked = No
266,621 UART: [state] WD Timer not started. Device not locked for debugging
269,870 UART: [kat] SHA2-256
448,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,588 UART: [kat] ++
461,117 UART: [kat] sha1
471,598 UART: [kat] SHA2-256
474,642 UART: [kat] SHA2-384
479,566 UART: [kat] SHA2-512-ACC
482,567 UART: [kat] ECC-384
2,946,369 UART: [kat] HMAC-384Kdf
2,970,402 UART: [kat] LMS
3,499,849 UART: [kat] --
3,505,922 UART: [cold-reset] ++
3,507,463 UART: [fht] FHT @ 0x50003400
3,517,485 UART: [idev] ++
3,518,056 UART: [idev] CDI.KEYID = 6
3,518,970 UART: [idev] SUBJECT.KEYID = 7
3,520,138 UART: [idev] UDS.KEYID = 0
3,521,182 ready_for_fw is high
3,521,367 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,620,153 UART: [idev] Erasing UDS.KEYID = 0
6,026,273 UART: [idev] Sha1 KeyId Algorithm
6,049,504 UART: [idev] --
6,052,145 UART: [ldev] ++
6,052,719 UART: [ldev] CDI.KEYID = 6
6,053,603 UART: [ldev] SUBJECT.KEYID = 5
6,054,733 UART: [ldev] AUTHORITY.KEYID = 7
6,056,085 UART: [ldev] FE.KEYID = 1
6,099,467 UART: [ldev] Erasing FE.KEYID = 1
8,601,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,351 UART: [ldev] --
10,391,351 UART: [fwproc] Wait for Commands...
10,393,758 UART: [fwproc] Recv command 0x46574c44
10,395,853 UART: [fwproc] Recv'd Img size: 78456 bytes
13,359,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,434,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,503,672 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,696,446 >>> mbox cmd response: success
13,696,913 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,700,253 UART: [afmc] ++
13,700,864 UART: [afmc] CDI.KEYID = 6
13,701,749 UART: [afmc] SUBJECT.KEYID = 7
13,702,961 UART: [afmc] AUTHORITY.KEYID = 5
16,228,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,955,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,957,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,973,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,989,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,005,162 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,028,545 UART: [afmc] --
18,032,620 UART: [cold-reset] --
18,037,612 UART: [state] Locking Datavault
18,042,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,043,758 UART: [state] Locking ICCM
18,045,150 UART: [exit] Launching FMC @ 0x40000130
18,053,551 UART:
18,053,806 UART: Running Caliptra FMC ...
18,054,909 UART:
18,055,067 UART: [state] CFI Enabled
18,112,145 UART: [fht] FMC Alias Private Key: 7
19,875,958 UART: [art] Extend RT PCRs Done
19,877,170 UART: [art] Lock RT PCRs Done
19,878,850 UART: [art] Populate DV Done
19,884,365 UART: [fht] FMC Alias Private Key: 7
19,886,019 UART: [art] Derive CDI
19,886,835 UART: [art] Store in in slot 0x4
19,946,008 UART: [art] Derive Key Pair
19,947,051 UART: [art] Store priv key in slot 0x5
22,409,923 UART: [art] Derive Key Pair - Done
22,422,807 UART: [art] Signing Cert with AUTHO
22,424,107 UART: RITY.KEYID = 7
24,136,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,137,700 UART: [art] PUB.X = 599625F12BC8086715BED658151F5E7DB07D4C18F086FE1CBB85C519802EF98045A767056418149FFF51506FBF8717BB
24,144,903 UART: [art] PUB.Y = 3AE1B6FE68124859C2CB72EE6A3142DDE54226E6222E8763DC0C0A2A88A4069B883969D015C6036A6AF26D8D54814C1E
24,152,145 UART: [art] SIG.R = 43AACA193520BCF59430AB06337E59D9348E1C0176465E2AF6AF7E74272A8D4EC27058D43013D2C7118D1890E65E8299
24,159,535 UART: [art] SIG.S = 28B06AC80804D655F4ED9A3EA56F51BD12B2665BEA9737423214E1E70E5911C8E4FAAD6E7620BE7F0A35A5E8FFB93665
25,137,709 UART: mbox::rt_entry...
25,138,660 UART: ____ _ _ _ ____ _____
25,140,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,142,633 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,144,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,146,483 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,148,407 UART: |_|
25,149,214 UART:
25,262,286 UART: [rt] Runtime listening for mailbox commands...
25,268,128 >>> mbox cmd response data (3272 bytes)
25,283,905 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,317,303 >>> mbox cmd response data (0 bytes)
27,384,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,528,814 UART:
27,529,202 UART: Running Caliptra ROM ...
27,530,335 UART:
27,530,496 UART: [state] CFI Enabled
27,594,354 UART: [state] LifecycleState = Unprovisioned
27,596,238 UART: [state] DebugLocked = No
27,597,622 UART: [state] WD Timer not started. Device not locked for debugging
27,601,529 UART: [kat] SHA2-256
27,780,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,792,218 UART: [kat] ++
27,792,764 UART: [kat] sha1
27,803,980 UART: [kat] SHA2-256
27,806,989 UART: [kat] SHA2-384
27,811,887 UART: [kat] SHA2-512-ACC
27,814,829 UART: [kat] ECC-384
30,276,277 UART: [kat] HMAC-384Kdf
30,297,314 UART: [kat] LMS
30,826,786 UART: [kat] --
30,830,450 UART: [update-reset] ++
34,256,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,258,772 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,640,785 >>> mbox cmd response: success
34,645,353 UART: [update-reset] Copying MAN_2 To MAN_1
34,664,800 UART: [update-reset Success] --
34,670,613 UART: [state] Locking Datavault
34,674,419 UART: [state] Locking PCR0, PCR1 and PCR31
34,676,067 UART: [state] Locking ICCM
34,677,466 UART: [exit] Launching FMC @ 0x40000130
34,685,917 UART:
34,686,149 UART: Running Caliptra FMC ...
34,687,565 UART:
34,687,731 UART: [state] CFI Enabled
34,787,234 UART: [art] Extend RT PCRs Done
34,788,628 UART: [art] Lock RT PCRs Done
34,789,984 UART: [art] Populate DV Done
34,795,714 UART: [fht] FMC Alias Private Key: 7
34,797,363 UART: [art] Derive CDI
34,798,193 UART: [art] Store in in slot 0x4
34,856,855 UART: [art] Derive Key Pair
34,857,850 UART: [art] Store priv key in slot 0x5
37,320,649 UART: [art] Derive Key Pair - Done
37,333,866 UART: [art] Signing Cert with AUTHO
37,335,174 UART: RITY.KEYID = 7
39,046,213 UART: [art] Erasing AUTHORITY.KEYID = 7
39,047,724 UART: [art] PUB.X = A9C7F96370207AFEF80F03B91A16A0D768356AA158D314A5622F8DB070BDAFFA244D25728A7A63D44C6B3DEB9ACB23F8
39,054,998 UART: [art] PUB.Y = DDB6673A1F5617ADCC2C520D43F235763E3FC5E27355F770969FFE507A46E10633C22D453F226F0204A6122FEBE06526
39,062,290 UART: [art] SIG.R = 9E3EBF451CA15C122309B78F361442715F5D777BC58B576AB7A7C0D1748AE8E8C3FB971DBC9848992522907D252D7F4E
39,069,637 UART: [art] SIG.S = 65F2311C62713E17B452AB786A648FCFBC9DEE618DA16A15220CAC9C038276BB341766E7CBA15BFADDEE14B475BA185C
40,048,162 UART: Caliptra RT
40,048,866 UART: [state] CFI Enabled
42,909,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,910,675 UART: [rt] RT listening for mailbox commands...
42,942,072 UART: [rt]cmd =0x494e464f, len=4
42,946,426 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,355,840 ready_for_fw is high
3,356,231 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,476,404 >>> mbox cmd response: success
13,476,936 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,788,141 UART:
17,788,550 UART: Running Caliptra FMC ...
17,789,650 UART:
17,789,798 UART: [state] CFI Enabled
17,854,404 UART: [fht] FMC Alias Private Key: 7
19,617,940 UART: [art] Extend RT PCRs Done
19,619,156 UART: [art] Lock RT PCRs Done
19,620,896 UART: [art] Populate DV Done
19,626,306 UART: [fht] FMC Alias Private Key: 7
19,627,945 UART: [art] Derive CDI
19,628,680 UART: [art] Store in in slot 0x4
19,686,342 UART: [art] Derive Key Pair
19,687,382 UART: [art] Store priv key in slot 0x5
22,149,684 UART: [art] Derive Key Pair - Done
22,162,564 UART: [art] Signing Cert with AUTHO
22,163,885 UART: RITY.KEYID = 7
23,875,548 UART: [art] Erasing AUTHORITY.KEYID = 7
23,877,054 UART: [art] PUB.X = 93EDC0DCF7C830016C6F96DF1BCCAF5C99858A7726448EFC93F53E120026BD825A5B4B8331F0D60C4CEE9A8278A70084
23,884,291 UART: [art] PUB.Y = F654534B1004A3A8A0376DFABEB2F3AE6A68421659D80F13B1249C02B732EB19613172257A2EA6E1B027D6228B32267C
23,891,527 UART: [art] SIG.R = B8FFB094E26C58A4345E32E904FF2087A6B2F92ED34A6C49C9FA74FC9F23D1EDDE792479DB519D3585E26A7E4A808EDA
23,898,960 UART: [art] SIG.S = 89D78930A34272EE1751FA8448FF8A1B050EA84049C2EC7040B23A7D92C60AB94C841E43262C4F317C509449C48F9107
24,877,211 UART: mbox::rt_entry...
24,878,151 UART: ____ _ _ _ ____ _____
24,880,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,882,098 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,884,030 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,885,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,887,911 UART: |_|
24,888,717 UART:
25,001,860 UART: [rt] Runtime listening for mailbox commands...
25,007,678 >>> mbox cmd response data (3272 bytes)
25,023,364 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,056,754 >>> mbox cmd response data (0 bytes)
27,122,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,244,236 >>> mbox cmd response: success
34,277,606 UART:
34,277,960 UART: Running Caliptra FMC ...
34,279,088 UART:
34,279,262 UART: [state] CFI Enabled
34,377,393 UART: [art] Extend RT PCRs Done
34,378,583 UART: [art] Lock RT PCRs Done
34,379,821 UART: [art] Populate DV Done
34,385,444 UART: [fht] FMC Alias Private Key: 7
34,387,056 UART: [art] Derive CDI
34,387,874 UART: [art] Store in in slot 0x4
34,446,392 UART: [art] Derive Key Pair
34,447,424 UART: [art] Store priv key in slot 0x5
36,910,262 UART: [art] Derive Key Pair - Done
36,923,368 UART: [art] Signing Cert with AUTHO
36,924,706 UART: RITY.KEYID = 7
38,636,587 UART: [art] Erasing AUTHORITY.KEYID = 7
38,638,092 UART: [art] PUB.X = FA338EA97669D43496DBD1968C38EB6AF7A77BDF4142F40C1086A0512C6F85C5406B9349D58A08C3CB66E9D57D588465
38,645,351 UART: [art] PUB.Y = 0E5CE7DA1E59CFA6DF501B343DB9F8365F71E64DB80823C5F4567E8A6AC4F15113FE57A060009C01B298B7A3D0770774
38,652,590 UART: [art] SIG.R = ECB48E02EDD003CA2DC50F83323FAED23E0742BFF10F9D269B762EA621BAFF8283ED1D2A6E6B9CADF4FB189B9CCDA785
38,660,046 UART: [art] SIG.S = E91FEEC29E5E3306FA4CF2346D8AB82308882496A4239A5B815E21D7563B402CC29FEE33539BF55FE3C762374919EB87
39,638,702 UART: Caliptra RT
39,639,392 UART: [state] CFI Enabled
42,499,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,501,115 UART: [rt] RT listening for mailbox commands...
42,532,460 UART: [rt]cmd =0x494e464f, len=4
42,536,775 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
192,906 UART:
193,307 UART: Running Caliptra ROM ...
194,429 UART:
603,877 UART: [state] CFI Enabled
614,832 UART: [state] LifecycleState = Unprovisioned
616,711 UART: [state] DebugLocked = No
619,162 UART: [state] WD Timer not started. Device not locked for debugging
623,511 UART: [kat] SHA2-256
802,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,215 UART: [kat] ++
814,747 UART: [kat] sha1
824,067 UART: [kat] SHA2-256
827,081 UART: [kat] SHA2-384
833,859 UART: [kat] SHA2-512-ACC
836,804 UART: [kat] ECC-384
3,278,222 UART: [kat] HMAC-384Kdf
3,291,192 UART: [kat] LMS
3,820,700 UART: [kat] --
3,824,580 UART: [cold-reset] ++
3,826,522 UART: [fht] FHT @ 0x50003400
3,837,648 UART: [idev] ++
3,838,221 UART: [idev] CDI.KEYID = 6
3,839,133 UART: [idev] SUBJECT.KEYID = 7
3,840,328 UART: [idev] UDS.KEYID = 0
3,841,257 ready_for_fw is high
3,841,466 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,940,178 UART: [idev] Erasing UDS.KEYID = 0
6,312,157 UART: [idev] Sha1 KeyId Algorithm
6,336,519 UART: [idev] --
6,340,296 UART: [ldev] ++
6,340,871 UART: [ldev] CDI.KEYID = 6
6,341,755 UART: [ldev] SUBJECT.KEYID = 5
6,342,965 UART: [ldev] AUTHORITY.KEYID = 7
6,344,199 UART: [ldev] FE.KEYID = 1
6,354,817 UART: [ldev] Erasing FE.KEYID = 1
8,828,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,635 UART: [ldev] --
10,617,159 UART: [fwproc] Wait for Commands...
10,619,577 UART: [fwproc] Recv command 0x46574c44
10,621,615 UART: [fwproc] Recv'd Img size: 78456 bytes
13,593,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,665,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,734,366 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,927,342 >>> mbox cmd response: success
13,927,852 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,932,353 UART: [afmc] ++
13,932,942 UART: [afmc] CDI.KEYID = 6
13,933,851 UART: [afmc] SUBJECT.KEYID = 7
13,935,068 UART: [afmc] AUTHORITY.KEYID = 5
16,437,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,160,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,162,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,178,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,194,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,210,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,232,857 UART: [afmc] --
18,236,504 UART: [cold-reset] --
18,241,128 UART: [state] Locking Datavault
18,247,776 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,423 UART: [state] Locking ICCM
18,252,137 UART: [exit] Launching FMC @ 0x40000130
18,260,583 UART:
18,260,824 UART: Running Caliptra FMC ...
18,261,850 UART:
18,261,996 UART: [state] CFI Enabled
18,270,259 UART: [fht] FMC Alias Private Key: 7
20,026,815 UART: [art] Extend RT PCRs Done
20,028,063 UART: [art] Lock RT PCRs Done
20,029,939 UART: [art] Populate DV Done
20,035,411 UART: [fht] FMC Alias Private Key: 7
20,037,115 UART: [art] Derive CDI
20,037,936 UART: [art] Store in in slot 0x4
20,080,488 UART: [art] Derive Key Pair
20,081,667 UART: [art] Store priv key in slot 0x5
22,508,262 UART: [art] Derive Key Pair - Done
22,521,319 UART: [art] Signing Cert with AUTHO
22,522,817 UART: RITY.KEYID = 7
24,228,312 UART: [art] Erasing AUTHORITY.KEYID = 7
24,229,819 UART: [art] PUB.X = 5C61B422A25A7DAD4DDE5D1BD85C042929573AE14401157F3284E323E9AB983BCAC564669C72227E833787D6BB6C7900
24,237,040 UART: [art] PUB.Y = 47C0A85373F985B40DA72F32BECD39B6C0AC0F697424CCB2852D0CC67B50669022E3D775474B959EF22CFC29C0FEC011
24,244,303 UART: [art] SIG.R = 184B9285A058C4790EAEE118E152A48B1F448424118B7FA105C93C172AC1BE97F1C349B159AEE2125318AB2CB36BD3B0
24,251,725 UART: [art] SIG.S = 05181CC5721957FC03A3DB490958E31BFBB9627A956488B37FB693AD60BA9B7F07A5D14F9B014BDEE243878EF83E711F
25,230,122 UART: mbox::rt_entry...
25,231,108 UART: ____ _ _ _ ____ _____
25,233,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,235,106 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,237,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,238,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,240,903 UART: |_|
25,241,712 UART:
25,354,489 UART: [rt] Runtime listening for mailbox commands...
25,360,347 >>> mbox cmd response data (3272 bytes)
25,376,185 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,409,600 >>> mbox cmd response data (0 bytes)
27,470,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,614,629 UART:
27,615,020 UART: Running Caliptra ROM ...
27,616,161 UART:
27,616,337 UART: [state] CFI Enabled
27,629,691 UART: [state] LifecycleState = Unprovisioned
27,631,582 UART: [state] DebugLocked = No
27,632,963 UART: [state] WD Timer not started. Device not locked for debugging
27,636,494 UART: [kat] SHA2-256
27,815,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,827,189 UART: [kat] ++
27,827,742 UART: [kat] sha1
27,838,639 UART: [kat] SHA2-256
27,841,650 UART: [kat] SHA2-384
27,848,614 UART: [kat] SHA2-512-ACC
27,851,576 UART: [kat] ECC-384
30,291,422 UART: [kat] HMAC-384Kdf
30,305,222 UART: [kat] LMS
30,834,770 UART: [kat] --
30,838,075 UART: [update-reset] ++
34,264,849 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,268,878 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
34,650,861 >>> mbox cmd response: success
34,655,425 UART: [update-reset] Copying MAN_2 To MAN_1
34,674,964 UART: [update-reset Success] --
34,678,294 UART: [state] Locking Datavault
34,681,888 UART: [state] Locking PCR0, PCR1 and PCR31
34,684,210 UART: [state] Locking ICCM
34,685,652 UART: [exit] Launching FMC @ 0x40000130
34,694,063 UART:
34,694,311 UART: Running Caliptra FMC ...
34,695,740 UART:
34,695,907 UART: [state] CFI Enabled
34,739,874 UART: [art] Extend RT PCRs Done
34,741,033 UART: [art] Lock RT PCRs Done
34,742,596 UART: [art] Populate DV Done
34,747,951 UART: [fht] FMC Alias Private Key: 7
34,749,648 UART: [art] Derive CDI
34,750,459 UART: [art] Store in in slot 0x4
34,793,270 UART: [art] Derive Key Pair
34,794,325 UART: [art] Store priv key in slot 0x5
37,221,437 UART: [art] Derive Key Pair - Done
37,234,596 UART: [art] Signing Cert with AUTHO
37,235,917 UART: RITY.KEYID = 7
38,941,262 UART: [art] Erasing AUTHORITY.KEYID = 7
38,942,764 UART: [art] PUB.X = 004093480BBED9B3522D2A2A13704FC1AA6F84C889A696D2EC4EEDB2267F1659C49A7A7982EB877FC13003AF1A1D57C8
38,950,030 UART: [art] PUB.Y = 631E1F8FC7660F3099C2BB282BAC9D168479BD458A664FCE2D3EC5EC3EF8CBF0148E034BC1D598A85D1F241BCA397005
38,957,293 UART: [art] SIG.R = C787FD9753E88C23CEE0CE44E1F11B96E99E2DDABC6253A3EE029928AE80464431B37262BFA263FC7258BF55C014CE37
38,964,720 UART: [art] SIG.S = 793E27FB565CDEC2A8EE866D48C8D7D03E8DD2BBDE2559C19FD24F24976BC6F2F83A1BBA32584179850BA85599F97C42
39,943,531 UART: Caliptra RT
39,944,232 UART: [state] CFI Enabled
42,715,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,717,623 UART: [rt] RT listening for mailbox commands...
42,749,021 UART: [rt]cmd =0x494e464f, len=4
42,753,188 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,039 writing to cptra_bootfsm_go
3,693,673 ready_for_fw is high
3,694,064 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,712,342 >>> mbox cmd response: success
13,713,103 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,962,236 UART:
17,962,626 UART: Running Caliptra FMC ...
17,963,732 UART:
17,963,882 UART: [state] CFI Enabled
17,971,669 UART: [fht] FMC Alias Private Key: 7
19,728,514 UART: [art] Extend RT PCRs Done
19,729,760 UART: [art] Lock RT PCRs Done
19,731,525 UART: [art] Populate DV Done
19,737,056 UART: [fht] FMC Alias Private Key: 7
19,738,509 UART: [art] Derive CDI
19,739,246 UART: [art] Store in in slot 0x4
19,781,913 UART: [art] Derive Key Pair
19,782,955 UART: [art] Store priv key in slot 0x5
22,209,213 UART: [art] Derive Key Pair - Done
22,222,388 UART: [art] Signing Cert with AUTHO
22,223,731 UART: RITY.KEYID = 7
23,928,976 UART: [art] Erasing AUTHORITY.KEYID = 7
23,930,473 UART: [art] PUB.X = 9C9D3B6516271F2E235752564060976E5340560299303106E0AE5241C73A2A8B16A3BE2A84F1480AB618ADFF53365ECB
23,937,696 UART: [art] PUB.Y = 684EA115C25ECB9B0628A82D42B813E73F06CADFF39DE9A0AA3103A9A3D220CBEFD28BBB97DF42FB738DD2933A09D9FB
23,945,012 UART: [art] SIG.R = 92DF9CA2721DB73BFBEFC441066C2B350F758CC8705E6C1F1D27CBF2E049204129EDC1C8E5D2DB91870001415CE28A69
23,952,382 UART: [art] SIG.S = 708332B78DD90D71B2D372189A8D9C773258C83DF5235770714CA23DD03DC0B37D5F1129DFD8C91783D1A7FFEE4B7CDE
24,930,940 UART: mbox::rt_entry...
24,931,911 UART: ____ _ _ _ ____ _____
24,933,902 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,935,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,937,846 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,939,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,941,881 UART: |_|
24,942,699 UART:
25,055,323 UART: [rt] Runtime listening for mailbox commands...
25,061,172 >>> mbox cmd response data (3272 bytes)
25,077,074 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,110,496 >>> mbox cmd response data (0 bytes)
27,167,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
34,207,529 >>> mbox cmd response: success
34,242,254 UART:
34,242,590 UART: Running Caliptra FMC ...
34,243,724 UART:
34,243,895 UART: [state] CFI Enabled
34,288,293 UART: [art] Extend RT PCRs Done
34,289,444 UART: [art] Lock RT PCRs Done
34,291,190 UART: [art] Populate DV Done
34,296,329 UART: [fht] FMC Alias Private Key: 7
34,297,865 UART: [art] Derive CDI
34,298,599 UART: [art] Store in in slot 0x4
34,341,304 UART: [art] Derive Key Pair
34,342,341 UART: [art] Store priv key in slot 0x5
36,769,063 UART: [art] Derive Key Pair - Done
36,782,161 UART: [art] Signing Cert with AUTHO
36,783,497 UART: RITY.KEYID = 7
38,488,698 UART: [art] Erasing AUTHORITY.KEYID = 7
38,490,210 UART: [art] PUB.X = 7F166EDC09AE785C35BE8878A34180AC3F89F1BA74203D5A84B36E137C9E3F8E332F6EC80CE3FC1C32918EC80AC74249
38,497,473 UART: [art] PUB.Y = A00F5C73BFA2770910651A189750C4589CF3963D31AD4B23A412B418C2D57CA8B1FD74C94F21BE651A7046919D544BF4
38,504,723 UART: [art] SIG.R = B95C36963204FE9F72796BE408CCF35D71C1C006CD600CFF5C0E781200E325F33F86F519BB6A9F55822226C214F61B3E
38,512,083 UART: [art] SIG.S = B98E21CCE1A940B280A5E7075890DD237DBEB779BA0B53369397CEFD96104D38DABB098E38B626828B61E7089A6FE2FA
39,491,249 UART: Caliptra RT
39,491,939 UART: [state] CFI Enabled
42,266,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,268,334 UART: [rt] RT listening for mailbox commands...
42,300,161 UART: [rt]cmd =0x494e464f, len=4
42,304,600 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,473 writing to cptra_bootfsm_go
192,536 UART:
192,901 UART: Running Caliptra ROM ...
194,079 UART:
194,238 UART: [state] CFI Enabled
265,354 UART: [state] LifecycleState = Unprovisioned
267,778 UART: [state] DebugLocked = No
269,310 UART: [state] WD Timer not started. Device not locked for debugging
273,994 UART: [kat] SHA2-256
463,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,593 UART: [kat] ++
475,109 UART: [kat] sha1
487,187 UART: [kat] SHA2-256
490,198 UART: [kat] SHA2-384
496,543 UART: [kat] SHA2-512-ACC
499,127 UART: [kat] ECC-384
2,951,838 UART: [kat] HMAC-384Kdf
2,972,959 UART: [kat] LMS
3,504,729 UART: [kat] --
3,506,881 UART: [cold-reset] ++
3,508,596 UART: [fht] FHT @ 0x50003400
3,520,208 UART: [idev] ++
3,520,908 UART: [idev] CDI.KEYID = 6
3,521,929 UART: [idev] SUBJECT.KEYID = 7
3,523,096 UART: [idev] UDS.KEYID = 0
3,524,024 ready_for_fw is high
3,524,213 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,623,054 UART: [idev] Erasing UDS.KEYID = 0
6,032,064 UART: [idev] Sha1 KeyId Algorithm
6,055,054 UART: [idev] --
6,059,410 UART: [ldev] ++
6,060,097 UART: [ldev] CDI.KEYID = 6
6,061,042 UART: [ldev] SUBJECT.KEYID = 5
6,062,179 UART: [ldev] AUTHORITY.KEYID = 7
6,063,382 UART: [ldev] FE.KEYID = 1
6,104,383 UART: [ldev] Erasing FE.KEYID = 1
8,612,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,189 UART: [ldev] --
10,420,260 UART: [fwproc] Wait for Commands...
10,423,321 UART: [fwproc] Recv command 0x46574c44
10,425,621 UART: [fwproc] Recv'd Img size: 78456 bytes
13,435,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,508,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,624,443 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,951,595 >>> mbox cmd response: success
13,952,101 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,956,278 UART: [afmc] ++
13,956,969 UART: [afmc] CDI.KEYID = 6
13,958,154 UART: [afmc] SUBJECT.KEYID = 7
13,959,648 UART: [afmc] AUTHORITY.KEYID = 5
16,491,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,217,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,219,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,234,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,249,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,264,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,287,430 UART: [afmc] --
18,291,525 UART: [cold-reset] --
18,295,817 UART: [state] Locking Datavault
18,303,522 UART: [state] Locking PCR0, PCR1 and PCR31
18,305,701 UART: [state] Locking ICCM
18,307,246 UART: [exit] Launching FMC @ 0x40000130
18,315,933 UART:
18,316,164 UART: Running Caliptra FMC ...
18,317,191 UART:
18,317,336 UART: [state] CFI Enabled
18,373,411 UART: [fht] FMC Alias Private Key: 7
20,137,024 UART: [art] Extend RT PCRs Done
20,138,246 UART: [art] Lock RT PCRs Done
20,139,825 UART: [art] Populate DV Done
20,145,291 UART: [fht] FMC Alias Private Key: 7
20,146,986 UART: [art] Derive CDI
20,147,792 UART: [art] Store in in slot 0x4
20,206,691 UART: [art] Derive Key Pair
20,207,681 UART: [art] Store priv key in slot 0x5
22,670,443 UART: [art] Derive Key Pair - Done
22,683,351 UART: [art] Signing Cert with AUTHO
22,684,652 UART: RITY.KEYID = 7
24,396,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,397,976 UART: [art] PUB.X = 44D864A487BD0A79FD7D4B33116EB80C04BA9EF07FA95DC096BE81EC0F7437DF6E5F5110F16DA498A1B20ED2F5D17368
24,405,257 UART: [art] PUB.Y = F3173F3D82A7632D09D4F7AE57102E8D4B3E497A7BE46F78246B7A036FE81C4F042A66ADDE2091EA7255CDFBCD577E20
24,412,518 UART: [art] SIG.R = 27D5C12CB99C1969C0147D26F0273536FC944779A6C99D8099C21ABC5F31AFC5D57E9CAC332FC1A821CD737BC0FB8165
24,419,955 UART: [art] SIG.S = 0704625632787DB907A86959CB71748D373678CC9142E11B3FC24BAF64A4582FC5BDEE68B8497B2168E7C7470F62FFF1
25,398,597 UART: mbox::rt_entry...
25,399,555 UART: ____ _ _ _ ____ _____
25,401,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,403,486 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,405,359 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,407,290 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,409,220 UART: |_|
25,410,029 UART:
25,522,209 UART: [rt] Runtime listening for mailbox commands...
25,528,035 >>> mbox cmd response data (3272 bytes)
25,543,871 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,577,278 >>> mbox cmd response data (0 bytes)
27,636,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,781,074 UART:
27,781,425 UART: Running Caliptra ROM ...
27,782,555 UART:
27,782,727 UART: [state] CFI Enabled
27,849,449 UART: [state] LifecycleState = Unprovisioned
27,851,554 UART: [state] DebugLocked = No
27,852,967 UART: [state] WD Timer not started. Device not locked for debugging
27,856,979 UART: [kat] SHA2-256
28,046,858 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,057,632 UART: [kat] ++
28,058,097 UART: [kat] sha1
28,068,936 UART: [kat] SHA2-256
28,071,973 UART: [kat] SHA2-384
28,078,408 UART: [kat] SHA2-512-ACC
28,080,984 UART: [kat] ECC-384
30,534,393 UART: [kat] HMAC-384Kdf
30,558,022 UART: [kat] LMS
31,089,594 UART: [kat] --
31,093,684 UART: [update-reset] ++
34,553,126 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,556,027 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,162,094 >>> mbox cmd response: success
35,166,674 UART: [update-reset] Copying MAN_2 To MAN_1
35,200,802 UART: [update-reset Success] --
35,204,334 UART: [state] Locking Datavault
35,207,882 UART: [state] Locking PCR0, PCR1 and PCR31
35,210,042 UART: [state] Locking ICCM
35,212,474 UART: [exit] Launching FMC @ 0x40000130
35,221,118 UART:
35,221,355 UART: Running Caliptra FMC ...
35,222,526 UART:
35,222,679 UART: [state] CFI Enabled
35,327,100 UART: [art] Extend RT PCRs Done
35,328,296 UART: [art] Lock RT PCRs Done
35,330,044 UART: [art] Populate DV Done
35,335,708 UART: [fht] FMC Alias Private Key: 7
35,337,265 UART: [art] Derive CDI
35,338,028 UART: [art] Store in in slot 0x4
35,396,093 UART: [art] Derive Key Pair
35,397,085 UART: [art] Store priv key in slot 0x5
37,859,674 UART: [art] Derive Key Pair - Done
37,872,742 UART: [art] Signing Cert with AUTHO
37,874,043 UART: RITY.KEYID = 7
39,585,805 UART: [art] Erasing AUTHORITY.KEYID = 7
39,587,317 UART: [art] PUB.X = C5F097B5FD82D9C0A86D0DA5FB4F950C28362AFCB4B6BD3BBE6FA45315D99FA0AAD416391174D4497DF2C1C5A5F48703
39,594,592 UART: [art] PUB.Y = 15186101C921779F7B0F90C50F2089DF9876DE1E23407B66985EE21866E8A2EA111CFCC5DD198D8D673D22BE43F63762
39,601,847 UART: [art] SIG.R = AB2F06312D2C086E1FF941CF2EC41183C3D1E91F4681126DC762AF16FA8C32F41863A07580950393701C7D2177ADFC37
39,609,217 UART: [art] SIG.S = 04605D10D0F0B1D22DEB45C44031CA4D3F7A6C70A437828DCF566B734CD300B45AB599D402BA6C5E999D1180BFEEC6BB
40,587,794 UART: Caliptra RT
40,588,510 UART: [state] CFI Enabled
43,448,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,450,155 UART: [rt] RT listening for mailbox commands...
43,481,435 UART: [rt]cmd =0x494e464f, len=4
43,485,868 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,417,740 ready_for_fw is high
3,418,129 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
13,957,628 >>> mbox cmd response: success
13,958,367 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,235,476 UART:
18,235,873 UART: Running Caliptra FMC ...
18,237,016 UART:
18,237,175 UART: [state] CFI Enabled
18,304,147 UART: [fht] FMC Alias Private Key: 7
20,068,530 UART: [art] Extend RT PCRs Done
20,069,768 UART: [art] Lock RT PCRs Done
20,071,371 UART: [art] Populate DV Done
20,076,795 UART: [fht] FMC Alias Private Key: 7
20,078,399 UART: [art] Derive CDI
20,079,171 UART: [art] Store in in slot 0x4
20,137,059 UART: [art] Derive Key Pair
20,138,111 UART: [art] Store priv key in slot 0x5
22,601,054 UART: [art] Derive Key Pair - Done
22,614,114 UART: [art] Signing Cert with AUTHO
22,615,451 UART: RITY.KEYID = 7
24,326,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,328,141 UART: [art] PUB.X = CDD5A4BA1E0BEAC62897186B7AA90370BB700D7C43344A671252BF088E57DB30E7151086E34B0BC5F6314FE71999A5E4
24,335,377 UART: [art] PUB.Y = 504B2A5C6886C3F2464D62A5999B214B5C80BF521622EAEED49157311400D443197B39E2E4E28BCEC2A08D95BE4FD1A0
24,342,654 UART: [art] SIG.R = 2C6A835F191E8112CFBE16632959F76FEC324E8D06FC1655785365E681A64E547610AB1734D5DE032C433D6CE5ED6FF0
24,350,024 UART: [art] SIG.S = 160AD1B93B1BF6B463BB46E813147C194C43308FD914D8F8FC59C4D588FDFB1977BE7ECE8A3D36D9A69DD9A5EC161C64
25,328,744 UART: mbox::rt_entry...
25,329,704 UART: ____ _ _ _ ____ _____
25,331,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,333,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,335,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,337,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,339,538 UART: |_|
25,340,330 UART:
25,452,811 UART: [rt] Runtime listening for mailbox commands...
25,458,668 >>> mbox cmd response data (3272 bytes)
25,474,383 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,507,795 >>> mbox cmd response data (0 bytes)
27,566,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,381,061 >>> mbox cmd response: success
35,418,293 UART:
35,418,623 UART: Running Caliptra FMC ...
35,419,742 UART:
35,419,913 UART: [state] CFI Enabled
35,513,590 UART: [art] Extend RT PCRs Done
35,514,769 UART: [art] Lock RT PCRs Done
35,516,386 UART: [art] Populate DV Done
35,521,900 UART: [fht] FMC Alias Private Key: 7
35,523,380 UART: [art] Derive CDI
35,524,142 UART: [art] Store in in slot 0x4
35,582,911 UART: [art] Derive Key Pair
35,583,939 UART: [art] Store priv key in slot 0x5
38,047,592 UART: [art] Derive Key Pair - Done
38,060,359 UART: [art] Signing Cert with AUTHO
38,061,702 UART: RITY.KEYID = 7
39,774,945 UART: [art] Erasing AUTHORITY.KEYID = 7
39,776,476 UART: [art] PUB.X = E6AB2E08E3089CA2B0C6E312FCF90ABEB1312DDCC7C2D11CC2D9A280E7333985E20965A8B66B4E4C87D8F12AA1D82085
39,783,737 UART: [art] PUB.Y = 89EB6499BABF5564A4DC9EFA9AEC62907C17D579752563DDEAD9982A90A7D7800A20735634C7C7AF532EC46BE65FD826
39,790,986 UART: [art] SIG.R = 48E91B507FC9B1A807FAC48580C58DDFDB66417E4E6ACC083809C2F8F1D94E779F48280179427C4F069823CDB707E158
39,798,341 UART: [art] SIG.S = 5971897543680DAFDC7BDF918BEF00098B2D105D984D40291F11AD90F89DC692BDAF6079D000FA77AA7D65BA4542DA8E
40,777,273 UART: Caliptra RT
40,777,993 UART: [state] CFI Enabled
43,635,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,637,031 UART: [rt] RT listening for mailbox commands...
43,668,258 UART: [rt]cmd =0x494e464f, len=4
43,672,745 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
192,871 UART:
193,233 UART: Running Caliptra ROM ...
194,672 UART:
603,963 UART: [state] CFI Enabled
620,113 UART: [state] LifecycleState = Unprovisioned
622,495 UART: [state] DebugLocked = No
625,223 UART: [state] WD Timer not started. Device not locked for debugging
629,385 UART: [kat] SHA2-256
819,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,037 UART: [kat] ++
830,561 UART: [kat] sha1
841,242 UART: [kat] SHA2-256
844,225 UART: [kat] SHA2-384
850,582 UART: [kat] SHA2-512-ACC
853,169 UART: [kat] ECC-384
3,293,269 UART: [kat] HMAC-384Kdf
3,305,574 UART: [kat] LMS
3,837,388 UART: [kat] --
3,841,526 UART: [cold-reset] ++
3,842,891 UART: [fht] FHT @ 0x50003400
3,854,442 UART: [idev] ++
3,855,112 UART: [idev] CDI.KEYID = 6
3,856,152 UART: [idev] SUBJECT.KEYID = 7
3,857,259 UART: [idev] UDS.KEYID = 0
3,858,158 ready_for_fw is high
3,858,367 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,957,595 UART: [idev] Erasing UDS.KEYID = 0
6,331,271 UART: [idev] Sha1 KeyId Algorithm
6,353,409 UART: [idev] --
6,357,475 UART: [ldev] ++
6,358,166 UART: [ldev] CDI.KEYID = 6
6,359,081 UART: [ldev] SUBJECT.KEYID = 5
6,360,245 UART: [ldev] AUTHORITY.KEYID = 7
6,361,472 UART: [ldev] FE.KEYID = 1
6,374,005 UART: [ldev] Erasing FE.KEYID = 1
8,857,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,574 UART: [ldev] --
10,647,595 UART: [fwproc] Wait for Commands...
10,650,558 UART: [fwproc] Recv command 0x46574c44
10,652,868 UART: [fwproc] Recv'd Img size: 78456 bytes
13,663,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,740,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,856,242 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
14,183,248 >>> mbox cmd response: success
14,183,719 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,187,565 UART: [afmc] ++
14,188,261 UART: [afmc] CDI.KEYID = 6
14,189,452 UART: [afmc] SUBJECT.KEYID = 7
14,190,890 UART: [afmc] AUTHORITY.KEYID = 5
16,693,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,415,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,417,556 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,432,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,447,888 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,462,926 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,486,262 UART: [afmc] --
18,490,726 UART: [cold-reset] --
18,495,089 UART: [state] Locking Datavault
18,499,009 UART: [state] Locking PCR0, PCR1 and PCR31
18,501,168 UART: [state] Locking ICCM
18,503,439 UART: [exit] Launching FMC @ 0x40000130
18,512,122 UART:
18,512,364 UART: Running Caliptra FMC ...
18,513,390 UART:
18,513,539 UART: [state] CFI Enabled
18,521,483 UART: [fht] FMC Alias Private Key: 7
20,278,878 UART: [art] Extend RT PCRs Done
20,280,082 UART: [art] Lock RT PCRs Done
20,281,517 UART: [art] Populate DV Done
20,286,817 UART: [fht] FMC Alias Private Key: 7
20,288,406 UART: [art] Derive CDI
20,289,145 UART: [art] Store in in slot 0x4
20,331,737 UART: [art] Derive Key Pair
20,332,737 UART: [art] Store priv key in slot 0x5
22,759,505 UART: [art] Derive Key Pair - Done
22,772,567 UART: [art] Signing Cert with AUTHO
22,773,880 UART: RITY.KEYID = 7
24,479,211 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,697 UART: [art] PUB.X = 6D875140B624CED70682D9805674CF3DD0564D93F158D329E8A48E3092207B54A094B54877596CB0E377844E3B0C26DD
24,487,968 UART: [art] PUB.Y = 41BDE21E67049FC60EC7E1FAA276703E4CE56476D312D6F20AEC200AD75046FC720188683F648453686EACE9DD04BFB8
24,495,227 UART: [art] SIG.R = 6BA1CCDF30B5C411D52432F54C24EFE2A247B1A683F73F8887DFF5C1D6BB9A8236A9640E0EB234963AC2442D9AE5FB5A
24,502,672 UART: [art] SIG.S = C7C1475BC52485E8A39777C0E1D5528BFB33076D12EC1F47EA60D9380680F77A24A06B2915BD7A249B579BB723297705
25,481,049 UART: mbox::rt_entry...
25,482,017 UART: ____ _ _ _ ____ _____
25,483,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,485,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,487,896 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,489,826 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,491,758 UART: |_|
25,492,746 UART:
25,604,855 UART: [rt] Runtime listening for mailbox commands...
25,610,705 >>> mbox cmd response data (3272 bytes)
25,626,598 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,660,020 >>> mbox cmd response data (0 bytes)
27,720,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
27,864,691 UART:
27,865,078 UART: Running Caliptra ROM ...
27,866,222 UART:
27,866,392 UART: [state] CFI Enabled
27,881,704 UART: [state] LifecycleState = Unprovisioned
27,883,638 UART: [state] DebugLocked = No
27,885,725 UART: [state] WD Timer not started. Device not locked for debugging
27,889,891 UART: [kat] SHA2-256
28,079,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,090,502 UART: [kat] ++
28,091,060 UART: [kat] sha1
28,101,796 UART: [kat] SHA2-256
28,104,783 UART: [kat] SHA2-384
28,112,184 UART: [kat] SHA2-512-ACC
28,114,762 UART: [kat] ECC-384
30,553,604 UART: [kat] HMAC-384Kdf
30,567,787 UART: [kat] LMS
31,099,418 UART: [kat] --
31,104,083 UART: [update-reset] ++
34,559,681 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,562,569 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
35,168,623 >>> mbox cmd response: success
35,173,252 UART: [update-reset] Copying MAN_2 To MAN_1
35,207,270 UART: [update-reset Success] --
35,210,261 UART: [state] Locking Datavault
35,214,878 UART: [state] Locking PCR0, PCR1 and PCR31
35,217,030 UART: [state] Locking ICCM
35,219,329 UART: [exit] Launching FMC @ 0x40000130
35,228,002 UART:
35,228,253 UART: Running Caliptra FMC ...
35,229,331 UART:
35,229,483 UART: [state] CFI Enabled
35,273,707 UART: [art] Extend RT PCRs Done
35,274,902 UART: [art] Lock RT PCRs Done
35,276,492 UART: [art] Populate DV Done
35,282,061 UART: [fht] FMC Alias Private Key: 7
35,283,714 UART: [art] Derive CDI
35,284,532 UART: [art] Store in in slot 0x4
35,326,793 UART: [art] Derive Key Pair
35,327,838 UART: [art] Store priv key in slot 0x5
37,754,378 UART: [art] Derive Key Pair - Done
37,767,166 UART: [art] Signing Cert with AUTHO
37,768,479 UART: RITY.KEYID = 7
39,473,623 UART: [art] Erasing AUTHORITY.KEYID = 7
39,475,269 UART: [art] PUB.X = DCBC0DBCBCBA0B4F29DA50ED39062B0775E584C7C7AD53C75F1C29C1D6CF01745934C0BFA6CF8BD61FA5E9131BDA3177
39,482,432 UART: [art] PUB.Y = ABA9009E50F3F736FC78489428B95ACC1F57DD4D73BB9614749C24D1F7B8C1E6CC54BAFAACBC48BF5D582BB02A911A33
39,489,698 UART: [art] SIG.R = A997E8899A408303D549107244B3C3BD43FBA3CBA14B209A7A65C4275B969230ED28AEC2877405FF1CA6DCE80B1C0B37
39,497,063 UART: [art] SIG.S = EE3BCE63953CE2157FCE69BD39B7E6DB611E952F75792336AA58BCA30FA1D7DC56B542C711406833CCF23D4A6B49CAEE
40,476,436 UART: Caliptra RT
40,477,141 UART: [state] CFI Enabled
43,244,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,246,168 UART: [rt] RT listening for mailbox commands...
43,277,234 UART: [rt]cmd =0x494e464f, len=4
43,281,506 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,780 writing to cptra_bootfsm_go
3,758,890 ready_for_fw is high
3,759,377 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
14,199,278 >>> mbox cmd response: success
14,199,984 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,455,061 UART:
18,455,465 UART: Running Caliptra FMC ...
18,456,623 UART:
18,456,783 UART: [state] CFI Enabled
18,464,711 UART: [fht] FMC Alias Private Key: 7
20,221,304 UART: [art] Extend RT PCRs Done
20,222,526 UART: [art] Lock RT PCRs Done
20,224,052 UART: [art] Populate DV Done
20,229,546 UART: [fht] FMC Alias Private Key: 7
20,231,159 UART: [art] Derive CDI
20,231,984 UART: [art] Store in in slot 0x4
20,274,740 UART: [art] Derive Key Pair
20,275,750 UART: [art] Store priv key in slot 0x5
22,702,502 UART: [art] Derive Key Pair - Done
22,715,827 UART: [art] Signing Cert with AUTHO
22,717,128 UART: RITY.KEYID = 7
24,422,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,424,257 UART: [art] PUB.X = 730A582338576C65E1725B3788ECBAA8CE6EF03941DC871CA5152B7E4802077E495B9FCC432BE64785D879BAA610B9A1
24,431,496 UART: [art] PUB.Y = DBDCDDE263433670D38DBCA8A85D0794BE769BDA48A23F43F15611115B255CBA1551535F84192ED2F7F5A189541A0CDD
24,438,754 UART: [art] SIG.R = E1A47A924A96AB5F1CE4DFA23C6691586EA92FC67450B35B69B708BA984B052E7EDF309CAB51237050C8A31ED380E5BF
24,446,157 UART: [art] SIG.S = 872CE8B16CFF995DC758C9490870077988F4FB8D6AE47FBD67CA6C6CCB59888C20EFE90485AB37D9E2E6CDB52A1DD81B
25,424,481 UART: mbox::rt_entry...
25,425,438 UART: ____ _ _ _ ____ _____
25,427,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,429,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,431,335 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,433,306 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,435,243 UART: |_|
25,436,076 UART:
25,549,101 UART: [rt] Runtime listening for mailbox commands...
25,554,949 >>> mbox cmd response data (3272 bytes)
25,570,985 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,604,412 >>> mbox cmd response data (0 bytes)
27,665,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
35,395,472 >>> mbox cmd response: success
35,429,622 UART:
35,429,983 UART: Running Caliptra FMC ...
35,431,116 UART:
35,431,287 UART: [state] CFI Enabled
35,475,745 UART: [art] Extend RT PCRs Done
35,476,895 UART: [art] Lock RT PCRs Done
35,478,508 UART: [art] Populate DV Done
35,483,985 UART: [fht] FMC Alias Private Key: 7
35,485,693 UART: [art] Derive CDI
35,486,469 UART: [art] Store in in slot 0x4
35,529,140 UART: [art] Derive Key Pair
35,530,161 UART: [art] Store priv key in slot 0x5
37,956,973 UART: [art] Derive Key Pair - Done
37,969,786 UART: [art] Signing Cert with AUTHO
37,971,094 UART: RITY.KEYID = 7
39,676,273 UART: [art] Erasing AUTHORITY.KEYID = 7
39,677,779 UART: [art] PUB.X = B3AFFF9E952EEDFE6F764AA81B612BF1983DF402D7C34B61DEA85E026200A06FBBC069135AA6EBB7195236958DEA2CA4
39,685,040 UART: [art] PUB.Y = 77FA5715C8C58E7CF557605288D81A9E7B6503D68FFD8B7C39E546ADA82B6FBA4D418153C7FCCDD2E9AE6D5F024E96B5
39,692,342 UART: [art] SIG.R = A9FC472053997433DF623D8148E302F1F3D773B634BA39A7C1DD75DA313AF6DEE01F8ABEFC5C4FB07CFC823F29D1E79A
39,699,735 UART: [art] SIG.S = 564F636E08642B487CC0673744D7AFB549A7C4E156F2C24A33F2F3CD2B6628D99E077CD807763884E734F8C4626CE450
40,678,580 UART: Caliptra RT
40,679,299 UART: [state] CFI Enabled
43,451,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,452,922 UART: [rt] RT listening for mailbox commands...
43,484,283 UART: [rt]cmd =0x494e464f, len=4
43,488,496 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,454 UART: [kat] HMAC-384Kdf
907,030 UART: [kat] LMS
1,475,226 UART: [kat] --
1,475,817 UART: [cold-reset] ++
1,476,193 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 ready_for_fw is high
1,480,457 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,488,172 UART: [idev] Erasing UDS.KEYID = 0
1,504,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,700 UART: [idev] --
1,513,639 UART: [ldev] ++
1,513,807 UART: [ldev] CDI.KEYID = 6
1,514,170 UART: [ldev] SUBJECT.KEYID = 5
1,514,596 UART: [ldev] AUTHORITY.KEYID = 7
1,515,059 UART: [ldev] FE.KEYID = 1
1,520,451 UART: [ldev] Erasing FE.KEYID = 1
1,546,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,797 UART: [fwproc] Waiting for Commands...
1,586,428 UART: [fwproc] Received command 0x46574c44
1,587,219 UART: [fwproc] Received Image of size 78456 bytes
2,475,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,641 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,614,008 >>> mbox cmd response: success
2,614,008 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,615,192 UART: [afmc] ++
2,615,360 UART: [afmc] CDI.KEYID = 6
2,615,722 UART: [afmc] SUBJECT.KEYID = 7
2,616,147 UART: [afmc] AUTHORITY.KEYID = 5
2,651,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,709 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,399 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,400 UART: [afmc] --
2,694,400 UART: [cold-reset] --
2,695,194 UART: [state] Locking Datavault
2,696,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,951 UART: [state] Locking ICCM
2,697,613 UART: [exit] Launching FMC @ 0x40000130
2,702,942 UART:
2,702,958 UART: Running Caliptra FMC ...
2,703,366 UART:
2,703,420 UART: [state] CFI Enabled
2,713,747 UART: [fht] FMC Alias Private Key: 7
2,821,712 UART: [art] Extend RT PCRs Done
2,822,140 UART: [art] Lock RT PCRs Done
2,823,570 UART: [art] Populate DV Done
2,831,969 UART: [fht] FMC Alias Private Key: 7
2,832,933 UART: [art] Derive CDI
2,833,213 UART: [art] Store in in slot 0x4
2,918,640 UART: [art] Derive Key Pair
2,919,000 UART: [art] Store priv key in slot 0x5
2,932,094 UART: [art] Derive Key Pair - Done
2,946,718 UART: [art] Signing Cert with AUTHO
2,947,198 UART: RITY.KEYID = 7
2,962,170 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,935 UART: [art] PUB.X = 5E26F9984B42261571763CB803E1A0EE2281C4597EA272E41A35757391747ADEF4ED0BA9110D7CD419E8B38D55579DFC
2,969,696 UART: [art] PUB.Y = 13EA5B88796EAFB32819583D532490FF01D3B1B7968ABAF4DA4C77F5EC9F3DE722A76343F03BED967AB4BE730B337581
2,976,650 UART: [art] SIG.R = E791EDAC6E3F8A1E5F3CFC591B271D2B335DBD252AD01C0A7AB22FE9DEB95E26E40C156B651A4ACEB58DB4D1E19E0D6D
2,983,441 UART: [art] SIG.S = C2980A08503A9D59ADFBEFF8CE71620DA61B0A4E8167B8EAC01E73FBB76E076D4E45EB6CD80071537A1B9D0D349E5A53
3,007,308 UART: mbox::rt_entry...
3,007,680 UART: ____ _ _ _ ____ _____
3,008,464 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,264 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,032 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,800 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,568 UART: |_|
3,011,880 UART:
3,118,311 UART: [rt] Runtime listening for mailbox commands...
3,123,279 >>> mbox cmd response data (3272 bytes)
3,123,280 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,146,366 >>> mbox cmd response data (0 bytes)
3,146,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,146,487 UART:
3,146,503 UART: Running Caliptra ROM ...
3,146,911 UART:
3,146,965 UART: [state] CFI Enabled
3,149,391 UART: [state] LifecycleState = Unprovisioned
3,150,046 UART: [state] DebugLocked = No
3,150,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,152,359 UART: [kat] SHA2-256
3,946,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,950,405 UART: [kat] ++
3,950,557 UART: [kat] sha1
3,954,721 UART: [kat] SHA2-256
3,956,659 UART: [kat] SHA2-384
3,959,638 UART: [kat] SHA2-512-ACC
3,961,538 UART: [kat] ECC-384
3,967,321 UART: [kat] HMAC-384Kdf
3,971,855 UART: [kat] LMS
4,540,051 UART: [kat] --
4,540,862 UART: [update-reset] ++
5,872,422 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,873,602 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,023,106 >>> mbox cmd response: success
6,023,369 UART: [update-reset] Copying MAN_2 To MAN_1
6,031,383 UART: [update-reset Success] --
6,032,392 UART: [state] Locking Datavault
6,033,258 UART: [state] Locking PCR0, PCR1 and PCR31
6,033,862 UART: [state] Locking ICCM
6,034,500 UART: [exit] Launching FMC @ 0x40000130
6,039,829 UART:
6,039,845 UART: Running Caliptra FMC ...
6,040,253 UART:
6,040,307 UART: [state] CFI Enabled
6,128,896 UART: [art] Extend RT PCRs Done
6,129,324 UART: [art] Lock RT PCRs Done
6,130,591 UART: [art] Populate DV Done
6,138,912 UART: [fht] FMC Alias Private Key: 7
6,140,054 UART: [art] Derive CDI
6,140,334 UART: [art] Store in in slot 0x4
6,225,581 UART: [art] Derive Key Pair
6,225,941 UART: [art] Store priv key in slot 0x5
6,239,411 UART: [art] Derive Key Pair - Done
6,254,039 UART: [art] Signing Cert with AUTHO
6,254,519 UART: RITY.KEYID = 7
6,269,537 UART: [art] Erasing AUTHORITY.KEYID = 7
6,270,302 UART: [art] PUB.X = 3F6484DEB863C535E44F5A945B5453517C23B3AD4F4EA9B35695EDD97CF01A54CDBCB877261448EFC7F61B9C205E6940
6,277,080 UART: [art] PUB.Y = 390CF7503B26B94C212FC47003C6379CFF77C4B1DADC0C1B4342E263A3C0EAF328AE9F88DB675B896E1E5727DAE548B1
6,284,033 UART: [art] SIG.R = 5FBAAED588131D426E68134C7CF18AD731F2955B80F912DBC153038C9025395D3C74291DEAB9F5FD0EFB2835646A2A41
6,290,803 UART: [art] SIG.S = 66475B724C3C2732827CB97BC8FA81BDC0FFD36DE5C868CECE0EE568E7C2C7874BBA470A84342687EB029FD2629406BB
6,314,648 UART: Caliptra RT
6,314,901 UART: [state] CFI Enabled
6,605,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,606,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,637,382 UART: [rt]cmd =0x494e464f, len=4
6,640,935 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 ready_for_fw is high
1,362,409 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,461,500 >>> mbox cmd response: success
2,461,500 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,522,072 UART:
2,522,088 UART: Running Caliptra FMC ...
2,522,496 UART:
2,522,550 UART: [state] CFI Enabled
2,533,199 UART: [fht] FMC Alias Private Key: 7
2,641,464 UART: [art] Extend RT PCRs Done
2,641,892 UART: [art] Lock RT PCRs Done
2,643,506 UART: [art] Populate DV Done
2,651,765 UART: [fht] FMC Alias Private Key: 7
2,652,743 UART: [art] Derive CDI
2,653,023 UART: [art] Store in in slot 0x4
2,738,700 UART: [art] Derive Key Pair
2,739,060 UART: [art] Store priv key in slot 0x5
2,752,316 UART: [art] Derive Key Pair - Done
2,767,182 UART: [art] Signing Cert with AUTHO
2,767,662 UART: RITY.KEYID = 7
2,782,582 UART: [art] Erasing AUTHORITY.KEYID = 7
2,783,347 UART: [art] PUB.X = 1A06E0B4168ABC690AA511E7D9604BFB326C1F1DEF1168EBFF8229F48D54FB4E293B165833CE368DC72B47C55D770B4E
2,790,120 UART: [art] PUB.Y = CE67A071E6D6EE91DECC751C1C2120D9C5A5FF92A615B11C452F4F2D4DEA18B21294C1E9B08F433221FD3F3BC90C8BA8
2,797,085 UART: [art] SIG.R = A92A44FF9FBD37C7E8A720974FBD5E0C213676476300C0C56B25ED28C4AA8D3B9B3787A2735B7641688914AA3E255750
2,803,830 UART: [art] SIG.S = 7CCCE961835285DEEC37484E5BA533700C8D1F79E4A63071E1329B15249A7F6484AE1E41EC25D6FF47D02D0502C39C93
2,827,306 UART: mbox::rt_entry...
2,827,678 UART: ____ _ _ _ ____ _____
2,828,462 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,829,262 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,830,030 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,830,798 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,831,566 UART: |_|
2,831,878 UART:
2,939,106 UART: [rt] Runtime listening for mailbox commands...
2,944,074 >>> mbox cmd response data (3272 bytes)
2,944,075 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,967,161 >>> mbox cmd response data (0 bytes)
2,967,162 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,351 >>> mbox cmd response: success
5,737,762 UART:
5,737,778 UART: Running Caliptra FMC ...
5,738,186 UART:
5,738,240 UART: [state] CFI Enabled
5,828,027 UART: [art] Extend RT PCRs Done
5,828,455 UART: [art] Lock RT PCRs Done
5,829,926 UART: [art] Populate DV Done
5,838,021 UART: [fht] FMC Alias Private Key: 7
5,839,131 UART: [art] Derive CDI
5,839,411 UART: [art] Store in in slot 0x4
5,925,006 UART: [art] Derive Key Pair
5,925,366 UART: [art] Store priv key in slot 0x5
5,938,806 UART: [art] Derive Key Pair - Done
5,953,534 UART: [art] Signing Cert with AUTHO
5,954,014 UART: RITY.KEYID = 7
5,969,328 UART: [art] Erasing AUTHORITY.KEYID = 7
5,970,093 UART: [art] PUB.X = 77AB4D5265D64F35DADAA97198EDF6729640AB0847C3142F6512E13CFCAF90343942204DF49EDA0E1A3D65C943D3CE6A
5,976,867 UART: [art] PUB.Y = 1A9A9C1EF5FDC36F740B96A7F00E5F40E8AC0BB378FC3E384AAB6C7D7A6FE0DC03BFC429F58A61A4387251979A56031E
5,983,820 UART: [art] SIG.R = 899FE34FFC2F6ECAEC1B1F100E0ADAE32451E97A167A38632B47210473E8FB8A9C413A5A69556F0081BD022812FC191D
5,990,564 UART: [art] SIG.S = ECD9AD1366340F39C9B925E54C4447AC15FE3A5AC5BC1B0F19AEC6462D1717409901B05196141DBF2487D70BCDFA2574
6,015,057 UART: Caliptra RT
6,015,310 UART: [state] CFI Enabled
6,308,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,309,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,073 UART: [rt]cmd =0x494e464f, len=4
6,343,874 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
902,871 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,158 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 ready_for_fw is high
1,481,408 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,506,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,871 UART: [idev] --
1,515,768 UART: [ldev] ++
1,515,936 UART: [ldev] CDI.KEYID = 6
1,516,299 UART: [ldev] SUBJECT.KEYID = 5
1,516,725 UART: [ldev] AUTHORITY.KEYID = 7
1,517,188 UART: [ldev] FE.KEYID = 1
1,522,328 UART: [ldev] Erasing FE.KEYID = 1
1,547,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,265 UART: [ldev] --
1,587,650 UART: [fwproc] Waiting for Commands...
1,588,301 UART: [fwproc] Received command 0x46574c44
1,589,092 UART: [fwproc] Received Image of size 78456 bytes
2,476,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,504,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,602 UART: [fwproc] Loading Runtime at address 0x40005000 len 53772
2,615,755 >>> mbox cmd response: success
2,615,755 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,617,011 UART: [afmc] ++
2,617,179 UART: [afmc] CDI.KEYID = 6
2,617,541 UART: [afmc] SUBJECT.KEYID = 7
2,617,966 UART: [afmc] AUTHORITY.KEYID = 5
2,652,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,669,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,516 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,687,206 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,695,089 UART: [afmc] --
2,696,181 UART: [cold-reset] --
2,696,979 UART: [state] Locking Datavault
2,698,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,708 UART: [state] Locking ICCM
2,699,338 UART: [exit] Launching FMC @ 0x40000130
2,704,667 UART:
2,704,683 UART: Running Caliptra FMC ...
2,705,091 UART:
2,705,234 UART: [state] CFI Enabled
2,715,831 UART: [fht] FMC Alias Private Key: 7
2,823,978 UART: [art] Extend RT PCRs Done
2,824,406 UART: [art] Lock RT PCRs Done
2,826,048 UART: [art] Populate DV Done
2,834,113 UART: [fht] FMC Alias Private Key: 7
2,835,105 UART: [art] Derive CDI
2,835,385 UART: [art] Store in in slot 0x4
2,920,958 UART: [art] Derive Key Pair
2,921,318 UART: [art] Store priv key in slot 0x5
2,934,672 UART: [art] Derive Key Pair - Done
2,949,176 UART: [art] Signing Cert with AUTHO
2,949,656 UART: RITY.KEYID = 7
2,964,742 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,507 UART: [art] PUB.X = 5E057062EE7F9C4875472F05C9AB7CDBC58B012624021FB9EBA7213DB1BDA173F27AC4FF99AAA0189965618192CE7225
2,972,271 UART: [art] PUB.Y = 5C53CEF2D0E183DE237D247984A13418CAF1EA2667CC859471B3D3E376A0A0A32E8FCE4AA952C8C5C55526359296187C
2,979,225 UART: [art] SIG.R = B4C83270649C62FEF1BB833FF917B610211A246A05DE3D3F14487AC5EBE08B42E1730298F3F9D814B31D38CB7D2EC6BF
2,985,999 UART: [art] SIG.S = 6931230614E0D7BD59D91EA5AA93356D84A24606B168FB948968E7995B653B2F5B6875878CB29B900A966EF028AC80EB
3,009,925 UART: mbox::rt_entry...
3,010,297 UART: ____ _ _ _ ____ _____
3,011,081 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,649 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,417 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,185 UART: |_|
3,014,497 UART:
3,120,827 UART: [rt] Runtime listening for mailbox commands...
3,125,795 >>> mbox cmd response data (3272 bytes)
3,125,796 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,148,882 >>> mbox cmd response data (0 bytes)
3,148,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,149,003 UART:
3,149,019 UART: Running Caliptra ROM ...
3,149,427 UART:
3,149,568 UART: [state] CFI Enabled
3,152,324 UART: [state] LifecycleState = Unprovisioned
3,152,979 UART: [state] DebugLocked = No
3,153,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,348 UART: [kat] SHA2-256
3,949,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,394 UART: [kat] ++
3,953,546 UART: [kat] sha1
3,957,826 UART: [kat] SHA2-256
3,959,764 UART: [kat] SHA2-384
3,962,661 UART: [kat] SHA2-512-ACC
3,964,561 UART: [kat] ECC-384
3,969,990 UART: [kat] HMAC-384Kdf
3,974,534 UART: [kat] LMS
4,542,730 UART: [kat] --
4,543,857 UART: [update-reset] ++
5,875,583 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,876,669 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
6,026,173 >>> mbox cmd response: success
6,026,306 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,320 UART: [update-reset Success] --
6,035,561 UART: [state] Locking Datavault
6,036,461 UART: [state] Locking PCR0, PCR1 and PCR31
6,037,065 UART: [state] Locking ICCM
6,037,649 UART: [exit] Launching FMC @ 0x40000130
6,042,978 UART:
6,042,994 UART: Running Caliptra FMC ...
6,043,402 UART:
6,043,545 UART: [state] CFI Enabled
6,132,816 UART: [art] Extend RT PCRs Done
6,133,244 UART: [art] Lock RT PCRs Done
6,134,383 UART: [art] Populate DV Done
6,142,746 UART: [fht] FMC Alias Private Key: 7
6,143,736 UART: [art] Derive CDI
6,144,016 UART: [art] Store in in slot 0x4
6,229,767 UART: [art] Derive Key Pair
6,230,127 UART: [art] Store priv key in slot 0x5
6,243,833 UART: [art] Derive Key Pair - Done
6,258,355 UART: [art] Signing Cert with AUTHO
6,258,835 UART: RITY.KEYID = 7
6,273,941 UART: [art] Erasing AUTHORITY.KEYID = 7
6,274,706 UART: [art] PUB.X = 6BE05E7EABE3B9D46A6B1F12B9BADF9DE8632A4B92466453EE1E84276725C2E37BABC936472887D8C1E8E1A77FE75411
6,281,488 UART: [art] PUB.Y = 86B1B45F663FE65B06BFB7D833D562508C92A98DB8FDE9AEBE62B0FC9127AB1572EA9052E310BF496B3BE7588543D650
6,288,445 UART: [art] SIG.R = 1B452D7CD8ADCC422B547BB2A720CDC45D14CBAD79D7BD4F835FE8E3CF333117D0E1738D0CB50A4DB378925ED6F97910
6,295,227 UART: [art] SIG.S = 0BF3FFE07F8235FC130D88FBA4D40535F31F425B0436A9E68650DDB290E2A58D557AB80B6ECF6BCCF2B4C655A16173E5
6,319,445 UART: Caliptra RT
6,319,790 UART: [state] CFI Enabled
6,613,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,615,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,449 UART: [rt]cmd =0x494e464f, len=4
6,649,186 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,238 ready_for_fw is high
1,363,238 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,463,923 >>> mbox cmd response: success
2,463,923 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,171 UART:
2,526,187 UART: Running Caliptra FMC ...
2,526,595 UART:
2,526,738 UART: [state] CFI Enabled
2,537,185 UART: [fht] FMC Alias Private Key: 7
2,644,738 UART: [art] Extend RT PCRs Done
2,645,166 UART: [art] Lock RT PCRs Done
2,646,716 UART: [art] Populate DV Done
2,655,281 UART: [fht] FMC Alias Private Key: 7
2,656,265 UART: [art] Derive CDI
2,656,545 UART: [art] Store in in slot 0x4
2,742,026 UART: [art] Derive Key Pair
2,742,386 UART: [art] Store priv key in slot 0x5
2,755,806 UART: [art] Derive Key Pair - Done
2,770,508 UART: [art] Signing Cert with AUTHO
2,770,988 UART: RITY.KEYID = 7
2,786,382 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,147 UART: [art] PUB.X = 2FF5B9E8C2C2A3F63261E768E6F50EBB3301E39C93CB823E7973CAC269071DE985F67BEBD1469AEC5DDAE8F3900EFB44
2,793,923 UART: [art] PUB.Y = 961AEA02074D9791F102F5D634D205826CD9D6CD031B4B13047FD719CAF33F87C57EF4EE8DE6A7D4F94CF96B3BE7E315
2,800,867 UART: [art] SIG.R = A93C53757A5739ACEA1496BE469C61882A266051888560062EB808C89C1E99BD69D2E24CB1C7B92BA45CAA5BE50D1062
2,807,630 UART: [art] SIG.S = B0D790FCBE29D543BF501D87FF831B0BFC1329F5C2414C4F44134E9CC1EFD60B3D8090D34A159EF472622DB13EBE2ADD
2,831,129 UART: mbox::rt_entry...
2,831,501 UART: ____ _ _ _ ____ _____
2,832,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,085 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,853 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,621 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,389 UART: |_|
2,835,701 UART:
2,941,780 UART: [rt] Runtime listening for mailbox commands...
2,946,748 >>> mbox cmd response data (3272 bytes)
2,946,749 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,969,835 >>> mbox cmd response data (0 bytes)
2,969,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,728,296 >>> mbox cmd response: success
5,741,461 UART:
5,741,477 UART: Running Caliptra FMC ...
5,741,885 UART:
5,742,028 UART: [state] CFI Enabled
5,831,235 UART: [art] Extend RT PCRs Done
5,831,663 UART: [art] Lock RT PCRs Done
5,832,804 UART: [art] Populate DV Done
5,841,147 UART: [fht] FMC Alias Private Key: 7
5,842,231 UART: [art] Derive CDI
5,842,511 UART: [art] Store in in slot 0x4
5,928,276 UART: [art] Derive Key Pair
5,928,636 UART: [art] Store priv key in slot 0x5
5,942,442 UART: [art] Derive Key Pair - Done
5,957,432 UART: [art] Signing Cert with AUTHO
5,957,912 UART: RITY.KEYID = 7
5,972,770 UART: [art] Erasing AUTHORITY.KEYID = 7
5,973,535 UART: [art] PUB.X = 62D9A493B1485117E0AE76CCF67A7499F591BB2C087AC9C03931BE72AA6A1C000909531431FD3745E60882B1FBE5BC27
5,980,273 UART: [art] PUB.Y = 82C5CFBCBFB067FA156026A0B80B4ACE8F14F076B32CA4FCE1107FCF26AF708811EC70307CCBCB35206EF3DDA66481BB
5,987,244 UART: [art] SIG.R = 3768729F8B5D3D6D215C8AC4E2A79B98CDC676F66F86F7671E3B8ED6C14BDDD132B762B20FDF457D2DEBD72060F659A1
5,994,025 UART: [art] SIG.S = 080BF6B6A6355514803354F323DE9BE2F7212E3D497231EC0531CE805825675429850FFD46C4B362904AFE5CB3AAE119
6,018,032 UART: Caliptra RT
6,018,377 UART: [state] CFI Enabled
6,309,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,311,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,341,722 UART: [rt]cmd =0x494e464f, len=4
6,345,527 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
893,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,551 UART: [kat] ++
897,703 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,634 UART: [kat] SHA2-512-ACC
908,535 UART: [kat] ECC-384
917,944 UART: [kat] HMAC-384Kdf
922,662 UART: [kat] LMS
1,170,990 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,051 UART: [fht] FHT @ 0x50003400
1,174,528 UART: [idev] ++
1,174,696 UART: [idev] CDI.KEYID = 6
1,175,056 UART: [idev] SUBJECT.KEYID = 7
1,175,480 UART: [idev] UDS.KEYID = 0
1,175,825 ready_for_fw is high
1,175,825 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,616 UART: [idev] Erasing UDS.KEYID = 0
1,200,515 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,209,787 UART: [ldev] ++
1,209,955 UART: [ldev] CDI.KEYID = 6
1,210,318 UART: [ldev] SUBJECT.KEYID = 5
1,210,744 UART: [ldev] AUTHORITY.KEYID = 7
1,211,207 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,742 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,309,847 >>> mbox cmd response: success
2,309,847 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,023 UART: [afmc] ++
2,311,191 UART: [afmc] CDI.KEYID = 6
2,311,553 UART: [afmc] SUBJECT.KEYID = 7
2,311,978 UART: [afmc] AUTHORITY.KEYID = 5
2,347,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,722 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,607 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,326 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,132 UART: [afmc] --
2,390,160 UART: [cold-reset] --
2,390,760 UART: [state] Locking Datavault
2,391,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,471 UART: [state] Locking ICCM
2,393,033 UART: [exit] Launching FMC @ 0x40000130
2,398,362 UART:
2,398,378 UART: Running Caliptra FMC ...
2,398,786 UART:
2,398,840 UART: [state] CFI Enabled
2,409,687 UART: [fht] FMC Alias Private Key: 7
2,517,658 UART: [art] Extend RT PCRs Done
2,518,086 UART: [art] Lock RT PCRs Done
2,519,618 UART: [art] Populate DV Done
2,528,023 UART: [fht] FMC Alias Private Key: 7
2,529,191 UART: [art] Derive CDI
2,529,471 UART: [art] Store in in slot 0x4
2,614,964 UART: [art] Derive Key Pair
2,615,324 UART: [art] Store priv key in slot 0x5
2,628,400 UART: [art] Derive Key Pair - Done
2,643,237 UART: [art] Signing Cert with AUTHO
2,643,717 UART: RITY.KEYID = 7
2,658,831 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,596 UART: [art] PUB.X = BB506422BE574113BB4B49DACDF0D1C0447B575CB1212BF68FE0E2247CD808D71723C2252EEE01A9DB3775D8CA81C02A
2,666,372 UART: [art] PUB.Y = CFBCE8C1AC64D196E4FC819A146271A653CE448969ED193AF490E9A83D9B85C1540F3C5729DB119044E80C7A025C30CD
2,673,321 UART: [art] SIG.R = A463A793EB041E82CF39FD35D67976A749025E327E86DCCF8C3484C31FB80B2E770E2FDA5133FBCE05A94ECEC81B512F
2,680,090 UART: [art] SIG.S = AE214949878248431A9194A500DE5C06F7BA3DDDFD4893768222CBA032FFB13CD1E00B4EC900DB501C8B6F4A2EDFD1F1
2,703,809 UART: mbox::rt_entry...
2,704,181 UART: ____ _ _ _ ____ _____
2,704,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,765 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,069 UART: |_|
2,708,381 UART:
2,814,306 UART: [rt] Runtime listening for mailbox commands...
2,819,274 >>> mbox cmd response data (3272 bytes)
2,819,275 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,361 >>> mbox cmd response data (0 bytes)
2,842,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,842,479 UART:
2,842,495 UART: Running Caliptra ROM ...
2,842,903 UART:
2,842,958 UART: [state] CFI Enabled
2,845,680 UART: [state] LifecycleState = Unprovisioned
2,846,335 UART: [state] DebugLocked = No
2,846,955 UART: [state] WD Timer not started. Device not locked for debugging
2,848,255 UART: [kat] SHA2-256
3,653,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,658,030 UART: [kat] ++
3,658,182 UART: [kat] sha1
3,662,490 UART: [kat] SHA2-256
3,664,430 UART: [kat] SHA2-384
3,667,199 UART: [kat] SHA2-512-ACC
3,669,099 UART: [kat] ECC-384
3,678,946 UART: [kat] HMAC-384Kdf
3,683,498 UART: [kat] LMS
3,931,826 UART: [kat] --
3,932,964 UART: [update-reset] ++
5,241,238 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,242,317 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,391,769 >>> mbox cmd response: success
5,392,014 UART: [update-reset] Copying MAN_2 To MAN_1
5,400,028 UART: [update-reset Success] --
5,401,123 UART: [state] Locking Datavault
5,401,765 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,369 UART: [state] Locking ICCM
5,402,889 UART: [exit] Launching FMC @ 0x40000130
5,408,218 UART:
5,408,234 UART: Running Caliptra FMC ...
5,408,642 UART:
5,408,696 UART: [state] CFI Enabled
5,497,615 UART: [art] Extend RT PCRs Done
5,498,043 UART: [art] Lock RT PCRs Done
5,499,314 UART: [art] Populate DV Done
5,507,589 UART: [fht] FMC Alias Private Key: 7
5,508,709 UART: [art] Derive CDI
5,508,989 UART: [art] Store in in slot 0x4
5,594,970 UART: [art] Derive Key Pair
5,595,330 UART: [art] Store priv key in slot 0x5
5,608,344 UART: [art] Derive Key Pair - Done
5,623,075 UART: [art] Signing Cert with AUTHO
5,623,555 UART: RITY.KEYID = 7
5,638,713 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,478 UART: [art] PUB.X = 7973B2F51A445DDB929A598142D8CC91850497783459C8B250E1F4BC1D4F3E6910F7D31332C580B03524CC78E74624C6
5,646,237 UART: [art] PUB.Y = C4F8D27E3A7D3DB0A3569C1A03DCE1B123332CAEF9FD3EDDC314E6EF235740A89BFC690E3C7AFB9F2C42C13A3F18EBE2
5,653,209 UART: [art] SIG.R = A8608298CCFA4DB7459D7B2D994A7332C0C14C502538FD4E731796325548BC5649EA1D10A6D125569BA0BE2C21F79219
5,659,977 UART: [art] SIG.S = 44B1A1E2238D76365DF546C254B8E771EB758CB658284EC508B3422B2474B9B4D686D9C875A7DFD6B45D27EC130E3199
5,683,820 UART: Caliptra RT
5,684,073 UART: [state] CFI Enabled
5,978,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,979,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,001 UART: [rt]cmd =0x494e464f, len=4
6,013,730 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,571 ready_for_fw is high
1,059,571 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,159,712 >>> mbox cmd response: success
2,159,712 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,221,970 UART:
2,221,986 UART: Running Caliptra FMC ...
2,222,394 UART:
2,222,448 UART: [state] CFI Enabled
2,233,051 UART: [fht] FMC Alias Private Key: 7
2,341,432 UART: [art] Extend RT PCRs Done
2,341,860 UART: [art] Lock RT PCRs Done
2,343,200 UART: [art] Populate DV Done
2,351,265 UART: [fht] FMC Alias Private Key: 7
2,352,241 UART: [art] Derive CDI
2,352,521 UART: [art] Store in in slot 0x4
2,437,870 UART: [art] Derive Key Pair
2,438,230 UART: [art] Store priv key in slot 0x5
2,451,100 UART: [art] Derive Key Pair - Done
2,466,220 UART: [art] Signing Cert with AUTHO
2,466,700 UART: RITY.KEYID = 7
2,481,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,599 UART: [art] PUB.X = DFABF7F333004CCC00F9B8D8794D5BED669D4FDA7AAA1EFE5F040B7F13D450AB5492887E50423A975D29AE727A261BFE
2,489,339 UART: [art] PUB.Y = 25823DFC878BDA917E18BE1CF7AF4A9A52AC2059FD89E4FB3BCAE927314EEA60F41BAB950F7E4C4CE0B3533395EAF9F7
2,496,310 UART: [art] SIG.R = 1D41C42D95995B91E3FF16739D5AA75815E32F81A404248ABCB69F8F169CE0D03BEBD213A7D9C4F68E3A75B43B66314B
2,503,085 UART: [art] SIG.S = 6F3C3044AF6AC95AAD13F0718325CE9458125F14DC2A880125F805A04B792B3E2F2DDCA312E5D588BAF8EBF69F53A677
2,526,814 UART: mbox::rt_entry...
2,527,186 UART: ____ _ _ _ ____ _____
2,527,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,306 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,074 UART: |_|
2,531,386 UART:
2,637,598 UART: [rt] Runtime listening for mailbox commands...
2,642,566 >>> mbox cmd response data (3272 bytes)
2,642,567 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,653 >>> mbox cmd response data (0 bytes)
2,665,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,099,614 >>> mbox cmd response: success
5,113,130 UART:
5,113,146 UART: Running Caliptra FMC ...
5,113,554 UART:
5,113,608 UART: [state] CFI Enabled
5,202,817 UART: [art] Extend RT PCRs Done
5,203,245 UART: [art] Lock RT PCRs Done
5,204,390 UART: [art] Populate DV Done
5,212,499 UART: [fht] FMC Alias Private Key: 7
5,213,551 UART: [art] Derive CDI
5,213,831 UART: [art] Store in in slot 0x4
5,299,436 UART: [art] Derive Key Pair
5,299,796 UART: [art] Store priv key in slot 0x5
5,313,700 UART: [art] Derive Key Pair - Done
5,328,479 UART: [art] Signing Cert with AUTHO
5,328,959 UART: RITY.KEYID = 7
5,343,863 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,628 UART: [art] PUB.X = 24B9207E4D3835C5A2B4A2AF08247007D1F96F951A4A4F1F4618CD7DFFD1DBA25196071334AB708DDD6795563422919A
5,351,389 UART: [art] PUB.Y = 162CF2FD9F8A6C787EE29087A990C1BE61F4D6CFADE6A6E7E52B2ABD33E751F6808658BA782EFAFEE7C1C6E78B2EE9BC
5,358,367 UART: [art] SIG.R = 93B49DFE034456A1BBCC1031BF821A3CD1B20B265ABE61DF4B221E237D3D2F0338D0D5EE0EEDA859913530B5C3F12A32
5,365,139 UART: [art] SIG.S = BA7E20D9B50970B6372E66C61248348F559FAA99912FA5CFBECD90CF3EF891A3BBA5F058FEA67E838E334CCBE4AF645B
5,388,767 UART: Caliptra RT
5,389,020 UART: [state] CFI Enabled
5,675,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,676,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,706,881 UART: [rt]cmd =0x494e464f, len=4
5,710,566 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,536 UART: [kat] SHA2-256
904,476 UART: [kat] SHA2-384
907,233 UART: [kat] SHA2-512-ACC
909,134 UART: [kat] ECC-384
918,957 UART: [kat] HMAC-384Kdf
923,601 UART: [kat] LMS
1,171,929 UART: [kat] --
1,173,074 UART: [cold-reset] ++
1,173,616 UART: [fht] FHT @ 0x50003400
1,176,395 UART: [idev] ++
1,176,563 UART: [idev] CDI.KEYID = 6
1,176,923 UART: [idev] SUBJECT.KEYID = 7
1,177,347 UART: [idev] UDS.KEYID = 0
1,177,692 ready_for_fw is high
1,177,692 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,185,241 UART: [idev] Erasing UDS.KEYID = 0
1,202,286 UART: [idev] Sha1 KeyId Algorithm
1,210,892 UART: [idev] --
1,211,810 UART: [ldev] ++
1,211,978 UART: [ldev] CDI.KEYID = 6
1,212,341 UART: [ldev] SUBJECT.KEYID = 5
1,212,767 UART: [ldev] AUTHORITY.KEYID = 7
1,213,230 UART: [ldev] FE.KEYID = 1
1,218,580 UART: [ldev] Erasing FE.KEYID = 1
1,245,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,146 UART: [ldev] --
1,284,647 UART: [fwproc] Wait for Commands...
1,285,401 UART: [fwproc] Recv command 0x46574c44
1,286,129 UART: [fwproc] Recv'd Img size: 78456 bytes
2,173,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,761 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,312,828 >>> mbox cmd response: success
2,312,828 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,314,014 UART: [afmc] ++
2,314,182 UART: [afmc] CDI.KEYID = 6
2,314,544 UART: [afmc] SUBJECT.KEYID = 7
2,314,969 UART: [afmc] AUTHORITY.KEYID = 5
2,350,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,021 UART: [afmc] --
2,393,909 UART: [cold-reset] --
2,394,981 UART: [state] Locking Datavault
2,396,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,608 UART: [state] Locking ICCM
2,397,074 UART: [exit] Launching FMC @ 0x40000130
2,402,403 UART:
2,402,419 UART: Running Caliptra FMC ...
2,402,827 UART:
2,402,970 UART: [state] CFI Enabled
2,413,677 UART: [fht] FMC Alias Private Key: 7
2,521,194 UART: [art] Extend RT PCRs Done
2,521,622 UART: [art] Lock RT PCRs Done
2,523,086 UART: [art] Populate DV Done
2,531,321 UART: [fht] FMC Alias Private Key: 7
2,532,461 UART: [art] Derive CDI
2,532,741 UART: [art] Store in in slot 0x4
2,618,460 UART: [art] Derive Key Pair
2,618,820 UART: [art] Store priv key in slot 0x5
2,631,950 UART: [art] Derive Key Pair - Done
2,646,804 UART: [art] Signing Cert with AUTHO
2,647,284 UART: RITY.KEYID = 7
2,662,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,515 UART: [art] PUB.X = F5AF5D69173AF09DF6516F45F3A65ED921964CEACA6ECC4E51BB2DC6D4741B68FC3849EC3C9E8A9276E565F865479ADC
2,670,303 UART: [art] PUB.Y = 96662EE54148B6FB6B35055801CFF413B56E642AAB7C48FF66A496C70116B128805E7D1E9FF1915407EFEFCE94518BD7
2,677,245 UART: [art] SIG.R = 30BB17F8B2E395B0167CDFE0436C8FF666F1466C21C732A394C533870B25C1F2A4B33580852AC428ABBA29DB1C21D900
2,683,994 UART: [art] SIG.S = A87020EB989DE6BF022F6579609AA7DE5708130A468681105DE76DC44C3672541DE91E1EB0042317BA18A6A4084229D2
2,707,668 UART: mbox::rt_entry...
2,708,040 UART: ____ _ _ _ ____ _____
2,708,824 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,624 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,160 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,928 UART: |_|
2,712,240 UART:
2,819,362 UART: [rt] Runtime listening for mailbox commands...
2,824,330 >>> mbox cmd response data (3272 bytes)
2,824,331 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,847,417 >>> mbox cmd response data (0 bytes)
2,847,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,847,535 UART:
2,847,551 UART: Running Caliptra ROM ...
2,847,959 UART:
2,848,101 UART: [state] CFI Enabled
2,851,043 UART: [state] LifecycleState = Unprovisioned
2,851,698 UART: [state] DebugLocked = No
2,852,196 UART: [state] WD Timer not started. Device not locked for debugging
2,853,316 UART: [kat] SHA2-256
3,658,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,663,091 UART: [kat] ++
3,663,243 UART: [kat] sha1
3,667,691 UART: [kat] SHA2-256
3,669,631 UART: [kat] SHA2-384
3,672,466 UART: [kat] SHA2-512-ACC
3,674,366 UART: [kat] ECC-384
3,684,109 UART: [kat] HMAC-384Kdf
3,688,797 UART: [kat] LMS
3,937,125 UART: [kat] --
3,938,035 UART: [update-reset] ++
5,247,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,290 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,397,742 >>> mbox cmd response: success
5,398,057 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,071 UART: [update-reset Success] --
5,407,220 UART: [state] Locking Datavault
5,407,782 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,386 UART: [state] Locking ICCM
5,408,928 UART: [exit] Launching FMC @ 0x40000130
5,414,257 UART:
5,414,273 UART: Running Caliptra FMC ...
5,414,681 UART:
5,414,824 UART: [state] CFI Enabled
5,504,539 UART: [art] Extend RT PCRs Done
5,504,967 UART: [art] Lock RT PCRs Done
5,506,100 UART: [art] Populate DV Done
5,514,143 UART: [fht] FMC Alias Private Key: 7
5,515,289 UART: [art] Derive CDI
5,515,569 UART: [art] Store in in slot 0x4
5,601,366 UART: [art] Derive Key Pair
5,601,726 UART: [art] Store priv key in slot 0x5
5,614,764 UART: [art] Derive Key Pair - Done
5,629,447 UART: [art] Signing Cert with AUTHO
5,629,927 UART: RITY.KEYID = 7
5,644,391 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,156 UART: [art] PUB.X = DE0A2911A563C5A87A27B73D87171974808E7246340CA2756EFC32D350310E8F67173681A9D23629D5E7624AA72A6BB6
5,651,909 UART: [art] PUB.Y = 30512CA14AB10CD7F04B448A2E19D45F0C777D3BFB4AE2694C90ADBB96FA9EB4C42361920ECE2B2FA1ABD49625427E06
5,658,863 UART: [art] SIG.R = 994E87746DCEF56C28D50C5C13D2AE54E30CB5EF314DC42277D134F136A9E990BF8AD47A14263EBCA56D550845D8AC1A
5,665,636 UART: [art] SIG.S = E9DBFB3F6DA39E1DE7425A2295AAA41531C35419C7CF54A81DA1B113122BE678C9076CD418134BF281B26B0E8143FD0D
5,689,378 UART: Caliptra RT
5,689,723 UART: [state] CFI Enabled
5,986,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,987,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,018,242 UART: [rt]cmd =0x494e464f, len=4
6,021,977 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,226 ready_for_fw is high
1,061,226 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,163,737 >>> mbox cmd response: success
2,163,737 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,941 UART:
2,225,957 UART: Running Caliptra FMC ...
2,226,365 UART:
2,226,508 UART: [state] CFI Enabled
2,236,985 UART: [fht] FMC Alias Private Key: 7
2,344,912 UART: [art] Extend RT PCRs Done
2,345,340 UART: [art] Lock RT PCRs Done
2,346,694 UART: [art] Populate DV Done
2,354,883 UART: [fht] FMC Alias Private Key: 7
2,355,827 UART: [art] Derive CDI
2,356,107 UART: [art] Store in in slot 0x4
2,441,464 UART: [art] Derive Key Pair
2,441,824 UART: [art] Store priv key in slot 0x5
2,455,018 UART: [art] Derive Key Pair - Done
2,469,948 UART: [art] Signing Cert with AUTHO
2,470,428 UART: RITY.KEYID = 7
2,485,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,567 UART: [art] PUB.X = D8E8028220D164187E1DDF4965E1A946BFA4D7F7D021180CF2B0AB3B991CBF0C757E1FCD1509F3307FA75A0C6E93DBF6
2,493,336 UART: [art] PUB.Y = DE31E2BACAE7EE35F6B86E0861DFD7CB5472045E2537FE33D3BEFAFA02CD5033F32F2131AB9A425D0929DF1D31714174
2,500,290 UART: [art] SIG.R = 979D82E897707FC51B0748CE296772581001A6B5DFD81BE57369A0B727EFE576E035C096FB62CC9D2C97EFC77B03CABD
2,507,059 UART: [art] SIG.S = 4ADD17D985DDB2DE1E11805581B6F55078EA6528966D3C0AA462BEA7FE56B3446A08A2614283A4B9202AE9532BF25C86
2,530,588 UART: mbox::rt_entry...
2,530,960 UART: ____ _ _ _ ____ _____
2,531,744 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,544 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,080 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,848 UART: |_|
2,535,160 UART:
2,641,534 UART: [rt] Runtime listening for mailbox commands...
2,646,502 >>> mbox cmd response data (3272 bytes)
2,646,503 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,669,589 >>> mbox cmd response data (0 bytes)
2,669,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,103,187 >>> mbox cmd response: success
5,116,395 UART:
5,116,411 UART: Running Caliptra FMC ...
5,116,819 UART:
5,116,962 UART: [state] CFI Enabled
5,206,265 UART: [art] Extend RT PCRs Done
5,206,693 UART: [art] Lock RT PCRs Done
5,207,948 UART: [art] Populate DV Done
5,216,323 UART: [fht] FMC Alias Private Key: 7
5,217,459 UART: [art] Derive CDI
5,217,739 UART: [art] Store in in slot 0x4
5,303,098 UART: [art] Derive Key Pair
5,303,458 UART: [art] Store priv key in slot 0x5
5,317,012 UART: [art] Derive Key Pair - Done
5,331,371 UART: [art] Signing Cert with AUTHO
5,331,851 UART: RITY.KEYID = 7
5,347,173 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,938 UART: [art] PUB.X = 33E5C242847BD993ECC3F47376516BFBE8A021A9E33EFB5221AF12A9B4FB5BE96DECA072C64C59AC061CED5D42D0D19E
5,354,725 UART: [art] PUB.Y = 12A2AA24D40AF7FD9D34ACC644095505D09BA7DB3B8AB7AE99EE8D8BB10A9ACE34F74AA62132768AAF65A7B102EDD1EB
5,361,686 UART: [art] SIG.R = 20B235A88B7A0042B98CE9E0DD43180377263AE7AEE27F16BC185C4F8F4405129BE9BDB7172DE9667FC0AF81004F0D15
5,368,409 UART: [art] SIG.S = 55B84A57C2863BFA671D6DE8F9606E5A7E896EF8C90939F1F337819EA358E924F6F9855AB9F6318440BF6D724AE3A1CA
5,392,461 UART: Caliptra RT
5,392,806 UART: [state] CFI Enabled
5,682,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,683,358 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,714,006 UART: [rt]cmd =0x494e464f, len=4
5,717,571 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,653 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,174,845 ready_for_fw is high
1,174,845 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,561 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,725 UART: [idev] --
1,209,806 UART: [ldev] ++
1,209,974 UART: [ldev] CDI.KEYID = 6
1,210,338 UART: [ldev] SUBJECT.KEYID = 5
1,210,765 UART: [ldev] AUTHORITY.KEYID = 7
1,211,228 UART: [ldev] FE.KEYID = 1
1,216,526 UART: [ldev] Erasing FE.KEYID = 1
1,242,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,240 UART: [ldev] --
1,282,716 UART: [fwproc] Wait for Commands...
1,283,315 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 78456 bytes
2,171,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,383 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,310,349 >>> mbox cmd response: success
2,310,349 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,612 UART: [afmc] ++
2,311,780 UART: [afmc] CDI.KEYID = 6
2,312,143 UART: [afmc] SUBJECT.KEYID = 7
2,312,569 UART: [afmc] AUTHORITY.KEYID = 5
2,348,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,923 UART: [afmc] --
2,391,825 UART: [cold-reset] --
2,392,725 UART: [state] Locking Datavault
2,394,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,646 UART: [state] Locking ICCM
2,395,166 UART: [exit] Launching FMC @ 0x40000130
2,400,495 UART:
2,400,511 UART: Running Caliptra FMC ...
2,400,919 UART:
2,400,973 UART: [state] CFI Enabled
2,411,708 UART: [fht] FMC Alias Private Key: 7
2,519,481 UART: [art] Extend RT PCRs Done
2,519,909 UART: [art] Lock RT PCRs Done
2,521,391 UART: [art] Populate DV Done
2,529,586 UART: [fht] FMC Alias Private Key: 7
2,530,710 UART: [art] Derive CDI
2,530,990 UART: [art] Store in in slot 0x4
2,616,685 UART: [art] Derive Key Pair
2,617,045 UART: [art] Store priv key in slot 0x5
2,630,249 UART: [art] Derive Key Pair - Done
2,644,707 UART: [art] Signing Cert with AUTHO
2,645,187 UART: RITY.KEYID = 7
2,660,345 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,110 UART: [art] PUB.X = 9B0FDB82115DBD5717578615DA8C50AFC12E582746ABF9F6A875C3F17CD0F944D8D680B855BCFE1F57C3FEA5480D974E
2,667,888 UART: [art] PUB.Y = 6289AF406F86F4079369845A05EFD02E95D47D2AE6627D99D9794A4CF7D7B05402CE84AABF7A93E9FBF873EF2261C11C
2,674,837 UART: [art] SIG.R = F6B4EB3E0C75FD545AAE245D2C6A32CCEE4E87CEE9950AA17B5C43A76880DF245A63B4A67CB68C5C09FF61CB892AAD06
2,681,619 UART: [art] SIG.S = 6C43262966AEFD22C9218E3971A94038D9AB12AD46E02BA1E7589920215A54DA093A431D1E0D91E2EB02FED9174E51F6
2,705,461 UART: mbox::rt_entry...
2,705,833 UART: ____ _ _ _ ____ _____
2,706,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,721 UART: |_|
2,710,033 UART:
2,815,313 UART: [rt] Runtime listening for mailbox commands...
2,820,281 >>> mbox cmd response data (3272 bytes)
2,820,282 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,368 >>> mbox cmd response data (0 bytes)
2,843,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,486 UART:
2,843,502 UART: Running Caliptra ROM ...
2,843,910 UART:
2,843,965 UART: [state] CFI Enabled
2,846,477 UART: [state] LifecycleState = Unprovisioned
2,847,132 UART: [state] DebugLocked = No
2,847,720 UART: [state] WD Timer not started. Device not locked for debugging
2,848,922 UART: [kat] SHA2-256
3,652,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,601 UART: [kat] ++
3,656,753 UART: [kat] sha1
3,660,891 UART: [kat] SHA2-256
3,662,831 UART: [kat] SHA2-384
3,665,488 UART: [kat] SHA2-512-ACC
3,667,388 UART: [kat] ECC-384
3,676,969 UART: [kat] HMAC-384Kdf
3,681,481 UART: [kat] LMS
3,929,793 UART: [kat] --
3,930,677 UART: [update-reset] ++
5,239,620 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,240,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,390,209 >>> mbox cmd response: success
5,390,404 UART: [update-reset] Copying MAN_2 To MAN_1
5,398,418 UART: [update-reset Success] --
5,399,547 UART: [state] Locking Datavault
5,400,171 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,775 UART: [state] Locking ICCM
5,401,407 UART: [exit] Launching FMC @ 0x40000130
5,406,736 UART:
5,406,752 UART: Running Caliptra FMC ...
5,407,160 UART:
5,407,214 UART: [state] CFI Enabled
5,495,727 UART: [art] Extend RT PCRs Done
5,496,155 UART: [art] Lock RT PCRs Done
5,497,546 UART: [art] Populate DV Done
5,505,619 UART: [fht] FMC Alias Private Key: 7
5,506,621 UART: [art] Derive CDI
5,506,901 UART: [art] Store in in slot 0x4
5,592,750 UART: [art] Derive Key Pair
5,593,110 UART: [art] Store priv key in slot 0x5
5,606,474 UART: [art] Derive Key Pair - Done
5,621,057 UART: [art] Signing Cert with AUTHO
5,621,537 UART: RITY.KEYID = 7
5,636,837 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,602 UART: [art] PUB.X = 5AE92D407B837B429FDA23B8740751662D72D0C48A9A3CF5AF44027CD78F26D983284002F8315FD095CF5E6279C5871C
5,644,361 UART: [art] PUB.Y = C3AD5DB3AC1D0FB95E336ABC25CE0B865DE7BD85A91B2207EDAE00B334CCF7D01DA625253696569A2F4969F4F464B676
5,651,296 UART: [art] SIG.R = 4A7E0E61C745D10D886903E66C6A950D8CFF9999EAA755B4CB34CFA35E918301A3355376A4A7B266DE7D29AE0F29D436
5,658,054 UART: [art] SIG.S = 9C0D945FE9BF6683738E44154DA448EB44895ED4086F551BA8089A76D7BAD431DAA4A5727910EAB16BC67273F9B281F7
5,682,366 UART: Caliptra RT
5,682,619 UART: [state] CFI Enabled
5,974,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,976,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,751 UART: [rt]cmd =0x494e464f, len=4
6,010,354 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,636 ready_for_fw is high
1,056,636 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,157,787 >>> mbox cmd response: success
2,157,787 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,219,921 UART:
2,219,937 UART: Running Caliptra FMC ...
2,220,345 UART:
2,220,399 UART: [state] CFI Enabled
2,231,192 UART: [fht] FMC Alias Private Key: 7
2,338,933 UART: [art] Extend RT PCRs Done
2,339,361 UART: [art] Lock RT PCRs Done
2,340,897 UART: [art] Populate DV Done
2,349,102 UART: [fht] FMC Alias Private Key: 7
2,350,164 UART: [art] Derive CDI
2,350,444 UART: [art] Store in in slot 0x4
2,436,457 UART: [art] Derive Key Pair
2,436,817 UART: [art] Store priv key in slot 0x5
2,449,877 UART: [art] Derive Key Pair - Done
2,464,574 UART: [art] Signing Cert with AUTHO
2,465,054 UART: RITY.KEYID = 7
2,479,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,733 UART: [art] PUB.X = FA697A82A96A777280923AAE2B753BDC8DE23E06431367D10570360B43F2895118A022965E2BE20FD1EE4DB32EE32767
2,487,489 UART: [art] PUB.Y = 8B71B237A45BB04980A11A1C1F24CEB53FE4BF22DD74E992FF04185203534AA31352CB5495C2573534E04AC7A7529E36
2,494,433 UART: [art] SIG.R = B7DACE2939685E5860AA5871886C1784C8DB6A871DF7B3BD7D8C20719221F3C048424893F91F2E524703AF5A60CB8A6E
2,501,202 UART: [art] SIG.S = 499F315B264BFCDEC941263BBB6B5BF744B13499A6EB123C7A4BEDD9CCA1F99AB4FB106E8E0303E271359E2325FA7FA9
2,524,945 UART: mbox::rt_entry...
2,525,317 UART: ____ _ _ _ ____ _____
2,526,101 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,901 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,669 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,528,437 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,529,205 UART: |_|
2,529,517 UART:
2,635,553 UART: [rt] Runtime listening for mailbox commands...
2,640,521 >>> mbox cmd response data (3272 bytes)
2,640,522 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,608 >>> mbox cmd response data (0 bytes)
2,663,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,091,676 >>> mbox cmd response: success
5,105,040 UART:
5,105,056 UART: Running Caliptra FMC ...
5,105,464 UART:
5,105,518 UART: [state] CFI Enabled
5,195,189 UART: [art] Extend RT PCRs Done
5,195,617 UART: [art] Lock RT PCRs Done
5,196,812 UART: [art] Populate DV Done
5,205,021 UART: [fht] FMC Alias Private Key: 7
5,206,139 UART: [art] Derive CDI
5,206,419 UART: [art] Store in in slot 0x4
5,291,806 UART: [art] Derive Key Pair
5,292,166 UART: [art] Store priv key in slot 0x5
5,305,988 UART: [art] Derive Key Pair - Done
5,320,673 UART: [art] Signing Cert with AUTHO
5,321,153 UART: RITY.KEYID = 7
5,336,239 UART: [art] Erasing AUTHORITY.KEYID = 7
5,337,004 UART: [art] PUB.X = 94C2412ABC81BDB35EA648B0E4E184893FC409F9EAEF3D6867D2447F5A0A6AC4EBD20DD4CB1D1E410AFD09C5A7D24FFC
5,343,785 UART: [art] PUB.Y = A74F3479C20CA9526917B3C4BED4061DCC968FA7B722BA54997F99C905459E7EB5CD7CCF34550A3A0219C228D5FB3419
5,350,726 UART: [art] SIG.R = 2C52DCD8A9B8255155B9BB3530F7CCD4AF07C0915088DAAD4CA0677AED8B7CA7013802ADA052D977F3C50AFF11CDDFF0
5,357,506 UART: [art] SIG.S = A07B805B1E0A190E617B9EFA8EDDFE2BA50D346F900BC80B98DCA26D52D3FEE194603A95A6308859E48DBDD163B31E43
5,381,614 UART: Caliptra RT
5,381,867 UART: [state] CFI Enabled
5,674,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,675,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,705,997 UART: [rt]cmd =0x494e464f, len=4
5,709,680 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,170,018 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,174,204 ready_for_fw is high
1,174,204 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,198,942 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,711 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 78456 bytes
2,170,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,192 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,308,272 >>> mbox cmd response: success
2,308,272 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,309,483 UART: [afmc] ++
2,309,651 UART: [afmc] CDI.KEYID = 6
2,310,014 UART: [afmc] SUBJECT.KEYID = 7
2,310,440 UART: [afmc] AUTHORITY.KEYID = 5
2,345,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,879 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,762 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,186 UART: [afmc] --
2,389,128 UART: [cold-reset] --
2,389,820 UART: [state] Locking Datavault
2,391,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,819 UART: [state] Locking ICCM
2,392,411 UART: [exit] Launching FMC @ 0x40000130
2,397,740 UART:
2,397,756 UART: Running Caliptra FMC ...
2,398,164 UART:
2,398,307 UART: [state] CFI Enabled
2,408,790 UART: [fht] FMC Alias Private Key: 7
2,516,263 UART: [art] Extend RT PCRs Done
2,516,691 UART: [art] Lock RT PCRs Done
2,517,899 UART: [art] Populate DV Done
2,526,224 UART: [fht] FMC Alias Private Key: 7
2,527,196 UART: [art] Derive CDI
2,527,476 UART: [art] Store in in slot 0x4
2,612,927 UART: [art] Derive Key Pair
2,613,287 UART: [art] Store priv key in slot 0x5
2,626,707 UART: [art] Derive Key Pair - Done
2,641,899 UART: [art] Signing Cert with AUTHO
2,642,379 UART: RITY.KEYID = 7
2,657,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,648 UART: [art] PUB.X = 92837B8B901AB4E29043D42AF4ADB9C26006DDAF7E9A1EF6292D33D409E6160685F3BAA49170B5A208AF10257D3BE006
2,665,409 UART: [art] PUB.Y = 61216ECED700F9B7BB009033B38ED1F20F1594F46398E9E70751C68ADAE03B0BAC8E22F14FDEAE9C31E1A3E6BD913E60
2,672,322 UART: [art] SIG.R = 761B9E9C6E44A3144736399EBFA65DB318014A968A654D010B051179DCCBFC76907A93810CE5AF8C559D901EE268B3D8
2,679,079 UART: [art] SIG.S = E7358BAC1258D8BBF1924C45D1745DB2021D8DDF66B14914D9A6376CCDDADC20831011FCA6443548D9F013C1DEA79CD4
2,703,059 UART: mbox::rt_entry...
2,703,431 UART: ____ _ _ _ ____ _____
2,704,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,319 UART: |_|
2,707,631 UART:
2,815,467 UART: [rt] Runtime listening for mailbox commands...
2,820,435 >>> mbox cmd response data (3272 bytes)
2,820,436 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,843,522 >>> mbox cmd response data (0 bytes)
2,843,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,640 UART:
2,843,656 UART: Running Caliptra ROM ...
2,844,064 UART:
2,844,206 UART: [state] CFI Enabled
2,846,582 UART: [state] LifecycleState = Unprovisioned
2,847,237 UART: [state] DebugLocked = No
2,847,741 UART: [state] WD Timer not started. Device not locked for debugging
2,849,101 UART: [kat] SHA2-256
3,652,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,780 UART: [kat] ++
3,656,932 UART: [kat] sha1
3,661,176 UART: [kat] SHA2-256
3,663,116 UART: [kat] SHA2-384
3,666,075 UART: [kat] SHA2-512-ACC
3,667,975 UART: [kat] ECC-384
3,677,492 UART: [kat] HMAC-384Kdf
3,682,082 UART: [kat] LMS
3,930,394 UART: [kat] --
3,931,592 UART: [update-reset] ++
5,241,911 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,243,004 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
5,392,456 >>> mbox cmd response: success
5,392,763 UART: [update-reset] Copying MAN_2 To MAN_1
5,400,777 UART: [update-reset Success] --
5,401,726 UART: [state] Locking Datavault
5,402,544 UART: [state] Locking PCR0, PCR1 and PCR31
5,403,148 UART: [state] Locking ICCM
5,403,748 UART: [exit] Launching FMC @ 0x40000130
5,409,077 UART:
5,409,093 UART: Running Caliptra FMC ...
5,409,501 UART:
5,409,644 UART: [state] CFI Enabled
5,499,049 UART: [art] Extend RT PCRs Done
5,499,477 UART: [art] Lock RT PCRs Done
5,500,700 UART: [art] Populate DV Done
5,508,645 UART: [fht] FMC Alias Private Key: 7
5,509,611 UART: [art] Derive CDI
5,509,891 UART: [art] Store in in slot 0x4
5,595,450 UART: [art] Derive Key Pair
5,595,810 UART: [art] Store priv key in slot 0x5
5,608,736 UART: [art] Derive Key Pair - Done
5,623,664 UART: [art] Signing Cert with AUTHO
5,624,144 UART: RITY.KEYID = 7
5,639,556 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,321 UART: [art] PUB.X = AEB98750C3288E870FA86FDFA13C1CC7E3A5977D68AC61006DB25704DE5FED825BF05A18B8EEC000F0354DB501D3223D
5,647,052 UART: [art] PUB.Y = 7ACA52471CCB04925413D50E8BA924E0030AA6BC66C1BC7664A8C8B253B982469EB626A8C3573B8EC476ABF63556E5D9
5,653,996 UART: [art] SIG.R = A4DD9E1B918D50DFB7549F5202E7633DCBD83B1AA18378C96B07D8E41537A45781C92CF618AA4AEBDFECC6B01DE1CD1A
5,660,782 UART: [art] SIG.S = 7A44C8BC6DA1BFDB8CD389254FC23568077699C50B8B54309EE65D652FFFD271A4C46831EE9F08E02811306ACBDAADF2
5,684,712 UART: Caliptra RT
5,685,057 UART: [state] CFI Enabled
5,976,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,977,755 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,429 UART: [rt]cmd =0x494e464f, len=4
6,012,134 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,775 ready_for_fw is high
1,056,775 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
2,157,870 >>> mbox cmd response: success
2,157,870 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,676 UART:
2,220,692 UART: Running Caliptra FMC ...
2,221,100 UART:
2,221,243 UART: [state] CFI Enabled
2,232,098 UART: [fht] FMC Alias Private Key: 7
2,340,721 UART: [art] Extend RT PCRs Done
2,341,149 UART: [art] Lock RT PCRs Done
2,342,715 UART: [art] Populate DV Done
2,351,056 UART: [fht] FMC Alias Private Key: 7
2,351,988 UART: [art] Derive CDI
2,352,268 UART: [art] Store in in slot 0x4
2,438,039 UART: [art] Derive Key Pair
2,438,399 UART: [art] Store priv key in slot 0x5
2,451,489 UART: [art] Derive Key Pair - Done
2,466,138 UART: [art] Signing Cert with AUTHO
2,466,618 UART: RITY.KEYID = 7
2,481,482 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,247 UART: [art] PUB.X = B7C2C1028D774F3B105E8EFB5E1648A386AB404408D35D0634C0B5741543F9F239575D17440BF8803F186F2325EEF624
2,488,999 UART: [art] PUB.Y = A4148B8532EC14DD8AE125A390D68AD6A9FD3FC482C470DEE50B55D86B970062DB825E7FE5967D8EFD06643D15FD1410
2,495,931 UART: [art] SIG.R = 74C5B91117773CBFF77575A2DF2CCFB81629AB3BE8C2EBFD1F14FAE94549DCE4FD84CB208B7859453D7350426195E802
2,502,708 UART: [art] SIG.S = FBBE59AA9A205F8626EA79380052A9023BB1447FB2A3FEFDCD989EA21184DFEF98EF18F675031FAA26DD9B48C24BB22B
2,526,019 UART: mbox::rt_entry...
2,526,391 UART: ____ _ _ _ ____ _____
2,527,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,279 UART: |_|
2,530,591 UART:
2,637,115 UART: [rt] Runtime listening for mailbox commands...
2,642,083 >>> mbox cmd response data (3272 bytes)
2,642,084 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,170 >>> mbox cmd response data (0 bytes)
2,665,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,094,845 >>> mbox cmd response: success
5,107,963 UART:
5,107,979 UART: Running Caliptra FMC ...
5,108,387 UART:
5,108,530 UART: [state] CFI Enabled
5,197,549 UART: [art] Extend RT PCRs Done
5,197,977 UART: [art] Lock RT PCRs Done
5,199,052 UART: [art] Populate DV Done
5,207,215 UART: [fht] FMC Alias Private Key: 7
5,208,333 UART: [art] Derive CDI
5,208,613 UART: [art] Store in in slot 0x4
5,294,416 UART: [art] Derive Key Pair
5,294,776 UART: [art] Store priv key in slot 0x5
5,308,342 UART: [art] Derive Key Pair - Done
5,323,425 UART: [art] Signing Cert with AUTHO
5,323,905 UART: RITY.KEYID = 7
5,339,161 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,926 UART: [art] PUB.X = A12C84CF6C17696A26E192D68A6F4BD59671C5C8917C18D3983EAC3634141A61FD64D5D839A76FBA537B8B111F44C30D
5,346,697 UART: [art] PUB.Y = C2AB191463356FA6D34C6E6D820546D3F028BD9D8B6221A167859A5D754AEF8E53D3D5C3880A2C24231A1CFC4C9B257C
5,353,647 UART: [art] SIG.R = BBDCDCA17BC8CC8E22E0B7B158F7C8B605EAEDFFE0E5CB5216174C20C72557B94EA800823EFE4EE1561F8DC994652AB4
5,360,416 UART: [art] SIG.S = 51B539E1A7A0BA11F218BA4F4CA99303AD4A9F90F73B97928EF7E21D61C1220943C08ADCF44863F2B42ED504AF0D1628
5,383,785 UART: Caliptra RT
5,384,130 UART: [state] CFI Enabled
5,674,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,675,978 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,706,378 UART: [rt]cmd =0x494e464f, len=4
5,710,251 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,161 UART:
192,530 UART: Running Caliptra ROM ...
193,618 UART:
193,762 UART: [state] CFI Enabled
262,873 UART: [state] LifecycleState = Unprovisioned
264,777 UART: [state] DebugLocked = No
267,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,581 UART: [kat] SHA2-256
441,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,846 UART: [kat] ++
452,375 UART: [kat] sha1
464,531 UART: [kat] SHA2-256
467,175 UART: [kat] SHA2-384
473,019 UART: [kat] SHA2-512-ACC
475,402 UART: [kat] ECC-384
2,769,092 UART: [kat] HMAC-384Kdf
2,800,020 UART: [kat] LMS
3,990,307 UART: [kat] --
3,995,457 UART: [cold-reset] ++
3,997,398 UART: [fht] Storing FHT @ 0x50003400
4,009,380 UART: [idev] ++
4,009,951 UART: [idev] CDI.KEYID = 6
4,010,988 UART: [idev] SUBJECT.KEYID = 7
4,012,291 UART: [idev] UDS.KEYID = 0
4,013,345 ready_for_fw is high
4,013,542 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,520 UART: [idev] Erasing UDS.KEYID = 0
7,347,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,109 UART: [idev] --
7,372,099 UART: [ldev] ++
7,372,705 UART: [ldev] CDI.KEYID = 6
7,373,648 UART: [ldev] SUBJECT.KEYID = 5
7,374,813 UART: [ldev] AUTHORITY.KEYID = 7
7,376,103 UART: [ldev] FE.KEYID = 1
7,422,130 UART: [ldev] Erasing FE.KEYID = 1
10,752,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,065 UART: [ldev] --
13,118,384 UART: [fwproc] Waiting for Commands...
13,120,427 UART: [fwproc] Received command 0x46574c44
13,122,612 UART: [fwproc] Received Image of size 113760 bytes
17,174,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,474 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,635,679 >>> mbox cmd response: success
17,639,362 UART: [afmc] ++
17,639,964 UART: [afmc] CDI.KEYID = 6
17,641,036 UART: [afmc] SUBJECT.KEYID = 7
17,642,144 UART: [afmc] AUTHORITY.KEYID = 5
21,011,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,678 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,992 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,355 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,187 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,637 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,043 UART: [afmc] --
23,380,954 UART: [cold-reset] --
23,383,144 UART: [state] Locking Datavault
23,389,632 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,386 UART: [state] Locking ICCM
23,393,823 UART: [exit] Launching FMC @ 0x40000130
23,402,228 UART:
23,402,466 UART: Running Caliptra FMC ...
23,403,564 UART:
23,403,723 UART: [state] CFI Enabled
23,470,087 UART: [fht] FMC Alias Private Key: 7
25,808,050 UART: [art] Extend RT PCRs Done
25,809,279 UART: [art] Lock RT PCRs Done
25,810,901 UART: [art] Populate DV Done
25,816,203 UART: [fht] FMC Alias Private Key: 7
25,817,735 UART: [art] Derive CDI
25,818,548 UART: [art] Store in in slot 0x4
25,878,937 UART: [art] Derive Key Pair
25,879,978 UART: [art] Store priv key in slot 0x5
29,172,514 UART: [art] Derive Key Pair - Done
29,185,355 UART: [art] Signing Cert with AUTHO
29,186,683 UART: RITY.KEYID = 7
31,474,792 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,308 UART: [art] PUB.X = 72CAEE6A9FD4031B1326B21B0C331A65703D7E0347C26448E4673502CEAF4BB5C24FC3589BD268EB6DE1B6EEAD9C1B56
31,483,557 UART: [art] PUB.Y = 01FF9D516449A8DE0EC9B898BAADA3F89B60B8508F6E7C1F8481BB8DFEBAE817E31B2D93CCBA5B93FF31EB17CBF7C8DF
31,490,844 UART: [art] SIG.R = 5788F5EA3248369DE6E7439CD48DE01A60ADA2460386DBA695641CB8F05375C2BCC3B438C921EF405EB157EE3C947024
31,498,227 UART: [art] SIG.S = 5791AADC7A1F20019C98800E0C98B998881E768E5D07E300D0D56C43FA0DB107A5130D28EDE61FE9E4D7B02372039774
32,803,536 UART: Caliptra RT
32,804,239 UART: [state] CFI Enabled
32,966,400 UART: [rt] RT listening for mailbox commands...
32,968,695 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,999,102 UART: [rt]cmd =0x50435252, len=8
33,001,045 >>> mbox cmd response data (8 bytes)
35,053,321 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,153,826 UART:
35,154,205 UART: Running Caliptra ROM ...
35,155,337 UART:
35,155,510 UART: [state] CFI Enabled
35,230,710 UART: [state] LifecycleState = Unprovisioned
35,232,652 UART: [state] DebugLocked = No
35,234,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,240,290 UART: [kat] SHA2-256
35,409,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,420,500 UART: [kat] ++
35,421,038 UART: [kat] sha1
35,432,854 UART: [kat] SHA2-256
35,435,547 UART: [kat] SHA2-384
35,441,529 UART: [kat] SHA2-512-ACC
35,443,929 UART: [kat] ECC-384
37,732,465 UART: [kat] HMAC-384Kdf
37,745,074 UART: [kat] LMS
38,935,414 UART: [kat] --
38,939,992 UART: [update-reset] ++
42,647,801 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,652,071 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,909,603 >>> mbox cmd response: success
42,909,971 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,910,580 UART: [update-reset] Copying MAN_2 To MAN_1
42,933,018 UART: [update-reset Success] --
42,936,665 UART: [state] Locking Datavault
42,941,321 UART: [state] Locking PCR0, PCR1 and PCR31
42,943,081 UART: [state] Locking ICCM
42,944,210 UART: [exit] Launching FMC @ 0x40000130
42,952,660 UART:
42,952,896 UART: Running Caliptra FMC ...
42,954,019 UART:
42,954,183 UART: [state] CFI Enabled
43,048,057 UART: [art] Extend RT PCRs Done
43,049,249 UART: [art] Lock RT PCRs Done
43,050,977 UART: [art] Populate DV Done
43,056,476 UART: [fht] FMC Alias Private Key: 7
43,058,065 UART: [art] Derive CDI
43,058,889 UART: [art] Store in in slot 0x4
43,117,256 UART: [art] Derive Key Pair
43,118,259 UART: [art] Store priv key in slot 0x5
46,410,549 UART: [art] Derive Key Pair - Done
46,423,594 UART: [art] Signing Cert with AUTHO
46,424,926 UART: RITY.KEYID = 7
48,712,337 UART: [art] Erasing AUTHORITY.KEYID = 7
48,713,843 UART: [art] PUB.X = 0E93859E385EA7AB09027C423CCFE0E503F87BC04E3098BF594F1E6C3DFE821CA6D47295CB82D0062249C389C4E2AAFB
48,721,092 UART: [art] PUB.Y = 73DB810E02A23A96D069D762252E3C4D4C535066D25A4845F9AAA1D9696FA9D8E8A56307BA8A3381F72AB05E9EA1C202
48,728,347 UART: [art] SIG.R = E8A411773CCCFA16ADD24B880A476466D92D8CA5C3E38ADB1973E7550B68B3FC5CC1D6C9D4C2D5D59B6AA1815498CCE7
48,735,768 UART: [art] SIG.S = 58DC228EE4E7D6FD707409C6B1686F447310AC8BF8A1E1BDAD02BF11A18BCA5DD820072991111A6F18FC1C50375831AC
50,040,894 UART: mbox::rt_entry...
50,041,865 UART: ____ _ _ _ ____ _____
50,043,803 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,045,811 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,047,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,049,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,051,454 UART: |_|
50,052,338 UART:
50,338,489 UART: [rt] Runtime listening for mailbox commands...
50,340,495 >>> mbox cmd response data (128 bytes)
52,390,631 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,490,300 UART:
52,490,665 UART: Running Caliptra ROM ...
52,491,748 UART:
52,492,117 UART: [state] CFI Enabled
52,551,082 UART: [state] LifecycleState = Unprovisioned
52,552,985 UART: [state] DebugLocked = No
52,555,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,561,209 UART: [kat] SHA2-256
52,730,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,741,434 UART: [kat] ++
52,741,981 UART: [kat] sha1
52,751,796 UART: [kat] SHA2-256
52,754,483 UART: [kat] SHA2-384
52,760,259 UART: [kat] SHA2-512-ACC
52,762,608 UART: [kat] ECC-384
55,053,706 UART: [kat] HMAC-384Kdf
55,067,087 UART: [kat] LMS
56,257,393 UART: [kat] --
56,262,647 UART: [update-reset] ++
59,966,431 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,969,337 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
60,226,899 >>> mbox cmd response: success
60,227,262 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,228,901 UART: [update-reset] Copying MAN_2 To MAN_1
60,251,342 UART: [update-reset Success] --
60,256,957 UART: [state] Locking Datavault
60,260,755 UART: [state] Locking PCR0, PCR1 and PCR31
60,262,519 UART: [state] Locking ICCM
60,264,968 UART: [exit] Launching FMC @ 0x40000130
60,273,418 UART:
60,273,655 UART: Running Caliptra FMC ...
60,274,718 UART:
60,274,871 UART: [state] CFI Enabled
60,368,842 UART: [art] Extend RT PCRs Done
60,370,028 UART: [art] Lock RT PCRs Done
60,371,410 UART: [art] Populate DV Done
60,376,759 UART: [fht] FMC Alias Private Key: 7
60,378,238 UART: [art] Derive CDI
60,378,972 UART: [art] Store in in slot 0x4
60,437,763 UART: [art] Derive Key Pair
60,438,796 UART: [art] Store priv key in slot 0x5
63,730,752 UART: [art] Derive Key Pair - Done
63,743,904 UART: [art] Signing Cert with AUTHO
63,745,206 UART: RITY.KEYID = 7
66,031,885 UART: [art] Erasing AUTHORITY.KEYID = 7
66,033,395 UART: [art] PUB.X = 7B5B3F9AC0192BED2D26FA98B4F066E2C2ECF9CA968792B27D5C96ADA7DFCC981BFA5ED21923CBC985C0709C2202738D
66,040,698 UART: [art] PUB.Y = 7DBAF9E54B191DDB5C6CF7301B49DED35C95D2B2799C65BA587E4671436339FFED3F3961F45E7E7B1899D085C0118603
66,047,947 UART: [art] SIG.R = A3A54E211CB725B546C9397AC6E678FC986E086DC6DFC6A50D704B8DE0256CBFAD41EE15B2405E6395DB28EA121CE5E0
66,055,338 UART: [art] SIG.S = C806FC78FECA9B494367BBE11CC2E8C39B97A86EF4855331BD1A2F0DD5E6210C351C3C7F728EAAD9C0F684017D0B4716
67,359,622 UART: mbox::rt_entry...
67,360,573 UART: ____ _ _ _ ____ _____
67,362,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,364,683 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,366,612 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,368,542 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,370,470 UART: |_|
67,371,473 UART:
67,657,524 UART: [rt] Runtime listening for mailbox commands...
67,659,533 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,806,124 ready_for_fw is high
3,806,520 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,888,041 >>> mbox cmd response: success
23,570,665 UART:
23,571,073 UART: Running Caliptra FMC ...
23,572,188 UART:
23,572,342 UART: [state] CFI Enabled
23,640,613 UART: [fht] FMC Alias Private Key: 7
25,978,984 UART: [art] Extend RT PCRs Done
25,980,212 UART: [art] Lock RT PCRs Done
25,981,754 UART: [art] Populate DV Done
25,986,948 UART: [fht] FMC Alias Private Key: 7
25,988,647 UART: [art] Derive CDI
25,989,380 UART: [art] Store in in slot 0x4
26,049,620 UART: [art] Derive Key Pair
26,050,662 UART: [art] Store priv key in slot 0x5
29,343,539 UART: [art] Derive Key Pair - Done
29,356,428 UART: [art] Signing Cert with AUTHO
29,357,728 UART: RITY.KEYID = 7
31,644,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,453 UART: [art] PUB.X = C088E71C68EFF4BA0387C6012BBA50BCAF8AA7B2630A4FC434E94B011903BE7640FEF85136D974F1C63DA45583DCA132
31,653,723 UART: [art] PUB.Y = 66F3327E61E6A1805A7087CB6567F04DE0BC2ED0A02605B00385F21A453D372185F2C25C609236C656529134776E709E
31,660,920 UART: [art] SIG.R = 3476842036121FCA851E960E22F1CC49EC0DE7EB21EA6258579D8680D0E183AAE0B3D22A095717BF41B222953F4BA9E0
31,668,331 UART: [art] SIG.S = 8285982A41A8B57E193652F0AD1E4F2499EE934194575CE9CB1E946EE13A7429D5B5C7C75710956D94D5BAB7DD70AD36
32,973,255 UART: Caliptra RT
32,973,966 UART: [state] CFI Enabled
33,134,310 UART: [rt] RT listening for mailbox commands...
33,136,697 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,167,162 UART: [rt]cmd =0x50435252, len=8
33,168,867 >>> mbox cmd response data (8 bytes)
35,223,970 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,181,293 >>> mbox cmd response: success
43,181,767 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,214,143 UART:
43,214,484 UART: Running Caliptra FMC ...
43,215,619 UART:
43,215,786 UART: [state] CFI Enabled
43,320,194 UART: [art] Extend RT PCRs Done
43,321,389 UART: [art] Lock RT PCRs Done
43,322,601 UART: [art] Populate DV Done
43,328,396 UART: [fht] FMC Alias Private Key: 7
43,330,050 UART: [art] Derive CDI
43,330,871 UART: [art] Store in in slot 0x4
43,389,593 UART: [art] Derive Key Pair
43,390,629 UART: [art] Store priv key in slot 0x5
46,682,738 UART: [art] Derive Key Pair - Done
46,695,962 UART: [art] Signing Cert with AUTHO
46,697,266 UART: RITY.KEYID = 7
48,985,520 UART: [art] Erasing AUTHORITY.KEYID = 7
48,987,029 UART: [art] PUB.X = F93CAD0A380CF86E23DE205BA871DE4DD082EAFC205BA7383028ECF1BBDB2FD0B8FC9B1D1E5A16299852926132C798FC
48,994,298 UART: [art] PUB.Y = 2228D902A5B97A36AC712E262945AFEFCBD9C1D64D96A552F2CC22EF0A9E77D36F87EE11B453F1F98ECB3B7EF2A7DEAB
49,001,592 UART: [art] SIG.R = E4EFA87A0FF09214660C00246A450B9A7D8425A29123888B12146B67C7D8D8E23F8E64DF7726CA23DB1AB043D73D7EB1
49,008,943 UART: [art] SIG.S = 51F74FABC5D4D812F7F1EBC20A20EA8FE0EC3D1280D1CDDAF59EEB8745F33D7F6AEB9C411405BF266102D0B90B468BCA
50,313,963 UART: mbox::rt_entry...
50,314,918 UART: ____ _ _ _ ____ _____
50,316,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,318,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,320,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,322,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,324,679 UART: |_|
50,325,487 UART:
50,609,306 UART: [rt] Runtime listening for mailbox commands...
50,611,344 >>> mbox cmd response data (128 bytes)
52,659,982 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,610,779 >>> mbox cmd response: success
60,611,316 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,646,345 UART:
60,646,644 UART: Running Caliptra FMC ...
60,647,710 UART:
60,647,865 UART: [state] CFI Enabled
60,749,582 UART: [art] Extend RT PCRs Done
60,750,778 UART: [art] Lock RT PCRs Done
60,752,239 UART: [art] Populate DV Done
60,757,703 UART: [fht] FMC Alias Private Key: 7
60,759,355 UART: [art] Derive CDI
60,760,170 UART: [art] Store in in slot 0x4
60,818,481 UART: [art] Derive Key Pair
60,819,522 UART: [art] Store priv key in slot 0x5
64,112,246 UART: [art] Derive Key Pair - Done
64,125,081 UART: [art] Signing Cert with AUTHO
64,126,393 UART: RITY.KEYID = 7
66,414,331 UART: [art] Erasing AUTHORITY.KEYID = 7
66,415,848 UART: [art] PUB.X = E01EE6C41FF465A150BFEF39927A77C6CEDE6641962EE4229159A8DDDE132C4001DBEEACE7BFFED6906766CAA59C8EB8
66,423,120 UART: [art] PUB.Y = 4463B6639ECAB1B3E9DB6B66569F69153E7ABA9E22D4372CC2F58967002824981A86AC302F4F18548A74695E1DC9281A
66,430,364 UART: [art] SIG.R = 2E0B948D66DB15619EDEC317C87EFA9B9F88D40086D2CE747AB75EF736EE4F5A17EF4474DF12CD16C47C1C05018851E6
66,437,756 UART: [art] SIG.S = 6BC4D7681FEF62C1D4E44A201260A17708283579870A00947979D5928DEC6A874319D22A02F5066F08EBAA1421EDBB84
67,742,576 UART: mbox::rt_entry...
67,743,549 UART: ____ _ _ _ ____ _____
67,745,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,747,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,749,473 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,751,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,753,351 UART: |_|
67,754,165 UART:
68,037,902 UART: [rt] Runtime listening for mailbox commands...
68,039,917 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
192,898 UART:
193,262 UART: Running Caliptra ROM ...
194,466 UART:
604,301 UART: [state] CFI Enabled
623,228 UART: [state] LifecycleState = Unprovisioned
625,132 UART: [state] DebugLocked = No
627,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,577 UART: [kat] SHA2-256
802,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,860 UART: [kat] ++
813,307 UART: [kat] sha1
824,957 UART: [kat] SHA2-256
827,608 UART: [kat] SHA2-384
831,888 UART: [kat] SHA2-512-ACC
834,254 UART: [kat] ECC-384
3,119,931 UART: [kat] HMAC-384Kdf
3,131,122 UART: [kat] LMS
4,321,239 UART: [kat] --
4,324,554 UART: [cold-reset] ++
4,325,784 UART: [fht] Storing FHT @ 0x50003400
4,337,550 UART: [idev] ++
4,338,134 UART: [idev] CDI.KEYID = 6
4,339,165 UART: [idev] SUBJECT.KEYID = 7
4,340,340 UART: [idev] UDS.KEYID = 0
4,341,340 ready_for_fw is high
4,341,590 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,525 UART: [idev] Erasing UDS.KEYID = 0
7,626,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,327 UART: [idev] --
7,652,832 UART: [ldev] ++
7,653,396 UART: [ldev] CDI.KEYID = 6
7,654,357 UART: [ldev] SUBJECT.KEYID = 5
7,655,561 UART: [ldev] AUTHORITY.KEYID = 7
7,656,789 UART: [ldev] FE.KEYID = 1
7,667,157 UART: [ldev] Erasing FE.KEYID = 1
10,955,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,961 UART: [ldev] --
13,318,489 UART: [fwproc] Waiting for Commands...
13,321,333 UART: [fwproc] Received command 0x46574c44
13,323,516 UART: [fwproc] Received Image of size 113760 bytes
17,367,392 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,367 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,827,828 >>> mbox cmd response: success
17,831,791 UART: [afmc] ++
17,832,412 UART: [afmc] CDI.KEYID = 6
17,833,300 UART: [afmc] SUBJECT.KEYID = 7
17,834,427 UART: [afmc] AUTHORITY.KEYID = 5
21,149,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,748 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,997 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,377 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,226 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,656 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,897 UART: [afmc] --
23,514,040 UART: [cold-reset] --
23,517,770 UART: [state] Locking Datavault
23,522,807 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,563 UART: [state] Locking ICCM
23,525,789 UART: [exit] Launching FMC @ 0x40000130
23,534,188 UART:
23,534,432 UART: Running Caliptra FMC ...
23,535,532 UART:
23,535,686 UART: [state] CFI Enabled
23,543,780 UART: [fht] FMC Alias Private Key: 7
25,875,306 UART: [art] Extend RT PCRs Done
25,876,526 UART: [art] Lock RT PCRs Done
25,878,340 UART: [art] Populate DV Done
25,883,695 UART: [fht] FMC Alias Private Key: 7
25,885,291 UART: [art] Derive CDI
25,886,104 UART: [art] Store in in slot 0x4
25,928,488 UART: [art] Derive Key Pair
25,929,521 UART: [art] Store priv key in slot 0x5
29,171,605 UART: [art] Derive Key Pair - Done
29,184,380 UART: [art] Signing Cert with AUTHO
29,185,684 UART: RITY.KEYID = 7
31,464,824 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,340 UART: [art] PUB.X = BA72D4A87BFC0916A262AC19B4059F3D11917BA33FA8F721A7795F4820BAC045DAFF74CBCFFA8CD1C54FDC95B97FA892
31,473,620 UART: [art] PUB.Y = 560F0D014DAC2350143C77144938CC7491A301F061B413E70F91FE1F1586DA20F8776B8DB52645BCFD27599741AA4CBD
31,480,872 UART: [art] SIG.R = 7E9666CA48CF9C8C2BBF7E1AD30EC4F2E8693E894D1D14B28C1F4475C2A6C79FD1B014D6C4E17A412F2A64397045DA20
31,488,234 UART: [art] SIG.S = E2C9DACDE236F9721FCE95CDD21299B9357470F4AFC8F0C31533DEB86773019DE36D32FBD9765DA4ACDBE0153CBB370D
32,793,358 UART: Caliptra RT
32,794,063 UART: [state] CFI Enabled
32,912,476 UART: [rt] RT listening for mailbox commands...
32,914,775 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,944,409 UART: [rt]cmd =0x50435252, len=8
32,946,436 >>> mbox cmd response data (8 bytes)
35,005,068 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,105,687 UART:
35,106,054 UART: Running Caliptra ROM ...
35,107,106 UART:
35,107,307 UART: [state] CFI Enabled
35,120,125 UART: [state] LifecycleState = Unprovisioned
35,122,082 UART: [state] DebugLocked = No
35,124,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,130,023 UART: [kat] SHA2-256
35,299,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,310,311 UART: [kat] ++
35,310,764 UART: [kat] sha1
35,323,098 UART: [kat] SHA2-256
35,325,788 UART: [kat] SHA2-384
35,331,124 UART: [kat] SHA2-512-ACC
35,333,468 UART: [kat] ECC-384
37,618,464 UART: [kat] HMAC-384Kdf
37,630,450 UART: [kat] LMS
38,820,533 UART: [kat] --
38,825,732 UART: [update-reset] ++
42,533,758 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,536,834 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,794,413 >>> mbox cmd response: success
42,794,859 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,795,165 UART: [update-reset] Copying MAN_2 To MAN_1
42,817,271 UART: [update-reset Success] --
42,822,035 UART: [state] Locking Datavault
42,824,907 UART: [state] Locking PCR0, PCR1 and PCR31
42,826,661 UART: [state] Locking ICCM
42,829,238 UART: [exit] Launching FMC @ 0x40000130
42,837,687 UART:
42,837,918 UART: Running Caliptra FMC ...
42,839,016 UART:
42,839,174 UART: [state] CFI Enabled
42,883,513 UART: [art] Extend RT PCRs Done
42,884,692 UART: [art] Lock RT PCRs Done
42,885,932 UART: [art] Populate DV Done
42,891,661 UART: [fht] FMC Alias Private Key: 7
42,893,310 UART: [art] Derive CDI
42,894,126 UART: [art] Store in in slot 0x4
42,936,877 UART: [art] Derive Key Pair
42,937,873 UART: [art] Store priv key in slot 0x5
46,180,263 UART: [art] Derive Key Pair - Done
46,193,431 UART: [art] Signing Cert with AUTHO
46,194,742 UART: RITY.KEYID = 7
48,473,968 UART: [art] Erasing AUTHORITY.KEYID = 7
48,475,480 UART: [art] PUB.X = 1A2DD1792EE589A5C57739B6A4D3D0409388DD4B4D79C3295ED86B6B092AD9D48BA13C0F9CA91E417D7BEEDB8819111C
48,482,756 UART: [art] PUB.Y = 461BF4539E7900E82341EB79D20F84C4EF46A4085C94243E73BC051E5EC0873D775DF43E1F204407A6AF6825047F71B7
48,489,958 UART: [art] SIG.R = 77AC3379FDBBD6BF80BEBE0828AE35C6E048A9B79742C2FD56A8E1CF1F2C836E87A45C85AA99ED88ADC8E0F600CABE1C
48,497,372 UART: [art] SIG.S = 6BB432BC9C51F30E17D8A66E0899751CF386D865736A92FFE902BFAD92A9659381FDDF9CBF0A71C0A7BC2AA4E034AE9B
49,801,975 UART: mbox::rt_entry...
49,802,923 UART: ____ _ _ _ ____ _____
49,804,904 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,806,907 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,808,860 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,810,798 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,812,647 UART: |_|
49,813,442 UART:
50,100,108 UART: [rt] Runtime listening for mailbox commands...
50,102,138 >>> mbox cmd response data (128 bytes)
52,150,230 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,250,146 UART:
52,250,513 UART: Running Caliptra ROM ...
52,251,587 UART:
52,251,804 UART: [state] CFI Enabled
52,266,776 UART: [state] LifecycleState = Unprovisioned
52,268,747 UART: [state] DebugLocked = No
52,270,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,275,380 UART: [kat] SHA2-256
52,445,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,455,615 UART: [kat] ++
52,456,064 UART: [kat] sha1
52,467,377 UART: [kat] SHA2-256
52,470,056 UART: [kat] SHA2-384
52,474,904 UART: [kat] SHA2-512-ACC
52,477,241 UART: [kat] ECC-384
54,763,014 UART: [kat] HMAC-384Kdf
54,774,613 UART: [kat] LMS
55,964,645 UART: [kat] --
55,968,174 UART: [update-reset] ++
59,673,933 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,678,156 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
59,935,698 >>> mbox cmd response: success
59,936,079 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
59,937,242 UART: [update-reset] Copying MAN_2 To MAN_1
59,959,676 UART: [update-reset Success] --
59,963,916 UART: [state] Locking Datavault
59,967,272 UART: [state] Locking PCR0, PCR1 and PCR31
59,969,022 UART: [state] Locking ICCM
59,970,468 UART: [exit] Launching FMC @ 0x40000130
59,978,916 UART:
59,979,148 UART: Running Caliptra FMC ...
59,980,248 UART:
59,980,398 UART: [state] CFI Enabled
60,024,521 UART: [art] Extend RT PCRs Done
60,025,706 UART: [art] Lock RT PCRs Done
60,026,891 UART: [art] Populate DV Done
60,032,351 UART: [fht] FMC Alias Private Key: 7
60,034,065 UART: [art] Derive CDI
60,034,884 UART: [art] Store in in slot 0x4
60,077,475 UART: [art] Derive Key Pair
60,078,507 UART: [art] Store priv key in slot 0x5
63,320,627 UART: [art] Derive Key Pair - Done
63,333,524 UART: [art] Signing Cert with AUTHO
63,334,823 UART: RITY.KEYID = 7
65,614,359 UART: [art] Erasing AUTHORITY.KEYID = 7
65,615,867 UART: [art] PUB.X = 6E9D36BFFBFA8823909F75D50D1D08F8AB4CAF7C5E8FF1B33691FDF73441EBEE920664FE717C82BC6A01C50648839830
65,623,133 UART: [art] PUB.Y = 3E4F3D0AEF4E6B886432EA93873B342688BCE7B8AF268D7776E84D74B58070E4B46B130FA1924627ACE821467794BD20
65,630,394 UART: [art] SIG.R = EA8A70D540D381EDF98ADC4DCE51B31DACF37032BED1095DE736D1AD59B9CDFCD8D08937484715474450F00958B2CFC6
65,637,756 UART: [art] SIG.S = 396B3455C56231C323727F692F2C9541C6EC42155E71501A51370CA73D097B5520A5B7B0B5235B724AA56BFDF5902E26
66,942,304 UART: mbox::rt_entry...
66,943,265 UART: ____ _ _ _ ____ _____
66,945,247 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,947,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,949,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,951,125 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,953,249 UART: |_|
66,954,066 UART:
67,242,400 UART: [rt] Runtime listening for mailbox commands...
67,244,415 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,630 writing to cptra_bootfsm_go
4,134,038 ready_for_fw is high
4,134,439 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,076,430 >>> mbox cmd response: success
23,719,369 UART:
23,719,762 UART: Running Caliptra FMC ...
23,720,956 UART:
23,721,131 UART: [state] CFI Enabled
23,728,321 UART: [fht] FMC Alias Private Key: 7
26,058,516 UART: [art] Extend RT PCRs Done
26,059,751 UART: [art] Lock RT PCRs Done
26,061,435 UART: [art] Populate DV Done
26,066,745 UART: [fht] FMC Alias Private Key: 7
26,068,236 UART: [art] Derive CDI
26,069,004 UART: [art] Store in in slot 0x4
26,111,299 UART: [art] Derive Key Pair
26,112,310 UART: [art] Store priv key in slot 0x5
29,354,226 UART: [art] Derive Key Pair - Done
29,367,563 UART: [art] Signing Cert with AUTHO
29,368,870 UART: RITY.KEYID = 7
31,648,685 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,193 UART: [art] PUB.X = CE4A72EE9AC6B73617B2B2E58134FE7BFED272E9F8219980DE22D317A72484B75C7A1F63ED4B6A7C8B0E91D46BDDF0E8
31,657,483 UART: [art] PUB.Y = EF6F8F46A13D430E0265E571557419F48B62E2AB3E2BFA208115535CFB421CFD07C11BE55A63ABFE05560EEF4C9F4BE8
31,664,693 UART: [art] SIG.R = A386BCE2DF2A16CA78D0937DA716B50D84A81076460E96469A946E690CE73FB5C8EDE7B6921216F3CE64A4A542FC9D04
31,672,079 UART: [art] SIG.S = D2040990C4D57D4503E377746F1E105D9825692436FD7532D61C846511306F9F8ABE8F83E13422122EA7740A889AC47A
32,977,266 UART: Caliptra RT
32,977,981 UART: [state] CFI Enabled
33,095,440 UART: [rt] RT listening for mailbox commands...
33,097,829 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,127,846 UART: [rt]cmd =0x50435252, len=8
33,129,979 >>> mbox cmd response data (8 bytes)
35,181,756 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,076,488 >>> mbox cmd response: success
43,076,991 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,110,035 UART:
43,110,355 UART: Running Caliptra FMC ...
43,111,400 UART:
43,111,549 UART: [state] CFI Enabled
43,155,678 UART: [art] Extend RT PCRs Done
43,156,826 UART: [art] Lock RT PCRs Done
43,158,435 UART: [art] Populate DV Done
43,164,097 UART: [fht] FMC Alias Private Key: 7
43,165,819 UART: [art] Derive CDI
43,166,661 UART: [art] Store in in slot 0x4
43,209,376 UART: [art] Derive Key Pair
43,210,376 UART: [art] Store priv key in slot 0x5
46,453,024 UART: [art] Derive Key Pair - Done
46,465,877 UART: [art] Signing Cert with AUTHO
46,467,189 UART: RITY.KEYID = 7
48,746,321 UART: [art] Erasing AUTHORITY.KEYID = 7
48,748,160 UART: [art] PUB.X = 139E05682D6EE8004D15ED34F5548D0178D1684A2F76BA72FD46BDEDE18270817697BFDF8DB88B98B86609964F8C1022
48,755,090 UART: [art] PUB.Y = 289A97EE3D98A0705A3D5EB21395071EDC9E17516DAD28BFEB93732B51878D5ED857291435A80CB90592EDE30ECD9DA6
48,762,359 UART: [art] SIG.R = 6F30B905F9DB550CA03BC64F59ACE77893FA2CBDEC314511E191B6BC1E7ECA0C236A5277DC7E4E6142C209700A6148CB
48,769,760 UART: [art] SIG.S = EB46944A12F73A014F0AAA985BAD40E5B4986B9657FF9035DED00BC2ACB823BB533B7A95FEE85EE8B731DDD8FD824DC8
50,074,441 UART: mbox::rt_entry...
50,075,417 UART: ____ _ _ _ ____ _____
50,077,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,079,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,081,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,083,307 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,085,168 UART: |_|
50,086,048 UART:
50,371,693 UART: [rt] Runtime listening for mailbox commands...
50,373,814 >>> mbox cmd response data (128 bytes)
52,434,292 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,329,913 >>> mbox cmd response: success
60,330,440 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,365,152 UART:
60,365,470 UART: Running Caliptra FMC ...
60,366,505 UART:
60,366,653 UART: [state] CFI Enabled
60,410,749 UART: [art] Extend RT PCRs Done
60,411,897 UART: [art] Lock RT PCRs Done
60,413,425 UART: [art] Populate DV Done
60,419,045 UART: [fht] FMC Alias Private Key: 7
60,420,688 UART: [art] Derive CDI
60,421,420 UART: [art] Store in in slot 0x4
60,464,388 UART: [art] Derive Key Pair
60,465,426 UART: [art] Store priv key in slot 0x5
63,707,487 UART: [art] Derive Key Pair - Done
63,720,219 UART: [art] Signing Cert with AUTHO
63,721,558 UART: RITY.KEYID = 7
66,001,070 UART: [art] Erasing AUTHORITY.KEYID = 7
66,002,590 UART: [art] PUB.X = AA8471819FEC890D2C73E967AD2069834F243B3ACB43404025A904BD959E638FF51DA29B68A025B8B4B63562E3949D32
66,009,833 UART: [art] PUB.Y = 9B762DBBABF5AFC563EBC3E80C7B829F481A1D452AD16850B28A1C50829841032CE35AF86A2FBDD72DD0B13939FFB588
66,017,052 UART: [art] SIG.R = B0B9DF0B16F1881B207C3792326E4CE62B4D6A24768AE8DE85D5B3F1266878486EFA5117274C38BE605C901F23DD8FA2
66,024,436 UART: [art] SIG.S = D0B1E4CE090C1DE11C50F3DD885E99AAAF8F41389A9CC4998E709061A53E1A1D4627B482B8EE9CF3AE9BBC957D962DA1
67,329,149 UART: mbox::rt_entry...
67,330,121 UART: ____ _ _ _ ____ _____
67,332,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,334,060 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,335,991 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,337,916 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,339,845 UART: |_|
67,340,671 UART:
67,629,290 UART: [rt] Runtime listening for mailbox commands...
67,631,302 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,535 UART:
192,894 UART: Running Caliptra ROM ...
194,096 UART:
194,260 UART: [state] CFI Enabled
266,547 UART: [state] LifecycleState = Unprovisioned
268,466 UART: [state] DebugLocked = No
270,354 UART: [state] WD Timer not started. Device not locked for debugging
274,668 UART: [kat] SHA2-256
453,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,420 UART: [kat] ++
465,948 UART: [kat] sha1
476,477 UART: [kat] SHA2-256
479,550 UART: [kat] SHA2-384
486,879 UART: [kat] SHA2-512-ACC
489,807 UART: [kat] ECC-384
2,947,250 UART: [kat] HMAC-384Kdf
2,972,697 UART: [kat] LMS
3,502,200 UART: [kat] --
3,506,032 UART: [cold-reset] ++
3,508,467 UART: [fht] FHT @ 0x50003400
3,518,448 UART: [idev] ++
3,519,016 UART: [idev] CDI.KEYID = 6
3,519,924 UART: [idev] SUBJECT.KEYID = 7
3,521,174 UART: [idev] UDS.KEYID = 0
3,522,093 ready_for_fw is high
3,522,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,879 UART: [idev] Erasing UDS.KEYID = 0
6,024,747 UART: [idev] Sha1 KeyId Algorithm
6,046,853 UART: [idev] --
6,050,606 UART: [ldev] ++
6,051,182 UART: [ldev] CDI.KEYID = 6
6,052,110 UART: [ldev] SUBJECT.KEYID = 5
6,053,267 UART: [ldev] AUTHORITY.KEYID = 7
6,054,548 UART: [ldev] FE.KEYID = 1
6,101,878 UART: [ldev] Erasing FE.KEYID = 1
8,606,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,073 UART: [ldev] --
10,415,454 UART: [fwproc] Wait for Commands...
10,417,873 UART: [fwproc] Recv command 0x46574c44
10,419,961 UART: [fwproc] Recv'd Img size: 114084 bytes
13,819,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,275,488 >>> mbox cmd response: success
14,279,522 UART: [afmc] ++
14,280,119 UART: [afmc] CDI.KEYID = 6
14,281,052 UART: [afmc] SUBJECT.KEYID = 7
14,282,213 UART: [afmc] AUTHORITY.KEYID = 5
16,808,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,713 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,551 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,388 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,705 UART: [afmc] --
18,610,413 UART: [cold-reset] --
18,612,386 UART: [state] Locking Datavault
18,616,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,985 UART: [state] Locking ICCM
18,620,674 UART: [exit] Launching FMC @ 0x40000130
18,629,127 UART:
18,629,356 UART: Running Caliptra FMC ...
18,630,470 UART:
18,630,633 UART: [state] CFI Enabled
18,692,239 UART: [fht] FMC Alias Private Key: 7
20,456,494 UART: [art] Extend RT PCRs Done
20,457,708 UART: [art] Lock RT PCRs Done
20,459,243 UART: [art] Populate DV Done
20,464,703 UART: [fht] FMC Alias Private Key: 7
20,466,289 UART: [art] Derive CDI
20,467,022 UART: [art] Store in in slot 0x4
20,525,035 UART: [art] Derive Key Pair
20,526,073 UART: [art] Store priv key in slot 0x5
22,989,027 UART: [art] Derive Key Pair - Done
23,002,083 UART: [art] Signing Cert with AUTHO
23,003,393 UART: RITY.KEYID = 7
24,714,913 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,414 UART: [art] PUB.X = 9AB65E47EC4CDFABA7B02CE1F2A3BF733C3B9C4468984759A95D257DA0B27F304FF6EAB51411DC5EA655493D0126F0D5
24,723,753 UART: [art] PUB.Y = AA7E3D24E3EB4CE44FB14BCAFB2E1FAA84947462A52028AAB84FF5B170B2A3317EC020D12B90A94459D6FB1D8E729BAB
24,731,025 UART: [art] SIG.R = 9DC8A48DD0E2F323A6A1AC56ED005A4355FDDD659CC8120607760216491F33296E3D678FA252D4B2990EC8C46F5B2F5C
24,738,385 UART: [art] SIG.S = B6EE0F9D4D45A6F533CD6C7D787A104ACD40C236899F47F01523508A67370B56185524B209A6858842CE329D4BD0129E
25,716,956 UART: Caliptra RT
25,717,642 UART: [state] CFI Enabled
25,883,933 UART: [rt] RT listening for mailbox commands...
25,886,545 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,917,043 UART: [rt]cmd =0x50435252, len=8
25,919,195 >>> mbox cmd response data (8 bytes)
27,971,695 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,072,356 UART:
28,072,725 UART: Running Caliptra ROM ...
28,073,805 UART:
28,073,963 UART: [state] CFI Enabled
28,146,449 UART: [state] LifecycleState = Unprovisioned
28,148,361 UART: [state] DebugLocked = No
28,150,583 UART: [state] WD Timer not started. Device not locked for debugging
28,155,135 UART: [kat] SHA2-256
28,334,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,345,844 UART: [kat] ++
28,346,302 UART: [kat] sha1
28,357,342 UART: [kat] SHA2-256
28,360,357 UART: [kat] SHA2-384
28,366,849 UART: [kat] SHA2-512-ACC
28,369,783 UART: [kat] ECC-384
30,833,427 UART: [kat] HMAC-384Kdf
30,855,236 UART: [kat] LMS
31,384,710 UART: [kat] --
31,389,422 UART: [update-reset] ++
34,381,663 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,385,205 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,642,577 >>> mbox cmd response: success
34,642,956 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,643,399 UART: [update-reset] Copying MAN_2 To MAN_1
34,665,682 UART: [update-reset Success] --
34,669,215 UART: [state] Locking Datavault
34,671,761 UART: [state] Locking PCR0, PCR1 and PCR31
34,673,458 UART: [state] Locking ICCM
34,674,525 UART: [exit] Launching FMC @ 0x40000130
34,682,981 UART:
34,683,219 UART: Running Caliptra FMC ...
34,684,319 UART:
34,684,472 UART: [state] CFI Enabled
34,772,718 UART: [art] Extend RT PCRs Done
34,773,917 UART: [art] Lock RT PCRs Done
34,775,482 UART: [art] Populate DV Done
34,780,936 UART: [fht] FMC Alias Private Key: 7
34,782,627 UART: [art] Derive CDI
34,783,441 UART: [art] Store in in slot 0x4
34,841,709 UART: [art] Derive Key Pair
34,842,703 UART: [art] Store priv key in slot 0x5
37,305,268 UART: [art] Derive Key Pair - Done
37,318,372 UART: [art] Signing Cert with AUTHO
37,319,674 UART: RITY.KEYID = 7
39,031,012 UART: [art] Erasing AUTHORITY.KEYID = 7
39,032,522 UART: [art] PUB.X = 014B03DBA837780B9F2B7EC66F68C92CBC47B45836AFA4F7184F87616237C3C4F4D82C6374C7A4DA414B91D210B2FEAC
39,039,799 UART: [art] PUB.Y = 3C1913A12D1C821DFABF5D197AB99059B79B194A05E9261BBB9E31551A963FCD1217F82D5237F9E18DC0521C7F2187EB
39,047,076 UART: [art] SIG.R = 560A2FA1761D9D9B3B649A58D849037548656047EF2A6482DD90512F60D538E58CA85D19B9C14A30847B43F3CD8BDFD6
39,054,459 UART: [art] SIG.S = 53F82F82A4A069C069DB47DEAF8BA3689699A1B8DBBDA6F1B27F39181CD7A8B3EDAE1CCB9465423ADB34FEFD4B52066A
40,032,582 UART: mbox::rt_entry...
40,033,547 UART: ____ _ _ _ ____ _____
40,035,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,037,533 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,039,462 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,041,392 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,043,318 UART: |_|
40,044,305 UART:
40,327,802 UART: [rt] Runtime listening for mailbox commands...
40,329,812 >>> mbox cmd response data (128 bytes)
42,380,633 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,480,242 UART:
42,480,654 UART: Running Caliptra ROM ...
42,481,931 UART:
42,482,113 UART: [state] CFI Enabled
42,550,060 UART: [state] LifecycleState = Unprovisioned
42,551,956 UART: [state] DebugLocked = No
42,554,424 UART: [state] WD Timer not started. Device not locked for debugging
42,557,523 UART: [kat] SHA2-256
42,736,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,748,224 UART: [kat] ++
42,748,771 UART: [kat] sha1
42,760,526 UART: [kat] SHA2-256
42,763,596 UART: [kat] SHA2-384
42,770,576 UART: [kat] SHA2-512-ACC
42,773,508 UART: [kat] ECC-384
45,234,580 UART: [kat] HMAC-384Kdf
45,256,624 UART: [kat] LMS
45,786,034 UART: [kat] --
45,792,264 UART: [update-reset] ++
48,778,237 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,781,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,038,381 >>> mbox cmd response: success
49,038,782 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,040,152 UART: [update-reset] Copying MAN_2 To MAN_1
49,062,493 UART: [update-reset Success] --
49,066,563 UART: [state] Locking Datavault
49,070,414 UART: [state] Locking PCR0, PCR1 and PCR31
49,072,060 UART: [state] Locking ICCM
49,074,594 UART: [exit] Launching FMC @ 0x40000130
49,083,046 UART:
49,083,283 UART: Running Caliptra FMC ...
49,084,383 UART:
49,084,537 UART: [state] CFI Enabled
49,172,399 UART: [art] Extend RT PCRs Done
49,173,604 UART: [art] Lock RT PCRs Done
49,175,275 UART: [art] Populate DV Done
49,180,839 UART: [fht] FMC Alias Private Key: 7
49,182,530 UART: [art] Derive CDI
49,183,347 UART: [art] Store in in slot 0x4
49,241,218 UART: [art] Derive Key Pair
49,242,217 UART: [art] Store priv key in slot 0x5
51,704,850 UART: [art] Derive Key Pair - Done
51,718,071 UART: [art] Signing Cert with AUTHO
51,719,377 UART: RITY.KEYID = 7
53,429,932 UART: [art] Erasing AUTHORITY.KEYID = 7
53,431,438 UART: [art] PUB.X = 50FA1EC51D588649747E4D5AD78ACC1A46C2D48DCBC9828079B8EF296670904767F891F3EA774AEAC59F79A6C84A26F9
53,438,730 UART: [art] PUB.Y = 199D0556AA087EEB6312E3894D54685B317D817FF6DDEB8DAA84F10D17A6539A1062EB2FBFF682E195BD672CF5977EF9
53,445,976 UART: [art] SIG.R = 79B4CD9A4797CF45FEFF1747C85061CA7730914338B489F09C2826F11018AAD7E17249C94012A3C114C10367A6DF9C76
53,453,348 UART: [art] SIG.S = 31D6AFF4E6EFC4F93FC66C8FB270D60C0185F0AF18B98A69E62F633EE9863F35C66FF7C6A6D3AA94BD8200B79D4CFCC5
54,431,708 UART: mbox::rt_entry...
54,432,659 UART: ____ _ _ _ ____ _____
54,434,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,436,646 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,438,581 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,440,512 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,442,436 UART: |_|
54,443,240 UART:
54,725,279 UART: [rt] Runtime listening for mailbox commands...
54,727,287 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,361,254 ready_for_fw is high
3,361,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,049,062 >>> mbox cmd response: success
18,340,316 UART:
18,340,730 UART: Running Caliptra FMC ...
18,341,832 UART:
18,341,986 UART: [state] CFI Enabled
18,410,417 UART: [fht] FMC Alias Private Key: 7
20,174,215 UART: [art] Extend RT PCRs Done
20,175,441 UART: [art] Lock RT PCRs Done
20,177,373 UART: [art] Populate DV Done
20,182,744 UART: [fht] FMC Alias Private Key: 7
20,184,330 UART: [art] Derive CDI
20,185,066 UART: [art] Store in in slot 0x4
20,242,537 UART: [art] Derive Key Pair
20,243,582 UART: [art] Store priv key in slot 0x5
22,706,153 UART: [art] Derive Key Pair - Done
22,718,931 UART: [art] Signing Cert with AUTHO
22,720,232 UART: RITY.KEYID = 7
24,431,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,487 UART: [art] PUB.X = 139ACC4DDA71CB12E8BA4AD383902B3A2429615C83C444248DD7798AC791A0B1B1DDB4FE4E6AB3188C45730DBE619A2A
24,440,797 UART: [art] PUB.Y = 1B93F1AA75CDDB3771F5DFB639CF8E18936FFD33406D181B5BAA5B496A4ACFD0476F8A576EB5001CCE71AE586E404A94
24,448,013 UART: [art] SIG.R = 580DAE0289EC852EF84B623D6119E0BB8F357967A9D994A6052F49901DFEE1DB63AE2EA54A209037FE316583D09E2C4D
24,455,393 UART: [art] SIG.S = 7B218AAF5181052388E41414CEC1E94552152060C176269C2E5B16DA00955282759FED5F9651788D9231B47C0ECD0BCD
25,434,376 UART: Caliptra RT
25,435,091 UART: [state] CFI Enabled
25,599,612 UART: [rt] RT listening for mailbox commands...
25,601,932 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,632,465 UART: [rt]cmd =0x50435252, len=8
25,634,697 >>> mbox cmd response data (8 bytes)
27,688,581 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,202,183 >>> mbox cmd response: success
34,202,667 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,237,460 UART:
34,237,755 UART: Running Caliptra FMC ...
34,238,790 UART:
34,238,934 UART: [state] CFI Enabled
34,335,618 UART: [art] Extend RT PCRs Done
34,336,810 UART: [art] Lock RT PCRs Done
34,338,128 UART: [art] Populate DV Done
34,343,973 UART: [fht] FMC Alias Private Key: 7
34,345,457 UART: [art] Derive CDI
34,346,220 UART: [art] Store in in slot 0x4
34,404,661 UART: [art] Derive Key Pair
34,405,715 UART: [art] Store priv key in slot 0x5
36,868,238 UART: [art] Derive Key Pair - Done
36,881,288 UART: [art] Signing Cert with AUTHO
36,882,594 UART: RITY.KEYID = 7
38,594,547 UART: [art] Erasing AUTHORITY.KEYID = 7
38,596,055 UART: [art] PUB.X = 5B335FD3ADA3669C6520B8BD17F47B840EA0EE031495B55B248DF28E068C7BD15D7230854F9C3005BFB184FC220D126B
38,603,373 UART: [art] PUB.Y = F6217EF0244DD07D547F12B3FF703C23F0005363B4B5F3D20D8023DC542639CA5AB23E72DCB549F642F63109EF6DE387
38,610,573 UART: [art] SIG.R = 5D3BB8AAC71C99B30BAE0B61BB5D3697D4995A483ABCDDC1A5B28423FE3653ECBE13DDE947943808BFC6198D38E187F7
38,617,944 UART: [art] SIG.S = EEC6805F3948A03495C8D404A76704D9C5A1FEE22761EB04C3E4A3716B3D241E7ED318AC038E9F007F561ECB00F71890
39,596,806 UART: mbox::rt_entry...
39,597,765 UART: ____ _ _ _ ____ _____
39,599,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,601,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,603,669 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,605,594 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,607,518 UART: |_|
39,608,350 UART:
39,894,167 UART: [rt] Runtime listening for mailbox commands...
39,896,221 >>> mbox cmd response data (128 bytes)
41,945,405 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,477,565 >>> mbox cmd response: success
48,478,070 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,510,456 UART:
48,510,761 UART: Running Caliptra FMC ...
48,511,880 UART:
48,512,039 UART: [state] CFI Enabled
48,608,374 UART: [art] Extend RT PCRs Done
48,609,569 UART: [art] Lock RT PCRs Done
48,611,047 UART: [art] Populate DV Done
48,616,625 UART: [fht] FMC Alias Private Key: 7
48,618,221 UART: [art] Derive CDI
48,619,036 UART: [art] Store in in slot 0x4
48,677,408 UART: [art] Derive Key Pair
48,678,442 UART: [art] Store priv key in slot 0x5
51,141,081 UART: [art] Derive Key Pair - Done
51,154,254 UART: [art] Signing Cert with AUTHO
51,155,562 UART: RITY.KEYID = 7
52,866,873 UART: [art] Erasing AUTHORITY.KEYID = 7
52,868,387 UART: [art] PUB.X = 1C9DD641901C453A180D287C436075C45E4FA82B76CDC677A2CCC3340A05A88DC9730CDD5391BBE8CC755834CF2D3C7B
52,875,664 UART: [art] PUB.Y = 12CFC500AB96F1D4F6885F52D68ECEDE787BB92ED6D0EF3A7D02CE800A741CB92895406A57E5196B0183FBC13AA9CB1E
52,882,875 UART: [art] SIG.R = E8FDAC3377DEB75BB6EBDE744BD2FBBDD1B8A63D7C107211B0493AC009C24FB572889A09FAEDB7724B4B2C1663541B5F
52,890,342 UART: [art] SIG.S = F5FE3CFDF337892A2FFF08DC9E01EDDF89A308726D9EFF7157B02F100424815534BAC745CA64466FFD5DEBD6151741AA
53,868,589 UART: mbox::rt_entry...
53,869,536 UART: ____ _ _ _ ____ _____
53,871,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,873,658 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,875,584 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,878,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,880,060 UART: |_|
53,880,870 UART:
54,163,727 UART: [rt] Runtime listening for mailbox commands...
54,165,741 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
193,134 UART:
193,503 UART: Running Caliptra ROM ...
194,721 UART:
604,031 UART: [state] CFI Enabled
614,579 UART: [state] LifecycleState = Unprovisioned
616,579 UART: [state] DebugLocked = No
619,457 UART: [state] WD Timer not started. Device not locked for debugging
623,068 UART: [kat] SHA2-256
802,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,751 UART: [kat] ++
814,201 UART: [kat] sha1
825,849 UART: [kat] SHA2-256
828,926 UART: [kat] SHA2-384
834,429 UART: [kat] SHA2-512-ACC
837,366 UART: [kat] ECC-384
3,279,150 UART: [kat] HMAC-384Kdf
3,291,237 UART: [kat] LMS
3,820,690 UART: [kat] --
3,825,567 UART: [cold-reset] ++
3,826,862 UART: [fht] FHT @ 0x50003400
3,838,474 UART: [idev] ++
3,839,042 UART: [idev] CDI.KEYID = 6
3,839,961 UART: [idev] SUBJECT.KEYID = 7
3,841,054 UART: [idev] UDS.KEYID = 0
3,842,176 ready_for_fw is high
3,842,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,631 UART: [idev] Erasing UDS.KEYID = 0
6,313,077 UART: [idev] Sha1 KeyId Algorithm
6,335,722 UART: [idev] --
6,340,421 UART: [ldev] ++
6,340,995 UART: [ldev] CDI.KEYID = 6
6,341,878 UART: [ldev] SUBJECT.KEYID = 5
6,343,085 UART: [ldev] AUTHORITY.KEYID = 7
6,344,322 UART: [ldev] FE.KEYID = 1
6,355,448 UART: [ldev] Erasing FE.KEYID = 1
8,827,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,633 UART: [ldev] --
10,616,391 UART: [fwproc] Wait for Commands...
10,619,496 UART: [fwproc] Recv command 0x46574c44
10,621,544 UART: [fwproc] Recv'd Img size: 114084 bytes
14,021,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,089,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,158,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,475,401 >>> mbox cmd response: success
14,479,894 UART: [afmc] ++
14,480,498 UART: [afmc] CDI.KEYID = 6
14,481,400 UART: [afmc] SUBJECT.KEYID = 7
14,482,567 UART: [afmc] AUTHORITY.KEYID = 5
16,988,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,273 UART: [afmc] --
18,783,181 UART: [cold-reset] --
18,788,078 UART: [state] Locking Datavault
18,791,875 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,521 UART: [state] Locking ICCM
18,795,724 UART: [exit] Launching FMC @ 0x40000130
18,804,128 UART:
18,804,377 UART: Running Caliptra FMC ...
18,805,501 UART:
18,805,664 UART: [state] CFI Enabled
18,813,447 UART: [fht] FMC Alias Private Key: 7
20,570,778 UART: [art] Extend RT PCRs Done
20,571,993 UART: [art] Lock RT PCRs Done
20,573,575 UART: [art] Populate DV Done
20,579,096 UART: [fht] FMC Alias Private Key: 7
20,580,746 UART: [art] Derive CDI
20,581,563 UART: [art] Store in in slot 0x4
20,624,379 UART: [art] Derive Key Pair
20,625,419 UART: [art] Store priv key in slot 0x5
23,051,769 UART: [art] Derive Key Pair - Done
23,064,931 UART: [art] Signing Cert with AUTHO
23,066,273 UART: RITY.KEYID = 7
24,771,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,079 UART: [art] PUB.X = 2D1B37D751480FE3F6FEA2A88C87B03C1DB7307272FC5FB4852C02B8C7C060B7E989A503DE1CD84C9B6132E79D9D6D21
24,780,355 UART: [art] PUB.Y = 11415E3B10F875F472B6210824264D0F90654A03C3720B62762F19AFDDA70617C510249A03591F039B31F2AA4CA0AAF2
24,787,524 UART: [art] SIG.R = D74EE52F2384A1403C912D29DD34EAFEF9E7E81BFC500DB0410A30DB5BA854383610C19B01B6E254E8801B7BD7033AF9
24,794,952 UART: [art] SIG.S = 48964AB87E80BA9750F0E5D06D2EB2D5F18E43709FEE140E1935F93FA9143E30B128D2868CAC4061DFFB375FAFDB62CA
25,773,787 UART: Caliptra RT
25,774,487 UART: [state] CFI Enabled
25,891,923 UART: [rt] RT listening for mailbox commands...
25,894,314 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,923,963 UART: [rt]cmd =0x50435252, len=8
25,925,969 >>> mbox cmd response data (8 bytes)
27,979,035 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,079,461 UART:
28,079,836 UART: Running Caliptra ROM ...
28,080,915 UART:
28,081,071 UART: [state] CFI Enabled
28,095,107 UART: [state] LifecycleState = Unprovisioned
28,096,958 UART: [state] DebugLocked = No
28,098,589 UART: [state] WD Timer not started. Device not locked for debugging
28,102,275 UART: [kat] SHA2-256
28,281,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,292,980 UART: [kat] ++
28,293,434 UART: [kat] sha1
28,304,912 UART: [kat] SHA2-256
28,307,966 UART: [kat] SHA2-384
28,314,828 UART: [kat] SHA2-512-ACC
28,317,776 UART: [kat] ECC-384
30,759,719 UART: [kat] HMAC-384Kdf
30,771,579 UART: [kat] LMS
31,301,091 UART: [kat] --
31,305,124 UART: [update-reset] ++
34,300,257 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,304,389 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,561,680 >>> mbox cmd response: success
34,562,055 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,563,101 UART: [update-reset] Copying MAN_2 To MAN_1
34,585,430 UART: [update-reset Success] --
34,589,558 UART: [state] Locking Datavault
34,593,619 UART: [state] Locking PCR0, PCR1 and PCR31
34,595,266 UART: [state] Locking ICCM
34,597,978 UART: [exit] Launching FMC @ 0x40000130
34,606,430 UART:
34,606,666 UART: Running Caliptra FMC ...
34,607,692 UART:
34,607,838 UART: [state] CFI Enabled
34,652,342 UART: [art] Extend RT PCRs Done
34,653,545 UART: [art] Lock RT PCRs Done
34,654,815 UART: [art] Populate DV Done
34,660,446 UART: [fht] FMC Alias Private Key: 7
34,661,924 UART: [art] Derive CDI
34,662,694 UART: [art] Store in in slot 0x4
34,705,241 UART: [art] Derive Key Pair
34,706,276 UART: [art] Store priv key in slot 0x5
37,133,787 UART: [art] Derive Key Pair - Done
37,147,111 UART: [art] Signing Cert with AUTHO
37,148,413 UART: RITY.KEYID = 7
38,853,705 UART: [art] Erasing AUTHORITY.KEYID = 7
38,855,206 UART: [art] PUB.X = 5CC64B331C8ABA384BB11F05E2BC274260828BD33A896D9FB99B26ADA573ECAD536637C42281DE1A0E5C2CD17400FDC4
38,862,494 UART: [art] PUB.Y = F7C204C6D3F38B0EB4F8EA4687D7D07229A5ACED4B626DB161324794C40E75576D35B9DABB43E276FDA41413056DF365
38,869,758 UART: [art] SIG.R = D4BCB3A47A04481AA8DC20F7A7ECD8904E2FD03C5F2524D10037E0D2DCEB006E64C35BBF74AE9E602F582F3DBC17D3AB
38,877,127 UART: [art] SIG.S = 58B3EBF1D63AC1C7B5C4CC45D29560C3B7E41ED0305A63A863454B0C05C0DED97DB8C3C49D87BCE86229837307FDC372
39,855,595 UART: mbox::rt_entry...
39,856,584 UART: ____ _ _ _ ____ _____
39,858,515 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,860,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,862,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,864,394 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,866,323 UART: |_|
39,867,153 UART:
40,152,576 UART: [rt] Runtime listening for mailbox commands...
40,154,785 >>> mbox cmd response data (128 bytes)
42,206,205 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,306,074 UART:
42,306,473 UART: Running Caliptra ROM ...
42,307,553 UART:
42,307,710 UART: [state] CFI Enabled
42,321,336 UART: [state] LifecycleState = Unprovisioned
42,323,231 UART: [state] DebugLocked = No
42,325,990 UART: [state] WD Timer not started. Device not locked for debugging
42,330,053 UART: [kat] SHA2-256
42,509,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,520,791 UART: [kat] ++
42,521,249 UART: [kat] sha1
42,531,806 UART: [kat] SHA2-256
42,534,818 UART: [kat] SHA2-384
42,541,678 UART: [kat] SHA2-512-ACC
42,544,609 UART: [kat] ECC-384
44,988,280 UART: [kat] HMAC-384Kdf
45,000,453 UART: [kat] LMS
45,529,979 UART: [kat] --
45,533,682 UART: [update-reset] ++
48,523,617 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,526,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
48,783,696 >>> mbox cmd response: success
48,784,073 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,784,840 UART: [update-reset] Copying MAN_2 To MAN_1
48,807,173 UART: [update-reset Success] --
48,812,323 UART: [state] Locking Datavault
48,816,657 UART: [state] Locking PCR0, PCR1 and PCR31
48,818,360 UART: [state] Locking ICCM
48,819,400 UART: [exit] Launching FMC @ 0x40000130
48,827,846 UART:
48,828,080 UART: Running Caliptra FMC ...
48,829,106 UART:
48,829,252 UART: [state] CFI Enabled
48,872,679 UART: [art] Extend RT PCRs Done
48,873,884 UART: [art] Lock RT PCRs Done
48,875,285 UART: [art] Populate DV Done
48,880,644 UART: [fht] FMC Alias Private Key: 7
48,882,175 UART: [art] Derive CDI
48,882,989 UART: [art] Store in in slot 0x4
48,926,069 UART: [art] Derive Key Pair
48,927,071 UART: [art] Store priv key in slot 0x5
51,353,493 UART: [art] Derive Key Pair - Done
51,366,218 UART: [art] Signing Cert with AUTHO
51,367,520 UART: RITY.KEYID = 7
53,072,598 UART: [art] Erasing AUTHORITY.KEYID = 7
53,074,109 UART: [art] PUB.X = 6091CCB88FFE7C51F1145F2990C527DA5433850AFDB2A960B4254BC1B54D59512AF3FF6C8DD444FDFF177E642B500036
53,081,338 UART: [art] PUB.Y = B6203EF056B3EEB4C3F759487F021D7B3A42897B8D9C584E2094E7A262F88721B35C7D194A6973E2A5A99FE13A49B5F4
53,088,597 UART: [art] SIG.R = BDC048FB494D37DBE145706BC2A140206D88B5752C6A1D19ADFC4341127CDD0C90E93C5B289FE8D94A8925A251EA41A3
53,096,018 UART: [art] SIG.S = 0437EC884F14763D818D08241C558BE3FF93DE3DEDD52714F3B72014CC9FD020C3627C577E225A40C808FFDF728B1EED
54,073,980 UART: mbox::rt_entry...
54,074,977 UART: ____ _ _ _ ____ _____
54,076,975 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,078,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,080,928 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,082,863 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,084,797 UART: |_|
54,085,608 UART:
54,369,630 UART: [rt] Runtime listening for mailbox commands...
54,371,644 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
3,693,940 ready_for_fw is high
3,694,463 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,266,135 >>> mbox cmd response: success
18,513,163 UART:
18,513,557 UART: Running Caliptra FMC ...
18,514,692 UART:
18,514,855 UART: [state] CFI Enabled
18,522,731 UART: [fht] FMC Alias Private Key: 7
20,279,649 UART: [art] Extend RT PCRs Done
20,280,879 UART: [art] Lock RT PCRs Done
20,282,562 UART: [art] Populate DV Done
20,287,713 UART: [fht] FMC Alias Private Key: 7
20,289,288 UART: [art] Derive CDI
20,290,118 UART: [art] Store in in slot 0x4
20,332,789 UART: [art] Derive Key Pair
20,333,837 UART: [art] Store priv key in slot 0x5
22,760,918 UART: [art] Derive Key Pair - Done
22,773,980 UART: [art] Signing Cert with AUTHO
22,775,288 UART: RITY.KEYID = 7
24,480,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,224 UART: [art] PUB.X = 71CA6B5A70EFA90BFC53B63D8E51790B255F963AD5BFC1D1E5573315EFB9C993C6724E5D0DE9BC132FDB01314B3A4847
24,489,496 UART: [art] PUB.Y = 60BC20790B96E560C3A762883908A37B36AC62C0A77D61C4EF3A3083F0AB1911D07639691C0E524F65F980676970D2D6
24,496,723 UART: [art] SIG.R = D0B3C05539862A9EF1E66E33959DA6CD079FB877FA548A0E2326C510F85AEA62370E6BB3046FEA270ABFD17E2E1C2ED2
24,504,159 UART: [art] SIG.S = AE434144D73FCCC4C4DFDDCFD586DF88D6535897416B70382C5348F6E5FD3D46D41AAA266D9527C8D3670036B16FB33C
25,483,620 UART: Caliptra RT
25,484,323 UART: [state] CFI Enabled
25,600,326 UART: [rt] RT listening for mailbox commands...
25,602,621 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,632,582 UART: [rt]cmd =0x50435252, len=8
25,634,389 >>> mbox cmd response data (8 bytes)
27,685,402 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,120,361 >>> mbox cmd response: success
34,120,836 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,156,031 UART:
34,156,357 UART: Running Caliptra FMC ...
34,157,486 UART:
34,157,671 UART: [state] CFI Enabled
34,201,854 UART: [art] Extend RT PCRs Done
34,203,000 UART: [art] Lock RT PCRs Done
34,204,345 UART: [art] Populate DV Done
34,210,100 UART: [fht] FMC Alias Private Key: 7
34,211,856 UART: [art] Derive CDI
34,212,683 UART: [art] Store in in slot 0x4
34,254,800 UART: [art] Derive Key Pair
34,255,842 UART: [art] Store priv key in slot 0x5
36,682,140 UART: [art] Derive Key Pair - Done
36,695,619 UART: [art] Signing Cert with AUTHO
36,696,923 UART: RITY.KEYID = 7
38,402,596 UART: [art] Erasing AUTHORITY.KEYID = 7
38,404,098 UART: [art] PUB.X = F301DE2930D3172A944462D99127E92B0695C59878E912E15449B1D35AA69EF38C88DDD3F65E70FB3E93238C568B633D
38,411,326 UART: [art] PUB.Y = A7C9826020E171E0BDE21EC8E47166BF35C51F733A5F98FF352519EEEDB5FEBE5C4BB29E86611ADF074A6E9768608D0B
38,418,589 UART: [art] SIG.R = 23DE4457767353CE3713428B27C007F5B4381D6C89BA01875BAB5E977F89329A2EE689E1302DD326E7CFF2A9DA3ED09C
38,426,009 UART: [art] SIG.S = DFE96B4BB969C41A2FEB750091B08ED73BF30F7E51D256C31E0F45FC2E9711A8095FE61C3F95B8C52BAC1C80C2D8D2FB
39,404,346 UART: mbox::rt_entry...
39,405,305 UART: ____ _ _ _ ____ _____
39,407,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,409,313 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,411,247 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,413,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,415,106 UART: |_|
39,415,911 UART:
39,704,095 UART: [rt] Runtime listening for mailbox commands...
39,706,137 >>> mbox cmd response data (128 bytes)
41,755,271 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,197,040 >>> mbox cmd response: success
48,197,521 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,233,529 UART:
48,233,866 UART: Running Caliptra FMC ...
48,235,018 UART:
48,235,189 UART: [state] CFI Enabled
48,278,939 UART: [art] Extend RT PCRs Done
48,280,084 UART: [art] Lock RT PCRs Done
48,281,270 UART: [art] Populate DV Done
48,286,677 UART: [fht] FMC Alias Private Key: 7
48,288,281 UART: [art] Derive CDI
48,289,099 UART: [art] Store in in slot 0x4
48,331,812 UART: [art] Derive Key Pair
48,332,854 UART: [art] Store priv key in slot 0x5
50,759,339 UART: [art] Derive Key Pair - Done
50,772,500 UART: [art] Signing Cert with AUTHO
50,773,801 UART: RITY.KEYID = 7
52,479,124 UART: [art] Erasing AUTHORITY.KEYID = 7
52,480,637 UART: [art] PUB.X = CA2A578F769BA1E740B2A10F9045DF122DF0DF368D0379BB23AADE00605E08171D3749F1CB20396DE01A645D9FE430C3
52,487,911 UART: [art] PUB.Y = 84F3D061272C79ECA82DDC08ABBEBFFCE7EE4632A6049CB859F6BED5A66E0742D2E5109E669894E1A26DAC81DAF9681E
52,495,186 UART: [art] SIG.R = 49D48ED39FFE5BC09588453B48A9DB1C1E5F9A31AABB3240EC946C9A375142EB1C8BC3C4F1091F016213945467348475
52,502,562 UART: [art] SIG.S = 0222B36C19DB2CDEEF7C664A3FF34D6FD3C6D9B4F7BB5E4447DF7CE463E915FC29B0B0DA751E0A694F380A7E184BA203
53,481,040 UART: mbox::rt_entry...
53,481,986 UART: ____ _ _ _ ____ _____
53,484,088 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,486,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,487,964 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,489,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,491,747 UART: |_|
53,492,576 UART:
53,777,062 UART: [rt] Runtime listening for mailbox commands...
53,779,112 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,413 UART:
192,786 UART: Running Caliptra ROM ...
193,934 UART:
194,083 UART: [state] CFI Enabled
263,528 UART: [state] LifecycleState = Unprovisioned
265,919 UART: [state] DebugLocked = No
267,485 UART: [state] WD Timer not started. Device not locked for debugging
272,257 UART: [kat] SHA2-256
462,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,907 UART: [kat] ++
473,354 UART: [kat] sha1
484,512 UART: [kat] SHA2-256
487,515 UART: [kat] SHA2-384
493,359 UART: [kat] SHA2-512-ACC
495,933 UART: [kat] ECC-384
2,949,345 UART: [kat] HMAC-384Kdf
2,971,680 UART: [kat] LMS
3,503,441 UART: [kat] --
3,507,654 UART: [cold-reset] ++
3,510,006 UART: [fht] FHT @ 0x50003400
3,520,491 UART: [idev] ++
3,521,198 UART: [idev] CDI.KEYID = 6
3,522,100 UART: [idev] SUBJECT.KEYID = 7
3,523,338 UART: [idev] UDS.KEYID = 0
3,524,240 ready_for_fw is high
3,524,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,903 UART: [idev] Erasing UDS.KEYID = 0
6,028,924 UART: [idev] Sha1 KeyId Algorithm
6,051,408 UART: [idev] --
6,056,261 UART: [ldev] ++
6,056,939 UART: [ldev] CDI.KEYID = 6
6,057,876 UART: [ldev] SUBJECT.KEYID = 5
6,059,030 UART: [ldev] AUTHORITY.KEYID = 7
6,060,259 UART: [ldev] FE.KEYID = 1
6,099,903 UART: [ldev] Erasing FE.KEYID = 1
8,605,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,027 UART: [ldev] --
10,413,826 UART: [fwproc] Wait for Commands...
10,415,488 UART: [fwproc] Recv command 0x46574c44
10,417,797 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,596,762 >>> mbox cmd response: success
14,600,214 UART: [afmc] ++
14,600,927 UART: [afmc] CDI.KEYID = 6
14,602,040 UART: [afmc] SUBJECT.KEYID = 7
14,603,592 UART: [afmc] AUTHORITY.KEYID = 5
17,148,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,243 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,048 UART: [afmc] --
18,945,970 UART: [cold-reset] --
18,950,920 UART: [state] Locking Datavault
18,955,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,535 UART: [state] Locking ICCM
18,958,875 UART: [exit] Launching FMC @ 0x40000130
18,967,508 UART:
18,967,735 UART: Running Caliptra FMC ...
18,968,835 UART:
18,968,989 UART: [state] CFI Enabled
19,028,976 UART: [fht] FMC Alias Private Key: 7
20,793,734 UART: [art] Extend RT PCRs Done
20,794,971 UART: [art] Lock RT PCRs Done
20,796,624 UART: [art] Populate DV Done
20,801,764 UART: [fht] FMC Alias Private Key: 7
20,803,462 UART: [art] Derive CDI
20,804,200 UART: [art] Store in in slot 0x4
20,862,208 UART: [art] Derive Key Pair
20,863,246 UART: [art] Store priv key in slot 0x5
23,326,033 UART: [art] Derive Key Pair - Done
23,338,761 UART: [art] Signing Cert with AUTHO
23,340,068 UART: RITY.KEYID = 7
25,052,674 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,187 UART: [art] PUB.X = 0CC520E962AAD8740532E6FF7E6427BD61DF08BE08F01594A05A65E265EBA5908FE768B2C5B638D6CEC794E00D201A56
25,061,405 UART: [art] PUB.Y = 56928C85DA6FCE641370170D7981E53DDF5E450DAB78842E5E8B76449D0F44F3B57407144E17BF08CED27193CE77EEA5
25,068,640 UART: [art] SIG.R = 4D8D7441593C1A15FCA8724CCB5B53B3D64C31477575C9D0B1EE05D3F8C6491C9FEEE69F5F3F0C2F4A3823BDD149E7D3
25,076,073 UART: [art] SIG.S = 98DA5F28388E83AC69F69B01DA59A4C2CE454C03B15672E879E8514990D2AF5514F311CBED7DA0C6CFF51632BA756BC3
26,054,938 UART: Caliptra RT
26,055,669 UART: [state] CFI Enabled
26,220,114 UART: [rt] RT listening for mailbox commands...
26,222,195 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,252,551 UART: [rt]cmd =0x50435252, len=8
26,254,698 >>> mbox cmd response data (8 bytes)
28,306,947 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,407,181 UART:
28,407,560 UART: Running Caliptra ROM ...
28,408,636 UART:
28,408,794 UART: [state] CFI Enabled
28,487,620 UART: [state] LifecycleState = Unprovisioned
28,489,682 UART: [state] DebugLocked = No
28,492,385 UART: [state] WD Timer not started. Device not locked for debugging
28,497,667 UART: [kat] SHA2-256
28,687,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,698,295 UART: [kat] ++
28,698,777 UART: [kat] sha1
28,709,175 UART: [kat] SHA2-256
28,712,148 UART: [kat] SHA2-384
28,718,031 UART: [kat] SHA2-512-ACC
28,720,609 UART: [kat] ECC-384
31,167,170 UART: [kat] HMAC-384Kdf
31,192,163 UART: [kat] LMS
31,723,703 UART: [kat] --
31,727,921 UART: [update-reset] ++
34,748,660 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,752,910 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,145,182 >>> mbox cmd response: success
35,145,594 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,145,871 UART: [update-reset] Copying MAN_2 To MAN_1
35,183,292 UART: [update-reset Success] --
35,188,545 UART: [state] Locking Datavault
35,191,054 UART: [state] Locking PCR0, PCR1 and PCR31
35,193,212 UART: [state] Locking ICCM
35,195,775 UART: [exit] Launching FMC @ 0x40000130
35,204,454 UART:
35,204,691 UART: Running Caliptra FMC ...
35,205,787 UART:
35,205,937 UART: [state] CFI Enabled
35,299,216 UART: [art] Extend RT PCRs Done
35,300,401 UART: [art] Lock RT PCRs Done
35,301,989 UART: [art] Populate DV Done
35,307,833 UART: [fht] FMC Alias Private Key: 7
35,309,525 UART: [art] Derive CDI
35,310,289 UART: [art] Store in in slot 0x4
35,367,740 UART: [art] Derive Key Pair
35,368,736 UART: [art] Store priv key in slot 0x5
37,831,665 UART: [art] Derive Key Pair - Done
37,844,673 UART: [art] Signing Cert with AUTHO
37,845,983 UART: RITY.KEYID = 7
39,556,903 UART: [art] Erasing AUTHORITY.KEYID = 7
39,558,407 UART: [art] PUB.X = E684D1E6E98E04E73D6939DF801BCF8257F2D9504C80EF942AB55B22FC8BE771D4D96F6986092A822AB93AF844639348
39,565,631 UART: [art] PUB.Y = 3A84D44DC3E59581EA605C37DFA5EB3A8ADC92D36A63DDF6D174A98E46E665596D3EC9BEBE15545987B14E57536EC4CC
39,572,932 UART: [art] SIG.R = E900CBE4D0CCBB4E6D09C7FDEF18101A191AF324D7DE37CC44878AA1CD9149F4E0C1AD7B1500D956F94AE181F9147A3E
39,580,305 UART: [art] SIG.S = 5D1D290C4B43C84EB87A66FE79B07EC704111241766CA90E786F4D8E7D2AA27FEDE818D4E00260E3BB4F1B70F86DFC86
40,558,782 UART: mbox::rt_entry...
40,559,748 UART: ____ _ _ _ ____ _____
40,561,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,563,853 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,565,777 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,567,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,569,644 UART: |_|
40,570,475 UART:
40,855,987 UART: [rt] Runtime listening for mailbox commands...
40,857,999 >>> mbox cmd response data (128 bytes)
42,908,810 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
43,008,337 UART:
43,008,709 UART: Running Caliptra ROM ...
43,009,763 UART:
43,009,917 UART: [state] CFI Enabled
43,074,933 UART: [state] LifecycleState = Unprovisioned
43,077,047 UART: [state] DebugLocked = No
43,078,865 UART: [state] WD Timer not started. Device not locked for debugging
43,084,340 UART: [kat] SHA2-256
43,274,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,284,946 UART: [kat] ++
43,285,398 UART: [kat] sha1
43,295,804 UART: [kat] SHA2-256
43,298,776 UART: [kat] SHA2-384
43,303,808 UART: [kat] SHA2-512-ACC
43,306,389 UART: [kat] ECC-384
45,755,913 UART: [kat] HMAC-384Kdf
45,779,982 UART: [kat] LMS
46,311,560 UART: [kat] --
46,315,838 UART: [update-reset] ++
49,335,400 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,339,319 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,731,572 >>> mbox cmd response: success
49,731,977 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,732,262 UART: [update-reset] Copying MAN_2 To MAN_1
49,769,584 UART: [update-reset Success] --
49,774,036 UART: [state] Locking Datavault
49,778,711 UART: [state] Locking PCR0, PCR1 and PCR31
49,780,873 UART: [state] Locking ICCM
49,783,411 UART: [exit] Launching FMC @ 0x40000130
49,792,038 UART:
49,792,286 UART: Running Caliptra FMC ...
49,793,391 UART:
49,793,545 UART: [state] CFI Enabled
49,887,256 UART: [art] Extend RT PCRs Done
49,888,442 UART: [art] Lock RT PCRs Done
49,889,892 UART: [art] Populate DV Done
49,895,461 UART: [fht] FMC Alias Private Key: 7
49,897,206 UART: [art] Derive CDI
49,898,031 UART: [art] Store in in slot 0x4
49,956,829 UART: [art] Derive Key Pair
49,957,865 UART: [art] Store priv key in slot 0x5
52,420,555 UART: [art] Derive Key Pair - Done
52,433,473 UART: [art] Signing Cert with AUTHO
52,434,798 UART: RITY.KEYID = 7
54,146,339 UART: [art] Erasing AUTHORITY.KEYID = 7
54,147,844 UART: [art] PUB.X = 5382EEF1DA709B1849A84B9C97C78C6DFFE092DBF0D4A0B318246BF3B004B5BAE67F6DBE2C497D811C37B624845A677F
54,155,106 UART: [art] PUB.Y = 09375FD62CB49868D2DAD5D7615CD998AC261203AB70C27650BE03B0FD89A407B7639A8A52B28007962E6D2115904599
54,162,371 UART: [art] SIG.R = 1F2614B561733A182B918FAA054541B9D561CD0B084B1F24D2661A95964B5249266EEAC9588E1217C06597A85237A7E2
54,169,686 UART: [art] SIG.S = 137FBE3495AFA1FE635AF50A770725F045D83060E153939B13523AC1C6D70D5A9A98BF5862C64B2D4F63E4BD27ECD756
55,148,077 UART: mbox::rt_entry...
55,149,063 UART: ____ _ _ _ ____ _____
55,151,011 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,153,018 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,154,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,156,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,158,822 UART: |_|
55,159,796 UART:
55,445,941 UART: [rt] Runtime listening for mailbox commands...
55,447,953 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,238 writing to cptra_bootfsm_go
3,438,877 ready_for_fw is high
3,439,465 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,721,399 >>> mbox cmd response: success
19,000,361 UART:
19,000,771 UART: Running Caliptra FMC ...
19,002,003 UART:
19,002,182 UART: [state] CFI Enabled
19,072,081 UART: [fht] FMC Alias Private Key: 7
20,836,733 UART: [art] Extend RT PCRs Done
20,837,961 UART: [art] Lock RT PCRs Done
20,839,542 UART: [art] Populate DV Done
20,844,898 UART: [fht] FMC Alias Private Key: 7
20,846,386 UART: [art] Derive CDI
20,847,152 UART: [art] Store in in slot 0x4
20,904,678 UART: [art] Derive Key Pair
20,905,720 UART: [art] Store priv key in slot 0x5
23,368,888 UART: [art] Derive Key Pair - Done
23,381,940 UART: [art] Signing Cert with AUTHO
23,383,248 UART: RITY.KEYID = 7
25,094,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,109 UART: [art] PUB.X = 9D31083DCD5FB9F38C00594E67801F62F4CD8BA1133E5B885F5D8B246A62777B627E21E00824BBA4E6821EBAD8764CE6
25,103,393 UART: [art] PUB.Y = 2303DBE99C1F4B1D43C9D884818587027069C9D79F28D1590F8E874B845C88CA4BD9E5655B1ECBF78882DDCC283806D5
25,110,619 UART: [art] SIG.R = E79FC525CE8524675BCAD3713332299D62B67004D009F25A2735C33ECF2539E61FCA72C0D9E46ECADAFBB02663420751
25,118,024 UART: [art] SIG.S = 9067763450505A982F30C357290E7D484BCE7B2C855583C66C2773494D25D3516963BA21B4F6FB23F95F0A7FD9B0F8B8
26,097,574 UART: Caliptra RT
26,098,284 UART: [state] CFI Enabled
26,264,331 UART: [rt] RT listening for mailbox commands...
26,266,693 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,296,801 UART: [rt]cmd =0x50435252, len=8
26,298,791 >>> mbox cmd response data (8 bytes)
28,350,738 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,335,883 >>> mbox cmd response: success
35,336,395 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,371,399 UART:
35,371,724 UART: Running Caliptra FMC ...
35,372,850 UART:
35,373,010 UART: [state] CFI Enabled
35,470,823 UART: [art] Extend RT PCRs Done
35,472,002 UART: [art] Lock RT PCRs Done
35,473,598 UART: [art] Populate DV Done
35,479,115 UART: [fht] FMC Alias Private Key: 7
35,480,646 UART: [art] Derive CDI
35,481,456 UART: [art] Store in in slot 0x4
35,539,981 UART: [art] Derive Key Pair
35,541,013 UART: [art] Store priv key in slot 0x5
38,003,941 UART: [art] Derive Key Pair - Done
38,016,892 UART: [art] Signing Cert with AUTHO
38,018,195 UART: RITY.KEYID = 7
39,729,576 UART: [art] Erasing AUTHORITY.KEYID = 7
39,731,101 UART: [art] PUB.X = 2DFE75D9CBC6BCC438361254A1CE770CF4090FCD6D20156C6B71E29DA163C4C73DB9A8B3A9E3C8272D77AB2A081B62EF
39,738,327 UART: [art] PUB.Y = 5282F22AF9297EA546DC6E0AA3C08692BB3F863AEF83EEB8B350EADBA38B09B11B0DE02E85055094CE8889CE7B8C4125
39,745,657 UART: [art] SIG.R = 9C77A52EDC57E050E3A3B6B83B77FEB3507651C86B0C0969C217D43218E1909CCA781BBD34D789E2813FBE4A0B2CBD5A
39,753,033 UART: [art] SIG.S = EC91E9866391F6AE713591A3FE053C797481F42BF26C22F3A99FB60F9FAACFFAA19A15BF720273366E92EB3FF7BCA6D3
40,731,742 UART: mbox::rt_entry...
40,732,706 UART: ____ _ _ _ ____ _____
40,734,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,736,694 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,738,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,740,547 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,742,470 UART: |_|
40,743,274 UART:
41,032,553 UART: [rt] Runtime listening for mailbox commands...
41,034,629 >>> mbox cmd response data (128 bytes)
43,083,469 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,094,837 >>> mbox cmd response: success
50,095,393 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,129,983 UART:
50,130,275 UART: Running Caliptra FMC ...
50,131,341 UART:
50,131,494 UART: [state] CFI Enabled
50,233,688 UART: [art] Extend RT PCRs Done
50,234,873 UART: [art] Lock RT PCRs Done
50,236,382 UART: [art] Populate DV Done
50,241,626 UART: [fht] FMC Alias Private Key: 7
50,243,436 UART: [art] Derive CDI
50,244,291 UART: [art] Store in in slot 0x4
50,302,710 UART: [art] Derive Key Pair
50,303,721 UART: [art] Store priv key in slot 0x5
52,767,024 UART: [art] Derive Key Pair - Done
52,779,975 UART: [art] Signing Cert with AUTHO
52,781,279 UART: RITY.KEYID = 7
54,492,439 UART: [art] Erasing AUTHORITY.KEYID = 7
54,493,950 UART: [art] PUB.X = 877D607DEAB144116DA0DF946B0F8537650E220BCBB11D986946EDD4CEC84A85CD401FB294D5498A5688E1C7418907C7
54,501,225 UART: [art] PUB.Y = 4A889E8F67E02985EFD8E816A629D487CBE81D6DB65947BD3F936020D8DA5A7B15F6097AC7AA79669594E9C10762285D
54,508,508 UART: [art] SIG.R = 4801A60E38F4BF0449A20EC7C6089D0414151E827C28672B8D2EEF9DAF57B1C639721669958BB0F687655E6064C84681
54,515,807 UART: [art] SIG.S = 02FFE08C8E178F6797D46C6DFEFB257EF77F9A91E1436A63BBF412932D23F1A1ED4EAFA3028E7856ECB2F8F7C9DFC321
55,494,917 UART: mbox::rt_entry...
55,495,885 UART: ____ _ _ _ ____ _____
55,497,874 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,499,875 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,501,800 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,503,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,505,580 UART: |_|
55,506,398 UART:
55,791,385 UART: [rt] Runtime listening for mailbox commands...
55,793,401 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
192,883 UART:
193,244 UART: Running Caliptra ROM ...
194,353 UART:
604,239 UART: [state] CFI Enabled
616,079 UART: [state] LifecycleState = Unprovisioned
618,459 UART: [state] DebugLocked = No
621,114 UART: [state] WD Timer not started. Device not locked for debugging
626,276 UART: [kat] SHA2-256
816,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,973 UART: [kat] ++
827,573 UART: [kat] sha1
838,948 UART: [kat] SHA2-256
841,947 UART: [kat] SHA2-384
847,862 UART: [kat] SHA2-512-ACC
850,454 UART: [kat] ECC-384
3,291,439 UART: [kat] HMAC-384Kdf
3,304,323 UART: [kat] LMS
3,836,186 UART: [kat] --
3,840,944 UART: [cold-reset] ++
3,843,097 UART: [fht] FHT @ 0x50003400
3,854,440 UART: [idev] ++
3,855,087 UART: [idev] CDI.KEYID = 6
3,856,125 UART: [idev] SUBJECT.KEYID = 7
3,857,232 UART: [idev] UDS.KEYID = 0
3,858,176 ready_for_fw is high
3,858,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,674 UART: [idev] Erasing UDS.KEYID = 0
6,332,181 UART: [idev] Sha1 KeyId Algorithm
6,354,326 UART: [idev] --
6,358,487 UART: [ldev] ++
6,359,166 UART: [ldev] CDI.KEYID = 6
6,360,085 UART: [ldev] SUBJECT.KEYID = 5
6,361,248 UART: [ldev] AUTHORITY.KEYID = 7
6,362,480 UART: [ldev] FE.KEYID = 1
6,375,309 UART: [ldev] Erasing FE.KEYID = 1
8,852,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,472 UART: [ldev] --
10,642,722 UART: [fwproc] Wait for Commands...
10,644,233 UART: [fwproc] Recv command 0x46574c44
10,646,545 UART: [fwproc] Recv'd Img size: 114084 bytes
14,095,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,271 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,838,861 >>> mbox cmd response: success
14,843,072 UART: [afmc] ++
14,843,782 UART: [afmc] CDI.KEYID = 6
14,845,061 UART: [afmc] SUBJECT.KEYID = 7
14,846,459 UART: [afmc] AUTHORITY.KEYID = 5
17,349,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,982 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,779 UART: [afmc] --
19,146,005 UART: [cold-reset] --
19,149,879 UART: [state] Locking Datavault
19,155,839 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,995 UART: [state] Locking ICCM
19,160,295 UART: [exit] Launching FMC @ 0x40000130
19,168,978 UART:
19,169,214 UART: Running Caliptra FMC ...
19,170,337 UART:
19,170,493 UART: [state] CFI Enabled
19,178,702 UART: [fht] FMC Alias Private Key: 7
20,935,686 UART: [art] Extend RT PCRs Done
20,936,907 UART: [art] Lock RT PCRs Done
20,938,397 UART: [art] Populate DV Done
20,943,865 UART: [fht] FMC Alias Private Key: 7
20,945,603 UART: [art] Derive CDI
20,946,346 UART: [art] Store in in slot 0x4
20,988,832 UART: [art] Derive Key Pair
20,989,833 UART: [art] Store priv key in slot 0x5
23,416,610 UART: [art] Derive Key Pair - Done
23,429,486 UART: [art] Signing Cert with AUTHO
23,430,817 UART: RITY.KEYID = 7
25,136,085 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,607 UART: [art] PUB.X = 2C9594B6CBE52BE897A180CD0DF19C64EFC18C428EB3A3655DC43FB1FFA6D7B160FE9EEFE9F5E8F1B7F6E0F2C6FF7241
25,144,896 UART: [art] PUB.Y = 6A77C8E3BAB089BB898A92B3255F66462EC8D8870EF90CA2D55F5102DC0F6FCCD2E36292914CE60A8992AC379B8567FC
25,152,159 UART: [art] SIG.R = 2C2B6F8C0790902D1D1D637986269E392749DDF2646EEF25DFC3D924E097411513DD9C6130921DC1976E6952AC67CDA7
25,159,533 UART: [art] SIG.S = 5432E5F2C1EBCD858A0948F54D061951A497F1DFB8503253059F5A13D0B88C52218AA6E5C663ED7980A896D04B508F80
26,139,134 UART: Caliptra RT
26,139,822 UART: [state] CFI Enabled
26,257,635 UART: [rt] RT listening for mailbox commands...
26,259,744 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,289,531 UART: [rt]cmd =0x50435252, len=8
26,291,663 >>> mbox cmd response data (8 bytes)
28,346,837 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,447,411 UART:
28,447,794 UART: Running Caliptra ROM ...
28,448,868 UART:
28,449,021 UART: [state] CFI Enabled
28,461,257 UART: [state] LifecycleState = Unprovisioned
28,463,294 UART: [state] DebugLocked = No
28,464,889 UART: [state] WD Timer not started. Device not locked for debugging
28,468,843 UART: [kat] SHA2-256
28,658,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,669,489 UART: [kat] ++
28,670,005 UART: [kat] sha1
28,681,222 UART: [kat] SHA2-256
28,684,253 UART: [kat] SHA2-384
28,691,441 UART: [kat] SHA2-512-ACC
28,694,073 UART: [kat] ECC-384
31,133,997 UART: [kat] HMAC-384Kdf
31,148,606 UART: [kat] LMS
31,680,221 UART: [kat] --
31,685,906 UART: [update-reset] ++
34,705,226 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,709,458 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,101,735 >>> mbox cmd response: success
35,102,128 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,102,903 UART: [update-reset] Copying MAN_2 To MAN_1
35,140,464 UART: [update-reset Success] --
35,145,479 UART: [state] Locking Datavault
35,149,559 UART: [state] Locking PCR0, PCR1 and PCR31
35,151,713 UART: [state] Locking ICCM
35,153,059 UART: [exit] Launching FMC @ 0x40000130
35,161,745 UART:
35,161,992 UART: Running Caliptra FMC ...
35,163,098 UART:
35,163,259 UART: [state] CFI Enabled
35,207,109 UART: [art] Extend RT PCRs Done
35,208,309 UART: [art] Lock RT PCRs Done
35,209,848 UART: [art] Populate DV Done
35,215,253 UART: [fht] FMC Alias Private Key: 7
35,216,950 UART: [art] Derive CDI
35,217,681 UART: [art] Store in in slot 0x4
35,260,327 UART: [art] Derive Key Pair
35,261,327 UART: [art] Store priv key in slot 0x5
37,687,811 UART: [art] Derive Key Pair - Done
37,700,809 UART: [art] Signing Cert with AUTHO
37,702,121 UART: RITY.KEYID = 7
39,407,703 UART: [art] Erasing AUTHORITY.KEYID = 7
39,409,204 UART: [art] PUB.X = 65BD5662BF850A957FB007318B64EA0A2E25173038425D89D9CF110AF316646BFC859A86C426446022285F22EBA5D213
39,416,433 UART: [art] PUB.Y = BAFAD019AC94236F4B608F63E13AD2D361E42B320F528B2987BBA0921BC0DE0280910A12988473466C36A3B6A76D191C
39,423,716 UART: [art] SIG.R = F3C3B318FA1F59103216561B3C1E87CE6413243287FCB6128DE4B31E22BFF37926EDDF3B6423412498F597FEF3AAA52B
39,431,095 UART: [art] SIG.S = 97E1DB17F191A31B5840B407E58B1A4A261BC6CD83D729895433798E28996EA8471682C4A67821ACB1414A6D4BB82DC3
40,409,718 UART: mbox::rt_entry...
40,410,707 UART: ____ _ _ _ ____ _____
40,412,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,414,716 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,416,648 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,418,577 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,420,506 UART: |_|
40,421,337 UART:
40,705,692 UART: [rt] Runtime listening for mailbox commands...
40,707,725 >>> mbox cmd response data (128 bytes)
42,765,253 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,865,018 UART:
42,865,387 UART: Running Caliptra ROM ...
42,866,542 UART:
42,866,718 UART: [state] CFI Enabled
42,877,862 UART: [state] LifecycleState = Unprovisioned
42,879,707 UART: [state] DebugLocked = No
42,882,494 UART: [state] WD Timer not started. Device not locked for debugging
42,886,814 UART: [kat] SHA2-256
43,076,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,087,505 UART: [kat] ++
43,088,010 UART: [kat] sha1
43,099,818 UART: [kat] SHA2-256
43,102,843 UART: [kat] SHA2-384
43,109,188 UART: [kat] SHA2-512-ACC
43,111,778 UART: [kat] ECC-384
45,554,844 UART: [kat] HMAC-384Kdf
45,566,605 UART: [kat] LMS
46,098,188 UART: [kat] --
46,101,875 UART: [update-reset] ++
49,119,455 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,123,097 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,515,409 >>> mbox cmd response: success
49,515,785 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,516,554 UART: [update-reset] Copying MAN_2 To MAN_1
49,554,132 UART: [update-reset Success] --
49,557,729 UART: [state] Locking Datavault
49,561,750 UART: [state] Locking PCR0, PCR1 and PCR31
49,563,903 UART: [state] Locking ICCM
49,566,439 UART: [exit] Launching FMC @ 0x40000130
49,575,119 UART:
49,575,358 UART: Running Caliptra FMC ...
49,576,463 UART:
49,576,623 UART: [state] CFI Enabled
49,620,592 UART: [art] Extend RT PCRs Done
49,621,802 UART: [art] Lock RT PCRs Done
49,623,103 UART: [art] Populate DV Done
49,628,463 UART: [fht] FMC Alias Private Key: 7
49,630,059 UART: [art] Derive CDI
49,630,879 UART: [art] Store in in slot 0x4
49,673,209 UART: [art] Derive Key Pair
49,674,253 UART: [art] Store priv key in slot 0x5
52,101,566 UART: [art] Derive Key Pair - Done
52,114,499 UART: [art] Signing Cert with AUTHO
52,115,799 UART: RITY.KEYID = 7
53,821,235 UART: [art] Erasing AUTHORITY.KEYID = 7
53,822,730 UART: [art] PUB.X = 8D36401BED95265396025E09A8B3A61974AAE962009CE0D6286D6E51D98C13FD94AA3D502889AD901744B8953DF03127
53,829,963 UART: [art] PUB.Y = 6A41C4373546AD174B480CDCE5F1CCFCE5B2156E9A977BCAC73BFB2A007FACBE09E467BBD40C340DCB688C10654E7285
53,837,230 UART: [art] SIG.R = 3139069CA0D5A19BB72A6AC2D9A4A2CC7BB2FC471D726D00A160700AD29724918E475AB990681052A919DC938763FF09
53,844,547 UART: [art] SIG.S = 4B5BC57A19B6827423E22697D05A2B3A572EDD50E79EFD13E8EB8742E5282154D83E538D82F0E37955A894BCB8BB24FE
54,823,311 UART: mbox::rt_entry...
54,824,284 UART: ____ _ _ _ ____ _____
54,826,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,828,227 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,830,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,832,106 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,834,033 UART: |_|
54,834,845 UART:
55,120,155 UART: [rt] Runtime listening for mailbox commands...
55,122,154 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,559 writing to cptra_bootfsm_go
3,757,722 ready_for_fw is high
3,758,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,952,281 >>> mbox cmd response: success
19,206,620 UART:
19,207,004 UART: Running Caliptra FMC ...
19,208,119 UART:
19,208,274 UART: [state] CFI Enabled
19,216,023 UART: [fht] FMC Alias Private Key: 7
20,973,140 UART: [art] Extend RT PCRs Done
20,974,371 UART: [art] Lock RT PCRs Done
20,975,759 UART: [art] Populate DV Done
20,981,339 UART: [fht] FMC Alias Private Key: 7
20,983,005 UART: [art] Derive CDI
20,983,832 UART: [art] Store in in slot 0x4
21,026,594 UART: [art] Derive Key Pair
21,027,601 UART: [art] Store priv key in slot 0x5
23,454,240 UART: [art] Derive Key Pair - Done
23,467,631 UART: [art] Signing Cert with AUTHO
23,468,943 UART: RITY.KEYID = 7
25,174,517 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,030 UART: [art] PUB.X = CF29E3365FF3056C8E97DCE127B6563053BD2FFE64FBDEA959670E84FE83434C94539D5BBF30C5203E17BB86CC3C46F9
25,183,280 UART: [art] PUB.Y = 2DF9D485FB289EE0FE82A8BD59906C5B92B42610EC868A252F974C613CBBD0ABF840857D45DA914C0FA3DCD88E157391
25,190,563 UART: [art] SIG.R = A6E8E245F2CACE3B5602EFDBA52406BEAC682CBD6F6F3D98E4DFAAE528667E0665C9DA671C8DFCB24FE035AD10FFF0D1
25,198,050 UART: [art] SIG.S = 3D517900130B2E800B9B6E80C93A0678009ECE1541CE02F6C0678B46857A52EC677F9291E3D6DA8BBBE3D2C3A89A2BD7
26,176,538 UART: Caliptra RT
26,177,249 UART: [state] CFI Enabled
26,294,644 UART: [rt] RT listening for mailbox commands...
26,296,935 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,326,693 UART: [rt]cmd =0x50435252, len=8
26,328,916 >>> mbox cmd response data (8 bytes)
28,383,509 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,301,313 >>> mbox cmd response: success
35,301,826 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,335,440 UART:
35,335,734 UART: Running Caliptra FMC ...
35,336,768 UART:
35,336,915 UART: [state] CFI Enabled
35,381,542 UART: [art] Extend RT PCRs Done
35,382,738 UART: [art] Lock RT PCRs Done
35,384,160 UART: [art] Populate DV Done
35,390,013 UART: [fht] FMC Alias Private Key: 7
35,391,558 UART: [art] Derive CDI
35,392,377 UART: [art] Store in in slot 0x4
35,434,717 UART: [art] Derive Key Pair
35,435,756 UART: [art] Store priv key in slot 0x5
37,862,044 UART: [art] Derive Key Pair - Done
37,874,719 UART: [art] Signing Cert with AUTHO
37,876,023 UART: RITY.KEYID = 7
39,581,336 UART: [art] Erasing AUTHORITY.KEYID = 7
39,582,855 UART: [art] PUB.X = 57D17777B33634DD8FF15B6476B45FE47C26568B0ACB6AE6EEFF36FECD5DEAAA56867A8B78E5D7B0AB9604837FCE1452
39,590,157 UART: [art] PUB.Y = E7097FE03FCC9081ACFAA382F782C677ABE22C5A3C1DAE86742F858A56BC57C0439323DA848B5347B68C64911ADAE586
39,597,413 UART: [art] SIG.R = 0EA9F0710FFD1EA48CE97109D501983FE2590972573C8D86E696693630FDC808D31C220A66B5E2D6DF0452AD7408DFDE
39,604,817 UART: [art] SIG.S = B02D9A7157535717A5DE9B3726B75940914CEB2F6ED845A57E2B7A8583CF47AD568CF0DDAEA5B6F8A46FE3C2A01ADE71
40,583,054 UART: mbox::rt_entry...
40,584,025 UART: ____ _ _ _ ____ _____
40,585,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,966 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,825 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,593,639 UART: |_|
40,594,525 UART:
40,886,033 UART: [rt] Runtime listening for mailbox commands...
40,888,109 >>> mbox cmd response data (128 bytes)
42,936,598 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
49,846,684 >>> mbox cmd response: success
49,847,240 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,884,473 UART:
49,884,767 UART: Running Caliptra FMC ...
49,885,849 UART:
49,886,004 UART: [state] CFI Enabled
49,930,099 UART: [art] Extend RT PCRs Done
49,931,293 UART: [art] Lock RT PCRs Done
49,932,756 UART: [art] Populate DV Done
49,938,137 UART: [fht] FMC Alias Private Key: 7
49,939,631 UART: [art] Derive CDI
49,940,381 UART: [art] Store in in slot 0x4
49,983,450 UART: [art] Derive Key Pair
49,984,455 UART: [art] Store priv key in slot 0x5
52,411,016 UART: [art] Derive Key Pair - Done
52,423,584 UART: [art] Signing Cert with AUTHO
52,424,894 UART: RITY.KEYID = 7
54,130,508 UART: [art] Erasing AUTHORITY.KEYID = 7
54,132,014 UART: [art] PUB.X = 5E0E7361A3820CC48F9E8E786102226A5902397B5573A67E356D4F7094244AAFEC691EDCDD9DC74F411D2753DBF0695E
54,139,244 UART: [art] PUB.Y = B170FF1CAE98C24FCD39D364F886E08C042C559E24567EABAD1E9BB78DC960FFA5545AE69031AB6D21C74F4EF10C5EF6
54,146,518 UART: [art] SIG.R = 626029B6D02A06D1D762B2D4B0217179230CD19BF503C84C03D3A99C23BC4C91462DE1BDE1AD439B054021B418A0B48B
54,154,050 UART: [art] SIG.S = 4010909419265942295D9B7D6ED0BA2C5567682F8E52FA5318319D3D340D7A57C4DF5702D74C391BEF1609F473E357F7
55,132,867 UART: mbox::rt_entry...
55,133,837 UART: ____ _ _ _ ____ _____
55,135,826 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,137,858 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,139,797 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,141,735 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,143,590 UART: |_|
55,144,476 UART:
55,428,396 UART: [rt] Runtime listening for mailbox commands...
55,430,407 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,432 UART: [kat] SHA2-512-ACC
897,333 UART: [kat] ECC-384
902,706 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,561 UART: [cold-reset] ++
1,477,077 UART: [fht] Storing FHT @ 0x50003400
1,479,634 UART: [idev] ++
1,479,802 UART: [idev] CDI.KEYID = 6
1,480,162 UART: [idev] SUBJECT.KEYID = 7
1,480,586 UART: [idev] UDS.KEYID = 0
1,480,931 ready_for_fw is high
1,480,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,542 UART: [idev] Erasing UDS.KEYID = 0
1,505,116 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,694 UART: [idev] --
1,514,823 UART: [ldev] ++
1,514,991 UART: [ldev] CDI.KEYID = 6
1,515,354 UART: [ldev] SUBJECT.KEYID = 5
1,515,780 UART: [ldev] AUTHORITY.KEYID = 7
1,516,243 UART: [ldev] FE.KEYID = 1
1,521,269 UART: [ldev] Erasing FE.KEYID = 1
1,546,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,882 UART: [ldev] --
1,585,261 UART: [fwproc] Waiting for Commands...
1,585,878 UART: [fwproc] Received command 0x46574c44
1,586,669 UART: [fwproc] Received Image of size 114084 bytes
2,881,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,026 >>> mbox cmd response: success
3,075,168 UART: [afmc] ++
3,075,336 UART: [afmc] CDI.KEYID = 6
3,075,698 UART: [afmc] SUBJECT.KEYID = 7
3,076,123 UART: [afmc] AUTHORITY.KEYID = 5
3,111,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,474 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,867 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,557 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,556 UART: [afmc] --
3,154,578 UART: [cold-reset] --
3,155,588 UART: [state] Locking Datavault
3,156,699 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,303 UART: [state] Locking ICCM
3,157,747 UART: [exit] Launching FMC @ 0x40000130
3,163,076 UART:
3,163,092 UART: Running Caliptra FMC ...
3,163,500 UART:
3,163,554 UART: [state] CFI Enabled
3,173,947 UART: [fht] FMC Alias Private Key: 7
3,281,398 UART: [art] Extend RT PCRs Done
3,281,826 UART: [art] Lock RT PCRs Done
3,283,752 UART: [art] Populate DV Done
3,291,853 UART: [fht] FMC Alias Private Key: 7
3,292,795 UART: [art] Derive CDI
3,293,075 UART: [art] Store in in slot 0x4
3,378,262 UART: [art] Derive Key Pair
3,378,622 UART: [art] Store priv key in slot 0x5
3,391,452 UART: [art] Derive Key Pair - Done
3,406,064 UART: [art] Signing Cert with AUTHO
3,406,544 UART: RITY.KEYID = 7
3,422,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,813 UART: [art] PUB.X = EF05F8EB604DD7E2DF87A118E2BFACD495790997CA19ED3B71D63A2B94300AD69881AB58B3069FE75CCF0E871AA40522
3,429,579 UART: [art] PUB.Y = A61BE7252362E0FDF4C08F9B4009F0F6A3A9994ABD4E7D36FD26CB10C8CBBA3C8B2CD4658D098A16D22F6F24ECCB5170
3,436,543 UART: [art] SIG.R = DE0DF667593B7F09646F4E767DCFD454F48D58EE98EB362AC1E2F8DEFC4067C239C191D6ECB77521ECE1B06A0E1002CC
3,443,319 UART: [art] SIG.S = 27D3F988CC3462918C0DF521BB6AF9581857EA0A50C1FA934317BD81096AA172CC35A1E600923D7E68A1C4A9BFB1FCA5
3,467,261 UART: Caliptra RT
3,467,514 UART: [state] CFI Enabled
3,575,575 UART: [rt] RT listening for mailbox commands...
3,576,245 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,309 UART: [rt]cmd =0x50435252, len=8
3,607,715 >>> mbox cmd response data (8 bytes)
3,607,716 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,440 UART:
3,608,456 UART: Running Caliptra ROM ...
3,608,864 UART:
3,608,918 UART: [state] CFI Enabled
3,611,842 UART: [state] LifecycleState = Unprovisioned
3,612,497 UART: [state] DebugLocked = No
3,613,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,614,680 UART: [kat] SHA2-256
4,408,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,412,726 UART: [kat] ++
4,412,878 UART: [kat] sha1
4,417,060 UART: [kat] SHA2-256
4,418,998 UART: [kat] SHA2-384
4,421,823 UART: [kat] SHA2-512-ACC
4,423,723 UART: [kat] ECC-384
4,429,584 UART: [kat] HMAC-384Kdf
4,434,260 UART: [kat] LMS
5,002,456 UART: [kat] --
5,003,223 UART: [update-reset] ++
5,927,293 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,928,509 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,024,571 >>> mbox cmd response: success
6,024,571 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,024,772 UART: [update-reset] Copying MAN_2 To MAN_1
6,032,786 UART: [update-reset Success] --
6,033,781 UART: [state] Locking Datavault
6,034,465 UART: [state] Locking PCR0, PCR1 and PCR31
6,035,069 UART: [state] Locking ICCM
6,035,563 UART: [exit] Launching FMC @ 0x40000130
6,040,892 UART:
6,040,908 UART: Running Caliptra FMC ...
6,041,316 UART:
6,041,370 UART: [state] CFI Enabled
6,129,815 UART: [art] Extend RT PCRs Done
6,130,243 UART: [art] Lock RT PCRs Done
6,131,508 UART: [art] Populate DV Done
6,139,541 UART: [fht] FMC Alias Private Key: 7
6,140,611 UART: [art] Derive CDI
6,140,891 UART: [art] Store in in slot 0x4
6,226,562 UART: [art] Derive Key Pair
6,226,922 UART: [art] Store priv key in slot 0x5
6,240,170 UART: [art] Derive Key Pair - Done
6,254,708 UART: [art] Signing Cert with AUTHO
6,255,188 UART: RITY.KEYID = 7
6,270,682 UART: [art] Erasing AUTHORITY.KEYID = 7
6,271,447 UART: [art] PUB.X = E3820E4AAA57A6F96548DE604BB623C669CF8210D3774668A41ABE37A8AD048BA50999FF9E85A498B9974DEAC70DA7D5
6,278,215 UART: [art] PUB.Y = CFF322A196A2589CC954517F07B24DAE8FF9D711CC132FDA876325827BC4F5507A366FC866BD3DA53099DE3579AC2F93
6,285,170 UART: [art] SIG.R = B85ABFE3218DCB2910469B809F78C97B2B240452323EA7443BF2457863B44B1F549312D473BCA7D2707F37BF19DE5838
6,291,935 UART: [art] SIG.S = 71EA3F0236BB7B32AB3F7E1284C82824050246816B082ABEB715C67BFDD91E4DA130AE58B668595A15F15B1CC59BD782
6,315,630 UART: mbox::rt_entry...
6,316,002 UART: ____ _ _ _ ____ _____
6,316,786 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,317,586 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,318,354 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,319,122 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,319,890 UART: |_|
6,320,202 UART:
6,607,290 UART: [rt] Runtime listening for mailbox commands...
6,608,337 >>> mbox cmd response data (128 bytes)
6,608,338 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
6,608,452 UART:
6,608,468 UART: Running Caliptra ROM ...
6,608,876 UART:
6,608,930 UART: [state] CFI Enabled
6,611,566 UART: [state] LifecycleState = Unprovisioned
6,612,221 UART: [state] DebugLocked = No
6,612,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,614,348 UART: [kat] SHA2-256
7,408,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,412,394 UART: [kat] ++
7,412,546 UART: [kat] sha1
7,416,900 UART: [kat] SHA2-256
7,418,838 UART: [kat] SHA2-384
7,421,459 UART: [kat] SHA2-512-ACC
7,423,359 UART: [kat] ECC-384
7,428,976 UART: [kat] HMAC-384Kdf
7,433,460 UART: [kat] LMS
8,001,656 UART: [kat] --
8,002,309 UART: [update-reset] ++
8,926,863 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,928,023 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,024,085 >>> mbox cmd response: success
9,024,085 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,024,222 UART: [update-reset] Copying MAN_2 To MAN_1
9,032,236 UART: [update-reset Success] --
9,033,173 UART: [state] Locking Datavault
9,034,013 UART: [state] Locking PCR0, PCR1 and PCR31
9,034,617 UART: [state] Locking ICCM
9,035,133 UART: [exit] Launching FMC @ 0x40000130
9,040,462 UART:
9,040,478 UART: Running Caliptra FMC ...
9,040,886 UART:
9,040,940 UART: [state] CFI Enabled
9,129,867 UART: [art] Extend RT PCRs Done
9,130,295 UART: [art] Lock RT PCRs Done
9,131,554 UART: [art] Populate DV Done
9,139,607 UART: [fht] FMC Alias Private Key: 7
9,140,611 UART: [art] Derive CDI
9,140,891 UART: [art] Store in in slot 0x4
9,226,562 UART: [art] Derive Key Pair
9,226,922 UART: [art] Store priv key in slot 0x5
9,239,826 UART: [art] Derive Key Pair - Done
9,254,737 UART: [art] Signing Cert with AUTHO
9,255,217 UART: RITY.KEYID = 7
9,270,377 UART: [art] Erasing AUTHORITY.KEYID = 7
9,271,142 UART: [art] PUB.X = 151D6FC0D8BB6236164A626B8407965C7BCF160C2D4D59B5D49730925DB32A0076FF29276B9896B66C5906719033818F
9,277,871 UART: [art] PUB.Y = 99A47CE2CBA115F19A8FEC9D65CA39134C54FB9C462641E2009CE6C95385AF0AD661E6B32BA403F4D950A1A26C5588DE
9,284,805 UART: [art] SIG.R = 623845FCCAFF2C9B51B9A8A12A50CE85F540E255E54905093194D6970F5D6C2478EBE63CE2E90E88223C7CB06BEDABB9
9,291,575 UART: [art] SIG.S = CE800A59D323E01A9CF6498F912F9DF545CD02AFA7CA3A44EDC2FB28C26A02905EA2715C200E8F6D20CFA58827F32EDC
9,315,416 UART: mbox::rt_entry...
9,315,788 UART: ____ _ _ _ ____ _____
9,316,572 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,317,372 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,318,140 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,318,908 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,319,676 UART: |_|
9,319,988 UART:
9,600,906 UART: [rt] Runtime listening for mailbox commands...
9,601,953 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 ready_for_fw is high
1,362,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,912 >>> mbox cmd response: success
2,986,008 UART:
2,986,024 UART: Running Caliptra FMC ...
2,986,432 UART:
2,986,486 UART: [state] CFI Enabled
2,996,595 UART: [fht] FMC Alias Private Key: 7
3,104,508 UART: [art] Extend RT PCRs Done
3,104,936 UART: [art] Lock RT PCRs Done
3,106,594 UART: [art] Populate DV Done
3,114,559 UART: [fht] FMC Alias Private Key: 7
3,115,661 UART: [art] Derive CDI
3,115,941 UART: [art] Store in in slot 0x4
3,201,402 UART: [art] Derive Key Pair
3,201,762 UART: [art] Store priv key in slot 0x5
3,215,362 UART: [art] Derive Key Pair - Done
3,229,952 UART: [art] Signing Cert with AUTHO
3,230,432 UART: RITY.KEYID = 7
3,245,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,133 UART: [art] PUB.X = 2ADE6849E4E78827EEB700EEB954202018C68BCD40EC9BBA2CBDAE60B044FFCA447EEC4715F52AE60FB1416E08B9512F
3,252,895 UART: [art] PUB.Y = B485AD97F0B7B3AF922538C3D9CE286A3C815A242A68D1494D5B8DC1A47D3444287CB80D6194CD9AA7198C15470C92F4
3,259,843 UART: [art] SIG.R = 10D3E12EAA11E71A5D809ECBC82F6322BF45D8CDB61021078626B66DF802E2C869C7D6F46023956BEC636AC7CD0253F4
3,266,612 UART: [art] SIG.S = 2909A70F7B68E239BBE84AF7FD3A35DC722DA4BE61C1FF1CFED2B450A05F7B28F181542FF926B2335C3ED87079EC9DCA
3,290,637 UART: Caliptra RT
3,290,890 UART: [state] CFI Enabled
3,399,238 UART: [rt] RT listening for mailbox commands...
3,399,908 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,454 UART: [rt]cmd =0x50435252, len=8
3,431,340 >>> mbox cmd response data (8 bytes)
3,431,341 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,728,120 >>> mbox cmd response: success
5,728,120 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,741,633 UART:
5,741,649 UART: Running Caliptra FMC ...
5,742,057 UART:
5,742,111 UART: [state] CFI Enabled
5,831,296 UART: [art] Extend RT PCRs Done
5,831,724 UART: [art] Lock RT PCRs Done
5,833,203 UART: [art] Populate DV Done
5,841,280 UART: [fht] FMC Alias Private Key: 7
5,842,374 UART: [art] Derive CDI
5,842,654 UART: [art] Store in in slot 0x4
5,927,979 UART: [art] Derive Key Pair
5,928,339 UART: [art] Store priv key in slot 0x5
5,941,759 UART: [art] Derive Key Pair - Done
5,956,095 UART: [art] Signing Cert with AUTHO
5,956,575 UART: RITY.KEYID = 7
5,972,183 UART: [art] Erasing AUTHORITY.KEYID = 7
5,972,948 UART: [art] PUB.X = D39D6A2A1D455725190273E79D3C3648412C2A2488DF2069F390E38D1F7AD100B878D0D44A249604E60AD27DF0745BF9
5,979,683 UART: [art] PUB.Y = 9191BF8ACB948310A5360DEA0B2EEF07AC4206C91425324DCA11B028FBBB9C2779D8F2F4891DB2EC9598A22697034D5A
5,986,626 UART: [art] SIG.R = 058D3F2F93730D9F472D126EC695DD5D03A773053EE55ACABB7582C5B0A8670687E627522E415F73C5BFE6DBD4C043BD
5,993,389 UART: [art] SIG.S = E671849AF988E792AE070D8849E9C6FC396D9AC25BFDBE07E0F0AC7A0E47554BD843D41F9DDAA7297330C6357A01D4B0
6,017,723 UART: mbox::rt_entry...
6,018,095 UART: ____ _ _ _ ____ _____
6,018,879 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,019,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,020,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,021,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,021,983 UART: |_|
6,022,295 UART:
6,303,085 UART: [rt] Runtime listening for mailbox commands...
6,304,132 >>> mbox cmd response data (128 bytes)
6,304,133 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,601,104 >>> mbox cmd response: success
8,601,104 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,614,251 UART:
8,614,267 UART: Running Caliptra FMC ...
8,614,675 UART:
8,614,729 UART: [state] CFI Enabled
8,703,284 UART: [art] Extend RT PCRs Done
8,703,712 UART: [art] Lock RT PCRs Done
8,705,021 UART: [art] Populate DV Done
8,713,354 UART: [fht] FMC Alias Private Key: 7
8,714,444 UART: [art] Derive CDI
8,714,724 UART: [art] Store in in slot 0x4
8,800,243 UART: [art] Derive Key Pair
8,800,603 UART: [art] Store priv key in slot 0x5
8,813,895 UART: [art] Derive Key Pair - Done
8,828,748 UART: [art] Signing Cert with AUTHO
8,829,228 UART: RITY.KEYID = 7
8,844,448 UART: [art] Erasing AUTHORITY.KEYID = 7
8,845,213 UART: [art] PUB.X = 08A10E70C6A9C68EC4FF85A71C2968AC80D309B72847279C4570805D55768E19F302B4B56212B38CD79CB0B2078597AB
8,851,964 UART: [art] PUB.Y = D7B966698102AC2D5537E2FD2D0BB806E9D4A410DC6E550CA4CC16674C562988B5376474648A4E513BD4D2B0F3F8D2B5
8,858,906 UART: [art] SIG.R = 954398486A1EF6CFA51607EFC4AF6D1135698CA2F5BA69B342F90DCA47B9B4C33CCEA1447F83F52FE11D6EA19D3A2068
8,865,684 UART: [art] SIG.S = 5C41DD988F8981205ABB7B932867DEEAE17731D003364FF6E746D5FBBFFE21A299D00949C592641E39642E22AADEF475
8,889,715 UART: mbox::rt_entry...
8,890,087 UART: ____ _ _ _ ____ _____
8,890,871 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,891,671 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,892,439 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,893,207 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,893,975 UART: |_|
8,894,287 UART:
9,173,653 UART: [rt] Runtime listening for mailbox commands...
9,174,700 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,809 UART: [state] LifecycleState = Unprovisioned
85,464 UART: [state] DebugLocked = No
86,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,782 UART: [kat] SHA2-256
881,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,828 UART: [kat] ++
885,980 UART: [kat] sha1
890,192 UART: [kat] SHA2-256
892,130 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,201 UART: [kat] HMAC-384Kdf
906,885 UART: [kat] LMS
1,475,081 UART: [kat] --
1,476,030 UART: [cold-reset] ++
1,476,534 UART: [fht] Storing FHT @ 0x50003400
1,479,235 UART: [idev] ++
1,479,403 UART: [idev] CDI.KEYID = 6
1,479,763 UART: [idev] SUBJECT.KEYID = 7
1,480,187 UART: [idev] UDS.KEYID = 0
1,480,532 ready_for_fw is high
1,480,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,657 UART: [idev] Erasing UDS.KEYID = 0
1,504,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,019 UART: [idev] --
1,514,048 UART: [ldev] ++
1,514,216 UART: [ldev] CDI.KEYID = 6
1,514,579 UART: [ldev] SUBJECT.KEYID = 5
1,515,005 UART: [ldev] AUTHORITY.KEYID = 7
1,515,468 UART: [ldev] FE.KEYID = 1
1,520,772 UART: [ldev] Erasing FE.KEYID = 1
1,546,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,215 UART: [ldev] --
1,585,510 UART: [fwproc] Waiting for Commands...
1,586,333 UART: [fwproc] Received command 0x46574c44
1,587,124 UART: [fwproc] Received Image of size 114084 bytes
2,881,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,438 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,323 >>> mbox cmd response: success
3,074,359 UART: [afmc] ++
3,074,527 UART: [afmc] CDI.KEYID = 6
3,074,889 UART: [afmc] SUBJECT.KEYID = 7
3,075,314 UART: [afmc] AUTHORITY.KEYID = 5
3,109,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,125,841 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,234 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,143,924 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,151,701 UART: [afmc] --
3,152,593 UART: [cold-reset] --
3,153,139 UART: [state] Locking Datavault
3,154,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,154,848 UART: [state] Locking ICCM
3,155,442 UART: [exit] Launching FMC @ 0x40000130
3,160,771 UART:
3,160,787 UART: Running Caliptra FMC ...
3,161,195 UART:
3,161,338 UART: [state] CFI Enabled
3,172,011 UART: [fht] FMC Alias Private Key: 7
3,280,172 UART: [art] Extend RT PCRs Done
3,280,600 UART: [art] Lock RT PCRs Done
3,282,170 UART: [art] Populate DV Done
3,290,803 UART: [fht] FMC Alias Private Key: 7
3,291,961 UART: [art] Derive CDI
3,292,241 UART: [art] Store in in slot 0x4
3,377,886 UART: [art] Derive Key Pair
3,378,246 UART: [art] Store priv key in slot 0x5
3,391,460 UART: [art] Derive Key Pair - Done
3,406,220 UART: [art] Signing Cert with AUTHO
3,406,700 UART: RITY.KEYID = 7
3,421,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,735 UART: [art] PUB.X = 7A193907D830B6B714C9AC448425A844C6F836181759AED33E76FBB9BFE238FEA818E4647B7102180DD0C8E304554659
3,429,489 UART: [art] PUB.Y = 7BFC55148E89F811AC48E379BD48ED2EE898B3D5DE265C059321EC69A9BC4360AFE16C83B096EC9DB9BFC9B7CE4E1F15
3,436,456 UART: [art] SIG.R = EE3D73B9C380A7C9C1009F1E8CB552834EBB8465F10B7C7778F5187CF8BA5D1E7E8BB14F2D489F12FEC6A8E0E5232524
3,443,213 UART: [art] SIG.S = 75F4AE5227030C1E48DCCCB082E89B3F3088B7EC08668E347971B42A19C6C75DA794626C74FD695E8DFEA80550A36970
3,467,442 UART: Caliptra RT
3,467,787 UART: [state] CFI Enabled
3,576,312 UART: [rt] RT listening for mailbox commands...
3,576,982 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,758 UART: [rt]cmd =0x50435252, len=8
3,607,944 >>> mbox cmd response data (8 bytes)
3,607,945 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,807 UART:
3,608,823 UART: Running Caliptra ROM ...
3,609,231 UART:
3,609,372 UART: [state] CFI Enabled
3,612,610 UART: [state] LifecycleState = Unprovisioned
3,613,265 UART: [state] DebugLocked = No
3,613,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,615,454 UART: [kat] SHA2-256
4,409,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,413,500 UART: [kat] ++
4,413,652 UART: [kat] sha1
4,417,728 UART: [kat] SHA2-256
4,419,666 UART: [kat] SHA2-384
4,422,443 UART: [kat] SHA2-512-ACC
4,424,343 UART: [kat] ECC-384
4,429,874 UART: [kat] HMAC-384Kdf
4,434,492 UART: [kat] LMS
5,002,688 UART: [kat] --
5,003,475 UART: [update-reset] ++
5,926,743 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,927,825 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,023,887 >>> mbox cmd response: success
6,023,887 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,024,230 UART: [update-reset] Copying MAN_2 To MAN_1
6,032,244 UART: [update-reset Success] --
6,033,393 UART: [state] Locking Datavault
6,034,251 UART: [state] Locking PCR0, PCR1 and PCR31
6,034,855 UART: [state] Locking ICCM
6,035,367 UART: [exit] Launching FMC @ 0x40000130
6,040,696 UART:
6,040,712 UART: Running Caliptra FMC ...
6,041,120 UART:
6,041,263 UART: [state] CFI Enabled
6,129,840 UART: [art] Extend RT PCRs Done
6,130,268 UART: [art] Lock RT PCRs Done
6,131,493 UART: [art] Populate DV Done
6,139,770 UART: [fht] FMC Alias Private Key: 7
6,140,710 UART: [art] Derive CDI
6,140,990 UART: [art] Store in in slot 0x4
6,226,769 UART: [art] Derive Key Pair
6,227,129 UART: [art] Store priv key in slot 0x5
6,240,261 UART: [art] Derive Key Pair - Done
6,254,878 UART: [art] Signing Cert with AUTHO
6,255,358 UART: RITY.KEYID = 7
6,270,386 UART: [art] Erasing AUTHORITY.KEYID = 7
6,271,151 UART: [art] PUB.X = 49EA5A96D0815B68B19654916FE16B3E53B9C20AFD5C14B5C1BE6BAD42D42C5E4B85A63D5CCE6E706F263AC1ACFB1C70
6,277,938 UART: [art] PUB.Y = 654B6BF4307CD26FBBD2F02053E500CD3383409C817569E0730831EADAEB643C3E98F4318016FDE91367A9410A70BDFF
6,284,864 UART: [art] SIG.R = D6D6E3B9AC19BEF226D959A2A231619DB296702DA411B0BC861B2ACFFBE0EB65C29D5D8274B67987FE0272D9F35A37EF
6,291,647 UART: [art] SIG.S = 2D896C93FCBC6F2AFA22FE6387ECB3F19A6B9052330C4FDDD03E4030514C451F1FCC2DEB378FFCEE136E95FB3DCB3220
6,314,647 UART: mbox::rt_entry...
6,315,019 UART: ____ _ _ _ ____ _____
6,315,803 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,316,603 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,317,371 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,318,139 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,318,907 UART: |_|
6,319,219 UART:
6,604,017 UART: [rt] Runtime listening for mailbox commands...
6,605,064 >>> mbox cmd response data (128 bytes)
6,605,065 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
6,605,179 UART:
6,605,195 UART: Running Caliptra ROM ...
6,605,603 UART:
6,605,744 UART: [state] CFI Enabled
6,608,642 UART: [state] LifecycleState = Unprovisioned
6,609,297 UART: [state] DebugLocked = No
6,609,911 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,611,428 UART: [kat] SHA2-256
7,405,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,409,474 UART: [kat] ++
7,409,626 UART: [kat] sha1
7,413,798 UART: [kat] SHA2-256
7,415,736 UART: [kat] SHA2-384
7,418,437 UART: [kat] SHA2-512-ACC
7,420,337 UART: [kat] ECC-384
7,425,900 UART: [kat] HMAC-384Kdf
7,430,694 UART: [kat] LMS
7,998,890 UART: [kat] --
7,999,913 UART: [update-reset] ++
8,925,405 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,926,571 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,022,633 >>> mbox cmd response: success
9,022,633 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,022,836 UART: [update-reset] Copying MAN_2 To MAN_1
9,030,850 UART: [update-reset Success] --
9,031,843 UART: [state] Locking Datavault
9,032,523 UART: [state] Locking PCR0, PCR1 and PCR31
9,033,127 UART: [state] Locking ICCM
9,033,755 UART: [exit] Launching FMC @ 0x40000130
9,039,084 UART:
9,039,100 UART: Running Caliptra FMC ...
9,039,508 UART:
9,039,651 UART: [state] CFI Enabled
9,128,506 UART: [art] Extend RT PCRs Done
9,128,934 UART: [art] Lock RT PCRs Done
9,130,473 UART: [art] Populate DV Done
9,138,604 UART: [fht] FMC Alias Private Key: 7
9,139,566 UART: [art] Derive CDI
9,139,846 UART: [art] Store in in slot 0x4
9,225,257 UART: [art] Derive Key Pair
9,225,617 UART: [art] Store priv key in slot 0x5
9,239,211 UART: [art] Derive Key Pair - Done
9,253,828 UART: [art] Signing Cert with AUTHO
9,254,308 UART: RITY.KEYID = 7
9,269,946 UART: [art] Erasing AUTHORITY.KEYID = 7
9,270,711 UART: [art] PUB.X = CDE0757AA6430A86362DEA2EB49B87002EF413BE01D05EE310EF9C2A24D0A025ED82ADADD85E6ECEBF18A0BE29886740
9,277,473 UART: [art] PUB.Y = 2C65D7B9AB4A6A0B3B3BA43BA2E2DA52606996648D196A049AC1D11F6736C11CFDEAFFDE625DDA6E0FCB0FCF0F03F408
9,284,428 UART: [art] SIG.R = 63F95F24BA25B8F02D5E1D20168E5037727F9DB2463E484272D6A1EE62DBEAB509DD5FAD9E7F67CC2E7F8BFBE1265478
9,291,209 UART: [art] SIG.S = 40A0C97EDB89DBA902FE108E9560067B21D1D67E0FC3600922CBF0B2227093602A7C1D724044CEADF8E06ED03B68B029
9,314,414 UART: mbox::rt_entry...
9,314,786 UART: ____ _ _ _ ____ _____
9,315,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,316,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,317,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,317,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,318,674 UART: |_|
9,318,986 UART:
9,601,219 UART: [rt] Runtime listening for mailbox commands...
9,602,266 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,424 ready_for_fw is high
1,363,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,287 >>> mbox cmd response: success
2,989,417 UART:
2,989,433 UART: Running Caliptra FMC ...
2,989,841 UART:
2,989,984 UART: [state] CFI Enabled
3,000,777 UART: [fht] FMC Alias Private Key: 7
3,108,480 UART: [art] Extend RT PCRs Done
3,108,908 UART: [art] Lock RT PCRs Done
3,110,418 UART: [art] Populate DV Done
3,118,497 UART: [fht] FMC Alias Private Key: 7
3,119,443 UART: [art] Derive CDI
3,119,723 UART: [art] Store in in slot 0x4
3,205,140 UART: [art] Derive Key Pair
3,205,500 UART: [art] Store priv key in slot 0x5
3,218,644 UART: [art] Derive Key Pair - Done
3,233,396 UART: [art] Signing Cert with AUTHO
3,233,876 UART: RITY.KEYID = 7
3,249,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,353 UART: [art] PUB.X = 8B1C4CFA8D79C2B3A91017DEEE8431DB20D19240D00F5805FD2B4FB7CAA216FB4B85710C4837C615F2B6DDAA2A85FBCE
3,257,136 UART: [art] PUB.Y = 986F956F3F3E99990BFD89A6C6BE656AB38BCFCC46DDAF371BF5B9051B4DD01AC7B20EB5CE1B5335FB9A7BCE39560363
3,264,096 UART: [art] SIG.R = F296B2D9B82EC06B851167C1EBCEB27BF2C5DFB3FA91470D508587F3D9481940D08D52D8C79946F11DA5C50761CA6AD6
3,270,870 UART: [art] SIG.S = C00E9AE6AC49A461397D037D906188CE4F77DEEA2478E5FAD5A28413DB0CC2140F027512D21496814899984C5A1F6663
3,294,744 UART: Caliptra RT
3,295,089 UART: [state] CFI Enabled
3,403,565 UART: [rt] RT listening for mailbox commands...
3,404,235 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,441 UART: [rt]cmd =0x50435252, len=8
3,436,191 >>> mbox cmd response data (8 bytes)
3,436,192 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,942 >>> mbox cmd response: success
5,732,942 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,746,243 UART:
5,746,259 UART: Running Caliptra FMC ...
5,746,667 UART:
5,746,810 UART: [state] CFI Enabled
5,836,075 UART: [art] Extend RT PCRs Done
5,836,503 UART: [art] Lock RT PCRs Done
5,837,870 UART: [art] Populate DV Done
5,845,757 UART: [fht] FMC Alias Private Key: 7
5,846,907 UART: [art] Derive CDI
5,847,187 UART: [art] Store in in slot 0x4
5,933,198 UART: [art] Derive Key Pair
5,933,558 UART: [art] Store priv key in slot 0x5
5,947,014 UART: [art] Derive Key Pair - Done
5,962,114 UART: [art] Signing Cert with AUTHO
5,962,594 UART: RITY.KEYID = 7
5,977,766 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,531 UART: [art] PUB.X = 613DD01A8CCD6E52A81B499E334A8C0BBBFDA9DE69E68D56AD23582AFF2002A10BF86D476D127892ACAE753314A2DF41
5,985,308 UART: [art] PUB.Y = 529A911B1EF6429A5CED00C11B5C6748F9B577501F568188C171E9F82B494943DB6B4EE3D0E326A4663EB4404204E5C3
5,992,231 UART: [art] SIG.R = 47951202A57B0768C4F106FDCEDD982A48E2F62384151364612EBFB3155ED7A606048FFAFED37FB949F542A5501EA8AB
5,998,992 UART: [art] SIG.S = 3921E4717213C54C297E1BF1EDEE680D115B15B23988C6EA5670FCA1730ED722DDAB2379516F0559D4EF97FAC25B9CBB
6,022,502 UART: mbox::rt_entry...
6,022,874 UART: ____ _ _ _ ____ _____
6,023,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,024,458 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,025,226 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,994 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,762 UART: |_|
6,027,074 UART:
6,308,877 UART: [rt] Runtime listening for mailbox commands...
6,309,924 >>> mbox cmd response data (128 bytes)
6,309,925 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,608,653 >>> mbox cmd response: success
8,608,653 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,622,108 UART:
8,622,124 UART: Running Caliptra FMC ...
8,622,532 UART:
8,622,675 UART: [state] CFI Enabled
8,711,548 UART: [art] Extend RT PCRs Done
8,711,976 UART: [art] Lock RT PCRs Done
8,713,177 UART: [art] Populate DV Done
8,721,530 UART: [fht] FMC Alias Private Key: 7
8,722,588 UART: [art] Derive CDI
8,722,868 UART: [art] Store in in slot 0x4
8,808,319 UART: [art] Derive Key Pair
8,808,679 UART: [art] Store priv key in slot 0x5
8,822,803 UART: [art] Derive Key Pair - Done
8,837,735 UART: [art] Signing Cert with AUTHO
8,838,215 UART: RITY.KEYID = 7
8,853,741 UART: [art] Erasing AUTHORITY.KEYID = 7
8,854,506 UART: [art] PUB.X = 0081FF59E89E5AB31A4F7CDE843F7721A03AA7FEBAF996E8A0A0F8C6956D12170111545672C5F8A947AD9DA51329B7F4
8,861,259 UART: [art] PUB.Y = F0A1AAF01BE0C68E4D2615F5872F1F8C8176B4CDFF793FF0B73F112EA3C4AC419B282F52DD441BB0B73BDCACE4E4C5BF
8,868,237 UART: [art] SIG.R = C5CDEA2576E0F1C013026F1FBE615E6C5BF1D6796359FE42332DED2E9A474CA7A08144062A520E139D195F9E3A11C303
8,875,001 UART: [art] SIG.S = D70264D27F3E4B236E3CC31B28490E9F2FDD8DBF62F43AEA197B1348120E9EBEE512C648250684B5A34A4C11D94E755F
8,898,664 UART: mbox::rt_entry...
8,899,036 UART: ____ _ _ _ ____ _____
8,899,820 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,900,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,901,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,902,156 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,902,924 UART: |_|
8,903,236 UART:
9,187,173 UART: [rt] Runtime listening for mailbox commands...
9,188,220 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,101 UART: [kat] SHA2-256
904,041 UART: [kat] SHA2-384
906,844 UART: [kat] SHA2-512-ACC
908,745 UART: [kat] ECC-384
918,834 UART: [kat] HMAC-384Kdf
923,374 UART: [kat] LMS
1,171,702 UART: [kat] --
1,172,501 UART: [cold-reset] ++
1,173,065 UART: [fht] FHT @ 0x50003400
1,175,766 UART: [idev] ++
1,175,934 UART: [idev] CDI.KEYID = 6
1,176,294 UART: [idev] SUBJECT.KEYID = 7
1,176,718 UART: [idev] UDS.KEYID = 0
1,177,063 ready_for_fw is high
1,177,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,656 UART: [idev] Erasing UDS.KEYID = 0
1,201,569 UART: [idev] Sha1 KeyId Algorithm
1,210,161 UART: [idev] --
1,211,055 UART: [ldev] ++
1,211,223 UART: [ldev] CDI.KEYID = 6
1,211,586 UART: [ldev] SUBJECT.KEYID = 5
1,212,012 UART: [ldev] AUTHORITY.KEYID = 7
1,212,475 UART: [ldev] FE.KEYID = 1
1,217,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,943 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,283,944 UART: [fwproc] Recv command 0x46574c44
1,284,672 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,996 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,511 >>> mbox cmd response: success
2,772,627 UART: [afmc] ++
2,772,795 UART: [afmc] CDI.KEYID = 6
2,773,157 UART: [afmc] SUBJECT.KEYID = 7
2,773,582 UART: [afmc] AUTHORITY.KEYID = 5
2,809,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,968 UART: [afmc] --
2,852,980 UART: [cold-reset] --
2,853,892 UART: [state] Locking Datavault
2,855,173 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,777 UART: [state] Locking ICCM
2,856,303 UART: [exit] Launching FMC @ 0x40000130
2,861,632 UART:
2,861,648 UART: Running Caliptra FMC ...
2,862,056 UART:
2,862,110 UART: [state] CFI Enabled
2,872,593 UART: [fht] FMC Alias Private Key: 7
2,980,628 UART: [art] Extend RT PCRs Done
2,981,056 UART: [art] Lock RT PCRs Done
2,982,608 UART: [art] Populate DV Done
2,991,007 UART: [fht] FMC Alias Private Key: 7
2,992,097 UART: [art] Derive CDI
2,992,377 UART: [art] Store in in slot 0x4
3,078,362 UART: [art] Derive Key Pair
3,078,722 UART: [art] Store priv key in slot 0x5
3,091,900 UART: [art] Derive Key Pair - Done
3,106,345 UART: [art] Signing Cert with AUTHO
3,106,825 UART: RITY.KEYID = 7
3,123,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,772 UART: [art] PUB.X = 425C5F95512C4EF4F0200F72FC096CE10D63455FAE9DDAF574811E27EF466D21361B996E5FA673E4F9F89D8243EBE40D
3,130,538 UART: [art] PUB.Y = CC808CBF3C41CC5B4CC39682DA09C285E995BCFF459066DA8B2A32107C72A147CE629A2DAA2B6E5EBFB05028BBA4680D
3,137,502 UART: [art] SIG.R = EF97FBFD43040C2FA9F5F827A2B747E3945BC345B122095F5BED91177FB0CB21529420F09A609D2DF3C50FC02A577A7A
3,144,270 UART: [art] SIG.S = 80DB8599F4FFA584E8B96404AE7F72C209F4EDC610F162156AF6F939BFE198EEC250E2F54CAEDF8CB7E647CE2A7C1144
3,167,691 UART: Caliptra RT
3,167,944 UART: [state] CFI Enabled
3,276,612 UART: [rt] RT listening for mailbox commands...
3,277,282 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,280 UART: [rt]cmd =0x50435252, len=8
3,308,854 >>> mbox cmd response data (8 bytes)
3,308,855 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,406 UART:
3,309,422 UART: Running Caliptra ROM ...
3,309,830 UART:
3,309,885 UART: [state] CFI Enabled
3,312,603 UART: [state] LifecycleState = Unprovisioned
3,313,258 UART: [state] DebugLocked = No
3,313,770 UART: [state] WD Timer not started. Device not locked for debugging
3,315,048 UART: [kat] SHA2-256
4,120,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,823 UART: [kat] ++
4,124,975 UART: [kat] sha1
4,129,201 UART: [kat] SHA2-256
4,131,141 UART: [kat] SHA2-384
4,133,908 UART: [kat] SHA2-512-ACC
4,135,808 UART: [kat] ECC-384
4,145,913 UART: [kat] HMAC-384Kdf
4,150,689 UART: [kat] LMS
4,399,017 UART: [kat] --
4,399,725 UART: [update-reset] ++
5,302,085 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,054 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,399,064 >>> mbox cmd response: success
5,399,064 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,399,413 UART: [update-reset] Copying MAN_2 To MAN_1
5,407,427 UART: [update-reset Success] --
5,408,410 UART: [state] Locking Datavault
5,409,204 UART: [state] Locking PCR0, PCR1 and PCR31
5,409,808 UART: [state] Locking ICCM
5,410,364 UART: [exit] Launching FMC @ 0x40000130
5,415,693 UART:
5,415,709 UART: Running Caliptra FMC ...
5,416,117 UART:
5,416,171 UART: [state] CFI Enabled
5,505,292 UART: [art] Extend RT PCRs Done
5,505,720 UART: [art] Lock RT PCRs Done
5,506,811 UART: [art] Populate DV Done
5,515,152 UART: [fht] FMC Alias Private Key: 7
5,516,290 UART: [art] Derive CDI
5,516,570 UART: [art] Store in in slot 0x4
5,602,177 UART: [art] Derive Key Pair
5,602,537 UART: [art] Store priv key in slot 0x5
5,615,869 UART: [art] Derive Key Pair - Done
5,630,559 UART: [art] Signing Cert with AUTHO
5,631,039 UART: RITY.KEYID = 7
5,646,509 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,274 UART: [art] PUB.X = 382263F8591F0699FE7C06E3452E77A49546CA140949BFC2EDF9785AA0434C98F5A93126CCAA4D826A4BF7673B80C57D
5,654,037 UART: [art] PUB.Y = 3A863B852696A080B3D95708BFC55DA53FCC615D59A20D33C59085E356F6F0BAB5422C5F68567FFA6036D636BCA586F2
5,660,985 UART: [art] SIG.R = 9831DEE6CF3A34B87FB4B4504E88B09906849EA9FAABC5670DE14216ECC28832D1135415E399B6B9F233770F67897EC1
5,667,748 UART: [art] SIG.S = A0716CD1CC03495B8DB83431B9A1E824DCB04881EDD0DC2DF873EE4E4C281B441455539CEB5FA1F05678F70A950CB714
5,691,656 UART: mbox::rt_entry...
5,692,028 UART: ____ _ _ _ ____ _____
5,692,812 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,612 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,380 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,916 UART: |_|
5,696,228 UART:
5,976,863 UART: [rt] Runtime listening for mailbox commands...
5,977,910 >>> mbox cmd response data (128 bytes)
5,977,911 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,978,022 UART:
5,978,038 UART: Running Caliptra ROM ...
5,978,446 UART:
5,978,501 UART: [state] CFI Enabled
5,980,827 UART: [state] LifecycleState = Unprovisioned
5,981,482 UART: [state] DebugLocked = No
5,982,216 UART: [state] WD Timer not started. Device not locked for debugging
5,983,528 UART: [kat] SHA2-256
6,789,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,793,303 UART: [kat] ++
6,793,455 UART: [kat] sha1
6,797,533 UART: [kat] SHA2-256
6,799,473 UART: [kat] SHA2-384
6,802,230 UART: [kat] SHA2-512-ACC
6,804,130 UART: [kat] ECC-384
6,814,063 UART: [kat] HMAC-384Kdf
6,818,579 UART: [kat] LMS
7,066,907 UART: [kat] --
7,067,937 UART: [update-reset] ++
7,971,357 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,380 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,068,390 >>> mbox cmd response: success
8,068,390 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,068,543 UART: [update-reset] Copying MAN_2 To MAN_1
8,076,557 UART: [update-reset Success] --
8,077,450 UART: [state] Locking Datavault
8,078,352 UART: [state] Locking PCR0, PCR1 and PCR31
8,078,956 UART: [state] Locking ICCM
8,079,446 UART: [exit] Launching FMC @ 0x40000130
8,084,775 UART:
8,084,791 UART: Running Caliptra FMC ...
8,085,199 UART:
8,085,253 UART: [state] CFI Enabled
8,173,764 UART: [art] Extend RT PCRs Done
8,174,192 UART: [art] Lock RT PCRs Done
8,175,427 UART: [art] Populate DV Done
8,183,788 UART: [fht] FMC Alias Private Key: 7
8,184,868 UART: [art] Derive CDI
8,185,148 UART: [art] Store in in slot 0x4
8,270,869 UART: [art] Derive Key Pair
8,271,229 UART: [art] Store priv key in slot 0x5
8,283,971 UART: [art] Derive Key Pair - Done
8,298,568 UART: [art] Signing Cert with AUTHO
8,299,048 UART: RITY.KEYID = 7
8,314,258 UART: [art] Erasing AUTHORITY.KEYID = 7
8,315,023 UART: [art] PUB.X = 63858922C8A3EC1B9856A61D61060F87CD9B64E89D13E73CECE125309161820A3F08A6CF7DA707F0692860372B57B879
8,321,772 UART: [art] PUB.Y = D99E905293AF7EB18860A23D5FA807470AEB9F69BBE5A252ABBC133D13A43AE1FFEAED6B51940D516C80CEE3BDA0E9FC
8,328,739 UART: [art] SIG.R = 408A714877647D59A30AC6103936298EFAF68FC2B12606D12E1854AB6275724222D75FD5644E3F36BCDDE6E1A32B7C09
8,335,498 UART: [art] SIG.S = 15469442ADE22F514290D8AE9E3B6F6DF9B1CA80CF794B3EA210751C697082A10A8DC445505E1BE41F2E5403E5EDC6A4
8,359,525 UART: mbox::rt_entry...
8,359,897 UART: ____ _ _ _ ____ _____
8,360,681 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,361,481 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,362,249 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,017 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,363,785 UART: |_|
8,364,097 UART:
8,645,099 UART: [rt] Runtime listening for mailbox commands...
8,646,146 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,793 ready_for_fw is high
1,060,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,174 >>> mbox cmd response: success
2,686,468 UART:
2,686,484 UART: Running Caliptra FMC ...
2,686,892 UART:
2,686,946 UART: [state] CFI Enabled
2,697,365 UART: [fht] FMC Alias Private Key: 7
2,805,074 UART: [art] Extend RT PCRs Done
2,805,502 UART: [art] Lock RT PCRs Done
2,806,878 UART: [art] Populate DV Done
2,815,253 UART: [fht] FMC Alias Private Key: 7
2,816,321 UART: [art] Derive CDI
2,816,601 UART: [art] Store in in slot 0x4
2,902,094 UART: [art] Derive Key Pair
2,902,454 UART: [art] Store priv key in slot 0x5
2,915,874 UART: [art] Derive Key Pair - Done
2,930,929 UART: [art] Signing Cert with AUTHO
2,931,409 UART: RITY.KEYID = 7
2,946,413 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,178 UART: [art] PUB.X = 57452EB0AB2A83E4452B47CB9E53B1139695B5E3826F5547B979787A2A1E00C533ECBF7EC5883D20B5ADBBEBCB6345FF
2,953,938 UART: [art] PUB.Y = 3F406E42C29150511E059DE010018777044B0222B550E669E0A07DAF5666459CFDC3D0B6EB7FC4CD1528374C9CD7ECD4
2,960,878 UART: [art] SIG.R = 8530E82F1B713E40C6AC15D955D404ADB3A4AB87D0A50FE748EFC1DD6780060490F2F9B5D84AF06796CC62E5702F1F36
2,967,644 UART: [art] SIG.S = D8E958DE104947452CD3ED0D2B82AAC8687D9C6210688DC070DA0D8B1752C23BA6DCF09FEF07AF42E923B1EC1238B2D8
2,991,454 UART: Caliptra RT
2,991,707 UART: [state] CFI Enabled
3,099,483 UART: [rt] RT listening for mailbox commands...
3,100,153 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,099 UART: [rt]cmd =0x50435252, len=8
3,131,787 >>> mbox cmd response data (8 bytes)
3,131,788 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,104,598 >>> mbox cmd response: success
5,104,598 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,117,858 UART:
5,117,874 UART: Running Caliptra FMC ...
5,118,282 UART:
5,118,336 UART: [state] CFI Enabled
5,207,289 UART: [art] Extend RT PCRs Done
5,207,717 UART: [art] Lock RT PCRs Done
5,209,170 UART: [art] Populate DV Done
5,217,527 UART: [fht] FMC Alias Private Key: 7
5,218,611 UART: [art] Derive CDI
5,218,891 UART: [art] Store in in slot 0x4
5,304,436 UART: [art] Derive Key Pair
5,304,796 UART: [art] Store priv key in slot 0x5
5,317,756 UART: [art] Derive Key Pair - Done
5,332,431 UART: [art] Signing Cert with AUTHO
5,332,911 UART: RITY.KEYID = 7
5,348,073 UART: [art] Erasing AUTHORITY.KEYID = 7
5,348,838 UART: [art] PUB.X = 5658AC6B3E3D33AD6D31AC50F16AC3C0E9C8DD618885A81EA512423D59B8DAA99652CA6B25981407EFAECD1E54479C03
5,355,614 UART: [art] PUB.Y = 70F0D2FF22F314D512ECC799D96393434455CD00616F686F5609FEFDF2BE225C25F54FF160C042CF6B7715A46B54D1C3
5,362,543 UART: [art] SIG.R = C93AFB7FCCEA429EE39967BC51A8466C9CB8027AD78BAF9B75DCB4644AA62CCDC30C0A30BADD127E1232C560A5EACD03
5,369,329 UART: [art] SIG.S = 8005F2908F29E22DD5A7E4FF2EEBF35A28F71AA938062A4EE91DA027289AFC2FF8F5F8192F7435E2DD0283D148B0704C
5,392,895 UART: mbox::rt_entry...
5,393,267 UART: ____ _ _ _ ____ _____
5,394,051 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,394,851 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,395,619 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,396,387 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,397,155 UART: |_|
5,397,467 UART:
5,679,282 UART: [rt] Runtime listening for mailbox commands...
5,680,329 >>> mbox cmd response data (128 bytes)
5,680,330 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,653,826 >>> mbox cmd response: success
7,653,826 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,667,356 UART:
7,667,372 UART: Running Caliptra FMC ...
7,667,780 UART:
7,667,834 UART: [state] CFI Enabled
7,756,895 UART: [art] Extend RT PCRs Done
7,757,323 UART: [art] Lock RT PCRs Done
7,758,612 UART: [art] Populate DV Done
7,766,621 UART: [fht] FMC Alias Private Key: 7
7,767,655 UART: [art] Derive CDI
7,767,935 UART: [art] Store in in slot 0x4
7,853,272 UART: [art] Derive Key Pair
7,853,632 UART: [art] Store priv key in slot 0x5
7,866,588 UART: [art] Derive Key Pair - Done
7,881,150 UART: [art] Signing Cert with AUTHO
7,881,630 UART: RITY.KEYID = 7
7,897,392 UART: [art] Erasing AUTHORITY.KEYID = 7
7,898,157 UART: [art] PUB.X = 4B78E35082834CD8C94966C8288338D024B5AF5EC68E39B2863729E58C45F75ABAF02A3BCD8B6AEFBDBC9D50A03B540A
7,904,936 UART: [art] PUB.Y = AE1E8DA06901905C513E3AA84153512F5A4934EC9455379C6FCA682DB40D6F11A6B2BC5DCDC870D5DF521FC00433E97B
7,911,887 UART: [art] SIG.R = AE855C5242DC579E4BDA1976BB4B928B4C99787B3A1C63B6DBB52D961CB22710DE55BEE777AC71A5591B677CEC179042
7,918,667 UART: [art] SIG.S = ABC04CFC40ED393DE164021C2506AF1E102CD7FE588477D8A40D0984EE371A4A7D04B5B012D27D790EA67628A686C58C
7,942,210 UART: mbox::rt_entry...
7,942,582 UART: ____ _ _ _ ____ _____
7,943,366 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,944,166 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,944,934 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,945,702 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,946,470 UART: |_|
7,946,782 UART:
8,229,301 UART: [rt] Runtime listening for mailbox commands...
8,230,348 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,720 UART: [cold-reset] ++
1,173,096 UART: [fht] FHT @ 0x50003400
1,175,833 UART: [idev] ++
1,176,001 UART: [idev] CDI.KEYID = 6
1,176,361 UART: [idev] SUBJECT.KEYID = 7
1,176,785 UART: [idev] UDS.KEYID = 0
1,177,130 ready_for_fw is high
1,177,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,201,954 UART: [idev] Sha1 KeyId Algorithm
1,210,474 UART: [idev] --
1,211,628 UART: [ldev] ++
1,211,796 UART: [ldev] CDI.KEYID = 6
1,212,159 UART: [ldev] SUBJECT.KEYID = 5
1,212,585 UART: [ldev] AUTHORITY.KEYID = 7
1,213,048 UART: [ldev] FE.KEYID = 1
1,218,370 UART: [ldev] Erasing FE.KEYID = 1
1,244,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,954 UART: [ldev] --
1,283,397 UART: [fwproc] Wait for Commands...
1,284,195 UART: [fwproc] Recv command 0x46574c44
1,284,923 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,240 >>> mbox cmd response: success
2,773,460 UART: [afmc] ++
2,773,628 UART: [afmc] CDI.KEYID = 6
2,773,990 UART: [afmc] SUBJECT.KEYID = 7
2,774,415 UART: [afmc] AUTHORITY.KEYID = 5
2,809,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,871 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,463 UART: [afmc] --
2,853,531 UART: [cold-reset] --
2,854,389 UART: [state] Locking Datavault
2,855,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,192 UART: [state] Locking ICCM
2,856,822 UART: [exit] Launching FMC @ 0x40000130
2,862,151 UART:
2,862,167 UART: Running Caliptra FMC ...
2,862,575 UART:
2,862,718 UART: [state] CFI Enabled
2,873,623 UART: [fht] FMC Alias Private Key: 7
2,981,626 UART: [art] Extend RT PCRs Done
2,982,054 UART: [art] Lock RT PCRs Done
2,983,618 UART: [art] Populate DV Done
2,991,877 UART: [fht] FMC Alias Private Key: 7
2,992,883 UART: [art] Derive CDI
2,993,163 UART: [art] Store in in slot 0x4
3,078,702 UART: [art] Derive Key Pair
3,079,062 UART: [art] Store priv key in slot 0x5
3,092,326 UART: [art] Derive Key Pair - Done
3,107,183 UART: [art] Signing Cert with AUTHO
3,107,663 UART: RITY.KEYID = 7
3,122,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,656 UART: [art] PUB.X = 5FBC2114F4E1243867CE890AD62801E182FB15639FCEF1F08B08DD3D47E6E06149B3A855BDB269E736104A4D3FD457A6
3,130,423 UART: [art] PUB.Y = 32D7E974E444991981AEE5E943722F6700650B7652045A252BBEEBE6032FAF7A12CD025AEC0507776135FDA83A549870
3,137,329 UART: [art] SIG.R = C370AA1D8C6667F968A30B973807A6E6403830618D48DB4F50DDFCF5E9EBBB3C4C0C692FBCAE8A85FA84A2062487D228
3,144,099 UART: [art] SIG.S = AFB325B12EF60600338C9634783531A632653E3533F42BFDA09BD7ABD9E798179534138540115A44F1A7E21DF5DF3098
3,167,847 UART: Caliptra RT
3,168,192 UART: [state] CFI Enabled
3,275,704 UART: [rt] RT listening for mailbox commands...
3,276,374 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,190 UART: [rt]cmd =0x50435252, len=8
3,307,780 >>> mbox cmd response data (8 bytes)
3,307,781 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,852 UART:
3,308,868 UART: Running Caliptra ROM ...
3,309,276 UART:
3,309,418 UART: [state] CFI Enabled
3,312,042 UART: [state] LifecycleState = Unprovisioned
3,312,697 UART: [state] DebugLocked = No
3,313,179 UART: [state] WD Timer not started. Device not locked for debugging
3,314,301 UART: [kat] SHA2-256
4,119,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,076 UART: [kat] ++
4,124,228 UART: [kat] sha1
4,128,440 UART: [kat] SHA2-256
4,130,380 UART: [kat] SHA2-384
4,133,077 UART: [kat] SHA2-512-ACC
4,134,977 UART: [kat] ECC-384
4,144,874 UART: [kat] HMAC-384Kdf
4,149,582 UART: [kat] LMS
4,397,910 UART: [kat] --
4,398,920 UART: [update-reset] ++
5,301,032 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,302,063 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,398,073 >>> mbox cmd response: success
5,398,073 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,398,220 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,234 UART: [update-reset Success] --
5,407,253 UART: [state] Locking Datavault
5,408,053 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,657 UART: [state] Locking ICCM
5,409,087 UART: [exit] Launching FMC @ 0x40000130
5,414,416 UART:
5,414,432 UART: Running Caliptra FMC ...
5,414,840 UART:
5,414,983 UART: [state] CFI Enabled
5,503,604 UART: [art] Extend RT PCRs Done
5,504,032 UART: [art] Lock RT PCRs Done
5,505,219 UART: [art] Populate DV Done
5,513,354 UART: [fht] FMC Alias Private Key: 7
5,514,486 UART: [art] Derive CDI
5,514,766 UART: [art] Store in in slot 0x4
5,600,603 UART: [art] Derive Key Pair
5,600,963 UART: [art] Store priv key in slot 0x5
5,614,595 UART: [art] Derive Key Pair - Done
5,629,441 UART: [art] Signing Cert with AUTHO
5,629,921 UART: RITY.KEYID = 7
5,644,875 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,640 UART: [art] PUB.X = FE334502EB6E39A6AD00AE4DBAB7C813B955EA13421FCC985BF35DABC9665ED26BDD1B9A6F7F594515051D865B718701
5,652,393 UART: [art] PUB.Y = 565621D1C64085EA17BBC0BAFB63B3C880B0C1A5C4FE5AF04830B7736041E89DF52827484D81B634D54EF5F8E6706C67
5,659,347 UART: [art] SIG.R = D4E831999EE5619ACCFC068E34329404F6FB2DFCF1FF2E1D6153CDDC3D31E1BA5B4291076D2FCFCE4666BF92610A8BF1
5,666,125 UART: [art] SIG.S = B1743BE72E33AF953CB7764AA72246495336AA826A3C2BF1230D536546F1C2C6B905933012E59961D2F07BA8F55851F1
5,689,946 UART: mbox::rt_entry...
5,690,318 UART: ____ _ _ _ ____ _____
5,691,102 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,206 UART: |_|
5,694,518 UART:
5,972,133 UART: [rt] Runtime listening for mailbox commands...
5,973,180 >>> mbox cmd response data (128 bytes)
5,973,181 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,973,292 UART:
5,973,308 UART: Running Caliptra ROM ...
5,973,716 UART:
5,973,858 UART: [state] CFI Enabled
5,977,182 UART: [state] LifecycleState = Unprovisioned
5,977,837 UART: [state] DebugLocked = No
5,978,451 UART: [state] WD Timer not started. Device not locked for debugging
5,979,661 UART: [kat] SHA2-256
6,785,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,789,436 UART: [kat] ++
6,789,588 UART: [kat] sha1
6,793,998 UART: [kat] SHA2-256
6,795,938 UART: [kat] SHA2-384
6,798,907 UART: [kat] SHA2-512-ACC
6,800,807 UART: [kat] ECC-384
6,810,708 UART: [kat] HMAC-384Kdf
6,815,212 UART: [kat] LMS
7,063,540 UART: [kat] --
7,064,314 UART: [update-reset] ++
7,964,964 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,966,161 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,062,171 >>> mbox cmd response: success
8,062,171 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,062,402 UART: [update-reset] Copying MAN_2 To MAN_1
8,070,416 UART: [update-reset Success] --
8,071,431 UART: [state] Locking Datavault
8,072,177 UART: [state] Locking PCR0, PCR1 and PCR31
8,072,781 UART: [state] Locking ICCM
8,073,391 UART: [exit] Launching FMC @ 0x40000130
8,078,720 UART:
8,078,736 UART: Running Caliptra FMC ...
8,079,144 UART:
8,079,287 UART: [state] CFI Enabled
8,168,930 UART: [art] Extend RT PCRs Done
8,169,358 UART: [art] Lock RT PCRs Done
8,170,753 UART: [art] Populate DV Done
8,178,842 UART: [fht] FMC Alias Private Key: 7
8,179,898 UART: [art] Derive CDI
8,180,178 UART: [art] Store in in slot 0x4
8,266,053 UART: [art] Derive Key Pair
8,266,413 UART: [art] Store priv key in slot 0x5
8,279,239 UART: [art] Derive Key Pair - Done
8,293,801 UART: [art] Signing Cert with AUTHO
8,294,281 UART: RITY.KEYID = 7
8,309,377 UART: [art] Erasing AUTHORITY.KEYID = 7
8,310,142 UART: [art] PUB.X = B5621421C8E279CBA68F7668FC2617F415EE3AF7176854283F84A0D8607BA21CC0487E3C608E8F991FA5E8621467ADE4
8,316,912 UART: [art] PUB.Y = BD92767BE594ADEEADB3349E03A33B41A4340DE5D3FF6CDEE90F8918E6170DEEE39C4B4AEAC86EAFFD77EB4A736FFB62
8,323,882 UART: [art] SIG.R = 5AE5BD528F51C127C5161BE2CD0178B03AC121B8347796349F6953FF6340209DAEC9867BC4342B4176403125A3DAD060
8,330,645 UART: [art] SIG.S = 66129231E479691A9CE1A938C03AD41694EFFA38CE1FB3591AD7C00497D393901D6B35BCEBABAB880268842449CC5E7D
8,354,092 UART: mbox::rt_entry...
8,354,464 UART: ____ _ _ _ ____ _____
8,355,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,356,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,356,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,357,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,358,352 UART: |_|
8,358,664 UART:
8,638,166 UART: [rt] Runtime listening for mailbox commands...
8,639,213 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 ready_for_fw is high
1,060,344 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,815 >>> mbox cmd response: success
2,685,829 UART:
2,685,845 UART: Running Caliptra FMC ...
2,686,253 UART:
2,686,396 UART: [state] CFI Enabled
2,696,681 UART: [fht] FMC Alias Private Key: 7
2,804,822 UART: [art] Extend RT PCRs Done
2,805,250 UART: [art] Lock RT PCRs Done
2,806,542 UART: [art] Populate DV Done
2,814,659 UART: [fht] FMC Alias Private Key: 7
2,815,775 UART: [art] Derive CDI
2,816,055 UART: [art] Store in in slot 0x4
2,901,810 UART: [art] Derive Key Pair
2,902,170 UART: [art] Store priv key in slot 0x5
2,915,736 UART: [art] Derive Key Pair - Done
2,930,511 UART: [art] Signing Cert with AUTHO
2,930,991 UART: RITY.KEYID = 7
2,946,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,044 UART: [art] PUB.X = F416127F1C7825EF7BFD859E7599EE326EDF840A288507AE2EB7FBD1703AF057AFDAAC40E79A0285E095CC06D68DF218
2,953,816 UART: [art] PUB.Y = 582526C3BD181DAFA225179679C8B4368912DE3C388ABA238407533C6D4250006F8AA058FB90E272575E22C17D34CE7C
2,960,737 UART: [art] SIG.R = BA3E172BC99DD3E4710F40B2383EB420A424F9862D6CD7FC5443A9820751EDEF5DA3F2625CB33C3136B1FEAAAA1B58C8
2,967,517 UART: [art] SIG.S = 3C586140A164D7FB1BB1FE0BA291FC22952ADB937A58CB33BAB6161413A51E5DABDD7681EB5F14DFD4406DFB77CCBC6B
2,990,797 UART: Caliptra RT
2,991,142 UART: [state] CFI Enabled
3,099,129 UART: [rt] RT listening for mailbox commands...
3,099,799 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,781 UART: [rt]cmd =0x50435252, len=8
3,131,269 >>> mbox cmd response data (8 bytes)
3,131,270 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,103,601 >>> mbox cmd response: success
5,103,601 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,116,887 UART:
5,116,903 UART: Running Caliptra FMC ...
5,117,311 UART:
5,117,454 UART: [state] CFI Enabled
5,206,801 UART: [art] Extend RT PCRs Done
5,207,229 UART: [art] Lock RT PCRs Done
5,208,214 UART: [art] Populate DV Done
5,216,549 UART: [fht] FMC Alias Private Key: 7
5,217,499 UART: [art] Derive CDI
5,217,779 UART: [art] Store in in slot 0x4
5,303,498 UART: [art] Derive Key Pair
5,303,858 UART: [art] Store priv key in slot 0x5
5,317,068 UART: [art] Derive Key Pair - Done
5,331,605 UART: [art] Signing Cert with AUTHO
5,332,085 UART: RITY.KEYID = 7
5,347,165 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,930 UART: [art] PUB.X = EF6A3E6E48D13C6335B572FF64D5E54072098AB600078F09850ECDBE042AEC8CB1373FA71B49B6CCC653A5492E116F15
5,354,671 UART: [art] PUB.Y = 5C32BDFFA3EC9218E37F9C5E06CEBF3687FE21F116CDF547487E00EB3F586494145E33B07C2F2B0021EFEF9443C3B4BC
5,361,590 UART: [art] SIG.R = D9C667D8A1AA53DE050A3AD8A121288C1D93AA12E1C8EFE89440C7F776B815905EE7344726756B10DF8CED8AB55188C1
5,368,362 UART: [art] SIG.S = 13EA64F0A209B49D65F0FCB8E863680DF236A2159B9E9D16704B7F7DE81A1619C4A194E09628DFE9490C01B5AC91B082
5,392,183 UART: mbox::rt_entry...
5,392,555 UART: ____ _ _ _ ____ _____
5,393,339 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,394,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,394,907 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,395,675 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,396,443 UART: |_|
5,396,755 UART:
5,675,889 UART: [rt] Runtime listening for mailbox commands...
5,676,936 >>> mbox cmd response data (128 bytes)
5,676,937 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,649,534 >>> mbox cmd response: success
7,649,534 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,663,078 UART:
7,663,094 UART: Running Caliptra FMC ...
7,663,502 UART:
7,663,645 UART: [state] CFI Enabled
7,752,794 UART: [art] Extend RT PCRs Done
7,753,222 UART: [art] Lock RT PCRs Done
7,754,459 UART: [art] Populate DV Done
7,762,652 UART: [fht] FMC Alias Private Key: 7
7,763,764 UART: [art] Derive CDI
7,764,044 UART: [art] Store in in slot 0x4
7,849,221 UART: [art] Derive Key Pair
7,849,581 UART: [art] Store priv key in slot 0x5
7,862,591 UART: [art] Derive Key Pair - Done
7,877,183 UART: [art] Signing Cert with AUTHO
7,877,663 UART: RITY.KEYID = 7
7,893,249 UART: [art] Erasing AUTHORITY.KEYID = 7
7,894,014 UART: [art] PUB.X = 9967E26D26E8CC3BA6DC79DE6515B357F55D892F64B6ED6B1143AF4E9094CBCE5460D07D8B005C51D92A8402B1B5790E
7,900,764 UART: [art] PUB.Y = 118327DC6E32EE59C102514DCEDEC2F9A117779FD590076E7CA96EC1AA30FE883AD72D00D5D700FCF7277FECE4ABA03F
7,907,684 UART: [art] SIG.R = D28445AEE00BB8A8A3E82E845E690F339A053B295AD9954F257E836586498503DC799CE1165F0582D06E46920C094DC3
7,914,427 UART: [art] SIG.S = 9C87421DD6DC156DC9734A82D2DC87EA4C664BEE73845ACBE5E3179606A048BB12FE7A5D72F7629FBAFFE67E36C8715D
7,937,993 UART: mbox::rt_entry...
7,938,365 UART: ____ _ _ _ ____ _____
7,939,149 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,939,949 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,940,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,941,485 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,942,253 UART: |_|
7,942,565 UART:
8,221,574 UART: [rt] Runtime listening for mailbox commands...
8,222,621 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,174,497 ready_for_fw is high
1,174,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,315 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,539 UART: [fwproc] Recv command 0x46574c44
1,282,272 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,889 >>> mbox cmd response: success
2,769,048 UART: [afmc] ++
2,769,216 UART: [afmc] CDI.KEYID = 6
2,769,579 UART: [afmc] SUBJECT.KEYID = 7
2,770,005 UART: [afmc] AUTHORITY.KEYID = 5
2,806,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,445 UART: [afmc] --
2,849,557 UART: [cold-reset] --
2,850,431 UART: [state] Locking Datavault
2,851,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,050 UART: [state] Locking ICCM
2,852,536 UART: [exit] Launching FMC @ 0x40000130
2,857,865 UART:
2,857,881 UART: Running Caliptra FMC ...
2,858,289 UART:
2,858,343 UART: [state] CFI Enabled
2,868,524 UART: [fht] FMC Alias Private Key: 7
2,976,331 UART: [art] Extend RT PCRs Done
2,976,759 UART: [art] Lock RT PCRs Done
2,978,467 UART: [art] Populate DV Done
2,986,590 UART: [fht] FMC Alias Private Key: 7
2,987,670 UART: [art] Derive CDI
2,987,950 UART: [art] Store in in slot 0x4
3,073,489 UART: [art] Derive Key Pair
3,073,849 UART: [art] Store priv key in slot 0x5
3,086,827 UART: [art] Derive Key Pair - Done
3,101,473 UART: [art] Signing Cert with AUTHO
3,101,953 UART: RITY.KEYID = 7
3,117,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,818 UART: [art] PUB.X = E827CEC510A6CEF456FD3AED861E3CD22E775AD0C27046D4E0E9288D29F2D0B172DD592C9D5DDD3FCB49D55B0BE4AB90
3,124,609 UART: [art] PUB.Y = C6FD9F04B7204E83776375A55E999D6C9256E24FC20B70104D17B1ED875B225B1682060EED6AAD4C9C82B3EDE05AC2E9
3,131,555 UART: [art] SIG.R = 4F17711AC068988379644075C9BCCC19ED6DBCDEF137CC4E57FA781B0F9511D96F315FABC05EEB38B904231E5CD2F912
3,138,331 UART: [art] SIG.S = C118F90C352ACC4F82CFC509B3ECFC735DAD7B7CE40802DC3A8D4861F4D8E66C99293D2B88EBA8C6DF3AA86AB8609DB2
3,161,428 UART: Caliptra RT
3,161,681 UART: [state] CFI Enabled
3,269,830 UART: [rt] RT listening for mailbox commands...
3,270,500 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,292 UART: [rt]cmd =0x50435252, len=8
3,301,704 >>> mbox cmd response data (8 bytes)
3,301,705 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,766 UART:
3,302,782 UART: Running Caliptra ROM ...
3,303,190 UART:
3,303,245 UART: [state] CFI Enabled
3,305,933 UART: [state] LifecycleState = Unprovisioned
3,306,588 UART: [state] DebugLocked = No
3,307,166 UART: [state] WD Timer not started. Device not locked for debugging
3,308,516 UART: [kat] SHA2-256
4,112,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,195 UART: [kat] ++
4,116,347 UART: [kat] sha1
4,120,643 UART: [kat] SHA2-256
4,122,583 UART: [kat] SHA2-384
4,125,322 UART: [kat] SHA2-512-ACC
4,127,222 UART: [kat] ECC-384
4,136,867 UART: [kat] HMAC-384Kdf
4,141,625 UART: [kat] LMS
4,389,937 UART: [kat] --
4,390,927 UART: [update-reset] ++
5,292,536 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,293,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,389,589 >>> mbox cmd response: success
5,389,589 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,389,752 UART: [update-reset] Copying MAN_2 To MAN_1
5,397,766 UART: [update-reset Success] --
5,398,757 UART: [state] Locking Datavault
5,399,677 UART: [state] Locking PCR0, PCR1 and PCR31
5,400,281 UART: [state] Locking ICCM
5,400,919 UART: [exit] Launching FMC @ 0x40000130
5,406,248 UART:
5,406,264 UART: Running Caliptra FMC ...
5,406,672 UART:
5,406,726 UART: [state] CFI Enabled
5,496,117 UART: [art] Extend RT PCRs Done
5,496,545 UART: [art] Lock RT PCRs Done
5,497,746 UART: [art] Populate DV Done
5,506,101 UART: [fht] FMC Alias Private Key: 7
5,507,163 UART: [art] Derive CDI
5,507,443 UART: [art] Store in in slot 0x4
5,593,248 UART: [art] Derive Key Pair
5,593,608 UART: [art] Store priv key in slot 0x5
5,606,524 UART: [art] Derive Key Pair - Done
5,621,129 UART: [art] Signing Cert with AUTHO
5,621,609 UART: RITY.KEYID = 7
5,636,553 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,318 UART: [art] PUB.X = AD98AA4DAB6CDFA997E7CB64B3426161709769DE08633C43103C2388EBA8FD1491DEB127492442AA0C8D38A606E93586
5,644,083 UART: [art] PUB.Y = C0764625D896EE751BBE31D9D03C326FECDAA72394EDDBF410A77D2A71F9D57834827510924F58862D3E579BA23DFABF
5,651,043 UART: [art] SIG.R = 9E1D543643C3A9679769843EAD41E011D36CF7442B0918C4442CAF1DF098447A3BFE40024776A34211F84A4FC73AB91F
5,657,805 UART: [art] SIG.S = BA7F3712CAC09EA3C8AD6B04484D7859656731D4706548D857B1F21A738BEF7742AF209AD79F84946A09251CB290A5D5
5,681,484 UART: mbox::rt_entry...
5,681,856 UART: ____ _ _ _ ____ _____
5,682,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,683,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,684,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,684,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,685,744 UART: |_|
5,686,056 UART:
5,970,327 UART: [rt] Runtime listening for mailbox commands...
5,971,374 >>> mbox cmd response data (128 bytes)
5,971,375 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,971,486 UART:
5,971,502 UART: Running Caliptra ROM ...
5,971,910 UART:
5,971,965 UART: [state] CFI Enabled
5,975,067 UART: [state] LifecycleState = Unprovisioned
5,975,722 UART: [state] DebugLocked = No
5,976,372 UART: [state] WD Timer not started. Device not locked for debugging
5,977,714 UART: [kat] SHA2-256
6,781,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,785,393 UART: [kat] ++
6,785,545 UART: [kat] sha1
6,789,837 UART: [kat] SHA2-256
6,791,777 UART: [kat] SHA2-384
6,794,472 UART: [kat] SHA2-512-ACC
6,796,372 UART: [kat] ECC-384
6,805,931 UART: [kat] HMAC-384Kdf
6,810,479 UART: [kat] LMS
7,058,791 UART: [kat] --
7,059,859 UART: [update-reset] ++
7,960,530 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,961,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,057,683 >>> mbox cmd response: success
8,057,683 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,057,918 UART: [update-reset] Copying MAN_2 To MAN_1
8,065,932 UART: [update-reset Success] --
8,066,905 UART: [state] Locking Datavault
8,067,577 UART: [state] Locking PCR0, PCR1 and PCR31
8,068,181 UART: [state] Locking ICCM
8,068,845 UART: [exit] Launching FMC @ 0x40000130
8,074,174 UART:
8,074,190 UART: Running Caliptra FMC ...
8,074,598 UART:
8,074,652 UART: [state] CFI Enabled
8,163,669 UART: [art] Extend RT PCRs Done
8,164,097 UART: [art] Lock RT PCRs Done
8,165,164 UART: [art] Populate DV Done
8,173,557 UART: [fht] FMC Alias Private Key: 7
8,174,553 UART: [art] Derive CDI
8,174,833 UART: [art] Store in in slot 0x4
8,261,092 UART: [art] Derive Key Pair
8,261,452 UART: [art] Store priv key in slot 0x5
8,274,890 UART: [art] Derive Key Pair - Done
8,289,381 UART: [art] Signing Cert with AUTHO
8,289,861 UART: RITY.KEYID = 7
8,305,259 UART: [art] Erasing AUTHORITY.KEYID = 7
8,306,024 UART: [art] PUB.X = E72A9CE433D4B53D6D4A705366E0880D06EB67BC990662EF9D413E38080E71943BEED0E3C534DEA876C7EEB7FF72FF4C
8,312,793 UART: [art] PUB.Y = 34CAF2D9F4198756C9597C5D2D00A1028A5AAE71099AB68D0D1965B2FCBBFD2CB9CD9243BE2016BECFAF1E4838F83C81
8,319,730 UART: [art] SIG.R = BB30C54A080414D9B557DE594B284E988837B5FEB9B57DB4334CD09E3B95A78E53736602A41F644239893FCF373D03A1
8,326,486 UART: [art] SIG.S = 34A36BF8852F4AEF5A991BD423ADE9FDF92BBCDBABECC530B70AEB0D89784B6F83B6C78CD5A18227A1F11734143F0B53
8,350,168 UART: mbox::rt_entry...
8,350,540 UART: ____ _ _ _ ____ _____
8,351,324 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,352,124 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,352,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,353,660 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,354,428 UART: |_|
8,354,740 UART:
8,639,642 UART: [rt] Runtime listening for mailbox commands...
8,640,689 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,922 ready_for_fw is high
1,056,922 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,531 >>> mbox cmd response: success
2,681,245 UART:
2,681,261 UART: Running Caliptra FMC ...
2,681,669 UART:
2,681,723 UART: [state] CFI Enabled
2,692,488 UART: [fht] FMC Alias Private Key: 7
2,800,499 UART: [art] Extend RT PCRs Done
2,800,927 UART: [art] Lock RT PCRs Done
2,802,621 UART: [art] Populate DV Done
2,810,980 UART: [fht] FMC Alias Private Key: 7
2,811,954 UART: [art] Derive CDI
2,812,234 UART: [art] Store in in slot 0x4
2,897,887 UART: [art] Derive Key Pair
2,898,247 UART: [art] Store priv key in slot 0x5
2,911,331 UART: [art] Derive Key Pair - Done
2,926,372 UART: [art] Signing Cert with AUTHO
2,926,852 UART: RITY.KEYID = 7
2,941,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,591 UART: [art] PUB.X = 8A7BEE6A6095972926C65EB50A8B0BE5CD5912B4C93CEFDBFD29F05BAEEF21FFAD772E8B4F14569074D480EDBA9DCF8B
2,949,383 UART: [art] PUB.Y = B1541B1034BA026D706563182116CEE3691EC6A6AC5BE0805C56C4882EE1AE989CD6C1C3E159D933101992F8EBA03B38
2,956,332 UART: [art] SIG.R = 4CF38A70D5180770E184B9DE0EF88CE5A5AE95AD77311D217404D42665D4A4DBAE75BE46D9B43199F4AB171269D17C45
2,963,099 UART: [art] SIG.S = CA397C730DBE4FE06E6BBCB34A08168208EBAE7E930BFCBC6B6A332886103759176902AAE753C4E18B2E70A6F84DE824
2,986,517 UART: Caliptra RT
2,986,770 UART: [state] CFI Enabled
3,095,481 UART: [rt] RT listening for mailbox commands...
3,096,151 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,847 UART: [rt]cmd =0x50435252, len=8
3,127,245 >>> mbox cmd response data (8 bytes)
3,127,246 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,095,771 >>> mbox cmd response: success
5,095,771 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,108,831 UART:
5,108,847 UART: Running Caliptra FMC ...
5,109,255 UART:
5,109,309 UART: [state] CFI Enabled
5,197,950 UART: [art] Extend RT PCRs Done
5,198,378 UART: [art] Lock RT PCRs Done
5,199,851 UART: [art] Populate DV Done
5,208,142 UART: [fht] FMC Alias Private Key: 7
5,209,272 UART: [art] Derive CDI
5,209,552 UART: [art] Store in in slot 0x4
5,294,697 UART: [art] Derive Key Pair
5,295,057 UART: [art] Store priv key in slot 0x5
5,307,951 UART: [art] Derive Key Pair - Done
5,322,793 UART: [art] Signing Cert with AUTHO
5,323,273 UART: RITY.KEYID = 7
5,338,425 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,190 UART: [art] PUB.X = 2EFA93ACBDA0C862EADFA480FDF212120128144BC084736FDE64EB3E157C8CD40A46732F2021B9F925E01BAAB6709C85
5,345,968 UART: [art] PUB.Y = 3E882B8D1CE2AADE6E50A809CCD8ABB781626B6016141938AA259F26EBECF29A28CC6D645171AFCF310E447BA7F029EC
5,352,930 UART: [art] SIG.R = 0AB8660CE1287924E9708AB8AB111AA1C6E929762F7A1CD9686BD5462A3FC972C6A2C330B85E09562922E57390781CC7
5,359,689 UART: [art] SIG.S = EEA533A29E3AF7DB85963BDA66B018455F1C5DA888EFF7E2B2551C874E6D5899CE0688715F45FD1E3CB9582599885F80
5,383,417 UART: mbox::rt_entry...
5,383,789 UART: ____ _ _ _ ____ _____
5,384,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,385,373 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,386,141 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,386,909 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,387,677 UART: |_|
5,387,989 UART:
5,666,799 UART: [rt] Runtime listening for mailbox commands...
5,667,846 >>> mbox cmd response data (128 bytes)
5,667,847 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,636,658 >>> mbox cmd response: success
7,636,658 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,649,790 UART:
7,649,806 UART: Running Caliptra FMC ...
7,650,214 UART:
7,650,268 UART: [state] CFI Enabled
7,739,491 UART: [art] Extend RT PCRs Done
7,739,919 UART: [art] Lock RT PCRs Done
7,741,140 UART: [art] Populate DV Done
7,749,391 UART: [fht] FMC Alias Private Key: 7
7,750,321 UART: [art] Derive CDI
7,750,601 UART: [art] Store in in slot 0x4
7,836,212 UART: [art] Derive Key Pair
7,836,572 UART: [art] Store priv key in slot 0x5
7,849,888 UART: [art] Derive Key Pair - Done
7,865,027 UART: [art] Signing Cert with AUTHO
7,865,507 UART: RITY.KEYID = 7
7,880,889 UART: [art] Erasing AUTHORITY.KEYID = 7
7,881,654 UART: [art] PUB.X = 06803B26F9711296B4496649302C4B638BFB9A9F3DE88A127574998AFD29B412BABB1309505E7B57480BBD6DA482C4D0
7,888,413 UART: [art] PUB.Y = 6ADB84C0566AD48A8F8668276A8F578EA792DEB795437665221CF057D989FA455B51CF0DCE109C34F9D0EF1FE8DF7E60
7,895,370 UART: [art] SIG.R = 7C0A59EEB63A2FD9FFEDEC3610A92F71E48653E40BF2C2A2DE41D6082382439CDE9B427EC4113F84F06DBE782CE11792
7,902,145 UART: [art] SIG.S = C2AC7945947611F3E1C2C6ACDD21CCBEC8B07B2BA08A5E0907A9D65AAF6AB94C9025C46962AB74B8A487D4C963866967
7,925,964 UART: mbox::rt_entry...
7,926,336 UART: ____ _ _ _ ____ _____
7,927,120 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,927,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,928,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,929,456 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,930,224 UART: |_|
7,930,536 UART:
8,211,280 UART: [rt] Runtime listening for mailbox commands...
8,212,327 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,714 UART: [kat] ++
895,866 UART: [kat] sha1
900,048 UART: [kat] SHA2-256
901,988 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,839 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,586 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,174,814 ready_for_fw is high
1,174,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,210,037 UART: [ldev] ++
1,210,205 UART: [ldev] CDI.KEYID = 6
1,210,569 UART: [ldev] SUBJECT.KEYID = 5
1,210,996 UART: [ldev] AUTHORITY.KEYID = 7
1,211,459 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,746 UART: [fwproc] Recv command 0x46574c44
1,283,479 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,698 >>> mbox cmd response: success
2,770,757 UART: [afmc] ++
2,770,925 UART: [afmc] CDI.KEYID = 6
2,771,288 UART: [afmc] SUBJECT.KEYID = 7
2,771,714 UART: [afmc] AUTHORITY.KEYID = 5
2,807,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,160 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,422 UART: [afmc] --
2,851,518 UART: [cold-reset] --
2,852,126 UART: [state] Locking Datavault
2,853,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,819 UART: [state] Locking ICCM
2,854,247 UART: [exit] Launching FMC @ 0x40000130
2,859,576 UART:
2,859,592 UART: Running Caliptra FMC ...
2,860,000 UART:
2,860,143 UART: [state] CFI Enabled
2,870,488 UART: [fht] FMC Alias Private Key: 7
2,978,679 UART: [art] Extend RT PCRs Done
2,979,107 UART: [art] Lock RT PCRs Done
2,980,635 UART: [art] Populate DV Done
2,988,756 UART: [fht] FMC Alias Private Key: 7
2,989,798 UART: [art] Derive CDI
2,990,078 UART: [art] Store in in slot 0x4
3,075,897 UART: [art] Derive Key Pair
3,076,257 UART: [art] Store priv key in slot 0x5
3,090,017 UART: [art] Derive Key Pair - Done
3,104,888 UART: [art] Signing Cert with AUTHO
3,105,368 UART: RITY.KEYID = 7
3,120,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,263 UART: [art] PUB.X = 2CF31B15DC2029CF91E09245D205AAF3009622A41E661FCDB5E8FDF4F8EE13117ED2296DE27FA73CB84A148F63016E08
3,128,012 UART: [art] PUB.Y = 0FC6506944884A861A838C1755FF0614371FEF1CE13100EA8B21D2313C69E106030A51E5AF8EF16E6DDF699FC5C05304
3,134,922 UART: [art] SIG.R = 69C0EB4D92DC07FEABACDBED75A46C3E89790745A3E13874D949FCCCCE747A6F80DC6F5BED602323E71D9955A559CF0F
3,141,705 UART: [art] SIG.S = 21EBFCF7252711255392B60433EBF4C53D58C40EC82187B3711A1FEAC22A02984B83F38C3135D0902E15FE9819F9F057
3,165,701 UART: Caliptra RT
3,166,046 UART: [state] CFI Enabled
3,273,683 UART: [rt] RT listening for mailbox commands...
3,274,353 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,289 UART: [rt]cmd =0x50435252, len=8
3,305,875 >>> mbox cmd response data (8 bytes)
3,305,876 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,571 UART:
3,306,587 UART: Running Caliptra ROM ...
3,306,995 UART:
3,307,137 UART: [state] CFI Enabled
3,310,261 UART: [state] LifecycleState = Unprovisioned
3,310,916 UART: [state] DebugLocked = No
3,311,522 UART: [state] WD Timer not started. Device not locked for debugging
3,312,696 UART: [kat] SHA2-256
4,116,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,375 UART: [kat] ++
4,120,527 UART: [kat] sha1
4,124,551 UART: [kat] SHA2-256
4,126,491 UART: [kat] SHA2-384
4,129,364 UART: [kat] SHA2-512-ACC
4,131,264 UART: [kat] ECC-384
4,141,285 UART: [kat] HMAC-384Kdf
4,145,769 UART: [kat] LMS
4,394,081 UART: [kat] --
4,395,065 UART: [update-reset] ++
5,296,138 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,297,111 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,393,121 >>> mbox cmd response: success
5,393,121 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,393,414 UART: [update-reset] Copying MAN_2 To MAN_1
5,401,428 UART: [update-reset Success] --
5,402,379 UART: [state] Locking Datavault
5,403,177 UART: [state] Locking PCR0, PCR1 and PCR31
5,403,781 UART: [state] Locking ICCM
5,404,359 UART: [exit] Launching FMC @ 0x40000130
5,409,688 UART:
5,409,704 UART: Running Caliptra FMC ...
5,410,112 UART:
5,410,255 UART: [state] CFI Enabled
5,499,310 UART: [art] Extend RT PCRs Done
5,499,738 UART: [art] Lock RT PCRs Done
5,501,071 UART: [art] Populate DV Done
5,509,202 UART: [fht] FMC Alias Private Key: 7
5,510,366 UART: [art] Derive CDI
5,510,646 UART: [art] Store in in slot 0x4
5,596,177 UART: [art] Derive Key Pair
5,596,537 UART: [art] Store priv key in slot 0x5
5,609,743 UART: [art] Derive Key Pair - Done
5,624,163 UART: [art] Signing Cert with AUTHO
5,624,643 UART: RITY.KEYID = 7
5,639,717 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,482 UART: [art] PUB.X = 307BC81FD6B2FC5686E8679D9BA0D5BCF74D85ABFB7E38FFC3E72675AA28CBD4C78DA195EB529FBA973122C2491EC130
5,647,272 UART: [art] PUB.Y = 250B2F87452EC5D8B440291F8E6E0D54BB9978BD9B199D25B219BBDC3272DF9C2D9C2418ABE2D6D00F19FC9BF4F0AA99
5,654,229 UART: [art] SIG.R = 76505F0432627B5E9D258B26347169170513024FE4D67182DCDFD95BA5829C8F0A130F7CD6DD3EC62E761EDCE501344A
5,660,981 UART: [art] SIG.S = F2C297F4B8F7D8869152D5F3B96771C453683A275964B05AB60F5AD68887A99B2C4F83D97CC1D7974AB63A2797EA4E7C
5,684,905 UART: mbox::rt_entry...
5,685,277 UART: ____ _ _ _ ____ _____
5,686,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,686,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,687,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,688,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,689,165 UART: |_|
5,689,477 UART:
5,972,183 UART: [rt] Runtime listening for mailbox commands...
5,973,230 >>> mbox cmd response data (128 bytes)
5,973,231 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,973,342 UART:
5,973,358 UART: Running Caliptra ROM ...
5,973,766 UART:
5,973,908 UART: [state] CFI Enabled
5,976,406 UART: [state] LifecycleState = Unprovisioned
5,977,061 UART: [state] DebugLocked = No
5,977,773 UART: [state] WD Timer not started. Device not locked for debugging
5,979,083 UART: [kat] SHA2-256
6,782,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,786,762 UART: [kat] ++
6,786,914 UART: [kat] sha1
6,791,344 UART: [kat] SHA2-256
6,793,284 UART: [kat] SHA2-384
6,795,965 UART: [kat] SHA2-512-ACC
6,797,865 UART: [kat] ECC-384
6,807,670 UART: [kat] HMAC-384Kdf
6,812,350 UART: [kat] LMS
7,060,662 UART: [kat] --
7,061,470 UART: [update-reset] ++
7,962,081 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,963,180 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,059,190 >>> mbox cmd response: success
8,059,190 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,059,339 UART: [update-reset] Copying MAN_2 To MAN_1
8,067,353 UART: [update-reset Success] --
8,068,446 UART: [state] Locking Datavault
8,069,102 UART: [state] Locking PCR0, PCR1 and PCR31
8,069,706 UART: [state] Locking ICCM
8,070,234 UART: [exit] Launching FMC @ 0x40000130
8,075,563 UART:
8,075,579 UART: Running Caliptra FMC ...
8,075,987 UART:
8,076,130 UART: [state] CFI Enabled
8,165,495 UART: [art] Extend RT PCRs Done
8,165,923 UART: [art] Lock RT PCRs Done
8,167,452 UART: [art] Populate DV Done
8,175,843 UART: [fht] FMC Alias Private Key: 7
8,176,801 UART: [art] Derive CDI
8,177,081 UART: [art] Store in in slot 0x4
8,262,672 UART: [art] Derive Key Pair
8,263,032 UART: [art] Store priv key in slot 0x5
8,276,070 UART: [art] Derive Key Pair - Done
8,291,018 UART: [art] Signing Cert with AUTHO
8,291,498 UART: RITY.KEYID = 7
8,306,444 UART: [art] Erasing AUTHORITY.KEYID = 7
8,307,209 UART: [art] PUB.X = F60D23CDB26A6DE707C747F7F4DB54938EA09C9D041FB9BE50F7336DD36DBA33AD2A1B084F07101EF9E7FE29816D664D
8,313,980 UART: [art] PUB.Y = 0BAE22320A78BE40A72BFFB9425EA9A136A5B26DBF7D87B5955EB1B6C4BBB351F0595B5BB12E2F9B3EC49E0C600A418D
8,320,938 UART: [art] SIG.R = ED23034D127B5A3154CBF9DBE5488D88F359ADB3ED8C1D5A7B826D200C49ED55E1D6F6B1CEA64F38AF183DABB54EB91C
8,327,726 UART: [art] SIG.S = D7FEF0B33E2ECBD3B3B45D21A5F912747D4910C9365C023F6FBB739C2D97D2A254B1544721D59510A08481A2EDC0536F
8,351,472 UART: mbox::rt_entry...
8,351,844 UART: ____ _ _ _ ____ _____
8,352,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,353,428 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,354,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,354,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,355,732 UART: |_|
8,356,044 UART:
8,641,659 UART: [rt] Runtime listening for mailbox commands...
8,642,706 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 ready_for_fw is high
1,056,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,136 >>> mbox cmd response: success
2,681,094 UART:
2,681,110 UART: Running Caliptra FMC ...
2,681,518 UART:
2,681,661 UART: [state] CFI Enabled
2,692,446 UART: [fht] FMC Alias Private Key: 7
2,800,533 UART: [art] Extend RT PCRs Done
2,800,961 UART: [art] Lock RT PCRs Done
2,802,449 UART: [art] Populate DV Done
2,810,892 UART: [fht] FMC Alias Private Key: 7
2,812,004 UART: [art] Derive CDI
2,812,284 UART: [art] Store in in slot 0x4
2,897,841 UART: [art] Derive Key Pair
2,898,201 UART: [art] Store priv key in slot 0x5
2,911,635 UART: [art] Derive Key Pair - Done
2,926,254 UART: [art] Signing Cert with AUTHO
2,926,734 UART: RITY.KEYID = 7
2,942,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,921 UART: [art] PUB.X = E5E4B0738E2558F27A9D3941FE8392033218D220BBB28E12FA8DF0586511F5E690B2564E715BCED6A7346419EDE9A786
2,949,688 UART: [art] PUB.Y = A10698CD092A245C6118A209305A1687C5B3C16DD5963BB748509D41D37783A52512931A007713E1DC52535419B86C9F
2,956,593 UART: [art] SIG.R = 5861BEC4C5E4980FD27A52A63D1060B6EA324C7C842E2BCCA0CE2E95990959FC338B9B4AAF361440981BE94331C13510
2,963,361 UART: [art] SIG.S = 2A5DB4E3960C5FE2238A1945AAEFC7CDBA10757183F1249976A863CA4F8458EDF527138E97EA172281C114D915CD2253
2,986,341 UART: Caliptra RT
2,986,686 UART: [state] CFI Enabled
3,093,233 UART: [rt] RT listening for mailbox commands...
3,093,903 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,535 UART: [rt]cmd =0x50435252, len=8
3,125,155 >>> mbox cmd response data (8 bytes)
3,125,156 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,094,524 >>> mbox cmd response: success
5,094,524 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,107,978 UART:
5,107,994 UART: Running Caliptra FMC ...
5,108,402 UART:
5,108,545 UART: [state] CFI Enabled
5,197,870 UART: [art] Extend RT PCRs Done
5,198,298 UART: [art] Lock RT PCRs Done
5,199,479 UART: [art] Populate DV Done
5,207,712 UART: [fht] FMC Alias Private Key: 7
5,208,782 UART: [art] Derive CDI
5,209,062 UART: [art] Store in in slot 0x4
5,294,977 UART: [art] Derive Key Pair
5,295,337 UART: [art] Store priv key in slot 0x5
5,308,509 UART: [art] Derive Key Pair - Done
5,323,000 UART: [art] Signing Cert with AUTHO
5,323,480 UART: RITY.KEYID = 7
5,338,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,267 UART: [art] PUB.X = 9C63F030972C2B2F2FCE94678777A5681617A3E2BEAF17AD7006D0D820A7DB5396EBE8F7A6F6CD59402E9478AA7B810A
5,346,039 UART: [art] PUB.Y = D30812E0BC59BD9EC412E55C660D607279E096C4DD29B71760E2EC345F8694AE1190871D54B576F7C293A2C6352CC945
5,352,981 UART: [art] SIG.R = 2E05047866ABFD13D68AF96F8537246E6CBF7B980A68D261D3F8C5677613EEF7866573FB0AAB3AD3E5D00FF5AE378C2A
5,359,748 UART: [art] SIG.S = 5823605A4101FA9ACD6B72ED9A2D1A5DB2900124E5B2D05087D1C50513E0A50187BDC333A6812530D568FF146109D5B3
5,383,144 UART: mbox::rt_entry...
5,383,516 UART: ____ _ _ _ ____ _____
5,384,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,385,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,385,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,386,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,387,404 UART: |_|
5,387,716 UART:
5,668,942 UART: [rt] Runtime listening for mailbox commands...
5,669,989 >>> mbox cmd response data (128 bytes)
5,669,990 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,637,532 >>> mbox cmd response: success
7,637,532 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,651,026 UART:
7,651,042 UART: Running Caliptra FMC ...
7,651,450 UART:
7,651,593 UART: [state] CFI Enabled
7,741,078 UART: [art] Extend RT PCRs Done
7,741,506 UART: [art] Lock RT PCRs Done
7,742,473 UART: [art] Populate DV Done
7,750,476 UART: [fht] FMC Alias Private Key: 7
7,751,528 UART: [art] Derive CDI
7,751,808 UART: [art] Store in in slot 0x4
7,837,531 UART: [art] Derive Key Pair
7,837,891 UART: [art] Store priv key in slot 0x5
7,850,605 UART: [art] Derive Key Pair - Done
7,865,648 UART: [art] Signing Cert with AUTHO
7,866,128 UART: RITY.KEYID = 7
7,881,462 UART: [art] Erasing AUTHORITY.KEYID = 7
7,882,227 UART: [art] PUB.X = 1960C893BF9F3883A222E21E300D12BE1ACB8EE8D4CB08429715402B2F6C654BC66D28151BD25EB2B593B37F507F4750
7,888,993 UART: [art] PUB.Y = D3DD10D421A5E410E1DE54730AC525B28DE935491351BFC4B1C8942F3E0710263662CA216F9C50089F1206BD12179FE9
7,895,929 UART: [art] SIG.R = BDAEA10FCFE2026B1CE3AB9A12087B54BF26D85E8F925258A56C9A02AB5FEA2432BCBABF8C5D37CC968686CB08EF9500
7,902,686 UART: [art] SIG.S = 727856A29A1407EC701CAE10B07461D36A46369F99C557C9F7894AEEACB2B7440D48E763F1E0A2DE90A7BEB943793546
7,926,147 UART: mbox::rt_entry...
7,926,519 UART: ____ _ _ _ ____ _____
7,927,303 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,928,103 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,928,871 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,929,639 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,930,407 UART: |_|
7,930,719 UART:
8,212,343 UART: [rt] Runtime listening for mailbox commands...
8,213,390 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,131 UART:
192,493 UART: Running Caliptra ROM ...
193,679 UART:
193,841 UART: [state] CFI Enabled
263,968 UART: [state] LifecycleState = Unprovisioned
265,901 UART: [state] DebugLocked = No
268,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,160 UART: [kat] SHA2-256
442,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,357 UART: [kat] ++
453,846 UART: [kat] sha1
463,392 UART: [kat] SHA2-256
466,045 UART: [kat] SHA2-384
471,257 UART: [kat] SHA2-512-ACC
473,625 UART: [kat] ECC-384
2,767,194 UART: [kat] HMAC-384Kdf
2,799,008 UART: [kat] LMS
3,989,380 UART: [kat] --
3,994,467 UART: [cold-reset] ++
3,996,545 UART: [fht] Storing FHT @ 0x50003400
4,008,311 UART: [idev] ++
4,008,878 UART: [idev] CDI.KEYID = 6
4,009,916 UART: [idev] SUBJECT.KEYID = 7
4,011,092 UART: [idev] UDS.KEYID = 0
4,012,131 ready_for_fw is high
4,012,334 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,393 UART: [idev] Erasing UDS.KEYID = 0
7,344,907 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,064 UART: [idev] --
7,369,679 UART: [ldev] ++
7,370,247 UART: [ldev] CDI.KEYID = 6
7,371,221 UART: [ldev] SUBJECT.KEYID = 5
7,372,377 UART: [ldev] AUTHORITY.KEYID = 7
7,373,664 UART: [ldev] FE.KEYID = 1
7,421,985 UART: [ldev] Erasing FE.KEYID = 1
10,756,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,896 UART: [ldev] --
13,136,132 UART: [fwproc] Waiting for Commands...
13,139,308 UART: [fwproc] Received command 0x46574c44
13,141,509 UART: [fwproc] Received Image of size 113760 bytes
17,186,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,747 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,655,395 >>> mbox cmd response: success
17,660,450 UART: [afmc] ++
17,661,059 UART: [afmc] CDI.KEYID = 6
17,661,979 UART: [afmc] SUBJECT.KEYID = 7
17,663,196 UART: [afmc] AUTHORITY.KEYID = 5
21,026,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,377 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,820 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,611 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,064 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,256 UART: [afmc] --
23,399,923 UART: [cold-reset] --
23,403,193 UART: [state] Locking Datavault
23,408,167 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,858 UART: [state] Locking ICCM
23,412,095 UART: [exit] Launching FMC @ 0x40000130
23,420,483 UART:
23,420,727 UART: Running Caliptra FMC ...
23,421,828 UART:
23,421,984 UART: [state] CFI Enabled
23,489,426 UART: [fht] FMC Alias Private Key: 7
25,827,915 UART: [art] Extend RT PCRs Done
25,829,142 UART: [art] Lock RT PCRs Done
25,830,829 UART: [art] Populate DV Done
25,836,075 UART: [fht] FMC Alias Private Key: 7
25,837,673 UART: [art] Derive CDI
25,838,481 UART: [art] Store in in slot 0x4
25,898,525 UART: [art] Derive Key Pair
25,899,555 UART: [art] Store priv key in slot 0x5
29,192,112 UART: [art] Derive Key Pair - Done
29,205,270 UART: [art] Signing Cert with AUTHO
29,206,576 UART: RITY.KEYID = 7
31,506,222 UART: [art] Erasing AUTHORITY.KEYID = 7
31,507,724 UART: [art] PUB.X = 395F244860669E86C2882AA465139239F0FAFB99FAA7B2761EC75E490BF7BD4E4FB2F9D98579E0E1BF2BE8DB266AD896
31,515,015 UART: [art] PUB.Y = DBAE073641180BF132D005AE17D02C887D050D9BF50962E50E20C0A225D4DAA1ADCAE5809319216496F4F5412CB4A25D
31,522,241 UART: [art] SIG.R = B821FFD3AA269C81B224F2808127D1002FD05A4B6CB561F9567396ABDB2FBA8612A890E039A41E99A1BEA0CA1294857F
31,529,635 UART: [art] SIG.S = EAD2FD0D15ABB8584C7DA9E1817B2EFC2FAB8224368719C68C8DE072E37CA8FDAFE05E862729E480DC59F1B77197F827
32,835,511 UART: Caliptra RT
32,836,221 UART: [state] CFI Enabled
32,997,522 UART: [rt] RT listening for mailbox commands...
35,049,006 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,149,811 UART:
35,150,163 UART: Running Caliptra ROM ...
35,151,303 UART:
35,151,478 UART: [state] CFI Enabled
35,221,816 UART: [state] LifecycleState = Unprovisioned
35,223,751 UART: [state] DebugLocked = No
35,226,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,230,267 UART: [kat] SHA2-256
35,399,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,410,466 UART: [kat] ++
35,410,931 UART: [kat] sha1
35,421,223 UART: [kat] SHA2-256
35,423,896 UART: [kat] SHA2-384
35,430,481 UART: [kat] SHA2-512-ACC
35,432,859 UART: [kat] ECC-384
37,722,222 UART: [kat] HMAC-384Kdf
37,752,545 UART: [kat] LMS
38,942,896 UART: [kat] --
38,948,571 UART: [update-reset] ++
42,648,360 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,651,237 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,908,766 >>> mbox cmd response: success
42,909,160 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,909,573 UART: [update-reset] Copying MAN_2 To MAN_1
42,931,960 UART: [update-reset Success] --
42,935,096 UART: [state] Locking Datavault
42,939,501 UART: [state] Locking PCR0, PCR1 and PCR31
42,941,256 UART: [state] Locking ICCM
42,942,813 UART: [exit] Launching FMC @ 0x40000130
42,951,262 UART:
42,951,515 UART: Running Caliptra FMC ...
42,952,616 UART:
42,952,773 UART: [state] CFI Enabled
43,056,090 UART: [art] Extend RT PCRs Done
43,057,282 UART: [art] Lock RT PCRs Done
43,058,526 UART: [art] Populate DV Done
43,063,825 UART: [fht] FMC Alias Private Key: 7
43,065,316 UART: [art] Derive CDI
43,066,082 UART: [art] Store in in slot 0x4
43,125,104 UART: [art] Derive Key Pair
43,126,151 UART: [art] Store priv key in slot 0x5
46,418,954 UART: [art] Derive Key Pair - Done
46,432,069 UART: [art] Signing Cert with AUTHO
46,433,376 UART: RITY.KEYID = 7
48,721,269 UART: [art] Erasing AUTHORITY.KEYID = 7
48,722,784 UART: [art] PUB.X = 18E6034996A48011C9BBD2793822176514D79C220712A708DF9426274045311AEA89C159CB07471EC37068DBEBBA4574
48,729,996 UART: [art] PUB.Y = D4648C735D221ADBCF6C7B4FCEA6BEB1D4E4CC7A0EF085E8005744EDF54DBD6CEE3A10EABF95BC2317326C2A496837BB
48,737,273 UART: [art] SIG.R = 31103970A0FB22C4247BCDBEF45B58DE9D166E99B902FD293DFF51642E058BC8521DCFD3E3647377AD625F35D282DC12
48,744,666 UART: [art] SIG.S = 70BFB88412239C8F72C82834DFC027B8820D6838C2A9AF88CE22C5F89F6532D72D0E8288F12A78F9369005C42A95C0EA
50,048,861 UART: mbox::rt_entry...
50,049,837 UART: ____ _ _ _ ____ _____
50,051,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,054,044 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,055,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,057,931 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,059,865 UART: |_|
50,060,675 UART:
50,342,893 UART: [rt] Runtime listening for mailbox commands...
50,345,058 >>> mbox cmd response data (48 bytes)
50,345,647 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,346,071 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
3,807,884 ready_for_fw is high
3,808,257 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,883,355 >>> mbox cmd response: success
23,571,466 UART:
23,571,862 UART: Running Caliptra FMC ...
23,572,971 UART:
23,573,126 UART: [state] CFI Enabled
23,641,511 UART: [fht] FMC Alias Private Key: 7
25,978,946 UART: [art] Extend RT PCRs Done
25,980,175 UART: [art] Lock RT PCRs Done
25,981,665 UART: [art] Populate DV Done
25,986,779 UART: [fht] FMC Alias Private Key: 7
25,988,385 UART: [art] Derive CDI
25,989,203 UART: [art] Store in in slot 0x4
26,050,422 UART: [art] Derive Key Pair
26,051,497 UART: [art] Store priv key in slot 0x5
29,344,475 UART: [art] Derive Key Pair - Done
29,357,727 UART: [art] Signing Cert with AUTHO
29,359,043 UART: RITY.KEYID = 7
31,646,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,181 UART: [art] PUB.X = EE443D7388C2165DB6DD4CFA1633F1B9F0852AAC62EB9A378E4F9DA36C101E884A81E75E490CB94F3DAA3A13F16F7998
31,655,392 UART: [art] PUB.Y = FA92B61E7FD05045084A72E77B3FAF63B80EEC7872A3FC468790DA41C3A678F66E4CCC09D31F64BEE5F8919782E51251
31,662,651 UART: [art] SIG.R = 4F271C1A9D88BF9999BC89D8E00BED90DEA6FDDFA7D812E693358204421F584C2748BF9592D6FEA1FBBC85794A35606C
31,670,058 UART: [art] SIG.S = F89CD8E86739D27B58EF46B680DAA88085D5083119B77522EF305CD68C27B384E81EAEF71CCB2E33E22B835FB431CFB6
32,975,590 UART: Caliptra RT
32,976,576 UART: [state] CFI Enabled
33,138,676 UART: [rt] RT listening for mailbox commands...
35,192,623 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,169,553 >>> mbox cmd response: success
43,170,107 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,204,662 UART:
43,204,998 UART: Running Caliptra FMC ...
43,206,127 UART:
43,206,289 UART: [state] CFI Enabled
43,303,454 UART: [art] Extend RT PCRs Done
43,304,644 UART: [art] Lock RT PCRs Done
43,306,048 UART: [art] Populate DV Done
43,311,614 UART: [fht] FMC Alias Private Key: 7
43,313,270 UART: [art] Derive CDI
43,314,105 UART: [art] Store in in slot 0x4
43,373,013 UART: [art] Derive Key Pair
43,374,054 UART: [art] Store priv key in slot 0x5
46,668,463 UART: [art] Derive Key Pair - Done
46,681,248 UART: [art] Signing Cert with AUTHO
46,682,543 UART: RITY.KEYID = 7
48,969,843 UART: [art] Erasing AUTHORITY.KEYID = 7
48,971,357 UART: [art] PUB.X = F5A609EC26989D9B851BA9D975136EE736C6DD5EFDA4A3024F374AD22CA4018DA26A253A6B4F2164DB7185EAE532DEDF
48,978,616 UART: [art] PUB.Y = C4CAC19383B04A65B9C9FEAC341DB9B1FE488CAED847D24773279B83DA0B530BB26B6B5D2D11297D337E8F9552A863B8
48,985,855 UART: [art] SIG.R = 56B10B80EBD624D513A3F02AEC5CAFCED8F700E5A1CD3230F52BE1C78A0B043099A5A2BB57ACF79FA776934D6699B35A
48,993,258 UART: [art] SIG.S = C7C6C76269192E9932AF66839AA6914720381548E569FB0C16A847CC246E552A258EB1B8AD3FE316179E01D4C5E13A47
50,297,379 UART: mbox::rt_entry...
50,298,334 UART: ____ _ _ _ ____ _____
50,300,266 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,302,274 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,304,205 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,306,155 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,308,085 UART: |_|
50,308,899 UART:
50,593,717 UART: [rt] Runtime listening for mailbox commands...
50,595,919 >>> mbox cmd response data (48 bytes)
50,596,503 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,596,929 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
193,038 UART:
193,416 UART: Running Caliptra ROM ...
194,611 UART:
604,371 UART: [state] CFI Enabled
616,828 UART: [state] LifecycleState = Unprovisioned
618,759 UART: [state] DebugLocked = No
621,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,635 UART: [kat] SHA2-256
796,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,885 UART: [kat] ++
807,339 UART: [kat] sha1
818,555 UART: [kat] SHA2-256
821,246 UART: [kat] SHA2-384
826,143 UART: [kat] SHA2-512-ACC
828,515 UART: [kat] ECC-384
3,113,658 UART: [kat] HMAC-384Kdf
3,125,058 UART: [kat] LMS
4,315,162 UART: [kat] --
4,319,830 UART: [cold-reset] ++
4,321,765 UART: [fht] Storing FHT @ 0x50003400
4,333,449 UART: [idev] ++
4,334,008 UART: [idev] CDI.KEYID = 6
4,335,006 UART: [idev] SUBJECT.KEYID = 7
4,336,200 UART: [idev] UDS.KEYID = 0
4,337,289 ready_for_fw is high
4,337,515 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,491 UART: [idev] Erasing UDS.KEYID = 0
7,620,850 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,459 UART: [idev] --
7,646,588 UART: [ldev] ++
7,647,171 UART: [ldev] CDI.KEYID = 6
7,648,137 UART: [ldev] SUBJECT.KEYID = 5
7,649,344 UART: [ldev] AUTHORITY.KEYID = 7
7,650,569 UART: [ldev] FE.KEYID = 1
7,659,747 UART: [ldev] Erasing FE.KEYID = 1
10,947,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,117 UART: [ldev] --
13,311,783 UART: [fwproc] Waiting for Commands...
13,314,949 UART: [fwproc] Received command 0x46574c44
13,317,120 UART: [fwproc] Received Image of size 113760 bytes
17,364,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,021 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,928 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,824,857 >>> mbox cmd response: success
17,828,466 UART: [afmc] ++
17,829,116 UART: [afmc] CDI.KEYID = 6
17,830,021 UART: [afmc] SUBJECT.KEYID = 7
17,831,237 UART: [afmc] AUTHORITY.KEYID = 5
21,145,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,444 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,700 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,089 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,941 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,389 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,999 UART: [afmc] --
23,510,371 UART: [cold-reset] --
23,514,067 UART: [state] Locking Datavault
23,519,368 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,075 UART: [state] Locking ICCM
23,522,735 UART: [exit] Launching FMC @ 0x40000130
23,531,131 UART:
23,531,363 UART: Running Caliptra FMC ...
23,532,459 UART:
23,532,614 UART: [state] CFI Enabled
23,540,797 UART: [fht] FMC Alias Private Key: 7
25,871,576 UART: [art] Extend RT PCRs Done
25,872,803 UART: [art] Lock RT PCRs Done
25,874,581 UART: [art] Populate DV Done
25,879,941 UART: [fht] FMC Alias Private Key: 7
25,881,562 UART: [art] Derive CDI
25,882,327 UART: [art] Store in in slot 0x4
25,925,304 UART: [art] Derive Key Pair
25,926,308 UART: [art] Store priv key in slot 0x5
29,167,775 UART: [art] Derive Key Pair - Done
29,180,668 UART: [art] Signing Cert with AUTHO
29,181,965 UART: RITY.KEYID = 7
31,461,649 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,158 UART: [art] PUB.X = 7E81CE38DC9288AC49355E62AD071CDD8927F7FE622A92150CADEE7032C45E0C629274B4A839FB5B8BF63496E8B56A0D
31,470,383 UART: [art] PUB.Y = 37E317E9F24061A10613E1270C6C5C3F216E64C6EB045D7049407F9558E5AB09CFD196C844CB697711D9E72D64CD6782
31,477,591 UART: [art] SIG.R = AC93CD76AE9ECE9105CEA8E924BCC88D231D958C88A3BD0BB064C2C347AA8725933728F39431FF5D9BA1FA3344554A16
31,485,037 UART: [art] SIG.S = 0F8F3C4F51DFCCB5F684E2BDE89BC56986AA588C5054290448BC6161F10D01D31405A40E78D1DFB6A4BDF554FE1CE843
32,790,495 UART: Caliptra RT
32,791,194 UART: [state] CFI Enabled
32,908,379 UART: [rt] RT listening for mailbox commands...
34,958,581 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,058,970 UART:
35,059,341 UART: Running Caliptra ROM ...
35,060,474 UART:
35,060,637 UART: [state] CFI Enabled
35,076,580 UART: [state] LifecycleState = Unprovisioned
35,078,482 UART: [state] DebugLocked = No
35,081,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,085,477 UART: [kat] SHA2-256
35,255,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,265,704 UART: [kat] ++
35,266,179 UART: [kat] sha1
35,277,494 UART: [kat] SHA2-256
35,280,179 UART: [kat] SHA2-384
35,286,162 UART: [kat] SHA2-512-ACC
35,288,509 UART: [kat] ECC-384
37,570,555 UART: [kat] HMAC-384Kdf
37,582,786 UART: [kat] LMS
38,772,826 UART: [kat] --
38,777,569 UART: [update-reset] ++
42,483,930 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,487,006 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,744,587 >>> mbox cmd response: success
42,744,975 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,746,347 UART: [update-reset] Copying MAN_2 To MAN_1
42,768,771 UART: [update-reset Success] --
42,773,623 UART: [state] Locking Datavault
42,777,607 UART: [state] Locking PCR0, PCR1 and PCR31
42,779,370 UART: [state] Locking ICCM
42,781,953 UART: [exit] Launching FMC @ 0x40000130
42,790,397 UART:
42,790,629 UART: Running Caliptra FMC ...
42,791,732 UART:
42,791,885 UART: [state] CFI Enabled
42,835,997 UART: [art] Extend RT PCRs Done
42,837,136 UART: [art] Lock RT PCRs Done
42,838,903 UART: [art] Populate DV Done
42,844,363 UART: [fht] FMC Alias Private Key: 7
42,845,874 UART: [art] Derive CDI
42,846,619 UART: [art] Store in in slot 0x4
42,888,871 UART: [art] Derive Key Pair
42,889,874 UART: [art] Store priv key in slot 0x5
46,132,129 UART: [art] Derive Key Pair - Done
46,144,933 UART: [art] Signing Cert with AUTHO
46,146,242 UART: RITY.KEYID = 7
48,425,643 UART: [art] Erasing AUTHORITY.KEYID = 7
48,427,160 UART: [art] PUB.X = E2D20112D5DB91306F6E07207FA610975F36A2A019CBF4C7BCAA5D860549370F244EC62A3DC0252BDB7934CA7042B234
48,434,386 UART: [art] PUB.Y = 3B2A68FCB750EBB14A1AC30EC1144A1EF63FDC0F84138D44C6217303592038B73CC4188679469BD7407845DD7675EE9F
48,441,737 UART: [art] SIG.R = E51321F2F9FFCF09FD09AD2B9745DCE971D5784BFD0D23C1601CA9330D5DCAEA6441EF5EA6CA11651247C7FC56EC9A4B
48,449,007 UART: [art] SIG.S = B0546C5EA9C6CCB38D5C06C3DFD2829C445D53255584643634B8359B266215685B56767202BC5E7FE27740E132ADC74B
49,753,588 UART: mbox::rt_entry...
49,754,524 UART: ____ _ _ _ ____ _____
49,756,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,758,500 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,760,423 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,762,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,764,277 UART: |_|
49,765,082 UART:
50,048,063 UART: [rt] Runtime listening for mailbox commands...
50,050,227 >>> mbox cmd response data (48 bytes)
50,050,843 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,051,277 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
4,131,476 ready_for_fw is high
4,131,976 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,079,781 >>> mbox cmd response: success
23,713,539 UART:
23,713,976 UART: Running Caliptra FMC ...
23,715,113 UART:
23,715,275 UART: [state] CFI Enabled
23,722,904 UART: [fht] FMC Alias Private Key: 7
26,053,479 UART: [art] Extend RT PCRs Done
26,054,712 UART: [art] Lock RT PCRs Done
26,056,613 UART: [art] Populate DV Done
26,062,031 UART: [fht] FMC Alias Private Key: 7
26,063,737 UART: [art] Derive CDI
26,064,572 UART: [art] Store in in slot 0x4
26,107,232 UART: [art] Derive Key Pair
26,108,279 UART: [art] Store priv key in slot 0x5
29,350,985 UART: [art] Derive Key Pair - Done
29,363,825 UART: [art] Signing Cert with AUTHO
29,365,134 UART: RITY.KEYID = 7
31,644,711 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,222 UART: [art] PUB.X = BF81B17D559A98A90176E32A39B4EB04A7623FE9DD281FDA78C9DD308B9FDE028986A1D5FBAA5BB4FCB50E1424521CFE
31,653,500 UART: [art] PUB.Y = E7FFDAD6A23138819128E4A8263882C87BE67436FBF7791C865BD3337BB4EFFCE1014590C6698DA2669FB7174472AF8B
31,660,720 UART: [art] SIG.R = CB5686D151FFFE655174BC395D839ADA64A364576A17EA53913341146C495BDE2E1C550AA68135AAFF7B8CA827FAF90A
31,668,083 UART: [art] SIG.S = EC5444421B934EB5D677AE27CD2AA2F554CA136E5C4C1169B7ECAC0B4BD6D01ACB67C2D329F64DD89691D189BEC3B316
32,972,660 UART: Caliptra RT
32,973,381 UART: [state] CFI Enabled
33,090,461 UART: [rt] RT listening for mailbox commands...
35,142,133 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,028,200 >>> mbox cmd response: success
43,028,704 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,062,701 UART:
43,063,047 UART: Running Caliptra FMC ...
43,064,137 UART:
43,064,290 UART: [state] CFI Enabled
43,108,698 UART: [art] Extend RT PCRs Done
43,109,847 UART: [art] Lock RT PCRs Done
43,111,137 UART: [art] Populate DV Done
43,116,635 UART: [fht] FMC Alias Private Key: 7
43,118,234 UART: [art] Derive CDI
43,119,046 UART: [art] Store in in slot 0x4
43,161,505 UART: [art] Derive Key Pair
43,162,572 UART: [art] Store priv key in slot 0x5
46,404,986 UART: [art] Derive Key Pair - Done
46,417,991 UART: [art] Signing Cert with AUTHO
46,419,297 UART: RITY.KEYID = 7
48,699,149 UART: [art] Erasing AUTHORITY.KEYID = 7
48,700,659 UART: [art] PUB.X = C9A0B546814F73CF2D66A47DD7F71D8CE175A39039D77EC5E3373F6B50D71B14CE4FB75DDAF77A03DC6CF991BB80B341
48,707,894 UART: [art] PUB.Y = 6A14E9B293A3C44332BA64BF0B8B221C0CDA1EF2A1A153C9FB33DF6518BAC277557C47340A1D54B10BE5770834432214
48,715,166 UART: [art] SIG.R = 4B7CB6AF67257278DB5F7B2FFA7473A23C9014E7C1788453F98D09C8B63556B231BB9178B816E7AD1C65BCC3E21F399C
48,722,531 UART: [art] SIG.S = F7DDC5EA6A0B87D5EB041EE2AA1D85EC0AB60B0763FD41E96FCDBCE93D642B3493E9CEA6BC65650D1C7A923C8DE39DD0
50,026,853 UART: mbox::rt_entry...
50,027,823 UART: ____ _ _ _ ____ _____
50,029,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,031,817 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,033,750 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,035,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,037,540 UART: |_|
50,038,359 UART:
50,322,167 UART: [rt] Runtime listening for mailbox commands...
50,324,324 >>> mbox cmd response data (48 bytes)
50,324,894 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,325,323 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,438 UART:
192,827 UART: Running Caliptra ROM ...
194,025 UART:
194,185 UART: [state] CFI Enabled
265,654 UART: [state] LifecycleState = Unprovisioned
267,498 UART: [state] DebugLocked = No
269,176 UART: [state] WD Timer not started. Device not locked for debugging
273,062 UART: [kat] SHA2-256
452,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,760 UART: [kat] ++
464,288 UART: [kat] sha1
474,806 UART: [kat] SHA2-256
477,873 UART: [kat] SHA2-384
483,872 UART: [kat] SHA2-512-ACC
486,807 UART: [kat] ECC-384
2,948,863 UART: [kat] HMAC-384Kdf
2,972,899 UART: [kat] LMS
3,502,322 UART: [kat] --
3,506,192 UART: [cold-reset] ++
3,507,909 UART: [fht] FHT @ 0x50003400
3,517,884 UART: [idev] ++
3,518,439 UART: [idev] CDI.KEYID = 6
3,519,366 UART: [idev] SUBJECT.KEYID = 7
3,520,533 UART: [idev] UDS.KEYID = 0
3,521,577 ready_for_fw is high
3,521,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,263 UART: [idev] Erasing UDS.KEYID = 0
6,024,841 UART: [idev] Sha1 KeyId Algorithm
6,048,285 UART: [idev] --
6,052,994 UART: [ldev] ++
6,053,561 UART: [ldev] CDI.KEYID = 6
6,054,446 UART: [ldev] SUBJECT.KEYID = 5
6,055,603 UART: [ldev] AUTHORITY.KEYID = 7
6,056,887 UART: [ldev] FE.KEYID = 1
6,099,908 UART: [ldev] Erasing FE.KEYID = 1
8,607,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,027 UART: [ldev] --
10,414,082 UART: [fwproc] Wait for Commands...
10,417,238 UART: [fwproc] Recv command 0x46574c44
10,419,340 UART: [fwproc] Recv'd Img size: 114084 bytes
13,809,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,267,142 >>> mbox cmd response: success
14,271,176 UART: [afmc] ++
14,271,770 UART: [afmc] CDI.KEYID = 6
14,272,688 UART: [afmc] SUBJECT.KEYID = 7
14,273,842 UART: [afmc] AUTHORITY.KEYID = 5
16,806,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,916 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,571 UART: [afmc] --
18,605,085 UART: [cold-reset] --
18,609,594 UART: [state] Locking Datavault
18,615,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,040 UART: [state] Locking ICCM
18,618,975 UART: [exit] Launching FMC @ 0x40000130
18,627,379 UART:
18,627,610 UART: Running Caliptra FMC ...
18,628,705 UART:
18,628,861 UART: [state] CFI Enabled
18,689,658 UART: [fht] FMC Alias Private Key: 7
20,453,546 UART: [art] Extend RT PCRs Done
20,454,768 UART: [art] Lock RT PCRs Done
20,456,450 UART: [art] Populate DV Done
20,461,637 UART: [fht] FMC Alias Private Key: 7
20,463,275 UART: [art] Derive CDI
20,464,079 UART: [art] Store in in slot 0x4
20,521,820 UART: [art] Derive Key Pair
20,522,857 UART: [art] Store priv key in slot 0x5
22,985,467 UART: [art] Derive Key Pair - Done
22,998,328 UART: [art] Signing Cert with AUTHO
22,999,626 UART: RITY.KEYID = 7
24,710,591 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,087 UART: [art] PUB.X = 42269B10AEE61BA099453E65C29AEA3866520BC5E6C8225D38E49673FEE076520B61B8ED979B11E6165A375572F381C7
24,719,377 UART: [art] PUB.Y = A056B3BAC25CF249F99AC0056E6662C957E4B34DE564FE66E91D1A4CB598E0F9C78172A102E684F2AF09F883DEC364A6
24,726,593 UART: [art] SIG.R = 1E72597D50C35956B41CAD862B48325F53C15FA12F7CCFE572FEE98D1D9C9871ED798006AF36CE950DEC8FDDDAEEB01C
24,734,053 UART: [art] SIG.S = 409842132234460ED7B44B7AB0A120D03E33585F5422760FEEF9EC9AD497A08C16FBAD6936A814050FA898F8D98B9137
25,713,136 UART: Caliptra RT
25,713,832 UART: [state] CFI Enabled
25,877,861 UART: [rt] RT listening for mailbox commands...
27,928,794 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,029,664 UART:
28,030,039 UART: Running Caliptra ROM ...
28,031,170 UART:
28,031,343 UART: [state] CFI Enabled
28,099,957 UART: [state] LifecycleState = Unprovisioned
28,101,787 UART: [state] DebugLocked = No
28,103,768 UART: [state] WD Timer not started. Device not locked for debugging
28,107,732 UART: [kat] SHA2-256
28,286,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,298,419 UART: [kat] ++
28,298,962 UART: [kat] sha1
28,309,094 UART: [kat] SHA2-256
28,312,119 UART: [kat] SHA2-384
28,318,211 UART: [kat] SHA2-512-ACC
28,321,143 UART: [kat] ECC-384
30,786,011 UART: [kat] HMAC-384Kdf
30,806,543 UART: [kat] LMS
31,336,012 UART: [kat] --
31,342,269 UART: [update-reset] ++
34,325,627 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,329,275 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,586,632 >>> mbox cmd response: success
34,587,020 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,587,313 UART: [update-reset] Copying MAN_2 To MAN_1
34,609,255 UART: [update-reset Success] --
34,612,142 UART: [state] Locking Datavault
34,614,635 UART: [state] Locking PCR0, PCR1 and PCR31
34,616,277 UART: [state] Locking ICCM
34,618,370 UART: [exit] Launching FMC @ 0x40000130
34,626,768 UART:
34,626,998 UART: Running Caliptra FMC ...
34,628,091 UART:
34,628,266 UART: [state] CFI Enabled
34,719,777 UART: [art] Extend RT PCRs Done
34,720,968 UART: [art] Lock RT PCRs Done
34,722,528 UART: [art] Populate DV Done
34,727,981 UART: [fht] FMC Alias Private Key: 7
34,729,465 UART: [art] Derive CDI
34,730,479 UART: [art] Store in in slot 0x4
34,788,954 UART: [art] Derive Key Pair
34,789,950 UART: [art] Store priv key in slot 0x5
37,252,266 UART: [art] Derive Key Pair - Done
37,265,366 UART: [art] Signing Cert with AUTHO
37,266,669 UART: RITY.KEYID = 7
38,978,794 UART: [art] Erasing AUTHORITY.KEYID = 7
38,980,295 UART: [art] PUB.X = 70EBF7BA385449D64D802D9AAEC05B0785D32FBB512A44A2C8A900C32F120F70EF8DA79223C5F0377BA3EFEE05F94825
38,987,566 UART: [art] PUB.Y = 89D579405504E01451F0444855772F941A8DFD256F1E9F8DCB390F2B71911F72D09ED2EF44BE78C36764C55D2E69AC41
38,994,833 UART: [art] SIG.R = C4E061201CEC490620279463AECEA9FFBE7FDE251C6A3764FC5A8DE46E23CD53F0223F88DE1FBAE05F53F11C55DB0AAA
39,002,269 UART: [art] SIG.S = 422EA292A10F9A34FF1D3F8BD8A8099ED5B1BEEE41DB1D30D8DE81DB2D44BB42CD1D4DEA38DCD728824CABF69566FF33
39,980,274 UART: mbox::rt_entry...
39,981,229 UART: ____ _ _ _ ____ _____
39,983,150 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,985,149 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,987,001 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,988,928 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,990,777 UART: |_|
39,991,654 UART:
40,273,875 UART: [rt] Runtime listening for mailbox commands...
40,276,028 >>> mbox cmd response data (48 bytes)
40,276,594 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,277,013 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
3,381,381 ready_for_fw is high
3,381,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,042,415 >>> mbox cmd response: success
18,322,088 UART:
18,322,491 UART: Running Caliptra FMC ...
18,323,695 UART:
18,323,862 UART: [state] CFI Enabled
18,390,189 UART: [fht] FMC Alias Private Key: 7
20,154,576 UART: [art] Extend RT PCRs Done
20,155,798 UART: [art] Lock RT PCRs Done
20,157,590 UART: [art] Populate DV Done
20,162,855 UART: [fht] FMC Alias Private Key: 7
20,164,340 UART: [art] Derive CDI
20,165,100 UART: [art] Store in in slot 0x4
20,222,414 UART: [art] Derive Key Pair
20,223,447 UART: [art] Store priv key in slot 0x5
22,686,900 UART: [art] Derive Key Pair - Done
22,699,737 UART: [art] Signing Cert with AUTHO
22,701,037 UART: RITY.KEYID = 7
24,411,901 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,548 UART: [art] PUB.X = 31B1266D192105E33382DFF94A999747F52A0061FCD528C82F7716445063F754BA155FE0A17188CCCB545F21B9158701
24,420,639 UART: [art] PUB.Y = E84E5B55EFC857A49E605BC8F2F17B582A0061E9969B2D4AAB5BD852C5F645CC3CBCC43A30488485A4AF8BBA1B9C6B96
24,427,889 UART: [art] SIG.R = 24D00E27B1A43B85688B30666DDDEE15A8563FD47E76A28883F2C8CA8ABB3209505F439F484D76819FBDBCD3DE32FA01
24,435,250 UART: [art] SIG.S = 3F20A54379E92ED239D16704AA812C7815031D6215657DFEF7457971FD50EDCC56171A22E291BA0562C46DDEA1AD15A8
25,414,405 UART: Caliptra RT
25,415,109 UART: [state] CFI Enabled
25,580,208 UART: [rt] RT listening for mailbox commands...
27,633,925 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,140,953 >>> mbox cmd response: success
34,141,481 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,177,711 UART:
34,178,038 UART: Running Caliptra FMC ...
34,179,170 UART:
34,179,332 UART: [state] CFI Enabled
34,275,989 UART: [art] Extend RT PCRs Done
34,277,163 UART: [art] Lock RT PCRs Done
34,278,508 UART: [art] Populate DV Done
34,284,137 UART: [fht] FMC Alias Private Key: 7
34,285,736 UART: [art] Derive CDI
34,286,572 UART: [art] Store in in slot 0x4
34,344,620 UART: [art] Derive Key Pair
34,345,659 UART: [art] Store priv key in slot 0x5
36,808,727 UART: [art] Derive Key Pair - Done
36,821,556 UART: [art] Signing Cert with AUTHO
36,822,894 UART: RITY.KEYID = 7
38,534,618 UART: [art] Erasing AUTHORITY.KEYID = 7
38,536,123 UART: [art] PUB.X = 13567BE23C82BDD43DE860C8886994C28A279E8BBA0B2D0349C3EBAAA1577F931DE56DF447042CB15C5550112FEDB463
38,543,354 UART: [art] PUB.Y = BA8F3223905919A9B3B95364E22567C3485760B060C7F70A0F67CF27114975194F732AC44645F776CD846710C6C8F937
38,550,625 UART: [art] SIG.R = 2E9289C8077AD05D156C7553C9165C26898217E75C539F0C2EDF1D4268F87CEC3AC3DAB31DED6CF4AD8203592CDA79C5
38,557,985 UART: [art] SIG.S = D7EA4EAF593598497B3D311209F061CEDA35D498DFCEE06D0D3396D09526E9ECE49D3A7A3237A2693AFD8712E0EE4445
39,536,093 UART: mbox::rt_entry...
39,537,042 UART: ____ _ _ _ ____ _____
39,539,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,541,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,542,970 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,544,933 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,546,786 UART: |_|
39,547,585 UART:
39,834,576 UART: [rt] Runtime listening for mailbox commands...
39,836,735 >>> mbox cmd response data (48 bytes)
39,837,308 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,837,938 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,896 writing to cptra_bootfsm_go
193,130 UART:
193,499 UART: Running Caliptra ROM ...
194,694 UART:
604,444 UART: [state] CFI Enabled
618,356 UART: [state] LifecycleState = Unprovisioned
620,272 UART: [state] DebugLocked = No
622,246 UART: [state] WD Timer not started. Device not locked for debugging
626,794 UART: [kat] SHA2-256
805,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,483 UART: [kat] ++
818,020 UART: [kat] sha1
829,264 UART: [kat] SHA2-256
832,347 UART: [kat] SHA2-384
837,990 UART: [kat] SHA2-512-ACC
840,949 UART: [kat] ECC-384
3,279,890 UART: [kat] HMAC-384Kdf
3,292,904 UART: [kat] LMS
3,822,359 UART: [kat] --
3,829,049 UART: [cold-reset] ++
3,830,698 UART: [fht] FHT @ 0x50003400
3,842,395 UART: [idev] ++
3,842,960 UART: [idev] CDI.KEYID = 6
3,843,869 UART: [idev] SUBJECT.KEYID = 7
3,845,044 UART: [idev] UDS.KEYID = 0
3,846,098 ready_for_fw is high
3,846,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,540 UART: [idev] Erasing UDS.KEYID = 0
6,317,724 UART: [idev] Sha1 KeyId Algorithm
6,341,496 UART: [idev] --
6,346,675 UART: [ldev] ++
6,347,266 UART: [ldev] CDI.KEYID = 6
6,348,148 UART: [ldev] SUBJECT.KEYID = 5
6,349,359 UART: [ldev] AUTHORITY.KEYID = 7
6,350,586 UART: [ldev] FE.KEYID = 1
6,363,446 UART: [ldev] Erasing FE.KEYID = 1
8,837,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,456 UART: [ldev] --
10,628,510 UART: [fwproc] Wait for Commands...
10,631,693 UART: [fwproc] Recv command 0x46574c44
10,633,787 UART: [fwproc] Recv'd Img size: 114084 bytes
14,034,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,496,443 >>> mbox cmd response: success
14,501,403 UART: [afmc] ++
14,502,002 UART: [afmc] CDI.KEYID = 6
14,502,924 UART: [afmc] SUBJECT.KEYID = 7
14,504,087 UART: [afmc] AUTHORITY.KEYID = 5
17,007,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,118 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,033 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,814 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,311 UART: [afmc] --
18,805,887 UART: [cold-reset] --
18,808,461 UART: [state] Locking Datavault
18,813,551 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,280 UART: [state] Locking ICCM
18,817,755 UART: [exit] Launching FMC @ 0x40000130
18,826,155 UART:
18,826,399 UART: Running Caliptra FMC ...
18,827,510 UART:
18,827,667 UART: [state] CFI Enabled
18,835,826 UART: [fht] FMC Alias Private Key: 7
20,592,919 UART: [art] Extend RT PCRs Done
20,594,144 UART: [art] Lock RT PCRs Done
20,596,094 UART: [art] Populate DV Done
20,601,351 UART: [fht] FMC Alias Private Key: 7
20,602,902 UART: [art] Derive CDI
20,603,724 UART: [art] Store in in slot 0x4
20,646,321 UART: [art] Derive Key Pair
20,647,364 UART: [art] Store priv key in slot 0x5
23,074,550 UART: [art] Derive Key Pair - Done
23,087,353 UART: [art] Signing Cert with AUTHO
23,088,673 UART: RITY.KEYID = 7
24,794,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,985 UART: [art] PUB.X = D095214A175137B39EEAB1B5F73FA7DE6DE44A29A0414A3D94E422E4CEAFA60A0CA5ACE2B8FEDAA0515B307A4DC6E10E
24,803,263 UART: [art] PUB.Y = 00708163C3F46BE05C0992EF0735BABE545D8A6E1F1943094A4C3638A84D4A0DBE76A629B9C131FC834E892B3458EBE5
24,810,526 UART: [art] SIG.R = B2C1C75B5D46A86AE8FC9A7686F7DBAC5DEAED9E98DCE66410DFE8409FD73C13C9652AE66E16815F36CE0ADD3F72BDCC
24,817,952 UART: [art] SIG.S = 4E42229C215840F4D7624BB5268F90C25765AC24FA2EEBCAB25DD47BC07F3EDEB904A5400CF8D6861E8106F28E445FB6
25,797,068 UART: Caliptra RT
25,797,777 UART: [state] CFI Enabled
25,914,023 UART: [rt] RT listening for mailbox commands...
27,965,544 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,065,921 UART:
28,066,324 UART: Running Caliptra ROM ...
28,067,471 UART:
28,067,645 UART: [state] CFI Enabled
28,080,569 UART: [state] LifecycleState = Unprovisioned
28,082,422 UART: [state] DebugLocked = No
28,084,779 UART: [state] WD Timer not started. Device not locked for debugging
28,088,040 UART: [kat] SHA2-256
28,267,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,278,790 UART: [kat] ++
28,279,334 UART: [kat] sha1
28,290,335 UART: [kat] SHA2-256
28,293,351 UART: [kat] SHA2-384
28,300,042 UART: [kat] SHA2-512-ACC
28,302,978 UART: [kat] ECC-384
30,742,946 UART: [kat] HMAC-384Kdf
30,754,638 UART: [kat] LMS
31,284,137 UART: [kat] --
31,288,019 UART: [update-reset] ++
34,280,408 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,283,034 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,540,348 >>> mbox cmd response: success
34,540,732 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,541,245 UART: [update-reset] Copying MAN_2 To MAN_1
34,563,589 UART: [update-reset Success] --
34,566,205 UART: [state] Locking Datavault
34,569,299 UART: [state] Locking PCR0, PCR1 and PCR31
34,571,004 UART: [state] Locking ICCM
34,572,085 UART: [exit] Launching FMC @ 0x40000130
34,580,485 UART:
34,580,733 UART: Running Caliptra FMC ...
34,581,842 UART:
34,582,000 UART: [state] CFI Enabled
34,626,373 UART: [art] Extend RT PCRs Done
34,627,557 UART: [art] Lock RT PCRs Done
34,629,177 UART: [art] Populate DV Done
34,634,427 UART: [fht] FMC Alias Private Key: 7
34,635,910 UART: [art] Derive CDI
34,636,730 UART: [art] Store in in slot 0x4
34,679,487 UART: [art] Derive Key Pair
34,680,490 UART: [art] Store priv key in slot 0x5
37,106,877 UART: [art] Derive Key Pair - Done
37,119,609 UART: [art] Signing Cert with AUTHO
37,120,928 UART: RITY.KEYID = 7
38,826,147 UART: [art] Erasing AUTHORITY.KEYID = 7
38,827,657 UART: [art] PUB.X = EC545EEDE1D1A746A43AB46C176C4176CB177D40AC0EDC7FD499BE6841672BE6DACAB16087D924246D250F7F3E487ED3
38,834,940 UART: [art] PUB.Y = 6D17B240AD5018E2AF1B796DB98EBF1CAF94CBD16F0BC665C23455E39533ADD9200A2B9DB227C01CE73870348FC7F6F0
38,842,199 UART: [art] SIG.R = C9473EC6979FFAB43E010F12CBAC2BF2C5D964D0D70ACA20026494635218BBD79BA9797426BE8F58C423F4C6A56FEB8A
38,849,615 UART: [art] SIG.S = F961B165621E2E962EAC48FE8CA6F997A9A98803A8C4D6BEBA363D29AEDB4D4E289860F2A2447F246B510479AA2E2B1D
39,828,374 UART: mbox::rt_entry...
39,829,334 UART: ____ _ _ _ ____ _____
39,831,323 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,833,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,835,275 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,837,211 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,839,115 UART: |_|
39,839,914 UART:
40,124,149 UART: [rt] Runtime listening for mailbox commands...
40,126,335 >>> mbox cmd response data (48 bytes)
40,126,974 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,127,420 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
3,699,420 ready_for_fw is high
3,699,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,563 >>> mbox cmd response: success
18,527,066 UART:
18,527,485 UART: Running Caliptra FMC ...
18,528,645 UART:
18,528,812 UART: [state] CFI Enabled
18,536,926 UART: [fht] FMC Alias Private Key: 7
20,293,193 UART: [art] Extend RT PCRs Done
20,294,425 UART: [art] Lock RT PCRs Done
20,296,058 UART: [art] Populate DV Done
20,301,747 UART: [fht] FMC Alias Private Key: 7
20,303,295 UART: [art] Derive CDI
20,304,118 UART: [art] Store in in slot 0x4
20,346,387 UART: [art] Derive Key Pair
20,347,395 UART: [art] Store priv key in slot 0x5
22,774,617 UART: [art] Derive Key Pair - Done
22,787,779 UART: [art] Signing Cert with AUTHO
22,789,094 UART: RITY.KEYID = 7
24,494,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,193 UART: [art] PUB.X = 9F2BF7723DDC1687E92D15E2828562510704D2BCBA4320A93B28D4DB8247248E117D7CCA292275F976513AAE98838BDA
24,503,501 UART: [art] PUB.Y = 8E9D12EE432903E16106F333151DC6325F63744C5D493EA0C9F8985F36F8F20A3B70E6947D34169E6969FEF8E77110B9
24,510,698 UART: [art] SIG.R = A3885DD1D5622D7F925C9B971A23DA48D54E8AA3214C756C8A96FB3AC7B2EC4CFE147E70DFB688A6A93D9B2CBF1DD269
24,518,146 UART: [art] SIG.S = 4454AA427A08A0C79160D01B9F2FEB7653887B742D365CD9A510E11383E4E2A3AF29B733735FECB830C55D8D238B0117
25,496,498 UART: Caliptra RT
25,497,215 UART: [state] CFI Enabled
25,613,249 UART: [rt] RT listening for mailbox commands...
27,671,289 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,115,171 >>> mbox cmd response: success
34,115,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,151,043 UART:
34,151,340 UART: Running Caliptra FMC ...
34,152,468 UART:
34,152,652 UART: [state] CFI Enabled
34,197,179 UART: [art] Extend RT PCRs Done
34,198,372 UART: [art] Lock RT PCRs Done
34,199,727 UART: [art] Populate DV Done
34,205,462 UART: [fht] FMC Alias Private Key: 7
34,207,009 UART: [art] Derive CDI
34,207,832 UART: [art] Store in in slot 0x4
34,250,373 UART: [art] Derive Key Pair
34,251,378 UART: [art] Store priv key in slot 0x5
36,677,227 UART: [art] Derive Key Pair - Done
36,690,392 UART: [art] Signing Cert with AUTHO
36,691,700 UART: RITY.KEYID = 7
38,397,651 UART: [art] Erasing AUTHORITY.KEYID = 7
38,399,171 UART: [art] PUB.X = 19A3A7746789E9403C1E90C0A165C2F1B54EFCCDDBD8F0EDE1B275A0B861E9976CC75E0BBC801B5C2BE712B160E38BE3
38,406,457 UART: [art] PUB.Y = 184D984D7E8087FF868185E744290920DB636B406BE885F6E98BB6A75681194C0CCFCAD7165A2D1E1479842528E5CF58
38,413,663 UART: [art] SIG.R = 6EB009C7A9CB6CA396446A77C37E9F7F403F1C420BD458B066285FBA58446D5763882A684BD2378642415DD95F979876
38,421,101 UART: [art] SIG.S = 3739DE94443C7AA76E47684A847CFE2450F120843659BC2763D29ED9A41D0134DE818964DE4064847D31FC1CC9E32466
39,399,333 UART: mbox::rt_entry...
39,400,279 UART: ____ _ _ _ ____ _____
39,402,210 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,404,215 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,406,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,408,006 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,409,867 UART: |_|
39,410,754 UART:
39,697,196 UART: [rt] Runtime listening for mailbox commands...
39,699,354 >>> mbox cmd response data (48 bytes)
39,699,920 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,700,341 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,383 UART:
192,759 UART: Running Caliptra ROM ...
193,910 UART:
194,056 UART: [state] CFI Enabled
265,497 UART: [state] LifecycleState = Unprovisioned
267,903 UART: [state] DebugLocked = No
269,650 UART: [state] WD Timer not started. Device not locked for debugging
273,410 UART: [kat] SHA2-256
463,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,105 UART: [kat] ++
474,586 UART: [kat] sha1
485,460 UART: [kat] SHA2-256
488,486 UART: [kat] SHA2-384
493,266 UART: [kat] SHA2-512-ACC
495,915 UART: [kat] ECC-384
2,950,061 UART: [kat] HMAC-384Kdf
2,972,914 UART: [kat] LMS
3,504,732 UART: [kat] --
3,511,639 UART: [cold-reset] ++
3,512,642 UART: [fht] FHT @ 0x50003400
3,524,111 UART: [idev] ++
3,524,824 UART: [idev] CDI.KEYID = 6
3,525,734 UART: [idev] SUBJECT.KEYID = 7
3,526,975 UART: [idev] UDS.KEYID = 0
3,527,901 ready_for_fw is high
3,528,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,589 UART: [idev] Erasing UDS.KEYID = 0
6,029,035 UART: [idev] Sha1 KeyId Algorithm
6,051,630 UART: [idev] --
6,056,474 UART: [ldev] ++
6,057,161 UART: [ldev] CDI.KEYID = 6
6,058,071 UART: [ldev] SUBJECT.KEYID = 5
6,059,233 UART: [ldev] AUTHORITY.KEYID = 7
6,060,461 UART: [ldev] FE.KEYID = 1
6,100,434 UART: [ldev] Erasing FE.KEYID = 1
8,607,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,807 UART: [ldev] --
10,415,094 UART: [fwproc] Wait for Commands...
10,418,168 UART: [fwproc] Recv command 0x46574c44
10,420,475 UART: [fwproc] Recv'd Img size: 114084 bytes
13,861,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,400 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,592,452 >>> mbox cmd response: success
14,596,578 UART: [afmc] ++
14,597,288 UART: [afmc] CDI.KEYID = 6
14,598,357 UART: [afmc] SUBJECT.KEYID = 7
14,599,860 UART: [afmc] AUTHORITY.KEYID = 5
17,127,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,670 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,783 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,599 UART: [afmc] --
18,927,907 UART: [cold-reset] --
18,932,076 UART: [state] Locking Datavault
18,936,536 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,691 UART: [state] Locking ICCM
18,940,959 UART: [exit] Launching FMC @ 0x40000130
18,949,594 UART:
18,949,828 UART: Running Caliptra FMC ...
18,950,926 UART:
18,951,080 UART: [state] CFI Enabled
19,011,288 UART: [fht] FMC Alias Private Key: 7
20,775,199 UART: [art] Extend RT PCRs Done
20,776,425 UART: [art] Lock RT PCRs Done
20,778,240 UART: [art] Populate DV Done
20,783,485 UART: [fht] FMC Alias Private Key: 7
20,785,017 UART: [art] Derive CDI
20,785,750 UART: [art] Store in in slot 0x4
20,843,328 UART: [art] Derive Key Pair
20,844,381 UART: [art] Store priv key in slot 0x5
23,307,965 UART: [art] Derive Key Pair - Done
23,320,681 UART: [art] Signing Cert with AUTHO
23,322,017 UART: RITY.KEYID = 7
25,032,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,191 UART: [art] PUB.X = EDE18177BFBC2AACC2F44B8A6A78CA72AAC5C43BC82023E573A9AD550C6D303BD91FB59311798761051A02DE11621205
25,041,456 UART: [art] PUB.Y = D46711DFA52759BFDB143E3DF2573773B4E271C4F0F57E829EB879A70BAE775A2C385AACDEF9EAB910FA7384426F48C0
25,048,760 UART: [art] SIG.R = 9842299A8867274AFC584D8810ABD357C28A2C0CC0AC7B6F3924B155FD37B5654E8A0A1F5FC7EC39D6ADBD7B96D9C0AB
25,056,145 UART: [art] SIG.S = C2D2ABBB401B909CC17EB1CE68E5297EDFE12F21ECB4919CB85979AFC6871F62D4844492145CECAEDE0C5472E26EA260
26,034,901 UART: Caliptra RT
26,035,613 UART: [state] CFI Enabled
26,200,778 UART: [rt] RT listening for mailbox commands...
28,251,004 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,351,797 UART:
28,352,160 UART: Running Caliptra ROM ...
28,353,286 UART:
28,353,451 UART: [state] CFI Enabled
28,420,123 UART: [state] LifecycleState = Unprovisioned
28,422,186 UART: [state] DebugLocked = No
28,424,979 UART: [state] WD Timer not started. Device not locked for debugging
28,429,746 UART: [kat] SHA2-256
28,619,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,630,373 UART: [kat] ++
28,630,862 UART: [kat] sha1
28,642,673 UART: [kat] SHA2-256
28,645,658 UART: [kat] SHA2-384
28,650,790 UART: [kat] SHA2-512-ACC
28,653,367 UART: [kat] ECC-384
31,106,053 UART: [kat] HMAC-384Kdf
31,129,906 UART: [kat] LMS
31,661,469 UART: [kat] --
31,666,323 UART: [update-reset] ++
34,687,846 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,691,562 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,083,824 >>> mbox cmd response: success
35,084,237 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,085,717 UART: [update-reset] Copying MAN_2 To MAN_1
35,123,309 UART: [update-reset Success] --
35,128,604 UART: [state] Locking Datavault
35,132,122 UART: [state] Locking PCR0, PCR1 and PCR31
35,134,287 UART: [state] Locking ICCM
35,136,935 UART: [exit] Launching FMC @ 0x40000130
35,145,619 UART:
35,145,856 UART: Running Caliptra FMC ...
35,146,975 UART:
35,147,132 UART: [state] CFI Enabled
35,238,823 UART: [art] Extend RT PCRs Done
35,240,007 UART: [art] Lock RT PCRs Done
35,241,248 UART: [art] Populate DV Done
35,246,651 UART: [fht] FMC Alias Private Key: 7
35,248,248 UART: [art] Derive CDI
35,249,061 UART: [art] Store in in slot 0x4
35,307,696 UART: [art] Derive Key Pair
35,308,691 UART: [art] Store priv key in slot 0x5
37,772,006 UART: [art] Derive Key Pair - Done
37,785,494 UART: [art] Signing Cert with AUTHO
37,786,800 UART: RITY.KEYID = 7
39,497,567 UART: [art] Erasing AUTHORITY.KEYID = 7
39,499,075 UART: [art] PUB.X = E22F9ECF2E3308F11CCDC2884869684630ACC7DA5561088BF215BED5BC5D3D90EFA7E8354434DD0A5CBDAF9D2DA79ACD
39,506,344 UART: [art] PUB.Y = 722E561BA02BE8D32F8338C94D1D9318A683D03CDB71A4AB3D96CB5BD64DAD27B1539E1BAE4CDA8338B4467E01E0FA4C
39,513,610 UART: [art] SIG.R = BF912DD41A5E588D6F8596D364FE7850EEBB5E2C834264DBCB07F83B92E04759E67D742537F3443975907AF80073C727
39,520,971 UART: [art] SIG.S = 11B9128A8B107C009A86AA422F0F87AF4F6356F3AD40EF0B946C3C5247A8B26C50C4B014081D413E5509DABD6D3236CE
40,499,123 UART: mbox::rt_entry...
40,500,104 UART: ____ _ _ _ ____ _____
40,502,093 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,504,097 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,506,024 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,507,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,509,894 UART: |_|
40,510,705 UART:
40,795,782 UART: [rt] Runtime listening for mailbox commands...
40,797,957 >>> mbox cmd response data (48 bytes)
40,798,536 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,798,962 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,437,785 ready_for_fw is high
3,438,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,730,480 >>> mbox cmd response: success
19,047,858 UART:
19,048,254 UART: Running Caliptra FMC ...
19,049,368 UART:
19,049,520 UART: [state] CFI Enabled
19,111,775 UART: [fht] FMC Alias Private Key: 7
20,875,404 UART: [art] Extend RT PCRs Done
20,876,629 UART: [art] Lock RT PCRs Done
20,878,390 UART: [art] Populate DV Done
20,883,753 UART: [fht] FMC Alias Private Key: 7
20,885,342 UART: [art] Derive CDI
20,886,076 UART: [art] Store in in slot 0x4
20,943,980 UART: [art] Derive Key Pair
20,944,974 UART: [art] Store priv key in slot 0x5
23,407,667 UART: [art] Derive Key Pair - Done
23,420,503 UART: [art] Signing Cert with AUTHO
23,421,813 UART: RITY.KEYID = 7
25,133,289 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,790 UART: [art] PUB.X = EA55305F8107DEDD2D110ED6DC0FFC237345FBA59338FCE0105316DE0F60DCCE4152FB1D3AD32C984F1968C8EAB6D7A0
25,142,062 UART: [art] PUB.Y = CE2B580FAA8805A5649A7B26552ECBF044FA593521C25CD09A90CD7AB93FABDC6853654EBA0D62BEFA478B7E1B5C94B9
25,149,341 UART: [art] SIG.R = E10F0F2ADFC177AA130858DD4EF325D2F5073CC3A9928A138DA7E97B28FE11D78F5B3BA7A7A964519149181BD98DDB45
25,156,741 UART: [art] SIG.S = 4FD5DE72A94EF771B76534DBE1983A7C1419FD259BCB462580A3226737D3D2F8C44F096E2F8F6D82A96A624199A655EB
26,136,096 UART: Caliptra RT
26,136,810 UART: [state] CFI Enabled
26,301,723 UART: [rt] RT listening for mailbox commands...
28,350,697 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,360,186 >>> mbox cmd response: success
35,360,679 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,393,487 UART:
35,393,781 UART: Running Caliptra FMC ...
35,394,899 UART:
35,395,056 UART: [state] CFI Enabled
35,486,778 UART: [art] Extend RT PCRs Done
35,487,989 UART: [art] Lock RT PCRs Done
35,489,366 UART: [art] Populate DV Done
35,494,606 UART: [fht] FMC Alias Private Key: 7
35,496,146 UART: [art] Derive CDI
35,496,911 UART: [art] Store in in slot 0x4
35,556,151 UART: [art] Derive Key Pair
35,557,186 UART: [art] Store priv key in slot 0x5
38,019,813 UART: [art] Derive Key Pair - Done
38,032,814 UART: [art] Signing Cert with AUTHO
38,034,115 UART: RITY.KEYID = 7
39,745,366 UART: [art] Erasing AUTHORITY.KEYID = 7
39,746,864 UART: [art] PUB.X = E5CB025590AAA38B2AC6A4771327A946BE09F1DFA7756C7635ABEFDF19091FE581E08C59D67972676AE7DFEBB155F6F3
39,754,172 UART: [art] PUB.Y = B04FEE59C3E0BCFB1DD30281CFCB76FA86FC6E326B82EAB45D234A82D9F9AC9AFEFF1165C14D2D6A26C34C2C8CF32094
39,761,425 UART: [art] SIG.R = C8FA629934B443BF7AF1C204E94210540D0F383A9FAF31C15A25ADE6D5640951880738547473CAF2A041A7B6ABD0BC13
39,768,804 UART: [art] SIG.S = 48C984D11DE4DE87A1C2BC17ED6E2FED5B6740E775006893E001674C6A9B0C40F0CC25C78BBB4B4506030262016BE933
40,747,796 UART: mbox::rt_entry...
40,748,784 UART: ____ _ _ _ ____ _____
40,750,765 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,752,761 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,754,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,756,634 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,758,557 UART: |_|
40,759,361 UART:
41,040,578 UART: [rt] Runtime listening for mailbox commands...
41,042,705 >>> mbox cmd response data (48 bytes)
41,043,277 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,043,705 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
192,855 UART:
193,243 UART: Running Caliptra ROM ...
194,447 UART:
603,979 UART: [state] CFI Enabled
615,373 UART: [state] LifecycleState = Unprovisioned
617,727 UART: [state] DebugLocked = No
620,451 UART: [state] WD Timer not started. Device not locked for debugging
625,847 UART: [kat] SHA2-256
815,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,530 UART: [kat] ++
826,978 UART: [kat] sha1
839,271 UART: [kat] SHA2-256
842,277 UART: [kat] SHA2-384
848,764 UART: [kat] SHA2-512-ACC
851,353 UART: [kat] ECC-384
3,293,857 UART: [kat] HMAC-384Kdf
3,307,221 UART: [kat] LMS
3,839,047 UART: [kat] --
3,844,703 UART: [cold-reset] ++
3,846,719 UART: [fht] FHT @ 0x50003400
3,858,365 UART: [idev] ++
3,859,045 UART: [idev] CDI.KEYID = 6
3,860,089 UART: [idev] SUBJECT.KEYID = 7
3,861,221 UART: [idev] UDS.KEYID = 0
3,862,149 ready_for_fw is high
3,862,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,474 UART: [idev] Erasing UDS.KEYID = 0
6,342,989 UART: [idev] Sha1 KeyId Algorithm
6,365,346 UART: [idev] --
6,369,394 UART: [ldev] ++
6,370,074 UART: [ldev] CDI.KEYID = 6
6,370,984 UART: [ldev] SUBJECT.KEYID = 5
6,372,197 UART: [ldev] AUTHORITY.KEYID = 7
6,373,376 UART: [ldev] FE.KEYID = 1
6,383,210 UART: [ldev] Erasing FE.KEYID = 1
8,864,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,643 UART: [ldev] --
10,653,627 UART: [fwproc] Wait for Commands...
10,655,116 UART: [fwproc] Recv command 0x46574c44
10,657,112 UART: [fwproc] Recv'd Img size: 114084 bytes
14,098,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,833,922 >>> mbox cmd response: success
14,837,578 UART: [afmc] ++
14,838,300 UART: [afmc] CDI.KEYID = 6
14,839,504 UART: [afmc] SUBJECT.KEYID = 7
14,840,953 UART: [afmc] AUTHORITY.KEYID = 5
17,341,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,527 UART: [afmc] --
19,134,345 UART: [cold-reset] --
19,139,136 UART: [state] Locking Datavault
19,144,504 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,658 UART: [state] Locking ICCM
19,149,519 UART: [exit] Launching FMC @ 0x40000130
19,158,203 UART:
19,158,447 UART: Running Caliptra FMC ...
19,159,550 UART:
19,159,708 UART: [state] CFI Enabled
19,167,597 UART: [fht] FMC Alias Private Key: 7
20,924,886 UART: [art] Extend RT PCRs Done
20,926,096 UART: [art] Lock RT PCRs Done
20,927,772 UART: [art] Populate DV Done
20,933,078 UART: [fht] FMC Alias Private Key: 7
20,934,619 UART: [art] Derive CDI
20,935,352 UART: [art] Store in in slot 0x4
20,977,891 UART: [art] Derive Key Pair
20,978,954 UART: [art] Store priv key in slot 0x5
23,405,490 UART: [art] Derive Key Pair - Done
23,418,816 UART: [art] Signing Cert with AUTHO
23,420,132 UART: RITY.KEYID = 7
25,125,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,481 UART: [art] PUB.X = C9409C7303A13A4E3CE2784952157C1C27E0D02463AE1DC9C8CE17B46897A1B352606C79F09D0442337793E592BE4A7F
25,134,806 UART: [art] PUB.Y = 6C721A3F6AB1A554A08ABF766765D3FFBC99E9F801A66BAF1AC5F83902E69905D0B654E97878BD071817FC070BBC9936
25,142,034 UART: [art] SIG.R = 597F6C0FB460EE387F9696C77BAED1CC14C24BBBB74139F938AA8CE3CFA2494C2EDE114DECC6E9F8E24968FD492EF9A2
25,149,460 UART: [art] SIG.S = 77343D160F701F05458CA37E46D9B8A295D256F30765A697A9AF8202FF3A69F75C66973DF581F14846C86F14B2273DFF
26,128,303 UART: Caliptra RT
26,128,991 UART: [state] CFI Enabled
26,246,828 UART: [rt] RT listening for mailbox commands...
28,298,388 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,398,638 UART:
28,399,017 UART: Running Caliptra ROM ...
28,400,156 UART:
28,400,331 UART: [state] CFI Enabled
28,412,614 UART: [state] LifecycleState = Unprovisioned
28,414,552 UART: [state] DebugLocked = No
28,416,426 UART: [state] WD Timer not started. Device not locked for debugging
28,420,152 UART: [kat] SHA2-256
28,610,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,620,792 UART: [kat] ++
28,621,324 UART: [kat] sha1
28,632,912 UART: [kat] SHA2-256
28,635,934 UART: [kat] SHA2-384
28,642,150 UART: [kat] SHA2-512-ACC
28,644,719 UART: [kat] ECC-384
31,086,909 UART: [kat] HMAC-384Kdf
31,099,311 UART: [kat] LMS
31,630,894 UART: [kat] --
31,635,873 UART: [update-reset] ++
34,642,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,645,119 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,037,394 >>> mbox cmd response: success
35,037,765 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,038,596 UART: [update-reset] Copying MAN_2 To MAN_1
35,076,125 UART: [update-reset Success] --
35,079,114 UART: [state] Locking Datavault
35,082,680 UART: [state] Locking PCR0, PCR1 and PCR31
35,084,895 UART: [state] Locking ICCM
35,086,622 UART: [exit] Launching FMC @ 0x40000130
35,095,253 UART:
35,095,494 UART: Running Caliptra FMC ...
35,096,603 UART:
35,096,764 UART: [state] CFI Enabled
35,141,807 UART: [art] Extend RT PCRs Done
35,142,989 UART: [art] Lock RT PCRs Done
35,144,226 UART: [art] Populate DV Done
35,149,584 UART: [fht] FMC Alias Private Key: 7
35,151,280 UART: [art] Derive CDI
35,152,101 UART: [art] Store in in slot 0x4
35,194,593 UART: [art] Derive Key Pair
35,195,595 UART: [art] Store priv key in slot 0x5
37,622,077 UART: [art] Derive Key Pair - Done
37,635,189 UART: [art] Signing Cert with AUTHO
37,636,508 UART: RITY.KEYID = 7
39,341,832 UART: [art] Erasing AUTHORITY.KEYID = 7
39,343,317 UART: [art] PUB.X = 04B3D04329C9AABB945488FD3D02BA5812EC609F52054A5275BEFF74621E78841A64A38E7ED56813E8CA6F61731AEF47
39,350,584 UART: [art] PUB.Y = 149624B398AAE2B556C4AA585983A8EF2A1153FA288B99EBCAA53349686664CBDD01DE0B4FD2A50B806C01040EE37360
39,357,846 UART: [art] SIG.R = 93DD9DE17B66C0C884EBBA5153260B004E9D53046529EF4CE816D1DE658F634251727954682898CA0F8585BDA2A45065
39,365,211 UART: [art] SIG.S = CD3A62583FF8140BC8A277625A7651210876348EDE8D55C0ACD6F3BB303508F9230C678F46570E7E44DBCF02A9927E4D
40,343,937 UART: mbox::rt_entry...
40,344,904 UART: ____ _ _ _ ____ _____
40,346,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,348,907 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,350,840 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,352,773 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,354,704 UART: |_|
40,355,540 UART:
40,636,735 UART: [rt] Runtime listening for mailbox commands...
40,638,926 >>> mbox cmd response data (48 bytes)
40,639,512 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,639,942 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,569 writing to cptra_bootfsm_go
3,755,453 ready_for_fw is high
3,756,128 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,956,857 >>> mbox cmd response: success
19,207,456 UART:
19,207,849 UART: Running Caliptra FMC ...
19,208,952 UART:
19,209,106 UART: [state] CFI Enabled
19,216,966 UART: [fht] FMC Alias Private Key: 7
20,973,559 UART: [art] Extend RT PCRs Done
20,974,785 UART: [art] Lock RT PCRs Done
20,976,442 UART: [art] Populate DV Done
20,981,817 UART: [fht] FMC Alias Private Key: 7
20,983,373 UART: [art] Derive CDI
20,984,194 UART: [art] Store in in slot 0x4
21,026,584 UART: [art] Derive Key Pair
21,027,604 UART: [art] Store priv key in slot 0x5
23,454,204 UART: [art] Derive Key Pair - Done
23,467,164 UART: [art] Signing Cert with AUTHO
23,468,480 UART: RITY.KEYID = 7
25,174,025 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,548 UART: [art] PUB.X = 3C458C134021FF00EB29787019FAB009D40CB8A4C9BE0B4EAF222D2E5F382A4E1CF1B8D76AED131809CA44D3D1A50858
25,182,808 UART: [art] PUB.Y = 80215945F8B434DE47D09FF8C792722CC77563AFB3F9111365D7ABEAB99469696AB5B66B0111850FBCA7940EEB996D39
25,190,042 UART: [art] SIG.R = BFBF17BB4256A0E61D083046D42683D01586F5724FD88C7313077986F2764F041BA55B924892D2F249BBE13FE8A94AFF
25,197,454 UART: [art] SIG.S = BF2908E4C0BF5D1AEF51C2EAE9D2086E8C5E6B296A57F95CCC5EDC19E480B2EA4A10A4EB674C439A400937B2E0D7E5AB
26,176,728 UART: Caliptra RT
26,177,441 UART: [state] CFI Enabled
26,294,249 UART: [rt] RT listening for mailbox commands...
28,344,905 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,260,165 >>> mbox cmd response: success
35,260,868 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,295,867 UART:
35,296,199 UART: Running Caliptra FMC ...
35,297,333 UART:
35,297,494 UART: [state] CFI Enabled
35,341,412 UART: [art] Extend RT PCRs Done
35,342,587 UART: [art] Lock RT PCRs Done
35,344,155 UART: [art] Populate DV Done
35,349,712 UART: [fht] FMC Alias Private Key: 7
35,351,366 UART: [art] Derive CDI
35,352,189 UART: [art] Store in in slot 0x4
35,394,479 UART: [art] Derive Key Pair
35,395,523 UART: [art] Store priv key in slot 0x5
37,822,244 UART: [art] Derive Key Pair - Done
37,835,197 UART: [art] Signing Cert with AUTHO
37,836,515 UART: RITY.KEYID = 7
39,541,732 UART: [art] Erasing AUTHORITY.KEYID = 7
39,543,242 UART: [art] PUB.X = 0478C8B51ACCB0684786DEF0A894907CFD69430C64372DC369049B8486EC7800105E63E46D714435F156944E5D9836BA
39,550,489 UART: [art] PUB.Y = 24674E104CF39DCFAED50D2D07E7E3FFC9868CDA4BC1657B4BF06B88CD7AF6D27FA1E4EE0674C9BEA56D7A073929DA64
39,557,768 UART: [art] SIG.R = F76BFCAD7CB330732D74B318399265F647A254CD613CA39DFAB6E2371E234BA498EC3C49CF50061E12D50F4FD54BB8BB
39,565,166 UART: [art] SIG.S = 5700F69F862708E63A990F9CCDA7C4CCB98FEA4EB428499618C55FEDE9FDA053C22C720019A53101415B00131F2472D2
40,543,564 UART: mbox::rt_entry...
40,544,543 UART: ____ _ _ _ ____ _____
40,546,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,548,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,550,492 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,552,431 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,554,286 UART: |_|
40,555,173 UART:
40,838,572 UART: [rt] Runtime listening for mailbox commands...
40,840,727 >>> mbox cmd response data (48 bytes)
40,841,328 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,841,764 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,925 UART: [kat] SHA2-256
881,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,971 UART: [kat] ++
886,123 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,940 UART: [kat] LMS
1,475,136 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,474 UART: [idev] ++
1,479,642 UART: [idev] CDI.KEYID = 6
1,480,002 UART: [idev] SUBJECT.KEYID = 7
1,480,426 UART: [idev] UDS.KEYID = 0
1,480,771 ready_for_fw is high
1,480,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,876 UART: [idev] Erasing UDS.KEYID = 0
1,505,366 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,876 UART: [idev] --
1,514,793 UART: [ldev] ++
1,514,961 UART: [ldev] CDI.KEYID = 6
1,515,324 UART: [ldev] SUBJECT.KEYID = 5
1,515,750 UART: [ldev] AUTHORITY.KEYID = 7
1,516,213 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,042 UART: [ldev] --
1,585,535 UART: [fwproc] Waiting for Commands...
1,586,262 UART: [fwproc] Received command 0x46574c44
1,587,053 UART: [fwproc] Received Image of size 114084 bytes
2,882,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,560 >>> mbox cmd response: success
3,075,656 UART: [afmc] ++
3,075,824 UART: [afmc] CDI.KEYID = 6
3,076,186 UART: [afmc] SUBJECT.KEYID = 7
3,076,611 UART: [afmc] AUTHORITY.KEYID = 5
3,112,026 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,337 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,027 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,852 UART: [afmc] --
3,154,896 UART: [cold-reset] --
3,155,670 UART: [state] Locking Datavault
3,156,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,433 UART: [state] Locking ICCM
3,157,889 UART: [exit] Launching FMC @ 0x40000130
3,163,218 UART:
3,163,234 UART: Running Caliptra FMC ...
3,163,642 UART:
3,163,696 UART: [state] CFI Enabled
3,174,401 UART: [fht] FMC Alias Private Key: 7
3,282,238 UART: [art] Extend RT PCRs Done
3,282,666 UART: [art] Lock RT PCRs Done
3,283,974 UART: [art] Populate DV Done
3,292,087 UART: [fht] FMC Alias Private Key: 7
3,293,263 UART: [art] Derive CDI
3,293,543 UART: [art] Store in in slot 0x4
3,379,446 UART: [art] Derive Key Pair
3,379,806 UART: [art] Store priv key in slot 0x5
3,392,436 UART: [art] Derive Key Pair - Done
3,407,382 UART: [art] Signing Cert with AUTHO
3,407,862 UART: RITY.KEYID = 7
3,423,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,159 UART: [art] PUB.X = BF40076550106D21FE34EAE25FF225DBF70A4E5F41B958E31B2D4D2CD3A402996FF8468CBE966A1A371CDC3F6A39AF90
3,430,934 UART: [art] PUB.Y = 443B91FAC1B50892898960A51474236F6DDE94A35A6C50628A55F17663DD499DC0255ACB833613675FDA347AC7006EB4
3,437,855 UART: [art] SIG.R = C40AEEB9D54CF504A448B818DFEEF8C7EF3C50AF9E6246C15E507028B6D7E36593FCF808F6E6D93A841B27EABA17CB65
3,444,636 UART: [art] SIG.S = 5F42743ACC9DC5175D52EBFA27CE5921F7629C05C2574EDD116A87C773C1D67EAFB2CA0DA34BF9D222E727BD89CD3ACC
3,468,305 UART: Caliptra RT
3,468,558 UART: [state] CFI Enabled
3,575,559 UART: [rt] RT listening for mailbox commands...
3,576,229 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,576 UART:
3,577,592 UART: Running Caliptra ROM ...
3,578,000 UART:
3,578,054 UART: [state] CFI Enabled
3,580,732 UART: [state] LifecycleState = Unprovisioned
3,581,387 UART: [state] DebugLocked = No
3,582,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,583,800 UART: [kat] SHA2-256
4,377,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,381,846 UART: [kat] ++
4,381,998 UART: [kat] sha1
4,386,246 UART: [kat] SHA2-256
4,388,184 UART: [kat] SHA2-384
4,390,951 UART: [kat] SHA2-512-ACC
4,392,851 UART: [kat] ECC-384
4,398,594 UART: [kat] HMAC-384Kdf
4,403,084 UART: [kat] LMS
4,971,280 UART: [kat] --
4,972,071 UART: [update-reset] ++
5,896,799 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,897,995 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
5,994,057 >>> mbox cmd response: success
5,994,057 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,994,270 UART: [update-reset] Copying MAN_2 To MAN_1
6,002,284 UART: [update-reset Success] --
6,003,149 UART: [state] Locking Datavault
6,004,055 UART: [state] Locking PCR0, PCR1 and PCR31
6,004,659 UART: [state] Locking ICCM
6,005,287 UART: [exit] Launching FMC @ 0x40000130
6,010,616 UART:
6,010,632 UART: Running Caliptra FMC ...
6,011,040 UART:
6,011,094 UART: [state] CFI Enabled
6,100,297 UART: [art] Extend RT PCRs Done
6,100,725 UART: [art] Lock RT PCRs Done
6,102,226 UART: [art] Populate DV Done
6,110,499 UART: [fht] FMC Alias Private Key: 7
6,111,659 UART: [art] Derive CDI
6,111,939 UART: [art] Store in in slot 0x4
6,197,170 UART: [art] Derive Key Pair
6,197,530 UART: [art] Store priv key in slot 0x5
6,210,344 UART: [art] Derive Key Pair - Done
6,224,962 UART: [art] Signing Cert with AUTHO
6,225,442 UART: RITY.KEYID = 7
6,240,532 UART: [art] Erasing AUTHORITY.KEYID = 7
6,241,297 UART: [art] PUB.X = AC7D8CB52AB0D8DD55FF824108E65E98D3E05C87F2D035394871726152746A2F72788B0944CE4781563535C2284ECD7C
6,248,057 UART: [art] PUB.Y = C2274FD0C3ED8411F995E43690051F9E3CFD80427BCCDC2ACEF6C8C6F572CE444413050F8973699780532DEB6E091A03
6,254,996 UART: [art] SIG.R = 483D25C44E1D46723B3A1602252C87ED8D72AF93F58A7E5C3F56D422B9E5F2165ED2C584F79B13F4F9C8D459A3C548FC
6,261,769 UART: [art] SIG.S = 86416390CA9D27287118C177799FB90B38B46491AD2F9E47357D189766D920B5F05BA5A127898B588D6201A37C50289C
6,285,248 UART: mbox::rt_entry...
6,285,620 UART: ____ _ _ _ ____ _____
6,286,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,287,204 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,287,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,288,740 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,289,508 UART: |_|
6,289,820 UART:
6,573,286 UART: [rt] Runtime listening for mailbox commands...
6,574,476 >>> mbox cmd response data (48 bytes)
6,574,477 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,574,585 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 ready_for_fw is high
1,362,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,266 >>> mbox cmd response: success
2,984,424 UART:
2,984,440 UART: Running Caliptra FMC ...
2,984,848 UART:
2,984,902 UART: [state] CFI Enabled
2,995,195 UART: [fht] FMC Alias Private Key: 7
3,102,986 UART: [art] Extend RT PCRs Done
3,103,414 UART: [art] Lock RT PCRs Done
3,105,150 UART: [art] Populate DV Done
3,113,485 UART: [fht] FMC Alias Private Key: 7
3,114,519 UART: [art] Derive CDI
3,114,799 UART: [art] Store in in slot 0x4
3,200,530 UART: [art] Derive Key Pair
3,200,890 UART: [art] Store priv key in slot 0x5
3,214,010 UART: [art] Derive Key Pair - Done
3,228,889 UART: [art] Signing Cert with AUTHO
3,229,369 UART: RITY.KEYID = 7
3,244,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,168 UART: [art] PUB.X = E14BB917391A8D48E36027A0AAE099B04B7E1D46F053864E9F3DEEAE9F4B68B23664DC69439A4FEF8677749FFA416360
3,251,944 UART: [art] PUB.Y = C5DF819071F3AA0265D019FA8838B77829EDE827AAF585BDBF69EE12C6C408F9C01E3F8930FC3EDE8837B586315DD8C0
3,258,900 UART: [art] SIG.R = 029674A32CFE5450AA379B2E00FF5D050F1329113C63E4940F9EDD69FF29327AD9782AA8D935A401E964FCECC4188890
3,265,635 UART: [art] SIG.S = 5A0B1E1E9C5FA306FEC1978EE9ADD61B95E0A462B0075A19EDA11BA28D6F813E7CCD062FA9B9FC30DD26B069CB43D19A
3,289,980 UART: Caliptra RT
3,290,233 UART: [state] CFI Enabled
3,398,859 UART: [rt] RT listening for mailbox commands...
3,399,529 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,696,037 >>> mbox cmd response: success
5,696,037 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,709,482 UART:
5,709,498 UART: Running Caliptra FMC ...
5,709,906 UART:
5,709,960 UART: [state] CFI Enabled
5,799,091 UART: [art] Extend RT PCRs Done
5,799,519 UART: [art] Lock RT PCRs Done
5,800,812 UART: [art] Populate DV Done
5,808,837 UART: [fht] FMC Alias Private Key: 7
5,809,949 UART: [art] Derive CDI
5,810,229 UART: [art] Store in in slot 0x4
5,895,840 UART: [art] Derive Key Pair
5,896,200 UART: [art] Store priv key in slot 0x5
5,909,836 UART: [art] Derive Key Pair - Done
5,924,989 UART: [art] Signing Cert with AUTHO
5,925,469 UART: RITY.KEYID = 7
5,940,701 UART: [art] Erasing AUTHORITY.KEYID = 7
5,941,466 UART: [art] PUB.X = 3ADD9CD44C1BAFDB5DD27E1ECA8A7B4E8581280A4628EB18BBBEB88C2396A81F890F7A057CBF2FB782ABA313CF6F9D10
5,948,255 UART: [art] PUB.Y = 6F832D1A0762CFB143444E78333F82356CA5750E7C4AEE9BDF90C1B47DB0B1416D52476CDAD292C97C6BC91D536868B3
5,955,205 UART: [art] SIG.R = 3C93A6DF02FB2A04B1A22EE5C5113CD7E88EF9506FA20341CD04EF960FB6B41D8506C5ADF72A3D5B7FAE2FE9F9434CAB
5,961,981 UART: [art] SIG.S = 0A316D5CA47B449A75DC5D6AFD8EF96641A96B6F44EF5BBE9C5C36A6252C18EACE250EABCC1EDEF198B561882D6C4F42
5,985,650 UART: mbox::rt_entry...
5,986,022 UART: ____ _ _ _ ____ _____
5,986,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,987,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,988,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,989,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,989,910 UART: |_|
5,990,222 UART:
6,267,745 UART: [rt] Runtime listening for mailbox commands...
6,268,935 >>> mbox cmd response data (48 bytes)
6,268,936 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,269,044 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,136 UART: [kat] SHA2-256
882,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,182 UART: [kat] ++
886,334 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
903,469 UART: [kat] HMAC-384Kdf
907,997 UART: [kat] LMS
1,476,193 UART: [kat] --
1,476,940 UART: [cold-reset] ++
1,477,378 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 ready_for_fw is high
1,481,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,905 UART: [idev] Erasing UDS.KEYID = 0
1,505,709 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,522,050 UART: [ldev] Erasing FE.KEYID = 1
1,547,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,587,166 UART: [fwproc] Waiting for Commands...
1,587,981 UART: [fwproc] Received command 0x46574c44
1,588,772 UART: [fwproc] Received Image of size 114084 bytes
2,883,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,580 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,391 >>> mbox cmd response: success
3,077,643 UART: [afmc] ++
3,077,811 UART: [afmc] CDI.KEYID = 6
3,078,173 UART: [afmc] SUBJECT.KEYID = 7
3,078,598 UART: [afmc] AUTHORITY.KEYID = 5
3,114,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,896 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,586 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,339 UART: [afmc] --
3,157,339 UART: [cold-reset] --
3,158,245 UART: [state] Locking Datavault
3,159,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,080 UART: [state] Locking ICCM
3,160,680 UART: [exit] Launching FMC @ 0x40000130
3,166,009 UART:
3,166,025 UART: Running Caliptra FMC ...
3,166,433 UART:
3,166,576 UART: [state] CFI Enabled
3,177,139 UART: [fht] FMC Alias Private Key: 7
3,284,398 UART: [art] Extend RT PCRs Done
3,284,826 UART: [art] Lock RT PCRs Done
3,286,370 UART: [art] Populate DV Done
3,294,581 UART: [fht] FMC Alias Private Key: 7
3,295,693 UART: [art] Derive CDI
3,295,973 UART: [art] Store in in slot 0x4
3,382,010 UART: [art] Derive Key Pair
3,382,370 UART: [art] Store priv key in slot 0x5
3,395,796 UART: [art] Derive Key Pair - Done
3,410,505 UART: [art] Signing Cert with AUTHO
3,410,985 UART: RITY.KEYID = 7
3,426,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,008 UART: [art] PUB.X = 2AE78FDE833A03C73FF18756CE6701DF1A17F12C84320946EDEBD67A2A0A342C1B7FBE5DF9E2DA82919CBFEFF55467CD
3,433,788 UART: [art] PUB.Y = 6FF04DA1090333394D0F7A0770F9A04046EF41B79958DA56BDEC3AAF638EF3F44DA9E8AAAF7A2E39B4E21FEBF4FD21D9
3,440,748 UART: [art] SIG.R = 11813DF35C42F4A147FA4246C5C6BC6AA29DA9FCA5A1C9919F501BE9490C2C05D3CC07312945D1864DFA09EEB8773323
3,447,514 UART: [art] SIG.S = B2B7656C446BE9F47B59E8CE53FA8E90B91B843871E722BD695963042B2A16A4F93DDA26558572632C50C1792F0C56EF
3,472,007 UART: Caliptra RT
3,472,352 UART: [state] CFI Enabled
3,580,923 UART: [rt] RT listening for mailbox commands...
3,581,593 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,942 UART:
3,582,958 UART: Running Caliptra ROM ...
3,583,366 UART:
3,583,507 UART: [state] CFI Enabled
3,586,591 UART: [state] LifecycleState = Unprovisioned
3,587,246 UART: [state] DebugLocked = No
3,587,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,589,551 UART: [kat] SHA2-256
4,383,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,387,597 UART: [kat] ++
4,387,749 UART: [kat] sha1
4,391,959 UART: [kat] SHA2-256
4,393,897 UART: [kat] SHA2-384
4,396,668 UART: [kat] SHA2-512-ACC
4,398,568 UART: [kat] ECC-384
4,404,185 UART: [kat] HMAC-384Kdf
4,408,759 UART: [kat] LMS
4,976,955 UART: [kat] --
4,977,782 UART: [update-reset] ++
5,901,488 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,902,738 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
5,998,800 >>> mbox cmd response: success
5,998,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,998,977 UART: [update-reset] Copying MAN_2 To MAN_1
6,006,991 UART: [update-reset Success] --
6,008,182 UART: [state] Locking Datavault
6,008,888 UART: [state] Locking PCR0, PCR1 and PCR31
6,009,492 UART: [state] Locking ICCM
6,009,982 UART: [exit] Launching FMC @ 0x40000130
6,015,311 UART:
6,015,327 UART: Running Caliptra FMC ...
6,015,735 UART:
6,015,878 UART: [state] CFI Enabled
6,105,445 UART: [art] Extend RT PCRs Done
6,105,873 UART: [art] Lock RT PCRs Done
6,107,226 UART: [art] Populate DV Done
6,115,565 UART: [fht] FMC Alias Private Key: 7
6,116,561 UART: [art] Derive CDI
6,116,841 UART: [art] Store in in slot 0x4
6,202,982 UART: [art] Derive Key Pair
6,203,342 UART: [art] Store priv key in slot 0x5
6,216,366 UART: [art] Derive Key Pair - Done
6,230,818 UART: [art] Signing Cert with AUTHO
6,231,298 UART: RITY.KEYID = 7
6,246,632 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,397 UART: [art] PUB.X = 8E4DE8D0EE66D80F2B21F486E6B808ABC27F2270C7C7EB9401EEF71A6BD217DAF94CEE970D3FE52D08F68BC5A4BC39ED
6,254,178 UART: [art] PUB.Y = 933E336A4FB9646A088F08B3F1DF0970AC06FB39514C5ECC6C65BB8E18A04AFD67DD2F6BA4D661F9D8885C383443054F
6,261,123 UART: [art] SIG.R = 36D130E3D5A2CB962DE8777C9917713CAEFE8DCC1C539AA3ACA5BCDDBA477D4F840E29CC0EE54B80F4133747C250661E
6,267,905 UART: [art] SIG.S = 5A8A1A64E9FCABAFB07A5F48A4E60B3FA04B0722027BF73E83FE85D96B088B92CAA4CCD1155B9104372FE5609FA40C36
6,291,654 UART: mbox::rt_entry...
6,292,026 UART: ____ _ _ _ ____ _____
6,292,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,293,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,294,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,295,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,295,914 UART: |_|
6,296,226 UART:
6,579,519 UART: [rt] Runtime listening for mailbox commands...
6,580,709 >>> mbox cmd response data (48 bytes)
6,580,710 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,580,818 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,867 >>> mbox cmd response: success
2,987,753 UART:
2,987,769 UART: Running Caliptra FMC ...
2,988,177 UART:
2,988,320 UART: [state] CFI Enabled
2,998,861 UART: [fht] FMC Alias Private Key: 7
3,106,486 UART: [art] Extend RT PCRs Done
3,106,914 UART: [art] Lock RT PCRs Done
3,108,270 UART: [art] Populate DV Done
3,116,835 UART: [fht] FMC Alias Private Key: 7
3,117,805 UART: [art] Derive CDI
3,118,085 UART: [art] Store in in slot 0x4
3,203,580 UART: [art] Derive Key Pair
3,203,940 UART: [art] Store priv key in slot 0x5
3,217,116 UART: [art] Derive Key Pair - Done
3,231,841 UART: [art] Signing Cert with AUTHO
3,232,321 UART: RITY.KEYID = 7
3,247,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,384 UART: [art] PUB.X = 344C25C504D298A7849183E2D03CA5F6434DF44D795B2F70D6B990176C8F5201DE2C7A5AA4BCC369914C6B60305AB0A7
3,255,150 UART: [art] PUB.Y = F53A8FDD5F16B5446954C0524935B0208F53DE1B3BEAC14F9328530BC51D4B5CBEDBB3848951B4B56D97EE4C93544015
3,262,103 UART: [art] SIG.R = D69D64C775352C0CEA9BCFAD571DB9C53EB247456895EDF9733A124F45E799BA6EDECB445B4663CCDD212A07A357A539
3,268,881 UART: [art] SIG.S = 01B298BC3AAAA44EE8B93BD59977DF8F55BDB5E217085BD5F7F15B98BF0D5CC981D0B26A9236A207399CB37EFC13A9B1
3,292,712 UART: Caliptra RT
3,293,057 UART: [state] CFI Enabled
3,402,240 UART: [rt] RT listening for mailbox commands...
3,402,910 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,701,499 >>> mbox cmd response: success
5,701,499 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,715,028 UART:
5,715,044 UART: Running Caliptra FMC ...
5,715,452 UART:
5,715,595 UART: [state] CFI Enabled
5,804,878 UART: [art] Extend RT PCRs Done
5,805,306 UART: [art] Lock RT PCRs Done
5,806,387 UART: [art] Populate DV Done
5,814,624 UART: [fht] FMC Alias Private Key: 7
5,815,652 UART: [art] Derive CDI
5,815,932 UART: [art] Store in in slot 0x4
5,902,023 UART: [art] Derive Key Pair
5,902,383 UART: [art] Store priv key in slot 0x5
5,915,547 UART: [art] Derive Key Pair - Done
5,930,009 UART: [art] Signing Cert with AUTHO
5,930,489 UART: RITY.KEYID = 7
5,945,533 UART: [art] Erasing AUTHORITY.KEYID = 7
5,946,298 UART: [art] PUB.X = 0C15C57EFC83427FE512E2CF9C5492F84DEE7F43F2B4CAC3719C1305E2106E5FA9D6CABDA1E311DD70168783BC77A883
5,953,076 UART: [art] PUB.Y = 5B3EE8B6EC5004681801EC760A776973046BA3283C1A34937712ECB79B50AA71C969040B4855A33E34642307A9951705
5,959,988 UART: [art] SIG.R = 6BF975CA4051B291D6D731DB73CF758606EC33224E246B74AA129A35A441D94FDA03017FA341967626B1825705572263
5,966,736 UART: [art] SIG.S = F2F31674CAD3F990AA3505CA59C04FF95489815A9697D9CFC640776467267D22032D8618E0B859866B7B638DFEE1A4AF
5,990,181 UART: mbox::rt_entry...
5,990,553 UART: ____ _ _ _ ____ _____
5,991,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,992,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,992,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,993,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,994,441 UART: |_|
5,994,753 UART:
6,277,609 UART: [rt] Runtime listening for mailbox commands...
6,278,799 >>> mbox cmd response data (48 bytes)
6,278,800 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,278,908 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,669 UART: [kat] SHA2-256
903,609 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,960 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,207 UART: [fht] FHT @ 0x50003400
1,174,802 UART: [idev] ++
1,174,970 UART: [idev] CDI.KEYID = 6
1,175,330 UART: [idev] SUBJECT.KEYID = 7
1,175,754 UART: [idev] UDS.KEYID = 0
1,176,099 ready_for_fw is high
1,176,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,287 UART: [idev] Sha1 KeyId Algorithm
1,208,711 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,130 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,332 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,830 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,589 >>> mbox cmd response: success
2,771,653 UART: [afmc] ++
2,771,821 UART: [afmc] CDI.KEYID = 6
2,772,183 UART: [afmc] SUBJECT.KEYID = 7
2,772,608 UART: [afmc] AUTHORITY.KEYID = 5
2,807,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,042 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,655 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,166 UART: [afmc] --
2,851,240 UART: [cold-reset] --
2,852,108 UART: [state] Locking Datavault
2,853,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,981 UART: [state] Locking ICCM
2,854,507 UART: [exit] Launching FMC @ 0x40000130
2,859,836 UART:
2,859,852 UART: Running Caliptra FMC ...
2,860,260 UART:
2,860,314 UART: [state] CFI Enabled
2,870,569 UART: [fht] FMC Alias Private Key: 7
2,978,410 UART: [art] Extend RT PCRs Done
2,978,838 UART: [art] Lock RT PCRs Done
2,980,666 UART: [art] Populate DV Done
2,989,061 UART: [fht] FMC Alias Private Key: 7
2,990,065 UART: [art] Derive CDI
2,990,345 UART: [art] Store in in slot 0x4
3,076,200 UART: [art] Derive Key Pair
3,076,560 UART: [art] Store priv key in slot 0x5
3,089,306 UART: [art] Derive Key Pair - Done
3,103,869 UART: [art] Signing Cert with AUTHO
3,104,349 UART: RITY.KEYID = 7
3,119,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,400 UART: [art] PUB.X = D54936D8253C4C8269BE92082870E3ED652CA5B5AF54CF18CB2E4A68FDE46DA1FC1A8A02C9A4CC09FF8E3F15325BB26A
3,127,179 UART: [art] PUB.Y = 704DDD5A8B34F33A02BC52967FB63FFACF268059F034D90F3CA7AA94B830A39C037AE0E311C736A27831FB78FC5598CB
3,134,132 UART: [art] SIG.R = 01C5B5CD028D6B5BB06ECAA4039D18C6E544C96A681C3687564EF129EA0D6AE0BB3AC85B815D30BFE2949031CAB25F9D
3,140,906 UART: [art] SIG.S = D2373074896E6C0F59D84E21E2DE2C87AC7E1273F17E88F18DBC9A121F49EA5EFAAB99ACF20C6B478E2E1EED634A832A
3,165,327 UART: Caliptra RT
3,165,580 UART: [state] CFI Enabled
3,274,183 UART: [rt] RT listening for mailbox commands...
3,274,853 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,845 UART:
3,275,861 UART: Running Caliptra ROM ...
3,276,269 UART:
3,276,324 UART: [state] CFI Enabled
3,279,210 UART: [state] LifecycleState = Unprovisioned
3,279,865 UART: [state] DebugLocked = No
3,280,355 UART: [state] WD Timer not started. Device not locked for debugging
3,281,491 UART: [kat] SHA2-256
4,087,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,091,266 UART: [kat] ++
4,091,418 UART: [kat] sha1
4,095,434 UART: [kat] SHA2-256
4,097,374 UART: [kat] SHA2-384
4,100,109 UART: [kat] SHA2-512-ACC
4,102,009 UART: [kat] ECC-384
4,111,692 UART: [kat] HMAC-384Kdf
4,116,384 UART: [kat] LMS
4,364,712 UART: [kat] --
4,365,664 UART: [update-reset] ++
5,267,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,268,605 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,364,615 >>> mbox cmd response: success
5,364,615 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,364,898 UART: [update-reset] Copying MAN_2 To MAN_1
5,372,912 UART: [update-reset Success] --
5,373,649 UART: [state] Locking Datavault
5,374,341 UART: [state] Locking PCR0, PCR1 and PCR31
5,374,945 UART: [state] Locking ICCM
5,375,535 UART: [exit] Launching FMC @ 0x40000130
5,380,864 UART:
5,380,880 UART: Running Caliptra FMC ...
5,381,288 UART:
5,381,342 UART: [state] CFI Enabled
5,470,423 UART: [art] Extend RT PCRs Done
5,470,851 UART: [art] Lock RT PCRs Done
5,472,110 UART: [art] Populate DV Done
5,480,619 UART: [fht] FMC Alias Private Key: 7
5,481,607 UART: [art] Derive CDI
5,481,887 UART: [art] Store in in slot 0x4
5,567,136 UART: [art] Derive Key Pair
5,567,496 UART: [art] Store priv key in slot 0x5
5,580,414 UART: [art] Derive Key Pair - Done
5,595,296 UART: [art] Signing Cert with AUTHO
5,595,776 UART: RITY.KEYID = 7
5,611,048 UART: [art] Erasing AUTHORITY.KEYID = 7
5,611,813 UART: [art] PUB.X = E285CEF86E0938F14D4B6A102B875ACC7515C6DC736FF8F3EF0FA4BCBD932814DC3F6EF0B6FA96A32509197299EFEB9B
5,618,594 UART: [art] PUB.Y = F76256DD144C8D12CE54DCE765C47D28BC8A70952982F2EF24A88F0BAC5F16C4384D85031109C1689A41970466ED3423
5,625,530 UART: [art] SIG.R = C7971574FC87CE68817434A80C4B78F423D600C68382A990872F86022B1F176525D96E81F6421B5757ACCA6A91B64180
5,632,260 UART: [art] SIG.S = A9DFF108572BB363CC71DE807EFB3B37CF883D2EB3020A86B1FA5B69A008C958AE49367AAD4AFBF071450D4A5B1123B9
5,655,840 UART: mbox::rt_entry...
5,656,212 UART: ____ _ _ _ ____ _____
5,656,996 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,657,796 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,658,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,659,332 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,660,100 UART: |_|
5,660,412 UART:
5,941,827 UART: [rt] Runtime listening for mailbox commands...
5,943,017 >>> mbox cmd response data (48 bytes)
5,943,018 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,943,126 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,187 ready_for_fw is high
1,060,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,694 >>> mbox cmd response: success
2,685,322 UART:
2,685,338 UART: Running Caliptra FMC ...
2,685,746 UART:
2,685,800 UART: [state] CFI Enabled
2,696,217 UART: [fht] FMC Alias Private Key: 7
2,804,298 UART: [art] Extend RT PCRs Done
2,804,726 UART: [art] Lock RT PCRs Done
2,806,414 UART: [art] Populate DV Done
2,814,675 UART: [fht] FMC Alias Private Key: 7
2,815,783 UART: [art] Derive CDI
2,816,063 UART: [art] Store in in slot 0x4
2,901,612 UART: [art] Derive Key Pair
2,901,972 UART: [art] Store priv key in slot 0x5
2,914,708 UART: [art] Derive Key Pair - Done
2,929,202 UART: [art] Signing Cert with AUTHO
2,929,682 UART: RITY.KEYID = 7
2,944,618 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,383 UART: [art] PUB.X = A25BA5D71C464204681F92208618B6732768D631E21475BDA11FCDEAE200735415F986EA038DA8BC5B3E7A2F41C4D375
2,952,125 UART: [art] PUB.Y = 6F62D37151878051A45E2A05C146D9CA721E8DF704459D93DC37462BF0EE0F6DEA10EDB13D686BB863DC8A336C83A6EC
2,959,076 UART: [art] SIG.R = A068D896B9DD8E85D3405D1018F0224F9CA06175D6BE02A9D8FA1AACA8DFAC201EB1396DFFA692A68AE49CA1280219F0
2,965,856 UART: [art] SIG.S = D776731C04F3F1ECF87BED9353D8D6024782B975BA7C981F479A249C161BFA5310859704CAAE77726DCB108166B608F3
2,989,903 UART: Caliptra RT
2,990,156 UART: [state] CFI Enabled
3,098,614 UART: [rt] RT listening for mailbox commands...
3,099,284 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,072,927 >>> mbox cmd response: success
5,072,927 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,086,181 UART:
5,086,197 UART: Running Caliptra FMC ...
5,086,605 UART:
5,086,659 UART: [state] CFI Enabled
5,175,438 UART: [art] Extend RT PCRs Done
5,175,866 UART: [art] Lock RT PCRs Done
5,177,129 UART: [art] Populate DV Done
5,185,306 UART: [fht] FMC Alias Private Key: 7
5,186,252 UART: [art] Derive CDI
5,186,532 UART: [art] Store in in slot 0x4
5,272,033 UART: [art] Derive Key Pair
5,272,393 UART: [art] Store priv key in slot 0x5
5,285,541 UART: [art] Derive Key Pair - Done
5,300,432 UART: [art] Signing Cert with AUTHO
5,300,912 UART: RITY.KEYID = 7
5,316,124 UART: [art] Erasing AUTHORITY.KEYID = 7
5,316,889 UART: [art] PUB.X = B08A967C3DA3AEEDC1B137125FB4ED10C0BB4BB8379060BAA2F0A65821B45DFAFDDFCF385060DA9270E56BE9F48DCF22
5,323,685 UART: [art] PUB.Y = 17238B4374C81191D76CEC7D4B50B6EB4986C0B6AFC6C2D3FC0CBA84D3E73A94AF9E8BA4935CB5E968443957C06167FE
5,330,644 UART: [art] SIG.R = 0098ED8F84061C45AC25BB298C32CCDB64923DB2C8C008D186110FD7259825908DD736481F9A9EDBAE245E21D4A9A176
5,337,387 UART: [art] SIG.S = BC0F02D61E1EFEDA860E449C21B31AF516E67B404C046BA0CF6EB785C2EED03AFCA02A7C456A0F5CA07603C35C519968
5,361,190 UART: mbox::rt_entry...
5,361,562 UART: ____ _ _ _ ____ _____
5,362,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,146 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,363,914 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,364,682 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,365,450 UART: |_|
5,365,762 UART:
5,646,189 UART: [rt] Runtime listening for mailbox commands...
5,647,379 >>> mbox cmd response data (48 bytes)
5,647,380 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,647,488 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
917,627 UART: [kat] HMAC-384Kdf
922,427 UART: [kat] LMS
1,170,755 UART: [kat] --
1,171,738 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,917 UART: [idev] ++
1,175,085 UART: [idev] CDI.KEYID = 6
1,175,445 UART: [idev] SUBJECT.KEYID = 7
1,175,869 UART: [idev] UDS.KEYID = 0
1,176,214 ready_for_fw is high
1,176,214 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,132 UART: [idev] Sha1 KeyId Algorithm
1,209,660 UART: [idev] --
1,210,856 UART: [ldev] ++
1,211,024 UART: [ldev] CDI.KEYID = 6
1,211,387 UART: [ldev] SUBJECT.KEYID = 5
1,211,813 UART: [ldev] AUTHORITY.KEYID = 7
1,212,276 UART: [ldev] FE.KEYID = 1
1,217,746 UART: [ldev] Erasing FE.KEYID = 1
1,243,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,006 UART: [ldev] --
1,283,435 UART: [fwproc] Wait for Commands...
1,284,095 UART: [fwproc] Recv command 0x46574c44
1,284,823 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,453 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,236 >>> mbox cmd response: success
2,773,344 UART: [afmc] ++
2,773,512 UART: [afmc] CDI.KEYID = 6
2,773,874 UART: [afmc] SUBJECT.KEYID = 7
2,774,299 UART: [afmc] AUTHORITY.KEYID = 5
2,809,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,381 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,581 UART: [afmc] --
2,852,673 UART: [cold-reset] --
2,853,665 UART: [state] Locking Datavault
2,854,812 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,416 UART: [state] Locking ICCM
2,856,002 UART: [exit] Launching FMC @ 0x40000130
2,861,331 UART:
2,861,347 UART: Running Caliptra FMC ...
2,861,755 UART:
2,861,898 UART: [state] CFI Enabled
2,872,325 UART: [fht] FMC Alias Private Key: 7
2,980,398 UART: [art] Extend RT PCRs Done
2,980,826 UART: [art] Lock RT PCRs Done
2,982,832 UART: [art] Populate DV Done
2,990,957 UART: [fht] FMC Alias Private Key: 7
2,992,003 UART: [art] Derive CDI
2,992,283 UART: [art] Store in in slot 0x4
3,077,866 UART: [art] Derive Key Pair
3,078,226 UART: [art] Store priv key in slot 0x5
3,091,658 UART: [art] Derive Key Pair - Done
3,106,556 UART: [art] Signing Cert with AUTHO
3,107,036 UART: RITY.KEYID = 7
3,122,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,131 UART: [art] PUB.X = B23F43F4987812290DBE07288B3189C0DFB87E29C85E34C32603DD15AEEB98A1E5597D30EFF9FA15B58E42F3FA2F9007
3,129,897 UART: [art] PUB.Y = EB193116508FE8C81D56916487A348BCDA70959482A1986EED8A2C1F33AB2BDE72D851BF2DE70CCBBD407A380E8A316A
3,136,853 UART: [art] SIG.R = E817DF003CE9A581239123C4CBF29A2B24395C6C2C8B839E50D42090CE9B8472A19A96B6975212B8068E5800677FFBFE
3,143,576 UART: [art] SIG.S = 5BDE29E92C7625781C2D2D1BCCB1E7B0B680A1571D6DAEBD130D5D2EA06C9114C2DF51FAB39B07275CD496A8E17D2460
3,167,227 UART: Caliptra RT
3,167,572 UART: [state] CFI Enabled
3,275,141 UART: [rt] RT listening for mailbox commands...
3,275,811 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,095 UART:
3,277,111 UART: Running Caliptra ROM ...
3,277,519 UART:
3,277,661 UART: [state] CFI Enabled
3,280,313 UART: [state] LifecycleState = Unprovisioned
3,280,968 UART: [state] DebugLocked = No
3,281,528 UART: [state] WD Timer not started. Device not locked for debugging
3,282,652 UART: [kat] SHA2-256
4,088,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,427 UART: [kat] ++
4,092,579 UART: [kat] sha1
4,096,921 UART: [kat] SHA2-256
4,098,861 UART: [kat] SHA2-384
4,101,558 UART: [kat] SHA2-512-ACC
4,103,458 UART: [kat] ECC-384
4,113,307 UART: [kat] HMAC-384Kdf
4,117,837 UART: [kat] LMS
4,366,165 UART: [kat] --
4,367,311 UART: [update-reset] ++
5,268,975 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,269,968 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,365,978 >>> mbox cmd response: success
5,365,978 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,366,179 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,193 UART: [update-reset Success] --
5,375,480 UART: [state] Locking Datavault
5,376,350 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,954 UART: [state] Locking ICCM
5,377,612 UART: [exit] Launching FMC @ 0x40000130
5,382,941 UART:
5,382,957 UART: Running Caliptra FMC ...
5,383,365 UART:
5,383,508 UART: [state] CFI Enabled
5,472,425 UART: [art] Extend RT PCRs Done
5,472,853 UART: [art] Lock RT PCRs Done
5,474,168 UART: [art] Populate DV Done
5,482,347 UART: [fht] FMC Alias Private Key: 7
5,483,349 UART: [art] Derive CDI
5,483,629 UART: [art] Store in in slot 0x4
5,569,462 UART: [art] Derive Key Pair
5,569,822 UART: [art] Store priv key in slot 0x5
5,583,302 UART: [art] Derive Key Pair - Done
5,597,871 UART: [art] Signing Cert with AUTHO
5,598,351 UART: RITY.KEYID = 7
5,613,691 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,456 UART: [art] PUB.X = 4BA1BF95E71FB891E80E56A0F78EED3E9488053D95871A6C8A813A31E782EEAC0C1795E6945304FDCF36CE47B9C75C75
5,621,224 UART: [art] PUB.Y = C249F22E0F3E1C5B080E9FFCCAC59A0063ED743C6FA05C341BCF2E7E5C90CDB83237D07FD8F7260E44FD706E12AB0925
5,628,155 UART: [art] SIG.R = 0095DAFE1295B4B7C6F0278885C5828AC19809F1E07BE1AC64F5B114A376AD37A9D021AB9D73B463058C482B07BD35EE
5,634,900 UART: [art] SIG.S = 5337BCAD775A0B8D779A441E8F12D706CD5BF85E9562087BC6CEE3E48A0D01F2FFE15FACD8A6CDAA58D3072351CC2A91
5,658,585 UART: mbox::rt_entry...
5,658,957 UART: ____ _ _ _ ____ _____
5,659,741 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,660,541 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,661,309 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,662,077 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,662,845 UART: |_|
5,663,157 UART:
5,944,978 UART: [rt] Runtime listening for mailbox commands...
5,946,168 >>> mbox cmd response data (48 bytes)
5,946,169 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,946,277 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,400 ready_for_fw is high
1,060,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,857 >>> mbox cmd response: success
2,686,575 UART:
2,686,591 UART: Running Caliptra FMC ...
2,686,999 UART:
2,687,142 UART: [state] CFI Enabled
2,698,079 UART: [fht] FMC Alias Private Key: 7
2,806,246 UART: [art] Extend RT PCRs Done
2,806,674 UART: [art] Lock RT PCRs Done
2,808,130 UART: [art] Populate DV Done
2,816,369 UART: [fht] FMC Alias Private Key: 7
2,817,311 UART: [art] Derive CDI
2,817,591 UART: [art] Store in in slot 0x4
2,903,414 UART: [art] Derive Key Pair
2,903,774 UART: [art] Store priv key in slot 0x5
2,917,358 UART: [art] Derive Key Pair - Done
2,932,133 UART: [art] Signing Cert with AUTHO
2,932,613 UART: RITY.KEYID = 7
2,948,093 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,858 UART: [art] PUB.X = 51A6001C6C872CFED3B19033B234B8E99FD152E292B7C55551494EEE312BE0FB6131B6BB09D47003591BA3D3F7E8C918
2,955,604 UART: [art] PUB.Y = 7561BE428C5351A28E1CB5CDBC589A4FC41CEF7AF15592E798812D11309487E4976ADEF3962CD4208E4E80424D4507D9
2,962,553 UART: [art] SIG.R = B1AF9521DAD34C2C594672666ED33868675F52DBAE28F94451F3F17D9D088B881B2183C3D161EA9F762628BC68F1053A
2,969,317 UART: [art] SIG.S = EC1516C3E4F326E64A7951B376F5C864C7AC0EF35345700977ADD1B6B0BC3419832A0796C32523B98A2E74181729884F
2,992,725 UART: Caliptra RT
2,993,070 UART: [state] CFI Enabled
3,100,390 UART: [rt] RT listening for mailbox commands...
3,101,060 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,076,398 >>> mbox cmd response: success
5,076,398 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,646 UART:
5,089,662 UART: Running Caliptra FMC ...
5,090,070 UART:
5,090,213 UART: [state] CFI Enabled
5,179,582 UART: [art] Extend RT PCRs Done
5,180,010 UART: [art] Lock RT PCRs Done
5,181,231 UART: [art] Populate DV Done
5,189,438 UART: [fht] FMC Alias Private Key: 7
5,190,408 UART: [art] Derive CDI
5,190,688 UART: [art] Store in in slot 0x4
5,276,135 UART: [art] Derive Key Pair
5,276,495 UART: [art] Store priv key in slot 0x5
5,289,671 UART: [art] Derive Key Pair - Done
5,304,183 UART: [art] Signing Cert with AUTHO
5,304,663 UART: RITY.KEYID = 7
5,319,523 UART: [art] Erasing AUTHORITY.KEYID = 7
5,320,288 UART: [art] PUB.X = 6E32D8794FD3EF2885D4F5574763D394306EB61960D9715CDDFC6339F74A34CA3495BB3137184B01937DB2D949462EA7
5,327,051 UART: [art] PUB.Y = 13267A9E692A77194D5612B976DF9DBA0418370BFA8E25638DD5BEA19E9BEDF7CDFF76A8BC5C897BBD0DE82A74D234B6
5,334,010 UART: [art] SIG.R = 5698157DA6DEBEB6D48F60D381C8AB50CA306BCC5E3716DE6B44CD93FBA63ABDC7B01902FA1AE7D9FDE4015F1F5E7930
5,340,798 UART: [art] SIG.S = 64BFB4F9A161214578EEDFB7E388EA0C7722ED92BDE37A56DE0A23ECB97C4FDF1D7CCC17BAC7C1F2560DB9991CD39E59
5,364,758 UART: mbox::rt_entry...
5,365,130 UART: ____ _ _ _ ____ _____
5,365,914 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,366,714 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,367,482 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,368,250 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,369,018 UART: |_|
5,369,330 UART:
5,648,032 UART: [rt] Runtime listening for mailbox commands...
5,649,222 >>> mbox cmd response data (48 bytes)
5,649,223 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,649,331 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,047 UART: [kat] ++
895,199 UART: [kat] sha1
899,261 UART: [kat] SHA2-256
901,201 UART: [kat] SHA2-384
903,938 UART: [kat] SHA2-512-ACC
905,839 UART: [kat] ECC-384
915,554 UART: [kat] HMAC-384Kdf
920,130 UART: [kat] LMS
1,168,442 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,173,791 ready_for_fw is high
1,173,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,975 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,856 UART: [ldev] ++
1,209,024 UART: [ldev] CDI.KEYID = 6
1,209,388 UART: [ldev] SUBJECT.KEYID = 5
1,209,815 UART: [ldev] AUTHORITY.KEYID = 7
1,210,278 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,242,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,832 UART: [ldev] --
1,281,104 UART: [fwproc] Wait for Commands...
1,281,717 UART: [fwproc] Recv command 0x46574c44
1,282,450 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,341 >>> mbox cmd response: success
2,769,526 UART: [afmc] ++
2,769,694 UART: [afmc] CDI.KEYID = 6
2,770,057 UART: [afmc] SUBJECT.KEYID = 7
2,770,483 UART: [afmc] AUTHORITY.KEYID = 5
2,805,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,711 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,430 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,231 UART: [afmc] --
2,849,253 UART: [cold-reset] --
2,850,309 UART: [state] Locking Datavault
2,851,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,244 UART: [state] Locking ICCM
2,852,764 UART: [exit] Launching FMC @ 0x40000130
2,858,093 UART:
2,858,109 UART: Running Caliptra FMC ...
2,858,517 UART:
2,858,571 UART: [state] CFI Enabled
2,868,988 UART: [fht] FMC Alias Private Key: 7
2,976,755 UART: [art] Extend RT PCRs Done
2,977,183 UART: [art] Lock RT PCRs Done
2,978,679 UART: [art] Populate DV Done
2,987,176 UART: [fht] FMC Alias Private Key: 7
2,988,306 UART: [art] Derive CDI
2,988,586 UART: [art] Store in in slot 0x4
3,074,099 UART: [art] Derive Key Pair
3,074,459 UART: [art] Store priv key in slot 0x5
3,087,981 UART: [art] Derive Key Pair - Done
3,102,838 UART: [art] Signing Cert with AUTHO
3,103,318 UART: RITY.KEYID = 7
3,118,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,861 UART: [art] PUB.X = B5601CCDDD6554C439455485215FE3D9B071C1EE1824B7BA6590DEA439975EC66223B2814533E446A7125C23B0E758B1
3,125,627 UART: [art] PUB.Y = 9EC2A067109C4FBDB09079C703C2475A0383A19C1F2C2519B277B7F2373A556DC5B56D94075ED205B753DD67C5930E0E
3,132,559 UART: [art] SIG.R = 7C400CBFCA3080B05A31FEF188D1A1C309831015CB86BA54915CB53820FF075DEE8F699373A6EC1E4580BA246CDB4A7F
3,139,332 UART: [art] SIG.S = C01C9D2C8164794EF8424BB04FD971D29EB5A771D5A89D5E23A3346DB272CD073EA218695486BEE57E3FA0B39E6ED057
3,163,154 UART: Caliptra RT
3,163,407 UART: [state] CFI Enabled
3,270,332 UART: [rt] RT listening for mailbox commands...
3,271,002 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,188 UART:
3,272,204 UART: Running Caliptra ROM ...
3,272,612 UART:
3,272,667 UART: [state] CFI Enabled
3,275,415 UART: [state] LifecycleState = Unprovisioned
3,276,070 UART: [state] DebugLocked = No
3,276,596 UART: [state] WD Timer not started. Device not locked for debugging
3,277,710 UART: [kat] SHA2-256
4,081,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,389 UART: [kat] ++
4,085,541 UART: [kat] sha1
4,089,807 UART: [kat] SHA2-256
4,091,747 UART: [kat] SHA2-384
4,094,518 UART: [kat] SHA2-512-ACC
4,096,418 UART: [kat] ECC-384
4,106,443 UART: [kat] HMAC-384Kdf
4,110,977 UART: [kat] LMS
4,359,289 UART: [kat] --
4,360,217 UART: [update-reset] ++
5,263,052 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,264,051 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,360,061 >>> mbox cmd response: success
5,360,061 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,360,280 UART: [update-reset] Copying MAN_2 To MAN_1
5,368,294 UART: [update-reset Success] --
5,369,237 UART: [state] Locking Datavault
5,369,869 UART: [state] Locking PCR0, PCR1 and PCR31
5,370,473 UART: [state] Locking ICCM
5,370,893 UART: [exit] Launching FMC @ 0x40000130
5,376,222 UART:
5,376,238 UART: Running Caliptra FMC ...
5,376,646 UART:
5,376,700 UART: [state] CFI Enabled
5,465,499 UART: [art] Extend RT PCRs Done
5,465,927 UART: [art] Lock RT PCRs Done
5,467,170 UART: [art] Populate DV Done
5,475,393 UART: [fht] FMC Alias Private Key: 7
5,476,499 UART: [art] Derive CDI
5,476,779 UART: [art] Store in in slot 0x4
5,562,426 UART: [art] Derive Key Pair
5,562,786 UART: [art] Store priv key in slot 0x5
5,575,410 UART: [art] Derive Key Pair - Done
5,590,300 UART: [art] Signing Cert with AUTHO
5,590,780 UART: RITY.KEYID = 7
5,606,190 UART: [art] Erasing AUTHORITY.KEYID = 7
5,606,955 UART: [art] PUB.X = 297104CB239B878E4D77C66D8FC063FA18ECCD0F96059C49D529F1D21EE5934C8BDE7DF1EBDF7D4AA24A22FAA376B37B
5,613,736 UART: [art] PUB.Y = 635ED2CD88F50B79E02BCC314D1AD28642A4451AF18D3E3723156E3D1AB35CA04D89BE0329EFF03A1B6D28044FCB7136
5,620,687 UART: [art] SIG.R = 7AF3BBC7BA418E8B303F39D85093BFAA12EAFC34AE205B6A6A09679216E57034653AD29C8E1A70B7B9458C1AE97336FD
5,627,466 UART: [art] SIG.S = 10AC42B15A497B329C24F9839A78A43C116E9DB5CD3EF51694EEA61E293AC71147A6E3C7DBA9C26F6B11FC3FE19E4FB7
5,650,987 UART: mbox::rt_entry...
5,651,359 UART: ____ _ _ _ ____ _____
5,652,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,652,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,653,711 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,654,479 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,655,247 UART: |_|
5,655,559 UART:
5,938,037 UART: [rt] Runtime listening for mailbox commands...
5,939,227 >>> mbox cmd response data (48 bytes)
5,939,228 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,939,336 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,392 ready_for_fw is high
1,056,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,561 >>> mbox cmd response: success
2,679,881 UART:
2,679,897 UART: Running Caliptra FMC ...
2,680,305 UART:
2,680,359 UART: [state] CFI Enabled
2,690,712 UART: [fht] FMC Alias Private Key: 7
2,798,103 UART: [art] Extend RT PCRs Done
2,798,531 UART: [art] Lock RT PCRs Done
2,800,437 UART: [art] Populate DV Done
2,808,526 UART: [fht] FMC Alias Private Key: 7
2,809,636 UART: [art] Derive CDI
2,809,916 UART: [art] Store in in slot 0x4
2,895,755 UART: [art] Derive Key Pair
2,896,115 UART: [art] Store priv key in slot 0x5
2,909,479 UART: [art] Derive Key Pair - Done
2,924,484 UART: [art] Signing Cert with AUTHO
2,924,964 UART: RITY.KEYID = 7
2,939,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,729 UART: [art] PUB.X = 8E84CFB3BE7382F93AE648706341DABA107B0D547EF0E813855AC838FCEF3BA73D1F6A9CDA27CADFF8AC3FC975BABCC4
2,947,526 UART: [art] PUB.Y = E1E065D5179049B32D9CE5A80386E808BBCC1462C23879AD31B5F2556C251D68577B77DDA9B6A449BF3B6EBFF50AADB6
2,954,479 UART: [art] SIG.R = CD22E746D7B59124026B573B02C8AC9C71AA55A1D42F2731A56B8EE41FB954B918B771D365E3E456E67753A653868A41
2,961,241 UART: [art] SIG.S = 150F4E1D45463BA3BA89AB50F230A6DD7C1CAC018528140CF496B6EAED2992D4DC9539A7D2544A485B09DC1C1A6077DD
2,985,298 UART: Caliptra RT
2,985,551 UART: [state] CFI Enabled
3,093,272 UART: [rt] RT listening for mailbox commands...
3,093,942 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,062,448 >>> mbox cmd response: success
5,062,448 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,076,070 UART:
5,076,086 UART: Running Caliptra FMC ...
5,076,494 UART:
5,076,548 UART: [state] CFI Enabled
5,165,651 UART: [art] Extend RT PCRs Done
5,166,079 UART: [art] Lock RT PCRs Done
5,167,452 UART: [art] Populate DV Done
5,175,725 UART: [fht] FMC Alias Private Key: 7
5,176,667 UART: [art] Derive CDI
5,176,947 UART: [art] Store in in slot 0x4
5,262,732 UART: [art] Derive Key Pair
5,263,092 UART: [art] Store priv key in slot 0x5
5,276,652 UART: [art] Derive Key Pair - Done
5,291,425 UART: [art] Signing Cert with AUTHO
5,291,905 UART: RITY.KEYID = 7
5,306,713 UART: [art] Erasing AUTHORITY.KEYID = 7
5,307,478 UART: [art] PUB.X = BAA953EE0EC800E700228C44DA11007E98564A1EB8628140C4A009B61B024E03FCD5C7A5FF74FEC4BDB373A80698F724
5,314,175 UART: [art] PUB.Y = D2E1190E223B4F42F511BFDAF7C4716CD287DFAB2BAAA48F1D8ECC23DF966388D4EC9235B5E9C23F0ED837BBD3BF4214
5,321,143 UART: [art] SIG.R = A85E33AA765C0309CFD22DA6E129FE8DC54F767AF805BD262630B5E1E6919D28BC119FE52B81F5621BE3F652B831A6D2
5,327,914 UART: [art] SIG.S = F7A8FB552051C6D31ED3E459D9DA3F47D39232E805A715D29553D5C693ACC2A1C046963C813DFADB36907A6665D03310
5,351,552 UART: mbox::rt_entry...
5,351,924 UART: ____ _ _ _ ____ _____
5,352,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,353,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,354,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,355,044 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,355,812 UART: |_|
5,356,124 UART:
5,635,811 UART: [rt] Runtime listening for mailbox commands...
5,637,001 >>> mbox cmd response data (48 bytes)
5,637,002 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,637,110 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,697 UART: [kat] LMS
1,169,009 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,170,106 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,173,994 ready_for_fw is high
1,173,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,199,210 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,349 UART: [ldev] ++
1,209,517 UART: [ldev] CDI.KEYID = 6
1,209,881 UART: [ldev] SUBJECT.KEYID = 5
1,210,308 UART: [ldev] AUTHORITY.KEYID = 7
1,210,771 UART: [ldev] FE.KEYID = 1
1,216,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,933 UART: [fwproc] Wait for Commands...
1,283,676 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,730 >>> mbox cmd response: success
2,771,845 UART: [afmc] ++
2,772,013 UART: [afmc] CDI.KEYID = 6
2,772,376 UART: [afmc] SUBJECT.KEYID = 7
2,772,802 UART: [afmc] AUTHORITY.KEYID = 5
2,808,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,906 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,578 UART: [afmc] --
2,851,664 UART: [cold-reset] --
2,852,578 UART: [state] Locking Datavault
2,853,829 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,433 UART: [state] Locking ICCM
2,855,005 UART: [exit] Launching FMC @ 0x40000130
2,860,334 UART:
2,860,350 UART: Running Caliptra FMC ...
2,860,758 UART:
2,860,901 UART: [state] CFI Enabled
2,871,860 UART: [fht] FMC Alias Private Key: 7
2,979,333 UART: [art] Extend RT PCRs Done
2,979,761 UART: [art] Lock RT PCRs Done
2,981,361 UART: [art] Populate DV Done
2,989,684 UART: [fht] FMC Alias Private Key: 7
2,990,856 UART: [art] Derive CDI
2,991,136 UART: [art] Store in in slot 0x4
3,076,795 UART: [art] Derive Key Pair
3,077,155 UART: [art] Store priv key in slot 0x5
3,090,897 UART: [art] Derive Key Pair - Done
3,105,718 UART: [art] Signing Cert with AUTHO
3,106,198 UART: RITY.KEYID = 7
3,120,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,637 UART: [art] PUB.X = 4507A2EF4A6BD704FC2CD0885C65F94FA8D42D67F9BD9C2525E5880F261326E90B08CFAD0AA0FCFD7F9B7E8D6CF6620D
3,128,406 UART: [art] PUB.Y = 9CA8A3C6EA84F71CB4D29E9E2C1CDE71A5C2B59AAEFBBD8D571E6F8610876CD10C1DABD259D816D93DE5E18989BDA692
3,135,379 UART: [art] SIG.R = 1D287F7D50DF4F9DF07EFE87ECE0C43B5147558D1C9214FCA4E95E05D9616477C2093466FA2BDFD660C09281DD8088DD
3,142,153 UART: [art] SIG.S = 8896672A188E8985578C9F70EFEEEFF9B3398E3CC9B97F1487E5D0EFBF669B7019044E48277A19917A4221FBB2C25523
3,165,417 UART: Caliptra RT
3,165,762 UART: [state] CFI Enabled
3,273,655 UART: [rt] RT listening for mailbox commands...
3,274,325 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,709 UART:
3,275,725 UART: Running Caliptra ROM ...
3,276,133 UART:
3,276,275 UART: [state] CFI Enabled
3,279,641 UART: [state] LifecycleState = Unprovisioned
3,280,296 UART: [state] DebugLocked = No
3,280,884 UART: [state] WD Timer not started. Device not locked for debugging
3,281,992 UART: [kat] SHA2-256
4,085,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,671 UART: [kat] ++
4,089,823 UART: [kat] sha1
4,093,943 UART: [kat] SHA2-256
4,095,883 UART: [kat] SHA2-384
4,098,750 UART: [kat] SHA2-512-ACC
4,100,650 UART: [kat] ECC-384
4,110,513 UART: [kat] HMAC-384Kdf
4,115,251 UART: [kat] LMS
4,363,563 UART: [kat] --
4,364,719 UART: [update-reset] ++
5,266,866 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,267,875 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,363,885 >>> mbox cmd response: success
5,363,885 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,364,056 UART: [update-reset] Copying MAN_2 To MAN_1
5,372,070 UART: [update-reset Success] --
5,373,347 UART: [state] Locking Datavault
5,374,249 UART: [state] Locking PCR0, PCR1 and PCR31
5,374,853 UART: [state] Locking ICCM
5,375,467 UART: [exit] Launching FMC @ 0x40000130
5,380,796 UART:
5,380,812 UART: Running Caliptra FMC ...
5,381,220 UART:
5,381,363 UART: [state] CFI Enabled
5,471,142 UART: [art] Extend RT PCRs Done
5,471,570 UART: [art] Lock RT PCRs Done
5,472,783 UART: [art] Populate DV Done
5,480,862 UART: [fht] FMC Alias Private Key: 7
5,482,022 UART: [art] Derive CDI
5,482,302 UART: [art] Store in in slot 0x4
5,568,103 UART: [art] Derive Key Pair
5,568,463 UART: [art] Store priv key in slot 0x5
5,581,099 UART: [art] Derive Key Pair - Done
5,595,804 UART: [art] Signing Cert with AUTHO
5,596,284 UART: RITY.KEYID = 7
5,611,526 UART: [art] Erasing AUTHORITY.KEYID = 7
5,612,291 UART: [art] PUB.X = 0160BB9E2E8E0357BD8644B6724CCC2CCBE16EF8D045990264E930B6213ABC4B494EC442B45BEA114A47CC958327F794
5,619,058 UART: [art] PUB.Y = E4CF98D9FDF9686215D581A6B2990C47893C96B2E7BBE3D028018AFA7F607F5A3987895F7FE2D247BDD4ABAB6B18E440
5,626,014 UART: [art] SIG.R = 65B4E9C64B9A591B248CC58FD0CB41C40649770E1A49772BB57D1D80DA028CDA8F03477B24311AC79991958D60D41479
5,632,770 UART: [art] SIG.S = 3F22DF2FA6838C338783EC90A92FF9976E2610C9B0D6D9BA89C778B3D02BDFBFA22C852C677A42A2189E203E4447E231
5,656,361 UART: mbox::rt_entry...
5,656,733 UART: ____ _ _ _ ____ _____
5,657,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,658,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,659,085 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,659,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,660,621 UART: |_|
5,660,933 UART:
5,942,401 UART: [rt] Runtime listening for mailbox commands...
5,943,591 >>> mbox cmd response data (48 bytes)
5,943,592 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,943,700 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,425 ready_for_fw is high
1,056,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,654 >>> mbox cmd response: success
2,681,632 UART:
2,681,648 UART: Running Caliptra FMC ...
2,682,056 UART:
2,682,199 UART: [state] CFI Enabled
2,692,618 UART: [fht] FMC Alias Private Key: 7
2,800,429 UART: [art] Extend RT PCRs Done
2,800,857 UART: [art] Lock RT PCRs Done
2,802,369 UART: [art] Populate DV Done
2,810,508 UART: [fht] FMC Alias Private Key: 7
2,811,594 UART: [art] Derive CDI
2,811,874 UART: [art] Store in in slot 0x4
2,897,475 UART: [art] Derive Key Pair
2,897,835 UART: [art] Store priv key in slot 0x5
2,910,995 UART: [art] Derive Key Pair - Done
2,925,781 UART: [art] Signing Cert with AUTHO
2,926,261 UART: RITY.KEYID = 7
2,941,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,598 UART: [art] PUB.X = 75DB0C2F2B64E00AD29EABA459FDCBCE30C84EBF787BD2236BD2D85A518C8D2EB63CCF4EC64343747026266544EAB84D
2,949,382 UART: [art] PUB.Y = C1F362EB3CC1AA266763FEACC6C5D1A536E57A388DF51882AEC2BFBB7CD5EA4B180357E79A603D6FED90A505C03E4E07
2,956,345 UART: [art] SIG.R = FA59EFF68C3B4AD3490CBF814E5FB3F5274B7A91A526A5C60555D368A244E1143D407407DDE8CD2B23203C0A7C82AC48
2,963,113 UART: [art] SIG.S = 74D9C4B1C65B7C79C2218F17518F04651CB8E5BB0EAE017C413EB226D063FC1C3027BB5B55E6547A22681A244CBB5C5A
2,986,639 UART: Caliptra RT
2,986,984 UART: [state] CFI Enabled
3,094,889 UART: [rt] RT listening for mailbox commands...
3,095,559 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,066,054 >>> mbox cmd response: success
5,066,054 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,079,602 UART:
5,079,618 UART: Running Caliptra FMC ...
5,080,026 UART:
5,080,169 UART: [state] CFI Enabled
5,169,442 UART: [art] Extend RT PCRs Done
5,169,870 UART: [art] Lock RT PCRs Done
5,171,143 UART: [art] Populate DV Done
5,179,218 UART: [fht] FMC Alias Private Key: 7
5,180,220 UART: [art] Derive CDI
5,180,500 UART: [art] Store in in slot 0x4
5,266,211 UART: [art] Derive Key Pair
5,266,571 UART: [art] Store priv key in slot 0x5
5,279,885 UART: [art] Derive Key Pair - Done
5,294,849 UART: [art] Signing Cert with AUTHO
5,295,329 UART: RITY.KEYID = 7
5,310,417 UART: [art] Erasing AUTHORITY.KEYID = 7
5,311,182 UART: [art] PUB.X = 332E1C76F65474BD18502EFC601E3CA62D3DA29B923875FB265027FEBFCDA3A1DB748DF5A55CEA0E6E5E5690582ABB34
5,317,965 UART: [art] PUB.Y = 26958D17078F8EA1916EDCF8AC6324880F5D4925AA86B82A99ACAB836038C49F22C106B9AB6916185EDA6C5DE3F2CF3B
5,324,916 UART: [art] SIG.R = 302EFEEA93E46FDE5BA30AB04A5F3CD8E96A9F51DCE135AAABCE03478987C81FBF848EDA26575524CE1CCD432D8F6D66
5,331,706 UART: [art] SIG.S = B76FECD210D4557BF570FDCAC1ECD3971BA30727FF52369D514034A8BE20FAD01FED8BCA90DF73ACE19D37160D281604
5,355,232 UART: mbox::rt_entry...
5,355,604 UART: ____ _ _ _ ____ _____
5,356,388 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,357,188 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,357,956 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,358,724 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,359,492 UART: |_|
5,359,804 UART:
5,640,806 UART: [rt] Runtime listening for mailbox commands...
5,641,996 >>> mbox cmd response data (48 bytes)
5,641,997 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,642,105 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,126 UART:
192,500 UART: Running Caliptra ROM ...
193,695 UART:
193,852 UART: [state] CFI Enabled
263,414 UART: [state] LifecycleState = Unprovisioned
265,367 UART: [state] DebugLocked = No
267,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,635 UART: [kat] SHA2-256
442,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,888 UART: [kat] ++
453,375 UART: [kat] sha1
465,602 UART: [kat] SHA2-256
468,339 UART: [kat] SHA2-384
474,403 UART: [kat] SHA2-512-ACC
476,772 UART: [kat] ECC-384
2,766,052 UART: [kat] HMAC-384Kdf
2,779,245 UART: [kat] LMS
3,969,533 UART: [kat] --
3,973,919 UART: [cold-reset] ++
3,975,401 UART: [fht] Storing FHT @ 0x50003400
3,986,393 UART: [idev] ++
3,987,061 UART: [idev] CDI.KEYID = 6
3,987,978 UART: [idev] SUBJECT.KEYID = 7
3,989,157 UART: [idev] UDS.KEYID = 0
3,990,194 ready_for_fw is high
3,990,388 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,133,496 UART: [idev] Erasing UDS.KEYID = 0
7,326,430 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,084 UART: [idev] --
7,353,604 UART: [ldev] ++
7,354,182 UART: [ldev] CDI.KEYID = 6
7,355,152 UART: [ldev] SUBJECT.KEYID = 5
7,356,287 UART: [ldev] AUTHORITY.KEYID = 7
7,357,538 UART: [ldev] FE.KEYID = 1
7,401,665 UART: [ldev] Erasing FE.KEYID = 1
10,734,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,963 UART: [ldev] --
13,117,278 UART: [fwproc] Waiting for Commands...
13,119,368 UART: [fwproc] Received command 0x46574c44
13,121,550 UART: [fwproc] Received Image of size 113760 bytes
17,166,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,084 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,631,581 >>> mbox cmd response: success
17,635,219 UART: [afmc] ++
17,635,835 UART: [afmc] CDI.KEYID = 6
17,636,751 UART: [afmc] SUBJECT.KEYID = 7
17,637,895 UART: [afmc] AUTHORITY.KEYID = 5
21,007,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,004 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,431 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,252 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,660 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,306 UART: [afmc] --
23,380,681 UART: [cold-reset] --
23,385,683 UART: [state] Locking Datavault
23,393,090 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,790 UART: [state] Locking ICCM
23,396,343 UART: [exit] Launching FMC @ 0x40000130
23,404,741 UART:
23,404,983 UART: Running Caliptra FMC ...
23,406,083 UART:
23,406,251 UART: [state] CFI Enabled
23,469,483 UART: [fht] FMC Alias Private Key: 7
25,807,469 UART: [art] Extend RT PCRs Done
25,808,691 UART: [art] Lock RT PCRs Done
25,810,237 UART: [art] Populate DV Done
25,815,411 UART: [fht] FMC Alias Private Key: 7
25,817,051 UART: [art] Derive CDI
25,817,875 UART: [art] Store in in slot 0x4
25,878,106 UART: [art] Derive Key Pair
25,879,105 UART: [art] Store priv key in slot 0x5
29,172,315 UART: [art] Derive Key Pair - Done
29,185,544 UART: [art] Signing Cert with AUTHO
29,186,851 UART: RITY.KEYID = 7
31,473,813 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,324 UART: [art] PUB.X = C09B07BD4F53295113910B8E02EE23CB45E230EC86350C9526ECE0A8AD67D03619C56D9C52C28A9ABAAF904787D9E2AF
31,482,574 UART: [art] PUB.Y = 893940AF13107639F055204BA774CD1324862E10D825296093DAC44CD45AFBEFC539B75E1E238422CAA580DF95F3623B
31,489,796 UART: [art] SIG.R = 7A1D19B003B6E8E772C2DE65A1530010190EF5A07098426226EFB8D4EE419B19D94071E61971D6EE1090297BC88A47CA
31,497,165 UART: [art] SIG.S = 92271463DC84C3C0496C683D8C95F3EEB27403D1CE68676CCA2B7D6FD58DB410BA8AD7AD2307C8DEA1042C422C3D1931
32,802,376 UART: Caliptra RT
32,803,074 UART: [state] CFI Enabled
32,962,989 UART: [rt] RT listening for mailbox commands...
32,965,325 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,995,871 UART: [rt]cmd =0x54514754, len=24
32,998,476 >>> mbox cmd response data (8 bytes)
35,047,781 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,148,477 UART:
35,148,850 UART: Running Caliptra ROM ...
35,149,893 UART:
35,150,043 UART: [state] CFI Enabled
35,207,337 UART: [state] LifecycleState = Unprovisioned
35,209,327 UART: [state] DebugLocked = No
35,211,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,217,111 UART: [kat] SHA2-256
35,386,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,397,311 UART: [kat] ++
35,397,767 UART: [kat] sha1
35,410,006 UART: [kat] SHA2-256
35,412,717 UART: [kat] SHA2-384
35,417,072 UART: [kat] SHA2-512-ACC
35,419,428 UART: [kat] ECC-384
37,708,837 UART: [kat] HMAC-384Kdf
37,720,205 UART: [kat] LMS
38,910,524 UART: [kat] --
38,914,620 UART: [update-reset] ++
42,615,484 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,619,971 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,877,507 >>> mbox cmd response: success
42,877,882 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,878,543 UART: [update-reset] Copying MAN_2 To MAN_1
42,900,983 UART: [update-reset Success] --
42,904,731 UART: [state] Locking Datavault
42,907,233 UART: [state] Locking PCR0, PCR1 and PCR31
42,908,986 UART: [state] Locking ICCM
42,911,381 UART: [exit] Launching FMC @ 0x40000130
42,919,829 UART:
42,920,057 UART: Running Caliptra FMC ...
42,921,082 UART:
42,921,233 UART: [state] CFI Enabled
43,021,923 UART: [art] Extend RT PCRs Done
43,023,117 UART: [art] Lock RT PCRs Done
43,024,547 UART: [art] Populate DV Done
43,030,008 UART: [fht] FMC Alias Private Key: 7
43,031,552 UART: [art] Derive CDI
43,032,297 UART: [art] Store in in slot 0x4
43,090,989 UART: [art] Derive Key Pair
43,092,170 UART: [art] Store priv key in slot 0x5
46,385,093 UART: [art] Derive Key Pair - Done
46,397,790 UART: [art] Signing Cert with AUTHO
46,399,088 UART: RITY.KEYID = 7
48,686,680 UART: [art] Erasing AUTHORITY.KEYID = 7
48,688,191 UART: [art] PUB.X = 843588A4D7D2DC4ADDA10B8A2A86208D51F4EB5FDE9D6A7FFF007F2D5CBD72AEADCDC587A4859E0C81E2100574B7A97A
48,695,462 UART: [art] PUB.Y = E472217EC4A5D3BE4BF544F7DDDCA25DD7EFD310BF3A706E6F9506358208EC2D9F6CAB15F62BD7A5993480CDB03D27C4
48,702,761 UART: [art] SIG.R = CFCC29A928FEA3630779FEE7836149D0E652F281862C5DB2023C4A5A95BA1242C6E530BC0E9C1CD5F1B10EB508BDBB0F
48,710,150 UART: [art] SIG.S = 04BCE2A2D4B2A284434676B3BE895BF3FDB0F856C1360AA25308D7E4E27041B0AB745FA4CCF3119118ED582B12583766
50,014,861 UART: mbox::rt_entry...
50,015,846 UART: ____ _ _ _ ____ _____
50,017,839 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,019,774 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,021,717 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,023,574 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,025,497 UART: |_|
50,026,304 UART:
50,313,341 UART: [rt] Runtime listening for mailbox commands...
50,315,459 >>> mbox cmd response data (120 bytes)
52,361,308 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,461,130 UART:
52,461,511 UART: Running Caliptra ROM ...
52,462,560 UART:
52,462,711 UART: [state] CFI Enabled
52,528,994 UART: [state] LifecycleState = Unprovisioned
52,530,913 UART: [state] DebugLocked = No
52,533,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,539,117 UART: [kat] SHA2-256
52,708,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,719,298 UART: [kat] ++
52,719,840 UART: [kat] sha1
52,731,974 UART: [kat] SHA2-256
52,734,660 UART: [kat] SHA2-384
52,739,829 UART: [kat] SHA2-512-ACC
52,742,175 UART: [kat] ECC-384
55,030,581 UART: [kat] HMAC-384Kdf
55,062,371 UART: [kat] LMS
56,252,718 UART: [kat] --
56,256,514 UART: [update-reset] ++
59,960,767 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,964,492 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
60,222,031 >>> mbox cmd response: success
60,222,440 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,223,859 UART: [update-reset] Copying MAN_2 To MAN_1
60,246,304 UART: [update-reset Success] --
60,248,973 UART: [state] Locking Datavault
60,252,225 UART: [state] Locking PCR0, PCR1 and PCR31
60,253,977 UART: [state] Locking ICCM
60,255,777 UART: [exit] Launching FMC @ 0x40000130
60,264,225 UART:
60,264,456 UART: Running Caliptra FMC ...
60,265,483 UART:
60,265,631 UART: [state] CFI Enabled
60,364,247 UART: [art] Extend RT PCRs Done
60,365,428 UART: [art] Lock RT PCRs Done
60,367,193 UART: [art] Populate DV Done
60,372,272 UART: [fht] FMC Alias Private Key: 7
60,373,914 UART: [art] Derive CDI
60,374,657 UART: [art] Store in in slot 0x4
60,433,289 UART: [art] Derive Key Pair
60,434,287 UART: [art] Store priv key in slot 0x5
63,727,289 UART: [art] Derive Key Pair - Done
63,739,997 UART: [art] Signing Cert with AUTHO
63,741,328 UART: RITY.KEYID = 7
66,028,792 UART: [art] Erasing AUTHORITY.KEYID = 7
66,030,298 UART: [art] PUB.X = 7708C19B1B8682410221EA2A3D16A7ED3F04C42414C3BA557A818FB2EB1ABB8FF9903A325D39A50E24FFE57D8CC56BA4
66,037,554 UART: [art] PUB.Y = 7165B0674A8BCA5F545BA81D7CAE605C3729B811E6A4AFD2800744AE1602F1D558E94C98F2503E80FA0295211740C51B
66,044,787 UART: [art] SIG.R = 8F57D4B1C657340D0A8E4876DBA9EEAFCCD077D9188527FB232456E0186C91A265A31CD8BA47D393ACAFB235ABDDDFF5
66,052,363 UART: [art] SIG.S = 1657CA9E806424EC9549E7942BBB5F2D0F70DEFBE29C1967CB55A1C0441E71E6B084D853A7FA46C23EE7F70FEA10F41E
67,357,038 UART: mbox::rt_entry...
67,358,021 UART: ____ _ _ _ ____ _____
67,360,014 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,362,022 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,363,976 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,365,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,367,835 UART: |_|
67,368,673 UART:
67,652,252 UART: [rt] Runtime listening for mailbox commands...
67,654,366 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,804,864 ready_for_fw is high
3,805,466 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,870,126 >>> mbox cmd response: success
23,566,396 UART:
23,566,798 UART: Running Caliptra FMC ...
23,567,901 UART:
23,568,054 UART: [state] CFI Enabled
23,634,164 UART: [fht] FMC Alias Private Key: 7
25,970,540 UART: [art] Extend RT PCRs Done
25,971,767 UART: [art] Lock RT PCRs Done
25,973,355 UART: [art] Populate DV Done
25,978,937 UART: [fht] FMC Alias Private Key: 7
25,980,524 UART: [art] Derive CDI
25,981,264 UART: [art] Store in in slot 0x4
26,042,789 UART: [art] Derive Key Pair
26,043,833 UART: [art] Store priv key in slot 0x5
29,337,035 UART: [art] Derive Key Pair - Done
29,349,895 UART: [art] Signing Cert with AUTHO
29,351,207 UART: RITY.KEYID = 7
31,638,224 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,737 UART: [art] PUB.X = 9E152E5B5765E3ECC831C4AF0075D4C3295E1A81966B36BB8D4B79D59CB0885C853C6CB12950AA09235E921909BA73DB
31,646,964 UART: [art] PUB.Y = 303FC08C514D66A68701933661F4FF77D1137AA1013F68C5CAFB41FCD1303106992816C1355660D2CACB9145A917F9FD
31,654,162 UART: [art] SIG.R = 91BA567F76CA9A0084E1E308FF6C5BB1C88F795C0765CD0C5921659D392FBCD886B05FF5EAA7F7C47F0DAEF289354BF7
31,661,570 UART: [art] SIG.S = 567C04A66E5A7AF49CAC7F249D5496805613985112A2F2D2946B5851F8B8D2A30942AB52EAEA0B437E1E978F6DADD7BC
32,966,229 UART: Caliptra RT
32,966,947 UART: [state] CFI Enabled
33,129,993 UART: [rt] RT listening for mailbox commands...
33,132,325 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,163,035 UART: [rt]cmd =0x54514754, len=24
33,165,702 >>> mbox cmd response data (8 bytes)
35,213,796 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,172,416 >>> mbox cmd response: success
43,172,901 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,207,393 UART:
43,207,721 UART: Running Caliptra FMC ...
43,208,854 UART:
43,209,016 UART: [state] CFI Enabled
43,313,908 UART: [art] Extend RT PCRs Done
43,315,101 UART: [art] Lock RT PCRs Done
43,316,497 UART: [art] Populate DV Done
43,321,802 UART: [fht] FMC Alias Private Key: 7
43,323,500 UART: [art] Derive CDI
43,324,314 UART: [art] Store in in slot 0x4
43,383,167 UART: [art] Derive Key Pair
43,384,216 UART: [art] Store priv key in slot 0x5
46,677,129 UART: [art] Derive Key Pair - Done
46,689,972 UART: [art] Signing Cert with AUTHO
46,691,279 UART: RITY.KEYID = 7
48,977,474 UART: [art] Erasing AUTHORITY.KEYID = 7
48,978,987 UART: [art] PUB.X = 29F155A88FB7896BAFE1490B552ACF338FD5F4E580860AED61B80EBD7087FBB5F1E532D37E5A00C103DDF621602F8878
48,986,243 UART: [art] PUB.Y = EF775653A2ACED57E71A527E57567AAB86957FEB3A3F9DD1CE5C8C6D1835E8171BC27A2D9FF2158A8598F21C1033D68A
48,993,490 UART: [art] SIG.R = 37EFD59A818640791523DD1A8381C59536EEB3C02BACD5611AB5E3D74F36D35BC59891082193F04F12D60EEF6588DCD3
49,000,836 UART: [art] SIG.S = 977F60A353389B2F389E389CA4A0C20D2DE145A9B8DCE723BD54F591371B46E8CF5D5585FF89FAB5AC054C3BB093D906
50,305,192 UART: mbox::rt_entry...
50,306,161 UART: ____ _ _ _ ____ _____
50,308,097 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,310,116 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,311,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,313,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,316,040 UART: |_|
50,316,861 UART:
50,603,421 UART: [rt] Runtime listening for mailbox commands...
50,605,564 >>> mbox cmd response data (120 bytes)
52,652,241 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,621,406 >>> mbox cmd response: success
60,621,874 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,654,584 UART:
60,654,913 UART: Running Caliptra FMC ...
60,655,962 UART:
60,656,109 UART: [state] CFI Enabled
60,758,349 UART: [art] Extend RT PCRs Done
60,759,543 UART: [art] Lock RT PCRs Done
60,761,022 UART: [art] Populate DV Done
60,766,454 UART: [fht] FMC Alias Private Key: 7
60,767,993 UART: [art] Derive CDI
60,768,725 UART: [art] Store in in slot 0x4
60,827,679 UART: [art] Derive Key Pair
60,828,721 UART: [art] Store priv key in slot 0x5
64,121,713 UART: [art] Derive Key Pair - Done
64,134,884 UART: [art] Signing Cert with AUTHO
64,136,195 UART: RITY.KEYID = 7
66,422,575 UART: [art] Erasing AUTHORITY.KEYID = 7
66,424,087 UART: [art] PUB.X = 8DFF979DB24E0005A27FAB205DF9C093DF4E2AB27B0BC0EE9C7BEF5E374CF86287219EB18664D093929C4441F230AFB6
66,431,351 UART: [art] PUB.Y = 8D0D612786094094F342CF2F1EE372BBD71D0A4D03D61B025E99BE510057380B5E181196B70056CAA9588DCE84556D6E
66,438,542 UART: [art] SIG.R = 5643128286A70519FB957A50D4A9F2801913CEB66B14726342A140EB829E4A5FCA1A7A6523CDD7F44C8C0D18171CCEBC
66,445,937 UART: [art] SIG.S = AB0ABC65CAF47B9AA9A290C1D968677DDC88E84B171EEEB80C85509B0390D0F67B9C5A3DC701825C978CB123DF85CBB6
67,750,355 UART: mbox::rt_entry...
67,751,314 UART: ____ _ _ _ ____ _____
67,753,246 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,755,471 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,757,369 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,759,303 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,761,160 UART: |_|
67,762,043 UART:
68,046,983 UART: [rt] Runtime listening for mailbox commands...
68,049,122 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,769 writing to cptra_bootfsm_go
193,866 UART:
194,226 UART: Running Caliptra ROM ...
195,332 UART:
605,015 UART: [state] CFI Enabled
619,743 UART: [state] LifecycleState = Unprovisioned
621,694 UART: [state] DebugLocked = No
623,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,136 UART: [kat] SHA2-256
797,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,425 UART: [kat] ++
808,872 UART: [kat] sha1
819,311 UART: [kat] SHA2-256
822,025 UART: [kat] SHA2-384
827,446 UART: [kat] SHA2-512-ACC
829,807 UART: [kat] ECC-384
3,113,244 UART: [kat] HMAC-384Kdf
3,125,513 UART: [kat] LMS
4,315,642 UART: [kat] --
4,321,337 UART: [cold-reset] ++
4,322,557 UART: [fht] Storing FHT @ 0x50003400
4,333,041 UART: [idev] ++
4,333,621 UART: [idev] CDI.KEYID = 6
4,334,572 UART: [idev] SUBJECT.KEYID = 7
4,335,815 UART: [idev] UDS.KEYID = 0
4,336,807 ready_for_fw is high
4,337,011 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,767 UART: [idev] Erasing UDS.KEYID = 0
7,625,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,402 UART: [idev] --
7,652,181 UART: [ldev] ++
7,652,750 UART: [ldev] CDI.KEYID = 6
7,653,729 UART: [ldev] SUBJECT.KEYID = 5
7,654,942 UART: [ldev] AUTHORITY.KEYID = 7
7,656,167 UART: [ldev] FE.KEYID = 1
7,668,968 UART: [ldev] Erasing FE.KEYID = 1
10,957,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,524 UART: [ldev] --
13,316,921 UART: [fwproc] Waiting for Commands...
13,319,170 UART: [fwproc] Received command 0x46574c44
13,321,347 UART: [fwproc] Received Image of size 113760 bytes
17,372,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,834,947 >>> mbox cmd response: success
17,839,715 UART: [afmc] ++
17,840,317 UART: [afmc] CDI.KEYID = 6
17,841,229 UART: [afmc] SUBJECT.KEYID = 7
17,842,447 UART: [afmc] AUTHORITY.KEYID = 5
21,158,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,145 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,524 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,367 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,774 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,772 UART: [afmc] --
23,523,391 UART: [cold-reset] --
23,527,781 UART: [state] Locking Datavault
23,532,816 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,509 UART: [state] Locking ICCM
23,535,785 UART: [exit] Launching FMC @ 0x40000130
23,544,186 UART:
23,544,428 UART: Running Caliptra FMC ...
23,545,450 UART:
23,545,592 UART: [state] CFI Enabled
23,554,034 UART: [fht] FMC Alias Private Key: 7
25,885,390 UART: [art] Extend RT PCRs Done
25,886,606 UART: [art] Lock RT PCRs Done
25,888,526 UART: [art] Populate DV Done
25,893,876 UART: [fht] FMC Alias Private Key: 7
25,895,533 UART: [art] Derive CDI
25,896,345 UART: [art] Store in in slot 0x4
25,938,712 UART: [art] Derive Key Pair
25,939,781 UART: [art] Store priv key in slot 0x5
29,181,252 UART: [art] Derive Key Pair - Done
29,194,184 UART: [art] Signing Cert with AUTHO
29,195,508 UART: RITY.KEYID = 7
31,474,735 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,251 UART: [art] PUB.X = 7F8B7AEB680D59D864C51ED301910B684045B59B4FF6AA146D6D7C6EB176310F8ADA0A0396029EC4B042E246367AE857
31,483,462 UART: [art] PUB.Y = AF9E831E51449517355006CF0B17A1BF742185E171B6BC25AE2E45D62009D4EA06C9A8FFF855AF2DAF593B8BEE9D31A2
31,490,721 UART: [art] SIG.R = 5A9213E810047A7A9384C0476B3E1E6CB1087827B981244C656EDF7C639F2830EA856081575DA103A920B88372D5AC6E
31,498,080 UART: [art] SIG.S = 66B6799F6A5E82AF8AB4DC1D72625A9376049D745172784A755FE0730CF21F623DFD0CDD7003FEA83EC8AB6773DAA808
32,803,845 UART: Caliptra RT
32,804,562 UART: [state] CFI Enabled
32,922,919 UART: [rt] RT listening for mailbox commands...
32,925,218 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,955,245 UART: [rt]cmd =0x54514754, len=24
32,957,682 >>> mbox cmd response data (8 bytes)
35,006,681 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
35,106,935 UART:
35,107,324 UART: Running Caliptra ROM ...
35,108,412 UART:
35,108,570 UART: [state] CFI Enabled
35,125,767 UART: [state] LifecycleState = Unprovisioned
35,127,701 UART: [state] DebugLocked = No
35,129,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,134,004 UART: [kat] SHA2-256
35,303,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,314,304 UART: [kat] ++
35,314,758 UART: [kat] sha1
35,324,774 UART: [kat] SHA2-256
35,327,512 UART: [kat] SHA2-384
35,332,900 UART: [kat] SHA2-512-ACC
35,335,296 UART: [kat] ECC-384
37,619,168 UART: [kat] HMAC-384Kdf
37,631,073 UART: [kat] LMS
38,821,135 UART: [kat] --
38,823,841 UART: [update-reset] ++
42,527,460 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,531,075 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
42,788,660 >>> mbox cmd response: success
42,789,049 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,789,562 UART: [update-reset] Copying MAN_2 To MAN_1
42,812,020 UART: [update-reset Success] --
42,816,462 UART: [state] Locking Datavault
42,818,756 UART: [state] Locking PCR0, PCR1 and PCR31
42,820,508 UART: [state] Locking ICCM
42,821,546 UART: [exit] Launching FMC @ 0x40000130
42,829,991 UART:
42,830,223 UART: Running Caliptra FMC ...
42,831,277 UART:
42,831,423 UART: [state] CFI Enabled
42,875,972 UART: [art] Extend RT PCRs Done
42,877,109 UART: [art] Lock RT PCRs Done
42,878,579 UART: [art] Populate DV Done
42,883,923 UART: [fht] FMC Alias Private Key: 7
42,885,486 UART: [art] Derive CDI
42,886,224 UART: [art] Store in in slot 0x4
42,928,863 UART: [art] Derive Key Pair
42,929,859 UART: [art] Store priv key in slot 0x5
46,171,662 UART: [art] Derive Key Pair - Done
46,184,767 UART: [art] Signing Cert with AUTHO
46,186,064 UART: RITY.KEYID = 7
48,465,426 UART: [art] Erasing AUTHORITY.KEYID = 7
48,466,936 UART: [art] PUB.X = 50ECD853FD01E143847182599C2B499306F07F712E3B5E299BD0716299694396B24093AF441ECC46555AF5E4CE548054
48,474,142 UART: [art] PUB.Y = 3A7076BC5D66AE031F661A00A52A372EA8DC41324E4D61377540D349CA9419D77BEADB884990EE0AF8BDF597C7B88602
48,481,424 UART: [art] SIG.R = 73464286282E00111A786FF1BE71410EA6F728D1A2B6C341479A109A8CE556D1B6262F241AFB0BA7E4815FC0E5ED4B3C
48,488,807 UART: [art] SIG.S = 159A1B956AD7288D465226E7F03B5DF0CE51EF0A7876319A8E9A78551CEE32160B1C1C0781FDEA6C4FAB01174ECFA077
49,793,371 UART: mbox::rt_entry...
49,794,340 UART: ____ _ _ _ ____ _____
49,796,266 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,798,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,800,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,802,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,803,977 UART: |_|
49,804,966 UART:
50,092,361 UART: [rt] Runtime listening for mailbox commands...
50,094,482 >>> mbox cmd response data (120 bytes)
52,140,837 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
52,240,512 UART:
52,240,892 UART: Running Caliptra ROM ...
52,242,028 UART:
52,242,198 UART: [state] CFI Enabled
52,256,546 UART: [state] LifecycleState = Unprovisioned
52,258,459 UART: [state] DebugLocked = No
52,259,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,264,852 UART: [kat] SHA2-256
52,434,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,445,105 UART: [kat] ++
52,445,584 UART: [kat] sha1
52,456,671 UART: [kat] SHA2-256
52,459,357 UART: [kat] SHA2-384
52,465,174 UART: [kat] SHA2-512-ACC
52,467,524 UART: [kat] ECC-384
54,752,343 UART: [kat] HMAC-384Kdf
54,765,171 UART: [kat] LMS
55,955,212 UART: [kat] --
55,960,357 UART: [update-reset] ++
59,662,853 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,666,960 UART: [update-reset] Loading Runtime at address 0x40005000 len 53788
59,924,522 >>> mbox cmd response: success
59,924,903 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
59,926,155 UART: [update-reset] Copying MAN_2 To MAN_1
59,948,588 UART: [update-reset Success] --
59,952,491 UART: [state] Locking Datavault
59,956,064 UART: [state] Locking PCR0, PCR1 and PCR31
59,957,821 UART: [state] Locking ICCM
59,960,046 UART: [exit] Launching FMC @ 0x40000130
59,968,491 UART:
59,968,724 UART: Running Caliptra FMC ...
59,969,840 UART:
59,969,994 UART: [state] CFI Enabled
60,013,630 UART: [art] Extend RT PCRs Done
60,014,816 UART: [art] Lock RT PCRs Done
60,016,352 UART: [art] Populate DV Done
60,021,918 UART: [fht] FMC Alias Private Key: 7
60,023,457 UART: [art] Derive CDI
60,024,267 UART: [art] Store in in slot 0x4
60,066,749 UART: [art] Derive Key Pair
60,067,747 UART: [art] Store priv key in slot 0x5
63,309,732 UART: [art] Derive Key Pair - Done
63,322,784 UART: [art] Signing Cert with AUTHO
63,324,086 UART: RITY.KEYID = 7
65,603,268 UART: [art] Erasing AUTHORITY.KEYID = 7
65,604,778 UART: [art] PUB.X = 95851FC81A2688D39B7F0D2CAA676E9ED789AF004C6E23F16090008B09973CED1809EF874ACC116D04FDCB1AD3B7C6CD
65,612,002 UART: [art] PUB.Y = 8508B9554E86A038998E85D9F061B2AC379FB5A765CA532C0A8BE90627C5EDCA90954A28D649DBF45E5038A9E8B02238
65,619,277 UART: [art] SIG.R = 284BC21A078A5527C7EB50DB155EABBC32D848E545D8EA1A8E5C499138F121692425BDDBEEF8B4D24E1FBD42D843225D
65,626,646 UART: [art] SIG.S = 291A89F2BF8AA913287BDD76CA17385A3E706B296416F726E7822119405ED1D07A3BCC546752C16F9CC482C176ECF062
66,930,970 UART: mbox::rt_entry...
66,931,913 UART: ____ _ _ _ ____ _____
66,933,834 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,935,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,937,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,939,683 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,941,605 UART: |_|
66,942,435 UART:
67,226,667 UART: [rt] Runtime listening for mailbox commands...
67,228,798 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,694 writing to cptra_bootfsm_go
4,125,653 ready_for_fw is high
4,126,246 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,642 >>> mbox cmd response: success
23,702,312 UART:
23,702,721 UART: Running Caliptra FMC ...
23,703,823 UART:
23,704,000 UART: [state] CFI Enabled
23,711,905 UART: [fht] FMC Alias Private Key: 7
26,042,646 UART: [art] Extend RT PCRs Done
26,043,878 UART: [art] Lock RT PCRs Done
26,045,622 UART: [art] Populate DV Done
26,051,146 UART: [fht] FMC Alias Private Key: 7
26,052,852 UART: [art] Derive CDI
26,053,671 UART: [art] Store in in slot 0x4
26,096,227 UART: [art] Derive Key Pair
26,097,232 UART: [art] Store priv key in slot 0x5
29,339,051 UART: [art] Derive Key Pair - Done
29,352,161 UART: [art] Signing Cert with AUTHO
29,353,463 UART: RITY.KEYID = 7
31,632,548 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,058 UART: [art] PUB.X = 900F3025028639E0691222F72EB2D5BE4B7A0C8A711C14E7F99A2F71128B7C9F4A40BEFB418D0D33B0572853297ECDC3
31,641,269 UART: [art] PUB.Y = 5752E0F62EEA65BFD8A4772F92EE36BCB38E8B50B982E72AB50FA696291B6821C5023B5C5E3E027BD7E7D541C94B0A14
31,648,546 UART: [art] SIG.R = 8FA3A71370D321E27A8AB6D8F102DDBEDD12E2AABA6E5C3DCF6F1E1F377527AEA6EC3F6947257530AE312CDC7D54C985
31,655,921 UART: [art] SIG.S = C0DA62DF8A76AEE3419CECDDAD67DE0E2B24A9A209E3D294473311391EFFDA222FE5E0A1E1FA3CC9BC291756F94ACC36
32,961,506 UART: Caliptra RT
32,962,226 UART: [state] CFI Enabled
33,079,885 UART: [rt] RT listening for mailbox commands...
33,082,374 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,112,308 UART: [rt]cmd =0x54514754, len=24
33,114,755 >>> mbox cmd response data (8 bytes)
35,163,950 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
43,052,150 >>> mbox cmd response: success
43,052,642 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,087,359 UART:
43,087,705 UART: Running Caliptra FMC ...
43,088,752 UART:
43,088,898 UART: [state] CFI Enabled
43,133,359 UART: [art] Extend RT PCRs Done
43,134,510 UART: [art] Lock RT PCRs Done
43,135,963 UART: [art] Populate DV Done
43,141,755 UART: [fht] FMC Alias Private Key: 7
43,143,400 UART: [art] Derive CDI
43,144,135 UART: [art] Store in in slot 0x4
43,186,583 UART: [art] Derive Key Pair
43,187,632 UART: [art] Store priv key in slot 0x5
46,430,288 UART: [art] Derive Key Pair - Done
46,442,970 UART: [art] Signing Cert with AUTHO
46,444,306 UART: RITY.KEYID = 7
48,723,384 UART: [art] Erasing AUTHORITY.KEYID = 7
48,724,892 UART: [art] PUB.X = 37454D80CD2F2C3A38B6E721C50FC16B93079EACE62ABC92F6ACDA37EC6FB0D7CB0D0CC463BC3BCF599F9FE40DDF343F
48,732,197 UART: [art] PUB.Y = 95F651680C9072EA922816E374DDB6C3D7EF08AF5C29B5FBE242BCCFE8512C2ECD76683E2D8B6C792515B7BD29CA76B8
48,739,420 UART: [art] SIG.R = 218A329FE54A41E338BC90D18F122F52C41DC3EAD971DA92814A3ED8231600B2AED6DE155B0D311B453F70F4FB4D3CA6
48,746,795 UART: [art] SIG.S = AC70D801CE0E71594CB5181DFB603BDC40BD9D0D395D32C95818EBB028D7D7A752D8EE97F3402189FFD68B393FB2DEEC
50,051,715 UART: mbox::rt_entry...
50,052,674 UART: ____ _ _ _ ____ _____
50,054,611 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,056,618 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,058,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,060,484 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,062,415 UART: |_|
50,063,246 UART:
50,346,917 UART: [rt] Runtime listening for mailbox commands...
50,349,018 >>> mbox cmd response data (120 bytes)
52,397,711 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
60,285,546 >>> mbox cmd response: success
60,286,036 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,318,100 UART:
60,318,380 UART: Running Caliptra FMC ...
60,319,498 UART:
60,319,655 UART: [state] CFI Enabled
60,364,182 UART: [art] Extend RT PCRs Done
60,365,375 UART: [art] Lock RT PCRs Done
60,366,839 UART: [art] Populate DV Done
60,372,082 UART: [fht] FMC Alias Private Key: 7
60,373,846 UART: [art] Derive CDI
60,374,664 UART: [art] Store in in slot 0x4
60,417,258 UART: [art] Derive Key Pair
60,418,256 UART: [art] Store priv key in slot 0x5
63,660,325 UART: [art] Derive Key Pair - Done
63,673,075 UART: [art] Signing Cert with AUTHO
63,674,396 UART: RITY.KEYID = 7
65,953,422 UART: [art] Erasing AUTHORITY.KEYID = 7
65,954,934 UART: [art] PUB.X = 2149B16E941CDEE9923CD13002D932B30F22940E6D934ECE4956BFFF5DDA1AD1F109D166CD147C1883F9B2730B3A5FB6
65,962,172 UART: [art] PUB.Y = D72E598F5C36DE0FCF747691ECF1916936A327C1BD36A4F3E3AEFEBBD791FB9F3AD9558BE68F78BC78E5C19111C34CE2
65,969,427 UART: [art] SIG.R = 847B2A81D76ACBE1C90A35361F83F4CD78E2E0FBF405DEC02364B0709451B8EA50C3DFFD7F69D81B70BA8B46ED3808DA
65,976,880 UART: [art] SIG.S = 387020407A8CF1661D04D33AEEDB5D4D8E5D26913814522337DC3E937F00D3AE1A646B4767A50B0FA363E1E4EE95C090
67,281,314 UART: mbox::rt_entry...
67,282,289 UART: ____ _ _ _ ____ _____
67,284,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,286,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,288,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,290,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,292,026 UART: |_|
67,292,827 UART:
67,578,872 UART: [rt] Runtime listening for mailbox commands...
67,581,000 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
192,556 UART:
192,956 UART: Running Caliptra ROM ...
194,119 UART:
194,269 UART: [state] CFI Enabled
264,625 UART: [state] LifecycleState = Unprovisioned
266,495 UART: [state] DebugLocked = No
268,637 UART: [state] WD Timer not started. Device not locked for debugging
273,293 UART: [kat] SHA2-256
452,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,975 UART: [kat] ++
464,502 UART: [kat] sha1
474,884 UART: [kat] SHA2-256
477,957 UART: [kat] SHA2-384
482,664 UART: [kat] SHA2-512-ACC
485,613 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,971,574 UART: [kat] LMS
3,501,053 UART: [kat] --
3,504,844 UART: [cold-reset] ++
3,506,696 UART: [fht] FHT @ 0x50003400
3,517,384 UART: [idev] ++
3,517,943 UART: [idev] CDI.KEYID = 6
3,518,843 UART: [idev] SUBJECT.KEYID = 7
3,520,081 UART: [idev] UDS.KEYID = 0
3,521,006 ready_for_fw is high
3,521,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,781 UART: [idev] Erasing UDS.KEYID = 0
6,031,663 UART: [idev] Sha1 KeyId Algorithm
6,055,118 UART: [idev] --
6,057,816 UART: [ldev] ++
6,058,405 UART: [ldev] CDI.KEYID = 6
6,059,316 UART: [ldev] SUBJECT.KEYID = 5
6,060,568 UART: [ldev] AUTHORITY.KEYID = 7
6,061,701 UART: [ldev] FE.KEYID = 1
6,106,668 UART: [ldev] Erasing FE.KEYID = 1
8,621,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,406,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,595 UART: [ldev] --
10,431,501 UART: [fwproc] Wait for Commands...
10,433,147 UART: [fwproc] Recv command 0x46574c44
10,435,251 UART: [fwproc] Recv'd Img size: 114084 bytes
13,839,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,979,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,296,188 >>> mbox cmd response: success
14,300,345 UART: [afmc] ++
14,300,938 UART: [afmc] CDI.KEYID = 6
14,301,850 UART: [afmc] SUBJECT.KEYID = 7
14,303,008 UART: [afmc] AUTHORITY.KEYID = 5
16,847,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,569,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,571,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,586,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,602,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,618,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,641,784 UART: [afmc] --
18,645,372 UART: [cold-reset] --
18,649,335 UART: [state] Locking Datavault
18,654,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,627 UART: [state] Locking ICCM
18,658,398 UART: [exit] Launching FMC @ 0x40000130
18,666,791 UART:
18,667,022 UART: Running Caliptra FMC ...
18,668,123 UART:
18,668,480 UART: [state] CFI Enabled
18,729,311 UART: [fht] FMC Alias Private Key: 7
20,493,183 UART: [art] Extend RT PCRs Done
20,494,408 UART: [art] Lock RT PCRs Done
20,495,972 UART: [art] Populate DV Done
20,501,484 UART: [fht] FMC Alias Private Key: 7
20,503,018 UART: [art] Derive CDI
20,503,777 UART: [art] Store in in slot 0x4
20,562,008 UART: [art] Derive Key Pair
20,563,053 UART: [art] Store priv key in slot 0x5
23,025,723 UART: [art] Derive Key Pair - Done
23,039,116 UART: [art] Signing Cert with AUTHO
23,040,422 UART: RITY.KEYID = 7
24,752,037 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,526 UART: [art] PUB.X = 57D12D34C8DA519D89C7ECB1E4E2E8499D5A44723FB137CC6A27EA44228A881C63C5BB7CA65D6B1AFF308133BD7562A9
24,760,794 UART: [art] PUB.Y = 8BE005009E76D742700F533629E2F670C91881D63AD1C14E4A4B0BEF1CA20C8A50BE8E8A2D4EC5AEFA47BFC6BCB1A2FC
24,768,061 UART: [art] SIG.R = C0634BF54961D0F7101853A918B5BFF59C9C7C15BC7F6BD1028975BAE41BDBE6ECDB431C32B2BCAC058DF502884271D8
24,775,482 UART: [art] SIG.S = 049EB5AD2BD60F4CA62A173DA05506593A80B3D6CACCEC96394FE468FAC5861CC909BD181AD8985DFC6FD69DD6634407
25,754,198 UART: Caliptra RT
25,754,920 UART: [state] CFI Enabled
25,920,055 UART: [rt] RT listening for mailbox commands...
25,922,460 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,952,912 UART: [rt]cmd =0x54514754, len=24
25,955,552 >>> mbox cmd response data (8 bytes)
28,005,958 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,106,376 UART:
28,106,738 UART: Running Caliptra ROM ...
28,107,831 UART:
28,107,991 UART: [state] CFI Enabled
28,165,908 UART: [state] LifecycleState = Unprovisioned
28,167,777 UART: [state] DebugLocked = No
28,169,060 UART: [state] WD Timer not started. Device not locked for debugging
28,173,678 UART: [kat] SHA2-256
28,352,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,364,400 UART: [kat] ++
28,364,938 UART: [kat] sha1
28,375,505 UART: [kat] SHA2-256
28,378,572 UART: [kat] SHA2-384
28,384,235 UART: [kat] SHA2-512-ACC
28,387,136 UART: [kat] ECC-384
30,847,863 UART: [kat] HMAC-384Kdf
30,872,626 UART: [kat] LMS
31,402,051 UART: [kat] --
31,406,461 UART: [update-reset] ++
34,396,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,398,950 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,656,269 >>> mbox cmd response: success
34,656,694 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,658,085 UART: [update-reset] Copying MAN_2 To MAN_1
34,680,372 UART: [update-reset Success] --
34,684,804 UART: [state] Locking Datavault
34,686,711 UART: [state] Locking PCR0, PCR1 and PCR31
34,688,416 UART: [state] Locking ICCM
34,690,619 UART: [exit] Launching FMC @ 0x40000130
34,699,026 UART:
34,699,279 UART: Running Caliptra FMC ...
34,700,383 UART:
34,700,541 UART: [state] CFI Enabled
34,787,209 UART: [art] Extend RT PCRs Done
34,788,397 UART: [art] Lock RT PCRs Done
34,789,780 UART: [art] Populate DV Done
34,795,351 UART: [fht] FMC Alias Private Key: 7
34,796,892 UART: [art] Derive CDI
34,797,654 UART: [art] Store in in slot 0x4
34,856,280 UART: [art] Derive Key Pair
34,857,331 UART: [art] Store priv key in slot 0x5
37,319,386 UART: [art] Derive Key Pair - Done
37,332,602 UART: [art] Signing Cert with AUTHO
37,333,909 UART: RITY.KEYID = 7
39,045,375 UART: [art] Erasing AUTHORITY.KEYID = 7
39,046,879 UART: [art] PUB.X = 2AA9EFEA00BEDE13EAC3EFA95B15A6E05C8DA84CB7E56D39A0402FA055BBA6326F6CCFDC13F0003A35A1323DB1DDE210
39,054,171 UART: [art] PUB.Y = 6DECF55C8B86E902448FAFC273CBE82B5D7E1106288A526CF4C5A73F8F3ADABC81ECA3A10810FDC1A5C4C1835E735D5E
39,061,446 UART: [art] SIG.R = B5E1F94D21273B639075DFE69A74A7D8F7F59484B69963FB55039A614598BF6059E08FCF010C4455F90FD8BBB0350606
39,068,899 UART: [art] SIG.S = F55EFA3BC5E776F6979F11D63FCD9C5DA8D226E4753E03B8B559FD60308E090C6E8BB9444F1F8D2EC6187C376FDC879F
40,047,424 UART: mbox::rt_entry...
40,048,433 UART: ____ _ _ _ ____ _____
40,050,431 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,052,445 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,054,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,056,308 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,058,236 UART: |_|
40,059,048 UART:
40,345,112 UART: [rt] Runtime listening for mailbox commands...
40,347,242 >>> mbox cmd response data (120 bytes)
42,392,963 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,492,550 UART:
42,492,916 UART: Running Caliptra ROM ...
42,494,043 UART:
42,494,215 UART: [state] CFI Enabled
42,564,073 UART: [state] LifecycleState = Unprovisioned
42,565,960 UART: [state] DebugLocked = No
42,567,666 UART: [state] WD Timer not started. Device not locked for debugging
42,571,846 UART: [kat] SHA2-256
42,750,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,762,543 UART: [kat] ++
42,762,995 UART: [kat] sha1
42,774,900 UART: [kat] SHA2-256
42,777,970 UART: [kat] SHA2-384
42,784,063 UART: [kat] SHA2-512-ACC
42,787,024 UART: [kat] ECC-384
45,248,556 UART: [kat] HMAC-384Kdf
45,270,941 UART: [kat] LMS
45,800,398 UART: [kat] --
45,804,819 UART: [update-reset] ++
48,799,084 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,802,530 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,059,905 >>> mbox cmd response: success
49,060,281 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,060,559 UART: [update-reset] Copying MAN_2 To MAN_1
49,082,783 UART: [update-reset Success] --
49,088,036 UART: [state] Locking Datavault
49,090,433 UART: [state] Locking PCR0, PCR1 and PCR31
49,092,084 UART: [state] Locking ICCM
49,093,587 UART: [exit] Launching FMC @ 0x40000130
49,101,987 UART:
49,102,247 UART: Running Caliptra FMC ...
49,103,353 UART:
49,103,511 UART: [state] CFI Enabled
49,208,394 UART: [art] Extend RT PCRs Done
49,209,582 UART: [art] Lock RT PCRs Done
49,210,926 UART: [art] Populate DV Done
49,216,057 UART: [fht] FMC Alias Private Key: 7
49,217,756 UART: [art] Derive CDI
49,218,564 UART: [art] Store in in slot 0x4
49,277,093 UART: [art] Derive Key Pair
49,278,133 UART: [art] Store priv key in slot 0x5
51,741,110 UART: [art] Derive Key Pair - Done
51,753,955 UART: [art] Signing Cert with AUTHO
51,755,254 UART: RITY.KEYID = 7
53,466,698 UART: [art] Erasing AUTHORITY.KEYID = 7
53,468,207 UART: [art] PUB.X = D4DAABACFE58F5236F975640FE2572D397A6B385E6ECD56447510744155C9DDCDC99A4F38662E441817836279560BCBF
53,475,482 UART: [art] PUB.Y = BDDB9A578F0E98975B736B24B476F987FA11FE4AA452F9A5418219DD37F904CD5D775F8FAE55FA0EFABF555F8CE3C598
53,482,714 UART: [art] SIG.R = 6AF716186BF672EF26CE20DF1BAE73DB5B24537CAD612E5AAE410BF8F2136288143761041C8D4FA493BAAB1103A8C7A7
53,490,134 UART: [art] SIG.S = F8171864E640B576AFB161FDE0CD3C5989F1F1FBF857CA2DBC97510286426EDAC98557FAD74936911174255A0F4248C8
54,468,831 UART: mbox::rt_entry...
54,469,803 UART: ____ _ _ _ ____ _____
54,471,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,473,740 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,475,595 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,477,517 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,479,402 UART: |_|
54,480,233 UART:
54,761,323 UART: [rt] Runtime listening for mailbox commands...
54,763,455 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
3,379,329 ready_for_fw is high
3,379,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,087,060 >>> mbox cmd response: success
18,390,032 UART:
18,390,435 UART: Running Caliptra FMC ...
18,391,548 UART:
18,391,700 UART: [state] CFI Enabled
18,453,818 UART: [fht] FMC Alias Private Key: 7
20,218,504 UART: [art] Extend RT PCRs Done
20,219,719 UART: [art] Lock RT PCRs Done
20,221,291 UART: [art] Populate DV Done
20,226,813 UART: [fht] FMC Alias Private Key: 7
20,228,421 UART: [art] Derive CDI
20,229,235 UART: [art] Store in in slot 0x4
20,287,846 UART: [art] Derive Key Pair
20,288,878 UART: [art] Store priv key in slot 0x5
22,752,154 UART: [art] Derive Key Pair - Done
22,765,307 UART: [art] Signing Cert with AUTHO
22,766,603 UART: RITY.KEYID = 7
24,477,757 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,264 UART: [art] PUB.X = 87B21BBD9E5688F54E7D2E81DD8FA710F8CE9083A52AD161A28637B84765D9C95C421A03D7DBA370ACCE97BA91C4A858
24,486,538 UART: [art] PUB.Y = A2555D5237251FE0CE414E13DD61B99F54BDA21D644D4B80AFA310282E532F4311500B563039251A8822577CF52F937C
24,493,781 UART: [art] SIG.R = DDD30EAA7FAE10A6215FA916B8DE215432918EF3A238763079BB065B50DB45049CC5A98064DDCA609F1439A2333186EE
24,501,212 UART: [art] SIG.S = E433849C8A30DEEB9A1A3391C9379D0BB22C05C81AF559C2EE1935D59EEAB545442C28E2DF6337E08B7CA3749C9B2F69
25,480,074 UART: Caliptra RT
25,480,781 UART: [state] CFI Enabled
25,645,912 UART: [rt] RT listening for mailbox commands...
25,648,301 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,678,902 UART: [rt]cmd =0x54514754, len=24
25,681,505 >>> mbox cmd response data (8 bytes)
27,730,453 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,246,930 >>> mbox cmd response: success
34,247,467 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,282,406 UART:
34,282,739 UART: Running Caliptra FMC ...
34,283,864 UART:
34,284,028 UART: [state] CFI Enabled
34,382,600 UART: [art] Extend RT PCRs Done
34,383,783 UART: [art] Lock RT PCRs Done
34,385,128 UART: [art] Populate DV Done
34,390,498 UART: [fht] FMC Alias Private Key: 7
34,392,030 UART: [art] Derive CDI
34,392,844 UART: [art] Store in in slot 0x4
34,451,588 UART: [art] Derive Key Pair
34,452,625 UART: [art] Store priv key in slot 0x5
36,915,176 UART: [art] Derive Key Pair - Done
36,928,226 UART: [art] Signing Cert with AUTHO
36,929,525 UART: RITY.KEYID = 7
38,641,055 UART: [art] Erasing AUTHORITY.KEYID = 7
38,642,566 UART: [art] PUB.X = FB4F2B176C82CC77B8154735E9BB48BF230938B33704E75F8C93EC61455D99806644A6F486E4D5D013CBF1E7DBB5F660
38,649,854 UART: [art] PUB.Y = 422C505C53649BCAB99DFCDA8E50C550E5D8D17B13414C42D0D9BED596265FDC1106EE60B80B1F4CB3627628D4BBD609
38,657,110 UART: [art] SIG.R = 865ADBFDCF68EB66D965F483B699D797B3EA7F0D08589BA223182DEFD48F990FBC63CD92FA899BFA6852F0E1E546B495
38,664,509 UART: [art] SIG.S = 10D25D9A66E374779D11475A27F44ACE8273C3FDE743F6459D430C5C6D7BB71C3CA5D7D582F111AFC0A561D33BA4BF5C
39,642,939 UART: mbox::rt_entry...
39,643,881 UART: ____ _ _ _ ____ _____
39,645,853 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,647,870 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,649,796 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,651,722 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,653,645 UART: |_|
39,654,455 UART:
39,940,255 UART: [rt] Runtime listening for mailbox commands...
39,942,427 >>> mbox cmd response data (120 bytes)
41,987,129 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,484,707 >>> mbox cmd response: success
48,485,256 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,519,438 UART:
48,519,767 UART: Running Caliptra FMC ...
48,520,920 UART:
48,521,081 UART: [state] CFI Enabled
48,609,569 UART: [art] Extend RT PCRs Done
48,610,760 UART: [art] Lock RT PCRs Done
48,612,212 UART: [art] Populate DV Done
48,617,886 UART: [fht] FMC Alias Private Key: 7
48,619,418 UART: [art] Derive CDI
48,620,177 UART: [art] Store in in slot 0x4
48,678,158 UART: [art] Derive Key Pair
48,679,195 UART: [art] Store priv key in slot 0x5
51,141,935 UART: [art] Derive Key Pair - Done
51,154,714 UART: [art] Signing Cert with AUTHO
51,156,018 UART: RITY.KEYID = 7
52,867,506 UART: [art] Erasing AUTHORITY.KEYID = 7
52,869,013 UART: [art] PUB.X = 344E90199F558E5EE7FD4EC0400D18F4AA307F194BD5580B92545423151F4BCF0355B83696863E57BBEEEBFF3654FCDE
52,876,249 UART: [art] PUB.Y = 69217A5EF13131DCF5FD7A721CEC8C224789AE05B2D634418186E13D1EF40F7DC9C8D3877743ED4A9B16B88D3A13BA3A
52,883,522 UART: [art] SIG.R = F4E359B0F291D7FA9CCDD6734A75C1DBF4737DD90A79D3030F3F61713C573DDDBB0DFC4883FE39F094CC712D7E20F259
52,890,961 UART: [art] SIG.S = 828A5DDE035AA4C4FA0F308429C7723582EFBA633C87038657C3605E3B4A81F7C1EC9AD83D76CABB460604215E085914
53,869,257 UART: mbox::rt_entry...
53,870,201 UART: ____ _ _ _ ____ _____
53,872,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,874,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,876,112 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,878,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,879,905 UART: |_|
53,880,707 UART:
54,166,289 UART: [rt] Runtime listening for mailbox commands...
54,168,403 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,844 writing to cptra_bootfsm_go
192,917 UART:
193,337 UART: Running Caliptra ROM ...
194,542 UART:
604,033 UART: [state] CFI Enabled
619,331 UART: [state] LifecycleState = Unprovisioned
621,208 UART: [state] DebugLocked = No
622,454 UART: [state] WD Timer not started. Device not locked for debugging
625,705 UART: [kat] SHA2-256
804,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,399 UART: [kat] ++
816,850 UART: [kat] sha1
827,721 UART: [kat] SHA2-256
830,723 UART: [kat] SHA2-384
836,745 UART: [kat] SHA2-512-ACC
839,655 UART: [kat] ECC-384
3,282,712 UART: [kat] HMAC-384Kdf
3,295,955 UART: [kat] LMS
3,825,430 UART: [kat] --
3,830,352 UART: [cold-reset] ++
3,832,006 UART: [fht] FHT @ 0x50003400
3,842,497 UART: [idev] ++
3,843,063 UART: [idev] CDI.KEYID = 6
3,843,983 UART: [idev] SUBJECT.KEYID = 7
3,845,161 UART: [idev] UDS.KEYID = 0
3,846,214 ready_for_fw is high
3,846,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,706 UART: [idev] Erasing UDS.KEYID = 0
6,313,659 UART: [idev] Sha1 KeyId Algorithm
6,335,962 UART: [idev] --
6,340,010 UART: [ldev] ++
6,340,584 UART: [ldev] CDI.KEYID = 6
6,341,462 UART: [ldev] SUBJECT.KEYID = 5
6,342,672 UART: [ldev] AUTHORITY.KEYID = 7
6,343,882 UART: [ldev] FE.KEYID = 1
6,354,803 UART: [ldev] Erasing FE.KEYID = 1
8,830,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,183 UART: [ldev] --
10,619,904 UART: [fwproc] Wait for Commands...
10,621,562 UART: [fwproc] Recv command 0x46574c44
10,623,604 UART: [fwproc] Recv'd Img size: 114084 bytes
14,016,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,476,644 >>> mbox cmd response: success
14,480,180 UART: [afmc] ++
14,480,801 UART: [afmc] CDI.KEYID = 6
14,481,725 UART: [afmc] SUBJECT.KEYID = 7
14,482,837 UART: [afmc] AUTHORITY.KEYID = 5
16,982,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,699 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,944 UART: [afmc] --
18,778,280 UART: [cold-reset] --
18,781,982 UART: [state] Locking Datavault
18,786,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,753 UART: [state] Locking ICCM
18,789,850 UART: [exit] Launching FMC @ 0x40000130
18,798,250 UART:
18,798,506 UART: Running Caliptra FMC ...
18,799,613 UART:
18,799,772 UART: [state] CFI Enabled
18,807,553 UART: [fht] FMC Alias Private Key: 7
20,564,155 UART: [art] Extend RT PCRs Done
20,565,368 UART: [art] Lock RT PCRs Done
20,566,877 UART: [art] Populate DV Done
20,572,187 UART: [fht] FMC Alias Private Key: 7
20,573,780 UART: [art] Derive CDI
20,574,598 UART: [art] Store in in slot 0x4
20,617,201 UART: [art] Derive Key Pair
20,618,240 UART: [art] Store priv key in slot 0x5
23,045,492 UART: [art] Derive Key Pair - Done
23,058,659 UART: [art] Signing Cert with AUTHO
23,059,965 UART: RITY.KEYID = 7
24,765,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,716 UART: [art] PUB.X = 1DA14478732EC084C166E9C4DE8070D419958335E3D8C218097FF68F9B78A47D39D3DFFBD3255F81A724FB88B2679370
24,773,937 UART: [art] PUB.Y = 1A06B9D903067653A528C724A52C067E2FEC7AF8C3070ABFEF56322A587C700E232B62EBD30C9B8E39E9373DF2DA7DEA
24,781,255 UART: [art] SIG.R = C1BBE3E5B9FBCA3A7A247CFFC7AAB25C2FA6E0BA41F9D0A56F41BB3D06A7F94755323D38BEC1FE1DE4B0FE389D727CD2
24,788,678 UART: [art] SIG.S = C74F0A3DFDA6BE6F2FB6B2B22CE3F5DD1117AD9348DD422D07A96DD2DB6893F26447F8A831AE336B93E02C85AF3A084C
25,767,411 UART: Caliptra RT
25,768,121 UART: [state] CFI Enabled
25,885,796 UART: [rt] RT listening for mailbox commands...
25,888,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,917,806 UART: [rt]cmd =0x54514754, len=24
25,920,355 >>> mbox cmd response data (8 bytes)
27,969,381 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,069,740 UART:
28,070,144 UART: Running Caliptra ROM ...
28,071,199 UART:
28,071,353 UART: [state] CFI Enabled
28,084,604 UART: [state] LifecycleState = Unprovisioned
28,086,439 UART: [state] DebugLocked = No
28,087,846 UART: [state] WD Timer not started. Device not locked for debugging
28,091,810 UART: [kat] SHA2-256
28,271,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,282,580 UART: [kat] ++
28,283,041 UART: [kat] sha1
28,294,950 UART: [kat] SHA2-256
28,297,958 UART: [kat] SHA2-384
28,304,591 UART: [kat] SHA2-512-ACC
28,307,539 UART: [kat] ECC-384
30,749,185 UART: [kat] HMAC-384Kdf
30,762,000 UART: [kat] LMS
31,291,534 UART: [kat] --
31,298,029 UART: [update-reset] ++
34,290,899 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,294,392 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
34,551,749 >>> mbox cmd response: success
34,552,137 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,552,420 UART: [update-reset] Copying MAN_2 To MAN_1
34,574,546 UART: [update-reset Success] --
34,578,075 UART: [state] Locking Datavault
34,581,392 UART: [state] Locking PCR0, PCR1 and PCR31
34,583,101 UART: [state] Locking ICCM
34,585,090 UART: [exit] Launching FMC @ 0x40000130
34,593,498 UART:
34,593,774 UART: Running Caliptra FMC ...
34,594,891 UART:
34,595,054 UART: [state] CFI Enabled
34,639,412 UART: [art] Extend RT PCRs Done
34,640,561 UART: [art] Lock RT PCRs Done
34,641,899 UART: [art] Populate DV Done
34,647,362 UART: [fht] FMC Alias Private Key: 7
34,648,949 UART: [art] Derive CDI
34,649,763 UART: [art] Store in in slot 0x4
34,692,449 UART: [art] Derive Key Pair
34,693,493 UART: [art] Store priv key in slot 0x5
37,120,305 UART: [art] Derive Key Pair - Done
37,133,087 UART: [art] Signing Cert with AUTHO
37,134,398 UART: RITY.KEYID = 7
38,839,160 UART: [art] Erasing AUTHORITY.KEYID = 7
38,840,709 UART: [art] PUB.X = C8592B9857F324D29280CFFFC7B2BD9B444EB114071D6282D58F0E1938266A1624DDB3F2A96C044A5B92B1FD26D4D626
38,847,929 UART: [art] PUB.Y = E23CEA3B75212A34526A8B70D2277E34DE19F15A1C01E9FAE7E6FBE09D08E6072C13ED8067BA85B9A943455919A89AC1
38,855,203 UART: [art] SIG.R = D8B884298E84B9805357417261ABC7AAC9817B879DB1C82F280EF4AD10BBF64867F63877AC1C6AFD0C19242A7444A8EF
38,862,556 UART: [art] SIG.S = B1B2C9768078D13CBEE619AB5F36FCDD5ECEB08969F684EAB82835C1CB916D38160432EF7847BA2BDE09A3F0E6E0D9A6
39,841,786 UART: mbox::rt_entry...
39,842,758 UART: ____ _ _ _ ____ _____
39,844,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,846,758 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,848,691 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,850,623 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,852,553 UART: |_|
39,853,394 UART:
40,140,400 UART: [rt] Runtime listening for mailbox commands...
40,142,657 >>> mbox cmd response data (120 bytes)
42,196,891 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,296,507 UART:
42,296,903 UART: Running Caliptra ROM ...
42,298,041 UART:
42,298,218 UART: [state] CFI Enabled
42,312,699 UART: [state] LifecycleState = Unprovisioned
42,314,597 UART: [state] DebugLocked = No
42,317,225 UART: [state] WD Timer not started. Device not locked for debugging
42,320,480 UART: [kat] SHA2-256
42,499,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,511,270 UART: [kat] ++
42,511,728 UART: [kat] sha1
42,523,757 UART: [kat] SHA2-256
42,526,767 UART: [kat] SHA2-384
42,532,766 UART: [kat] SHA2-512-ACC
42,535,709 UART: [kat] ECC-384
44,974,821 UART: [kat] HMAC-384Kdf
44,988,665 UART: [kat] LMS
45,518,165 UART: [kat] --
45,520,967 UART: [update-reset] ++
48,506,532 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,509,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
48,766,896 >>> mbox cmd response: success
48,767,281 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,767,573 UART: [update-reset] Copying MAN_2 To MAN_1
48,789,901 UART: [update-reset Success] --
48,793,813 UART: [state] Locking Datavault
48,795,880 UART: [state] Locking PCR0, PCR1 and PCR31
48,797,526 UART: [state] Locking ICCM
48,799,650 UART: [exit] Launching FMC @ 0x40000130
48,808,098 UART:
48,808,336 UART: Running Caliptra FMC ...
48,809,363 UART:
48,809,513 UART: [state] CFI Enabled
48,853,874 UART: [art] Extend RT PCRs Done
48,855,067 UART: [art] Lock RT PCRs Done
48,856,363 UART: [art] Populate DV Done
48,861,992 UART: [fht] FMC Alias Private Key: 7
48,863,638 UART: [art] Derive CDI
48,864,454 UART: [art] Store in in slot 0x4
48,907,315 UART: [art] Derive Key Pair
48,908,317 UART: [art] Store priv key in slot 0x5
51,335,452 UART: [art] Derive Key Pair - Done
51,348,500 UART: [art] Signing Cert with AUTHO
51,349,804 UART: RITY.KEYID = 7
53,054,785 UART: [art] Erasing AUTHORITY.KEYID = 7
53,056,298 UART: [art] PUB.X = A3673F1B3479D9F020338A85484D7ECF0DF4FC7A98364E0296D34548E1340868E5D193FAAF381AE2DDEABB53749F15B5
53,063,520 UART: [art] PUB.Y = 1DBC626634E223270197A215241D8A125576A3B147306B0DD1F458EE0466E0726CEB5DC0D94318BF0EB1C8503613975C
53,070,788 UART: [art] SIG.R = 7C17F6CE5CD3380A8489244926D280CD319A17B72D92FDABA459FB8E8FD716E1AABA10EE0C1F4A0F6889E4912F6EC6EC
53,078,239 UART: [art] SIG.S = 37B0DC90445B35DF90D40B70C17C4BEC51B749A3E37F4077CC3BBE5003B80D1F8203A2899637A04BB2F907668FBE2582
54,056,744 UART: mbox::rt_entry...
54,057,718 UART: ____ _ _ _ ____ _____
54,059,710 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,061,725 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,063,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,065,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,067,459 UART: |_|
54,068,260 UART:
54,354,512 UART: [rt] Runtime listening for mailbox commands...
54,356,685 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
3,697,198 ready_for_fw is high
3,697,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,598 >>> mbox cmd response: success
18,503,661 UART:
18,504,067 UART: Running Caliptra FMC ...
18,505,274 UART:
18,505,447 UART: [state] CFI Enabled
18,513,172 UART: [fht] FMC Alias Private Key: 7
20,269,277 UART: [art] Extend RT PCRs Done
20,270,516 UART: [art] Lock RT PCRs Done
20,272,143 UART: [art] Populate DV Done
20,277,665 UART: [fht] FMC Alias Private Key: 7
20,279,151 UART: [art] Derive CDI
20,279,921 UART: [art] Store in in slot 0x4
20,322,576 UART: [art] Derive Key Pair
20,323,613 UART: [art] Store priv key in slot 0x5
22,750,489 UART: [art] Derive Key Pair - Done
22,763,810 UART: [art] Signing Cert with AUTHO
22,765,111 UART: RITY.KEYID = 7
24,470,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,329 UART: [art] PUB.X = 882A818ED9E2D71FB7A064B8B16189E34B02B6DFAF13C9BC548D5FC4DD2ADC6415053DCA6D034686832E2E47A77C3C0E
24,479,623 UART: [art] PUB.Y = 841A2768DB9628532C60AB1E3CCBF0E53B32025A2A0EB1E665E2C743A57AD9F255C1A731C8335F841B861CF652A37930
24,486,856 UART: [art] SIG.R = E5668B463DBDF1DFBAA3331AF79E8CC3D4E903197BB41054306706AE56B17CE030E44F2620A376F5613007FC1E61AF88
24,494,240 UART: [art] SIG.S = AE6B86B0AA1A1D510E92A2016FF98FAC1EBE50A7C48F826E4A8B430E999E89D312B69CEF0F449EFD5B32BC2B3B314D9F
25,472,657 UART: Caliptra RT
25,473,391 UART: [state] CFI Enabled
25,590,897 UART: [rt] RT listening for mailbox commands...
25,593,203 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,623,245 UART: [rt]cmd =0x54514754, len=24
25,625,929 >>> mbox cmd response data (8 bytes)
27,674,781 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
34,118,167 >>> mbox cmd response: success
34,118,703 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,152,057 UART:
34,152,353 UART: Running Caliptra FMC ...
34,153,388 UART:
34,153,537 UART: [state] CFI Enabled
34,197,051 UART: [art] Extend RT PCRs Done
34,198,243 UART: [art] Lock RT PCRs Done
34,199,931 UART: [art] Populate DV Done
34,205,292 UART: [fht] FMC Alias Private Key: 7
34,206,780 UART: [art] Derive CDI
34,207,517 UART: [art] Store in in slot 0x4
34,250,056 UART: [art] Derive Key Pair
34,251,098 UART: [art] Store priv key in slot 0x5
36,678,246 UART: [art] Derive Key Pair - Done
36,690,876 UART: [art] Signing Cert with AUTHO
36,692,185 UART: RITY.KEYID = 7
38,397,901 UART: [art] Erasing AUTHORITY.KEYID = 7
38,399,418 UART: [art] PUB.X = 07785EFE4E259D739A75DD935DDF6E032C28509BABD14EB7716F5C2D3ACFA9FACF60FF139B12CDCD0A43BD4684C286D9
38,406,688 UART: [art] PUB.Y = 7A96C09D24F1F0811DA16717995BEC601AE87808DB6B3B11C0AF175CCA117BF065DC0AE86DABA86C854915D763F753A4
38,413,955 UART: [art] SIG.R = A76D5A703110035C89A5CF9EBE80C0DD4487555224491F9517D88BA3D2F3B43F7F0C3EA62684868EC631928A27C6D320
38,421,320 UART: [art] SIG.S = 238F6F715386D0085682B69B9994D1D804C5C6A7C1FF67B317F99DAE248936244086024FE76D6245DD58D5E932A852BA
39,399,656 UART: mbox::rt_entry...
39,400,607 UART: ____ _ _ _ ____ _____
39,402,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,404,599 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,406,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,408,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,410,391 UART: |_|
39,411,247 UART:
39,697,157 UART: [rt] Runtime listening for mailbox commands...
39,699,307 >>> mbox cmd response data (120 bytes)
41,745,908 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
48,186,511 >>> mbox cmd response: success
48,187,006 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,221,019 UART:
48,221,326 UART: Running Caliptra FMC ...
48,222,444 UART:
48,222,605 UART: [state] CFI Enabled
48,266,798 UART: [art] Extend RT PCRs Done
48,267,992 UART: [art] Lock RT PCRs Done
48,269,345 UART: [art] Populate DV Done
48,274,970 UART: [fht] FMC Alias Private Key: 7
48,276,518 UART: [art] Derive CDI
48,277,339 UART: [art] Store in in slot 0x4
48,319,410 UART: [art] Derive Key Pair
48,320,471 UART: [art] Store priv key in slot 0x5
50,747,351 UART: [art] Derive Key Pair - Done
50,760,452 UART: [art] Signing Cert with AUTHO
50,761,758 UART: RITY.KEYID = 7
52,467,097 UART: [art] Erasing AUTHORITY.KEYID = 7
52,468,593 UART: [art] PUB.X = DA186E1473C44E8490E67F95A7A758F4909B0A5D59515ACCFDC9EC22925F4DC17791E31CCAF949FAFE7C6B76DFBF4FFB
52,475,862 UART: [art] PUB.Y = 093CE345F23685ABB81B03D7707BB0C817DDC425CFE3416E2DC138F70124EC139C4DE9633B580A888D24B53A658EBDD9
52,483,162 UART: [art] SIG.R = 0E6D6485F10D52FF4FAF519D06311B5C4EC0E64517D0574660CBDD45C998B3DFBE6E224CFC10683E8044A79E1C846208
52,490,555 UART: [art] SIG.S = 2521E69E464021DBE71A4864B1288BBEB7E5FA8667E004CECCA17FAC55021EEA7F2625AA8B6CAE1A0F45230DE6A7BF74
53,469,082 UART: mbox::rt_entry...
53,470,029 UART: ____ _ _ _ ____ _____
53,472,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,474,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,475,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,477,886 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,479,814 UART: |_|
53,480,650 UART:
53,764,501 UART: [rt] Runtime listening for mailbox commands...
53,766,619 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,399 UART:
192,772 UART: Running Caliptra ROM ...
193,915 UART:
194,057 UART: [state] CFI Enabled
263,068 UART: [state] LifecycleState = Unprovisioned
265,509 UART: [state] DebugLocked = No
267,542 UART: [state] WD Timer not started. Device not locked for debugging
272,015 UART: [kat] SHA2-256
461,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,649 UART: [kat] ++
473,128 UART: [kat] sha1
484,144 UART: [kat] SHA2-256
487,157 UART: [kat] SHA2-384
494,211 UART: [kat] SHA2-512-ACC
496,791 UART: [kat] ECC-384
2,948,573 UART: [kat] HMAC-384Kdf
2,971,750 UART: [kat] LMS
3,503,505 UART: [kat] --
3,507,217 UART: [cold-reset] ++
3,508,506 UART: [fht] FHT @ 0x50003400
3,520,474 UART: [idev] ++
3,521,207 UART: [idev] CDI.KEYID = 6
3,522,116 UART: [idev] SUBJECT.KEYID = 7
3,523,363 UART: [idev] UDS.KEYID = 0
3,524,284 ready_for_fw is high
3,524,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,961 UART: [idev] Erasing UDS.KEYID = 0
6,027,793 UART: [idev] Sha1 KeyId Algorithm
6,050,014 UART: [idev] --
6,054,375 UART: [ldev] ++
6,055,071 UART: [ldev] CDI.KEYID = 6
6,055,962 UART: [ldev] SUBJECT.KEYID = 5
6,057,176 UART: [ldev] AUTHORITY.KEYID = 7
6,058,358 UART: [ldev] FE.KEYID = 1
6,098,520 UART: [ldev] Erasing FE.KEYID = 1
8,608,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,120 UART: [ldev] --
10,410,598 UART: [fwproc] Wait for Commands...
10,412,797 UART: [fwproc] Recv command 0x46574c44
10,415,105 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,048,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,590,565 >>> mbox cmd response: success
14,594,349 UART: [afmc] ++
14,595,065 UART: [afmc] CDI.KEYID = 6
14,596,313 UART: [afmc] SUBJECT.KEYID = 7
14,597,752 UART: [afmc] AUTHORITY.KEYID = 5
17,124,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,956 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,168 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,919,988 UART: [afmc] --
18,923,144 UART: [cold-reset] --
18,927,614 UART: [state] Locking Datavault
18,933,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,475 UART: [state] Locking ICCM
18,937,616 UART: [exit] Launching FMC @ 0x40000130
18,946,297 UART:
18,946,531 UART: Running Caliptra FMC ...
18,947,559 UART:
18,947,705 UART: [state] CFI Enabled
19,006,172 UART: [fht] FMC Alias Private Key: 7
20,770,756 UART: [art] Extend RT PCRs Done
20,771,976 UART: [art] Lock RT PCRs Done
20,774,005 UART: [art] Populate DV Done
20,779,308 UART: [fht] FMC Alias Private Key: 7
20,780,957 UART: [art] Derive CDI
20,781,770 UART: [art] Store in in slot 0x4
20,838,600 UART: [art] Derive Key Pair
20,839,593 UART: [art] Store priv key in slot 0x5
23,302,295 UART: [art] Derive Key Pair - Done
23,315,608 UART: [art] Signing Cert with AUTHO
23,316,911 UART: RITY.KEYID = 7
25,028,722 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,231 UART: [art] PUB.X = C351E2CB1B3C309EE9842F343845CFA03ACA7EF4F4DE22B8910CD453C2EA9069B714A2D88DE83678DC9F40AB142B8D29
25,037,518 UART: [art] PUB.Y = CAC6E01A9CE771D933BA29DFF8A3C7F55A6F798A3B6D8E038106E0442EFB98CEE26D545B84E0631B43235A4874F7CF45
25,044,822 UART: [art] SIG.R = 9CB1AE1E90D2FC3CA4CB9FC3B4F4A787A8C486BE3B691A5175CE9C7612D0A794567FB2B957579EED627C15CE9BC1DE5D
25,052,238 UART: [art] SIG.S = CDE96C1CF1D30C914401FB16CF92A3D36F3A256F37EAB6FDF57281882A7310155E3776A3A32C7A02B6C4BE4A136B955B
26,031,537 UART: Caliptra RT
26,032,231 UART: [state] CFI Enabled
26,196,809 UART: [rt] RT listening for mailbox commands...
26,199,185 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,229,994 UART: [rt]cmd =0x54514754, len=24
26,232,366 >>> mbox cmd response data (8 bytes)
28,280,541 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,381,187 UART:
28,381,554 UART: Running Caliptra ROM ...
28,382,739 UART:
28,382,905 UART: [state] CFI Enabled
28,437,418 UART: [state] LifecycleState = Unprovisioned
28,439,521 UART: [state] DebugLocked = No
28,441,476 UART: [state] WD Timer not started. Device not locked for debugging
28,446,575 UART: [kat] SHA2-256
28,636,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,647,185 UART: [kat] ++
28,647,635 UART: [kat] sha1
28,658,630 UART: [kat] SHA2-256
28,661,658 UART: [kat] SHA2-384
28,667,658 UART: [kat] SHA2-512-ACC
28,670,236 UART: [kat] ECC-384
31,124,727 UART: [kat] HMAC-384Kdf
31,146,582 UART: [kat] LMS
31,678,162 UART: [kat] --
31,681,456 UART: [update-reset] ++
34,701,562 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,705,055 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,097,377 >>> mbox cmd response: success
35,097,769 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,098,062 UART: [update-reset] Copying MAN_2 To MAN_1
35,135,261 UART: [update-reset Success] --
35,138,944 UART: [state] Locking Datavault
35,141,993 UART: [state] Locking PCR0, PCR1 and PCR31
35,144,159 UART: [state] Locking ICCM
35,146,858 UART: [exit] Launching FMC @ 0x40000130
35,155,545 UART:
35,155,779 UART: Running Caliptra FMC ...
35,156,879 UART:
35,157,037 UART: [state] CFI Enabled
35,254,171 UART: [art] Extend RT PCRs Done
35,255,362 UART: [art] Lock RT PCRs Done
35,256,760 UART: [art] Populate DV Done
35,262,278 UART: [fht] FMC Alias Private Key: 7
35,263,880 UART: [art] Derive CDI
35,264,694 UART: [art] Store in in slot 0x4
35,323,382 UART: [art] Derive Key Pair
35,324,374 UART: [art] Store priv key in slot 0x5
37,787,264 UART: [art] Derive Key Pair - Done
37,800,428 UART: [art] Signing Cert with AUTHO
37,801,730 UART: RITY.KEYID = 7
39,513,369 UART: [art] Erasing AUTHORITY.KEYID = 7
39,514,882 UART: [art] PUB.X = 358503AE693A53EC4662BF7C2B9855CA6DA5684C1C332901D74205EE7D68DF0D8FFD29BD7EDD48598F3801E55DEAFE14
39,522,152 UART: [art] PUB.Y = E836ABE42B17260A0A8E379A424E5DADC15D01D1C7E937D9457F0060433EE1C51B9D16A875470B71E6250FB2AF89135C
39,529,357 UART: [art] SIG.R = 6A7CF3FF4190F9B7E2467CEC0B36B63C1135B9D0FED276EF77D00559BE394CA1A5BC3CE42B6C28FBC0F2CBB66035E616
39,536,778 UART: [art] SIG.S = 0549772893034EBD7C9DDA5C62B69A96DB5CA7F7B00DF2FF8BA53D9A8AA8784BA88500EDE382251747C4769F7CFCE11B
40,515,539 UART: mbox::rt_entry...
40,516,500 UART: ____ _ _ _ ____ _____
40,518,479 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,520,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,522,435 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,524,371 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,526,225 UART: |_|
40,527,024 UART:
40,811,663 UART: [rt] Runtime listening for mailbox commands...
40,813,840 >>> mbox cmd response data (120 bytes)
42,860,726 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,960,332 UART:
42,960,705 UART: Running Caliptra ROM ...
42,961,756 UART:
42,961,907 UART: [state] CFI Enabled
43,031,448 UART: [state] LifecycleState = Unprovisioned
43,033,531 UART: [state] DebugLocked = No
43,035,705 UART: [state] WD Timer not started. Device not locked for debugging
43,039,400 UART: [kat] SHA2-256
43,229,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,240,042 UART: [kat] ++
43,240,499 UART: [kat] sha1
43,252,841 UART: [kat] SHA2-256
43,255,852 UART: [kat] SHA2-384
43,261,368 UART: [kat] SHA2-512-ACC
43,263,940 UART: [kat] ECC-384
45,715,407 UART: [kat] HMAC-384Kdf
45,736,078 UART: [kat] LMS
46,267,692 UART: [kat] --
46,272,661 UART: [update-reset] ++
49,292,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,295,059 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,687,352 >>> mbox cmd response: success
49,687,750 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,688,363 UART: [update-reset] Copying MAN_2 To MAN_1
49,725,957 UART: [update-reset Success] --
49,730,087 UART: [state] Locking Datavault
49,732,497 UART: [state] Locking PCR0, PCR1 and PCR31
49,734,665 UART: [state] Locking ICCM
49,736,019 UART: [exit] Launching FMC @ 0x40000130
49,744,706 UART:
49,744,938 UART: Running Caliptra FMC ...
49,745,976 UART:
49,746,123 UART: [state] CFI Enabled
49,843,456 UART: [art] Extend RT PCRs Done
49,844,641 UART: [art] Lock RT PCRs Done
49,845,846 UART: [art] Populate DV Done
49,851,468 UART: [fht] FMC Alias Private Key: 7
49,853,016 UART: [art] Derive CDI
49,853,754 UART: [art] Store in in slot 0x4
49,912,230 UART: [art] Derive Key Pair
49,913,270 UART: [art] Store priv key in slot 0x5
52,375,797 UART: [art] Derive Key Pair - Done
52,388,747 UART: [art] Signing Cert with AUTHO
52,390,056 UART: RITY.KEYID = 7
54,101,038 UART: [art] Erasing AUTHORITY.KEYID = 7
54,102,557 UART: [art] PUB.X = 69D6DFD279ACF050C31C7D6285DD2C16BF029136790029BC245EDE58815C4FA04BF3AF12EF27FE0675FAD10F1ADE931B
54,109,822 UART: [art] PUB.Y = 11381DE537539417FEE6B860BF8E864FCA35CAEF70FA7A5C2BE54FF7511B301344A686326D8E7B9C994DDC9C9E68E5CF
54,117,075 UART: [art] SIG.R = FC78AD8E7AC9D43E37580A0E7F9AD40F72E42ED60868A887B90E2AD980E0547F01D959B7B9C2B8C39A4559E1D59310C0
54,124,501 UART: [art] SIG.S = 2BD8FDC6D37D4450AE8EDB3CB71E75F01DE338DD97F37CB1EE4C4CE10C2CFF7BCAFF332F79A73549BAFEF9C76C567A43
55,102,846 UART: mbox::rt_entry...
55,103,801 UART: ____ _ _ _ ____ _____
55,105,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,107,712 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,109,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,111,546 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,113,397 UART: |_|
55,114,278 UART:
55,402,190 UART: [rt] Runtime listening for mailbox commands...
55,404,306 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,142 writing to cptra_bootfsm_go
3,440,414 ready_for_fw is high
3,440,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,732,341 >>> mbox cmd response: success
19,049,945 UART:
19,050,360 UART: Running Caliptra FMC ...
19,051,560 UART:
19,051,729 UART: [state] CFI Enabled
19,119,830 UART: [fht] FMC Alias Private Key: 7
20,884,546 UART: [art] Extend RT PCRs Done
20,885,764 UART: [art] Lock RT PCRs Done
20,887,388 UART: [art] Populate DV Done
20,892,960 UART: [fht] FMC Alias Private Key: 7
20,894,606 UART: [art] Derive CDI
20,895,415 UART: [art] Store in in slot 0x4
20,953,153 UART: [art] Derive Key Pair
20,954,143 UART: [art] Store priv key in slot 0x5
23,417,032 UART: [art] Derive Key Pair - Done
23,429,983 UART: [art] Signing Cert with AUTHO
23,431,285 UART: RITY.KEYID = 7
25,142,950 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,468 UART: [art] PUB.X = FA5E1198F5D65B46B983BF00F4E3FBB6CAF06940DA84989749CBDD2E9488905324CDA8F169E29DB047BE45468E050945
25,151,704 UART: [art] PUB.Y = CF36749F75390B8A78C8C22C4A6AAA3699AE92C67270D6D34618EEC48B4F233E44C62335E9F4A2D07CCEE6B51451EDC5
25,158,958 UART: [art] SIG.R = 82BFD8DFFBEE55A465AFCE1E2B161673574A5CC81D1DC67C005C514D101CBBBC16D529F8432973E76A220D0E71983058
25,166,342 UART: [art] SIG.S = 9BF38683B5DEB485F06B78F833CDA099C45BE161FF3CE269733F95B1ADCA6A89041B73AD8CD10E4D3B16F97AD2A615B7
26,144,950 UART: Caliptra RT
26,145,665 UART: [state] CFI Enabled
26,312,728 UART: [rt] RT listening for mailbox commands...
26,314,965 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,345,524 UART: [rt]cmd =0x54514754, len=24
26,348,094 >>> mbox cmd response data (8 bytes)
28,396,548 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,390,377 >>> mbox cmd response: success
35,390,975 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,423,682 UART:
35,423,974 UART: Running Caliptra FMC ...
35,425,092 UART:
35,425,255 UART: [state] CFI Enabled
35,519,028 UART: [art] Extend RT PCRs Done
35,520,212 UART: [art] Lock RT PCRs Done
35,521,771 UART: [art] Populate DV Done
35,527,077 UART: [fht] FMC Alias Private Key: 7
35,528,597 UART: [art] Derive CDI
35,529,369 UART: [art] Store in in slot 0x4
35,587,838 UART: [art] Derive Key Pair
35,588,825 UART: [art] Store priv key in slot 0x5
38,051,776 UART: [art] Derive Key Pair - Done
38,064,362 UART: [art] Signing Cert with AUTHO
38,065,665 UART: RITY.KEYID = 7
39,778,420 UART: [art] Erasing AUTHORITY.KEYID = 7
39,779,907 UART: [art] PUB.X = 9EC1A977E275AC7A04F71BC82ACA7CDAC1252A0F422C4D2542C59540044AA17A6C2580B99DFC31A1C979A9C0BA05E3A7
39,787,184 UART: [art] PUB.Y = 5C2884291741CE1D3B78BEB9DE2A4850A954C50E558DE465CDBAA777926C4F31AEB6002EF2FFAF606385502334164A0A
39,794,460 UART: [art] SIG.R = EB4179F49AA76FBB68F8A9C1AD615A8D1C030E6C8E2A6707F560C8C45504DFAD81F28B9D855B4D2C46DF8FD58A2E89E1
39,801,892 UART: [art] SIG.S = DA38F647E285746082365B0F24DD0F072B453722AEB35084317FC1519145F53685830F40DC22C79F67DA7480E2073806
40,780,630 UART: mbox::rt_entry...
40,781,590 UART: ____ _ _ _ ____ _____
40,783,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,785,495 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,787,348 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,789,275 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,791,203 UART: |_|
40,792,008 UART:
41,075,064 UART: [rt] Runtime listening for mailbox commands...
41,077,206 >>> mbox cmd response data (120 bytes)
43,130,116 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
50,132,413 >>> mbox cmd response: success
50,132,943 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,168,685 UART:
50,169,027 UART: Running Caliptra FMC ...
50,170,101 UART:
50,170,253 UART: [state] CFI Enabled
50,260,731 UART: [art] Extend RT PCRs Done
50,261,917 UART: [art] Lock RT PCRs Done
50,263,267 UART: [art] Populate DV Done
50,268,562 UART: [fht] FMC Alias Private Key: 7
50,270,097 UART: [art] Derive CDI
50,270,913 UART: [art] Store in in slot 0x4
50,329,458 UART: [art] Derive Key Pair
50,330,494 UART: [art] Store priv key in slot 0x5
52,793,691 UART: [art] Derive Key Pair - Done
52,806,794 UART: [art] Signing Cert with AUTHO
52,808,128 UART: RITY.KEYID = 7
54,519,412 UART: [art] Erasing AUTHORITY.KEYID = 7
54,520,920 UART: [art] PUB.X = E1C88AAF0CE0C0AF97C76B4DEE2B46DCF20012DE89FDF0340F74516C368EE3F547A45A0F5E0CB866E72E630A29D13BE6
54,528,193 UART: [art] PUB.Y = D97614B9A6ED0E2179BA31D1D1B0FFE4E0B3DD79ABBD64534B643A54EB5769CDE19FAEC1BD67DE5E9C715C9C9AF2AB0F
54,535,468 UART: [art] SIG.R = C46100914D7DAEF4148DA3BE4B8CFFA3DB0C79AB3F88C3B209798CF24BC6061C24087CFED4B7B5902EA6E60354AF47AC
54,542,843 UART: [art] SIG.S = 81D05F8E2890A7D031B19033CE79BBB41AC6AFD88319E0552540D9E1BDF80579469D938634C8F833914CE620E9AD0821
55,521,619 UART: mbox::rt_entry...
55,522,591 UART: ____ _ _ _ ____ _____
55,524,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,526,782 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,528,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,530,640 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,532,582 UART: |_|
55,533,385 UART:
55,823,115 UART: [rt] Runtime listening for mailbox commands...
55,825,292 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,666 writing to cptra_bootfsm_go
192,776 UART:
193,142 UART: Running Caliptra ROM ...
194,357 UART:
603,900 UART: [state] CFI Enabled
618,898 UART: [state] LifecycleState = Unprovisioned
621,288 UART: [state] DebugLocked = No
622,578 UART: [state] WD Timer not started. Device not locked for debugging
627,048 UART: [kat] SHA2-256
816,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,714 UART: [kat] ++
828,260 UART: [kat] sha1
838,639 UART: [kat] SHA2-256
841,660 UART: [kat] SHA2-384
848,791 UART: [kat] SHA2-512-ACC
851,371 UART: [kat] ECC-384
3,292,701 UART: [kat] HMAC-384Kdf
3,304,868 UART: [kat] LMS
3,836,680 UART: [kat] --
3,840,392 UART: [cold-reset] ++
3,842,329 UART: [fht] FHT @ 0x50003400
3,854,588 UART: [idev] ++
3,855,303 UART: [idev] CDI.KEYID = 6
3,856,360 UART: [idev] SUBJECT.KEYID = 7
3,857,466 UART: [idev] UDS.KEYID = 0
3,858,394 ready_for_fw is high
3,858,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,294 UART: [idev] Erasing UDS.KEYID = 0
6,339,437 UART: [idev] Sha1 KeyId Algorithm
6,362,026 UART: [idev] --
6,367,026 UART: [ldev] ++
6,367,726 UART: [ldev] CDI.KEYID = 6
6,368,643 UART: [ldev] SUBJECT.KEYID = 5
6,369,802 UART: [ldev] AUTHORITY.KEYID = 7
6,370,981 UART: [ldev] FE.KEYID = 1
6,381,950 UART: [ldev] Erasing FE.KEYID = 1
8,864,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,671 UART: [ldev] --
10,658,423 UART: [fwproc] Wait for Commands...
10,661,330 UART: [fwproc] Recv command 0x46574c44
10,663,636 UART: [fwproc] Recv'd Img size: 114084 bytes
14,102,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,834,817 >>> mbox cmd response: success
14,838,865 UART: [afmc] ++
14,839,581 UART: [afmc] CDI.KEYID = 6
14,840,830 UART: [afmc] SUBJECT.KEYID = 7
14,842,271 UART: [afmc] AUTHORITY.KEYID = 5
17,346,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,836 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,055 UART: [afmc] --
19,143,096 UART: [cold-reset] --
19,147,731 UART: [state] Locking Datavault
19,152,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,327 UART: [state] Locking ICCM
19,155,837 UART: [exit] Launching FMC @ 0x40000130
19,164,524 UART:
19,164,769 UART: Running Caliptra FMC ...
19,165,875 UART:
19,166,041 UART: [state] CFI Enabled
19,174,203 UART: [fht] FMC Alias Private Key: 7
20,931,877 UART: [art] Extend RT PCRs Done
20,933,118 UART: [art] Lock RT PCRs Done
20,934,747 UART: [art] Populate DV Done
20,940,270 UART: [fht] FMC Alias Private Key: 7
20,941,917 UART: [art] Derive CDI
20,942,734 UART: [art] Store in in slot 0x4
20,985,221 UART: [art] Derive Key Pair
20,986,228 UART: [art] Store priv key in slot 0x5
23,413,443 UART: [art] Derive Key Pair - Done
23,426,273 UART: [art] Signing Cert with AUTHO
23,427,584 UART: RITY.KEYID = 7
25,132,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,262 UART: [art] PUB.X = DDF1698561150B5DB3EE326F2E82BE327C529A7156DDF1864E81863840AD49CCE3BCC44058A60E8E67964A8273FB63DC
25,141,538 UART: [art] PUB.Y = EFBCE5F42EB5EE8559C64119E84390E6471DE64C88CAF57F74657007BABE2665E5F6D34D2CD44DCF94ACB1AA057D3A5F
25,148,825 UART: [art] SIG.R = B6ABB3D85D89306F0801B9287E36AD8CE622E7459DB7EFB97194A0AF3877DECB1DE5FA6FBC7575D5305D2260847DEBF7
25,156,211 UART: [art] SIG.S = E64381EF4FDA178E787DFB8C85DF11A947870D794E335FCAB2C67FB7577565AF2A54B893EFF5782C456DE187C5B4D403
26,135,616 UART: Caliptra RT
26,136,324 UART: [state] CFI Enabled
26,253,598 UART: [rt] RT listening for mailbox commands...
26,255,959 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,285,727 UART: [rt]cmd =0x54514754, len=24
26,288,574 >>> mbox cmd response data (8 bytes)
28,339,310 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
28,439,832 UART:
28,440,210 UART: Running Caliptra ROM ...
28,441,261 UART:
28,441,470 UART: [state] CFI Enabled
28,452,667 UART: [state] LifecycleState = Unprovisioned
28,454,569 UART: [state] DebugLocked = No
28,457,131 UART: [state] WD Timer not started. Device not locked for debugging
28,462,469 UART: [kat] SHA2-256
28,652,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,663,071 UART: [kat] ++
28,663,593 UART: [kat] sha1
28,675,560 UART: [kat] SHA2-256
28,678,563 UART: [kat] SHA2-384
28,683,915 UART: [kat] SHA2-512-ACC
28,686,500 UART: [kat] ECC-384
31,129,461 UART: [kat] HMAC-384Kdf
31,142,673 UART: [kat] LMS
31,674,296 UART: [kat] --
31,680,334 UART: [update-reset] ++
34,702,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,705,369 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
35,097,698 >>> mbox cmd response: success
35,098,095 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,099,578 UART: [update-reset] Copying MAN_2 To MAN_1
35,137,101 UART: [update-reset Success] --
35,140,910 UART: [state] Locking Datavault
35,143,646 UART: [state] Locking PCR0, PCR1 and PCR31
35,145,868 UART: [state] Locking ICCM
35,147,874 UART: [exit] Launching FMC @ 0x40000130
35,156,547 UART:
35,156,790 UART: Running Caliptra FMC ...
35,157,897 UART:
35,158,058 UART: [state] CFI Enabled
35,202,617 UART: [art] Extend RT PCRs Done
35,203,760 UART: [art] Lock RT PCRs Done
35,205,155 UART: [art] Populate DV Done
35,210,615 UART: [fht] FMC Alias Private Key: 7
35,212,260 UART: [art] Derive CDI
35,213,093 UART: [art] Store in in slot 0x4
35,255,656 UART: [art] Derive Key Pair
35,256,718 UART: [art] Store priv key in slot 0x5
37,683,137 UART: [art] Derive Key Pair - Done
37,695,906 UART: [art] Signing Cert with AUTHO
37,697,206 UART: RITY.KEYID = 7
39,402,777 UART: [art] Erasing AUTHORITY.KEYID = 7
39,404,287 UART: [art] PUB.X = 2E686B52E13684158DD6BA97E7F3CF4AA8A75980542D20BB8025437BA99CB13ABB1EB7737C63447EAD26E350406CAE17
39,411,564 UART: [art] PUB.Y = B97AC7A48AF3884C8EA41B9CB79C7B4FFA7275E7A0D6A1D2F9208A70EDF1F60ABDF62081C2B5EE91F9D551E714AC687E
39,418,832 UART: [art] SIG.R = F07BB3D140B6082BD0AA01A2D6E2BD72C79F0F86FD1F1F4766B6B5EDEE00F0612B972D6E071A00FC4128481A0C768970
39,426,201 UART: [art] SIG.S = C55E76F46ECA56ED4CCDC008F2C909D6BF0C5FFFC07E8CDCC135A29F170C2F3737C6D6C909274CBB447CFBB994758B24
40,404,570 UART: mbox::rt_entry...
40,405,528 UART: ____ _ _ _ ____ _____
40,407,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,409,528 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,411,462 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,413,414 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,415,349 UART: |_|
40,416,189 UART:
40,697,290 UART: [rt] Runtime listening for mailbox commands...
40,699,454 >>> mbox cmd response data (120 bytes)
42,747,550 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
42,847,316 UART:
42,847,678 UART: Running Caliptra ROM ...
42,848,740 UART:
42,848,952 UART: [state] CFI Enabled
42,859,833 UART: [state] LifecycleState = Unprovisioned
42,861,734 UART: [state] DebugLocked = No
42,863,703 UART: [state] WD Timer not started. Device not locked for debugging
42,867,530 UART: [kat] SHA2-256
43,057,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,068,189 UART: [kat] ++
43,068,721 UART: [kat] sha1
43,079,825 UART: [kat] SHA2-256
43,082,796 UART: [kat] SHA2-384
43,087,772 UART: [kat] SHA2-512-ACC
43,090,355 UART: [kat] ECC-384
45,533,741 UART: [kat] HMAC-384Kdf
45,547,066 UART: [kat] LMS
46,078,691 UART: [kat] --
46,084,971 UART: [update-reset] ++
49,107,404 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,111,315 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
49,503,592 >>> mbox cmd response: success
49,503,980 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,504,263 UART: [update-reset] Copying MAN_2 To MAN_1
49,541,634 UART: [update-reset Success] --
49,548,097 UART: [state] Locking Datavault
49,552,754 UART: [state] Locking PCR0, PCR1 and PCR31
49,554,917 UART: [state] Locking ICCM
49,557,675 UART: [exit] Launching FMC @ 0x40000130
49,566,311 UART:
49,566,549 UART: Running Caliptra FMC ...
49,567,657 UART:
49,567,816 UART: [state] CFI Enabled
49,612,530 UART: [art] Extend RT PCRs Done
49,613,675 UART: [art] Lock RT PCRs Done
49,615,035 UART: [art] Populate DV Done
49,620,550 UART: [fht] FMC Alias Private Key: 7
49,622,307 UART: [art] Derive CDI
49,623,140 UART: [art] Store in in slot 0x4
49,665,364 UART: [art] Derive Key Pair
49,666,406 UART: [art] Store priv key in slot 0x5
52,093,815 UART: [art] Derive Key Pair - Done
52,106,599 UART: [art] Signing Cert with AUTHO
52,108,084 UART: RITY.KEYID = 7
53,813,585 UART: [art] Erasing AUTHORITY.KEYID = 7
53,815,095 UART: [art] PUB.X = A888DD8ABE62EDAD8945D17A420CC72307C019FC0DDAD068B652638628B3301DDA39EC470BA6EC862CA2A63ADB604BBF
53,822,373 UART: [art] PUB.Y = 909CCC014B62D6911E9AE0BE93B680589842955A41CDA6E0474D052E756F5008A1032D3872028F8A69F8D0D879A43E50
53,829,585 UART: [art] SIG.R = 50DD11120D6FD9DEC41D9CC9B0197655EBE9705AA16CFC991E5DBF16673C931A9CCB27D5C9CC9CCE8DB2EEB72E7AFB5D
53,837,012 UART: [art] SIG.S = A5DC05D0B70C8B3B3E4587F273A8A025475E856C338F0FFDCCABDB1B3F8CE9D95C6E0DA439243E3137A46283CA7343F2
54,815,484 UART: mbox::rt_entry...
54,816,455 UART: ____ _ _ _ ____ _____
54,818,448 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,820,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,822,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,824,364 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,826,220 UART: |_|
54,827,058 UART:
55,111,137 UART: [rt] Runtime listening for mailbox commands...
55,113,311 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,719 writing to cptra_bootfsm_go
3,761,148 ready_for_fw is high
3,761,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,940,342 >>> mbox cmd response: success
19,193,658 UART:
19,194,060 UART: Running Caliptra FMC ...
19,195,252 UART:
19,195,443 UART: [state] CFI Enabled
19,202,909 UART: [fht] FMC Alias Private Key: 7
20,960,008 UART: [art] Extend RT PCRs Done
20,961,244 UART: [art] Lock RT PCRs Done
20,963,311 UART: [art] Populate DV Done
20,968,681 UART: [fht] FMC Alias Private Key: 7
20,970,179 UART: [art] Derive CDI
20,970,944 UART: [art] Store in in slot 0x4
21,013,648 UART: [art] Derive Key Pair
21,014,653 UART: [art] Store priv key in slot 0x5
23,441,608 UART: [art] Derive Key Pair - Done
23,454,720 UART: [art] Signing Cert with AUTHO
23,456,027 UART: RITY.KEYID = 7
25,161,268 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,774 UART: [art] PUB.X = 17E5FBC1B9E93ECE5CF62371FFFF9487FD9D94D599800DDA4252B16BDDFA40160CE299E6EDC14A68633584D6815FFCF7
25,170,079 UART: [art] PUB.Y = 43E61D17659CAF1C97716FA97B09DD9E6A55BA2F4DD0296E09D1D77F6AD25139D29CBD441A85A111D8CAD2BB46FEAEFC
25,177,384 UART: [art] SIG.R = C9F995A3C4C9EE6066DA79D29E9ED9B982C1C5D12CA93CA67AA13BBBDAD2725760784DE21D4D47EDDE2EC72605FCCF6C
25,184,814 UART: [art] SIG.S = 0640DE95DE8546D026F98B16880E9EA558969105BACF25952FD6D1DBF4E37902D3F672DC9F9FC6AEA45EC2CC15E8C66A
26,163,752 UART: Caliptra RT
26,164,466 UART: [state] CFI Enabled
26,281,098 UART: [rt] RT listening for mailbox commands...
26,283,341 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,313,375 UART: [rt]cmd =0x54514754, len=24
26,316,064 >>> mbox cmd response data (8 bytes)
28,364,861 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
35,280,161 >>> mbox cmd response: success
35,280,643 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,317,868 UART:
35,318,186 UART: Running Caliptra FMC ...
35,319,223 UART:
35,319,371 UART: [state] CFI Enabled
35,363,130 UART: [art] Extend RT PCRs Done
35,364,319 UART: [art] Lock RT PCRs Done
35,365,574 UART: [art] Populate DV Done
35,371,111 UART: [fht] FMC Alias Private Key: 7
35,372,816 UART: [art] Derive CDI
35,373,554 UART: [art] Store in in slot 0x4
35,416,147 UART: [art] Derive Key Pair
35,417,141 UART: [art] Store priv key in slot 0x5
37,844,372 UART: [art] Derive Key Pair - Done
37,857,164 UART: [art] Signing Cert with AUTHO
37,858,477 UART: RITY.KEYID = 7
39,563,777 UART: [art] Erasing AUTHORITY.KEYID = 7
39,565,283 UART: [art] PUB.X = 89F1258B9D49E676C5400078A91CEC05C2382D15D7DAEE9E4A6F109CE13980427963430D7960411007346BD0EA3DC933
39,572,549 UART: [art] PUB.Y = 1AB4B71E65DF7FE1EAEBCB1F0E7E585FDB8A06ED335721D11F738D725C14526CE12A5EED30A71372BB7E455CE0099DB5
39,579,827 UART: [art] SIG.R = 992ED21F31B03F121939971C5D6BC61F891A662698958FAE234CB2E4CDCFE423431BF9AB1928696063894DA37B98AEA3
39,587,239 UART: [art] SIG.S = 8A29D51018210D56B433ECD64C5F541A314FF91FBD8CAF8D95DC6F714C2BCF9E30A2483A6E3B263A5120B9221E975896
40,565,379 UART: mbox::rt_entry...
40,566,346 UART: ____ _ _ _ ____ _____
40,568,338 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,570,350 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,572,287 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,574,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,576,084 UART: |_|
40,576,888 UART:
40,861,607 UART: [rt] Runtime listening for mailbox commands...
40,863,735 >>> mbox cmd response data (120 bytes)
42,911,334 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
49,820,709 >>> mbox cmd response: success
49,821,365 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,856,410 UART:
49,856,712 UART: Running Caliptra FMC ...
49,857,754 UART:
49,857,904 UART: [state] CFI Enabled
49,901,940 UART: [art] Extend RT PCRs Done
49,903,128 UART: [art] Lock RT PCRs Done
49,904,700 UART: [art] Populate DV Done
49,909,949 UART: [fht] FMC Alias Private Key: 7
49,911,499 UART: [art] Derive CDI
49,912,319 UART: [art] Store in in slot 0x4
49,954,540 UART: [art] Derive Key Pair
49,955,543 UART: [art] Store priv key in slot 0x5
52,382,835 UART: [art] Derive Key Pair - Done
52,395,889 UART: [art] Signing Cert with AUTHO
52,397,192 UART: RITY.KEYID = 7
54,103,013 UART: [art] Erasing AUTHORITY.KEYID = 7
54,104,521 UART: [art] PUB.X = 5A13B25ECCB0C0E12DD9BAE51DFD9D4FC7B72ACA5D9E2EE7A375C632BF8058DFB8A39C053CA61D46CE2D4CB3E4866D18
54,111,819 UART: [art] PUB.Y = E5A086BAF0D4F2ABF7A3B6E18257D47C288C7B4200127AD6A2213583A0259B3F3F21CD9E7E6C6ED340D88F9A4DDC1D62
54,119,039 UART: [art] SIG.R = 4617FC24AB4ACC989D9E442DE355C006ADAD010A892423357AE5ADA37955056494B282365BA2AF1982B9EFBE4F7FBF18
54,126,488 UART: [art] SIG.S = E04A9B585CF94EE7794A2B45CAED1FD67EE4C615E472BD767C8244AE2C8A9B533710FB82B8471510F54B6521CA0BE4BC
55,104,708 UART: mbox::rt_entry...
55,105,674 UART: ____ _ _ _ ____ _____
55,107,665 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,109,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,111,616 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,113,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,115,472 UART: |_|
55,116,281 UART:
55,402,849 UART: [rt] Runtime listening for mailbox commands...
55,404,968 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,652 UART: [kat] HMAC-384Kdf
907,286 UART: [kat] LMS
1,475,482 UART: [kat] --
1,476,417 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,686 UART: [idev] ++
1,479,854 UART: [idev] CDI.KEYID = 6
1,480,214 UART: [idev] SUBJECT.KEYID = 7
1,480,638 UART: [idev] UDS.KEYID = 0
1,480,983 ready_for_fw is high
1,480,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,056 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,006 UART: [idev] --
1,515,053 UART: [ldev] ++
1,515,221 UART: [ldev] CDI.KEYID = 6
1,515,584 UART: [ldev] SUBJECT.KEYID = 5
1,516,010 UART: [ldev] AUTHORITY.KEYID = 7
1,516,473 UART: [ldev] FE.KEYID = 1
1,521,647 UART: [ldev] Erasing FE.KEYID = 1
1,547,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,519 UART: [fwproc] Waiting for Commands...
1,587,318 UART: [fwproc] Received command 0x46574c44
1,588,109 UART: [fwproc] Received Image of size 114084 bytes
2,883,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,086 >>> mbox cmd response: success
3,077,304 UART: [afmc] ++
3,077,472 UART: [afmc] CDI.KEYID = 6
3,077,834 UART: [afmc] SUBJECT.KEYID = 7
3,078,259 UART: [afmc] AUTHORITY.KEYID = 5
3,113,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,783 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,473 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,196 UART: [afmc] --
3,156,306 UART: [cold-reset] --
3,157,060 UART: [state] Locking Datavault
3,158,053 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,657 UART: [state] Locking ICCM
3,159,179 UART: [exit] Launching FMC @ 0x40000130
3,164,508 UART:
3,164,524 UART: Running Caliptra FMC ...
3,164,932 UART:
3,164,986 UART: [state] CFI Enabled
3,175,733 UART: [fht] FMC Alias Private Key: 7
3,284,512 UART: [art] Extend RT PCRs Done
3,284,940 UART: [art] Lock RT PCRs Done
3,286,318 UART: [art] Populate DV Done
3,294,521 UART: [fht] FMC Alias Private Key: 7
3,295,663 UART: [art] Derive CDI
3,295,943 UART: [art] Store in in slot 0x4
3,381,820 UART: [art] Derive Key Pair
3,382,180 UART: [art] Store priv key in slot 0x5
3,395,056 UART: [art] Derive Key Pair - Done
3,409,706 UART: [art] Signing Cert with AUTHO
3,410,186 UART: RITY.KEYID = 7
3,425,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,395 UART: [art] PUB.X = 2B01C493448B5F61716F0F28EC757D09CED763A01ABC8F835A84062FAEAD34803BB438927CF03F896D2BDD1038F07955
3,433,157 UART: [art] PUB.Y = 45CEA3F242D9ABFDDD0B52802B16A13D408B7000202B5AC00E5B0FCFE38757A02DCED7E32C8128F32ACFD5170B458924
3,440,087 UART: [art] SIG.R = 9DF18C22C19617C8934B3F902EA07593839322EDCE577F25D37535B2A1686FC187C3988484D3985E902B41BD07982021
3,446,842 UART: [art] SIG.S = 60A9CE4B7B97A7AF7DB576F5A74D4FDDBF31273C27CDEA11614B3B0692330C31BED09762035EA91E62FA2B059BC176C8
3,470,647 UART: Caliptra RT
3,470,900 UART: [state] CFI Enabled
3,579,015 UART: [rt] RT listening for mailbox commands...
3,579,685 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,573 UART: [rt]cmd =0x54514754, len=24
3,611,576 >>> mbox cmd response data (8 bytes)
3,611,577 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,529 UART:
3,612,545 UART: Running Caliptra ROM ...
3,612,953 UART:
3,613,007 UART: [state] CFI Enabled
3,615,537 UART: [state] LifecycleState = Unprovisioned
3,616,192 UART: [state] DebugLocked = No
3,616,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,369 UART: [kat] SHA2-256
4,412,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,415 UART: [kat] ++
4,416,567 UART: [kat] sha1
4,420,733 UART: [kat] SHA2-256
4,422,671 UART: [kat] SHA2-384
4,425,530 UART: [kat] SHA2-512-ACC
4,427,430 UART: [kat] ECC-384
4,433,039 UART: [kat] HMAC-384Kdf
4,437,569 UART: [kat] LMS
5,005,765 UART: [kat] --
5,006,702 UART: [update-reset] ++
5,931,450 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,932,652 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,028,714 >>> mbox cmd response: success
6,028,714 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,028,825 UART: [update-reset] Copying MAN_2 To MAN_1
6,036,839 UART: [update-reset Success] --
6,037,834 UART: [state] Locking Datavault
6,038,534 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,138 UART: [state] Locking ICCM
6,039,586 UART: [exit] Launching FMC @ 0x40000130
6,044,915 UART:
6,044,931 UART: Running Caliptra FMC ...
6,045,339 UART:
6,045,393 UART: [state] CFI Enabled
6,134,678 UART: [art] Extend RT PCRs Done
6,135,106 UART: [art] Lock RT PCRs Done
6,136,471 UART: [art] Populate DV Done
6,144,524 UART: [fht] FMC Alias Private Key: 7
6,145,598 UART: [art] Derive CDI
6,145,878 UART: [art] Store in in slot 0x4
6,231,623 UART: [art] Derive Key Pair
6,231,983 UART: [art] Store priv key in slot 0x5
6,245,461 UART: [art] Derive Key Pair - Done
6,260,330 UART: [art] Signing Cert with AUTHO
6,260,810 UART: RITY.KEYID = 7
6,275,822 UART: [art] Erasing AUTHORITY.KEYID = 7
6,276,587 UART: [art] PUB.X = E24D18A14513B0370AF2ADDD039CF2FEC84784D81371F7E2A26FD7A371A14790E19542D90FB46EFEE8BAE14EC1C924D5
6,283,362 UART: [art] PUB.Y = 43172CE361AE67A43D66429AF3B668C02754D1CD13DB4D88A7C5214F093F6D5A2CA7827B20F8ADC6346127E82C897940
6,290,309 UART: [art] SIG.R = 9EEF55BFBFDC76F253C4A0B5F0EFD672A450589346CD456FC651A40BD286675BABBA339D2D53EEE54B2843534F80D658
6,297,090 UART: [art] SIG.S = B7E48764F8727C433F0F814BF56FB8C7576797829E8EF1504344C22BE4D716B8F24D78156B5C353909C19206BF7D24D3
6,319,842 UART: mbox::rt_entry...
6,320,214 UART: ____ _ _ _ ____ _____
6,320,998 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,321,798 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,322,566 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,323,334 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,324,102 UART: |_|
6,324,414 UART:
6,605,147 UART: [rt] Runtime listening for mailbox commands...
6,606,384 >>> mbox cmd response data (120 bytes)
6,606,385 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
6,606,499 UART:
6,606,515 UART: Running Caliptra ROM ...
6,606,923 UART:
6,606,977 UART: [state] CFI Enabled
6,609,321 UART: [state] LifecycleState = Unprovisioned
6,609,976 UART: [state] DebugLocked = No
6,610,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,612,127 UART: [kat] SHA2-256
7,406,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,410,173 UART: [kat] ++
7,410,325 UART: [kat] sha1
7,414,643 UART: [kat] SHA2-256
7,416,581 UART: [kat] SHA2-384
7,419,476 UART: [kat] SHA2-512-ACC
7,421,376 UART: [kat] ECC-384
7,427,127 UART: [kat] HMAC-384Kdf
7,431,695 UART: [kat] LMS
7,999,891 UART: [kat] --
8,000,788 UART: [update-reset] ++
8,925,108 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,926,186 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,022,248 >>> mbox cmd response: success
9,022,248 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,022,411 UART: [update-reset] Copying MAN_2 To MAN_1
9,030,425 UART: [update-reset Success] --
9,031,352 UART: [state] Locking Datavault
9,032,038 UART: [state] Locking PCR0, PCR1 and PCR31
9,032,642 UART: [state] Locking ICCM
9,033,182 UART: [exit] Launching FMC @ 0x40000130
9,038,511 UART:
9,038,527 UART: Running Caliptra FMC ...
9,038,935 UART:
9,038,989 UART: [state] CFI Enabled
9,127,894 UART: [art] Extend RT PCRs Done
9,128,322 UART: [art] Lock RT PCRs Done
9,129,433 UART: [art] Populate DV Done
9,137,884 UART: [fht] FMC Alias Private Key: 7
9,139,016 UART: [art] Derive CDI
9,139,296 UART: [art] Store in in slot 0x4
9,224,947 UART: [art] Derive Key Pair
9,225,307 UART: [art] Store priv key in slot 0x5
9,238,587 UART: [art] Derive Key Pair - Done
9,253,572 UART: [art] Signing Cert with AUTHO
9,254,052 UART: RITY.KEYID = 7
9,268,732 UART: [art] Erasing AUTHORITY.KEYID = 7
9,269,497 UART: [art] PUB.X = 78B0A2916ADD68487A2EB8E33C65FD61B145EAD6F06D180BFCA16AABCD2D88B9D010E69E84FD128D5622C6C64032F54E
9,276,280 UART: [art] PUB.Y = 22093C356E03F8F975A0F5414E998CDDBA710ED40202FDD399197CF7BE95D7BC2AB7E925004C5865644E6A7913678D8F
9,283,195 UART: [art] SIG.R = F4D13232698988622A9D32DB60ED177DED24598FC7809A3F78BDB972958F78E53D1D9DFAB3EACD4E9E9E34DFD2095846
9,289,972 UART: [art] SIG.S = AE290DB99EAA9611224E3A556BC73C10846F947793B5D83A42D1098A1E798C3C3478A47D1DDBE7980D148F2252EABE0B
9,314,041 UART: mbox::rt_entry...
9,314,413 UART: ____ _ _ _ ____ _____
9,315,197 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,315,997 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,316,765 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,317,533 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,318,301 UART: |_|
9,318,613 UART:
9,603,038 UART: [rt] Runtime listening for mailbox commands...
9,604,275 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,343 ready_for_fw is high
1,363,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,322 >>> mbox cmd response: success
2,986,936 UART:
2,986,952 UART: Running Caliptra FMC ...
2,987,360 UART:
2,987,414 UART: [state] CFI Enabled
2,997,647 UART: [fht] FMC Alias Private Key: 7
3,105,780 UART: [art] Extend RT PCRs Done
3,106,208 UART: [art] Lock RT PCRs Done
3,107,666 UART: [art] Populate DV Done
3,116,029 UART: [fht] FMC Alias Private Key: 7
3,117,149 UART: [art] Derive CDI
3,117,429 UART: [art] Store in in slot 0x4
3,202,856 UART: [art] Derive Key Pair
3,203,216 UART: [art] Store priv key in slot 0x5
3,215,952 UART: [art] Derive Key Pair - Done
3,230,768 UART: [art] Signing Cert with AUTHO
3,231,248 UART: RITY.KEYID = 7
3,246,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,631 UART: [art] PUB.X = 4780136E5DFEB211F272E8CAAE7187DAD5CED8E742AA17F28A6BF1B33571EFDD87A9F3A70CDB3595D40C7376FE577B12
3,254,413 UART: [art] PUB.Y = 961D3CF0997D6DED28E57FB97CACDC9356FBA751841DE6EE3C26D17093B0062F54B63FB03186EF32E6DD9B7B92D9B2C8
3,261,376 UART: [art] SIG.R = B0BE3C9D3D400EF6CF24294B0FCEED461864E203C8F5F2FB3D551902889DB39F3DCEB602A88A2D71EF5D285E90DC2B86
3,268,149 UART: [art] SIG.S = B2381B6D7EAC04E3D756C5E927806F55DE076389928DC28B097D9D0972894005DD170A49A6ACDEB5F0938687D2029FFF
3,292,289 UART: Caliptra RT
3,292,542 UART: [state] CFI Enabled
3,401,772 UART: [rt] RT listening for mailbox commands...
3,402,442 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,372 UART: [rt]cmd =0x54514754, len=24
3,434,391 >>> mbox cmd response data (8 bytes)
3,434,392 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,051 >>> mbox cmd response: success
5,733,051 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,746,584 UART:
5,746,600 UART: Running Caliptra FMC ...
5,747,008 UART:
5,747,062 UART: [state] CFI Enabled
5,836,063 UART: [art] Extend RT PCRs Done
5,836,491 UART: [art] Lock RT PCRs Done
5,837,438 UART: [art] Populate DV Done
5,845,547 UART: [fht] FMC Alias Private Key: 7
5,846,705 UART: [art] Derive CDI
5,846,985 UART: [art] Store in in slot 0x4
5,932,708 UART: [art] Derive Key Pair
5,933,068 UART: [art] Store priv key in slot 0x5
5,946,130 UART: [art] Derive Key Pair - Done
5,961,106 UART: [art] Signing Cert with AUTHO
5,961,586 UART: RITY.KEYID = 7
5,976,460 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,225 UART: [art] PUB.X = 47800B006A25FBB8B5D1EAB1B4CF6F9280CC873DD29771BBF582A608AE617008D16FFB875D9D8BC2EE8FFC4C59BABDAE
5,983,990 UART: [art] PUB.Y = 3ADB30178A3EEA312FCDDFF2A79D2E57C545BCA0A7CBE70063DDF70A25634358BEFC7F1F2A2CE11952D572B905E6870E
5,990,929 UART: [art] SIG.R = 99EA57D35D8A6E4FB8267B6F4F09CFF5467ECCEE03E0CA8BBA8EA694F3C8E20FFA74A28BBE67F26160BFFB1239DB659E
5,997,718 UART: [art] SIG.S = B0284BE3AC57507F09EB1E738B6408F48380CA5E7C3665081FECDB503985FE33B83D7EA1CB8C2F9E6AD9C4416BD30C40
6,021,485 UART: mbox::rt_entry...
6,021,857 UART: ____ _ _ _ ____ _____
6,022,641 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,209 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,024,977 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,025,745 UART: |_|
6,026,057 UART:
6,304,296 UART: [rt] Runtime listening for mailbox commands...
6,305,533 >>> mbox cmd response data (120 bytes)
6,305,534 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,602,765 >>> mbox cmd response: success
8,602,765 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,616,056 UART:
8,616,072 UART: Running Caliptra FMC ...
8,616,480 UART:
8,616,534 UART: [state] CFI Enabled
8,705,573 UART: [art] Extend RT PCRs Done
8,706,001 UART: [art] Lock RT PCRs Done
8,707,162 UART: [art] Populate DV Done
8,715,533 UART: [fht] FMC Alias Private Key: 7
8,716,605 UART: [art] Derive CDI
8,716,885 UART: [art] Store in in slot 0x4
8,802,406 UART: [art] Derive Key Pair
8,802,766 UART: [art] Store priv key in slot 0x5
8,816,592 UART: [art] Derive Key Pair - Done
8,831,170 UART: [art] Signing Cert with AUTHO
8,831,650 UART: RITY.KEYID = 7
8,847,094 UART: [art] Erasing AUTHORITY.KEYID = 7
8,847,859 UART: [art] PUB.X = E8E34AEDA98FA54185D27FE37D6BB6432F190EBAA7AF224DD577420B86F4897F04E610C01BD71090C23ADBA774E55E40
8,854,632 UART: [art] PUB.Y = 0DEBB975EB0F88BC073860BBAF0C67C24CF6F5637FE25F5949D0A8E97C9100F3D3028573C4F4E6513658EF0D5696037F
8,861,545 UART: [art] SIG.R = C71229A39901DC19E93CCA4D4203B7AF07667A139F622B88910A5F4CDDDECD321C32D2EB270A148D8EE660622D055AE2
8,868,305 UART: [art] SIG.S = 172AA0A42146E7536A5B8CCECED9F1C347F05495180B38765BFEC61C7013440E93AB0A1F3E81F5207AA563C57F01F812
8,891,952 UART: mbox::rt_entry...
8,892,324 UART: ____ _ _ _ ____ _____
8,893,108 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,893,908 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,894,676 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,895,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,896,212 UART: |_|
8,896,524 UART:
9,176,154 UART: [rt] Runtime listening for mailbox commands...
9,177,391 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,434 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,012 UART: [kat] SHA2-256
881,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,058 UART: [kat] ++
886,210 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,481 UART: [idev] ++
1,479,649 UART: [idev] CDI.KEYID = 6
1,480,009 UART: [idev] SUBJECT.KEYID = 7
1,480,433 UART: [idev] UDS.KEYID = 0
1,480,778 ready_for_fw is high
1,480,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,541 UART: [idev] Erasing UDS.KEYID = 0
1,505,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,281 UART: [idev] --
1,515,212 UART: [ldev] ++
1,515,380 UART: [ldev] CDI.KEYID = 6
1,515,743 UART: [ldev] SUBJECT.KEYID = 5
1,516,169 UART: [ldev] AUTHORITY.KEYID = 7
1,516,632 UART: [ldev] FE.KEYID = 1
1,522,042 UART: [ldev] Erasing FE.KEYID = 1
1,547,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,609 UART: [ldev] --
1,586,968 UART: [fwproc] Waiting for Commands...
1,587,773 UART: [fwproc] Received command 0x46574c44
1,588,564 UART: [fwproc] Received Image of size 114084 bytes
2,883,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,349 >>> mbox cmd response: success
3,076,409 UART: [afmc] ++
3,076,577 UART: [afmc] CDI.KEYID = 6
3,076,939 UART: [afmc] SUBJECT.KEYID = 7
3,077,364 UART: [afmc] AUTHORITY.KEYID = 5
3,112,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,019 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,799 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,527 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,412 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,102 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,157 UART: [afmc] --
3,156,099 UART: [cold-reset] --
3,157,023 UART: [state] Locking Datavault
3,158,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,074 UART: [state] Locking ICCM
3,159,522 UART: [exit] Launching FMC @ 0x40000130
3,164,851 UART:
3,164,867 UART: Running Caliptra FMC ...
3,165,275 UART:
3,165,418 UART: [state] CFI Enabled
3,175,715 UART: [fht] FMC Alias Private Key: 7
3,284,462 UART: [art] Extend RT PCRs Done
3,284,890 UART: [art] Lock RT PCRs Done
3,286,194 UART: [art] Populate DV Done
3,294,365 UART: [fht] FMC Alias Private Key: 7
3,295,305 UART: [art] Derive CDI
3,295,585 UART: [art] Store in in slot 0x4
3,381,266 UART: [art] Derive Key Pair
3,381,626 UART: [art] Store priv key in slot 0x5
3,394,882 UART: [art] Derive Key Pair - Done
3,409,352 UART: [art] Signing Cert with AUTHO
3,409,832 UART: RITY.KEYID = 7
3,424,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,691 UART: [art] PUB.X = 0A166BE6D77DD80FD2DC6EC840E03AAFE373C15A5D675CFB5805B81683B02B4D8296ECD5FE367755B0464F401E6CCB91
3,432,466 UART: [art] PUB.Y = 09EF81AD73566C16E05B3EDEA5E53188151DBF21F0DD4B30C8DD3B43EE7279ECE457111799022AFC9B6938C950092236
3,439,411 UART: [art] SIG.R = 4B39B5225CD59F225F470A51ED5BBD8731250D2612BEC3019B9929D05032FC47553593C2CE10E325220F2D08C947FC37
3,446,162 UART: [art] SIG.S = CF5D2986D3F00D63496F292521D9E879EB64C1CB566427CF76158B8B385CEE7FE50979ABDA4906DC866C4FB5FE4EAC94
3,470,776 UART: Caliptra RT
3,471,121 UART: [state] CFI Enabled
3,580,196 UART: [rt] RT listening for mailbox commands...
3,580,866 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,128 UART: [rt]cmd =0x54514754, len=24
3,613,341 >>> mbox cmd response data (8 bytes)
3,613,342 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,112 UART:
3,614,128 UART: Running Caliptra ROM ...
3,614,536 UART:
3,614,677 UART: [state] CFI Enabled
3,617,815 UART: [state] LifecycleState = Unprovisioned
3,618,470 UART: [state] DebugLocked = No
3,619,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,677 UART: [kat] SHA2-256
4,414,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,723 UART: [kat] ++
4,418,875 UART: [kat] sha1
4,423,065 UART: [kat] SHA2-256
4,425,003 UART: [kat] SHA2-384
4,427,708 UART: [kat] SHA2-512-ACC
4,429,608 UART: [kat] ECC-384
4,434,861 UART: [kat] HMAC-384Kdf
4,439,599 UART: [kat] LMS
5,007,795 UART: [kat] --
5,008,684 UART: [update-reset] ++
5,933,552 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,934,780 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
6,030,842 >>> mbox cmd response: success
6,030,842 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,031,175 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,189 UART: [update-reset Success] --
6,039,966 UART: [state] Locking Datavault
6,040,916 UART: [state] Locking PCR0, PCR1 and PCR31
6,041,520 UART: [state] Locking ICCM
6,042,004 UART: [exit] Launching FMC @ 0x40000130
6,047,333 UART:
6,047,349 UART: Running Caliptra FMC ...
6,047,757 UART:
6,047,900 UART: [state] CFI Enabled
6,137,185 UART: [art] Extend RT PCRs Done
6,137,613 UART: [art] Lock RT PCRs Done
6,138,826 UART: [art] Populate DV Done
6,147,221 UART: [fht] FMC Alias Private Key: 7
6,148,237 UART: [art] Derive CDI
6,148,517 UART: [art] Store in in slot 0x4
6,234,350 UART: [art] Derive Key Pair
6,234,710 UART: [art] Store priv key in slot 0x5
6,247,534 UART: [art] Derive Key Pair - Done
6,262,515 UART: [art] Signing Cert with AUTHO
6,262,995 UART: RITY.KEYID = 7
6,278,219 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,984 UART: [art] PUB.X = DBFCCDA5ACDED980B0E03BF101C4C1D7333B59D1344EB365D57080B0A39BF16248D92509BD1A426808961A95F2FC9E8F
6,285,759 UART: [art] PUB.Y = B490ABCBC5E54902CF53C62C2EB4DE6B878C6E9E73B7D5E75642CA5720DAB00E66C86112C59AD529B40F5D8CDD57C293
6,292,716 UART: [art] SIG.R = 2B17D06915DCCC454E1DCA936DCD88BB2063CC1DF6FEE55EBBFC8A4FA60FCD64B47EC4EDEBB3E7D98EAFAF82D7FB720A
6,299,522 UART: [art] SIG.S = 0FB5D78368D818D112FE89F89F329079821E90585EAB7AA814E4B99A99C1652F5C74FB0B9CAF66A504EE773ECBB1764D
6,323,606 UART: mbox::rt_entry...
6,323,978 UART: ____ _ _ _ ____ _____
6,324,762 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,325,562 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,326,330 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,327,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,327,866 UART: |_|
6,328,178 UART:
6,605,107 UART: [rt] Runtime listening for mailbox commands...
6,606,344 >>> mbox cmd response data (120 bytes)
6,606,345 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
6,606,459 UART:
6,606,475 UART: Running Caliptra ROM ...
6,606,883 UART:
6,607,024 UART: [state] CFI Enabled
6,609,794 UART: [state] LifecycleState = Unprovisioned
6,610,449 UART: [state] DebugLocked = No
6,611,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,612,516 UART: [kat] SHA2-256
7,406,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,410,562 UART: [kat] ++
7,410,714 UART: [kat] sha1
7,414,992 UART: [kat] SHA2-256
7,416,930 UART: [kat] SHA2-384
7,419,623 UART: [kat] SHA2-512-ACC
7,421,523 UART: [kat] ECC-384
7,426,922 UART: [kat] HMAC-384Kdf
7,431,732 UART: [kat] LMS
7,999,928 UART: [kat] --
8,000,859 UART: [update-reset] ++
8,924,193 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,925,259 UART: [update-reset] Loading Runtime at address 0x40005000 len 53772
9,021,321 >>> mbox cmd response: success
9,021,321 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,021,670 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,684 UART: [update-reset Success] --
9,030,493 UART: [state] Locking Datavault
9,031,435 UART: [state] Locking PCR0, PCR1 and PCR31
9,032,039 UART: [state] Locking ICCM
9,032,555 UART: [exit] Launching FMC @ 0x40000130
9,037,884 UART:
9,037,900 UART: Running Caliptra FMC ...
9,038,308 UART:
9,038,451 UART: [state] CFI Enabled
9,127,618 UART: [art] Extend RT PCRs Done
9,128,046 UART: [art] Lock RT PCRs Done
9,129,337 UART: [art] Populate DV Done
9,137,618 UART: [fht] FMC Alias Private Key: 7
9,138,716 UART: [art] Derive CDI
9,138,996 UART: [art] Store in in slot 0x4
9,224,619 UART: [art] Derive Key Pair
9,224,979 UART: [art] Store priv key in slot 0x5
9,238,261 UART: [art] Derive Key Pair - Done
9,253,245 UART: [art] Signing Cert with AUTHO
9,253,725 UART: RITY.KEYID = 7
9,269,295 UART: [art] Erasing AUTHORITY.KEYID = 7
9,270,060 UART: [art] PUB.X = AC1C98E34A87D081FFECE18DE7533EA6E15E5A71731B1B046D2150E30040354C6A0042B258D5EE167F4737F03CC9D929
9,276,787 UART: [art] PUB.Y = 01A9135736328B2E30C5F0B90C4B5431C93D393AD7727B7FF622D42B32F2EA37660DD4F2ABA450D0811E0DF08EE7734D
9,283,729 UART: [art] SIG.R = D4944620631D6DA168DEA5BFE01FFED2105D0DC4B54F6F7FFEC099CF991389982C23439161B653BC2B544DB8A2B5569A
9,290,506 UART: [art] SIG.S = 538F9A34156F8724966BC6780A658851EFDB1AF1FF8B860CB7F1F34B25A534F7183B34DC22C8C4D2CD4B8BE82325BAED
9,314,189 UART: mbox::rt_entry...
9,314,561 UART: ____ _ _ _ ____ _____
9,315,345 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,316,145 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,316,913 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,317,681 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,318,449 UART: |_|
9,318,761 UART:
9,601,131 UART: [rt] Runtime listening for mailbox commands...
9,602,368 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,708 ready_for_fw is high
1,362,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,837 >>> mbox cmd response: success
2,986,089 UART:
2,986,105 UART: Running Caliptra FMC ...
2,986,513 UART:
2,986,656 UART: [state] CFI Enabled
2,997,535 UART: [fht] FMC Alias Private Key: 7
3,105,014 UART: [art] Extend RT PCRs Done
3,105,442 UART: [art] Lock RT PCRs Done
3,107,014 UART: [art] Populate DV Done
3,115,151 UART: [fht] FMC Alias Private Key: 7
3,116,303 UART: [art] Derive CDI
3,116,583 UART: [art] Store in in slot 0x4
3,201,884 UART: [art] Derive Key Pair
3,202,244 UART: [art] Store priv key in slot 0x5
3,215,022 UART: [art] Derive Key Pair - Done
3,229,768 UART: [art] Signing Cert with AUTHO
3,230,248 UART: RITY.KEYID = 7
3,245,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,283 UART: [art] PUB.X = 3871860F2CACC385D00D1DB3DD3B9571AAD92E93F7D7581009B2FFA6BCC5E90D3E268BE6771197128CC074A36D951950
3,253,047 UART: [art] PUB.Y = 21433C3505A68CB504A6DAFC2C53F0BCC36121C045E0AE72BEF10BBF4F3F3DF70F70F06EDFFA368AACB9384EFC71ABCB
3,260,015 UART: [art] SIG.R = 0ACF407C9BAAF3DF9ABDF627ECD9C04DBB5FBC89821A67349C1BF066E486911344D24BB8F1547D55FE89E6EFAE9A3070
3,266,804 UART: [art] SIG.S = D7820BF57143449615864E64A446CE17140C3D0FAE85E2550B088EB8218C53CD81F541999B8E3AB544EC770FB368F2D5
3,290,547 UART: Caliptra RT
3,290,892 UART: [state] CFI Enabled
3,400,071 UART: [rt] RT listening for mailbox commands...
3,400,741 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,741 UART: [rt]cmd =0x54514754, len=24
3,432,674 >>> mbox cmd response data (8 bytes)
3,432,675 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,730,091 >>> mbox cmd response: success
5,730,091 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,743,598 UART:
5,743,614 UART: Running Caliptra FMC ...
5,744,022 UART:
5,744,165 UART: [state] CFI Enabled
5,833,356 UART: [art] Extend RT PCRs Done
5,833,784 UART: [art] Lock RT PCRs Done
5,835,145 UART: [art] Populate DV Done
5,843,624 UART: [fht] FMC Alias Private Key: 7
5,844,674 UART: [art] Derive CDI
5,844,954 UART: [art] Store in in slot 0x4
5,930,691 UART: [art] Derive Key Pair
5,931,051 UART: [art] Store priv key in slot 0x5
5,944,225 UART: [art] Derive Key Pair - Done
5,959,260 UART: [art] Signing Cert with AUTHO
5,959,740 UART: RITY.KEYID = 7
5,975,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,975,975 UART: [art] PUB.X = 9A3D2F77B21A54E2F39E3589218B51265056EB4412DCB04B23A0BF4963CA54FD7240FA4645CFB51BACB3A4A961E125C7
5,982,753 UART: [art] PUB.Y = C38B6250D56255DBABE6D889039708154D08FF91444AC99D6EB355FD73D185346A6084A3DBE78DAEBFC2A25CE615CCBD
5,989,708 UART: [art] SIG.R = F9B16461DDFF979685030713C876085EEFCA6423EA906A5038E27CDF2376F6F67E030D6DA9A38AE191B8B56FE8C4943D
5,996,469 UART: [art] SIG.S = 7132D8F707189604418EA3A2472CECBD807BCFE2C5913C26644257876FD13DF4109203C08EAE0A4057C71E9E66219840
6,020,006 UART: mbox::rt_entry...
6,020,378 UART: ____ _ _ _ ____ _____
6,021,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,021,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,022,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,023,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,024,266 UART: |_|
6,024,578 UART:
6,306,856 UART: [rt] Runtime listening for mailbox commands...
6,308,093 >>> mbox cmd response data (120 bytes)
6,308,094 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
8,605,498 >>> mbox cmd response: success
8,605,498 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,618,833 UART:
8,618,849 UART: Running Caliptra FMC ...
8,619,257 UART:
8,619,400 UART: [state] CFI Enabled
8,708,309 UART: [art] Extend RT PCRs Done
8,708,737 UART: [art] Lock RT PCRs Done
8,710,146 UART: [art] Populate DV Done
8,718,295 UART: [fht] FMC Alias Private Key: 7
8,719,453 UART: [art] Derive CDI
8,719,733 UART: [art] Store in in slot 0x4
8,805,780 UART: [art] Derive Key Pair
8,806,140 UART: [art] Store priv key in slot 0x5
8,819,908 UART: [art] Derive Key Pair - Done
8,834,751 UART: [art] Signing Cert with AUTHO
8,835,231 UART: RITY.KEYID = 7
8,850,331 UART: [art] Erasing AUTHORITY.KEYID = 7
8,851,096 UART: [art] PUB.X = 0839CD805E31994960E1909EEF72D49D23CC1CE59078FE820A2D022F4EE9F09958A2FBE0B80092E03E3D2FEF6164879E
8,857,839 UART: [art] PUB.Y = 90CFD203A5CA931E371FD0D828158F83BC6C2977065C1EA7CA7DF3860D796186472A89B2F9793769B3F7FDECA7B3121E
8,864,786 UART: [art] SIG.R = 03619794FCB94C648F87D04BD34E2CA1E956FAE58C2F60604FBBB22957CE20B1C6209CD7568E42DB4AB3C50628B7A574
8,871,558 UART: [art] SIG.S = EDFEDFB9EF3561F35FB4F2B154DFAAAEF209EA3E6F16A6D6CF839FA05540C9B4DACFB5CB1D7D09156A5BF474EC9CB3A0
8,894,987 UART: mbox::rt_entry...
8,895,359 UART: ____ _ _ _ ____ _____
8,896,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,896,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,897,711 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,898,479 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,899,247 UART: |_|
8,899,559 UART:
9,182,647 UART: [rt] Runtime listening for mailbox commands...
9,183,884 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
893,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,225 UART: [kat] ++
897,377 UART: [kat] sha1
901,603 UART: [kat] SHA2-256
903,543 UART: [kat] SHA2-384
906,212 UART: [kat] SHA2-512-ACC
908,113 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,350 UART: [kat] LMS
1,170,678 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,172,031 UART: [fht] FHT @ 0x50003400
1,174,790 UART: [idev] ++
1,174,958 UART: [idev] CDI.KEYID = 6
1,175,318 UART: [idev] SUBJECT.KEYID = 7
1,175,742 UART: [idev] UDS.KEYID = 0
1,176,087 ready_for_fw is high
1,176,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,201,017 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,313 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,687 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,674 UART: [fwproc] Recv command 0x46574c44
1,284,402 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,097 >>> mbox cmd response: success
2,772,237 UART: [afmc] ++
2,772,405 UART: [afmc] CDI.KEYID = 6
2,772,767 UART: [afmc] SUBJECT.KEYID = 7
2,773,192 UART: [afmc] AUTHORITY.KEYID = 5
2,808,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,856 UART: [afmc] --
2,851,910 UART: [cold-reset] --
2,852,626 UART: [state] Locking Datavault
2,854,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,693 UART: [state] Locking ICCM
2,855,301 UART: [exit] Launching FMC @ 0x40000130
2,860,630 UART:
2,860,646 UART: Running Caliptra FMC ...
2,861,054 UART:
2,861,108 UART: [state] CFI Enabled
2,871,677 UART: [fht] FMC Alias Private Key: 7
2,979,134 UART: [art] Extend RT PCRs Done
2,979,562 UART: [art] Lock RT PCRs Done
2,981,160 UART: [art] Populate DV Done
2,989,481 UART: [fht] FMC Alias Private Key: 7
2,990,657 UART: [art] Derive CDI
2,990,937 UART: [art] Store in in slot 0x4
3,076,416 UART: [art] Derive Key Pair
3,076,776 UART: [art] Store priv key in slot 0x5
3,089,640 UART: [art] Derive Key Pair - Done
3,104,341 UART: [art] Signing Cert with AUTHO
3,104,821 UART: RITY.KEYID = 7
3,120,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,952 UART: [art] PUB.X = 19790C3063C87D615E14BCB4FF2DFC9435C88565415308AFB625576790EAEFF15BF86F752E9FD0BF0A1ACCD3F2CFABC8
3,127,731 UART: [art] PUB.Y = 9999F6C5D6F9E3F4B01E0DFBAC8817CC8294946D86D5E9B66EF7B264EBBDB7712483B887DD6D3C5103884179B4AD1C45
3,134,685 UART: [art] SIG.R = F0EBD5997543A248408A5006B13E98B01A4664039E96483CAC2336AEFF1491137B471C3A555BB63B7B75943A2B1544B6
3,141,443 UART: [art] SIG.S = 06A987E1E32D9971CA0F8C81031E70D77C5B10A455B59FCFF06FFAF7FEF2240D64E8D6198B97FADAB1CF4E05A6B68A9B
3,165,463 UART: Caliptra RT
3,165,716 UART: [state] CFI Enabled
3,273,771 UART: [rt] RT listening for mailbox commands...
3,274,441 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,613 UART: [rt]cmd =0x54514754, len=24
3,306,740 >>> mbox cmd response data (8 bytes)
3,306,741 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,508 UART:
3,307,524 UART: Running Caliptra ROM ...
3,307,932 UART:
3,307,987 UART: [state] CFI Enabled
3,310,419 UART: [state] LifecycleState = Unprovisioned
3,311,074 UART: [state] DebugLocked = No
3,311,696 UART: [state] WD Timer not started. Device not locked for debugging
3,313,020 UART: [kat] SHA2-256
4,118,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,122,795 UART: [kat] ++
4,122,947 UART: [kat] sha1
4,127,209 UART: [kat] SHA2-256
4,129,149 UART: [kat] SHA2-384
4,131,756 UART: [kat] SHA2-512-ACC
4,133,656 UART: [kat] ECC-384
4,143,659 UART: [kat] HMAC-384Kdf
4,148,219 UART: [kat] LMS
4,396,547 UART: [kat] --
4,397,165 UART: [update-reset] ++
5,298,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,299,954 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,395,964 >>> mbox cmd response: success
5,395,964 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,396,107 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,121 UART: [update-reset Success] --
5,404,924 UART: [state] Locking Datavault
5,405,734 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,338 UART: [state] Locking ICCM
5,406,812 UART: [exit] Launching FMC @ 0x40000130
5,412,141 UART:
5,412,157 UART: Running Caliptra FMC ...
5,412,565 UART:
5,412,619 UART: [state] CFI Enabled
5,501,646 UART: [art] Extend RT PCRs Done
5,502,074 UART: [art] Lock RT PCRs Done
5,503,271 UART: [art] Populate DV Done
5,511,580 UART: [fht] FMC Alias Private Key: 7
5,512,542 UART: [art] Derive CDI
5,512,822 UART: [art] Store in in slot 0x4
5,598,627 UART: [art] Derive Key Pair
5,598,987 UART: [art] Store priv key in slot 0x5
5,611,661 UART: [art] Derive Key Pair - Done
5,626,579 UART: [art] Signing Cert with AUTHO
5,627,059 UART: RITY.KEYID = 7
5,641,633 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,398 UART: [art] PUB.X = A15F42B8D0516643D008D0301378398A64C4C8F4BCF58EEC6202263C570A975109E74A68DB9B1897CAE8A09A38C0E79F
5,649,156 UART: [art] PUB.Y = 1F22F95599DA9EE046A5F9E5CB6E7A29665B4B2AFB900F34801E96A6C65340BD20CDD29DC9609CC1F4FA0F378CA89542
5,656,112 UART: [art] SIG.R = 32A85ED667BFA6BF427B521206EB68C1A58B9C632700C4C776A256EA048893DEF62041522A6B5247B79ADBD977239064
5,662,852 UART: [art] SIG.S = 9A019E001C8E589AB9375287742921807B64FC8D6FCE33CEBDBEE4378D84657D39933347846D0EAC5559445098393F03
5,686,694 UART: mbox::rt_entry...
5,687,066 UART: ____ _ _ _ ____ _____
5,687,850 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,650 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,418 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,186 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,690,954 UART: |_|
5,691,266 UART:
5,970,516 UART: [rt] Runtime listening for mailbox commands...
5,971,753 >>> mbox cmd response data (120 bytes)
5,971,754 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,971,865 UART:
5,971,881 UART: Running Caliptra ROM ...
5,972,289 UART:
5,972,344 UART: [state] CFI Enabled
5,974,918 UART: [state] LifecycleState = Unprovisioned
5,975,573 UART: [state] DebugLocked = No
5,976,123 UART: [state] WD Timer not started. Device not locked for debugging
5,977,333 UART: [kat] SHA2-256
6,782,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,787,108 UART: [kat] ++
6,787,260 UART: [kat] sha1
6,791,562 UART: [kat] SHA2-256
6,793,502 UART: [kat] SHA2-384
6,796,165 UART: [kat] SHA2-512-ACC
6,798,065 UART: [kat] ECC-384
6,807,706 UART: [kat] HMAC-384Kdf
6,812,408 UART: [kat] LMS
7,060,736 UART: [kat] --
7,061,832 UART: [update-reset] ++
7,964,360 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,965,515 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,061,525 >>> mbox cmd response: success
8,061,525 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,061,668 UART: [update-reset] Copying MAN_2 To MAN_1
8,069,682 UART: [update-reset Success] --
8,070,681 UART: [state] Locking Datavault
8,071,253 UART: [state] Locking PCR0, PCR1 and PCR31
8,071,857 UART: [state] Locking ICCM
8,072,343 UART: [exit] Launching FMC @ 0x40000130
8,077,672 UART:
8,077,688 UART: Running Caliptra FMC ...
8,078,096 UART:
8,078,150 UART: [state] CFI Enabled
8,167,035 UART: [art] Extend RT PCRs Done
8,167,463 UART: [art] Lock RT PCRs Done
8,168,664 UART: [art] Populate DV Done
8,176,865 UART: [fht] FMC Alias Private Key: 7
8,177,963 UART: [art] Derive CDI
8,178,243 UART: [art] Store in in slot 0x4
8,264,322 UART: [art] Derive Key Pair
8,264,682 UART: [art] Store priv key in slot 0x5
8,277,814 UART: [art] Derive Key Pair - Done
8,292,468 UART: [art] Signing Cert with AUTHO
8,292,948 UART: RITY.KEYID = 7
8,308,018 UART: [art] Erasing AUTHORITY.KEYID = 7
8,308,783 UART: [art] PUB.X = 204D3D093C6B88CED124BA4CC20B1E3EBBBE9EA400FE8DBBA5AC21ECA5855863B83F8AB55010AC8D0FA8CD21BA97F541
8,315,550 UART: [art] PUB.Y = 51FD4CF1E5F688CAE94F5BBF9DBCF8CBA96A8E7245FCEDF6E5CE6631A85F44ED04FBE3BB9E3E806A06DC1FC22AF2C2BD
8,322,534 UART: [art] SIG.R = 7C1D59867B7CE726AE79D5C5081FFB55DEBEE2B2E4568BC4D5433DC0A229B35D706237DC9D6E9896CC96979B78BE4946
8,329,311 UART: [art] SIG.S = 6299A9BCC8CF49A3F5BA079ACACBD8D4DD0709EBB45701947E2FCB0C56326FAC76BFD1E9A035BE4A004895A5DE67F8B2
8,352,807 UART: mbox::rt_entry...
8,353,179 UART: ____ _ _ _ ____ _____
8,353,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,354,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,355,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,356,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,357,067 UART: |_|
8,357,379 UART:
8,637,561 UART: [rt] Runtime listening for mailbox commands...
8,638,798 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,099 ready_for_fw is high
1,060,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,978 >>> mbox cmd response: success
2,683,358 UART:
2,683,374 UART: Running Caliptra FMC ...
2,683,782 UART:
2,683,836 UART: [state] CFI Enabled
2,694,511 UART: [fht] FMC Alias Private Key: 7
2,802,002 UART: [art] Extend RT PCRs Done
2,802,430 UART: [art] Lock RT PCRs Done
2,804,084 UART: [art] Populate DV Done
2,812,237 UART: [fht] FMC Alias Private Key: 7
2,813,189 UART: [art] Derive CDI
2,813,469 UART: [art] Store in in slot 0x4
2,899,162 UART: [art] Derive Key Pair
2,899,522 UART: [art] Store priv key in slot 0x5
2,912,364 UART: [art] Derive Key Pair - Done
2,926,969 UART: [art] Signing Cert with AUTHO
2,927,449 UART: RITY.KEYID = 7
2,942,733 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,498 UART: [art] PUB.X = 878648A469DAA1E5EF1B58B8D9A8E4BB128C0AA341C31B9AE255B89CA90744DB5BFEA7032C92591A58AD78299C2C1F9E
2,950,273 UART: [art] PUB.Y = CFBB0379589796AD62C357E075DB5AAB1041173E5965D445EA453A32CAF75F1A5F5A4155EF48C7306284F7D65F188550
2,957,220 UART: [art] SIG.R = F7E41658528E373A41590A03E8FCEB619653694C79767387C039C6EBE2A5D71B00F0EE9B9225D12C523285FD31448C75
2,963,956 UART: [art] SIG.S = 6C6F7679D6D1BA9D1D8A1BAA6F1691A0BFAF57A424D762217AEE7B31788D90FAC75C81BC3BD21141A75A0690EF81AA59
2,987,654 UART: Caliptra RT
2,987,907 UART: [state] CFI Enabled
3,095,726 UART: [rt] RT listening for mailbox commands...
3,096,396 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,330 UART: [rt]cmd =0x54514754, len=24
3,128,455 >>> mbox cmd response data (8 bytes)
3,128,456 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,102,314 >>> mbox cmd response: success
5,102,314 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,115,802 UART:
5,115,818 UART: Running Caliptra FMC ...
5,116,226 UART:
5,116,280 UART: [state] CFI Enabled
5,204,995 UART: [art] Extend RT PCRs Done
5,205,423 UART: [art] Lock RT PCRs Done
5,206,724 UART: [art] Populate DV Done
5,214,669 UART: [fht] FMC Alias Private Key: 7
5,215,689 UART: [art] Derive CDI
5,215,969 UART: [art] Store in in slot 0x4
5,301,792 UART: [art] Derive Key Pair
5,302,152 UART: [art] Store priv key in slot 0x5
5,315,368 UART: [art] Derive Key Pair - Done
5,329,784 UART: [art] Signing Cert with AUTHO
5,330,264 UART: RITY.KEYID = 7
5,345,266 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,031 UART: [art] PUB.X = 6EEE7AB63C6ACD90F60516301EDA453ABFADB84DAB72DD187F7B3488A86FD2364FB523032FB19F0AD94DEED8D961BDCF
5,352,820 UART: [art] PUB.Y = 8DD4A5F63EE664698F6BF29D05F5555E5232062E82382C4F5990700DC8558E042910E879F1A19A009AAA83C00051D32E
5,359,708 UART: [art] SIG.R = 51636BA13108877B14F3672379F076D9B65F6CE95A165686720278628654AE319591420414DCF913170FC50010DC7CFB
5,366,428 UART: [art] SIG.S = B93A9BE213225FEAC62EB4E29EAC3A8EFDB1BBE405822562D99DB4F0A952F33647D6102B385017B905C74FA6FC0CCA69
5,389,982 UART: mbox::rt_entry...
5,390,354 UART: ____ _ _ _ ____ _____
5,391,138 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,391,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,392,706 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,242 UART: |_|
5,394,554 UART:
5,672,880 UART: [rt] Runtime listening for mailbox commands...
5,674,117 >>> mbox cmd response data (120 bytes)
5,674,118 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,646,244 >>> mbox cmd response: success
7,646,244 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,659,464 UART:
7,659,480 UART: Running Caliptra FMC ...
7,659,888 UART:
7,659,942 UART: [state] CFI Enabled
7,749,109 UART: [art] Extend RT PCRs Done
7,749,537 UART: [art] Lock RT PCRs Done
7,751,168 UART: [art] Populate DV Done
7,759,505 UART: [fht] FMC Alias Private Key: 7
7,760,631 UART: [art] Derive CDI
7,760,911 UART: [art] Store in in slot 0x4
7,846,984 UART: [art] Derive Key Pair
7,847,344 UART: [art] Store priv key in slot 0x5
7,860,678 UART: [art] Derive Key Pair - Done
7,875,571 UART: [art] Signing Cert with AUTHO
7,876,051 UART: RITY.KEYID = 7
7,891,319 UART: [art] Erasing AUTHORITY.KEYID = 7
7,892,084 UART: [art] PUB.X = 622EEAA401B74690270E3CDC8F074B4F63B7AD11FE67180F5660EE41889E327142554E91DCE4D9AFE23CA5C4E1E84C97
7,898,850 UART: [art] PUB.Y = 588CD6A154707AB2386CD13ABA99B431773F7DE4EB27D50737FD37EF29947AA29BEF6D21DC27D4C1E35BA81B9D053DE1
7,905,808 UART: [art] SIG.R = 3B54AE59D702BD9E52EB8D385C771F2D66B0CC1E6AC1E28B8950AD28D0F6B020123D7D727B90485E0E5A8DF8418B2BAD
7,912,586 UART: [art] SIG.S = CFA725A7CC09EB370E57F8C17647CDCDEF2C205676785B4FCB1FC91FA0C7D61C972B490948BA1DE65C20EC7B0DD07EBD
7,935,927 UART: mbox::rt_entry...
7,936,299 UART: ____ _ _ _ ____ _____
7,937,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,937,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,938,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,939,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,940,187 UART: |_|
7,940,499 UART:
8,221,891 UART: [rt] Runtime listening for mailbox commands...
8,223,128 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
893,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,694 UART: [kat] ++
897,846 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,751 UART: [kat] SHA2-512-ACC
908,652 UART: [kat] ECC-384
918,847 UART: [kat] HMAC-384Kdf
923,573 UART: [kat] LMS
1,171,901 UART: [kat] --
1,172,664 UART: [cold-reset] ++
1,173,230 UART: [fht] FHT @ 0x50003400
1,175,819 UART: [idev] ++
1,175,987 UART: [idev] CDI.KEYID = 6
1,176,347 UART: [idev] SUBJECT.KEYID = 7
1,176,771 UART: [idev] UDS.KEYID = 0
1,177,116 ready_for_fw is high
1,177,116 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,202,140 UART: [idev] Sha1 KeyId Algorithm
1,210,624 UART: [idev] --
1,211,714 UART: [ldev] ++
1,211,882 UART: [ldev] CDI.KEYID = 6
1,212,245 UART: [ldev] SUBJECT.KEYID = 5
1,212,671 UART: [ldev] AUTHORITY.KEYID = 7
1,213,134 UART: [ldev] FE.KEYID = 1
1,218,532 UART: [ldev] Erasing FE.KEYID = 1
1,245,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,418 UART: [ldev] --
1,284,827 UART: [fwproc] Wait for Commands...
1,285,501 UART: [fwproc] Recv command 0x46574c44
1,286,229 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,686 >>> mbox cmd response: success
2,772,852 UART: [afmc] ++
2,773,020 UART: [afmc] CDI.KEYID = 6
2,773,382 UART: [afmc] SUBJECT.KEYID = 7
2,773,807 UART: [afmc] AUTHORITY.KEYID = 5
2,809,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,601 UART: [afmc] --
2,852,639 UART: [cold-reset] --
2,853,491 UART: [state] Locking Datavault
2,854,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,162 UART: [state] Locking ICCM
2,855,750 UART: [exit] Launching FMC @ 0x40000130
2,861,079 UART:
2,861,095 UART: Running Caliptra FMC ...
2,861,503 UART:
2,861,646 UART: [state] CFI Enabled
2,872,597 UART: [fht] FMC Alias Private Key: 7
2,980,546 UART: [art] Extend RT PCRs Done
2,980,974 UART: [art] Lock RT PCRs Done
2,982,616 UART: [art] Populate DV Done
2,990,859 UART: [fht] FMC Alias Private Key: 7
2,991,833 UART: [art] Derive CDI
2,992,113 UART: [art] Store in in slot 0x4
3,077,846 UART: [art] Derive Key Pair
3,078,206 UART: [art] Store priv key in slot 0x5
3,092,042 UART: [art] Derive Key Pair - Done
3,106,812 UART: [art] Signing Cert with AUTHO
3,107,292 UART: RITY.KEYID = 7
3,122,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,155 UART: [art] PUB.X = 58AEFA3E6223BDE4F9562DDB5E3E6B67E4C6F5CF330EB0695C934512038A759BB7DCA7CE58BBBA498B6730F5D93356F0
3,129,935 UART: [art] PUB.Y = 9A369BB292BD670E9E3C2A050A9088871BB415715A5C818BDAA7F7BA47371237A28FF50DE25DDBA66E358B803621073C
3,136,874 UART: [art] SIG.R = 31E8ECA5A7DAC4E618AE775983010310BD2BA858A18727C799CDA70D1D4002EA8F413E6DDC69F3216665D5C777EBF276
3,143,640 UART: [art] SIG.S = 59395834B452B7CAFF9360E2105AC6C9754F46D5A2B6657E545A78B024A1CFECA03362EC0E97E137A0832CFEF916EC1F
3,167,826 UART: Caliptra RT
3,168,171 UART: [state] CFI Enabled
3,276,030 UART: [rt] RT listening for mailbox commands...
3,276,700 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,700 UART: [rt]cmd =0x54514754, len=24
3,308,939 >>> mbox cmd response data (8 bytes)
3,308,940 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,735 UART:
3,309,751 UART: Running Caliptra ROM ...
3,310,159 UART:
3,310,301 UART: [state] CFI Enabled
3,313,497 UART: [state] LifecycleState = Unprovisioned
3,314,152 UART: [state] DebugLocked = No
3,314,724 UART: [state] WD Timer not started. Device not locked for debugging
3,315,844 UART: [kat] SHA2-256
4,121,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,619 UART: [kat] ++
4,125,771 UART: [kat] sha1
4,129,953 UART: [kat] SHA2-256
4,131,893 UART: [kat] SHA2-384
4,134,744 UART: [kat] SHA2-512-ACC
4,136,644 UART: [kat] ECC-384
4,146,783 UART: [kat] HMAC-384Kdf
4,151,535 UART: [kat] LMS
4,399,863 UART: [kat] --
4,400,815 UART: [update-reset] ++
5,303,513 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,304,536 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,400,546 >>> mbox cmd response: success
5,400,546 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,400,835 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,849 UART: [update-reset Success] --
5,409,844 UART: [state] Locking Datavault
5,410,528 UART: [state] Locking PCR0, PCR1 and PCR31
5,411,132 UART: [state] Locking ICCM
5,411,750 UART: [exit] Launching FMC @ 0x40000130
5,417,079 UART:
5,417,095 UART: Running Caliptra FMC ...
5,417,503 UART:
5,417,646 UART: [state] CFI Enabled
5,506,969 UART: [art] Extend RT PCRs Done
5,507,397 UART: [art] Lock RT PCRs Done
5,508,658 UART: [art] Populate DV Done
5,516,869 UART: [fht] FMC Alias Private Key: 7
5,517,847 UART: [art] Derive CDI
5,518,127 UART: [art] Store in in slot 0x4
5,604,160 UART: [art] Derive Key Pair
5,604,520 UART: [art] Store priv key in slot 0x5
5,617,710 UART: [art] Derive Key Pair - Done
5,632,534 UART: [art] Signing Cert with AUTHO
5,633,014 UART: RITY.KEYID = 7
5,648,342 UART: [art] Erasing AUTHORITY.KEYID = 7
5,649,107 UART: [art] PUB.X = 71FF0049370607EE98F3418670221A31CDCD184B9A05B937D3D4FCA35D878B8F9318914E20E430A0090AC367B6142B58
5,655,834 UART: [art] PUB.Y = 0918E21E9DF03F02AC036D3663B837C1B8159C66B34A308A84CBCDC01A93308EE6D5E06897309A60B9A41A16BD07BA71
5,662,776 UART: [art] SIG.R = 732727EED20618A3B96949EE5D30FE371DAC1439A928379DD165306AB171708100ED22E7052CF7E31D7D37F0E83FE2A6
5,669,518 UART: [art] SIG.S = C81A03766B06006B9C26010B9FDC012E1165B69A8DC2F4DDCCC83894A3ABB68545F6EE97AF39A81C591BC3C43ED199A2
5,693,078 UART: mbox::rt_entry...
5,693,450 UART: ____ _ _ _ ____ _____
5,694,234 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,695,034 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,695,802 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,696,570 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,697,338 UART: |_|
5,697,650 UART:
5,978,942 UART: [rt] Runtime listening for mailbox commands...
5,980,179 >>> mbox cmd response data (120 bytes)
5,980,180 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,980,291 UART:
5,980,307 UART: Running Caliptra ROM ...
5,980,715 UART:
5,980,857 UART: [state] CFI Enabled
5,983,701 UART: [state] LifecycleState = Unprovisioned
5,984,356 UART: [state] DebugLocked = No
5,984,928 UART: [state] WD Timer not started. Device not locked for debugging
5,986,090 UART: [kat] SHA2-256
6,791,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,795,865 UART: [kat] ++
6,796,017 UART: [kat] sha1
6,800,245 UART: [kat] SHA2-256
6,802,185 UART: [kat] SHA2-384
6,804,882 UART: [kat] SHA2-512-ACC
6,806,782 UART: [kat] ECC-384
6,816,357 UART: [kat] HMAC-384Kdf
6,820,973 UART: [kat] LMS
7,069,301 UART: [kat] --
7,070,275 UART: [update-reset] ++
7,971,233 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,068,356 >>> mbox cmd response: success
8,068,356 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,068,599 UART: [update-reset] Copying MAN_2 To MAN_1
8,076,613 UART: [update-reset Success] --
8,077,478 UART: [state] Locking Datavault
8,078,414 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,018 UART: [state] Locking ICCM
8,079,446 UART: [exit] Launching FMC @ 0x40000130
8,084,775 UART:
8,084,791 UART: Running Caliptra FMC ...
8,085,199 UART:
8,085,342 UART: [state] CFI Enabled
8,174,529 UART: [art] Extend RT PCRs Done
8,174,957 UART: [art] Lock RT PCRs Done
8,175,898 UART: [art] Populate DV Done
8,183,939 UART: [fht] FMC Alias Private Key: 7
8,184,893 UART: [art] Derive CDI
8,185,173 UART: [art] Store in in slot 0x4
8,270,650 UART: [art] Derive Key Pair
8,271,010 UART: [art] Store priv key in slot 0x5
8,284,678 UART: [art] Derive Key Pair - Done
8,299,462 UART: [art] Signing Cert with AUTHO
8,299,942 UART: RITY.KEYID = 7
8,315,212 UART: [art] Erasing AUTHORITY.KEYID = 7
8,315,977 UART: [art] PUB.X = FF46AB3ABE64FEE1CAA0914DD3A3E2B745F6B807727D3C8004EF9DEE141555656FD91C048F8977A52CCC8BC6634E4376
8,322,752 UART: [art] PUB.Y = 9EF30356C18F9DA707F0D7DEDD940249C91A213184C4CE964AEF7E98AC6F0797D9C9ACABFA0448B195D55992A5FC0E04
8,329,695 UART: [art] SIG.R = 04B6888D5D4FF88086AB20C56D8ED77727BD5DDC5CE9EB6F6A3447463A30CD5BB4E81BD5435D7AFFE7E1481102C3C3CE
8,336,477 UART: [art] SIG.S = 16DA744C0C36010AF5FD0ABB3347F03A3F523BC4A6C1411E55361E0C1402BD1ABAA62C36F3BB37A1B015F355CFFA73A7
8,360,242 UART: mbox::rt_entry...
8,360,614 UART: ____ _ _ _ ____ _____
8,361,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,362,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,363,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,502 UART: |_|
8,364,814 UART:
8,643,544 UART: [rt] Runtime listening for mailbox commands...
8,644,781 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,046 ready_for_fw is high
1,060,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,231 >>> mbox cmd response: success
2,683,009 UART:
2,683,025 UART: Running Caliptra FMC ...
2,683,433 UART:
2,683,576 UART: [state] CFI Enabled
2,694,389 UART: [fht] FMC Alias Private Key: 7
2,802,160 UART: [art] Extend RT PCRs Done
2,802,588 UART: [art] Lock RT PCRs Done
2,804,412 UART: [art] Populate DV Done
2,812,799 UART: [fht] FMC Alias Private Key: 7
2,813,923 UART: [art] Derive CDI
2,814,203 UART: [art] Store in in slot 0x4
2,899,646 UART: [art] Derive Key Pair
2,900,006 UART: [art] Store priv key in slot 0x5
2,913,544 UART: [art] Derive Key Pair - Done
2,928,061 UART: [art] Signing Cert with AUTHO
2,928,541 UART: RITY.KEYID = 7
2,943,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,672 UART: [art] PUB.X = 16CBE4DA0353D36546285C5545B07E8C777F15C2C7DD46E50DA44A5D60B0A1268A9AC19EAEB6A5F681D047BACE9FC112
2,951,450 UART: [art] PUB.Y = C42EA8924A969FDBAFE42767F789688E004B10476C29E8ECE38C8277C506F4055A53BCBD032B46ED4E87BB5196DCD74D
2,958,379 UART: [art] SIG.R = 10711C30C7FF459FF548DC7D68686D2DCFDC16508E5995D7104686ED6944FA42167990B409157E004B08FE2F11223B47
2,965,115 UART: [art] SIG.S = 6A3614B2D549B61CD6572609E65624452D0A36CA348A1A1560DCF931C512EF6EA6C6AFAEE6F10CADCF1658DE57B972EA
2,988,965 UART: Caliptra RT
2,989,310 UART: [state] CFI Enabled
3,097,177 UART: [rt] RT listening for mailbox commands...
3,097,847 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,689 UART: [rt]cmd =0x54514754, len=24
3,129,798 >>> mbox cmd response data (8 bytes)
3,129,799 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,104,092 >>> mbox cmd response: success
5,104,092 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,117,402 UART:
5,117,418 UART: Running Caliptra FMC ...
5,117,826 UART:
5,117,969 UART: [state] CFI Enabled
5,207,600 UART: [art] Extend RT PCRs Done
5,208,028 UART: [art] Lock RT PCRs Done
5,209,077 UART: [art] Populate DV Done
5,217,276 UART: [fht] FMC Alias Private Key: 7
5,218,440 UART: [art] Derive CDI
5,218,720 UART: [art] Store in in slot 0x4
5,304,591 UART: [art] Derive Key Pair
5,304,951 UART: [art] Store priv key in slot 0x5
5,318,575 UART: [art] Derive Key Pair - Done
5,333,530 UART: [art] Signing Cert with AUTHO
5,334,010 UART: RITY.KEYID = 7
5,349,680 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,445 UART: [art] PUB.X = 6DCD9C81B26D038B6677CB70CA0E5754EB37505793314F027F8BEE61F1A9BC6E39D440C8131DDD68E820E26A81BEA6A8
5,357,216 UART: [art] PUB.Y = 39012988FFFF5F4366C371CD7F43D3EF555E87DD2036AEAE2EF00B734F0DA4C6EFEC3D80D748278867844200CF4A2A37
5,364,145 UART: [art] SIG.R = 58F6A7448E110E666C286E0792370A5DD158FFD7062DD7FDA707A9EEF9FAAA757E6BA1907DF5A5C3F21166020A7EC603
5,370,901 UART: [art] SIG.S = 65171D465D1AEBB59FA8404CE04459CA4B0E4AFAD660DEDE1C914B001AF94E3E2A6A5F54272821ED5610952F3EE0763B
5,394,495 UART: mbox::rt_entry...
5,394,867 UART: ____ _ _ _ ____ _____
5,395,651 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,396,451 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,397,219 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,397,987 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,398,755 UART: |_|
5,399,067 UART:
5,683,641 UART: [rt] Runtime listening for mailbox commands...
5,684,878 >>> mbox cmd response data (120 bytes)
5,684,879 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,656,698 >>> mbox cmd response: success
7,656,698 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,669,834 UART:
7,669,850 UART: Running Caliptra FMC ...
7,670,258 UART:
7,670,401 UART: [state] CFI Enabled
7,759,350 UART: [art] Extend RT PCRs Done
7,759,778 UART: [art] Lock RT PCRs Done
7,760,813 UART: [art] Populate DV Done
7,769,038 UART: [fht] FMC Alias Private Key: 7
7,770,142 UART: [art] Derive CDI
7,770,422 UART: [art] Store in in slot 0x4
7,855,687 UART: [art] Derive Key Pair
7,856,047 UART: [art] Store priv key in slot 0x5
7,869,505 UART: [art] Derive Key Pair - Done
7,884,296 UART: [art] Signing Cert with AUTHO
7,884,776 UART: RITY.KEYID = 7
7,900,268 UART: [art] Erasing AUTHORITY.KEYID = 7
7,901,033 UART: [art] PUB.X = 7E7CE019CEEF54B25013162E6EFC5FF8913FEEA2C9DC6A8481A18F763123B01DBB07BAFAAA47EA9984E1603FD445DC88
7,907,820 UART: [art] PUB.Y = 6BA4FB9E78A910EC5E1DADCDCA7AC67999F28D80321DD2EF5F4C5C6C5344B48542D2BB71A54125ABF4FEB06EF016F698
7,914,792 UART: [art] SIG.R = E9F13435439EFE0DC78F9DC8610ECAF4B96F635EA3E20DF5A5594C90FDF29285541E5F9F27F41E9F67EDEF47BBB74148
7,921,569 UART: [art] SIG.S = C3081B4BF533FC96F323E46B46462404759F9A5A9EDBDC3C5306DE1934386C7120B9462587D0A30633BB873B94CE901D
7,944,990 UART: mbox::rt_entry...
7,945,362 UART: ____ _ _ _ ____ _____
7,946,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,946,946 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,947,714 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,948,482 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,949,250 UART: |_|
7,949,562 UART:
8,236,955 UART: [rt] Runtime listening for mailbox commands...
8,238,192 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,436 UART: [kat] HMAC-384Kdf
921,026 UART: [kat] LMS
1,169,338 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,645 UART: [idev] ++
1,173,813 UART: [idev] CDI.KEYID = 6
1,174,174 UART: [idev] SUBJECT.KEYID = 7
1,174,599 UART: [idev] UDS.KEYID = 0
1,174,945 ready_for_fw is high
1,174,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,589 UART: [idev] Erasing UDS.KEYID = 0
1,199,301 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,209,280 UART: [ldev] ++
1,209,448 UART: [ldev] CDI.KEYID = 6
1,209,812 UART: [ldev] SUBJECT.KEYID = 5
1,210,239 UART: [ldev] AUTHORITY.KEYID = 7
1,210,702 UART: [ldev] FE.KEYID = 1
1,216,044 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,166 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,111 >>> mbox cmd response: success
2,770,178 UART: [afmc] ++
2,770,346 UART: [afmc] CDI.KEYID = 6
2,770,709 UART: [afmc] SUBJECT.KEYID = 7
2,771,135 UART: [afmc] AUTHORITY.KEYID = 5
2,806,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,267 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,879 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,598 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,461 UART: [afmc] --
2,849,511 UART: [cold-reset] --
2,850,633 UART: [state] Locking Datavault
2,851,972 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,576 UART: [state] Locking ICCM
2,853,060 UART: [exit] Launching FMC @ 0x40000130
2,858,389 UART:
2,858,405 UART: Running Caliptra FMC ...
2,858,813 UART:
2,858,867 UART: [state] CFI Enabled
2,869,476 UART: [fht] FMC Alias Private Key: 7
2,977,241 UART: [art] Extend RT PCRs Done
2,977,669 UART: [art] Lock RT PCRs Done
2,979,183 UART: [art] Populate DV Done
2,987,184 UART: [fht] FMC Alias Private Key: 7
2,988,254 UART: [art] Derive CDI
2,988,534 UART: [art] Store in in slot 0x4
3,074,589 UART: [art] Derive Key Pair
3,074,949 UART: [art] Store priv key in slot 0x5
3,088,301 UART: [art] Derive Key Pair - Done
3,103,212 UART: [art] Signing Cert with AUTHO
3,103,692 UART: RITY.KEYID = 7
3,118,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,301 UART: [art] PUB.X = 87A6495E7F99A9A32C19E11C72ED1645CC2E86DB279F23109CFA9385225333FBA941955AF6C3DC23B905EAEF2B8D2F0F
3,126,075 UART: [art] PUB.Y = 450BB261E5A72CEB585DB19E2157CCE3DE16D422AE699C8AF9A1D0BC42B139E0DF78829021BABC1DC87600F806DC02F6
3,133,010 UART: [art] SIG.R = 8CFFC351954DA63A3580AB82517049EF13F1993E3C6D849EC5CA4657BA6BDB9567F73DA5343792E0B83552AB7D947776
3,139,782 UART: [art] SIG.S = 39BF30F15CF37FAE8DA045813F926DA4BDEE156F549239BAF617ECCD3B8088B8E40D0C24D47D93C67ACC24B6D719AB5D
3,163,439 UART: Caliptra RT
3,163,692 UART: [state] CFI Enabled
3,271,689 UART: [rt] RT listening for mailbox commands...
3,272,359 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,387 UART: [rt]cmd =0x54514754, len=24
3,304,472 >>> mbox cmd response data (8 bytes)
3,304,473 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,098 UART:
3,305,114 UART: Running Caliptra ROM ...
3,305,522 UART:
3,305,577 UART: [state] CFI Enabled
3,307,847 UART: [state] LifecycleState = Unprovisioned
3,308,502 UART: [state] DebugLocked = No
3,309,234 UART: [state] WD Timer not started. Device not locked for debugging
3,310,514 UART: [kat] SHA2-256
4,114,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,118,193 UART: [kat] ++
4,118,345 UART: [kat] sha1
4,122,645 UART: [kat] SHA2-256
4,124,585 UART: [kat] SHA2-384
4,127,216 UART: [kat] SHA2-512-ACC
4,129,116 UART: [kat] ECC-384
4,138,627 UART: [kat] HMAC-384Kdf
4,143,275 UART: [kat] LMS
4,391,587 UART: [kat] --
4,392,141 UART: [update-reset] ++
5,294,638 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,295,665 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,391,675 >>> mbox cmd response: success
5,391,675 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,391,854 UART: [update-reset] Copying MAN_2 To MAN_1
5,399,868 UART: [update-reset Success] --
5,400,753 UART: [state] Locking Datavault
5,401,551 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,155 UART: [state] Locking ICCM
5,402,687 UART: [exit] Launching FMC @ 0x40000130
5,408,016 UART:
5,408,032 UART: Running Caliptra FMC ...
5,408,440 UART:
5,408,494 UART: [state] CFI Enabled
5,497,677 UART: [art] Extend RT PCRs Done
5,498,105 UART: [art] Lock RT PCRs Done
5,499,210 UART: [art] Populate DV Done
5,507,567 UART: [fht] FMC Alias Private Key: 7
5,508,593 UART: [art] Derive CDI
5,508,873 UART: [art] Store in in slot 0x4
5,594,506 UART: [art] Derive Key Pair
5,594,866 UART: [art] Store priv key in slot 0x5
5,607,928 UART: [art] Derive Key Pair - Done
5,622,840 UART: [art] Signing Cert with AUTHO
5,623,320 UART: RITY.KEYID = 7
5,638,926 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,691 UART: [art] PUB.X = 181F6344CFECFE176F9EB4BD711D1C8D576EB7C00B7D437E9EA5A90D17CCE42A76256008E87FFE6FB0A23AE8F125042E
5,646,467 UART: [art] PUB.Y = F8B80A1B20FEA9DB7C98D957A6663041F4590C52F94F9CC47F86B2A2048823339F8813159AE10A185848560F9F930D8B
5,653,395 UART: [art] SIG.R = 01CBB99C851A7F1AA6E74E948A5F2DC6AE974D0E0C9AFB8B6E11E31CCEC20D052581BFC8829E719A47D697187E3A57CC
5,660,168 UART: [art] SIG.S = 24F5B1557DE1B5840FF39CAF132252DD03B7248BCDC052DF7C6398390068482746FF9E9846564C2445E06915954DB632
5,684,067 UART: mbox::rt_entry...
5,684,439 UART: ____ _ _ _ ____ _____
5,685,223 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,686,023 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,686,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,687,559 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,688,327 UART: |_|
5,688,639 UART:
5,966,917 UART: [rt] Runtime listening for mailbox commands...
5,968,154 >>> mbox cmd response data (120 bytes)
5,968,155 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,968,266 UART:
5,968,282 UART: Running Caliptra ROM ...
5,968,690 UART:
5,968,745 UART: [state] CFI Enabled
5,971,641 UART: [state] LifecycleState = Unprovisioned
5,972,296 UART: [state] DebugLocked = No
5,972,874 UART: [state] WD Timer not started. Device not locked for debugging
5,974,020 UART: [kat] SHA2-256
6,777,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,781,699 UART: [kat] ++
6,781,851 UART: [kat] sha1
6,786,025 UART: [kat] SHA2-256
6,787,965 UART: [kat] SHA2-384
6,790,850 UART: [kat] SHA2-512-ACC
6,792,750 UART: [kat] ECC-384
6,802,661 UART: [kat] HMAC-384Kdf
6,807,205 UART: [kat] LMS
7,055,517 UART: [kat] --
7,056,469 UART: [update-reset] ++
7,957,580 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,958,663 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,054,673 >>> mbox cmd response: success
8,054,673 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,054,836 UART: [update-reset] Copying MAN_2 To MAN_1
8,062,850 UART: [update-reset Success] --
8,063,805 UART: [state] Locking Datavault
8,064,725 UART: [state] Locking PCR0, PCR1 and PCR31
8,065,329 UART: [state] Locking ICCM
8,065,891 UART: [exit] Launching FMC @ 0x40000130
8,071,220 UART:
8,071,236 UART: Running Caliptra FMC ...
8,071,644 UART:
8,071,698 UART: [state] CFI Enabled
8,160,911 UART: [art] Extend RT PCRs Done
8,161,339 UART: [art] Lock RT PCRs Done
8,162,710 UART: [art] Populate DV Done
8,170,685 UART: [fht] FMC Alias Private Key: 7
8,171,827 UART: [art] Derive CDI
8,172,107 UART: [art] Store in in slot 0x4
8,258,048 UART: [art] Derive Key Pair
8,258,408 UART: [art] Store priv key in slot 0x5
8,270,968 UART: [art] Derive Key Pair - Done
8,285,865 UART: [art] Signing Cert with AUTHO
8,286,345 UART: RITY.KEYID = 7
8,301,291 UART: [art] Erasing AUTHORITY.KEYID = 7
8,302,056 UART: [art] PUB.X = 0A5ED21C1D10AB74E6DEE863347481D2DCEC64823D528CC56745FB30E9477FF73391EC3782B0A95CCAC413C7D0158E61
8,308,831 UART: [art] PUB.Y = D5CA6E5980B0A15E7A2D96D7228CF72D39CCDC1AB4BFC46D22BAABE940758BD65590F36936BF903FCC1C8DDFFFD72ABD
8,315,811 UART: [art] SIG.R = 3D70116931EBF450A2B47FB3FCC68CD2BD6672D6C8CD9CB831ED6A4DA8198C763A1181AF7D16E3133EF476B17D6529C3
8,322,593 UART: [art] SIG.S = 0DC8FF97F1607708247646E593DB72A3D3D71999992FA2AA0839C2E5126314BE15ECC521869B654D434D32EF6DE774FF
8,345,989 UART: mbox::rt_entry...
8,346,361 UART: ____ _ _ _ ____ _____
8,347,145 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,347,945 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,348,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,349,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,350,249 UART: |_|
8,350,561 UART:
8,632,145 UART: [rt] Runtime listening for mailbox commands...
8,633,382 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,046 ready_for_fw is high
1,056,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,507 >>> mbox cmd response: success
2,679,609 UART:
2,679,625 UART: Running Caliptra FMC ...
2,680,033 UART:
2,680,087 UART: [state] CFI Enabled
2,690,420 UART: [fht] FMC Alias Private Key: 7
2,798,149 UART: [art] Extend RT PCRs Done
2,798,577 UART: [art] Lock RT PCRs Done
2,799,929 UART: [art] Populate DV Done
2,807,990 UART: [fht] FMC Alias Private Key: 7
2,809,046 UART: [art] Derive CDI
2,809,326 UART: [art] Store in in slot 0x4
2,895,099 UART: [art] Derive Key Pair
2,895,459 UART: [art] Store priv key in slot 0x5
2,908,397 UART: [art] Derive Key Pair - Done
2,923,199 UART: [art] Signing Cert with AUTHO
2,923,679 UART: RITY.KEYID = 7
2,938,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,378 UART: [art] PUB.X = BA5344B57A137FBC9ED679A68F8354C9591DE895C23F5A34BB88442430A0B5AACEF6D7FB1AA7F9A7AAF638791D989702
2,946,157 UART: [art] PUB.Y = D0660D8A07C3C84706E1EEAA1EB868EFCB248B14397CD592998BFDFE62377F48714063C8478002E54984DAF5228D2248
2,953,095 UART: [art] SIG.R = A4C8BFF2D658930FEAF7430E842C0090E9A10E1E3EB8AB36EA4ABAAE1E627555C778CE018109F3B0A48E808DCE4139FD
2,959,846 UART: [art] SIG.S = 27A514827FF87D28AA083BCDE8BBC6A9B931A773C04EA1BD528E55A34CD0CC02A6FF32FE0517A16BB4E7D6DD8CB548CE
2,983,654 UART: Caliptra RT
2,983,907 UART: [state] CFI Enabled
3,092,700 UART: [rt] RT listening for mailbox commands...
3,093,370 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,266 UART: [rt]cmd =0x54514754, len=24
3,125,317 >>> mbox cmd response data (8 bytes)
3,125,318 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,094,417 >>> mbox cmd response: success
5,094,417 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,107,427 UART:
5,107,443 UART: Running Caliptra FMC ...
5,107,851 UART:
5,107,905 UART: [state] CFI Enabled
5,196,920 UART: [art] Extend RT PCRs Done
5,197,348 UART: [art] Lock RT PCRs Done
5,198,955 UART: [art] Populate DV Done
5,207,128 UART: [fht] FMC Alias Private Key: 7
5,208,136 UART: [art] Derive CDI
5,208,416 UART: [art] Store in in slot 0x4
5,294,361 UART: [art] Derive Key Pair
5,294,721 UART: [art] Store priv key in slot 0x5
5,308,525 UART: [art] Derive Key Pair - Done
5,323,503 UART: [art] Signing Cert with AUTHO
5,323,983 UART: RITY.KEYID = 7
5,339,541 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,306 UART: [art] PUB.X = 32F0B2EDD7071FCEBFF89BF6662AB9936F9CE75A00392A066355532D4E192D5D41AB4E6FB76D0A31434D9D1F93361A55
5,347,053 UART: [art] PUB.Y = 3DD3A719EED5D6E695CEE3A6686FCFA3B0D37AD7F75EA7FAAC3DAABF0E8C7162AF7F9120F3CCF00CEC19EC555F4D347C
5,354,033 UART: [art] SIG.R = 9C7A3D57C0C34BE210A716F6825076028A466589277C74295A9D98F1237B9A88A157B8DB7A24945C70F7E109FBFFE9A8
5,360,795 UART: [art] SIG.S = 2C9087F7A4D2010AE385EB4E37E8CF20B45E1CEE9D63C1AF5EDC80E573E6E93AB36CDCF53260B4E27EB725B9E85658BC
5,384,070 UART: mbox::rt_entry...
5,384,442 UART: ____ _ _ _ ____ _____
5,385,226 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,386,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,386,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,387,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,388,330 UART: |_|
5,388,642 UART:
5,669,776 UART: [rt] Runtime listening for mailbox commands...
5,671,013 >>> mbox cmd response data (120 bytes)
5,671,014 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,639,005 >>> mbox cmd response: success
7,639,005 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,652,225 UART:
7,652,241 UART: Running Caliptra FMC ...
7,652,649 UART:
7,652,703 UART: [state] CFI Enabled
7,741,630 UART: [art] Extend RT PCRs Done
7,742,058 UART: [art] Lock RT PCRs Done
7,743,295 UART: [art] Populate DV Done
7,751,316 UART: [fht] FMC Alias Private Key: 7
7,752,482 UART: [art] Derive CDI
7,752,762 UART: [art] Store in in slot 0x4
7,838,321 UART: [art] Derive Key Pair
7,838,681 UART: [art] Store priv key in slot 0x5
7,851,987 UART: [art] Derive Key Pair - Done
7,866,867 UART: [art] Signing Cert with AUTHO
7,867,347 UART: RITY.KEYID = 7
7,882,883 UART: [art] Erasing AUTHORITY.KEYID = 7
7,883,648 UART: [art] PUB.X = DCF1946370899D1C42B3EA6CC0D362F550EC8B2A20DB4040A2FF3CD51B7F93CC120F3F1416584EF85D3E794471C23726
7,890,421 UART: [art] PUB.Y = 931A1C613E88E444B1681378A9149742A5806707416A202717F74B74926E386EBB9BE646A1F90C3C003F3C63F7E1B723
7,897,331 UART: [art] SIG.R = A0E379EF1BD5326D47E62C1E06B931A3C9A8F1AC58E77B0A18D27B7CAA71272ADEC703FC13865BEB8E69336B0594F510
7,904,101 UART: [art] SIG.S = 85AB534357ED8FF1EA5BF06F022D52A297F83A71C8E99CF6428C6101BE895B328387E7FAF42507D82AAED4330AEFDD07
7,928,639 UART: mbox::rt_entry...
7,929,011 UART: ____ _ _ _ ____ _____
7,929,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,930,595 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,931,363 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,932,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,932,899 UART: |_|
7,933,211 UART:
8,217,144 UART: [rt] Runtime listening for mailbox commands...
8,218,381 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,174,172 ready_for_fw is high
1,174,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,085 UART: [ldev] ++
1,209,253 UART: [ldev] CDI.KEYID = 6
1,209,617 UART: [ldev] SUBJECT.KEYID = 5
1,210,044 UART: [ldev] AUTHORITY.KEYID = 7
1,210,507 UART: [ldev] FE.KEYID = 1
1,215,475 UART: [ldev] Erasing FE.KEYID = 1
1,241,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,113 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,104 >>> mbox cmd response: success
2,771,141 UART: [afmc] ++
2,771,309 UART: [afmc] CDI.KEYID = 6
2,771,672 UART: [afmc] SUBJECT.KEYID = 7
2,772,098 UART: [afmc] AUTHORITY.KEYID = 5
2,807,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,966 UART: [afmc] --
2,850,922 UART: [cold-reset] --
2,851,870 UART: [state] Locking Datavault
2,853,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,787 UART: [state] Locking ICCM
2,854,461 UART: [exit] Launching FMC @ 0x40000130
2,859,790 UART:
2,859,806 UART: Running Caliptra FMC ...
2,860,214 UART:
2,860,357 UART: [state] CFI Enabled
2,870,850 UART: [fht] FMC Alias Private Key: 7
2,979,269 UART: [art] Extend RT PCRs Done
2,979,697 UART: [art] Lock RT PCRs Done
2,981,303 UART: [art] Populate DV Done
2,989,630 UART: [fht] FMC Alias Private Key: 7
2,990,650 UART: [art] Derive CDI
2,990,930 UART: [art] Store in in slot 0x4
3,076,699 UART: [art] Derive Key Pair
3,077,059 UART: [art] Store priv key in slot 0x5
3,090,765 UART: [art] Derive Key Pair - Done
3,105,817 UART: [art] Signing Cert with AUTHO
3,106,297 UART: RITY.KEYID = 7
3,121,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,388 UART: [art] PUB.X = 3582D17D9B55C6DD50811AAF92616A991FB62C8177CC99F6B9B96A8DE7D827D3542C1CBF65A414547634EF4E98342FE3
3,129,162 UART: [art] PUB.Y = 42D8D9594D74D3DCEDDB701F9A260E3F27137A7D4FA48F3FF6BD5CA1B9D57DCAC8FDE55D8670B5A9FB515FCCE41B5695
3,136,135 UART: [art] SIG.R = CC3C997750578FF0D6AE8C9308F61BAD384C415777A5A53A01720E3D4E4DBA4B513193487BB9FE8E31A796C02CAB1138
3,142,902 UART: [art] SIG.S = A547839EF368450C103E1171A5140E798B3791BDA30E46FB9504AE7828C494F445A98951C1D2FD2CC4B989E62CEF5EA1
3,167,451 UART: Caliptra RT
3,167,796 UART: [state] CFI Enabled
3,275,058 UART: [rt] RT listening for mailbox commands...
3,275,728 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,830 UART: [rt]cmd =0x54514754, len=24
3,308,133 >>> mbox cmd response data (8 bytes)
3,308,134 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,765 UART:
3,308,781 UART: Running Caliptra ROM ...
3,309,189 UART:
3,309,331 UART: [state] CFI Enabled
3,311,869 UART: [state] LifecycleState = Unprovisioned
3,312,524 UART: [state] DebugLocked = No
3,313,240 UART: [state] WD Timer not started. Device not locked for debugging
3,314,426 UART: [kat] SHA2-256
4,117,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,105 UART: [kat] ++
4,122,257 UART: [kat] sha1
4,126,655 UART: [kat] SHA2-256
4,128,595 UART: [kat] SHA2-384
4,131,484 UART: [kat] SHA2-512-ACC
4,133,384 UART: [kat] ECC-384
4,142,969 UART: [kat] HMAC-384Kdf
4,147,587 UART: [kat] LMS
4,395,899 UART: [kat] --
4,396,701 UART: [update-reset] ++
5,297,968 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,299,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
5,395,177 >>> mbox cmd response: success
5,395,177 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,395,316 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,330 UART: [update-reset Success] --
5,404,541 UART: [state] Locking Datavault
5,405,481 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,085 UART: [state] Locking ICCM
5,406,523 UART: [exit] Launching FMC @ 0x40000130
5,411,852 UART:
5,411,868 UART: Running Caliptra FMC ...
5,412,276 UART:
5,412,419 UART: [state] CFI Enabled
5,502,260 UART: [art] Extend RT PCRs Done
5,502,688 UART: [art] Lock RT PCRs Done
5,503,883 UART: [art] Populate DV Done
5,512,328 UART: [fht] FMC Alias Private Key: 7
5,513,504 UART: [art] Derive CDI
5,513,784 UART: [art] Store in in slot 0x4
5,599,689 UART: [art] Derive Key Pair
5,600,049 UART: [art] Store priv key in slot 0x5
5,613,347 UART: [art] Derive Key Pair - Done
5,628,235 UART: [art] Signing Cert with AUTHO
5,628,715 UART: RITY.KEYID = 7
5,643,647 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,412 UART: [art] PUB.X = BDBEF9199301BB673D2E1281931022F7D00DBA5DCF24D955F4F6F9399BA0619B270161208C345A9DA553FFC5EDF3888B
5,651,181 UART: [art] PUB.Y = 83CCC96422BEC45B38294001FD86F823EA1CB712A2B3D8F510EEF8A4B34ECC25A0967415FA886BE5AC7375015FD69B97
5,658,135 UART: [art] SIG.R = FC8A3230A16DD90D6134085FE06F705BD1456183C7CC6A3ED2FD8E70B6D97A09AC57FA850987F71731CC8B6ABA92A57A
5,664,905 UART: [art] SIG.S = 8BFA2510B050E15F62306E57334BD92F70C005BED58F7E33DAE67BC594157D1F79D351F2D1F4E61EE5E638F31B5E3020
5,688,525 UART: mbox::rt_entry...
5,688,897 UART: ____ _ _ _ ____ _____
5,689,681 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,690,481 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,691,249 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,692,017 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,692,785 UART: |_|
5,693,097 UART:
5,973,650 UART: [rt] Runtime listening for mailbox commands...
5,974,887 >>> mbox cmd response data (120 bytes)
5,974,888 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
5,974,999 UART:
5,975,015 UART: Running Caliptra ROM ...
5,975,423 UART:
5,975,565 UART: [state] CFI Enabled
5,977,909 UART: [state] LifecycleState = Unprovisioned
5,978,564 UART: [state] DebugLocked = No
5,979,098 UART: [state] WD Timer not started. Device not locked for debugging
5,980,306 UART: [kat] SHA2-256
6,783,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,787,985 UART: [kat] ++
6,788,137 UART: [kat] sha1
6,792,271 UART: [kat] SHA2-256
6,794,211 UART: [kat] SHA2-384
6,796,746 UART: [kat] SHA2-512-ACC
6,798,646 UART: [kat] ECC-384
6,808,569 UART: [kat] HMAC-384Kdf
6,813,387 UART: [kat] LMS
7,061,699 UART: [kat] --
7,062,579 UART: [update-reset] ++
7,964,414 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,965,457 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53772
8,061,467 >>> mbox cmd response: success
8,061,467 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,061,634 UART: [update-reset] Copying MAN_2 To MAN_1
8,069,648 UART: [update-reset Success] --
8,070,611 UART: [state] Locking Datavault
8,071,451 UART: [state] Locking PCR0, PCR1 and PCR31
8,072,055 UART: [state] Locking ICCM
8,072,519 UART: [exit] Launching FMC @ 0x40000130
8,077,848 UART:
8,077,864 UART: Running Caliptra FMC ...
8,078,272 UART:
8,078,415 UART: [state] CFI Enabled
8,167,192 UART: [art] Extend RT PCRs Done
8,167,620 UART: [art] Lock RT PCRs Done
8,169,253 UART: [art] Populate DV Done
8,177,610 UART: [fht] FMC Alias Private Key: 7
8,178,628 UART: [art] Derive CDI
8,178,908 UART: [art] Store in in slot 0x4
8,264,491 UART: [art] Derive Key Pair
8,264,851 UART: [art] Store priv key in slot 0x5
8,278,085 UART: [art] Derive Key Pair - Done
8,293,337 UART: [art] Signing Cert with AUTHO
8,293,817 UART: RITY.KEYID = 7
8,308,963 UART: [art] Erasing AUTHORITY.KEYID = 7
8,309,728 UART: [art] PUB.X = D41C1D128303FB4AC01C314B0F727980D3394155ED39A63E24A8C468BF179906CA1E351609ECD67DC8B6F0A4A0328839
8,316,486 UART: [art] PUB.Y = E56E656AE3D062FAB1F88AC4FFAAC0A5CE28F6B3B664A7B39FC8246EDA440C33838832AA8958756664E366E4FC718B92
8,323,445 UART: [art] SIG.R = 9B42932E32DEA107896F39126095236360AD45A0636AA5E35324A825EDF55003A81FF8261013B09FE3DF8267DFB66E9D
8,330,205 UART: [art] SIG.S = F756C7F74B787873BCB3E188FBECAF8614CA1D0CCD20727AD9F189B7268A59C5CE9A81B3519812D780F0C25B15A1D980
8,353,759 UART: mbox::rt_entry...
8,354,131 UART: ____ _ _ _ ____ _____
8,354,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,355,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,356,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,357,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,358,019 UART: |_|
8,358,331 UART:
8,642,074 UART: [rt] Runtime listening for mailbox commands...
8,643,311 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 ready_for_fw is high
1,056,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,632 >>> mbox cmd response: success
2,681,124 UART:
2,681,140 UART: Running Caliptra FMC ...
2,681,548 UART:
2,681,691 UART: [state] CFI Enabled
2,692,540 UART: [fht] FMC Alias Private Key: 7
2,800,881 UART: [art] Extend RT PCRs Done
2,801,309 UART: [art] Lock RT PCRs Done
2,802,923 UART: [art] Populate DV Done
2,811,214 UART: [fht] FMC Alias Private Key: 7
2,812,214 UART: [art] Derive CDI
2,812,494 UART: [art] Store in in slot 0x4
2,898,393 UART: [art] Derive Key Pair
2,898,753 UART: [art] Store priv key in slot 0x5
2,911,637 UART: [art] Derive Key Pair - Done
2,926,739 UART: [art] Signing Cert with AUTHO
2,927,219 UART: RITY.KEYID = 7
2,942,457 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,222 UART: [art] PUB.X = 8470B227C0637149F133BBE6091C20DD6947730D8107826D93F79C0C77AA9622A6EEF1361255D5376523AB4FE3D5D1CB
2,949,976 UART: [art] PUB.Y = 87611596FA1E229356064FAA396EB1A23E7A368151582388B26C6464E4B48F8600BE8D7731182E082FF7888B76DA0575
2,956,883 UART: [art] SIG.R = DD27D0F1E9FD3A3802B40C49C4276CEA30F1C5BA665CB5F97A0233A3EAA7E5B225A9709EB498BC6D421873003A942984
2,963,630 UART: [art] SIG.S = 136D98AF87E93D39837AEDAAD5AD48C6052AED57B13B8C4E14366133E287125E62CFA727AF91C1AE0A43D0B33BA99507
2,987,044 UART: Caliptra RT
2,987,389 UART: [state] CFI Enabled
3,095,380 UART: [rt] RT listening for mailbox commands...
3,096,050 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,076 UART: [rt]cmd =0x54514754, len=24
3,128,097 >>> mbox cmd response data (8 bytes)
3,128,098 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,870 >>> mbox cmd response: success
5,097,870 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,111,086 UART:
5,111,102 UART: Running Caliptra FMC ...
5,111,510 UART:
5,111,653 UART: [state] CFI Enabled
5,200,896 UART: [art] Extend RT PCRs Done
5,201,324 UART: [art] Lock RT PCRs Done
5,202,735 UART: [art] Populate DV Done
5,211,168 UART: [fht] FMC Alias Private Key: 7
5,212,172 UART: [art] Derive CDI
5,212,452 UART: [art] Store in in slot 0x4
5,297,997 UART: [art] Derive Key Pair
5,298,357 UART: [art] Store priv key in slot 0x5
5,312,015 UART: [art] Derive Key Pair - Done
5,326,883 UART: [art] Signing Cert with AUTHO
5,327,363 UART: RITY.KEYID = 7
5,342,491 UART: [art] Erasing AUTHORITY.KEYID = 7
5,343,256 UART: [art] PUB.X = 77A41D33AF134F543178BA8A0F67A5A15F46FE92406482562FA8593615120B616858BB36DAA13C273DE53075FF56446D
5,350,014 UART: [art] PUB.Y = 681216F5F0271053E36BA0F9FC74B88DA18650024DD7DC1AF8B87BBCA141D67BC193AA2D4E3672AA2B49C386D2C7BC8E
5,356,975 UART: [art] SIG.R = AC4C30E2B6547083BB947266A17CDD90E7B0B8F8A8FB0788EB65ED2A6CF0D08F317739075092DC19317F49F5ACE54726
5,363,745 UART: [art] SIG.S = 001ACE30E6DB2B660CBC0EA67A8642FCA375A2B959D6886C15D66F78C12AA56F67221C4A96D73F260251F55F75A42D67
5,387,575 UART: mbox::rt_entry...
5,387,947 UART: ____ _ _ _ ____ _____
5,388,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,389,531 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,390,299 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,391,067 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,391,835 UART: |_|
5,392,147 UART:
5,675,380 UART: [rt] Runtime listening for mailbox commands...
5,676,617 >>> mbox cmd response data (120 bytes)
5,676,618 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
7,645,602 >>> mbox cmd response: success
7,645,602 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,658,872 UART:
7,658,888 UART: Running Caliptra FMC ...
7,659,296 UART:
7,659,439 UART: [state] CFI Enabled
7,749,138 UART: [art] Extend RT PCRs Done
7,749,566 UART: [art] Lock RT PCRs Done
7,750,849 UART: [art] Populate DV Done
7,758,928 UART: [fht] FMC Alias Private Key: 7
7,759,866 UART: [art] Derive CDI
7,760,146 UART: [art] Store in in slot 0x4
7,846,317 UART: [art] Derive Key Pair
7,846,677 UART: [art] Store priv key in slot 0x5
7,860,209 UART: [art] Derive Key Pair - Done
7,875,075 UART: [art] Signing Cert with AUTHO
7,875,555 UART: RITY.KEYID = 7
7,890,935 UART: [art] Erasing AUTHORITY.KEYID = 7
7,891,700 UART: [art] PUB.X = 147CC73D6CD711B5C37E1D7E4C92BB92EB2181C6DD7D00631FF713FF73272A3342DEBC71FFECD438DE62FEA794F6E818
7,898,466 UART: [art] PUB.Y = D1265F57AE03165EFCEBD03BC3CA42F58AD18AC739CDBBD0BC8486D91687C0EE49762DB4CA6A0AB7CB78FE6A20A458AE
7,905,438 UART: [art] SIG.R = 961E76F02E2C7EC8D44D3A1EE96A82CE472F87A785632667D6534F22C48E93FFAA8D2B4678FA596E8EA62E4E31A0D1E0
7,912,218 UART: [art] SIG.S = 1F000B7773852D59A384EC272BAE068EE05183FE309F609FF7615C2538CC033217CD030AE37E276641EB3DB778EC7EE8
7,936,106 UART: mbox::rt_entry...
7,936,478 UART: ____ _ _ _ ____ _____
7,937,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,938,062 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,938,830 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,939,598 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,940,366 UART: |_|
7,940,678 UART:
8,217,628 UART: [rt] Runtime listening for mailbox commands...
8,218,865 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
191,580 UART:
191,945 UART: Running Caliptra ROM ...
193,106 UART:
193,263 UART: [state] CFI Enabled
267,194 UART: [state] LifecycleState = Production
269,402 UART: [state] DebugLocked = Yes
272,386 UART: [state] Starting the WD Timer 40000000 cycles
277,404 UART: [kat] SHA2-256
459,430 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,912 UART: [kat] ++
471,539 UART: [kat] sha1
482,451 UART: [kat] SHA2-256
485,539 UART: [kat] SHA2-384
491,597 UART: [kat] SHA2-512-ACC
494,176 UART: [kat] ECC-384
3,776,454 UART: [kat] HMAC-384Kdf
3,803,043 UART: [kat] LMS
4,876,186 UART: [kat] --
4,880,667 UART: [cold-reset] ++
4,882,537 UART: [fht] FHT @ 0x50003400
4,893,659 UART: [idev] ++
4,894,297 UART: [idev] CDI.KEYID = 6
4,895,467 UART: [idev] SUBJECT.KEYID = 7
4,896,641 UART: [idev] UDS.KEYID = 0
4,897,635 ready_for_fw is high
4,897,830 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,996,757 UART: [idev] Erasing UDS.KEYID = 0
8,241,939 UART: [idev] Sha1 KeyId Algorithm
8,264,867 UART: [idev] --
8,268,694 UART: [ldev] ++
8,269,262 UART: [ldev] CDI.KEYID = 6
8,270,362 UART: [ldev] SUBJECT.KEYID = 5
8,271,625 UART: [ldev] AUTHORITY.KEYID = 7
8,272,722 UART: [ldev] FE.KEYID = 1
8,318,988 UART: [ldev] Erasing FE.KEYID = 1
11,654,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,015 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,318 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,998,315 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,014,448 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,035,027 UART: [ldev] --
14,039,165 UART: [fwproc] Wait for Commands...
14,041,853 UART: [fwproc] Recv command 0x46574c44
14,044,171 UART: [fwproc] Recv'd Img size: 78492 bytes
17,704,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,781,291 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,850,076 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,043,234 >>> mbox cmd response: success
18,047,661 UART: [afmc] ++
18,048,278 UART: [afmc] CDI.KEYID = 6
18,049,483 UART: [afmc] SUBJECT.KEYID = 7
18,050,594 UART: [afmc] AUTHORITY.KEYID = 5
21,409,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,710,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,712,992 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,728,993 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,745,110 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,761,200 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,783,358 UART: [afmc] --
23,786,067 UART: [cold-reset] --
23,789,559 UART: [state] Locking Datavault
23,795,294 UART: [state] Locking PCR0, PCR1 and PCR31
23,796,944 UART: [state] Locking ICCM
23,798,773 UART: [exit] Launching FMC @ 0x40000130
23,807,445 UART:
23,807,676 UART: Running Caliptra FMC ...
23,808,776 UART:
23,808,933 UART: [state] CFI Enabled
23,870,161 UART: [fht] FMC Alias Private Key: 7
26,207,399 UART: [art] Extend RT PCRs Done
26,208,632 UART: [art] Lock RT PCRs Done
26,210,204 UART: [art] Populate DV Done
26,215,357 UART: [fht] FMC Alias Private Key: 7
26,217,000 UART: [art] Derive CDI
26,217,819 UART: [art] Store in in slot 0x4
26,278,806 UART: [art] Derive Key Pair
26,279,854 UART: [art] Store priv key in slot 0x5
29,572,445 UART: [art] Derive Key Pair - Done
29,585,114 UART: [art] Signing Cert with AUTHO
29,586,415 UART: RITY.KEYID = 7
31,874,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,876,503 UART: [art] PUB.X = 817E6791A6B245E7F9C7EDCDEE91C2E1202CDA12494CED75E8E541A55A76F22D65A0E82AAFB322C30C90626B05299A5A
31,883,762 UART: [art] PUB.Y = DAC3B38E2E7574741FD48618533E067309AD1BC699EBF5D5F7D6A25BBEF1B05B7B8DD7A3B812EA0774983CB586A9B26B
31,891,013 UART: [art] SIG.R = EF8B7CD77FAAC59BD1E29AFE7603F464AD95206285A49E99EA9DC4B4EB942807DA651FFF64346CCB77D8078AE0508210
31,898,374 UART: [art] SIG.S = 455450E03D2966215D75C8CBA152A1BF76B488B0AA1A37BB95065635B44F5B1852865D2DF6D58DDDC7548B2DF632286E
33,203,413 UART: mbox::rt_entry...
33,204,383 UART: ____ _ _ _ ____ _____
33,206,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,208,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,210,278 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,212,216 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,214,144 UART: |_|
33,214,980 UART:
33,328,060 UART: [rt] Runtime listening for mailbox commands...
33,330,068 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,330,572 >>> mbox cmd response data (0 bytes)
Initializing fuses
987 UART:
1,137 UART: Running Caliptra ROM ...
2,153 UART:
2,297 UART: [state] CFI Enabled
59,749 UART: [state] LifecycleState = Production
61,516 UART: [state] DebugLocked = Yes
64,180 UART: [state] Starting the WD Timer 40000000 cycles
69,265 UART: [kat] SHA2-256
251,245 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
262,758 UART: [kat] ++
263,265 UART: [kat] sha1
274,952 UART: [kat] SHA2-256
278,013 UART: [kat] SHA2-384
282,803 UART: [kat] SHA2-512-ACC
285,411 UART: [kat] ECC-384
3,569,135 UART: [kat] HMAC-384Kdf
3,595,793 UART: [kat] LMS
4,668,958 UART: [kat] --
4,674,045 UART: [warm-reset] ++
4,679,065 UART: [warm-reset] --
4,684,129 UART: [state] Locking Datavault
4,686,857 UART: [state] Locking PCR0, PCR1 and PCR31
4,689,056 UART: [state] Locking ICCM
4,690,643 UART: [exit] Launching FMC @ 0x40000130
4,699,324 UART:
4,699,559 UART: Running Caliptra FMC ...
4,700,662 UART:
4,700,823 UART: [state] CFI Enabled
4,760,921 UART: [aliasrt :skip pcr extension
4,762,214 UART: [art] Extend RT PCRs Done
4,763,368 UART: [art] Lock RT PCRs Done
4,764,438 UART: [art] Populate DV Done
4,770,005 UART: [fht] FMC Alias Private Key: 7
4,771,663 UART: [art] Derive CDI
4,772,480 UART: [art] Store in in slot 0x4
4,829,326 UART: [art] Derive Key Pair
4,830,373 UART: [art] Store priv key in slot 0x5
8,123,196 UART: [art] Derive Key Pair - Done
8,136,205 UART: [art] Signing Cert with AUTHO
8,137,531 UART: RITY.KEYID = 7
10,423,773 UART: [art] Erasing AUTHORITY.KEYID = 7
10,425,278 UART: [art] PUB.X = 817E6791A6B245E7F9C7EDCDEE91C2E1202CDA12494CED75E8E541A55A76F22D65A0E82AAFB322C30C90626B05299A5A
10,432,530 UART: [art] PUB.Y = DAC3B38E2E7574741FD48618533E067309AD1BC699EBF5D5F7D6A25BBEF1B05B7B8DD7A3B812EA0774983CB586A9B26B
10,439,758 UART: [art] SIG.R = EF8B7CD77FAAC59BD1E29AFE7603F464AD95206285A49E99EA9DC4B4EB942807DA651FFF64346CCB77D8078AE0508210
10,447,144 UART: [art] SIG.S = 455450E03D2966215D75C8CBA152A1BF76B488B0AA1A37BB95065635B44F5B1852865D2DF6D58DDDC7548B2DF632286E
11,751,692 UART: mbox::rt_entry...
11,752,659 UART: ____ _ _ _ ____ _____
11,754,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,756,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,758,459 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,760,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,762,260 UART: |_|
11,763,146 UART:
12,049,066 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,573 UART:
191,947 UART: Running Caliptra ROM ...
193,028 UART:
193,196 UART: [state] CFI Enabled
263,927 UART: [state] LifecycleState = Production
266,100 UART: [state] DebugLocked = Yes
268,621 UART: [state] Starting the WD Timer 40000000 cycles
274,645 UART: [kat] SHA2-256
456,618 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,157 UART: [kat] ++
468,630 UART: [kat] sha1
479,040 UART: [kat] SHA2-256
482,061 UART: [kat] SHA2-384
487,774 UART: [kat] SHA2-512-ACC
490,359 UART: [kat] ECC-384
3,776,195 UART: [kat] HMAC-384Kdf
3,804,318 UART: [kat] LMS
4,877,493 UART: [kat] --
4,881,356 UART: [cold-reset] ++
4,882,672 UART: [fht] FHT @ 0x50003400
4,892,804 UART: [idev] ++
4,893,514 UART: [idev] CDI.KEYID = 6
4,894,696 UART: [idev] SUBJECT.KEYID = 7
4,895,877 UART: [idev] UDS.KEYID = 0
4,896,803 ready_for_fw is high
4,897,333 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,996,257 UART: [idev] Erasing UDS.KEYID = 0
8,224,747 UART: [idev] Sha1 KeyId Algorithm
8,247,126 UART: [idev] --
8,251,179 UART: [ldev] ++
8,251,750 UART: [ldev] CDI.KEYID = 6
8,252,985 UART: [ldev] SUBJECT.KEYID = 5
8,254,159 UART: [ldev] AUTHORITY.KEYID = 7
8,255,256 UART: [ldev] FE.KEYID = 1
8,295,432 UART: [ldev] Erasing FE.KEYID = 1
11,628,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,864 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,957,185 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,973,172 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,989,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,008,706 UART: [ldev] --
14,014,136 UART: [fwproc] Wait for Commands...
14,017,212 UART: [fwproc] Recv command 0x46574c44
14,019,512 UART: [fwproc] Recv'd Img size: 78492 bytes
17,677,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,751,851 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,820,594 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,013,305 >>> mbox cmd response: success
18,017,813 UART: [afmc] ++
18,018,443 UART: [afmc] CDI.KEYID = 6
18,019,644 UART: [afmc] SUBJECT.KEYID = 7
18,020,771 UART: [afmc] AUTHORITY.KEYID = 5
21,393,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,689,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,691,670 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,707,647 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,723,751 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,739,799 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,763,230 UART: [afmc] --
23,766,580 UART: [cold-reset] --
23,770,554 UART: [state] Locking Datavault
23,774,993 UART: [state] Locking PCR0, PCR1 and PCR31
23,776,692 UART: [state] Locking ICCM
23,778,195 UART: [exit] Launching FMC @ 0x40000130
23,786,837 UART:
23,787,071 UART: Running Caliptra FMC ...
23,788,177 UART:
23,788,357 UART: [state] CFI Enabled
23,848,397 UART: [fht] FMC Alias Private Key: 7
26,186,380 UART: [art] Extend RT PCRs Done
26,187,607 UART: [art] Lock RT PCRs Done
26,189,099 UART: [art] Populate DV Done
26,194,524 UART: [fht] FMC Alias Private Key: 7
26,196,067 UART: [art] Derive CDI
26,196,889 UART: [art] Store in in slot 0x4
26,257,455 UART: [art] Derive Key Pair
26,258,490 UART: [art] Store priv key in slot 0x5
29,550,793 UART: [art] Derive Key Pair - Done
29,563,907 UART: [art] Signing Cert with AUTHO
29,565,203 UART: RITY.KEYID = 7
31,852,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,854,099 UART: [art] PUB.X = 08D718088B5CCF2A68F5D0598B309B167C6684E09D5CA9BDFF59A3206E3A43C4E45A026E4DA32F5621D1C1559285EDDB
31,861,334 UART: [art] PUB.Y = 0DE7CD24416D408D53D3F8DDCF5BA51D0CF3D28D87B5209D5E0377A50362621B107A734FDCD521275EC287EB897D5DF3
31,868,545 UART: [art] SIG.R = 5FCB77708AE7933B32F5B84CB86A98ED4D54E216053D6D0F0C2AA8BB0B56F8DDB56F1BE47E8C39201C134F657D110B07
31,875,960 UART: [art] SIG.S = B403F81A8163F0116693EF231EBDF1996B805F17D9FCCAD1C8BE429E8AE39D64F8AFFE8061C1E94D45734751DC1866AF
33,181,025 UART: mbox::rt_entry...
33,181,997 UART: ____ _ _ _ ____ _____
33,183,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,185,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,187,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,189,714 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,191,595 UART: |_|
33,192,477 UART:
33,305,098 UART: [rt] Runtime listening for mailbox commands...
33,307,120 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,307,623 >>> mbox cmd response data (0 bytes)
Initializing fuses
993 UART:
1,174 UART: Running Caliptra ROM ...
2,238 UART:
2,384 UART: [state] CFI Enabled
60,411 UART: [state] LifecycleState = Production
62,140 UART: [state] DebugLocked = Yes
64,230 UART: [state] Starting the WD Timer 40000000 cycles
69,056 UART: [kat] SHA2-256
251,027 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
262,558 UART: [kat] ++
263,063 UART: [kat] sha1
273,671 UART: [kat] SHA2-256
276,674 UART: [kat] SHA2-384
282,974 UART: [kat] SHA2-512-ACC
285,640 UART: [kat] ECC-384
3,570,333 UART: [kat] HMAC-384Kdf
3,594,429 UART: [kat] LMS
4,667,555 UART: [kat] --
4,672,118 UART: [warm-reset] ++
4,676,926 UART: [warm-reset] --
4,680,363 UART: [state] Locking Datavault
4,682,374 UART: [state] Locking PCR0, PCR1 and PCR31
4,684,562 UART: [state] Locking ICCM
4,686,122 UART: [exit] Launching FMC @ 0x40000130
4,694,746 UART:
4,694,984 UART: Running Caliptra FMC ...
4,696,015 UART:
4,696,168 UART: [state] CFI Enabled
4,759,125 UART: [aliasrt :skip pcr extension
4,760,420 UART: [art] Extend RT PCRs Done
4,761,492 UART: [art] Lock RT PCRs Done
4,762,721 UART: [art] Populate DV Done
4,768,349 UART: [fht] FMC Alias Private Key: 7
4,770,043 UART: [art] Derive CDI
4,770,806 UART: [art] Store in in slot 0x4
4,827,496 UART: [art] Derive Key Pair
4,828,544 UART: [art] Store priv key in slot 0x5
8,120,978 UART: [art] Derive Key Pair - Done
8,133,769 UART: [art] Signing Cert with AUTHO
8,135,082 UART: RITY.KEYID = 7
10,422,881 UART: [art] Erasing AUTHORITY.KEYID = 7
10,424,386 UART: [art] PUB.X = 08D718088B5CCF2A68F5D0598B309B167C6684E09D5CA9BDFF59A3206E3A43C4E45A026E4DA32F5621D1C1559285EDDB
10,431,648 UART: [art] PUB.Y = 0DE7CD24416D408D53D3F8DDCF5BA51D0CF3D28D87B5209D5E0377A50362621B107A734FDCD521275EC287EB897D5DF3
10,438,895 UART: [art] SIG.R = 5FCB77708AE7933B32F5B84CB86A98ED4D54E216053D6D0F0C2AA8BB0B56F8DDB56F1BE47E8C39201C134F657D110B07
10,446,293 UART: [art] SIG.S = B403F81A8163F0116693EF231EBDF1996B805F17D9FCCAD1C8BE429E8AE39D64F8AFFE8061C1E94D45734751DC1866AF
11,751,320 UART: mbox::rt_entry...
11,752,286 UART: ____ _ _ _ ____ _____
11,754,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,756,279 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,758,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,760,158 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,762,087 UART: |_|
11,762,923 UART:
12,046,548 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
192,287 UART:
192,656 UART: Running Caliptra ROM ...
193,833 UART:
603,554 UART: [state] CFI Enabled
618,701 UART: [state] LifecycleState = Production
620,958 UART: [state] DebugLocked = Yes
622,862 UART: [state] Starting the WD Timer 40000000 cycles
627,523 UART: [kat] SHA2-256
809,478 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,052 UART: [kat] ++
821,574 UART: [kat] sha1
833,258 UART: [kat] SHA2-256
836,268 UART: [kat] SHA2-384
841,878 UART: [kat] SHA2-512-ACC
844,501 UART: [kat] ECC-384
4,097,000 UART: [kat] HMAC-384Kdf
4,108,675 UART: [kat] LMS
5,181,816 UART: [kat] --
5,186,141 UART: [cold-reset] ++
5,188,373 UART: [fht] FHT @ 0x50003400
5,199,379 UART: [idev] ++
5,200,203 UART: [idev] CDI.KEYID = 6
5,201,252 UART: [idev] SUBJECT.KEYID = 7
5,202,726 UART: [idev] UDS.KEYID = 0
5,204,002 ready_for_fw is high
5,204,256 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
5,303,217 UART: [idev] Erasing UDS.KEYID = 0
8,495,986 UART: [idev] Sha1 KeyId Algorithm
8,517,099 UART: [idev] --
8,521,046 UART: [ldev] ++
8,521,666 UART: [ldev] CDI.KEYID = 6
8,522,785 UART: [ldev] SUBJECT.KEYID = 5
8,523,997 UART: [ldev] AUTHORITY.KEYID = 7
8,525,166 UART: [ldev] FE.KEYID = 1
8,535,936 UART: [ldev] Erasing FE.KEYID = 1
11,826,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,274 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,133,551 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,149,584 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,165,707 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,186,039 UART: [ldev] --
14,189,951 UART: [fwproc] Wait for Commands...
14,191,929 UART: [fwproc] Recv command 0x46574c44
14,194,228 UART: [fwproc] Recv'd Img size: 78492 bytes
17,856,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,930,614 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,999,403 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,191,450 >>> mbox cmd response: success
18,194,971 UART: [afmc] ++
18,195,606 UART: [afmc] CDI.KEYID = 6
18,196,671 UART: [afmc] SUBJECT.KEYID = 7
18,197,893 UART: [afmc] AUTHORITY.KEYID = 5
21,513,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,808,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,811,271 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,827,275 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,843,389 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,859,445 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,882,804 UART: [afmc] --
23,886,860 UART: [cold-reset] --
23,890,901 UART: [state] Locking Datavault
23,896,650 UART: [state] Locking PCR0, PCR1 and PCR31
23,898,297 UART: [state] Locking ICCM
23,901,370 UART: [exit] Launching FMC @ 0x40000130
23,910,047 UART:
23,910,303 UART: Running Caliptra FMC ...
23,911,405 UART:
23,911,557 UART: [state] CFI Enabled
23,919,600 UART: [fht] FMC Alias Private Key: 7
26,250,063 UART: [art] Extend RT PCRs Done
26,251,298 UART: [art] Lock RT PCRs Done
26,252,706 UART: [art] Populate DV Done
26,258,069 UART: [fht] FMC Alias Private Key: 7
26,259,719 UART: [art] Derive CDI
26,260,533 UART: [art] Store in in slot 0x4
26,302,920 UART: [art] Derive Key Pair
26,303,959 UART: [art] Store priv key in slot 0x5
29,545,705 UART: [art] Derive Key Pair - Done
29,558,431 UART: [art] Signing Cert with AUTHO
29,559,733 UART: RITY.KEYID = 7
31,838,910 UART: [art] Erasing AUTHORITY.KEYID = 7
31,840,432 UART: [art] PUB.X = FDCD7867FEE120AFC42EBB83BE4D016AA1750F46206CDBBD338766D1FBBEB24449B87D86523B6637D7B7F85074620E7E
31,847,692 UART: [art] PUB.Y = 4AA5A2A99B9105CD8D53D2CC17B644571C019790BC7A0416A9466242C469C607F601148DF5C6B485F565A613E8E7C62B
31,854,931 UART: [art] SIG.R = DD964D5D2BA5D2AE6D7D3D13A004D57C7EC70C8560809869E17684B337B413AA4C66764302F0B258FDCD04FE155B4CB7
31,862,338 UART: [art] SIG.S = 31D8188E3FA381D807FEDC72B2E8B9C7BD0956C066D77A1E83E1AD7AF0C64E85C62D8FC2F7FD1D9D5D8E0D3D5D655B6A
33,166,803 UART: mbox::rt_entry...
33,167,771 UART: ____ _ _ _ ____ _____
33,169,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,171,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,173,554 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,175,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,177,355 UART: |_|
33,178,236 UART:
33,290,870 UART: [rt] Runtime listening for mailbox commands...
33,292,876 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,293,390 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,015 UART:
1,210 UART: Running Caliptra ROM ...
2,246 UART:
7,232,576 UART: [state] CFI Enabled
7,245,335 UART: [state] LifecycleState = Production
7,247,081 UART: [state] DebugLocked = Yes
7,248,987 UART: [state] Starting the WD Timer 40000000 cycles
7,253,746 UART: [kat] SHA2-256
7,435,760 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,447,258 UART: [kat] ++
7,447,854 UART: [kat] sha1
7,457,500 UART: [kat] SHA2-256
7,460,520 UART: [kat] SHA2-384
7,465,270 UART: [kat] SHA2-512-ACC
7,467,880 UART: [kat] ECC-384
10,726,431 UART: [kat] HMAC-384Kdf
10,738,951 UART: [kat] LMS
11,812,111 UART: [kat] --
11,816,777 UART: [warm-reset] ++
11,822,599 UART: [warm-reset] --
11,827,606 UART: [state] Locking Datavault
11,832,375 UART: [state] Locking PCR0, PCR1 and PCR31
11,834,575 UART: [state] Locking ICCM
11,836,672 UART: [exit] Launching FMC @ 0x40000130
11,845,296 UART:
11,845,536 UART: Running Caliptra FMC ...
11,846,572 UART:
11,846,716 UART: [state] CFI Enabled
11,848,711 UART: [aliasrt :skip pcr extension
11,849,949 UART: [art] Extend RT PCRs Done
11,851,080 UART: [art] Lock RT PCRs Done
11,852,470 UART: [art] Populate DV Done
11,858,106 UART: [fht] FMC Alias Private Key: 7
11,859,687 UART: [art] Derive CDI
11,860,414 UART: [art] Store in in slot 0x4
11,903,068 UART: [art] Derive Key Pair
11,904,111 UART: [art] Store priv key in slot 0x5
15,145,794 UART: [art] Derive Key Pair - Done
15,158,926 UART: [art] Signing Cert with AUTHO
15,160,233 UART: RITY.KEYID = 7
17,439,759 UART: [art] Erasing AUTHORITY.KEYID = 7
17,441,274 UART: [art] PUB.X = FDCD7867FEE120AFC42EBB83BE4D016AA1750F46206CDBBD338766D1FBBEB24449B87D86523B6637D7B7F85074620E7E
17,448,526 UART: [art] PUB.Y = 4AA5A2A99B9105CD8D53D2CC17B644571C019790BC7A0416A9466242C469C607F601148DF5C6B485F565A613E8E7C62B
17,455,714 UART: [art] SIG.R = DD964D5D2BA5D2AE6D7D3D13A004D57C7EC70C8560809869E17684B337B413AA4C66764302F0B258FDCD04FE155B4CB7
17,463,116 UART: [art] SIG.S = 31D8188E3FA381D807FEDC72B2E8B9C7BD0956C066D77A1E83E1AD7AF0C64E85C62D8FC2F7FD1D9D5D8E0D3D5D655B6A
18,767,907 UART: mbox::rt_entry...
18,768,854 UART: ____ _ _ _ ____ _____
18,770,776 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,772,790 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,774,640 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,776,558 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,778,434 UART: |_|
18,779,314 UART:
19,062,189 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,701 writing to cptra_bootfsm_go
192,344 UART:
192,712 UART: Running Caliptra ROM ...
193,883 UART:
603,660 UART: [state] CFI Enabled
614,707 UART: [state] LifecycleState = Production
616,893 UART: [state] DebugLocked = Yes
618,233 UART: [state] Starting the WD Timer 40000000 cycles
623,654 UART: [kat] SHA2-256
805,686 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,158 UART: [kat] ++
817,670 UART: [kat] sha1
828,139 UART: [kat] SHA2-256
831,213 UART: [kat] SHA2-384
836,561 UART: [kat] SHA2-512-ACC
839,208 UART: [kat] ECC-384
4,093,695 UART: [kat] HMAC-384Kdf
4,105,792 UART: [kat] LMS
5,178,988 UART: [kat] --
5,184,854 UART: [cold-reset] ++
5,187,028 UART: [fht] FHT @ 0x50003400
5,199,361 UART: [idev] ++
5,200,062 UART: [idev] CDI.KEYID = 6
5,201,236 UART: [idev] SUBJECT.KEYID = 7
5,202,686 UART: [idev] UDS.KEYID = 0
5,203,863 ready_for_fw is high
5,204,068 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
5,302,774 UART: [idev] Erasing UDS.KEYID = 0
8,493,694 UART: [idev] Sha1 KeyId Algorithm
8,515,902 UART: [idev] --
8,520,105 UART: [ldev] ++
8,520,676 UART: [ldev] CDI.KEYID = 6
8,521,830 UART: [ldev] SUBJECT.KEYID = 5
8,523,035 UART: [ldev] AUTHORITY.KEYID = 7
8,524,188 UART: [ldev] FE.KEYID = 1
8,535,825 UART: [ldev] Erasing FE.KEYID = 1
11,823,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,306 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,132,665 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,148,669 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,164,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,185,567 UART: [ldev] --
14,191,100 UART: [fwproc] Wait for Commands...
14,194,052 UART: [fwproc] Recv command 0x46574c44
14,196,359 UART: [fwproc] Recv'd Img size: 78492 bytes
17,854,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,932,076 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,000,820 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,193,901 >>> mbox cmd response: success
18,198,777 UART: [afmc] ++
18,199,385 UART: [afmc] CDI.KEYID = 6
18,200,576 UART: [afmc] SUBJECT.KEYID = 7
18,201,697 UART: [afmc] AUTHORITY.KEYID = 5
21,520,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,818,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,820,439 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,836,426 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,852,527 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,868,572 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,891,012 UART: [afmc] --
23,894,857 UART: [cold-reset] --
23,898,896 UART: [state] Locking Datavault
23,904,786 UART: [state] Locking PCR0, PCR1 and PCR31
23,906,441 UART: [state] Locking ICCM
23,909,035 UART: [exit] Launching FMC @ 0x40000130
23,917,726 UART:
23,917,967 UART: Running Caliptra FMC ...
23,919,064 UART:
23,919,243 UART: [state] CFI Enabled
23,927,185 UART: [fht] FMC Alias Private Key: 7
26,258,070 UART: [art] Extend RT PCRs Done
26,259,287 UART: [art] Lock RT PCRs Done
26,261,126 UART: [art] Populate DV Done
26,266,058 UART: [fht] FMC Alias Private Key: 7
26,267,759 UART: [art] Derive CDI
26,268,572 UART: [art] Store in in slot 0x4
26,311,594 UART: [art] Derive Key Pair
26,312,631 UART: [art] Store priv key in slot 0x5
29,554,574 UART: [art] Derive Key Pair - Done
29,567,573 UART: [art] Signing Cert with AUTHO
29,568,878 UART: RITY.KEYID = 7
31,848,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,849,965 UART: [art] PUB.X = 2BE41428359A41A284ACF4EA790035FAABE5A45569107BE2A66ACA8D4E285121233B21911BA6325E0EA63EDE284D3880
31,857,246 UART: [art] PUB.Y = 1B092A81094825775E66D9C08EAD754B4D68E09B3823C241AEADFA8AC1FFB89E6A55EF4DF4D69EC900F21F54AF7C56EE
31,864,485 UART: [art] SIG.R = F947F3367A45D19C9018BC4AE467FFB743B887D22DAECA340A21CEEB10F70298BD25F2C222B736E9EFAF3ECF02ACD5C0
31,871,921 UART: [art] SIG.S = B6A7BC5161ADBB74A1CF15D1E7BE0FA62A0710463096218D8AA9ECF16438A46A3D473AB7D4488816F8F2D6316BF00B01
33,176,406 UART: mbox::rt_entry...
33,177,376 UART: ____ _ _ _ ____ _____
33,179,452 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,181,474 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,183,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,185,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,187,108 UART: |_|
33,187,987 UART:
33,300,898 UART: [rt] Runtime listening for mailbox commands...
33,302,897 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,303,404 >>> mbox cmd response data (0 bytes)
Initializing fuses
992 UART:
1,169 UART: Running Caliptra ROM ...
2,227 UART:
7,234,271 UART: [state] CFI Enabled
7,248,830 UART: [state] LifecycleState = Production
7,250,593 UART: [state] DebugLocked = Yes
7,253,522 UART: [state] Starting the WD Timer 40000000 cycles
7,258,547 UART: [kat] SHA2-256
7,440,523 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,452,077 UART: [kat] ++
7,452,675 UART: [kat] sha1
7,464,108 UART: [kat] SHA2-256
7,467,124 UART: [kat] SHA2-384
7,472,299 UART: [kat] SHA2-512-ACC
7,474,934 UART: [kat] ECC-384
10,730,785 UART: [kat] HMAC-384Kdf
10,743,286 UART: [kat] LMS
11,816,423 UART: [kat] --
11,822,564 UART: [warm-reset] ++
11,827,259 UART: [warm-reset] --
11,831,455 UART: [state] Locking Datavault
11,834,936 UART: [state] Locking PCR0, PCR1 and PCR31
11,837,084 UART: [state] Locking ICCM
11,839,134 UART: [exit] Launching FMC @ 0x40000130
11,847,819 UART:
11,848,047 UART: Running Caliptra FMC ...
11,849,147 UART:
11,849,304 UART: [state] CFI Enabled
11,851,304 UART: [aliasrt :skip pcr extension
11,852,549 UART: [art] Extend RT PCRs Done
11,853,678 UART: [art] Lock RT PCRs Done
11,854,742 UART: [art] Populate DV Done
11,860,198 UART: [fht] FMC Alias Private Key: 7
11,861,727 UART: [art] Derive CDI
11,862,558 UART: [art] Store in in slot 0x4
11,905,193 UART: [art] Derive Key Pair
11,906,239 UART: [art] Store priv key in slot 0x5
15,148,354 UART: [art] Derive Key Pair - Done
15,161,238 UART: [art] Signing Cert with AUTHO
15,162,565 UART: RITY.KEYID = 7
17,442,158 UART: [art] Erasing AUTHORITY.KEYID = 7
17,443,670 UART: [art] PUB.X = 2BE41428359A41A284ACF4EA790035FAABE5A45569107BE2A66ACA8D4E285121233B21911BA6325E0EA63EDE284D3880
17,450,893 UART: [art] PUB.Y = 1B092A81094825775E66D9C08EAD754B4D68E09B3823C241AEADFA8AC1FFB89E6A55EF4DF4D69EC900F21F54AF7C56EE
17,458,131 UART: [art] SIG.R = F947F3367A45D19C9018BC4AE467FFB743B887D22DAECA340A21CEEB10F70298BD25F2C222B736E9EFAF3ECF02ACD5C0
17,465,536 UART: [art] SIG.S = B6A7BC5161ADBB74A1CF15D1E7BE0FA62A0710463096218D8AA9ECF16438A46A3D473AB7D4488816F8F2D6316BF00B01
18,769,827 UART: mbox::rt_entry...
18,770,790 UART: ____ _ _ _ ____ _____
18,772,886 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,774,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,776,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,778,669 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,780,715 UART: |_|
18,781,519 UART:
19,066,935 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
191,881 UART:
192,248 UART: Running Caliptra ROM ...
193,418 UART:
193,574 UART: [state] CFI Enabled
264,565 UART: [state] LifecycleState = Production
266,306 UART: [state] DebugLocked = Yes
268,712 UART: [state] Starting the WD Timer 40000000 cycles
272,963 UART: [kat] SHA2-256
452,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,718 UART: [kat] ++
464,243 UART: [kat] sha1
475,646 UART: [kat] SHA2-256
478,653 UART: [kat] SHA2-384
484,442 UART: [kat] SHA2-512-ACC
487,375 UART: [kat] ECC-384
2,950,512 UART: [kat] HMAC-384Kdf
2,971,423 UART: [kat] LMS
3,500,914 UART: [kat] --
3,504,779 UART: [cold-reset] ++
3,506,706 UART: [fht] FHT @ 0x50003400
3,517,613 UART: [idev] ++
3,518,171 UART: [idev] CDI.KEYID = 6
3,519,050 UART: [idev] SUBJECT.KEYID = 7
3,520,294 UART: [idev] UDS.KEYID = 0
3,521,191 ready_for_fw is high
3,521,372 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,620,179 UART: [idev] Erasing UDS.KEYID = 0
6,027,512 UART: [idev] Sha1 KeyId Algorithm
6,050,039 UART: [idev] --
6,053,446 UART: [ldev] ++
6,054,027 UART: [ldev] CDI.KEYID = 6
6,054,913 UART: [ldev] SUBJECT.KEYID = 5
6,056,123 UART: [ldev] AUTHORITY.KEYID = 7
6,057,411 UART: [ldev] FE.KEYID = 1
6,099,216 UART: [ldev] Erasing FE.KEYID = 1
8,604,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,319 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,330 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,151 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,064 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,412,367 UART: [ldev] --
10,417,146 UART: [fwproc] Wait for Commands...
10,420,097 UART: [fwproc] Recv command 0x46574c44
10,422,153 UART: [fwproc] Recv'd Img size: 78456 bytes
13,415,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,491,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,560,576 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,753,649 >>> mbox cmd response: success
13,757,454 UART: [afmc] ++
13,758,060 UART: [afmc] CDI.KEYID = 6
13,758,947 UART: [afmc] SUBJECT.KEYID = 7
13,760,048 UART: [afmc] AUTHORITY.KEYID = 5
16,295,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,421 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,037,393 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,053,272 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,993 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,091,307 UART: [afmc] --
18,094,345 UART: [cold-reset] --
18,096,580 UART: [state] Locking Datavault
18,100,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,102,080 UART: [state] Locking ICCM
18,103,445 UART: [exit] Launching FMC @ 0x40000130
18,111,891 UART:
18,112,163 UART: Running Caliptra FMC ...
18,113,189 UART:
18,113,334 UART: [state] CFI Enabled
18,177,105 UART: [fht] FMC Alias Private Key: 7
19,941,676 UART: [art] Extend RT PCRs Done
19,942,896 UART: [art] Lock RT PCRs Done
19,944,503 UART: [art] Populate DV Done
19,950,076 UART: [fht] FMC Alias Private Key: 7
19,951,823 UART: [art] Derive CDI
19,952,569 UART: [art] Store in in slot 0x4
20,010,746 UART: [art] Derive Key Pair
20,011,745 UART: [art] Store priv key in slot 0x5
22,474,643 UART: [art] Derive Key Pair - Done
22,487,365 UART: [art] Signing Cert with AUTHO
22,488,669 UART: RITY.KEYID = 7
24,199,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,172 UART: [art] PUB.X = 87860A7CACB3BA88BC9C9E1BC976E74A959336355E2DFB1C6CDF94F031BB6DBAD099DFAF3720A744FA41820D7D460675
24,208,456 UART: [art] PUB.Y = 051FD6AF2C85CF9E2496B2CAE1A9E24F5BF5C6742D612CC88405C5234BF1A084168E801CAC75CD2B206A5F1515C21968
24,215,724 UART: [art] SIG.R = ED9BF6C5457E6078C2C773A6DF3DA022282A5D22724B40D4326480FD9862B106A3C5A87B95BBC73C9D27CB61760C67B6
24,223,092 UART: [art] SIG.S = 52FCF6AABEC0E9ED14A85CD1B456A32C8749E264BAC1BCE372FC7B02CD286E18F6584243874410AED8D357452BFF33D8
25,201,360 UART: mbox::rt_entry...
25,202,310 UART: ____ _ _ _ ____ _____
25,204,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,238 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,169 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,021 UART: |_|
25,213,006 UART:
25,325,906 UART: [rt] Runtime listening for mailbox commands...
25,327,927 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,328,425 >>> mbox cmd response data (0 bytes)
Initializing fuses
983 UART:
1,157 UART: Running Caliptra ROM ...
2,200 UART:
2,341 UART: [state] CFI Enabled
61,541 UART: [state] LifecycleState = Production
63,298 UART: [state] DebugLocked = Yes
65,330 UART: [state] Starting the WD Timer 40000000 cycles
70,976 UART: [kat] SHA2-256
250,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,693 UART: [kat] ++
262,137 UART: [kat] sha1
273,602 UART: [kat] SHA2-256
276,669 UART: [kat] SHA2-384
283,990 UART: [kat] SHA2-512-ACC
286,927 UART: [kat] ECC-384
2,745,093 UART: [kat] HMAC-384Kdf
2,769,911 UART: [kat] LMS
3,299,433 UART: [kat] --
3,304,878 UART: [warm-reset] ++
3,309,618 UART: [warm-reset] --
3,312,722 UART: [state] Locking Datavault
3,316,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,376 UART: [state] Locking ICCM
3,319,524 UART: [exit] Launching FMC @ 0x40000130
3,327,972 UART:
3,328,208 UART: Running Caliptra FMC ...
3,329,239 UART:
3,329,388 UART: [state] CFI Enabled
3,379,159 UART: [aliasrt :skip pcr extension
3,380,442 UART: [art] Extend RT PCRs Done
3,381,506 UART: [art] Lock RT PCRs Done
3,382,626 UART: [art] Populate DV Done
3,388,191 UART: [fht] FMC Alias Private Key: 7
3,389,835 UART: [art] Derive CDI
3,390,569 UART: [art] Store in in slot 0x4
3,447,801 UART: [art] Derive Key Pair
3,448,846 UART: [art] Store priv key in slot 0x5
5,911,762 UART: [art] Derive Key Pair - Done
5,924,657 UART: [art] Signing Cert with AUTHO
5,925,965 UART: RITY.KEYID = 7
7,636,838 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,351 UART: [art] PUB.X = 87860A7CACB3BA88BC9C9E1BC976E74A959336355E2DFB1C6CDF94F031BB6DBAD099DFAF3720A744FA41820D7D460675
7,645,595 UART: [art] PUB.Y = 051FD6AF2C85CF9E2496B2CAE1A9E24F5BF5C6742D612CC88405C5234BF1A084168E801CAC75CD2B206A5F1515C21968
7,652,849 UART: [art] SIG.R = ED9BF6C5457E6078C2C773A6DF3DA022282A5D22724B40D4326480FD9862B106A3C5A87B95BBC73C9D27CB61760C67B6
7,660,285 UART: [art] SIG.S = 52FCF6AABEC0E9ED14A85CD1B456A32C8749E264BAC1BCE372FC7B02CD286E18F6584243874410AED8D357452BFF33D8
8,638,622 UART: mbox::rt_entry...
8,639,591 UART: ____ _ _ _ ____ _____
8,641,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,535 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,397 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,323 UART: |_|
8,650,156 UART:
8,936,478 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
191,994 UART:
192,380 UART: Running Caliptra ROM ...
193,560 UART:
193,714 UART: [state] CFI Enabled
266,120 UART: [state] LifecycleState = Production
267,854 UART: [state] DebugLocked = Yes
270,065 UART: [state] Starting the WD Timer 40000000 cycles
274,946 UART: [kat] SHA2-256
454,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,659 UART: [kat] ++
466,192 UART: [kat] sha1
478,196 UART: [kat] SHA2-256
481,195 UART: [kat] SHA2-384
487,190 UART: [kat] SHA2-512-ACC
490,122 UART: [kat] ECC-384
2,947,525 UART: [kat] HMAC-384Kdf
2,971,648 UART: [kat] LMS
3,501,098 UART: [kat] --
3,506,444 UART: [cold-reset] ++
3,508,588 UART: [fht] FHT @ 0x50003400
3,520,014 UART: [idev] ++
3,520,627 UART: [idev] CDI.KEYID = 6
3,521,540 UART: [idev] SUBJECT.KEYID = 7
3,522,714 UART: [idev] UDS.KEYID = 0
3,523,637 ready_for_fw is high
3,523,828 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,622,636 UART: [idev] Erasing UDS.KEYID = 0
6,027,082 UART: [idev] Sha1 KeyId Algorithm
6,049,933 UART: [idev] --
6,055,177 UART: [ldev] ++
6,055,754 UART: [ldev] CDI.KEYID = 6
6,056,670 UART: [ldev] SUBJECT.KEYID = 5
6,057,879 UART: [ldev] AUTHORITY.KEYID = 7
6,059,131 UART: [ldev] FE.KEYID = 1
6,101,819 UART: [ldev] Erasing FE.KEYID = 1
8,605,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,292 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,337 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,352,157 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,368,072 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,710 UART: [ldev] --
10,392,222 UART: [fwproc] Wait for Commands...
10,394,146 UART: [fwproc] Recv command 0x46574c44
10,396,247 UART: [fwproc] Recv'd Img size: 78456 bytes
13,395,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,464,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,533,488 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,725,444 >>> mbox cmd response: success
13,729,157 UART: [afmc] ++
13,729,778 UART: [afmc] CDI.KEYID = 6
13,730,695 UART: [afmc] SUBJECT.KEYID = 7
13,731,855 UART: [afmc] AUTHORITY.KEYID = 5
16,274,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,000,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,002,420 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,018,448 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,034,268 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,050,025 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,072,151 UART: [afmc] --
18,075,287 UART: [cold-reset] --
18,078,740 UART: [state] Locking Datavault
18,083,941 UART: [state] Locking PCR0, PCR1 and PCR31
18,085,590 UART: [state] Locking ICCM
18,087,575 UART: [exit] Launching FMC @ 0x40000130
18,095,973 UART:
18,096,205 UART: Running Caliptra FMC ...
18,097,233 UART:
18,097,378 UART: [state] CFI Enabled
18,158,447 UART: [fht] FMC Alias Private Key: 7
19,922,617 UART: [art] Extend RT PCRs Done
19,923,834 UART: [art] Lock RT PCRs Done
19,925,265 UART: [art] Populate DV Done
19,930,730 UART: [fht] FMC Alias Private Key: 7
19,932,368 UART: [art] Derive CDI
19,933,177 UART: [art] Store in in slot 0x4
19,991,074 UART: [art] Derive Key Pair
19,992,141 UART: [art] Store priv key in slot 0x5
22,455,156 UART: [art] Derive Key Pair - Done
22,468,164 UART: [art] Signing Cert with AUTHO
22,469,463 UART: RITY.KEYID = 7
24,181,258 UART: [art] Erasing AUTHORITY.KEYID = 7
24,182,771 UART: [art] PUB.X = DD8FF19BF8FA013E70A5146AC913D36D8ADEF482BA02E1DC20DD6ECB3729569EB5348F85B0F15BD8E4BE05C221F57E04
24,190,068 UART: [art] PUB.Y = 7E31ACA940645B74C4B70A0B31029A85BFE1569B7C8C022B73097A067994BE8E19F269BEF1D5F2260FAAA5E80922AFD1
24,197,324 UART: [art] SIG.R = E3BA0647115BAAD9E43997174CAEC8192151673335266444D6F99F013162A61ED156644C01B85602273082A74DDE8389
24,204,681 UART: [art] SIG.S = 0A292E09527974B5CB4F41683D663D81E5B904B2B13FE92B20494ECFD58493813478EB862AF84539A20F156176C6E2EC
25,183,386 UART: mbox::rt_entry...
25,184,342 UART: ____ _ _ _ ____ _____
25,186,318 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,188,318 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,190,243 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,192,383 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,194,253 UART: |_|
25,195,100 UART:
25,307,036 UART: [rt] Runtime listening for mailbox commands...
25,309,057 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,309,559 >>> mbox cmd response data (0 bytes)
Initializing fuses
990 UART:
1,173 UART: Running Caliptra ROM ...
2,213 UART:
2,357 UART: [state] CFI Enabled
62,703 UART: [state] LifecycleState = Production
64,471 UART: [state] DebugLocked = Yes
67,099 UART: [state] Starting the WD Timer 40000000 cycles
72,259 UART: [kat] SHA2-256
251,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,987 UART: [kat] ++
263,434 UART: [kat] sha1
275,240 UART: [kat] SHA2-256
278,236 UART: [kat] SHA2-384
283,400 UART: [kat] SHA2-512-ACC
286,342 UART: [kat] ECC-384
2,749,692 UART: [kat] HMAC-384Kdf
2,771,810 UART: [kat] LMS
3,301,282 UART: [kat] --
3,304,353 UART: [warm-reset] ++
3,308,986 UART: [warm-reset] --
3,314,251 UART: [state] Locking Datavault
3,316,911 UART: [state] Locking PCR0, PCR1 and PCR31
3,318,554 UART: [state] Locking ICCM
3,320,704 UART: [exit] Launching FMC @ 0x40000130
3,329,140 UART:
3,329,397 UART: Running Caliptra FMC ...
3,330,504 UART:
3,330,680 UART: [state] CFI Enabled
3,381,149 UART: [aliasrt :skip pcr extension
3,382,402 UART: [art] Extend RT PCRs Done
3,383,537 UART: [art] Lock RT PCRs Done
3,384,818 UART: [art] Populate DV Done
3,390,382 UART: [fht] FMC Alias Private Key: 7
3,392,027 UART: [art] Derive CDI
3,392,840 UART: [art] Store in in slot 0x4
3,449,674 UART: [art] Derive Key Pair
3,450,724 UART: [art] Store priv key in slot 0x5
5,913,473 UART: [art] Derive Key Pair - Done
5,926,590 UART: [art] Signing Cert with AUTHO
5,927,902 UART: RITY.KEYID = 7
7,638,980 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,525 UART: [art] PUB.X = DD8FF19BF8FA013E70A5146AC913D36D8ADEF482BA02E1DC20DD6ECB3729569EB5348F85B0F15BD8E4BE05C221F57E04
7,647,845 UART: [art] PUB.Y = 7E31ACA940645B74C4B70A0B31029A85BFE1569B7C8C022B73097A067994BE8E19F269BEF1D5F2260FAAA5E80922AFD1
7,655,020 UART: [art] SIG.R = E3BA0647115BAAD9E43997174CAEC8192151673335266444D6F99F013162A61ED156644C01B85602273082A74DDE8389
7,662,396 UART: [art] SIG.S = 0A292E09527974B5CB4F41683D663D81E5B904B2B13FE92B20494ECFD58493813478EB862AF84539A20F156176C6E2EC
8,640,857 UART: mbox::rt_entry...
8,641,824 UART: ____ _ _ _ ____ _____
8,643,925 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,929 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,561 UART: |_|
8,652,440 UART:
8,936,110 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
192,323 UART:
192,713 UART: Running Caliptra ROM ...
193,910 UART:
603,498 UART: [state] CFI Enabled
616,967 UART: [state] LifecycleState = Production
618,668 UART: [state] DebugLocked = Yes
621,304 UART: [state] Starting the WD Timer 40000000 cycles
625,483 UART: [kat] SHA2-256
804,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,225 UART: [kat] ++
816,767 UART: [kat] sha1
828,953 UART: [kat] SHA2-256
832,044 UART: [kat] SHA2-384
839,319 UART: [kat] SHA2-512-ACC
842,256 UART: [kat] ECC-384
3,283,828 UART: [kat] HMAC-384Kdf
3,297,549 UART: [kat] LMS
3,827,059 UART: [kat] --
3,830,787 UART: [cold-reset] ++
3,832,818 UART: [fht] FHT @ 0x50003400
3,843,756 UART: [idev] ++
3,844,324 UART: [idev] CDI.KEYID = 6
3,845,354 UART: [idev] SUBJECT.KEYID = 7
3,846,461 UART: [idev] UDS.KEYID = 0
3,847,392 ready_for_fw is high
3,847,582 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,946,164 UART: [idev] Erasing UDS.KEYID = 0
6,323,755 UART: [idev] Sha1 KeyId Algorithm
6,346,843 UART: [idev] --
6,350,245 UART: [ldev] ++
6,350,816 UART: [ldev] CDI.KEYID = 6
6,351,727 UART: [ldev] SUBJECT.KEYID = 5
6,352,939 UART: [ldev] AUTHORITY.KEYID = 7
6,354,172 UART: [ldev] FE.KEYID = 1
6,361,742 UART: [ldev] Erasing FE.KEYID = 1
8,836,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,150 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,572,140 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,956 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,603,914 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,623,123 UART: [ldev] --
10,627,208 UART: [fwproc] Wait for Commands...
10,630,125 UART: [fwproc] Recv command 0x46574c44
10,632,261 UART: [fwproc] Recv'd Img size: 78456 bytes
13,625,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,698,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,767,188 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,960,277 >>> mbox cmd response: success
13,964,774 UART: [afmc] ++
13,965,381 UART: [afmc] CDI.KEYID = 6
13,966,293 UART: [afmc] SUBJECT.KEYID = 7
13,967,451 UART: [afmc] AUTHORITY.KEYID = 5
16,466,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,187,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,189,405 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,205,381 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,221,200 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,236,953 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,259,450 UART: [afmc] --
18,263,688 UART: [cold-reset] --
18,267,341 UART: [state] Locking Datavault
18,273,941 UART: [state] Locking PCR0, PCR1 and PCR31
18,275,597 UART: [state] Locking ICCM
18,277,636 UART: [exit] Launching FMC @ 0x40000130
18,286,090 UART:
18,286,333 UART: Running Caliptra FMC ...
18,287,438 UART:
18,287,599 UART: [state] CFI Enabled
18,295,511 UART: [fht] FMC Alias Private Key: 7
20,051,993 UART: [art] Extend RT PCRs Done
20,053,966 UART: [art] Lock RT PCRs Done
20,055,039 UART: [art] Populate DV Done
20,060,308 UART: [fht] FMC Alias Private Key: 7
20,061,901 UART: [art] Derive CDI
20,062,668 UART: [art] Store in in slot 0x4
20,105,062 UART: [art] Derive Key Pair
20,106,115 UART: [art] Store priv key in slot 0x5
22,532,772 UART: [art] Derive Key Pair - Done
22,545,931 UART: [art] Signing Cert with AUTHO
22,547,236 UART: RITY.KEYID = 7
24,252,702 UART: [art] Erasing AUTHORITY.KEYID = 7
24,254,212 UART: [art] PUB.X = AAB85019B317895F7CE6CBB5185305763C3CE1232D0C2938FF80115A98D9EE500238F57B446B218F67AFF1F4463C5526
24,261,429 UART: [art] PUB.Y = 4E9EEA73555D8369A2B0ED22B9B0AE4F4D12B7222DB8264DA1BFF460C3EA002F21281241E7CBCA72570CACD99B725CD9
24,268,692 UART: [art] SIG.R = 76C031F7041A32F603E6B44D2ABC181520FE395958F0A3620A68A781755976B90ED6AC69B8341ADBDB649BFA6A927CC7
24,276,143 UART: [art] SIG.S = 6541F2A21FF0FEC5888A370AD4BA3C80ED7D9637AFCE0256190ACF67D452C0E30155DD84023A89A1B508F805F74ED145
25,254,465 UART: mbox::rt_entry...
25,255,421 UART: ____ _ _ _ ____ _____
25,257,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,259,377 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,261,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,263,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,265,179 UART: |_|
25,266,164 UART:
25,379,266 UART: [rt] Runtime listening for mailbox commands...
25,381,286 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,381,807 >>> mbox cmd response data (0 bytes)
Initializing fuses
998 UART:
1,363 UART: Running Caliptra ROM ...
2,471 UART:
15,140,490 UART: [state] CFI Enabled
15,154,696 UART: [state] LifecycleState = Production
15,156,452 UART: [state] DebugLocked = Yes
15,158,173 UART: [state] Starting the WD Timer 40000000 cycles
15,162,960 UART: [kat] SHA2-256
15,342,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,353,644 UART: [kat] ++
15,354,103 UART: [kat] sha1
15,363,797 UART: [kat] SHA2-256
15,366,807 UART: [kat] SHA2-384
15,373,170 UART: [kat] SHA2-512-ACC
15,376,124 UART: [kat] ECC-384
17,820,401 UART: [kat] HMAC-384Kdf
17,833,434 UART: [kat] LMS
18,362,991 UART: [kat] --
18,367,894 UART: [warm-reset] ++
18,372,949 UART: [warm-reset] --
18,376,501 UART: [state] Locking Datavault
18,379,650 UART: [state] Locking PCR0, PCR1 and PCR31
18,381,300 UART: [state] Locking ICCM
18,383,452 UART: [exit] Launching FMC @ 0x40000130
18,391,849 UART:
18,392,089 UART: Running Caliptra FMC ...
18,393,201 UART:
18,393,361 UART: [state] CFI Enabled
18,395,308 UART: [aliasrt :skip pcr extension
18,396,556 UART: [art] Extend RT PCRs Done
18,397,693 UART: [art] Lock RT PCRs Done
18,398,978 UART: [art] Populate DV Done
18,404,490 UART: [fht] FMC Alias Private Key: 7
18,406,191 UART: [art] Derive CDI
18,407,009 UART: [art] Store in in slot 0x4
18,449,407 UART: [art] Derive Key Pair
18,450,454 UART: [art] Store priv key in slot 0x5
20,876,655 UART: [art] Derive Key Pair - Done
20,889,705 UART: [art] Signing Cert with AUTHO
20,891,015 UART: RITY.KEYID = 7
22,596,689 UART: [art] Erasing AUTHORITY.KEYID = 7
22,598,200 UART: [art] PUB.X = AAB85019B317895F7CE6CBB5185305763C3CE1232D0C2938FF80115A98D9EE500238F57B446B218F67AFF1F4463C5526
22,605,409 UART: [art] PUB.Y = 4E9EEA73555D8369A2B0ED22B9B0AE4F4D12B7222DB8264DA1BFF460C3EA002F21281241E7CBCA72570CACD99B725CD9
22,612,711 UART: [art] SIG.R = 76C031F7041A32F603E6B44D2ABC181520FE395958F0A3620A68A781755976B90ED6AC69B8341ADBDB649BFA6A927CC7
22,620,088 UART: [art] SIG.S = 6541F2A21FF0FEC5888A370AD4BA3C80ED7D9637AFCE0256190ACF67D452C0E30155DD84023A89A1B508F805F74ED145
23,598,519 UART: mbox::rt_entry...
23,599,467 UART: ____ _ _ _ ____ _____
23,601,459 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,603,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,605,404 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,607,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,609,217 UART: |_|
23,610,112 UART:
23,895,135 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
192,455 UART:
192,819 UART: Running Caliptra ROM ...
193,995 UART:
603,430 UART: [state] CFI Enabled
618,493 UART: [state] LifecycleState = Production
620,212 UART: [state] DebugLocked = Yes
622,981 UART: [state] Starting the WD Timer 40000000 cycles
627,722 UART: [kat] SHA2-256
806,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,431 UART: [kat] ++
818,972 UART: [kat] sha1
830,315 UART: [kat] SHA2-256
833,334 UART: [kat] SHA2-384
840,107 UART: [kat] SHA2-512-ACC
843,046 UART: [kat] ECC-384
3,285,828 UART: [kat] HMAC-384Kdf
3,298,413 UART: [kat] LMS
3,827,934 UART: [kat] --
3,831,718 UART: [cold-reset] ++
3,832,797 UART: [fht] FHT @ 0x50003400
3,844,434 UART: [idev] ++
3,845,013 UART: [idev] CDI.KEYID = 6
3,846,001 UART: [idev] SUBJECT.KEYID = 7
3,847,183 UART: [idev] UDS.KEYID = 0
3,848,082 ready_for_fw is high
3,848,275 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,946,845 UART: [idev] Erasing UDS.KEYID = 0
6,320,716 UART: [idev] Sha1 KeyId Algorithm
6,342,612 UART: [idev] --
6,345,798 UART: [ldev] ++
6,346,369 UART: [ldev] CDI.KEYID = 6
6,347,277 UART: [ldev] SUBJECT.KEYID = 5
6,348,489 UART: [ldev] AUTHORITY.KEYID = 7
6,349,727 UART: [ldev] FE.KEYID = 1
6,359,025 UART: [ldev] Erasing FE.KEYID = 1
8,830,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,498 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,563,474 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,341 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,253 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,367 UART: [ldev] --
10,621,346 UART: [fwproc] Wait for Commands...
10,623,608 UART: [fwproc] Recv command 0x46574c44
10,625,708 UART: [fwproc] Recv'd Img size: 78456 bytes
13,624,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,693,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,762,499 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,954,497 >>> mbox cmd response: success
13,958,683 UART: [afmc] ++
13,959,296 UART: [afmc] CDI.KEYID = 6
13,960,210 UART: [afmc] SUBJECT.KEYID = 7
13,961,375 UART: [afmc] AUTHORITY.KEYID = 5
16,458,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,180,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,182,019 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,198,003 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,213,814 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,229,602 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,252,431 UART: [afmc] --
18,256,609 UART: [cold-reset] --
18,260,371 UART: [state] Locking Datavault
18,264,754 UART: [state] Locking PCR0, PCR1 and PCR31
18,266,400 UART: [state] Locking ICCM
18,269,010 UART: [exit] Launching FMC @ 0x40000130
18,277,405 UART:
18,277,648 UART: Running Caliptra FMC ...
18,278,754 UART:
18,278,913 UART: [state] CFI Enabled
18,286,978 UART: [fht] FMC Alias Private Key: 7
20,043,767 UART: [art] Extend RT PCRs Done
20,045,000 UART: [art] Lock RT PCRs Done
20,046,554 UART: [art] Populate DV Done
20,051,916 UART: [fht] FMC Alias Private Key: 7
20,053,565 UART: [art] Derive CDI
20,054,307 UART: [art] Store in in slot 0x4
20,096,941 UART: [art] Derive Key Pair
20,098,055 UART: [art] Store priv key in slot 0x5
22,524,711 UART: [art] Derive Key Pair - Done
22,537,323 UART: [art] Signing Cert with AUTHO
22,538,662 UART: RITY.KEYID = 7
24,244,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,864 UART: [art] PUB.X = DDE805F5DABF1DC7E6108989D7135428206A8C8EBA089C87A917CB920EB299198579E0A1C3E87964DCB3AC5475F1BC60
24,253,093 UART: [art] PUB.Y = 193D754BD20C6919994A3C5E35AFB92725CF21501F74C06556C7CF7ED00116F0A2C9FA0812946FD5853294667B0AB7D5
24,260,360 UART: [art] SIG.R = 98210696905983D11346C98C1CE406A87FB34ACBA3CE3F50223619C8D4E995DB87FD46C038F16C12558D115D99F740AF
24,267,748 UART: [art] SIG.S = DA9EFCADC7B5FE6B9D6C90D178CEBDE372CAD6BBB36F31E7F0C196C63C03958490086675FE31769D82129C1139B7D00C
25,246,223 UART: mbox::rt_entry...
25,247,176 UART: ____ _ _ _ ____ _____
25,249,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,251,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,253,116 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,255,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,257,160 UART: |_|
25,257,963 UART:
25,370,697 UART: [rt] Runtime listening for mailbox commands...
25,372,711 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,373,207 >>> mbox cmd response data (0 bytes)
Initializing fuses
985 UART:
1,172 UART: Running Caliptra ROM ...
2,283 UART:
15,165,065 UART: [state] CFI Enabled
15,180,301 UART: [state] LifecycleState = Production
15,182,004 UART: [state] DebugLocked = Yes
15,184,325 UART: [state] Starting the WD Timer 40000000 cycles
15,188,626 UART: [kat] SHA2-256
15,367,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,379,382 UART: [kat] ++
15,379,835 UART: [kat] sha1
15,392,125 UART: [kat] SHA2-256
15,395,195 UART: [kat] SHA2-384
15,401,218 UART: [kat] SHA2-512-ACC
15,404,194 UART: [kat] ECC-384
17,844,896 UART: [kat] HMAC-384Kdf
17,857,451 UART: [kat] LMS
18,386,987 UART: [kat] --
18,390,274 UART: [warm-reset] ++
18,392,928 UART: [warm-reset] --
18,396,902 UART: [state] Locking Datavault
18,400,690 UART: [state] Locking PCR0, PCR1 and PCR31
18,402,348 UART: [state] Locking ICCM
18,403,957 UART: [exit] Launching FMC @ 0x40000130
18,412,410 UART:
18,412,649 UART: Running Caliptra FMC ...
18,413,755 UART:
18,413,908 UART: [state] CFI Enabled
18,415,530 UART: [aliasrt :skip pcr extension
18,416,774 UART: [art] Extend RT PCRs Done
18,417,834 UART: [art] Lock RT PCRs Done
18,419,168 UART: [art] Populate DV Done
18,424,469 UART: [fht] FMC Alias Private Key: 7
18,426,121 UART: [art] Derive CDI
18,426,856 UART: [art] Store in in slot 0x4
18,469,115 UART: [art] Derive Key Pair
18,470,167 UART: [art] Store priv key in slot 0x5
20,896,656 UART: [art] Derive Key Pair - Done
20,909,590 UART: [art] Signing Cert with AUTHO
20,910,891 UART: RITY.KEYID = 7
22,616,032 UART: [art] Erasing AUTHORITY.KEYID = 7
22,617,544 UART: [art] PUB.X = DDE805F5DABF1DC7E6108989D7135428206A8C8EBA089C87A917CB920EB299198579E0A1C3E87964DCB3AC5475F1BC60
22,624,794 UART: [art] PUB.Y = 193D754BD20C6919994A3C5E35AFB92725CF21501F74C06556C7CF7ED00116F0A2C9FA0812946FD5853294667B0AB7D5
22,632,036 UART: [art] SIG.R = 98210696905983D11346C98C1CE406A87FB34ACBA3CE3F50223619C8D4E995DB87FD46C038F16C12558D115D99F740AF
22,639,406 UART: [art] SIG.S = DA9EFCADC7B5FE6B9D6C90D178CEBDE372CAD6BBB36F31E7F0C196C63C03958490086675FE31769D82129C1139B7D00C
23,618,491 UART: mbox::rt_entry...
23,619,454 UART: ____ _ _ _ ____ _____
23,621,383 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,623,395 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,625,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,627,179 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,629,247 UART: |_|
23,630,063 UART:
23,914,397 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,119 UART:
192,499 UART: Running Caliptra ROM ...
193,686 UART:
193,837 UART: [state] CFI Enabled
262,578 UART: [state] LifecycleState = Production
264,316 UART: [state] DebugLocked = Yes
267,160 UART: [state] Starting the WD Timer 40000000 cycles
271,538 UART: [kat] SHA2-256
450,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,289 UART: [kat] ++
462,817 UART: [kat] sha1
474,667 UART: [kat] SHA2-256
477,745 UART: [kat] SHA2-384
483,918 UART: [kat] SHA2-512-ACC
486,881 UART: [kat] ECC-384
2,949,302 UART: [kat] HMAC-384Kdf
2,971,012 UART: [kat] LMS
3,500,474 UART: [kat] --
3,506,129 UART: [cold-reset] ++
3,507,564 UART: [fht] FHT @ 0x50003400
3,517,257 UART: [idev] ++
3,517,828 UART: [idev] CDI.KEYID = 6
3,518,885 UART: [idev] SUBJECT.KEYID = 7
3,520,001 UART: [idev] UDS.KEYID = 0
3,520,933 ready_for_fw is high
3,521,122 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,619,959 UART: [idev] Erasing UDS.KEYID = 0
6,027,218 UART: [idev] Sha1 KeyId Algorithm
6,049,919 UART: [idev] --
6,053,369 UART: [ldev] ++
6,053,936 UART: [ldev] CDI.KEYID = 6
6,054,825 UART: [ldev] SUBJECT.KEYID = 5
6,056,041 UART: [ldev] AUTHORITY.KEYID = 7
6,057,274 UART: [ldev] FE.KEYID = 1
6,101,250 UART: [ldev] Erasing FE.KEYID = 1
8,599,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,135 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,336,128 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,967 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,876 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,213 UART: [ldev] --
10,393,419 UART: [fwproc] Wait for Commands...
10,395,724 UART: [fwproc] Recv command 0x46574c44
10,397,829 UART: [fwproc] Recv'd Img size: 78456 bytes
13,396,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,473,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,542,153 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,735,404 >>> mbox cmd response: success
13,740,002 UART: [afmc] ++
13,740,622 UART: [afmc] CDI.KEYID = 6
13,741,507 UART: [afmc] SUBJECT.KEYID = 7
13,742,604 UART: [afmc] AUTHORITY.KEYID = 5
16,268,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,996,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,998,499 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,014,507 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,030,374 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,046,059 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,068,499 UART: [afmc] --
18,073,011 UART: [cold-reset] --
18,076,191 UART: [state] Locking Datavault
18,081,711 UART: [state] Locking PCR0, PCR1 and PCR31
18,083,397 UART: [state] Locking ICCM
18,085,176 UART: [exit] Launching FMC @ 0x40000130
18,093,638 UART:
18,093,878 UART: Running Caliptra FMC ...
18,094,977 UART:
18,095,149 UART: [state] CFI Enabled
18,156,803 UART: [fht] FMC Alias Private Key: 7
19,921,242 UART: [art] Extend RT PCRs Done
19,922,453 UART: [art] Lock RT PCRs Done
19,924,289 UART: [art] Populate DV Done
19,929,748 UART: [fht] FMC Alias Private Key: 7
19,931,278 UART: [art] Derive CDI
19,932,085 UART: [art] Store in in slot 0x4
19,989,406 UART: [art] Derive Key Pair
19,990,398 UART: [art] Store priv key in slot 0x5
22,453,439 UART: [art] Derive Key Pair - Done
22,466,601 UART: [art] Signing Cert with AUTHO
22,467,900 UART: RITY.KEYID = 7
24,178,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,180,509 UART: [art] PUB.X = 0A4FA7C53E5C383E134EA092E0EDDAEEB99C6550C4614CF09A3E74B6B19FA7C15607586AECAC774AF6EECAD9FEF9C169
24,187,789 UART: [art] PUB.Y = 84110E7F501B4AC95D7E9EA31F624B9D24D416BDF94F2D44CDDA3552810A0BA0BE291472C469EF09B5627B00A8BF49D0
24,195,038 UART: [art] SIG.R = FB9206EC4CDB0B95DFDFFF0C0BCAE97BD2BF9598AE8F7329393D21C6600E068EF224775EF799F3E461FBF491020B27C3
24,202,412 UART: [art] SIG.S = 5EACDE6B9DEC2A720D5A9D15424B0F0DA4DFF20CE284850416BD34277BC27E226B0AD07F84CDB39B9A96C4D7CA9E830D
25,181,141 UART: mbox::rt_entry...
25,182,093 UART: ____ _ _ _ ____ _____
25,184,020 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,186,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,187,882 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,189,804 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,191,703 UART: |_|
25,192,586 UART:
25,305,843 UART: [rt] Runtime listening for mailbox commands...
25,307,860 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,308,356 >>> mbox cmd response data (0 bytes)
Initializing fuses
974 UART:
1,152 UART: Running Caliptra ROM ...
2,191 UART:
2,334 UART: [state] CFI Enabled
58,945 UART: [state] LifecycleState = Production
60,715 UART: [state] DebugLocked = Yes
63,025 UART: [state] Starting the WD Timer 40000000 cycles
68,403 UART: [kat] SHA2-256
247,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
259,123 UART: [kat] ++
259,587 UART: [kat] sha1
270,521 UART: [kat] SHA2-256
273,523 UART: [kat] SHA2-384
280,628 UART: [kat] SHA2-512-ACC
283,610 UART: [kat] ECC-384
2,746,370 UART: [kat] HMAC-384Kdf
2,770,213 UART: [kat] LMS
3,299,696 UART: [kat] --
3,303,977 UART: [warm-reset] ++
3,308,667 UART: [warm-reset] --
3,312,798 UART: [state] Locking Datavault
3,315,680 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,382 UART: [state] Locking ICCM
3,319,376 UART: [exit] Launching FMC @ 0x40000130
3,327,825 UART:
3,328,057 UART: Running Caliptra FMC ...
3,329,178 UART:
3,329,335 UART: [state] CFI Enabled
3,378,841 UART: [aliasrt :skip pcr extension
3,380,132 UART: [art] Extend RT PCRs Done
3,381,275 UART: [art] Lock RT PCRs Done
3,382,506 UART: [art] Populate DV Done
3,388,175 UART: [fht] FMC Alias Private Key: 7
3,389,867 UART: [art] Derive CDI
3,390,673 UART: [art] Store in in slot 0x4
3,447,544 UART: [art] Derive Key Pair
3,448,597 UART: [art] Store priv key in slot 0x5
5,912,277 UART: [art] Derive Key Pair - Done
5,925,332 UART: [art] Signing Cert with AUTHO
5,926,631 UART: RITY.KEYID = 7
7,638,482 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,003 UART: [art] PUB.X = 0A4FA7C53E5C383E134EA092E0EDDAEEB99C6550C4614CF09A3E74B6B19FA7C15607586AECAC774AF6EECAD9FEF9C169
7,647,306 UART: [art] PUB.Y = 84110E7F501B4AC95D7E9EA31F624B9D24D416BDF94F2D44CDDA3552810A0BA0BE291472C469EF09B5627B00A8BF49D0
7,654,550 UART: [art] SIG.R = FB9206EC4CDB0B95DFDFFF0C0BCAE97BD2BF9598AE8F7329393D21C6600E068EF224775EF799F3E461FBF491020B27C3
7,661,938 UART: [art] SIG.S = 5EACDE6B9DEC2A720D5A9D15424B0F0DA4DFF20CE284850416BD34277BC27E226B0AD07F84CDB39B9A96C4D7CA9E830D
8,640,412 UART: mbox::rt_entry...
8,641,359 UART: ____ _ _ _ ____ _____
8,643,342 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,274 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,245 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,172 UART: |_|
8,651,983 UART:
8,936,000 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,025 UART:
192,414 UART: Running Caliptra ROM ...
193,582 UART:
193,735 UART: [state] CFI Enabled
258,827 UART: [state] LifecycleState = Production
260,623 UART: [state] DebugLocked = Yes
261,907 UART: [state] Starting the WD Timer 40000000 cycles
267,387 UART: [kat] SHA2-256
446,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,121 UART: [kat] ++
458,647 UART: [kat] sha1
470,902 UART: [kat] SHA2-256
473,973 UART: [kat] SHA2-384
480,960 UART: [kat] SHA2-512-ACC
483,891 UART: [kat] ECC-384
2,947,356 UART: [kat] HMAC-384Kdf
2,971,260 UART: [kat] LMS
3,500,740 UART: [kat] --
3,504,387 UART: [cold-reset] ++
3,506,741 UART: [fht] FHT @ 0x50003400
3,517,709 UART: [idev] ++
3,518,279 UART: [idev] CDI.KEYID = 6
3,519,264 UART: [idev] SUBJECT.KEYID = 7
3,520,450 UART: [idev] UDS.KEYID = 0
3,521,376 ready_for_fw is high
3,521,573 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,620,517 UART: [idev] Erasing UDS.KEYID = 0
6,027,557 UART: [idev] Sha1 KeyId Algorithm
6,050,059 UART: [idev] --
6,052,970 UART: [ldev] ++
6,053,550 UART: [ldev] CDI.KEYID = 6
6,054,464 UART: [ldev] SUBJECT.KEYID = 5
6,055,623 UART: [ldev] AUTHORITY.KEYID = 7
6,056,906 UART: [ldev] FE.KEYID = 1
6,100,362 UART: [ldev] Erasing FE.KEYID = 1
8,602,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,434 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,446 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,218 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,668 UART: [ldev] --
10,411,388 UART: [fwproc] Wait for Commands...
10,414,234 UART: [fwproc] Recv command 0x46574c44
10,416,325 UART: [fwproc] Recv'd Img size: 78456 bytes
13,417,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,492,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,561,277 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,753,670 >>> mbox cmd response: success
13,757,751 UART: [afmc] ++
13,758,367 UART: [afmc] CDI.KEYID = 6
13,759,252 UART: [afmc] SUBJECT.KEYID = 7
13,760,354 UART: [afmc] AUTHORITY.KEYID = 5
16,293,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,016,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,018,740 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,034,793 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,050,597 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,066,318 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,088,206 UART: [afmc] --
18,092,422 UART: [cold-reset] --
18,095,687 UART: [state] Locking Datavault
18,100,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,102,137 UART: [state] Locking ICCM
18,104,504 UART: [exit] Launching FMC @ 0x40000130
18,112,961 UART:
18,113,204 UART: Running Caliptra FMC ...
18,114,303 UART:
18,114,460 UART: [state] CFI Enabled
18,176,918 UART: [fht] FMC Alias Private Key: 7
19,940,635 UART: [art] Extend RT PCRs Done
19,941,856 UART: [art] Lock RT PCRs Done
19,943,627 UART: [art] Populate DV Done
19,949,205 UART: [fht] FMC Alias Private Key: 7
19,950,845 UART: [art] Derive CDI
19,951,577 UART: [art] Store in in slot 0x4
20,009,966 UART: [art] Derive Key Pair
20,010,967 UART: [art] Store priv key in slot 0x5
22,474,138 UART: [art] Derive Key Pair - Done
22,486,969 UART: [art] Signing Cert with AUTHO
22,488,267 UART: RITY.KEYID = 7
24,199,413 UART: [art] Erasing AUTHORITY.KEYID = 7
24,200,912 UART: [art] PUB.X = E065527B1DD6D5F35ABE768F840D3D2F23BCE0D6750024D46AE20A8E3EEE2C5734592AD5AFA847CED1F6891249881923
24,208,139 UART: [art] PUB.Y = 82C427B361EBA8788DDBACD63938FC6C030734EF1B8CF2D0A4B97FF8E371D9BEF0AF3DCCAFF07E7DB48690800997820F
24,215,442 UART: [art] SIG.R = E6BFE2104419705919E15A0A282E83463DF97253E72B5591B1475BF88D940FE7253DDAEBEB2333D9A2D2B88E68BDCCFD
24,222,849 UART: [art] SIG.S = 979E97BB32B6EAF3A9D4DEC29C67A85EBE7FBCA02B074A5A3B9D9E7BA060A709EDC37EE334411C9DA40382BD53A2EBEE
25,201,389 UART: mbox::rt_entry...
25,202,341 UART: ____ _ _ _ ____ _____
25,204,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,341 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,194 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,118 UART: |_|
25,212,926 UART:
25,325,772 UART: [rt] Runtime listening for mailbox commands...
25,327,790 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,328,288 >>> mbox cmd response data (0 bytes)
Initializing fuses
998 UART:
1,145 UART: Running Caliptra ROM ...
2,255 UART:
2,411 UART: [state] CFI Enabled
65,340 UART: [state] LifecycleState = Production
67,107 UART: [state] DebugLocked = Yes
69,241 UART: [state] Starting the WD Timer 40000000 cycles
74,194 UART: [kat] SHA2-256
253,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,898 UART: [kat] ++
265,421 UART: [kat] sha1
276,842 UART: [kat] SHA2-256
279,851 UART: [kat] SHA2-384
284,851 UART: [kat] SHA2-512-ACC
287,839 UART: [kat] ECC-384
2,746,237 UART: [kat] HMAC-384Kdf
2,768,353 UART: [kat] LMS
3,297,838 UART: [kat] --
3,302,308 UART: [warm-reset] ++
3,308,493 UART: [warm-reset] --
3,312,028 UART: [state] Locking Datavault
3,314,737 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,399 UART: [state] Locking ICCM
3,318,633 UART: [exit] Launching FMC @ 0x40000130
3,327,088 UART:
3,327,327 UART: Running Caliptra FMC ...
3,328,425 UART:
3,328,582 UART: [state] CFI Enabled
3,378,033 UART: [aliasrt :skip pcr extension
3,379,331 UART: [art] Extend RT PCRs Done
3,380,400 UART: [art] Lock RT PCRs Done
3,381,789 UART: [art] Populate DV Done
3,387,464 UART: [fht] FMC Alias Private Key: 7
3,388,944 UART: [art] Derive CDI
3,389,705 UART: [art] Store in in slot 0x4
3,446,632 UART: [art] Derive Key Pair
3,447,681 UART: [art] Store priv key in slot 0x5
5,910,933 UART: [art] Derive Key Pair - Done
5,924,005 UART: [art] Signing Cert with AUTHO
5,925,312 UART: RITY.KEYID = 7
7,636,414 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,935 UART: [art] PUB.X = E065527B1DD6D5F35ABE768F840D3D2F23BCE0D6750024D46AE20A8E3EEE2C5734592AD5AFA847CED1F6891249881923
7,645,211 UART: [art] PUB.Y = 82C427B361EBA8788DDBACD63938FC6C030734EF1B8CF2D0A4B97FF8E371D9BEF0AF3DCCAFF07E7DB48690800997820F
7,652,480 UART: [art] SIG.R = E6BFE2104419705919E15A0A282E83463DF97253E72B5591B1475BF88D940FE7253DDAEBEB2333D9A2D2B88E68BDCCFD
7,659,840 UART: [art] SIG.S = 979E97BB32B6EAF3A9D4DEC29C67A85EBE7FBCA02B074A5A3B9D9E7BA060A709EDC37EE334411C9DA40382BD53A2EBEE
8,638,000 UART: mbox::rt_entry...
8,638,967 UART: ____ _ _ _ ____ _____
8,640,898 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,642,900 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,753 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,559 UART: |_|
8,649,389 UART:
8,932,335 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,783 writing to cptra_bootfsm_go
192,390 UART:
192,805 UART: Running Caliptra ROM ...
193,985 UART:
603,506 UART: [state] CFI Enabled
619,088 UART: [state] LifecycleState = Production
620,792 UART: [state] DebugLocked = Yes
622,218 UART: [state] Starting the WD Timer 40000000 cycles
626,753 UART: [kat] SHA2-256
805,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,477 UART: [kat] ++
818,011 UART: [kat] sha1
828,802 UART: [kat] SHA2-256
831,859 UART: [kat] SHA2-384
838,422 UART: [kat] SHA2-512-ACC
841,358 UART: [kat] ECC-384
3,284,535 UART: [kat] HMAC-384Kdf
3,297,909 UART: [kat] LMS
3,827,400 UART: [kat] --
3,831,777 UART: [cold-reset] ++
3,833,154 UART: [fht] FHT @ 0x50003400
3,843,784 UART: [idev] ++
3,844,353 UART: [idev] CDI.KEYID = 6
3,845,272 UART: [idev] SUBJECT.KEYID = 7
3,846,449 UART: [idev] UDS.KEYID = 0
3,847,499 ready_for_fw is high
3,847,704 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,946,459 UART: [idev] Erasing UDS.KEYID = 0
6,318,710 UART: [idev] Sha1 KeyId Algorithm
6,342,842 UART: [idev] --
6,346,425 UART: [ldev] ++
6,347,036 UART: [ldev] CDI.KEYID = 6
6,347,963 UART: [ldev] SUBJECT.KEYID = 5
6,349,070 UART: [ldev] AUTHORITY.KEYID = 7
6,350,270 UART: [ldev] FE.KEYID = 1
6,360,379 UART: [ldev] Erasing FE.KEYID = 1
8,830,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,397 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,562,387 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,578,210 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,594,205 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,614,402 UART: [ldev] --
10,618,540 UART: [fwproc] Wait for Commands...
10,621,726 UART: [fwproc] Recv command 0x46574c44
10,623,826 UART: [fwproc] Recv'd Img size: 78456 bytes
13,627,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,696,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,765,502 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,958,460 >>> mbox cmd response: success
13,963,116 UART: [afmc] ++
13,963,753 UART: [afmc] CDI.KEYID = 6
13,964,667 UART: [afmc] SUBJECT.KEYID = 7
13,965,773 UART: [afmc] AUTHORITY.KEYID = 5
16,466,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,187,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,188,988 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,204,966 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,220,778 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,236,521 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,258,694 UART: [afmc] --
18,261,575 UART: [cold-reset] --
18,265,232 UART: [state] Locking Datavault
18,271,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,273,122 UART: [state] Locking ICCM
18,274,086 UART: [exit] Launching FMC @ 0x40000130
18,282,546 UART:
18,282,802 UART: Running Caliptra FMC ...
18,283,910 UART:
18,284,073 UART: [state] CFI Enabled
18,292,231 UART: [fht] FMC Alias Private Key: 7
20,048,289 UART: [art] Extend RT PCRs Done
20,049,511 UART: [art] Lock RT PCRs Done
20,050,974 UART: [art] Populate DV Done
20,056,476 UART: [fht] FMC Alias Private Key: 7
20,057,988 UART: [art] Derive CDI
20,058,766 UART: [art] Store in in slot 0x4
20,101,035 UART: [art] Derive Key Pair
20,102,114 UART: [art] Store priv key in slot 0x5
22,529,153 UART: [art] Derive Key Pair - Done
22,542,102 UART: [art] Signing Cert with AUTHO
22,543,410 UART: RITY.KEYID = 7
24,248,849 UART: [art] Erasing AUTHORITY.KEYID = 7
24,250,376 UART: [art] PUB.X = 2749F65236AFEFB203B3A2AA2A818A83CE6F7F163C18F158DA12A5A23FD236C0FD93B54C186D60EBD2E4DF4794148394
24,257,605 UART: [art] PUB.Y = 28BC62EFB9641675525274539B66D0D74129AC2103842ABCDE4897B245015B2E6F4D602CFF34275F4E70A28EEFB0D702
24,264,863 UART: [art] SIG.R = 2E45C262002E90DDF9E65B94983C5ED6DCE90CB976ED0E49371478A2A8D4795D82A8E5DA3ED3982673D15EBCDCB91EAB
24,272,324 UART: [art] SIG.S = E4C11246E089046D9FD38DF4176DC8809A091B67214393CD50925421BD7A805C5FBB79C2E9B75C2E6D64D69B7EB64007
25,250,913 UART: mbox::rt_entry...
25,251,869 UART: ____ _ _ _ ____ _____
25,253,858 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,255,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,257,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,259,736 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,261,667 UART: |_|
25,262,502 UART:
25,375,796 UART: [rt] Runtime listening for mailbox commands...
25,377,807 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,378,307 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,045 UART:
1,307 UART: Running Caliptra ROM ...
2,361 UART:
15,142,820 UART: [state] CFI Enabled
15,156,716 UART: [state] LifecycleState = Production
15,158,471 UART: [state] DebugLocked = Yes
15,161,457 UART: [state] Starting the WD Timer 40000000 cycles
15,165,980 UART: [kat] SHA2-256
15,345,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,356,738 UART: [kat] ++
15,357,194 UART: [kat] sha1
15,368,670 UART: [kat] SHA2-256
15,371,718 UART: [kat] SHA2-384
15,378,306 UART: [kat] SHA2-512-ACC
15,381,260 UART: [kat] ECC-384
17,821,976 UART: [kat] HMAC-384Kdf
17,833,962 UART: [kat] LMS
18,363,484 UART: [kat] --
18,366,177 UART: [warm-reset] ++
18,371,674 UART: [warm-reset] --
18,377,589 UART: [state] Locking Datavault
18,380,308 UART: [state] Locking PCR0, PCR1 and PCR31
18,381,959 UART: [state] Locking ICCM
18,384,701 UART: [exit] Launching FMC @ 0x40000130
18,393,153 UART:
18,393,394 UART: Running Caliptra FMC ...
18,394,497 UART:
18,394,658 UART: [state] CFI Enabled
18,396,393 UART: [aliasrt :skip pcr extension
18,397,642 UART: [art] Extend RT PCRs Done
18,398,780 UART: [art] Lock RT PCRs Done
18,400,065 UART: [art] Populate DV Done
18,405,767 UART: [fht] FMC Alias Private Key: 7
18,407,417 UART: [art] Derive CDI
18,408,439 UART: [art] Store in in slot 0x4
18,451,088 UART: [art] Derive Key Pair
18,452,114 UART: [art] Store priv key in slot 0x5
20,878,279 UART: [art] Derive Key Pair - Done
20,891,318 UART: [art] Signing Cert with AUTHO
20,892,657 UART: RITY.KEYID = 7
22,598,145 UART: [art] Erasing AUTHORITY.KEYID = 7
22,599,656 UART: [art] PUB.X = 2749F65236AFEFB203B3A2AA2A818A83CE6F7F163C18F158DA12A5A23FD236C0FD93B54C186D60EBD2E4DF4794148394
22,606,938 UART: [art] PUB.Y = 28BC62EFB9641675525274539B66D0D74129AC2103842ABCDE4897B245015B2E6F4D602CFF34275F4E70A28EEFB0D702
22,614,194 UART: [art] SIG.R = 2E45C262002E90DDF9E65B94983C5ED6DCE90CB976ED0E49371478A2A8D4795D82A8E5DA3ED3982673D15EBCDCB91EAB
22,621,564 UART: [art] SIG.S = E4C11246E089046D9FD38DF4176DC8809A091B67214393CD50925421BD7A805C5FBB79C2E9B75C2E6D64D69B7EB64007
23,600,327 UART: mbox::rt_entry...
23,601,269 UART: ____ _ _ _ ____ _____
23,603,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,605,281 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,607,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,609,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,611,219 UART: |_|
23,612,073 UART:
23,901,239 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,708 writing to cptra_bootfsm_go
193,340 UART:
193,707 UART: Running Caliptra ROM ...
194,884 UART:
604,478 UART: [state] CFI Enabled
619,845 UART: [state] LifecycleState = Production
621,637 UART: [state] DebugLocked = Yes
622,980 UART: [state] Starting the WD Timer 40000000 cycles
627,525 UART: [kat] SHA2-256
806,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,233 UART: [kat] ++
818,687 UART: [kat] sha1
830,225 UART: [kat] SHA2-256
833,239 UART: [kat] SHA2-384
839,662 UART: [kat] SHA2-512-ACC
842,675 UART: [kat] ECC-384
3,282,708 UART: [kat] HMAC-384Kdf
3,295,603 UART: [kat] LMS
3,825,181 UART: [kat] --
3,830,104 UART: [cold-reset] ++
3,832,180 UART: [fht] FHT @ 0x50003400
3,844,389 UART: [idev] ++
3,845,003 UART: [idev] CDI.KEYID = 6
3,845,955 UART: [idev] SUBJECT.KEYID = 7
3,847,066 UART: [idev] UDS.KEYID = 0
3,847,996 ready_for_fw is high
3,848,207 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,946,937 UART: [idev] Erasing UDS.KEYID = 0
6,320,007 UART: [idev] Sha1 KeyId Algorithm
6,343,782 UART: [idev] --
6,348,267 UART: [ldev] ++
6,348,838 UART: [ldev] CDI.KEYID = 6
6,349,723 UART: [ldev] SUBJECT.KEYID = 5
6,350,934 UART: [ldev] AUTHORITY.KEYID = 7
6,352,169 UART: [ldev] FE.KEYID = 1
6,362,899 UART: [ldev] Erasing FE.KEYID = 1
8,831,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,955 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,957 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,794 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,743 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,617,405 UART: [ldev] --
10,621,918 UART: [fwproc] Wait for Commands...
10,624,985 UART: [fwproc] Recv command 0x46574c44
10,627,080 UART: [fwproc] Recv'd Img size: 78456 bytes
13,613,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,680,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,749,638 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,942,868 >>> mbox cmd response: success
13,947,383 UART: [afmc] ++
13,947,998 UART: [afmc] CDI.KEYID = 6
13,948,895 UART: [afmc] SUBJECT.KEYID = 7
13,950,054 UART: [afmc] AUTHORITY.KEYID = 5
16,448,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,169,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,171,207 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,187,186 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,203,068 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,218,809 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,241,780 UART: [afmc] --
18,244,943 UART: [cold-reset] --
18,248,440 UART: [state] Locking Datavault
18,253,531 UART: [state] Locking PCR0, PCR1 and PCR31
18,255,183 UART: [state] Locking ICCM
18,256,827 UART: [exit] Launching FMC @ 0x40000130
18,265,225 UART:
18,265,463 UART: Running Caliptra FMC ...
18,266,489 UART:
18,266,636 UART: [state] CFI Enabled
18,274,629 UART: [fht] FMC Alias Private Key: 7
20,031,316 UART: [art] Extend RT PCRs Done
20,032,574 UART: [art] Lock RT PCRs Done
20,034,326 UART: [art] Populate DV Done
20,039,750 UART: [fht] FMC Alias Private Key: 7
20,041,406 UART: [art] Derive CDI
20,042,231 UART: [art] Store in in slot 0x4
20,085,140 UART: [art] Derive Key Pair
20,086,307 UART: [art] Store priv key in slot 0x5
22,513,303 UART: [art] Derive Key Pair - Done
22,526,303 UART: [art] Signing Cert with AUTHO
22,527,605 UART: RITY.KEYID = 7
24,233,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,234,635 UART: [art] PUB.X = D16C4ED30C464101F69C40556DCFBC292B342CC0706161975E7695336AECB816F2580FA0D3248485C0E150658655500A
24,241,887 UART: [art] PUB.Y = 1A7D64C6E7468E7229DC420798112963602DEA42EB7A1D78734CE9D350D9C9F86587E8CEDE1ED94F396FB66E6863400A
24,249,120 UART: [art] SIG.R = F28B90D83F21C634E71553AB21A0E89A45B41BC03D030051EA3393325B98E91EFD1B069D00AF835E66DB6A80192F4115
24,256,465 UART: [art] SIG.S = E24717376CBFDDFD706766ABC0380F43D939619722899CAB7E94DBF24F92BAB165DEFDFFDF15F36686E6B984451C5E2F
25,234,796 UART: mbox::rt_entry...
25,235,769 UART: ____ _ _ _ ____ _____
25,237,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,239,768 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,241,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,243,630 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,245,560 UART: |_|
25,246,399 UART:
25,360,124 UART: [rt] Runtime listening for mailbox commands...
25,362,279 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,362,799 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,016 UART:
1,283 UART: Running Caliptra ROM ...
2,395 UART:
15,160,096 UART: [state] CFI Enabled
15,173,661 UART: [state] LifecycleState = Production
15,175,432 UART: [state] DebugLocked = Yes
15,178,448 UART: [state] Starting the WD Timer 40000000 cycles
15,183,407 UART: [kat] SHA2-256
15,362,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,374,076 UART: [kat] ++
15,374,536 UART: [kat] sha1
15,385,581 UART: [kat] SHA2-256
15,388,652 UART: [kat] SHA2-384
15,393,616 UART: [kat] SHA2-512-ACC
15,396,566 UART: [kat] ECC-384
17,838,449 UART: [kat] HMAC-384Kdf
17,851,058 UART: [kat] LMS
18,380,555 UART: [kat] --
18,385,460 UART: [warm-reset] ++
18,390,685 UART: [warm-reset] --
18,395,040 UART: [state] Locking Datavault
18,399,018 UART: [state] Locking PCR0, PCR1 and PCR31
18,400,711 UART: [state] Locking ICCM
18,402,712 UART: [exit] Launching FMC @ 0x40000130
18,411,179 UART:
18,411,430 UART: Running Caliptra FMC ...
18,412,534 UART:
18,412,692 UART: [state] CFI Enabled
18,414,536 UART: [aliasrt :skip pcr extension
18,415,787 UART: [art] Extend RT PCRs Done
18,416,924 UART: [art] Lock RT PCRs Done
18,418,535 UART: [art] Populate DV Done
18,423,995 UART: [fht] FMC Alias Private Key: 7
18,425,584 UART: [art] Derive CDI
18,426,399 UART: [art] Store in in slot 0x4
18,469,034 UART: [art] Derive Key Pair
18,470,056 UART: [art] Store priv key in slot 0x5
20,896,719 UART: [art] Derive Key Pair - Done
20,909,932 UART: [art] Signing Cert with AUTHO
20,911,243 UART: RITY.KEYID = 7
22,616,614 UART: [art] Erasing AUTHORITY.KEYID = 7
22,618,119 UART: [art] PUB.X = D16C4ED30C464101F69C40556DCFBC292B342CC0706161975E7695336AECB816F2580FA0D3248485C0E150658655500A
22,625,363 UART: [art] PUB.Y = 1A7D64C6E7468E7229DC420798112963602DEA42EB7A1D78734CE9D350D9C9F86587E8CEDE1ED94F396FB66E6863400A
22,632,635 UART: [art] SIG.R = F28B90D83F21C634E71553AB21A0E89A45B41BC03D030051EA3393325B98E91EFD1B069D00AF835E66DB6A80192F4115
22,639,996 UART: [art] SIG.S = E24717376CBFDDFD706766ABC0380F43D939619722899CAB7E94DBF24F92BAB165DEFDFFDF15F36686E6B984451C5E2F
23,619,027 UART: mbox::rt_entry...
23,619,992 UART: ____ _ _ _ ____ _____
23,621,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,623,991 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,625,925 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,627,855 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,629,791 UART: |_|
23,630,626 UART:
23,912,010 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,845 UART: [state] LifecycleState = Production
85,453 UART: [state] DebugLocked = Yes
86,049 UART: [state] Starting the WD Timer 40000000 cycles
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,494 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,899 UART: [idev] SUBJECT.KEYID = 7
1,174,324 UART: [idev] UDS.KEYID = 0
1,174,670 ready_for_fw is high
1,174,670 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,653 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,523 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,229 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,163 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,284 UART: [fwproc] Recv command 0x46574c44
1,283,017 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,687 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,650 >>> mbox cmd response: success
2,333,914 UART: [afmc] ++
2,334,082 UART: [afmc] CDI.KEYID = 6
2,334,445 UART: [afmc] SUBJECT.KEYID = 7
2,334,871 UART: [afmc] AUTHORITY.KEYID = 5
2,369,860 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,939 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,658 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,551 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,258 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,067 UART: [afmc] --
2,413,152 UART: [cold-reset] --
2,414,100 UART: [state] Locking Datavault
2,415,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,125 UART: [state] Locking ICCM
2,416,723 UART: [exit] Launching FMC @ 0x40000130
2,422,052 UART:
2,422,068 UART: Running Caliptra FMC ...
2,422,476 UART:
2,422,530 UART: [state] CFI Enabled
2,432,869 UART: [fht] FMC Alias Private Key: 7
2,540,654 UART: [art] Extend RT PCRs Done
2,541,082 UART: [art] Lock RT PCRs Done
2,542,756 UART: [art] Populate DV Done
2,551,006 UART: [fht] FMC Alias Private Key: 7
2,551,944 UART: [art] Derive CDI
2,552,224 UART: [art] Store in in slot 0x4
2,637,969 UART: [art] Derive Key Pair
2,638,329 UART: [art] Store priv key in slot 0x5
2,651,457 UART: [art] Derive Key Pair - Done
2,666,481 UART: [art] Signing Cert with AUTHO
2,666,961 UART: RITY.KEYID = 7
2,682,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,450 UART: [art] PUB.X = 0B677B9B8A3A20857914A694C3A6F2B48D76216F0CABB0E20A640B9D4354DE2D0675449B373AFC2CEC0E715145935686
2,690,202 UART: [art] PUB.Y = 28B872679F8A9E54BA4AE09ED1B80C75A3887F153396EED08B5CCAF78F9C87CA1F21633C1D4728BF57EC268011D8BD69
2,697,159 UART: [art] SIG.R = A2120FE7EBBD7215F47C9A6E36E94559A86FD7A62822D5438D013156C1FB2694C8C651AE1CDCADEAC82A61DC01DD6E19
2,703,936 UART: [art] SIG.S = 93ECBEA7E801F51BD0B080843B0E64162F308746EDE358925030FCBAAA553BA41B2F34F27548C5BBC4ADAC4B1248D2D4
2,727,393 UART: mbox::rt_entry...
2,727,765 UART: ____ _ _ _ ____ _____
2,728,549 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,117 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,885 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,653 UART: |_|
2,731,965 UART:
2,837,901 UART: [rt] Runtime listening for mailbox commands...
2,838,663 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,838,778 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,872 UART:
2,838,888 UART: Running Caliptra ROM ...
2,839,296 UART:
2,839,351 UART: [state] CFI Enabled
2,842,308 UART: [state] LifecycleState = Production
2,842,916 UART: [state] DebugLocked = Yes
2,843,484 UART: [state] Starting the WD Timer 40000000 cycles
2,844,947 UART: [kat] SHA2-256
3,648,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,626 UART: [kat] ++
3,652,778 UART: [kat] sha1
3,657,008 UART: [kat] SHA2-256
3,658,948 UART: [kat] SHA2-384
3,661,765 UART: [kat] SHA2-512-ACC
3,663,666 UART: [kat] ECC-384
3,673,147 UART: [kat] HMAC-384Kdf
3,677,905 UART: [kat] LMS
3,926,217 UART: [kat] --
3,927,035 UART: [warm-reset] ++
3,927,614 UART: [warm-reset] --
3,928,513 UART: [state] Locking Datavault
3,929,461 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,065 UART: [state] Locking ICCM
3,930,735 UART: [exit] Launching FMC @ 0x40000130
3,936,064 UART:
3,936,080 UART: Running Caliptra FMC ...
3,936,488 UART:
3,936,542 UART: [state] CFI Enabled
3,937,853 UART: [aliasrt :skip pcr extension
3,938,326 UART: [art] Extend RT PCRs Done
3,938,754 UART: [art] Lock RT PCRs Done
3,939,965 UART: [art] Populate DV Done
3,948,327 UART: [fht] FMC Alias Private Key: 7
3,949,285 UART: [art] Derive CDI
3,949,565 UART: [art] Store in in slot 0x4
4,035,012 UART: [art] Derive Key Pair
4,035,372 UART: [art] Store priv key in slot 0x5
4,048,226 UART: [art] Derive Key Pair - Done
4,062,592 UART: [art] Signing Cert with AUTHO
4,063,072 UART: RITY.KEYID = 7
4,078,312 UART: [art] Erasing AUTHORITY.KEYID = 7
4,079,077 UART: [art] PUB.X = 0B677B9B8A3A20857914A694C3A6F2B48D76216F0CABB0E20A640B9D4354DE2D0675449B373AFC2CEC0E715145935686
4,085,829 UART: [art] PUB.Y = 28B872679F8A9E54BA4AE09ED1B80C75A3887F153396EED08B5CCAF78F9C87CA1F21633C1D4728BF57EC268011D8BD69
4,092,786 UART: [art] SIG.R = A2120FE7EBBD7215F47C9A6E36E94559A86FD7A62822D5438D013156C1FB2694C8C651AE1CDCADEAC82A61DC01DD6E19
4,099,563 UART: [art] SIG.S = 93ECBEA7E801F51BD0B080843B0E64162F308746EDE358925030FCBAAA553BA41B2F34F27548C5BBC4ADAC4B1248D2D4
4,122,982 UART: mbox::rt_entry...
4,123,354 UART: ____ _ _ _ ____ _____
4,124,138 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,124,938 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,125,706 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,242 UART: |_|
4,127,554 UART:
4,408,748 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Production
85,929 UART: [state] DebugLocked = Yes
86,633 UART: [state] Starting the WD Timer 40000000 cycles
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,174,116 ready_for_fw is high
1,174,116 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,534 UART: [idev] Sha1 KeyId Algorithm
1,207,367 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,214,784 UART: [ldev] Erasing FE.KEYID = 1
1,240,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,061 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,755 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,625 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,331 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,367 UART: [ldev] --
1,279,759 UART: [fwproc] Wait for Commands...
1,280,370 UART: [fwproc] Recv command 0x46574c44
1,281,103 UART: [fwproc] Recv'd Img size: 78456 bytes
2,192,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,219,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,209 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,331,180 >>> mbox cmd response: success
2,332,350 UART: [afmc] ++
2,332,518 UART: [afmc] CDI.KEYID = 6
2,332,881 UART: [afmc] SUBJECT.KEYID = 7
2,333,307 UART: [afmc] AUTHORITY.KEYID = 5
2,368,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,385,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,003 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,391,722 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,397,615 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,403,322 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,411,053 UART: [afmc] --
2,412,080 UART: [cold-reset] --
2,412,956 UART: [state] Locking Datavault
2,414,191 UART: [state] Locking PCR0, PCR1 and PCR31
2,414,795 UART: [state] Locking ICCM
2,415,465 UART: [exit] Launching FMC @ 0x40000130
2,420,794 UART:
2,420,810 UART: Running Caliptra FMC ...
2,421,218 UART:
2,421,272 UART: [state] CFI Enabled
2,431,941 UART: [fht] FMC Alias Private Key: 7
2,539,870 UART: [art] Extend RT PCRs Done
2,540,298 UART: [art] Lock RT PCRs Done
2,541,490 UART: [art] Populate DV Done
2,549,554 UART: [fht] FMC Alias Private Key: 7
2,550,498 UART: [art] Derive CDI
2,550,778 UART: [art] Store in in slot 0x4
2,636,431 UART: [art] Derive Key Pair
2,636,791 UART: [art] Store priv key in slot 0x5
2,649,573 UART: [art] Derive Key Pair - Done
2,664,122 UART: [art] Signing Cert with AUTHO
2,664,602 UART: RITY.KEYID = 7
2,679,700 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,465 UART: [art] PUB.X = 1BF9AA564DC261F860E8F4EB6FE0A52764DB12AE80F0D9157402B969C8684BA82DD2AC61D08F8550653F060F49296757
2,687,228 UART: [art] PUB.Y = 6AE538DE644D660A5D86B0113D2A1EE7C08DC7543A4BCC547D42AFD63E368076F1160B2DBE1CCA269F48FA7B72F7249D
2,694,186 UART: [art] SIG.R = 704CF7017BA638ED0CD02BCC2A77B4DA9CA39370E9D2FE4310DEB41F57567EE4346552A7E2CC97EDDF562985B5AD7226
2,700,964 UART: [art] SIG.S = EEB3FE6BA9E03457522FC6C10117DECF63825530B68F7DD503B9D7E0B5BED14FF758874E3BCCB0E81BD8FBAC137574B2
2,724,659 UART: mbox::rt_entry...
2,725,031 UART: ____ _ _ _ ____ _____
2,725,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,726,615 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,727,383 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,151 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,728,919 UART: |_|
2,729,231 UART:
2,835,921 UART: [rt] Runtime listening for mailbox commands...
2,836,683 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,836,798 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,836,892 UART:
2,836,908 UART: Running Caliptra ROM ...
2,837,316 UART:
2,837,371 UART: [state] CFI Enabled
2,840,368 UART: [state] LifecycleState = Production
2,840,976 UART: [state] DebugLocked = Yes
2,841,634 UART: [state] Starting the WD Timer 40000000 cycles
2,843,229 UART: [kat] SHA2-256
3,646,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,650,908 UART: [kat] ++
3,651,060 UART: [kat] sha1
3,655,314 UART: [kat] SHA2-256
3,657,254 UART: [kat] SHA2-384
3,660,141 UART: [kat] SHA2-512-ACC
3,662,042 UART: [kat] ECC-384
3,671,811 UART: [kat] HMAC-384Kdf
3,676,325 UART: [kat] LMS
3,924,637 UART: [kat] --
3,925,499 UART: [warm-reset] ++
3,926,462 UART: [warm-reset] --
3,927,201 UART: [state] Locking Datavault
3,928,071 UART: [state] Locking PCR0, PCR1 and PCR31
3,928,675 UART: [state] Locking ICCM
3,929,315 UART: [exit] Launching FMC @ 0x40000130
3,934,644 UART:
3,934,660 UART: Running Caliptra FMC ...
3,935,068 UART:
3,935,122 UART: [state] CFI Enabled
3,936,317 UART: [aliasrt :skip pcr extension
3,936,790 UART: [art] Extend RT PCRs Done
3,937,218 UART: [art] Lock RT PCRs Done
3,938,577 UART: [art] Populate DV Done
3,946,943 UART: [fht] FMC Alias Private Key: 7
3,947,951 UART: [art] Derive CDI
3,948,231 UART: [art] Store in in slot 0x4
4,033,872 UART: [art] Derive Key Pair
4,034,232 UART: [art] Store priv key in slot 0x5
4,047,518 UART: [art] Derive Key Pair - Done
4,062,277 UART: [art] Signing Cert with AUTHO
4,062,757 UART: RITY.KEYID = 7
4,078,291 UART: [art] Erasing AUTHORITY.KEYID = 7
4,079,056 UART: [art] PUB.X = 1BF9AA564DC261F860E8F4EB6FE0A52764DB12AE80F0D9157402B969C8684BA82DD2AC61D08F8550653F060F49296757
4,085,819 UART: [art] PUB.Y = 6AE538DE644D660A5D86B0113D2A1EE7C08DC7543A4BCC547D42AFD63E368076F1160B2DBE1CCA269F48FA7B72F7249D
4,092,777 UART: [art] SIG.R = 704CF7017BA638ED0CD02BCC2A77B4DA9CA39370E9D2FE4310DEB41F57567EE4346552A7E2CC97EDDF562985B5AD7226
4,099,555 UART: [art] SIG.S = EEB3FE6BA9E03457522FC6C10117DECF63825530B68F7DD503B9D7E0B5BED14FF758874E3BCCB0E81BD8FBAC137574B2
4,123,482 UART: mbox::rt_entry...
4,123,854 UART: ____ _ _ _ ____ _____
4,124,638 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,438 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,206 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,974 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,742 UART: |_|
4,128,054 UART:
4,410,520 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Production
86,172 UART: [state] DebugLocked = Yes
86,688 UART: [state] Starting the WD Timer 40000000 cycles
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,984 UART: [kat] ++
896,136 UART: [kat] sha1
900,370 UART: [kat] SHA2-256
902,310 UART: [kat] SHA2-384
905,061 UART: [kat] SHA2-512-ACC
906,962 UART: [kat] ECC-384
916,973 UART: [kat] HMAC-384Kdf
921,569 UART: [kat] LMS
1,169,881 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,293 UART: [fht] FHT @ 0x50003400
1,174,071 UART: [idev] ++
1,174,239 UART: [idev] CDI.KEYID = 6
1,174,600 UART: [idev] SUBJECT.KEYID = 7
1,175,025 UART: [idev] UDS.KEYID = 0
1,175,371 ready_for_fw is high
1,175,371 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,292 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,216,977 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,502 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,196 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,066 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,772 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,874 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,284,065 UART: [fwproc] Recv command 0x46574c44
1,284,798 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,418 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,334,387 >>> mbox cmd response: success
2,335,639 UART: [afmc] ++
2,335,807 UART: [afmc] CDI.KEYID = 6
2,336,170 UART: [afmc] SUBJECT.KEYID = 7
2,336,596 UART: [afmc] AUTHORITY.KEYID = 5
2,371,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,776 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,495 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,388 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,095 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,970 UART: [afmc] --
2,414,919 UART: [cold-reset] --
2,415,837 UART: [state] Locking Datavault
2,416,884 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,488 UART: [state] Locking ICCM
2,418,026 UART: [exit] Launching FMC @ 0x40000130
2,423,355 UART:
2,423,371 UART: Running Caliptra FMC ...
2,423,779 UART:
2,423,922 UART: [state] CFI Enabled
2,434,595 UART: [fht] FMC Alias Private Key: 7
2,542,856 UART: [art] Extend RT PCRs Done
2,543,284 UART: [art] Lock RT PCRs Done
2,544,806 UART: [art] Populate DV Done
2,552,940 UART: [fht] FMC Alias Private Key: 7
2,554,064 UART: [art] Derive CDI
2,554,344 UART: [art] Store in in slot 0x4
2,640,131 UART: [art] Derive Key Pair
2,640,491 UART: [art] Store priv key in slot 0x5
2,654,071 UART: [art] Derive Key Pair - Done
2,669,014 UART: [art] Signing Cert with AUTHO
2,669,494 UART: RITY.KEYID = 7
2,684,932 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,697 UART: [art] PUB.X = 7763CF338F652C2826B1538CF79848B1AD3E4E30234273B10D171E9F189A54BFEC7D1C2BA00D74E7EF5E1F4520412AC2
2,692,465 UART: [art] PUB.Y = 29F07B78F6195969E954BFB86D1F6CA3FD272D66F00885DA8F9D6D65FA9CE78EE292E57232CF18C6ECCC45EE31B8153D
2,699,426 UART: [art] SIG.R = 5B57A3F8B975C339594377E7E751B97D5543FFFA314C2A31F43090426082C4E8E29F1BD57BDA8F169190A20DFA418D0A
2,706,192 UART: [art] SIG.S = 7F548AE9F86B0E2F934163D85BA330642E1A8C7ADA0964BB2C3CA8961EB4671995A4848A0CBD86A46AEF819F12CDE40F
2,729,577 UART: mbox::rt_entry...
2,729,949 UART: ____ _ _ _ ____ _____
2,730,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,533 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,301 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,837 UART: |_|
2,734,149 UART:
2,841,334 UART: [rt] Runtime listening for mailbox commands...
2,842,096 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,211 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,305 UART:
2,842,321 UART: Running Caliptra ROM ...
2,842,729 UART:
2,842,871 UART: [state] CFI Enabled
2,845,984 UART: [state] LifecycleState = Production
2,846,592 UART: [state] DebugLocked = Yes
2,847,292 UART: [state] Starting the WD Timer 40000000 cycles
2,848,973 UART: [kat] SHA2-256
3,652,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,652 UART: [kat] ++
3,656,804 UART: [kat] sha1
3,661,106 UART: [kat] SHA2-256
3,663,046 UART: [kat] SHA2-384
3,665,723 UART: [kat] SHA2-512-ACC
3,667,624 UART: [kat] ECC-384
3,677,385 UART: [kat] HMAC-384Kdf
3,681,923 UART: [kat] LMS
3,930,235 UART: [kat] --
3,930,979 UART: [warm-reset] ++
3,932,000 UART: [warm-reset] --
3,932,859 UART: [state] Locking Datavault
3,933,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,437 UART: [state] Locking ICCM
3,934,915 UART: [exit] Launching FMC @ 0x40000130
3,940,244 UART:
3,940,260 UART: Running Caliptra FMC ...
3,940,668 UART:
3,940,811 UART: [state] CFI Enabled
3,942,152 UART: [aliasrt :skip pcr extension
3,942,625 UART: [art] Extend RT PCRs Done
3,943,053 UART: [art] Lock RT PCRs Done
3,944,160 UART: [art] Populate DV Done
3,952,384 UART: [fht] FMC Alias Private Key: 7
3,953,320 UART: [art] Derive CDI
3,953,600 UART: [art] Store in in slot 0x4
4,039,361 UART: [art] Derive Key Pair
4,039,721 UART: [art] Store priv key in slot 0x5
4,052,459 UART: [art] Derive Key Pair - Done
4,067,240 UART: [art] Signing Cert with AUTHO
4,067,720 UART: RITY.KEYID = 7
4,083,198 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,963 UART: [art] PUB.X = 7763CF338F652C2826B1538CF79848B1AD3E4E30234273B10D171E9F189A54BFEC7D1C2BA00D74E7EF5E1F4520412AC2
4,090,731 UART: [art] PUB.Y = 29F07B78F6195969E954BFB86D1F6CA3FD272D66F00885DA8F9D6D65FA9CE78EE292E57232CF18C6ECCC45EE31B8153D
4,097,692 UART: [art] SIG.R = 5B57A3F8B975C339594377E7E751B97D5543FFFA314C2A31F43090426082C4E8E29F1BD57BDA8F169190A20DFA418D0A
4,104,458 UART: [art] SIG.S = 7F548AE9F86B0E2F934163D85BA330642E1A8C7ADA0964BB2C3CA8961EB4671995A4848A0CBD86A46AEF819F12CDE40F
4,128,641 UART: mbox::rt_entry...
4,129,013 UART: ____ _ _ _ ____ _____
4,129,797 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,901 UART: |_|
4,133,213 UART:
4,414,794 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Production
86,228 UART: [state] DebugLocked = Yes
86,964 UART: [state] Starting the WD Timer 40000000 cycles
88,661 UART: [kat] SHA2-256
892,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,340 UART: [kat] ++
896,492 UART: [kat] sha1
900,866 UART: [kat] SHA2-256
902,806 UART: [kat] SHA2-384
905,601 UART: [kat] SHA2-512-ACC
907,502 UART: [kat] ECC-384
917,203 UART: [kat] HMAC-384Kdf
922,059 UART: [kat] LMS
1,170,371 UART: [kat] --
1,170,988 UART: [cold-reset] ++
1,171,345 UART: [fht] FHT @ 0x50003400
1,173,997 UART: [idev] ++
1,174,165 UART: [idev] CDI.KEYID = 6
1,174,526 UART: [idev] SUBJECT.KEYID = 7
1,174,951 UART: [idev] UDS.KEYID = 0
1,175,297 ready_for_fw is high
1,175,297 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,667 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,307 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,480 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,174 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,044 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,750 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,974 UART: [ldev] --
1,283,338 UART: [fwproc] Wait for Commands...
1,283,925 UART: [fwproc] Recv command 0x46574c44
1,284,658 UART: [fwproc] Recv'd Img size: 78456 bytes
2,196,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,348 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,335,227 >>> mbox cmd response: success
2,336,487 UART: [afmc] ++
2,336,655 UART: [afmc] CDI.KEYID = 6
2,337,018 UART: [afmc] SUBJECT.KEYID = 7
2,337,444 UART: [afmc] AUTHORITY.KEYID = 5
2,373,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,778 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,497 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,390 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,097 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,876 UART: [afmc] --
2,416,981 UART: [cold-reset] --
2,417,697 UART: [state] Locking Datavault
2,418,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,356 UART: [state] Locking ICCM
2,419,784 UART: [exit] Launching FMC @ 0x40000130
2,425,113 UART:
2,425,129 UART: Running Caliptra FMC ...
2,425,537 UART:
2,425,680 UART: [state] CFI Enabled
2,436,445 UART: [fht] FMC Alias Private Key: 7
2,545,130 UART: [art] Extend RT PCRs Done
2,545,558 UART: [art] Lock RT PCRs Done
2,546,920 UART: [art] Populate DV Done
2,555,150 UART: [fht] FMC Alias Private Key: 7
2,556,330 UART: [art] Derive CDI
2,556,610 UART: [art] Store in in slot 0x4
2,642,011 UART: [art] Derive Key Pair
2,642,371 UART: [art] Store priv key in slot 0x5
2,655,735 UART: [art] Derive Key Pair - Done
2,670,528 UART: [art] Signing Cert with AUTHO
2,671,008 UART: RITY.KEYID = 7
2,685,634 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,399 UART: [art] PUB.X = 498F7AC86B404EE09AB9B406B6BFC55B310E93AF66A0F3438E7828A6F32EFF62C68B479EA608097D15FDAD4F84840ADD
2,693,168 UART: [art] PUB.Y = 9CBD981581F04D9B44B68A3A7D702980E0B5BC421C047D82441CF79CF9A24EC4358A802014CE194ABEE2F4CC9B705B67
2,700,123 UART: [art] SIG.R = 6D13031A971D66F80E6FB3BA950090D7DA5C65F74B2BFCBD4D06DE90EBB65395B806F594E735BAF6563C18A50673E554
2,706,864 UART: [art] SIG.S = 0DC2A1CC1D41D4A5EF1760E74D1845744DD1BD7CB7D4E0C1053C2135C2DC257C870709CDEC222EB50B262A06A31B7CF6
2,729,961 UART: mbox::rt_entry...
2,730,333 UART: ____ _ _ _ ____ _____
2,731,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,221 UART: |_|
2,734,533 UART:
2,840,160 UART: [rt] Runtime listening for mailbox commands...
2,840,922 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,037 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,131 UART:
2,841,147 UART: Running Caliptra ROM ...
2,841,555 UART:
2,841,697 UART: [state] CFI Enabled
2,844,272 UART: [state] LifecycleState = Production
2,844,880 UART: [state] DebugLocked = Yes
2,845,488 UART: [state] Starting the WD Timer 40000000 cycles
2,847,107 UART: [kat] SHA2-256
3,650,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,786 UART: [kat] ++
3,654,938 UART: [kat] sha1
3,659,128 UART: [kat] SHA2-256
3,661,068 UART: [kat] SHA2-384
3,663,879 UART: [kat] SHA2-512-ACC
3,665,780 UART: [kat] ECC-384
3,675,635 UART: [kat] HMAC-384Kdf
3,680,121 UART: [kat] LMS
3,928,433 UART: [kat] --
3,929,151 UART: [warm-reset] ++
3,929,942 UART: [warm-reset] --
3,930,761 UART: [state] Locking Datavault
3,931,547 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,151 UART: [state] Locking ICCM
3,932,675 UART: [exit] Launching FMC @ 0x40000130
3,938,004 UART:
3,938,020 UART: Running Caliptra FMC ...
3,938,428 UART:
3,938,571 UART: [state] CFI Enabled
3,939,926 UART: [aliasrt :skip pcr extension
3,940,399 UART: [art] Extend RT PCRs Done
3,940,827 UART: [art] Lock RT PCRs Done
3,941,956 UART: [art] Populate DV Done
3,950,328 UART: [fht] FMC Alias Private Key: 7
3,951,364 UART: [art] Derive CDI
3,951,644 UART: [art] Store in in slot 0x4
4,037,091 UART: [art] Derive Key Pair
4,037,451 UART: [art] Store priv key in slot 0x5
4,050,467 UART: [art] Derive Key Pair - Done
4,065,242 UART: [art] Signing Cert with AUTHO
4,065,722 UART: RITY.KEYID = 7
4,081,190 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,955 UART: [art] PUB.X = 498F7AC86B404EE09AB9B406B6BFC55B310E93AF66A0F3438E7828A6F32EFF62C68B479EA608097D15FDAD4F84840ADD
4,088,724 UART: [art] PUB.Y = 9CBD981581F04D9B44B68A3A7D702980E0B5BC421C047D82441CF79CF9A24EC4358A802014CE194ABEE2F4CC9B705B67
4,095,679 UART: [art] SIG.R = 6D13031A971D66F80E6FB3BA950090D7DA5C65F74B2BFCBD4D06DE90EBB65395B806F594E735BAF6563C18A50673E554
4,102,420 UART: [art] SIG.S = 0DC2A1CC1D41D4A5EF1760E74D1845744DD1BD7CB7D4E0C1053C2135C2DC257C870709CDEC222EB50B262A06A31B7CF6
4,125,909 UART: mbox::rt_entry...
4,126,281 UART: ____ _ _ _ ____ _____
4,127,065 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,865 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,633 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,401 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,169 UART: |_|
4,130,481 UART:
4,410,426 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Production
85,979 UART: [state] DebugLocked = Yes
86,517 UART: [state] Starting the WD Timer 40000000 cycles
88,206 UART: [kat] SHA2-256
891,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,885 UART: [kat] ++
896,037 UART: [kat] sha1
900,389 UART: [kat] SHA2-256
902,329 UART: [kat] SHA2-384
905,038 UART: [kat] SHA2-512-ACC
906,939 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,565 UART: [cold-reset] ++
1,171,102 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,291 UART: [idev] SUBJECT.KEYID = 7
1,174,716 UART: [idev] UDS.KEYID = 0
1,175,062 ready_for_fw is high
1,175,062 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,207,921 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,560 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,299 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,993 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,863 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,569 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,481 UART: [ldev] --
1,280,877 UART: [fwproc] Wait for Commands...
1,281,466 UART: [fwproc] Recv command 0x46574c44
1,282,199 UART: [fwproc] Recv'd Img size: 78456 bytes
2,192,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,337 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,331,250 >>> mbox cmd response: success
2,332,418 UART: [afmc] ++
2,332,586 UART: [afmc] CDI.KEYID = 6
2,332,949 UART: [afmc] SUBJECT.KEYID = 7
2,333,375 UART: [afmc] AUTHORITY.KEYID = 5
2,369,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,385,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,385,865 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,391,584 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,397,477 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,403,184 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,411,093 UART: [afmc] --
2,412,140 UART: [cold-reset] --
2,412,852 UART: [state] Locking Datavault
2,414,167 UART: [state] Locking PCR0, PCR1 and PCR31
2,414,771 UART: [state] Locking ICCM
2,415,293 UART: [exit] Launching FMC @ 0x40000130
2,420,622 UART:
2,420,638 UART: Running Caliptra FMC ...
2,421,046 UART:
2,421,100 UART: [state] CFI Enabled
2,431,637 UART: [fht] FMC Alias Private Key: 7
2,540,368 UART: [art] Extend RT PCRs Done
2,540,796 UART: [art] Lock RT PCRs Done
2,542,748 UART: [art] Populate DV Done
2,550,848 UART: [fht] FMC Alias Private Key: 7
2,551,782 UART: [art] Derive CDI
2,552,062 UART: [art] Store in in slot 0x4
2,637,257 UART: [art] Derive Key Pair
2,637,617 UART: [art] Store priv key in slot 0x5
2,649,893 UART: [art] Derive Key Pair - Done
2,664,634 UART: [art] Signing Cert with AUTHO
2,665,114 UART: RITY.KEYID = 7
2,680,120 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,885 UART: [art] PUB.X = E8B6CCECC08D66B64EF0BD68598201946F230072AC10BF1A0DC311843A930473261668F9D444EA252AA69C92D2968C4E
2,687,626 UART: [art] PUB.Y = 5C2AD866F705E285638633AB5526B902228F59B4D22905999F43E0F9F978C82AE351C2ED979EAB87099480D3894B7A8B
2,694,558 UART: [art] SIG.R = CDAF6FDC48CE97069A9629FB893D091BB9A59C7432D46E64DD356FA91B62604F8122006720C6039167130A513BB284E3
2,701,292 UART: [art] SIG.S = D49536053FF93E7C23296FC17FCC2D72193661C085805EBC5609726FF4816ED30156A62F38C6F77365E02D45D668D819
2,724,786 UART: mbox::rt_entry...
2,725,158 UART: ____ _ _ _ ____ _____
2,725,942 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,726,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,727,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,046 UART: |_|
2,729,358 UART:
2,836,058 UART: [rt] Runtime listening for mailbox commands...
2,836,820 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,836,935 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,837,029 UART:
2,837,045 UART: Running Caliptra ROM ...
2,837,453 UART:
2,837,508 UART: [state] CFI Enabled
2,839,521 UART: [state] LifecycleState = Production
2,840,129 UART: [state] DebugLocked = Yes
2,840,821 UART: [state] Starting the WD Timer 40000000 cycles
2,842,378 UART: [kat] SHA2-256
3,645,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,650,057 UART: [kat] ++
3,650,209 UART: [kat] sha1
3,654,289 UART: [kat] SHA2-256
3,656,229 UART: [kat] SHA2-384
3,659,202 UART: [kat] SHA2-512-ACC
3,661,103 UART: [kat] ECC-384
3,670,340 UART: [kat] HMAC-384Kdf
3,674,926 UART: [kat] LMS
3,923,238 UART: [kat] --
3,923,988 UART: [warm-reset] ++
3,924,857 UART: [warm-reset] --
3,925,570 UART: [state] Locking Datavault
3,926,116 UART: [state] Locking PCR0, PCR1 and PCR31
3,926,720 UART: [state] Locking ICCM
3,927,234 UART: [exit] Launching FMC @ 0x40000130
3,932,563 UART:
3,932,579 UART: Running Caliptra FMC ...
3,932,987 UART:
3,933,041 UART: [state] CFI Enabled
3,934,222 UART: [aliasrt :skip pcr extension
3,934,695 UART: [art] Extend RT PCRs Done
3,935,123 UART: [art] Lock RT PCRs Done
3,936,108 UART: [art] Populate DV Done
3,944,348 UART: [fht] FMC Alias Private Key: 7
3,945,524 UART: [art] Derive CDI
3,945,804 UART: [art] Store in in slot 0x4
4,031,029 UART: [art] Derive Key Pair
4,031,389 UART: [art] Store priv key in slot 0x5
4,044,527 UART: [art] Derive Key Pair - Done
4,059,308 UART: [art] Signing Cert with AUTHO
4,059,788 UART: RITY.KEYID = 7
4,074,688 UART: [art] Erasing AUTHORITY.KEYID = 7
4,075,453 UART: [art] PUB.X = E8B6CCECC08D66B64EF0BD68598201946F230072AC10BF1A0DC311843A930473261668F9D444EA252AA69C92D2968C4E
4,082,194 UART: [art] PUB.Y = 5C2AD866F705E285638633AB5526B902228F59B4D22905999F43E0F9F978C82AE351C2ED979EAB87099480D3894B7A8B
4,089,126 UART: [art] SIG.R = CDAF6FDC48CE97069A9629FB893D091BB9A59C7432D46E64DD356FA91B62604F8122006720C6039167130A513BB284E3
4,095,860 UART: [art] SIG.S = D49536053FF93E7C23296FC17FCC2D72193661C085805EBC5609726FF4816ED30156A62F38C6F77365E02D45D668D819
4,119,934 UART: mbox::rt_entry...
4,120,306 UART: ____ _ _ _ ____ _____
4,121,090 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,121,890 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,122,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,123,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,124,194 UART: |_|
4,124,506 UART:
4,406,852 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Production
85,735 UART: [state] DebugLocked = Yes
86,289 UART: [state] Starting the WD Timer 40000000 cycles
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,020 UART: [kat] LMS
1,169,332 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,416 UART: [idev] ++
1,173,584 UART: [idev] CDI.KEYID = 6
1,173,945 UART: [idev] SUBJECT.KEYID = 7
1,174,370 UART: [idev] UDS.KEYID = 0
1,174,716 ready_for_fw is high
1,174,716 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,293 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,213 UART: [idev] --
1,209,142 UART: [ldev] ++
1,209,310 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,101 UART: [ldev] AUTHORITY.KEYID = 7
1,210,564 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,017 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,711 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,581 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,287 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,537 UART: [ldev] --
1,282,031 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,837 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,334,954 >>> mbox cmd response: success
2,336,008 UART: [afmc] ++
2,336,176 UART: [afmc] CDI.KEYID = 6
2,336,539 UART: [afmc] SUBJECT.KEYID = 7
2,336,965 UART: [afmc] AUTHORITY.KEYID = 5
2,372,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,045 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,764 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,657 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,364 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,327 UART: [afmc] --
2,416,374 UART: [cold-reset] --
2,417,218 UART: [state] Locking Datavault
2,418,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,343 UART: [state] Locking ICCM
2,419,985 UART: [exit] Launching FMC @ 0x40000130
2,425,314 UART:
2,425,330 UART: Running Caliptra FMC ...
2,425,738 UART:
2,425,792 UART: [state] CFI Enabled
2,436,513 UART: [fht] FMC Alias Private Key: 7
2,544,854 UART: [art] Extend RT PCRs Done
2,545,282 UART: [art] Lock RT PCRs Done
2,546,890 UART: [art] Populate DV Done
2,555,258 UART: [fht] FMC Alias Private Key: 7
2,556,338 UART: [art] Derive CDI
2,556,618 UART: [art] Store in in slot 0x4
2,642,043 UART: [art] Derive Key Pair
2,642,403 UART: [art] Store priv key in slot 0x5
2,655,305 UART: [art] Derive Key Pair - Done
2,670,254 UART: [art] Signing Cert with AUTHO
2,670,734 UART: RITY.KEYID = 7
2,686,102 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,867 UART: [art] PUB.X = EEEEAEC96F12DDD62B2B89039C2B1B4699970545A8EBDA90E56D19487606FC4870451B4F92ED21FE676DA238DAF825C7
2,693,640 UART: [art] PUB.Y = 828FA27B61EDEBAD247C6A998E347A3144CD8F45401D802616D1E4E30B85ECFEFA7D5068B816736A99135DBE5DDEF632
2,700,599 UART: [art] SIG.R = 00413D6FC4F8994B654B0A32D11253C4634C907A0C32A704C80E8D8C666E1449AF1E2239D797CAD34E924487E3EE5A23
2,707,333 UART: [art] SIG.S = 5A95990E0CFA6957B6037EBE988FC834DA4F21505A5B5B3EE162B53E9B6AA2C3D9E332D74CD97F4F39F698992BCBEEAB
2,730,919 UART: mbox::rt_entry...
2,731,291 UART: ____ _ _ _ ____ _____
2,732,075 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,875 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,733,643 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,734,411 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,735,179 UART: |_|
2,735,491 UART:
2,842,036 UART: [rt] Runtime listening for mailbox commands...
2,842,798 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,913 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,007 UART:
2,843,023 UART: Running Caliptra ROM ...
2,843,431 UART:
2,843,486 UART: [state] CFI Enabled
2,845,965 UART: [state] LifecycleState = Production
2,846,573 UART: [state] DebugLocked = Yes
2,847,115 UART: [state] Starting the WD Timer 40000000 cycles
2,848,720 UART: [kat] SHA2-256
3,652,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,399 UART: [kat] ++
3,656,551 UART: [kat] sha1
3,660,761 UART: [kat] SHA2-256
3,662,701 UART: [kat] SHA2-384
3,665,606 UART: [kat] SHA2-512-ACC
3,667,507 UART: [kat] ECC-384
3,676,860 UART: [kat] HMAC-384Kdf
3,681,622 UART: [kat] LMS
3,929,934 UART: [kat] --
3,930,778 UART: [warm-reset] ++
3,931,407 UART: [warm-reset] --
3,932,118 UART: [state] Locking Datavault
3,932,956 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,560 UART: [state] Locking ICCM
3,934,228 UART: [exit] Launching FMC @ 0x40000130
3,939,557 UART:
3,939,573 UART: Running Caliptra FMC ...
3,939,981 UART:
3,940,035 UART: [state] CFI Enabled
3,941,124 UART: [aliasrt :skip pcr extension
3,941,597 UART: [art] Extend RT PCRs Done
3,942,025 UART: [art] Lock RT PCRs Done
3,943,704 UART: [art] Populate DV Done
3,951,982 UART: [fht] FMC Alias Private Key: 7
3,953,004 UART: [art] Derive CDI
3,953,284 UART: [art] Store in in slot 0x4
4,038,921 UART: [art] Derive Key Pair
4,039,281 UART: [art] Store priv key in slot 0x5
4,052,489 UART: [art] Derive Key Pair - Done
4,067,470 UART: [art] Signing Cert with AUTHO
4,067,950 UART: RITY.KEYID = 7
4,083,016 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,781 UART: [art] PUB.X = EEEEAEC96F12DDD62B2B89039C2B1B4699970545A8EBDA90E56D19487606FC4870451B4F92ED21FE676DA238DAF825C7
4,090,554 UART: [art] PUB.Y = 828FA27B61EDEBAD247C6A998E347A3144CD8F45401D802616D1E4E30B85ECFEFA7D5068B816736A99135DBE5DDEF632
4,097,513 UART: [art] SIG.R = 00413D6FC4F8994B654B0A32D11253C4634C907A0C32A704C80E8D8C666E1449AF1E2239D797CAD34E924487E3EE5A23
4,104,247 UART: [art] SIG.S = 5A95990E0CFA6957B6037EBE988FC834DA4F21505A5B5B3EE162B53E9B6AA2C3D9E332D74CD97F4F39F698992BCBEEAB
4,128,491 UART: mbox::rt_entry...
4,128,863 UART: ____ _ _ _ ____ _____
4,129,647 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,447 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,983 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,751 UART: |_|
4,133,063 UART:
4,413,164 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Production
85,974 UART: [state] DebugLocked = Yes
86,656 UART: [state] Starting the WD Timer 40000000 cycles
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,153 UART: [kat] LMS
1,169,465 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,174,629 ready_for_fw is high
1,174,629 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,630 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,500 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,206 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,212 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,377 UART: [fwproc] Recv command 0x46574c44
1,283,110 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,528 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,645 >>> mbox cmd response: success
2,333,695 UART: [afmc] ++
2,333,863 UART: [afmc] CDI.KEYID = 6
2,334,226 UART: [afmc] SUBJECT.KEYID = 7
2,334,652 UART: [afmc] AUTHORITY.KEYID = 5
2,370,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,632 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,351 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,244 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,951 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,806 UART: [afmc] --
2,413,843 UART: [cold-reset] --
2,414,879 UART: [state] Locking Datavault
2,415,882 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,486 UART: [state] Locking ICCM
2,417,128 UART: [exit] Launching FMC @ 0x40000130
2,422,457 UART:
2,422,473 UART: Running Caliptra FMC ...
2,422,881 UART:
2,423,024 UART: [state] CFI Enabled
2,433,727 UART: [fht] FMC Alias Private Key: 7
2,542,096 UART: [art] Extend RT PCRs Done
2,542,524 UART: [art] Lock RT PCRs Done
2,544,386 UART: [art] Populate DV Done
2,552,890 UART: [fht] FMC Alias Private Key: 7
2,554,038 UART: [art] Derive CDI
2,554,318 UART: [art] Store in in slot 0x4
2,640,041 UART: [art] Derive Key Pair
2,640,401 UART: [art] Store priv key in slot 0x5
2,654,033 UART: [art] Derive Key Pair - Done
2,668,917 UART: [art] Signing Cert with AUTHO
2,669,397 UART: RITY.KEYID = 7
2,684,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,450 UART: [art] PUB.X = A7B3D19153300A253E38B705F49D1C9B39D81629B29D3D1EFF093735989E7C6B373AAC2E434751B27F848803D557B58D
2,692,204 UART: [art] PUB.Y = F525A3C66868CB023C34FE3F47C22158A9E6E9F3C361A45EA69C5CDC00340AD6763A16935228942F8EDEAD057CED5249
2,699,129 UART: [art] SIG.R = 6678BE0E17ED1C9A375E08C803F7D9CB6EC68FD1FC7045D51FF0712B434F4297ADFF85097BD171BF73602E9EA161967A
2,705,897 UART: [art] SIG.S = FF5818754BE023AD73E8FF86E90A2E73DC98DCEB5721516EE57C89A147931797F828FA0D1B2A1D08BE21DC8459C5CBB5
2,729,685 UART: mbox::rt_entry...
2,730,057 UART: ____ _ _ _ ____ _____
2,730,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,641 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,409 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,177 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,945 UART: |_|
2,734,257 UART:
2,841,563 UART: [rt] Runtime listening for mailbox commands...
2,842,325 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,440 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,534 UART:
2,842,550 UART: Running Caliptra ROM ...
2,842,958 UART:
2,843,100 UART: [state] CFI Enabled
2,846,097 UART: [state] LifecycleState = Production
2,846,705 UART: [state] DebugLocked = Yes
2,847,371 UART: [state] Starting the WD Timer 40000000 cycles
2,849,088 UART: [kat] SHA2-256
3,652,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,767 UART: [kat] ++
3,656,919 UART: [kat] sha1
3,661,249 UART: [kat] SHA2-256
3,663,189 UART: [kat] SHA2-384
3,665,942 UART: [kat] SHA2-512-ACC
3,667,843 UART: [kat] ECC-384
3,677,442 UART: [kat] HMAC-384Kdf
3,682,144 UART: [kat] LMS
3,930,456 UART: [kat] --
3,931,154 UART: [warm-reset] ++
3,932,109 UART: [warm-reset] --
3,932,940 UART: [state] Locking Datavault
3,933,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,306 UART: [state] Locking ICCM
3,934,854 UART: [exit] Launching FMC @ 0x40000130
3,940,183 UART:
3,940,199 UART: Running Caliptra FMC ...
3,940,607 UART:
3,940,750 UART: [state] CFI Enabled
3,942,205 UART: [aliasrt :skip pcr extension
3,942,678 UART: [art] Extend RT PCRs Done
3,943,106 UART: [art] Lock RT PCRs Done
3,944,231 UART: [art] Populate DV Done
3,952,501 UART: [fht] FMC Alias Private Key: 7
3,953,599 UART: [art] Derive CDI
3,953,879 UART: [art] Store in in slot 0x4
4,039,630 UART: [art] Derive Key Pair
4,039,990 UART: [art] Store priv key in slot 0x5
4,053,538 UART: [art] Derive Key Pair - Done
4,068,400 UART: [art] Signing Cert with AUTHO
4,068,880 UART: RITY.KEYID = 7
4,084,168 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,933 UART: [art] PUB.X = A7B3D19153300A253E38B705F49D1C9B39D81629B29D3D1EFF093735989E7C6B373AAC2E434751B27F848803D557B58D
4,091,687 UART: [art] PUB.Y = F525A3C66868CB023C34FE3F47C22158A9E6E9F3C361A45EA69C5CDC00340AD6763A16935228942F8EDEAD057CED5249
4,098,612 UART: [art] SIG.R = 6678BE0E17ED1C9A375E08C803F7D9CB6EC68FD1FC7045D51FF0712B434F4297ADFF85097BD171BF73602E9EA161967A
4,105,380 UART: [art] SIG.S = FF5818754BE023AD73E8FF86E90A2E73DC98DCEB5721516EE57C89A147931797F828FA0D1B2A1D08BE21DC8459C5CBB5
4,129,536 UART: mbox::rt_entry...
4,129,908 UART: ____ _ _ _ ____ _____
4,130,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,796 UART: |_|
4,134,108 UART:
4,422,908 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Production
85,546 UART: [state] DebugLocked = Yes
86,140 UART: [state] Starting the WD Timer 40000000 cycles
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,241 UART: [idev] ++
1,173,409 UART: [idev] CDI.KEYID = 6
1,173,770 UART: [idev] SUBJECT.KEYID = 7
1,174,195 UART: [idev] UDS.KEYID = 0
1,174,541 ready_for_fw is high
1,174,541 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,334 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,164 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,241,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,008 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,878 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,584 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,590 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,595 UART: [fwproc] Recv command 0x46574c44
1,282,328 UART: [fwproc] Recv'd Img size: 78456 bytes
2,193,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,944 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,057 >>> mbox cmd response: success
2,333,243 UART: [afmc] ++
2,333,411 UART: [afmc] CDI.KEYID = 6
2,333,774 UART: [afmc] SUBJECT.KEYID = 7
2,334,200 UART: [afmc] AUTHORITY.KEYID = 5
2,369,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,898 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,617 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,510 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,217 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,184 UART: [afmc] --
2,413,237 UART: [cold-reset] --
2,413,991 UART: [state] Locking Datavault
2,415,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,662 UART: [state] Locking ICCM
2,416,196 UART: [exit] Launching FMC @ 0x40000130
2,421,525 UART:
2,421,541 UART: Running Caliptra FMC ...
2,421,949 UART:
2,422,092 UART: [state] CFI Enabled
2,433,021 UART: [fht] FMC Alias Private Key: 7
2,541,132 UART: [art] Extend RT PCRs Done
2,541,560 UART: [art] Lock RT PCRs Done
2,542,838 UART: [art] Populate DV Done
2,550,968 UART: [fht] FMC Alias Private Key: 7
2,551,996 UART: [art] Derive CDI
2,552,276 UART: [art] Store in in slot 0x4
2,637,995 UART: [art] Derive Key Pair
2,638,355 UART: [art] Store priv key in slot 0x5
2,651,993 UART: [art] Derive Key Pair - Done
2,667,045 UART: [art] Signing Cert with AUTHO
2,667,525 UART: RITY.KEYID = 7
2,682,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,630 UART: [art] PUB.X = 94CF050E346BB0B70F370917BCD4E5065D7465AD67252C1FCD51FFFBE9397E02380F6C0D209EFAC851A76677F10C460A
2,690,378 UART: [art] PUB.Y = 1B371A25426E4F579F33E6DA4C4E4083BAD951EFC90CF60106210B8108EAB15A71A2AEAAE1CD98251E7A36C6C11D104C
2,697,325 UART: [art] SIG.R = C96CBD96263616DD3EEB701CD71383500EE233AC2D46B96D0A92BFA83E99A29A73E1055E08535C536C4A4A009EE02BA4
2,704,069 UART: [art] SIG.S = 1ECDF7DAD1CDD67B95FD80F10CB7B8475FC8B148AEACA4343BEC0484C1C93CBF39B16E6BB32E7BA5918806E9B299CA77
2,728,477 UART: mbox::rt_entry...
2,728,849 UART: ____ _ _ _ ____ _____
2,729,633 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,433 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,201 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,969 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,737 UART: |_|
2,733,049 UART:
2,839,961 UART: [rt] Runtime listening for mailbox commands...
2,840,723 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,838 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,932 UART:
2,840,948 UART: Running Caliptra ROM ...
2,841,356 UART:
2,841,498 UART: [state] CFI Enabled
2,844,721 UART: [state] LifecycleState = Production
2,845,329 UART: [state] DebugLocked = Yes
2,845,885 UART: [state] Starting the WD Timer 40000000 cycles
2,847,576 UART: [kat] SHA2-256
3,651,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,255 UART: [kat] ++
3,655,407 UART: [kat] sha1
3,659,625 UART: [kat] SHA2-256
3,661,565 UART: [kat] SHA2-384
3,664,288 UART: [kat] SHA2-512-ACC
3,666,189 UART: [kat] ECC-384
3,676,240 UART: [kat] HMAC-384Kdf
3,680,826 UART: [kat] LMS
3,929,138 UART: [kat] --
3,929,854 UART: [warm-reset] ++
3,930,767 UART: [warm-reset] --
3,931,716 UART: [state] Locking Datavault
3,932,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,024 UART: [state] Locking ICCM
3,933,552 UART: [exit] Launching FMC @ 0x40000130
3,938,881 UART:
3,938,897 UART: Running Caliptra FMC ...
3,939,305 UART:
3,939,448 UART: [state] CFI Enabled
3,940,977 UART: [aliasrt :skip pcr extension
3,941,450 UART: [art] Extend RT PCRs Done
3,941,878 UART: [art] Lock RT PCRs Done
3,943,217 UART: [art] Populate DV Done
3,951,371 UART: [fht] FMC Alias Private Key: 7
3,952,519 UART: [art] Derive CDI
3,952,799 UART: [art] Store in in slot 0x4
4,038,674 UART: [art] Derive Key Pair
4,039,034 UART: [art] Store priv key in slot 0x5
4,051,950 UART: [art] Derive Key Pair - Done
4,066,620 UART: [art] Signing Cert with AUTHO
4,067,100 UART: RITY.KEYID = 7
4,082,314 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,079 UART: [art] PUB.X = 94CF050E346BB0B70F370917BCD4E5065D7465AD67252C1FCD51FFFBE9397E02380F6C0D209EFAC851A76677F10C460A
4,089,827 UART: [art] PUB.Y = 1B371A25426E4F579F33E6DA4C4E4083BAD951EFC90CF60106210B8108EAB15A71A2AEAAE1CD98251E7A36C6C11D104C
4,096,774 UART: [art] SIG.R = C96CBD96263616DD3EEB701CD71383500EE233AC2D46B96D0A92BFA83E99A29A73E1055E08535C536C4A4A009EE02BA4
4,103,518 UART: [art] SIG.S = 1ECDF7DAD1CDD67B95FD80F10CB7B8475FC8B148AEACA4343BEC0484C1C93CBF39B16E6BB32E7BA5918806E9B299CA77
4,127,006 UART: mbox::rt_entry...
4,127,378 UART: ____ _ _ _ ____ _____
4,128,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,266 UART: |_|
4,131,578 UART:
4,413,318 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Production
85,691 UART: [state] DebugLocked = Yes
86,427 UART: [state] Starting the WD Timer 40000000 cycles
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,396 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,174,394 ready_for_fw is high
1,174,394 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,864 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,868 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,089 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,959 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,665 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,701 UART: [ldev] --
1,281,133 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,601 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,333,654 >>> mbox cmd response: success
2,334,860 UART: [afmc] ++
2,335,028 UART: [afmc] CDI.KEYID = 6
2,335,391 UART: [afmc] SUBJECT.KEYID = 7
2,335,817 UART: [afmc] AUTHORITY.KEYID = 5
2,371,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,513 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,232 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,125 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,832 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,625 UART: [afmc] --
2,414,576 UART: [cold-reset] --
2,415,550 UART: [state] Locking Datavault
2,416,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,385 UART: [state] Locking ICCM
2,418,041 UART: [exit] Launching FMC @ 0x40000130
2,423,370 UART:
2,423,386 UART: Running Caliptra FMC ...
2,423,794 UART:
2,423,848 UART: [state] CFI Enabled
2,434,501 UART: [fht] FMC Alias Private Key: 7
2,542,096 UART: [art] Extend RT PCRs Done
2,542,524 UART: [art] Lock RT PCRs Done
2,544,214 UART: [art] Populate DV Done
2,552,714 UART: [fht] FMC Alias Private Key: 7
2,553,772 UART: [art] Derive CDI
2,554,052 UART: [art] Store in in slot 0x4
2,640,027 UART: [art] Derive Key Pair
2,640,387 UART: [art] Store priv key in slot 0x5
2,653,561 UART: [art] Derive Key Pair - Done
2,668,488 UART: [art] Signing Cert with AUTHO
2,668,968 UART: RITY.KEYID = 7
2,684,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,679 UART: [art] PUB.X = 3AF91428521CBD3F6C10C5CA49ADBDCCF100B3EE271EE965415D1AC3F747432FC286464D52560851B7E6AFBB97B4DAF6
2,692,440 UART: [art] PUB.Y = CA5001F695A518156818597FA5D7856A56A00BF256EC167F738B91007BE6728A78055C8ECB3CB18C22A1FEA21A0AE0EF
2,699,362 UART: [art] SIG.R = 9DED508274789D1D4A1E528595C04CADAD4BE051E45ECCCAD78E4143A050F8B0A3BE21927F8DABA2F344CF82C341BD16
2,706,150 UART: [art] SIG.S = 79EC68496EC7699B575816B0691BA7555642E0998F2789D2AF15EDD29630E897E5078EB5CB23C4FEF5D154903C65C20D
2,729,959 UART: mbox::rt_entry...
2,730,331 UART: ____ _ _ _ ____ _____
2,731,115 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,683 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,451 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,219 UART: |_|
2,734,531 UART:
2,841,361 UART: [rt] Runtime listening for mailbox commands...
2,842,123 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,238 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,332 UART:
2,842,348 UART: Running Caliptra ROM ...
2,842,756 UART:
2,842,811 UART: [state] CFI Enabled
2,845,452 UART: [state] LifecycleState = Production
2,846,060 UART: [state] DebugLocked = Yes
2,846,782 UART: [state] Starting the WD Timer 40000000 cycles
2,848,245 UART: [kat] SHA2-256
3,651,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,924 UART: [kat] ++
3,656,076 UART: [kat] sha1
3,660,418 UART: [kat] SHA2-256
3,662,358 UART: [kat] SHA2-384
3,665,023 UART: [kat] SHA2-512-ACC
3,666,924 UART: [kat] ECC-384
3,676,931 UART: [kat] HMAC-384Kdf
3,681,717 UART: [kat] LMS
3,930,029 UART: [kat] --
3,931,003 UART: [warm-reset] ++
3,931,864 UART: [warm-reset] --
3,932,799 UART: [state] Locking Datavault
3,933,687 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,291 UART: [state] Locking ICCM
3,934,841 UART: [exit] Launching FMC @ 0x40000130
3,940,170 UART:
3,940,186 UART: Running Caliptra FMC ...
3,940,594 UART:
3,940,648 UART: [state] CFI Enabled
3,941,989 UART: [aliasrt :skip pcr extension
3,942,462 UART: [art] Extend RT PCRs Done
3,942,890 UART: [art] Lock RT PCRs Done
3,943,783 UART: [art] Populate DV Done
3,952,085 UART: [fht] FMC Alias Private Key: 7
3,953,123 UART: [art] Derive CDI
3,953,403 UART: [art] Store in in slot 0x4
4,039,160 UART: [art] Derive Key Pair
4,039,520 UART: [art] Store priv key in slot 0x5
4,053,290 UART: [art] Derive Key Pair - Done
4,067,825 UART: [art] Signing Cert with AUTHO
4,068,305 UART: RITY.KEYID = 7
4,083,561 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,326 UART: [art] PUB.X = 3AF91428521CBD3F6C10C5CA49ADBDCCF100B3EE271EE965415D1AC3F747432FC286464D52560851B7E6AFBB97B4DAF6
4,091,087 UART: [art] PUB.Y = CA5001F695A518156818597FA5D7856A56A00BF256EC167F738B91007BE6728A78055C8ECB3CB18C22A1FEA21A0AE0EF
4,098,009 UART: [art] SIG.R = 9DED508274789D1D4A1E528595C04CADAD4BE051E45ECCCAD78E4143A050F8B0A3BE21927F8DABA2F344CF82C341BD16
4,104,797 UART: [art] SIG.S = 79EC68496EC7699B575816B0691BA7555642E0998F2789D2AF15EDD29630E897E5078EB5CB23C4FEF5D154903C65C20D
4,128,548 UART: mbox::rt_entry...
4,128,920 UART: ____ _ _ _ ____ _____
4,129,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,040 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,808 UART: |_|
4,133,120 UART:
4,416,774 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Production
85,829 UART: [state] DebugLocked = Yes
86,449 UART: [state] Starting the WD Timer 40000000 cycles
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,780 UART: [kat] HMAC-384Kdf
921,364 UART: [kat] LMS
1,169,676 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,754 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,309 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,393 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,216,180 UART: [ldev] Erasing FE.KEYID = 1
1,242,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,205 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,075 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,781 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,837 UART: [ldev] --
1,281,245 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 78456 bytes
2,193,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,951 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,898 >>> mbox cmd response: success
2,334,154 UART: [afmc] ++
2,334,322 UART: [afmc] CDI.KEYID = 6
2,334,685 UART: [afmc] SUBJECT.KEYID = 7
2,335,111 UART: [afmc] AUTHORITY.KEYID = 5
2,370,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,255 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,974 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,867 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,574 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,291 UART: [afmc] --
2,414,252 UART: [cold-reset] --
2,414,936 UART: [state] Locking Datavault
2,415,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,439 UART: [state] Locking ICCM
2,417,069 UART: [exit] Launching FMC @ 0x40000130
2,422,398 UART:
2,422,414 UART: Running Caliptra FMC ...
2,422,822 UART:
2,422,876 UART: [state] CFI Enabled
2,433,487 UART: [fht] FMC Alias Private Key: 7
2,541,020 UART: [art] Extend RT PCRs Done
2,541,448 UART: [art] Lock RT PCRs Done
2,543,026 UART: [art] Populate DV Done
2,551,198 UART: [fht] FMC Alias Private Key: 7
2,552,332 UART: [art] Derive CDI
2,552,612 UART: [art] Store in in slot 0x4
2,638,173 UART: [art] Derive Key Pair
2,638,533 UART: [art] Store priv key in slot 0x5
2,651,945 UART: [art] Derive Key Pair - Done
2,666,767 UART: [art] Signing Cert with AUTHO
2,667,247 UART: RITY.KEYID = 7
2,682,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,308 UART: [art] PUB.X = 89B1DC8B91437E2BC3AA70C916108A292441B60415B8D7B27C3F7A37648E0F57FB14FD039901BF4749670EFBB9B71E7E
2,690,067 UART: [art] PUB.Y = 9D04ADDB1F0500F712796A1AE99D3A97D1DA04D8A890E49B036592243AE7C68446D28E4704D45EB866075FACC8E728F0
2,696,981 UART: [art] SIG.R = 6356F1A7985822712260FD4DD03A375D8D7DC49FD9B68C8B517B21128C376BC0C014B67E6BC8623B5685ED3A96C41697
2,703,749 UART: [art] SIG.S = 3EA7A9D0B714ECAB162EC92A2133B3CB71CD64F99B8402D48FD79D281B64CCF65BADBAE13246A9FA14796D594D5334EC
2,727,857 UART: mbox::rt_entry...
2,728,229 UART: ____ _ _ _ ____ _____
2,729,013 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,813 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,581 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,117 UART: |_|
2,732,429 UART:
2,838,430 UART: [rt] Runtime listening for mailbox commands...
2,839,192 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,839,307 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,401 UART:
2,839,417 UART: Running Caliptra ROM ...
2,839,825 UART:
2,839,880 UART: [state] CFI Enabled
2,842,417 UART: [state] LifecycleState = Production
2,843,025 UART: [state] DebugLocked = Yes
2,843,591 UART: [state] Starting the WD Timer 40000000 cycles
2,845,072 UART: [kat] SHA2-256
3,648,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,751 UART: [kat] ++
3,652,903 UART: [kat] sha1
3,657,179 UART: [kat] SHA2-256
3,659,119 UART: [kat] SHA2-384
3,662,024 UART: [kat] SHA2-512-ACC
3,663,925 UART: [kat] ECC-384
3,673,424 UART: [kat] HMAC-384Kdf
3,678,028 UART: [kat] LMS
3,926,340 UART: [kat] --
3,927,178 UART: [warm-reset] ++
3,927,955 UART: [warm-reset] --
3,928,854 UART: [state] Locking Datavault
3,929,596 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,200 UART: [state] Locking ICCM
3,930,722 UART: [exit] Launching FMC @ 0x40000130
3,936,051 UART:
3,936,067 UART: Running Caliptra FMC ...
3,936,475 UART:
3,936,529 UART: [state] CFI Enabled
3,937,866 UART: [aliasrt :skip pcr extension
3,938,339 UART: [art] Extend RT PCRs Done
3,938,767 UART: [art] Lock RT PCRs Done
3,940,196 UART: [art] Populate DV Done
3,948,654 UART: [fht] FMC Alias Private Key: 7
3,949,598 UART: [art] Derive CDI
3,949,878 UART: [art] Store in in slot 0x4
4,035,131 UART: [art] Derive Key Pair
4,035,491 UART: [art] Store priv key in slot 0x5
4,048,913 UART: [art] Derive Key Pair - Done
4,063,741 UART: [art] Signing Cert with AUTHO
4,064,221 UART: RITY.KEYID = 7
4,079,595 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,360 UART: [art] PUB.X = 89B1DC8B91437E2BC3AA70C916108A292441B60415B8D7B27C3F7A37648E0F57FB14FD039901BF4749670EFBB9B71E7E
4,087,119 UART: [art] PUB.Y = 9D04ADDB1F0500F712796A1AE99D3A97D1DA04D8A890E49B036592243AE7C68446D28E4704D45EB866075FACC8E728F0
4,094,033 UART: [art] SIG.R = 6356F1A7985822712260FD4DD03A375D8D7DC49FD9B68C8B517B21128C376BC0C014B67E6BC8623B5685ED3A96C41697
4,100,801 UART: [art] SIG.S = 3EA7A9D0B714ECAB162EC92A2133B3CB71CD64F99B8402D48FD79D281B64CCF65BADBAE13246A9FA14796D594D5334EC
4,124,717 UART: mbox::rt_entry...
4,125,089 UART: ____ _ _ _ ____ _____
4,125,873 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,673 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,209 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,977 UART: |_|
4,129,289 UART:
4,409,254 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Production
85,920 UART: [state] DebugLocked = Yes
86,572 UART: [state] Starting the WD Timer 40000000 cycles
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,957 UART: [idev] ++
1,174,125 UART: [idev] CDI.KEYID = 6
1,174,486 UART: [idev] SUBJECT.KEYID = 7
1,174,911 UART: [idev] UDS.KEYID = 0
1,175,257 ready_for_fw is high
1,175,257 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,697 UART: [ldev] SUBJECT.KEYID = 5
1,211,124 UART: [ldev] AUTHORITY.KEYID = 7
1,211,587 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,578 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,448 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,154 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,270 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,421 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 78456 bytes
2,196,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,116 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,335,019 >>> mbox cmd response: success
2,336,261 UART: [afmc] ++
2,336,429 UART: [afmc] CDI.KEYID = 6
2,336,792 UART: [afmc] SUBJECT.KEYID = 7
2,337,218 UART: [afmc] AUTHORITY.KEYID = 5
2,372,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,646 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,365 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,258 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,965 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,694 UART: [afmc] --
2,415,825 UART: [cold-reset] --
2,416,607 UART: [state] Locking Datavault
2,417,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,304 UART: [state] Locking ICCM
2,418,966 UART: [exit] Launching FMC @ 0x40000130
2,424,295 UART:
2,424,311 UART: Running Caliptra FMC ...
2,424,719 UART:
2,424,862 UART: [state] CFI Enabled
2,435,715 UART: [fht] FMC Alias Private Key: 7
2,543,354 UART: [art] Extend RT PCRs Done
2,543,782 UART: [art] Lock RT PCRs Done
2,545,308 UART: [art] Populate DV Done
2,553,904 UART: [fht] FMC Alias Private Key: 7
2,555,002 UART: [art] Derive CDI
2,555,282 UART: [art] Store in in slot 0x4
2,640,805 UART: [art] Derive Key Pair
2,641,165 UART: [art] Store priv key in slot 0x5
2,654,879 UART: [art] Derive Key Pair - Done
2,669,715 UART: [art] Signing Cert with AUTHO
2,670,195 UART: RITY.KEYID = 7
2,685,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,354 UART: [art] PUB.X = F5FF1FEABFB78B4D6D06C152EDA667963AAF79D180595E74ACF5CBEE95D9E1FF94EAE7784024B602F0120C3808568AA5
2,693,130 UART: [art] PUB.Y = 9A3E292782D000284C7679B4F606DC4ECDA8E96B82F6D59624186103152EC19EDB385CA2F676A2C2DC926CD4F1D7816A
2,700,056 UART: [art] SIG.R = 3BD545B0CC34585C6201E3E7D0923D837242B72D80FA559A54DC8627C726521719D2CE8DB08282566B3BDA04077193AE
2,706,813 UART: [art] SIG.S = A09B15B9C947BE7A083689F805B778DE8228B91AFCD81B0BB06CAE43B71D91AB33DD46746FEDBEA03DACE0146BFFE46D
2,730,241 UART: mbox::rt_entry...
2,730,613 UART: ____ _ _ _ ____ _____
2,731,397 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,197 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,733 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,501 UART: |_|
2,734,813 UART:
2,840,783 UART: [rt] Runtime listening for mailbox commands...
2,841,545 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,660 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,754 UART:
2,841,770 UART: Running Caliptra ROM ...
2,842,178 UART:
2,842,320 UART: [state] CFI Enabled
2,845,557 UART: [state] LifecycleState = Production
2,846,165 UART: [state] DebugLocked = Yes
2,846,751 UART: [state] Starting the WD Timer 40000000 cycles
2,848,366 UART: [kat] SHA2-256
3,651,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,045 UART: [kat] ++
3,656,197 UART: [kat] sha1
3,660,267 UART: [kat] SHA2-256
3,662,207 UART: [kat] SHA2-384
3,664,980 UART: [kat] SHA2-512-ACC
3,666,881 UART: [kat] ECC-384
3,676,664 UART: [kat] HMAC-384Kdf
3,681,276 UART: [kat] LMS
3,929,588 UART: [kat] --
3,930,384 UART: [warm-reset] ++
3,931,479 UART: [warm-reset] --
3,932,212 UART: [state] Locking Datavault
3,933,160 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,764 UART: [state] Locking ICCM
3,934,190 UART: [exit] Launching FMC @ 0x40000130
3,939,519 UART:
3,939,535 UART: Running Caliptra FMC ...
3,939,943 UART:
3,940,086 UART: [state] CFI Enabled
3,941,531 UART: [aliasrt :skip pcr extension
3,942,004 UART: [art] Extend RT PCRs Done
3,942,432 UART: [art] Lock RT PCRs Done
3,943,691 UART: [art] Populate DV Done
3,951,863 UART: [fht] FMC Alias Private Key: 7
3,952,817 UART: [art] Derive CDI
3,953,097 UART: [art] Store in in slot 0x4
4,039,178 UART: [art] Derive Key Pair
4,039,538 UART: [art] Store priv key in slot 0x5
4,052,956 UART: [art] Derive Key Pair - Done
4,067,962 UART: [art] Signing Cert with AUTHO
4,068,442 UART: RITY.KEYID = 7
4,083,732 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,497 UART: [art] PUB.X = F5FF1FEABFB78B4D6D06C152EDA667963AAF79D180595E74ACF5CBEE95D9E1FF94EAE7784024B602F0120C3808568AA5
4,091,273 UART: [art] PUB.Y = 9A3E292782D000284C7679B4F606DC4ECDA8E96B82F6D59624186103152EC19EDB385CA2F676A2C2DC926CD4F1D7816A
4,098,199 UART: [art] SIG.R = 3BD545B0CC34585C6201E3E7D0923D837242B72D80FA559A54DC8627C726521719D2CE8DB08282566B3BDA04077193AE
4,104,956 UART: [art] SIG.S = A09B15B9C947BE7A083689F805B778DE8228B91AFCD81B0BB06CAE43B71D91AB33DD46746FEDBEA03DACE0146BFFE46D
4,128,290 UART: mbox::rt_entry...
4,128,662 UART: ____ _ _ _ ____ _____
4,129,446 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,246 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,782 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,550 UART: |_|
4,132,862 UART:
4,410,046 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Production
85,936 UART: [state] DebugLocked = Yes
86,512 UART: [state] Starting the WD Timer 40000000 cycles
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
905,119 UART: [kat] SHA2-512-ACC
907,020 UART: [kat] ECC-384
916,891 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,722 UART: [cold-reset] ++
1,171,107 UART: [fht] FHT @ 0x50003400
1,173,853 UART: [idev] ++
1,174,021 UART: [idev] CDI.KEYID = 6
1,174,382 UART: [idev] SUBJECT.KEYID = 7
1,174,807 UART: [idev] UDS.KEYID = 0
1,175,153 ready_for_fw is high
1,175,153 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,200,733 UART: [idev] Sha1 KeyId Algorithm
1,209,628 UART: [idev] --
1,210,685 UART: [ldev] ++
1,210,853 UART: [ldev] CDI.KEYID = 6
1,211,217 UART: [ldev] SUBJECT.KEYID = 5
1,211,644 UART: [ldev] AUTHORITY.KEYID = 7
1,212,107 UART: [ldev] FE.KEYID = 1
1,217,447 UART: [ldev] Erasing FE.KEYID = 1
1,244,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,554 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,248 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,118 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,824 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,794 UART: [ldev] --
1,283,082 UART: [fwproc] Wait for Commands...
1,283,809 UART: [fwproc] Recv command 0x46574c44
1,284,542 UART: [fwproc] Recv'd Img size: 78456 bytes
2,196,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,224,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,253,612 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,335,575 >>> mbox cmd response: success
2,336,681 UART: [afmc] ++
2,336,849 UART: [afmc] CDI.KEYID = 6
2,337,212 UART: [afmc] SUBJECT.KEYID = 7
2,337,638 UART: [afmc] AUTHORITY.KEYID = 5
2,373,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,390,546 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,265 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,158 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,865 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,780 UART: [afmc] --
2,416,895 UART: [cold-reset] --
2,417,543 UART: [state] Locking Datavault
2,418,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,414 UART: [state] Locking ICCM
2,419,976 UART: [exit] Launching FMC @ 0x40000130
2,425,305 UART:
2,425,321 UART: Running Caliptra FMC ...
2,425,729 UART:
2,425,872 UART: [state] CFI Enabled
2,436,441 UART: [fht] FMC Alias Private Key: 7
2,544,488 UART: [art] Extend RT PCRs Done
2,544,916 UART: [art] Lock RT PCRs Done
2,546,460 UART: [art] Populate DV Done
2,554,866 UART: [fht] FMC Alias Private Key: 7
2,555,820 UART: [art] Derive CDI
2,556,100 UART: [art] Store in in slot 0x4
2,641,895 UART: [art] Derive Key Pair
2,642,255 UART: [art] Store priv key in slot 0x5
2,655,259 UART: [art] Derive Key Pair - Done
2,669,601 UART: [art] Signing Cert with AUTHO
2,670,081 UART: RITY.KEYID = 7
2,685,441 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,206 UART: [art] PUB.X = AB1FE38EF85605CB11EDD6F2DB2D942822B2FD5F3DAD46D94A0C4280E47BC6FDDA13357D5527FCBF441754B33F316B73
2,692,988 UART: [art] PUB.Y = 604161FE9A227855B336A04FBADC29EAC574CBF9006D5E04DFF8F8AF992ED7224FA7225013228B4129B8EE2F59C3FE57
2,699,923 UART: [art] SIG.R = 6B6BD4FEF7A0F2C114B10193C9201AABCA16992A2BE0F17AC80E4BF11BE7407D438014084F1612FFCFA273FBFF96A107
2,706,697 UART: [art] SIG.S = AD8F0ECB722FDDC8E1B54FED2E4777BDA4FE34EDC802EC6B68D3D70724DBEB54CC0422BB0B1917AEE535A213CA51A9C4
2,730,043 UART: mbox::rt_entry...
2,730,415 UART: ____ _ _ _ ____ _____
2,731,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,303 UART: |_|
2,734,615 UART:
2,842,877 UART: [rt] Runtime listening for mailbox commands...
2,843,639 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,843,754 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,848 UART:
2,843,864 UART: Running Caliptra ROM ...
2,844,272 UART:
2,844,414 UART: [state] CFI Enabled
2,847,437 UART: [state] LifecycleState = Production
2,848,045 UART: [state] DebugLocked = Yes
2,848,705 UART: [state] Starting the WD Timer 40000000 cycles
2,850,230 UART: [kat] SHA2-256
3,653,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,909 UART: [kat] ++
3,658,061 UART: [kat] sha1
3,662,329 UART: [kat] SHA2-256
3,664,269 UART: [kat] SHA2-384
3,667,020 UART: [kat] SHA2-512-ACC
3,668,921 UART: [kat] ECC-384
3,678,768 UART: [kat] HMAC-384Kdf
3,683,464 UART: [kat] LMS
3,931,776 UART: [kat] --
3,932,870 UART: [warm-reset] ++
3,933,861 UART: [warm-reset] --
3,934,664 UART: [state] Locking Datavault
3,935,556 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,160 UART: [state] Locking ICCM
3,936,644 UART: [exit] Launching FMC @ 0x40000130
3,941,973 UART:
3,941,989 UART: Running Caliptra FMC ...
3,942,397 UART:
3,942,540 UART: [state] CFI Enabled
3,943,973 UART: [aliasrt :skip pcr extension
3,944,446 UART: [art] Extend RT PCRs Done
3,944,874 UART: [art] Lock RT PCRs Done
3,946,061 UART: [art] Populate DV Done
3,954,447 UART: [fht] FMC Alias Private Key: 7
3,955,473 UART: [art] Derive CDI
3,955,753 UART: [art] Store in in slot 0x4
4,041,372 UART: [art] Derive Key Pair
4,041,732 UART: [art] Store priv key in slot 0x5
4,054,442 UART: [art] Derive Key Pair - Done
4,069,420 UART: [art] Signing Cert with AUTHO
4,069,900 UART: RITY.KEYID = 7
4,085,376 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,141 UART: [art] PUB.X = AB1FE38EF85605CB11EDD6F2DB2D942822B2FD5F3DAD46D94A0C4280E47BC6FDDA13357D5527FCBF441754B33F316B73
4,092,923 UART: [art] PUB.Y = 604161FE9A227855B336A04FBADC29EAC574CBF9006D5E04DFF8F8AF992ED7224FA7225013228B4129B8EE2F59C3FE57
4,099,858 UART: [art] SIG.R = 6B6BD4FEF7A0F2C114B10193C9201AABCA16992A2BE0F17AC80E4BF11BE7407D438014084F1612FFCFA273FBFF96A107
4,106,632 UART: [art] SIG.S = AD8F0ECB722FDDC8E1B54FED2E4777BDA4FE34EDC802EC6B68D3D70724DBEB54CC0422BB0B1917AEE535A213CA51A9C4
4,130,736 UART: mbox::rt_entry...
4,131,108 UART: ____ _ _ _ ____ _____
4,131,892 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,692 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,133,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,134,228 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,996 UART: |_|
4,135,308 UART:
4,414,764 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
191,579 UART:
191,947 UART: Running Caliptra ROM ...
193,015 UART:
193,185 UART: [state] CFI Enabled
262,273 UART: [state] LifecycleState = Production
264,507 UART: [state] DebugLocked = Yes
266,636 UART: [state] Starting the WD Timer 40000000 cycles
272,836 UART: [kat] SHA2-256
454,844 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,318 UART: [kat] ++
466,923 UART: [kat] sha1
478,628 UART: [kat] SHA2-256
481,642 UART: [kat] SHA2-384
487,419 UART: [kat] SHA2-512-ACC
490,070 UART: [kat] ECC-384
3,777,961 UART: [kat] HMAC-384Kdf
3,803,282 UART: [kat] LMS
4,876,423 UART: [kat] --
4,880,862 UART: [cold-reset] ++
4,882,796 UART: [fht] FHT @ 0x50003400
4,892,647 UART: [idev] ++
4,893,350 UART: [idev] CDI.KEYID = 6
4,894,519 UART: [idev] SUBJECT.KEYID = 7
4,895,690 UART: [idev] UDS.KEYID = 0
4,896,587 ready_for_fw is high
4,896,768 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,039,860 UART: [idev] Erasing UDS.KEYID = 0
8,240,118 UART: [idev] Sha1 KeyId Algorithm
8,261,038 UART: [idev] --
8,266,171 UART: [ldev] ++
8,266,738 UART: [ldev] CDI.KEYID = 6
8,267,900 UART: [ldev] SUBJECT.KEYID = 5
8,269,108 UART: [ldev] AUTHORITY.KEYID = 7
8,270,204 UART: [ldev] FE.KEYID = 1
8,298,811 UART: [ldev] Erasing FE.KEYID = 1
11,632,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,014 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,961,329 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,977,347 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,993,461 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,012,886 UART: [ldev] --
14,017,989 UART: [fwproc] Wait for Commands...
14,020,141 UART: [fwproc] Recv command 0x46574c44
14,022,453 UART: [fwproc] Recv'd Img size: 113760 bytes
18,121,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,201,613 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,270,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,587,008 >>> mbox cmd response: success
18,590,980 UART: [afmc] ++
18,591,601 UART: [afmc] CDI.KEYID = 6
18,592,742 UART: [afmc] SUBJECT.KEYID = 7
18,593,928 UART: [afmc] AUTHORITY.KEYID = 5
21,972,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,268,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,270,671 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,286,700 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,302,815 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,318,826 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,342,374 UART: [afmc] --
24,345,568 UART: [cold-reset] --
24,348,839 UART: [state] Locking Datavault
24,356,195 UART: [state] Locking PCR0, PCR1 and PCR31
24,357,845 UART: [state] Locking ICCM
24,360,458 UART: [exit] Launching FMC @ 0x40000130
24,369,163 UART:
24,369,412 UART: Running Caliptra FMC ...
24,370,438 UART:
24,370,603 UART: [state] CFI Enabled
24,427,947 UART: [fht] FMC Alias Private Key: 7
26,765,244 UART: [art] Extend RT PCRs Done
26,766,474 UART: [art] Lock RT PCRs Done
26,768,263 UART: [art] Populate DV Done
26,773,843 UART: [fht] FMC Alias Private Key: 7
26,775,486 UART: [art] Derive CDI
26,776,303 UART: [art] Store in in slot 0x4
26,836,484 UART: [art] Derive Key Pair
26,837,484 UART: [art] Store priv key in slot 0x5
30,130,682 UART: [art] Derive Key Pair - Done
30,144,067 UART: [art] Signing Cert with AUTHO
30,145,371 UART: RITY.KEYID = 7
32,432,950 UART: [art] Erasing AUTHORITY.KEYID = 7
32,434,458 UART: [art] PUB.X = 606558CA01DC48DEE7EDA9D941B056C90D2D894A93545D17F06E09E85E5B8A8346501842C1882A8051C650821175E461
32,441,664 UART: [art] PUB.Y = 4507541D8C8B9B53941A43167CEC6F5844416D01582898B52D85175426C0E5222106A3C1077383884F884ACC6D45431C
32,448,911 UART: [art] SIG.R = B0274B5D7FF7E04B4AE31B2E925382B885D7E196CA68F6E2729BA8A5831C82F12159FA8842FBD3666B357B6375689416
32,456,278 UART: [art] SIG.S = 55ECD1DB4BA3B00670E78F4B53D59125B3770FD2D7BC7834686B19E1F44B9FACFFC1386B7D2D8418B1212287C21B37D4
33,761,862 UART: Caliptra RT
33,762,570 UART: [state] CFI Enabled
33,923,430 UART: [rt] RT listening for mailbox commands...
Initializing fuses
997 UART:
1,147 UART: Running Caliptra ROM ...
2,192 UART:
2,338 UART: [state] CFI Enabled
61,004 UART: [state] LifecycleState = Production
62,719 UART: [state] DebugLocked = Yes
65,112 UART: [state] Starting the WD Timer 40000000 cycles
71,142 UART: [kat] SHA2-256
253,101 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
264,642 UART: [kat] ++
265,244 UART: [kat] sha1
275,916 UART: [kat] SHA2-256
278,934 UART: [kat] SHA2-384
284,649 UART: [kat] SHA2-512-ACC
287,264 UART: [kat] ECC-384
3,579,168 UART: [kat] HMAC-384Kdf
3,603,670 UART: [kat] LMS
4,676,828 UART: [kat] --
4,681,146 UART: [warm-reset] ++
4,686,861 UART: [warm-reset] --
4,689,381 UART: [state] Locking Datavault
4,692,801 UART: [state] Locking PCR0, PCR1 and PCR31
4,694,949 UART: [state] Locking ICCM
4,696,298 UART: [exit] Launching FMC @ 0x40000130
4,704,977 UART:
4,705,213 UART: Running Caliptra FMC ...
4,706,334 UART:
4,706,498 UART: [state] CFI Enabled
4,767,488 UART: [aliasrt :skip pcr extension
4,768,777 UART: [art] Extend RT PCRs Done
4,769,925 UART: [art] Lock RT PCRs Done
4,771,161 UART: [art] Populate DV Done
4,776,898 UART: [fht] FMC Alias Private Key: 7
4,778,492 UART: [art] Derive CDI
4,779,232 UART: [art] Store in in slot 0x4
4,836,486 UART: [art] Derive Key Pair
4,837,686 UART: [art] Store priv key in slot 0x5
8,131,208 UART: [art] Derive Key Pair - Done
8,144,480 UART: [art] Signing Cert with AUTHO
8,145,783 UART: RITY.KEYID = 7
10,432,726 UART: [art] Erasing AUTHORITY.KEYID = 7
10,434,225 UART: [art] PUB.X = 606558CA01DC48DEE7EDA9D941B056C90D2D894A93545D17F06E09E85E5B8A8346501842C1882A8051C650821175E461
10,441,489 UART: [art] PUB.Y = 4507541D8C8B9B53941A43167CEC6F5844416D01582898B52D85175426C0E5222106A3C1077383884F884ACC6D45431C
10,448,676 UART: [art] SIG.R = B0274B5D7FF7E04B4AE31B2E925382B885D7E196CA68F6E2729BA8A5831C82F12159FA8842FBD3666B357B6375689416
10,456,012 UART: [art] SIG.S = 55ECD1DB4BA3B00670E78F4B53D59125B3770FD2D7BC7834686B19E1F44B9FACFFC1386B7D2D8418B1212287C21B37D4
11,761,631 UART: Caliptra RT
11,762,332 UART: [state] CFI Enabled
12,092,204 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
191,652 UART:
192,054 UART: Running Caliptra ROM ...
193,232 UART:
193,390 UART: [state] CFI Enabled
264,206 UART: [state] LifecycleState = Production
266,431 UART: [state] DebugLocked = Yes
268,145 UART: [state] Starting the WD Timer 40000000 cycles
273,216 UART: [kat] SHA2-256
455,174 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,724 UART: [kat] ++
467,257 UART: [kat] sha1
479,253 UART: [kat] SHA2-256
482,267 UART: [kat] SHA2-384
487,977 UART: [kat] SHA2-512-ACC
490,592 UART: [kat] ECC-384
3,776,040 UART: [kat] HMAC-384Kdf
3,803,349 UART: [kat] LMS
4,876,468 UART: [kat] --
4,878,693 UART: [cold-reset] ++
4,880,269 UART: [fht] FHT @ 0x50003400
4,891,763 UART: [idev] ++
4,892,517 UART: [idev] CDI.KEYID = 6
4,893,699 UART: [idev] SUBJECT.KEYID = 7
4,894,807 UART: [idev] UDS.KEYID = 0
4,895,743 ready_for_fw is high
4,895,954 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,038,981 UART: [idev] Erasing UDS.KEYID = 0
8,243,146 UART: [idev] Sha1 KeyId Algorithm
8,264,647 UART: [idev] --
8,268,240 UART: [ldev] ++
8,268,818 UART: [ldev] CDI.KEYID = 6
8,270,056 UART: [ldev] SUBJECT.KEYID = 5
8,271,176 UART: [ldev] AUTHORITY.KEYID = 7
8,272,353 UART: [ldev] FE.KEYID = 1
8,318,551 UART: [ldev] Erasing FE.KEYID = 1
11,652,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,485 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,981,849 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,997,823 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,013,995 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,033,541 UART: [ldev] --
14,038,270 UART: [fwproc] Wait for Commands...
14,040,796 UART: [fwproc] Recv command 0x46574c44
14,043,112 UART: [fwproc] Recv'd Img size: 113760 bytes
18,147,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,226,140 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,294,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,610,237 >>> mbox cmd response: success
18,614,328 UART: [afmc] ++
18,614,963 UART: [afmc] CDI.KEYID = 6
18,616,019 UART: [afmc] SUBJECT.KEYID = 7
18,617,247 UART: [afmc] AUTHORITY.KEYID = 5
21,991,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,288,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,290,444 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,306,445 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,322,537 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,338,620 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,362,612 UART: [afmc] --
24,366,315 UART: [cold-reset] --
24,370,771 UART: [state] Locking Datavault
24,375,693 UART: [state] Locking PCR0, PCR1 and PCR31
24,377,337 UART: [state] Locking ICCM
24,380,402 UART: [exit] Launching FMC @ 0x40000130
24,389,076 UART:
24,389,339 UART: Running Caliptra FMC ...
24,390,442 UART:
24,390,601 UART: [state] CFI Enabled
24,446,693 UART: [fht] FMC Alias Private Key: 7
26,784,659 UART: [art] Extend RT PCRs Done
26,785,880 UART: [art] Lock RT PCRs Done
26,787,588 UART: [art] Populate DV Done
26,792,890 UART: [fht] FMC Alias Private Key: 7
26,794,492 UART: [art] Derive CDI
26,795,260 UART: [art] Store in in slot 0x4
26,855,422 UART: [art] Derive Key Pair
26,856,462 UART: [art] Store priv key in slot 0x5
30,149,332 UART: [art] Derive Key Pair - Done
30,162,284 UART: [art] Signing Cert with AUTHO
30,163,581 UART: RITY.KEYID = 7
32,451,395 UART: [art] Erasing AUTHORITY.KEYID = 7
32,453,005 UART: [art] PUB.X = CD18A224238432C9CF802A48BB50AA04C856B5688D77EAC7FC37782B5F09FC3F2A963730534C71A365CE6381A59BEBF2
32,460,176 UART: [art] PUB.Y = E38658DEC4B896D073268717FA52913DAD6497D5A6310D8603BFDD5F151762B0F9317B42880B60D420FBEA751305033E
32,467,426 UART: [art] SIG.R = 4F6FB25F7F834E508C780F1FE2103282F8B3F0D61BCB5BFE140C974BE552B69E3B3741899497969D72AEDB2B530B8FFA
32,474,777 UART: [art] SIG.S = DE417B6FE44D862B5363E163B6CFE4D94B08F2204536D9188A3329FE2217DEEDC0CC2856D379527CB2EA783AB47C4331
33,780,039 UART: Caliptra RT
33,780,770 UART: [state] CFI Enabled
33,940,544 UART: [rt] RT listening for mailbox commands...
Initializing fuses
996 UART:
1,148 UART: Running Caliptra ROM ...
2,194 UART:
2,342 UART: [state] CFI Enabled
67,189 UART: [state] LifecycleState = Production
68,959 UART: [state] DebugLocked = Yes
70,944 UART: [state] Starting the WD Timer 40000000 cycles
75,528 UART: [kat] SHA2-256
257,502 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
268,969 UART: [kat] ++
269,471 UART: [kat] sha1
280,296 UART: [kat] SHA2-256
283,309 UART: [kat] SHA2-384
288,425 UART: [kat] SHA2-512-ACC
291,041 UART: [kat] ECC-384
3,575,294 UART: [kat] HMAC-384Kdf
3,602,869 UART: [kat] LMS
4,676,056 UART: [kat] --
4,679,253 UART: [warm-reset] ++
4,681,835 UART: [warm-reset] --
4,687,432 UART: [state] Locking Datavault
4,691,329 UART: [state] Locking PCR0, PCR1 and PCR31
4,693,516 UART: [state] Locking ICCM
4,696,119 UART: [exit] Launching FMC @ 0x40000130
4,704,907 UART:
4,705,183 UART: Running Caliptra FMC ...
4,706,300 UART:
4,706,459 UART: [state] CFI Enabled
4,767,634 UART: [aliasrt :skip pcr extension
4,768,886 UART: [art] Extend RT PCRs Done
4,770,024 UART: [art] Lock RT PCRs Done
4,771,312 UART: [art] Populate DV Done
4,776,883 UART: [fht] FMC Alias Private Key: 7
4,778,471 UART: [art] Derive CDI
4,779,236 UART: [art] Store in in slot 0x4
4,836,165 UART: [art] Derive Key Pair
4,837,206 UART: [art] Store priv key in slot 0x5
8,129,884 UART: [art] Derive Key Pair - Done
8,143,052 UART: [art] Signing Cert with AUTHO
8,144,385 UART: RITY.KEYID = 7
10,430,507 UART: [art] Erasing AUTHORITY.KEYID = 7
10,432,011 UART: [art] PUB.X = CD18A224238432C9CF802A48BB50AA04C856B5688D77EAC7FC37782B5F09FC3F2A963730534C71A365CE6381A59BEBF2
10,439,267 UART: [art] PUB.Y = E38658DEC4B896D073268717FA52913DAD6497D5A6310D8603BFDD5F151762B0F9317B42880B60D420FBEA751305033E
10,446,465 UART: [art] SIG.R = 4F6FB25F7F834E508C780F1FE2103282F8B3F0D61BCB5BFE140C974BE552B69E3B3741899497969D72AEDB2B530B8FFA
10,453,865 UART: [art] SIG.S = DE417B6FE44D862B5363E163B6CFE4D94B08F2204536D9188A3329FE2217DEEDC0CC2856D379527CB2EA783AB47C4331
11,758,516 UART: Caliptra RT
11,759,236 UART: [state] CFI Enabled
12,087,974 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
192,368 UART:
192,734 UART: Running Caliptra ROM ...
193,852 UART:
603,669 UART: [state] CFI Enabled
618,048 UART: [state] LifecycleState = Production
620,227 UART: [state] DebugLocked = Yes
622,081 UART: [state] Starting the WD Timer 40000000 cycles
628,011 UART: [kat] SHA2-256
810,025 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,563 UART: [kat] ++
822,075 UART: [kat] sha1
832,359 UART: [kat] SHA2-256
835,363 UART: [kat] SHA2-384
840,711 UART: [kat] SHA2-512-ACC
843,309 UART: [kat] ECC-384
4,099,522 UART: [kat] HMAC-384Kdf
4,110,049 UART: [kat] LMS
5,183,190 UART: [kat] --
5,186,644 UART: [cold-reset] ++
5,188,861 UART: [fht] FHT @ 0x50003400
5,199,617 UART: [idev] ++
5,200,320 UART: [idev] CDI.KEYID = 6
5,201,488 UART: [idev] SUBJECT.KEYID = 7
5,203,008 UART: [idev] UDS.KEYID = 0
5,204,124 ready_for_fw is high
5,204,334 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,347,262 UART: [idev] Erasing UDS.KEYID = 0
8,494,117 UART: [idev] Sha1 KeyId Algorithm
8,515,541 UART: [idev] --
8,520,291 UART: [ldev] ++
8,520,879 UART: [ldev] CDI.KEYID = 6
8,522,108 UART: [ldev] SUBJECT.KEYID = 5
8,523,259 UART: [ldev] AUTHORITY.KEYID = 7
8,524,478 UART: [ldev] FE.KEYID = 1
8,535,074 UART: [ldev] Erasing FE.KEYID = 1
11,825,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,051 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,134,364 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,150,358 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,166,453 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,188,142 UART: [ldev] --
14,192,211 UART: [fwproc] Wait for Commands...
14,193,710 UART: [fwproc] Recv command 0x46574c44
14,195,687 UART: [fwproc] Recv'd Img size: 113760 bytes
18,289,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,362,987 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,431,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,747,723 >>> mbox cmd response: success
18,752,155 UART: [afmc] ++
18,752,770 UART: [afmc] CDI.KEYID = 6
18,753,906 UART: [afmc] SUBJECT.KEYID = 7
18,755,067 UART: [afmc] AUTHORITY.KEYID = 5
22,073,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,367,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,369,521 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,385,552 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,401,622 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,417,706 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,439,587 UART: [afmc] --
24,442,508 UART: [cold-reset] --
24,445,726 UART: [state] Locking Datavault
24,452,931 UART: [state] Locking PCR0, PCR1 and PCR31
24,454,593 UART: [state] Locking ICCM
24,457,124 UART: [exit] Launching FMC @ 0x40000130
24,465,817 UART:
24,466,091 UART: Running Caliptra FMC ...
24,467,204 UART:
24,467,362 UART: [state] CFI Enabled
24,475,461 UART: [fht] FMC Alias Private Key: 7
26,805,813 UART: [art] Extend RT PCRs Done
26,807,050 UART: [art] Lock RT PCRs Done
26,808,631 UART: [art] Populate DV Done
26,814,097 UART: [fht] FMC Alias Private Key: 7
26,815,581 UART: [art] Derive CDI
26,816,337 UART: [art] Store in in slot 0x4
26,859,194 UART: [art] Derive Key Pair
26,860,395 UART: [art] Store priv key in slot 0x5
30,102,470 UART: [art] Derive Key Pair - Done
30,115,597 UART: [art] Signing Cert with AUTHO
30,116,905 UART: RITY.KEYID = 7
32,396,010 UART: [art] Erasing AUTHORITY.KEYID = 7
32,397,520 UART: [art] PUB.X = 19F12D8A857446A5A0407830C2FB4A3AD2DC34D692E310D2614063D2ECF0C706CB09D4AD532BA1A4815238E0B9578F9F
32,404,774 UART: [art] PUB.Y = EC954E46F350E4DE3041BD7A52F8E4F9A826EEFD5AB042176E090E4948E0F37BDE113FB77C8EA363CCD2B045631A16E8
32,412,013 UART: [art] SIG.R = 111784B14E1F7C2770957EA8193B6A07F138E594D6921779BD61CC70C8994B0A1B76D510D9B9912E3BF87555C3AC3C89
32,419,377 UART: [art] SIG.S = 8B5CFA562F5F5A7F40E5F24B42DA613A80344E5F41861F690D48280D6D7A60C27F516E2FDB0319663DF0FBD41954848E
33,724,750 UART: Caliptra RT
33,725,440 UART: [state] CFI Enabled
33,842,182 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,014 UART:
1,174 UART: Running Caliptra ROM ...
2,215 UART:
6,691,175 UART: [state] CFI Enabled
6,706,666 UART: [state] LifecycleState = Production
6,708,406 UART: [state] DebugLocked = Yes
6,711,477 UART: [state] Starting the WD Timer 40000000 cycles
6,716,398 UART: [kat] SHA2-256
6,898,375 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,909,922 UART: [kat] ++
6,910,430 UART: [kat] sha1
6,920,341 UART: [kat] SHA2-256
6,923,360 UART: [kat] SHA2-384
6,928,592 UART: [kat] SHA2-512-ACC
6,931,164 UART: [kat] ECC-384
10,186,724 UART: [kat] HMAC-384Kdf
10,197,981 UART: [kat] LMS
11,271,165 UART: [kat] --
11,275,932 UART: [warm-reset] ++
11,282,731 UART: [warm-reset] --
11,286,390 UART: [state] Locking Datavault
11,289,454 UART: [state] Locking PCR0, PCR1 and PCR31
11,291,603 UART: [state] Locking ICCM
11,294,565 UART: [exit] Launching FMC @ 0x40000130
11,303,244 UART:
11,303,483 UART: Running Caliptra FMC ...
11,304,504 UART:
11,304,648 UART: [state] CFI Enabled
11,306,856 UART: [aliasrt :skip pcr extension
11,308,090 UART: [art] Extend RT PCRs Done
11,309,145 UART: [art] Lock RT PCRs Done
11,310,309 UART: [art] Populate DV Done
11,315,870 UART: [fht] FMC Alias Private Key: 7
11,317,394 UART: [art] Derive CDI
11,318,119 UART: [art] Store in in slot 0x4
11,360,824 UART: [art] Derive Key Pair
11,361,864 UART: [art] Store priv key in slot 0x5
14,604,223 UART: [art] Derive Key Pair - Done
14,617,379 UART: [art] Signing Cert with AUTHO
14,618,711 UART: RITY.KEYID = 7
16,898,478 UART: [art] Erasing AUTHORITY.KEYID = 7
16,899,997 UART: [art] PUB.X = 19F12D8A857446A5A0407830C2FB4A3AD2DC34D692E310D2614063D2ECF0C706CB09D4AD532BA1A4815238E0B9578F9F
16,907,248 UART: [art] PUB.Y = EC954E46F350E4DE3041BD7A52F8E4F9A826EEFD5AB042176E090E4948E0F37BDE113FB77C8EA363CCD2B045631A16E8
16,914,490 UART: [art] SIG.R = 111784B14E1F7C2770957EA8193B6A07F138E594D6921779BD61CC70C8994B0A1B76D510D9B9912E3BF87555C3AC3C89
16,921,886 UART: [art] SIG.S = 8B5CFA562F5F5A7F40E5F24B42DA613A80344E5F41861F690D48280D6D7A60C27F516E2FDB0319663DF0FBD41954848E
18,227,248 UART: Caliptra RT
18,227,961 UART: [state] CFI Enabled
18,514,861 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,606 writing to cptra_bootfsm_go
192,223 UART:
192,591 UART: Running Caliptra ROM ...
193,756 UART:
603,584 UART: [state] CFI Enabled
619,431 UART: [state] LifecycleState = Production
621,647 UART: [state] DebugLocked = Yes
624,377 UART: [state] Starting the WD Timer 40000000 cycles
629,440 UART: [kat] SHA2-256
811,423 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,970 UART: [kat] ++
823,440 UART: [kat] sha1
833,511 UART: [kat] SHA2-256
836,515 UART: [kat] SHA2-384
841,589 UART: [kat] SHA2-512-ACC
844,167 UART: [kat] ECC-384
4,100,905 UART: [kat] HMAC-384Kdf
4,112,714 UART: [kat] LMS
5,185,918 UART: [kat] --
5,190,152 UART: [cold-reset] ++
5,192,652 UART: [fht] FHT @ 0x50003400
5,203,434 UART: [idev] ++
5,204,145 UART: [idev] CDI.KEYID = 6
5,205,311 UART: [idev] SUBJECT.KEYID = 7
5,206,831 UART: [idev] UDS.KEYID = 0
5,207,939 ready_for_fw is high
5,208,133 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
5,351,009 UART: [idev] Erasing UDS.KEYID = 0
8,495,918 UART: [idev] Sha1 KeyId Algorithm
8,518,308 UART: [idev] --
8,522,463 UART: [ldev] ++
8,523,086 UART: [ldev] CDI.KEYID = 6
8,524,264 UART: [ldev] SUBJECT.KEYID = 5
8,525,416 UART: [ldev] AUTHORITY.KEYID = 7
8,526,642 UART: [ldev] FE.KEYID = 1
8,536,315 UART: [ldev] Erasing FE.KEYID = 1
11,826,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,633 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,135,993 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,151,991 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,168,085 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,188,700 UART: [ldev] --
14,192,928 UART: [fwproc] Wait for Commands...
14,195,990 UART: [fwproc] Recv command 0x46574c44
14,198,296 UART: [fwproc] Recv'd Img size: 113760 bytes
18,294,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,373,710 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,442,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
18,757,854 >>> mbox cmd response: success
18,761,634 UART: [afmc] ++
18,762,246 UART: [afmc] CDI.KEYID = 6
18,763,442 UART: [afmc] SUBJECT.KEYID = 7
18,764,605 UART: [afmc] AUTHORITY.KEYID = 5
22,085,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,381,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,383,383 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,399,416 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,415,531 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,431,579 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,453,091 UART: [afmc] --
24,456,297 UART: [cold-reset] --
24,459,685 UART: [state] Locking Datavault
24,465,721 UART: [state] Locking PCR0, PCR1 and PCR31
24,467,407 UART: [state] Locking ICCM
24,470,056 UART: [exit] Launching FMC @ 0x40000130
24,478,702 UART:
24,478,938 UART: Running Caliptra FMC ...
24,480,038 UART:
24,480,201 UART: [state] CFI Enabled
24,488,047 UART: [fht] FMC Alias Private Key: 7
26,818,236 UART: [art] Extend RT PCRs Done
26,819,458 UART: [art] Lock RT PCRs Done
26,821,111 UART: [art] Populate DV Done
26,826,574 UART: [fht] FMC Alias Private Key: 7
26,828,157 UART: [art] Derive CDI
26,828,902 UART: [art] Store in in slot 0x4
26,871,579 UART: [art] Derive Key Pair
26,872,623 UART: [art] Store priv key in slot 0x5
30,114,557 UART: [art] Derive Key Pair - Done
30,127,449 UART: [art] Signing Cert with AUTHO
30,128,751 UART: RITY.KEYID = 7
32,407,874 UART: [art] Erasing AUTHORITY.KEYID = 7
32,409,380 UART: [art] PUB.X = FA47F54E46F26A13EADA09A078E003E3478D366F9E4667231B7C3320BAA1F69F46BBEA379336456848BC020797404075
32,416,611 UART: [art] PUB.Y = 3C69550FA195C63E821AE5DDD52A973CCB49E3825FC6A204D87D71EC7D180FF5A4618352438A4D594298CEE9B076F992
32,423,876 UART: [art] SIG.R = 8BA555533D8BAA54B363592BF7DBA6EBA40415011E2098364E8123D93ACD81845519B9459F97C9352873AA5D40370BB3
32,431,235 UART: [art] SIG.S = 45DDDB58D9DCC48C50E010D1D25EB418213B0E36AE96649FDB7C71FEF4D84F6C9E928A5EC124933BA6A80164E583D010
33,736,624 UART: Caliptra RT
33,737,340 UART: [state] CFI Enabled
33,853,776 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,019 UART:
1,281 UART: Running Caliptra ROM ...
2,382 UART:
6,668,723 UART: [state] CFI Enabled
6,681,301 UART: [state] LifecycleState = Production
6,683,051 UART: [state] DebugLocked = Yes
6,684,903 UART: [state] Starting the WD Timer 40000000 cycles
6,689,438 UART: [kat] SHA2-256
6,871,449 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,882,953 UART: [kat] ++
6,883,489 UART: [kat] sha1
6,893,371 UART: [kat] SHA2-256
6,896,402 UART: [kat] SHA2-384
6,901,737 UART: [kat] SHA2-512-ACC
6,904,364 UART: [kat] ECC-384
10,158,843 UART: [kat] HMAC-384Kdf
10,171,123 UART: [kat] LMS
11,244,301 UART: [kat] --
11,248,618 UART: [warm-reset] ++
11,252,197 UART: [warm-reset] --
11,257,049 UART: [state] Locking Datavault
11,259,609 UART: [state] Locking PCR0, PCR1 and PCR31
11,261,758 UART: [state] Locking ICCM
11,263,742 UART: [exit] Launching FMC @ 0x40000130
11,272,418 UART:
11,272,651 UART: Running Caliptra FMC ...
11,273,747 UART:
11,273,923 UART: [state] CFI Enabled
11,275,600 UART: [aliasrt :skip pcr extension
11,276,845 UART: [art] Extend RT PCRs Done
11,277,980 UART: [art] Lock RT PCRs Done
11,279,421 UART: [art] Populate DV Done
11,285,090 UART: [fht] FMC Alias Private Key: 7
11,286,569 UART: [art] Derive CDI
11,287,376 UART: [art] Store in in slot 0x4
11,330,020 UART: [art] Derive Key Pair
11,331,054 UART: [art] Store priv key in slot 0x5
14,572,773 UART: [art] Derive Key Pair - Done
14,585,823 UART: [art] Signing Cert with AUTHO
14,587,126 UART: RITY.KEYID = 7
16,866,614 UART: [art] Erasing AUTHORITY.KEYID = 7
16,868,120 UART: [art] PUB.X = FA47F54E46F26A13EADA09A078E003E3478D366F9E4667231B7C3320BAA1F69F46BBEA379336456848BC020797404075
16,875,364 UART: [art] PUB.Y = 3C69550FA195C63E821AE5DDD52A973CCB49E3825FC6A204D87D71EC7D180FF5A4618352438A4D594298CEE9B076F992
16,882,585 UART: [art] SIG.R = 8BA555533D8BAA54B363592BF7DBA6EBA40415011E2098364E8123D93ACD81845519B9459F97C9352873AA5D40370BB3
16,889,929 UART: [art] SIG.S = 45DDDB58D9DCC48C50E010D1D25EB418213B0E36AE96649FDB7C71FEF4D84F6C9E928A5EC124933BA6A80164E583D010
18,195,751 UART: Caliptra RT
18,196,439 UART: [state] CFI Enabled
18,484,054 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,675 writing to cptra_bootfsm_go
192,329 UART:
192,717 UART: Running Caliptra ROM ...
193,914 UART:
194,065 UART: [state] CFI Enabled
264,864 UART: [state] LifecycleState = Production
266,612 UART: [state] DebugLocked = Yes
269,033 UART: [state] Starting the WD Timer 40000000 cycles
273,564 UART: [kat] SHA2-256
452,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,336 UART: [kat] ++
464,861 UART: [kat] sha1
476,006 UART: [kat] SHA2-256
479,061 UART: [kat] SHA2-384
484,415 UART: [kat] SHA2-512-ACC
487,344 UART: [kat] ECC-384
2,950,159 UART: [kat] HMAC-384Kdf
2,972,341 UART: [kat] LMS
3,501,779 UART: [kat] --
3,504,781 UART: [cold-reset] ++
3,505,998 UART: [fht] FHT @ 0x50003400
3,517,608 UART: [idev] ++
3,518,194 UART: [idev] CDI.KEYID = 6
3,519,102 UART: [idev] SUBJECT.KEYID = 7
3,520,271 UART: [idev] UDS.KEYID = 0
3,521,315 ready_for_fw is high
3,521,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,835 UART: [idev] Erasing UDS.KEYID = 0
6,028,662 UART: [idev] Sha1 KeyId Algorithm
6,052,386 UART: [idev] --
6,056,167 UART: [ldev] ++
6,056,741 UART: [ldev] CDI.KEYID = 6
6,057,624 UART: [ldev] SUBJECT.KEYID = 5
6,058,834 UART: [ldev] AUTHORITY.KEYID = 7
6,060,122 UART: [ldev] FE.KEYID = 1
6,100,034 UART: [ldev] Erasing FE.KEYID = 1
8,602,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,379 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,365 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,168 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,134 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,102 UART: [ldev] --
10,414,391 UART: [fwproc] Wait for Commands...
10,417,618 UART: [fwproc] Recv command 0x46574c44
10,419,702 UART: [fwproc] Recv'd Img size: 114084 bytes
13,848,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,990,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,307,431 >>> mbox cmd response: success
14,311,484 UART: [afmc] ++
14,312,094 UART: [afmc] CDI.KEYID = 6
14,312,980 UART: [afmc] SUBJECT.KEYID = 7
14,314,085 UART: [afmc] AUTHORITY.KEYID = 5
16,848,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,618 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,589,629 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,605,464 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,621,190 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,643,532 UART: [afmc] --
18,647,596 UART: [cold-reset] --
18,651,723 UART: [state] Locking Datavault
18,657,993 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,639 UART: [state] Locking ICCM
18,660,706 UART: [exit] Launching FMC @ 0x40000130
18,669,154 UART:
18,669,382 UART: Running Caliptra FMC ...
18,670,478 UART:
18,670,632 UART: [state] CFI Enabled
18,730,345 UART: [fht] FMC Alias Private Key: 7
20,493,847 UART: [art] Extend RT PCRs Done
20,495,071 UART: [art] Lock RT PCRs Done
20,496,910 UART: [art] Populate DV Done
20,502,478 UART: [fht] FMC Alias Private Key: 7
20,504,128 UART: [art] Derive CDI
20,504,865 UART: [art] Store in in slot 0x4
20,563,203 UART: [art] Derive Key Pair
20,564,241 UART: [art] Store priv key in slot 0x5
23,027,263 UART: [art] Derive Key Pair - Done
23,040,317 UART: [art] Signing Cert with AUTHO
23,041,621 UART: RITY.KEYID = 7
24,753,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,071 UART: [art] PUB.X = 9336218F059D47B0AA79B0BC73C1E2E34341860D1C0F1666F3389C837FC71202A8A8263B7B2B2115DCFC3C0578F15531
24,762,340 UART: [art] PUB.Y = 89ADDBC0894444B7064937DA12D2FA4F79424DCB75D848F29832C6C9D5E9864CF183A16D3860AF29D631CE1E46E10C59
24,769,586 UART: [art] SIG.R = 4EF9AE1A44C5C8CA08125397AE01D21FC19075C4CAA9116792CAB39CDAB6CA5D159D065B36FA400936AEECB2B7AE078A
24,777,012 UART: [art] SIG.S = 793C555502B8A51D171BCE8545B8FA4A58D96D22D1EA40911D070E3F6674CCA36167C5F8888013D8D0128F68C60F7721
25,755,854 UART: Caliptra RT
25,756,563 UART: [state] CFI Enabled
25,921,852 UART: [rt] RT listening for mailbox commands...
Initializing fuses
991 UART:
1,145 UART: Running Caliptra ROM ...
2,191 UART:
2,333 UART: [state] CFI Enabled
62,717 UART: [state] LifecycleState = Production
64,473 UART: [state] DebugLocked = Yes
67,240 UART: [state] Starting the WD Timer 40000000 cycles
71,644 UART: [kat] SHA2-256
250,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,357 UART: [kat] ++
262,884 UART: [kat] sha1
274,269 UART: [kat] SHA2-256
277,327 UART: [kat] SHA2-384
284,591 UART: [kat] SHA2-512-ACC
287,580 UART: [kat] ECC-384
2,746,918 UART: [kat] HMAC-384Kdf
2,771,508 UART: [kat] LMS
3,300,946 UART: [kat] --
3,304,794 UART: [warm-reset] ++
3,310,078 UART: [warm-reset] --
3,312,590 UART: [state] Locking Datavault
3,316,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,751 UART: [state] Locking ICCM
3,320,386 UART: [exit] Launching FMC @ 0x40000130
3,328,829 UART:
3,329,069 UART: Running Caliptra FMC ...
3,330,173 UART:
3,330,347 UART: [state] CFI Enabled
3,381,535 UART: [aliasrt :skip pcr extension
3,382,829 UART: [art] Extend RT PCRs Done
3,383,975 UART: [art] Lock RT PCRs Done
3,385,145 UART: [art] Populate DV Done
3,390,545 UART: [fht] FMC Alias Private Key: 7
3,392,191 UART: [art] Derive CDI
3,393,004 UART: [art] Store in in slot 0x4
3,450,643 UART: [art] Derive Key Pair
3,451,679 UART: [art] Store priv key in slot 0x5
5,913,851 UART: [art] Derive Key Pair - Done
5,926,625 UART: [art] Signing Cert with AUTHO
5,927,927 UART: RITY.KEYID = 7
7,640,104 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,624 UART: [art] PUB.X = 9336218F059D47B0AA79B0BC73C1E2E34341860D1C0F1666F3389C837FC71202A8A8263B7B2B2115DCFC3C0578F15531
7,648,901 UART: [art] PUB.Y = 89ADDBC0894444B7064937DA12D2FA4F79424DCB75D848F29832C6C9D5E9864CF183A16D3860AF29D631CE1E46E10C59
7,656,123 UART: [art] SIG.R = 4EF9AE1A44C5C8CA08125397AE01D21FC19075C4CAA9116792CAB39CDAB6CA5D159D065B36FA400936AEECB2B7AE078A
7,663,748 UART: [art] SIG.S = 793C555502B8A51D171BCE8545B8FA4A58D96D22D1EA40911D070E3F6674CCA36167C5F8888013D8D0128F68C60F7721
8,642,071 UART: Caliptra RT
8,642,761 UART: [state] CFI Enabled
8,977,836 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
191,963 UART:
192,351 UART: Running Caliptra ROM ...
193,447 UART:
193,585 UART: [state] CFI Enabled
264,026 UART: [state] LifecycleState = Production
265,873 UART: [state] DebugLocked = Yes
267,929 UART: [state] Starting the WD Timer 40000000 cycles
272,451 UART: [kat] SHA2-256
451,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,198 UART: [kat] ++
463,643 UART: [kat] sha1
474,399 UART: [kat] SHA2-256
477,405 UART: [kat] SHA2-384
483,261 UART: [kat] SHA2-512-ACC
486,191 UART: [kat] ECC-384
2,945,742 UART: [kat] HMAC-384Kdf
2,972,070 UART: [kat] LMS
3,501,531 UART: [kat] --
3,506,383 UART: [cold-reset] ++
3,507,807 UART: [fht] FHT @ 0x50003400
3,518,875 UART: [idev] ++
3,519,445 UART: [idev] CDI.KEYID = 6
3,520,394 UART: [idev] SUBJECT.KEYID = 7
3,521,561 UART: [idev] UDS.KEYID = 0
3,522,605 ready_for_fw is high
3,522,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,357 UART: [idev] Erasing UDS.KEYID = 0
6,026,625 UART: [idev] Sha1 KeyId Algorithm
6,048,604 UART: [idev] --
6,051,924 UART: [ldev] ++
6,052,503 UART: [ldev] CDI.KEYID = 6
6,053,450 UART: [ldev] SUBJECT.KEYID = 5
6,054,609 UART: [ldev] AUTHORITY.KEYID = 7
6,055,785 UART: [ldev] FE.KEYID = 1
6,101,344 UART: [ldev] Erasing FE.KEYID = 1
8,604,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,303 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,283 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,123 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,062 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,913 UART: [ldev] --
10,415,793 UART: [fwproc] Wait for Commands...
10,417,825 UART: [fwproc] Recv command 0x46574c44
10,419,912 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,510 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,999,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,316,934 >>> mbox cmd response: success
14,320,962 UART: [afmc] ++
14,321,575 UART: [afmc] CDI.KEYID = 6
14,322,490 UART: [afmc] SUBJECT.KEYID = 7
14,323,593 UART: [afmc] AUTHORITY.KEYID = 5
16,845,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,609 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,590,571 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,606,454 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,622,232 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,644,617 UART: [afmc] --
18,648,739 UART: [cold-reset] --
18,652,554 UART: [state] Locking Datavault
18,656,341 UART: [state] Locking PCR0, PCR1 and PCR31
18,658,038 UART: [state] Locking ICCM
18,659,377 UART: [exit] Launching FMC @ 0x40000130
18,667,774 UART:
18,668,003 UART: Running Caliptra FMC ...
18,669,106 UART:
18,669,262 UART: [state] CFI Enabled
18,722,572 UART: [fht] FMC Alias Private Key: 7
20,486,395 UART: [art] Extend RT PCRs Done
20,487,616 UART: [art] Lock RT PCRs Done
20,489,482 UART: [art] Populate DV Done
20,495,054 UART: [fht] FMC Alias Private Key: 7
20,496,701 UART: [art] Derive CDI
20,497,434 UART: [art] Store in in slot 0x4
20,555,833 UART: [art] Derive Key Pair
20,556,868 UART: [art] Store priv key in slot 0x5
23,020,764 UART: [art] Derive Key Pair - Done
23,034,042 UART: [art] Signing Cert with AUTHO
23,035,344 UART: RITY.KEYID = 7
24,746,336 UART: [art] Erasing AUTHORITY.KEYID = 7
24,747,821 UART: [art] PUB.X = B2010902CE279D4079DBE0490CF5199417344E71A8106824329CDACA9C44A98A161D58F2666254905BF52FF478C0C779
24,755,081 UART: [art] PUB.Y = ABF9C4D4BC323BA7A6D7EA0A54C7AD11A2B03C2EDAF16E1E4FADD3CF11009C086A3230DD718B0C2A1AA0E2E5DA009AF2
24,762,361 UART: [art] SIG.R = FBD953779BDBB1BBDD9C43792671D193A699C9D02B4374C481B9D211FFCECE9172217B1748F5731756FB8560F53AE1FD
24,769,809 UART: [art] SIG.S = CD123617DAEC61B12E7B7EE1BAFD8797FA8C0C07F15A8B86B0E8D0E42D8A54437D8A9FECB353F41B8F55EA49463A9661
25,748,937 UART: Caliptra RT
25,749,651 UART: [state] CFI Enabled
25,914,449 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,011 UART:
1,272 UART: Running Caliptra ROM ...
2,371 UART:
2,519 UART: [state] CFI Enabled
63,281 UART: [state] LifecycleState = Production
65,037 UART: [state] DebugLocked = Yes
67,045 UART: [state] Starting the WD Timer 40000000 cycles
71,716 UART: [kat] SHA2-256
250,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,411 UART: [kat] ++
262,932 UART: [kat] sha1
273,884 UART: [kat] SHA2-256
276,948 UART: [kat] SHA2-384
282,592 UART: [kat] SHA2-512-ACC
285,519 UART: [kat] ECC-384
2,749,412 UART: [kat] HMAC-384Kdf
2,771,729 UART: [kat] LMS
3,301,224 UART: [kat] --
3,304,744 UART: [warm-reset] ++
3,307,755 UART: [warm-reset] --
3,311,181 UART: [state] Locking Datavault
3,314,815 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,461 UART: [state] Locking ICCM
3,318,397 UART: [exit] Launching FMC @ 0x40000130
3,326,851 UART:
3,327,083 UART: Running Caliptra FMC ...
3,328,183 UART:
3,328,356 UART: [state] CFI Enabled
3,381,913 UART: [aliasrt :skip pcr extension
3,383,206 UART: [art] Extend RT PCRs Done
3,384,352 UART: [art] Lock RT PCRs Done
3,385,530 UART: [art] Populate DV Done
3,391,154 UART: [fht] FMC Alias Private Key: 7
3,392,632 UART: [art] Derive CDI
3,393,443 UART: [art] Store in in slot 0x4
3,450,798 UART: [art] Derive Key Pair
3,451,839 UART: [art] Store priv key in slot 0x5
5,914,577 UART: [art] Derive Key Pair - Done
5,927,677 UART: [art] Signing Cert with AUTHO
5,928,976 UART: RITY.KEYID = 7
7,639,848 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,352 UART: [art] PUB.X = B2010902CE279D4079DBE0490CF5199417344E71A8106824329CDACA9C44A98A161D58F2666254905BF52FF478C0C779
7,648,599 UART: [art] PUB.Y = ABF9C4D4BC323BA7A6D7EA0A54C7AD11A2B03C2EDAF16E1E4FADD3CF11009C086A3230DD718B0C2A1AA0E2E5DA009AF2
7,655,928 UART: [art] SIG.R = FBD953779BDBB1BBDD9C43792671D193A699C9D02B4374C481B9D211FFCECE9172217B1748F5731756FB8560F53AE1FD
7,663,264 UART: [art] SIG.S = CD123617DAEC61B12E7B7EE1BAFD8797FA8C0C07F15A8B86B0E8D0E42D8A54437D8A9FECB353F41B8F55EA49463A9661
8,642,640 UART: Caliptra RT
8,643,328 UART: [state] CFI Enabled
8,976,891 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
192,370 UART:
192,755 UART: Running Caliptra ROM ...
193,942 UART:
603,607 UART: [state] CFI Enabled
618,926 UART: [state] LifecycleState = Production
620,703 UART: [state] DebugLocked = Yes
623,476 UART: [state] Starting the WD Timer 40000000 cycles
628,935 UART: [kat] SHA2-256
808,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,680 UART: [kat] ++
820,221 UART: [kat] sha1
831,342 UART: [kat] SHA2-256
834,427 UART: [kat] SHA2-384
841,693 UART: [kat] SHA2-512-ACC
844,631 UART: [kat] ECC-384
3,286,330 UART: [kat] HMAC-384Kdf
3,297,682 UART: [kat] LMS
3,827,190 UART: [kat] --
3,831,420 UART: [cold-reset] ++
3,832,644 UART: [fht] FHT @ 0x50003400
3,844,063 UART: [idev] ++
3,844,636 UART: [idev] CDI.KEYID = 6
3,845,521 UART: [idev] SUBJECT.KEYID = 7
3,846,764 UART: [idev] UDS.KEYID = 0
3,847,669 ready_for_fw is high
3,847,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,268 UART: [idev] Erasing UDS.KEYID = 0
6,319,833 UART: [idev] Sha1 KeyId Algorithm
6,341,589 UART: [idev] --
6,344,942 UART: [ldev] ++
6,345,513 UART: [ldev] CDI.KEYID = 6
6,346,398 UART: [ldev] SUBJECT.KEYID = 5
6,347,609 UART: [ldev] AUTHORITY.KEYID = 7
6,348,843 UART: [ldev] FE.KEYID = 1
6,362,754 UART: [ldev] Erasing FE.KEYID = 1
8,838,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,941 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,571,935 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,758 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,603,711 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,623,577 UART: [ldev] --
10,628,560 UART: [fwproc] Wait for Commands...
10,630,509 UART: [fwproc] Recv command 0x46574c44
10,632,603 UART: [fwproc] Recv'd Img size: 114084 bytes
14,069,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,208,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,525,007 >>> mbox cmd response: success
14,529,861 UART: [afmc] ++
14,530,474 UART: [afmc] CDI.KEYID = 6
14,531,400 UART: [afmc] SUBJECT.KEYID = 7
14,532,505 UART: [afmc] AUTHORITY.KEYID = 5
17,032,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,752,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,754,716 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,770,688 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,786,547 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,802,299 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,825,002 UART: [afmc] --
18,828,886 UART: [cold-reset] --
18,834,104 UART: [state] Locking Datavault
18,841,567 UART: [state] Locking PCR0, PCR1 and PCR31
18,843,282 UART: [state] Locking ICCM
18,844,622 UART: [exit] Launching FMC @ 0x40000130
18,853,072 UART:
18,853,314 UART: Running Caliptra FMC ...
18,854,415 UART:
18,854,577 UART: [state] CFI Enabled
18,862,817 UART: [fht] FMC Alias Private Key: 7
20,619,942 UART: [art] Extend RT PCRs Done
20,621,168 UART: [art] Lock RT PCRs Done
20,622,822 UART: [art] Populate DV Done
20,628,140 UART: [fht] FMC Alias Private Key: 7
20,629,846 UART: [art] Derive CDI
20,630,667 UART: [art] Store in in slot 0x4
20,673,319 UART: [art] Derive Key Pair
20,674,322 UART: [art] Store priv key in slot 0x5
23,101,448 UART: [art] Derive Key Pair - Done
23,114,634 UART: [art] Signing Cert with AUTHO
23,115,946 UART: RITY.KEYID = 7
24,821,109 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,622 UART: [art] PUB.X = FE2E0F3BBFC447961FEE1756EB2B518038D09FEF245A66F65F53D6177735EF1A680523199B47BCE4630756001ADE6634
24,829,850 UART: [art] PUB.Y = 1B8819765ABE278468D692B2EF5F84AB4EF6F5F184D4D112244AB057331547174B34579068CCF4032DC13E3206B06A6D
24,837,065 UART: [art] SIG.R = 6630CED74D0CE231DB2A6A4D181BB8AC4E3E017D468DF71AFB4BBCE43D212D0C4D4C93A3BF22FF165094638380F7E3C8
24,844,516 UART: [art] SIG.S = B63EB61597E4A14DD69819565AB1ECE2CF7042F446EA92DD40F5214395160ECBAB40F3CA9255230DC3286F16B92860A9
25,823,012 UART: Caliptra RT
25,823,739 UART: [state] CFI Enabled
25,940,805 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,012 UART:
1,179 UART: Running Caliptra ROM ...
2,225 UART:
14,591,337 UART: [state] CFI Enabled
14,603,537 UART: [state] LifecycleState = Production
14,605,271 UART: [state] DebugLocked = Yes
14,606,564 UART: [state] Starting the WD Timer 40000000 cycles
14,611,462 UART: [kat] SHA2-256
14,790,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,802,151 UART: [kat] ++
14,802,607 UART: [kat] sha1
14,812,323 UART: [kat] SHA2-256
14,815,344 UART: [kat] SHA2-384
14,821,333 UART: [kat] SHA2-512-ACC
14,824,277 UART: [kat] ECC-384
17,265,421 UART: [kat] HMAC-384Kdf
17,279,587 UART: [kat] LMS
17,809,155 UART: [kat] --
17,814,005 UART: [warm-reset] ++
17,819,774 UART: [warm-reset] --
17,822,822 UART: [state] Locking Datavault
17,825,747 UART: [state] Locking PCR0, PCR1 and PCR31
17,827,451 UART: [state] Locking ICCM
17,829,221 UART: [exit] Launching FMC @ 0x40000130
17,837,682 UART:
17,837,922 UART: Running Caliptra FMC ...
17,839,026 UART:
17,839,208 UART: [state] CFI Enabled
17,841,156 UART: [aliasrt :skip pcr extension
17,842,405 UART: [art] Extend RT PCRs Done
17,843,542 UART: [art] Lock RT PCRs Done
17,844,608 UART: [art] Populate DV Done
17,850,228 UART: [fht] FMC Alias Private Key: 7
17,851,817 UART: [art] Derive CDI
17,852,633 UART: [art] Store in in slot 0x4
17,895,536 UART: [art] Derive Key Pair
17,896,566 UART: [art] Store priv key in slot 0x5
20,322,897 UART: [art] Derive Key Pair - Done
20,336,228 UART: [art] Signing Cert with AUTHO
20,337,543 UART: RITY.KEYID = 7
22,043,161 UART: [art] Erasing AUTHORITY.KEYID = 7
22,044,671 UART: [art] PUB.X = FE2E0F3BBFC447961FEE1756EB2B518038D09FEF245A66F65F53D6177735EF1A680523199B47BCE4630756001ADE6634
22,051,956 UART: [art] PUB.Y = 1B8819765ABE278468D692B2EF5F84AB4EF6F5F184D4D112244AB057331547174B34579068CCF4032DC13E3206B06A6D
22,059,179 UART: [art] SIG.R = 6630CED74D0CE231DB2A6A4D181BB8AC4E3E017D468DF71AFB4BBCE43D212D0C4D4C93A3BF22FF165094638380F7E3C8
22,066,558 UART: [art] SIG.S = B63EB61597E4A14DD69819565AB1ECE2CF7042F446EA92DD40F5214395160ECBAB40F3CA9255230DC3286F16B92860A9
23,045,233 UART: Caliptra RT
23,045,952 UART: [state] CFI Enabled
23,331,825 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,707 writing to cptra_bootfsm_go
192,323 UART:
192,707 UART: Running Caliptra ROM ...
193,845 UART:
603,630 UART: [state] CFI Enabled
616,854 UART: [state] LifecycleState = Production
618,621 UART: [state] DebugLocked = Yes
621,603 UART: [state] Starting the WD Timer 40000000 cycles
625,622 UART: [kat] SHA2-256
804,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,327 UART: [kat] ++
816,773 UART: [kat] sha1
828,985 UART: [kat] SHA2-256
831,972 UART: [kat] SHA2-384
838,327 UART: [kat] SHA2-512-ACC
841,267 UART: [kat] ECC-384
3,282,603 UART: [kat] HMAC-384Kdf
3,295,332 UART: [kat] LMS
3,824,831 UART: [kat] --
3,828,994 UART: [cold-reset] ++
3,829,867 UART: [fht] FHT @ 0x50003400
3,840,488 UART: [idev] ++
3,841,059 UART: [idev] CDI.KEYID = 6
3,841,947 UART: [idev] SUBJECT.KEYID = 7
3,843,117 UART: [idev] UDS.KEYID = 0
3,844,167 ready_for_fw is high
3,844,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,637 UART: [idev] Erasing UDS.KEYID = 0
6,316,566 UART: [idev] Sha1 KeyId Algorithm
6,339,266 UART: [idev] --
6,343,320 UART: [ldev] ++
6,343,893 UART: [ldev] CDI.KEYID = 6
6,344,819 UART: [ldev] SUBJECT.KEYID = 5
6,345,977 UART: [ldev] AUTHORITY.KEYID = 7
6,347,376 UART: [ldev] FE.KEYID = 1
6,355,819 UART: [ldev] Erasing FE.KEYID = 1
8,833,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,180 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,565,178 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,581,003 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,597,004 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,088 UART: [ldev] --
10,624,202 UART: [fwproc] Wait for Commands...
10,625,758 UART: [fwproc] Recv command 0x46574c44
10,627,871 UART: [fwproc] Recv'd Img size: 114084 bytes
14,058,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,131,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,200,377 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,517,970 >>> mbox cmd response: success
14,522,527 UART: [afmc] ++
14,523,137 UART: [afmc] CDI.KEYID = 6
14,524,060 UART: [afmc] SUBJECT.KEYID = 7
14,525,226 UART: [afmc] AUTHORITY.KEYID = 5
17,025,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,746,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,748,092 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,764,109 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,779,925 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,795,668 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,818,319 UART: [afmc] --
18,822,290 UART: [cold-reset] --
18,824,812 UART: [state] Locking Datavault
18,829,794 UART: [state] Locking PCR0, PCR1 and PCR31
18,831,483 UART: [state] Locking ICCM
18,834,020 UART: [exit] Launching FMC @ 0x40000130
18,842,424 UART:
18,842,670 UART: Running Caliptra FMC ...
18,843,779 UART:
18,843,942 UART: [state] CFI Enabled
18,851,942 UART: [fht] FMC Alias Private Key: 7
20,609,554 UART: [art] Extend RT PCRs Done
20,610,776 UART: [art] Lock RT PCRs Done
20,612,458 UART: [art] Populate DV Done
20,617,816 UART: [fht] FMC Alias Private Key: 7
20,619,358 UART: [art] Derive CDI
20,620,171 UART: [art] Store in in slot 0x4
20,662,846 UART: [art] Derive Key Pair
20,663,850 UART: [art] Store priv key in slot 0x5
23,090,719 UART: [art] Derive Key Pair - Done
23,103,664 UART: [art] Signing Cert with AUTHO
23,104,970 UART: RITY.KEYID = 7
24,810,043 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,552 UART: [art] PUB.X = F05574F90089892E673F9832D964641CBB14F08782AFE9ED999A1D8F8968E75A82B28B49D9530531D5474EDE7C129815
24,818,770 UART: [art] PUB.Y = 6685D5509AC4095B5C5E1E0DC7C071286EF9BD864658017BB8E32004E5E5C3640FDF54F022DFE16B649337013831D949
24,826,035 UART: [art] SIG.R = 09F4114714ED4DDA811983D245CC198B17ED1E3119B31505A378CDF298BA89A1B37FB09574E49BBE71581059979E3F06
24,833,445 UART: [art] SIG.S = 9B97FBC9F864735AF0F4CD7D4D9761A0790E9781C5E99F022D7173F0897E7071863F7FB8FD6819B921CB5A6B355EF324
25,812,684 UART: Caliptra RT
25,813,396 UART: [state] CFI Enabled
25,930,790 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,007 UART:
1,207 UART: Running Caliptra ROM ...
2,331 UART:
14,594,589 UART: [state] CFI Enabled
14,607,503 UART: [state] LifecycleState = Production
14,609,257 UART: [state] DebugLocked = Yes
14,612,086 UART: [state] Starting the WD Timer 40000000 cycles
14,616,878 UART: [kat] SHA2-256
14,796,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,807,592 UART: [kat] ++
14,808,140 UART: [kat] sha1
14,818,927 UART: [kat] SHA2-256
14,821,923 UART: [kat] SHA2-384
14,826,628 UART: [kat] SHA2-512-ACC
14,829,625 UART: [kat] ECC-384
17,270,786 UART: [kat] HMAC-384Kdf
17,283,009 UART: [kat] LMS
17,812,502 UART: [kat] --
17,816,513 UART: [warm-reset] ++
17,819,468 UART: [warm-reset] --
17,823,175 UART: [state] Locking Datavault
17,826,642 UART: [state] Locking PCR0, PCR1 and PCR31
17,828,290 UART: [state] Locking ICCM
17,829,767 UART: [exit] Launching FMC @ 0x40000130
17,838,216 UART:
17,838,453 UART: Running Caliptra FMC ...
17,839,558 UART:
17,839,737 UART: [state] CFI Enabled
17,841,474 UART: [aliasrt :skip pcr extension
17,842,722 UART: [art] Extend RT PCRs Done
17,843,861 UART: [art] Lock RT PCRs Done
17,845,466 UART: [art] Populate DV Done
17,850,924 UART: [fht] FMC Alias Private Key: 7
17,852,515 UART: [art] Derive CDI
17,853,349 UART: [art] Store in in slot 0x4
17,895,863 UART: [art] Derive Key Pair
17,896,884 UART: [art] Store priv key in slot 0x5
20,324,025 UART: [art] Derive Key Pair - Done
20,337,195 UART: [art] Signing Cert with AUTHO
20,338,540 UART: RITY.KEYID = 7
22,043,856 UART: [art] Erasing AUTHORITY.KEYID = 7
22,045,365 UART: [art] PUB.X = F05574F90089892E673F9832D964641CBB14F08782AFE9ED999A1D8F8968E75A82B28B49D9530531D5474EDE7C129815
22,052,555 UART: [art] PUB.Y = 6685D5509AC4095B5C5E1E0DC7C071286EF9BD864658017BB8E32004E5E5C3640FDF54F022DFE16B649337013831D949
22,059,811 UART: [art] SIG.R = 09F4114714ED4DDA811983D245CC198B17ED1E3119B31505A378CDF298BA89A1B37FB09574E49BBE71581059979E3F06
22,067,184 UART: [art] SIG.S = 9B97FBC9F864735AF0F4CD7D4D9761A0790E9781C5E99F022D7173F0897E7071863F7FB8FD6819B921CB5A6B355EF324
23,046,213 UART: Caliptra RT
23,046,911 UART: [state] CFI Enabled
23,331,329 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
192,056 UART:
192,423 UART: Running Caliptra ROM ...
193,613 UART:
193,765 UART: [state] CFI Enabled
261,090 UART: [state] LifecycleState = Production
262,842 UART: [state] DebugLocked = Yes
265,265 UART: [state] Starting the WD Timer 40000000 cycles
270,356 UART: [kat] SHA2-256
449,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,124 UART: [kat] ++
461,660 UART: [kat] sha1
471,922 UART: [kat] SHA2-256
474,925 UART: [kat] SHA2-384
480,766 UART: [kat] SHA2-512-ACC
483,705 UART: [kat] ECC-384
2,948,940 UART: [kat] HMAC-384Kdf
2,971,469 UART: [kat] LMS
3,500,886 UART: [kat] --
3,506,799 UART: [cold-reset] ++
3,509,085 UART: [fht] FHT @ 0x50003400
3,518,926 UART: [idev] ++
3,519,486 UART: [idev] CDI.KEYID = 6
3,520,374 UART: [idev] SUBJECT.KEYID = 7
3,521,614 UART: [idev] UDS.KEYID = 0
3,522,535 ready_for_fw is high
3,522,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,663 UART: [idev] Erasing UDS.KEYID = 0
6,027,124 UART: [idev] Sha1 KeyId Algorithm
6,049,911 UART: [idev] --
6,053,152 UART: [ldev] ++
6,053,728 UART: [ldev] CDI.KEYID = 6
6,054,614 UART: [ldev] SUBJECT.KEYID = 5
6,056,069 UART: [ldev] AUTHORITY.KEYID = 7
6,057,188 UART: [ldev] FE.KEYID = 1
6,100,103 UART: [ldev] Erasing FE.KEYID = 1
8,603,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,298 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,293 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,113 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,085 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,557 UART: [ldev] --
10,411,261 UART: [fwproc] Wait for Commands...
10,414,275 UART: [fwproc] Recv command 0x46574c44
10,416,366 UART: [fwproc] Recv'd Img size: 114084 bytes
13,854,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,448 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,996,248 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,313,000 >>> mbox cmd response: success
14,316,854 UART: [afmc] ++
14,317,464 UART: [afmc] CDI.KEYID = 6
14,318,377 UART: [afmc] SUBJECT.KEYID = 7
14,319,533 UART: [afmc] AUTHORITY.KEYID = 5
16,850,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,576 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,591,544 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,607,421 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,623,146 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,645,807 UART: [afmc] --
18,649,721 UART: [cold-reset] --
18,655,585 UART: [state] Locking Datavault
18,660,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,100 UART: [state] Locking ICCM
18,664,678 UART: [exit] Launching FMC @ 0x40000130
18,673,134 UART:
18,673,367 UART: Running Caliptra FMC ...
18,674,462 UART:
18,674,618 UART: [state] CFI Enabled
18,731,413 UART: [fht] FMC Alias Private Key: 7
20,495,411 UART: [art] Extend RT PCRs Done
20,496,635 UART: [art] Lock RT PCRs Done
20,498,718 UART: [art] Populate DV Done
20,504,141 UART: [fht] FMC Alias Private Key: 7
20,505,733 UART: [art] Derive CDI
20,506,464 UART: [art] Store in in slot 0x4
20,564,041 UART: [art] Derive Key Pair
20,565,085 UART: [art] Store priv key in slot 0x5
23,027,880 UART: [art] Derive Key Pair - Done
23,040,557 UART: [art] Signing Cert with AUTHO
23,041,857 UART: RITY.KEYID = 7
24,754,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,514 UART: [art] PUB.X = 8D7DB2CE19DF1294FE313CB82373119F71A6D9BD312A50FA62533A547FE022DD92510E321DDCDE00586343671ABDC6CD
24,762,718 UART: [art] PUB.Y = 97ECA26CD3A6543DFD4955FE7FF7581894557AF2B043F3EDB25A3DAD693890510FE1E311CF6B15730CD34A6023819310
24,770,027 UART: [art] SIG.R = D84B7F71982DBC1E42E97F6C403307772B7E72C5F13D7EBE8D7EEBD8D064E1B2BB849554D29A56C63FCB449D2E09A3B4
24,777,468 UART: [art] SIG.S = A59AFC18FC577075AFADBDD869A786A52D8A217C42C9A0A456F4D9AA5B7401D871479C1AEEAEFAD312544E68176B2DCA
25,756,279 UART: Caliptra RT
25,756,966 UART: [state] CFI Enabled
25,921,162 UART: [rt] RT listening for mailbox commands...
Initializing fuses
990 UART:
1,136 UART: Running Caliptra ROM ...
2,188 UART:
2,331 UART: [state] CFI Enabled
64,119 UART: [state] LifecycleState = Production
65,880 UART: [state] DebugLocked = Yes
68,884 UART: [state] Starting the WD Timer 40000000 cycles
74,531 UART: [kat] SHA2-256
253,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,304 UART: [kat] ++
265,744 UART: [kat] sha1
277,315 UART: [kat] SHA2-256
280,317 UART: [kat] SHA2-384
286,293 UART: [kat] SHA2-512-ACC
289,229 UART: [kat] ECC-384
2,747,453 UART: [kat] HMAC-384Kdf
2,772,321 UART: [kat] LMS
3,301,851 UART: [kat] --
3,306,113 UART: [warm-reset] ++
3,311,820 UART: [warm-reset] --
3,315,528 UART: [state] Locking Datavault
3,319,420 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,068 UART: [state] Locking ICCM
3,322,952 UART: [exit] Launching FMC @ 0x40000130
3,331,352 UART:
3,331,594 UART: Running Caliptra FMC ...
3,332,852 UART:
3,333,025 UART: [state] CFI Enabled
3,382,756 UART: [aliasrt :skip pcr extension
3,384,002 UART: [art] Extend RT PCRs Done
3,385,096 UART: [art] Lock RT PCRs Done
3,386,291 UART: [art] Populate DV Done
3,391,708 UART: [fht] FMC Alias Private Key: 7
3,393,407 UART: [art] Derive CDI
3,394,216 UART: [art] Store in in slot 0x4
3,451,686 UART: [art] Derive Key Pair
3,452,727 UART: [art] Store priv key in slot 0x5
5,915,473 UART: [art] Derive Key Pair - Done
5,928,632 UART: [art] Signing Cert with AUTHO
5,929,926 UART: RITY.KEYID = 7
7,641,781 UART: [art] Erasing AUTHORITY.KEYID = 7
7,643,293 UART: [art] PUB.X = 8D7DB2CE19DF1294FE313CB82373119F71A6D9BD312A50FA62533A547FE022DD92510E321DDCDE00586343671ABDC6CD
7,650,551 UART: [art] PUB.Y = 97ECA26CD3A6543DFD4955FE7FF7581894557AF2B043F3EDB25A3DAD693890510FE1E311CF6B15730CD34A6023819310
7,657,789 UART: [art] SIG.R = D84B7F71982DBC1E42E97F6C403307772B7E72C5F13D7EBE8D7EEBD8D064E1B2BB849554D29A56C63FCB449D2E09A3B4
7,665,219 UART: [art] SIG.S = A59AFC18FC577075AFADBDD869A786A52D8A217C42C9A0A456F4D9AA5B7401D871479C1AEEAEFAD312544E68176B2DCA
8,644,174 UART: Caliptra RT
8,644,863 UART: [state] CFI Enabled
8,974,757 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
192,075 UART:
192,458 UART: Running Caliptra ROM ...
193,636 UART:
193,790 UART: [state] CFI Enabled
263,571 UART: [state] LifecycleState = Production
265,372 UART: [state] DebugLocked = Yes
267,792 UART: [state] Starting the WD Timer 40000000 cycles
273,521 UART: [kat] SHA2-256
452,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,232 UART: [kat] ++
464,766 UART: [kat] sha1
476,804 UART: [kat] SHA2-256
479,871 UART: [kat] SHA2-384
485,855 UART: [kat] SHA2-512-ACC
488,794 UART: [kat] ECC-384
2,944,515 UART: [kat] HMAC-384Kdf
2,969,408 UART: [kat] LMS
3,498,879 UART: [kat] --
3,504,586 UART: [cold-reset] ++
3,506,542 UART: [fht] FHT @ 0x50003400
3,517,799 UART: [idev] ++
3,518,358 UART: [idev] CDI.KEYID = 6
3,519,237 UART: [idev] SUBJECT.KEYID = 7
3,520,473 UART: [idev] UDS.KEYID = 0
3,521,425 ready_for_fw is high
3,521,626 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,171 UART: [idev] Erasing UDS.KEYID = 0
6,025,723 UART: [idev] Sha1 KeyId Algorithm
6,047,920 UART: [idev] --
6,051,915 UART: [ldev] ++
6,052,482 UART: [ldev] CDI.KEYID = 6
6,053,548 UART: [ldev] SUBJECT.KEYID = 5
6,054,652 UART: [ldev] AUTHORITY.KEYID = 7
6,055,883 UART: [ldev] FE.KEYID = 1
6,099,858 UART: [ldev] Erasing FE.KEYID = 1
8,600,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,494 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,484 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,298 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,251 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,563 UART: [ldev] --
10,413,376 UART: [fwproc] Wait for Commands...
10,415,952 UART: [fwproc] Recv command 0x46574c44
10,418,041 UART: [fwproc] Recv'd Img size: 114084 bytes
13,849,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,985,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,301,613 >>> mbox cmd response: success
14,305,448 UART: [afmc] ++
14,306,081 UART: [afmc] CDI.KEYID = 6
14,307,000 UART: [afmc] SUBJECT.KEYID = 7
14,308,165 UART: [afmc] AUTHORITY.KEYID = 5
16,846,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,128 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,589,097 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,604,991 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,620,706 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,641,931 UART: [afmc] --
18,645,034 UART: [cold-reset] --
18,651,167 UART: [state] Locking Datavault
18,656,738 UART: [state] Locking PCR0, PCR1 and PCR31
18,658,386 UART: [state] Locking ICCM
18,660,907 UART: [exit] Launching FMC @ 0x40000130
18,669,359 UART:
18,669,596 UART: Running Caliptra FMC ...
18,670,696 UART:
18,670,852 UART: [state] CFI Enabled
18,729,160 UART: [fht] FMC Alias Private Key: 7
20,492,584 UART: [art] Extend RT PCRs Done
20,493,804 UART: [art] Lock RT PCRs Done
20,495,534 UART: [art] Populate DV Done
20,501,012 UART: [fht] FMC Alias Private Key: 7
20,502,658 UART: [art] Derive CDI
20,503,470 UART: [art] Store in in slot 0x4
20,561,536 UART: [art] Derive Key Pair
20,562,570 UART: [art] Store priv key in slot 0x5
23,025,476 UART: [art] Derive Key Pair - Done
23,038,743 UART: [art] Signing Cert with AUTHO
23,040,051 UART: RITY.KEYID = 7
24,751,085 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,584 UART: [art] PUB.X = 0C7907E2CC02F3849D2B62683FEF83525BC4F6EDBF3C9F63FE48E23A86F38CCE5A270666ABABE60FDB9127D2DA810416
24,759,862 UART: [art] PUB.Y = C2A3729E3D6AE0278A90185E25E8EEA3144C922BB0BE19032C2698EEFA2B7288A57802C79E6425616E59D946B6768F19
24,767,127 UART: [art] SIG.R = 98BAEEEB41DE4CA9FBFBBCCDB17BFE18CC6E994FBC07D6600222447F6B9E115EEA70D2E876E3CD6C3B9FC99672F05D9D
24,774,526 UART: [art] SIG.S = 4E254508F028B183504BAD3A6C53D8A5A1FDAF6901CC3FA9F31E0BDE0DF095E165818B55287A706D2A1F9BC10AE6455D
25,753,347 UART: Caliptra RT
25,754,049 UART: [state] CFI Enabled
25,919,329 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,014 UART:
1,273 UART: Running Caliptra ROM ...
2,390 UART:
2,542 UART: [state] CFI Enabled
66,684 UART: [state] LifecycleState = Production
68,445 UART: [state] DebugLocked = Yes
70,480 UART: [state] Starting the WD Timer 40000000 cycles
75,691 UART: [kat] SHA2-256
254,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,431 UART: [kat] ++
266,874 UART: [kat] sha1
278,445 UART: [kat] SHA2-256
281,504 UART: [kat] SHA2-384
287,369 UART: [kat] SHA2-512-ACC
290,351 UART: [kat] ECC-384
2,747,888 UART: [kat] HMAC-384Kdf
2,771,994 UART: [kat] LMS
3,301,502 UART: [kat] --
3,306,079 UART: [warm-reset] ++
3,312,215 UART: [warm-reset] --
3,316,395 UART: [state] Locking Datavault
3,320,029 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,732 UART: [state] Locking ICCM
3,323,525 UART: [exit] Launching FMC @ 0x40000130
3,331,970 UART:
3,332,200 UART: Running Caliptra FMC ...
3,333,224 UART:
3,333,371 UART: [state] CFI Enabled
3,381,570 UART: [aliasrt :skip pcr extension
3,382,855 UART: [art] Extend RT PCRs Done
3,383,923 UART: [art] Lock RT PCRs Done
3,385,002 UART: [art] Populate DV Done
3,390,556 UART: [fht] FMC Alias Private Key: 7
3,392,247 UART: [art] Derive CDI
3,392,981 UART: [art] Store in in slot 0x4
3,450,125 UART: [art] Derive Key Pair
3,451,163 UART: [art] Store priv key in slot 0x5
5,914,184 UART: [art] Derive Key Pair - Done
5,927,179 UART: [art] Signing Cert with AUTHO
5,928,482 UART: RITY.KEYID = 7
7,639,742 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,246 UART: [art] PUB.X = 0C7907E2CC02F3849D2B62683FEF83525BC4F6EDBF3C9F63FE48E23A86F38CCE5A270666ABABE60FDB9127D2DA810416
7,648,515 UART: [art] PUB.Y = C2A3729E3D6AE0278A90185E25E8EEA3144C922BB0BE19032C2698EEFA2B7288A57802C79E6425616E59D946B6768F19
7,655,774 UART: [art] SIG.R = 98BAEEEB41DE4CA9FBFBBCCDB17BFE18CC6E994FBC07D6600222447F6B9E115EEA70D2E876E3CD6C3B9FC99672F05D9D
7,663,211 UART: [art] SIG.S = 4E254508F028B183504BAD3A6C53D8A5A1FDAF6901CC3FA9F31E0BDE0DF095E165818B55287A706D2A1F9BC10AE6455D
8,642,043 UART: Caliptra RT
8,642,756 UART: [state] CFI Enabled
8,980,588 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,648 writing to cptra_bootfsm_go
192,287 UART:
192,650 UART: Running Caliptra ROM ...
193,839 UART:
603,435 UART: [state] CFI Enabled
620,862 UART: [state] LifecycleState = Production
622,637 UART: [state] DebugLocked = Yes
625,271 UART: [state] Starting the WD Timer 40000000 cycles
630,722 UART: [kat] SHA2-256
809,897 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,451 UART: [kat] ++
821,983 UART: [kat] sha1
832,889 UART: [kat] SHA2-256
835,893 UART: [kat] SHA2-384
841,117 UART: [kat] SHA2-512-ACC
844,057 UART: [kat] ECC-384
3,284,239 UART: [kat] HMAC-384Kdf
3,296,825 UART: [kat] LMS
3,826,393 UART: [kat] --
3,831,382 UART: [cold-reset] ++
3,833,884 UART: [fht] FHT @ 0x50003400
3,845,590 UART: [idev] ++
3,846,206 UART: [idev] CDI.KEYID = 6
3,847,132 UART: [idev] SUBJECT.KEYID = 7
3,848,306 UART: [idev] UDS.KEYID = 0
3,849,290 ready_for_fw is high
3,849,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,610 UART: [idev] Erasing UDS.KEYID = 0
6,321,236 UART: [idev] Sha1 KeyId Algorithm
6,343,355 UART: [idev] --
6,347,861 UART: [ldev] ++
6,348,441 UART: [ldev] CDI.KEYID = 6
6,349,354 UART: [ldev] SUBJECT.KEYID = 5
6,350,568 UART: [ldev] AUTHORITY.KEYID = 7
6,351,800 UART: [ldev] FE.KEYID = 1
6,363,255 UART: [ldev] Erasing FE.KEYID = 1
8,834,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,196 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,571,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,587,001 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,602,966 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,624,069 UART: [ldev] --
10,628,094 UART: [fwproc] Wait for Commands...
10,630,628 UART: [fwproc] Recv command 0x46574c44
10,632,719 UART: [fwproc] Recv'd Img size: 114084 bytes
14,060,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,133,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,202,748 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,518,962 >>> mbox cmd response: success
14,523,006 UART: [afmc] ++
14,523,622 UART: [afmc] CDI.KEYID = 6
14,524,512 UART: [afmc] SUBJECT.KEYID = 7
14,525,670 UART: [afmc] AUTHORITY.KEYID = 5
17,024,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,747,055 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,763,040 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,778,927 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,794,654 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,817,756 UART: [afmc] --
18,822,265 UART: [cold-reset] --
18,826,948 UART: [state] Locking Datavault
18,833,194 UART: [state] Locking PCR0, PCR1 and PCR31
18,834,850 UART: [state] Locking ICCM
18,837,166 UART: [exit] Launching FMC @ 0x40000130
18,845,575 UART:
18,845,817 UART: Running Caliptra FMC ...
18,846,919 UART:
18,847,078 UART: [state] CFI Enabled
18,855,025 UART: [fht] FMC Alias Private Key: 7
20,611,940 UART: [art] Extend RT PCRs Done
20,613,163 UART: [art] Lock RT PCRs Done
20,615,034 UART: [art] Populate DV Done
20,620,225 UART: [fht] FMC Alias Private Key: 7
20,621,879 UART: [art] Derive CDI
20,622,698 UART: [art] Store in in slot 0x4
20,665,621 UART: [art] Derive Key Pair
20,666,664 UART: [art] Store priv key in slot 0x5
23,093,380 UART: [art] Derive Key Pair - Done
23,106,166 UART: [art] Signing Cert with AUTHO
23,107,472 UART: RITY.KEYID = 7
24,813,048 UART: [art] Erasing AUTHORITY.KEYID = 7
24,814,569 UART: [art] PUB.X = 74827D2E101DCC2186D5C1F199937243B9C7EF52B05A353DEF1316321A8CE0B771312A3F765403B20AF32D1A856BA1B0
24,821,849 UART: [art] PUB.Y = 0AEA25B08A4C988788291BFE9358C6CFC6BEBD1890BB54DFF184E86DFD9DF3F72B81C8D4C884B4F1B34142C362676934
24,829,116 UART: [art] SIG.R = 0B93C9E8915890D38A407F1B705D7C1F55C4D8351A5569956A5F3D4BB54B6F06CB848AEE520046F66AE1EE4421EB705F
24,836,488 UART: [art] SIG.S = 6E823787BC3749C82F5C43F93DCC33D333E328DCAF317CCD54F13AC7CDDE56F655A3D78E2CDD09AD32F37E8A3DE20A7C
25,815,554 UART: Caliptra RT
25,816,269 UART: [state] CFI Enabled
25,933,698 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,006 UART:
1,271 UART: Running Caliptra ROM ...
2,380 UART:
14,593,827 UART: [state] CFI Enabled
14,608,376 UART: [state] LifecycleState = Production
14,610,140 UART: [state] DebugLocked = Yes
14,611,564 UART: [state] Starting the WD Timer 40000000 cycles
14,615,977 UART: [kat] SHA2-256
14,795,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,806,694 UART: [kat] ++
14,807,234 UART: [kat] sha1
14,816,725 UART: [kat] SHA2-256
14,819,798 UART: [kat] SHA2-384
14,825,084 UART: [kat] SHA2-512-ACC
14,828,086 UART: [kat] ECC-384
17,269,137 UART: [kat] HMAC-384Kdf
17,282,167 UART: [kat] LMS
17,811,703 UART: [kat] --
17,815,907 UART: [warm-reset] ++
17,821,246 UART: [warm-reset] --
17,825,665 UART: [state] Locking Datavault
17,828,634 UART: [state] Locking PCR0, PCR1 and PCR31
17,830,290 UART: [state] Locking ICCM
17,832,281 UART: [exit] Launching FMC @ 0x40000130
17,840,740 UART:
17,840,990 UART: Running Caliptra FMC ...
17,842,044 UART:
17,842,199 UART: [state] CFI Enabled
17,843,983 UART: [aliasrt :skip pcr extension
17,845,237 UART: [art] Extend RT PCRs Done
17,846,374 UART: [art] Lock RT PCRs Done
17,847,605 UART: [art] Populate DV Done
17,852,904 UART: [fht] FMC Alias Private Key: 7
17,854,597 UART: [art] Derive CDI
17,855,464 UART: [art] Store in in slot 0x4
17,897,723 UART: [art] Derive Key Pair
17,898,763 UART: [art] Store priv key in slot 0x5
20,325,021 UART: [art] Derive Key Pair - Done
20,337,932 UART: [art] Signing Cert with AUTHO
20,339,247 UART: RITY.KEYID = 7
22,044,701 UART: [art] Erasing AUTHORITY.KEYID = 7
22,046,213 UART: [art] PUB.X = 74827D2E101DCC2186D5C1F199937243B9C7EF52B05A353DEF1316321A8CE0B771312A3F765403B20AF32D1A856BA1B0
22,053,509 UART: [art] PUB.Y = 0AEA25B08A4C988788291BFE9358C6CFC6BEBD1890BB54DFF184E86DFD9DF3F72B81C8D4C884B4F1B34142C362676934
22,060,779 UART: [art] SIG.R = 0B93C9E8915890D38A407F1B705D7C1F55C4D8351A5569956A5F3D4BB54B6F06CB848AEE520046F66AE1EE4421EB705F
22,068,181 UART: [art] SIG.S = 6E823787BC3749C82F5C43F93DCC33D333E328DCAF317CCD54F13AC7CDDE56F655A3D78E2CDD09AD32F37E8A3DE20A7C
23,047,516 UART: Caliptra RT
23,048,220 UART: [state] CFI Enabled
23,336,102 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
192,353 UART:
192,732 UART: Running Caliptra ROM ...
193,934 UART:
603,316 UART: [state] CFI Enabled
615,484 UART: [state] LifecycleState = Production
617,184 UART: [state] DebugLocked = Yes
619,345 UART: [state] Starting the WD Timer 40000000 cycles
624,947 UART: [kat] SHA2-256
804,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,649 UART: [kat] ++
816,102 UART: [kat] sha1
827,138 UART: [kat] SHA2-256
830,226 UART: [kat] SHA2-384
836,713 UART: [kat] SHA2-512-ACC
839,656 UART: [kat] ECC-384
3,281,993 UART: [kat] HMAC-384Kdf
3,295,082 UART: [kat] LMS
3,824,568 UART: [kat] --
3,827,850 UART: [cold-reset] ++
3,829,002 UART: [fht] FHT @ 0x50003400
3,838,654 UART: [idev] ++
3,839,266 UART: [idev] CDI.KEYID = 6
3,840,177 UART: [idev] SUBJECT.KEYID = 7
3,841,362 UART: [idev] UDS.KEYID = 0
3,842,435 ready_for_fw is high
3,842,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,103 UART: [idev] Erasing UDS.KEYID = 0
6,316,991 UART: [idev] Sha1 KeyId Algorithm
6,339,031 UART: [idev] --
6,341,415 UART: [ldev] ++
6,341,998 UART: [ldev] CDI.KEYID = 6
6,342,919 UART: [ldev] SUBJECT.KEYID = 5
6,344,075 UART: [ldev] AUTHORITY.KEYID = 7
6,345,313 UART: [ldev] FE.KEYID = 1
6,356,772 UART: [ldev] Erasing FE.KEYID = 1
8,831,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,040 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,053 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,579,902 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,595,836 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,284 UART: [ldev] --
10,620,251 UART: [fwproc] Wait for Commands...
10,622,399 UART: [fwproc] Recv command 0x46574c44
10,624,494 UART: [fwproc] Recv'd Img size: 114084 bytes
14,043,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,495,123 >>> mbox cmd response: success
14,500,241 UART: [afmc] ++
14,500,856 UART: [afmc] CDI.KEYID = 6
14,501,774 UART: [afmc] SUBJECT.KEYID = 7
14,502,941 UART: [afmc] AUTHORITY.KEYID = 5
16,999,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,574 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,736,542 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,752,396 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,768,126 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,791,276 UART: [afmc] --
18,795,555 UART: [cold-reset] --
18,799,915 UART: [state] Locking Datavault
18,804,086 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,734 UART: [state] Locking ICCM
18,806,727 UART: [exit] Launching FMC @ 0x40000130
18,815,186 UART:
18,815,432 UART: Running Caliptra FMC ...
18,816,537 UART:
18,816,696 UART: [state] CFI Enabled
18,824,693 UART: [fht] FMC Alias Private Key: 7
20,581,264 UART: [art] Extend RT PCRs Done
20,582,504 UART: [art] Lock RT PCRs Done
20,584,054 UART: [art] Populate DV Done
20,589,198 UART: [fht] FMC Alias Private Key: 7
20,590,786 UART: [art] Derive CDI
20,591,529 UART: [art] Store in in slot 0x4
20,634,234 UART: [art] Derive Key Pair
20,635,281 UART: [art] Store priv key in slot 0x5
23,061,997 UART: [art] Derive Key Pair - Done
23,075,047 UART: [art] Signing Cert with AUTHO
23,076,363 UART: RITY.KEYID = 7
24,781,237 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,732 UART: [art] PUB.X = 2C4E938ED3ABE0B37419EBA0A36E02C89A91181FEE90C0F1464C3A0677BAE2ED34C81052DCA740E11CAAB17029505A5C
24,790,036 UART: [art] PUB.Y = 77B44891D525F94CBE87C85C8964E443BAC0AD544C0090BA8B8EE45A947099FDF57FEF609FB849EAB841B56DD3E2389F
24,797,305 UART: [art] SIG.R = 73F14C763DFAFD582E5D5B50DEAF147BD476038AB26F5A096F3FFEAB4B630E3CDAC7A275B33DA5F739A3DFA47308CAB8
24,804,701 UART: [art] SIG.S = CCF24E8D88A3B57F7CC308CC9678B0B49EF33BAB62AFA1028B993FCF20F4A320E0766DCCA3D8831FBF282D6574761310
25,783,777 UART: Caliptra RT
25,784,494 UART: [state] CFI Enabled
25,901,961 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,005 UART:
1,275 UART: Running Caliptra ROM ...
2,386 UART:
14,629,917 UART: [state] CFI Enabled
14,645,613 UART: [state] LifecycleState = Production
14,647,449 UART: [state] DebugLocked = Yes
14,649,376 UART: [state] Starting the WD Timer 40000000 cycles
14,654,390 UART: [kat] SHA2-256
14,833,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,845,060 UART: [kat] ++
14,845,612 UART: [kat] sha1
14,857,485 UART: [kat] SHA2-256
14,860,551 UART: [kat] SHA2-384
14,868,230 UART: [kat] SHA2-512-ACC
14,871,186 UART: [kat] ECC-384
17,311,902 UART: [kat] HMAC-384Kdf
17,325,099 UART: [kat] LMS
17,854,610 UART: [kat] --
17,858,136 UART: [warm-reset] ++
17,862,499 UART: [warm-reset] --
17,867,279 UART: [state] Locking Datavault
17,870,693 UART: [state] Locking PCR0, PCR1 and PCR31
17,872,349 UART: [state] Locking ICCM
17,874,907 UART: [exit] Launching FMC @ 0x40000130
17,883,361 UART:
17,883,599 UART: Running Caliptra FMC ...
17,884,631 UART:
17,884,779 UART: [state] CFI Enabled
17,886,672 UART: [aliasrt :skip pcr extension
17,887,939 UART: [art] Extend RT PCRs Done
17,889,080 UART: [art] Lock RT PCRs Done
17,890,207 UART: [art] Populate DV Done
17,895,886 UART: [fht] FMC Alias Private Key: 7
17,897,534 UART: [art] Derive CDI
17,898,347 UART: [art] Store in in slot 0x4
17,941,543 UART: [art] Derive Key Pair
17,942,587 UART: [art] Store priv key in slot 0x5
20,369,622 UART: [art] Derive Key Pair - Done
20,382,622 UART: [art] Signing Cert with AUTHO
20,383,932 UART: RITY.KEYID = 7
22,089,273 UART: [art] Erasing AUTHORITY.KEYID = 7
22,090,787 UART: [art] PUB.X = 2C4E938ED3ABE0B37419EBA0A36E02C89A91181FEE90C0F1464C3A0677BAE2ED34C81052DCA740E11CAAB17029505A5C
22,098,023 UART: [art] PUB.Y = 77B44891D525F94CBE87C85C8964E443BAC0AD544C0090BA8B8EE45A947099FDF57FEF609FB849EAB841B56DD3E2389F
22,105,301 UART: [art] SIG.R = 73F14C763DFAFD582E5D5B50DEAF147BD476038AB26F5A096F3FFEAB4B630E3CDAC7A275B33DA5F739A3DFA47308CAB8
22,112,688 UART: [art] SIG.S = CCF24E8D88A3B57F7CC308CC9678B0B49EF33BAB62AFA1028B993FCF20F4A320E0766DCCA3D8831FBF282D6574761310
23,091,730 UART: Caliptra RT
23,092,428 UART: [state] CFI Enabled
23,380,592 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Production
86,293 UART: [state] DebugLocked = Yes
87,033 UART: [state] Starting the WD Timer 40000000 cycles
88,714 UART: [kat] SHA2-256
892,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,393 UART: [kat] ++
896,545 UART: [kat] sha1
900,801 UART: [kat] SHA2-256
902,741 UART: [kat] SHA2-384
905,468 UART: [kat] SHA2-512-ACC
907,369 UART: [kat] ECC-384
917,438 UART: [kat] HMAC-384Kdf
921,844 UART: [kat] LMS
1,170,156 UART: [kat] --
1,171,293 UART: [cold-reset] ++
1,171,764 UART: [fht] FHT @ 0x50003400
1,174,402 UART: [idev] ++
1,174,570 UART: [idev] CDI.KEYID = 6
1,174,931 UART: [idev] SUBJECT.KEYID = 7
1,175,356 UART: [idev] UDS.KEYID = 0
1,175,702 ready_for_fw is high
1,175,702 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,185 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,953 UART: [idev] --
1,209,980 UART: [ldev] ++
1,210,148 UART: [ldev] CDI.KEYID = 6
1,210,512 UART: [ldev] SUBJECT.KEYID = 5
1,210,939 UART: [ldev] AUTHORITY.KEYID = 7
1,211,402 UART: [ldev] FE.KEYID = 1
1,216,422 UART: [ldev] Erasing FE.KEYID = 1
1,243,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,543 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,237 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,107 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,813 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,025 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,148 UART: [fwproc] Recv command 0x46574c44
1,283,881 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,459 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,014 >>> mbox cmd response: success
2,796,270 UART: [afmc] ++
2,796,438 UART: [afmc] CDI.KEYID = 6
2,796,801 UART: [afmc] SUBJECT.KEYID = 7
2,797,227 UART: [afmc] AUTHORITY.KEYID = 5
2,832,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,145 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,864 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,757 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,464 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,231 UART: [afmc] --
2,876,264 UART: [cold-reset] --
2,876,928 UART: [state] Locking Datavault
2,878,213 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,817 UART: [state] Locking ICCM
2,879,337 UART: [exit] Launching FMC @ 0x40000130
2,884,666 UART:
2,884,682 UART: Running Caliptra FMC ...
2,885,090 UART:
2,885,144 UART: [state] CFI Enabled
2,895,879 UART: [fht] FMC Alias Private Key: 7
3,003,858 UART: [art] Extend RT PCRs Done
3,004,286 UART: [art] Lock RT PCRs Done
3,005,658 UART: [art] Populate DV Done
3,013,486 UART: [fht] FMC Alias Private Key: 7
3,014,640 UART: [art] Derive CDI
3,014,920 UART: [art] Store in in slot 0x4
3,100,585 UART: [art] Derive Key Pair
3,100,945 UART: [art] Store priv key in slot 0x5
3,113,991 UART: [art] Derive Key Pair - Done
3,128,479 UART: [art] Signing Cert with AUTHO
3,128,959 UART: RITY.KEYID = 7
3,144,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,144,838 UART: [art] PUB.X = 00ED1EE2538EA4A392F5D84314AB89743FC1CF8A89384AE19BDC709264817F78471A612587F7F847396E4CEDE8626564
3,151,584 UART: [art] PUB.Y = 7B30BFAE4E032F55D827D92C6907CCFB4FCECB48817D93AF0B11BAF86AD7E2114BF3C3CFBADAAD483738D95BFD229CA2
3,158,555 UART: [art] SIG.R = 8A813A191B7EED0B1A5689302EDB20796E50031EC1846F8DBBBC839C9DCC7C4E15848FAC81033A3218728DE24283860A
3,165,317 UART: [art] SIG.S = 55F4C174E986E2118F10474D8773A1E2DCDA0D98B499CD45E98E5ABF3F4108BB3376BD9284FA1CBBA81DC25623A84295
3,188,400 UART: Caliptra RT
3,188,653 UART: [state] CFI Enabled
3,297,088 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,844 UART:
3,297,860 UART: Running Caliptra ROM ...
3,298,268 UART:
3,298,323 UART: [state] CFI Enabled
3,300,950 UART: [state] LifecycleState = Production
3,301,558 UART: [state] DebugLocked = Yes
3,302,196 UART: [state] Starting the WD Timer 40000000 cycles
3,303,681 UART: [kat] SHA2-256
4,107,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,360 UART: [kat] ++
4,111,512 UART: [kat] sha1
4,115,752 UART: [kat] SHA2-256
4,117,692 UART: [kat] SHA2-384
4,120,519 UART: [kat] SHA2-512-ACC
4,122,420 UART: [kat] ECC-384
4,131,929 UART: [kat] HMAC-384Kdf
4,136,321 UART: [kat] LMS
4,384,633 UART: [kat] --
4,385,615 UART: [warm-reset] ++
4,386,472 UART: [warm-reset] --
4,387,239 UART: [state] Locking Datavault
4,387,979 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,583 UART: [state] Locking ICCM
4,389,177 UART: [exit] Launching FMC @ 0x40000130
4,394,506 UART:
4,394,522 UART: Running Caliptra FMC ...
4,394,930 UART:
4,394,984 UART: [state] CFI Enabled
4,396,017 UART: [aliasrt :skip pcr extension
4,396,490 UART: [art] Extend RT PCRs Done
4,396,918 UART: [art] Lock RT PCRs Done
4,398,127 UART: [art] Populate DV Done
4,406,235 UART: [fht] FMC Alias Private Key: 7
4,407,171 UART: [art] Derive CDI
4,407,451 UART: [art] Store in in slot 0x4
4,492,978 UART: [art] Derive Key Pair
4,493,338 UART: [art] Store priv key in slot 0x5
4,506,646 UART: [art] Derive Key Pair - Done
4,521,660 UART: [art] Signing Cert with AUTHO
4,522,140 UART: RITY.KEYID = 7
4,536,872 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,637 UART: [art] PUB.X = 00ED1EE2538EA4A392F5D84314AB89743FC1CF8A89384AE19BDC709264817F78471A612587F7F847396E4CEDE8626564
4,544,383 UART: [art] PUB.Y = 7B30BFAE4E032F55D827D92C6907CCFB4FCECB48817D93AF0B11BAF86AD7E2114BF3C3CFBADAAD483738D95BFD229CA2
4,551,354 UART: [art] SIG.R = 8A813A191B7EED0B1A5689302EDB20796E50031EC1846F8DBBBC839C9DCC7C4E15848FAC81033A3218728DE24283860A
4,558,116 UART: [art] SIG.S = 55F4C174E986E2118F10474D8773A1E2DCDA0D98B499CD45E98E5ABF3F4108BB3376BD9284FA1CBBA81DC25623A84295
4,582,183 UART: Caliptra RT
4,582,436 UART: [state] CFI Enabled
4,864,361 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Production
85,669 UART: [state] DebugLocked = Yes
86,229 UART: [state] Starting the WD Timer 40000000 cycles
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,559 UART: [kat] ++
895,711 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
915,998 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,199,318 UART: [idev] Sha1 KeyId Algorithm
1,208,191 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,954 UART: [ldev] Erasing FE.KEYID = 1
1,242,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,793 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,487 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,357 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,063 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,149 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,290 UART: [fwproc] Recv command 0x46574c44
1,283,023 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,272 >>> mbox cmd response: success
2,795,384 UART: [afmc] ++
2,795,552 UART: [afmc] CDI.KEYID = 6
2,795,915 UART: [afmc] SUBJECT.KEYID = 7
2,796,341 UART: [afmc] AUTHORITY.KEYID = 5
2,831,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,741 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,460 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,353 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,060 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,799 UART: [afmc] --
2,874,904 UART: [cold-reset] --
2,875,850 UART: [state] Locking Datavault
2,876,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,591 UART: [state] Locking ICCM
2,878,155 UART: [exit] Launching FMC @ 0x40000130
2,883,484 UART:
2,883,500 UART: Running Caliptra FMC ...
2,883,908 UART:
2,883,962 UART: [state] CFI Enabled
2,894,373 UART: [fht] FMC Alias Private Key: 7
3,002,214 UART: [art] Extend RT PCRs Done
3,002,642 UART: [art] Lock RT PCRs Done
3,003,952 UART: [art] Populate DV Done
3,012,088 UART: [fht] FMC Alias Private Key: 7
3,013,032 UART: [art] Derive CDI
3,013,312 UART: [art] Store in in slot 0x4
3,099,075 UART: [art] Derive Key Pair
3,099,435 UART: [art] Store priv key in slot 0x5
3,112,455 UART: [art] Derive Key Pair - Done
3,126,978 UART: [art] Signing Cert with AUTHO
3,127,458 UART: RITY.KEYID = 7
3,142,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,433 UART: [art] PUB.X = 7D9F6F787BC25ECC465EFA5ABC32AACB53168D116EAD95A1BD96D0B1CC0E78220267C5C333D3820E3B2FEC3633D85451
3,150,210 UART: [art] PUB.Y = 8C199DA2A29E04430915BC2DDF0C0526C033DD328C13D2070C158031CFF519FD2E0916FAA1417DA45CE1033E12EE2CAA
3,157,146 UART: [art] SIG.R = 3119FB99E5A0A731F8C7E51175CB9A6440A9A7CCA8EDF158B2461330B0B90E0544C8E5D9F838EBEB26F3D495979CB657
3,163,918 UART: [art] SIG.S = 8667A37787994CABA4A0BD8D6838214CF20744C079CCF9247D8EFF9F19CDA7C22DA770F1E0DC1EE566871D36DCCCDBDF
3,187,730 UART: Caliptra RT
3,187,983 UART: [state] CFI Enabled
3,295,624 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,380 UART:
3,296,396 UART: Running Caliptra ROM ...
3,296,804 UART:
3,296,859 UART: [state] CFI Enabled
3,299,500 UART: [state] LifecycleState = Production
3,300,108 UART: [state] DebugLocked = Yes
3,300,696 UART: [state] Starting the WD Timer 40000000 cycles
3,302,331 UART: [kat] SHA2-256
4,105,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,010 UART: [kat] ++
4,110,162 UART: [kat] sha1
4,114,564 UART: [kat] SHA2-256
4,116,504 UART: [kat] SHA2-384
4,119,197 UART: [kat] SHA2-512-ACC
4,121,098 UART: [kat] ECC-384
4,130,523 UART: [kat] HMAC-384Kdf
4,135,065 UART: [kat] LMS
4,383,377 UART: [kat] --
4,384,121 UART: [warm-reset] ++
4,385,112 UART: [warm-reset] --
4,385,925 UART: [state] Locking Datavault
4,386,815 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,419 UART: [state] Locking ICCM
4,388,089 UART: [exit] Launching FMC @ 0x40000130
4,393,418 UART:
4,393,434 UART: Running Caliptra FMC ...
4,393,842 UART:
4,393,896 UART: [state] CFI Enabled
4,394,975 UART: [aliasrt :skip pcr extension
4,395,448 UART: [art] Extend RT PCRs Done
4,395,876 UART: [art] Lock RT PCRs Done
4,396,957 UART: [art] Populate DV Done
4,405,109 UART: [fht] FMC Alias Private Key: 7
4,406,135 UART: [art] Derive CDI
4,406,415 UART: [art] Store in in slot 0x4
4,492,038 UART: [art] Derive Key Pair
4,492,398 UART: [art] Store priv key in slot 0x5
4,505,158 UART: [art] Derive Key Pair - Done
4,520,419 UART: [art] Signing Cert with AUTHO
4,520,899 UART: RITY.KEYID = 7
4,536,433 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,198 UART: [art] PUB.X = 7D9F6F787BC25ECC465EFA5ABC32AACB53168D116EAD95A1BD96D0B1CC0E78220267C5C333D3820E3B2FEC3633D85451
4,543,975 UART: [art] PUB.Y = 8C199DA2A29E04430915BC2DDF0C0526C033DD328C13D2070C158031CFF519FD2E0916FAA1417DA45CE1033E12EE2CAA
4,550,911 UART: [art] SIG.R = 3119FB99E5A0A731F8C7E51175CB9A6440A9A7CCA8EDF158B2461330B0B90E0544C8E5D9F838EBEB26F3D495979CB657
4,557,683 UART: [art] SIG.S = 8667A37787994CABA4A0BD8D6838214CF20744C079CCF9247D8EFF9F19CDA7C22DA770F1E0DC1EE566871D36DCCCDBDF
4,581,175 UART: Caliptra RT
4,581,428 UART: [state] CFI Enabled
4,861,947 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Production
86,014 UART: [state] DebugLocked = Yes
86,530 UART: [state] Starting the WD Timer 40000000 cycles
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,880 UART: [kat] ++
896,032 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
905,047 UART: [kat] SHA2-512-ACC
906,948 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,385 UART: [kat] LMS
1,169,697 UART: [kat] --
1,170,572 UART: [cold-reset] ++
1,170,941 UART: [fht] FHT @ 0x50003400
1,173,715 UART: [idev] ++
1,173,883 UART: [idev] CDI.KEYID = 6
1,174,244 UART: [idev] SUBJECT.KEYID = 7
1,174,669 UART: [idev] UDS.KEYID = 0
1,175,015 ready_for_fw is high
1,175,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,695 UART: [idev] Sha1 KeyId Algorithm
1,208,608 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,242,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,074 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,944 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,650 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,718 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,889 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,477 >>> mbox cmd response: success
2,795,545 UART: [afmc] ++
2,795,713 UART: [afmc] CDI.KEYID = 6
2,796,076 UART: [afmc] SUBJECT.KEYID = 7
2,796,502 UART: [afmc] AUTHORITY.KEYID = 5
2,832,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,792 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,511 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,404 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,111 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,966 UART: [afmc] --
2,876,007 UART: [cold-reset] --
2,876,977 UART: [state] Locking Datavault
2,878,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,660 UART: [state] Locking ICCM
2,879,238 UART: [exit] Launching FMC @ 0x40000130
2,884,567 UART:
2,884,583 UART: Running Caliptra FMC ...
2,884,991 UART:
2,885,134 UART: [state] CFI Enabled
2,895,641 UART: [fht] FMC Alias Private Key: 7
3,003,710 UART: [art] Extend RT PCRs Done
3,004,138 UART: [art] Lock RT PCRs Done
3,005,922 UART: [art] Populate DV Done
3,014,082 UART: [fht] FMC Alias Private Key: 7
3,015,170 UART: [art] Derive CDI
3,015,450 UART: [art] Store in in slot 0x4
3,101,131 UART: [art] Derive Key Pair
3,101,491 UART: [art] Store priv key in slot 0x5
3,114,803 UART: [art] Derive Key Pair - Done
3,129,732 UART: [art] Signing Cert with AUTHO
3,130,212 UART: RITY.KEYID = 7
3,145,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,375 UART: [art] PUB.X = 00ECFB81B4B45A52BA49507FDDFC144D3720141E5E4DAA9B8B7102C64FCE3BB5D309732BBA0237A11E4111A42D182985
3,153,124 UART: [art] PUB.Y = 0D007CF0D118A044006273816FF3AED65D9576D2D7202179BE530F7EC7AA9F35712B003D19913122FBA9F6D7D55A22DE
3,160,004 UART: [art] SIG.R = FA417043C701E93E4D257C5D5C6826BE91EAB8BEF8A40C78E8A0A7E48CE5A04F69208672660A499C012B5BC2B10907B0
3,166,762 UART: [art] SIG.S = F60C4FF041033FD12F993897329829B1F1D4D48D5EABDEEE19800F414C5160D83873A9833029D21653E5B46C740A6F56
3,190,207 UART: Caliptra RT
3,190,552 UART: [state] CFI Enabled
3,298,921 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,677 UART:
3,299,693 UART: Running Caliptra ROM ...
3,300,101 UART:
3,300,243 UART: [state] CFI Enabled
3,303,250 UART: [state] LifecycleState = Production
3,303,858 UART: [state] DebugLocked = Yes
3,304,426 UART: [state] Starting the WD Timer 40000000 cycles
3,305,983 UART: [kat] SHA2-256
4,109,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,662 UART: [kat] ++
4,113,814 UART: [kat] sha1
4,118,082 UART: [kat] SHA2-256
4,120,022 UART: [kat] SHA2-384
4,122,861 UART: [kat] SHA2-512-ACC
4,124,762 UART: [kat] ECC-384
4,134,549 UART: [kat] HMAC-384Kdf
4,139,245 UART: [kat] LMS
4,387,557 UART: [kat] --
4,388,317 UART: [warm-reset] ++
4,389,188 UART: [warm-reset] --
4,389,909 UART: [state] Locking Datavault
4,390,787 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,391 UART: [state] Locking ICCM
4,391,901 UART: [exit] Launching FMC @ 0x40000130
4,397,230 UART:
4,397,246 UART: Running Caliptra FMC ...
4,397,654 UART:
4,397,797 UART: [state] CFI Enabled
4,398,980 UART: [aliasrt :skip pcr extension
4,399,453 UART: [art] Extend RT PCRs Done
4,399,881 UART: [art] Lock RT PCRs Done
4,401,166 UART: [art] Populate DV Done
4,409,196 UART: [fht] FMC Alias Private Key: 7
4,410,136 UART: [art] Derive CDI
4,410,416 UART: [art] Store in in slot 0x4
4,496,207 UART: [art] Derive Key Pair
4,496,567 UART: [art] Store priv key in slot 0x5
4,509,845 UART: [art] Derive Key Pair - Done
4,524,774 UART: [art] Signing Cert with AUTHO
4,525,254 UART: RITY.KEYID = 7
4,540,384 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,149 UART: [art] PUB.X = 00ECFB81B4B45A52BA49507FDDFC144D3720141E5E4DAA9B8B7102C64FCE3BB5D309732BBA0237A11E4111A42D182985
4,547,898 UART: [art] PUB.Y = 0D007CF0D118A044006273816FF3AED65D9576D2D7202179BE530F7EC7AA9F35712B003D19913122FBA9F6D7D55A22DE
4,554,778 UART: [art] SIG.R = FA417043C701E93E4D257C5D5C6826BE91EAB8BEF8A40C78E8A0A7E48CE5A04F69208672660A499C012B5BC2B10907B0
4,561,536 UART: [art] SIG.S = F60C4FF041033FD12F993897329829B1F1D4D48D5EABDEEE19800F414C5160D83873A9833029D21653E5B46C740A6F56
4,585,245 UART: Caliptra RT
4,585,590 UART: [state] CFI Enabled
4,867,799 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Production
85,956 UART: [state] DebugLocked = Yes
86,674 UART: [state] Starting the WD Timer 40000000 cycles
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,020 UART: [kat] ++
896,172 UART: [kat] sha1
900,542 UART: [kat] SHA2-256
902,482 UART: [kat] SHA2-384
905,297 UART: [kat] SHA2-512-ACC
907,198 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,615 UART: [kat] LMS
1,169,927 UART: [kat] --
1,170,698 UART: [cold-reset] ++
1,171,051 UART: [fht] FHT @ 0x50003400
1,173,817 UART: [idev] ++
1,173,985 UART: [idev] CDI.KEYID = 6
1,174,346 UART: [idev] SUBJECT.KEYID = 7
1,174,771 UART: [idev] UDS.KEYID = 0
1,175,117 ready_for_fw is high
1,175,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,199,483 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,474 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,344 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,050 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,238 UART: [ldev] --
1,282,698 UART: [fwproc] Wait for Commands...
1,283,279 UART: [fwproc] Recv command 0x46574c44
1,284,012 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,725 >>> mbox cmd response: success
2,796,795 UART: [afmc] ++
2,796,963 UART: [afmc] CDI.KEYID = 6
2,797,326 UART: [afmc] SUBJECT.KEYID = 7
2,797,752 UART: [afmc] AUTHORITY.KEYID = 5
2,833,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,694 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,413 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,306 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,013 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,772 UART: [afmc] --
2,876,863 UART: [cold-reset] --
2,877,605 UART: [state] Locking Datavault
2,878,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,440 UART: [state] Locking ICCM
2,880,064 UART: [exit] Launching FMC @ 0x40000130
2,885,393 UART:
2,885,409 UART: Running Caliptra FMC ...
2,885,817 UART:
2,885,960 UART: [state] CFI Enabled
2,896,627 UART: [fht] FMC Alias Private Key: 7
3,004,806 UART: [art] Extend RT PCRs Done
3,005,234 UART: [art] Lock RT PCRs Done
3,006,944 UART: [art] Populate DV Done
3,014,928 UART: [fht] FMC Alias Private Key: 7
3,015,966 UART: [art] Derive CDI
3,016,246 UART: [art] Store in in slot 0x4
3,101,663 UART: [art] Derive Key Pair
3,102,023 UART: [art] Store priv key in slot 0x5
3,115,651 UART: [art] Derive Key Pair - Done
3,130,546 UART: [art] Signing Cert with AUTHO
3,131,026 UART: RITY.KEYID = 7
3,146,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,799 UART: [art] PUB.X = E84417D878FA4B4A63178C1B2118467327B40459FE646DD817E013F73A0EDEF0619AF386857B000C7622897D9DE2966A
3,153,532 UART: [art] PUB.Y = CEE543C7A3060104C404AF14DEE4CA96F9A1D7F62B0377016756A50C5AE1E5236AF25E753411BBBD0F4D724BC60E9BA0
3,160,467 UART: [art] SIG.R = 0A20DF7933081339B33BD74DADD99EFBE02151A038A17584CA1AEBC64AF0EBF4B44C5391ED5BBCF026D149917EABB188
3,167,249 UART: [art] SIG.S = 4BA904F54725C9BD2B76DCAB07EBBCE00BA7C49F0301CA198F8E99B6607A56A3B325693BA9C5F1AEE79623EF3B199448
3,191,047 UART: Caliptra RT
3,191,392 UART: [state] CFI Enabled
3,299,792 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,548 UART:
3,300,564 UART: Running Caliptra ROM ...
3,300,972 UART:
3,301,114 UART: [state] CFI Enabled
3,304,007 UART: [state] LifecycleState = Production
3,304,615 UART: [state] DebugLocked = Yes
3,305,181 UART: [state] Starting the WD Timer 40000000 cycles
3,306,646 UART: [kat] SHA2-256
4,110,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,325 UART: [kat] ++
4,114,477 UART: [kat] sha1
4,118,783 UART: [kat] SHA2-256
4,120,723 UART: [kat] SHA2-384
4,123,654 UART: [kat] SHA2-512-ACC
4,125,555 UART: [kat] ECC-384
4,135,644 UART: [kat] HMAC-384Kdf
4,140,376 UART: [kat] LMS
4,388,688 UART: [kat] --
4,389,478 UART: [warm-reset] ++
4,390,367 UART: [warm-reset] --
4,391,116 UART: [state] Locking Datavault
4,391,910 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,514 UART: [state] Locking ICCM
4,393,140 UART: [exit] Launching FMC @ 0x40000130
4,398,469 UART:
4,398,485 UART: Running Caliptra FMC ...
4,398,893 UART:
4,399,036 UART: [state] CFI Enabled
4,400,451 UART: [aliasrt :skip pcr extension
4,400,924 UART: [art] Extend RT PCRs Done
4,401,352 UART: [art] Lock RT PCRs Done
4,402,535 UART: [art] Populate DV Done
4,410,679 UART: [fht] FMC Alias Private Key: 7
4,411,823 UART: [art] Derive CDI
4,412,103 UART: [art] Store in in slot 0x4
4,498,078 UART: [art] Derive Key Pair
4,498,438 UART: [art] Store priv key in slot 0x5
4,512,154 UART: [art] Derive Key Pair - Done
4,526,745 UART: [art] Signing Cert with AUTHO
4,527,225 UART: RITY.KEYID = 7
4,542,731 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,496 UART: [art] PUB.X = E84417D878FA4B4A63178C1B2118467327B40459FE646DD817E013F73A0EDEF0619AF386857B000C7622897D9DE2966A
4,550,229 UART: [art] PUB.Y = CEE543C7A3060104C404AF14DEE4CA96F9A1D7F62B0377016756A50C5AE1E5236AF25E753411BBBD0F4D724BC60E9BA0
4,557,164 UART: [art] SIG.R = 0A20DF7933081339B33BD74DADD99EFBE02151A038A17584CA1AEBC64AF0EBF4B44C5391ED5BBCF026D149917EABB188
4,563,946 UART: [art] SIG.S = 4BA904F54725C9BD2B76DCAB07EBBCE00BA7C49F0301CA198F8E99B6607A56A3B325693BA9C5F1AEE79623EF3B199448
4,587,452 UART: Caliptra RT
4,587,797 UART: [state] CFI Enabled
4,867,611 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Production
85,681 UART: [state] DebugLocked = Yes
86,245 UART: [state] Starting the WD Timer 40000000 cycles
87,872 UART: [kat] SHA2-256
891,422 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,281 UART: [cold-reset] ++
1,169,684 UART: [fht] FHT @ 0x50003400
1,172,300 UART: [idev] ++
1,172,468 UART: [idev] CDI.KEYID = 6
1,172,829 UART: [idev] SUBJECT.KEYID = 7
1,173,254 UART: [idev] UDS.KEYID = 0
1,173,600 ready_for_fw is high
1,173,600 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,250 UART: [idev] Sha1 KeyId Algorithm
1,207,039 UART: [idev] --
1,208,122 UART: [ldev] ++
1,208,290 UART: [ldev] CDI.KEYID = 6
1,208,654 UART: [ldev] SUBJECT.KEYID = 5
1,209,081 UART: [ldev] AUTHORITY.KEYID = 7
1,209,544 UART: [ldev] FE.KEYID = 1
1,214,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,815 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,509 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,379 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,085 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,047 UART: [ldev] --
1,280,513 UART: [fwproc] Wait for Commands...
1,281,118 UART: [fwproc] Recv command 0x46574c44
1,281,851 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,627,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,656,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,792,086 >>> mbox cmd response: success
2,793,278 UART: [afmc] ++
2,793,446 UART: [afmc] CDI.KEYID = 6
2,793,809 UART: [afmc] SUBJECT.KEYID = 7
2,794,235 UART: [afmc] AUTHORITY.KEYID = 5
2,830,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,846,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,847,343 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,062 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,858,955 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,864,662 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,872,475 UART: [afmc] --
2,873,398 UART: [cold-reset] --
2,874,458 UART: [state] Locking Datavault
2,875,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,359 UART: [state] Locking ICCM
2,876,947 UART: [exit] Launching FMC @ 0x40000130
2,882,276 UART:
2,882,292 UART: Running Caliptra FMC ...
2,882,700 UART:
2,882,754 UART: [state] CFI Enabled
2,893,171 UART: [fht] FMC Alias Private Key: 7
3,001,382 UART: [art] Extend RT PCRs Done
3,001,810 UART: [art] Lock RT PCRs Done
3,003,440 UART: [art] Populate DV Done
3,011,524 UART: [fht] FMC Alias Private Key: 7
3,012,614 UART: [art] Derive CDI
3,012,894 UART: [art] Store in in slot 0x4
3,098,959 UART: [art] Derive Key Pair
3,099,319 UART: [art] Store priv key in slot 0x5
3,112,807 UART: [art] Derive Key Pair - Done
3,127,436 UART: [art] Signing Cert with AUTHO
3,127,916 UART: RITY.KEYID = 7
3,142,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,587 UART: [art] PUB.X = B3B121F96EFAD188A490EFA3D9D296EFA3A86639D55AA2CE89AF5E0A31F60DFAC6BCE05CEC712CE2C4113D55EA331EC3
3,150,379 UART: [art] PUB.Y = F26CE5D5859076C9E97FEF7C65E9B2777B2DAD3BCF0535555B17BBE11570E68B471D813C51E3013E959E0D5138DFE8FA
3,157,330 UART: [art] SIG.R = FB8DE9C4D43E89980BA2ACAC86AD4877BA4CAB3B1FE6193B5721FA4363DA91343BC30F5859E0AA6C36154D4D108F89F0
3,164,110 UART: [art] SIG.S = 2B62DE25F7BC84830881ADFD96981EA64A8C972DE1D991D6AACC7A4BE1B74B3A907CD87248A855314E05ECE71365289D
3,188,311 UART: Caliptra RT
3,188,564 UART: [state] CFI Enabled
3,295,995 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,751 UART:
3,296,767 UART: Running Caliptra ROM ...
3,297,175 UART:
3,297,230 UART: [state] CFI Enabled
3,299,883 UART: [state] LifecycleState = Production
3,300,491 UART: [state] DebugLocked = Yes
3,301,131 UART: [state] Starting the WD Timer 40000000 cycles
3,302,768 UART: [kat] SHA2-256
4,106,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,447 UART: [kat] ++
4,110,599 UART: [kat] sha1
4,114,983 UART: [kat] SHA2-256
4,116,923 UART: [kat] SHA2-384
4,119,498 UART: [kat] SHA2-512-ACC
4,121,399 UART: [kat] ECC-384
4,130,756 UART: [kat] HMAC-384Kdf
4,135,324 UART: [kat] LMS
4,383,636 UART: [kat] --
4,384,732 UART: [warm-reset] ++
4,385,735 UART: [warm-reset] --
4,386,632 UART: [state] Locking Datavault
4,387,542 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,146 UART: [state] Locking ICCM
4,388,592 UART: [exit] Launching FMC @ 0x40000130
4,393,921 UART:
4,393,937 UART: Running Caliptra FMC ...
4,394,345 UART:
4,394,399 UART: [state] CFI Enabled
4,395,804 UART: [aliasrt :skip pcr extension
4,396,277 UART: [art] Extend RT PCRs Done
4,396,705 UART: [art] Lock RT PCRs Done
4,397,764 UART: [art] Populate DV Done
4,406,234 UART: [fht] FMC Alias Private Key: 7
4,407,324 UART: [art] Derive CDI
4,407,604 UART: [art] Store in in slot 0x4
4,493,225 UART: [art] Derive Key Pair
4,493,585 UART: [art] Store priv key in slot 0x5
4,506,557 UART: [art] Derive Key Pair - Done
4,521,606 UART: [art] Signing Cert with AUTHO
4,522,086 UART: RITY.KEYID = 7
4,537,700 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,465 UART: [art] PUB.X = B3B121F96EFAD188A490EFA3D9D296EFA3A86639D55AA2CE89AF5E0A31F60DFAC6BCE05CEC712CE2C4113D55EA331EC3
4,545,257 UART: [art] PUB.Y = F26CE5D5859076C9E97FEF7C65E9B2777B2DAD3BCF0535555B17BBE11570E68B471D813C51E3013E959E0D5138DFE8FA
4,552,208 UART: [art] SIG.R = FB8DE9C4D43E89980BA2ACAC86AD4877BA4CAB3B1FE6193B5721FA4363DA91343BC30F5859E0AA6C36154D4D108F89F0
4,558,988 UART: [art] SIG.S = 2B62DE25F7BC84830881ADFD96981EA64A8C972DE1D991D6AACC7A4BE1B74B3A907CD87248A855314E05ECE71365289D
4,582,469 UART: Caliptra RT
4,582,722 UART: [state] CFI Enabled
4,867,709 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,581 UART: [state] LifecycleState = Production
85,189 UART: [state] DebugLocked = Yes
85,941 UART: [state] Starting the WD Timer 40000000 cycles
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,169,970 UART: [fht] FHT @ 0x50003400
1,172,550 UART: [idev] ++
1,172,718 UART: [idev] CDI.KEYID = 6
1,173,079 UART: [idev] SUBJECT.KEYID = 7
1,173,504 UART: [idev] UDS.KEYID = 0
1,173,850 ready_for_fw is high
1,173,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,261 UART: [idev] Erasing UDS.KEYID = 0
1,198,090 UART: [idev] Sha1 KeyId Algorithm
1,206,933 UART: [idev] --
1,207,986 UART: [ldev] ++
1,208,154 UART: [ldev] CDI.KEYID = 6
1,208,518 UART: [ldev] SUBJECT.KEYID = 5
1,208,945 UART: [ldev] AUTHORITY.KEYID = 7
1,209,408 UART: [ldev] FE.KEYID = 1
1,214,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,879 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,573 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,443 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,149 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,123 UART: [ldev] --
1,280,497 UART: [fwproc] Wait for Commands...
1,281,098 UART: [fwproc] Recv command 0x46574c44
1,281,831 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,628,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,792,984 >>> mbox cmd response: success
2,794,016 UART: [afmc] ++
2,794,184 UART: [afmc] CDI.KEYID = 6
2,794,547 UART: [afmc] SUBJECT.KEYID = 7
2,794,973 UART: [afmc] AUTHORITY.KEYID = 5
2,830,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,846,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,847,181 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,852,900 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,858,793 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,864,500 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,872,393 UART: [afmc] --
2,873,434 UART: [cold-reset] --
2,874,298 UART: [state] Locking Datavault
2,875,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,875,975 UART: [state] Locking ICCM
2,876,599 UART: [exit] Launching FMC @ 0x40000130
2,881,928 UART:
2,881,944 UART: Running Caliptra FMC ...
2,882,352 UART:
2,882,406 UART: [state] CFI Enabled
2,893,061 UART: [fht] FMC Alias Private Key: 7
3,000,968 UART: [art] Extend RT PCRs Done
3,001,396 UART: [art] Lock RT PCRs Done
3,002,766 UART: [art] Populate DV Done
3,010,990 UART: [fht] FMC Alias Private Key: 7
3,012,082 UART: [art] Derive CDI
3,012,362 UART: [art] Store in in slot 0x4
3,097,811 UART: [art] Derive Key Pair
3,098,171 UART: [art] Store priv key in slot 0x5
3,111,125 UART: [art] Derive Key Pair - Done
3,125,835 UART: [art] Signing Cert with AUTHO
3,126,315 UART: RITY.KEYID = 7
3,141,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,141,816 UART: [art] PUB.X = 2DFF951D47D057897B0DCB5E984E2D9EF1821C24AF326A31E91F7A59CD1001824E2877E4BAC910C8AFE6C9E017A0E22A
3,148,592 UART: [art] PUB.Y = 6DB73BF51D1A08614D6F4181D70900FE0B7CD206A296A38B8A3496A78A066BC57768ADE992EF350176633D9AD275ECCE
3,155,508 UART: [art] SIG.R = FECB2B9BE633DC5D2FE3521F2F4C2F0EE93D7AD4E2063AE03E5A3F9BC480F3053D655D2233BF2144E82062E4C87242CC
3,162,285 UART: [art] SIG.S = B49334BA664C91951D6763587B5F16CE5C5565DCD612396C1342980212E283538FB56A9B4C8B234D881C2CF2AFA18BB3
3,186,083 UART: Caliptra RT
3,186,336 UART: [state] CFI Enabled
3,293,815 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,294,571 UART:
3,294,587 UART: Running Caliptra ROM ...
3,294,995 UART:
3,295,050 UART: [state] CFI Enabled
3,297,273 UART: [state] LifecycleState = Production
3,297,881 UART: [state] DebugLocked = Yes
3,298,429 UART: [state] Starting the WD Timer 40000000 cycles
3,299,970 UART: [kat] SHA2-256
4,103,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,107,649 UART: [kat] ++
4,107,801 UART: [kat] sha1
4,111,793 UART: [kat] SHA2-256
4,113,733 UART: [kat] SHA2-384
4,116,466 UART: [kat] SHA2-512-ACC
4,118,367 UART: [kat] ECC-384
4,127,776 UART: [kat] HMAC-384Kdf
4,132,344 UART: [kat] LMS
4,380,656 UART: [kat] --
4,381,480 UART: [warm-reset] ++
4,382,447 UART: [warm-reset] --
4,383,504 UART: [state] Locking Datavault
4,384,096 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,700 UART: [state] Locking ICCM
4,385,238 UART: [exit] Launching FMC @ 0x40000130
4,390,567 UART:
4,390,583 UART: Running Caliptra FMC ...
4,390,991 UART:
4,391,045 UART: [state] CFI Enabled
4,392,070 UART: [aliasrt :skip pcr extension
4,392,543 UART: [art] Extend RT PCRs Done
4,392,971 UART: [art] Lock RT PCRs Done
4,394,394 UART: [art] Populate DV Done
4,402,466 UART: [fht] FMC Alias Private Key: 7
4,403,546 UART: [art] Derive CDI
4,403,826 UART: [art] Store in in slot 0x4
4,489,411 UART: [art] Derive Key Pair
4,489,771 UART: [art] Store priv key in slot 0x5
4,503,053 UART: [art] Derive Key Pair - Done
4,517,947 UART: [art] Signing Cert with AUTHO
4,518,427 UART: RITY.KEYID = 7
4,533,785 UART: [art] Erasing AUTHORITY.KEYID = 7
4,534,550 UART: [art] PUB.X = 2DFF951D47D057897B0DCB5E984E2D9EF1821C24AF326A31E91F7A59CD1001824E2877E4BAC910C8AFE6C9E017A0E22A
4,541,326 UART: [art] PUB.Y = 6DB73BF51D1A08614D6F4181D70900FE0B7CD206A296A38B8A3496A78A066BC57768ADE992EF350176633D9AD275ECCE
4,548,242 UART: [art] SIG.R = FECB2B9BE633DC5D2FE3521F2F4C2F0EE93D7AD4E2063AE03E5A3F9BC480F3053D655D2233BF2144E82062E4C87242CC
4,555,019 UART: [art] SIG.S = B49334BA664C91951D6763587B5F16CE5C5565DCD612396C1342980212E283538FB56A9B4C8B234D881C2CF2AFA18BB3
4,578,727 UART: Caliptra RT
4,578,980 UART: [state] CFI Enabled
4,855,235 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,938 UART: [state] LifecycleState = Production
86,546 UART: [state] DebugLocked = Yes
87,202 UART: [state] Starting the WD Timer 40000000 cycles
88,727 UART: [kat] SHA2-256
892,277 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,406 UART: [kat] ++
896,558 UART: [kat] sha1
900,840 UART: [kat] SHA2-256
902,780 UART: [kat] SHA2-384
905,471 UART: [kat] SHA2-512-ACC
907,372 UART: [kat] ECC-384
917,305 UART: [kat] HMAC-384Kdf
922,035 UART: [kat] LMS
1,170,347 UART: [kat] --
1,171,372 UART: [cold-reset] ++
1,171,815 UART: [fht] FHT @ 0x50003400
1,174,555 UART: [idev] ++
1,174,723 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,509 UART: [idev] UDS.KEYID = 0
1,175,855 ready_for_fw is high
1,175,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,953 UART: [idev] Sha1 KeyId Algorithm
1,210,020 UART: [idev] --
1,211,079 UART: [ldev] ++
1,211,247 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,652 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,522 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,228 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,400 UART: [ldev] --
1,282,698 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,167 >>> mbox cmd response: success
2,796,425 UART: [afmc] ++
2,796,593 UART: [afmc] CDI.KEYID = 6
2,796,956 UART: [afmc] SUBJECT.KEYID = 7
2,797,382 UART: [afmc] AUTHORITY.KEYID = 5
2,833,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,622 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,341 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,234 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,941 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,864 UART: [afmc] --
2,876,855 UART: [cold-reset] --
2,877,623 UART: [state] Locking Datavault
2,878,758 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,362 UART: [state] Locking ICCM
2,880,010 UART: [exit] Launching FMC @ 0x40000130
2,885,339 UART:
2,885,355 UART: Running Caliptra FMC ...
2,885,763 UART:
2,885,906 UART: [state] CFI Enabled
2,896,611 UART: [fht] FMC Alias Private Key: 7
3,004,530 UART: [art] Extend RT PCRs Done
3,004,958 UART: [art] Lock RT PCRs Done
3,006,412 UART: [art] Populate DV Done
3,014,466 UART: [fht] FMC Alias Private Key: 7
3,015,500 UART: [art] Derive CDI
3,015,780 UART: [art] Store in in slot 0x4
3,101,299 UART: [art] Derive Key Pair
3,101,659 UART: [art] Store priv key in slot 0x5
3,114,957 UART: [art] Derive Key Pair - Done
3,129,669 UART: [art] Signing Cert with AUTHO
3,130,149 UART: RITY.KEYID = 7
3,145,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,450 UART: [art] PUB.X = EDFAC4DBCE6456A0764E4685DA76847DD2719B3DDA06B24120628AA25D308EA61FCF398560E5E259BD1CF1464AB501F5
3,153,226 UART: [art] PUB.Y = 991C2E5160498F2B382CF8F0B75F4A09B92D7A95EE1CAA31AF089D8E983B4F87E7746F1F5188427442E8F4745A3D6882
3,160,170 UART: [art] SIG.R = 914B26581A8B77DBD9D49677A70B044BBF240859D393685533FBA51D2C70903F6BDBBDC6CD1820149529C080475B86EA
3,166,931 UART: [art] SIG.S = 85777E450EC6B42EE582A382B9046398B2AB45968101E38301CFF9AAAF4C7CE3D9D64422AD38F93A1377188D8014D5EF
3,190,520 UART: Caliptra RT
3,190,865 UART: [state] CFI Enabled
3,298,242 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,998 UART:
3,299,014 UART: Running Caliptra ROM ...
3,299,422 UART:
3,299,564 UART: [state] CFI Enabled
3,302,487 UART: [state] LifecycleState = Production
3,303,095 UART: [state] DebugLocked = Yes
3,303,817 UART: [state] Starting the WD Timer 40000000 cycles
3,305,406 UART: [kat] SHA2-256
4,108,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,085 UART: [kat] ++
4,113,237 UART: [kat] sha1
4,117,387 UART: [kat] SHA2-256
4,119,327 UART: [kat] SHA2-384
4,121,932 UART: [kat] SHA2-512-ACC
4,123,833 UART: [kat] ECC-384
4,133,822 UART: [kat] HMAC-384Kdf
4,138,590 UART: [kat] LMS
4,386,902 UART: [kat] --
4,388,046 UART: [warm-reset] ++
4,389,039 UART: [warm-reset] --
4,389,932 UART: [state] Locking Datavault
4,390,542 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,146 UART: [state] Locking ICCM
4,391,752 UART: [exit] Launching FMC @ 0x40000130
4,397,081 UART:
4,397,097 UART: Running Caliptra FMC ...
4,397,505 UART:
4,397,648 UART: [state] CFI Enabled
4,398,945 UART: [aliasrt :skip pcr extension
4,399,418 UART: [art] Extend RT PCRs Done
4,399,846 UART: [art] Lock RT PCRs Done
4,401,109 UART: [art] Populate DV Done
4,409,301 UART: [fht] FMC Alias Private Key: 7
4,410,417 UART: [art] Derive CDI
4,410,697 UART: [art] Store in in slot 0x4
4,496,288 UART: [art] Derive Key Pair
4,496,648 UART: [art] Store priv key in slot 0x5
4,510,052 UART: [art] Derive Key Pair - Done
4,524,984 UART: [art] Signing Cert with AUTHO
4,525,464 UART: RITY.KEYID = 7
4,540,700 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,465 UART: [art] PUB.X = EDFAC4DBCE6456A0764E4685DA76847DD2719B3DDA06B24120628AA25D308EA61FCF398560E5E259BD1CF1464AB501F5
4,548,241 UART: [art] PUB.Y = 991C2E5160498F2B382CF8F0B75F4A09B92D7A95EE1CAA31AF089D8E983B4F87E7746F1F5188427442E8F4745A3D6882
4,555,185 UART: [art] SIG.R = 914B26581A8B77DBD9D49677A70B044BBF240859D393685533FBA51D2C70903F6BDBBDC6CD1820149529C080475B86EA
4,561,946 UART: [art] SIG.S = 85777E450EC6B42EE582A382B9046398B2AB45968101E38301CFF9AAAF4C7CE3D9D64422AD38F93A1377188D8014D5EF
4,585,233 UART: Caliptra RT
4,585,578 UART: [state] CFI Enabled
4,865,001 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Production
85,650 UART: [state] DebugLocked = Yes
86,266 UART: [state] Starting the WD Timer 40000000 cycles
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 ready_for_fw is high
1,174,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,198,909 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,465 UART: [ldev] Erasing FE.KEYID = 1
1,241,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,296 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,990 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,860 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,566 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,536 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,689 UART: [fwproc] Recv command 0x46574c44
1,282,422 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,628,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,754 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,133 >>> mbox cmd response: success
2,794,377 UART: [afmc] ++
2,794,545 UART: [afmc] CDI.KEYID = 6
2,794,908 UART: [afmc] SUBJECT.KEYID = 7
2,795,334 UART: [afmc] AUTHORITY.KEYID = 5
2,830,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,847,880 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,599 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,492 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,199 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,090 UART: [afmc] --
2,874,135 UART: [cold-reset] --
2,874,807 UART: [state] Locking Datavault
2,875,958 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,562 UART: [state] Locking ICCM
2,877,052 UART: [exit] Launching FMC @ 0x40000130
2,882,381 UART:
2,882,397 UART: Running Caliptra FMC ...
2,882,805 UART:
2,882,948 UART: [state] CFI Enabled
2,893,419 UART: [fht] FMC Alias Private Key: 7
3,001,688 UART: [art] Extend RT PCRs Done
3,002,116 UART: [art] Lock RT PCRs Done
3,003,608 UART: [art] Populate DV Done
3,011,918 UART: [fht] FMC Alias Private Key: 7
3,013,022 UART: [art] Derive CDI
3,013,302 UART: [art] Store in in slot 0x4
3,099,161 UART: [art] Derive Key Pair
3,099,521 UART: [art] Store priv key in slot 0x5
3,112,791 UART: [art] Derive Key Pair - Done
3,127,553 UART: [art] Signing Cert with AUTHO
3,128,033 UART: RITY.KEYID = 7
3,142,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,464 UART: [art] PUB.X = BCCC359C7068000C038A921AD7BBD268604C170F549ECBC00020D47D882315C19892BDAFC46DD05EE96A9283332C7CCC
3,150,189 UART: [art] PUB.Y = E99F0CCB35B6B9C492ED15535DE64218295518EB66C132567E4133F23700AC6AABE437C9104A6E189D47536891444891
3,157,106 UART: [art] SIG.R = 7FDD398F52E2F9125A8F16587895272D25FA109E2D70E6C4F1D14406BDB7A8ED631118E4D3E5EB8A5BEE6E596FCC8E43
3,163,885 UART: [art] SIG.S = 77EE39C4BC9D47AA2A0E37E324AA434B2BAF3DC364E1F7E4E2A17E3295530C458E7FC1FA32AEDB10ACD866D531E853B8
3,187,998 UART: Caliptra RT
3,188,343 UART: [state] CFI Enabled
3,296,815 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,571 UART:
3,297,587 UART: Running Caliptra ROM ...
3,297,995 UART:
3,298,137 UART: [state] CFI Enabled
3,301,136 UART: [state] LifecycleState = Production
3,301,744 UART: [state] DebugLocked = Yes
3,302,274 UART: [state] Starting the WD Timer 40000000 cycles
3,303,941 UART: [kat] SHA2-256
4,107,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,620 UART: [kat] ++
4,111,772 UART: [kat] sha1
4,116,130 UART: [kat] SHA2-256
4,118,070 UART: [kat] SHA2-384
4,120,935 UART: [kat] SHA2-512-ACC
4,122,836 UART: [kat] ECC-384
4,132,255 UART: [kat] HMAC-384Kdf
4,136,987 UART: [kat] LMS
4,385,299 UART: [kat] --
4,386,145 UART: [warm-reset] ++
4,387,008 UART: [warm-reset] --
4,387,711 UART: [state] Locking Datavault
4,388,377 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,981 UART: [state] Locking ICCM
4,389,407 UART: [exit] Launching FMC @ 0x40000130
4,394,736 UART:
4,394,752 UART: Running Caliptra FMC ...
4,395,160 UART:
4,395,303 UART: [state] CFI Enabled
4,396,542 UART: [aliasrt :skip pcr extension
4,397,015 UART: [art] Extend RT PCRs Done
4,397,443 UART: [art] Lock RT PCRs Done
4,398,626 UART: [art] Populate DV Done
4,406,816 UART: [fht] FMC Alias Private Key: 7
4,407,934 UART: [art] Derive CDI
4,408,214 UART: [art] Store in in slot 0x4
4,493,733 UART: [art] Derive Key Pair
4,494,093 UART: [art] Store priv key in slot 0x5
4,506,951 UART: [art] Derive Key Pair - Done
4,522,039 UART: [art] Signing Cert with AUTHO
4,522,519 UART: RITY.KEYID = 7
4,537,653 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,418 UART: [art] PUB.X = BCCC359C7068000C038A921AD7BBD268604C170F549ECBC00020D47D882315C19892BDAFC46DD05EE96A9283332C7CCC
4,545,143 UART: [art] PUB.Y = E99F0CCB35B6B9C492ED15535DE64218295518EB66C132567E4133F23700AC6AABE437C9104A6E189D47536891444891
4,552,060 UART: [art] SIG.R = 7FDD398F52E2F9125A8F16587895272D25FA109E2D70E6C4F1D14406BDB7A8ED631118E4D3E5EB8A5BEE6E596FCC8E43
4,558,839 UART: [art] SIG.S = 77EE39C4BC9D47AA2A0E37E324AA434B2BAF3DC364E1F7E4E2A17E3295530C458E7FC1FA32AEDB10ACD866D531E853B8
4,581,858 UART: Caliptra RT
4,582,203 UART: [state] CFI Enabled
4,863,551 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,745 UART: [state] LifecycleState = Production
85,353 UART: [state] DebugLocked = Yes
86,009 UART: [state] Starting the WD Timer 40000000 cycles
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,438 UART: [kat] SHA2-512-ACC
906,339 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
921,100 UART: [kat] LMS
1,169,412 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,501 UART: [idev] --
1,209,406 UART: [ldev] ++
1,209,574 UART: [ldev] CDI.KEYID = 6
1,209,938 UART: [ldev] SUBJECT.KEYID = 5
1,210,365 UART: [ldev] AUTHORITY.KEYID = 7
1,210,828 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,029 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,723 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,593 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,299 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,237 UART: [ldev] --
1,281,521 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x46574c44
1,283,025 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,974 >>> mbox cmd response: success
2,795,124 UART: [afmc] ++
2,795,292 UART: [afmc] CDI.KEYID = 6
2,795,655 UART: [afmc] SUBJECT.KEYID = 7
2,796,081 UART: [afmc] AUTHORITY.KEYID = 5
2,830,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,241 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,960 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,853 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,560 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,277 UART: [afmc] --
2,874,376 UART: [cold-reset] --
2,875,032 UART: [state] Locking Datavault
2,876,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,743 UART: [state] Locking ICCM
2,877,207 UART: [exit] Launching FMC @ 0x40000130
2,882,536 UART:
2,882,552 UART: Running Caliptra FMC ...
2,882,960 UART:
2,883,014 UART: [state] CFI Enabled
2,893,825 UART: [fht] FMC Alias Private Key: 7
3,001,872 UART: [art] Extend RT PCRs Done
3,002,300 UART: [art] Lock RT PCRs Done
3,003,726 UART: [art] Populate DV Done
3,011,830 UART: [fht] FMC Alias Private Key: 7
3,012,982 UART: [art] Derive CDI
3,013,262 UART: [art] Store in in slot 0x4
3,099,179 UART: [art] Derive Key Pair
3,099,539 UART: [art] Store priv key in slot 0x5
3,112,793 UART: [art] Derive Key Pair - Done
3,127,713 UART: [art] Signing Cert with AUTHO
3,128,193 UART: RITY.KEYID = 7
3,142,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,640 UART: [art] PUB.X = 37F836DF570948DA006E1A25A6EB96DA9E74A0F245CA9BFC78C851BD3A354B747C29C59C8EC8EE92DB37D759BEBA4053
3,150,401 UART: [art] PUB.Y = D8A36E8D3CAD5885EF4279594783C578431AF0485FDA48F74F244CD797C50DA30AB407EB77D6DDC11272BC1B31CA8872
3,157,350 UART: [art] SIG.R = DBA6132F10B8C5711C707EBFAF0D7A5A0F92E3B474D42DE0B941DB1F744D517D08547D2077B94B5E5BA0E9E7193D1273
3,164,121 UART: [art] SIG.S = 4C41197249E482BA3E6BE3DC47AB3405DDCA7D79687FDF3FE9B33C6339124728435FF42644CE7C6BF1272B5F1309E576
3,187,676 UART: Caliptra RT
3,187,929 UART: [state] CFI Enabled
3,295,484 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,240 UART:
3,296,256 UART: Running Caliptra ROM ...
3,296,664 UART:
3,296,719 UART: [state] CFI Enabled
3,299,158 UART: [state] LifecycleState = Production
3,299,766 UART: [state] DebugLocked = Yes
3,300,426 UART: [state] Starting the WD Timer 40000000 cycles
3,301,993 UART: [kat] SHA2-256
4,105,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,109,672 UART: [kat] ++
4,109,824 UART: [kat] sha1
4,113,976 UART: [kat] SHA2-256
4,115,916 UART: [kat] SHA2-384
4,118,789 UART: [kat] SHA2-512-ACC
4,120,690 UART: [kat] ECC-384
4,130,447 UART: [kat] HMAC-384Kdf
4,135,055 UART: [kat] LMS
4,383,367 UART: [kat] --
4,384,205 UART: [warm-reset] ++
4,385,220 UART: [warm-reset] --
4,385,893 UART: [state] Locking Datavault
4,386,881 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,485 UART: [state] Locking ICCM
4,388,145 UART: [exit] Launching FMC @ 0x40000130
4,393,474 UART:
4,393,490 UART: Running Caliptra FMC ...
4,393,898 UART:
4,393,952 UART: [state] CFI Enabled
4,395,135 UART: [aliasrt :skip pcr extension
4,395,608 UART: [art] Extend RT PCRs Done
4,396,036 UART: [art] Lock RT PCRs Done
4,397,315 UART: [art] Populate DV Done
4,405,659 UART: [fht] FMC Alias Private Key: 7
4,406,841 UART: [art] Derive CDI
4,407,121 UART: [art] Store in in slot 0x4
4,492,758 UART: [art] Derive Key Pair
4,493,118 UART: [art] Store priv key in slot 0x5
4,506,332 UART: [art] Derive Key Pair - Done
4,521,040 UART: [art] Signing Cert with AUTHO
4,521,520 UART: RITY.KEYID = 7
4,536,998 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,763 UART: [art] PUB.X = 37F836DF570948DA006E1A25A6EB96DA9E74A0F245CA9BFC78C851BD3A354B747C29C59C8EC8EE92DB37D759BEBA4053
4,544,524 UART: [art] PUB.Y = D8A36E8D3CAD5885EF4279594783C578431AF0485FDA48F74F244CD797C50DA30AB407EB77D6DDC11272BC1B31CA8872
4,551,473 UART: [art] SIG.R = DBA6132F10B8C5711C707EBFAF0D7A5A0F92E3B474D42DE0B941DB1F744D517D08547D2077B94B5E5BA0E9E7193D1273
4,558,244 UART: [art] SIG.S = 4C41197249E482BA3E6BE3DC47AB3405DDCA7D79687FDF3FE9B33C6339124728435FF42644CE7C6BF1272B5F1309E576
4,581,811 UART: Caliptra RT
4,582,064 UART: [state] CFI Enabled
4,863,683 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Production
85,951 UART: [state] DebugLocked = Yes
86,521 UART: [state] Starting the WD Timer 40000000 cycles
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 ready_for_fw is high
1,174,342 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,195 UART: [idev] --
1,209,208 UART: [ldev] ++
1,209,376 UART: [ldev] CDI.KEYID = 6
1,209,740 UART: [ldev] SUBJECT.KEYID = 5
1,210,167 UART: [ldev] AUTHORITY.KEYID = 7
1,210,630 UART: [ldev] FE.KEYID = 1
1,215,994 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,477 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,171 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,807 UART: [ldev] --
1,281,277 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,318 >>> mbox cmd response: success
2,796,560 UART: [afmc] ++
2,796,728 UART: [afmc] CDI.KEYID = 6
2,797,091 UART: [afmc] SUBJECT.KEYID = 7
2,797,517 UART: [afmc] AUTHORITY.KEYID = 5
2,833,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,493 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,212 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,105 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,812 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,637 UART: [afmc] --
2,876,598 UART: [cold-reset] --
2,877,418 UART: [state] Locking Datavault
2,878,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,285 UART: [state] Locking ICCM
2,879,793 UART: [exit] Launching FMC @ 0x40000130
2,885,122 UART:
2,885,138 UART: Running Caliptra FMC ...
2,885,546 UART:
2,885,600 UART: [state] CFI Enabled
2,895,969 UART: [fht] FMC Alias Private Key: 7
3,004,170 UART: [art] Extend RT PCRs Done
3,004,598 UART: [art] Lock RT PCRs Done
3,005,990 UART: [art] Populate DV Done
3,014,314 UART: [fht] FMC Alias Private Key: 7
3,015,356 UART: [art] Derive CDI
3,015,636 UART: [art] Store in in slot 0x4
3,101,065 UART: [art] Derive Key Pair
3,101,425 UART: [art] Store priv key in slot 0x5
3,114,991 UART: [art] Derive Key Pair - Done
3,129,689 UART: [art] Signing Cert with AUTHO
3,130,169 UART: RITY.KEYID = 7
3,144,963 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,728 UART: [art] PUB.X = 93BF4D1DC74C9BE70E3D953D88E23B26E415C0DB1BABD47B7D595E07140B6B919ADE695AB33272464CCCC36ABD1B0EAE
3,152,508 UART: [art] PUB.Y = 1F343D74E8401AF2FAC0EBBBE0D69F6CFBC214039D534FD39151392FC835AAF80500C560AC9B5BDCE76571854FAFD14D
3,159,448 UART: [art] SIG.R = 30901BEB8A777FC1CF00C4F5FCEAAB8BE66E880C3015E320C4F1C8006ED5D93ED07F1FE88EF59BBEBCCEBA0F8007C0D5
3,166,195 UART: [art] SIG.S = A009B6CB735C764DBF3D62040475325EAAF3E8F9377AFC5B4A685EAC0F648124785F3D28DCBEFAF9B8B08ABDBBABE8E9
3,189,554 UART: Caliptra RT
3,189,807 UART: [state] CFI Enabled
3,297,682 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,438 UART:
3,298,454 UART: Running Caliptra ROM ...
3,298,862 UART:
3,298,917 UART: [state] CFI Enabled
3,301,154 UART: [state] LifecycleState = Production
3,301,762 UART: [state] DebugLocked = Yes
3,302,398 UART: [state] Starting the WD Timer 40000000 cycles
3,303,895 UART: [kat] SHA2-256
4,107,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,574 UART: [kat] ++
4,111,726 UART: [kat] sha1
4,115,968 UART: [kat] SHA2-256
4,117,908 UART: [kat] SHA2-384
4,120,633 UART: [kat] SHA2-512-ACC
4,122,534 UART: [kat] ECC-384
4,132,411 UART: [kat] HMAC-384Kdf
4,137,177 UART: [kat] LMS
4,385,489 UART: [kat] --
4,386,105 UART: [warm-reset] ++
4,387,160 UART: [warm-reset] --
4,387,985 UART: [state] Locking Datavault
4,388,621 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,225 UART: [state] Locking ICCM
4,389,653 UART: [exit] Launching FMC @ 0x40000130
4,394,982 UART:
4,394,998 UART: Running Caliptra FMC ...
4,395,406 UART:
4,395,460 UART: [state] CFI Enabled
4,396,745 UART: [aliasrt :skip pcr extension
4,397,218 UART: [art] Extend RT PCRs Done
4,397,646 UART: [art] Lock RT PCRs Done
4,398,923 UART: [art] Populate DV Done
4,407,099 UART: [fht] FMC Alias Private Key: 7
4,408,125 UART: [art] Derive CDI
4,408,405 UART: [art] Store in in slot 0x4
4,493,794 UART: [art] Derive Key Pair
4,494,154 UART: [art] Store priv key in slot 0x5
4,507,622 UART: [art] Derive Key Pair - Done
4,522,074 UART: [art] Signing Cert with AUTHO
4,522,554 UART: RITY.KEYID = 7
4,537,062 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,827 UART: [art] PUB.X = 93BF4D1DC74C9BE70E3D953D88E23B26E415C0DB1BABD47B7D595E07140B6B919ADE695AB33272464CCCC36ABD1B0EAE
4,544,607 UART: [art] PUB.Y = 1F343D74E8401AF2FAC0EBBBE0D69F6CFBC214039D534FD39151392FC835AAF80500C560AC9B5BDCE76571854FAFD14D
4,551,547 UART: [art] SIG.R = 30901BEB8A777FC1CF00C4F5FCEAAB8BE66E880C3015E320C4F1C8006ED5D93ED07F1FE88EF59BBEBCCEBA0F8007C0D5
4,558,294 UART: [art] SIG.S = A009B6CB735C764DBF3D62040475325EAAF3E8F9377AFC5B4A685EAC0F648124785F3D28DCBEFAF9B8B08ABDBBABE8E9
4,581,867 UART: Caliptra RT
4,582,120 UART: [state] CFI Enabled
4,861,187 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Production
85,952 UART: [state] DebugLocked = Yes
86,586 UART: [state] Starting the WD Timer 40000000 cycles
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,539 UART: [kat] HMAC-384Kdf
921,177 UART: [kat] LMS
1,169,489 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 ready_for_fw is high
1,174,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,215 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,242,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,778 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,648 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,354 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,486 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,619 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,303 >>> mbox cmd response: success
2,795,493 UART: [afmc] ++
2,795,661 UART: [afmc] CDI.KEYID = 6
2,796,024 UART: [afmc] SUBJECT.KEYID = 7
2,796,450 UART: [afmc] AUTHORITY.KEYID = 5
2,832,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,492 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,211 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,104 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,811 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,712 UART: [afmc] --
2,875,755 UART: [cold-reset] --
2,876,623 UART: [state] Locking Datavault
2,877,712 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,316 UART: [state] Locking ICCM
2,878,892 UART: [exit] Launching FMC @ 0x40000130
2,884,221 UART:
2,884,237 UART: Running Caliptra FMC ...
2,884,645 UART:
2,884,788 UART: [state] CFI Enabled
2,895,429 UART: [fht] FMC Alias Private Key: 7
3,003,408 UART: [art] Extend RT PCRs Done
3,003,836 UART: [art] Lock RT PCRs Done
3,005,596 UART: [art] Populate DV Done
3,013,634 UART: [fht] FMC Alias Private Key: 7
3,014,816 UART: [art] Derive CDI
3,015,096 UART: [art] Store in in slot 0x4
3,100,959 UART: [art] Derive Key Pair
3,101,319 UART: [art] Store priv key in slot 0x5
3,114,993 UART: [art] Derive Key Pair - Done
3,129,822 UART: [art] Signing Cert with AUTHO
3,130,302 UART: RITY.KEYID = 7
3,145,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,257 UART: [art] PUB.X = DDC12DA8FD76F17696A9F377604369D50C44413EDFAD009612CEA02D2AF487953E4F7EB7A9CF4DA1E3F30BD265FA51E0
3,153,015 UART: [art] PUB.Y = 35041D32BB045C76BFE802065FDDF9C45841C524789AEB8D2FA89FA6793500ED07A1A5E1A6729113B6184B7EAC6BD390
3,159,934 UART: [art] SIG.R = AB7E007E730AFA8EA5F4C9A810BE94FEE47AD0C18F148A0A8E5CA45BF6CABA4F6F4B6B1A4C854448A33E9B6BD5C060D1
3,166,704 UART: [art] SIG.S = 605FE79B9FBB046B70242AF258379F0EE265AAA351CB16982EBD58329F1D9127A95316847F1391AF3866E77044739755
3,189,991 UART: Caliptra RT
3,190,336 UART: [state] CFI Enabled
3,298,893 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,649 UART:
3,299,665 UART: Running Caliptra ROM ...
3,300,073 UART:
3,300,215 UART: [state] CFI Enabled
3,303,236 UART: [state] LifecycleState = Production
3,303,844 UART: [state] DebugLocked = Yes
3,304,388 UART: [state] Starting the WD Timer 40000000 cycles
3,305,997 UART: [kat] SHA2-256
4,109,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,676 UART: [kat] ++
4,113,828 UART: [kat] sha1
4,117,960 UART: [kat] SHA2-256
4,119,900 UART: [kat] SHA2-384
4,122,647 UART: [kat] SHA2-512-ACC
4,124,548 UART: [kat] ECC-384
4,134,361 UART: [kat] HMAC-384Kdf
4,139,091 UART: [kat] LMS
4,387,403 UART: [kat] --
4,388,161 UART: [warm-reset] ++
4,389,068 UART: [warm-reset] --
4,389,913 UART: [state] Locking Datavault
4,390,687 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,291 UART: [state] Locking ICCM
4,391,941 UART: [exit] Launching FMC @ 0x40000130
4,397,270 UART:
4,397,286 UART: Running Caliptra FMC ...
4,397,694 UART:
4,397,837 UART: [state] CFI Enabled
4,399,296 UART: [aliasrt :skip pcr extension
4,399,769 UART: [art] Extend RT PCRs Done
4,400,197 UART: [art] Lock RT PCRs Done
4,401,472 UART: [art] Populate DV Done
4,409,762 UART: [fht] FMC Alias Private Key: 7
4,410,746 UART: [art] Derive CDI
4,411,026 UART: [art] Store in in slot 0x4
4,497,157 UART: [art] Derive Key Pair
4,497,517 UART: [art] Store priv key in slot 0x5
4,510,943 UART: [art] Derive Key Pair - Done
4,525,526 UART: [art] Signing Cert with AUTHO
4,526,006 UART: RITY.KEYID = 7
4,541,012 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,777 UART: [art] PUB.X = DDC12DA8FD76F17696A9F377604369D50C44413EDFAD009612CEA02D2AF487953E4F7EB7A9CF4DA1E3F30BD265FA51E0
4,548,535 UART: [art] PUB.Y = 35041D32BB045C76BFE802065FDDF9C45841C524789AEB8D2FA89FA6793500ED07A1A5E1A6729113B6184B7EAC6BD390
4,555,454 UART: [art] SIG.R = AB7E007E730AFA8EA5F4C9A810BE94FEE47AD0C18F148A0A8E5CA45BF6CABA4F6F4B6B1A4C854448A33E9B6BD5C060D1
4,562,224 UART: [art] SIG.S = 605FE79B9FBB046B70242AF258379F0EE265AAA351CB16982EBD58329F1D9127A95316847F1391AF3866E77044739755
4,586,089 UART: Caliptra RT
4,586,434 UART: [state] CFI Enabled
4,865,193 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Production
85,998 UART: [state] DebugLocked = Yes
86,606 UART: [state] Starting the WD Timer 40000000 cycles
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
905,131 UART: [kat] SHA2-512-ACC
907,032 UART: [kat] ECC-384
917,417 UART: [kat] HMAC-384Kdf
921,861 UART: [kat] LMS
1,170,173 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,339 UART: [fht] FHT @ 0x50003400
1,174,193 UART: [idev] ++
1,174,361 UART: [idev] CDI.KEYID = 6
1,174,722 UART: [idev] SUBJECT.KEYID = 7
1,175,147 UART: [idev] UDS.KEYID = 0
1,175,493 ready_for_fw is high
1,175,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,807 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,153 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,394 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,088 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,958 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,664 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,712 UART: [ldev] --
1,283,094 UART: [fwproc] Wait for Commands...
1,283,857 UART: [fwproc] Recv command 0x46574c44
1,284,590 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,497 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,357 >>> mbox cmd response: success
2,796,439 UART: [afmc] ++
2,796,607 UART: [afmc] CDI.KEYID = 6
2,796,970 UART: [afmc] SUBJECT.KEYID = 7
2,797,396 UART: [afmc] AUTHORITY.KEYID = 5
2,833,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,506 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,225 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,118 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,825 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,624 UART: [afmc] --
2,876,709 UART: [cold-reset] --
2,877,323 UART: [state] Locking Datavault
2,878,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,230 UART: [state] Locking ICCM
2,879,840 UART: [exit] Launching FMC @ 0x40000130
2,885,169 UART:
2,885,185 UART: Running Caliptra FMC ...
2,885,593 UART:
2,885,736 UART: [state] CFI Enabled
2,896,453 UART: [fht] FMC Alias Private Key: 7
3,003,894 UART: [art] Extend RT PCRs Done
3,004,322 UART: [art] Lock RT PCRs Done
3,005,946 UART: [art] Populate DV Done
3,014,144 UART: [fht] FMC Alias Private Key: 7
3,015,228 UART: [art] Derive CDI
3,015,508 UART: [art] Store in in slot 0x4
3,101,231 UART: [art] Derive Key Pair
3,101,591 UART: [art] Store priv key in slot 0x5
3,114,333 UART: [art] Derive Key Pair - Done
3,129,106 UART: [art] Signing Cert with AUTHO
3,129,586 UART: RITY.KEYID = 7
3,144,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,711 UART: [art] PUB.X = 1D70D8DF9B528DF29E31A4F016EDFB3907949D42E76CD744F77294FEF6F861479287CF9E0A38E45B4A0BA4B761ED4AA5
3,152,484 UART: [art] PUB.Y = BE336FD0E2EA082E49796FA6ADFBBA260EDE5DB75FBD4A7E5B6C76624C295D0265B957B1B5D7E8E4027675FDE37CEFDB
3,159,448 UART: [art] SIG.R = 8D7B811AB630B3842A010BE78F3406722EF0E17153A056E7DC0E942913EAA7C8344A85368523BCF381028E5651003510
3,166,171 UART: [art] SIG.S = 3C575FA15AFCB17845E5BF0612BB7990BAC0A5AEE0A703522FBEF7D2EE8F789DE19F5E4C6C0AC478F2026FB83F8340AD
3,190,334 UART: Caliptra RT
3,190,679 UART: [state] CFI Enabled
3,299,096 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,852 UART:
3,299,868 UART: Running Caliptra ROM ...
3,300,276 UART:
3,300,418 UART: [state] CFI Enabled
3,303,511 UART: [state] LifecycleState = Production
3,304,119 UART: [state] DebugLocked = Yes
3,304,875 UART: [state] Starting the WD Timer 40000000 cycles
3,306,526 UART: [kat] SHA2-256
4,110,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,205 UART: [kat] ++
4,114,357 UART: [kat] sha1
4,118,517 UART: [kat] SHA2-256
4,120,457 UART: [kat] SHA2-384
4,123,118 UART: [kat] SHA2-512-ACC
4,125,019 UART: [kat] ECC-384
4,134,756 UART: [kat] HMAC-384Kdf
4,139,464 UART: [kat] LMS
4,387,776 UART: [kat] --
4,388,510 UART: [warm-reset] ++
4,389,467 UART: [warm-reset] --
4,390,382 UART: [state] Locking Datavault
4,391,284 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,888 UART: [state] Locking ICCM
4,392,418 UART: [exit] Launching FMC @ 0x40000130
4,397,747 UART:
4,397,763 UART: Running Caliptra FMC ...
4,398,171 UART:
4,398,314 UART: [state] CFI Enabled
4,399,759 UART: [aliasrt :skip pcr extension
4,400,232 UART: [art] Extend RT PCRs Done
4,400,660 UART: [art] Lock RT PCRs Done
4,402,077 UART: [art] Populate DV Done
4,410,199 UART: [fht] FMC Alias Private Key: 7
4,411,143 UART: [art] Derive CDI
4,411,423 UART: [art] Store in in slot 0x4
4,497,234 UART: [art] Derive Key Pair
4,497,594 UART: [art] Store priv key in slot 0x5
4,511,816 UART: [art] Derive Key Pair - Done
4,526,561 UART: [art] Signing Cert with AUTHO
4,527,041 UART: RITY.KEYID = 7
4,542,579 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,344 UART: [art] PUB.X = 1D70D8DF9B528DF29E31A4F016EDFB3907949D42E76CD744F77294FEF6F861479287CF9E0A38E45B4A0BA4B761ED4AA5
4,550,117 UART: [art] PUB.Y = BE336FD0E2EA082E49796FA6ADFBBA260EDE5DB75FBD4A7E5B6C76624C295D0265B957B1B5D7E8E4027675FDE37CEFDB
4,557,081 UART: [art] SIG.R = 8D7B811AB630B3842A010BE78F3406722EF0E17153A056E7DC0E942913EAA7C8344A85368523BCF381028E5651003510
4,563,804 UART: [art] SIG.S = 3C575FA15AFCB17845E5BF0612BB7990BAC0A5AEE0A703522FBEF7D2EE8F789DE19F5E4C6C0AC478F2026FB83F8340AD
4,587,685 UART: Caliptra RT
4,588,030 UART: [state] CFI Enabled
4,870,495 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
191,691 UART:
192,066 UART: Running Caliptra ROM ...
193,176 UART:
193,325 UART: [state] CFI Enabled
265,477 UART: [state] LifecycleState = Production
267,720 UART: [state] DebugLocked = Yes
269,440 UART: [state] Starting the WD Timer 40000000 cycles
274,321 UART: [kat] SHA2-256
456,297 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,799 UART: [kat] ++
468,425 UART: [kat] sha1
478,703 UART: [kat] SHA2-256
481,721 UART: [kat] SHA2-384
488,210 UART: [kat] SHA2-512-ACC
490,827 UART: [kat] ECC-384
3,775,926 UART: [kat] HMAC-384Kdf
3,802,392 UART: [kat] LMS
4,875,560 UART: [kat] --
4,879,015 UART: [cold-reset] ++
4,880,959 UART: [fht] FHT @ 0x50003400
4,892,023 UART: [idev] ++
4,892,704 UART: [idev] CDI.KEYID = 6
4,893,809 UART: [idev] SUBJECT.KEYID = 7
4,895,060 UART: [idev] UDS.KEYID = 0
4,895,960 ready_for_fw is high
4,896,148 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
4,995,065 UART: [idev] Erasing UDS.KEYID = 0
8,240,747 UART: [idev] Sha1 KeyId Algorithm
8,262,003 UART: [idev] --
8,265,118 UART: [ldev] ++
8,265,753 UART: [ldev] CDI.KEYID = 6
8,266,933 UART: [ldev] SUBJECT.KEYID = 5
8,268,091 UART: [ldev] AUTHORITY.KEYID = 7
8,269,267 UART: [ldev] FE.KEYID = 1
8,317,030 UART: [ldev] Erasing FE.KEYID = 1
11,652,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,389 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,981,701 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,997,725 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,013,889 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,034,455 UART: [ldev] --
14,038,860 UART: [fwproc] Wait for Commands...
14,041,243 UART: [fwproc] Recv command 0x46574c44
14,043,560 UART: [fwproc] Recv'd Img size: 78492 bytes
17,703,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,776,615 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,845,311 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,037,612 >>> mbox cmd response: success
18,041,905 UART: [afmc] ++
18,042,525 UART: [afmc] CDI.KEYID = 6
18,043,722 UART: [afmc] SUBJECT.KEYID = 7
18,044,826 UART: [afmc] AUTHORITY.KEYID = 5
21,408,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,709,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,711,682 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,727,693 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,743,813 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,759,852 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,783,784 UART: [afmc] --
23,788,187 UART: [cold-reset] --
23,792,487 UART: [state] Locking Datavault
23,797,303 UART: [state] Locking PCR0, PCR1 and PCR31
23,799,002 UART: [state] Locking ICCM
23,801,969 UART: [exit] Launching FMC @ 0x40000130
23,810,688 UART:
23,810,924 UART: Running Caliptra FMC ...
23,812,026 UART:
23,812,190 UART: [state] CFI Enabled
23,868,500 UART: [fht] FMC Alias Private Key: 7
26,206,539 UART: [art] Extend RT PCRs Done
26,207,771 UART: [art] Lock RT PCRs Done
26,209,549 UART: [art] Populate DV Done
26,214,905 UART: [fht] FMC Alias Private Key: 7
26,216,547 UART: [art] Derive CDI
26,217,303 UART: [art] Store in in slot 0x4
26,276,777 UART: [art] Derive Key Pair
26,277,822 UART: [art] Store priv key in slot 0x5
29,570,438 UART: [art] Derive Key Pair - Done
29,583,270 UART: [art] Signing Cert with AUTHO
29,584,578 UART: RITY.KEYID = 7
31,870,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,872,497 UART: [art] PUB.X = D733C6E6E2FF83021006710EFB340021603813960D20A37090EF0B509B39E0AEDDA46A86898ED6D45E7AF321270C0679
31,879,708 UART: [art] PUB.Y = 24B42CD7748EFBAFB26E8695197C3240021CE1FE1D350C8B3387393607149950E8836B56B7F863587FBD5A8846BDF7A5
31,887,003 UART: [art] SIG.R = FF9AA3EEB5B9C9B9B9CE8BA1141DFB52853F711B4B514215BF60C898E271FA61D74CE00B3F630D4AA857971745085301
31,894,368 UART: [art] SIG.S = 57F2FA55287C2798E4BB54ED106ADA30928F1A2222550ECC3EE3A44D8C0AABECE8E528419293D550D076BAB97F4484FE
33,199,678 UART: mbox::rt_entry...
33,200,630 UART: ____ _ _ _ ____ _____
33,202,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,204,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,206,500 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,208,445 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,210,378 UART: |_|
33,211,383 UART:
33,324,618 UART: [rt] Runtime listening for mailbox commands...
33,326,630 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,327,413 >>> mbox cmd response data (0 bytes)
Initializing fuses
994 UART:
1,241 UART: Running Caliptra ROM ...
2,344 UART:
2,497 UART: [state] CFI Enabled
80,924 UART: [state] LifecycleState = Production
82,690 UART: [state] DebugLocked = Yes
84,700 UART: [state] Starting the WD Timer 40000000 cycles
90,191 UART: [kat] SHA2-256
272,108 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
283,642 UART: [kat] ++
284,156 UART: [kat] sha1
295,736 UART: [kat] SHA2-256
298,742 UART: [kat] SHA2-384
304,937 UART: [kat] SHA2-512-ACC
307,561 UART: [kat] ECC-384
3,588,542 UART: [kat] HMAC-384Kdf
3,614,329 UART: [kat] LMS
4,687,488 UART: [kat] --
4,692,475 UART: [warm-reset] ++
4,696,091 UART: [warm-reset] --
4,700,017 UART: [state] Locking Datavault
4,703,167 UART: [state] Locking PCR0, PCR1 and PCR31
4,705,364 UART: [state] Locking ICCM
4,708,199 UART: [exit] Launching FMC @ 0x40000130
4,716,872 UART:
4,717,123 UART: Running Caliptra FMC ...
4,718,153 UART:
4,718,303 UART: [state] CFI Enabled
4,778,081 UART: [aliasrt :skip pcr extension
4,779,379 UART: [art] Extend RT PCRs Done
4,780,449 UART: [art] Lock RT PCRs Done
4,781,898 UART: [art] Populate DV Done
4,787,423 UART: [fht] FMC Alias Private Key: 7
4,789,011 UART: [art] Derive CDI
4,789,753 UART: [art] Store in in slot 0x4
4,846,819 UART: [art] Derive Key Pair
4,847,868 UART: [art] Store priv key in slot 0x5
8,140,722 UART: [art] Derive Key Pair - Done
8,153,730 UART: [art] Signing Cert with AUTHO
8,155,042 UART: RITY.KEYID = 7
10,441,072 UART: [art] Erasing AUTHORITY.KEYID = 7
10,442,597 UART: [art] PUB.X = D733C6E6E2FF83021006710EFB340021603813960D20A37090EF0B509B39E0AEDDA46A86898ED6D45E7AF321270C0679
10,449,855 UART: [art] PUB.Y = 24B42CD7748EFBAFB26E8695197C3240021CE1FE1D350C8B3387393607149950E8836B56B7F863587FBD5A8846BDF7A5
10,457,048 UART: [art] SIG.R = FF9AA3EEB5B9C9B9B9CE8BA1141DFB52853F711B4B514215BF60C898E271FA61D74CE00B3F630D4AA857971745085301
10,464,442 UART: [art] SIG.S = 57F2FA55287C2798E4BB54ED106ADA30928F1A2222550ECC3EE3A44D8C0AABECE8E528419293D550D076BAB97F4484FE
11,769,295 UART: mbox::rt_entry...
11,770,262 UART: ____ _ _ _ ____ _____
11,772,196 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,774,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,776,063 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,777,988 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,779,869 UART: |_|
11,780,750 UART:
15,347,557 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
191,597 UART:
191,969 UART: Running Caliptra ROM ...
193,073 UART:
193,221 UART: [state] CFI Enabled
267,457 UART: [state] LifecycleState = Production
269,678 UART: [state] DebugLocked = Yes
271,110 UART: [state] Starting the WD Timer 40000000 cycles
276,133 UART: [kat] SHA2-256
458,156 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,643 UART: [kat] ++
470,250 UART: [kat] sha1
481,726 UART: [kat] SHA2-256
484,728 UART: [kat] SHA2-384
490,518 UART: [kat] SHA2-512-ACC
493,171 UART: [kat] ECC-384
3,778,642 UART: [kat] HMAC-384Kdf
3,805,395 UART: [kat] LMS
4,878,537 UART: [kat] --
4,885,784 UART: [cold-reset] ++
4,887,719 UART: [fht] FHT @ 0x50003400
4,899,054 UART: [idev] ++
4,899,761 UART: [idev] CDI.KEYID = 6
4,900,864 UART: [idev] SUBJECT.KEYID = 7
4,902,108 UART: [idev] UDS.KEYID = 0
4,903,006 ready_for_fw is high
4,903,217 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
5,002,109 UART: [idev] Erasing UDS.KEYID = 0
8,245,412 UART: [idev] Sha1 KeyId Algorithm
8,267,150 UART: [idev] --
8,271,487 UART: [ldev] ++
8,272,062 UART: [ldev] CDI.KEYID = 6
8,273,249 UART: [ldev] SUBJECT.KEYID = 5
8,274,414 UART: [ldev] AUTHORITY.KEYID = 7
8,275,596 UART: [ldev] FE.KEYID = 1
8,319,405 UART: [ldev] Erasing FE.KEYID = 1
11,653,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,163 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,471 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,998,495 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,014,651 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,034,831 UART: [ldev] --
14,039,180 UART: [fwproc] Wait for Commands...
14,041,115 UART: [fwproc] Recv command 0x46574c44
14,043,421 UART: [fwproc] Recv'd Img size: 78492 bytes
17,713,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,786,029 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,854,777 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,046,834 >>> mbox cmd response: success
18,051,274 UART: [afmc] ++
18,051,895 UART: [afmc] CDI.KEYID = 6
18,052,958 UART: [afmc] SUBJECT.KEYID = 7
18,054,179 UART: [afmc] AUTHORITY.KEYID = 5
21,428,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,744,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,746,328 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,762,371 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,778,422 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,794,510 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,817,072 UART: [afmc] --
23,820,933 UART: [cold-reset] --
23,823,772 UART: [state] Locking Datavault
23,829,958 UART: [state] Locking PCR0, PCR1 and PCR31
23,831,667 UART: [state] Locking ICCM
23,833,495 UART: [exit] Launching FMC @ 0x40000130
23,842,213 UART:
23,842,446 UART: Running Caliptra FMC ...
23,843,545 UART:
23,843,705 UART: [state] CFI Enabled
23,895,356 UART: [fht] FMC Alias Private Key: 7
26,232,670 UART: [art] Extend RT PCRs Done
26,233,885 UART: [art] Lock RT PCRs Done
26,235,536 UART: [art] Populate DV Done
26,240,836 UART: [fht] FMC Alias Private Key: 7
26,242,542 UART: [art] Derive CDI
26,243,280 UART: [art] Store in in slot 0x4
26,303,879 UART: [art] Derive Key Pair
26,304,917 UART: [art] Store priv key in slot 0x5
29,597,681 UART: [art] Derive Key Pair - Done
29,610,793 UART: [art] Signing Cert with AUTHO
29,612,098 UART: RITY.KEYID = 7
31,898,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,900,425 UART: [art] PUB.X = 848B5685B6869E1474B89857EE0D129EECE55B72C6F61D38285D8D4C69294D61ED00C5E41F19453EE0C55C5005E98A50
31,907,677 UART: [art] PUB.Y = 446A9515DA7F5B6C50356BBAEC315E537387B27A09F213C804218AB7E7DA55511A272BE2A689519A88CE3125231CACEE
31,914,914 UART: [art] SIG.R = D76DAAA0A128DAC477496E6E859167BB17B831394131F642B833974C2F646EB3FDCDDCB61B4A04AB85307E52457302AB
31,922,306 UART: [art] SIG.S = 528B675C111FB33C250EFA0C154B91F8593019DB215644963C33D4737396D3C9F7C9E07A77A34250074F2E1D52CB9895
33,227,097 UART: mbox::rt_entry...
33,228,057 UART: ____ _ _ _ ____ _____
33,229,987 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,231,998 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,233,925 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,235,855 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,237,782 UART: |_|
33,238,616 UART:
33,351,412 UART: [rt] Runtime listening for mailbox commands...
33,353,448 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,354,228 >>> mbox cmd response data (0 bytes)
Initializing fuses
995 UART:
1,234 UART: Running Caliptra ROM ...
2,339 UART:
2,494 UART: [state] CFI Enabled
59,916 UART: [state] LifecycleState = Production
61,681 UART: [state] DebugLocked = Yes
63,150 UART: [state] Starting the WD Timer 40000000 cycles
68,952 UART: [kat] SHA2-256
250,945 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
262,413 UART: [kat] ++
262,942 UART: [kat] sha1
273,339 UART: [kat] SHA2-256
276,366 UART: [kat] SHA2-384
281,212 UART: [kat] SHA2-512-ACC
283,875 UART: [kat] ECC-384
3,569,068 UART: [kat] HMAC-384Kdf
3,597,623 UART: [kat] LMS
4,670,773 UART: [kat] --
4,677,107 UART: [warm-reset] ++
4,682,125 UART: [warm-reset] --
4,684,960 UART: [state] Locking Datavault
4,689,512 UART: [state] Locking PCR0, PCR1 and PCR31
4,691,795 UART: [state] Locking ICCM
4,694,047 UART: [exit] Launching FMC @ 0x40000130
4,702,716 UART:
4,702,954 UART: Running Caliptra FMC ...
4,703,983 UART:
4,704,133 UART: [state] CFI Enabled
4,762,035 UART: [aliasrt :skip pcr extension
4,763,295 UART: [art] Extend RT PCRs Done
4,764,360 UART: [art] Lock RT PCRs Done
4,765,639 UART: [art] Populate DV Done
4,771,425 UART: [fht] FMC Alias Private Key: 7
4,772,837 UART: [art] Derive CDI
4,773,578 UART: [art] Store in in slot 0x4
4,830,750 UART: [art] Derive Key Pair
4,831,769 UART: [art] Store priv key in slot 0x5
8,124,075 UART: [art] Derive Key Pair - Done
8,136,803 UART: [art] Signing Cert with AUTHO
8,138,139 UART: RITY.KEYID = 7
10,425,670 UART: [art] Erasing AUTHORITY.KEYID = 7
10,427,180 UART: [art] PUB.X = 848B5685B6869E1474B89857EE0D129EECE55B72C6F61D38285D8D4C69294D61ED00C5E41F19453EE0C55C5005E98A50
10,434,435 UART: [art] PUB.Y = 446A9515DA7F5B6C50356BBAEC315E537387B27A09F213C804218AB7E7DA55511A272BE2A689519A88CE3125231CACEE
10,441,686 UART: [art] SIG.R = D76DAAA0A128DAC477496E6E859167BB17B831394131F642B833974C2F646EB3FDCDDCB61B4A04AB85307E52457302AB
10,449,106 UART: [art] SIG.S = 528B675C111FB33C250EFA0C154B91F8593019DB215644963C33D4737396D3C9F7C9E07A77A34250074F2E1D52CB9895
11,754,272 UART: mbox::rt_entry...
11,755,222 UART: ____ _ _ _ ____ _____
11,757,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,759,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,761,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,762,946 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,764,990 UART: |_|
11,765,802 UART:
15,332,189 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
192,227 UART:
192,601 UART: Running Caliptra ROM ...
193,886 UART:
603,255 UART: [state] CFI Enabled
616,916 UART: [state] LifecycleState = Production
619,105 UART: [state] DebugLocked = Yes
621,946 UART: [state] Starting the WD Timer 40000000 cycles
627,042 UART: [kat] SHA2-256
809,049 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,516 UART: [kat] ++
821,035 UART: [kat] sha1
831,671 UART: [kat] SHA2-256
834,755 UART: [kat] SHA2-384
841,171 UART: [kat] SHA2-512-ACC
843,752 UART: [kat] ECC-384
4,098,374 UART: [kat] HMAC-384Kdf
4,109,831 UART: [kat] LMS
5,182,994 UART: [kat] --
5,189,316 UART: [cold-reset] ++
5,190,662 UART: [fht] FHT @ 0x50003400
5,200,727 UART: [idev] ++
5,201,443 UART: [idev] CDI.KEYID = 6
5,202,687 UART: [idev] SUBJECT.KEYID = 7
5,204,072 UART: [idev] UDS.KEYID = 0
5,205,332 ready_for_fw is high
5,205,520 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
5,304,333 UART: [idev] Erasing UDS.KEYID = 0
8,496,347 UART: [idev] Sha1 KeyId Algorithm
8,517,916 UART: [idev] --
8,521,695 UART: [ldev] ++
8,522,259 UART: [ldev] CDI.KEYID = 6
8,523,489 UART: [ldev] SUBJECT.KEYID = 5
8,524,641 UART: [ldev] AUTHORITY.KEYID = 7
8,525,868 UART: [ldev] FE.KEYID = 1
8,537,749 UART: [ldev] Erasing FE.KEYID = 1
11,834,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,539 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,144,857 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,160,884 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,177,026 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,196,545 UART: [ldev] --
14,201,813 UART: [fwproc] Wait for Commands...
14,204,767 UART: [fwproc] Recv command 0x46574c44
14,207,087 UART: [fwproc] Recv'd Img size: 78492 bytes
17,867,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,943,265 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,012,013 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,204,304 >>> mbox cmd response: success
18,208,595 UART: [afmc] ++
18,209,204 UART: [afmc] CDI.KEYID = 6
18,210,397 UART: [afmc] SUBJECT.KEYID = 7
18,211,493 UART: [afmc] AUTHORITY.KEYID = 5
21,524,178 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,817,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,819,963 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,835,981 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,852,096 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,868,167 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,890,766 UART: [afmc] --
23,894,048 UART: [cold-reset] --
23,898,895 UART: [state] Locking Datavault
23,904,420 UART: [state] Locking PCR0, PCR1 and PCR31
23,906,115 UART: [state] Locking ICCM
23,907,705 UART: [exit] Launching FMC @ 0x40000130
23,916,377 UART:
23,916,606 UART: Running Caliptra FMC ...
23,917,629 UART:
23,917,774 UART: [state] CFI Enabled
23,925,920 UART: [fht] FMC Alias Private Key: 7
26,255,741 UART: [art] Extend RT PCRs Done
26,256,960 UART: [art] Lock RT PCRs Done
26,258,843 UART: [art] Populate DV Done
26,264,376 UART: [fht] FMC Alias Private Key: 7
26,265,865 UART: [art] Derive CDI
26,266,778 UART: [art] Store in in slot 0x4
26,309,338 UART: [art] Derive Key Pair
26,310,334 UART: [art] Store priv key in slot 0x5
29,552,038 UART: [art] Derive Key Pair - Done
29,565,202 UART: [art] Signing Cert with AUTHO
29,566,499 UART: RITY.KEYID = 7
31,845,419 UART: [art] Erasing AUTHORITY.KEYID = 7
31,846,938 UART: [art] PUB.X = DB55E54C17D378A0A603BFA4BD3388452B60612EB7CEE58794AD0B694E1FF26F17D8426AD6E96990AE15CC04FDD933D3
31,854,193 UART: [art] PUB.Y = CA642DCA4B48D4513BBD5C9EC949453710111BB04C4F59E62E6646994E70D7C03B0E24C6645658E0C5A90153A0AB7C57
31,861,416 UART: [art] SIG.R = 33828B96A48FBB8FF21C327D93434A4BD884D51A2B2FFE4051DC86DFECEF82A05B2AFEAF04865E55C4368670F18E283A
31,868,783 UART: [art] SIG.S = 768193C2A3D97ACACB414F7345D3CE9C93959ADE6941DD246A0056586857850DDA74C54855844EFC771E62E9250A16B0
33,173,284 UART: mbox::rt_entry...
33,174,253 UART: ____ _ _ _ ____ _____
33,176,177 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,178,183 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,180,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,182,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,183,980 UART: |_|
33,184,813 UART:
33,297,992 UART: [rt] Runtime listening for mailbox commands...
33,299,997 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,300,772 >>> mbox cmd response data (0 bytes)
Initializing fuses
989 UART:
1,249 UART: Running Caliptra ROM ...
2,272 UART:
7,225,675 UART: [state] CFI Enabled
7,240,703 UART: [state] LifecycleState = Production
7,242,459 UART: [state] DebugLocked = Yes
7,243,719 UART: [state] Starting the WD Timer 40000000 cycles
7,248,940 UART: [kat] SHA2-256
7,430,896 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,442,457 UART: [kat] ++
7,443,078 UART: [kat] sha1
7,452,192 UART: [kat] SHA2-256
7,455,217 UART: [kat] SHA2-384
7,460,116 UART: [kat] SHA2-512-ACC
7,462,737 UART: [kat] ECC-384
10,720,024 UART: [kat] HMAC-384Kdf
10,731,068 UART: [kat] LMS
11,804,264 UART: [kat] --
11,808,226 UART: [warm-reset] ++
11,814,168 UART: [warm-reset] --
11,818,304 UART: [state] Locking Datavault
11,821,776 UART: [state] Locking PCR0, PCR1 and PCR31
11,823,920 UART: [state] Locking ICCM
11,826,504 UART: [exit] Launching FMC @ 0x40000130
11,835,127 UART:
11,835,360 UART: Running Caliptra FMC ...
11,836,573 UART:
11,836,748 UART: [state] CFI Enabled
11,838,433 UART: [aliasrt :skip pcr extension
11,839,683 UART: [art] Extend RT PCRs Done
11,840,817 UART: [art] Lock RT PCRs Done
11,842,203 UART: [art] Populate DV Done
11,847,765 UART: [fht] FMC Alias Private Key: 7
11,849,458 UART: [art] Derive CDI
11,850,397 UART: [art] Store in in slot 0x4
11,893,060 UART: [art] Derive Key Pair
11,894,084 UART: [art] Store priv key in slot 0x5
15,136,468 UART: [art] Derive Key Pair - Done
15,149,474 UART: [art] Signing Cert with AUTHO
15,150,780 UART: RITY.KEYID = 7
17,429,981 UART: [art] Erasing AUTHORITY.KEYID = 7
17,431,500 UART: [art] PUB.X = DB55E54C17D378A0A603BFA4BD3388452B60612EB7CEE58794AD0B694E1FF26F17D8426AD6E96990AE15CC04FDD933D3
17,438,817 UART: [art] PUB.Y = CA642DCA4B48D4513BBD5C9EC949453710111BB04C4F59E62E6646994E70D7C03B0E24C6645658E0C5A90153A0AB7C57
17,445,971 UART: [art] SIG.R = 33828B96A48FBB8FF21C327D93434A4BD884D51A2B2FFE4051DC86DFECEF82A05B2AFEAF04865E55C4368670F18E283A
17,453,397 UART: [art] SIG.S = 768193C2A3D97ACACB414F7345D3CE9C93959ADE6941DD246A0056586857850DDA74C54855844EFC771E62E9250A16B0
18,757,792 UART: mbox::rt_entry...
18,758,752 UART: ____ _ _ _ ____ _____
18,760,733 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,762,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,764,662 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,766,583 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,768,505 UART: |_|
18,769,487 UART:
22,296,497 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,691 writing to cptra_bootfsm_go
192,351 UART:
192,721 UART: Running Caliptra ROM ...
193,801 UART:
603,264 UART: [state] CFI Enabled
618,557 UART: [state] LifecycleState = Production
620,731 UART: [state] DebugLocked = Yes
622,351 UART: [state] Starting the WD Timer 40000000 cycles
628,500 UART: [kat] SHA2-256
810,454 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,001 UART: [kat] ++
822,610 UART: [kat] sha1
834,777 UART: [kat] SHA2-256
837,768 UART: [kat] SHA2-384
844,546 UART: [kat] SHA2-512-ACC
847,196 UART: [kat] ECC-384
4,101,323 UART: [kat] HMAC-384Kdf
4,114,767 UART: [kat] LMS
5,187,949 UART: [kat] --
5,190,531 UART: [cold-reset] ++
5,192,249 UART: [fht] FHT @ 0x50003400
5,204,937 UART: [idev] ++
5,205,646 UART: [idev] CDI.KEYID = 6
5,206,815 UART: [idev] SUBJECT.KEYID = 7
5,208,269 UART: [idev] UDS.KEYID = 0
5,209,523 ready_for_fw is high
5,209,737 <<< Executing mbox cmd 0x46574c44 (78492 bytes) from SoC
5,308,459 UART: [idev] Erasing UDS.KEYID = 0
8,494,167 UART: [idev] Sha1 KeyId Algorithm
8,515,468 UART: [idev] --
8,520,843 UART: [ldev] ++
8,521,415 UART: [ldev] CDI.KEYID = 6
8,522,514 UART: [ldev] SUBJECT.KEYID = 5
8,523,780 UART: [ldev] AUTHORITY.KEYID = 7
8,524,925 UART: [ldev] FE.KEYID = 1
8,536,988 UART: [ldev] Erasing FE.KEYID = 1
11,833,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,033 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,144,352 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,160,381 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,176,441 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,196,055 UART: [ldev] --
14,201,056 UART: [fwproc] Wait for Commands...
14,203,959 UART: [fwproc] Recv command 0x46574c44
14,206,278 UART: [fwproc] Recv'd Img size: 78492 bytes
17,858,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,934,472 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,003,211 UART: [fwproc] Load Runtime at address 0x40005000 len 53788
18,195,490 >>> mbox cmd response: success
18,199,313 UART: [afmc] ++
18,199,925 UART: [afmc] CDI.KEYID = 6
18,201,033 UART: [afmc] SUBJECT.KEYID = 7
18,202,255 UART: [afmc] AUTHORITY.KEYID = 5
21,521,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,817,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,819,474 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,835,499 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,851,581 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,867,644 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,889,978 UART: [afmc] --
23,892,726 UART: [cold-reset] --
23,896,875 UART: [state] Locking Datavault
23,902,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,904,499 UART: [state] Locking ICCM
23,906,439 UART: [exit] Launching FMC @ 0x40000130
23,915,075 UART:
23,915,313 UART: Running Caliptra FMC ...
23,916,411 UART:
23,916,563 UART: [state] CFI Enabled
23,924,823 UART: [fht] FMC Alias Private Key: 7
26,255,661 UART: [art] Extend RT PCRs Done
26,256,887 UART: [art] Lock RT PCRs Done
26,258,645 UART: [art] Populate DV Done
26,264,163 UART: [fht] FMC Alias Private Key: 7
26,265,644 UART: [art] Derive CDI
26,266,376 UART: [art] Store in in slot 0x4
26,309,471 UART: [art] Derive Key Pair
26,310,511 UART: [art] Store priv key in slot 0x5
29,552,489 UART: [art] Derive Key Pair - Done
29,565,652 UART: [art] Signing Cert with AUTHO
29,566,960 UART: RITY.KEYID = 7
31,846,418 UART: [art] Erasing AUTHORITY.KEYID = 7
31,847,933 UART: [art] PUB.X = 574F4B08323EF495C99B47AD003903701A9AB0254A184F5FBEC57D1FCF021B0D22C99C23CE1D388780C5F5AF98B2A074
31,855,207 UART: [art] PUB.Y = 577AEEFDA56D371CA825F68E24D053CBF133106DF08F2B4B126A89A2E6D9288B734DBD3075DC6F33C25E8142FC1E84EA
31,862,479 UART: [art] SIG.R = F04833C9A30336363E6CAD552805EF4B236E3E605DE37191C71F5A1CC7A378EEE7EF43111F364463961FEB7C66F8E7D0
31,869,847 UART: [art] SIG.S = 092BA8515EBE35A8783094DA2F5E1D44EC27F1A4A80305DB027B2F2629CF974E405948DE1A387C83BAFBE378973E801D
33,175,173 UART: mbox::rt_entry...
33,176,141 UART: ____ _ _ _ ____ _____
33,178,127 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,180,131 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,182,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,183,982 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,185,928 UART: |_|
33,186,739 UART:
33,300,414 UART: [rt] Runtime listening for mailbox commands...
33,302,429 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,303,224 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,023 UART:
1,191 UART: Running Caliptra ROM ...
2,199 UART:
7,233,712 UART: [state] CFI Enabled
7,245,209 UART: [state] LifecycleState = Production
7,246,955 UART: [state] DebugLocked = Yes
7,249,954 UART: [state] Starting the WD Timer 40000000 cycles
7,254,871 UART: [kat] SHA2-256
7,436,853 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,448,385 UART: [kat] ++
7,449,005 UART: [kat] sha1
7,460,717 UART: [kat] SHA2-256
7,463,743 UART: [kat] SHA2-384
7,468,052 UART: [kat] SHA2-512-ACC
7,470,683 UART: [kat] ECC-384
10,727,380 UART: [kat] HMAC-384Kdf
10,739,190 UART: [kat] LMS
11,812,395 UART: [kat] --
11,819,261 UART: [warm-reset] ++
11,826,119 UART: [warm-reset] --
11,830,149 UART: [state] Locking Datavault
11,832,870 UART: [state] Locking PCR0, PCR1 and PCR31
11,835,077 UART: [state] Locking ICCM
11,836,799 UART: [exit] Launching FMC @ 0x40000130
11,845,482 UART:
11,845,721 UART: Running Caliptra FMC ...
11,847,055 UART:
11,847,225 UART: [state] CFI Enabled
11,848,878 UART: [aliasrt :skip pcr extension
11,850,124 UART: [art] Extend RT PCRs Done
11,851,183 UART: [art] Lock RT PCRs Done
11,852,680 UART: [art] Populate DV Done
11,858,032 UART: [fht] FMC Alias Private Key: 7
11,859,621 UART: [art] Derive CDI
11,860,351 UART: [art] Store in in slot 0x4
11,902,800 UART: [art] Derive Key Pair
11,903,815 UART: [art] Store priv key in slot 0x5
15,146,181 UART: [art] Derive Key Pair - Done
15,159,563 UART: [art] Signing Cert with AUTHO
15,160,863 UART: RITY.KEYID = 7
17,440,246 UART: [art] Erasing AUTHORITY.KEYID = 7
17,441,758 UART: [art] PUB.X = 574F4B08323EF495C99B47AD003903701A9AB0254A184F5FBEC57D1FCF021B0D22C99C23CE1D388780C5F5AF98B2A074
17,449,002 UART: [art] PUB.Y = 577AEEFDA56D371CA825F68E24D053CBF133106DF08F2B4B126A89A2E6D9288B734DBD3075DC6F33C25E8142FC1E84EA
17,456,271 UART: [art] SIG.R = F04833C9A30336363E6CAD552805EF4B236E3E605DE37191C71F5A1CC7A378EEE7EF43111F364463961FEB7C66F8E7D0
17,463,644 UART: [art] SIG.S = 092BA8515EBE35A8783094DA2F5E1D44EC27F1A4A80305DB027B2F2629CF974E405948DE1A387C83BAFBE378973E801D
18,768,682 UART: mbox::rt_entry...
18,769,647 UART: ____ _ _ _ ____ _____
18,771,633 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,773,639 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,775,570 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,777,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,779,435 UART: |_|
18,780,238 UART:
22,305,409 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
191,951 UART:
192,338 UART: Running Caliptra ROM ...
193,466 UART:
193,611 UART: [state] CFI Enabled
268,635 UART: [state] LifecycleState = Production
270,422 UART: [state] DebugLocked = Yes
271,773 UART: [state] Starting the WD Timer 40000000 cycles
277,485 UART: [kat] SHA2-256
456,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
468,199 UART: [kat] ++
468,646 UART: [kat] sha1
478,764 UART: [kat] SHA2-256
481,770 UART: [kat] SHA2-384
488,683 UART: [kat] SHA2-512-ACC
491,620 UART: [kat] ECC-384
2,947,157 UART: [kat] HMAC-384Kdf
2,972,751 UART: [kat] LMS
3,502,218 UART: [kat] --
3,507,347 UART: [cold-reset] ++
3,509,555 UART: [fht] FHT @ 0x50003400
3,520,597 UART: [idev] ++
3,521,157 UART: [idev] CDI.KEYID = 6
3,522,184 UART: [idev] SUBJECT.KEYID = 7
3,523,281 UART: [idev] UDS.KEYID = 0
3,524,279 ready_for_fw is high
3,524,497 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,623,755 UART: [idev] Erasing UDS.KEYID = 0
6,026,263 UART: [idev] Sha1 KeyId Algorithm
6,050,251 UART: [idev] --
6,055,468 UART: [ldev] ++
6,056,050 UART: [ldev] CDI.KEYID = 6
6,056,965 UART: [ldev] SUBJECT.KEYID = 5
6,058,175 UART: [ldev] AUTHORITY.KEYID = 7
6,059,397 UART: [ldev] FE.KEYID = 1
6,100,143 UART: [ldev] Erasing FE.KEYID = 1
8,602,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,969 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,014 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,794 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,748 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,435 UART: [ldev] --
10,411,470 UART: [fwproc] Wait for Commands...
10,413,552 UART: [fwproc] Recv command 0x46574c44
10,415,636 UART: [fwproc] Recv'd Img size: 78456 bytes
13,406,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,483,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,551,955 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,744,957 >>> mbox cmd response: success
13,748,343 UART: [afmc] ++
13,748,950 UART: [afmc] CDI.KEYID = 6
13,749,830 UART: [afmc] SUBJECT.KEYID = 7
13,750,982 UART: [afmc] AUTHORITY.KEYID = 5
16,295,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,018,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,020,222 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,036,184 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,028 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,067,791 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,090,438 UART: [afmc] --
18,093,317 UART: [cold-reset] --
18,095,666 UART: [state] Locking Datavault
18,099,995 UART: [state] Locking PCR0, PCR1 and PCR31
18,101,705 UART: [state] Locking ICCM
18,104,393 UART: [exit] Launching FMC @ 0x40000130
18,112,840 UART:
18,113,072 UART: Running Caliptra FMC ...
18,114,166 UART:
18,114,318 UART: [state] CFI Enabled
18,176,943 UART: [fht] FMC Alias Private Key: 7
19,940,573 UART: [art] Extend RT PCRs Done
19,941,777 UART: [art] Lock RT PCRs Done
19,943,555 UART: [art] Populate DV Done
19,948,849 UART: [fht] FMC Alias Private Key: 7
19,950,397 UART: [art] Derive CDI
19,951,208 UART: [art] Store in in slot 0x4
20,008,949 UART: [art] Derive Key Pair
20,010,006 UART: [art] Store priv key in slot 0x5
22,473,020 UART: [art] Derive Key Pair - Done
22,485,969 UART: [art] Signing Cert with AUTHO
22,487,275 UART: RITY.KEYID = 7
24,199,275 UART: [art] Erasing AUTHORITY.KEYID = 7
24,200,762 UART: [art] PUB.X = 15118D8CD46853D8C819CBF2F40145B1924B5627F552C1EA47A85FA2B6AE9AB2A94B76344BB300745335F6AF49CC9ADE
24,207,994 UART: [art] PUB.Y = DDB666B67DF6583446AB87C16A3CE6D65F5D8E5CDF67FFC9BA8770816BE0A87F45A1382FBDDCBE74FDCB8878E1B6345F
24,215,322 UART: [art] SIG.R = 966CC072E4153712F0C1FC65BA5CF65A2CA3278DFF58764BAF3482D62AB310A65BE603DC2AEB8BFB17386EF2E56D24A8
24,222,737 UART: [art] SIG.S = E245818879E810C6579B8B501481E6EB5372568B01FEE77A4370376823798BFF105FD212B8ADF9BF753A3DD790940E98
25,200,994 UART: mbox::rt_entry...
25,201,961 UART: ____ _ _ _ ____ _____
25,203,948 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,205,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,207,894 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,209,834 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,211,757 UART: |_|
25,212,563 UART:
25,325,874 UART: [rt] Runtime listening for mailbox commands...
25,327,892 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,328,658 >>> mbox cmd response data (0 bytes)
Initializing fuses
989 UART:
1,229 UART: Running Caliptra ROM ...
2,331 UART:
2,481 UART: [state] CFI Enabled
60,099 UART: [state] LifecycleState = Production
61,826 UART: [state] DebugLocked = Yes
63,985 UART: [state] Starting the WD Timer 40000000 cycles
69,624 UART: [kat] SHA2-256
248,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
260,325 UART: [kat] ++
260,848 UART: [kat] sha1
272,488 UART: [kat] SHA2-256
275,535 UART: [kat] SHA2-384
281,716 UART: [kat] SHA2-512-ACC
284,652 UART: [kat] ECC-384
2,748,087 UART: [kat] HMAC-384Kdf
2,770,312 UART: [kat] LMS
3,299,800 UART: [kat] --
3,304,455 UART: [warm-reset] ++
3,310,491 UART: [warm-reset] --
3,314,246 UART: [state] Locking Datavault
3,317,763 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,474 UART: [state] Locking ICCM
3,321,359 UART: [exit] Launching FMC @ 0x40000130
3,329,774 UART:
3,330,012 UART: Running Caliptra FMC ...
3,331,114 UART:
3,331,271 UART: [state] CFI Enabled
3,379,630 UART: [aliasrt :skip pcr extension
3,380,920 UART: [art] Extend RT PCRs Done
3,382,059 UART: [art] Lock RT PCRs Done
3,383,343 UART: [art] Populate DV Done
3,388,963 UART: [fht] FMC Alias Private Key: 7
3,390,603 UART: [art] Derive CDI
3,391,412 UART: [art] Store in in slot 0x4
3,448,139 UART: [art] Derive Key Pair
3,449,188 UART: [art] Store priv key in slot 0x5
5,912,475 UART: [art] Derive Key Pair - Done
5,925,534 UART: [art] Signing Cert with AUTHO
5,926,841 UART: RITY.KEYID = 7
7,638,437 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,952 UART: [art] PUB.X = 15118D8CD46853D8C819CBF2F40145B1924B5627F552C1EA47A85FA2B6AE9AB2A94B76344BB300745335F6AF49CC9ADE
7,647,237 UART: [art] PUB.Y = DDB666B67DF6583446AB87C16A3CE6D65F5D8E5CDF67FFC9BA8770816BE0A87F45A1382FBDDCBE74FDCB8878E1B6345F
7,654,512 UART: [art] SIG.R = 966CC072E4153712F0C1FC65BA5CF65A2CA3278DFF58764BAF3482D62AB310A65BE603DC2AEB8BFB17386EF2E56D24A8
7,661,950 UART: [art] SIG.S = E245818879E810C6579B8B501481E6EB5372568B01FEE77A4370376823798BFF105FD212B8ADF9BF753A3DD790940E98
8,640,404 UART: mbox::rt_entry...
8,641,348 UART: ____ _ _ _ ____ _____
8,643,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,135 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,057 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,937 UART: |_|
8,651,819 UART:
11,393,886 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,001 UART:
192,381 UART: Running Caliptra ROM ...
193,511 UART:
193,658 UART: [state] CFI Enabled
265,058 UART: [state] LifecycleState = Production
266,882 UART: [state] DebugLocked = Yes
268,826 UART: [state] Starting the WD Timer 40000000 cycles
273,790 UART: [kat] SHA2-256
452,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,518 UART: [kat] ++
464,967 UART: [kat] sha1
476,362 UART: [kat] SHA2-256
479,395 UART: [kat] SHA2-384
486,237 UART: [kat] SHA2-512-ACC
489,241 UART: [kat] ECC-384
2,947,476 UART: [kat] HMAC-384Kdf
2,971,148 UART: [kat] LMS
3,500,645 UART: [kat] --
3,505,029 UART: [cold-reset] ++
3,506,892 UART: [fht] FHT @ 0x50003400
3,519,298 UART: [idev] ++
3,519,865 UART: [idev] CDI.KEYID = 6
3,520,893 UART: [idev] SUBJECT.KEYID = 7
3,521,991 UART: [idev] UDS.KEYID = 0
3,522,989 ready_for_fw is high
3,523,190 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,622,052 UART: [idev] Erasing UDS.KEYID = 0
6,025,763 UART: [idev] Sha1 KeyId Algorithm
6,048,484 UART: [idev] --
6,052,859 UART: [ldev] ++
6,053,428 UART: [ldev] CDI.KEYID = 6
6,054,336 UART: [ldev] SUBJECT.KEYID = 5
6,055,544 UART: [ldev] AUTHORITY.KEYID = 7
6,056,772 UART: [ldev] FE.KEYID = 1
6,099,179 UART: [ldev] Erasing FE.KEYID = 1
8,597,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,139 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,130 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,961 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,882 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,388,248 UART: [ldev] --
10,392,430 UART: [fwproc] Wait for Commands...
10,393,993 UART: [fwproc] Recv command 0x46574c44
10,396,092 UART: [fwproc] Recv'd Img size: 78456 bytes
13,382,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,453,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,521,771 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,714,441 >>> mbox cmd response: success
13,719,187 UART: [afmc] ++
13,719,794 UART: [afmc] CDI.KEYID = 6
13,720,680 UART: [afmc] SUBJECT.KEYID = 7
13,721,782 UART: [afmc] AUTHORITY.KEYID = 5
16,256,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,978,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,979,876 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
17,995,903 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,011,739 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,027,497 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,050,616 UART: [afmc] --
18,054,408 UART: [cold-reset] --
18,058,826 UART: [state] Locking Datavault
18,064,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,066,041 UART: [state] Locking ICCM
18,067,925 UART: [exit] Launching FMC @ 0x40000130
18,076,320 UART:
18,076,549 UART: Running Caliptra FMC ...
18,077,648 UART:
18,077,806 UART: [state] CFI Enabled
18,135,415 UART: [fht] FMC Alias Private Key: 7
19,899,667 UART: [art] Extend RT PCRs Done
19,900,889 UART: [art] Lock RT PCRs Done
19,902,594 UART: [art] Populate DV Done
19,907,888 UART: [fht] FMC Alias Private Key: 7
19,909,415 UART: [art] Derive CDI
19,910,150 UART: [art] Store in in slot 0x4
19,968,163 UART: [art] Derive Key Pair
19,969,227 UART: [art] Store priv key in slot 0x5
22,432,560 UART: [art] Derive Key Pair - Done
22,445,128 UART: [art] Signing Cert with AUTHO
22,446,425 UART: RITY.KEYID = 7
24,158,472 UART: [art] Erasing AUTHORITY.KEYID = 7
24,159,973 UART: [art] PUB.X = A0E717CE2A7519DB37E377EA2ED8CD71D191DB5379B1D516501BAF3894D90E88CA184A5794F86701CC8F1BDDF77F0B7F
24,167,250 UART: [art] PUB.Y = 76148C6D614BC6748EC3EEB8F3C322DCF6E92C6D689A8D11CBBC58BFE96AC5BA5F6954AA0B5106CAA6A6AE9BE2F92CD1
24,174,578 UART: [art] SIG.R = 311EBE6ED9E5DFEDD31BF95F08412438C479B2577E50449DCB930D06F22ECC3CD53EC42D3CEF2EF43182A31902DA8AB1
24,181,994 UART: [art] SIG.S = 4DF265D5F9C2E408688A103BE288834F1B61538071E1B2019ECFC7EF5FEFB49462DBE6231915558848BBEBF11F71C530
25,160,694 UART: mbox::rt_entry...
25,161,647 UART: ____ _ _ _ ____ _____
25,163,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,165,582 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,167,508 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,169,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,171,353 UART: |_|
25,172,178 UART:
25,285,464 UART: [rt] Runtime listening for mailbox commands...
25,287,477 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,288,245 >>> mbox cmd response data (0 bytes)
Initializing fuses
989 UART:
1,226 UART: Running Caliptra ROM ...
2,329 UART:
2,478 UART: [state] CFI Enabled
63,946 UART: [state] LifecycleState = Production
65,709 UART: [state] DebugLocked = Yes
68,691 UART: [state] Starting the WD Timer 40000000 cycles
73,739 UART: [kat] SHA2-256
252,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,484 UART: [kat] ++
264,932 UART: [kat] sha1
276,151 UART: [kat] SHA2-256
279,158 UART: [kat] SHA2-384
285,458 UART: [kat] SHA2-512-ACC
288,386 UART: [kat] ECC-384
2,745,604 UART: [kat] HMAC-384Kdf
2,767,882 UART: [kat] LMS
3,297,379 UART: [kat] --
3,301,110 UART: [warm-reset] ++
3,306,249 UART: [warm-reset] --
3,308,876 UART: [state] Locking Datavault
3,311,973 UART: [state] Locking PCR0, PCR1 and PCR31
3,313,672 UART: [state] Locking ICCM
3,315,691 UART: [exit] Launching FMC @ 0x40000130
3,324,140 UART:
3,324,369 UART: Running Caliptra FMC ...
3,325,396 UART:
3,325,561 UART: [state] CFI Enabled
3,377,714 UART: [aliasrt :skip pcr extension
3,379,169 UART: [art] Extend RT PCRs Done
3,380,236 UART: [art] Lock RT PCRs Done
3,381,413 UART: [art] Populate DV Done
3,387,250 UART: [fht] FMC Alias Private Key: 7
3,388,836 UART: [art] Derive CDI
3,389,645 UART: [art] Store in in slot 0x4
3,446,693 UART: [art] Derive Key Pair
3,447,711 UART: [art] Store priv key in slot 0x5
5,910,528 UART: [art] Derive Key Pair - Done
5,923,304 UART: [art] Signing Cert with AUTHO
5,924,613 UART: RITY.KEYID = 7
7,636,028 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,746 UART: [art] PUB.X = A0E717CE2A7519DB37E377EA2ED8CD71D191DB5379B1D516501BAF3894D90E88CA184A5794F86701CC8F1BDDF77F0B7F
7,644,816 UART: [art] PUB.Y = 76148C6D614BC6748EC3EEB8F3C322DCF6E92C6D689A8D11CBBC58BFE96AC5BA5F6954AA0B5106CAA6A6AE9BE2F92CD1
7,652,113 UART: [art] SIG.R = 311EBE6ED9E5DFEDD31BF95F08412438C479B2577E50449DCB930D06F22ECC3CD53EC42D3CEF2EF43182A31902DA8AB1
7,659,496 UART: [art] SIG.S = 4DF265D5F9C2E408688A103BE288834F1B61538071E1B2019ECFC7EF5FEFB49462DBE6231915558848BBEBF11F71C530
8,638,363 UART: mbox::rt_entry...
8,639,303 UART: ____ _ _ _ ____ _____
8,641,282 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,219 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,148 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,001 UART: |_|
8,649,807 UART:
11,391,912 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
192,296 UART:
192,669 UART: Running Caliptra ROM ...
193,832 UART:
603,555 UART: [state] CFI Enabled
615,260 UART: [state] LifecycleState = Production
617,061 UART: [state] DebugLocked = Yes
618,626 UART: [state] Starting the WD Timer 40000000 cycles
622,870 UART: [kat] SHA2-256
802,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,578 UART: [kat] ++
814,044 UART: [kat] sha1
824,099 UART: [kat] SHA2-256
827,129 UART: [kat] SHA2-384
833,199 UART: [kat] SHA2-512-ACC
836,145 UART: [kat] ECC-384
3,280,227 UART: [kat] HMAC-384Kdf
3,292,745 UART: [kat] LMS
3,822,268 UART: [kat] --
3,826,899 UART: [cold-reset] ++
3,828,823 UART: [fht] FHT @ 0x50003400
3,839,152 UART: [idev] ++
3,839,720 UART: [idev] CDI.KEYID = 6
3,840,603 UART: [idev] SUBJECT.KEYID = 7
3,841,806 UART: [idev] UDS.KEYID = 0
3,842,793 ready_for_fw is high
3,842,988 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,941,596 UART: [idev] Erasing UDS.KEYID = 0
6,317,306 UART: [idev] Sha1 KeyId Algorithm
6,340,587 UART: [idev] --
6,345,237 UART: [ldev] ++
6,345,810 UART: [ldev] CDI.KEYID = 6
6,346,729 UART: [ldev] SUBJECT.KEYID = 5
6,347,890 UART: [ldev] AUTHORITY.KEYID = 7
6,349,175 UART: [ldev] FE.KEYID = 1
6,359,061 UART: [ldev] Erasing FE.KEYID = 1
8,841,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,885 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,575,864 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,591,732 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,607,643 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,628,794 UART: [ldev] --
10,633,325 UART: [fwproc] Wait for Commands...
10,634,971 UART: [fwproc] Recv command 0x46574c44
10,637,070 UART: [fwproc] Recv'd Img size: 78456 bytes
13,631,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,699,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,767,863 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,959,772 >>> mbox cmd response: success
13,963,932 UART: [afmc] ++
13,964,547 UART: [afmc] CDI.KEYID = 6
13,965,471 UART: [afmc] SUBJECT.KEYID = 7
13,966,641 UART: [afmc] AUTHORITY.KEYID = 5
16,466,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,185,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,186,962 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,202,932 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,218,777 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,234,529 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,256,728 UART: [afmc] --
18,260,196 UART: [cold-reset] --
18,264,169 UART: [state] Locking Datavault
18,269,738 UART: [state] Locking PCR0, PCR1 and PCR31
18,271,391 UART: [state] Locking ICCM
18,273,249 UART: [exit] Launching FMC @ 0x40000130
18,281,703 UART:
18,281,941 UART: Running Caliptra FMC ...
18,282,964 UART:
18,283,110 UART: [state] CFI Enabled
18,291,270 UART: [fht] FMC Alias Private Key: 7
20,047,473 UART: [art] Extend RT PCRs Done
20,048,699 UART: [art] Lock RT PCRs Done
20,050,087 UART: [art] Populate DV Done
20,055,507 UART: [fht] FMC Alias Private Key: 7
20,057,250 UART: [art] Derive CDI
20,058,017 UART: [art] Store in in slot 0x4
20,100,396 UART: [art] Derive Key Pair
20,101,524 UART: [art] Store priv key in slot 0x5
22,528,454 UART: [art] Derive Key Pair - Done
22,541,411 UART: [art] Signing Cert with AUTHO
22,542,741 UART: RITY.KEYID = 7
24,247,800 UART: [art] Erasing AUTHORITY.KEYID = 7
24,249,303 UART: [art] PUB.X = 57F2001D8353E60102817AE5432CA3B37F0E406F6A64743F25AD19DF9F5461BFEA85DF9ADE570B5CDB4AB3EC2FCD7514
24,256,572 UART: [art] PUB.Y = E5ACF6A0F7B8BE128F3F8B7D15483AC015E8C27FF9CB2682260526F9AF739799EC4B4800707375D0DCFC2DD60E4FD142
24,263,825 UART: [art] SIG.R = 66EDE48D5A9F65DDF2DA50737EB02966FEC034639F141AF112F4377B6AD18711CB9143FB58D67B5ED5AD01A9A2F176A6
24,271,199 UART: [art] SIG.S = 012BEFF9655C81A2C076C6DDEAE9B1D0D79A2232E6A569E9F506982FC21224D7F098CC7C337BC8B27BE53CDAC0FCCB80
25,249,665 UART: mbox::rt_entry...
25,250,629 UART: ____ _ _ _ ____ _____
25,252,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,254,758 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,256,694 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,258,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,260,582 UART: |_|
25,261,395 UART:
25,374,678 UART: [rt] Runtime listening for mailbox commands...
25,376,687 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,377,462 >>> mbox cmd response data (0 bytes)
Initializing fuses
986 UART:
1,170 UART: Running Caliptra ROM ...
2,287 UART:
15,154,504 UART: [state] CFI Enabled
15,169,057 UART: [state] LifecycleState = Production
15,170,817 UART: [state] DebugLocked = Yes
15,172,248 UART: [state] Starting the WD Timer 40000000 cycles
15,177,639 UART: [kat] SHA2-256
15,356,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,368,344 UART: [kat] ++
15,368,895 UART: [kat] sha1
15,378,495 UART: [kat] SHA2-256
15,381,514 UART: [kat] SHA2-384
15,387,881 UART: [kat] SHA2-512-ACC
15,390,824 UART: [kat] ECC-384
17,834,970 UART: [kat] HMAC-384Kdf
17,847,092 UART: [kat] LMS
18,376,596 UART: [kat] --
18,380,317 UART: [warm-reset] ++
18,386,512 UART: [warm-reset] --
18,391,348 UART: [state] Locking Datavault
18,394,178 UART: [state] Locking PCR0, PCR1 and PCR31
18,395,883 UART: [state] Locking ICCM
18,398,578 UART: [exit] Launching FMC @ 0x40000130
18,406,981 UART:
18,407,243 UART: Running Caliptra FMC ...
18,408,351 UART:
18,408,508 UART: [state] CFI Enabled
18,410,671 UART: [aliasrt :skip pcr extension
18,411,916 UART: [art] Extend RT PCRs Done
18,413,054 UART: [art] Lock RT PCRs Done
18,414,289 UART: [art] Populate DV Done
18,419,859 UART: [fht] FMC Alias Private Key: 7
18,421,453 UART: [art] Derive CDI
18,422,267 UART: [art] Store in in slot 0x4
18,464,757 UART: [art] Derive Key Pair
18,465,812 UART: [art] Store priv key in slot 0x5
20,892,456 UART: [art] Derive Key Pair - Done
20,905,618 UART: [art] Signing Cert with AUTHO
20,906,932 UART: RITY.KEYID = 7
22,612,367 UART: [art] Erasing AUTHORITY.KEYID = 7
22,613,886 UART: [art] PUB.X = 57F2001D8353E60102817AE5432CA3B37F0E406F6A64743F25AD19DF9F5461BFEA85DF9ADE570B5CDB4AB3EC2FCD7514
22,621,160 UART: [art] PUB.Y = E5ACF6A0F7B8BE128F3F8B7D15483AC015E8C27FF9CB2682260526F9AF739799EC4B4800707375D0DCFC2DD60E4FD142
22,628,429 UART: [art] SIG.R = 66EDE48D5A9F65DDF2DA50737EB02966FEC034639F141AF112F4377B6AD18711CB9143FB58D67B5ED5AD01A9A2F176A6
22,635,798 UART: [art] SIG.S = 012BEFF9655C81A2C076C6DDEAE9B1D0D79A2232E6A569E9F506982FC21224D7F098CC7C337BC8B27BE53CDAC0FCCB80
23,614,653 UART: mbox::rt_entry...
23,615,618 UART: ____ _ _ _ ____ _____
23,617,610 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,619,621 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,621,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,623,491 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,625,346 UART: |_|
23,626,145 UART:
26,335,913 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,687 writing to cptra_bootfsm_go
192,329 UART:
192,703 UART: Running Caliptra ROM ...
193,884 UART:
603,377 UART: [state] CFI Enabled
616,079 UART: [state] LifecycleState = Production
617,782 UART: [state] DebugLocked = Yes
619,849 UART: [state] Starting the WD Timer 40000000 cycles
625,662 UART: [kat] SHA2-256
804,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,391 UART: [kat] ++
816,840 UART: [kat] sha1
828,258 UART: [kat] SHA2-256
831,309 UART: [kat] SHA2-384
838,373 UART: [kat] SHA2-512-ACC
841,334 UART: [kat] ECC-384
3,279,832 UART: [kat] HMAC-384Kdf
3,292,699 UART: [kat] LMS
3,822,261 UART: [kat] --
3,827,094 UART: [cold-reset] ++
3,829,537 UART: [fht] FHT @ 0x50003400
3,840,944 UART: [idev] ++
3,841,508 UART: [idev] CDI.KEYID = 6
3,842,471 UART: [idev] SUBJECT.KEYID = 7
3,843,644 UART: [idev] UDS.KEYID = 0
3,844,545 ready_for_fw is high
3,844,744 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,943,398 UART: [idev] Erasing UDS.KEYID = 0
6,318,705 UART: [idev] Sha1 KeyId Algorithm
6,341,469 UART: [idev] --
6,344,769 UART: [ldev] ++
6,345,363 UART: [ldev] CDI.KEYID = 6
6,346,654 UART: [ldev] SUBJECT.KEYID = 5
6,347,693 UART: [ldev] AUTHORITY.KEYID = 7
6,348,781 UART: [ldev] FE.KEYID = 1
6,358,883 UART: [ldev] Erasing FE.KEYID = 1
8,836,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,514 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,492 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,311 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,318 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,582 UART: [ldev] --
10,625,551 UART: [fwproc] Wait for Commands...
10,628,619 UART: [fwproc] Recv command 0x46574c44
10,630,710 UART: [fwproc] Recv'd Img size: 78456 bytes
13,624,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,694,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,763,269 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,955,699 >>> mbox cmd response: success
13,960,066 UART: [afmc] ++
13,960,680 UART: [afmc] CDI.KEYID = 6
13,961,592 UART: [afmc] SUBJECT.KEYID = 7
13,962,750 UART: [afmc] AUTHORITY.KEYID = 5
16,467,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,190,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,191,925 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,207,953 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,223,797 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,239,522 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,261,421 UART: [afmc] --
18,265,052 UART: [cold-reset] --
18,268,663 UART: [state] Locking Datavault
18,273,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,275,034 UART: [state] Locking ICCM
18,276,297 UART: [exit] Launching FMC @ 0x40000130
18,284,752 UART:
18,284,989 UART: Running Caliptra FMC ...
18,286,012 UART:
18,286,163 UART: [state] CFI Enabled
18,294,648 UART: [fht] FMC Alias Private Key: 7
20,051,554 UART: [art] Extend RT PCRs Done
20,052,781 UART: [art] Lock RT PCRs Done
20,054,547 UART: [art] Populate DV Done
20,060,094 UART: [fht] FMC Alias Private Key: 7
20,061,580 UART: [art] Derive CDI
20,062,353 UART: [art] Store in in slot 0x4
20,104,800 UART: [art] Derive Key Pair
20,105,799 UART: [art] Store priv key in slot 0x5
22,532,679 UART: [art] Derive Key Pair - Done
22,545,747 UART: [art] Signing Cert with AUTHO
22,547,051 UART: RITY.KEYID = 7
24,252,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,254,073 UART: [art] PUB.X = B60BF2F00AD566D9F9492C73F980F86A0D676A3F775C59B98F6EA635C9FF6735C1D6BB90DE67082AB107D7E6BE96A123
24,261,344 UART: [art] PUB.Y = 63EAEB84D4FAD8BBFDD37CDFCC906CDB5A12F5A0CA41BE01037B56086F21CF650E48D3881284350A6E6B03DFC332D004
24,268,629 UART: [art] SIG.R = F10956EFB52B8588A9AA802CA68FD5B3145905166BD4E057832473A05667D41BBE3BB4E89C9FD2F4BCE95877396564A7
24,276,007 UART: [art] SIG.S = 9EA2821CBCCE1E47385A32994C5093E19553A13995D66805CC6DD0B4768315F89EE751F6DABF5FC05F0EA371E04BE746
25,254,659 UART: mbox::rt_entry...
25,255,610 UART: ____ _ _ _ ____ _____
25,257,532 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,259,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,261,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,263,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,265,370 UART: |_|
25,266,178 UART:
25,379,843 UART: [rt] Runtime listening for mailbox commands...
25,381,869 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,382,635 >>> mbox cmd response data (0 bytes)
Initializing fuses
988 UART:
1,241 UART: Running Caliptra ROM ...
2,272 UART:
15,141,202 UART: [state] CFI Enabled
15,156,229 UART: [state] LifecycleState = Production
15,157,977 UART: [state] DebugLocked = Yes
15,160,290 UART: [state] Starting the WD Timer 40000000 cycles
15,164,753 UART: [kat] SHA2-256
15,343,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,355,492 UART: [kat] ++
15,356,035 UART: [kat] sha1
15,365,742 UART: [kat] SHA2-256
15,368,738 UART: [kat] SHA2-384
15,374,531 UART: [kat] SHA2-512-ACC
15,377,496 UART: [kat] ECC-384
17,819,677 UART: [kat] HMAC-384Kdf
17,831,471 UART: [kat] LMS
18,360,997 UART: [kat] --
18,367,633 UART: [warm-reset] ++
18,372,314 UART: [warm-reset] --
18,375,917 UART: [state] Locking Datavault
18,378,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,380,388 UART: [state] Locking ICCM
18,382,186 UART: [exit] Launching FMC @ 0x40000130
18,390,640 UART:
18,390,877 UART: Running Caliptra FMC ...
18,391,908 UART:
18,392,056 UART: [state] CFI Enabled
18,394,334 UART: [aliasrt :skip pcr extension
18,395,607 UART: [art] Extend RT PCRs Done
18,396,670 UART: [art] Lock RT PCRs Done
18,398,114 UART: [art] Populate DV Done
18,403,798 UART: [fht] FMC Alias Private Key: 7
18,405,374 UART: [art] Derive CDI
18,406,114 UART: [art] Store in in slot 0x4
18,449,121 UART: [art] Derive Key Pair
18,450,141 UART: [art] Store priv key in slot 0x5
20,877,207 UART: [art] Derive Key Pair - Done
20,890,322 UART: [art] Signing Cert with AUTHO
20,891,663 UART: RITY.KEYID = 7
22,596,762 UART: [art] Erasing AUTHORITY.KEYID = 7
22,598,253 UART: [art] PUB.X = B60BF2F00AD566D9F9492C73F980F86A0D676A3F775C59B98F6EA635C9FF6735C1D6BB90DE67082AB107D7E6BE96A123
22,605,580 UART: [art] PUB.Y = 63EAEB84D4FAD8BBFDD37CDFCC906CDB5A12F5A0CA41BE01037B56086F21CF650E48D3881284350A6E6B03DFC332D004
22,612,853 UART: [art] SIG.R = F10956EFB52B8588A9AA802CA68FD5B3145905166BD4E057832473A05667D41BBE3BB4E89C9FD2F4BCE95877396564A7
22,620,226 UART: [art] SIG.S = 9EA2821CBCCE1E47385A32994C5093E19553A13995D66805CC6DD0B4768315F89EE751F6DABF5FC05F0EA371E04BE746
23,598,391 UART: mbox::rt_entry...
23,599,353 UART: ____ _ _ _ ____ _____
23,601,288 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,603,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,605,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,607,373 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,609,309 UART: |_|
23,610,141 UART:
26,325,833 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
191,928 UART:
192,309 UART: Running Caliptra ROM ...
193,409 UART:
193,554 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Production
264,533 UART: [state] DebugLocked = Yes
267,159 UART: [state] Starting the WD Timer 40000000 cycles
271,535 UART: [kat] SHA2-256
450,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,243 UART: [kat] ++
462,693 UART: [kat] sha1
472,812 UART: [kat] SHA2-256
475,830 UART: [kat] SHA2-384
481,825 UART: [kat] SHA2-512-ACC
484,760 UART: [kat] ECC-384
2,951,040 UART: [kat] HMAC-384Kdf
2,972,520 UART: [kat] LMS
3,502,009 UART: [kat] --
3,507,294 UART: [cold-reset] ++
3,509,444 UART: [fht] FHT @ 0x50003400
3,521,060 UART: [idev] ++
3,521,628 UART: [idev] CDI.KEYID = 6
3,522,513 UART: [idev] SUBJECT.KEYID = 7
3,523,763 UART: [idev] UDS.KEYID = 0
3,524,680 ready_for_fw is high
3,524,879 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,623,944 UART: [idev] Erasing UDS.KEYID = 0
6,029,209 UART: [idev] Sha1 KeyId Algorithm
6,052,771 UART: [idev] --
6,056,822 UART: [ldev] ++
6,057,388 UART: [ldev] CDI.KEYID = 6
6,058,309 UART: [ldev] SUBJECT.KEYID = 5
6,059,522 UART: [ldev] AUTHORITY.KEYID = 7
6,060,749 UART: [ldev] FE.KEYID = 1
6,102,026 UART: [ldev] Erasing FE.KEYID = 1
8,607,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,390 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,382 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,203 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,161 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,487 UART: [ldev] --
10,413,776 UART: [fwproc] Wait for Commands...
10,416,617 UART: [fwproc] Recv command 0x46574c44
10,418,702 UART: [fwproc] Recv'd Img size: 78456 bytes
13,417,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,492,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,561,525 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,754,783 >>> mbox cmd response: success
13,759,000 UART: [afmc] ++
13,759,615 UART: [afmc] CDI.KEYID = 6
13,760,503 UART: [afmc] SUBJECT.KEYID = 7
13,761,657 UART: [afmc] AUTHORITY.KEYID = 5
16,292,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,020,987 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,036,966 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,823 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,556 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,090,785 UART: [afmc] --
18,095,161 UART: [cold-reset] --
18,098,535 UART: [state] Locking Datavault
18,103,312 UART: [state] Locking PCR0, PCR1 and PCR31
18,105,046 UART: [state] Locking ICCM
18,106,509 UART: [exit] Launching FMC @ 0x40000130
18,114,927 UART:
18,115,162 UART: Running Caliptra FMC ...
18,116,261 UART:
18,116,417 UART: [state] CFI Enabled
18,177,586 UART: [fht] FMC Alias Private Key: 7
19,941,956 UART: [art] Extend RT PCRs Done
19,943,177 UART: [art] Lock RT PCRs Done
19,944,886 UART: [art] Populate DV Done
19,950,364 UART: [fht] FMC Alias Private Key: 7
19,951,970 UART: [art] Derive CDI
19,952,785 UART: [art] Store in in slot 0x4
20,010,195 UART: [art] Derive Key Pair
20,011,196 UART: [art] Store priv key in slot 0x5
22,474,259 UART: [art] Derive Key Pair - Done
22,486,941 UART: [art] Signing Cert with AUTHO
22,488,255 UART: RITY.KEYID = 7
24,200,151 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,658 UART: [art] PUB.X = CD013F0B1A6A4C5201DB982903F2414B90EE3AC202B758629EEA814AA067B539AD0DF0F0BFC5229245990D90C82F151D
24,208,941 UART: [art] PUB.Y = 00CB30C7B5D3765D7E4FFDFDF563C35E8EC3F3D4B43E17857D4F82DA24EC1A000DD9051D19CE07C323167BDAA8E59F92
24,216,145 UART: [art] SIG.R = 02CD572BC7D072F3024047B7B69DE59CE0A34ACDA0D682B7F70B87C1C50E5AC1A679D29451E0FCDD8279B8DF17E251DC
24,223,559 UART: [art] SIG.S = E63A2F49C7C2AE9DA6E362A4D6AA87274A6AE7D6D76CE3BD8AD08320AE3A86D0EA3C832AF0FA37F442EE923EF4D38008
25,201,700 UART: mbox::rt_entry...
25,202,658 UART: ____ _ _ _ ____ _____
25,204,643 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,666 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,529 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,383 UART: |_|
25,213,259 UART:
25,326,045 UART: [rt] Runtime listening for mailbox commands...
25,328,079 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,328,849 >>> mbox cmd response data (0 bytes)
Initializing fuses
980 UART:
1,230 UART: Running Caliptra ROM ...
2,291 UART:
2,438 UART: [state] CFI Enabled
65,056 UART: [state] LifecycleState = Production
66,854 UART: [state] DebugLocked = Yes
68,133 UART: [state] Starting the WD Timer 40000000 cycles
72,352 UART: [kat] SHA2-256
251,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,074 UART: [kat] ++
263,523 UART: [kat] sha1
273,586 UART: [kat] SHA2-256
276,584 UART: [kat] SHA2-384
283,205 UART: [kat] SHA2-512-ACC
286,141 UART: [kat] ECC-384
2,743,883 UART: [kat] HMAC-384Kdf
2,769,771 UART: [kat] LMS
3,299,250 UART: [kat] --
3,301,405 UART: [warm-reset] ++
3,305,935 UART: [warm-reset] --
3,310,011 UART: [state] Locking Datavault
3,312,776 UART: [state] Locking PCR0, PCR1 and PCR31
3,314,423 UART: [state] Locking ICCM
3,317,108 UART: [exit] Launching FMC @ 0x40000130
3,325,507 UART:
3,325,743 UART: Running Caliptra FMC ...
3,326,771 UART:
3,326,916 UART: [state] CFI Enabled
3,378,367 UART: [aliasrt :skip pcr extension
3,379,662 UART: [art] Extend RT PCRs Done
3,380,730 UART: [art] Lock RT PCRs Done
3,382,011 UART: [art] Populate DV Done
3,387,746 UART: [fht] FMC Alias Private Key: 7
3,389,330 UART: [art] Derive CDI
3,390,143 UART: [art] Store in in slot 0x4
3,446,983 UART: [art] Derive Key Pair
3,448,034 UART: [art] Store priv key in slot 0x5
5,910,611 UART: [art] Derive Key Pair - Done
5,923,939 UART: [art] Signing Cert with AUTHO
5,925,266 UART: RITY.KEYID = 7
7,636,156 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,668 UART: [art] PUB.X = CD013F0B1A6A4C5201DB982903F2414B90EE3AC202B758629EEA814AA067B539AD0DF0F0BFC5229245990D90C82F151D
7,644,943 UART: [art] PUB.Y = 00CB30C7B5D3765D7E4FFDFDF563C35E8EC3F3D4B43E17857D4F82DA24EC1A000DD9051D19CE07C323167BDAA8E59F92
7,652,175 UART: [art] SIG.R = 02CD572BC7D072F3024047B7B69DE59CE0A34ACDA0D682B7F70B87C1C50E5AC1A679D29451E0FCDD8279B8DF17E251DC
7,659,560 UART: [art] SIG.S = E63A2F49C7C2AE9DA6E362A4D6AA87274A6AE7D6D76CE3BD8AD08320AE3A86D0EA3C832AF0FA37F442EE923EF4D38008
8,638,119 UART: mbox::rt_entry...
8,639,090 UART: ____ _ _ _ ____ _____
8,641,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,892 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,827 UART: |_|
8,649,637 UART:
11,390,980 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
191,960 UART:
192,333 UART: Running Caliptra ROM ...
193,664 UART:
193,816 UART: [state] CFI Enabled
260,570 UART: [state] LifecycleState = Production
262,322 UART: [state] DebugLocked = Yes
265,034 UART: [state] Starting the WD Timer 40000000 cycles
269,857 UART: [kat] SHA2-256
448,981 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,610 UART: [kat] ++
461,142 UART: [kat] sha1
471,626 UART: [kat] SHA2-256
474,698 UART: [kat] SHA2-384
481,816 UART: [kat] SHA2-512-ACC
484,745 UART: [kat] ECC-384
2,948,285 UART: [kat] HMAC-384Kdf
2,971,831 UART: [kat] LMS
3,501,273 UART: [kat] --
3,508,183 UART: [cold-reset] ++
3,509,472 UART: [fht] FHT @ 0x50003400
3,522,005 UART: [idev] ++
3,522,580 UART: [idev] CDI.KEYID = 6
3,523,505 UART: [idev] SUBJECT.KEYID = 7
3,524,679 UART: [idev] UDS.KEYID = 0
3,525,723 ready_for_fw is high
3,525,927 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,624,714 UART: [idev] Erasing UDS.KEYID = 0
6,027,134 UART: [idev] Sha1 KeyId Algorithm
6,050,273 UART: [idev] --
6,055,105 UART: [ldev] ++
6,055,724 UART: [ldev] CDI.KEYID = 6
6,056,614 UART: [ldev] SUBJECT.KEYID = 5
6,057,729 UART: [ldev] AUTHORITY.KEYID = 7
6,059,019 UART: [ldev] FE.KEYID = 1
6,100,378 UART: [ldev] Erasing FE.KEYID = 1
8,606,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,992 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,011 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,847 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,772 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,572 UART: [ldev] --
10,412,643 UART: [fwproc] Wait for Commands...
10,414,404 UART: [fwproc] Recv command 0x46574c44
10,416,490 UART: [fwproc] Recv'd Img size: 78456 bytes
13,412,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,485,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,553,878 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,746,582 >>> mbox cmd response: success
13,750,374 UART: [afmc] ++
13,750,984 UART: [afmc] CDI.KEYID = 6
13,751,898 UART: [afmc] SUBJECT.KEYID = 7
13,753,054 UART: [afmc] AUTHORITY.KEYID = 5
16,299,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,021,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,023,132 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,039,130 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,055,001 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,070,728 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,092,105 UART: [afmc] --
18,095,846 UART: [cold-reset] --
18,097,924 UART: [state] Locking Datavault
18,101,707 UART: [state] Locking PCR0, PCR1 and PCR31
18,103,351 UART: [state] Locking ICCM
18,105,473 UART: [exit] Launching FMC @ 0x40000130
18,113,921 UART:
18,114,209 UART: Running Caliptra FMC ...
18,115,319 UART:
18,115,475 UART: [state] CFI Enabled
18,178,749 UART: [fht] FMC Alias Private Key: 7
19,941,910 UART: [art] Extend RT PCRs Done
19,943,148 UART: [art] Lock RT PCRs Done
19,944,670 UART: [art] Populate DV Done
19,950,020 UART: [fht] FMC Alias Private Key: 7
19,951,606 UART: [art] Derive CDI
19,952,417 UART: [art] Store in in slot 0x4
20,011,097 UART: [art] Derive Key Pair
20,012,149 UART: [art] Store priv key in slot 0x5
22,474,989 UART: [art] Derive Key Pair - Done
22,487,659 UART: [art] Signing Cert with AUTHO
22,488,955 UART: RITY.KEYID = 7
24,200,810 UART: [art] Erasing AUTHORITY.KEYID = 7
24,202,314 UART: [art] PUB.X = 13BFED03B772B980BB3EF7CC95F8FE097E7266C41793BC711A11ECBA3706F77996AA797EFFDDB16BCCFB8F50EA11F457
24,209,585 UART: [art] PUB.Y = BFC477226820DEB358F1E6763FE4EAE4D7CFA2970758E9B1EFE538C36DE553D3B99BFD155774656981605E921052D876
24,216,859 UART: [art] SIG.R = 1BF901CE161C41B1A0F1D80E22FB308DD70218E03BAD078140FDE0188E1A1CA13C7CA777BC9DB0205A5CD1B5ECED642D
24,224,253 UART: [art] SIG.S = B88A5C12AAD52AA9A5EF947296E6567561895FBCBBF51B4DFB58004B61DF7B57C602D9A42127965136418BC465ACEF41
25,202,737 UART: mbox::rt_entry...
25,203,737 UART: ____ _ _ _ ____ _____
25,205,724 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,207,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,209,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,211,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,213,561 UART: |_|
25,214,545 UART:
25,327,605 UART: [rt] Runtime listening for mailbox commands...
25,329,630 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,330,406 >>> mbox cmd response data (0 bytes)
Initializing fuses
996 UART:
1,238 UART: Running Caliptra ROM ...
2,341 UART:
2,492 UART: [state] CFI Enabled
64,777 UART: [state] LifecycleState = Production
66,550 UART: [state] DebugLocked = Yes
68,124 UART: [state] Starting the WD Timer 40000000 cycles
72,473 UART: [kat] SHA2-256
251,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,204 UART: [kat] ++
263,733 UART: [kat] sha1
274,708 UART: [kat] SHA2-256
277,719 UART: [kat] SHA2-384
283,317 UART: [kat] SHA2-512-ACC
286,246 UART: [kat] ECC-384
2,744,490 UART: [kat] HMAC-384Kdf
2,768,165 UART: [kat] LMS
3,297,699 UART: [kat] --
3,303,526 UART: [warm-reset] ++
3,309,554 UART: [warm-reset] --
3,312,663 UART: [state] Locking Datavault
3,314,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,398 UART: [state] Locking ICCM
3,317,686 UART: [exit] Launching FMC @ 0x40000130
3,326,147 UART:
3,326,382 UART: Running Caliptra FMC ...
3,327,481 UART:
3,327,641 UART: [state] CFI Enabled
3,378,063 UART: [aliasrt :skip pcr extension
3,379,357 UART: [art] Extend RT PCRs Done
3,380,506 UART: [art] Lock RT PCRs Done
3,381,571 UART: [art] Populate DV Done
3,386,864 UART: [fht] FMC Alias Private Key: 7
3,388,394 UART: [art] Derive CDI
3,389,206 UART: [art] Store in in slot 0x4
3,446,528 UART: [art] Derive Key Pair
3,447,580 UART: [art] Store priv key in slot 0x5
5,910,559 UART: [art] Derive Key Pair - Done
5,923,188 UART: [art] Signing Cert with AUTHO
5,924,488 UART: RITY.KEYID = 7
7,636,012 UART: [art] Erasing AUTHORITY.KEYID = 7
7,637,527 UART: [art] PUB.X = 13BFED03B772B980BB3EF7CC95F8FE097E7266C41793BC711A11ECBA3706F77996AA797EFFDDB16BCCFB8F50EA11F457
7,644,798 UART: [art] PUB.Y = BFC477226820DEB358F1E6763FE4EAE4D7CFA2970758E9B1EFE538C36DE553D3B99BFD155774656981605E921052D876
7,652,021 UART: [art] SIG.R = 1BF901CE161C41B1A0F1D80E22FB308DD70218E03BAD078140FDE0188E1A1CA13C7CA777BC9DB0205A5CD1B5ECED642D
7,659,467 UART: [art] SIG.S = B88A5C12AAD52AA9A5EF947296E6567561895FBCBBF51B4DFB58004B61DF7B57C602D9A42127965136418BC465ACEF41
8,637,939 UART: mbox::rt_entry...
8,638,903 UART: ____ _ _ _ ____ _____
8,640,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,642,889 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,646,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,648,673 UART: |_|
8,649,478 UART:
11,391,811 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,732 writing to cptra_bootfsm_go
192,373 UART:
192,754 UART: Running Caliptra ROM ...
193,932 UART:
603,509 UART: [state] CFI Enabled
619,232 UART: [state] LifecycleState = Production
620,984 UART: [state] DebugLocked = Yes
623,117 UART: [state] Starting the WD Timer 40000000 cycles
628,171 UART: [kat] SHA2-256
807,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,900 UART: [kat] ++
819,440 UART: [kat] sha1
830,422 UART: [kat] SHA2-256
833,426 UART: [kat] SHA2-384
839,993 UART: [kat] SHA2-512-ACC
842,933 UART: [kat] ECC-384
3,285,734 UART: [kat] HMAC-384Kdf
3,298,620 UART: [kat] LMS
3,828,097 UART: [kat] --
3,831,599 UART: [cold-reset] ++
3,832,965 UART: [fht] FHT @ 0x50003400
3,844,667 UART: [idev] ++
3,845,269 UART: [idev] CDI.KEYID = 6
3,846,203 UART: [idev] SUBJECT.KEYID = 7
3,847,400 UART: [idev] UDS.KEYID = 0
3,848,329 ready_for_fw is high
3,848,530 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,948,520 UART: [idev] Erasing UDS.KEYID = 0
6,320,537 UART: [idev] Sha1 KeyId Algorithm
6,344,037 UART: [idev] --
6,348,821 UART: [ldev] ++
6,349,406 UART: [ldev] CDI.KEYID = 6
6,350,324 UART: [ldev] SUBJECT.KEYID = 5
6,351,488 UART: [ldev] AUTHORITY.KEYID = 7
6,352,726 UART: [ldev] FE.KEYID = 1
6,363,592 UART: [ldev] Erasing FE.KEYID = 1
8,841,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,740 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,575,751 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,591,579 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,607,562 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,628,552 UART: [ldev] --
10,633,392 UART: [fwproc] Wait for Commands...
10,635,324 UART: [fwproc] Recv command 0x46574c44
10,637,418 UART: [fwproc] Recv'd Img size: 78456 bytes
13,631,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,707,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,776,307 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,967,874 >>> mbox cmd response: success
13,972,566 UART: [afmc] ++
13,973,183 UART: [afmc] CDI.KEYID = 6
13,974,103 UART: [afmc] SUBJECT.KEYID = 7
13,975,264 UART: [afmc] AUTHORITY.KEYID = 5
16,474,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,196,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,198,884 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,214,869 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,230,677 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,246,471 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,269,896 UART: [afmc] --
18,273,267 UART: [cold-reset] --
18,277,305 UART: [state] Locking Datavault
18,282,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,283,780 UART: [state] Locking ICCM
18,286,366 UART: [exit] Launching FMC @ 0x40000130
18,294,763 UART:
18,295,000 UART: Running Caliptra FMC ...
18,296,115 UART:
18,296,282 UART: [state] CFI Enabled
18,304,063 UART: [fht] FMC Alias Private Key: 7
20,060,304 UART: [art] Extend RT PCRs Done
20,061,689 UART: [art] Lock RT PCRs Done
20,063,023 UART: [art] Populate DV Done
20,068,659 UART: [fht] FMC Alias Private Key: 7
20,070,266 UART: [art] Derive CDI
20,071,026 UART: [art] Store in in slot 0x4
20,113,721 UART: [art] Derive Key Pair
20,114,761 UART: [art] Store priv key in slot 0x5
22,541,791 UART: [art] Derive Key Pair - Done
22,554,681 UART: [art] Signing Cert with AUTHO
22,555,981 UART: RITY.KEYID = 7
24,261,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,263,106 UART: [art] PUB.X = 48EE8C99353212EF7A6D0D84615A49A19E98FFC431C76AB2DE799E7F2B3570FDEFB1305B2C7AD3CBA7ACCCA827D9223B
24,270,386 UART: [art] PUB.Y = DCE0E3536093D2B08C55CAC963B25CE9448962748A547A0BB80C74F2095CDB17CEC65A6E979096E2C112DBF92467B01D
24,277,643 UART: [art] SIG.R = 2C0FE261468B20E828D1D2A0BCD1202F36C3A7D0FB78FDA8E13F6C0C2D7277D131A56695C3A5FE4EA92DE79333870294
24,285,027 UART: [art] SIG.S = 73B32D4BC00268D97120BD0B4D00B9B32467A84B3CD70FA2417F3C48E514602AE18F291F7EEF9C4117102FE6E1D754A8
25,263,656 UART: mbox::rt_entry...
25,264,612 UART: ____ _ _ _ ____ _____
25,266,624 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,268,634 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,270,572 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,272,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,274,366 UART: |_|
25,275,249 UART:
25,389,431 UART: [rt] Runtime listening for mailbox commands...
25,391,442 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,392,215 >>> mbox cmd response data (0 bytes)
Initializing fuses
990 UART:
1,242 UART: Running Caliptra ROM ...
2,264 UART:
15,128,119 UART: [state] CFI Enabled
15,140,288 UART: [state] LifecycleState = Production
15,142,049 UART: [state] DebugLocked = Yes
15,144,544 UART: [state] Starting the WD Timer 40000000 cycles
15,149,061 UART: [kat] SHA2-256
15,328,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,339,769 UART: [kat] ++
15,340,234 UART: [kat] sha1
15,351,598 UART: [kat] SHA2-256
15,354,616 UART: [kat] SHA2-384
15,361,468 UART: [kat] SHA2-512-ACC
15,364,420 UART: [kat] ECC-384
17,803,697 UART: [kat] HMAC-384Kdf
17,816,930 UART: [kat] LMS
18,346,501 UART: [kat] --
18,349,189 UART: [warm-reset] ++
18,352,848 UART: [warm-reset] --
18,356,278 UART: [state] Locking Datavault
18,359,255 UART: [state] Locking PCR0, PCR1 and PCR31
18,360,923 UART: [state] Locking ICCM
18,362,675 UART: [exit] Launching FMC @ 0x40000130
18,371,125 UART:
18,371,372 UART: Running Caliptra FMC ...
18,372,563 UART:
18,372,721 UART: [state] CFI Enabled
18,374,353 UART: [aliasrt :skip pcr extension
18,375,523 UART: [art] Extend RT PCRs Done
18,376,656 UART: [art] Lock RT PCRs Done
18,377,784 UART: [art] Populate DV Done
18,383,245 UART: [fht] FMC Alias Private Key: 7
18,384,727 UART: [art] Derive CDI
18,385,457 UART: [art] Store in in slot 0x4
18,428,221 UART: [art] Derive Key Pair
18,429,237 UART: [art] Store priv key in slot 0x5
20,856,314 UART: [art] Derive Key Pair - Done
20,869,172 UART: [art] Signing Cert with AUTHO
20,870,481 UART: RITY.KEYID = 7
22,575,893 UART: [art] Erasing AUTHORITY.KEYID = 7
22,577,399 UART: [art] PUB.X = 48EE8C99353212EF7A6D0D84615A49A19E98FFC431C76AB2DE799E7F2B3570FDEFB1305B2C7AD3CBA7ACCCA827D9223B
22,584,673 UART: [art] PUB.Y = DCE0E3536093D2B08C55CAC963B25CE9448962748A547A0BB80C74F2095CDB17CEC65A6E979096E2C112DBF92467B01D
22,591,987 UART: [art] SIG.R = 2C0FE261468B20E828D1D2A0BCD1202F36C3A7D0FB78FDA8E13F6C0C2D7277D131A56695C3A5FE4EA92DE79333870294
22,599,357 UART: [art] SIG.S = 73B32D4BC00268D97120BD0B4D00B9B32467A84B3CD70FA2417F3C48E514602AE18F291F7EEF9C4117102FE6E1D754A8
23,577,546 UART: mbox::rt_entry...
23,578,501 UART: ____ _ _ _ ____ _____
23,580,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,582,441 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,584,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,586,304 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,588,232 UART: |_|
23,589,215 UART:
26,302,292 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
192,462 UART:
192,829 UART: Running Caliptra ROM ...
194,000 UART:
603,655 UART: [state] CFI Enabled
618,535 UART: [state] LifecycleState = Production
621,090 UART: [state] DebugLocked = Yes
622,249 UART: [state] Starting the WD Timer 40000000 cycles
626,955 UART: [kat] SHA2-256
806,059 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,609 UART: [kat] ++
818,144 UART: [kat] sha1
830,481 UART: [kat] SHA2-256
833,559 UART: [kat] SHA2-384
839,783 UART: [kat] SHA2-512-ACC
842,721 UART: [kat] ECC-384
3,285,309 UART: [kat] HMAC-384Kdf
3,296,621 UART: [kat] LMS
3,826,126 UART: [kat] --
3,831,833 UART: [cold-reset] ++
3,833,622 UART: [fht] FHT @ 0x50003400
3,843,605 UART: [idev] ++
3,844,170 UART: [idev] CDI.KEYID = 6
3,845,125 UART: [idev] SUBJECT.KEYID = 7
3,846,299 UART: [idev] UDS.KEYID = 0
3,847,199 ready_for_fw is high
3,847,394 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
3,945,962 UART: [idev] Erasing UDS.KEYID = 0
6,318,137 UART: [idev] Sha1 KeyId Algorithm
6,341,270 UART: [idev] --
6,344,479 UART: [ldev] ++
6,345,060 UART: [ldev] CDI.KEYID = 6
6,345,982 UART: [ldev] SUBJECT.KEYID = 5
6,347,142 UART: [ldev] AUTHORITY.KEYID = 7
6,348,373 UART: [ldev] FE.KEYID = 1
6,359,827 UART: [ldev] Erasing FE.KEYID = 1
8,831,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,624 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,565,657 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,581,473 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,597,397 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,616,552 UART: [ldev] --
10,621,760 UART: [fwproc] Wait for Commands...
10,624,218 UART: [fwproc] Recv command 0x46574c44
10,626,266 UART: [fwproc] Recv'd Img size: 78456 bytes
13,618,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,689,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,758,379 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
13,951,123 >>> mbox cmd response: success
13,955,234 UART: [afmc] ++
13,955,844 UART: [afmc] CDI.KEYID = 6
13,956,761 UART: [afmc] SUBJECT.KEYID = 7
13,957,928 UART: [afmc] AUTHORITY.KEYID = 5
16,457,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,177,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,179,055 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,195,039 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,210,906 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,226,660 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,248,399 UART: [afmc] --
18,252,533 UART: [cold-reset] --
18,257,646 UART: [state] Locking Datavault
18,264,212 UART: [state] Locking PCR0, PCR1 and PCR31
18,265,872 UART: [state] Locking ICCM
18,267,650 UART: [exit] Launching FMC @ 0x40000130
18,276,111 UART:
18,276,347 UART: Running Caliptra FMC ...
18,277,450 UART:
18,277,633 UART: [state] CFI Enabled
18,286,062 UART: [fht] FMC Alias Private Key: 7
20,042,964 UART: [art] Extend RT PCRs Done
20,044,190 UART: [art] Lock RT PCRs Done
20,045,874 UART: [art] Populate DV Done
20,051,293 UART: [fht] FMC Alias Private Key: 7
20,052,947 UART: [art] Derive CDI
20,053,769 UART: [art] Store in in slot 0x4
20,096,590 UART: [art] Derive Key Pair
20,097,762 UART: [art] Store priv key in slot 0x5
22,524,054 UART: [art] Derive Key Pair - Done
22,537,161 UART: [art] Signing Cert with AUTHO
22,538,463 UART: RITY.KEYID = 7
24,244,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,659 UART: [art] PUB.X = 49E58F81FEE2A86DE4C52B81DC1AC8F8250D64A0A1735EA684CB614417A1B6595920FF0E9271A8C164B2750344E3ECF2
24,252,946 UART: [art] PUB.Y = E7F4206717DD1E31C70C5168E0FF6FA2AAD86A28F14B2EC902ED70243F3CA778F3BD913B59E65E84A282C38E6350AC22
24,260,174 UART: [art] SIG.R = ABEF7CC88AD36FAC5D247E1B934DDCED6DD49FDC7DBE7BDD61A60CAA95859DD45C05601F80B552072147BDBD9A6D5341
24,267,617 UART: [art] SIG.S = 08FFD86B399E50F963B039F7182D82730BB1223F1259759DF7C99531B3E8026D73FD9D0959ED341F80357376E85048EB
25,246,317 UART: mbox::rt_entry...
25,247,284 UART: ____ _ _ _ ____ _____
25,249,220 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,251,230 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,253,164 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,255,097 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,257,030 UART: |_|
25,257,843 UART:
25,370,591 UART: [rt] Runtime listening for mailbox commands...
25,372,613 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,373,399 >>> mbox cmd response data (0 bytes)
Initializing fuses
990 UART:
1,239 UART: Running Caliptra ROM ...
2,348 UART:
15,155,873 UART: [state] CFI Enabled
15,171,563 UART: [state] LifecycleState = Production
15,173,288 UART: [state] DebugLocked = Yes
15,175,745 UART: [state] Starting the WD Timer 40000000 cycles
15,180,757 UART: [kat] SHA2-256
15,359,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,371,463 UART: [kat] ++
15,372,005 UART: [kat] sha1
15,383,501 UART: [kat] SHA2-256
15,386,479 UART: [kat] SHA2-384
15,392,206 UART: [kat] SHA2-512-ACC
15,395,158 UART: [kat] ECC-384
17,839,238 UART: [kat] HMAC-384Kdf
17,852,872 UART: [kat] LMS
18,382,427 UART: [kat] --
18,389,189 UART: [warm-reset] ++
18,393,996 UART: [warm-reset] --
18,397,864 UART: [state] Locking Datavault
18,400,366 UART: [state] Locking PCR0, PCR1 and PCR31
18,402,016 UART: [state] Locking ICCM
18,403,686 UART: [exit] Launching FMC @ 0x40000130
18,412,087 UART:
18,412,333 UART: Running Caliptra FMC ...
18,413,437 UART:
18,413,603 UART: [state] CFI Enabled
18,415,411 UART: [aliasrt :skip pcr extension
18,416,663 UART: [art] Extend RT PCRs Done
18,417,804 UART: [art] Lock RT PCRs Done
18,419,358 UART: [art] Populate DV Done
18,424,980 UART: [fht] FMC Alias Private Key: 7
18,426,515 UART: [art] Derive CDI
18,427,331 UART: [art] Store in in slot 0x4
18,470,188 UART: [art] Derive Key Pair
18,471,238 UART: [art] Store priv key in slot 0x5
20,898,011 UART: [art] Derive Key Pair - Done
20,910,687 UART: [art] Signing Cert with AUTHO
20,912,002 UART: RITY.KEYID = 7
22,617,733 UART: [art] Erasing AUTHORITY.KEYID = 7
22,619,232 UART: [art] PUB.X = 49E58F81FEE2A86DE4C52B81DC1AC8F8250D64A0A1735EA684CB614417A1B6595920FF0E9271A8C164B2750344E3ECF2
22,626,473 UART: [art] PUB.Y = E7F4206717DD1E31C70C5168E0FF6FA2AAD86A28F14B2EC902ED70243F3CA778F3BD913B59E65E84A282C38E6350AC22
22,633,751 UART: [art] SIG.R = ABEF7CC88AD36FAC5D247E1B934DDCED6DD49FDC7DBE7BDD61A60CAA95859DD45C05601F80B552072147BDBD9A6D5341
22,641,212 UART: [art] SIG.S = 08FFD86B399E50F963B039F7182D82730BB1223F1259759DF7C99531B3E8026D73FD9D0959ED341F80357376E85048EB
23,620,171 UART: mbox::rt_entry...
23,621,112 UART: ____ _ _ _ ____ _____
23,623,044 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,625,057 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,626,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,628,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,630,858 UART: |_|
23,631,668 UART:
26,339,430 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 142 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Production
85,727 UART: [state] DebugLocked = Yes
86,365 UART: [state] Starting the WD Timer 40000000 cycles
88,072 UART: [kat] SHA2-256
891,622 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,751 UART: [kat] ++
895,903 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,612 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,174,692 ready_for_fw is high
1,174,692 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,566 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,480 UART: [ldev] ++
1,208,648 UART: [ldev] CDI.KEYID = 6
1,209,012 UART: [ldev] SUBJECT.KEYID = 5
1,209,439 UART: [ldev] AUTHORITY.KEYID = 7
1,209,902 UART: [ldev] FE.KEYID = 1
1,215,264 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,447 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,141 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,011 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,717 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,923 UART: [ldev] --
1,280,323 UART: [fwproc] Wait for Commands...
1,281,130 UART: [fwproc] Recv command 0x46574c44
1,281,863 UART: [fwproc] Recv'd Img size: 78456 bytes
2,193,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,863 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,331,746 >>> mbox cmd response: success
2,332,934 UART: [afmc] ++
2,333,102 UART: [afmc] CDI.KEYID = 6
2,333,465 UART: [afmc] SUBJECT.KEYID = 7
2,333,891 UART: [afmc] AUTHORITY.KEYID = 5
2,369,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,385,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,297 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,016 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,397,909 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,403,616 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,411,585 UART: [afmc] --
2,412,624 UART: [cold-reset] --
2,413,754 UART: [state] Locking Datavault
2,414,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,305 UART: [state] Locking ICCM
2,415,869 UART: [exit] Launching FMC @ 0x40000130
2,421,198 UART:
2,421,214 UART: Running Caliptra FMC ...
2,421,622 UART:
2,421,676 UART: [state] CFI Enabled
2,431,919 UART: [fht] FMC Alias Private Key: 7
2,538,916 UART: [art] Extend RT PCRs Done
2,539,344 UART: [art] Lock RT PCRs Done
2,540,906 UART: [art] Populate DV Done
2,549,000 UART: [fht] FMC Alias Private Key: 7
2,550,150 UART: [art] Derive CDI
2,550,430 UART: [art] Store in in slot 0x4
2,635,977 UART: [art] Derive Key Pair
2,636,337 UART: [art] Store priv key in slot 0x5
2,649,511 UART: [art] Derive Key Pair - Done
2,664,328 UART: [art] Signing Cert with AUTHO
2,664,808 UART: RITY.KEYID = 7
2,680,606 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,371 UART: [art] PUB.X = 4DC7623FAFF55B5B7F09A9451184C9CCDC720D38A4222C3B1174EFAB6FD1248C8DC1901672981E1A89A59A910E7097E8
2,688,138 UART: [art] PUB.Y = 7817B2218B4140C1830934CA05C84530E09F434481138768C098A4064860D4FED7EEAF9FDC1FCB4338D93CB5A586E330
2,695,075 UART: [art] SIG.R = 65DEEB06545113341CB23902BACBFC6D81048A9CF370BE81A0A0C379F44AECDD05112AB9A2D89D0D4FE8840B7BEED3C3
2,701,847 UART: [art] SIG.S = 7A00F668BCA327313916FA5E06D81A0853F87F93D8EC7E10B41E991E6F014C2BDCE79745D29773BE9748642DEF0DB3CC
2,725,114 UART: mbox::rt_entry...
2,725,486 UART: ____ _ _ _ ____ _____
2,726,270 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,070 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,727,838 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,374 UART: |_|
2,729,686 UART:
2,835,719 UART: [rt] Runtime listening for mailbox commands...
2,836,481 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,836,701 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,836,795 UART:
2,836,811 UART: Running Caliptra ROM ...
2,837,219 UART:
2,837,274 UART: [state] CFI Enabled
2,839,697 UART: [state] LifecycleState = Production
2,840,305 UART: [state] DebugLocked = Yes
2,840,867 UART: [state] Starting the WD Timer 40000000 cycles
2,842,438 UART: [kat] SHA2-256
3,645,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,650,117 UART: [kat] ++
3,650,269 UART: [kat] sha1
3,654,461 UART: [kat] SHA2-256
3,656,401 UART: [kat] SHA2-384
3,659,138 UART: [kat] SHA2-512-ACC
3,661,039 UART: [kat] ECC-384
3,670,312 UART: [kat] HMAC-384Kdf
3,675,018 UART: [kat] LMS
3,923,330 UART: [kat] --
3,924,280 UART: [warm-reset] ++
3,925,279 UART: [warm-reset] --
3,926,408 UART: [state] Locking Datavault
3,927,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,927,820 UART: [state] Locking ICCM
3,928,460 UART: [exit] Launching FMC @ 0x40000130
3,933,789 UART:
3,933,805 UART: Running Caliptra FMC ...
3,934,213 UART:
3,934,267 UART: [state] CFI Enabled
3,935,598 UART: [aliasrt :skip pcr extension
3,936,071 UART: [art] Extend RT PCRs Done
3,936,499 UART: [art] Lock RT PCRs Done
3,937,740 UART: [art] Populate DV Done
3,946,142 UART: [fht] FMC Alias Private Key: 7
3,947,212 UART: [art] Derive CDI
3,947,492 UART: [art] Store in in slot 0x4
4,033,317 UART: [art] Derive Key Pair
4,033,677 UART: [art] Store priv key in slot 0x5
4,046,769 UART: [art] Derive Key Pair - Done
4,061,702 UART: [art] Signing Cert with AUTHO
4,062,182 UART: RITY.KEYID = 7
4,077,192 UART: [art] Erasing AUTHORITY.KEYID = 7
4,077,957 UART: [art] PUB.X = 4DC7623FAFF55B5B7F09A9451184C9CCDC720D38A4222C3B1174EFAB6FD1248C8DC1901672981E1A89A59A910E7097E8
4,084,724 UART: [art] PUB.Y = 7817B2218B4140C1830934CA05C84530E09F434481138768C098A4064860D4FED7EEAF9FDC1FCB4338D93CB5A586E330
4,091,661 UART: [art] SIG.R = 65DEEB06545113341CB23902BACBFC6D81048A9CF370BE81A0A0C379F44AECDD05112AB9A2D89D0D4FE8840B7BEED3C3
4,098,433 UART: [art] SIG.S = 7A00F668BCA327313916FA5E06D81A0853F87F93D8EC7E10B41E991E6F014C2BDCE79745D29773BE9748642DEF0DB3CC
4,122,098 UART: mbox::rt_entry...
4,122,470 UART: ____ _ _ _ ____ _____
4,123,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,124,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,124,822 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,125,590 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,126,358 UART: |_|
4,126,670 UART:
4,423,296 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,917 UART: [state] LifecycleState = Production
85,525 UART: [state] DebugLocked = Yes
86,117 UART: [state] Starting the WD Timer 40000000 cycles
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 ready_for_fw is high
1,174,420 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,584 UART: [ldev] ++
1,209,752 UART: [ldev] CDI.KEYID = 6
1,210,116 UART: [ldev] SUBJECT.KEYID = 5
1,210,543 UART: [ldev] AUTHORITY.KEYID = 7
1,211,006 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,242,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,293 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,987 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,857 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,563 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,587 UART: [ldev] --
1,281,977 UART: [fwproc] Wait for Commands...
1,282,754 UART: [fwproc] Recv command 0x46574c44
1,283,487 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,945 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,333,882 >>> mbox cmd response: success
2,335,138 UART: [afmc] ++
2,335,306 UART: [afmc] CDI.KEYID = 6
2,335,669 UART: [afmc] SUBJECT.KEYID = 7
2,336,095 UART: [afmc] AUTHORITY.KEYID = 5
2,371,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,841 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,560 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,453 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,160 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,913 UART: [afmc] --
2,414,978 UART: [cold-reset] --
2,415,690 UART: [state] Locking Datavault
2,417,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,659 UART: [state] Locking ICCM
2,418,245 UART: [exit] Launching FMC @ 0x40000130
2,423,574 UART:
2,423,590 UART: Running Caliptra FMC ...
2,423,998 UART:
2,424,052 UART: [state] CFI Enabled
2,434,409 UART: [fht] FMC Alias Private Key: 7
2,542,298 UART: [art] Extend RT PCRs Done
2,542,726 UART: [art] Lock RT PCRs Done
2,544,286 UART: [art] Populate DV Done
2,552,638 UART: [fht] FMC Alias Private Key: 7
2,553,664 UART: [art] Derive CDI
2,553,944 UART: [art] Store in in slot 0x4
2,639,609 UART: [art] Derive Key Pair
2,639,969 UART: [art] Store priv key in slot 0x5
2,652,743 UART: [art] Derive Key Pair - Done
2,667,619 UART: [art] Signing Cert with AUTHO
2,668,099 UART: RITY.KEYID = 7
2,683,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,052 UART: [art] PUB.X = 4839471B3BA0B1DA6ECC455E4D0F84CD4017D8AE117314065D4248DEE1F0F72A1EA75E21F99E6938CC3D4F2AB4C59BC1
2,690,830 UART: [art] PUB.Y = C6FDD97BE5AB96A7356C13A8A939B967D1197064C6BD9F3A2EE9DCC73F37BE611CFA3DEE4D692EBF3A4C004D92D56894
2,697,778 UART: [art] SIG.R = 96065FDCE9B1807FE4A73271FA6FA27C07564BB0307043ADC0C63663D22874B27DB72028D36C566222769F142EB4AFCE
2,704,544 UART: [art] SIG.S = B094E525ED42CC3F1CE3A0606538EA50CAB7F1CBA6D2C8B81ABAA54C788E9168D32E26A4EBD6835A8AD8F07C2D7DF0AE
2,728,413 UART: mbox::rt_entry...
2,728,785 UART: ____ _ _ _ ____ _____
2,729,569 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,369 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,137 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,905 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,673 UART: |_|
2,732,985 UART:
2,839,783 UART: [rt] Runtime listening for mailbox commands...
2,840,545 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,765 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,859 UART:
2,840,875 UART: Running Caliptra ROM ...
2,841,283 UART:
2,841,338 UART: [state] CFI Enabled
2,844,247 UART: [state] LifecycleState = Production
2,844,855 UART: [state] DebugLocked = Yes
2,845,565 UART: [state] Starting the WD Timer 40000000 cycles
2,847,132 UART: [kat] SHA2-256
3,650,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,811 UART: [kat] ++
3,654,963 UART: [kat] sha1
3,659,227 UART: [kat] SHA2-256
3,661,167 UART: [kat] SHA2-384
3,663,842 UART: [kat] SHA2-512-ACC
3,665,743 UART: [kat] ECC-384
3,675,552 UART: [kat] HMAC-384Kdf
3,679,888 UART: [kat] LMS
3,928,200 UART: [kat] --
3,929,222 UART: [warm-reset] ++
3,930,165 UART: [warm-reset] --
3,931,020 UART: [state] Locking Datavault
3,931,672 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,276 UART: [state] Locking ICCM
3,932,828 UART: [exit] Launching FMC @ 0x40000130
3,938,157 UART:
3,938,173 UART: Running Caliptra FMC ...
3,938,581 UART:
3,938,635 UART: [state] CFI Enabled
3,939,768 UART: [aliasrt :skip pcr extension
3,940,241 UART: [art] Extend RT PCRs Done
3,940,669 UART: [art] Lock RT PCRs Done
3,941,928 UART: [art] Populate DV Done
3,950,080 UART: [fht] FMC Alias Private Key: 7
3,951,120 UART: [art] Derive CDI
3,951,400 UART: [art] Store in in slot 0x4
4,036,893 UART: [art] Derive Key Pair
4,037,253 UART: [art] Store priv key in slot 0x5
4,049,957 UART: [art] Derive Key Pair - Done
4,064,605 UART: [art] Signing Cert with AUTHO
4,065,085 UART: RITY.KEYID = 7
4,079,917 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,682 UART: [art] PUB.X = 4839471B3BA0B1DA6ECC455E4D0F84CD4017D8AE117314065D4248DEE1F0F72A1EA75E21F99E6938CC3D4F2AB4C59BC1
4,087,460 UART: [art] PUB.Y = C6FDD97BE5AB96A7356C13A8A939B967D1197064C6BD9F3A2EE9DCC73F37BE611CFA3DEE4D692EBF3A4C004D92D56894
4,094,408 UART: [art] SIG.R = 96065FDCE9B1807FE4A73271FA6FA27C07564BB0307043ADC0C63663D22874B27DB72028D36C566222769F142EB4AFCE
4,101,174 UART: [art] SIG.S = B094E525ED42CC3F1CE3A0606538EA50CAB7F1CBA6D2C8B81ABAA54C788E9168D32E26A4EBD6835A8AD8F07C2D7DF0AE
4,124,465 UART: mbox::rt_entry...
4,124,837 UART: ____ _ _ _ ____ _____
4,125,621 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,421 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,957 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,725 UART: |_|
4,129,037 UART:
4,426,044 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Production
85,924 UART: [state] DebugLocked = Yes
86,512 UART: [state] Starting the WD Timer 40000000 cycles
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,731 UART: [kat] LMS
1,170,043 UART: [kat] --
1,170,664 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,493 UART: [idev] ++
1,173,661 UART: [idev] CDI.KEYID = 6
1,174,022 UART: [idev] SUBJECT.KEYID = 7
1,174,447 UART: [idev] UDS.KEYID = 0
1,174,793 ready_for_fw is high
1,174,793 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,468 UART: [idev] Erasing UDS.KEYID = 0
1,199,447 UART: [idev] Sha1 KeyId Algorithm
1,208,334 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,068 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,762 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,632 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,338 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,302 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,756 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,334,761 >>> mbox cmd response: success
2,335,899 UART: [afmc] ++
2,336,067 UART: [afmc] CDI.KEYID = 6
2,336,430 UART: [afmc] SUBJECT.KEYID = 7
2,336,856 UART: [afmc] AUTHORITY.KEYID = 5
2,372,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,956 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,675 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,568 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,275 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,150 UART: [afmc] --
2,416,073 UART: [cold-reset] --
2,417,177 UART: [state] Locking Datavault
2,418,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,768 UART: [state] Locking ICCM
2,419,344 UART: [exit] Launching FMC @ 0x40000130
2,424,673 UART:
2,424,689 UART: Running Caliptra FMC ...
2,425,097 UART:
2,425,240 UART: [state] CFI Enabled
2,436,061 UART: [fht] FMC Alias Private Key: 7
2,544,678 UART: [art] Extend RT PCRs Done
2,545,106 UART: [art] Lock RT PCRs Done
2,546,758 UART: [art] Populate DV Done
2,554,916 UART: [fht] FMC Alias Private Key: 7
2,555,878 UART: [art] Derive CDI
2,556,158 UART: [art] Store in in slot 0x4
2,642,301 UART: [art] Derive Key Pair
2,642,661 UART: [art] Store priv key in slot 0x5
2,656,311 UART: [art] Derive Key Pair - Done
2,671,153 UART: [art] Signing Cert with AUTHO
2,671,633 UART: RITY.KEYID = 7
2,687,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,960 UART: [art] PUB.X = 1EA64F51B7283100377A7A2B30A723FD13ED58C17E7429253CDE442CD7EB08DD76C05269CA9670224D883740E885F99B
2,694,703 UART: [art] PUB.Y = DBC91A9DB0D47F5B4AD4096259F6CB8484A79F90E6BB0D1507517C6A9E5F77A2FE7AB66AE2372175E0767D51445B1197
2,701,650 UART: [art] SIG.R = D4AA6B7B87EA0C5CD640BF2DEF1D44A0DEDB9CFB8662E7CD3A8CCEEDA5981F2E09F1BB03F18A0AA753778A557795D662
2,708,436 UART: [art] SIG.S = F55623D4692B3D14CD9A7A45CDCABD9AA843CF7F1F2DF1388F9F6C87C775B1D6F422B35AC79A2E9C65892DE816684283
2,732,469 UART: mbox::rt_entry...
2,732,841 UART: ____ _ _ _ ____ _____
2,733,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,734,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,735,193 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,729 UART: |_|
2,737,041 UART:
2,843,847 UART: [rt] Runtime listening for mailbox commands...
2,844,609 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,844,829 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,844,923 UART:
2,844,939 UART: Running Caliptra ROM ...
2,845,347 UART:
2,845,489 UART: [state] CFI Enabled
2,848,202 UART: [state] LifecycleState = Production
2,848,810 UART: [state] DebugLocked = Yes
2,849,436 UART: [state] Starting the WD Timer 40000000 cycles
2,851,031 UART: [kat] SHA2-256
3,654,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,658,710 UART: [kat] ++
3,658,862 UART: [kat] sha1
3,663,104 UART: [kat] SHA2-256
3,665,044 UART: [kat] SHA2-384
3,667,809 UART: [kat] SHA2-512-ACC
3,669,710 UART: [kat] ECC-384
3,679,577 UART: [kat] HMAC-384Kdf
3,684,297 UART: [kat] LMS
3,932,609 UART: [kat] --
3,933,459 UART: [warm-reset] ++
3,934,250 UART: [warm-reset] --
3,935,083 UART: [state] Locking Datavault
3,935,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,563 UART: [state] Locking ICCM
3,937,115 UART: [exit] Launching FMC @ 0x40000130
3,942,444 UART:
3,942,460 UART: Running Caliptra FMC ...
3,942,868 UART:
3,943,011 UART: [state] CFI Enabled
3,944,360 UART: [aliasrt :skip pcr extension
3,944,833 UART: [art] Extend RT PCRs Done
3,945,261 UART: [art] Lock RT PCRs Done
3,946,726 UART: [art] Populate DV Done
3,954,940 UART: [fht] FMC Alias Private Key: 7
3,955,912 UART: [art] Derive CDI
3,956,192 UART: [art] Store in in slot 0x4
4,041,355 UART: [art] Derive Key Pair
4,041,715 UART: [art] Store priv key in slot 0x5
4,055,305 UART: [art] Derive Key Pair - Done
4,070,123 UART: [art] Signing Cert with AUTHO
4,070,603 UART: RITY.KEYID = 7
4,085,251 UART: [art] Erasing AUTHORITY.KEYID = 7
4,086,016 UART: [art] PUB.X = 1EA64F51B7283100377A7A2B30A723FD13ED58C17E7429253CDE442CD7EB08DD76C05269CA9670224D883740E885F99B
4,092,759 UART: [art] PUB.Y = DBC91A9DB0D47F5B4AD4096259F6CB8484A79F90E6BB0D1507517C6A9E5F77A2FE7AB66AE2372175E0767D51445B1197
4,099,706 UART: [art] SIG.R = D4AA6B7B87EA0C5CD640BF2DEF1D44A0DEDB9CFB8662E7CD3A8CCEEDA5981F2E09F1BB03F18A0AA753778A557795D662
4,106,492 UART: [art] SIG.S = F55623D4692B3D14CD9A7A45CDCABD9AA843CF7F1F2DF1388F9F6C87C775B1D6F422B35AC79A2E9C65892DE816684283
4,130,073 UART: mbox::rt_entry...
4,130,445 UART: ____ _ _ _ ____ _____
4,131,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,132,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,797 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,565 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,134,333 UART: |_|
4,134,645 UART:
4,429,602 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Production
86,038 UART: [state] DebugLocked = Yes
86,754 UART: [state] Starting the WD Timer 40000000 cycles
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,440 UART: [kat] SHA2-256
902,380 UART: [kat] SHA2-384
905,249 UART: [kat] SHA2-512-ACC
907,150 UART: [kat] ECC-384
917,435 UART: [kat] HMAC-384Kdf
922,027 UART: [kat] LMS
1,170,339 UART: [kat] --
1,171,164 UART: [cold-reset] ++
1,171,717 UART: [fht] FHT @ 0x50003400
1,174,397 UART: [idev] ++
1,174,565 UART: [idev] CDI.KEYID = 6
1,174,926 UART: [idev] SUBJECT.KEYID = 7
1,175,351 UART: [idev] UDS.KEYID = 0
1,175,697 ready_for_fw is high
1,175,697 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,310 UART: [idev] Erasing UDS.KEYID = 0
1,200,261 UART: [idev] Sha1 KeyId Algorithm
1,209,218 UART: [idev] --
1,210,439 UART: [ldev] ++
1,210,607 UART: [ldev] CDI.KEYID = 6
1,210,971 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,862 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,556 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,426 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,132 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,224 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,159 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 78456 bytes
2,196,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,881 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,190 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,334,101 >>> mbox cmd response: success
2,335,251 UART: [afmc] ++
2,335,419 UART: [afmc] CDI.KEYID = 6
2,335,782 UART: [afmc] SUBJECT.KEYID = 7
2,336,208 UART: [afmc] AUTHORITY.KEYID = 5
2,371,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,854 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,573 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,466 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,173 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,090 UART: [afmc] --
2,414,983 UART: [cold-reset] --
2,415,933 UART: [state] Locking Datavault
2,417,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,678 UART: [state] Locking ICCM
2,418,268 UART: [exit] Launching FMC @ 0x40000130
2,423,597 UART:
2,423,613 UART: Running Caliptra FMC ...
2,424,021 UART:
2,424,164 UART: [state] CFI Enabled
2,434,921 UART: [fht] FMC Alias Private Key: 7
2,543,202 UART: [art] Extend RT PCRs Done
2,543,630 UART: [art] Lock RT PCRs Done
2,544,938 UART: [art] Populate DV Done
2,553,200 UART: [fht] FMC Alias Private Key: 7
2,554,298 UART: [art] Derive CDI
2,554,578 UART: [art] Store in in slot 0x4
2,640,189 UART: [art] Derive Key Pair
2,640,549 UART: [art] Store priv key in slot 0x5
2,653,529 UART: [art] Derive Key Pair - Done
2,668,110 UART: [art] Signing Cert with AUTHO
2,668,590 UART: RITY.KEYID = 7
2,684,076 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,841 UART: [art] PUB.X = B465B30A32EE4C097123DAC11C69EC6E0215481FAF1A44F52930D0F2F1705348CD2CCEB530B9CBBA185073D5B5967417
2,691,608 UART: [art] PUB.Y = 1946B4CEA73D11383ED8AC2AF97D3A7EF1A2714948A78D235036B92CDD3DFF693A168E980F09EC324FD6B1D7739730C7
2,698,560 UART: [art] SIG.R = C899B22F3A3C20D76990B062041C561683A9D1FFA8DFBB534BC711F600213D0719D77634837FDE546224C31D1B8B53D2
2,705,300 UART: [art] SIG.S = F64621B08667CB3967C6EC32705B103406890540625703CB41B607E1ED312FDD00E484CE2585B58BF79C9519961D0EFA
2,729,386 UART: mbox::rt_entry...
2,729,758 UART: ____ _ _ _ ____ _____
2,730,542 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,342 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,878 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,646 UART: |_|
2,733,958 UART:
2,840,194 UART: [rt] Runtime listening for mailbox commands...
2,840,956 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,176 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,270 UART:
2,841,286 UART: Running Caliptra ROM ...
2,841,694 UART:
2,841,836 UART: [state] CFI Enabled
2,844,255 UART: [state] LifecycleState = Production
2,844,863 UART: [state] DebugLocked = Yes
2,845,593 UART: [state] Starting the WD Timer 40000000 cycles
2,847,088 UART: [kat] SHA2-256
3,650,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,767 UART: [kat] ++
3,654,919 UART: [kat] sha1
3,659,105 UART: [kat] SHA2-256
3,661,045 UART: [kat] SHA2-384
3,663,766 UART: [kat] SHA2-512-ACC
3,665,667 UART: [kat] ECC-384
3,675,488 UART: [kat] HMAC-384Kdf
3,680,082 UART: [kat] LMS
3,928,394 UART: [kat] --
3,929,536 UART: [warm-reset] ++
3,930,295 UART: [warm-reset] --
3,931,302 UART: [state] Locking Datavault
3,932,236 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,840 UART: [state] Locking ICCM
3,933,362 UART: [exit] Launching FMC @ 0x40000130
3,938,691 UART:
3,938,707 UART: Running Caliptra FMC ...
3,939,115 UART:
3,939,258 UART: [state] CFI Enabled
3,940,747 UART: [aliasrt :skip pcr extension
3,941,220 UART: [art] Extend RT PCRs Done
3,941,648 UART: [art] Lock RT PCRs Done
3,942,981 UART: [art] Populate DV Done
3,951,199 UART: [fht] FMC Alias Private Key: 7
3,952,323 UART: [art] Derive CDI
3,952,603 UART: [art] Store in in slot 0x4
4,038,190 UART: [art] Derive Key Pair
4,038,550 UART: [art] Store priv key in slot 0x5
4,051,488 UART: [art] Derive Key Pair - Done
4,066,221 UART: [art] Signing Cert with AUTHO
4,066,701 UART: RITY.KEYID = 7
4,081,815 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,580 UART: [art] PUB.X = B465B30A32EE4C097123DAC11C69EC6E0215481FAF1A44F52930D0F2F1705348CD2CCEB530B9CBBA185073D5B5967417
4,089,347 UART: [art] PUB.Y = 1946B4CEA73D11383ED8AC2AF97D3A7EF1A2714948A78D235036B92CDD3DFF693A168E980F09EC324FD6B1D7739730C7
4,096,299 UART: [art] SIG.R = C899B22F3A3C20D76990B062041C561683A9D1FFA8DFBB534BC711F600213D0719D77634837FDE546224C31D1B8B53D2
4,103,039 UART: [art] SIG.S = F64621B08667CB3967C6EC32705B103406890540625703CB41B607E1ED312FDD00E484CE2585B58BF79C9519961D0EFA
4,126,339 UART: mbox::rt_entry...
4,126,711 UART: ____ _ _ _ ____ _____
4,127,495 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,063 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,831 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,599 UART: |_|
4,130,911 UART:
4,423,940 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,649 UART: [state] LifecycleState = Production
85,257 UART: [state] DebugLocked = Yes
85,897 UART: [state] Starting the WD Timer 40000000 cycles
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 ready_for_fw is high
1,174,478 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,370 UART: [idev] Sha1 KeyId Algorithm
1,208,267 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,216,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,651 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,345 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,215 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,921 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,003 UART: [ldev] --
1,281,379 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,821 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,940 >>> mbox cmd response: success
2,334,066 UART: [afmc] ++
2,334,234 UART: [afmc] CDI.KEYID = 6
2,334,597 UART: [afmc] SUBJECT.KEYID = 7
2,335,023 UART: [afmc] AUTHORITY.KEYID = 5
2,370,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,743 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,462 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,355 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,062 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,775 UART: [afmc] --
2,413,838 UART: [cold-reset] --
2,414,796 UART: [state] Locking Datavault
2,415,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,513 UART: [state] Locking ICCM
2,417,115 UART: [exit] Launching FMC @ 0x40000130
2,422,444 UART:
2,422,460 UART: Running Caliptra FMC ...
2,422,868 UART:
2,422,922 UART: [state] CFI Enabled
2,433,355 UART: [fht] FMC Alias Private Key: 7
2,540,956 UART: [art] Extend RT PCRs Done
2,541,384 UART: [art] Lock RT PCRs Done
2,542,896 UART: [art] Populate DV Done
2,550,902 UART: [fht] FMC Alias Private Key: 7
2,552,038 UART: [art] Derive CDI
2,552,318 UART: [art] Store in in slot 0x4
2,637,659 UART: [art] Derive Key Pair
2,638,019 UART: [art] Store priv key in slot 0x5
2,651,049 UART: [art] Derive Key Pair - Done
2,666,124 UART: [art] Signing Cert with AUTHO
2,666,604 UART: RITY.KEYID = 7
2,681,936 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,701 UART: [art] PUB.X = 5E79E808FC7D0B4651D11EB9EAEC47CCD989877A77E6E3BF865989B42056EC8F756D566614BD4D1E8CA4BBC98074C19B
2,689,477 UART: [art] PUB.Y = 75D9D934B1FFEE09C6093D6D137771CD4022E0DE2703CF201D122BFF9500DA4FF84FD5514FCD29D99CE44E0D32CC5015
2,696,405 UART: [art] SIG.R = FA01BA55550D3B0FB0F5C02EBECDF1330670EFD73E718E7F1E25049FB97B69F3ADE92C8A8EE281734715FF208A75AC37
2,703,176 UART: [art] SIG.S = 83807B296FA682FFA3F199666AE704B0A0D7AE3A256206D1D459A992641E67758761E919D8B5B0425C7EF279AB53E88D
2,726,461 UART: mbox::rt_entry...
2,726,833 UART: ____ _ _ _ ____ _____
2,727,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,721 UART: |_|
2,731,033 UART:
2,838,387 UART: [rt] Runtime listening for mailbox commands...
2,839,149 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,369 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,463 UART:
2,839,479 UART: Running Caliptra ROM ...
2,839,887 UART:
2,839,942 UART: [state] CFI Enabled
2,842,879 UART: [state] LifecycleState = Production
2,843,487 UART: [state] DebugLocked = Yes
2,844,057 UART: [state] Starting the WD Timer 40000000 cycles
2,845,654 UART: [kat] SHA2-256
3,649,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,333 UART: [kat] ++
3,653,485 UART: [kat] sha1
3,657,675 UART: [kat] SHA2-256
3,659,615 UART: [kat] SHA2-384
3,662,320 UART: [kat] SHA2-512-ACC
3,664,221 UART: [kat] ECC-384
3,674,268 UART: [kat] HMAC-384Kdf
3,678,712 UART: [kat] LMS
3,927,024 UART: [kat] --
3,927,762 UART: [warm-reset] ++
3,928,561 UART: [warm-reset] --
3,929,562 UART: [state] Locking Datavault
3,930,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,092 UART: [state] Locking ICCM
3,931,514 UART: [exit] Launching FMC @ 0x40000130
3,936,843 UART:
3,936,859 UART: Running Caliptra FMC ...
3,937,267 UART:
3,937,321 UART: [state] CFI Enabled
3,938,398 UART: [aliasrt :skip pcr extension
3,938,871 UART: [art] Extend RT PCRs Done
3,939,299 UART: [art] Lock RT PCRs Done
3,940,592 UART: [art] Populate DV Done
3,948,824 UART: [fht] FMC Alias Private Key: 7
3,949,832 UART: [art] Derive CDI
3,950,112 UART: [art] Store in in slot 0x4
4,035,737 UART: [art] Derive Key Pair
4,036,097 UART: [art] Store priv key in slot 0x5
4,049,631 UART: [art] Derive Key Pair - Done
4,064,704 UART: [art] Signing Cert with AUTHO
4,065,184 UART: RITY.KEYID = 7
4,080,466 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,231 UART: [art] PUB.X = 5E79E808FC7D0B4651D11EB9EAEC47CCD989877A77E6E3BF865989B42056EC8F756D566614BD4D1E8CA4BBC98074C19B
4,088,007 UART: [art] PUB.Y = 75D9D934B1FFEE09C6093D6D137771CD4022E0DE2703CF201D122BFF9500DA4FF84FD5514FCD29D99CE44E0D32CC5015
4,094,935 UART: [art] SIG.R = FA01BA55550D3B0FB0F5C02EBECDF1330670EFD73E718E7F1E25049FB97B69F3ADE92C8A8EE281734715FF208A75AC37
4,101,706 UART: [art] SIG.S = 83807B296FA682FFA3F199666AE704B0A0D7AE3A256206D1D459A992641E67758761E919D8B5B0425C7EF279AB53E88D
4,125,165 UART: mbox::rt_entry...
4,125,537 UART: ____ _ _ _ ____ _____
4,126,321 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,121 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,889 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,425 UART: |_|
4,129,737 UART:
4,420,624 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,279 UART: [state] Starting the WD Timer 40000000 cycles
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,226 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,843 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,242,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,991 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,861 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,567 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,625 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,385 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,333,432 >>> mbox cmd response: success
2,334,606 UART: [afmc] ++
2,334,774 UART: [afmc] CDI.KEYID = 6
2,335,137 UART: [afmc] SUBJECT.KEYID = 7
2,335,563 UART: [afmc] AUTHORITY.KEYID = 5
2,371,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,641 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,360 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,253 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,960 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,653 UART: [afmc] --
2,414,672 UART: [cold-reset] --
2,415,390 UART: [state] Locking Datavault
2,416,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,371 UART: [state] Locking ICCM
2,417,811 UART: [exit] Launching FMC @ 0x40000130
2,423,140 UART:
2,423,156 UART: Running Caliptra FMC ...
2,423,564 UART:
2,423,618 UART: [state] CFI Enabled
2,434,341 UART: [fht] FMC Alias Private Key: 7
2,541,910 UART: [art] Extend RT PCRs Done
2,542,338 UART: [art] Lock RT PCRs Done
2,543,916 UART: [art] Populate DV Done
2,551,840 UART: [fht] FMC Alias Private Key: 7
2,552,928 UART: [art] Derive CDI
2,553,208 UART: [art] Store in in slot 0x4
2,638,665 UART: [art] Derive Key Pair
2,639,025 UART: [art] Store priv key in slot 0x5
2,652,441 UART: [art] Derive Key Pair - Done
2,667,240 UART: [art] Signing Cert with AUTHO
2,667,720 UART: RITY.KEYID = 7
2,682,426 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,191 UART: [art] PUB.X = F8EF60BD7B713A3EA414C172B649CEDE2F1E267D9B431C29F4C823F256C78460DB36E5F35B08EC9B7653006FB68574C5
2,689,944 UART: [art] PUB.Y = 5BB6A4659C775DED452E2E4232FCF5706D6A01FBD0935C6D50C6BA993AD6E97EB2BD04E99BA20F3198FDE88950FD0E93
2,696,898 UART: [art] SIG.R = 3E6A6336D9A1FF499049084663CE46981B09C86FC8436F84753A1CED04B2D5CF86ED21C87F7A8259C028E4F4533F8C21
2,703,659 UART: [art] SIG.S = 41D27DAD19C461789189D10035DB0101046556D8CA26629DCAC3CEEC8F980B0A227C2355854DEB6FEEB8B818B40C063F
2,727,729 UART: mbox::rt_entry...
2,728,101 UART: ____ _ _ _ ____ _____
2,728,885 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,685 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,453 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,221 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,989 UART: |_|
2,732,301 UART:
2,839,606 UART: [rt] Runtime listening for mailbox commands...
2,840,368 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,588 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,682 UART:
2,840,698 UART: Running Caliptra ROM ...
2,841,106 UART:
2,841,161 UART: [state] CFI Enabled
2,843,922 UART: [state] LifecycleState = Production
2,844,530 UART: [state] DebugLocked = Yes
2,845,266 UART: [state] Starting the WD Timer 40000000 cycles
2,846,793 UART: [kat] SHA2-256
3,650,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,472 UART: [kat] ++
3,654,624 UART: [kat] sha1
3,658,878 UART: [kat] SHA2-256
3,660,818 UART: [kat] SHA2-384
3,663,581 UART: [kat] SHA2-512-ACC
3,665,482 UART: [kat] ECC-384
3,675,257 UART: [kat] HMAC-384Kdf
3,679,831 UART: [kat] LMS
3,928,143 UART: [kat] --
3,928,791 UART: [warm-reset] ++
3,929,606 UART: [warm-reset] --
3,930,361 UART: [state] Locking Datavault
3,931,033 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,637 UART: [state] Locking ICCM
3,932,079 UART: [exit] Launching FMC @ 0x40000130
3,937,408 UART:
3,937,424 UART: Running Caliptra FMC ...
3,937,832 UART:
3,937,886 UART: [state] CFI Enabled
3,939,151 UART: [aliasrt :skip pcr extension
3,939,624 UART: [art] Extend RT PCRs Done
3,940,052 UART: [art] Lock RT PCRs Done
3,941,313 UART: [art] Populate DV Done
3,949,667 UART: [fht] FMC Alias Private Key: 7
3,950,685 UART: [art] Derive CDI
3,950,965 UART: [art] Store in in slot 0x4
4,036,786 UART: [art] Derive Key Pair
4,037,146 UART: [art] Store priv key in slot 0x5
4,050,662 UART: [art] Derive Key Pair - Done
4,065,527 UART: [art] Signing Cert with AUTHO
4,066,007 UART: RITY.KEYID = 7
4,080,785 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,550 UART: [art] PUB.X = F8EF60BD7B713A3EA414C172B649CEDE2F1E267D9B431C29F4C823F256C78460DB36E5F35B08EC9B7653006FB68574C5
4,088,303 UART: [art] PUB.Y = 5BB6A4659C775DED452E2E4232FCF5706D6A01FBD0935C6D50C6BA993AD6E97EB2BD04E99BA20F3198FDE88950FD0E93
4,095,257 UART: [art] SIG.R = 3E6A6336D9A1FF499049084663CE46981B09C86FC8436F84753A1CED04B2D5CF86ED21C87F7A8259C028E4F4533F8C21
4,102,018 UART: [art] SIG.S = 41D27DAD19C461789189D10035DB0101046556D8CA26629DCAC3CEEC8F980B0A227C2355854DEB6FEEB8B818B40C063F
4,125,464 UART: mbox::rt_entry...
4,125,836 UART: ____ _ _ _ ____ _____
4,126,620 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,420 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,956 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,724 UART: |_|
4,130,036 UART:
4,423,648 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Production
85,784 UART: [state] DebugLocked = Yes
86,516 UART: [state] Starting the WD Timer 40000000 cycles
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
920,877 UART: [kat] LMS
1,169,189 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,174,719 ready_for_fw is high
1,174,719 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,152 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,683 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,314 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,008 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,878 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,584 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,600 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,509 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,872 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,989 >>> mbox cmd response: success
2,334,183 UART: [afmc] ++
2,334,351 UART: [afmc] CDI.KEYID = 6
2,334,714 UART: [afmc] SUBJECT.KEYID = 7
2,335,140 UART: [afmc] AUTHORITY.KEYID = 5
2,370,345 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,618 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,337 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,230 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,937 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,750 UART: [afmc] --
2,413,745 UART: [cold-reset] --
2,414,461 UART: [state] Locking Datavault
2,415,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,152 UART: [state] Locking ICCM
2,416,600 UART: [exit] Launching FMC @ 0x40000130
2,421,929 UART:
2,421,945 UART: Running Caliptra FMC ...
2,422,353 UART:
2,422,496 UART: [state] CFI Enabled
2,433,653 UART: [fht] FMC Alias Private Key: 7
2,541,584 UART: [art] Extend RT PCRs Done
2,542,012 UART: [art] Lock RT PCRs Done
2,543,462 UART: [art] Populate DV Done
2,552,002 UART: [fht] FMC Alias Private Key: 7
2,553,146 UART: [art] Derive CDI
2,553,426 UART: [art] Store in in slot 0x4
2,639,609 UART: [art] Derive Key Pair
2,639,969 UART: [art] Store priv key in slot 0x5
2,652,919 UART: [art] Derive Key Pair - Done
2,667,864 UART: [art] Signing Cert with AUTHO
2,668,344 UART: RITY.KEYID = 7
2,683,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,425 UART: [art] PUB.X = F8CC8C9FCC1D1773A00BEC4F0B51A10499C363961D0F5C7802694012CFB984B46BABB93E1121126096076F78C7A579FA
2,691,181 UART: [art] PUB.Y = 389D67F62199C612492818D857E6DE30486D31187825A3D36AAAC1C3129DDA7289AC98F6821D5DAE89E2CFC575B2DDD5
2,698,135 UART: [art] SIG.R = 3733BDBF707A0EA69DBA3E3F896A6EECA2361FD9AE763B638CB895653A9E65C1C2F77F66F7BC4488DFAE68CEC8E52641
2,704,922 UART: [art] SIG.S = 0E10BD2448B9C4F193F695DAC1DE0A65F4140C074881023C29151D5527F11D03AF787DF8ADC8DBF66BEC18335436B2DE
2,728,765 UART: mbox::rt_entry...
2,729,137 UART: ____ _ _ _ ____ _____
2,729,921 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,721 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,489 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,025 UART: |_|
2,733,337 UART:
2,838,070 UART: [rt] Runtime listening for mailbox commands...
2,838,832 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,052 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,146 UART:
2,839,162 UART: Running Caliptra ROM ...
2,839,570 UART:
2,839,712 UART: [state] CFI Enabled
2,842,543 UART: [state] LifecycleState = Production
2,843,151 UART: [state] DebugLocked = Yes
2,843,807 UART: [state] Starting the WD Timer 40000000 cycles
2,845,462 UART: [kat] SHA2-256
3,649,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,141 UART: [kat] ++
3,653,293 UART: [kat] sha1
3,657,607 UART: [kat] SHA2-256
3,659,547 UART: [kat] SHA2-384
3,662,398 UART: [kat] SHA2-512-ACC
3,664,299 UART: [kat] ECC-384
3,673,916 UART: [kat] HMAC-384Kdf
3,678,450 UART: [kat] LMS
3,926,762 UART: [kat] --
3,927,618 UART: [warm-reset] ++
3,928,329 UART: [warm-reset] --
3,929,156 UART: [state] Locking Datavault
3,929,846 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,450 UART: [state] Locking ICCM
3,931,046 UART: [exit] Launching FMC @ 0x40000130
3,936,375 UART:
3,936,391 UART: Running Caliptra FMC ...
3,936,799 UART:
3,936,942 UART: [state] CFI Enabled
3,938,339 UART: [aliasrt :skip pcr extension
3,938,812 UART: [art] Extend RT PCRs Done
3,939,240 UART: [art] Lock RT PCRs Done
3,940,455 UART: [art] Populate DV Done
3,948,771 UART: [fht] FMC Alias Private Key: 7
3,949,937 UART: [art] Derive CDI
3,950,217 UART: [art] Store in in slot 0x4
4,035,842 UART: [art] Derive Key Pair
4,036,202 UART: [art] Store priv key in slot 0x5
4,048,926 UART: [art] Derive Key Pair - Done
4,063,533 UART: [art] Signing Cert with AUTHO
4,064,013 UART: RITY.KEYID = 7
4,079,541 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,306 UART: [art] PUB.X = F8CC8C9FCC1D1773A00BEC4F0B51A10499C363961D0F5C7802694012CFB984B46BABB93E1121126096076F78C7A579FA
4,087,062 UART: [art] PUB.Y = 389D67F62199C612492818D857E6DE30486D31187825A3D36AAAC1C3129DDA7289AC98F6821D5DAE89E2CFC575B2DDD5
4,094,016 UART: [art] SIG.R = 3733BDBF707A0EA69DBA3E3F896A6EECA2361FD9AE763B638CB895653A9E65C1C2F77F66F7BC4488DFAE68CEC8E52641
4,100,803 UART: [art] SIG.S = 0E10BD2448B9C4F193F695DAC1DE0A65F4140C074881023C29151D5527F11D03AF787DF8ADC8DBF66BEC18335436B2DE
4,124,504 UART: mbox::rt_entry...
4,124,876 UART: ____ _ _ _ ____ _____
4,125,660 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,460 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,764 UART: |_|
4,129,076 UART:
4,420,772 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Production
85,988 UART: [state] DebugLocked = Yes
86,732 UART: [state] Starting the WD Timer 40000000 cycles
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,928 UART: [kat] ++
896,080 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,731 UART: [kat] HMAC-384Kdf
921,311 UART: [kat] LMS
1,169,623 UART: [kat] --
1,170,600 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,917 UART: [idev] ++
1,174,085 UART: [idev] CDI.KEYID = 6
1,174,446 UART: [idev] SUBJECT.KEYID = 7
1,174,871 UART: [idev] UDS.KEYID = 0
1,175,217 ready_for_fw is high
1,175,217 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,884 UART: [idev] Erasing UDS.KEYID = 0
1,199,937 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,832 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,526 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,396 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,102 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,176 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,241 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,862 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,803 >>> mbox cmd response: success
2,333,977 UART: [afmc] ++
2,334,145 UART: [afmc] CDI.KEYID = 6
2,334,508 UART: [afmc] SUBJECT.KEYID = 7
2,334,934 UART: [afmc] AUTHORITY.KEYID = 5
2,370,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,228 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,947 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,840 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,547 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,230 UART: [afmc] --
2,413,333 UART: [cold-reset] --
2,414,213 UART: [state] Locking Datavault
2,415,366 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,970 UART: [state] Locking ICCM
2,416,390 UART: [exit] Launching FMC @ 0x40000130
2,421,719 UART:
2,421,735 UART: Running Caliptra FMC ...
2,422,143 UART:
2,422,286 UART: [state] CFI Enabled
2,433,069 UART: [fht] FMC Alias Private Key: 7
2,540,976 UART: [art] Extend RT PCRs Done
2,541,404 UART: [art] Lock RT PCRs Done
2,542,694 UART: [art] Populate DV Done
2,551,052 UART: [fht] FMC Alias Private Key: 7
2,552,146 UART: [art] Derive CDI
2,552,426 UART: [art] Store in in slot 0x4
2,637,531 UART: [art] Derive Key Pair
2,637,891 UART: [art] Store priv key in slot 0x5
2,651,325 UART: [art] Derive Key Pair - Done
2,665,772 UART: [art] Signing Cert with AUTHO
2,666,252 UART: RITY.KEYID = 7
2,681,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,837 UART: [art] PUB.X = EDA44DC1B6A180EB82A6A2326D589C7D4B1A94F0E46D266B7ADBBA9287156491895A0F6700ED83F6A6DDCAD87B9629E2
2,688,596 UART: [art] PUB.Y = 8B6F632F713932545B5EB7DAC26014FFF090750717D24F2E020F2D5B78F53EA5EE52527D89EB5FBE49F10DA3D1D0E623
2,695,542 UART: [art] SIG.R = D1E25AEB34A14BB1A804A99DFFA7964D131375BD285494B4AE094876C44D0C623B857086343182786EED74D451842ECF
2,702,303 UART: [art] SIG.S = 70D6667CCED9D1E3FA0B46517E51BF583E3E2A35AE1DBFF039AE3803428354F9AFF172A2DDF72604195E0D789976AEFF
2,725,872 UART: mbox::rt_entry...
2,726,244 UART: ____ _ _ _ ____ _____
2,727,028 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,828 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,596 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,364 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,132 UART: |_|
2,730,444 UART:
2,837,096 UART: [rt] Runtime listening for mailbox commands...
2,837,858 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,838,078 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,172 UART:
2,838,188 UART: Running Caliptra ROM ...
2,838,596 UART:
2,838,738 UART: [state] CFI Enabled
2,841,497 UART: [state] LifecycleState = Production
2,842,105 UART: [state] DebugLocked = Yes
2,842,791 UART: [state] Starting the WD Timer 40000000 cycles
2,844,350 UART: [kat] SHA2-256
3,647,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,029 UART: [kat] ++
3,652,181 UART: [kat] sha1
3,656,285 UART: [kat] SHA2-256
3,658,225 UART: [kat] SHA2-384
3,661,072 UART: [kat] SHA2-512-ACC
3,662,973 UART: [kat] ECC-384
3,672,746 UART: [kat] HMAC-384Kdf
3,677,506 UART: [kat] LMS
3,925,818 UART: [kat] --
3,926,574 UART: [warm-reset] ++
3,927,259 UART: [warm-reset] --
3,928,066 UART: [state] Locking Datavault
3,928,982 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,586 UART: [state] Locking ICCM
3,930,102 UART: [exit] Launching FMC @ 0x40000130
3,935,431 UART:
3,935,447 UART: Running Caliptra FMC ...
3,935,855 UART:
3,935,998 UART: [state] CFI Enabled
3,937,319 UART: [aliasrt :skip pcr extension
3,937,792 UART: [art] Extend RT PCRs Done
3,938,220 UART: [art] Lock RT PCRs Done
3,939,419 UART: [art] Populate DV Done
3,947,607 UART: [fht] FMC Alias Private Key: 7
3,948,547 UART: [art] Derive CDI
3,948,827 UART: [art] Store in in slot 0x4
4,034,078 UART: [art] Derive Key Pair
4,034,438 UART: [art] Store priv key in slot 0x5
4,047,426 UART: [art] Derive Key Pair - Done
4,062,403 UART: [art] Signing Cert with AUTHO
4,062,883 UART: RITY.KEYID = 7
4,078,079 UART: [art] Erasing AUTHORITY.KEYID = 7
4,078,844 UART: [art] PUB.X = EDA44DC1B6A180EB82A6A2326D589C7D4B1A94F0E46D266B7ADBBA9287156491895A0F6700ED83F6A6DDCAD87B9629E2
4,085,603 UART: [art] PUB.Y = 8B6F632F713932545B5EB7DAC26014FFF090750717D24F2E020F2D5B78F53EA5EE52527D89EB5FBE49F10DA3D1D0E623
4,092,549 UART: [art] SIG.R = D1E25AEB34A14BB1A804A99DFFA7964D131375BD285494B4AE094876C44D0C623B857086343182786EED74D451842ECF
4,099,310 UART: [art] SIG.S = 70D6667CCED9D1E3FA0B46517E51BF583E3E2A35AE1DBFF039AE3803428354F9AFF172A2DDF72604195E0D789976AEFF
4,123,373 UART: mbox::rt_entry...
4,123,745 UART: ____ _ _ _ ____ _____
4,124,529 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,329 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,865 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,633 UART: |_|
4,127,945 UART:
4,419,662 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Production
85,959 UART: [state] DebugLocked = Yes
86,645 UART: [state] Starting the WD Timer 40000000 cycles
88,206 UART: [kat] SHA2-256
891,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,885 UART: [kat] ++
896,037 UART: [kat] sha1
900,343 UART: [kat] SHA2-256
902,283 UART: [kat] SHA2-384
905,118 UART: [kat] SHA2-512-ACC
907,019 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
920,980 UART: [kat] LMS
1,169,292 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,124 UART: [ldev] ++
1,209,292 UART: [ldev] CDI.KEYID = 6
1,209,656 UART: [ldev] SUBJECT.KEYID = 5
1,210,083 UART: [ldev] AUTHORITY.KEYID = 7
1,210,546 UART: [ldev] FE.KEYID = 1
1,215,884 UART: [ldev] Erasing FE.KEYID = 1
1,242,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,877 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,747 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,453 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,575 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,524 UART: [fwproc] Recv command 0x46574c44
1,282,257 UART: [fwproc] Recv'd Img size: 78456 bytes
2,192,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,219,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,248,337 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,330,232 >>> mbox cmd response: success
2,331,310 UART: [afmc] ++
2,331,478 UART: [afmc] CDI.KEYID = 6
2,331,841 UART: [afmc] SUBJECT.KEYID = 7
2,332,267 UART: [afmc] AUTHORITY.KEYID = 5
2,367,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,384,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,384,905 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,390,624 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,396,517 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,402,224 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,410,025 UART: [afmc] --
2,411,096 UART: [cold-reset] --
2,412,018 UART: [state] Locking Datavault
2,413,275 UART: [state] Locking PCR0, PCR1 and PCR31
2,413,879 UART: [state] Locking ICCM
2,414,327 UART: [exit] Launching FMC @ 0x40000130
2,419,656 UART:
2,419,672 UART: Running Caliptra FMC ...
2,420,080 UART:
2,420,134 UART: [state] CFI Enabled
2,430,595 UART: [fht] FMC Alias Private Key: 7
2,539,246 UART: [art] Extend RT PCRs Done
2,539,674 UART: [art] Lock RT PCRs Done
2,540,916 UART: [art] Populate DV Done
2,548,986 UART: [fht] FMC Alias Private Key: 7
2,549,932 UART: [art] Derive CDI
2,550,212 UART: [art] Store in in slot 0x4
2,635,725 UART: [art] Derive Key Pair
2,636,085 UART: [art] Store priv key in slot 0x5
2,649,521 UART: [art] Derive Key Pair - Done
2,664,564 UART: [art] Signing Cert with AUTHO
2,665,044 UART: RITY.KEYID = 7
2,680,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,923 UART: [art] PUB.X = B6F27057C774B6E77E18229221AC34256B130205BACBF2D8AE9B648DE620642D4EC71A0A434A8F5E11C062C3CD64E029
2,687,688 UART: [art] PUB.Y = F128C70D0C0B21A00132B45698EAD6C65EE794FBD0ECB2DD05932561A41D3FE5F824A8B7E7352C8CBAD6F925B9FD58C3
2,694,639 UART: [art] SIG.R = 3EB04BA505E450BD475E1ED9C4580530AFCE3C7E4992F51B7EBB1E1E18ED4071485CD9478224DD5E9F3AE78581B40EB9
2,701,412 UART: [art] SIG.S = B366E4D575CD30654C4EA2750E343400880CB9D6EF2E38896FFB82597C6B0C8D468C9FDE391A32B17CC4ACDCE8072EC7
2,725,111 UART: mbox::rt_entry...
2,725,483 UART: ____ _ _ _ ____ _____
2,726,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,727,835 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,371 UART: |_|
2,729,683 UART:
2,835,747 UART: [rt] Runtime listening for mailbox commands...
2,836,509 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,836,729 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,836,823 UART:
2,836,839 UART: Running Caliptra ROM ...
2,837,247 UART:
2,837,302 UART: [state] CFI Enabled
2,839,533 UART: [state] LifecycleState = Production
2,840,141 UART: [state] DebugLocked = Yes
2,840,889 UART: [state] Starting the WD Timer 40000000 cycles
2,842,540 UART: [kat] SHA2-256
3,646,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,650,219 UART: [kat] ++
3,650,371 UART: [kat] sha1
3,654,587 UART: [kat] SHA2-256
3,656,527 UART: [kat] SHA2-384
3,659,458 UART: [kat] SHA2-512-ACC
3,661,359 UART: [kat] ECC-384
3,671,074 UART: [kat] HMAC-384Kdf
3,675,608 UART: [kat] LMS
3,923,920 UART: [kat] --
3,924,862 UART: [warm-reset] ++
3,925,887 UART: [warm-reset] --
3,926,748 UART: [state] Locking Datavault
3,927,580 UART: [state] Locking PCR0, PCR1 and PCR31
3,928,184 UART: [state] Locking ICCM
3,928,622 UART: [exit] Launching FMC @ 0x40000130
3,933,951 UART:
3,933,967 UART: Running Caliptra FMC ...
3,934,375 UART:
3,934,429 UART: [state] CFI Enabled
3,935,580 UART: [aliasrt :skip pcr extension
3,936,053 UART: [art] Extend RT PCRs Done
3,936,481 UART: [art] Lock RT PCRs Done
3,937,874 UART: [art] Populate DV Done
3,946,040 UART: [fht] FMC Alias Private Key: 7
3,947,132 UART: [art] Derive CDI
3,947,412 UART: [art] Store in in slot 0x4
4,032,765 UART: [art] Derive Key Pair
4,033,125 UART: [art] Store priv key in slot 0x5
4,046,057 UART: [art] Derive Key Pair - Done
4,060,808 UART: [art] Signing Cert with AUTHO
4,061,288 UART: RITY.KEYID = 7
4,076,646 UART: [art] Erasing AUTHORITY.KEYID = 7
4,077,411 UART: [art] PUB.X = B6F27057C774B6E77E18229221AC34256B130205BACBF2D8AE9B648DE620642D4EC71A0A434A8F5E11C062C3CD64E029
4,084,176 UART: [art] PUB.Y = F128C70D0C0B21A00132B45698EAD6C65EE794FBD0ECB2DD05932561A41D3FE5F824A8B7E7352C8CBAD6F925B9FD58C3
4,091,127 UART: [art] SIG.R = 3EB04BA505E450BD475E1ED9C4580530AFCE3C7E4992F51B7EBB1E1E18ED4071485CD9478224DD5E9F3AE78581B40EB9
4,097,900 UART: [art] SIG.S = B366E4D575CD30654C4EA2750E343400880CB9D6EF2E38896FFB82597C6B0C8D468C9FDE391A32B17CC4ACDCE8072EC7
4,121,627 UART: mbox::rt_entry...
4,121,999 UART: ____ _ _ _ ____ _____
4,122,783 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,123,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,124,351 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,125,119 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,125,887 UART: |_|
4,126,199 UART:
4,420,072 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Production
85,837 UART: [state] DebugLocked = Yes
86,489 UART: [state] Starting the WD Timer 40000000 cycles
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,397 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 ready_for_fw is high
1,174,576 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,033 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,903 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,609 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,803 UART: [ldev] --
1,281,103 UART: [fwproc] Wait for Commands...
1,281,722 UART: [fwproc] Recv command 0x46574c44
1,282,455 UART: [fwproc] Recv'd Img size: 78456 bytes
2,194,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,957 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,332,878 >>> mbox cmd response: success
2,333,914 UART: [afmc] ++
2,334,082 UART: [afmc] CDI.KEYID = 6
2,334,445 UART: [afmc] SUBJECT.KEYID = 7
2,334,871 UART: [afmc] AUTHORITY.KEYID = 5
2,370,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,525 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,244 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,137 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,844 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,607 UART: [afmc] --
2,413,518 UART: [cold-reset] --
2,414,210 UART: [state] Locking Datavault
2,415,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,787 UART: [state] Locking ICCM
2,416,297 UART: [exit] Launching FMC @ 0x40000130
2,421,626 UART:
2,421,642 UART: Running Caliptra FMC ...
2,422,050 UART:
2,422,104 UART: [state] CFI Enabled
2,432,523 UART: [fht] FMC Alias Private Key: 7
2,539,994 UART: [art] Extend RT PCRs Done
2,540,422 UART: [art] Lock RT PCRs Done
2,541,826 UART: [art] Populate DV Done
2,549,884 UART: [fht] FMC Alias Private Key: 7
2,550,858 UART: [art] Derive CDI
2,551,138 UART: [art] Store in in slot 0x4
2,637,071 UART: [art] Derive Key Pair
2,637,431 UART: [art] Store priv key in slot 0x5
2,650,583 UART: [art] Derive Key Pair - Done
2,665,125 UART: [art] Signing Cert with AUTHO
2,665,605 UART: RITY.KEYID = 7
2,680,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,104 UART: [art] PUB.X = EE0554EE53FE604DA911A4E5C422735A86032AD7C9B235ADD1FE59D8B2C78560A55748AD5CFD48A53484B9C5849A3611
2,687,874 UART: [art] PUB.Y = C7D99E83B8B6BCDF36E424C3BC90E52A3ABECC83BB85170DBD2F483CE64DC257181309CD866735D9420C09877EE322CC
2,694,826 UART: [art] SIG.R = B1AE30883C37B7849BDBC7CA1FA333EC3B637941D511B85CE448D702CC6050D55CD887D41AF8792C036D6D8131E40E6C
2,701,595 UART: [art] SIG.S = 20A581A45674249F11957AC882AA7BCDAEA56122906037BA20D3836F27F09EC864E803DF80B7DD699DB872EDCF5E9D23
2,726,001 UART: mbox::rt_entry...
2,726,373 UART: ____ _ _ _ ____ _____
2,727,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,261 UART: |_|
2,730,573 UART:
2,837,745 UART: [rt] Runtime listening for mailbox commands...
2,838,507 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,838,727 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,821 UART:
2,838,837 UART: Running Caliptra ROM ...
2,839,245 UART:
2,839,300 UART: [state] CFI Enabled
2,841,793 UART: [state] LifecycleState = Production
2,842,401 UART: [state] DebugLocked = Yes
2,843,081 UART: [state] Starting the WD Timer 40000000 cycles
2,844,650 UART: [kat] SHA2-256
3,648,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,329 UART: [kat] ++
3,652,481 UART: [kat] sha1
3,656,803 UART: [kat] SHA2-256
3,658,743 UART: [kat] SHA2-384
3,661,570 UART: [kat] SHA2-512-ACC
3,663,471 UART: [kat] ECC-384
3,673,362 UART: [kat] HMAC-384Kdf
3,677,942 UART: [kat] LMS
3,926,254 UART: [kat] --
3,927,120 UART: [warm-reset] ++
3,927,845 UART: [warm-reset] --
3,928,786 UART: [state] Locking Datavault
3,929,544 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,148 UART: [state] Locking ICCM
3,930,650 UART: [exit] Launching FMC @ 0x40000130
3,935,979 UART:
3,935,995 UART: Running Caliptra FMC ...
3,936,403 UART:
3,936,457 UART: [state] CFI Enabled
3,937,754 UART: [aliasrt :skip pcr extension
3,938,227 UART: [art] Extend RT PCRs Done
3,938,655 UART: [art] Lock RT PCRs Done
3,939,792 UART: [art] Populate DV Done
3,947,760 UART: [fht] FMC Alias Private Key: 7
3,948,772 UART: [art] Derive CDI
3,949,052 UART: [art] Store in in slot 0x4
4,034,499 UART: [art] Derive Key Pair
4,034,859 UART: [art] Store priv key in slot 0x5
4,047,699 UART: [art] Derive Key Pair - Done
4,062,723 UART: [art] Signing Cert with AUTHO
4,063,203 UART: RITY.KEYID = 7
4,077,929 UART: [art] Erasing AUTHORITY.KEYID = 7
4,078,694 UART: [art] PUB.X = EE0554EE53FE604DA911A4E5C422735A86032AD7C9B235ADD1FE59D8B2C78560A55748AD5CFD48A53484B9C5849A3611
4,085,464 UART: [art] PUB.Y = C7D99E83B8B6BCDF36E424C3BC90E52A3ABECC83BB85170DBD2F483CE64DC257181309CD866735D9420C09877EE322CC
4,092,416 UART: [art] SIG.R = B1AE30883C37B7849BDBC7CA1FA333EC3B637941D511B85CE448D702CC6050D55CD887D41AF8792C036D6D8131E40E6C
4,099,185 UART: [art] SIG.S = 20A581A45674249F11957AC882AA7BCDAEA56122906037BA20D3836F27F09EC864E803DF80B7DD699DB872EDCF5E9D23
4,123,439 UART: mbox::rt_entry...
4,123,811 UART: ____ _ _ _ ____ _____
4,124,595 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,395 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,163 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,931 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,699 UART: |_|
4,128,011 UART:
4,423,990 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Production
86,142 UART: [state] DebugLocked = Yes
86,900 UART: [state] Starting the WD Timer 40000000 cycles
88,507 UART: [kat] SHA2-256
892,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,186 UART: [kat] ++
896,338 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,265 UART: [kat] SHA2-512-ACC
907,166 UART: [kat] ECC-384
917,205 UART: [kat] HMAC-384Kdf
921,919 UART: [kat] LMS
1,170,231 UART: [kat] --
1,171,218 UART: [cold-reset] ++
1,171,571 UART: [fht] FHT @ 0x50003400
1,174,305 UART: [idev] ++
1,174,473 UART: [idev] CDI.KEYID = 6
1,174,834 UART: [idev] SUBJECT.KEYID = 7
1,175,259 UART: [idev] UDS.KEYID = 0
1,175,605 ready_for_fw is high
1,175,605 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,631 UART: [idev] Sha1 KeyId Algorithm
1,209,488 UART: [idev] --
1,210,419 UART: [ldev] ++
1,210,587 UART: [ldev] CDI.KEYID = 6
1,210,951 UART: [ldev] SUBJECT.KEYID = 5
1,211,378 UART: [ldev] AUTHORITY.KEYID = 7
1,211,841 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,586 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,280 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,150 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,856 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,766 UART: [ldev] --
1,283,226 UART: [fwproc] Wait for Commands...
1,283,849 UART: [fwproc] Recv command 0x46574c44
1,284,582 UART: [fwproc] Recv'd Img size: 78456 bytes
2,197,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,225,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,254,320 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,336,407 >>> mbox cmd response: success
2,337,559 UART: [afmc] ++
2,337,727 UART: [afmc] CDI.KEYID = 6
2,338,090 UART: [afmc] SUBJECT.KEYID = 7
2,338,516 UART: [afmc] AUTHORITY.KEYID = 5
2,373,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,390,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,391,164 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,396,883 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,402,776 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,408,483 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,416,314 UART: [afmc] --
2,417,221 UART: [cold-reset] --
2,418,197 UART: [state] Locking Datavault
2,419,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,810 UART: [state] Locking ICCM
2,420,278 UART: [exit] Launching FMC @ 0x40000130
2,425,607 UART:
2,425,623 UART: Running Caliptra FMC ...
2,426,031 UART:
2,426,174 UART: [state] CFI Enabled
2,436,687 UART: [fht] FMC Alias Private Key: 7
2,545,326 UART: [art] Extend RT PCRs Done
2,545,754 UART: [art] Lock RT PCRs Done
2,547,692 UART: [art] Populate DV Done
2,556,064 UART: [fht] FMC Alias Private Key: 7
2,557,160 UART: [art] Derive CDI
2,557,440 UART: [art] Store in in slot 0x4
2,643,081 UART: [art] Derive Key Pair
2,643,441 UART: [art] Store priv key in slot 0x5
2,656,485 UART: [art] Derive Key Pair - Done
2,671,094 UART: [art] Signing Cert with AUTHO
2,671,574 UART: RITY.KEYID = 7
2,686,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,687,677 UART: [art] PUB.X = 02B67A50A62D6026996B8B8AE94F73591684BD9778DE3E2CC3397415A298845E2F1B1E2424A3CBDD29A5F9BDA3267726
2,694,444 UART: [art] PUB.Y = 625CF3CAA713A3D89BBB71504991887DAC65E149D998D016A373A5F61840344BD263295CC42AB6BC6179D337EFDF4CA8
2,701,400 UART: [art] SIG.R = 458611F737F0041526C6F7669B071DC3FBB871141619A2DE34AC9F3DDB7899AE155850A0E254EAA27F7AEEE648B9E9D7
2,708,170 UART: [art] SIG.S = 1042950C9492090FDB8463D0DC82A44F377E0597C3A842A4DBBE912B3F492FE6327BA294DCC8F9EF695020AD24E5150F
2,731,814 UART: mbox::rt_entry...
2,732,186 UART: ____ _ _ _ ____ _____
2,732,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,733,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,734,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,735,306 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,736,074 UART: |_|
2,736,386 UART:
2,842,293 UART: [rt] Runtime listening for mailbox commands...
2,843,055 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,275 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,369 UART:
2,843,385 UART: Running Caliptra ROM ...
2,843,793 UART:
2,843,935 UART: [state] CFI Enabled
2,846,780 UART: [state] LifecycleState = Production
2,847,388 UART: [state] DebugLocked = Yes
2,848,002 UART: [state] Starting the WD Timer 40000000 cycles
2,849,493 UART: [kat] SHA2-256
3,653,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,172 UART: [kat] ++
3,657,324 UART: [kat] sha1
3,661,574 UART: [kat] SHA2-256
3,663,514 UART: [kat] SHA2-384
3,666,341 UART: [kat] SHA2-512-ACC
3,668,242 UART: [kat] ECC-384
3,677,635 UART: [kat] HMAC-384Kdf
3,682,095 UART: [kat] LMS
3,930,407 UART: [kat] --
3,931,337 UART: [warm-reset] ++
3,932,160 UART: [warm-reset] --
3,932,811 UART: [state] Locking Datavault
3,933,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,019 UART: [state] Locking ICCM
3,934,467 UART: [exit] Launching FMC @ 0x40000130
3,939,796 UART:
3,939,812 UART: Running Caliptra FMC ...
3,940,220 UART:
3,940,363 UART: [state] CFI Enabled
3,941,718 UART: [aliasrt :skip pcr extension
3,942,191 UART: [art] Extend RT PCRs Done
3,942,619 UART: [art] Lock RT PCRs Done
3,944,050 UART: [art] Populate DV Done
3,952,158 UART: [fht] FMC Alias Private Key: 7
3,953,308 UART: [art] Derive CDI
3,953,588 UART: [art] Store in in slot 0x4
4,039,243 UART: [art] Derive Key Pair
4,039,603 UART: [art] Store priv key in slot 0x5
4,052,833 UART: [art] Derive Key Pair - Done
4,067,196 UART: [art] Signing Cert with AUTHO
4,067,676 UART: RITY.KEYID = 7
4,082,880 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,645 UART: [art] PUB.X = 02B67A50A62D6026996B8B8AE94F73591684BD9778DE3E2CC3397415A298845E2F1B1E2424A3CBDD29A5F9BDA3267726
4,090,412 UART: [art] PUB.Y = 625CF3CAA713A3D89BBB71504991887DAC65E149D998D016A373A5F61840344BD263295CC42AB6BC6179D337EFDF4CA8
4,097,368 UART: [art] SIG.R = 458611F737F0041526C6F7669B071DC3FBB871141619A2DE34AC9F3DDB7899AE155850A0E254EAA27F7AEEE648B9E9D7
4,104,138 UART: [art] SIG.S = 1042950C9492090FDB8463D0DC82A44F377E0597C3A842A4DBBE912B3F492FE6327BA294DCC8F9EF695020AD24E5150F
4,127,484 UART: mbox::rt_entry...
4,127,856 UART: ____ _ _ _ ____ _____
4,128,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,440 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,744 UART: |_|
4,132,056 UART:
4,424,928 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Production
86,068 UART: [state] DebugLocked = Yes
86,736 UART: [state] Starting the WD Timer 40000000 cycles
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,960 UART: [kat] ++
896,112 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,917 UART: [kat] HMAC-384Kdf
921,545 UART: [kat] LMS
1,169,857 UART: [kat] --
1,170,710 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,793 UART: [idev] ++
1,173,961 UART: [idev] CDI.KEYID = 6
1,174,322 UART: [idev] SUBJECT.KEYID = 7
1,174,747 UART: [idev] UDS.KEYID = 0
1,175,093 ready_for_fw is high
1,175,093 <<< Executing mbox cmd 0x46574c44 (78456 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,385 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,345 UART: [ldev] ++
1,210,513 UART: [ldev] CDI.KEYID = 6
1,210,877 UART: [ldev] SUBJECT.KEYID = 5
1,211,304 UART: [ldev] AUTHORITY.KEYID = 7
1,211,767 UART: [ldev] FE.KEYID = 1
1,216,999 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,002 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,696 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,272 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,308 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,525 UART: [fwproc] Recv command 0x46574c44
1,284,258 UART: [fwproc] Recv'd Img size: 78456 bytes
2,195,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,046 UART: [fwproc] Load Runtime at address 0x40005000 len 53772
2,334,141 >>> mbox cmd response: success
2,335,323 UART: [afmc] ++
2,335,491 UART: [afmc] CDI.KEYID = 6
2,335,854 UART: [afmc] SUBJECT.KEYID = 7
2,336,280 UART: [afmc] AUTHORITY.KEYID = 5
2,371,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,874 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,593 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,486 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,193 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,162 UART: [afmc] --
2,415,179 UART: [cold-reset] --
2,415,873 UART: [state] Locking Datavault
2,417,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,728 UART: [state] Locking ICCM
2,418,176 UART: [exit] Launching FMC @ 0x40000130
2,423,505 UART:
2,423,521 UART: Running Caliptra FMC ...
2,423,929 UART:
2,424,072 UART: [state] CFI Enabled
2,434,769 UART: [fht] FMC Alias Private Key: 7
2,543,182 UART: [art] Extend RT PCRs Done
2,543,610 UART: [art] Lock RT PCRs Done
2,545,078 UART: [art] Populate DV Done
2,553,356 UART: [fht] FMC Alias Private Key: 7
2,554,300 UART: [art] Derive CDI
2,554,580 UART: [art] Store in in slot 0x4
2,640,031 UART: [art] Derive Key Pair
2,640,391 UART: [art] Store priv key in slot 0x5
2,653,219 UART: [art] Derive Key Pair - Done
2,668,214 UART: [art] Signing Cert with AUTHO
2,668,694 UART: RITY.KEYID = 7
2,683,596 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,361 UART: [art] PUB.X = 8184130EA1B1FA0B118BA87CEB6B2DA4B2B944944EFDF701FC4650E7BDEB56EF1A7DE9E9B644DAE46DDFF11D059D8A09
2,691,142 UART: [art] PUB.Y = A2263B34D4D8BBB6AFF84F2EB4E034374D06CC0103201677C8EABFCCE26872A9FD1BC6342C47D9766DF04C5DEBE0582C
2,698,101 UART: [art] SIG.R = D215A36328BCA10EA2A66B2733FE0E86F9D952E0F7360D9DF3E00F853F8875C6FDF65BDF7976C8E72611239502943233
2,704,856 UART: [art] SIG.S = 4CD808DDBB4A370A0D35615FDEC275E71412DC5D8481A38FDFCB4FD58A2DB5B21C323E54A7D6C31310B84A5B70BEDB07
2,728,869 UART: mbox::rt_entry...
2,729,241 UART: ____ _ _ _ ____ _____
2,730,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,593 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,361 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,129 UART: |_|
2,733,441 UART:
2,840,909 UART: [rt] Runtime listening for mailbox commands...
2,841,671 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,891 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,985 UART:
2,842,001 UART: Running Caliptra ROM ...
2,842,409 UART:
2,842,551 UART: [state] CFI Enabled
2,845,650 UART: [state] LifecycleState = Production
2,846,258 UART: [state] DebugLocked = Yes
2,846,786 UART: [state] Starting the WD Timer 40000000 cycles
2,848,397 UART: [kat] SHA2-256
3,651,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,076 UART: [kat] ++
3,656,228 UART: [kat] sha1
3,660,446 UART: [kat] SHA2-256
3,662,386 UART: [kat] SHA2-384
3,665,189 UART: [kat] SHA2-512-ACC
3,667,090 UART: [kat] ECC-384
3,676,883 UART: [kat] HMAC-384Kdf
3,681,509 UART: [kat] LMS
3,929,821 UART: [kat] --
3,930,525 UART: [warm-reset] ++
3,931,502 UART: [warm-reset] --
3,932,453 UART: [state] Locking Datavault
3,933,035 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,639 UART: [state] Locking ICCM
3,934,099 UART: [exit] Launching FMC @ 0x40000130
3,939,428 UART:
3,939,444 UART: Running Caliptra FMC ...
3,939,852 UART:
3,939,995 UART: [state] CFI Enabled
3,941,412 UART: [aliasrt :skip pcr extension
3,941,885 UART: [art] Extend RT PCRs Done
3,942,313 UART: [art] Lock RT PCRs Done
3,943,728 UART: [art] Populate DV Done
3,951,758 UART: [fht] FMC Alias Private Key: 7
3,952,878 UART: [art] Derive CDI
3,953,158 UART: [art] Store in in slot 0x4
4,038,635 UART: [art] Derive Key Pair
4,038,995 UART: [art] Store priv key in slot 0x5
4,052,001 UART: [art] Derive Key Pair - Done
4,066,556 UART: [art] Signing Cert with AUTHO
4,067,036 UART: RITY.KEYID = 7
4,082,674 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,439 UART: [art] PUB.X = 8184130EA1B1FA0B118BA87CEB6B2DA4B2B944944EFDF701FC4650E7BDEB56EF1A7DE9E9B644DAE46DDFF11D059D8A09
4,090,220 UART: [art] PUB.Y = A2263B34D4D8BBB6AFF84F2EB4E034374D06CC0103201677C8EABFCCE26872A9FD1BC6342C47D9766DF04C5DEBE0582C
4,097,179 UART: [art] SIG.R = D215A36328BCA10EA2A66B2733FE0E86F9D952E0F7360D9DF3E00F853F8875C6FDF65BDF7976C8E72611239502943233
4,103,934 UART: [art] SIG.S = 4CD808DDBB4A370A0D35615FDEC275E71412DC5D8481A38FDFCB4FD58A2DB5B21C323E54A7D6C31310B84A5B70BEDB07
4,127,849 UART: mbox::rt_entry...
4,128,221 UART: ____ _ _ _ ____ _____
4,129,005 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,805 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,573 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,341 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,109 UART: |_|
4,132,421 UART:
4,427,820 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 140 filtered out; finished in 1.49s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
192,833 UART:
193,193 UART: Running Caliptra ROM ...
194,335 UART:
194,478 UART: [state] CFI Enabled
268,956 UART: [state] LifecycleState = Unprovisioned
271,362 UART: [state] DebugLocked = No
273,685 UART: [state] WD Timer not started. Device not locked for debugging
278,770 UART: [fake-rom-cold-reset] ++
281,870 ready_for_fw is high
282,126 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
406,437 UART: [fht] FHT @ 0x50003400
407,526 UART: [fwproc] Wait for Commands...
408,805 UART: [fwproc] Recv command 0x46574c44
410,235 UART: [fwproc] Recv'd Img size: 99036 bytes
1,683,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,761,115 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,791,147 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
2,375,138 >>> mbox cmd response: success
2,381,179 UART: [fake-rom-cold-reset] --
2,384,107 UART: [state] Locking Datavault
2,390,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,177 UART: [state] Locking ICCM
2,394,551 UART: [exit] Launching FMC @ 0x40000130
2,403,332 UART:
2,403,567 UART: Running Caliptra FMC ...
2,404,668 UART:
2,404,827 UART: [state] CFI Enabled
2,455,357 UART: Caliptra RT
2,456,036 UART: [state] CFI Enabled
2,625,072 UART: [rt] RT listening for mailbox commands...
2,627,237 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,656,897 UART: [rt]cmd =0x4c444556, len=4
2,668,027 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,072,280 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,102,321 UART: [rt]cmd =0x43455246, len=4
3,115,119 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
193,014 UART:
193,381 UART: Running Caliptra ROM ...
194,631 UART:
194,777 UART: [state] CFI Enabled
263,107 UART: [state] LifecycleState = Unprovisioned
265,570 UART: [state] DebugLocked = No
268,728 UART: [state] WD Timer not started. Device not locked for debugging
274,653 UART: [fake-rom-cold-reset] ++
277,747 ready_for_fw is high
278,001 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
402,651 UART: [fht] FHT @ 0x50003400
403,749 UART: [fwproc] Wait for Commands...
405,038 UART: [fwproc] Recv command 0x46574c44
406,499 UART: [fwproc] Recv'd Img size: 99036 bytes
1,673,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,748,595 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,778,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
2,363,029 >>> mbox cmd response: success
2,369,104 UART: [fake-rom-cold-reset] --
2,374,299 UART: [state] Locking Datavault
2,380,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,382,256 UART: [state] Locking ICCM
2,384,358 UART: [exit] Launching FMC @ 0x40000130
2,393,148 UART:
2,393,430 UART: Running Caliptra FMC ...
2,394,544 UART:
2,394,704 UART: [state] CFI Enabled
2,451,021 UART: Caliptra RT
2,451,663 UART: [state] CFI Enabled
2,620,482 UART: [rt] RT listening for mailbox commands...
2,622,660 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,652,439 UART: [rt]cmd =0x4c444556, len=4
2,663,553 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,067,133 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,097,054 UART: [rt]cmd =0x43455246, len=4
3,109,683 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,500 UART:
192,875 UART: Running Caliptra ROM ...
194,131 UART:
604,166 UART: [state] CFI Enabled
619,822 UART: [state] LifecycleState = Unprovisioned
622,196 UART: [state] DebugLocked = No
623,864 UART: [state] WD Timer not started. Device not locked for debugging
631,018 UART: [fake-rom-cold-reset] ++
634,053 ready_for_fw is high
634,242 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
758,692 UART: [fht] FHT @ 0x50003400
759,785 UART: [fwproc] Wait for Commands...
760,982 UART: [fwproc] Recv command 0x46574c44
762,409 UART: [fwproc] Recv'd Img size: 99036 bytes
2,030,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,111,701 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,141,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
2,725,168 >>> mbox cmd response: success
2,731,201 UART: [fake-rom-cold-reset] --
2,733,861 UART: [state] Locking Datavault
2,739,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,741,530 UART: [state] Locking ICCM
2,743,929 UART: [exit] Launching FMC @ 0x40000130
2,752,722 UART:
2,752,965 UART: Running Caliptra FMC ...
2,754,069 UART:
2,754,229 UART: [state] CFI Enabled
2,758,167 UART: Caliptra RT
2,758,850 UART: [state] CFI Enabled
2,868,281 UART: [rt] RT listening for mailbox commands...
2,870,444 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,900,335 UART: [rt]cmd =0x4c444556, len=4
2,911,330 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,315,717 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,345,657 UART: [rt]cmd =0x43455246, len=4
3,358,369 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,432 UART:
192,809 UART: Running Caliptra ROM ...
194,058 UART:
604,120 UART: [state] CFI Enabled
619,850 UART: [state] LifecycleState = Unprovisioned
622,211 UART: [state] DebugLocked = No
624,671 UART: [state] WD Timer not started. Device not locked for debugging
630,748 UART: [fake-rom-cold-reset] ++
633,845 ready_for_fw is high
634,109 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
758,409 UART: [fht] FHT @ 0x50003400
759,497 UART: [fwproc] Wait for Commands...
760,784 UART: [fwproc] Recv command 0x46574c44
762,226 UART: [fwproc] Recv'd Img size: 99036 bytes
2,028,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,107,971 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,138,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89056
2,721,108 >>> mbox cmd response: success
2,727,163 UART: [fake-rom-cold-reset] --
2,730,865 UART: [state] Locking Datavault
2,737,467 UART: [state] Locking PCR0, PCR1 and PCR31
2,739,675 UART: [state] Locking ICCM
2,742,621 UART: [exit] Launching FMC @ 0x40000130
2,751,413 UART:
2,751,649 UART: Running Caliptra FMC ...
2,752,705 UART:
2,752,855 UART: [state] CFI Enabled
2,756,852 UART: Caliptra RT
2,757,538 UART: [state] CFI Enabled
2,867,360 UART: [rt] RT listening for mailbox commands...
2,869,553 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,899,324 UART: [rt]cmd =0x4c444556, len=4
2,910,509 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,315,446 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,345,230 UART: [rt]cmd =0x43455246, len=4
3,357,993 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
192,913 UART:
193,275 UART: Running Caliptra ROM ...
194,473 UART:
194,624 UART: [state] CFI Enabled
261,885 UART: [state] LifecycleState = Unprovisioned
263,585 UART: [state] DebugLocked = No
265,687 UART: [state] WD Timer not started. Device not locked for debugging
270,150 UART: [fake-rom-cold-reset] ++
272,464 ready_for_fw is high
272,741 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
397,677 UART: [fht] FHT @ 0x50003400
398,776 UART: [fwproc] Wait for Commands...
400,063 UART: [fwproc] Recv command 0x46574c44
401,478 UART: [fwproc] Recv'd Img size: 99384 bytes
1,694,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,764,575 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,781,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,099,283 >>> mbox cmd response: success
2,105,093 UART: [fake-rom-cold-reset] --
2,108,335 UART: [state] Locking Datavault
2,113,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,115,507 UART: [state] Locking ICCM
2,117,019 UART: [exit] Launching FMC @ 0x40000130
2,125,316 UART:
2,125,550 UART: Running Caliptra FMC ...
2,126,672 UART:
2,126,830 UART: [state] CFI Enabled
2,173,758 UART: Caliptra RT
2,174,444 UART: [state] CFI Enabled
2,343,636 UART: [rt] RT listening for mailbox commands...
2,345,804 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,375,408 UART: [rt]cmd =0x4c444556, len=4
2,386,475 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,790,576 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,820,452 UART: [rt]cmd =0x43455246, len=4
2,832,956 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,890 writing to cptra_bootfsm_go
192,937 UART:
193,300 UART: Running Caliptra ROM ...
194,497 UART:
194,645 UART: [state] CFI Enabled
265,292 UART: [state] LifecycleState = Unprovisioned
267,069 UART: [state] DebugLocked = No
269,247 UART: [state] WD Timer not started. Device not locked for debugging
273,427 UART: [fake-rom-cold-reset] ++
275,739 ready_for_fw is high
275,914 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
400,972 UART: [fht] FHT @ 0x50003400
402,162 UART: [fwproc] Wait for Commands...
403,369 UART: [fwproc] Recv command 0x46574c44
404,795 UART: [fwproc] Recv'd Img size: 99384 bytes
1,697,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,775,106 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,792,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,108,142 >>> mbox cmd response: success
2,113,970 UART: [fake-rom-cold-reset] --
2,117,009 UART: [state] Locking Datavault
2,122,212 UART: [state] Locking PCR0, PCR1 and PCR31
2,123,975 UART: [state] Locking ICCM
2,125,350 UART: [exit] Launching FMC @ 0x40000130
2,133,587 UART:
2,133,833 UART: Running Caliptra FMC ...
2,134,935 UART:
2,135,090 UART: [state] CFI Enabled
2,198,709 UART: Caliptra RT
2,199,349 UART: [state] CFI Enabled
2,368,857 UART: [rt] RT listening for mailbox commands...
2,371,034 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,400,756 UART: [rt]cmd =0x4c444556, len=4
2,411,785 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,816,068 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,845,660 UART: [rt]cmd =0x43455246, len=4
2,858,363 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,348 writing to cptra_bootfsm_go
193,580 UART:
193,947 UART: Running Caliptra ROM ...
195,052 UART:
604,457 UART: [state] CFI Enabled
617,970 UART: [state] LifecycleState = Unprovisioned
619,693 UART: [state] DebugLocked = No
621,866 UART: [state] WD Timer not started. Device not locked for debugging
625,469 UART: [fake-rom-cold-reset] ++
627,782 ready_for_fw is high
628,041 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
752,934 UART: [fht] FHT @ 0x50003400
754,031 UART: [fwproc] Wait for Commands...
755,235 UART: [fwproc] Recv command 0x46574c44
756,646 UART: [fwproc] Recv'd Img size: 99384 bytes
2,048,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,120,852 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,137,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,454,622 >>> mbox cmd response: success
2,460,489 UART: [fake-rom-cold-reset] --
2,464,006 UART: [state] Locking Datavault
2,469,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,076 UART: [state] Locking ICCM
2,473,327 UART: [exit] Launching FMC @ 0x40000130
2,481,567 UART:
2,481,805 UART: Running Caliptra FMC ...
2,482,908 UART:
2,483,066 UART: [state] CFI Enabled
2,486,739 UART: Caliptra RT
2,487,429 UART: [state] CFI Enabled
2,597,514 UART: [rt] RT listening for mailbox commands...
2,599,673 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,629,596 UART: [rt]cmd =0x4c444556, len=4
2,640,846 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,044,824 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,074,530 UART: [rt]cmd =0x43455246, len=4
3,087,291 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,368 writing to cptra_bootfsm_go
193,449 UART:
193,822 UART: Running Caliptra ROM ...
195,018 UART:
604,416 UART: [state] CFI Enabled
619,714 UART: [state] LifecycleState = Unprovisioned
621,447 UART: [state] DebugLocked = No
623,046 UART: [state] WD Timer not started. Device not locked for debugging
627,174 UART: [fake-rom-cold-reset] ++
629,507 ready_for_fw is high
629,687 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
754,411 UART: [fht] FHT @ 0x50003400
755,516 UART: [fwproc] Wait for Commands...
756,716 UART: [fwproc] Recv command 0x46574c44
758,125 UART: [fwproc] Recv'd Img size: 99384 bytes
2,056,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,127,036 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,144,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,461,165 >>> mbox cmd response: success
2,466,995 UART: [fake-rom-cold-reset] --
2,470,856 UART: [state] Locking Datavault
2,477,521 UART: [state] Locking PCR0, PCR1 and PCR31
2,479,115 UART: [state] Locking ICCM
2,481,510 UART: [exit] Launching FMC @ 0x40000130
2,489,792 UART:
2,490,021 UART: Running Caliptra FMC ...
2,491,047 UART:
2,491,197 UART: [state] CFI Enabled
2,495,052 UART: Caliptra RT
2,495,746 UART: [state] CFI Enabled
2,605,248 UART: [rt] RT listening for mailbox commands...
2,607,397 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,637,290 UART: [rt]cmd =0x4c444556, len=4
2,648,594 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,052,339 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,082,238 UART: [rt]cmd =0x43455246, len=4
3,095,069 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,897 writing to cptra_bootfsm_go
193,087 UART:
193,447 UART: Running Caliptra ROM ...
194,645 UART:
194,796 UART: [state] CFI Enabled
266,025 UART: [state] LifecycleState = Unprovisioned
267,795 UART: [state] DebugLocked = No
270,112 UART: [state] WD Timer not started. Device not locked for debugging
274,295 UART: [fake-rom-cold-reset] ++
276,613 ready_for_fw is high
276,871 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
402,585 UART: [fht] FHT @ 0x50003400
403,748 UART: [fwproc] Wait for Commands...
405,066 UART: [fwproc] Recv command 0x46574c44
406,493 UART: [fwproc] Recv'd Img size: 99384 bytes
1,699,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,772,514 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,789,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,106,566 >>> mbox cmd response: success
2,112,397 UART: [fake-rom-cold-reset] --
2,116,230 UART: [state] Locking Datavault
2,120,540 UART: [state] Locking PCR0, PCR1 and PCR31
2,122,133 UART: [state] Locking ICCM
2,123,503 UART: [exit] Launching FMC @ 0x40000130
2,131,790 UART:
2,132,024 UART: Running Caliptra FMC ...
2,133,052 UART:
2,133,201 UART: [state] CFI Enabled
2,197,856 UART: Caliptra RT
2,198,558 UART: [state] CFI Enabled
2,367,485 UART: [rt] RT listening for mailbox commands...
2,369,671 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,399,612 UART: [rt]cmd =0x4c444556, len=4
2,410,628 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,818,669 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,848,317 UART: [rt]cmd =0x43455246, len=4
2,861,103 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
192,882 UART:
193,277 UART: Running Caliptra ROM ...
194,472 UART:
194,630 UART: [state] CFI Enabled
265,338 UART: [state] LifecycleState = Unprovisioned
267,114 UART: [state] DebugLocked = No
268,366 UART: [state] WD Timer not started. Device not locked for debugging
272,756 UART: [fake-rom-cold-reset] ++
275,140 ready_for_fw is high
275,418 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
400,181 UART: [fht] FHT @ 0x50003400
401,271 UART: [fwproc] Wait for Commands...
402,553 UART: [fwproc] Recv command 0x46574c44
403,961 UART: [fwproc] Recv'd Img size: 99384 bytes
1,698,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,770,482 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,787,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,103,703 >>> mbox cmd response: success
2,109,582 UART: [fake-rom-cold-reset] --
2,111,694 UART: [state] Locking Datavault
2,116,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,117,939 UART: [state] Locking ICCM
2,119,878 UART: [exit] Launching FMC @ 0x40000130
2,128,163 UART:
2,128,397 UART: Running Caliptra FMC ...
2,129,518 UART:
2,129,675 UART: [state] CFI Enabled
2,176,962 UART: Caliptra RT
2,177,643 UART: [state] CFI Enabled
2,346,754 UART: [rt] RT listening for mailbox commands...
2,348,919 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,378,742 UART: [rt]cmd =0x4c444556, len=4
2,389,995 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,795,153 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,825,120 UART: [rt]cmd =0x43455246, len=4
2,837,891 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,282 writing to cptra_bootfsm_go
193,488 UART:
193,863 UART: Running Caliptra ROM ...
195,051 UART:
604,446 UART: [state] CFI Enabled
617,983 UART: [state] LifecycleState = Unprovisioned
619,709 UART: [state] DebugLocked = No
621,596 UART: [state] WD Timer not started. Device not locked for debugging
625,142 UART: [fake-rom-cold-reset] ++
627,530 ready_for_fw is high
627,796 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
752,546 UART: [fht] FHT @ 0x50003400
753,634 UART: [fwproc] Wait for Commands...
754,834 UART: [fwproc] Recv command 0x46574c44
756,241 UART: [fwproc] Recv'd Img size: 99384 bytes
2,056,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,130,573 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,147,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,463,866 >>> mbox cmd response: success
2,469,707 UART: [fake-rom-cold-reset] --
2,471,498 UART: [state] Locking Datavault
2,477,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,479,070 UART: [state] Locking ICCM
2,480,044 UART: [exit] Launching FMC @ 0x40000130
2,488,280 UART:
2,488,517 UART: Running Caliptra FMC ...
2,489,619 UART:
2,489,776 UART: [state] CFI Enabled
2,493,725 UART: Caliptra RT
2,494,355 UART: [state] CFI Enabled
2,603,803 UART: [rt] RT listening for mailbox commands...
2,605,970 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,635,570 UART: [rt]cmd =0x4c444556, len=4
2,646,677 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,050,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,080,636 UART: [rt]cmd =0x43455246, len=4
3,093,384 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,289 writing to cptra_bootfsm_go
193,491 UART:
193,859 UART: Running Caliptra ROM ...
195,059 UART:
604,517 UART: [state] CFI Enabled
617,886 UART: [state] LifecycleState = Unprovisioned
619,620 UART: [state] DebugLocked = No
620,952 UART: [state] WD Timer not started. Device not locked for debugging
626,061 UART: [fake-rom-cold-reset] ++
628,391 ready_for_fw is high
628,655 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
753,513 UART: [fht] FHT @ 0x50003400
754,613 UART: [fwproc] Wait for Commands...
755,904 UART: [fwproc] Recv command 0x46574c44
757,320 UART: [fwproc] Recv'd Img size: 99384 bytes
2,055,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,126,972 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,143,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,460,541 >>> mbox cmd response: success
2,466,363 UART: [fake-rom-cold-reset] --
2,469,657 UART: [state] Locking Datavault
2,475,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,477,534 UART: [state] Locking ICCM
2,479,494 UART: [exit] Launching FMC @ 0x40000130
2,487,798 UART:
2,488,074 UART: Running Caliptra FMC ...
2,489,111 UART:
2,489,260 UART: [state] CFI Enabled
2,492,936 UART: Caliptra RT
2,493,628 UART: [state] CFI Enabled
2,603,014 UART: [rt] RT listening for mailbox commands...
2,605,174 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,635,000 UART: [rt]cmd =0x4c444556, len=4
2,646,276 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,049,838 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,079,656 UART: [rt]cmd =0x43455246, len=4
3,092,402 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,202 UART: [fake-rom-cold-reset] ++
89,130 ready_for_fw is high
89,130 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,440 UART: [fht] FHT @ 0x50003400
92,767 UART: [fwproc] Wait for Commands...
93,568 UART: [fwproc] Recv command 0x46574c44
94,296 UART: [fwproc] Recv'd Img size: 99384 bytes
1,215,779 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,678 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,384,478 >>> mbox cmd response: success
1,385,636 UART: [fake-rom-cold-reset] --
1,386,430 UART: [state] Locking Datavault
1,387,649 UART: [state] Locking PCR0, PCR1 and PCR31
1,388,253 UART: [state] Locking ICCM
1,388,749 UART: [exit] Launching FMC @ 0x40000130
1,394,071 UART:
1,394,087 UART: Running Caliptra FMC ...
1,394,495 UART:
1,394,549 UART: [state] CFI Enabled
1,397,292 UART: Caliptra RT
1,397,545 UART: [state] CFI Enabled
1,496,906 UART: [rt] RT listening for mailbox commands...
1,497,576 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,446 UART: [rt]cmd =0x4c444556, len=4
1,537,809 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,537,810 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,567,043 UART: [rt]cmd =0x43455246, len=4
1,579,034 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [fake-rom-cold-reset] ++
88,506 ready_for_fw is high
88,506 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,630 UART: [fht] FHT @ 0x50003400
91,989 UART: [fwproc] Wait for Commands...
92,600 UART: [fwproc] Recv command 0x46574c44
93,328 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,146 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,898 >>> mbox cmd response: success
1,385,056 UART: [fake-rom-cold-reset] --
1,386,088 UART: [state] Locking Datavault
1,387,329 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,933 UART: [state] Locking ICCM
1,388,541 UART: [exit] Launching FMC @ 0x40000130
1,393,863 UART:
1,393,879 UART: Running Caliptra FMC ...
1,394,287 UART:
1,394,341 UART: [state] CFI Enabled
1,396,962 UART: Caliptra RT
1,397,215 UART: [state] CFI Enabled
1,498,040 UART: [rt] RT listening for mailbox commands...
1,498,710 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,528,638 UART: [rt]cmd =0x4c444556, len=4
1,539,063 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,064 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,568,279 UART: [rt]cmd =0x43455246, len=4
1,580,130 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [fake-rom-cold-reset] ++
88,721 ready_for_fw is high
88,721 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,921 UART: [fht] FHT @ 0x50003400
92,142 UART: [fwproc] Wait for Commands...
92,869 UART: [fwproc] Recv command 0x46574c44
93,597 UART: [fwproc] Recv'd Img size: 99384 bytes
1,213,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,240,403 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,247,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,031 >>> mbox cmd response: success
1,384,189 UART: [fake-rom-cold-reset] --
1,385,213 UART: [state] Locking Datavault
1,386,802 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,406 UART: [state] Locking ICCM
1,388,034 UART: [exit] Launching FMC @ 0x40000130
1,393,356 UART:
1,393,372 UART: Running Caliptra FMC ...
1,393,780 UART:
1,393,921 UART: [state] CFI Enabled
1,396,605 UART: Caliptra RT
1,396,950 UART: [state] CFI Enabled
1,496,643 UART: [rt] RT listening for mailbox commands...
1,497,313 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,113 UART: [rt]cmd =0x4c444556, len=4
1,537,400 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,537,401 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,566,642 UART: [rt]cmd =0x43455246, len=4
1,578,629 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [fake-rom-cold-reset] ++
89,365 ready_for_fw is high
89,365 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,631 UART: [fht] FHT @ 0x50003400
93,082 UART: [fwproc] Wait for Commands...
93,819 UART: [fwproc] Recv command 0x46574c44
94,547 UART: [fwproc] Recv'd Img size: 99384 bytes
1,215,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,242,657 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,249,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,385,233 >>> mbox cmd response: success
1,386,391 UART: [fake-rom-cold-reset] --
1,387,207 UART: [state] Locking Datavault
1,388,392 UART: [state] Locking PCR0, PCR1 and PCR31
1,388,996 UART: [state] Locking ICCM
1,389,564 UART: [exit] Launching FMC @ 0x40000130
1,394,886 UART:
1,394,902 UART: Running Caliptra FMC ...
1,395,310 UART:
1,395,451 UART: [state] CFI Enabled
1,398,201 UART: Caliptra RT
1,398,546 UART: [state] CFI Enabled
1,498,913 UART: [rt] RT listening for mailbox commands...
1,499,583 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,619 UART: [rt]cmd =0x4c444556, len=4
1,540,004 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,005 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,306 UART: [rt]cmd =0x43455246, len=4
1,581,455 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [fake-rom-cold-reset] ++
88,872 ready_for_fw is high
88,872 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,060 UART: [fht] FHT @ 0x50003400
92,393 UART: [fwproc] Wait for Commands...
93,114 UART: [fwproc] Recv command 0x46574c44
93,842 UART: [fwproc] Recv'd Img size: 99384 bytes
1,215,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,274 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,386,042 >>> mbox cmd response: success
1,387,200 UART: [fake-rom-cold-reset] --
1,387,964 UART: [state] Locking Datavault
1,389,149 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,753 UART: [state] Locking ICCM
1,390,299 UART: [exit] Launching FMC @ 0x40000130
1,395,621 UART:
1,395,637 UART: Running Caliptra FMC ...
1,396,045 UART:
1,396,099 UART: [state] CFI Enabled
1,398,786 UART: Caliptra RT
1,399,039 UART: [state] CFI Enabled
1,499,216 UART: [rt] RT listening for mailbox commands...
1,499,886 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,642 UART: [rt]cmd =0x4c444556, len=4
1,539,877 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,878 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,215 UART: [rt]cmd =0x43455246, len=4
1,581,418 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [fake-rom-cold-reset] ++
88,664 ready_for_fw is high
88,664 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,764 UART: [fht] FHT @ 0x50003400
92,099 UART: [fwproc] Wait for Commands...
92,824 UART: [fwproc] Recv command 0x46574c44
93,552 UART: [fwproc] Recv'd Img size: 99384 bytes
1,213,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,240,686 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,247,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,438 >>> mbox cmd response: success
1,384,596 UART: [fake-rom-cold-reset] --
1,385,328 UART: [state] Locking Datavault
1,386,359 UART: [state] Locking PCR0, PCR1 and PCR31
1,386,963 UART: [state] Locking ICCM
1,387,441 UART: [exit] Launching FMC @ 0x40000130
1,392,763 UART:
1,392,779 UART: Running Caliptra FMC ...
1,393,187 UART:
1,393,241 UART: [state] CFI Enabled
1,395,994 UART: Caliptra RT
1,396,247 UART: [state] CFI Enabled
1,496,816 UART: [rt] RT listening for mailbox commands...
1,497,486 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,346 UART: [rt]cmd =0x4c444556, len=4
1,537,913 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,537,914 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,567,327 UART: [rt]cmd =0x43455246, len=4
1,579,428 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [fake-rom-cold-reset] ++
88,597 ready_for_fw is high
88,597 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,781 UART: [fht] FHT @ 0x50003400
92,116 UART: [fwproc] Wait for Commands...
92,881 UART: [fwproc] Recv command 0x46574c44
93,609 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,295 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,901 >>> mbox cmd response: success
1,385,059 UART: [fake-rom-cold-reset] --
1,385,865 UART: [state] Locking Datavault
1,387,308 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,912 UART: [state] Locking ICCM
1,388,420 UART: [exit] Launching FMC @ 0x40000130
1,393,742 UART:
1,393,758 UART: Running Caliptra FMC ...
1,394,166 UART:
1,394,307 UART: [state] CFI Enabled
1,397,127 UART: Caliptra RT
1,397,472 UART: [state] CFI Enabled
1,498,695 UART: [rt] RT listening for mailbox commands...
1,499,365 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,105 UART: [rt]cmd =0x4c444556, len=4
1,539,524 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,525 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,568,906 UART: [rt]cmd =0x43455246, len=4
1,580,965 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [fake-rom-cold-reset] ++
89,267 ready_for_fw is high
89,267 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,411 UART: [fht] FHT @ 0x50003400
92,754 UART: [fwproc] Wait for Commands...
93,539 UART: [fwproc] Recv command 0x46574c44
94,267 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,177 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,855 >>> mbox cmd response: success
1,385,013 UART: [fake-rom-cold-reset] --
1,385,707 UART: [state] Locking Datavault
1,387,026 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,630 UART: [state] Locking ICCM
1,388,192 UART: [exit] Launching FMC @ 0x40000130
1,393,514 UART:
1,393,530 UART: Running Caliptra FMC ...
1,393,938 UART:
1,394,079 UART: [state] CFI Enabled
1,396,805 UART: Caliptra RT
1,397,150 UART: [state] CFI Enabled
1,496,145 UART: [rt] RT listening for mailbox commands...
1,496,815 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,526,317 UART: [rt]cmd =0x4c444556, len=4
1,536,742 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,536,743 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,566,058 UART: [rt]cmd =0x43455246, len=4
1,578,293 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [fake-rom-cold-reset] ++
88,784 ready_for_fw is high
88,784 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,062 UART: [fht] FHT @ 0x50003400
92,303 UART: [fwproc] Wait for Commands...
93,092 UART: [fwproc] Recv command 0x46574c44
93,820 UART: [fwproc] Recv'd Img size: 99384 bytes
1,213,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,239,580 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,246,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,382,312 >>> mbox cmd response: success
1,383,470 UART: [fake-rom-cold-reset] --
1,384,200 UART: [state] Locking Datavault
1,385,165 UART: [state] Locking PCR0, PCR1 and PCR31
1,385,769 UART: [state] Locking ICCM
1,386,435 UART: [exit] Launching FMC @ 0x40000130
1,391,757 UART:
1,391,773 UART: Running Caliptra FMC ...
1,392,181 UART:
1,392,235 UART: [state] CFI Enabled
1,394,860 UART: Caliptra RT
1,395,113 UART: [state] CFI Enabled
1,495,144 UART: [rt] RT listening for mailbox commands...
1,495,814 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,525,522 UART: [rt]cmd =0x4c444556, len=4
1,535,791 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,535,792 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,565,247 UART: [rt]cmd =0x43455246, len=4
1,577,394 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
85,830 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [fake-rom-cold-reset] ++
88,268 ready_for_fw is high
88,268 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,366 UART: [fht] FHT @ 0x50003400
91,683 UART: [fwproc] Wait for Commands...
92,472 UART: [fwproc] Recv command 0x46574c44
93,200 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,232 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,884 >>> mbox cmd response: success
1,385,042 UART: [fake-rom-cold-reset] --
1,385,760 UART: [state] Locking Datavault
1,386,965 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,569 UART: [state] Locking ICCM
1,388,067 UART: [exit] Launching FMC @ 0x40000130
1,393,389 UART:
1,393,405 UART: Running Caliptra FMC ...
1,393,813 UART:
1,393,867 UART: [state] CFI Enabled
1,396,548 UART: Caliptra RT
1,396,801 UART: [state] CFI Enabled
1,497,260 UART: [rt] RT listening for mailbox commands...
1,497,930 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,784 UART: [rt]cmd =0x4c444556, len=4
1,538,121 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,538,122 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,567,497 UART: [rt]cmd =0x43455246, len=4
1,579,542 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,775 UART: [state] LifecycleState = Unprovisioned
85,434 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,435 UART: [fake-rom-cold-reset] ++
88,363 ready_for_fw is high
88,363 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
88,517 UART: [fht] FHT @ 0x50003400
91,950 UART: [fwproc] Wait for Commands...
92,641 UART: [fwproc] Recv command 0x46574c44
93,369 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,240,689 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,247,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,429 >>> mbox cmd response: success
1,384,587 UART: [fake-rom-cold-reset] --
1,385,511 UART: [state] Locking Datavault
1,386,724 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,328 UART: [state] Locking ICCM
1,387,964 UART: [exit] Launching FMC @ 0x40000130
1,393,286 UART:
1,393,302 UART: Running Caliptra FMC ...
1,393,710 UART:
1,393,851 UART: [state] CFI Enabled
1,396,811 UART: Caliptra RT
1,397,156 UART: [state] CFI Enabled
1,497,585 UART: [rt] RT listening for mailbox commands...
1,498,255 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,528,265 UART: [rt]cmd =0x4c444556, len=4
1,538,838 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,538,839 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,568,228 UART: [rt]cmd =0x43455246, len=4
1,580,265 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "35503005d053ee4e19740741705e8bfbdcd9444fb4d6c2eef496d306b508828c7047f2a3c5dd8acfcd4e99cd6d84cd74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,035 UART: [state] WD Timer not started. Device not locked for debugging
88,419 UART: [fake-rom-cold-reset] ++
89,347 ready_for_fw is high
89,347 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
89,591 UART: [fht] FHT @ 0x50003400
92,804 UART: [fwproc] Wait for Commands...
93,619 UART: [fwproc] Recv command 0x46574c44
94,347 UART: [fwproc] Recv'd Img size: 99384 bytes
1,214,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,121 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
1,383,705 >>> mbox cmd response: success
1,384,863 UART: [fake-rom-cold-reset] --
1,385,611 UART: [state] Locking Datavault
1,386,768 UART: [state] Locking PCR0, PCR1 and PCR31
1,387,372 UART: [state] Locking ICCM
1,387,988 UART: [exit] Launching FMC @ 0x40000130
1,393,310 UART:
1,393,326 UART: Running Caliptra FMC ...
1,393,734 UART:
1,393,875 UART: [state] CFI Enabled
1,396,535 UART: Caliptra RT
1,396,880 UART: [state] CFI Enabled
1,496,581 UART: [rt] RT listening for mailbox commands...
1,497,251 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,526,849 UART: [rt]cmd =0x4c444556, len=4
1,537,128 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,537,129 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,566,678 UART: [rt]cmd =0x43455246, len=4
1,578,933 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,517 UART:
192,899 UART: Running Caliptra ROM ...
194,073 UART:
194,229 UART: [state] CFI Enabled
265,590 UART: [state] LifecycleState = Production
267,399 UART: [state] DebugLocked = No
268,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,119 UART: [kat] SHA2-256
443,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,316 UART: [kat] ++
454,852 UART: [kat] sha1
465,587 UART: [kat] SHA2-256
468,304 UART: [kat] SHA2-384
472,657 UART: [kat] SHA2-512-ACC
475,017 UART: [kat] ECC-384
2,766,972 UART: [kat] HMAC-384Kdf
2,779,215 UART: [kat] LMS
3,969,499 UART: [kat] --
3,974,253 UART: [cold-reset] ++
3,975,265 UART: [fht] Storing FHT @ 0x50003400
3,987,239 UART: [idev] ++
3,987,797 UART: [idev] CDI.KEYID = 6
3,988,774 UART: [idev] SUBJECT.KEYID = 7
3,990,013 UART: [idev] UDS.KEYID = 0
3,991,208 ready_for_fw is high
3,991,459 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,713 UART: [idev] Erasing UDS.KEYID = 0
7,331,599 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,140 UART: [idev] --
7,356,705 UART: [ldev] ++
7,357,275 UART: [ldev] CDI.KEYID = 6
7,358,251 UART: [ldev] SUBJECT.KEYID = 5
7,359,461 UART: [ldev] AUTHORITY.KEYID = 7
7,360,748 UART: [ldev] FE.KEYID = 1
7,408,138 UART: [ldev] Erasing FE.KEYID = 1
10,741,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,977 UART: [ldev] --
13,123,881 UART: [fwproc] Waiting for Commands...
13,125,543 UART: [fwproc] Received command 0x46574c44
13,127,722 UART: [fwproc] Received Image of size 113760 bytes
22,427,245 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,502,917 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,571,852 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,886,987 >>> mbox cmd response: success
22,891,523 UART: [afmc] ++
22,892,130 UART: [afmc] CDI.KEYID = 6
22,893,072 UART: [afmc] SUBJECT.KEYID = 7
22,894,395 UART: [afmc] AUTHORITY.KEYID = 5
26,258,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,559,595 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,561,880 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,576,511 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,591,256 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,605,651 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,627,075 UART: [afmc] --
28,630,838 UART: [cold-reset] --
28,634,756 UART: [state] Locking Datavault
28,639,790 UART: [state] Locking PCR0, PCR1 and PCR31
28,641,530 UART: [state] Locking ICCM
28,643,643 UART: [exit] Launching FMC @ 0x40000130
28,652,041 UART:
28,652,301 UART: Running Caliptra FMC ...
28,653,430 UART:
28,653,590 UART: [state] CFI Enabled
28,718,132 UART: [fht] FMC Alias Private Key: 7
31,055,975 UART: [art] Extend RT PCRs Done
31,057,246 UART: [art] Lock RT PCRs Done
31,058,678 UART: [art] Populate DV Done
31,064,113 UART: [fht] FMC Alias Private Key: 7
31,065,690 UART: [art] Derive CDI
31,066,458 UART: [art] Store in in slot 0x4
31,126,479 UART: [art] Derive Key Pair
31,127,562 UART: [art] Store priv key in slot 0x5
34,420,046 UART: [art] Derive Key Pair - Done
34,433,008 UART: [art] Signing Cert with AUTHO
34,434,347 UART: RITY.KEYID = 7
36,721,247 UART: [art] Erasing AUTHORITY.KEYID = 7
36,722,810 UART: [art] PUB.X = E517CC9E92A870A959213B7DAE1A36E619470385CD693DFEA609832E132E24D3822BD859223881548356A0FD44FAB16E
36,730,006 UART: [art] PUB.Y = 117BA9E6A6BF0D8E4086E8F71F39D0BA1FB2CF6D6030B19AF99F0E7A33217F8CAEC59D8AB48EAA18F09D69E6FCA0202A
36,737,278 UART: [art] SIG.R = 0D1C32F8113A424C82B18AE38F972590DE113BB4AA361835E3B7286CCC9B87D967BBCFB8CE3EF3D022E9DF34E540DFA4
36,744,690 UART: [art] SIG.S = 9F332C6F20590CA7FE512B0B22C7114A7067E8BC0358B5DD24667CEE82DCC6590A236AAE4D5E8B317C0256690FD3CC10
38,050,335 UART: Caliptra RT
38,051,074 UART: [state] CFI Enabled
38,211,425 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,804,914 ready_for_fw is high
3,805,307 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,779,312 >>> mbox cmd response: success
27,463,901 UART:
27,464,299 UART: Running Caliptra FMC ...
27,465,423 UART:
27,465,576 UART: [state] CFI Enabled
27,531,371 UART: [fht] FMC Alias Private Key: 7
29,869,695 UART: [art] Extend RT PCRs Done
29,870,989 UART: [art] Lock RT PCRs Done
29,872,626 UART: [art] Populate DV Done
29,877,868 UART: [fht] FMC Alias Private Key: 7
29,879,380 UART: [art] Derive CDI
29,880,149 UART: [art] Store in in slot 0x4
29,939,729 UART: [art] Derive Key Pair
29,940,766 UART: [art] Store priv key in slot 0x5
33,233,866 UART: [art] Derive Key Pair - Done
33,246,988 UART: [art] Signing Cert with AUTHO
33,248,335 UART: RITY.KEYID = 7
35,534,743 UART: [art] Erasing AUTHORITY.KEYID = 7
35,536,308 UART: [art] PUB.X = 00DBE90D485F3AF46A1066DC11CF356C2382A9B0DA5BC3DCD85A05CDA3E4E7A05DECF91E6EF7A9F7B23991343387BBD8
35,543,591 UART: [art] PUB.Y = 98CCB1DD4063884A0F74A3A5CD46C4503A838A2F4D783804CB279CDD1183037471EC49C7A684338E8FA1AF029A17BA2E
35,550,853 UART: [art] SIG.R = 4A513F982DAAC8E19AFF06C4BE9E31534AEA8E1FC942D88371E062932573D6911583C8E4730201FC1AEEB42F6257BC8C
35,558,211 UART: [art] SIG.S = DC7251148007CAF03E170B758B16D9E1D00FEC704FEE1E151DD1F56027A9863CDD21F4670F1B8756734247B21D22A6B1
36,863,404 UART: Caliptra RT
36,864,128 UART: [state] CFI Enabled
37,024,504 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
192,255 UART:
192,620 UART: Running Caliptra ROM ...
193,752 UART:
603,338 UART: [state] CFI Enabled
617,025 UART: [state] LifecycleState = Production
618,807 UART: [state] DebugLocked = No
621,172 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,000 UART: [kat] SHA2-256
795,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,339 UART: [kat] ++
806,790 UART: [kat] sha1
818,572 UART: [kat] SHA2-256
821,306 UART: [kat] SHA2-384
827,365 UART: [kat] SHA2-512-ACC
829,782 UART: [kat] ECC-384
3,113,507 UART: [kat] HMAC-384Kdf
3,125,763 UART: [kat] LMS
4,315,851 UART: [kat] --
4,320,713 UART: [cold-reset] ++
4,322,438 UART: [fht] Storing FHT @ 0x50003400
4,334,550 UART: [idev] ++
4,335,111 UART: [idev] CDI.KEYID = 6
4,336,090 UART: [idev] SUBJECT.KEYID = 7
4,337,265 UART: [idev] UDS.KEYID = 0
4,338,342 ready_for_fw is high
4,338,563 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,889 UART: [idev] Erasing UDS.KEYID = 0
7,627,566 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,000 UART: [idev] --
7,653,483 UART: [ldev] ++
7,654,047 UART: [ldev] CDI.KEYID = 6
7,655,011 UART: [ldev] SUBJECT.KEYID = 5
7,656,229 UART: [ldev] AUTHORITY.KEYID = 7
7,657,510 UART: [ldev] FE.KEYID = 1
7,668,705 UART: [ldev] Erasing FE.KEYID = 1
10,957,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,981 UART: [ldev] --
13,317,386 UART: [fwproc] Waiting for Commands...
13,319,375 UART: [fwproc] Received command 0x46574c44
13,321,557 UART: [fwproc] Received Image of size 113760 bytes
22,300,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,381,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,450,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,766,068 >>> mbox cmd response: success
22,769,653 UART: [afmc] ++
22,770,259 UART: [afmc] CDI.KEYID = 6
22,771,194 UART: [afmc] SUBJECT.KEYID = 7
22,772,531 UART: [afmc] AUTHORITY.KEYID = 5
26,082,309 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,378,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,381,264 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,395,898 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,410,648 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,425,053 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,447,391 UART: [afmc] --
28,451,558 UART: [cold-reset] --
28,455,181 UART: [state] Locking Datavault
28,461,297 UART: [state] Locking PCR0, PCR1 and PCR31
28,463,024 UART: [state] Locking ICCM
28,464,578 UART: [exit] Launching FMC @ 0x40000130
28,473,007 UART:
28,473,260 UART: Running Caliptra FMC ...
28,474,403 UART:
28,474,564 UART: [state] CFI Enabled
28,482,555 UART: [fht] FMC Alias Private Key: 7
30,812,828 UART: [art] Extend RT PCRs Done
30,814,080 UART: [art] Lock RT PCRs Done
30,815,975 UART: [art] Populate DV Done
30,821,394 UART: [fht] FMC Alias Private Key: 7
30,823,096 UART: [art] Derive CDI
30,823,954 UART: [art] Store in in slot 0x4
30,866,497 UART: [art] Derive Key Pair
30,867,571 UART: [art] Store priv key in slot 0x5
34,109,595 UART: [art] Derive Key Pair - Done
34,122,717 UART: [art] Signing Cert with AUTHO
34,124,066 UART: RITY.KEYID = 7
36,403,503 UART: [art] Erasing AUTHORITY.KEYID = 7
36,405,059 UART: [art] PUB.X = BA8CDA621B66C7D83C917F263B19F1F672B2AACE952A73A5F052DD841852F41484502869E8C1724612605937E0235213
36,412,261 UART: [art] PUB.Y = F24086B0FEB58393A151B9141DDEBD25807476CBD29177FC4CFC0EFC8DD1ACF7704673E56347718F29BFEB923D34CD13
36,419,517 UART: [art] SIG.R = 2A2A8AA14C2037A97E8422F8DA6D19205E191C472D5EAC7BA9425EF48349E4C73343DCACDC1D5E49BF0FB12B6E752D37
36,426,849 UART: [art] SIG.S = DCB16A6BD967C50BDB638B0CFB870B4AF65D9F19B29EC7DB1EB5D893F73ED500DF9F73CCBD310C6F282281485DDE7FCF
37,731,649 UART: Caliptra RT
37,732,376 UART: [state] CFI Enabled
37,850,655 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,127,262 ready_for_fw is high
4,127,646 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,856,055 >>> mbox cmd response: success
27,491,141 UART:
27,491,511 UART: Running Caliptra FMC ...
27,492,722 UART:
27,492,888 UART: [state] CFI Enabled
27,500,449 UART: [fht] FMC Alias Private Key: 7
29,831,455 UART: [art] Extend RT PCRs Done
29,832,755 UART: [art] Lock RT PCRs Done
29,834,124 UART: [art] Populate DV Done
29,839,313 UART: [fht] FMC Alias Private Key: 7
29,841,069 UART: [art] Derive CDI
29,841,950 UART: [art] Store in in slot 0x4
29,884,425 UART: [art] Derive Key Pair
29,885,462 UART: [art] Store priv key in slot 0x5
33,127,679 UART: [art] Derive Key Pair - Done
33,140,525 UART: [art] Signing Cert with AUTHO
33,141,872 UART: RITY.KEYID = 7
35,421,064 UART: [art] Erasing AUTHORITY.KEYID = 7
35,422,622 UART: [art] PUB.X = 27E4F9696BCCCF819E4EF56DD79A17A70425E3B0EF2CDE871166157B31EA0F75819AD679102C2A28B55EEBB801FD7AC5
35,429,868 UART: [art] PUB.Y = FC1346B503A1A3A117D78D7E5A79D774298B1ADEAEF66E76FBF57BC4A412E5B144D92F0BB1FE41CF0C4CE15D6C44DFAE
35,437,090 UART: [art] SIG.R = 32832398DD21D1DEE4D76DEA53F93FAE06E01129A5C2F43D32CF3A5959C0A75F1D6C69A22EAE1A3BB71175485898481E
35,444,482 UART: [art] SIG.S = 98844CDF671770ED0C5A746EDA62FE1ADBC986536C97958B8ECF8DD4C8BA4B9F3F130AC787DD8CC497CC37F634CAC521
36,749,446 UART: Caliptra RT
36,750,169 UART: [state] CFI Enabled
36,867,855 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
192,570 UART:
192,971 UART: Running Caliptra ROM ...
194,070 UART:
194,214 UART: [state] CFI Enabled
265,962 UART: [state] LifecycleState = Production
267,706 UART: [state] DebugLocked = No
270,357 UART: [state] WD Timer not started. Device not locked for debugging
274,046 UART: [kat] SHA2-256
453,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,717 UART: [kat] ++
465,158 UART: [kat] sha1
475,033 UART: [kat] SHA2-256
478,045 UART: [kat] SHA2-384
483,396 UART: [kat] SHA2-512-ACC
486,327 UART: [kat] ECC-384
2,948,882 UART: [kat] HMAC-384Kdf
2,972,311 UART: [kat] LMS
3,501,771 UART: [kat] --
3,506,195 UART: [cold-reset] ++
3,507,775 UART: [fht] FHT @ 0x50003400
3,519,032 UART: [idev] ++
3,519,594 UART: [idev] CDI.KEYID = 6
3,520,507 UART: [idev] SUBJECT.KEYID = 7
3,521,675 UART: [idev] UDS.KEYID = 0
3,522,668 ready_for_fw is high
3,522,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,419 UART: [idev] Erasing UDS.KEYID = 0
6,027,774 UART: [idev] Sha1 KeyId Algorithm
6,051,763 UART: [idev] --
6,055,536 UART: [ldev] ++
6,056,103 UART: [ldev] CDI.KEYID = 6
6,057,008 UART: [ldev] SUBJECT.KEYID = 5
6,058,221 UART: [ldev] AUTHORITY.KEYID = 7
6,059,447 UART: [ldev] FE.KEYID = 1
6,099,595 UART: [ldev] Erasing FE.KEYID = 1
8,601,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,728 UART: [ldev] --
10,393,775 UART: [fwproc] Wait for Commands...
10,395,972 UART: [fwproc] Recv command 0x46574c44
10,398,056 UART: [fwproc] Recv'd Img size: 114084 bytes
15,005,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,084,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,153,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,469,935 >>> mbox cmd response: success
15,474,542 UART: [afmc] ++
15,475,146 UART: [afmc] CDI.KEYID = 6
15,476,053 UART: [afmc] SUBJECT.KEYID = 7
15,477,206 UART: [afmc] AUTHORITY.KEYID = 5
18,000,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,091 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,743,132 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,759,104 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,775,068 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,797,392 UART: [afmc] --
19,801,972 UART: [cold-reset] --
19,804,521 UART: [state] Locking Datavault
19,809,189 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,855 UART: [state] Locking ICCM
19,811,933 UART: [exit] Launching FMC @ 0x40000130
19,820,351 UART:
19,820,600 UART: Running Caliptra FMC ...
19,821,649 UART:
19,821,792 UART: [state] CFI Enabled
19,881,861 UART: [fht] FMC Alias Private Key: 7
21,645,251 UART: [art] Extend RT PCRs Done
21,646,513 UART: [art] Lock RT PCRs Done
21,647,874 UART: [art] Populate DV Done
21,653,250 UART: [fht] FMC Alias Private Key: 7
21,654,969 UART: [art] Derive CDI
21,655,819 UART: [art] Store in in slot 0x4
21,714,376 UART: [art] Derive Key Pair
21,715,457 UART: [art] Store priv key in slot 0x5
24,178,572 UART: [art] Derive Key Pair - Done
24,191,157 UART: [art] Signing Cert with AUTHO
24,192,525 UART: RITY.KEYID = 7
25,904,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,905,745 UART: [art] PUB.X = E4AFB4E283BD007FC3217E07365989334AAF942FF566F82C07930A34DB383D8E348912D663FB42DDC0BCC327679F409D
25,912,958 UART: [art] PUB.Y = 99F88476F830ABA5B7380942C6EBE5CB4A5E16690AEC19D4BC89ECBA8357F04316F6757B687BDD5034641968583C9637
25,920,236 UART: [art] SIG.R = FACFFCD82ABAA2912850907B2D03D470A41FEF1EA924EBB0FB224BCCE7B22D7937DF8F15FE629A0B0EA45A518C07DDCB
25,927,667 UART: [art] SIG.S = 20FCFA7CB85B3EF4892235E9A74AF9B95CC42AEA32EA88C9420ABAF0AD73A90DE8ECAB4C755160AA22879B0EE8593B9B
26,906,401 UART: Caliptra RT
26,907,137 UART: [state] CFI Enabled
27,072,280 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,358,453 ready_for_fw is high
3,358,825 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,053,088 >>> mbox cmd response: success
19,349,284 UART:
19,349,708 UART: Running Caliptra FMC ...
19,350,828 UART:
19,350,978 UART: [state] CFI Enabled
19,414,519 UART: [fht] FMC Alias Private Key: 7
21,178,827 UART: [art] Extend RT PCRs Done
21,180,116 UART: [art] Lock RT PCRs Done
21,181,478 UART: [art] Populate DV Done
21,187,085 UART: [fht] FMC Alias Private Key: 7
21,188,586 UART: [art] Derive CDI
21,189,390 UART: [art] Store in in slot 0x4
21,247,077 UART: [art] Derive Key Pair
21,248,128 UART: [art] Store priv key in slot 0x5
23,711,400 UART: [art] Derive Key Pair - Done
23,724,194 UART: [art] Signing Cert with AUTHO
23,725,534 UART: RITY.KEYID = 7
25,437,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,439,091 UART: [art] PUB.X = D59927720FBAA08FDFC37C6B0525B457BC4922D03EEDD1ECA4438CF83FF21871943E5D6D412E47B63CF9CFE52AE15479
25,446,388 UART: [art] PUB.Y = 6B1A7FDC26BC784F1CAEFC6B2942D384B53B7AF8B4A31A723909906B0B65228AB955E613944B2499586D810CCE2C8BFB
25,453,600 UART: [art] SIG.R = 32A1C7CFF6E18DEEFA58576FD3302250F11496D68F06CB2C418261E8C0F74EDA7E609B17B0D8183C785959F5352C149E
25,461,034 UART: [art] SIG.S = 4881F08DCE3731070226E5788C04B51F28733C1F79FFC20FB3B78F82716BF88D70CD7A39E1DFC1A76F9C3A1E28BA1B4D
26,440,458 UART: Caliptra RT
26,441,179 UART: [state] CFI Enabled
26,606,713 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
192,925 UART:
193,317 UART: Running Caliptra ROM ...
194,417 UART:
604,181 UART: [state] CFI Enabled
618,404 UART: [state] LifecycleState = Production
620,176 UART: [state] DebugLocked = No
622,545 UART: [state] WD Timer not started. Device not locked for debugging
625,382 UART: [kat] SHA2-256
804,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,135 UART: [kat] ++
816,668 UART: [kat] sha1
828,610 UART: [kat] SHA2-256
831,664 UART: [kat] SHA2-384
838,022 UART: [kat] SHA2-512-ACC
840,966 UART: [kat] ECC-384
3,282,669 UART: [kat] HMAC-384Kdf
3,295,396 UART: [kat] LMS
3,824,912 UART: [kat] --
3,830,604 UART: [cold-reset] ++
3,832,755 UART: [fht] FHT @ 0x50003400
3,844,224 UART: [idev] ++
3,844,800 UART: [idev] CDI.KEYID = 6
3,845,828 UART: [idev] SUBJECT.KEYID = 7
3,846,927 UART: [idev] UDS.KEYID = 0
3,847,856 ready_for_fw is high
3,848,069 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,450 UART: [idev] Erasing UDS.KEYID = 0
6,316,851 UART: [idev] Sha1 KeyId Algorithm
6,340,130 UART: [idev] --
6,343,844 UART: [ldev] ++
6,344,407 UART: [ldev] CDI.KEYID = 6
6,345,365 UART: [ldev] SUBJECT.KEYID = 5
6,346,519 UART: [ldev] AUTHORITY.KEYID = 7
6,347,808 UART: [ldev] FE.KEYID = 1
6,355,481 UART: [ldev] Erasing FE.KEYID = 1
8,825,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,363 UART: [ldev] --
10,617,271 UART: [fwproc] Wait for Commands...
10,619,464 UART: [fwproc] Recv command 0x46574c44
10,621,494 UART: [fwproc] Recv'd Img size: 114084 bytes
15,222,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,305,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,373,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,691,317 >>> mbox cmd response: success
15,695,023 UART: [afmc] ++
15,695,640 UART: [afmc] CDI.KEYID = 6
15,696,576 UART: [afmc] SUBJECT.KEYID = 7
15,697,724 UART: [afmc] AUTHORITY.KEYID = 5
18,198,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,920,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,922,402 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,938,487 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,954,459 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,970,404 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,993,983 UART: [afmc] --
19,996,995 UART: [cold-reset] --
20,000,740 UART: [state] Locking Datavault
20,005,685 UART: [state] Locking PCR0, PCR1 and PCR31
20,007,357 UART: [state] Locking ICCM
20,009,499 UART: [exit] Launching FMC @ 0x40000130
20,017,975 UART:
20,018,223 UART: Running Caliptra FMC ...
20,019,363 UART:
20,019,523 UART: [state] CFI Enabled
20,027,626 UART: [fht] FMC Alias Private Key: 7
21,784,144 UART: [art] Extend RT PCRs Done
21,785,409 UART: [art] Lock RT PCRs Done
21,786,915 UART: [art] Populate DV Done
21,792,515 UART: [fht] FMC Alias Private Key: 7
21,794,105 UART: [art] Derive CDI
21,794,964 UART: [art] Store in in slot 0x4
21,837,545 UART: [art] Derive Key Pair
21,838,576 UART: [art] Store priv key in slot 0x5
24,265,463 UART: [art] Derive Key Pair - Done
24,278,112 UART: [art] Signing Cert with AUTHO
24,279,484 UART: RITY.KEYID = 7
25,984,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,986,385 UART: [art] PUB.X = C8E4ABF5E9ADD32E3A55ECDBB391A0A09BB6311269293CE31E921D197DAB4D0E2DAACE446289F745E6A6CEEC10C1AE5A
25,993,661 UART: [art] PUB.Y = 148034DF4ADF3105AB32626EEADA206C817B0632EDBAFB5435CA53F91CB0489307E1FC7E0AFE0A81EA352571DECF858E
26,000,944 UART: [art] SIG.R = 6117760D5C189BD050235777B723E320BA00152940089EA26BF7814A251362D3E8DA0F01EA07EB7F993569398025B25D
26,008,297 UART: [art] SIG.S = 3557F7ED81385811A1B006B77FCED94A11B8525A2272B4EE9376FD7C8E20F1C8CCEACD45438D55A9F6619C31DA873BD9
26,987,483 UART: Caliptra RT
26,988,216 UART: [state] CFI Enabled
27,105,743 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
3,698,013 ready_for_fw is high
3,698,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,289,822 >>> mbox cmd response: success
19,538,096 UART:
19,538,473 UART: Running Caliptra FMC ...
19,539,681 UART:
19,539,859 UART: [state] CFI Enabled
19,547,554 UART: [fht] FMC Alias Private Key: 7
21,303,993 UART: [art] Extend RT PCRs Done
21,305,257 UART: [art] Lock RT PCRs Done
21,307,068 UART: [art] Populate DV Done
21,312,180 UART: [fht] FMC Alias Private Key: 7
21,313,865 UART: [art] Derive CDI
21,314,637 UART: [art] Store in in slot 0x4
21,357,223 UART: [art] Derive Key Pair
21,358,267 UART: [art] Store priv key in slot 0x5
23,785,306 UART: [art] Derive Key Pair - Done
23,798,379 UART: [art] Signing Cert with AUTHO
23,799,721 UART: RITY.KEYID = 7
25,505,002 UART: [art] Erasing AUTHORITY.KEYID = 7
25,506,574 UART: [art] PUB.X = D0B5A46D77041F58F290A2175E71AB6C546D26B7ABA28122A625BEEF44556DFFAED94974B9B05DE075500E54C42C3969
25,513,790 UART: [art] PUB.Y = A1FE2E3D77B92524ECC40B8388F72A7311B703DB63449872FF248EA35A56E86623B01F5113FCFB58655F01A4A0303440
25,521,033 UART: [art] SIG.R = CFEC2EEE4ADECA8C4EDE90DADD6C18BC51D0C26FCFBFBD9E1E40617CA0F6427B8441D9209EED4B993A1D81D3AC32CFF2
25,528,461 UART: [art] SIG.S = 76951148615B0CC137AC05D2753775CBC54046F6807A78381106FC7322D5BE4346EC4DF85331488292CB5D248AFB730A
26,507,193 UART: Caliptra RT
26,507,906 UART: [state] CFI Enabled
26,625,242 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,372 UART:
192,739 UART: Running Caliptra ROM ...
193,930 UART:
194,411 UART: [state] CFI Enabled
263,664 UART: [state] LifecycleState = Production
265,916 UART: [state] DebugLocked = No
267,498 UART: [state] WD Timer not started. Device not locked for debugging
272,519 UART: [kat] SHA2-256
462,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,160 UART: [kat] ++
473,609 UART: [kat] sha1
486,258 UART: [kat] SHA2-256
489,271 UART: [kat] SHA2-384
494,203 UART: [kat] SHA2-512-ACC
496,783 UART: [kat] ECC-384
2,949,033 UART: [kat] HMAC-384Kdf
2,973,456 UART: [kat] LMS
3,505,242 UART: [kat] --
3,509,403 UART: [cold-reset] ++
3,510,777 UART: [fht] FHT @ 0x50003400
3,522,614 UART: [idev] ++
3,523,244 UART: [idev] CDI.KEYID = 6
3,524,271 UART: [idev] SUBJECT.KEYID = 7
3,525,442 UART: [idev] UDS.KEYID = 0
3,526,365 ready_for_fw is high
3,526,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,063 UART: [idev] Erasing UDS.KEYID = 0
6,032,963 UART: [idev] Sha1 KeyId Algorithm
6,055,997 UART: [idev] --
6,059,247 UART: [ldev] ++
6,059,927 UART: [ldev] CDI.KEYID = 6
6,060,847 UART: [ldev] SUBJECT.KEYID = 5
6,062,086 UART: [ldev] AUTHORITY.KEYID = 7
6,063,270 UART: [ldev] FE.KEYID = 1
6,102,700 UART: [ldev] Erasing FE.KEYID = 1
8,610,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,111 UART: [ldev] --
10,418,299 UART: [fwproc] Wait for Commands...
10,420,339 UART: [fwproc] Recv command 0x46574c44
10,422,646 UART: [fwproc] Recv'd Img size: 114084 bytes
15,060,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,141,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,257,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,798,488 >>> mbox cmd response: success
15,802,253 UART: [afmc] ++
15,803,060 UART: [afmc] CDI.KEYID = 6
15,804,169 UART: [afmc] SUBJECT.KEYID = 7
15,805,706 UART: [afmc] AUTHORITY.KEYID = 5
18,344,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,069,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,071,461 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,086,692 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,101,878 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,116,856 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,140,810 UART: [afmc] --
20,144,660 UART: [cold-reset] --
20,148,231 UART: [state] Locking Datavault
20,153,616 UART: [state] Locking PCR0, PCR1 and PCR31
20,155,816 UART: [state] Locking ICCM
20,158,326 UART: [exit] Launching FMC @ 0x40000130
20,166,995 UART:
20,167,246 UART: Running Caliptra FMC ...
20,168,392 UART:
20,168,548 UART: [state] CFI Enabled
20,226,654 UART: [fht] FMC Alias Private Key: 7
21,991,255 UART: [art] Extend RT PCRs Done
21,992,522 UART: [art] Lock RT PCRs Done
21,994,462 UART: [art] Populate DV Done
21,999,905 UART: [fht] FMC Alias Private Key: 7
22,001,573 UART: [art] Derive CDI
22,002,437 UART: [art] Store in in slot 0x4
22,058,864 UART: [art] Derive Key Pair
22,059,951 UART: [art] Store priv key in slot 0x5
24,522,956 UART: [art] Derive Key Pair - Done
24,536,072 UART: [art] Signing Cert with AUTHO
24,537,419 UART: RITY.KEYID = 7
26,248,402 UART: [art] Erasing AUTHORITY.KEYID = 7
26,249,962 UART: [art] PUB.X = 8981ADDDEBB9C5A125940DC1726329557AD59FF9D85AB3D3528E90EAB4702A28263120912B240B0B308BBD8FF28F19ED
26,257,197 UART: [art] PUB.Y = D7EC82040E54FD9C346DAEE36C79D0A0749DD63C8BA8980027C4167C7A897AC2409A4A64BED166434B58D797167C842D
26,264,436 UART: [art] SIG.R = FE6125B112961673FD0FD63B40BADAAE6E896283443088360030E6D4820522B300490D3A695CC40A89CE131B24494C28
26,271,733 UART: [art] SIG.S = 305241AEE1ECD6515F4CB94527E64B7BBBCFE533D8A5149F12AD6DAFBE98BC689D772EA8C8FA8B549B4DAD8D0949B87C
27,250,654 UART: Caliptra RT
27,251,378 UART: [state] CFI Enabled
27,415,505 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,562 writing to cptra_bootfsm_go
3,437,720 ready_for_fw is high
3,438,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,857,256 >>> mbox cmd response: success
20,175,454 UART:
20,175,856 UART: Running Caliptra FMC ...
20,177,069 UART:
20,177,244 UART: [state] CFI Enabled
20,243,513 UART: [fht] FMC Alias Private Key: 7
22,007,575 UART: [art] Extend RT PCRs Done
22,009,126 UART: [art] Lock RT PCRs Done
22,010,438 UART: [art] Populate DV Done
22,016,083 UART: [fht] FMC Alias Private Key: 7
22,017,758 UART: [art] Derive CDI
22,018,625 UART: [art] Store in in slot 0x4
22,076,736 UART: [art] Derive Key Pair
22,077,855 UART: [art] Store priv key in slot 0x5
24,540,667 UART: [art] Derive Key Pair - Done
24,553,646 UART: [art] Signing Cert with AUTHO
24,555,032 UART: RITY.KEYID = 7
26,266,736 UART: [art] Erasing AUTHORITY.KEYID = 7
26,268,565 UART: [art] PUB.X = D40E142B5526EB7440501209895D6F45D16495E540483FFF9D6C5E31C09A9A13FB9C217D0B8E2928DF75CA0A4D5A6148
26,275,514 UART: [art] PUB.Y = E9903857EE9778B9D07405B3819A05CB9DA6858FFA853286A98892657CD093FBC8625327D55AE148460ECF54AB85A55B
26,282,738 UART: [art] SIG.R = 8275AF2D08A045A4F0DEB8D68C1132920DFDF4190BD0A19A2845C0D3540F849314E6E97046F09CB0746643168F4B2872
26,290,175 UART: [art] SIG.S = 3A8966539E7D83D9DC332545C906A0BA7474449A6D5BFD36AD94F3107018147374355D080C7970FFC39E04274B3B2B89
27,269,014 UART: Caliptra RT
27,269,747 UART: [state] CFI Enabled
27,435,245 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
192,933 UART:
193,294 UART: Running Caliptra ROM ...
194,483 UART:
604,071 UART: [state] CFI Enabled
618,799 UART: [state] LifecycleState = Production
621,085 UART: [state] DebugLocked = No
622,970 UART: [state] WD Timer not started. Device not locked for debugging
628,352 UART: [kat] SHA2-256
818,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,994 UART: [kat] ++
829,540 UART: [kat] sha1
840,553 UART: [kat] SHA2-256
843,572 UART: [kat] SHA2-384
850,339 UART: [kat] SHA2-512-ACC
852,988 UART: [kat] ECC-384
3,298,076 UART: [kat] HMAC-384Kdf
3,312,059 UART: [kat] LMS
3,843,882 UART: [kat] --
3,848,087 UART: [cold-reset] ++
3,849,517 UART: [fht] FHT @ 0x50003400
3,862,837 UART: [idev] ++
3,863,593 UART: [idev] CDI.KEYID = 6
3,864,482 UART: [idev] SUBJECT.KEYID = 7
3,865,733 UART: [idev] UDS.KEYID = 0
3,866,629 ready_for_fw is high
3,866,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,010,214 UART: [idev] Erasing UDS.KEYID = 0
6,346,051 UART: [idev] Sha1 KeyId Algorithm
6,367,457 UART: [idev] --
6,371,719 UART: [ldev] ++
6,372,396 UART: [ldev] CDI.KEYID = 6
6,373,301 UART: [ldev] SUBJECT.KEYID = 5
6,374,458 UART: [ldev] AUTHORITY.KEYID = 7
6,375,682 UART: [ldev] FE.KEYID = 1
6,386,269 UART: [ldev] Erasing FE.KEYID = 1
8,862,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,443 UART: [ldev] --
10,653,417 UART: [fwproc] Wait for Commands...
10,655,668 UART: [fwproc] Recv command 0x46574c44
10,657,979 UART: [fwproc] Recv'd Img size: 114084 bytes
15,314,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,391,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,507,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,048,819 >>> mbox cmd response: success
16,052,526 UART: [afmc] ++
16,053,330 UART: [afmc] CDI.KEYID = 6
16,054,428 UART: [afmc] SUBJECT.KEYID = 7
16,055,893 UART: [afmc] AUTHORITY.KEYID = 5
18,559,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,285,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,287,222 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,302,449 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,317,633 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,332,610 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,356,744 UART: [afmc] --
20,361,159 UART: [cold-reset] --
20,364,932 UART: [state] Locking Datavault
20,371,107 UART: [state] Locking PCR0, PCR1 and PCR31
20,373,300 UART: [state] Locking ICCM
20,375,447 UART: [exit] Launching FMC @ 0x40000130
20,384,087 UART:
20,384,338 UART: Running Caliptra FMC ...
20,385,483 UART:
20,385,644 UART: [state] CFI Enabled
20,393,395 UART: [fht] FMC Alias Private Key: 7
22,149,857 UART: [art] Extend RT PCRs Done
22,151,121 UART: [art] Lock RT PCRs Done
22,152,813 UART: [art] Populate DV Done
22,158,208 UART: [fht] FMC Alias Private Key: 7
22,159,765 UART: [art] Derive CDI
22,160,542 UART: [art] Store in in slot 0x4
22,203,168 UART: [art] Derive Key Pair
22,204,205 UART: [art] Store priv key in slot 0x5
24,630,638 UART: [art] Derive Key Pair - Done
24,643,792 UART: [art] Signing Cert with AUTHO
24,645,164 UART: RITY.KEYID = 7
26,350,517 UART: [art] Erasing AUTHORITY.KEYID = 7
26,352,076 UART: [art] PUB.X = 120BCC5230DDBD58D84C997A9A5B4347B7D7EFE8DAA0119560C06E57C14118DE67D5750CBE37DA09EC582086C97CAA18
26,359,289 UART: [art] PUB.Y = E86C4ED8F47599F7FA71EC791AD272FBEC965C2DB9B0B41F618939C4B7B1649509554EA4B65FDAC9C24045512B55D35E
26,366,603 UART: [art] SIG.R = F672059DEF24BCBF3BB85BA55A73C4C5AD6320EE81DADAF14AB4F6A0FE1F4807E971F03B32A6466FCA09374C86DD1851
26,374,038 UART: [art] SIG.S = 95A79D0D15158C8446A6AC7DED0ADF24A3899EBCCE9C89174DC34355CA5C071BDF8F6CB62A20B712A63D0B5669733EE7
27,353,038 UART: Caliptra RT
27,353,759 UART: [state] CFI Enabled
27,471,022 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,878 writing to cptra_bootfsm_go
3,753,400 ready_for_fw is high
3,753,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,107,233 >>> mbox cmd response: success
20,362,048 UART:
20,362,426 UART: Running Caliptra FMC ...
20,363,641 UART:
20,363,803 UART: [state] CFI Enabled
20,371,871 UART: [fht] FMC Alias Private Key: 7
22,128,529 UART: [art] Extend RT PCRs Done
22,129,803 UART: [art] Lock RT PCRs Done
22,131,503 UART: [art] Populate DV Done
22,136,957 UART: [fht] FMC Alias Private Key: 7
22,138,449 UART: [art] Derive CDI
22,139,221 UART: [art] Store in in slot 0x4
22,181,806 UART: [art] Derive Key Pair
22,182,850 UART: [art] Store priv key in slot 0x5
24,609,352 UART: [art] Derive Key Pair - Done
24,622,311 UART: [art] Signing Cert with AUTHO
24,623,687 UART: RITY.KEYID = 7
26,329,465 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,020 UART: [art] PUB.X = 97E81D159F492C6A9D45830E1EF039F10BE142C1EF904E3F35F2702CEF92394A8608F05728C388061CDEE9D37CF05725
26,338,246 UART: [art] PUB.Y = 26F2812EBFE1185438E7C2AC4D1343F404385121128B69012CF885A83EC7C7251359CD4BBEF6BC913B594FBC73CD8B11
26,345,466 UART: [art] SIG.R = 2477D05932D3410DDFC452FBA960878AA14C781B05BFB7C42865890C59763AEDDA4D5D0134BE57C4677D998D54F2F7A4
26,352,886 UART: [art] SIG.S = 1F2C80150F640C333C5D7278C4604A9A9CB073DDBDA94BB3EC0AB3C231F2FF461AEB8662FCD004FDA75D302133B00F94
27,332,244 UART: Caliptra RT
27,332,960 UART: [state] CFI Enabled
27,450,479 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
192,449 UART:
193,765 UART: Running Caliptra ROM ...
194,977 UART:
195,125 UART: [state] CFI Enabled
270,929 UART: [state] LifecycleState = Unprovisioned
273,181 UART: [state] DebugLocked = Yes
275,319 UART: [state] Starting the Watchdog Timer 40000000 cycles
280,992 UART: [kat] SHA2-256
450,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
461,198 UART: [kat] ++
461,720 UART: [kat] sha1
473,236 UART: [kat] SHA2-256
475,923 UART: [kat] SHA2-384
482,438 UART: [kat] SHA2-512-ACC
484,806 UART: [kat] ECC-384
2,775,392 UART: [kat] HMAC-384Kdf
2,806,309 UART: [kat] LMS
3,996,584 UART: [kat] --
4,000,239 UART: [cold-reset] ++
4,002,684 UART: [fht] Storing FHT @ 0x50003400
4,014,665 UART: [idev] ++
4,015,278 UART: [idev] CDI.KEYID = 6
4,016,196 UART: [idev] SUBJECT.KEYID = 7
4,017,414 UART: [idev] UDS.KEYID = 0
4,042,839 UART: [idev] Erasing UDS.KEYID = 0
7,354,963 UART: [idev] Using Sha1 for KeyId Algorithm
7,375,557 UART: [idev] CSR upload requested
7,380,726 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,686,550 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,701,164 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,715,890 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,730,162 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,753,160 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
192,310 UART:
193,445 UART: Running Caliptra ROM ...
194,692 UART:
603,559 UART: [state] CFI Enabled
618,961 UART: [state] LifecycleState = Unprovisioned
620,929 UART: [state] DebugLocked = Yes
623,271 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,232 UART: [kat] SHA2-256
798,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,545 UART: [kat] ++
809,030 UART: [kat] sha1
819,909 UART: [kat] SHA2-256
822,592 UART: [kat] SHA2-384
829,274 UART: [kat] SHA2-512-ACC
831,619 UART: [kat] ECC-384
3,116,139 UART: [kat] HMAC-384Kdf
3,126,626 UART: [kat] LMS
4,316,768 UART: [kat] --
4,320,751 UART: [cold-reset] ++
4,321,972 UART: [fht] Storing FHT @ 0x50003400
4,332,693 UART: [idev] ++
4,333,310 UART: [idev] CDI.KEYID = 6
4,334,217 UART: [idev] SUBJECT.KEYID = 7
4,335,477 UART: [idev] UDS.KEYID = 0
4,353,447 UART: [idev] Erasing UDS.KEYID = 0
7,622,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,959 UART: [idev] CSR upload requested
7,649,090 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,942,438 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,957,010 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,971,763 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,986,122 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,009,054 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
17,787 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,682 writing to cptra_bootfsm_go
192,320 UART:
193,337 UART: Running Caliptra ROM ...
194,544 UART:
194,743 UART: [state] CFI Enabled
265,622 UART: [state] LifecycleState = Unprovisioned
268,016 UART: [state] DebugLocked = Yes
270,337 UART: [state] Starting the WD Timer 40000000 cycles
274,794 UART: [kat] SHA2-256
453,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,509 UART: [kat] ++
466,058 UART: [kat] sha1
477,013 UART: [kat] SHA2-256
480,004 UART: [kat] SHA2-384
487,641 UART: [kat] SHA2-512-ACC
490,634 UART: [kat] ECC-384
2,951,064 UART: [kat] HMAC-384Kdf
2,974,119 UART: [kat] LMS
3,503,575 UART: [kat] --
3,507,538 UART: [cold-reset] ++
3,509,397 UART: [fht] FHT @ 0x50003400
3,519,785 UART: [idev] ++
3,520,351 UART: [idev] CDI.KEYID = 6
3,521,317 UART: [idev] SUBJECT.KEYID = 7
3,522,470 UART: [idev] UDS.KEYID = 0
3,546,488 UART: [idev] Erasing UDS.KEYID = 0
6,027,291 UART: [idev] Sha1 KeyId Algorithm
6,047,043 UART: [idev] CSR upload begun
6,051,740 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,491 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,800,566 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,816,435 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,832,261 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,856,284 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,734 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,206 writing to cptra_bootfsm_go
192,837 UART:
193,985 UART: Running Caliptra ROM ...
195,180 UART:
603,944 UART: [state] CFI Enabled
618,741 UART: [state] LifecycleState = Unprovisioned
620,613 UART: [state] DebugLocked = Yes
623,057 UART: [state] Starting the WD Timer 40000000 cycles
628,034 UART: [kat] SHA2-256
807,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,762 UART: [kat] ++
819,279 UART: [kat] sha1
828,669 UART: [kat] SHA2-256
831,684 UART: [kat] SHA2-384
837,493 UART: [kat] SHA2-512-ACC
840,493 UART: [kat] ECC-384
3,280,685 UART: [kat] HMAC-384Kdf
3,292,023 UART: [kat] LMS
3,821,548 UART: [kat] --
3,828,409 UART: [cold-reset] ++
3,829,795 UART: [fht] FHT @ 0x50003400
3,840,721 UART: [idev] ++
3,841,289 UART: [idev] CDI.KEYID = 6
3,842,224 UART: [idev] SUBJECT.KEYID = 7
3,843,436 UART: [idev] UDS.KEYID = 0
3,863,000 UART: [idev] Erasing UDS.KEYID = 0
6,320,309 UART: [idev] Sha1 KeyId Algorithm
6,340,495 UART: [idev] CSR upload begun
6,345,173 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,062,568 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,078,653 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,094,544 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,110,470 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,134,370 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,362 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,032 writing to cptra_bootfsm_go
192,634 UART:
193,749 UART: Running Caliptra ROM ...
194,979 UART:
195,136 UART: [state] CFI Enabled
266,987 UART: [state] LifecycleState = Unprovisioned
269,757 UART: [state] DebugLocked = Yes
271,147 UART: [state] Starting the WD Timer 40000000 cycles
277,171 UART: [kat] SHA2-256
467,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,826 UART: [kat] ++
478,415 UART: [kat] sha1
489,346 UART: [kat] SHA2-256
492,371 UART: [kat] SHA2-384
497,863 UART: [kat] SHA2-512-ACC
500,434 UART: [kat] ECC-384
2,952,781 UART: [kat] HMAC-384Kdf
2,978,098 UART: [kat] LMS
3,509,887 UART: [kat] --
3,514,724 UART: [cold-reset] ++
3,516,207 UART: [fht] FHT @ 0x50003400
3,526,604 UART: [idev] ++
3,527,286 UART: [idev] CDI.KEYID = 6
3,528,255 UART: [idev] SUBJECT.KEYID = 7
3,529,465 UART: [idev] UDS.KEYID = 0
3,549,004 UART: [idev] Erasing UDS.KEYID = 0
6,034,819 UART: [idev] Sha1 KeyId Algorithm
6,056,234 UART: [idev] CSR upload begun
6,061,279 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,791,471 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,806,665 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,821,805 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,836,751 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,861,913 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
5,087 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,230 writing to cptra_bootfsm_go
192,832 UART:
194,009 UART: Running Caliptra ROM ...
195,244 UART:
603,834 UART: [state] CFI Enabled
620,472 UART: [state] LifecycleState = Unprovisioned
623,029 UART: [state] DebugLocked = Yes
624,997 UART: [state] Starting the WD Timer 40000000 cycles
631,143 UART: [kat] SHA2-256
821,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,839 UART: [kat] ++
832,383 UART: [kat] sha1
844,511 UART: [kat] SHA2-256
847,520 UART: [kat] SHA2-384
853,874 UART: [kat] SHA2-512-ACC
856,476 UART: [kat] ECC-384
3,297,390 UART: [kat] HMAC-384Kdf
3,310,832 UART: [kat] LMS
3,842,652 UART: [kat] --
3,848,271 UART: [cold-reset] ++
3,849,438 UART: [fht] FHT @ 0x50003400
3,860,034 UART: [idev] ++
3,860,735 UART: [idev] CDI.KEYID = 6
3,861,758 UART: [idev] SUBJECT.KEYID = 7
3,862,914 UART: [idev] UDS.KEYID = 0
3,881,315 UART: [idev] Erasing UDS.KEYID = 0
6,338,378 UART: [idev] Sha1 KeyId Algorithm
6,359,740 UART: [idev] CSR upload begun
6,364,837 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,081,028 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,096,209 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,111,349 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,126,264 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,151,414 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
12,103 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = Yes
86,423 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,073 UART: [cold-reset] ++
1,476,576 UART: [fht] Storing FHT @ 0x50003400
1,479,421 UART: [idev] ++
1,479,589 UART: [idev] CDI.KEYID = 6
1,479,949 UART: [idev] SUBJECT.KEYID = 7
1,480,373 UART: [idev] UDS.KEYID = 0
1,488,526 UART: [idev] Erasing UDS.KEYID = 0
1,505,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] CSR upload requested
1,515,599 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,118 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,531,830 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,537,732 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,436 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,551,971 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = Yes
86,332 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,974 UART: [kat] SHA2-256
881,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,020 UART: [kat] ++
886,172 UART: [kat] sha1
890,386 UART: [kat] SHA2-256
892,324 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,349 UART: [kat] HMAC-384Kdf
906,965 UART: [kat] LMS
1,475,161 UART: [kat] --
1,475,874 UART: [cold-reset] ++
1,476,369 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,488,487 UART: [idev] Erasing UDS.KEYID = 0
1,505,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,958 UART: [idev] CSR upload requested
1,515,804 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,433 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,145 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,047 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,751 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,286 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = Yes
86,675 UART: [state] Starting the WD Timer 40000000 cycles
88,388 UART: [kat] SHA2-256
894,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,163 UART: [kat] ++
898,315 UART: [kat] sha1
902,727 UART: [kat] SHA2-256
904,667 UART: [kat] SHA2-384
907,402 UART: [kat] SHA2-512-ACC
909,303 UART: [kat] ECC-384
919,190 UART: [kat] HMAC-384Kdf
923,758 UART: [kat] LMS
1,172,086 UART: [kat] --
1,173,199 UART: [cold-reset] ++
1,173,564 UART: [fht] FHT @ 0x50003400
1,176,005 UART: [idev] ++
1,176,173 UART: [idev] CDI.KEYID = 6
1,176,533 UART: [idev] SUBJECT.KEYID = 7
1,176,957 UART: [idev] UDS.KEYID = 0
1,184,668 UART: [idev] Erasing UDS.KEYID = 0
1,201,600 UART: [idev] Sha1 KeyId Algorithm
1,209,983 UART: [idev] CSR upload begun
1,211,764 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,430 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,142 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,044 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,748 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,283 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = Yes
86,494 UART: [state] Starting the WD Timer 40000000 cycles
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,096 UART: [kat] SHA2-256
904,036 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,765 UART: [kat] LMS
1,171,093 UART: [kat] --
1,172,150 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,492 UART: [idev] ++
1,175,660 UART: [idev] CDI.KEYID = 6
1,176,020 UART: [idev] SUBJECT.KEYID = 7
1,176,444 UART: [idev] UDS.KEYID = 0
1,184,829 UART: [idev] Erasing UDS.KEYID = 0
1,202,283 UART: [idev] Sha1 KeyId Algorithm
1,210,616 UART: [idev] CSR upload begun
1,212,397 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,223,005 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,717 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,619 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,240,323 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,858 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = Yes
86,243 UART: [state] Starting the WD Timer 40000000 cycles
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,201 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,782 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] CSR upload begun
1,209,916 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,445 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,226,158 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,232,063 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,768 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,312 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,814 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = Yes
87,224 UART: [state] Starting the WD Timer 40000000 cycles
88,911 UART: [kat] SHA2-256
892,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,590 UART: [kat] ++
896,742 UART: [kat] sha1
900,938 UART: [kat] SHA2-256
902,878 UART: [kat] SHA2-384
905,765 UART: [kat] SHA2-512-ACC
907,666 UART: [kat] ECC-384
917,637 UART: [kat] HMAC-384Kdf
922,445 UART: [kat] LMS
1,170,757 UART: [kat] --
1,171,456 UART: [cold-reset] ++
1,171,947 UART: [fht] FHT @ 0x50003400
1,174,733 UART: [idev] ++
1,174,901 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,687 UART: [idev] UDS.KEYID = 0
1,183,530 UART: [idev] Erasing UDS.KEYID = 0
1,200,237 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] CSR upload begun
1,210,377 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,082 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,226,795 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,232,700 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,238,405 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,949 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
Truncated 5079 bytes from beginning
EC0F9751FB8D973828A964CE98E611CBDBFF78276E5CB41
35,861,280 UART: [art] SIG.S = A469FC4C68A19D71A5941E556A7F1C96AD01BF22EAE4F29FFC2FFF0A2CDE2231FF203E23A0A1D8C31122E942B0A32BCA
37,166,914 UART: Caliptra RT
37,167,698 UART: [state] CFI Enabled
37,329,613 UART: [rt] RT listening for mailbox commands...
37,483,647 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,927,247 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,359,702 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [81, ad, a2, 20, 92, 7d, aa, a7, fb, 22, 35, 44, 21, 4b, b8, fd, b1, 11, db, 96, ae, a1, ef, a4, 06, e7, 71, 24, 87, bd, 8c, 1b, 91, c2, 8b, 38, 93, 1b, 56, 4f, 81, 03, 7b, fe, 64, c2, 0c, b2]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:c7:57:90:99:6c:a3:02:a1:e9:4c:6e:2f:f3:59:87:ce:51:c9:b2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=74C75790996CA302A1E94C6E2FF35987CE51C9B2DB47C038B55807EFE0F146BF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:ba:69:e0:c9:47:07:87:79:1a:8e:ea:1f:0b:
67:39:72:c7:1e:7c:28:ea:05:6a:b2:82:77:78:14:
27:c8:65:78:a7:f5:e6:a8:60:de:fd:9c:62:cd:82:
37:3a:2d:05:9e:2b:f2:bd:83:75:b8:6c:08:ed:74:
7c:94:62:50:68:c5:82:41:c8:5a:7f:89:f0:5b:93:
73:cb:09:35:98:5d:e7:4b:62:f4:99:a9:5a:ed:18:
92:ca:ba:cf:87:27:71
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0 .....}.D5"...K!........$q......8...OV...{.....d..RT_INFO
X509v3 Subject Key Identifier:
74:C7:57:90:99:6C:A3:02:A1:E9:4C:6E:2F:F3:59:87:CE:51:C9:B2
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:70:41:7c:c5:fa:39:c6:2e:69:93:8c:8a:f3:24:
0a:73:15:08:7f:c4:1a:e9:bf:3f:5e:c0:f9:75:1f:b8:d9:73:
82:8a:96:4c:e9:8e:61:1c:bd:bf:f7:82:76:e5:cb:41:02:31:
00:a4:69:fc:4c:68:a1:9d:71:a5:94:1e:55:6a:7f:1c:96:ad:
01:bf:22:ea:e4:f2:9f:fc:2f:ff:0a:2c:de:22:31:ff:20:3e:
23:a0:a1:d8:c3:11:22:e9:42:b0:a3:2b:ca
40,825,542 <<< Executing mbox cmd 0x46574c44 (111984 bytes) from SoC
40,968,105 UART:
40,968,511 UART: Running Caliptra ROM ...
40,969,559 UART:
40,969,717 UART: [state] CFI Enabled
41,044,436 UART: [state] LifecycleState = Production
41,046,263 UART: [state] DebugLocked = Yes
41,047,585 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,052,807 UART: [kat] SHA2-256
41,222,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,233,034 UART: [kat] ++
41,233,493 UART: [kat] sha1
41,243,348 UART: [kat] SHA2-256
41,246,037 UART: [kat] SHA2-384
41,251,323 UART: [kat] SHA2-512-ACC
41,253,720 UART: [kat] ECC-384
43,548,332 UART: [kat] HMAC-384Kdf
43,579,979 UART: [kat] LMS
44,770,330 UART: [kat] --
44,773,778 UART: [update-reset] ++
53,344,874 UART: [update-reset] Image verified using Vendor ECC Key Index 0
53,348,647 UART: [update-reset] Loading Runtime at address 0x40005000 len 87280
53,723,419 >>> mbox cmd response: success
53,724,136 UART: [update-reset] Copying MAN_2 To MAN_1
53,746,544 UART: [update-reset Success] --
53,748,725 UART: [state] Locking Datavault
53,751,987 UART: [state] Locking PCR0, PCR1 and PCR31
53,753,805 UART: [state] Locking ICCM
53,754,856 UART: [exit] Launching FMC @ 0x40000130
53,763,306 UART:
53,763,551 UART: Running Caliptra FMC ...
53,764,576 UART:
53,764,721 UART: [state] CFI Enabled
53,853,113 UART: [art] Extend RT PCRs Done
53,854,294 UART: [art] Lock RT PCRs Done
53,855,744 UART: [art] Populate DV Done
53,861,313 UART: [fht] FMC Alias Private Key: 7
53,863,060 UART: [art] Derive CDI
53,863,872 UART: [art] Store in in slot 0x4
53,922,310 UART: [art] Derive Key Pair
53,923,346 UART: [art] Store priv key in slot 0x5
57,216,611 UART: [art] Derive Key Pair - Done
57,229,347 UART: [art] Signing Cert with AUTHO
57,230,656 UART: RITY.KEYID = 7
59,517,853 UART: [art] Erasing AUTHORITY.KEYID = 7
59,519,357 UART: [art] PUB.X = 9614A6AF5B7D0E4F65EA63E32AC14F250A4854DAE1BD7826E0854C0DB674B35B086D029D6E9B654BFAFAD0467751193C
59,526,604 UART: [art] PUB.Y = 8D6570E9635C190DC971E459A8AF3AF9ADF4EA03A98AABFBDFD31356D6DCB53D24EAE067B7CCD7524C3887E2E9EE48B1
59,533,888 UART: [art] SIG.R = 1065DE59F5164ABE86C12D09627C8E02FD6B613A7C96FE4D3C04526FF22D824ACF898B81AAC48D75C4A17E9A36F50BC5
59,541,219 UART: [art] SIG.S = 76EDF871E58835BE7CC06B38DE37726F863F91570B47008E72C1A5D39C33EAD8850BC897258F487C6289DBEF8C1F6CB9
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:77:01:5a:f8:dc:1e:5c:eb:10:5d:02:c0:b0:b5:68:96:3c:85:cf
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1977015AF8DC1E5CEB105D02C0B0B568963C85CF2BE085388722F4BA2516C807
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:96:14:a6:af:5b:7d:0e:4f:65:ea:63:e3:2a:c1:
4f:25:0a:48:54:da:e1:bd:78:26:e0:85:4c:0d:b6:
74:b3:5b:08:6d:02:9d:6e:9b:65:4b:fa:fa:d0:46:
77:51:19:3c:8d:65:70:e9:63:5c:19:0d:c9:71:e4:
59:a8:af:3a:f9:ad:f4:ea:03:a9:8a:ab:fb:df:d3:
13:56:d6:dc:b5:3d:24:ea:e0:67:b7:cc:d7:52:4c:
38:87:e2:e9:ee:48:b1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.-^j#.......!..~..(./c..Y
......-....Y.p}..O"[....RT_INFO
X509v3 Subject Key Identifier:
19:77:01:5A:F8:DC:1E:5C:EB:10:5D:02:C0:B0:B5:68:96:3C:85:CF
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:10:65:de:59:f5:16:4a:be:86:c1:2d:09:62:7c:
8e:02:fd:6b:61:3a:7c:96:fe:4d:3c:04:52:6f:f2:2d:82:4a:
cf:89:8b:81:aa:c4:8d:75:c4:a1:7e:9a:36:f5:0b:c5:02:30:
76:ed:f8:71:e5:88:35:be:7c:c0:6b:38:de:37:72:6f:86:3f:
91:57:0b:47:00:8e:72:c1:a5:d3:9c:33:ea:d8:85:0b:c8:97:
25:8f:48:7c:62:89:db:ef:8c:1f:6c:b9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.19s
Truncated 562 bytes from beginning
ady_for_fw is high
3,805,294 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,209,491 >>> mbox cmd response: success
27,909,946 UART:
27,910,356 UART: Running Caliptra FMC ...
27,911,480 UART:
27,911,641 UART: [state] CFI Enabled
27,982,029 UART: [fht] FMC Alias Private Key: 7
30,320,543 UART: [art] Extend RT PCRs Done
30,321,768 UART: [art] Lock RT PCRs Done
30,323,691 UART: [art] Populate DV Done
30,329,326 UART: [fht] FMC Alias Private Key: 7
30,330,974 UART: [art] Derive CDI
30,331,706 UART: [art] Store in in slot 0x4
30,391,309 UART: [art] Derive Key Pair
30,392,305 UART: [art] Store priv key in slot 0x5
33,685,087 UART: [art] Derive Key Pair - Done
33,698,040 UART: [art] Signing Cert with AUTHO
33,699,354 UART: RITY.KEYID = 7
35,987,368 UART: [art] Erasing AUTHORITY.KEYID = 7
35,988,880 UART: [art] PUB.X = F3D730327AAB3B06E599CC059AADBCC56A2F1C9F31287B5FF9539A86E421D3936DD4E82B00D5152B75D894257954E8E1
35,996,130 UART: [art] PUB.Y = 442E580DAC14CECD3A717A1A739DE3815FA1E7467427941A09D15406DB07C4572D36EAD97FDA1BDE975D0F2C2AE7829D
36,003,385 UART: [art] SIG.R = FB2AEAA2867CDD0938D47BA0E29EC4F1ABB5E75901CB20AED517533E26DD3DA344730FC8F84DBF72C44B0BB6F0705CBC
36,010,811 UART: [art] SIG.S = 0D39220DCCD300DC0B2DA6ACE6ADABFA964477C4ED3597E90C4E70B559DC05526F64A847BF30C959BA1AF32B0F207372
37,316,055 UART: Caliptra RT
37,316,775 UART: [state] CFI Enabled
37,478,744 UART: [rt] RT listening for mailbox commands...
37,509,731 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,955,046 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,389,891 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [81, ad, a2, 20, 92, 7d, aa, a7, fb, 22, 35, 44, 21, 4b, b8, fd, b1, 11, db, 96, ae, a1, ef, a4, 06, e7, 71, 24, 87, bd, 8c, 1b, 91, c2, 8b, 38, 93, 1b, 56, 4f, 81, 03, 7b, fe, 64, c2, 0c, b2]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:54:82:c9:ee:66:ce:8e:97:d9:19:f2:b9:b1:a4:88:42:78:2e:65
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2E5482C9EE66CE8E97D919F2B9B1A48842782E65B177C6C01CE202A4E404BF06
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f3:d7:30:32:7a:ab:3b:06:e5:99:cc:05:9a:ad:
bc:c5:6a:2f:1c:9f:31:28:7b:5f:f9:53:9a:86:e4:
21:d3:93:6d:d4:e8:2b:00:d5:15:2b:75:d8:94:25:
79:54:e8:e1:44:2e:58:0d:ac:14:ce:cd:3a:71:7a:
1a:73:9d:e3:81:5f:a1:e7:46:74:27:94:1a:09:d1:
54:06:db:07:c4:57:2d:36:ea:d9:7f:da:1b:de:97:
5d:0f:2c:2a:e7:82:9d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0 .....}.D5"...K!........$q......8...OV...{.....d..RT_INFO
X509v3 Subject Key Identifier:
2E:54:82:C9:EE:66:CE:8E:97:D9:19:F2:B9:B1:A4:88:42:78:2E:65
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:fb:2a:ea:a2:86:7c:dd:09:38:d4:7b:a0:e2:
9e:c4:f1:ab:b5:e7:59:01:cb:20:ae:d5:17:53:3e:26:dd:3d:
a3:44:73:0f:c8:f8:4d:bf:72:c4:4b:0b:b6:f0:70:5c:bc:02:
30:0d:39:22:0d:cc:d3:00:dc:0b:2d:a6:ac:e6:ad:ab:fa:96:
44:77:c4:ed:35:97:e9:0c:4e:70:b5:59:dc:05:52:6f:64:a8:
47:bf:30:c9:59:ba:1a:f3:2b:0f:20:73:72
40,857,210 <<< Executing mbox cmd 0x46574c44 (111984 bytes) from SoC
53,752,591 >>> mbox cmd response: success
53,785,932 UART:
53,786,290 UART: Running Caliptra FMC ...
53,787,516 UART:
53,787,688 UART: [state] CFI Enabled
53,874,654 UART: [art] Extend RT PCRs Done
53,875,849 UART: [art] Lock RT PCRs Done
53,877,331 UART: [art] Populate DV Done
53,882,846 UART: [fht] FMC Alias Private Key: 7
53,884,490 UART: [art] Derive CDI
53,885,300 UART: [art] Store in in slot 0x4
53,943,957 UART: [art] Derive Key Pair
53,944,992 UART: [art] Store priv key in slot 0x5
57,238,076 UART: [art] Derive Key Pair - Done
57,250,818 UART: [art] Signing Cert with AUTHO
57,252,125 UART: RITY.KEYID = 7
59,539,392 UART: [art] Erasing AUTHORITY.KEYID = 7
59,540,898 UART: [art] PUB.X = 1EDAB34861A9B70B68834F94D9FE03F52F1A2EEECED3DA649E6453C30D8E7846F43382CA8E2FD1F023326EAB58F4B0C2
59,548,147 UART: [art] PUB.Y = 9B69B1EC30A0C0BA60C05564C231F29E47D3E2463429DE38CA882305F152C9D4D1973F6A7680AE5F53A12B7483588229
59,555,386 UART: [art] SIG.R = 76D6FFCEDAD2968EBC7D1650A6CE61F5D51E32F3E6198AA278EB371554350498838EACC2999EFA2B81AA778E935CCE96
59,562,773 UART: [art] SIG.S = A6BC1EC794A1F8E537319CDFBB59380B9F2EEF4358DA4D1D9E781018E84B0C78B09D920739C2C8A09FCC9A2EDD039871
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4c:e7:db:e3:c3:7a:39:8c:75:56:ea:5e:ee:c8:a5:89:81:8a:6e:e9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CCE7DBE3C37A398C7556EA5EEEC8A589818A6EE945A2F77DAFD07B3610DD55A4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1e:da:b3:48:61:a9:b7:0b:68:83:4f:94:d9:fe:
03:f5:2f:1a:2e:ee:ce:d3:da:64:9e:64:53:c3:0d:
8e:78:46:f4:33:82:ca:8e:2f:d1:f0:23:32:6e:ab:
58:f4:b0:c2:9b:69:b1:ec:30:a0:c0:ba:60:c0:55:
64:c2:31:f2:9e:47:d3:e2:46:34:29:de:38:ca:88:
23:05:f1:52:c9:d4:d1:97:3f:6a:76:80:ae:5f:53:
a1:2b:74:83:58:82:29
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.-^j#.......!..~..(./c..Y
......-....Y.p}..O"[....RT_INFO
X509v3 Subject Key Identifier:
CC:E7:DB:E3:C3:7A:39:8C:75:56:EA:5E:EE:C8:A5:89:81:8A:6E:E9
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:76:d6:ff:ce:da:d2:96:8e:bc:7d:16:50:a6:ce:
61:f5:d5:1e:32:f3:e6:19:8a:a2:78:eb:37:15:54:35:04:98:
83:8e:ac:c2:99:9e:fa:2b:81:aa:77:8e:93:5c:ce:96:02:31:
00:a6:bc:1e:c7:94:a1:f8:e5:37:31:9c:df:bb:59:38:0b:9f:
2e:ef:43:58:da:4d:1d:9e:78:10:18:e8:4b:0c:78:b0:9d:92:
07:39:c2:c8:a0:9f:cc:9a:2e:dd:03:98:71
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.19s
Truncated 5082 bytes from beginning
CFC54265E03BC62B894A8B18FF3EF1F947F419D21DCB
36,424,200 UART: [art] SIG.S = CFEA09D79D8EB8F20398ABF7668A9180DBE2FFA3185B14D625D9C604481857312E85A93F5775C0A677775AB1A071EDFB
37,730,029 UART: Caliptra RT
37,730,758 UART: [state] CFI Enabled
37,848,953 UART: [rt] RT listening for mailbox commands...
38,002,437 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,448,062 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,881,902 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [81, ad, a2, 20, 92, 7d, aa, a7, fb, 22, 35, 44, 21, 4b, b8, fd, b1, 11, db, 96, ae, a1, ef, a4, 06, e7, 71, 24, 87, bd, 8c, 1b, 91, c2, 8b, 38, 93, 1b, 56, 4f, 81, 03, 7b, fe, 64, c2, 0c, b2]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:18:ee:bd:e4:78:34:73:53:8a:95:9f:7e:64:e4:7a:65:5b:fa:79
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9C18EEBDE4783473538A959F7E64E47A655BFA79B6DAEA7D227D1C71639C5817
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f7:c1:c8:ed:d6:6a:c5:a9:f0:4b:d6:e5:b8:66:
64:a9:77:4f:da:67:50:64:e9:43:1e:ae:05:57:5b:
83:d8:ab:8d:51:e5:69:d5:74:90:ee:3d:1a:e9:b6:
78:7c:00:91:2a:60:9d:05:78:0d:a9:9e:a9:fc:01:
91:e0:6c:3b:a8:aa:fd:3e:1d:1f:51:da:3b:ca:8f:
3d:ae:1e:7d:e0:07:d8:6d:92:f3:aa:a4:f0:3c:45:
fa:9c:05:4c:27:c8:3b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0 .....}.D5"...K!........$q......8...OV...{.....d..RT_INFO
X509v3 Subject Key Identifier:
9C:18:EE:BD:E4:78:34:73:53:8A:95:9F:7E:64:E4:7A:65:5B:FA:79
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6f:64:ff:29:d5:92:fc:f9:a7:26:95:4b:ec:ac:
ba:27:8b:35:07:ce:75:04:4c:7b:c6:10:cf:c5:42:65:e0:3b:
c6:2b:89:4a:8b:18:ff:3e:f1:f9:47:f4:19:d2:1d:cb:02:31:
00:cf:ea:09:d7:9d:8e:b8:f2:03:98:ab:f7:66:8a:91:80:db:
e2:ff:a3:18:5b:14:d6:25:d9:c6:04:48:18:57:31:2e:85:a9:
3f:57:75:c0:a6:77:77:5a:b1:a0:71:ed:fb
41,339,818 <<< Executing mbox cmd 0x46574c44 (111984 bytes) from SoC
41,482,158 UART:
41,482,591 UART: Running Caliptra ROM ...
41,483,637 UART:
41,483,798 UART: [state] CFI Enabled
41,498,382 UART: [state] LifecycleState = Production
41,500,169 UART: [state] DebugLocked = Yes
41,503,206 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,507,984 UART: [kat] SHA2-256
41,677,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,688,281 UART: [kat] ++
41,688,818 UART: [kat] sha1
41,699,920 UART: [kat] SHA2-256
41,702,605 UART: [kat] SHA2-384
41,707,611 UART: [kat] SHA2-512-ACC
41,709,995 UART: [kat] ECC-384
43,995,976 UART: [kat] HMAC-384Kdf
44,007,888 UART: [kat] LMS
45,198,015 UART: [kat] --
45,203,528 UART: [update-reset] ++
54,326,240 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,330,684 UART: [update-reset] Loading Runtime at address 0x40005000 len 87280
54,705,459 >>> mbox cmd response: success
54,706,099 UART: [update-reset] Copying MAN_2 To MAN_1
54,728,515 UART: [update-reset Success] --
54,733,236 UART: [state] Locking Datavault
54,735,618 UART: [state] Locking PCR0, PCR1 and PCR31
54,737,369 UART: [state] Locking ICCM
54,738,614 UART: [exit] Launching FMC @ 0x40000130
54,747,017 UART:
54,747,297 UART: Running Caliptra FMC ...
54,748,401 UART:
54,748,598 UART: [state] CFI Enabled
54,792,989 UART: [art] Extend RT PCRs Done
54,794,129 UART: [art] Lock RT PCRs Done
54,795,522 UART: [art] Populate DV Done
54,801,298 UART: [fht] FMC Alias Private Key: 7
54,802,990 UART: [art] Derive CDI
54,803,805 UART: [art] Store in in slot 0x4
54,846,234 UART: [art] Derive Key Pair
54,847,272 UART: [art] Store priv key in slot 0x5
58,089,456 UART: [art] Derive Key Pair - Done
58,102,617 UART: [art] Signing Cert with AUTHO
58,103,920 UART: RITY.KEYID = 7
60,383,834 UART: [art] Erasing AUTHORITY.KEYID = 7
60,385,343 UART: [art] PUB.X = AFDA58067F023BD99E6F9672B17B98B29D4B45A05F4897BCDD48DF04690D84AC79DB319F8C36A95BDFFDE073CA49779E
60,392,581 UART: [art] PUB.Y = 1F02DBF991D945937F7EEF7C58F87E5789A284C8FA549B2584A2AB35F85FB09592CC30BB90E099D2CF2537D88352802F
60,399,806 UART: [art] SIG.R = 0E1BBB121421B6B59F06B63FBB9589AC5B9C737E095E1A88A24DC24ED1A40F80C4A65D5BC2EBA38EA100E4C27E25FFA7
60,407,218 UART: [art] SIG.S = C7AF185E561E6633A59F96D0BB860EC4B10CB86EB3B00B163246402F1984457A9001F980F45BFBC86AACF08FAB14650A
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:d2:db:c0:88:2a:15:84:23:71:c6:6c:66:11:2a:dc:68:77:01:4b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=00D2DBC0882A15842371C66C66112ADC6877014BD59470F0CB69B85E733243A5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:af:da:58:06:7f:02:3b:d9:9e:6f:96:72:b1:7b:
98:b2:9d:4b:45:a0:5f:48:97:bc:dd:48:df:04:69:
0d:84:ac:79:db:31:9f:8c:36:a9:5b:df:fd:e0:73:
ca:49:77:9e:1f:02:db:f9:91:d9:45:93:7f:7e:ef:
7c:58:f8:7e:57:89:a2:84:c8:fa:54:9b:25:84:a2:
ab:35:f8:5f:b0:95:92:cc:30:bb:90:e0:99:d2:cf:
25:37:d8:83:52:80:2f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.-^j#.......!..~..(./c..Y
......-....Y.p}..O"[....RT_INFO
X509v3 Subject Key Identifier:
00:D2:DB:C0:88:2A:15:84:23:71:C6:6C:66:11:2A:DC:68:77:01:4B
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0e:1b:bb:12:14:21:b6:b5:9f:06:b6:3f:bb:95:
89:ac:5b:9c:73:7e:09:5e:1a:88:a2:4d:c2:4e:d1:a4:0f:80:
c4:a6:5d:5b:c2:eb:a3:8e:a1:00:e4:c2:7e:25:ff:a7:02:31:
00:c7:af:18:5e:56:1e:66:33:a5:9f:96:d0:bb:86:0e:c4:b1:
0c:b8:6e:b3:b0:0b:16:32:46:40:2f:19:84:45:7a:90:01:f9:
80:f4:5b:fb:c8:6a:ac:f0:8f:ab:14:65:0a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.23s
Truncated 559 bytes from beginning
ready_for_fw is high
4,129,952 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,273,231 >>> mbox cmd response: success
27,913,058 UART:
27,913,461 UART: Running Caliptra FMC ...
27,914,609 UART:
27,914,767 UART: [state] CFI Enabled
27,922,809 UART: [fht] FMC Alias Private Key: 7
30,253,286 UART: [art] Extend RT PCRs Done
30,254,512 UART: [art] Lock RT PCRs Done
30,256,490 UART: [art] Populate DV Done
30,262,168 UART: [fht] FMC Alias Private Key: 7
30,263,812 UART: [art] Derive CDI
30,264,623 UART: [art] Store in in slot 0x4
30,307,105 UART: [art] Derive Key Pair
30,308,115 UART: [art] Store priv key in slot 0x5
33,549,962 UART: [art] Derive Key Pair - Done
33,562,791 UART: [art] Signing Cert with AUTHO
33,564,103 UART: RITY.KEYID = 7
35,843,301 UART: [art] Erasing AUTHORITY.KEYID = 7
35,844,799 UART: [art] PUB.X = ECFBF1BCE46B04799E42B8F5D3DC22FC3206FBF155E6503EA1DC99EEA3F19C7CC7FAA7487A58B46617C08866D1B2AA5E
35,852,108 UART: [art] PUB.Y = 1E55D4DE8A8A36F98E033DA69A5877E8FB90CF0991ED1BCD4250BD519E1482EDD2AA00CCEF0C96C142CB7EB0968301A6
35,859,376 UART: [art] SIG.R = 8C2837C5A187C69E762DBF60423D9F4F119E6A05FC6E0967B0885B3FA034F3B88A945FAED1FD79C5E28C168C3A43BA27
35,866,770 UART: [art] SIG.S = 3779AF9B4751A3D328DAECF58C2BDBDD5862BBC10A4C70C88FD480259BE598A406DADBB10AD916BD1518AA83DEEC33DB
37,171,870 UART: Caliptra RT
37,172,576 UART: [state] CFI Enabled
37,290,685 UART: [rt] RT listening for mailbox commands...
37,321,985 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,767,518 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,202,688 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [81, ad, a2, 20, 92, 7d, aa, a7, fb, 22, 35, 44, 21, 4b, b8, fd, b1, 11, db, 96, ae, a1, ef, a4, 06, e7, 71, 24, 87, bd, 8c, 1b, 91, c2, 8b, 38, 93, 1b, 56, 4f, 81, 03, 7b, fe, 64, c2, 0c, b2]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:bb:5d:48:9c:02:6b:51:28:d2:3f:b6:46:d8:d1:ae:65:27:b6:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=74BB5D489C026B5128D23FB646D8D1AE6527B6128DE545080FE182D22854F0A2
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ec:fb:f1:bc:e4:6b:04:79:9e:42:b8:f5:d3:dc:
22:fc:32:06:fb:f1:55:e6:50:3e:a1:dc:99:ee:a3:
f1:9c:7c:c7:fa:a7:48:7a:58:b4:66:17:c0:88:66:
d1:b2:aa:5e:1e:55:d4:de:8a:8a:36:f9:8e:03:3d:
a6:9a:58:77:e8:fb:90:cf:09:91:ed:1b:cd:42:50:
bd:51:9e:14:82:ed:d2:aa:00:cc:ef:0c:96:c1:42:
cb:7e:b0:96:83:01:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0 .....}.D5"...K!........$q......8...OV...{.....d..RT_INFO
X509v3 Subject Key Identifier:
74:BB:5D:48:9C:02:6B:51:28:D2:3F:B6:46:D8:D1:AE:65:27:B6:12
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:8c:28:37:c5:a1:87:c6:9e:76:2d:bf:60:42:
3d:9f:4f:11:9e:6a:05:fc:6e:09:67:b0:88:5b:3f:a0:34:f3:
b8:8a:94:5f:ae:d1:fd:79:c5:e2:8c:16:8c:3a:43:ba:27:02:
30:37:79:af:9b:47:51:a3:d3:28:da:ec:f5:8c:2b:db:dd:58:
62:bb:c1:0a:4c:70:c8:8f:d4:80:25:9b:e5:98:a4:06:da:db:
b1:0a:d9:16:bd:15:18:aa:83:de:ec:33:db
40,661,291 <<< Executing mbox cmd 0x46574c44 (111984 bytes) from SoC
53,557,864 >>> mbox cmd response: success
53,591,597 UART:
53,591,920 UART: Running Caliptra FMC ...
53,593,148 UART:
53,593,319 UART: [state] CFI Enabled
53,637,198 UART: [art] Extend RT PCRs Done
53,638,393 UART: [art] Lock RT PCRs Done
53,639,716 UART: [art] Populate DV Done
53,645,180 UART: [fht] FMC Alias Private Key: 7
53,646,712 UART: [art] Derive CDI
53,647,444 UART: [art] Store in in slot 0x4
53,690,198 UART: [art] Derive Key Pair
53,691,243 UART: [art] Store priv key in slot 0x5
56,933,359 UART: [art] Derive Key Pair - Done
56,946,358 UART: [art] Signing Cert with AUTHO
56,947,669 UART: RITY.KEYID = 7
59,226,917 UART: [art] Erasing AUTHORITY.KEYID = 7
59,228,437 UART: [art] PUB.X = 88199645CD35A7566B22370D87BF054F97030CF195471B577E6AF01B9E3972801F1FBEE182D010CE5ADD09A02B444EE9
59,235,695 UART: [art] PUB.Y = 3E0597B2F23CE7C95C0EFF910F65FE7596A54EB94C76910793D7C64DA4A03F89D6B6BF1B8617D5BEB55488BCC7BAABE4
59,242,942 UART: [art] SIG.R = 75D79AD9D16D7E5FA8FD41797D6992D1377325D03CB49CD1440DD30F3B43A1B9FC6EFB6552D3BBF6D6628B0D14AA62D4
59,250,334 UART: [art] SIG.S = 4006D804B63A726874EA716BC576F66AF557775476E56399D16B2FCD026D98EFA10D671D76A2B02EDA898E032FC3AE1F
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
65:8f:44:17:af:20:7e:63:13:d0:a8:9f:08:f7:bc:3b:c8:85:83:2f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=658F4417AF207E6313D0A89F08F7BC3BC885832F8072A8A15B6DE69C18707168
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:88:19:96:45:cd:35:a7:56:6b:22:37:0d:87:bf:
05:4f:97:03:0c:f1:95:47:1b:57:7e:6a:f0:1b:9e:
39:72:80:1f:1f:be:e1:82:d0:10:ce:5a:dd:09:a0:
2b:44:4e:e9:3e:05:97:b2:f2:3c:e7:c9:5c:0e:ff:
91:0f:65:fe:75:96:a5:4e:b9:4c:76:91:07:93:d7:
c6:4d:a4:a0:3f:89:d6:b6:bf:1b:86:17:d5:be:b5:
54:88:bc:c7:ba:ab:e4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.-^j#.......!..~..(./c..Y
......-....Y.p}..O"[....RT_INFO
X509v3 Subject Key Identifier:
65:8F:44:17:AF:20:7E:63:13:D0:A8:9F:08:F7:BC:3B:C8:85:83:2F
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:75:d7:9a:d9:d1:6d:7e:5f:a8:fd:41:79:7d:69:
92:d1:37:73:25:d0:3c:b4:9c:d1:44:0d:d3:0f:3b:43:a1:b9:
fc:6e:fb:65:52:d3:bb:f6:d6:62:8b:0d:14:aa:62:d4:02:30:
40:06:d8:04:b6:3a:72:68:74:ea:71:6b:c5:76:f6:6a:f5:57:
77:54:76:e5:63:99:d1:6b:2f:cd:02:6d:98:ef:a1:0d:67:1d:
76:a2:b0:2e:da:89:8e:03:2f:c3:ae:1f
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.18s
Truncated 4977 bytes from beginning
33E3F02EF97FD3B88714650D2068EC220C068F2DB7B3940BDE0C2EF4C08D9DFF390B4616CEFB9F60C31EEC42847FA
25,928,851 UART: [art] SIG.S = 59584AE9394DE1694C7C6C7861F8558DCED15528A82D501219C698B7D5A5D874F40379AF6B9B81A0DDFF0F481922096B
26,907,876 UART: Caliptra RT
26,908,649 UART: [state] CFI Enabled
27,072,424 UART: [rt] RT listening for mailbox commands...
27,223,830 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,669,624 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,105,450 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3c:90:61:be:35:6b:51:69:28:03:ad:84:eb:80:ff:1b:52:d7:06:53
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3C9061BE356B51692803AD84EB80FF1B52D706532643085A587FAD272AF9E2BB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3a:1d:ca:7a:dc:e3:44:ec:f0:bf:30:fc:ff:7e:
9f:8a:55:66:85:9f:91:ae:f2:73:5c:31:b8:5f:e7:
69:c0:9b:38:88:09:b3:c0:cd:83:a5:f4:f4:90:67:
0a:e2:c9:61:c1:87:47:f4:6b:68:75:17:38:c7:0d:
6c:24:fe:0c:89:d6:ba:41:91:e1:40:43:df:e9:11:
2f:f2:0c:be:a6:e7:98:d5:bc:fb:e8:0f:90:6f:47:
ed:f9:66:39:c9:e2:53
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
3C:90:61:BE:35:6B:51:69:28:03:AD:84:EB:80:FF:1B:52:D7:06:53
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:02:53:3e:3f:02:ef:97:fd:3b:88:71:46:50:d2:
06:8e:c2:20:c0:68:f2:db:7b:39:40:bd:e0:c2:ef:4c:08:d9:
df:f3:90:b4:61:6c:ef:b9:f6:0c:31:ee:c4:28:47:fa:02:30:
59:58:4a:e9:39:4d:e1:69:4c:7c:6c:78:61:f8:55:8d:ce:d1:
55:28:a8:2d:50:12:19:c6:98:b7:d5:a5:d8:74:f4:03:79:af:
6b:9b:81:a0:dd:ff:0f:48:19:22:09:6b
30,564,759 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
30,707,663 UART:
30,708,052 UART: Running Caliptra ROM ...
30,709,201 UART:
30,709,368 UART: [state] CFI Enabled
30,770,101 UART: [state] LifecycleState = Production
30,771,905 UART: [state] DebugLocked = Yes
30,773,170 UART: [state] Starting the WD Timer 40000000 cycles
30,778,287 UART: [kat] SHA2-256
30,957,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,969,017 UART: [kat] ++
30,969,560 UART: [kat] sha1
30,980,503 UART: [kat] SHA2-256
30,983,576 UART: [kat] SHA2-384
30,989,552 UART: [kat] SHA2-512-ACC
30,992,502 UART: [kat] ECC-384
33,453,112 UART: [kat] HMAC-384Kdf
33,475,945 UART: [kat] LMS
34,005,420 UART: [kat] --
34,009,977 UART: [update-reset] ++
38,614,260 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,618,154 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
38,993,944 >>> mbox cmd response: success
38,995,243 UART: [update-reset] Copying MAN_2 To MAN_1
39,017,588 UART: [update-reset Success] --
39,021,984 UART: [state] Locking Datavault
39,025,284 UART: [state] Locking PCR0, PCR1 and PCR31
39,026,930 UART: [state] Locking ICCM
39,028,784 UART: [exit] Launching FMC @ 0x40000130
39,037,230 UART:
39,037,470 UART: Running Caliptra FMC ...
39,038,497 UART:
39,038,645 UART: [state] CFI Enabled
39,137,274 UART: [art] Extend RT PCRs Done
39,138,463 UART: [art] Lock RT PCRs Done
39,140,055 UART: [art] Populate DV Done
39,145,468 UART: [fht] FMC Alias Private Key: 7
39,147,153 UART: [art] Derive CDI
39,147,910 UART: [art] Store in in slot 0x4
39,206,548 UART: [art] Derive Key Pair
39,207,546 UART: [art] Store priv key in slot 0x5
41,670,047 UART: [art] Derive Key Pair - Done
41,683,044 UART: [art] Signing Cert with AUTHO
41,684,353 UART: RITY.KEYID = 7
43,395,844 UART: [art] Erasing AUTHORITY.KEYID = 7
43,397,354 UART: [art] PUB.X = 8D077BDD035F9093942FB904A9BCD75BE775354BA2BC89DD5468400D7EF17845C054718C9DAE007DF54DEC855DAA3747
43,404,616 UART: [art] PUB.Y = 9A967AA26DCB337F0CCB3CD7F488801F687FB5311C794D03E745BC27408CAA8752A843C87F5F42EE714AF2005AB00CE4
43,411,844 UART: [art] SIG.R = A8D7D0D0DE28C41476B6F8698B9E624436E7A61A1E73D250C3DE10C138F6B038CC89D14174CECD4EADDF2D5D131A3734
43,419,235 UART: [art] SIG.S = B0520E519285AAD5AF5B5FAA7F88F75E00CA5C480400D32D00A2B7E8D0F2027DCBB9B6838806D8EBF48A6B0152F5E948
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:53:d3:d3:d1:ad:de:0c:55:40:c4:fa:99:e6:00:f3:e9:97:7f:e0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8F53D3D3D1ADDE0C5540C4FA99E600F3E9977FE084B0EB2C95F9AF0EA984539C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8d:07:7b:dd:03:5f:90:93:94:2f:b9:04:a9:bc:
d7:5b:e7:75:35:4b:a2:bc:89:dd:54:68:40:0d:7e:
f1:78:45:c0:54:71:8c:9d:ae:00:7d:f5:4d:ec:85:
5d:aa:37:47:9a:96:7a:a2:6d:cb:33:7f:0c:cb:3c:
d7:f4:88:80:1f:68:7f:b5:31:1c:79:4d:03:e7:45:
bc:27:40:8c:aa:87:52:a8:43:c8:7f:5f:42:ee:71:
4a:f2:00:5a:b0:0c:e4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
8F:53:D3:D3:D1:AD:DE:0C:55:40:C4:FA:99:E6:00:F3:E9:97:7F:E0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a8:d7:d0:d0:de:28:c4:14:76:b6:f8:69:8b:
9e:62:44:36:e7:a6:1a:1e:73:d2:50:c3:de:10:c1:38:f6:b0:
38:cc:89:d1:41:74:ce:cd:4e:ad:df:2d:5d:13:1a:37:34:02:
31:00:b0:52:0e:51:92:85:aa:d5:af:5b:5f:aa:7f:88:f7:5e:
00:ca:5c:48:04:00:d3:2d:00:a2:b7:e8:d0:f2:02:7d:cb:b9:
b6:83:88:06:d8:eb:f4:8a:6b:01:52:f5:e9:48
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.37s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,379,835 ready_for_fw is high
3,380,270 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,080,422 >>> mbox cmd response: success
19,371,476 UART:
19,371,876 UART: Running Caliptra FMC ...
19,372,995 UART:
19,373,149 UART: [state] CFI Enabled
19,436,645 UART: [fht] FMC Alias Private Key: 7
21,200,618 UART: [art] Extend RT PCRs Done
21,201,844 UART: [art] Lock RT PCRs Done
21,203,553 UART: [art] Populate DV Done
21,209,255 UART: [fht] FMC Alias Private Key: 7
21,210,797 UART: [art] Derive CDI
21,211,619 UART: [art] Store in in slot 0x4
21,269,436 UART: [art] Derive Key Pair
21,270,475 UART: [art] Store priv key in slot 0x5
23,733,437 UART: [art] Derive Key Pair - Done
23,746,550 UART: [art] Signing Cert with AUTHO
23,747,887 UART: RITY.KEYID = 7
25,459,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,461,496 UART: [art] PUB.X = 83C861DA82208BA3B29B64109DFB7E3CAF50036A4BE53D38B9732F8E323318C9A1379EFBF690F7E7051F0C15174E6B17
25,468,751 UART: [art] PUB.Y = 59DC258E6261D570E4A006104C407A44370F88DB72D6E7286C3BE695A76CB2900F2329F20C2A75242E37779162F42FE0
25,475,969 UART: [art] SIG.R = AA6E4B2B26449DEF260B38DBFBCB3FA4BC7F9BFA0D9C2F65E4C13E1EDFF9823F19546981B48DFBD477186CC35E87482F
25,483,438 UART: [art] SIG.S = F2D465B17B7F9562A666EB165207FC778B1A73F85269B03CB0CC54A91064CE4752BEE443EF83A6416CB505A8ABAA0E7B
26,462,589 UART: Caliptra RT
26,463,309 UART: [state] CFI Enabled
26,627,807 UART: [rt] RT listening for mailbox commands...
26,659,169 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,104,278 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,538,717 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:21:7b:1b:d6:4e:3e:ad:0c:16:3f:36:41:6b:5a:1b:ae:db:ef:42
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=62217B1BD64E3EAD0C163F36416B5A1BAEDBEF42EC7FA630CAA2815BB4DCD22F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:83:c8:61:da:82:20:8b:a3:b2:9b:64:10:9d:fb:
7e:3c:af:50:03:6a:4b:e5:3d:38:b9:73:2f:8e:32:
33:18:c9:a1:37:9e:fb:f6:90:f7:e7:05:1f:0c:15:
17:4e:6b:17:59:dc:25:8e:62:61:d5:70:e4:a0:06:
10:4c:40:7a:44:37:0f:88:db:72:d6:e7:28:6c:3b:
e6:95:a7:6c:b2:90:0f:23:29:f2:0c:2a:75:24:2e:
37:77:91:62:f4:2f:e0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
62:21:7B:1B:D6:4E:3E:AD:0C:16:3F:36:41:6B:5A:1B:AE:DB:EF:42
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:aa:6e:4b:2b:26:44:9d:ef:26:0b:38:db:fb:
cb:3f:a4:bc:7f:9b:fa:0d:9c:2f:65:e4:c1:3e:1e:df:f9:82:
3f:19:54:69:81:b4:8d:fb:d4:77:18:6c:c3:5e:87:48:2f:02:
31:00:f2:d4:65:b1:7b:7f:95:62:a6:66:eb:16:52:07:fc:77:
8b:1a:73:f8:52:69:b0:3c:b0:cc:54:a9:10:64:ce:47:52:be:
e4:43:ef:83:a6:41:6c:b5:05:a8:ab:aa:0e:7b
30,000,615 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
38,105,141 >>> mbox cmd response: success
38,140,515 UART:
38,140,845 UART: Running Caliptra FMC ...
38,142,076 UART:
38,142,253 UART: [state] CFI Enabled
38,243,534 UART: [art] Extend RT PCRs Done
38,244,758 UART: [art] Lock RT PCRs Done
38,246,208 UART: [art] Populate DV Done
38,251,839 UART: [fht] FMC Alias Private Key: 7
38,253,487 UART: [art] Derive CDI
38,254,297 UART: [art] Store in in slot 0x4
38,313,186 UART: [art] Derive Key Pair
38,314,233 UART: [art] Store priv key in slot 0x5
40,776,999 UART: [art] Derive Key Pair - Done
40,790,109 UART: [art] Signing Cert with AUTHO
40,791,450 UART: RITY.KEYID = 7
42,502,574 UART: [art] Erasing AUTHORITY.KEYID = 7
42,504,084 UART: [art] PUB.X = 66362A32EAA473E3D57297892E52287583ADB8FBEC2432260E9C8702CD9224876AE29F0694B8CDBF9458958B5A99652A
42,511,339 UART: [art] PUB.Y = 239D7850DE3005489088204C3616B0C172B3AF99D74F74217D07BBC7DAB7FCA1BC043E0E4C088CA1F2B62B1DB6CB70A2
42,518,625 UART: [art] SIG.R = 2C517743302B35BC5B0C2186377B4930FEB650DA8747E11A94AF526D37E74091A56F9603F47387185F19735AEAA71C46
42,525,966 UART: [art] SIG.S = 10D3299EFDBFBD7D8D77FC171663DB025F7A33858EBDE1D7F3EB4E8666391587A6C3E1BF95FD327A292439349AEEE782
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:a3:ea:b4:a4:e3:d3:56:78:04:cf:b6:ab:d5:65:bc:90:ee:5b:f7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=11A3EAB4A4E3D3567804CFB6ABD565BC90EE5BF76E1E57E809FA008AAE699FA9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:66:36:2a:32:ea:a4:73:e3:d5:72:97:89:2e:52:
28:75:83:ad:b8:fb:ec:24:32:26:0e:9c:87:02:cd:
92:24:87:6a:e2:9f:06:94:b8:cd:bf:94:58:95:8b:
5a:99:65:2a:23:9d:78:50:de:30:05:48:90:88:20:
4c:36:16:b0:c1:72:b3:af:99:d7:4f:74:21:7d:07:
bb:c7:da:b7:fc:a1:bc:04:3e:0e:4c:08:8c:a1:f2:
b6:2b:1d:b6:cb:70:a2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
11:A3:EA:B4:A4:E3:D3:56:78:04:CF:B6:AB:D5:65:BC:90:EE:5B:F7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:2c:51:77:43:30:2b:35:bc:5b:0c:21:86:37:7b:
49:30:fe:b6:50:da:87:47:e1:1a:94:af:52:6d:37:e7:40:91:
a5:6f:96:03:f4:73:87:18:5f:19:73:5a:ea:a7:1c:46:02:30:
10:d3:29:9e:fd:bf:bd:7d:8d:77:fc:17:16:63:db:02:5f:7a:
33:85:8e:bd:e1:d7:f3:eb:4e:86:66:39:15:87:a6:c3:e1:bf:
95:fd:32:7a:29:24:39:34:9a:ee:e7:82
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
Truncated 4977 bytes from beginning
11D86C6CDFCEBFBF200E0855428D59B6A6C9703D6C0697CBFD60653381C36E3DCD2F781F24152F55B2E4E692814C9
25,984,043 UART: [art] SIG.S = B83BE2AFF90CD1938193B88AC858C1B68C013872AF531D715CFAF87BD1010C0B6C12A849BE5A932D3EE168AAE00E1309
26,962,477 UART: Caliptra RT
26,963,218 UART: [state] CFI Enabled
27,079,801 UART: [rt] RT listening for mailbox commands...
27,233,744 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,679,091 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,111,851 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2f:2b:b3:a2:e4:d8:2d:78:1d:37:12:9c:c2:fa:60:52:e7:d1:34:79
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AF2BB3A2E4D82D781D37129CC2FA6052E7D1347920254FE23E1A55B0D3F7E6FB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b4:f2:17:ce:89:0c:d1:54:1c:79:c2:b7:30:d9:
9e:18:f7:b6:fa:8d:57:07:24:b8:64:d3:26:02:2d:
93:d5:9f:25:84:38:b3:2f:a9:7e:7e:5c:08:4c:bd:
72:4c:fb:80:94:8a:57:2e:c1:90:e4:90:0f:0d:af:
91:0c:a8:15:5c:29:a8:d6:ad:ca:7d:9f:5c:e0:06:
3e:45:47:6a:47:ee:e8:fd:52:61:17:cc:68:fc:62:
92:da:3b:60:47:46:d4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
AF:2B:B3:A2:E4:D8:2D:78:1D:37:12:9C:C2:FA:60:52:E7:D1:34:79
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:1f:41:1d:86:c6:cd:fc:eb:fb:f2:00:e0:85:54:
28:d5:9b:6a:6c:97:03:d6:c0:69:7c:bf:d6:06:53:38:1c:36:
e3:dc:d2:f7:81:f2:41:52:f5:5b:2e:4e:69:28:14:c9:02:31:
00:b8:3b:e2:af:f9:0c:d1:93:81:93:b8:8a:c8:58:c1:b6:8c:
01:38:72:af:53:1d:71:5c:fa:f8:7b:d1:01:0c:0b:6c:12:a8:
49:be:5a:93:2d:3e:e1:68:aa:e0:0e:13:09
30,572,202 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
30,715,089 UART:
30,715,503 UART: Running Caliptra ROM ...
30,716,637 UART:
30,716,803 UART: [state] CFI Enabled
30,732,525 UART: [state] LifecycleState = Production
30,734,266 UART: [state] DebugLocked = Yes
30,737,191 UART: [state] Starting the WD Timer 40000000 cycles
30,741,431 UART: [kat] SHA2-256
30,920,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,932,394 UART: [kat] ++
30,932,982 UART: [kat] sha1
30,944,746 UART: [kat] SHA2-256
30,947,761 UART: [kat] SHA2-384
30,952,178 UART: [kat] SHA2-512-ACC
30,955,117 UART: [kat] ECC-384
33,395,259 UART: [kat] HMAC-384Kdf
33,407,808 UART: [kat] LMS
33,937,331 UART: [kat] --
33,941,701 UART: [update-reset] ++
38,530,486 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,533,241 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
38,909,069 >>> mbox cmd response: success
38,909,564 UART: [update-reset] Copying MAN_2 To MAN_1
38,931,908 UART: [update-reset Success] --
38,935,904 UART: [state] Locking Datavault
38,939,981 UART: [state] Locking PCR0, PCR1 and PCR31
38,941,625 UART: [state] Locking ICCM
38,942,664 UART: [exit] Launching FMC @ 0x40000130
38,951,109 UART:
38,951,341 UART: Running Caliptra FMC ...
38,952,362 UART:
38,952,505 UART: [state] CFI Enabled
38,996,948 UART: [art] Extend RT PCRs Done
38,998,114 UART: [art] Lock RT PCRs Done
38,999,506 UART: [art] Populate DV Done
39,004,803 UART: [fht] FMC Alias Private Key: 7
39,006,449 UART: [art] Derive CDI
39,007,266 UART: [art] Store in in slot 0x4
39,049,922 UART: [art] Derive Key Pair
39,050,974 UART: [art] Store priv key in slot 0x5
41,478,234 UART: [art] Derive Key Pair - Done
41,491,368 UART: [art] Signing Cert with AUTHO
41,492,879 UART: RITY.KEYID = 7
43,197,890 UART: [art] Erasing AUTHORITY.KEYID = 7
43,199,385 UART: [art] PUB.X = 7542D50EE371DBF3F88A1C8AE72656C5CEF29F64719EAE310F9C746E87BA6AA5672B661DE33E4C3C83E80F289927AE20
43,206,694 UART: [art] PUB.Y = C895D586D9BF0A5EF177439AFE99C6AB2D86FD1D7D03E7AF48B8AE23CE70A1023FAFAEF94D6B77047A208BDF486E0BA4
43,213,941 UART: [art] SIG.R = F4880EBBAAB4ED2A9BA3329C29F9B72F3F5CBF795FB29F9C46F4BD61804972E8D895780B4759BFB3608B6F41E9F63206
43,221,390 UART: [art] SIG.S = 3A2BEFE4650EC2896FF4BF4C866A670DC6FBB5E5F8A00BD5E3B56CFB76FBC03AD64F8CC7904A5C4A46ECD1D8FDEF8B6E
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:52:79:cf:71:6e:c7:e9:03:bc:c9:5c:ef:59:f3:52:4d:d3:31:bb
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A85279CF716EC7E903BCC95CEF59F3524DD331BB9AAE1E9CD81499F1D9FA9043
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:75:42:d5:0e:e3:71:db:f3:f8:8a:1c:8a:e7:26:
56:c5:ce:f2:9f:64:71:9e:ae:31:0f:9c:74:6e:87:
ba:6a:a5:67:2b:66:1d:e3:3e:4c:3c:83:e8:0f:28:
99:27:ae:20:c8:95:d5:86:d9:bf:0a:5e:f1:77:43:
9a:fe:99:c6:ab:2d:86:fd:1d:7d:03:e7:af:48:b8:
ae:23:ce:70:a1:02:3f:af:ae:f9:4d:6b:77:04:7a:
20:8b:df:48:6e:0b:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
A8:52:79:CF:71:6E:C7:E9:03:BC:C9:5C:EF:59:F3:52:4D:D3:31:BB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f4:88:0e:bb:aa:b4:ed:2a:9b:a3:32:9c:29:
f9:b7:2f:3f:5c:bf:79:5f:b2:9f:9c:46:f4:bd:61:80:49:72:
e8:d8:95:78:0b:47:59:bf:b3:60:8b:6f:41:e9:f6:32:06:02:
30:3a:2b:ef:e4:65:0e:c2:89:6f:f4:bf:4c:86:6a:67:0d:c6:
fb:b5:e5:f8:a0:0b:d5:e3:b5:6c:fb:76:fb:c0:3a:d6:4f:8c:
c7:90:4a:5c:4a:46:ec:d1:d8:fd:ef:8b:6e
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.36s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,700,564 ready_for_fw is high
3,701,393 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,279,066 >>> mbox cmd response: success
19,534,443 UART:
19,534,826 UART: Running Caliptra FMC ...
19,536,033 UART:
19,536,207 UART: [state] CFI Enabled
19,544,041 UART: [fht] FMC Alias Private Key: 7
21,301,159 UART: [art] Extend RT PCRs Done
21,302,392 UART: [art] Lock RT PCRs Done
21,303,504 UART: [art] Populate DV Done
21,309,194 UART: [fht] FMC Alias Private Key: 7
21,310,839 UART: [art] Derive CDI
21,311,574 UART: [art] Store in in slot 0x4
21,354,439 UART: [art] Derive Key Pair
21,355,481 UART: [art] Store priv key in slot 0x5
23,782,539 UART: [art] Derive Key Pair - Done
23,795,166 UART: [art] Signing Cert with AUTHO
23,796,472 UART: RITY.KEYID = 7
25,501,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,503,261 UART: [art] PUB.X = 1B4959F148D0A91865828185316F1B0781A106D41BA2731B2367EA84F49E60E00ACEA8885AF8408C8CEEF75ED9904131
25,510,556 UART: [art] PUB.Y = 0DD571BF954447E48EB7828C0CAAB8A188B5A69DD3D1D760C24F0C8B748892FC2FD9C175B9B1409C6D5F43189399354F
25,517,787 UART: [art] SIG.R = EED01BC241ACBDE7716E926691ABC3B95A6664A3AD5EA1456BED05769A997E5EC4A24BC3129A21A32FF9B7F65599D581
25,525,195 UART: [art] SIG.S = 0F4A3F269481FD9C8114C8EB3EF422BB225996037D1084442DF27A6693D5CD92D8DEE431262B66A78403BE0A58132B38
26,504,502 UART: Caliptra RT
26,505,199 UART: [state] CFI Enabled
26,622,424 UART: [rt] RT listening for mailbox commands...
26,653,787 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,098,148 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,534,303 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2d:cb:64:42:ab:b5:a5:92:47:b1:5e:75:e8:09:fd:0f:4e:b5:65:1a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=29CB6442ABB5A59247B15E75E809FD0F4EB5651AB23BB0B6EAB1BA4EC8FFE196
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1b:49:59:f1:48:d0:a9:18:65:82:81:85:31:6f:
1b:07:81:a1:06:d4:1b:a2:73:1b:23:67:ea:84:f4:
9e:60:e0:0a:ce:a8:88:5a:f8:40:8c:8c:ee:f7:5e:
d9:90:41:31:0d:d5:71:bf:95:44:47:e4:8e:b7:82:
8c:0c:aa:b8:a1:88:b5:a6:9d:d3:d1:d7:60:c2:4f:
0c:8b:74:88:92:fc:2f:d9:c1:75:b9:b1:40:9c:6d:
5f:43:18:93:99:35:4f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
29:CB:64:42:AB:B5:A5:92:47:B1:5E:75:E8:09:FD:0F:4E:B5:65:1A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ee:d0:1b:c2:41:ac:bd:e7:71:6e:92:66:91:
ab:c3:b9:5a:66:64:a3:ad:5e:a1:45:6b:ed:05:76:9a:99:7e:
5e:c4:a2:4b:c3:12:9a:21:a3:2f:f9:b7:f6:55:99:d5:81:02:
30:0f:4a:3f:26:94:81:fd:9c:81:14:c8:eb:3e:f4:22:bb:22:
59:96:03:7d:10:84:44:2d:f2:7a:66:93:d5:cd:92:d8:de:e4:
31:26:2b:66:a7:84:03:be:0a:58:13:2b:38
29,995,616 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
38,022,527 >>> mbox cmd response: success
38,057,724 UART:
38,058,068 UART: Running Caliptra FMC ...
38,059,299 UART:
38,059,472 UART: [state] CFI Enabled
38,103,678 UART: [art] Extend RT PCRs Done
38,104,878 UART: [art] Lock RT PCRs Done
38,106,523 UART: [art] Populate DV Done
38,112,144 UART: [fht] FMC Alias Private Key: 7
38,113,677 UART: [art] Derive CDI
38,114,411 UART: [art] Store in in slot 0x4
38,157,011 UART: [art] Derive Key Pair
38,158,074 UART: [art] Store priv key in slot 0x5
40,584,127 UART: [art] Derive Key Pair - Done
40,596,810 UART: [art] Signing Cert with AUTHO
40,598,116 UART: RITY.KEYID = 7
42,303,785 UART: [art] Erasing AUTHORITY.KEYID = 7
42,305,302 UART: [art] PUB.X = 5D1FA1317C0AA1F0548966B6DB6967417DF654C57D0143643B26FDC094DA8FF09D22EDCEEF55705289C434AF2232F1F3
42,312,549 UART: [art] PUB.Y = C836DC09605E007588E42D2D701C5999CF1EF88957CA377FB269A6365DA05B1FC70BE03B5045398170001420399F4476
42,319,746 UART: [art] SIG.R = A3BD53BAE6BC4B7E2AC330C60148BF6D6F1084CCA18C78EAD14BF713CECF346D7572D66FB496A2BA6BE28178C478B50B
42,327,139 UART: [art] SIG.S = 02EB5B8E9DF12DE1340BA10E09944A42AABED3617DC200565E5CC51569E47374E2DE2B00C0D7508748A5E66C07035F50
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:0e:32:15:de:1f:06:f5:ed:15:95:3e:0b:f8:01:45:6e:48:23:00
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=250E3215DE1F06F5ED15953E0BF801456E4823006388441669B8750D3F43B8F3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5d:1f:a1:31:7c:0a:a1:f0:54:89:66:b6:db:69:
67:41:7d:f6:54:c5:7d:01:43:64:3b:26:fd:c0:94:
da:8f:f0:9d:22:ed:ce:ef:55:70:52:89:c4:34:af:
22:32:f1:f3:c8:36:dc:09:60:5e:00:75:88:e4:2d:
2d:70:1c:59:99:cf:1e:f8:89:57:ca:37:7f:b2:69:
a6:36:5d:a0:5b:1f:c7:0b:e0:3b:50:45:39:81:70:
00:14:20:39:9f:44:76
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
25:0E:32:15:DE:1F:06:F5:ED:15:95:3E:0B:F8:01:45:6E:48:23:00
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a3:bd:53:ba:e6:bc:4b:7e:2a:c3:30:c6:01:
48:bf:6d:6f:10:84:cc:a1:8c:78:ea:d1:4b:f7:13:ce:cf:34:
6d:75:72:d6:6f:b4:96:a2:ba:6b:e2:81:78:c4:78:b5:0b:02:
30:02:eb:5b:8e:9d:f1:2d:e1:34:0b:a1:0e:09:94:4a:42:aa:
be:d3:61:7d:c2:00:56:5e:5c:c5:15:69:e4:73:74:e2:de:2b:
00:c0:d7:50:87:48:a5:e6:6c:07:03:5f:50
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
Truncated 4974 bytes from beginning
67E860158BD33FFAABFFC54E458FE0C00430726E50079B3361462921FB058F4AD767D2AC7CE9E4D2D0BE653275373B32
26,313,921 UART: [art] SIG.S = 1D60F1D81284937D070A649EA7196DDCAE7E6D668F06960EEED079F7FE4281732B0342F00E7360E5864726E96E9C5665
27,292,945 UART: Caliptra RT
27,293,680 UART: [state] CFI Enabled
27,457,745 UART: [rt] RT listening for mailbox commands...
27,613,321 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,058,722 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,492,586 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7c:da:54:90:7a:cd:b1:21:b4:88:ad:57:73:67:4f:5e:05:c7:bd:2b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7CDA54907ACDB121B488AD5773674F5E05C7BD2B6DC0C7CBF0071D64B18C4EE3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:33:cf:23:b7:d3:d7:80:a8:ff:b6:75:fc:02:d9:
9b:99:dc:8f:d9:07:ff:3c:06:0e:5a:38:95:cf:0d:
84:98:1a:63:5f:cb:0b:01:2f:b2:b9:dd:51:71:fa:
f0:b4:6f:a5:66:cc:56:10:d1:29:4e:83:3e:16:52:
77:09:59:20:7d:6f:e8:85:29:c0:55:05:63:35:16:
f5:3c:0e:ad:00:24:02:1a:70:41:b9:71:7c:44:b2:
e9:46:d0:d6:29:a1:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
7C:DA:54:90:7A:CD:B1:21:B4:88:AD:57:73:67:4F:5E:05:C7:BD:2B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:67:e8:60:15:8b:d3:3f:fa:ab:ff:c5:4e:45:8f:
e0:c0:04:30:72:6e:50:07:9b:33:61:46:29:21:fb:05:8f:4a:
d7:67:d2:ac:7c:e9:e4:d2:d0:be:65:32:75:37:3b:32:02:30:
1d:60:f1:d8:12:84:93:7d:07:0a:64:9e:a7:19:6d:dc:ae:7e:
6d:66:8f:06:96:0e:ee:d0:79:f7:fe:42:81:73:2b:03:42:f0:
0e:73:60:e5:86:47:26:e9:6e:9c:56:65
30,956,006 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
31,099,016 UART:
31,099,410 UART: Running Caliptra ROM ...
31,100,475 UART:
31,100,630 UART: [state] CFI Enabled
31,170,591 UART: [state] LifecycleState = Production
31,172,517 UART: [state] DebugLocked = Yes
31,174,127 UART: [state] Starting the WD Timer 40000000 cycles
31,178,655 UART: [kat] SHA2-256
31,368,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,379,321 UART: [kat] ++
31,379,915 UART: [kat] sha1
31,390,974 UART: [kat] SHA2-256
31,393,976 UART: [kat] SHA2-384
31,400,941 UART: [kat] SHA2-512-ACC
31,403,521 UART: [kat] ECC-384
33,854,367 UART: [kat] HMAC-384Kdf
33,877,851 UART: [kat] LMS
34,409,441 UART: [kat] --
34,413,700 UART: [update-reset] ++
39,043,232 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,046,421 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
39,641,776 >>> mbox cmd response: success
39,643,548 UART: [update-reset] Copying MAN_2 To MAN_1
39,681,084 UART: [update-reset Success] --
39,685,990 UART: [state] Locking Datavault
39,688,931 UART: [state] Locking PCR0, PCR1 and PCR31
39,691,131 UART: [state] Locking ICCM
39,692,906 UART: [exit] Launching FMC @ 0x40000130
39,701,581 UART:
39,701,812 UART: Running Caliptra FMC ...
39,702,911 UART:
39,703,063 UART: [state] CFI Enabled
39,799,007 UART: [art] Extend RT PCRs Done
39,800,220 UART: [art] Lock RT PCRs Done
39,801,469 UART: [art] Populate DV Done
39,806,983 UART: [fht] FMC Alias Private Key: 7
39,808,622 UART: [art] Derive CDI
39,809,431 UART: [art] Store in in slot 0x4
39,868,556 UART: [art] Derive Key Pair
39,869,588 UART: [art] Store priv key in slot 0x5
42,332,571 UART: [art] Derive Key Pair - Done
42,345,332 UART: [art] Signing Cert with AUTHO
42,346,635 UART: RITY.KEYID = 7
44,058,171 UART: [art] Erasing AUTHORITY.KEYID = 7
44,059,676 UART: [art] PUB.X = 2BC2658710211F70368E38CB19547AE7EAF4D0C5D80588033793FEF5C92A989B5CB6DD16BAB76332FCFEF99F18DFB0DE
44,066,991 UART: [art] PUB.Y = ADE5C53DCB95C8D8C8AC92F1C329172E9E1EBFA4D2F940558592954BDA318B5A3AF2DCCF6950265A14D5D8525EC9E058
44,074,224 UART: [art] SIG.R = F771F25B0E9A5DE356319E50FE5ABDAD76838C36074FD899DD914067AA007E19DFD4987800A8008A4F362654F71D40F3
44,081,567 UART: [art] SIG.S = 69DD50E41AA24A7DAC5C6CAAD44D327235B350DF8C339BF84D70D6A3A8F42038585862E51DBF42F279D6731974C430AB
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2f:3b:b9:ca:b5:66:b2:62:65:07:1a:ac:99:6c:f2:ce:38:2c:4c:af
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2F3BB9CAB566B26265071AAC996CF2CE382C4CAF0F9CA696044EF1B36BEEB84D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2b:c2:65:87:10:21:1f:70:36:8e:38:cb:19:54:
7a:e7:ea:f4:d0:c5:d8:05:88:03:37:93:fe:f5:c9:
2a:98:9b:5c:b6:dd:16:ba:b7:63:32:fc:fe:f9:9f:
18:df:b0:de:ad:e5:c5:3d:cb:95:c8:d8:c8:ac:92:
f1:c3:29:17:2e:9e:1e:bf:a4:d2:f9:40:55:85:92:
95:4b:da:31:8b:5a:3a:f2:dc:cf:69:50:26:5a:14:
d5:d8:52:5e:c9:e0:58
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
2F:3B:B9:CA:B5:66:B2:62:65:07:1A:AC:99:6C:F2:CE:38:2C:4C:AF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:f7:71:f2:5b:0e:9a:5d:e3:56:31:9e:50:fe:
5a:bd:ad:76:83:8c:36:07:4f:d8:99:dd:91:40:67:aa:00:7e:
19:df:d4:98:78:00:a8:00:8a:4f:36:26:54:f7:1d:40:f3:02:
30:69:dd:50:e4:1a:a2:4a:7d:ac:5c:6c:aa:d4:4d:32:72:35:
b3:50:df:8c:33:9b:f8:4d:70:d6:a3:a8:f4:20:38:58:58:62:
e5:1d:bf:42:f2:79:d6:73:19:74:c4:30:ab
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 527 bytes from beginning
to cptra_bootfsm_go
3,437,612 ready_for_fw is high
3,437,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,902,428 >>> mbox cmd response: success
20,199,897 UART:
20,200,324 UART: Running Caliptra FMC ...
20,201,478 UART:
20,201,640 UART: [state] CFI Enabled
20,269,375 UART: [fht] FMC Alias Private Key: 7
22,032,895 UART: [art] Extend RT PCRs Done
22,034,117 UART: [art] Lock RT PCRs Done
22,035,902 UART: [art] Populate DV Done
22,041,144 UART: [fht] FMC Alias Private Key: 7
22,042,642 UART: [art] Derive CDI
22,043,406 UART: [art] Store in in slot 0x4
22,102,321 UART: [art] Derive Key Pair
22,103,358 UART: [art] Store priv key in slot 0x5
24,566,502 UART: [art] Derive Key Pair - Done
24,579,447 UART: [art] Signing Cert with AUTHO
24,580,749 UART: RITY.KEYID = 7
26,292,110 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,631 UART: [art] PUB.X = 2F1FACE426478456CF25DC20128228136CF1CFE29BD928A5E342833C61457AB64B3A1E10BEE07DFAF5F968B23429BC82
26,300,883 UART: [art] PUB.Y = CF5BC5C6770C13B94F2AC37F15F1819B2FC080B0D728AB203D8D7EBBED47263AA05FE4F46B29EB887A9B87445119C303
26,308,146 UART: [art] SIG.R = 1577F77FA2656A2F79AFFB08B6B4DFF4FA7A85AE57A6C57C660CC9E02773AE810F8360084222FFF3F96FE4EF06B4FFB5
26,315,535 UART: [art] SIG.S = B22637ED071DA0AF62CBACF075D406B3F9BAF0A2B42C5EE9213EF507F60D4111C0D3A1AD7092638E8D210C3B62E37116
27,294,435 UART: Caliptra RT
27,295,142 UART: [state] CFI Enabled
27,460,809 UART: [rt] RT listening for mailbox commands...
27,492,182 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,937,245 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,373,037 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:95:44:8c:45:1f:1c:1a:4d:10:f5:e7:7d:25:48:e0:6d:13:24:17
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4495448C451F1C1A4D10F5E77D2548E06D132417B0EADD6E056EB7FFFC84379E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2f:1f:ac:e4:26:47:84:56:cf:25:dc:20:12:82:
28:13:6c:f1:cf:e2:9b:d9:28:a5:e3:42:83:3c:61:
45:7a:b6:4b:3a:1e:10:be:e0:7d:fa:f5:f9:68:b2:
34:29:bc:82:cf:5b:c5:c6:77:0c:13:b9:4f:2a:c3:
7f:15:f1:81:9b:2f:c0:80:b0:d7:28:ab:20:3d:8d:
7e:bb:ed:47:26:3a:a0:5f:e4:f4:6b:29:eb:88:7a:
9b:87:44:51:19:c3:03
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
44:95:44:8C:45:1F:1C:1A:4D:10:F5:E7:7D:25:48:E0:6D:13:24:17
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:15:77:f7:7f:a2:65:6a:2f:79:af:fb:08:b6:b4:
df:f4:fa:7a:85:ae:57:a6:c5:7c:66:0c:c9:e0:27:73:ae:81:
0f:83:60:08:42:22:ff:f3:f9:6f:e4:ef:06:b4:ff:b5:02:31:
00:b2:26:37:ed:07:1d:a0:af:62:cb:ac:f0:75:d4:06:b3:f9:
ba:f0:a2:b4:2c:5e:e9:21:3e:f5:07:f6:0d:41:11:c0:d3:a1:
ad:70:92:63:8e:8d:21:0c:3b:62:e3:71:16
30,834,123 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
39,733,363 >>> mbox cmd response: success
39,768,726 UART:
39,769,082 UART: Running Caliptra FMC ...
39,770,218 UART:
39,770,372 UART: [state] CFI Enabled
39,866,861 UART: [art] Extend RT PCRs Done
39,868,070 UART: [art] Lock RT PCRs Done
39,869,458 UART: [art] Populate DV Done
39,874,732 UART: [fht] FMC Alias Private Key: 7
39,876,324 UART: [art] Derive CDI
39,877,056 UART: [art] Store in in slot 0x4
39,935,805 UART: [art] Derive Key Pair
39,936,848 UART: [art] Store priv key in slot 0x5
42,399,809 UART: [art] Derive Key Pair - Done
42,412,752 UART: [art] Signing Cert with AUTHO
42,414,084 UART: RITY.KEYID = 7
44,124,507 UART: [art] Erasing AUTHORITY.KEYID = 7
44,126,014 UART: [art] PUB.X = 4E8AD3A1CC237602B3DD745398B228DA18E4442BF3E15DD70D086FBCCD3802FE5ACCFFC20C5275C8738E7C5435F99F8A
44,133,266 UART: [art] PUB.Y = 82493B02F4BE5841E82BDC897F189EC753C5ABDC1ABC5191B8D668D45128F6BF20F437FD2B02EAED703CFB0D48D081AC
44,140,545 UART: [art] SIG.R = 5BFC85D5A6426E5389F15F2E4171535D772331276E09629FDB9E12DFAE102FACF80106070E797D3B8F827245DBBEF32A
44,147,940 UART: [art] SIG.S = F2570D0455124A311C86AFB48B9A27E02B7B41598715FEB9D4D49442029853B0DE4FE5A605B276EA0F4ED3C2F46B591B
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5f:df:5e:c2:aa:25:14:60:e1:5f:8f:46:0b:d8:4c:5c:c5:e1:aa:7e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5BDF5EC2AA251460E15F8F460BD84C5CC5E1AA7E8AD611004BA90DF5CA8E1C54
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4e:8a:d3:a1:cc:23:76:02:b3:dd:74:53:98:b2:
28:da:18:e4:44:2b:f3:e1:5d:d7:0d:08:6f:bc:cd:
38:02:fe:5a:cc:ff:c2:0c:52:75:c8:73:8e:7c:54:
35:f9:9f:8a:82:49:3b:02:f4:be:58:41:e8:2b:dc:
89:7f:18:9e:c7:53:c5:ab:dc:1a:bc:51:91:b8:d6:
68:d4:51:28:f6:bf:20:f4:37:fd:2b:02:ea:ed:70:
3c:fb:0d:48:d0:81:ac
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
5B:DF:5E:C2:AA:25:14:60:E1:5F:8F:46:0B:D8:4C:5C:C5:E1:AA:7E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:fc:85:d5:a6:42:6e:53:89:f1:5f:2e:41:71:
53:5d:77:23:31:27:6e:09:62:9f:db:9e:12:df:ae:10:2f:ac:
f8:01:06:07:0e:79:7d:3b:8f:82:72:45:db:be:f3:2a:02:31:
00:f2:57:0d:04:55:12:4a:31:1c:86:af:b4:8b:9a:27:e0:2b:
7b:41:59:87:15:fe:b9:d4:d4:94:42:02:98:53:b0:de:4f:e5:
a6:05:b2:76:ea:0f:4e:d3:c2:f4:6b:59:1b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.41s
Truncated 4980 bytes from beginning
FE1358572884305A5F11292CCE6A31D3E8EBA47460261878D80F10582E5108EC9462C549033CC81ABADD659F11
26,364,117 UART: [art] SIG.S = 9D21A27ABA864431CD7C81DC36B66BFE1675E8FD05B152D84113799AF14F2CFD0D6673DDD59BCE544176B23897619F55
27,342,976 UART: Caliptra RT
27,343,702 UART: [state] CFI Enabled
27,460,571 UART: [rt] RT listening for mailbox commands...
27,612,667 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,058,023 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,491,324 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2f:6b:81:a5:9a:3a:ec:b7:01:8b:d5:21:03:8f:a7:bd:d9:78:01:52
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AB6B81A59A3AECB7018BD521038FA7BDD978015270A530FE5D3B659738318EBC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:68:8e:a9:a1:d3:6c:e3:19:d6:a1:33:d4:66:17:
62:d4:e0:a6:de:cd:15:81:66:ea:09:28:e9:db:bf:
5f:dc:3e:57:c9:a3:a2:2a:f5:c6:54:c4:27:18:cf:
1b:bd:fd:51:81:32:94:55:14:ef:16:dd:8c:2e:10:
39:73:14:11:83:26:3c:07:59:82:05:1f:91:25:4b:
ad:9f:5b:16:2f:10:31:5f:53:0f:de:d1:24:b5:1b:
07:05:25:7c:d6:ae:76
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
AB:6B:81:A5:9A:3A:EC:B7:01:8B:D5:21:03:8F:A7:BD:D9:78:01:52
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c3:7a:2a:fe:13:58:57:28:84:30:5a:5f:11:
29:2c:ce:6a:31:d3:e8:eb:a4:74:60:26:18:78:d8:0f:10:58:
2e:51:08:ec:94:62:c5:49:03:3c:c8:1a:ba:dd:65:9f:11:02:
31:00:9d:21:a2:7a:ba:86:44:31:cd:7c:81:dc:36:b6:6b:fe:
16:75:e8:fd:05:b1:52:d8:41:13:79:9a:f1:4f:2c:fd:0d:66:
73:dd:d5:9b:ce:54:41:76:b2:38:97:61:9f:55
30,953,000 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
31,095,831 UART:
31,096,230 UART: Running Caliptra ROM ...
31,097,280 UART:
31,097,436 UART: [state] CFI Enabled
31,112,043 UART: [state] LifecycleState = Production
31,113,775 UART: [state] DebugLocked = Yes
31,116,192 UART: [state] Starting the WD Timer 40000000 cycles
31,121,250 UART: [kat] SHA2-256
31,311,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,322,040 UART: [kat] ++
31,322,559 UART: [kat] sha1
31,333,767 UART: [kat] SHA2-256
31,336,776 UART: [kat] SHA2-384
31,342,773 UART: [kat] SHA2-512-ACC
31,345,338 UART: [kat] ECC-384
33,789,263 UART: [kat] HMAC-384Kdf
33,801,438 UART: [kat] LMS
34,333,043 UART: [kat] --
34,337,377 UART: [update-reset] ++
38,986,286 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,989,858 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
39,585,238 >>> mbox cmd response: success
39,585,757 UART: [update-reset] Copying MAN_2 To MAN_1
39,623,067 UART: [update-reset Success] --
39,626,656 UART: [state] Locking Datavault
39,629,958 UART: [state] Locking PCR0, PCR1 and PCR31
39,632,148 UART: [state] Locking ICCM
39,635,144 UART: [exit] Launching FMC @ 0x40000130
39,643,803 UART:
39,644,036 UART: Running Caliptra FMC ...
39,645,060 UART:
39,645,231 UART: [state] CFI Enabled
39,690,012 UART: [art] Extend RT PCRs Done
39,691,199 UART: [art] Lock RT PCRs Done
39,692,788 UART: [art] Populate DV Done
39,698,363 UART: [fht] FMC Alias Private Key: 7
39,699,951 UART: [art] Derive CDI
39,700,762 UART: [art] Store in in slot 0x4
39,743,244 UART: [art] Derive Key Pair
39,744,285 UART: [art] Store priv key in slot 0x5
42,171,112 UART: [art] Derive Key Pair - Done
42,184,417 UART: [art] Signing Cert with AUTHO
42,185,715 UART: RITY.KEYID = 7
43,891,256 UART: [art] Erasing AUTHORITY.KEYID = 7
43,892,758 UART: [art] PUB.X = 05DA3CACC147F1804F35306616C0DF460C87FDB1668CAE3AA8B90638B024604BB5BCE7977FC72A039FA89FD04F56A500
43,899,954 UART: [art] PUB.Y = 483BDE5F725171663601218D176725748750A29B638312CB498E4116B8E8EAAA592F3081BD8E78A1FE68890B770C3A24
43,907,185 UART: [art] SIG.R = BFA333FBD038D4A6606FA04B03BF27158BFA769574C72E853F3F4BCA6D41B0E2988CB4E073B212E1E712EABB95ECBB76
43,914,608 UART: [art] SIG.S = 3A1AB39490781330D546B653040F58349D3D4D0B6E5DFDC29A6E6B670044E81D03F0734094E0EE5C87B0855009164EFD
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:7d:e4:b8:52:0e:a3:1a:a2:5b:f5:42:9b:49:7c:b7:f2:83:d9:3e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=067DE4B8520EA31AA25BF5429B497CB7F283D93E85493E8872F4E46FFFFA0006
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:05:da:3c:ac:c1:47:f1:80:4f:35:30:66:16:c0:
df:46:0c:87:fd:b1:66:8c:ae:3a:a8:b9:06:38:b0:
24:60:4b:b5:bc:e7:97:7f:c7:2a:03:9f:a8:9f:d0:
4f:56:a5:00:48:3b:de:5f:72:51:71:66:36:01:21:
8d:17:67:25:74:87:50:a2:9b:63:83:12:cb:49:8e:
41:16:b8:e8:ea:aa:59:2f:30:81:bd:8e:78:a1:fe:
68:89:0b:77:0c:3a:24
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
06:7D:E4:B8:52:0E:A3:1A:A2:5B:F5:42:9B:49:7C:B7:F2:83:D9:3E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:bf:a3:33:fb:d0:38:d4:a6:60:6f:a0:4b:03:
bf:27:15:8b:fa:76:95:74:c7:2e:85:3f:3f:4b:ca:6d:41:b0:
e2:98:8c:b4:e0:73:b2:12:e1:e7:12:ea:bb:95:ec:bb:76:02:
30:3a:1a:b3:94:90:78:13:30:d5:46:b6:53:04:0f:58:34:9d:
3d:4d:0b:6e:5d:fd:c2:9a:6e:6b:67:00:44:e8:1d:03:f0:73:
40:94:e0:ee:5c:87:b0:85:50:09:16:4e:fd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.39s
Truncated 524 bytes from beginning
ing to cptra_bootfsm_go
3,758,758 ready_for_fw is high
3,759,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,106,571 >>> mbox cmd response: success
20,363,143 UART:
20,363,558 UART: Running Caliptra FMC ...
20,364,790 UART:
20,364,957 UART: [state] CFI Enabled
20,372,900 UART: [fht] FMC Alias Private Key: 7
22,129,767 UART: [art] Extend RT PCRs Done
22,131,024 UART: [art] Lock RT PCRs Done
22,132,679 UART: [art] Populate DV Done
22,138,043 UART: [fht] FMC Alias Private Key: 7
22,139,688 UART: [art] Derive CDI
22,140,502 UART: [art] Store in in slot 0x4
22,183,096 UART: [art] Derive Key Pair
22,184,092 UART: [art] Store priv key in slot 0x5
24,611,097 UART: [art] Derive Key Pair - Done
24,624,003 UART: [art] Signing Cert with AUTHO
24,625,321 UART: RITY.KEYID = 7
26,331,012 UART: [art] Erasing AUTHORITY.KEYID = 7
26,332,521 UART: [art] PUB.X = 452DB85C46B4B3C4C2FD086FEFC6F4CA123FFBD940653490DC7C2A69CA59FA86885FFACC9E44717DC24768813EB3A765
26,339,801 UART: [art] PUB.Y = A24A3BEAACA5C89E94170FF0626BDBB66F14F7B314D5352BD122852BC50E2A6858D4FF37164177CF686AC5B52DEDF3F3
26,347,079 UART: [art] SIG.R = 727BFD6FBDFD94426933BFA101BEACB4A36D96B0571B102D3B17309570E600F3D27A8C04F052159B02D03C093ADF0086
26,354,423 UART: [art] SIG.S = 59A76EF2D07E675AB4BF6BC4062AC7AAD3C0725C00F162A5F310270E6F2757F8C67E4B28CFB21ECF2E5AF92ED07EC1AB
27,333,280 UART: Caliptra RT
27,333,997 UART: [state] CFI Enabled
27,450,455 UART: [rt] RT listening for mailbox commands...
27,481,818 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,926,168 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,362,176 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:6a:39:f2:b1:1a:93:c7:4c:e5:eb:67:18:04:46:8c:75:4d:b1:d8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=306A39F2B11A93C74CE5EB671804468C754DB1D804E3A6D5F8EFA8CE450FC23A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:45:2d:b8:5c:46:b4:b3:c4:c2:fd:08:6f:ef:c6:
f4:ca:12:3f:fb:d9:40:65:34:90:dc:7c:2a:69:ca:
59:fa:86:88:5f:fa:cc:9e:44:71:7d:c2:47:68:81:
3e:b3:a7:65:a2:4a:3b:ea:ac:a5:c8:9e:94:17:0f:
f0:62:6b:db:b6:6f:14:f7:b3:14:d5:35:2b:d1:22:
85:2b:c5:0e:2a:68:58:d4:ff:37:16:41:77:cf:68:
6a:c5:b5:2d:ed:f3:f3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
30:6A:39:F2:B1:1A:93:C7:4C:E5:EB:67:18:04:46:8C:75:4D:B1:D8
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:72:7b:fd:6f:bd:fd:94:42:69:33:bf:a1:01:be:
ac:b4:a3:6d:96:b0:57:1b:10:2d:3b:17:30:95:70:e6:00:f3:
d2:7a:8c:04:f0:52:15:9b:02:d0:3c:09:3a:df:00:86:02:30:
59:a7:6e:f2:d0:7e:67:5a:b4:bf:6b:c4:06:2a:c7:aa:d3:c0:
72:5c:00:f1:62:a5:f3:10:27:0e:6f:27:57:f8:c6:7e:4b:28:
cf:b2:1e:cf:2e:5a:f9:2e:d0:7e:c1:ab
30,821,896 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
39,650,628 >>> mbox cmd response: success
39,684,415 UART:
39,684,750 UART: Running Caliptra FMC ...
39,685,965 UART:
39,686,138 UART: [state] CFI Enabled
39,730,455 UART: [art] Extend RT PCRs Done
39,731,646 UART: [art] Lock RT PCRs Done
39,732,963 UART: [art] Populate DV Done
39,738,374 UART: [fht] FMC Alias Private Key: 7
39,739,983 UART: [art] Derive CDI
39,740,721 UART: [art] Store in in slot 0x4
39,783,257 UART: [art] Derive Key Pair
39,784,252 UART: [art] Store priv key in slot 0x5
42,210,985 UART: [art] Derive Key Pair - Done
42,223,869 UART: [art] Signing Cert with AUTHO
42,225,172 UART: RITY.KEYID = 7
43,930,552 UART: [art] Erasing AUTHORITY.KEYID = 7
43,932,053 UART: [art] PUB.X = 1D465B46DE01DD1A36F16CB8EC4F9A678B91AF58E202DD8BB401DE3022A0303295E515D694EB108CC37B5ADC442C6C09
43,939,380 UART: [art] PUB.Y = 608DFA48572DB2A4644DAA48FBFB4E2D8B9006B6AFC1DF1E92138FF270ADF19C1950EA01D1D775DA7AAF2729CE092261
43,946,619 UART: [art] SIG.R = 524238EE24B54B4089F0B608D6EBE1263B8FDA36671BC0EEFF63E29E03ED575840DF98A23A02F48D8A2A0F9AF6295120
43,954,055 UART: [art] SIG.S = BB7D2CD9C8E31B406D30C5E1843D114AC6651F547FD1D93B5C8FEC5B8D16ECF1817E4D100C2D2FDEF472225A2E0422BB
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:28:89:0f:cd:ec:c7:28:58:4d:a8:6f:47:97:be:99:de:f5:c9:59
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5728890FCDECC728584DA86F4797BE99DEF5C95993549231342214342772D545
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1d:46:5b:46:de:01:dd:1a:36:f1:6c:b8:ec:4f:
9a:67:8b:91:af:58:e2:02:dd:8b:b4:01:de:30:22:
a0:30:32:95:e5:15:d6:94:eb:10:8c:c3:7b:5a:dc:
44:2c:6c:09:60:8d:fa:48:57:2d:b2:a4:64:4d:aa:
48:fb:fb:4e:2d:8b:90:06:b6:af:c1:df:1e:92:13:
8f:f2:70:ad:f1:9c:19:50:ea:01:d1:d7:75:da:7a:
af:27:29:ce:09:22:61
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
57:28:89:0F:CD:EC:C7:28:58:4D:A8:6F:47:97:BE:99:DE:F5:C9:59
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:52:42:38:ee:24:b5:4b:40:89:f0:b6:08:d6:eb:
e1:26:3b:8f:da:36:67:1b:c0:ee:ff:63:e2:9e:03:ed:57:58:
40:df:98:a2:3a:02:f4:8d:8a:2a:0f:9a:f6:29:51:20:02:31:
00:bb:7d:2c:d9:c8:e3:1b:40:6d:30:c5:e1:84:3d:11:4a:c6:
65:1f:54:7f:d1:d9:3b:5c:8f:ec:5b:8d:16:ec:f1:81:7e:4d:
10:0c:2d:2f:de:f4:72:22:5a:2e:04:22:bb
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 5401 bytes from beginning
0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,501 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,296 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:9b:33:a7:81:04:9a:2b:b3:38:b6:6f:70:93:cc:21:42:64:1e:a3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F39B33A781049A2BB338B66F7093CC2142641EA32C1F2F9AFE1E92F48E5F1C7C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0d:68:14:e8:3e:f0:34:b9:02:59:13:76:0c:8b:
32:8b:a9:84:d6:43:12:0a:37:26:5f:47:29:22:f3:
6f:12:84:67:8f:02:d2:ed:fd:c4:34:89:34:44:50:
3d:03:a8:64:c1:37:13:be:39:00:4a:9d:ed:70:6a:
4c:ca:96:58:e2:26:bb:1b:c9:18:bf:2c:da:de:2a:
ac:e5:87:1a:13:1b:f3:d4:63:4a:f6:9d:4c:7a:55:
e6:6f:fc:0b:98:76:d4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
F3:9B:33:A7:81:04:9A:2B:B3:38:B6:6F:70:93:CC:21:42:64:1E:A3
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:89:b6:b5:fc:24:2a:7f:66:52:7a:86:8b:da:
59:91:0c:e8:9f:9a:ce:57:87:cb:e2:ab:cb:ee:56:fe:8e:0a:
ae:96:d5:f9:e7:1e:8a:0d:f2:c0:8e:6f:7b:db:2b:4a:04:02:
30:06:64:71:fb:ff:45:c0:12:b2:0e:17:ee:22:69:6b:da:42:
75:66:6b:89:c2:fd:72:2d:72:8b:80:ab:7e:43:23:df:de:98:
3a:e6:76:35:01:44:55:d4:57:b4:b0:41:3f
5,810,070 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,810,787 UART:
5,810,803 UART: Running Caliptra ROM ...
5,811,211 UART:
5,811,265 UART: [state] CFI Enabled
5,813,802 UART: [state] LifecycleState = Production
5,814,410 UART: [state] DebugLocked = Yes
5,815,164 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,816,871 UART: [kat] SHA2-256
6,610,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,614,917 UART: [kat] ++
6,615,069 UART: [kat] sha1
6,619,441 UART: [kat] SHA2-256
6,621,379 UART: [kat] SHA2-384
6,623,984 UART: [kat] SHA2-512-ACC
6,625,884 UART: [kat] ECC-384
6,631,709 UART: [kat] HMAC-384Kdf
6,636,233 UART: [kat] LMS
7,204,429 UART: [kat] --
7,205,368 UART: [update-reset] ++
10,852,751 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,853,867 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,000,707 >>> mbox cmd response: success
11,001,031 UART: [update-reset] Copying MAN_2 To MAN_1
11,009,043 UART: [update-reset Success] --
11,010,016 UART: [state] Locking Datavault
11,010,852 UART: [state] Locking PCR0, PCR1 and PCR31
11,011,456 UART: [state] Locking ICCM
11,012,112 UART: [exit] Launching FMC @ 0x40000130
11,017,441 UART:
11,017,457 UART: Running Caliptra FMC ...
11,017,865 UART:
11,017,919 UART: [state] CFI Enabled
11,106,826 UART: [art] Extend RT PCRs Done
11,107,254 UART: [art] Lock RT PCRs Done
11,108,501 UART: [art] Populate DV Done
11,116,725 UART: [fht] FMC Alias Private Key: 7
11,117,803 UART: [art] Derive CDI
11,118,083 UART: [art] Store in in slot 0x4
11,203,900 UART: [art] Derive Key Pair
11,204,260 UART: [art] Store priv key in slot 0x5
11,217,366 UART: [art] Derive Key Pair - Done
11,232,208 UART: [art] Signing Cert with AUTHO
11,232,688 UART: RITY.KEYID = 7
11,247,778 UART: [art] Erasing AUTHORITY.KEYID = 7
11,248,543 UART: [art] PUB.X = 65B47BB41AD5F6A20E8626094CF5BC299CE3D896A69E8B614586452AF64995E0544DB2047B4E99DF9C85DA7339B52FC6
11,255,308 UART: [art] PUB.Y = C8F094DA54A1F25E4712F7667AD65E7540B2A3CCE18808CDB4715DEA09E116ECE7B71CED38E175D0525FD2991FBD0974
11,262,261 UART: [art] SIG.R = 1BF3E33CBE7EAE2E828A468080C54DD88ABD9ED70D6CEDC9A77CE2AA14B3FCB423786D7D32BCB4A74752434421ACD1C8
11,269,052 UART: [art] SIG.S = 4BDBB687F72B70F66C2414D0D3C233D33FC1C186E207B688C76446B0AA9B755F4736860E5669B03B468BD953C3417EF4
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:b0:ae:3d:51:35:a3:d4:a4:d9:0d:ee:b1:c4:0c:5b:28:d0:03:3f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3FB0AE3D5135A3D4A4D90DEEB1C40C5B28D0033F4514641A4DECC8BA2CD77F50
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:65:b4:7b:b4:1a:d5:f6:a2:0e:86:26:09:4c:f5:
bc:29:9c:e3:d8:96:a6:9e:8b:61:45:86:45:2a:f6:
49:95:e0:54:4d:b2:04:7b:4e:99:df:9c:85:da:73:
39:b5:2f:c6:c8:f0:94:da:54:a1:f2:5e:47:12:f7:
66:7a:d6:5e:75:40:b2:a3:cc:e1:88:08:cd:b4:71:
5d:ea:09:e1:16:ec:e7:b7:1c:ed:38:e1:75:d0:52:
5f:d2:99:1f:bd:09:74
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
3F:B0:AE:3D:51:35:A3:D4:A4:D9:0D:EE:B1:C4:0C:5B:28:D0:03:3F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:1b:f3:e3:3c:be:7e:ae:2e:82:8a:46:80:80:c5:
4d:d8:8a:bd:9e:d7:0d:6c:ed:c9:a7:7c:e2:aa:14:b3:fc:b4:
23:78:6d:7d:32:bc:b4:a7:47:52:43:44:21:ac:d1:c8:02:30:
4b:db:b6:87:f7:2b:70:f6:6c:24:14:d0:d3:c2:33:d3:3f:c1:
c1:86:e2:07:b6:88:c7:64:46:b0:aa:9b:75:5f:47:36:86:0e:
56:69:b0:3b:46:8b:d9:53:c3:41:7e:f4
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.77s
Truncated 881 bytes from beginning
e
5,519,575 UART: [art] Populate DV Done
5,527,691 UART: [fht] FMC Alias Private Key: 7
5,528,699 UART: [art] Derive CDI
5,528,979 UART: [art] Store in in slot 0x4
5,614,562 UART: [art] Derive Key Pair
5,614,922 UART: [art] Store priv key in slot 0x5
5,627,904 UART: [art] Derive Key Pair - Done
5,642,584 UART: [art] Signing Cert with AUTHO
5,643,064 UART: RITY.KEYID = 7
5,658,428 UART: [art] Erasing AUTHORITY.KEYID = 7
5,659,193 UART: [art] PUB.X = 621AE8FBC140179A2B0431F07C849852B8B4F7E0E6048223044844FA87A85FDC0EECD704165FCEB156738F79C3F6CA5D
5,665,954 UART: [art] PUB.Y = BF070675B7E0EA8818EDC3F26424DC09461FBEE11CA6711EBE4BAD64F7764FCA8D86D06C27BAC1E7A750CCCE5736A353
5,672,915 UART: [art] SIG.R = 73E054D8F9F981B3FEFEA109CE240F50B2D6A15E4A692F14A69A6643580E8CB50353E00FB6B9987DD0D657D8B1EC5690
5,679,678 UART: [art] SIG.S = E1ABBBB7C3B54CD2CFDDFB660008F7601B19FFF3EF86F4EEC9CF533AEF1E4CA9A2843CD6EA8AC08A168964DA2C302039
5,703,148 UART: Caliptra RT
5,703,401 UART: [state] CFI Enabled
5,811,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,841,999 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,878 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,923,213 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:4b:df:b5:78:8c:8c:07:3a:65:ff:ba:a5:6f:c3:85:f5:6f:1f:05
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9A4BDFB5788C8C073A65FFBAA56FC385F56F1F050573B78A48571C876C00EF13
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:1a:e8:fb:c1:40:17:9a:2b:04:31:f0:7c:84:
98:52:b8:b4:f7:e0:e6:04:82:23:04:48:44:fa:87:
a8:5f:dc:0e:ec:d7:04:16:5f:ce:b1:56:73:8f:79:
c3:f6:ca:5d:bf:07:06:75:b7:e0:ea:88:18:ed:c3:
f2:64:24:dc:09:46:1f:be:e1:1c:a6:71:1e:be:4b:
ad:64:f7:76:4f:ca:8d:86:d0:6c:27:ba:c1:e7:a7:
50:cc:ce:57:36:a3:53
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
9A:4B:DF:B5:78:8C:8C:07:3A:65:FF:BA:A5:6F:C3:85:F5:6F:1F:05
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:73:e0:54:d8:f9:f9:81:b3:fe:fe:a1:09:ce:24:
0f:50:b2:d6:a1:5e:4a:69:2f:14:a6:9a:66:43:58:0e:8c:b5:
03:53:e0:0f:b6:b9:98:7d:d0:d6:57:d8:b1:ec:56:90:02:31:
00:e1:ab:bb:b7:c3:b5:4c:d2:cf:dd:fb:66:00:08:f7:60:1b:
19:ff:f3:ef:86:f4:ee:c9:cf:53:3a:ef:1e:4c:a9:a2:84:3c:
d6:ea:8a:c0:8a:16:89:64:da:2c:30:20:39
5,934,021 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,930,074 >>> mbox cmd response: success
10,943,400 UART:
10,943,416 UART: Running Caliptra FMC ...
10,943,824 UART:
10,943,878 UART: [state] CFI Enabled
11,032,605 UART: [art] Extend RT PCRs Done
11,033,033 UART: [art] Lock RT PCRs Done
11,034,586 UART: [art] Populate DV Done
11,042,586 UART: [fht] FMC Alias Private Key: 7
11,043,558 UART: [art] Derive CDI
11,043,838 UART: [art] Store in in slot 0x4
11,129,183 UART: [art] Derive Key Pair
11,129,543 UART: [art] Store priv key in slot 0x5
11,142,325 UART: [art] Derive Key Pair - Done
11,157,052 UART: [art] Signing Cert with AUTHO
11,157,532 UART: RITY.KEYID = 7
11,173,330 UART: [art] Erasing AUTHORITY.KEYID = 7
11,174,095 UART: [art] PUB.X = 4033919D8F3FE2D94DB1F2BE6B0CBF498FF1F06DD8035B4A8E7D6DB2A7C09044701913C4507792C07DC942E2FCC967A1
11,180,869 UART: [art] PUB.Y = 69CC03BAEDAA3B6E7C8A85B3BF89E05F7EFA53FEE3715E0995F1E9F57F39261C3124BA45EDB4E64F3EC570922FB8B1F4
11,187,835 UART: [art] SIG.R = 02492DCC3C0EA3DA126BB00800A0E14AE276484F577BD2C1079907A2F9F91DC255857E16CEEFAB7EAE63A33FEEAB4FDA
11,194,590 UART: [art] SIG.S = 7949E59F4AA2C476FB5939C0A060CBAA41E35B95D983172950372BCCA6F7AC1E0E9B584B0496F86BB2B891162D465A89
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:e9:7d:26:92:0a:d2:a6:28:28:cd:84:50:f0:b4:0f:0d:f4:34:ef
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=ECE97D26920AD2A62828CD8450F0B40F0DF434EF3C8458B361695DB121B55ED7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:40:33:91:9d:8f:3f:e2:d9:4d:b1:f2:be:6b:0c:
bf:49:8f:f1:f0:6d:d8:03:5b:4a:8e:7d:6d:b2:a7:
c0:90:44:70:19:13:c4:50:77:92:c0:7d:c9:42:e2:
fc:c9:67:a1:69:cc:03:ba:ed:aa:3b:6e:7c:8a:85:
b3:bf:89:e0:5f:7e:fa:53:fe:e3:71:5e:09:95:f1:
e9:f5:7f:39:26:1c:31:24:ba:45:ed:b4:e6:4f:3e:
c5:70:92:2f:b8:b1:f4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
EC:E9:7D:26:92:0A:D2:A6:28:28:CD:84:50:F0:B4:0F:0D:F4:34:EF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:02:49:2d:cc:3c:0e:a3:da:12:6b:b0:08:00:a0:
e1:4a:e2:76:48:4f:57:7b:d2:c1:07:99:07:a2:f9:f9:1d:c2:
55:85:7e:16:ce:ef:ab:7e:ae:63:a3:3f:ee:ab:4f:da:02:30:
79:49:e5:9f:4a:a2:c4:76:fb:59:39:c0:a0:60:cb:aa:41:e3:
5b:95:d9:83:17:29:50:37:2b:cc:a6:f7:ac:1e:0e:9b:58:4b:
04:96:f8:6b:b2:b8:91:16:2d:46:5a:89
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.84s
Truncated 5404 bytes from beginning
c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,592 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,952,509 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:77:13:b1:53:7c:c1:b4:b0:87:f2:e3:d4:34:ec:4f:0d:52:67:ca
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=067713B1537CC1B4B087F2E3D434EC4F0D5267CA282C966E0C3108C6C492142B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:64:74:5b:c5:5c:29:98:c4:6c:cc:e6:d0:bf:70:
82:79:c3:9f:83:54:e0:b3:91:b9:f6:e7:09:be:62:
90:ca:45:30:2c:12:f7:e3:de:b3:61:4a:38:12:16:
1f:36:66:98:22:b5:cd:03:9d:0c:09:1e:f3:61:5f:
39:bf:60:ac:f7:c2:32:3a:29:29:ec:ab:26:c2:8a:
73:42:e0:97:6a:ee:8f:15:44:70:ef:c9:f6:86:6d:
71:eb:e8:59:c8:fd:66
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
06:77:13:B1:53:7C:C1:B4:B0:87:F2:E3:D4:34:EC:4F:0D:52:67:CA
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:39:e7:9c:5b:ca:12:bf:be:30:cc:2f:5c:30:64:
aa:66:2d:da:e2:38:15:09:4a:92:53:b2:e2:25:dc:7f:71:e4:
ed:e5:aa:f6:52:87:3a:c3:4f:dd:39:db:02:55:18:e7:02:30:
46:c0:25:0a:bf:da:1b:9e:21:fc:d4:2b:14:ed:66:7f:b6:57:
83:a4:da:5d:cd:c8:f7:c8:c8:45:b2:9f:08:4b:9c:a0:30:05:
ef:c9:fd:e4:70:48:31:08:87:7e:f2:3c
5,963,201 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,963,996 UART:
5,964,012 UART: Running Caliptra ROM ...
5,964,420 UART:
5,964,561 UART: [state] CFI Enabled
5,967,842 UART: [state] LifecycleState = Production
5,968,450 UART: [state] DebugLocked = Yes
5,969,040 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,970,677 UART: [kat] SHA2-256
6,764,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,768,723 UART: [kat] ++
6,768,875 UART: [kat] sha1
6,773,163 UART: [kat] SHA2-256
6,775,101 UART: [kat] SHA2-384
6,777,738 UART: [kat] SHA2-512-ACC
6,779,638 UART: [kat] ECC-384
6,785,135 UART: [kat] HMAC-384Kdf
6,789,817 UART: [kat] LMS
7,358,013 UART: [kat] --
7,359,120 UART: [update-reset] ++
11,080,313 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,081,377 UART: [update-reset] Loading Runtime at address 0x40005000 len 87624
11,228,217 >>> mbox cmd response: success
11,228,415 UART: [update-reset] Copying MAN_2 To MAN_1
11,236,427 UART: [update-reset Success] --
11,237,254 UART: [state] Locking Datavault
11,238,172 UART: [state] Locking PCR0, PCR1 and PCR31
11,238,776 UART: [state] Locking ICCM
11,239,358 UART: [exit] Launching FMC @ 0x40000130
11,244,687 UART:
11,244,703 UART: Running Caliptra FMC ...
11,245,111 UART:
11,245,254 UART: [state] CFI Enabled
11,334,369 UART: [art] Extend RT PCRs Done
11,334,797 UART: [art] Lock RT PCRs Done
11,336,286 UART: [art] Populate DV Done
11,344,638 UART: [fht] FMC Alias Private Key: 7
11,345,676 UART: [art] Derive CDI
11,345,956 UART: [art] Store in in slot 0x4
11,431,277 UART: [art] Derive Key Pair
11,431,637 UART: [art] Store priv key in slot 0x5
11,444,895 UART: [art] Derive Key Pair - Done
11,459,862 UART: [art] Signing Cert with AUTHO
11,460,342 UART: RITY.KEYID = 7
11,475,362 UART: [art] Erasing AUTHORITY.KEYID = 7
11,476,127 UART: [art] PUB.X = 55D928A4271B1D60D720FCF99E7A26E8B7C8EB2C7A5EAA3C6B6367F21AD1708C88B69CEA627537A622352AA1920623F5
11,482,900 UART: [art] PUB.Y = 8053A8EC626D28A6B7025EB39F4FFAE2DD99080579990E83A049F9659EFC351FF1BA5FE140B46D820FCAF561ACDF43FB
11,489,851 UART: [art] SIG.R = B09BBB0EE8F155068314C1C5EC09718D4C418F70FD010F3A62FEF0ACBC7BE3B8FBA05EE73819973F2427B9CC87F43A4D
11,496,624 UART: [art] SIG.S = 96AE50A595204F2A657027226AD3ECBCDCC7AB26F77244B07063EA984F1880D1A82F535012A7BECB5C89362C24409199
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:01:1b:74:ba:bb:06:e2:66:a4:7f:5d:bb:d4:00:de:c5:1d:0e:bb
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DA011B74BABB06E266A47F5DBBD400DEC51D0EBBF8BCD6631C32585CFD56F88E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:55:d9:28:a4:27:1b:1d:60:d7:20:fc:f9:9e:7a:
26:e8:b7:c8:eb:2c:7a:5e:aa:3c:6b:63:67:f2:1a:
d1:70:8c:88:b6:9c:ea:62:75:37:a6:22:35:2a:a1:
92:06:23:f5:80:53:a8:ec:62:6d:28:a6:b7:02:5e:
b3:9f:4f:fa:e2:dd:99:08:05:79:99:0e:83:a0:49:
f9:65:9e:fc:35:1f:f1:ba:5f:e1:40:b4:6d:82:0f:
ca:f5:61:ac:df:43:fb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
DA:01:1B:74:BA:BB:06:E2:66:A4:7F:5D:BB:D4:00:DE:C5:1D:0E:BB
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:b0:9b:bb:0e:e8:f1:55:06:83:14:c1:c5:ec:
09:71:8d:4c:41:8f:70:fd:01:0f:3a:62:fe:f0:ac:bc:7b:e3:
b8:fb:a0:5e:e7:38:19:97:3f:24:27:b9:cc:87:f4:3a:4d:02:
31:00:96:ae:50:a5:95:20:4f:2a:65:70:27:22:6a:d3:ec:bc:
dc:c7:ab:26:f7:72:44:b0:70:63:ea:98:4f:18:80:d1:a8:2f:
53:50:12:a7:be:cb:5c:89:36:2c:24:40:91:99
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.91s
Truncated 887 bytes from beginning
405,982 UART: [art] Populate DV Done
5,414,196 UART: [fht] FMC Alias Private Key: 7
5,415,276 UART: [art] Derive CDI
5,415,556 UART: [art] Store in in slot 0x4
5,501,353 UART: [art] Derive Key Pair
5,501,713 UART: [art] Store priv key in slot 0x5
5,514,953 UART: [art] Derive Key Pair - Done
5,529,694 UART: [art] Signing Cert with AUTHO
5,530,174 UART: RITY.KEYID = 7
5,545,548 UART: [art] Erasing AUTHORITY.KEYID = 7
5,546,313 UART: [art] PUB.X = 9A9298A0D0D81E68378FB74240864ED87F536B5C1931703222A2CBA04079375E7223605CBCA2E5219C07E26AF871EB05
5,553,071 UART: [art] PUB.Y = 186DC4D3B8FB00A1F32052455B6B54D5C388AEED6FD10B4365B23B447AA3136B318F059845996BB5B94BD040F1EEEDAC
5,560,005 UART: [art] SIG.R = 16EF04005CBF1FD8451D5577C01EEDD761EF022BEF8B0F82108DCACE3D14A21B602192D9275E91C6DEF75E9041AA3CBE
5,566,762 UART: [art] SIG.S = D90DDF6F519C84656CCA5A536EA8FFDE355F35543CCE2D74CBFC816851073AB4F2BD6AD01EC3FD543D7EA84C7DE07A95
5,590,333 UART: Caliptra RT
5,590,678 UART: [state] CFI Enabled
5,698,615 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,728,966 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,768,699 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,810,280 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:b4:33:e4:5d:21:e0:d5:d5:97:86:b3:be:42:34:3c:8e:81:ed:88
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3FB433E45D21E0D5D59786B3BE42343C8E81ED88E5A7497474A201781A1CBE59
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9a:92:98:a0:d0:d8:1e:68:37:8f:b7:42:40:86:
4e:d8:7f:53:6b:5c:19:31:70:32:22:a2:cb:a0:40:
79:37:5e:72:23:60:5c:bc:a2:e5:21:9c:07:e2:6a:
f8:71:eb:05:18:6d:c4:d3:b8:fb:00:a1:f3:20:52:
45:5b:6b:54:d5:c3:88:ae:ed:6f:d1:0b:43:65:b2:
3b:44:7a:a3:13:6b:31:8f:05:98:45:99:6b:b5:b9:
4b:d0:40:f1:ee:ed:ac
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
3F:B4:33:E4:5D:21:E0:D5:D5:97:86:B3:BE:42:34:3C:8E:81:ED:88
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:16:ef:04:00:5c:bf:1f:d8:45:1d:55:77:c0:1e:
ed:d7:61:ef:02:2b:ef:8b:0f:82:10:8d:ca:ce:3d:14:a2:1b:
60:21:92:d9:27:5e:91:c6:de:f7:5e:90:41:aa:3c:be:02:31:
00:d9:0d:df:6f:51:9c:84:65:6c:ca:5a:53:6e:a8:ff:de:35:
5f:35:54:3c:ce:2d:74:cb:fc:81:68:51:07:3a:b4:f2:bd:6a:
d0:1e:c3:fd:54:3d:7e:a8:4c:7d:e0:7a:95
5,821,296 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,968,788 >>> mbox cmd response: success
10,981,906 UART:
10,981,922 UART: Running Caliptra FMC ...
10,982,330 UART:
10,982,473 UART: [state] CFI Enabled
11,071,796 UART: [art] Extend RT PCRs Done
11,072,224 UART: [art] Lock RT PCRs Done
11,073,545 UART: [art] Populate DV Done
11,082,121 UART: [fht] FMC Alias Private Key: 7
11,083,147 UART: [art] Derive CDI
11,083,427 UART: [art] Store in in slot 0x4
11,168,784 UART: [art] Derive Key Pair
11,169,144 UART: [art] Store priv key in slot 0x5
11,182,616 UART: [art] Derive Key Pair - Done
11,197,870 UART: [art] Signing Cert with AUTHO
11,198,350 UART: RITY.KEYID = 7
11,213,444 UART: [art] Erasing AUTHORITY.KEYID = 7
11,214,209 UART: [art] PUB.X = 8459CD247BA8A554FA14B3B0F4DEEC807F996B00A00281A754DCFD19DE50A14FB2060639B409A4F5E5E696743F30CBD3
11,220,955 UART: [art] PUB.Y = 4B1CBAF5B51E3A9FD1340C8A846D2F1D338E8EB139C629F8ADA548E549F0433DDC41BA410E154BB74CE0A5423FA8F502
11,227,912 UART: [art] SIG.R = 87E05BA8DD93C4AFC259C884AEEE4EBBF1255879C060420BCF0727041D8E33E5A52D25A1B75F6616301DBC32B5BF9D27
11,234,685 UART: [art] SIG.S = DDEB97177ADE26ACE8161DEFE0B2CCF7D4839119E8DF7951B520DB6EC1BBED99D9DFA540D3AA5F92920820FC83A92035
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:ed:18:59:17:03:6b:5f:79:e9:9d:d2:98:35:d7:2e:b3:81:1d:f7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=27ED185917036B5F79E99DD29835D72EB3811DF7201DEB116FFB30775BB5BE16
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:59:cd:24:7b:a8:a5:54:fa:14:b3:b0:f4:de:
ec:80:7f:99:6b:00:a0:02:81:a7:54:dc:fd:19:de:
50:a1:4f:b2:06:06:39:b4:09:a4:f5:e5:e6:96:74:
3f:30:cb:d3:4b:1c:ba:f5:b5:1e:3a:9f:d1:34:0c:
8a:84:6d:2f:1d:33:8e:8e:b1:39:c6:29:f8:ad:a5:
48:e5:49:f0:43:3d:dc:41:ba:41:0e:15:4b:b7:4c:
e0:a5:42:3f:a8:f5:02
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
27:ED:18:59:17:03:6B:5F:79:E9:9D:D2:98:35:D7:2E:B3:81:1D:F7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:87:e0:5b:a8:dd:93:c4:af:c2:59:c8:84:ae:
ee:4e:bb:f1:25:58:79:c0:60:42:0b:cf:07:27:04:1d:8e:33:
e5:a5:2d:25:a1:b7:5f:66:16:30:1d:bc:32:b5:bf:9d:27:02:
31:00:dd:eb:97:17:7a:de:26:ac:e8:16:1d:ef:e0:b2:cc:f7:
d4:83:91:19:e8:df:79:51:b5:20:db:6e:c1:bb:ed:99:d9:df:
a5:40:d3:aa:5f:92:92:08:20:fc:83:a9:20:35
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.89s
Truncated 5295 bytes from beginning
al=0, next_pc=40005400
3,869,568 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,171 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,008 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:5e:be:c1:65:70:3b:a6:b4:10:95:a0:2b:7e:6b:bc:bc:0d:0d:1e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6C5EBEC165703BA6B41095A02B7E6BBCBC0D0D1EA5121EFA6C4195CF56CE0BDC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2d:78:b3:d8:be:a4:b0:79:2a:76:aa:11:3a:98:
26:0e:02:c0:53:b3:3d:34:64:5d:9a:a8:59:8b:d1:
ab:e4:e1:13:fd:68:96:2b:f4:16:4c:41:5c:ca:8c:
d5:41:ee:3e:f0:4a:1c:47:d3:dd:e0:36:14:f2:f8:
72:c1:10:62:7b:10:4c:0a:fc:19:b7:40:4a:15:8f:
61:2f:a8:e1:91:b8:e4:a6:ef:04:d9:a0:9e:91:c6:
70:09:71:fe:8c:47:21
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
6C:5E:BE:C1:65:70:3B:A6:B4:10:95:A0:2B:7E:6B:BC:BC:0D:0D:1E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:92:fc:78:d0:ec:e8:46:63:14:c4:62:a5:83:
cf:76:eb:23:a1:51:95:32:6f:90:23:ef:e8:e7:f9:5a:75:a7:
71:81:e5:7c:23:47:c6:01:1e:64:bf:36:bd:8d:f1:a0:eb:02:
30:09:73:35:72:f6:57:7b:65:49:4c:45:d9:42:a2:b2:d3:2b:
ae:d3:b3:6e:f0:25:93:5d:43:06:78:6e:2a:5f:70:d5:b0:dd:
cb:d4:09:39:a7:20:ae:36:ff:f2:bb:4b:03
3,961,840 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,844 UART:
3,962,860 UART: Running Caliptra ROM ...
3,963,268 UART:
3,963,323 UART: [state] CFI Enabled
3,966,368 UART: [state] LifecycleState = Production
3,966,976 UART: [state] DebugLocked = Yes
3,967,620 UART: [state] Starting the WD Timer 40000000 cycles
3,969,264 UART: [kat] SHA2-256
4,774,914 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,779,039 UART: [kat] ++
4,779,191 UART: [kat] sha1
4,783,409 UART: [kat] SHA2-256
4,785,349 UART: [kat] SHA2-384
4,788,136 UART: [kat] SHA2-512-ACC
4,790,036 UART: [kat] ECC-384
4,799,729 UART: [kat] HMAC-384Kdf
4,804,329 UART: [kat] LMS
5,052,657 UART: [kat] --
5,053,519 UART: [update-reset] ++
6,912,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,913,458 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,060,246 >>> mbox cmd response: success
7,060,432 UART: [update-reset] Copying MAN_2 To MAN_1
7,068,444 UART: [update-reset Success] --
7,069,459 UART: [state] Locking Datavault
7,070,377 UART: [state] Locking PCR0, PCR1 and PCR31
7,070,981 UART: [state] Locking ICCM
7,071,467 UART: [exit] Launching FMC @ 0x40000130
7,076,796 UART:
7,076,812 UART: Running Caliptra FMC ...
7,077,220 UART:
7,077,274 UART: [state] CFI Enabled
7,166,171 UART: [art] Extend RT PCRs Done
7,166,599 UART: [art] Lock RT PCRs Done
7,167,832 UART: [art] Populate DV Done
7,176,396 UART: [fht] FMC Alias Private Key: 7
7,177,454 UART: [art] Derive CDI
7,177,734 UART: [art] Store in in slot 0x4
7,263,381 UART: [art] Derive Key Pair
7,263,741 UART: [art] Store priv key in slot 0x5
7,276,561 UART: [art] Derive Key Pair - Done
7,291,334 UART: [art] Signing Cert with AUTHO
7,291,814 UART: RITY.KEYID = 7
7,306,926 UART: [art] Erasing AUTHORITY.KEYID = 7
7,307,691 UART: [art] PUB.X = B01EF6E1BEF831FECDB1AA109E6C423C5F153275B127B512B885C2C6B3835EA55E200572EE796C4B4369E3CCCC68A8F2
7,314,472 UART: [art] PUB.Y = 0EC34E54F84EEECE110D6C8DC92DC295686A45A360E3CE99B01159F3096103179A862D5CBB826D72E64BD7A65256D96C
7,321,416 UART: [art] SIG.R = 3E04B0DC2D23936BF0699BE7EDF282592578572AE9C555D0988B829525ADBF02570DA051BA2563CEE926A356715BAA31
7,328,179 UART: [art] SIG.S = 381BF5820346FB1D0DF1EA6F4E329A6F8C2DFECEB4AC4D98173A0DCEB55A5D84E23E2D739170D758848DD332960E28CD
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:96:5b:e1:2f:ec:78:b4:5b:aa:9f:72:7a:0b:31:eb:38:ea:e6:16
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=93965BE12FEC78B45BAA9F727A0B31EB38EAE616E924DA3C2F762265D55B3A83
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b0:1e:f6:e1:be:f8:31:fe:cd:b1:aa:10:9e:6c:
42:3c:5f:15:32:75:b1:27:b5:12:b8:85:c2:c6:b3:
83:5e:a5:5e:20:05:72:ee:79:6c:4b:43:69:e3:cc:
cc:68:a8:f2:0e:c3:4e:54:f8:4e:ee:ce:11:0d:6c:
8d:c9:2d:c2:95:68:6a:45:a3:60:e3:ce:99:b0:11:
59:f3:09:61:03:17:9a:86:2d:5c:bb:82:6d:72:e6:
4b:d7:a6:52:56:d9:6c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
93:96:5B:E1:2F:EC:78:B4:5B:AA:9F:72:7A:0B:31:EB:38:EA:E6:16
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:3e:04:b0:dc:2d:23:93:6b:f0:69:9b:e7:ed:f2:
82:59:25:78:57:2a:e9:c5:55:d0:98:8b:82:95:25:ad:bf:02:
57:0d:a0:51:ba:25:63:ce:e9:26:a3:56:71:5b:aa:31:02:30:
38:1b:f5:82:03:46:fb:1d:0d:f1:ea:6f:4e:32:9a:6f:8c:2d:
fe:ce:b4:ac:4d:98:17:3a:0d:ce:b5:5a:5d:84:e2:3e:2d:73:
91:70:d7:58:84:8d:d3:32:96:0e:28:cd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.10s
Truncated 851 bytes from beginning
2 UART: [art] Lock RT PCRs Done
3,379,484 UART: [art] Populate DV Done
3,387,736 UART: [fht] FMC Alias Private Key: 7
3,388,724 UART: [art] Derive CDI
3,389,004 UART: [art] Store in in slot 0x4
3,474,613 UART: [art] Derive Key Pair
3,474,973 UART: [art] Store priv key in slot 0x5
3,488,295 UART: [art] Derive Key Pair - Done
3,503,212 UART: [art] Signing Cert with AUTHO
3,503,692 UART: RITY.KEYID = 7
3,519,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,520,021 UART: [art] PUB.X = 1B532ADF07B77C10139081EBDB2376B3A2E03FB785D142DE52C6ECC4039F4EFE34DA0E174C823EE91794CF5D7182DB22
3,526,794 UART: [art] PUB.Y = 97769292705F59B4611841959E699CD406269D8F391C79E5E32C3667EB087C9390FAF7A9063CE8C72499780E1C167021
3,533,716 UART: [art] SIG.R = DB984CA560DE45CA1F1969BDE3EB746CB95CFD38BCFC924C78B2EC816BAB6F4161E05D4A407E762286775F1BDA38DC1A
3,540,508 UART: [art] SIG.S = 8B35DA557B2BF30FE16115D2934959B0EE33F5B191140F118ADE33767A352987A663075EAF42DEB954F49EA0824D0985
3,564,141 UART: Caliptra RT
3,564,394 UART: [state] CFI Enabled
3,672,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,098 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,809 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,784,380 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:7e:3c:bf:be:7b:f8:4c:39:bc:05:ec:34:97:ac:0d:2e:37:fb:62
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F37E3CBFBE7BF84C39BC05EC3497AC0D2E37FB621B3AFC9D538A0FE643899C13
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:1b:53:2a:df:07:b7:7c:10:13:90:81:eb:db:23:
76:b3:a2:e0:3f:b7:85:d1:42:de:52:c6:ec:c4:03:
9f:4e:fe:34:da:0e:17:4c:82:3e:e9:17:94:cf:5d:
71:82:db:22:97:76:92:92:70:5f:59:b4:61:18:41:
95:9e:69:9c:d4:06:26:9d:8f:39:1c:79:e5:e3:2c:
36:67:eb:08:7c:93:90:fa:f7:a9:06:3c:e8:c7:24:
99:78:0e:1c:16:70:21
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
F3:7E:3C:BF:BE:7B:F8:4C:39:BC:05:EC:34:97:AC:0D:2E:37:FB:62
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:db:98:4c:a5:60:de:45:ca:1f:19:69:bd:e3:
eb:74:6c:b9:5c:fd:38:bc:fc:92:4c:78:b2:ec:81:6b:ab:6f:
41:61:e0:5d:4a:40:7e:76:22:86:77:5f:1b:da:38:dc:1a:02:
31:00:8b:35:da:55:7b:2b:f3:0f:e1:61:15:d2:93:49:59:b0:
ee:33:f5:b1:91:14:0f:11:8a:de:33:76:7a:35:29:87:a6:63:
07:5e:af:42:de:b9:54:f4:9e:a0:82:4d:09:85
3,795,087 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,781,180 >>> mbox cmd response: success
6,794,699 UART:
6,794,715 UART: Running Caliptra FMC ...
6,795,123 UART:
6,795,177 UART: [state] CFI Enabled
6,884,214 UART: [art] Extend RT PCRs Done
6,884,642 UART: [art] Lock RT PCRs Done
6,885,809 UART: [art] Populate DV Done
6,894,051 UART: [fht] FMC Alias Private Key: 7
6,895,099 UART: [art] Derive CDI
6,895,379 UART: [art] Store in in slot 0x4
6,981,284 UART: [art] Derive Key Pair
6,981,644 UART: [art] Store priv key in slot 0x5
6,994,630 UART: [art] Derive Key Pair - Done
7,009,418 UART: [art] Signing Cert with AUTHO
7,009,898 UART: RITY.KEYID = 7
7,025,072 UART: [art] Erasing AUTHORITY.KEYID = 7
7,025,837 UART: [art] PUB.X = 06A5E9111652247D0FBF725E8D99CE20CBB97606DADAACEBC48E552CC8216104B755760500C1F69C408633CE62A204DC
7,032,573 UART: [art] PUB.Y = 30EEA36F44C000CE052C2EA6997893407766264F95358FFEC12DF8B69FC8F6508970E6F144BB432C9DA7C7C777AA3546
7,039,500 UART: [art] SIG.R = 0F7A0B0E36AB9143EF93567146B873F7D7697C7708BFAFF40DF06B30DF5DE17453D7D867E0B48C58E38B8EF088905AB8
7,046,263 UART: [art] SIG.S = A593DD9952ED449C995E90134F13FDD5A1BB802040C8E3CA37D96AFCE2C0C934D4E0396D49F26928D71A7FDDA1957E70
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:6f:50:09:cf:d5:21:9a:48:da:dc:50:46:fe:d2:69:0c:e4:a3:a2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BF6F5009CFD5219A48DADC5046FED2690CE4A3A2F1788D7B6021642429088E03
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:06:a5:e9:11:16:52:24:7d:0f:bf:72:5e:8d:99:
ce:20:cb:b9:76:06:da:da:ac:eb:c4:8e:55:2c:c8:
21:61:04:b7:55:76:05:00:c1:f6:9c:40:86:33:ce:
62:a2:04:dc:30:ee:a3:6f:44:c0:00:ce:05:2c:2e:
a6:99:78:93:40:77:66:26:4f:95:35:8f:fe:c1:2d:
f8:b6:9f:c8:f6:50:89:70:e6:f1:44:bb:43:2c:9d:
a7:c7:c7:77:aa:35:46
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
BF:6F:50:09:CF:D5:21:9A:48:DA:DC:50:46:FE:D2:69:0C:E4:A3:A2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0f:7a:0b:0e:36:ab:91:43:ef:93:56:71:46:b8:
73:f7:d7:69:7c:77:08:bf:af:f4:0d:f0:6b:30:df:5d:e1:74:
53:d7:d8:67:e0:b4:8c:58:e3:8b:8e:f0:88:90:5a:b8:02:31:
00:a5:93:dd:99:52:ed:44:9c:99:5e:90:13:4f:13:fd:d5:a1:
bb:80:20:40:c8:e3:ca:37:d9:6a:fc:e2:c0:c9:34:d4:e0:39:
6d:49:f2:69:28:d7:1a:7f:dd:a1:95:7e:70
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 5295 bytes from beginning
al=0, next_pc=40005400
3,868,294 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,741 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,302 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:fe:40:61:74:ee:3d:92:cb:14:c6:d9:e7:84:07:91:8a:1d:34:58
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=21FE406174EE3D92CB14C6D9E78407918A1D345846980AFF5D539EE3DF5FA358
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c6:8f:1f:77:19:60:df:bf:aa:98:a8:86:44:ce:
f4:e6:86:b9:0c:dd:a2:13:9d:46:c0:67:c4:a4:fd:
de:dc:02:04:c8:89:81:bf:52:a2:87:e3:96:c7:63:
87:9d:8f:e9:3f:bd:8b:f4:38:70:96:b6:23:07:61:
f3:5d:e6:18:f0:70:30:cb:47:53:b3:1b:3b:44:34:
cc:48:6c:fe:55:f8:09:e5:1c:ac:2f:99:d3:cd:00:
d3:ab:4a:51:4b:1c:ce
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
21:FE:40:61:74:EE:3D:92:CB:14:C6:D9:E7:84:07:91:8A:1D:34:58
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b3:cf:47:71:83:36:de:8a:c9:fc:76:d6:64:
b0:e0:e9:6c:45:6f:d0:b6:6d:c8:25:7b:bf:ae:ff:c9:dd:f9:
2d:56:f9:db:cb:ed:25:3f:3e:ac:10:c1:14:6b:bc:80:d7:02:
30:72:da:d2:0f:f9:b5:63:9f:33:c9:9a:2e:df:31:ba:e7:db:
81:01:76:b3:ee:33:78:1e:a5:be:a7:d7:97:b1:70:69:68:9b:
d2:55:dc:65:df:89:74:a3:76:4f:63:8e:35
3,959,914 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,960,570 UART:
3,960,586 UART: Running Caliptra ROM ...
3,960,994 UART:
3,961,136 UART: [state] CFI Enabled
3,963,941 UART: [state] LifecycleState = Production
3,964,549 UART: [state] DebugLocked = Yes
3,965,233 UART: [state] Starting the WD Timer 40000000 cycles
3,966,919 UART: [kat] SHA2-256
4,772,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,776,694 UART: [kat] ++
4,776,846 UART: [kat] sha1
4,781,294 UART: [kat] SHA2-256
4,783,234 UART: [kat] SHA2-384
4,786,173 UART: [kat] SHA2-512-ACC
4,788,073 UART: [kat] ECC-384
4,797,886 UART: [kat] HMAC-384Kdf
4,802,364 UART: [kat] LMS
5,050,692 UART: [kat] --
5,051,416 UART: [update-reset] ++
6,916,627 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,917,666 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,064,454 >>> mbox cmd response: success
7,064,784 UART: [update-reset] Copying MAN_2 To MAN_1
7,072,796 UART: [update-reset Success] --
7,073,769 UART: [state] Locking Datavault
7,074,749 UART: [state] Locking PCR0, PCR1 and PCR31
7,075,353 UART: [state] Locking ICCM
7,076,015 UART: [exit] Launching FMC @ 0x40000130
7,081,344 UART:
7,081,360 UART: Running Caliptra FMC ...
7,081,768 UART:
7,081,911 UART: [state] CFI Enabled
7,170,738 UART: [art] Extend RT PCRs Done
7,171,166 UART: [art] Lock RT PCRs Done
7,172,525 UART: [art] Populate DV Done
7,180,611 UART: [fht] FMC Alias Private Key: 7
7,181,591 UART: [art] Derive CDI
7,181,871 UART: [art] Store in in slot 0x4
7,267,700 UART: [art] Derive Key Pair
7,268,060 UART: [art] Store priv key in slot 0x5
7,281,554 UART: [art] Derive Key Pair - Done
7,296,456 UART: [art] Signing Cert with AUTHO
7,296,936 UART: RITY.KEYID = 7
7,312,266 UART: [art] Erasing AUTHORITY.KEYID = 7
7,313,031 UART: [art] PUB.X = 555ED270F0233168E949484FB487232BA2A2D47436A2328AE89513B673FE2A6785DFB54A6B41E80351E4B11D8BE07828
7,319,792 UART: [art] PUB.Y = F4C8DF2624988020277AB5141D2C169A30FDCCFCF5740368378A72B3916911314082FDCD89864C7C4F84C64863D78F6B
7,326,735 UART: [art] SIG.R = 37B591E365CE8CA75157AC6E431FEF212BC3BD76B856A742C0D5B41F1E9DB276E0819436FDBC6974821F8506D0282D6A
7,333,508 UART: [art] SIG.S = 045EF81D591623C833F54DC95E12246BA7760F69B919C1729D330BA551843A2AE1C718B5108ADDC74DA21523A2A77D01
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:a3:68:a1:89:b3:96:3a:38:23:59:a7:f6:fb:6a:91:c0:db:30:19
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D8A368A189B3963A382359A7F6FB6A91C0DB3019B3305F09E03157C94D346BE5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:55:5e:d2:70:f0:23:31:68:e9:49:48:4f:b4:87:
23:2b:a2:a2:d4:74:36:a2:32:8a:e8:95:13:b6:73:
fe:2a:67:85:df:b5:4a:6b:41:e8:03:51:e4:b1:1d:
8b:e0:78:28:f4:c8:df:26:24:98:80:20:27:7a:b5:
14:1d:2c:16:9a:30:fd:cc:fc:f5:74:03:68:37:8a:
72:b3:91:69:11:31:40:82:fd:cd:89:86:4c:7c:4f:
84:c6:48:63:d7:8f:6b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
D8:A3:68:A1:89:B3:96:3A:38:23:59:A7:F6:FB:6A:91:C0:DB:30:19
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:37:b5:91:e3:65:ce:8c:a7:51:57:ac:6e:43:1f:
ef:21:2b:c3:bd:76:b8:56:a7:42:c0:d5:b4:1f:1e:9d:b2:76:
e0:81:94:36:fd:bc:69:74:82:1f:85:06:d0:28:2d:6a:02:30:
04:5e:f8:1d:59:16:23:c8:33:f5:4d:c9:5e:12:24:6b:a7:76:
0f:69:b9:19:c1:72:9d:33:0b:a5:51:84:3a:2a:e1:c7:18:b5:
10:8a:dd:c7:4d:a2:15:23:a2:a7:7d:01
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 845 bytes from beginning
369,932 UART: [art] Lock RT PCRs Done
3,371,378 UART: [art] Populate DV Done
3,379,680 UART: [fht] FMC Alias Private Key: 7
3,380,810 UART: [art] Derive CDI
3,381,090 UART: [art] Store in in slot 0x4
3,466,119 UART: [art] Derive Key Pair
3,466,479 UART: [art] Store priv key in slot 0x5
3,479,453 UART: [art] Derive Key Pair - Done
3,494,491 UART: [art] Signing Cert with AUTHO
3,494,971 UART: RITY.KEYID = 7
3,510,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,511,000 UART: [art] PUB.X = 07A94C2EAC465750DA78EB34A16439884ABE4866974E33A068A54DD9A14DC60982E2606EF9153ECBCC7621E9FC414D5F
3,517,770 UART: [art] PUB.Y = 4C6C443560CD7151554859FB9BB0F016337A2D200E88969F30D0CBEE86F0CF5A8A1B149FBD4457BECD3CC940DBE8CC83
3,524,731 UART: [art] SIG.R = 34304D64B4CB466EA71B8F12390DF26613F5393FABD8E007A74914A15C23B9F2B31BAE7FCC0D770CF62FA5ACC085F136
3,531,501 UART: [art] SIG.S = E02A83E98FDC7D2022F61BDA6CD2831D2A258C5FE146F7BA1A4ADCACCE252D61A3BA34088750F424DC19E330505099D2
3,554,991 UART: Caliptra RT
3,555,336 UART: [state] CFI Enabled
3,662,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,138 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,049 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,242 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6e:fc:ac:f2:78:6c:21:8c:78:f7:a8:1b:d1:a6:89:6f:52:f1:c7:61
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6EFCACF2786C218C78F7A81BD1A6896F52F1C761A5E2B55D4BC690DF39745896
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:07:a9:4c:2e:ac:46:57:50:da:78:eb:34:a1:64:
39:88:4a:be:48:66:97:4e:33:a0:68:a5:4d:d9:a1:
4d:c6:09:82:e2:60:6e:f9:15:3e:cb:cc:76:21:e9:
fc:41:4d:5f:4c:6c:44:35:60:cd:71:51:55:48:59:
fb:9b:b0:f0:16:33:7a:2d:20:0e:88:96:9f:30:d0:
cb:ee:86:f0:cf:5a:8a:1b:14:9f:bd:44:57:be:cd:
3c:c9:40:db:e8:cc:83
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
6E:FC:AC:F2:78:6C:21:8C:78:F7:A8:1B:D1:A6:89:6F:52:F1:C7:61
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:34:30:4d:64:b4:cb:46:6e:a7:1b:8f:12:39:0d:
f2:66:13:f5:39:3f:ab:d8:e0:07:a7:49:14:a1:5c:23:b9:f2:
b3:1b:ae:7f:cc:0d:77:0c:f6:2f:a5:ac:c0:85:f1:36:02:31:
00:e0:2a:83:e9:8f:dc:7d:20:22:f6:1b:da:6c:d2:83:1d:2a:
25:8c:5f:e1:46:f7:ba:1a:4a:dc:ac:ce:25:2d:61:a3:ba:34:
08:87:50:f4:24:dc:19:e3:30:50:50:99:d2
3,784,992 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,769,127 >>> mbox cmd response: success
6,782,128 UART:
6,782,144 UART: Running Caliptra FMC ...
6,782,552 UART:
6,782,695 UART: [state] CFI Enabled
6,871,484 UART: [art] Extend RT PCRs Done
6,871,912 UART: [art] Lock RT PCRs Done
6,873,113 UART: [art] Populate DV Done
6,881,227 UART: [fht] FMC Alias Private Key: 7
6,882,271 UART: [art] Derive CDI
6,882,551 UART: [art] Store in in slot 0x4
6,968,112 UART: [art] Derive Key Pair
6,968,472 UART: [art] Store priv key in slot 0x5
6,981,342 UART: [art] Derive Key Pair - Done
6,995,948 UART: [art] Signing Cert with AUTHO
6,996,428 UART: RITY.KEYID = 7
7,011,992 UART: [art] Erasing AUTHORITY.KEYID = 7
7,012,757 UART: [art] PUB.X = 09A7AD8FBFB6338C487651B4C9B7EA5DC4FE38BE70B08BB8C41A77FD0A183983AA9073D93FF60D9F1DC9AB7A812A388F
7,019,538 UART: [art] PUB.Y = 6B647F047C62E47B8F6C227A50BB1A824EEBA436722BCDAAB977A18158DDFB54D05C2B5D5EEC3309E7BEC953705CB49E
7,026,500 UART: [art] SIG.R = 08FABD5DF557402C4E9F64112A2B17AA2B4EFAA9B8BB1ADEC2C70A851E01F879260D429956DDDF100158A49AB2CA6420
7,033,271 UART: [art] SIG.S = 1D9116F504CC28D9AE50289F2B82E243CCB99196A059B49F41D6DB9F1BD5BE42E7B5CD9E5B15DDC11AF69D7C1AFBD7C1
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
57:79:14:db:43:c6:58:0e:7f:7a:83:31:d0:f9:97:a6:63:67:ad:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=537914DB43C6580E7F7A8331D0F997A66367ADA02E7FCBB1C996C1F441ADA89F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:09:a7:ad:8f:bf:b6:33:8c:48:76:51:b4:c9:b7:
ea:5d:c4:fe:38:be:70:b0:8b:b8:c4:1a:77:fd:0a:
18:39:83:aa:90:73:d9:3f:f6:0d:9f:1d:c9:ab:7a:
81:2a:38:8f:6b:64:7f:04:7c:62:e4:7b:8f:6c:22:
7a:50:bb:1a:82:4e:eb:a4:36:72:2b:cd:aa:b9:77:
a1:81:58:dd:fb:54:d0:5c:2b:5d:5e:ec:33:09:e7:
be:c9:53:70:5c:b4:9e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
53:79:14:DB:43:C6:58:0E:7F:7A:83:31:D0:F9:97:A6:63:67:AD:A0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:08:fa:bd:5d:f5:57:40:2c:4e:9f:64:11:2a:2b:
17:aa:2b:4e:fa:a9:b8:bb:1a:de:c2:c7:0a:85:1e:01:f8:79:
26:0d:42:99:56:dd:df:10:01:58:a4:9a:b2:ca:64:20:02:30:
1d:91:16:f5:04:cc:28:d9:ae:50:28:9f:2b:82:e2:43:cc:b9:
91:96:a0:59:b4:9f:41:d6:db:9f:1b:d5:be:42:e7:b5:cd:9e:
5b:15:dd:c1:1a:f6:9d:7c:1a:fb:d7:c1
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.14s
Truncated 5298 bytes from beginning
0, next_pc=40005400
3,878,041 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,606 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,197 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:a6:63:0d:2e:7d:c5:35:48:2f:d2:ba:7e:72:0d:d5:9f:be:8b:1c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=34A6630D2E7DC535482FD2BA7E720DD59FBE8B1C355690768C42AF9E9A5168C3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:18:d8:d1:40:f4:2e:5f:af:ab:d9:8b:df:53:
4f:bb:06:fe:2c:01:0d:b7:0d:dd:2b:da:8c:2f:77:
aa:08:8b:cb:63:58:b5:e2:ef:9f:5c:da:ea:32:d4:
e3:fa:52:a6:d2:c3:0b:1f:bf:b0:24:07:8c:ea:e5:
75:d5:f3:cb:46:a1:fb:4f:22:3f:44:b0:3c:c6:41:
f6:f9:2c:83:71:e4:01:b8:9a:2a:7c:04:0d:1e:98:
a8:3c:d6:5a:ac:9d:06
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
34:A6:63:0D:2E:7D:C5:35:48:2F:D2:BA:7E:72:0D:D5:9F:BE:8B:1C
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:1e:5d:66:ed:cf:99:96:08:e0:85:20:d2:60:f5:
ec:aa:8b:3f:89:b7:28:f1:10:0e:94:20:f9:c0:f7:fa:d4:0d:
da:54:f2:a4:d3:16:6f:70:64:35:aa:f1:42:2c:90:06:02:31:
00:e9:fb:3f:70:08:8a:3b:06:71:7c:8c:5a:cc:6b:d1:c3:1c:
01:05:26:36:d4:d1:34:a5:55:e5:24:c8:e6:a3:38:e3:e6:ba:
be:f7:f1:dd:7d:0c:28:9e:3d:21:f2:6b:1e
3,970,037 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,977 UART:
3,970,993 UART: Running Caliptra ROM ...
3,971,401 UART:
3,971,456 UART: [state] CFI Enabled
3,974,169 UART: [state] LifecycleState = Production
3,974,777 UART: [state] DebugLocked = Yes
3,975,291 UART: [state] Starting the WD Timer 40000000 cycles
3,976,977 UART: [kat] SHA2-256
4,780,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,784,656 UART: [kat] ++
4,784,808 UART: [kat] sha1
4,788,944 UART: [kat] SHA2-256
4,790,884 UART: [kat] SHA2-384
4,793,465 UART: [kat] SHA2-512-ACC
4,795,365 UART: [kat] ECC-384
4,804,794 UART: [kat] HMAC-384Kdf
4,809,284 UART: [kat] LMS
5,057,596 UART: [kat] --
5,058,498 UART: [update-reset] ++
6,917,227 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,918,268 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,065,056 >>> mbox cmd response: success
7,065,310 UART: [update-reset] Copying MAN_2 To MAN_1
7,073,322 UART: [update-reset Success] --
7,074,411 UART: [state] Locking Datavault
7,075,365 UART: [state] Locking PCR0, PCR1 and PCR31
7,075,969 UART: [state] Locking ICCM
7,076,629 UART: [exit] Launching FMC @ 0x40000130
7,081,958 UART:
7,081,974 UART: Running Caliptra FMC ...
7,082,382 UART:
7,082,436 UART: [state] CFI Enabled
7,171,105 UART: [art] Extend RT PCRs Done
7,171,533 UART: [art] Lock RT PCRs Done
7,172,966 UART: [art] Populate DV Done
7,181,120 UART: [fht] FMC Alias Private Key: 7
7,182,286 UART: [art] Derive CDI
7,182,566 UART: [art] Store in in slot 0x4
7,268,209 UART: [art] Derive Key Pair
7,268,569 UART: [art] Store priv key in slot 0x5
7,281,805 UART: [art] Derive Key Pair - Done
7,296,719 UART: [art] Signing Cert with AUTHO
7,297,199 UART: RITY.KEYID = 7
7,312,367 UART: [art] Erasing AUTHORITY.KEYID = 7
7,313,132 UART: [art] PUB.X = D40C125283557F956B4BABEC5BA6557B6E9E2BCA53B84BA9AE6F8DAE59A6BB00E31AB422218F24E29E17DC3D7BEEF7FB
7,319,903 UART: [art] PUB.Y = F893EB5F3282AC60B29DBFAAEDDBC5B8D30FD4F73B593419E93B87A0297D4E730181CD45F50366123E9904C8328DBD67
7,326,851 UART: [art] SIG.R = 03A298D747D1F835A29BD935903165C73C08270C69D40E74CE475352F1C0EFA6BAED0131FE6BB9AA0AF277C0EBC954E8
7,333,613 UART: [art] SIG.S = 9A393F2597DC513E3E3EF6AB75529B072810E6B7476CF73AC4A40122EC3BA551EEF70E845E537C5C1D6A427592C78187
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:48:98:63:5e:c5:43:d6:3e:7d:7a:dc:96:d3:b2:0c:da:4e:91:c6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F74898635EC543D63E7D7ADC96D3B20CDA4E91C6C45338603A5A5C40BAC7C613
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d4:0c:12:52:83:55:7f:95:6b:4b:ab:ec:5b:a6:
55:7b:6e:9e:2b:ca:53:b8:4b:a9:ae:6f:8d:ae:59:
a6:bb:00:e3:1a:b4:22:21:8f:24:e2:9e:17:dc:3d:
7b:ee:f7:fb:f8:93:eb:5f:32:82:ac:60:b2:9d:bf:
aa:ed:db:c5:b8:d3:0f:d4:f7:3b:59:34:19:e9:3b:
87:a0:29:7d:4e:73:01:81:cd:45:f5:03:66:12:3e:
99:04:c8:32:8d:bd:67
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
F7:48:98:63:5E:C5:43:D6:3E:7D:7A:DC:96:D3:B2:0C:DA:4E:91:C6
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:03:a2:98:d7:47:d1:f8:35:a2:9b:d9:35:90:31:
65:c7:3c:08:27:0c:69:d4:0e:74:ce:47:53:52:f1:c0:ef:a6:
ba:ed:01:31:fe:6b:b9:aa:0a:f2:77:c0:eb:c9:54:e8:02:31:
00:9a:39:3f:25:97:dc:51:3e:3e:3e:f6:ab:75:52:9b:07:28:
10:e6:b7:47:6c:f7:3a:c4:a4:01:22:ec:3b:a5:51:ee:f7:0e:
84:5e:53:7c:5c:1d:6a:42:75:92:c7:81:87
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 851 bytes from beginning
0 UART: [art] Lock RT PCRs Done
3,363,096 UART: [art] Populate DV Done
3,371,368 UART: [fht] FMC Alias Private Key: 7
3,372,356 UART: [art] Derive CDI
3,372,636 UART: [art] Store in in slot 0x4
3,458,021 UART: [art] Derive Key Pair
3,458,381 UART: [art] Store priv key in slot 0x5
3,470,915 UART: [art] Derive Key Pair - Done
3,485,612 UART: [art] Signing Cert with AUTHO
3,486,092 UART: RITY.KEYID = 7
3,501,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,057 UART: [art] PUB.X = E09AF7D7A5E254592F67F820F77686BEC59811985E4297BB0DBCA77E002F4A4E719B83A4E3DE29EF07814A41CA8AD54B
3,508,809 UART: [art] PUB.Y = E9B6451241FABF0525E878AEA96602F11D743DF6A9125AA3ADA757AD811BCA220A03B4DBDC725B69BEB3D25CFB779654
3,515,763 UART: [art] SIG.R = FAE979FD02F75F0C17C25080D48AD0B588A5B82F4BC516C053941D3A732E493BAB16A618E0768615E47E821882B3CAB2
3,522,531 UART: [art] SIG.S = CEEA9ED7EC9A22050612C2392276EAABD1427A75FE26193B09A5DFF912CAC50250872DB0C0DBCB3653AF684D283B3AD7
3,545,980 UART: Caliptra RT
3,546,233 UART: [state] CFI Enabled
3,654,098 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,885 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,724,754 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,887 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
34:19:d2:b0:71:59:db:54:5b:82:b9:50:79:99:2c:a6:a3:13:cf:ec
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B019D2B07159DB545B82B95079992CA6A313CFEC96969181F59E874E73E6C238
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e0:9a:f7:d7:a5:e2:54:59:2f:67:f8:20:f7:76:
86:be:c5:98:11:98:5e:42:97:bb:0d:bc:a7:7e:00:
2f:4a:4e:71:9b:83:a4:e3:de:29:ef:07:81:4a:41:
ca:8a:d5:4b:e9:b6:45:12:41:fa:bf:05:25:e8:78:
ae:a9:66:02:f1:1d:74:3d:f6:a9:12:5a:a3:ad:a7:
57:ad:81:1b:ca:22:0a:03:b4:db:dc:72:5b:69:be:
b3:d2:5c:fb:77:96:54
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
B0:19:D2:B0:71:59:DB:54:5B:82:B9:50:79:99:2C:A6:A3:13:CF:EC
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:fa:e9:79:fd:02:f7:5f:0c:17:c2:50:80:d4:
8a:d0:b5:88:a5:b8:2f:4b:c5:16:c0:53:94:1d:3a:73:2e:49:
3b:ab:16:a6:18:e0:76:86:15:e4:7e:82:18:82:b3:ca:b2:02:
31:00:ce:ea:9e:d7:ec:9a:22:05:06:12:c2:39:22:76:ea:ab:
d1:42:7a:75:fe:26:19:3b:09:a5:df:f9:12:ca:c5:02:50:87:
2d:b0:c0:db:cb:36:53:af:68:4d:28:3b:3a:d7
3,776,740 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,554 >>> mbox cmd response: success
6,766,053 UART:
6,766,069 UART: Running Caliptra FMC ...
6,766,477 UART:
6,766,531 UART: [state] CFI Enabled
6,855,426 UART: [art] Extend RT PCRs Done
6,855,854 UART: [art] Lock RT PCRs Done
6,856,953 UART: [art] Populate DV Done
6,865,153 UART: [fht] FMC Alias Private Key: 7
6,866,153 UART: [art] Derive CDI
6,866,433 UART: [art] Store in in slot 0x4
6,951,770 UART: [art] Derive Key Pair
6,952,130 UART: [art] Store priv key in slot 0x5
6,965,354 UART: [art] Derive Key Pair - Done
6,980,033 UART: [art] Signing Cert with AUTHO
6,980,513 UART: RITY.KEYID = 7
6,995,829 UART: [art] Erasing AUTHORITY.KEYID = 7
6,996,594 UART: [art] PUB.X = 6F55330A757DCE63B157BB1024DE54F351301E626E6F517D3AA17CC099BC78BF52540B247B32519D5DBA4FE40DD61A2F
7,003,363 UART: [art] PUB.Y = 73A9B2611CDB309752A566364673472BAD242B6082CAA72142C2A60CBB5AA6903D2E8046B6C1C5F24CD148CF2C42D0A8
7,010,314 UART: [art] SIG.R = 0B4C357D6C4BB9C6CAA65815E85583CF005AE8D3AC0E8A13898BB12302E7A7B79A78181616DCEB3B9ABABD8066BC6347
7,017,067 UART: [art] SIG.S = AF0332341A1F5EFF82D210FBC00A0BA46FF9817EABB04684B79FA2660C0F3203EF8FBE374D0A2AB0AB87617B0D708727
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:ef:37:06:b4:c0:f6:e2:b3:f4:29:de:bb:cd:ea:40:ca:61:1d:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FAEF3706B4C0F6E2B3F429DEBBCDEA40CA611D677AE7BF0D651E17C1B14F456E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6f:55:33:0a:75:7d:ce:63:b1:57:bb:10:24:de:
54:f3:51:30:1e:62:6e:6f:51:7d:3a:a1:7c:c0:99:
bc:78:bf:52:54:0b:24:7b:32:51:9d:5d:ba:4f:e4:
0d:d6:1a:2f:73:a9:b2:61:1c:db:30:97:52:a5:66:
36:46:73:47:2b:ad:24:2b:60:82:ca:a7:21:42:c2:
a6:0c:bb:5a:a6:90:3d:2e:80:46:b6:c1:c5:f2:4c:
d1:48:cf:2c:42:d0:a8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
FA:EF:37:06:B4:C0:F6:E2:B3:F4:29:DE:BB:CD:EA:40:CA:61:1D:67
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:0b:4c:35:7d:6c:4b:b9:c6:ca:a6:58:15:e8:55:
83:cf:00:5a:e8:d3:ac:0e:8a:13:89:8b:b1:23:02:e7:a7:b7:
9a:78:18:16:16:dc:eb:3b:9a:ba:bd:80:66:bc:63:47:02:31:
00:af:03:32:34:1a:1f:5e:ff:82:d2:10:fb:c0:0a:0b:a4:6f:
f9:81:7e:ab:b0:46:84:b7:9f:a2:66:0c:0f:32:03:ef:8f:be:
37:4d:0a:2a:b0:ab:87:61:7b:0d:70:87:27
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 5295 bytes from beginning
al=0, next_pc=40005400
3,880,279 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,192 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,961,533 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:13:88:0d:83:7a:69:d8:e3:54:1e:87:e0:aa:c9:cd:d1:5b:5b:25
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B313880D837A69D8E3541E87E0AAC9CDD15B5B2593FBEF1038D8C330DCAF435B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3f:c6:9a:9c:7f:4f:65:5c:3f:43:bf:9f:7b:b1:
72:e4:0e:24:d9:46:d0:31:ce:42:63:77:e0:61:af:
ca:b6:4e:a9:58:aa:26:8c:6f:1e:26:51:4f:89:60:
8e:4e:96:56:70:92:63:46:02:f9:f6:ca:2e:6a:f7:
5c:ff:25:6b:1b:b2:2a:af:9b:b1:73:a3:f6:8f:63:
0b:d7:2e:e8:42:3d:93:fa:89:44:4c:2a:93:cd:77:
0c:60:27:0d:b5:11:bd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
B3:13:88:0D:83:7A:69:D8:E3:54:1E:87:E0:AA:C9:CD:D1:5B:5B:25
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:45:18:18:a9:70:b9:48:b7:59:3d:e6:db:81:fa:
a6:b3:18:f9:6d:2b:fb:61:06:9a:10:51:90:c4:14:ee:30:04:
14:ab:0f:ab:42:f6:77:0d:06:7f:1a:0d:cf:d7:e2:56:02:30:
3c:5c:ac:5c:bf:ba:b7:a2:96:87:22:13:2c:9c:aa:8c:17:57:
57:0c:79:4e:f3:22:b2:3e:6b:22:11:38:23:52:c9:69:58:3d:
70:01:5e:c7:12:b4:a9:40:88:27:1a:7e
3,972,423 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,421 UART:
3,973,437 UART: Running Caliptra ROM ...
3,973,845 UART:
3,973,987 UART: [state] CFI Enabled
3,976,622 UART: [state] LifecycleState = Production
3,977,230 UART: [state] DebugLocked = Yes
3,977,962 UART: [state] Starting the WD Timer 40000000 cycles
3,979,494 UART: [kat] SHA2-256
4,783,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,787,173 UART: [kat] ++
4,787,325 UART: [kat] sha1
4,791,743 UART: [kat] SHA2-256
4,793,683 UART: [kat] SHA2-384
4,796,508 UART: [kat] SHA2-512-ACC
4,798,408 UART: [kat] ECC-384
4,808,143 UART: [kat] HMAC-384Kdf
4,812,865 UART: [kat] LMS
5,061,177 UART: [kat] --
5,062,215 UART: [update-reset] ++
6,925,024 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,926,151 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87624
7,072,939 >>> mbox cmd response: success
7,073,109 UART: [update-reset] Copying MAN_2 To MAN_1
7,081,121 UART: [update-reset Success] --
7,081,850 UART: [state] Locking Datavault
7,082,784 UART: [state] Locking PCR0, PCR1 and PCR31
7,083,388 UART: [state] Locking ICCM
7,084,034 UART: [exit] Launching FMC @ 0x40000130
7,089,363 UART:
7,089,379 UART: Running Caliptra FMC ...
7,089,787 UART:
7,089,930 UART: [state] CFI Enabled
7,178,865 UART: [art] Extend RT PCRs Done
7,179,293 UART: [art] Lock RT PCRs Done
7,180,636 UART: [art] Populate DV Done
7,188,744 UART: [fht] FMC Alias Private Key: 7
7,189,718 UART: [art] Derive CDI
7,189,998 UART: [art] Store in in slot 0x4
7,275,671 UART: [art] Derive Key Pair
7,276,031 UART: [art] Store priv key in slot 0x5
7,289,187 UART: [art] Derive Key Pair - Done
7,303,765 UART: [art] Signing Cert with AUTHO
7,304,245 UART: RITY.KEYID = 7
7,318,841 UART: [art] Erasing AUTHORITY.KEYID = 7
7,319,606 UART: [art] PUB.X = 7F87ED930F85B3C7DCCE91A857F27772584B149F740A23E414BBC2DC74D2339FCBECE0EBB1556C9ADA23F24C80C83178
7,326,384 UART: [art] PUB.Y = 4809C90C650A1DF04995D37C8DE7EF28A025B465FAB249FB23CE05508ED035636A2E5C8CE7D9CCE05DB49BB3AE31FC8D
7,333,340 UART: [art] SIG.R = DC20B49BAB2E4AE3E3AE63FA00EAA759A52BA08F800F1370C632114063DDC015233A19089DBDDB03EEEB8BE97CA90725
7,340,094 UART: [art] SIG.S = 6C3B67F03896DAA8C5ABEC4F415BA809CED136001BF6B7D024CDA57A809BC46B4306931356DA0D9CAB14DA01D2C4FEC4
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:23:e3:10:f6:95:1c:1b:e8:fc:bd:d7:b1:19:33:99:d4:f0:b2:59
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9F23E310F6951C1BE8FCBDD7B1193399D4F0B2592BF112289125684A83C1D619
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7f:87:ed:93:0f:85:b3:c7:dc:ce:91:a8:57:f2:
77:72:58:4b:14:9f:74:0a:23:e4:14:bb:c2:dc:74:
d2:33:9f:cb:ec:e0:eb:b1:55:6c:9a:da:23:f2:4c:
80:c8:31:78:48:09:c9:0c:65:0a:1d:f0:49:95:d3:
7c:8d:e7:ef:28:a0:25:b4:65:fa:b2:49:fb:23:ce:
05:50:8e:d0:35:63:6a:2e:5c:8c:e7:d9:cc:e0:5d:
b4:9b:b3:ae:31:fc:8d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
9F:23:E3:10:F6:95:1C:1B:E8:FC:BD:D7:B1:19:33:99:D4:F0:B2:59
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:dc:20:b4:9b:ab:2e:4a:e3:e3:ae:63:fa:00:
ea:a7:59:a5:2b:a0:8f:80:0f:13:70:c6:32:11:40:63:dd:c0:
15:23:3a:19:08:9d:bd:db:03:ee:eb:8b:e9:7c:a9:07:25:02:
30:6c:3b:67:f0:38:96:da:a8:c5:ab:ec:4f:41:5b:a8:09:ce:
d1:36:00:1b:f6:b7:d0:24:cd:a5:7a:80:9b:c4:6b:43:06:93:
13:56:da:0d:9c:ab:14:da:01:d2:c4:fe:c4
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.42s
Truncated 848 bytes from beginning
,852 UART: [art] Lock RT PCRs Done
3,373,254 UART: [art] Populate DV Done
3,381,152 UART: [fht] FMC Alias Private Key: 7
3,382,316 UART: [art] Derive CDI
3,382,596 UART: [art] Store in in slot 0x4
3,468,297 UART: [art] Derive Key Pair
3,468,657 UART: [art] Store priv key in slot 0x5
3,481,677 UART: [art] Derive Key Pair - Done
3,496,380 UART: [art] Signing Cert with AUTHO
3,496,860 UART: RITY.KEYID = 7
3,511,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,512,711 UART: [art] PUB.X = 0D12AE4E62877264565C002F32D6E578A458F7152C36BEBC03E7AA172A85A5E931F92E24DE68F12EE2BFE82164F66E1D
3,519,459 UART: [art] PUB.Y = 454B8A2ED79220CB259CCC9C239FDD5E907456412EDED7D1F833F160ED5B83560FB662DC4AF2FB44B8E22FC6A28C74CD
3,526,424 UART: [art] SIG.R = 9455F970D6034218A5B2E2263E5F40C6B4E44AE5B19B6EF19E6777B12119A0A0A90FBF1684967F77946AD32D3B03C9C1
3,533,185 UART: [art] SIG.S = 47EAD738CA7E97C34FFC0BD2E4446A2371982E0B88FF4B08CA6380BD9E2DCBEB86496759871373150C9BF87F417E54C9
3,557,336 UART: Caliptra RT
3,557,681 UART: [state] CFI Enabled
3,665,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,499 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,842 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,289 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [33, 14, 5b, 65, 10, 33, da, 7e, 96, 84, c7, 19, 27, c3, 24, b6, 6e, 87, 75, d0, 69, 2b, 52, 0c, c8, 7a, 0d, a0, 94, 1d, 81, b9, 0e, ea, d7, bf, aa, 4d, 0e, 97, d7, 39, 79, 03, 2b, 53, b7, 6e]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:2d:b2:02:65:08:46:25:16:1f:1e:53:77:ee:94:68:5e:77:66:0e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=642DB20265084625161F1E5377EE94685E77660E2C91A91BAB199DA4E4E69CD3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0d:12:ae:4e:62:87:72:64:56:5c:00:2f:32:d6:
e5:78:a4:58:f7:15:2c:36:be:bc:03:e7:aa:17:2a:
85:a5:e9:31:f9:2e:24:de:68:f1:2e:e2:bf:e8:21:
64:f6:6e:1d:45:4b:8a:2e:d7:92:20:cb:25:9c:cc:
9c:23:9f:dd:5e:90:74:56:41:2e:de:d7:d1:f8:33:
f1:60:ed:5b:83:56:0f:b6:62:dc:4a:f2:fb:44:b8:
e2:2f:c6:a2:8c:74:cd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0e[.3~.3......$.'.u.n.R+i.z...........M..y9.n.S+..RT_INFO
X509v3 Subject Key Identifier:
64:2D:B2:02:65:08:46:25:16:1F:1E:53:77:EE:94:68:5E:77:66:0E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:94:55:f9:70:d6:03:42:18:a5:b2:e2:26:3e:
5f:40:c6:b4:e4:4a:e5:b1:9b:6e:f1:9e:67:77:b1:21:19:a0:
a0:a9:0f:bf:16:84:96:7f:77:94:6a:d3:2d:3b:03:c9:c1:02:
30:47:ea:d7:38:ca:7e:97:c3:4f:fc:0b:d2:e4:44:6a:23:71:
98:2e:0b:88:ff:4b:08:ca:63:80:bd:9e:2d:cb:eb:86:49:67:
59:87:13:73:15:0c:9b:f8:7f:41:7e:54:c9
3,787,931 <<< Executing mbox cmd 0x46574c44 (112308 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,777,061 >>> mbox cmd response: success
6,790,224 UART:
6,790,240 UART: Running Caliptra FMC ...
6,790,648 UART:
6,790,791 UART: [state] CFI Enabled
6,879,740 UART: [art] Extend RT PCRs Done
6,880,168 UART: [art] Lock RT PCRs Done
6,881,207 UART: [art] Populate DV Done
6,889,413 UART: [fht] FMC Alias Private Key: 7
6,890,533 UART: [art] Derive CDI
6,890,813 UART: [art] Store in in slot 0x4
6,976,318 UART: [art] Derive Key Pair
6,976,678 UART: [art] Store priv key in slot 0x5
6,990,096 UART: [art] Derive Key Pair - Done
7,004,824 UART: [art] Signing Cert with AUTHO
7,005,304 UART: RITY.KEYID = 7
7,020,680 UART: [art] Erasing AUTHORITY.KEYID = 7
7,021,445 UART: [art] PUB.X = EFA6252EDA67DCE68294DA6464E112F0C189508C093D55D60E2CDEC4038E7E13C7F443F8B83ECEDCE7A156D91C64359D
7,028,220 UART: [art] PUB.Y = 5A10DC378B1D9C4DA637BBC2372E6ADC20A635E1E6E728ABF0FD7565BFD270E567EEDD0E8C5D910D7A2CCD65FD5F97FA
7,035,192 UART: [art] SIG.R = 637CF0555117EEB116F3ADA5A06839CB9B9B567AB0350069EB25D4B60BC557850EB11CB04D4D26057AF2CD2C26C602C7
7,041,936 UART: [art] SIG.S = CC1827AB9F152D150CABD2338F27C13E62D532C129D279832431F2D67D17517D183F8EE425447E7715B330DA42F58730
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7f:44:8c:59:07:6f:44:af:18:5e:4c:ce:65:23:21:96:7f:3b:f4:1f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FB448C59076F44AF185E4CCE652321967F3BF41F18CA3B910570880516ADBAC7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ef:a6:25:2e:da:67:dc:e6:82:94:da:64:64:e1:
12:f0:c1:89:50:8c:09:3d:55:d6:0e:2c:de:c4:03:
8e:7e:13:c7:f4:43:f8:b8:3e:ce:dc:e7:a1:56:d9:
1c:64:35:9d:5a:10:dc:37:8b:1d:9c:4d:a6:37:bb:
c2:37:2e:6a:dc:20:a6:35:e1:e6:e7:28:ab:f0:fd:
75:65:bf:d2:70:e5:67:ee:dd:0e:8c:5d:91:0d:7a:
2c:cd:65:fd:5f:97:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0M.s...A...6..........S....51;%.,1.##..4.5...$.....RT_INFO
X509v3 Subject Key Identifier:
FB:44:8C:59:07:6F:44:AF:18:5E:4C:CE:65:23:21:96:7F:3B:F4:1F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:63:7c:f0:55:51:17:ee:b1:16:f3:ad:a5:a0:68:
39:cb:9b:9b:56:7a:b0:35:00:69:eb:25:d4:b6:0b:c5:57:85:
0e:b1:1c:b0:4d:4d:26:05:7a:f2:cd:2c:26:c6:02:c7:02:31:
00:cc:18:27:ab:9f:15:2d:15:0c:ab:d2:33:8f:27:c1:3e:62:
d5:32:c1:29:d2:79:83:24:31:f2:d6:7d:17:51:7d:18:3f:8e:
e4:25:44:7e:77:15:b3:30:da:42:f5:87:30
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,569 writing to cptra_bootfsm_go
193,737 UART:
194,086 UART: Running Caliptra ROM ...
195,253 UART:
195,404 UART: [state] CFI Enabled
264,535 UART: [state] LifecycleState = Unprovisioned
266,433 UART: [state] DebugLocked = No
268,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,424 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
420,496 UART: [kat] SHA2-256
442,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,289 UART: [kat] ++
453,885 UART: [kat] sha1
463,900 UART: [kat] SHA2-256
466,635 UART: [kat] SHA2-384
471,742 UART: [kat] SHA2-512-ACC
474,073 UART: [kat] ECC-384
2,769,402 UART: [kat] HMAC-384Kdf
2,801,209 UART: [kat] LMS
3,991,527 UART: [kat] --
3,994,742 UART: [cold-reset] ++
3,996,671 UART: [fht] Storing FHT @ 0x50003400
4,007,237 UART: [idev] ++
4,007,846 UART: [idev] CDI.KEYID = 6
4,008,739 UART: [idev] SUBJECT.KEYID = 7
4,010,015 UART: [idev] UDS.KEYID = 0
4,035,516 UART: [idev] Erasing UDS.KEYID = 0
7,345,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,368 UART: [idev] --
7,372,662 UART: [ldev] ++
7,373,238 UART: [ldev] CDI.KEYID = 6
7,374,256 UART: [ldev] SUBJECT.KEYID = 5
7,375,410 UART: [ldev] AUTHORITY.KEYID = 7
7,376,692 UART: [ldev] FE.KEYID = 1
7,423,740 UART: [ldev] Erasing FE.KEYID = 1
10,754,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,432 UART: [ldev] --
13,116,397 UART: [fwproc] Waiting for Commands...
13,119,677 UART: [fwproc] Received command 0x46574c44
13,122,082 UART: [fwproc] Received Image of size 113760 bytes
17,163,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,187 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,624,323 >>> mbox cmd response: success
17,629,115 UART: [afmc] ++
17,629,702 UART: [afmc] CDI.KEYID = 6
17,630,612 UART: [afmc] SUBJECT.KEYID = 7
17,631,885 UART: [afmc] AUTHORITY.KEYID = 5
21,004,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,048 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,466 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,304 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,755 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,576 UART: [afmc] --
23,381,453 UART: [cold-reset] --
23,384,307 UART: [state] Locking Datavault
23,388,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,848 UART: [state] Locking ICCM
23,391,834 UART: [exit] Launching FMC @ 0x40000130
23,400,227 UART:
23,400,467 UART: Running Caliptra FMC ...
23,401,563 UART:
23,401,722 UART: [state] CFI Enabled
23,466,197 UART: [fht] FMC Alias Private Key: 7
25,804,394 UART: [art] Extend RT PCRs Done
25,805,626 UART: [art] Lock RT PCRs Done
25,807,199 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
191,776 UART:
192,131 UART: Running Caliptra ROM ...
193,307 UART:
193,458 UART: [state] CFI Enabled
261,522 UART: [state] LifecycleState = Unprovisioned
263,524 UART: [state] DebugLocked = Yes
265,306 UART: [state] Starting the Watchdog Timer 25535230 cycles
270,605 UART: [kat] SHA2-256
440,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,851 UART: [kat] ++
451,341 UART: [kat] sha1
461,428 UART: [kat] SHA2-256
464,116 UART: [kat] SHA2-384
469,226 UART: [kat] SHA2-512-ACC
471,602 UART: [kat] ECC-384
2,766,236 UART: [kat] HMAC-384Kdf
2,797,687 UART: [kat] LMS
3,988,006 UART: [kat] --
3,991,236 UART: [cold-reset] ++
3,993,167 UART: [fht] Storing FHT @ 0x50003400
4,003,794 UART: [idev] ++
4,004,357 UART: [idev] CDI.KEYID = 6
4,005,232 UART: [idev] SUBJECT.KEYID = 7
4,006,544 UART: [idev] UDS.KEYID = 0
4,007,465 ready_for_fw is high
4,007,661 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,150,736 UART: [idev] Erasing UDS.KEYID = 0
7,341,906 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,195 UART: [idev] --
7,369,463 UART: [ldev] ++
7,370,092 UART: [ldev] CDI.KEYID = 6
7,371,007 UART: [ldev] SUBJECT.KEYID = 5
7,372,222 UART: [ldev] AUTHORITY.KEYID = 7
7,373,506 UART: [ldev] FE.KEYID = 1
7,420,821 UART: [ldev] Erasing FE.KEYID = 1
10,750,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,377 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,060,864 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,075,551 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,089,929 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,109,502 UART: [ldev] --
13,113,437 UART: [fwproc] Waiting for Commands...
13,116,782 UART: [fwproc] Received command 0x46574c44
13,118,960 UART: [fwproc] Received Image of size 113760 bytes
17,160,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,207 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,621,371 >>> mbox cmd response: success
17,626,146 UART: [afmc] ++
17,626,750 UART: [afmc] CDI.KEYID = 6
17,627,721 UART: [afmc] SUBJECT.KEYID = 7
17,628,939 UART: [afmc] AUTHORITY.KEYID = 5
20,984,606 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,428 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,304,940 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,319,730 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,334,010 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,356,966 UART: [afmc] --
23,360,835 UART: [cold-reset] --
23,363,722 UART: [state] Locking Datavault
23,367,508 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,258 UART: [state] Locking ICCM
23,371,238 UART: [exit] Launching FMC @ 0x40000130
23,379,626 UART:
23,379,856 UART: Running Caliptra FMC ...
23,380,954 UART:
23,381,113 UART: [state] CFI Enabled
23,446,395 UART: [fht] FMC Alias Private Key: 7
25,784,582 UART: [art] Extend RT PCRs Done
25,785,808 UART: [art] Lock RT PCRs Done
25,787,388 UART: [art] Populate DV Done
25,792,873 UART: [fht] FMC Alias Private Key: 7
25,794,407 UART: [art] Derive CDI
25,795,216 UART: [art] Store in in slot 0x4
25,804,655 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40003CA8error_internal_intr_r=00000040
25,808,137 UART: WDT Expired
25,808,693 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
269,459 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,857,761 >>> mbox cmd response: success
23,543,302 UART:
23,543,715 UART: Running Caliptra FMC ...
23,544,817 UART:
23,544,967 UART: [state] CFI Enabled
23,611,392 UART: [fht] FMC Alias Private Key: 7
25,949,378 UART: [art] Extend RT PCRs Done
25,950,610 UART: [art] Lock RT PCRs Done
25,952,210 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,795,881 ready_for_fw is high
3,796,353 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,851,903 >>> mbox cmd response: success
23,537,863 UART:
23,538,249 UART: Running Caliptra FMC ...
23,539,402 UART:
23,539,577 UART: [state] CFI Enabled
23,593,381 UART: [fht] FMC Alias Private Key: 7
25,931,384 UART: [art] Extend RT PCRs Done
25,932,615 UART: [art] Lock RT PCRs Done
25,934,240 UART: [art] Populate DV Done
25,939,650 UART: [fht] FMC Alias Private Key: 7
25,941,200 UART: [art] Derive CDI
25,941,937 UART: [art] Store in in slot 0x4
25,951,642 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029B0error_internal_intr_r=00000040
25,955,161 UART: WDT Expired
25,955,716 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,348 UART:
192,709 UART: Running Caliptra ROM ...
193,789 UART:
603,602 UART: [state] CFI Enabled
620,936 UART: [state] LifecycleState = Unprovisioned
622,855 UART: [state] DebugLocked = No
625,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,141 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
778,247 UART: [kat] SHA2-256
800,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,049 UART: [kat] ++
811,507 UART: [kat] sha1
822,218 UART: [kat] SHA2-256
824,890 UART: [kat] SHA2-384
830,482 UART: [kat] SHA2-512-ACC
832,811 UART: [kat] ECC-384
3,118,238 UART: [kat] HMAC-384Kdf
3,130,228 UART: [kat] LMS
4,320,353 UART: [kat] --
4,324,376 UART: [cold-reset] ++
4,325,932 UART: [fht] Storing FHT @ 0x50003400
4,336,812 UART: [idev] ++
4,337,391 UART: [idev] CDI.KEYID = 6
4,338,321 UART: [idev] SUBJECT.KEYID = 7
4,339,582 UART: [idev] UDS.KEYID = 0
4,355,345 UART: [idev] Erasing UDS.KEYID = 0
7,628,305 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,123 UART: [idev] --
7,654,328 UART: [ldev] ++
7,654,890 UART: [ldev] CDI.KEYID = 6
7,655,901 UART: [ldev] SUBJECT.KEYID = 5
7,657,053 UART: [ldev] AUTHORITY.KEYID = 7
7,658,337 UART: [ldev] FE.KEYID = 1
7,670,177 UART: [ldev] Erasing FE.KEYID = 1
10,956,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,340 UART: [ldev] --
13,316,437 UART: [fwproc] Waiting for Commands...
13,318,906 UART: [fwproc] Received command 0x46574c44
13,321,081 UART: [fwproc] Received Image of size 113760 bytes
17,358,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,552 >>> mbox cmd response: success
17,822,456 UART: [afmc] ++
17,823,045 UART: [afmc] CDI.KEYID = 6
17,823,969 UART: [afmc] SUBJECT.KEYID = 7
17,825,202 UART: [afmc] AUTHORITY.KEYID = 5
21,142,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,347 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,729 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,547 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,959 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,871 UART: [afmc] --
23,508,252 UART: [cold-reset] --
23,512,863 UART: [state] Locking Datavault
23,518,101 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,787 UART: [state] Locking ICCM
23,522,145 UART: [exit] Launching FMC @ 0x40000130
23,530,544 UART:
23,530,820 UART: Running Caliptra FMC ...
23,531,924 UART:
23,532,102 UART: [state] CFI Enabled
23,540,256 UART: [fht] FMC Alias Private Key: 7
25,871,134 UART: [art] Extend RT PCRs Done
25,872,351 UART: [art] Lock RT PCRs Done
25,873,869 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,029 UART:
192,384 UART: Running Caliptra ROM ...
193,511 UART:
603,091 UART: [state] CFI Enabled
620,395 UART: [state] LifecycleState = Unprovisioned
622,332 UART: [state] DebugLocked = Yes
625,299 UART: [state] Starting the Watchdog Timer 25244212 cycles
630,678 UART: [kat] SHA2-256
800,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,006 UART: [kat] ++
811,503 UART: [kat] sha1
822,155 UART: [kat] SHA2-256
824,874 UART: [kat] SHA2-384
830,425 UART: [kat] SHA2-512-ACC
832,783 UART: [kat] ECC-384
3,118,189 UART: [kat] HMAC-384Kdf
3,130,209 UART: [kat] LMS
4,320,298 UART: [kat] --
4,324,364 UART: [cold-reset] ++
4,325,934 UART: [fht] Storing FHT @ 0x50003400
4,336,839 UART: [idev] ++
4,337,408 UART: [idev] CDI.KEYID = 6
4,338,309 UART: [idev] SUBJECT.KEYID = 7
4,339,549 UART: [idev] UDS.KEYID = 0
4,340,590 ready_for_fw is high
4,340,775 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,160 UART: [idev] Erasing UDS.KEYID = 0
7,628,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,136 UART: [idev] --
7,654,348 UART: [ldev] ++
7,654,912 UART: [ldev] CDI.KEYID = 6
7,655,864 UART: [ldev] SUBJECT.KEYID = 5
7,657,072 UART: [ldev] AUTHORITY.KEYID = 7
7,658,355 UART: [ldev] FE.KEYID = 1
7,670,221 UART: [ldev] Erasing FE.KEYID = 1
10,956,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,170 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,711 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,375 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,745 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,080 UART: [ldev] --
13,316,242 UART: [fwproc] Waiting for Commands...
13,318,655 UART: [fwproc] Received command 0x46574c44
13,320,888 UART: [fwproc] Received Image of size 113760 bytes
17,358,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,431,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,500,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,817,370 >>> mbox cmd response: success
17,822,216 UART: [afmc] ++
17,822,861 UART: [afmc] CDI.KEYID = 6
17,823,741 UART: [afmc] SUBJECT.KEYID = 7
17,825,002 UART: [afmc] AUTHORITY.KEYID = 5
21,142,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,256 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,453,800 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,468,609 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,482,929 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,504,902 UART: [afmc] --
23,508,297 UART: [cold-reset] --
23,512,865 UART: [state] Locking Datavault
23,518,063 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,811 UART: [state] Locking ICCM
23,522,142 UART: [exit] Launching FMC @ 0x40000130
23,530,542 UART:
23,530,776 UART: Running Caliptra FMC ...
23,531,876 UART:
23,532,030 UART: [state] CFI Enabled
23,540,241 UART: [fht] FMC Alias Private Key: 7
25,871,157 UART: [art] Extend RT PCRs Done
25,872,562 UART: [art] Lock RT PCRs Done
25,873,672 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002AF8error_internal_intr_r=00000040
25,877,208 UART: WDT Expired
25,877,763 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
625,719 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,053,159 >>> mbox cmd response: success
23,698,281 UART:
23,698,680 UART: Running Caliptra FMC ...
23,699,783 UART:
23,699,934 UART: [state] CFI Enabled
23,707,986 UART: [fht] FMC Alias Private Key: 7
26,038,792 UART: [art] Extend RT PCRs Done
26,040,024 UART: [art] Lock RT PCRs Done
26,041,572 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,131,512 ready_for_fw is high
4,131,956 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,053,419 >>> mbox cmd response: success
23,698,592 UART:
23,698,989 UART: Running Caliptra FMC ...
23,700,136 UART:
23,700,301 UART: [state] CFI Enabled
23,708,359 UART: [fht] FMC Alias Private Key: 7
26,039,134 UART: [art] Extend RT PCRs Done
26,040,374 UART: [art] Lock RT PCRs Done
26,041,976 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40001714error_internal_intr_r=00000040
26,045,521 UART: WDT Expired
26,046,100 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,590 writing to cptra_bootfsm_go
192,823 UART:
193,209 UART: Running Caliptra ROM ...
194,393 UART:
194,547 UART: [state] CFI Enabled
263,271 UART: [state] LifecycleState = Unprovisioned
265,159 UART: [state] DebugLocked = No
266,812 UART: [state] WD Timer not started. Device not locked for debugging
275,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
418,816 UART: [kat] SHA2-256
449,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,276 UART: [kat] ++
461,808 UART: [kat] sha1
471,930 UART: [kat] SHA2-256
474,983 UART: [kat] SHA2-384
480,355 UART: [kat] SHA2-512-ACC
483,341 UART: [kat] ECC-384
2,948,480 UART: [kat] HMAC-384Kdf
2,972,131 UART: [kat] LMS
3,501,604 UART: [kat] --
3,505,869 UART: [cold-reset] ++
3,507,690 UART: [fht] FHT @ 0x50003400
3,519,319 UART: [idev] ++
3,519,884 UART: [idev] CDI.KEYID = 6
3,520,846 UART: [idev] SUBJECT.KEYID = 7
3,522,004 UART: [idev] UDS.KEYID = 0
3,544,355 UART: [idev] Erasing UDS.KEYID = 0
6,026,413 UART: [idev] Sha1 KeyId Algorithm
6,048,507 UART: [idev] --
6,053,721 UART: [ldev] ++
6,054,299 UART: [ldev] CDI.KEYID = 6
6,055,210 UART: [ldev] SUBJECT.KEYID = 5
6,056,421 UART: [ldev] AUTHORITY.KEYID = 7
6,057,652 UART: [ldev] FE.KEYID = 1
6,103,071 UART: [ldev] Erasing FE.KEYID = 1
8,603,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,063 UART: [ldev] --
10,396,410 UART: [fwproc] Wait for Commands...
10,398,665 UART: [fwproc] Recv command 0x46574c44
10,400,779 UART: [fwproc] Recv'd Img size: 114084 bytes
13,793,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,252,512 >>> mbox cmd response: success
14,256,978 UART: [afmc] ++
14,257,570 UART: [afmc] CDI.KEYID = 6
14,258,477 UART: [afmc] SUBJECT.KEYID = 7
14,259,638 UART: [afmc] AUTHORITY.KEYID = 5
16,790,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,560,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,061 UART: [afmc] --
18,587,268 UART: [cold-reset] --
18,591,614 UART: [state] Locking Datavault
18,596,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,598,667 UART: [state] Locking ICCM
18,599,627 UART: [exit] Launching FMC @ 0x40000130
18,608,078 UART:
18,608,328 UART: Running Caliptra FMC ...
18,609,427 UART:
18,609,592 UART: [state] CFI Enabled
18,670,874 UART: [fht] FMC Alias Private Key: 7
20,434,407 UART: [art] Extend RT PCRs Done
20,435,637 UART: [art] Lock RT PCRs Done
20,437,534 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,866 writing to cptra_bootfsm_go
192,529 UART:
192,899 UART: Running Caliptra ROM ...
193,984 UART:
194,124 UART: [state] CFI Enabled
260,788 UART: [state] LifecycleState = Unprovisioned
262,628 UART: [state] DebugLocked = Yes
264,394 UART: [state] Starting the WD Timer 20168080 cycles
269,327 UART: [kat] SHA2-256
448,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,987 UART: [kat] ++
460,474 UART: [kat] sha1
470,703 UART: [kat] SHA2-256
473,713 UART: [kat] SHA2-384
479,131 UART: [kat] SHA2-512-ACC
482,092 UART: [kat] ECC-384
2,945,484 UART: [kat] HMAC-384Kdf
2,968,398 UART: [kat] LMS
3,497,844 UART: [kat] --
3,502,148 UART: [cold-reset] ++
3,503,936 UART: [fht] FHT @ 0x50003400
3,515,624 UART: [idev] ++
3,516,194 UART: [idev] CDI.KEYID = 6
3,517,100 UART: [idev] SUBJECT.KEYID = 7
3,518,269 UART: [idev] UDS.KEYID = 0
3,519,188 ready_for_fw is high
3,519,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,662,865 UART: [idev] Erasing UDS.KEYID = 0
6,022,592 UART: [idev] Sha1 KeyId Algorithm
6,044,687 UART: [idev] --
6,049,923 UART: [ldev] ++
6,050,491 UART: [ldev] CDI.KEYID = 6
6,051,400 UART: [ldev] SUBJECT.KEYID = 5
6,052,611 UART: [ldev] AUTHORITY.KEYID = 7
6,053,858 UART: [ldev] FE.KEYID = 1
6,097,132 UART: [ldev] Erasing FE.KEYID = 1
8,597,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,910 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,353,948 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,758 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,670 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,405,958 UART: [ldev] --
10,410,287 UART: [fwproc] Wait for Commands...
10,412,548 UART: [fwproc] Recv command 0x46574c44
10,414,638 UART: [fwproc] Recv'd Img size: 114084 bytes
13,807,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,266,372 >>> mbox cmd response: success
14,270,799 UART: [afmc] ++
14,271,414 UART: [afmc] CDI.KEYID = 6
14,272,326 UART: [afmc] SUBJECT.KEYID = 7
14,273,485 UART: [afmc] AUTHORITY.KEYID = 5
16,805,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,772 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,544,913 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,560,817 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,576,603 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,598,840 UART: [afmc] --
18,603,118 UART: [cold-reset] --
18,607,462 UART: [state] Locking Datavault
18,612,819 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,460 UART: [state] Locking ICCM
18,615,443 UART: [exit] Launching FMC @ 0x40000130
18,623,883 UART:
18,624,134 UART: Running Caliptra FMC ...
18,625,156 UART:
18,625,302 UART: [state] CFI Enabled
18,686,584 UART: [fht] FMC Alias Private Key: 7
20,436,251 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000297Eerror_internal_intr_r=00000040
20,439,810 UART: WDT Expired
20,440,377 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
270,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,017,640 >>> mbox cmd response: success
18,303,318 UART:
18,303,722 UART: Running Caliptra FMC ...
18,304,928 UART:
18,305,113 UART: [state] CFI Enabled
18,373,056 UART: [fht] FMC Alias Private Key: 7
20,136,590 UART: [art] Extend RT PCRs Done
20,137,822 UART: [art] Lock RT PCRs Done
20,139,668 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,358,027 ready_for_fw is high
3,358,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,012,820 >>> mbox cmd response: success
18,300,027 UART:
18,300,431 UART: Running Caliptra FMC ...
18,301,550 UART:
18,301,700 UART: [state] CFI Enabled
18,369,319 UART: [fht] FMC Alias Private Key: 7
20,132,882 UART: [art] Extend RT PCRs Done
20,134,122 UART: [art] Lock RT PCRs Done
20,135,935 UART: [art] Populate DV Done
20,137,187 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002AA0error_internal_intr_r=00000040
20,140,676 UART: WDT Expired
20,141,229 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,701 writing to cptra_bootfsm_go
192,799 UART:
193,183 UART: Running Caliptra ROM ...
194,262 UART:
603,779 UART: [state] CFI Enabled
620,628 UART: [state] LifecycleState = Unprovisioned
622,518 UART: [state] DebugLocked = No
625,325 UART: [state] WD Timer not started. Device not locked for debugging
633,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
777,078 UART: [kat] SHA2-256
808,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,891 UART: [kat] ++
820,340 UART: [kat] sha1
831,105 UART: [kat] SHA2-256
834,110 UART: [kat] SHA2-384
839,983 UART: [kat] SHA2-512-ACC
842,908 UART: [kat] ECC-384
3,285,372 UART: [kat] HMAC-384Kdf
3,298,077 UART: [kat] LMS
3,827,559 UART: [kat] --
3,831,660 UART: [cold-reset] ++
3,833,161 UART: [fht] FHT @ 0x50003400
3,845,434 UART: [idev] ++
3,846,004 UART: [idev] CDI.KEYID = 6
3,846,938 UART: [idev] SUBJECT.KEYID = 7
3,848,164 UART: [idev] UDS.KEYID = 0
3,862,036 UART: [idev] Erasing UDS.KEYID = 0
6,321,246 UART: [idev] Sha1 KeyId Algorithm
6,344,593 UART: [idev] --
6,349,004 UART: [ldev] ++
6,349,589 UART: [ldev] CDI.KEYID = 6
6,350,505 UART: [ldev] SUBJECT.KEYID = 5
6,351,668 UART: [ldev] AUTHORITY.KEYID = 7
6,352,896 UART: [ldev] FE.KEYID = 1
6,363,538 UART: [ldev] Erasing FE.KEYID = 1
8,834,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,434 UART: [ldev] --
10,625,589 UART: [fwproc] Wait for Commands...
10,627,144 UART: [fwproc] Recv command 0x46574c44
10,629,235 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,391 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,476,941 >>> mbox cmd response: success
14,480,403 UART: [afmc] ++
14,480,985 UART: [afmc] CDI.KEYID = 6
14,481,891 UART: [afmc] SUBJECT.KEYID = 7
14,483,108 UART: [afmc] AUTHORITY.KEYID = 5
16,986,391 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,651 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,629 UART: [afmc] --
18,782,523 UART: [cold-reset] --
18,787,730 UART: [state] Locking Datavault
18,794,108 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,813 UART: [state] Locking ICCM
18,797,181 UART: [exit] Launching FMC @ 0x40000130
18,805,569 UART:
18,805,802 UART: Running Caliptra FMC ...
18,806,904 UART:
18,807,062 UART: [state] CFI Enabled
18,815,157 UART: [fht] FMC Alias Private Key: 7
20,571,507 UART: [art] Extend RT PCRs Done
20,572,720 UART: [art] Lock RT PCRs Done
20,574,311 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
191,786 UART:
192,171 UART: Running Caliptra ROM ...
193,289 UART:
602,877 UART: [state] CFI Enabled
619,684 UART: [state] LifecycleState = Unprovisioned
621,547 UART: [state] DebugLocked = Yes
624,461 UART: [state] Starting the WD Timer 19946271 cycles
629,479 UART: [kat] SHA2-256
808,570 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,140 UART: [kat] ++
820,627 UART: [kat] sha1
831,358 UART: [kat] SHA2-256
834,437 UART: [kat] SHA2-384
840,288 UART: [kat] SHA2-512-ACC
843,237 UART: [kat] ECC-384
3,285,673 UART: [kat] HMAC-384Kdf
3,298,357 UART: [kat] LMS
3,827,870 UART: [kat] --
3,832,002 UART: [cold-reset] ++
3,833,443 UART: [fht] FHT @ 0x50003400
3,845,770 UART: [idev] ++
3,846,330 UART: [idev] CDI.KEYID = 6
3,847,403 UART: [idev] SUBJECT.KEYID = 7
3,848,521 UART: [idev] UDS.KEYID = 0
3,849,447 ready_for_fw is high
3,849,653 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,798 UART: [idev] Erasing UDS.KEYID = 0
6,321,600 UART: [idev] Sha1 KeyId Algorithm
6,344,984 UART: [idev] --
6,349,352 UART: [ldev] ++
6,349,951 UART: [ldev] CDI.KEYID = 6
6,350,860 UART: [ldev] SUBJECT.KEYID = 5
6,352,019 UART: [ldev] AUTHORITY.KEYID = 7
6,353,256 UART: [ldev] FE.KEYID = 1
6,363,950 UART: [ldev] Erasing FE.KEYID = 1
8,835,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,165 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,148 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,010 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,918 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,620,930 UART: [ldev] --
10,626,078 UART: [fwproc] Wait for Commands...
10,627,685 UART: [fwproc] Recv command 0x46574c44
10,629,722 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,477,492 >>> mbox cmd response: success
14,480,912 UART: [afmc] ++
14,481,503 UART: [afmc] CDI.KEYID = 6
14,482,387 UART: [afmc] SUBJECT.KEYID = 7
14,483,596 UART: [afmc] AUTHORITY.KEYID = 5
16,986,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,385 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,725,504 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,741,382 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,757,172 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,780,240 UART: [afmc] --
18,783,169 UART: [cold-reset] --
18,788,380 UART: [state] Locking Datavault
18,794,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,481 UART: [state] Locking ICCM
18,797,822 UART: [exit] Launching FMC @ 0x40000130
18,806,214 UART:
18,806,445 UART: Running Caliptra FMC ...
18,808,122 UART:
18,808,294 UART: [state] CFI Enabled
18,815,808 UART: [fht] FMC Alias Private Key: 7
20,572,192 UART: [art] Extend RT PCRs Done
20,573,412 UART: [art] Lock RT PCRs Done
20,574,523 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,578,002 UART: WDT Expired
20,578,557 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,643 writing to cptra_bootfsm_go
626,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,129 >>> mbox cmd response: success
18,513,112 UART:
18,513,532 UART: Running Caliptra FMC ...
18,514,640 UART:
18,514,793 UART: [state] CFI Enabled
18,522,669 UART: [fht] FMC Alias Private Key: 7
20,279,038 UART: [art] Extend RT PCRs Done
20,280,273 UART: [art] Lock RT PCRs Done
20,281,814 UART: [art] Populate DV Done
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,701,414 ready_for_fw is high
3,701,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,259,074 >>> mbox cmd response: success
18,513,133 UART:
18,513,510 UART: Running Caliptra FMC ...
18,514,646 UART:
18,514,806 UART: [state] CFI Enabled
18,522,731 UART: [fht] FMC Alias Private Key: 7
20,279,052 UART: [art] Extend RT PCRs Done
20,280,282 UART: [art] Lock RT PCRs Done
20,281,578 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000269Aerror_internal_intr_r=00000040
20,285,113 UART: WDT Expired
20,285,672 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
192,636 UART:
192,994 UART: Running Caliptra ROM ...
194,154 UART:
194,307 UART: [state] CFI Enabled
261,989 UART: [state] LifecycleState = Unprovisioned
264,426 UART: [state] DebugLocked = No
266,077 UART: [state] WD Timer not started. Device not locked for debugging
274,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
418,644 UART: [kat] SHA2-256
460,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,355 UART: [kat] ++
471,886 UART: [kat] sha1
482,392 UART: [kat] SHA2-256
485,406 UART: [kat] SHA2-384
490,683 UART: [kat] SHA2-512-ACC
493,234 UART: [kat] ECC-384
2,946,244 UART: [kat] HMAC-384Kdf
2,970,158 UART: [kat] LMS
3,501,960 UART: [kat] --
3,506,272 UART: [cold-reset] ++
3,508,148 UART: [fht] FHT @ 0x50003400
3,520,319 UART: [idev] ++
3,521,000 UART: [idev] CDI.KEYID = 6
3,521,941 UART: [idev] SUBJECT.KEYID = 7
3,523,151 UART: [idev] UDS.KEYID = 0
3,542,262 UART: [idev] Erasing UDS.KEYID = 0
6,026,221 UART: [idev] Sha1 KeyId Algorithm
6,047,796 UART: [idev] --
6,053,905 UART: [ldev] ++
6,054,583 UART: [ldev] CDI.KEYID = 6
6,055,517 UART: [ldev] SUBJECT.KEYID = 5
6,056,671 UART: [ldev] AUTHORITY.KEYID = 7
6,057,909 UART: [ldev] FE.KEYID = 1
6,099,411 UART: [ldev] Erasing FE.KEYID = 1
8,602,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,681 UART: [ldev] --
10,412,787 UART: [fwproc] Wait for Commands...
10,415,068 UART: [fwproc] Recv command 0x46574c44
10,417,394 UART: [fwproc] Recv'd Img size: 114084 bytes
13,854,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,589,545 >>> mbox cmd response: success
14,593,772 UART: [afmc] ++
14,594,485 UART: [afmc] CDI.KEYID = 6
14,595,682 UART: [afmc] SUBJECT.KEYID = 7
14,597,127 UART: [afmc] AUTHORITY.KEYID = 5
17,130,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,910 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,236 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,430 UART: [afmc] --
18,924,456 UART: [cold-reset] --
18,929,079 UART: [state] Locking Datavault
18,934,767 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,911 UART: [state] Locking ICCM
18,938,202 UART: [exit] Launching FMC @ 0x40000130
18,946,551 UART:
18,946,801 UART: Running Caliptra FMC ...
18,947,908 UART:
18,948,068 UART: [state] CFI Enabled
19,008,322 UART: [fht] FMC Alias Private Key: 7
20,771,909 UART: [art] Extend RT PCRs Done
20,773,112 UART: [art] Lock RT PCRs Done
20,775,005 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
191,602 UART:
191,965 UART: Running Caliptra ROM ...
193,107 UART:
193,259 UART: [state] CFI Enabled
262,543 UART: [state] LifecycleState = Unprovisioned
264,938 UART: [state] DebugLocked = Yes
266,738 UART: [state] Starting the WD Timer 20505458 cycles
272,047 UART: [kat] SHA2-256
461,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,744 UART: [kat] ++
473,244 UART: [kat] sha1
483,864 UART: [kat] SHA2-256
486,879 UART: [kat] SHA2-384
492,085 UART: [kat] SHA2-512-ACC
494,664 UART: [kat] ECC-384
2,948,410 UART: [kat] HMAC-384Kdf
2,971,879 UART: [kat] LMS
3,503,652 UART: [kat] --
3,507,935 UART: [cold-reset] ++
3,509,860 UART: [fht] FHT @ 0x50003400
3,521,970 UART: [idev] ++
3,522,680 UART: [idev] CDI.KEYID = 6
3,523,730 UART: [idev] SUBJECT.KEYID = 7
3,524,830 UART: [idev] UDS.KEYID = 0
3,525,753 ready_for_fw is high
3,525,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,477 UART: [idev] Erasing UDS.KEYID = 0
6,028,978 UART: [idev] Sha1 KeyId Algorithm
6,050,588 UART: [idev] --
6,056,834 UART: [ldev] ++
6,057,525 UART: [ldev] CDI.KEYID = 6
6,058,438 UART: [ldev] SUBJECT.KEYID = 5
6,059,600 UART: [ldev] AUTHORITY.KEYID = 7
6,060,832 UART: [ldev] FE.KEYID = 1
6,101,728 UART: [ldev] Erasing FE.KEYID = 1
8,604,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,028 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,360,233 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,373 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,346 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,284 UART: [ldev] --
10,416,438 UART: [fwproc] Wait for Commands...
10,418,689 UART: [fwproc] Recv command 0x46574c44
10,420,616 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,592,832 >>> mbox cmd response: success
14,597,069 UART: [afmc] ++
14,597,882 UART: [afmc] CDI.KEYID = 6
14,598,937 UART: [afmc] SUBJECT.KEYID = 7
14,600,427 UART: [afmc] AUTHORITY.KEYID = 5
17,132,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,066 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,869,150 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,884,276 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,899,239 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,922,417 UART: [afmc] --
18,926,419 UART: [cold-reset] --
18,930,834 UART: [state] Locking Datavault
18,936,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,714 UART: [state] Locking ICCM
18,940,004 UART: [exit] Launching FMC @ 0x40000130
18,948,302 UART:
18,948,534 UART: Running Caliptra FMC ...
18,949,635 UART:
18,949,793 UART: [state] CFI Enabled
19,010,650 UART: [fht] FMC Alias Private Key: 7
20,774,219 UART: [art] Extend RT PCRs Done
20,775,461 UART: [art] Lock RT PCRs Done
20,776,492 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,779,992 UART: WDT Expired
20,780,549 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
269,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,702,484 >>> mbox cmd response: success
18,982,525 UART:
18,983,017 UART: Running Caliptra FMC ...
18,984,144 UART:
18,984,303 UART: [state] CFI Enabled
19,052,836 UART: [fht] FMC Alias Private Key: 7
20,816,440 UART: [art] Extend RT PCRs Done
20,817,670 UART: [art] Lock RT PCRs Done
20,819,483 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,436,365 ready_for_fw is high
3,436,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,720,365 >>> mbox cmd response: success
19,019,584 UART:
19,019,985 UART: Running Caliptra FMC ...
19,021,191 UART:
19,021,360 UART: [state] CFI Enabled
19,089,365 UART: [fht] FMC Alias Private Key: 7
20,818,964 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,822,589 UART: WDT Expired
20,823,162 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
192,941 UART:
193,310 UART: Running Caliptra ROM ...
194,478 UART:
603,995 UART: [state] CFI Enabled
620,959 UART: [state] LifecycleState = Unprovisioned
623,332 UART: [state] DebugLocked = No
626,172 UART: [state] WD Timer not started. Device not locked for debugging
635,180 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
778,665 UART: [kat] SHA2-256
820,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,495 UART: [kat] ++
832,076 UART: [kat] sha1
843,181 UART: [kat] SHA2-256
846,189 UART: [kat] SHA2-384
851,893 UART: [kat] SHA2-512-ACC
854,502 UART: [kat] ECC-384
3,297,303 UART: [kat] HMAC-384Kdf
3,310,520 UART: [kat] LMS
3,842,312 UART: [kat] --
3,846,461 UART: [cold-reset] ++
3,848,032 UART: [fht] FHT @ 0x50003400
3,860,802 UART: [idev] ++
3,861,480 UART: [idev] CDI.KEYID = 6
3,862,416 UART: [idev] SUBJECT.KEYID = 7
3,863,679 UART: [idev] UDS.KEYID = 0
3,878,081 UART: [idev] Erasing UDS.KEYID = 0
6,341,102 UART: [idev] Sha1 KeyId Algorithm
6,363,927 UART: [idev] --
6,369,204 UART: [ldev] ++
6,369,879 UART: [ldev] CDI.KEYID = 6
6,370,856 UART: [ldev] SUBJECT.KEYID = 5
6,371,949 UART: [ldev] AUTHORITY.KEYID = 7
6,373,229 UART: [ldev] FE.KEYID = 1
6,384,204 UART: [ldev] Erasing FE.KEYID = 1
8,859,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,149 UART: [ldev] --
10,651,112 UART: [fwproc] Wait for Commands...
10,652,666 UART: [fwproc] Recv command 0x46574c44
10,654,979 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,598 >>> mbox cmd response: success
14,826,793 UART: [afmc] ++
14,827,542 UART: [afmc] CDI.KEYID = 6
14,828,728 UART: [afmc] SUBJECT.KEYID = 7
14,830,216 UART: [afmc] AUTHORITY.KEYID = 5
17,337,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,322 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,076,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,661 UART: [afmc] --
19,133,335 UART: [cold-reset] --
19,138,817 UART: [state] Locking Datavault
19,145,580 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,776 UART: [state] Locking ICCM
19,149,385 UART: [exit] Launching FMC @ 0x40000130
19,158,055 UART:
19,158,291 UART: Running Caliptra FMC ...
19,159,389 UART:
19,159,544 UART: [state] CFI Enabled
19,167,644 UART: [fht] FMC Alias Private Key: 7
20,923,984 UART: [art] Extend RT PCRs Done
20,925,210 UART: [art] Lock RT PCRs Done
20,926,857 UART: [art] Populate DV Done
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
191,836 UART:
192,220 UART: Running Caliptra ROM ...
193,330 UART:
603,158 UART: [state] CFI Enabled
620,107 UART: [state] LifecycleState = Unprovisioned
622,496 UART: [state] DebugLocked = Yes
625,399 UART: [state] Starting the WD Timer 20297143 cycles
630,845 UART: [kat] SHA2-256
820,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,495 UART: [kat] ++
832,066 UART: [kat] sha1
843,157 UART: [kat] SHA2-256
846,201 UART: [kat] SHA2-384
851,876 UART: [kat] SHA2-512-ACC
854,469 UART: [kat] ECC-384
3,297,288 UART: [kat] HMAC-384Kdf
3,310,520 UART: [kat] LMS
3,842,353 UART: [kat] --
3,846,516 UART: [cold-reset] ++
3,848,022 UART: [fht] FHT @ 0x50003400
3,860,785 UART: [idev] ++
3,861,493 UART: [idev] CDI.KEYID = 6
3,862,523 UART: [idev] SUBJECT.KEYID = 7
3,863,626 UART: [idev] UDS.KEYID = 0
3,864,667 ready_for_fw is high
3,864,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,140 UART: [idev] Erasing UDS.KEYID = 0
6,341,094 UART: [idev] Sha1 KeyId Algorithm
6,363,956 UART: [idev] --
6,369,360 UART: [ldev] ++
6,370,077 UART: [ldev] CDI.KEYID = 6
6,370,966 UART: [ldev] SUBJECT.KEYID = 5
6,372,064 UART: [ldev] AUTHORITY.KEYID = 7
6,373,283 UART: [ldev] FE.KEYID = 1
6,384,365 UART: [ldev] Erasing FE.KEYID = 1
8,859,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,301 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,428 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,517 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,543 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,200 UART: [ldev] --
10,651,218 UART: [fwproc] Wait for Commands...
10,652,711 UART: [fwproc] Recv command 0x46574c44
10,654,691 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,823,324 >>> mbox cmd response: success
14,826,556 UART: [afmc] ++
14,827,284 UART: [afmc] CDI.KEYID = 6
14,828,470 UART: [afmc] SUBJECT.KEYID = 7
14,829,947 UART: [afmc] AUTHORITY.KEYID = 5
17,337,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,147 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
19,076,247 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
19,091,338 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
19,106,311 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
19,130,335 UART: [afmc] --
19,132,995 UART: [cold-reset] --
19,138,253 UART: [state] Locking Datavault
19,145,014 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,200 UART: [state] Locking ICCM
19,148,860 UART: [exit] Launching FMC @ 0x40000130
19,157,522 UART:
19,157,771 UART: Running Caliptra FMC ...
19,158,868 UART:
19,159,023 UART: [state] CFI Enabled
19,167,033 UART: [fht] FMC Alias Private Key: 7
20,923,419 UART: [art] Extend RT PCRs Done
20,924,638 UART: [art] Lock RT PCRs Done
20,926,255 UART: [art] PopulatFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F4error_internal_intr_r=00000040
20,930,272 UART: WDT Expired
20,930,830 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
626,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,943,522 >>> mbox cmd response: success
19,200,662 UART:
19,201,133 UART: Running Caliptra FMC ...
19,202,239 UART:
19,202,396 UART: [state] CFI Enabled
19,210,284 UART: [fht] FMC Alias Private Key: 7
20,966,581 UART: [art] Extend RT PCRs Done
20,967,812 UART: [art] Lock RT PCRs Done
20,969,411 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,761,012 ready_for_fw is high
3,761,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,943,105 >>> mbox cmd response: success
19,200,384 UART:
19,200,798 UART: Running Caliptra FMC ...
19,202,014 UART:
19,202,190 UART: [state] CFI Enabled
19,209,965 UART: [fht] FMC Alias Private Key: 7
20,966,299 UART: [art] Extend RT PCRs Done
20,967,527 UART: [art] Lock RT PCRs Done
20,969,160 UART: [aFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
20,972,845 UART: WDT Expired
20,973,401 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114084 bytes
2,880,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,039 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,391 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,916 >>> mbox cmd response: success
3,074,136 UART: [afmc] ++
3,074,304 UART: [afmc] CDI.KEYID = 6
3,074,666 UART: [afmc] SUBJECT.KEYID = 7
3,075,091 UART: [afmc] AUTHORITY.KEYID = 5
3,109,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,441 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,131 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,218 UART: [afmc] --
3,153,226 UART: [cold-reset] --
3,153,920 UART: [state] Locking Datavault
3,154,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,477 UART: [state] Locking ICCM
3,156,033 UART: [exit] Launching FMC @ 0x40000130
3,161,362 UART:
3,161,378 UART: Running Caliptra FMC ...
3,161,786 UART:
3,161,840 UART: [state] CFI Enabled
3,172,205 UART: [fht] FMC Alias Private Key: 7
3,280,130 UART: [art] Extend RT PCRs Done
3,280,558 UART: [art] Lock RT PCRs Done
3,282,046 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3194549 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114084 bytes
2,880,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,999 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,875 >>> mbox cmd response: success
3,074,092 UART: [afmc] ++
3,074,260 UART: [afmc] CDI.KEYID = 6
3,074,622 UART: [afmc] SUBJECT.KEYID = 7
3,075,047 UART: [afmc] AUTHORITY.KEYID = 5
3,109,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,780 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,132,491 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,138,391 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,144,120 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,152,194 UART: [afmc] --
3,153,201 UART: [cold-reset] --
3,153,895 UART: [state] Locking Datavault
3,154,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,452 UART: [state] Locking ICCM
3,156,008 UART: [exit] Launching FMC @ 0x40000130
3,161,337 UART:
3,161,353 UART: Running Caliptra FMC ...
3,161,761 UART:
3,161,815 UART: [state] CFI Enabled
3,172,181 UART: [fht] FMC Alias Private Key: 7
3,280,116 UART: [art] Extend RT PCRs Done
3,280,544 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,282,032 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,284,366 UART: WDT Expired
3,284,575 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,552 >>> mbox cmd response: success
2,983,640 UART:
2,983,656 UART: Running Caliptra FMC ...
2,984,064 UART:
2,984,118 UART: [state] CFI Enabled
2,994,483 UART: [fht] FMC Alias Private Key: 7
3,102,408 UART: [art] Extend RT PCRs Done
3,102,836 UART: [art] Lock RT PCRs Done
3,104,324 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,806 >>> mbox cmd response: success
2,983,883 UART:
2,983,899 UART: Running Caliptra FMC ...
2,984,307 UART:
2,984,361 UART: [state] CFI Enabled
2,994,727 UART: [fht] FMC Alias Private Key: 7
3,102,662 UART: [art] Extend RT PCRs Done
3,103,090 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,104,578 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028DAerror_internal_intr_r=00000040
3,106,890 UART: WDT Expired
3,107,099 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114084 bytes
2,882,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,075 >>> mbox cmd response: success
3,075,307 UART: [afmc] ++
3,075,475 UART: [afmc] CDI.KEYID = 6
3,075,837 UART: [afmc] SUBJECT.KEYID = 7
3,076,262 UART: [afmc] AUTHORITY.KEYID = 5
3,111,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,564 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,254 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,211 UART: [afmc] --
3,155,151 UART: [cold-reset] --
3,156,087 UART: [state] Locking Datavault
3,157,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,848 UART: [state] Locking ICCM
3,158,454 UART: [exit] Launching FMC @ 0x40000130
3,163,783 UART:
3,163,799 UART: Running Caliptra FMC ...
3,164,207 UART:
3,164,350 UART: [state] CFI Enabled
3,174,977 UART: [fht] FMC Alias Private Key: 7
3,282,726 UART: [art] Extend RT PCRs Done
3,283,154 UART: [art] Lock RT PCRs Done
3,284,456 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3195970 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114084 bytes
2,882,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,034 >>> mbox cmd response: success
3,075,263 UART: [afmc] ++
3,075,431 UART: [afmc] CDI.KEYID = 6
3,075,793 UART: [afmc] SUBJECT.KEYID = 7
3,076,218 UART: [afmc] AUTHORITY.KEYID = 5
3,111,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,903 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,134,614 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,140,514 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,146,243 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,154,187 UART: [afmc] --
3,155,126 UART: [cold-reset] --
3,156,062 UART: [state] Locking Datavault
3,157,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,823 UART: [state] Locking ICCM
3,158,429 UART: [exit] Launching FMC @ 0x40000130
3,163,758 UART:
3,163,774 UART: Running Caliptra FMC ...
3,164,182 UART:
3,164,325 UART: [state] CFI Enabled
3,174,953 UART: [fht] FMC Alias Private Key: 7
3,282,712 UART: [art] Extend RT PCRs Done
3,283,140 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,284,442 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,286,766 UART: WDT Expired
3,286,975 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,711 >>> mbox cmd response: success
2,986,061 UART:
2,986,077 UART: Running Caliptra FMC ...
2,986,485 UART:
2,986,628 UART: [state] CFI Enabled
2,997,255 UART: [fht] FMC Alias Private Key: 7
3,105,004 UART: [art] Extend RT PCRs Done
3,105,432 UART: [art] Lock RT PCRs Done
3,106,734 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,958 >>> mbox cmd response: success
2,986,297 UART:
2,986,313 UART: Running Caliptra FMC ...
2,986,721 UART:
2,986,864 UART: [state] CFI Enabled
2,997,492 UART: [fht] FMC Alias Private Key: 7
3,105,251 UART: [art] Extend RT PCRs Done
3,105,679 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,106,981 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,109,290 UART: WDT Expired
3,109,499 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,145 >>> mbox cmd response: success
2,770,301 UART: [afmc] ++
2,770,469 UART: [afmc] CDI.KEYID = 6
2,770,831 UART: [afmc] SUBJECT.KEYID = 7
2,771,256 UART: [afmc] AUTHORITY.KEYID = 5
2,806,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,516 UART: [afmc] --
2,849,588 UART: [cold-reset] --
2,850,508 UART: [state] Locking Datavault
2,851,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,303 UART: [state] Locking ICCM
2,852,723 UART: [exit] Launching FMC @ 0x40000130
2,858,052 UART:
2,858,068 UART: Running Caliptra FMC ...
2,858,476 UART:
2,858,530 UART: [state] CFI Enabled
2,869,115 UART: [fht] FMC Alias Private Key: 7
2,976,456 UART: [art] Extend RT PCRs Done
2,976,884 UART: [art] Lock RT PCRs Done
2,978,616 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2891488 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,376 >>> mbox cmd response: success
2,770,529 UART: [afmc] ++
2,770,697 UART: [afmc] CDI.KEYID = 6
2,771,059 UART: [afmc] SUBJECT.KEYID = 7
2,771,484 UART: [afmc] AUTHORITY.KEYID = 5
2,806,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,658 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,369 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,835,269 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,840,966 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,848,701 UART: [afmc] --
2,849,772 UART: [cold-reset] --
2,850,692 UART: [state] Locking Datavault
2,851,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,487 UART: [state] Locking ICCM
2,852,907 UART: [exit] Launching FMC @ 0x40000130
2,858,236 UART:
2,858,252 UART: Running Caliptra FMC ...
2,858,660 UART:
2,858,714 UART: [state] CFI Enabled
2,869,300 UART: [fht] FMC Alias Private Key: 7
2,976,651 UART: [art] Extend RT PCRs Done
2,977,079 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,978,811 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,981,205 UART: WDT Expired
2,981,414 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,126 >>> mbox cmd response: success
2,682,696 UART:
2,682,712 UART: Running Caliptra FMC ...
2,683,120 UART:
2,683,174 UART: [state] CFI Enabled
2,693,759 UART: [fht] FMC Alias Private Key: 7
2,801,100 UART: [art] Extend RT PCRs Done
2,801,528 UART: [art] Lock RT PCRs Done
2,803,260 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,373 >>> mbox cmd response: success
2,682,932 UART:
2,682,948 UART: Running Caliptra FMC ...
2,683,356 UART:
2,683,410 UART: [state] CFI Enabled
2,693,996 UART: [fht] FMC Alias Private Key: 7
2,801,347 UART: [art] Extend RT PCRs Done
2,801,775 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,803,507 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,805,825 UART: WDT Expired
2,806,034 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,526 >>> mbox cmd response: success
2,771,542 UART: [afmc] ++
2,771,710 UART: [afmc] CDI.KEYID = 6
2,772,072 UART: [afmc] SUBJECT.KEYID = 7
2,772,497 UART: [afmc] AUTHORITY.KEYID = 5
2,808,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,053 UART: [afmc] --
2,851,931 UART: [cold-reset] --
2,852,975 UART: [state] Locking Datavault
2,854,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,922 UART: [state] Locking ICCM
2,855,396 UART: [exit] Launching FMC @ 0x40000130
2,860,725 UART:
2,860,741 UART: Running Caliptra FMC ...
2,861,149 UART:
2,861,292 UART: [state] CFI Enabled
2,872,221 UART: [fht] FMC Alias Private Key: 7
2,980,930 UART: [art] Extend RT PCRs Done
2,981,358 UART: [art] Lock RT PCRs Done
2,982,966 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2894849 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,757 >>> mbox cmd response: success
2,771,770 UART: [afmc] ++
2,771,938 UART: [afmc] CDI.KEYID = 6
2,772,300 UART: [afmc] SUBJECT.KEYID = 7
2,772,725 UART: [afmc] AUTHORITY.KEYID = 5
2,808,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,079 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,831,790 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,837,690 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,843,387 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,238 UART: [afmc] --
2,852,115 UART: [cold-reset] --
2,853,159 UART: [state] Locking Datavault
2,854,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,106 UART: [state] Locking ICCM
2,855,580 UART: [exit] Launching FMC @ 0x40000130
2,860,909 UART:
2,860,925 UART: Running Caliptra FMC ...
2,861,333 UART:
2,861,476 UART: [state] CFI Enabled
2,872,406 UART: [fht] FMC Alias Private Key: 7
2,981,125 UART: [art] Extend RT PCRs Done
2,981,553 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,983,161 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,985,549 UART: WDT Expired
2,985,758 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,507 >>> mbox cmd response: success
2,685,369 UART:
2,685,385 UART: Running Caliptra FMC ...
2,685,793 UART:
2,685,936 UART: [state] CFI Enabled
2,696,865 UART: [fht] FMC Alias Private Key: 7
2,805,574 UART: [art] Extend RT PCRs Done
2,806,002 UART: [art] Lock RT PCRs Done
2,807,610 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,754 >>> mbox cmd response: success
2,685,605 UART:
2,685,621 UART: Running Caliptra FMC ...
2,686,029 UART:
2,686,172 UART: [state] CFI Enabled
2,697,102 UART: [fht] FMC Alias Private Key: 7
2,805,821 UART: [art] Extend RT PCRs Done
2,806,249 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,807,857 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,810,165 UART: WDT Expired
2,810,374 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,245 >>> mbox cmd response: success
2,768,408 UART: [afmc] ++
2,768,576 UART: [afmc] CDI.KEYID = 6
2,768,939 UART: [afmc] SUBJECT.KEYID = 7
2,769,365 UART: [afmc] AUTHORITY.KEYID = 5
2,804,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,653 UART: [afmc] --
2,847,725 UART: [cold-reset] --
2,848,645 UART: [state] Locking Datavault
2,849,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,440 UART: [state] Locking ICCM
2,850,860 UART: [exit] Launching FMC @ 0x40000130
2,856,189 UART:
2,856,205 UART: Running Caliptra FMC ...
2,856,613 UART:
2,856,667 UART: [state] CFI Enabled
2,867,252 UART: [fht] FMC Alias Private Key: 7
2,974,593 UART: [art] Extend RT PCRs Done
2,975,021 UART: [art] Lock RT PCRs Done
2,976,753 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2889655 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,476 >>> mbox cmd response: success
2,768,636 UART: [afmc] ++
2,768,804 UART: [afmc] CDI.KEYID = 6
2,769,167 UART: [afmc] SUBJECT.KEYID = 7
2,769,593 UART: [afmc] AUTHORITY.KEYID = 5
2,804,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,791 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,827,503 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,833,401 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,839,098 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,846,838 UART: [afmc] --
2,847,909 UART: [cold-reset] --
2,848,829 UART: [state] Locking Datavault
2,850,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,624 UART: [state] Locking ICCM
2,851,044 UART: [exit] Launching FMC @ 0x40000130
2,856,373 UART:
2,856,389 UART: Running Caliptra FMC ...
2,856,797 UART:
2,856,851 UART: [state] CFI Enabled
2,867,437 UART: [fht] FMC Alias Private Key: 7
2,974,788 UART: [art] Extend RT PCRs Done
2,975,216 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,976,948 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,979,342 UART: WDT Expired
2,979,551 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,111 >>> mbox cmd response: success
2,678,711 UART:
2,678,727 UART: Running Caliptra FMC ...
2,679,135 UART:
2,679,189 UART: [state] CFI Enabled
2,689,774 UART: [fht] FMC Alias Private Key: 7
2,797,115 UART: [art] Extend RT PCRs Done
2,797,543 UART: [art] Lock RT PCRs Done
2,799,275 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,358 >>> mbox cmd response: success
2,678,947 UART:
2,678,963 UART: Running Caliptra FMC ...
2,679,371 UART:
2,679,425 UART: [state] CFI Enabled
2,690,011 UART: [fht] FMC Alias Private Key: 7
2,797,362 UART: [art] Extend RT PCRs Done
2,797,790 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,799,522 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,801,840 UART: WDT Expired
2,802,049 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,626 >>> mbox cmd response: success
2,769,649 UART: [afmc] ++
2,769,817 UART: [afmc] CDI.KEYID = 6
2,770,180 UART: [afmc] SUBJECT.KEYID = 7
2,770,606 UART: [afmc] AUTHORITY.KEYID = 5
2,806,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,190 UART: [afmc] --
2,850,068 UART: [cold-reset] --
2,851,112 UART: [state] Locking Datavault
2,852,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,059 UART: [state] Locking ICCM
2,853,533 UART: [exit] Launching FMC @ 0x40000130
2,858,862 UART:
2,858,878 UART: Running Caliptra FMC ...
2,859,286 UART:
2,859,429 UART: [state] CFI Enabled
2,870,358 UART: [fht] FMC Alias Private Key: 7
2,979,067 UART: [art] Extend RT PCRs Done
2,979,495 UART: [art] Lock RT PCRs Done
2,981,103 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2893016 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,857 >>> mbox cmd response: success
2,769,877 UART: [afmc] ++
2,770,045 UART: [afmc] CDI.KEYID = 6
2,770,408 UART: [afmc] SUBJECT.KEYID = 7
2,770,834 UART: [afmc] AUTHORITY.KEYID = 5
2,806,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,212 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,924 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,835,822 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,841,519 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,849,375 UART: [afmc] --
2,850,252 UART: [cold-reset] --
2,851,296 UART: [state] Locking Datavault
2,852,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,243 UART: [state] Locking ICCM
2,853,717 UART: [exit] Launching FMC @ 0x40000130
2,859,046 UART:
2,859,062 UART: Running Caliptra FMC ...
2,859,470 UART:
2,859,613 UART: [state] CFI Enabled
2,870,543 UART: [fht] FMC Alias Private Key: 7
2,979,262 UART: [art] Extend RT PCRs Done
2,979,690 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,981,298 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,983,686 UART: WDT Expired
2,983,895 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,492 >>> mbox cmd response: success
2,681,384 UART:
2,681,400 UART: Running Caliptra FMC ...
2,681,808 UART:
2,681,951 UART: [state] CFI Enabled
2,692,880 UART: [fht] FMC Alias Private Key: 7
2,801,589 UART: [art] Extend RT PCRs Done
2,802,017 UART: [art] Lock RT PCRs Done
2,803,625 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,739 >>> mbox cmd response: success
2,681,620 UART:
2,681,636 UART: Running Caliptra FMC ...
2,682,044 UART:
2,682,187 UART: [state] CFI Enabled
2,693,117 UART: [fht] FMC Alias Private Key: 7
2,801,836 UART: [art] Extend RT PCRs Done
2,802,264 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,803,872 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,806,180 UART: WDT Expired
2,806,389 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.85s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114084 bytes
2,880,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,039 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,391 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,916 >>> mbox cmd response: success
3,074,136 UART: [afmc] ++
3,074,304 UART: [afmc] CDI.KEYID = 6
3,074,666 UART: [afmc] SUBJECT.KEYID = 7
3,075,091 UART: [afmc] AUTHORITY.KEYID = 5
3,109,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,132,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,441 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,131 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,218 UART: [afmc] --
3,153,226 UART: [cold-reset] --
3,153,920 UART: [state] Locking Datavault
3,154,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,477 UART: [state] Locking ICCM
3,156,033 UART: [exit] Launching FMC @ 0x40000130
3,161,362 UART:
3,161,378 UART: Running Caliptra FMC ...
3,161,786 UART:
3,161,840 UART: [state] CFI Enabled
3,172,205 UART: [fht] FMC Alias Private Key: 7
3,280,130 UART: [art] Extend RT PCRs Done
3,280,558 UART: [art] Lock RT PCRs Done
3,282,046 UART: [art] Populate DV Done
3,290,265 UART: [fht] FMC Alias Private Key: 7
3,291,289 UART: [art] Derive CDI
3,291,569 UART: [art] Store in in slot 0x4
3,376,758 UART: [art] Derive Key Pair
3,377,118 UART: [art] Store priv key in slot 0x5
3,390,222 UART: [art] Derive Key Pair - Done
3,404,806 UART: [art] Signing Cert with AUTHO
3,405,286 UART: RITY.KEYID = 7
3,420,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,421,457 UART: [art] PUB.X = 1A434F7DDAB7E8035DE2ACA90835284B12D6780FF4880ED5C384B1642C5697BF12C08307CC0E97B03A93ECA2DB16B078
3,428,217 UART: [art] PUB.Y = B3E74CC4CCD759A4E22E637F3C108248D0B506CF1459F832B87695EF534C1DAA28EB1295639B3D1ECBF72723221ACF43
3,435,172 UART: [art] SIG.R = 090A2B96A1FF2464DA667C03FB59158858E1F92975C8CE05DDCFD5D14D9A6EFF4CCA0B27016FD1E48D39B4E8B750AE58
3,441,940 UART: [art] SIG.S = 9D105DB433D70B45946A8ECD5B0202E0144D3E982F7F407416CC0723F78DA41DB3C736A99BC3D282980ECB8C54E2544D
3,466,250 UART: Caliptra RT
3,466,503 UART: [state] CFI Enabled
3,574,354 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3482165 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114084 bytes
2,880,770 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,999 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,875 >>> mbox cmd response: success
3,074,092 UART: [afmc] ++
3,074,260 UART: [afmc] CDI.KEYID = 6
3,074,622 UART: [afmc] SUBJECT.KEYID = 7
3,075,047 UART: [afmc] AUTHORITY.KEYID = 5
3,109,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,126,780 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,132,491 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,138,391 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,144,120 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,152,194 UART: [afmc] --
3,153,201 UART: [cold-reset] --
3,153,895 UART: [state] Locking Datavault
3,154,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,155,452 UART: [state] Locking ICCM
3,156,008 UART: [exit] Launching FMC @ 0x40000130
3,161,337 UART:
3,161,353 UART: Running Caliptra FMC ...
3,161,761 UART:
3,161,815 UART: [state] CFI Enabled
3,172,181 UART: [fht] FMC Alias Private Key: 7
3,280,116 UART: [art] Extend RT PCRs Done
3,280,544 UART: [art] Lock RT PCRs Done
3,282,032 UART: [art] Populate DV Done
3,290,251 UART: [fht] FMC Alias Private Key: 7
3,291,275 UART: [art] Derive CDI
3,291,555 UART: [art] Store in in slot 0x4
3,376,742 UART: [art] Derive Key Pair
3,377,102 UART: [art] Store priv key in slot 0x5
3,390,206 UART: [art] Derive Key Pair - Done
3,404,792 UART: [art] Signing Cert with AUTHO
3,405,272 UART: RITY.KEYID = 7
3,420,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,421,443 UART: [art] PUB.X = F5C42182847FC5904BAC715F2BB7CF7B387AAB3078B264AEFCDFDC400DD07D8A4570EA731171ED09B0CC0C8BA58C810E
3,428,221 UART: [art] PUB.Y = 49A052109757EA4FD29C65F966006FB9208C11319BB4AF70A0B88834D6F47B2929D45ACD4599274DE9CBDDDEC8E40748
3,435,150 UART: [art] SIG.R = 43DFC378EECE8977422F2311CFCC85727062152F9C33B2E216299A07CDAB3B0BC5AE1F7E8180B2122B4E236048F5AF8A
3,441,922 UART: [art] SIG.S = 37B6476CE13DA897A14A3135C3921EF06212F5F62C6AEC4CFB13449025D5E8B8AFEB2BB709ACDAC88570DA36EF8018F2
3,466,252 UART: Caliptra RT
3,466,505 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,569,885 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D3E ra=0x40007056 error_internal_intr_r=00000040
3,572,327 UART: [rt] WDT Expired
3,572,614 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,552 >>> mbox cmd response: success
2,983,640 UART:
2,983,656 UART: Running Caliptra FMC ...
2,984,064 UART:
2,984,118 UART: [state] CFI Enabled
2,994,483 UART: [fht] FMC Alias Private Key: 7
3,102,408 UART: [art] Extend RT PCRs Done
3,102,836 UART: [art] Lock RT PCRs Done
3,104,324 UART: [art] Populate DV Done
3,112,543 UART: [fht] FMC Alias Private Key: 7
3,113,567 UART: [art] Derive CDI
3,113,847 UART: [art] Store in in slot 0x4
3,199,036 UART: [art] Derive Key Pair
3,199,396 UART: [art] Store priv key in slot 0x5
3,212,500 UART: [art] Derive Key Pair - Done
3,227,083 UART: [art] Signing Cert with AUTHO
3,227,563 UART: RITY.KEYID = 7
3,242,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,243,734 UART: [art] PUB.X = 4D6EFE79942C7E6771D533C5FECD3C2A0B125BD020AE037844B1C0BEC42A55CF3A26F6371E311AF732997F028519C170
3,250,501 UART: [art] PUB.Y = 9190882DAB6E5CD86D424D313F87C8CA01525DD40AA7F7491393964DECD085CB70C85BBA9397CBB7BD46D29672736EB5
3,257,453 UART: [art] SIG.R = 0EA38662B53631C689E87BC07374866B239F08334598F33F01C7A7BF5F5909C3F7D8A0AB472BE420F8DD036B14A10E33
3,264,203 UART: [art] SIG.S = 472FC3BCFBEA525DB66B057DCE4788A9702FE95C3689BC705E6EE0D25CA405E18781B495C9DDB4171B40CBCB66D5ED04
3,288,533 UART: Caliptra RT
3,288,786 UART: [state] CFI Enabled
3,396,620 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,799 >>> mbox cmd response: success
2,983,876 UART:
2,983,892 UART: Running Caliptra FMC ...
2,984,300 UART:
2,984,354 UART: [state] CFI Enabled
2,994,720 UART: [fht] FMC Alias Private Key: 7
3,102,655 UART: [art] Extend RT PCRs Done
3,103,083 UART: [art] Lock RT PCRs Done
3,104,571 UART: [art] Populate DV Done
3,112,790 UART: [fht] FMC Alias Private Key: 7
3,113,814 UART: [art] Derive CDI
3,114,094 UART: [art] Store in in slot 0x4
3,199,281 UART: [art] Derive Key Pair
3,199,641 UART: [art] Store priv key in slot 0x5
3,212,745 UART: [art] Derive Key Pair - Done
3,227,325 UART: [art] Signing Cert with AUTHO
3,227,805 UART: RITY.KEYID = 7
3,243,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,243,976 UART: [art] PUB.X = 5D5005FF365283F174EABA01A3CC2DA9AC3D802D467BE14B967BE7DB19D0525241D3A8E06BC819A8E874C9D8FFE4FEC0
3,250,758 UART: [art] PUB.Y = 87E96A6F96EC55B0CEBEADAF5FB617C01898C517B0D081D912561A5C88356F2E0307136101B1643B91F929F8A924CFA8
3,257,703 UART: [art] SIG.R = 79EB20357D73B9DEFED4CB9B695494C20DCC0054F33005E543ACCFD79900F79BE91B5A51B6DA247AE12ED331F1A82BC0
3,264,439 UART: [art] SIG.S = FC790147EDE22E3B39818F7EDF86E8595B99523A1C5A90397B8D0C4758AC50A898C63ED1AA5E82788919512C979ED65C
3,288,754 UART: Caliptra RT
3,289,007 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,392,397 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D46 ra=0x40007056 error_internal_intr_r=00000040
3,394,837 UART: [rt] WDT Expired
3,395,124 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114084 bytes
2,882,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,075 >>> mbox cmd response: success
3,075,307 UART: [afmc] ++
3,075,475 UART: [afmc] CDI.KEYID = 6
3,075,837 UART: [afmc] SUBJECT.KEYID = 7
3,076,262 UART: [afmc] AUTHORITY.KEYID = 5
3,111,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,564 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,254 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,211 UART: [afmc] --
3,155,151 UART: [cold-reset] --
3,156,087 UART: [state] Locking Datavault
3,157,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,848 UART: [state] Locking ICCM
3,158,454 UART: [exit] Launching FMC @ 0x40000130
3,163,783 UART:
3,163,799 UART: Running Caliptra FMC ...
3,164,207 UART:
3,164,350 UART: [state] CFI Enabled
3,174,977 UART: [fht] FMC Alias Private Key: 7
3,282,726 UART: [art] Extend RT PCRs Done
3,283,154 UART: [art] Lock RT PCRs Done
3,284,456 UART: [art] Populate DV Done
3,292,695 UART: [fht] FMC Alias Private Key: 7
3,293,709 UART: [art] Derive CDI
3,293,989 UART: [art] Store in in slot 0x4
3,379,754 UART: [art] Derive Key Pair
3,380,114 UART: [art] Store priv key in slot 0x5
3,393,332 UART: [art] Derive Key Pair - Done
3,408,123 UART: [art] Signing Cert with AUTHO
3,408,603 UART: RITY.KEYID = 7
3,423,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,758 UART: [art] PUB.X = 270670B13BEE6BBC6B659D1843032BA1675CB6DA38C8EB73A2F8044CA7CB98A16FCB555CCFB3C6D325E2675D067504E3
3,431,525 UART: [art] PUB.Y = 7C7D3410C2ED4D7B92DE4883A8B21C55A9332FCCE75DF4E67F46C192B79D9266E3307A56545DE02EF0159D1A40F084EE
3,438,483 UART: [art] SIG.R = D41B471C94299B97B5724029E2D647DBE0AF4132875846776AC0A29F7D7299423BF8968F639D748EB5524AF6DD1FF0ED
3,445,253 UART: [art] SIG.S = 8A1962EE17ED3EC471BBB568BEF6E1E634A7737686DB44C75C25B521EA3573E79EC8276C7DA23D4BB2EC05D05786945E
3,468,887 UART: Caliptra RT
3,469,232 UART: [state] CFI Enabled
3,577,884 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3484706 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114084 bytes
2,882,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,064 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,034 >>> mbox cmd response: success
3,075,263 UART: [afmc] ++
3,075,431 UART: [afmc] CDI.KEYID = 6
3,075,793 UART: [afmc] SUBJECT.KEYID = 7
3,076,218 UART: [afmc] AUTHORITY.KEYID = 5
3,111,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,903 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,134,614 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,140,514 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,146,243 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,154,187 UART: [afmc] --
3,155,126 UART: [cold-reset] --
3,156,062 UART: [state] Locking Datavault
3,157,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,823 UART: [state] Locking ICCM
3,158,429 UART: [exit] Launching FMC @ 0x40000130
3,163,758 UART:
3,163,774 UART: Running Caliptra FMC ...
3,164,182 UART:
3,164,325 UART: [state] CFI Enabled
3,174,953 UART: [fht] FMC Alias Private Key: 7
3,282,712 UART: [art] Extend RT PCRs Done
3,283,140 UART: [art] Lock RT PCRs Done
3,284,442 UART: [art] Populate DV Done
3,292,681 UART: [fht] FMC Alias Private Key: 7
3,293,695 UART: [art] Derive CDI
3,293,975 UART: [art] Store in in slot 0x4
3,379,738 UART: [art] Derive Key Pair
3,380,098 UART: [art] Store priv key in slot 0x5
3,393,316 UART: [art] Derive Key Pair - Done
3,408,107 UART: [art] Signing Cert with AUTHO
3,408,587 UART: RITY.KEYID = 7
3,423,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,742 UART: [art] PUB.X = 0E4F6599679CEBE8DC918AE5342D8E64C614605DE1AB695F08A946615453C100284610415E594529083B4E0B3D3B9DBD
3,431,474 UART: [art] PUB.Y = 2D7075937D3B0BDC366232031EF55EC6645E66611038B859A85C41B3809821CDF6C3009D583A7EDC746336D0DDF56A4B
3,438,394 UART: [art] SIG.R = 3BA77C018A61276CB55415E49A8D0C1210A8AEA49F6B764100A78790F17BE1277DD2341CEF8F6EF99F189FE727BAADD9
3,445,146 UART: [art] SIG.S = 90392BA3F26F7DEF6C49993AD8946E74FBF536AE071132942502D86D38E6734B6FB75C46C66620F7363FBF3F1904AF07
3,468,759 UART: Caliptra RT
3,469,104 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,573,407 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D44 ra=0x40007056 error_internal_intr_r=00000040
3,575,847 UART: [rt] WDT Expired
3,576,134 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,711 >>> mbox cmd response: success
2,986,061 UART:
2,986,077 UART: Running Caliptra FMC ...
2,986,485 UART:
2,986,628 UART: [state] CFI Enabled
2,997,255 UART: [fht] FMC Alias Private Key: 7
3,105,004 UART: [art] Extend RT PCRs Done
3,105,432 UART: [art] Lock RT PCRs Done
3,106,734 UART: [art] Populate DV Done
3,114,973 UART: [fht] FMC Alias Private Key: 7
3,115,987 UART: [art] Derive CDI
3,116,267 UART: [art] Store in in slot 0x4
3,202,032 UART: [art] Derive Key Pair
3,202,392 UART: [art] Store priv key in slot 0x5
3,215,610 UART: [art] Derive Key Pair - Done
3,230,400 UART: [art] Signing Cert with AUTHO
3,230,880 UART: RITY.KEYID = 7
3,246,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,035 UART: [art] PUB.X = AAD8AC3B8A639F857F01940448636A059DA6E54F6BAAED57B5B2486EFAA5FEE0A9A8C8979FF1317B5E2CDD9C1983A209
3,253,811 UART: [art] PUB.Y = 586B100E63F299FAE223C97B8C75BE0086F982038A3FEB2C81303BA7F701DC1822F001282CD7B8D97B0A12A820A27C12
3,260,726 UART: [art] SIG.R = D9CB23640158AA031FB93B30BABE98EB19F17E8562A975F419F37224D4821D962D04F852FA471378FC06BA06F4235B5A
3,267,483 UART: [art] SIG.S = 3F29C3F51D1F830D6E09F3D67E20A69FB80E53F28CFCA95275220194DDEB838F6CAEFA6E37F9FF0C11A00286BCDA2553
3,291,108 UART: Caliptra RT
3,291,453 UART: [state] CFI Enabled
3,400,088 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,958 >>> mbox cmd response: success
2,986,297 UART:
2,986,313 UART: Running Caliptra FMC ...
2,986,721 UART:
2,986,864 UART: [state] CFI Enabled
2,997,492 UART: [fht] FMC Alias Private Key: 7
3,105,251 UART: [art] Extend RT PCRs Done
3,105,679 UART: [art] Lock RT PCRs Done
3,106,981 UART: [art] Populate DV Done
3,115,220 UART: [fht] FMC Alias Private Key: 7
3,116,234 UART: [art] Derive CDI
3,116,514 UART: [art] Store in in slot 0x4
3,202,277 UART: [art] Derive Key Pair
3,202,637 UART: [art] Store priv key in slot 0x5
3,215,855 UART: [art] Derive Key Pair - Done
3,230,649 UART: [art] Signing Cert with AUTHO
3,231,129 UART: RITY.KEYID = 7
3,246,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,284 UART: [art] PUB.X = 4A69FFEFBC47B22E3CEE2186080AA21C8B08730F287A276A519D2F803CF76E79637BF71711B5F7F01CB37689B998DB16
3,254,048 UART: [art] PUB.Y = FE33450E1E7E6D2726F8BC15830CC99C18E5F24D144C6115F3D4839BAEBD09BB01A744A2522242B1023B5A7F692D96F0
3,260,987 UART: [art] SIG.R = 9010D6EF9C2B6CA56852181E65391C833636E868D418C702057720247C02126E3082C494347EEE7AB0DA687561E16826
3,267,732 UART: [art] SIG.S = B169885C96CFFBA6D965FC06795F20419AB6C1E81AF47BE524F474A4CA98CCF26D48DDAB89A43A56CFF670076C0E7CAB
3,291,368 UART: Caliptra RT
3,291,713 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,395,857 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D48 ra=0x40007056 error_internal_intr_r=00000040
3,398,297 UART: [rt] WDT Expired
3,398,584 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,145 >>> mbox cmd response: success
2,770,301 UART: [afmc] ++
2,770,469 UART: [afmc] CDI.KEYID = 6
2,770,831 UART: [afmc] SUBJECT.KEYID = 7
2,771,256 UART: [afmc] AUTHORITY.KEYID = 5
2,806,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,516 UART: [afmc] --
2,849,588 UART: [cold-reset] --
2,850,508 UART: [state] Locking Datavault
2,851,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,303 UART: [state] Locking ICCM
2,852,723 UART: [exit] Launching FMC @ 0x40000130
2,858,052 UART:
2,858,068 UART: Running Caliptra FMC ...
2,858,476 UART:
2,858,530 UART: [state] CFI Enabled
2,869,115 UART: [fht] FMC Alias Private Key: 7
2,976,456 UART: [art] Extend RT PCRs Done
2,976,884 UART: [art] Lock RT PCRs Done
2,978,616 UART: [art] Populate DV Done
2,986,895 UART: [fht] FMC Alias Private Key: 7
2,987,887 UART: [art] Derive CDI
2,988,167 UART: [art] Store in in slot 0x4
3,073,238 UART: [art] Derive Key Pair
3,073,598 UART: [art] Store priv key in slot 0x5
3,087,224 UART: [art] Derive Key Pair - Done
3,102,216 UART: [art] Signing Cert with AUTHO
3,102,696 UART: RITY.KEYID = 7
3,117,884 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,649 UART: [art] PUB.X = E0F2450ECBBE5B9AD599FA67B53530BFED02A39EADC741C9B79AE88B01B9B3C6496663590304857B52708B2580D9B257
3,125,410 UART: [art] PUB.Y = 5EB76BF84ADCA41EC67FCC8F500C658130B25C73EA3A5CE5C09B037AD5DB6BECED41710D7867A66D77A5B007FF8CA1FF
3,132,374 UART: [art] SIG.R = FEC88C89A1EFD0D04B885028B06EC12BC124ED06296BEF1268E5A00CC7340DFA1517F99EF497BF908D8BE03BF9A93DEA
3,139,155 UART: [art] SIG.S = CF3D3C810A47D081FD19D73BB724E441C077A24AEF3D290C3CCEBA727F077018FCB3E3072250E1E26645FF234B0CD846
3,162,721 UART: Caliptra RT
3,162,974 UART: [state] CFI Enabled
3,270,710 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3178890 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,376 >>> mbox cmd response: success
2,770,529 UART: [afmc] ++
2,770,697 UART: [afmc] CDI.KEYID = 6
2,771,059 UART: [afmc] SUBJECT.KEYID = 7
2,771,484 UART: [afmc] AUTHORITY.KEYID = 5
2,806,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,658 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,369 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,835,269 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,840,966 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,848,701 UART: [afmc] --
2,849,772 UART: [cold-reset] --
2,850,692 UART: [state] Locking Datavault
2,851,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,487 UART: [state] Locking ICCM
2,852,907 UART: [exit] Launching FMC @ 0x40000130
2,858,236 UART:
2,858,252 UART: Running Caliptra FMC ...
2,858,660 UART:
2,858,714 UART: [state] CFI Enabled
2,869,300 UART: [fht] FMC Alias Private Key: 7
2,976,651 UART: [art] Extend RT PCRs Done
2,977,079 UART: [art] Lock RT PCRs Done
2,978,811 UART: [art] Populate DV Done
2,987,090 UART: [fht] FMC Alias Private Key: 7
2,988,082 UART: [art] Derive CDI
2,988,362 UART: [art] Store in in slot 0x4
3,073,431 UART: [art] Derive Key Pair
3,073,791 UART: [art] Store priv key in slot 0x5
3,087,417 UART: [art] Derive Key Pair - Done
3,102,396 UART: [art] Signing Cert with AUTHO
3,102,876 UART: RITY.KEYID = 7
3,118,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,829 UART: [art] PUB.X = 89F353784B09E1CE8BF837123BC7B12357EECCAC8F7A1EFBCAE18B53D0D9C2D3216F470C8134C230638736B5C4A3FD56
3,125,605 UART: [art] PUB.Y = B6B2121516828341CE124904C67D80B7DF5A7EBCF3FFCF949D02F5FEB2A4AB86F8DC10DD84E251A8B12B2D23B920B65E
3,132,565 UART: [art] SIG.R = 7E75D350F007DD345D5C407DD6881DCF954C44F0AA4FA600C946A24C4A94E57AADB623CB40D35E942F9879FC902BA707
3,139,317 UART: [art] SIG.S = F7D112C2384991392C379917803254320BADB931BC85B23EFFB35A1253CF797EEB41176DD4F93EBC5B9099144E7422EB
3,162,883 UART: Caliptra RT
3,163,136 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,266,512 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D46 ra=0x40007056 error_internal_intr_r=00000040
3,268,952 UART: [rt] WDT Expired
3,269,239 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,126 >>> mbox cmd response: success
2,682,696 UART:
2,682,712 UART: Running Caliptra FMC ...
2,683,120 UART:
2,683,174 UART: [state] CFI Enabled
2,693,759 UART: [fht] FMC Alias Private Key: 7
2,801,100 UART: [art] Extend RT PCRs Done
2,801,528 UART: [art] Lock RT PCRs Done
2,803,260 UART: [art] Populate DV Done
2,811,539 UART: [fht] FMC Alias Private Key: 7
2,812,531 UART: [art] Derive CDI
2,812,811 UART: [art] Store in in slot 0x4
2,897,882 UART: [art] Derive Key Pair
2,898,242 UART: [art] Store priv key in slot 0x5
2,911,868 UART: [art] Derive Key Pair - Done
2,926,851 UART: [art] Signing Cert with AUTHO
2,927,331 UART: RITY.KEYID = 7
2,942,519 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,284 UART: [art] PUB.X = 1649D75F830CE7DFF42ECFDD1B23754704CF83EFCE2CBD3CB1EBAB7144D9E60E013F7B82447A80D527C63C3B6AB6C825
2,950,062 UART: [art] PUB.Y = 3B26C6C047E10DCE28CAD5286BE07C8642A89DE76F518BDEC27E37BAD6F05955DDB7D339A9E01EB3829930474CD58EAC
2,957,025 UART: [art] SIG.R = 7B5A8D6403A4BB3E0230AB78B70E8DE8CCCD10C55C73BB52EDFAD8E4FA63DB2C1C51D6B9E01979B8D6754B2D6132E837
2,963,806 UART: [art] SIG.S = 00F5601A8D84B065BD0FF5E31D94E6816446C8F096E9E7FDCB861C86168328C30393B4F74CEF524AB607B9A90680189C
2,987,343 UART: Caliptra RT
2,987,596 UART: [state] CFI Enabled
3,095,374 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,373 >>> mbox cmd response: success
2,682,932 UART:
2,682,948 UART: Running Caliptra FMC ...
2,683,356 UART:
2,683,410 UART: [state] CFI Enabled
2,693,996 UART: [fht] FMC Alias Private Key: 7
2,801,347 UART: [art] Extend RT PCRs Done
2,801,775 UART: [art] Lock RT PCRs Done
2,803,507 UART: [art] Populate DV Done
2,811,786 UART: [fht] FMC Alias Private Key: 7
2,812,778 UART: [art] Derive CDI
2,813,058 UART: [art] Store in in slot 0x4
2,898,127 UART: [art] Derive Key Pair
2,898,487 UART: [art] Store priv key in slot 0x5
2,912,113 UART: [art] Derive Key Pair - Done
2,927,103 UART: [art] Signing Cert with AUTHO
2,927,583 UART: RITY.KEYID = 7
2,942,771 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,536 UART: [art] PUB.X = 89BE81B1EC00DA24CE600DFCF3442A693B8D3AD7BF8AC0F595D9A3C491F5A9569FC960455458FBF169D84EE66AB89C1B
2,950,299 UART: [art] PUB.Y = 8DD081ED6AF286E39B058A109107ABF8F4505464DD6C4CF9CE85D6DC09DD1A6D4119349EB58F7156DAE50BCBD5BC1D09
2,957,252 UART: [art] SIG.R = 9D289F397E92E9EB10FEEE4F3F086274002A744BE052C44B6F16356A6B4F01F01EDFE16C081F751A54E62B325202CAAD
2,963,996 UART: [art] SIG.S = E4DC80EDB775DD87D968159E27F00A623C21DB204165E0B924CECB22CDF27E41B8B868D9FFF0D5D80B70ED30AF2130D5
2,987,575 UART: Caliptra RT
2,987,828 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,091,150 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D3E ra=0x40007056 error_internal_intr_r=00000040
3,093,592 UART: [rt] WDT Expired
3,093,879 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,817 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,121 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,526 >>> mbox cmd response: success
2,771,542 UART: [afmc] ++
2,771,710 UART: [afmc] CDI.KEYID = 6
2,772,072 UART: [afmc] SUBJECT.KEYID = 7
2,772,497 UART: [afmc] AUTHORITY.KEYID = 5
2,808,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,053 UART: [afmc] --
2,851,931 UART: [cold-reset] --
2,852,975 UART: [state] Locking Datavault
2,854,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,922 UART: [state] Locking ICCM
2,855,396 UART: [exit] Launching FMC @ 0x40000130
2,860,725 UART:
2,860,741 UART: Running Caliptra FMC ...
2,861,149 UART:
2,861,292 UART: [state] CFI Enabled
2,872,221 UART: [fht] FMC Alias Private Key: 7
2,980,930 UART: [art] Extend RT PCRs Done
2,981,358 UART: [art] Lock RT PCRs Done
2,982,966 UART: [art] Populate DV Done
2,991,041 UART: [fht] FMC Alias Private Key: 7
2,991,981 UART: [art] Derive CDI
2,992,261 UART: [art] Store in in slot 0x4
3,077,842 UART: [art] Derive Key Pair
3,078,202 UART: [art] Store priv key in slot 0x5
3,091,508 UART: [art] Derive Key Pair - Done
3,106,377 UART: [art] Signing Cert with AUTHO
3,106,857 UART: RITY.KEYID = 7
3,122,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,824 UART: [art] PUB.X = 2856C63FD5C77308F878CC93028C457748B0CDA54468E92987A9E59715DAF2364F3C26868B43BEC221E1CB82234785DA
3,129,584 UART: [art] PUB.Y = F61DA173F946E051FD96DDBB54BA63D8DF25D0FC4A6E4732BA7E93BD9B4151A3C38FAB019F85DBB63B7D0681E9C38CB8
3,136,550 UART: [art] SIG.R = 4279AE38364D92F5E97B4E521C0194924C5EF89052A47DC87FD3AFA7299DF68CDCE4AF5178F9A8F3A0638B7EA815BB7C
3,143,329 UART: [art] SIG.S = 7369AFD3DE7DE79ABE2C78BB480FC772D9420E2CF7B100D69D583A70E0E1CE3889BE2097C3EFB990AE2C3158C0651046
3,167,612 UART: Caliptra RT
3,167,957 UART: [state] CFI Enabled
3,275,914 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3183105 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,757 >>> mbox cmd response: success
2,771,770 UART: [afmc] ++
2,771,938 UART: [afmc] CDI.KEYID = 6
2,772,300 UART: [afmc] SUBJECT.KEYID = 7
2,772,725 UART: [afmc] AUTHORITY.KEYID = 5
2,808,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,079 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,831,790 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,837,690 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,843,387 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,851,238 UART: [afmc] --
2,852,115 UART: [cold-reset] --
2,853,159 UART: [state] Locking Datavault
2,854,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,106 UART: [state] Locking ICCM
2,855,580 UART: [exit] Launching FMC @ 0x40000130
2,860,909 UART:
2,860,925 UART: Running Caliptra FMC ...
2,861,333 UART:
2,861,476 UART: [state] CFI Enabled
2,872,406 UART: [fht] FMC Alias Private Key: 7
2,981,125 UART: [art] Extend RT PCRs Done
2,981,553 UART: [art] Lock RT PCRs Done
2,983,161 UART: [art] Populate DV Done
2,991,236 UART: [fht] FMC Alias Private Key: 7
2,992,176 UART: [art] Derive CDI
2,992,456 UART: [art] Store in in slot 0x4
3,078,035 UART: [art] Derive Key Pair
3,078,395 UART: [art] Store priv key in slot 0x5
3,091,701 UART: [art] Derive Key Pair - Done
3,106,567 UART: [art] Signing Cert with AUTHO
3,107,047 UART: RITY.KEYID = 7
3,122,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,014 UART: [art] PUB.X = 3CF29C5B9833FE0C16D44EF7CFF2BEAF9F0425F8DB6F92486F45DF006FD136F3E7A9A9D54D9C444BA100581FC73AB814
3,129,752 UART: [art] PUB.Y = 8B99053A6EA37C84092CB39289AB4858E362D260BCD7B28F234AC315081696E4BBE929F1A8AD9F90E10D7818D16DA36A
3,136,694 UART: [art] SIG.R = C7ADE4325A5D9215B679154EC286D8184BBCDAA35393FF6E8A0061D4217509B0626E8527B6AE951350993454D1BB6A47
3,143,437 UART: [art] SIG.S = B513C99F0DCA608D6835A9D6C803E1E67683155FF2CF34BF839803321D2AF39A1D53C6F11E99075C526F5E6795F689D6
3,167,722 UART: Caliptra RT
3,168,067 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,271,708 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D46 ra=0x40007056 error_internal_intr_r=00000040
3,274,148 UART: [rt] WDT Expired
3,274,435 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,507 >>> mbox cmd response: success
2,685,369 UART:
2,685,385 UART: Running Caliptra FMC ...
2,685,793 UART:
2,685,936 UART: [state] CFI Enabled
2,696,865 UART: [fht] FMC Alias Private Key: 7
2,805,574 UART: [art] Extend RT PCRs Done
2,806,002 UART: [art] Lock RT PCRs Done
2,807,610 UART: [art] Populate DV Done
2,815,685 UART: [fht] FMC Alias Private Key: 7
2,816,625 UART: [art] Derive CDI
2,816,905 UART: [art] Store in in slot 0x4
2,902,486 UART: [art] Derive Key Pair
2,902,846 UART: [art] Store priv key in slot 0x5
2,916,152 UART: [art] Derive Key Pair - Done
2,931,020 UART: [art] Signing Cert with AUTHO
2,931,500 UART: RITY.KEYID = 7
2,946,702 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,467 UART: [art] PUB.X = 26112C058B11DF63CDDB9DADC5A4C28CB5630E60C74D7FF07F95189B950429B27878F024DF66CC53258386BAC2DDE85D
2,954,238 UART: [art] PUB.Y = 641A8395430CF2E6142939CFCD5F74834BC051B16EB3B4CFBB5E817E8B0CD0584C112AFF229D5DA317E67CDB4877DC5A
2,961,196 UART: [art] SIG.R = 1062A80CB6434B1DD93A7D1A6FB486F0F0890EBA5FF8785F2BB1A41BBCE08071192ED680F22896AAC33FD621BF786702
2,967,967 UART: [art] SIG.S = 3B810B0B2C8193FC481BF836836B0EF194AACE1DF7A288EE93F18E49ED4562086F421C95147A06ADDDFA338E425E4830
2,992,259 UART: Caliptra RT
2,992,604 UART: [state] CFI Enabled
3,100,561 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,754 >>> mbox cmd response: success
2,685,605 UART:
2,685,621 UART: Running Caliptra FMC ...
2,686,029 UART:
2,686,172 UART: [state] CFI Enabled
2,697,102 UART: [fht] FMC Alias Private Key: 7
2,805,821 UART: [art] Extend RT PCRs Done
2,806,249 UART: [art] Lock RT PCRs Done
2,807,857 UART: [art] Populate DV Done
2,815,932 UART: [fht] FMC Alias Private Key: 7
2,816,872 UART: [art] Derive CDI
2,817,152 UART: [art] Store in in slot 0x4
2,902,731 UART: [art] Derive Key Pair
2,903,091 UART: [art] Store priv key in slot 0x5
2,916,397 UART: [art] Derive Key Pair - Done
2,931,267 UART: [art] Signing Cert with AUTHO
2,931,747 UART: RITY.KEYID = 7
2,946,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,714 UART: [art] PUB.X = 8186A57282EEB213C92567D2357C0B5181E666DE4D68BD4AF8C95047A9515344274B5A2613B098523DE54AC0649700E2
2,954,449 UART: [art] PUB.Y = 0CBD1BEFD9472492AA31A218E8C25D6E378E605A0E8E6E96DD9F228E24507D7C06168CF985EA56D6C9ED86926D1F6631
2,961,398 UART: [art] SIG.R = C13B4FD2F27BB4D604E87C4C7F2365C9BE7CEE84C39BCAD7E1EDA40799172DAE092CD0E384CC698A796DB159F8E174B1
2,968,179 UART: [art] SIG.S = FABE1F21100299D27F3CE27D1C0C215D62256E6A54ECC5ECF3E3F16833460558D2F16B4F5431DC6C47A7FCD14F2FF1D9
2,992,481 UART: Caliptra RT
2,992,826 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,096,329 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D3E ra=0x40007056 error_internal_intr_r=00000040
3,098,771 UART: [rt] WDT Expired
3,099,058 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,245 >>> mbox cmd response: success
2,768,408 UART: [afmc] ++
2,768,576 UART: [afmc] CDI.KEYID = 6
2,768,939 UART: [afmc] SUBJECT.KEYID = 7
2,769,365 UART: [afmc] AUTHORITY.KEYID = 5
2,804,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,653 UART: [afmc] --
2,847,725 UART: [cold-reset] --
2,848,645 UART: [state] Locking Datavault
2,849,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,440 UART: [state] Locking ICCM
2,850,860 UART: [exit] Launching FMC @ 0x40000130
2,856,189 UART:
2,856,205 UART: Running Caliptra FMC ...
2,856,613 UART:
2,856,667 UART: [state] CFI Enabled
2,867,252 UART: [fht] FMC Alias Private Key: 7
2,974,593 UART: [art] Extend RT PCRs Done
2,975,021 UART: [art] Lock RT PCRs Done
2,976,753 UART: [art] Populate DV Done
2,985,032 UART: [fht] FMC Alias Private Key: 7
2,986,024 UART: [art] Derive CDI
2,986,304 UART: [art] Store in in slot 0x4
3,071,375 UART: [art] Derive Key Pair
3,071,735 UART: [art] Store priv key in slot 0x5
3,085,361 UART: [art] Derive Key Pair - Done
3,100,344 UART: [art] Signing Cert with AUTHO
3,100,824 UART: RITY.KEYID = 7
3,116,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,777 UART: [art] PUB.X = 97DE69267453ADA4C1E223734B3DB027CF84137A73046126DE05BBDCA7FA9798C3CCAAF72332895378FD05CD63AFEC83
3,123,548 UART: [art] PUB.Y = B2A457B16A6F2993B0126153A4CCA11D59942072FEB683153C0E8AE57A82DBE99BAD15BAB0096A4B1377D9241AF1B92F
3,130,500 UART: [art] SIG.R = CAA839CE85D761C623AA9B76542EF212E47424A0CFEA1FAF088E8E3B8A2DDCC928E125D9361607DD2548ECDFCD5A664B
3,137,284 UART: [art] SIG.S = 3B0E047C1AA52C308D0C08CD91CBD204488F0783C566C62868F3B746B60854D0FCABE3AD4A3D1D4E57800F0CE5FF6789
3,160,838 UART: Caliptra RT
3,161,091 UART: [state] CFI Enabled
3,268,810 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3177020 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,476 >>> mbox cmd response: success
2,768,636 UART: [afmc] ++
2,768,804 UART: [afmc] CDI.KEYID = 6
2,769,167 UART: [afmc] SUBJECT.KEYID = 7
2,769,593 UART: [afmc] AUTHORITY.KEYID = 5
2,804,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,791 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,827,503 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,833,401 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,839,098 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,846,838 UART: [afmc] --
2,847,909 UART: [cold-reset] --
2,848,829 UART: [state] Locking Datavault
2,850,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,624 UART: [state] Locking ICCM
2,851,044 UART: [exit] Launching FMC @ 0x40000130
2,856,373 UART:
2,856,389 UART: Running Caliptra FMC ...
2,856,797 UART:
2,856,851 UART: [state] CFI Enabled
2,867,437 UART: [fht] FMC Alias Private Key: 7
2,974,788 UART: [art] Extend RT PCRs Done
2,975,216 UART: [art] Lock RT PCRs Done
2,976,948 UART: [art] Populate DV Done
2,985,227 UART: [fht] FMC Alias Private Key: 7
2,986,219 UART: [art] Derive CDI
2,986,499 UART: [art] Store in in slot 0x4
3,071,568 UART: [art] Derive Key Pair
3,071,928 UART: [art] Store priv key in slot 0x5
3,085,554 UART: [art] Derive Key Pair - Done
3,100,539 UART: [art] Signing Cert with AUTHO
3,101,019 UART: RITY.KEYID = 7
3,116,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,972 UART: [art] PUB.X = B288896F855AFCC2EC8226F9A52002EFB6A3FF7E18E0B488D0648AE35A15D2650C5541F07312D1A6788ADE849406CBCD
3,123,741 UART: [art] PUB.Y = ADCAF3AA91A37E5DF162792D1DF4AE2368799A3DC9D5655DA47AB3906D0B68909A40899958AF5035C121CC81A8AD2250
3,130,696 UART: [art] SIG.R = DAD9EBDC3BF36B396C20966DC5E719A2D85D38C96AB936CA05334DCF05B5469B6DB57AAB6A9A8B0687F4FB55DB1DE4C1
3,137,481 UART: [art] SIG.S = A7E0BE6B364809BA89DEA252C6A4A2BC5E8187D5801FD15FCC925FCB7C2F09CC82FBEA4EF62FE004E221505069AF9C68
3,161,061 UART: Caliptra RT
3,161,314 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,264,612 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D40 ra=0x40007056 error_internal_intr_r=00000040
3,267,052 UART: [rt] WDT Expired
3,267,339 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,111 >>> mbox cmd response: success
2,678,711 UART:
2,678,727 UART: Running Caliptra FMC ...
2,679,135 UART:
2,679,189 UART: [state] CFI Enabled
2,689,774 UART: [fht] FMC Alias Private Key: 7
2,797,115 UART: [art] Extend RT PCRs Done
2,797,543 UART: [art] Lock RT PCRs Done
2,799,275 UART: [art] Populate DV Done
2,807,554 UART: [fht] FMC Alias Private Key: 7
2,808,546 UART: [art] Derive CDI
2,808,826 UART: [art] Store in in slot 0x4
2,893,897 UART: [art] Derive Key Pair
2,894,257 UART: [art] Store priv key in slot 0x5
2,907,883 UART: [art] Derive Key Pair - Done
2,922,877 UART: [art] Signing Cert with AUTHO
2,923,357 UART: RITY.KEYID = 7
2,938,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,310 UART: [art] PUB.X = A6E9A873B26BDF2E13F0D037A8AD6B6D1FBE677B85E16B7E3B46D0374249A5B41C356A4A2A0BA617A76730080AEA4F47
2,946,083 UART: [art] PUB.Y = EDC387CD04E4CF655B38B0FEE0A46B2A131F28CC0F1CE44F59118CD8E4072967A7DCC03D8582FB88B5120BAD92355239
2,953,033 UART: [art] SIG.R = 1101CA3972AD85532977477ABF36135EC07D53F2A3B5C89D7820358762EA852C1506C367B20A2D53BCD8F2750E76C9F4
2,959,787 UART: [art] SIG.S = 4AACEB463BD6BCA8A6100F30807DA01CAFAE62CFCB059CCCE7C0C5D6C354DB0F7C7CD31BDA4EF26006CB5ADF71177F6D
2,983,382 UART: Caliptra RT
2,983,635 UART: [state] CFI Enabled
3,091,404 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,358 >>> mbox cmd response: success
2,678,947 UART:
2,678,963 UART: Running Caliptra FMC ...
2,679,371 UART:
2,679,425 UART: [state] CFI Enabled
2,690,011 UART: [fht] FMC Alias Private Key: 7
2,797,362 UART: [art] Extend RT PCRs Done
2,797,790 UART: [art] Lock RT PCRs Done
2,799,522 UART: [art] Populate DV Done
2,807,801 UART: [fht] FMC Alias Private Key: 7
2,808,793 UART: [art] Derive CDI
2,809,073 UART: [art] Store in in slot 0x4
2,894,142 UART: [art] Derive Key Pair
2,894,502 UART: [art] Store priv key in slot 0x5
2,908,128 UART: [art] Derive Key Pair - Done
2,923,110 UART: [art] Signing Cert with AUTHO
2,923,590 UART: RITY.KEYID = 7
2,938,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,543 UART: [art] PUB.X = AB6C3C918EC710EA2E618297268C462B95D81C1E4D0C4A178C2BD80BE85D5F3B0C0609C34275112511C19D2361AEA78F
2,946,302 UART: [art] PUB.Y = A9772DB65CB75AC43CFC41915264A7765B6E14B25E2599478B58A67664F0E0AF46D3B19949AD812F0BFB9A2A191C449C
2,953,253 UART: [art] SIG.R = 7F92CB2F766BE12C2AA6E27CA4E5DD4D786975A7673C2FCA33163B6E928365FC228EBE62468DCB6BE862253572D2CA9C
2,960,035 UART: [art] SIG.S = E2027F7553F32CAB453EF81D5A88D0E21B68C0FBA41447CC0A839C58BEE1614825441B8AF78E281AF02CFE4AD942035C
2,983,605 UART: Caliptra RT
2,983,858 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,087,180 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D48 ra=0x40007056 error_internal_intr_r=00000040
3,089,620 UART: [rt] WDT Expired
3,089,907 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,626 >>> mbox cmd response: success
2,769,649 UART: [afmc] ++
2,769,817 UART: [afmc] CDI.KEYID = 6
2,770,180 UART: [afmc] SUBJECT.KEYID = 7
2,770,606 UART: [afmc] AUTHORITY.KEYID = 5
2,806,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,190 UART: [afmc] --
2,850,068 UART: [cold-reset] --
2,851,112 UART: [state] Locking Datavault
2,852,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,059 UART: [state] Locking ICCM
2,853,533 UART: [exit] Launching FMC @ 0x40000130
2,858,862 UART:
2,858,878 UART: Running Caliptra FMC ...
2,859,286 UART:
2,859,429 UART: [state] CFI Enabled
2,870,358 UART: [fht] FMC Alias Private Key: 7
2,979,067 UART: [art] Extend RT PCRs Done
2,979,495 UART: [art] Lock RT PCRs Done
2,981,103 UART: [art] Populate DV Done
2,989,178 UART: [fht] FMC Alias Private Key: 7
2,990,118 UART: [art] Derive CDI
2,990,398 UART: [art] Store in in slot 0x4
3,075,979 UART: [art] Derive Key Pair
3,076,339 UART: [art] Store priv key in slot 0x5
3,089,645 UART: [art] Derive Key Pair - Done
3,104,513 UART: [art] Signing Cert with AUTHO
3,104,993 UART: RITY.KEYID = 7
3,120,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,960 UART: [art] PUB.X = 39AF157FB9B87F93FF7DC4E1428639A1D439251DD6134F8A658C1B789787F98369523AD270D1CB45982C0FB6448EF321
3,127,725 UART: [art] PUB.Y = 506D11F6C7063CBBFD07BDF45F38C4E6C3F59ADC4893DD57551330CCF9F6A56A81BA385C3B46A3F70E03F196081F65F8
3,134,672 UART: [art] SIG.R = 27C91640A7A3FA6B9C9BA4C3AE96CB7850EB8254FEA258900AEC1B819CF1FA20AD2B1EBBCFD3A64E3EC6E275338F0C26
3,141,460 UART: [art] SIG.S = F7B18AD232E35F598E89A113904AAD29403841699A73E3287916E98566EC956319102846D82CB28B34F246E4F519EA4E
3,165,749 UART: Caliptra RT
3,166,094 UART: [state] CFI Enabled
3,274,069 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3181290 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,857 >>> mbox cmd response: success
2,769,877 UART: [afmc] ++
2,770,045 UART: [afmc] CDI.KEYID = 6
2,770,408 UART: [afmc] SUBJECT.KEYID = 7
2,770,834 UART: [afmc] AUTHORITY.KEYID = 5
2,806,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,212 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,924 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,835,822 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,841,519 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,849,375 UART: [afmc] --
2,850,252 UART: [cold-reset] --
2,851,296 UART: [state] Locking Datavault
2,852,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,243 UART: [state] Locking ICCM
2,853,717 UART: [exit] Launching FMC @ 0x40000130
2,859,046 UART:
2,859,062 UART: Running Caliptra FMC ...
2,859,470 UART:
2,859,613 UART: [state] CFI Enabled
2,870,543 UART: [fht] FMC Alias Private Key: 7
2,979,262 UART: [art] Extend RT PCRs Done
2,979,690 UART: [art] Lock RT PCRs Done
2,981,298 UART: [art] Populate DV Done
2,989,373 UART: [fht] FMC Alias Private Key: 7
2,990,313 UART: [art] Derive CDI
2,990,593 UART: [art] Store in in slot 0x4
3,076,172 UART: [art] Derive Key Pair
3,076,532 UART: [art] Store priv key in slot 0x5
3,089,838 UART: [art] Derive Key Pair - Done
3,104,710 UART: [art] Signing Cert with AUTHO
3,105,190 UART: RITY.KEYID = 7
3,120,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,157 UART: [art] PUB.X = 6EA3BE3C12E0CBCC65EF441297E0DCA2CC7F2648875995739DDD412C42D6E660F3BF1B2769EE8640690B9633C57C4CCE
3,127,936 UART: [art] PUB.Y = CB8D287D8F5262753170401BF517D7F5D61EEEF7DEE4CD4CB26B707ED6A84B2A6A678B3239558662AD5064B5DD9E1EC8
3,134,898 UART: [art] SIG.R = 314772B9F5F07DC4FA653BCA9793FE6B6351068E35869E429F838AB972DAAF23F98888881FF3FBF3BA56E86FE89C6161
3,141,671 UART: [art] SIG.S = 3BD2C699B0A8C2083D7702283898081E2B08E3E55873E7431F41E645DE1FB27B90E0DFDF30B8D9F7779A5C70D5DD4607
3,165,955 UART: Caliptra RT
3,166,300 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,269,863 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D44 ra=0x40007056 error_internal_intr_r=00000040
3,272,303 UART: [rt] WDT Expired
3,272,590 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,492 >>> mbox cmd response: success
2,681,384 UART:
2,681,400 UART: Running Caliptra FMC ...
2,681,808 UART:
2,681,951 UART: [state] CFI Enabled
2,692,880 UART: [fht] FMC Alias Private Key: 7
2,801,589 UART: [art] Extend RT PCRs Done
2,802,017 UART: [art] Lock RT PCRs Done
2,803,625 UART: [art] Populate DV Done
2,811,700 UART: [fht] FMC Alias Private Key: 7
2,812,640 UART: [art] Derive CDI
2,812,920 UART: [art] Store in in slot 0x4
2,898,501 UART: [art] Derive Key Pair
2,898,861 UART: [art] Store priv key in slot 0x5
2,912,167 UART: [art] Derive Key Pair - Done
2,927,045 UART: [art] Signing Cert with AUTHO
2,927,525 UART: RITY.KEYID = 7
2,942,727 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,492 UART: [art] PUB.X = D31F983A777D419EC925CA4ADD5F600C4F1C8076E9AA8EC6C358057BCFA9E17FC66B2E0AF07FE5B539B79771A3735130
2,950,265 UART: [art] PUB.Y = 5CF1A90FDF897E12D4E8AC8BACDC2302DB23A6E75D5CBA8F49E4A6EB8144D340577F258F4EE2021DD066DFDDBF080DB7
2,957,226 UART: [art] SIG.R = B46187E5E7C2D44D2AE124EF75BD98CEA0C7A7F15FF819FB1DDF33824A6E97EE645E668FB2037F5E778AFF2DF241965D
2,964,011 UART: [art] SIG.S = 28D5D23A2176D2A52B0C357BECD9DD40884D35BA2D53A71FBB473510D7C40690A239102B8CBBE109EFEC7D75962BB6B7
2,988,313 UART: Caliptra RT
2,988,658 UART: [state] CFI Enabled
3,096,565 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,739 >>> mbox cmd response: success
2,681,620 UART:
2,681,636 UART: Running Caliptra FMC ...
2,682,044 UART:
2,682,187 UART: [state] CFI Enabled
2,693,117 UART: [fht] FMC Alias Private Key: 7
2,801,836 UART: [art] Extend RT PCRs Done
2,802,264 UART: [art] Lock RT PCRs Done
2,803,872 UART: [art] Populate DV Done
2,811,947 UART: [fht] FMC Alias Private Key: 7
2,812,887 UART: [art] Derive CDI
2,813,167 UART: [art] Store in in slot 0x4
2,898,746 UART: [art] Derive Key Pair
2,899,106 UART: [art] Store priv key in slot 0x5
2,912,412 UART: [art] Derive Key Pair - Done
2,927,284 UART: [art] Signing Cert with AUTHO
2,927,764 UART: RITY.KEYID = 7
2,942,966 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,731 UART: [art] PUB.X = 3ED151023E0C6B47EF59093C0EF40A2A91F09E9982E62A5C62E0F9565F018786E10F2FA0C8117D22ED4FD58A2FE73E95
2,950,486 UART: [art] PUB.Y = FD83878BFD7372C270E1AC5EEF8958DC98427C60536C5926C400374E8EF166E80BAE1454367610A6971D1B9E5882098F
2,957,404 UART: [art] SIG.R = 05BBB85B24F0332E8F9886411B3A2A32AA5A1F513CCA2F6FB0406C7B9D6140FF2DE9C212AF1FC382473EA52439ECEA57
2,964,185 UART: [art] SIG.S = F0524E1972F66320B891C9A653FC30BE098EED66C9A9C3FA3BFAACE293E4024B618548483080E3146397DF09AC86BF7D
2,988,479 UART: Caliptra RT
2,988,824 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,092,333 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D3E ra=0x40007056 error_internal_intr_r=00000040
3,094,775 UART: [rt] WDT Expired
3,095,062 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,677 UART: [kat] SHA2-256
901,617 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,204 UART: [kat] LMS
1,169,516 UART: [kat] --
1,170,561 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,765 UART: [idev] ++
1,173,933 UART: [idev] CDI.KEYID = 6
1,174,294 UART: [idev] SUBJECT.KEYID = 7
1,174,719 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,324 UART: [kat] ++
895,476 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,585 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,530 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,600 UART: [idev] ++
1,173,768 UART: [idev] CDI.KEYID = 6
1,174,129 UART: [idev] SUBJECT.KEYID = 7
1,174,554 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,397 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,443 UART: [idev] ++
1,172,611 UART: [idev] CDI.KEYID = 6
1,172,972 UART: [idev] SUBJECT.KEYID = 7
1,173,397 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
903,971 UART: [kat] SHA2-512-ACC
905,872 UART: [kat] ECC-384
915,697 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,494 UART: [cold-reset] ++
1,170,050 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,701 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,948 UART: [idev] ++
1,173,116 UART: [idev] CDI.KEYID = 6
1,173,477 UART: [idev] SUBJECT.KEYID = 7
1,173,902 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
191,907 UART:
192,269 UART: Running Caliptra ROM ...
193,440 UART:
193,589 UART: [state] CFI Enabled
265,896 UART: [state] LifecycleState = Production
267,690 UART: [state] DebugLocked = Yes
270,244 UART: [state] Starting the Watchdog Timer 40000000 cycles
276,311 UART: [kat] SHA2-256
446,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,595 UART: [kat] ++
457,083 UART: [kat] sha1
467,621 UART: [kat] SHA2-256
470,300 UART: [kat] SHA2-384
475,555 UART: [kat] SHA2-512-ACC
477,931 UART: [kat] ECC-384
2,768,863 UART: [kat] HMAC-384Kdf
2,800,971 UART: [kat] LMS
3,991,320 UART: [kat] --
3,996,152 UART: [cold-reset] ++
3,998,437 UART: [fht] Storing FHT @ 0x50003400
4,008,846 UART: [idev] ++
4,009,484 UART: [idev] CDI.KEYID = 6
4,010,397 UART: [idev] SUBJECT.KEYID = 7
4,011,641 UART: [idev] UDS.KEYID = 0
4,012,565 ready_for_fw is high
4,012,774 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,902 UART: [idev] Erasing UDS.KEYID = 0
7,345,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,749 UART: [idev] --
7,373,128 UART: [ldev] ++
7,373,757 UART: [ldev] CDI.KEYID = 6
7,374,636 UART: [ldev] SUBJECT.KEYID = 5
7,375,898 UART: [ldev] AUTHORITY.KEYID = 7
7,377,174 UART: [ldev] FE.KEYID = 1
7,424,437 UART: [ldev] Erasing FE.KEYID = 1
10,758,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,238 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,083,777 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,098,458 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,112,847 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,131,517 UART: [ldev] --
13,135,807 UART: [fwproc] Waiting for Commands...
13,137,626 UART: [fwproc] Received command 0x46574c44
13,139,823 UART: [fwproc] Received Image of size 113760 bytes
17,220,135 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,365,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,681,066 >>> mbox cmd response: success
17,685,429 UART: [afmc] ++
17,686,021 UART: [afmc] CDI.KEYID = 6
17,686,934 UART: [afmc] SUBJECT.KEYID = 7
17,688,145 UART: [afmc] AUTHORITY.KEYID = 5
21,050,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,321 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,369,041 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,383,643 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,398,111 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,418,691 UART: [afmc] --
23,422,013 UART: [cold-reset] --
23,427,136 UART: [state] Locking Datavault
23,432,269 UART: [state] Locking PCR0, PCR1 and PCR31
23,434,136 UART: [state] Locking ICCM
23,436,227 UART: [exit] Launching FMC @ 0x40000130
23,444,627 UART:
23,444,871 UART: Running Caliptra FMC ...
23,445,971 UART:
23,446,132 UART: [state] CFI Enabled
23,507,119 UART: [fht] FMC Alias Private Key: 7
25,845,449 UART: [art] Extend RT PCRs Done
25,847,075 UART: [art] Lock RT PCRs Done
25,848,091 UART: [art] Populate DV Done
25,853,312 UART: [fht] FMC Alias Private Key: 7
25,854,962 UART: [art] Derive CDI
25,855,778 UART: [art] Store in in slot 0x4
25,898,504 UART: [art] Derive Key Pair
25,899,501 UART: [art] Store priv key in slot 0x5
29,192,592 UART: [art] Derive Key Pair - Done
29,205,573 UART: [art] Signing Cert with AUTHO
29,206,929 UART: RITY.KEYID = 7
31,496,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,541 UART: [art] PUB.X = 2038EE013BCE5481272F37168910D34C50B2DF7F18727AEC43C264129E131842D4C671668118FA45F87EB364C8AD6A38
31,505,471 UART: [art] PUB.Y = 8EE61E92ACA93CE8E86E82FE48592018ED12DCFAAF1AB7EFBEB094CE15B62626EB57A49432B12E2202106845740DF8B5
31,512,599 UART: [art] SIG.R = CFBB2898E980EDBCC53C2F239B73D92C20B5CD0EC86539CD1DF9174CBBF6ACBE0268F60BD8268CE7F4A069BB7D918AFF
31,520,011 UART: [art] SIG.S = 8F42D880168A5254BF5B8CF7907734D82C64EB58DF29902AA7D93E4A0DD87E39244A1BDDA951265315D8422F42C1A573
32,825,448 UART: Caliptra RT
32,826,882 UART: [state] CFI Enabled
32,987,477 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,037 UART:
1,270 UART: Running Caliptra ROM ...
2,284 UART:
2,428 UART: [state] CFI Enabled
64,225 UART: [state] LifecycleState = Production
66,151 UART: [state] DebugLocked = Yes
68,845 UART: [state] Starting the Watchdog Timer 40000000 cycles
73,257 UART: [kat] SHA2-256
242,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
253,475 UART: [kat] ++
253,978 UART: [kat] sha1
265,986 UART: [kat] SHA2-256
268,707 UART: [kat] SHA2-384
274,452 UART: [kat] SHA2-512-ACC
276,810 UART: [kat] ECC-384
2,670,259 UART: [kat] HMAC-384Kdf
2,684,047 UART: [kat] LMS
3,874,366 UART: [kat] --
3,879,253 UART: [warm-reset] ++
3,882,847 UART: [warm-reset] --
3,887,057 UART: [state] Locking Datavault
3,889,737 UART: [state] Locking PCR0, PCR1 and PCR31
3,891,496 UART: [state] Locking ICCM
3,893,803 UART: [exit] Launching FMC @ 0x40000130
3,902,208 UART:
3,902,443 UART: Running Caliptra FMC ...
3,903,543 UART:
3,903,705 UART: [state] CFI Enabled
3,957,257 UART: [aliasrt :skip pcr extension
3,958,526 UART: [art] Extend RT PCRs Done
3,959,662 UART: [art] Lock RT PCRs Done
3,960,985 UART: [art] Populate DV Done
3,966,201 UART: [fht] FMC Alias Private Key: 7
3,967,812 UART: [art] Derive CDI
3,968,626 UART: [art] Store in in slot 0x4
4,025,931 UART: [art] Derive Key Pair
4,026,937 UART: [art] Store priv key in slot 0x5
7,320,728 UART: [art] Derive Key Pair - Done
7,333,521 UART: [art] Signing Cert with AUTHO
7,334,856 UART: RITY.KEYID = 7
9,622,863 UART: [art] Erasing AUTHORITY.KEYID = 7
9,624,869 UART: [art] PUB.X = 2038EE013BCE5481272F37168910D34C50B2DF7F18727AEC43C264129E131842D4C671668118FA45F87EB364C8AD6A38
9,631,617 UART: [art] PUB.Y = 8EE61E92ACA93CE8E86E82FE48592018ED12DCFAAF1AB7EFBEB094CE15B62626EB57A49432B12E2202106845740DF8B5
9,638,813 UART: [art] SIG.R = CFBB2898E980EDBCC53C2F239B73D92C20B5CD0EC86539CD1DF9174CBBF6ACBE0268F60BD8268CE7F4A069BB7D918AFF
9,646,300 UART: [art] SIG.S = 8F42D880168A5254BF5B8CF7907734D82C64EB58DF29902AA7D93E4A0DD87E39244A1BDDA951265315D8422F42C1A573
10,951,898 UART: Caliptra RT
10,953,013 UART: [state] CFI Enabled
11,291,976 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,805,741 ready_for_fw is high
3,806,362 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,910,802 >>> mbox cmd response: success
23,608,579 UART:
23,608,979 UART: Running Caliptra FMC ...
23,610,123 UART:
23,610,279 UART: [state] CFI Enabled
23,678,374 UART: [fht] FMC Alias Private Key: 7
26,016,095 UART: [art] Extend RT PCRs Done
26,017,497 UART: [art] Lock RT PCRs Done
26,019,077 UART: [art] Populate DV Done
26,024,793 UART: [fht] FMC Alias Private Key: 7
26,026,336 UART: [art] Derive CDI
26,027,155 UART: [art] Store in in slot 0x4
26,086,517 UART: [art] Derive Key Pair
26,087,521 UART: [art] Store priv key in slot 0x5
29,379,916 UART: [art] Derive Key Pair - Done
29,392,914 UART: [art] Signing Cert with AUTHO
29,394,212 UART: RITY.KEYID = 7
31,682,432 UART: [art] Erasing AUTHORITY.KEYID = 7
31,683,943 UART: [art] PUB.X = 8B1CC3387594E2D7810A179D14F932FCB1CDBF1805C485C6F28DB3F7DD7B67B0F62EFFF87B12891C1E2060B2F0B244FF
31,691,181 UART: [art] PUB.Y = 249DD1E7A1A7D6DAECEF941081CCE979E5A9939ED72455F8D810A2D395FEF3C854AB96094F8ECCA96D9DFF04A26C94C6
31,698,451 UART: [art] SIG.R = EAB0863DC30420254C322364710E58F5861F8CFF26C15658F0DBC55E00D08B377F81AC6396A083AF3206B5686DAF807A
31,705,837 UART: [art] SIG.S = 602CB916A82CF72EAA5858372154C054F5A3F67DF9A7F381C32FFF4EA8C8603041F1B848FD880BB6CF00971136489CA3
33,011,381 UART: Caliptra RT
33,012,119 UART: [state] CFI Enabled
33,172,602 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,592,260 UART:
3,592,590 UART: Running Caliptra FMC ...
3,593,660 UART:
3,593,814 UART: [state] CFI Enabled
3,657,499 UART: [aliasrt :skip pcr extension
3,658,795 UART: [art] Extend RT PCRs Done
3,659,947 UART: [art] Lock RT PCRs Done
3,661,092 UART: [art] Populate DV Done
3,666,235 UART: [fht] FMC Alias Private Key: 7
3,667,777 UART: [art] Derive CDI
3,668,596 UART: [art] Store in in slot 0x4
3,725,917 UART: [art] Derive Key Pair
3,726,952 UART: [art] Store priv key in slot 0x5
7,019,351 UART: [art] Derive Key Pair - Done
7,032,465 UART: [art] Signing Cert with AUTHO
7,033,771 UART: RITY.KEYID = 7
9,321,026 UART: [art] Erasing AUTHORITY.KEYID = 7
9,322,677 UART: [art] PUB.X = 8B1CC3387594E2D7810A179D14F932FCB1CDBF1805C485C6F28DB3F7DD7B67B0F62EFFF87B12891C1E2060B2F0B244FF
9,329,828 UART: [art] PUB.Y = 249DD1E7A1A7D6DAECEF941081CCE979E5A9939ED72455F8D810A2D395FEF3C854AB96094F8ECCA96D9DFF04A26C94C6
9,337,111 UART: [art] SIG.R = EAB0863DC30420254C322364710E58F5861F8CFF26C15658F0DBC55E00D08B377F81AC6396A083AF3206B5686DAF807A
9,344,445 UART: [art] SIG.S = 602CB916A82CF72EAA5858372154C054F5A3F67DF9A7F381C32FFF4EA8C8603041F1B848FD880BB6CF00971136489CA3
10,649,752 UART: Caliptra RT
10,650,466 UART: [state] CFI Enabled
11,006,298 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
191,795 UART:
192,168 UART: Running Caliptra ROM ...
193,283 UART:
603,136 UART: [state] CFI Enabled
617,642 UART: [state] LifecycleState = Production
619,495 UART: [state] DebugLocked = Yes
620,836 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,613 UART: [kat] SHA2-256
795,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,869 UART: [kat] ++
806,541 UART: [kat] sha1
817,203 UART: [kat] SHA2-256
819,935 UART: [kat] SHA2-384
827,057 UART: [kat] SHA2-512-ACC
829,425 UART: [kat] ECC-384
3,113,868 UART: [kat] HMAC-384Kdf
3,125,387 UART: [kat] LMS
4,315,525 UART: [kat] --
4,318,758 UART: [cold-reset] ++
4,321,265 UART: [fht] Storing FHT @ 0x50003400
4,334,391 UART: [idev] ++
4,335,011 UART: [idev] CDI.KEYID = 6
4,335,928 UART: [idev] SUBJECT.KEYID = 7
4,337,175 UART: [idev] UDS.KEYID = 0
4,338,165 ready_for_fw is high
4,338,347 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,058 UART: [idev] Erasing UDS.KEYID = 0
7,628,736 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,557 UART: [idev] --
7,655,080 UART: [ldev] ++
7,655,651 UART: [ldev] CDI.KEYID = 6
7,656,666 UART: [ldev] SUBJECT.KEYID = 5
7,657,820 UART: [ldev] AUTHORITY.KEYID = 7
7,659,044 UART: [ldev] FE.KEYID = 1
7,671,521 UART: [ldev] Erasing FE.KEYID = 1
10,957,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,875 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,432 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,062 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,482 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,310,883 UART: [ldev] --
13,314,956 UART: [fwproc] Waiting for Commands...
13,317,483 UART: [fwproc] Received command 0x46574c44
13,319,718 UART: [fwproc] Received Image of size 113760 bytes
17,406,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,484,411 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,553,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,869,341 >>> mbox cmd response: success
17,873,082 UART: [afmc] ++
17,873,669 UART: [afmc] CDI.KEYID = 6
17,874,635 UART: [afmc] SUBJECT.KEYID = 7
17,875,843 UART: [afmc] AUTHORITY.KEYID = 5
21,191,974 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,484,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,487,014 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,501,704 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,516,426 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,530,798 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,551,554 UART: [afmc] --
23,556,175 UART: [cold-reset] --
23,558,195 UART: [state] Locking Datavault
23,562,251 UART: [state] Locking PCR0, PCR1 and PCR31
23,563,996 UART: [state] Locking ICCM
23,566,303 UART: [exit] Launching FMC @ 0x40000130
23,574,689 UART:
23,574,927 UART: Running Caliptra FMC ...
23,576,023 UART:
23,576,183 UART: [state] CFI Enabled
23,584,633 UART: [fht] FMC Alias Private Key: 7
25,915,507 UART: [art] Extend RT PCRs Done
25,916,737 UART: [art] Lock RT PCRs Done
25,918,467 UART: [art] Populate DV Done
25,924,093 UART: [fht] FMC Alias Private Key: 7
25,925,789 UART: [art] Derive CDI
25,926,803 UART: [art] Store in in slot 0x4
25,969,350 UART: [art] Derive Key Pair
25,970,348 UART: [art] Store priv key in slot 0x5
29,212,395 UART: [art] Derive Key Pair - Done
29,225,509 UART: [art] Signing Cert with AUTHO
29,226,810 UART: RITY.KEYID = 7
31,506,300 UART: [art] Erasing AUTHORITY.KEYID = 7
31,507,817 UART: [art] PUB.X = 2346203E98DED03B7224126FF35CCBC56713F932AD818C8513775E2E04F467ECD6E9E0F76FEBBACC747EEFE105D876BB
31,515,096 UART: [art] PUB.Y = 511035DDC7D0D3B4F0EBCC5990F1EBAD8C4C3BF4DDBDBE0EB7FF064FD9B58DD06BEA76D1AA79AAE58C478E43E9495BFA
31,522,364 UART: [art] SIG.R = F4751D0EDA24DAA1FD634979A72B914012BA5B090A2D28C8C52CC436CC033555F8D5760D44B05D62C26446ABF139294D
31,529,767 UART: [art] SIG.S = 01635F82CF64B0CF08EF3EDC58D793B216DE9096BBDC2BF8D1A754E913DC6ADCB3E11B37F1DF26BCEDEC81C9BED14067
32,835,407 UART: Caliptra RT
32,836,109 UART: [state] CFI Enabled
32,953,278 UART: [rt] RT listening for mailbox commands...
Initializing fuses
983 UART:
1,228 UART: Running Caliptra ROM ...
2,329 UART:
7,578,792 UART: [state] CFI Enabled
7,590,641 UART: [state] LifecycleState = Production
7,592,439 UART: [state] DebugLocked = Yes
7,594,752 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,599,693 UART: [kat] SHA2-256
7,769,452 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,780,012 UART: [kat] ++
7,780,478 UART: [kat] sha1
7,791,578 UART: [kat] SHA2-256
7,794,241 UART: [kat] SHA2-384
7,799,902 UART: [kat] SHA2-512-ACC
7,802,304 UART: [kat] ECC-384
10,085,040 UART: [kat] HMAC-384Kdf
10,096,729 UART: [kat] LMS
11,286,814 UART: [kat] --
11,290,708 UART: [warm-reset] ++
11,294,773 UART: [warm-reset] --
11,299,184 UART: [state] Locking Datavault
11,302,430 UART: [state] Locking PCR0, PCR1 and PCR31
11,304,179 UART: [state] Locking ICCM
11,306,168 UART: [exit] Launching FMC @ 0x40000130
11,314,562 UART:
11,314,800 UART: Running Caliptra FMC ...
11,315,896 UART:
11,316,047 UART: [state] CFI Enabled
11,317,959 UART: [aliasrt :skip pcr extension
11,319,202 UART: [art] Extend RT PCRs Done
11,320,333 UART: [art] Lock RT PCRs Done
11,321,389 UART: [art] Populate DV Done
11,327,112 UART: [fht] FMC Alias Private Key: 7
11,328,855 UART: [art] Derive CDI
11,329,663 UART: [art] Store in in slot 0x4
11,372,420 UART: [art] Derive Key Pair
11,373,448 UART: [art] Store priv key in slot 0x5
14,616,455 UART: [art] Derive Key Pair - Done
14,629,768 UART: [art] Signing Cert with AUTHO
14,631,074 UART: RITY.KEYID = 7
16,910,321 UART: [art] Erasing AUTHORITY.KEYID = 7
16,911,829 UART: [art] PUB.X = 2346203E98DED03B7224126FF35CCBC56713F932AD818C8513775E2E04F467ECD6E9E0F76FEBBACC747EEFE105D876BB
16,919,065 UART: [art] PUB.Y = 511035DDC7D0D3B4F0EBCC5990F1EBAD8C4C3BF4DDBDBE0EB7FF064FD9B58DD06BEA76D1AA79AAE58C478E43E9495BFA
16,926,379 UART: [art] SIG.R = F4751D0EDA24DAA1FD634979A72B914012BA5B090A2D28C8C52CC436CC033555F8D5760D44B05D62C26446ABF139294D
16,933,768 UART: [art] SIG.S = 01635F82CF64B0CF08EF3EDC58D793B216DE9096BBDC2BF8D1A754E913DC6ADCB3E11B37F1DF26BCEDEC81C9BED14067
18,238,867 UART: Caliptra RT
18,239,579 UART: [state] CFI Enabled
18,526,553 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,122,843 ready_for_fw is high
4,123,259 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,103,163 >>> mbox cmd response: success
23,747,732 UART:
23,748,110 UART: Running Caliptra FMC ...
23,749,255 UART:
23,749,413 UART: [state] CFI Enabled
23,757,234 UART: [fht] FMC Alias Private Key: 7
26,088,222 UART: [art] Extend RT PCRs Done
26,089,458 UART: [art] Lock RT PCRs Done
26,091,089 UART: [art] Populate DV Done
26,096,539 UART: [fht] FMC Alias Private Key: 7
26,098,133 UART: [art] Derive CDI
26,098,950 UART: [art] Store in in slot 0x4
26,141,066 UART: [art] Derive Key Pair
26,142,102 UART: [art] Store priv key in slot 0x5
29,384,345 UART: [art] Derive Key Pair - Done
29,396,963 UART: [art] Signing Cert with AUTHO
29,398,301 UART: RITY.KEYID = 7
31,677,682 UART: [art] Erasing AUTHORITY.KEYID = 7
31,679,200 UART: [art] PUB.X = 6FD0B0A9C850A3F8B147AC7041625CD8B41F225E2031BE5C802032D97D8318BE66F3BF5ECC5603F71460DEBA9CA6FBFA
31,686,465 UART: [art] PUB.Y = 171943E76A3F70BAF31489E5FE47FB1AF0731B46E4B37BBD0768FAB11A717F8FD61143E08E666ED4132D9F6B4096F0AF
31,693,698 UART: [art] SIG.R = 06A95C034C56A2488345EA8EE9CF22DBCC1EB14FAE7BB904AE6DE4F8CBB0C6A4E0FA5BA5CFEDBBBDB31416550951823D
31,701,105 UART: [art] SIG.S = 2461038DB8F82FCBE57143E6C58C368D1F79E90F217FC68DBE921EC72D63C7308A013F1014393F039594A988345ECC95
33,005,478 UART: Caliptra RT
33,006,187 UART: [state] CFI Enabled
33,123,702 UART: [rt] RT listening for mailbox commands...
Initializing fuses
10,951,316 UART:
10,951,652 UART: Running Caliptra FMC ...
10,952,721 UART:
10,952,876 UART: [state] CFI Enabled
10,954,744 UART: [aliasrt :skip pcr extension
10,955,994 UART: [art] Extend RT PCRs Done
10,957,132 UART: [art] Lock RT PCRs Done
10,958,280 UART: [art] Populate DV Done
10,963,790 UART: [fht] FMC Alias Private Key: 7
10,965,483 UART: [art] Derive CDI
10,966,292 UART: [art] Store in in slot 0x4
11,009,377 UART: [art] Derive Key Pair
11,010,432 UART: [art] Store priv key in slot 0x5
14,252,430 UART: [art] Derive Key Pair - Done
14,265,638 UART: [art] Signing Cert with AUTHO
14,266,964 UART: RITY.KEYID = 7
16,546,068 UART: [art] Erasing AUTHORITY.KEYID = 7
16,547,579 UART: [art] PUB.X = 6FD0B0A9C850A3F8B147AC7041625CD8B41F225E2031BE5C802032D97D8318BE66F3BF5ECC5603F71460DEBA9CA6FBFA
16,554,828 UART: [art] PUB.Y = 171943E76A3F70BAF31489E5FE47FB1AF0731B46E4B37BBD0768FAB11A717F8FD61143E08E666ED4132D9F6B4096F0AF
16,562,073 UART: [art] SIG.R = 06A95C034C56A2488345EA8EE9CF22DBCC1EB14FAE7BB904AE6DE4F8CBB0C6A4E0FA5BA5CFEDBBBDB31416550951823D
16,569,494 UART: [art] SIG.S = 2461038DB8F82FCBE57143E6C58C368D1F79E90F217FC68DBE921EC72D63C7308A013F1014393F039594A988345ECC95
17,874,772 UART: Caliptra RT
17,875,478 UART: [state] CFI Enabled
18,161,311 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
191,917 UART:
192,298 UART: Running Caliptra ROM ...
193,440 UART:
193,582 UART: [state] CFI Enabled
265,099 UART: [state] LifecycleState = Production
266,845 UART: [state] DebugLocked = Yes
268,711 UART: [state] Starting the WD Timer 40000000 cycles
274,083 UART: [kat] SHA2-256
453,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,781 UART: [kat] ++
465,301 UART: [kat] sha1
476,121 UART: [kat] SHA2-256
479,209 UART: [kat] SHA2-384
484,983 UART: [kat] SHA2-512-ACC
487,937 UART: [kat] ECC-384
2,946,800 UART: [kat] HMAC-384Kdf
2,970,011 UART: [kat] LMS
3,499,435 UART: [kat] --
3,504,024 UART: [cold-reset] ++
3,505,115 UART: [fht] FHT @ 0x50003400
3,515,812 UART: [idev] ++
3,516,387 UART: [idev] CDI.KEYID = 6
3,517,269 UART: [idev] SUBJECT.KEYID = 7
3,518,515 UART: [idev] UDS.KEYID = 0
3,519,448 ready_for_fw is high
3,519,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,199 UART: [idev] Erasing UDS.KEYID = 0
6,030,609 UART: [idev] Sha1 KeyId Algorithm
6,053,234 UART: [idev] --
6,057,209 UART: [ldev] ++
6,057,807 UART: [ldev] CDI.KEYID = 6
6,058,728 UART: [ldev] SUBJECT.KEYID = 5
6,059,890 UART: [ldev] AUTHORITY.KEYID = 7
6,061,122 UART: [ldev] FE.KEYID = 1
6,098,505 UART: [ldev] Erasing FE.KEYID = 1
8,603,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,795 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,353,806 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,628 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,581 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,405,122 UART: [ldev] --
10,409,416 UART: [fwproc] Wait for Commands...
10,411,566 UART: [fwproc] Recv command 0x46574c44
10,413,655 UART: [fwproc] Recv'd Img size: 114084 bytes
13,842,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,982,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,299,047 >>> mbox cmd response: success
14,303,990 UART: [afmc] ++
14,304,578 UART: [afmc] CDI.KEYID = 6
14,305,460 UART: [afmc] SUBJECT.KEYID = 7
14,306,559 UART: [afmc] AUTHORITY.KEYID = 5
16,843,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,569,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,571,082 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,587,072 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,602,946 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,618,693 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,641,315 UART: [afmc] --
18,644,842 UART: [cold-reset] --
18,649,349 UART: [state] Locking Datavault
18,653,563 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,226 UART: [state] Locking ICCM
18,657,755 UART: [exit] Launching FMC @ 0x40000130
18,666,207 UART:
18,666,439 UART: Running Caliptra FMC ...
18,667,535 UART:
18,667,690 UART: [state] CFI Enabled
18,729,240 UART: [fht] FMC Alias Private Key: 7
20,493,392 UART: [art] Extend RT PCRs Done
20,494,614 UART: [art] Lock RT PCRs Done
20,496,261 UART: [art] Populate DV Done
20,501,557 UART: [fht] FMC Alias Private Key: 7
20,503,196 UART: [art] Derive CDI
20,503,930 UART: [art] Store in in slot 0x4
20,561,568 UART: [art] Derive Key Pair
20,562,607 UART: [art] Store priv key in slot 0x5
23,025,881 UART: [art] Derive Key Pair - Done
23,038,852 UART: [art] Signing Cert with AUTHO
23,040,159 UART: RITY.KEYID = 7
24,752,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,613 UART: [art] PUB.X = 1FEE0EE5B0AC7204DE9C08ACDC898F2D28302A8DFE13BAE571ACAA4A3F9D3DA72C677FB2A714C4181A080FC8A34529B1
24,760,918 UART: [art] PUB.Y = C351B8FA403AEE984DD8B821A2E064C76B70192A7EC076CB4E225306CBFB0F8B75FFCA84B222734E3D1BB2057ADD215F
24,768,198 UART: [art] SIG.R = CD628751C746ABD983A8FA1BC4A11EC99F8807954CF26961A1563B7A735A40820EA9E6946D2A699D608057669FC19A61
24,775,574 UART: [art] SIG.S = C8E3122E67F4C989FBA7F3E8C63B9D710E7DB19335EC6A34EEDC4A8099F669F78C247F4978CBBEE3076C2693C8639E75
25,754,398 UART: Caliptra RT
25,755,099 UART: [state] CFI Enabled
25,919,249 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,044 UART:
1,213 UART: Running Caliptra ROM ...
2,322 UART:
2,472 UART: [state] CFI Enabled
66,099 UART: [state] LifecycleState = Production
67,880 UART: [state] DebugLocked = Yes
70,726 UART: [state] Starting the WD Timer 40000000 cycles
74,755 UART: [kat] SHA2-256
253,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,519 UART: [kat] ++
266,048 UART: [kat] sha1
277,259 UART: [kat] SHA2-256
280,310 UART: [kat] SHA2-384
285,745 UART: [kat] SHA2-512-ACC
288,692 UART: [kat] ECC-384
2,750,931 UART: [kat] HMAC-384Kdf
2,771,367 UART: [kat] LMS
3,300,842 UART: [kat] --
3,305,645 UART: [warm-reset] ++
3,311,403 UART: [warm-reset] --
3,314,020 UART: [state] Locking Datavault
3,317,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,091 UART: [state] Locking ICCM
3,320,675 UART: [exit] Launching FMC @ 0x40000130
3,329,133 UART:
3,329,411 UART: Running Caliptra FMC ...
3,330,444 UART:
3,330,593 UART: [state] CFI Enabled
3,380,881 UART: [aliasrt :skip pcr extension
3,382,136 UART: [art] Extend RT PCRs Done
3,383,193 UART: [art] Lock RT PCRs Done
3,384,474 UART: [art] Populate DV Done
3,389,878 UART: [fht] FMC Alias Private Key: 7
3,391,622 UART: [art] Derive CDI
3,392,356 UART: [art] Store in in slot 0x4
3,449,612 UART: [art] Derive Key Pair
3,450,656 UART: [art] Store priv key in slot 0x5
5,913,514 UART: [art] Derive Key Pair - Done
5,926,402 UART: [art] Signing Cert with AUTHO
5,927,707 UART: RITY.KEYID = 7
7,638,927 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,434 UART: [art] PUB.X = 1FEE0EE5B0AC7204DE9C08ACDC898F2D28302A8DFE13BAE571ACAA4A3F9D3DA72C677FB2A714C4181A080FC8A34529B1
7,647,787 UART: [art] PUB.Y = C351B8FA403AEE984DD8B821A2E064C76B70192A7EC076CB4E225306CBFB0F8B75FFCA84B222734E3D1BB2057ADD215F
7,655,061 UART: [art] SIG.R = CD628751C746ABD983A8FA1BC4A11EC99F8807954CF26961A1563B7A735A40820EA9E6946D2A699D608057669FC19A61
7,662,416 UART: [art] SIG.S = C8E3122E67F4C989FBA7F3E8C63B9D710E7DB19335EC6A34EEDC4A8099F669F78C247F4978CBBEE3076C2693C8639E75
8,640,944 UART: Caliptra RT
8,641,653 UART: [state] CFI Enabled
8,971,369 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,381,203 ready_for_fw is high
3,381,638 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,105,475 >>> mbox cmd response: success
18,388,560 UART:
18,388,964 UART: Running Caliptra FMC ...
18,390,083 UART:
18,390,240 UART: [state] CFI Enabled
18,453,485 UART: [fht] FMC Alias Private Key: 7
20,217,436 UART: [art] Extend RT PCRs Done
20,218,675 UART: [art] Lock RT PCRs Done
20,220,115 UART: [art] Populate DV Done
20,225,348 UART: [fht] FMC Alias Private Key: 7
20,227,001 UART: [art] Derive CDI
20,227,825 UART: [art] Store in in slot 0x4
20,285,964 UART: [art] Derive Key Pair
20,287,005 UART: [art] Store priv key in slot 0x5
22,750,150 UART: [art] Derive Key Pair - Done
22,763,151 UART: [art] Signing Cert with AUTHO
22,764,455 UART: RITY.KEYID = 7
24,476,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,947 UART: [art] PUB.X = FEA4125968B9CA6C7066C68DDE2DF488EE423330C4741C86AEE985D57E3DB8E1400437C7AF8977E2D7AE0B648F59922E
24,485,200 UART: [art] PUB.Y = E90F80A2BFD766606FD7BE8ADFC51C235A7D2DB9E643F005E093F141F6263B8A1BA62560EC7B1388A04FD8B6BBD262B6
24,492,442 UART: [art] SIG.R = F140700975040C6DA677C6A81083EEA6018DFF4B68FDFBBB72A570E6672F6AD7F8ABA7AF062E764DA9D1818C54F51FF3
24,499,834 UART: [art] SIG.S = BB3701FC40FDC2FB7FF66A884708522D3E2EC23F5561BC9D48E5208D627C7BD8EF12B0E7790D0655BDC6BDAE8D95C926
25,478,192 UART: Caliptra RT
25,478,897 UART: [state] CFI Enabled
25,644,399 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,189,928 UART:
3,190,249 UART: Running Caliptra FMC ...
3,191,294 UART:
3,191,444 UART: [state] CFI Enabled
3,254,000 UART: [aliasrt :skip pcr extension
3,255,267 UART: [art] Extend RT PCRs Done
3,256,329 UART: [art] Lock RT PCRs Done
3,257,470 UART: [art] Populate DV Done
3,262,903 UART: [fht] FMC Alias Private Key: 7
3,264,404 UART: [art] Derive CDI
3,265,140 UART: [art] Store in in slot 0x4
3,322,660 UART: [art] Derive Key Pair
3,323,657 UART: [art] Store priv key in slot 0x5
5,785,876 UART: [art] Derive Key Pair - Done
5,798,937 UART: [art] Signing Cert with AUTHO
5,800,265 UART: RITY.KEYID = 7
7,512,840 UART: [art] Erasing AUTHORITY.KEYID = 7
7,514,349 UART: [art] PUB.X = FEA4125968B9CA6C7066C68DDE2DF488EE423330C4741C86AEE985D57E3DB8E1400437C7AF8977E2D7AE0B648F59922E
7,521,599 UART: [art] PUB.Y = E90F80A2BFD766606FD7BE8ADFC51C235A7D2DB9E643F005E093F141F6263B8A1BA62560EC7B1388A04FD8B6BBD262B6
7,528,889 UART: [art] SIG.R = F140700975040C6DA677C6A81083EEA6018DFF4B68FDFBBB72A570E6672F6AD7F8ABA7AF062E764DA9D1818C54F51FF3
7,536,284 UART: [art] SIG.S = BB3701FC40FDC2FB7FF66A884708522D3E2EC23F5561BC9D48E5208D627C7BD8EF12B0E7790D0655BDC6BDAE8D95C926
8,514,905 UART: Caliptra RT
8,515,603 UART: [state] CFI Enabled
8,852,753 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,590 writing to cptra_bootfsm_go
192,248 UART:
192,620 UART: Running Caliptra ROM ...
193,809 UART:
603,460 UART: [state] CFI Enabled
615,720 UART: [state] LifecycleState = Production
617,443 UART: [state] DebugLocked = Yes
620,214 UART: [state] Starting the WD Timer 40000000 cycles
624,371 UART: [kat] SHA2-256
803,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,071 UART: [kat] ++
815,603 UART: [kat] sha1
826,008 UART: [kat] SHA2-256
829,088 UART: [kat] SHA2-384
834,790 UART: [kat] SHA2-512-ACC
837,795 UART: [kat] ECC-384
3,280,006 UART: [kat] HMAC-384Kdf
3,293,806 UART: [kat] LMS
3,823,293 UART: [kat] --
3,828,493 UART: [cold-reset] ++
3,831,135 UART: [fht] FHT @ 0x50003400
3,842,402 UART: [idev] ++
3,843,020 UART: [idev] CDI.KEYID = 6
3,843,934 UART: [idev] SUBJECT.KEYID = 7
3,845,107 UART: [idev] UDS.KEYID = 0
3,846,028 ready_for_fw is high
3,846,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,357 UART: [idev] Erasing UDS.KEYID = 0
6,311,649 UART: [idev] Sha1 KeyId Algorithm
6,335,039 UART: [idev] --
6,339,711 UART: [ldev] ++
6,340,278 UART: [ldev] CDI.KEYID = 6
6,341,183 UART: [ldev] SUBJECT.KEYID = 5
6,342,392 UART: [ldev] AUTHORITY.KEYID = 7
6,343,620 UART: [ldev] FE.KEYID = 1
6,353,827 UART: [ldev] Erasing FE.KEYID = 1
8,831,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,120 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,111 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,583,929 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,599,863 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,752 UART: [ldev] --
10,624,305 UART: [fwproc] Wait for Commands...
10,626,662 UART: [fwproc] Recv command 0x46574c44
10,628,747 UART: [fwproc] Recv'd Img size: 114084 bytes
14,059,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,134,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,203,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,520,427 >>> mbox cmd response: success
14,524,436 UART: [afmc] ++
14,525,023 UART: [afmc] CDI.KEYID = 6
14,525,905 UART: [afmc] SUBJECT.KEYID = 7
14,527,118 UART: [afmc] AUTHORITY.KEYID = 5
17,027,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,749,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,751,532 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,767,551 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,783,374 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,799,132 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,821,174 UART: [afmc] --
18,825,515 UART: [cold-reset] --
18,830,399 UART: [state] Locking Datavault
18,837,209 UART: [state] Locking PCR0, PCR1 and PCR31
18,838,903 UART: [state] Locking ICCM
18,841,211 UART: [exit] Launching FMC @ 0x40000130
18,849,607 UART:
18,849,841 UART: Running Caliptra FMC ...
18,850,941 UART:
18,851,096 UART: [state] CFI Enabled
18,859,413 UART: [fht] FMC Alias Private Key: 7
20,615,795 UART: [art] Extend RT PCRs Done
20,617,015 UART: [art] Lock RT PCRs Done
20,618,462 UART: [art] Populate DV Done
20,623,823 UART: [fht] FMC Alias Private Key: 7
20,625,522 UART: [art] Derive CDI
20,626,254 UART: [art] Store in in slot 0x4
20,669,489 UART: [art] Derive Key Pair
20,670,525 UART: [art] Store priv key in slot 0x5
23,097,182 UART: [art] Derive Key Pair - Done
23,109,741 UART: [art] Signing Cert with AUTHO
23,111,034 UART: RITY.KEYID = 7
24,816,061 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,558 UART: [art] PUB.X = DC13B1EE342AC6C5619CAF2D32FD10B87ED394ECC3267851E43E06098541B2B058BF12FF65B71C368FCFACDF200BFB3C
24,824,866 UART: [art] PUB.Y = C572C954F4108691B07C46F78F526398C84D14A89906AD49645A5ECCBBB8B89726D539DAACAE18B65832043ECAEF68AE
24,832,104 UART: [art] SIG.R = 307466A13F4BC15C66F34B865178B46C04F1C37D00A81B7B612429523CB8A9A997DC5E933F086F6E716450D6662B98EE
24,839,497 UART: [art] SIG.S = F00A67A4EB3532749AFE0C49A73E4EA470426D45677C0BB1FA94B07BF2DD100396F0FC2072060761FB2590ED6F1847FB
25,818,540 UART: Caliptra RT
25,819,255 UART: [state] CFI Enabled
25,936,883 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,036 UART:
1,292 UART: Running Caliptra ROM ...
2,311 UART:
14,588,324 UART: [state] CFI Enabled
14,600,833 UART: [state] LifecycleState = Production
14,602,577 UART: [state] DebugLocked = Yes
14,605,481 UART: [state] Starting the WD Timer 40000000 cycles
14,610,637 UART: [kat] SHA2-256
14,789,777 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,801,331 UART: [kat] ++
14,801,784 UART: [kat] sha1
14,813,585 UART: [kat] SHA2-256
14,816,563 UART: [kat] SHA2-384
14,822,816 UART: [kat] SHA2-512-ACC
14,825,759 UART: [kat] ECC-384
17,267,172 UART: [kat] HMAC-384Kdf
17,279,452 UART: [kat] LMS
17,809,011 UART: [kat] --
17,813,266 UART: [warm-reset] ++
17,817,675 UART: [warm-reset] --
17,821,806 UART: [state] Locking Datavault
17,824,228 UART: [state] Locking PCR0, PCR1 and PCR31
17,825,872 UART: [state] Locking ICCM
17,827,912 UART: [exit] Launching FMC @ 0x40000130
17,836,356 UART:
17,836,592 UART: Running Caliptra FMC ...
17,837,692 UART:
17,837,842 UART: [state] CFI Enabled
17,840,016 UART: [aliasrt :skip pcr extension
17,841,262 UART: [art] Extend RT PCRs Done
17,842,394 UART: [art] Lock RT PCRs Done
17,843,728 UART: [art] Populate DV Done
17,848,911 UART: [fht] FMC Alias Private Key: 7
17,850,440 UART: [art] Derive CDI
17,851,252 UART: [art] Store in in slot 0x4
17,894,275 UART: [art] Derive Key Pair
17,895,270 UART: [art] Store priv key in slot 0x5
20,322,033 UART: [art] Derive Key Pair - Done
20,335,307 UART: [art] Signing Cert with AUTHO
20,336,609 UART: RITY.KEYID = 7
22,041,934 UART: [art] Erasing AUTHORITY.KEYID = 7
22,043,425 UART: [art] PUB.X = DC13B1EE342AC6C5619CAF2D32FD10B87ED394ECC3267851E43E06098541B2B058BF12FF65B71C368FCFACDF200BFB3C
22,050,701 UART: [art] PUB.Y = C572C954F4108691B07C46F78F526398C84D14A89906AD49645A5ECCBBB8B89726D539DAACAE18B65832043ECAEF68AE
22,057,950 UART: [art] SIG.R = 307466A13F4BC15C66F34B865178B46C04F1C37D00A81B7B612429523CB8A9A997DC5E933F086F6E716450D6662B98EE
22,065,402 UART: [art] SIG.S = F00A67A4EB3532749AFE0C49A73E4EA470426D45677C0BB1FA94B07BF2DD100396F0FC2072060761FB2590ED6F1847FB
23,044,450 UART: Caliptra RT
23,045,163 UART: [state] CFI Enabled
23,337,841 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
3,696,292 ready_for_fw is high
3,696,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,284,035 >>> mbox cmd response: success
18,528,810 UART:
18,529,194 UART: Running Caliptra FMC ...
18,530,299 UART:
18,530,451 UART: [state] CFI Enabled
18,538,612 UART: [fht] FMC Alias Private Key: 7
20,295,230 UART: [art] Extend RT PCRs Done
20,296,455 UART: [art] Lock RT PCRs Done
20,298,427 UART: [art] Populate DV Done
20,303,729 UART: [fht] FMC Alias Private Key: 7
20,305,257 UART: [art] Derive CDI
20,305,992 UART: [art] Store in in slot 0x4
20,348,600 UART: [art] Derive Key Pair
20,349,603 UART: [art] Store priv key in slot 0x5
22,776,526 UART: [art] Derive Key Pair - Done
22,789,480 UART: [art] Signing Cert with AUTHO
22,790,822 UART: RITY.KEYID = 7
24,496,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,764 UART: [art] PUB.X = 51C28BD01FB5320A2E098951315CFF19B67B257E2CAC077B8D01A46A4849E93AFC91CE24076957EC3D385916548AD273
24,505,033 UART: [art] PUB.Y = CEC82F5F779F671A0F5531A4B0B42B29804F88448D92805EECE337D5E76FB12F8C5953B825D24FB535C308AB973835F2
24,512,283 UART: [art] SIG.R = 46872235B768F21D466318D0D20CBE0F0C31301F244970350FEC836E2EF27CE83E3C20E8806A205F9818797EDBFACB73
24,519,633 UART: [art] SIG.S = FC8CA6A6D360D83880CD53FFEBA6DC125B07253D7AECBFEC43AE1D7E93D7160D82DDFE03FAA55A8193045755CF172F47
25,498,636 UART: Caliptra RT
25,499,340 UART: [state] CFI Enabled
25,616,609 UART: [rt] RT listening for mailbox commands...
Initializing fuses
18,014,116 UART:
18,014,501 UART: Running Caliptra FMC ...
18,015,566 UART:
18,015,723 UART: [state] CFI Enabled
18,017,575 UART: [aliasrt :skip pcr extension
18,018,825 UART: [art] Extend RT PCRs Done
18,019,962 UART: [art] Lock RT PCRs Done
18,021,118 UART: [art] Populate DV Done
18,026,639 UART: [fht] FMC Alias Private Key: 7
18,028,123 UART: [art] Derive CDI
18,028,888 UART: [art] Store in in slot 0x4
18,071,607 UART: [art] Derive Key Pair
18,072,654 UART: [art] Store priv key in slot 0x5
20,499,090 UART: [art] Derive Key Pair - Done
20,511,762 UART: [art] Signing Cert with AUTHO
20,513,069 UART: RITY.KEYID = 7
22,218,649 UART: [art] Erasing AUTHORITY.KEYID = 7
22,220,156 UART: [art] PUB.X = 51C28BD01FB5320A2E098951315CFF19B67B257E2CAC077B8D01A46A4849E93AFC91CE24076957EC3D385916548AD273
22,227,490 UART: [art] PUB.Y = CEC82F5F779F671A0F5531A4B0B42B29804F88448D92805EECE337D5E76FB12F8C5953B825D24FB535C308AB973835F2
22,234,695 UART: [art] SIG.R = 46872235B768F21D466318D0D20CBE0F0C31301F244970350FEC836E2EF27CE83E3C20E8806A205F9818797EDBFACB73
22,242,053 UART: [art] SIG.S = FC8CA6A6D360D83880CD53FFEBA6DC125B07253D7AECBFEC43AE1D7E93D7160D82DDFE03FAA55A8193045755CF172F47
23,221,083 UART: Caliptra RT
23,221,779 UART: [state] CFI Enabled
23,514,099 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
191,888 UART:
192,271 UART: Running Caliptra ROM ...
193,471 UART:
193,622 UART: [state] CFI Enabled
265,029 UART: [state] LifecycleState = Production
267,215 UART: [state] DebugLocked = Yes
269,508 UART: [state] Starting the WD Timer 40000000 cycles
273,971 UART: [kat] SHA2-256
463,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,640 UART: [kat] ++
475,156 UART: [kat] sha1
487,750 UART: [kat] SHA2-256
490,754 UART: [kat] SHA2-384
496,951 UART: [kat] SHA2-512-ACC
499,552 UART: [kat] ECC-384
2,946,966 UART: [kat] HMAC-384Kdf
2,971,607 UART: [kat] LMS
3,503,402 UART: [kat] --
3,506,487 UART: [cold-reset] ++
3,508,061 UART: [fht] FHT @ 0x50003400
3,519,185 UART: [idev] ++
3,519,895 UART: [idev] CDI.KEYID = 6
3,520,889 UART: [idev] SUBJECT.KEYID = 7
3,522,057 UART: [idev] UDS.KEYID = 0
3,522,985 ready_for_fw is high
3,523,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,788 UART: [idev] Erasing UDS.KEYID = 0
6,031,561 UART: [idev] Sha1 KeyId Algorithm
6,053,875 UART: [idev] --
6,058,841 UART: [ldev] ++
6,059,536 UART: [ldev] CDI.KEYID = 6
6,060,415 UART: [ldev] SUBJECT.KEYID = 5
6,061,624 UART: [ldev] AUTHORITY.KEYID = 7
6,062,856 UART: [ldev] FE.KEYID = 1
6,103,283 UART: [ldev] Erasing FE.KEYID = 1
8,609,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,685 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,360,875 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,995 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,965 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,413,244 UART: [ldev] --
10,418,343 UART: [fwproc] Wait for Commands...
10,420,329 UART: [fwproc] Recv command 0x46574c44
10,422,254 UART: [fwproc] Recv'd Img size: 114084 bytes
13,900,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,973,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,089,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,629,809 >>> mbox cmd response: success
14,633,563 UART: [afmc] ++
14,634,260 UART: [afmc] CDI.KEYID = 6
14,635,418 UART: [afmc] SUBJECT.KEYID = 7
14,636,902 UART: [afmc] AUTHORITY.KEYID = 5
17,170,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,864 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,913,103 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,928,251 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,943,255 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,966,283 UART: [afmc] --
18,969,215 UART: [cold-reset] --
18,974,478 UART: [state] Locking Datavault
18,980,494 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,736 UART: [state] Locking ICCM
18,985,007 UART: [exit] Launching FMC @ 0x40000130
18,993,689 UART:
18,993,942 UART: Running Caliptra FMC ...
18,995,043 UART:
18,995,201 UART: [state] CFI Enabled
19,053,997 UART: [fht] FMC Alias Private Key: 7
20,818,292 UART: [art] Extend RT PCRs Done
20,819,518 UART: [art] Lock RT PCRs Done
20,820,956 UART: [art] Populate DV Done
20,826,204 UART: [fht] FMC Alias Private Key: 7
20,827,781 UART: [art] Derive CDI
20,828,521 UART: [art] Store in in slot 0x4
20,886,754 UART: [art] Derive Key Pair
20,887,749 UART: [art] Store priv key in slot 0x5
23,350,607 UART: [art] Derive Key Pair - Done
23,363,740 UART: [art] Signing Cert with AUTHO
23,365,049 UART: RITY.KEYID = 7
25,089,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,091,243 UART: [art] PUB.X = A298BDD257C9924A7D8FC82CAA9112529A948B0DC795BEE4ECD4AAB9563D7297915431E62017A0FFB9CBD7FAF4453134
25,098,505 UART: [art] PUB.Y = 7783F6DA865C90272F2346B13E94A21CF21F83E2E43D5FFD5CD03E97640CECD3F3F02DC415AC5373425F57836FA63754
25,105,749 UART: [art] SIG.R = A40DCBD02E6D3AE3DF756CDBD722AF6CA23FF64F456ABDE0EBCAE584BC931DEE5C9C7B6B61551B8CB8614F4E8FA57A92
25,113,206 UART: [art] SIG.S = 09DDA0F82B4CA260A2670D74D220DD6D2F4F3DB56419ED6EF1BEECD0B76D86E5EBC60DC6F2B0B687D693E3C001321510
26,092,146 UART: Caliptra RT
26,092,850 UART: [state] CFI Enabled
26,258,362 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,002 UART:
1,267 UART: Running Caliptra ROM ...
2,369 UART:
2,519 UART: [state] CFI Enabled
62,906 UART: [state] LifecycleState = Production
64,849 UART: [state] DebugLocked = Yes
67,292 UART: [state] Starting the WD Timer 40000000 cycles
73,002 UART: [kat] SHA2-256
262,830 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
273,635 UART: [kat] ++
274,138 UART: [kat] sha1
285,660 UART: [kat] SHA2-256
288,676 UART: [kat] SHA2-384
294,766 UART: [kat] SHA2-512-ACC
297,381 UART: [kat] ECC-384
2,750,697 UART: [kat] HMAC-384Kdf
2,772,226 UART: [kat] LMS
3,303,841 UART: [kat] --
3,309,215 UART: [warm-reset] ++
3,312,289 UART: [warm-reset] --
3,316,266 UART: [state] Locking Datavault
3,321,110 UART: [state] Locking PCR0, PCR1 and PCR31
3,322,756 UART: [state] Locking ICCM
3,325,404 UART: [exit] Launching FMC @ 0x40000130
3,334,084 UART:
3,334,321 UART: Running Caliptra FMC ...
3,335,421 UART:
3,335,577 UART: [state] CFI Enabled
3,381,081 UART: [aliasrt :skip pcr extension
3,382,374 UART: [art] Extend RT PCRs Done
3,383,523 UART: [art] Lock RT PCRs Done
3,384,969 UART: [art] Populate DV Done
3,390,482 UART: [fht] FMC Alias Private Key: 7
3,392,126 UART: [art] Derive CDI
3,392,859 UART: [art] Store in in slot 0x4
3,449,571 UART: [art] Derive Key Pair
3,450,612 UART: [art] Store priv key in slot 0x5
5,913,250 UART: [art] Derive Key Pair - Done
5,926,470 UART: [art] Signing Cert with AUTHO
5,927,973 UART: RITY.KEYID = 7
7,652,006 UART: [art] Erasing AUTHORITY.KEYID = 7
7,653,528 UART: [art] PUB.X = A298BDD257C9924A7D8FC82CAA9112529A948B0DC795BEE4ECD4AAB9563D7297915431E62017A0FFB9CBD7FAF4453134
7,660,779 UART: [art] PUB.Y = 7783F6DA865C90272F2346B13E94A21CF21F83E2E43D5FFD5CD03E97640CECD3F3F02DC415AC5373425F57836FA63754
7,668,024 UART: [art] SIG.R = A40DCBD02E6D3AE3DF756CDBD722AF6CA23FF64F456ABDE0EBCAE584BC931DEE5C9C7B6B61551B8CB8614F4E8FA57A92
7,675,480 UART: [art] SIG.S = 09DDA0F82B4CA260A2670D74D220DD6D2F4F3DB56419ED6EF1BEECD0B76D86E5EBC60DC6F2B0B687D693E3C001321510
8,654,349 UART: Caliptra RT
8,655,050 UART: [state] CFI Enabled
8,988,675 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,437,091 ready_for_fw is high
3,437,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,794,797 >>> mbox cmd response: success
19,089,611 UART:
19,090,025 UART: Running Caliptra FMC ...
19,091,183 UART:
19,091,348 UART: [state] CFI Enabled
19,159,182 UART: [fht] FMC Alias Private Key: 7
20,923,337 UART: [art] Extend RT PCRs Done
20,924,564 UART: [art] Lock RT PCRs Done
20,926,142 UART: [art] Populate DV Done
20,931,499 UART: [fht] FMC Alias Private Key: 7
20,933,151 UART: [art] Derive CDI
20,933,987 UART: [art] Store in in slot 0x4
20,992,160 UART: [art] Derive Key Pair
20,993,162 UART: [art] Store priv key in slot 0x5
23,456,522 UART: [art] Derive Key Pair - Done
23,469,796 UART: [art] Signing Cert with AUTHO
23,471,094 UART: RITY.KEYID = 7
25,183,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,055 UART: [art] PUB.X = 14F05CF97C2DA00270057CEDF78F742A96588C47198B4EFE8ADC8093C3E60AE8A239D2CB3594EB458A5BB5EFA07A21C2
25,192,315 UART: [art] PUB.Y = 7EF26BBBC0733AA73AB151964992B9C8776EB0DF36D121E5E0AD00E327960802A54BFAA8206C7FD61324C3F43A09B121
25,199,548 UART: [art] SIG.R = D0A90D0521C641DEE49B5551E853B436FA8AC1AD6D66B85FB677BF1A50E083DD1D0904D7B0E604DE726AE663F458B7BD
25,207,003 UART: [art] SIG.S = 3631E623F8A830838AE933ED1A01777C30636769E6E0D01A600BD533A392D2CBDE3B55E37AF1E3719501419635800B09
26,186,139 UART: Caliptra RT
26,186,832 UART: [state] CFI Enabled
26,351,524 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,244,409 UART:
3,244,744 UART: Running Caliptra FMC ...
3,245,814 UART:
3,245,973 UART: [state] CFI Enabled
3,295,900 UART: [aliasrt :skip pcr extension
3,297,190 UART: [art] Extend RT PCRs Done
3,298,339 UART: [art] Lock RT PCRs Done
3,299,595 UART: [art] Populate DV Done
3,305,059 UART: [fht] FMC Alias Private Key: 7
3,306,760 UART: [art] Derive CDI
3,307,576 UART: [art] Store in in slot 0x4
3,364,787 UART: [art] Derive Key Pair
3,365,823 UART: [art] Store priv key in slot 0x5
5,829,142 UART: [art] Derive Key Pair - Done
5,842,081 UART: [art] Signing Cert with AUTHO
5,843,383 UART: RITY.KEYID = 7
7,554,690 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,226 UART: [art] PUB.X = 14F05CF97C2DA00270057CEDF78F742A96588C47198B4EFE8ADC8093C3E60AE8A239D2CB3594EB458A5BB5EFA07A21C2
7,563,488 UART: [art] PUB.Y = 7EF26BBBC0733AA73AB151964992B9C8776EB0DF36D121E5E0AD00E327960802A54BFAA8206C7FD61324C3F43A09B121
7,570,728 UART: [art] SIG.R = D0A90D0521C641DEE49B5551E853B436FA8AC1AD6D66B85FB677BF1A50E083DD1D0904D7B0E604DE726AE663F458B7BD
7,578,124 UART: [art] SIG.S = 3631E623F8A830838AE933ED1A01777C30636769E6E0D01A600BD533A392D2CBDE3B55E37AF1E3719501419635800B09
8,556,929 UART: Caliptra RT
8,557,656 UART: [state] CFI Enabled
8,889,998 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,782 writing to cptra_bootfsm_go
192,434 UART:
192,802 UART: Running Caliptra ROM ...
193,990 UART:
603,468 UART: [state] CFI Enabled
617,987 UART: [state] LifecycleState = Production
620,178 UART: [state] DebugLocked = Yes
622,346 UART: [state] Starting the WD Timer 40000000 cycles
627,093 UART: [kat] SHA2-256
816,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,795 UART: [kat] ++
828,241 UART: [kat] sha1
840,333 UART: [kat] SHA2-256
843,339 UART: [kat] SHA2-384
850,033 UART: [kat] SHA2-512-ACC
852,613 UART: [kat] ECC-384
3,290,937 UART: [kat] HMAC-384Kdf
3,303,808 UART: [kat] LMS
3,835,686 UART: [kat] --
3,841,499 UART: [cold-reset] ++
3,842,652 UART: [fht] FHT @ 0x50003400
3,853,695 UART: [idev] ++
3,854,400 UART: [idev] CDI.KEYID = 6
3,855,311 UART: [idev] SUBJECT.KEYID = 7
3,856,551 UART: [idev] UDS.KEYID = 0
3,857,497 ready_for_fw is high
3,857,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,068 UART: [idev] Erasing UDS.KEYID = 0
6,335,547 UART: [idev] Sha1 KeyId Algorithm
6,358,062 UART: [idev] --
6,363,783 UART: [ldev] ++
6,364,458 UART: [ldev] CDI.KEYID = 6
6,365,363 UART: [ldev] SUBJECT.KEYID = 5
6,366,570 UART: [ldev] AUTHORITY.KEYID = 7
6,367,796 UART: [ldev] FE.KEYID = 1
6,379,464 UART: [ldev] Erasing FE.KEYID = 1
8,853,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,791 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,587,966 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,603,073 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,618,058 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,638,192 UART: [ldev] --
10,643,363 UART: [fwproc] Wait for Commands...
10,645,992 UART: [fwproc] Recv command 0x46574c44
10,647,971 UART: [fwproc] Recv'd Img size: 114084 bytes
14,125,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,207,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,324,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,865,145 >>> mbox cmd response: success
14,869,667 UART: [afmc] ++
14,870,361 UART: [afmc] CDI.KEYID = 6
14,871,538 UART: [afmc] SUBJECT.KEYID = 7
14,873,017 UART: [afmc] AUTHORITY.KEYID = 5
17,379,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,096,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,098,861 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
19,114,093 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
19,129,265 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
19,144,224 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
19,168,481 UART: [afmc] --
19,171,590 UART: [cold-reset] --
19,175,999 UART: [state] Locking Datavault
19,183,060 UART: [state] Locking PCR0, PCR1 and PCR31
19,185,287 UART: [state] Locking ICCM
19,186,794 UART: [exit] Launching FMC @ 0x40000130
19,195,465 UART:
19,195,702 UART: Running Caliptra FMC ...
19,196,803 UART:
19,196,957 UART: [state] CFI Enabled
19,205,000 UART: [fht] FMC Alias Private Key: 7
20,961,707 UART: [art] Extend RT PCRs Done
20,962,934 UART: [art] Lock RT PCRs Done
20,964,313 UART: [art] Populate DV Done
20,969,744 UART: [fht] FMC Alias Private Key: 7
20,971,443 UART: [art] Derive CDI
20,972,253 UART: [art] Store in in slot 0x4
21,014,516 UART: [art] Derive Key Pair
21,015,516 UART: [art] Store priv key in slot 0x5
23,442,277 UART: [art] Derive Key Pair - Done
23,455,659 UART: [art] Signing Cert with AUTHO
23,456,963 UART: RITY.KEYID = 7
25,162,930 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,438 UART: [art] PUB.X = A2F6E3D5172958966742CA56BD512B40C39AF82B3109356CC69A194AF2212ADD72E2C7DEFE4AD09303A2D223E319F002
25,171,655 UART: [art] PUB.Y = 408248CAFBB6EACF423D1543B45F4D71AA853B225CFBA454152B7E3912214FE1F96ABE9BE96865EF6B5843207818FEEB
25,178,940 UART: [art] SIG.R = B7E2F7FC9CD49A93064E8D12644271722B2487250217024991FC138E4C755C24825C5191E1893DE73D505DFD5AEF8698
25,186,378 UART: [art] SIG.S = D79D64508F597D27811AD7130C6CE456F65142D6B93BD461CC11B681EB25B8810461F8DF4E171F4EDB50BD7CE17A2EBD
26,165,070 UART: Caliptra RT
26,165,781 UART: [state] CFI Enabled
26,282,893 UART: [rt] RT listening for mailbox commands...
Initializing fuses
998 UART:
1,147 UART: Running Caliptra ROM ...
2,194 UART:
14,247,505 UART: [state] CFI Enabled
14,259,896 UART: [state] LifecycleState = Production
14,261,676 UART: [state] DebugLocked = Yes
14,263,533 UART: [state] Starting the WD Timer 40000000 cycles
14,268,804 UART: [kat] SHA2-256
14,458,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,469,543 UART: [kat] ++
14,470,136 UART: [kat] sha1
14,481,460 UART: [kat] SHA2-256
14,484,471 UART: [kat] SHA2-384
14,489,697 UART: [kat] SHA2-512-ACC
14,492,268 UART: [kat] ECC-384
16,935,569 UART: [kat] HMAC-384Kdf
16,949,787 UART: [kat] LMS
17,481,391 UART: [kat] --
17,486,724 UART: [warm-reset] ++
17,491,518 UART: [warm-reset] --
17,496,012 UART: [state] Locking Datavault
17,500,362 UART: [state] Locking PCR0, PCR1 and PCR31
17,502,012 UART: [state] Locking ICCM
17,503,467 UART: [exit] Launching FMC @ 0x40000130
17,512,134 UART:
17,512,366 UART: Running Caliptra FMC ...
17,513,468 UART:
17,513,629 UART: [state] CFI Enabled
17,515,738 UART: [aliasrt :skip pcr extension
17,516,981 UART: [art] Extend RT PCRs Done
17,518,115 UART: [art] Lock RT PCRs Done
17,519,467 UART: [art] Populate DV Done
17,524,979 UART: [fht] FMC Alias Private Key: 7
17,526,618 UART: [art] Derive CDI
17,527,423 UART: [art] Store in in slot 0x4
17,569,975 UART: [art] Derive Key Pair
17,571,022 UART: [art] Store priv key in slot 0x5
19,997,865 UART: [art] Derive Key Pair - Done
20,010,807 UART: [art] Signing Cert with AUTHO
20,012,103 UART: RITY.KEYID = 7
21,717,096 UART: [art] Erasing AUTHORITY.KEYID = 7
21,718,598 UART: [art] PUB.X = A2F6E3D5172958966742CA56BD512B40C39AF82B3109356CC69A194AF2212ADD72E2C7DEFE4AD09303A2D223E319F002
21,725,846 UART: [art] PUB.Y = 408248CAFBB6EACF423D1543B45F4D71AA853B225CFBA454152B7E3912214FE1F96ABE9BE96865EF6B5843207818FEEB
21,733,140 UART: [art] SIG.R = B7E2F7FC9CD49A93064E8D12644271722B2487250217024991FC138E4C755C24825C5191E1893DE73D505DFD5AEF8698
21,740,486 UART: [art] SIG.S = D79D64508F597D27811AD7130C6CE456F65142D6B93BD461CC11B681EB25B8810461F8DF4E171F4EDB50BD7CE17A2EBD
22,719,501 UART: Caliptra RT
22,720,201 UART: [state] CFI Enabled
23,009,353 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,608 writing to cptra_bootfsm_go
3,758,361 ready_for_fw is high
3,758,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,989,617 >>> mbox cmd response: success
19,242,844 UART:
19,243,231 UART: Running Caliptra FMC ...
19,244,369 UART:
19,244,522 UART: [state] CFI Enabled
19,252,416 UART: [fht] FMC Alias Private Key: 7
21,008,907 UART: [art] Extend RT PCRs Done
21,010,147 UART: [art] Lock RT PCRs Done
21,011,737 UART: [art] Populate DV Done
21,017,313 UART: [fht] FMC Alias Private Key: 7
21,018,801 UART: [art] Derive CDI
21,019,537 UART: [art] Store in in slot 0x4
21,061,923 UART: [art] Derive Key Pair
21,062,971 UART: [art] Store priv key in slot 0x5
23,489,822 UART: [art] Derive Key Pair - Done
23,503,100 UART: [art] Signing Cert with AUTHO
23,504,399 UART: RITY.KEYID = 7
25,210,205 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,720 UART: [art] PUB.X = ED989A2EAFBF0A7D5B10671005F71F895539BE99354AA260877518EF9B1DD4E5765BD3556F72BE97087955B5B3A9959C
25,218,940 UART: [art] PUB.Y = A5024E3ED1FEFA44AFBF78509D20E1A330DFF87CBCE1D530C523BB35B0533443B8CD416F68F7A5850A6E8FF1238E5CFD
25,226,228 UART: [art] SIG.R = D9674C91B5ED9F6B4BF0B04002B51D00E0FB0AC3540429C61D24C91060E2684848B594D1CF1D88474C2B320740AB0FA8
25,233,565 UART: [art] SIG.S = 17DF946D3A826B5934A2ABD52F5D20736E5FD12262BAC323ABCEEABEE9DE0477641E98A6F0838AAD22775F4FCD11CC74
26,212,823 UART: Caliptra RT
26,213,517 UART: [state] CFI Enabled
26,330,611 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,354,488 UART:
17,354,826 UART: Running Caliptra FMC ...
17,355,860 UART:
17,356,008 UART: [state] CFI Enabled
17,358,128 UART: [aliasrt :skip pcr extension
17,359,380 UART: [art] Extend RT PCRs Done
17,360,435 UART: [art] Lock RT PCRs Done
17,361,860 UART: [art] Populate DV Done
17,367,780 UART: [fht] FMC Alias Private Key: 7
17,369,227 UART: [art] Derive CDI
17,369,960 UART: [art] Store in in slot 0x4
17,412,814 UART: [art] Derive Key Pair
17,414,019 UART: [art] Store priv key in slot 0x5
19,840,991 UART: [art] Derive Key Pair - Done
19,853,561 UART: [art] Signing Cert with AUTHO
19,854,860 UART: RITY.KEYID = 7
21,560,334 UART: [art] Erasing AUTHORITY.KEYID = 7
21,561,842 UART: [art] PUB.X = ED989A2EAFBF0A7D5B10671005F71F895539BE99354AA260877518EF9B1DD4E5765BD3556F72BE97087955B5B3A9959C
21,569,086 UART: [art] PUB.Y = A5024E3ED1FEFA44AFBF78509D20E1A330DFF87CBCE1D530C523BB35B0533443B8CD416F68F7A5850A6E8FF1238E5CFD
21,576,354 UART: [art] SIG.R = D9674C91B5ED9F6B4BF0B04002B51D00E0FB0AC3540429C61D24C91060E2684848B594D1CF1D88474C2B320740AB0FA8
21,583,753 UART: [art] SIG.S = 17DF946D3A826B5934A2ABD52F5D20736E5FD12262BAC323ABCEEABEE9DE0477641E98A6F0838AAD22775F4FCD11CC74
22,562,834 UART: Caliptra RT
22,563,527 UART: [state] CFI Enabled
22,850,695 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Production
86,161 UART: [state] DebugLocked = Yes
86,813 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,519 UART: [kat] SHA2-256
882,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,565 UART: [kat] ++
886,717 UART: [kat] sha1
891,053 UART: [kat] SHA2-256
892,991 UART: [kat] SHA2-384
895,554 UART: [kat] SHA2-512-ACC
897,455 UART: [kat] ECC-384
903,232 UART: [kat] HMAC-384Kdf
907,740 UART: [kat] LMS
1,475,936 UART: [kat] --
1,476,851 UART: [cold-reset] ++
1,477,236 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 ready_for_fw is high
1,481,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,268 UART: [idev] Erasing UDS.KEYID = 0
1,505,705 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,407 UART: [ldev] ++
1,515,575 UART: [ldev] CDI.KEYID = 6
1,515,938 UART: [ldev] SUBJECT.KEYID = 5
1,516,364 UART: [ldev] AUTHORITY.KEYID = 7
1,516,827 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,967 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,661 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,533 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,239 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,239 UART: [ldev] --
1,586,716 UART: [fwproc] Waiting for Commands...
1,587,575 UART: [fwproc] Received command 0x46574c44
1,588,366 UART: [fwproc] Received Image of size 114084 bytes
2,908,280 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,935,621 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,964,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,100,371 >>> mbox cmd response: success
3,101,602 UART: [afmc] ++
3,101,770 UART: [afmc] CDI.KEYID = 6
3,102,132 UART: [afmc] SUBJECT.KEYID = 7
3,102,557 UART: [afmc] AUTHORITY.KEYID = 5
3,138,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,154,726 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,155,506 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,161,224 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,167,119 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,172,830 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,180,618 UART: [afmc] --
3,181,601 UART: [cold-reset] --
3,182,439 UART: [state] Locking Datavault
3,183,514 UART: [state] Locking PCR0, PCR1 and PCR31
3,184,118 UART: [state] Locking ICCM
3,184,658 UART: [exit] Launching FMC @ 0x40000130
3,189,987 UART:
3,190,003 UART: Running Caliptra FMC ...
3,190,411 UART:
3,190,465 UART: [state] CFI Enabled
3,200,266 UART: [fht] FMC Alias Private Key: 7
3,308,677 UART: [art] Extend RT PCRs Done
3,309,105 UART: [art] Lock RT PCRs Done
3,310,417 UART: [art] Populate DV Done
3,318,613 UART: [fht] FMC Alias Private Key: 7
3,319,645 UART: [art] Derive CDI
3,319,925 UART: [art] Store in in slot 0x4
3,405,450 UART: [art] Derive Key Pair
3,405,810 UART: [art] Store priv key in slot 0x5
3,418,614 UART: [art] Derive Key Pair - Done
3,433,510 UART: [art] Signing Cert with AUTHO
3,433,990 UART: RITY.KEYID = 7
3,448,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,449,301 UART: [art] PUB.X = 052618C2892795DB8B8AF114600042FD43307C6566ECB8E9DD74989112E09D6653D48871135E341F798E3335ED5F2253
3,456,032 UART: [art] PUB.Y = A56A1393927D42F11753CC3BD36F3648E2E0AC05A6B7BBA19E92A68BDE222476FE8A3D42574EBCD490E026172261AB1D
3,462,987 UART: [art] SIG.R = C55B0214BDF614CEBB40C5F45458A2F850BF35A151FE26DF87D2AE00921E259416A082E52A4E39266C6528ED524C0C7B
3,469,735 UART: [art] SIG.S = 4596BD7F45EDDDE296CC446455F465E2FAFEA432A3C0BCE3F7195055966F0B3A351B0893BAEC0DF2A91FC9F1C3A8CFA4
3,493,961 UART: Caliptra RT
3,494,214 UART: [state] CFI Enabled
3,602,615 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,603,374 UART:
3,603,390 UART: Running Caliptra ROM ...
3,603,798 UART:
3,603,852 UART: [state] CFI Enabled
3,607,015 UART: [state] LifecycleState = Production
3,607,623 UART: [state] DebugLocked = Yes
3,608,335 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,610,101 UART: [kat] SHA2-256
4,404,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,408,147 UART: [kat] ++
4,408,299 UART: [kat] sha1
4,412,569 UART: [kat] SHA2-256
4,414,507 UART: [kat] SHA2-384
4,417,180 UART: [kat] SHA2-512-ACC
4,419,081 UART: [kat] ECC-384
4,424,372 UART: [kat] HMAC-384Kdf
4,429,076 UART: [kat] LMS
4,997,272 UART: [kat] --
4,998,122 UART: [warm-reset] ++
4,999,207 UART: [warm-reset] --
5,000,178 UART: [state] Locking Datavault
5,000,862 UART: [state] Locking PCR0, PCR1 and PCR31
5,001,466 UART: [state] Locking ICCM
5,001,960 UART: [exit] Launching FMC @ 0x40000130
5,007,289 UART:
5,007,305 UART: Running Caliptra FMC ...
5,007,713 UART:
5,007,767 UART: [state] CFI Enabled
5,008,904 UART: [aliasrt :skip pcr extension
5,009,377 UART: [art] Extend RT PCRs Done
5,009,805 UART: [art] Lock RT PCRs Done
5,010,940 UART: [art] Populate DV Done
5,019,072 UART: [fht] FMC Alias Private Key: 7
5,020,238 UART: [art] Derive CDI
5,020,518 UART: [art] Store in in slot 0x4
5,106,093 UART: [art] Derive Key Pair
5,106,453 UART: [art] Store priv key in slot 0x5
5,119,365 UART: [art] Derive Key Pair - Done
5,134,019 UART: [art] Signing Cert with AUTHO
5,134,499 UART: RITY.KEYID = 7
5,149,749 UART: [art] Erasing AUTHORITY.KEYID = 7
5,150,514 UART: [art] PUB.X = 052618C2892795DB8B8AF114600042FD43307C6566ECB8E9DD74989112E09D6653D48871135E341F798E3335ED5F2253
5,157,245 UART: [art] PUB.Y = A56A1393927D42F11753CC3BD36F3648E2E0AC05A6B7BBA19E92A68BDE222476FE8A3D42574EBCD490E026172261AB1D
5,164,200 UART: [art] SIG.R = C55B0214BDF614CEBB40C5F45458A2F850BF35A151FE26DF87D2AE00921E259416A082E52A4E39266C6528ED524C0C7B
5,170,948 UART: [art] SIG.S = 4596BD7F45EDDDE296CC446455F465E2FAFEA432A3C0BCE3F7195055966F0B3A351B0893BAEC0DF2A91FC9F1C3A8CFA4
5,194,866 UART: Caliptra RT
5,195,119 UART: [state] CFI Enabled
5,478,472 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 ready_for_fw is high
1,362,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,948,339 >>> mbox cmd response: success
3,009,384 UART:
3,009,400 UART: Running Caliptra FMC ...
3,009,808 UART:
3,009,862 UART: [state] CFI Enabled
3,020,347 UART: [fht] FMC Alias Private Key: 7
3,128,104 UART: [art] Extend RT PCRs Done
3,128,532 UART: [art] Lock RT PCRs Done
3,130,150 UART: [art] Populate DV Done
3,138,360 UART: [fht] FMC Alias Private Key: 7
3,139,388 UART: [art] Derive CDI
3,139,668 UART: [art] Store in in slot 0x4
3,225,037 UART: [art] Derive Key Pair
3,225,397 UART: [art] Store priv key in slot 0x5
3,238,515 UART: [art] Derive Key Pair - Done
3,253,352 UART: [art] Signing Cert with AUTHO
3,253,832 UART: RITY.KEYID = 7
3,269,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,270,101 UART: [art] PUB.X = 0FBD4C9D29A3ED67E8D35FBE510DA6A41BC7474D9353F3BBC94F077E92E124657CF01828C961D47A63E75D67405E0C37
3,276,867 UART: [art] PUB.Y = 9CEA48F2D8251F6ACAA1E1CC1567C49B5EEECC1B9419623F24A37E7A926EB23F474A94FAC2B5247B19AC7D15ADA4B768
3,283,837 UART: [art] SIG.R = 0B8130C9C3FBD4FD3D68040F46FFB968ECF38392C351B6B1FA8C168499424C144A5F89E5A0743C70587A74A71FF4311E
3,290,602 UART: [art] SIG.S = 3D9F42C2E0964BB1376D1EB3AFFDC9979E02D8B85B974052D5A8EE855A833CF6AA8A159AFA7A1B16CCF43597BB0BC059
3,314,985 UART: Caliptra RT
3,315,238 UART: [state] CFI Enabled
3,423,318 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,707,868 UART:
4,707,884 UART: Running Caliptra FMC ...
4,708,292 UART:
4,708,346 UART: [state] CFI Enabled
4,709,645 UART: [aliasrt :skip pcr extension
4,710,118 UART: [art] Extend RT PCRs Done
4,710,546 UART: [art] Lock RT PCRs Done
4,711,745 UART: [art] Populate DV Done
4,720,083 UART: [fht] FMC Alias Private Key: 7
4,721,069 UART: [art] Derive CDI
4,721,349 UART: [art] Store in in slot 0x4
4,806,926 UART: [art] Derive Key Pair
4,807,286 UART: [art] Store priv key in slot 0x5
4,820,246 UART: [art] Derive Key Pair - Done
4,834,785 UART: [art] Signing Cert with AUTHO
4,835,265 UART: RITY.KEYID = 7
4,850,163 UART: [art] Erasing AUTHORITY.KEYID = 7
4,850,928 UART: [art] PUB.X = 0FBD4C9D29A3ED67E8D35FBE510DA6A41BC7474D9353F3BBC94F077E92E124657CF01828C961D47A63E75D67405E0C37
4,857,694 UART: [art] PUB.Y = 9CEA48F2D8251F6ACAA1E1CC1567C49B5EEECC1B9419623F24A37E7A926EB23F474A94FAC2B5247B19AC7D15ADA4B768
4,864,664 UART: [art] SIG.R = 0B8130C9C3FBD4FD3D68040F46FFB968ECF38392C351B6B1FA8C168499424C144A5F89E5A0743C70587A74A71FF4311E
4,871,429 UART: [art] SIG.S = 3D9F42C2E0964BB1376D1EB3AFFDC9979E02D8B85B974052D5A8EE855A833CF6AA8A159AFA7A1B16CCF43597BB0BC059
4,895,180 UART: Caliptra RT
4,895,433 UART: [state] CFI Enabled
5,178,869 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Production
85,656 UART: [state] DebugLocked = Yes
86,244 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,308 UART: [kat] SHA2-256
892,246 UART: [kat] SHA2-384
894,859 UART: [kat] SHA2-512-ACC
896,760 UART: [kat] ECC-384
902,327 UART: [kat] HMAC-384Kdf
906,961 UART: [kat] LMS
1,475,157 UART: [kat] --
1,475,918 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,212 UART: [idev] ++
1,479,380 UART: [idev] CDI.KEYID = 6
1,479,740 UART: [idev] SUBJECT.KEYID = 7
1,480,164 UART: [idev] UDS.KEYID = 0
1,480,509 ready_for_fw is high
1,480,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,225 UART: [idev] Erasing UDS.KEYID = 0
1,504,892 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,673 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,770 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,204 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,898 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,770 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,476 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,542 UART: [ldev] --
1,587,045 UART: [fwproc] Waiting for Commands...
1,587,882 UART: [fwproc] Received command 0x46574c44
1,588,673 UART: [fwproc] Received Image of size 114084 bytes
2,908,269 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,935,520 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,964,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,100,350 >>> mbox cmd response: success
3,101,409 UART: [afmc] ++
3,101,577 UART: [afmc] CDI.KEYID = 6
3,101,939 UART: [afmc] SUBJECT.KEYID = 7
3,102,364 UART: [afmc] AUTHORITY.KEYID = 5
3,137,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,153,935 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,154,715 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,160,433 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,166,328 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,172,039 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,179,925 UART: [afmc] --
3,180,976 UART: [cold-reset] --
3,181,856 UART: [state] Locking Datavault
3,182,987 UART: [state] Locking PCR0, PCR1 and PCR31
3,183,591 UART: [state] Locking ICCM
3,184,077 UART: [exit] Launching FMC @ 0x40000130
3,189,406 UART:
3,189,422 UART: Running Caliptra FMC ...
3,189,830 UART:
3,189,973 UART: [state] CFI Enabled
3,200,740 UART: [fht] FMC Alias Private Key: 7
3,308,329 UART: [art] Extend RT PCRs Done
3,308,757 UART: [art] Lock RT PCRs Done
3,310,531 UART: [art] Populate DV Done
3,318,671 UART: [fht] FMC Alias Private Key: 7
3,319,771 UART: [art] Derive CDI
3,320,051 UART: [art] Store in in slot 0x4
3,405,468 UART: [art] Derive Key Pair
3,405,828 UART: [art] Store priv key in slot 0x5
3,419,190 UART: [art] Derive Key Pair - Done
3,433,870 UART: [art] Signing Cert with AUTHO
3,434,350 UART: RITY.KEYID = 7
3,449,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,449,887 UART: [art] PUB.X = 873722471C45F38847508B6A43D748ECA5807A01B40F8C136E002167454771D69B49B42C5A9D1B01F87BF74F322846BD
3,456,616 UART: [art] PUB.Y = 7F25390EB5BA0A8A993E15F7C5787EB125D7C9F7F53BC647DCB4170746DB75FD2958A60ECA9557E426F56B2C9E2350B1
3,463,562 UART: [art] SIG.R = 24FC6FBB4A664745E14DA5085F9F182A0C564B3D0A1144AB8B3DBE8017C91AFF0AB150EAF0255F12B2FD6CF0696770CA
3,470,336 UART: [art] SIG.S = 17E85BD8DD80177D8398937638839379E8AD7F0DF3E39A81FE72D896CCD19B2EF39DBF94A9BBDDBABF4D1CDE7633A8C7
3,493,530 UART: Caliptra RT
3,493,875 UART: [state] CFI Enabled
3,602,697 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,603,456 UART:
3,603,472 UART: Running Caliptra ROM ...
3,603,880 UART:
3,604,021 UART: [state] CFI Enabled
3,606,632 UART: [state] LifecycleState = Production
3,607,240 UART: [state] DebugLocked = Yes
3,607,930 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,609,492 UART: [kat] SHA2-256
4,403,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,407,538 UART: [kat] ++
4,407,690 UART: [kat] sha1
4,411,758 UART: [kat] SHA2-256
4,413,696 UART: [kat] SHA2-384
4,416,519 UART: [kat] SHA2-512-ACC
4,418,420 UART: [kat] ECC-384
4,423,941 UART: [kat] HMAC-384Kdf
4,428,573 UART: [kat] LMS
4,996,769 UART: [kat] --
4,997,849 UART: [warm-reset] ++
4,998,666 UART: [warm-reset] --
4,999,393 UART: [state] Locking Datavault
5,000,337 UART: [state] Locking PCR0, PCR1 and PCR31
5,000,941 UART: [state] Locking ICCM
5,001,527 UART: [exit] Launching FMC @ 0x40000130
5,006,856 UART:
5,006,872 UART: Running Caliptra FMC ...
5,007,280 UART:
5,007,423 UART: [state] CFI Enabled
5,008,816 UART: [aliasrt :skip pcr extension
5,009,289 UART: [art] Extend RT PCRs Done
5,009,717 UART: [art] Lock RT PCRs Done
5,011,010 UART: [art] Populate DV Done
5,019,024 UART: [fht] FMC Alias Private Key: 7
5,020,052 UART: [art] Derive CDI
5,020,332 UART: [art] Store in in slot 0x4
5,106,125 UART: [art] Derive Key Pair
5,106,485 UART: [art] Store priv key in slot 0x5
5,119,545 UART: [art] Derive Key Pair - Done
5,134,639 UART: [art] Signing Cert with AUTHO
5,135,119 UART: RITY.KEYID = 7
5,150,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,151,044 UART: [art] PUB.X = 873722471C45F38847508B6A43D748ECA5807A01B40F8C136E002167454771D69B49B42C5A9D1B01F87BF74F322846BD
5,157,773 UART: [art] PUB.Y = 7F25390EB5BA0A8A993E15F7C5787EB125D7C9F7F53BC647DCB4170746DB75FD2958A60ECA9557E426F56B2C9E2350B1
5,164,719 UART: [art] SIG.R = 24FC6FBB4A664745E14DA5085F9F182A0C564B3D0A1144AB8B3DBE8017C91AFF0AB150EAF0255F12B2FD6CF0696770CA
5,171,493 UART: [art] SIG.S = 17E85BD8DD80177D8398937638839379E8AD7F0DF3E39A81FE72D896CCD19B2EF39DBF94A9BBDDBABF4D1CDE7633A8C7
5,195,661 UART: Caliptra RT
5,196,006 UART: [state] CFI Enabled
5,475,674 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,175 ready_for_fw is high
1,363,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,951,304 >>> mbox cmd response: success
3,013,071 UART:
3,013,087 UART: Running Caliptra FMC ...
3,013,495 UART:
3,013,638 UART: [state] CFI Enabled
3,024,327 UART: [fht] FMC Alias Private Key: 7
3,132,488 UART: [art] Extend RT PCRs Done
3,132,916 UART: [art] Lock RT PCRs Done
3,134,274 UART: [art] Populate DV Done
3,142,442 UART: [fht] FMC Alias Private Key: 7
3,143,406 UART: [art] Derive CDI
3,143,686 UART: [art] Store in in slot 0x4
3,229,473 UART: [art] Derive Key Pair
3,229,833 UART: [art] Store priv key in slot 0x5
3,243,091 UART: [art] Derive Key Pair - Done
3,257,449 UART: [art] Signing Cert with AUTHO
3,257,929 UART: RITY.KEYID = 7
3,273,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,273,832 UART: [art] PUB.X = 324F6734F4931BC965A3993BE38BEAE3A5413B3BDC69EAD099AAA645B339D1FA999A0DC498D56E545A7F7C623A493BA9
3,280,611 UART: [art] PUB.Y = FEBCE859226C914AFC8190845BF1003893C207AF0A29C7E129443C4E1D976053476223430151B652FC5ED70C21D43DD9
3,287,523 UART: [art] SIG.R = 46D3C887693025521CC7F85F60ECAFB5FD798F6CD3539850C50FE0D35EC88962B5F65B49D312CCE66D028EDC1361D100
3,294,271 UART: [art] SIG.S = 353B0685266C2F8E3B1289EA009CA7752C4C4859E8C8323852E1A4E0DB4501F8182DBD760FF819A643225E02F54A0757
3,318,059 UART: Caliptra RT
3,318,404 UART: [state] CFI Enabled
3,426,810 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,713,405 UART:
4,713,421 UART: Running Caliptra FMC ...
4,713,829 UART:
4,713,972 UART: [state] CFI Enabled
4,715,427 UART: [aliasrt :skip pcr extension
4,715,900 UART: [art] Extend RT PCRs Done
4,716,328 UART: [art] Lock RT PCRs Done
4,717,523 UART: [art] Populate DV Done
4,725,737 UART: [fht] FMC Alias Private Key: 7
4,726,779 UART: [art] Derive CDI
4,727,059 UART: [art] Store in in slot 0x4
4,812,688 UART: [art] Derive Key Pair
4,813,048 UART: [art] Store priv key in slot 0x5
4,826,064 UART: [art] Derive Key Pair - Done
4,840,868 UART: [art] Signing Cert with AUTHO
4,841,348 UART: RITY.KEYID = 7
4,856,254 UART: [art] Erasing AUTHORITY.KEYID = 7
4,857,019 UART: [art] PUB.X = 324F6734F4931BC965A3993BE38BEAE3A5413B3BDC69EAD099AAA645B339D1FA999A0DC498D56E545A7F7C623A493BA9
4,863,798 UART: [art] PUB.Y = FEBCE859226C914AFC8190845BF1003893C207AF0A29C7E129443C4E1D976053476223430151B652FC5ED70C21D43DD9
4,870,710 UART: [art] SIG.R = 46D3C887693025521CC7F85F60ECAFB5FD798F6CD3539850C50FE0D35EC88962B5F65B49D312CCE66D028EDC1361D100
4,877,458 UART: [art] SIG.S = 353B0685266C2F8E3B1289EA009CA7752C4C4859E8C8323852E1A4E0DB4501F8182DBD760FF819A643225E02F54A0757
4,901,662 UART: Caliptra RT
4,902,007 UART: [state] CFI Enabled
5,184,873 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Production
85,961 UART: [state] DebugLocked = Yes
86,551 UART: [state] Starting the WD Timer 40000000 cycles
88,244 UART: [kat] SHA2-256
893,894 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,019 UART: [kat] ++
898,171 UART: [kat] sha1
902,301 UART: [kat] SHA2-256
904,241 UART: [kat] SHA2-384
907,050 UART: [kat] SHA2-512-ACC
908,951 UART: [kat] ECC-384
918,714 UART: [kat] HMAC-384Kdf
923,436 UART: [kat] LMS
1,171,764 UART: [kat] --
1,172,907 UART: [cold-reset] ++
1,173,386 UART: [fht] FHT @ 0x50003400
1,175,953 UART: [idev] ++
1,176,121 UART: [idev] CDI.KEYID = 6
1,176,481 UART: [idev] SUBJECT.KEYID = 7
1,176,905 UART: [idev] UDS.KEYID = 0
1,177,250 ready_for_fw is high
1,177,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,892 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,275 UART: [ldev] ++
1,211,443 UART: [ldev] CDI.KEYID = 6
1,211,806 UART: [ldev] SUBJECT.KEYID = 5
1,212,232 UART: [ldev] AUTHORITY.KEYID = 7
1,212,695 UART: [ldev] FE.KEYID = 1
1,217,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,261 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,955 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,827 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,533 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,616 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,689 UART: [fwproc] Recv command 0x46574c44
1,284,417 UART: [fwproc] Recv'd Img size: 114084 bytes
2,604,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,797,348 >>> mbox cmd response: success
2,798,509 UART: [afmc] ++
2,798,677 UART: [afmc] CDI.KEYID = 6
2,799,039 UART: [afmc] SUBJECT.KEYID = 7
2,799,464 UART: [afmc] AUTHORITY.KEYID = 5
2,834,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,350 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,068 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,963 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,670 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,470 UART: [afmc] --
2,877,393 UART: [cold-reset] --
2,878,055 UART: [state] Locking Datavault
2,879,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,848 UART: [state] Locking ICCM
2,880,306 UART: [exit] Launching FMC @ 0x40000130
2,885,635 UART:
2,885,651 UART: Running Caliptra FMC ...
2,886,059 UART:
2,886,113 UART: [state] CFI Enabled
2,896,528 UART: [fht] FMC Alias Private Key: 7
3,005,291 UART: [art] Extend RT PCRs Done
3,005,719 UART: [art] Lock RT PCRs Done
3,007,251 UART: [art] Populate DV Done
3,015,471 UART: [fht] FMC Alias Private Key: 7
3,016,589 UART: [art] Derive CDI
3,016,869 UART: [art] Store in in slot 0x4
3,102,632 UART: [art] Derive Key Pair
3,102,992 UART: [art] Store priv key in slot 0x5
3,116,616 UART: [art] Derive Key Pair - Done
3,131,442 UART: [art] Signing Cert with AUTHO
3,131,922 UART: RITY.KEYID = 7
3,147,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,959 UART: [art] PUB.X = 1ADC6E462EAD808F134E0E8100E6F077815E569048BD629DE085D20687D3E6A8B440553358BA24F9E6F5D43669508273
3,154,695 UART: [art] PUB.Y = E024F5E24D182C7DB60763A1021AC818B93DA1BB95358CACBC1C8F8457BA5BC92CDF9A5A5DE1179DF75FB5A02484609D
3,161,655 UART: [art] SIG.R = 4AF98C5A1DD8597D24A5B3C255D6F48461D52AA5E0C2C05952833BE680150019A0A2E0592B4CBC90D0E4C1B354ECBA1F
3,168,413 UART: [art] SIG.S = CE7E93080F408B44C87CE111E6912731A110DD7AEAC4578C5C665B64F73C66B66F5659D42B38DE2FC3512829F58B0D73
3,191,903 UART: Caliptra RT
3,192,156 UART: [state] CFI Enabled
3,300,415 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,171 UART:
3,301,187 UART: Running Caliptra ROM ...
3,301,595 UART:
3,301,650 UART: [state] CFI Enabled
3,304,773 UART: [state] LifecycleState = Production
3,305,381 UART: [state] DebugLocked = Yes
3,305,957 UART: [state] Starting the WD Timer 40000000 cycles
3,307,508 UART: [kat] SHA2-256
4,113,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,117,283 UART: [kat] ++
4,117,435 UART: [kat] sha1
4,121,567 UART: [kat] SHA2-256
4,123,507 UART: [kat] SHA2-384
4,126,160 UART: [kat] SHA2-512-ACC
4,128,061 UART: [kat] ECC-384
4,138,002 UART: [kat] HMAC-384Kdf
4,142,788 UART: [kat] LMS
4,391,116 UART: [kat] --
4,391,866 UART: [warm-reset] ++
4,392,601 UART: [warm-reset] --
4,393,326 UART: [state] Locking Datavault
4,394,004 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,608 UART: [state] Locking ICCM
4,395,044 UART: [exit] Launching FMC @ 0x40000130
4,400,373 UART:
4,400,389 UART: Running Caliptra FMC ...
4,400,797 UART:
4,400,851 UART: [state] CFI Enabled
4,402,110 UART: [aliasrt :skip pcr extension
4,402,583 UART: [art] Extend RT PCRs Done
4,403,011 UART: [art] Lock RT PCRs Done
4,404,364 UART: [art] Populate DV Done
4,412,594 UART: [fht] FMC Alias Private Key: 7
4,413,522 UART: [art] Derive CDI
4,413,802 UART: [art] Store in in slot 0x4
4,499,723 UART: [art] Derive Key Pair
4,500,083 UART: [art] Store priv key in slot 0x5
4,513,613 UART: [art] Derive Key Pair - Done
4,528,193 UART: [art] Signing Cert with AUTHO
4,528,673 UART: RITY.KEYID = 7
4,544,113 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,878 UART: [art] PUB.X = 1ADC6E462EAD808F134E0E8100E6F077815E569048BD629DE085D20687D3E6A8B440553358BA24F9E6F5D43669508273
4,551,614 UART: [art] PUB.Y = E024F5E24D182C7DB60763A1021AC818B93DA1BB95358CACBC1C8F8457BA5BC92CDF9A5A5DE1179DF75FB5A02484609D
4,558,574 UART: [art] SIG.R = 4AF98C5A1DD8597D24A5B3C255D6F48461D52AA5E0C2C05952833BE680150019A0A2E0592B4CBC90D0E4C1B354ECBA1F
4,565,332 UART: [art] SIG.S = CE7E93080F408B44C87CE111E6912731A110DD7AEAC4578C5C665B64F73C66B66F5659D42B38DE2FC3512829F58B0D73
4,588,550 UART: Caliptra RT
4,588,803 UART: [state] CFI Enabled
4,874,012 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,012 ready_for_fw is high
1,060,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,647,797 >>> mbox cmd response: success
2,709,800 UART:
2,709,816 UART: Running Caliptra FMC ...
2,710,224 UART:
2,710,278 UART: [state] CFI Enabled
2,720,749 UART: [fht] FMC Alias Private Key: 7
2,828,956 UART: [art] Extend RT PCRs Done
2,829,384 UART: [art] Lock RT PCRs Done
2,831,132 UART: [art] Populate DV Done
2,839,486 UART: [fht] FMC Alias Private Key: 7
2,840,652 UART: [art] Derive CDI
2,840,932 UART: [art] Store in in slot 0x4
2,926,793 UART: [art] Derive Key Pair
2,927,153 UART: [art] Store priv key in slot 0x5
2,940,021 UART: [art] Derive Key Pair - Done
2,954,848 UART: [art] Signing Cert with AUTHO
2,955,328 UART: RITY.KEYID = 7
2,970,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,893 UART: [art] PUB.X = 734256870010F48C40E57816222014AE50F3F7D83345F4C114D22B140DC79933ED5FE719D301477086015BCB5D3793C2
2,977,618 UART: [art] PUB.Y = 8330EA6D03DD5E28294A6A6A6A1F27A09F45A49E17501BC83AD739E8AC4F134A5C533F7A3AF9ED0B0B065E242DF06E5F
2,984,570 UART: [art] SIG.R = E054563C40C88BE69093150C451D21E98B4E5C13E1C27E6C5DF11EF5F0F04DCD74C29A7771D6109AC87B4522F00E806C
2,991,338 UART: [art] SIG.S = 5456C74115778443148E25764FDCDAD4E721782550B25006524425FD05D6E1D7B896ADDE76AF46408D82767CEE3461BD
3,014,873 UART: Caliptra RT
3,015,126 UART: [state] CFI Enabled
3,122,809 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,106,329 UART:
4,106,345 UART: Running Caliptra FMC ...
4,106,753 UART:
4,106,807 UART: [state] CFI Enabled
4,108,178 UART: [aliasrt :skip pcr extension
4,108,651 UART: [art] Extend RT PCRs Done
4,109,079 UART: [art] Lock RT PCRs Done
4,110,318 UART: [art] Populate DV Done
4,118,756 UART: [fht] FMC Alias Private Key: 7
4,119,718 UART: [art] Derive CDI
4,119,998 UART: [art] Store in in slot 0x4
4,205,363 UART: [art] Derive Key Pair
4,205,723 UART: [art] Store priv key in slot 0x5
4,218,737 UART: [art] Derive Key Pair - Done
4,233,548 UART: [art] Signing Cert with AUTHO
4,234,028 UART: RITY.KEYID = 7
4,249,116 UART: [art] Erasing AUTHORITY.KEYID = 7
4,249,881 UART: [art] PUB.X = 734256870010F48C40E57816222014AE50F3F7D83345F4C114D22B140DC79933ED5FE719D301477086015BCB5D3793C2
4,256,606 UART: [art] PUB.Y = 8330EA6D03DD5E28294A6A6A6A1F27A09F45A49E17501BC83AD739E8AC4F134A5C533F7A3AF9ED0B0B065E242DF06E5F
4,263,558 UART: [art] SIG.R = E054563C40C88BE69093150C451D21E98B4E5C13E1C27E6C5DF11EF5F0F04DCD74C29A7771D6109AC87B4522F00E806C
4,270,326 UART: [art] SIG.S = 5456C74115778443148E25764FDCDAD4E721782550B25006524425FD05D6E1D7B896ADDE76AF46408D82767CEE3461BD
4,293,891 UART: Caliptra RT
4,294,144 UART: [state] CFI Enabled
4,573,003 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,852 UART: [state] LifecycleState = Production
86,460 UART: [state] DebugLocked = Yes
87,056 UART: [state] Starting the WD Timer 40000000 cycles
88,589 UART: [kat] SHA2-256
894,239 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,364 UART: [kat] ++
898,516 UART: [kat] sha1
902,860 UART: [kat] SHA2-256
904,800 UART: [kat] SHA2-384
907,407 UART: [kat] SHA2-512-ACC
909,308 UART: [kat] ECC-384
919,683 UART: [kat] HMAC-384Kdf
924,255 UART: [kat] LMS
1,172,583 UART: [kat] --
1,173,214 UART: [cold-reset] ++
1,173,585 UART: [fht] FHT @ 0x50003400
1,176,300 UART: [idev] ++
1,176,468 UART: [idev] CDI.KEYID = 6
1,176,828 UART: [idev] SUBJECT.KEYID = 7
1,177,252 UART: [idev] UDS.KEYID = 0
1,177,597 ready_for_fw is high
1,177,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,951 UART: [idev] Erasing UDS.KEYID = 0
1,201,875 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,218,002 UART: [ldev] Erasing FE.KEYID = 1
1,244,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,534 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,406 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,112 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,121 UART: [ldev] --
1,283,522 UART: [fwproc] Wait for Commands...
1,284,226 UART: [fwproc] Recv command 0x46574c44
1,284,954 UART: [fwproc] Recv'd Img size: 114084 bytes
2,605,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,797,867 >>> mbox cmd response: success
2,798,882 UART: [afmc] ++
2,799,050 UART: [afmc] CDI.KEYID = 6
2,799,412 UART: [afmc] SUBJECT.KEYID = 7
2,799,837 UART: [afmc] AUTHORITY.KEYID = 5
2,835,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,083 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,801 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,696 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,403 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,049 UART: [afmc] --
2,879,034 UART: [cold-reset] --
2,879,672 UART: [state] Locking Datavault
2,880,891 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,495 UART: [state] Locking ICCM
2,882,065 UART: [exit] Launching FMC @ 0x40000130
2,887,394 UART:
2,887,410 UART: Running Caliptra FMC ...
2,887,818 UART:
2,887,961 UART: [state] CFI Enabled
2,898,748 UART: [fht] FMC Alias Private Key: 7
3,007,271 UART: [art] Extend RT PCRs Done
3,007,699 UART: [art] Lock RT PCRs Done
3,009,265 UART: [art] Populate DV Done
3,017,593 UART: [fht] FMC Alias Private Key: 7
3,018,613 UART: [art] Derive CDI
3,018,893 UART: [art] Store in in slot 0x4
3,104,080 UART: [art] Derive Key Pair
3,104,440 UART: [art] Store priv key in slot 0x5
3,117,656 UART: [art] Derive Key Pair - Done
3,132,533 UART: [art] Signing Cert with AUTHO
3,133,013 UART: RITY.KEYID = 7
3,148,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,149,104 UART: [art] PUB.X = 1CA610A8A8949C679C2FC0E02A0C3B707BBF039BFA59647072D93B5437CB1FB92F9B4F108B2C780F1502DE585DF9B6DB
3,155,874 UART: [art] PUB.Y = B663D2BB066EEC2F74A003920CEBECDB75CC64483CC91D38E4F285422A95EDEDFAA1549F1CACB1601F4EDFA10D1721C6
3,162,836 UART: [art] SIG.R = 8E2A07DD07976B7DF3F32CBC7564EF32620D0B08C85179457619200D6A95EF367EF501B5F603CB40BA2578D0065CECA5
3,169,583 UART: [art] SIG.S = EE24C977E44FBFC77332C09DBB67DA098EA321E0729C2202D26B02EA638920D9F3416E245544C94185D851459D25A6B7
3,192,749 UART: Caliptra RT
3,193,094 UART: [state] CFI Enabled
3,301,411 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,167 UART:
3,302,183 UART: Running Caliptra ROM ...
3,302,591 UART:
3,302,733 UART: [state] CFI Enabled
3,305,560 UART: [state] LifecycleState = Production
3,306,168 UART: [state] DebugLocked = Yes
3,306,770 UART: [state] Starting the WD Timer 40000000 cycles
3,308,483 UART: [kat] SHA2-256
4,114,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,118,258 UART: [kat] ++
4,118,410 UART: [kat] sha1
4,122,420 UART: [kat] SHA2-256
4,124,360 UART: [kat] SHA2-384
4,126,977 UART: [kat] SHA2-512-ACC
4,128,878 UART: [kat] ECC-384
4,138,761 UART: [kat] HMAC-384Kdf
4,143,463 UART: [kat] LMS
4,391,791 UART: [kat] --
4,392,741 UART: [warm-reset] ++
4,393,512 UART: [warm-reset] --
4,394,639 UART: [state] Locking Datavault
4,395,295 UART: [state] Locking PCR0, PCR1 and PCR31
4,395,899 UART: [state] Locking ICCM
4,396,533 UART: [exit] Launching FMC @ 0x40000130
4,401,862 UART:
4,401,878 UART: Running Caliptra FMC ...
4,402,286 UART:
4,402,429 UART: [state] CFI Enabled
4,403,726 UART: [aliasrt :skip pcr extension
4,404,199 UART: [art] Extend RT PCRs Done
4,404,627 UART: [art] Lock RT PCRs Done
4,405,962 UART: [art] Populate DV Done
4,414,012 UART: [fht] FMC Alias Private Key: 7
4,415,076 UART: [art] Derive CDI
4,415,356 UART: [art] Store in in slot 0x4
4,501,023 UART: [art] Derive Key Pair
4,501,383 UART: [art] Store priv key in slot 0x5
4,514,917 UART: [art] Derive Key Pair - Done
4,529,676 UART: [art] Signing Cert with AUTHO
4,530,156 UART: RITY.KEYID = 7
4,545,262 UART: [art] Erasing AUTHORITY.KEYID = 7
4,546,027 UART: [art] PUB.X = 1CA610A8A8949C679C2FC0E02A0C3B707BBF039BFA59647072D93B5437CB1FB92F9B4F108B2C780F1502DE585DF9B6DB
4,552,797 UART: [art] PUB.Y = B663D2BB066EEC2F74A003920CEBECDB75CC64483CC91D38E4F285422A95EDEDFAA1549F1CACB1601F4EDFA10D1721C6
4,559,759 UART: [art] SIG.R = 8E2A07DD07976B7DF3F32CBC7564EF32620D0B08C85179457619200D6A95EF367EF501B5F603CB40BA2578D0065CECA5
4,566,506 UART: [art] SIG.S = EE24C977E44FBFC77332C09DBB67DA098EA321E0729C2202D26B02EA638920D9F3416E245544C94185D851459D25A6B7
4,590,402 UART: Caliptra RT
4,590,747 UART: [state] CFI Enabled
4,871,480 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,225 ready_for_fw is high
1,061,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,650,144 >>> mbox cmd response: success
2,712,127 UART:
2,712,143 UART: Running Caliptra FMC ...
2,712,551 UART:
2,712,694 UART: [state] CFI Enabled
2,723,421 UART: [fht] FMC Alias Private Key: 7
2,831,110 UART: [art] Extend RT PCRs Done
2,831,538 UART: [art] Lock RT PCRs Done
2,833,198 UART: [art] Populate DV Done
2,841,284 UART: [fht] FMC Alias Private Key: 7
2,842,464 UART: [art] Derive CDI
2,842,744 UART: [art] Store in in slot 0x4
2,928,621 UART: [art] Derive Key Pair
2,928,981 UART: [art] Store priv key in slot 0x5
2,942,521 UART: [art] Derive Key Pair - Done
2,957,809 UART: [art] Signing Cert with AUTHO
2,958,289 UART: RITY.KEYID = 7
2,973,675 UART: [art] Erasing AUTHORITY.KEYID = 7
2,974,440 UART: [art] PUB.X = E5AEAFD87E440AF6F90538AF3927D2EEAC888C47DCD7C261F8BA31228C24442F89C34B56BEBC2118A83FD38AFEC3BEF3
2,981,228 UART: [art] PUB.Y = 79B128AF67CDE92ACC9BDCDAF60E371351F09EB8EE39AC52E733F1BF5B8BB76220367C433E05F63A41D37026D5A4286A
2,988,186 UART: [art] SIG.R = D97240225CCA60F8009FF842A1F8917387CF3227A424EEB4D9F3EA853EF46782C7E07753932B97E944510C76F811872F
2,994,925 UART: [art] SIG.S = DEEFD9D28AB1708EEAA54095D4702F7D900CECED8A2DD41FE985D2B1B5EFD340ED984161DB9DBD0D4FEAEAB83D9BE87C
3,019,038 UART: Caliptra RT
3,019,383 UART: [state] CFI Enabled
3,127,552 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,111,201 UART:
4,111,217 UART: Running Caliptra FMC ...
4,111,625 UART:
4,111,768 UART: [state] CFI Enabled
4,113,131 UART: [aliasrt :skip pcr extension
4,113,604 UART: [art] Extend RT PCRs Done
4,114,032 UART: [art] Lock RT PCRs Done
4,115,571 UART: [art] Populate DV Done
4,123,743 UART: [fht] FMC Alias Private Key: 7
4,124,821 UART: [art] Derive CDI
4,125,101 UART: [art] Store in in slot 0x4
4,210,918 UART: [art] Derive Key Pair
4,211,278 UART: [art] Store priv key in slot 0x5
4,223,696 UART: [art] Derive Key Pair - Done
4,238,408 UART: [art] Signing Cert with AUTHO
4,238,888 UART: RITY.KEYID = 7
4,254,076 UART: [art] Erasing AUTHORITY.KEYID = 7
4,254,841 UART: [art] PUB.X = E5AEAFD87E440AF6F90538AF3927D2EEAC888C47DCD7C261F8BA31228C24442F89C34B56BEBC2118A83FD38AFEC3BEF3
4,261,629 UART: [art] PUB.Y = 79B128AF67CDE92ACC9BDCDAF60E371351F09EB8EE39AC52E733F1BF5B8BB76220367C433E05F63A41D37026D5A4286A
4,268,587 UART: [art] SIG.R = D97240225CCA60F8009FF842A1F8917387CF3227A424EEB4D9F3EA853EF46782C7E07753932B97E944510C76F811872F
4,275,326 UART: [art] SIG.S = DEEFD9D28AB1708EEAA54095D4702F7D900CECED8A2DD41FE985D2B1B5EFD340ED984161DB9DBD0D4FEAEAB83D9BE87C
4,299,027 UART: Caliptra RT
4,299,372 UART: [state] CFI Enabled
4,582,247 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Production
86,287 UART: [state] DebugLocked = Yes
86,947 UART: [state] Starting the WD Timer 40000000 cycles
88,610 UART: [kat] SHA2-256
892,160 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,289 UART: [kat] ++
896,441 UART: [kat] sha1
900,671 UART: [kat] SHA2-256
902,611 UART: [kat] SHA2-384
905,330 UART: [kat] SHA2-512-ACC
907,231 UART: [kat] ECC-384
917,006 UART: [kat] HMAC-384Kdf
921,438 UART: [kat] LMS
1,169,750 UART: [kat] --
1,170,635 UART: [cold-reset] ++
1,171,122 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,175,172 ready_for_fw is high
1,175,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,793 UART: [idev] Erasing UDS.KEYID = 0
1,199,824 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,706 UART: [ldev] ++
1,209,874 UART: [ldev] CDI.KEYID = 6
1,210,238 UART: [ldev] SUBJECT.KEYID = 5
1,210,665 UART: [ldev] AUTHORITY.KEYID = 7
1,211,128 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,241,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,169 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,863 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,733 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,439 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,705 UART: [ldev] --
1,281,043 UART: [fwproc] Wait for Commands...
1,281,664 UART: [fwproc] Recv command 0x46574c44
1,282,397 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,628,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,793,086 >>> mbox cmd response: success
2,794,284 UART: [afmc] ++
2,794,452 UART: [afmc] CDI.KEYID = 6
2,794,815 UART: [afmc] SUBJECT.KEYID = 7
2,795,241 UART: [afmc] AUTHORITY.KEYID = 5
2,831,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,633 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,352 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,245 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,952 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,761 UART: [afmc] --
2,874,890 UART: [cold-reset] --
2,875,736 UART: [state] Locking Datavault
2,877,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,641 UART: [state] Locking ICCM
2,878,165 UART: [exit] Launching FMC @ 0x40000130
2,883,494 UART:
2,883,510 UART: Running Caliptra FMC ...
2,883,918 UART:
2,883,972 UART: [state] CFI Enabled
2,894,239 UART: [fht] FMC Alias Private Key: 7
3,001,754 UART: [art] Extend RT PCRs Done
3,002,182 UART: [art] Lock RT PCRs Done
3,003,794 UART: [art] Populate DV Done
3,011,802 UART: [fht] FMC Alias Private Key: 7
3,012,752 UART: [art] Derive CDI
3,013,032 UART: [art] Store in in slot 0x4
3,098,965 UART: [art] Derive Key Pair
3,099,325 UART: [art] Store priv key in slot 0x5
3,112,101 UART: [art] Derive Key Pair - Done
3,127,025 UART: [art] Signing Cert with AUTHO
3,127,505 UART: RITY.KEYID = 7
3,142,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,130 UART: [art] PUB.X = CE077F9D66DF12B7614D5CBD5D96C241CAF07AD03696947355A9B964E7247ABC79751D182AC04ABB1A1E4AA170FE8B12
3,149,909 UART: [art] PUB.Y = B8EAB68CDC51A964369387CCAFC6BCD963E714EBE981E6146AC50D80B5A0522ACA018BADFBA3E5C0AE6904F111929B92
3,156,870 UART: [art] SIG.R = A69563C307EC1E726D518707897A41DA6856141254B76AA25A56E5F35B841CEEEFBAAF1F09460D01878AB939857FB42E
3,163,627 UART: [art] SIG.S = 7D960771A3C4479BAB47585602254F31E383F00491C0A51FACF6FD95C4B3957ACEB5814E7931F095D327361DFA3D61FB
3,187,019 UART: Caliptra RT
3,187,272 UART: [state] CFI Enabled
3,294,959 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,295,715 UART:
3,295,731 UART: Running Caliptra ROM ...
3,296,139 UART:
3,296,194 UART: [state] CFI Enabled
3,298,607 UART: [state] LifecycleState = Production
3,299,215 UART: [state] DebugLocked = Yes
3,299,947 UART: [state] Starting the WD Timer 40000000 cycles
3,301,428 UART: [kat] SHA2-256
4,104,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,109,107 UART: [kat] ++
4,109,259 UART: [kat] sha1
4,113,513 UART: [kat] SHA2-256
4,115,453 UART: [kat] SHA2-384
4,118,400 UART: [kat] SHA2-512-ACC
4,120,301 UART: [kat] ECC-384
4,130,472 UART: [kat] HMAC-384Kdf
4,135,068 UART: [kat] LMS
4,383,380 UART: [kat] --
4,384,072 UART: [warm-reset] ++
4,385,119 UART: [warm-reset] --
4,385,848 UART: [state] Locking Datavault
4,386,694 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,298 UART: [state] Locking ICCM
4,387,924 UART: [exit] Launching FMC @ 0x40000130
4,393,253 UART:
4,393,269 UART: Running Caliptra FMC ...
4,393,677 UART:
4,393,731 UART: [state] CFI Enabled
4,395,050 UART: [aliasrt :skip pcr extension
4,395,523 UART: [art] Extend RT PCRs Done
4,395,951 UART: [art] Lock RT PCRs Done
4,397,188 UART: [art] Populate DV Done
4,405,362 UART: [fht] FMC Alias Private Key: 7
4,406,424 UART: [art] Derive CDI
4,406,704 UART: [art] Store in in slot 0x4
4,492,293 UART: [art] Derive Key Pair
4,492,653 UART: [art] Store priv key in slot 0x5
4,505,739 UART: [art] Derive Key Pair - Done
4,520,643 UART: [art] Signing Cert with AUTHO
4,521,123 UART: RITY.KEYID = 7
4,535,993 UART: [art] Erasing AUTHORITY.KEYID = 7
4,536,758 UART: [art] PUB.X = CE077F9D66DF12B7614D5CBD5D96C241CAF07AD03696947355A9B964E7247ABC79751D182AC04ABB1A1E4AA170FE8B12
4,543,537 UART: [art] PUB.Y = B8EAB68CDC51A964369387CCAFC6BCD963E714EBE981E6146AC50D80B5A0522ACA018BADFBA3E5C0AE6904F111929B92
4,550,498 UART: [art] SIG.R = A69563C307EC1E726D518707897A41DA6856141254B76AA25A56E5F35B841CEEEFBAAF1F09460D01878AB939857FB42E
4,557,255 UART: [art] SIG.S = 7D960771A3C4479BAB47585602254F31E383F00491C0A51FACF6FD95C4B3957ACEB5814E7931F095D327361DFA3D61FB
4,581,043 UART: Caliptra RT
4,581,296 UART: [state] CFI Enabled
4,862,721 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 ready_for_fw is high
1,056,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,646,340 >>> mbox cmd response: success
2,707,513 UART:
2,707,529 UART: Running Caliptra FMC ...
2,707,937 UART:
2,707,991 UART: [state] CFI Enabled
2,718,938 UART: [fht] FMC Alias Private Key: 7
2,827,495 UART: [art] Extend RT PCRs Done
2,827,923 UART: [art] Lock RT PCRs Done
2,829,737 UART: [art] Populate DV Done
2,838,089 UART: [fht] FMC Alias Private Key: 7
2,839,179 UART: [art] Derive CDI
2,839,459 UART: [art] Store in in slot 0x4
2,925,430 UART: [art] Derive Key Pair
2,925,790 UART: [art] Store priv key in slot 0x5
2,939,092 UART: [art] Derive Key Pair - Done
2,953,852 UART: [art] Signing Cert with AUTHO
2,954,332 UART: RITY.KEYID = 7
2,969,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,647 UART: [art] PUB.X = EA8A7C1E87A4573368DE692159253B5152BF2CA93BFEC2BE2771D51BC20CF86981CC3AAE21B92F1C7D13C6718C0BE6A0
2,977,425 UART: [art] PUB.Y = 844C29BD5AF71A0D61EE037F37CA246C814F2BD388CC99B987CBE96539FCD463ED4AEAB4E6C3FFD6D9596B98A92DA619
2,984,389 UART: [art] SIG.R = 296FCB7BB9A9AD4C3DB8808CEDE41157AA76948F7365D1C8BC953C5DE054C57EC961E5417FCB299CECE57C0DA941D0AD
2,991,178 UART: [art] SIG.S = 538601432A5BF213CC81A02D8EBAD9A9EDDA8BEBB84CD2E4FD1FD867C12BD880A733BFDC91FE36C3D85EE60091014C09
3,015,194 UART: Caliptra RT
3,015,447 UART: [state] CFI Enabled
3,122,933 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,101,451 UART:
4,101,467 UART: Running Caliptra FMC ...
4,101,875 UART:
4,101,929 UART: [state] CFI Enabled
4,103,266 UART: [aliasrt :skip pcr extension
4,103,739 UART: [art] Extend RT PCRs Done
4,104,167 UART: [art] Lock RT PCRs Done
4,105,428 UART: [art] Populate DV Done
4,113,538 UART: [fht] FMC Alias Private Key: 7
4,114,706 UART: [art] Derive CDI
4,114,986 UART: [art] Store in in slot 0x4
4,200,509 UART: [art] Derive Key Pair
4,200,869 UART: [art] Store priv key in slot 0x5
4,213,423 UART: [art] Derive Key Pair - Done
4,228,273 UART: [art] Signing Cert with AUTHO
4,228,753 UART: RITY.KEYID = 7
4,244,251 UART: [art] Erasing AUTHORITY.KEYID = 7
4,245,016 UART: [art] PUB.X = EA8A7C1E87A4573368DE692159253B5152BF2CA93BFEC2BE2771D51BC20CF86981CC3AAE21B92F1C7D13C6718C0BE6A0
4,251,794 UART: [art] PUB.Y = 844C29BD5AF71A0D61EE037F37CA246C814F2BD388CC99B987CBE96539FCD463ED4AEAB4E6C3FFD6D9596B98A92DA619
4,258,758 UART: [art] SIG.R = 296FCB7BB9A9AD4C3DB8808CEDE41157AA76948F7365D1C8BC953C5DE054C57EC961E5417FCB299CECE57C0DA941D0AD
4,265,547 UART: [art] SIG.S = 538601432A5BF213CC81A02D8EBAD9A9EDDA8BEBB84CD2E4FD1FD867C12BD880A733BFDC91FE36C3D85EE60091014C09
4,289,289 UART: Caliptra RT
4,289,542 UART: [state] CFI Enabled
4,568,892 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,692 UART: [state] LifecycleState = Production
86,300 UART: [state] DebugLocked = Yes
87,002 UART: [state] Starting the WD Timer 40000000 cycles
88,681 UART: [kat] SHA2-256
892,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,360 UART: [kat] ++
896,512 UART: [kat] sha1
900,956 UART: [kat] SHA2-256
902,896 UART: [kat] SHA2-384
905,649 UART: [kat] SHA2-512-ACC
907,550 UART: [kat] ECC-384
917,175 UART: [kat] HMAC-384Kdf
921,783 UART: [kat] LMS
1,170,095 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,497 UART: [fht] FHT @ 0x50003400
1,174,059 UART: [idev] ++
1,174,227 UART: [idev] CDI.KEYID = 6
1,174,588 UART: [idev] SUBJECT.KEYID = 7
1,175,013 UART: [idev] UDS.KEYID = 0
1,175,359 ready_for_fw is high
1,175,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,942 UART: [idev] Erasing UDS.KEYID = 0
1,200,381 UART: [idev] Sha1 KeyId Algorithm
1,209,462 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,179 UART: [ldev] SUBJECT.KEYID = 5
1,211,606 UART: [ldev] AUTHORITY.KEYID = 7
1,212,069 UART: [ldev] FE.KEYID = 1
1,217,511 UART: [ldev] Erasing FE.KEYID = 1
1,244,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,750 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,444 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,314 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,020 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,998 UART: [ldev] --
1,283,384 UART: [fwproc] Wait for Commands...
1,283,971 UART: [fwproc] Recv command 0x46574c44
1,284,704 UART: [fwproc] Recv'd Img size: 114084 bytes
2,604,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,796,011 >>> mbox cmd response: success
2,797,025 UART: [afmc] ++
2,797,193 UART: [afmc] CDI.KEYID = 6
2,797,556 UART: [afmc] SUBJECT.KEYID = 7
2,797,982 UART: [afmc] AUTHORITY.KEYID = 5
2,833,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,838 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,557 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,450 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,157 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,118 UART: [afmc] --
2,877,241 UART: [cold-reset] --
2,878,069 UART: [state] Locking Datavault
2,879,326 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,930 UART: [state] Locking ICCM
2,880,564 UART: [exit] Launching FMC @ 0x40000130
2,885,893 UART:
2,885,909 UART: Running Caliptra FMC ...
2,886,317 UART:
2,886,460 UART: [state] CFI Enabled
2,897,087 UART: [fht] FMC Alias Private Key: 7
3,004,494 UART: [art] Extend RT PCRs Done
3,004,922 UART: [art] Lock RT PCRs Done
3,006,284 UART: [art] Populate DV Done
3,014,378 UART: [fht] FMC Alias Private Key: 7
3,015,356 UART: [art] Derive CDI
3,015,636 UART: [art] Store in in slot 0x4
3,101,067 UART: [art] Derive Key Pair
3,101,427 UART: [art] Store priv key in slot 0x5
3,115,107 UART: [art] Derive Key Pair - Done
3,129,775 UART: [art] Signing Cert with AUTHO
3,130,255 UART: RITY.KEYID = 7
3,145,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,244 UART: [art] PUB.X = B6C90C6566E356780F231E2F4DED8F7E8A335FDDB6FE04F1429C17F94C2926C4EC407E038E29FD491008C1A22F150F54
3,153,002 UART: [art] PUB.Y = 7C5038AC19BD0A3FB479CEC0F165A109256110BE50CF893C1357E7C2F74A36688FDC2483EBA71058D6D3A020673BB0F5
3,159,952 UART: [art] SIG.R = E8AD89F419F34120AE26CF84D4774B88BDDCECD6DB4BB51BD6D0B4A2C1B22D659E3418C9C679AC830CF5E90100CD997E
3,166,714 UART: [art] SIG.S = A159FFD16D2B73ACC629ECFD01E8F11C6FCFB1567BFFA8B935A71ADB20C02FB8E92F1C07622BB665C7A32D295B2C2111
3,190,407 UART: Caliptra RT
3,190,752 UART: [state] CFI Enabled
3,298,675 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,431 UART:
3,299,447 UART: Running Caliptra ROM ...
3,299,855 UART:
3,299,997 UART: [state] CFI Enabled
3,302,246 UART: [state] LifecycleState = Production
3,302,854 UART: [state] DebugLocked = Yes
3,303,576 UART: [state] Starting the WD Timer 40000000 cycles
3,305,279 UART: [kat] SHA2-256
4,108,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,958 UART: [kat] ++
4,113,110 UART: [kat] sha1
4,117,538 UART: [kat] SHA2-256
4,119,478 UART: [kat] SHA2-384
4,122,269 UART: [kat] SHA2-512-ACC
4,124,170 UART: [kat] ECC-384
4,134,213 UART: [kat] HMAC-384Kdf
4,138,681 UART: [kat] LMS
4,386,993 UART: [kat] --
4,387,973 UART: [warm-reset] ++
4,388,886 UART: [warm-reset] --
4,389,615 UART: [state] Locking Datavault
4,390,401 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,005 UART: [state] Locking ICCM
4,391,551 UART: [exit] Launching FMC @ 0x40000130
4,396,880 UART:
4,396,896 UART: Running Caliptra FMC ...
4,397,304 UART:
4,397,447 UART: [state] CFI Enabled
4,398,922 UART: [aliasrt :skip pcr extension
4,399,395 UART: [art] Extend RT PCRs Done
4,399,823 UART: [art] Lock RT PCRs Done
4,400,984 UART: [art] Populate DV Done
4,409,202 UART: [fht] FMC Alias Private Key: 7
4,410,216 UART: [art] Derive CDI
4,410,496 UART: [art] Store in in slot 0x4
4,496,429 UART: [art] Derive Key Pair
4,496,789 UART: [art] Store priv key in slot 0x5
4,509,693 UART: [art] Derive Key Pair - Done
4,524,715 UART: [art] Signing Cert with AUTHO
4,525,195 UART: RITY.KEYID = 7
4,540,721 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,486 UART: [art] PUB.X = B6C90C6566E356780F231E2F4DED8F7E8A335FDDB6FE04F1429C17F94C2926C4EC407E038E29FD491008C1A22F150F54
4,548,244 UART: [art] PUB.Y = 7C5038AC19BD0A3FB479CEC0F165A109256110BE50CF893C1357E7C2F74A36688FDC2483EBA71058D6D3A020673BB0F5
4,555,194 UART: [art] SIG.R = E8AD89F419F34120AE26CF84D4774B88BDDCECD6DB4BB51BD6D0B4A2C1B22D659E3418C9C679AC830CF5E90100CD997E
4,561,956 UART: [art] SIG.S = A159FFD16D2B73ACC629ECFD01E8F11C6FCFB1567BFFA8B935A71ADB20C02FB8E92F1C07622BB665C7A32D295B2C2111
4,586,491 UART: Caliptra RT
4,586,836 UART: [state] CFI Enabled
4,864,743 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,008 ready_for_fw is high
1,056,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,805 >>> mbox cmd response: success
2,704,886 UART:
2,704,902 UART: Running Caliptra FMC ...
2,705,310 UART:
2,705,453 UART: [state] CFI Enabled
2,716,002 UART: [fht] FMC Alias Private Key: 7
2,823,311 UART: [art] Extend RT PCRs Done
2,823,739 UART: [art] Lock RT PCRs Done
2,825,357 UART: [art] Populate DV Done
2,833,713 UART: [fht] FMC Alias Private Key: 7
2,834,761 UART: [art] Derive CDI
2,835,041 UART: [art] Store in in slot 0x4
2,921,230 UART: [art] Derive Key Pair
2,921,590 UART: [art] Store priv key in slot 0x5
2,934,806 UART: [art] Derive Key Pair - Done
2,949,793 UART: [art] Signing Cert with AUTHO
2,950,273 UART: RITY.KEYID = 7
2,965,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,378 UART: [art] PUB.X = 60C851949C33DCACE62070C90FDA3B171E937F717A6CDDA006E004B183339853553E90FB024480385047F700DA46D4BF
2,973,112 UART: [art] PUB.Y = 196F100F4A24944E26E669C21C67A9C811ABF297DF7B3AEAEF3A1F285487873D22377886CB5BF34EB25E09502BEBF483
2,980,062 UART: [art] SIG.R = FFBCBCE855151120F593EAB3785A480A04D193F280ED6EF9D77D069E0F3FC4C054ACD3126E76A0562A23316F0751A377
2,986,823 UART: [art] SIG.S = CD286D71CEDC1E8C3C47DADCFC5842625841DD17E4F18EC97FBD5C569656B4F854388DFEABDAF034B4C39751EE695080
3,010,560 UART: Caliptra RT
3,010,905 UART: [state] CFI Enabled
3,118,822 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,097,899 UART:
4,097,915 UART: Running Caliptra FMC ...
4,098,323 UART:
4,098,466 UART: [state] CFI Enabled
4,099,733 UART: [aliasrt :skip pcr extension
4,100,206 UART: [art] Extend RT PCRs Done
4,100,634 UART: [art] Lock RT PCRs Done
4,102,037 UART: [art] Populate DV Done
4,110,415 UART: [fht] FMC Alias Private Key: 7
4,111,343 UART: [art] Derive CDI
4,111,623 UART: [art] Store in in slot 0x4
4,197,420 UART: [art] Derive Key Pair
4,197,780 UART: [art] Store priv key in slot 0x5
4,211,482 UART: [art] Derive Key Pair - Done
4,226,169 UART: [art] Signing Cert with AUTHO
4,226,649 UART: RITY.KEYID = 7
4,241,833 UART: [art] Erasing AUTHORITY.KEYID = 7
4,242,598 UART: [art] PUB.X = 60C851949C33DCACE62070C90FDA3B171E937F717A6CDDA006E004B183339853553E90FB024480385047F700DA46D4BF
4,249,332 UART: [art] PUB.Y = 196F100F4A24944E26E669C21C67A9C811ABF297DF7B3AEAEF3A1F285487873D22377886CB5BF34EB25E09502BEBF483
4,256,282 UART: [art] SIG.R = FFBCBCE855151120F593EAB3785A480A04D193F280ED6EF9D77D069E0F3FC4C054ACD3126E76A0562A23316F0751A377
4,263,043 UART: [art] SIG.S = CD286D71CEDC1E8C3C47DADCFC5842625841DD17E4F18EC97FBD5C569656B4F854388DFEABDAF034B4C39751EE695080
4,286,436 UART: Caliptra RT
4,286,781 UART: [state] CFI Enabled
4,562,526 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
192,180 UART:
192,946 UART: Running Caliptra ROM ...
194,047 UART:
194,209 UART: [state] CFI Enabled
266,324 UART: [state] LifecycleState = Production
268,241 UART: [state] DebugLocked = Yes
270,239 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,941 UART: [kat] SHA2-256
444,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,147 UART: [kat] ++
455,730 UART: [kat] sha1
466,389 UART: [kat] SHA2-256
469,079 UART: [kat] SHA2-384
475,190 UART: [kat] SHA2-512-ACC
477,541 UART: [kat] ECC-384
2,767,907 UART: [kat] HMAC-384Kdf
2,780,017 UART: [kat] LMS
3,970,338 UART: [kat] --
3,975,402 UART: [cold-reset] ++
3,976,606 UART: [fht] Storing FHT @ 0x50003400
3,987,477 UART: [idev] ++
3,988,047 UART: [idev] CDI.KEYID = 6
3,989,063 UART: [idev] SUBJECT.KEYID = 7
3,990,224 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,127 UART: [idev] Erasing UDS.KEYID = 0
2,665 UART:
2,836 UART: Running Caliptra ROM ...
3,935 UART:
4,085 UART: [state] CFI Enabled
69,726 UART: [state] LifecycleState = Production
71,640 UART: [state] DebugLocked = Yes
74,211 UART: [state] Starting the Watchdog Timer 40000000 cycles
79,498 UART: [kat] SHA2-256
249,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
259,723 UART: [kat] ++
260,171 UART: [kat] sha1
271,369 UART: [kat] SHA2-256
274,062 UART: [kat] SHA2-384
279,690 UART: [kat] SHA2-512-ACC
282,028 UART: [kat] ECC-384
2,574,829 UART: [kat] HMAC-384Kdf
2,587,798 UART: [kat] LMS
3,778,154 UART: [kat] --
3,783,724 UART: [warm-reset] ++
3,784,560 UART: [warm-reset] Previous Cold-Reset was not successful.
3,789,563 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
191,858 UART:
192,218 UART: Running Caliptra ROM ...
193,394 UART:
603,149 UART: [state] CFI Enabled
618,982 UART: [state] LifecycleState = Production
620,780 UART: [state] DebugLocked = Yes
622,318 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,830 UART: [kat] SHA2-256
797,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,165 UART: [kat] ++
808,740 UART: [kat] sha1
819,677 UART: [kat] SHA2-256
822,359 UART: [kat] SHA2-384
828,502 UART: [kat] SHA2-512-ACC
830,854 UART: [kat] ECC-384
3,114,589 UART: [kat] HMAC-384Kdf
3,126,456 UART: [kat] LMS
4,316,581 UART: [kat] --
4,321,365 UART: [cold-reset] ++
4,322,340 UART: [fht] Storing FHT @ 0x50003400
4,334,380 UART: [idev] ++
4,334,942 UART: [idev] CDI.KEYID = 6
4,335,902 UART: [idev] SUBJECT.KEYID = 7
4,337,156 UART: [idev] UDS.KEYID = 0
Initializing fuses
898 UART: [idev] Erasing UDS.KEYID = 0
2,305 UART:
2,470 UART: Running Caliptra ROM ...
3,569 UART:
15,984,109 UART: [state] CFI Enabled
16,001,608 UART: [state] LifecycleState = Production
16,003,456 UART: [state] DebugLocked = Yes
16,006,458 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,011,303 UART: [kat] SHA2-256
16,181,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,191,615 UART: [kat] ++
16,192,153 UART: [kat] sha1
16,202,447 UART: [kat] SHA2-256
16,205,180 UART: [kat] SHA2-384
16,210,724 UART: [kat] SHA2-512-ACC
16,213,116 UART: [kat] ECC-384
18,498,654 UART: [kat] HMAC-384Kdf
18,511,394 UART: [kat] LMS
19,701,533 UART: [kat] --
19,706,665 UART: [warm-reset] ++
19,707,509 UART: [warm-reset] Previous Cold-Reset was not successful.
19,711,420 UART: ROM Fatal Error: 0x01040010test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
191,901 UART:
192,288 UART: Running Caliptra ROM ...
193,411 UART:
193,554 UART: [state] CFI Enabled
263,727 UART: [state] LifecycleState = Production
265,516 UART: [state] DebugLocked = Yes
267,537 UART: [state] Starting the WD Timer 40000000 cycles
273,073 UART: [kat] SHA2-256
452,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,803 UART: [kat] ++
464,251 UART: [kat] sha1
474,925 UART: [kat] SHA2-256
477,954 UART: [kat] SHA2-384
483,991 UART: [kat] SHA2-512-ACC
486,915 UART: [kat] ECC-384
2,948,277 UART: [kat] HMAC-384Kdf
2,971,452 UART: [kat] LMS
3,500,915 UART: [kat] --
3,505,791 UART: [cold-reset] ++
3,508,316 UART: [fht] FHT @ 0x50003400
3,518,940 UART: [idev] ++
3,519,498 UART: [idev] CDI.KEYID = 6
3,520,432 UART: [idev] SUBJECT.KEYID = 7
3,521,628 UART: [idev] UDS.KEYID = 0
Initializing fuses
870 UART: [idev] Erasing UDS.KEYID = 0
2,063 UART:
2,293 UART: Running Caliptra ROM ...
3,411 UART:
3,563 UART: [state] CFI Enabled
72,410 UART: [state] LifecycleState = Production
74,177 UART: [state] DebugLocked = Yes
75,668 UART: [state] Starting the WD Timer 40000000 cycles
80,118 UART: [kat] SHA2-256
259,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,824 UART: [kat] ++
271,293 UART: [kat] sha1
282,870 UART: [kat] SHA2-256
285,882 UART: [kat] SHA2-384
293,099 UART: [kat] SHA2-512-ACC
296,059 UART: [kat] ECC-384
2,756,868 UART: [kat] HMAC-384Kdf
2,780,007 UART: [kat] LMS
3,309,507 UART: [kat] --
3,314,044 UART: [warm-reset] ++
3,314,884 UART: [warm-reset] Prev Cold-Reset failed
3,319,697 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,244 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
192,355 UART:
192,709 UART: Running Caliptra ROM ...
193,893 UART:
603,485 UART: [state] CFI Enabled
616,397 UART: [state] LifecycleState = Production
618,130 UART: [state] DebugLocked = Yes
619,468 UART: [state] Starting the WD Timer 40000000 cycles
623,761 UART: [kat] SHA2-256
802,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,488 UART: [kat] ++
815,012 UART: [kat] sha1
826,770 UART: [kat] SHA2-256
829,806 UART: [kat] SHA2-384
837,066 UART: [kat] SHA2-512-ACC
840,035 UART: [kat] ECC-384
3,280,165 UART: [kat] HMAC-384Kdf
3,292,194 UART: [kat] LMS
3,821,665 UART: [kat] --
3,827,511 UART: [cold-reset] ++
3,829,527 UART: [fht] FHT @ 0x50003400
3,840,211 UART: [idev] ++
3,840,783 UART: [idev] CDI.KEYID = 6
3,841,689 UART: [idev] SUBJECT.KEYID = 7
3,842,892 UART: [idev] UDS.KEYID = 0
Initializing fuses
870 UART: [idev] Erasing UDS.KEYID = 0
2,152 UART:
2,383 UART: Running Caliptra ROM ...
3,485 UART:
16,484,264 UART: [state] CFI Enabled
16,499,953 UART: [state] LifecycleState = Production
16,501,719 UART: [state] DebugLocked = Yes
16,504,330 UART: [state] Starting the WD Timer 40000000 cycles
16,509,766 UART: [kat] SHA2-256
16,688,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,700,456 UART: [kat] ++
16,700,991 UART: [kat] sha1
16,712,045 UART: [kat] SHA2-256
16,715,120 UART: [kat] SHA2-384
16,720,923 UART: [kat] SHA2-512-ACC
16,723,871 UART: [kat] ECC-384
19,168,032 UART: [kat] HMAC-384Kdf
19,179,617 UART: [kat] LMS
19,709,162 UART: [kat] --
19,712,176 UART: [warm-reset] ++
19,712,962 UART: [warm-reset] Prev Cold-Reset failed
19,715,359 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
191,911 UART:
192,296 UART: Running Caliptra ROM ...
193,420 UART:
193,566 UART: [state] CFI Enabled
265,063 UART: [state] LifecycleState = Production
267,316 UART: [state] DebugLocked = Yes
270,148 UART: [state] Starting the WD Timer 40000000 cycles
274,911 UART: [kat] SHA2-256
464,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,559 UART: [kat] ++
476,082 UART: [kat] sha1
488,110 UART: [kat] SHA2-256
491,178 UART: [kat] SHA2-384
496,406 UART: [kat] SHA2-512-ACC
499,014 UART: [kat] ECC-384
2,949,524 UART: [kat] HMAC-384Kdf
2,973,338 UART: [kat] LMS
3,505,132 UART: [kat] --
3,510,258 UART: [cold-reset] ++
3,512,642 UART: [fht] FHT @ 0x50003400
3,523,735 UART: [idev] ++
3,524,386 UART: [idev] CDI.KEYID = 6
3,525,406 UART: [idev] SUBJECT.KEYID = 7
3,526,562 UART: [idev] UDS.KEYID = 0
Initializing fuses
877 UART: [idev] Erasing UDS.KEYID = 0
2,155 UART:
2,372 UART: Running Caliptra ROM ...
3,472 UART:
3,622 UART: [state] CFI Enabled
67,218 UART: [state] LifecycleState = Production
69,151 UART: [state] DebugLocked = Yes
71,375 UART: [state] Starting the WD Timer 40000000 cycles
77,188 UART: [kat] SHA2-256
267,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
277,845 UART: [kat] ++
278,427 UART: [kat] sha1
289,307 UART: [kat] SHA2-256
292,312 UART: [kat] SHA2-384
299,154 UART: [kat] SHA2-512-ACC
301,730 UART: [kat] ECC-384
2,755,350 UART: [kat] HMAC-384Kdf
2,769,447 UART: [kat] LMS
3,300,991 UART: [kat] --
3,304,934 UART: [warm-reset] ++
3,305,785 UART: [warm-reset] Prev Cold-Reset failed
3,309,620 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,698 writing to cptra_bootfsm_go
192,301 UART:
192,663 UART: Running Caliptra ROM ...
193,758 UART:
603,667 UART: [state] CFI Enabled
620,050 UART: [state] LifecycleState = Production
622,297 UART: [state] DebugLocked = Yes
625,115 UART: [state] Starting the WD Timer 40000000 cycles
630,173 UART: [kat] SHA2-256
820,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,872 UART: [kat] ++
831,378 UART: [kat] sha1
842,606 UART: [kat] SHA2-256
845,592 UART: [kat] SHA2-384
852,598 UART: [kat] SHA2-512-ACC
855,223 UART: [kat] ECC-384
3,298,924 UART: [kat] HMAC-384Kdf
3,311,745 UART: [kat] LMS
3,843,564 UART: [kat] --
3,847,418 UART: [cold-reset] ++
3,849,690 UART: [fht] FHT @ 0x50003400
3,860,921 UART: [idev] ++
3,861,595 UART: [idev] CDI.KEYID = 6
3,862,603 UART: [idev] SUBJECT.KEYID = 7
3,863,755 UART: [idev] UDS.KEYID = 0
Initializing fuses
885 UART: [idev] Erasing UDS.KEYID = 0
2,170 UART:
2,431 UART: Running Caliptra ROM ...
3,536 UART:
16,455,656 UART: [state] CFI Enabled
16,470,713 UART: [state] LifecycleState = Production
16,472,469 UART: [state] DebugLocked = Yes
16,473,783 UART: [state] Starting the WD Timer 40000000 cycles
16,478,136 UART: [kat] SHA2-256
16,667,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,678,862 UART: [kat] ++
16,679,458 UART: [kat] sha1
16,690,024 UART: [kat] SHA2-256
16,693,038 UART: [kat] SHA2-384
16,699,242 UART: [kat] SHA2-512-ACC
16,701,856 UART: [kat] ECC-384
19,146,801 UART: [kat] HMAC-384Kdf
19,158,664 UART: [kat] LMS
19,690,267 UART: [kat] --
19,694,956 UART: [warm-reset] ++
19,695,819 UART: [warm-reset] Prev Cold-Reset failed
19,699,484 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,646 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Production
85,811 UART: [state] DebugLocked = Yes
86,509 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,203 UART: [kat] SHA2-256
882,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,249 UART: [kat] ++
886,401 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,570 UART: [kat] SHA2-512-ACC
897,471 UART: [kat] ECC-384
903,130 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,651 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,835 UART: [idev] ++
1,480,003 UART: [idev] CDI.KEYID = 6
1,480,363 UART: [idev] SUBJECT.KEYID = 7
1,480,787 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,228 UART:
1,481,244 UART: Running Caliptra ROM ...
1,481,652 UART:
1,481,706 UART: [state] CFI Enabled
1,484,039 UART: [state] LifecycleState = Production
1,484,647 UART: [state] DebugLocked = Yes
1,485,285 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,097 UART: [kat] SHA2-256
2,281,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,143 UART: [kat] ++
2,285,295 UART: [kat] sha1
2,289,463 UART: [kat] SHA2-256
2,291,401 UART: [kat] SHA2-384
2,294,024 UART: [kat] SHA2-512-ACC
2,295,925 UART: [kat] ECC-384
2,301,398 UART: [kat] HMAC-384Kdf
2,305,978 UART: [kat] LMS
2,874,174 UART: [kat] --
2,875,082 UART: [warm-reset] ++
2,875,353 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,602 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Production
86,070 UART: [state] DebugLocked = Yes
86,824 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,600 UART: [kat] SHA2-256
882,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,646 UART: [kat] ++
886,798 UART: [kat] sha1
890,990 UART: [kat] SHA2-256
892,928 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,329 UART: [kat] HMAC-384Kdf
907,809 UART: [kat] LMS
1,476,005 UART: [kat] --
1,476,964 UART: [cold-reset] ++
1,477,459 UART: [fht] Storing FHT @ 0x50003400
1,480,390 UART: [idev] ++
1,480,558 UART: [idev] CDI.KEYID = 6
1,480,918 UART: [idev] SUBJECT.KEYID = 7
1,481,342 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,481,783 UART:
1,481,799 UART: Running Caliptra ROM ...
1,482,207 UART:
1,482,348 UART: [state] CFI Enabled
1,484,929 UART: [state] LifecycleState = Production
1,485,537 UART: [state] DebugLocked = Yes
1,486,129 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,911 UART: [kat] SHA2-256
2,281,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,957 UART: [kat] ++
2,286,109 UART: [kat] sha1
2,290,319 UART: [kat] SHA2-256
2,292,257 UART: [kat] SHA2-384
2,294,912 UART: [kat] SHA2-512-ACC
2,296,813 UART: [kat] ECC-384
2,302,514 UART: [kat] HMAC-384Kdf
2,306,976 UART: [kat] LMS
2,875,172 UART: [kat] --
2,876,162 UART: [warm-reset] ++
2,876,433 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,832 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,787 UART: [state] LifecycleState = Production
85,395 UART: [state] DebugLocked = Yes
86,033 UART: [state] Starting the WD Timer 40000000 cycles
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,172,097 UART: [cold-reset] ++
1,172,484 UART: [fht] FHT @ 0x50003400
1,174,979 UART: [idev] ++
1,175,147 UART: [idev] CDI.KEYID = 6
1,175,507 UART: [idev] SUBJECT.KEYID = 7
1,175,931 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,369 UART:
1,176,385 UART: Running Caliptra ROM ...
1,176,793 UART:
1,176,848 UART: [state] CFI Enabled
1,179,409 UART: [state] LifecycleState = Production
1,180,017 UART: [state] DebugLocked = Yes
1,180,561 UART: [state] Starting the WD Timer 40000000 cycles
1,182,228 UART: [kat] SHA2-256
1,987,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,992,003 UART: [kat] ++
1,992,155 UART: [kat] sha1
1,996,281 UART: [kat] SHA2-256
1,998,221 UART: [kat] SHA2-384
2,001,026 UART: [kat] SHA2-512-ACC
2,002,927 UART: [kat] ECC-384
2,012,478 UART: [kat] HMAC-384Kdf
2,017,110 UART: [kat] LMS
2,265,438 UART: [kat] --
2,266,428 UART: [warm-reset] ++
2,266,699 UART: [warm-reset] Prev Cold-Reset failed
2,267,694 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Production
86,276 UART: [state] DebugLocked = Yes
86,876 UART: [state] Starting the WD Timer 40000000 cycles
88,543 UART: [kat] SHA2-256
894,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,318 UART: [kat] ++
898,470 UART: [kat] sha1
902,656 UART: [kat] SHA2-256
904,596 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,442 UART: [cold-reset] ++
1,172,851 UART: [fht] FHT @ 0x50003400
1,175,656 UART: [idev] ++
1,175,824 UART: [idev] CDI.KEYID = 6
1,176,184 UART: [idev] SUBJECT.KEYID = 7
1,176,608 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,177,046 UART:
1,177,062 UART: Running Caliptra ROM ...
1,177,470 UART:
1,177,612 UART: [state] CFI Enabled
1,180,403 UART: [state] LifecycleState = Production
1,181,011 UART: [state] DebugLocked = Yes
1,181,713 UART: [state] Starting the WD Timer 40000000 cycles
1,183,178 UART: [kat] SHA2-256
1,988,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,992,953 UART: [kat] ++
1,993,105 UART: [kat] sha1
1,997,259 UART: [kat] SHA2-256
1,999,199 UART: [kat] SHA2-384
2,001,852 UART: [kat] SHA2-512-ACC
2,003,753 UART: [kat] ECC-384
2,013,614 UART: [kat] HMAC-384Kdf
2,018,216 UART: [kat] LMS
2,266,544 UART: [kat] --
2,267,700 UART: [warm-reset] ++
2,267,971 UART: [warm-reset] Prev Cold-Reset failed
2,269,038 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Production
85,805 UART: [state] DebugLocked = Yes
86,545 UART: [state] Starting the WD Timer 40000000 cycles
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,837 UART: [kat] ++
895,989 UART: [kat] sha1
900,153 UART: [kat] SHA2-256
902,093 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,348 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,491 UART:
1,174,507 UART: Running Caliptra ROM ...
1,174,915 UART:
1,174,970 UART: [state] CFI Enabled
1,178,019 UART: [state] LifecycleState = Production
1,178,627 UART: [state] DebugLocked = Yes
1,179,279 UART: [state] Starting the WD Timer 40000000 cycles
1,180,846 UART: [kat] SHA2-256
1,984,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,525 UART: [kat] ++
1,988,677 UART: [kat] sha1
1,993,039 UART: [kat] SHA2-256
1,994,979 UART: [kat] SHA2-384
1,997,864 UART: [kat] SHA2-512-ACC
1,999,765 UART: [kat] ECC-384
2,009,606 UART: [kat] HMAC-384Kdf
2,014,214 UART: [kat] LMS
2,262,526 UART: [kat] --
2,263,314 UART: [warm-reset] ++
2,263,582 UART: [warm-reset] Prev Cold-Reset failed
2,264,449 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Production
86,334 UART: [state] DebugLocked = Yes
87,076 UART: [state] Starting the WD Timer 40000000 cycles
88,775 UART: [kat] SHA2-256
892,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,454 UART: [kat] ++
896,606 UART: [kat] sha1
900,842 UART: [kat] SHA2-256
902,782 UART: [kat] SHA2-384
905,599 UART: [kat] SHA2-512-ACC
907,500 UART: [kat] ECC-384
917,449 UART: [kat] HMAC-384Kdf
922,007 UART: [kat] LMS
1,170,319 UART: [kat] --
1,171,122 UART: [cold-reset] ++
1,171,469 UART: [fht] FHT @ 0x50003400
1,174,233 UART: [idev] ++
1,174,401 UART: [idev] CDI.KEYID = 6
1,174,762 UART: [idev] SUBJECT.KEYID = 7
1,175,187 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,626 UART:
1,175,642 UART: Running Caliptra ROM ...
1,176,050 UART:
1,176,192 UART: [state] CFI Enabled
1,178,791 UART: [state] LifecycleState = Production
1,179,399 UART: [state] DebugLocked = Yes
1,180,049 UART: [state] Starting the WD Timer 40000000 cycles
1,181,686 UART: [kat] SHA2-256
1,985,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,365 UART: [kat] ++
1,989,517 UART: [kat] sha1
1,993,519 UART: [kat] SHA2-256
1,995,459 UART: [kat] SHA2-384
1,998,132 UART: [kat] SHA2-512-ACC
2,000,033 UART: [kat] ECC-384
2,010,052 UART: [kat] HMAC-384Kdf
2,014,852 UART: [kat] LMS
2,263,164 UART: [kat] --
2,264,180 UART: [warm-reset] ++
2,264,448 UART: [warm-reset] Prev Cold-Reset failed
2,265,553 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,273 UART:
192,916 UART: Running Caliptra ROM ...
194,017 UART:
194,189 UART: [state] CFI Enabled
264,808 UART: [state] LifecycleState = Unprovisioned
266,956 UART: [state] DebugLocked = No
269,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,086 UART: [kat] SHA2-256
444,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,284 UART: [kat] ++
455,753 UART: [kat] sha1
466,958 UART: [kat] SHA2-256
469,645 UART: [kat] SHA2-384
474,332 UART: [kat] SHA2-512-ACC
476,694 UART: [kat] ECC-384
2,768,415 UART: [kat] HMAC-384Kdf
2,800,524 UART: [kat] LMS
3,990,838 UART: [kat] --
3,994,210 UART: [cold-reset] ++
3,995,642 UART: [fht] Storing FHT @ 0x50003400
4,008,236 UART: [idev] ++
4,008,849 UART: [idev] CDI.KEYID = 6
4,009,748 UART: [idev] SUBJECT.KEYID = 7
4,011,030 UART: [idev] UDS.KEYID = 0
6,595,093 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,738,652 UART: [idev] Erasing UDS.KEYID = 0
7,349,876 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,648 UART: [idev] --
7,378,371 UART: [ldev] ++
7,378,945 UART: [ldev] CDI.KEYID = 6
7,379,832 UART: [ldev] SUBJECT.KEYID = 5
7,381,109 UART: [ldev] AUTHORITY.KEYID = 7
7,382,348 UART: [ldev] FE.KEYID = 1
7,424,712 UART: [ldev] Erasing FE.KEYID = 1
10,759,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,036 UART: [ldev] --
13,137,610 UART: [fwproc] Waiting for Commands...
13,140,904 UART: [fwproc] Received command 0x46574c44
13,143,353 UART: [fwproc] Received Image of size 113760 bytes
17,184,417 UART: ROM Fatal Error: 0x000B0016
17,187,839 >>> mbox cmd response: failed
17,188,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,188,662 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
6,377,939 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,146,052 >>> mbox cmd response: failed
17,146,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,147,271 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,618 UART:
192,973 UART: Running Caliptra ROM ...
194,137 UART:
603,725 UART: [state] CFI Enabled
617,591 UART: [state] LifecycleState = Unprovisioned
619,515 UART: [state] DebugLocked = No
620,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,777 UART: [kat] SHA2-256
795,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,062 UART: [kat] ++
806,605 UART: [kat] sha1
817,652 UART: [kat] SHA2-256
820,340 UART: [kat] SHA2-384
825,347 UART: [kat] SHA2-512-ACC
827,685 UART: [kat] ECC-384
3,111,736 UART: [kat] HMAC-384Kdf
3,124,751 UART: [kat] LMS
4,314,878 UART: [kat] --
4,317,876 UART: [cold-reset] ++
4,320,090 UART: [fht] Storing FHT @ 0x50003400
4,331,632 UART: [idev] ++
4,332,273 UART: [idev] CDI.KEYID = 6
4,333,184 UART: [idev] SUBJECT.KEYID = 7
4,334,399 UART: [idev] UDS.KEYID = 0
6,910,174 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
7,054,113 UART: [idev] Erasing UDS.KEYID = 0
7,626,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,424 UART: [idev] --
7,652,287 UART: [ldev] ++
7,652,867 UART: [ldev] CDI.KEYID = 6
7,653,849 UART: [ldev] SUBJECT.KEYID = 5
7,655,071 UART: [ldev] AUTHORITY.KEYID = 7
7,656,315 UART: [ldev] FE.KEYID = 1
7,666,343 UART: [ldev] Erasing FE.KEYID = 1
10,951,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,832 UART: [ldev] --
13,311,120 UART: [fwproc] Waiting for Commands...
13,314,136 UART: [fwproc] Received command 0x46574c44
13,316,328 UART: [fwproc] Received Image of size 113760 bytes
17,360,901 UART: ROM Fatal Error: 0x000B0016
17,364,304 >>> mbox cmd response: failed
17,364,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,365,105 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
6,700,447 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,324,624 >>> mbox cmd response: failed
17,325,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,325,793 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,575 UART:
192,931 UART: Running Caliptra ROM ...
194,120 UART:
194,273 UART: [state] CFI Enabled
262,232 UART: [state] LifecycleState = Unprovisioned
264,167 UART: [state] DebugLocked = No
265,556 UART: [state] WD Timer not started. Device not locked for debugging
269,695 UART: [kat] SHA2-256
448,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,394 UART: [kat] ++
460,924 UART: [kat] sha1
472,585 UART: [kat] SHA2-256
475,629 UART: [kat] SHA2-384
481,177 UART: [kat] SHA2-512-ACC
484,130 UART: [kat] ECC-384
2,946,150 UART: [kat] HMAC-384Kdf
2,968,758 UART: [kat] LMS
3,498,204 UART: [kat] --
3,503,815 UART: [cold-reset] ++
3,505,215 UART: [fht] FHT @ 0x50003400
3,517,438 UART: [idev] ++
3,518,038 UART: [idev] CDI.KEYID = 6
3,518,964 UART: [idev] SUBJECT.KEYID = 7
3,520,129 UART: [idev] UDS.KEYID = 0
6,051,853 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,196,258 UART: [idev] Erasing UDS.KEYID = 0
6,197,742 UART: [idev] Sha1 KeyId Algorithm
6,198,910 UART: [idev] --
6,199,395 UART: [ldev] ++
6,199,874 UART: [ldev] CDI.KEYID = 6
6,200,825 UART: [ldev] SUBJECT.KEYID = 5
6,201,892 UART: [ldev] AUTHORITY.KEYID = 7
6,203,038 UART: [ldev] FE.KEYID = 1
6,203,882 UART: [ldev] Erasing FE.KEYID = 1
8,599,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,187 UART: [ldev] --
10,391,749 UART: [fwproc] Wait for Commands...
10,393,519 UART: [fwproc] Recv command 0x46574c44
10,395,744 UART: [fwproc] Recv'd Img size: 114084 bytes
13,787,502 UART: ROM Fatal Error: 0x000B0016
13,790,645 >>> mbox cmd response: failed
13,791,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,791,449 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,321 writing to cptra_bootfsm_go
5,927,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,616,412 >>> mbox cmd response: failed
13,617,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,357 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,589 UART:
192,950 UART: Running Caliptra ROM ...
194,160 UART:
603,797 UART: [state] CFI Enabled
617,742 UART: [state] LifecycleState = Unprovisioned
619,601 UART: [state] DebugLocked = No
622,106 UART: [state] WD Timer not started. Device not locked for debugging
626,240 UART: [kat] SHA2-256
805,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,953 UART: [kat] ++
817,481 UART: [kat] sha1
827,393 UART: [kat] SHA2-256
830,446 UART: [kat] SHA2-384
837,553 UART: [kat] SHA2-512-ACC
840,521 UART: [kat] ECC-384
3,281,409 UART: [kat] HMAC-384Kdf
3,295,339 UART: [kat] LMS
3,824,832 UART: [kat] --
3,828,533 UART: [cold-reset] ++
3,831,006 UART: [fht] FHT @ 0x50003400
3,841,024 UART: [idev] ++
3,841,592 UART: [idev] CDI.KEYID = 6
3,842,559 UART: [idev] SUBJECT.KEYID = 7
3,843,716 UART: [idev] UDS.KEYID = 0
6,380,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,524,744 UART: [idev] Erasing UDS.KEYID = 0
6,526,193 UART: [idev] Sha1 KeyId Algorithm
6,527,354 UART: [idev] --
6,527,838 UART: [ldev] ++
6,528,314 UART: [ldev] CDI.KEYID = 6
6,529,279 UART: [ldev] SUBJECT.KEYID = 5
6,530,305 UART: [ldev] AUTHORITY.KEYID = 7
6,531,393 UART: [ldev] FE.KEYID = 1
6,532,332 UART: [ldev] Erasing FE.KEYID = 1
8,832,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,007 UART: [ldev] --
10,623,634 UART: [fwproc] Wait for Commands...
10,625,675 UART: [fwproc] Recv command 0x46574c44
10,627,720 UART: [fwproc] Recv'd Img size: 114084 bytes
14,018,347 UART: ROM Fatal Error: 0x000B0016
14,021,476 >>> mbox cmd response: failed
14,021,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,022,118 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,895 writing to cptra_bootfsm_go
6,230,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,818,520 >>> mbox cmd response: failed
13,819,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,464 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,218 UART:
192,577 UART: Running Caliptra ROM ...
193,736 UART:
193,913 UART: [state] CFI Enabled
264,662 UART: [state] LifecycleState = Unprovisioned
267,110 UART: [state] DebugLocked = No
268,921 UART: [state] WD Timer not started. Device not locked for debugging
273,824 UART: [kat] SHA2-256
463,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,445 UART: [kat] ++
474,923 UART: [kat] sha1
486,019 UART: [kat] SHA2-256
489,028 UART: [kat] SHA2-384
495,023 UART: [kat] SHA2-512-ACC
497,644 UART: [kat] ECC-384
2,945,441 UART: [kat] HMAC-384Kdf
2,970,316 UART: [kat] LMS
3,502,080 UART: [kat] --
3,507,486 UART: [cold-reset] ++
3,508,684 UART: [fht] FHT @ 0x50003400
3,518,808 UART: [idev] ++
3,519,521 UART: [idev] CDI.KEYID = 6
3,520,549 UART: [idev] SUBJECT.KEYID = 7
3,521,656 UART: [idev] UDS.KEYID = 0
6,111,269 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,255,585 UART: [idev] Erasing UDS.KEYID = 0
6,257,035 UART: [idev] Sha1 KeyId Algorithm
6,258,285 UART: [idev] --
6,258,787 UART: [ldev] ++
6,259,362 UART: [ldev] CDI.KEYID = 6
6,260,248 UART: [ldev] SUBJECT.KEYID = 5
6,261,288 UART: [ldev] AUTHORITY.KEYID = 7
6,262,467 UART: [ldev] FE.KEYID = 1
6,263,312 UART: [ldev] Erasing FE.KEYID = 1
8,604,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,132 UART: [ldev] --
10,415,622 UART: [fwproc] Wait for Commands...
10,417,181 UART: [fwproc] Recv command 0x46574c44
10,419,501 UART: [fwproc] Recv'd Img size: 114084 bytes
13,855,698 UART: ROM Fatal Error: 0x000B0016
13,859,332 >>> mbox cmd response: failed
13,859,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,860,136 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
6,013,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,513 >>> mbox cmd response: failed
14,256,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,692 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,521 UART:
192,868 UART: Running Caliptra ROM ...
193,945 UART:
603,807 UART: [state] CFI Enabled
617,700 UART: [state] LifecycleState = Unprovisioned
619,755 UART: [state] DebugLocked = No
621,516 UART: [state] WD Timer not started. Device not locked for debugging
625,272 UART: [kat] SHA2-256
814,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,711 UART: [kat] ++
826,215 UART: [kat] sha1
837,495 UART: [kat] SHA2-256
840,526 UART: [kat] SHA2-384
846,587 UART: [kat] SHA2-512-ACC
849,173 UART: [kat] ECC-384
3,290,620 UART: [kat] HMAC-384Kdf
3,303,339 UART: [kat] LMS
3,835,194 UART: [kat] --
3,841,156 UART: [cold-reset] ++
3,842,067 UART: [fht] FHT @ 0x50003400
3,853,972 UART: [idev] ++
3,854,657 UART: [idev] CDI.KEYID = 6
3,855,675 UART: [idev] SUBJECT.KEYID = 7
3,856,839 UART: [idev] UDS.KEYID = 0
6,437,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,581,486 UART: [idev] Erasing UDS.KEYID = 0
6,582,938 UART: [idev] Sha1 KeyId Algorithm
6,584,179 UART: [idev] --
6,584,672 UART: [ldev] ++
6,585,156 UART: [ldev] CDI.KEYID = 6
6,586,117 UART: [ldev] SUBJECT.KEYID = 5
6,587,229 UART: [ldev] AUTHORITY.KEYID = 7
6,588,406 UART: [ldev] FE.KEYID = 1
6,589,431 UART: [ldev] Erasing FE.KEYID = 1
8,860,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,113 UART: [ldev] --
10,651,216 UART: [fwproc] Wait for Commands...
10,654,446 UART: [fwproc] Recv command 0x46574c44
10,656,703 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,180 UART: ROM Fatal Error: 0x000B0016
14,096,852 >>> mbox cmd response: failed
14,097,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,097,638 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
6,329,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,482,408 >>> mbox cmd response: failed
14,483,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,483,437 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,805 UART: [kat] SHA2-256
881,736 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,851 UART: [kat] ++
886,003 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,760 UART: [kat] SHA2-512-ACC
896,661 UART: [kat] ECC-384
902,216 UART: [kat] HMAC-384Kdf
906,668 UART: [kat] LMS
1,474,864 UART: [kat] --
1,475,871 UART: [cold-reset] ++
1,476,415 UART: [fht] Storing FHT @ 0x50003400
1,479,252 UART: [idev] ++
1,479,420 UART: [idev] CDI.KEYID = 6
1,479,780 UART: [idev] SUBJECT.KEYID = 7
1,480,204 UART: [idev] UDS.KEYID = 0
1,480,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,066 UART: [idev] Erasing UDS.KEYID = 0
1,504,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,188 UART: [idev] --
1,514,019 UART: [ldev] ++
1,514,187 UART: [ldev] CDI.KEYID = 6
1,514,550 UART: [ldev] SUBJECT.KEYID = 5
1,514,976 UART: [ldev] AUTHORITY.KEYID = 7
1,515,439 UART: [ldev] FE.KEYID = 1
1,520,297 UART: [ldev] Erasing FE.KEYID = 1
1,545,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,842 UART: [ldev] --
1,585,115 UART: [fwproc] Waiting for Commands...
1,585,974 UART: [fwproc] Received command 0x46574c44
1,586,765 UART: [fwproc] Received Image of size 114084 bytes
2,880,650 UART: ROM Fatal Error: 0x000B0016
2,881,807 >>> mbox cmd response: failed
2,881,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,881,813 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,953 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,735,349 >>> mbox cmd response: failed
2,735,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,355 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,950 UART: [kat] SHA2-256
881,881 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,996 UART: [kat] ++
886,148 UART: [kat] sha1
890,464 UART: [kat] SHA2-256
892,402 UART: [kat] SHA2-384
895,123 UART: [kat] SHA2-512-ACC
897,024 UART: [kat] ECC-384
902,479 UART: [kat] HMAC-384Kdf
907,097 UART: [kat] LMS
1,475,293 UART: [kat] --
1,476,430 UART: [cold-reset] ++
1,477,002 UART: [fht] Storing FHT @ 0x50003400
1,479,793 UART: [idev] ++
1,479,961 UART: [idev] CDI.KEYID = 6
1,480,321 UART: [idev] SUBJECT.KEYID = 7
1,480,745 UART: [idev] UDS.KEYID = 0
1,481,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,855 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,387 UART: [idev] --
1,515,540 UART: [ldev] ++
1,515,708 UART: [ldev] CDI.KEYID = 6
1,516,071 UART: [ldev] SUBJECT.KEYID = 5
1,516,497 UART: [ldev] AUTHORITY.KEYID = 7
1,516,960 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,539 UART: [ldev] --
1,586,820 UART: [fwproc] Waiting for Commands...
1,587,435 UART: [fwproc] Received command 0x46574c44
1,588,226 UART: [fwproc] Received Image of size 114084 bytes
2,881,984 UART: ROM Fatal Error: 0x000B0016
2,883,141 >>> mbox cmd response: failed
2,883,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,147 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,736,168 >>> mbox cmd response: failed
2,736,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,174 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
893,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,139 UART: [kat] ++
897,291 UART: [kat] sha1
901,403 UART: [kat] SHA2-256
903,343 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
917,998 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,102 UART: [idev] ++
1,175,270 UART: [idev] CDI.KEYID = 6
1,175,630 UART: [idev] SUBJECT.KEYID = 7
1,176,054 UART: [idev] UDS.KEYID = 0
1,176,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,342 UART: [idev] Erasing UDS.KEYID = 0
1,201,563 UART: [idev] Sha1 KeyId Algorithm
1,210,143 UART: [idev] --
1,211,065 UART: [ldev] ++
1,211,233 UART: [ldev] CDI.KEYID = 6
1,211,596 UART: [ldev] SUBJECT.KEYID = 5
1,212,022 UART: [ldev] AUTHORITY.KEYID = 7
1,212,485 UART: [ldev] FE.KEYID = 1
1,217,967 UART: [ldev] Erasing FE.KEYID = 1
1,244,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,489 UART: [ldev] --
1,283,896 UART: [fwproc] Wait for Commands...
1,284,558 UART: [fwproc] Recv command 0x46574c44
1,285,286 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,308 UART: ROM Fatal Error: 0x000B0016
2,580,465 >>> mbox cmd response: failed
2,580,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,471 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,434,686 >>> mbox cmd response: failed
2,434,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,692 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,667 UART: [kat] SHA2-512-ACC
908,568 UART: [kat] ECC-384
918,415 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,171,914 UART: [cold-reset] ++
1,172,266 UART: [fht] FHT @ 0x50003400
1,174,763 UART: [idev] ++
1,174,931 UART: [idev] CDI.KEYID = 6
1,175,291 UART: [idev] SUBJECT.KEYID = 7
1,175,715 UART: [idev] UDS.KEYID = 0
1,176,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,555 UART: [idev] Erasing UDS.KEYID = 0
1,200,558 UART: [idev] Sha1 KeyId Algorithm
1,208,926 UART: [idev] --
1,209,964 UART: [ldev] ++
1,210,132 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,921 UART: [ldev] AUTHORITY.KEYID = 7
1,211,384 UART: [ldev] FE.KEYID = 1
1,216,672 UART: [ldev] Erasing FE.KEYID = 1
1,243,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,204 UART: [ldev] --
1,283,651 UART: [fwproc] Wait for Commands...
1,284,421 UART: [fwproc] Recv command 0x46574c44
1,285,149 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,295 UART: ROM Fatal Error: 0x000B0016
2,579,452 >>> mbox cmd response: failed
2,579,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,458 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,432,693 >>> mbox cmd response: failed
2,432,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,699 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,591 UART: [cold-reset] ++
1,170,081 UART: [fht] FHT @ 0x50003400
1,172,781 UART: [idev] ++
1,172,949 UART: [idev] CDI.KEYID = 6
1,173,310 UART: [idev] SUBJECT.KEYID = 7
1,173,735 UART: [idev] UDS.KEYID = 0
1,174,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,783 UART: [idev] Erasing UDS.KEYID = 0
1,198,887 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,642 UART: [ldev] ++
1,208,810 UART: [ldev] CDI.KEYID = 6
1,209,174 UART: [ldev] SUBJECT.KEYID = 5
1,209,601 UART: [ldev] AUTHORITY.KEYID = 7
1,210,064 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,240,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,590 UART: [ldev] --
1,280,030 UART: [fwproc] Wait for Commands...
1,280,807 UART: [fwproc] Recv command 0x46574c44
1,281,540 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,248 UART: ROM Fatal Error: 0x000B0016
2,576,405 >>> mbox cmd response: failed
2,576,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,576,411 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,856 >>> mbox cmd response: failed
2,428,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,862 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,033 UART: [ldev] ++
1,210,201 UART: [ldev] CDI.KEYID = 6
1,210,565 UART: [ldev] SUBJECT.KEYID = 5
1,210,992 UART: [ldev] AUTHORITY.KEYID = 7
1,211,455 UART: [ldev] FE.KEYID = 1
1,216,647 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,109 UART: [fwproc] Wait for Commands...
1,282,866 UART: [fwproc] Recv command 0x46574c44
1,283,599 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,051 UART: ROM Fatal Error: 0x000B0016
2,578,208 >>> mbox cmd response: failed
2,578,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,214 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,875 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,351 >>> mbox cmd response: failed
2,429,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,357 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,254 UART:
192,621 UART: Running Caliptra ROM ...
193,758 UART:
193,922 UART: [state] CFI Enabled
265,645 UART: [state] LifecycleState = Production
267,522 UART: [state] DebugLocked = No
270,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,880 UART: [kat] SHA2-256
445,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,046 UART: [kat] ++
456,642 UART: [kat] sha1
468,443 UART: [kat] SHA2-256
471,123 UART: [kat] SHA2-384
477,479 UART: [kat] SHA2-512-ACC
479,826 UART: [kat] ECC-384
2,768,319 UART: [kat] HMAC-384Kdf
2,798,864 UART: [kat] LMS
3,989,176 UART: [kat] --
3,993,615 UART: [cold-reset] ++
3,994,917 UART: [fht] Storing FHT @ 0x50003400
4,007,101 UART: [idev] ++
4,007,679 UART: [idev] CDI.KEYID = 6
4,008,703 UART: [idev] SUBJECT.KEYID = 7
4,009,865 UART: [idev] UDS.KEYID = 0
4,012,605 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,311 UART: [idev] Erasing UDS.KEYID = 0
7,346,153 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,284 UART: [idev] --
7,372,200 UART: [ldev] ++
7,372,771 UART: [ldev] CDI.KEYID = 6
7,373,707 UART: [ldev] SUBJECT.KEYID = 5
7,374,976 UART: [ldev] AUTHORITY.KEYID = 7
7,376,212 UART: [ldev] FE.KEYID = 1
7,422,848 UART: [ldev] Erasing FE.KEYID = 1
10,759,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,196 UART: [ldev] --
13,137,471 UART: [fwproc] Waiting for Commands...
13,139,833 UART: [fwproc] Received command 0x46574c44
13,142,027 UART: [fwproc] Received Image of size 113760 bytes
13,241,806 UART: ROM Fatal Error: 0x000B0007
13,245,329 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,789,366 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,944,088 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,291 UART:
192,644 UART: Running Caliptra ROM ...
193,811 UART:
603,628 UART: [state] CFI Enabled
616,922 UART: [state] LifecycleState = Production
618,790 UART: [state] DebugLocked = No
620,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,587 UART: [kat] SHA2-256
795,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,859 UART: [kat] ++
806,388 UART: [kat] sha1
817,483 UART: [kat] SHA2-256
820,225 UART: [kat] SHA2-384
824,797 UART: [kat] SHA2-512-ACC
827,143 UART: [kat] ECC-384
3,110,833 UART: [kat] HMAC-384Kdf
3,122,855 UART: [kat] LMS
4,312,963 UART: [kat] --
4,318,181 UART: [cold-reset] ++
4,319,095 UART: [fht] Storing FHT @ 0x50003400
4,331,449 UART: [idev] ++
4,332,023 UART: [idev] CDI.KEYID = 6
4,332,991 UART: [idev] SUBJECT.KEYID = 7
4,334,209 UART: [idev] UDS.KEYID = 0
4,336,941 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,004 UART: [idev] Erasing UDS.KEYID = 0
7,625,080 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,489 UART: [idev] --
7,650,890 UART: [ldev] ++
7,651,938 UART: [ldev] CDI.KEYID = 6
7,652,966 UART: [ldev] SUBJECT.KEYID = 5
7,654,093 UART: [ldev] AUTHORITY.KEYID = 7
7,655,275 UART: [ldev] FE.KEYID = 1
7,667,060 UART: [ldev] Erasing FE.KEYID = 1
10,957,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,462 UART: [ldev] --
13,316,430 UART: [fwproc] Waiting for Commands...
13,318,686 UART: [fwproc] Received command 0x46574c44
13,320,872 UART: [fwproc] Received Image of size 113760 bytes
13,418,432 UART: ROM Fatal Error: 0x000B0007
13,421,960 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,130,963 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,165,039 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,089 UART:
192,449 UART: Running Caliptra ROM ...
193,546 UART:
193,688 UART: [state] CFI Enabled
264,491 UART: [state] LifecycleState = Production
266,236 UART: [state] DebugLocked = No
267,674 UART: [state] WD Timer not started. Device not locked for debugging
272,203 UART: [kat] SHA2-256
451,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,911 UART: [kat] ++
463,443 UART: [kat] sha1
475,517 UART: [kat] SHA2-256
478,582 UART: [kat] SHA2-384
484,125 UART: [kat] SHA2-512-ACC
487,108 UART: [kat] ECC-384
2,946,880 UART: [kat] HMAC-384Kdf
2,971,644 UART: [kat] LMS
3,501,109 UART: [kat] --
3,504,598 UART: [cold-reset] ++
3,506,810 UART: [fht] FHT @ 0x50003400
3,518,175 UART: [idev] ++
3,518,740 UART: [idev] CDI.KEYID = 6
3,519,656 UART: [idev] SUBJECT.KEYID = 7
3,520,867 UART: [idev] UDS.KEYID = 0
3,523,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,314 UART: [idev] Erasing UDS.KEYID = 0
6,027,839 UART: [idev] Sha1 KeyId Algorithm
6,049,679 UART: [idev] --
6,054,655 UART: [ldev] ++
6,055,230 UART: [ldev] CDI.KEYID = 6
6,056,145 UART: [ldev] SUBJECT.KEYID = 5
6,057,302 UART: [ldev] AUTHORITY.KEYID = 7
6,058,538 UART: [ldev] FE.KEYID = 1
6,099,984 UART: [ldev] Erasing FE.KEYID = 1
8,603,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,468 UART: [ldev] --
10,414,465 UART: [fwproc] Wait for Commands...
10,417,436 UART: [fwproc] Recv command 0x46574c44
10,419,533 UART: [fwproc] Recv'd Img size: 114084 bytes
10,516,996 UART: ROM Fatal Error: 0x000B0007
10,520,151 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,382,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,258,481 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,556 UART:
192,925 UART: Running Caliptra ROM ...
194,079 UART:
603,596 UART: [state] CFI Enabled
618,297 UART: [state] LifecycleState = Production
620,054 UART: [state] DebugLocked = No
622,657 UART: [state] WD Timer not started. Device not locked for debugging
626,379 UART: [kat] SHA2-256
805,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,032 UART: [kat] ++
817,480 UART: [kat] sha1
829,056 UART: [kat] SHA2-256
832,061 UART: [kat] SHA2-384
838,310 UART: [kat] SHA2-512-ACC
841,296 UART: [kat] ECC-384
3,278,687 UART: [kat] HMAC-384Kdf
3,290,139 UART: [kat] LMS
3,819,620 UART: [kat] --
3,823,376 UART: [cold-reset] ++
3,824,238 UART: [fht] FHT @ 0x50003400
3,835,390 UART: [idev] ++
3,835,968 UART: [idev] CDI.KEYID = 6
3,836,853 UART: [idev] SUBJECT.KEYID = 7
3,838,068 UART: [idev] UDS.KEYID = 0
3,841,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,555 UART: [idev] Erasing UDS.KEYID = 0
6,313,960 UART: [idev] Sha1 KeyId Algorithm
6,338,227 UART: [idev] --
6,342,272 UART: [ldev] ++
6,342,836 UART: [ldev] CDI.KEYID = 6
6,343,719 UART: [ldev] SUBJECT.KEYID = 5
6,344,933 UART: [ldev] AUTHORITY.KEYID = 7
6,346,162 UART: [ldev] FE.KEYID = 1
6,357,596 UART: [ldev] Erasing FE.KEYID = 1
8,830,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,314 UART: [ldev] --
10,624,262 UART: [fwproc] Wait for Commands...
10,626,311 UART: [fwproc] Recv command 0x46574c44
10,628,404 UART: [fwproc] Recv'd Img size: 114084 bytes
10,730,542 UART: ROM Fatal Error: 0x000B0007
10,733,617 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,702,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,504,804 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,163 UART:
192,538 UART: Running Caliptra ROM ...
193,677 UART:
193,820 UART: [state] CFI Enabled
266,998 UART: [state] LifecycleState = Production
269,194 UART: [state] DebugLocked = No
271,518 UART: [state] WD Timer not started. Device not locked for debugging
275,255 UART: [kat] SHA2-256
465,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,845 UART: [kat] ++
476,292 UART: [kat] sha1
488,650 UART: [kat] SHA2-256
491,668 UART: [kat] SHA2-384
498,789 UART: [kat] SHA2-512-ACC
501,346 UART: [kat] ECC-384
2,947,747 UART: [kat] HMAC-384Kdf
2,972,563 UART: [kat] LMS
3,504,368 UART: [kat] --
3,509,719 UART: [cold-reset] ++
3,511,437 UART: [fht] FHT @ 0x50003400
3,524,412 UART: [idev] ++
3,525,088 UART: [idev] CDI.KEYID = 6
3,526,031 UART: [idev] SUBJECT.KEYID = 7
3,527,299 UART: [idev] UDS.KEYID = 0
3,530,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,673,885 UART: [idev] Erasing UDS.KEYID = 0
6,048,775 UART: [idev] Sha1 KeyId Algorithm
6,071,705 UART: [idev] --
6,077,107 UART: [ldev] ++
6,077,792 UART: [ldev] CDI.KEYID = 6
6,078,677 UART: [ldev] SUBJECT.KEYID = 5
6,079,782 UART: [ldev] AUTHORITY.KEYID = 7
6,081,069 UART: [ldev] FE.KEYID = 1
6,122,158 UART: [ldev] Erasing FE.KEYID = 1
8,630,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,702 UART: [ldev] --
10,435,801 UART: [fwproc] Wait for Commands...
10,438,330 UART: [fwproc] Recv command 0x46574c44
10,440,646 UART: [fwproc] Recv'd Img size: 114084 bytes
10,573,943 UART: ROM Fatal Error: 0x000B0007
10,577,609 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,437,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,356,595 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,435 UART:
192,804 UART: Running Caliptra ROM ...
193,932 UART:
603,584 UART: [state] CFI Enabled
618,183 UART: [state] LifecycleState = Production
620,397 UART: [state] DebugLocked = No
621,939 UART: [state] WD Timer not started. Device not locked for debugging
627,074 UART: [kat] SHA2-256
816,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,736 UART: [kat] ++
828,327 UART: [kat] sha1
840,464 UART: [kat] SHA2-256
843,524 UART: [kat] SHA2-384
848,256 UART: [kat] SHA2-512-ACC
850,862 UART: [kat] ECC-384
3,293,797 UART: [kat] HMAC-384Kdf
3,305,707 UART: [kat] LMS
3,837,536 UART: [kat] --
3,842,718 UART: [cold-reset] ++
3,845,187 UART: [fht] FHT @ 0x50003400
3,855,516 UART: [idev] ++
3,856,228 UART: [idev] CDI.KEYID = 6
3,857,142 UART: [idev] SUBJECT.KEYID = 7
3,858,356 UART: [idev] UDS.KEYID = 0
3,861,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,390 UART: [idev] Erasing UDS.KEYID = 0
6,336,077 UART: [idev] Sha1 KeyId Algorithm
6,358,089 UART: [idev] --
6,363,657 UART: [ldev] ++
6,364,340 UART: [ldev] CDI.KEYID = 6
6,365,250 UART: [ldev] SUBJECT.KEYID = 5
6,366,410 UART: [ldev] AUTHORITY.KEYID = 7
6,367,644 UART: [ldev] FE.KEYID = 1
6,378,562 UART: [ldev] Erasing FE.KEYID = 1
8,856,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,532 UART: [ldev] --
10,645,690 UART: [fwproc] Wait for Commands...
10,647,804 UART: [fwproc] Recv command 0x46574c44
10,650,164 UART: [fwproc] Recv'd Img size: 114084 bytes
10,778,754 UART: ROM Fatal Error: 0x000B0007
10,782,432 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,757,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,584,859 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Production
85,403 UART: [state] DebugLocked = No
85,905 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,495 UART: [kat] SHA2-256
881,426 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,541 UART: [kat] ++
885,693 UART: [kat] sha1
890,097 UART: [kat] SHA2-256
892,035 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,304 UART: [kat] HMAC-384Kdf
907,036 UART: [kat] LMS
1,475,232 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,562 UART: [idev] Erasing UDS.KEYID = 0
1,505,250 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,028 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,895 UART: [ldev] Erasing FE.KEYID = 1
1,547,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,050 UART: [ldev] --
1,586,485 UART: [fwproc] Waiting for Commands...
1,587,344 UART: [fwproc] Received command 0x46574c44
1,588,135 UART: [fwproc] Received Image of size 114084 bytes
1,637,724 UART: ROM Fatal Error: 0x000B0007
1,638,881 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,044 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Production
85,680 UART: [state] DebugLocked = No
86,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,826 UART: [kat] SHA2-256
881,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,872 UART: [kat] ++
886,024 UART: [kat] sha1
890,190 UART: [kat] SHA2-256
892,128 UART: [kat] SHA2-384
894,749 UART: [kat] SHA2-512-ACC
896,650 UART: [kat] ECC-384
902,295 UART: [kat] HMAC-384Kdf
906,785 UART: [kat] LMS
1,474,981 UART: [kat] --
1,475,866 UART: [cold-reset] ++
1,476,214 UART: [fht] Storing FHT @ 0x50003400
1,478,865 UART: [idev] ++
1,479,033 UART: [idev] CDI.KEYID = 6
1,479,393 UART: [idev] SUBJECT.KEYID = 7
1,479,817 UART: [idev] UDS.KEYID = 0
1,480,162 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,767 UART: [idev] Erasing UDS.KEYID = 0
1,504,623 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,363 UART: [idev] --
1,514,516 UART: [ldev] ++
1,514,684 UART: [ldev] CDI.KEYID = 6
1,515,047 UART: [ldev] SUBJECT.KEYID = 5
1,515,473 UART: [ldev] AUTHORITY.KEYID = 7
1,515,936 UART: [ldev] FE.KEYID = 1
1,521,174 UART: [ldev] Erasing FE.KEYID = 1
1,546,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,539 UART: [ldev] --
1,585,838 UART: [fwproc] Waiting for Commands...
1,586,487 UART: [fwproc] Received command 0x46574c44
1,587,278 UART: [fwproc] Received Image of size 114084 bytes
1,636,725 UART: ROM Fatal Error: 0x000B0007
1,637,882 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,491,707 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Production
85,577 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
893,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,395 UART: [kat] ++
897,547 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,290 UART: [idev] ++
1,175,458 UART: [idev] CDI.KEYID = 6
1,175,818 UART: [idev] SUBJECT.KEYID = 7
1,176,242 UART: [idev] UDS.KEYID = 0
1,176,587 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,975 UART: [idev] Sha1 KeyId Algorithm
1,209,425 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,014 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,457 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,496 UART: [fwproc] Recv command 0x46574c44
1,284,224 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,841 UART: ROM Fatal Error: 0x000B0007
1,334,998 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,189,613 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Production
85,974 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,423 UART: [kat] SHA2-512-ACC
908,324 UART: [kat] ECC-384
918,027 UART: [kat] HMAC-384Kdf
922,501 UART: [kat] LMS
1,170,829 UART: [kat] --
1,171,856 UART: [cold-reset] ++
1,172,386 UART: [fht] FHT @ 0x50003400
1,174,983 UART: [idev] ++
1,175,151 UART: [idev] CDI.KEYID = 6
1,175,511 UART: [idev] SUBJECT.KEYID = 7
1,175,935 UART: [idev] UDS.KEYID = 0
1,176,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,939 UART: [idev] Erasing UDS.KEYID = 0
1,200,696 UART: [idev] Sha1 KeyId Algorithm
1,209,120 UART: [idev] --
1,209,952 UART: [ldev] ++
1,210,120 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,909 UART: [ldev] AUTHORITY.KEYID = 7
1,211,372 UART: [ldev] FE.KEYID = 1
1,216,832 UART: [ldev] Erasing FE.KEYID = 1
1,243,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,978 UART: [ldev] --
1,282,409 UART: [fwproc] Wait for Commands...
1,283,121 UART: [fwproc] Recv command 0x46574c44
1,283,849 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,154 UART: ROM Fatal Error: 0x000B0007
1,334,311 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,734 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Production
85,967 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
915,956 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,551 UART: [idev] ++
1,172,719 UART: [idev] CDI.KEYID = 6
1,173,080 UART: [idev] SUBJECT.KEYID = 7
1,173,505 UART: [idev] UDS.KEYID = 0
1,173,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,359 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,215,030 UART: [ldev] Erasing FE.KEYID = 1
1,240,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,518 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,965 UART: ROM Fatal Error: 0x000B0007
1,332,122 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,271 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Production
85,776 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,051 UART: [kat] SHA2-512-ACC
905,952 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,379 UART: [kat] LMS
1,168,691 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,686 UART: [idev] ++
1,172,854 UART: [idev] CDI.KEYID = 6
1,173,215 UART: [idev] SUBJECT.KEYID = 7
1,173,640 UART: [idev] UDS.KEYID = 0
1,173,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,506 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,526 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,109 UART: [ldev] SUBJECT.KEYID = 5
1,209,536 UART: [ldev] AUTHORITY.KEYID = 7
1,209,999 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,830 UART: ROM Fatal Error: 0x000B0007
1,332,987 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,486 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
192,037 UART:
192,400 UART: Running Caliptra ROM ...
193,499 UART:
193,658 UART: [state] CFI Enabled
259,495 UART: [state] LifecycleState = Production
261,575 UART: [state] DebugLocked = No
264,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,367 UART: [kat] SHA2-256
439,067 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,585 UART: [kat] ++
450,039 UART: [kat] sha1
460,273 UART: [kat] SHA2-256
462,962 UART: [kat] SHA2-384
468,887 UART: [kat] SHA2-512-ACC
471,279 UART: [kat] ECC-384
2,768,590 UART: [kat] HMAC-384Kdf
2,781,054 UART: [kat] LMS
3,971,355 UART: [kat] --
3,976,771 UART: [cold-reset] ++
3,977,751 UART: [fht] Storing FHT @ 0x50003400
3,988,805 UART: [idev] ++
3,989,370 UART: [idev] CDI.KEYID = 6
3,990,386 UART: [idev] SUBJECT.KEYID = 7
3,991,550 UART: [idev] UDS.KEYID = 0
3,994,358 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,137,656 UART: [idev] Erasing UDS.KEYID = 0
7,328,952 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,484 UART: [idev] --
7,355,965 UART: [ldev] ++
7,356,534 UART: [ldev] CDI.KEYID = 6
7,357,552 UART: [ldev] SUBJECT.KEYID = 5
7,358,710 UART: [ldev] AUTHORITY.KEYID = 7
7,359,939 UART: [ldev] FE.KEYID = 1
7,404,345 UART: [ldev] Erasing FE.KEYID = 1
10,737,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,988 UART: [ldev] --
13,118,899 UART: [fwproc] Waiting for Commands...
13,121,157 UART: [fwproc] Received command 0x46574c44
13,123,345 UART: [fwproc] Received Image of size 113760 bytes
13,223,631 UART: ROM Fatal Error: 0x000B0007
13,227,164 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,781,271 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,940,497 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,544 UART:
192,933 UART: Running Caliptra ROM ...
194,069 UART:
603,849 UART: [state] CFI Enabled
617,172 UART: [state] LifecycleState = Production
618,986 UART: [state] DebugLocked = No
620,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,257 UART: [kat] SHA2-256
795,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,537 UART: [kat] ++
807,014 UART: [kat] sha1
816,764 UART: [kat] SHA2-256
819,512 UART: [kat] SHA2-384
825,818 UART: [kat] SHA2-512-ACC
828,155 UART: [kat] ECC-384
3,110,312 UART: [kat] HMAC-384Kdf
3,123,032 UART: [kat] LMS
4,313,149 UART: [kat] --
4,319,212 UART: [cold-reset] ++
4,320,132 UART: [fht] Storing FHT @ 0x50003400
4,332,320 UART: [idev] ++
4,332,883 UART: [idev] CDI.KEYID = 6
4,333,901 UART: [idev] SUBJECT.KEYID = 7
4,335,059 UART: [idev] UDS.KEYID = 0
4,337,772 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,862 UART: [idev] Erasing UDS.KEYID = 0
7,626,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,621 UART: [idev] --
7,654,355 UART: [ldev] ++
7,654,936 UART: [ldev] CDI.KEYID = 6
7,655,877 UART: [ldev] SUBJECT.KEYID = 5
7,657,147 UART: [ldev] AUTHORITY.KEYID = 7
7,658,301 UART: [ldev] FE.KEYID = 1
7,671,639 UART: [ldev] Erasing FE.KEYID = 1
10,959,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,062 UART: [ldev] --
13,321,527 UART: [fwproc] Waiting for Commands...
13,324,649 UART: [fwproc] Received command 0x46574c44
13,326,835 UART: [fwproc] Received Image of size 113760 bytes
13,424,867 UART: ROM Fatal Error: 0x000B0007
13,428,387 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,126,937 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,162,332 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,229 UART:
192,591 UART: Running Caliptra ROM ...
193,773 UART:
193,924 UART: [state] CFI Enabled
263,946 UART: [state] LifecycleState = Production
265,698 UART: [state] DebugLocked = No
267,513 UART: [state] WD Timer not started. Device not locked for debugging
271,172 UART: [kat] SHA2-256
450,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,868 UART: [kat] ++
462,397 UART: [kat] sha1
473,343 UART: [kat] SHA2-256
476,379 UART: [kat] SHA2-384
482,361 UART: [kat] SHA2-512-ACC
485,291 UART: [kat] ECC-384
2,948,873 UART: [kat] HMAC-384Kdf
2,971,802 UART: [kat] LMS
3,501,269 UART: [kat] --
3,503,744 UART: [cold-reset] ++
3,505,865 UART: [fht] FHT @ 0x50003400
3,518,412 UART: [idev] ++
3,518,980 UART: [idev] CDI.KEYID = 6
3,519,886 UART: [idev] SUBJECT.KEYID = 7
3,521,100 UART: [idev] UDS.KEYID = 0
3,523,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,479 UART: [idev] Erasing UDS.KEYID = 0
6,025,108 UART: [idev] Sha1 KeyId Algorithm
6,048,141 UART: [idev] --
6,052,358 UART: [ldev] ++
6,052,930 UART: [ldev] CDI.KEYID = 6
6,053,847 UART: [ldev] SUBJECT.KEYID = 5
6,055,008 UART: [ldev] AUTHORITY.KEYID = 7
6,056,194 UART: [ldev] FE.KEYID = 1
6,101,498 UART: [ldev] Erasing FE.KEYID = 1
8,606,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,636 UART: [ldev] --
10,414,013 UART: [fwproc] Wait for Commands...
10,416,656 UART: [fwproc] Recv command 0x46574c44
10,418,753 UART: [fwproc] Recv'd Img size: 114084 bytes
10,515,217 UART: ROM Fatal Error: 0x000B0007
10,518,314 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,362,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,303,609 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
192,761 UART:
193,115 UART: Running Caliptra ROM ...
194,297 UART:
604,016 UART: [state] CFI Enabled
614,634 UART: [state] LifecycleState = Production
616,403 UART: [state] DebugLocked = No
619,345 UART: [state] WD Timer not started. Device not locked for debugging
623,602 UART: [kat] SHA2-256
802,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,330 UART: [kat] ++
814,779 UART: [kat] sha1
824,466 UART: [kat] SHA2-256
827,487 UART: [kat] SHA2-384
833,139 UART: [kat] SHA2-512-ACC
836,121 UART: [kat] ECC-384
3,277,822 UART: [kat] HMAC-384Kdf
3,290,966 UART: [kat] LMS
3,820,461 UART: [kat] --
3,824,179 UART: [cold-reset] ++
3,826,770 UART: [fht] FHT @ 0x50003400
3,837,406 UART: [idev] ++
3,837,976 UART: [idev] CDI.KEYID = 6
3,838,891 UART: [idev] SUBJECT.KEYID = 7
3,840,051 UART: [idev] UDS.KEYID = 0
3,842,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,162 UART: [idev] Erasing UDS.KEYID = 0
6,313,102 UART: [idev] Sha1 KeyId Algorithm
6,335,360 UART: [idev] --
6,339,355 UART: [ldev] ++
6,339,917 UART: [ldev] CDI.KEYID = 6
6,340,793 UART: [ldev] SUBJECT.KEYID = 5
6,342,058 UART: [ldev] AUTHORITY.KEYID = 7
6,343,295 UART: [ldev] FE.KEYID = 1
6,356,208 UART: [ldev] Erasing FE.KEYID = 1
8,828,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,634 UART: [ldev] --
10,619,514 UART: [fwproc] Wait for Commands...
10,621,550 UART: [fwproc] Recv command 0x46574c44
10,623,645 UART: [fwproc] Recv'd Img size: 114084 bytes
10,720,878 UART: ROM Fatal Error: 0x000B0007
10,724,027 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,697,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,505,239 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,207 UART:
192,559 UART: Running Caliptra ROM ...
193,747 UART:
193,898 UART: [state] CFI Enabled
265,476 UART: [state] LifecycleState = Production
267,728 UART: [state] DebugLocked = No
268,892 UART: [state] WD Timer not started. Device not locked for debugging
272,802 UART: [kat] SHA2-256
462,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,421 UART: [kat] ++
473,871 UART: [kat] sha1
485,615 UART: [kat] SHA2-256
488,626 UART: [kat] SHA2-384
495,144 UART: [kat] SHA2-512-ACC
497,708 UART: [kat] ECC-384
2,949,414 UART: [kat] HMAC-384Kdf
2,972,416 UART: [kat] LMS
3,504,192 UART: [kat] --
3,509,017 UART: [cold-reset] ++
3,511,601 UART: [fht] FHT @ 0x50003400
3,521,949 UART: [idev] ++
3,522,627 UART: [idev] CDI.KEYID = 6
3,523,608 UART: [idev] SUBJECT.KEYID = 7
3,524,848 UART: [idev] UDS.KEYID = 0
3,528,125 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,892 UART: [idev] Erasing UDS.KEYID = 0
6,026,568 UART: [idev] Sha1 KeyId Algorithm
6,050,146 UART: [idev] --
6,055,549 UART: [ldev] ++
6,056,233 UART: [ldev] CDI.KEYID = 6
6,057,158 UART: [ldev] SUBJECT.KEYID = 5
6,058,321 UART: [ldev] AUTHORITY.KEYID = 7
6,059,559 UART: [ldev] FE.KEYID = 1
6,100,307 UART: [ldev] Erasing FE.KEYID = 1
8,607,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,186 UART: [ldev] --
10,414,292 UART: [fwproc] Wait for Commands...
10,417,318 UART: [fwproc] Recv command 0x46574c44
10,419,584 UART: [fwproc] Recv'd Img size: 114084 bytes
10,549,525 UART: ROM Fatal Error: 0x000B0007
10,553,210 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,442,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,338,407 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,427 UART:
192,794 UART: Running Caliptra ROM ...
193,890 UART:
603,433 UART: [state] CFI Enabled
614,095 UART: [state] LifecycleState = Production
616,254 UART: [state] DebugLocked = No
617,635 UART: [state] WD Timer not started. Device not locked for debugging
622,608 UART: [kat] SHA2-256
812,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,294 UART: [kat] ++
823,894 UART: [kat] sha1
834,456 UART: [kat] SHA2-256
837,468 UART: [kat] SHA2-384
842,847 UART: [kat] SHA2-512-ACC
845,400 UART: [kat] ECC-384
3,286,835 UART: [kat] HMAC-384Kdf
3,300,200 UART: [kat] LMS
3,832,025 UART: [kat] --
3,835,878 UART: [cold-reset] ++
3,837,490 UART: [fht] FHT @ 0x50003400
3,849,352 UART: [idev] ++
3,850,069 UART: [idev] CDI.KEYID = 6
3,850,959 UART: [idev] SUBJECT.KEYID = 7
3,852,228 UART: [idev] UDS.KEYID = 0
3,855,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,998,459 UART: [idev] Erasing UDS.KEYID = 0
6,330,234 UART: [idev] Sha1 KeyId Algorithm
6,353,030 UART: [idev] --
6,357,674 UART: [ldev] ++
6,358,354 UART: [ldev] CDI.KEYID = 6
6,359,233 UART: [ldev] SUBJECT.KEYID = 5
6,360,394 UART: [ldev] AUTHORITY.KEYID = 7
6,361,684 UART: [ldev] FE.KEYID = 1
6,373,170 UART: [ldev] Erasing FE.KEYID = 1
8,854,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,618 UART: [ldev] --
10,646,918 UART: [fwproc] Wait for Commands...
10,649,282 UART: [fwproc] Recv command 0x46574c44
10,651,621 UART: [fwproc] Recv'd Img size: 114084 bytes
10,784,261 UART: ROM Fatal Error: 0x000B0007
10,787,941 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,757,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,580,288 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Production
85,857 UART: [state] DebugLocked = No
86,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,925 UART: [kat] SHA2-256
881,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,971 UART: [kat] ++
886,123 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,316 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,476,183 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,132 UART: [idev] ++
1,479,300 UART: [idev] CDI.KEYID = 6
1,479,660 UART: [idev] SUBJECT.KEYID = 7
1,480,084 UART: [idev] UDS.KEYID = 0
1,480,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,504,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,124 UART: [idev] --
1,514,191 UART: [ldev] ++
1,514,359 UART: [ldev] CDI.KEYID = 6
1,514,722 UART: [ldev] SUBJECT.KEYID = 5
1,515,148 UART: [ldev] AUTHORITY.KEYID = 7
1,515,611 UART: [ldev] FE.KEYID = 1
1,520,837 UART: [ldev] Erasing FE.KEYID = 1
1,546,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,134 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,358 UART: [fwproc] Received command 0x46574c44
1,587,149 UART: [fwproc] Received Image of size 114084 bytes
1,636,292 UART: ROM Fatal Error: 0x000B0007
1,637,449 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,390 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Production
85,766 UART: [state] DebugLocked = No
86,396 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,952 UART: [kat] SHA2-256
881,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,998 UART: [kat] ++
886,150 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
894,941 UART: [kat] SHA2-512-ACC
896,842 UART: [kat] ECC-384
902,493 UART: [kat] HMAC-384Kdf
907,095 UART: [kat] LMS
1,475,291 UART: [kat] --
1,476,128 UART: [cold-reset] ++
1,476,598 UART: [fht] Storing FHT @ 0x50003400
1,479,373 UART: [idev] ++
1,479,541 UART: [idev] CDI.KEYID = 6
1,479,901 UART: [idev] SUBJECT.KEYID = 7
1,480,325 UART: [idev] UDS.KEYID = 0
1,480,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,093 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,789 UART: [idev] --
1,514,888 UART: [ldev] ++
1,515,056 UART: [ldev] CDI.KEYID = 6
1,515,419 UART: [ldev] SUBJECT.KEYID = 5
1,515,845 UART: [ldev] AUTHORITY.KEYID = 7
1,516,308 UART: [ldev] FE.KEYID = 1
1,521,774 UART: [ldev] Erasing FE.KEYID = 1
1,547,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,179 UART: [ldev] --
1,586,624 UART: [fwproc] Waiting for Commands...
1,587,243 UART: [fwproc] Received command 0x46574c44
1,588,034 UART: [fwproc] Received Image of size 114084 bytes
1,637,201 UART: ROM Fatal Error: 0x000B0007
1,638,358 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,491,237 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Production
85,669 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,304 UART: [kat] SHA2-512-ACC
908,205 UART: [kat] ECC-384
918,240 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,172,149 UART: [cold-reset] ++
1,172,575 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,432 UART: [idev] Erasing UDS.KEYID = 0
1,201,783 UART: [idev] Sha1 KeyId Algorithm
1,210,283 UART: [idev] --
1,211,387 UART: [ldev] ++
1,211,555 UART: [ldev] CDI.KEYID = 6
1,211,918 UART: [ldev] SUBJECT.KEYID = 5
1,212,344 UART: [ldev] AUTHORITY.KEYID = 7
1,212,807 UART: [ldev] FE.KEYID = 1
1,217,631 UART: [ldev] Erasing FE.KEYID = 1
1,243,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,557 UART: [ldev] --
1,282,912 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x46574c44
1,284,356 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,725 UART: ROM Fatal Error: 0x000B0007
1,334,882 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,189,215 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Production
86,038 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
893,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,684 UART: [kat] ++
897,836 UART: [kat] sha1
902,068 UART: [kat] SHA2-256
904,008 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,747 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,476 UART: [cold-reset] ++
1,173,046 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,651 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,320 UART: [ldev] ++
1,211,488 UART: [ldev] CDI.KEYID = 6
1,211,851 UART: [ldev] SUBJECT.KEYID = 5
1,212,277 UART: [ldev] AUTHORITY.KEYID = 7
1,212,740 UART: [ldev] FE.KEYID = 1
1,218,068 UART: [ldev] Erasing FE.KEYID = 1
1,244,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,892 UART: [ldev] --
1,284,379 UART: [fwproc] Wait for Commands...
1,285,173 UART: [fwproc] Recv command 0x46574c44
1,285,901 UART: [fwproc] Recv'd Img size: 114084 bytes
1,334,846 UART: ROM Fatal Error: 0x000B0007
1,336,003 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,190,272 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Production
85,861 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,339 UART: [idev] ++
1,173,507 UART: [idev] CDI.KEYID = 6
1,173,868 UART: [idev] SUBJECT.KEYID = 7
1,174,293 UART: [idev] UDS.KEYID = 0
1,174,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,107 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,209,118 UART: [ldev] ++
1,209,286 UART: [ldev] CDI.KEYID = 6
1,209,650 UART: [ldev] SUBJECT.KEYID = 5
1,210,077 UART: [ldev] AUTHORITY.KEYID = 7
1,210,540 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,363 UART: [fwproc] Recv command 0x46574c44
1,282,096 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,603 UART: ROM Fatal Error: 0x000B0007
1,331,760 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,387 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Production
85,964 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,699 UART: [kat] SHA2-256
891,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
915,933 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,840 UART: [idev] ++
1,173,008 UART: [idev] CDI.KEYID = 6
1,173,369 UART: [idev] SUBJECT.KEYID = 7
1,173,794 UART: [idev] UDS.KEYID = 0
1,174,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,468 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,629 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,598 UART: [fwproc] Recv command 0x46574c44
1,282,331 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,364 UART: ROM Fatal Error: 0x000B0007
1,332,521 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,828 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,212 UART:
192,575 UART: Running Caliptra ROM ...
193,760 UART:
193,917 UART: [state] CFI Enabled
264,576 UART: [state] LifecycleState = Production
266,375 UART: [state] DebugLocked = No
267,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,807 UART: [kat] SHA2-256
442,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,025 UART: [kat] ++
453,481 UART: [kat] sha1
465,044 UART: [kat] SHA2-256
467,743 UART: [kat] SHA2-384
473,140 UART: [kat] SHA2-512-ACC
475,501 UART: [kat] ECC-384
2,767,242 UART: [kat] HMAC-384Kdf
2,799,351 UART: [kat] LMS
3,989,685 UART: [kat] --
3,993,303 UART: [cold-reset] ++
3,994,206 UART: [fht] Storing FHT @ 0x50003400
4,006,280 UART: [idev] ++
4,006,850 UART: [idev] CDI.KEYID = 6
4,007,833 UART: [idev] SUBJECT.KEYID = 7
4,009,053 UART: [idev] UDS.KEYID = 0
4,012,085 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,779 UART: [idev] Erasing UDS.KEYID = 0
7,344,330 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,351 UART: [idev] --
7,369,729 UART: [ldev] ++
7,370,309 UART: [ldev] CDI.KEYID = 6
7,371,302 UART: [ldev] SUBJECT.KEYID = 5
7,372,527 UART: [ldev] AUTHORITY.KEYID = 7
7,373,762 UART: [ldev] FE.KEYID = 1
7,400,030 UART: [ldev] Erasing FE.KEYID = 1
10,732,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,469 UART: [ldev] --
13,092,869 UART: [fwproc] Waiting for Commands...
13,095,079 UART: [fwproc] Received command 0x46574c44
13,097,269 UART: [fwproc] Received Image of size 113760 bytes
13,185,036 UART: ROM Fatal Error: 0x000B0005
13,188,556 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,806,052 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,951,853 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,387 UART:
192,743 UART: Running Caliptra ROM ...
193,867 UART:
603,756 UART: [state] CFI Enabled
616,730 UART: [state] LifecycleState = Production
618,525 UART: [state] DebugLocked = No
620,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,362 UART: [kat] SHA2-256
796,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,688 UART: [kat] ++
807,138 UART: [kat] sha1
818,714 UART: [kat] SHA2-256
821,391 UART: [kat] SHA2-384
827,580 UART: [kat] SHA2-512-ACC
829,972 UART: [kat] ECC-384
3,114,423 UART: [kat] HMAC-384Kdf
3,127,550 UART: [kat] LMS
4,317,633 UART: [kat] --
4,322,863 UART: [cold-reset] ++
4,324,963 UART: [fht] Storing FHT @ 0x50003400
4,335,362 UART: [idev] ++
4,335,925 UART: [idev] CDI.KEYID = 6
4,336,891 UART: [idev] SUBJECT.KEYID = 7
4,338,105 UART: [idev] UDS.KEYID = 0
4,341,139 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,688 UART: [idev] Erasing UDS.KEYID = 0
7,625,547 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,192 UART: [idev] --
7,652,156 UART: [ldev] ++
7,652,886 UART: [ldev] CDI.KEYID = 6
7,653,871 UART: [ldev] SUBJECT.KEYID = 5
7,655,004 UART: [ldev] AUTHORITY.KEYID = 7
7,656,189 UART: [ldev] FE.KEYID = 1
7,666,165 UART: [ldev] Erasing FE.KEYID = 1
10,955,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,886 UART: [ldev] --
13,319,501 UART: [fwproc] Waiting for Commands...
13,321,551 UART: [fwproc] Received command 0x46574c44
13,323,736 UART: [fwproc] Received Image of size 113760 bytes
13,419,956 UART: ROM Fatal Error: 0x000B0005
13,423,424 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
4,126,127 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,153,031 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,257 UART:
192,619 UART: Running Caliptra ROM ...
193,777 UART:
193,924 UART: [state] CFI Enabled
264,909 UART: [state] LifecycleState = Production
266,668 UART: [state] DebugLocked = No
268,969 UART: [state] WD Timer not started. Device not locked for debugging
272,587 UART: [kat] SHA2-256
451,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,290 UART: [kat] ++
463,838 UART: [kat] sha1
475,264 UART: [kat] SHA2-256
478,327 UART: [kat] SHA2-384
484,206 UART: [kat] SHA2-512-ACC
487,139 UART: [kat] ECC-384
2,950,416 UART: [kat] HMAC-384Kdf
2,972,907 UART: [kat] LMS
3,502,372 UART: [kat] --
3,506,764 UART: [cold-reset] ++
3,508,915 UART: [fht] FHT @ 0x50003400
3,519,249 UART: [idev] ++
3,519,822 UART: [idev] CDI.KEYID = 6
3,520,708 UART: [idev] SUBJECT.KEYID = 7
3,521,921 UART: [idev] UDS.KEYID = 0
3,524,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,360 UART: [idev] Erasing UDS.KEYID = 0
6,026,979 UART: [idev] Sha1 KeyId Algorithm
6,048,801 UART: [idev] --
6,052,080 UART: [ldev] ++
6,052,664 UART: [ldev] CDI.KEYID = 6
6,053,583 UART: [ldev] SUBJECT.KEYID = 5
6,054,749 UART: [ldev] AUTHORITY.KEYID = 7
6,055,983 UART: [ldev] FE.KEYID = 1
6,101,761 UART: [ldev] Erasing FE.KEYID = 1
8,604,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,541 UART: [ldev] --
10,415,383 UART: [fwproc] Wait for Commands...
10,417,236 UART: [fwproc] Recv command 0x46574c44
10,419,285 UART: [fwproc] Recv'd Img size: 114084 bytes
10,508,966 UART: ROM Fatal Error: 0x000B0005
10,512,051 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,362,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,278,223 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,379 UART:
192,757 UART: Running Caliptra ROM ...
194,058 UART:
603,368 UART: [state] CFI Enabled
615,290 UART: [state] LifecycleState = Production
617,015 UART: [state] DebugLocked = No
619,823 UART: [state] WD Timer not started. Device not locked for debugging
623,753 UART: [kat] SHA2-256
802,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,631 UART: [kat] ++
815,139 UART: [kat] sha1
824,350 UART: [kat] SHA2-256
827,374 UART: [kat] SHA2-384
832,917 UART: [kat] SHA2-512-ACC
835,905 UART: [kat] ECC-384
3,280,160 UART: [kat] HMAC-384Kdf
3,292,795 UART: [kat] LMS
3,822,329 UART: [kat] --
3,827,885 UART: [cold-reset] ++
3,830,111 UART: [fht] FHT @ 0x50003400
3,840,772 UART: [idev] ++
3,841,335 UART: [idev] CDI.KEYID = 6
3,842,242 UART: [idev] SUBJECT.KEYID = 7
3,843,457 UART: [idev] UDS.KEYID = 0
3,846,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,808 UART: [idev] Erasing UDS.KEYID = 0
6,312,689 UART: [idev] Sha1 KeyId Algorithm
6,335,373 UART: [idev] --
6,339,669 UART: [ldev] ++
6,340,250 UART: [ldev] CDI.KEYID = 6
6,341,135 UART: [ldev] SUBJECT.KEYID = 5
6,342,349 UART: [ldev] AUTHORITY.KEYID = 7
6,343,638 UART: [ldev] FE.KEYID = 1
6,355,992 UART: [ldev] Erasing FE.KEYID = 1
8,831,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,694 UART: [ldev] --
10,622,210 UART: [fwproc] Wait for Commands...
10,623,926 UART: [fwproc] Recv command 0x46574c44
10,626,026 UART: [fwproc] Recv'd Img size: 114084 bytes
10,712,226 UART: ROM Fatal Error: 0x000B0005
10,715,367 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,696,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,490,793 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,201 UART:
192,545 UART: Running Caliptra ROM ...
193,741 UART:
193,894 UART: [state] CFI Enabled
266,684 UART: [state] LifecycleState = Production
268,934 UART: [state] DebugLocked = No
270,912 UART: [state] WD Timer not started. Device not locked for debugging
274,758 UART: [kat] SHA2-256
464,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,405 UART: [kat] ++
475,854 UART: [kat] sha1
487,170 UART: [kat] SHA2-256
490,183 UART: [kat] SHA2-384
496,124 UART: [kat] SHA2-512-ACC
498,687 UART: [kat] ECC-384
2,948,201 UART: [kat] HMAC-384Kdf
2,971,985 UART: [kat] LMS
3,503,745 UART: [kat] --
3,508,335 UART: [cold-reset] ++
3,510,898 UART: [fht] FHT @ 0x50003400
3,523,741 UART: [idev] ++
3,524,426 UART: [idev] CDI.KEYID = 6
3,525,445 UART: [idev] SUBJECT.KEYID = 7
3,526,550 UART: [idev] UDS.KEYID = 0
3,529,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,673,837 UART: [idev] Erasing UDS.KEYID = 0
6,028,950 UART: [idev] Sha1 KeyId Algorithm
6,052,139 UART: [idev] --
6,058,623 UART: [ldev] ++
6,059,315 UART: [ldev] CDI.KEYID = 6
6,060,224 UART: [ldev] SUBJECT.KEYID = 5
6,061,388 UART: [ldev] AUTHORITY.KEYID = 7
6,062,622 UART: [ldev] FE.KEYID = 1
6,101,165 UART: [ldev] Erasing FE.KEYID = 1
8,607,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,082 UART: [ldev] --
10,415,356 UART: [fwproc] Wait for Commands...
10,418,479 UART: [fwproc] Recv command 0x46574c44
10,420,799 UART: [fwproc] Recv'd Img size: 114084 bytes
10,541,889 UART: ROM Fatal Error: 0x000B0005
10,545,562 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,442,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,353,792 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,399 UART:
192,755 UART: Running Caliptra ROM ...
193,892 UART:
603,640 UART: [state] CFI Enabled
617,375 UART: [state] LifecycleState = Production
619,577 UART: [state] DebugLocked = No
621,459 UART: [state] WD Timer not started. Device not locked for debugging
626,050 UART: [kat] SHA2-256
815,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,693 UART: [kat] ++
827,279 UART: [kat] sha1
838,327 UART: [kat] SHA2-256
841,389 UART: [kat] SHA2-384
847,523 UART: [kat] SHA2-512-ACC
850,131 UART: [kat] ECC-384
3,292,860 UART: [kat] HMAC-384Kdf
3,306,012 UART: [kat] LMS
3,837,827 UART: [kat] --
3,843,973 UART: [cold-reset] ++
3,844,823 UART: [fht] FHT @ 0x50003400
3,856,987 UART: [idev] ++
3,857,704 UART: [idev] CDI.KEYID = 6
3,858,639 UART: [idev] SUBJECT.KEYID = 7
3,859,807 UART: [idev] UDS.KEYID = 0
3,862,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,737 UART: [idev] Erasing UDS.KEYID = 0
6,336,056 UART: [idev] Sha1 KeyId Algorithm
6,358,269 UART: [idev] --
6,362,372 UART: [ldev] ++
6,363,050 UART: [ldev] CDI.KEYID = 6
6,364,070 UART: [ldev] SUBJECT.KEYID = 5
6,365,179 UART: [ldev] AUTHORITY.KEYID = 7
6,366,356 UART: [ldev] FE.KEYID = 1
6,378,783 UART: [ldev] Erasing FE.KEYID = 1
8,857,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,443 UART: [ldev] --
10,648,087 UART: [fwproc] Wait for Commands...
10,650,353 UART: [fwproc] Recv command 0x46574c44
10,652,659 UART: [fwproc] Recv'd Img size: 114084 bytes
10,773,211 UART: ROM Fatal Error: 0x000B0005
10,776,834 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,758,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,579,236 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Production
86,131 UART: [state] DebugLocked = No
86,707 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,351 UART: [kat] SHA2-256
882,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,397 UART: [kat] ++
886,549 UART: [kat] sha1
890,735 UART: [kat] SHA2-256
892,673 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
903,208 UART: [kat] HMAC-384Kdf
907,650 UART: [kat] LMS
1,475,846 UART: [kat] --
1,476,881 UART: [cold-reset] ++
1,477,439 UART: [fht] Storing FHT @ 0x50003400
1,480,298 UART: [idev] ++
1,480,466 UART: [idev] CDI.KEYID = 6
1,480,826 UART: [idev] SUBJECT.KEYID = 7
1,481,250 UART: [idev] UDS.KEYID = 0
1,481,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,116 UART: [idev] Erasing UDS.KEYID = 0
1,505,878 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,648 UART: [idev] --
1,515,835 UART: [ldev] ++
1,516,003 UART: [ldev] CDI.KEYID = 6
1,516,366 UART: [ldev] SUBJECT.KEYID = 5
1,516,792 UART: [ldev] AUTHORITY.KEYID = 7
1,517,255 UART: [ldev] FE.KEYID = 1
1,522,389 UART: [ldev] Erasing FE.KEYID = 1
1,547,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,182 UART: [ldev] --
1,586,483 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 114084 bytes
1,633,706 UART: ROM Fatal Error: 0x000B0005
1,634,863 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,485,880 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Production
86,536 UART: [state] DebugLocked = No
87,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,916 UART: [kat] SHA2-256
882,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,962 UART: [kat] ++
887,114 UART: [kat] sha1
891,296 UART: [kat] SHA2-256
893,234 UART: [kat] SHA2-384
896,199 UART: [kat] SHA2-512-ACC
898,100 UART: [kat] ECC-384
903,885 UART: [kat] HMAC-384Kdf
908,475 UART: [kat] LMS
1,476,671 UART: [kat] --
1,477,468 UART: [cold-reset] ++
1,477,960 UART: [fht] Storing FHT @ 0x50003400
1,480,619 UART: [idev] ++
1,480,787 UART: [idev] CDI.KEYID = 6
1,481,147 UART: [idev] SUBJECT.KEYID = 7
1,481,571 UART: [idev] UDS.KEYID = 0
1,481,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,617 UART: [idev] Erasing UDS.KEYID = 0
1,506,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,699 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,426 UART: [ldev] Erasing FE.KEYID = 1
1,547,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,203 UART: [ldev] --
1,586,680 UART: [fwproc] Waiting for Commands...
1,587,301 UART: [fwproc] Received command 0x46574c44
1,588,092 UART: [fwproc] Received Image of size 114084 bytes
1,633,151 UART: ROM Fatal Error: 0x000B0005
1,634,308 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,163 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Production
85,489 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
893,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,231 UART: [kat] ++
897,383 UART: [kat] sha1
901,565 UART: [kat] SHA2-256
903,505 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,843 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,980 UART: [idev] ++
1,175,148 UART: [idev] CDI.KEYID = 6
1,175,508 UART: [idev] SUBJECT.KEYID = 7
1,175,932 UART: [idev] UDS.KEYID = 0
1,176,277 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,938 UART: [idev] Erasing UDS.KEYID = 0
1,200,521 UART: [idev] Sha1 KeyId Algorithm
1,208,997 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,506 UART: [ldev] SUBJECT.KEYID = 5
1,210,932 UART: [ldev] AUTHORITY.KEYID = 7
1,211,395 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,003 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,942 UART: [fwproc] Recv command 0x46574c44
1,283,670 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,247 UART: ROM Fatal Error: 0x000B0005
1,329,404 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,647 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Production
86,202 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,609 UART: [kat] HMAC-384Kdf
923,345 UART: [kat] LMS
1,171,673 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,172,938 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,202,384 UART: [idev] Sha1 KeyId Algorithm
1,210,624 UART: [idev] --
1,211,720 UART: [ldev] ++
1,211,888 UART: [ldev] CDI.KEYID = 6
1,212,251 UART: [ldev] SUBJECT.KEYID = 5
1,212,677 UART: [ldev] AUTHORITY.KEYID = 7
1,213,140 UART: [ldev] FE.KEYID = 1
1,218,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,414 UART: [ldev] --
1,283,695 UART: [fwproc] Wait for Commands...
1,284,399 UART: [fwproc] Recv command 0x46574c44
1,285,127 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,974 UART: ROM Fatal Error: 0x000B0005
1,331,131 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,720 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Production
85,649 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,841 UART: [idev] ++
1,173,009 UART: [idev] CDI.KEYID = 6
1,173,370 UART: [idev] SUBJECT.KEYID = 7
1,173,795 UART: [idev] UDS.KEYID = 0
1,174,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,939 UART: [idev] --
1,208,816 UART: [ldev] ++
1,208,984 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,775 UART: [ldev] AUTHORITY.KEYID = 7
1,210,238 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,514 UART: [fwproc] Wait for Commands...
1,281,087 UART: [fwproc] Recv command 0x46574c44
1,281,820 UART: [fwproc] Recv'd Img size: 114084 bytes
1,326,353 UART: ROM Fatal Error: 0x000B0005
1,327,510 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,384 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,621 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Production
86,524 UART: [state] DebugLocked = No
87,228 UART: [state] WD Timer not started. Device not locked for debugging
88,585 UART: [kat] SHA2-256
892,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,264 UART: [kat] ++
896,416 UART: [kat] sha1
900,714 UART: [kat] SHA2-256
902,654 UART: [kat] SHA2-384
905,463 UART: [kat] SHA2-512-ACC
907,364 UART: [kat] ECC-384
917,591 UART: [kat] HMAC-384Kdf
922,297 UART: [kat] LMS
1,170,609 UART: [kat] --
1,171,396 UART: [cold-reset] ++
1,171,844 UART: [fht] FHT @ 0x50003400
1,174,500 UART: [idev] ++
1,174,668 UART: [idev] CDI.KEYID = 6
1,175,029 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,175,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,382 UART: [idev] Erasing UDS.KEYID = 0
1,200,010 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,551 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,219 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,059 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,816 UART: ROM Fatal Error: 0x000B0005
1,329,973 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,062 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,225 UART:
192,590 UART: Running Caliptra ROM ...
193,775 UART:
193,931 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Production
264,541 UART: [state] DebugLocked = No
266,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,622 UART: [kat] SHA2-256
441,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,823 UART: [kat] ++
452,299 UART: [kat] sha1
463,075 UART: [kat] SHA2-256
465,756 UART: [kat] SHA2-384
471,901 UART: [kat] SHA2-512-ACC
474,247 UART: [kat] ECC-384
2,767,654 UART: [kat] HMAC-384Kdf
2,800,484 UART: [kat] LMS
3,990,799 UART: [kat] --
3,995,770 UART: [cold-reset] ++
3,996,900 UART: [fht] Storing FHT @ 0x50003400
4,007,143 UART: [idev] ++
4,007,718 UART: [idev] CDI.KEYID = 6
4,008,738 UART: [idev] SUBJECT.KEYID = 7
4,009,905 UART: [idev] UDS.KEYID = 0
4,012,799 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,130 UART: [idev] Erasing UDS.KEYID = 0
7,347,050 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,478 UART: [idev] --
7,370,506 UART: [ldev] ++
7,371,074 UART: [ldev] CDI.KEYID = 6
7,372,021 UART: [ldev] SUBJECT.KEYID = 5
7,373,240 UART: [ldev] AUTHORITY.KEYID = 7
7,374,552 UART: [ldev] FE.KEYID = 1
7,403,268 UART: [ldev] Erasing FE.KEYID = 1
10,735,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,580 UART: [ldev] --
13,095,614 UART: [fwproc] Waiting for Commands...
13,097,877 UART: [fwproc] Received command 0x46574c44
13,100,173 UART: [fwproc] Received Image of size 113760 bytes
13,195,293 UART: ROM Fatal Error: 0x000B0005
13,198,811 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,806,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,978,309 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,515 UART:
192,866 UART: Running Caliptra ROM ...
194,044 UART:
603,723 UART: [state] CFI Enabled
614,808 UART: [state] LifecycleState = Production
616,584 UART: [state] DebugLocked = No
619,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,760 UART: [kat] SHA2-256
793,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,045 UART: [kat] ++
804,505 UART: [kat] sha1
815,382 UART: [kat] SHA2-256
818,112 UART: [kat] SHA2-384
823,976 UART: [kat] SHA2-512-ACC
826,321 UART: [kat] ECC-384
3,111,557 UART: [kat] HMAC-384Kdf
3,124,061 UART: [kat] LMS
4,314,198 UART: [kat] --
4,320,091 UART: [cold-reset] ++
4,321,059 UART: [fht] Storing FHT @ 0x50003400
4,331,275 UART: [idev] ++
4,331,897 UART: [idev] CDI.KEYID = 6
4,332,802 UART: [idev] SUBJECT.KEYID = 7
4,334,073 UART: [idev] UDS.KEYID = 0
4,337,287 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,410 UART: [idev] Erasing UDS.KEYID = 0
7,624,611 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,370 UART: [idev] --
7,649,180 UART: [ldev] ++
7,649,746 UART: [ldev] CDI.KEYID = 6
7,650,682 UART: [ldev] SUBJECT.KEYID = 5
7,652,067 UART: [ldev] AUTHORITY.KEYID = 7
7,653,249 UART: [ldev] FE.KEYID = 1
7,664,153 UART: [ldev] Erasing FE.KEYID = 1
10,955,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,515 UART: [ldev] --
13,317,616 UART: [fwproc] Waiting for Commands...
13,319,874 UART: [fwproc] Received command 0x46574c44
13,322,067 UART: [fwproc] Received Image of size 113760 bytes
13,414,443 UART: ROM Fatal Error: 0x000B0005
13,417,959 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,129,106 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,151,591 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,327 UART:
192,679 UART: Running Caliptra ROM ...
193,872 UART:
194,023 UART: [state] CFI Enabled
266,513 UART: [state] LifecycleState = Production
268,279 UART: [state] DebugLocked = No
270,903 UART: [state] WD Timer not started. Device not locked for debugging
275,375 UART: [kat] SHA2-256
454,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,073 UART: [kat] ++
466,613 UART: [kat] sha1
477,660 UART: [kat] SHA2-256
480,671 UART: [kat] SHA2-384
487,350 UART: [kat] SHA2-512-ACC
490,354 UART: [kat] ECC-384
2,947,928 UART: [kat] HMAC-384Kdf
2,971,295 UART: [kat] LMS
3,500,748 UART: [kat] --
3,506,982 UART: [cold-reset] ++
3,508,003 UART: [fht] FHT @ 0x50003400
3,518,288 UART: [idev] ++
3,518,865 UART: [idev] CDI.KEYID = 6
3,519,782 UART: [idev] SUBJECT.KEYID = 7
3,520,943 UART: [idev] UDS.KEYID = 0
3,523,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,460 UART: [idev] Erasing UDS.KEYID = 0
6,035,639 UART: [idev] Sha1 KeyId Algorithm
6,059,025 UART: [idev] --
6,062,522 UART: [ldev] ++
6,063,106 UART: [ldev] CDI.KEYID = 6
6,064,058 UART: [ldev] SUBJECT.KEYID = 5
6,065,174 UART: [ldev] AUTHORITY.KEYID = 7
6,066,463 UART: [ldev] FE.KEYID = 1
6,112,915 UART: [ldev] Erasing FE.KEYID = 1
8,619,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,703 UART: [ldev] --
10,426,021 UART: [fwproc] Wait for Commands...
10,428,494 UART: [fwproc] Recv command 0x46574c44
10,430,588 UART: [fwproc] Recv'd Img size: 114084 bytes
10,521,161 UART: ROM Fatal Error: 0x000B0005
10,524,264 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,354,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,244,434 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,484 UART:
192,836 UART: Running Caliptra ROM ...
193,954 UART:
603,658 UART: [state] CFI Enabled
618,477 UART: [state] LifecycleState = Production
620,294 UART: [state] DebugLocked = No
622,127 UART: [state] WD Timer not started. Device not locked for debugging
625,900 UART: [kat] SHA2-256
805,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,599 UART: [kat] ++
817,049 UART: [kat] sha1
827,978 UART: [kat] SHA2-256
831,034 UART: [kat] SHA2-384
838,415 UART: [kat] SHA2-512-ACC
841,360 UART: [kat] ECC-384
3,278,145 UART: [kat] HMAC-384Kdf
3,289,949 UART: [kat] LMS
3,819,419 UART: [kat] --
3,823,134 UART: [cold-reset] ++
3,825,063 UART: [fht] FHT @ 0x50003400
3,836,473 UART: [idev] ++
3,837,062 UART: [idev] CDI.KEYID = 6
3,837,947 UART: [idev] SUBJECT.KEYID = 7
3,839,157 UART: [idev] UDS.KEYID = 0
3,841,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,355 UART: [idev] Erasing UDS.KEYID = 0
6,313,466 UART: [idev] Sha1 KeyId Algorithm
6,335,128 UART: [idev] --
6,340,093 UART: [ldev] ++
6,340,664 UART: [ldev] CDI.KEYID = 6
6,341,553 UART: [ldev] SUBJECT.KEYID = 5
6,342,769 UART: [ldev] AUTHORITY.KEYID = 7
6,344,005 UART: [ldev] FE.KEYID = 1
6,354,252 UART: [ldev] Erasing FE.KEYID = 1
8,828,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,934 UART: [ldev] --
10,618,934 UART: [fwproc] Wait for Commands...
10,620,820 UART: [fwproc] Recv command 0x46574c44
10,622,918 UART: [fwproc] Recv'd Img size: 114084 bytes
10,709,425 UART: ROM Fatal Error: 0x000B0005
10,712,564 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
3,702,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,497,711 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,297 UART:
192,662 UART: Running Caliptra ROM ...
193,875 UART:
194,035 UART: [state] CFI Enabled
266,436 UART: [state] LifecycleState = Production
268,677 UART: [state] DebugLocked = No
269,865 UART: [state] WD Timer not started. Device not locked for debugging
272,775 UART: [kat] SHA2-256
462,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,194 UART: [kat] ++
473,642 UART: [kat] sha1
484,415 UART: [kat] SHA2-256
487,428 UART: [kat] SHA2-384
493,679 UART: [kat] SHA2-512-ACC
496,295 UART: [kat] ECC-384
2,946,872 UART: [kat] HMAC-384Kdf
2,972,932 UART: [kat] LMS
3,504,717 UART: [kat] --
3,509,516 UART: [cold-reset] ++
3,511,563 UART: [fht] FHT @ 0x50003400
3,523,305 UART: [idev] ++
3,524,042 UART: [idev] CDI.KEYID = 6
3,524,975 UART: [idev] SUBJECT.KEYID = 7
3,526,195 UART: [idev] UDS.KEYID = 0
3,529,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,673,061 UART: [idev] Erasing UDS.KEYID = 0
6,025,390 UART: [idev] Sha1 KeyId Algorithm
6,049,131 UART: [idev] --
6,053,620 UART: [ldev] ++
6,054,306 UART: [ldev] CDI.KEYID = 6
6,055,219 UART: [ldev] SUBJECT.KEYID = 5
6,056,381 UART: [ldev] AUTHORITY.KEYID = 7
6,057,617 UART: [ldev] FE.KEYID = 1
6,099,767 UART: [ldev] Erasing FE.KEYID = 1
8,606,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,035 UART: [ldev] --
10,413,823 UART: [fwproc] Wait for Commands...
10,416,405 UART: [fwproc] Recv command 0x46574c44
10,418,673 UART: [fwproc] Recv'd Img size: 114084 bytes
10,541,053 UART: ROM Fatal Error: 0x000B0005
10,544,687 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,442,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,348,872 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,600 UART:
192,962 UART: Running Caliptra ROM ...
194,100 UART:
603,931 UART: [state] CFI Enabled
616,795 UART: [state] LifecycleState = Production
619,002 UART: [state] DebugLocked = No
621,086 UART: [state] WD Timer not started. Device not locked for debugging
625,777 UART: [kat] SHA2-256
815,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,436 UART: [kat] ++
827,074 UART: [kat] sha1
838,772 UART: [kat] SHA2-256
841,803 UART: [kat] SHA2-384
847,187 UART: [kat] SHA2-512-ACC
849,740 UART: [kat] ECC-384
3,290,157 UART: [kat] HMAC-384Kdf
3,303,148 UART: [kat] LMS
3,834,993 UART: [kat] --
3,838,957 UART: [cold-reset] ++
3,840,366 UART: [fht] FHT @ 0x50003400
3,851,826 UART: [idev] ++
3,852,503 UART: [idev] CDI.KEYID = 6
3,853,465 UART: [idev] SUBJECT.KEYID = 7
3,854,678 UART: [idev] UDS.KEYID = 0
3,857,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,064 UART: [idev] Erasing UDS.KEYID = 0
6,330,351 UART: [idev] Sha1 KeyId Algorithm
6,352,121 UART: [idev] --
6,357,945 UART: [ldev] ++
6,358,643 UART: [ldev] CDI.KEYID = 6
6,359,718 UART: [ldev] SUBJECT.KEYID = 5
6,360,824 UART: [ldev] AUTHORITY.KEYID = 7
6,362,000 UART: [ldev] FE.KEYID = 1
6,373,193 UART: [ldev] Erasing FE.KEYID = 1
8,850,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,295 UART: [ldev] --
10,637,367 UART: [fwproc] Wait for Commands...
10,638,876 UART: [fwproc] Recv command 0x46574c44
10,641,195 UART: [fwproc] Recv'd Img size: 114084 bytes
10,762,147 UART: ROM Fatal Error: 0x000B0005
10,765,802 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,756,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,571,639 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Production
85,511 UART: [state] DebugLocked = No
86,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,689 UART: [kat] SHA2-256
881,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,735 UART: [kat] ++
885,887 UART: [kat] sha1
890,089 UART: [kat] SHA2-256
892,027 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,671 UART: [cold-reset] ++
1,476,085 UART: [fht] Storing FHT @ 0x50003400
1,479,038 UART: [idev] ++
1,479,206 UART: [idev] CDI.KEYID = 6
1,479,566 UART: [idev] SUBJECT.KEYID = 7
1,479,990 UART: [idev] UDS.KEYID = 0
1,480,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,202 UART: [idev] Erasing UDS.KEYID = 0
1,504,800 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,229 UART: [ldev] ++
1,514,397 UART: [ldev] CDI.KEYID = 6
1,514,760 UART: [ldev] SUBJECT.KEYID = 5
1,515,186 UART: [ldev] AUTHORITY.KEYID = 7
1,515,649 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,546,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,586,029 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114084 bytes
1,632,566 UART: ROM Fatal Error: 0x000B0005
1,633,723 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,230 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Production
85,920 UART: [state] DebugLocked = No
86,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,586 UART: [kat] SHA2-256
892,524 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,299 UART: [kat] HMAC-384Kdf
907,067 UART: [kat] LMS
1,475,263 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,614 UART: [fht] Storing FHT @ 0x50003400
1,479,373 UART: [idev] ++
1,479,541 UART: [idev] CDI.KEYID = 6
1,479,901 UART: [idev] SUBJECT.KEYID = 7
1,480,325 UART: [idev] UDS.KEYID = 0
1,480,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,649 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,275 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,667 UART: [ldev] --
1,586,138 UART: [fwproc] Waiting for Commands...
1,586,949 UART: [fwproc] Received command 0x46574c44
1,587,740 UART: [fwproc] Received Image of size 114084 bytes
1,632,599 UART: ROM Fatal Error: 0x000B0005
1,633,756 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,001 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Production
86,169 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
893,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,863 UART: [kat] ++
898,015 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
907,020 UART: [kat] SHA2-512-ACC
908,921 UART: [kat] ECC-384
918,616 UART: [kat] HMAC-384Kdf
923,222 UART: [kat] LMS
1,171,550 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,172,813 UART: [fht] FHT @ 0x50003400
1,175,424 UART: [idev] ++
1,175,592 UART: [idev] CDI.KEYID = 6
1,175,952 UART: [idev] SUBJECT.KEYID = 7
1,176,376 UART: [idev] UDS.KEYID = 0
1,176,721 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,200,719 UART: [idev] Sha1 KeyId Algorithm
1,209,077 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,700 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,667 UART: ROM Fatal Error: 0x000B0005
1,329,824 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,683 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Production
86,142 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,815 UART: [kat] SHA2-512-ACC
908,716 UART: [kat] ECC-384
918,347 UART: [kat] HMAC-384Kdf
923,103 UART: [kat] LMS
1,171,431 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,155 UART: [idev] Erasing UDS.KEYID = 0
1,201,824 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,372 UART: [ldev] ++
1,211,540 UART: [ldev] CDI.KEYID = 6
1,211,903 UART: [ldev] SUBJECT.KEYID = 5
1,212,329 UART: [ldev] AUTHORITY.KEYID = 7
1,212,792 UART: [ldev] FE.KEYID = 1
1,218,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,770 UART: [ldev] --
1,284,087 UART: [fwproc] Wait for Commands...
1,284,723 UART: [fwproc] Recv command 0x46574c44
1,285,451 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,900 UART: ROM Fatal Error: 0x000B0005
1,332,057 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,370 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Production
85,625 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,281 UART: [idev] ++
1,173,449 UART: [idev] CDI.KEYID = 6
1,173,810 UART: [idev] SUBJECT.KEYID = 7
1,174,235 UART: [idev] UDS.KEYID = 0
1,174,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,323 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,320 UART: [ldev] --
1,281,640 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,691 UART: ROM Fatal Error: 0x000B0005
1,328,848 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,681 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Production
86,388 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,378 UART: [kat] SHA2-256
902,318 UART: [kat] SHA2-384
904,991 UART: [kat] SHA2-512-ACC
906,892 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,428 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,716 UART: [idev] ++
1,173,884 UART: [idev] CDI.KEYID = 6
1,174,245 UART: [idev] SUBJECT.KEYID = 7
1,174,670 UART: [idev] UDS.KEYID = 0
1,175,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,066 UART: [idev] Sha1 KeyId Algorithm
1,208,814 UART: [idev] --
1,209,891 UART: [ldev] ++
1,210,059 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,711 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,609 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,532 UART: ROM Fatal Error: 0x000B0005
1,329,689 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,890 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,191 UART:
192,570 UART: Running Caliptra ROM ...
193,711 UART:
193,861 UART: [state] CFI Enabled
265,203 UART: [state] LifecycleState = Production
267,051 UART: [state] DebugLocked = No
268,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,501 UART: [kat] SHA2-256
443,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,731 UART: [kat] ++
454,205 UART: [kat] sha1
465,187 UART: [kat] SHA2-256
467,868 UART: [kat] SHA2-384
472,875 UART: [kat] SHA2-512-ACC
475,218 UART: [kat] ECC-384
2,767,038 UART: [kat] HMAC-384Kdf
2,799,159 UART: [kat] LMS
3,989,474 UART: [kat] --
3,994,683 UART: [cold-reset] ++
3,995,602 UART: [fht] Storing FHT @ 0x50003400
4,007,577 UART: [idev] ++
4,008,198 UART: [idev] CDI.KEYID = 6
4,009,112 UART: [idev] SUBJECT.KEYID = 7
4,010,406 UART: [idev] UDS.KEYID = 0
4,016,076 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,159,453 UART: [idev] Erasing UDS.KEYID = 0
7,344,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,593 UART: [idev] --
7,368,609 UART: [ldev] ++
7,369,233 UART: [ldev] CDI.KEYID = 6
7,370,193 UART: [ldev] SUBJECT.KEYID = 5
7,371,407 UART: [ldev] AUTHORITY.KEYID = 7
7,372,642 UART: [ldev] FE.KEYID = 1
7,399,409 UART: [ldev] Erasing FE.KEYID = 1
10,733,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,718 UART: [ldev] --
13,112,227 UART: [fwproc] Waiting for Commands...
13,114,215 UART: [fwproc] Received command 0x46574c44
13,116,406 UART: [fwproc] Received Image of size 113760 bytes
13,184,074 UART: ROM Fatal Error: 0x000B0003
13,187,597 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,787,568 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,904,884 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,438 UART:
192,820 UART: Running Caliptra ROM ...
194,013 UART:
603,535 UART: [state] CFI Enabled
617,939 UART: [state] LifecycleState = Production
619,744 UART: [state] DebugLocked = No
622,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,403 UART: [kat] SHA2-256
797,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,663 UART: [kat] ++
808,108 UART: [kat] sha1
818,556 UART: [kat] SHA2-256
821,298 UART: [kat] SHA2-384
827,272 UART: [kat] SHA2-512-ACC
829,666 UART: [kat] ECC-384
3,113,818 UART: [kat] HMAC-384Kdf
3,124,548 UART: [kat] LMS
4,314,656 UART: [kat] --
4,318,891 UART: [cold-reset] ++
4,320,776 UART: [fht] Storing FHT @ 0x50003400
4,332,580 UART: [idev] ++
4,333,147 UART: [idev] CDI.KEYID = 6
4,334,110 UART: [idev] SUBJECT.KEYID = 7
4,335,412 UART: [idev] UDS.KEYID = 0
4,341,018 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,169 UART: [idev] Erasing UDS.KEYID = 0
7,621,164 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,857 UART: [idev] --
7,645,605 UART: [ldev] ++
7,646,233 UART: [ldev] CDI.KEYID = 6
7,647,322 UART: [ldev] SUBJECT.KEYID = 5
7,648,439 UART: [ldev] AUTHORITY.KEYID = 7
7,649,624 UART: [ldev] FE.KEYID = 1
7,660,389 UART: [ldev] Erasing FE.KEYID = 1
10,949,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,287 UART: [ldev] --
13,311,151 UART: [fwproc] Waiting for Commands...
13,312,826 UART: [fwproc] Received command 0x46574c44
13,315,070 UART: [fwproc] Received Image of size 113760 bytes
13,378,960 UART: ROM Fatal Error: 0x000B0003
13,382,484 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,136,760 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,119,655 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,125 UART:
192,527 UART: Running Caliptra ROM ...
193,695 UART:
193,843 UART: [state] CFI Enabled
262,084 UART: [state] LifecycleState = Production
263,787 UART: [state] DebugLocked = No
266,517 UART: [state] WD Timer not started. Device not locked for debugging
270,563 UART: [kat] SHA2-256
449,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,249 UART: [kat] ++
461,788 UART: [kat] sha1
473,804 UART: [kat] SHA2-256
476,813 UART: [kat] SHA2-384
482,576 UART: [kat] SHA2-512-ACC
485,561 UART: [kat] ECC-384
2,949,504 UART: [kat] HMAC-384Kdf
2,974,047 UART: [kat] LMS
3,503,503 UART: [kat] --
3,507,124 UART: [cold-reset] ++
3,509,329 UART: [fht] FHT @ 0x50003400
3,519,715 UART: [idev] ++
3,520,289 UART: [idev] CDI.KEYID = 6
3,521,200 UART: [idev] SUBJECT.KEYID = 7
3,522,419 UART: [idev] UDS.KEYID = 0
3,525,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,898 UART: [idev] Erasing UDS.KEYID = 0
6,027,339 UART: [idev] Sha1 KeyId Algorithm
6,051,351 UART: [idev] --
6,055,079 UART: [ldev] ++
6,055,661 UART: [ldev] CDI.KEYID = 6
6,056,573 UART: [ldev] SUBJECT.KEYID = 5
6,057,740 UART: [ldev] AUTHORITY.KEYID = 7
6,059,028 UART: [ldev] FE.KEYID = 1
6,102,754 UART: [ldev] Erasing FE.KEYID = 1
8,606,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,820 UART: [ldev] --
10,416,929 UART: [fwproc] Wait for Commands...
10,418,595 UART: [fwproc] Recv command 0x46574c44
10,420,694 UART: [fwproc] Recv'd Img size: 114084 bytes
10,482,142 UART: ROM Fatal Error: 0x000B0003
10,485,283 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,398,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,285,640 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,627 UART:
192,990 UART: Running Caliptra ROM ...
194,203 UART:
603,680 UART: [state] CFI Enabled
615,732 UART: [state] LifecycleState = Production
617,508 UART: [state] DebugLocked = No
619,321 UART: [state] WD Timer not started. Device not locked for debugging
622,217 UART: [kat] SHA2-256
801,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,888 UART: [kat] ++
813,420 UART: [kat] sha1
824,576 UART: [kat] SHA2-256
827,632 UART: [kat] SHA2-384
833,606 UART: [kat] SHA2-512-ACC
836,542 UART: [kat] ECC-384
3,280,262 UART: [kat] HMAC-384Kdf
3,292,609 UART: [kat] LMS
3,822,113 UART: [kat] --
3,827,181 UART: [cold-reset] ++
3,829,224 UART: [fht] FHT @ 0x50003400
3,840,284 UART: [idev] ++
3,840,890 UART: [idev] CDI.KEYID = 6
3,841,785 UART: [idev] SUBJECT.KEYID = 7
3,843,004 UART: [idev] UDS.KEYID = 0
3,845,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,296 UART: [idev] Erasing UDS.KEYID = 0
6,312,610 UART: [idev] Sha1 KeyId Algorithm
6,336,117 UART: [idev] --
6,340,061 UART: [ldev] ++
6,340,633 UART: [ldev] CDI.KEYID = 6
6,341,694 UART: [ldev] SUBJECT.KEYID = 5
6,342,801 UART: [ldev] AUTHORITY.KEYID = 7
6,343,983 UART: [ldev] FE.KEYID = 1
6,354,790 UART: [ldev] Erasing FE.KEYID = 1
8,828,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,024 UART: [ldev] --
10,620,106 UART: [fwproc] Wait for Commands...
10,623,192 UART: [fwproc] Recv command 0x46574c44
10,625,294 UART: [fwproc] Recv'd Img size: 114084 bytes
10,685,721 UART: ROM Fatal Error: 0x000B0003
10,688,810 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,697,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,461,940 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,042 UART:
192,404 UART: Running Caliptra ROM ...
193,564 UART:
193,709 UART: [state] CFI Enabled
261,059 UART: [state] LifecycleState = Production
263,280 UART: [state] DebugLocked = No
265,042 UART: [state] WD Timer not started. Device not locked for debugging
269,856 UART: [kat] SHA2-256
459,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,481 UART: [kat] ++
470,962 UART: [kat] sha1
481,845 UART: [kat] SHA2-256
484,908 UART: [kat] SHA2-384
490,886 UART: [kat] SHA2-512-ACC
493,443 UART: [kat] ECC-384
2,949,794 UART: [kat] HMAC-384Kdf
2,973,428 UART: [kat] LMS
3,505,191 UART: [kat] --
3,510,338 UART: [cold-reset] ++
3,511,623 UART: [fht] FHT @ 0x50003400
3,523,360 UART: [idev] ++
3,524,031 UART: [idev] CDI.KEYID = 6
3,525,002 UART: [idev] SUBJECT.KEYID = 7
3,526,220 UART: [idev] UDS.KEYID = 0
3,531,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,675,762 UART: [idev] Erasing UDS.KEYID = 0
6,026,399 UART: [idev] Sha1 KeyId Algorithm
6,049,200 UART: [idev] --
6,054,912 UART: [ldev] ++
6,055,607 UART: [ldev] CDI.KEYID = 6
6,056,520 UART: [ldev] SUBJECT.KEYID = 5
6,057,622 UART: [ldev] AUTHORITY.KEYID = 7
6,058,909 UART: [ldev] FE.KEYID = 1
6,102,416 UART: [ldev] Erasing FE.KEYID = 1
8,609,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,118 UART: [ldev] --
10,418,361 UART: [fwproc] Wait for Commands...
10,420,506 UART: [fwproc] Recv command 0x46574c44
10,422,770 UART: [fwproc] Recv'd Img size: 114084 bytes
10,512,091 UART: ROM Fatal Error: 0x000B0003
10,515,780 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,442,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,303,506 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,520 UART:
192,892 UART: Running Caliptra ROM ...
194,082 UART:
603,882 UART: [state] CFI Enabled
617,116 UART: [state] LifecycleState = Production
619,322 UART: [state] DebugLocked = No
622,240 UART: [state] WD Timer not started. Device not locked for debugging
627,348 UART: [kat] SHA2-256
817,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,982 UART: [kat] ++
828,482 UART: [kat] sha1
841,282 UART: [kat] SHA2-256
844,297 UART: [kat] SHA2-384
851,732 UART: [kat] SHA2-512-ACC
854,339 UART: [kat] ECC-384
3,294,401 UART: [kat] HMAC-384Kdf
3,307,986 UART: [kat] LMS
3,839,775 UART: [kat] --
3,843,821 UART: [cold-reset] ++
3,845,801 UART: [fht] FHT @ 0x50003400
3,857,963 UART: [idev] ++
3,858,639 UART: [idev] CDI.KEYID = 6
3,859,654 UART: [idev] SUBJECT.KEYID = 7
3,860,752 UART: [idev] UDS.KEYID = 0
3,866,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,010,068 UART: [idev] Erasing UDS.KEYID = 0
6,343,095 UART: [idev] Sha1 KeyId Algorithm
6,365,907 UART: [idev] --
6,370,098 UART: [ldev] ++
6,370,787 UART: [ldev] CDI.KEYID = 6
6,371,715 UART: [ldev] SUBJECT.KEYID = 5
6,372,893 UART: [ldev] AUTHORITY.KEYID = 7
6,374,071 UART: [ldev] FE.KEYID = 1
6,385,803 UART: [ldev] Erasing FE.KEYID = 1
8,868,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,591 UART: [ldev] --
10,659,556 UART: [fwproc] Wait for Commands...
10,662,360 UART: [fwproc] Recv command 0x46574c44
10,664,619 UART: [fwproc] Recv'd Img size: 114084 bytes
10,760,302 UART: ROM Fatal Error: 0x000B0003
10,764,014 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,754,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,522,253 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Production
85,749 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,821 UART: [kat] SHA2-256
881,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,867 UART: [kat] ++
886,019 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,942 UART: [kat] SHA2-512-ACC
896,843 UART: [kat] ECC-384
902,134 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,476,031 UART: [cold-reset] ++
1,476,451 UART: [fht] Storing FHT @ 0x50003400
1,479,422 UART: [idev] ++
1,479,590 UART: [idev] CDI.KEYID = 6
1,479,950 UART: [idev] SUBJECT.KEYID = 7
1,480,374 UART: [idev] UDS.KEYID = 0
1,480,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,148 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,992 UART: [idev] --
1,513,837 UART: [ldev] ++
1,514,005 UART: [ldev] CDI.KEYID = 6
1,514,368 UART: [ldev] SUBJECT.KEYID = 5
1,514,794 UART: [ldev] AUTHORITY.KEYID = 7
1,515,257 UART: [ldev] FE.KEYID = 1
1,520,333 UART: [ldev] Erasing FE.KEYID = 1
1,546,326 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,905 UART: [fwproc] Waiting for Commands...
1,586,662 UART: [fwproc] Received command 0x46574c44
1,587,453 UART: [fwproc] Received Image of size 114084 bytes
1,608,137 UART: ROM Fatal Error: 0x000B0003
1,609,294 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,461,595 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Production
85,654 UART: [state] DebugLocked = No
86,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,746 UART: [kat] SHA2-256
881,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,792 UART: [kat] ++
885,944 UART: [kat] sha1
890,272 UART: [kat] SHA2-256
892,210 UART: [kat] SHA2-384
894,795 UART: [kat] SHA2-512-ACC
896,696 UART: [kat] ECC-384
902,369 UART: [kat] HMAC-384Kdf
907,183 UART: [kat] LMS
1,475,379 UART: [kat] --
1,476,252 UART: [cold-reset] ++
1,476,738 UART: [fht] Storing FHT @ 0x50003400
1,479,461 UART: [idev] ++
1,479,629 UART: [idev] CDI.KEYID = 6
1,479,989 UART: [idev] SUBJECT.KEYID = 7
1,480,413 UART: [idev] UDS.KEYID = 0
1,480,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,183 UART: [idev] Erasing UDS.KEYID = 0
1,505,321 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,945 UART: [idev] --
1,515,120 UART: [ldev] ++
1,515,288 UART: [ldev] CDI.KEYID = 6
1,515,651 UART: [ldev] SUBJECT.KEYID = 5
1,516,077 UART: [ldev] AUTHORITY.KEYID = 7
1,516,540 UART: [ldev] FE.KEYID = 1
1,521,954 UART: [ldev] Erasing FE.KEYID = 1
1,547,839 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,991 UART: [ldev] --
1,587,292 UART: [fwproc] Waiting for Commands...
1,588,157 UART: [fwproc] Received command 0x46574c44
1,588,948 UART: [fwproc] Received Image of size 114084 bytes
1,609,802 UART: ROM Fatal Error: 0x000B0003
1,610,959 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,462,336 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Production
85,253 UART: [state] DebugLocked = No
85,931 UART: [state] WD Timer not started. Device not locked for debugging
87,262 UART: [kat] SHA2-256
892,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,037 UART: [kat] ++
897,189 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,631 UART: [cold-reset] ++
1,172,207 UART: [fht] FHT @ 0x50003400
1,174,794 UART: [idev] ++
1,174,962 UART: [idev] CDI.KEYID = 6
1,175,322 UART: [idev] SUBJECT.KEYID = 7
1,175,746 UART: [idev] UDS.KEYID = 0
1,176,091 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,581 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,210,149 UART: [ldev] ++
1,210,317 UART: [ldev] CDI.KEYID = 6
1,210,680 UART: [ldev] SUBJECT.KEYID = 5
1,211,106 UART: [ldev] AUTHORITY.KEYID = 7
1,211,569 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,243,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,432 UART: ROM Fatal Error: 0x000B0003
1,305,589 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,812 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Production
86,412 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
894,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,156 UART: [kat] ++
898,308 UART: [kat] sha1
902,666 UART: [kat] SHA2-256
904,606 UART: [kat] SHA2-384
907,365 UART: [kat] SHA2-512-ACC
909,266 UART: [kat] ECC-384
918,849 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,568 UART: [cold-reset] ++
1,173,126 UART: [fht] FHT @ 0x50003400
1,175,777 UART: [idev] ++
1,175,945 UART: [idev] CDI.KEYID = 6
1,176,305 UART: [idev] SUBJECT.KEYID = 7
1,176,729 UART: [idev] UDS.KEYID = 0
1,177,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,537 UART: [idev] Erasing UDS.KEYID = 0
1,202,204 UART: [idev] Sha1 KeyId Algorithm
1,210,784 UART: [idev] --
1,211,938 UART: [ldev] ++
1,212,106 UART: [ldev] CDI.KEYID = 6
1,212,469 UART: [ldev] SUBJECT.KEYID = 5
1,212,895 UART: [ldev] AUTHORITY.KEYID = 7
1,213,358 UART: [ldev] FE.KEYID = 1
1,218,616 UART: [ldev] Erasing FE.KEYID = 1
1,245,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,858 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,971 UART: [fwproc] Recv command 0x46574c44
1,285,699 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,141 UART: ROM Fatal Error: 0x000B0003
1,307,298 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,757 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Production
86,135 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,643 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,528 UART: [ldev] ++
1,209,696 UART: [ldev] CDI.KEYID = 6
1,210,060 UART: [ldev] SUBJECT.KEYID = 5
1,210,487 UART: [ldev] AUTHORITY.KEYID = 7
1,210,950 UART: [ldev] FE.KEYID = 1
1,216,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,172 UART: [ldev] --
1,282,468 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,537 UART: ROM Fatal Error: 0x000B0003
1,305,694 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,727 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Production
86,218 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,779 UART: [kat] LMS
1,169,091 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,876 UART: [idev] ++
1,173,044 UART: [idev] CDI.KEYID = 6
1,173,405 UART: [idev] SUBJECT.KEYID = 7
1,173,830 UART: [idev] UDS.KEYID = 0
1,174,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,812 UART: [idev] --
1,208,911 UART: [ldev] ++
1,209,079 UART: [ldev] CDI.KEYID = 6
1,209,443 UART: [ldev] SUBJECT.KEYID = 5
1,209,870 UART: [ldev] AUTHORITY.KEYID = 7
1,210,333 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,481 UART: [fwproc] Wait for Commands...
1,282,142 UART: [fwproc] Recv command 0x46574c44
1,282,875 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,230 UART: ROM Fatal Error: 0x000B0003
1,304,387 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,156,490 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,180 UART:
192,533 UART: Running Caliptra ROM ...
193,683 UART:
193,833 UART: [state] CFI Enabled
262,984 UART: [state] LifecycleState = Production
264,748 UART: [state] DebugLocked = No
266,885 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,736 UART: [kat] SHA2-256
441,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,952 UART: [kat] ++
452,426 UART: [kat] sha1
463,253 UART: [kat] SHA2-256
465,933 UART: [kat] SHA2-384
472,610 UART: [kat] SHA2-512-ACC
474,959 UART: [kat] ECC-384
2,767,356 UART: [kat] HMAC-384Kdf
2,800,006 UART: [kat] LMS
3,990,351 UART: [kat] --
3,995,890 UART: [cold-reset] ++
3,996,807 UART: [fht] Storing FHT @ 0x50003400
4,008,622 UART: [idev] ++
4,009,198 UART: [idev] CDI.KEYID = 6
4,010,222 UART: [idev] SUBJECT.KEYID = 7
4,011,386 UART: [idev] UDS.KEYID = 0
4,014,242 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,555 UART: [idev] Erasing UDS.KEYID = 0
7,345,061 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,273 UART: [idev] --
7,371,228 UART: [ldev] ++
7,371,808 UART: [ldev] CDI.KEYID = 6
7,372,695 UART: [ldev] SUBJECT.KEYID = 5
7,373,966 UART: [ldev] AUTHORITY.KEYID = 7
7,375,177 UART: [ldev] FE.KEYID = 1
7,421,808 UART: [ldev] Erasing FE.KEYID = 1
10,755,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,444 UART: [ldev] --
13,134,899 UART: [fwproc] Waiting for Commands...
13,137,644 UART: [fwproc] Received command 0x46574c44
13,139,841 UART: [fwproc] Received Image of size 113760 bytes
13,232,308 UART: ROM Fatal Error: 0x000B0005
13,235,836 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,806,054 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,961,619 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
5,110 writing to cptra_bootfsm_go
194,349 UART:
194,724 UART: Running Caliptra ROM ...
195,915 UART:
605,574 UART: [state] CFI Enabled
621,789 UART: [state] LifecycleState = Production
623,569 UART: [state] DebugLocked = No
625,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,555 UART: [kat] SHA2-256
799,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,841 UART: [kat] ++
810,306 UART: [kat] sha1
820,587 UART: [kat] SHA2-256
823,267 UART: [kat] SHA2-384
829,080 UART: [kat] SHA2-512-ACC
831,475 UART: [kat] ECC-384
3,114,523 UART: [kat] HMAC-384Kdf
3,125,801 UART: [kat] LMS
4,315,901 UART: [kat] --
4,320,387 UART: [cold-reset] ++
4,322,163 UART: [fht] Storing FHT @ 0x50003400
4,334,603 UART: [idev] ++
4,335,188 UART: [idev] CDI.KEYID = 6
4,336,112 UART: [idev] SUBJECT.KEYID = 7
4,337,325 UART: [idev] UDS.KEYID = 0
4,340,189 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,737 UART: [idev] Erasing UDS.KEYID = 0
7,626,797 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,415 UART: [idev] --
7,652,118 UART: [ldev] ++
7,652,740 UART: [ldev] CDI.KEYID = 6
7,653,681 UART: [ldev] SUBJECT.KEYID = 5
7,654,891 UART: [ldev] AUTHORITY.KEYID = 7
7,656,124 UART: [ldev] FE.KEYID = 1
7,669,871 UART: [ldev] Erasing FE.KEYID = 1
10,955,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,556 UART: [ldev] --
13,318,145 UART: [fwproc] Waiting for Commands...
13,320,133 UART: [fwproc] Received command 0x46574c44
13,322,322 UART: [fwproc] Received Image of size 113760 bytes
13,413,371 UART: ROM Fatal Error: 0x000B0005
13,416,890 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,126,970 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,160,254 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,328 UART:
192,684 UART: Running Caliptra ROM ...
193,825 UART:
193,972 UART: [state] CFI Enabled
265,218 UART: [state] LifecycleState = Production
267,024 UART: [state] DebugLocked = No
269,057 UART: [state] WD Timer not started. Device not locked for debugging
272,187 UART: [kat] SHA2-256
451,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,915 UART: [kat] ++
463,364 UART: [kat] sha1
474,668 UART: [kat] SHA2-256
477,674 UART: [kat] SHA2-384
484,645 UART: [kat] SHA2-512-ACC
487,585 UART: [kat] ECC-384
2,947,964 UART: [kat] HMAC-384Kdf
2,973,162 UART: [kat] LMS
3,502,593 UART: [kat] --
3,507,934 UART: [cold-reset] ++
3,508,885 UART: [fht] FHT @ 0x50003400
3,519,402 UART: [idev] ++
3,519,969 UART: [idev] CDI.KEYID = 6
3,520,850 UART: [idev] SUBJECT.KEYID = 7
3,522,062 UART: [idev] UDS.KEYID = 0
3,524,795 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,487 UART: [idev] Erasing UDS.KEYID = 0
6,028,359 UART: [idev] Sha1 KeyId Algorithm
6,050,355 UART: [idev] --
6,054,838 UART: [ldev] ++
6,055,433 UART: [ldev] CDI.KEYID = 6
6,056,348 UART: [ldev] SUBJECT.KEYID = 5
6,057,509 UART: [ldev] AUTHORITY.KEYID = 7
6,058,918 UART: [ldev] FE.KEYID = 1
6,102,524 UART: [ldev] Erasing FE.KEYID = 1
8,606,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,480 UART: [ldev] --
10,417,045 UART: [fwproc] Wait for Commands...
10,418,820 UART: [fwproc] Recv command 0x46574c44
10,420,859 UART: [fwproc] Recv'd Img size: 114084 bytes
10,509,235 UART: ROM Fatal Error: 0x000B0005
10,512,379 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,386,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,295,502 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,557 UART:
193,038 UART: Running Caliptra ROM ...
194,176 UART:
603,797 UART: [state] CFI Enabled
620,685 UART: [state] LifecycleState = Production
622,432 UART: [state] DebugLocked = No
624,356 UART: [state] WD Timer not started. Device not locked for debugging
628,433 UART: [kat] SHA2-256
807,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,150 UART: [kat] ++
819,683 UART: [kat] sha1
829,868 UART: [kat] SHA2-256
832,894 UART: [kat] SHA2-384
839,722 UART: [kat] SHA2-512-ACC
842,666 UART: [kat] ECC-384
3,283,891 UART: [kat] HMAC-384Kdf
3,296,886 UART: [kat] LMS
3,826,381 UART: [kat] --
3,829,770 UART: [cold-reset] ++
3,831,608 UART: [fht] FHT @ 0x50003400
3,842,269 UART: [idev] ++
3,842,835 UART: [idev] CDI.KEYID = 6
3,843,752 UART: [idev] SUBJECT.KEYID = 7
3,844,933 UART: [idev] UDS.KEYID = 0
3,848,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,642 UART: [idev] Erasing UDS.KEYID = 0
6,312,175 UART: [idev] Sha1 KeyId Algorithm
6,336,391 UART: [idev] --
6,339,252 UART: [ldev] ++
6,339,824 UART: [ldev] CDI.KEYID = 6
6,340,705 UART: [ldev] SUBJECT.KEYID = 5
6,341,927 UART: [ldev] AUTHORITY.KEYID = 7
6,343,159 UART: [ldev] FE.KEYID = 1
6,350,625 UART: [ldev] Erasing FE.KEYID = 1
8,827,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,559 UART: [ldev] --
10,617,537 UART: [fwproc] Wait for Commands...
10,619,639 UART: [fwproc] Recv command 0x46574c44
10,621,741 UART: [fwproc] Recv'd Img size: 114084 bytes
10,710,763 UART: ROM Fatal Error: 0x000B0005
10,713,907 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,696,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,508,168 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,108 UART:
192,462 UART: Running Caliptra ROM ...
193,654 UART:
193,810 UART: [state] CFI Enabled
262,434 UART: [state] LifecycleState = Production
264,755 UART: [state] DebugLocked = No
266,927 UART: [state] WD Timer not started. Device not locked for debugging
270,801 UART: [kat] SHA2-256
460,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,439 UART: [kat] ++
471,923 UART: [kat] sha1
483,351 UART: [kat] SHA2-256
486,366 UART: [kat] SHA2-384
491,485 UART: [kat] SHA2-512-ACC
494,057 UART: [kat] ECC-384
2,947,291 UART: [kat] HMAC-384Kdf
2,972,859 UART: [kat] LMS
3,504,618 UART: [kat] --
3,509,482 UART: [cold-reset] ++
3,510,657 UART: [fht] FHT @ 0x50003400
3,522,511 UART: [idev] ++
3,523,185 UART: [idev] CDI.KEYID = 6
3,524,123 UART: [idev] SUBJECT.KEYID = 7
3,525,353 UART: [idev] UDS.KEYID = 0
3,528,040 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,749 UART: [idev] Erasing UDS.KEYID = 0
6,028,811 UART: [idev] Sha1 KeyId Algorithm
6,052,315 UART: [idev] --
6,057,722 UART: [ldev] ++
6,058,408 UART: [ldev] CDI.KEYID = 6
6,059,329 UART: [ldev] SUBJECT.KEYID = 5
6,060,496 UART: [ldev] AUTHORITY.KEYID = 7
6,061,738 UART: [ldev] FE.KEYID = 1
6,103,085 UART: [ldev] Erasing FE.KEYID = 1
8,610,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,871 UART: [ldev] --
10,417,450 UART: [fwproc] Wait for Commands...
10,419,981 UART: [fwproc] Recv command 0x46574c44
10,422,304 UART: [fwproc] Recv'd Img size: 114084 bytes
10,543,286 UART: ROM Fatal Error: 0x000B0005
10,546,957 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,440,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,345,204 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,550 UART:
192,908 UART: Running Caliptra ROM ...
194,000 UART:
603,613 UART: [state] CFI Enabled
617,211 UART: [state] LifecycleState = Production
619,446 UART: [state] DebugLocked = No
620,881 UART: [state] WD Timer not started. Device not locked for debugging
626,064 UART: [kat] SHA2-256
815,963 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,713 UART: [kat] ++
827,249 UART: [kat] sha1
837,159 UART: [kat] SHA2-256
840,164 UART: [kat] SHA2-384
845,275 UART: [kat] SHA2-512-ACC
847,894 UART: [kat] ECC-384
3,285,841 UART: [kat] HMAC-384Kdf
3,298,235 UART: [kat] LMS
3,830,074 UART: [kat] --
3,836,926 UART: [cold-reset] ++
3,837,853 UART: [fht] FHT @ 0x50003400
3,849,371 UART: [idev] ++
3,850,047 UART: [idev] CDI.KEYID = 6
3,851,017 UART: [idev] SUBJECT.KEYID = 7
3,852,185 UART: [idev] UDS.KEYID = 0
3,854,875 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,998,380 UART: [idev] Erasing UDS.KEYID = 0
6,330,703 UART: [idev] Sha1 KeyId Algorithm
6,353,730 UART: [idev] --
6,359,089 UART: [ldev] ++
6,359,773 UART: [ldev] CDI.KEYID = 6
6,360,693 UART: [ldev] SUBJECT.KEYID = 5
6,361,855 UART: [ldev] AUTHORITY.KEYID = 7
6,363,089 UART: [ldev] FE.KEYID = 1
6,372,823 UART: [ldev] Erasing FE.KEYID = 1
8,846,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,965 UART: [ldev] --
10,641,292 UART: [fwproc] Wait for Commands...
10,644,475 UART: [fwproc] Recv command 0x46574c44
10,646,734 UART: [fwproc] Recv'd Img size: 114084 bytes
10,769,217 UART: ROM Fatal Error: 0x000B0005
10,772,844 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,759,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,555,222 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Production
85,751 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,405 UART: [kat] SHA2-256
892,343 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,148 UART: [kat] LMS
1,475,344 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,837 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,728 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,330 UART: [idev] --
1,515,477 UART: [ldev] ++
1,515,645 UART: [ldev] CDI.KEYID = 6
1,516,008 UART: [ldev] SUBJECT.KEYID = 5
1,516,434 UART: [ldev] AUTHORITY.KEYID = 7
1,516,897 UART: [ldev] FE.KEYID = 1
1,522,187 UART: [ldev] Erasing FE.KEYID = 1
1,547,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,851 UART: [fwproc] Waiting for Commands...
1,587,466 UART: [fwproc] Received command 0x46574c44
1,588,257 UART: [fwproc] Received Image of size 114084 bytes
1,633,486 UART: ROM Fatal Error: 0x000B0005
1,634,643 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,485,724 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Production
86,472 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,788 UART: [kat] SHA2-256
882,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,834 UART: [kat] ++
886,986 UART: [kat] sha1
891,168 UART: [kat] SHA2-256
893,106 UART: [kat] SHA2-384
895,801 UART: [kat] SHA2-512-ACC
897,702 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
908,131 UART: [kat] LMS
1,476,327 UART: [kat] --
1,477,040 UART: [cold-reset] ++
1,477,464 UART: [fht] Storing FHT @ 0x50003400
1,480,239 UART: [idev] ++
1,480,407 UART: [idev] CDI.KEYID = 6
1,480,767 UART: [idev] SUBJECT.KEYID = 7
1,481,191 UART: [idev] UDS.KEYID = 0
1,481,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,339 UART: [idev] Erasing UDS.KEYID = 0
1,505,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,499 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,449 UART: [ldev] --
1,586,714 UART: [fwproc] Waiting for Commands...
1,587,335 UART: [fwproc] Received command 0x46574c44
1,588,126 UART: [fwproc] Received Image of size 114084 bytes
1,633,319 UART: ROM Fatal Error: 0x000B0005
1,634,476 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,340 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,319 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Production
85,757 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
893,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,497 UART: [kat] ++
897,649 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
918,360 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,213 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,152 UART: [idev] ++
1,175,320 UART: [idev] CDI.KEYID = 6
1,175,680 UART: [idev] SUBJECT.KEYID = 7
1,176,104 UART: [idev] UDS.KEYID = 0
1,176,449 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,201,231 UART: [idev] Sha1 KeyId Algorithm
1,209,615 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,282,990 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,721 UART: ROM Fatal Error: 0x000B0005
1,329,878 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,241 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Production
86,158 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,581 UART: [kat] LMS
1,171,909 UART: [kat] --
1,172,628 UART: [cold-reset] ++
1,173,160 UART: [fht] FHT @ 0x50003400
1,175,943 UART: [idev] ++
1,176,111 UART: [idev] CDI.KEYID = 6
1,176,471 UART: [idev] SUBJECT.KEYID = 7
1,176,895 UART: [idev] UDS.KEYID = 0
1,177,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,065 UART: [idev] Erasing UDS.KEYID = 0
1,202,216 UART: [idev] Sha1 KeyId Algorithm
1,210,584 UART: [idev] --
1,211,614 UART: [ldev] ++
1,211,782 UART: [ldev] CDI.KEYID = 6
1,212,145 UART: [ldev] SUBJECT.KEYID = 5
1,212,571 UART: [ldev] AUTHORITY.KEYID = 7
1,213,034 UART: [ldev] FE.KEYID = 1
1,218,268 UART: [ldev] Erasing FE.KEYID = 1
1,245,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,161 UART: [fwproc] Wait for Commands...
1,284,937 UART: [fwproc] Recv command 0x46574c44
1,285,665 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,700 UART: ROM Fatal Error: 0x000B0005
1,331,857 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,434 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Production
86,211 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,998 UART: [kat] SHA2-512-ACC
906,899 UART: [kat] ECC-384
916,984 UART: [kat] HMAC-384Kdf
921,564 UART: [kat] LMS
1,169,876 UART: [kat] --
1,170,891 UART: [cold-reset] ++
1,171,309 UART: [fht] FHT @ 0x50003400
1,173,823 UART: [idev] ++
1,173,991 UART: [idev] CDI.KEYID = 6
1,174,352 UART: [idev] SUBJECT.KEYID = 7
1,174,777 UART: [idev] UDS.KEYID = 0
1,175,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,377 UART: [idev] Erasing UDS.KEYID = 0
1,199,975 UART: [idev] Sha1 KeyId Algorithm
1,208,861 UART: [idev] --
1,210,010 UART: [ldev] ++
1,210,178 UART: [ldev] CDI.KEYID = 6
1,210,542 UART: [ldev] SUBJECT.KEYID = 5
1,210,969 UART: [ldev] AUTHORITY.KEYID = 7
1,211,432 UART: [ldev] FE.KEYID = 1
1,216,492 UART: [ldev] Erasing FE.KEYID = 1
1,242,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,760 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,073 UART: ROM Fatal Error: 0x000B0005
1,329,230 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,573 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Production
86,236 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,174,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,094 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,820 UART: [fwproc] Recv command 0x46574c44
1,283,553 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,900 UART: ROM Fatal Error: 0x000B0005
1,329,057 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,422 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
4,879,938 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,644,481 >>> mbox cmd response: failed
16,645,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,645,530 >>> mbox cmd response: failed
16,645,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,646,087 >>> mbox cmd response: failed
Initializing fuses
2,061,740 writing to cptra_bootfsm_go
6,937,811 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,496,157 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
4,881,859 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,672,885 >>> mbox cmd response: failed
16,673,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,674,214 >>> mbox cmd response: failed
16,674,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,674,780 >>> mbox cmd response: failed
Initializing fuses
2,056,234 writing to cptra_bootfsm_go
6,931,178 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,481,153 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
5,187,869 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,812,400 >>> mbox cmd response: failed
16,813,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,813,417 >>> mbox cmd response: failed
16,813,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,813,985 >>> mbox cmd response: failed
Initializing fuses
2,056,855 writing to cptra_bootfsm_go
8,238,700 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,670,479 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
5,192,607 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,812,829 >>> mbox cmd response: failed
16,813,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,813,792 >>> mbox cmd response: failed
16,814,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,814,366 >>> mbox cmd response: failed
Initializing fuses
2,063,931 writing to cptra_bootfsm_go
8,227,986 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,661,212 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,464,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,434,700 >>> mbox cmd response: failed
12,435,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,435,701 >>> mbox cmd response: failed
12,435,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,255 >>> mbox cmd response: failed
Initializing fuses
2,064,683 writing to cptra_bootfsm_go
5,484,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,328,284 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,440,237 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,412,268 >>> mbox cmd response: failed
12,413,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,413,399 >>> mbox cmd response: failed
12,413,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,413,969 >>> mbox cmd response: failed
Initializing fuses
2,059,436 writing to cptra_bootfsm_go
5,512,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,315,369 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,789,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,658,191 >>> mbox cmd response: failed
12,658,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,317 >>> mbox cmd response: failed
12,659,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,898 >>> mbox cmd response: failed
Initializing fuses
2,055,311 writing to cptra_bootfsm_go
10,977,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,709,357 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
3,783,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,631,657 >>> mbox cmd response: failed
12,632,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,632,534 >>> mbox cmd response: failed
12,632,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,633,099 >>> mbox cmd response: failed
Initializing fuses
2,054,321 writing to cptra_bootfsm_go
11,020,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,732,907 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
3,465,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,404,750 >>> mbox cmd response: failed
12,405,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,405,799 >>> mbox cmd response: failed
12,406,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,406,370 >>> mbox cmd response: failed
Initializing fuses
2,064,132 writing to cptra_bootfsm_go
5,521,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,370,910 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,462,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,421,808 >>> mbox cmd response: failed
12,422,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,422,800 >>> mbox cmd response: failed
12,423,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,423,369 >>> mbox cmd response: failed
Initializing fuses
2,057,136 writing to cptra_bootfsm_go
5,487,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,288,371 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,796,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,676,585 >>> mbox cmd response: failed
12,677,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,513 >>> mbox cmd response: failed
12,677,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,678,072 >>> mbox cmd response: failed
Initializing fuses
2,056,423 writing to cptra_bootfsm_go
10,982,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,699,775 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,791,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,676,032 >>> mbox cmd response: failed
12,676,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,155 >>> mbox cmd response: failed
12,677,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,717 >>> mbox cmd response: failed
Initializing fuses
2,062,307 writing to cptra_bootfsm_go
10,978,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,717,156 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,208,544 >>> mbox cmd response: failed
1,208,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,550 >>> mbox cmd response: failed
1,208,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,265 UART: [kat] SHA2-256
882,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,311 UART: [kat] ++
886,463 UART: [kat] sha1
890,947 UART: [kat] SHA2-256
892,885 UART: [kat] SHA2-384
895,596 UART: [kat] SHA2-512-ACC
897,497 UART: [kat] ECC-384
903,358 UART: [kat] HMAC-384Kdf
907,898 UART: [kat] LMS
1,476,094 UART: [kat] --
1,477,187 UART: [cold-reset] ++
1,477,641 UART: [fht] Storing FHT @ 0x50003400
1,480,536 UART: [idev] ++
1,480,704 UART: [idev] CDI.KEYID = 6
1,481,064 UART: [idev] SUBJECT.KEYID = 7
1,481,488 UART: [idev] UDS.KEYID = 0
1,481,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,662 UART: [idev] Erasing UDS.KEYID = 0
1,506,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,980 UART: [idev] --
1,516,093 UART: [ldev] ++
1,516,261 UART: [ldev] CDI.KEYID = 6
1,516,624 UART: [ldev] SUBJECT.KEYID = 5
1,517,050 UART: [ldev] AUTHORITY.KEYID = 7
1,517,513 UART: [ldev] FE.KEYID = 1
1,522,613 UART: [ldev] Erasing FE.KEYID = 1
1,547,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,422 UART: [ldev] --
1,586,921 UART: [fwproc] Waiting for Commands...
1,587,708 UART: [fwproc] Received command 0x46574c44
1,588,499 UART: [fwproc] Received Image of size 114084 bytes
2,883,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,461 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,207,494 >>> mbox cmd response: failed
1,207,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,500 >>> mbox cmd response: failed
1,207,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,481 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,751 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,208,083 >>> mbox cmd response: failed
1,208,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,089 >>> mbox cmd response: failed
1,208,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,794 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,608 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,683 UART: [idev] Erasing UDS.KEYID = 0
1,504,669 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,293 UART: [idev] --
1,514,440 UART: [ldev] ++
1,514,608 UART: [ldev] CDI.KEYID = 6
1,514,971 UART: [ldev] SUBJECT.KEYID = 5
1,515,397 UART: [ldev] AUTHORITY.KEYID = 7
1,515,860 UART: [ldev] FE.KEYID = 1
1,520,940 UART: [ldev] Erasing FE.KEYID = 1
1,545,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,907 UART: [ldev] --
1,585,200 UART: [fwproc] Waiting for Commands...
1,585,985 UART: [fwproc] Received command 0x46574c44
1,586,776 UART: [fwproc] Received Image of size 114084 bytes
2,880,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,936,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,434 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,206,361 >>> mbox cmd response: failed
1,206,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,367 >>> mbox cmd response: failed
1,206,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,656 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,207,392 >>> mbox cmd response: failed
1,207,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,398 >>> mbox cmd response: failed
1,207,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,404 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,598 UART: [kat] LMS
1,170,926 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,189 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,236 UART: [idev] Erasing UDS.KEYID = 0
1,200,915 UART: [idev] Sha1 KeyId Algorithm
1,209,323 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,241 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,386 UART: [fwproc] Recv command 0x46574c44
1,284,114 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,024 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,207,606 >>> mbox cmd response: failed
1,207,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,612 >>> mbox cmd response: failed
1,207,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,501 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,095 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,820 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,206,749 >>> mbox cmd response: failed
1,206,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,755 >>> mbox cmd response: failed
1,206,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,763 UART: [kat] SHA2-512-ACC
908,664 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
922,947 UART: [kat] LMS
1,171,275 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,179 UART: [idev] Erasing UDS.KEYID = 0
1,201,464 UART: [idev] Sha1 KeyId Algorithm
1,209,994 UART: [idev] --
1,211,146 UART: [ldev] ++
1,211,314 UART: [ldev] CDI.KEYID = 6
1,211,677 UART: [ldev] SUBJECT.KEYID = 5
1,212,103 UART: [ldev] AUTHORITY.KEYID = 7
1,212,566 UART: [ldev] FE.KEYID = 1
1,217,738 UART: [ldev] Erasing FE.KEYID = 1
1,244,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,144 UART: [ldev] --
1,283,629 UART: [fwproc] Wait for Commands...
1,284,309 UART: [fwproc] Recv command 0x46574c44
1,285,037 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,081 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,208,659 >>> mbox cmd response: failed
1,208,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,665 >>> mbox cmd response: failed
1,208,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,312 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,207,252 >>> mbox cmd response: failed
1,207,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,258 >>> mbox cmd response: failed
1,207,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,776 UART: [state] LifecycleState = Unprovisioned
86,431 UART: [state] DebugLocked = No
87,095 UART: [state] WD Timer not started. Device not locked for debugging
88,260 UART: [kat] SHA2-256
891,810 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,939 UART: [kat] ++
896,091 UART: [kat] sha1
900,485 UART: [kat] SHA2-256
902,425 UART: [kat] SHA2-384
905,164 UART: [kat] SHA2-512-ACC
907,065 UART: [kat] ECC-384
917,308 UART: [kat] HMAC-384Kdf
921,764 UART: [kat] LMS
1,170,076 UART: [kat] --
1,171,113 UART: [cold-reset] ++
1,171,591 UART: [fht] FHT @ 0x50003400
1,174,261 UART: [idev] ++
1,174,429 UART: [idev] CDI.KEYID = 6
1,174,790 UART: [idev] SUBJECT.KEYID = 7
1,175,215 UART: [idev] UDS.KEYID = 0
1,175,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,279 UART: [idev] Erasing UDS.KEYID = 0
1,199,843 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,830 UART: [ldev] ++
1,209,998 UART: [ldev] CDI.KEYID = 6
1,210,362 UART: [ldev] SUBJECT.KEYID = 5
1,210,789 UART: [ldev] AUTHORITY.KEYID = 7
1,211,252 UART: [ldev] FE.KEYID = 1
1,216,616 UART: [ldev] Erasing FE.KEYID = 1
1,242,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,990 UART: [ldev] --
1,282,478 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,826 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,298 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,207,622 >>> mbox cmd response: failed
1,207,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,628 >>> mbox cmd response: failed
1,207,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,568 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,208,510 >>> mbox cmd response: failed
1,208,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,516 >>> mbox cmd response: failed
1,208,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: [kat] ++
896,094 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,466 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,760 UART: [idev] Erasing UDS.KEYID = 0
1,198,704 UART: [idev] Sha1 KeyId Algorithm
1,207,470 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,255 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,785 UART: [fwproc] Wait for Commands...
1,281,538 UART: [fwproc] Recv command 0x46574c44
1,282,271 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,977 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,208,921 >>> mbox cmd response: failed
1,208,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,927 >>> mbox cmd response: failed
1,208,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,933 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,129 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,146 UART:
192,508 UART: Running Caliptra ROM ...
193,690 UART:
193,845 UART: [state] CFI Enabled
263,857 UART: [state] LifecycleState = Unprovisioned
265,820 UART: [state] DebugLocked = No
267,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,347 UART: [kat] SHA2-256
442,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,578 UART: [kat] ++
453,132 UART: [kat] sha1
464,399 UART: [kat] SHA2-256
467,081 UART: [kat] SHA2-384
472,054 UART: [kat] SHA2-512-ACC
474,397 UART: [kat] ECC-384
2,767,564 UART: [kat] HMAC-384Kdf
2,800,290 UART: [kat] LMS
3,990,580 UART: [kat] --
3,994,569 UART: [cold-reset] ++
3,996,997 UART: [fht] Storing FHT @ 0x50003400
4,008,861 UART: [idev] ++
4,009,432 UART: [idev] CDI.KEYID = 6
4,010,349 UART: [idev] SUBJECT.KEYID = 7
4,011,619 UART: [idev] UDS.KEYID = 0
4,014,511 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,826 UART: [idev] Erasing UDS.KEYID = 0
7,348,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,476 UART: [idev] --
7,373,586 UART: [ldev] ++
7,374,158 UART: [ldev] CDI.KEYID = 6
7,375,125 UART: [ldev] SUBJECT.KEYID = 5
7,376,339 UART: [ldev] AUTHORITY.KEYID = 7
7,377,626 UART: [ldev] FE.KEYID = 1
7,424,492 UART: [ldev] Erasing FE.KEYID = 1
10,759,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,088 UART: [ldev] --
13,139,824 UART: [fwproc] Waiting for Commands...
13,142,512 UART: [fwproc] Received command 0x46574c44
13,144,722 UART: [fwproc] Received Image of size 113760 bytes
16,087,716 UART: ROM Fatal Error: 0x000B0014
16,091,170 >>> mbox cmd response: failed
16,091,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,091,918 >>> mbox cmd response: failed
16,092,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,092,486 >>> mbox cmd response: failed
Initializing fuses
2,060,326 writing to cptra_bootfsm_go
2,249,662 UART:
2,250,006 UART: Running Caliptra ROM ...
2,251,145 UART:
2,251,316 UART: [state] CFI Enabled
2,318,762 UART: [state] LifecycleState = Unprovisioned
2,320,698 UART: [state] DebugLocked = No
2,322,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,376 UART: [kat] SHA2-256
2,498,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,591 UART: [kat] ++
2,509,055 UART: [kat] sha1
2,520,163 UART: [kat] SHA2-256
2,522,862 UART: [kat] SHA2-384
2,529,328 UART: [kat] SHA2-512-ACC
2,531,687 UART: [kat] ECC-384
4,822,102 UART: [kat] HMAC-384Kdf
4,855,065 UART: [kat] LMS
6,045,374 UART: [kat] --
6,049,972 UART: [cold-reset] ++
6,052,661 UART: [fht] Storing FHT @ 0x50003400
6,063,892 UART: [idev] ++
6,064,468 UART: [idev] CDI.KEYID = 6
6,065,490 UART: [idev] SUBJECT.KEYID = 7
6,066,651 UART: [idev] UDS.KEYID = 0
6,069,263 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,212,883 UART: [idev] Erasing UDS.KEYID = 0
9,401,409 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,449 UART: [idev] --
9,428,148 UART: [ldev] ++
9,428,720 UART: [ldev] CDI.KEYID = 6
9,429,737 UART: [ldev] SUBJECT.KEYID = 5
9,430,940 UART: [ldev] AUTHORITY.KEYID = 7
9,432,175 UART: [ldev] FE.KEYID = 1
9,476,328 UART: [ldev] Erasing FE.KEYID = 1
12,810,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,121,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,150,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,613 UART: [ldev] --
15,187,860 UART: [fwproc] Waiting for Commands...
15,190,883 UART: [fwproc] Received command 0x46574c44
15,193,070 UART: [fwproc] Received Image of size 113760 bytes
19,239,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,316,213 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,385,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,701,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,807,877 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,844,573 >>> mbox cmd response: failed
15,845,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,460 >>> mbox cmd response: failed
15,845,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,019 >>> mbox cmd response: failed
Initializing fuses
2,048,847 writing to cptra_bootfsm_go
5,838,149 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,895,988 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,493 UART:
192,846 UART: Running Caliptra ROM ...
194,030 UART:
603,558 UART: [state] CFI Enabled
619,869 UART: [state] LifecycleState = Unprovisioned
621,792 UART: [state] DebugLocked = No
624,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,504 UART: [kat] SHA2-256
799,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,805 UART: [kat] ++
810,258 UART: [kat] sha1
822,164 UART: [kat] SHA2-256
824,887 UART: [kat] SHA2-384
829,847 UART: [kat] SHA2-512-ACC
832,183 UART: [kat] ECC-384
3,116,142 UART: [kat] HMAC-384Kdf
3,127,361 UART: [kat] LMS
4,317,465 UART: [kat] --
4,321,218 UART: [cold-reset] ++
4,322,343 UART: [fht] Storing FHT @ 0x50003400
4,333,405 UART: [idev] ++
4,334,008 UART: [idev] CDI.KEYID = 6
4,334,935 UART: [idev] SUBJECT.KEYID = 7
4,336,155 UART: [idev] UDS.KEYID = 0
4,339,158 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,125 UART: [idev] Erasing UDS.KEYID = 0
7,625,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,088 UART: [idev] --
7,652,229 UART: [ldev] ++
7,652,804 UART: [ldev] CDI.KEYID = 6
7,653,824 UART: [ldev] SUBJECT.KEYID = 5
7,654,982 UART: [ldev] AUTHORITY.KEYID = 7
7,656,213 UART: [ldev] FE.KEYID = 1
7,667,399 UART: [ldev] Erasing FE.KEYID = 1
10,958,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,680 UART: [ldev] --
13,319,996 UART: [fwproc] Waiting for Commands...
13,322,903 UART: [fwproc] Received command 0x46574c44
13,325,085 UART: [fwproc] Received Image of size 113760 bytes
16,265,931 UART: ROM Fatal Error: 0x000B0014
16,269,329 >>> mbox cmd response: failed
16,269,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,023 >>> mbox cmd response: failed
16,270,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,601 >>> mbox cmd response: failed
Initializing fuses
2,056,873 writing to cptra_bootfsm_go
2,246,185 UART:
2,246,528 UART: Running Caliptra ROM ...
2,247,690 UART:
4,197,043 UART: [state] CFI Enabled
4,209,512 UART: [state] LifecycleState = Unprovisioned
4,211,424 UART: [state] DebugLocked = No
4,213,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,217,395 UART: [kat] SHA2-256
4,387,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,397,693 UART: [kat] ++
4,398,147 UART: [kat] sha1
4,408,119 UART: [kat] SHA2-256
4,410,828 UART: [kat] SHA2-384
4,416,175 UART: [kat] SHA2-512-ACC
4,418,531 UART: [kat] ECC-384
6,702,671 UART: [kat] HMAC-384Kdf
6,714,260 UART: [kat] LMS
7,904,394 UART: [kat] --
7,909,107 UART: [cold-reset] ++
7,910,178 UART: [fht] Storing FHT @ 0x50003400
7,921,174 UART: [idev] ++
7,921,737 UART: [idev] CDI.KEYID = 6
7,922,707 UART: [idev] SUBJECT.KEYID = 7
7,923,921 UART: [idev] UDS.KEYID = 0
7,926,754 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,070,194 UART: [idev] Erasing UDS.KEYID = 0
11,211,159 UART: [idev] Using Sha1 for KeyId Algorithm
11,234,000 UART: [idev] --
11,238,696 UART: [ldev] ++
11,239,318 UART: [ldev] CDI.KEYID = 6
11,240,260 UART: [ldev] SUBJECT.KEYID = 5
11,241,516 UART: [ldev] AUTHORITY.KEYID = 7
11,242,670 UART: [ldev] FE.KEYID = 1
11,253,068 UART: [ldev] Erasing FE.KEYID = 1
14,543,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,836,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,851,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,866,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,880,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,898,489 UART: [ldev] --
16,902,399 UART: [fwproc] Waiting for Commands...
16,905,314 UART: [fwproc] Received command 0x46574c44
16,907,500 UART: [fwproc] Received Image of size 113760 bytes
20,948,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,030,694 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,099,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,415,507 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
4,128,802 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,030,405 >>> mbox cmd response: failed
16,030,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,333 >>> mbox cmd response: failed
16,031,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,902 >>> mbox cmd response: failed
Initializing fuses
2,051,642 writing to cptra_bootfsm_go
7,962,862 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,888,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,307 UART:
192,662 UART: Running Caliptra ROM ...
193,829 UART:
193,979 UART: [state] CFI Enabled
262,946 UART: [state] LifecycleState = Unprovisioned
264,815 UART: [state] DebugLocked = No
266,260 UART: [state] WD Timer not started. Device not locked for debugging
270,109 UART: [kat] SHA2-256
449,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,803 UART: [kat] ++
461,332 UART: [kat] sha1
471,090 UART: [kat] SHA2-256
474,133 UART: [kat] SHA2-384
479,411 UART: [kat] SHA2-512-ACC
482,393 UART: [kat] ECC-384
2,926,045 UART: [kat] HMAC-384Kdf
2,949,964 UART: [kat] LMS
3,479,450 UART: [kat] --
3,483,936 UART: [cold-reset] ++
3,485,484 UART: [fht] FHT @ 0x50003400
3,495,764 UART: [idev] ++
3,496,329 UART: [idev] CDI.KEYID = 6
3,497,210 UART: [idev] SUBJECT.KEYID = 7
3,498,440 UART: [idev] UDS.KEYID = 0
3,501,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,644,898 UART: [idev] Erasing UDS.KEYID = 0
6,004,936 UART: [idev] Sha1 KeyId Algorithm
6,027,255 UART: [idev] --
6,030,666 UART: [ldev] ++
6,031,244 UART: [ldev] CDI.KEYID = 6
6,032,156 UART: [ldev] SUBJECT.KEYID = 5
6,033,378 UART: [ldev] AUTHORITY.KEYID = 7
6,034,612 UART: [ldev] FE.KEYID = 1
6,079,457 UART: [ldev] Erasing FE.KEYID = 1
8,580,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,310 UART: [ldev] --
10,391,380 UART: [fwproc] Wait for Commands...
10,392,847 UART: [fwproc] Recv command 0x46574c44
10,394,956 UART: [fwproc] Recv'd Img size: 114084 bytes
12,680,060 UART: ROM Fatal Error: 0x000B0014
12,683,185 >>> mbox cmd response: failed
12,683,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,947 >>> mbox cmd response: failed
12,684,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,555 >>> mbox cmd response: failed
Initializing fuses
2,051,961 writing to cptra_bootfsm_go
2,241,278 UART:
2,241,654 UART: Running Caliptra ROM ...
2,242,798 UART:
2,242,966 UART: [state] CFI Enabled
2,301,857 UART: [state] LifecycleState = Unprovisioned
2,303,735 UART: [state] DebugLocked = No
2,305,533 UART: [state] WD Timer not started. Device not locked for debugging
2,308,899 UART: [kat] SHA2-256
2,488,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,568 UART: [kat] ++
2,500,025 UART: [kat] sha1
2,510,915 UART: [kat] SHA2-256
2,513,919 UART: [kat] SHA2-384
2,518,669 UART: [kat] SHA2-512-ACC
2,521,667 UART: [kat] ECC-384
4,984,706 UART: [kat] HMAC-384Kdf
5,008,233 UART: [kat] LMS
5,537,687 UART: [kat] --
5,539,255 UART: [cold-reset] ++
5,540,945 UART: [fht] FHT @ 0x50003400
5,551,256 UART: [idev] ++
5,551,840 UART: [idev] CDI.KEYID = 6
5,552,724 UART: [idev] SUBJECT.KEYID = 7
5,553,946 UART: [idev] UDS.KEYID = 0
5,556,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,700,075 UART: [idev] Erasing UDS.KEYID = 0
8,064,074 UART: [idev] Sha1 KeyId Algorithm
8,087,799 UART: [idev] --
8,091,686 UART: [ldev] ++
8,092,262 UART: [ldev] CDI.KEYID = 6
8,093,173 UART: [ldev] SUBJECT.KEYID = 5
8,094,330 UART: [ldev] AUTHORITY.KEYID = 7
8,095,562 UART: [ldev] FE.KEYID = 1
8,137,132 UART: [ldev] Erasing FE.KEYID = 1
10,643,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,931 UART: [ldev] --
12,448,901 UART: [fwproc] Wait for Commands...
12,450,954 UART: [fwproc] Recv command 0x46574c44
12,452,999 UART: [fwproc] Recv'd Img size: 114084 bytes
15,857,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,318,222 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,381,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,486,114 >>> mbox cmd response: failed
12,486,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,487,233 >>> mbox cmd response: failed
12,487,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,487,801 >>> mbox cmd response: failed
Initializing fuses
2,057,868 writing to cptra_bootfsm_go
5,421,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,074,934 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,480 UART:
192,832 UART: Running Caliptra ROM ...
194,023 UART:
603,700 UART: [state] CFI Enabled
615,558 UART: [state] LifecycleState = Unprovisioned
617,390 UART: [state] DebugLocked = No
619,412 UART: [state] WD Timer not started. Device not locked for debugging
623,950 UART: [kat] SHA2-256
803,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,658 UART: [kat] ++
815,188 UART: [kat] sha1
826,772 UART: [kat] SHA2-256
829,820 UART: [kat] SHA2-384
835,464 UART: [kat] SHA2-512-ACC
838,420 UART: [kat] ECC-384
3,278,961 UART: [kat] HMAC-384Kdf
3,290,602 UART: [kat] LMS
3,820,100 UART: [kat] --
3,825,005 UART: [cold-reset] ++
3,826,672 UART: [fht] FHT @ 0x50003400
3,836,193 UART: [idev] ++
3,836,805 UART: [idev] CDI.KEYID = 6
3,837,724 UART: [idev] SUBJECT.KEYID = 7
3,838,887 UART: [idev] UDS.KEYID = 0
3,841,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,923 UART: [idev] Erasing UDS.KEYID = 0
6,312,187 UART: [idev] Sha1 KeyId Algorithm
6,335,150 UART: [idev] --
6,340,713 UART: [ldev] ++
6,341,288 UART: [ldev] CDI.KEYID = 6
6,342,226 UART: [ldev] SUBJECT.KEYID = 5
6,343,390 UART: [ldev] AUTHORITY.KEYID = 7
6,344,628 UART: [ldev] FE.KEYID = 1
6,353,547 UART: [ldev] Erasing FE.KEYID = 1
8,829,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,046 UART: [ldev] --
10,620,071 UART: [fwproc] Wait for Commands...
10,621,578 UART: [fwproc] Recv command 0x46574c44
10,623,620 UART: [fwproc] Recv'd Img size: 114084 bytes
12,917,565 UART: ROM Fatal Error: 0x000B0014
12,920,682 >>> mbox cmd response: failed
12,921,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,442 >>> mbox cmd response: failed
12,921,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,019 >>> mbox cmd response: failed
Initializing fuses
2,065,293 writing to cptra_bootfsm_go
2,254,604 UART:
2,254,950 UART: Running Caliptra ROM ...
2,256,093 UART:
7,551,774 UART: [state] CFI Enabled
7,563,968 UART: [state] LifecycleState = Unprovisioned
7,565,830 UART: [state] DebugLocked = No
7,567,810 UART: [state] WD Timer not started. Device not locked for debugging
7,570,849 UART: [kat] SHA2-256
7,749,955 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,761,544 UART: [kat] ++
7,762,084 UART: [kat] sha1
7,773,196 UART: [kat] SHA2-256
7,776,210 UART: [kat] SHA2-384
7,781,116 UART: [kat] SHA2-512-ACC
7,784,056 UART: [kat] ECC-384
10,225,069 UART: [kat] HMAC-384Kdf
10,238,058 UART: [kat] LMS
10,767,519 UART: [kat] --
10,772,150 UART: [cold-reset] ++
10,774,513 UART: [fht] FHT @ 0x50003400
10,785,489 UART: [idev] ++
10,786,055 UART: [idev] CDI.KEYID = 6
10,787,029 UART: [idev] SUBJECT.KEYID = 7
10,788,189 UART: [idev] UDS.KEYID = 0
10,790,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,934,364 UART: [idev] Erasing UDS.KEYID = 0
13,259,782 UART: [idev] Sha1 KeyId Algorithm
13,283,546 UART: [idev] --
13,287,749 UART: [ldev] ++
13,288,316 UART: [ldev] CDI.KEYID = 6
13,289,377 UART: [ldev] SUBJECT.KEYID = 5
13,290,484 UART: [ldev] AUTHORITY.KEYID = 7
13,291,659 UART: [ldev] FE.KEYID = 1
13,302,141 UART: [ldev] Erasing FE.KEYID = 1
15,777,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,495,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,511,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,527,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,543,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,563,417 UART: [ldev] --
17,568,709 UART: [fwproc] Wait for Commands...
17,570,863 UART: [fwproc] Recv command 0x46574c44
17,572,963 UART: [fwproc] Recv'd Img size: 114084 bytes
20,962,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,032,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,101,669 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,419,472 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,514 writing to cptra_bootfsm_go
3,695,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,690,734 >>> mbox cmd response: failed
12,691,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,606 >>> mbox cmd response: failed
12,691,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,692,163 >>> mbox cmd response: failed
Initializing fuses
2,053,279 writing to cptra_bootfsm_go
10,874,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,455,001 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,575 UART:
192,922 UART: Running Caliptra ROM ...
194,106 UART:
194,261 UART: [state] CFI Enabled
262,476 UART: [state] LifecycleState = Unprovisioned
264,507 UART: [state] DebugLocked = No
267,194 UART: [state] WD Timer not started. Device not locked for debugging
272,399 UART: [kat] SHA2-256
462,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,994 UART: [kat] ++
473,465 UART: [kat] sha1
484,997 UART: [kat] SHA2-256
488,017 UART: [kat] SHA2-384
495,298 UART: [kat] SHA2-512-ACC
497,911 UART: [kat] ECC-384
2,950,838 UART: [kat] HMAC-384Kdf
2,972,126 UART: [kat] LMS
3,503,873 UART: [kat] --
3,507,291 UART: [cold-reset] ++
3,509,773 UART: [fht] FHT @ 0x50003400
3,521,029 UART: [idev] ++
3,521,754 UART: [idev] CDI.KEYID = 6
3,522,673 UART: [idev] SUBJECT.KEYID = 7
3,523,892 UART: [idev] UDS.KEYID = 0
3,526,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,271 UART: [idev] Erasing UDS.KEYID = 0
6,029,569 UART: [idev] Sha1 KeyId Algorithm
6,051,901 UART: [idev] --
6,057,201 UART: [ldev] ++
6,057,895 UART: [ldev] CDI.KEYID = 6
6,058,810 UART: [ldev] SUBJECT.KEYID = 5
6,059,971 UART: [ldev] AUTHORITY.KEYID = 7
6,061,223 UART: [ldev] FE.KEYID = 1
6,100,129 UART: [ldev] Erasing FE.KEYID = 1
8,610,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,521 UART: [ldev] --
10,412,390 UART: [fwproc] Wait for Commands...
10,413,895 UART: [fwproc] Recv command 0x46574c44
10,416,215 UART: [fwproc] Recv'd Img size: 114084 bytes
12,739,437 UART: ROM Fatal Error: 0x000B0014
12,743,065 >>> mbox cmd response: failed
12,743,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,818 >>> mbox cmd response: failed
12,744,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,405 >>> mbox cmd response: failed
Initializing fuses
2,059,421 writing to cptra_bootfsm_go
2,248,716 UART:
2,249,063 UART: Running Caliptra ROM ...
2,250,203 UART:
2,250,372 UART: [state] CFI Enabled
2,324,396 UART: [state] LifecycleState = Unprovisioned
2,326,772 UART: [state] DebugLocked = No
2,328,649 UART: [state] WD Timer not started. Device not locked for debugging
2,332,527 UART: [kat] SHA2-256
2,522,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,159 UART: [kat] ++
2,533,684 UART: [kat] sha1
2,545,122 UART: [kat] SHA2-256
2,548,153 UART: [kat] SHA2-384
2,554,688 UART: [kat] SHA2-512-ACC
2,557,257 UART: [kat] ECC-384
5,008,385 UART: [kat] HMAC-384Kdf
5,032,787 UART: [kat] LMS
5,564,525 UART: [kat] --
5,570,689 UART: [cold-reset] ++
5,573,309 UART: [fht] FHT @ 0x50003400
5,585,871 UART: [idev] ++
5,586,558 UART: [idev] CDI.KEYID = 6
5,587,579 UART: [idev] SUBJECT.KEYID = 7
5,588,681 UART: [idev] UDS.KEYID = 0
5,591,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,734,955 UART: [idev] Erasing UDS.KEYID = 0
8,112,616 UART: [idev] Sha1 KeyId Algorithm
8,135,904 UART: [idev] --
8,140,728 UART: [ldev] ++
8,141,424 UART: [ldev] CDI.KEYID = 6
8,142,341 UART: [ldev] SUBJECT.KEYID = 5
8,143,501 UART: [ldev] AUTHORITY.KEYID = 7
8,144,730 UART: [ldev] FE.KEYID = 1
8,181,625 UART: [ldev] Erasing FE.KEYID = 1
10,687,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,420,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,435,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,450,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,465,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,487,039 UART: [ldev] --
12,492,253 UART: [fwproc] Wait for Commands...
12,494,512 UART: [fwproc] Recv command 0x46574c44
12,496,795 UART: [fwproc] Recv'd Img size: 114084 bytes
15,946,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,030,162 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,146,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,687,946 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,420,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,628,991 >>> mbox cmd response: failed
12,629,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,629,880 >>> mbox cmd response: failed
12,630,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,630,443 >>> mbox cmd response: failed
Initializing fuses
2,048,791 writing to cptra_bootfsm_go
5,484,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,750,081 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,416 UART:
192,776 UART: Running Caliptra ROM ...
193,872 UART:
603,825 UART: [state] CFI Enabled
616,594 UART: [state] LifecycleState = Unprovisioned
618,961 UART: [state] DebugLocked = No
621,227 UART: [state] WD Timer not started. Device not locked for debugging
625,499 UART: [kat] SHA2-256
815,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,135 UART: [kat] ++
826,635 UART: [kat] sha1
838,591 UART: [kat] SHA2-256
841,603 UART: [kat] SHA2-384
846,930 UART: [kat] SHA2-512-ACC
849,539 UART: [kat] ECC-384
3,293,862 UART: [kat] HMAC-384Kdf
3,306,698 UART: [kat] LMS
3,838,524 UART: [kat] --
3,842,379 UART: [cold-reset] ++
3,843,987 UART: [fht] FHT @ 0x50003400
3,855,666 UART: [idev] ++
3,856,440 UART: [idev] CDI.KEYID = 6
3,857,363 UART: [idev] SUBJECT.KEYID = 7
3,858,542 UART: [idev] UDS.KEYID = 0
3,861,442 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,803 UART: [idev] Erasing UDS.KEYID = 0
6,333,871 UART: [idev] Sha1 KeyId Algorithm
6,355,538 UART: [idev] --
6,360,498 UART: [ldev] ++
6,361,176 UART: [ldev] CDI.KEYID = 6
6,362,057 UART: [ldev] SUBJECT.KEYID = 5
6,363,271 UART: [ldev] AUTHORITY.KEYID = 7
6,364,446 UART: [ldev] FE.KEYID = 1
6,375,716 UART: [ldev] Erasing FE.KEYID = 1
8,855,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,623 UART: [ldev] --
10,643,675 UART: [fwproc] Wait for Commands...
10,645,236 UART: [fwproc] Recv command 0x46574c44
10,647,493 UART: [fwproc] Recv'd Img size: 114084 bytes
12,962,344 UART: ROM Fatal Error: 0x000B0014
12,966,014 >>> mbox cmd response: failed
12,966,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,676 >>> mbox cmd response: failed
12,967,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,357 >>> mbox cmd response: failed
Initializing fuses
2,058,216 writing to cptra_bootfsm_go
2,247,511 UART:
2,247,882 UART: Running Caliptra ROM ...
2,248,930 UART:
7,502,887 UART: [state] CFI Enabled
7,517,428 UART: [state] LifecycleState = Unprovisioned
7,519,835 UART: [state] DebugLocked = No
7,521,709 UART: [state] WD Timer not started. Device not locked for debugging
7,526,609 UART: [kat] SHA2-256
7,716,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,727,243 UART: [kat] ++
7,727,762 UART: [kat] sha1
7,739,741 UART: [kat] SHA2-256
7,742,769 UART: [kat] SHA2-384
7,749,195 UART: [kat] SHA2-512-ACC
7,751,764 UART: [kat] ECC-384
10,192,778 UART: [kat] HMAC-384Kdf
10,206,406 UART: [kat] LMS
10,738,260 UART: [kat] --
10,743,115 UART: [cold-reset] ++
10,745,588 UART: [fht] FHT @ 0x50003400
10,757,913 UART: [idev] ++
10,758,589 UART: [idev] CDI.KEYID = 6
10,759,553 UART: [idev] SUBJECT.KEYID = 7
10,760,761 UART: [idev] UDS.KEYID = 0
10,763,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,907,094 UART: [idev] Erasing UDS.KEYID = 0
13,238,212 UART: [idev] Sha1 KeyId Algorithm
13,260,521 UART: [idev] --
13,265,912 UART: [ldev] ++
13,266,588 UART: [ldev] CDI.KEYID = 6
13,267,470 UART: [ldev] SUBJECT.KEYID = 5
13,268,681 UART: [ldev] AUTHORITY.KEYID = 7
13,269,914 UART: [ldev] FE.KEYID = 1
13,280,766 UART: [ldev] Erasing FE.KEYID = 1
15,759,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,480,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,495,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,510,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,525,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,546,352 UART: [ldev] --
17,552,008 UART: [fwproc] Wait for Commands...
17,553,840 UART: [fwproc] Recv command 0x46574c44
17,556,098 UART: [fwproc] Recv'd Img size: 114084 bytes
20,999,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,076,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,192,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,734,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,757,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,863,269 >>> mbox cmd response: failed
12,863,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,864,176 >>> mbox cmd response: failed
12,864,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,864,732 >>> mbox cmd response: failed
Initializing fuses
2,052,167 writing to cptra_bootfsm_go
10,758,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,951,961 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
903,056 UART: [kat] HMAC-384Kdf
907,614 UART: [kat] LMS
1,475,810 UART: [kat] --
1,476,853 UART: [cold-reset] ++
1,477,287 UART: [fht] Storing FHT @ 0x50003400
1,480,032 UART: [idev] ++
1,480,200 UART: [idev] CDI.KEYID = 6
1,480,560 UART: [idev] SUBJECT.KEYID = 7
1,480,984 UART: [idev] UDS.KEYID = 0
1,481,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,858 UART: [idev] Erasing UDS.KEYID = 0
1,505,594 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,044 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,381 UART: [ldev] Erasing FE.KEYID = 1
1,546,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,048 UART: [ldev] --
1,586,473 UART: [fwproc] Waiting for Commands...
1,587,310 UART: [fwproc] Received command 0x46574c44
1,588,101 UART: [fwproc] Received Image of size 114084 bytes
1,853,293 UART: ROM Fatal Error: 0x000B0014
1,854,450 >>> mbox cmd response: failed
1,854,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,456 >>> mbox cmd response: failed
1,854,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
894,962 UART: [kat] SHA2-512-ACC
896,863 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,340 UART: [kat] LMS
1,475,536 UART: [kat] --
1,476,305 UART: [cold-reset] ++
1,476,869 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,022 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,751 UART: [ldev] ++
1,514,919 UART: [ldev] CDI.KEYID = 6
1,515,282 UART: [ldev] SUBJECT.KEYID = 5
1,515,708 UART: [ldev] AUTHORITY.KEYID = 7
1,516,171 UART: [ldev] FE.KEYID = 1
1,521,619 UART: [ldev] Erasing FE.KEYID = 1
1,546,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,586,005 UART: [fwproc] Waiting for Commands...
1,586,626 UART: [fwproc] Received command 0x46574c44
1,587,417 UART: [fwproc] Received Image of size 114084 bytes
2,881,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,203 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,707,979 >>> mbox cmd response: failed
1,707,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,985 >>> mbox cmd response: failed
1,707,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,799 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,461 UART: [kat] SHA2-512-ACC
897,362 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,529 UART: [kat] LMS
1,475,725 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,965 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,545 UART: [idev] --
1,515,494 UART: [ldev] ++
1,515,662 UART: [ldev] CDI.KEYID = 6
1,516,025 UART: [ldev] SUBJECT.KEYID = 5
1,516,451 UART: [ldev] AUTHORITY.KEYID = 7
1,516,914 UART: [ldev] FE.KEYID = 1
1,522,448 UART: [ldev] Erasing FE.KEYID = 1
1,547,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,469 UART: [ldev] --
1,586,828 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 114084 bytes
1,854,912 UART: ROM Fatal Error: 0x000B0014
1,856,069 >>> mbox cmd response: failed
1,856,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,075 >>> mbox cmd response: failed
1,856,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,609 UART: [kat] SHA2-512-ACC
897,510 UART: [kat] ECC-384
903,307 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,488 UART: [fht] Storing FHT @ 0x50003400
1,480,495 UART: [idev] ++
1,480,663 UART: [idev] CDI.KEYID = 6
1,481,023 UART: [idev] SUBJECT.KEYID = 7
1,481,447 UART: [idev] UDS.KEYID = 0
1,481,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,325 UART: [idev] Erasing UDS.KEYID = 0
1,506,085 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,729 UART: [idev] --
1,515,584 UART: [ldev] ++
1,515,752 UART: [ldev] CDI.KEYID = 6
1,516,115 UART: [ldev] SUBJECT.KEYID = 5
1,516,541 UART: [ldev] AUTHORITY.KEYID = 7
1,517,004 UART: [ldev] FE.KEYID = 1
1,522,366 UART: [ldev] Erasing FE.KEYID = 1
1,548,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,045 UART: [ldev] --
1,587,474 UART: [fwproc] Waiting for Commands...
1,588,153 UART: [fwproc] Received command 0x46574c44
1,588,944 UART: [fwproc] Received Image of size 114084 bytes
2,883,097 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,537 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,352 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,708,360 >>> mbox cmd response: failed
1,708,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,366 >>> mbox cmd response: failed
1,708,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,946 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,419 UART: [kat] SHA2-256
903,359 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
917,996 UART: [kat] HMAC-384Kdf
922,376 UART: [kat] LMS
1,170,704 UART: [kat] --
1,171,431 UART: [cold-reset] ++
1,171,785 UART: [fht] FHT @ 0x50003400
1,174,456 UART: [idev] ++
1,174,624 UART: [idev] CDI.KEYID = 6
1,174,984 UART: [idev] SUBJECT.KEYID = 7
1,175,408 UART: [idev] UDS.KEYID = 0
1,175,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,476 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,208,873 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,410 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,881 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,694 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,152 UART: ROM Fatal Error: 0x000B0014
1,551,309 >>> mbox cmd response: failed
1,551,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,315 >>> mbox cmd response: failed
1,551,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,681 UART: [kat] SHA2-256
903,621 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,829 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,774 UART: [idev] Erasing UDS.KEYID = 0
1,200,993 UART: [idev] Sha1 KeyId Algorithm
1,209,365 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,018 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,282,970 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,500 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,778 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,272 >>> mbox cmd response: failed
1,406,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,278 >>> mbox cmd response: failed
1,406,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,871 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
922,889 UART: [kat] LMS
1,171,217 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,654 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,554 UART: [idev] --
1,211,596 UART: [ldev] ++
1,211,764 UART: [ldev] CDI.KEYID = 6
1,212,127 UART: [ldev] SUBJECT.KEYID = 5
1,212,553 UART: [ldev] AUTHORITY.KEYID = 7
1,213,016 UART: [ldev] FE.KEYID = 1
1,218,040 UART: [ldev] Erasing FE.KEYID = 1
1,244,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,392 UART: [ldev] --
1,283,845 UART: [fwproc] Wait for Commands...
1,284,631 UART: [fwproc] Recv command 0x46574c44
1,285,359 UART: [fwproc] Recv'd Img size: 114084 bytes
1,551,603 UART: ROM Fatal Error: 0x000B0014
1,552,760 >>> mbox cmd response: failed
1,552,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,766 >>> mbox cmd response: failed
1,552,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,772 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
893,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,426 UART: [kat] ++
897,578 UART: [kat] sha1
901,786 UART: [kat] SHA2-256
903,726 UART: [kat] SHA2-384
906,525 UART: [kat] SHA2-512-ACC
908,426 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,109 UART: [kat] LMS
1,171,437 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,785 UART: [idev] ++
1,175,953 UART: [idev] CDI.KEYID = 6
1,176,313 UART: [idev] SUBJECT.KEYID = 7
1,176,737 UART: [idev] UDS.KEYID = 0
1,177,082 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,759 UART: [idev] Erasing UDS.KEYID = 0
1,201,178 UART: [idev] Sha1 KeyId Algorithm
1,209,660 UART: [idev] --
1,210,710 UART: [ldev] ++
1,210,878 UART: [ldev] CDI.KEYID = 6
1,211,241 UART: [ldev] SUBJECT.KEYID = 5
1,211,667 UART: [ldev] AUTHORITY.KEYID = 7
1,212,130 UART: [ldev] FE.KEYID = 1
1,217,318 UART: [ldev] Erasing FE.KEYID = 1
1,243,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,362 UART: [ldev] --
1,282,657 UART: [fwproc] Wait for Commands...
1,283,385 UART: [fwproc] Recv command 0x46574c44
1,284,113 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,219 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,407,349 >>> mbox cmd response: failed
1,407,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,355 >>> mbox cmd response: failed
1,407,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,704 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,210 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,215 UART: [cold-reset] ++
1,169,699 UART: [fht] FHT @ 0x50003400
1,172,295 UART: [idev] ++
1,172,463 UART: [idev] CDI.KEYID = 6
1,172,824 UART: [idev] SUBJECT.KEYID = 7
1,173,249 UART: [idev] UDS.KEYID = 0
1,173,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,817 UART: ROM Fatal Error: 0x000B0014
1,548,974 >>> mbox cmd response: failed
1,548,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,980 >>> mbox cmd response: failed
1,548,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Unprovisioned
85,297 UART: [state] DebugLocked = No
85,801 UART: [state] WD Timer not started. Device not locked for debugging
87,096 UART: [kat] SHA2-256
890,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,775 UART: [kat] ++
894,927 UART: [kat] sha1
899,315 UART: [kat] SHA2-256
901,255 UART: [kat] SHA2-384
904,034 UART: [kat] SHA2-512-ACC
905,935 UART: [kat] ECC-384
915,540 UART: [kat] HMAC-384Kdf
919,954 UART: [kat] LMS
1,168,266 UART: [kat] --
1,169,215 UART: [cold-reset] ++
1,169,759 UART: [fht] FHT @ 0x50003400
1,172,447 UART: [idev] ++
1,172,615 UART: [idev] CDI.KEYID = 6
1,172,976 UART: [idev] SUBJECT.KEYID = 7
1,173,401 UART: [idev] UDS.KEYID = 0
1,173,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,215,234 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,732 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,420 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,399,701 >>> mbox cmd response: failed
1,399,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,707 >>> mbox cmd response: failed
1,399,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,399,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,480 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,174,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,045 UART: [ldev] ++
1,209,213 UART: [ldev] CDI.KEYID = 6
1,209,577 UART: [ldev] SUBJECT.KEYID = 5
1,210,004 UART: [ldev] AUTHORITY.KEYID = 7
1,210,467 UART: [ldev] FE.KEYID = 1
1,215,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,165 UART: [ldev] --
1,281,667 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,354 UART: ROM Fatal Error: 0x000B0014
1,550,511 >>> mbox cmd response: failed
1,550,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,517 >>> mbox cmd response: failed
1,550,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,195 UART: [kat] SHA2-512-ACC
907,096 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,610 UART: [idev] ++
1,173,778 UART: [idev] CDI.KEYID = 6
1,174,139 UART: [idev] SUBJECT.KEYID = 7
1,174,564 UART: [idev] UDS.KEYID = 0
1,174,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,636 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,637 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,507 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,628 UART: [fwproc] Recv command 0x46574c44
1,284,361 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,773 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,346 >>> mbox cmd response: failed
1,401,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,352 >>> mbox cmd response: failed
1,401,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,455 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,043 UART:
192,409 UART: Running Caliptra ROM ...
193,590 UART:
193,740 UART: [state] CFI Enabled
265,163 UART: [state] LifecycleState = Unprovisioned
267,137 UART: [state] DebugLocked = No
269,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,408 UART: [kat] SHA2-256
444,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,639 UART: [kat] ++
455,094 UART: [kat] sha1
464,779 UART: [kat] SHA2-256
467,464 UART: [kat] SHA2-384
472,045 UART: [kat] SHA2-512-ACC
474,388 UART: [kat] ECC-384
2,767,298 UART: [kat] HMAC-384Kdf
2,799,134 UART: [kat] LMS
3,989,400 UART: [kat] --
3,995,337 UART: [cold-reset] ++
3,996,239 UART: [fht] Storing FHT @ 0x50003400
4,008,345 UART: [idev] ++
4,008,910 UART: [idev] CDI.KEYID = 6
4,009,851 UART: [idev] SUBJECT.KEYID = 7
4,011,066 UART: [idev] UDS.KEYID = 0
4,013,697 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,103 UART: [idev] Erasing UDS.KEYID = 0
7,346,919 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,861 UART: [idev] --
7,373,457 UART: [ldev] ++
7,374,026 UART: [ldev] CDI.KEYID = 6
7,374,969 UART: [ldev] SUBJECT.KEYID = 5
7,376,186 UART: [ldev] AUTHORITY.KEYID = 7
7,377,473 UART: [ldev] FE.KEYID = 1
7,421,856 UART: [ldev] Erasing FE.KEYID = 1
10,754,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,134 UART: [ldev] --
13,134,607 UART: [fwproc] Waiting for Commands...
13,136,497 UART: [fwproc] Received command 0x46574c44
13,138,687 UART: [fwproc] Received Image of size 113760 bytes
16,076,623 UART: ROM Fatal Error: 0x000B0023
16,080,031 >>> mbox cmd response: failed
16,080,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,080,693 >>> mbox cmd response: failed
16,080,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,081,296 >>> mbox cmd response: failed
Initializing fuses
2,054,956 writing to cptra_bootfsm_go
2,244,322 UART:
2,244,673 UART: Running Caliptra ROM ...
2,245,806 UART:
2,245,999 UART: [state] CFI Enabled
2,314,121 UART: [state] LifecycleState = Unprovisioned
2,316,070 UART: [state] DebugLocked = No
2,317,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,479 UART: [kat] SHA2-256
2,492,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,713 UART: [kat] ++
2,503,258 UART: [kat] sha1
2,514,260 UART: [kat] SHA2-256
2,516,952 UART: [kat] SHA2-384
2,523,800 UART: [kat] SHA2-512-ACC
2,526,145 UART: [kat] ECC-384
4,819,431 UART: [kat] HMAC-384Kdf
4,850,128 UART: [kat] LMS
6,040,458 UART: [kat] --
6,045,621 UART: [cold-reset] ++
6,046,912 UART: [fht] Storing FHT @ 0x50003400
6,059,219 UART: [idev] ++
6,059,797 UART: [idev] CDI.KEYID = 6
6,060,712 UART: [idev] SUBJECT.KEYID = 7
6,061,937 UART: [idev] UDS.KEYID = 0
6,064,399 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,207,609 UART: [idev] Erasing UDS.KEYID = 0
9,395,546 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,928 UART: [idev] --
9,421,132 UART: [ldev] ++
9,421,713 UART: [ldev] CDI.KEYID = 6
9,422,677 UART: [ldev] SUBJECT.KEYID = 5
9,423,873 UART: [ldev] AUTHORITY.KEYID = 7
9,425,110 UART: [ldev] FE.KEYID = 1
9,472,431 UART: [ldev] Erasing FE.KEYID = 1
12,809,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,122,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,166,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,185,369 UART: [ldev] --
15,189,285 UART: [fwproc] Waiting for Commands...
15,192,356 UART: [fwproc] Received command 0x46574c44
15,194,549 UART: [fwproc] Received Image of size 113760 bytes
19,240,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,316,911 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,385,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,702,296 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,784,808 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,805,114 >>> mbox cmd response: failed
15,805,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,806,032 >>> mbox cmd response: failed
15,806,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,806,603 >>> mbox cmd response: failed
Initializing fuses
2,055,417 writing to cptra_bootfsm_go
5,854,350 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,908,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,412 UART:
192,770 UART: Running Caliptra ROM ...
193,982 UART:
603,553 UART: [state] CFI Enabled
620,294 UART: [state] LifecycleState = Unprovisioned
622,237 UART: [state] DebugLocked = No
624,045 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,508 UART: [kat] SHA2-256
799,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,780 UART: [kat] ++
810,230 UART: [kat] sha1
820,082 UART: [kat] SHA2-256
822,769 UART: [kat] SHA2-384
828,817 UART: [kat] SHA2-512-ACC
831,212 UART: [kat] ECC-384
3,115,534 UART: [kat] HMAC-384Kdf
3,126,922 UART: [kat] LMS
4,317,025 UART: [kat] --
4,322,879 UART: [cold-reset] ++
4,323,902 UART: [fht] Storing FHT @ 0x50003400
4,336,040 UART: [idev] ++
4,336,608 UART: [idev] CDI.KEYID = 6
4,337,623 UART: [idev] SUBJECT.KEYID = 7
4,338,834 UART: [idev] UDS.KEYID = 0
4,341,412 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,526 UART: [idev] Erasing UDS.KEYID = 0
7,623,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,634 UART: [idev] --
7,647,582 UART: [ldev] ++
7,648,184 UART: [ldev] CDI.KEYID = 6
7,649,079 UART: [ldev] SUBJECT.KEYID = 5
7,650,262 UART: [ldev] AUTHORITY.KEYID = 7
7,651,550 UART: [ldev] FE.KEYID = 1
7,662,605 UART: [ldev] Erasing FE.KEYID = 1
10,950,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,388 UART: [ldev] --
13,307,349 UART: [fwproc] Waiting for Commands...
13,310,576 UART: [fwproc] Received command 0x46574c44
13,312,814 UART: [fwproc] Received Image of size 113760 bytes
16,255,246 UART: ROM Fatal Error: 0x000B0023
16,258,645 >>> mbox cmd response: failed
16,259,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,259,427 >>> mbox cmd response: failed
16,259,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,259,987 >>> mbox cmd response: failed
Initializing fuses
2,065,386 writing to cptra_bootfsm_go
2,254,711 UART:
2,255,055 UART: Running Caliptra ROM ...
2,256,190 UART:
4,191,254 UART: [state] CFI Enabled
4,202,179 UART: [state] LifecycleState = Unprovisioned
4,204,097 UART: [state] DebugLocked = No
4,205,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,209,904 UART: [kat] SHA2-256
4,379,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,390,149 UART: [kat] ++
4,390,646 UART: [kat] sha1
4,401,749 UART: [kat] SHA2-256
4,404,448 UART: [kat] SHA2-384
4,410,514 UART: [kat] SHA2-512-ACC
4,412,877 UART: [kat] ECC-384
6,697,400 UART: [kat] HMAC-384Kdf
6,708,071 UART: [kat] LMS
7,898,186 UART: [kat] --
7,904,159 UART: [cold-reset] ++
7,906,584 UART: [fht] Storing FHT @ 0x50003400
7,917,634 UART: [idev] ++
7,918,208 UART: [idev] CDI.KEYID = 6
7,919,093 UART: [idev] SUBJECT.KEYID = 7
7,920,359 UART: [idev] UDS.KEYID = 0
7,922,988 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,066,007 UART: [idev] Erasing UDS.KEYID = 0
11,209,034 UART: [idev] Using Sha1 for KeyId Algorithm
11,231,397 UART: [idev] --
11,234,151 UART: [ldev] ++
11,234,731 UART: [ldev] CDI.KEYID = 6
11,235,704 UART: [ldev] SUBJECT.KEYID = 5
11,236,963 UART: [ldev] AUTHORITY.KEYID = 7
11,238,148 UART: [ldev] FE.KEYID = 1
11,252,201 UART: [ldev] Erasing FE.KEYID = 1
14,537,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,831,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,846,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,861,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,875,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,894,513 UART: [ldev] --
16,898,905 UART: [fwproc] Waiting for Commands...
16,901,176 UART: [fwproc] Received command 0x46574c44
16,903,378 UART: [fwproc] Received Image of size 113760 bytes
20,950,889 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,033,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,101,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,418,174 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,131,534 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,052,428 >>> mbox cmd response: failed
16,053,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,053,388 >>> mbox cmd response: failed
16,053,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,053,974 >>> mbox cmd response: failed
Initializing fuses
2,055,305 writing to cptra_bootfsm_go
7,937,135 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,870,971 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,073 UART:
192,443 UART: Running Caliptra ROM ...
193,645 UART:
193,797 UART: [state] CFI Enabled
263,823 UART: [state] LifecycleState = Unprovisioned
265,639 UART: [state] DebugLocked = No
267,445 UART: [state] WD Timer not started. Device not locked for debugging
270,863 UART: [kat] SHA2-256
449,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,553 UART: [kat] ++
462,001 UART: [kat] sha1
472,264 UART: [kat] SHA2-256
475,285 UART: [kat] SHA2-384
481,802 UART: [kat] SHA2-512-ACC
484,735 UART: [kat] ECC-384
2,948,668 UART: [kat] HMAC-384Kdf
2,969,059 UART: [kat] LMS
3,498,524 UART: [kat] --
3,501,940 UART: [cold-reset] ++
3,504,038 UART: [fht] FHT @ 0x50003400
3,515,667 UART: [idev] ++
3,516,237 UART: [idev] CDI.KEYID = 6
3,517,180 UART: [idev] SUBJECT.KEYID = 7
3,518,392 UART: [idev] UDS.KEYID = 0
3,520,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,621 UART: [idev] Erasing UDS.KEYID = 0
6,024,178 UART: [idev] Sha1 KeyId Algorithm
6,046,528 UART: [idev] --
6,049,856 UART: [ldev] ++
6,050,438 UART: [ldev] CDI.KEYID = 6
6,051,367 UART: [ldev] SUBJECT.KEYID = 5
6,052,530 UART: [ldev] AUTHORITY.KEYID = 7
6,053,822 UART: [ldev] FE.KEYID = 1
6,099,358 UART: [ldev] Erasing FE.KEYID = 1
8,602,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,566 UART: [ldev] --
10,413,726 UART: [fwproc] Wait for Commands...
10,415,228 UART: [fwproc] Recv command 0x46574c44
10,417,324 UART: [fwproc] Recv'd Img size: 114084 bytes
12,703,634 UART: ROM Fatal Error: 0x000B0023
12,706,724 >>> mbox cmd response: failed
12,707,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,499 >>> mbox cmd response: failed
12,707,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,062 >>> mbox cmd response: failed
Initializing fuses
2,052,621 writing to cptra_bootfsm_go
2,241,938 UART:
2,242,295 UART: Running Caliptra ROM ...
2,243,376 UART:
2,243,542 UART: [state] CFI Enabled
2,314,911 UART: [state] LifecycleState = Unprovisioned
2,316,784 UART: [state] DebugLocked = No
2,319,138 UART: [state] WD Timer not started. Device not locked for debugging
2,322,515 UART: [kat] SHA2-256
2,501,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,213 UART: [kat] ++
2,513,756 UART: [kat] sha1
2,523,885 UART: [kat] SHA2-256
2,526,945 UART: [kat] SHA2-384
2,532,076 UART: [kat] SHA2-512-ACC
2,535,027 UART: [kat] ECC-384
4,977,987 UART: [kat] HMAC-384Kdf
5,001,944 UART: [kat] LMS
5,531,396 UART: [kat] --
5,537,001 UART: [cold-reset] ++
5,538,821 UART: [fht] FHT @ 0x50003400
5,549,525 UART: [idev] ++
5,550,093 UART: [idev] CDI.KEYID = 6
5,550,994 UART: [idev] SUBJECT.KEYID = 7
5,552,210 UART: [idev] UDS.KEYID = 0
5,554,559 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,698,238 UART: [idev] Erasing UDS.KEYID = 0
8,056,705 UART: [idev] Sha1 KeyId Algorithm
8,080,904 UART: [idev] --
8,084,953 UART: [ldev] ++
8,085,525 UART: [ldev] CDI.KEYID = 6
8,086,444 UART: [ldev] SUBJECT.KEYID = 5
8,087,605 UART: [ldev] AUTHORITY.KEYID = 7
8,088,844 UART: [ldev] FE.KEYID = 1
8,130,425 UART: [ldev] Erasing FE.KEYID = 1
10,634,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,222 UART: [ldev] --
12,442,954 UART: [fwproc] Wait for Commands...
12,445,745 UART: [fwproc] Recv command 0x46574c44
12,447,857 UART: [fwproc] Recv'd Img size: 114084 bytes
15,852,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,927,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,996,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,314,090 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,381,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,514,523 >>> mbox cmd response: failed
12,515,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,781 >>> mbox cmd response: failed
12,516,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,354 >>> mbox cmd response: failed
Initializing fuses
2,058,563 writing to cptra_bootfsm_go
5,432,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,123,450 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,654 UART:
193,025 UART: Running Caliptra ROM ...
194,244 UART:
603,926 UART: [state] CFI Enabled
616,460 UART: [state] LifecycleState = Unprovisioned
618,347 UART: [state] DebugLocked = No
621,020 UART: [state] WD Timer not started. Device not locked for debugging
624,948 UART: [kat] SHA2-256
804,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,625 UART: [kat] ++
816,153 UART: [kat] sha1
827,414 UART: [kat] SHA2-256
830,463 UART: [kat] SHA2-384
836,933 UART: [kat] SHA2-512-ACC
839,920 UART: [kat] ECC-384
3,283,077 UART: [kat] HMAC-384Kdf
3,295,152 UART: [kat] LMS
3,824,681 UART: [kat] --
3,829,168 UART: [cold-reset] ++
3,831,161 UART: [fht] FHT @ 0x50003400
3,842,032 UART: [idev] ++
3,842,605 UART: [idev] CDI.KEYID = 6
3,843,622 UART: [idev] SUBJECT.KEYID = 7
3,844,726 UART: [idev] UDS.KEYID = 0
3,847,303 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,858 UART: [idev] Erasing UDS.KEYID = 0
6,319,431 UART: [idev] Sha1 KeyId Algorithm
6,343,202 UART: [idev] --
6,348,255 UART: [ldev] ++
6,348,832 UART: [ldev] CDI.KEYID = 6
6,349,723 UART: [ldev] SUBJECT.KEYID = 5
6,350,904 UART: [ldev] AUTHORITY.KEYID = 7
6,352,192 UART: [ldev] FE.KEYID = 1
6,363,648 UART: [ldev] Erasing FE.KEYID = 1
8,837,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,753 UART: [ldev] --
10,623,942 UART: [fwproc] Wait for Commands...
10,625,660 UART: [fwproc] Recv command 0x46574c44
10,627,757 UART: [fwproc] Recv'd Img size: 114084 bytes
12,917,032 UART: ROM Fatal Error: 0x000B0023
12,920,138 >>> mbox cmd response: failed
12,920,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,881 >>> mbox cmd response: failed
12,921,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,463 >>> mbox cmd response: failed
Initializing fuses
2,055,426 writing to cptra_bootfsm_go
2,244,737 UART:
2,245,089 UART: Running Caliptra ROM ...
2,246,237 UART:
7,528,904 UART: [state] CFI Enabled
7,541,430 UART: [state] LifecycleState = Unprovisioned
7,543,288 UART: [state] DebugLocked = No
7,545,028 UART: [state] WD Timer not started. Device not locked for debugging
7,548,018 UART: [kat] SHA2-256
7,727,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,738,718 UART: [kat] ++
7,739,319 UART: [kat] sha1
7,749,791 UART: [kat] SHA2-256
7,752,816 UART: [kat] SHA2-384
7,760,103 UART: [kat] SHA2-512-ACC
7,763,046 UART: [kat] ECC-384
10,207,240 UART: [kat] HMAC-384Kdf
10,220,696 UART: [kat] LMS
10,750,215 UART: [kat] --
10,756,209 UART: [cold-reset] ++
10,757,597 UART: [fht] FHT @ 0x50003400
10,767,382 UART: [idev] ++
10,767,953 UART: [idev] CDI.KEYID = 6
10,768,834 UART: [idev] SUBJECT.KEYID = 7
10,770,043 UART: [idev] UDS.KEYID = 0
10,772,361 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,915,727 UART: [idev] Erasing UDS.KEYID = 0
13,240,880 UART: [idev] Sha1 KeyId Algorithm
13,263,345 UART: [idev] --
13,266,780 UART: [ldev] ++
13,267,354 UART: [ldev] CDI.KEYID = 6
13,268,233 UART: [ldev] SUBJECT.KEYID = 5
13,269,359 UART: [ldev] AUTHORITY.KEYID = 7
13,270,692 UART: [ldev] FE.KEYID = 1
13,281,090 UART: [ldev] Erasing FE.KEYID = 1
15,755,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,472,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,488,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,504,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,519,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,540,794 UART: [ldev] --
17,545,624 UART: [fwproc] Wait for Commands...
17,548,636 UART: [fwproc] Recv command 0x46574c44
17,550,695 UART: [fwproc] Recv'd Img size: 114084 bytes
20,948,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,025,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,093,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,411,921 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,808 writing to cptra_bootfsm_go
3,700,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,704,524 >>> mbox cmd response: failed
12,705,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,386 >>> mbox cmd response: failed
12,705,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,944 >>> mbox cmd response: failed
Initializing fuses
2,060,356 writing to cptra_bootfsm_go
10,854,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,427,957 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,058 UART:
192,446 UART: Running Caliptra ROM ...
193,580 UART:
193,750 UART: [state] CFI Enabled
257,734 UART: [state] LifecycleState = Unprovisioned
260,148 UART: [state] DebugLocked = No
262,834 UART: [state] WD Timer not started. Device not locked for debugging
268,219 UART: [kat] SHA2-256
458,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,838 UART: [kat] ++
469,317 UART: [kat] sha1
480,847 UART: [kat] SHA2-256
483,871 UART: [kat] SHA2-384
489,702 UART: [kat] SHA2-512-ACC
492,262 UART: [kat] ECC-384
2,949,335 UART: [kat] HMAC-384Kdf
2,971,747 UART: [kat] LMS
3,503,522 UART: [kat] --
3,509,359 UART: [cold-reset] ++
3,510,451 UART: [fht] FHT @ 0x50003400
3,521,379 UART: [idev] ++
3,522,057 UART: [idev] CDI.KEYID = 6
3,523,025 UART: [idev] SUBJECT.KEYID = 7
3,524,242 UART: [idev] UDS.KEYID = 0
3,527,000 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,895 UART: [idev] Erasing UDS.KEYID = 0
6,030,287 UART: [idev] Sha1 KeyId Algorithm
6,052,011 UART: [idev] --
6,056,814 UART: [ldev] ++
6,057,511 UART: [ldev] CDI.KEYID = 6
6,058,427 UART: [ldev] SUBJECT.KEYID = 5
6,059,593 UART: [ldev] AUTHORITY.KEYID = 7
6,060,773 UART: [ldev] FE.KEYID = 1
6,100,917 UART: [ldev] Erasing FE.KEYID = 1
8,607,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,390 UART: [ldev] --
10,414,954 UART: [fwproc] Wait for Commands...
10,417,273 UART: [fwproc] Recv command 0x46574c44
10,419,538 UART: [fwproc] Recv'd Img size: 114084 bytes
12,747,248 UART: ROM Fatal Error: 0x000B0023
12,750,876 >>> mbox cmd response: failed
12,751,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,751,661 >>> mbox cmd response: failed
12,751,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,752,221 >>> mbox cmd response: failed
Initializing fuses
2,055,868 writing to cptra_bootfsm_go
2,245,168 UART:
2,245,530 UART: Running Caliptra ROM ...
2,246,578 UART:
2,246,730 UART: [state] CFI Enabled
2,312,577 UART: [state] LifecycleState = Unprovisioned
2,314,916 UART: [state] DebugLocked = No
2,317,191 UART: [state] WD Timer not started. Device not locked for debugging
2,322,629 UART: [kat] SHA2-256
2,512,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,268 UART: [kat] ++
2,523,722 UART: [kat] sha1
2,535,750 UART: [kat] SHA2-256
2,538,722 UART: [kat] SHA2-384
2,545,526 UART: [kat] SHA2-512-ACC
2,548,122 UART: [kat] ECC-384
5,000,041 UART: [kat] HMAC-384Kdf
5,021,259 UART: [kat] LMS
5,553,047 UART: [kat] --
5,558,827 UART: [cold-reset] ++
5,560,876 UART: [fht] FHT @ 0x50003400
5,571,272 UART: [idev] ++
5,571,955 UART: [idev] CDI.KEYID = 6
5,572,976 UART: [idev] SUBJECT.KEYID = 7
5,574,140 UART: [idev] UDS.KEYID = 0
5,576,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,720,071 UART: [idev] Erasing UDS.KEYID = 0
8,078,204 UART: [idev] Sha1 KeyId Algorithm
8,099,981 UART: [idev] --
8,104,887 UART: [ldev] ++
8,105,580 UART: [ldev] CDI.KEYID = 6
8,106,512 UART: [ldev] SUBJECT.KEYID = 5
8,107,677 UART: [ldev] AUTHORITY.KEYID = 7
8,108,911 UART: [ldev] FE.KEYID = 1
8,149,749 UART: [ldev] Erasing FE.KEYID = 1
10,656,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,232 UART: [ldev] --
12,463,441 UART: [fwproc] Wait for Commands...
12,465,106 UART: [fwproc] Recv command 0x46574c44
12,467,371 UART: [fwproc] Recv'd Img size: 114084 bytes
15,908,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,099,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,640,539 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,433,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,642,156 >>> mbox cmd response: failed
12,642,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,643,140 >>> mbox cmd response: failed
12,643,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,643,707 >>> mbox cmd response: failed
Initializing fuses
2,057,625 writing to cptra_bootfsm_go
5,498,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,766,135 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,514 UART:
192,933 UART: Running Caliptra ROM ...
194,075 UART:
603,636 UART: [state] CFI Enabled
619,289 UART: [state] LifecycleState = Unprovisioned
621,653 UART: [state] DebugLocked = No
622,938 UART: [state] WD Timer not started. Device not locked for debugging
628,445 UART: [kat] SHA2-256
818,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,118 UART: [kat] ++
829,648 UART: [kat] sha1
841,824 UART: [kat] SHA2-256
844,836 UART: [kat] SHA2-384
850,272 UART: [kat] SHA2-512-ACC
852,882 UART: [kat] ECC-384
3,294,972 UART: [kat] HMAC-384Kdf
3,307,529 UART: [kat] LMS
3,839,405 UART: [kat] --
3,843,368 UART: [cold-reset] ++
3,845,523 UART: [fht] FHT @ 0x50003400
3,858,451 UART: [idev] ++
3,859,135 UART: [idev] CDI.KEYID = 6
3,860,098 UART: [idev] SUBJECT.KEYID = 7
3,861,281 UART: [idev] UDS.KEYID = 0
3,863,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,007,346 UART: [idev] Erasing UDS.KEYID = 0
6,338,511 UART: [idev] Sha1 KeyId Algorithm
6,359,629 UART: [idev] --
6,365,506 UART: [ldev] ++
6,366,185 UART: [ldev] CDI.KEYID = 6
6,367,092 UART: [ldev] SUBJECT.KEYID = 5
6,368,258 UART: [ldev] AUTHORITY.KEYID = 7
6,369,489 UART: [ldev] FE.KEYID = 1
6,381,494 UART: [ldev] Erasing FE.KEYID = 1
8,860,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,002 UART: [ldev] --
10,650,734 UART: [fwproc] Wait for Commands...
10,652,682 UART: [fwproc] Recv command 0x46574c44
10,654,947 UART: [fwproc] Recv'd Img size: 114084 bytes
12,978,114 UART: ROM Fatal Error: 0x000B0023
12,981,775 >>> mbox cmd response: failed
12,982,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,982,520 >>> mbox cmd response: failed
12,982,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,983,087 >>> mbox cmd response: failed
Initializing fuses
2,060,659 writing to cptra_bootfsm_go
2,250,003 UART:
2,250,351 UART: Running Caliptra ROM ...
2,251,510 UART:
7,471,459 UART: [state] CFI Enabled
7,487,830 UART: [state] LifecycleState = Unprovisioned
7,490,229 UART: [state] DebugLocked = No
7,491,736 UART: [state] WD Timer not started. Device not locked for debugging
7,495,489 UART: [kat] SHA2-256
7,685,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,696,114 UART: [kat] ++
7,696,713 UART: [kat] sha1
7,708,204 UART: [kat] SHA2-256
7,711,219 UART: [kat] SHA2-384
7,717,534 UART: [kat] SHA2-512-ACC
7,720,145 UART: [kat] ECC-384
10,160,420 UART: [kat] HMAC-384Kdf
10,173,292 UART: [kat] LMS
10,705,121 UART: [kat] --
10,709,083 UART: [cold-reset] ++
10,710,703 UART: [fht] FHT @ 0x50003400
10,722,221 UART: [idev] ++
10,722,893 UART: [idev] CDI.KEYID = 6
10,723,859 UART: [idev] SUBJECT.KEYID = 7
10,725,068 UART: [idev] UDS.KEYID = 0
10,727,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,871,104 UART: [idev] Erasing UDS.KEYID = 0
13,198,313 UART: [idev] Sha1 KeyId Algorithm
13,222,258 UART: [idev] --
13,225,981 UART: [ldev] ++
13,226,666 UART: [ldev] CDI.KEYID = 6
13,227,583 UART: [ldev] SUBJECT.KEYID = 5
13,228,744 UART: [ldev] AUTHORITY.KEYID = 7
13,229,971 UART: [ldev] FE.KEYID = 1
13,239,279 UART: [ldev] Erasing FE.KEYID = 1
15,717,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,438,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,453,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,468,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,483,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,504,683 UART: [ldev] --
17,509,306 UART: [fwproc] Wait for Commands...
17,510,811 UART: [fwproc] Recv command 0x46574c44
17,512,741 UART: [fwproc] Recv'd Img size: 114084 bytes
20,949,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,024,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,141,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,681,200 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,757,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,875,315 >>> mbox cmd response: failed
12,876,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,876,390 >>> mbox cmd response: failed
12,876,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,876,957 >>> mbox cmd response: failed
Initializing fuses
2,064,065 writing to cptra_bootfsm_go
10,734,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,929,269 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,660 UART: [state] LifecycleState = Unprovisioned
86,315 UART: [state] DebugLocked = No
87,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,633 UART: [kat] SHA2-256
882,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,679 UART: [kat] ++
886,831 UART: [kat] sha1
890,989 UART: [kat] SHA2-256
892,927 UART: [kat] SHA2-384
895,650 UART: [kat] SHA2-512-ACC
897,551 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,444 UART: [kat] LMS
1,475,640 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,477,111 UART: [fht] Storing FHT @ 0x50003400
1,479,898 UART: [idev] ++
1,480,066 UART: [idev] CDI.KEYID = 6
1,480,426 UART: [idev] SUBJECT.KEYID = 7
1,480,850 UART: [idev] UDS.KEYID = 0
1,481,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,052 UART: [idev] Erasing UDS.KEYID = 0
1,505,720 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,382 UART: [idev] --
1,515,429 UART: [ldev] ++
1,515,597 UART: [ldev] CDI.KEYID = 6
1,515,960 UART: [ldev] SUBJECT.KEYID = 5
1,516,386 UART: [ldev] AUTHORITY.KEYID = 7
1,516,849 UART: [ldev] FE.KEYID = 1
1,521,941 UART: [ldev] Erasing FE.KEYID = 1
1,547,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,753 UART: [fwproc] Waiting for Commands...
1,587,526 UART: [fwproc] Received command 0x46574c44
1,588,317 UART: [fwproc] Received Image of size 114084 bytes
1,854,578 UART: ROM Fatal Error: 0x000B0023
1,855,735 >>> mbox cmd response: failed
1,855,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,741 >>> mbox cmd response: failed
1,855,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,925 UART: [kat] SHA2-256
881,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,971 UART: [kat] ++
886,123 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,058 UART: [kat] HMAC-384Kdf
906,666 UART: [kat] LMS
1,474,862 UART: [kat] --
1,475,815 UART: [cold-reset] ++
1,476,165 UART: [fht] Storing FHT @ 0x50003400
1,479,028 UART: [idev] ++
1,479,196 UART: [idev] CDI.KEYID = 6
1,479,556 UART: [idev] SUBJECT.KEYID = 7
1,479,980 UART: [idev] UDS.KEYID = 0
1,480,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,544 UART: [idev] Erasing UDS.KEYID = 0
1,503,960 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,462 UART: [idev] --
1,513,553 UART: [ldev] ++
1,513,721 UART: [ldev] CDI.KEYID = 6
1,514,084 UART: [ldev] SUBJECT.KEYID = 5
1,514,510 UART: [ldev] AUTHORITY.KEYID = 7
1,514,973 UART: [ldev] FE.KEYID = 1
1,519,931 UART: [ldev] Erasing FE.KEYID = 1
1,544,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,557,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,302 UART: [ldev] --
1,583,629 UART: [fwproc] Waiting for Commands...
1,584,466 UART: [fwproc] Received command 0x46574c44
1,585,257 UART: [fwproc] Received Image of size 114084 bytes
2,879,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,906,326 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,935,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,071,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,705,808 >>> mbox cmd response: failed
1,705,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,814 >>> mbox cmd response: failed
1,705,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,705,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,822 UART: [kat] SHA2-256
881,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,868 UART: [kat] ++
886,020 UART: [kat] sha1
890,102 UART: [kat] SHA2-256
892,040 UART: [kat] SHA2-384
894,787 UART: [kat] SHA2-512-ACC
896,688 UART: [kat] ECC-384
902,181 UART: [kat] HMAC-384Kdf
906,865 UART: [kat] LMS
1,475,061 UART: [kat] --
1,475,832 UART: [cold-reset] ++
1,476,410 UART: [fht] Storing FHT @ 0x50003400
1,479,199 UART: [idev] ++
1,479,367 UART: [idev] CDI.KEYID = 6
1,479,727 UART: [idev] SUBJECT.KEYID = 7
1,480,151 UART: [idev] UDS.KEYID = 0
1,480,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,477 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,241 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,155 UART: [ldev] --
1,586,546 UART: [fwproc] Waiting for Commands...
1,587,335 UART: [fwproc] Received command 0x46574c44
1,588,126 UART: [fwproc] Received Image of size 114084 bytes
1,854,425 UART: ROM Fatal Error: 0x000B0023
1,855,582 >>> mbox cmd response: failed
1,855,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,588 >>> mbox cmd response: failed
1,855,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,487 UART: [kat] SHA2-512-ACC
897,388 UART: [kat] ECC-384
902,775 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,530 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,733 UART: [idev] ++
1,479,901 UART: [idev] CDI.KEYID = 6
1,480,261 UART: [idev] SUBJECT.KEYID = 7
1,480,685 UART: [idev] UDS.KEYID = 0
1,481,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,643 UART: [idev] Erasing UDS.KEYID = 0
1,505,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,515,112 UART: [ldev] ++
1,515,280 UART: [ldev] CDI.KEYID = 6
1,515,643 UART: [ldev] SUBJECT.KEYID = 5
1,516,069 UART: [ldev] AUTHORITY.KEYID = 7
1,516,532 UART: [ldev] FE.KEYID = 1
1,521,472 UART: [ldev] Erasing FE.KEYID = 1
1,547,089 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,477 UART: [ldev] --
1,586,984 UART: [fwproc] Waiting for Commands...
1,587,779 UART: [fwproc] Received command 0x46574c44
1,588,570 UART: [fwproc] Received Image of size 114084 bytes
2,883,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,523 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,707,527 >>> mbox cmd response: failed
1,707,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,533 >>> mbox cmd response: failed
1,707,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,872 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
922,972 UART: [kat] LMS
1,171,300 UART: [kat] --
1,172,383 UART: [cold-reset] ++
1,172,905 UART: [fht] FHT @ 0x50003400
1,175,684 UART: [idev] ++
1,175,852 UART: [idev] CDI.KEYID = 6
1,176,212 UART: [idev] SUBJECT.KEYID = 7
1,176,636 UART: [idev] UDS.KEYID = 0
1,176,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,402 UART: [idev] Erasing UDS.KEYID = 0
1,201,623 UART: [idev] Sha1 KeyId Algorithm
1,210,113 UART: [idev] --
1,211,115 UART: [ldev] ++
1,211,283 UART: [ldev] CDI.KEYID = 6
1,211,646 UART: [ldev] SUBJECT.KEYID = 5
1,212,072 UART: [ldev] AUTHORITY.KEYID = 7
1,212,535 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,625 UART: [ldev] --
1,283,134 UART: [fwproc] Wait for Commands...
1,283,732 UART: [fwproc] Recv command 0x46574c44
1,284,460 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,789 UART: ROM Fatal Error: 0x000B0023
1,551,946 >>> mbox cmd response: failed
1,551,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,952 >>> mbox cmd response: failed
1,551,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,885 UART: [kat] SHA2-256
903,825 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,266 UART: [kat] HMAC-384Kdf
922,746 UART: [kat] LMS
1,171,074 UART: [kat] --
1,171,721 UART: [cold-reset] ++
1,172,173 UART: [fht] FHT @ 0x50003400
1,174,924 UART: [idev] ++
1,175,092 UART: [idev] CDI.KEYID = 6
1,175,452 UART: [idev] SUBJECT.KEYID = 7
1,175,876 UART: [idev] UDS.KEYID = 0
1,176,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,854 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,825 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,605 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,366 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,172 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,407,223 >>> mbox cmd response: failed
1,407,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,229 >>> mbox cmd response: failed
1,407,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,725 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,517 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,368 UART: [idev] Sha1 KeyId Algorithm
1,209,942 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,812 UART: [ldev] Erasing FE.KEYID = 1
1,243,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,922 UART: [ldev] --
1,283,229 UART: [fwproc] Wait for Commands...
1,284,023 UART: [fwproc] Recv command 0x46574c44
1,284,751 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,444 UART: ROM Fatal Error: 0x000B0023
1,551,601 >>> mbox cmd response: failed
1,551,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,607 >>> mbox cmd response: failed
1,551,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,230 UART: [kat] SHA2-256
904,170 UART: [kat] SHA2-384
906,745 UART: [kat] SHA2-512-ACC
908,646 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,316 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,201,896 UART: [idev] Sha1 KeyId Algorithm
1,210,248 UART: [idev] --
1,211,294 UART: [ldev] ++
1,211,462 UART: [ldev] CDI.KEYID = 6
1,211,825 UART: [ldev] SUBJECT.KEYID = 5
1,212,251 UART: [ldev] AUTHORITY.KEYID = 7
1,212,714 UART: [ldev] FE.KEYID = 1
1,218,182 UART: [ldev] Erasing FE.KEYID = 1
1,244,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,496 UART: [ldev] --
1,283,909 UART: [fwproc] Wait for Commands...
1,284,709 UART: [fwproc] Recv command 0x46574c44
1,285,437 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,607 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,232 >>> mbox cmd response: failed
1,406,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,238 >>> mbox cmd response: failed
1,406,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,626,258 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,334 UART: [kat] SHA2-512-ACC
906,235 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,174,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,648 UART: [ldev] ++
1,209,816 UART: [ldev] CDI.KEYID = 6
1,210,180 UART: [ldev] SUBJECT.KEYID = 5
1,210,607 UART: [ldev] AUTHORITY.KEYID = 7
1,211,070 UART: [ldev] FE.KEYID = 1
1,216,114 UART: [ldev] Erasing FE.KEYID = 1
1,242,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,486 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,152 UART: ROM Fatal Error: 0x000B0023
1,550,309 >>> mbox cmd response: failed
1,550,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,315 >>> mbox cmd response: failed
1,550,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,303 UART: [cold-reset] ++
1,170,805 UART: [fht] FHT @ 0x50003400
1,173,585 UART: [idev] ++
1,173,753 UART: [idev] CDI.KEYID = 6
1,174,114 UART: [idev] SUBJECT.KEYID = 7
1,174,539 UART: [idev] UDS.KEYID = 0
1,174,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,405 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,242,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,720 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,290 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,624 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,888 >>> mbox cmd response: failed
1,401,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,894 >>> mbox cmd response: failed
1,401,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,502 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,345 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,740 UART: [idev] --
1,208,875 UART: [ldev] ++
1,209,043 UART: [ldev] CDI.KEYID = 6
1,209,407 UART: [ldev] SUBJECT.KEYID = 5
1,209,834 UART: [ldev] AUTHORITY.KEYID = 7
1,210,297 UART: [ldev] FE.KEYID = 1
1,215,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46574c44
1,283,339 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,253 UART: ROM Fatal Error: 0x000B0023
1,550,410 >>> mbox cmd response: failed
1,550,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,416 >>> mbox cmd response: failed
1,550,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
917,237 UART: [kat] HMAC-384Kdf
921,729 UART: [kat] LMS
1,170,041 UART: [kat] --
1,171,012 UART: [cold-reset] ++
1,171,540 UART: [fht] FHT @ 0x50003400
1,174,226 UART: [idev] ++
1,174,394 UART: [idev] CDI.KEYID = 6
1,174,755 UART: [idev] SUBJECT.KEYID = 7
1,175,180 UART: [idev] UDS.KEYID = 0
1,175,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,858 UART: [idev] Sha1 KeyId Algorithm
1,208,672 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,303 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,995 >>> mbox cmd response: failed
1,402,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,001 >>> mbox cmd response: failed
1,403,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,921 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,090 UART:
192,458 UART: Running Caliptra ROM ...
193,656 UART:
193,813 UART: [state] CFI Enabled
264,340 UART: [state] LifecycleState = Unprovisioned
266,251 UART: [state] DebugLocked = No
268,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,016 UART: [kat] SHA2-256
441,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,244 UART: [kat] ++
452,725 UART: [kat] sha1
465,197 UART: [kat] SHA2-256
467,874 UART: [kat] SHA2-384
473,055 UART: [kat] SHA2-512-ACC
475,404 UART: [kat] ECC-384
2,766,246 UART: [kat] HMAC-384Kdf
2,797,111 UART: [kat] LMS
3,987,393 UART: [kat] --
3,991,764 UART: [cold-reset] ++
3,993,006 UART: [fht] Storing FHT @ 0x50003400
4,005,038 UART: [idev] ++
4,005,609 UART: [idev] CDI.KEYID = 6
4,006,554 UART: [idev] SUBJECT.KEYID = 7
4,007,830 UART: [idev] UDS.KEYID = 0
4,010,353 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,710 UART: [idev] Erasing UDS.KEYID = 0
7,349,387 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,784 UART: [idev] --
7,373,752 UART: [ldev] ++
7,374,324 UART: [ldev] CDI.KEYID = 6
7,375,343 UART: [ldev] SUBJECT.KEYID = 5
7,376,449 UART: [ldev] AUTHORITY.KEYID = 7
7,377,740 UART: [ldev] FE.KEYID = 1
7,424,256 UART: [ldev] Erasing FE.KEYID = 1
10,755,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,113 UART: [ldev] --
13,131,895 UART: [fwproc] Waiting for Commands...
13,134,339 UART: [fwproc] Received command 0x46574c44
13,136,536 UART: [fwproc] Received Image of size 113760 bytes
16,077,944 UART: ROM Fatal Error: 0x000B0024
16,081,341 >>> mbox cmd response: failed
16,081,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,030 >>> mbox cmd response: failed
16,082,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,721 >>> mbox cmd response: failed
Initializing fuses
2,061,093 writing to cptra_bootfsm_go
2,250,369 UART:
2,250,719 UART: Running Caliptra ROM ...
2,251,768 UART:
2,251,922 UART: [state] CFI Enabled
2,325,491 UART: [state] LifecycleState = Unprovisioned
2,327,467 UART: [state] DebugLocked = No
2,329,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,333,881 UART: [kat] SHA2-256
2,503,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,075 UART: [kat] ++
2,514,588 UART: [kat] sha1
2,524,941 UART: [kat] SHA2-256
2,527,639 UART: [kat] SHA2-384
2,533,860 UART: [kat] SHA2-512-ACC
2,536,212 UART: [kat] ECC-384
4,831,196 UART: [kat] HMAC-384Kdf
4,864,235 UART: [kat] LMS
6,054,546 UART: [kat] --
6,057,949 UART: [cold-reset] ++
6,060,045 UART: [fht] Storing FHT @ 0x50003400
6,070,462 UART: [idev] ++
6,071,101 UART: [idev] CDI.KEYID = 6
6,071,995 UART: [idev] SUBJECT.KEYID = 7
6,073,275 UART: [idev] UDS.KEYID = 0
6,075,711 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,218,766 UART: [idev] Erasing UDS.KEYID = 0
9,410,830 UART: [idev] Using Sha1 for KeyId Algorithm
9,432,944 UART: [idev] --
9,437,570 UART: [ldev] ++
9,438,152 UART: [ldev] CDI.KEYID = 6
9,439,174 UART: [ldev] SUBJECT.KEYID = 5
9,440,389 UART: [ldev] AUTHORITY.KEYID = 7
9,441,643 UART: [ldev] FE.KEYID = 1
9,487,474 UART: [ldev] Erasing FE.KEYID = 1
12,818,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,177,235 UART: [ldev] --
15,182,357 UART: [fwproc] Waiting for Commands...
15,185,202 UART: [fwproc] Received command 0x46574c44
15,187,459 UART: [fwproc] Received Image of size 113760 bytes
19,236,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,306,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,375,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,690,624 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,785,715 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,807,477 >>> mbox cmd response: failed
15,807,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,331 >>> mbox cmd response: failed
15,808,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,942 >>> mbox cmd response: failed
Initializing fuses
2,061,665 writing to cptra_bootfsm_go
5,865,027 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,908,394 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,630 writing to cptra_bootfsm_go
192,970 UART:
193,425 UART: Running Caliptra ROM ...
194,535 UART:
604,270 UART: [state] CFI Enabled
617,668 UART: [state] LifecycleState = Unprovisioned
619,597 UART: [state] DebugLocked = No
621,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,798 UART: [kat] SHA2-256
795,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,086 UART: [kat] ++
806,554 UART: [kat] sha1
817,594 UART: [kat] SHA2-256
820,343 UART: [kat] SHA2-384
826,123 UART: [kat] SHA2-512-ACC
828,468 UART: [kat] ECC-384
3,114,361 UART: [kat] HMAC-384Kdf
3,126,341 UART: [kat] LMS
4,316,456 UART: [kat] --
4,322,471 UART: [cold-reset] ++
4,324,787 UART: [fht] Storing FHT @ 0x50003400
4,335,670 UART: [idev] ++
4,336,235 UART: [idev] CDI.KEYID = 6
4,337,252 UART: [idev] SUBJECT.KEYID = 7
4,338,415 UART: [idev] UDS.KEYID = 0
4,341,182 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,400 UART: [idev] Erasing UDS.KEYID = 0
7,620,834 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,532 UART: [idev] --
7,647,756 UART: [ldev] ++
7,648,342 UART: [ldev] CDI.KEYID = 6
7,649,321 UART: [ldev] SUBJECT.KEYID = 5
7,650,481 UART: [ldev] AUTHORITY.KEYID = 7
7,651,773 UART: [ldev] FE.KEYID = 1
7,665,064 UART: [ldev] Erasing FE.KEYID = 1
10,952,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,237 UART: [ldev] --
13,313,394 UART: [fwproc] Waiting for Commands...
13,315,230 UART: [fwproc] Received command 0x46574c44
13,317,419 UART: [fwproc] Received Image of size 113760 bytes
16,253,631 UART: ROM Fatal Error: 0x000B0024
16,257,084 >>> mbox cmd response: failed
16,257,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,257,894 >>> mbox cmd response: failed
16,258,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,258,457 >>> mbox cmd response: failed
Initializing fuses
2,055,964 writing to cptra_bootfsm_go
2,245,257 UART:
2,245,612 UART: Running Caliptra ROM ...
2,246,759 UART:
4,193,874 UART: [state] CFI Enabled
4,208,722 UART: [state] LifecycleState = Unprovisioned
4,210,639 UART: [state] DebugLocked = No
4,213,058 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,217,478 UART: [kat] SHA2-256
4,387,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,397,770 UART: [kat] ++
4,398,229 UART: [kat] sha1
4,409,438 UART: [kat] SHA2-256
4,412,131 UART: [kat] SHA2-384
4,417,799 UART: [kat] SHA2-512-ACC
4,420,213 UART: [kat] ECC-384
6,702,503 UART: [kat] HMAC-384Kdf
6,715,060 UART: [kat] LMS
7,905,171 UART: [kat] --
7,908,808 UART: [cold-reset] ++
7,909,824 UART: [fht] Storing FHT @ 0x50003400
7,922,498 UART: [idev] ++
7,923,071 UART: [idev] CDI.KEYID = 6
7,924,014 UART: [idev] SUBJECT.KEYID = 7
7,925,284 UART: [idev] UDS.KEYID = 0
7,927,542 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,070,431 UART: [idev] Erasing UDS.KEYID = 0
11,215,467 UART: [idev] Using Sha1 for KeyId Algorithm
11,237,128 UART: [idev] --
11,240,614 UART: [ldev] ++
11,241,189 UART: [ldev] CDI.KEYID = 6
11,242,126 UART: [ldev] SUBJECT.KEYID = 5
11,243,411 UART: [ldev] AUTHORITY.KEYID = 7
11,244,653 UART: [ldev] FE.KEYID = 1
11,255,055 UART: [ldev] Erasing FE.KEYID = 1
14,546,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,840,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,855,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,869,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,884,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,902,276 UART: [ldev] --
16,907,378 UART: [fwproc] Waiting for Commands...
16,910,352 UART: [fwproc] Received command 0x46574c44
16,912,548 UART: [fwproc] Received Image of size 113760 bytes
20,967,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,039,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,107,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,423,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,134,791 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,048,743 >>> mbox cmd response: failed
16,049,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,049,674 >>> mbox cmd response: failed
16,049,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,050,248 >>> mbox cmd response: failed
Initializing fuses
2,056,187 writing to cptra_bootfsm_go
7,950,590 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,887,183 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,544 UART:
192,909 UART: Running Caliptra ROM ...
194,132 UART:
194,282 UART: [state] CFI Enabled
262,696 UART: [state] LifecycleState = Unprovisioned
264,619 UART: [state] DebugLocked = No
267,513 UART: [state] WD Timer not started. Device not locked for debugging
270,471 UART: [kat] SHA2-256
449,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,178 UART: [kat] ++
461,719 UART: [kat] sha1
472,388 UART: [kat] SHA2-256
475,398 UART: [kat] SHA2-384
482,130 UART: [kat] SHA2-512-ACC
485,063 UART: [kat] ECC-384
2,948,650 UART: [kat] HMAC-384Kdf
2,970,479 UART: [kat] LMS
3,499,951 UART: [kat] --
3,502,983 UART: [cold-reset] ++
3,504,594 UART: [fht] FHT @ 0x50003400
3,515,675 UART: [idev] ++
3,516,249 UART: [idev] CDI.KEYID = 6
3,517,161 UART: [idev] SUBJECT.KEYID = 7
3,518,380 UART: [idev] UDS.KEYID = 0
3,520,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,741 UART: [idev] Erasing UDS.KEYID = 0
6,026,863 UART: [idev] Sha1 KeyId Algorithm
6,049,399 UART: [idev] --
6,054,488 UART: [ldev] ++
6,055,098 UART: [ldev] CDI.KEYID = 6
6,056,018 UART: [ldev] SUBJECT.KEYID = 5
6,057,205 UART: [ldev] AUTHORITY.KEYID = 7
6,058,446 UART: [ldev] FE.KEYID = 1
6,090,516 UART: [ldev] Erasing FE.KEYID = 1
8,593,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,187 UART: [ldev] --
10,402,213 UART: [fwproc] Wait for Commands...
10,404,742 UART: [fwproc] Recv command 0x46574c44
10,406,784 UART: [fwproc] Recv'd Img size: 114084 bytes
12,703,795 UART: ROM Fatal Error: 0x000B0024
12,706,924 >>> mbox cmd response: failed
12,707,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,640 >>> mbox cmd response: failed
12,707,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,330 >>> mbox cmd response: failed
Initializing fuses
2,060,030 writing to cptra_bootfsm_go
2,249,377 UART:
2,249,727 UART: Running Caliptra ROM ...
2,250,863 UART:
2,251,041 UART: [state] CFI Enabled
2,319,013 UART: [state] LifecycleState = Unprovisioned
2,320,841 UART: [state] DebugLocked = No
2,322,609 UART: [state] WD Timer not started. Device not locked for debugging
2,327,110 UART: [kat] SHA2-256
2,506,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,795 UART: [kat] ++
2,518,360 UART: [kat] sha1
2,530,767 UART: [kat] SHA2-256
2,533,789 UART: [kat] SHA2-384
2,539,506 UART: [kat] SHA2-512-ACC
2,542,663 UART: [kat] ECC-384
5,004,346 UART: [kat] HMAC-384Kdf
5,027,480 UART: [kat] LMS
5,556,916 UART: [kat] --
5,562,035 UART: [cold-reset] ++
5,563,911 UART: [fht] FHT @ 0x50003400
5,575,864 UART: [idev] ++
5,576,428 UART: [idev] CDI.KEYID = 6
5,577,310 UART: [idev] SUBJECT.KEYID = 7
5,578,520 UART: [idev] UDS.KEYID = 0
5,580,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,691 UART: [idev] Erasing UDS.KEYID = 0
8,098,661 UART: [idev] Sha1 KeyId Algorithm
8,123,247 UART: [idev] --
8,126,926 UART: [ldev] ++
8,127,496 UART: [ldev] CDI.KEYID = 6
8,128,561 UART: [ldev] SUBJECT.KEYID = 5
8,129,667 UART: [ldev] AUTHORITY.KEYID = 7
8,130,839 UART: [ldev] FE.KEYID = 1
8,170,857 UART: [ldev] Erasing FE.KEYID = 1
10,673,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,412,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,428,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,443,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,459,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,478,503 UART: [ldev] --
12,482,488 UART: [fwproc] Wait for Commands...
12,484,810 UART: [fwproc] Recv command 0x46574c44
12,486,929 UART: [fwproc] Recv'd Img size: 114084 bytes
15,884,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,955,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,024,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,341,023 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,381,238 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,480,471 >>> mbox cmd response: failed
12,481,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,481,440 >>> mbox cmd response: failed
12,481,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,482,006 >>> mbox cmd response: failed
Initializing fuses
2,066,678 writing to cptra_bootfsm_go
5,449,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,141,572 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,469 UART:
192,842 UART: Running Caliptra ROM ...
194,012 UART:
603,552 UART: [state] CFI Enabled
617,596 UART: [state] LifecycleState = Unprovisioned
619,425 UART: [state] DebugLocked = No
620,744 UART: [state] WD Timer not started. Device not locked for debugging
624,807 UART: [kat] SHA2-256
803,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,519 UART: [kat] ++
816,050 UART: [kat] sha1
827,155 UART: [kat] SHA2-256
830,206 UART: [kat] SHA2-384
835,693 UART: [kat] SHA2-512-ACC
838,635 UART: [kat] ECC-384
3,282,816 UART: [kat] HMAC-384Kdf
3,295,692 UART: [kat] LMS
3,825,211 UART: [kat] --
3,829,256 UART: [cold-reset] ++
3,831,111 UART: [fht] FHT @ 0x50003400
3,843,122 UART: [idev] ++
3,843,697 UART: [idev] CDI.KEYID = 6
3,844,664 UART: [idev] SUBJECT.KEYID = 7
3,845,840 UART: [idev] UDS.KEYID = 0
3,848,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,790 UART: [idev] Erasing UDS.KEYID = 0
6,321,572 UART: [idev] Sha1 KeyId Algorithm
6,344,640 UART: [idev] --
6,348,805 UART: [ldev] ++
6,349,373 UART: [ldev] CDI.KEYID = 6
6,350,283 UART: [ldev] SUBJECT.KEYID = 5
6,351,441 UART: [ldev] AUTHORITY.KEYID = 7
6,352,725 UART: [ldev] FE.KEYID = 1
6,361,962 UART: [ldev] Erasing FE.KEYID = 1
8,837,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,487 UART: [ldev] --
10,631,625 UART: [fwproc] Wait for Commands...
10,633,176 UART: [fwproc] Recv command 0x46574c44
10,635,232 UART: [fwproc] Recv'd Img size: 114084 bytes
12,931,834 UART: ROM Fatal Error: 0x000B0024
12,934,965 >>> mbox cmd response: failed
12,935,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,598 >>> mbox cmd response: failed
12,935,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,187 >>> mbox cmd response: failed
Initializing fuses
2,055,416 writing to cptra_bootfsm_go
2,244,705 UART:
2,245,047 UART: Running Caliptra ROM ...
2,246,203 UART:
7,520,243 UART: [state] CFI Enabled
7,530,077 UART: [state] LifecycleState = Unprovisioned
7,532,016 UART: [state] DebugLocked = No
7,534,306 UART: [state] WD Timer not started. Device not locked for debugging
7,538,158 UART: [kat] SHA2-256
7,717,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,728,851 UART: [kat] ++
7,729,308 UART: [kat] sha1
7,740,353 UART: [kat] SHA2-256
7,743,429 UART: [kat] SHA2-384
7,748,878 UART: [kat] SHA2-512-ACC
7,751,876 UART: [kat] ECC-384
10,192,831 UART: [kat] HMAC-384Kdf
10,205,701 UART: [kat] LMS
10,735,174 UART: [kat] --
10,737,351 UART: [cold-reset] ++
10,739,236 UART: [fht] FHT @ 0x50003400
10,751,294 UART: [idev] ++
10,751,858 UART: [idev] CDI.KEYID = 6
10,752,768 UART: [idev] SUBJECT.KEYID = 7
10,753,977 UART: [idev] UDS.KEYID = 0
10,756,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,899,681 UART: [idev] Erasing UDS.KEYID = 0
13,227,214 UART: [idev] Sha1 KeyId Algorithm
13,250,277 UART: [idev] --
13,255,133 UART: [ldev] ++
13,255,703 UART: [ldev] CDI.KEYID = 6
13,256,643 UART: [ldev] SUBJECT.KEYID = 5
13,257,799 UART: [ldev] AUTHORITY.KEYID = 7
13,259,086 UART: [ldev] FE.KEYID = 1
13,268,573 UART: [ldev] Erasing FE.KEYID = 1
15,740,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,460,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,476,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,492,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,507,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,528,033 UART: [ldev] --
17,533,139 UART: [fwproc] Wait for Commands...
17,535,227 UART: [fwproc] Recv command 0x46574c44
17,537,326 UART: [fwproc] Recv'd Img size: 114084 bytes
20,936,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,007,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,075,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,392,695 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,694,275 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,698,322 >>> mbox cmd response: failed
12,698,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,699,269 >>> mbox cmd response: failed
12,699,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,699,824 >>> mbox cmd response: failed
Initializing fuses
2,063,442 writing to cptra_bootfsm_go
10,862,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,437,701 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,140 UART:
192,506 UART: Running Caliptra ROM ...
193,705 UART:
193,857 UART: [state] CFI Enabled
261,374 UART: [state] LifecycleState = Unprovisioned
263,779 UART: [state] DebugLocked = No
266,670 UART: [state] WD Timer not started. Device not locked for debugging
271,932 UART: [kat] SHA2-256
461,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,593 UART: [kat] ++
473,070 UART: [kat] sha1
483,687 UART: [kat] SHA2-256
486,719 UART: [kat] SHA2-384
493,088 UART: [kat] SHA2-512-ACC
495,663 UART: [kat] ECC-384
2,946,053 UART: [kat] HMAC-384Kdf
2,968,886 UART: [kat] LMS
3,500,655 UART: [kat] --
3,505,886 UART: [cold-reset] ++
3,508,086 UART: [fht] FHT @ 0x50003400
3,520,971 UART: [idev] ++
3,521,704 UART: [idev] CDI.KEYID = 6
3,522,638 UART: [idev] SUBJECT.KEYID = 7
3,523,850 UART: [idev] UDS.KEYID = 0
3,526,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,605 UART: [idev] Erasing UDS.KEYID = 0
6,026,507 UART: [idev] Sha1 KeyId Algorithm
6,048,382 UART: [idev] --
6,052,928 UART: [ldev] ++
6,053,629 UART: [ldev] CDI.KEYID = 6
6,054,516 UART: [ldev] SUBJECT.KEYID = 5
6,055,599 UART: [ldev] AUTHORITY.KEYID = 7
6,056,894 UART: [ldev] FE.KEYID = 1
6,098,819 UART: [ldev] Erasing FE.KEYID = 1
8,603,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,507 UART: [ldev] --
10,411,504 UART: [fwproc] Wait for Commands...
10,413,013 UART: [fwproc] Recv command 0x46574c44
10,415,343 UART: [fwproc] Recv'd Img size: 114084 bytes
12,739,879 UART: ROM Fatal Error: 0x000B0024
12,743,510 >>> mbox cmd response: failed
12,743,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,253 >>> mbox cmd response: failed
12,744,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,815 >>> mbox cmd response: failed
Initializing fuses
2,064,695 writing to cptra_bootfsm_go
2,253,986 UART:
2,254,338 UART: Running Caliptra ROM ...
2,255,572 UART:
2,255,735 UART: [state] CFI Enabled
2,321,489 UART: [state] LifecycleState = Unprovisioned
2,323,837 UART: [state] DebugLocked = No
2,326,654 UART: [state] WD Timer not started. Device not locked for debugging
2,331,196 UART: [kat] SHA2-256
2,521,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,834 UART: [kat] ++
2,532,325 UART: [kat] sha1
2,543,973 UART: [kat] SHA2-256
2,547,005 UART: [kat] SHA2-384
2,552,843 UART: [kat] SHA2-512-ACC
2,555,422 UART: [kat] ECC-384
5,002,099 UART: [kat] HMAC-384Kdf
5,028,381 UART: [kat] LMS
5,560,157 UART: [kat] --
5,565,028 UART: [cold-reset] ++
5,567,346 UART: [fht] FHT @ 0x50003400
5,577,521 UART: [idev] ++
5,578,198 UART: [idev] CDI.KEYID = 6
5,579,159 UART: [idev] SUBJECT.KEYID = 7
5,580,391 UART: [idev] UDS.KEYID = 0
5,582,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,347 UART: [idev] Erasing UDS.KEYID = 0
8,086,882 UART: [idev] Sha1 KeyId Algorithm
8,109,046 UART: [idev] --
8,113,730 UART: [ldev] ++
8,114,421 UART: [ldev] CDI.KEYID = 6
8,115,335 UART: [ldev] SUBJECT.KEYID = 5
8,116,552 UART: [ldev] AUTHORITY.KEYID = 7
8,117,729 UART: [ldev] FE.KEYID = 1
8,155,819 UART: [ldev] Erasing FE.KEYID = 1
10,680,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,410,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,426,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,441,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,456,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,478,182 UART: [ldev] --
12,482,747 UART: [fwproc] Wait for Commands...
12,485,872 UART: [fwproc] Recv command 0x46574c44
12,488,191 UART: [fwproc] Recv'd Img size: 114084 bytes
15,935,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,013,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,129,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,670,120 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,439,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,644,418 >>> mbox cmd response: failed
12,644,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,311 >>> mbox cmd response: failed
12,645,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,874 >>> mbox cmd response: failed
Initializing fuses
2,065,058 writing to cptra_bootfsm_go
5,491,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,748,087 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,548 UART:
192,896 UART: Running Caliptra ROM ...
194,088 UART:
603,611 UART: [state] CFI Enabled
620,941 UART: [state] LifecycleState = Unprovisioned
623,298 UART: [state] DebugLocked = No
624,963 UART: [state] WD Timer not started. Device not locked for debugging
629,070 UART: [kat] SHA2-256
818,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,746 UART: [kat] ++
830,246 UART: [kat] sha1
841,551 UART: [kat] SHA2-256
844,563 UART: [kat] SHA2-384
851,674 UART: [kat] SHA2-512-ACC
854,228 UART: [kat] ECC-384
3,295,865 UART: [kat] HMAC-384Kdf
3,308,588 UART: [kat] LMS
3,840,418 UART: [kat] --
3,845,924 UART: [cold-reset] ++
3,848,072 UART: [fht] FHT @ 0x50003400
3,859,540 UART: [idev] ++
3,860,222 UART: [idev] CDI.KEYID = 6
3,861,178 UART: [idev] SUBJECT.KEYID = 7
3,862,390 UART: [idev] UDS.KEYID = 0
3,864,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,637 UART: [idev] Erasing UDS.KEYID = 0
6,339,083 UART: [idev] Sha1 KeyId Algorithm
6,361,834 UART: [idev] --
6,367,673 UART: [ldev] ++
6,368,356 UART: [ldev] CDI.KEYID = 6
6,369,270 UART: [ldev] SUBJECT.KEYID = 5
6,370,430 UART: [ldev] AUTHORITY.KEYID = 7
6,371,663 UART: [ldev] FE.KEYID = 1
6,382,499 UART: [ldev] Erasing FE.KEYID = 1
8,856,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,144 UART: [ldev] --
10,648,478 UART: [fwproc] Wait for Commands...
10,650,149 UART: [fwproc] Recv command 0x46574c44
10,652,410 UART: [fwproc] Recv'd Img size: 114084 bytes
12,974,062 UART: ROM Fatal Error: 0x000B0024
12,977,680 >>> mbox cmd response: failed
12,978,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,978,417 >>> mbox cmd response: failed
12,978,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,978,977 >>> mbox cmd response: failed
Initializing fuses
2,058,102 writing to cptra_bootfsm_go
2,247,458 UART:
2,247,832 UART: Running Caliptra ROM ...
2,248,888 UART:
7,474,340 UART: [state] CFI Enabled
7,488,460 UART: [state] LifecycleState = Unprovisioned
7,490,842 UART: [state] DebugLocked = No
7,492,153 UART: [state] WD Timer not started. Device not locked for debugging
7,496,170 UART: [kat] SHA2-256
7,686,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,696,885 UART: [kat] ++
7,697,348 UART: [kat] sha1
7,709,047 UART: [kat] SHA2-256
7,712,068 UART: [kat] SHA2-384
7,719,247 UART: [kat] SHA2-512-ACC
7,721,819 UART: [kat] ECC-384
10,161,765 UART: [kat] HMAC-384Kdf
10,175,172 UART: [kat] LMS
10,706,978 UART: [kat] --
10,712,922 UART: [cold-reset] ++
10,714,203 UART: [fht] FHT @ 0x50003400
10,725,180 UART: [idev] ++
10,725,854 UART: [idev] CDI.KEYID = 6
10,726,871 UART: [idev] SUBJECT.KEYID = 7
10,728,027 UART: [idev] UDS.KEYID = 0
10,730,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,873,691 UART: [idev] Erasing UDS.KEYID = 0
13,204,195 UART: [idev] Sha1 KeyId Algorithm
13,226,130 UART: [idev] --
13,231,474 UART: [ldev] ++
13,232,213 UART: [ldev] CDI.KEYID = 6
13,233,278 UART: [ldev] SUBJECT.KEYID = 5
13,234,380 UART: [ldev] AUTHORITY.KEYID = 7
13,235,552 UART: [ldev] FE.KEYID = 1
13,245,276 UART: [ldev] Erasing FE.KEYID = 1
15,725,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,444,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,459,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,474,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,489,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,510,998 UART: [ldev] --
17,517,027 UART: [fwproc] Wait for Commands...
17,518,534 UART: [fwproc] Recv command 0x46574c44
17,520,793 UART: [fwproc] Recv'd Img size: 114084 bytes
20,961,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,043,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,159,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,700,755 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,750,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,858,389 >>> mbox cmd response: failed
12,858,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,859,277 >>> mbox cmd response: failed
12,859,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,859,835 >>> mbox cmd response: failed
Initializing fuses
2,057,994 writing to cptra_bootfsm_go
10,763,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,936,541 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,308 UART: [kat] SHA2-512-ACC
897,209 UART: [kat] ECC-384
902,918 UART: [kat] HMAC-384Kdf
907,304 UART: [kat] LMS
1,475,500 UART: [kat] --
1,476,627 UART: [cold-reset] ++
1,477,187 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,112 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,514,949 UART: [ldev] ++
1,515,117 UART: [ldev] CDI.KEYID = 6
1,515,480 UART: [ldev] SUBJECT.KEYID = 5
1,515,906 UART: [ldev] AUTHORITY.KEYID = 7
1,516,369 UART: [ldev] FE.KEYID = 1
1,521,683 UART: [ldev] Erasing FE.KEYID = 1
1,546,940 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,042 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,190 UART: [fwproc] Received command 0x46574c44
1,587,981 UART: [fwproc] Received Image of size 114084 bytes
1,853,619 UART: ROM Fatal Error: 0x000B0024
1,854,776 >>> mbox cmd response: failed
1,854,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,782 >>> mbox cmd response: failed
1,854,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,422 UART: [kat] HMAC-384Kdf
906,936 UART: [kat] LMS
1,475,132 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,430 UART: [idev] Erasing UDS.KEYID = 0
1,504,998 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,520,965 UART: [ldev] Erasing FE.KEYID = 1
1,546,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,396 UART: [ldev] --
1,585,845 UART: [fwproc] Waiting for Commands...
1,586,460 UART: [fwproc] Received command 0x46574c44
1,587,251 UART: [fwproc] Received Image of size 114084 bytes
2,882,626 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,978 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,771 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,707,637 >>> mbox cmd response: failed
1,707,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,643 >>> mbox cmd response: failed
1,707,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,429 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,520 UART: [kat] SHA2-256
882,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,566 UART: [kat] ++
886,718 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
903,201 UART: [kat] HMAC-384Kdf
907,677 UART: [kat] LMS
1,475,873 UART: [kat] --
1,477,086 UART: [cold-reset] ++
1,477,436 UART: [fht] Storing FHT @ 0x50003400
1,480,149 UART: [idev] ++
1,480,317 UART: [idev] CDI.KEYID = 6
1,480,677 UART: [idev] SUBJECT.KEYID = 7
1,481,101 UART: [idev] UDS.KEYID = 0
1,481,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,193 UART: [idev] --
1,515,288 UART: [ldev] ++
1,515,456 UART: [ldev] CDI.KEYID = 6
1,515,819 UART: [ldev] SUBJECT.KEYID = 5
1,516,245 UART: [ldev] AUTHORITY.KEYID = 7
1,516,708 UART: [ldev] FE.KEYID = 1
1,522,096 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,999 UART: [ldev] --
1,587,500 UART: [fwproc] Waiting for Commands...
1,588,309 UART: [fwproc] Received command 0x46574c44
1,589,100 UART: [fwproc] Received Image of size 114084 bytes
1,856,120 UART: ROM Fatal Error: 0x000B0024
1,857,277 >>> mbox cmd response: failed
1,857,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,283 >>> mbox cmd response: failed
1,857,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,174 UART: [kat] SHA2-256
893,112 UART: [kat] SHA2-384
895,757 UART: [kat] SHA2-512-ACC
897,658 UART: [kat] ECC-384
903,705 UART: [kat] HMAC-384Kdf
908,399 UART: [kat] LMS
1,476,595 UART: [kat] --
1,477,574 UART: [cold-reset] ++
1,478,000 UART: [fht] Storing FHT @ 0x50003400
1,480,705 UART: [idev] ++
1,480,873 UART: [idev] CDI.KEYID = 6
1,481,233 UART: [idev] SUBJECT.KEYID = 7
1,481,657 UART: [idev] UDS.KEYID = 0
1,482,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,047 UART: [idev] Erasing UDS.KEYID = 0
1,506,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,513 UART: [idev] --
1,516,614 UART: [ldev] ++
1,516,782 UART: [ldev] CDI.KEYID = 6
1,517,145 UART: [ldev] SUBJECT.KEYID = 5
1,517,571 UART: [ldev] AUTHORITY.KEYID = 7
1,518,034 UART: [ldev] FE.KEYID = 1
1,523,196 UART: [ldev] Erasing FE.KEYID = 1
1,549,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,225 UART: [ldev] --
1,588,712 UART: [fwproc] Waiting for Commands...
1,589,413 UART: [fwproc] Received command 0x46574c44
1,590,204 UART: [fwproc] Received Image of size 114084 bytes
2,883,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,857 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,760 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,706,770 >>> mbox cmd response: failed
1,706,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,776 >>> mbox cmd response: failed
1,706,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,240 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
893,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,919 UART: [kat] ++
898,071 UART: [kat] sha1
902,365 UART: [kat] SHA2-256
904,305 UART: [kat] SHA2-384
907,070 UART: [kat] SHA2-512-ACC
908,971 UART: [kat] ECC-384
918,918 UART: [kat] HMAC-384Kdf
923,416 UART: [kat] LMS
1,171,744 UART: [kat] --
1,172,575 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,758 UART: [idev] ++
1,175,926 UART: [idev] CDI.KEYID = 6
1,176,286 UART: [idev] SUBJECT.KEYID = 7
1,176,710 UART: [idev] UDS.KEYID = 0
1,177,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,850 UART: [idev] Erasing UDS.KEYID = 0
1,202,295 UART: [idev] Sha1 KeyId Algorithm
1,210,919 UART: [idev] --
1,211,875 UART: [ldev] ++
1,212,043 UART: [ldev] CDI.KEYID = 6
1,212,406 UART: [ldev] SUBJECT.KEYID = 5
1,212,832 UART: [ldev] AUTHORITY.KEYID = 7
1,213,295 UART: [ldev] FE.KEYID = 1
1,218,421 UART: [ldev] Erasing FE.KEYID = 1
1,244,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,393 UART: [ldev] --
1,283,900 UART: [fwproc] Wait for Commands...
1,284,524 UART: [fwproc] Recv command 0x46574c44
1,285,252 UART: [fwproc] Recv'd Img size: 114084 bytes
1,551,162 UART: ROM Fatal Error: 0x000B0024
1,552,319 >>> mbox cmd response: failed
1,552,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,325 >>> mbox cmd response: failed
1,552,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
893,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,787 UART: [kat] ++
897,939 UART: [kat] sha1
902,187 UART: [kat] SHA2-256
904,127 UART: [kat] SHA2-384
906,894 UART: [kat] SHA2-512-ACC
908,795 UART: [kat] ECC-384
918,620 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,427 UART: [cold-reset] ++
1,172,775 UART: [fht] FHT @ 0x50003400
1,175,438 UART: [idev] ++
1,175,606 UART: [idev] CDI.KEYID = 6
1,175,966 UART: [idev] SUBJECT.KEYID = 7
1,176,390 UART: [idev] UDS.KEYID = 0
1,176,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,255 UART: [idev] --
1,210,425 UART: [ldev] ++
1,210,593 UART: [ldev] CDI.KEYID = 6
1,210,956 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,154 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,530 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,742 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,407,394 >>> mbox cmd response: failed
1,407,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,400 >>> mbox cmd response: failed
1,407,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,113 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
893,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,232 UART: [kat] ++
897,384 UART: [kat] sha1
901,556 UART: [kat] SHA2-256
903,496 UART: [kat] SHA2-384
906,235 UART: [kat] SHA2-512-ACC
908,136 UART: [kat] ECC-384
917,995 UART: [kat] HMAC-384Kdf
922,515 UART: [kat] LMS
1,170,843 UART: [kat] --
1,171,890 UART: [cold-reset] ++
1,172,340 UART: [fht] FHT @ 0x50003400
1,174,857 UART: [idev] ++
1,175,025 UART: [idev] CDI.KEYID = 6
1,175,385 UART: [idev] SUBJECT.KEYID = 7
1,175,809 UART: [idev] UDS.KEYID = 0
1,176,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,674 UART: [idev] --
1,210,716 UART: [ldev] ++
1,210,884 UART: [ldev] CDI.KEYID = 6
1,211,247 UART: [ldev] SUBJECT.KEYID = 5
1,211,673 UART: [ldev] AUTHORITY.KEYID = 7
1,212,136 UART: [ldev] FE.KEYID = 1
1,217,358 UART: [ldev] Erasing FE.KEYID = 1
1,244,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,402 UART: [ldev] --
1,283,785 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,267 UART: ROM Fatal Error: 0x000B0024
1,551,424 >>> mbox cmd response: failed
1,551,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,430 >>> mbox cmd response: failed
1,551,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,278 UART: [state] WD Timer not started. Device not locked for debugging
87,409 UART: [kat] SHA2-256
893,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,184 UART: [kat] ++
897,336 UART: [kat] sha1
901,522 UART: [kat] SHA2-256
903,462 UART: [kat] SHA2-384
906,065 UART: [kat] SHA2-512-ACC
907,966 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,831 UART: [kat] LMS
1,171,159 UART: [kat] --
1,171,936 UART: [cold-reset] ++
1,172,422 UART: [fht] FHT @ 0x50003400
1,175,001 UART: [idev] ++
1,175,169 UART: [idev] CDI.KEYID = 6
1,175,529 UART: [idev] SUBJECT.KEYID = 7
1,175,953 UART: [idev] UDS.KEYID = 0
1,176,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,953 UART: [idev] Erasing UDS.KEYID = 0
1,201,184 UART: [idev] Sha1 KeyId Algorithm
1,209,604 UART: [idev] --
1,210,682 UART: [ldev] ++
1,210,850 UART: [ldev] CDI.KEYID = 6
1,211,213 UART: [ldev] SUBJECT.KEYID = 5
1,211,639 UART: [ldev] AUTHORITY.KEYID = 7
1,212,102 UART: [ldev] FE.KEYID = 1
1,217,406 UART: [ldev] Erasing FE.KEYID = 1
1,244,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,653 UART: [fwproc] Wait for Commands...
1,284,297 UART: [fwproc] Recv command 0x46574c44
1,285,025 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,735 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,285 >>> mbox cmd response: failed
1,406,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,291 >>> mbox cmd response: failed
1,406,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,962 UART: [state] LifecycleState = Unprovisioned
85,617 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,294 UART: [kat] SHA2-256
890,844 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,263 UART: [kat] SHA2-256
901,203 UART: [kat] SHA2-384
903,906 UART: [kat] SHA2-512-ACC
905,807 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
919,868 UART: [kat] LMS
1,168,180 UART: [kat] --
1,169,229 UART: [cold-reset] ++
1,169,795 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,173,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,197,849 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,786 UART: [ldev] ++
1,207,954 UART: [ldev] CDI.KEYID = 6
1,208,318 UART: [ldev] SUBJECT.KEYID = 5
1,208,745 UART: [ldev] AUTHORITY.KEYID = 7
1,209,208 UART: [ldev] FE.KEYID = 1
1,214,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,094 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,321 UART: [fwproc] Recv command 0x46574c44
1,282,054 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,541 UART: ROM Fatal Error: 0x000B0024
1,548,698 >>> mbox cmd response: failed
1,548,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,704 >>> mbox cmd response: failed
1,548,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,872 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,141 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,208,001 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,242,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,338 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,072 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,361 >>> mbox cmd response: failed
1,402,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,367 >>> mbox cmd response: failed
1,402,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,878 UART: [kat] ++
896,030 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
905,083 UART: [kat] SHA2-512-ACC
906,984 UART: [kat] ECC-384
917,053 UART: [kat] HMAC-384Kdf
921,695 UART: [kat] LMS
1,170,007 UART: [kat] --
1,171,020 UART: [cold-reset] ++
1,171,514 UART: [fht] FHT @ 0x50003400
1,174,426 UART: [idev] ++
1,174,594 UART: [idev] CDI.KEYID = 6
1,174,955 UART: [idev] SUBJECT.KEYID = 7
1,175,380 UART: [idev] UDS.KEYID = 0
1,175,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114084 bytes
1,547,526 UART: ROM Fatal Error: 0x000B0024
1,548,683 >>> mbox cmd response: failed
1,548,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,689 >>> mbox cmd response: failed
1,548,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,084 UART: [kat] SHA2-256
902,024 UART: [kat] SHA2-384
904,969 UART: [kat] SHA2-512-ACC
906,870 UART: [kat] ECC-384
916,557 UART: [kat] HMAC-384Kdf
921,229 UART: [kat] LMS
1,169,541 UART: [kat] --
1,170,328 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,825 UART: [ldev] --
1,282,303 UART: [fwproc] Wait for Commands...
1,283,080 UART: [fwproc] Recv command 0x46574c44
1,283,813 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,735 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,217 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,620 >>> mbox cmd response: failed
1,403,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,626 >>> mbox cmd response: failed
1,403,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,489 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,104 UART:
192,473 UART: Running Caliptra ROM ...
193,661 UART:
193,810 UART: [state] CFI Enabled
267,005 UART: [state] LifecycleState = Unprovisioned
268,942 UART: [state] DebugLocked = No
270,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,990 UART: [kat] SHA2-256
444,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,199 UART: [kat] ++
455,647 UART: [kat] sha1
466,345 UART: [kat] SHA2-256
469,036 UART: [kat] SHA2-384
474,802 UART: [kat] SHA2-512-ACC
477,142 UART: [kat] ECC-384
2,767,357 UART: [kat] HMAC-384Kdf
2,798,029 UART: [kat] LMS
3,988,297 UART: [kat] --
3,992,368 UART: [cold-reset] ++
3,994,793 UART: [fht] Storing FHT @ 0x50003400
4,006,568 UART: [idev] ++
4,007,141 UART: [idev] CDI.KEYID = 6
4,008,164 UART: [idev] SUBJECT.KEYID = 7
4,009,331 UART: [idev] UDS.KEYID = 0
4,011,861 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,249 UART: [idev] Erasing UDS.KEYID = 0
7,344,224 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,189 UART: [idev] --
7,369,137 UART: [ldev] ++
7,369,765 UART: [ldev] CDI.KEYID = 6
7,370,678 UART: [ldev] SUBJECT.KEYID = 5
7,371,898 UART: [ldev] AUTHORITY.KEYID = 7
7,373,282 UART: [ldev] FE.KEYID = 1
7,399,392 UART: [ldev] Erasing FE.KEYID = 1
10,734,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,012 UART: [ldev] --
13,115,304 UART: [fwproc] Waiting for Commands...
13,117,132 UART: [fwproc] Received command 0x46574c44
13,119,327 UART: [fwproc] Received Image of size 113760 bytes
16,057,889 UART: ROM Fatal Error: 0x000B0021
16,061,354 >>> mbox cmd response: failed
16,061,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,113 >>> mbox cmd response: failed
16,062,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,684 >>> mbox cmd response: failed
Initializing fuses
2,062,410 writing to cptra_bootfsm_go
2,251,748 UART:
2,252,090 UART: Running Caliptra ROM ...
2,253,233 UART:
2,253,401 UART: [state] CFI Enabled
2,311,017 UART: [state] LifecycleState = Unprovisioned
2,312,957 UART: [state] DebugLocked = No
2,315,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,469 UART: [kat] SHA2-256
2,490,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,714 UART: [kat] ++
2,501,175 UART: [kat] sha1
2,512,010 UART: [kat] SHA2-256
2,514,689 UART: [kat] SHA2-384
2,521,495 UART: [kat] SHA2-512-ACC
2,523,847 UART: [kat] ECC-384
4,812,023 UART: [kat] HMAC-384Kdf
4,845,620 UART: [kat] LMS
6,035,941 UART: [kat] --
6,038,817 UART: [cold-reset] ++
6,040,535 UART: [fht] Storing FHT @ 0x50003400
6,052,290 UART: [idev] ++
6,052,864 UART: [idev] CDI.KEYID = 6
6,053,804 UART: [idev] SUBJECT.KEYID = 7
6,055,074 UART: [idev] UDS.KEYID = 0
6,057,190 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,200,284 UART: [idev] Erasing UDS.KEYID = 0
9,390,860 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,444 UART: [idev] --
9,417,551 UART: [ldev] ++
9,418,129 UART: [ldev] CDI.KEYID = 6
9,419,146 UART: [ldev] SUBJECT.KEYID = 5
9,420,378 UART: [ldev] AUTHORITY.KEYID = 7
9,421,563 UART: [ldev] FE.KEYID = 1
9,467,226 UART: [ldev] Erasing FE.KEYID = 1
12,803,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,128,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,080 UART: [ldev] --
15,182,865 UART: [fwproc] Waiting for Commands...
15,185,502 UART: [fwproc] Received command 0x46574c44
15,187,687 UART: [fwproc] Received Image of size 113760 bytes
19,231,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,312,111 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,381,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,697,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,807,183 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,868,634 >>> mbox cmd response: failed
15,869,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,869,553 >>> mbox cmd response: failed
15,869,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,870,142 >>> mbox cmd response: failed
Initializing fuses
2,054,148 writing to cptra_bootfsm_go
5,832,286 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,888,937 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,551 UART:
192,898 UART: Running Caliptra ROM ...
194,078 UART:
603,806 UART: [state] CFI Enabled
616,658 UART: [state] LifecycleState = Unprovisioned
618,593 UART: [state] DebugLocked = No
620,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,153 UART: [kat] SHA2-256
794,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,443 UART: [kat] ++
805,908 UART: [kat] sha1
816,047 UART: [kat] SHA2-256
818,747 UART: [kat] SHA2-384
825,217 UART: [kat] SHA2-512-ACC
827,565 UART: [kat] ECC-384
3,109,785 UART: [kat] HMAC-384Kdf
3,121,953 UART: [kat] LMS
4,312,078 UART: [kat] --
4,316,421 UART: [cold-reset] ++
4,318,842 UART: [fht] Storing FHT @ 0x50003400
4,330,755 UART: [idev] ++
4,331,322 UART: [idev] CDI.KEYID = 6
4,332,206 UART: [idev] SUBJECT.KEYID = 7
4,333,472 UART: [idev] UDS.KEYID = 0
4,335,945 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,026 UART: [idev] Erasing UDS.KEYID = 0
7,617,097 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,535 UART: [idev] --
7,645,992 UART: [ldev] ++
7,646,561 UART: [ldev] CDI.KEYID = 6
7,647,528 UART: [ldev] SUBJECT.KEYID = 5
7,648,740 UART: [ldev] AUTHORITY.KEYID = 7
7,650,025 UART: [ldev] FE.KEYID = 1
7,661,646 UART: [ldev] Erasing FE.KEYID = 1
10,952,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,797 UART: [ldev] --
13,312,764 UART: [fwproc] Waiting for Commands...
13,314,753 UART: [fwproc] Received command 0x46574c44
13,317,014 UART: [fwproc] Received Image of size 113760 bytes
16,258,564 UART: ROM Fatal Error: 0x000B0021
16,262,015 >>> mbox cmd response: failed
16,262,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,262,774 >>> mbox cmd response: failed
16,263,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,263,338 >>> mbox cmd response: failed
Initializing fuses
2,056,129 writing to cptra_bootfsm_go
2,245,488 UART:
2,245,845 UART: Running Caliptra ROM ...
2,246,986 UART:
4,197,350 UART: [state] CFI Enabled
4,212,769 UART: [state] LifecycleState = Unprovisioned
4,214,733 UART: [state] DebugLocked = No
4,217,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,222,171 UART: [kat] SHA2-256
4,391,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,402,464 UART: [kat] ++
4,403,003 UART: [kat] sha1
4,413,366 UART: [kat] SHA2-256
4,416,067 UART: [kat] SHA2-384
4,421,790 UART: [kat] SHA2-512-ACC
4,424,148 UART: [kat] ECC-384
6,708,633 UART: [kat] HMAC-384Kdf
6,721,782 UART: [kat] LMS
7,911,918 UART: [kat] --
7,916,410 UART: [cold-reset] ++
7,918,829 UART: [fht] Storing FHT @ 0x50003400
7,930,636 UART: [idev] ++
7,931,220 UART: [idev] CDI.KEYID = 6
7,932,159 UART: [idev] SUBJECT.KEYID = 7
7,933,426 UART: [idev] UDS.KEYID = 0
7,935,654 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,078,530 UART: [idev] Erasing UDS.KEYID = 0
11,220,114 UART: [idev] Using Sha1 for KeyId Algorithm
11,240,856 UART: [idev] --
11,245,014 UART: [ldev] ++
11,245,643 UART: [ldev] CDI.KEYID = 6
11,246,521 UART: [ldev] SUBJECT.KEYID = 5
11,247,822 UART: [ldev] AUTHORITY.KEYID = 7
11,249,156 UART: [ldev] FE.KEYID = 1
11,260,323 UART: [ldev] Erasing FE.KEYID = 1
14,552,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,844,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,859,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,873,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,888,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,907,994 UART: [ldev] --
16,912,666 UART: [fwproc] Waiting for Commands...
16,915,251 UART: [fwproc] Received command 0x46574c44
16,917,435 UART: [fwproc] Received Image of size 113760 bytes
20,962,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,037,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,106,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,422,797 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,134,200 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,056,675 >>> mbox cmd response: failed
16,057,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,057,604 >>> mbox cmd response: failed
16,057,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,202 >>> mbox cmd response: failed
Initializing fuses
2,061,398 writing to cptra_bootfsm_go
7,934,675 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,873,484 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,129 UART:
192,494 UART: Running Caliptra ROM ...
193,643 UART:
193,792 UART: [state] CFI Enabled
259,931 UART: [state] LifecycleState = Unprovisioned
261,892 UART: [state] DebugLocked = No
264,201 UART: [state] WD Timer not started. Device not locked for debugging
267,973 UART: [kat] SHA2-256
447,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,674 UART: [kat] ++
459,213 UART: [kat] sha1
470,369 UART: [kat] SHA2-256
473,377 UART: [kat] SHA2-384
478,542 UART: [kat] SHA2-512-ACC
481,473 UART: [kat] ECC-384
2,924,722 UART: [kat] HMAC-384Kdf
2,948,560 UART: [kat] LMS
3,477,997 UART: [kat] --
3,482,565 UART: [cold-reset] ++
3,483,640 UART: [fht] FHT @ 0x50003400
3,494,305 UART: [idev] ++
3,494,925 UART: [idev] CDI.KEYID = 6
3,495,842 UART: [idev] SUBJECT.KEYID = 7
3,497,002 UART: [idev] UDS.KEYID = 0
3,499,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,643,074 UART: [idev] Erasing UDS.KEYID = 0
6,001,956 UART: [idev] Sha1 KeyId Algorithm
6,026,379 UART: [idev] --
6,029,459 UART: [ldev] ++
6,030,031 UART: [ldev] CDI.KEYID = 6
6,030,948 UART: [ldev] SUBJECT.KEYID = 5
6,032,165 UART: [ldev] AUTHORITY.KEYID = 7
6,033,399 UART: [ldev] FE.KEYID = 1
6,079,319 UART: [ldev] Erasing FE.KEYID = 1
8,582,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,473 UART: [ldev] --
10,394,372 UART: [fwproc] Wait for Commands...
10,396,634 UART: [fwproc] Recv command 0x46574c44
10,398,731 UART: [fwproc] Recv'd Img size: 114084 bytes
12,684,591 UART: ROM Fatal Error: 0x000B0021
12,687,710 >>> mbox cmd response: failed
12,688,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,462 >>> mbox cmd response: failed
12,688,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,064 >>> mbox cmd response: failed
Initializing fuses
2,060,057 writing to cptra_bootfsm_go
2,249,376 UART:
2,249,742 UART: Running Caliptra ROM ...
2,250,875 UART:
2,251,039 UART: [state] CFI Enabled
2,315,870 UART: [state] LifecycleState = Unprovisioned
2,317,714 UART: [state] DebugLocked = No
2,320,353 UART: [state] WD Timer not started. Device not locked for debugging
2,323,930 UART: [kat] SHA2-256
2,503,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,645 UART: [kat] ++
2,515,105 UART: [kat] sha1
2,527,017 UART: [kat] SHA2-256
2,530,036 UART: [kat] SHA2-384
2,536,675 UART: [kat] SHA2-512-ACC
2,539,629 UART: [kat] ECC-384
5,002,450 UART: [kat] HMAC-384Kdf
5,023,499 UART: [kat] LMS
5,552,973 UART: [kat] --
5,556,913 UART: [cold-reset] ++
5,557,991 UART: [fht] FHT @ 0x50003400
5,569,512 UART: [idev] ++
5,570,079 UART: [idev] CDI.KEYID = 6
5,570,992 UART: [idev] SUBJECT.KEYID = 7
5,572,209 UART: [idev] UDS.KEYID = 0
5,574,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,718,168 UART: [idev] Erasing UDS.KEYID = 0
8,078,055 UART: [idev] Sha1 KeyId Algorithm
8,102,008 UART: [idev] --
8,105,588 UART: [ldev] ++
8,106,160 UART: [ldev] CDI.KEYID = 6
8,107,071 UART: [ldev] SUBJECT.KEYID = 5
8,108,309 UART: [ldev] AUTHORITY.KEYID = 7
8,109,544 UART: [ldev] FE.KEYID = 1
8,151,862 UART: [ldev] Erasing FE.KEYID = 1
10,653,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,467 UART: [ldev] --
12,446,840 UART: [fwproc] Wait for Commands...
12,449,154 UART: [fwproc] Recv command 0x46574c44
12,451,248 UART: [fwproc] Recv'd Img size: 114084 bytes
15,857,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,926,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,995,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,313,272 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,383,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,494,308 >>> mbox cmd response: failed
12,494,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,495,253 >>> mbox cmd response: failed
12,495,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,495,821 >>> mbox cmd response: failed
Initializing fuses
2,055,222 writing to cptra_bootfsm_go
5,437,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,115,366 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,713 UART:
193,074 UART: Running Caliptra ROM ...
194,178 UART:
603,955 UART: [state] CFI Enabled
615,938 UART: [state] LifecycleState = Unprovisioned
617,833 UART: [state] DebugLocked = No
620,029 UART: [state] WD Timer not started. Device not locked for debugging
623,210 UART: [kat] SHA2-256
802,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,902 UART: [kat] ++
814,433 UART: [kat] sha1
824,725 UART: [kat] SHA2-256
827,779 UART: [kat] SHA2-384
834,831 UART: [kat] SHA2-512-ACC
837,813 UART: [kat] ECC-384
3,280,903 UART: [kat] HMAC-384Kdf
3,292,680 UART: [kat] LMS
3,822,150 UART: [kat] --
3,825,084 UART: [cold-reset] ++
3,827,247 UART: [fht] FHT @ 0x50003400
3,839,196 UART: [idev] ++
3,839,758 UART: [idev] CDI.KEYID = 6
3,840,692 UART: [idev] SUBJECT.KEYID = 7
3,841,903 UART: [idev] UDS.KEYID = 0
3,844,398 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,943 UART: [idev] Erasing UDS.KEYID = 0
6,316,491 UART: [idev] Sha1 KeyId Algorithm
6,339,453 UART: [idev] --
6,343,663 UART: [ldev] ++
6,344,229 UART: [ldev] CDI.KEYID = 6
6,345,109 UART: [ldev] SUBJECT.KEYID = 5
6,346,270 UART: [ldev] AUTHORITY.KEYID = 7
6,347,611 UART: [ldev] FE.KEYID = 1
6,355,959 UART: [ldev] Erasing FE.KEYID = 1
8,826,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,036 UART: [ldev] --
10,617,496 UART: [fwproc] Wait for Commands...
10,620,407 UART: [fwproc] Recv command 0x46574c44
10,622,462 UART: [fwproc] Recv'd Img size: 114084 bytes
12,906,259 UART: ROM Fatal Error: 0x000B0021
12,909,390 >>> mbox cmd response: failed
12,909,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,160 >>> mbox cmd response: failed
12,910,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,724 >>> mbox cmd response: failed
Initializing fuses
2,052,532 writing to cptra_bootfsm_go
2,241,856 UART:
2,242,208 UART: Running Caliptra ROM ...
2,243,346 UART:
7,537,614 UART: [state] CFI Enabled
7,551,336 UART: [state] LifecycleState = Unprovisioned
7,553,174 UART: [state] DebugLocked = No
7,555,597 UART: [state] WD Timer not started. Device not locked for debugging
7,559,560 UART: [kat] SHA2-256
7,738,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,750,235 UART: [kat] ++
7,750,783 UART: [kat] sha1
7,762,003 UART: [kat] SHA2-256
7,765,032 UART: [kat] SHA2-384
7,771,509 UART: [kat] SHA2-512-ACC
7,774,509 UART: [kat] ECC-384
10,217,672 UART: [kat] HMAC-384Kdf
10,230,862 UART: [kat] LMS
10,760,363 UART: [kat] --
10,766,141 UART: [cold-reset] ++
10,767,046 UART: [fht] FHT @ 0x50003400
10,778,561 UART: [idev] ++
10,779,128 UART: [idev] CDI.KEYID = 6
10,780,009 UART: [idev] SUBJECT.KEYID = 7
10,781,221 UART: [idev] UDS.KEYID = 0
10,783,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,926,976 UART: [idev] Erasing UDS.KEYID = 0
13,254,281 UART: [idev] Sha1 KeyId Algorithm
13,276,591 UART: [idev] --
13,278,966 UART: [ldev] ++
13,279,451 UART: [ldev] CDI.KEYID = 6
13,280,434 UART: [ldev] SUBJECT.KEYID = 5
13,281,560 UART: [ldev] AUTHORITY.KEYID = 7
13,282,899 UART: [ldev] FE.KEYID = 1
13,293,551 UART: [ldev] Erasing FE.KEYID = 1
15,767,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,487,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,503,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,519,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,535,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,557,181 UART: [ldev] --
17,562,245 UART: [fwproc] Wait for Commands...
17,564,075 UART: [fwproc] Recv command 0x46574c44
17,566,177 UART: [fwproc] Recv'd Img size: 114084 bytes
20,973,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,048,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,116,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,433,823 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,697,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,707,047 >>> mbox cmd response: failed
12,707,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,912 >>> mbox cmd response: failed
12,708,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,477 >>> mbox cmd response: failed
Initializing fuses
2,057,071 writing to cptra_bootfsm_go
10,851,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,415,867 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,997 UART:
192,373 UART: Running Caliptra ROM ...
193,572 UART:
193,727 UART: [state] CFI Enabled
264,261 UART: [state] LifecycleState = Unprovisioned
266,668 UART: [state] DebugLocked = No
269,480 UART: [state] WD Timer not started. Device not locked for debugging
273,873 UART: [kat] SHA2-256
463,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,497 UART: [kat] ++
474,990 UART: [kat] sha1
487,275 UART: [kat] SHA2-256
490,306 UART: [kat] SHA2-384
496,249 UART: [kat] SHA2-512-ACC
498,861 UART: [kat] ECC-384
2,945,356 UART: [kat] HMAC-384Kdf
2,969,908 UART: [kat] LMS
3,501,719 UART: [kat] --
3,506,577 UART: [cold-reset] ++
3,507,430 UART: [fht] FHT @ 0x50003400
3,518,577 UART: [idev] ++
3,519,258 UART: [idev] CDI.KEYID = 6
3,520,277 UART: [idev] SUBJECT.KEYID = 7
3,521,435 UART: [idev] UDS.KEYID = 0
3,523,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,706 UART: [idev] Erasing UDS.KEYID = 0
6,027,334 UART: [idev] Sha1 KeyId Algorithm
6,050,357 UART: [idev] --
6,055,242 UART: [ldev] ++
6,055,932 UART: [ldev] CDI.KEYID = 6
6,056,845 UART: [ldev] SUBJECT.KEYID = 5
6,058,006 UART: [ldev] AUTHORITY.KEYID = 7
6,059,245 UART: [ldev] FE.KEYID = 1
6,100,089 UART: [ldev] Erasing FE.KEYID = 1
8,604,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,132 UART: [ldev] --
10,417,127 UART: [fwproc] Wait for Commands...
10,418,736 UART: [fwproc] Recv command 0x46574c44
10,421,068 UART: [fwproc] Recv'd Img size: 114084 bytes
12,743,295 UART: ROM Fatal Error: 0x000B0021
12,746,941 >>> mbox cmd response: failed
12,747,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,688 >>> mbox cmd response: failed
12,747,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,250 >>> mbox cmd response: failed
Initializing fuses
2,058,171 writing to cptra_bootfsm_go
2,247,458 UART:
2,247,814 UART: Running Caliptra ROM ...
2,248,899 UART:
2,249,062 UART: [state] CFI Enabled
2,322,203 UART: [state] LifecycleState = Unprovisioned
2,324,585 UART: [state] DebugLocked = No
2,327,063 UART: [state] WD Timer not started. Device not locked for debugging
2,331,769 UART: [kat] SHA2-256
2,521,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,407 UART: [kat] ++
2,532,890 UART: [kat] sha1
2,546,055 UART: [kat] SHA2-256
2,549,072 UART: [kat] SHA2-384
2,554,161 UART: [kat] SHA2-512-ACC
2,556,744 UART: [kat] ECC-384
5,005,342 UART: [kat] HMAC-384Kdf
5,029,635 UART: [kat] LMS
5,561,397 UART: [kat] --
5,564,261 UART: [cold-reset] ++
5,565,385 UART: [fht] FHT @ 0x50003400
5,577,234 UART: [idev] ++
5,577,916 UART: [idev] CDI.KEYID = 6
5,578,933 UART: [idev] SUBJECT.KEYID = 7
5,580,114 UART: [idev] UDS.KEYID = 0
5,582,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,514 UART: [idev] Erasing UDS.KEYID = 0
8,088,240 UART: [idev] Sha1 KeyId Algorithm
8,110,287 UART: [idev] --
8,114,762 UART: [ldev] ++
8,115,447 UART: [ldev] CDI.KEYID = 6
8,116,518 UART: [ldev] SUBJECT.KEYID = 5
8,117,570 UART: [ldev] AUTHORITY.KEYID = 7
8,118,743 UART: [ldev] FE.KEYID = 1
8,157,527 UART: [ldev] Erasing FE.KEYID = 1
10,665,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,975 UART: [ldev] --
12,470,503 UART: [fwproc] Wait for Commands...
12,472,184 UART: [fwproc] Recv command 0x46574c44
12,474,454 UART: [fwproc] Recv'd Img size: 114084 bytes
15,908,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,644,131 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,440,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,649,597 >>> mbox cmd response: failed
12,650,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,484 >>> mbox cmd response: failed
12,650,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,651,046 >>> mbox cmd response: failed
Initializing fuses
2,056,461 writing to cptra_bootfsm_go
5,484,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,764,160 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,444 UART:
192,797 UART: Running Caliptra ROM ...
193,983 UART:
603,522 UART: [state] CFI Enabled
619,442 UART: [state] LifecycleState = Unprovisioned
621,817 UART: [state] DebugLocked = No
624,760 UART: [state] WD Timer not started. Device not locked for debugging
629,735 UART: [kat] SHA2-256
819,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,396 UART: [kat] ++
830,988 UART: [kat] sha1
843,164 UART: [kat] SHA2-256
846,211 UART: [kat] SHA2-384
852,800 UART: [kat] SHA2-512-ACC
855,375 UART: [kat] ECC-384
3,296,796 UART: [kat] HMAC-384Kdf
3,309,143 UART: [kat] LMS
3,840,992 UART: [kat] --
3,847,276 UART: [cold-reset] ++
3,848,301 UART: [fht] FHT @ 0x50003400
3,859,933 UART: [idev] ++
3,860,613 UART: [idev] CDI.KEYID = 6
3,861,581 UART: [idev] SUBJECT.KEYID = 7
3,862,736 UART: [idev] UDS.KEYID = 0
3,865,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,739 UART: [idev] Erasing UDS.KEYID = 0
6,341,448 UART: [idev] Sha1 KeyId Algorithm
6,364,784 UART: [idev] --
6,369,564 UART: [ldev] ++
6,370,305 UART: [ldev] CDI.KEYID = 6
6,371,239 UART: [ldev] SUBJECT.KEYID = 5
6,372,345 UART: [ldev] AUTHORITY.KEYID = 7
6,373,579 UART: [ldev] FE.KEYID = 1
6,384,547 UART: [ldev] Erasing FE.KEYID = 1
8,862,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,779 UART: [ldev] --
10,651,882 UART: [fwproc] Wait for Commands...
10,654,680 UART: [fwproc] Recv command 0x46574c44
10,656,935 UART: [fwproc] Recv'd Img size: 114084 bytes
12,974,584 UART: ROM Fatal Error: 0x000B0021
12,978,257 >>> mbox cmd response: failed
12,978,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,003 >>> mbox cmd response: failed
12,979,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,576 >>> mbox cmd response: failed
Initializing fuses
2,056,264 writing to cptra_bootfsm_go
2,245,587 UART:
2,245,933 UART: Running Caliptra ROM ...
2,247,073 UART:
7,473,618 UART: [state] CFI Enabled
7,490,838 UART: [state] LifecycleState = Unprovisioned
7,493,184 UART: [state] DebugLocked = No
7,494,894 UART: [state] WD Timer not started. Device not locked for debugging
7,499,244 UART: [kat] SHA2-256
7,689,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,699,915 UART: [kat] ++
7,700,457 UART: [kat] sha1
7,712,459 UART: [kat] SHA2-256
7,715,439 UART: [kat] SHA2-384
7,721,539 UART: [kat] SHA2-512-ACC
7,724,163 UART: [kat] ECC-384
10,165,099 UART: [kat] HMAC-384Kdf
10,177,703 UART: [kat] LMS
10,709,534 UART: [kat] --
10,713,372 UART: [cold-reset] ++
10,715,844 UART: [fht] FHT @ 0x50003400
10,726,927 UART: [idev] ++
10,727,610 UART: [idev] CDI.KEYID = 6
10,728,624 UART: [idev] SUBJECT.KEYID = 7
10,729,779 UART: [idev] UDS.KEYID = 0
10,732,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,875,467 UART: [idev] Erasing UDS.KEYID = 0
13,208,174 UART: [idev] Sha1 KeyId Algorithm
13,230,848 UART: [idev] --
13,236,321 UART: [ldev] ++
13,237,000 UART: [ldev] CDI.KEYID = 6
13,237,888 UART: [ldev] SUBJECT.KEYID = 5
13,239,041 UART: [ldev] AUTHORITY.KEYID = 7
13,240,272 UART: [ldev] FE.KEYID = 1
13,251,379 UART: [ldev] Erasing FE.KEYID = 1
15,730,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,446,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,461,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,477,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,492,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,513,088 UART: [ldev] --
17,518,297 UART: [fwproc] Wait for Commands...
17,520,413 UART: [fwproc] Recv command 0x46574c44
17,522,670 UART: [fwproc] Recv'd Img size: 114084 bytes
20,967,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,036,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,152,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,693,245 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,756,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,868,732 >>> mbox cmd response: failed
12,869,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,869,673 >>> mbox cmd response: failed
12,869,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,248 >>> mbox cmd response: failed
Initializing fuses
2,060,353 writing to cptra_bootfsm_go
10,754,389 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,949,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
895,088 UART: [kat] SHA2-512-ACC
896,989 UART: [kat] ECC-384
902,674 UART: [kat] HMAC-384Kdf
907,246 UART: [kat] LMS
1,475,442 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,578 UART: [idev] ++
1,479,746 UART: [idev] CDI.KEYID = 6
1,480,106 UART: [idev] SUBJECT.KEYID = 7
1,480,530 UART: [idev] UDS.KEYID = 0
1,480,875 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,554 UART: [idev] Erasing UDS.KEYID = 0
1,504,698 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,346 UART: [idev] --
1,514,349 UART: [ldev] ++
1,514,517 UART: [ldev] CDI.KEYID = 6
1,514,880 UART: [ldev] SUBJECT.KEYID = 5
1,515,306 UART: [ldev] AUTHORITY.KEYID = 7
1,515,769 UART: [ldev] FE.KEYID = 1
1,520,749 UART: [ldev] Erasing FE.KEYID = 1
1,546,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,046 UART: [ldev] --
1,585,375 UART: [fwproc] Waiting for Commands...
1,586,242 UART: [fwproc] Received command 0x46574c44
1,587,033 UART: [fwproc] Received Image of size 114084 bytes
1,853,903 UART: ROM Fatal Error: 0x000B0021
1,855,060 >>> mbox cmd response: failed
1,855,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,066 >>> mbox cmd response: failed
1,855,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,337 UART: [kat] SHA2-256
882,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,383 UART: [kat] ++
886,535 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,770 UART: [idev] ++
1,479,938 UART: [idev] CDI.KEYID = 6
1,480,298 UART: [idev] SUBJECT.KEYID = 7
1,480,722 UART: [idev] UDS.KEYID = 0
1,481,067 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,850 UART: [idev] Erasing UDS.KEYID = 0
1,505,034 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,836 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,844 UART: [fwproc] Received command 0x46574c44
1,587,635 UART: [fwproc] Received Image of size 114084 bytes
2,882,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,052 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,706,303 >>> mbox cmd response: failed
1,706,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,309 >>> mbox cmd response: failed
1,706,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,755 UART: [state] LifecycleState = Unprovisioned
85,410 UART: [state] DebugLocked = No
85,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,578 UART: [kat] SHA2-256
881,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,624 UART: [kat] ++
885,776 UART: [kat] sha1
889,794 UART: [kat] SHA2-256
891,732 UART: [kat] SHA2-384
894,461 UART: [kat] SHA2-512-ACC
896,362 UART: [kat] ECC-384
901,845 UART: [kat] HMAC-384Kdf
906,503 UART: [kat] LMS
1,474,699 UART: [kat] --
1,475,722 UART: [cold-reset] ++
1,476,104 UART: [fht] Storing FHT @ 0x50003400
1,478,791 UART: [idev] ++
1,478,959 UART: [idev] CDI.KEYID = 6
1,479,319 UART: [idev] SUBJECT.KEYID = 7
1,479,743 UART: [idev] UDS.KEYID = 0
1,480,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,319 UART: [idev] Erasing UDS.KEYID = 0
1,503,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,111 UART: [idev] --
1,513,250 UART: [ldev] ++
1,513,418 UART: [ldev] CDI.KEYID = 6
1,513,781 UART: [ldev] SUBJECT.KEYID = 5
1,514,207 UART: [ldev] AUTHORITY.KEYID = 7
1,514,670 UART: [ldev] FE.KEYID = 1
1,520,002 UART: [ldev] Erasing FE.KEYID = 1
1,545,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,423 UART: [ldev] --
1,584,874 UART: [fwproc] Waiting for Commands...
1,585,737 UART: [fwproc] Received command 0x46574c44
1,586,528 UART: [fwproc] Received Image of size 114084 bytes
1,853,206 UART: ROM Fatal Error: 0x000B0021
1,854,363 >>> mbox cmd response: failed
1,854,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,369 >>> mbox cmd response: failed
1,854,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,707 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,951 UART: [idev] Erasing UDS.KEYID = 0
1,505,297 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,787 UART: [idev] --
1,515,038 UART: [ldev] ++
1,515,206 UART: [ldev] CDI.KEYID = 6
1,515,569 UART: [ldev] SUBJECT.KEYID = 5
1,515,995 UART: [ldev] AUTHORITY.KEYID = 7
1,516,458 UART: [ldev] FE.KEYID = 1
1,521,594 UART: [ldev] Erasing FE.KEYID = 1
1,546,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,291 UART: [ldev] --
1,585,696 UART: [fwproc] Waiting for Commands...
1,586,435 UART: [fwproc] Received command 0x46574c44
1,587,226 UART: [fwproc] Received Image of size 114084 bytes
2,882,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,958 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,707,434 >>> mbox cmd response: failed
1,707,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,440 >>> mbox cmd response: failed
1,707,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,846 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
892,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,085 UART: [kat] ++
897,237 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,162 UART: [kat] SHA2-512-ACC
908,063 UART: [kat] ECC-384
918,046 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,253 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,706 UART: [idev] Erasing UDS.KEYID = 0
1,200,767 UART: [idev] Sha1 KeyId Algorithm
1,209,285 UART: [idev] --
1,210,363 UART: [ldev] ++
1,210,531 UART: [ldev] CDI.KEYID = 6
1,210,894 UART: [ldev] SUBJECT.KEYID = 5
1,211,320 UART: [ldev] AUTHORITY.KEYID = 7
1,211,783 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,339 UART: [ldev] --
1,283,656 UART: [fwproc] Wait for Commands...
1,284,310 UART: [fwproc] Recv command 0x46574c44
1,285,038 UART: [fwproc] Recv'd Img size: 114084 bytes
1,551,214 UART: ROM Fatal Error: 0x000B0021
1,552,371 >>> mbox cmd response: failed
1,552,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,377 >>> mbox cmd response: failed
1,552,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,772 UART: [state] LifecycleState = Unprovisioned
85,427 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
892,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,017 UART: [kat] ++
897,169 UART: [kat] sha1
901,467 UART: [kat] SHA2-256
903,407 UART: [kat] SHA2-384
905,954 UART: [kat] SHA2-512-ACC
907,855 UART: [kat] ECC-384
917,524 UART: [kat] HMAC-384Kdf
921,936 UART: [kat] LMS
1,170,264 UART: [kat] --
1,171,151 UART: [cold-reset] ++
1,171,725 UART: [fht] FHT @ 0x50003400
1,174,418 UART: [idev] ++
1,174,586 UART: [idev] CDI.KEYID = 6
1,174,946 UART: [idev] SUBJECT.KEYID = 7
1,175,370 UART: [idev] UDS.KEYID = 0
1,175,715 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,400 UART: [idev] Erasing UDS.KEYID = 0
1,200,593 UART: [idev] Sha1 KeyId Algorithm
1,209,157 UART: [idev] --
1,210,255 UART: [ldev] ++
1,210,423 UART: [ldev] CDI.KEYID = 6
1,210,786 UART: [ldev] SUBJECT.KEYID = 5
1,211,212 UART: [ldev] AUTHORITY.KEYID = 7
1,211,675 UART: [ldev] FE.KEYID = 1
1,217,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,327 UART: [ldev] --
1,281,818 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,270 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,802 >>> mbox cmd response: failed
1,406,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,808 >>> mbox cmd response: failed
1,406,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,967 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,563 UART: [kat] SHA2-512-ACC
908,464 UART: [kat] ECC-384
918,447 UART: [kat] HMAC-384Kdf
923,009 UART: [kat] LMS
1,171,337 UART: [kat] --
1,172,260 UART: [cold-reset] ++
1,172,750 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,675 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,234 UART: [ldev] ++
1,211,402 UART: [ldev] CDI.KEYID = 6
1,211,765 UART: [ldev] SUBJECT.KEYID = 5
1,212,191 UART: [ldev] AUTHORITY.KEYID = 7
1,212,654 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,754 UART: [ldev] --
1,284,031 UART: [fwproc] Wait for Commands...
1,284,663 UART: [fwproc] Recv command 0x46574c44
1,285,391 UART: [fwproc] Recv'd Img size: 114084 bytes
1,552,253 UART: ROM Fatal Error: 0x000B0021
1,553,410 >>> mbox cmd response: failed
1,553,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,416 >>> mbox cmd response: failed
1,553,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
901,914 UART: [kat] SHA2-256
903,854 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
922,921 UART: [kat] LMS
1,171,249 UART: [kat] --
1,172,140 UART: [cold-reset] ++
1,172,684 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,149 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,244,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,490 UART: [ldev] --
1,283,777 UART: [fwproc] Wait for Commands...
1,284,429 UART: [fwproc] Recv command 0x46574c44
1,285,157 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,455 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,137 >>> mbox cmd response: failed
1,406,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,143 >>> mbox cmd response: failed
1,406,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,786 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,860 UART: [ldev] --
1,281,196 UART: [fwproc] Wait for Commands...
1,281,935 UART: [fwproc] Recv command 0x46574c44
1,282,668 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,821 UART: ROM Fatal Error: 0x000B0021
1,549,978 >>> mbox cmd response: failed
1,549,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,984 >>> mbox cmd response: failed
1,549,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,113 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,174,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,199,261 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,268 UART: [ldev] ++
1,209,436 UART: [ldev] CDI.KEYID = 6
1,209,800 UART: [ldev] SUBJECT.KEYID = 5
1,210,227 UART: [ldev] AUTHORITY.KEYID = 7
1,210,690 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,242,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,336 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,164 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,681 >>> mbox cmd response: failed
1,403,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,687 >>> mbox cmd response: failed
1,403,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,568 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,779 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,178 UART: [fht] FHT @ 0x50003400
1,173,018 UART: [idev] ++
1,173,186 UART: [idev] CDI.KEYID = 6
1,173,547 UART: [idev] SUBJECT.KEYID = 7
1,173,972 UART: [idev] UDS.KEYID = 0
1,174,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,190 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,208,969 UART: [ldev] ++
1,209,137 UART: [ldev] CDI.KEYID = 6
1,209,501 UART: [ldev] SUBJECT.KEYID = 5
1,209,928 UART: [ldev] AUTHORITY.KEYID = 7
1,210,391 UART: [ldev] FE.KEYID = 1
1,215,251 UART: [ldev] Erasing FE.KEYID = 1
1,241,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,901 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,070 UART: ROM Fatal Error: 0x000B0021
1,549,227 >>> mbox cmd response: failed
1,549,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,233 >>> mbox cmd response: failed
1,549,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
921,033 UART: [kat] LMS
1,169,345 UART: [kat] --
1,170,540 UART: [cold-reset] ++
1,170,930 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,174,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,618 UART: [idev] Sha1 KeyId Algorithm
1,208,584 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,217 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,139 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,402,080 >>> mbox cmd response: failed
1,402,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,086 >>> mbox cmd response: failed
1,402,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,383 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,130 UART:
192,500 UART: Running Caliptra ROM ...
193,677 UART:
193,849 UART: [state] CFI Enabled
263,668 UART: [state] LifecycleState = Unprovisioned
265,646 UART: [state] DebugLocked = No
268,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,850 UART: [kat] SHA2-256
443,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,034 UART: [kat] ++
454,490 UART: [kat] sha1
465,473 UART: [kat] SHA2-256
468,155 UART: [kat] SHA2-384
473,816 UART: [kat] SHA2-512-ACC
476,207 UART: [kat] ECC-384
2,766,327 UART: [kat] HMAC-384Kdf
2,779,373 UART: [kat] LMS
3,969,669 UART: [kat] --
3,974,962 UART: [cold-reset] ++
3,976,217 UART: [fht] Storing FHT @ 0x50003400
3,986,627 UART: [idev] ++
3,987,196 UART: [idev] CDI.KEYID = 6
3,988,167 UART: [idev] SUBJECT.KEYID = 7
3,989,384 UART: [idev] UDS.KEYID = 0
3,992,022 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,434 UART: [idev] Erasing UDS.KEYID = 0
7,329,197 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,961 UART: [idev] --
7,354,537 UART: [ldev] ++
7,355,107 UART: [ldev] CDI.KEYID = 6
7,356,226 UART: [ldev] SUBJECT.KEYID = 5
7,357,334 UART: [ldev] AUTHORITY.KEYID = 7
7,358,568 UART: [ldev] FE.KEYID = 1
7,400,434 UART: [ldev] Erasing FE.KEYID = 1
10,732,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,365 UART: [ldev] --
13,116,792 UART: [fwproc] Waiting for Commands...
13,119,269 UART: [fwproc] Received command 0x46574c44
13,121,456 UART: [fwproc] Received Image of size 113760 bytes
16,060,239 UART: ROM Fatal Error: 0x000B0022
16,063,648 >>> mbox cmd response: failed
16,064,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,417 >>> mbox cmd response: failed
16,064,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,064,986 >>> mbox cmd response: failed
Initializing fuses
2,060,260 writing to cptra_bootfsm_go
2,249,536 UART:
2,249,888 UART: Running Caliptra ROM ...
2,251,029 UART:
2,251,201 UART: [state] CFI Enabled
2,304,378 UART: [state] LifecycleState = Unprovisioned
2,306,324 UART: [state] DebugLocked = No
2,308,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,273 UART: [kat] SHA2-256
2,483,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,493,484 UART: [kat] ++
2,493,943 UART: [kat] sha1
2,504,664 UART: [kat] SHA2-256
2,507,360 UART: [kat] SHA2-384
2,512,217 UART: [kat] SHA2-512-ACC
2,514,596 UART: [kat] ECC-384
4,812,903 UART: [kat] HMAC-384Kdf
4,844,533 UART: [kat] LMS
6,034,842 UART: [kat] --
6,037,841 UART: [cold-reset] ++
6,039,728 UART: [fht] Storing FHT @ 0x50003400
6,050,192 UART: [idev] ++
6,050,772 UART: [idev] CDI.KEYID = 6
6,051,700 UART: [idev] SUBJECT.KEYID = 7
6,052,975 UART: [idev] UDS.KEYID = 0
6,055,187 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,198,369 UART: [idev] Erasing UDS.KEYID = 0
9,388,670 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,117 UART: [idev] --
9,414,655 UART: [ldev] ++
9,415,225 UART: [ldev] CDI.KEYID = 6
9,416,213 UART: [ldev] SUBJECT.KEYID = 5
9,417,418 UART: [ldev] AUTHORITY.KEYID = 7
9,418,657 UART: [ldev] FE.KEYID = 1
9,465,947 UART: [ldev] Erasing FE.KEYID = 1
12,798,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,174,681 UART: [ldev] --
15,179,949 UART: [fwproc] Waiting for Commands...
15,181,991 UART: [fwproc] Received command 0x46574c44
15,184,340 UART: [fwproc] Received Image of size 113760 bytes
19,230,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,308,919 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,377,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,693,912 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,785,982 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,842,147 >>> mbox cmd response: failed
15,842,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,843,140 >>> mbox cmd response: failed
15,843,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,843,706 >>> mbox cmd response: failed
Initializing fuses
2,054,716 writing to cptra_bootfsm_go
5,860,277 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,936,774 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,444 UART:
192,813 UART: Running Caliptra ROM ...
194,014 UART:
603,778 UART: [state] CFI Enabled
616,093 UART: [state] LifecycleState = Unprovisioned
618,036 UART: [state] DebugLocked = No
619,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,224 UART: [kat] SHA2-256
793,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,524 UART: [kat] ++
805,064 UART: [kat] sha1
816,546 UART: [kat] SHA2-256
819,232 UART: [kat] SHA2-384
825,358 UART: [kat] SHA2-512-ACC
827,713 UART: [kat] ECC-384
3,113,050 UART: [kat] HMAC-384Kdf
3,125,069 UART: [kat] LMS
4,315,195 UART: [kat] --
4,319,379 UART: [cold-reset] ++
4,320,611 UART: [fht] Storing FHT @ 0x50003400
4,331,128 UART: [idev] ++
4,331,756 UART: [idev] CDI.KEYID = 6
4,332,672 UART: [idev] SUBJECT.KEYID = 7
4,333,898 UART: [idev] UDS.KEYID = 0
4,336,531 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,751 UART: [idev] Erasing UDS.KEYID = 0
7,620,844 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,722 UART: [idev] --
7,646,075 UART: [ldev] ++
7,646,648 UART: [ldev] CDI.KEYID = 6
7,647,616 UART: [ldev] SUBJECT.KEYID = 5
7,648,775 UART: [ldev] AUTHORITY.KEYID = 7
7,650,065 UART: [ldev] FE.KEYID = 1
7,660,390 UART: [ldev] Erasing FE.KEYID = 1
10,948,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,109 UART: [ldev] --
13,309,182 UART: [fwproc] Waiting for Commands...
13,312,435 UART: [fwproc] Received command 0x46574c44
13,314,623 UART: [fwproc] Received Image of size 113760 bytes
16,262,386 UART: ROM Fatal Error: 0x000B0022
16,265,845 >>> mbox cmd response: failed
16,266,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,266,619 >>> mbox cmd response: failed
16,266,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,267,178 >>> mbox cmd response: failed
Initializing fuses
2,062,087 writing to cptra_bootfsm_go
2,251,363 UART:
2,251,720 UART: Running Caliptra ROM ...
2,252,862 UART:
4,185,515 UART: [state] CFI Enabled
4,199,797 UART: [state] LifecycleState = Unprovisioned
4,201,706 UART: [state] DebugLocked = No
4,203,154 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,208,662 UART: [kat] SHA2-256
4,378,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,971 UART: [kat] ++
4,389,434 UART: [kat] sha1
4,400,269 UART: [kat] SHA2-256
4,403,008 UART: [kat] SHA2-384
4,408,793 UART: [kat] SHA2-512-ACC
4,411,152 UART: [kat] ECC-384
6,693,911 UART: [kat] HMAC-384Kdf
6,705,752 UART: [kat] LMS
7,895,875 UART: [kat] --
7,900,899 UART: [cold-reset] ++
7,902,994 UART: [fht] Storing FHT @ 0x50003400
7,913,840 UART: [idev] ++
7,914,442 UART: [idev] CDI.KEYID = 6
7,915,330 UART: [idev] SUBJECT.KEYID = 7
7,916,608 UART: [idev] UDS.KEYID = 0
7,919,000 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,062,238 UART: [idev] Erasing UDS.KEYID = 0
11,205,148 UART: [idev] Using Sha1 for KeyId Algorithm
11,227,718 UART: [idev] --
11,230,906 UART: [ldev] ++
11,231,476 UART: [ldev] CDI.KEYID = 6
11,232,493 UART: [ldev] SUBJECT.KEYID = 5
11,233,695 UART: [ldev] AUTHORITY.KEYID = 7
11,234,926 UART: [ldev] FE.KEYID = 1
11,246,281 UART: [ldev] Erasing FE.KEYID = 1
14,532,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,826,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,841,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,855,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,870,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,888,408 UART: [ldev] --
16,892,656 UART: [fwproc] Waiting for Commands...
16,894,755 UART: [fwproc] Received command 0x46574c44
16,896,939 UART: [fwproc] Received Image of size 113760 bytes
20,938,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,018,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,087,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,402,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
4,129,809 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,034,404 >>> mbox cmd response: failed
16,035,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,035,455 >>> mbox cmd response: failed
16,035,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,036,030 >>> mbox cmd response: failed
Initializing fuses
2,055,897 writing to cptra_bootfsm_go
7,962,274 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,899,112 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,093 UART:
192,470 UART: Running Caliptra ROM ...
193,641 UART:
193,790 UART: [state] CFI Enabled
260,956 UART: [state] LifecycleState = Unprovisioned
262,815 UART: [state] DebugLocked = No
265,572 UART: [state] WD Timer not started. Device not locked for debugging
269,250 UART: [kat] SHA2-256
448,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,918 UART: [kat] ++
460,451 UART: [kat] sha1
471,118 UART: [kat] SHA2-256
474,173 UART: [kat] SHA2-384
481,821 UART: [kat] SHA2-512-ACC
484,756 UART: [kat] ECC-384
2,945,497 UART: [kat] HMAC-384Kdf
2,970,069 UART: [kat] LMS
3,499,400 UART: [kat] --
3,502,453 UART: [cold-reset] ++
3,504,233 UART: [fht] FHT @ 0x50003400
3,514,837 UART: [idev] ++
3,515,403 UART: [idev] CDI.KEYID = 6
3,516,441 UART: [idev] SUBJECT.KEYID = 7
3,517,549 UART: [idev] UDS.KEYID = 0
3,519,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,862 UART: [idev] Erasing UDS.KEYID = 0
6,023,063 UART: [idev] Sha1 KeyId Algorithm
6,046,087 UART: [idev] --
6,050,466 UART: [ldev] ++
6,051,040 UART: [ldev] CDI.KEYID = 6
6,051,959 UART: [ldev] SUBJECT.KEYID = 5
6,053,171 UART: [ldev] AUTHORITY.KEYID = 7
6,054,304 UART: [ldev] FE.KEYID = 1
6,098,371 UART: [ldev] Erasing FE.KEYID = 1
8,597,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,819 UART: [ldev] --
10,388,118 UART: [fwproc] Wait for Commands...
10,389,620 UART: [fwproc] Recv command 0x46574c44
10,391,718 UART: [fwproc] Recv'd Img size: 114084 bytes
12,676,757 UART: ROM Fatal Error: 0x000B0022
12,679,882 >>> mbox cmd response: failed
12,680,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,680,626 >>> mbox cmd response: failed
12,680,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,193 >>> mbox cmd response: failed
Initializing fuses
2,053,184 writing to cptra_bootfsm_go
2,242,512 UART:
2,242,879 UART: Running Caliptra ROM ...
2,244,017 UART:
2,244,196 UART: [state] CFI Enabled
2,320,107 UART: [state] LifecycleState = Unprovisioned
2,321,988 UART: [state] DebugLocked = No
2,324,460 UART: [state] WD Timer not started. Device not locked for debugging
2,327,720 UART: [kat] SHA2-256
2,506,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,418 UART: [kat] ++
2,518,878 UART: [kat] sha1
2,530,466 UART: [kat] SHA2-256
2,533,523 UART: [kat] SHA2-384
2,539,248 UART: [kat] SHA2-512-ACC
2,542,201 UART: [kat] ECC-384
5,003,951 UART: [kat] HMAC-384Kdf
5,028,188 UART: [kat] LMS
5,557,613 UART: [kat] --
5,562,159 UART: [cold-reset] ++
5,564,577 UART: [fht] FHT @ 0x50003400
5,575,702 UART: [idev] ++
5,576,315 UART: [idev] CDI.KEYID = 6
5,577,239 UART: [idev] SUBJECT.KEYID = 7
5,578,403 UART: [idev] UDS.KEYID = 0
5,580,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,044 UART: [idev] Erasing UDS.KEYID = 0
8,081,006 UART: [idev] Sha1 KeyId Algorithm
8,103,970 UART: [idev] --
8,108,074 UART: [ldev] ++
8,108,645 UART: [ldev] CDI.KEYID = 6
8,109,555 UART: [ldev] SUBJECT.KEYID = 5
8,110,769 UART: [ldev] AUTHORITY.KEYID = 7
8,112,002 UART: [ldev] FE.KEYID = 1
8,156,873 UART: [ldev] Erasing FE.KEYID = 1
10,657,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,406,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,703 UART: [ldev] --
12,447,484 UART: [fwproc] Wait for Commands...
12,449,240 UART: [fwproc] Recv command 0x46574c44
12,451,358 UART: [fwproc] Recv'd Img size: 114084 bytes
15,841,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,908,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,977,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,294,128 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,359,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,431,484 >>> mbox cmd response: failed
12,432,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,432,396 >>> mbox cmd response: failed
12,432,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,432,966 >>> mbox cmd response: failed
Initializing fuses
2,059,508 writing to cptra_bootfsm_go
5,433,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,127,822 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,511 UART:
192,889 UART: Running Caliptra ROM ...
194,036 UART:
603,651 UART: [state] CFI Enabled
615,759 UART: [state] LifecycleState = Unprovisioned
617,641 UART: [state] DebugLocked = No
619,074 UART: [state] WD Timer not started. Device not locked for debugging
622,804 UART: [kat] SHA2-256
801,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,486 UART: [kat] ++
813,989 UART: [kat] sha1
826,054 UART: [kat] SHA2-256
829,067 UART: [kat] SHA2-384
835,481 UART: [kat] SHA2-512-ACC
838,463 UART: [kat] ECC-384
3,277,346 UART: [kat] HMAC-384Kdf
3,289,976 UART: [kat] LMS
3,819,460 UART: [kat] --
3,824,807 UART: [cold-reset] ++
3,826,415 UART: [fht] FHT @ 0x50003400
3,837,766 UART: [idev] ++
3,838,336 UART: [idev] CDI.KEYID = 6
3,839,255 UART: [idev] SUBJECT.KEYID = 7
3,840,416 UART: [idev] UDS.KEYID = 0
3,842,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,549 UART: [idev] Erasing UDS.KEYID = 0
6,311,747 UART: [idev] Sha1 KeyId Algorithm
6,335,571 UART: [idev] --
6,339,057 UART: [ldev] ++
6,339,636 UART: [ldev] CDI.KEYID = 6
6,340,549 UART: [ldev] SUBJECT.KEYID = 5
6,341,713 UART: [ldev] AUTHORITY.KEYID = 7
6,343,025 UART: [ldev] FE.KEYID = 1
6,353,354 UART: [ldev] Erasing FE.KEYID = 1
8,830,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,123 UART: [ldev] --
10,620,487 UART: [fwproc] Wait for Commands...
10,622,150 UART: [fwproc] Recv command 0x46574c44
10,624,243 UART: [fwproc] Recv'd Img size: 114084 bytes
12,912,898 UART: ROM Fatal Error: 0x000B0022
12,916,023 >>> mbox cmd response: failed
12,916,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,779 >>> mbox cmd response: failed
12,917,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,370 >>> mbox cmd response: failed
Initializing fuses
2,051,506 writing to cptra_bootfsm_go
2,240,835 UART:
2,241,180 UART: Running Caliptra ROM ...
2,242,319 UART:
7,537,532 UART: [state] CFI Enabled
7,553,855 UART: [state] LifecycleState = Unprovisioned
7,555,715 UART: [state] DebugLocked = No
7,557,100 UART: [state] WD Timer not started. Device not locked for debugging
7,560,308 UART: [kat] SHA2-256
7,739,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,750,999 UART: [kat] ++
7,751,544 UART: [kat] sha1
7,762,348 UART: [kat] SHA2-256
7,765,377 UART: [kat] SHA2-384
7,771,639 UART: [kat] SHA2-512-ACC
7,774,583 UART: [kat] ECC-384
10,213,839 UART: [kat] HMAC-384Kdf
10,225,465 UART: [kat] LMS
10,754,967 UART: [kat] --
10,759,938 UART: [cold-reset] ++
10,761,980 UART: [fht] FHT @ 0x50003400
10,772,092 UART: [idev] ++
10,772,697 UART: [idev] CDI.KEYID = 6
10,773,610 UART: [idev] SUBJECT.KEYID = 7
10,774,829 UART: [idev] UDS.KEYID = 0
10,777,132 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,920,394 UART: [idev] Erasing UDS.KEYID = 0
13,252,943 UART: [idev] Sha1 KeyId Algorithm
13,275,382 UART: [idev] --
13,279,914 UART: [ldev] ++
13,280,479 UART: [ldev] CDI.KEYID = 6
13,281,498 UART: [ldev] SUBJECT.KEYID = 5
13,282,597 UART: [ldev] AUTHORITY.KEYID = 7
13,283,828 UART: [ldev] FE.KEYID = 1
13,294,748 UART: [ldev] Erasing FE.KEYID = 1
15,764,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,481,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,497,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,513,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,529,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,550,409 UART: [ldev] --
17,554,377 UART: [fwproc] Wait for Commands...
17,556,909 UART: [fwproc] Recv command 0x46574c44
17,559,006 UART: [fwproc] Recv'd Img size: 114084 bytes
20,959,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,032,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,100,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,417,712 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,697,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,683,651 >>> mbox cmd response: failed
12,684,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,606 >>> mbox cmd response: failed
12,684,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,685,175 >>> mbox cmd response: failed
Initializing fuses
2,053,962 writing to cptra_bootfsm_go
10,877,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,443,407 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,488 UART:
192,835 UART: Running Caliptra ROM ...
194,037 UART:
194,197 UART: [state] CFI Enabled
265,339 UART: [state] LifecycleState = Unprovisioned
267,763 UART: [state] DebugLocked = No
269,794 UART: [state] WD Timer not started. Device not locked for debugging
274,296 UART: [kat] SHA2-256
464,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,944 UART: [kat] ++
475,425 UART: [kat] sha1
487,496 UART: [kat] SHA2-256
490,518 UART: [kat] SHA2-384
496,719 UART: [kat] SHA2-512-ACC
499,278 UART: [kat] ECC-384
2,948,667 UART: [kat] HMAC-384Kdf
2,969,202 UART: [kat] LMS
3,500,972 UART: [kat] --
3,506,388 UART: [cold-reset] ++
3,508,659 UART: [fht] FHT @ 0x50003400
3,519,966 UART: [idev] ++
3,520,697 UART: [idev] CDI.KEYID = 6
3,521,615 UART: [idev] SUBJECT.KEYID = 7
3,522,781 UART: [idev] UDS.KEYID = 0
3,525,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,829 UART: [idev] Erasing UDS.KEYID = 0
6,028,715 UART: [idev] Sha1 KeyId Algorithm
6,051,473 UART: [idev] --
6,055,417 UART: [ldev] ++
6,056,099 UART: [ldev] CDI.KEYID = 6
6,057,013 UART: [ldev] SUBJECT.KEYID = 5
6,058,255 UART: [ldev] AUTHORITY.KEYID = 7
6,059,438 UART: [ldev] FE.KEYID = 1
6,098,296 UART: [ldev] Erasing FE.KEYID = 1
8,605,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,159 UART: [ldev] --
10,412,822 UART: [fwproc] Wait for Commands...
10,416,003 UART: [fwproc] Recv command 0x46574c44
10,418,276 UART: [fwproc] Recv'd Img size: 114084 bytes
12,742,510 UART: ROM Fatal Error: 0x000B0022
12,746,182 >>> mbox cmd response: failed
12,746,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,918 >>> mbox cmd response: failed
12,747,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,503 >>> mbox cmd response: failed
Initializing fuses
2,062,448 writing to cptra_bootfsm_go
2,251,843 UART:
2,252,194 UART: Running Caliptra ROM ...
2,253,249 UART:
2,253,404 UART: [state] CFI Enabled
2,317,490 UART: [state] LifecycleState = Unprovisioned
2,319,920 UART: [state] DebugLocked = No
2,322,415 UART: [state] WD Timer not started. Device not locked for debugging
2,327,525 UART: [kat] SHA2-256
2,517,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,181 UART: [kat] ++
2,528,660 UART: [kat] sha1
2,538,797 UART: [kat] SHA2-256
2,541,818 UART: [kat] SHA2-384
2,547,272 UART: [kat] SHA2-512-ACC
2,549,897 UART: [kat] ECC-384
5,002,216 UART: [kat] HMAC-384Kdf
5,016,844 UART: [kat] LMS
5,548,585 UART: [kat] --
5,554,494 UART: [cold-reset] ++
5,557,035 UART: [fht] FHT @ 0x50003400
5,569,110 UART: [idev] ++
5,569,827 UART: [idev] CDI.KEYID = 6
5,570,745 UART: [idev] SUBJECT.KEYID = 7
5,571,964 UART: [idev] UDS.KEYID = 0
5,574,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,718,103 UART: [idev] Erasing UDS.KEYID = 0
8,075,992 UART: [idev] Sha1 KeyId Algorithm
8,098,804 UART: [idev] --
8,104,535 UART: [ldev] ++
8,105,218 UART: [ldev] CDI.KEYID = 6
8,106,104 UART: [ldev] SUBJECT.KEYID = 5
8,107,317 UART: [ldev] AUTHORITY.KEYID = 7
8,108,563 UART: [ldev] FE.KEYID = 1
8,148,149 UART: [ldev] Erasing FE.KEYID = 1
10,654,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,220 UART: [ldev] --
12,461,767 UART: [fwproc] Wait for Commands...
12,464,954 UART: [fwproc] Recv command 0x46574c44
12,467,294 UART: [fwproc] Recv'd Img size: 114084 bytes
15,911,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,641,734 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,442,584 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,648,463 >>> mbox cmd response: failed
12,649,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,649,345 >>> mbox cmd response: failed
12,649,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,649,912 >>> mbox cmd response: failed
Initializing fuses
2,055,564 writing to cptra_bootfsm_go
5,486,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,774,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,477 UART:
192,853 UART: Running Caliptra ROM ...
194,045 UART:
603,533 UART: [state] CFI Enabled
615,415 UART: [state] LifecycleState = Unprovisioned
617,786 UART: [state] DebugLocked = No
619,891 UART: [state] WD Timer not started. Device not locked for debugging
623,721 UART: [kat] SHA2-256
813,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,379 UART: [kat] ++
824,893 UART: [kat] sha1
836,362 UART: [kat] SHA2-256
839,375 UART: [kat] SHA2-384
846,169 UART: [kat] SHA2-512-ACC
848,780 UART: [kat] ECC-384
3,291,480 UART: [kat] HMAC-384Kdf
3,305,009 UART: [kat] LMS
3,836,795 UART: [kat] --
3,841,441 UART: [cold-reset] ++
3,843,857 UART: [fht] FHT @ 0x50003400
3,855,482 UART: [idev] ++
3,856,162 UART: [idev] CDI.KEYID = 6
3,857,180 UART: [idev] SUBJECT.KEYID = 7
3,858,283 UART: [idev] UDS.KEYID = 0
3,860,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,229 UART: [idev] Erasing UDS.KEYID = 0
6,337,218 UART: [idev] Sha1 KeyId Algorithm
6,359,893 UART: [idev] --
6,363,986 UART: [ldev] ++
6,364,728 UART: [ldev] CDI.KEYID = 6
6,365,640 UART: [ldev] SUBJECT.KEYID = 5
6,366,801 UART: [ldev] AUTHORITY.KEYID = 7
6,368,034 UART: [ldev] FE.KEYID = 1
6,380,138 UART: [ldev] Erasing FE.KEYID = 1
8,858,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,526 UART: [ldev] --
10,647,298 UART: [fwproc] Wait for Commands...
10,649,293 UART: [fwproc] Recv command 0x46574c44
10,651,609 UART: [fwproc] Recv'd Img size: 114084 bytes
12,970,634 UART: ROM Fatal Error: 0x000B0022
12,974,262 >>> mbox cmd response: failed
12,974,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,974,990 >>> mbox cmd response: failed
12,975,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,975,545 >>> mbox cmd response: failed
Initializing fuses
2,055,911 writing to cptra_bootfsm_go
2,245,221 UART:
2,245,572 UART: Running Caliptra ROM ...
2,246,710 UART:
7,478,058 UART: [state] CFI Enabled
7,492,420 UART: [state] LifecycleState = Unprovisioned
7,494,822 UART: [state] DebugLocked = No
7,496,590 UART: [state] WD Timer not started. Device not locked for debugging
7,501,651 UART: [kat] SHA2-256
7,691,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,702,302 UART: [kat] ++
7,702,909 UART: [kat] sha1
7,715,155 UART: [kat] SHA2-256
7,718,179 UART: [kat] SHA2-384
7,723,201 UART: [kat] SHA2-512-ACC
7,725,763 UART: [kat] ECC-384
10,170,297 UART: [kat] HMAC-384Kdf
10,183,007 UART: [kat] LMS
10,714,821 UART: [kat] --
10,717,749 UART: [cold-reset] ++
10,719,899 UART: [fht] FHT @ 0x50003400
10,732,821 UART: [idev] ++
10,733,491 UART: [idev] CDI.KEYID = 6
10,734,425 UART: [idev] SUBJECT.KEYID = 7
10,735,698 UART: [idev] UDS.KEYID = 0
10,738,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,881,321 UART: [idev] Erasing UDS.KEYID = 0
13,215,577 UART: [idev] Sha1 KeyId Algorithm
13,236,975 UART: [idev] --
13,243,241 UART: [ldev] ++
13,243,919 UART: [ldev] CDI.KEYID = 6
13,244,930 UART: [ldev] SUBJECT.KEYID = 5
13,246,034 UART: [ldev] AUTHORITY.KEYID = 7
13,247,268 UART: [ldev] FE.KEYID = 1
13,261,153 UART: [ldev] Erasing FE.KEYID = 1
15,741,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,461,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,476,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,491,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,506,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,528,093 UART: [ldev] --
17,533,688 UART: [fwproc] Wait for Commands...
17,535,987 UART: [fwproc] Recv command 0x46574c44
17,538,273 UART: [fwproc] Recv'd Img size: 114084 bytes
20,975,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,046,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,162,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,703,100 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,762,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,870,078 >>> mbox cmd response: failed
12,870,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,871,013 >>> mbox cmd response: failed
12,871,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,871,580 >>> mbox cmd response: failed
Initializing fuses
2,055,756 writing to cptra_bootfsm_go
10,742,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,932,457 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,736 UART: [state] LifecycleState = Unprovisioned
85,391 UART: [state] DebugLocked = No
86,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,653 UART: [kat] SHA2-256
881,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,699 UART: [kat] ++
885,851 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,072 UART: [kat] HMAC-384Kdf
906,736 UART: [kat] LMS
1,474,932 UART: [kat] --
1,475,679 UART: [cold-reset] ++
1,476,023 UART: [fht] Storing FHT @ 0x50003400
1,478,840 UART: [idev] ++
1,479,008 UART: [idev] CDI.KEYID = 6
1,479,368 UART: [idev] SUBJECT.KEYID = 7
1,479,792 UART: [idev] UDS.KEYID = 0
1,480,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,756 UART: [idev] Erasing UDS.KEYID = 0
1,503,996 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,782 UART: [idev] --
1,513,701 UART: [ldev] ++
1,513,869 UART: [ldev] CDI.KEYID = 6
1,514,232 UART: [ldev] SUBJECT.KEYID = 5
1,514,658 UART: [ldev] AUTHORITY.KEYID = 7
1,515,121 UART: [ldev] FE.KEYID = 1
1,520,355 UART: [ldev] Erasing FE.KEYID = 1
1,545,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,874 UART: [ldev] --
1,585,255 UART: [fwproc] Waiting for Commands...
1,586,004 UART: [fwproc] Received command 0x46574c44
1,586,795 UART: [fwproc] Received Image of size 114084 bytes
1,852,879 UART: ROM Fatal Error: 0x000B0022
1,854,036 >>> mbox cmd response: failed
1,854,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,042 >>> mbox cmd response: failed
1,854,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,701 UART: [kat] SHA2-256
892,639 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,563 UART: [fht] Storing FHT @ 0x50003400
1,479,298 UART: [idev] ++
1,479,466 UART: [idev] CDI.KEYID = 6
1,479,826 UART: [idev] SUBJECT.KEYID = 7
1,480,250 UART: [idev] UDS.KEYID = 0
1,480,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,054 UART: [idev] Erasing UDS.KEYID = 0
1,504,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,712 UART: [idev] --
1,513,595 UART: [ldev] ++
1,513,763 UART: [ldev] CDI.KEYID = 6
1,514,126 UART: [ldev] SUBJECT.KEYID = 5
1,514,552 UART: [ldev] AUTHORITY.KEYID = 7
1,515,015 UART: [ldev] FE.KEYID = 1
1,520,295 UART: [ldev] Erasing FE.KEYID = 1
1,545,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,780 UART: [ldev] --
1,584,135 UART: [fwproc] Waiting for Commands...
1,584,904 UART: [fwproc] Received command 0x46574c44
1,585,695 UART: [fwproc] Received Image of size 114084 bytes
2,880,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,708,487 >>> mbox cmd response: failed
1,708,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,493 >>> mbox cmd response: failed
1,708,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,499 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,161 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,035 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,906 UART: [kat] SHA2-256
882,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,952 UART: [kat] ++
887,104 UART: [kat] sha1
891,442 UART: [kat] SHA2-256
893,380 UART: [kat] SHA2-384
896,295 UART: [kat] SHA2-512-ACC
898,196 UART: [kat] ECC-384
903,839 UART: [kat] HMAC-384Kdf
908,445 UART: [kat] LMS
1,476,641 UART: [kat] --
1,477,456 UART: [cold-reset] ++
1,478,016 UART: [fht] Storing FHT @ 0x50003400
1,480,771 UART: [idev] ++
1,480,939 UART: [idev] CDI.KEYID = 6
1,481,299 UART: [idev] SUBJECT.KEYID = 7
1,481,723 UART: [idev] UDS.KEYID = 0
1,482,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,490,069 UART: [idev] Erasing UDS.KEYID = 0
1,507,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,516,039 UART: [idev] --
1,516,866 UART: [ldev] ++
1,517,034 UART: [ldev] CDI.KEYID = 6
1,517,397 UART: [ldev] SUBJECT.KEYID = 5
1,517,823 UART: [ldev] AUTHORITY.KEYID = 7
1,518,286 UART: [ldev] FE.KEYID = 1
1,523,378 UART: [ldev] Erasing FE.KEYID = 1
1,548,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,609 UART: [ldev] --
1,587,938 UART: [fwproc] Waiting for Commands...
1,588,779 UART: [fwproc] Received command 0x46574c44
1,589,570 UART: [fwproc] Received Image of size 114084 bytes
1,856,232 UART: ROM Fatal Error: 0x000B0022
1,857,389 >>> mbox cmd response: failed
1,857,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,395 >>> mbox cmd response: failed
1,857,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,857,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,178 UART: [kat] SHA2-256
882,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,224 UART: [kat] ++
886,376 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
902,777 UART: [kat] HMAC-384Kdf
907,319 UART: [kat] LMS
1,475,515 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,590 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,811 UART: [idev] Erasing UDS.KEYID = 0
1,505,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,258 UART: [ldev] ++
1,515,426 UART: [ldev] CDI.KEYID = 6
1,515,789 UART: [ldev] SUBJECT.KEYID = 5
1,516,215 UART: [ldev] AUTHORITY.KEYID = 7
1,516,678 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,593 UART: [ldev] --
1,588,052 UART: [fwproc] Waiting for Commands...
1,588,743 UART: [fwproc] Received command 0x46574c44
1,589,534 UART: [fwproc] Received Image of size 114084 bytes
2,883,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,832 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,708,852 >>> mbox cmd response: failed
1,708,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,858 >>> mbox cmd response: failed
1,708,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,054 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
85,853 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
892,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,959 UART: [kat] ++
897,111 UART: [kat] sha1
901,333 UART: [kat] SHA2-256
903,273 UART: [kat] SHA2-384
905,870 UART: [kat] SHA2-512-ACC
907,771 UART: [kat] ECC-384
917,328 UART: [kat] HMAC-384Kdf
921,892 UART: [kat] LMS
1,170,220 UART: [kat] --
1,170,775 UART: [cold-reset] ++
1,171,207 UART: [fht] FHT @ 0x50003400
1,173,844 UART: [idev] ++
1,174,012 UART: [idev] CDI.KEYID = 6
1,174,372 UART: [idev] SUBJECT.KEYID = 7
1,174,796 UART: [idev] UDS.KEYID = 0
1,175,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,705 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,820 UART: [ldev] SUBJECT.KEYID = 5
1,210,246 UART: [ldev] AUTHORITY.KEYID = 7
1,210,709 UART: [ldev] FE.KEYID = 1
1,215,869 UART: [ldev] Erasing FE.KEYID = 1
1,242,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,155 UART: [ldev] --
1,281,598 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 114084 bytes
1,549,370 UART: ROM Fatal Error: 0x000B0022
1,550,527 >>> mbox cmd response: failed
1,550,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,533 >>> mbox cmd response: failed
1,550,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [kat] SHA2-256
893,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,807 UART: [kat] ++
897,959 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
906,868 UART: [kat] SHA2-512-ACC
908,769 UART: [kat] ECC-384
918,270 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,456 UART: [idev] ++
1,175,624 UART: [idev] CDI.KEYID = 6
1,175,984 UART: [idev] SUBJECT.KEYID = 7
1,176,408 UART: [idev] UDS.KEYID = 0
1,176,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,370 UART: [idev] Erasing UDS.KEYID = 0
1,201,841 UART: [idev] Sha1 KeyId Algorithm
1,210,265 UART: [idev] --
1,211,321 UART: [ldev] ++
1,211,489 UART: [ldev] CDI.KEYID = 6
1,211,852 UART: [ldev] SUBJECT.KEYID = 5
1,212,278 UART: [ldev] AUTHORITY.KEYID = 7
1,212,741 UART: [ldev] FE.KEYID = 1
1,217,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,813 UART: [ldev] --
1,283,226 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46574c44
1,284,614 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,630 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,406,774 >>> mbox cmd response: failed
1,406,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,780 >>> mbox cmd response: failed
1,406,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,133 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
893,299 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,424 UART: [kat] ++
897,576 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,789 UART: [idev] ++
1,175,957 UART: [idev] CDI.KEYID = 6
1,176,317 UART: [idev] SUBJECT.KEYID = 7
1,176,741 UART: [idev] UDS.KEYID = 0
1,177,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,463 UART: [idev] Erasing UDS.KEYID = 0
1,201,258 UART: [idev] Sha1 KeyId Algorithm
1,209,800 UART: [idev] --
1,210,924 UART: [ldev] ++
1,211,092 UART: [ldev] CDI.KEYID = 6
1,211,455 UART: [ldev] SUBJECT.KEYID = 5
1,211,881 UART: [ldev] AUTHORITY.KEYID = 7
1,212,344 UART: [ldev] FE.KEYID = 1
1,217,644 UART: [ldev] Erasing FE.KEYID = 1
1,243,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,668 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,827 UART: [fwproc] Recv command 0x46574c44
1,284,555 UART: [fwproc] Recv'd Img size: 114084 bytes
1,550,541 UART: ROM Fatal Error: 0x000B0022
1,551,698 >>> mbox cmd response: failed
1,551,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,704 >>> mbox cmd response: failed
1,551,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,710 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
893,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,448 UART: [kat] ++
897,600 UART: [kat] sha1
901,798 UART: [kat] SHA2-256
903,738 UART: [kat] SHA2-384
906,441 UART: [kat] SHA2-512-ACC
908,342 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,403 UART: [kat] LMS
1,170,731 UART: [kat] --
1,171,822 UART: [cold-reset] ++
1,172,390 UART: [fht] FHT @ 0x50003400
1,175,005 UART: [idev] ++
1,175,173 UART: [idev] CDI.KEYID = 6
1,175,533 UART: [idev] SUBJECT.KEYID = 7
1,175,957 UART: [idev] UDS.KEYID = 0
1,176,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,737 UART: [idev] Erasing UDS.KEYID = 0
1,201,170 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,578 UART: [ldev] ++
1,210,746 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,535 UART: [ldev] AUTHORITY.KEYID = 7
1,211,998 UART: [ldev] FE.KEYID = 1
1,217,142 UART: [ldev] Erasing FE.KEYID = 1
1,244,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,128 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,349 UART: [fwproc] Recv command 0x46574c44
1,285,077 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,031 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,407,127 >>> mbox cmd response: failed
1,407,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,133 >>> mbox cmd response: failed
1,407,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,294 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Unprovisioned
86,163 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,912 UART: [kat] SHA2-512-ACC
906,813 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,521 UART: [cold-reset] ++
1,171,003 UART: [fht] FHT @ 0x50003400
1,173,843 UART: [idev] ++
1,174,011 UART: [idev] CDI.KEYID = 6
1,174,372 UART: [idev] SUBJECT.KEYID = 7
1,174,797 UART: [idev] UDS.KEYID = 0
1,175,143 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,985 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,379 UART: [idev] --
1,209,562 UART: [ldev] ++
1,209,730 UART: [ldev] CDI.KEYID = 6
1,210,094 UART: [ldev] SUBJECT.KEYID = 5
1,210,521 UART: [ldev] AUTHORITY.KEYID = 7
1,210,984 UART: [ldev] FE.KEYID = 1
1,216,338 UART: [ldev] Erasing FE.KEYID = 1
1,242,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,278 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,713 UART: ROM Fatal Error: 0x000B0022
1,549,870 >>> mbox cmd response: failed
1,549,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,876 >>> mbox cmd response: failed
1,549,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,077 UART: [kat] ++
895,229 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,676 UART: [kat] HMAC-384Kdf
920,208 UART: [kat] LMS
1,168,520 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,679 UART: [fht] FHT @ 0x50003400
1,172,461 UART: [idev] ++
1,172,629 UART: [idev] CDI.KEYID = 6
1,172,990 UART: [idev] SUBJECT.KEYID = 7
1,173,415 UART: [idev] UDS.KEYID = 0
1,173,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,325 UART: [idev] Erasing UDS.KEYID = 0
1,198,101 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] --
1,207,926 UART: [ldev] ++
1,208,094 UART: [ldev] CDI.KEYID = 6
1,208,458 UART: [ldev] SUBJECT.KEYID = 5
1,208,885 UART: [ldev] AUTHORITY.KEYID = 7
1,209,348 UART: [ldev] FE.KEYID = 1
1,214,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,742 UART: [fwproc] Wait for Commands...
1,281,391 UART: [fwproc] Recv command 0x46574c44
1,282,124 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,529 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,306 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,401,719 >>> mbox cmd response: failed
1,401,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,725 >>> mbox cmd response: failed
1,401,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,318 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,561 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,295 UART: [fwproc] Recv'd Img size: 114084 bytes
1,548,914 UART: ROM Fatal Error: 0x000B0022
1,550,071 >>> mbox cmd response: failed
1,550,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,077 >>> mbox cmd response: failed
1,550,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
88,467 UART: [kat] SHA2-256
892,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,624 UART: [kat] SHA2-256
902,564 UART: [kat] SHA2-384
905,229 UART: [kat] SHA2-512-ACC
907,130 UART: [kat] ECC-384
917,005 UART: [kat] HMAC-384Kdf
921,617 UART: [kat] LMS
1,169,929 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,598 UART: [idev] ++
1,173,766 UART: [idev] CDI.KEYID = 6
1,174,127 UART: [idev] SUBJECT.KEYID = 7
1,174,552 UART: [idev] UDS.KEYID = 0
1,174,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,198,740 UART: [idev] Sha1 KeyId Algorithm
1,207,398 UART: [idev] --
1,208,445 UART: [ldev] ++
1,208,613 UART: [ldev] CDI.KEYID = 6
1,208,977 UART: [ldev] SUBJECT.KEYID = 5
1,209,404 UART: [ldev] AUTHORITY.KEYID = 7
1,209,867 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,581 UART: [ldev] --
1,281,065 UART: [fwproc] Wait for Commands...
1,281,690 UART: [fwproc] Recv command 0x46574c44
1,282,423 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,403,072 >>> mbox cmd response: failed
1,403,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,078 >>> mbox cmd response: failed
1,403,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,999 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
191,998 UART:
192,358 UART: Running Caliptra ROM ...
193,511 UART:
193,657 UART: [state] CFI Enabled
261,973 UART: [state] LifecycleState = Unprovisioned
263,882 UART: [state] DebugLocked = No
266,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,658 UART: [kat] SHA2-256
441,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,870 UART: [kat] ++
452,589 UART: [kat] sha1
464,177 UART: [kat] SHA2-256
466,865 UART: [kat] SHA2-384
472,142 UART: [kat] SHA2-512-ACC
474,536 UART: [kat] ECC-384
2,764,256 UART: [kat] HMAC-384Kdf
2,777,750 UART: [kat] LMS
3,968,053 UART: [kat] --
3,973,106 UART: [cold-reset] ++
3,975,530 UART: [fht] Storing FHT @ 0x50003400
3,987,393 UART: [idev] ++
3,987,965 UART: [idev] CDI.KEYID = 6
3,988,846 UART: [idev] SUBJECT.KEYID = 7
3,990,116 UART: [idev] UDS.KEYID = 0
3,992,578 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,924 UART: [idev] Erasing UDS.KEYID = 0
7,323,594 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,518 UART: [idev] --
7,350,046 UART: [ldev] ++
7,350,624 UART: [ldev] CDI.KEYID = 6
7,351,564 UART: [ldev] SUBJECT.KEYID = 5
7,352,778 UART: [ldev] AUTHORITY.KEYID = 7
7,354,066 UART: [ldev] FE.KEYID = 1
7,381,235 UART: [ldev] Erasing FE.KEYID = 1
10,714,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,286 UART: [ldev] --
13,095,233 UART: [fwproc] Waiting for Commands...
13,097,711 UART: [fwproc] Received command 0x46574c44
13,099,920 UART: [fwproc] Received Image of size 113760 bytes
15,799,768 UART: ROM Fatal Error: 0x000B003E
15,803,227 >>> mbox cmd response: failed
15,803,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,803,969 >>> mbox cmd response: failed
15,804,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,804,532 >>> mbox cmd response: failed
Initializing fuses
2,055,378 writing to cptra_bootfsm_go
2,244,698 UART:
2,245,044 UART: Running Caliptra ROM ...
2,246,178 UART:
2,246,348 UART: [state] CFI Enabled
2,314,525 UART: [state] LifecycleState = Unprovisioned
2,316,514 UART: [state] DebugLocked = No
2,319,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,173 UART: [kat] SHA2-256
2,493,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,354 UART: [kat] ++
2,504,811 UART: [kat] sha1
2,515,698 UART: [kat] SHA2-256
2,518,391 UART: [kat] SHA2-384
2,525,034 UART: [kat] SHA2-512-ACC
2,527,386 UART: [kat] ECC-384
4,820,216 UART: [kat] HMAC-384Kdf
4,848,811 UART: [kat] LMS
6,039,123 UART: [kat] --
6,042,595 UART: [cold-reset] ++
6,044,745 UART: [fht] Storing FHT @ 0x50003400
6,056,213 UART: [idev] ++
6,056,835 UART: [idev] CDI.KEYID = 6
6,057,723 UART: [idev] SUBJECT.KEYID = 7
6,058,942 UART: [idev] UDS.KEYID = 0
6,061,243 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,204,281 UART: [idev] Erasing UDS.KEYID = 0
9,393,632 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,382 UART: [idev] --
9,419,972 UART: [ldev] ++
9,420,553 UART: [ldev] CDI.KEYID = 6
9,421,491 UART: [ldev] SUBJECT.KEYID = 5
9,422,782 UART: [ldev] AUTHORITY.KEYID = 7
9,424,026 UART: [ldev] FE.KEYID = 1
9,471,539 UART: [ldev] Erasing FE.KEYID = 1
12,804,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,590 UART: [ldev] --
15,164,666 UART: [fwproc] Waiting for Commands...
15,167,358 UART: [fwproc] Received command 0x46574c44
15,169,587 UART: [fwproc] Received Image of size 113760 bytes
19,219,374 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,291,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,360,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,675,539 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,806,649 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,568,932 >>> mbox cmd response: failed
15,569,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,569,873 >>> mbox cmd response: failed
15,570,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,438 >>> mbox cmd response: failed
Initializing fuses
2,055,489 writing to cptra_bootfsm_go
5,847,602 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,907,093 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,450 UART:
192,815 UART: Running Caliptra ROM ...
194,014 UART:
603,821 UART: [state] CFI Enabled
621,347 UART: [state] LifecycleState = Unprovisioned
623,324 UART: [state] DebugLocked = No
625,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,546 UART: [kat] SHA2-256
799,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,857 UART: [kat] ++
810,312 UART: [kat] sha1
822,159 UART: [kat] SHA2-256
824,839 UART: [kat] SHA2-384
830,602 UART: [kat] SHA2-512-ACC
832,994 UART: [kat] ECC-384
3,120,007 UART: [kat] HMAC-384Kdf
3,130,754 UART: [kat] LMS
4,320,873 UART: [kat] --
4,325,583 UART: [cold-reset] ++
4,326,871 UART: [fht] Storing FHT @ 0x50003400
4,337,169 UART: [idev] ++
4,337,796 UART: [idev] CDI.KEYID = 6
4,338,728 UART: [idev] SUBJECT.KEYID = 7
4,339,949 UART: [idev] UDS.KEYID = 0
4,342,574 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,089 UART: [idev] Erasing UDS.KEYID = 0
7,620,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,631 UART: [idev] --
7,645,212 UART: [ldev] ++
7,645,836 UART: [ldev] CDI.KEYID = 6
7,646,778 UART: [ldev] SUBJECT.KEYID = 5
7,647,981 UART: [ldev] AUTHORITY.KEYID = 7
7,649,280 UART: [ldev] FE.KEYID = 1
7,661,291 UART: [ldev] Erasing FE.KEYID = 1
10,946,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,295 UART: [ldev] --
13,308,585 UART: [fwproc] Waiting for Commands...
13,310,314 UART: [fwproc] Received command 0x46574c44
13,312,504 UART: [fwproc] Received Image of size 113760 bytes
16,022,138 UART: ROM Fatal Error: 0x000B003E
16,025,569 >>> mbox cmd response: failed
16,026,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,363 >>> mbox cmd response: failed
16,026,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,922 >>> mbox cmd response: failed
Initializing fuses
2,063,075 writing to cptra_bootfsm_go
2,252,392 UART:
2,252,766 UART: Running Caliptra ROM ...
2,253,864 UART:
4,432,193 UART: [state] CFI Enabled
4,448,243 UART: [state] LifecycleState = Unprovisioned
4,450,155 UART: [state] DebugLocked = No
4,452,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,457,687 UART: [kat] SHA2-256
4,627,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,637,986 UART: [kat] ++
4,638,477 UART: [kat] sha1
4,650,284 UART: [kat] SHA2-256
4,652,986 UART: [kat] SHA2-384
4,659,625 UART: [kat] SHA2-512-ACC
4,662,012 UART: [kat] ECC-384
6,946,957 UART: [kat] HMAC-384Kdf
6,959,372 UART: [kat] LMS
8,149,448 UART: [kat] --
8,153,198 UART: [cold-reset] ++
8,155,680 UART: [fht] Storing FHT @ 0x50003400
8,168,514 UART: [idev] ++
8,169,095 UART: [idev] CDI.KEYID = 6
8,170,068 UART: [idev] SUBJECT.KEYID = 7
8,171,288 UART: [idev] UDS.KEYID = 0
8,173,564 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,316,548 UART: [idev] Erasing UDS.KEYID = 0
11,457,672 UART: [idev] Using Sha1 for KeyId Algorithm
11,479,543 UART: [idev] --
11,483,681 UART: [ldev] ++
11,484,255 UART: [ldev] CDI.KEYID = 6
11,485,219 UART: [ldev] SUBJECT.KEYID = 5
11,486,363 UART: [ldev] AUTHORITY.KEYID = 7
11,487,722 UART: [ldev] FE.KEYID = 1
11,497,503 UART: [ldev] Erasing FE.KEYID = 1
14,785,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,092,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,141,064 UART: [ldev] --
17,146,222 UART: [fwproc] Waiting for Commands...
17,149,520 UART: [fwproc] Received command 0x46574c44
17,151,715 UART: [fwproc] Received Image of size 113760 bytes
21,206,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,283,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,352,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,668,066 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,133,782 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,767,731 >>> mbox cmd response: failed
15,768,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,711 >>> mbox cmd response: failed
15,768,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,273 >>> mbox cmd response: failed
Initializing fuses
2,062,477 writing to cptra_bootfsm_go
8,227,135 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,154,422 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,157 UART:
192,568 UART: Running Caliptra ROM ...
193,719 UART:
193,871 UART: [state] CFI Enabled
259,879 UART: [state] LifecycleState = Unprovisioned
261,815 UART: [state] DebugLocked = No
264,446 UART: [state] WD Timer not started. Device not locked for debugging
268,121 UART: [kat] SHA2-256
447,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,842 UART: [kat] ++
459,374 UART: [kat] sha1
470,471 UART: [kat] SHA2-256
473,475 UART: [kat] SHA2-384
480,422 UART: [kat] SHA2-512-ACC
483,407 UART: [kat] ECC-384
2,946,361 UART: [kat] HMAC-384Kdf
2,970,279 UART: [kat] LMS
3,499,722 UART: [kat] --
3,504,766 UART: [cold-reset] ++
3,507,242 UART: [fht] FHT @ 0x50003400
3,518,762 UART: [idev] ++
3,519,354 UART: [idev] CDI.KEYID = 6
3,520,271 UART: [idev] SUBJECT.KEYID = 7
3,521,488 UART: [idev] UDS.KEYID = 0
3,523,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,856 UART: [idev] Erasing UDS.KEYID = 0
6,024,174 UART: [idev] Sha1 KeyId Algorithm
6,047,238 UART: [idev] --
6,050,441 UART: [ldev] ++
6,051,013 UART: [ldev] CDI.KEYID = 6
6,052,080 UART: [ldev] SUBJECT.KEYID = 5
6,053,195 UART: [ldev] AUTHORITY.KEYID = 7
6,054,378 UART: [ldev] FE.KEYID = 1
6,098,682 UART: [ldev] Erasing FE.KEYID = 1
8,600,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,765 UART: [ldev] --
10,392,978 UART: [fwproc] Wait for Commands...
10,394,427 UART: [fwproc] Recv command 0x46574c44
10,396,528 UART: [fwproc] Recv'd Img size: 114084 bytes
12,450,576 UART: ROM Fatal Error: 0x000B003E
12,453,644 >>> mbox cmd response: failed
12,454,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,406 >>> mbox cmd response: failed
12,454,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,966 >>> mbox cmd response: failed
Initializing fuses
2,055,933 writing to cptra_bootfsm_go
2,245,227 UART:
2,245,569 UART: Running Caliptra ROM ...
2,246,614 UART:
2,246,765 UART: [state] CFI Enabled
2,312,464 UART: [state] LifecycleState = Unprovisioned
2,314,343 UART: [state] DebugLocked = No
2,316,514 UART: [state] WD Timer not started. Device not locked for debugging
2,319,994 UART: [kat] SHA2-256
2,499,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,715 UART: [kat] ++
2,511,268 UART: [kat] sha1
2,522,759 UART: [kat] SHA2-256
2,525,756 UART: [kat] SHA2-384
2,532,198 UART: [kat] SHA2-512-ACC
2,535,145 UART: [kat] ECC-384
4,996,600 UART: [kat] HMAC-384Kdf
5,021,063 UART: [kat] LMS
5,550,537 UART: [kat] --
5,557,297 UART: [cold-reset] ++
5,558,723 UART: [fht] FHT @ 0x50003400
5,569,329 UART: [idev] ++
5,569,902 UART: [idev] CDI.KEYID = 6
5,570,810 UART: [idev] SUBJECT.KEYID = 7
5,572,022 UART: [idev] UDS.KEYID = 0
5,574,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,717,809 UART: [idev] Erasing UDS.KEYID = 0
8,101,566 UART: [idev] Sha1 KeyId Algorithm
8,124,196 UART: [idev] --
8,128,272 UART: [ldev] ++
8,128,854 UART: [ldev] CDI.KEYID = 6
8,129,764 UART: [ldev] SUBJECT.KEYID = 5
8,130,924 UART: [ldev] AUTHORITY.KEYID = 7
8,132,236 UART: [ldev] FE.KEYID = 1
8,176,539 UART: [ldev] Erasing FE.KEYID = 1
10,680,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,418,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,434,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,449,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,465,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,486,050 UART: [ldev] --
12,491,366 UART: [fwproc] Wait for Commands...
12,493,513 UART: [fwproc] Recv command 0x46574c44
12,495,605 UART: [fwproc] Recv'd Img size: 114084 bytes
15,901,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,489 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,046,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,363,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,359,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,231,781 >>> mbox cmd response: failed
12,232,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,232,682 >>> mbox cmd response: failed
12,232,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,233,241 >>> mbox cmd response: failed
Initializing fuses
2,059,286 writing to cptra_bootfsm_go
5,437,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,117,497 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,526 UART:
192,885 UART: Running Caliptra ROM ...
194,102 UART:
603,819 UART: [state] CFI Enabled
617,004 UART: [state] LifecycleState = Unprovisioned
618,908 UART: [state] DebugLocked = No
621,264 UART: [state] WD Timer not started. Device not locked for debugging
625,804 UART: [kat] SHA2-256
804,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,494 UART: [kat] ++
816,990 UART: [kat] sha1
829,273 UART: [kat] SHA2-256
832,334 UART: [kat] SHA2-384
838,255 UART: [kat] SHA2-512-ACC
841,229 UART: [kat] ECC-384
3,283,029 UART: [kat] HMAC-384Kdf
3,295,097 UART: [kat] LMS
3,824,615 UART: [kat] --
3,828,292 UART: [cold-reset] ++
3,829,722 UART: [fht] FHT @ 0x50003400
3,839,147 UART: [idev] ++
3,839,742 UART: [idev] CDI.KEYID = 6
3,840,661 UART: [idev] SUBJECT.KEYID = 7
3,841,762 UART: [idev] UDS.KEYID = 0
3,844,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,898 UART: [idev] Erasing UDS.KEYID = 0
6,316,625 UART: [idev] Sha1 KeyId Algorithm
6,340,670 UART: [idev] --
6,345,364 UART: [ldev] ++
6,345,937 UART: [ldev] CDI.KEYID = 6
6,346,846 UART: [ldev] SUBJECT.KEYID = 5
6,348,064 UART: [ldev] AUTHORITY.KEYID = 7
6,349,302 UART: [ldev] FE.KEYID = 1
6,359,419 UART: [ldev] Erasing FE.KEYID = 1
8,832,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,067 UART: [ldev] --
10,622,857 UART: [fwproc] Wait for Commands...
10,625,712 UART: [fwproc] Recv command 0x46574c44
10,627,762 UART: [fwproc] Recv'd Img size: 114084 bytes
12,678,286 UART: ROM Fatal Error: 0x000B003E
12,681,358 >>> mbox cmd response: failed
12,681,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,019 >>> mbox cmd response: failed
12,682,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,682,615 >>> mbox cmd response: failed
Initializing fuses
2,055,345 writing to cptra_bootfsm_go
2,244,651 UART:
2,244,999 UART: Running Caliptra ROM ...
2,246,143 UART:
7,774,462 UART: [state] CFI Enabled
7,790,688 UART: [state] LifecycleState = Unprovisioned
7,792,548 UART: [state] DebugLocked = No
7,794,077 UART: [state] WD Timer not started. Device not locked for debugging
7,798,522 UART: [kat] SHA2-256
7,977,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,989,247 UART: [kat] ++
7,989,709 UART: [kat] sha1
8,000,858 UART: [kat] SHA2-256
8,003,918 UART: [kat] SHA2-384
8,009,536 UART: [kat] SHA2-512-ACC
8,012,485 UART: [kat] ECC-384
10,454,761 UART: [kat] HMAC-384Kdf
10,467,768 UART: [kat] LMS
10,997,304 UART: [kat] --
11,003,858 UART: [cold-reset] ++
11,005,794 UART: [fht] FHT @ 0x50003400
11,018,125 UART: [idev] ++
11,018,697 UART: [idev] CDI.KEYID = 6
11,019,576 UART: [idev] SUBJECT.KEYID = 7
11,020,789 UART: [idev] UDS.KEYID = 0
11,023,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,166,536 UART: [idev] Erasing UDS.KEYID = 0
13,489,299 UART: [idev] Sha1 KeyId Algorithm
13,512,258 UART: [idev] --
13,517,329 UART: [ldev] ++
13,517,934 UART: [ldev] CDI.KEYID = 6
13,518,820 UART: [ldev] SUBJECT.KEYID = 5
13,519,926 UART: [ldev] AUTHORITY.KEYID = 7
13,521,195 UART: [ldev] FE.KEYID = 1
13,532,067 UART: [ldev] Erasing FE.KEYID = 1
16,005,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,721,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,737,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,753,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,769,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,790,746 UART: [ldev] --
17,795,848 UART: [fwproc] Wait for Commands...
17,798,376 UART: [fwproc] Recv command 0x46574c44
17,800,470 UART: [fwproc] Recv'd Img size: 114084 bytes
21,200,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,274,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,343,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,660,274 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,700,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,470,071 >>> mbox cmd response: failed
12,470,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,470,960 >>> mbox cmd response: failed
12,471,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,518 >>> mbox cmd response: failed
Initializing fuses
2,055,304 writing to cptra_bootfsm_go
11,089,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,668,009 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
193,022 UART:
193,392 UART: Running Caliptra ROM ...
194,509 UART:
194,652 UART: [state] CFI Enabled
261,947 UART: [state] LifecycleState = Unprovisioned
264,387 UART: [state] DebugLocked = No
266,151 UART: [state] WD Timer not started. Device not locked for debugging
270,387 UART: [kat] SHA2-256
460,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,055 UART: [kat] ++
471,538 UART: [kat] sha1
483,167 UART: [kat] SHA2-256
486,216 UART: [kat] SHA2-384
492,589 UART: [kat] SHA2-512-ACC
495,204 UART: [kat] ECC-384
2,944,272 UART: [kat] HMAC-384Kdf
2,970,377 UART: [kat] LMS
3,502,152 UART: [kat] --
3,506,852 UART: [cold-reset] ++
3,508,953 UART: [fht] FHT @ 0x50003400
3,519,512 UART: [idev] ++
3,520,207 UART: [idev] CDI.KEYID = 6
3,521,222 UART: [idev] SUBJECT.KEYID = 7
3,522,381 UART: [idev] UDS.KEYID = 0
3,525,178 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,792 UART: [idev] Erasing UDS.KEYID = 0
6,027,299 UART: [idev] Sha1 KeyId Algorithm
6,050,003 UART: [idev] --
6,055,037 UART: [ldev] ++
6,055,725 UART: [ldev] CDI.KEYID = 6
6,056,641 UART: [ldev] SUBJECT.KEYID = 5
6,057,803 UART: [ldev] AUTHORITY.KEYID = 7
6,059,042 UART: [ldev] FE.KEYID = 1
6,097,043 UART: [ldev] Erasing FE.KEYID = 1
8,604,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,909 UART: [ldev] --
10,409,052 UART: [fwproc] Wait for Commands...
10,411,065 UART: [fwproc] Recv command 0x46574c44
10,413,336 UART: [fwproc] Recv'd Img size: 114084 bytes
12,496,576 UART: ROM Fatal Error: 0x000B003E
12,500,198 >>> mbox cmd response: failed
12,500,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,959 >>> mbox cmd response: failed
12,501,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,519 >>> mbox cmd response: failed
Initializing fuses
2,055,823 writing to cptra_bootfsm_go
2,245,148 UART:
2,245,507 UART: Running Caliptra ROM ...
2,246,589 UART:
2,246,751 UART: [state] CFI Enabled
2,308,676 UART: [state] LifecycleState = Unprovisioned
2,311,060 UART: [state] DebugLocked = No
2,312,618 UART: [state] WD Timer not started. Device not locked for debugging
2,316,599 UART: [kat] SHA2-256
2,506,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,517,295 UART: [kat] ++
2,517,840 UART: [kat] sha1
2,529,165 UART: [kat] SHA2-256
2,532,179 UART: [kat] SHA2-384
2,539,141 UART: [kat] SHA2-512-ACC
2,541,722 UART: [kat] ECC-384
4,988,956 UART: [kat] HMAC-384Kdf
5,016,621 UART: [kat] LMS
5,548,416 UART: [kat] --
5,554,084 UART: [cold-reset] ++
5,556,726 UART: [fht] FHT @ 0x50003400
5,567,822 UART: [idev] ++
5,568,498 UART: [idev] CDI.KEYID = 6
5,569,513 UART: [idev] SUBJECT.KEYID = 7
5,570,674 UART: [idev] UDS.KEYID = 0
5,573,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,716,813 UART: [idev] Erasing UDS.KEYID = 0
8,074,223 UART: [idev] Sha1 KeyId Algorithm
8,096,874 UART: [idev] --
8,101,310 UART: [ldev] ++
8,101,995 UART: [ldev] CDI.KEYID = 6
8,102,906 UART: [ldev] SUBJECT.KEYID = 5
8,104,068 UART: [ldev] AUTHORITY.KEYID = 7
8,105,325 UART: [ldev] FE.KEYID = 1
8,144,110 UART: [ldev] Erasing FE.KEYID = 1
10,649,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,962 UART: [ldev] --
12,455,985 UART: [fwproc] Wait for Commands...
12,458,618 UART: [fwproc] Recv command 0x46574c44
12,460,880 UART: [fwproc] Recv'd Img size: 114084 bytes
15,897,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,722 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,093,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,635,369 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,437,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,296,418 >>> mbox cmd response: failed
12,297,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,388 >>> mbox cmd response: failed
12,297,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,949 >>> mbox cmd response: failed
Initializing fuses
2,060,240 writing to cptra_bootfsm_go
5,496,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,757,892 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,565 UART:
192,927 UART: Running Caliptra ROM ...
194,119 UART:
603,622 UART: [state] CFI Enabled
615,052 UART: [state] LifecycleState = Unprovisioned
617,469 UART: [state] DebugLocked = No
618,903 UART: [state] WD Timer not started. Device not locked for debugging
624,045 UART: [kat] SHA2-256
813,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,744 UART: [kat] ++
825,278 UART: [kat] sha1
835,295 UART: [kat] SHA2-256
838,304 UART: [kat] SHA2-384
844,222 UART: [kat] SHA2-512-ACC
846,833 UART: [kat] ECC-384
3,289,930 UART: [kat] HMAC-384Kdf
3,304,455 UART: [kat] LMS
3,836,259 UART: [kat] --
3,839,821 UART: [cold-reset] ++
3,841,701 UART: [fht] FHT @ 0x50003400
3,852,304 UART: [idev] ++
3,853,017 UART: [idev] CDI.KEYID = 6
3,853,936 UART: [idev] SUBJECT.KEYID = 7
3,855,151 UART: [idev] UDS.KEYID = 0
3,857,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,921 UART: [idev] Erasing UDS.KEYID = 0
6,331,997 UART: [idev] Sha1 KeyId Algorithm
6,355,766 UART: [idev] --
6,359,710 UART: [ldev] ++
6,360,388 UART: [ldev] CDI.KEYID = 6
6,361,296 UART: [ldev] SUBJECT.KEYID = 5
6,362,453 UART: [ldev] AUTHORITY.KEYID = 7
6,363,702 UART: [ldev] FE.KEYID = 1
6,372,192 UART: [ldev] Erasing FE.KEYID = 1
8,851,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,164 UART: [ldev] --
10,640,807 UART: [fwproc] Wait for Commands...
10,643,666 UART: [fwproc] Recv command 0x46574c44
10,645,973 UART: [fwproc] Recv'd Img size: 114084 bytes
12,732,436 UART: ROM Fatal Error: 0x000B003E
12,736,093 >>> mbox cmd response: failed
12,736,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,823 >>> mbox cmd response: failed
12,737,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,403 >>> mbox cmd response: failed
Initializing fuses
2,055,108 writing to cptra_bootfsm_go
2,244,453 UART:
2,244,790 UART: Running Caliptra ROM ...
2,245,931 UART:
7,724,657 UART: [state] CFI Enabled
7,739,877 UART: [state] LifecycleState = Unprovisioned
7,742,229 UART: [state] DebugLocked = No
7,744,208 UART: [state] WD Timer not started. Device not locked for debugging
7,748,096 UART: [kat] SHA2-256
7,937,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,948,776 UART: [kat] ++
7,949,302 UART: [kat] sha1
7,961,455 UART: [kat] SHA2-256
7,964,476 UART: [kat] SHA2-384
7,971,385 UART: [kat] SHA2-512-ACC
7,973,962 UART: [kat] ECC-384
10,416,359 UART: [kat] HMAC-384Kdf
10,430,091 UART: [kat] LMS
10,961,927 UART: [kat] --
10,966,304 UART: [cold-reset] ++
10,968,459 UART: [fht] FHT @ 0x50003400
10,979,169 UART: [idev] ++
10,979,837 UART: [idev] CDI.KEYID = 6
10,980,771 UART: [idev] SUBJECT.KEYID = 7
10,981,978 UART: [idev] UDS.KEYID = 0
10,984,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,128,162 UART: [idev] Erasing UDS.KEYID = 0
13,458,354 UART: [idev] Sha1 KeyId Algorithm
13,480,623 UART: [idev] --
13,485,261 UART: [ldev] ++
13,485,949 UART: [ldev] CDI.KEYID = 6
13,486,860 UART: [ldev] SUBJECT.KEYID = 5
13,488,017 UART: [ldev] AUTHORITY.KEYID = 7
13,489,254 UART: [ldev] FE.KEYID = 1
13,500,492 UART: [ldev] Erasing FE.KEYID = 1
15,978,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,731,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,768,326 UART: [ldev] --
17,773,065 UART: [fwproc] Wait for Commands...
17,774,785 UART: [fwproc] Recv command 0x46574c44
17,777,044 UART: [fwproc] Recv'd Img size: 114084 bytes
21,223,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,300,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,416,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,957,870 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
3,759,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,528,600 >>> mbox cmd response: failed
12,529,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,483 >>> mbox cmd response: failed
12,529,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,049 >>> mbox cmd response: failed
Initializing fuses
2,056,673 writing to cptra_bootfsm_go
11,096,781 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,288,870 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
85,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,581 UART: [kat] SHA2-256
881,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,627 UART: [kat] ++
885,779 UART: [kat] sha1
889,815 UART: [kat] SHA2-256
891,753 UART: [kat] SHA2-384
894,376 UART: [kat] SHA2-512-ACC
896,277 UART: [kat] ECC-384
901,838 UART: [kat] HMAC-384Kdf
906,400 UART: [kat] LMS
1,474,596 UART: [kat] --
1,475,711 UART: [cold-reset] ++
1,476,265 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,230 UART: [idev] Erasing UDS.KEYID = 0
1,504,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,300 UART: [idev] --
1,514,159 UART: [ldev] ++
1,514,327 UART: [ldev] CDI.KEYID = 6
1,514,690 UART: [ldev] SUBJECT.KEYID = 5
1,515,116 UART: [ldev] AUTHORITY.KEYID = 7
1,515,579 UART: [ldev] FE.KEYID = 1
1,520,867 UART: [ldev] Erasing FE.KEYID = 1
1,546,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,230 UART: [ldev] --
1,586,609 UART: [fwproc] Waiting for Commands...
1,587,226 UART: [fwproc] Received command 0x46574c44
1,588,017 UART: [fwproc] Received Image of size 114084 bytes
1,635,239 UART: ROM Fatal Error: 0x000B003E
1,636,398 >>> mbox cmd response: failed
1,636,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,404 >>> mbox cmd response: failed
1,636,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
894,950 UART: [kat] SHA2-512-ACC
896,851 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,146 UART: [idev] ++
1,479,314 UART: [idev] CDI.KEYID = 6
1,479,674 UART: [idev] SUBJECT.KEYID = 7
1,480,098 UART: [idev] UDS.KEYID = 0
1,480,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,504,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,514 UART: [idev] --
1,514,563 UART: [ldev] ++
1,514,731 UART: [ldev] CDI.KEYID = 6
1,515,094 UART: [ldev] SUBJECT.KEYID = 5
1,515,520 UART: [ldev] AUTHORITY.KEYID = 7
1,515,983 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,730 UART: [ldev] --
1,586,031 UART: [fwproc] Waiting for Commands...
1,586,822 UART: [fwproc] Received command 0x46574c44
1,587,613 UART: [fwproc] Received Image of size 114084 bytes
2,882,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,570 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,375 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,241 >>> mbox cmd response: failed
1,488,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,247 >>> mbox cmd response: failed
1,488,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,395 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,221 UART: [kat] SHA2-512-ACC
897,122 UART: [kat] ECC-384
902,991 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,964 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,451 UART: [idev] Erasing UDS.KEYID = 0
1,506,293 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,811 UART: [idev] --
1,515,988 UART: [ldev] ++
1,516,156 UART: [ldev] CDI.KEYID = 6
1,516,519 UART: [ldev] SUBJECT.KEYID = 5
1,516,945 UART: [ldev] AUTHORITY.KEYID = 7
1,517,408 UART: [ldev] FE.KEYID = 1
1,522,430 UART: [ldev] Erasing FE.KEYID = 1
1,548,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,897 UART: [ldev] --
1,587,400 UART: [fwproc] Waiting for Commands...
1,588,109 UART: [fwproc] Received command 0x46574c44
1,588,900 UART: [fwproc] Received Image of size 114084 bytes
1,636,332 UART: ROM Fatal Error: 0x000B003E
1,637,491 >>> mbox cmd response: failed
1,637,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,497 >>> mbox cmd response: failed
1,637,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,416 UART: [kat] SHA2-256
882,347 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,462 UART: [kat] ++
886,614 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,157 UART: [kat] HMAC-384Kdf
907,685 UART: [kat] LMS
1,475,881 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,226 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,457 UART: [idev] --
1,515,632 UART: [ldev] ++
1,515,800 UART: [ldev] CDI.KEYID = 6
1,516,163 UART: [ldev] SUBJECT.KEYID = 5
1,516,589 UART: [ldev] AUTHORITY.KEYID = 7
1,517,052 UART: [ldev] FE.KEYID = 1
1,522,092 UART: [ldev] Erasing FE.KEYID = 1
1,547,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,505 UART: [ldev] --
1,588,020 UART: [fwproc] Waiting for Commands...
1,588,753 UART: [fwproc] Received command 0x46574c44
1,589,544 UART: [fwproc] Received Image of size 114084 bytes
2,885,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,266 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,504 >>> mbox cmd response: failed
1,489,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,510 >>> mbox cmd response: failed
1,489,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,074 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,633 UART: [cold-reset] ++
1,171,963 UART: [fht] FHT @ 0x50003400
1,174,496 UART: [idev] ++
1,174,664 UART: [idev] CDI.KEYID = 6
1,175,024 UART: [idev] SUBJECT.KEYID = 7
1,175,448 UART: [idev] UDS.KEYID = 0
1,175,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,201,209 UART: [idev] Sha1 KeyId Algorithm
1,209,717 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,991 UART: [ldev] --
1,283,292 UART: [fwproc] Wait for Commands...
1,283,930 UART: [fwproc] Recv command 0x46574c44
1,284,658 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,576 UART: ROM Fatal Error: 0x000B003E
1,333,735 >>> mbox cmd response: failed
1,333,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,741 >>> mbox cmd response: failed
1,333,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,166 UART: [kat] SHA2-256
892,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,941 UART: [kat] ++
897,093 UART: [kat] sha1
901,165 UART: [kat] SHA2-256
903,105 UART: [kat] SHA2-384
905,864 UART: [kat] SHA2-512-ACC
907,765 UART: [kat] ECC-384
917,004 UART: [kat] HMAC-384Kdf
921,630 UART: [kat] LMS
1,169,958 UART: [kat] --
1,171,077 UART: [cold-reset] ++
1,171,501 UART: [fht] FHT @ 0x50003400
1,174,202 UART: [idev] ++
1,174,370 UART: [idev] CDI.KEYID = 6
1,174,730 UART: [idev] SUBJECT.KEYID = 7
1,175,154 UART: [idev] UDS.KEYID = 0
1,175,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,356 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,067 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,638 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,783 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,618 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,978 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,187,262 >>> mbox cmd response: failed
1,187,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,268 >>> mbox cmd response: failed
1,187,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,829 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,915 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,385 UART: [kat] SHA2-256
894,035 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,160 UART: [kat] ++
898,312 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,173,150 UART: [fht] FHT @ 0x50003400
1,175,917 UART: [idev] ++
1,176,085 UART: [idev] CDI.KEYID = 6
1,176,445 UART: [idev] SUBJECT.KEYID = 7
1,176,869 UART: [idev] UDS.KEYID = 0
1,177,214 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,045 UART: [idev] Erasing UDS.KEYID = 0
1,202,738 UART: [idev] Sha1 KeyId Algorithm
1,211,288 UART: [idev] --
1,212,310 UART: [ldev] ++
1,212,478 UART: [ldev] CDI.KEYID = 6
1,212,841 UART: [ldev] SUBJECT.KEYID = 5
1,213,267 UART: [ldev] AUTHORITY.KEYID = 7
1,213,730 UART: [ldev] FE.KEYID = 1
1,218,670 UART: [ldev] Erasing FE.KEYID = 1
1,245,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,804 UART: [ldev] --
1,285,127 UART: [fwproc] Wait for Commands...
1,285,915 UART: [fwproc] Recv command 0x46574c44
1,286,643 UART: [fwproc] Recv'd Img size: 114084 bytes
1,334,025 UART: ROM Fatal Error: 0x000B003E
1,335,184 >>> mbox cmd response: failed
1,335,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,190 >>> mbox cmd response: failed
1,335,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,335,196 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
893,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,498 UART: [kat] ++
897,650 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,485 UART: [kat] SHA2-512-ACC
908,386 UART: [kat] ECC-384
917,513 UART: [kat] HMAC-384Kdf
922,103 UART: [kat] LMS
1,170,431 UART: [kat] --
1,171,206 UART: [cold-reset] ++
1,171,622 UART: [fht] FHT @ 0x50003400
1,174,267 UART: [idev] ++
1,174,435 UART: [idev] CDI.KEYID = 6
1,174,795 UART: [idev] SUBJECT.KEYID = 7
1,175,219 UART: [idev] UDS.KEYID = 0
1,175,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,988 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,410 UART: [ldev] ++
1,209,578 UART: [ldev] CDI.KEYID = 6
1,209,941 UART: [ldev] SUBJECT.KEYID = 5
1,210,367 UART: [ldev] AUTHORITY.KEYID = 7
1,210,830 UART: [ldev] FE.KEYID = 1
1,216,056 UART: [ldev] Erasing FE.KEYID = 1
1,243,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,072 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,157 UART: [fwproc] Recv command 0x46574c44
1,283,885 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,069 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,407 >>> mbox cmd response: failed
1,188,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,413 >>> mbox cmd response: failed
1,188,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,954 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,303 UART: [kat] SHA2-256
901,243 UART: [kat] SHA2-384
903,868 UART: [kat] SHA2-512-ACC
905,769 UART: [kat] ECC-384
915,344 UART: [kat] HMAC-384Kdf
919,918 UART: [kat] LMS
1,168,230 UART: [kat] --
1,169,085 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,173,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,125 UART: [idev] Erasing UDS.KEYID = 0
1,197,557 UART: [idev] Sha1 KeyId Algorithm
1,206,469 UART: [idev] --
1,207,428 UART: [ldev] ++
1,207,596 UART: [ldev] CDI.KEYID = 6
1,207,960 UART: [ldev] SUBJECT.KEYID = 5
1,208,387 UART: [ldev] AUTHORITY.KEYID = 7
1,208,850 UART: [ldev] FE.KEYID = 1
1,214,112 UART: [ldev] Erasing FE.KEYID = 1
1,240,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,104 UART: [ldev] --
1,279,472 UART: [fwproc] Wait for Commands...
1,280,229 UART: [fwproc] Recv command 0x46574c44
1,280,962 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,110 UART: ROM Fatal Error: 0x000B003E
1,329,269 >>> mbox cmd response: failed
1,329,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,275 >>> mbox cmd response: failed
1,329,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,935 UART: [kat] ++
895,087 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,485 UART: [idev] ++
1,172,653 UART: [idev] CDI.KEYID = 6
1,173,014 UART: [idev] SUBJECT.KEYID = 7
1,173,439 UART: [idev] UDS.KEYID = 0
1,173,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,211 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,664 UART: [ldev] --
1,281,026 UART: [fwproc] Wait for Commands...
1,281,701 UART: [fwproc] Recv command 0x46574c44
1,282,434 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,750 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,703 >>> mbox cmd response: failed
1,181,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,709 >>> mbox cmd response: failed
1,181,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,084 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,877 UART: [kat] SHA2-512-ACC
906,778 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,513 UART: [kat] LMS
1,169,825 UART: [kat] --
1,170,680 UART: [cold-reset] ++
1,171,224 UART: [fht] FHT @ 0x50003400
1,174,032 UART: [idev] ++
1,174,200 UART: [idev] CDI.KEYID = 6
1,174,561 UART: [idev] SUBJECT.KEYID = 7
1,174,986 UART: [idev] UDS.KEYID = 0
1,175,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,738 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,689 UART: [ldev] --
1,283,185 UART: [fwproc] Wait for Commands...
1,283,890 UART: [fwproc] Recv command 0x46574c44
1,284,623 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,054 UART: ROM Fatal Error: 0x000B003E
1,333,213 >>> mbox cmd response: failed
1,333,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,219 >>> mbox cmd response: failed
1,333,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,120 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
891,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,998 UART: [kat] ++
896,150 UART: [kat] sha1
900,486 UART: [kat] SHA2-256
902,426 UART: [kat] SHA2-384
905,117 UART: [kat] SHA2-512-ACC
907,018 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,734 UART: [fht] FHT @ 0x50003400
1,173,524 UART: [idev] ++
1,173,692 UART: [idev] CDI.KEYID = 6
1,174,053 UART: [idev] SUBJECT.KEYID = 7
1,174,478 UART: [idev] UDS.KEYID = 0
1,174,824 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,200,056 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,209,815 UART: [ldev] ++
1,209,983 UART: [ldev] CDI.KEYID = 6
1,210,347 UART: [ldev] SUBJECT.KEYID = 5
1,210,774 UART: [ldev] AUTHORITY.KEYID = 7
1,211,237 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,803 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,319 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,750 >>> mbox cmd response: failed
1,182,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,756 >>> mbox cmd response: failed
1,182,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,725 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,225 UART:
192,583 UART: Running Caliptra ROM ...
193,770 UART:
193,921 UART: [state] CFI Enabled
262,755 UART: [state] LifecycleState = Unprovisioned
264,734 UART: [state] DebugLocked = No
266,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,909 UART: [kat] SHA2-256
441,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,108 UART: [kat] ++
452,608 UART: [kat] sha1
464,197 UART: [kat] SHA2-256
466,885 UART: [kat] SHA2-384
473,191 UART: [kat] SHA2-512-ACC
475,585 UART: [kat] ECC-384
2,767,849 UART: [kat] HMAC-384Kdf
2,796,981 UART: [kat] LMS
3,987,274 UART: [kat] --
3,992,862 UART: [cold-reset] ++
3,993,831 UART: [fht] Storing FHT @ 0x50003400
4,004,457 UART: [idev] ++
4,005,076 UART: [idev] CDI.KEYID = 6
4,006,000 UART: [idev] SUBJECT.KEYID = 7
4,007,232 UART: [idev] UDS.KEYID = 0
4,009,815 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,970 UART: [idev] Erasing UDS.KEYID = 0
7,342,720 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,403 UART: [idev] --
7,369,696 UART: [ldev] ++
7,370,282 UART: [ldev] CDI.KEYID = 6
7,371,248 UART: [ldev] SUBJECT.KEYID = 5
7,372,466 UART: [ldev] AUTHORITY.KEYID = 7
7,373,703 UART: [ldev] FE.KEYID = 1
7,417,509 UART: [ldev] Erasing FE.KEYID = 1
10,750,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,006 UART: [ldev] --
13,134,013 UART: [fwproc] Waiting for Commands...
13,135,795 UART: [fwproc] Received command 0x46574c44
13,138,000 UART: [fwproc] Received Image of size 113760 bytes
15,842,094 UART: ROM Fatal Error: 0x000B0018
15,845,620 >>> mbox cmd response: failed
15,846,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,386 >>> mbox cmd response: failed
15,846,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,949 >>> mbox cmd response: failed
Initializing fuses
2,057,662 writing to cptra_bootfsm_go
2,246,959 UART:
2,247,302 UART: Running Caliptra ROM ...
2,248,352 UART:
2,248,504 UART: [state] CFI Enabled
2,309,300 UART: [state] LifecycleState = Unprovisioned
2,311,256 UART: [state] DebugLocked = No
2,313,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,234 UART: [kat] SHA2-256
2,487,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,408 UART: [kat] ++
2,498,953 UART: [kat] sha1
2,508,822 UART: [kat] SHA2-256
2,511,512 UART: [kat] SHA2-384
2,516,585 UART: [kat] SHA2-512-ACC
2,518,946 UART: [kat] ECC-384
4,810,520 UART: [kat] HMAC-384Kdf
4,841,879 UART: [kat] LMS
6,032,191 UART: [kat] --
6,035,930 UART: [cold-reset] ++
6,037,706 UART: [fht] Storing FHT @ 0x50003400
6,047,632 UART: [idev] ++
6,048,227 UART: [idev] CDI.KEYID = 6
6,049,144 UART: [idev] SUBJECT.KEYID = 7
6,050,362 UART: [idev] UDS.KEYID = 0
6,052,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,196,207 UART: [idev] Erasing UDS.KEYID = 0
9,391,494 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,257 UART: [idev] --
9,416,819 UART: [ldev] ++
9,417,449 UART: [ldev] CDI.KEYID = 6
9,418,326 UART: [ldev] SUBJECT.KEYID = 5
9,419,637 UART: [ldev] AUTHORITY.KEYID = 7
9,420,823 UART: [ldev] FE.KEYID = 1
9,464,828 UART: [ldev] Erasing FE.KEYID = 1
12,799,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,175,659 UART: [ldev] --
15,180,005 UART: [fwproc] Waiting for Commands...
15,182,483 UART: [fwproc] Received command 0x46574c44
15,184,677 UART: [fwproc] Received Image of size 113760 bytes
19,225,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,301,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,370,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,685,803 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,810,474 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,569,107 >>> mbox cmd response: failed
15,570,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,482 >>> mbox cmd response: failed
15,570,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,051 >>> mbox cmd response: failed
Initializing fuses
2,059,428 writing to cptra_bootfsm_go
5,854,248 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,930,192 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,536 writing to cptra_bootfsm_go
192,691 UART:
193,060 UART: Running Caliptra ROM ...
194,263 UART:
604,059 UART: [state] CFI Enabled
616,695 UART: [state] LifecycleState = Unprovisioned
618,763 UART: [state] DebugLocked = No
621,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,346 UART: [kat] SHA2-256
795,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,662 UART: [kat] ++
806,134 UART: [kat] sha1
817,759 UART: [kat] SHA2-256
820,447 UART: [kat] SHA2-384
826,260 UART: [kat] SHA2-512-ACC
828,670 UART: [kat] ECC-384
3,112,984 UART: [kat] HMAC-384Kdf
3,123,697 UART: [kat] LMS
4,313,784 UART: [kat] --
4,319,244 UART: [cold-reset] ++
4,320,266 UART: [fht] Storing FHT @ 0x50003400
4,331,346 UART: [idev] ++
4,331,904 UART: [idev] CDI.KEYID = 6
4,332,840 UART: [idev] SUBJECT.KEYID = 7
4,334,110 UART: [idev] UDS.KEYID = 0
4,336,600 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,702 UART: [idev] Erasing UDS.KEYID = 0
7,623,941 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,672 UART: [idev] --
7,649,154 UART: [ldev] ++
7,649,726 UART: [ldev] CDI.KEYID = 6
7,650,764 UART: [ldev] SUBJECT.KEYID = 5
7,651,871 UART: [ldev] AUTHORITY.KEYID = 7
7,653,158 UART: [ldev] FE.KEYID = 1
7,663,813 UART: [ldev] Erasing FE.KEYID = 1
10,950,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,939 UART: [ldev] --
13,310,553 UART: [fwproc] Waiting for Commands...
13,312,864 UART: [fwproc] Received command 0x46574c44
13,315,055 UART: [fwproc] Received Image of size 113760 bytes
16,024,983 UART: ROM Fatal Error: 0x000B0018
16,028,490 >>> mbox cmd response: failed
16,028,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,249 >>> mbox cmd response: failed
16,029,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,819 >>> mbox cmd response: failed
Initializing fuses
2,055,784 writing to cptra_bootfsm_go
2,245,065 UART:
2,245,414 UART: Running Caliptra ROM ...
2,246,559 UART:
4,426,275 UART: [state] CFI Enabled
4,440,361 UART: [state] LifecycleState = Unprovisioned
4,442,305 UART: [state] DebugLocked = No
4,445,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,450,068 UART: [kat] SHA2-256
4,619,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,349 UART: [kat] ++
4,630,841 UART: [kat] sha1
4,641,245 UART: [kat] SHA2-256
4,643,934 UART: [kat] SHA2-384
4,651,323 UART: [kat] SHA2-512-ACC
4,653,672 UART: [kat] ECC-384
6,936,616 UART: [kat] HMAC-384Kdf
6,949,778 UART: [kat] LMS
8,139,892 UART: [kat] --
8,144,505 UART: [cold-reset] ++
8,145,633 UART: [fht] Storing FHT @ 0x50003400
8,157,279 UART: [idev] ++
8,157,845 UART: [idev] CDI.KEYID = 6
8,158,809 UART: [idev] SUBJECT.KEYID = 7
8,160,024 UART: [idev] UDS.KEYID = 0
8,162,394 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,305,387 UART: [idev] Erasing UDS.KEYID = 0
11,451,305 UART: [idev] Using Sha1 for KeyId Algorithm
11,474,037 UART: [idev] --
11,478,608 UART: [ldev] ++
11,479,240 UART: [ldev] CDI.KEYID = 6
11,480,128 UART: [ldev] SUBJECT.KEYID = 5
11,481,373 UART: [ldev] AUTHORITY.KEYID = 7
11,482,668 UART: [ldev] FE.KEYID = 1
11,493,612 UART: [ldev] Erasing FE.KEYID = 1
14,780,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,072,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,086,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,101,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,116,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,134,995 UART: [ldev] --
17,139,660 UART: [fwproc] Waiting for Commands...
17,142,421 UART: [fwproc] Received command 0x46574c44
17,144,616 UART: [fwproc] Received Image of size 113760 bytes
21,193,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,267,084 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,336,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,652,044 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,129,949 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,766,049 >>> mbox cmd response: failed
15,766,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,975 >>> mbox cmd response: failed
15,767,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,536 >>> mbox cmd response: failed
Initializing fuses
2,066,104 writing to cptra_bootfsm_go
8,235,111 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,159,986 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,191 UART:
192,577 UART: Running Caliptra ROM ...
193,789 UART:
193,945 UART: [state] CFI Enabled
263,051 UART: [state] LifecycleState = Unprovisioned
264,908 UART: [state] DebugLocked = No
266,339 UART: [state] WD Timer not started. Device not locked for debugging
270,491 UART: [kat] SHA2-256
449,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,142 UART: [kat] ++
461,675 UART: [kat] sha1
472,993 UART: [kat] SHA2-256
476,049 UART: [kat] SHA2-384
481,007 UART: [kat] SHA2-512-ACC
483,945 UART: [kat] ECC-384
2,945,263 UART: [kat] HMAC-384Kdf
2,971,794 UART: [kat] LMS
3,501,259 UART: [kat] --
3,507,160 UART: [cold-reset] ++
3,509,695 UART: [fht] FHT @ 0x50003400
3,520,078 UART: [idev] ++
3,520,651 UART: [idev] CDI.KEYID = 6
3,521,620 UART: [idev] SUBJECT.KEYID = 7
3,522,780 UART: [idev] UDS.KEYID = 0
3,525,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,064 UART: [idev] Erasing UDS.KEYID = 0
6,028,288 UART: [idev] Sha1 KeyId Algorithm
6,051,691 UART: [idev] --
6,054,558 UART: [ldev] ++
6,055,141 UART: [ldev] CDI.KEYID = 6
6,056,052 UART: [ldev] SUBJECT.KEYID = 5
6,057,271 UART: [ldev] AUTHORITY.KEYID = 7
6,058,505 UART: [ldev] FE.KEYID = 1
6,098,299 UART: [ldev] Erasing FE.KEYID = 1
8,604,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,729 UART: [ldev] --
10,411,995 UART: [fwproc] Wait for Commands...
10,414,832 UART: [fwproc] Recv command 0x46574c44
10,416,943 UART: [fwproc] Recv'd Img size: 114084 bytes
12,469,048 UART: ROM Fatal Error: 0x000B0018
12,472,178 >>> mbox cmd response: failed
12,472,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,944 >>> mbox cmd response: failed
12,473,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,473,505 >>> mbox cmd response: failed
Initializing fuses
2,056,537 writing to cptra_bootfsm_go
2,245,878 UART:
2,246,220 UART: Running Caliptra ROM ...
2,247,360 UART:
2,247,524 UART: [state] CFI Enabled
2,308,087 UART: [state] LifecycleState = Unprovisioned
2,309,961 UART: [state] DebugLocked = No
2,312,548 UART: [state] WD Timer not started. Device not locked for debugging
2,315,537 UART: [kat] SHA2-256
2,494,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,270 UART: [kat] ++
2,506,816 UART: [kat] sha1
2,517,495 UART: [kat] SHA2-256
2,520,531 UART: [kat] SHA2-384
2,527,108 UART: [kat] SHA2-512-ACC
2,530,102 UART: [kat] ECC-384
4,994,532 UART: [kat] HMAC-384Kdf
5,017,299 UART: [kat] LMS
5,546,777 UART: [kat] --
5,550,190 UART: [cold-reset] ++
5,552,338 UART: [fht] FHT @ 0x50003400
5,563,262 UART: [idev] ++
5,563,822 UART: [idev] CDI.KEYID = 6
5,564,703 UART: [idev] SUBJECT.KEYID = 7
5,565,966 UART: [idev] UDS.KEYID = 0
5,568,205 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,711,803 UART: [idev] Erasing UDS.KEYID = 0
8,070,421 UART: [idev] Sha1 KeyId Algorithm
8,092,251 UART: [idev] --
8,094,917 UART: [ldev] ++
8,095,496 UART: [ldev] CDI.KEYID = 6
8,096,379 UART: [ldev] SUBJECT.KEYID = 5
8,097,596 UART: [ldev] AUTHORITY.KEYID = 7
8,098,849 UART: [ldev] FE.KEYID = 1
8,145,638 UART: [ldev] Erasing FE.KEYID = 1
10,648,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,473 UART: [ldev] --
12,457,228 UART: [fwproc] Wait for Commands...
12,459,162 UART: [fwproc] Recv command 0x46574c44
12,461,257 UART: [fwproc] Recv'd Img size: 114084 bytes
15,862,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,324,656 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,383,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,249,847 >>> mbox cmd response: failed
12,250,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,125 >>> mbox cmd response: failed
12,251,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,728 >>> mbox cmd response: failed
Initializing fuses
2,063,202 writing to cptra_bootfsm_go
5,442,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,145,159 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,500 UART:
192,885 UART: Running Caliptra ROM ...
194,002 UART:
603,595 UART: [state] CFI Enabled
616,934 UART: [state] LifecycleState = Unprovisioned
618,810 UART: [state] DebugLocked = No
620,347 UART: [state] WD Timer not started. Device not locked for debugging
624,771 UART: [kat] SHA2-256
803,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,499 UART: [kat] ++
816,033 UART: [kat] sha1
827,298 UART: [kat] SHA2-256
830,298 UART: [kat] SHA2-384
835,314 UART: [kat] SHA2-512-ACC
838,299 UART: [kat] ECC-384
3,279,871 UART: [kat] HMAC-384Kdf
3,291,620 UART: [kat] LMS
3,821,116 UART: [kat] --
3,825,490 UART: [cold-reset] ++
3,826,720 UART: [fht] FHT @ 0x50003400
3,839,208 UART: [idev] ++
3,839,775 UART: [idev] CDI.KEYID = 6
3,840,654 UART: [idev] SUBJECT.KEYID = 7
3,841,923 UART: [idev] UDS.KEYID = 0
3,844,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,805 UART: [idev] Erasing UDS.KEYID = 0
6,312,062 UART: [idev] Sha1 KeyId Algorithm
6,335,253 UART: [idev] --
6,339,180 UART: [ldev] ++
6,339,763 UART: [ldev] CDI.KEYID = 6
6,340,674 UART: [ldev] SUBJECT.KEYID = 5
6,341,829 UART: [ldev] AUTHORITY.KEYID = 7
6,343,059 UART: [ldev] FE.KEYID = 1
6,357,111 UART: [ldev] Erasing FE.KEYID = 1
8,836,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,877 UART: [ldev] --
10,626,272 UART: [fwproc] Wait for Commands...
10,628,554 UART: [fwproc] Recv command 0x46574c44
10,630,600 UART: [fwproc] Recv'd Img size: 114084 bytes
12,684,108 UART: ROM Fatal Error: 0x000B0018
12,687,228 >>> mbox cmd response: failed
12,687,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,687,977 >>> mbox cmd response: failed
12,688,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,577 >>> mbox cmd response: failed
Initializing fuses
2,052,269 writing to cptra_bootfsm_go
2,241,634 UART:
2,241,985 UART: Running Caliptra ROM ...
2,243,124 UART:
7,765,087 UART: [state] CFI Enabled
7,778,629 UART: [state] LifecycleState = Unprovisioned
7,780,497 UART: [state] DebugLocked = No
7,783,397 UART: [state] WD Timer not started. Device not locked for debugging
7,787,896 UART: [kat] SHA2-256
7,967,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,978,577 UART: [kat] ++
7,979,118 UART: [kat] sha1
7,988,937 UART: [kat] SHA2-256
7,991,959 UART: [kat] SHA2-384
7,998,755 UART: [kat] SHA2-512-ACC
8,001,697 UART: [kat] ECC-384
10,441,313 UART: [kat] HMAC-384Kdf
10,453,115 UART: [kat] LMS
10,982,591 UART: [kat] --
10,986,423 UART: [cold-reset] ++
10,988,404 UART: [fht] FHT @ 0x50003400
10,999,451 UART: [idev] ++
11,000,018 UART: [idev] CDI.KEYID = 6
11,001,043 UART: [idev] SUBJECT.KEYID = 7
11,002,153 UART: [idev] UDS.KEYID = 0
11,004,764 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,148,035 UART: [idev] Erasing UDS.KEYID = 0
13,468,571 UART: [idev] Sha1 KeyId Algorithm
13,491,835 UART: [idev] --
13,496,335 UART: [ldev] ++
13,496,918 UART: [ldev] CDI.KEYID = 6
13,497,830 UART: [ldev] SUBJECT.KEYID = 5
13,498,987 UART: [ldev] AUTHORITY.KEYID = 7
13,500,275 UART: [ldev] FE.KEYID = 1
13,510,658 UART: [ldev] Erasing FE.KEYID = 1
15,987,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,734,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,750,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,770,199 UART: [ldev] --
17,775,192 UART: [fwproc] Wait for Commands...
17,777,403 UART: [fwproc] Recv command 0x46574c44
17,779,500 UART: [fwproc] Recv'd Img size: 114084 bytes
21,177,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,251,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,320,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,636,717 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,694,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,452,904 >>> mbox cmd response: failed
12,453,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,772 >>> mbox cmd response: failed
12,454,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,287 >>> mbox cmd response: failed
Initializing fuses
2,065,869 writing to cptra_bootfsm_go
11,108,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,669,811 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,086 UART:
192,451 UART: Running Caliptra ROM ...
193,570 UART:
193,712 UART: [state] CFI Enabled
264,280 UART: [state] LifecycleState = Unprovisioned
266,669 UART: [state] DebugLocked = No
269,593 UART: [state] WD Timer not started. Device not locked for debugging
273,392 UART: [kat] SHA2-256
463,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,033 UART: [kat] ++
474,486 UART: [kat] sha1
486,231 UART: [kat] SHA2-256
489,242 UART: [kat] SHA2-384
494,000 UART: [kat] SHA2-512-ACC
496,567 UART: [kat] ECC-384
2,946,676 UART: [kat] HMAC-384Kdf
2,970,826 UART: [kat] LMS
3,502,624 UART: [kat] --
3,507,839 UART: [cold-reset] ++
3,508,983 UART: [fht] FHT @ 0x50003400
3,520,022 UART: [idev] ++
3,520,706 UART: [idev] CDI.KEYID = 6
3,521,684 UART: [idev] SUBJECT.KEYID = 7
3,522,784 UART: [idev] UDS.KEYID = 0
3,525,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,384 UART: [idev] Erasing UDS.KEYID = 0
6,029,365 UART: [idev] Sha1 KeyId Algorithm
6,052,875 UART: [idev] --
6,056,495 UART: [ldev] ++
6,057,200 UART: [ldev] CDI.KEYID = 6
6,058,118 UART: [ldev] SUBJECT.KEYID = 5
6,059,284 UART: [ldev] AUTHORITY.KEYID = 7
6,060,522 UART: [ldev] FE.KEYID = 1
6,100,824 UART: [ldev] Erasing FE.KEYID = 1
8,606,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,314 UART: [ldev] --
10,412,885 UART: [fwproc] Wait for Commands...
10,416,065 UART: [fwproc] Recv command 0x46574c44
10,418,334 UART: [fwproc] Recv'd Img size: 114084 bytes
12,505,786 UART: ROM Fatal Error: 0x000B0018
12,509,464 >>> mbox cmd response: failed
12,509,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,180 >>> mbox cmd response: failed
12,510,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,744 >>> mbox cmd response: failed
Initializing fuses
2,059,468 writing to cptra_bootfsm_go
2,248,768 UART:
2,249,132 UART: Running Caliptra ROM ...
2,250,216 UART:
2,250,370 UART: [state] CFI Enabled
2,322,163 UART: [state] LifecycleState = Unprovisioned
2,324,599 UART: [state] DebugLocked = No
2,326,861 UART: [state] WD Timer not started. Device not locked for debugging
2,330,841 UART: [kat] SHA2-256
2,520,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,453 UART: [kat] ++
2,531,939 UART: [kat] sha1
2,543,591 UART: [kat] SHA2-256
2,546,608 UART: [kat] SHA2-384
2,552,655 UART: [kat] SHA2-512-ACC
2,555,232 UART: [kat] ECC-384
5,006,819 UART: [kat] HMAC-384Kdf
5,029,602 UART: [kat] LMS
5,561,363 UART: [kat] --
5,567,195 UART: [cold-reset] ++
5,569,398 UART: [fht] FHT @ 0x50003400
5,581,244 UART: [idev] ++
5,581,919 UART: [idev] CDI.KEYID = 6
5,582,884 UART: [idev] SUBJECT.KEYID = 7
5,584,096 UART: [idev] UDS.KEYID = 0
5,586,503 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,730,105 UART: [idev] Erasing UDS.KEYID = 0
8,086,606 UART: [idev] Sha1 KeyId Algorithm
8,108,822 UART: [idev] --
8,113,405 UART: [ldev] ++
8,114,087 UART: [ldev] CDI.KEYID = 6
8,114,997 UART: [ldev] SUBJECT.KEYID = 5
8,116,157 UART: [ldev] AUTHORITY.KEYID = 7
8,117,388 UART: [ldev] FE.KEYID = 1
8,158,353 UART: [ldev] Erasing FE.KEYID = 1
10,665,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,454 UART: [ldev] --
12,473,340 UART: [fwproc] Wait for Commands...
12,475,191 UART: [fwproc] Recv command 0x46574c44
12,477,264 UART: [fwproc] Recv'd Img size: 114084 bytes
15,913,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,652,079 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,419,267 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,299,993 >>> mbox cmd response: failed
12,300,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,927 >>> mbox cmd response: failed
12,301,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,487 >>> mbox cmd response: failed
Initializing fuses
2,059,485 writing to cptra_bootfsm_go
5,495,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,791,426 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,546 UART:
192,898 UART: Running Caliptra ROM ...
194,104 UART:
603,535 UART: [state] CFI Enabled
617,843 UART: [state] LifecycleState = Unprovisioned
620,253 UART: [state] DebugLocked = No
622,517 UART: [state] WD Timer not started. Device not locked for debugging
627,444 UART: [kat] SHA2-256
817,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,162 UART: [kat] ++
828,748 UART: [kat] sha1
839,692 UART: [kat] SHA2-256
842,711 UART: [kat] SHA2-384
849,876 UART: [kat] SHA2-512-ACC
852,485 UART: [kat] ECC-384
3,295,744 UART: [kat] HMAC-384Kdf
3,308,959 UART: [kat] LMS
3,840,790 UART: [kat] --
3,844,160 UART: [cold-reset] ++
3,846,476 UART: [fht] FHT @ 0x50003400
3,856,968 UART: [idev] ++
3,857,654 UART: [idev] CDI.KEYID = 6
3,858,643 UART: [idev] SUBJECT.KEYID = 7
3,859,805 UART: [idev] UDS.KEYID = 0
3,862,273 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,854 UART: [idev] Erasing UDS.KEYID = 0
6,336,533 UART: [idev] Sha1 KeyId Algorithm
6,358,268 UART: [idev] --
6,363,136 UART: [ldev] ++
6,363,819 UART: [ldev] CDI.KEYID = 6
6,364,728 UART: [ldev] SUBJECT.KEYID = 5
6,365,888 UART: [ldev] AUTHORITY.KEYID = 7
6,367,120 UART: [ldev] FE.KEYID = 1
6,380,299 UART: [ldev] Erasing FE.KEYID = 1
8,858,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,097 UART: [ldev] --
10,649,749 UART: [fwproc] Wait for Commands...
10,651,907 UART: [fwproc] Recv command 0x46574c44
10,654,224 UART: [fwproc] Recv'd Img size: 114084 bytes
12,728,143 UART: ROM Fatal Error: 0x000B0018
12,731,803 >>> mbox cmd response: failed
12,732,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,732,446 >>> mbox cmd response: failed
12,732,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,003 >>> mbox cmd response: failed
Initializing fuses
2,055,661 writing to cptra_bootfsm_go
2,245,053 UART:
2,245,427 UART: Running Caliptra ROM ...
2,246,484 UART:
7,719,022 UART: [state] CFI Enabled
7,732,638 UART: [state] LifecycleState = Unprovisioned
7,735,019 UART: [state] DebugLocked = No
7,736,260 UART: [state] WD Timer not started. Device not locked for debugging
7,739,895 UART: [kat] SHA2-256
7,929,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,940,538 UART: [kat] ++
7,941,142 UART: [kat] sha1
7,952,416 UART: [kat] SHA2-256
7,955,384 UART: [kat] SHA2-384
7,961,750 UART: [kat] SHA2-512-ACC
7,964,322 UART: [kat] ECC-384
10,408,247 UART: [kat] HMAC-384Kdf
10,421,500 UART: [kat] LMS
10,953,356 UART: [kat] --
10,957,204 UART: [cold-reset] ++
10,958,764 UART: [fht] FHT @ 0x50003400
10,970,926 UART: [idev] ++
10,971,608 UART: [idev] CDI.KEYID = 6
10,972,576 UART: [idev] SUBJECT.KEYID = 7
10,973,786 UART: [idev] UDS.KEYID = 0
10,976,024 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,119,372 UART: [idev] Erasing UDS.KEYID = 0
13,449,546 UART: [idev] Sha1 KeyId Algorithm
13,472,826 UART: [idev] --
13,476,384 UART: [ldev] ++
13,477,120 UART: [ldev] CDI.KEYID = 6
13,478,025 UART: [ldev] SUBJECT.KEYID = 5
13,479,185 UART: [ldev] AUTHORITY.KEYID = 7
13,480,420 UART: [ldev] FE.KEYID = 1
13,491,091 UART: [ldev] Erasing FE.KEYID = 1
15,966,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,686,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,701,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,716,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,731,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,752,563 UART: [ldev] --
17,757,828 UART: [fwproc] Wait for Commands...
17,760,577 UART: [fwproc] Recv command 0x46574c44
17,762,839 UART: [fwproc] Recv'd Img size: 114084 bytes
21,204,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,279,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,395,487 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,937,004 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,761,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,521,750 >>> mbox cmd response: failed
12,522,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,522,610 >>> mbox cmd response: failed
12,522,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,174 >>> mbox cmd response: failed
Initializing fuses
2,060,071 writing to cptra_bootfsm_go
11,104,303 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,299,169 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
903,164 UART: [kat] HMAC-384Kdf
907,910 UART: [kat] LMS
1,476,106 UART: [kat] --
1,476,969 UART: [cold-reset] ++
1,477,431 UART: [fht] Storing FHT @ 0x50003400
1,479,996 UART: [idev] ++
1,480,164 UART: [idev] CDI.KEYID = 6
1,480,524 UART: [idev] SUBJECT.KEYID = 7
1,480,948 UART: [idev] UDS.KEYID = 0
1,481,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,760 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,978 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,321 UART: [ldev] Erasing FE.KEYID = 1
1,547,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,032 UART: [ldev] --
1,586,327 UART: [fwproc] Waiting for Commands...
1,587,156 UART: [fwproc] Received command 0x46574c44
1,587,947 UART: [fwproc] Received Image of size 114084 bytes
1,635,602 UART: ROM Fatal Error: 0x000B0018
1,636,759 >>> mbox cmd response: failed
1,636,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,765 >>> mbox cmd response: failed
1,636,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,210 UART: [kat] SHA2-512-ACC
897,111 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,428 UART: [kat] LMS
1,475,624 UART: [kat] --
1,476,505 UART: [cold-reset] ++
1,476,929 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,974 UART: [idev] Erasing UDS.KEYID = 0
1,504,366 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,054 UART: [idev] --
1,514,115 UART: [ldev] ++
1,514,283 UART: [ldev] CDI.KEYID = 6
1,514,646 UART: [ldev] SUBJECT.KEYID = 5
1,515,072 UART: [ldev] AUTHORITY.KEYID = 7
1,515,535 UART: [ldev] FE.KEYID = 1
1,520,643 UART: [ldev] Erasing FE.KEYID = 1
1,546,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,074 UART: [ldev] --
1,585,481 UART: [fwproc] Waiting for Commands...
1,586,244 UART: [fwproc] Received command 0x46574c44
1,587,035 UART: [fwproc] Received Image of size 114084 bytes
2,881,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,055 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,057 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,750 >>> mbox cmd response: failed
1,486,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,756 >>> mbox cmd response: failed
1,486,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,997 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,582 UART: [kat] SHA2-256
892,520 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
902,501 UART: [kat] HMAC-384Kdf
907,223 UART: [kat] LMS
1,475,419 UART: [kat] --
1,476,196 UART: [cold-reset] ++
1,476,728 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,621 UART: [idev] Erasing UDS.KEYID = 0
1,505,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,290 UART: [ldev] ++
1,515,458 UART: [ldev] CDI.KEYID = 6
1,515,821 UART: [ldev] SUBJECT.KEYID = 5
1,516,247 UART: [ldev] AUTHORITY.KEYID = 7
1,516,710 UART: [ldev] FE.KEYID = 1
1,521,954 UART: [ldev] Erasing FE.KEYID = 1
1,547,497 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,377 UART: [ldev] --
1,586,834 UART: [fwproc] Waiting for Commands...
1,587,483 UART: [fwproc] Received command 0x46574c44
1,588,274 UART: [fwproc] Received Image of size 114084 bytes
1,636,067 UART: ROM Fatal Error: 0x000B0018
1,637,224 >>> mbox cmd response: failed
1,637,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,230 >>> mbox cmd response: failed
1,637,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,525 UART: [kat] LMS
1,475,721 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,067 UART: [idev] ++
1,480,235 UART: [idev] CDI.KEYID = 6
1,480,595 UART: [idev] SUBJECT.KEYID = 7
1,481,019 UART: [idev] UDS.KEYID = 0
1,481,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,769 UART: [idev] Erasing UDS.KEYID = 0
1,505,445 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,243 UART: [idev] --
1,515,336 UART: [ldev] ++
1,515,504 UART: [ldev] CDI.KEYID = 6
1,515,867 UART: [ldev] SUBJECT.KEYID = 5
1,516,293 UART: [ldev] AUTHORITY.KEYID = 7
1,516,756 UART: [ldev] FE.KEYID = 1
1,521,986 UART: [ldev] Erasing FE.KEYID = 1
1,547,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,745 UART: [ldev] --
1,587,212 UART: [fwproc] Waiting for Commands...
1,588,013 UART: [fwproc] Received command 0x46574c44
1,588,804 UART: [fwproc] Received Image of size 114084 bytes
2,882,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,519 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,048 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,049 >>> mbox cmd response: failed
1,488,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,055 >>> mbox cmd response: failed
1,488,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,818 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,176 UART: [kat] SHA2-512-ACC
908,077 UART: [kat] ECC-384
917,454 UART: [kat] HMAC-384Kdf
922,044 UART: [kat] LMS
1,170,372 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,171,915 UART: [fht] FHT @ 0x50003400
1,174,594 UART: [idev] ++
1,174,762 UART: [idev] CDI.KEYID = 6
1,175,122 UART: [idev] SUBJECT.KEYID = 7
1,175,546 UART: [idev] UDS.KEYID = 0
1,175,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,970 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,101 UART: [idev] --
1,210,195 UART: [ldev] ++
1,210,363 UART: [ldev] CDI.KEYID = 6
1,210,726 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,525 UART: [ldev] --
1,283,012 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,502 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,807 UART: ROM Fatal Error: 0x000B0018
1,333,964 >>> mbox cmd response: failed
1,333,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,970 >>> mbox cmd response: failed
1,333,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
893,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,225 UART: [kat] ++
897,377 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,116 UART: [kat] SHA2-512-ACC
908,017 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,440 UART: [kat] LMS
1,170,768 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,129 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,023 UART: [idev] Sha1 KeyId Algorithm
1,208,613 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,362 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,613 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,467 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,016 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,597 >>> mbox cmd response: failed
1,188,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,603 >>> mbox cmd response: failed
1,188,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,055 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,926 UART: [kat] SHA2-256
903,866 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,457 UART: [kat] LMS
1,171,785 UART: [kat] --
1,172,866 UART: [cold-reset] ++
1,173,418 UART: [fht] FHT @ 0x50003400
1,175,951 UART: [idev] ++
1,176,119 UART: [idev] CDI.KEYID = 6
1,176,479 UART: [idev] SUBJECT.KEYID = 7
1,176,903 UART: [idev] UDS.KEYID = 0
1,177,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,202,422 UART: [idev] Sha1 KeyId Algorithm
1,210,828 UART: [idev] --
1,211,966 UART: [ldev] ++
1,212,134 UART: [ldev] CDI.KEYID = 6
1,212,497 UART: [ldev] SUBJECT.KEYID = 5
1,212,923 UART: [ldev] AUTHORITY.KEYID = 7
1,213,386 UART: [ldev] FE.KEYID = 1
1,218,776 UART: [ldev] Erasing FE.KEYID = 1
1,245,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,422 UART: [ldev] --
1,284,751 UART: [fwproc] Wait for Commands...
1,285,355 UART: [fwproc] Recv command 0x46574c44
1,286,083 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,118 UART: ROM Fatal Error: 0x000B0018
1,334,275 >>> mbox cmd response: failed
1,334,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,281 >>> mbox cmd response: failed
1,334,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,452 UART: [kat] SHA2-256
904,392 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,112 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,343 UART: [idev] ++
1,175,511 UART: [idev] CDI.KEYID = 6
1,175,871 UART: [idev] SUBJECT.KEYID = 7
1,176,295 UART: [idev] UDS.KEYID = 0
1,176,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,631 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,588 UART: [idev] --
1,210,734 UART: [ldev] ++
1,210,902 UART: [ldev] CDI.KEYID = 6
1,211,265 UART: [ldev] SUBJECT.KEYID = 5
1,211,691 UART: [ldev] AUTHORITY.KEYID = 7
1,212,154 UART: [ldev] FE.KEYID = 1
1,217,358 UART: [ldev] Erasing FE.KEYID = 1
1,243,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,224 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,411 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,895 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,488 >>> mbox cmd response: failed
1,188,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,494 >>> mbox cmd response: failed
1,188,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,428 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,848 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,227 UART: [idev] ++
1,173,395 UART: [idev] CDI.KEYID = 6
1,173,756 UART: [idev] SUBJECT.KEYID = 7
1,174,181 UART: [idev] UDS.KEYID = 0
1,174,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,176 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,744 UART: ROM Fatal Error: 0x000B0018
1,330,901 >>> mbox cmd response: failed
1,330,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,907 >>> mbox cmd response: failed
1,330,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,169,879 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,173,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,944 UART: [ldev] --
1,280,432 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,438 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,442 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,864 >>> mbox cmd response: failed
1,183,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,870 >>> mbox cmd response: failed
1,183,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,472 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,195 UART: [kat] SHA2-512-ACC
907,096 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,514 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,588 UART: [idev] ++
1,173,756 UART: [idev] CDI.KEYID = 6
1,174,117 UART: [idev] SUBJECT.KEYID = 7
1,174,542 UART: [idev] UDS.KEYID = 0
1,174,888 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,143 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,967 UART: ROM Fatal Error: 0x000B0018
1,331,124 >>> mbox cmd response: failed
1,331,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,130 >>> mbox cmd response: failed
1,331,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,621 UART: [kat] SHA2-512-ACC
906,522 UART: [kat] ECC-384
916,617 UART: [kat] HMAC-384Kdf
921,125 UART: [kat] LMS
1,169,437 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,814 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,125 UART: [fwproc] Wait for Commands...
1,282,750 UART: [fwproc] Recv command 0x46574c44
1,283,483 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,139 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,567 >>> mbox cmd response: failed
1,183,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,573 >>> mbox cmd response: failed
1,183,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,979 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,030 UART:
192,392 UART: Running Caliptra ROM ...
193,493 UART:
193,637 UART: [state] CFI Enabled
264,822 UART: [state] LifecycleState = Unprovisioned
266,817 UART: [state] DebugLocked = No
269,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,264 UART: [kat] SHA2-256
442,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,448 UART: [kat] ++
453,900 UART: [kat] sha1
465,100 UART: [kat] SHA2-256
467,791 UART: [kat] SHA2-384
474,739 UART: [kat] SHA2-512-ACC
477,079 UART: [kat] ECC-384
2,767,079 UART: [kat] HMAC-384Kdf
2,780,034 UART: [kat] LMS
3,970,368 UART: [kat] --
3,975,452 UART: [cold-reset] ++
3,976,738 UART: [fht] Storing FHT @ 0x50003400
3,988,550 UART: [idev] ++
3,989,113 UART: [idev] CDI.KEYID = 6
3,990,127 UART: [idev] SUBJECT.KEYID = 7
3,991,292 UART: [idev] UDS.KEYID = 0
3,993,842 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,137,150 UART: [idev] Erasing UDS.KEYID = 0
7,329,552 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,202 UART: [idev] --
7,355,536 UART: [ldev] ++
7,356,124 UART: [ldev] CDI.KEYID = 6
7,357,066 UART: [ldev] SUBJECT.KEYID = 5
7,358,285 UART: [ldev] AUTHORITY.KEYID = 7
7,359,471 UART: [ldev] FE.KEYID = 1
7,404,682 UART: [ldev] Erasing FE.KEYID = 1
10,739,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,490 UART: [ldev] --
13,120,026 UART: [fwproc] Waiting for Commands...
13,123,225 UART: [fwproc] Received command 0x46574c44
13,125,412 UART: [fwproc] Received Image of size 113760 bytes
15,829,632 UART: ROM Fatal Error: 0x000B0034
15,833,134 >>> mbox cmd response: failed
15,833,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,872 >>> mbox cmd response: failed
15,834,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,834,437 >>> mbox cmd response: failed
Initializing fuses
2,060,946 writing to cptra_bootfsm_go
2,250,257 UART:
2,250,604 UART: Running Caliptra ROM ...
2,251,660 UART:
2,251,813 UART: [state] CFI Enabled
2,326,444 UART: [state] LifecycleState = Unprovisioned
2,328,384 UART: [state] DebugLocked = No
2,331,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,950 UART: [kat] SHA2-256
2,505,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,166 UART: [kat] ++
2,516,653 UART: [kat] sha1
2,528,409 UART: [kat] SHA2-256
2,531,102 UART: [kat] SHA2-384
2,536,128 UART: [kat] SHA2-512-ACC
2,538,480 UART: [kat] ECC-384
4,832,761 UART: [kat] HMAC-384Kdf
4,862,568 UART: [kat] LMS
6,052,870 UART: [kat] --
6,056,303 UART: [cold-reset] ++
6,057,813 UART: [fht] Storing FHT @ 0x50003400
6,069,762 UART: [idev] ++
6,070,385 UART: [idev] CDI.KEYID = 6
6,071,274 UART: [idev] SUBJECT.KEYID = 7
6,072,543 UART: [idev] UDS.KEYID = 0
6,074,912 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,218,149 UART: [idev] Erasing UDS.KEYID = 0
9,409,728 UART: [idev] Using Sha1 for KeyId Algorithm
9,431,280 UART: [idev] --
9,436,151 UART: [ldev] ++
9,436,724 UART: [ldev] CDI.KEYID = 6
9,437,692 UART: [ldev] SUBJECT.KEYID = 5
9,438,943 UART: [ldev] AUTHORITY.KEYID = 7
9,440,181 UART: [ldev] FE.KEYID = 1
9,486,042 UART: [ldev] Erasing FE.KEYID = 1
12,821,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,134,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,149,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,164,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,178,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,197,694 UART: [ldev] --
15,203,070 UART: [fwproc] Waiting for Commands...
15,206,466 UART: [fwproc] Received command 0x46574c44
15,208,649 UART: [fwproc] Received Image of size 113760 bytes
19,250,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,318,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,387,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,703,677 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,808,420 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,576,415 >>> mbox cmd response: failed
15,576,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,577,304 >>> mbox cmd response: failed
15,577,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,577,874 >>> mbox cmd response: failed
Initializing fuses
2,058,654 writing to cptra_bootfsm_go
5,847,233 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,901,325 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,383 UART:
192,756 UART: Running Caliptra ROM ...
193,897 UART:
603,613 UART: [state] CFI Enabled
615,228 UART: [state] LifecycleState = Unprovisioned
617,116 UART: [state] DebugLocked = No
619,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,556 UART: [kat] SHA2-256
794,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,866 UART: [kat] ++
805,503 UART: [kat] sha1
814,982 UART: [kat] SHA2-256
817,719 UART: [kat] SHA2-384
823,005 UART: [kat] SHA2-512-ACC
825,410 UART: [kat] ECC-384
3,106,922 UART: [kat] HMAC-384Kdf
3,117,386 UART: [kat] LMS
4,307,495 UART: [kat] --
4,311,406 UART: [cold-reset] ++
4,313,041 UART: [fht] Storing FHT @ 0x50003400
4,323,563 UART: [idev] ++
4,324,192 UART: [idev] CDI.KEYID = 6
4,325,312 UART: [idev] SUBJECT.KEYID = 7
4,326,439 UART: [idev] UDS.KEYID = 0
4,328,951 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,471,937 UART: [idev] Erasing UDS.KEYID = 0
7,613,497 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,281 UART: [idev] --
7,639,278 UART: [ldev] ++
7,639,849 UART: [ldev] CDI.KEYID = 6
7,640,817 UART: [ldev] SUBJECT.KEYID = 5
7,642,035 UART: [ldev] AUTHORITY.KEYID = 7
7,643,270 UART: [ldev] FE.KEYID = 1
7,654,943 UART: [ldev] Erasing FE.KEYID = 1
10,946,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,433 UART: [ldev] --
13,305,799 UART: [fwproc] Waiting for Commands...
13,308,551 UART: [fwproc] Received command 0x46574c44
13,310,791 UART: [fwproc] Received Image of size 113760 bytes
16,017,157 UART: ROM Fatal Error: 0x000B0034
16,020,665 >>> mbox cmd response: failed
16,021,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,411 >>> mbox cmd response: failed
16,021,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,969 >>> mbox cmd response: failed
Initializing fuses
2,055,631 writing to cptra_bootfsm_go
2,244,928 UART:
2,245,274 UART: Running Caliptra ROM ...
2,246,412 UART:
4,435,291 UART: [state] CFI Enabled
4,448,794 UART: [state] LifecycleState = Unprovisioned
4,450,704 UART: [state] DebugLocked = No
4,453,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,459,010 UART: [kat] SHA2-256
4,628,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,639,297 UART: [kat] ++
4,639,756 UART: [kat] sha1
4,649,455 UART: [kat] SHA2-256
4,652,145 UART: [kat] SHA2-384
4,657,483 UART: [kat] SHA2-512-ACC
4,659,860 UART: [kat] ECC-384
6,944,362 UART: [kat] HMAC-384Kdf
6,957,244 UART: [kat] LMS
8,147,399 UART: [kat] --
8,152,586 UART: [cold-reset] ++
8,153,928 UART: [fht] Storing FHT @ 0x50003400
8,166,712 UART: [idev] ++
8,167,271 UART: [idev] CDI.KEYID = 6
8,168,205 UART: [idev] SUBJECT.KEYID = 7
8,169,472 UART: [idev] UDS.KEYID = 0
8,171,813 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,314,830 UART: [idev] Erasing UDS.KEYID = 0
11,453,670 UART: [idev] Using Sha1 for KeyId Algorithm
11,474,949 UART: [idev] --
11,479,210 UART: [ldev] ++
11,479,781 UART: [ldev] CDI.KEYID = 6
11,480,768 UART: [ldev] SUBJECT.KEYID = 5
11,481,980 UART: [ldev] AUTHORITY.KEYID = 7
11,483,216 UART: [ldev] FE.KEYID = 1
11,491,786 UART: [ldev] Erasing FE.KEYID = 1
14,783,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,074,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,088,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,103,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,118,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,136,210 UART: [ldev] --
17,141,260 UART: [fwproc] Waiting for Commands...
17,143,747 UART: [fwproc] Received command 0x46574c44
17,145,947 UART: [fwproc] Received Image of size 113760 bytes
21,196,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,273,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,342,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,658,182 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
4,129,145 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,772,047 >>> mbox cmd response: failed
15,772,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,772,979 >>> mbox cmd response: failed
15,773,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,773,573 >>> mbox cmd response: failed
Initializing fuses
2,055,702 writing to cptra_bootfsm_go
8,221,009 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,153,962 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,123 UART:
192,514 UART: Running Caliptra ROM ...
193,746 UART:
193,907 UART: [state] CFI Enabled
264,102 UART: [state] LifecycleState = Unprovisioned
266,006 UART: [state] DebugLocked = No
268,262 UART: [state] WD Timer not started. Device not locked for debugging
271,606 UART: [kat] SHA2-256
450,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,310 UART: [kat] ++
462,888 UART: [kat] sha1
474,261 UART: [kat] SHA2-256
477,325 UART: [kat] SHA2-384
482,760 UART: [kat] SHA2-512-ACC
485,692 UART: [kat] ECC-384
2,947,207 UART: [kat] HMAC-384Kdf
2,972,461 UART: [kat] LMS
3,501,893 UART: [kat] --
3,506,722 UART: [cold-reset] ++
3,509,253 UART: [fht] FHT @ 0x50003400
3,520,556 UART: [idev] ++
3,521,130 UART: [idev] CDI.KEYID = 6
3,522,191 UART: [idev] SUBJECT.KEYID = 7
3,523,293 UART: [idev] UDS.KEYID = 0
3,525,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,403 UART: [idev] Erasing UDS.KEYID = 0
6,027,554 UART: [idev] Sha1 KeyId Algorithm
6,051,325 UART: [idev] --
6,055,264 UART: [ldev] ++
6,055,837 UART: [ldev] CDI.KEYID = 6
6,056,748 UART: [ldev] SUBJECT.KEYID = 5
6,057,914 UART: [ldev] AUTHORITY.KEYID = 7
6,059,146 UART: [ldev] FE.KEYID = 1
6,100,868 UART: [ldev] Erasing FE.KEYID = 1
8,605,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,721 UART: [ldev] --
10,415,604 UART: [fwproc] Wait for Commands...
10,417,168 UART: [fwproc] Recv command 0x46574c44
10,419,267 UART: [fwproc] Recv'd Img size: 114084 bytes
12,467,704 UART: ROM Fatal Error: 0x000B0034
12,470,829 >>> mbox cmd response: failed
12,471,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,584 >>> mbox cmd response: failed
12,471,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,182 >>> mbox cmd response: failed
Initializing fuses
2,058,551 writing to cptra_bootfsm_go
2,247,857 UART:
2,248,229 UART: Running Caliptra ROM ...
2,249,277 UART:
2,249,437 UART: [state] CFI Enabled
2,319,255 UART: [state] LifecycleState = Unprovisioned
2,321,138 UART: [state] DebugLocked = No
2,324,067 UART: [state] WD Timer not started. Device not locked for debugging
2,327,447 UART: [kat] SHA2-256
2,506,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,146 UART: [kat] ++
2,518,608 UART: [kat] sha1
2,530,518 UART: [kat] SHA2-256
2,533,559 UART: [kat] SHA2-384
2,539,983 UART: [kat] SHA2-512-ACC
2,542,924 UART: [kat] ECC-384
5,004,657 UART: [kat] HMAC-384Kdf
5,020,012 UART: [kat] LMS
5,549,463 UART: [kat] --
5,555,691 UART: [cold-reset] ++
5,558,038 UART: [fht] FHT @ 0x50003400
5,568,275 UART: [idev] ++
5,568,842 UART: [idev] CDI.KEYID = 6
5,569,723 UART: [idev] SUBJECT.KEYID = 7
5,570,992 UART: [idev] UDS.KEYID = 0
5,573,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,716,833 UART: [idev] Erasing UDS.KEYID = 0
8,075,428 UART: [idev] Sha1 KeyId Algorithm
8,099,737 UART: [idev] --
8,103,712 UART: [ldev] ++
8,104,285 UART: [ldev] CDI.KEYID = 6
8,105,225 UART: [ldev] SUBJECT.KEYID = 5
8,106,301 UART: [ldev] AUTHORITY.KEYID = 7
8,107,643 UART: [ldev] FE.KEYID = 1
8,147,432 UART: [ldev] Erasing FE.KEYID = 1
10,652,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,714 UART: [ldev] --
12,460,691 UART: [fwproc] Wait for Commands...
12,463,760 UART: [fwproc] Recv command 0x46574c44
12,465,802 UART: [fwproc] Recv'd Img size: 114084 bytes
15,867,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,941,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,010,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,327,981 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,384,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,250,622 >>> mbox cmd response: failed
12,251,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,549 >>> mbox cmd response: failed
12,251,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,252,110 >>> mbox cmd response: failed
Initializing fuses
2,057,893 writing to cptra_bootfsm_go
5,423,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,111,447 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,721 UART:
193,065 UART: Running Caliptra ROM ...
194,183 UART:
603,977 UART: [state] CFI Enabled
616,863 UART: [state] LifecycleState = Unprovisioned
618,758 UART: [state] DebugLocked = No
621,210 UART: [state] WD Timer not started. Device not locked for debugging
624,435 UART: [kat] SHA2-256
803,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,113 UART: [kat] ++
815,657 UART: [kat] sha1
826,972 UART: [kat] SHA2-256
830,020 UART: [kat] SHA2-384
835,667 UART: [kat] SHA2-512-ACC
838,653 UART: [kat] ECC-384
3,279,480 UART: [kat] HMAC-384Kdf
3,291,598 UART: [kat] LMS
3,821,116 UART: [kat] --
3,827,611 UART: [cold-reset] ++
3,829,820 UART: [fht] FHT @ 0x50003400
3,841,283 UART: [idev] ++
3,841,854 UART: [idev] CDI.KEYID = 6
3,842,791 UART: [idev] SUBJECT.KEYID = 7
3,844,003 UART: [idev] UDS.KEYID = 0
3,846,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,912 UART: [idev] Erasing UDS.KEYID = 0
6,317,332 UART: [idev] Sha1 KeyId Algorithm
6,340,341 UART: [idev] --
6,344,924 UART: [ldev] ++
6,345,489 UART: [ldev] CDI.KEYID = 6
6,346,402 UART: [ldev] SUBJECT.KEYID = 5
6,347,565 UART: [ldev] AUTHORITY.KEYID = 7
6,348,795 UART: [ldev] FE.KEYID = 1
6,359,979 UART: [ldev] Erasing FE.KEYID = 1
8,835,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,681 UART: [ldev] --
10,625,842 UART: [fwproc] Wait for Commands...
10,628,536 UART: [fwproc] Recv command 0x46574c44
10,630,642 UART: [fwproc] Recv'd Img size: 114084 bytes
12,680,774 UART: ROM Fatal Error: 0x000B0034
12,683,887 >>> mbox cmd response: failed
12,684,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,530 >>> mbox cmd response: failed
12,684,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,685,197 >>> mbox cmd response: failed
Initializing fuses
2,058,088 writing to cptra_bootfsm_go
2,247,393 UART:
2,247,759 UART: Running Caliptra ROM ...
2,249,007 UART:
7,764,049 UART: [state] CFI Enabled
7,775,619 UART: [state] LifecycleState = Unprovisioned
7,777,505 UART: [state] DebugLocked = No
7,779,710 UART: [state] WD Timer not started. Device not locked for debugging
7,783,307 UART: [kat] SHA2-256
7,962,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,973,986 UART: [kat] ++
7,974,531 UART: [kat] sha1
7,986,186 UART: [kat] SHA2-256
7,989,251 UART: [kat] SHA2-384
7,996,214 UART: [kat] SHA2-512-ACC
7,999,157 UART: [kat] ECC-384
10,441,481 UART: [kat] HMAC-384Kdf
10,454,674 UART: [kat] LMS
10,984,181 UART: [kat] --
10,988,233 UART: [cold-reset] ++
10,990,132 UART: [fht] FHT @ 0x50003400
11,002,360 UART: [idev] ++
11,002,927 UART: [idev] CDI.KEYID = 6
11,003,947 UART: [idev] SUBJECT.KEYID = 7
11,005,052 UART: [idev] UDS.KEYID = 0
11,007,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,150,819 UART: [idev] Erasing UDS.KEYID = 0
13,480,285 UART: [idev] Sha1 KeyId Algorithm
13,503,347 UART: [idev] --
13,507,988 UART: [ldev] ++
13,508,560 UART: [ldev] CDI.KEYID = 6
13,509,467 UART: [ldev] SUBJECT.KEYID = 5
13,510,682 UART: [ldev] AUTHORITY.KEYID = 7
13,511,913 UART: [ldev] FE.KEYID = 1
13,523,017 UART: [ldev] Erasing FE.KEYID = 1
15,996,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,714,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,730,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,781,385 UART: [ldev] --
17,786,333 UART: [fwproc] Wait for Commands...
17,788,442 UART: [fwproc] Recv command 0x46574c44
17,790,539 UART: [fwproc] Recv'd Img size: 114084 bytes
21,190,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,260,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,328,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,646,687 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,694,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,459,841 >>> mbox cmd response: failed
12,460,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,460,720 >>> mbox cmd response: failed
12,461,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,461,316 >>> mbox cmd response: failed
Initializing fuses
2,059,572 writing to cptra_bootfsm_go
11,097,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,656,155 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,195 UART:
192,560 UART: Running Caliptra ROM ...
193,768 UART:
193,923 UART: [state] CFI Enabled
262,777 UART: [state] LifecycleState = Unprovisioned
265,137 UART: [state] DebugLocked = No
267,461 UART: [state] WD Timer not started. Device not locked for debugging
272,232 UART: [kat] SHA2-256
462,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,894 UART: [kat] ++
473,340 UART: [kat] sha1
485,029 UART: [kat] SHA2-256
488,052 UART: [kat] SHA2-384
493,606 UART: [kat] SHA2-512-ACC
496,222 UART: [kat] ECC-384
2,947,190 UART: [kat] HMAC-384Kdf
2,972,106 UART: [kat] LMS
3,503,886 UART: [kat] --
3,508,225 UART: [cold-reset] ++
3,510,707 UART: [fht] FHT @ 0x50003400
3,523,427 UART: [idev] ++
3,524,113 UART: [idev] CDI.KEYID = 6
3,525,088 UART: [idev] SUBJECT.KEYID = 7
3,526,256 UART: [idev] UDS.KEYID = 0
3,528,752 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,505 UART: [idev] Erasing UDS.KEYID = 0
6,030,628 UART: [idev] Sha1 KeyId Algorithm
6,053,499 UART: [idev] --
6,058,908 UART: [ldev] ++
6,059,593 UART: [ldev] CDI.KEYID = 6
6,060,509 UART: [ldev] SUBJECT.KEYID = 5
6,061,681 UART: [ldev] AUTHORITY.KEYID = 7
6,062,882 UART: [ldev] FE.KEYID = 1
6,098,924 UART: [ldev] Erasing FE.KEYID = 1
8,605,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,544 UART: [ldev] --
10,412,158 UART: [fwproc] Wait for Commands...
10,414,687 UART: [fwproc] Recv command 0x46574c44
10,417,003 UART: [fwproc] Recv'd Img size: 114084 bytes
12,503,097 UART: ROM Fatal Error: 0x000B0034
12,506,768 >>> mbox cmd response: failed
12,507,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,546 >>> mbox cmd response: failed
12,507,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,138 >>> mbox cmd response: failed
Initializing fuses
2,056,024 writing to cptra_bootfsm_go
2,245,381 UART:
2,245,741 UART: Running Caliptra ROM ...
2,246,881 UART:
2,247,054 UART: [state] CFI Enabled
2,305,883 UART: [state] LifecycleState = Unprovisioned
2,308,273 UART: [state] DebugLocked = No
2,310,464 UART: [state] WD Timer not started. Device not locked for debugging
2,315,614 UART: [kat] SHA2-256
2,505,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,257 UART: [kat] ++
2,516,801 UART: [kat] sha1
2,528,095 UART: [kat] SHA2-256
2,531,141 UART: [kat] SHA2-384
2,536,973 UART: [kat] SHA2-512-ACC
2,539,547 UART: [kat] ECC-384
4,988,600 UART: [kat] HMAC-384Kdf
5,012,144 UART: [kat] LMS
5,543,915 UART: [kat] --
5,549,174 UART: [cold-reset] ++
5,551,660 UART: [fht] FHT @ 0x50003400
5,562,052 UART: [idev] ++
5,562,730 UART: [idev] CDI.KEYID = 6
5,563,668 UART: [idev] SUBJECT.KEYID = 7
5,564,878 UART: [idev] UDS.KEYID = 0
5,567,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,710,788 UART: [idev] Erasing UDS.KEYID = 0
8,065,036 UART: [idev] Sha1 KeyId Algorithm
8,086,529 UART: [idev] --
8,089,910 UART: [ldev] ++
8,090,600 UART: [ldev] CDI.KEYID = 6
8,091,484 UART: [ldev] SUBJECT.KEYID = 5
8,092,700 UART: [ldev] AUTHORITY.KEYID = 7
8,093,934 UART: [ldev] FE.KEYID = 1
8,139,285 UART: [ldev] Erasing FE.KEYID = 1
10,646,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,519 UART: [ldev] --
12,454,199 UART: [fwproc] Wait for Commands...
12,455,708 UART: [fwproc] Recv command 0x46574c44
12,457,974 UART: [fwproc] Recv'd Img size: 114084 bytes
15,895,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,978,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,094,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,635,488 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,439,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,328,791 >>> mbox cmd response: failed
12,329,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,629 >>> mbox cmd response: failed
12,329,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,330,191 >>> mbox cmd response: failed
Initializing fuses
2,060,738 writing to cptra_bootfsm_go
5,488,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,778,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,512 UART:
192,879 UART: Running Caliptra ROM ...
193,992 UART:
603,617 UART: [state] CFI Enabled
617,756 UART: [state] LifecycleState = Unprovisioned
620,132 UART: [state] DebugLocked = No
622,164 UART: [state] WD Timer not started. Device not locked for debugging
626,112 UART: [kat] SHA2-256
815,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,801 UART: [kat] ++
827,307 UART: [kat] sha1
839,268 UART: [kat] SHA2-256
842,299 UART: [kat] SHA2-384
847,468 UART: [kat] SHA2-512-ACC
850,086 UART: [kat] ECC-384
3,291,200 UART: [kat] HMAC-384Kdf
3,304,192 UART: [kat] LMS
3,836,066 UART: [kat] --
3,840,930 UART: [cold-reset] ++
3,842,426 UART: [fht] FHT @ 0x50003400
3,853,786 UART: [idev] ++
3,854,506 UART: [idev] CDI.KEYID = 6
3,855,450 UART: [idev] SUBJECT.KEYID = 7
3,856,666 UART: [idev] UDS.KEYID = 0
3,859,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,603 UART: [idev] Erasing UDS.KEYID = 0
6,332,115 UART: [idev] Sha1 KeyId Algorithm
6,353,971 UART: [idev] --
6,359,773 UART: [ldev] ++
6,360,456 UART: [ldev] CDI.KEYID = 6
6,361,339 UART: [ldev] SUBJECT.KEYID = 5
6,362,546 UART: [ldev] AUTHORITY.KEYID = 7
6,363,783 UART: [ldev] FE.KEYID = 1
6,374,457 UART: [ldev] Erasing FE.KEYID = 1
8,852,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,043 UART: [ldev] --
10,641,175 UART: [fwproc] Wait for Commands...
10,644,031 UART: [fwproc] Recv command 0x46574c44
10,646,296 UART: [fwproc] Recv'd Img size: 114084 bytes
12,737,134 UART: ROM Fatal Error: 0x000B0034
12,740,822 >>> mbox cmd response: failed
12,741,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,508 >>> mbox cmd response: failed
12,741,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,066 >>> mbox cmd response: failed
Initializing fuses
2,054,287 writing to cptra_bootfsm_go
2,243,575 UART:
2,243,925 UART: Running Caliptra ROM ...
2,245,066 UART:
7,706,760 UART: [state] CFI Enabled
7,718,543 UART: [state] LifecycleState = Unprovisioned
7,720,889 UART: [state] DebugLocked = No
7,723,652 UART: [state] WD Timer not started. Device not locked for debugging
7,727,518 UART: [kat] SHA2-256
7,917,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,928,175 UART: [kat] ++
7,928,708 UART: [kat] sha1
7,939,811 UART: [kat] SHA2-256
7,942,832 UART: [kat] SHA2-384
7,950,333 UART: [kat] SHA2-512-ACC
7,952,906 UART: [kat] ECC-384
10,396,514 UART: [kat] HMAC-384Kdf
10,408,991 UART: [kat] LMS
10,940,847 UART: [kat] --
10,947,018 UART: [cold-reset] ++
10,948,530 UART: [fht] FHT @ 0x50003400
10,959,524 UART: [idev] ++
10,960,239 UART: [idev] CDI.KEYID = 6
10,961,124 UART: [idev] SUBJECT.KEYID = 7
10,962,362 UART: [idev] UDS.KEYID = 0
10,964,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,108,019 UART: [idev] Erasing UDS.KEYID = 0
13,436,878 UART: [idev] Sha1 KeyId Algorithm
13,459,144 UART: [idev] --
13,463,453 UART: [ldev] ++
13,464,131 UART: [ldev] CDI.KEYID = 6
13,465,071 UART: [ldev] SUBJECT.KEYID = 5
13,466,225 UART: [ldev] AUTHORITY.KEYID = 7
13,467,459 UART: [ldev] FE.KEYID = 1
13,476,244 UART: [ldev] Erasing FE.KEYID = 1
15,950,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,672,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,687,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,702,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,718,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,739,455 UART: [ldev] --
17,745,481 UART: [fwproc] Wait for Commands...
17,747,634 UART: [fwproc] Recv command 0x46574c44
17,749,889 UART: [fwproc] Recv'd Img size: 114084 bytes
21,193,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,266,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,383,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,924,278 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,755,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,512,296 >>> mbox cmd response: failed
12,512,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,204 >>> mbox cmd response: failed
12,513,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,764 >>> mbox cmd response: failed
Initializing fuses
2,055,524 writing to cptra_bootfsm_go
11,107,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,292,457 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,767 UART: [kat] SHA2-256
881,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,813 UART: [kat] ++
885,965 UART: [kat] sha1
890,213 UART: [kat] SHA2-256
892,151 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,317 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,664 UART: [idev] ++
1,479,832 UART: [idev] CDI.KEYID = 6
1,480,192 UART: [idev] SUBJECT.KEYID = 7
1,480,616 UART: [idev] UDS.KEYID = 0
1,480,961 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,328 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,514 UART: [idev] --
1,514,505 UART: [ldev] ++
1,514,673 UART: [ldev] CDI.KEYID = 6
1,515,036 UART: [ldev] SUBJECT.KEYID = 5
1,515,462 UART: [ldev] AUTHORITY.KEYID = 7
1,515,925 UART: [ldev] FE.KEYID = 1
1,521,095 UART: [ldev] Erasing FE.KEYID = 1
1,546,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,986 UART: [ldev] --
1,585,459 UART: [fwproc] Waiting for Commands...
1,586,282 UART: [fwproc] Received command 0x46574c44
1,587,073 UART: [fwproc] Received Image of size 114084 bytes
1,634,640 UART: ROM Fatal Error: 0x000B0034
1,635,797 >>> mbox cmd response: failed
1,635,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,803 >>> mbox cmd response: failed
1,635,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,623 UART: [kat] SHA2-256
892,561 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
903,200 UART: [kat] HMAC-384Kdf
907,824 UART: [kat] LMS
1,476,020 UART: [kat] --
1,476,599 UART: [cold-reset] ++
1,476,927 UART: [fht] Storing FHT @ 0x50003400
1,479,526 UART: [idev] ++
1,479,694 UART: [idev] CDI.KEYID = 6
1,480,054 UART: [idev] SUBJECT.KEYID = 7
1,480,478 UART: [idev] UDS.KEYID = 0
1,480,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,022 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,418 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,521,145 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,876 UART: [ldev] --
1,585,263 UART: [fwproc] Waiting for Commands...
1,585,978 UART: [fwproc] Received command 0x46574c44
1,586,769 UART: [fwproc] Received Image of size 114084 bytes
2,881,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,491 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,579 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,572 >>> mbox cmd response: failed
1,487,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,578 >>> mbox cmd response: failed
1,487,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,577 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,283 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,376 UART: [kat] SHA2-256
892,314 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,286 UART: [fht] Storing FHT @ 0x50003400
1,480,063 UART: [idev] ++
1,480,231 UART: [idev] CDI.KEYID = 6
1,480,591 UART: [idev] SUBJECT.KEYID = 7
1,481,015 UART: [idev] UDS.KEYID = 0
1,481,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,089 UART: [idev] Erasing UDS.KEYID = 0
1,505,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,521,730 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,359 UART: [ldev] --
1,586,644 UART: [fwproc] Waiting for Commands...
1,587,331 UART: [fwproc] Received command 0x46574c44
1,588,122 UART: [fwproc] Received Image of size 114084 bytes
1,635,893 UART: ROM Fatal Error: 0x000B0034
1,637,050 >>> mbox cmd response: failed
1,637,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,056 >>> mbox cmd response: failed
1,637,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,426 UART: [kat] SHA2-256
882,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,472 UART: [kat] ++
886,624 UART: [kat] sha1
890,650 UART: [kat] SHA2-256
892,588 UART: [kat] SHA2-384
895,149 UART: [kat] SHA2-512-ACC
897,050 UART: [kat] ECC-384
902,575 UART: [kat] HMAC-384Kdf
907,083 UART: [kat] LMS
1,475,279 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,532 UART: [fht] Storing FHT @ 0x50003400
1,479,257 UART: [idev] ++
1,479,425 UART: [idev] CDI.KEYID = 6
1,479,785 UART: [idev] SUBJECT.KEYID = 7
1,480,209 UART: [idev] UDS.KEYID = 0
1,480,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,605 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,193 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,521,856 UART: [ldev] Erasing FE.KEYID = 1
1,547,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,591 UART: [ldev] --
1,586,888 UART: [fwproc] Waiting for Commands...
1,587,657 UART: [fwproc] Received command 0x46574c44
1,588,448 UART: [fwproc] Received Image of size 114084 bytes
2,883,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,477 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,930 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,157 >>> mbox cmd response: failed
1,486,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,163 >>> mbox cmd response: failed
1,486,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,169 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,086 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Unprovisioned
85,303 UART: [state] DebugLocked = No
85,991 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
892,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,087 UART: [kat] ++
897,239 UART: [kat] sha1
901,467 UART: [kat] SHA2-256
903,407 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,606 UART: [kat] LMS
1,170,934 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,162 UART: [idev] ++
1,175,330 UART: [idev] CDI.KEYID = 6
1,175,690 UART: [idev] SUBJECT.KEYID = 7
1,176,114 UART: [idev] UDS.KEYID = 0
1,176,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,348 UART: [idev] Erasing UDS.KEYID = 0
1,202,251 UART: [idev] Sha1 KeyId Algorithm
1,210,629 UART: [idev] --
1,211,619 UART: [ldev] ++
1,211,787 UART: [ldev] CDI.KEYID = 6
1,212,150 UART: [ldev] SUBJECT.KEYID = 5
1,212,576 UART: [ldev] AUTHORITY.KEYID = 7
1,213,039 UART: [ldev] FE.KEYID = 1
1,218,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,235 UART: [ldev] --
1,283,594 UART: [fwproc] Wait for Commands...
1,284,390 UART: [fwproc] Recv command 0x46574c44
1,285,118 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,231 UART: ROM Fatal Error: 0x000B0034
1,334,388 >>> mbox cmd response: failed
1,334,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,394 >>> mbox cmd response: failed
1,334,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,400 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
893,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,517 UART: [kat] ++
897,669 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,172,087 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,072 UART: [idev] ++
1,175,240 UART: [idev] CDI.KEYID = 6
1,175,600 UART: [idev] SUBJECT.KEYID = 7
1,176,024 UART: [idev] UDS.KEYID = 0
1,176,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,319 UART: [idev] Sha1 KeyId Algorithm
1,209,713 UART: [idev] --
1,210,815 UART: [ldev] ++
1,210,983 UART: [ldev] CDI.KEYID = 6
1,211,346 UART: [ldev] SUBJECT.KEYID = 5
1,211,772 UART: [ldev] AUTHORITY.KEYID = 7
1,212,235 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,338 UART: [fwproc] Recv command 0x46574c44
1,284,066 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,105 >>> mbox cmd response: failed
1,188,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,111 >>> mbox cmd response: failed
1,188,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
893,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,806 UART: [kat] ++
897,958 UART: [kat] sha1
902,066 UART: [kat] SHA2-256
904,006 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
922,839 UART: [kat] LMS
1,171,167 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,652 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,485 UART: [idev] Erasing UDS.KEYID = 0
1,201,486 UART: [idev] Sha1 KeyId Algorithm
1,209,924 UART: [idev] --
1,211,024 UART: [ldev] ++
1,211,192 UART: [ldev] CDI.KEYID = 6
1,211,555 UART: [ldev] SUBJECT.KEYID = 5
1,211,981 UART: [ldev] AUTHORITY.KEYID = 7
1,212,444 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,050 UART: [ldev] --
1,283,387 UART: [fwproc] Wait for Commands...
1,283,965 UART: [fwproc] Recv command 0x46574c44
1,284,693 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,936 UART: ROM Fatal Error: 0x000B0034
1,333,093 >>> mbox cmd response: failed
1,333,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,099 >>> mbox cmd response: failed
1,333,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,823 UART: [kat] HMAC-384Kdf
923,481 UART: [kat] LMS
1,171,809 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,210,098 UART: [idev] --
1,211,248 UART: [ldev] ++
1,211,416 UART: [ldev] CDI.KEYID = 6
1,211,779 UART: [ldev] SUBJECT.KEYID = 5
1,212,205 UART: [ldev] AUTHORITY.KEYID = 7
1,212,668 UART: [ldev] FE.KEYID = 1
1,217,878 UART: [ldev] Erasing FE.KEYID = 1
1,243,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,488 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,760 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,503 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,187,750 >>> mbox cmd response: failed
1,187,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,756 >>> mbox cmd response: failed
1,187,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,620 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,327 UART: [kat] SHA2-256
901,267 UART: [kat] SHA2-384
903,972 UART: [kat] SHA2-512-ACC
905,873 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,284 UART: [kat] LMS
1,168,596 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,641 UART: [idev] ++
1,172,809 UART: [idev] CDI.KEYID = 6
1,173,170 UART: [idev] SUBJECT.KEYID = 7
1,173,595 UART: [idev] UDS.KEYID = 0
1,173,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,217 UART: [idev] Sha1 KeyId Algorithm
1,207,053 UART: [idev] --
1,208,162 UART: [ldev] ++
1,208,330 UART: [ldev] CDI.KEYID = 6
1,208,694 UART: [ldev] SUBJECT.KEYID = 5
1,209,121 UART: [ldev] AUTHORITY.KEYID = 7
1,209,584 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,280 UART: [ldev] --
1,280,700 UART: [fwproc] Wait for Commands...
1,281,437 UART: [fwproc] Recv command 0x46574c44
1,282,170 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,674 UART: ROM Fatal Error: 0x000B0034
1,330,831 >>> mbox cmd response: failed
1,330,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,837 >>> mbox cmd response: failed
1,330,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,174,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,198,659 UART: [idev] Sha1 KeyId Algorithm
1,207,371 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,502 UART: [fwproc] Wait for Commands...
1,281,241 UART: [fwproc] Recv command 0x46574c44
1,281,974 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,098 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,230 >>> mbox cmd response: failed
1,181,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,236 >>> mbox cmd response: failed
1,181,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,976 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,089 UART: [kat] SHA2-512-ACC
906,990 UART: [kat] ECC-384
916,655 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,222 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,174,912 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,199,934 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,845 UART: [fwproc] Wait for Commands...
1,283,468 UART: [fwproc] Recv command 0x46574c44
1,284,201 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,454 UART: ROM Fatal Error: 0x000B0034
1,331,611 >>> mbox cmd response: failed
1,331,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,617 >>> mbox cmd response: failed
1,331,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,174,316 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,359 UART: [ldev] ++
1,209,527 UART: [ldev] CDI.KEYID = 6
1,209,891 UART: [ldev] SUBJECT.KEYID = 5
1,210,318 UART: [ldev] AUTHORITY.KEYID = 7
1,210,781 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,761 UART: [fwproc] Wait for Commands...
1,282,370 UART: [fwproc] Recv command 0x46574c44
1,283,103 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,365 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,379 >>> mbox cmd response: failed
1,184,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,385 >>> mbox cmd response: failed
1,184,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,867 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,162 UART:
192,506 UART: Running Caliptra ROM ...
193,683 UART:
193,836 UART: [state] CFI Enabled
263,572 UART: [state] LifecycleState = Unprovisioned
265,553 UART: [state] DebugLocked = No
268,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,807 UART: [kat] SHA2-256
443,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,025 UART: [kat] ++
454,501 UART: [kat] sha1
465,780 UART: [kat] SHA2-256
468,474 UART: [kat] SHA2-384
475,259 UART: [kat] SHA2-512-ACC
477,598 UART: [kat] ECC-384
2,763,369 UART: [kat] HMAC-384Kdf
2,797,089 UART: [kat] LMS
3,987,418 UART: [kat] --
3,993,158 UART: [cold-reset] ++
3,994,716 UART: [fht] Storing FHT @ 0x50003400
4,005,926 UART: [idev] ++
4,006,556 UART: [idev] CDI.KEYID = 6
4,007,456 UART: [idev] SUBJECT.KEYID = 7
4,008,684 UART: [idev] UDS.KEYID = 0
4,011,224 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,084 UART: [idev] Erasing UDS.KEYID = 0
7,345,694 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,804 UART: [idev] --
7,370,726 UART: [ldev] ++
7,371,298 UART: [ldev] CDI.KEYID = 6
7,372,245 UART: [ldev] SUBJECT.KEYID = 5
7,373,422 UART: [ldev] AUTHORITY.KEYID = 7
7,374,713 UART: [ldev] FE.KEYID = 1
7,418,619 UART: [ldev] Erasing FE.KEYID = 1
10,751,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,688 UART: [ldev] --
13,114,891 UART: [fwproc] Waiting for Commands...
13,117,692 UART: [fwproc] Received command 0x46574c44
13,119,877 UART: [fwproc] Received Image of size 113760 bytes
15,831,713 UART: ROM Fatal Error: 0x000B0017
15,835,168 >>> mbox cmd response: failed
15,835,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,835,861 >>> mbox cmd response: failed
15,836,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,836,538 >>> mbox cmd response: failed
Initializing fuses
2,061,360 writing to cptra_bootfsm_go
2,250,683 UART:
2,251,032 UART: Running Caliptra ROM ...
2,252,171 UART:
2,252,336 UART: [state] CFI Enabled
2,320,167 UART: [state] LifecycleState = Unprovisioned
2,322,093 UART: [state] DebugLocked = No
2,324,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,043 UART: [kat] SHA2-256
2,499,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,198 UART: [kat] ++
2,510,686 UART: [kat] sha1
2,521,469 UART: [kat] SHA2-256
2,524,178 UART: [kat] SHA2-384
2,529,953 UART: [kat] SHA2-512-ACC
2,532,302 UART: [kat] ECC-384
4,825,155 UART: [kat] HMAC-384Kdf
4,855,371 UART: [kat] LMS
6,045,684 UART: [kat] --
6,049,807 UART: [cold-reset] ++
6,051,854 UART: [fht] Storing FHT @ 0x50003400
6,064,152 UART: [idev] ++
6,064,761 UART: [idev] CDI.KEYID = 6
6,065,700 UART: [idev] SUBJECT.KEYID = 7
6,066,929 UART: [idev] UDS.KEYID = 0
6,069,155 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,212,203 UART: [idev] Erasing UDS.KEYID = 0
9,404,129 UART: [idev] Using Sha1 for KeyId Algorithm
9,426,106 UART: [idev] --
9,430,251 UART: [ldev] ++
9,430,827 UART: [ldev] CDI.KEYID = 6
9,431,799 UART: [ldev] SUBJECT.KEYID = 5
9,433,005 UART: [ldev] AUTHORITY.KEYID = 7
9,434,255 UART: [ldev] FE.KEYID = 1
9,480,448 UART: [ldev] Erasing FE.KEYID = 1
12,811,277 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,953 UART: [ldev] --
15,173,866 UART: [fwproc] Waiting for Commands...
15,176,072 UART: [fwproc] Received command 0x46574c44
15,178,346 UART: [fwproc] Received Image of size 113760 bytes
19,220,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,673,450 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,784,462 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,553,185 >>> mbox cmd response: failed
15,553,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,554,250 >>> mbox cmd response: failed
15,554,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,554,807 >>> mbox cmd response: failed
Initializing fuses
2,059,417 writing to cptra_bootfsm_go
5,847,579 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,912,586 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,519 UART:
192,883 UART: Running Caliptra ROM ...
194,013 UART:
603,715 UART: [state] CFI Enabled
614,687 UART: [state] LifecycleState = Unprovisioned
616,626 UART: [state] DebugLocked = No
618,871 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,492 UART: [kat] SHA2-256
794,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,814 UART: [kat] ++
805,286 UART: [kat] sha1
817,353 UART: [kat] SHA2-256
820,077 UART: [kat] SHA2-384
824,720 UART: [kat] SHA2-512-ACC
827,069 UART: [kat] ECC-384
3,112,301 UART: [kat] HMAC-384Kdf
3,123,688 UART: [kat] LMS
4,313,809 UART: [kat] --
4,318,406 UART: [cold-reset] ++
4,320,683 UART: [fht] Storing FHT @ 0x50003400
4,332,382 UART: [idev] ++
4,332,956 UART: [idev] CDI.KEYID = 6
4,333,868 UART: [idev] SUBJECT.KEYID = 7
4,335,239 UART: [idev] UDS.KEYID = 0
4,337,825 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,194 UART: [idev] Erasing UDS.KEYID = 0
7,621,145 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,976 UART: [idev] --
7,648,881 UART: [ldev] ++
7,649,453 UART: [ldev] CDI.KEYID = 6
7,650,421 UART: [ldev] SUBJECT.KEYID = 5
7,651,635 UART: [ldev] AUTHORITY.KEYID = 7
7,652,869 UART: [ldev] FE.KEYID = 1
7,665,404 UART: [ldev] Erasing FE.KEYID = 1
10,953,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,084 UART: [ldev] --
13,313,612 UART: [fwproc] Waiting for Commands...
13,316,742 UART: [fwproc] Received command 0x46574c44
13,318,932 UART: [fwproc] Received Image of size 113760 bytes
16,026,223 UART: ROM Fatal Error: 0x000B0017
16,029,736 >>> mbox cmd response: failed
16,030,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,503 >>> mbox cmd response: failed
16,030,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,073 >>> mbox cmd response: failed
Initializing fuses
2,063,943 writing to cptra_bootfsm_go
2,253,275 UART:
2,253,615 UART: Running Caliptra ROM ...
2,254,671 UART:
4,424,316 UART: [state] CFI Enabled
4,438,186 UART: [state] LifecycleState = Unprovisioned
4,440,092 UART: [state] DebugLocked = No
4,443,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,447,818 UART: [kat] SHA2-256
4,617,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,066 UART: [kat] ++
4,628,529 UART: [kat] sha1
4,640,229 UART: [kat] SHA2-256
4,642,928 UART: [kat] SHA2-384
4,648,161 UART: [kat] SHA2-512-ACC
4,650,529 UART: [kat] ECC-384
6,936,604 UART: [kat] HMAC-384Kdf
6,948,496 UART: [kat] LMS
8,138,563 UART: [kat] --
8,142,841 UART: [cold-reset] ++
8,144,201 UART: [fht] Storing FHT @ 0x50003400
8,154,348 UART: [idev] ++
8,154,917 UART: [idev] CDI.KEYID = 6
8,155,889 UART: [idev] SUBJECT.KEYID = 7
8,157,102 UART: [idev] UDS.KEYID = 0
8,159,476 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,302,332 UART: [idev] Erasing UDS.KEYID = 0
11,442,805 UART: [idev] Using Sha1 for KeyId Algorithm
11,463,925 UART: [idev] --
11,468,240 UART: [ldev] ++
11,468,818 UART: [ldev] CDI.KEYID = 6
11,469,799 UART: [ldev] SUBJECT.KEYID = 5
11,470,997 UART: [ldev] AUTHORITY.KEYID = 7
11,472,236 UART: [ldev] FE.KEYID = 1
11,484,936 UART: [ldev] Erasing FE.KEYID = 1
14,775,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,097,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,131,316 UART: [ldev] --
17,136,317 UART: [fwproc] Waiting for Commands...
17,139,547 UART: [fwproc] Received command 0x46574c44
17,141,731 UART: [fwproc] Received Image of size 113760 bytes
21,190,667 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,267,163 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,336,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,652,625 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,130,117 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,764,936 >>> mbox cmd response: failed
15,765,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,893 >>> mbox cmd response: failed
15,766,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,401 >>> mbox cmd response: failed
Initializing fuses
2,055,749 writing to cptra_bootfsm_go
8,220,908 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,156,996 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,144 UART:
192,540 UART: Running Caliptra ROM ...
193,677 UART:
193,824 UART: [state] CFI Enabled
261,317 UART: [state] LifecycleState = Unprovisioned
263,143 UART: [state] DebugLocked = No
264,683 UART: [state] WD Timer not started. Device not locked for debugging
269,145 UART: [kat] SHA2-256
448,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,853 UART: [kat] ++
460,306 UART: [kat] sha1
470,586 UART: [kat] SHA2-256
473,642 UART: [kat] SHA2-384
479,132 UART: [kat] SHA2-512-ACC
482,067 UART: [kat] ECC-384
2,946,184 UART: [kat] HMAC-384Kdf
2,969,466 UART: [kat] LMS
3,498,878 UART: [kat] --
3,503,759 UART: [cold-reset] ++
3,506,297 UART: [fht] FHT @ 0x50003400
3,517,386 UART: [idev] ++
3,517,954 UART: [idev] CDI.KEYID = 6
3,518,862 UART: [idev] SUBJECT.KEYID = 7
3,520,074 UART: [idev] UDS.KEYID = 0
3,522,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,342 UART: [idev] Erasing UDS.KEYID = 0
6,026,394 UART: [idev] Sha1 KeyId Algorithm
6,050,213 UART: [idev] --
6,054,648 UART: [ldev] ++
6,055,219 UART: [ldev] CDI.KEYID = 6
6,056,106 UART: [ldev] SUBJECT.KEYID = 5
6,057,321 UART: [ldev] AUTHORITY.KEYID = 7
6,058,554 UART: [ldev] FE.KEYID = 1
6,095,634 UART: [ldev] Erasing FE.KEYID = 1
8,598,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,437 UART: [ldev] --
10,407,387 UART: [fwproc] Wait for Commands...
10,409,535 UART: [fwproc] Recv command 0x46574c44
10,411,628 UART: [fwproc] Recv'd Img size: 114084 bytes
12,460,929 UART: ROM Fatal Error: 0x000B0017
12,464,059 >>> mbox cmd response: failed
12,464,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,464,726 >>> mbox cmd response: failed
12,464,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,465,329 >>> mbox cmd response: failed
Initializing fuses
2,057,169 writing to cptra_bootfsm_go
2,246,444 UART:
2,246,797 UART: Running Caliptra ROM ...
2,247,840 UART:
2,247,991 UART: [state] CFI Enabled
2,319,515 UART: [state] LifecycleState = Unprovisioned
2,321,400 UART: [state] DebugLocked = No
2,323,661 UART: [state] WD Timer not started. Device not locked for debugging
2,327,569 UART: [kat] SHA2-256
2,506,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,259 UART: [kat] ++
2,518,800 UART: [kat] sha1
2,528,824 UART: [kat] SHA2-256
2,531,898 UART: [kat] SHA2-384
2,537,354 UART: [kat] SHA2-512-ACC
2,540,294 UART: [kat] ECC-384
4,982,955 UART: [kat] HMAC-384Kdf
5,007,504 UART: [kat] LMS
5,536,939 UART: [kat] --
5,541,739 UART: [cold-reset] ++
5,543,666 UART: [fht] FHT @ 0x50003400
5,555,832 UART: [idev] ++
5,556,402 UART: [idev] CDI.KEYID = 6
5,557,285 UART: [idev] SUBJECT.KEYID = 7
5,558,499 UART: [idev] UDS.KEYID = 0
5,560,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,704,355 UART: [idev] Erasing UDS.KEYID = 0
8,063,051 UART: [idev] Sha1 KeyId Algorithm
8,085,210 UART: [idev] --
8,089,383 UART: [ldev] ++
8,089,961 UART: [ldev] CDI.KEYID = 6
8,090,847 UART: [ldev] SUBJECT.KEYID = 5
8,092,060 UART: [ldev] AUTHORITY.KEYID = 7
8,093,300 UART: [ldev] FE.KEYID = 1
8,135,410 UART: [ldev] Erasing FE.KEYID = 1
10,639,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,580 UART: [ldev] --
12,449,451 UART: [fwproc] Wait for Commands...
12,451,784 UART: [fwproc] Recv command 0x46574c44
12,453,831 UART: [fwproc] Recv'd Img size: 114084 bytes
15,851,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,924,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,993,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,311,111 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,382,417 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,240,653 >>> mbox cmd response: failed
12,241,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,241,600 >>> mbox cmd response: failed
12,241,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,242,155 >>> mbox cmd response: failed
Initializing fuses
2,057,096 writing to cptra_bootfsm_go
5,413,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,096,542 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,538 UART:
192,919 UART: Running Caliptra ROM ...
194,136 UART:
603,598 UART: [state] CFI Enabled
617,163 UART: [state] LifecycleState = Unprovisioned
619,043 UART: [state] DebugLocked = No
621,884 UART: [state] WD Timer not started. Device not locked for debugging
624,847 UART: [kat] SHA2-256
803,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,511 UART: [kat] ++
816,046 UART: [kat] sha1
827,742 UART: [kat] SHA2-256
830,741 UART: [kat] SHA2-384
836,966 UART: [kat] SHA2-512-ACC
839,912 UART: [kat] ECC-384
3,283,162 UART: [kat] HMAC-384Kdf
3,294,576 UART: [kat] LMS
3,824,084 UART: [kat] --
3,827,005 UART: [cold-reset] ++
3,828,130 UART: [fht] FHT @ 0x50003400
3,838,787 UART: [idev] ++
3,839,360 UART: [idev] CDI.KEYID = 6
3,840,267 UART: [idev] SUBJECT.KEYID = 7
3,841,483 UART: [idev] UDS.KEYID = 0
3,843,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,425 UART: [idev] Erasing UDS.KEYID = 0
6,317,319 UART: [idev] Sha1 KeyId Algorithm
6,340,834 UART: [idev] --
6,343,753 UART: [ldev] ++
6,344,323 UART: [ldev] CDI.KEYID = 6
6,345,231 UART: [ldev] SUBJECT.KEYID = 5
6,346,414 UART: [ldev] AUTHORITY.KEYID = 7
6,347,648 UART: [ldev] FE.KEYID = 1
6,358,267 UART: [ldev] Erasing FE.KEYID = 1
8,829,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,391 UART: [ldev] --
10,623,006 UART: [fwproc] Wait for Commands...
10,625,059 UART: [fwproc] Recv command 0x46574c44
10,627,168 UART: [fwproc] Recv'd Img size: 114084 bytes
12,679,889 UART: ROM Fatal Error: 0x000B0017
12,683,002 >>> mbox cmd response: failed
12,683,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,683,753 >>> mbox cmd response: failed
12,684,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,561 >>> mbox cmd response: failed
Initializing fuses
2,053,689 writing to cptra_bootfsm_go
2,242,994 UART:
2,243,342 UART: Running Caliptra ROM ...
2,244,386 UART:
7,771,952 UART: [state] CFI Enabled
7,782,744 UART: [state] LifecycleState = Unprovisioned
7,784,612 UART: [state] DebugLocked = No
7,787,086 UART: [state] WD Timer not started. Device not locked for debugging
7,790,997 UART: [kat] SHA2-256
7,970,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,981,729 UART: [kat] ++
7,982,298 UART: [kat] sha1
7,993,953 UART: [kat] SHA2-256
7,997,026 UART: [kat] SHA2-384
8,003,136 UART: [kat] SHA2-512-ACC
8,006,084 UART: [kat] ECC-384
10,450,298 UART: [kat] HMAC-384Kdf
10,461,116 UART: [kat] LMS
10,990,567 UART: [kat] --
10,995,507 UART: [cold-reset] ++
10,997,229 UART: [fht] FHT @ 0x50003400
11,008,215 UART: [idev] ++
11,008,794 UART: [idev] CDI.KEYID = 6
11,009,708 UART: [idev] SUBJECT.KEYID = 7
11,010,929 UART: [idev] UDS.KEYID = 0
11,013,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,156,687 UART: [idev] Erasing UDS.KEYID = 0
13,486,210 UART: [idev] Sha1 KeyId Algorithm
13,509,756 UART: [idev] --
13,513,186 UART: [ldev] ++
13,513,769 UART: [ldev] CDI.KEYID = 6
13,514,656 UART: [ldev] SUBJECT.KEYID = 5
13,515,783 UART: [ldev] AUTHORITY.KEYID = 7
13,517,112 UART: [ldev] FE.KEYID = 1
13,528,320 UART: [ldev] Erasing FE.KEYID = 1
16,001,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,720,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,736,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,751,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,767,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,788,494 UART: [ldev] --
17,792,999 UART: [fwproc] Wait for Commands...
17,796,177 UART: [fwproc] Recv command 0x46574c44
17,798,295 UART: [fwproc] Recv'd Img size: 114084 bytes
21,196,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,268,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,337,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,655,065 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,691,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,436,401 >>> mbox cmd response: failed
12,437,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,317 >>> mbox cmd response: failed
12,437,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,880 >>> mbox cmd response: failed
Initializing fuses
2,054,371 writing to cptra_bootfsm_go
11,121,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,690,224 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,425 UART:
192,796 UART: Running Caliptra ROM ...
194,001 UART:
194,165 UART: [state] CFI Enabled
263,437 UART: [state] LifecycleState = Unprovisioned
265,746 UART: [state] DebugLocked = No
268,477 UART: [state] WD Timer not started. Device not locked for debugging
273,893 UART: [kat] SHA2-256
463,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,542 UART: [kat] ++
474,991 UART: [kat] sha1
487,113 UART: [kat] SHA2-256
490,125 UART: [kat] SHA2-384
495,618 UART: [kat] SHA2-512-ACC
498,239 UART: [kat] ECC-384
2,947,359 UART: [kat] HMAC-384Kdf
2,971,157 UART: [kat] LMS
3,502,926 UART: [kat] --
3,508,121 UART: [cold-reset] ++
3,509,625 UART: [fht] FHT @ 0x50003400
3,521,211 UART: [idev] ++
3,521,893 UART: [idev] CDI.KEYID = 6
3,522,861 UART: [idev] SUBJECT.KEYID = 7
3,524,075 UART: [idev] UDS.KEYID = 0
3,526,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,284 UART: [idev] Erasing UDS.KEYID = 0
6,025,816 UART: [idev] Sha1 KeyId Algorithm
6,048,151 UART: [idev] --
6,054,065 UART: [ldev] ++
6,054,766 UART: [ldev] CDI.KEYID = 6
6,055,840 UART: [ldev] SUBJECT.KEYID = 5
6,056,969 UART: [ldev] AUTHORITY.KEYID = 7
6,058,150 UART: [ldev] FE.KEYID = 1
6,098,773 UART: [ldev] Erasing FE.KEYID = 1
8,603,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,541 UART: [ldev] --
10,413,829 UART: [fwproc] Wait for Commands...
10,416,314 UART: [fwproc] Recv command 0x46574c44
10,418,631 UART: [fwproc] Recv'd Img size: 114084 bytes
12,497,475 UART: ROM Fatal Error: 0x000B0017
12,501,149 >>> mbox cmd response: failed
12,501,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,792 >>> mbox cmd response: failed
12,502,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,502,375 >>> mbox cmd response: failed
Initializing fuses
2,062,683 writing to cptra_bootfsm_go
2,251,992 UART:
2,252,360 UART: Running Caliptra ROM ...
2,253,405 UART:
2,253,556 UART: [state] CFI Enabled
2,314,818 UART: [state] LifecycleState = Unprovisioned
2,317,154 UART: [state] DebugLocked = No
2,319,051 UART: [state] WD Timer not started. Device not locked for debugging
2,323,513 UART: [kat] SHA2-256
2,513,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,184 UART: [kat] ++
2,524,696 UART: [kat] sha1
2,535,478 UART: [kat] SHA2-256
2,538,448 UART: [kat] SHA2-384
2,544,009 UART: [kat] SHA2-512-ACC
2,546,589 UART: [kat] ECC-384
4,992,121 UART: [kat] HMAC-384Kdf
5,017,311 UART: [kat] LMS
5,549,111 UART: [kat] --
5,553,913 UART: [cold-reset] ++
5,555,788 UART: [fht] FHT @ 0x50003400
5,566,392 UART: [idev] ++
5,567,076 UART: [idev] CDI.KEYID = 6
5,568,093 UART: [idev] SUBJECT.KEYID = 7
5,569,259 UART: [idev] UDS.KEYID = 0
5,571,465 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,715,072 UART: [idev] Erasing UDS.KEYID = 0
8,074,867 UART: [idev] Sha1 KeyId Algorithm
8,097,682 UART: [idev] --
8,103,331 UART: [ldev] ++
8,104,026 UART: [ldev] CDI.KEYID = 6
8,104,911 UART: [ldev] SUBJECT.KEYID = 5
8,106,126 UART: [ldev] AUTHORITY.KEYID = 7
8,107,360 UART: [ldev] FE.KEYID = 1
8,146,207 UART: [ldev] Erasing FE.KEYID = 1
10,653,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,248 UART: [ldev] --
12,459,837 UART: [fwproc] Wait for Commands...
12,462,686 UART: [fwproc] Recv command 0x46574c44
12,464,970 UART: [fwproc] Recv'd Img size: 114084 bytes
15,906,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,101,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,642,816 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,443,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,284,060 >>> mbox cmd response: failed
12,284,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,008 >>> mbox cmd response: failed
12,285,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,285,577 >>> mbox cmd response: failed
Initializing fuses
2,072,452 writing to cptra_bootfsm_go
5,498,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,793,511 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,273 writing to cptra_bootfsm_go
193,385 UART:
193,737 UART: Running Caliptra ROM ...
194,845 UART:
604,481 UART: [state] CFI Enabled
618,616 UART: [state] LifecycleState = Unprovisioned
620,986 UART: [state] DebugLocked = No
622,818 UART: [state] WD Timer not started. Device not locked for debugging
627,477 UART: [kat] SHA2-256
817,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,149 UART: [kat] ++
828,655 UART: [kat] sha1
840,073 UART: [kat] SHA2-256
843,086 UART: [kat] SHA2-384
847,445 UART: [kat] SHA2-512-ACC
850,000 UART: [kat] ECC-384
3,290,941 UART: [kat] HMAC-384Kdf
3,303,798 UART: [kat] LMS
3,835,614 UART: [kat] --
3,839,453 UART: [cold-reset] ++
3,840,900 UART: [fht] FHT @ 0x50003400
3,853,166 UART: [idev] ++
3,853,860 UART: [idev] CDI.KEYID = 6
3,854,847 UART: [idev] SUBJECT.KEYID = 7
3,856,006 UART: [idev] UDS.KEYID = 0
3,858,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,069 UART: [idev] Erasing UDS.KEYID = 0
6,330,594 UART: [idev] Sha1 KeyId Algorithm
6,353,451 UART: [idev] --
6,358,686 UART: [ldev] ++
6,359,385 UART: [ldev] CDI.KEYID = 6
6,360,294 UART: [ldev] SUBJECT.KEYID = 5
6,361,459 UART: [ldev] AUTHORITY.KEYID = 7
6,362,691 UART: [ldev] FE.KEYID = 1
6,373,826 UART: [ldev] Erasing FE.KEYID = 1
8,849,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,042 UART: [ldev] --
10,639,275 UART: [fwproc] Wait for Commands...
10,640,939 UART: [fwproc] Recv command 0x46574c44
10,643,270 UART: [fwproc] Recv'd Img size: 114084 bytes
12,722,399 UART: ROM Fatal Error: 0x000B0017
12,726,069 >>> mbox cmd response: failed
12,726,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,726,861 >>> mbox cmd response: failed
12,727,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,365 >>> mbox cmd response: failed
Initializing fuses
2,058,497 writing to cptra_bootfsm_go
2,247,829 UART:
2,248,187 UART: Running Caliptra ROM ...
2,249,236 UART:
7,721,987 UART: [state] CFI Enabled
7,738,028 UART: [state] LifecycleState = Unprovisioned
7,740,381 UART: [state] DebugLocked = No
7,742,711 UART: [state] WD Timer not started. Device not locked for debugging
7,747,856 UART: [kat] SHA2-256
7,937,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,948,505 UART: [kat] ++
7,949,018 UART: [kat] sha1
7,960,504 UART: [kat] SHA2-256
7,963,518 UART: [kat] SHA2-384
7,969,393 UART: [kat] SHA2-512-ACC
7,971,961 UART: [kat] ECC-384
10,414,286 UART: [kat] HMAC-384Kdf
10,427,807 UART: [kat] LMS
10,959,631 UART: [kat] --
10,965,948 UART: [cold-reset] ++
10,968,280 UART: [fht] FHT @ 0x50003400
10,980,071 UART: [idev] ++
10,980,749 UART: [idev] CDI.KEYID = 6
10,981,764 UART: [idev] SUBJECT.KEYID = 7
10,982,923 UART: [idev] UDS.KEYID = 0
10,985,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,128,834 UART: [idev] Erasing UDS.KEYID = 0
13,459,168 UART: [idev] Sha1 KeyId Algorithm
13,481,484 UART: [idev] --
13,486,015 UART: [ldev] ++
13,486,700 UART: [ldev] CDI.KEYID = 6
13,487,606 UART: [ldev] SUBJECT.KEYID = 5
13,488,764 UART: [ldev] AUTHORITY.KEYID = 7
13,489,990 UART: [ldev] FE.KEYID = 1
13,501,931 UART: [ldev] Erasing FE.KEYID = 1
15,981,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,700,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,715,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,730,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,745,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,720 UART: [ldev] --
17,772,913 UART: [fwproc] Wait for Commands...
17,775,283 UART: [fwproc] Recv command 0x46574c44
17,777,538 UART: [fwproc] Recv'd Img size: 114084 bytes
21,225,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,302,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,418,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,959,298 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,760,246 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,528,225 >>> mbox cmd response: failed
12,528,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,091 >>> mbox cmd response: failed
12,529,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,655 >>> mbox cmd response: failed
Initializing fuses
2,058,727 writing to cptra_bootfsm_go
11,089,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,283,063 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,777 UART: [kat] SHA2-256
892,715 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,432 UART: [kat] LMS
1,475,628 UART: [kat] --
1,476,239 UART: [cold-reset] ++
1,476,755 UART: [fht] Storing FHT @ 0x50003400
1,479,622 UART: [idev] ++
1,479,790 UART: [idev] CDI.KEYID = 6
1,480,150 UART: [idev] SUBJECT.KEYID = 7
1,480,574 UART: [idev] UDS.KEYID = 0
1,480,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,690 UART: [idev] Erasing UDS.KEYID = 0
1,504,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,480 UART: [idev] --
1,514,503 UART: [ldev] ++
1,514,671 UART: [ldev] CDI.KEYID = 6
1,515,034 UART: [ldev] SUBJECT.KEYID = 5
1,515,460 UART: [ldev] AUTHORITY.KEYID = 7
1,515,923 UART: [ldev] FE.KEYID = 1
1,521,181 UART: [ldev] Erasing FE.KEYID = 1
1,546,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,588 UART: [ldev] --
1,585,899 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46574c44
1,587,523 UART: [fwproc] Received Image of size 114084 bytes
1,635,028 UART: ROM Fatal Error: 0x000B0017
1,636,185 >>> mbox cmd response: failed
1,636,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,191 >>> mbox cmd response: failed
1,636,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,937 UART: [kat] SHA2-256
881,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,983 UART: [kat] ++
886,135 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
894,982 UART: [kat] SHA2-512-ACC
896,883 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
906,814 UART: [kat] LMS
1,475,010 UART: [kat] --
1,475,935 UART: [cold-reset] ++
1,476,365 UART: [fht] Storing FHT @ 0x50003400
1,479,228 UART: [idev] ++
1,479,396 UART: [idev] CDI.KEYID = 6
1,479,756 UART: [idev] SUBJECT.KEYID = 7
1,480,180 UART: [idev] UDS.KEYID = 0
1,480,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,516 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,928 UART: [idev] --
1,514,131 UART: [ldev] ++
1,514,299 UART: [ldev] CDI.KEYID = 6
1,514,662 UART: [ldev] SUBJECT.KEYID = 5
1,515,088 UART: [ldev] AUTHORITY.KEYID = 7
1,515,551 UART: [ldev] FE.KEYID = 1
1,520,703 UART: [ldev] Erasing FE.KEYID = 1
1,545,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,994 UART: [ldev] --
1,585,379 UART: [fwproc] Waiting for Commands...
1,586,186 UART: [fwproc] Received command 0x46574c44
1,586,977 UART: [fwproc] Received Image of size 114084 bytes
2,881,316 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,880 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,823 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,324 >>> mbox cmd response: failed
1,487,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,330 >>> mbox cmd response: failed
1,487,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,515 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,204 UART: [kat] SHA2-256
882,135 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,250 UART: [kat] ++
886,402 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
903,069 UART: [kat] HMAC-384Kdf
907,807 UART: [kat] LMS
1,476,003 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,480,137 UART: [idev] ++
1,480,305 UART: [idev] CDI.KEYID = 6
1,480,665 UART: [idev] SUBJECT.KEYID = 7
1,481,089 UART: [idev] UDS.KEYID = 0
1,481,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,569 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,341 UART: [idev] --
1,515,390 UART: [ldev] ++
1,515,558 UART: [ldev] CDI.KEYID = 6
1,515,921 UART: [ldev] SUBJECT.KEYID = 5
1,516,347 UART: [ldev] AUTHORITY.KEYID = 7
1,516,810 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,267 UART: [ldev] --
1,586,746 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46574c44
1,588,208 UART: [fwproc] Received Image of size 114084 bytes
1,635,487 UART: ROM Fatal Error: 0x000B0017
1,636,644 >>> mbox cmd response: failed
1,636,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,650 >>> mbox cmd response: failed
1,636,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,863 UART: [kat] SHA2-512-ACC
897,764 UART: [kat] ECC-384
903,569 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,405 UART: [idev] Erasing UDS.KEYID = 0
1,506,287 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,925 UART: [idev] --
1,515,932 UART: [ldev] ++
1,516,100 UART: [ldev] CDI.KEYID = 6
1,516,463 UART: [ldev] SUBJECT.KEYID = 5
1,516,889 UART: [ldev] AUTHORITY.KEYID = 7
1,517,352 UART: [ldev] FE.KEYID = 1
1,522,640 UART: [ldev] Erasing FE.KEYID = 1
1,548,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,281 UART: [ldev] --
1,587,780 UART: [fwproc] Waiting for Commands...
1,588,603 UART: [fwproc] Received command 0x46574c44
1,589,394 UART: [fwproc] Received Image of size 114084 bytes
2,883,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,522 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,987 >>> mbox cmd response: failed
1,488,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,993 >>> mbox cmd response: failed
1,488,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,682 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,011 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
893,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,135 UART: [kat] ++
897,287 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,242 UART: [kat] SHA2-512-ACC
908,143 UART: [kat] ECC-384
917,938 UART: [kat] HMAC-384Kdf
922,394 UART: [kat] LMS
1,170,722 UART: [kat] --
1,171,455 UART: [cold-reset] ++
1,171,835 UART: [fht] FHT @ 0x50003400
1,174,608 UART: [idev] ++
1,174,776 UART: [idev] CDI.KEYID = 6
1,175,136 UART: [idev] SUBJECT.KEYID = 7
1,175,560 UART: [idev] UDS.KEYID = 0
1,175,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,764 UART: [idev] Erasing UDS.KEYID = 0
1,201,259 UART: [idev] Sha1 KeyId Algorithm
1,209,617 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,304 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,667 UART: [ldev] --
1,283,126 UART: [fwproc] Wait for Commands...
1,283,768 UART: [fwproc] Recv command 0x46574c44
1,284,496 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,377 UART: ROM Fatal Error: 0x000B0017
1,332,534 >>> mbox cmd response: failed
1,332,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,540 >>> mbox cmd response: failed
1,332,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,582 UART: [kat] SHA2-512-ACC
908,483 UART: [kat] ECC-384
918,280 UART: [kat] HMAC-384Kdf
922,918 UART: [kat] LMS
1,171,246 UART: [kat] --
1,172,217 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,378 UART: [idev] ++
1,175,546 UART: [idev] CDI.KEYID = 6
1,175,906 UART: [idev] SUBJECT.KEYID = 7
1,176,330 UART: [idev] UDS.KEYID = 0
1,176,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,853 UART: [idev] Sha1 KeyId Algorithm
1,209,391 UART: [idev] --
1,210,405 UART: [ldev] ++
1,210,573 UART: [ldev] CDI.KEYID = 6
1,210,936 UART: [ldev] SUBJECT.KEYID = 5
1,211,362 UART: [ldev] AUTHORITY.KEYID = 7
1,211,825 UART: [ldev] FE.KEYID = 1
1,217,237 UART: [ldev] Erasing FE.KEYID = 1
1,244,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,063 UART: [ldev] --
1,283,478 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,519 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,240 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,187,865 >>> mbox cmd response: failed
1,187,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,871 >>> mbox cmd response: failed
1,187,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,073 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
893,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,226 UART: [kat] ++
897,378 UART: [kat] sha1
901,594 UART: [kat] SHA2-256
903,534 UART: [kat] SHA2-384
906,125 UART: [kat] SHA2-512-ACC
908,026 UART: [kat] ECC-384
918,019 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,924 UART: [cold-reset] ++
1,172,296 UART: [fht] FHT @ 0x50003400
1,174,771 UART: [idev] ++
1,174,939 UART: [idev] CDI.KEYID = 6
1,175,299 UART: [idev] SUBJECT.KEYID = 7
1,175,723 UART: [idev] UDS.KEYID = 0
1,176,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,200,622 UART: [idev] Sha1 KeyId Algorithm
1,208,946 UART: [idev] --
1,210,120 UART: [ldev] ++
1,210,288 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,077 UART: [ldev] AUTHORITY.KEYID = 7
1,211,540 UART: [ldev] FE.KEYID = 1
1,216,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,288 UART: [ldev] --
1,282,695 UART: [fwproc] Wait for Commands...
1,283,455 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,320 UART: ROM Fatal Error: 0x000B0017
1,332,477 >>> mbox cmd response: failed
1,332,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,483 >>> mbox cmd response: failed
1,332,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,850 UART: [fht] FHT @ 0x50003400
1,175,481 UART: [idev] ++
1,175,649 UART: [idev] CDI.KEYID = 6
1,176,009 UART: [idev] SUBJECT.KEYID = 7
1,176,433 UART: [idev] UDS.KEYID = 0
1,176,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,210,058 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,500 UART: [ldev] --
1,284,977 UART: [fwproc] Wait for Commands...
1,285,705 UART: [fwproc] Recv command 0x46574c44
1,286,433 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,221 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,187,530 >>> mbox cmd response: failed
1,187,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,536 >>> mbox cmd response: failed
1,187,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,174,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,927 UART: [idev] Sha1 KeyId Algorithm
1,208,843 UART: [idev] --
1,209,920 UART: [ldev] ++
1,210,088 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,879 UART: [ldev] AUTHORITY.KEYID = 7
1,211,342 UART: [ldev] FE.KEYID = 1
1,216,788 UART: [ldev] Erasing FE.KEYID = 1
1,242,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,708 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,927 UART: [fwproc] Recv command 0x46574c44
1,283,660 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,536 UART: ROM Fatal Error: 0x000B0017
1,331,693 >>> mbox cmd response: failed
1,331,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,699 >>> mbox cmd response: failed
1,331,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,409 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,491 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,497 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,517 UART: [fwproc] Recv command 0x46574c44
1,282,250 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,004 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,690 >>> mbox cmd response: failed
1,183,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,696 >>> mbox cmd response: failed
1,183,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,258 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,794 UART: [idev] ++
1,172,962 UART: [idev] CDI.KEYID = 6
1,173,323 UART: [idev] SUBJECT.KEYID = 7
1,173,748 UART: [idev] UDS.KEYID = 0
1,174,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,404 UART: [idev] Erasing UDS.KEYID = 0
1,198,342 UART: [idev] Sha1 KeyId Algorithm
1,207,270 UART: [idev] --
1,208,479 UART: [ldev] ++
1,208,647 UART: [ldev] CDI.KEYID = 6
1,209,011 UART: [ldev] SUBJECT.KEYID = 5
1,209,438 UART: [ldev] AUTHORITY.KEYID = 7
1,209,901 UART: [ldev] FE.KEYID = 1
1,215,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,284 UART: [fwproc] Recv command 0x46574c44
1,283,017 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,029 UART: ROM Fatal Error: 0x000B0017
1,332,186 >>> mbox cmd response: failed
1,332,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,192 >>> mbox cmd response: failed
1,332,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,696 UART: [idev] ++
1,173,864 UART: [idev] CDI.KEYID = 6
1,174,225 UART: [idev] SUBJECT.KEYID = 7
1,174,650 UART: [idev] UDS.KEYID = 0
1,174,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,904 UART: [idev] Sha1 KeyId Algorithm
1,208,754 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,399 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46574c44
1,284,045 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,840 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,617 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,981 >>> mbox cmd response: failed
1,183,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,987 >>> mbox cmd response: failed
1,183,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,117 UART:
192,474 UART: Running Caliptra ROM ...
193,569 UART:
193,711 UART: [state] CFI Enabled
263,088 UART: [state] LifecycleState = Unprovisioned
265,074 UART: [state] DebugLocked = No
267,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,011 UART: [kat] SHA2-256
441,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,217 UART: [kat] ++
452,685 UART: [kat] sha1
462,919 UART: [kat] SHA2-256
465,613 UART: [kat] SHA2-384
471,000 UART: [kat] SHA2-512-ACC
473,404 UART: [kat] ECC-384
2,766,495 UART: [kat] HMAC-384Kdf
2,798,932 UART: [kat] LMS
3,989,209 UART: [kat] --
3,993,132 UART: [cold-reset] ++
3,994,368 UART: [fht] Storing FHT @ 0x50003400
4,004,939 UART: [idev] ++
4,005,520 UART: [idev] CDI.KEYID = 6
4,006,445 UART: [idev] SUBJECT.KEYID = 7
4,007,723 UART: [idev] UDS.KEYID = 0
4,010,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,153,716 UART: [idev] Erasing UDS.KEYID = 0
7,344,552 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,400 UART: [idev] --
7,371,561 UART: [ldev] ++
7,372,135 UART: [ldev] CDI.KEYID = 6
7,373,214 UART: [ldev] SUBJECT.KEYID = 5
7,374,246 UART: [ldev] AUTHORITY.KEYID = 7
7,375,449 UART: [ldev] FE.KEYID = 1
7,420,845 UART: [ldev] Erasing FE.KEYID = 1
10,754,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,816 UART: [ldev] --
13,138,801 UART: [fwproc] Waiting for Commands...
13,141,777 UART: [fwproc] Received command 0x46574c44
13,143,994 UART: [fwproc] Received Image of size 113760 bytes
15,847,961 UART: ROM Fatal Error: 0x000B003B
15,851,413 >>> mbox cmd response: failed
15,851,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,152 >>> mbox cmd response: failed
15,852,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,718 >>> mbox cmd response: failed
Initializing fuses
2,062,609 writing to cptra_bootfsm_go
2,251,948 UART:
2,252,299 UART: Running Caliptra ROM ...
2,253,442 UART:
2,253,609 UART: [state] CFI Enabled
2,326,218 UART: [state] LifecycleState = Unprovisioned
2,328,227 UART: [state] DebugLocked = No
2,329,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,044 UART: [kat] SHA2-256
2,503,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,260 UART: [kat] ++
2,514,743 UART: [kat] sha1
2,525,144 UART: [kat] SHA2-256
2,527,838 UART: [kat] SHA2-384
2,534,258 UART: [kat] SHA2-512-ACC
2,536,619 UART: [kat] ECC-384
4,830,701 UART: [kat] HMAC-384Kdf
4,862,337 UART: [kat] LMS
6,052,616 UART: [kat] --
6,056,211 UART: [cold-reset] ++
6,058,376 UART: [fht] Storing FHT @ 0x50003400
6,070,996 UART: [idev] ++
6,071,585 UART: [idev] CDI.KEYID = 6
6,072,610 UART: [idev] SUBJECT.KEYID = 7
6,073,776 UART: [idev] UDS.KEYID = 0
6,075,869 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,219,371 UART: [idev] Erasing UDS.KEYID = 0
9,408,796 UART: [idev] Using Sha1 for KeyId Algorithm
9,429,585 UART: [idev] --
9,434,015 UART: [ldev] ++
9,434,593 UART: [ldev] CDI.KEYID = 6
9,435,561 UART: [ldev] SUBJECT.KEYID = 5
9,436,764 UART: [ldev] AUTHORITY.KEYID = 7
9,438,007 UART: [ldev] FE.KEYID = 1
9,481,807 UART: [ldev] Erasing FE.KEYID = 1
12,812,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,122,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,137,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,868 UART: [ldev] --
15,174,812 UART: [fwproc] Waiting for Commands...
15,176,803 UART: [fwproc] Received command 0x46574c44
15,178,992 UART: [fwproc] Received Image of size 113760 bytes
19,225,403 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,303,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,372,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,688,325 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,803,665 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,556,016 >>> mbox cmd response: failed
15,556,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,935 >>> mbox cmd response: failed
15,557,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,557,496 >>> mbox cmd response: failed
Initializing fuses
2,054,567 writing to cptra_bootfsm_go
5,821,727 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,901,246 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,528 UART:
192,904 UART: Running Caliptra ROM ...
194,041 UART:
603,569 UART: [state] CFI Enabled
617,384 UART: [state] LifecycleState = Unprovisioned
619,315 UART: [state] DebugLocked = No
622,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,735 UART: [kat] SHA2-256
797,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,034 UART: [kat] ++
808,482 UART: [kat] sha1
819,571 UART: [kat] SHA2-256
822,259 UART: [kat] SHA2-384
827,424 UART: [kat] SHA2-512-ACC
829,838 UART: [kat] ECC-384
3,115,023 UART: [kat] HMAC-384Kdf
3,126,895 UART: [kat] LMS
4,316,972 UART: [kat] --
4,320,618 UART: [cold-reset] ++
4,322,773 UART: [fht] Storing FHT @ 0x50003400
4,333,982 UART: [idev] ++
4,334,544 UART: [idev] CDI.KEYID = 6
4,335,511 UART: [idev] SUBJECT.KEYID = 7
4,336,735 UART: [idev] UDS.KEYID = 0
4,339,329 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,505 UART: [idev] Erasing UDS.KEYID = 0
7,624,007 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,753 UART: [idev] --
7,648,252 UART: [ldev] ++
7,648,832 UART: [ldev] CDI.KEYID = 6
7,649,777 UART: [ldev] SUBJECT.KEYID = 5
7,650,988 UART: [ldev] AUTHORITY.KEYID = 7
7,652,279 UART: [ldev] FE.KEYID = 1
7,664,088 UART: [ldev] Erasing FE.KEYID = 1
10,950,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,031 UART: [ldev] --
13,310,962 UART: [fwproc] Waiting for Commands...
13,313,252 UART: [fwproc] Received command 0x46574c44
13,315,458 UART: [fwproc] Received Image of size 113760 bytes
16,019,619 UART: ROM Fatal Error: 0x000B003B
16,023,126 >>> mbox cmd response: failed
16,023,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,803 >>> mbox cmd response: failed
16,024,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,415 >>> mbox cmd response: failed
Initializing fuses
2,062,184 writing to cptra_bootfsm_go
2,251,463 UART:
2,251,812 UART: Running Caliptra ROM ...
2,252,955 UART:
4,430,366 UART: [state] CFI Enabled
4,442,821 UART: [state] LifecycleState = Unprovisioned
4,444,734 UART: [state] DebugLocked = No
4,447,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,451,507 UART: [kat] SHA2-256
4,621,278 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,631,831 UART: [kat] ++
4,632,288 UART: [kat] sha1
4,644,890 UART: [kat] SHA2-256
4,647,562 UART: [kat] SHA2-384
4,652,694 UART: [kat] SHA2-512-ACC
4,655,048 UART: [kat] ECC-384
6,940,471 UART: [kat] HMAC-384Kdf
6,951,573 UART: [kat] LMS
8,141,706 UART: [kat] --
8,146,111 UART: [cold-reset] ++
8,148,502 UART: [fht] Storing FHT @ 0x50003400
8,160,527 UART: [idev] ++
8,161,093 UART: [idev] CDI.KEYID = 6
8,162,118 UART: [idev] SUBJECT.KEYID = 7
8,163,313 UART: [idev] UDS.KEYID = 0
8,165,859 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,308,710 UART: [idev] Erasing UDS.KEYID = 0
11,450,225 UART: [idev] Using Sha1 for KeyId Algorithm
11,472,786 UART: [idev] --
11,477,422 UART: [ldev] ++
11,477,982 UART: [ldev] CDI.KEYID = 6
11,478,945 UART: [ldev] SUBJECT.KEYID = 5
11,480,206 UART: [ldev] AUTHORITY.KEYID = 7
11,481,442 UART: [ldev] FE.KEYID = 1
11,492,682 UART: [ldev] Erasing FE.KEYID = 1
14,783,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,076,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,090,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,105,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,120,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,138,145 UART: [ldev] --
17,143,312 UART: [fwproc] Waiting for Commands...
17,146,118 UART: [fwproc] Received command 0x46574c44
17,148,378 UART: [fwproc] Received Image of size 113760 bytes
21,202,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,282,121 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,350,984 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,666,788 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,131,551 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,757,821 >>> mbox cmd response: failed
15,758,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,801 >>> mbox cmd response: failed
15,759,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,362 >>> mbox cmd response: failed
Initializing fuses
2,063,664 writing to cptra_bootfsm_go
8,238,869 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,180,135 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,994 UART:
192,352 UART: Running Caliptra ROM ...
193,495 UART:
193,639 UART: [state] CFI Enabled
261,265 UART: [state] LifecycleState = Unprovisioned
263,191 UART: [state] DebugLocked = No
264,841 UART: [state] WD Timer not started. Device not locked for debugging
269,320 UART: [kat] SHA2-256
448,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,037 UART: [kat] ++
460,580 UART: [kat] sha1
471,736 UART: [kat] SHA2-256
474,753 UART: [kat] SHA2-384
480,509 UART: [kat] SHA2-512-ACC
483,439 UART: [kat] ECC-384
2,945,825 UART: [kat] HMAC-384Kdf
2,968,917 UART: [kat] LMS
3,498,358 UART: [kat] --
3,503,146 UART: [cold-reset] ++
3,505,526 UART: [fht] FHT @ 0x50003400
3,516,076 UART: [idev] ++
3,516,645 UART: [idev] CDI.KEYID = 6
3,517,568 UART: [idev] SUBJECT.KEYID = 7
3,518,730 UART: [idev] UDS.KEYID = 0
3,521,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,971 UART: [idev] Erasing UDS.KEYID = 0
6,024,731 UART: [idev] Sha1 KeyId Algorithm
6,049,052 UART: [idev] --
6,052,496 UART: [ldev] ++
6,053,080 UART: [ldev] CDI.KEYID = 6
6,054,003 UART: [ldev] SUBJECT.KEYID = 5
6,055,173 UART: [ldev] AUTHORITY.KEYID = 7
6,056,409 UART: [ldev] FE.KEYID = 1
6,097,302 UART: [ldev] Erasing FE.KEYID = 1
8,595,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,501 UART: [ldev] --
10,387,292 UART: [fwproc] Wait for Commands...
10,389,337 UART: [fwproc] Recv command 0x46574c44
10,391,429 UART: [fwproc] Recv'd Img size: 114084 bytes
12,440,497 UART: ROM Fatal Error: 0x000B003B
12,443,626 >>> mbox cmd response: failed
12,444,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,444,575 >>> mbox cmd response: failed
12,444,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,445,173 >>> mbox cmd response: failed
Initializing fuses
2,051,681 writing to cptra_bootfsm_go
2,241,060 UART:
2,241,415 UART: Running Caliptra ROM ...
2,242,553 UART:
2,242,725 UART: [state] CFI Enabled
2,299,245 UART: [state] LifecycleState = Unprovisioned
2,301,091 UART: [state] DebugLocked = No
2,303,181 UART: [state] WD Timer not started. Device not locked for debugging
2,307,790 UART: [kat] SHA2-256
2,486,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,478 UART: [kat] ++
2,499,021 UART: [kat] sha1
2,510,729 UART: [kat] SHA2-256
2,513,759 UART: [kat] SHA2-384
2,519,715 UART: [kat] SHA2-512-ACC
2,522,658 UART: [kat] ECC-384
4,983,922 UART: [kat] HMAC-384Kdf
5,005,712 UART: [kat] LMS
5,535,149 UART: [kat] --
5,539,165 UART: [cold-reset] ++
5,540,511 UART: [fht] FHT @ 0x50003400
5,551,386 UART: [idev] ++
5,551,955 UART: [idev] CDI.KEYID = 6
5,552,833 UART: [idev] SUBJECT.KEYID = 7
5,553,988 UART: [idev] UDS.KEYID = 0
5,556,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,699,839 UART: [idev] Erasing UDS.KEYID = 0
8,062,998 UART: [idev] Sha1 KeyId Algorithm
8,085,793 UART: [idev] --
8,090,784 UART: [ldev] ++
8,091,380 UART: [ldev] CDI.KEYID = 6
8,092,266 UART: [ldev] SUBJECT.KEYID = 5
8,093,372 UART: [ldev] AUTHORITY.KEYID = 7
8,094,723 UART: [ldev] FE.KEYID = 1
8,134,561 UART: [ldev] Erasing FE.KEYID = 1
10,640,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,365 UART: [ldev] --
12,448,980 UART: [fwproc] Wait for Commands...
12,450,486 UART: [fwproc] Recv command 0x46574c44
12,452,526 UART: [fwproc] Recv'd Img size: 114084 bytes
15,848,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,990,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,307,308 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,363,270 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,230,238 >>> mbox cmd response: failed
12,230,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,231,159 >>> mbox cmd response: failed
12,231,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,231,723 >>> mbox cmd response: failed
Initializing fuses
2,053,327 writing to cptra_bootfsm_go
5,406,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,085,263 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,033 writing to cptra_bootfsm_go
193,369 UART:
193,725 UART: Running Caliptra ROM ...
194,936 UART:
604,604 UART: [state] CFI Enabled
621,254 UART: [state] LifecycleState = Unprovisioned
623,100 UART: [state] DebugLocked = No
624,425 UART: [state] WD Timer not started. Device not locked for debugging
627,334 UART: [kat] SHA2-256
806,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,021 UART: [kat] ++
818,561 UART: [kat] sha1
830,361 UART: [kat] SHA2-256
833,366 UART: [kat] SHA2-384
838,798 UART: [kat] SHA2-512-ACC
841,780 UART: [kat] ECC-384
3,283,274 UART: [kat] HMAC-384Kdf
3,295,828 UART: [kat] LMS
3,825,326 UART: [kat] --
3,830,892 UART: [cold-reset] ++
3,832,712 UART: [fht] FHT @ 0x50003400
3,844,175 UART: [idev] ++
3,844,796 UART: [idev] CDI.KEYID = 6
3,845,713 UART: [idev] SUBJECT.KEYID = 7
3,846,874 UART: [idev] UDS.KEYID = 0
3,849,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,664 UART: [idev] Erasing UDS.KEYID = 0
6,319,272 UART: [idev] Sha1 KeyId Algorithm
6,341,920 UART: [idev] --
6,345,461 UART: [ldev] ++
6,346,037 UART: [ldev] CDI.KEYID = 6
6,346,954 UART: [ldev] SUBJECT.KEYID = 5
6,348,167 UART: [ldev] AUTHORITY.KEYID = 7
6,349,401 UART: [ldev] FE.KEYID = 1
6,361,396 UART: [ldev] Erasing FE.KEYID = 1
8,835,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,280 UART: [ldev] --
10,624,550 UART: [fwproc] Wait for Commands...
10,627,401 UART: [fwproc] Recv command 0x46574c44
10,629,445 UART: [fwproc] Recv'd Img size: 114084 bytes
12,676,921 UART: ROM Fatal Error: 0x000B003B
12,680,044 >>> mbox cmd response: failed
12,680,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,680,774 >>> mbox cmd response: failed
12,681,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,329 >>> mbox cmd response: failed
Initializing fuses
2,056,369 writing to cptra_bootfsm_go
2,245,687 UART:
2,246,045 UART: Running Caliptra ROM ...
2,247,192 UART:
7,766,963 UART: [state] CFI Enabled
7,778,747 UART: [state] LifecycleState = Unprovisioned
7,780,618 UART: [state] DebugLocked = No
7,782,606 UART: [state] WD Timer not started. Device not locked for debugging
7,785,651 UART: [kat] SHA2-256
7,964,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,976,322 UART: [kat] ++
7,976,865 UART: [kat] sha1
7,987,598 UART: [kat] SHA2-256
7,990,622 UART: [kat] SHA2-384
7,996,771 UART: [kat] SHA2-512-ACC
7,999,719 UART: [kat] ECC-384
10,443,055 UART: [kat] HMAC-384Kdf
10,456,014 UART: [kat] LMS
10,985,525 UART: [kat] --
10,990,555 UART: [cold-reset] ++
10,992,865 UART: [fht] FHT @ 0x50003400
11,003,404 UART: [idev] ++
11,004,019 UART: [idev] CDI.KEYID = 6
11,004,948 UART: [idev] SUBJECT.KEYID = 7
11,006,060 UART: [idev] UDS.KEYID = 0
11,008,456 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,151,715 UART: [idev] Erasing UDS.KEYID = 0
13,478,463 UART: [idev] Sha1 KeyId Algorithm
13,502,534 UART: [idev] --
13,507,566 UART: [ldev] ++
13,508,136 UART: [ldev] CDI.KEYID = 6
13,509,206 UART: [ldev] SUBJECT.KEYID = 5
13,510,307 UART: [ldev] AUTHORITY.KEYID = 7
13,511,499 UART: [ldev] FE.KEYID = 1
13,522,415 UART: [ldev] Erasing FE.KEYID = 1
15,997,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,714,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,730,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,746,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,762,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,782,852 UART: [ldev] --
17,788,003 UART: [fwproc] Wait for Commands...
17,790,491 UART: [fwproc] Recv command 0x46574c44
17,792,590 UART: [fwproc] Recv'd Img size: 114084 bytes
21,187,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,263,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,331,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,649,082 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,698,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,450,461 >>> mbox cmd response: failed
12,451,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,359 >>> mbox cmd response: failed
12,451,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,917 >>> mbox cmd response: failed
Initializing fuses
2,055,643 writing to cptra_bootfsm_go
11,110,725 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,673,990 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,469 UART:
192,833 UART: Running Caliptra ROM ...
194,002 UART:
194,156 UART: [state] CFI Enabled
260,190 UART: [state] LifecycleState = Unprovisioned
262,601 UART: [state] DebugLocked = No
264,472 UART: [state] WD Timer not started. Device not locked for debugging
269,452 UART: [kat] SHA2-256
459,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,114 UART: [kat] ++
470,561 UART: [kat] sha1
481,874 UART: [kat] SHA2-256
484,888 UART: [kat] SHA2-384
492,380 UART: [kat] SHA2-512-ACC
494,938 UART: [kat] ECC-384
2,947,891 UART: [kat] HMAC-384Kdf
2,969,626 UART: [kat] LMS
3,501,405 UART: [kat] --
3,507,042 UART: [cold-reset] ++
3,509,251 UART: [fht] FHT @ 0x50003400
3,520,723 UART: [idev] ++
3,521,452 UART: [idev] CDI.KEYID = 6
3,522,332 UART: [idev] SUBJECT.KEYID = 7
3,523,597 UART: [idev] UDS.KEYID = 0
3,526,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,754 UART: [idev] Erasing UDS.KEYID = 0
6,027,316 UART: [idev] Sha1 KeyId Algorithm
6,050,018 UART: [idev] --
6,053,724 UART: [ldev] ++
6,054,410 UART: [ldev] CDI.KEYID = 6
6,055,333 UART: [ldev] SUBJECT.KEYID = 5
6,056,498 UART: [ldev] AUTHORITY.KEYID = 7
6,057,679 UART: [ldev] FE.KEYID = 1
6,097,606 UART: [ldev] Erasing FE.KEYID = 1
8,607,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,930 UART: [ldev] --
10,412,215 UART: [fwproc] Wait for Commands...
10,414,904 UART: [fwproc] Recv command 0x46574c44
10,417,218 UART: [fwproc] Recv'd Img size: 114084 bytes
12,512,164 UART: ROM Fatal Error: 0x000B003B
12,515,838 >>> mbox cmd response: failed
12,516,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,565 >>> mbox cmd response: failed
12,516,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,517,112 >>> mbox cmd response: failed
Initializing fuses
2,061,080 writing to cptra_bootfsm_go
2,250,395 UART:
2,250,739 UART: Running Caliptra ROM ...
2,251,782 UART:
2,251,933 UART: [state] CFI Enabled
2,315,147 UART: [state] LifecycleState = Unprovisioned
2,317,484 UART: [state] DebugLocked = No
2,320,300 UART: [state] WD Timer not started. Device not locked for debugging
2,324,659 UART: [kat] SHA2-256
2,514,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,307 UART: [kat] ++
2,525,766 UART: [kat] sha1
2,538,111 UART: [kat] SHA2-256
2,541,139 UART: [kat] SHA2-384
2,546,135 UART: [kat] SHA2-512-ACC
2,548,713 UART: [kat] ECC-384
5,000,707 UART: [kat] HMAC-384Kdf
5,023,034 UART: [kat] LMS
5,554,827 UART: [kat] --
5,559,150 UART: [cold-reset] ++
5,560,110 UART: [fht] FHT @ 0x50003400
5,570,179 UART: [idev] ++
5,570,854 UART: [idev] CDI.KEYID = 6
5,571,821 UART: [idev] SUBJECT.KEYID = 7
5,573,035 UART: [idev] UDS.KEYID = 0
5,575,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,719,001 UART: [idev] Erasing UDS.KEYID = 0
8,080,269 UART: [idev] Sha1 KeyId Algorithm
8,103,002 UART: [idev] --
8,107,302 UART: [ldev] ++
8,108,010 UART: [ldev] CDI.KEYID = 6
8,108,926 UART: [ldev] SUBJECT.KEYID = 5
8,110,088 UART: [ldev] AUTHORITY.KEYID = 7
8,111,266 UART: [ldev] FE.KEYID = 1
8,152,533 UART: [ldev] Erasing FE.KEYID = 1
10,658,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,929 UART: [ldev] --
12,467,632 UART: [fwproc] Wait for Commands...
12,469,294 UART: [fwproc] Recv command 0x46574c44
12,471,612 UART: [fwproc] Recv'd Img size: 114084 bytes
15,911,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,651,538 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,439,452 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,301,919 >>> mbox cmd response: failed
12,302,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,883 >>> mbox cmd response: failed
12,303,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,450 >>> mbox cmd response: failed
Initializing fuses
2,060,084 writing to cptra_bootfsm_go
5,497,906 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,787,234 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
192,703 UART:
193,061 UART: Running Caliptra ROM ...
194,267 UART:
604,113 UART: [state] CFI Enabled
615,553 UART: [state] LifecycleState = Unprovisioned
617,622 UART: [state] DebugLocked = No
620,196 UART: [state] WD Timer not started. Device not locked for debugging
624,844 UART: [kat] SHA2-256
814,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,507 UART: [kat] ++
826,011 UART: [kat] sha1
836,628 UART: [kat] SHA2-256
839,697 UART: [kat] SHA2-384
845,248 UART: [kat] SHA2-512-ACC
847,811 UART: [kat] ECC-384
3,292,211 UART: [kat] HMAC-384Kdf
3,306,233 UART: [kat] LMS
3,838,034 UART: [kat] --
3,842,903 UART: [cold-reset] ++
3,844,182 UART: [fht] FHT @ 0x50003400
3,856,138 UART: [idev] ++
3,856,810 UART: [idev] CDI.KEYID = 6
3,857,745 UART: [idev] SUBJECT.KEYID = 7
3,858,952 UART: [idev] UDS.KEYID = 0
3,861,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,885 UART: [idev] Erasing UDS.KEYID = 0
6,337,093 UART: [idev] Sha1 KeyId Algorithm
6,360,616 UART: [idev] --
6,366,349 UART: [ldev] ++
6,367,035 UART: [ldev] CDI.KEYID = 6
6,367,919 UART: [ldev] SUBJECT.KEYID = 5
6,369,132 UART: [ldev] AUTHORITY.KEYID = 7
6,370,363 UART: [ldev] FE.KEYID = 1
6,380,910 UART: [ldev] Erasing FE.KEYID = 1
8,857,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,739 UART: [ldev] --
10,646,061 UART: [fwproc] Wait for Commands...
10,648,075 UART: [fwproc] Recv command 0x46574c44
10,650,388 UART: [fwproc] Recv'd Img size: 114084 bytes
12,728,939 UART: ROM Fatal Error: 0x000B003B
12,732,602 >>> mbox cmd response: failed
12,732,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,240 >>> mbox cmd response: failed
12,733,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,837 >>> mbox cmd response: failed
Initializing fuses
2,065,726 writing to cptra_bootfsm_go
2,254,995 UART:
2,255,347 UART: Running Caliptra ROM ...
2,256,482 UART:
7,720,717 UART: [state] CFI Enabled
7,735,192 UART: [state] LifecycleState = Unprovisioned
7,737,572 UART: [state] DebugLocked = No
7,739,504 UART: [state] WD Timer not started. Device not locked for debugging
7,743,806 UART: [kat] SHA2-256
7,933,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,944,475 UART: [kat] ++
7,944,963 UART: [kat] sha1
7,955,423 UART: [kat] SHA2-256
7,958,447 UART: [kat] SHA2-384
7,963,028 UART: [kat] SHA2-512-ACC
7,965,637 UART: [kat] ECC-384
10,407,992 UART: [kat] HMAC-384Kdf
10,421,401 UART: [kat] LMS
10,953,225 UART: [kat] --
10,958,133 UART: [cold-reset] ++
10,960,390 UART: [fht] FHT @ 0x50003400
10,970,845 UART: [idev] ++
10,971,527 UART: [idev] CDI.KEYID = 6
10,972,469 UART: [idev] SUBJECT.KEYID = 7
10,973,677 UART: [idev] UDS.KEYID = 0
10,976,161 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,119,545 UART: [idev] Erasing UDS.KEYID = 0
13,453,510 UART: [idev] Sha1 KeyId Algorithm
13,476,597 UART: [idev] --
13,482,925 UART: [ldev] ++
13,483,648 UART: [ldev] CDI.KEYID = 6
13,484,563 UART: [ldev] SUBJECT.KEYID = 5
13,485,605 UART: [ldev] AUTHORITY.KEYID = 7
13,486,890 UART: [ldev] FE.KEYID = 1
13,499,046 UART: [ldev] Erasing FE.KEYID = 1
15,980,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,699,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,729,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,745,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,765,971 UART: [ldev] --
17,771,456 UART: [fwproc] Wait for Commands...
17,773,662 UART: [fwproc] Recv command 0x46574c44
17,775,921 UART: [fwproc] Recv'd Img size: 114084 bytes
21,222,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,298,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,414,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,955,739 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,087 writing to cptra_bootfsm_go
3,757,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,525,480 >>> mbox cmd response: failed
12,525,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,335 >>> mbox cmd response: failed
12,526,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,899 >>> mbox cmd response: failed
Initializing fuses
2,055,210 writing to cptra_bootfsm_go
11,087,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,289,289 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,691 UART: [kat] SHA2-256
892,629 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,664 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,614 UART: [idev] ++
1,479,782 UART: [idev] CDI.KEYID = 6
1,480,142 UART: [idev] SUBJECT.KEYID = 7
1,480,566 UART: [idev] UDS.KEYID = 0
1,480,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,505,214 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,790 UART: [idev] --
1,514,733 UART: [ldev] ++
1,514,901 UART: [ldev] CDI.KEYID = 6
1,515,264 UART: [ldev] SUBJECT.KEYID = 5
1,515,690 UART: [ldev] AUTHORITY.KEYID = 7
1,516,153 UART: [ldev] FE.KEYID = 1
1,521,179 UART: [ldev] Erasing FE.KEYID = 1
1,546,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,014 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 114084 bytes
1,634,260 UART: ROM Fatal Error: 0x000B003B
1,635,419 >>> mbox cmd response: failed
1,635,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,425 >>> mbox cmd response: failed
1,635,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
903,030 UART: [kat] HMAC-384Kdf
907,696 UART: [kat] LMS
1,475,892 UART: [kat] --
1,476,719 UART: [cold-reset] ++
1,477,155 UART: [fht] Storing FHT @ 0x50003400
1,480,008 UART: [idev] ++
1,480,176 UART: [idev] CDI.KEYID = 6
1,480,536 UART: [idev] SUBJECT.KEYID = 7
1,480,960 UART: [idev] UDS.KEYID = 0
1,481,305 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,834 UART: [idev] Erasing UDS.KEYID = 0
1,505,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,148 UART: [idev] --
1,515,211 UART: [ldev] ++
1,515,379 UART: [ldev] CDI.KEYID = 6
1,515,742 UART: [ldev] SUBJECT.KEYID = 5
1,516,168 UART: [ldev] AUTHORITY.KEYID = 7
1,516,631 UART: [ldev] FE.KEYID = 1
1,521,823 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,772 UART: [ldev] --
1,586,105 UART: [fwproc] Waiting for Commands...
1,586,834 UART: [fwproc] Received command 0x46574c44
1,587,625 UART: [fwproc] Received Image of size 114084 bytes
2,882,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,770 >>> mbox cmd response: failed
1,487,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,776 >>> mbox cmd response: failed
1,487,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,511 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,229 UART: [kat] SHA2-512-ACC
897,130 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,233 UART: [kat] LMS
1,475,429 UART: [kat] --
1,476,290 UART: [cold-reset] ++
1,476,702 UART: [fht] Storing FHT @ 0x50003400
1,479,335 UART: [idev] ++
1,479,503 UART: [idev] CDI.KEYID = 6
1,479,863 UART: [idev] SUBJECT.KEYID = 7
1,480,287 UART: [idev] UDS.KEYID = 0
1,480,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,265 UART: [idev] Erasing UDS.KEYID = 0
1,505,111 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,855 UART: [idev] --
1,514,922 UART: [ldev] ++
1,515,090 UART: [ldev] CDI.KEYID = 6
1,515,453 UART: [ldev] SUBJECT.KEYID = 5
1,515,879 UART: [ldev] AUTHORITY.KEYID = 7
1,516,342 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,917 UART: [ldev] --
1,587,350 UART: [fwproc] Waiting for Commands...
1,588,157 UART: [fwproc] Received command 0x46574c44
1,588,948 UART: [fwproc] Received Image of size 114084 bytes
1,635,555 UART: ROM Fatal Error: 0x000B003B
1,636,714 >>> mbox cmd response: failed
1,636,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,720 >>> mbox cmd response: failed
1,636,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
891,198 UART: [kat] SHA2-256
893,136 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,265 UART: [kat] HMAC-384Kdf
907,945 UART: [kat] LMS
1,476,141 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,296 UART: [fht] Storing FHT @ 0x50003400
1,479,989 UART: [idev] ++
1,480,157 UART: [idev] CDI.KEYID = 6
1,480,517 UART: [idev] SUBJECT.KEYID = 7
1,480,941 UART: [idev] UDS.KEYID = 0
1,481,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,358 UART: [ldev] ++
1,515,526 UART: [ldev] CDI.KEYID = 6
1,515,889 UART: [ldev] SUBJECT.KEYID = 5
1,516,315 UART: [ldev] AUTHORITY.KEYID = 7
1,516,778 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,097 UART: [ldev] --
1,586,438 UART: [fwproc] Waiting for Commands...
1,587,129 UART: [fwproc] Received command 0x46574c44
1,587,920 UART: [fwproc] Received Image of size 114084 bytes
2,882,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,500 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,201 >>> mbox cmd response: failed
1,488,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,207 >>> mbox cmd response: failed
1,488,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,264 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,855 UART: [state] WD Timer not started. Device not locked for debugging
88,190 UART: [kat] SHA2-256
893,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,965 UART: [kat] ++
898,117 UART: [kat] sha1
902,429 UART: [kat] SHA2-256
904,369 UART: [kat] SHA2-384
907,320 UART: [kat] SHA2-512-ACC
909,221 UART: [kat] ECC-384
918,700 UART: [kat] HMAC-384Kdf
923,348 UART: [kat] LMS
1,171,676 UART: [kat] --
1,172,639 UART: [cold-reset] ++
1,172,981 UART: [fht] FHT @ 0x50003400
1,175,692 UART: [idev] ++
1,175,860 UART: [idev] CDI.KEYID = 6
1,176,220 UART: [idev] SUBJECT.KEYID = 7
1,176,644 UART: [idev] UDS.KEYID = 0
1,176,989 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,298 UART: [idev] Erasing UDS.KEYID = 0
1,201,197 UART: [idev] Sha1 KeyId Algorithm
1,209,791 UART: [idev] --
1,210,965 UART: [ldev] ++
1,211,133 UART: [ldev] CDI.KEYID = 6
1,211,496 UART: [ldev] SUBJECT.KEYID = 5
1,211,922 UART: [ldev] AUTHORITY.KEYID = 7
1,212,385 UART: [ldev] FE.KEYID = 1
1,217,567 UART: [ldev] Erasing FE.KEYID = 1
1,244,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,663 UART: [ldev] --
1,284,076 UART: [fwproc] Wait for Commands...
1,284,814 UART: [fwproc] Recv command 0x46574c44
1,285,542 UART: [fwproc] Recv'd Img size: 114084 bytes
1,333,091 UART: ROM Fatal Error: 0x000B003B
1,334,250 >>> mbox cmd response: failed
1,334,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,256 >>> mbox cmd response: failed
1,334,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
893,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,325 UART: [kat] ++
897,477 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
918,154 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,174,812 UART: [idev] ++
1,174,980 UART: [idev] CDI.KEYID = 6
1,175,340 UART: [idev] SUBJECT.KEYID = 7
1,175,764 UART: [idev] UDS.KEYID = 0
1,176,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,126 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,311 UART: [idev] --
1,210,461 UART: [ldev] ++
1,210,629 UART: [ldev] CDI.KEYID = 6
1,210,992 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,081 UART: [ldev] --
1,283,508 UART: [fwproc] Wait for Commands...
1,284,322 UART: [fwproc] Recv command 0x46574c44
1,285,050 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,048 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,253 >>> mbox cmd response: failed
1,188,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,259 >>> mbox cmd response: failed
1,188,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,601 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
917,945 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,171,766 UART: [cold-reset] ++
1,172,298 UART: [fht] FHT @ 0x50003400
1,174,945 UART: [idev] ++
1,175,113 UART: [idev] CDI.KEYID = 6
1,175,473 UART: [idev] SUBJECT.KEYID = 7
1,175,897 UART: [idev] UDS.KEYID = 0
1,176,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,458 UART: [idev] Sha1 KeyId Algorithm
1,209,892 UART: [idev] --
1,210,830 UART: [ldev] ++
1,210,998 UART: [ldev] CDI.KEYID = 6
1,211,361 UART: [ldev] SUBJECT.KEYID = 5
1,211,787 UART: [ldev] AUTHORITY.KEYID = 7
1,212,250 UART: [ldev] FE.KEYID = 1
1,217,598 UART: [ldev] Erasing FE.KEYID = 1
1,243,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,778 UART: [ldev] --
1,283,203 UART: [fwproc] Wait for Commands...
1,283,885 UART: [fwproc] Recv command 0x46574c44
1,284,613 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,304 UART: ROM Fatal Error: 0x000B003B
1,332,463 >>> mbox cmd response: failed
1,332,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,469 >>> mbox cmd response: failed
1,332,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
893,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,472 UART: [kat] ++
897,624 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,733 UART: [kat] SHA2-512-ACC
908,634 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,080 UART: [cold-reset] ++
1,172,650 UART: [fht] FHT @ 0x50003400
1,175,215 UART: [idev] ++
1,175,383 UART: [idev] CDI.KEYID = 6
1,175,743 UART: [idev] SUBJECT.KEYID = 7
1,176,167 UART: [idev] UDS.KEYID = 0
1,176,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,279 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,698 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,216,996 UART: [ldev] Erasing FE.KEYID = 1
1,243,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,546 UART: [ldev] --
1,283,005 UART: [fwproc] Wait for Commands...
1,283,643 UART: [fwproc] Recv command 0x46574c44
1,284,371 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,745 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,186,774 >>> mbox cmd response: failed
1,186,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,780 >>> mbox cmd response: failed
1,186,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,262 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,774 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,509 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,173,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,409 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,176 UART: [ldev] ++
1,208,344 UART: [ldev] CDI.KEYID = 6
1,208,708 UART: [ldev] SUBJECT.KEYID = 5
1,209,135 UART: [ldev] AUTHORITY.KEYID = 7
1,209,598 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,240,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,728 UART: [ldev] --
1,280,138 UART: [fwproc] Wait for Commands...
1,280,797 UART: [fwproc] Recv command 0x46574c44
1,281,530 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,108 UART: ROM Fatal Error: 0x000B003B
1,329,267 >>> mbox cmd response: failed
1,329,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,273 >>> mbox cmd response: failed
1,329,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,471 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,173,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,751 UART: [idev] Erasing UDS.KEYID = 0
1,198,879 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,156 UART: [fwproc] Wait for Commands...
1,281,817 UART: [fwproc] Recv command 0x46574c44
1,282,550 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,474 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,116 >>> mbox cmd response: failed
1,184,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,122 >>> mbox cmd response: failed
1,184,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,126 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,174,528 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,176 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,208,931 UART: [ldev] ++
1,209,099 UART: [ldev] CDI.KEYID = 6
1,209,463 UART: [ldev] SUBJECT.KEYID = 5
1,209,890 UART: [ldev] AUTHORITY.KEYID = 7
1,210,353 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,265 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,033 UART: ROM Fatal Error: 0x000B003B
1,331,192 >>> mbox cmd response: failed
1,331,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,198 >>> mbox cmd response: failed
1,331,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,658 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,831 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,282,006 UART: [fwproc] Recv command 0x46574c44
1,282,739 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,979 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,345 >>> mbox cmd response: failed
1,184,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,351 >>> mbox cmd response: failed
1,184,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,731 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,186 UART:
192,546 UART: Running Caliptra ROM ...
193,681 UART:
193,828 UART: [state] CFI Enabled
265,366 UART: [state] LifecycleState = Manufacturing
267,339 UART: [state] DebugLocked = No
270,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,908 UART: [kat] SHA2-256
444,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,160 UART: [kat] ++
455,612 UART: [kat] sha1
465,622 UART: [kat] SHA2-256
468,306 UART: [kat] SHA2-384
474,065 UART: [kat] SHA2-512-ACC
476,462 UART: [kat] ECC-384
2,766,076 UART: [kat] HMAC-384Kdf
2,776,769 UART: [kat] LMS
3,967,046 UART: [kat] --
3,973,859 UART: [cold-reset] ++
3,975,497 UART: [fht] Storing FHT @ 0x50003400
3,985,721 UART: [idev] ++
3,986,302 UART: [idev] CDI.KEYID = 6
3,987,326 UART: [idev] SUBJECT.KEYID = 7
3,988,492 UART: [idev] UDS.KEYID = 0
3,991,451 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,135,273 UART: [idev] Erasing UDS.KEYID = 0
7,321,745 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,504 UART: [idev] --
7,348,536 UART: [ldev] ++
7,349,114 UART: [ldev] CDI.KEYID = 6
7,350,058 UART: [ldev] SUBJECT.KEYID = 5
7,351,276 UART: [ldev] AUTHORITY.KEYID = 7
7,352,566 UART: [ldev] FE.KEYID = 1
7,400,077 UART: [ldev] Erasing FE.KEYID = 1
10,732,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,911 UART: [ldev] --
13,090,741 UART: [fwproc] Waiting for Commands...
13,094,130 UART: [fwproc] Received command 0x46574c44
13,096,325 UART: [fwproc] Received Image of size 113760 bytes
16,078,006 UART: ROM Fatal Error: 0x000B0025
16,081,472 >>> mbox cmd response: failed
16,081,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,364 >>> mbox cmd response: failed
16,082,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,948 >>> mbox cmd response: failed
Initializing fuses
2,049,122 writing to cptra_bootfsm_go
2,238,431 UART:
2,238,774 UART: Running Caliptra ROM ...
2,239,863 UART:
2,240,026 UART: [state] CFI Enabled
2,306,436 UART: [state] LifecycleState = Manufacturing
2,308,371 UART: [state] DebugLocked = No
2,309,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,340 UART: [kat] SHA2-256
2,484,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,559 UART: [kat] ++
2,495,097 UART: [kat] sha1
2,507,072 UART: [kat] SHA2-256
2,509,763 UART: [kat] SHA2-384
2,515,639 UART: [kat] SHA2-512-ACC
2,518,012 UART: [kat] ECC-384
4,814,325 UART: [kat] HMAC-384Kdf
4,825,901 UART: [kat] LMS
6,016,204 UART: [kat] --
6,020,222 UART: [cold-reset] ++
6,021,134 UART: [fht] Storing FHT @ 0x50003400
6,033,263 UART: [idev] ++
6,033,831 UART: [idev] CDI.KEYID = 6
6,034,738 UART: [idev] SUBJECT.KEYID = 7
6,036,009 UART: [idev] UDS.KEYID = 0
6,038,556 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,181,781 UART: [idev] Erasing UDS.KEYID = 0
9,371,773 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,960 UART: [idev] --
9,398,179 UART: [ldev] ++
9,398,746 UART: [ldev] CDI.KEYID = 6
9,399,784 UART: [ldev] SUBJECT.KEYID = 5
9,401,006 UART: [ldev] AUTHORITY.KEYID = 7
9,402,192 UART: [ldev] FE.KEYID = 1
9,447,377 UART: [ldev] Erasing FE.KEYID = 1
12,780,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,072,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,087,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,102,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,116,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,136,414 UART: [ldev] --
15,141,133 UART: [fwproc] Waiting for Commands...
15,143,822 UART: [fwproc] Received command 0x46574c44
15,146,008 UART: [fwproc] Received Image of size 113760 bytes
19,221,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,297,270 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,366,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,682,494 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,785,727 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,864,118 >>> mbox cmd response: failed
15,864,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,865,105 >>> mbox cmd response: failed
15,865,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,865,671 >>> mbox cmd response: failed
Initializing fuses
2,044,926 writing to cptra_bootfsm_go
5,853,144 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,968,975 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,092 writing to cptra_bootfsm_go
193,409 UART:
193,759 UART: Running Caliptra ROM ...
194,947 UART:
604,395 UART: [state] CFI Enabled
619,913 UART: [state] LifecycleState = Manufacturing
621,835 UART: [state] DebugLocked = No
623,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,077 UART: [kat] SHA2-256
797,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,330 UART: [kat] ++
808,919 UART: [kat] sha1
820,130 UART: [kat] SHA2-256
822,805 UART: [kat] SHA2-384
829,268 UART: [kat] SHA2-512-ACC
831,635 UART: [kat] ECC-384
3,114,890 UART: [kat] HMAC-384Kdf
3,125,583 UART: [kat] LMS
4,315,681 UART: [kat] --
4,319,261 UART: [cold-reset] ++
4,320,337 UART: [fht] Storing FHT @ 0x50003400
4,332,104 UART: [idev] ++
4,332,773 UART: [idev] CDI.KEYID = 6
4,333,696 UART: [idev] SUBJECT.KEYID = 7
4,334,919 UART: [idev] UDS.KEYID = 0
4,337,753 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,708 UART: [idev] Erasing UDS.KEYID = 0
7,617,914 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,669 UART: [idev] --
7,643,370 UART: [ldev] ++
7,643,944 UART: [ldev] CDI.KEYID = 6
7,644,908 UART: [ldev] SUBJECT.KEYID = 5
7,646,122 UART: [ldev] AUTHORITY.KEYID = 7
7,647,414 UART: [ldev] FE.KEYID = 1
7,659,062 UART: [ldev] Erasing FE.KEYID = 1
10,949,840 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,871 UART: [ldev] --
13,311,794 UART: [fwproc] Waiting for Commands...
13,313,406 UART: [fwproc] Received command 0x46574c44
13,315,593 UART: [fwproc] Received Image of size 113760 bytes
16,290,059 UART: ROM Fatal Error: 0x000B0025
16,293,461 >>> mbox cmd response: failed
16,293,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,294,143 >>> mbox cmd response: failed
16,294,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,294,820 >>> mbox cmd response: failed
Initializing fuses
2,047,502 writing to cptra_bootfsm_go
2,236,792 UART:
2,237,147 UART: Running Caliptra ROM ...
2,238,247 UART:
4,176,472 UART: [state] CFI Enabled
4,193,584 UART: [state] LifecycleState = Manufacturing
4,195,531 UART: [state] DebugLocked = No
4,198,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,203,561 UART: [kat] SHA2-256
4,373,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,842 UART: [kat] ++
4,384,331 UART: [kat] sha1
4,395,910 UART: [kat] SHA2-256
4,398,619 UART: [kat] SHA2-384
4,405,041 UART: [kat] SHA2-512-ACC
4,407,448 UART: [kat] ECC-384
6,690,573 UART: [kat] HMAC-384Kdf
6,702,965 UART: [kat] LMS
7,893,114 UART: [kat] --
7,895,050 UART: [cold-reset] ++
7,896,448 UART: [fht] Storing FHT @ 0x50003400
7,909,577 UART: [idev] ++
7,910,134 UART: [idev] CDI.KEYID = 6
7,911,071 UART: [idev] SUBJECT.KEYID = 7
7,912,344 UART: [idev] UDS.KEYID = 0
7,914,949 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,058,330 UART: [idev] Erasing UDS.KEYID = 0
11,196,569 UART: [idev] Using Sha1 for KeyId Algorithm
11,220,004 UART: [idev] --
11,223,305 UART: [ldev] ++
11,223,927 UART: [ldev] CDI.KEYID = 6
11,224,810 UART: [ldev] SUBJECT.KEYID = 5
11,226,111 UART: [ldev] AUTHORITY.KEYID = 7
11,227,351 UART: [ldev] FE.KEYID = 1
11,237,425 UART: [ldev] Erasing FE.KEYID = 1
14,526,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,820,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,835,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,850,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,864,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,883,099 UART: [ldev] --
16,888,118 UART: [fwproc] Waiting for Commands...
16,891,023 UART: [fwproc] Received command 0x46574c44
16,893,220 UART: [fwproc] Received Image of size 113760 bytes
20,967,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,043,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,112,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,427,934 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,126,778 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,082,254 >>> mbox cmd response: failed
16,083,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,083,400 >>> mbox cmd response: failed
16,083,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,084,001 >>> mbox cmd response: failed
Initializing fuses
2,050,563 writing to cptra_bootfsm_go
7,906,120 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,880,078 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,078 UART:
192,441 UART: Running Caliptra ROM ...
193,535 UART:
193,693 UART: [state] CFI Enabled
266,836 UART: [state] LifecycleState = Manufacturing
268,748 UART: [state] DebugLocked = No
271,453 UART: [state] WD Timer not started. Device not locked for debugging
274,688 UART: [kat] SHA2-256
453,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,405 UART: [kat] ++
465,862 UART: [kat] sha1
477,226 UART: [kat] SHA2-256
480,244 UART: [kat] SHA2-384
486,924 UART: [kat] SHA2-512-ACC
489,859 UART: [kat] ECC-384
2,949,453 UART: [kat] HMAC-384Kdf
2,970,712 UART: [kat] LMS
3,500,178 UART: [kat] --
3,504,395 UART: [cold-reset] ++
3,505,542 UART: [fht] FHT @ 0x50003400
3,514,904 UART: [idev] ++
3,515,479 UART: [idev] CDI.KEYID = 6
3,516,390 UART: [idev] SUBJECT.KEYID = 7
3,517,607 UART: [idev] UDS.KEYID = 0
3,520,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,057 UART: [idev] Erasing UDS.KEYID = 0
6,025,346 UART: [idev] Sha1 KeyId Algorithm
6,048,023 UART: [idev] --
6,052,370 UART: [ldev] ++
6,052,961 UART: [ldev] CDI.KEYID = 6
6,053,881 UART: [ldev] SUBJECT.KEYID = 5
6,055,046 UART: [ldev] AUTHORITY.KEYID = 7
6,056,284 UART: [ldev] FE.KEYID = 1
6,099,441 UART: [ldev] Erasing FE.KEYID = 1
8,605,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,086 UART: [ldev] --
10,413,657 UART: [fwproc] Wait for Commands...
10,416,356 UART: [fwproc] Recv command 0x46574c44
10,418,450 UART: [fwproc] Recv'd Img size: 114084 bytes
12,744,866 UART: ROM Fatal Error: 0x000B0025
12,747,996 >>> mbox cmd response: failed
12,748,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,792 >>> mbox cmd response: failed
12,749,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,749,352 >>> mbox cmd response: failed
Initializing fuses
2,050,537 writing to cptra_bootfsm_go
2,239,899 UART:
2,240,268 UART: Running Caliptra ROM ...
2,241,353 UART:
2,241,512 UART: [state] CFI Enabled
2,300,053 UART: [state] LifecycleState = Manufacturing
2,301,943 UART: [state] DebugLocked = No
2,303,282 UART: [state] WD Timer not started. Device not locked for debugging
2,307,893 UART: [kat] SHA2-256
2,486,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,557 UART: [kat] ++
2,499,103 UART: [kat] sha1
2,510,535 UART: [kat] SHA2-256
2,513,552 UART: [kat] SHA2-384
2,519,507 UART: [kat] SHA2-512-ACC
2,522,453 UART: [kat] ECC-384
4,985,021 UART: [kat] HMAC-384Kdf
5,006,535 UART: [kat] LMS
5,535,993 UART: [kat] --
5,540,314 UART: [cold-reset] ++
5,541,217 UART: [fht] FHT @ 0x50003400
5,551,874 UART: [idev] ++
5,552,445 UART: [idev] CDI.KEYID = 6
5,553,413 UART: [idev] SUBJECT.KEYID = 7
5,554,573 UART: [idev] UDS.KEYID = 0
5,557,269 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,700,876 UART: [idev] Erasing UDS.KEYID = 0
8,062,467 UART: [idev] Sha1 KeyId Algorithm
8,086,240 UART: [idev] --
8,090,191 UART: [ldev] ++
8,090,785 UART: [ldev] CDI.KEYID = 6
8,091,701 UART: [ldev] SUBJECT.KEYID = 5
8,092,867 UART: [ldev] AUTHORITY.KEYID = 7
8,094,305 UART: [ldev] FE.KEYID = 1
8,133,490 UART: [ldev] Erasing FE.KEYID = 1
10,636,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,352,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,368,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,399,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,419,308 UART: [ldev] --
12,424,151 UART: [fwproc] Wait for Commands...
12,427,061 UART: [fwproc] Recv command 0x46574c44
12,429,160 UART: [fwproc] Recv'd Img size: 114084 bytes
15,860,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,070 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,322,000 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,363,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,508,545 >>> mbox cmd response: failed
12,509,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,690 >>> mbox cmd response: failed
12,509,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,263 >>> mbox cmd response: failed
Initializing fuses
2,045,603 writing to cptra_bootfsm_go
5,419,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,128,960 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,089 writing to cptra_bootfsm_go
193,379 UART:
193,730 UART: Running Caliptra ROM ...
194,899 UART:
604,634 UART: [state] CFI Enabled
618,862 UART: [state] LifecycleState = Manufacturing
620,740 UART: [state] DebugLocked = No
622,247 UART: [state] WD Timer not started. Device not locked for debugging
625,915 UART: [kat] SHA2-256
805,045 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,591 UART: [kat] ++
817,035 UART: [kat] sha1
829,262 UART: [kat] SHA2-256
832,323 UART: [kat] SHA2-384
838,801 UART: [kat] SHA2-512-ACC
841,749 UART: [kat] ECC-384
3,283,823 UART: [kat] HMAC-384Kdf
3,297,073 UART: [kat] LMS
3,826,543 UART: [kat] --
3,833,183 UART: [cold-reset] ++
3,834,688 UART: [fht] FHT @ 0x50003400
3,845,888 UART: [idev] ++
3,846,489 UART: [idev] CDI.KEYID = 6
3,847,381 UART: [idev] SUBJECT.KEYID = 7
3,848,595 UART: [idev] UDS.KEYID = 0
3,851,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,647 UART: [idev] Erasing UDS.KEYID = 0
6,322,637 UART: [idev] Sha1 KeyId Algorithm
6,344,794 UART: [idev] --
6,349,491 UART: [ldev] ++
6,350,085 UART: [ldev] CDI.KEYID = 6
6,351,005 UART: [ldev] SUBJECT.KEYID = 5
6,352,171 UART: [ldev] AUTHORITY.KEYID = 7
6,353,404 UART: [ldev] FE.KEYID = 1
6,364,316 UART: [ldev] Erasing FE.KEYID = 1
8,837,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,233 UART: [ldev] --
10,627,196 UART: [fwproc] Wait for Commands...
10,630,051 UART: [fwproc] Recv command 0x46574c44
10,632,095 UART: [fwproc] Recv'd Img size: 114084 bytes
12,951,707 UART: ROM Fatal Error: 0x000B0025
12,954,823 >>> mbox cmd response: failed
12,955,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,592 >>> mbox cmd response: failed
12,955,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,162 >>> mbox cmd response: failed
Initializing fuses
2,049,399 writing to cptra_bootfsm_go
2,238,736 UART:
2,239,073 UART: Running Caliptra ROM ...
2,240,206 UART:
7,506,965 UART: [state] CFI Enabled
7,523,468 UART: [state] LifecycleState = Manufacturing
7,525,459 UART: [state] DebugLocked = No
7,527,882 UART: [state] WD Timer not started. Device not locked for debugging
7,530,952 UART: [kat] SHA2-256
7,710,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,721,683 UART: [kat] ++
7,722,221 UART: [kat] sha1
7,731,931 UART: [kat] SHA2-256
7,734,945 UART: [kat] SHA2-384
7,739,964 UART: [kat] SHA2-512-ACC
7,742,913 UART: [kat] ECC-384
10,184,558 UART: [kat] HMAC-384Kdf
10,196,782 UART: [kat] LMS
10,726,292 UART: [kat] --
10,730,763 UART: [cold-reset] ++
10,732,579 UART: [fht] FHT @ 0x50003400
10,743,658 UART: [idev] ++
10,744,227 UART: [idev] CDI.KEYID = 6
10,745,197 UART: [idev] SUBJECT.KEYID = 7
10,746,376 UART: [idev] UDS.KEYID = 0
10,749,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,892,629 UART: [idev] Erasing UDS.KEYID = 0
13,218,079 UART: [idev] Sha1 KeyId Algorithm
13,240,129 UART: [idev] --
13,245,093 UART: [ldev] ++
13,245,658 UART: [ldev] CDI.KEYID = 6
13,246,541 UART: [ldev] SUBJECT.KEYID = 5
13,247,751 UART: [ldev] AUTHORITY.KEYID = 7
13,248,979 UART: [ldev] FE.KEYID = 1
13,259,594 UART: [ldev] Erasing FE.KEYID = 1
15,735,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,454,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,470,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,486,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,502,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,523,119 UART: [ldev] --
17,527,258 UART: [fwproc] Wait for Commands...
17,529,772 UART: [fwproc] Recv command 0x46574c44
17,531,877 UART: [fwproc] Recv'd Img size: 114084 bytes
20,958,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,034,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,103,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,419,886 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,693,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,719,041 >>> mbox cmd response: failed
12,719,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,986 >>> mbox cmd response: failed
12,720,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,720,591 >>> mbox cmd response: failed
Initializing fuses
2,053,537 writing to cptra_bootfsm_go
10,833,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,427,967 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,140 UART:
192,495 UART: Running Caliptra ROM ...
193,682 UART:
193,839 UART: [state] CFI Enabled
259,049 UART: [state] LifecycleState = Manufacturing
261,123 UART: [state] DebugLocked = No
263,672 UART: [state] WD Timer not started. Device not locked for debugging
267,982 UART: [kat] SHA2-256
457,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,629 UART: [kat] ++
469,083 UART: [kat] sha1
481,587 UART: [kat] SHA2-256
484,607 UART: [kat] SHA2-384
490,322 UART: [kat] SHA2-512-ACC
492,938 UART: [kat] ECC-384
2,946,734 UART: [kat] HMAC-384Kdf
2,969,800 UART: [kat] LMS
3,501,523 UART: [kat] --
3,505,148 UART: [cold-reset] ++
3,507,348 UART: [fht] FHT @ 0x50003400
3,519,063 UART: [idev] ++
3,519,760 UART: [idev] CDI.KEYID = 6
3,520,734 UART: [idev] SUBJECT.KEYID = 7
3,521,950 UART: [idev] UDS.KEYID = 0
3,524,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,502 UART: [idev] Erasing UDS.KEYID = 0
6,029,868 UART: [idev] Sha1 KeyId Algorithm
6,053,654 UART: [idev] --
6,059,760 UART: [ldev] ++
6,060,439 UART: [ldev] CDI.KEYID = 6
6,061,381 UART: [ldev] SUBJECT.KEYID = 5
6,062,543 UART: [ldev] AUTHORITY.KEYID = 7
6,063,801 UART: [ldev] FE.KEYID = 1
6,098,414 UART: [ldev] Erasing FE.KEYID = 1
8,607,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,422 UART: [ldev] --
10,410,694 UART: [fwproc] Wait for Commands...
10,412,303 UART: [fwproc] Recv command 0x46574c44
10,414,580 UART: [fwproc] Recv'd Img size: 114084 bytes
12,776,170 UART: ROM Fatal Error: 0x000B0025
12,779,778 >>> mbox cmd response: failed
12,780,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,780,529 >>> mbox cmd response: failed
12,780,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,781,115 >>> mbox cmd response: failed
Initializing fuses
2,052,616 writing to cptra_bootfsm_go
2,241,941 UART:
2,242,292 UART: Running Caliptra ROM ...
2,243,428 UART:
2,243,595 UART: [state] CFI Enabled
2,306,805 UART: [state] LifecycleState = Manufacturing
2,309,175 UART: [state] DebugLocked = No
2,311,215 UART: [state] WD Timer not started. Device not locked for debugging
2,315,841 UART: [kat] SHA2-256
2,505,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,513 UART: [kat] ++
2,517,028 UART: [kat] sha1
2,528,615 UART: [kat] SHA2-256
2,531,652 UART: [kat] SHA2-384
2,536,565 UART: [kat] SHA2-512-ACC
2,539,139 UART: [kat] ECC-384
4,989,969 UART: [kat] HMAC-384Kdf
5,014,727 UART: [kat] LMS
5,546,495 UART: [kat] --
5,549,796 UART: [cold-reset] ++
5,551,135 UART: [fht] FHT @ 0x50003400
5,562,286 UART: [idev] ++
5,562,974 UART: [idev] CDI.KEYID = 6
5,563,989 UART: [idev] SUBJECT.KEYID = 7
5,565,152 UART: [idev] UDS.KEYID = 0
5,567,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,711,271 UART: [idev] Erasing UDS.KEYID = 0
8,069,459 UART: [idev] Sha1 KeyId Algorithm
8,092,538 UART: [idev] --
8,096,784 UART: [ldev] ++
8,097,477 UART: [ldev] CDI.KEYID = 6
8,098,363 UART: [ldev] SUBJECT.KEYID = 5
8,099,580 UART: [ldev] AUTHORITY.KEYID = 7
8,100,759 UART: [ldev] FE.KEYID = 1
8,142,383 UART: [ldev] Erasing FE.KEYID = 1
10,647,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,832 UART: [ldev] --
12,454,738 UART: [fwproc] Wait for Commands...
12,457,050 UART: [fwproc] Recv command 0x46574c44
12,459,336 UART: [fwproc] Recv'd Img size: 114084 bytes
15,945,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,024,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,141,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,682,523 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,423,322 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,691,013 >>> mbox cmd response: failed
12,691,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,691,927 >>> mbox cmd response: failed
12,692,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,692,490 >>> mbox cmd response: failed
Initializing fuses
2,050,157 writing to cptra_bootfsm_go
5,486,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,829,415 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
192,659 UART:
193,021 UART: Running Caliptra ROM ...
194,135 UART:
603,961 UART: [state] CFI Enabled
618,736 UART: [state] LifecycleState = Manufacturing
621,103 UART: [state] DebugLocked = No
622,450 UART: [state] WD Timer not started. Device not locked for debugging
627,589 UART: [kat] SHA2-256
817,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,266 UART: [kat] ++
828,857 UART: [kat] sha1
840,820 UART: [kat] SHA2-256
843,871 UART: [kat] SHA2-384
849,317 UART: [kat] SHA2-512-ACC
851,870 UART: [kat] ECC-384
3,296,357 UART: [kat] HMAC-384Kdf
3,309,085 UART: [kat] LMS
3,840,887 UART: [kat] --
3,846,465 UART: [cold-reset] ++
3,848,453 UART: [fht] FHT @ 0x50003400
3,860,079 UART: [idev] ++
3,860,767 UART: [idev] CDI.KEYID = 6
3,861,784 UART: [idev] SUBJECT.KEYID = 7
3,862,903 UART: [idev] UDS.KEYID = 0
3,865,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,009,064 UART: [idev] Erasing UDS.KEYID = 0
6,340,638 UART: [idev] Sha1 KeyId Algorithm
6,363,775 UART: [idev] --
6,367,096 UART: [ldev] ++
6,367,680 UART: [ldev] CDI.KEYID = 6
6,368,596 UART: [ldev] SUBJECT.KEYID = 5
6,369,710 UART: [ldev] AUTHORITY.KEYID = 7
6,371,001 UART: [ldev] FE.KEYID = 1
6,383,491 UART: [ldev] Erasing FE.KEYID = 1
8,858,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,025 UART: [ldev] --
10,649,996 UART: [fwproc] Wait for Commands...
10,652,316 UART: [fwproc] Recv command 0x46574c44
10,654,628 UART: [fwproc] Recv'd Img size: 114084 bytes
13,015,148 UART: ROM Fatal Error: 0x000B0025
13,018,755 >>> mbox cmd response: failed
13,019,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,019,493 >>> mbox cmd response: failed
13,019,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,020,060 >>> mbox cmd response: failed
Initializing fuses
2,053,130 writing to cptra_bootfsm_go
2,242,526 UART:
2,242,896 UART: Running Caliptra ROM ...
2,244,038 UART:
7,437,510 UART: [state] CFI Enabled
7,450,704 UART: [state] LifecycleState = Manufacturing
7,453,055 UART: [state] DebugLocked = No
7,454,609 UART: [state] WD Timer not started. Device not locked for debugging
7,459,866 UART: [kat] SHA2-256
7,649,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,660,538 UART: [kat] ++
7,661,095 UART: [kat] sha1
7,673,662 UART: [kat] SHA2-256
7,676,686 UART: [kat] SHA2-384
7,681,867 UART: [kat] SHA2-512-ACC
7,684,431 UART: [kat] ECC-384
10,128,471 UART: [kat] HMAC-384Kdf
10,140,950 UART: [kat] LMS
10,672,801 UART: [kat] --
10,676,465 UART: [cold-reset] ++
10,678,933 UART: [fht] FHT @ 0x50003400
10,690,499 UART: [idev] ++
10,691,174 UART: [idev] CDI.KEYID = 6
10,692,185 UART: [idev] SUBJECT.KEYID = 7
10,693,342 UART: [idev] UDS.KEYID = 0
10,696,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,839,427 UART: [idev] Erasing UDS.KEYID = 0
13,168,877 UART: [idev] Sha1 KeyId Algorithm
13,191,466 UART: [idev] --
13,196,137 UART: [ldev] ++
13,196,828 UART: [ldev] CDI.KEYID = 6
13,197,740 UART: [ldev] SUBJECT.KEYID = 5
13,198,951 UART: [ldev] AUTHORITY.KEYID = 7
13,200,128 UART: [ldev] FE.KEYID = 1
13,209,064 UART: [ldev] Erasing FE.KEYID = 1
15,684,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,403,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,418,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,433,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,448,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,468,890 UART: [ldev] --
17,474,040 UART: [fwproc] Wait for Commands...
17,476,730 UART: [fwproc] Recv command 0x46574c44
17,478,990 UART: [fwproc] Recv'd Img size: 114084 bytes
20,959,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,036,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,152,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,692,512 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,751,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,915,905 >>> mbox cmd response: failed
12,916,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,018 >>> mbox cmd response: failed
12,917,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,650 >>> mbox cmd response: failed
Initializing fuses
2,050,361 writing to cptra_bootfsm_go
10,701,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,951,832 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Manufacturing
85,793 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,349 UART: [kat] SHA2-256
892,287 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,104 UART: [kat] LMS
1,475,300 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,966 UART: [idev] Erasing UDS.KEYID = 0
1,505,330 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,994 UART: [idev] --
1,515,163 UART: [ldev] ++
1,515,331 UART: [ldev] CDI.KEYID = 6
1,515,694 UART: [ldev] SUBJECT.KEYID = 5
1,516,120 UART: [ldev] AUTHORITY.KEYID = 7
1,516,583 UART: [ldev] FE.KEYID = 1
1,521,559 UART: [ldev] Erasing FE.KEYID = 1
1,547,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,553 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 114084 bytes
1,880,364 UART: ROM Fatal Error: 0x000B0025
1,881,521 >>> mbox cmd response: failed
1,881,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,527 >>> mbox cmd response: failed
1,881,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,383 UART: [kat] SHA2-256
882,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,429 UART: [kat] ++
886,581 UART: [kat] sha1
890,871 UART: [kat] SHA2-256
892,809 UART: [kat] SHA2-384
895,630 UART: [kat] SHA2-512-ACC
897,531 UART: [kat] ECC-384
903,004 UART: [kat] HMAC-384Kdf
907,646 UART: [kat] LMS
1,475,842 UART: [kat] --
1,476,783 UART: [cold-reset] ++
1,477,143 UART: [fht] Storing FHT @ 0x50003400
1,480,008 UART: [idev] ++
1,480,176 UART: [idev] CDI.KEYID = 6
1,480,536 UART: [idev] SUBJECT.KEYID = 7
1,480,960 UART: [idev] UDS.KEYID = 0
1,481,305 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,628 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,306 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,912 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,224 UART: [fwproc] Received command 0x46574c44
1,587,015 UART: [fwproc] Received Image of size 114084 bytes
2,881,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,495 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,732,000 >>> mbox cmd response: failed
1,732,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,006 >>> mbox cmd response: failed
1,732,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,839 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Manufacturing
86,294 UART: [state] DebugLocked = No
87,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,622 UART: [kat] SHA2-256
882,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,668 UART: [kat] ++
886,820 UART: [kat] sha1
891,206 UART: [kat] SHA2-256
893,144 UART: [kat] SHA2-384
895,787 UART: [kat] SHA2-512-ACC
897,688 UART: [kat] ECC-384
903,303 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,250 UART: [cold-reset] ++
1,477,770 UART: [fht] Storing FHT @ 0x50003400
1,480,635 UART: [idev] ++
1,480,803 UART: [idev] CDI.KEYID = 6
1,481,163 UART: [idev] SUBJECT.KEYID = 7
1,481,587 UART: [idev] UDS.KEYID = 0
1,481,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,715 UART: [idev] --
1,515,976 UART: [ldev] ++
1,516,144 UART: [ldev] CDI.KEYID = 6
1,516,507 UART: [ldev] SUBJECT.KEYID = 5
1,516,933 UART: [ldev] AUTHORITY.KEYID = 7
1,517,396 UART: [ldev] FE.KEYID = 1
1,522,546 UART: [ldev] Erasing FE.KEYID = 1
1,548,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,405 UART: [ldev] --
1,587,900 UART: [fwproc] Waiting for Commands...
1,588,695 UART: [fwproc] Received command 0x46574c44
1,589,486 UART: [fwproc] Received Image of size 114084 bytes
1,881,977 UART: ROM Fatal Error: 0x000B0025
1,883,134 >>> mbox cmd response: failed
1,883,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,140 >>> mbox cmd response: failed
1,883,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,883,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,273 UART: [kat] HMAC-384Kdf
908,059 UART: [kat] LMS
1,476,255 UART: [kat] --
1,477,142 UART: [cold-reset] ++
1,477,474 UART: [fht] Storing FHT @ 0x50003400
1,480,213 UART: [idev] ++
1,480,381 UART: [idev] CDI.KEYID = 6
1,480,741 UART: [idev] SUBJECT.KEYID = 7
1,481,165 UART: [idev] UDS.KEYID = 0
1,481,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,559 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,347 UART: [idev] --
1,515,250 UART: [ldev] ++
1,515,418 UART: [ldev] CDI.KEYID = 6
1,515,781 UART: [ldev] SUBJECT.KEYID = 5
1,516,207 UART: [ldev] AUTHORITY.KEYID = 7
1,516,670 UART: [ldev] FE.KEYID = 1
1,522,108 UART: [ldev] Erasing FE.KEYID = 1
1,547,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,204 UART: [fwproc] Waiting for Commands...
1,588,039 UART: [fwproc] Received command 0x46574c44
1,588,830 UART: [fwproc] Received Image of size 114084 bytes
2,883,951 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,751 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,714 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,732,957 >>> mbox cmd response: failed
1,732,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,963 >>> mbox cmd response: failed
1,732,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,532 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Manufacturing
86,005 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
893,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,635 UART: [kat] ++
897,787 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,172,165 UART: [cold-reset] ++
1,172,611 UART: [fht] FHT @ 0x50003400
1,175,328 UART: [idev] ++
1,175,496 UART: [idev] CDI.KEYID = 6
1,175,856 UART: [idev] SUBJECT.KEYID = 7
1,176,280 UART: [idev] UDS.KEYID = 0
1,176,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,058 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,617 UART: [ldev] ++
1,210,785 UART: [ldev] CDI.KEYID = 6
1,211,148 UART: [ldev] SUBJECT.KEYID = 5
1,211,574 UART: [ldev] AUTHORITY.KEYID = 7
1,212,037 UART: [ldev] FE.KEYID = 1
1,217,195 UART: [ldev] Erasing FE.KEYID = 1
1,243,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,749 UART: [ldev] --
1,283,198 UART: [fwproc] Wait for Commands...
1,283,868 UART: [fwproc] Recv command 0x46574c44
1,284,596 UART: [fwproc] Recv'd Img size: 114084 bytes
1,576,837 UART: ROM Fatal Error: 0x000B0025
1,577,994 >>> mbox cmd response: failed
1,577,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,000 >>> mbox cmd response: failed
1,578,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
893,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,587 UART: [kat] ++
897,739 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,350 UART: [kat] SHA2-512-ACC
908,251 UART: [kat] ECC-384
917,924 UART: [kat] HMAC-384Kdf
922,562 UART: [kat] LMS
1,170,890 UART: [kat] --
1,171,725 UART: [cold-reset] ++
1,172,105 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,382 UART: [idev] Erasing UDS.KEYID = 0
1,200,127 UART: [idev] Sha1 KeyId Algorithm
1,208,573 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,300 UART: [ldev] SUBJECT.KEYID = 5
1,210,726 UART: [ldev] AUTHORITY.KEYID = 7
1,211,189 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,606 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,137 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,472 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,430,129 >>> mbox cmd response: failed
1,430,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,135 >>> mbox cmd response: failed
1,430,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,455 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,491 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Manufacturing
86,600 UART: [state] DebugLocked = No
87,324 UART: [state] WD Timer not started. Device not locked for debugging
88,587 UART: [kat] SHA2-256
894,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,362 UART: [kat] ++
898,514 UART: [kat] sha1
902,868 UART: [kat] SHA2-256
904,808 UART: [kat] SHA2-384
907,599 UART: [kat] SHA2-512-ACC
909,500 UART: [kat] ECC-384
919,037 UART: [kat] HMAC-384Kdf
923,537 UART: [kat] LMS
1,171,865 UART: [kat] --
1,172,730 UART: [cold-reset] ++
1,173,248 UART: [fht] FHT @ 0x50003400
1,175,807 UART: [idev] ++
1,175,975 UART: [idev] CDI.KEYID = 6
1,176,335 UART: [idev] SUBJECT.KEYID = 7
1,176,759 UART: [idev] UDS.KEYID = 0
1,177,104 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,651 UART: [idev] Erasing UDS.KEYID = 0
1,201,136 UART: [idev] Sha1 KeyId Algorithm
1,209,750 UART: [idev] --
1,210,734 UART: [ldev] ++
1,210,902 UART: [ldev] CDI.KEYID = 6
1,211,265 UART: [ldev] SUBJECT.KEYID = 5
1,211,691 UART: [ldev] AUTHORITY.KEYID = 7
1,212,154 UART: [ldev] FE.KEYID = 1
1,217,336 UART: [ldev] Erasing FE.KEYID = 1
1,243,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,646 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,679 UART: [fwproc] Recv command 0x46574c44
1,284,407 UART: [fwproc] Recv'd Img size: 114084 bytes
1,576,090 UART: ROM Fatal Error: 0x000B0025
1,577,247 >>> mbox cmd response: failed
1,577,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,253 >>> mbox cmd response: failed
1,577,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,259 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
893,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,918 UART: [kat] ++
898,070 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,913 UART: [kat] SHA2-512-ACC
908,814 UART: [kat] ECC-384
918,939 UART: [kat] HMAC-384Kdf
923,731 UART: [kat] LMS
1,172,059 UART: [kat] --
1,172,844 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,175,861 UART: [idev] ++
1,176,029 UART: [idev] CDI.KEYID = 6
1,176,389 UART: [idev] SUBJECT.KEYID = 7
1,176,813 UART: [idev] UDS.KEYID = 0
1,177,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,815 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,690 UART: [idev] --
1,211,832 UART: [ldev] ++
1,212,000 UART: [ldev] CDI.KEYID = 6
1,212,363 UART: [ldev] SUBJECT.KEYID = 5
1,212,789 UART: [ldev] AUTHORITY.KEYID = 7
1,213,252 UART: [ldev] FE.KEYID = 1
1,218,336 UART: [ldev] Erasing FE.KEYID = 1
1,244,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,614 UART: [ldev] --
1,283,983 UART: [fwproc] Wait for Commands...
1,284,607 UART: [fwproc] Recv command 0x46574c44
1,285,335 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,041 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,432,576 >>> mbox cmd response: failed
1,432,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,582 >>> mbox cmd response: failed
1,432,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,252 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Manufacturing
85,595 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,623 UART: [kat] SHA2-256
901,563 UART: [kat] SHA2-384
904,116 UART: [kat] SHA2-512-ACC
906,017 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,639 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,173,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,269 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,109 UART: [idev] --
1,208,040 UART: [ldev] ++
1,208,208 UART: [ldev] CDI.KEYID = 6
1,208,572 UART: [ldev] SUBJECT.KEYID = 5
1,208,999 UART: [ldev] AUTHORITY.KEYID = 7
1,209,462 UART: [ldev] FE.KEYID = 1
1,214,598 UART: [ldev] Erasing FE.KEYID = 1
1,240,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 114084 bytes
1,574,079 UART: ROM Fatal Error: 0x000B0025
1,575,236 >>> mbox cmd response: failed
1,575,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,242 >>> mbox cmd response: failed
1,575,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,201 UART: [kat] ++
895,353 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,365 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,753 UART: [fwproc] Recv command 0x46574c44
1,282,486 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,138 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,341 >>> mbox cmd response: failed
1,427,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,347 >>> mbox cmd response: failed
1,427,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Manufacturing
86,368 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,119 UART: [kat] LMS
1,169,431 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,498 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,208,997 UART: [ldev] ++
1,209,165 UART: [ldev] CDI.KEYID = 6
1,209,529 UART: [ldev] SUBJECT.KEYID = 5
1,209,956 UART: [ldev] AUTHORITY.KEYID = 7
1,210,419 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,067 UART: [ldev] --
1,281,473 UART: [fwproc] Wait for Commands...
1,282,074 UART: [fwproc] Recv command 0x46574c44
1,282,807 UART: [fwproc] Recv'd Img size: 114084 bytes
1,574,274 UART: ROM Fatal Error: 0x000B0025
1,575,431 >>> mbox cmd response: failed
1,575,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,437 >>> mbox cmd response: failed
1,575,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,169,970 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,021 UART: [ldev] --
1,280,381 UART: [fwproc] Wait for Commands...
1,281,136 UART: [fwproc] Recv command 0x46574c44
1,281,869 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,895 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,426,290 >>> mbox cmd response: failed
1,426,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,296 >>> mbox cmd response: failed
1,426,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,302 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,583 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,029 UART:
192,396 UART: Running Caliptra ROM ...
193,536 UART:
193,683 UART: [state] CFI Enabled
263,489 UART: [state] LifecycleState = Manufacturing
265,475 UART: [state] DebugLocked = No
266,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,986 UART: [kat] SHA2-256
441,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,203 UART: [kat] ++
452,659 UART: [kat] sha1
462,345 UART: [kat] SHA2-256
465,023 UART: [kat] SHA2-384
470,685 UART: [kat] SHA2-512-ACC
473,074 UART: [kat] ECC-384
2,764,926 UART: [kat] HMAC-384Kdf
2,778,877 UART: [kat] LMS
3,969,199 UART: [kat] --
3,972,779 UART: [cold-reset] ++
3,974,931 UART: [fht] Storing FHT @ 0x50003400
3,987,393 UART: [idev] ++
3,987,960 UART: [idev] CDI.KEYID = 6
3,988,928 UART: [idev] SUBJECT.KEYID = 7
3,990,146 UART: [idev] UDS.KEYID = 0
3,993,072 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,399 UART: [idev] Erasing UDS.KEYID = 0
7,325,190 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,517 UART: [idev] --
7,351,050 UART: [ldev] ++
7,351,629 UART: [ldev] CDI.KEYID = 6
7,352,613 UART: [ldev] SUBJECT.KEYID = 5
7,353,832 UART: [ldev] AUTHORITY.KEYID = 7
7,355,064 UART: [ldev] FE.KEYID = 1
7,401,937 UART: [ldev] Erasing FE.KEYID = 1
10,734,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,970 UART: [ldev] --
13,114,320 UART: [fwproc] Waiting for Commands...
13,117,065 UART: [fwproc] Received command 0x46574c44
13,119,256 UART: [fwproc] Received Image of size 113760 bytes
16,092,615 UART: ROM Fatal Error: 0x000B0027
16,096,025 >>> mbox cmd response: failed
16,096,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,096,823 >>> mbox cmd response: failed
16,097,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,097,390 >>> mbox cmd response: failed
Initializing fuses
2,049,516 writing to cptra_bootfsm_go
2,238,815 UART:
2,239,164 UART: Running Caliptra ROM ...
2,240,303 UART:
2,240,474 UART: [state] CFI Enabled
2,299,091 UART: [state] LifecycleState = Manufacturing
2,301,039 UART: [state] DebugLocked = No
2,303,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,535 UART: [kat] SHA2-256
2,478,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,757 UART: [kat] ++
2,489,253 UART: [kat] sha1
2,500,090 UART: [kat] SHA2-256
2,502,781 UART: [kat] SHA2-384
2,508,511 UART: [kat] SHA2-512-ACC
2,510,864 UART: [kat] ECC-384
4,802,238 UART: [kat] HMAC-384Kdf
4,824,627 UART: [kat] LMS
6,014,926 UART: [kat] --
6,018,995 UART: [cold-reset] ++
6,020,429 UART: [fht] Storing FHT @ 0x50003400
6,030,796 UART: [idev] ++
6,031,365 UART: [idev] CDI.KEYID = 6
6,032,385 UART: [idev] SUBJECT.KEYID = 7
6,033,554 UART: [idev] UDS.KEYID = 0
6,036,256 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,179,482 UART: [idev] Erasing UDS.KEYID = 0
9,368,600 UART: [idev] Using Sha1 for KeyId Algorithm
9,389,134 UART: [idev] --
9,393,325 UART: [ldev] ++
9,393,902 UART: [ldev] CDI.KEYID = 6
9,394,844 UART: [ldev] SUBJECT.KEYID = 5
9,396,096 UART: [ldev] AUTHORITY.KEYID = 7
9,397,337 UART: [ldev] FE.KEYID = 1
9,424,331 UART: [ldev] Erasing FE.KEYID = 1
12,759,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,071,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,086,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,100,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,115,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,134,807 UART: [ldev] --
15,140,145 UART: [fwproc] Waiting for Commands...
15,143,163 UART: [fwproc] Received command 0x46574c44
15,145,358 UART: [fwproc] Received Image of size 113760 bytes
19,219,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,294,087 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,363,002 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,678,539 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,788,046 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,868,840 >>> mbox cmd response: failed
15,869,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,869,800 >>> mbox cmd response: failed
15,870,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,870,365 >>> mbox cmd response: failed
Initializing fuses
2,049,566 writing to cptra_bootfsm_go
5,838,088 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,925,940 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,554 UART:
192,922 UART: Running Caliptra ROM ...
194,056 UART:
603,664 UART: [state] CFI Enabled
619,785 UART: [state] LifecycleState = Manufacturing
621,706 UART: [state] DebugLocked = No
624,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,069 UART: [kat] SHA2-256
797,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,382 UART: [kat] ++
808,829 UART: [kat] sha1
821,001 UART: [kat] SHA2-256
823,748 UART: [kat] SHA2-384
828,392 UART: [kat] SHA2-512-ACC
830,769 UART: [kat] ECC-384
3,115,428 UART: [kat] HMAC-384Kdf
3,127,177 UART: [kat] LMS
4,317,288 UART: [kat] --
4,323,117 UART: [cold-reset] ++
4,324,888 UART: [fht] Storing FHT @ 0x50003400
4,335,935 UART: [idev] ++
4,336,497 UART: [idev] CDI.KEYID = 6
4,337,403 UART: [idev] SUBJECT.KEYID = 7
4,338,667 UART: [idev] UDS.KEYID = 0
4,341,382 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,448 UART: [idev] Erasing UDS.KEYID = 0
7,626,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,878 UART: [idev] --
7,651,389 UART: [ldev] ++
7,651,962 UART: [ldev] CDI.KEYID = 6
7,652,899 UART: [ldev] SUBJECT.KEYID = 5
7,654,134 UART: [ldev] AUTHORITY.KEYID = 7
7,655,365 UART: [ldev] FE.KEYID = 1
7,665,284 UART: [ldev] Erasing FE.KEYID = 1
10,954,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,390 UART: [ldev] --
13,318,651 UART: [fwproc] Waiting for Commands...
13,321,403 UART: [fwproc] Received command 0x46574c44
13,323,589 UART: [fwproc] Received Image of size 113760 bytes
16,296,913 UART: ROM Fatal Error: 0x000B0027
16,300,309 >>> mbox cmd response: failed
16,300,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,301,081 >>> mbox cmd response: failed
16,301,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,301,662 >>> mbox cmd response: failed
Initializing fuses
2,050,558 writing to cptra_bootfsm_go
2,239,844 UART:
2,240,200 UART: Running Caliptra ROM ...
2,241,247 UART:
4,171,285 UART: [state] CFI Enabled
4,185,710 UART: [state] LifecycleState = Manufacturing
4,187,627 UART: [state] DebugLocked = No
4,189,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,195,340 UART: [kat] SHA2-256
4,365,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,375,578 UART: [kat] ++
4,376,125 UART: [kat] sha1
4,385,457 UART: [kat] SHA2-256
4,388,152 UART: [kat] SHA2-384
4,393,275 UART: [kat] SHA2-512-ACC
4,395,633 UART: [kat] ECC-384
6,679,941 UART: [kat] HMAC-384Kdf
6,692,877 UART: [kat] LMS
7,882,978 UART: [kat] --
7,887,692 UART: [cold-reset] ++
7,888,791 UART: [fht] Storing FHT @ 0x50003400
7,900,232 UART: [idev] ++
7,900,864 UART: [idev] CDI.KEYID = 6
7,901,780 UART: [idev] SUBJECT.KEYID = 7
7,902,995 UART: [idev] UDS.KEYID = 0
7,905,818 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,048,831 UART: [idev] Erasing UDS.KEYID = 0
11,187,430 UART: [idev] Using Sha1 for KeyId Algorithm
11,209,184 UART: [idev] --
11,213,173 UART: [ldev] ++
11,213,737 UART: [ldev] CDI.KEYID = 6
11,214,698 UART: [ldev] SUBJECT.KEYID = 5
11,215,954 UART: [ldev] AUTHORITY.KEYID = 7
11,217,189 UART: [ldev] FE.KEYID = 1
11,227,670 UART: [ldev] Erasing FE.KEYID = 1
14,519,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,812,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,827,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,842,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,856,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,876,810 UART: [ldev] --
16,880,723 UART: [fwproc] Waiting for Commands...
16,883,974 UART: [fwproc] Received command 0x46574c44
16,886,216 UART: [fwproc] Received Image of size 113760 bytes
20,968,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,045,084 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,113,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,429,990 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,131,727 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,077,013 >>> mbox cmd response: failed
16,077,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,078,105 >>> mbox cmd response: failed
16,078,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,078,684 >>> mbox cmd response: failed
Initializing fuses
2,050,227 writing to cptra_bootfsm_go
7,920,305 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,887,501 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,231 UART:
192,593 UART: Running Caliptra ROM ...
193,692 UART:
193,832 UART: [state] CFI Enabled
262,135 UART: [state] LifecycleState = Manufacturing
263,991 UART: [state] DebugLocked = No
266,471 UART: [state] WD Timer not started. Device not locked for debugging
269,648 UART: [kat] SHA2-256
448,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,383 UART: [kat] ++
460,827 UART: [kat] sha1
471,916 UART: [kat] SHA2-256
474,977 UART: [kat] SHA2-384
480,420 UART: [kat] SHA2-512-ACC
483,350 UART: [kat] ECC-384
2,947,612 UART: [kat] HMAC-384Kdf
2,972,329 UART: [kat] LMS
3,501,810 UART: [kat] --
3,504,996 UART: [cold-reset] ++
3,506,167 UART: [fht] FHT @ 0x50003400
3,517,518 UART: [idev] ++
3,518,090 UART: [idev] CDI.KEYID = 6
3,519,162 UART: [idev] SUBJECT.KEYID = 7
3,520,268 UART: [idev] UDS.KEYID = 0
3,523,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,909 UART: [idev] Erasing UDS.KEYID = 0
6,024,543 UART: [idev] Sha1 KeyId Algorithm
6,047,223 UART: [idev] --
6,049,793 UART: [ldev] ++
6,050,373 UART: [ldev] CDI.KEYID = 6
6,051,291 UART: [ldev] SUBJECT.KEYID = 5
6,052,472 UART: [ldev] AUTHORITY.KEYID = 7
6,053,708 UART: [ldev] FE.KEYID = 1
6,101,016 UART: [ldev] Erasing FE.KEYID = 1
8,607,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,641 UART: [ldev] --
10,415,011 UART: [fwproc] Wait for Commands...
10,418,198 UART: [fwproc] Recv command 0x46574c44
10,420,240 UART: [fwproc] Recv'd Img size: 114084 bytes
12,742,522 UART: ROM Fatal Error: 0x000B0027
12,745,637 >>> mbox cmd response: failed
12,746,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,423 >>> mbox cmd response: failed
12,746,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,042 >>> mbox cmd response: failed
Initializing fuses
2,051,140 writing to cptra_bootfsm_go
2,240,434 UART:
2,240,778 UART: Running Caliptra ROM ...
2,241,914 UART:
2,242,081 UART: [state] CFI Enabled
2,300,168 UART: [state] LifecycleState = Manufacturing
2,302,053 UART: [state] DebugLocked = No
2,304,423 UART: [state] WD Timer not started. Device not locked for debugging
2,308,440 UART: [kat] SHA2-256
2,487,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,138 UART: [kat] ++
2,499,695 UART: [kat] sha1
2,509,942 UART: [kat] SHA2-256
2,513,021 UART: [kat] SHA2-384
2,518,967 UART: [kat] SHA2-512-ACC
2,521,914 UART: [kat] ECC-384
4,983,982 UART: [kat] HMAC-384Kdf
5,007,181 UART: [kat] LMS
5,536,607 UART: [kat] --
5,539,741 UART: [cold-reset] ++
5,541,568 UART: [fht] FHT @ 0x50003400
5,553,408 UART: [idev] ++
5,553,980 UART: [idev] CDI.KEYID = 6
5,554,915 UART: [idev] SUBJECT.KEYID = 7
5,556,124 UART: [idev] UDS.KEYID = 0
5,558,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,702,366 UART: [idev] Erasing UDS.KEYID = 0
8,062,390 UART: [idev] Sha1 KeyId Algorithm
8,086,267 UART: [idev] --
8,090,425 UART: [ldev] ++
8,091,004 UART: [ldev] CDI.KEYID = 6
8,091,923 UART: [ldev] SUBJECT.KEYID = 5
8,093,083 UART: [ldev] AUTHORITY.KEYID = 7
8,094,321 UART: [ldev] FE.KEYID = 1
8,135,714 UART: [ldev] Erasing FE.KEYID = 1
10,641,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,851 UART: [ldev] --
12,449,690 UART: [fwproc] Wait for Commands...
12,451,370 UART: [fwproc] Recv command 0x46574c44
12,453,477 UART: [fwproc] Recv'd Img size: 114084 bytes
15,878,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,947,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,016,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,334,130 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,198 writing to cptra_bootfsm_go
3,364,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,528,591 >>> mbox cmd response: failed
12,529,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,528 >>> mbox cmd response: failed
12,529,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,093 >>> mbox cmd response: failed
Initializing fuses
2,051,479 writing to cptra_bootfsm_go
5,423,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,137,696 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,523 UART:
192,878 UART: Running Caliptra ROM ...
194,055 UART:
603,621 UART: [state] CFI Enabled
614,129 UART: [state] LifecycleState = Manufacturing
616,003 UART: [state] DebugLocked = No
618,847 UART: [state] WD Timer not started. Device not locked for debugging
622,044 UART: [kat] SHA2-256
801,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,736 UART: [kat] ++
813,186 UART: [kat] sha1
823,358 UART: [kat] SHA2-256
826,412 UART: [kat] SHA2-384
831,358 UART: [kat] SHA2-512-ACC
834,286 UART: [kat] ECC-384
3,274,951 UART: [kat] HMAC-384Kdf
3,287,404 UART: [kat] LMS
3,816,921 UART: [kat] --
3,821,884 UART: [cold-reset] ++
3,823,168 UART: [fht] FHT @ 0x50003400
3,833,340 UART: [idev] ++
3,833,907 UART: [idev] CDI.KEYID = 6
3,834,921 UART: [idev] SUBJECT.KEYID = 7
3,836,046 UART: [idev] UDS.KEYID = 0
3,838,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,223 UART: [idev] Erasing UDS.KEYID = 0
6,305,481 UART: [idev] Sha1 KeyId Algorithm
6,327,838 UART: [idev] --
6,331,776 UART: [ldev] ++
6,332,345 UART: [ldev] CDI.KEYID = 6
6,333,254 UART: [ldev] SUBJECT.KEYID = 5
6,334,416 UART: [ldev] AUTHORITY.KEYID = 7
6,335,649 UART: [ldev] FE.KEYID = 1
6,345,105 UART: [ldev] Erasing FE.KEYID = 1
8,816,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,535,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,551,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,567,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,583,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,960 UART: [ldev] --
10,607,972 UART: [fwproc] Wait for Commands...
10,609,481 UART: [fwproc] Recv command 0x46574c44
10,611,523 UART: [fwproc] Recv'd Img size: 114084 bytes
12,932,360 UART: ROM Fatal Error: 0x000B0027
12,935,492 >>> mbox cmd response: failed
12,935,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,242 >>> mbox cmd response: failed
12,936,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,846 >>> mbox cmd response: failed
Initializing fuses
2,049,548 writing to cptra_bootfsm_go
2,238,862 UART:
2,239,240 UART: Running Caliptra ROM ...
2,240,379 UART:
7,519,650 UART: [state] CFI Enabled
7,533,545 UART: [state] LifecycleState = Manufacturing
7,535,404 UART: [state] DebugLocked = No
7,536,734 UART: [state] WD Timer not started. Device not locked for debugging
7,540,434 UART: [kat] SHA2-256
7,719,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,731,165 UART: [kat] ++
7,731,708 UART: [kat] sha1
7,741,465 UART: [kat] SHA2-256
7,744,477 UART: [kat] SHA2-384
7,749,666 UART: [kat] SHA2-512-ACC
7,752,655 UART: [kat] ECC-384
10,195,660 UART: [kat] HMAC-384Kdf
10,208,108 UART: [kat] LMS
10,737,568 UART: [kat] --
10,742,206 UART: [cold-reset] ++
10,743,914 UART: [fht] FHT @ 0x50003400
10,753,981 UART: [idev] ++
10,754,539 UART: [idev] CDI.KEYID = 6
10,755,420 UART: [idev] SUBJECT.KEYID = 7
10,756,685 UART: [idev] UDS.KEYID = 0
10,759,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,902,928 UART: [idev] Erasing UDS.KEYID = 0
13,232,693 UART: [idev] Sha1 KeyId Algorithm
13,255,450 UART: [idev] --
13,260,801 UART: [ldev] ++
13,261,368 UART: [ldev] CDI.KEYID = 6
13,262,304 UART: [ldev] SUBJECT.KEYID = 5
13,263,515 UART: [ldev] AUTHORITY.KEYID = 7
13,264,699 UART: [ldev] FE.KEYID = 1
13,275,791 UART: [ldev] Erasing FE.KEYID = 1
15,751,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,471,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,487,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,503,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,519,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,539,938 UART: [ldev] --
17,545,313 UART: [fwproc] Wait for Commands...
17,547,633 UART: [fwproc] Recv command 0x46574c44
17,549,732 UART: [fwproc] Recv'd Img size: 114084 bytes
20,975,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,048,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,117,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,434,030 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,695,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,738,708 >>> mbox cmd response: failed
12,739,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,761 >>> mbox cmd response: failed
12,740,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,386 >>> mbox cmd response: failed
Initializing fuses
2,057,402 writing to cptra_bootfsm_go
10,822,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,418,964 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,178 UART:
192,541 UART: Running Caliptra ROM ...
193,638 UART:
193,779 UART: [state] CFI Enabled
262,217 UART: [state] LifecycleState = Manufacturing
264,914 UART: [state] DebugLocked = No
265,950 UART: [state] WD Timer not started. Device not locked for debugging
271,393 UART: [kat] SHA2-256
461,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,075 UART: [kat] ++
472,531 UART: [kat] sha1
484,977 UART: [kat] SHA2-256
488,041 UART: [kat] SHA2-384
495,485 UART: [kat] SHA2-512-ACC
498,095 UART: [kat] ECC-384
2,945,812 UART: [kat] HMAC-384Kdf
2,969,125 UART: [kat] LMS
3,500,882 UART: [kat] --
3,505,251 UART: [cold-reset] ++
3,507,454 UART: [fht] FHT @ 0x50003400
3,518,649 UART: [idev] ++
3,519,321 UART: [idev] CDI.KEYID = 6
3,520,338 UART: [idev] SUBJECT.KEYID = 7
3,521,517 UART: [idev] UDS.KEYID = 0
3,524,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,869 UART: [idev] Erasing UDS.KEYID = 0
6,026,050 UART: [idev] Sha1 KeyId Algorithm
6,049,510 UART: [idev] --
6,055,076 UART: [ldev] ++
6,055,765 UART: [ldev] CDI.KEYID = 6
6,056,651 UART: [ldev] SUBJECT.KEYID = 5
6,057,869 UART: [ldev] AUTHORITY.KEYID = 7
6,059,073 UART: [ldev] FE.KEYID = 1
6,098,698 UART: [ldev] Erasing FE.KEYID = 1
8,604,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,287 UART: [ldev] --
10,411,066 UART: [fwproc] Wait for Commands...
10,413,934 UART: [fwproc] Recv command 0x46574c44
10,416,200 UART: [fwproc] Recv'd Img size: 114084 bytes
12,774,745 UART: ROM Fatal Error: 0x000B0027
12,778,411 >>> mbox cmd response: failed
12,778,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,779,153 >>> mbox cmd response: failed
12,779,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,779,719 >>> mbox cmd response: failed
Initializing fuses
2,062,035 writing to cptra_bootfsm_go
2,251,350 UART:
2,251,723 UART: Running Caliptra ROM ...
2,252,776 UART:
2,252,938 UART: [state] CFI Enabled
2,329,009 UART: [state] LifecycleState = Manufacturing
2,331,395 UART: [state] DebugLocked = No
2,332,568 UART: [state] WD Timer not started. Device not locked for debugging
2,335,936 UART: [kat] SHA2-256
2,525,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,573 UART: [kat] ++
2,537,032 UART: [kat] sha1
2,549,548 UART: [kat] SHA2-256
2,552,567 UART: [kat] SHA2-384
2,557,854 UART: [kat] SHA2-512-ACC
2,560,429 UART: [kat] ECC-384
5,014,642 UART: [kat] HMAC-384Kdf
5,038,282 UART: [kat] LMS
5,570,053 UART: [kat] --
5,572,428 UART: [cold-reset] ++
5,573,384 UART: [fht] FHT @ 0x50003400
5,584,794 UART: [idev] ++
5,585,470 UART: [idev] CDI.KEYID = 6
5,586,434 UART: [idev] SUBJECT.KEYID = 7
5,587,648 UART: [idev] UDS.KEYID = 0
5,590,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,733,884 UART: [idev] Erasing UDS.KEYID = 0
8,094,838 UART: [idev] Sha1 KeyId Algorithm
8,116,785 UART: [idev] --
8,122,132 UART: [ldev] ++
8,122,961 UART: [ldev] CDI.KEYID = 6
8,123,901 UART: [ldev] SUBJECT.KEYID = 5
8,125,014 UART: [ldev] AUTHORITY.KEYID = 7
8,126,196 UART: [ldev] FE.KEYID = 1
8,165,922 UART: [ldev] Erasing FE.KEYID = 1
10,677,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,598 UART: [ldev] --
12,478,516 UART: [fwproc] Wait for Commands...
12,480,403 UART: [fwproc] Recv command 0x46574c44
12,482,673 UART: [fwproc] Recv'd Img size: 114084 bytes
15,964,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,038,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,155,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,696,047 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,441,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,695,242 >>> mbox cmd response: failed
12,695,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,696,184 >>> mbox cmd response: failed
12,696,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,696,755 >>> mbox cmd response: failed
Initializing fuses
2,044,675 writing to cptra_bootfsm_go
5,483,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,814,907 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,644 UART:
193,004 UART: Running Caliptra ROM ...
194,104 UART:
603,770 UART: [state] CFI Enabled
616,951 UART: [state] LifecycleState = Manufacturing
619,331 UART: [state] DebugLocked = No
622,029 UART: [state] WD Timer not started. Device not locked for debugging
626,567 UART: [kat] SHA2-256
816,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,233 UART: [kat] ++
827,773 UART: [kat] sha1
839,633 UART: [kat] SHA2-256
842,697 UART: [kat] SHA2-384
848,645 UART: [kat] SHA2-512-ACC
851,199 UART: [kat] ECC-384
3,290,978 UART: [kat] HMAC-384Kdf
3,303,154 UART: [kat] LMS
3,835,020 UART: [kat] --
3,838,791 UART: [cold-reset] ++
3,840,450 UART: [fht] FHT @ 0x50003400
3,852,832 UART: [idev] ++
3,853,543 UART: [idev] CDI.KEYID = 6
3,854,456 UART: [idev] SUBJECT.KEYID = 7
3,855,671 UART: [idev] UDS.KEYID = 0
3,858,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,881 UART: [idev] Erasing UDS.KEYID = 0
6,334,734 UART: [idev] Sha1 KeyId Algorithm
6,357,740 UART: [idev] --
6,362,382 UART: [ldev] ++
6,363,078 UART: [ldev] CDI.KEYID = 6
6,363,989 UART: [ldev] SUBJECT.KEYID = 5
6,365,144 UART: [ldev] AUTHORITY.KEYID = 7
6,366,375 UART: [ldev] FE.KEYID = 1
6,377,560 UART: [ldev] Erasing FE.KEYID = 1
8,848,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,224 UART: [ldev] --
10,642,067 UART: [fwproc] Wait for Commands...
10,643,737 UART: [fwproc] Recv command 0x46574c44
10,646,568 UART: [fwproc] Recv'd Img size: 114084 bytes
13,005,709 UART: ROM Fatal Error: 0x000B0027
13,009,384 >>> mbox cmd response: failed
13,009,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,010,166 >>> mbox cmd response: failed
13,010,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,010,677 >>> mbox cmd response: failed
Initializing fuses
2,056,395 writing to cptra_bootfsm_go
2,245,719 UART:
2,246,065 UART: Running Caliptra ROM ...
2,247,207 UART:
7,441,962 UART: [state] CFI Enabled
7,454,604 UART: [state] LifecycleState = Manufacturing
7,457,001 UART: [state] DebugLocked = No
7,459,662 UART: [state] WD Timer not started. Device not locked for debugging
7,463,649 UART: [kat] SHA2-256
7,653,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,664,348 UART: [kat] ++
7,664,812 UART: [kat] sha1
7,676,514 UART: [kat] SHA2-256
7,679,532 UART: [kat] SHA2-384
7,685,632 UART: [kat] SHA2-512-ACC
7,688,199 UART: [kat] ECC-384
10,127,880 UART: [kat] HMAC-384Kdf
10,142,054 UART: [kat] LMS
10,673,845 UART: [kat] --
10,679,610 UART: [cold-reset] ++
10,681,360 UART: [fht] FHT @ 0x50003400
10,692,722 UART: [idev] ++
10,693,463 UART: [idev] CDI.KEYID = 6
10,694,376 UART: [idev] SUBJECT.KEYID = 7
10,695,609 UART: [idev] UDS.KEYID = 0
10,698,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,841,614 UART: [idev] Erasing UDS.KEYID = 0
13,176,531 UART: [idev] Sha1 KeyId Algorithm
13,199,551 UART: [idev] --
13,204,797 UART: [ldev] ++
13,205,482 UART: [ldev] CDI.KEYID = 6
13,206,391 UART: [ldev] SUBJECT.KEYID = 5
13,207,611 UART: [ldev] AUTHORITY.KEYID = 7
13,208,788 UART: [ldev] FE.KEYID = 1
13,218,086 UART: [ldev] Erasing FE.KEYID = 1
15,693,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,413,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,428,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,443,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,459,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,479,483 UART: [ldev] --
17,485,710 UART: [fwproc] Wait for Commands...
17,488,472 UART: [fwproc] Recv command 0x46574c44
17,490,787 UART: [fwproc] Recv'd Img size: 114084 bytes
20,967,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,043,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,159,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,699,645 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,753,678 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,922,297 >>> mbox cmd response: failed
12,923,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,410 >>> mbox cmd response: failed
12,923,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,993 >>> mbox cmd response: failed
Initializing fuses
2,047,727 writing to cptra_bootfsm_go
10,709,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,943,515 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Manufacturing
86,035 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,623 UART: [kat] SHA2-256
892,561 UART: [kat] SHA2-384
895,286 UART: [kat] SHA2-512-ACC
897,187 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,138 UART: [kat] LMS
1,475,334 UART: [kat] --
1,476,249 UART: [cold-reset] ++
1,476,713 UART: [fht] Storing FHT @ 0x50003400
1,479,302 UART: [idev] ++
1,479,470 UART: [idev] CDI.KEYID = 6
1,479,830 UART: [idev] SUBJECT.KEYID = 7
1,480,254 UART: [idev] UDS.KEYID = 0
1,480,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,538 UART: [idev] --
1,514,583 UART: [ldev] ++
1,514,751 UART: [ldev] CDI.KEYID = 6
1,515,114 UART: [ldev] SUBJECT.KEYID = 5
1,515,540 UART: [ldev] AUTHORITY.KEYID = 7
1,516,003 UART: [ldev] FE.KEYID = 1
1,521,197 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,708 UART: [ldev] --
1,586,169 UART: [fwproc] Waiting for Commands...
1,586,956 UART: [fwproc] Received command 0x46574c44
1,587,747 UART: [fwproc] Received Image of size 114084 bytes
1,878,816 UART: ROM Fatal Error: 0x000B0027
1,879,973 >>> mbox cmd response: failed
1,879,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,979 >>> mbox cmd response: failed
1,879,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
894,960 UART: [kat] SHA2-512-ACC
896,861 UART: [kat] ECC-384
902,236 UART: [kat] HMAC-384Kdf
906,884 UART: [kat] LMS
1,475,080 UART: [kat] --
1,476,087 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,398 UART: [idev] ++
1,479,566 UART: [idev] CDI.KEYID = 6
1,479,926 UART: [idev] SUBJECT.KEYID = 7
1,480,350 UART: [idev] UDS.KEYID = 0
1,480,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,458 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,397 UART: [ldev] ++
1,514,565 UART: [ldev] CDI.KEYID = 6
1,514,928 UART: [ldev] SUBJECT.KEYID = 5
1,515,354 UART: [ldev] AUTHORITY.KEYID = 7
1,515,817 UART: [ldev] FE.KEYID = 1
1,521,167 UART: [ldev] Erasing FE.KEYID = 1
1,547,180 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,010 UART: [ldev] --
1,586,323 UART: [fwproc] Waiting for Commands...
1,587,078 UART: [fwproc] Received command 0x46574c44
1,587,869 UART: [fwproc] Received Image of size 114084 bytes
2,881,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,780 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,501 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,732,992 >>> mbox cmd response: failed
1,732,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,998 >>> mbox cmd response: failed
1,732,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,553 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Manufacturing
86,004 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,325 UART: [kat] LMS
1,475,521 UART: [kat] --
1,476,368 UART: [cold-reset] ++
1,476,762 UART: [fht] Storing FHT @ 0x50003400
1,479,709 UART: [idev] ++
1,479,877 UART: [idev] CDI.KEYID = 6
1,480,237 UART: [idev] SUBJECT.KEYID = 7
1,480,661 UART: [idev] UDS.KEYID = 0
1,481,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,445 UART: [idev] Erasing UDS.KEYID = 0
1,504,569 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,257 UART: [idev] --
1,514,222 UART: [ldev] ++
1,514,390 UART: [ldev] CDI.KEYID = 6
1,514,753 UART: [ldev] SUBJECT.KEYID = 5
1,515,179 UART: [ldev] AUTHORITY.KEYID = 7
1,515,642 UART: [ldev] FE.KEYID = 1
1,520,796 UART: [ldev] Erasing FE.KEYID = 1
1,545,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,107 UART: [ldev] --
1,585,496 UART: [fwproc] Waiting for Commands...
1,586,277 UART: [fwproc] Received command 0x46574c44
1,587,068 UART: [fwproc] Received Image of size 114084 bytes
1,879,029 UART: ROM Fatal Error: 0x000B0027
1,880,186 >>> mbox cmd response: failed
1,880,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,192 >>> mbox cmd response: failed
1,880,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
903,161 UART: [kat] HMAC-384Kdf
907,767 UART: [kat] LMS
1,475,963 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,218 UART: [fht] Storing FHT @ 0x50003400
1,480,025 UART: [idev] ++
1,480,193 UART: [idev] CDI.KEYID = 6
1,480,553 UART: [idev] SUBJECT.KEYID = 7
1,480,977 UART: [idev] UDS.KEYID = 0
1,481,322 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,343 UART: [idev] --
1,515,286 UART: [ldev] ++
1,515,454 UART: [ldev] CDI.KEYID = 6
1,515,817 UART: [ldev] SUBJECT.KEYID = 5
1,516,243 UART: [ldev] AUTHORITY.KEYID = 7
1,516,706 UART: [ldev] FE.KEYID = 1
1,522,082 UART: [ldev] Erasing FE.KEYID = 1
1,547,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,783 UART: [ldev] --
1,587,136 UART: [fwproc] Waiting for Commands...
1,587,939 UART: [fwproc] Received command 0x46574c44
1,588,730 UART: [fwproc] Received Image of size 114084 bytes
2,883,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,654 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,732,695 >>> mbox cmd response: failed
1,732,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,701 >>> mbox cmd response: failed
1,732,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,154 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Manufacturing
85,917 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
893,312 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,437 UART: [kat] ++
897,589 UART: [kat] sha1
902,059 UART: [kat] SHA2-256
903,999 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,052 UART: [kat] HMAC-384Kdf
922,442 UART: [kat] LMS
1,170,770 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,847 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,367 UART: [ldev] ++
1,210,535 UART: [ldev] CDI.KEYID = 6
1,210,898 UART: [ldev] SUBJECT.KEYID = 5
1,211,324 UART: [ldev] AUTHORITY.KEYID = 7
1,211,787 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,046 UART: [fwproc] Wait for Commands...
1,282,710 UART: [fwproc] Recv command 0x46574c44
1,283,438 UART: [fwproc] Recv'd Img size: 114084 bytes
1,575,433 UART: ROM Fatal Error: 0x000B0027
1,576,590 >>> mbox cmd response: failed
1,576,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,596 >>> mbox cmd response: failed
1,576,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,809 UART: [kat] SHA2-256
903,749 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,098 UART: [kat] LMS
1,170,426 UART: [kat] --
1,171,549 UART: [cold-reset] ++
1,171,947 UART: [fht] FHT @ 0x50003400
1,174,628 UART: [idev] ++
1,174,796 UART: [idev] CDI.KEYID = 6
1,175,156 UART: [idev] SUBJECT.KEYID = 7
1,175,580 UART: [idev] UDS.KEYID = 0
1,175,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,805 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,409 UART: [ldev] ++
1,210,577 UART: [ldev] CDI.KEYID = 6
1,210,940 UART: [ldev] SUBJECT.KEYID = 5
1,211,366 UART: [ldev] AUTHORITY.KEYID = 7
1,211,829 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,250 UART: [fwproc] Wait for Commands...
1,283,968 UART: [fwproc] Recv command 0x46574c44
1,284,696 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,160 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,432,055 >>> mbox cmd response: failed
1,432,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,061 >>> mbox cmd response: failed
1,432,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,233 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Manufacturing
86,076 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,639 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,439 UART: [idev] ++
1,175,607 UART: [idev] CDI.KEYID = 6
1,175,967 UART: [idev] SUBJECT.KEYID = 7
1,176,391 UART: [idev] UDS.KEYID = 0
1,176,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,509 UART: [idev] Erasing UDS.KEYID = 0
1,201,434 UART: [idev] Sha1 KeyId Algorithm
1,209,914 UART: [idev] --
1,210,870 UART: [ldev] ++
1,211,038 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,827 UART: [ldev] AUTHORITY.KEYID = 7
1,212,290 UART: [ldev] FE.KEYID = 1
1,217,624 UART: [ldev] Erasing FE.KEYID = 1
1,244,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,952 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,284,105 UART: [fwproc] Recv command 0x46574c44
1,284,833 UART: [fwproc] Recv'd Img size: 114084 bytes
1,576,658 UART: ROM Fatal Error: 0x000B0027
1,577,815 >>> mbox cmd response: failed
1,577,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,821 >>> mbox cmd response: failed
1,577,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,180 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
893,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,274 UART: [kat] ++
897,426 UART: [kat] sha1
901,736 UART: [kat] SHA2-256
903,676 UART: [kat] SHA2-384
906,333 UART: [kat] SHA2-512-ACC
908,234 UART: [kat] ECC-384
917,915 UART: [kat] HMAC-384Kdf
922,767 UART: [kat] LMS
1,171,095 UART: [kat] --
1,171,876 UART: [cold-reset] ++
1,172,414 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,277 UART: [idev] Erasing UDS.KEYID = 0
1,201,688 UART: [idev] Sha1 KeyId Algorithm
1,210,238 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,218,032 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,088 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,147 UART: [fwproc] Recv command 0x46574c44
1,284,875 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,303 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,431,534 >>> mbox cmd response: failed
1,431,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,540 >>> mbox cmd response: failed
1,431,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,926 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Manufacturing
85,709 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,577 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
1,174,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,607 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,102 UART: [ldev] Erasing FE.KEYID = 1
1,241,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,490 UART: [ldev] --
1,279,822 UART: [fwproc] Wait for Commands...
1,280,537 UART: [fwproc] Recv command 0x46574c44
1,281,270 UART: [fwproc] Recv'd Img size: 114084 bytes
1,572,429 UART: ROM Fatal Error: 0x000B0027
1,573,586 >>> mbox cmd response: failed
1,573,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,592 >>> mbox cmd response: failed
1,573,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,573,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,987 UART: [state] WD Timer not started. Device not locked for debugging
88,342 UART: [kat] SHA2-256
891,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,021 UART: [kat] ++
896,173 UART: [kat] sha1
900,337 UART: [kat] SHA2-256
902,277 UART: [kat] SHA2-384
905,126 UART: [kat] SHA2-512-ACC
907,027 UART: [kat] ECC-384
916,698 UART: [kat] HMAC-384Kdf
921,130 UART: [kat] LMS
1,169,442 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,174,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,557 UART: [idev] Erasing UDS.KEYID = 0
1,199,813 UART: [idev] Sha1 KeyId Algorithm
1,208,815 UART: [idev] --
1,210,038 UART: [ldev] ++
1,210,206 UART: [ldev] CDI.KEYID = 6
1,210,570 UART: [ldev] SUBJECT.KEYID = 5
1,210,997 UART: [ldev] AUTHORITY.KEYID = 7
1,211,460 UART: [ldev] FE.KEYID = 1
1,216,866 UART: [ldev] Erasing FE.KEYID = 1
1,242,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,676 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,655 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,048 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,590 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,139 >>> mbox cmd response: failed
1,427,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,145 >>> mbox cmd response: failed
1,427,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,120 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Manufacturing
86,392 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,300 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,875 UART: [ldev] SUBJECT.KEYID = 5
1,210,302 UART: [ldev] AUTHORITY.KEYID = 7
1,210,765 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,009 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,281,932 UART: [fwproc] Recv command 0x46574c44
1,282,665 UART: [fwproc] Recv'd Img size: 114084 bytes
1,574,394 UART: ROM Fatal Error: 0x000B0027
1,575,551 >>> mbox cmd response: failed
1,575,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,557 >>> mbox cmd response: failed
1,575,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,075 UART: [state] LifecycleState = Unprovisioned
86,730 UART: [state] DebugLocked = No
87,304 UART: [state] WD Timer not started. Device not locked for debugging
88,527 UART: [kat] SHA2-256
892,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,206 UART: [kat] ++
896,358 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
905,057 UART: [kat] SHA2-512-ACC
906,958 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,746 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,173,950 UART: [idev] ++
1,174,118 UART: [idev] CDI.KEYID = 6
1,174,479 UART: [idev] SUBJECT.KEYID = 7
1,174,904 UART: [idev] UDS.KEYID = 0
1,175,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,924 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,667 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,901 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,536 >>> mbox cmd response: failed
1,428,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,542 >>> mbox cmd response: failed
1,428,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,085 UART:
192,467 UART: Running Caliptra ROM ...
193,563 UART:
193,706 UART: [state] CFI Enabled
265,159 UART: [state] LifecycleState = Unprovisioned
267,140 UART: [state] DebugLocked = No
269,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,531 UART: [kat] SHA2-256
444,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,742 UART: [kat] ++
455,218 UART: [kat] sha1
465,988 UART: [kat] SHA2-256
468,670 UART: [kat] SHA2-384
474,808 UART: [kat] SHA2-512-ACC
477,154 UART: [kat] ECC-384
2,766,284 UART: [kat] HMAC-384Kdf
2,779,795 UART: [kat] LMS
3,970,094 UART: [kat] --
3,975,159 UART: [cold-reset] ++
3,977,220 UART: [fht] Storing FHT @ 0x50003400
3,987,741 UART: [idev] ++
3,988,383 UART: [idev] CDI.KEYID = 6
3,989,297 UART: [idev] SUBJECT.KEYID = 7
3,990,513 UART: [idev] UDS.KEYID = 0
3,993,112 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,496 UART: [idev] Erasing UDS.KEYID = 0
7,327,555 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,461 UART: [idev] --
7,355,209 UART: [ldev] ++
7,355,777 UART: [ldev] CDI.KEYID = 6
7,356,743 UART: [ldev] SUBJECT.KEYID = 5
7,357,958 UART: [ldev] AUTHORITY.KEYID = 7
7,359,190 UART: [ldev] FE.KEYID = 1
7,393,232 UART: [ldev] Erasing FE.KEYID = 1
10,724,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,018,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,032,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,047,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,062,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,953 UART: [ldev] --
13,083,982 UART: [fwproc] Waiting for Commands...
13,086,139 UART: [fwproc] Received command 0x46574c44
13,088,330 UART: [fwproc] Received Image of size 113760 bytes
15,804,199 UART: ROM Fatal Error: 0x000B002F
15,807,659 >>> mbox cmd response: failed
15,808,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,410 >>> mbox cmd response: failed
15,808,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,808,971 >>> mbox cmd response: failed
Initializing fuses
2,056,578 writing to cptra_bootfsm_go
2,245,933 UART:
2,246,283 UART: Running Caliptra ROM ...
2,247,422 UART:
2,247,587 UART: [state] CFI Enabled
2,326,165 UART: [state] LifecycleState = Unprovisioned
2,328,129 UART: [state] DebugLocked = No
2,330,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,335,951 UART: [kat] SHA2-256
2,505,653 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,135 UART: [kat] ++
2,516,837 UART: [kat] sha1
2,527,755 UART: [kat] SHA2-256
2,530,458 UART: [kat] SHA2-384
2,537,806 UART: [kat] SHA2-512-ACC
2,540,220 UART: [kat] ECC-384
4,827,110 UART: [kat] HMAC-384Kdf
4,856,689 UART: [kat] LMS
6,046,963 UART: [kat] --
6,051,454 UART: [cold-reset] ++
6,053,937 UART: [fht] Storing FHT @ 0x50003400
6,066,189 UART: [idev] ++
6,066,757 UART: [idev] CDI.KEYID = 6
6,067,729 UART: [idev] SUBJECT.KEYID = 7
6,068,948 UART: [idev] UDS.KEYID = 0
6,071,229 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,214,428 UART: [idev] Erasing UDS.KEYID = 0
9,405,718 UART: [idev] Using Sha1 for KeyId Algorithm
9,426,419 UART: [idev] --
9,429,552 UART: [ldev] ++
9,430,128 UART: [ldev] CDI.KEYID = 6
9,431,096 UART: [ldev] SUBJECT.KEYID = 5
9,432,294 UART: [ldev] AUTHORITY.KEYID = 7
9,433,550 UART: [ldev] FE.KEYID = 1
9,479,130 UART: [ldev] Erasing FE.KEYID = 1
12,813,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,127,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,142,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,156,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,171,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,190,746 UART: [ldev] --
15,195,905 UART: [fwproc] Waiting for Commands...
15,197,574 UART: [fwproc] Received command 0x46574c44
15,199,815 UART: [fwproc] Received Image of size 113760 bytes
19,254,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,332,182 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,401,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,716,537 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,785,653 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,545,015 >>> mbox cmd response: failed
15,545,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,545,933 >>> mbox cmd response: failed
15,546,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,546,499 >>> mbox cmd response: failed
Initializing fuses
2,054,556 writing to cptra_bootfsm_go
5,860,775 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,940,740 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,403 UART:
192,762 UART: Running Caliptra ROM ...
193,885 UART:
603,528 UART: [state] CFI Enabled
618,706 UART: [state] LifecycleState = Unprovisioned
620,655 UART: [state] DebugLocked = No
623,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,208 UART: [kat] SHA2-256
797,933 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,499 UART: [kat] ++
809,152 UART: [kat] sha1
819,366 UART: [kat] SHA2-256
822,068 UART: [kat] SHA2-384
828,489 UART: [kat] SHA2-512-ACC
830,830 UART: [kat] ECC-384
3,118,176 UART: [kat] HMAC-384Kdf
3,128,598 UART: [kat] LMS
4,318,677 UART: [kat] --
4,321,437 UART: [cold-reset] ++
4,323,322 UART: [fht] Storing FHT @ 0x50003400
4,335,018 UART: [idev] ++
4,335,624 UART: [idev] CDI.KEYID = 6
4,336,752 UART: [idev] SUBJECT.KEYID = 7
4,337,860 UART: [idev] UDS.KEYID = 0
4,340,441 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,479 UART: [idev] Erasing UDS.KEYID = 0
7,626,849 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,204 UART: [idev] --
7,653,257 UART: [ldev] ++
7,653,887 UART: [ldev] CDI.KEYID = 6
7,654,803 UART: [ldev] SUBJECT.KEYID = 5
7,656,016 UART: [ldev] AUTHORITY.KEYID = 7
7,657,334 UART: [ldev] FE.KEYID = 1
7,668,795 UART: [ldev] Erasing FE.KEYID = 1
10,954,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,096 UART: [ldev] --
13,317,069 UART: [fwproc] Waiting for Commands...
13,319,925 UART: [fwproc] Received command 0x46574c44
13,322,111 UART: [fwproc] Received Image of size 113760 bytes
16,026,740 UART: ROM Fatal Error: 0x000B002F
16,030,201 >>> mbox cmd response: failed
16,030,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,895 >>> mbox cmd response: failed
16,031,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,481 >>> mbox cmd response: failed
Initializing fuses
2,062,482 writing to cptra_bootfsm_go
2,251,784 UART:
2,252,135 UART: Running Caliptra ROM ...
2,253,277 UART:
4,428,929 UART: [state] CFI Enabled
4,445,075 UART: [state] LifecycleState = Unprovisioned
4,446,998 UART: [state] DebugLocked = No
4,448,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,453,667 UART: [kat] SHA2-256
4,623,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,633,978 UART: [kat] ++
4,634,469 UART: [kat] sha1
4,646,948 UART: [kat] SHA2-256
4,649,646 UART: [kat] SHA2-384
4,655,959 UART: [kat] SHA2-512-ACC
4,658,305 UART: [kat] ECC-384
6,943,276 UART: [kat] HMAC-384Kdf
6,954,857 UART: [kat] LMS
8,144,963 UART: [kat] --
8,148,916 UART: [cold-reset] ++
8,150,964 UART: [fht] Storing FHT @ 0x50003400
8,163,368 UART: [idev] ++
8,163,935 UART: [idev] CDI.KEYID = 6
8,164,899 UART: [idev] SUBJECT.KEYID = 7
8,166,119 UART: [idev] UDS.KEYID = 0
8,168,526 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,311,518 UART: [idev] Erasing UDS.KEYID = 0
11,454,670 UART: [idev] Using Sha1 for KeyId Algorithm
11,477,740 UART: [idev] --
11,482,112 UART: [ldev] ++
11,482,679 UART: [ldev] CDI.KEYID = 6
11,483,618 UART: [ldev] SUBJECT.KEYID = 5
11,484,882 UART: [ldev] AUTHORITY.KEYID = 7
11,486,121 UART: [ldev] FE.KEYID = 1
11,497,306 UART: [ldev] Erasing FE.KEYID = 1
14,788,305 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,080,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,094,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,109,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,124,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,143,451 UART: [ldev] --
17,147,688 UART: [fwproc] Waiting for Commands...
17,150,386 UART: [fwproc] Received command 0x46574c44
17,152,624 UART: [fwproc] Received Image of size 113760 bytes
21,200,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,278,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,347,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,663,818 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,127,532 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,768,406 >>> mbox cmd response: failed
15,769,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,411 >>> mbox cmd response: failed
15,769,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,989 >>> mbox cmd response: failed
Initializing fuses
2,055,708 writing to cptra_bootfsm_go
8,229,043 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,165,252 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,279 UART:
192,626 UART: Running Caliptra ROM ...
193,837 UART:
193,991 UART: [state] CFI Enabled
262,647 UART: [state] LifecycleState = Unprovisioned
264,506 UART: [state] DebugLocked = No
266,264 UART: [state] WD Timer not started. Device not locked for debugging
269,192 UART: [kat] SHA2-256
448,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,880 UART: [kat] ++
460,331 UART: [kat] sha1
471,908 UART: [kat] SHA2-256
474,938 UART: [kat] SHA2-384
480,816 UART: [kat] SHA2-512-ACC
483,804 UART: [kat] ECC-384
2,948,807 UART: [kat] HMAC-384Kdf
2,969,677 UART: [kat] LMS
3,499,128 UART: [kat] --
3,501,994 UART: [cold-reset] ++
3,503,224 UART: [fht] FHT @ 0x50003400
3,515,214 UART: [idev] ++
3,515,818 UART: [idev] CDI.KEYID = 6
3,516,703 UART: [idev] SUBJECT.KEYID = 7
3,517,938 UART: [idev] UDS.KEYID = 0
3,520,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,885 UART: [idev] Erasing UDS.KEYID = 0
6,025,895 UART: [idev] Sha1 KeyId Algorithm
6,049,075 UART: [idev] --
6,052,863 UART: [ldev] ++
6,053,441 UART: [ldev] CDI.KEYID = 6
6,054,327 UART: [ldev] SUBJECT.KEYID = 5
6,055,539 UART: [ldev] AUTHORITY.KEYID = 7
6,056,777 UART: [ldev] FE.KEYID = 1
6,098,259 UART: [ldev] Erasing FE.KEYID = 1
8,599,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,930 UART: [ldev] --
10,390,609 UART: [fwproc] Wait for Commands...
10,392,282 UART: [fwproc] Recv command 0x46574c44
10,394,260 UART: [fwproc] Recv'd Img size: 114084 bytes
12,446,402 UART: ROM Fatal Error: 0x000B002F
12,449,479 >>> mbox cmd response: failed
12,449,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,233 >>> mbox cmd response: failed
12,450,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,797 >>> mbox cmd response: failed
Initializing fuses
2,053,114 writing to cptra_bootfsm_go
2,242,447 UART:
2,242,790 UART: Running Caliptra ROM ...
2,243,947 UART:
2,244,111 UART: [state] CFI Enabled
2,317,904 UART: [state] LifecycleState = Unprovisioned
2,319,777 UART: [state] DebugLocked = No
2,322,029 UART: [state] WD Timer not started. Device not locked for debugging
2,326,157 UART: [kat] SHA2-256
2,505,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,865 UART: [kat] ++
2,517,410 UART: [kat] sha1
2,527,550 UART: [kat] SHA2-256
2,530,567 UART: [kat] SHA2-384
2,535,530 UART: [kat] SHA2-512-ACC
2,538,476 UART: [kat] ECC-384
5,000,454 UART: [kat] HMAC-384Kdf
5,024,304 UART: [kat] LMS
5,553,821 UART: [kat] --
5,558,318 UART: [cold-reset] ++
5,559,223 UART: [fht] FHT @ 0x50003400
5,570,315 UART: [idev] ++
5,570,886 UART: [idev] CDI.KEYID = 6
5,571,798 UART: [idev] SUBJECT.KEYID = 7
5,572,958 UART: [idev] UDS.KEYID = 0
5,575,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,718,846 UART: [idev] Erasing UDS.KEYID = 0
8,079,253 UART: [idev] Sha1 KeyId Algorithm
8,103,823 UART: [idev] --
8,107,385 UART: [ldev] ++
8,107,969 UART: [ldev] CDI.KEYID = 6
8,108,886 UART: [ldev] SUBJECT.KEYID = 5
8,110,050 UART: [ldev] AUTHORITY.KEYID = 7
8,111,289 UART: [ldev] FE.KEYID = 1
8,153,042 UART: [ldev] Erasing FE.KEYID = 1
10,656,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,535 UART: [ldev] --
12,465,994 UART: [fwproc] Wait for Commands...
12,467,710 UART: [fwproc] Recv command 0x46574c44
12,469,757 UART: [fwproc] Recv'd Img size: 114084 bytes
15,871,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,941,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,010,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,327,727 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,363,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,230,056 >>> mbox cmd response: failed
12,230,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,900 >>> mbox cmd response: failed
12,231,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,231,459 >>> mbox cmd response: failed
Initializing fuses
2,053,576 writing to cptra_bootfsm_go
5,398,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,084,262 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
192,716 UART:
193,075 UART: Running Caliptra ROM ...
194,214 UART:
603,730 UART: [state] CFI Enabled
616,711 UART: [state] LifecycleState = Unprovisioned
618,620 UART: [state] DebugLocked = No
620,535 UART: [state] WD Timer not started. Device not locked for debugging
624,745 UART: [kat] SHA2-256
803,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,434 UART: [kat] ++
815,961 UART: [kat] sha1
827,672 UART: [kat] SHA2-256
830,671 UART: [kat] SHA2-384
837,242 UART: [kat] SHA2-512-ACC
840,179 UART: [kat] ECC-384
3,282,137 UART: [kat] HMAC-384Kdf
3,294,541 UART: [kat] LMS
3,824,072 UART: [kat] --
3,827,478 UART: [cold-reset] ++
3,828,705 UART: [fht] FHT @ 0x50003400
3,838,498 UART: [idev] ++
3,839,102 UART: [idev] CDI.KEYID = 6
3,839,995 UART: [idev] SUBJECT.KEYID = 7
3,841,218 UART: [idev] UDS.KEYID = 0
3,843,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,973 UART: [idev] Erasing UDS.KEYID = 0
6,310,973 UART: [idev] Sha1 KeyId Algorithm
6,334,434 UART: [idev] --
6,338,112 UART: [ldev] ++
6,338,682 UART: [ldev] CDI.KEYID = 6
6,339,593 UART: [ldev] SUBJECT.KEYID = 5
6,340,753 UART: [ldev] AUTHORITY.KEYID = 7
6,342,041 UART: [ldev] FE.KEYID = 1
6,352,961 UART: [ldev] Erasing FE.KEYID = 1
8,830,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,591 UART: [ldev] --
10,620,557 UART: [fwproc] Wait for Commands...
10,622,815 UART: [fwproc] Recv command 0x46574c44
10,624,913 UART: [fwproc] Recv'd Img size: 114084 bytes
12,675,538 UART: ROM Fatal Error: 0x000B002F
12,678,656 >>> mbox cmd response: failed
12,679,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,410 >>> mbox cmd response: failed
12,679,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,679,971 >>> mbox cmd response: failed
Initializing fuses
2,053,726 writing to cptra_bootfsm_go
2,243,051 UART:
2,243,389 UART: Running Caliptra ROM ...
2,244,534 UART:
7,794,589 UART: [state] CFI Enabled
7,806,422 UART: [state] LifecycleState = Unprovisioned
7,808,291 UART: [state] DebugLocked = No
7,810,614 UART: [state] WD Timer not started. Device not locked for debugging
7,815,008 UART: [kat] SHA2-256
7,994,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,005,740 UART: [kat] ++
8,006,287 UART: [kat] sha1
8,016,379 UART: [kat] SHA2-256
8,019,455 UART: [kat] SHA2-384
8,025,069 UART: [kat] SHA2-512-ACC
8,028,019 UART: [kat] ECC-384
10,472,740 UART: [kat] HMAC-384Kdf
10,485,236 UART: [kat] LMS
11,014,735 UART: [kat] --
11,018,583 UART: [cold-reset] ++
11,019,760 UART: [fht] FHT @ 0x50003400
11,031,313 UART: [idev] ++
11,031,878 UART: [idev] CDI.KEYID = 6
11,032,781 UART: [idev] SUBJECT.KEYID = 7
11,033,992 UART: [idev] UDS.KEYID = 0
11,036,270 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,179,658 UART: [idev] Erasing UDS.KEYID = 0
13,508,927 UART: [idev] Sha1 KeyId Algorithm
13,531,775 UART: [idev] --
13,534,039 UART: [ldev] ++
13,534,612 UART: [ldev] CDI.KEYID = 6
13,535,527 UART: [ldev] SUBJECT.KEYID = 5
13,536,692 UART: [ldev] AUTHORITY.KEYID = 7
13,537,973 UART: [ldev] FE.KEYID = 1
13,548,183 UART: [ldev] Erasing FE.KEYID = 1
16,020,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,740,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,756,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,771,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,787,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,808,329 UART: [ldev] --
17,812,533 UART: [fwproc] Wait for Commands...
17,815,007 UART: [fwproc] Recv command 0x46574c44
17,817,055 UART: [fwproc] Recv'd Img size: 114084 bytes
21,215,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,288,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,357,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,674,468 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,696,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,461,372 >>> mbox cmd response: failed
12,461,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,235 >>> mbox cmd response: failed
12,462,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,794 >>> mbox cmd response: failed
Initializing fuses
2,061,228 writing to cptra_bootfsm_go
11,099,498 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,668,266 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,199 UART:
192,567 UART: Running Caliptra ROM ...
193,668 UART:
193,809 UART: [state] CFI Enabled
264,504 UART: [state] LifecycleState = Unprovisioned
266,909 UART: [state] DebugLocked = No
269,052 UART: [state] WD Timer not started. Device not locked for debugging
273,661 UART: [kat] SHA2-256
463,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,329 UART: [kat] ++
474,806 UART: [kat] sha1
485,738 UART: [kat] SHA2-256
488,765 UART: [kat] SHA2-384
494,316 UART: [kat] SHA2-512-ACC
496,936 UART: [kat] ECC-384
2,947,696 UART: [kat] HMAC-384Kdf
2,971,916 UART: [kat] LMS
3,503,654 UART: [kat] --
3,507,030 UART: [cold-reset] ++
3,509,295 UART: [fht] FHT @ 0x50003400
3,521,574 UART: [idev] ++
3,522,251 UART: [idev] CDI.KEYID = 6
3,523,223 UART: [idev] SUBJECT.KEYID = 7
3,524,439 UART: [idev] UDS.KEYID = 0
3,527,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,864 UART: [idev] Erasing UDS.KEYID = 0
6,027,016 UART: [idev] Sha1 KeyId Algorithm
6,048,686 UART: [idev] --
6,054,107 UART: [ldev] ++
6,054,840 UART: [ldev] CDI.KEYID = 6
6,055,733 UART: [ldev] SUBJECT.KEYID = 5
6,056,899 UART: [ldev] AUTHORITY.KEYID = 7
6,058,134 UART: [ldev] FE.KEYID = 1
6,101,028 UART: [ldev] Erasing FE.KEYID = 1
8,609,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,796 UART: [ldev] --
10,413,952 UART: [fwproc] Wait for Commands...
10,415,838 UART: [fwproc] Recv command 0x46574c44
10,418,157 UART: [fwproc] Recv'd Img size: 114084 bytes
12,498,979 UART: ROM Fatal Error: 0x000B002F
12,502,610 >>> mbox cmd response: failed
12,503,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,373 >>> mbox cmd response: failed
12,503,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,937 >>> mbox cmd response: failed
Initializing fuses
2,061,701 writing to cptra_bootfsm_go
2,251,026 UART:
2,251,390 UART: Running Caliptra ROM ...
2,252,533 UART:
2,252,695 UART: [state] CFI Enabled
2,312,387 UART: [state] LifecycleState = Unprovisioned
2,314,765 UART: [state] DebugLocked = No
2,316,827 UART: [state] WD Timer not started. Device not locked for debugging
2,320,660 UART: [kat] SHA2-256
2,510,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,521,290 UART: [kat] ++
2,521,752 UART: [kat] sha1
2,534,104 UART: [kat] SHA2-256
2,537,139 UART: [kat] SHA2-384
2,542,921 UART: [kat] SHA2-512-ACC
2,545,506 UART: [kat] ECC-384
4,995,277 UART: [kat] HMAC-384Kdf
5,018,418 UART: [kat] LMS
5,550,148 UART: [kat] --
5,553,446 UART: [cold-reset] ++
5,555,864 UART: [fht] FHT @ 0x50003400
5,567,164 UART: [idev] ++
5,567,848 UART: [idev] CDI.KEYID = 6
5,568,814 UART: [idev] SUBJECT.KEYID = 7
5,570,047 UART: [idev] UDS.KEYID = 0
5,572,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,715,855 UART: [idev] Erasing UDS.KEYID = 0
8,076,558 UART: [idev] Sha1 KeyId Algorithm
8,099,001 UART: [idev] --
8,103,819 UART: [ldev] ++
8,104,508 UART: [ldev] CDI.KEYID = 6
8,105,420 UART: [ldev] SUBJECT.KEYID = 5
8,106,654 UART: [ldev] AUTHORITY.KEYID = 7
8,107,851 UART: [ldev] FE.KEYID = 1
8,147,832 UART: [ldev] Erasing FE.KEYID = 1
10,658,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,798 UART: [ldev] --
12,460,070 UART: [fwproc] Wait for Commands...
12,462,662 UART: [fwproc] Recv command 0x46574c44
12,464,937 UART: [fwproc] Recv'd Img size: 114084 bytes
15,905,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,105,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,646,367 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,440,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,303,084 >>> mbox cmd response: failed
12,303,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,017 >>> mbox cmd response: failed
12,304,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,587 >>> mbox cmd response: failed
Initializing fuses
2,057,402 writing to cptra_bootfsm_go
5,494,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,775,396 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,551 UART:
192,918 UART: Running Caliptra ROM ...
194,114 UART:
603,550 UART: [state] CFI Enabled
616,017 UART: [state] LifecycleState = Unprovisioned
618,383 UART: [state] DebugLocked = No
621,270 UART: [state] WD Timer not started. Device not locked for debugging
625,854 UART: [kat] SHA2-256
815,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,563 UART: [kat] ++
827,164 UART: [kat] sha1
837,565 UART: [kat] SHA2-256
840,574 UART: [kat] SHA2-384
846,546 UART: [kat] SHA2-512-ACC
849,154 UART: [kat] ECC-384
3,291,764 UART: [kat] HMAC-384Kdf
3,305,237 UART: [kat] LMS
3,837,033 UART: [kat] --
3,840,261 UART: [cold-reset] ++
3,841,229 UART: [fht] FHT @ 0x50003400
3,853,346 UART: [idev] ++
3,854,086 UART: [idev] CDI.KEYID = 6
3,855,004 UART: [idev] SUBJECT.KEYID = 7
3,856,226 UART: [idev] UDS.KEYID = 0
3,858,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,271 UART: [idev] Erasing UDS.KEYID = 0
6,330,380 UART: [idev] Sha1 KeyId Algorithm
6,354,062 UART: [idev] --
6,360,334 UART: [ldev] ++
6,361,020 UART: [ldev] CDI.KEYID = 6
6,361,931 UART: [ldev] SUBJECT.KEYID = 5
6,363,148 UART: [ldev] AUTHORITY.KEYID = 7
6,364,328 UART: [ldev] FE.KEYID = 1
6,376,700 UART: [ldev] Erasing FE.KEYID = 1
8,855,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,480 UART: [ldev] --
10,645,759 UART: [fwproc] Wait for Commands...
10,648,946 UART: [fwproc] Recv command 0x46574c44
10,651,275 UART: [fwproc] Recv'd Img size: 114084 bytes
12,725,862 UART: ROM Fatal Error: 0x000B002F
12,729,533 >>> mbox cmd response: failed
12,729,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,229 >>> mbox cmd response: failed
12,730,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,730,829 >>> mbox cmd response: failed
Initializing fuses
2,056,166 writing to cptra_bootfsm_go
2,245,490 UART:
2,245,834 UART: Running Caliptra ROM ...
2,246,975 UART:
7,742,836 UART: [state] CFI Enabled
7,758,871 UART: [state] LifecycleState = Unprovisioned
7,761,244 UART: [state] DebugLocked = No
7,763,231 UART: [state] WD Timer not started. Device not locked for debugging
7,768,004 UART: [kat] SHA2-256
7,957,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,968,663 UART: [kat] ++
7,969,264 UART: [kat] sha1
7,982,426 UART: [kat] SHA2-256
7,985,442 UART: [kat] SHA2-384
7,991,333 UART: [kat] SHA2-512-ACC
7,993,956 UART: [kat] ECC-384
10,434,868 UART: [kat] HMAC-384Kdf
10,446,983 UART: [kat] LMS
10,978,809 UART: [kat] --
10,984,210 UART: [cold-reset] ++
10,985,494 UART: [fht] FHT @ 0x50003400
10,996,739 UART: [idev] ++
10,997,484 UART: [idev] CDI.KEYID = 6
10,998,362 UART: [idev] SUBJECT.KEYID = 7
10,999,622 UART: [idev] UDS.KEYID = 0
11,001,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,145,261 UART: [idev] Erasing UDS.KEYID = 0
13,472,713 UART: [idev] Sha1 KeyId Algorithm
13,495,446 UART: [idev] --
13,500,054 UART: [ldev] ++
13,500,743 UART: [ldev] CDI.KEYID = 6
13,501,624 UART: [ldev] SUBJECT.KEYID = 5
13,502,835 UART: [ldev] AUTHORITY.KEYID = 7
13,504,064 UART: [ldev] FE.KEYID = 1
13,515,658 UART: [ldev] Erasing FE.KEYID = 1
15,996,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,728,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,743,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,758,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,779,339 UART: [ldev] --
17,785,680 UART: [fwproc] Wait for Commands...
17,788,046 UART: [fwproc] Recv command 0x46574c44
17,790,308 UART: [fwproc] Recv'd Img size: 114084 bytes
21,237,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,319,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,435,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,977,144 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
3,757,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,514,298 >>> mbox cmd response: failed
12,514,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,157 >>> mbox cmd response: failed
12,515,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,742 >>> mbox cmd response: failed
Initializing fuses
2,061,812 writing to cptra_bootfsm_go
11,103,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,304,895 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,663 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,263 UART: [kat] SHA2-256
882,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,309 UART: [kat] ++
886,461 UART: [kat] sha1
890,921 UART: [kat] SHA2-256
892,859 UART: [kat] SHA2-384
895,506 UART: [kat] SHA2-512-ACC
897,407 UART: [kat] ECC-384
902,684 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,479 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,504,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,454 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,191 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 114084 bytes
1,634,937 UART: ROM Fatal Error: 0x000B002F
1,636,096 >>> mbox cmd response: failed
1,636,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,102 >>> mbox cmd response: failed
1,636,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,571 UART: [kat] SHA2-256
881,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,617 UART: [kat] ++
885,769 UART: [kat] sha1
889,799 UART: [kat] SHA2-256
891,737 UART: [kat] SHA2-384
894,488 UART: [kat] SHA2-512-ACC
896,389 UART: [kat] ECC-384
901,724 UART: [kat] HMAC-384Kdf
906,230 UART: [kat] LMS
1,474,426 UART: [kat] --
1,475,269 UART: [cold-reset] ++
1,475,739 UART: [fht] Storing FHT @ 0x50003400
1,478,340 UART: [idev] ++
1,478,508 UART: [idev] CDI.KEYID = 6
1,478,868 UART: [idev] SUBJECT.KEYID = 7
1,479,292 UART: [idev] UDS.KEYID = 0
1,479,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,608 UART: [idev] Erasing UDS.KEYID = 0
1,504,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,604 UART: [idev] --
1,513,761 UART: [ldev] ++
1,513,929 UART: [ldev] CDI.KEYID = 6
1,514,292 UART: [ldev] SUBJECT.KEYID = 5
1,514,718 UART: [ldev] AUTHORITY.KEYID = 7
1,515,181 UART: [ldev] FE.KEYID = 1
1,520,113 UART: [ldev] Erasing FE.KEYID = 1
1,545,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,900 UART: [ldev] --
1,584,247 UART: [fwproc] Waiting for Commands...
1,584,890 UART: [fwproc] Received command 0x46574c44
1,585,681 UART: [fwproc] Received Image of size 114084 bytes
2,880,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,678 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,619 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,981 >>> mbox cmd response: failed
1,486,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,987 >>> mbox cmd response: failed
1,486,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,069 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,459 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,948 UART: [kat] SHA2-256
881,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,994 UART: [kat] ++
886,146 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,017 UART: [kat] SHA2-512-ACC
896,918 UART: [kat] ECC-384
902,527 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,244 UART: [cold-reset] ++
1,476,812 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,263 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,037 UART: [idev] --
1,515,076 UART: [ldev] ++
1,515,244 UART: [ldev] CDI.KEYID = 6
1,515,607 UART: [ldev] SUBJECT.KEYID = 5
1,516,033 UART: [ldev] AUTHORITY.KEYID = 7
1,516,496 UART: [ldev] FE.KEYID = 1
1,521,754 UART: [ldev] Erasing FE.KEYID = 1
1,547,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,445 UART: [ldev] --
1,586,762 UART: [fwproc] Waiting for Commands...
1,587,401 UART: [fwproc] Received command 0x46574c44
1,588,192 UART: [fwproc] Received Image of size 114084 bytes
1,635,670 UART: ROM Fatal Error: 0x000B002F
1,636,829 >>> mbox cmd response: failed
1,636,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,835 >>> mbox cmd response: failed
1,636,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,461 UART: [kat] SHA2-512-ACC
897,362 UART: [kat] ECC-384
902,737 UART: [kat] HMAC-384Kdf
907,309 UART: [kat] LMS
1,475,505 UART: [kat] --
1,476,264 UART: [cold-reset] ++
1,476,792 UART: [fht] Storing FHT @ 0x50003400
1,479,699 UART: [idev] ++
1,479,867 UART: [idev] CDI.KEYID = 6
1,480,227 UART: [idev] SUBJECT.KEYID = 7
1,480,651 UART: [idev] UDS.KEYID = 0
1,480,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,793 UART: [idev] Erasing UDS.KEYID = 0
1,505,759 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,262 UART: [ldev] ++
1,515,430 UART: [ldev] CDI.KEYID = 6
1,515,793 UART: [ldev] SUBJECT.KEYID = 5
1,516,219 UART: [ldev] AUTHORITY.KEYID = 7
1,516,682 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,375 UART: [ldev] --
1,586,764 UART: [fwproc] Waiting for Commands...
1,587,485 UART: [fwproc] Received command 0x46574c44
1,588,276 UART: [fwproc] Received Image of size 114084 bytes
2,882,711 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,360 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,980 >>> mbox cmd response: failed
1,489,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,986 >>> mbox cmd response: failed
1,489,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,040 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
892,984 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,109 UART: [kat] ++
897,261 UART: [kat] sha1
901,391 UART: [kat] SHA2-256
903,331 UART: [kat] SHA2-384
906,162 UART: [kat] SHA2-512-ACC
908,063 UART: [kat] ECC-384
917,734 UART: [kat] HMAC-384Kdf
922,312 UART: [kat] LMS
1,170,640 UART: [kat] --
1,171,495 UART: [cold-reset] ++
1,172,039 UART: [fht] FHT @ 0x50003400
1,174,560 UART: [idev] ++
1,174,728 UART: [idev] CDI.KEYID = 6
1,175,088 UART: [idev] SUBJECT.KEYID = 7
1,175,512 UART: [idev] UDS.KEYID = 0
1,175,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,199 UART: [idev] Sha1 KeyId Algorithm
1,208,487 UART: [idev] --
1,209,519 UART: [ldev] ++
1,209,687 UART: [ldev] CDI.KEYID = 6
1,210,050 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,371 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,800 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,858 UART: ROM Fatal Error: 0x000B002F
1,332,017 >>> mbox cmd response: failed
1,332,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,023 >>> mbox cmd response: failed
1,332,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
918,316 UART: [kat] HMAC-384Kdf
922,888 UART: [kat] LMS
1,171,216 UART: [kat] --
1,172,187 UART: [cold-reset] ++
1,172,715 UART: [fht] FHT @ 0x50003400
1,175,520 UART: [idev] ++
1,175,688 UART: [idev] CDI.KEYID = 6
1,176,048 UART: [idev] SUBJECT.KEYID = 7
1,176,472 UART: [idev] UDS.KEYID = 0
1,176,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,464 UART: [idev] Erasing UDS.KEYID = 0
1,201,291 UART: [idev] Sha1 KeyId Algorithm
1,209,819 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,133 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,872 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,399 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,216 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,187,564 >>> mbox cmd response: failed
1,187,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,570 >>> mbox cmd response: failed
1,187,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,131 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
901,924 UART: [kat] SHA2-256
903,864 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
917,915 UART: [kat] HMAC-384Kdf
922,447 UART: [kat] LMS
1,170,775 UART: [kat] --
1,171,432 UART: [cold-reset] ++
1,171,940 UART: [fht] FHT @ 0x50003400
1,174,653 UART: [idev] ++
1,174,821 UART: [idev] CDI.KEYID = 6
1,175,181 UART: [idev] SUBJECT.KEYID = 7
1,175,605 UART: [idev] UDS.KEYID = 0
1,175,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,767 UART: [idev] Erasing UDS.KEYID = 0
1,200,716 UART: [idev] Sha1 KeyId Algorithm
1,209,222 UART: [idev] --
1,210,210 UART: [ldev] ++
1,210,378 UART: [ldev] CDI.KEYID = 6
1,210,741 UART: [ldev] SUBJECT.KEYID = 5
1,211,167 UART: [ldev] AUTHORITY.KEYID = 7
1,211,630 UART: [ldev] FE.KEYID = 1
1,216,736 UART: [ldev] Erasing FE.KEYID = 1
1,242,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,762 UART: [ldev] --
1,282,237 UART: [fwproc] Wait for Commands...
1,282,989 UART: [fwproc] Recv command 0x46574c44
1,283,717 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,833 UART: ROM Fatal Error: 0x000B002F
1,331,992 >>> mbox cmd response: failed
1,331,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,998 >>> mbox cmd response: failed
1,331,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
893,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,308 UART: [kat] ++
897,460 UART: [kat] sha1
901,832 UART: [kat] SHA2-256
903,772 UART: [kat] SHA2-384
906,443 UART: [kat] SHA2-512-ACC
908,344 UART: [kat] ECC-384
918,349 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,002 UART: [cold-reset] ++
1,172,348 UART: [fht] FHT @ 0x50003400
1,175,011 UART: [idev] ++
1,175,179 UART: [idev] CDI.KEYID = 6
1,175,539 UART: [idev] SUBJECT.KEYID = 7
1,175,963 UART: [idev] UDS.KEYID = 0
1,176,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,200,990 UART: [idev] Sha1 KeyId Algorithm
1,209,690 UART: [idev] --
1,210,622 UART: [ldev] ++
1,210,790 UART: [ldev] CDI.KEYID = 6
1,211,153 UART: [ldev] SUBJECT.KEYID = 5
1,211,579 UART: [ldev] AUTHORITY.KEYID = 7
1,212,042 UART: [ldev] FE.KEYID = 1
1,217,112 UART: [ldev] Erasing FE.KEYID = 1
1,242,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,408 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,329 UART: [fwproc] Recv command 0x46574c44
1,283,057 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,364 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,797 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,109 >>> mbox cmd response: failed
1,188,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,115 >>> mbox cmd response: failed
1,188,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,514 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,923 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,174,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,937 UART: [idev] Erasing UDS.KEYID = 0
1,198,689 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,178 UART: [fwproc] Wait for Commands...
1,281,925 UART: [fwproc] Recv command 0x46574c44
1,282,658 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,657 UART: ROM Fatal Error: 0x000B002F
1,330,816 >>> mbox cmd response: failed
1,330,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,822 >>> mbox cmd response: failed
1,330,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,356 UART: [kat] SHA2-256
890,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,035 UART: [kat] ++
895,187 UART: [kat] sha1
899,257 UART: [kat] SHA2-256
901,197 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,243 UART: [cold-reset] ++
1,169,659 UART: [fht] FHT @ 0x50003400
1,172,303 UART: [idev] ++
1,172,471 UART: [idev] CDI.KEYID = 6
1,172,832 UART: [idev] SUBJECT.KEYID = 7
1,173,257 UART: [idev] UDS.KEYID = 0
1,173,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,244 UART: [ldev] Erasing FE.KEYID = 1
1,241,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,146 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,766,960 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,349 >>> mbox cmd response: failed
1,183,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,355 >>> mbox cmd response: failed
1,183,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,680 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,347 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,414 UART: [fwproc] Recv command 0x46574c44
1,284,147 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,200 UART: ROM Fatal Error: 0x000B002F
1,333,359 >>> mbox cmd response: failed
1,333,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,365 >>> mbox cmd response: failed
1,333,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,298 UART: [kat] SHA2-256
902,238 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,429 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,210,017 UART: [ldev] ++
1,210,185 UART: [ldev] CDI.KEYID = 6
1,210,549 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,461 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,235 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,677 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,008 >>> mbox cmd response: failed
1,184,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,014 >>> mbox cmd response: failed
1,184,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,939 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,104 UART:
192,473 UART: Running Caliptra ROM ...
193,562 UART:
193,704 UART: [state] CFI Enabled
259,192 UART: [state] LifecycleState = Unprovisioned
261,144 UART: [state] DebugLocked = No
262,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,225 UART: [kat] SHA2-256
437,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,457 UART: [kat] ++
448,911 UART: [kat] sha1
459,382 UART: [kat] SHA2-256
462,038 UART: [kat] SHA2-384
467,604 UART: [kat] SHA2-512-ACC
469,946 UART: [kat] ECC-384
2,765,664 UART: [kat] HMAC-384Kdf
2,778,749 UART: [kat] LMS
3,969,127 UART: [kat] --
3,973,168 UART: [cold-reset] ++
3,975,599 UART: [fht] Storing FHT @ 0x50003400
3,985,972 UART: [idev] ++
3,986,547 UART: [idev] CDI.KEYID = 6
3,987,566 UART: [idev] SUBJECT.KEYID = 7
3,988,724 UART: [idev] UDS.KEYID = 0
3,991,583 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,134,902 UART: [idev] Erasing UDS.KEYID = 0
7,324,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,618 UART: [idev] --
7,351,646 UART: [ldev] ++
7,352,227 UART: [ldev] CDI.KEYID = 6
7,353,172 UART: [ldev] SUBJECT.KEYID = 5
7,354,385 UART: [ldev] AUTHORITY.KEYID = 7
7,355,674 UART: [ldev] FE.KEYID = 1
7,402,317 UART: [ldev] Erasing FE.KEYID = 1
10,735,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,482 UART: [ldev] --
13,095,576 UART: [fwproc] Waiting for Commands...
13,097,906 UART: [fwproc] Received command 0x46574c44
13,100,099 UART: [fwproc] Received Image of size 113760 bytes
13,156,047 UART: ROM Fatal Error: 0x000B0001
13,159,579 >>> mbox cmd response: failed
13,159,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,300 >>> mbox cmd response: failed
13,160,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,858 >>> mbox cmd response: failed
Initializing fuses
2,055,792 writing to cptra_bootfsm_go
2,245,093 UART:
2,245,449 UART: Running Caliptra ROM ...
2,246,584 UART:
2,246,754 UART: [state] CFI Enabled
2,312,412 UART: [state] LifecycleState = Unprovisioned
2,314,354 UART: [state] DebugLocked = No
2,315,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,098 UART: [kat] SHA2-256
2,490,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,320 UART: [kat] ++
2,501,785 UART: [kat] sha1
2,511,326 UART: [kat] SHA2-256
2,514,018 UART: [kat] SHA2-384
2,519,090 UART: [kat] SHA2-512-ACC
2,521,461 UART: [kat] ECC-384
4,817,280 UART: [kat] HMAC-384Kdf
4,850,313 UART: [kat] LMS
6,040,608 UART: [kat] --
6,044,223 UART: [cold-reset] ++
6,045,408 UART: [fht] Storing FHT @ 0x50003400
6,057,056 UART: [idev] ++
6,057,622 UART: [idev] CDI.KEYID = 6
6,058,561 UART: [idev] SUBJECT.KEYID = 7
6,059,827 UART: [idev] UDS.KEYID = 0
6,062,337 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,205,491 UART: [idev] Erasing UDS.KEYID = 0
9,398,702 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,182 UART: [idev] --
9,426,533 UART: [ldev] ++
9,427,107 UART: [ldev] CDI.KEYID = 6
9,428,091 UART: [ldev] SUBJECT.KEYID = 5
9,429,304 UART: [ldev] AUTHORITY.KEYID = 7
9,430,541 UART: [ldev] FE.KEYID = 1
9,472,835 UART: [ldev] Erasing FE.KEYID = 1
12,806,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,122,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,571 UART: [ldev] --
15,189,562 UART: [fwproc] Waiting for Commands...
15,192,640 UART: [fwproc] Received command 0x46574c44
15,194,827 UART: [fwproc] Received Image of size 113760 bytes
19,251,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,327,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,396,364 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,712,769 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,788,660 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,914,564 >>> mbox cmd response: failed
12,915,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,399 >>> mbox cmd response: failed
12,915,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,968 >>> mbox cmd response: failed
Initializing fuses
2,046,961 writing to cptra_bootfsm_go
5,842,520 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,875,014 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,418 UART:
192,772 UART: Running Caliptra ROM ...
193,976 UART:
603,524 UART: [state] CFI Enabled
619,297 UART: [state] LifecycleState = Unprovisioned
621,267 UART: [state] DebugLocked = No
623,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,923 UART: [kat] SHA2-256
798,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,216 UART: [kat] ++
809,746 UART: [kat] sha1
821,169 UART: [kat] SHA2-256
823,903 UART: [kat] SHA2-384
829,985 UART: [kat] SHA2-512-ACC
832,329 UART: [kat] ECC-384
3,114,411 UART: [kat] HMAC-384Kdf
3,125,412 UART: [kat] LMS
4,315,503 UART: [kat] --
4,318,240 UART: [cold-reset] ++
4,320,178 UART: [fht] Storing FHT @ 0x50003400
4,332,470 UART: [idev] ++
4,333,032 UART: [idev] CDI.KEYID = 6
4,333,914 UART: [idev] SUBJECT.KEYID = 7
4,335,179 UART: [idev] UDS.KEYID = 0
4,337,856 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,901 UART: [idev] Erasing UDS.KEYID = 0
7,615,725 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,124 UART: [idev] --
7,643,093 UART: [ldev] ++
7,643,666 UART: [ldev] CDI.KEYID = 6
7,644,610 UART: [ldev] SUBJECT.KEYID = 5
7,645,819 UART: [ldev] AUTHORITY.KEYID = 7
7,647,106 UART: [ldev] FE.KEYID = 1
7,659,246 UART: [ldev] Erasing FE.KEYID = 1
10,950,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,549 UART: [ldev] --
13,311,758 UART: [fwproc] Waiting for Commands...
13,313,915 UART: [fwproc] Received command 0x46574c44
13,316,103 UART: [fwproc] Received Image of size 113760 bytes
13,370,790 UART: ROM Fatal Error: 0x000B0001
13,374,255 >>> mbox cmd response: failed
13,374,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,374,998 >>> mbox cmd response: failed
13,375,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,551 >>> mbox cmd response: failed
Initializing fuses
2,054,381 writing to cptra_bootfsm_go
2,243,660 UART:
2,244,016 UART: Running Caliptra ROM ...
2,245,162 UART:
7,096,793 UART: [state] CFI Enabled
7,111,180 UART: [state] LifecycleState = Unprovisioned
7,113,154 UART: [state] DebugLocked = No
7,115,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,120,141 UART: [kat] SHA2-256
7,289,895 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,300,473 UART: [kat] ++
7,300,938 UART: [kat] sha1
7,311,922 UART: [kat] SHA2-256
7,314,636 UART: [kat] SHA2-384
7,320,953 UART: [kat] SHA2-512-ACC
7,323,358 UART: [kat] ECC-384
9,607,440 UART: [kat] HMAC-384Kdf
9,620,050 UART: [kat] LMS
10,810,132 UART: [kat] --
10,814,442 UART: [cold-reset] ++
10,815,829 UART: [fht] Storing FHT @ 0x50003400
10,825,748 UART: [idev] ++
10,826,311 UART: [idev] CDI.KEYID = 6
10,827,247 UART: [idev] SUBJECT.KEYID = 7
10,828,515 UART: [idev] UDS.KEYID = 0
10,831,511 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,974,537 UART: [idev] Erasing UDS.KEYID = 0
14,115,185 UART: [idev] Using Sha1 for KeyId Algorithm
14,137,210 UART: [idev] --
14,142,178 UART: [ldev] ++
14,142,759 UART: [ldev] CDI.KEYID = 6
14,143,671 UART: [ldev] SUBJECT.KEYID = 5
14,144,934 UART: [ldev] AUTHORITY.KEYID = 7
14,146,174 UART: [ldev] FE.KEYID = 1
14,156,440 UART: [ldev] Erasing FE.KEYID = 1
17,445,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,737,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,752,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,767,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,781,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,801,496 UART: [ldev] --
19,806,105 UART: [fwproc] Waiting for Commands...
19,809,149 UART: [fwproc] Received command 0x46574c44
19,811,340 UART: [fwproc] Received Image of size 113760 bytes
23,865,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,936,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,005,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,321,034 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,128,609 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,116,765 >>> mbox cmd response: failed
13,117,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,117,867 >>> mbox cmd response: failed
13,118,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,118,438 >>> mbox cmd response: failed
Initializing fuses
2,045,677 writing to cptra_bootfsm_go
10,864,772 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,797,053 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,062 UART:
192,463 UART: Running Caliptra ROM ...
193,576 UART:
193,716 UART: [state] CFI Enabled
266,415 UART: [state] LifecycleState = Unprovisioned
268,342 UART: [state] DebugLocked = No
271,133 UART: [state] WD Timer not started. Device not locked for debugging
274,868 UART: [kat] SHA2-256
453,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,545 UART: [kat] ++
466,076 UART: [kat] sha1
477,396 UART: [kat] SHA2-256
480,459 UART: [kat] SHA2-384
486,544 UART: [kat] SHA2-512-ACC
489,527 UART: [kat] ECC-384
2,948,242 UART: [kat] HMAC-384Kdf
2,971,076 UART: [kat] LMS
3,500,524 UART: [kat] --
3,505,030 UART: [cold-reset] ++
3,506,104 UART: [fht] FHT @ 0x50003400
3,515,978 UART: [idev] ++
3,516,541 UART: [idev] CDI.KEYID = 6
3,517,426 UART: [idev] SUBJECT.KEYID = 7
3,518,638 UART: [idev] UDS.KEYID = 0
3,521,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,313 UART: [idev] Erasing UDS.KEYID = 0
6,026,064 UART: [idev] Sha1 KeyId Algorithm
6,048,320 UART: [idev] --
6,052,906 UART: [ldev] ++
6,053,527 UART: [ldev] CDI.KEYID = 6
6,054,450 UART: [ldev] SUBJECT.KEYID = 5
6,055,479 UART: [ldev] AUTHORITY.KEYID = 7
6,056,823 UART: [ldev] FE.KEYID = 1
6,100,603 UART: [ldev] Erasing FE.KEYID = 1
8,607,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,380 UART: [ldev] --
10,415,530 UART: [fwproc] Wait for Commands...
10,418,764 UART: [fwproc] Recv command 0x46574c44
10,420,859 UART: [fwproc] Recv'd Img size: 114084 bytes
10,476,150 UART: ROM Fatal Error: 0x000B0001
10,479,247 >>> mbox cmd response: failed
10,479,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,904 >>> mbox cmd response: failed
10,480,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,461 >>> mbox cmd response: failed
Initializing fuses
2,050,670 writing to cptra_bootfsm_go
2,239,990 UART:
2,240,336 UART: Running Caliptra ROM ...
2,241,470 UART:
2,241,634 UART: [state] CFI Enabled
2,308,299 UART: [state] LifecycleState = Unprovisioned
2,310,131 UART: [state] DebugLocked = No
2,311,410 UART: [state] WD Timer not started. Device not locked for debugging
2,315,043 UART: [kat] SHA2-256
2,494,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,756 UART: [kat] ++
2,506,297 UART: [kat] sha1
2,517,541 UART: [kat] SHA2-256
2,520,616 UART: [kat] SHA2-384
2,526,225 UART: [kat] SHA2-512-ACC
2,529,164 UART: [kat] ECC-384
4,992,912 UART: [kat] HMAC-384Kdf
5,017,346 UART: [kat] LMS
5,546,823 UART: [kat] --
5,551,367 UART: [cold-reset] ++
5,552,818 UART: [fht] FHT @ 0x50003400
5,563,585 UART: [idev] ++
5,564,148 UART: [idev] CDI.KEYID = 6
5,565,059 UART: [idev] SUBJECT.KEYID = 7
5,566,273 UART: [idev] UDS.KEYID = 0
5,568,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,712,403 UART: [idev] Erasing UDS.KEYID = 0
8,071,770 UART: [idev] Sha1 KeyId Algorithm
8,094,605 UART: [idev] --
8,098,237 UART: [ldev] ++
8,098,813 UART: [ldev] CDI.KEYID = 6
8,099,723 UART: [ldev] SUBJECT.KEYID = 5
8,100,885 UART: [ldev] AUTHORITY.KEYID = 7
8,102,231 UART: [ldev] FE.KEYID = 1
8,146,674 UART: [ldev] Erasing FE.KEYID = 1
10,648,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,888 UART: [ldev] --
12,441,616 UART: [fwproc] Wait for Commands...
12,443,658 UART: [fwproc] Recv command 0x46574c44
12,445,753 UART: [fwproc] Recv'd Img size: 114084 bytes
15,846,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,990,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,307,413 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,361,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,237,655 >>> mbox cmd response: failed
10,238,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,238,684 >>> mbox cmd response: failed
10,238,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,239,248 >>> mbox cmd response: failed
Initializing fuses
2,045,313 writing to cptra_bootfsm_go
5,386,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,092,296 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,618 UART:
192,990 UART: Running Caliptra ROM ...
194,192 UART:
603,667 UART: [state] CFI Enabled
612,734 UART: [state] LifecycleState = Unprovisioned
614,490 UART: [state] DebugLocked = No
616,194 UART: [state] WD Timer not started. Device not locked for debugging
619,475 UART: [kat] SHA2-256
798,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,206 UART: [kat] ++
810,735 UART: [kat] sha1
822,158 UART: [kat] SHA2-256
825,162 UART: [kat] SHA2-384
831,675 UART: [kat] SHA2-512-ACC
834,606 UART: [kat] ECC-384
3,276,065 UART: [kat] HMAC-384Kdf
3,288,770 UART: [kat] LMS
3,818,300 UART: [kat] --
3,824,937 UART: [cold-reset] ++
3,827,299 UART: [fht] FHT @ 0x50003400
3,836,603 UART: [idev] ++
3,837,164 UART: [idev] CDI.KEYID = 6
3,838,094 UART: [idev] SUBJECT.KEYID = 7
3,839,259 UART: [idev] UDS.KEYID = 0
3,842,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,661 UART: [idev] Erasing UDS.KEYID = 0
6,311,217 UART: [idev] Sha1 KeyId Algorithm
6,334,076 UART: [idev] --
6,338,662 UART: [ldev] ++
6,339,240 UART: [ldev] CDI.KEYID = 6
6,340,154 UART: [ldev] SUBJECT.KEYID = 5
6,341,234 UART: [ldev] AUTHORITY.KEYID = 7
6,342,572 UART: [ldev] FE.KEYID = 1
6,352,628 UART: [ldev] Erasing FE.KEYID = 1
8,824,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,822 UART: [ldev] --
10,617,319 UART: [fwproc] Wait for Commands...
10,619,058 UART: [fwproc] Recv command 0x46574c44
10,621,107 UART: [fwproc] Recv'd Img size: 114084 bytes
10,677,525 UART: ROM Fatal Error: 0x000B0001
10,680,629 >>> mbox cmd response: failed
10,681,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,380 >>> mbox cmd response: failed
10,681,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,939 >>> mbox cmd response: failed
Initializing fuses
2,049,729 writing to cptra_bootfsm_go
2,239,036 UART:
2,239,380 UART: Running Caliptra ROM ...
2,240,518 UART:
9,775,787 UART: [state] CFI Enabled
9,788,969 UART: [state] LifecycleState = Unprovisioned
9,790,836 UART: [state] DebugLocked = No
9,792,714 UART: [state] WD Timer not started. Device not locked for debugging
9,797,267 UART: [kat] SHA2-256
9,976,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,987,944 UART: [kat] ++
9,988,490 UART: [kat] sha1
10,001,135 UART: [kat] SHA2-256
10,004,160 UART: [kat] SHA2-384
10,010,371 UART: [kat] SHA2-512-ACC
10,013,330 UART: [kat] ECC-384
12,453,490 UART: [kat] HMAC-384Kdf
12,467,768 UART: [kat] LMS
12,997,267 UART: [kat] --
13,002,653 UART: [cold-reset] ++
13,004,327 UART: [fht] FHT @ 0x50003400
13,015,253 UART: [idev] ++
13,015,815 UART: [idev] CDI.KEYID = 6
13,016,726 UART: [idev] SUBJECT.KEYID = 7
13,017,939 UART: [idev] UDS.KEYID = 0
13,020,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,164,148 UART: [idev] Erasing UDS.KEYID = 0
15,492,381 UART: [idev] Sha1 KeyId Algorithm
15,515,411 UART: [idev] --
15,518,644 UART: [ldev] ++
15,519,209 UART: [ldev] CDI.KEYID = 6
15,520,171 UART: [ldev] SUBJECT.KEYID = 5
15,521,332 UART: [ldev] AUTHORITY.KEYID = 7
15,522,561 UART: [ldev] FE.KEYID = 1
15,534,286 UART: [ldev] Erasing FE.KEYID = 1
18,014,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,730,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,746,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,762,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,778,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,798,962 UART: [ldev] --
19,803,306 UART: [fwproc] Wait for Commands...
19,805,509 UART: [fwproc] Recv command 0x46574c44
19,807,607 UART: [fwproc] Recv'd Img size: 114084 bytes
23,203,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,278,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,347,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,664,055 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,700,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,462,364 >>> mbox cmd response: failed
10,463,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,463,917 >>> mbox cmd response: failed
10,464,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,500 >>> mbox cmd response: failed
Initializing fuses
2,047,873 writing to cptra_bootfsm_go
13,093,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,667,601 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,053 writing to cptra_bootfsm_go
193,276 UART:
193,625 UART: Running Caliptra ROM ...
194,810 UART:
194,961 UART: [state] CFI Enabled
260,164 UART: [state] LifecycleState = Unprovisioned
262,584 UART: [state] DebugLocked = No
264,458 UART: [state] WD Timer not started. Device not locked for debugging
269,712 UART: [kat] SHA2-256
459,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,395 UART: [kat] ++
470,869 UART: [kat] sha1
483,106 UART: [kat] SHA2-256
486,128 UART: [kat] SHA2-384
492,279 UART: [kat] SHA2-512-ACC
494,854 UART: [kat] ECC-384
2,948,891 UART: [kat] HMAC-384Kdf
2,971,347 UART: [kat] LMS
3,503,166 UART: [kat] --
3,505,597 UART: [cold-reset] ++
3,507,858 UART: [fht] FHT @ 0x50003400
3,518,950 UART: [idev] ++
3,519,687 UART: [idev] CDI.KEYID = 6
3,520,598 UART: [idev] SUBJECT.KEYID = 7
3,522,006 UART: [idev] UDS.KEYID = 0
3,524,736 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,283 UART: [idev] Erasing UDS.KEYID = 0
6,028,675 UART: [idev] Sha1 KeyId Algorithm
6,052,403 UART: [idev] --
6,057,496 UART: [ldev] ++
6,058,180 UART: [ldev] CDI.KEYID = 6
6,059,066 UART: [ldev] SUBJECT.KEYID = 5
6,060,347 UART: [ldev] AUTHORITY.KEYID = 7
6,061,528 UART: [ldev] FE.KEYID = 1
6,098,863 UART: [ldev] Erasing FE.KEYID = 1
8,604,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,757 UART: [ldev] --
10,411,113 UART: [fwproc] Wait for Commands...
10,414,198 UART: [fwproc] Recv command 0x46574c44
10,416,518 UART: [fwproc] Recv'd Img size: 114084 bytes
10,503,168 UART: ROM Fatal Error: 0x000B0001
10,506,831 >>> mbox cmd response: failed
10,507,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,570 >>> mbox cmd response: failed
10,507,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,508,126 >>> mbox cmd response: failed
Initializing fuses
2,048,809 writing to cptra_bootfsm_go
2,238,074 UART:
2,238,449 UART: Running Caliptra ROM ...
2,239,496 UART:
2,239,646 UART: [state] CFI Enabled
2,296,666 UART: [state] LifecycleState = Unprovisioned
2,299,039 UART: [state] DebugLocked = No
2,300,322 UART: [state] WD Timer not started. Device not locked for debugging
2,304,952 UART: [kat] SHA2-256
2,494,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,505,578 UART: [kat] ++
2,506,066 UART: [kat] sha1
2,517,384 UART: [kat] SHA2-256
2,520,407 UART: [kat] SHA2-384
2,526,618 UART: [kat] SHA2-512-ACC
2,529,201 UART: [kat] ECC-384
4,982,777 UART: [kat] HMAC-384Kdf
5,005,609 UART: [kat] LMS
5,537,375 UART: [kat] --
5,541,091 UART: [cold-reset] ++
5,542,591 UART: [fht] FHT @ 0x50003400
5,554,180 UART: [idev] ++
5,554,856 UART: [idev] CDI.KEYID = 6
5,555,896 UART: [idev] SUBJECT.KEYID = 7
5,557,005 UART: [idev] UDS.KEYID = 0
5,559,638 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,703,246 UART: [idev] Erasing UDS.KEYID = 0
8,060,700 UART: [idev] Sha1 KeyId Algorithm
8,082,109 UART: [idev] --
8,087,624 UART: [ldev] ++
8,088,309 UART: [ldev] CDI.KEYID = 6
8,089,225 UART: [ldev] SUBJECT.KEYID = 5
8,090,388 UART: [ldev] AUTHORITY.KEYID = 7
8,091,626 UART: [ldev] FE.KEYID = 1
8,133,439 UART: [ldev] Erasing FE.KEYID = 1
10,639,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,904 UART: [ldev] --
12,445,170 UART: [fwproc] Wait for Commands...
12,446,951 UART: [fwproc] Recv command 0x46574c44
12,449,223 UART: [fwproc] Recv'd Img size: 114084 bytes
15,892,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,089,578 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,629,645 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,440,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,299,437 >>> mbox cmd response: failed
10,299,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,337 >>> mbox cmd response: failed
10,300,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,896 >>> mbox cmd response: failed
Initializing fuses
2,049,028 writing to cptra_bootfsm_go
5,490,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,769,622 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,602 UART:
192,953 UART: Running Caliptra ROM ...
194,151 UART:
603,683 UART: [state] CFI Enabled
619,330 UART: [state] LifecycleState = Unprovisioned
621,730 UART: [state] DebugLocked = No
624,085 UART: [state] WD Timer not started. Device not locked for debugging
628,039 UART: [kat] SHA2-256
817,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,721 UART: [kat] ++
829,222 UART: [kat] sha1
840,765 UART: [kat] SHA2-256
843,780 UART: [kat] SHA2-384
848,518 UART: [kat] SHA2-512-ACC
851,111 UART: [kat] ECC-384
3,292,782 UART: [kat] HMAC-384Kdf
3,306,048 UART: [kat] LMS
3,837,878 UART: [kat] --
3,841,922 UART: [cold-reset] ++
3,843,203 UART: [fht] FHT @ 0x50003400
3,854,076 UART: [idev] ++
3,854,804 UART: [idev] CDI.KEYID = 6
3,855,743 UART: [idev] SUBJECT.KEYID = 7
3,856,950 UART: [idev] UDS.KEYID = 0
3,859,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,219 UART: [idev] Erasing UDS.KEYID = 0
6,339,439 UART: [idev] Sha1 KeyId Algorithm
6,361,876 UART: [idev] --
6,367,004 UART: [ldev] ++
6,367,727 UART: [ldev] CDI.KEYID = 6
6,368,615 UART: [ldev] SUBJECT.KEYID = 5
6,369,772 UART: [ldev] AUTHORITY.KEYID = 7
6,371,007 UART: [ldev] FE.KEYID = 1
6,382,631 UART: [ldev] Erasing FE.KEYID = 1
8,859,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,712 UART: [ldev] --
10,648,602 UART: [fwproc] Wait for Commands...
10,650,322 UART: [fwproc] Recv command 0x46574c44
10,652,583 UART: [fwproc] Recv'd Img size: 114084 bytes
10,741,143 UART: ROM Fatal Error: 0x000B0001
10,744,831 >>> mbox cmd response: failed
10,745,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,745,478 >>> mbox cmd response: failed
10,745,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,746,031 >>> mbox cmd response: failed
Initializing fuses
2,052,157 writing to cptra_bootfsm_go
2,241,490 UART:
2,241,850 UART: Running Caliptra ROM ...
2,242,981 UART:
9,704,871 UART: [state] CFI Enabled
9,718,536 UART: [state] LifecycleState = Unprovisioned
9,720,947 UART: [state] DebugLocked = No
9,723,470 UART: [state] WD Timer not started. Device not locked for debugging
9,728,782 UART: [kat] SHA2-256
9,918,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,929,448 UART: [kat] ++
9,929,994 UART: [kat] sha1
9,941,700 UART: [kat] SHA2-256
9,944,707 UART: [kat] SHA2-384
9,950,758 UART: [kat] SHA2-512-ACC
9,953,377 UART: [kat] ECC-384
12,397,001 UART: [kat] HMAC-384Kdf
12,409,561 UART: [kat] LMS
12,941,353 UART: [kat] --
12,946,154 UART: [cold-reset] ++
12,948,622 UART: [fht] FHT @ 0x50003400
12,960,464 UART: [idev] ++
12,961,213 UART: [idev] CDI.KEYID = 6
12,962,117 UART: [idev] SUBJECT.KEYID = 7
12,963,327 UART: [idev] UDS.KEYID = 0
12,965,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,109,312 UART: [idev] Erasing UDS.KEYID = 0
15,440,190 UART: [idev] Sha1 KeyId Algorithm
15,463,684 UART: [idev] --
15,467,269 UART: [ldev] ++
15,468,015 UART: [ldev] CDI.KEYID = 6
15,468,927 UART: [ldev] SUBJECT.KEYID = 5
15,470,087 UART: [ldev] AUTHORITY.KEYID = 7
15,471,319 UART: [ldev] FE.KEYID = 1
15,484,122 UART: [ldev] Erasing FE.KEYID = 1
17,962,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,681,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,696,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,712,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,727,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,749,063 UART: [ldev] --
19,754,659 UART: [fwproc] Wait for Commands...
19,756,753 UART: [fwproc] Recv command 0x46574c44
19,759,062 UART: [fwproc] Recv'd Img size: 114084 bytes
23,196,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,276,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,392,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,933,344 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,759,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,525,847 >>> mbox cmd response: failed
10,526,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,526,745 >>> mbox cmd response: failed
10,527,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,527,308 >>> mbox cmd response: failed
Initializing fuses
2,053,980 writing to cptra_bootfsm_go
13,095,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,277,380 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,077 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,216 UART: [idev] ++
1,479,384 UART: [idev] CDI.KEYID = 6
1,479,744 UART: [idev] SUBJECT.KEYID = 7
1,480,168 UART: [idev] UDS.KEYID = 0
1,480,513 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,504,966 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,716 UART: [idev] --
1,514,593 UART: [ldev] ++
1,514,761 UART: [ldev] CDI.KEYID = 6
1,515,124 UART: [ldev] SUBJECT.KEYID = 5
1,515,550 UART: [ldev] AUTHORITY.KEYID = 7
1,516,013 UART: [ldev] FE.KEYID = 1
1,521,499 UART: [ldev] Erasing FE.KEYID = 1
1,546,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,666 UART: [ldev] --
1,586,013 UART: [fwproc] Waiting for Commands...
1,586,652 UART: [fwproc] Received command 0x46574c44
1,587,443 UART: [fwproc] Received Image of size 114084 bytes
1,606,885 UART: ROM Fatal Error: 0x000B0001
1,608,042 >>> mbox cmd response: failed
1,608,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,048 >>> mbox cmd response: failed
1,608,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,349 UART: [kat] SHA2-256
882,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,395 UART: [kat] ++
886,547 UART: [kat] sha1
890,837 UART: [kat] SHA2-256
892,775 UART: [kat] SHA2-384
895,574 UART: [kat] SHA2-512-ACC
897,475 UART: [kat] ECC-384
903,532 UART: [kat] HMAC-384Kdf
907,958 UART: [kat] LMS
1,476,154 UART: [kat] --
1,476,979 UART: [cold-reset] ++
1,477,487 UART: [fht] Storing FHT @ 0x50003400
1,480,306 UART: [idev] ++
1,480,474 UART: [idev] CDI.KEYID = 6
1,480,834 UART: [idev] SUBJECT.KEYID = 7
1,481,258 UART: [idev] UDS.KEYID = 0
1,481,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,918 UART: [idev] Erasing UDS.KEYID = 0
1,505,528 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,258 UART: [idev] --
1,515,369 UART: [ldev] ++
1,515,537 UART: [ldev] CDI.KEYID = 6
1,515,900 UART: [ldev] SUBJECT.KEYID = 5
1,516,326 UART: [ldev] AUTHORITY.KEYID = 7
1,516,789 UART: [ldev] FE.KEYID = 1
1,522,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,816 UART: [ldev] --
1,586,235 UART: [fwproc] Waiting for Commands...
1,587,090 UART: [fwproc] Received command 0x46574c44
1,587,881 UART: [fwproc] Received Image of size 114084 bytes
2,881,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,197 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,060 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,460,789 >>> mbox cmd response: failed
1,460,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,795 >>> mbox cmd response: failed
1,460,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,721 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,816 UART: [kat] SHA2-256
882,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,862 UART: [kat] ++
887,014 UART: [kat] sha1
891,250 UART: [kat] SHA2-256
893,188 UART: [kat] SHA2-384
895,863 UART: [kat] SHA2-512-ACC
897,764 UART: [kat] ECC-384
903,489 UART: [kat] HMAC-384Kdf
908,259 UART: [kat] LMS
1,476,455 UART: [kat] --
1,477,564 UART: [cold-reset] ++
1,478,020 UART: [fht] Storing FHT @ 0x50003400
1,480,713 UART: [idev] ++
1,480,881 UART: [idev] CDI.KEYID = 6
1,481,241 UART: [idev] SUBJECT.KEYID = 7
1,481,665 UART: [idev] UDS.KEYID = 0
1,482,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,307 UART: [idev] Erasing UDS.KEYID = 0
1,505,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,268 UART: [ldev] ++
1,515,436 UART: [ldev] CDI.KEYID = 6
1,515,799 UART: [ldev] SUBJECT.KEYID = 5
1,516,225 UART: [ldev] AUTHORITY.KEYID = 7
1,516,688 UART: [ldev] FE.KEYID = 1
1,522,210 UART: [ldev] Erasing FE.KEYID = 1
1,547,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,789 UART: [ldev] --
1,587,194 UART: [fwproc] Waiting for Commands...
1,587,923 UART: [fwproc] Received command 0x46574c44
1,588,714 UART: [fwproc] Received Image of size 114084 bytes
1,608,430 UART: ROM Fatal Error: 0x000B0001
1,609,587 >>> mbox cmd response: failed
1,609,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,593 >>> mbox cmd response: failed
1,609,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,358 UART: [kat] SHA2-256
892,296 UART: [kat] SHA2-384
895,065 UART: [kat] SHA2-512-ACC
896,966 UART: [kat] ECC-384
902,719 UART: [kat] HMAC-384Kdf
907,415 UART: [kat] LMS
1,475,611 UART: [kat] --
1,476,578 UART: [cold-reset] ++
1,477,106 UART: [fht] Storing FHT @ 0x50003400
1,479,917 UART: [idev] ++
1,480,085 UART: [idev] CDI.KEYID = 6
1,480,445 UART: [idev] SUBJECT.KEYID = 7
1,480,869 UART: [idev] UDS.KEYID = 0
1,481,214 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,165 UART: [idev] Erasing UDS.KEYID = 0
1,505,525 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,131 UART: [idev] --
1,515,052 UART: [ldev] ++
1,515,220 UART: [ldev] CDI.KEYID = 6
1,515,583 UART: [ldev] SUBJECT.KEYID = 5
1,516,009 UART: [ldev] AUTHORITY.KEYID = 7
1,516,472 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,547,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,053 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,097 UART: [fwproc] Received command 0x46574c44
1,587,888 UART: [fwproc] Received Image of size 114084 bytes
2,882,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,137 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,872 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,460,988 >>> mbox cmd response: failed
1,460,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,994 >>> mbox cmd response: failed
1,460,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,092 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,951 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
893,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,711 UART: [kat] ++
897,863 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,172,009 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,174,906 UART: [idev] ++
1,175,074 UART: [idev] CDI.KEYID = 6
1,175,434 UART: [idev] SUBJECT.KEYID = 7
1,175,858 UART: [idev] UDS.KEYID = 0
1,176,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,419 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,232 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,155 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,706 UART: [fwproc] Recv command 0x46574c44
1,284,434 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,676 UART: ROM Fatal Error: 0x000B0001
1,304,833 >>> mbox cmd response: failed
1,304,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,839 >>> mbox cmd response: failed
1,304,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,783 UART: [cold-reset] ++
1,172,241 UART: [fht] FHT @ 0x50003400
1,174,986 UART: [idev] ++
1,175,154 UART: [idev] CDI.KEYID = 6
1,175,514 UART: [idev] SUBJECT.KEYID = 7
1,175,938 UART: [idev] UDS.KEYID = 0
1,176,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,673 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,112 UART: [ldev] SUBJECT.KEYID = 5
1,211,538 UART: [ldev] AUTHORITY.KEYID = 7
1,212,001 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,244,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,351 UART: [ldev] --
1,283,616 UART: [fwproc] Wait for Commands...
1,284,294 UART: [fwproc] Recv command 0x46574c44
1,285,022 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,890 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,376 >>> mbox cmd response: failed
1,159,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,382 >>> mbox cmd response: failed
1,159,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,447 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
893,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,388 UART: [kat] ++
897,540 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,499 UART: [kat] SHA2-512-ACC
908,400 UART: [kat] ECC-384
918,137 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,172,014 UART: [cold-reset] ++
1,172,340 UART: [fht] FHT @ 0x50003400
1,175,081 UART: [idev] ++
1,175,249 UART: [idev] CDI.KEYID = 6
1,175,609 UART: [idev] SUBJECT.KEYID = 7
1,176,033 UART: [idev] UDS.KEYID = 0
1,176,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,891 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,494 UART: [idev] --
1,210,708 UART: [ldev] ++
1,210,876 UART: [ldev] CDI.KEYID = 6
1,211,239 UART: [ldev] SUBJECT.KEYID = 5
1,211,665 UART: [ldev] AUTHORITY.KEYID = 7
1,212,128 UART: [ldev] FE.KEYID = 1
1,217,214 UART: [ldev] Erasing FE.KEYID = 1
1,244,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,872 UART: [ldev] --
1,283,185 UART: [fwproc] Wait for Commands...
1,283,955 UART: [fwproc] Recv command 0x46574c44
1,284,683 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,905 UART: ROM Fatal Error: 0x000B0001
1,305,062 >>> mbox cmd response: failed
1,305,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,068 >>> mbox cmd response: failed
1,305,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,118 UART: [kat] SHA2-256
904,058 UART: [kat] SHA2-384
906,779 UART: [kat] SHA2-512-ACC
908,680 UART: [kat] ECC-384
918,717 UART: [kat] HMAC-384Kdf
923,481 UART: [kat] LMS
1,171,809 UART: [kat] --
1,172,862 UART: [cold-reset] ++
1,173,302 UART: [fht] FHT @ 0x50003400
1,176,091 UART: [idev] ++
1,176,259 UART: [idev] CDI.KEYID = 6
1,176,619 UART: [idev] SUBJECT.KEYID = 7
1,177,043 UART: [idev] UDS.KEYID = 0
1,177,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,831 UART: [idev] Erasing UDS.KEYID = 0
1,202,078 UART: [idev] Sha1 KeyId Algorithm
1,210,692 UART: [idev] --
1,211,786 UART: [ldev] ++
1,211,954 UART: [ldev] CDI.KEYID = 6
1,212,317 UART: [ldev] SUBJECT.KEYID = 5
1,212,743 UART: [ldev] AUTHORITY.KEYID = 7
1,213,206 UART: [ldev] FE.KEYID = 1
1,218,666 UART: [ldev] Erasing FE.KEYID = 1
1,245,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,676 UART: [ldev] --
1,285,079 UART: [fwproc] Wait for Commands...
1,285,819 UART: [fwproc] Recv command 0x46574c44
1,286,547 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,879 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,533 >>> mbox cmd response: failed
1,160,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,539 >>> mbox cmd response: failed
1,160,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,010 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,872 UART: [kat] SHA2-512-ACC
906,773 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,064 UART: [kat] LMS
1,169,376 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,197 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,208,047 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,410 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,399 UART: ROM Fatal Error: 0x000B0001
1,302,556 >>> mbox cmd response: failed
1,302,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,562 >>> mbox cmd response: failed
1,302,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,200 UART: [kat] SHA2-512-ACC
906,101 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,568 UART: [kat] LMS
1,168,880 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,505 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,174,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,609 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,586 UART: [ldev] --
1,280,866 UART: [fwproc] Wait for Commands...
1,281,469 UART: [fwproc] Recv command 0x46574c44
1,282,202 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,956 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,154,477 >>> mbox cmd response: failed
1,154,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,483 >>> mbox cmd response: failed
1,154,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,708 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,832 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,174,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,284 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,210,253 UART: [ldev] ++
1,210,421 UART: [ldev] CDI.KEYID = 6
1,210,785 UART: [ldev] SUBJECT.KEYID = 5
1,211,212 UART: [ldev] AUTHORITY.KEYID = 7
1,211,675 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,244,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,417 UART: [ldev] --
1,283,887 UART: [fwproc] Wait for Commands...
1,284,596 UART: [fwproc] Recv command 0x46574c44
1,285,329 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,780 UART: ROM Fatal Error: 0x000B0001
1,305,937 >>> mbox cmd response: failed
1,305,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,943 >>> mbox cmd response: failed
1,305,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,949 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,043 UART: [state] LifecycleState = Unprovisioned
86,698 UART: [state] DebugLocked = No
87,204 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,002 UART: [kat] ++
896,154 UART: [kat] sha1
900,440 UART: [kat] SHA2-256
902,380 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
917,195 UART: [kat] HMAC-384Kdf
921,753 UART: [kat] LMS
1,170,065 UART: [kat] --
1,171,336 UART: [cold-reset] ++
1,171,736 UART: [fht] FHT @ 0x50003400
1,174,412 UART: [idev] ++
1,174,580 UART: [idev] CDI.KEYID = 6
1,174,941 UART: [idev] SUBJECT.KEYID = 7
1,175,366 UART: [idev] UDS.KEYID = 0
1,175,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,200,934 UART: [idev] Sha1 KeyId Algorithm
1,209,934 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,894 UART: [ldev] AUTHORITY.KEYID = 7
1,212,357 UART: [ldev] FE.KEYID = 1
1,217,495 UART: [ldev] Erasing FE.KEYID = 1
1,243,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,967 UART: [ldev] --
1,282,401 UART: [fwproc] Wait for Commands...
1,283,082 UART: [fwproc] Recv command 0x46574c44
1,283,815 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,983 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,374 >>> mbox cmd response: failed
1,155,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,380 >>> mbox cmd response: failed
1,155,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,353 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,118 UART:
192,479 UART: Running Caliptra ROM ...
193,664 UART:
193,822 UART: [state] CFI Enabled
265,505 UART: [state] LifecycleState = Unprovisioned
267,469 UART: [state] DebugLocked = No
269,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,302 UART: [kat] SHA2-256
443,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,503 UART: [kat] ++
454,036 UART: [kat] sha1
465,029 UART: [kat] SHA2-256
467,720 UART: [kat] SHA2-384
475,103 UART: [kat] SHA2-512-ACC
477,455 UART: [kat] ECC-384
2,766,861 UART: [kat] HMAC-384Kdf
2,798,008 UART: [kat] LMS
3,988,296 UART: [kat] --
3,993,213 UART: [cold-reset] ++
3,995,267 UART: [fht] Storing FHT @ 0x50003400
4,005,842 UART: [idev] ++
4,006,415 UART: [idev] CDI.KEYID = 6
4,007,343 UART: [idev] SUBJECT.KEYID = 7
4,008,636 UART: [idev] UDS.KEYID = 0
4,011,693 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,003 UART: [idev] Erasing UDS.KEYID = 0
7,345,682 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,940 UART: [idev] --
7,371,987 UART: [ldev] ++
7,372,564 UART: [ldev] CDI.KEYID = 6
7,373,536 UART: [ldev] SUBJECT.KEYID = 5
7,374,692 UART: [ldev] AUTHORITY.KEYID = 7
7,376,069 UART: [ldev] FE.KEYID = 1
7,420,586 UART: [ldev] Erasing FE.KEYID = 1
10,754,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,447 UART: [ldev] --
13,135,419 UART: [fwproc] Waiting for Commands...
13,138,706 UART: [fwproc] Received command 0x46574c44
13,140,899 UART: [fwproc] Received Image of size 113760 bytes
13,194,244 UART: ROM Fatal Error: 0x000B0002
13,197,769 >>> mbox cmd response: failed
13,198,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,198,504 >>> mbox cmd response: failed
13,198,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,063 >>> mbox cmd response: failed
Initializing fuses
2,051,039 writing to cptra_bootfsm_go
2,240,448 UART:
2,240,826 UART: Running Caliptra ROM ...
2,241,903 UART:
2,242,067 UART: [state] CFI Enabled
2,317,276 UART: [state] LifecycleState = Unprovisioned
2,319,218 UART: [state] DebugLocked = No
2,321,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,168 UART: [kat] SHA2-256
2,495,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,380 UART: [kat] ++
2,506,923 UART: [kat] sha1
2,517,120 UART: [kat] SHA2-256
2,519,812 UART: [kat] SHA2-384
2,525,484 UART: [kat] SHA2-512-ACC
2,527,892 UART: [kat] ECC-384
4,820,088 UART: [kat] HMAC-384Kdf
4,850,732 UART: [kat] LMS
6,040,989 UART: [kat] --
6,046,081 UART: [cold-reset] ++
6,047,128 UART: [fht] Storing FHT @ 0x50003400
6,059,062 UART: [idev] ++
6,059,690 UART: [idev] CDI.KEYID = 6
6,060,598 UART: [idev] SUBJECT.KEYID = 7
6,061,869 UART: [idev] UDS.KEYID = 0
6,064,381 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,207,599 UART: [idev] Erasing UDS.KEYID = 0
9,396,332 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,581 UART: [idev] --
9,423,152 UART: [ldev] ++
9,423,734 UART: [ldev] CDI.KEYID = 6
9,424,700 UART: [ldev] SUBJECT.KEYID = 5
9,425,978 UART: [ldev] AUTHORITY.KEYID = 7
9,427,167 UART: [ldev] FE.KEYID = 1
9,473,055 UART: [ldev] Erasing FE.KEYID = 1
12,806,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,114,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,129,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,161,476 UART: [ldev] --
15,166,358 UART: [fwproc] Waiting for Commands...
15,169,251 UART: [fwproc] Received command 0x46574c44
15,171,456 UART: [fwproc] Received Image of size 113760 bytes
19,220,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,296,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,365,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,682,453 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,808,886 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,940,810 >>> mbox cmd response: failed
12,941,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,885 >>> mbox cmd response: failed
12,942,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,394 >>> mbox cmd response: failed
Initializing fuses
2,046,635 writing to cptra_bootfsm_go
5,835,422 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,896,771 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,527 UART:
192,894 UART: Running Caliptra ROM ...
194,024 UART:
603,902 UART: [state] CFI Enabled
617,695 UART: [state] LifecycleState = Unprovisioned
619,622 UART: [state] DebugLocked = No
621,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,557 UART: [kat] SHA2-256
796,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,806 UART: [kat] ++
807,280 UART: [kat] sha1
817,085 UART: [kat] SHA2-256
819,780 UART: [kat] SHA2-384
825,392 UART: [kat] SHA2-512-ACC
827,740 UART: [kat] ECC-384
3,110,901 UART: [kat] HMAC-384Kdf
3,122,926 UART: [kat] LMS
4,313,057 UART: [kat] --
4,317,811 UART: [cold-reset] ++
4,319,256 UART: [fht] Storing FHT @ 0x50003400
4,329,662 UART: [idev] ++
4,330,236 UART: [idev] CDI.KEYID = 6
4,331,346 UART: [idev] SUBJECT.KEYID = 7
4,332,468 UART: [idev] UDS.KEYID = 0
4,335,219 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,168 UART: [idev] Erasing UDS.KEYID = 0
7,620,182 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,648 UART: [idev] --
7,645,718 UART: [ldev] ++
7,646,292 UART: [ldev] CDI.KEYID = 6
7,647,235 UART: [ldev] SUBJECT.KEYID = 5
7,648,502 UART: [ldev] AUTHORITY.KEYID = 7
7,649,737 UART: [ldev] FE.KEYID = 1
7,661,196 UART: [ldev] Erasing FE.KEYID = 1
10,948,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,796 UART: [ldev] --
13,307,836 UART: [fwproc] Waiting for Commands...
13,311,180 UART: [fwproc] Received command 0x46574c44
13,313,367 UART: [fwproc] Received Image of size 113760 bytes
13,367,469 UART: ROM Fatal Error: 0x000B0002
13,371,069 >>> mbox cmd response: failed
13,371,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,371,857 >>> mbox cmd response: failed
13,372,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,372,414 >>> mbox cmd response: failed
Initializing fuses
2,050,816 writing to cptra_bootfsm_go
2,240,092 UART:
2,240,442 UART: Running Caliptra ROM ...
2,241,489 UART:
7,099,568 UART: [state] CFI Enabled
7,114,978 UART: [state] LifecycleState = Unprovisioned
7,116,894 UART: [state] DebugLocked = No
7,118,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,122,660 UART: [kat] SHA2-256
7,292,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,302,938 UART: [kat] ++
7,303,483 UART: [kat] sha1
7,314,481 UART: [kat] SHA2-256
7,317,177 UART: [kat] SHA2-384
7,321,814 UART: [kat] SHA2-512-ACC
7,324,164 UART: [kat] ECC-384
9,609,497 UART: [kat] HMAC-384Kdf
9,620,703 UART: [kat] LMS
10,810,810 UART: [kat] --
10,814,816 UART: [cold-reset] ++
10,816,546 UART: [fht] Storing FHT @ 0x50003400
10,826,461 UART: [idev] ++
10,827,022 UART: [idev] CDI.KEYID = 6
10,828,007 UART: [idev] SUBJECT.KEYID = 7
10,829,228 UART: [idev] UDS.KEYID = 0
10,832,060 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,975,103 UART: [idev] Erasing UDS.KEYID = 0
14,119,047 UART: [idev] Using Sha1 for KeyId Algorithm
14,140,701 UART: [idev] --
14,144,099 UART: [ldev] ++
14,144,669 UART: [ldev] CDI.KEYID = 6
14,145,628 UART: [ldev] SUBJECT.KEYID = 5
14,146,888 UART: [ldev] AUTHORITY.KEYID = 7
14,148,126 UART: [ldev] FE.KEYID = 1
14,159,964 UART: [ldev] Erasing FE.KEYID = 1
17,450,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,742,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,757,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,771,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,786,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,806,585 UART: [ldev] --
19,812,181 UART: [fwproc] Waiting for Commands...
19,814,125 UART: [fwproc] Received command 0x46574c44
19,816,370 UART: [fwproc] Received Image of size 113760 bytes
23,866,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,942,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,011,423 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,327,921 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,127,065 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,108,748 >>> mbox cmd response: failed
13,109,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,109,699 >>> mbox cmd response: failed
13,109,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,110,268 >>> mbox cmd response: failed
Initializing fuses
2,046,364 writing to cptra_bootfsm_go
10,876,079 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,814,382 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,171 UART:
192,542 UART: Running Caliptra ROM ...
193,739 UART:
193,913 UART: [state] CFI Enabled
264,938 UART: [state] LifecycleState = Unprovisioned
266,786 UART: [state] DebugLocked = No
269,214 UART: [state] WD Timer not started. Device not locked for debugging
272,987 UART: [kat] SHA2-256
452,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,685 UART: [kat] ++
464,220 UART: [kat] sha1
476,129 UART: [kat] SHA2-256
479,184 UART: [kat] SHA2-384
485,805 UART: [kat] SHA2-512-ACC
488,798 UART: [kat] ECC-384
2,951,225 UART: [kat] HMAC-384Kdf
2,972,970 UART: [kat] LMS
3,502,389 UART: [kat] --
3,507,630 UART: [cold-reset] ++
3,509,964 UART: [fht] FHT @ 0x50003400
3,520,727 UART: [idev] ++
3,521,292 UART: [idev] CDI.KEYID = 6
3,522,212 UART: [idev] SUBJECT.KEYID = 7
3,523,424 UART: [idev] UDS.KEYID = 0
3,526,361 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,522 UART: [idev] Erasing UDS.KEYID = 0
6,030,312 UART: [idev] Sha1 KeyId Algorithm
6,054,683 UART: [idev] --
6,057,868 UART: [ldev] ++
6,058,437 UART: [ldev] CDI.KEYID = 6
6,059,349 UART: [ldev] SUBJECT.KEYID = 5
6,060,509 UART: [ldev] AUTHORITY.KEYID = 7
6,061,796 UART: [ldev] FE.KEYID = 1
6,102,804 UART: [ldev] Erasing FE.KEYID = 1
8,605,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,659 UART: [ldev] --
10,415,222 UART: [fwproc] Wait for Commands...
10,417,209 UART: [fwproc] Recv command 0x46574c44
10,419,304 UART: [fwproc] Recv'd Img size: 114084 bytes
10,474,598 UART: ROM Fatal Error: 0x000B0002
10,477,688 >>> mbox cmd response: failed
10,478,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,478,444 >>> mbox cmd response: failed
10,478,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,009 >>> mbox cmd response: failed
Initializing fuses
2,050,516 writing to cptra_bootfsm_go
2,239,826 UART:
2,240,174 UART: Running Caliptra ROM ...
2,241,316 UART:
2,241,479 UART: [state] CFI Enabled
2,312,411 UART: [state] LifecycleState = Unprovisioned
2,314,297 UART: [state] DebugLocked = No
2,316,612 UART: [state] WD Timer not started. Device not locked for debugging
2,320,520 UART: [kat] SHA2-256
2,499,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,251 UART: [kat] ++
2,511,799 UART: [kat] sha1
2,522,699 UART: [kat] SHA2-256
2,525,766 UART: [kat] SHA2-384
2,533,289 UART: [kat] SHA2-512-ACC
2,536,235 UART: [kat] ECC-384
4,990,721 UART: [kat] HMAC-384Kdf
5,016,889 UART: [kat] LMS
5,546,324 UART: [kat] --
5,550,501 UART: [cold-reset] ++
5,551,844 UART: [fht] FHT @ 0x50003400
5,562,983 UART: [idev] ++
5,563,547 UART: [idev] CDI.KEYID = 6
5,564,472 UART: [idev] SUBJECT.KEYID = 7
5,565,626 UART: [idev] UDS.KEYID = 0
5,568,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,711,915 UART: [idev] Erasing UDS.KEYID = 0
8,070,287 UART: [idev] Sha1 KeyId Algorithm
8,094,166 UART: [idev] --
8,098,381 UART: [ldev] ++
8,098,974 UART: [ldev] CDI.KEYID = 6
8,099,891 UART: [ldev] SUBJECT.KEYID = 5
8,101,058 UART: [ldev] AUTHORITY.KEYID = 7
8,102,293 UART: [ldev] FE.KEYID = 1
8,143,603 UART: [ldev] Erasing FE.KEYID = 1
10,646,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,653 UART: [ldev] --
12,456,462 UART: [fwproc] Wait for Commands...
12,458,345 UART: [fwproc] Recv command 0x46574c44
12,460,441 UART: [fwproc] Recv'd Img size: 114084 bytes
15,853,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,926,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,995,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,311,636 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,359,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,221,293 >>> mbox cmd response: failed
10,221,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,222,207 >>> mbox cmd response: failed
10,222,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,222,764 >>> mbox cmd response: failed
Initializing fuses
2,046,260 writing to cptra_bootfsm_go
5,404,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,088,820 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,618 UART:
192,977 UART: Running Caliptra ROM ...
194,457 UART:
603,578 UART: [state] CFI Enabled
617,833 UART: [state] LifecycleState = Unprovisioned
619,718 UART: [state] DebugLocked = No
621,418 UART: [state] WD Timer not started. Device not locked for debugging
625,686 UART: [kat] SHA2-256
804,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,371 UART: [kat] ++
816,905 UART: [kat] sha1
827,410 UART: [kat] SHA2-256
830,470 UART: [kat] SHA2-384
836,683 UART: [kat] SHA2-512-ACC
839,598 UART: [kat] ECC-384
3,280,986 UART: [kat] HMAC-384Kdf
3,293,021 UART: [kat] LMS
3,822,522 UART: [kat] --
3,825,577 UART: [cold-reset] ++
3,827,372 UART: [fht] FHT @ 0x50003400
3,838,785 UART: [idev] ++
3,839,356 UART: [idev] CDI.KEYID = 6
3,840,344 UART: [idev] SUBJECT.KEYID = 7
3,841,509 UART: [idev] UDS.KEYID = 0
3,844,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,000 UART: [idev] Erasing UDS.KEYID = 0
6,317,150 UART: [idev] Sha1 KeyId Algorithm
6,340,326 UART: [idev] --
6,344,430 UART: [ldev] ++
6,345,025 UART: [ldev] CDI.KEYID = 6
6,345,941 UART: [ldev] SUBJECT.KEYID = 5
6,347,101 UART: [ldev] AUTHORITY.KEYID = 7
6,348,338 UART: [ldev] FE.KEYID = 1
6,357,154 UART: [ldev] Erasing FE.KEYID = 1
8,832,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,822 UART: [ldev] --
10,621,763 UART: [fwproc] Wait for Commands...
10,623,756 UART: [fwproc] Recv command 0x46574c44
10,625,852 UART: [fwproc] Recv'd Img size: 114084 bytes
10,680,987 UART: ROM Fatal Error: 0x000B0002
10,684,068 >>> mbox cmd response: failed
10,684,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,684,831 >>> mbox cmd response: failed
10,685,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,685,396 >>> mbox cmd response: failed
Initializing fuses
2,056,282 writing to cptra_bootfsm_go
2,245,617 UART:
2,245,972 UART: Running Caliptra ROM ...
2,247,106 UART:
9,773,873 UART: [state] CFI Enabled
9,789,588 UART: [state] LifecycleState = Unprovisioned
9,791,452 UART: [state] DebugLocked = No
9,793,378 UART: [state] WD Timer not started. Device not locked for debugging
9,797,722 UART: [kat] SHA2-256
9,976,821 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,988,430 UART: [kat] ++
9,988,913 UART: [kat] sha1
10,000,340 UART: [kat] SHA2-256
10,003,361 UART: [kat] SHA2-384
10,009,891 UART: [kat] SHA2-512-ACC
10,012,846 UART: [kat] ECC-384
12,453,489 UART: [kat] HMAC-384Kdf
12,466,194 UART: [kat] LMS
12,995,703 UART: [kat] --
12,998,714 UART: [cold-reset] ++
13,000,263 UART: [fht] FHT @ 0x50003400
13,011,296 UART: [idev] ++
13,011,869 UART: [idev] CDI.KEYID = 6
13,012,887 UART: [idev] SUBJECT.KEYID = 7
13,014,010 UART: [idev] UDS.KEYID = 0
13,016,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,160,119 UART: [idev] Erasing UDS.KEYID = 0
15,490,828 UART: [idev] Sha1 KeyId Algorithm
15,513,102 UART: [idev] --
15,516,798 UART: [ldev] ++
15,517,372 UART: [ldev] CDI.KEYID = 6
15,518,438 UART: [ldev] SUBJECT.KEYID = 5
15,519,542 UART: [ldev] AUTHORITY.KEYID = 7
15,520,715 UART: [ldev] FE.KEYID = 1
15,531,549 UART: [ldev] Erasing FE.KEYID = 1
18,003,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,723,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,739,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,755,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,792,911 UART: [ldev] --
19,798,285 UART: [fwproc] Wait for Commands...
19,800,329 UART: [fwproc] Recv command 0x46574c44
19,802,434 UART: [fwproc] Recv'd Img size: 114084 bytes
23,201,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,274,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,343,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,660,554 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,701,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,468,514 >>> mbox cmd response: failed
10,469,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,403 >>> mbox cmd response: failed
10,469,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,469,964 >>> mbox cmd response: failed
Initializing fuses
2,053,627 writing to cptra_bootfsm_go
13,100,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,677,374 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,214 UART:
192,569 UART: Running Caliptra ROM ...
193,674 UART:
193,817 UART: [state] CFI Enabled
262,163 UART: [state] LifecycleState = Unprovisioned
264,571 UART: [state] DebugLocked = No
266,563 UART: [state] WD Timer not started. Device not locked for debugging
270,674 UART: [kat] SHA2-256
460,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,369 UART: [kat] ++
471,899 UART: [kat] sha1
482,892 UART: [kat] SHA2-256
485,894 UART: [kat] SHA2-384
492,137 UART: [kat] SHA2-512-ACC
494,696 UART: [kat] ECC-384
2,944,677 UART: [kat] HMAC-384Kdf
2,969,998 UART: [kat] LMS
3,501,771 UART: [kat] --
3,506,271 UART: [cold-reset] ++
3,507,932 UART: [fht] FHT @ 0x50003400
3,519,406 UART: [idev] ++
3,520,090 UART: [idev] CDI.KEYID = 6
3,521,091 UART: [idev] SUBJECT.KEYID = 7
3,522,255 UART: [idev] UDS.KEYID = 0
3,524,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,650 UART: [idev] Erasing UDS.KEYID = 0
6,027,527 UART: [idev] Sha1 KeyId Algorithm
6,048,825 UART: [idev] --
6,053,355 UART: [ldev] ++
6,054,075 UART: [ldev] CDI.KEYID = 6
6,055,011 UART: [ldev] SUBJECT.KEYID = 5
6,056,060 UART: [ldev] AUTHORITY.KEYID = 7
6,057,351 UART: [ldev] FE.KEYID = 1
6,098,743 UART: [ldev] Erasing FE.KEYID = 1
8,607,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,481 UART: [ldev] --
10,411,642 UART: [fwproc] Wait for Commands...
10,414,232 UART: [fwproc] Recv command 0x46574c44
10,416,556 UART: [fwproc] Recv'd Img size: 114084 bytes
10,502,093 UART: ROM Fatal Error: 0x000B0002
10,505,784 >>> mbox cmd response: failed
10,506,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,529 >>> mbox cmd response: failed
10,506,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,033 >>> mbox cmd response: failed
Initializing fuses
2,057,211 writing to cptra_bootfsm_go
2,246,615 UART:
2,247,049 UART: Running Caliptra ROM ...
2,248,137 UART:
2,248,308 UART: [state] CFI Enabled
2,318,120 UART: [state] LifecycleState = Unprovisioned
2,320,546 UART: [state] DebugLocked = No
2,322,850 UART: [state] WD Timer not started. Device not locked for debugging
2,327,851 UART: [kat] SHA2-256
2,517,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,498 UART: [kat] ++
2,528,957 UART: [kat] sha1
2,541,790 UART: [kat] SHA2-256
2,544,806 UART: [kat] SHA2-384
2,551,713 UART: [kat] SHA2-512-ACC
2,554,294 UART: [kat] ECC-384
5,004,316 UART: [kat] HMAC-384Kdf
5,027,394 UART: [kat] LMS
5,559,167 UART: [kat] --
5,563,212 UART: [cold-reset] ++
5,564,929 UART: [fht] FHT @ 0x50003400
5,577,365 UART: [idev] ++
5,578,038 UART: [idev] CDI.KEYID = 6
5,579,012 UART: [idev] SUBJECT.KEYID = 7
5,580,230 UART: [idev] UDS.KEYID = 0
5,582,841 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,880 UART: [idev] Erasing UDS.KEYID = 0
8,085,088 UART: [idev] Sha1 KeyId Algorithm
8,107,784 UART: [idev] --
8,112,679 UART: [ldev] ++
8,113,374 UART: [ldev] CDI.KEYID = 6
8,114,286 UART: [ldev] SUBJECT.KEYID = 5
8,115,448 UART: [ldev] AUTHORITY.KEYID = 7
8,116,702 UART: [ldev] FE.KEYID = 1
8,157,167 UART: [ldev] Erasing FE.KEYID = 1
10,660,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,810 UART: [ldev] --
12,469,535 UART: [fwproc] Wait for Commands...
12,472,282 UART: [fwproc] Recv command 0x46574c44
12,474,546 UART: [fwproc] Recv'd Img size: 114084 bytes
15,913,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,645,925 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,441,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,310,419 >>> mbox cmd response: failed
10,310,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,311,328 >>> mbox cmd response: failed
10,311,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,311,891 >>> mbox cmd response: failed
Initializing fuses
2,046,495 writing to cptra_bootfsm_go
5,448,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,735,137 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,450 UART:
192,809 UART: Running Caliptra ROM ...
193,944 UART:
603,583 UART: [state] CFI Enabled
619,284 UART: [state] LifecycleState = Unprovisioned
621,627 UART: [state] DebugLocked = No
624,519 UART: [state] WD Timer not started. Device not locked for debugging
628,798 UART: [kat] SHA2-256
818,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,473 UART: [kat] ++
829,999 UART: [kat] sha1
841,637 UART: [kat] SHA2-256
844,647 UART: [kat] SHA2-384
850,756 UART: [kat] SHA2-512-ACC
853,318 UART: [kat] ECC-384
3,294,859 UART: [kat] HMAC-384Kdf
3,307,128 UART: [kat] LMS
3,838,965 UART: [kat] --
3,843,193 UART: [cold-reset] ++
3,844,153 UART: [fht] FHT @ 0x50003400
3,856,240 UART: [idev] ++
3,856,920 UART: [idev] CDI.KEYID = 6
3,857,856 UART: [idev] SUBJECT.KEYID = 7
3,859,066 UART: [idev] UDS.KEYID = 0
3,861,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,366 UART: [idev] Erasing UDS.KEYID = 0
6,335,990 UART: [idev] Sha1 KeyId Algorithm
6,357,442 UART: [idev] --
6,361,437 UART: [ldev] ++
6,362,140 UART: [ldev] CDI.KEYID = 6
6,363,029 UART: [ldev] SUBJECT.KEYID = 5
6,364,251 UART: [ldev] AUTHORITY.KEYID = 7
6,365,381 UART: [ldev] FE.KEYID = 1
6,377,586 UART: [ldev] Erasing FE.KEYID = 1
8,854,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,302 UART: [ldev] --
10,645,331 UART: [fwproc] Wait for Commands...
10,647,484 UART: [fwproc] Recv command 0x46574c44
10,649,805 UART: [fwproc] Recv'd Img size: 114084 bytes
10,734,920 UART: ROM Fatal Error: 0x000B0002
10,738,609 >>> mbox cmd response: failed
10,739,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,739,363 >>> mbox cmd response: failed
10,739,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,739,919 >>> mbox cmd response: failed
Initializing fuses
2,052,896 writing to cptra_bootfsm_go
2,242,263 UART:
2,242,618 UART: Running Caliptra ROM ...
2,243,756 UART:
9,716,559 UART: [state] CFI Enabled
9,731,050 UART: [state] LifecycleState = Unprovisioned
9,733,422 UART: [state] DebugLocked = No
9,736,117 UART: [state] WD Timer not started. Device not locked for debugging
9,740,214 UART: [kat] SHA2-256
9,930,100 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,940,879 UART: [kat] ++
9,941,400 UART: [kat] sha1
9,953,154 UART: [kat] SHA2-256
9,956,178 UART: [kat] SHA2-384
9,962,383 UART: [kat] SHA2-512-ACC
9,964,940 UART: [kat] ECC-384
12,408,486 UART: [kat] HMAC-384Kdf
12,421,850 UART: [kat] LMS
12,953,685 UART: [kat] --
12,957,025 UART: [cold-reset] ++
12,958,255 UART: [fht] FHT @ 0x50003400
12,968,586 UART: [idev] ++
12,969,264 UART: [idev] CDI.KEYID = 6
12,970,281 UART: [idev] SUBJECT.KEYID = 7
12,971,467 UART: [idev] UDS.KEYID = 0
12,974,382 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,117,768 UART: [idev] Erasing UDS.KEYID = 0
15,448,094 UART: [idev] Sha1 KeyId Algorithm
15,470,514 UART: [idev] --
15,476,668 UART: [ldev] ++
15,477,347 UART: [ldev] CDI.KEYID = 6
15,478,869 UART: [ldev] SUBJECT.KEYID = 5
15,479,991 UART: [ldev] AUTHORITY.KEYID = 7
15,481,170 UART: [ldev] FE.KEYID = 1
15,492,948 UART: [ldev] Erasing FE.KEYID = 1
17,972,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,691,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,721,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,758,002 UART: [ldev] --
19,762,627 UART: [fwproc] Wait for Commands...
19,765,107 UART: [fwproc] Recv command 0x46574c44
19,767,420 UART: [fwproc] Recv'd Img size: 114084 bytes
23,217,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,296,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,412,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,954,837 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,755,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,516,799 >>> mbox cmd response: failed
10,517,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,697 >>> mbox cmd response: failed
10,517,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,518,287 >>> mbox cmd response: failed
Initializing fuses
2,046,586 writing to cptra_bootfsm_go
13,108,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,304,399 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,648 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,835 UART: [fht] Storing FHT @ 0x50003400
1,479,710 UART: [idev] ++
1,479,878 UART: [idev] CDI.KEYID = 6
1,480,238 UART: [idev] SUBJECT.KEYID = 7
1,480,662 UART: [idev] UDS.KEYID = 0
1,481,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,836 UART: [idev] Erasing UDS.KEYID = 0
1,505,514 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,110 UART: [idev] --
1,515,261 UART: [ldev] ++
1,515,429 UART: [ldev] CDI.KEYID = 6
1,515,792 UART: [ldev] SUBJECT.KEYID = 5
1,516,218 UART: [ldev] AUTHORITY.KEYID = 7
1,516,681 UART: [ldev] FE.KEYID = 1
1,521,943 UART: [ldev] Erasing FE.KEYID = 1
1,547,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,068 UART: [ldev] --
1,586,525 UART: [fwproc] Waiting for Commands...
1,587,308 UART: [fwproc] Received command 0x46574c44
1,588,099 UART: [fwproc] Received Image of size 114084 bytes
1,607,148 UART: ROM Fatal Error: 0x000B0002
1,608,305 >>> mbox cmd response: failed
1,608,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,311 >>> mbox cmd response: failed
1,608,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,291 UART: [cold-reset] ++
1,476,835 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,156 UART: [idev] Erasing UDS.KEYID = 0
1,505,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,106 UART: [idev] --
1,515,089 UART: [ldev] ++
1,515,257 UART: [ldev] CDI.KEYID = 6
1,515,620 UART: [ldev] SUBJECT.KEYID = 5
1,516,046 UART: [ldev] AUTHORITY.KEYID = 7
1,516,509 UART: [ldev] FE.KEYID = 1
1,521,641 UART: [ldev] Erasing FE.KEYID = 1
1,546,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,459 UART: [fwproc] Waiting for Commands...
1,587,124 UART: [fwproc] Received command 0x46574c44
1,587,915 UART: [fwproc] Received Image of size 114084 bytes
2,882,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,029 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,461,022 >>> mbox cmd response: failed
1,461,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,028 >>> mbox cmd response: failed
1,461,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,241 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,354 UART: [kat] SHA2-256
882,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,400 UART: [kat] ++
886,552 UART: [kat] sha1
891,040 UART: [kat] SHA2-256
892,978 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,719 UART: [kat] HMAC-384Kdf
908,341 UART: [kat] LMS
1,476,537 UART: [kat] --
1,477,446 UART: [cold-reset] ++
1,477,938 UART: [fht] Storing FHT @ 0x50003400
1,480,759 UART: [idev] ++
1,480,927 UART: [idev] CDI.KEYID = 6
1,481,287 UART: [idev] SUBJECT.KEYID = 7
1,481,711 UART: [idev] UDS.KEYID = 0
1,482,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,761 UART: [idev] Erasing UDS.KEYID = 0
1,506,733 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,373 UART: [idev] --
1,516,304 UART: [ldev] ++
1,516,472 UART: [ldev] CDI.KEYID = 6
1,516,835 UART: [ldev] SUBJECT.KEYID = 5
1,517,261 UART: [ldev] AUTHORITY.KEYID = 7
1,517,724 UART: [ldev] FE.KEYID = 1
1,523,066 UART: [ldev] Erasing FE.KEYID = 1
1,548,767 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,701 UART: [ldev] --
1,588,094 UART: [fwproc] Waiting for Commands...
1,588,817 UART: [fwproc] Received command 0x46574c44
1,589,608 UART: [fwproc] Received Image of size 114084 bytes
1,609,069 UART: ROM Fatal Error: 0x000B0002
1,610,226 >>> mbox cmd response: failed
1,610,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,232 >>> mbox cmd response: failed
1,610,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,369 UART: [kat] LMS
1,475,565 UART: [kat] --
1,476,800 UART: [cold-reset] ++
1,477,190 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,813 UART: [idev] Erasing UDS.KEYID = 0
1,505,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,196 UART: [ldev] ++
1,515,364 UART: [ldev] CDI.KEYID = 6
1,515,727 UART: [ldev] SUBJECT.KEYID = 5
1,516,153 UART: [ldev] AUTHORITY.KEYID = 7
1,516,616 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,547,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,355 UART: [ldev] --
1,586,620 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 114084 bytes
2,882,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,626 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,460,641 >>> mbox cmd response: failed
1,460,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,647 >>> mbox cmd response: failed
1,460,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,382 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,106 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,831 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,167 UART: [kat] SHA2-256
904,107 UART: [kat] SHA2-384
906,968 UART: [kat] SHA2-512-ACC
908,869 UART: [kat] ECC-384
918,606 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,803 UART: [fht] FHT @ 0x50003400
1,175,594 UART: [idev] ++
1,175,762 UART: [idev] CDI.KEYID = 6
1,176,122 UART: [idev] SUBJECT.KEYID = 7
1,176,546 UART: [idev] UDS.KEYID = 0
1,176,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,421 UART: [idev] Sha1 KeyId Algorithm
1,209,885 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,975 UART: [ldev] --
1,283,426 UART: [fwproc] Wait for Commands...
1,284,084 UART: [fwproc] Recv command 0x46574c44
1,284,812 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,385 UART: ROM Fatal Error: 0x000B0002
1,305,542 >>> mbox cmd response: failed
1,305,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,548 >>> mbox cmd response: failed
1,305,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
893,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,173 UART: [kat] ++
897,325 UART: [kat] sha1
901,415 UART: [kat] SHA2-256
903,355 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,754 UART: [kat] HMAC-384Kdf
922,164 UART: [kat] LMS
1,170,492 UART: [kat] --
1,171,455 UART: [cold-reset] ++
1,171,963 UART: [fht] FHT @ 0x50003400
1,174,592 UART: [idev] ++
1,174,760 UART: [idev] CDI.KEYID = 6
1,175,120 UART: [idev] SUBJECT.KEYID = 7
1,175,544 UART: [idev] UDS.KEYID = 0
1,175,889 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,634 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,208,809 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,288 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,510 UART: [fwproc] Recv command 0x46574c44
1,283,238 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,872 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,157,665 >>> mbox cmd response: failed
1,157,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,671 >>> mbox cmd response: failed
1,157,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,793 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,373 UART: [state] LifecycleState = Unprovisioned
87,028 UART: [state] DebugLocked = No
87,512 UART: [state] WD Timer not started. Device not locked for debugging
88,657 UART: [kat] SHA2-256
894,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,432 UART: [kat] ++
898,584 UART: [kat] sha1
902,846 UART: [kat] SHA2-256
904,786 UART: [kat] SHA2-384
907,541 UART: [kat] SHA2-512-ACC
909,442 UART: [kat] ECC-384
919,269 UART: [kat] HMAC-384Kdf
923,767 UART: [kat] LMS
1,172,095 UART: [kat] --
1,172,894 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,175,909 UART: [idev] ++
1,176,077 UART: [idev] CDI.KEYID = 6
1,176,437 UART: [idev] SUBJECT.KEYID = 7
1,176,861 UART: [idev] UDS.KEYID = 0
1,177,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,261 UART: [idev] Erasing UDS.KEYID = 0
1,202,502 UART: [idev] Sha1 KeyId Algorithm
1,210,974 UART: [idev] --
1,212,088 UART: [ldev] ++
1,212,256 UART: [ldev] CDI.KEYID = 6
1,212,619 UART: [ldev] SUBJECT.KEYID = 5
1,213,045 UART: [ldev] AUTHORITY.KEYID = 7
1,213,508 UART: [ldev] FE.KEYID = 1
1,218,856 UART: [ldev] Erasing FE.KEYID = 1
1,245,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,484 UART: [ldev] --
1,284,923 UART: [fwproc] Wait for Commands...
1,285,565 UART: [fwproc] Recv command 0x46574c44
1,286,293 UART: [fwproc] Recv'd Img size: 114084 bytes
1,305,488 UART: ROM Fatal Error: 0x000B0002
1,306,645 >>> mbox cmd response: failed
1,306,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,651 >>> mbox cmd response: failed
1,306,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,445 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,533 UART: [idev] ++
1,175,701 UART: [idev] CDI.KEYID = 6
1,176,061 UART: [idev] SUBJECT.KEYID = 7
1,176,485 UART: [idev] UDS.KEYID = 0
1,176,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,491 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,368 UART: [idev] --
1,211,414 UART: [ldev] ++
1,211,582 UART: [ldev] CDI.KEYID = 6
1,211,945 UART: [ldev] SUBJECT.KEYID = 5
1,212,371 UART: [ldev] AUTHORITY.KEYID = 7
1,212,834 UART: [ldev] FE.KEYID = 1
1,218,244 UART: [ldev] Erasing FE.KEYID = 1
1,244,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,140 UART: [ldev] --
1,283,485 UART: [fwproc] Wait for Commands...
1,284,267 UART: [fwproc] Recv command 0x46574c44
1,284,995 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,467 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,226 >>> mbox cmd response: failed
1,159,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,232 >>> mbox cmd response: failed
1,159,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,526 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,991 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
1,174,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,401 UART: [idev] Sha1 KeyId Algorithm
1,207,419 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,736 UART: [fwproc] Wait for Commands...
1,281,525 UART: [fwproc] Recv command 0x46574c44
1,282,258 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,808 UART: ROM Fatal Error: 0x000B0002
1,302,965 >>> mbox cmd response: failed
1,302,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,971 >>> mbox cmd response: failed
1,302,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,654 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,305 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,203 UART: [idev] Erasing UDS.KEYID = 0
1,199,621 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,470 UART: [ldev] ++
1,209,638 UART: [ldev] CDI.KEYID = 6
1,210,002 UART: [ldev] SUBJECT.KEYID = 5
1,210,429 UART: [ldev] AUTHORITY.KEYID = 7
1,210,892 UART: [ldev] FE.KEYID = 1
1,216,278 UART: [ldev] Erasing FE.KEYID = 1
1,242,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,918 UART: [ldev] --
1,281,360 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,562 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,154,932 >>> mbox cmd response: failed
1,154,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,938 >>> mbox cmd response: failed
1,154,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,154,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,922 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,855 UART: [kat] SHA2-512-ACC
906,756 UART: [kat] ECC-384
916,715 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,770 UART: [fht] FHT @ 0x50003400
1,173,522 UART: [idev] ++
1,173,690 UART: [idev] CDI.KEYID = 6
1,174,051 UART: [idev] SUBJECT.KEYID = 7
1,174,476 UART: [idev] UDS.KEYID = 0
1,174,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,208,254 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,393 UART: [fwproc] Wait for Commands...
1,281,970 UART: [fwproc] Recv command 0x46574c44
1,282,703 UART: [fwproc] Recv'd Img size: 114084 bytes
1,302,233 UART: ROM Fatal Error: 0x000B0002
1,303,390 >>> mbox cmd response: failed
1,303,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,396 >>> mbox cmd response: failed
1,303,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,413 UART: [kat] SHA2-512-ACC
906,314 UART: [kat] ECC-384
915,705 UART: [kat] HMAC-384Kdf
920,335 UART: [kat] LMS
1,168,647 UART: [kat] --
1,169,486 UART: [cold-reset] ++
1,169,906 UART: [fht] FHT @ 0x50003400
1,172,480 UART: [idev] ++
1,172,648 UART: [idev] CDI.KEYID = 6
1,173,009 UART: [idev] SUBJECT.KEYID = 7
1,173,434 UART: [idev] UDS.KEYID = 0
1,173,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,524 UART: [idev] Erasing UDS.KEYID = 0
1,198,546 UART: [idev] Sha1 KeyId Algorithm
1,207,534 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,285 UART: [ldev] --
1,280,599 UART: [fwproc] Wait for Commands...
1,281,248 UART: [fwproc] Recv command 0x46574c44
1,281,981 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,583 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,481 >>> mbox cmd response: failed
1,155,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,487 >>> mbox cmd response: failed
1,155,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,293 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,223 UART:
192,576 UART: Running Caliptra ROM ...
193,912 UART:
194,070 UART: [state] CFI Enabled
263,701 UART: [state] LifecycleState = Unprovisioned
265,626 UART: [state] DebugLocked = No
267,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,979 UART: [kat] SHA2-256
442,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,235 UART: [kat] ++
453,769 UART: [kat] sha1
466,057 UART: [kat] SHA2-256
468,743 UART: [kat] SHA2-384
474,121 UART: [kat] SHA2-512-ACC
476,510 UART: [kat] ECC-384
2,769,383 UART: [kat] HMAC-384Kdf
2,800,596 UART: [kat] LMS
3,990,912 UART: [kat] --
3,993,577 UART: [cold-reset] ++
3,995,998 UART: [fht] Storing FHT @ 0x50003400
4,006,886 UART: [idev] ++
4,007,519 UART: [idev] CDI.KEYID = 6
4,008,425 UART: [idev] SUBJECT.KEYID = 7
4,009,647 UART: [idev] UDS.KEYID = 0
4,012,595 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,882 UART: [idev] Erasing UDS.KEYID = 0
7,349,278 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,752 UART: [idev] --
7,375,376 UART: [ldev] ++
7,375,949 UART: [ldev] CDI.KEYID = 6
7,376,890 UART: [ldev] SUBJECT.KEYID = 5
7,378,161 UART: [ldev] AUTHORITY.KEYID = 7
7,379,314 UART: [ldev] FE.KEYID = 1
7,423,699 UART: [ldev] Erasing FE.KEYID = 1
10,757,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,410 UART: [ldev] --
13,137,379 UART: [fwproc] Waiting for Commands...
13,140,292 UART: [fwproc] Received command 0x46574c44
13,142,476 UART: [fwproc] Received Image of size 113760 bytes
14,543,180 UART: ROM Fatal Error: 0x000B0019
14,546,685 >>> mbox cmd response: failed
14,547,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,547,420 >>> mbox cmd response: failed
14,547,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,548,061 >>> mbox cmd response: failed
Initializing fuses
2,053,066 writing to cptra_bootfsm_go
2,242,488 UART:
2,242,839 UART: Running Caliptra ROM ...
2,243,974 UART:
2,244,144 UART: [state] CFI Enabled
2,313,188 UART: [state] LifecycleState = Unprovisioned
2,315,126 UART: [state] DebugLocked = No
2,316,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,128 UART: [kat] SHA2-256
2,491,816 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,350 UART: [kat] ++
2,502,895 UART: [kat] sha1
2,514,813 UART: [kat] SHA2-256
2,517,505 UART: [kat] SHA2-384
2,523,170 UART: [kat] SHA2-512-ACC
2,525,522 UART: [kat] ECC-384
4,817,958 UART: [kat] HMAC-384Kdf
4,849,918 UART: [kat] LMS
6,040,221 UART: [kat] --
6,046,885 UART: [cold-reset] ++
6,049,336 UART: [fht] Storing FHT @ 0x50003400
6,060,237 UART: [idev] ++
6,060,808 UART: [idev] CDI.KEYID = 6
6,061,722 UART: [idev] SUBJECT.KEYID = 7
6,063,012 UART: [idev] UDS.KEYID = 0
6,065,603 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,208,797 UART: [idev] Erasing UDS.KEYID = 0
9,393,343 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,070 UART: [idev] --
9,417,969 UART: [ldev] ++
9,418,556 UART: [ldev] CDI.KEYID = 6
9,419,449 UART: [ldev] SUBJECT.KEYID = 5
9,420,648 UART: [ldev] AUTHORITY.KEYID = 7
9,421,970 UART: [ldev] FE.KEYID = 1
9,450,418 UART: [ldev] Erasing FE.KEYID = 1
12,784,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,159,094 UART: [ldev] --
15,164,635 UART: [fwproc] Waiting for Commands...
15,166,397 UART: [fwproc] Received command 0x46574c44
15,168,604 UART: [fwproc] Received Image of size 113760 bytes
19,220,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,298,000 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,366,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,683,000 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,803,538 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,277,775 >>> mbox cmd response: failed
14,278,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,278,912 >>> mbox cmd response: failed
14,279,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,470 >>> mbox cmd response: failed
Initializing fuses
2,059,895 writing to cptra_bootfsm_go
5,842,041 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,922,543 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
192,466 UART:
192,825 UART: Running Caliptra ROM ...
193,958 UART:
603,699 UART: [state] CFI Enabled
617,829 UART: [state] LifecycleState = Unprovisioned
619,765 UART: [state] DebugLocked = No
622,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,182 UART: [kat] SHA2-256
797,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,461 UART: [kat] ++
808,908 UART: [kat] sha1
819,188 UART: [kat] SHA2-256
821,873 UART: [kat] SHA2-384
827,684 UART: [kat] SHA2-512-ACC
830,015 UART: [kat] ECC-384
3,114,893 UART: [kat] HMAC-384Kdf
3,126,530 UART: [kat] LMS
4,316,655 UART: [kat] --
4,321,959 UART: [cold-reset] ++
4,323,412 UART: [fht] Storing FHT @ 0x50003400
4,334,636 UART: [idev] ++
4,335,204 UART: [idev] CDI.KEYID = 6
4,336,225 UART: [idev] SUBJECT.KEYID = 7
4,337,410 UART: [idev] UDS.KEYID = 0
4,340,388 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,551 UART: [idev] Erasing UDS.KEYID = 0
7,623,283 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,266 UART: [idev] --
7,649,378 UART: [ldev] ++
7,650,012 UART: [ldev] CDI.KEYID = 6
7,650,938 UART: [ldev] SUBJECT.KEYID = 5
7,652,153 UART: [ldev] AUTHORITY.KEYID = 7
7,653,387 UART: [ldev] FE.KEYID = 1
7,664,466 UART: [ldev] Erasing FE.KEYID = 1
10,955,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,179 UART: [ldev] --
13,317,606 UART: [fwproc] Waiting for Commands...
13,321,018 UART: [fwproc] Received command 0x46574c44
13,323,257 UART: [fwproc] Received Image of size 113760 bytes
14,724,184 UART: ROM Fatal Error: 0x000B0019
14,727,674 >>> mbox cmd response: failed
14,728,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,728,419 >>> mbox cmd response: failed
14,728,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,728,980 >>> mbox cmd response: failed
Initializing fuses
2,059,358 writing to cptra_bootfsm_go
2,248,658 UART:
2,249,031 UART: Running Caliptra ROM ...
2,250,174 UART:
5,740,001 UART: [state] CFI Enabled
5,752,827 UART: [state] LifecycleState = Unprovisioned
5,754,736 UART: [state] DebugLocked = No
5,757,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,762,272 UART: [kat] SHA2-256
5,932,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,942,599 UART: [kat] ++
5,943,143 UART: [kat] sha1
5,952,417 UART: [kat] SHA2-256
5,955,158 UART: [kat] SHA2-384
5,960,292 UART: [kat] SHA2-512-ACC
5,962,646 UART: [kat] ECC-384
8,246,479 UART: [kat] HMAC-384Kdf
8,258,707 UART: [kat] LMS
9,448,791 UART: [kat] --
9,453,128 UART: [cold-reset] ++
9,455,715 UART: [fht] Storing FHT @ 0x50003400
9,467,571 UART: [idev] ++
9,468,134 UART: [idev] CDI.KEYID = 6
9,469,153 UART: [idev] SUBJECT.KEYID = 7
9,470,321 UART: [idev] UDS.KEYID = 0
9,473,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
9,616,195 UART: [idev] Erasing UDS.KEYID = 0
12,756,158 UART: [idev] Using Sha1 for KeyId Algorithm
12,778,033 UART: [idev] --
12,783,330 UART: [ldev] ++
12,783,897 UART: [ldev] CDI.KEYID = 6
12,784,835 UART: [ldev] SUBJECT.KEYID = 5
12,786,095 UART: [ldev] AUTHORITY.KEYID = 7
12,787,338 UART: [ldev] FE.KEYID = 1
12,800,250 UART: [ldev] Erasing FE.KEYID = 1
16,086,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,382,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,396,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,411,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,426,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,446,911 UART: [ldev] --
18,451,970 UART: [fwproc] Waiting for Commands...
18,453,688 UART: [fwproc] Received command 0x46574c44
18,455,876 UART: [fwproc] Received Image of size 113760 bytes
22,507,876 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,582,808 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,651,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,968,541 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,130,347 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,466,859 >>> mbox cmd response: failed
14,467,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,467,783 >>> mbox cmd response: failed
14,468,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,468,325 >>> mbox cmd response: failed
Initializing fuses
2,050,628 writing to cptra_bootfsm_go
9,528,191 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,450,420 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,269 UART:
192,623 UART: Running Caliptra ROM ...
193,810 UART:
193,979 UART: [state] CFI Enabled
262,325 UART: [state] LifecycleState = Unprovisioned
264,322 UART: [state] DebugLocked = No
266,062 UART: [state] WD Timer not started. Device not locked for debugging
268,976 UART: [kat] SHA2-256
448,135 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,790 UART: [kat] ++
460,314 UART: [kat] sha1
470,989 UART: [kat] SHA2-256
474,008 UART: [kat] SHA2-384
479,509 UART: [kat] SHA2-512-ACC
482,453 UART: [kat] ECC-384
2,948,167 UART: [kat] HMAC-384Kdf
2,971,790 UART: [kat] LMS
3,501,253 UART: [kat] --
3,505,526 UART: [cold-reset] ++
3,506,432 UART: [fht] FHT @ 0x50003400
3,517,493 UART: [idev] ++
3,518,062 UART: [idev] CDI.KEYID = 6
3,518,973 UART: [idev] SUBJECT.KEYID = 7
3,520,201 UART: [idev] UDS.KEYID = 0
3,522,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,676 UART: [idev] Erasing UDS.KEYID = 0
6,024,790 UART: [idev] Sha1 KeyId Algorithm
6,048,135 UART: [idev] --
6,050,785 UART: [ldev] ++
6,051,357 UART: [ldev] CDI.KEYID = 6
6,052,429 UART: [ldev] SUBJECT.KEYID = 5
6,053,540 UART: [ldev] AUTHORITY.KEYID = 7
6,054,719 UART: [ldev] FE.KEYID = 1
6,099,877 UART: [ldev] Erasing FE.KEYID = 1
8,602,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,209 UART: [ldev] --
10,412,665 UART: [fwproc] Wait for Commands...
10,415,037 UART: [fwproc] Recv command 0x46574c44
10,417,085 UART: [fwproc] Recv'd Img size: 114084 bytes
11,490,908 UART: ROM Fatal Error: 0x000B0019
11,494,034 >>> mbox cmd response: failed
11,494,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,494,794 >>> mbox cmd response: failed
11,495,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,495,472 >>> mbox cmd response: failed
Initializing fuses
2,062,045 writing to cptra_bootfsm_go
2,251,354 UART:
2,251,705 UART: Running Caliptra ROM ...
2,252,786 UART:
2,252,951 UART: [state] CFI Enabled
2,315,291 UART: [state] LifecycleState = Unprovisioned
2,317,133 UART: [state] DebugLocked = No
2,319,869 UART: [state] WD Timer not started. Device not locked for debugging
2,324,153 UART: [kat] SHA2-256
2,503,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,867 UART: [kat] ++
2,515,326 UART: [kat] sha1
2,527,129 UART: [kat] SHA2-256
2,530,143 UART: [kat] SHA2-384
2,536,723 UART: [kat] SHA2-512-ACC
2,539,685 UART: [kat] ECC-384
4,996,460 UART: [kat] HMAC-384Kdf
5,021,280 UART: [kat] LMS
5,550,707 UART: [kat] --
5,557,456 UART: [cold-reset] ++
5,559,982 UART: [fht] FHT @ 0x50003400
5,569,554 UART: [idev] ++
5,570,122 UART: [idev] CDI.KEYID = 6
5,571,033 UART: [idev] SUBJECT.KEYID = 7
5,572,251 UART: [idev] UDS.KEYID = 0
5,574,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,718,991 UART: [idev] Erasing UDS.KEYID = 0
8,080,054 UART: [idev] Sha1 KeyId Algorithm
8,103,607 UART: [idev] --
8,107,578 UART: [ldev] ++
8,108,163 UART: [ldev] CDI.KEYID = 6
8,109,095 UART: [ldev] SUBJECT.KEYID = 5
8,110,261 UART: [ldev] AUTHORITY.KEYID = 7
8,111,494 UART: [ldev] FE.KEYID = 1
8,151,957 UART: [ldev] Erasing FE.KEYID = 1
10,655,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,336 UART: [ldev] --
12,466,846 UART: [fwproc] Wait for Commands...
12,469,859 UART: [fwproc] Recv command 0x46574c44
12,471,965 UART: [fwproc] Recv'd Img size: 114084 bytes
15,871,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,328,190 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,386,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,279,768 >>> mbox cmd response: failed
11,280,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,280,699 >>> mbox cmd response: failed
11,280,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,281,294 >>> mbox cmd response: failed
Initializing fuses
2,049,848 writing to cptra_bootfsm_go
5,396,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,055,911 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,611 UART:
193,003 UART: Running Caliptra ROM ...
194,196 UART:
603,736 UART: [state] CFI Enabled
616,335 UART: [state] LifecycleState = Unprovisioned
618,219 UART: [state] DebugLocked = No
620,836 UART: [state] WD Timer not started. Device not locked for debugging
624,300 UART: [kat] SHA2-256
803,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,005 UART: [kat] ++
815,458 UART: [kat] sha1
827,303 UART: [kat] SHA2-256
830,308 UART: [kat] SHA2-384
836,295 UART: [kat] SHA2-512-ACC
839,227 UART: [kat] ECC-384
3,280,343 UART: [kat] HMAC-384Kdf
3,292,104 UART: [kat] LMS
3,821,621 UART: [kat] --
3,824,261 UART: [cold-reset] ++
3,826,678 UART: [fht] FHT @ 0x50003400
3,836,905 UART: [idev] ++
3,837,480 UART: [idev] CDI.KEYID = 6
3,838,393 UART: [idev] SUBJECT.KEYID = 7
3,839,609 UART: [idev] UDS.KEYID = 0
3,842,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,074 UART: [idev] Erasing UDS.KEYID = 0
6,316,926 UART: [idev] Sha1 KeyId Algorithm
6,339,070 UART: [idev] --
6,342,008 UART: [ldev] ++
6,342,586 UART: [ldev] CDI.KEYID = 6
6,343,667 UART: [ldev] SUBJECT.KEYID = 5
6,344,786 UART: [ldev] AUTHORITY.KEYID = 7
6,345,966 UART: [ldev] FE.KEYID = 1
6,353,971 UART: [ldev] Erasing FE.KEYID = 1
8,827,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,201 UART: [ldev] --
10,619,711 UART: [fwproc] Wait for Commands...
10,622,077 UART: [fwproc] Recv command 0x46574c44
10,624,175 UART: [fwproc] Recv'd Img size: 114084 bytes
11,697,560 UART: ROM Fatal Error: 0x000B0019
11,700,640 >>> mbox cmd response: failed
11,700,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,701,314 >>> mbox cmd response: failed
11,701,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,701,986 >>> mbox cmd response: failed
Initializing fuses
2,065,893 writing to cptra_bootfsm_go
2,255,210 UART:
2,255,556 UART: Running Caliptra ROM ...
2,256,703 UART:
8,755,813 UART: [state] CFI Enabled
8,769,426 UART: [state] LifecycleState = Unprovisioned
8,771,287 UART: [state] DebugLocked = No
8,773,882 UART: [state] WD Timer not started. Device not locked for debugging
8,777,894 UART: [kat] SHA2-256
8,957,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,968,580 UART: [kat] ++
8,969,123 UART: [kat] sha1
8,978,669 UART: [kat] SHA2-256
8,981,728 UART: [kat] SHA2-384
8,987,438 UART: [kat] SHA2-512-ACC
8,990,436 UART: [kat] ECC-384
11,430,341 UART: [kat] HMAC-384Kdf
11,443,038 UART: [kat] LMS
11,972,557 UART: [kat] --
11,977,836 UART: [cold-reset] ++
11,980,409 UART: [fht] FHT @ 0x50003400
11,991,169 UART: [idev] ++
11,991,734 UART: [idev] CDI.KEYID = 6
11,992,763 UART: [idev] SUBJECT.KEYID = 7
11,993,864 UART: [idev] UDS.KEYID = 0
11,996,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,140,352 UART: [idev] Erasing UDS.KEYID = 0
14,466,794 UART: [idev] Sha1 KeyId Algorithm
14,490,013 UART: [idev] --
14,494,635 UART: [ldev] ++
14,495,210 UART: [ldev] CDI.KEYID = 6
14,496,117 UART: [ldev] SUBJECT.KEYID = 5
14,497,331 UART: [ldev] AUTHORITY.KEYID = 7
14,498,557 UART: [ldev] FE.KEYID = 1
14,508,768 UART: [ldev] Erasing FE.KEYID = 1
16,987,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,704,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,721,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,736,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,752,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,772,787 UART: [ldev] --
18,777,885 UART: [fwproc] Wait for Commands...
18,779,710 UART: [fwproc] Recv command 0x46574c44
18,781,806 UART: [fwproc] Recv'd Img size: 114084 bytes
22,182,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,256,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,325,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,641,929 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,443 writing to cptra_bootfsm_go
3,697,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,475,656 >>> mbox cmd response: failed
11,476,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,476,557 >>> mbox cmd response: failed
11,476,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,477,114 >>> mbox cmd response: failed
Initializing fuses
2,050,906 writing to cptra_bootfsm_go
12,094,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,661,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,163 UART:
192,530 UART: Running Caliptra ROM ...
193,729 UART:
193,881 UART: [state] CFI Enabled
262,788 UART: [state] LifecycleState = Unprovisioned
265,212 UART: [state] DebugLocked = No
267,788 UART: [state] WD Timer not started. Device not locked for debugging
272,499 UART: [kat] SHA2-256
462,392 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,150 UART: [kat] ++
473,637 UART: [kat] sha1
484,035 UART: [kat] SHA2-256
487,053 UART: [kat] SHA2-384
493,367 UART: [kat] SHA2-512-ACC
495,983 UART: [kat] ECC-384
2,946,235 UART: [kat] HMAC-384Kdf
2,968,325 UART: [kat] LMS
3,500,131 UART: [kat] --
3,506,337 UART: [cold-reset] ++
3,507,297 UART: [fht] FHT @ 0x50003400
3,519,850 UART: [idev] ++
3,520,538 UART: [idev] CDI.KEYID = 6
3,521,480 UART: [idev] SUBJECT.KEYID = 7
3,522,696 UART: [idev] UDS.KEYID = 0
3,525,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,421 UART: [idev] Erasing UDS.KEYID = 0
6,025,989 UART: [idev] Sha1 KeyId Algorithm
6,048,824 UART: [idev] --
6,054,558 UART: [ldev] ++
6,055,243 UART: [ldev] CDI.KEYID = 6
6,056,162 UART: [ldev] SUBJECT.KEYID = 5
6,057,335 UART: [ldev] AUTHORITY.KEYID = 7
6,058,531 UART: [ldev] FE.KEYID = 1
6,097,057 UART: [ldev] Erasing FE.KEYID = 1
8,604,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,946 UART: [ldev] --
10,412,275 UART: [fwproc] Wait for Commands...
10,414,755 UART: [fwproc] Recv command 0x46574c44
10,417,075 UART: [fwproc] Recv'd Img size: 114084 bytes
11,515,022 UART: ROM Fatal Error: 0x000B0019
11,518,686 >>> mbox cmd response: failed
11,519,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,519,453 >>> mbox cmd response: failed
11,519,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,520,039 >>> mbox cmd response: failed
Initializing fuses
2,053,573 writing to cptra_bootfsm_go
2,242,892 UART:
2,243,248 UART: Running Caliptra ROM ...
2,244,297 UART:
2,244,448 UART: [state] CFI Enabled
2,309,944 UART: [state] LifecycleState = Unprovisioned
2,312,327 UART: [state] DebugLocked = No
2,314,233 UART: [state] WD Timer not started. Device not locked for debugging
2,318,049 UART: [kat] SHA2-256
2,507,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,709 UART: [kat] ++
2,519,185 UART: [kat] sha1
2,530,134 UART: [kat] SHA2-256
2,533,158 UART: [kat] SHA2-384
2,539,101 UART: [kat] SHA2-512-ACC
2,541,672 UART: [kat] ECC-384
4,991,907 UART: [kat] HMAC-384Kdf
5,015,593 UART: [kat] LMS
5,547,331 UART: [kat] --
5,550,563 UART: [cold-reset] ++
5,552,615 UART: [fht] FHT @ 0x50003400
5,563,064 UART: [idev] ++
5,563,741 UART: [idev] CDI.KEYID = 6
5,564,723 UART: [idev] SUBJECT.KEYID = 7
5,565,885 UART: [idev] UDS.KEYID = 0
5,568,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,712,090 UART: [idev] Erasing UDS.KEYID = 0
8,072,391 UART: [idev] Sha1 KeyId Algorithm
8,094,956 UART: [idev] --
8,098,961 UART: [ldev] ++
8,099,643 UART: [ldev] CDI.KEYID = 6
8,100,566 UART: [ldev] SUBJECT.KEYID = 5
8,101,726 UART: [ldev] AUTHORITY.KEYID = 7
8,102,955 UART: [ldev] FE.KEYID = 1
8,144,986 UART: [ldev] Erasing FE.KEYID = 1
10,650,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,127 UART: [ldev] --
12,459,820 UART: [fwproc] Wait for Commands...
12,461,753 UART: [fwproc] Recv command 0x46574c44
12,464,034 UART: [fwproc] Recv'd Img size: 114084 bytes
15,904,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,975,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,091,279 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,632,619 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,440,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,321,967 >>> mbox cmd response: failed
11,322,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,323,074 >>> mbox cmd response: failed
11,323,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,323,646 >>> mbox cmd response: failed
Initializing fuses
2,049,826 writing to cptra_bootfsm_go
5,469,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,769,369 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,481 UART:
192,840 UART: Running Caliptra ROM ...
193,971 UART:
603,821 UART: [state] CFI Enabled
614,267 UART: [state] LifecycleState = Unprovisioned
616,615 UART: [state] DebugLocked = No
617,948 UART: [state] WD Timer not started. Device not locked for debugging
621,901 UART: [kat] SHA2-256
811,780 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,508 UART: [kat] ++
823,036 UART: [kat] sha1
834,893 UART: [kat] SHA2-256
837,903 UART: [kat] SHA2-384
843,499 UART: [kat] SHA2-512-ACC
846,058 UART: [kat] ECC-384
3,286,571 UART: [kat] HMAC-384Kdf
3,299,390 UART: [kat] LMS
3,831,216 UART: [kat] --
3,834,251 UART: [cold-reset] ++
3,835,465 UART: [fht] FHT @ 0x50003400
3,847,642 UART: [idev] ++
3,848,321 UART: [idev] CDI.KEYID = 6
3,849,264 UART: [idev] SUBJECT.KEYID = 7
3,850,479 UART: [idev] UDS.KEYID = 0
3,853,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,996,864 UART: [idev] Erasing UDS.KEYID = 0
6,332,744 UART: [idev] Sha1 KeyId Algorithm
6,356,085 UART: [idev] --
6,361,382 UART: [ldev] ++
6,362,062 UART: [ldev] CDI.KEYID = 6
6,362,973 UART: [ldev] SUBJECT.KEYID = 5
6,364,134 UART: [ldev] AUTHORITY.KEYID = 7
6,365,364 UART: [ldev] FE.KEYID = 1
6,375,367 UART: [ldev] Erasing FE.KEYID = 1
8,850,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,388 UART: [ldev] --
10,643,604 UART: [fwproc] Wait for Commands...
10,645,432 UART: [fwproc] Recv command 0x46574c44
10,647,744 UART: [fwproc] Recv'd Img size: 114084 bytes
11,749,470 UART: ROM Fatal Error: 0x000B0019
11,753,138 >>> mbox cmd response: failed
11,753,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,826 >>> mbox cmd response: failed
11,754,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,754,390 >>> mbox cmd response: failed
Initializing fuses
2,054,657 writing to cptra_bootfsm_go
2,244,030 UART:
2,244,410 UART: Running Caliptra ROM ...
2,245,492 UART:
8,701,872 UART: [state] CFI Enabled
8,712,995 UART: [state] LifecycleState = Unprovisioned
8,715,394 UART: [state] DebugLocked = No
8,718,080 UART: [state] WD Timer not started. Device not locked for debugging
8,722,806 UART: [kat] SHA2-256
8,912,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,923,474 UART: [kat] ++
8,924,021 UART: [kat] sha1
8,935,619 UART: [kat] SHA2-256
8,938,637 UART: [kat] SHA2-384
8,943,676 UART: [kat] SHA2-512-ACC
8,946,234 UART: [kat] ECC-384
11,387,994 UART: [kat] HMAC-384Kdf
11,400,165 UART: [kat] LMS
11,931,963 UART: [kat] --
11,936,434 UART: [cold-reset] ++
11,938,689 UART: [fht] FHT @ 0x50003400
11,950,378 UART: [idev] ++
11,951,056 UART: [idev] CDI.KEYID = 6
11,952,024 UART: [idev] SUBJECT.KEYID = 7
11,953,186 UART: [idev] UDS.KEYID = 0
11,955,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,099,383 UART: [idev] Erasing UDS.KEYID = 0
14,427,138 UART: [idev] Sha1 KeyId Algorithm
14,450,254 UART: [idev] --
14,454,455 UART: [ldev] ++
14,455,153 UART: [ldev] CDI.KEYID = 6
14,456,063 UART: [ldev] SUBJECT.KEYID = 5
14,457,232 UART: [ldev] AUTHORITY.KEYID = 7
14,458,402 UART: [ldev] FE.KEYID = 1
14,468,703 UART: [ldev] Erasing FE.KEYID = 1
16,950,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,667,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,682,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,697,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,713,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,733,601 UART: [ldev] --
18,739,676 UART: [fwproc] Wait for Commands...
18,742,131 UART: [fwproc] Recv command 0x46574c44
18,744,451 UART: [fwproc] Recv'd Img size: 114084 bytes
22,189,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,269,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,385,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,927,074 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,759,933 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,533,909 >>> mbox cmd response: failed
11,534,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,534,828 >>> mbox cmd response: failed
11,535,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,535,394 >>> mbox cmd response: failed
Initializing fuses
2,052,431 writing to cptra_bootfsm_go
12,089,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,290,010 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,191 UART: [kat] SHA2-256
882,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,237 UART: [kat] ++
886,389 UART: [kat] sha1
890,463 UART: [kat] SHA2-256
892,401 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,576 UART: [kat] LMS
1,475,772 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,648 UART: [idev] ++
1,479,816 UART: [idev] CDI.KEYID = 6
1,480,176 UART: [idev] SUBJECT.KEYID = 7
1,480,600 UART: [idev] UDS.KEYID = 0
1,480,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,410 UART: [idev] Erasing UDS.KEYID = 0
1,504,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,964 UART: [idev] --
1,514,189 UART: [ldev] ++
1,514,357 UART: [ldev] CDI.KEYID = 6
1,514,720 UART: [ldev] SUBJECT.KEYID = 5
1,515,146 UART: [ldev] AUTHORITY.KEYID = 7
1,515,609 UART: [ldev] FE.KEYID = 1
1,520,903 UART: [ldev] Erasing FE.KEYID = 1
1,546,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,668 UART: [ldev] --
1,586,151 UART: [fwproc] Waiting for Commands...
1,586,998 UART: [fwproc] Received command 0x46574c44
1,587,789 UART: [fwproc] Received Image of size 114084 bytes
1,627,102 UART: ROM Fatal Error: 0x000B0019
1,628,259 >>> mbox cmd response: failed
1,628,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,265 >>> mbox cmd response: failed
1,628,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,023 UART: [cold-reset] ++
1,476,513 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,504,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,556 UART: [idev] --
1,514,503 UART: [ldev] ++
1,514,671 UART: [ldev] CDI.KEYID = 6
1,515,034 UART: [ldev] SUBJECT.KEYID = 5
1,515,460 UART: [ldev] AUTHORITY.KEYID = 7
1,515,923 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,878 UART: [ldev] --
1,586,249 UART: [fwproc] Waiting for Commands...
1,586,910 UART: [fwproc] Received command 0x46574c44
1,587,701 UART: [fwproc] Received Image of size 114084 bytes
2,881,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,734 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,086 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,463 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,479,668 >>> mbox cmd response: failed
1,479,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,674 >>> mbox cmd response: failed
1,479,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,469 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,331 UART: [state] LifecycleState = Unprovisioned
86,986 UART: [state] DebugLocked = No
87,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,308 UART: [kat] SHA2-256
883,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,354 UART: [kat] ++
887,506 UART: [kat] sha1
891,810 UART: [kat] SHA2-256
893,748 UART: [kat] SHA2-384
896,469 UART: [kat] SHA2-512-ACC
898,370 UART: [kat] ECC-384
904,093 UART: [kat] HMAC-384Kdf
908,879 UART: [kat] LMS
1,477,075 UART: [kat] --
1,477,984 UART: [cold-reset] ++
1,478,378 UART: [fht] Storing FHT @ 0x50003400
1,481,269 UART: [idev] ++
1,481,437 UART: [idev] CDI.KEYID = 6
1,481,797 UART: [idev] SUBJECT.KEYID = 7
1,482,221 UART: [idev] UDS.KEYID = 0
1,482,566 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,855 UART: [idev] Erasing UDS.KEYID = 0
1,506,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,419 UART: [idev] --
1,516,520 UART: [ldev] ++
1,516,688 UART: [ldev] CDI.KEYID = 6
1,517,051 UART: [ldev] SUBJECT.KEYID = 5
1,517,477 UART: [ldev] AUTHORITY.KEYID = 7
1,517,940 UART: [ldev] FE.KEYID = 1
1,523,168 UART: [ldev] Erasing FE.KEYID = 1
1,548,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,575 UART: [ldev] --
1,587,986 UART: [fwproc] Waiting for Commands...
1,588,713 UART: [fwproc] Received command 0x46574c44
1,589,504 UART: [fwproc] Received Image of size 114084 bytes
1,628,189 UART: ROM Fatal Error: 0x000B0019
1,629,346 >>> mbox cmd response: failed
1,629,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,352 >>> mbox cmd response: failed
1,629,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,377 UART: [kat] HMAC-384Kdf
908,069 UART: [kat] LMS
1,476,265 UART: [kat] --
1,477,390 UART: [cold-reset] ++
1,477,900 UART: [fht] Storing FHT @ 0x50003400
1,480,763 UART: [idev] ++
1,480,931 UART: [idev] CDI.KEYID = 6
1,481,291 UART: [idev] SUBJECT.KEYID = 7
1,481,715 UART: [idev] UDS.KEYID = 0
1,482,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,451 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,127 UART: [idev] --
1,516,134 UART: [ldev] ++
1,516,302 UART: [ldev] CDI.KEYID = 6
1,516,665 UART: [ldev] SUBJECT.KEYID = 5
1,517,091 UART: [ldev] AUTHORITY.KEYID = 7
1,517,554 UART: [ldev] FE.KEYID = 1
1,523,012 UART: [ldev] Erasing FE.KEYID = 1
1,548,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,561 UART: [ldev] --
1,587,914 UART: [fwproc] Waiting for Commands...
1,588,569 UART: [fwproc] Received command 0x46574c44
1,589,360 UART: [fwproc] Received Image of size 114084 bytes
2,884,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,532 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,480,331 >>> mbox cmd response: failed
1,480,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,337 >>> mbox cmd response: failed
1,480,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,638 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,866 UART: [kat] LMS
1,171,194 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,595 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,662 UART: [idev] Erasing UDS.KEYID = 0
1,200,711 UART: [idev] Sha1 KeyId Algorithm
1,209,151 UART: [idev] --
1,210,321 UART: [ldev] ++
1,210,489 UART: [ldev] CDI.KEYID = 6
1,210,852 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,216,995 UART: [ldev] Erasing FE.KEYID = 1
1,243,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,805 UART: [ldev] --
1,283,196 UART: [fwproc] Wait for Commands...
1,283,866 UART: [fwproc] Recv command 0x46574c44
1,284,594 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,489 UART: ROM Fatal Error: 0x000B0019
1,324,646 >>> mbox cmd response: failed
1,324,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,652 >>> mbox cmd response: failed
1,324,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
893,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,139 UART: [kat] ++
897,291 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,298 UART: [kat] SHA2-512-ACC
908,199 UART: [kat] ECC-384
917,996 UART: [kat] HMAC-384Kdf
922,398 UART: [kat] LMS
1,170,726 UART: [kat] --
1,171,531 UART: [cold-reset] ++
1,171,913 UART: [fht] FHT @ 0x50003400
1,174,598 UART: [idev] ++
1,174,766 UART: [idev] CDI.KEYID = 6
1,175,126 UART: [idev] SUBJECT.KEYID = 7
1,175,550 UART: [idev] UDS.KEYID = 0
1,175,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,662 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,531 UART: [idev] --
1,210,395 UART: [ldev] ++
1,210,563 UART: [ldev] CDI.KEYID = 6
1,210,926 UART: [ldev] SUBJECT.KEYID = 5
1,211,352 UART: [ldev] AUTHORITY.KEYID = 7
1,211,815 UART: [ldev] FE.KEYID = 1
1,217,083 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,283,088 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,888 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,373 >>> mbox cmd response: failed
1,179,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,379 >>> mbox cmd response: failed
1,179,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,529 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
893,409 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,534 UART: [kat] ++
897,686 UART: [kat] sha1
901,854 UART: [kat] SHA2-256
903,794 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,235 UART: [kat] HMAC-384Kdf
922,879 UART: [kat] LMS
1,171,207 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,646 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,859 UART: [idev] Erasing UDS.KEYID = 0
1,201,874 UART: [idev] Sha1 KeyId Algorithm
1,210,248 UART: [idev] --
1,211,226 UART: [ldev] ++
1,211,394 UART: [ldev] CDI.KEYID = 6
1,211,757 UART: [ldev] SUBJECT.KEYID = 5
1,212,183 UART: [ldev] AUTHORITY.KEYID = 7
1,212,646 UART: [ldev] FE.KEYID = 1
1,217,922 UART: [ldev] Erasing FE.KEYID = 1
1,244,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,128 UART: [ldev] --
1,283,443 UART: [fwproc] Wait for Commands...
1,284,089 UART: [fwproc] Recv command 0x46574c44
1,284,817 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,774 UART: ROM Fatal Error: 0x000B0019
1,324,931 >>> mbox cmd response: failed
1,324,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,937 >>> mbox cmd response: failed
1,324,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,934 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,549 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,682 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,177,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,563 UART: [idev] Erasing UDS.KEYID = 0
1,201,728 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,210,994 UART: [ldev] ++
1,211,162 UART: [ldev] CDI.KEYID = 6
1,211,525 UART: [ldev] SUBJECT.KEYID = 5
1,211,951 UART: [ldev] AUTHORITY.KEYID = 7
1,212,414 UART: [ldev] FE.KEYID = 1
1,217,662 UART: [ldev] Erasing FE.KEYID = 1
1,243,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,886 UART: [ldev] --
1,283,337 UART: [fwproc] Wait for Commands...
1,283,989 UART: [fwproc] Recv command 0x46574c44
1,284,717 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,937 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,510 >>> mbox cmd response: failed
1,179,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,516 >>> mbox cmd response: failed
1,179,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,596 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,173,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,457 UART: [idev] Erasing UDS.KEYID = 0
1,198,721 UART: [idev] Sha1 KeyId Algorithm
1,207,493 UART: [idev] --
1,208,458 UART: [ldev] ++
1,208,626 UART: [ldev] CDI.KEYID = 6
1,208,990 UART: [ldev] SUBJECT.KEYID = 5
1,209,417 UART: [ldev] AUTHORITY.KEYID = 7
1,209,880 UART: [ldev] FE.KEYID = 1
1,214,878 UART: [ldev] Erasing FE.KEYID = 1
1,241,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,204 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,606 UART: ROM Fatal Error: 0x000B0019
1,322,763 >>> mbox cmd response: failed
1,322,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,769 >>> mbox cmd response: failed
1,322,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,568 UART: [kat] SHA2-512-ACC
906,469 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,454 UART: [kat] LMS
1,168,766 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,481 UART: [idev] --
1,208,572 UART: [ldev] ++
1,208,740 UART: [ldev] CDI.KEYID = 6
1,209,104 UART: [ldev] SUBJECT.KEYID = 5
1,209,531 UART: [ldev] AUTHORITY.KEYID = 7
1,209,994 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,567 UART: [fwproc] Recv command 0x46574c44
1,282,300 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,569 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,384 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,174,424 >>> mbox cmd response: failed
1,174,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,430 >>> mbox cmd response: failed
1,174,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,674 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,169 UART: [ldev] ++
1,209,337 UART: [ldev] CDI.KEYID = 6
1,209,701 UART: [ldev] SUBJECT.KEYID = 5
1,210,128 UART: [ldev] AUTHORITY.KEYID = 7
1,210,591 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,241,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,217 UART: [fwproc] Wait for Commands...
1,281,826 UART: [fwproc] Recv command 0x46574c44
1,282,559 UART: [fwproc] Recv'd Img size: 114084 bytes
1,322,207 UART: ROM Fatal Error: 0x000B0019
1,323,364 >>> mbox cmd response: failed
1,323,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,370 >>> mbox cmd response: failed
1,323,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,125 UART: [state] LifecycleState = Unprovisioned
85,780 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,689 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,756 UART: [idev] ++
1,173,924 UART: [idev] CDI.KEYID = 6
1,174,285 UART: [idev] SUBJECT.KEYID = 7
1,174,710 UART: [idev] UDS.KEYID = 0
1,175,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,943 UART: [ldev] Erasing FE.KEYID = 1
1,243,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,763 UART: [fwproc] Wait for Commands...
1,283,406 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,589 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,409 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,313 >>> mbox cmd response: failed
1,175,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,319 >>> mbox cmd response: failed
1,175,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,289 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,179 UART:
192,560 UART: Running Caliptra ROM ...
193,699 UART:
193,848 UART: [state] CFI Enabled
266,433 UART: [state] LifecycleState = Unprovisioned
268,411 UART: [state] DebugLocked = No
271,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,836 UART: [kat] SHA2-256
445,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,040 UART: [kat] ++
456,554 UART: [kat] sha1
467,269 UART: [kat] SHA2-256
469,958 UART: [kat] SHA2-384
474,319 UART: [kat] SHA2-512-ACC
476,716 UART: [kat] ECC-384
2,766,355 UART: [kat] HMAC-384Kdf
2,799,771 UART: [kat] LMS
3,990,055 UART: [kat] --
3,995,253 UART: [cold-reset] ++
3,996,541 UART: [fht] Storing FHT @ 0x50003400
4,007,378 UART: [idev] ++
4,007,959 UART: [idev] CDI.KEYID = 6
4,008,933 UART: [idev] SUBJECT.KEYID = 7
4,010,156 UART: [idev] UDS.KEYID = 0
4,012,852 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,174 UART: [idev] Erasing UDS.KEYID = 0
7,346,268 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,687 UART: [idev] --
7,373,812 UART: [ldev] ++
7,374,388 UART: [ldev] CDI.KEYID = 6
7,375,355 UART: [ldev] SUBJECT.KEYID = 5
7,376,571 UART: [ldev] AUTHORITY.KEYID = 7
7,377,802 UART: [ldev] FE.KEYID = 1
7,422,423 UART: [ldev] Erasing FE.KEYID = 1
10,757,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,537 UART: [ldev] --
13,135,945 UART: [fwproc] Waiting for Commands...
13,138,180 UART: [fwproc] Received command 0x46574c44
13,140,424 UART: [fwproc] Received Image of size 113760 bytes
15,829,297 UART: ROM Fatal Error: 0x000B000F
15,832,746 >>> mbox cmd response: failed
15,833,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,833,492 >>> mbox cmd response: failed
15,833,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,834,056 >>> mbox cmd response: failed
Initializing fuses
2,053,431 writing to cptra_bootfsm_go
2,242,815 UART:
2,243,171 UART: Running Caliptra ROM ...
2,244,314 UART:
2,244,515 UART: [state] CFI Enabled
2,304,669 UART: [state] LifecycleState = Unprovisioned
2,306,601 UART: [state] DebugLocked = No
2,309,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,998 UART: [kat] SHA2-256
2,483,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,206 UART: [kat] ++
2,494,674 UART: [kat] sha1
2,505,510 UART: [kat] SHA2-256
2,508,212 UART: [kat] SHA2-384
2,512,965 UART: [kat] SHA2-512-ACC
2,515,317 UART: [kat] ECC-384
4,809,137 UART: [kat] HMAC-384Kdf
4,821,004 UART: [kat] LMS
6,011,355 UART: [kat] --
6,016,070 UART: [cold-reset] ++
6,017,978 UART: [fht] Storing FHT @ 0x50003400
6,030,663 UART: [idev] ++
6,031,237 UART: [idev] CDI.KEYID = 6
6,032,260 UART: [idev] SUBJECT.KEYID = 7
6,033,426 UART: [idev] UDS.KEYID = 0
6,036,145 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,179,358 UART: [idev] Erasing UDS.KEYID = 0
9,368,045 UART: [idev] Using Sha1 for KeyId Algorithm
9,389,277 UART: [idev] --
9,393,713 UART: [ldev] ++
9,394,289 UART: [ldev] CDI.KEYID = 6
9,395,231 UART: [ldev] SUBJECT.KEYID = 5
9,396,585 UART: [ldev] AUTHORITY.KEYID = 7
9,397,686 UART: [ldev] FE.KEYID = 1
9,445,968 UART: [ldev] Erasing FE.KEYID = 1
12,778,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,120 UART: [ldev] --
15,157,304 UART: [fwproc] Waiting for Commands...
15,159,728 UART: [fwproc] Received command 0x46574c44
15,161,917 UART: [fwproc] Received Image of size 113760 bytes
19,212,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,292,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,361,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,676,930 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,784,705 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,551,723 >>> mbox cmd response: failed
15,552,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,552,615 >>> mbox cmd response: failed
15,552,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,553,176 >>> mbox cmd response: failed
Initializing fuses
2,048,046 writing to cptra_bootfsm_go
5,842,528 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,907,878 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,477 UART:
192,825 UART: Running Caliptra ROM ...
193,948 UART:
603,705 UART: [state] CFI Enabled
621,163 UART: [state] LifecycleState = Unprovisioned
623,082 UART: [state] DebugLocked = No
624,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,155 UART: [kat] SHA2-256
799,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,456 UART: [kat] ++
810,903 UART: [kat] sha1
821,834 UART: [kat] SHA2-256
824,567 UART: [kat] SHA2-384
831,621 UART: [kat] SHA2-512-ACC
834,021 UART: [kat] ECC-384
3,116,877 UART: [kat] HMAC-384Kdf
3,129,567 UART: [kat] LMS
4,319,717 UART: [kat] --
4,322,337 UART: [cold-reset] ++
4,324,780 UART: [fht] Storing FHT @ 0x50003400
4,336,587 UART: [idev] ++
4,337,159 UART: [idev] CDI.KEYID = 6
4,338,046 UART: [idev] SUBJECT.KEYID = 7
4,339,315 UART: [idev] UDS.KEYID = 0
4,342,212 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,305 UART: [idev] Erasing UDS.KEYID = 0
7,626,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,412 UART: [idev] --
7,652,297 UART: [ldev] ++
7,652,864 UART: [ldev] CDI.KEYID = 6
7,653,843 UART: [ldev] SUBJECT.KEYID = 5
7,655,055 UART: [ldev] AUTHORITY.KEYID = 7
7,656,297 UART: [ldev] FE.KEYID = 1
7,666,648 UART: [ldev] Erasing FE.KEYID = 1
10,956,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,227 UART: [ldev] --
13,317,521 UART: [fwproc] Waiting for Commands...
13,319,348 UART: [fwproc] Received command 0x46574c44
13,321,532 UART: [fwproc] Received Image of size 113760 bytes
16,007,623 UART: ROM Fatal Error: 0x000B000F
16,011,068 >>> mbox cmd response: failed
16,011,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,011,830 >>> mbox cmd response: failed
16,012,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,012,410 >>> mbox cmd response: failed
Initializing fuses
2,053,054 writing to cptra_bootfsm_go
2,242,341 UART:
2,242,694 UART: Running Caliptra ROM ...
2,243,835 UART:
4,457,742 UART: [state] CFI Enabled
4,473,817 UART: [state] LifecycleState = Unprovisioned
4,475,733 UART: [state] DebugLocked = No
4,478,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,483,598 UART: [kat] SHA2-256
4,653,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,663,855 UART: [kat] ++
4,664,315 UART: [kat] sha1
4,676,822 UART: [kat] SHA2-256
4,679,521 UART: [kat] SHA2-384
4,685,363 UART: [kat] SHA2-512-ACC
4,687,765 UART: [kat] ECC-384
6,973,749 UART: [kat] HMAC-384Kdf
6,986,355 UART: [kat] LMS
8,176,443 UART: [kat] --
8,182,450 UART: [cold-reset] ++
8,184,279 UART: [fht] Storing FHT @ 0x50003400
8,196,032 UART: [idev] ++
8,196,598 UART: [idev] CDI.KEYID = 6
8,197,614 UART: [idev] SUBJECT.KEYID = 7
8,198,772 UART: [idev] UDS.KEYID = 0
8,201,490 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,344,512 UART: [idev] Erasing UDS.KEYID = 0
11,486,453 UART: [idev] Using Sha1 for KeyId Algorithm
11,509,021 UART: [idev] --
11,513,107 UART: [ldev] ++
11,513,762 UART: [ldev] CDI.KEYID = 6
11,514,649 UART: [ldev] SUBJECT.KEYID = 5
11,515,910 UART: [ldev] AUTHORITY.KEYID = 7
11,517,146 UART: [ldev] FE.KEYID = 1
11,530,901 UART: [ldev] Erasing FE.KEYID = 1
14,821,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,113,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,127,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,142,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,157,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,176,340 UART: [ldev] --
17,180,968 UART: [fwproc] Waiting for Commands...
17,184,045 UART: [fwproc] Received command 0x46574c44
17,186,233 UART: [fwproc] Received Image of size 113760 bytes
21,234,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,304,043 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,372,926 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,688,543 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,128,366 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,738,190 >>> mbox cmd response: failed
15,738,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,739,124 >>> mbox cmd response: failed
15,739,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,739,698 >>> mbox cmd response: failed
Initializing fuses
2,048,885 writing to cptra_bootfsm_go
8,254,994 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,176,958 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,263 UART:
192,641 UART: Running Caliptra ROM ...
193,813 UART:
193,966 UART: [state] CFI Enabled
259,001 UART: [state] LifecycleState = Unprovisioned
260,887 UART: [state] DebugLocked = No
263,110 UART: [state] WD Timer not started. Device not locked for debugging
266,300 UART: [kat] SHA2-256
445,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,983 UART: [kat] ++
457,431 UART: [kat] sha1
467,712 UART: [kat] SHA2-256
470,720 UART: [kat] SHA2-384
477,074 UART: [kat] SHA2-512-ACC
480,062 UART: [kat] ECC-384
2,925,321 UART: [kat] HMAC-384Kdf
2,948,001 UART: [kat] LMS
3,477,464 UART: [kat] --
3,483,579 UART: [cold-reset] ++
3,484,761 UART: [fht] FHT @ 0x50003400
3,494,826 UART: [idev] ++
3,495,419 UART: [idev] CDI.KEYID = 6
3,496,332 UART: [idev] SUBJECT.KEYID = 7
3,497,491 UART: [idev] UDS.KEYID = 0
3,500,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,643,953 UART: [idev] Erasing UDS.KEYID = 0
6,002,221 UART: [idev] Sha1 KeyId Algorithm
6,025,121 UART: [idev] --
6,028,339 UART: [ldev] ++
6,028,925 UART: [ldev] CDI.KEYID = 6
6,029,838 UART: [ldev] SUBJECT.KEYID = 5
6,031,005 UART: [ldev] AUTHORITY.KEYID = 7
6,032,244 UART: [ldev] FE.KEYID = 1
6,079,001 UART: [ldev] Erasing FE.KEYID = 1
8,580,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,610 UART: [ldev] --
10,372,423 UART: [fwproc] Wait for Commands...
10,374,950 UART: [fwproc] Recv command 0x46574c44
10,377,047 UART: [fwproc] Recv'd Img size: 114084 bytes
12,413,699 UART: ROM Fatal Error: 0x000B000F
12,416,815 >>> mbox cmd response: failed
12,417,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,417,467 >>> mbox cmd response: failed
12,417,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,418,135 >>> mbox cmd response: failed
Initializing fuses
2,052,012 writing to cptra_bootfsm_go
2,241,322 UART:
2,241,683 UART: Running Caliptra ROM ...
2,242,732 UART:
2,242,883 UART: [state] CFI Enabled
2,308,908 UART: [state] LifecycleState = Unprovisioned
2,310,821 UART: [state] DebugLocked = No
2,313,527 UART: [state] WD Timer not started. Device not locked for debugging
2,316,781 UART: [kat] SHA2-256
2,495,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,447 UART: [kat] ++
2,507,905 UART: [kat] sha1
2,518,034 UART: [kat] SHA2-256
2,521,044 UART: [kat] SHA2-384
2,528,069 UART: [kat] SHA2-512-ACC
2,531,017 UART: [kat] ECC-384
4,993,518 UART: [kat] HMAC-384Kdf
5,016,656 UART: [kat] LMS
5,546,116 UART: [kat] --
5,550,934 UART: [cold-reset] ++
5,552,274 UART: [fht] FHT @ 0x50003400
5,563,143 UART: [idev] ++
5,563,708 UART: [idev] CDI.KEYID = 6
5,564,766 UART: [idev] SUBJECT.KEYID = 7
5,565,869 UART: [idev] UDS.KEYID = 0
5,568,486 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,712,093 UART: [idev] Erasing UDS.KEYID = 0
8,070,396 UART: [idev] Sha1 KeyId Algorithm
8,094,529 UART: [idev] --
8,097,790 UART: [ldev] ++
8,098,379 UART: [ldev] CDI.KEYID = 6
8,099,296 UART: [ldev] SUBJECT.KEYID = 5
8,100,602 UART: [ldev] AUTHORITY.KEYID = 7
8,101,787 UART: [ldev] FE.KEYID = 1
8,144,492 UART: [ldev] Erasing FE.KEYID = 1
10,649,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,376,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,392,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,941 UART: [ldev] --
12,447,961 UART: [fwproc] Wait for Commands...
12,449,461 UART: [fwproc] Recv command 0x46574c44
12,451,505 UART: [fwproc] Recv'd Img size: 114084 bytes
15,851,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,922,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,308,408 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,385,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,234,950 >>> mbox cmd response: failed
12,235,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,235,891 >>> mbox cmd response: failed
12,236,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,236,447 >>> mbox cmd response: failed
Initializing fuses
2,049,351 writing to cptra_bootfsm_go
5,418,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,128,569 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,619 UART:
192,993 UART: Running Caliptra ROM ...
194,077 UART:
603,682 UART: [state] CFI Enabled
618,408 UART: [state] LifecycleState = Unprovisioned
620,237 UART: [state] DebugLocked = No
622,727 UART: [state] WD Timer not started. Device not locked for debugging
625,741 UART: [kat] SHA2-256
804,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,431 UART: [kat] ++
816,881 UART: [kat] sha1
828,185 UART: [kat] SHA2-256
831,191 UART: [kat] SHA2-384
837,571 UART: [kat] SHA2-512-ACC
840,559 UART: [kat] ECC-384
3,281,344 UART: [kat] HMAC-384Kdf
3,293,516 UART: [kat] LMS
3,823,025 UART: [kat] --
3,827,800 UART: [cold-reset] ++
3,829,039 UART: [fht] FHT @ 0x50003400
3,840,075 UART: [idev] ++
3,840,642 UART: [idev] CDI.KEYID = 6
3,841,657 UART: [idev] SUBJECT.KEYID = 7
3,842,760 UART: [idev] UDS.KEYID = 0
3,845,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,365 UART: [idev] Erasing UDS.KEYID = 0
6,317,844 UART: [idev] Sha1 KeyId Algorithm
6,340,972 UART: [idev] --
6,345,431 UART: [ldev] ++
6,346,033 UART: [ldev] CDI.KEYID = 6
6,346,948 UART: [ldev] SUBJECT.KEYID = 5
6,348,055 UART: [ldev] AUTHORITY.KEYID = 7
6,349,351 UART: [ldev] FE.KEYID = 1
6,359,083 UART: [ldev] Erasing FE.KEYID = 1
8,832,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,585 UART: [ldev] --
10,624,420 UART: [fwproc] Wait for Commands...
10,627,386 UART: [fwproc] Recv command 0x46574c44
10,629,487 UART: [fwproc] Recv'd Img size: 114084 bytes
12,662,829 UART: ROM Fatal Error: 0x000B000F
12,665,963 >>> mbox cmd response: failed
12,666,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,756 >>> mbox cmd response: failed
12,667,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,317 >>> mbox cmd response: failed
Initializing fuses
2,059,133 writing to cptra_bootfsm_go
2,248,463 UART:
2,248,813 UART: Running Caliptra ROM ...
2,249,897 UART:
7,791,815 UART: [state] CFI Enabled
7,805,306 UART: [state] LifecycleState = Unprovisioned
7,807,168 UART: [state] DebugLocked = No
7,809,754 UART: [state] WD Timer not started. Device not locked for debugging
7,813,951 UART: [kat] SHA2-256
7,993,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,004,674 UART: [kat] ++
8,005,232 UART: [kat] sha1
8,016,081 UART: [kat] SHA2-256
8,019,105 UART: [kat] SHA2-384
8,025,201 UART: [kat] SHA2-512-ACC
8,028,159 UART: [kat] ECC-384
10,467,365 UART: [kat] HMAC-384Kdf
10,480,945 UART: [kat] LMS
11,010,406 UART: [kat] --
11,013,856 UART: [cold-reset] ++
11,015,136 UART: [fht] FHT @ 0x50003400
11,027,301 UART: [idev] ++
11,027,913 UART: [idev] CDI.KEYID = 6
11,028,805 UART: [idev] SUBJECT.KEYID = 7
11,029,929 UART: [idev] UDS.KEYID = 0
11,032,679 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,175,934 UART: [idev] Erasing UDS.KEYID = 0
13,503,808 UART: [idev] Sha1 KeyId Algorithm
13,527,466 UART: [idev] --
13,530,893 UART: [ldev] ++
13,531,465 UART: [ldev] CDI.KEYID = 6
13,532,348 UART: [ldev] SUBJECT.KEYID = 5
13,533,559 UART: [ldev] AUTHORITY.KEYID = 7
13,534,789 UART: [ldev] FE.KEYID = 1
13,543,619 UART: [ldev] Erasing FE.KEYID = 1
16,019,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,737,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,753,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,769,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,785,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,805,709 UART: [ldev] --
17,809,842 UART: [fwproc] Wait for Commands...
17,812,586 UART: [fwproc] Recv command 0x46574c44
17,814,623 UART: [fwproc] Recv'd Img size: 114084 bytes
21,207,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,282,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,351,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,667,815 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,698,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,442,972 >>> mbox cmd response: failed
12,443,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,444,016 >>> mbox cmd response: failed
12,444,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,444,581 >>> mbox cmd response: failed
Initializing fuses
2,048,243 writing to cptra_bootfsm_go
11,120,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,691,154 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,331 UART:
192,694 UART: Running Caliptra ROM ...
193,898 UART:
194,051 UART: [state] CFI Enabled
266,411 UART: [state] LifecycleState = Unprovisioned
268,820 UART: [state] DebugLocked = No
271,228 UART: [state] WD Timer not started. Device not locked for debugging
275,993 UART: [kat] SHA2-256
465,880 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,663 UART: [kat] ++
477,113 UART: [kat] sha1
488,272 UART: [kat] SHA2-256
491,292 UART: [kat] SHA2-384
496,786 UART: [kat] SHA2-512-ACC
499,400 UART: [kat] ECC-384
2,949,351 UART: [kat] HMAC-384Kdf
2,970,356 UART: [kat] LMS
3,502,114 UART: [kat] --
3,506,931 UART: [cold-reset] ++
3,508,001 UART: [fht] FHT @ 0x50003400
3,520,481 UART: [idev] ++
3,521,214 UART: [idev] CDI.KEYID = 6
3,522,096 UART: [idev] SUBJECT.KEYID = 7
3,523,371 UART: [idev] UDS.KEYID = 0
3,526,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,845 UART: [idev] Erasing UDS.KEYID = 0
6,028,998 UART: [idev] Sha1 KeyId Algorithm
6,050,753 UART: [idev] --
6,055,328 UART: [ldev] ++
6,056,018 UART: [ldev] CDI.KEYID = 6
6,056,948 UART: [ldev] SUBJECT.KEYID = 5
6,058,109 UART: [ldev] AUTHORITY.KEYID = 7
6,059,344 UART: [ldev] FE.KEYID = 1
6,097,966 UART: [ldev] Erasing FE.KEYID = 1
8,604,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,830 UART: [ldev] --
10,411,568 UART: [fwproc] Wait for Commands...
10,413,779 UART: [fwproc] Recv command 0x46574c44
10,416,101 UART: [fwproc] Recv'd Img size: 114084 bytes
12,489,563 UART: ROM Fatal Error: 0x000B000F
12,493,234 >>> mbox cmd response: failed
12,493,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,998 >>> mbox cmd response: failed
12,494,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,559 >>> mbox cmd response: failed
Initializing fuses
2,055,034 writing to cptra_bootfsm_go
2,244,344 UART:
2,244,698 UART: Running Caliptra ROM ...
2,245,852 UART:
2,246,021 UART: [state] CFI Enabled
2,315,985 UART: [state] LifecycleState = Unprovisioned
2,318,365 UART: [state] DebugLocked = No
2,320,894 UART: [state] WD Timer not started. Device not locked for debugging
2,324,602 UART: [kat] SHA2-256
2,514,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,261 UART: [kat] ++
2,525,751 UART: [kat] sha1
2,535,725 UART: [kat] SHA2-256
2,538,748 UART: [kat] SHA2-384
2,543,553 UART: [kat] SHA2-512-ACC
2,546,124 UART: [kat] ECC-384
4,998,581 UART: [kat] HMAC-384Kdf
5,020,323 UART: [kat] LMS
5,552,078 UART: [kat] --
5,556,152 UART: [cold-reset] ++
5,558,466 UART: [fht] FHT @ 0x50003400
5,570,101 UART: [idev] ++
5,570,781 UART: [idev] CDI.KEYID = 6
5,571,799 UART: [idev] SUBJECT.KEYID = 7
5,572,960 UART: [idev] UDS.KEYID = 0
5,575,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,719,181 UART: [idev] Erasing UDS.KEYID = 0
8,077,038 UART: [idev] Sha1 KeyId Algorithm
8,099,379 UART: [idev] --
8,103,434 UART: [ldev] ++
8,104,122 UART: [ldev] CDI.KEYID = 6
8,105,008 UART: [ldev] SUBJECT.KEYID = 5
8,106,228 UART: [ldev] AUTHORITY.KEYID = 7
8,107,460 UART: [ldev] FE.KEYID = 1
8,148,401 UART: [ldev] Erasing FE.KEYID = 1
10,655,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,180 UART: [ldev] --
12,461,306 UART: [fwproc] Wait for Commands...
12,463,303 UART: [fwproc] Recv command 0x46574c44
12,465,622 UART: [fwproc] Recv'd Img size: 114084 bytes
15,902,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,970,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,086,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,628,367 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,442,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,286,624 >>> mbox cmd response: failed
12,287,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,287,574 >>> mbox cmd response: failed
12,287,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,288,157 >>> mbox cmd response: failed
Initializing fuses
2,048,919 writing to cptra_bootfsm_go
5,486,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,775,885 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,742 UART:
193,091 UART: Running Caliptra ROM ...
194,232 UART:
604,079 UART: [state] CFI Enabled
618,895 UART: [state] LifecycleState = Unprovisioned
621,307 UART: [state] DebugLocked = No
622,474 UART: [state] WD Timer not started. Device not locked for debugging
627,311 UART: [kat] SHA2-256
817,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,996 UART: [kat] ++
828,584 UART: [kat] sha1
839,322 UART: [kat] SHA2-256
842,330 UART: [kat] SHA2-384
847,391 UART: [kat] SHA2-512-ACC
850,003 UART: [kat] ECC-384
3,294,652 UART: [kat] HMAC-384Kdf
3,308,185 UART: [kat] LMS
3,840,019 UART: [kat] --
3,843,977 UART: [cold-reset] ++
3,845,591 UART: [fht] FHT @ 0x50003400
3,857,219 UART: [idev] ++
3,857,899 UART: [idev] CDI.KEYID = 6
3,858,873 UART: [idev] SUBJECT.KEYID = 7
3,860,050 UART: [idev] UDS.KEYID = 0
3,863,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,506 UART: [idev] Erasing UDS.KEYID = 0
6,338,478 UART: [idev] Sha1 KeyId Algorithm
6,359,998 UART: [idev] --
6,365,397 UART: [ldev] ++
6,366,076 UART: [ldev] CDI.KEYID = 6
6,366,998 UART: [ldev] SUBJECT.KEYID = 5
6,368,157 UART: [ldev] AUTHORITY.KEYID = 7
6,369,387 UART: [ldev] FE.KEYID = 1
6,380,212 UART: [ldev] Erasing FE.KEYID = 1
8,860,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,244 UART: [ldev] --
10,651,299 UART: [fwproc] Wait for Commands...
10,654,101 UART: [fwproc] Recv command 0x46574c44
10,656,412 UART: [fwproc] Recv'd Img size: 114084 bytes
12,726,902 UART: ROM Fatal Error: 0x000B000F
12,730,565 >>> mbox cmd response: failed
12,730,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,328 >>> mbox cmd response: failed
12,731,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,842 >>> mbox cmd response: failed
Initializing fuses
2,060,428 writing to cptra_bootfsm_go
2,249,747 UART:
2,250,107 UART: Running Caliptra ROM ...
2,251,247 UART:
7,730,282 UART: [state] CFI Enabled
7,745,510 UART: [state] LifecycleState = Unprovisioned
7,747,911 UART: [state] DebugLocked = No
7,749,108 UART: [state] WD Timer not started. Device not locked for debugging
7,752,856 UART: [kat] SHA2-256
7,942,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,953,509 UART: [kat] ++
7,954,026 UART: [kat] sha1
7,965,402 UART: [kat] SHA2-256
7,968,423 UART: [kat] SHA2-384
7,973,561 UART: [kat] SHA2-512-ACC
7,976,130 UART: [kat] ECC-384
10,416,510 UART: [kat] HMAC-384Kdf
10,429,387 UART: [kat] LMS
10,961,237 UART: [kat] --
10,965,498 UART: [cold-reset] ++
10,967,583 UART: [fht] FHT @ 0x50003400
10,979,205 UART: [idev] ++
10,979,880 UART: [idev] CDI.KEYID = 6
10,980,902 UART: [idev] SUBJECT.KEYID = 7
10,982,063 UART: [idev] UDS.KEYID = 0
10,985,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,128,420 UART: [idev] Erasing UDS.KEYID = 0
13,456,933 UART: [idev] Sha1 KeyId Algorithm
13,479,070 UART: [idev] --
13,483,541 UART: [ldev] ++
13,484,229 UART: [ldev] CDI.KEYID = 6
13,485,146 UART: [ldev] SUBJECT.KEYID = 5
13,486,305 UART: [ldev] AUTHORITY.KEYID = 7
13,487,534 UART: [ldev] FE.KEYID = 1
13,496,687 UART: [ldev] Erasing FE.KEYID = 1
15,970,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,688,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,704,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,719,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,734,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,755,942 UART: [ldev] --
17,760,670 UART: [fwproc] Wait for Commands...
17,763,199 UART: [fwproc] Recv command 0x46574c44
17,765,462 UART: [fwproc] Recv'd Img size: 114084 bytes
21,212,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,295,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,411,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,952,356 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,759,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,509,656 >>> mbox cmd response: failed
12,510,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,585 >>> mbox cmd response: failed
12,510,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,511,148 >>> mbox cmd response: failed
Initializing fuses
2,048,939 writing to cptra_bootfsm_go
11,115,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,297,105 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,137 UART: [kat] SHA2-256
882,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,183 UART: [kat] ++
886,335 UART: [kat] sha1
890,517 UART: [kat] SHA2-256
892,455 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,802 UART: [idev] ++
1,479,970 UART: [idev] CDI.KEYID = 6
1,480,330 UART: [idev] SUBJECT.KEYID = 7
1,480,754 UART: [idev] UDS.KEYID = 0
1,481,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,794 UART: [idev] Erasing UDS.KEYID = 0
1,504,984 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,704 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,120 UART: [ldev] --
1,585,599 UART: [fwproc] Waiting for Commands...
1,586,318 UART: [fwproc] Received command 0x46574c44
1,587,109 UART: [fwproc] Received Image of size 114084 bytes
1,629,441 UART: ROM Fatal Error: 0x000B000F
1,630,600 >>> mbox cmd response: failed
1,630,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,606 >>> mbox cmd response: failed
1,630,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,586 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,729 UART: [fht] Storing FHT @ 0x50003400
1,479,456 UART: [idev] ++
1,479,624 UART: [idev] CDI.KEYID = 6
1,479,984 UART: [idev] SUBJECT.KEYID = 7
1,480,408 UART: [idev] UDS.KEYID = 0
1,480,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,368 UART: [idev] Erasing UDS.KEYID = 0
1,505,174 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,806 UART: [idev] --
1,514,969 UART: [ldev] ++
1,515,137 UART: [ldev] CDI.KEYID = 6
1,515,500 UART: [ldev] SUBJECT.KEYID = 5
1,515,926 UART: [ldev] AUTHORITY.KEYID = 7
1,516,389 UART: [ldev] FE.KEYID = 1
1,521,493 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,686 UART: [ldev] --
1,586,029 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 114084 bytes
2,882,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,473 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,075 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,481,989 >>> mbox cmd response: failed
1,481,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,995 >>> mbox cmd response: failed
1,481,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,723 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,911 UART: [kat] LMS
1,476,107 UART: [kat] --
1,476,766 UART: [cold-reset] ++
1,477,162 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,771 UART: [idev] Erasing UDS.KEYID = 0
1,505,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,515 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,522,162 UART: [ldev] Erasing FE.KEYID = 1
1,547,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,159 UART: [ldev] --
1,586,538 UART: [fwproc] Waiting for Commands...
1,587,195 UART: [fwproc] Received command 0x46574c44
1,587,986 UART: [fwproc] Received Image of size 114084 bytes
1,630,614 UART: ROM Fatal Error: 0x000B000F
1,631,773 >>> mbox cmd response: failed
1,631,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,779 >>> mbox cmd response: failed
1,631,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,138 UART: [kat] SHA2-256
882,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,184 UART: [kat] ++
886,336 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,599 UART: [idev] Erasing UDS.KEYID = 0
1,505,637 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,287 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,521,866 UART: [ldev] Erasing FE.KEYID = 1
1,547,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,301 UART: [ldev] --
1,586,774 UART: [fwproc] Waiting for Commands...
1,587,453 UART: [fwproc] Received command 0x46574c44
1,588,244 UART: [fwproc] Received Image of size 114084 bytes
2,883,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,062 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,044 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,484,466 >>> mbox cmd response: failed
1,484,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,472 >>> mbox cmd response: failed
1,484,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,378 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
893,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,371 UART: [kat] ++
897,523 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,328 UART: [kat] SHA2-512-ACC
908,229 UART: [kat] ECC-384
918,258 UART: [kat] HMAC-384Kdf
922,890 UART: [kat] LMS
1,171,218 UART: [kat] --
1,172,121 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,122 UART: [idev] ++
1,175,290 UART: [idev] CDI.KEYID = 6
1,175,650 UART: [idev] SUBJECT.KEYID = 7
1,176,074 UART: [idev] UDS.KEYID = 0
1,176,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,209,201 UART: [idev] --
1,210,123 UART: [ldev] ++
1,210,291 UART: [ldev] CDI.KEYID = 6
1,210,654 UART: [ldev] SUBJECT.KEYID = 5
1,211,080 UART: [ldev] AUTHORITY.KEYID = 7
1,211,543 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,321 UART: [ldev] --
1,282,610 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,260 UART: ROM Fatal Error: 0x000B000F
1,326,419 >>> mbox cmd response: failed
1,326,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,425 >>> mbox cmd response: failed
1,326,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
893,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,779 UART: [kat] ++
897,931 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,680 UART: [kat] HMAC-384Kdf
923,486 UART: [kat] LMS
1,171,814 UART: [kat] --
1,172,625 UART: [cold-reset] ++
1,173,077 UART: [fht] FHT @ 0x50003400
1,175,834 UART: [idev] ++
1,176,002 UART: [idev] CDI.KEYID = 6
1,176,362 UART: [idev] SUBJECT.KEYID = 7
1,176,786 UART: [idev] UDS.KEYID = 0
1,177,131 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,582 UART: [idev] Erasing UDS.KEYID = 0
1,201,325 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,887 UART: [ldev] ++
1,211,055 UART: [ldev] CDI.KEYID = 6
1,211,418 UART: [ldev] SUBJECT.KEYID = 5
1,211,844 UART: [ldev] AUTHORITY.KEYID = 7
1,212,307 UART: [ldev] FE.KEYID = 1
1,217,465 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,585 UART: [ldev] --
1,282,852 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,468 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,961 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,668 >>> mbox cmd response: failed
1,179,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,674 >>> mbox cmd response: failed
1,179,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,925 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,179 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
893,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,464 UART: [kat] ++
897,616 UART: [kat] sha1
901,790 UART: [kat] SHA2-256
903,730 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,101 UART: [kat] HMAC-384Kdf
922,693 UART: [kat] LMS
1,171,021 UART: [kat] --
1,172,098 UART: [cold-reset] ++
1,172,516 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,303 UART: [idev] Erasing UDS.KEYID = 0
1,201,022 UART: [idev] Sha1 KeyId Algorithm
1,209,548 UART: [idev] --
1,210,730 UART: [ldev] ++
1,210,898 UART: [ldev] CDI.KEYID = 6
1,211,261 UART: [ldev] SUBJECT.KEYID = 5
1,211,687 UART: [ldev] AUTHORITY.KEYID = 7
1,212,150 UART: [ldev] FE.KEYID = 1
1,217,318 UART: [ldev] Erasing FE.KEYID = 1
1,243,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,430 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,733 UART: [fwproc] Recv command 0x46574c44
1,285,461 UART: [fwproc] Recv'd Img size: 114084 bytes
1,326,103 UART: ROM Fatal Error: 0x000B000F
1,327,262 >>> mbox cmd response: failed
1,327,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,268 >>> mbox cmd response: failed
1,327,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
893,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,046 UART: [kat] ++
898,198 UART: [kat] sha1
902,370 UART: [kat] SHA2-256
904,310 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,992 UART: [fht] FHT @ 0x50003400
1,175,623 UART: [idev] ++
1,175,791 UART: [idev] CDI.KEYID = 6
1,176,151 UART: [idev] SUBJECT.KEYID = 7
1,176,575 UART: [idev] UDS.KEYID = 0
1,176,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,601 UART: [idev] Erasing UDS.KEYID = 0
1,201,974 UART: [idev] Sha1 KeyId Algorithm
1,210,514 UART: [idev] --
1,211,752 UART: [ldev] ++
1,211,920 UART: [ldev] CDI.KEYID = 6
1,212,283 UART: [ldev] SUBJECT.KEYID = 5
1,212,709 UART: [ldev] AUTHORITY.KEYID = 7
1,213,172 UART: [ldev] FE.KEYID = 1
1,218,402 UART: [ldev] Erasing FE.KEYID = 1
1,244,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,992 UART: [ldev] --
1,284,475 UART: [fwproc] Wait for Commands...
1,285,261 UART: [fwproc] Recv command 0x46574c44
1,285,989 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,443 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,275 >>> mbox cmd response: failed
1,181,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,281 >>> mbox cmd response: failed
1,181,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,600 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,170,047 UART: [cold-reset] ++
1,170,463 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,199,551 UART: [idev] Sha1 KeyId Algorithm
1,208,543 UART: [idev] --
1,209,632 UART: [ldev] ++
1,209,800 UART: [ldev] CDI.KEYID = 6
1,210,164 UART: [ldev] SUBJECT.KEYID = 5
1,210,591 UART: [ldev] AUTHORITY.KEYID = 7
1,211,054 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,242,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,282 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,754 UART: ROM Fatal Error: 0x000B000F
1,325,913 >>> mbox cmd response: failed
1,325,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,919 >>> mbox cmd response: failed
1,325,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,097 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,174,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,237 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,690 UART: [ldev] Erasing FE.KEYID = 1
1,240,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,380 UART: [ldev] --
1,279,770 UART: [fwproc] Wait for Commands...
1,280,527 UART: [fwproc] Recv command 0x46574c44
1,281,260 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,654 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,950 >>> mbox cmd response: failed
1,175,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,956 >>> mbox cmd response: failed
1,175,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,572 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,542 UART: [idev] ++
1,173,710 UART: [idev] CDI.KEYID = 6
1,174,071 UART: [idev] SUBJECT.KEYID = 7
1,174,496 UART: [idev] UDS.KEYID = 0
1,174,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,668 UART: [idev] Sha1 KeyId Algorithm
1,208,762 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,827 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,159 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,635 UART: ROM Fatal Error: 0x000B000F
1,325,794 >>> mbox cmd response: failed
1,325,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,800 >>> mbox cmd response: failed
1,325,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,138 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,174,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,468 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,313 UART: [ldev] Erasing FE.KEYID = 1
1,242,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,403 UART: [fwproc] Wait for Commands...
1,282,992 UART: [fwproc] Recv command 0x46574c44
1,283,725 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,511 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,577 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,177,255 >>> mbox cmd response: failed
1,177,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,261 >>> mbox cmd response: failed
1,177,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,951 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,048 UART:
192,412 UART: Running Caliptra ROM ...
193,597 UART:
193,752 UART: [state] CFI Enabled
265,865 UART: [state] LifecycleState = Unprovisioned
267,780 UART: [state] DebugLocked = No
269,160 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,303 UART: [kat] SHA2-256
443,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,508 UART: [kat] ++
454,953 UART: [kat] sha1
466,120 UART: [kat] SHA2-256
468,815 UART: [kat] SHA2-384
474,308 UART: [kat] SHA2-512-ACC
476,700 UART: [kat] ECC-384
2,766,189 UART: [kat] HMAC-384Kdf
2,798,890 UART: [kat] LMS
3,989,202 UART: [kat] --
3,995,544 UART: [cold-reset] ++
3,997,265 UART: [fht] Storing FHT @ 0x50003400
4,010,097 UART: [idev] ++
4,010,677 UART: [idev] CDI.KEYID = 6
4,011,615 UART: [idev] SUBJECT.KEYID = 7
4,012,884 UART: [idev] UDS.KEYID = 0
4,015,560 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,158,868 UART: [idev] Erasing UDS.KEYID = 0
7,345,123 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,410 UART: [idev] --
7,372,007 UART: [ldev] ++
7,372,584 UART: [ldev] CDI.KEYID = 6
7,373,519 UART: [ldev] SUBJECT.KEYID = 5
7,374,789 UART: [ldev] AUTHORITY.KEYID = 7
7,375,940 UART: [ldev] FE.KEYID = 1
7,422,427 UART: [ldev] Erasing FE.KEYID = 1
10,753,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,491 UART: [ldev] --
13,111,685 UART: [fwproc] Waiting for Commands...
13,113,732 UART: [fwproc] Received command 0x46574c44
13,115,927 UART: [fwproc] Received Image of size 113760 bytes
14,511,513 UART: ROM Fatal Error: 0x000B001A
14,514,958 >>> mbox cmd response: failed
14,515,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,515,644 >>> mbox cmd response: failed
14,515,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,516,428 >>> mbox cmd response: failed
Initializing fuses
2,051,443 writing to cptra_bootfsm_go
2,240,769 UART:
2,241,117 UART: Running Caliptra ROM ...
2,242,253 UART:
2,242,415 UART: [state] CFI Enabled
2,300,542 UART: [state] LifecycleState = Unprovisioned
2,302,462 UART: [state] DebugLocked = No
2,304,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,374 UART: [kat] SHA2-256
2,478,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,611 UART: [kat] ++
2,489,113 UART: [kat] sha1
2,499,678 UART: [kat] SHA2-256
2,502,375 UART: [kat] SHA2-384
2,508,633 UART: [kat] SHA2-512-ACC
2,511,033 UART: [kat] ECC-384
4,802,796 UART: [kat] HMAC-384Kdf
4,834,837 UART: [kat] LMS
6,025,138 UART: [kat] --
6,028,075 UART: [cold-reset] ++
6,029,096 UART: [fht] Storing FHT @ 0x50003400
6,040,422 UART: [idev] ++
6,041,018 UART: [idev] CDI.KEYID = 6
6,041,940 UART: [idev] SUBJECT.KEYID = 7
6,043,157 UART: [idev] UDS.KEYID = 0
6,045,816 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,189,027 UART: [idev] Erasing UDS.KEYID = 0
9,379,432 UART: [idev] Using Sha1 for KeyId Algorithm
9,400,927 UART: [idev] --
9,405,424 UART: [ldev] ++
9,405,996 UART: [ldev] CDI.KEYID = 6
9,406,940 UART: [ldev] SUBJECT.KEYID = 5
9,408,287 UART: [ldev] AUTHORITY.KEYID = 7
9,409,385 UART: [ldev] FE.KEYID = 1
9,442,506 UART: [ldev] Erasing FE.KEYID = 1
12,776,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,242 UART: [ldev] --
15,158,560 UART: [fwproc] Waiting for Commands...
15,160,560 UART: [fwproc] Received command 0x46574c44
15,162,805 UART: [fwproc] Received Image of size 113760 bytes
19,207,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,281,481 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,350,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,666,425 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,771 writing to cptra_bootfsm_go
3,786,591 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,258,319 >>> mbox cmd response: failed
14,258,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,259,189 >>> mbox cmd response: failed
14,259,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,259,743 >>> mbox cmd response: failed
Initializing fuses
2,056,220 writing to cptra_bootfsm_go
5,823,025 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,865,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,419 UART:
192,810 UART: Running Caliptra ROM ...
193,903 UART:
603,529 UART: [state] CFI Enabled
618,934 UART: [state] LifecycleState = Unprovisioned
620,909 UART: [state] DebugLocked = No
623,877 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,542 UART: [kat] SHA2-256
799,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,826 UART: [kat] ++
810,275 UART: [kat] sha1
820,218 UART: [kat] SHA2-256
822,976 UART: [kat] SHA2-384
828,267 UART: [kat] SHA2-512-ACC
830,670 UART: [kat] ECC-384
3,115,299 UART: [kat] HMAC-384Kdf
3,127,157 UART: [kat] LMS
4,317,246 UART: [kat] --
4,321,075 UART: [cold-reset] ++
4,322,313 UART: [fht] Storing FHT @ 0x50003400
4,333,041 UART: [idev] ++
4,333,648 UART: [idev] CDI.KEYID = 6
4,334,567 UART: [idev] SUBJECT.KEYID = 7
4,335,784 UART: [idev] UDS.KEYID = 0
4,338,522 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,453 UART: [idev] Erasing UDS.KEYID = 0
7,624,008 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,837 UART: [idev] --
7,649,517 UART: [ldev] ++
7,650,087 UART: [ldev] CDI.KEYID = 6
7,651,054 UART: [ldev] SUBJECT.KEYID = 5
7,652,270 UART: [ldev] AUTHORITY.KEYID = 7
7,653,505 UART: [ldev] FE.KEYID = 1
7,663,473 UART: [ldev] Erasing FE.KEYID = 1
10,943,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,866 UART: [ldev] --
13,304,358 UART: [fwproc] Waiting for Commands...
13,307,271 UART: [fwproc] Received command 0x46574c44
13,309,513 UART: [fwproc] Received Image of size 113760 bytes
14,707,538 UART: ROM Fatal Error: 0x000B001A
14,710,979 >>> mbox cmd response: failed
14,711,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,711,733 >>> mbox cmd response: failed
14,712,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,712,300 >>> mbox cmd response: failed
Initializing fuses
2,059,069 writing to cptra_bootfsm_go
2,248,375 UART:
2,248,727 UART: Running Caliptra ROM ...
2,249,868 UART:
5,752,435 UART: [state] CFI Enabled
5,769,449 UART: [state] LifecycleState = Unprovisioned
5,771,405 UART: [state] DebugLocked = No
5,774,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,778,498 UART: [kat] SHA2-256
5,948,081 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,958,665 UART: [kat] ++
5,959,215 UART: [kat] sha1
5,970,294 UART: [kat] SHA2-256
5,972,987 UART: [kat] SHA2-384
5,978,327 UART: [kat] SHA2-512-ACC
5,980,675 UART: [kat] ECC-384
8,263,724 UART: [kat] HMAC-384Kdf
8,274,869 UART: [kat] LMS
9,464,952 UART: [kat] --
9,471,025 UART: [cold-reset] ++
9,473,232 UART: [fht] Storing FHT @ 0x50003400
9,484,819 UART: [idev] ++
9,485,391 UART: [idev] CDI.KEYID = 6
9,486,331 UART: [idev] SUBJECT.KEYID = 7
9,487,598 UART: [idev] UDS.KEYID = 0
9,490,281 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
9,633,289 UART: [idev] Erasing UDS.KEYID = 0
12,773,511 UART: [idev] Using Sha1 for KeyId Algorithm
12,796,429 UART: [idev] --
12,800,575 UART: [ldev] ++
12,801,143 UART: [ldev] CDI.KEYID = 6
12,802,082 UART: [ldev] SUBJECT.KEYID = 5
12,803,346 UART: [ldev] AUTHORITY.KEYID = 7
12,804,499 UART: [ldev] FE.KEYID = 1
12,814,198 UART: [ldev] Erasing FE.KEYID = 1
16,101,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,394,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,408,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,423,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,438,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,458,328 UART: [ldev] --
18,463,805 UART: [fwproc] Waiting for Commands...
18,465,422 UART: [fwproc] Received command 0x46574c44
18,467,662 UART: [fwproc] Received Image of size 113760 bytes
22,518,208 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,594,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,663,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,979,991 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,129,665 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,454,437 >>> mbox cmd response: failed
14,455,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,455,335 >>> mbox cmd response: failed
14,455,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,455,900 >>> mbox cmd response: failed
Initializing fuses
2,051,691 writing to cptra_bootfsm_go
9,539,703 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,476,648 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,438 UART:
192,803 UART: Running Caliptra ROM ...
193,990 UART:
194,144 UART: [state] CFI Enabled
261,775 UART: [state] LifecycleState = Unprovisioned
263,642 UART: [state] DebugLocked = No
265,389 UART: [state] WD Timer not started. Device not locked for debugging
268,500 UART: [kat] SHA2-256
447,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,027 UART: [kat] ++
459,564 UART: [kat] sha1
470,611 UART: [kat] SHA2-256
473,624 UART: [kat] SHA2-384
479,869 UART: [kat] SHA2-512-ACC
482,854 UART: [kat] ECC-384
2,947,622 UART: [kat] HMAC-384Kdf
2,969,539 UART: [kat] LMS
3,498,985 UART: [kat] --
3,503,021 UART: [cold-reset] ++
3,505,024 UART: [fht] FHT @ 0x50003400
3,517,307 UART: [idev] ++
3,517,876 UART: [idev] CDI.KEYID = 6
3,518,796 UART: [idev] SUBJECT.KEYID = 7
3,520,009 UART: [idev] UDS.KEYID = 0
3,522,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,581 UART: [idev] Erasing UDS.KEYID = 0
6,025,748 UART: [idev] Sha1 KeyId Algorithm
6,047,643 UART: [idev] --
6,051,352 UART: [ldev] ++
6,051,931 UART: [ldev] CDI.KEYID = 6
6,052,821 UART: [ldev] SUBJECT.KEYID = 5
6,053,927 UART: [ldev] AUTHORITY.KEYID = 7
6,055,275 UART: [ldev] FE.KEYID = 1
6,097,818 UART: [ldev] Erasing FE.KEYID = 1
8,599,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,135 UART: [ldev] --
10,409,451 UART: [fwproc] Wait for Commands...
10,411,335 UART: [fwproc] Recv command 0x46574c44
10,413,431 UART: [fwproc] Recv'd Img size: 114084 bytes
11,478,830 UART: ROM Fatal Error: 0x000B001A
11,481,905 >>> mbox cmd response: failed
11,482,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,482,584 >>> mbox cmd response: failed
11,482,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,483,173 >>> mbox cmd response: failed
Initializing fuses
2,052,031 writing to cptra_bootfsm_go
2,241,343 UART:
2,241,703 UART: Running Caliptra ROM ...
2,242,862 UART:
2,243,027 UART: [state] CFI Enabled
2,302,559 UART: [state] LifecycleState = Unprovisioned
2,304,407 UART: [state] DebugLocked = No
2,306,812 UART: [state] WD Timer not started. Device not locked for debugging
2,311,432 UART: [kat] SHA2-256
2,490,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,137 UART: [kat] ++
2,502,688 UART: [kat] sha1
2,513,805 UART: [kat] SHA2-256
2,516,833 UART: [kat] SHA2-384
2,523,901 UART: [kat] SHA2-512-ACC
2,526,847 UART: [kat] ECC-384
4,988,151 UART: [kat] HMAC-384Kdf
5,010,212 UART: [kat] LMS
5,539,669 UART: [kat] --
5,543,833 UART: [cold-reset] ++
5,544,846 UART: [fht] FHT @ 0x50003400
5,556,090 UART: [idev] ++
5,556,656 UART: [idev] CDI.KEYID = 6
5,557,566 UART: [idev] SUBJECT.KEYID = 7
5,558,783 UART: [idev] UDS.KEYID = 0
5,561,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,704,948 UART: [idev] Erasing UDS.KEYID = 0
8,065,825 UART: [idev] Sha1 KeyId Algorithm
8,089,497 UART: [idev] --
8,093,388 UART: [ldev] ++
8,093,960 UART: [ldev] CDI.KEYID = 6
8,094,878 UART: [ldev] SUBJECT.KEYID = 5
8,096,043 UART: [ldev] AUTHORITY.KEYID = 7
8,097,337 UART: [ldev] FE.KEYID = 1
8,139,364 UART: [ldev] Erasing FE.KEYID = 1
10,640,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,855 UART: [ldev] --
12,448,484 UART: [fwproc] Wait for Commands...
12,451,670 UART: [fwproc] Recv command 0x46574c44
12,453,773 UART: [fwproc] Recv'd Img size: 114084 bytes
15,847,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,307,271 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,359,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,271,535 >>> mbox cmd response: failed
11,272,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,272,446 >>> mbox cmd response: failed
11,272,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,273,008 >>> mbox cmd response: failed
Initializing fuses
2,048,980 writing to cptra_bootfsm_go
5,393,288 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,073,438 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,411 UART:
192,766 UART: Running Caliptra ROM ...
193,853 UART:
603,716 UART: [state] CFI Enabled
617,389 UART: [state] LifecycleState = Unprovisioned
619,212 UART: [state] DebugLocked = No
621,209 UART: [state] WD Timer not started. Device not locked for debugging
624,384 UART: [kat] SHA2-256
803,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,097 UART: [kat] ++
815,544 UART: [kat] sha1
826,579 UART: [kat] SHA2-256
829,642 UART: [kat] SHA2-384
835,906 UART: [kat] SHA2-512-ACC
838,901 UART: [kat] ECC-384
3,279,848 UART: [kat] HMAC-384Kdf
3,293,916 UART: [kat] LMS
3,823,413 UART: [kat] --
3,828,968 UART: [cold-reset] ++
3,830,894 UART: [fht] FHT @ 0x50003400
3,841,918 UART: [idev] ++
3,842,525 UART: [idev] CDI.KEYID = 6
3,843,412 UART: [idev] SUBJECT.KEYID = 7
3,844,635 UART: [idev] UDS.KEYID = 0
3,847,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,120 UART: [idev] Erasing UDS.KEYID = 0
6,316,639 UART: [idev] Sha1 KeyId Algorithm
6,339,296 UART: [idev] --
6,342,755 UART: [ldev] ++
6,343,348 UART: [ldev] CDI.KEYID = 6
6,344,266 UART: [ldev] SUBJECT.KEYID = 5
6,345,427 UART: [ldev] AUTHORITY.KEYID = 7
6,346,659 UART: [ldev] FE.KEYID = 1
6,355,738 UART: [ldev] Erasing FE.KEYID = 1
8,829,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,100 UART: [ldev] --
10,619,973 UART: [fwproc] Wait for Commands...
10,622,938 UART: [fwproc] Recv command 0x46574c44
10,624,982 UART: [fwproc] Recv'd Img size: 114084 bytes
11,699,275 UART: ROM Fatal Error: 0x000B001A
11,702,427 >>> mbox cmd response: failed
11,702,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,703,221 >>> mbox cmd response: failed
11,703,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,703,785 >>> mbox cmd response: failed
Initializing fuses
2,059,835 writing to cptra_bootfsm_go
2,249,149 UART:
2,249,495 UART: Running Caliptra ROM ...
2,250,630 UART:
8,752,673 UART: [state] CFI Enabled
8,765,685 UART: [state] LifecycleState = Unprovisioned
8,767,552 UART: [state] DebugLocked = No
8,769,051 UART: [state] WD Timer not started. Device not locked for debugging
8,773,369 UART: [kat] SHA2-256
8,952,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,964,068 UART: [kat] ++
8,964,619 UART: [kat] sha1
8,976,922 UART: [kat] SHA2-256
8,979,945 UART: [kat] SHA2-384
8,986,958 UART: [kat] SHA2-512-ACC
8,989,897 UART: [kat] ECC-384
11,432,135 UART: [kat] HMAC-384Kdf
11,444,200 UART: [kat] LMS
11,973,676 UART: [kat] --
11,978,423 UART: [cold-reset] ++
11,980,135 UART: [fht] FHT @ 0x50003400
11,991,488 UART: [idev] ++
11,992,044 UART: [idev] CDI.KEYID = 6
11,992,981 UART: [idev] SUBJECT.KEYID = 7
11,994,208 UART: [idev] UDS.KEYID = 0
11,997,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,140,425 UART: [idev] Erasing UDS.KEYID = 0
14,472,118 UART: [idev] Sha1 KeyId Algorithm
14,495,499 UART: [idev] --
14,501,116 UART: [ldev] ++
14,501,685 UART: [ldev] CDI.KEYID = 6
14,502,567 UART: [ldev] SUBJECT.KEYID = 5
14,503,777 UART: [ldev] AUTHORITY.KEYID = 7
14,505,009 UART: [ldev] FE.KEYID = 1
14,515,669 UART: [ldev] Erasing FE.KEYID = 1
16,988,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,709,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,725,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,741,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,757,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,777,435 UART: [ldev] --
18,781,734 UART: [fwproc] Wait for Commands...
18,783,942 UART: [fwproc] Recv command 0x46574c44
18,786,037 UART: [fwproc] Recv'd Img size: 114084 bytes
22,184,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,254,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,323,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,641,137 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,697,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,470,907 >>> mbox cmd response: failed
11,471,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,471,868 >>> mbox cmd response: failed
11,472,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,436 >>> mbox cmd response: failed
Initializing fuses
2,049,172 writing to cptra_bootfsm_go
12,090,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,644,641 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,032 UART:
192,388 UART: Running Caliptra ROM ...
193,529 UART:
193,673 UART: [state] CFI Enabled
262,651 UART: [state] LifecycleState = Unprovisioned
264,985 UART: [state] DebugLocked = No
266,308 UART: [state] WD Timer not started. Device not locked for debugging
270,087 UART: [kat] SHA2-256
459,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,741 UART: [kat] ++
471,228 UART: [kat] sha1
481,486 UART: [kat] SHA2-256
484,552 UART: [kat] SHA2-384
490,263 UART: [kat] SHA2-512-ACC
492,823 UART: [kat] ECC-384
2,943,996 UART: [kat] HMAC-384Kdf
2,961,156 UART: [kat] LMS
3,492,934 UART: [kat] --
3,498,181 UART: [cold-reset] ++
3,499,965 UART: [fht] FHT @ 0x50003400
3,511,111 UART: [idev] ++
3,511,857 UART: [idev] CDI.KEYID = 6
3,512,748 UART: [idev] SUBJECT.KEYID = 7
3,513,968 UART: [idev] UDS.KEYID = 0
3,516,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,660,598 UART: [idev] Erasing UDS.KEYID = 0
6,022,328 UART: [idev] Sha1 KeyId Algorithm
6,045,406 UART: [idev] --
6,050,303 UART: [ldev] ++
6,050,993 UART: [ldev] CDI.KEYID = 6
6,051,907 UART: [ldev] SUBJECT.KEYID = 5
6,053,068 UART: [ldev] AUTHORITY.KEYID = 7
6,054,306 UART: [ldev] FE.KEYID = 1
6,090,396 UART: [ldev] Erasing FE.KEYID = 1
8,595,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,747 UART: [ldev] --
10,404,063 UART: [fwproc] Wait for Commands...
10,406,764 UART: [fwproc] Recv command 0x46574c44
10,409,030 UART: [fwproc] Recv'd Img size: 114084 bytes
11,511,577 UART: ROM Fatal Error: 0x000B001A
11,515,239 >>> mbox cmd response: failed
11,515,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,515,941 >>> mbox cmd response: failed
11,516,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,516,513 >>> mbox cmd response: failed
Initializing fuses
2,052,494 writing to cptra_bootfsm_go
2,241,859 UART:
2,242,196 UART: Running Caliptra ROM ...
2,243,327 UART:
2,243,495 UART: [state] CFI Enabled
2,305,355 UART: [state] LifecycleState = Unprovisioned
2,307,732 UART: [state] DebugLocked = No
2,309,768 UART: [state] WD Timer not started. Device not locked for debugging
2,315,157 UART: [kat] SHA2-256
2,505,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,816 UART: [kat] ++
2,516,277 UART: [kat] sha1
2,527,762 UART: [kat] SHA2-256
2,530,776 UART: [kat] SHA2-384
2,537,195 UART: [kat] SHA2-512-ACC
2,539,778 UART: [kat] ECC-384
4,988,826 UART: [kat] HMAC-384Kdf
5,012,156 UART: [kat] LMS
5,543,912 UART: [kat] --
5,548,390 UART: [cold-reset] ++
5,550,434 UART: [fht] FHT @ 0x50003400
5,562,647 UART: [idev] ++
5,563,341 UART: [idev] CDI.KEYID = 6
5,564,312 UART: [idev] SUBJECT.KEYID = 7
5,565,527 UART: [idev] UDS.KEYID = 0
5,568,286 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,711,923 UART: [idev] Erasing UDS.KEYID = 0
8,065,507 UART: [idev] Sha1 KeyId Algorithm
8,087,787 UART: [idev] --
8,092,594 UART: [ldev] ++
8,093,275 UART: [ldev] CDI.KEYID = 6
8,094,189 UART: [ldev] SUBJECT.KEYID = 5
8,095,335 UART: [ldev] AUTHORITY.KEYID = 7
8,096,579 UART: [ldev] FE.KEYID = 1
8,141,758 UART: [ldev] Erasing FE.KEYID = 1
10,646,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,810 UART: [ldev] --
12,452,867 UART: [fwproc] Wait for Commands...
12,455,830 UART: [fwproc] Recv command 0x46574c44
12,458,098 UART: [fwproc] Recv'd Img size: 114084 bytes
15,896,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,971,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,087,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,628,092 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,442,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,315,017 >>> mbox cmd response: failed
11,315,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,316,167 >>> mbox cmd response: failed
11,316,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,316,750 >>> mbox cmd response: failed
Initializing fuses
2,049,366 writing to cptra_bootfsm_go
5,477,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,734,907 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,587 UART:
192,930 UART: Running Caliptra ROM ...
194,123 UART:
603,938 UART: [state] CFI Enabled
616,509 UART: [state] LifecycleState = Unprovisioned
618,856 UART: [state] DebugLocked = No
621,209 UART: [state] WD Timer not started. Device not locked for debugging
626,396 UART: [kat] SHA2-256
816,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,073 UART: [kat] ++
827,664 UART: [kat] sha1
837,793 UART: [kat] SHA2-256
840,799 UART: [kat] SHA2-384
847,751 UART: [kat] SHA2-512-ACC
850,341 UART: [kat] ECC-384
3,292,008 UART: [kat] HMAC-384Kdf
3,303,504 UART: [kat] LMS
3,835,372 UART: [kat] --
3,838,659 UART: [cold-reset] ++
3,839,943 UART: [fht] FHT @ 0x50003400
3,850,761 UART: [idev] ++
3,851,440 UART: [idev] CDI.KEYID = 6
3,852,466 UART: [idev] SUBJECT.KEYID = 7
3,853,623 UART: [idev] UDS.KEYID = 0
3,856,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,763 UART: [idev] Erasing UDS.KEYID = 0
6,334,945 UART: [idev] Sha1 KeyId Algorithm
6,357,253 UART: [idev] --
6,363,518 UART: [ldev] ++
6,364,204 UART: [ldev] CDI.KEYID = 6
6,365,272 UART: [ldev] SUBJECT.KEYID = 5
6,366,407 UART: [ldev] AUTHORITY.KEYID = 7
6,367,734 UART: [ldev] FE.KEYID = 1
6,379,215 UART: [ldev] Erasing FE.KEYID = 1
8,857,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,120 UART: [ldev] --
10,649,142 UART: [fwproc] Wait for Commands...
10,652,266 UART: [fwproc] Recv command 0x46574c44
10,654,527 UART: [fwproc] Recv'd Img size: 114084 bytes
11,757,635 UART: ROM Fatal Error: 0x000B001A
11,761,310 >>> mbox cmd response: failed
11,761,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,762,096 >>> mbox cmd response: failed
11,762,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,762,683 >>> mbox cmd response: failed
Initializing fuses
2,054,089 writing to cptra_bootfsm_go
2,243,372 UART:
2,243,711 UART: Running Caliptra ROM ...
2,244,852 UART:
8,689,335 UART: [state] CFI Enabled
8,706,878 UART: [state] LifecycleState = Unprovisioned
8,709,234 UART: [state] DebugLocked = No
8,711,111 UART: [state] WD Timer not started. Device not locked for debugging
8,715,777 UART: [kat] SHA2-256
8,905,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,916,476 UART: [kat] ++
8,917,079 UART: [kat] sha1
8,928,574 UART: [kat] SHA2-256
8,931,586 UART: [kat] SHA2-384
8,938,287 UART: [kat] SHA2-512-ACC
8,940,860 UART: [kat] ECC-384
11,383,565 UART: [kat] HMAC-384Kdf
11,396,933 UART: [kat] LMS
11,928,749 UART: [kat] --
11,935,381 UART: [cold-reset] ++
11,937,584 UART: [fht] FHT @ 0x50003400
11,949,584 UART: [idev] ++
11,950,262 UART: [idev] CDI.KEYID = 6
11,951,227 UART: [idev] SUBJECT.KEYID = 7
11,952,442 UART: [idev] UDS.KEYID = 0
11,955,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,098,798 UART: [idev] Erasing UDS.KEYID = 0
14,430,959 UART: [idev] Sha1 KeyId Algorithm
14,452,596 UART: [idev] --
14,458,400 UART: [ldev] ++
14,459,088 UART: [ldev] CDI.KEYID = 6
14,459,976 UART: [ldev] SUBJECT.KEYID = 5
14,461,076 UART: [ldev] AUTHORITY.KEYID = 7
14,462,367 UART: [ldev] FE.KEYID = 1
14,472,125 UART: [ldev] Erasing FE.KEYID = 1
16,951,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,670,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,685,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,700,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,715,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,736,798 UART: [ldev] --
18,741,413 UART: [fwproc] Wait for Commands...
18,744,231 UART: [fwproc] Recv command 0x46574c44
18,746,553 UART: [fwproc] Recv'd Img size: 114084 bytes
22,185,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,260,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,377,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,918,650 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,764,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,541,529 >>> mbox cmd response: failed
11,542,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,446 >>> mbox cmd response: failed
11,542,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,543,008 >>> mbox cmd response: failed
Initializing fuses
2,049,049 writing to cptra_bootfsm_go
12,078,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,275,507 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,544 UART: [kat] HMAC-384Kdf
907,110 UART: [kat] LMS
1,475,306 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,462 UART: [idev] ++
1,479,630 UART: [idev] CDI.KEYID = 6
1,479,990 UART: [idev] SUBJECT.KEYID = 7
1,480,414 UART: [idev] UDS.KEYID = 0
1,480,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,524 UART: [idev] Erasing UDS.KEYID = 0
1,504,992 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,749 UART: [ldev] ++
1,514,917 UART: [ldev] CDI.KEYID = 6
1,515,280 UART: [ldev] SUBJECT.KEYID = 5
1,515,706 UART: [ldev] AUTHORITY.KEYID = 7
1,516,169 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,546,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,506 UART: [ldev] --
1,585,951 UART: [fwproc] Waiting for Commands...
1,586,620 UART: [fwproc] Received command 0x46574c44
1,587,411 UART: [fwproc] Received Image of size 114084 bytes
1,626,349 UART: ROM Fatal Error: 0x000B001A
1,627,508 >>> mbox cmd response: failed
1,627,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,514 >>> mbox cmd response: failed
1,627,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
903,020 UART: [kat] HMAC-384Kdf
907,696 UART: [kat] LMS
1,475,892 UART: [kat] --
1,476,801 UART: [cold-reset] ++
1,477,377 UART: [fht] Storing FHT @ 0x50003400
1,480,058 UART: [idev] ++
1,480,226 UART: [idev] CDI.KEYID = 6
1,480,586 UART: [idev] SUBJECT.KEYID = 7
1,481,010 UART: [idev] UDS.KEYID = 0
1,481,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,022 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,172 UART: [idev] --
1,515,235 UART: [ldev] ++
1,515,403 UART: [ldev] CDI.KEYID = 6
1,515,766 UART: [ldev] SUBJECT.KEYID = 5
1,516,192 UART: [ldev] AUTHORITY.KEYID = 7
1,516,655 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,400 UART: [ldev] --
1,585,703 UART: [fwproc] Waiting for Commands...
1,586,440 UART: [fwproc] Received command 0x46574c44
1,587,231 UART: [fwproc] Received Image of size 114084 bytes
2,882,284 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,329 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,479,951 >>> mbox cmd response: failed
1,479,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,957 >>> mbox cmd response: failed
1,479,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,201 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,931 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,776 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,674 UART: [kat] SHA2-256
892,612 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
903,183 UART: [kat] HMAC-384Kdf
907,965 UART: [kat] LMS
1,476,161 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,338 UART: [fht] Storing FHT @ 0x50003400
1,480,273 UART: [idev] ++
1,480,441 UART: [idev] CDI.KEYID = 6
1,480,801 UART: [idev] SUBJECT.KEYID = 7
1,481,225 UART: [idev] UDS.KEYID = 0
1,481,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,213 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,149 UART: [idev] --
1,515,170 UART: [ldev] ++
1,515,338 UART: [ldev] CDI.KEYID = 6
1,515,701 UART: [ldev] SUBJECT.KEYID = 5
1,516,127 UART: [ldev] AUTHORITY.KEYID = 7
1,516,590 UART: [ldev] FE.KEYID = 1
1,521,882 UART: [ldev] Erasing FE.KEYID = 1
1,547,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,339 UART: [ldev] --
1,586,748 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 114084 bytes
1,627,134 UART: ROM Fatal Error: 0x000B001A
1,628,293 >>> mbox cmd response: failed
1,628,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,299 >>> mbox cmd response: failed
1,628,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,305 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,645 UART: [kat] HMAC-384Kdf
907,307 UART: [kat] LMS
1,475,503 UART: [kat] --
1,476,290 UART: [cold-reset] ++
1,476,768 UART: [fht] Storing FHT @ 0x50003400
1,479,485 UART: [idev] ++
1,479,653 UART: [idev] CDI.KEYID = 6
1,480,013 UART: [idev] SUBJECT.KEYID = 7
1,480,437 UART: [idev] UDS.KEYID = 0
1,480,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,505,283 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,709 UART: [idev] --
1,514,794 UART: [ldev] ++
1,514,962 UART: [ldev] CDI.KEYID = 6
1,515,325 UART: [ldev] SUBJECT.KEYID = 5
1,515,751 UART: [ldev] AUTHORITY.KEYID = 7
1,516,214 UART: [ldev] FE.KEYID = 1
1,521,402 UART: [ldev] Erasing FE.KEYID = 1
1,546,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,039 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 114084 bytes
2,882,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,724 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,480,630 >>> mbox cmd response: failed
1,480,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,636 >>> mbox cmd response: failed
1,480,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,417 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,320 UART: [kat] SHA2-512-ACC
908,221 UART: [kat] ECC-384
917,974 UART: [kat] HMAC-384Kdf
922,440 UART: [kat] LMS
1,170,768 UART: [kat] --
1,171,921 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,174,952 UART: [idev] ++
1,175,120 UART: [idev] CDI.KEYID = 6
1,175,480 UART: [idev] SUBJECT.KEYID = 7
1,175,904 UART: [idev] UDS.KEYID = 0
1,176,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,840 UART: [idev] Erasing UDS.KEYID = 0
1,201,061 UART: [idev] Sha1 KeyId Algorithm
1,209,713 UART: [idev] --
1,210,845 UART: [ldev] ++
1,211,013 UART: [ldev] CDI.KEYID = 6
1,211,376 UART: [ldev] SUBJECT.KEYID = 5
1,211,802 UART: [ldev] AUTHORITY.KEYID = 7
1,212,265 UART: [ldev] FE.KEYID = 1
1,217,505 UART: [ldev] Erasing FE.KEYID = 1
1,244,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,801 UART: [ldev] --
1,283,202 UART: [fwproc] Wait for Commands...
1,284,000 UART: [fwproc] Recv command 0x46574c44
1,284,728 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,268 UART: ROM Fatal Error: 0x000B001A
1,325,427 >>> mbox cmd response: failed
1,325,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,433 >>> mbox cmd response: failed
1,325,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,194 UART: [kat] SHA2-256
892,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,969 UART: [kat] ++
897,121 UART: [kat] sha1
901,207 UART: [kat] SHA2-256
903,147 UART: [kat] SHA2-384
905,988 UART: [kat] SHA2-512-ACC
907,889 UART: [kat] ECC-384
917,298 UART: [kat] HMAC-384Kdf
921,882 UART: [kat] LMS
1,170,210 UART: [kat] --
1,171,405 UART: [cold-reset] ++
1,171,909 UART: [fht] FHT @ 0x50003400
1,174,674 UART: [idev] ++
1,174,842 UART: [idev] CDI.KEYID = 6
1,175,202 UART: [idev] SUBJECT.KEYID = 7
1,175,626 UART: [idev] UDS.KEYID = 0
1,175,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,200,151 UART: [idev] Sha1 KeyId Algorithm
1,208,557 UART: [idev] --
1,209,409 UART: [ldev] ++
1,209,577 UART: [ldev] CDI.KEYID = 6
1,209,940 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,791 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,734 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,176 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,287 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,177,772 >>> mbox cmd response: failed
1,177,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,778 >>> mbox cmd response: failed
1,177,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,471 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
893,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,922 UART: [kat] ++
898,074 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,303 UART: [kat] LMS
1,171,631 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,138 UART: [fht] FHT @ 0x50003400
1,175,651 UART: [idev] ++
1,175,819 UART: [idev] CDI.KEYID = 6
1,176,179 UART: [idev] SUBJECT.KEYID = 7
1,176,603 UART: [idev] UDS.KEYID = 0
1,176,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,691 UART: [idev] Erasing UDS.KEYID = 0
1,201,646 UART: [idev] Sha1 KeyId Algorithm
1,210,342 UART: [idev] --
1,211,362 UART: [ldev] ++
1,211,530 UART: [ldev] CDI.KEYID = 6
1,211,893 UART: [ldev] SUBJECT.KEYID = 5
1,212,319 UART: [ldev] AUTHORITY.KEYID = 7
1,212,782 UART: [ldev] FE.KEYID = 1
1,218,032 UART: [ldev] Erasing FE.KEYID = 1
1,244,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,088 UART: [ldev] --
1,283,541 UART: [fwproc] Wait for Commands...
1,284,159 UART: [fwproc] Recv command 0x46574c44
1,284,887 UART: [fwproc] Recv'd Img size: 114084 bytes
1,324,265 UART: ROM Fatal Error: 0x000B001A
1,325,424 >>> mbox cmd response: failed
1,325,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,430 >>> mbox cmd response: failed
1,325,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
917,897 UART: [kat] HMAC-384Kdf
922,521 UART: [kat] LMS
1,170,849 UART: [kat] --
1,171,860 UART: [cold-reset] ++
1,172,416 UART: [fht] FHT @ 0x50003400
1,175,031 UART: [idev] ++
1,175,199 UART: [idev] CDI.KEYID = 6
1,175,559 UART: [idev] SUBJECT.KEYID = 7
1,175,983 UART: [idev] UDS.KEYID = 0
1,176,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,292 UART: [idev] --
1,210,450 UART: [ldev] ++
1,210,618 UART: [ldev] CDI.KEYID = 6
1,210,981 UART: [ldev] SUBJECT.KEYID = 5
1,211,407 UART: [ldev] AUTHORITY.KEYID = 7
1,211,870 UART: [ldev] FE.KEYID = 1
1,217,148 UART: [ldev] Erasing FE.KEYID = 1
1,244,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,026 UART: [ldev] --
1,283,483 UART: [fwproc] Wait for Commands...
1,284,157 UART: [fwproc] Recv command 0x46574c44
1,284,885 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,332 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,853 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,144 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,391 >>> mbox cmd response: failed
1,180,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,397 >>> mbox cmd response: failed
1,180,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,646 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,465 UART: [kat] SHA2-256
901,405 UART: [kat] SHA2-384
904,014 UART: [kat] SHA2-512-ACC
905,915 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,628 UART: [ldev] Erasing FE.KEYID = 1
1,242,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,114 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,081 UART: [fwproc] Recv command 0x46574c44
1,282,814 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,707 UART: ROM Fatal Error: 0x000B001A
1,322,866 >>> mbox cmd response: failed
1,322,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,872 >>> mbox cmd response: failed
1,322,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,166 UART: [kat] SHA2-512-ACC
906,067 UART: [kat] ECC-384
915,560 UART: [kat] HMAC-384Kdf
920,078 UART: [kat] LMS
1,168,390 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,329 UART: [idev] ++
1,172,497 UART: [idev] CDI.KEYID = 6
1,172,858 UART: [idev] SUBJECT.KEYID = 7
1,173,283 UART: [idev] UDS.KEYID = 0
1,173,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,135 UART: [idev] Sha1 KeyId Algorithm
1,206,949 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,250 UART: [ldev] --
1,280,630 UART: [fwproc] Wait for Commands...
1,281,397 UART: [fwproc] Recv command 0x46574c44
1,282,130 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,568 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,174,305 >>> mbox cmd response: failed
1,174,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,311 >>> mbox cmd response: failed
1,174,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,156 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,684 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,559 UART: [kat] SHA2-256
891,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,540 UART: [kat] SHA2-256
901,480 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,504 UART: [cold-reset] ++
1,171,006 UART: [fht] FHT @ 0x50003400
1,173,696 UART: [idev] ++
1,173,864 UART: [idev] CDI.KEYID = 6
1,174,225 UART: [idev] SUBJECT.KEYID = 7
1,174,650 UART: [idev] UDS.KEYID = 0
1,174,996 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,359 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114084 bytes
1,322,538 UART: ROM Fatal Error: 0x000B001A
1,323,697 >>> mbox cmd response: failed
1,323,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,703 >>> mbox cmd response: failed
1,323,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,772 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,174,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,922 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,295 UART: [ldev] Erasing FE.KEYID = 1
1,241,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,209 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,212 UART: [fwproc] Recv command 0x46574c44
1,281,945 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,321 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,841 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,922 >>> mbox cmd response: failed
1,175,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,928 >>> mbox cmd response: failed
1,175,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,765 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,393 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
4,872,034 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,310,969 >>> mbox cmd response: failed
15,311,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,311,969 >>> mbox cmd response: failed
15,312,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,312,538 >>> mbox cmd response: failed
Initializing fuses
2,060,205 writing to cptra_bootfsm_go
6,924,833 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,484,508 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
4,881,804 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,316,572 >>> mbox cmd response: failed
15,317,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,317,506 >>> mbox cmd response: failed
15,317,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,318,065 >>> mbox cmd response: failed
Initializing fuses
2,062,356 writing to cptra_bootfsm_go
6,921,744 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,475,747 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
5,190,039 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,510,208 >>> mbox cmd response: failed
15,511,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,511,547 >>> mbox cmd response: failed
15,511,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,512,122 >>> mbox cmd response: failed
Initializing fuses
2,058,220 writing to cptra_bootfsm_go
9,544,160 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,976,139 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
5,186,907 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,503,349 >>> mbox cmd response: failed
15,503,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,504,285 >>> mbox cmd response: failed
15,504,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,504,848 >>> mbox cmd response: failed
Initializing fuses
2,056,794 writing to cptra_bootfsm_go
9,547,380 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,981,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,459,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,433,922 >>> mbox cmd response: failed
11,434,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,434,902 >>> mbox cmd response: failed
11,435,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,435,466 >>> mbox cmd response: failed
Initializing fuses
2,053,492 writing to cptra_bootfsm_go
5,507,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,306,792 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,463,155 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,446,074 >>> mbox cmd response: failed
11,446,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,447,162 >>> mbox cmd response: failed
11,447,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,447,720 >>> mbox cmd response: failed
Initializing fuses
2,054,900 writing to cptra_bootfsm_go
5,516,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,346,682 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,776,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,656,976 >>> mbox cmd response: failed
11,657,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,657,829 >>> mbox cmd response: failed
11,658,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,658,395 >>> mbox cmd response: failed
Initializing fuses
2,054,885 writing to cptra_bootfsm_go
11,976,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,708,825 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
3,790,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,665,626 >>> mbox cmd response: failed
11,666,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,666,702 >>> mbox cmd response: failed
11,666,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,667,268 >>> mbox cmd response: failed
Initializing fuses
2,053,971 writing to cptra_bootfsm_go
11,971,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,677,888 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,464,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,444,295 >>> mbox cmd response: failed
11,445,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,445,455 >>> mbox cmd response: failed
11,445,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,446,017 >>> mbox cmd response: failed
Initializing fuses
2,061,470 writing to cptra_bootfsm_go
5,500,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,297,044 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,162 writing to cptra_bootfsm_go
3,467,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,447,448 >>> mbox cmd response: failed
11,448,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,448,374 >>> mbox cmd response: failed
11,448,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,448,970 >>> mbox cmd response: failed
Initializing fuses
2,060,709 writing to cptra_bootfsm_go
5,492,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,348,009 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,791,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,661,340 >>> mbox cmd response: failed
11,661,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,662,217 >>> mbox cmd response: failed
11,662,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,662,771 >>> mbox cmd response: failed
Initializing fuses
2,058,143 writing to cptra_bootfsm_go
11,978,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,714,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,789,469 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,667,717 >>> mbox cmd response: failed
11,668,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,668,686 >>> mbox cmd response: failed
11,668,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,669,246 >>> mbox cmd response: failed
Initializing fuses
2,066,640 writing to cptra_bootfsm_go
11,989,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,704,068 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,061 >>> mbox cmd response: failed
1,199,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,067 >>> mbox cmd response: failed
1,199,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,073 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,947 UART: [kat] SHA2-256
881,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,993 UART: [kat] ++
886,145 UART: [kat] sha1
890,215 UART: [kat] SHA2-256
892,153 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,475,923 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,962 UART: [idev] ++
1,479,130 UART: [idev] CDI.KEYID = 6
1,479,490 UART: [idev] SUBJECT.KEYID = 7
1,479,914 UART: [idev] UDS.KEYID = 0
1,480,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,984 UART: [idev] Erasing UDS.KEYID = 0
1,504,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,388 UART: [idev] --
1,514,455 UART: [ldev] ++
1,514,623 UART: [ldev] CDI.KEYID = 6
1,514,986 UART: [ldev] SUBJECT.KEYID = 5
1,515,412 UART: [ldev] AUTHORITY.KEYID = 7
1,515,875 UART: [ldev] FE.KEYID = 1
1,521,019 UART: [ldev] Erasing FE.KEYID = 1
1,547,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,242 UART: [ldev] --
1,586,589 UART: [fwproc] Waiting for Commands...
1,587,236 UART: [fwproc] Received command 0x46574c44
1,588,027 UART: [fwproc] Received Image of size 114084 bytes
2,882,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,721 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,198,719 >>> mbox cmd response: failed
1,198,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,725 >>> mbox cmd response: failed
1,198,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,467 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,200,052 >>> mbox cmd response: failed
1,200,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,058 >>> mbox cmd response: failed
1,200,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,752 UART: [kat] SHA2-256
892,690 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,457 UART: [kat] LMS
1,475,653 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,476,960 UART: [fht] Storing FHT @ 0x50003400
1,479,705 UART: [idev] ++
1,479,873 UART: [idev] CDI.KEYID = 6
1,480,233 UART: [idev] SUBJECT.KEYID = 7
1,480,657 UART: [idev] UDS.KEYID = 0
1,481,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,122 UART: [ldev] ++
1,515,290 UART: [ldev] CDI.KEYID = 6
1,515,653 UART: [ldev] SUBJECT.KEYID = 5
1,516,079 UART: [ldev] AUTHORITY.KEYID = 7
1,516,542 UART: [ldev] FE.KEYID = 1
1,521,978 UART: [ldev] Erasing FE.KEYID = 1
1,546,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,575 UART: [ldev] --
1,585,952 UART: [fwproc] Waiting for Commands...
1,586,611 UART: [fwproc] Received command 0x46574c44
1,587,402 UART: [fwproc] Received Image of size 114084 bytes
2,881,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,815 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,167 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,580 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,201,318 >>> mbox cmd response: failed
1,201,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,324 >>> mbox cmd response: failed
1,201,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,187 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,481 >>> mbox cmd response: failed
1,199,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,487 >>> mbox cmd response: failed
1,199,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,175 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
892,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,057 UART: [kat] ++
897,209 UART: [kat] sha1
901,321 UART: [kat] SHA2-256
903,261 UART: [kat] SHA2-384
905,992 UART: [kat] SHA2-512-ACC
907,893 UART: [kat] ECC-384
917,586 UART: [kat] HMAC-384Kdf
922,026 UART: [kat] LMS
1,170,354 UART: [kat] --
1,171,119 UART: [cold-reset] ++
1,171,527 UART: [fht] FHT @ 0x50003400
1,174,076 UART: [idev] ++
1,174,244 UART: [idev] CDI.KEYID = 6
1,174,604 UART: [idev] SUBJECT.KEYID = 7
1,175,028 UART: [idev] UDS.KEYID = 0
1,175,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,911 UART: [idev] Sha1 KeyId Algorithm
1,208,437 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,732 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,198,505 >>> mbox cmd response: failed
1,198,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,511 >>> mbox cmd response: failed
1,198,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,993 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,874 >>> mbox cmd response: failed
1,199,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,880 >>> mbox cmd response: failed
1,199,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
893,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,250 UART: [kat] ++
897,402 UART: [kat] sha1
901,498 UART: [kat] SHA2-256
903,438 UART: [kat] SHA2-384
906,201 UART: [kat] SHA2-512-ACC
908,102 UART: [kat] ECC-384
918,005 UART: [kat] HMAC-384Kdf
922,747 UART: [kat] LMS
1,171,075 UART: [kat] --
1,171,652 UART: [cold-reset] ++
1,172,022 UART: [fht] FHT @ 0x50003400
1,174,593 UART: [idev] ++
1,174,761 UART: [idev] CDI.KEYID = 6
1,175,121 UART: [idev] SUBJECT.KEYID = 7
1,175,545 UART: [idev] UDS.KEYID = 0
1,175,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,032 UART: [idev] Sha1 KeyId Algorithm
1,209,584 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,020 UART: [ldev] Erasing FE.KEYID = 1
1,243,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,230 UART: [ldev] --
1,282,515 UART: [fwproc] Wait for Commands...
1,283,247 UART: [fwproc] Recv command 0x46574c44
1,283,975 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,575 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,882 >>> mbox cmd response: failed
1,199,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,888 >>> mbox cmd response: failed
1,199,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,132 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,047 >>> mbox cmd response: failed
1,199,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,053 >>> mbox cmd response: failed
1,199,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,466 UART: [kat] HMAC-384Kdf
919,946 UART: [kat] LMS
1,168,258 UART: [kat] --
1,169,111 UART: [cold-reset] ++
1,169,667 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,173,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,075 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,240,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,658 UART: [fwproc] Wait for Commands...
1,281,481 UART: [fwproc] Recv command 0x46574c44
1,282,214 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,417 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,579 >>> mbox cmd response: failed
1,197,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,585 >>> mbox cmd response: failed
1,197,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,668 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,162 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,198,406 >>> mbox cmd response: failed
1,198,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,412 >>> mbox cmd response: failed
1,198,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,140 UART: [idev] ++
1,173,308 UART: [idev] CDI.KEYID = 6
1,173,669 UART: [idev] SUBJECT.KEYID = 7
1,174,094 UART: [idev] UDS.KEYID = 0
1,174,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,320 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,901 UART: [ldev] --
1,282,279 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,675 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,534 >>> mbox cmd response: failed
1,199,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,540 >>> mbox cmd response: failed
1,199,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,887 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,063 UART:
192,425 UART: Running Caliptra ROM ...
193,512 UART:
193,652 UART: [state] CFI Enabled
267,144 UART: [state] LifecycleState = Unprovisioned
269,110 UART: [state] DebugLocked = No
271,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,022 UART: [kat] SHA2-256
446,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,221 UART: [kat] ++
457,676 UART: [kat] sha1
469,796 UART: [kat] SHA2-256
472,481 UART: [kat] SHA2-384
479,484 UART: [kat] SHA2-512-ACC
481,879 UART: [kat] ECC-384
2,768,961 UART: [kat] HMAC-384Kdf
2,799,335 UART: [kat] LMS
3,989,602 UART: [kat] --
3,992,414 UART: [cold-reset] ++
3,993,805 UART: [fht] Storing FHT @ 0x50003400
4,005,673 UART: [idev] ++
4,006,252 UART: [idev] CDI.KEYID = 6
4,007,170 UART: [idev] SUBJECT.KEYID = 7
4,008,408 UART: [idev] UDS.KEYID = 0
4,011,045 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,302 UART: [idev] Erasing UDS.KEYID = 0
7,345,404 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,032 UART: [idev] --
7,371,600 UART: [ldev] ++
7,372,227 UART: [ldev] CDI.KEYID = 6
7,373,138 UART: [ldev] SUBJECT.KEYID = 5
7,374,355 UART: [ldev] AUTHORITY.KEYID = 7
7,375,642 UART: [ldev] FE.KEYID = 1
7,422,203 UART: [ldev] Erasing FE.KEYID = 1
10,754,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,923 UART: [ldev] --
13,135,974 UART: [fwproc] Waiting for Commands...
13,137,639 UART: [fwproc] Received command 0x46574c44
13,139,829 UART: [fwproc] Received Image of size 113760 bytes
20,178,838 UART: ROM Fatal Error: 0x000B0038
20,182,280 >>> mbox cmd response: failed
20,182,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,183,060 >>> mbox cmd response: failed
20,183,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,183,621 >>> mbox cmd response: failed
Initializing fuses
2,062,044 writing to cptra_bootfsm_go
2,251,339 UART:
2,251,699 UART: Running Caliptra ROM ...
2,252,842 UART:
2,253,031 UART: [state] CFI Enabled
2,327,754 UART: [state] LifecycleState = Unprovisioned
2,329,695 UART: [state] DebugLocked = No
2,332,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,337,264 UART: [kat] SHA2-256
2,506,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,517,473 UART: [kat] ++
2,517,936 UART: [kat] sha1
2,529,035 UART: [kat] SHA2-256
2,531,736 UART: [kat] SHA2-384
2,537,940 UART: [kat] SHA2-512-ACC
2,540,349 UART: [kat] ECC-384
4,829,225 UART: [kat] HMAC-384Kdf
4,841,458 UART: [kat] LMS
6,031,739 UART: [kat] --
6,035,763 UART: [cold-reset] ++
6,037,545 UART: [fht] Storing FHT @ 0x50003400
6,048,172 UART: [idev] ++
6,048,751 UART: [idev] CDI.KEYID = 6
6,049,723 UART: [idev] SUBJECT.KEYID = 7
6,050,938 UART: [idev] UDS.KEYID = 0
6,053,530 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,196,752 UART: [idev] Erasing UDS.KEYID = 0
9,385,565 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,855 UART: [idev] --
9,412,344 UART: [ldev] ++
9,412,916 UART: [ldev] CDI.KEYID = 6
9,413,935 UART: [ldev] SUBJECT.KEYID = 5
9,415,206 UART: [ldev] AUTHORITY.KEYID = 7
9,416,386 UART: [ldev] FE.KEYID = 1
9,463,363 UART: [ldev] Erasing FE.KEYID = 1
12,800,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,126,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,141,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,664 UART: [ldev] --
15,181,986 UART: [fwproc] Waiting for Commands...
15,183,924 UART: [fwproc] Received command 0x46574c44
15,186,115 UART: [fwproc] Received Image of size 113760 bytes
19,235,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,311,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,380,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,697,010 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,930 writing to cptra_bootfsm_go
3,804,727 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,499,862 >>> mbox cmd response: failed
19,500,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,500,820 >>> mbox cmd response: failed
19,501,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,501,388 >>> mbox cmd response: failed
Initializing fuses
2,044,836 writing to cptra_bootfsm_go
5,821,610 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,879,560 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,441 UART:
192,805 UART: Running Caliptra ROM ...
193,991 UART:
603,725 UART: [state] CFI Enabled
615,290 UART: [state] LifecycleState = Unprovisioned
617,247 UART: [state] DebugLocked = No
619,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,835 UART: [kat] SHA2-256
793,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,113 UART: [kat] ++
804,559 UART: [kat] sha1
815,221 UART: [kat] SHA2-256
817,920 UART: [kat] SHA2-384
824,060 UART: [kat] SHA2-512-ACC
826,459 UART: [kat] ECC-384
3,110,198 UART: [kat] HMAC-384Kdf
3,121,686 UART: [kat] LMS
4,311,787 UART: [kat] --
4,317,401 UART: [cold-reset] ++
4,319,547 UART: [fht] Storing FHT @ 0x50003400
4,332,109 UART: [idev] ++
4,332,737 UART: [idev] CDI.KEYID = 6
4,333,647 UART: [idev] SUBJECT.KEYID = 7
4,334,913 UART: [idev] UDS.KEYID = 0
4,337,649 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,694 UART: [idev] Erasing UDS.KEYID = 0
7,628,222 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,863 UART: [idev] --
7,654,345 UART: [ldev] ++
7,654,918 UART: [ldev] CDI.KEYID = 6
7,655,886 UART: [ldev] SUBJECT.KEYID = 5
7,657,137 UART: [ldev] AUTHORITY.KEYID = 7
7,658,385 UART: [ldev] FE.KEYID = 1
7,670,923 UART: [ldev] Erasing FE.KEYID = 1
10,958,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,532 UART: [ldev] --
13,317,636 UART: [fwproc] Waiting for Commands...
13,319,408 UART: [fwproc] Received command 0x46574c44
13,321,594 UART: [fwproc] Received Image of size 113760 bytes
20,918,473 UART: ROM Fatal Error: 0x000B0038
20,921,909 >>> mbox cmd response: failed
20,922,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,922,730 >>> mbox cmd response: failed
20,922,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,923,291 >>> mbox cmd response: failed
Initializing fuses
2,049,060 writing to cptra_bootfsm_go
2,238,385 UART:
2,238,732 UART: Running Caliptra ROM ...
2,239,865 UART:
2,649,728 UART: [state] CFI Enabled
2,662,895 UART: [state] LifecycleState = Unprovisioned
2,664,879 UART: [state] DebugLocked = No
2,666,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,672,168 UART: [kat] SHA2-256
2,841,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,852,480 UART: [kat] ++
2,852,942 UART: [kat] sha1
2,864,686 UART: [kat] SHA2-256
2,867,378 UART: [kat] SHA2-384
2,874,181 UART: [kat] SHA2-512-ACC
2,876,533 UART: [kat] ECC-384
5,161,645 UART: [kat] HMAC-384Kdf
5,173,077 UART: [kat] LMS
6,363,218 UART: [kat] --
6,368,129 UART: [cold-reset] ++
6,369,201 UART: [fht] Storing FHT @ 0x50003400
6,380,366 UART: [idev] ++
6,380,935 UART: [idev] CDI.KEYID = 6
6,381,968 UART: [idev] SUBJECT.KEYID = 7
6,383,135 UART: [idev] UDS.KEYID = 0
6,385,969 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,528,979 UART: [idev] Erasing UDS.KEYID = 0
9,666,993 UART: [idev] Using Sha1 for KeyId Algorithm
9,688,203 UART: [idev] --
9,693,550 UART: [ldev] ++
9,694,159 UART: [ldev] CDI.KEYID = 6
9,695,051 UART: [ldev] SUBJECT.KEYID = 5
9,696,312 UART: [ldev] AUTHORITY.KEYID = 7
9,697,556 UART: [ldev] FE.KEYID = 1
9,708,637 UART: [ldev] Erasing FE.KEYID = 1
12,998,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,291,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,306,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,321,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,335,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,355,592 UART: [ldev] --
15,360,105 UART: [fwproc] Waiting for Commands...
15,362,415 UART: [fwproc] Received command 0x46574c44
15,364,599 UART: [fwproc] Received Image of size 113760 bytes
19,411,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,489,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,558,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,875,236 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
4,128,556 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,871,897 >>> mbox cmd response: failed
19,872,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,872,831 >>> mbox cmd response: failed
19,873,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,873,402 >>> mbox cmd response: failed
Initializing fuses
2,046,192 writing to cptra_bootfsm_go
6,177,126 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,103,103 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,945 writing to cptra_bootfsm_go
193,047 UART:
193,424 UART: Running Caliptra ROM ...
194,550 UART:
194,695 UART: [state] CFI Enabled
267,008 UART: [state] LifecycleState = Unprovisioned
268,934 UART: [state] DebugLocked = No
270,371 UART: [state] WD Timer not started. Device not locked for debugging
273,446 UART: [kat] SHA2-256
452,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,148 UART: [kat] ++
464,708 UART: [kat] sha1
477,271 UART: [kat] SHA2-256
480,277 UART: [kat] SHA2-384
485,726 UART: [kat] SHA2-512-ACC
488,695 UART: [kat] ECC-384
2,951,013 UART: [kat] HMAC-384Kdf
2,973,026 UART: [kat] LMS
3,502,465 UART: [kat] --
3,507,113 UART: [cold-reset] ++
3,508,399 UART: [fht] FHT @ 0x50003400
3,519,821 UART: [idev] ++
3,520,395 UART: [idev] CDI.KEYID = 6
3,521,304 UART: [idev] SUBJECT.KEYID = 7
3,522,545 UART: [idev] UDS.KEYID = 0
3,525,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,132 UART: [idev] Erasing UDS.KEYID = 0
6,029,682 UART: [idev] Sha1 KeyId Algorithm
6,054,050 UART: [idev] --
6,057,354 UART: [ldev] ++
6,057,927 UART: [ldev] CDI.KEYID = 6
6,058,847 UART: [ldev] SUBJECT.KEYID = 5
6,060,011 UART: [ldev] AUTHORITY.KEYID = 7
6,061,248 UART: [ldev] FE.KEYID = 1
6,102,521 UART: [ldev] Erasing FE.KEYID = 1
8,606,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,818 UART: [ldev] --
10,415,611 UART: [fwproc] Wait for Commands...
10,417,708 UART: [fwproc] Recv command 0x46574c44
10,419,824 UART: [fwproc] Recv'd Img size: 114084 bytes
13,623,558 UART: ROM Fatal Error: 0x000B0038
13,626,681 >>> mbox cmd response: failed
13,627,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,627,464 >>> mbox cmd response: failed
13,627,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,628,026 >>> mbox cmd response: failed
Initializing fuses
2,054,645 writing to cptra_bootfsm_go
2,243,988 UART:
2,244,334 UART: Running Caliptra ROM ...
2,245,379 UART:
2,245,527 UART: [state] CFI Enabled
2,318,760 UART: [state] LifecycleState = Unprovisioned
2,320,646 UART: [state] DebugLocked = No
2,322,492 UART: [state] WD Timer not started. Device not locked for debugging
2,327,102 UART: [kat] SHA2-256
2,506,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,796 UART: [kat] ++
2,518,250 UART: [kat] sha1
2,529,029 UART: [kat] SHA2-256
2,532,049 UART: [kat] SHA2-384
2,538,906 UART: [kat] SHA2-512-ACC
2,541,831 UART: [kat] ECC-384
5,002,095 UART: [kat] HMAC-384Kdf
5,023,768 UART: [kat] LMS
5,553,221 UART: [kat] --
5,556,236 UART: [cold-reset] ++
5,557,514 UART: [fht] FHT @ 0x50003400
5,566,899 UART: [idev] ++
5,567,470 UART: [idev] CDI.KEYID = 6
5,568,379 UART: [idev] SUBJECT.KEYID = 7
5,569,600 UART: [idev] UDS.KEYID = 0
5,572,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,716,245 UART: [idev] Erasing UDS.KEYID = 0
8,081,292 UART: [idev] Sha1 KeyId Algorithm
8,105,120 UART: [idev] --
8,107,929 UART: [ldev] ++
8,108,501 UART: [ldev] CDI.KEYID = 6
8,109,414 UART: [ldev] SUBJECT.KEYID = 5
8,110,575 UART: [ldev] AUTHORITY.KEYID = 7
8,111,860 UART: [ldev] FE.KEYID = 1
8,153,282 UART: [ldev] Erasing FE.KEYID = 1
10,654,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,404,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,176 UART: [ldev] --
12,445,172 UART: [fwproc] Wait for Commands...
12,446,783 UART: [fwproc] Recv command 0x46574c44
12,448,886 UART: [fwproc] Recv'd Img size: 114084 bytes
15,854,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,922,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,308,136 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,384,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,238,522 >>> mbox cmd response: failed
13,239,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,239,508 >>> mbox cmd response: failed
13,239,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,240,067 >>> mbox cmd response: failed
Initializing fuses
2,050,368 writing to cptra_bootfsm_go
5,433,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,090,657 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,647 UART:
193,017 UART: Running Caliptra ROM ...
194,125 UART:
603,923 UART: [state] CFI Enabled
617,520 UART: [state] LifecycleState = Unprovisioned
619,345 UART: [state] DebugLocked = No
622,290 UART: [state] WD Timer not started. Device not locked for debugging
626,326 UART: [kat] SHA2-256
805,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,010 UART: [kat] ++
817,554 UART: [kat] sha1
829,573 UART: [kat] SHA2-256
832,631 UART: [kat] SHA2-384
837,958 UART: [kat] SHA2-512-ACC
840,900 UART: [kat] ECC-384
3,282,132 UART: [kat] HMAC-384Kdf
3,294,951 UART: [kat] LMS
3,824,486 UART: [kat] --
3,828,229 UART: [cold-reset] ++
3,830,379 UART: [fht] FHT @ 0x50003400
3,841,462 UART: [idev] ++
3,842,037 UART: [idev] CDI.KEYID = 6
3,842,961 UART: [idev] SUBJECT.KEYID = 7
3,844,180 UART: [idev] UDS.KEYID = 0
3,847,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,437 UART: [idev] Erasing UDS.KEYID = 0
6,316,443 UART: [idev] Sha1 KeyId Algorithm
6,339,990 UART: [idev] --
6,344,608 UART: [ldev] ++
6,345,183 UART: [ldev] CDI.KEYID = 6
6,346,071 UART: [ldev] SUBJECT.KEYID = 5
6,347,287 UART: [ldev] AUTHORITY.KEYID = 7
6,348,526 UART: [ldev] FE.KEYID = 1
6,359,095 UART: [ldev] Erasing FE.KEYID = 1
8,831,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,443 UART: [ldev] --
10,622,025 UART: [fwproc] Wait for Commands...
10,623,963 UART: [fwproc] Recv command 0x46574c44
10,626,062 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,262 UART: ROM Fatal Error: 0x000B0038
13,823,383 >>> mbox cmd response: failed
13,823,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,824,134 >>> mbox cmd response: failed
13,824,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,824,690 >>> mbox cmd response: failed
Initializing fuses
2,053,460 writing to cptra_bootfsm_go
2,242,755 UART:
2,243,101 UART: Running Caliptra ROM ...
2,244,266 UART:
6,646,882 UART: [state] CFI Enabled
6,661,939 UART: [state] LifecycleState = Unprovisioned
6,663,833 UART: [state] DebugLocked = No
6,666,306 UART: [state] WD Timer not started. Device not locked for debugging
6,669,714 UART: [kat] SHA2-256
6,848,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,860,432 UART: [kat] ++
6,860,892 UART: [kat] sha1
6,870,372 UART: [kat] SHA2-256
6,873,395 UART: [kat] SHA2-384
6,881,003 UART: [kat] SHA2-512-ACC
6,883,955 UART: [kat] ECC-384
9,327,302 UART: [kat] HMAC-384Kdf
9,339,264 UART: [kat] LMS
9,868,733 UART: [kat] --
9,870,857 UART: [cold-reset] ++
9,872,692 UART: [fht] FHT @ 0x50003400
9,884,295 UART: [idev] ++
9,884,859 UART: [idev] CDI.KEYID = 6
9,885,829 UART: [idev] SUBJECT.KEYID = 7
9,886,991 UART: [idev] UDS.KEYID = 0
9,889,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,033,156 UART: [idev] Erasing UDS.KEYID = 0
12,360,811 UART: [idev] Sha1 KeyId Algorithm
12,382,587 UART: [idev] --
12,386,523 UART: [ldev] ++
12,387,095 UART: [ldev] CDI.KEYID = 6
12,387,978 UART: [ldev] SUBJECT.KEYID = 5
12,389,192 UART: [ldev] AUTHORITY.KEYID = 7
12,390,422 UART: [ldev] FE.KEYID = 1
12,399,935 UART: [ldev] Erasing FE.KEYID = 1
14,876,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,595,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,611,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,627,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,642,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,662,746 UART: [ldev] --
16,667,620 UART: [fwproc] Wait for Commands...
16,669,828 UART: [fwproc] Recv command 0x46574c44
16,671,926 UART: [fwproc] Recv'd Img size: 114084 bytes
20,065,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,136,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,205,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,521,991 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,694,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,413,646 >>> mbox cmd response: failed
13,414,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,414,569 >>> mbox cmd response: failed
13,414,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,415,085 >>> mbox cmd response: failed
Initializing fuses
2,049,539 writing to cptra_bootfsm_go
10,157,096 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,720,633 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,297 UART:
192,674 UART: Running Caliptra ROM ...
193,816 UART:
193,961 UART: [state] CFI Enabled
262,978 UART: [state] LifecycleState = Unprovisioned
265,407 UART: [state] DebugLocked = No
267,180 UART: [state] WD Timer not started. Device not locked for debugging
271,571 UART: [kat] SHA2-256
461,443 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,206 UART: [kat] ++
472,685 UART: [kat] sha1
483,245 UART: [kat] SHA2-256
486,257 UART: [kat] SHA2-384
491,489 UART: [kat] SHA2-512-ACC
494,105 UART: [kat] ECC-384
2,947,937 UART: [kat] HMAC-384Kdf
2,972,107 UART: [kat] LMS
3,503,872 UART: [kat] --
3,508,077 UART: [cold-reset] ++
3,510,392 UART: [fht] FHT @ 0x50003400
3,522,615 UART: [idev] ++
3,523,311 UART: [idev] CDI.KEYID = 6
3,524,252 UART: [idev] SUBJECT.KEYID = 7
3,525,463 UART: [idev] UDS.KEYID = 0
3,528,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,158 UART: [idev] Erasing UDS.KEYID = 0
6,028,889 UART: [idev] Sha1 KeyId Algorithm
6,050,501 UART: [idev] --
6,056,426 UART: [ldev] ++
6,057,115 UART: [ldev] CDI.KEYID = 6
6,058,042 UART: [ldev] SUBJECT.KEYID = 5
6,059,208 UART: [ldev] AUTHORITY.KEYID = 7
6,060,389 UART: [ldev] FE.KEYID = 1
6,100,148 UART: [ldev] Erasing FE.KEYID = 1
8,603,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,023 UART: [ldev] --
10,414,157 UART: [fwproc] Wait for Commands...
10,417,124 UART: [fwproc] Recv command 0x46574c44
10,419,443 UART: [fwproc] Recv'd Img size: 114084 bytes
13,662,187 UART: ROM Fatal Error: 0x000B0038
13,665,646 >>> mbox cmd response: failed
13,666,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,666,418 >>> mbox cmd response: failed
13,666,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,666,979 >>> mbox cmd response: failed
Initializing fuses
2,055,001 writing to cptra_bootfsm_go
2,244,326 UART:
2,244,662 UART: Running Caliptra ROM ...
2,245,750 UART:
2,245,906 UART: [state] CFI Enabled
2,316,821 UART: [state] LifecycleState = Unprovisioned
2,319,198 UART: [state] DebugLocked = No
2,321,136 UART: [state] WD Timer not started. Device not locked for debugging
2,326,521 UART: [kat] SHA2-256
2,516,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,147 UART: [kat] ++
2,527,634 UART: [kat] sha1
2,538,902 UART: [kat] SHA2-256
2,541,910 UART: [kat] SHA2-384
2,547,425 UART: [kat] SHA2-512-ACC
2,550,009 UART: [kat] ECC-384
5,001,336 UART: [kat] HMAC-384Kdf
5,025,988 UART: [kat] LMS
5,557,774 UART: [kat] --
5,564,920 UART: [cold-reset] ++
5,565,880 UART: [fht] FHT @ 0x50003400
5,577,568 UART: [idev] ++
5,578,283 UART: [idev] CDI.KEYID = 6
5,579,255 UART: [idev] SUBJECT.KEYID = 7
5,580,420 UART: [idev] UDS.KEYID = 0
5,582,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,378 UART: [idev] Erasing UDS.KEYID = 0
8,083,922 UART: [idev] Sha1 KeyId Algorithm
8,105,271 UART: [idev] --
8,109,592 UART: [ldev] ++
8,110,276 UART: [ldev] CDI.KEYID = 6
8,111,183 UART: [ldev] SUBJECT.KEYID = 5
8,112,418 UART: [ldev] AUTHORITY.KEYID = 7
8,113,598 UART: [ldev] FE.KEYID = 1
8,154,117 UART: [ldev] Erasing FE.KEYID = 1
10,656,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,406,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,421,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,325 UART: [ldev] --
12,448,587 UART: [fwproc] Wait for Commands...
12,451,068 UART: [fwproc] Recv command 0x46574c44
12,453,339 UART: [fwproc] Recv'd Img size: 114084 bytes
15,891,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,971,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,087,642 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,628,757 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,442,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,377,626 >>> mbox cmd response: failed
13,378,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,378,790 >>> mbox cmd response: failed
13,379,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,365 >>> mbox cmd response: failed
Initializing fuses
2,051,969 writing to cptra_bootfsm_go
5,487,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,750,334 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,272 UART:
192,634 UART: Running Caliptra ROM ...
193,825 UART:
603,654 UART: [state] CFI Enabled
619,738 UART: [state] LifecycleState = Unprovisioned
622,113 UART: [state] DebugLocked = No
624,784 UART: [state] WD Timer not started. Device not locked for debugging
629,637 UART: [kat] SHA2-256
819,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,277 UART: [kat] ++
830,863 UART: [kat] sha1
842,071 UART: [kat] SHA2-256
845,098 UART: [kat] SHA2-384
852,163 UART: [kat] SHA2-512-ACC
854,780 UART: [kat] ECC-384
3,297,956 UART: [kat] HMAC-384Kdf
3,310,130 UART: [kat] LMS
3,841,998 UART: [kat] --
3,847,685 UART: [cold-reset] ++
3,849,889 UART: [fht] FHT @ 0x50003400
3,861,467 UART: [idev] ++
3,862,141 UART: [idev] CDI.KEYID = 6
3,863,160 UART: [idev] SUBJECT.KEYID = 7
3,864,318 UART: [idev] UDS.KEYID = 0
3,866,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,010,480 UART: [idev] Erasing UDS.KEYID = 0
6,338,392 UART: [idev] Sha1 KeyId Algorithm
6,360,639 UART: [idev] --
6,366,838 UART: [ldev] ++
6,367,533 UART: [ldev] CDI.KEYID = 6
6,368,417 UART: [ldev] SUBJECT.KEYID = 5
6,369,631 UART: [ldev] AUTHORITY.KEYID = 7
6,370,867 UART: [ldev] FE.KEYID = 1
6,381,699 UART: [ldev] Erasing FE.KEYID = 1
8,855,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,810 UART: [ldev] --
10,645,562 UART: [fwproc] Wait for Commands...
10,647,553 UART: [fwproc] Recv command 0x46574c44
10,649,861 UART: [fwproc] Recv'd Img size: 114084 bytes
13,892,735 UART: ROM Fatal Error: 0x000B0038
13,896,206 >>> mbox cmd response: failed
13,896,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,896,942 >>> mbox cmd response: failed
13,897,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,897,497 >>> mbox cmd response: failed
Initializing fuses
2,054,023 writing to cptra_bootfsm_go
2,243,367 UART:
2,243,734 UART: Running Caliptra ROM ...
2,244,874 UART:
6,576,614 UART: [state] CFI Enabled
6,587,486 UART: [state] LifecycleState = Unprovisioned
6,589,837 UART: [state] DebugLocked = No
6,592,484 UART: [state] WD Timer not started. Device not locked for debugging
6,597,802 UART: [kat] SHA2-256
6,787,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,798,432 UART: [kat] ++
6,799,033 UART: [kat] sha1
6,810,315 UART: [kat] SHA2-256
6,813,329 UART: [kat] SHA2-384
6,818,780 UART: [kat] SHA2-512-ACC
6,821,346 UART: [kat] ECC-384
9,262,196 UART: [kat] HMAC-384Kdf
9,276,527 UART: [kat] LMS
9,808,353 UART: [kat] --
9,812,763 UART: [cold-reset] ++
9,814,403 UART: [fht] FHT @ 0x50003400
9,824,577 UART: [idev] ++
9,825,248 UART: [idev] CDI.KEYID = 6
9,826,284 UART: [idev] SUBJECT.KEYID = 7
9,827,451 UART: [idev] UDS.KEYID = 0
9,830,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,973,843 UART: [idev] Erasing UDS.KEYID = 0
12,306,755 UART: [idev] Sha1 KeyId Algorithm
12,330,745 UART: [idev] --
12,335,596 UART: [ldev] ++
12,336,274 UART: [ldev] CDI.KEYID = 6
12,337,183 UART: [ldev] SUBJECT.KEYID = 5
12,338,393 UART: [ldev] AUTHORITY.KEYID = 7
12,339,618 UART: [ldev] FE.KEYID = 1
12,350,582 UART: [ldev] Erasing FE.KEYID = 1
14,825,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,545,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,560,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,575,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,591,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,612,833 UART: [ldev] --
16,617,816 UART: [fwproc] Wait for Commands...
16,619,543 UART: [fwproc] Recv command 0x46574c44
16,621,858 UART: [fwproc] Recv'd Img size: 114084 bytes
20,066,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,136,502 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,252,659 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,794,136 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,759,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,591,004 >>> mbox cmd response: failed
13,591,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,591,956 >>> mbox cmd response: failed
13,592,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,592,518 >>> mbox cmd response: failed
Initializing fuses
2,056,057 writing to cptra_bootfsm_go
10,025,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,213,681 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,760 UART: [kat] HMAC-384Kdf
907,280 UART: [kat] LMS
1,475,476 UART: [kat] --
1,476,223 UART: [cold-reset] ++
1,476,595 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,000 UART: [idev] Erasing UDS.KEYID = 0
1,505,094 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,514,947 UART: [ldev] ++
1,515,115 UART: [ldev] CDI.KEYID = 6
1,515,478 UART: [ldev] SUBJECT.KEYID = 5
1,515,904 UART: [ldev] AUTHORITY.KEYID = 7
1,516,367 UART: [ldev] FE.KEYID = 1
1,521,571 UART: [ldev] Erasing FE.KEYID = 1
1,546,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,536 UART: [ldev] --
1,585,909 UART: [fwproc] Waiting for Commands...
1,586,602 UART: [fwproc] Received command 0x46574c44
1,587,393 UART: [fwproc] Received Image of size 114084 bytes
3,788,854 UART: ROM Fatal Error: 0x000B0038
3,790,011 >>> mbox cmd response: failed
3,790,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,790,017 >>> mbox cmd response: failed
3,790,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,790,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,023 UART: [cold-reset] ++
1,476,589 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,650 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,204 UART: [idev] --
1,514,129 UART: [ldev] ++
1,514,297 UART: [ldev] CDI.KEYID = 6
1,514,660 UART: [ldev] SUBJECT.KEYID = 5
1,515,086 UART: [ldev] AUTHORITY.KEYID = 7
1,515,549 UART: [ldev] FE.KEYID = 1
1,520,843 UART: [ldev] Erasing FE.KEYID = 1
1,546,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,266 UART: [ldev] --
1,585,751 UART: [fwproc] Waiting for Commands...
1,586,610 UART: [fwproc] Received command 0x46574c44
1,587,401 UART: [fwproc] Received Image of size 114084 bytes
2,882,788 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,004 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,356 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,759 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,869,508 >>> mbox cmd response: failed
3,869,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,869,514 >>> mbox cmd response: failed
3,869,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,869,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,045 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,036 UART: [kat] SHA2-256
881,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,082 UART: [kat] ++
886,234 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,279 UART: [kat] SHA2-512-ACC
897,180 UART: [kat] ECC-384
903,029 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,066 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,155 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,745 UART: [idev] --
1,514,890 UART: [ldev] ++
1,515,058 UART: [ldev] CDI.KEYID = 6
1,515,421 UART: [ldev] SUBJECT.KEYID = 5
1,515,847 UART: [ldev] AUTHORITY.KEYID = 7
1,516,310 UART: [ldev] FE.KEYID = 1
1,521,512 UART: [ldev] Erasing FE.KEYID = 1
1,546,955 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,763 UART: [ldev] --
1,586,138 UART: [fwproc] Waiting for Commands...
1,587,007 UART: [fwproc] Received command 0x46574c44
1,587,798 UART: [fwproc] Received Image of size 114084 bytes
3,826,434 UART: ROM Fatal Error: 0x000B0038
3,827,591 >>> mbox cmd response: failed
3,827,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,827,597 >>> mbox cmd response: failed
3,827,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,827,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,928 UART: [kat] SHA2-256
881,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,974 UART: [kat] ++
886,126 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,675 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,398 UART: [cold-reset] ++
1,476,730 UART: [fht] Storing FHT @ 0x50003400
1,479,377 UART: [idev] ++
1,479,545 UART: [idev] CDI.KEYID = 6
1,479,905 UART: [idev] SUBJECT.KEYID = 7
1,480,329 UART: [idev] UDS.KEYID = 0
1,480,674 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,504,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,811 UART: [idev] --
1,514,778 UART: [ldev] ++
1,514,946 UART: [ldev] CDI.KEYID = 6
1,515,309 UART: [ldev] SUBJECT.KEYID = 5
1,515,735 UART: [ldev] AUTHORITY.KEYID = 7
1,516,198 UART: [ldev] FE.KEYID = 1
1,521,876 UART: [ldev] Erasing FE.KEYID = 1
1,547,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,549 UART: [ldev] --
1,586,868 UART: [fwproc] Waiting for Commands...
1,587,693 UART: [fwproc] Received command 0x46574c44
1,588,484 UART: [fwproc] Received Image of size 114084 bytes
2,882,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,030 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,756,220 >>> mbox cmd response: failed
3,756,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,756,226 >>> mbox cmd response: failed
3,756,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,756,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,310 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,336 UART: [kat] SHA2-512-ACC
908,237 UART: [kat] ECC-384
918,420 UART: [kat] HMAC-384Kdf
923,028 UART: [kat] LMS
1,171,356 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,969 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,748 UART: [idev] Erasing UDS.KEYID = 0
1,201,785 UART: [idev] Sha1 KeyId Algorithm
1,210,271 UART: [idev] --
1,211,119 UART: [ldev] ++
1,211,287 UART: [ldev] CDI.KEYID = 6
1,211,650 UART: [ldev] SUBJECT.KEYID = 5
1,212,076 UART: [ldev] AUTHORITY.KEYID = 7
1,212,539 UART: [ldev] FE.KEYID = 1
1,217,963 UART: [ldev] Erasing FE.KEYID = 1
1,244,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,223 UART: [ldev] --
1,283,498 UART: [fwproc] Wait for Commands...
1,284,276 UART: [fwproc] Recv command 0x46574c44
1,285,004 UART: [fwproc] Recv'd Img size: 114084 bytes
1,879,617 UART: ROM Fatal Error: 0x000B0038
1,880,774 >>> mbox cmd response: failed
1,880,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,780 >>> mbox cmd response: failed
1,880,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,880,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,501 UART: [kat] SHA2-256
903,441 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
917,422 UART: [kat] HMAC-384Kdf
922,118 UART: [kat] LMS
1,170,446 UART: [kat] --
1,171,323 UART: [cold-reset] ++
1,171,675 UART: [fht] FHT @ 0x50003400
1,174,156 UART: [idev] ++
1,174,324 UART: [idev] CDI.KEYID = 6
1,174,684 UART: [idev] SUBJECT.KEYID = 7
1,175,108 UART: [idev] UDS.KEYID = 0
1,175,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,635 UART: [idev] Sha1 KeyId Algorithm
1,208,299 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,904 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,781 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,728,325 >>> mbox cmd response: failed
1,728,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,331 >>> mbox cmd response: failed
1,728,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,255 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
893,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,632 UART: [kat] ++
897,784 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,983 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,740 UART: [cold-reset] ++
1,173,194 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,883 UART: [idev] Erasing UDS.KEYID = 0
1,202,132 UART: [idev] Sha1 KeyId Algorithm
1,210,428 UART: [idev] --
1,211,458 UART: [ldev] ++
1,211,626 UART: [ldev] CDI.KEYID = 6
1,211,989 UART: [ldev] SUBJECT.KEYID = 5
1,212,415 UART: [ldev] AUTHORITY.KEYID = 7
1,212,878 UART: [ldev] FE.KEYID = 1
1,218,152 UART: [ldev] Erasing FE.KEYID = 1
1,244,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,024 UART: [ldev] --
1,283,371 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 114084 bytes
1,878,226 UART: ROM Fatal Error: 0x000B0038
1,879,383 >>> mbox cmd response: failed
1,879,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,389 >>> mbox cmd response: failed
1,879,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
901,846 UART: [kat] SHA2-256
903,786 UART: [kat] SHA2-384
906,321 UART: [kat] SHA2-512-ACC
908,222 UART: [kat] ECC-384
917,639 UART: [kat] HMAC-384Kdf
922,321 UART: [kat] LMS
1,170,649 UART: [kat] --
1,171,416 UART: [cold-reset] ++
1,171,872 UART: [fht] FHT @ 0x50003400
1,174,631 UART: [idev] ++
1,174,799 UART: [idev] CDI.KEYID = 6
1,175,159 UART: [idev] SUBJECT.KEYID = 7
1,175,583 UART: [idev] UDS.KEYID = 0
1,175,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,463 UART: [idev] Erasing UDS.KEYID = 0
1,200,766 UART: [idev] Sha1 KeyId Algorithm
1,209,096 UART: [idev] --
1,210,284 UART: [ldev] ++
1,210,452 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,241 UART: [ldev] AUTHORITY.KEYID = 7
1,211,704 UART: [ldev] FE.KEYID = 1
1,216,968 UART: [ldev] Erasing FE.KEYID = 1
1,243,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,282,841 UART: [fwproc] Wait for Commands...
1,283,623 UART: [fwproc] Recv command 0x46574c44
1,284,351 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,321 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,690 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,726,431 >>> mbox cmd response: failed
1,726,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,437 >>> mbox cmd response: failed
1,726,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,726,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,340 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,208,005 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,924 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,182 UART: [ldev] --
1,281,676 UART: [fwproc] Wait for Commands...
1,282,491 UART: [fwproc] Recv command 0x46574c44
1,283,224 UART: [fwproc] Recv'd Img size: 114084 bytes
1,871,551 UART: ROM Fatal Error: 0x000B0038
1,872,708 >>> mbox cmd response: failed
1,872,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,872,714 >>> mbox cmd response: failed
1,872,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,872,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,869 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,209,084 UART: [ldev] ++
1,209,252 UART: [ldev] CDI.KEYID = 6
1,209,616 UART: [ldev] SUBJECT.KEYID = 5
1,210,043 UART: [ldev] AUTHORITY.KEYID = 7
1,210,506 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,422 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,042 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,728,905 >>> mbox cmd response: failed
1,728,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,911 >>> mbox cmd response: failed
1,728,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,728,917 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,448 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,627 UART: [kat] SHA2-256
891,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,174,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,146 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,255 UART: [ldev] ++
1,209,423 UART: [ldev] CDI.KEYID = 6
1,209,787 UART: [ldev] SUBJECT.KEYID = 5
1,210,214 UART: [ldev] AUTHORITY.KEYID = 7
1,210,677 UART: [ldev] FE.KEYID = 1
1,215,909 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,495 UART: [fwproc] Wait for Commands...
1,282,170 UART: [fwproc] Recv command 0x46574c44
1,282,903 UART: [fwproc] Recv'd Img size: 114084 bytes
1,860,922 UART: ROM Fatal Error: 0x000B0038
1,862,079 >>> mbox cmd response: failed
1,862,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,862,085 >>> mbox cmd response: failed
1,862,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,862,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
916,449 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,395 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,207 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,725,420 >>> mbox cmd response: failed
1,725,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,725,426 >>> mbox cmd response: failed
1,725,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,725,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,181 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
4,879,199 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,885,311 >>> mbox cmd response: failed
18,886,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,886,483 >>> mbox cmd response: failed
18,886,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,887,040 >>> mbox cmd response: failed
Initializing fuses
2,056,721 writing to cptra_bootfsm_go
6,937,390 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,510,667 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
4,877,167 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,813,112 >>> mbox cmd response: failed
18,813,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,814,208 >>> mbox cmd response: failed
18,814,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,814,775 >>> mbox cmd response: failed
Initializing fuses
2,050,077 writing to cptra_bootfsm_go
6,910,063 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,484,786 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
5,184,947 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,113,135 >>> mbox cmd response: failed
19,113,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,114,183 >>> mbox cmd response: failed
19,114,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,114,825 >>> mbox cmd response: failed
Initializing fuses
2,051,710 writing to cptra_bootfsm_go
7,231,593 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,660,006 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
5,184,254 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,966,050 >>> mbox cmd response: failed
18,966,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,966,999 >>> mbox cmd response: failed
18,967,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,967,581 >>> mbox cmd response: failed
Initializing fuses
2,048,728 writing to cptra_bootfsm_go
7,230,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,654,331 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,456,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,922,436 >>> mbox cmd response: failed
12,923,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,392 >>> mbox cmd response: failed
12,923,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,955 >>> mbox cmd response: failed
Initializing fuses
2,050,076 writing to cptra_bootfsm_go
5,531,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,358,936 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,488,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,974,553 >>> mbox cmd response: failed
12,975,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,975,485 >>> mbox cmd response: failed
12,975,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,976,045 >>> mbox cmd response: failed
Initializing fuses
2,050,998 writing to cptra_bootfsm_go
5,519,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,359,570 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,784,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,158,752 >>> mbox cmd response: failed
13,159,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,159,762 >>> mbox cmd response: failed
13,160,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,330 >>> mbox cmd response: failed
Initializing fuses
2,053,436 writing to cptra_bootfsm_go
10,478,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,202,205 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,778,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,168,779 >>> mbox cmd response: failed
13,169,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,169,710 >>> mbox cmd response: failed
13,170,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,170,361 >>> mbox cmd response: failed
Initializing fuses
2,053,585 writing to cptra_bootfsm_go
10,478,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,174,629 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,461,051 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,927,961 >>> mbox cmd response: failed
12,928,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,928,892 >>> mbox cmd response: failed
12,929,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,459 >>> mbox cmd response: failed
Initializing fuses
2,056,697 writing to cptra_bootfsm_go
5,528,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,353,131 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
3,465,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,967,009 >>> mbox cmd response: failed
12,967,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,967,981 >>> mbox cmd response: failed
12,968,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,968,538 >>> mbox cmd response: failed
Initializing fuses
2,052,705 writing to cptra_bootfsm_go
5,504,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,318,323 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,785,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,152,625 >>> mbox cmd response: failed
13,153,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,153,610 >>> mbox cmd response: failed
13,153,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,154,168 >>> mbox cmd response: failed
Initializing fuses
2,057,208 writing to cptra_bootfsm_go
10,487,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,202,281 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,786,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,156,151 >>> mbox cmd response: failed
13,157,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,157,442 >>> mbox cmd response: failed
13,157,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,158,001 >>> mbox cmd response: failed
Initializing fuses
2,058,779 writing to cptra_bootfsm_go
10,503,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,223,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,685 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,473,602 >>> mbox cmd response: failed
1,473,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,608 >>> mbox cmd response: failed
1,473,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,626 UART: [state] LifecycleState = Unprovisioned
85,281 UART: [state] DebugLocked = No
86,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,655 UART: [kat] SHA2-256
881,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,701 UART: [kat] ++
885,853 UART: [kat] sha1
889,967 UART: [kat] SHA2-256
891,905 UART: [kat] SHA2-384
894,594 UART: [kat] SHA2-512-ACC
896,495 UART: [kat] ECC-384
902,160 UART: [kat] HMAC-384Kdf
906,866 UART: [kat] LMS
1,475,062 UART: [kat] --
1,475,959 UART: [cold-reset] ++
1,476,379 UART: [fht] Storing FHT @ 0x50003400
1,479,178 UART: [idev] ++
1,479,346 UART: [idev] CDI.KEYID = 6
1,479,706 UART: [idev] SUBJECT.KEYID = 7
1,480,130 UART: [idev] UDS.KEYID = 0
1,480,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,170 UART: [idev] Erasing UDS.KEYID = 0
1,505,184 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,365 UART: [ldev] Erasing FE.KEYID = 1
1,546,728 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,208 UART: [ldev] --
1,585,613 UART: [fwproc] Waiting for Commands...
1,586,392 UART: [fwproc] Received command 0x46574c44
1,587,183 UART: [fwproc] Received Image of size 114084 bytes
2,880,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,893 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,479,594 >>> mbox cmd response: failed
1,479,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,600 >>> mbox cmd response: failed
1,479,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,243 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,478,629 >>> mbox cmd response: failed
1,478,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,635 >>> mbox cmd response: failed
1,478,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,023 UART: [state] LifecycleState = Unprovisioned
86,678 UART: [state] DebugLocked = No
87,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,838 UART: [kat] SHA2-256
882,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,884 UART: [kat] ++
887,036 UART: [kat] sha1
891,138 UART: [kat] SHA2-256
893,076 UART: [kat] SHA2-384
895,775 UART: [kat] SHA2-512-ACC
897,676 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,937 UART: [kat] LMS
1,476,133 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,476 UART: [fht] Storing FHT @ 0x50003400
1,480,289 UART: [idev] ++
1,480,457 UART: [idev] CDI.KEYID = 6
1,480,817 UART: [idev] SUBJECT.KEYID = 7
1,481,241 UART: [idev] UDS.KEYID = 0
1,481,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,751 UART: [idev] --
1,515,800 UART: [ldev] ++
1,515,968 UART: [ldev] CDI.KEYID = 6
1,516,331 UART: [ldev] SUBJECT.KEYID = 5
1,516,757 UART: [ldev] AUTHORITY.KEYID = 7
1,517,220 UART: [ldev] FE.KEYID = 1
1,522,376 UART: [ldev] Erasing FE.KEYID = 1
1,547,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,373 UART: [fwproc] Received command 0x46574c44
1,588,164 UART: [fwproc] Received Image of size 114084 bytes
2,882,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,469 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,294 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,471,826 >>> mbox cmd response: failed
1,471,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,832 >>> mbox cmd response: failed
1,471,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,954 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,450,647 >>> mbox cmd response: failed
1,450,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,653 >>> mbox cmd response: failed
1,450,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,850 UART: [kat] SHA2-512-ACC
908,751 UART: [kat] ECC-384
918,952 UART: [kat] HMAC-384Kdf
923,740 UART: [kat] LMS
1,172,068 UART: [kat] --
1,173,097 UART: [cold-reset] ++
1,173,439 UART: [fht] FHT @ 0x50003400
1,176,042 UART: [idev] ++
1,176,210 UART: [idev] CDI.KEYID = 6
1,176,570 UART: [idev] SUBJECT.KEYID = 7
1,176,994 UART: [idev] UDS.KEYID = 0
1,177,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,960 UART: [idev] Erasing UDS.KEYID = 0
1,202,035 UART: [idev] Sha1 KeyId Algorithm
1,210,389 UART: [idev] --
1,211,505 UART: [ldev] ++
1,211,673 UART: [ldev] CDI.KEYID = 6
1,212,036 UART: [ldev] SUBJECT.KEYID = 5
1,212,462 UART: [ldev] AUTHORITY.KEYID = 7
1,212,925 UART: [ldev] FE.KEYID = 1
1,217,733 UART: [ldev] Erasing FE.KEYID = 1
1,244,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,793 UART: [ldev] --
1,283,082 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,578 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,592 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,787 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,475,699 >>> mbox cmd response: failed
1,475,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,705 >>> mbox cmd response: failed
1,475,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,505 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,471,050 >>> mbox cmd response: failed
1,471,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,056 >>> mbox cmd response: failed
1,471,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,471,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,398 UART: [kat] SHA2-256
904,338 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,867 UART: [kat] HMAC-384Kdf
923,289 UART: [kat] LMS
1,171,617 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,606 UART: [idev] Sha1 KeyId Algorithm
1,210,002 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,754 UART: [ldev] Erasing FE.KEYID = 1
1,244,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,362 UART: [ldev] --
1,283,693 UART: [fwproc] Wait for Commands...
1,284,493 UART: [fwproc] Recv command 0x46574c44
1,285,221 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,277 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,468,983 >>> mbox cmd response: failed
1,468,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,989 >>> mbox cmd response: failed
1,468,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,536 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,478,096 >>> mbox cmd response: failed
1,478,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,102 >>> mbox cmd response: failed
1,478,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,174,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,261 UART: [fwproc] Recv command 0x46574c44
1,281,994 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,959 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,758 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,463 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,475,909 >>> mbox cmd response: failed
1,475,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,915 >>> mbox cmd response: failed
1,475,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,082 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,470,711 >>> mbox cmd response: failed
1,470,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,717 >>> mbox cmd response: failed
1,470,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,474 UART: [idev] --
1,208,611 UART: [ldev] ++
1,208,779 UART: [ldev] CDI.KEYID = 6
1,209,143 UART: [ldev] SUBJECT.KEYID = 5
1,209,570 UART: [ldev] AUTHORITY.KEYID = 7
1,210,033 UART: [ldev] FE.KEYID = 1
1,214,997 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,515 UART: [ldev] --
1,280,803 UART: [fwproc] Wait for Commands...
1,281,484 UART: [fwproc] Recv command 0x46574c44
1,282,217 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,785 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,469,623 >>> mbox cmd response: failed
1,469,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,629 >>> mbox cmd response: failed
1,469,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,635 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,247 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
4,880,439 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,021,414 >>> mbox cmd response: failed
14,022,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,022,476 >>> mbox cmd response: failed
14,022,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,023,037 >>> mbox cmd response: failed
Initializing fuses
2,057,089 writing to cptra_bootfsm_go
6,917,012 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,491,250 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
4,870,987 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,985,956 >>> mbox cmd response: failed
13,986,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,987,070 >>> mbox cmd response: failed
13,987,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,987,636 >>> mbox cmd response: failed
Initializing fuses
2,058,659 writing to cptra_bootfsm_go
6,920,867 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,503,346 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
5,191,395 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,165,557 >>> mbox cmd response: failed
14,166,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,166,528 >>> mbox cmd response: failed
14,166,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,167,091 >>> mbox cmd response: failed
Initializing fuses
2,063,254 writing to cptra_bootfsm_go
10,881,599 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,313,450 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
5,187,761 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,154,360 >>> mbox cmd response: failed
14,155,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,155,469 >>> mbox cmd response: failed
14,155,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,156,032 >>> mbox cmd response: failed
Initializing fuses
2,058,420 writing to cptra_bootfsm_go
10,903,167 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,331,972 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,440,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,348,154 >>> mbox cmd response: failed
10,348,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,214 >>> mbox cmd response: failed
10,349,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,349,773 >>> mbox cmd response: failed
Initializing fuses
2,061,762 writing to cptra_bootfsm_go
5,510,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,311,768 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,440,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,388,122 >>> mbox cmd response: failed
10,388,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,389,030 >>> mbox cmd response: failed
10,389,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,389,593 >>> mbox cmd response: failed
Initializing fuses
2,057,592 writing to cptra_bootfsm_go
5,492,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,313,804 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
3,787,795 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,627,411 >>> mbox cmd response: failed
10,628,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,628,506 >>> mbox cmd response: failed
10,628,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,629,064 >>> mbox cmd response: failed
Initializing fuses
2,055,310 writing to cptra_bootfsm_go
13,022,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,757,537 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
3,787,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,639,383 >>> mbox cmd response: failed
10,639,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,640,330 >>> mbox cmd response: failed
10,640,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,640,883 >>> mbox cmd response: failed
Initializing fuses
2,058,673 writing to cptra_bootfsm_go
13,009,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,734,621 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,465,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,385,837 >>> mbox cmd response: failed
10,386,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,386,777 >>> mbox cmd response: failed
10,387,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,387,346 >>> mbox cmd response: failed
Initializing fuses
2,065,046 writing to cptra_bootfsm_go
5,511,679 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,348,821 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,467,695 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,381,362 >>> mbox cmd response: failed
10,381,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,382,325 >>> mbox cmd response: failed
10,382,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,382,965 >>> mbox cmd response: failed
Initializing fuses
2,057,418 writing to cptra_bootfsm_go
5,493,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,324,824 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,796,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,628,909 >>> mbox cmd response: failed
10,629,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,629,999 >>> mbox cmd response: failed
10,630,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,630,565 >>> mbox cmd response: failed
Initializing fuses
2,056,560 writing to cptra_bootfsm_go
13,015,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,720,609 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,612 writing to cptra_bootfsm_go
3,792,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,632,319 >>> mbox cmd response: failed
10,632,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,633,308 >>> mbox cmd response: failed
10,633,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,633,881 >>> mbox cmd response: failed
Initializing fuses
2,059,325 writing to cptra_bootfsm_go
13,028,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,760,000 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,158 >>> mbox cmd response: failed
1,180,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,164 >>> mbox cmd response: failed
1,180,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,292 UART: [kat] LMS
1,475,488 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,452 UART: [idev] ++
1,479,620 UART: [idev] CDI.KEYID = 6
1,479,980 UART: [idev] SUBJECT.KEYID = 7
1,480,404 UART: [idev] UDS.KEYID = 0
1,480,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,734 UART: [idev] Erasing UDS.KEYID = 0
1,505,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,902 UART: [idev] --
1,514,865 UART: [ldev] ++
1,515,033 UART: [ldev] CDI.KEYID = 6
1,515,396 UART: [ldev] SUBJECT.KEYID = 5
1,515,822 UART: [ldev] AUTHORITY.KEYID = 7
1,516,285 UART: [ldev] FE.KEYID = 1
1,521,171 UART: [ldev] Erasing FE.KEYID = 1
1,546,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,126 UART: [ldev] --
1,585,539 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 114084 bytes
2,881,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,106 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,458 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,019 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,748 >>> mbox cmd response: failed
1,180,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,754 >>> mbox cmd response: failed
1,180,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,763 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,891 >>> mbox cmd response: failed
1,180,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,897 >>> mbox cmd response: failed
1,180,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,743 UART: [kat] SHA2-512-ACC
897,644 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,053 UART: [idev] Erasing UDS.KEYID = 0
1,505,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,943 UART: [idev] --
1,514,988 UART: [ldev] ++
1,515,156 UART: [ldev] CDI.KEYID = 6
1,515,519 UART: [ldev] SUBJECT.KEYID = 5
1,515,945 UART: [ldev] AUTHORITY.KEYID = 7
1,516,408 UART: [ldev] FE.KEYID = 1
1,521,788 UART: [ldev] Erasing FE.KEYID = 1
1,547,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,795 UART: [ldev] --
1,587,144 UART: [fwproc] Waiting for Commands...
1,588,013 UART: [fwproc] Received command 0x46574c44
1,588,804 UART: [fwproc] Received Image of size 114084 bytes
2,884,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,837 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,588 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,013 >>> mbox cmd response: failed
1,180,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,019 >>> mbox cmd response: failed
1,180,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,916 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,875 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,108 >>> mbox cmd response: failed
1,179,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,114 >>> mbox cmd response: failed
1,179,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [kat] SHA2-256
892,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,111 UART: [kat] ++
897,263 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
906,210 UART: [kat] SHA2-512-ACC
908,111 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,518 UART: [kat] LMS
1,170,846 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,123 UART: [fht] FHT @ 0x50003400
1,174,742 UART: [idev] ++
1,174,910 UART: [idev] CDI.KEYID = 6
1,175,270 UART: [idev] SUBJECT.KEYID = 7
1,175,694 UART: [idev] UDS.KEYID = 0
1,176,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,229 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,112 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,176 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,276 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,608 >>> mbox cmd response: failed
1,178,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,614 >>> mbox cmd response: failed
1,178,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,993 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,289 >>> mbox cmd response: failed
1,180,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,295 >>> mbox cmd response: failed
1,180,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,983 UART: [kat] SHA2-512-ACC
908,884 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,373 UART: [kat] LMS
1,171,701 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,172,994 UART: [fht] FHT @ 0x50003400
1,175,711 UART: [idev] ++
1,175,879 UART: [idev] CDI.KEYID = 6
1,176,239 UART: [idev] SUBJECT.KEYID = 7
1,176,663 UART: [idev] UDS.KEYID = 0
1,177,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,326 UART: [ldev] ++
1,211,494 UART: [ldev] CDI.KEYID = 6
1,211,857 UART: [ldev] SUBJECT.KEYID = 5
1,212,283 UART: [ldev] AUTHORITY.KEYID = 7
1,212,746 UART: [ldev] FE.KEYID = 1
1,217,998 UART: [ldev] Erasing FE.KEYID = 1
1,244,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,466 UART: [ldev] --
1,283,829 UART: [fwproc] Wait for Commands...
1,284,511 UART: [fwproc] Recv command 0x46574c44
1,285,239 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,277 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,817 >>> mbox cmd response: failed
1,179,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,823 >>> mbox cmd response: failed
1,179,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,210 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,040 >>> mbox cmd response: failed
1,178,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,046 >>> mbox cmd response: failed
1,178,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
915,484 UART: [kat] HMAC-384Kdf
919,866 UART: [kat] LMS
1,168,178 UART: [kat] --
1,168,951 UART: [cold-reset] ++
1,169,319 UART: [fht] FHT @ 0x50003400
1,171,839 UART: [idev] ++
1,172,007 UART: [idev] CDI.KEYID = 6
1,172,368 UART: [idev] SUBJECT.KEYID = 7
1,172,793 UART: [idev] UDS.KEYID = 0
1,173,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,149 UART: [idev] Sha1 KeyId Algorithm
1,207,027 UART: [idev] --
1,208,254 UART: [ldev] ++
1,208,422 UART: [ldev] CDI.KEYID = 6
1,208,786 UART: [ldev] SUBJECT.KEYID = 5
1,209,213 UART: [ldev] AUTHORITY.KEYID = 7
1,209,676 UART: [ldev] FE.KEYID = 1
1,215,074 UART: [ldev] Erasing FE.KEYID = 1
1,240,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,280,983 UART: [fwproc] Recv command 0x46574c44
1,281,716 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,436 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,354 >>> mbox cmd response: failed
1,178,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,360 >>> mbox cmd response: failed
1,178,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,478 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,208 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,952 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,627 >>> mbox cmd response: failed
1,180,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,633 >>> mbox cmd response: failed
1,180,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
891,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,970 UART: [kat] ++
896,122 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
905,083 UART: [kat] SHA2-512-ACC
906,984 UART: [kat] ECC-384
916,677 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,171,002 UART: [fht] FHT @ 0x50003400
1,173,726 UART: [idev] ++
1,173,894 UART: [idev] CDI.KEYID = 6
1,174,255 UART: [idev] SUBJECT.KEYID = 7
1,174,680 UART: [idev] UDS.KEYID = 0
1,175,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,616 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,443 UART: [ldev] SUBJECT.KEYID = 5
1,210,870 UART: [ldev] AUTHORITY.KEYID = 7
1,211,333 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,715 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,460 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,183 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,981 >>> mbox cmd response: failed
1,180,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,987 >>> mbox cmd response: failed
1,180,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,521 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,276 UART:
192,648 UART: Running Caliptra ROM ...
193,838 UART:
193,984 UART: [state] CFI Enabled
260,415 UART: [state] LifecycleState = Unprovisioned
262,349 UART: [state] DebugLocked = No
264,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,860 UART: [kat] SHA2-256
439,539 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,034 UART: [kat] ++
450,532 UART: [kat] sha1
462,298 UART: [kat] SHA2-256
464,942 UART: [kat] SHA2-384
469,678 UART: [kat] SHA2-512-ACC
472,072 UART: [kat] ECC-384
2,767,627 UART: [kat] HMAC-384Kdf
2,799,410 UART: [kat] LMS
3,989,711 UART: [kat] --
3,994,913 UART: [cold-reset] ++
3,996,253 UART: [fht] Storing FHT @ 0x50003400
4,008,777 UART: [idev] ++
4,009,371 UART: [idev] CDI.KEYID = 6
4,010,395 UART: [idev] SUBJECT.KEYID = 7
4,011,559 UART: [idev] UDS.KEYID = 0
4,017,088 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,160,423 UART: [idev] Erasing UDS.KEYID = 0
7,349,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,840 UART: [idev] --
7,374,916 UART: [ldev] ++
7,375,490 UART: [ldev] CDI.KEYID = 6
7,376,461 UART: [ldev] SUBJECT.KEYID = 5
7,377,680 UART: [ldev] AUTHORITY.KEYID = 7
7,378,916 UART: [ldev] FE.KEYID = 1
7,422,486 UART: [ldev] Erasing FE.KEYID = 1
10,756,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,880 UART: [ldev] --
13,135,208 UART: [fwproc] Waiting for Commands...
13,138,279 UART: [fwproc] Received command 0x46574c44
13,140,486 UART: [fwproc] Received Image of size 113760 bytes
13,205,940 UART: ROM Fatal Error: 0x000B0007
13,209,401 >>> mbox cmd response: failed
13,209,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,165 >>> mbox cmd response: failed
13,210,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,210,723 >>> mbox cmd response: failed
Initializing fuses
2,051,898 writing to cptra_bootfsm_go
2,241,345 UART:
2,241,696 UART: Running Caliptra ROM ...
2,242,748 UART:
2,242,901 UART: [state] CFI Enabled
2,305,517 UART: [state] LifecycleState = Unprovisioned
2,307,485 UART: [state] DebugLocked = No
2,310,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,381 UART: [kat] SHA2-256
2,485,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,561 UART: [kat] ++
2,496,109 UART: [kat] sha1
2,507,385 UART: [kat] SHA2-256
2,510,074 UART: [kat] SHA2-384
2,515,202 UART: [kat] SHA2-512-ACC
2,517,563 UART: [kat] ECC-384
4,806,570 UART: [kat] HMAC-384Kdf
4,819,687 UART: [kat] LMS
6,009,969 UART: [kat] --
6,015,987 UART: [cold-reset] ++
6,017,659 UART: [fht] Storing FHT @ 0x50003400
6,028,984 UART: [idev] ++
6,029,547 UART: [idev] CDI.KEYID = 6
6,030,485 UART: [idev] SUBJECT.KEYID = 7
6,031,756 UART: [idev] UDS.KEYID = 0
6,034,352 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,177,572 UART: [idev] Erasing UDS.KEYID = 0
9,366,058 UART: [idev] Using Sha1 for KeyId Algorithm
9,386,898 UART: [idev] --
9,391,535 UART: [ldev] ++
9,392,110 UART: [ldev] CDI.KEYID = 6
9,393,078 UART: [ldev] SUBJECT.KEYID = 5
9,394,286 UART: [ldev] AUTHORITY.KEYID = 7
9,395,550 UART: [ldev] FE.KEYID = 1
9,441,225 UART: [ldev] Erasing FE.KEYID = 1
12,775,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,088,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,102,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,117,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,131,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,150,944 UART: [ldev] --
15,156,557 UART: [fwproc] Waiting for Commands...
15,158,714 UART: [fwproc] Received command 0x46574c44
15,160,899 UART: [fwproc] Received Image of size 113760 bytes
19,205,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,285,342 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,354,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,670,929 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,807,042 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,920,907 >>> mbox cmd response: failed
12,921,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,808 >>> mbox cmd response: failed
12,922,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,401 >>> mbox cmd response: failed
Initializing fuses
2,058,816 writing to cptra_bootfsm_go
5,837,507 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,886,458 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,404 UART:
192,772 UART: Running Caliptra ROM ...
193,873 UART:
603,521 UART: [state] CFI Enabled
616,848 UART: [state] LifecycleState = Unprovisioned
618,787 UART: [state] DebugLocked = No
621,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,927 UART: [kat] SHA2-256
796,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,238 UART: [kat] ++
807,713 UART: [kat] sha1
819,690 UART: [kat] SHA2-256
822,385 UART: [kat] SHA2-384
826,851 UART: [kat] SHA2-512-ACC
829,301 UART: [kat] ECC-384
3,113,718 UART: [kat] HMAC-384Kdf
3,124,930 UART: [kat] LMS
4,315,062 UART: [kat] --
4,320,802 UART: [cold-reset] ++
4,322,419 UART: [fht] Storing FHT @ 0x50003400
4,333,418 UART: [idev] ++
4,333,985 UART: [idev] CDI.KEYID = 6
4,334,948 UART: [idev] SUBJECT.KEYID = 7
4,336,162 UART: [idev] UDS.KEYID = 0
4,341,787 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,927 UART: [idev] Erasing UDS.KEYID = 0
7,623,789 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,120 UART: [idev] --
7,647,919 UART: [ldev] ++
7,648,503 UART: [ldev] CDI.KEYID = 6
7,649,395 UART: [ldev] SUBJECT.KEYID = 5
7,650,585 UART: [ldev] AUTHORITY.KEYID = 7
7,651,924 UART: [ldev] FE.KEYID = 1
7,663,083 UART: [ldev] Erasing FE.KEYID = 1
10,950,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,088 UART: [ldev] --
13,313,156 UART: [fwproc] Waiting for Commands...
13,315,462 UART: [fwproc] Received command 0x46574c44
13,317,693 UART: [fwproc] Received Image of size 113760 bytes
13,387,243 UART: ROM Fatal Error: 0x000B0007
13,390,724 >>> mbox cmd response: failed
13,391,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,545 >>> mbox cmd response: failed
13,391,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,392,108 >>> mbox cmd response: failed
Initializing fuses
2,054,347 writing to cptra_bootfsm_go
2,243,689 UART:
2,244,044 UART: Running Caliptra ROM ...
2,245,185 UART:
7,082,278 UART: [state] CFI Enabled
7,097,197 UART: [state] LifecycleState = Unprovisioned
7,099,112 UART: [state] DebugLocked = No
7,101,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,106,399 UART: [kat] SHA2-256
7,276,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,286,686 UART: [kat] ++
7,287,151 UART: [kat] sha1
7,299,282 UART: [kat] SHA2-256
7,301,978 UART: [kat] SHA2-384
7,307,965 UART: [kat] SHA2-512-ACC
7,310,319 UART: [kat] ECC-384
9,593,094 UART: [kat] HMAC-384Kdf
9,604,960 UART: [kat] LMS
10,795,039 UART: [kat] --
10,801,566 UART: [cold-reset] ++
10,804,062 UART: [fht] Storing FHT @ 0x50003400
10,815,011 UART: [idev] ++
10,815,577 UART: [idev] CDI.KEYID = 6
10,816,511 UART: [idev] SUBJECT.KEYID = 7
10,817,771 UART: [idev] UDS.KEYID = 0
10,820,509 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,963,531 UART: [idev] Erasing UDS.KEYID = 0
14,105,626 UART: [idev] Using Sha1 for KeyId Algorithm
14,128,035 UART: [idev] --
14,131,872 UART: [ldev] ++
14,132,440 UART: [ldev] CDI.KEYID = 6
14,133,403 UART: [ldev] SUBJECT.KEYID = 5
14,134,650 UART: [ldev] AUTHORITY.KEYID = 7
14,135,904 UART: [ldev] FE.KEYID = 1
14,147,471 UART: [ldev] Erasing FE.KEYID = 1
17,434,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,725,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,740,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,755,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,769,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,788,398 UART: [ldev] --
19,793,608 UART: [fwproc] Waiting for Commands...
19,795,812 UART: [fwproc] Received command 0x46574c44
19,797,998 UART: [fwproc] Received Image of size 113760 bytes
23,838,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,916,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,985,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,301,584 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,130,947 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,127,602 >>> mbox cmd response: failed
13,128,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,128,736 >>> mbox cmd response: failed
13,129,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,129,325 >>> mbox cmd response: failed
Initializing fuses
2,053,773 writing to cptra_bootfsm_go
10,865,374 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,791,024 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,133 UART:
192,511 UART: Running Caliptra ROM ...
193,626 UART:
193,766 UART: [state] CFI Enabled
263,984 UART: [state] LifecycleState = Unprovisioned
265,907 UART: [state] DebugLocked = No
268,802 UART: [state] WD Timer not started. Device not locked for debugging
272,573 UART: [kat] SHA2-256
451,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,267 UART: [kat] ++
463,800 UART: [kat] sha1
474,689 UART: [kat] SHA2-256
477,697 UART: [kat] SHA2-384
482,864 UART: [kat] SHA2-512-ACC
485,817 UART: [kat] ECC-384
2,951,608 UART: [kat] HMAC-384Kdf
2,972,649 UART: [kat] LMS
3,502,080 UART: [kat] --
3,505,494 UART: [cold-reset] ++
3,506,565 UART: [fht] FHT @ 0x50003400
3,515,924 UART: [idev] ++
3,516,501 UART: [idev] CDI.KEYID = 6
3,517,386 UART: [idev] SUBJECT.KEYID = 7
3,518,606 UART: [idev] UDS.KEYID = 0
3,521,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,939 UART: [idev] Erasing UDS.KEYID = 0
6,027,150 UART: [idev] Sha1 KeyId Algorithm
6,050,366 UART: [idev] --
6,054,874 UART: [ldev] ++
6,055,461 UART: [ldev] CDI.KEYID = 6
6,056,370 UART: [ldev] SUBJECT.KEYID = 5
6,057,545 UART: [ldev] AUTHORITY.KEYID = 7
6,058,782 UART: [ldev] FE.KEYID = 1
6,103,093 UART: [ldev] Erasing FE.KEYID = 1
8,606,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,994 UART: [ldev] --
10,417,286 UART: [fwproc] Wait for Commands...
10,419,226 UART: [fwproc] Recv command 0x46574c44
10,421,272 UART: [fwproc] Recv'd Img size: 114084 bytes
10,487,965 UART: ROM Fatal Error: 0x000B0007
10,491,105 >>> mbox cmd response: failed
10,491,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,913 >>> mbox cmd response: failed
10,492,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,588 >>> mbox cmd response: failed
Initializing fuses
2,061,265 writing to cptra_bootfsm_go
2,250,589 UART:
2,250,942 UART: Running Caliptra ROM ...
2,252,074 UART:
2,252,239 UART: [state] CFI Enabled
2,311,681 UART: [state] LifecycleState = Unprovisioned
2,313,564 UART: [state] DebugLocked = No
2,315,443 UART: [state] WD Timer not started. Device not locked for debugging
2,319,259 UART: [kat] SHA2-256
2,498,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,984 UART: [kat] ++
2,510,526 UART: [kat] sha1
2,521,582 UART: [kat] SHA2-256
2,524,610 UART: [kat] SHA2-384
2,530,059 UART: [kat] SHA2-512-ACC
2,533,009 UART: [kat] ECC-384
4,998,076 UART: [kat] HMAC-384Kdf
5,019,764 UART: [kat] LMS
5,549,188 UART: [kat] --
5,555,244 UART: [cold-reset] ++
5,557,447 UART: [fht] FHT @ 0x50003400
5,568,909 UART: [idev] ++
5,569,476 UART: [idev] CDI.KEYID = 6
5,570,456 UART: [idev] SUBJECT.KEYID = 7
5,571,634 UART: [idev] UDS.KEYID = 0
5,574,303 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,717,914 UART: [idev] Erasing UDS.KEYID = 0
8,073,822 UART: [idev] Sha1 KeyId Algorithm
8,097,745 UART: [idev] --
8,101,738 UART: [ldev] ++
8,102,321 UART: [ldev] CDI.KEYID = 6
8,103,231 UART: [ldev] SUBJECT.KEYID = 5
8,104,501 UART: [ldev] AUTHORITY.KEYID = 7
8,105,706 UART: [ldev] FE.KEYID = 1
8,148,527 UART: [ldev] Erasing FE.KEYID = 1
10,653,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,459 UART: [ldev] --
12,463,970 UART: [fwproc] Wait for Commands...
12,466,344 UART: [fwproc] Recv command 0x46574c44
12,468,442 UART: [fwproc] Recv'd Img size: 114084 bytes
15,869,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,889 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,009,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,327,248 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,383,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,272,151 >>> mbox cmd response: failed
10,273,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,273,418 >>> mbox cmd response: failed
10,273,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,273,977 >>> mbox cmd response: failed
Initializing fuses
2,051,331 writing to cptra_bootfsm_go
5,398,469 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,093,675 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,457 UART:
192,841 UART: Running Caliptra ROM ...
193,954 UART:
603,706 UART: [state] CFI Enabled
614,027 UART: [state] LifecycleState = Unprovisioned
615,918 UART: [state] DebugLocked = No
617,351 UART: [state] WD Timer not started. Device not locked for debugging
620,871 UART: [kat] SHA2-256
799,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,519 UART: [kat] ++
812,051 UART: [kat] sha1
823,640 UART: [kat] SHA2-256
826,703 UART: [kat] SHA2-384
831,736 UART: [kat] SHA2-512-ACC
834,735 UART: [kat] ECC-384
3,275,741 UART: [kat] HMAC-384Kdf
3,288,615 UART: [kat] LMS
3,818,128 UART: [kat] --
3,822,438 UART: [cold-reset] ++
3,824,957 UART: [fht] FHT @ 0x50003400
3,836,901 UART: [idev] ++
3,837,465 UART: [idev] CDI.KEYID = 6
3,838,401 UART: [idev] SUBJECT.KEYID = 7
3,839,632 UART: [idev] UDS.KEYID = 0
3,842,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,368 UART: [idev] Erasing UDS.KEYID = 0
6,315,574 UART: [idev] Sha1 KeyId Algorithm
6,338,702 UART: [idev] --
6,343,240 UART: [ldev] ++
6,343,809 UART: [ldev] CDI.KEYID = 6
6,344,717 UART: [ldev] SUBJECT.KEYID = 5
6,345,934 UART: [ldev] AUTHORITY.KEYID = 7
6,347,373 UART: [ldev] FE.KEYID = 1
6,358,092 UART: [ldev] Erasing FE.KEYID = 1
8,832,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,498 UART: [ldev] --
10,624,657 UART: [fwproc] Wait for Commands...
10,626,267 UART: [fwproc] Recv command 0x46574c44
10,628,368 UART: [fwproc] Recv'd Img size: 114084 bytes
10,697,900 UART: ROM Fatal Error: 0x000B0007
10,701,032 >>> mbox cmd response: failed
10,701,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,701,686 >>> mbox cmd response: failed
10,701,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,702,277 >>> mbox cmd response: failed
Initializing fuses
2,051,477 writing to cptra_bootfsm_go
2,240,807 UART:
2,241,165 UART: Running Caliptra ROM ...
2,242,214 UART:
9,766,689 UART: [state] CFI Enabled
9,777,944 UART: [state] LifecycleState = Unprovisioned
9,779,794 UART: [state] DebugLocked = No
9,782,448 UART: [state] WD Timer not started. Device not locked for debugging
9,786,127 UART: [kat] SHA2-256
9,965,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,976,788 UART: [kat] ++
9,977,246 UART: [kat] sha1
9,988,400 UART: [kat] SHA2-256
9,991,418 UART: [kat] SHA2-384
9,997,623 UART: [kat] SHA2-512-ACC
10,000,617 UART: [kat] ECC-384
12,442,740 UART: [kat] HMAC-384Kdf
12,455,202 UART: [kat] LMS
12,984,671 UART: [kat] --
12,989,198 UART: [cold-reset] ++
12,991,662 UART: [fht] FHT @ 0x50003400
13,002,308 UART: [idev] ++
13,002,885 UART: [idev] CDI.KEYID = 6
13,003,800 UART: [idev] SUBJECT.KEYID = 7
13,005,114 UART: [idev] UDS.KEYID = 0
13,007,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,151,054 UART: [idev] Erasing UDS.KEYID = 0
15,475,006 UART: [idev] Sha1 KeyId Algorithm
15,497,324 UART: [idev] --
15,500,861 UART: [ldev] ++
15,501,437 UART: [ldev] CDI.KEYID = 6
15,502,351 UART: [ldev] SUBJECT.KEYID = 5
15,503,563 UART: [ldev] AUTHORITY.KEYID = 7
15,504,813 UART: [ldev] FE.KEYID = 1
15,513,890 UART: [ldev] Erasing FE.KEYID = 1
17,984,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,701,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,717,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,732,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,748,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,213 UART: [ldev] --
19,775,052 UART: [fwproc] Wait for Commands...
19,777,859 UART: [fwproc] Recv command 0x46574c44
19,779,899 UART: [fwproc] Recv'd Img size: 114084 bytes
23,180,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,258,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,326,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,644,856 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,698,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,478,605 >>> mbox cmd response: failed
10,479,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,654 >>> mbox cmd response: failed
10,479,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,239 >>> mbox cmd response: failed
Initializing fuses
2,052,198 writing to cptra_bootfsm_go
13,097,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,657,188 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,109 UART:
192,478 UART: Running Caliptra ROM ...
193,622 UART:
193,767 UART: [state] CFI Enabled
263,739 UART: [state] LifecycleState = Unprovisioned
266,146 UART: [state] DebugLocked = No
268,394 UART: [state] WD Timer not started. Device not locked for debugging
272,987 UART: [kat] SHA2-256
462,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,624 UART: [kat] ++
474,076 UART: [kat] sha1
484,656 UART: [kat] SHA2-256
487,670 UART: [kat] SHA2-384
493,716 UART: [kat] SHA2-512-ACC
496,335 UART: [kat] ECC-384
2,949,546 UART: [kat] HMAC-384Kdf
2,972,327 UART: [kat] LMS
3,504,076 UART: [kat] --
3,507,746 UART: [cold-reset] ++
3,509,955 UART: [fht] FHT @ 0x50003400
3,521,587 UART: [idev] ++
3,522,265 UART: [idev] CDI.KEYID = 6
3,523,205 UART: [idev] SUBJECT.KEYID = 7
3,524,420 UART: [idev] UDS.KEYID = 0
3,529,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,674,205 UART: [idev] Erasing UDS.KEYID = 0
6,028,610 UART: [idev] Sha1 KeyId Algorithm
6,049,648 UART: [idev] --
6,052,999 UART: [ldev] ++
6,053,687 UART: [ldev] CDI.KEYID = 6
6,054,576 UART: [ldev] SUBJECT.KEYID = 5
6,055,796 UART: [ldev] AUTHORITY.KEYID = 7
6,056,978 UART: [ldev] FE.KEYID = 1
6,100,016 UART: [ldev] Erasing FE.KEYID = 1
8,602,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,645 UART: [ldev] --
10,414,191 UART: [fwproc] Wait for Commands...
10,415,754 UART: [fwproc] Recv command 0x46574c44
10,418,041 UART: [fwproc] Recv'd Img size: 114084 bytes
10,515,220 UART: ROM Fatal Error: 0x000B0007
10,518,866 >>> mbox cmd response: failed
10,519,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,519,598 >>> mbox cmd response: failed
10,519,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,159 >>> mbox cmd response: failed
Initializing fuses
2,052,916 writing to cptra_bootfsm_go
2,242,252 UART:
2,242,625 UART: Running Caliptra ROM ...
2,243,673 UART:
2,243,827 UART: [state] CFI Enabled
2,308,678 UART: [state] LifecycleState = Unprovisioned
2,311,052 UART: [state] DebugLocked = No
2,313,639 UART: [state] WD Timer not started. Device not locked for debugging
2,318,318 UART: [kat] SHA2-256
2,508,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,006 UART: [kat] ++
2,519,558 UART: [kat] sha1
2,530,724 UART: [kat] SHA2-256
2,533,748 UART: [kat] SHA2-384
2,539,421 UART: [kat] SHA2-512-ACC
2,542,029 UART: [kat] ECC-384
4,990,985 UART: [kat] HMAC-384Kdf
5,016,215 UART: [kat] LMS
5,547,968 UART: [kat] --
5,553,796 UART: [cold-reset] ++
5,554,755 UART: [fht] FHT @ 0x50003400
5,566,635 UART: [idev] ++
5,567,307 UART: [idev] CDI.KEYID = 6
5,568,245 UART: [idev] SUBJECT.KEYID = 7
5,569,458 UART: [idev] UDS.KEYID = 0
5,572,260 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,716,248 UART: [idev] Erasing UDS.KEYID = 0
8,072,019 UART: [idev] Sha1 KeyId Algorithm
8,095,162 UART: [idev] --
8,100,834 UART: [ldev] ++
8,101,515 UART: [ldev] CDI.KEYID = 6
8,102,396 UART: [ldev] SUBJECT.KEYID = 5
8,103,608 UART: [ldev] AUTHORITY.KEYID = 7
8,104,861 UART: [ldev] FE.KEYID = 1
8,143,123 UART: [ldev] Erasing FE.KEYID = 1
10,654,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,985 UART: [ldev] --
12,458,625 UART: [fwproc] Wait for Commands...
12,460,509 UART: [fwproc] Recv command 0x46574c44
12,462,874 UART: [fwproc] Recv'd Img size: 114084 bytes
15,898,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,979,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,095,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,636,778 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,451,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,325,987 >>> mbox cmd response: failed
10,326,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,932 >>> mbox cmd response: failed
10,327,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,327,492 >>> mbox cmd response: failed
Initializing fuses
2,056,885 writing to cptra_bootfsm_go
5,471,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,756,850 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,651 UART:
193,013 UART: Running Caliptra ROM ...
194,217 UART:
603,905 UART: [state] CFI Enabled
613,462 UART: [state] LifecycleState = Unprovisioned
615,832 UART: [state] DebugLocked = No
618,667 UART: [state] WD Timer not started. Device not locked for debugging
623,412 UART: [kat] SHA2-256
813,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,115 UART: [kat] ++
824,617 UART: [kat] sha1
835,405 UART: [kat] SHA2-256
838,472 UART: [kat] SHA2-384
844,829 UART: [kat] SHA2-512-ACC
847,382 UART: [kat] ECC-384
3,288,399 UART: [kat] HMAC-384Kdf
3,302,529 UART: [kat] LMS
3,834,327 UART: [kat] --
3,839,882 UART: [cold-reset] ++
3,841,001 UART: [fht] FHT @ 0x50003400
3,853,179 UART: [idev] ++
3,853,855 UART: [idev] CDI.KEYID = 6
3,854,822 UART: [idev] SUBJECT.KEYID = 7
3,856,033 UART: [idev] UDS.KEYID = 0
3,861,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,963 UART: [idev] Erasing UDS.KEYID = 0
6,333,434 UART: [idev] Sha1 KeyId Algorithm
6,355,219 UART: [idev] --
6,361,371 UART: [ldev] ++
6,362,111 UART: [ldev] CDI.KEYID = 6
6,363,026 UART: [ldev] SUBJECT.KEYID = 5
6,364,190 UART: [ldev] AUTHORITY.KEYID = 7
6,365,368 UART: [ldev] FE.KEYID = 1
6,378,062 UART: [ldev] Erasing FE.KEYID = 1
8,851,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,795 UART: [ldev] --
10,641,692 UART: [fwproc] Wait for Commands...
10,644,709 UART: [fwproc] Recv command 0x46574c44
10,647,040 UART: [fwproc] Recv'd Img size: 114084 bytes
10,747,806 UART: ROM Fatal Error: 0x000B0007
10,751,486 >>> mbox cmd response: failed
10,751,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,752,202 >>> mbox cmd response: failed
10,752,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,752,756 >>> mbox cmd response: failed
Initializing fuses
2,062,584 writing to cptra_bootfsm_go
2,251,906 UART:
2,252,250 UART: Running Caliptra ROM ...
2,253,389 UART:
9,710,428 UART: [state] CFI Enabled
9,723,580 UART: [state] LifecycleState = Unprovisioned
9,725,925 UART: [state] DebugLocked = No
9,728,479 UART: [state] WD Timer not started. Device not locked for debugging
9,733,627 UART: [kat] SHA2-256
9,923,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,934,247 UART: [kat] ++
9,934,763 UART: [kat] sha1
9,945,334 UART: [kat] SHA2-256
9,948,360 UART: [kat] SHA2-384
9,954,766 UART: [kat] SHA2-512-ACC
9,957,343 UART: [kat] ECC-384
12,399,535 UART: [kat] HMAC-384Kdf
12,411,902 UART: [kat] LMS
12,943,733 UART: [kat] --
12,948,171 UART: [cold-reset] ++
12,950,808 UART: [fht] FHT @ 0x50003400
12,961,571 UART: [idev] ++
12,962,247 UART: [idev] CDI.KEYID = 6
12,963,217 UART: [idev] SUBJECT.KEYID = 7
12,964,376 UART: [idev] UDS.KEYID = 0
12,967,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,111,122 UART: [idev] Erasing UDS.KEYID = 0
15,445,526 UART: [idev] Sha1 KeyId Algorithm
15,467,231 UART: [idev] --
15,471,276 UART: [ldev] ++
15,471,969 UART: [ldev] CDI.KEYID = 6
15,472,880 UART: [ldev] SUBJECT.KEYID = 5
15,474,042 UART: [ldev] AUTHORITY.KEYID = 7
15,475,297 UART: [ldev] FE.KEYID = 1
15,487,701 UART: [ldev] Erasing FE.KEYID = 1
17,965,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,685,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,730,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,750,910 UART: [ldev] --
19,756,876 UART: [fwproc] Wait for Commands...
19,760,113 UART: [fwproc] Recv command 0x46574c44
19,762,371 UART: [fwproc] Recv'd Img size: 114084 bytes
23,197,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,276,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,392,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,932,831 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,756,824 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,524,377 >>> mbox cmd response: failed
10,525,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,367 >>> mbox cmd response: failed
10,525,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,987 >>> mbox cmd response: failed
Initializing fuses
2,059,581 writing to cptra_bootfsm_go
13,095,944 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,280,729 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,100 UART: [kat] HMAC-384Kdf
906,634 UART: [kat] LMS
1,474,830 UART: [kat] --
1,475,809 UART: [cold-reset] ++
1,476,225 UART: [fht] Storing FHT @ 0x50003400
1,479,190 UART: [idev] ++
1,479,358 UART: [idev] CDI.KEYID = 6
1,479,718 UART: [idev] SUBJECT.KEYID = 7
1,480,142 UART: [idev] UDS.KEYID = 0
1,480,487 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,922 UART: [idev] Erasing UDS.KEYID = 0
1,504,344 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,994 UART: [idev] --
1,513,901 UART: [ldev] ++
1,514,069 UART: [ldev] CDI.KEYID = 6
1,514,432 UART: [ldev] SUBJECT.KEYID = 5
1,514,858 UART: [ldev] AUTHORITY.KEYID = 7
1,515,321 UART: [ldev] FE.KEYID = 1
1,520,423 UART: [ldev] Erasing FE.KEYID = 1
1,546,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,230 UART: [ldev] --
1,585,599 UART: [fwproc] Waiting for Commands...
1,586,288 UART: [fwproc] Received command 0x46574c44
1,587,079 UART: [fwproc] Received Image of size 114084 bytes
1,611,248 UART: ROM Fatal Error: 0x000B0007
1,612,405 >>> mbox cmd response: failed
1,612,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,411 >>> mbox cmd response: failed
1,612,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,584 UART: [state] LifecycleState = Unprovisioned
85,239 UART: [state] DebugLocked = No
85,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,545 UART: [kat] SHA2-256
881,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,591 UART: [kat] ++
885,743 UART: [kat] sha1
889,855 UART: [kat] SHA2-256
891,793 UART: [kat] SHA2-384
894,542 UART: [kat] SHA2-512-ACC
896,443 UART: [kat] ECC-384
902,092 UART: [kat] HMAC-384Kdf
906,776 UART: [kat] LMS
1,474,972 UART: [kat] --
1,475,747 UART: [cold-reset] ++
1,476,261 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,898 UART: [idev] Erasing UDS.KEYID = 0
1,504,334 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,946 UART: [idev] --
1,513,831 UART: [ldev] ++
1,513,999 UART: [ldev] CDI.KEYID = 6
1,514,362 UART: [ldev] SUBJECT.KEYID = 5
1,514,788 UART: [ldev] AUTHORITY.KEYID = 7
1,515,251 UART: [ldev] FE.KEYID = 1
1,520,307 UART: [ldev] Erasing FE.KEYID = 1
1,545,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,136 UART: [ldev] --
1,584,649 UART: [fwproc] Waiting for Commands...
1,585,500 UART: [fwproc] Received command 0x46574c44
1,586,291 UART: [fwproc] Received Image of size 114084 bytes
2,882,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,116 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,468 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,939 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,464,696 >>> mbox cmd response: failed
1,464,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,702 >>> mbox cmd response: failed
1,464,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,741 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,122 UART: [kat] SHA2-256
882,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,168 UART: [kat] ++
886,320 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
902,673 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,254 UART: [cold-reset] ++
1,476,654 UART: [fht] Storing FHT @ 0x50003400
1,479,349 UART: [idev] ++
1,479,517 UART: [idev] CDI.KEYID = 6
1,479,877 UART: [idev] SUBJECT.KEYID = 7
1,480,301 UART: [idev] UDS.KEYID = 0
1,480,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,483 UART: [idev] Erasing UDS.KEYID = 0
1,504,561 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,069 UART: [idev] --
1,514,060 UART: [ldev] ++
1,514,228 UART: [ldev] CDI.KEYID = 6
1,514,591 UART: [ldev] SUBJECT.KEYID = 5
1,515,017 UART: [ldev] AUTHORITY.KEYID = 7
1,515,480 UART: [ldev] FE.KEYID = 1
1,520,958 UART: [ldev] Erasing FE.KEYID = 1
1,546,627 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,765 UART: [ldev] --
1,586,194 UART: [fwproc] Waiting for Commands...
1,586,825 UART: [fwproc] Received command 0x46574c44
1,587,616 UART: [fwproc] Received Image of size 114084 bytes
1,611,627 UART: ROM Fatal Error: 0x000B0007
1,612,784 >>> mbox cmd response: failed
1,612,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,790 >>> mbox cmd response: failed
1,612,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,796 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,596 UART: [kat] SHA2-256
882,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,642 UART: [kat] ++
886,794 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,745 UART: [kat] SHA2-512-ACC
897,646 UART: [kat] ECC-384
903,117 UART: [kat] HMAC-384Kdf
907,567 UART: [kat] LMS
1,475,763 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,225 UART: [idev] ++
1,480,393 UART: [idev] CDI.KEYID = 6
1,480,753 UART: [idev] SUBJECT.KEYID = 7
1,481,177 UART: [idev] UDS.KEYID = 0
1,481,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,241 UART: [idev] --
1,515,218 UART: [ldev] ++
1,515,386 UART: [ldev] CDI.KEYID = 6
1,515,749 UART: [ldev] SUBJECT.KEYID = 5
1,516,175 UART: [ldev] AUTHORITY.KEYID = 7
1,516,638 UART: [ldev] FE.KEYID = 1
1,522,006 UART: [ldev] Erasing FE.KEYID = 1
1,547,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,905 UART: [ldev] --
1,586,364 UART: [fwproc] Waiting for Commands...
1,587,089 UART: [fwproc] Received command 0x46574c44
1,587,880 UART: [fwproc] Received Image of size 114084 bytes
2,881,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,965 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,317 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,774 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,465,469 >>> mbox cmd response: failed
1,465,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,475 >>> mbox cmd response: failed
1,465,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,828 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,870 UART: [kat] HMAC-384Kdf
922,584 UART: [kat] LMS
1,170,912 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,159 UART: [fht] FHT @ 0x50003400
1,174,848 UART: [idev] ++
1,175,016 UART: [idev] CDI.KEYID = 6
1,175,376 UART: [idev] SUBJECT.KEYID = 7
1,175,800 UART: [idev] UDS.KEYID = 0
1,176,145 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,237 UART: [idev] Sha1 KeyId Algorithm
1,208,599 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,166 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,381 UART: ROM Fatal Error: 0x000B0007
1,308,538 >>> mbox cmd response: failed
1,308,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,544 >>> mbox cmd response: failed
1,308,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
893,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,733 UART: [kat] ++
897,885 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,732 UART: [kat] SHA2-512-ACC
908,633 UART: [kat] ECC-384
918,488 UART: [kat] HMAC-384Kdf
923,132 UART: [kat] LMS
1,171,460 UART: [kat] --
1,172,461 UART: [cold-reset] ++
1,172,969 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,334 UART: [idev] Erasing UDS.KEYID = 0
1,201,391 UART: [idev] Sha1 KeyId Algorithm
1,209,895 UART: [idev] --
1,210,951 UART: [ldev] ++
1,211,119 UART: [ldev] CDI.KEYID = 6
1,211,482 UART: [ldev] SUBJECT.KEYID = 5
1,211,908 UART: [ldev] AUTHORITY.KEYID = 7
1,212,371 UART: [ldev] FE.KEYID = 1
1,217,467 UART: [ldev] Erasing FE.KEYID = 1
1,243,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,829 UART: [ldev] --
1,283,116 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,208 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,162,441 >>> mbox cmd response: failed
1,162,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,447 >>> mbox cmd response: failed
1,162,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,279 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,107 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
893,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,428 UART: [kat] ++
897,580 UART: [kat] sha1
901,850 UART: [kat] SHA2-256
903,790 UART: [kat] SHA2-384
906,561 UART: [kat] SHA2-512-ACC
908,462 UART: [kat] ECC-384
917,911 UART: [kat] HMAC-384Kdf
922,383 UART: [kat] LMS
1,170,711 UART: [kat] --
1,171,654 UART: [cold-reset] ++
1,172,034 UART: [fht] FHT @ 0x50003400
1,174,809 UART: [idev] ++
1,174,977 UART: [idev] CDI.KEYID = 6
1,175,337 UART: [idev] SUBJECT.KEYID = 7
1,175,761 UART: [idev] UDS.KEYID = 0
1,176,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,949 UART: [idev] Erasing UDS.KEYID = 0
1,200,516 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,276 UART: [ldev] ++
1,210,444 UART: [ldev] CDI.KEYID = 6
1,210,807 UART: [ldev] SUBJECT.KEYID = 5
1,211,233 UART: [ldev] AUTHORITY.KEYID = 7
1,211,696 UART: [ldev] FE.KEYID = 1
1,216,858 UART: [ldev] Erasing FE.KEYID = 1
1,243,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,426 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,509 UART: [fwproc] Recv command 0x46574c44
1,284,237 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,354 UART: ROM Fatal Error: 0x000B0007
1,308,511 >>> mbox cmd response: failed
1,308,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,517 >>> mbox cmd response: failed
1,308,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,991 UART: [state] LifecycleState = Unprovisioned
86,646 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [kat] SHA2-256
894,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,260 UART: [kat] ++
898,412 UART: [kat] sha1
902,720 UART: [kat] SHA2-256
904,660 UART: [kat] SHA2-384
907,509 UART: [kat] SHA2-512-ACC
909,410 UART: [kat] ECC-384
918,999 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,716 UART: [cold-reset] ++
1,173,104 UART: [fht] FHT @ 0x50003400
1,175,893 UART: [idev] ++
1,176,061 UART: [idev] CDI.KEYID = 6
1,176,421 UART: [idev] SUBJECT.KEYID = 7
1,176,845 UART: [idev] UDS.KEYID = 0
1,177,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,745 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,211,012 UART: [ldev] ++
1,211,180 UART: [ldev] CDI.KEYID = 6
1,211,543 UART: [ldev] SUBJECT.KEYID = 5
1,211,969 UART: [ldev] AUTHORITY.KEYID = 7
1,212,432 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,454 UART: [ldev] --
1,283,927 UART: [fwproc] Wait for Commands...
1,284,527 UART: [fwproc] Recv command 0x46574c44
1,285,255 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,200 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,591 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,406 >>> mbox cmd response: failed
1,164,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,412 >>> mbox cmd response: failed
1,164,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,320 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,472 UART: [kat] HMAC-384Kdf
920,066 UART: [kat] LMS
1,168,378 UART: [kat] --
1,169,109 UART: [cold-reset] ++
1,169,503 UART: [fht] FHT @ 0x50003400
1,172,015 UART: [idev] ++
1,172,183 UART: [idev] CDI.KEYID = 6
1,172,544 UART: [idev] SUBJECT.KEYID = 7
1,172,969 UART: [idev] UDS.KEYID = 0
1,173,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,037 UART: [idev] Erasing UDS.KEYID = 0
1,197,585 UART: [idev] Sha1 KeyId Algorithm
1,206,613 UART: [idev] --
1,207,812 UART: [ldev] ++
1,207,980 UART: [ldev] CDI.KEYID = 6
1,208,344 UART: [ldev] SUBJECT.KEYID = 5
1,208,771 UART: [ldev] AUTHORITY.KEYID = 7
1,209,234 UART: [ldev] FE.KEYID = 1
1,214,624 UART: [ldev] Erasing FE.KEYID = 1
1,241,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,380 UART: [ldev] --
1,280,644 UART: [fwproc] Wait for Commands...
1,281,345 UART: [fwproc] Recv command 0x46574c44
1,282,078 UART: [fwproc] Recv'd Img size: 114084 bytes
1,305,845 UART: ROM Fatal Error: 0x000B0007
1,307,002 >>> mbox cmd response: failed
1,307,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,008 >>> mbox cmd response: failed
1,307,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,459 UART: [kat] SHA2-256
901,399 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,158 UART: [kat] LMS
1,168,470 UART: [kat] --
1,169,223 UART: [cold-reset] ++
1,169,795 UART: [fht] FHT @ 0x50003400
1,172,545 UART: [idev] ++
1,172,713 UART: [idev] CDI.KEYID = 6
1,173,074 UART: [idev] SUBJECT.KEYID = 7
1,173,499 UART: [idev] UDS.KEYID = 0
1,173,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,177 UART: [idev] Erasing UDS.KEYID = 0
1,198,629 UART: [idev] Sha1 KeyId Algorithm
1,207,459 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,243 UART: [fwproc] Recv command 0x46574c44
1,281,976 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,350 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,168 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,461 >>> mbox cmd response: failed
1,159,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,467 >>> mbox cmd response: failed
1,159,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,939 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
891,165 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,740 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,023 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,605 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,766 UART: [fwproc] Recv command 0x46574c44
1,283,499 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,274 UART: ROM Fatal Error: 0x000B0007
1,308,431 >>> mbox cmd response: failed
1,308,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,437 >>> mbox cmd response: failed
1,308,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,905 UART: [kat] SHA2-512-ACC
906,806 UART: [kat] ECC-384
916,889 UART: [kat] HMAC-384Kdf
921,489 UART: [kat] LMS
1,169,801 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,476 UART: [idev] ++
1,173,644 UART: [idev] CDI.KEYID = 6
1,174,005 UART: [idev] SUBJECT.KEYID = 7
1,174,430 UART: [idev] UDS.KEYID = 0
1,174,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,914 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,209,148 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,653 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,681 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,156 >>> mbox cmd response: failed
1,160,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,162 >>> mbox cmd response: failed
1,160,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,773 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
4,882,227 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,895,993 >>> mbox cmd response: failed
16,896,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,896,983 >>> mbox cmd response: failed
16,897,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,897,621 >>> mbox cmd response: failed
Initializing fuses
2,064,329 writing to cptra_bootfsm_go
6,944,116 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,494,297 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,885,284 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,898,744 >>> mbox cmd response: failed
16,899,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,899,725 >>> mbox cmd response: failed
16,899,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,900,281 >>> mbox cmd response: failed
Initializing fuses
2,055,660 writing to cptra_bootfsm_go
6,918,221 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,490,872 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
5,189,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,070,624 >>> mbox cmd response: failed
17,071,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,071,623 >>> mbox cmd response: failed
17,071,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,072,201 >>> mbox cmd response: failed
Initializing fuses
2,056,649 writing to cptra_bootfsm_go
7,976,925 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,423,784 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
5,190,324 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,067,883 >>> mbox cmd response: failed
17,068,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,068,884 >>> mbox cmd response: failed
17,069,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,069,460 >>> mbox cmd response: failed
Initializing fuses
2,059,151 writing to cptra_bootfsm_go
7,983,274 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,413,950 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,480,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,717,457 >>> mbox cmd response: failed
12,718,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,591 >>> mbox cmd response: failed
12,718,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,173 >>> mbox cmd response: failed
Initializing fuses
2,061,079 writing to cptra_bootfsm_go
5,523,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,372,186 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,485,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,735,206 >>> mbox cmd response: failed
12,735,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,180 >>> mbox cmd response: failed
12,736,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,747 >>> mbox cmd response: failed
Initializing fuses
2,062,195 writing to cptra_bootfsm_go
5,522,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,340,561 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,784,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,892,094 >>> mbox cmd response: failed
12,893,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,558 >>> mbox cmd response: failed
12,893,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,894,115 >>> mbox cmd response: failed
Initializing fuses
2,053,610 writing to cptra_bootfsm_go
10,754,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,459,945 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,778,304 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,911,386 >>> mbox cmd response: failed
12,911,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,261 >>> mbox cmd response: failed
12,912,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,840 >>> mbox cmd response: failed
Initializing fuses
2,054,486 writing to cptra_bootfsm_go
10,753,433 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,455,109 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,437,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,660,902 >>> mbox cmd response: failed
12,661,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,661,828 >>> mbox cmd response: failed
12,662,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,393 >>> mbox cmd response: failed
Initializing fuses
2,062,335 writing to cptra_bootfsm_go
5,512,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,301,859 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,444,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,618,989 >>> mbox cmd response: failed
12,619,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,619,977 >>> mbox cmd response: failed
12,620,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,620,560 >>> mbox cmd response: failed
Initializing fuses
2,067,400 writing to cptra_bootfsm_go
5,533,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,378,249 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,788,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,916,406 >>> mbox cmd response: failed
12,917,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,473 >>> mbox cmd response: failed
12,917,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,086 >>> mbox cmd response: failed
Initializing fuses
2,067,222 writing to cptra_bootfsm_go
10,739,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,439,703 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,773,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,892,158 >>> mbox cmd response: failed
12,892,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,105 >>> mbox cmd response: failed
12,893,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,881 >>> mbox cmd response: failed
Initializing fuses
2,056,443 writing to cptra_bootfsm_go
10,737,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,443,765 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,331 >>> mbox cmd response: failed
1,427,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,337 >>> mbox cmd response: failed
1,427,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,922 UART: [kat] SHA2-512-ACC
896,823 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,838 UART: [kat] LMS
1,475,034 UART: [kat] --
1,475,935 UART: [cold-reset] ++
1,476,375 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,150 UART: [idev] Erasing UDS.KEYID = 0
1,504,262 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,676 UART: [idev] --
1,513,563 UART: [ldev] ++
1,513,731 UART: [ldev] CDI.KEYID = 6
1,514,094 UART: [ldev] SUBJECT.KEYID = 5
1,514,520 UART: [ldev] AUTHORITY.KEYID = 7
1,514,983 UART: [ldev] FE.KEYID = 1
1,520,065 UART: [ldev] Erasing FE.KEYID = 1
1,545,574 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,300 UART: [ldev] --
1,584,805 UART: [fwproc] Waiting for Commands...
1,585,530 UART: [fwproc] Received command 0x46574c44
1,586,321 UART: [fwproc] Received Image of size 114084 bytes
2,880,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,388 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,303 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,343 >>> mbox cmd response: failed
1,427,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,349 >>> mbox cmd response: failed
1,427,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,531 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,429,034 >>> mbox cmd response: failed
1,429,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,040 >>> mbox cmd response: failed
1,429,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,942 UART: [kat] SHA2-256
881,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,988 UART: [kat] ++
886,140 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,409 UART: [kat] HMAC-384Kdf
906,873 UART: [kat] LMS
1,475,069 UART: [kat] --
1,475,830 UART: [cold-reset] ++
1,476,390 UART: [fht] Storing FHT @ 0x50003400
1,479,135 UART: [idev] ++
1,479,303 UART: [idev] CDI.KEYID = 6
1,479,663 UART: [idev] SUBJECT.KEYID = 7
1,480,087 UART: [idev] UDS.KEYID = 0
1,480,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,791 UART: [idev] Erasing UDS.KEYID = 0
1,504,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,275 UART: [idev] --
1,514,448 UART: [ldev] ++
1,514,616 UART: [ldev] CDI.KEYID = 6
1,514,979 UART: [ldev] SUBJECT.KEYID = 5
1,515,405 UART: [ldev] AUTHORITY.KEYID = 7
1,515,868 UART: [ldev] FE.KEYID = 1
1,521,346 UART: [ldev] Erasing FE.KEYID = 1
1,546,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,895 UART: [ldev] --
1,586,368 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 114084 bytes
2,883,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,513 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,352 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,310 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,514 >>> mbox cmd response: failed
1,428,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,520 >>> mbox cmd response: failed
1,428,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,462 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,427,691 >>> mbox cmd response: failed
1,427,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,697 >>> mbox cmd response: failed
1,427,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,120 UART: [kat] SHA2-512-ACC
908,021 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,498 UART: [kat] LMS
1,170,826 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,265 UART: [fht] FHT @ 0x50003400
1,174,964 UART: [idev] ++
1,175,132 UART: [idev] CDI.KEYID = 6
1,175,492 UART: [idev] SUBJECT.KEYID = 7
1,175,916 UART: [idev] UDS.KEYID = 0
1,176,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,201,271 UART: [idev] Sha1 KeyId Algorithm
1,209,617 UART: [idev] --
1,210,593 UART: [ldev] ++
1,210,761 UART: [ldev] CDI.KEYID = 6
1,211,124 UART: [ldev] SUBJECT.KEYID = 5
1,211,550 UART: [ldev] AUTHORITY.KEYID = 7
1,212,013 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,775 UART: [ldev] --
1,283,140 UART: [fwproc] Wait for Commands...
1,283,754 UART: [fwproc] Recv command 0x46574c44
1,284,482 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,637 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,114 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,091 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,755 >>> mbox cmd response: failed
1,428,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,761 >>> mbox cmd response: failed
1,428,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,767 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,255 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,728 >>> mbox cmd response: failed
1,428,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,734 >>> mbox cmd response: failed
1,428,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,740 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,689 UART: [kat] SHA2-512-ACC
908,590 UART: [kat] ECC-384
918,765 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,106 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,443 UART: [idev] Erasing UDS.KEYID = 0
1,201,596 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,220 UART: [ldev] ++
1,211,388 UART: [ldev] CDI.KEYID = 6
1,211,751 UART: [ldev] SUBJECT.KEYID = 5
1,212,177 UART: [ldev] AUTHORITY.KEYID = 7
1,212,640 UART: [ldev] FE.KEYID = 1
1,217,894 UART: [ldev] Erasing FE.KEYID = 1
1,244,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,661 UART: [fwproc] Wait for Commands...
1,284,449 UART: [fwproc] Recv command 0x46574c44
1,285,177 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,889 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,430,404 >>> mbox cmd response: failed
1,430,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,410 >>> mbox cmd response: failed
1,430,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,430,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,598 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,429,197 >>> mbox cmd response: failed
1,429,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,203 >>> mbox cmd response: failed
1,429,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,463 UART: [kat] ++
895,615 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,689 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,216,228 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,166 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x46574c44
1,283,086 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,138 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,426,549 >>> mbox cmd response: failed
1,426,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,555 >>> mbox cmd response: failed
1,426,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,064 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,428,968 >>> mbox cmd response: failed
1,428,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,974 >>> mbox cmd response: failed
1,428,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,676 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,270 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,033 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,995 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,429,522 >>> mbox cmd response: failed
1,429,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,528 >>> mbox cmd response: failed
1,429,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,719 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,066 UART:
192,427 UART: Running Caliptra ROM ...
193,549 UART:
193,695 UART: [state] CFI Enabled
261,583 UART: [state] LifecycleState = Unprovisioned
263,525 UART: [state] DebugLocked = No
265,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,969 UART: [kat] SHA2-256
440,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,152 UART: [kat] ++
451,654 UART: [kat] sha1
463,014 UART: [kat] SHA2-256
465,725 UART: [kat] SHA2-384
471,000 UART: [kat] SHA2-512-ACC
473,409 UART: [kat] ECC-384
2,766,433 UART: [kat] HMAC-384Kdf
2,800,337 UART: [kat] LMS
3,990,637 UART: [kat] --
3,994,983 UART: [cold-reset] ++
3,996,602 UART: [fht] Storing FHT @ 0x50003400
4,008,087 UART: [idev] ++
4,008,658 UART: [idev] CDI.KEYID = 6
4,009,601 UART: [idev] SUBJECT.KEYID = 7
4,010,814 UART: [idev] UDS.KEYID = 0
4,013,563 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,848 UART: [idev] Erasing UDS.KEYID = 0
7,347,629 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,133 UART: [idev] --
7,374,659 UART: [ldev] ++
7,375,240 UART: [ldev] CDI.KEYID = 6
7,376,124 UART: [ldev] SUBJECT.KEYID = 5
7,377,398 UART: [ldev] AUTHORITY.KEYID = 7
7,378,845 UART: [ldev] FE.KEYID = 1
7,421,355 UART: [ldev] Erasing FE.KEYID = 1
10,756,417 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,118 UART: [ldev] --
13,136,540 UART: [fwproc] Waiting for Commands...
13,138,147 UART: [fwproc] Received command 0x46574c44
13,140,395 UART: [fwproc] Received Image of size 113760 bytes
17,188,425 UART: ROM Fatal Error: 0x000B0016
17,191,865 >>> mbox cmd response: failed
17,192,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,192,643 >>> mbox cmd response: failed
17,192,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,193,199 >>> mbox cmd response: failed
Initializing fuses
2,052,288 writing to cptra_bootfsm_go
2,241,597 UART:
2,241,937 UART: Running Caliptra ROM ...
2,243,016 UART:
2,243,180 UART: [state] CFI Enabled
2,309,208 UART: [state] LifecycleState = Unprovisioned
2,311,148 UART: [state] DebugLocked = No
2,313,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,959 UART: [kat] SHA2-256
2,487,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,112 UART: [kat] ++
2,498,576 UART: [kat] sha1
2,510,507 UART: [kat] SHA2-256
2,513,196 UART: [kat] SHA2-384
2,518,870 UART: [kat] SHA2-512-ACC
2,521,220 UART: [kat] ECC-384
4,812,003 UART: [kat] HMAC-384Kdf
4,844,459 UART: [kat] LMS
6,034,806 UART: [kat] --
6,038,272 UART: [cold-reset] ++
6,039,726 UART: [fht] Storing FHT @ 0x50003400
6,051,755 UART: [idev] ++
6,052,323 UART: [idev] CDI.KEYID = 6
6,053,363 UART: [idev] SUBJECT.KEYID = 7
6,054,531 UART: [idev] UDS.KEYID = 0
6,057,070 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,200,273 UART: [idev] Erasing UDS.KEYID = 0
9,391,013 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,688 UART: [idev] --
9,416,309 UART: [ldev] ++
9,416,883 UART: [ldev] CDI.KEYID = 6
9,417,903 UART: [ldev] SUBJECT.KEYID = 5
9,419,107 UART: [ldev] AUTHORITY.KEYID = 7
9,420,345 UART: [ldev] FE.KEYID = 1
9,467,501 UART: [ldev] Erasing FE.KEYID = 1
12,800,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,155,697 UART: [ldev] --
15,160,980 UART: [fwproc] Waiting for Commands...
15,163,569 UART: [fwproc] Received command 0x46574c44
15,165,757 UART: [fwproc] Received Image of size 113760 bytes
19,213,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,293,758 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,362,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,678,059 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,792,336 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,135,242 >>> mbox cmd response: failed
17,136,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,136,416 >>> mbox cmd response: failed
17,136,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,136,982 >>> mbox cmd response: failed
Initializing fuses
2,047,828 writing to cptra_bootfsm_go
5,847,660 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,910,506 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,371 UART:
192,721 UART: Running Caliptra ROM ...
193,913 UART:
603,580 UART: [state] CFI Enabled
617,304 UART: [state] LifecycleState = Unprovisioned
619,231 UART: [state] DebugLocked = No
621,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,998 UART: [kat] SHA2-256
796,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,260 UART: [kat] ++
807,791 UART: [kat] sha1
818,402 UART: [kat] SHA2-256
821,095 UART: [kat] SHA2-384
827,460 UART: [kat] SHA2-512-ACC
829,852 UART: [kat] ECC-384
3,114,126 UART: [kat] HMAC-384Kdf
3,125,931 UART: [kat] LMS
4,316,038 UART: [kat] --
4,322,171 UART: [cold-reset] ++
4,323,838 UART: [fht] Storing FHT @ 0x50003400
4,335,104 UART: [idev] ++
4,335,663 UART: [idev] CDI.KEYID = 6
4,336,629 UART: [idev] SUBJECT.KEYID = 7
4,337,845 UART: [idev] UDS.KEYID = 0
4,340,664 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,757 UART: [idev] Erasing UDS.KEYID = 0
7,620,661 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,419 UART: [idev] --
7,645,974 UART: [ldev] ++
7,646,547 UART: [ldev] CDI.KEYID = 6
7,647,524 UART: [ldev] SUBJECT.KEYID = 5
7,648,740 UART: [ldev] AUTHORITY.KEYID = 7
7,649,967 UART: [ldev] FE.KEYID = 1
7,660,562 UART: [ldev] Erasing FE.KEYID = 1
10,950,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,989 UART: [ldev] --
13,311,306 UART: [fwproc] Waiting for Commands...
13,314,108 UART: [fwproc] Received command 0x46574c44
13,316,295 UART: [fwproc] Received Image of size 113760 bytes
17,362,974 UART: ROM Fatal Error: 0x000B0016
17,366,399 >>> mbox cmd response: failed
17,366,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,139 >>> mbox cmd response: failed
17,367,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,924 >>> mbox cmd response: failed
Initializing fuses
2,057,457 writing to cptra_bootfsm_go
2,246,751 UART:
2,247,104 UART: Running Caliptra ROM ...
2,248,246 UART:
3,104,015 UART: [state] CFI Enabled
3,120,809 UART: [state] LifecycleState = Unprovisioned
3,122,722 UART: [state] DebugLocked = No
3,125,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,130,385 UART: [kat] SHA2-256
3,300,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,310,670 UART: [kat] ++
3,311,128 UART: [kat] sha1
3,320,936 UART: [kat] SHA2-256
3,323,624 UART: [kat] SHA2-384
3,328,636 UART: [kat] SHA2-512-ACC
3,330,984 UART: [kat] ECC-384
5,613,659 UART: [kat] HMAC-384Kdf
5,625,485 UART: [kat] LMS
6,815,591 UART: [kat] --
6,818,992 UART: [cold-reset] ++
6,821,034 UART: [fht] Storing FHT @ 0x50003400
6,832,465 UART: [idev] ++
6,833,087 UART: [idev] CDI.KEYID = 6
6,834,000 UART: [idev] SUBJECT.KEYID = 7
6,835,278 UART: [idev] UDS.KEYID = 0
6,838,405 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,981,440 UART: [idev] Erasing UDS.KEYID = 0
10,127,806 UART: [idev] Using Sha1 for KeyId Algorithm
10,150,787 UART: [idev] --
10,154,014 UART: [ldev] ++
10,154,597 UART: [ldev] CDI.KEYID = 6
10,155,567 UART: [ldev] SUBJECT.KEYID = 5
10,156,848 UART: [ldev] AUTHORITY.KEYID = 7
10,158,028 UART: [ldev] FE.KEYID = 1
10,168,676 UART: [ldev] Erasing FE.KEYID = 1
13,454,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,746,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,760,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,775,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,790,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,809,975 UART: [ldev] --
15,815,241 UART: [fwproc] Waiting for Commands...
15,818,327 UART: [fwproc] Received command 0x46574c44
15,820,556 UART: [fwproc] Received Image of size 113760 bytes
19,865,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,944,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,013,610 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,329,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,132,136 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,332,398 >>> mbox cmd response: failed
17,333,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,333,659 >>> mbox cmd response: failed
17,333,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,240 >>> mbox cmd response: failed
Initializing fuses
2,049,183 writing to cptra_bootfsm_go
6,664,242 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,593,464 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,342 UART:
192,699 UART: Running Caliptra ROM ...
193,892 UART:
194,251 UART: [state] CFI Enabled
262,761 UART: [state] LifecycleState = Unprovisioned
264,629 UART: [state] DebugLocked = No
267,570 UART: [state] WD Timer not started. Device not locked for debugging
271,359 UART: [kat] SHA2-256
450,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,050 UART: [kat] ++
462,585 UART: [kat] sha1
472,981 UART: [kat] SHA2-256
475,978 UART: [kat] SHA2-384
482,705 UART: [kat] SHA2-512-ACC
485,646 UART: [kat] ECC-384
2,950,115 UART: [kat] HMAC-384Kdf
2,972,012 UART: [kat] LMS
3,501,492 UART: [kat] --
3,504,342 UART: [cold-reset] ++
3,505,246 UART: [fht] FHT @ 0x50003400
3,517,360 UART: [idev] ++
3,517,924 UART: [idev] CDI.KEYID = 6
3,518,898 UART: [idev] SUBJECT.KEYID = 7
3,520,073 UART: [idev] UDS.KEYID = 0
3,523,048 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,812 UART: [idev] Erasing UDS.KEYID = 0
6,027,128 UART: [idev] Sha1 KeyId Algorithm
6,049,768 UART: [idev] --
6,053,225 UART: [ldev] ++
6,053,812 UART: [ldev] CDI.KEYID = 6
6,054,723 UART: [ldev] SUBJECT.KEYID = 5
6,055,960 UART: [ldev] AUTHORITY.KEYID = 7
6,057,075 UART: [ldev] FE.KEYID = 1
6,101,271 UART: [ldev] Erasing FE.KEYID = 1
8,604,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,987 UART: [ldev] --
10,414,794 UART: [fwproc] Wait for Commands...
10,417,648 UART: [fwproc] Recv command 0x46574c44
10,419,743 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,151 UART: ROM Fatal Error: 0x000B0016
13,817,277 >>> mbox cmd response: failed
13,817,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,053 >>> mbox cmd response: failed
13,818,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,622 >>> mbox cmd response: failed
Initializing fuses
2,052,646 writing to cptra_bootfsm_go
2,241,990 UART:
2,242,359 UART: Running Caliptra ROM ...
2,243,407 UART:
2,243,564 UART: [state] CFI Enabled
2,315,584 UART: [state] LifecycleState = Unprovisioned
2,317,465 UART: [state] DebugLocked = No
2,318,770 UART: [state] WD Timer not started. Device not locked for debugging
2,323,270 UART: [kat] SHA2-256
2,502,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,003 UART: [kat] ++
2,514,470 UART: [kat] sha1
2,525,786 UART: [kat] SHA2-256
2,528,807 UART: [kat] SHA2-384
2,535,986 UART: [kat] SHA2-512-ACC
2,538,912 UART: [kat] ECC-384
5,000,232 UART: [kat] HMAC-384Kdf
5,025,369 UART: [kat] LMS
5,554,806 UART: [kat] --
5,559,555 UART: [cold-reset] ++
5,561,928 UART: [fht] FHT @ 0x50003400
5,572,369 UART: [idev] ++
5,572,935 UART: [idev] CDI.KEYID = 6
5,573,949 UART: [idev] SUBJECT.KEYID = 7
5,575,056 UART: [idev] UDS.KEYID = 0
5,577,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,721,290 UART: [idev] Erasing UDS.KEYID = 0
8,079,778 UART: [idev] Sha1 KeyId Algorithm
8,102,041 UART: [idev] --
8,106,639 UART: [ldev] ++
8,107,209 UART: [ldev] CDI.KEYID = 6
8,108,122 UART: [ldev] SUBJECT.KEYID = 5
8,109,303 UART: [ldev] AUTHORITY.KEYID = 7
8,110,539 UART: [ldev] FE.KEYID = 1
8,156,563 UART: [ldev] Erasing FE.KEYID = 1
10,659,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,361 UART: [ldev] --
12,449,765 UART: [fwproc] Wait for Commands...
12,452,941 UART: [fwproc] Recv command 0x46574c44
12,455,034 UART: [fwproc] Recv'd Img size: 114084 bytes
15,864,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,402 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,321,735 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,366,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,602,085 >>> mbox cmd response: failed
13,602,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,603,045 >>> mbox cmd response: failed
13,603,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,603,622 >>> mbox cmd response: failed
Initializing fuses
2,048,521 writing to cptra_bootfsm_go
5,393,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,072,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,450 UART:
192,824 UART: Running Caliptra ROM ...
193,950 UART:
603,501 UART: [state] CFI Enabled
619,580 UART: [state] LifecycleState = Unprovisioned
621,486 UART: [state] DebugLocked = No
624,114 UART: [state] WD Timer not started. Device not locked for debugging
628,155 UART: [kat] SHA2-256
807,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,855 UART: [kat] ++
819,309 UART: [kat] sha1
830,614 UART: [kat] SHA2-256
833,620 UART: [kat] SHA2-384
838,948 UART: [kat] SHA2-512-ACC
841,760 UART: [kat] ECC-384
3,283,286 UART: [kat] HMAC-384Kdf
3,294,298 UART: [kat] LMS
3,823,817 UART: [kat] --
3,828,724 UART: [cold-reset] ++
3,830,541 UART: [fht] FHT @ 0x50003400
3,842,812 UART: [idev] ++
3,843,405 UART: [idev] CDI.KEYID = 6
3,844,319 UART: [idev] SUBJECT.KEYID = 7
3,845,482 UART: [idev] UDS.KEYID = 0
3,848,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,992,033 UART: [idev] Erasing UDS.KEYID = 0
6,321,068 UART: [idev] Sha1 KeyId Algorithm
6,345,062 UART: [idev] --
6,349,920 UART: [ldev] ++
6,350,486 UART: [ldev] CDI.KEYID = 6
6,351,397 UART: [ldev] SUBJECT.KEYID = 5
6,352,562 UART: [ldev] AUTHORITY.KEYID = 7
6,353,851 UART: [ldev] FE.KEYID = 1
6,366,345 UART: [ldev] Erasing FE.KEYID = 1
8,838,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,846 UART: [ldev] --
10,631,683 UART: [fwproc] Wait for Commands...
10,633,195 UART: [fwproc] Recv command 0x46574c44
10,635,248 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,327 UART: ROM Fatal Error: 0x000B0016
14,034,464 >>> mbox cmd response: failed
14,034,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,035,250 >>> mbox cmd response: failed
14,035,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,035,857 >>> mbox cmd response: failed
Initializing fuses
2,052,657 writing to cptra_bootfsm_go
2,242,061 UART:
2,242,408 UART: Running Caliptra ROM ...
2,243,680 UART:
6,435,318 UART: [state] CFI Enabled
6,446,563 UART: [state] LifecycleState = Unprovisioned
6,448,418 UART: [state] DebugLocked = No
6,451,315 UART: [state] WD Timer not started. Device not locked for debugging
6,455,661 UART: [kat] SHA2-256
6,634,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,646,344 UART: [kat] ++
6,646,891 UART: [kat] sha1
6,658,598 UART: [kat] SHA2-256
6,661,612 UART: [kat] SHA2-384
6,668,739 UART: [kat] SHA2-512-ACC
6,671,682 UART: [kat] ECC-384
9,112,999 UART: [kat] HMAC-384Kdf
9,125,267 UART: [kat] LMS
9,654,722 UART: [kat] --
9,658,350 UART: [cold-reset] ++
9,660,657 UART: [fht] FHT @ 0x50003400
9,672,498 UART: [idev] ++
9,673,059 UART: [idev] CDI.KEYID = 6
9,674,003 UART: [idev] SUBJECT.KEYID = 7
9,675,220 UART: [idev] UDS.KEYID = 0
9,677,970 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,821,375 UART: [idev] Erasing UDS.KEYID = 0
12,149,034 UART: [idev] Sha1 KeyId Algorithm
12,171,005 UART: [idev] --
12,174,816 UART: [ldev] ++
12,175,390 UART: [ldev] CDI.KEYID = 6
12,176,274 UART: [ldev] SUBJECT.KEYID = 5
12,177,506 UART: [ldev] AUTHORITY.KEYID = 7
12,178,740 UART: [ldev] FE.KEYID = 1
12,187,771 UART: [ldev] Erasing FE.KEYID = 1
14,662,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,379,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,395,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,411,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,427,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,448,228 UART: [ldev] --
16,453,381 UART: [fwproc] Wait for Commands...
16,456,183 UART: [fwproc] Recv command 0x46574c44
16,458,282 UART: [fwproc] Recv'd Img size: 114084 bytes
19,853,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,991,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,308,375 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,705,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,821,907 >>> mbox cmd response: failed
13,822,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,837 >>> mbox cmd response: failed
13,823,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,823,461 >>> mbox cmd response: failed
Initializing fuses
2,051,055 writing to cptra_bootfsm_go
9,737,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,296,407 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,115 UART:
192,474 UART: Running Caliptra ROM ...
193,606 UART:
193,753 UART: [state] CFI Enabled
264,613 UART: [state] LifecycleState = Unprovisioned
267,021 UART: [state] DebugLocked = No
269,192 UART: [state] WD Timer not started. Device not locked for debugging
272,932 UART: [kat] SHA2-256
462,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,572 UART: [kat] ++
474,021 UART: [kat] sha1
485,253 UART: [kat] SHA2-256
488,274 UART: [kat] SHA2-384
494,206 UART: [kat] SHA2-512-ACC
496,820 UART: [kat] ECC-384
2,947,702 UART: [kat] HMAC-384Kdf
2,972,673 UART: [kat] LMS
3,504,461 UART: [kat] --
3,509,216 UART: [cold-reset] ++
3,510,881 UART: [fht] FHT @ 0x50003400
3,522,406 UART: [idev] ++
3,523,085 UART: [idev] CDI.KEYID = 6
3,524,105 UART: [idev] SUBJECT.KEYID = 7
3,525,264 UART: [idev] UDS.KEYID = 0
3,528,043 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,671,762 UART: [idev] Erasing UDS.KEYID = 0
6,030,501 UART: [idev] Sha1 KeyId Algorithm
6,053,112 UART: [idev] --
6,057,792 UART: [ldev] ++
6,058,485 UART: [ldev] CDI.KEYID = 6
6,059,371 UART: [ldev] SUBJECT.KEYID = 5
6,060,530 UART: [ldev] AUTHORITY.KEYID = 7
6,061,765 UART: [ldev] FE.KEYID = 1
6,099,830 UART: [ldev] Erasing FE.KEYID = 1
8,610,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,198 UART: [ldev] --
10,414,572 UART: [fwproc] Wait for Commands...
10,417,425 UART: [fwproc] Recv command 0x46574c44
10,419,689 UART: [fwproc] Recv'd Img size: 114084 bytes
13,859,135 UART: ROM Fatal Error: 0x000B0016
13,862,819 >>> mbox cmd response: failed
13,863,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,863,575 >>> mbox cmd response: failed
13,863,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,864,091 >>> mbox cmd response: failed
Initializing fuses
2,053,412 writing to cptra_bootfsm_go
2,242,797 UART:
2,243,157 UART: Running Caliptra ROM ...
2,244,235 UART:
2,244,398 UART: [state] CFI Enabled
2,314,135 UART: [state] LifecycleState = Unprovisioned
2,316,536 UART: [state] DebugLocked = No
2,318,174 UART: [state] WD Timer not started. Device not locked for debugging
2,323,498 UART: [kat] SHA2-256
2,513,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,128 UART: [kat] ++
2,524,594 UART: [kat] sha1
2,536,133 UART: [kat] SHA2-256
2,539,156 UART: [kat] SHA2-384
2,545,688 UART: [kat] SHA2-512-ACC
2,548,263 UART: [kat] ECC-384
5,000,110 UART: [kat] HMAC-384Kdf
5,022,187 UART: [kat] LMS
5,553,993 UART: [kat] --
5,558,572 UART: [cold-reset] ++
5,559,540 UART: [fht] FHT @ 0x50003400
5,572,092 UART: [idev] ++
5,572,790 UART: [idev] CDI.KEYID = 6
5,573,704 UART: [idev] SUBJECT.KEYID = 7
5,574,919 UART: [idev] UDS.KEYID = 0
5,578,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,721,682 UART: [idev] Erasing UDS.KEYID = 0
8,080,770 UART: [idev] Sha1 KeyId Algorithm
8,103,199 UART: [idev] --
8,106,898 UART: [ldev] ++
8,107,589 UART: [ldev] CDI.KEYID = 6
8,108,505 UART: [ldev] SUBJECT.KEYID = 5
8,109,666 UART: [ldev] AUTHORITY.KEYID = 7
8,110,900 UART: [ldev] FE.KEYID = 1
8,150,610 UART: [ldev] Erasing FE.KEYID = 1
10,659,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,364 UART: [ldev] --
12,465,438 UART: [fwproc] Wait for Commands...
12,468,239 UART: [fwproc] Recv command 0x46574c44
12,470,504 UART: [fwproc] Recv'd Img size: 114084 bytes
15,914,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,652,534 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,442,584 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,386 >>> mbox cmd response: failed
14,272,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,273,272 >>> mbox cmd response: failed
14,273,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,273,835 >>> mbox cmd response: failed
Initializing fuses
2,055,535 writing to cptra_bootfsm_go
5,487,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,770,308 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,631 UART:
193,002 UART: Running Caliptra ROM ...
194,153 UART:
603,852 UART: [state] CFI Enabled
619,432 UART: [state] LifecycleState = Unprovisioned
621,853 UART: [state] DebugLocked = No
624,770 UART: [state] WD Timer not started. Device not locked for debugging
628,650 UART: [kat] SHA2-256
818,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,279 UART: [kat] ++
829,867 UART: [kat] sha1
841,724 UART: [kat] SHA2-256
844,732 UART: [kat] SHA2-384
851,580 UART: [kat] SHA2-512-ACC
854,173 UART: [kat] ECC-384
3,294,677 UART: [kat] HMAC-384Kdf
3,306,692 UART: [kat] LMS
3,838,505 UART: [kat] --
3,843,628 UART: [cold-reset] ++
3,845,719 UART: [fht] FHT @ 0x50003400
3,857,454 UART: [idev] ++
3,858,144 UART: [idev] CDI.KEYID = 6
3,859,119 UART: [idev] SUBJECT.KEYID = 7
3,860,277 UART: [idev] UDS.KEYID = 0
3,863,269 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,802 UART: [idev] Erasing UDS.KEYID = 0
6,336,854 UART: [idev] Sha1 KeyId Algorithm
6,360,784 UART: [idev] --
6,366,568 UART: [ldev] ++
6,367,247 UART: [ldev] CDI.KEYID = 6
6,368,138 UART: [ldev] SUBJECT.KEYID = 5
6,369,350 UART: [ldev] AUTHORITY.KEYID = 7
6,371,157 UART: [ldev] FE.KEYID = 1
6,381,787 UART: [ldev] Erasing FE.KEYID = 1
8,860,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,447 UART: [ldev] --
10,651,009 UART: [fwproc] Wait for Commands...
10,652,787 UART: [fwproc] Recv command 0x46574c44
10,655,043 UART: [fwproc] Recv'd Img size: 114084 bytes
14,090,401 UART: ROM Fatal Error: 0x000B0016
14,094,071 >>> mbox cmd response: failed
14,094,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,094,806 >>> mbox cmd response: failed
14,095,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,095,401 >>> mbox cmd response: failed
Initializing fuses
2,057,661 writing to cptra_bootfsm_go
2,246,951 UART:
2,247,297 UART: Running Caliptra ROM ...
2,248,345 UART:
6,378,121 UART: [state] CFI Enabled
6,391,591 UART: [state] LifecycleState = Unprovisioned
6,393,940 UART: [state] DebugLocked = No
6,395,568 UART: [state] WD Timer not started. Device not locked for debugging
6,400,392 UART: [kat] SHA2-256
6,590,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,601,092 UART: [kat] ++
6,601,557 UART: [kat] sha1
6,613,690 UART: [kat] SHA2-256
6,616,712 UART: [kat] SHA2-384
6,622,163 UART: [kat] SHA2-512-ACC
6,624,730 UART: [kat] ECC-384
9,066,393 UART: [kat] HMAC-384Kdf
9,080,953 UART: [kat] LMS
9,612,749 UART: [kat] --
9,616,096 UART: [cold-reset] ++
9,618,736 UART: [fht] FHT @ 0x50003400
9,628,901 UART: [idev] ++
9,629,579 UART: [idev] CDI.KEYID = 6
9,630,516 UART: [idev] SUBJECT.KEYID = 7
9,631,731 UART: [idev] UDS.KEYID = 0
9,634,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,777,950 UART: [idev] Erasing UDS.KEYID = 0
12,107,760 UART: [idev] Sha1 KeyId Algorithm
12,130,999 UART: [idev] --
12,134,376 UART: [ldev] ++
12,134,951 UART: [ldev] CDI.KEYID = 6
12,135,863 UART: [ldev] SUBJECT.KEYID = 5
12,137,043 UART: [ldev] AUTHORITY.KEYID = 7
12,138,226 UART: [ldev] FE.KEYID = 1
12,150,000 UART: [ldev] Erasing FE.KEYID = 1
14,622,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,341,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,356,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,371,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,386,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,406,493 UART: [ldev] --
16,411,811 UART: [fwproc] Wait for Commands...
16,414,989 UART: [fwproc] Recv command 0x46574c44
16,417,244 UART: [fwproc] Recv'd Img size: 114084 bytes
19,861,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,942,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,058,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,598,822 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,760,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,491,592 >>> mbox cmd response: failed
14,492,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,738 >>> mbox cmd response: failed
14,493,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,493,307 >>> mbox cmd response: failed
Initializing fuses
2,051,074 writing to cptra_bootfsm_go
9,131,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,324,011 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
907,176 UART: [kat] LMS
1,475,372 UART: [kat] --
1,476,429 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,866 UART: [idev] ++
1,480,034 UART: [idev] CDI.KEYID = 6
1,480,394 UART: [idev] SUBJECT.KEYID = 7
1,480,818 UART: [idev] UDS.KEYID = 0
1,481,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,626 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,754 UART: [idev] --
1,514,757 UART: [ldev] ++
1,514,925 UART: [ldev] CDI.KEYID = 6
1,515,288 UART: [ldev] SUBJECT.KEYID = 5
1,515,714 UART: [ldev] AUTHORITY.KEYID = 7
1,516,177 UART: [ldev] FE.KEYID = 1
1,521,323 UART: [ldev] Erasing FE.KEYID = 1
1,546,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,736 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 114084 bytes
2,881,135 UART: ROM Fatal Error: 0x000B0016
2,882,292 >>> mbox cmd response: failed
2,882,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,298 >>> mbox cmd response: failed
2,882,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,875 UART: [kat] SHA2-256
881,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,921 UART: [kat] ++
886,073 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,930 UART: [kat] SHA2-512-ACC
896,831 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,820 UART: [kat] LMS
1,475,016 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,988 UART: [idev] Erasing UDS.KEYID = 0
1,504,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,892 UART: [idev] --
1,513,911 UART: [ldev] ++
1,514,079 UART: [ldev] CDI.KEYID = 6
1,514,442 UART: [ldev] SUBJECT.KEYID = 5
1,514,868 UART: [ldev] AUTHORITY.KEYID = 7
1,515,331 UART: [ldev] FE.KEYID = 1
1,520,597 UART: [ldev] Erasing FE.KEYID = 1
1,545,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,218 UART: [ldev] --
1,584,531 UART: [fwproc] Waiting for Commands...
1,585,204 UART: [fwproc] Received command 0x46574c44
1,585,995 UART: [fwproc] Received Image of size 114084 bytes
2,880,086 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,606 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,936,958 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,449 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,735,661 >>> mbox cmd response: failed
2,735,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,667 >>> mbox cmd response: failed
2,735,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,989 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,566 UART: [kat] SHA2-256
882,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,612 UART: [kat] ++
886,764 UART: [kat] sha1
891,118 UART: [kat] SHA2-256
893,056 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,373 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,477,176 UART: [cold-reset] ++
1,477,618 UART: [fht] Storing FHT @ 0x50003400
1,480,553 UART: [idev] ++
1,480,721 UART: [idev] CDI.KEYID = 6
1,481,081 UART: [idev] SUBJECT.KEYID = 7
1,481,505 UART: [idev] UDS.KEYID = 0
1,481,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,641 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,548,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,249 UART: [ldev] --
1,587,588 UART: [fwproc] Waiting for Commands...
1,588,227 UART: [fwproc] Received command 0x46574c44
1,589,018 UART: [fwproc] Received Image of size 114084 bytes
2,882,680 UART: ROM Fatal Error: 0x000B0016
2,883,837 >>> mbox cmd response: failed
2,883,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,843 >>> mbox cmd response: failed
2,883,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,823 UART: [kat] SHA2-512-ACC
897,724 UART: [kat] ECC-384
903,293 UART: [kat] HMAC-384Kdf
907,957 UART: [kat] LMS
1,476,153 UART: [kat] --
1,477,098 UART: [cold-reset] ++
1,477,618 UART: [fht] Storing FHT @ 0x50003400
1,480,495 UART: [idev] ++
1,480,663 UART: [idev] CDI.KEYID = 6
1,481,023 UART: [idev] SUBJECT.KEYID = 7
1,481,447 UART: [idev] UDS.KEYID = 0
1,481,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,459 UART: [idev] Erasing UDS.KEYID = 0
1,506,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,555 UART: [idev] --
1,516,480 UART: [ldev] ++
1,516,648 UART: [ldev] CDI.KEYID = 6
1,517,011 UART: [ldev] SUBJECT.KEYID = 5
1,517,437 UART: [ldev] AUTHORITY.KEYID = 7
1,517,900 UART: [ldev] FE.KEYID = 1
1,522,980 UART: [ldev] Erasing FE.KEYID = 1
1,548,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,063 UART: [ldev] --
1,587,362 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46574c44
1,588,848 UART: [fwproc] Received Image of size 114084 bytes
2,883,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,287 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,138 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,736,032 >>> mbox cmd response: failed
2,736,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,038 >>> mbox cmd response: failed
2,736,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,368 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,652 UART: [kat] HMAC-384Kdf
922,250 UART: [kat] LMS
1,170,578 UART: [kat] --
1,171,695 UART: [cold-reset] ++
1,172,219 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,742 UART: [idev] Erasing UDS.KEYID = 0
1,200,173 UART: [idev] Sha1 KeyId Algorithm
1,208,627 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,296 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,225 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,022 UART: ROM Fatal Error: 0x000B0016
2,577,179 >>> mbox cmd response: failed
2,577,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,185 >>> mbox cmd response: failed
2,577,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
893,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,791 UART: [kat] ++
897,943 UART: [kat] sha1
902,213 UART: [kat] SHA2-256
904,153 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,704 UART: [kat] HMAC-384Kdf
923,332 UART: [kat] LMS
1,171,660 UART: [kat] --
1,172,507 UART: [cold-reset] ++
1,172,841 UART: [fht] FHT @ 0x50003400
1,175,430 UART: [idev] ++
1,175,598 UART: [idev] CDI.KEYID = 6
1,175,958 UART: [idev] SUBJECT.KEYID = 7
1,176,382 UART: [idev] UDS.KEYID = 0
1,176,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,995 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,381 UART: [ldev] Erasing FE.KEYID = 1
1,243,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,141 UART: [ldev] --
1,283,624 UART: [fwproc] Wait for Commands...
1,284,358 UART: [fwproc] Recv command 0x46574c44
1,285,086 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,207 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,620 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,273 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,433,270 >>> mbox cmd response: failed
2,433,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,276 >>> mbox cmd response: failed
2,433,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,247 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,411 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
893,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,480 UART: [kat] ++
897,632 UART: [kat] sha1
901,782 UART: [kat] SHA2-256
903,722 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,196 UART: [cold-reset] ++
1,172,636 UART: [fht] FHT @ 0x50003400
1,175,217 UART: [idev] ++
1,175,385 UART: [idev] CDI.KEYID = 6
1,175,745 UART: [idev] SUBJECT.KEYID = 7
1,176,169 UART: [idev] UDS.KEYID = 0
1,176,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,333 UART: [idev] Erasing UDS.KEYID = 0
1,201,542 UART: [idev] Sha1 KeyId Algorithm
1,210,006 UART: [idev] --
1,211,084 UART: [ldev] ++
1,211,252 UART: [ldev] CDI.KEYID = 6
1,211,615 UART: [ldev] SUBJECT.KEYID = 5
1,212,041 UART: [ldev] AUTHORITY.KEYID = 7
1,212,504 UART: [ldev] FE.KEYID = 1
1,217,834 UART: [ldev] Erasing FE.KEYID = 1
1,244,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,562 UART: [ldev] --
1,284,067 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,593 UART: ROM Fatal Error: 0x000B0016
2,579,750 >>> mbox cmd response: failed
2,579,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,756 >>> mbox cmd response: failed
2,579,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
902,010 UART: [kat] SHA2-256
903,950 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
917,951 UART: [kat] HMAC-384Kdf
922,467 UART: [kat] LMS
1,170,795 UART: [kat] --
1,171,818 UART: [cold-reset] ++
1,172,154 UART: [fht] FHT @ 0x50003400
1,174,731 UART: [idev] ++
1,174,899 UART: [idev] CDI.KEYID = 6
1,175,259 UART: [idev] SUBJECT.KEYID = 7
1,175,683 UART: [idev] UDS.KEYID = 0
1,176,028 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,200,924 UART: [idev] Sha1 KeyId Algorithm
1,209,482 UART: [idev] --
1,210,386 UART: [ldev] ++
1,210,554 UART: [ldev] CDI.KEYID = 6
1,210,917 UART: [ldev] SUBJECT.KEYID = 5
1,211,343 UART: [ldev] AUTHORITY.KEYID = 7
1,211,806 UART: [ldev] FE.KEYID = 1
1,216,696 UART: [ldev] Erasing FE.KEYID = 1
1,242,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,866 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,283,159 UART: [fwproc] Recv command 0x46574c44
1,283,887 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,877 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,434,241 >>> mbox cmd response: failed
2,434,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,247 >>> mbox cmd response: failed
2,434,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,808 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,201 UART: [kat] ++
895,353 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,691 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,349 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,600 UART: [ldev] Erasing FE.KEYID = 1
1,240,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,834 UART: [ldev] --
1,279,308 UART: [fwproc] Wait for Commands...
1,280,063 UART: [fwproc] Recv command 0x46574c44
1,280,796 UART: [fwproc] Recv'd Img size: 114084 bytes
2,573,796 UART: ROM Fatal Error: 0x000B0016
2,574,953 >>> mbox cmd response: failed
2,574,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,574,959 >>> mbox cmd response: failed
2,574,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,574,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,929 UART: [kat] SHA2-256
901,869 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,174,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,890 UART: [ldev] --
1,280,398 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,788 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,154 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,024 >>> mbox cmd response: failed
2,429,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,030 >>> mbox cmd response: failed
2,429,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,770 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,056 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,501 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,208,132 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,075 UART: [ldev] --
1,281,503 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,275 UART: ROM Fatal Error: 0x000B0016
2,577,432 >>> mbox cmd response: failed
2,577,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,438 >>> mbox cmd response: failed
2,577,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,656 UART: [kat] SHA2-256
901,596 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,174,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,182 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,641 UART: [ldev] ++
1,208,809 UART: [ldev] CDI.KEYID = 6
1,209,173 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,215,077 UART: [ldev] Erasing FE.KEYID = 1
1,241,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,403 UART: [ldev] --
1,280,769 UART: [fwproc] Wait for Commands...
1,281,432 UART: [fwproc] Recv command 0x46574c44
1,282,165 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,553 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,431,927 >>> mbox cmd response: failed
2,431,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,933 >>> mbox cmd response: failed
2,431,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,257 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,199 UART:
192,540 UART: Running Caliptra ROM ...
193,727 UART:
193,878 UART: [state] CFI Enabled
259,505 UART: [state] LifecycleState = Unprovisioned
261,474 UART: [state] DebugLocked = No
264,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,449 UART: [kat] SHA2-256
438,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,615 UART: [kat] ++
449,119 UART: [kat] sha1
459,730 UART: [kat] SHA2-256
462,420 UART: [kat] SHA2-384
468,827 UART: [kat] SHA2-512-ACC
471,160 UART: [kat] ECC-384
2,766,332 UART: [kat] HMAC-384Kdf
2,798,855 UART: [kat] LMS
3,989,278 UART: [kat] --
3,993,172 UART: [cold-reset] ++
3,995,378 UART: [fht] Storing FHT @ 0x50003400
4,006,483 UART: [idev] ++
4,007,060 UART: [idev] CDI.KEYID = 6
4,007,999 UART: [idev] SUBJECT.KEYID = 7
4,009,223 UART: [idev] UDS.KEYID = 0
4,011,827 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,124 UART: [idev] Erasing UDS.KEYID = 0
7,356,859 UART: [idev] Using Sha1 for KeyId Algorithm
7,379,057 UART: [idev] --
7,383,600 UART: [ldev] ++
7,384,173 UART: [ldev] CDI.KEYID = 6
7,385,192 UART: [ldev] SUBJECT.KEYID = 5
7,386,354 UART: [ldev] AUTHORITY.KEYID = 7
7,387,640 UART: [ldev] FE.KEYID = 1
7,433,559 UART: [ldev] Erasing FE.KEYID = 1
10,767,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,122,080 UART: [ldev] --
13,126,114 UART: [fwproc] Waiting for Commands...
13,128,273 UART: [fwproc] Received command 0x46574c44
13,130,467 UART: [fwproc] Received Image of size 113760 bytes
17,178,183 UART: ROM Fatal Error: 0x000B002A
17,181,599 >>> mbox cmd response: failed
17,181,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,182,262 >>> mbox cmd response: failed
17,182,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,182,873 >>> mbox cmd response: failed
Initializing fuses
2,058,154 writing to cptra_bootfsm_go
2,247,454 UART:
2,247,818 UART: Running Caliptra ROM ...
2,248,865 UART:
2,249,019 UART: [state] CFI Enabled
2,312,288 UART: [state] LifecycleState = Unprovisioned
2,314,188 UART: [state] DebugLocked = No
2,316,652 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,239 UART: [kat] SHA2-256
2,490,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,467 UART: [kat] ++
2,502,012 UART: [kat] sha1
2,513,289 UART: [kat] SHA2-256
2,515,983 UART: [kat] SHA2-384
2,520,996 UART: [kat] SHA2-512-ACC
2,523,346 UART: [kat] ECC-384
4,813,999 UART: [kat] HMAC-384Kdf
4,846,271 UART: [kat] LMS
6,036,590 UART: [kat] --
6,040,120 UART: [cold-reset] ++
6,041,896 UART: [fht] Storing FHT @ 0x50003400
6,054,087 UART: [idev] ++
6,054,664 UART: [idev] CDI.KEYID = 6
6,055,584 UART: [idev] SUBJECT.KEYID = 7
6,056,857 UART: [idev] UDS.KEYID = 0
6,059,037 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,202,343 UART: [idev] Erasing UDS.KEYID = 0
9,389,481 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,399 UART: [idev] --
9,414,478 UART: [ldev] ++
9,415,054 UART: [ldev] CDI.KEYID = 6
9,416,076 UART: [ldev] SUBJECT.KEYID = 5
9,417,278 UART: [ldev] AUTHORITY.KEYID = 7
9,418,465 UART: [ldev] FE.KEYID = 1
9,446,333 UART: [ldev] Erasing FE.KEYID = 1
12,780,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,093,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,137,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,156,610 UART: [ldev] --
15,162,101 UART: [fwproc] Waiting for Commands...
15,164,470 UART: [fwproc] Received command 0x46574c44
15,166,713 UART: [fwproc] Received Image of size 113760 bytes
19,215,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,485 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,357,407 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,673,125 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,808,247 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,156,433 >>> mbox cmd response: failed
17,157,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,157,454 >>> mbox cmd response: failed
17,157,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,158,030 >>> mbox cmd response: failed
Initializing fuses
2,062,496 writing to cptra_bootfsm_go
5,846,428 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,921,541 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,633 UART:
192,981 UART: Running Caliptra ROM ...
194,162 UART:
603,781 UART: [state] CFI Enabled
619,631 UART: [state] LifecycleState = Unprovisioned
621,636 UART: [state] DebugLocked = No
623,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,620 UART: [kat] SHA2-256
798,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,923 UART: [kat] ++
809,460 UART: [kat] sha1
820,884 UART: [kat] SHA2-256
823,622 UART: [kat] SHA2-384
829,650 UART: [kat] SHA2-512-ACC
832,042 UART: [kat] ECC-384
3,115,326 UART: [kat] HMAC-384Kdf
3,127,842 UART: [kat] LMS
4,317,956 UART: [kat] --
4,322,529 UART: [cold-reset] ++
4,323,447 UART: [fht] Storing FHT @ 0x50003400
4,334,341 UART: [idev] ++
4,334,908 UART: [idev] CDI.KEYID = 6
4,335,901 UART: [idev] SUBJECT.KEYID = 7
4,337,119 UART: [idev] UDS.KEYID = 0
4,339,803 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,980 UART: [idev] Erasing UDS.KEYID = 0
7,626,333 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,980 UART: [idev] --
7,651,276 UART: [ldev] ++
7,651,848 UART: [ldev] CDI.KEYID = 6
7,652,792 UART: [ldev] SUBJECT.KEYID = 5
7,654,004 UART: [ldev] AUTHORITY.KEYID = 7
7,655,300 UART: [ldev] FE.KEYID = 1
7,666,632 UART: [ldev] Erasing FE.KEYID = 1
10,957,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,106 UART: [ldev] --
13,318,699 UART: [fwproc] Waiting for Commands...
13,321,177 UART: [fwproc] Received command 0x46574c44
13,323,366 UART: [fwproc] Received Image of size 113760 bytes
17,358,890 UART: ROM Fatal Error: 0x000B002A
17,362,317 >>> mbox cmd response: failed
17,362,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,362,983 >>> mbox cmd response: failed
17,363,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,363,592 >>> mbox cmd response: failed
Initializing fuses
2,062,085 writing to cptra_bootfsm_go
2,251,379 UART:
2,251,749 UART: Running Caliptra ROM ...
2,252,888 UART:
3,094,243 UART: [state] CFI Enabled
3,108,546 UART: [state] LifecycleState = Unprovisioned
3,110,492 UART: [state] DebugLocked = No
3,113,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,118,709 UART: [kat] SHA2-256
3,288,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,298,976 UART: [kat] ++
3,299,635 UART: [kat] sha1
3,310,319 UART: [kat] SHA2-256
3,313,072 UART: [kat] SHA2-384
3,318,259 UART: [kat] SHA2-512-ACC
3,320,661 UART: [kat] ECC-384
5,606,869 UART: [kat] HMAC-384Kdf
5,617,856 UART: [kat] LMS
6,807,936 UART: [kat] --
6,813,025 UART: [cold-reset] ++
6,814,322 UART: [fht] Storing FHT @ 0x50003400
6,826,510 UART: [idev] ++
6,827,073 UART: [idev] CDI.KEYID = 6
6,828,013 UART: [idev] SUBJECT.KEYID = 7
6,829,289 UART: [idev] UDS.KEYID = 0
6,831,599 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,974,501 UART: [idev] Erasing UDS.KEYID = 0
10,119,516 UART: [idev] Using Sha1 for KeyId Algorithm
10,142,207 UART: [idev] --
10,145,156 UART: [ldev] ++
10,145,795 UART: [ldev] CDI.KEYID = 6
10,146,715 UART: [ldev] SUBJECT.KEYID = 5
10,147,986 UART: [ldev] AUTHORITY.KEYID = 7
10,149,169 UART: [ldev] FE.KEYID = 1
10,160,489 UART: [ldev] Erasing FE.KEYID = 1
13,450,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,740,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,755,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,770,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,784,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,805,126 UART: [ldev] --
15,809,040 UART: [fwproc] Waiting for Commands...
15,812,280 UART: [fwproc] Received command 0x46574c44
15,814,468 UART: [fwproc] Received Image of size 113760 bytes
19,864,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,936,897 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,005,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,322,093 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
4,134,765 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,334,462 >>> mbox cmd response: failed
17,335,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,413 >>> mbox cmd response: failed
17,335,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,985 >>> mbox cmd response: failed
Initializing fuses
2,055,680 writing to cptra_bootfsm_go
6,663,235 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,599,033 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,364 UART:
192,724 UART: Running Caliptra ROM ...
193,927 UART:
194,082 UART: [state] CFI Enabled
266,373 UART: [state] LifecycleState = Unprovisioned
268,237 UART: [state] DebugLocked = No
270,048 UART: [state] WD Timer not started. Device not locked for debugging
273,234 UART: [kat] SHA2-256
452,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,935 UART: [kat] ++
464,473 UART: [kat] sha1
474,401 UART: [kat] SHA2-256
477,393 UART: [kat] SHA2-384
484,945 UART: [kat] SHA2-512-ACC
487,888 UART: [kat] ECC-384
2,949,055 UART: [kat] HMAC-384Kdf
2,970,199 UART: [kat] LMS
3,499,627 UART: [kat] --
3,504,971 UART: [cold-reset] ++
3,506,212 UART: [fht] FHT @ 0x50003400
3,518,310 UART: [idev] ++
3,518,876 UART: [idev] CDI.KEYID = 6
3,519,813 UART: [idev] SUBJECT.KEYID = 7
3,521,029 UART: [idev] UDS.KEYID = 0
3,523,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,153 UART: [idev] Erasing UDS.KEYID = 0
6,024,807 UART: [idev] Sha1 KeyId Algorithm
6,048,577 UART: [idev] --
6,051,175 UART: [ldev] ++
6,051,748 UART: [ldev] CDI.KEYID = 6
6,052,661 UART: [ldev] SUBJECT.KEYID = 5
6,053,882 UART: [ldev] AUTHORITY.KEYID = 7
6,055,119 UART: [ldev] FE.KEYID = 1
6,099,268 UART: [ldev] Erasing FE.KEYID = 1
8,605,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,277 UART: [ldev] --
10,413,599 UART: [fwproc] Wait for Commands...
10,415,068 UART: [fwproc] Recv command 0x46574c44
10,417,169 UART: [fwproc] Recv'd Img size: 114084 bytes
13,814,194 UART: ROM Fatal Error: 0x000B002A
13,817,323 >>> mbox cmd response: failed
13,817,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,007 >>> mbox cmd response: failed
13,818,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,679 >>> mbox cmd response: failed
Initializing fuses
2,059,787 writing to cptra_bootfsm_go
2,249,055 UART:
2,249,412 UART: Running Caliptra ROM ...
2,250,552 UART:
2,250,720 UART: [state] CFI Enabled
2,318,694 UART: [state] LifecycleState = Unprovisioned
2,320,541 UART: [state] DebugLocked = No
2,322,195 UART: [state] WD Timer not started. Device not locked for debugging
2,325,997 UART: [kat] SHA2-256
2,505,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,715 UART: [kat] ++
2,517,175 UART: [kat] sha1
2,529,357 UART: [kat] SHA2-256
2,532,370 UART: [kat] SHA2-384
2,538,305 UART: [kat] SHA2-512-ACC
2,541,251 UART: [kat] ECC-384
5,001,212 UART: [kat] HMAC-384Kdf
5,025,338 UART: [kat] LMS
5,554,802 UART: [kat] --
5,560,140 UART: [cold-reset] ++
5,561,433 UART: [fht] FHT @ 0x50003400
5,570,919 UART: [idev] ++
5,571,534 UART: [idev] CDI.KEYID = 6
5,572,422 UART: [idev] SUBJECT.KEYID = 7
5,573,586 UART: [idev] UDS.KEYID = 0
5,575,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,719,971 UART: [idev] Erasing UDS.KEYID = 0
8,080,132 UART: [idev] Sha1 KeyId Algorithm
8,103,730 UART: [idev] --
8,107,651 UART: [ldev] ++
8,108,235 UART: [ldev] CDI.KEYID = 6
8,109,145 UART: [ldev] SUBJECT.KEYID = 5
8,110,310 UART: [ldev] AUTHORITY.KEYID = 7
8,111,541 UART: [ldev] FE.KEYID = 1
8,155,403 UART: [ldev] Erasing FE.KEYID = 1
10,658,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,960 UART: [ldev] --
12,467,359 UART: [fwproc] Wait for Commands...
12,469,833 UART: [fwproc] Recv command 0x46574c44
12,471,928 UART: [fwproc] Recv'd Img size: 114084 bytes
15,862,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,318,140 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,022 writing to cptra_bootfsm_go
3,385,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,583,442 >>> mbox cmd response: failed
13,584,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,584,416 >>> mbox cmd response: failed
13,584,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,584,920 >>> mbox cmd response: failed
Initializing fuses
2,055,008 writing to cptra_bootfsm_go
5,434,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,114,262 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
193,263 UART:
193,644 UART: Running Caliptra ROM ...
194,848 UART:
604,533 UART: [state] CFI Enabled
617,834 UART: [state] LifecycleState = Unprovisioned
619,711 UART: [state] DebugLocked = No
622,004 UART: [state] WD Timer not started. Device not locked for debugging
625,029 UART: [kat] SHA2-256
804,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,726 UART: [kat] ++
816,260 UART: [kat] sha1
826,606 UART: [kat] SHA2-256
829,615 UART: [kat] SHA2-384
836,992 UART: [kat] SHA2-512-ACC
839,972 UART: [kat] ECC-384
3,280,922 UART: [kat] HMAC-384Kdf
3,294,701 UART: [kat] LMS
3,824,197 UART: [kat] --
3,826,896 UART: [cold-reset] ++
3,829,039 UART: [fht] FHT @ 0x50003400
3,840,987 UART: [idev] ++
3,841,557 UART: [idev] CDI.KEYID = 6
3,842,631 UART: [idev] SUBJECT.KEYID = 7
3,843,749 UART: [idev] UDS.KEYID = 0
3,846,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,603 UART: [idev] Erasing UDS.KEYID = 0
6,310,824 UART: [idev] Sha1 KeyId Algorithm
6,334,703 UART: [idev] --
6,339,101 UART: [ldev] ++
6,339,682 UART: [ldev] CDI.KEYID = 6
6,340,591 UART: [ldev] SUBJECT.KEYID = 5
6,341,752 UART: [ldev] AUTHORITY.KEYID = 7
6,342,984 UART: [ldev] FE.KEYID = 1
6,354,459 UART: [ldev] Erasing FE.KEYID = 1
8,830,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,656 UART: [ldev] --
10,620,847 UART: [fwproc] Wait for Commands...
10,622,349 UART: [fwproc] Recv command 0x46574c44
10,624,447 UART: [fwproc] Recv'd Img size: 114084 bytes
14,019,602 UART: ROM Fatal Error: 0x000B002A
14,022,679 >>> mbox cmd response: failed
14,023,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,023,399 >>> mbox cmd response: failed
14,023,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,024,225 >>> mbox cmd response: failed
Initializing fuses
2,051,627 writing to cptra_bootfsm_go
2,240,893 UART:
2,241,239 UART: Running Caliptra ROM ...
2,242,286 UART:
6,425,118 UART: [state] CFI Enabled
6,439,718 UART: [state] LifecycleState = Unprovisioned
6,441,573 UART: [state] DebugLocked = No
6,443,045 UART: [state] WD Timer not started. Device not locked for debugging
6,447,224 UART: [kat] SHA2-256
6,626,314 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,637,910 UART: [kat] ++
6,638,370 UART: [kat] sha1
6,649,957 UART: [kat] SHA2-256
6,652,989 UART: [kat] SHA2-384
6,658,168 UART: [kat] SHA2-512-ACC
6,661,124 UART: [kat] ECC-384
9,101,525 UART: [kat] HMAC-384Kdf
9,114,289 UART: [kat] LMS
9,643,797 UART: [kat] --
9,646,028 UART: [cold-reset] ++
9,647,323 UART: [fht] FHT @ 0x50003400
9,658,430 UART: [idev] ++
9,659,039 UART: [idev] CDI.KEYID = 6
9,659,929 UART: [idev] SUBJECT.KEYID = 7
9,661,038 UART: [idev] UDS.KEYID = 0
9,663,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,806,786 UART: [idev] Erasing UDS.KEYID = 0
12,135,110 UART: [idev] Sha1 KeyId Algorithm
12,158,248 UART: [idev] --
12,162,396 UART: [ldev] ++
12,162,976 UART: [ldev] CDI.KEYID = 6
12,163,860 UART: [ldev] SUBJECT.KEYID = 5
12,164,934 UART: [ldev] AUTHORITY.KEYID = 7
12,166,272 UART: [ldev] FE.KEYID = 1
12,175,754 UART: [ldev] Erasing FE.KEYID = 1
14,650,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,366,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,382,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,398,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,413,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,433,640 UART: [ldev] --
16,438,790 UART: [fwproc] Wait for Commands...
16,441,209 UART: [fwproc] Recv command 0x46574c44
16,443,249 UART: [fwproc] Recv'd Img size: 114084 bytes
19,842,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,992,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,308,617 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,699,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,815,777 >>> mbox cmd response: failed
13,816,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,816,649 >>> mbox cmd response: failed
13,816,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,212 >>> mbox cmd response: failed
Initializing fuses
2,055,804 writing to cptra_bootfsm_go
9,745,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,322,299 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,025 UART:
192,379 UART: Running Caliptra ROM ...
193,593 UART:
193,750 UART: [state] CFI Enabled
264,715 UART: [state] LifecycleState = Unprovisioned
267,074 UART: [state] DebugLocked = No
269,109 UART: [state] WD Timer not started. Device not locked for debugging
274,476 UART: [kat] SHA2-256
464,363 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,128 UART: [kat] ++
475,576 UART: [kat] sha1
487,211 UART: [kat] SHA2-256
490,219 UART: [kat] SHA2-384
494,581 UART: [kat] SHA2-512-ACC
497,149 UART: [kat] ECC-384
2,945,870 UART: [kat] HMAC-384Kdf
2,972,365 UART: [kat] LMS
3,504,127 UART: [kat] --
3,509,599 UART: [cold-reset] ++
3,511,100 UART: [fht] FHT @ 0x50003400
3,522,956 UART: [idev] ++
3,523,630 UART: [idev] CDI.KEYID = 6
3,524,597 UART: [idev] SUBJECT.KEYID = 7
3,525,812 UART: [idev] UDS.KEYID = 0
3,528,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,071 UART: [idev] Erasing UDS.KEYID = 0
6,028,867 UART: [idev] Sha1 KeyId Algorithm
6,052,684 UART: [idev] --
6,057,639 UART: [ldev] ++
6,058,333 UART: [ldev] CDI.KEYID = 6
6,059,253 UART: [ldev] SUBJECT.KEYID = 5
6,060,413 UART: [ldev] AUTHORITY.KEYID = 7
6,061,648 UART: [ldev] FE.KEYID = 1
6,100,062 UART: [ldev] Erasing FE.KEYID = 1
8,605,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,712 UART: [ldev] --
10,413,842 UART: [fwproc] Wait for Commands...
10,415,570 UART: [fwproc] Recv command 0x46574c44
10,417,840 UART: [fwproc] Recv'd Img size: 114084 bytes
13,856,316 UART: ROM Fatal Error: 0x000B002A
13,859,993 >>> mbox cmd response: failed
13,860,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,860,687 >>> mbox cmd response: failed
13,860,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,251 >>> mbox cmd response: failed
Initializing fuses
2,055,685 writing to cptra_bootfsm_go
2,245,008 UART:
2,245,365 UART: Running Caliptra ROM ...
2,246,501 UART:
2,246,665 UART: [state] CFI Enabled
2,318,031 UART: [state] LifecycleState = Unprovisioned
2,320,465 UART: [state] DebugLocked = No
2,321,693 UART: [state] WD Timer not started. Device not locked for debugging
2,325,946 UART: [kat] SHA2-256
2,515,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,577 UART: [kat] ++
2,527,083 UART: [kat] sha1
2,538,683 UART: [kat] SHA2-256
2,541,715 UART: [kat] SHA2-384
2,546,653 UART: [kat] SHA2-512-ACC
2,549,226 UART: [kat] ECC-384
5,002,270 UART: [kat] HMAC-384Kdf
5,024,977 UART: [kat] LMS
5,556,699 UART: [kat] --
5,561,281 UART: [cold-reset] ++
5,562,567 UART: [fht] FHT @ 0x50003400
5,573,499 UART: [idev] ++
5,574,178 UART: [idev] CDI.KEYID = 6
5,575,145 UART: [idev] SUBJECT.KEYID = 7
5,576,357 UART: [idev] UDS.KEYID = 0
5,578,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,722,557 UART: [idev] Erasing UDS.KEYID = 0
8,085,000 UART: [idev] Sha1 KeyId Algorithm
8,107,077 UART: [idev] --
8,111,969 UART: [ldev] ++
8,112,679 UART: [ldev] CDI.KEYID = 6
8,113,564 UART: [ldev] SUBJECT.KEYID = 5
8,114,642 UART: [ldev] AUTHORITY.KEYID = 7
8,115,926 UART: [ldev] FE.KEYID = 1
8,155,660 UART: [ldev] Erasing FE.KEYID = 1
10,662,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,899 UART: [ldev] --
12,469,541 UART: [fwproc] Wait for Commands...
12,471,491 UART: [fwproc] Recv command 0x46574c44
12,473,756 UART: [fwproc] Recv'd Img size: 114084 bytes
15,928,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,118,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,660,312 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,442,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,141 >>> mbox cmd response: failed
14,268,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,269,048 >>> mbox cmd response: failed
14,269,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,269,609 >>> mbox cmd response: failed
Initializing fuses
2,056,677 writing to cptra_bootfsm_go
5,495,790 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,776,941 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,444 UART:
192,797 UART: Running Caliptra ROM ...
194,001 UART:
603,411 UART: [state] CFI Enabled
616,805 UART: [state] LifecycleState = Unprovisioned
619,172 UART: [state] DebugLocked = No
621,629 UART: [state] WD Timer not started. Device not locked for debugging
626,447 UART: [kat] SHA2-256
816,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,113 UART: [kat] ++
827,703 UART: [kat] sha1
840,043 UART: [kat] SHA2-256
843,047 UART: [kat] SHA2-384
847,997 UART: [kat] SHA2-512-ACC
850,553 UART: [kat] ECC-384
3,290,208 UART: [kat] HMAC-384Kdf
3,303,089 UART: [kat] LMS
3,834,922 UART: [kat] --
3,839,401 UART: [cold-reset] ++
3,841,416 UART: [fht] FHT @ 0x50003400
3,851,382 UART: [idev] ++
3,852,070 UART: [idev] CDI.KEYID = 6
3,852,986 UART: [idev] SUBJECT.KEYID = 7
3,854,198 UART: [idev] UDS.KEYID = 0
3,856,623 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,122 UART: [idev] Erasing UDS.KEYID = 0
6,330,015 UART: [idev] Sha1 KeyId Algorithm
6,351,910 UART: [idev] --
6,357,474 UART: [ldev] ++
6,358,159 UART: [ldev] CDI.KEYID = 6
6,359,065 UART: [ldev] SUBJECT.KEYID = 5
6,360,277 UART: [ldev] AUTHORITY.KEYID = 7
6,361,509 UART: [ldev] FE.KEYID = 1
6,372,909 UART: [ldev] Erasing FE.KEYID = 1
8,847,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,051 UART: [ldev] --
10,636,335 UART: [fwproc] Wait for Commands...
10,638,546 UART: [fwproc] Recv command 0x46574c44
10,640,684 UART: [fwproc] Recv'd Img size: 114084 bytes
14,077,804 UART: ROM Fatal Error: 0x000B002A
14,081,498 >>> mbox cmd response: failed
14,081,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,082,250 >>> mbox cmd response: failed
14,082,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,082,820 >>> mbox cmd response: failed
Initializing fuses
2,059,428 writing to cptra_bootfsm_go
2,248,739 UART:
2,249,095 UART: Running Caliptra ROM ...
2,250,151 UART:
6,363,885 UART: [state] CFI Enabled
6,378,522 UART: [state] LifecycleState = Unprovisioned
6,380,920 UART: [state] DebugLocked = No
6,383,280 UART: [state] WD Timer not started. Device not locked for debugging
6,387,244 UART: [kat] SHA2-256
6,577,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,587,924 UART: [kat] ++
6,588,442 UART: [kat] sha1
6,598,951 UART: [kat] SHA2-256
6,601,969 UART: [kat] SHA2-384
6,609,092 UART: [kat] SHA2-512-ACC
6,611,659 UART: [kat] ECC-384
9,052,291 UART: [kat] HMAC-384Kdf
9,065,974 UART: [kat] LMS
9,597,784 UART: [kat] --
9,601,744 UART: [cold-reset] ++
9,602,731 UART: [fht] FHT @ 0x50003400
9,614,684 UART: [idev] ++
9,615,367 UART: [idev] CDI.KEYID = 6
9,616,304 UART: [idev] SUBJECT.KEYID = 7
9,617,516 UART: [idev] UDS.KEYID = 0
9,619,824 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,763,212 UART: [idev] Erasing UDS.KEYID = 0
12,091,296 UART: [idev] Sha1 KeyId Algorithm
12,112,157 UART: [idev] --
12,117,071 UART: [ldev] ++
12,117,748 UART: [ldev] CDI.KEYID = 6
12,118,658 UART: [ldev] SUBJECT.KEYID = 5
12,119,812 UART: [ldev] AUTHORITY.KEYID = 7
12,121,041 UART: [ldev] FE.KEYID = 1
12,132,984 UART: [ldev] Erasing FE.KEYID = 1
14,610,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,332,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,347,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,362,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,377,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,398,520 UART: [ldev] --
16,403,775 UART: [fwproc] Wait for Commands...
16,406,905 UART: [fwproc] Recv command 0x46574c44
16,409,220 UART: [fwproc] Recv'd Img size: 114084 bytes
19,848,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,048,771 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,589,604 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,756,681 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,479,316 >>> mbox cmd response: failed
14,479,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,480,273 >>> mbox cmd response: failed
14,480,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,480,826 >>> mbox cmd response: failed
Initializing fuses
2,055,668 writing to cptra_bootfsm_go
9,135,918 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,331,200 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,019 UART: [kat] SHA2-256
881,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,065 UART: [kat] ++
886,217 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,870 UART: [kat] HMAC-384Kdf
907,408 UART: [kat] LMS
1,475,604 UART: [kat] --
1,476,377 UART: [cold-reset] ++
1,476,947 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,852 UART: [idev] Erasing UDS.KEYID = 0
1,505,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,698 UART: [idev] --
1,514,727 UART: [ldev] ++
1,514,895 UART: [ldev] CDI.KEYID = 6
1,515,258 UART: [ldev] SUBJECT.KEYID = 5
1,515,684 UART: [ldev] AUTHORITY.KEYID = 7
1,516,147 UART: [ldev] FE.KEYID = 1
1,521,387 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,918 UART: [ldev] --
1,586,233 UART: [fwproc] Waiting for Commands...
1,587,040 UART: [fwproc] Received command 0x46574c44
1,587,831 UART: [fwproc] Received Image of size 114084 bytes
2,881,838 UART: ROM Fatal Error: 0x000B002A
2,882,997 >>> mbox cmd response: failed
2,882,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,003 >>> mbox cmd response: failed
2,883,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,537 UART: [kat] SHA2-256
882,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,583 UART: [kat] ++
886,735 UART: [kat] sha1
891,121 UART: [kat] SHA2-256
893,059 UART: [kat] SHA2-384
895,832 UART: [kat] SHA2-512-ACC
897,733 UART: [kat] ECC-384
903,264 UART: [kat] HMAC-384Kdf
907,888 UART: [kat] LMS
1,476,084 UART: [kat] --
1,476,989 UART: [cold-reset] ++
1,477,319 UART: [fht] Storing FHT @ 0x50003400
1,480,150 UART: [idev] ++
1,480,318 UART: [idev] CDI.KEYID = 6
1,480,678 UART: [idev] SUBJECT.KEYID = 7
1,481,102 UART: [idev] UDS.KEYID = 0
1,481,447 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,008 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,596 UART: [idev] --
1,515,643 UART: [ldev] ++
1,515,811 UART: [ldev] CDI.KEYID = 6
1,516,174 UART: [ldev] SUBJECT.KEYID = 5
1,516,600 UART: [ldev] AUTHORITY.KEYID = 7
1,517,063 UART: [ldev] FE.KEYID = 1
1,522,391 UART: [ldev] Erasing FE.KEYID = 1
1,547,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,974 UART: [ldev] --
1,587,339 UART: [fwproc] Waiting for Commands...
1,588,040 UART: [fwproc] Received command 0x46574c44
1,588,831 UART: [fwproc] Received Image of size 114084 bytes
2,883,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,478 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,830 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,735,904 >>> mbox cmd response: failed
2,735,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,910 >>> mbox cmd response: failed
2,735,910 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,223 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,316 UART: [kat] SHA2-256
882,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,362 UART: [kat] ++
886,514 UART: [kat] sha1
890,772 UART: [kat] SHA2-256
892,710 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,467 UART: [kat] LMS
1,475,663 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,884 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,481,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,277 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,969 UART: [ldev] --
1,586,456 UART: [fwproc] Waiting for Commands...
1,587,153 UART: [fwproc] Received command 0x46574c44
1,587,944 UART: [fwproc] Received Image of size 114084 bytes
2,882,081 UART: ROM Fatal Error: 0x000B002A
2,883,240 >>> mbox cmd response: failed
2,883,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,246 >>> mbox cmd response: failed
2,883,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,004 UART: [kat] SHA2-256
881,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,050 UART: [kat] ++
886,202 UART: [kat] sha1
890,484 UART: [kat] SHA2-256
892,422 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,477,112 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,521 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,751 UART: [idev] --
1,514,744 UART: [ldev] ++
1,514,912 UART: [ldev] CDI.KEYID = 6
1,515,275 UART: [ldev] SUBJECT.KEYID = 5
1,515,701 UART: [ldev] AUTHORITY.KEYID = 7
1,516,164 UART: [ldev] FE.KEYID = 1
1,521,254 UART: [ldev] Erasing FE.KEYID = 1
1,546,733 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,693 UART: [ldev] --
1,586,160 UART: [fwproc] Waiting for Commands...
1,586,935 UART: [fwproc] Received command 0x46574c44
1,587,726 UART: [fwproc] Received Image of size 114084 bytes
2,883,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,381 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,336 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,736,397 >>> mbox cmd response: failed
2,736,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,403 >>> mbox cmd response: failed
2,736,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,218 UART: [kat] SHA2-256
892,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,993 UART: [kat] ++
897,145 UART: [kat] sha1
901,451 UART: [kat] SHA2-256
903,391 UART: [kat] SHA2-384
906,068 UART: [kat] SHA2-512-ACC
907,969 UART: [kat] ECC-384
917,558 UART: [kat] HMAC-384Kdf
922,036 UART: [kat] LMS
1,170,364 UART: [kat] --
1,170,889 UART: [cold-reset] ++
1,171,295 UART: [fht] FHT @ 0x50003400
1,174,050 UART: [idev] ++
1,174,218 UART: [idev] CDI.KEYID = 6
1,174,578 UART: [idev] SUBJECT.KEYID = 7
1,175,002 UART: [idev] UDS.KEYID = 0
1,175,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,348 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,239 UART: [ldev] Erasing FE.KEYID = 1
1,241,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,916 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,231 UART: ROM Fatal Error: 0x000B002A
2,577,390 >>> mbox cmd response: failed
2,577,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,396 >>> mbox cmd response: failed
2,577,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,839 UART: [kat] SHA2-256
903,779 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,872 UART: [kat] LMS
1,171,200 UART: [kat] --
1,172,225 UART: [cold-reset] ++
1,172,775 UART: [fht] FHT @ 0x50003400
1,175,480 UART: [idev] ++
1,175,648 UART: [idev] CDI.KEYID = 6
1,176,008 UART: [idev] SUBJECT.KEYID = 7
1,176,432 UART: [idev] UDS.KEYID = 0
1,176,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,821 UART: [idev] Sha1 KeyId Algorithm
1,210,255 UART: [idev] --
1,211,557 UART: [ldev] ++
1,211,725 UART: [ldev] CDI.KEYID = 6
1,212,088 UART: [ldev] SUBJECT.KEYID = 5
1,212,514 UART: [ldev] AUTHORITY.KEYID = 7
1,212,977 UART: [ldev] FE.KEYID = 1
1,218,047 UART: [ldev] Erasing FE.KEYID = 1
1,244,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,881 UART: [ldev] --
1,284,190 UART: [fwproc] Wait for Commands...
1,285,012 UART: [fwproc] Recv command 0x46574c44
1,285,740 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,184 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,432,823 >>> mbox cmd response: failed
2,432,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,829 >>> mbox cmd response: failed
2,432,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,263 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,511 UART: [kat] SHA2-256
894,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,286 UART: [kat] ++
898,438 UART: [kat] sha1
902,664 UART: [kat] SHA2-256
904,604 UART: [kat] SHA2-384
907,401 UART: [kat] SHA2-512-ACC
909,302 UART: [kat] ECC-384
918,945 UART: [kat] HMAC-384Kdf
923,659 UART: [kat] LMS
1,171,987 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,525 UART: [idev] ++
1,175,693 UART: [idev] CDI.KEYID = 6
1,176,053 UART: [idev] SUBJECT.KEYID = 7
1,176,477 UART: [idev] UDS.KEYID = 0
1,176,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,641 UART: [idev] Erasing UDS.KEYID = 0
1,201,480 UART: [idev] Sha1 KeyId Algorithm
1,209,906 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,430 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,080 UART: [ldev] --
1,283,579 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,320 UART: ROM Fatal Error: 0x000B002A
2,579,479 >>> mbox cmd response: failed
2,579,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,485 >>> mbox cmd response: failed
2,579,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
893,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,882 UART: [kat] ++
898,034 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,595 UART: [idev] ++
1,175,763 UART: [idev] CDI.KEYID = 6
1,176,123 UART: [idev] SUBJECT.KEYID = 7
1,176,547 UART: [idev] UDS.KEYID = 0
1,176,892 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,527 UART: [idev] Erasing UDS.KEYID = 0
1,201,560 UART: [idev] Sha1 KeyId Algorithm
1,210,206 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,244,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,678 UART: [ldev] --
1,284,043 UART: [fwproc] Wait for Commands...
1,284,795 UART: [fwproc] Recv command 0x46574c44
1,285,523 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,991 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,433,624 >>> mbox cmd response: failed
2,433,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,630 >>> mbox cmd response: failed
2,433,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,602 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,362 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [kat] SHA2-256
891,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,174,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,592 UART: [ldev] ++
1,208,760 UART: [ldev] CDI.KEYID = 6
1,209,124 UART: [ldev] SUBJECT.KEYID = 5
1,209,551 UART: [ldev] AUTHORITY.KEYID = 7
1,210,014 UART: [ldev] FE.KEYID = 1
1,215,408 UART: [ldev] Erasing FE.KEYID = 1
1,241,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,910 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x46574c44
1,282,310 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,767 UART: ROM Fatal Error: 0x000B002A
2,577,926 >>> mbox cmd response: failed
2,577,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,932 >>> mbox cmd response: failed
2,577,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,977 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,580 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,429,689 >>> mbox cmd response: failed
2,429,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,695 >>> mbox cmd response: failed
2,429,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,746 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,174,710 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,430 UART: [idev] Sha1 KeyId Algorithm
1,209,324 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,029 UART: [ldev] Erasing FE.KEYID = 1
1,243,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,125 UART: [fwproc] Wait for Commands...
1,282,796 UART: [fwproc] Recv command 0x46574c44
1,283,529 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,034 UART: ROM Fatal Error: 0x000B002A
2,578,193 >>> mbox cmd response: failed
2,578,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,199 >>> mbox cmd response: failed
2,578,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,747 UART: [kat] SHA2-512-ACC
906,648 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,174,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,570 UART: [idev] --
1,209,645 UART: [ldev] ++
1,209,813 UART: [ldev] CDI.KEYID = 6
1,210,177 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,075 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,119 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,432,356 >>> mbox cmd response: failed
2,432,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,362 >>> mbox cmd response: failed
2,432,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,533 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,157 UART:
192,518 UART: Running Caliptra ROM ...
193,710 UART:
193,863 UART: [state] CFI Enabled
260,965 UART: [state] LifecycleState = Unprovisioned
262,936 UART: [state] DebugLocked = No
264,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,594 UART: [kat] SHA2-256
440,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,787 UART: [kat] ++
451,377 UART: [kat] sha1
462,705 UART: [kat] SHA2-256
465,371 UART: [kat] SHA2-384
470,761 UART: [kat] SHA2-512-ACC
473,155 UART: [kat] ECC-384
2,766,204 UART: [kat] HMAC-384Kdf
2,796,631 UART: [kat] LMS
3,986,904 UART: [kat] --
3,991,870 UART: [cold-reset] ++
3,993,706 UART: [fht] Storing FHT @ 0x50003400
4,006,114 UART: [idev] ++
4,006,689 UART: [idev] CDI.KEYID = 6
4,007,606 UART: [idev] SUBJECT.KEYID = 7
4,008,878 UART: [idev] UDS.KEYID = 0
4,011,488 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,840 UART: [idev] Erasing UDS.KEYID = 0
7,340,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,659 UART: [idev] --
7,364,518 UART: [ldev] ++
7,365,090 UART: [ldev] CDI.KEYID = 6
7,366,035 UART: [ldev] SUBJECT.KEYID = 5
7,367,251 UART: [ldev] AUTHORITY.KEYID = 7
7,368,540 UART: [ldev] FE.KEYID = 1
7,398,392 UART: [ldev] Erasing FE.KEYID = 1
10,730,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,864 UART: [ldev] --
13,092,347 UART: [fwproc] Waiting for Commands...
13,095,418 UART: [fwproc] Received command 0x46574c44
13,097,644 UART: [fwproc] Received Image of size 113760 bytes
17,143,528 UART: ROM Fatal Error: 0x000B002B
17,146,937 >>> mbox cmd response: failed
17,147,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,147,696 >>> mbox cmd response: failed
17,147,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,148,261 >>> mbox cmd response: failed
Initializing fuses
2,063,312 writing to cptra_bootfsm_go
2,252,631 UART:
2,252,975 UART: Running Caliptra ROM ...
2,254,120 UART:
2,254,288 UART: [state] CFI Enabled
2,313,070 UART: [state] LifecycleState = Unprovisioned
2,315,010 UART: [state] DebugLocked = No
2,317,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,611 UART: [kat] SHA2-256
2,491,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,825 UART: [kat] ++
2,502,326 UART: [kat] sha1
2,512,352 UART: [kat] SHA2-256
2,515,025 UART: [kat] SHA2-384
2,521,240 UART: [kat] SHA2-512-ACC
2,523,589 UART: [kat] ECC-384
4,817,816 UART: [kat] HMAC-384Kdf
4,849,575 UART: [kat] LMS
6,039,880 UART: [kat] --
6,045,253 UART: [cold-reset] ++
6,046,981 UART: [fht] Storing FHT @ 0x50003400
6,058,640 UART: [idev] ++
6,059,205 UART: [idev] CDI.KEYID = 6
6,060,240 UART: [idev] SUBJECT.KEYID = 7
6,061,409 UART: [idev] UDS.KEYID = 0
6,063,606 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,206,872 UART: [idev] Erasing UDS.KEYID = 0
9,397,578 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,219 UART: [idev] --
9,423,056 UART: [ldev] ++
9,423,632 UART: [ldev] CDI.KEYID = 6
9,424,596 UART: [ldev] SUBJECT.KEYID = 5
9,425,877 UART: [ldev] AUTHORITY.KEYID = 7
9,427,066 UART: [ldev] FE.KEYID = 1
9,470,877 UART: [ldev] Erasing FE.KEYID = 1
12,802,726 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,779 UART: [ldev] --
15,163,246 UART: [fwproc] Waiting for Commands...
15,164,855 UART: [fwproc] Received command 0x46574c44
15,167,050 UART: [fwproc] Received Image of size 113760 bytes
19,220,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,302,834 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,371,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,688,039 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,807,029 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,141,711 >>> mbox cmd response: failed
17,142,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,142,658 >>> mbox cmd response: failed
17,142,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,143,227 >>> mbox cmd response: failed
Initializing fuses
2,060,206 writing to cptra_bootfsm_go
5,836,452 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,890,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,259 writing to cptra_bootfsm_go
193,493 UART:
193,858 UART: Running Caliptra ROM ...
194,960 UART:
604,873 UART: [state] CFI Enabled
622,639 UART: [state] LifecycleState = Unprovisioned
624,576 UART: [state] DebugLocked = No
626,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
632,163 UART: [kat] SHA2-256
801,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,466 UART: [kat] ++
812,994 UART: [kat] sha1
823,166 UART: [kat] SHA2-256
825,906 UART: [kat] SHA2-384
831,076 UART: [kat] SHA2-512-ACC
833,426 UART: [kat] ECC-384
3,117,120 UART: [kat] HMAC-384Kdf
3,128,655 UART: [kat] LMS
4,318,727 UART: [kat] --
4,323,329 UART: [cold-reset] ++
4,325,656 UART: [fht] Storing FHT @ 0x50003400
4,338,666 UART: [idev] ++
4,339,245 UART: [idev] CDI.KEYID = 6
4,340,262 UART: [idev] SUBJECT.KEYID = 7
4,341,424 UART: [idev] UDS.KEYID = 0
4,344,040 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,487,163 UART: [idev] Erasing UDS.KEYID = 0
7,628,868 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,434 UART: [idev] --
7,654,561 UART: [ldev] ++
7,655,133 UART: [ldev] CDI.KEYID = 6
7,656,098 UART: [ldev] SUBJECT.KEYID = 5
7,657,313 UART: [ldev] AUTHORITY.KEYID = 7
7,658,547 UART: [ldev] FE.KEYID = 1
7,671,188 UART: [ldev] Erasing FE.KEYID = 1
10,959,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,549 UART: [ldev] --
13,320,871 UART: [fwproc] Waiting for Commands...
13,322,481 UART: [fwproc] Received command 0x46574c44
13,324,664 UART: [fwproc] Received Image of size 113760 bytes
17,365,147 UART: ROM Fatal Error: 0x000B002B
17,368,551 >>> mbox cmd response: failed
17,368,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,308 >>> mbox cmd response: failed
17,369,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,868 >>> mbox cmd response: failed
Initializing fuses
2,056,721 writing to cptra_bootfsm_go
2,246,049 UART:
2,246,523 UART: Running Caliptra ROM ...
2,247,573 UART:
3,081,441 UART: [state] CFI Enabled
3,098,100 UART: [state] LifecycleState = Unprovisioned
3,100,016 UART: [state] DebugLocked = No
3,102,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,107,401 UART: [kat] SHA2-256
3,277,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,287,668 UART: [kat] ++
3,288,181 UART: [kat] sha1
3,300,091 UART: [kat] SHA2-256
3,302,792 UART: [kat] SHA2-384
3,308,082 UART: [kat] SHA2-512-ACC
3,310,453 UART: [kat] ECC-384
5,593,657 UART: [kat] HMAC-384Kdf
5,606,377 UART: [kat] LMS
6,796,522 UART: [kat] --
6,799,778 UART: [cold-reset] ++
6,802,210 UART: [fht] Storing FHT @ 0x50003400
6,814,880 UART: [idev] ++
6,815,446 UART: [idev] CDI.KEYID = 6
6,816,463 UART: [idev] SUBJECT.KEYID = 7
6,817,622 UART: [idev] UDS.KEYID = 0
6,819,841 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,962,810 UART: [idev] Erasing UDS.KEYID = 0
10,103,044 UART: [idev] Using Sha1 for KeyId Algorithm
10,124,098 UART: [idev] --
10,129,017 UART: [ldev] ++
10,129,582 UART: [ldev] CDI.KEYID = 6
10,130,539 UART: [ldev] SUBJECT.KEYID = 5
10,131,801 UART: [ldev] AUTHORITY.KEYID = 7
10,132,963 UART: [ldev] FE.KEYID = 1
10,144,060 UART: [ldev] Erasing FE.KEYID = 1
13,428,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,722,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,736,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,751,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,766,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,783,734 UART: [ldev] --
15,788,404 UART: [fwproc] Waiting for Commands...
15,790,555 UART: [fwproc] Received command 0x46574c44
15,792,741 UART: [fwproc] Received Image of size 113760 bytes
19,842,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,923,399 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,992,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,309,054 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
4,135,225 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,327,787 >>> mbox cmd response: failed
17,328,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,329,061 >>> mbox cmd response: failed
17,329,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,329,630 >>> mbox cmd response: failed
Initializing fuses
2,056,173 writing to cptra_bootfsm_go
6,668,304 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,607,031 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,349 UART:
192,715 UART: Running Caliptra ROM ...
193,922 UART:
194,078 UART: [state] CFI Enabled
264,215 UART: [state] LifecycleState = Unprovisioned
266,132 UART: [state] DebugLocked = No
267,839 UART: [state] WD Timer not started. Device not locked for debugging
271,771 UART: [kat] SHA2-256
450,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,420 UART: [kat] ++
462,954 UART: [kat] sha1
473,621 UART: [kat] SHA2-256
476,660 UART: [kat] SHA2-384
483,611 UART: [kat] SHA2-512-ACC
486,599 UART: [kat] ECC-384
2,946,934 UART: [kat] HMAC-384Kdf
2,971,985 UART: [kat] LMS
3,501,426 UART: [kat] --
3,506,958 UART: [cold-reset] ++
3,508,736 UART: [fht] FHT @ 0x50003400
3,520,101 UART: [idev] ++
3,520,669 UART: [idev] CDI.KEYID = 6
3,521,582 UART: [idev] SUBJECT.KEYID = 7
3,522,797 UART: [idev] UDS.KEYID = 0
3,525,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,167 UART: [idev] Erasing UDS.KEYID = 0
6,025,166 UART: [idev] Sha1 KeyId Algorithm
6,048,239 UART: [idev] --
6,051,723 UART: [ldev] ++
6,052,300 UART: [ldev] CDI.KEYID = 6
6,053,214 UART: [ldev] SUBJECT.KEYID = 5
6,054,375 UART: [ldev] AUTHORITY.KEYID = 7
6,055,609 UART: [ldev] FE.KEYID = 1
6,099,385 UART: [ldev] Erasing FE.KEYID = 1
8,600,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,253 UART: [ldev] --
10,390,924 UART: [fwproc] Wait for Commands...
10,392,921 UART: [fwproc] Recv command 0x46574c44
10,394,963 UART: [fwproc] Recv'd Img size: 114084 bytes
13,781,317 UART: ROM Fatal Error: 0x000B002B
13,784,408 >>> mbox cmd response: failed
13,784,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,785,168 >>> mbox cmd response: failed
13,785,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,785,725 >>> mbox cmd response: failed
Initializing fuses
2,054,145 writing to cptra_bootfsm_go
2,243,402 UART:
2,243,772 UART: Running Caliptra ROM ...
2,244,817 UART:
2,244,972 UART: [state] CFI Enabled
2,306,585 UART: [state] LifecycleState = Unprovisioned
2,308,473 UART: [state] DebugLocked = No
2,311,344 UART: [state] WD Timer not started. Device not locked for debugging
2,315,548 UART: [kat] SHA2-256
2,494,642 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,251 UART: [kat] ++
2,506,708 UART: [kat] sha1
2,519,052 UART: [kat] SHA2-256
2,522,076 UART: [kat] SHA2-384
2,528,337 UART: [kat] SHA2-512-ACC
2,531,285 UART: [kat] ECC-384
4,986,085 UART: [kat] HMAC-384Kdf
5,010,956 UART: [kat] LMS
5,540,400 UART: [kat] --
5,545,114 UART: [cold-reset] ++
5,546,886 UART: [fht] FHT @ 0x50003400
5,557,378 UART: [idev] ++
5,557,949 UART: [idev] CDI.KEYID = 6
5,558,859 UART: [idev] SUBJECT.KEYID = 7
5,560,095 UART: [idev] UDS.KEYID = 0
5,562,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,705,955 UART: [idev] Erasing UDS.KEYID = 0
8,069,136 UART: [idev] Sha1 KeyId Algorithm
8,093,184 UART: [idev] --
8,096,531 UART: [ldev] ++
8,097,100 UART: [ldev] CDI.KEYID = 6
8,098,018 UART: [ldev] SUBJECT.KEYID = 5
8,099,181 UART: [ldev] AUTHORITY.KEYID = 7
8,100,418 UART: [ldev] FE.KEYID = 1
8,141,748 UART: [ldev] Erasing FE.KEYID = 1
10,647,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,704 UART: [ldev] --
12,456,916 UART: [fwproc] Wait for Commands...
12,460,102 UART: [fwproc] Recv command 0x46574c44
12,462,145 UART: [fwproc] Recv'd Img size: 114084 bytes
15,861,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,933,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,002,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,319,772 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,363,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,590,539 >>> mbox cmd response: failed
13,591,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,591,428 >>> mbox cmd response: failed
13,591,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,591,993 >>> mbox cmd response: failed
Initializing fuses
2,053,916 writing to cptra_bootfsm_go
5,404,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,082,817 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,662 UART:
193,040 UART: Running Caliptra ROM ...
194,242 UART:
603,887 UART: [state] CFI Enabled
620,121 UART: [state] LifecycleState = Unprovisioned
622,010 UART: [state] DebugLocked = No
623,495 UART: [state] WD Timer not started. Device not locked for debugging
627,211 UART: [kat] SHA2-256
806,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,898 UART: [kat] ++
818,429 UART: [kat] sha1
829,853 UART: [kat] SHA2-256
832,863 UART: [kat] SHA2-384
839,540 UART: [kat] SHA2-512-ACC
842,526 UART: [kat] ECC-384
3,285,363 UART: [kat] HMAC-384Kdf
3,297,653 UART: [kat] LMS
3,827,127 UART: [kat] --
3,830,270 UART: [cold-reset] ++
3,831,389 UART: [fht] FHT @ 0x50003400
3,842,832 UART: [idev] ++
3,843,400 UART: [idev] CDI.KEYID = 6
3,844,339 UART: [idev] SUBJECT.KEYID = 7
3,845,551 UART: [idev] UDS.KEYID = 0
3,848,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,543 UART: [idev] Erasing UDS.KEYID = 0
6,317,004 UART: [idev] Sha1 KeyId Algorithm
6,340,671 UART: [idev] --
6,343,854 UART: [ldev] ++
6,344,431 UART: [ldev] CDI.KEYID = 6
6,345,338 UART: [ldev] SUBJECT.KEYID = 5
6,346,553 UART: [ldev] AUTHORITY.KEYID = 7
6,347,784 UART: [ldev] FE.KEYID = 1
6,358,828 UART: [ldev] Erasing FE.KEYID = 1
8,834,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,216 UART: [ldev] --
10,623,146 UART: [fwproc] Wait for Commands...
10,624,711 UART: [fwproc] Recv command 0x46574c44
10,626,815 UART: [fwproc] Recv'd Img size: 114084 bytes
14,026,202 UART: ROM Fatal Error: 0x000B002B
14,029,334 >>> mbox cmd response: failed
14,029,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,100 >>> mbox cmd response: failed
14,030,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,897 >>> mbox cmd response: failed
Initializing fuses
2,056,928 writing to cptra_bootfsm_go
2,246,235 UART:
2,246,585 UART: Running Caliptra ROM ...
2,247,733 UART:
6,421,087 UART: [state] CFI Enabled
6,436,105 UART: [state] LifecycleState = Unprovisioned
6,437,969 UART: [state] DebugLocked = No
6,440,763 UART: [state] WD Timer not started. Device not locked for debugging
6,444,562 UART: [kat] SHA2-256
6,623,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,635,282 UART: [kat] ++
6,635,830 UART: [kat] sha1
6,646,835 UART: [kat] SHA2-256
6,649,865 UART: [kat] SHA2-384
6,654,378 UART: [kat] SHA2-512-ACC
6,657,366 UART: [kat] ECC-384
9,099,131 UART: [kat] HMAC-384Kdf
9,111,625 UART: [kat] LMS
9,641,117 UART: [kat] --
9,646,081 UART: [cold-reset] ++
9,647,152 UART: [fht] FHT @ 0x50003400
9,658,558 UART: [idev] ++
9,659,132 UART: [idev] CDI.KEYID = 6
9,660,047 UART: [idev] SUBJECT.KEYID = 7
9,661,268 UART: [idev] UDS.KEYID = 0
9,663,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,806,864 UART: [idev] Erasing UDS.KEYID = 0
12,133,290 UART: [idev] Sha1 KeyId Algorithm
12,155,173 UART: [idev] --
12,159,397 UART: [ldev] ++
12,159,966 UART: [ldev] CDI.KEYID = 6
12,160,847 UART: [ldev] SUBJECT.KEYID = 5
12,162,005 UART: [ldev] AUTHORITY.KEYID = 7
12,163,299 UART: [ldev] FE.KEYID = 1
12,176,465 UART: [ldev] Erasing FE.KEYID = 1
14,649,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,367,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,383,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,399,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,415,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,434,710 UART: [ldev] --
16,440,242 UART: [fwproc] Wait for Commands...
16,443,375 UART: [fwproc] Recv command 0x46574c44
16,445,417 UART: [fwproc] Recv'd Img size: 114084 bytes
19,844,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,912,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,981,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,298,893 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,696,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,818,893 >>> mbox cmd response: failed
13,819,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,801 >>> mbox cmd response: failed
13,820,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,370 >>> mbox cmd response: failed
Initializing fuses
2,054,115 writing to cptra_bootfsm_go
9,733,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,302,934 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,126 UART:
192,478 UART: Running Caliptra ROM ...
193,629 UART:
193,773 UART: [state] CFI Enabled
264,712 UART: [state] LifecycleState = Unprovisioned
267,071 UART: [state] DebugLocked = No
268,320 UART: [state] WD Timer not started. Device not locked for debugging
272,759 UART: [kat] SHA2-256
462,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,390 UART: [kat] ++
473,865 UART: [kat] sha1
483,994 UART: [kat] SHA2-256
487,008 UART: [kat] SHA2-384
493,646 UART: [kat] SHA2-512-ACC
496,260 UART: [kat] ECC-384
2,948,428 UART: [kat] HMAC-384Kdf
2,971,920 UART: [kat] LMS
3,503,687 UART: [kat] --
3,509,589 UART: [cold-reset] ++
3,511,960 UART: [fht] FHT @ 0x50003400
3,523,377 UART: [idev] ++
3,524,059 UART: [idev] CDI.KEYID = 6
3,525,065 UART: [idev] SUBJECT.KEYID = 7
3,526,234 UART: [idev] UDS.KEYID = 0
3,528,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,677 UART: [idev] Erasing UDS.KEYID = 0
6,030,923 UART: [idev] Sha1 KeyId Algorithm
6,053,896 UART: [idev] --
6,059,248 UART: [ldev] ++
6,059,934 UART: [ldev] CDI.KEYID = 6
6,060,818 UART: [ldev] SUBJECT.KEYID = 5
6,061,978 UART: [ldev] AUTHORITY.KEYID = 7
6,063,271 UART: [ldev] FE.KEYID = 1
6,102,033 UART: [ldev] Erasing FE.KEYID = 1
8,606,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,033 UART: [ldev] --
10,416,676 UART: [fwproc] Wait for Commands...
10,418,128 UART: [fwproc] Recv command 0x46574c44
10,420,397 UART: [fwproc] Recv'd Img size: 114084 bytes
13,860,035 UART: ROM Fatal Error: 0x000B002B
13,863,710 >>> mbox cmd response: failed
13,864,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,864,375 >>> mbox cmd response: failed
13,864,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,865,061 >>> mbox cmd response: failed
Initializing fuses
2,056,097 writing to cptra_bootfsm_go
2,245,388 UART:
2,245,760 UART: Running Caliptra ROM ...
2,246,807 UART:
2,246,961 UART: [state] CFI Enabled
2,315,519 UART: [state] LifecycleState = Unprovisioned
2,317,859 UART: [state] DebugLocked = No
2,320,031 UART: [state] WD Timer not started. Device not locked for debugging
2,324,381 UART: [kat] SHA2-256
2,514,261 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,064 UART: [kat] ++
2,525,525 UART: [kat] sha1
2,536,736 UART: [kat] SHA2-256
2,539,763 UART: [kat] SHA2-384
2,545,971 UART: [kat] SHA2-512-ACC
2,548,544 UART: [kat] ECC-384
5,002,604 UART: [kat] HMAC-384Kdf
5,025,372 UART: [kat] LMS
5,557,138 UART: [kat] --
5,561,835 UART: [cold-reset] ++
5,563,985 UART: [fht] FHT @ 0x50003400
5,577,020 UART: [idev] ++
5,577,710 UART: [idev] CDI.KEYID = 6
5,578,728 UART: [idev] SUBJECT.KEYID = 7
5,579,833 UART: [idev] UDS.KEYID = 0
5,582,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,725,786 UART: [idev] Erasing UDS.KEYID = 0
8,105,809 UART: [idev] Sha1 KeyId Algorithm
8,129,174 UART: [idev] --
8,133,774 UART: [ldev] ++
8,134,461 UART: [ldev] CDI.KEYID = 6
8,135,373 UART: [ldev] SUBJECT.KEYID = 5
8,136,532 UART: [ldev] AUTHORITY.KEYID = 7
8,137,764 UART: [ldev] FE.KEYID = 1
8,174,265 UART: [ldev] Erasing FE.KEYID = 1
10,681,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,415,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,430,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,446,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,461,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,482,409 UART: [ldev] --
12,488,582 UART: [fwproc] Wait for Commands...
12,490,913 UART: [fwproc] Recv command 0x46574c44
12,493,183 UART: [fwproc] Recv'd Img size: 114084 bytes
15,940,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,132,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,673,003 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,442,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,269,641 >>> mbox cmd response: failed
14,270,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,270,584 >>> mbox cmd response: failed
14,270,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,271,154 >>> mbox cmd response: failed
Initializing fuses
2,058,265 writing to cptra_bootfsm_go
5,491,028 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,775,887 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,528 UART:
192,884 UART: Running Caliptra ROM ...
193,995 UART:
603,492 UART: [state] CFI Enabled
618,535 UART: [state] LifecycleState = Unprovisioned
620,942 UART: [state] DebugLocked = No
622,561 UART: [state] WD Timer not started. Device not locked for debugging
627,057 UART: [kat] SHA2-256
816,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,752 UART: [kat] ++
828,258 UART: [kat] sha1
840,432 UART: [kat] SHA2-256
843,490 UART: [kat] SHA2-384
849,302 UART: [kat] SHA2-512-ACC
851,912 UART: [kat] ECC-384
3,290,535 UART: [kat] HMAC-384Kdf
3,305,270 UART: [kat] LMS
3,837,096 UART: [kat] --
3,842,298 UART: [cold-reset] ++
3,844,290 UART: [fht] FHT @ 0x50003400
3,856,083 UART: [idev] ++
3,856,783 UART: [idev] CDI.KEYID = 6
3,857,706 UART: [idev] SUBJECT.KEYID = 7
3,858,921 UART: [idev] UDS.KEYID = 0
3,861,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,962 UART: [idev] Erasing UDS.KEYID = 0
6,337,132 UART: [idev] Sha1 KeyId Algorithm
6,359,403 UART: [idev] --
6,363,125 UART: [ldev] ++
6,363,861 UART: [ldev] CDI.KEYID = 6
6,364,746 UART: [ldev] SUBJECT.KEYID = 5
6,365,855 UART: [ldev] AUTHORITY.KEYID = 7
6,367,140 UART: [ldev] FE.KEYID = 1
6,374,896 UART: [ldev] Erasing FE.KEYID = 1
8,849,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,134 UART: [ldev] --
10,638,837 UART: [fwproc] Wait for Commands...
10,641,153 UART: [fwproc] Recv command 0x46574c44
10,643,468 UART: [fwproc] Recv'd Img size: 114084 bytes
14,085,216 UART: ROM Fatal Error: 0x000B002B
14,088,930 >>> mbox cmd response: failed
14,089,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,089,671 >>> mbox cmd response: failed
14,089,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,090,234 >>> mbox cmd response: failed
Initializing fuses
2,056,085 writing to cptra_bootfsm_go
2,245,435 UART:
2,245,796 UART: Running Caliptra ROM ...
2,246,934 UART:
6,360,528 UART: [state] CFI Enabled
6,373,539 UART: [state] LifecycleState = Unprovisioned
6,375,968 UART: [state] DebugLocked = No
6,378,111 UART: [state] WD Timer not started. Device not locked for debugging
6,383,058 UART: [kat] SHA2-256
6,572,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,583,750 UART: [kat] ++
6,584,238 UART: [kat] sha1
6,596,161 UART: [kat] SHA2-256
6,599,194 UART: [kat] SHA2-384
6,605,511 UART: [kat] SHA2-512-ACC
6,608,053 UART: [kat] ECC-384
9,051,135 UART: [kat] HMAC-384Kdf
9,064,028 UART: [kat] LMS
9,595,873 UART: [kat] --
9,598,580 UART: [cold-reset] ++
9,599,592 UART: [fht] FHT @ 0x50003400
9,611,435 UART: [idev] ++
9,612,123 UART: [idev] CDI.KEYID = 6
9,613,091 UART: [idev] SUBJECT.KEYID = 7
9,614,255 UART: [idev] UDS.KEYID = 0
9,616,701 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,760,071 UART: [idev] Erasing UDS.KEYID = 0
12,089,975 UART: [idev] Sha1 KeyId Algorithm
12,112,622 UART: [idev] --
12,116,239 UART: [ldev] ++
12,116,918 UART: [ldev] CDI.KEYID = 6
12,117,936 UART: [ldev] SUBJECT.KEYID = 5
12,118,988 UART: [ldev] AUTHORITY.KEYID = 7
12,120,293 UART: [ldev] FE.KEYID = 1
12,129,624 UART: [ldev] Erasing FE.KEYID = 1
14,608,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,325,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,340,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,356,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,371,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,391,793 UART: [ldev] --
16,397,006 UART: [fwproc] Wait for Commands...
16,400,077 UART: [fwproc] Recv command 0x46574c44
16,402,394 UART: [fwproc] Recv'd Img size: 114084 bytes
19,845,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,922,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,038,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,579,389 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,763,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,497,901 >>> mbox cmd response: failed
14,498,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,825 >>> mbox cmd response: failed
14,499,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,499,396 >>> mbox cmd response: failed
Initializing fuses
2,055,385 writing to cptra_bootfsm_go
9,120,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,306,066 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,695 UART: [kat] SHA2-256
881,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,741 UART: [kat] ++
885,893 UART: [kat] sha1
890,193 UART: [kat] SHA2-256
892,131 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,336 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,771 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,214 UART: [idev] Erasing UDS.KEYID = 0
1,504,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,280 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,953 UART: [ldev] Erasing FE.KEYID = 1
1,545,724 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,774 UART: [ldev] --
1,585,045 UART: [fwproc] Waiting for Commands...
1,585,690 UART: [fwproc] Received command 0x46574c44
1,586,481 UART: [fwproc] Received Image of size 114084 bytes
2,880,864 UART: ROM Fatal Error: 0x000B002B
2,882,023 >>> mbox cmd response: failed
2,882,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,029 >>> mbox cmd response: failed
2,882,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,578 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,435 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,144 UART: [idev] Erasing UDS.KEYID = 0
1,504,700 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,260 UART: [idev] --
1,514,175 UART: [ldev] ++
1,514,343 UART: [ldev] CDI.KEYID = 6
1,514,706 UART: [ldev] SUBJECT.KEYID = 5
1,515,132 UART: [ldev] AUTHORITY.KEYID = 7
1,515,595 UART: [ldev] FE.KEYID = 1
1,520,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,292 UART: [ldev] --
1,585,661 UART: [fwproc] Waiting for Commands...
1,586,402 UART: [fwproc] Received command 0x46574c44
1,587,193 UART: [fwproc] Received Image of size 114084 bytes
2,881,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,635 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,734,766 >>> mbox cmd response: failed
2,734,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,772 >>> mbox cmd response: failed
2,734,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,603 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,078 UART: [kat] SHA2-256
882,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,124 UART: [kat] ++
886,276 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,607 UART: [kat] HMAC-384Kdf
907,263 UART: [kat] LMS
1,475,459 UART: [kat] --
1,476,540 UART: [cold-reset] ++
1,477,090 UART: [fht] Storing FHT @ 0x50003400
1,479,803 UART: [idev] ++
1,479,971 UART: [idev] CDI.KEYID = 6
1,480,331 UART: [idev] SUBJECT.KEYID = 7
1,480,755 UART: [idev] UDS.KEYID = 0
1,481,100 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,949 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,435 UART: [idev] --
1,515,376 UART: [ldev] ++
1,515,544 UART: [ldev] CDI.KEYID = 6
1,515,907 UART: [ldev] SUBJECT.KEYID = 5
1,516,333 UART: [ldev] AUTHORITY.KEYID = 7
1,516,796 UART: [ldev] FE.KEYID = 1
1,521,882 UART: [ldev] Erasing FE.KEYID = 1
1,547,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,621 UART: [ldev] --
1,587,026 UART: [fwproc] Waiting for Commands...
1,587,697 UART: [fwproc] Received command 0x46574c44
1,588,488 UART: [fwproc] Received Image of size 114084 bytes
2,883,227 UART: ROM Fatal Error: 0x000B002B
2,884,386 >>> mbox cmd response: failed
2,884,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,392 >>> mbox cmd response: failed
2,884,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,352 UART: [kat] SHA2-256
892,290 UART: [kat] SHA2-384
894,957 UART: [kat] SHA2-512-ACC
896,858 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,468 UART: [cold-reset] ++
1,476,824 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,801 UART: [idev] Erasing UDS.KEYID = 0
1,504,715 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,367 UART: [idev] --
1,514,278 UART: [ldev] ++
1,514,446 UART: [ldev] CDI.KEYID = 6
1,514,809 UART: [ldev] SUBJECT.KEYID = 5
1,515,235 UART: [ldev] AUTHORITY.KEYID = 7
1,515,698 UART: [ldev] FE.KEYID = 1
1,520,856 UART: [ldev] Erasing FE.KEYID = 1
1,546,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,165 UART: [ldev] --
1,585,634 UART: [fwproc] Waiting for Commands...
1,586,333 UART: [fwproc] Received command 0x46574c44
1,587,124 UART: [fwproc] Received Image of size 114084 bytes
2,881,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,937 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,289 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,782 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,736,547 >>> mbox cmd response: failed
2,736,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,553 >>> mbox cmd response: failed
2,736,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,562 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
893,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,285 UART: [kat] ++
897,437 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,446 UART: [kat] SHA2-512-ACC
908,347 UART: [kat] ECC-384
918,144 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,171,525 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,560 UART: [idev] ++
1,174,728 UART: [idev] CDI.KEYID = 6
1,175,088 UART: [idev] SUBJECT.KEYID = 7
1,175,512 UART: [idev] UDS.KEYID = 0
1,175,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,562 UART: [idev] Erasing UDS.KEYID = 0
1,200,031 UART: [idev] Sha1 KeyId Algorithm
1,208,497 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,000 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,215,807 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,282,194 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,556 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,509 UART: ROM Fatal Error: 0x000B002B
2,578,668 >>> mbox cmd response: failed
2,578,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,674 >>> mbox cmd response: failed
2,578,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
902,079 UART: [kat] SHA2-256
904,019 UART: [kat] SHA2-384
906,826 UART: [kat] SHA2-512-ACC
908,727 UART: [kat] ECC-384
918,386 UART: [kat] HMAC-384Kdf
922,940 UART: [kat] LMS
1,171,268 UART: [kat] --
1,171,965 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,175,200 UART: [idev] ++
1,175,368 UART: [idev] CDI.KEYID = 6
1,175,728 UART: [idev] SUBJECT.KEYID = 7
1,176,152 UART: [idev] UDS.KEYID = 0
1,176,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,178 UART: [idev] Erasing UDS.KEYID = 0
1,200,729 UART: [idev] Sha1 KeyId Algorithm
1,209,283 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,988 UART: [ldev] SUBJECT.KEYID = 5
1,211,414 UART: [ldev] AUTHORITY.KEYID = 7
1,211,877 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,133 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,934 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,433,445 >>> mbox cmd response: failed
2,433,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,451 >>> mbox cmd response: failed
2,433,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,761 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,316 UART: [kat] SHA2-256
904,256 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,503 UART: [kat] LMS
1,171,831 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,172,874 UART: [fht] FHT @ 0x50003400
1,175,353 UART: [idev] ++
1,175,521 UART: [idev] CDI.KEYID = 6
1,175,881 UART: [idev] SUBJECT.KEYID = 7
1,176,305 UART: [idev] UDS.KEYID = 0
1,176,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,139 UART: [idev] Erasing UDS.KEYID = 0
1,201,082 UART: [idev] Sha1 KeyId Algorithm
1,209,508 UART: [idev] --
1,210,514 UART: [ldev] ++
1,210,682 UART: [ldev] CDI.KEYID = 6
1,211,045 UART: [ldev] SUBJECT.KEYID = 5
1,211,471 UART: [ldev] AUTHORITY.KEYID = 7
1,211,934 UART: [ldev] FE.KEYID = 1
1,217,466 UART: [ldev] Erasing FE.KEYID = 1
1,243,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,908 UART: [ldev] --
1,282,241 UART: [fwproc] Wait for Commands...
1,282,861 UART: [fwproc] Recv command 0x46574c44
1,283,589 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,932 UART: ROM Fatal Error: 0x000B002B
2,579,091 >>> mbox cmd response: failed
2,579,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,097 >>> mbox cmd response: failed
2,579,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,084 UART: [kat] SHA2-256
904,024 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,964 UART: [fht] FHT @ 0x50003400
1,175,447 UART: [idev] ++
1,175,615 UART: [idev] CDI.KEYID = 6
1,175,975 UART: [idev] SUBJECT.KEYID = 7
1,176,399 UART: [idev] UDS.KEYID = 0
1,176,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,048 UART: [idev] Sha1 KeyId Algorithm
1,209,508 UART: [idev] --
1,210,590 UART: [ldev] ++
1,210,758 UART: [ldev] CDI.KEYID = 6
1,211,121 UART: [ldev] SUBJECT.KEYID = 5
1,211,547 UART: [ldev] AUTHORITY.KEYID = 7
1,212,010 UART: [ldev] FE.KEYID = 1
1,217,364 UART: [ldev] Erasing FE.KEYID = 1
1,243,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,387 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,496 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,001 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,435,004 >>> mbox cmd response: failed
2,435,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,010 >>> mbox cmd response: failed
2,435,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,868 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,392 UART: [kat] SHA2-512-ACC
906,293 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,092 UART: [kat] LMS
1,168,404 UART: [kat] --
1,169,385 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,173,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,207,993 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,642 UART: [ldev] Erasing FE.KEYID = 1
1,242,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,281,899 UART: [fwproc] Recv command 0x46574c44
1,282,632 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,295 UART: ROM Fatal Error: 0x000B002B
2,577,454 >>> mbox cmd response: failed
2,577,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,460 >>> mbox cmd response: failed
2,577,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,575 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,672 UART: [ldev] ++
1,208,840 UART: [ldev] CDI.KEYID = 6
1,209,204 UART: [ldev] SUBJECT.KEYID = 5
1,209,631 UART: [ldev] AUTHORITY.KEYID = 7
1,210,094 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,912 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,196 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,223 >>> mbox cmd response: failed
2,428,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,229 >>> mbox cmd response: failed
2,428,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,014 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,304 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,124 UART: [idev] Sha1 KeyId Algorithm
1,207,910 UART: [idev] --
1,208,917 UART: [ldev] ++
1,209,085 UART: [ldev] CDI.KEYID = 6
1,209,449 UART: [ldev] SUBJECT.KEYID = 5
1,209,876 UART: [ldev] AUTHORITY.KEYID = 7
1,210,339 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,784 UART: ROM Fatal Error: 0x000B002B
2,578,943 >>> mbox cmd response: failed
2,578,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,949 >>> mbox cmd response: failed
2,578,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,327 UART: [kat] LMS
1,169,639 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,171,078 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,175,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,199,892 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,965 UART: [ldev] ++
1,210,133 UART: [ldev] CDI.KEYID = 6
1,210,497 UART: [ldev] SUBJECT.KEYID = 5
1,210,924 UART: [ldev] AUTHORITY.KEYID = 7
1,211,387 UART: [ldev] FE.KEYID = 1
1,216,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,489 UART: [fwproc] Wait for Commands...
1,283,104 UART: [fwproc] Recv command 0x46574c44
1,283,837 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,253 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,209 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,304 >>> mbox cmd response: failed
2,430,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,310 >>> mbox cmd response: failed
2,430,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,073 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,296 UART:
192,640 UART: Running Caliptra ROM ...
193,831 UART:
193,980 UART: [state] CFI Enabled
263,212 UART: [state] LifecycleState = Unprovisioned
265,117 UART: [state] DebugLocked = No
266,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,988 UART: [kat] SHA2-256
440,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,152 UART: [kat] ++
451,700 UART: [kat] sha1
463,667 UART: [kat] SHA2-256
466,394 UART: [kat] SHA2-384
472,759 UART: [kat] SHA2-512-ACC
475,152 UART: [kat] ECC-384
2,766,736 UART: [kat] HMAC-384Kdf
2,798,171 UART: [kat] LMS
3,988,481 UART: [kat] --
3,993,943 UART: [cold-reset] ++
3,995,448 UART: [fht] Storing FHT @ 0x50003400
4,006,986 UART: [idev] ++
4,007,621 UART: [idev] CDI.KEYID = 6
4,008,541 UART: [idev] SUBJECT.KEYID = 7
4,009,763 UART: [idev] UDS.KEYID = 0
4,012,330 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,653 UART: [idev] Erasing UDS.KEYID = 0
7,344,790 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,456 UART: [idev] --
7,371,696 UART: [ldev] ++
7,372,319 UART: [ldev] CDI.KEYID = 6
7,373,204 UART: [ldev] SUBJECT.KEYID = 5
7,374,472 UART: [ldev] AUTHORITY.KEYID = 7
7,375,706 UART: [ldev] FE.KEYID = 1
7,420,232 UART: [ldev] Erasing FE.KEYID = 1
10,753,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,438 UART: [ldev] --
13,134,432 UART: [fwproc] Waiting for Commands...
13,136,874 UART: [fwproc] Received command 0x46574c44
13,139,060 UART: [fwproc] Received Image of size 113760 bytes
17,182,849 UART: ROM Fatal Error: 0x000B0028
17,186,322 >>> mbox cmd response: failed
17,186,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,070 >>> mbox cmd response: failed
17,187,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,632 >>> mbox cmd response: failed
Initializing fuses
2,063,484 writing to cptra_bootfsm_go
2,252,863 UART:
2,253,239 UART: Running Caliptra ROM ...
2,254,293 UART:
2,254,447 UART: [state] CFI Enabled
2,314,765 UART: [state] LifecycleState = Unprovisioned
2,316,710 UART: [state] DebugLocked = No
2,319,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,334 UART: [kat] SHA2-256
2,494,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,550 UART: [kat] ++
2,505,007 UART: [kat] sha1
2,516,492 UART: [kat] SHA2-256
2,519,186 UART: [kat] SHA2-384
2,525,780 UART: [kat] SHA2-512-ACC
2,528,186 UART: [kat] ECC-384
4,816,158 UART: [kat] HMAC-384Kdf
4,828,616 UART: [kat] LMS
6,018,916 UART: [kat] --
6,021,568 UART: [cold-reset] ++
6,023,615 UART: [fht] Storing FHT @ 0x50003400
6,035,281 UART: [idev] ++
6,035,849 UART: [idev] CDI.KEYID = 6
6,036,790 UART: [idev] SUBJECT.KEYID = 7
6,038,003 UART: [idev] UDS.KEYID = 0
6,040,292 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,183,590 UART: [idev] Erasing UDS.KEYID = 0
9,371,382 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,619 UART: [idev] --
9,396,345 UART: [ldev] ++
9,396,914 UART: [ldev] CDI.KEYID = 6
9,397,851 UART: [ldev] SUBJECT.KEYID = 5
9,399,118 UART: [ldev] AUTHORITY.KEYID = 7
9,400,356 UART: [ldev] FE.KEYID = 1
9,428,308 UART: [ldev] Erasing FE.KEYID = 1
12,758,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,053,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,068,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,083,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,097,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,117,782 UART: [ldev] --
15,121,869 UART: [fwproc] Waiting for Commands...
15,125,273 UART: [fwproc] Received command 0x46574c44
15,127,464 UART: [fwproc] Received Image of size 113760 bytes
19,167,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,245,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,314,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,630,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,806,058 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,117,219 >>> mbox cmd response: failed
17,117,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,118,145 >>> mbox cmd response: failed
17,118,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,118,705 >>> mbox cmd response: failed
Initializing fuses
2,064,550 writing to cptra_bootfsm_go
5,844,952 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,898,812 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,505 UART:
192,868 UART: Running Caliptra ROM ...
193,992 UART:
603,895 UART: [state] CFI Enabled
619,441 UART: [state] LifecycleState = Unprovisioned
621,379 UART: [state] DebugLocked = No
623,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,102 UART: [kat] SHA2-256
797,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,378 UART: [kat] ++
808,852 UART: [kat] sha1
821,026 UART: [kat] SHA2-256
823,872 UART: [kat] SHA2-384
829,528 UART: [kat] SHA2-512-ACC
831,888 UART: [kat] ECC-384
3,116,652 UART: [kat] HMAC-384Kdf
3,128,397 UART: [kat] LMS
4,318,530 UART: [kat] --
4,322,618 UART: [cold-reset] ++
4,324,129 UART: [fht] Storing FHT @ 0x50003400
4,335,188 UART: [idev] ++
4,335,820 UART: [idev] CDI.KEYID = 6
4,336,730 UART: [idev] SUBJECT.KEYID = 7
4,338,002 UART: [idev] UDS.KEYID = 0
4,340,648 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,845 UART: [idev] Erasing UDS.KEYID = 0
7,626,513 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,322 UART: [idev] --
7,652,700 UART: [ldev] ++
7,653,289 UART: [ldev] CDI.KEYID = 6
7,654,200 UART: [ldev] SUBJECT.KEYID = 5
7,655,420 UART: [ldev] AUTHORITY.KEYID = 7
7,656,709 UART: [ldev] FE.KEYID = 1
7,665,631 UART: [ldev] Erasing FE.KEYID = 1
10,953,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,228 UART: [ldev] --
13,315,072 UART: [fwproc] Waiting for Commands...
13,318,307 UART: [fwproc] Received command 0x46574c44
13,320,490 UART: [fwproc] Received Image of size 113760 bytes
17,360,598 UART: ROM Fatal Error: 0x000B0028
17,364,063 >>> mbox cmd response: failed
17,364,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,364,840 >>> mbox cmd response: failed
17,365,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,365,410 >>> mbox cmd response: failed
Initializing fuses
2,054,382 writing to cptra_bootfsm_go
2,243,679 UART:
2,244,021 UART: Running Caliptra ROM ...
2,245,163 UART:
3,082,885 UART: [state] CFI Enabled
3,095,244 UART: [state] LifecycleState = Unprovisioned
3,097,159 UART: [state] DebugLocked = No
3,099,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,103,905 UART: [kat] SHA2-256
3,273,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,284,170 UART: [kat] ++
3,284,627 UART: [kat] sha1
3,295,515 UART: [kat] SHA2-256
3,298,268 UART: [kat] SHA2-384
3,303,869 UART: [kat] SHA2-512-ACC
3,306,232 UART: [kat] ECC-384
5,588,773 UART: [kat] HMAC-384Kdf
5,601,270 UART: [kat] LMS
6,791,431 UART: [kat] --
6,795,934 UART: [cold-reset] ++
6,797,599 UART: [fht] Storing FHT @ 0x50003400
6,808,978 UART: [idev] ++
6,809,548 UART: [idev] CDI.KEYID = 6
6,810,515 UART: [idev] SUBJECT.KEYID = 7
6,811,734 UART: [idev] UDS.KEYID = 0
6,814,323 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,957,344 UART: [idev] Erasing UDS.KEYID = 0
10,103,195 UART: [idev] Using Sha1 for KeyId Algorithm
10,126,538 UART: [idev] --
10,129,887 UART: [ldev] ++
10,130,459 UART: [ldev] CDI.KEYID = 6
10,131,472 UART: [ldev] SUBJECT.KEYID = 5
10,132,688 UART: [ldev] AUTHORITY.KEYID = 7
10,133,922 UART: [ldev] FE.KEYID = 1
10,143,650 UART: [ldev] Erasing FE.KEYID = 1
13,431,344 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,723,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,737,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,752,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,767,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,785,590 UART: [ldev] --
15,790,616 UART: [fwproc] Waiting for Commands...
15,792,342 UART: [fwproc] Received command 0x46574c44
15,794,527 UART: [fwproc] Received Image of size 113760 bytes
19,849,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,927,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,996,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,312,861 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,126,035 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,326,631 >>> mbox cmd response: failed
17,327,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,327,549 >>> mbox cmd response: failed
17,327,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,328,137 >>> mbox cmd response: failed
Initializing fuses
2,055,893 writing to cptra_bootfsm_go
6,667,271 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,606,271 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,302 UART:
192,660 UART: Running Caliptra ROM ...
193,864 UART:
194,014 UART: [state] CFI Enabled
261,405 UART: [state] LifecycleState = Unprovisioned
263,292 UART: [state] DebugLocked = No
265,434 UART: [state] WD Timer not started. Device not locked for debugging
268,719 UART: [kat] SHA2-256
447,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,431 UART: [kat] ++
459,963 UART: [kat] sha1
470,952 UART: [kat] SHA2-256
473,970 UART: [kat] SHA2-384
480,577 UART: [kat] SHA2-512-ACC
483,523 UART: [kat] ECC-384
2,945,061 UART: [kat] HMAC-384Kdf
2,969,215 UART: [kat] LMS
3,498,659 UART: [kat] --
3,502,435 UART: [cold-reset] ++
3,504,637 UART: [fht] FHT @ 0x50003400
3,514,910 UART: [idev] ++
3,515,544 UART: [idev] CDI.KEYID = 6
3,516,475 UART: [idev] SUBJECT.KEYID = 7
3,517,585 UART: [idev] UDS.KEYID = 0
3,520,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,837 UART: [idev] Erasing UDS.KEYID = 0
6,024,480 UART: [idev] Sha1 KeyId Algorithm
6,047,390 UART: [idev] --
6,051,551 UART: [ldev] ++
6,052,123 UART: [ldev] CDI.KEYID = 6
6,053,037 UART: [ldev] SUBJECT.KEYID = 5
6,054,201 UART: [ldev] AUTHORITY.KEYID = 7
6,055,437 UART: [ldev] FE.KEYID = 1
6,098,229 UART: [ldev] Erasing FE.KEYID = 1
8,602,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,203 UART: [ldev] --
10,409,543 UART: [fwproc] Wait for Commands...
10,412,290 UART: [fwproc] Recv command 0x46574c44
10,414,384 UART: [fwproc] Recv'd Img size: 114084 bytes
13,813,177 UART: ROM Fatal Error: 0x000B0028
13,816,307 >>> mbox cmd response: failed
13,816,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,082 >>> mbox cmd response: failed
13,817,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,642 >>> mbox cmd response: failed
Initializing fuses
2,056,936 writing to cptra_bootfsm_go
2,246,253 UART:
2,246,606 UART: Running Caliptra ROM ...
2,247,741 UART:
2,247,928 UART: [state] CFI Enabled
2,314,114 UART: [state] LifecycleState = Unprovisioned
2,315,998 UART: [state] DebugLocked = No
2,318,417 UART: [state] WD Timer not started. Device not locked for debugging
2,322,168 UART: [kat] SHA2-256
2,501,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,823 UART: [kat] ++
2,513,285 UART: [kat] sha1
2,525,521 UART: [kat] SHA2-256
2,528,544 UART: [kat] SHA2-384
2,535,449 UART: [kat] SHA2-512-ACC
2,538,446 UART: [kat] ECC-384
4,999,298 UART: [kat] HMAC-384Kdf
5,021,773 UART: [kat] LMS
5,551,206 UART: [kat] --
5,555,953 UART: [cold-reset] ++
5,557,350 UART: [fht] FHT @ 0x50003400
5,568,008 UART: [idev] ++
5,568,575 UART: [idev] CDI.KEYID = 6
5,569,509 UART: [idev] SUBJECT.KEYID = 7
5,570,721 UART: [idev] UDS.KEYID = 0
5,573,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,716,645 UART: [idev] Erasing UDS.KEYID = 0
8,076,831 UART: [idev] Sha1 KeyId Algorithm
8,098,494 UART: [idev] --
8,101,496 UART: [ldev] ++
8,102,069 UART: [ldev] CDI.KEYID = 6
8,102,987 UART: [ldev] SUBJECT.KEYID = 5
8,104,199 UART: [ldev] AUTHORITY.KEYID = 7
8,105,500 UART: [ldev] FE.KEYID = 1
8,150,648 UART: [ldev] Erasing FE.KEYID = 1
10,651,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,958 UART: [ldev] --
12,443,742 UART: [fwproc] Wait for Commands...
12,446,057 UART: [fwproc] Recv command 0x46574c44
12,448,102 UART: [fwproc] Recv'd Img size: 114084 bytes
15,840,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,912,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,981,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,298,537 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,382,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,629,732 >>> mbox cmd response: failed
13,630,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,630,660 >>> mbox cmd response: failed
13,630,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,631,173 >>> mbox cmd response: failed
Initializing fuses
2,055,634 writing to cptra_bootfsm_go
5,434,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,134,846 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,614 UART:
192,988 UART: Running Caliptra ROM ...
194,184 UART:
603,780 UART: [state] CFI Enabled
615,488 UART: [state] LifecycleState = Unprovisioned
617,313 UART: [state] DebugLocked = No
619,202 UART: [state] WD Timer not started. Device not locked for debugging
622,590 UART: [kat] SHA2-256
801,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,293 UART: [kat] ++
813,736 UART: [kat] sha1
824,173 UART: [kat] SHA2-256
827,235 UART: [kat] SHA2-384
832,630 UART: [kat] SHA2-512-ACC
835,565 UART: [kat] ECC-384
3,274,775 UART: [kat] HMAC-384Kdf
3,288,317 UART: [kat] LMS
3,817,787 UART: [kat] --
3,821,320 UART: [cold-reset] ++
3,823,315 UART: [fht] FHT @ 0x50003400
3,834,026 UART: [idev] ++
3,834,594 UART: [idev] CDI.KEYID = 6
3,835,512 UART: [idev] SUBJECT.KEYID = 7
3,836,725 UART: [idev] UDS.KEYID = 0
3,839,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,690 UART: [idev] Erasing UDS.KEYID = 0
6,309,599 UART: [idev] Sha1 KeyId Algorithm
6,330,995 UART: [idev] --
6,335,276 UART: [ldev] ++
6,335,845 UART: [ldev] CDI.KEYID = 6
6,336,729 UART: [ldev] SUBJECT.KEYID = 5
6,337,952 UART: [ldev] AUTHORITY.KEYID = 7
6,339,354 UART: [ldev] FE.KEYID = 1
6,350,384 UART: [ldev] Erasing FE.KEYID = 1
8,827,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,529 UART: [ldev] --
10,620,768 UART: [fwproc] Wait for Commands...
10,622,754 UART: [fwproc] Recv command 0x46574c44
10,624,849 UART: [fwproc] Recv'd Img size: 114084 bytes
14,028,215 UART: ROM Fatal Error: 0x000B0028
14,031,356 >>> mbox cmd response: failed
14,031,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,032,101 >>> mbox cmd response: failed
14,032,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,032,668 >>> mbox cmd response: failed
Initializing fuses
2,059,045 writing to cptra_bootfsm_go
2,248,376 UART:
2,248,720 UART: Running Caliptra ROM ...
2,249,863 UART:
6,421,519 UART: [state] CFI Enabled
6,433,133 UART: [state] LifecycleState = Unprovisioned
6,434,987 UART: [state] DebugLocked = No
6,436,750 UART: [state] WD Timer not started. Device not locked for debugging
6,440,029 UART: [kat] SHA2-256
6,619,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,630,687 UART: [kat] ++
6,631,232 UART: [kat] sha1
6,642,935 UART: [kat] SHA2-256
6,645,943 UART: [kat] SHA2-384
6,652,196 UART: [kat] SHA2-512-ACC
6,655,203 UART: [kat] ECC-384
9,095,739 UART: [kat] HMAC-384Kdf
9,108,564 UART: [kat] LMS
9,638,034 UART: [kat] --
9,643,316 UART: [cold-reset] ++
9,645,526 UART: [fht] FHT @ 0x50003400
9,656,190 UART: [idev] ++
9,656,764 UART: [idev] CDI.KEYID = 6
9,657,678 UART: [idev] SUBJECT.KEYID = 7
9,658,864 UART: [idev] UDS.KEYID = 0
9,661,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,804,455 UART: [idev] Erasing UDS.KEYID = 0
12,128,779 UART: [idev] Sha1 KeyId Algorithm
12,151,460 UART: [idev] --
12,156,318 UART: [ldev] ++
12,156,897 UART: [ldev] CDI.KEYID = 6
12,157,777 UART: [ldev] SUBJECT.KEYID = 5
12,158,991 UART: [ldev] AUTHORITY.KEYID = 7
12,160,174 UART: [ldev] FE.KEYID = 1
12,170,004 UART: [ldev] Erasing FE.KEYID = 1
14,645,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,360,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,376,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,392,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,408,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,427,633 UART: [ldev] --
16,432,786 UART: [fwproc] Wait for Commands...
16,434,773 UART: [fwproc] Recv command 0x46574c44
16,436,864 UART: [fwproc] Recv'd Img size: 114084 bytes
19,831,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,905,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,974,392 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,291,445 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,693,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,804,847 >>> mbox cmd response: failed
13,805,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,805,731 >>> mbox cmd response: failed
13,805,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,806,284 >>> mbox cmd response: failed
Initializing fuses
2,058,419 writing to cptra_bootfsm_go
9,760,058 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,324,437 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,044 UART:
192,404 UART: Running Caliptra ROM ...
193,605 UART:
193,758 UART: [state] CFI Enabled
261,635 UART: [state] LifecycleState = Unprovisioned
264,035 UART: [state] DebugLocked = No
266,282 UART: [state] WD Timer not started. Device not locked for debugging
271,178 UART: [kat] SHA2-256
461,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,848 UART: [kat] ++
472,335 UART: [kat] sha1
483,561 UART: [kat] SHA2-256
486,599 UART: [kat] SHA2-384
492,892 UART: [kat] SHA2-512-ACC
495,457 UART: [kat] ECC-384
2,945,096 UART: [kat] HMAC-384Kdf
2,969,912 UART: [kat] LMS
3,501,654 UART: [kat] --
3,506,240 UART: [cold-reset] ++
3,507,147 UART: [fht] FHT @ 0x50003400
3,518,668 UART: [idev] ++
3,519,346 UART: [idev] CDI.KEYID = 6
3,520,315 UART: [idev] SUBJECT.KEYID = 7
3,521,526 UART: [idev] UDS.KEYID = 0
3,523,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,832 UART: [idev] Erasing UDS.KEYID = 0
6,029,943 UART: [idev] Sha1 KeyId Algorithm
6,051,765 UART: [idev] --
6,056,316 UART: [ldev] ++
6,057,010 UART: [ldev] CDI.KEYID = 6
6,057,927 UART: [ldev] SUBJECT.KEYID = 5
6,059,145 UART: [ldev] AUTHORITY.KEYID = 7
6,060,326 UART: [ldev] FE.KEYID = 1
6,099,510 UART: [ldev] Erasing FE.KEYID = 1
8,607,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,917 UART: [ldev] --
10,415,002 UART: [fwproc] Wait for Commands...
10,416,842 UART: [fwproc] Recv command 0x46574c44
10,419,113 UART: [fwproc] Recv'd Img size: 114084 bytes
13,864,180 UART: ROM Fatal Error: 0x000B0028
13,867,796 >>> mbox cmd response: failed
13,868,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,868,558 >>> mbox cmd response: failed
13,868,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,869,123 >>> mbox cmd response: failed
Initializing fuses
2,062,271 writing to cptra_bootfsm_go
2,251,630 UART:
2,251,983 UART: Running Caliptra ROM ...
2,253,115 UART:
2,253,282 UART: [state] CFI Enabled
2,328,564 UART: [state] LifecycleState = Unprovisioned
2,330,990 UART: [state] DebugLocked = No
2,332,293 UART: [state] WD Timer not started. Device not locked for debugging
2,336,866 UART: [kat] SHA2-256
2,526,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,537,536 UART: [kat] ++
2,538,093 UART: [kat] sha1
2,548,561 UART: [kat] SHA2-256
2,551,594 UART: [kat] SHA2-384
2,557,376 UART: [kat] SHA2-512-ACC
2,559,952 UART: [kat] ECC-384
5,012,147 UART: [kat] HMAC-384Kdf
5,037,993 UART: [kat] LMS
5,569,797 UART: [kat] --
5,573,739 UART: [cold-reset] ++
5,575,670 UART: [fht] FHT @ 0x50003400
5,587,718 UART: [idev] ++
5,588,413 UART: [idev] CDI.KEYID = 6
5,589,372 UART: [idev] SUBJECT.KEYID = 7
5,590,593 UART: [idev] UDS.KEYID = 0
5,592,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,736,416 UART: [idev] Erasing UDS.KEYID = 0
8,097,127 UART: [idev] Sha1 KeyId Algorithm
8,118,748 UART: [idev] --
8,123,123 UART: [ldev] ++
8,123,805 UART: [ldev] CDI.KEYID = 6
8,124,687 UART: [ldev] SUBJECT.KEYID = 5
8,125,844 UART: [ldev] AUTHORITY.KEYID = 7
8,127,133 UART: [ldev] FE.KEYID = 1
8,164,415 UART: [ldev] Erasing FE.KEYID = 1
10,672,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,705 UART: [ldev] --
12,477,257 UART: [fwproc] Wait for Commands...
12,480,064 UART: [fwproc] Recv command 0x46574c44
12,482,333 UART: [fwproc] Recv'd Img size: 114084 bytes
15,930,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,013,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,129,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,670,791 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,416,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,231,489 >>> mbox cmd response: failed
14,232,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,232,372 >>> mbox cmd response: failed
14,232,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,232,938 >>> mbox cmd response: failed
Initializing fuses
2,061,134 writing to cptra_bootfsm_go
5,460,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,760,860 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,643 UART:
193,007 UART: Running Caliptra ROM ...
194,214 UART:
603,935 UART: [state] CFI Enabled
614,674 UART: [state] LifecycleState = Unprovisioned
617,039 UART: [state] DebugLocked = No
619,140 UART: [state] WD Timer not started. Device not locked for debugging
623,201 UART: [kat] SHA2-256
813,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,821 UART: [kat] ++
824,353 UART: [kat] sha1
836,851 UART: [kat] SHA2-256
839,896 UART: [kat] SHA2-384
844,937 UART: [kat] SHA2-512-ACC
847,551 UART: [kat] ECC-384
3,289,083 UART: [kat] HMAC-384Kdf
3,302,570 UART: [kat] LMS
3,834,414 UART: [kat] --
3,839,491 UART: [cold-reset] ++
3,842,026 UART: [fht] FHT @ 0x50003400
3,855,010 UART: [idev] ++
3,855,687 UART: [idev] CDI.KEYID = 6
3,856,666 UART: [idev] SUBJECT.KEYID = 7
3,857,882 UART: [idev] UDS.KEYID = 0
3,860,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,840 UART: [idev] Erasing UDS.KEYID = 0
6,335,782 UART: [idev] Sha1 KeyId Algorithm
6,357,880 UART: [idev] --
6,363,021 UART: [ldev] ++
6,363,747 UART: [ldev] CDI.KEYID = 6
6,364,663 UART: [ldev] SUBJECT.KEYID = 5
6,365,826 UART: [ldev] AUTHORITY.KEYID = 7
6,367,007 UART: [ldev] FE.KEYID = 1
6,378,305 UART: [ldev] Erasing FE.KEYID = 1
8,858,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,572 UART: [ldev] --
10,652,105 UART: [fwproc] Wait for Commands...
10,655,013 UART: [fwproc] Recv command 0x46574c44
10,657,331 UART: [fwproc] Recv'd Img size: 114084 bytes
14,097,806 UART: ROM Fatal Error: 0x000B0028
14,101,462 >>> mbox cmd response: failed
14,101,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,102,190 >>> mbox cmd response: failed
14,102,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,102,749 >>> mbox cmd response: failed
Initializing fuses
2,059,875 writing to cptra_bootfsm_go
2,249,158 UART:
2,249,521 UART: Running Caliptra ROM ...
2,250,664 UART:
6,346,439 UART: [state] CFI Enabled
6,362,205 UART: [state] LifecycleState = Unprovisioned
6,364,543 UART: [state] DebugLocked = No
6,366,880 UART: [state] WD Timer not started. Device not locked for debugging
6,371,506 UART: [kat] SHA2-256
6,561,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,572,174 UART: [kat] ++
6,572,690 UART: [kat] sha1
6,583,446 UART: [kat] SHA2-256
6,586,500 UART: [kat] SHA2-384
6,592,233 UART: [kat] SHA2-512-ACC
6,594,856 UART: [kat] ECC-384
9,038,561 UART: [kat] HMAC-384Kdf
9,050,967 UART: [kat] LMS
9,582,821 UART: [kat] --
9,586,868 UART: [cold-reset] ++
9,588,960 UART: [fht] FHT @ 0x50003400
9,601,289 UART: [idev] ++
9,601,968 UART: [idev] CDI.KEYID = 6
9,602,905 UART: [idev] SUBJECT.KEYID = 7
9,604,172 UART: [idev] UDS.KEYID = 0
9,606,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,749,906 UART: [idev] Erasing UDS.KEYID = 0
12,079,885 UART: [idev] Sha1 KeyId Algorithm
12,101,338 UART: [idev] --
12,106,816 UART: [ldev] ++
12,107,505 UART: [ldev] CDI.KEYID = 6
12,108,422 UART: [ldev] SUBJECT.KEYID = 5
12,109,635 UART: [ldev] AUTHORITY.KEYID = 7
12,110,811 UART: [ldev] FE.KEYID = 1
12,122,502 UART: [ldev] Erasing FE.KEYID = 1
14,598,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,319,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,334,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,349,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,364,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,386,666 UART: [ldev] --
16,392,744 UART: [fwproc] Wait for Commands...
16,395,064 UART: [fwproc] Recv command 0x46574c44
16,397,384 UART: [fwproc] Recv'd Img size: 114084 bytes
19,842,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,920,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,037,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,577,207 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,757,486 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,488,705 >>> mbox cmd response: failed
14,489,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,489,606 >>> mbox cmd response: failed
14,489,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,490,176 >>> mbox cmd response: failed
Initializing fuses
2,056,985 writing to cptra_bootfsm_go
9,123,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,323,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
894,986 UART: [kat] SHA2-512-ACC
896,887 UART: [kat] ECC-384
902,754 UART: [kat] HMAC-384Kdf
907,472 UART: [kat] LMS
1,475,668 UART: [kat] --
1,476,813 UART: [cold-reset] ++
1,477,195 UART: [fht] Storing FHT @ 0x50003400
1,479,952 UART: [idev] ++
1,480,120 UART: [idev] CDI.KEYID = 6
1,480,480 UART: [idev] SUBJECT.KEYID = 7
1,480,904 UART: [idev] UDS.KEYID = 0
1,481,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,838 UART: [idev] Erasing UDS.KEYID = 0
1,505,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,684 UART: [idev] --
1,515,859 UART: [ldev] ++
1,516,027 UART: [ldev] CDI.KEYID = 6
1,516,390 UART: [ldev] SUBJECT.KEYID = 5
1,516,816 UART: [ldev] AUTHORITY.KEYID = 7
1,517,279 UART: [ldev] FE.KEYID = 1
1,522,707 UART: [ldev] Erasing FE.KEYID = 1
1,548,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,758 UART: [ldev] --
1,588,231 UART: [fwproc] Waiting for Commands...
1,589,078 UART: [fwproc] Received command 0x46574c44
1,589,869 UART: [fwproc] Received Image of size 114084 bytes
2,883,381 UART: ROM Fatal Error: 0x000B0028
2,884,538 >>> mbox cmd response: failed
2,884,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,544 >>> mbox cmd response: failed
2,884,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,571 UART: [kat] SHA2-256
892,509 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
903,070 UART: [kat] HMAC-384Kdf
907,698 UART: [kat] LMS
1,475,894 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,031 UART: [fht] Storing FHT @ 0x50003400
1,479,996 UART: [idev] ++
1,480,164 UART: [idev] CDI.KEYID = 6
1,480,524 UART: [idev] SUBJECT.KEYID = 7
1,480,948 UART: [idev] UDS.KEYID = 0
1,481,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,976 UART: [idev] Erasing UDS.KEYID = 0
1,505,376 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,966 UART: [idev] --
1,515,197 UART: [ldev] ++
1,515,365 UART: [ldev] CDI.KEYID = 6
1,515,728 UART: [ldev] SUBJECT.KEYID = 5
1,516,154 UART: [ldev] AUTHORITY.KEYID = 7
1,516,617 UART: [ldev] FE.KEYID = 1
1,521,533 UART: [ldev] Erasing FE.KEYID = 1
1,546,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,254 UART: [ldev] --
1,585,665 UART: [fwproc] Waiting for Commands...
1,586,372 UART: [fwproc] Received command 0x46574c44
1,587,163 UART: [fwproc] Received Image of size 114084 bytes
2,882,576 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,428 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,181 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,734,783 >>> mbox cmd response: failed
2,734,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,789 >>> mbox cmd response: failed
2,734,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,789 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,539 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
890,950 UART: [kat] SHA2-256
892,888 UART: [kat] SHA2-384
895,681 UART: [kat] SHA2-512-ACC
897,582 UART: [kat] ECC-384
903,011 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,602 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,479,805 UART: [idev] ++
1,479,973 UART: [idev] CDI.KEYID = 6
1,480,333 UART: [idev] SUBJECT.KEYID = 7
1,480,757 UART: [idev] UDS.KEYID = 0
1,481,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,327 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,522,188 UART: [ldev] Erasing FE.KEYID = 1
1,548,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,215 UART: [ldev] --
1,587,622 UART: [fwproc] Waiting for Commands...
1,588,271 UART: [fwproc] Received command 0x46574c44
1,589,062 UART: [fwproc] Received Image of size 114084 bytes
2,883,344 UART: ROM Fatal Error: 0x000B0028
2,884,501 >>> mbox cmd response: failed
2,884,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,507 >>> mbox cmd response: failed
2,884,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,458 UART: [kat] SHA2-256
882,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,504 UART: [kat] ++
886,656 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
903,153 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,970 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,153 UART: [idev] Erasing UDS.KEYID = 0
1,505,997 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,723 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,202 UART: [ldev] Erasing FE.KEYID = 1
1,547,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,023 UART: [ldev] --
1,586,436 UART: [fwproc] Waiting for Commands...
1,587,071 UART: [fwproc] Received command 0x46574c44
1,587,862 UART: [fwproc] Received Image of size 114084 bytes
2,882,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,156 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,734,250 >>> mbox cmd response: failed
2,734,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,256 >>> mbox cmd response: failed
2,734,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,597 UART: [kat] SHA2-256
903,537 UART: [kat] SHA2-384
906,272 UART: [kat] SHA2-512-ACC
908,173 UART: [kat] ECC-384
918,132 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,172,009 UART: [cold-reset] ++
1,172,529 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
1,176,611 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,152 UART: [idev] Erasing UDS.KEYID = 0
1,201,509 UART: [idev] Sha1 KeyId Algorithm
1,209,821 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,577 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,974 UART: ROM Fatal Error: 0x000B0028
2,578,131 >>> mbox cmd response: failed
2,578,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,137 >>> mbox cmd response: failed
2,578,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
917,974 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,919 UART: [fht] FHT @ 0x50003400
1,174,546 UART: [idev] ++
1,174,714 UART: [idev] CDI.KEYID = 6
1,175,074 UART: [idev] SUBJECT.KEYID = 7
1,175,498 UART: [idev] UDS.KEYID = 0
1,175,843 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,391 UART: [ldev] ++
1,210,559 UART: [ldev] CDI.KEYID = 6
1,210,922 UART: [ldev] SUBJECT.KEYID = 5
1,211,348 UART: [ldev] AUTHORITY.KEYID = 7
1,211,811 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,206 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,614 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,324 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,434,394 >>> mbox cmd response: failed
2,434,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,400 >>> mbox cmd response: failed
2,434,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,615 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
893,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,176 UART: [kat] ++
897,328 UART: [kat] sha1
901,674 UART: [kat] SHA2-256
903,614 UART: [kat] SHA2-384
906,205 UART: [kat] SHA2-512-ACC
908,106 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,897 UART: [kat] LMS
1,171,225 UART: [kat] --
1,172,074 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,113 UART: [idev] ++
1,175,281 UART: [idev] CDI.KEYID = 6
1,175,641 UART: [idev] SUBJECT.KEYID = 7
1,176,065 UART: [idev] UDS.KEYID = 0
1,176,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,291 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,916 UART: [idev] --
1,211,186 UART: [ldev] ++
1,211,354 UART: [ldev] CDI.KEYID = 6
1,211,717 UART: [ldev] SUBJECT.KEYID = 5
1,212,143 UART: [ldev] AUTHORITY.KEYID = 7
1,212,606 UART: [ldev] FE.KEYID = 1
1,217,946 UART: [ldev] Erasing FE.KEYID = 1
1,243,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,858 UART: [ldev] --
1,283,141 UART: [fwproc] Wait for Commands...
1,283,911 UART: [fwproc] Recv command 0x46574c44
1,284,639 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,509 UART: ROM Fatal Error: 0x000B0028
2,578,666 >>> mbox cmd response: failed
2,578,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,672 >>> mbox cmd response: failed
2,578,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,481 UART: [kat] HMAC-384Kdf
922,995 UART: [kat] LMS
1,171,323 UART: [kat] --
1,172,066 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,217 UART: [idev] Erasing UDS.KEYID = 0
1,201,180 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,576 UART: [ldev] ++
1,210,744 UART: [ldev] CDI.KEYID = 6
1,211,107 UART: [ldev] SUBJECT.KEYID = 5
1,211,533 UART: [ldev] AUTHORITY.KEYID = 7
1,211,996 UART: [ldev] FE.KEYID = 1
1,217,246 UART: [ldev] Erasing FE.KEYID = 1
1,243,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,000 UART: [ldev] --
1,283,321 UART: [fwproc] Wait for Commands...
1,284,027 UART: [fwproc] Recv command 0x46574c44
1,284,755 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,389 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,435,001 >>> mbox cmd response: failed
2,435,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,007 >>> mbox cmd response: failed
2,435,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,210 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,408 UART: [kat] SHA2-256
890,958 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,290 UART: [kat] LMS
1,168,602 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,169,979 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,173,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,637 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,861 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,460 UART: ROM Fatal Error: 0x000B0028
2,577,617 >>> mbox cmd response: failed
2,577,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,623 >>> mbox cmd response: failed
2,577,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,170,103 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,321 UART: [idev] --
1,208,334 UART: [ldev] ++
1,208,502 UART: [ldev] CDI.KEYID = 6
1,208,866 UART: [ldev] SUBJECT.KEYID = 5
1,209,293 UART: [ldev] AUTHORITY.KEYID = 7
1,209,756 UART: [ldev] FE.KEYID = 1
1,214,676 UART: [ldev] Erasing FE.KEYID = 1
1,240,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,382 UART: [ldev] --
1,279,846 UART: [fwproc] Wait for Commands...
1,280,433 UART: [fwproc] Recv command 0x46574c44
1,281,166 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,838 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,960 >>> mbox cmd response: failed
2,430,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,966 >>> mbox cmd response: failed
2,430,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,118 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,174,626 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,198,970 UART: [idev] Sha1 KeyId Algorithm
1,207,746 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,849 UART: [ldev] --
1,281,319 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,531 UART: ROM Fatal Error: 0x000B0028
2,577,688 >>> mbox cmd response: failed
2,577,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,694 >>> mbox cmd response: failed
2,577,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,381 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,451 UART: [ldev] ++
1,209,619 UART: [ldev] CDI.KEYID = 6
1,209,983 UART: [ldev] SUBJECT.KEYID = 5
1,210,410 UART: [ldev] AUTHORITY.KEYID = 7
1,210,873 UART: [ldev] FE.KEYID = 1
1,216,331 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,657 UART: [ldev] --
1,282,155 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,581 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,001 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,553 >>> mbox cmd response: failed
2,430,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,559 >>> mbox cmd response: failed
2,430,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,769 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,298 UART:
192,678 UART: Running Caliptra ROM ...
193,874 UART:
194,027 UART: [state] CFI Enabled
265,194 UART: [state] LifecycleState = Unprovisioned
267,119 UART: [state] DebugLocked = No
269,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,148 UART: [kat] SHA2-256
444,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,400 UART: [kat] ++
455,849 UART: [kat] sha1
467,270 UART: [kat] SHA2-256
469,938 UART: [kat] SHA2-384
475,756 UART: [kat] SHA2-512-ACC
478,146 UART: [kat] ECC-384
2,766,383 UART: [kat] HMAC-384Kdf
2,798,278 UART: [kat] LMS
3,988,626 UART: [kat] --
3,994,259 UART: [cold-reset] ++
3,995,553 UART: [fht] Storing FHT @ 0x50003400
4,005,525 UART: [idev] ++
4,006,095 UART: [idev] CDI.KEYID = 6
4,007,122 UART: [idev] SUBJECT.KEYID = 7
4,008,286 UART: [idev] UDS.KEYID = 0
4,010,841 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,119 UART: [idev] Erasing UDS.KEYID = 0
7,345,301 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,990 UART: [idev] --
7,370,178 UART: [ldev] ++
7,370,744 UART: [ldev] CDI.KEYID = 6
7,371,681 UART: [ldev] SUBJECT.KEYID = 5
7,372,949 UART: [ldev] AUTHORITY.KEYID = 7
7,374,102 UART: [ldev] FE.KEYID = 1
7,401,973 UART: [ldev] Erasing FE.KEYID = 1
10,735,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,434 UART: [ldev] --
13,113,933 UART: [fwproc] Waiting for Commands...
13,116,258 UART: [fwproc] Received command 0x46574c44
13,118,449 UART: [fwproc] Received Image of size 113760 bytes
17,160,022 UART: ROM Fatal Error: 0x000B0029
17,163,440 >>> mbox cmd response: failed
17,163,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,164,199 >>> mbox cmd response: failed
17,164,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,164,760 >>> mbox cmd response: failed
Initializing fuses
2,054,790 writing to cptra_bootfsm_go
2,244,083 UART:
2,244,429 UART: Running Caliptra ROM ...
2,245,479 UART:
2,245,630 UART: [state] CFI Enabled
2,317,385 UART: [state] LifecycleState = Unprovisioned
2,319,325 UART: [state] DebugLocked = No
2,321,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,867 UART: [kat] SHA2-256
2,495,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,037 UART: [kat] ++
2,506,502 UART: [kat] sha1
2,517,390 UART: [kat] SHA2-256
2,520,052 UART: [kat] SHA2-384
2,525,940 UART: [kat] SHA2-512-ACC
2,528,292 UART: [kat] ECC-384
4,818,815 UART: [kat] HMAC-384Kdf
4,830,669 UART: [kat] LMS
6,020,954 UART: [kat] --
6,025,501 UART: [cold-reset] ++
6,026,742 UART: [fht] Storing FHT @ 0x50003400
6,038,555 UART: [idev] ++
6,039,184 UART: [idev] CDI.KEYID = 6
6,040,064 UART: [idev] SUBJECT.KEYID = 7
6,041,337 UART: [idev] UDS.KEYID = 0
6,043,553 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,186,761 UART: [idev] Erasing UDS.KEYID = 0
9,376,120 UART: [idev] Using Sha1 for KeyId Algorithm
9,398,446 UART: [idev] --
9,403,034 UART: [ldev] ++
9,403,678 UART: [ldev] CDI.KEYID = 6
9,404,593 UART: [ldev] SUBJECT.KEYID = 5
9,405,854 UART: [ldev] AUTHORITY.KEYID = 7
9,407,094 UART: [ldev] FE.KEYID = 1
9,433,306 UART: [ldev] Erasing FE.KEYID = 1
12,768,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,081,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,096,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,111,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,125,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,144,859 UART: [ldev] --
15,150,266 UART: [fwproc] Waiting for Commands...
15,152,479 UART: [fwproc] Received command 0x46574c44
15,154,674 UART: [fwproc] Received Image of size 113760 bytes
19,206,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,280,663 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,349,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,665,404 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,783,519 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,085,933 >>> mbox cmd response: failed
17,086,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,086,842 >>> mbox cmd response: failed
17,087,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,087,400 >>> mbox cmd response: failed
Initializing fuses
2,062,442 writing to cptra_bootfsm_go
5,830,740 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,873,816 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,541 UART:
192,889 UART: Running Caliptra ROM ...
194,074 UART:
603,688 UART: [state] CFI Enabled
618,162 UART: [state] LifecycleState = Unprovisioned
620,077 UART: [state] DebugLocked = No
621,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,605 UART: [kat] SHA2-256
796,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,887 UART: [kat] ++
807,334 UART: [kat] sha1
818,804 UART: [kat] SHA2-256
821,538 UART: [kat] SHA2-384
826,001 UART: [kat] SHA2-512-ACC
828,404 UART: [kat] ECC-384
3,111,702 UART: [kat] HMAC-384Kdf
3,124,419 UART: [kat] LMS
4,314,512 UART: [kat] --
4,320,311 UART: [cold-reset] ++
4,322,356 UART: [fht] Storing FHT @ 0x50003400
4,334,488 UART: [idev] ++
4,335,062 UART: [idev] CDI.KEYID = 6
4,336,084 UART: [idev] SUBJECT.KEYID = 7
4,337,246 UART: [idev] UDS.KEYID = 0
4,339,851 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,951 UART: [idev] Erasing UDS.KEYID = 0
7,622,807 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,669 UART: [idev] --
7,646,311 UART: [ldev] ++
7,647,085 UART: [ldev] CDI.KEYID = 6
7,647,985 UART: [ldev] SUBJECT.KEYID = 5
7,649,005 UART: [ldev] AUTHORITY.KEYID = 7
7,650,349 UART: [ldev] FE.KEYID = 1
7,660,859 UART: [ldev] Erasing FE.KEYID = 1
10,952,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,290 UART: [ldev] --
13,314,958 UART: [fwproc] Waiting for Commands...
13,316,859 UART: [fwproc] Received command 0x46574c44
13,319,048 UART: [fwproc] Received Image of size 113760 bytes
17,367,142 UART: ROM Fatal Error: 0x000B0029
17,370,596 >>> mbox cmd response: failed
17,370,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,371,280 >>> mbox cmd response: failed
17,371,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,371,878 >>> mbox cmd response: failed
Initializing fuses
2,063,254 writing to cptra_bootfsm_go
2,252,566 UART:
2,252,903 UART: Running Caliptra ROM ...
2,254,042 UART:
3,088,693 UART: [state] CFI Enabled
3,098,614 UART: [state] LifecycleState = Unprovisioned
3,100,575 UART: [state] DebugLocked = No
3,103,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,108,919 UART: [kat] SHA2-256
3,278,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,289,225 UART: [kat] ++
3,289,683 UART: [kat] sha1
3,301,975 UART: [kat] SHA2-256
3,304,726 UART: [kat] SHA2-384
3,309,208 UART: [kat] SHA2-512-ACC
3,311,559 UART: [kat] ECC-384
5,594,703 UART: [kat] HMAC-384Kdf
5,605,581 UART: [kat] LMS
6,795,655 UART: [kat] --
6,801,765 UART: [cold-reset] ++
6,803,821 UART: [fht] Storing FHT @ 0x50003400
6,813,866 UART: [idev] ++
6,814,432 UART: [idev] CDI.KEYID = 6
6,815,400 UART: [idev] SUBJECT.KEYID = 7
6,816,614 UART: [idev] UDS.KEYID = 0
6,818,944 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,961,945 UART: [idev] Erasing UDS.KEYID = 0
10,103,524 UART: [idev] Using Sha1 for KeyId Algorithm
10,125,706 UART: [idev] --
10,129,945 UART: [ldev] ++
10,130,529 UART: [ldev] CDI.KEYID = 6
10,131,442 UART: [ldev] SUBJECT.KEYID = 5
10,132,694 UART: [ldev] AUTHORITY.KEYID = 7
10,133,930 UART: [ldev] FE.KEYID = 1
10,145,545 UART: [ldev] Erasing FE.KEYID = 1
13,434,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,730,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,744,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,759,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,774,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,792,861 UART: [ldev] --
15,797,560 UART: [fwproc] Waiting for Commands...
15,800,750 UART: [fwproc] Received command 0x46574c44
15,802,949 UART: [fwproc] Received Image of size 113760 bytes
19,851,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,922,714 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,991,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,307,751 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,131,546 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,338,586 >>> mbox cmd response: failed
17,339,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,339,591 >>> mbox cmd response: failed
17,339,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,340,147 >>> mbox cmd response: failed
Initializing fuses
2,061,992 writing to cptra_bootfsm_go
6,660,335 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,593,227 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,282 UART:
192,654 UART: Running Caliptra ROM ...
193,875 UART:
194,030 UART: [state] CFI Enabled
262,117 UART: [state] LifecycleState = Unprovisioned
264,035 UART: [state] DebugLocked = No
266,344 UART: [state] WD Timer not started. Device not locked for debugging
269,414 UART: [kat] SHA2-256
448,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,071 UART: [kat] ++
460,610 UART: [kat] sha1
471,603 UART: [kat] SHA2-256
474,609 UART: [kat] SHA2-384
479,938 UART: [kat] SHA2-512-ACC
482,887 UART: [kat] ECC-384
2,960,308 UART: [kat] HMAC-384Kdf
2,981,674 UART: [kat] LMS
3,511,136 UART: [kat] --
3,515,463 UART: [cold-reset] ++
3,517,233 UART: [fht] FHT @ 0x50003400
3,528,703 UART: [idev] ++
3,529,264 UART: [idev] CDI.KEYID = 6
3,530,201 UART: [idev] SUBJECT.KEYID = 7
3,531,418 UART: [idev] UDS.KEYID = 0
3,533,839 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,677,580 UART: [idev] Erasing UDS.KEYID = 0
6,039,057 UART: [idev] Sha1 KeyId Algorithm
6,062,564 UART: [idev] --
6,066,613 UART: [ldev] ++
6,067,249 UART: [ldev] CDI.KEYID = 6
6,068,167 UART: [ldev] SUBJECT.KEYID = 5
6,069,304 UART: [ldev] AUTHORITY.KEYID = 7
6,070,580 UART: [ldev] FE.KEYID = 1
6,103,080 UART: [ldev] Erasing FE.KEYID = 1
8,606,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,304 UART: [ldev] --
10,415,810 UART: [fwproc] Wait for Commands...
10,418,503 UART: [fwproc] Recv command 0x46574c44
10,420,545 UART: [fwproc] Recv'd Img size: 114084 bytes
13,820,862 UART: ROM Fatal Error: 0x000B0029
13,823,986 >>> mbox cmd response: failed
13,824,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,824,773 >>> mbox cmd response: failed
13,825,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,825,378 >>> mbox cmd response: failed
Initializing fuses
2,060,576 writing to cptra_bootfsm_go
2,249,895 UART:
2,250,259 UART: Running Caliptra ROM ...
2,251,339 UART:
2,251,497 UART: [state] CFI Enabled
2,310,604 UART: [state] LifecycleState = Unprovisioned
2,312,492 UART: [state] DebugLocked = No
2,314,050 UART: [state] WD Timer not started. Device not locked for debugging
2,318,237 UART: [kat] SHA2-256
2,497,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,922 UART: [kat] ++
2,509,473 UART: [kat] sha1
2,519,506 UART: [kat] SHA2-256
2,522,526 UART: [kat] SHA2-384
2,529,443 UART: [kat] SHA2-512-ACC
2,532,386 UART: [kat] ECC-384
4,995,760 UART: [kat] HMAC-384Kdf
5,018,479 UART: [kat] LMS
5,547,948 UART: [kat] --
5,553,346 UART: [cold-reset] ++
5,554,634 UART: [fht] FHT @ 0x50003400
5,565,884 UART: [idev] ++
5,566,452 UART: [idev] CDI.KEYID = 6
5,567,387 UART: [idev] SUBJECT.KEYID = 7
5,568,601 UART: [idev] UDS.KEYID = 0
5,570,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,714,406 UART: [idev] Erasing UDS.KEYID = 0
8,074,606 UART: [idev] Sha1 KeyId Algorithm
8,096,393 UART: [idev] --
8,100,774 UART: [ldev] ++
8,101,350 UART: [ldev] CDI.KEYID = 6
8,102,233 UART: [ldev] SUBJECT.KEYID = 5
8,103,448 UART: [ldev] AUTHORITY.KEYID = 7
8,104,684 UART: [ldev] FE.KEYID = 1
8,147,063 UART: [ldev] Erasing FE.KEYID = 1
10,649,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,403 UART: [ldev] --
12,451,209 UART: [fwproc] Wait for Commands...
12,453,591 UART: [fwproc] Recv command 0x46574c44
12,455,730 UART: [fwproc] Recv'd Img size: 114084 bytes
15,852,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,233 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,307,144 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,385,428 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,633,738 >>> mbox cmd response: failed
13,634,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,634,672 >>> mbox cmd response: failed
13,634,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,635,233 >>> mbox cmd response: failed
Initializing fuses
2,059,291 writing to cptra_bootfsm_go
5,402,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,081,906 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,599 UART:
192,959 UART: Running Caliptra ROM ...
194,148 UART:
603,838 UART: [state] CFI Enabled
618,962 UART: [state] LifecycleState = Unprovisioned
620,791 UART: [state] DebugLocked = No
622,653 UART: [state] WD Timer not started. Device not locked for debugging
626,794 UART: [kat] SHA2-256
805,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,489 UART: [kat] ++
818,016 UART: [kat] sha1
829,337 UART: [kat] SHA2-256
832,344 UART: [kat] SHA2-384
839,611 UART: [kat] SHA2-512-ACC
842,593 UART: [kat] ECC-384
3,284,773 UART: [kat] HMAC-384Kdf
3,296,902 UART: [kat] LMS
3,826,381 UART: [kat] --
3,829,943 UART: [cold-reset] ++
3,830,953 UART: [fht] FHT @ 0x50003400
3,842,171 UART: [idev] ++
3,842,778 UART: [idev] CDI.KEYID = 6
3,843,671 UART: [idev] SUBJECT.KEYID = 7
3,844,781 UART: [idev] UDS.KEYID = 0
3,847,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,031 UART: [idev] Erasing UDS.KEYID = 0
6,317,123 UART: [idev] Sha1 KeyId Algorithm
6,339,545 UART: [idev] --
6,342,622 UART: [ldev] ++
6,343,191 UART: [ldev] CDI.KEYID = 6
6,344,071 UART: [ldev] SUBJECT.KEYID = 5
6,345,287 UART: [ldev] AUTHORITY.KEYID = 7
6,346,517 UART: [ldev] FE.KEYID = 1
6,355,329 UART: [ldev] Erasing FE.KEYID = 1
8,830,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,643 UART: [ldev] --
10,619,616 UART: [fwproc] Wait for Commands...
10,621,679 UART: [fwproc] Recv command 0x46574c44
10,623,777 UART: [fwproc] Recv'd Img size: 114084 bytes
14,015,508 UART: ROM Fatal Error: 0x000B0029
14,018,640 >>> mbox cmd response: failed
14,018,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,019,309 >>> mbox cmd response: failed
14,019,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,019,982 >>> mbox cmd response: failed
Initializing fuses
2,056,329 writing to cptra_bootfsm_go
2,245,607 UART:
2,245,949 UART: Running Caliptra ROM ...
2,246,992 UART:
6,435,078 UART: [state] CFI Enabled
6,450,479 UART: [state] LifecycleState = Unprovisioned
6,452,342 UART: [state] DebugLocked = No
6,453,918 UART: [state] WD Timer not started. Device not locked for debugging
6,458,346 UART: [kat] SHA2-256
6,637,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,649,068 UART: [kat] ++
6,649,536 UART: [kat] sha1
6,660,366 UART: [kat] SHA2-256
6,663,378 UART: [kat] SHA2-384
6,670,501 UART: [kat] SHA2-512-ACC
6,673,445 UART: [kat] ECC-384
9,113,813 UART: [kat] HMAC-384Kdf
9,126,846 UART: [kat] LMS
9,656,353 UART: [kat] --
9,663,594 UART: [cold-reset] ++
9,665,426 UART: [fht] FHT @ 0x50003400
9,675,724 UART: [idev] ++
9,676,291 UART: [idev] CDI.KEYID = 6
9,677,259 UART: [idev] SUBJECT.KEYID = 7
9,678,416 UART: [idev] UDS.KEYID = 0
9,680,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,824,193 UART: [idev] Erasing UDS.KEYID = 0
12,155,874 UART: [idev] Sha1 KeyId Algorithm
12,179,001 UART: [idev] --
12,183,107 UART: [ldev] ++
12,183,675 UART: [ldev] CDI.KEYID = 6
12,184,745 UART: [ldev] SUBJECT.KEYID = 5
12,185,851 UART: [ldev] AUTHORITY.KEYID = 7
12,187,022 UART: [ldev] FE.KEYID = 1
12,197,291 UART: [ldev] Erasing FE.KEYID = 1
14,673,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,390,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,406,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,422,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,438,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,458,017 UART: [ldev] --
16,461,862 UART: [fwproc] Wait for Commands...
16,463,697 UART: [fwproc] Recv command 0x46574c44
16,465,793 UART: [fwproc] Recv'd Img size: 114084 bytes
19,867,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,939,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,008,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,325,711 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,694,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,806,674 >>> mbox cmd response: failed
13,807,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,807,532 >>> mbox cmd response: failed
13,807,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,808,087 >>> mbox cmd response: failed
Initializing fuses
2,052,910 writing to cptra_bootfsm_go
9,752,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,326,056 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,250 UART:
192,597 UART: Running Caliptra ROM ...
193,797 UART:
193,950 UART: [state] CFI Enabled
266,497 UART: [state] LifecycleState = Unprovisioned
268,916 UART: [state] DebugLocked = No
270,462 UART: [state] WD Timer not started. Device not locked for debugging
275,172 UART: [kat] SHA2-256
465,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,826 UART: [kat] ++
476,305 UART: [kat] sha1
487,568 UART: [kat] SHA2-256
490,584 UART: [kat] SHA2-384
495,760 UART: [kat] SHA2-512-ACC
498,375 UART: [kat] ECC-384
2,946,243 UART: [kat] HMAC-384Kdf
2,971,711 UART: [kat] LMS
3,503,442 UART: [kat] --
3,507,608 UART: [cold-reset] ++
3,508,905 UART: [fht] FHT @ 0x50003400
3,521,946 UART: [idev] ++
3,522,651 UART: [idev] CDI.KEYID = 6
3,523,670 UART: [idev] SUBJECT.KEYID = 7
3,524,776 UART: [idev] UDS.KEYID = 0
3,527,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,943 UART: [idev] Erasing UDS.KEYID = 0
6,028,123 UART: [idev] Sha1 KeyId Algorithm
6,050,180 UART: [idev] --
6,056,123 UART: [ldev] ++
6,056,807 UART: [ldev] CDI.KEYID = 6
6,057,774 UART: [ldev] SUBJECT.KEYID = 5
6,058,941 UART: [ldev] AUTHORITY.KEYID = 7
6,060,121 UART: [ldev] FE.KEYID = 1
6,099,024 UART: [ldev] Erasing FE.KEYID = 1
8,603,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,516 UART: [ldev] --
10,411,619 UART: [fwproc] Wait for Commands...
10,413,882 UART: [fwproc] Recv command 0x46574c44
10,416,203 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,927 UART: ROM Fatal Error: 0x000B0029
13,861,606 >>> mbox cmd response: failed
13,861,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,270 >>> mbox cmd response: failed
13,862,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,827 >>> mbox cmd response: failed
Initializing fuses
2,056,486 writing to cptra_bootfsm_go
2,245,810 UART:
2,246,159 UART: Running Caliptra ROM ...
2,247,296 UART:
2,247,467 UART: [state] CFI Enabled
2,313,425 UART: [state] LifecycleState = Unprovisioned
2,315,855 UART: [state] DebugLocked = No
2,318,112 UART: [state] WD Timer not started. Device not locked for debugging
2,322,685 UART: [kat] SHA2-256
2,512,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,348 UART: [kat] ++
2,524,003 UART: [kat] sha1
2,534,853 UART: [kat] SHA2-256
2,537,877 UART: [kat] SHA2-384
2,543,222 UART: [kat] SHA2-512-ACC
2,545,792 UART: [kat] ECC-384
5,009,645 UART: [kat] HMAC-384Kdf
5,036,706 UART: [kat] LMS
5,568,456 UART: [kat] --
5,573,004 UART: [cold-reset] ++
5,574,029 UART: [fht] FHT @ 0x50003400
5,584,184 UART: [idev] ++
5,584,743 UART: [idev] CDI.KEYID = 6
5,585,627 UART: [idev] SUBJECT.KEYID = 7
5,586,895 UART: [idev] UDS.KEYID = 0
5,589,129 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,732,736 UART: [idev] Erasing UDS.KEYID = 0
8,097,395 UART: [idev] Sha1 KeyId Algorithm
8,120,532 UART: [idev] --
8,126,007 UART: [ldev] ++
8,126,703 UART: [ldev] CDI.KEYID = 6
8,127,586 UART: [ldev] SUBJECT.KEYID = 5
8,128,797 UART: [ldev] AUTHORITY.KEYID = 7
8,130,052 UART: [ldev] FE.KEYID = 1
8,165,686 UART: [ldev] Erasing FE.KEYID = 1
10,673,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,409,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,454,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,477,363 UART: [ldev] --
12,483,495 UART: [fwproc] Wait for Commands...
12,485,160 UART: [fwproc] Recv command 0x46574c44
12,487,478 UART: [fwproc] Recv'd Img size: 114084 bytes
15,927,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,004,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,120,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,660,919 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,443,324 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,285 >>> mbox cmd response: failed
14,268,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,269,188 >>> mbox cmd response: failed
14,269,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,269,805 >>> mbox cmd response: failed
Initializing fuses
2,061,616 writing to cptra_bootfsm_go
5,483,922 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,771,254 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,501 UART:
192,866 UART: Running Caliptra ROM ...
194,002 UART:
603,638 UART: [state] CFI Enabled
614,104 UART: [state] LifecycleState = Unprovisioned
616,471 UART: [state] DebugLocked = No
617,685 UART: [state] WD Timer not started. Device not locked for debugging
621,417 UART: [kat] SHA2-256
811,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
821,867 UART: [kat] ++
822,448 UART: [kat] sha1
832,385 UART: [kat] SHA2-256
835,446 UART: [kat] SHA2-384
840,787 UART: [kat] SHA2-512-ACC
843,341 UART: [kat] ECC-384
3,286,529 UART: [kat] HMAC-384Kdf
3,299,571 UART: [kat] LMS
3,831,391 UART: [kat] --
3,835,826 UART: [cold-reset] ++
3,837,922 UART: [fht] FHT @ 0x50003400
3,848,515 UART: [idev] ++
3,849,250 UART: [idev] CDI.KEYID = 6
3,850,264 UART: [idev] SUBJECT.KEYID = 7
3,851,369 UART: [idev] UDS.KEYID = 0
3,854,129 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,997,641 UART: [idev] Erasing UDS.KEYID = 0
6,326,849 UART: [idev] Sha1 KeyId Algorithm
6,347,881 UART: [idev] --
6,351,468 UART: [ldev] ++
6,352,157 UART: [ldev] CDI.KEYID = 6
6,353,065 UART: [ldev] SUBJECT.KEYID = 5
6,354,237 UART: [ldev] AUTHORITY.KEYID = 7
6,355,418 UART: [ldev] FE.KEYID = 1
6,365,254 UART: [ldev] Erasing FE.KEYID = 1
8,841,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,858 UART: [ldev] --
10,631,873 UART: [fwproc] Wait for Commands...
10,634,244 UART: [fwproc] Recv command 0x46574c44
10,636,498 UART: [fwproc] Recv'd Img size: 114084 bytes
14,075,185 UART: ROM Fatal Error: 0x000B0029
14,078,802 >>> mbox cmd response: failed
14,079,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,079,429 >>> mbox cmd response: failed
14,079,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,080,031 >>> mbox cmd response: failed
Initializing fuses
2,055,537 writing to cptra_bootfsm_go
2,244,843 UART:
2,245,186 UART: Running Caliptra ROM ...
2,246,236 UART:
6,374,871 UART: [state] CFI Enabled
6,386,346 UART: [state] LifecycleState = Unprovisioned
6,388,741 UART: [state] DebugLocked = No
6,390,875 UART: [state] WD Timer not started. Device not locked for debugging
6,396,197 UART: [kat] SHA2-256
6,586,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,596,879 UART: [kat] ++
6,597,401 UART: [kat] sha1
6,608,887 UART: [kat] SHA2-256
6,611,913 UART: [kat] SHA2-384
6,618,660 UART: [kat] SHA2-512-ACC
6,621,228 UART: [kat] ECC-384
9,064,749 UART: [kat] HMAC-384Kdf
9,077,028 UART: [kat] LMS
9,608,870 UART: [kat] --
9,611,947 UART: [cold-reset] ++
9,613,068 UART: [fht] FHT @ 0x50003400
9,623,727 UART: [idev] ++
9,624,479 UART: [idev] CDI.KEYID = 6
9,625,564 UART: [idev] SUBJECT.KEYID = 7
9,626,675 UART: [idev] UDS.KEYID = 0
9,629,017 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,772,248 UART: [idev] Erasing UDS.KEYID = 0
12,105,367 UART: [idev] Sha1 KeyId Algorithm
12,127,413 UART: [idev] --
12,133,084 UART: [ldev] ++
12,133,769 UART: [ldev] CDI.KEYID = 6
12,134,676 UART: [ldev] SUBJECT.KEYID = 5
12,135,833 UART: [ldev] AUTHORITY.KEYID = 7
12,137,060 UART: [ldev] FE.KEYID = 1
12,148,251 UART: [ldev] Erasing FE.KEYID = 1
14,630,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,350,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,365,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,380,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,395,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,417,753 UART: [ldev] --
16,424,055 UART: [fwproc] Wait for Commands...
16,426,679 UART: [fwproc] Recv command 0x46574c44
16,429,003 UART: [fwproc] Recv'd Img size: 114084 bytes
19,871,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,946,406 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,062,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,603,411 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,756,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,493,141 >>> mbox cmd response: failed
14,493,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,494,004 >>> mbox cmd response: failed
14,494,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,494,602 >>> mbox cmd response: failed
Initializing fuses
2,059,959 writing to cptra_bootfsm_go
9,123,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,322,750 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,779 UART: [kat] SHA2-256
892,717 UART: [kat] SHA2-384
895,428 UART: [kat] SHA2-512-ACC
897,329 UART: [kat] ECC-384
902,860 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,093 UART: [fht] Storing FHT @ 0x50003400
1,479,778 UART: [idev] ++
1,479,946 UART: [idev] CDI.KEYID = 6
1,480,306 UART: [idev] SUBJECT.KEYID = 7
1,480,730 UART: [idev] UDS.KEYID = 0
1,481,075 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,926 UART: [idev] Erasing UDS.KEYID = 0
1,505,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,898 UART: [idev] --
1,514,951 UART: [ldev] ++
1,515,119 UART: [ldev] CDI.KEYID = 6
1,515,482 UART: [ldev] SUBJECT.KEYID = 5
1,515,908 UART: [ldev] AUTHORITY.KEYID = 7
1,516,371 UART: [ldev] FE.KEYID = 1
1,521,307 UART: [ldev] Erasing FE.KEYID = 1
1,546,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,884 UART: [ldev] --
1,585,265 UART: [fwproc] Waiting for Commands...
1,586,096 UART: [fwproc] Received command 0x46574c44
1,586,887 UART: [fwproc] Received Image of size 114084 bytes
2,880,373 UART: ROM Fatal Error: 0x000B0029
2,881,530 >>> mbox cmd response: failed
2,881,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,881,536 >>> mbox cmd response: failed
2,881,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,881,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,449 UART: [kat] SHA2-256
882,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,495 UART: [kat] ++
886,647 UART: [kat] sha1
890,987 UART: [kat] SHA2-256
892,925 UART: [kat] SHA2-384
895,778 UART: [kat] SHA2-512-ACC
897,679 UART: [kat] ECC-384
903,284 UART: [kat] HMAC-384Kdf
907,890 UART: [kat] LMS
1,476,086 UART: [kat] --
1,477,013 UART: [cold-reset] ++
1,477,509 UART: [fht] Storing FHT @ 0x50003400
1,480,234 UART: [idev] ++
1,480,402 UART: [idev] CDI.KEYID = 6
1,480,762 UART: [idev] SUBJECT.KEYID = 7
1,481,186 UART: [idev] UDS.KEYID = 0
1,481,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,202 UART: [idev] Erasing UDS.KEYID = 0
1,505,692 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,280 UART: [idev] --
1,515,255 UART: [ldev] ++
1,515,423 UART: [ldev] CDI.KEYID = 6
1,515,786 UART: [ldev] SUBJECT.KEYID = 5
1,516,212 UART: [ldev] AUTHORITY.KEYID = 7
1,516,675 UART: [ldev] FE.KEYID = 1
1,521,667 UART: [ldev] Erasing FE.KEYID = 1
1,547,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,768 UART: [ldev] --
1,586,233 UART: [fwproc] Waiting for Commands...
1,587,030 UART: [fwproc] Received command 0x46574c44
1,587,821 UART: [fwproc] Received Image of size 114084 bytes
2,882,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,170 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,963 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,734,991 >>> mbox cmd response: failed
2,734,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,734,997 >>> mbox cmd response: failed
2,734,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,223 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
907,927 UART: [kat] LMS
1,476,123 UART: [kat] --
1,476,974 UART: [cold-reset] ++
1,477,394 UART: [fht] Storing FHT @ 0x50003400
1,480,279 UART: [idev] ++
1,480,447 UART: [idev] CDI.KEYID = 6
1,480,807 UART: [idev] SUBJECT.KEYID = 7
1,481,231 UART: [idev] UDS.KEYID = 0
1,481,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,505,705 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,411 UART: [idev] --
1,515,482 UART: [ldev] ++
1,515,650 UART: [ldev] CDI.KEYID = 6
1,516,013 UART: [ldev] SUBJECT.KEYID = 5
1,516,439 UART: [ldev] AUTHORITY.KEYID = 7
1,516,902 UART: [ldev] FE.KEYID = 1
1,521,828 UART: [ldev] Erasing FE.KEYID = 1
1,547,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,419 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,571 UART: [fwproc] Received command 0x46574c44
1,588,362 UART: [fwproc] Received Image of size 114084 bytes
2,882,102 UART: ROM Fatal Error: 0x000B0029
2,883,259 >>> mbox cmd response: failed
2,883,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,265 >>> mbox cmd response: failed
2,883,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,813 UART: [kat] SHA2-512-ACC
897,714 UART: [kat] ECC-384
903,357 UART: [kat] HMAC-384Kdf
908,221 UART: [kat] LMS
1,476,417 UART: [kat] --
1,477,454 UART: [cold-reset] ++
1,477,892 UART: [fht] Storing FHT @ 0x50003400
1,480,653 UART: [idev] ++
1,480,821 UART: [idev] CDI.KEYID = 6
1,481,181 UART: [idev] SUBJECT.KEYID = 7
1,481,605 UART: [idev] UDS.KEYID = 0
1,481,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,555 UART: [idev] Erasing UDS.KEYID = 0
1,506,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,561 UART: [idev] --
1,516,762 UART: [ldev] ++
1,516,930 UART: [ldev] CDI.KEYID = 6
1,517,293 UART: [ldev] SUBJECT.KEYID = 5
1,517,719 UART: [ldev] AUTHORITY.KEYID = 7
1,518,182 UART: [ldev] FE.KEYID = 1
1,523,458 UART: [ldev] Erasing FE.KEYID = 1
1,548,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,511 UART: [ldev] --
1,587,778 UART: [fwproc] Waiting for Commands...
1,588,513 UART: [fwproc] Received command 0x46574c44
1,589,304 UART: [fwproc] Received Image of size 114084 bytes
2,883,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,664 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,737,070 >>> mbox cmd response: failed
2,737,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,076 >>> mbox cmd response: failed
2,737,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,238 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,810 UART: [kat] SHA2-512-ACC
908,711 UART: [kat] ECC-384
918,630 UART: [kat] HMAC-384Kdf
923,170 UART: [kat] LMS
1,171,498 UART: [kat] --
1,172,253 UART: [cold-reset] ++
1,172,731 UART: [fht] FHT @ 0x50003400
1,175,522 UART: [idev] ++
1,175,690 UART: [idev] CDI.KEYID = 6
1,176,050 UART: [idev] SUBJECT.KEYID = 7
1,176,474 UART: [idev] UDS.KEYID = 0
1,176,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,422 UART: [idev] Erasing UDS.KEYID = 0
1,201,453 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,210,817 UART: [ldev] ++
1,210,985 UART: [ldev] CDI.KEYID = 6
1,211,348 UART: [ldev] SUBJECT.KEYID = 5
1,211,774 UART: [ldev] AUTHORITY.KEYID = 7
1,212,237 UART: [ldev] FE.KEYID = 1
1,217,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,949 UART: [ldev] --
1,283,306 UART: [fwproc] Wait for Commands...
1,284,108 UART: [fwproc] Recv command 0x46574c44
1,284,836 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,232 UART: ROM Fatal Error: 0x000B0029
2,581,389 >>> mbox cmd response: failed
2,581,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,395 >>> mbox cmd response: failed
2,581,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
892,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,085 UART: [kat] ++
897,237 UART: [kat] sha1
901,355 UART: [kat] SHA2-256
903,295 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,696 UART: [kat] HMAC-384Kdf
922,218 UART: [kat] LMS
1,170,546 UART: [kat] --
1,171,145 UART: [cold-reset] ++
1,171,503 UART: [fht] FHT @ 0x50003400
1,173,992 UART: [idev] ++
1,174,160 UART: [idev] CDI.KEYID = 6
1,174,520 UART: [idev] SUBJECT.KEYID = 7
1,174,944 UART: [idev] UDS.KEYID = 0
1,175,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,202 UART: [idev] Erasing UDS.KEYID = 0
1,199,773 UART: [idev] Sha1 KeyId Algorithm
1,208,209 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,761 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,307 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,692 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,433,708 >>> mbox cmd response: failed
2,433,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,714 >>> mbox cmd response: failed
2,433,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,847 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
893,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,524 UART: [kat] ++
897,676 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,421 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,736 UART: [cold-reset] ++
1,173,086 UART: [fht] FHT @ 0x50003400
1,175,713 UART: [idev] ++
1,175,881 UART: [idev] CDI.KEYID = 6
1,176,241 UART: [idev] SUBJECT.KEYID = 7
1,176,665 UART: [idev] UDS.KEYID = 0
1,177,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,825 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,209,882 UART: [idev] --
1,210,832 UART: [ldev] ++
1,211,000 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,789 UART: [ldev] AUTHORITY.KEYID = 7
1,212,252 UART: [ldev] FE.KEYID = 1
1,217,436 UART: [ldev] Erasing FE.KEYID = 1
1,243,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,494 UART: [ldev] --
1,282,883 UART: [fwproc] Wait for Commands...
1,283,505 UART: [fwproc] Recv command 0x46574c44
1,284,233 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,869 UART: ROM Fatal Error: 0x000B0029
2,579,026 >>> mbox cmd response: failed
2,579,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,032 >>> mbox cmd response: failed
2,579,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,038 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,425 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,386 UART: [cold-reset] ++
1,172,734 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,429 UART: [idev] Erasing UDS.KEYID = 0
1,201,212 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,714 UART: [ldev] ++
1,210,882 UART: [ldev] CDI.KEYID = 6
1,211,245 UART: [ldev] SUBJECT.KEYID = 5
1,211,671 UART: [ldev] AUTHORITY.KEYID = 7
1,212,134 UART: [ldev] FE.KEYID = 1
1,217,746 UART: [ldev] Erasing FE.KEYID = 1
1,243,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,492 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,623 UART: [fwproc] Recv command 0x46574c44
1,284,351 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,387 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,435,147 >>> mbox cmd response: failed
2,435,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,153 >>> mbox cmd response: failed
2,435,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,848 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,028 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,174,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,922 UART: [ldev] Erasing FE.KEYID = 1
1,242,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,130 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,890 UART: ROM Fatal Error: 0x000B0029
2,578,047 >>> mbox cmd response: failed
2,578,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,053 >>> mbox cmd response: failed
2,578,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,174,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,433 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,317 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,314 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,262 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,428,874 >>> mbox cmd response: failed
2,428,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,880 >>> mbox cmd response: failed
2,428,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,574 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,945 UART: [kat] SHA2-512-ACC
906,846 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,132 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,950 UART: [idev] --
1,208,769 UART: [ldev] ++
1,208,937 UART: [ldev] CDI.KEYID = 6
1,209,301 UART: [ldev] SUBJECT.KEYID = 5
1,209,728 UART: [ldev] AUTHORITY.KEYID = 7
1,210,191 UART: [ldev] FE.KEYID = 1
1,215,437 UART: [ldev] Erasing FE.KEYID = 1
1,241,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,159 UART: [fwproc] Wait for Commands...
1,281,868 UART: [fwproc] Recv command 0x46574c44
1,282,601 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,715 UART: ROM Fatal Error: 0x000B0029
2,577,872 >>> mbox cmd response: failed
2,577,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,878 >>> mbox cmd response: failed
2,577,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,884 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,174,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,199,442 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,871 UART: [ldev] SUBJECT.KEYID = 5
1,210,298 UART: [ldev] AUTHORITY.KEYID = 7
1,210,761 UART: [ldev] FE.KEYID = 1
1,215,817 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,093 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,430,329 >>> mbox cmd response: failed
2,430,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,335 >>> mbox cmd response: failed
2,430,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,765 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,059 UART:
192,448 UART: Running Caliptra ROM ...
193,588 UART:
193,741 UART: [state] CFI Enabled
260,267 UART: [state] LifecycleState = Unprovisioned
262,194 UART: [state] DebugLocked = No
264,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,098 UART: [kat] SHA2-256
438,825 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,321 UART: [kat] ++
449,851 UART: [kat] sha1
459,834 UART: [kat] SHA2-256
462,515 UART: [kat] SHA2-384
468,544 UART: [kat] SHA2-512-ACC
470,938 UART: [kat] ECC-384
2,767,183 UART: [kat] HMAC-384Kdf
2,801,106 UART: [kat] LMS
3,991,425 UART: [kat] --
3,996,554 UART: [cold-reset] ++
3,997,844 UART: [fht] Storing FHT @ 0x50003400
4,009,434 UART: [idev] ++
4,010,052 UART: [idev] CDI.KEYID = 6
4,010,990 UART: [idev] SUBJECT.KEYID = 7
4,012,211 UART: [idev] UDS.KEYID = 0
4,014,858 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,158,092 UART: [idev] Erasing UDS.KEYID = 0
7,347,439 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,452 UART: [idev] --
7,373,699 UART: [ldev] ++
7,374,281 UART: [ldev] CDI.KEYID = 6
7,375,192 UART: [ldev] SUBJECT.KEYID = 5
7,376,410 UART: [ldev] AUTHORITY.KEYID = 7
7,377,696 UART: [ldev] FE.KEYID = 1
7,425,398 UART: [ldev] Erasing FE.KEYID = 1
10,757,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,545 UART: [ldev] --
13,140,770 UART: [fwproc] Waiting for Commands...
13,143,090 UART: [fwproc] Received command 0x46574c44
13,145,280 UART: [fwproc] Received Image of size 113760 bytes
15,849,987 UART: ROM Fatal Error: 0x000B003F
15,853,454 >>> mbox cmd response: failed
15,853,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,118 >>> mbox cmd response: failed
15,854,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,806 >>> mbox cmd response: failed
Initializing fuses
2,054,708 writing to cptra_bootfsm_go
2,244,019 UART:
2,244,368 UART: Running Caliptra ROM ...
2,245,416 UART:
2,245,571 UART: [state] CFI Enabled
2,310,888 UART: [state] LifecycleState = Unprovisioned
2,312,843 UART: [state] DebugLocked = No
2,315,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,787 UART: [kat] SHA2-256
2,490,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,993 UART: [kat] ++
2,501,451 UART: [kat] sha1
2,512,828 UART: [kat] SHA2-256
2,515,511 UART: [kat] SHA2-384
2,522,144 UART: [kat] SHA2-512-ACC
2,524,495 UART: [kat] ECC-384
4,810,584 UART: [kat] HMAC-384Kdf
4,843,452 UART: [kat] LMS
6,033,733 UART: [kat] --
6,038,832 UART: [cold-reset] ++
6,041,532 UART: [fht] Storing FHT @ 0x50003400
6,053,616 UART: [idev] ++
6,054,189 UART: [idev] CDI.KEYID = 6
6,055,175 UART: [idev] SUBJECT.KEYID = 7
6,056,397 UART: [idev] UDS.KEYID = 0
6,058,695 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,201,905 UART: [idev] Erasing UDS.KEYID = 0
9,391,734 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,786 UART: [idev] --
9,418,419 UART: [ldev] ++
9,418,994 UART: [ldev] CDI.KEYID = 6
9,419,904 UART: [ldev] SUBJECT.KEYID = 5
9,421,164 UART: [ldev] AUTHORITY.KEYID = 7
9,422,403 UART: [ldev] FE.KEYID = 1
9,466,061 UART: [ldev] Erasing FE.KEYID = 1
12,799,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,126,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,141,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,155,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,175,424 UART: [ldev] --
15,179,932 UART: [fwproc] Waiting for Commands...
15,181,816 UART: [fwproc] Received command 0x46574c44
15,184,006 UART: [fwproc] Received Image of size 113760 bytes
19,228,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,303,026 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,371,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,687,907 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,803,490 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,565,321 >>> mbox cmd response: failed
15,565,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,246 >>> mbox cmd response: failed
15,566,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,813 >>> mbox cmd response: failed
Initializing fuses
2,058,627 writing to cptra_bootfsm_go
5,832,992 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,871,502 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
193,344 UART:
193,732 UART: Running Caliptra ROM ...
194,931 UART:
604,432 UART: [state] CFI Enabled
618,332 UART: [state] LifecycleState = Unprovisioned
620,266 UART: [state] DebugLocked = No
621,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,319 UART: [kat] SHA2-256
797,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,610 UART: [kat] ++
808,060 UART: [kat] sha1
818,884 UART: [kat] SHA2-256
821,574 UART: [kat] SHA2-384
827,064 UART: [kat] SHA2-512-ACC
829,405 UART: [kat] ECC-384
3,113,827 UART: [kat] HMAC-384Kdf
3,125,742 UART: [kat] LMS
4,315,872 UART: [kat] --
4,321,015 UART: [cold-reset] ++
4,322,207 UART: [fht] Storing FHT @ 0x50003400
4,333,777 UART: [idev] ++
4,334,355 UART: [idev] CDI.KEYID = 6
4,335,334 UART: [idev] SUBJECT.KEYID = 7
4,336,550 UART: [idev] UDS.KEYID = 0
4,339,124 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,530 UART: [idev] Erasing UDS.KEYID = 0
7,625,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,459 UART: [idev] --
7,654,087 UART: [ldev] ++
7,654,667 UART: [ldev] CDI.KEYID = 6
7,655,581 UART: [ldev] SUBJECT.KEYID = 5
7,656,801 UART: [ldev] AUTHORITY.KEYID = 7
7,658,090 UART: [ldev] FE.KEYID = 1
7,669,630 UART: [ldev] Erasing FE.KEYID = 1
10,956,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,592 UART: [ldev] --
13,316,126 UART: [fwproc] Waiting for Commands...
13,318,661 UART: [fwproc] Received command 0x46574c44
13,320,847 UART: [fwproc] Received Image of size 113760 bytes
16,027,291 UART: ROM Fatal Error: 0x000B003F
16,030,800 >>> mbox cmd response: failed
16,031,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,031,562 >>> mbox cmd response: failed
16,031,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,032,128 >>> mbox cmd response: failed
Initializing fuses
2,055,562 writing to cptra_bootfsm_go
2,244,938 UART:
2,245,290 UART: Running Caliptra ROM ...
2,246,428 UART:
4,423,165 UART: [state] CFI Enabled
4,439,100 UART: [state] LifecycleState = Unprovisioned
4,441,015 UART: [state] DebugLocked = No
4,442,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,012 UART: [kat] SHA2-256
4,617,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,336 UART: [kat] ++
4,628,801 UART: [kat] sha1
4,639,365 UART: [kat] SHA2-256
4,642,076 UART: [kat] SHA2-384
4,646,828 UART: [kat] SHA2-512-ACC
4,649,233 UART: [kat] ECC-384
6,933,847 UART: [kat] HMAC-384Kdf
6,946,733 UART: [kat] LMS
8,136,859 UART: [kat] --
8,140,331 UART: [cold-reset] ++
8,141,240 UART: [fht] Storing FHT @ 0x50003400
8,151,889 UART: [idev] ++
8,152,459 UART: [idev] CDI.KEYID = 6
8,153,397 UART: [idev] SUBJECT.KEYID = 7
8,154,609 UART: [idev] UDS.KEYID = 0
8,156,929 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,299,931 UART: [idev] Erasing UDS.KEYID = 0
11,440,753 UART: [idev] Using Sha1 for KeyId Algorithm
11,461,914 UART: [idev] --
11,464,958 UART: [ldev] ++
11,465,533 UART: [ldev] CDI.KEYID = 6
11,466,647 UART: [ldev] SUBJECT.KEYID = 5
11,467,863 UART: [ldev] AUTHORITY.KEYID = 7
11,469,045 UART: [ldev] FE.KEYID = 1
11,480,399 UART: [ldev] Erasing FE.KEYID = 1
14,766,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,061,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,076,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,091,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,105,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,123,485 UART: [ldev] --
17,128,862 UART: [fwproc] Waiting for Commands...
17,131,280 UART: [fwproc] Received command 0x46574c44
17,133,466 UART: [fwproc] Received Image of size 113760 bytes
21,173,765 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,252,133 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,321,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,637,976 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,127,285 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,766,409 >>> mbox cmd response: failed
15,767,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,568 >>> mbox cmd response: failed
15,767,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,185 >>> mbox cmd response: failed
Initializing fuses
2,067,326 writing to cptra_bootfsm_go
8,230,555 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,161,402 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
192,348 UART:
192,695 UART: Running Caliptra ROM ...
193,918 UART:
194,079 UART: [state] CFI Enabled
263,348 UART: [state] LifecycleState = Unprovisioned
265,266 UART: [state] DebugLocked = No
268,051 UART: [state] WD Timer not started. Device not locked for debugging
271,495 UART: [kat] SHA2-256
450,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,187 UART: [kat] ++
462,806 UART: [kat] sha1
473,492 UART: [kat] SHA2-256
476,502 UART: [kat] SHA2-384
481,562 UART: [kat] SHA2-512-ACC
484,490 UART: [kat] ECC-384
2,946,732 UART: [kat] HMAC-384Kdf
2,969,945 UART: [kat] LMS
3,499,413 UART: [kat] --
3,506,027 UART: [cold-reset] ++
3,506,925 UART: [fht] FHT @ 0x50003400
3,517,784 UART: [idev] ++
3,518,347 UART: [idev] CDI.KEYID = 6
3,519,284 UART: [idev] SUBJECT.KEYID = 7
3,520,493 UART: [idev] UDS.KEYID = 0
3,522,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,956 UART: [idev] Erasing UDS.KEYID = 0
6,023,673 UART: [idev] Sha1 KeyId Algorithm
6,046,237 UART: [idev] --
6,050,508 UART: [ldev] ++
6,051,081 UART: [ldev] CDI.KEYID = 6
6,051,970 UART: [ldev] SUBJECT.KEYID = 5
6,053,150 UART: [ldev] AUTHORITY.KEYID = 7
6,054,442 UART: [ldev] FE.KEYID = 1
6,097,378 UART: [ldev] Erasing FE.KEYID = 1
8,600,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,192 UART: [ldev] --
10,409,677 UART: [fwproc] Wait for Commands...
10,412,046 UART: [fwproc] Recv command 0x46574c44
10,414,091 UART: [fwproc] Recv'd Img size: 114084 bytes
12,464,685 UART: ROM Fatal Error: 0x000B003F
12,467,809 >>> mbox cmd response: failed
12,468,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,468,507 >>> mbox cmd response: failed
12,468,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,177 >>> mbox cmd response: failed
Initializing fuses
2,061,423 writing to cptra_bootfsm_go
2,250,729 UART:
2,251,084 UART: Running Caliptra ROM ...
2,252,219 UART:
2,252,386 UART: [state] CFI Enabled
2,318,674 UART: [state] LifecycleState = Unprovisioned
2,320,555 UART: [state] DebugLocked = No
2,321,971 UART: [state] WD Timer not started. Device not locked for debugging
2,326,582 UART: [kat] SHA2-256
2,505,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,263 UART: [kat] ++
2,517,814 UART: [kat] sha1
2,529,250 UART: [kat] SHA2-256
2,532,270 UART: [kat] SHA2-384
2,538,630 UART: [kat] SHA2-512-ACC
2,541,627 UART: [kat] ECC-384
5,005,459 UART: [kat] HMAC-384Kdf
5,026,939 UART: [kat] LMS
5,556,364 UART: [kat] --
5,561,436 UART: [cold-reset] ++
5,563,585 UART: [fht] FHT @ 0x50003400
5,575,859 UART: [idev] ++
5,576,431 UART: [idev] CDI.KEYID = 6
5,577,516 UART: [idev] SUBJECT.KEYID = 7
5,578,625 UART: [idev] UDS.KEYID = 0
5,580,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,425 UART: [idev] Erasing UDS.KEYID = 0
8,079,109 UART: [idev] Sha1 KeyId Algorithm
8,102,175 UART: [idev] --
8,106,172 UART: [ldev] ++
8,106,739 UART: [ldev] CDI.KEYID = 6
8,107,647 UART: [ldev] SUBJECT.KEYID = 5
8,108,864 UART: [ldev] AUTHORITY.KEYID = 7
8,110,091 UART: [ldev] FE.KEYID = 1
8,156,120 UART: [ldev] Erasing FE.KEYID = 1
10,658,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,985 UART: [ldev] --
12,470,113 UART: [fwproc] Wait for Commands...
12,472,963 UART: [fwproc] Recv command 0x46574c44
12,475,056 UART: [fwproc] Recv'd Img size: 114084 bytes
15,876,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,951,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,020,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,337,583 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,381,188 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,258,509 >>> mbox cmd response: failed
12,259,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,259,481 >>> mbox cmd response: failed
12,259,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,260,046 >>> mbox cmd response: failed
Initializing fuses
2,054,271 writing to cptra_bootfsm_go
5,414,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,091,160 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,538 UART:
192,890 UART: Running Caliptra ROM ...
194,037 UART:
603,591 UART: [state] CFI Enabled
615,144 UART: [state] LifecycleState = Unprovisioned
616,957 UART: [state] DebugLocked = No
619,895 UART: [state] WD Timer not started. Device not locked for debugging
623,606 UART: [kat] SHA2-256
802,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,258 UART: [kat] ++
814,849 UART: [kat] sha1
826,019 UART: [kat] SHA2-256
829,026 UART: [kat] SHA2-384
835,014 UART: [kat] SHA2-512-ACC
837,957 UART: [kat] ECC-384
3,279,455 UART: [kat] HMAC-384Kdf
3,292,011 UART: [kat] LMS
3,821,508 UART: [kat] --
3,826,849 UART: [cold-reset] ++
3,828,348 UART: [fht] FHT @ 0x50003400
3,838,900 UART: [idev] ++
3,839,471 UART: [idev] CDI.KEYID = 6
3,840,379 UART: [idev] SUBJECT.KEYID = 7
3,841,595 UART: [idev] UDS.KEYID = 0
3,844,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,542 UART: [idev] Erasing UDS.KEYID = 0
6,313,966 UART: [idev] Sha1 KeyId Algorithm
6,337,213 UART: [idev] --
6,340,353 UART: [ldev] ++
6,340,919 UART: [ldev] CDI.KEYID = 6
6,341,826 UART: [ldev] SUBJECT.KEYID = 5
6,343,005 UART: [ldev] AUTHORITY.KEYID = 7
6,344,406 UART: [ldev] FE.KEYID = 1
6,355,115 UART: [ldev] Erasing FE.KEYID = 1
8,828,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,557 UART: [ldev] --
10,618,118 UART: [fwproc] Wait for Commands...
10,619,781 UART: [fwproc] Recv command 0x46574c44
10,621,877 UART: [fwproc] Recv'd Img size: 114084 bytes
12,672,954 UART: ROM Fatal Error: 0x000B003F
12,676,076 >>> mbox cmd response: failed
12,676,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,780 >>> mbox cmd response: failed
12,677,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,481 >>> mbox cmd response: failed
Initializing fuses
2,052,951 writing to cptra_bootfsm_go
2,242,320 UART:
2,242,682 UART: Running Caliptra ROM ...
2,243,826 UART:
7,777,761 UART: [state] CFI Enabled
7,789,592 UART: [state] LifecycleState = Unprovisioned
7,791,452 UART: [state] DebugLocked = No
7,793,221 UART: [state] WD Timer not started. Device not locked for debugging
7,796,105 UART: [kat] SHA2-256
7,975,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,986,808 UART: [kat] ++
7,987,379 UART: [kat] sha1
7,997,522 UART: [kat] SHA2-256
8,000,546 UART: [kat] SHA2-384
8,005,462 UART: [kat] SHA2-512-ACC
8,008,462 UART: [kat] ECC-384
10,448,133 UART: [kat] HMAC-384Kdf
10,460,948 UART: [kat] LMS
10,990,468 UART: [kat] --
10,994,473 UART: [cold-reset] ++
10,995,764 UART: [fht] FHT @ 0x50003400
11,006,691 UART: [idev] ++
11,007,259 UART: [idev] CDI.KEYID = 6
11,008,173 UART: [idev] SUBJECT.KEYID = 7
11,009,392 UART: [idev] UDS.KEYID = 0
11,011,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,155,054 UART: [idev] Erasing UDS.KEYID = 0
13,484,079 UART: [idev] Sha1 KeyId Algorithm
13,507,520 UART: [idev] --
13,511,549 UART: [ldev] ++
13,512,126 UART: [ldev] CDI.KEYID = 6
13,513,015 UART: [ldev] SUBJECT.KEYID = 5
13,514,232 UART: [ldev] AUTHORITY.KEYID = 7
13,515,411 UART: [ldev] FE.KEYID = 1
13,526,784 UART: [ldev] Erasing FE.KEYID = 1
16,006,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,725,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,741,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,757,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,773,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,793,948 UART: [ldev] --
17,797,807 UART: [fwproc] Wait for Commands...
17,800,717 UART: [fwproc] Recv command 0x46574c44
17,802,778 UART: [fwproc] Recv'd Img size: 114084 bytes
21,207,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,279,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,348,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,666,713 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,697,807 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,455,373 >>> mbox cmd response: failed
12,455,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,292 >>> mbox cmd response: failed
12,456,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,858 >>> mbox cmd response: failed
Initializing fuses
2,059,723 writing to cptra_bootfsm_go
11,099,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,674,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,199 UART:
192,555 UART: Running Caliptra ROM ...
193,764 UART:
193,918 UART: [state] CFI Enabled
263,232 UART: [state] LifecycleState = Unprovisioned
265,644 UART: [state] DebugLocked = No
268,273 UART: [state] WD Timer not started. Device not locked for debugging
272,836 UART: [kat] SHA2-256
462,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,460 UART: [kat] ++
473,939 UART: [kat] sha1
484,065 UART: [kat] SHA2-256
487,083 UART: [kat] SHA2-384
493,927 UART: [kat] SHA2-512-ACC
496,516 UART: [kat] ECC-384
2,945,754 UART: [kat] HMAC-384Kdf
2,970,191 UART: [kat] LMS
3,501,967 UART: [kat] --
3,505,337 UART: [cold-reset] ++
3,507,546 UART: [fht] FHT @ 0x50003400
3,518,474 UART: [idev] ++
3,519,159 UART: [idev] CDI.KEYID = 6
3,520,131 UART: [idev] SUBJECT.KEYID = 7
3,521,346 UART: [idev] UDS.KEYID = 0
3,523,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,427 UART: [idev] Erasing UDS.KEYID = 0
6,026,841 UART: [idev] Sha1 KeyId Algorithm
6,048,463 UART: [idev] --
6,051,709 UART: [ldev] ++
6,052,429 UART: [ldev] CDI.KEYID = 6
6,053,348 UART: [ldev] SUBJECT.KEYID = 5
6,054,515 UART: [ldev] AUTHORITY.KEYID = 7
6,055,697 UART: [ldev] FE.KEYID = 1
6,098,242 UART: [ldev] Erasing FE.KEYID = 1
8,607,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,938 UART: [ldev] --
10,412,660 UART: [fwproc] Wait for Commands...
10,415,252 UART: [fwproc] Recv command 0x46574c44
10,417,513 UART: [fwproc] Recv'd Img size: 114084 bytes
12,493,034 UART: ROM Fatal Error: 0x000B003F
12,496,710 >>> mbox cmd response: failed
12,497,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,497,345 >>> mbox cmd response: failed
12,497,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,497,950 >>> mbox cmd response: failed
Initializing fuses
2,057,014 writing to cptra_bootfsm_go
2,246,288 UART:
2,246,632 UART: Running Caliptra ROM ...
2,247,676 UART:
2,247,828 UART: [state] CFI Enabled
2,311,214 UART: [state] LifecycleState = Unprovisioned
2,313,261 UART: [state] DebugLocked = No
2,315,434 UART: [state] WD Timer not started. Device not locked for debugging
2,319,740 UART: [kat] SHA2-256
2,509,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,390 UART: [kat] ++
2,520,882 UART: [kat] sha1
2,534,150 UART: [kat] SHA2-256
2,537,135 UART: [kat] SHA2-384
2,542,434 UART: [kat] SHA2-512-ACC
2,545,011 UART: [kat] ECC-384
4,997,609 UART: [kat] HMAC-384Kdf
5,020,266 UART: [kat] LMS
5,552,034 UART: [kat] --
5,554,158 UART: [cold-reset] ++
5,555,489 UART: [fht] FHT @ 0x50003400
5,566,712 UART: [idev] ++
5,567,391 UART: [idev] CDI.KEYID = 6
5,568,327 UART: [idev] SUBJECT.KEYID = 7
5,569,543 UART: [idev] UDS.KEYID = 0
5,571,717 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,715,321 UART: [idev] Erasing UDS.KEYID = 0
8,077,409 UART: [idev] Sha1 KeyId Algorithm
8,099,352 UART: [idev] --
8,104,385 UART: [ldev] ++
8,105,070 UART: [ldev] CDI.KEYID = 6
8,105,985 UART: [ldev] SUBJECT.KEYID = 5
8,107,143 UART: [ldev] AUTHORITY.KEYID = 7
8,108,374 UART: [ldev] FE.KEYID = 1
8,149,275 UART: [ldev] Erasing FE.KEYID = 1
10,654,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,627 UART: [ldev] --
12,462,414 UART: [fwproc] Wait for Commands...
12,465,451 UART: [fwproc] Recv command 0x46574c44
12,467,779 UART: [fwproc] Recv'd Img size: 114084 bytes
15,915,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,991,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,107,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,649,108 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,439,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,301,666 >>> mbox cmd response: failed
12,302,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,541 >>> mbox cmd response: failed
12,302,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,103 >>> mbox cmd response: failed
Initializing fuses
2,056,811 writing to cptra_bootfsm_go
5,495,630 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,786,456 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,535 UART:
192,904 UART: Running Caliptra ROM ...
194,109 UART:
603,768 UART: [state] CFI Enabled
618,116 UART: [state] LifecycleState = Unprovisioned
620,499 UART: [state] DebugLocked = No
623,010 UART: [state] WD Timer not started. Device not locked for debugging
628,145 UART: [kat] SHA2-256
817,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,769 UART: [kat] ++
829,268 UART: [kat] sha1
840,795 UART: [kat] SHA2-256
843,794 UART: [kat] SHA2-384
850,847 UART: [kat] SHA2-512-ACC
853,455 UART: [kat] ECC-384
3,294,883 UART: [kat] HMAC-384Kdf
3,308,260 UART: [kat] LMS
3,840,116 UART: [kat] --
3,843,649 UART: [cold-reset] ++
3,845,534 UART: [fht] FHT @ 0x50003400
3,856,631 UART: [idev] ++
3,857,368 UART: [idev] CDI.KEYID = 6
3,858,291 UART: [idev] SUBJECT.KEYID = 7
3,859,504 UART: [idev] UDS.KEYID = 0
3,862,028 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,370 UART: [idev] Erasing UDS.KEYID = 0
6,337,322 UART: [idev] Sha1 KeyId Algorithm
6,359,368 UART: [idev] --
6,364,012 UART: [ldev] ++
6,364,700 UART: [ldev] CDI.KEYID = 6
6,365,673 UART: [ldev] SUBJECT.KEYID = 5
6,366,832 UART: [ldev] AUTHORITY.KEYID = 7
6,368,006 UART: [ldev] FE.KEYID = 1
6,381,031 UART: [ldev] Erasing FE.KEYID = 1
8,855,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,625 UART: [ldev] --
10,646,620 UART: [fwproc] Wait for Commands...
10,648,391 UART: [fwproc] Recv command 0x46574c44
10,650,647 UART: [fwproc] Recv'd Img size: 114084 bytes
12,735,234 UART: ROM Fatal Error: 0x000B003F
12,738,892 >>> mbox cmd response: failed
12,739,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,576 >>> mbox cmd response: failed
12,739,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,080 >>> mbox cmd response: failed
Initializing fuses
2,054,508 writing to cptra_bootfsm_go
2,243,840 UART:
2,244,198 UART: Running Caliptra ROM ...
2,245,343 UART:
7,717,775 UART: [state] CFI Enabled
7,731,787 UART: [state] LifecycleState = Unprovisioned
7,734,192 UART: [state] DebugLocked = No
7,737,087 UART: [state] WD Timer not started. Device not locked for debugging
7,741,158 UART: [kat] SHA2-256
7,931,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,941,871 UART: [kat] ++
7,942,412 UART: [kat] sha1
7,953,629 UART: [kat] SHA2-256
7,956,648 UART: [kat] SHA2-384
7,963,554 UART: [kat] SHA2-512-ACC
7,966,120 UART: [kat] ECC-384
10,409,120 UART: [kat] HMAC-384Kdf
10,422,322 UART: [kat] LMS
10,954,173 UART: [kat] --
10,959,787 UART: [cold-reset] ++
10,961,558 UART: [fht] FHT @ 0x50003400
10,973,561 UART: [idev] ++
10,974,239 UART: [idev] CDI.KEYID = 6
10,975,207 UART: [idev] SUBJECT.KEYID = 7
10,976,418 UART: [idev] UDS.KEYID = 0
10,978,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,122,327 UART: [idev] Erasing UDS.KEYID = 0
13,452,386 UART: [idev] Sha1 KeyId Algorithm
13,474,586 UART: [idev] --
13,478,740 UART: [ldev] ++
13,479,421 UART: [ldev] CDI.KEYID = 6
13,480,383 UART: [ldev] SUBJECT.KEYID = 5
13,481,538 UART: [ldev] AUTHORITY.KEYID = 7
13,482,790 UART: [ldev] FE.KEYID = 1
13,493,434 UART: [ldev] Erasing FE.KEYID = 1
15,973,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,739,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,758,565 UART: [ldev] --
17,764,865 UART: [fwproc] Wait for Commands...
17,767,997 UART: [fwproc] Recv command 0x46574c44
17,770,309 UART: [fwproc] Recv'd Img size: 114084 bytes
21,212,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,290,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,406,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,946,883 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,755,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,515,975 >>> mbox cmd response: failed
12,516,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,879 >>> mbox cmd response: failed
12,517,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,517,481 >>> mbox cmd response: failed
Initializing fuses
2,061,620 writing to cptra_bootfsm_go
11,099,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,279,404 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,122 UART: [kat] SHA2-512-ACC
897,023 UART: [kat] ECC-384
902,426 UART: [kat] HMAC-384Kdf
907,032 UART: [kat] LMS
1,475,228 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,540 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,482 UART: [idev] --
1,514,531 UART: [ldev] ++
1,514,699 UART: [ldev] CDI.KEYID = 6
1,515,062 UART: [ldev] SUBJECT.KEYID = 5
1,515,488 UART: [ldev] AUTHORITY.KEYID = 7
1,515,951 UART: [ldev] FE.KEYID = 1
1,521,155 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,194 UART: [ldev] --
1,585,619 UART: [fwproc] Waiting for Commands...
1,586,432 UART: [fwproc] Received command 0x46574c44
1,587,223 UART: [fwproc] Received Image of size 114084 bytes
1,635,297 UART: ROM Fatal Error: 0x000B003F
1,636,456 >>> mbox cmd response: failed
1,636,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,462 >>> mbox cmd response: failed
1,636,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,505 UART: [kat] SHA2-256
882,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,551 UART: [kat] ++
886,703 UART: [kat] sha1
891,051 UART: [kat] SHA2-256
892,989 UART: [kat] SHA2-384
895,812 UART: [kat] SHA2-512-ACC
897,713 UART: [kat] ECC-384
903,434 UART: [kat] HMAC-384Kdf
908,072 UART: [kat] LMS
1,476,268 UART: [kat] --
1,477,105 UART: [cold-reset] ++
1,477,651 UART: [fht] Storing FHT @ 0x50003400
1,480,514 UART: [idev] ++
1,480,682 UART: [idev] CDI.KEYID = 6
1,481,042 UART: [idev] SUBJECT.KEYID = 7
1,481,466 UART: [idev] UDS.KEYID = 0
1,481,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,334 UART: [idev] Erasing UDS.KEYID = 0
1,506,512 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,158 UART: [idev] --
1,516,269 UART: [ldev] ++
1,516,437 UART: [ldev] CDI.KEYID = 6
1,516,800 UART: [ldev] SUBJECT.KEYID = 5
1,517,226 UART: [ldev] AUTHORITY.KEYID = 7
1,517,689 UART: [ldev] FE.KEYID = 1
1,522,951 UART: [ldev] Erasing FE.KEYID = 1
1,548,648 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,348 UART: [ldev] --
1,587,647 UART: [fwproc] Waiting for Commands...
1,588,336 UART: [fwproc] Received command 0x46574c44
1,589,127 UART: [fwproc] Received Image of size 114084 bytes
2,882,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,582 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,073 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,315 >>> mbox cmd response: failed
1,487,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,321 >>> mbox cmd response: failed
1,487,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,735 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,090 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,594 UART: [kat] SHA2-256
882,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,640 UART: [kat] ++
886,792 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,493 UART: [kat] SHA2-512-ACC
897,394 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,557 UART: [kat] LMS
1,475,753 UART: [kat] --
1,476,786 UART: [cold-reset] ++
1,477,176 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,997 UART: [idev] Erasing UDS.KEYID = 0
1,505,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,979 UART: [idev] --
1,515,182 UART: [ldev] ++
1,515,350 UART: [ldev] CDI.KEYID = 6
1,515,713 UART: [ldev] SUBJECT.KEYID = 5
1,516,139 UART: [ldev] AUTHORITY.KEYID = 7
1,516,602 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,873 UART: [ldev] --
1,586,322 UART: [fwproc] Waiting for Commands...
1,587,013 UART: [fwproc] Received command 0x46574c44
1,587,804 UART: [fwproc] Received Image of size 114084 bytes
1,634,918 UART: ROM Fatal Error: 0x000B003F
1,636,077 >>> mbox cmd response: failed
1,636,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,083 >>> mbox cmd response: failed
1,636,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,320 UART: [kat] SHA2-256
882,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,366 UART: [kat] ++
886,518 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,485 UART: [kat] LMS
1,475,681 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,597 UART: [idev] ++
1,479,765 UART: [idev] CDI.KEYID = 6
1,480,125 UART: [idev] SUBJECT.KEYID = 7
1,480,549 UART: [idev] UDS.KEYID = 0
1,480,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,243 UART: [idev] Erasing UDS.KEYID = 0
1,505,077 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,739 UART: [idev] --
1,514,748 UART: [ldev] ++
1,514,916 UART: [ldev] CDI.KEYID = 6
1,515,279 UART: [ldev] SUBJECT.KEYID = 5
1,515,705 UART: [ldev] AUTHORITY.KEYID = 7
1,516,168 UART: [ldev] FE.KEYID = 1
1,521,526 UART: [ldev] Erasing FE.KEYID = 1
1,546,985 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,167 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,359 UART: [fwproc] Received command 0x46574c44
1,588,150 UART: [fwproc] Received Image of size 114084 bytes
2,882,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,536 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,950 >>> mbox cmd response: failed
1,487,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,956 >>> mbox cmd response: failed
1,487,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,700 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
892,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,121 UART: [kat] ++
897,273 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
906,140 UART: [kat] SHA2-512-ACC
908,041 UART: [kat] ECC-384
918,368 UART: [kat] HMAC-384Kdf
923,044 UART: [kat] LMS
1,171,372 UART: [kat] --
1,172,137 UART: [cold-reset] ++
1,172,699 UART: [fht] FHT @ 0x50003400
1,175,312 UART: [idev] ++
1,175,480 UART: [idev] CDI.KEYID = 6
1,175,840 UART: [idev] SUBJECT.KEYID = 7
1,176,264 UART: [idev] UDS.KEYID = 0
1,176,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,200,773 UART: [idev] Sha1 KeyId Algorithm
1,209,297 UART: [idev] --
1,210,337 UART: [ldev] ++
1,210,505 UART: [ldev] CDI.KEYID = 6
1,210,868 UART: [ldev] SUBJECT.KEYID = 5
1,211,294 UART: [ldev] AUTHORITY.KEYID = 7
1,211,757 UART: [ldev] FE.KEYID = 1
1,216,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,462 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,753 UART: ROM Fatal Error: 0x000B003F
1,332,912 >>> mbox cmd response: failed
1,332,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,918 >>> mbox cmd response: failed
1,332,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
893,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,645 UART: [kat] ++
897,797 UART: [kat] sha1
902,111 UART: [kat] SHA2-256
904,051 UART: [kat] SHA2-384
906,816 UART: [kat] SHA2-512-ACC
908,717 UART: [kat] ECC-384
918,770 UART: [kat] HMAC-384Kdf
923,562 UART: [kat] LMS
1,171,890 UART: [kat] --
1,172,667 UART: [cold-reset] ++
1,173,161 UART: [fht] FHT @ 0x50003400
1,175,726 UART: [idev] ++
1,175,894 UART: [idev] CDI.KEYID = 6
1,176,254 UART: [idev] SUBJECT.KEYID = 7
1,176,678 UART: [idev] UDS.KEYID = 0
1,177,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,506 UART: [idev] Erasing UDS.KEYID = 0
1,202,279 UART: [idev] Sha1 KeyId Algorithm
1,210,653 UART: [idev] --
1,211,595 UART: [ldev] ++
1,211,763 UART: [ldev] CDI.KEYID = 6
1,212,126 UART: [ldev] SUBJECT.KEYID = 5
1,212,552 UART: [ldev] AUTHORITY.KEYID = 7
1,213,015 UART: [ldev] FE.KEYID = 1
1,218,043 UART: [ldev] Erasing FE.KEYID = 1
1,244,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,695 UART: [ldev] --
1,284,202 UART: [fwproc] Wait for Commands...
1,284,862 UART: [fwproc] Recv command 0x46574c44
1,285,590 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,392 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,256 >>> mbox cmd response: failed
1,188,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,262 >>> mbox cmd response: failed
1,188,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,199 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
893,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,854 UART: [kat] ++
898,006 UART: [kat] sha1
902,322 UART: [kat] SHA2-256
904,262 UART: [kat] SHA2-384
906,917 UART: [kat] SHA2-512-ACC
908,818 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,173,014 UART: [fht] FHT @ 0x50003400
1,175,711 UART: [idev] ++
1,175,879 UART: [idev] CDI.KEYID = 6
1,176,239 UART: [idev] SUBJECT.KEYID = 7
1,176,663 UART: [idev] UDS.KEYID = 0
1,177,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,325 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,218 UART: [idev] --
1,211,290 UART: [ldev] ++
1,211,458 UART: [ldev] CDI.KEYID = 6
1,211,821 UART: [ldev] SUBJECT.KEYID = 5
1,212,247 UART: [ldev] AUTHORITY.KEYID = 7
1,212,710 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,245,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,794 UART: [ldev] --
1,284,261 UART: [fwproc] Wait for Commands...
1,284,997 UART: [fwproc] Recv command 0x46574c44
1,285,725 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,945 UART: ROM Fatal Error: 0x000B003F
1,334,104 >>> mbox cmd response: failed
1,334,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,110 >>> mbox cmd response: failed
1,334,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
893,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,354 UART: [kat] ++
897,506 UART: [kat] sha1
901,842 UART: [kat] SHA2-256
903,782 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
923,147 UART: [kat] LMS
1,171,475 UART: [kat] --
1,172,432 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,561 UART: [idev] ++
1,175,729 UART: [idev] CDI.KEYID = 6
1,176,089 UART: [idev] SUBJECT.KEYID = 7
1,176,513 UART: [idev] UDS.KEYID = 0
1,176,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,519 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,712 UART: [idev] --
1,210,650 UART: [ldev] ++
1,210,818 UART: [ldev] CDI.KEYID = 6
1,211,181 UART: [ldev] SUBJECT.KEYID = 5
1,211,607 UART: [ldev] AUTHORITY.KEYID = 7
1,212,070 UART: [ldev] FE.KEYID = 1
1,217,096 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,880 UART: [ldev] --
1,282,353 UART: [fwproc] Wait for Commands...
1,283,155 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,562 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,897 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,675 >>> mbox cmd response: failed
1,188,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,681 >>> mbox cmd response: failed
1,188,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,687 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,526 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,922 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,760 UART: [ldev] ++
1,208,928 UART: [ldev] CDI.KEYID = 6
1,209,292 UART: [ldev] SUBJECT.KEYID = 5
1,209,719 UART: [ldev] AUTHORITY.KEYID = 7
1,210,182 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,254 UART: [ldev] --
1,280,716 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x46574c44
1,282,224 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,549 UART: ROM Fatal Error: 0x000B003F
1,331,708 >>> mbox cmd response: failed
1,331,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,714 >>> mbox cmd response: failed
1,331,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,747 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,197,735 UART: [idev] Sha1 KeyId Algorithm
1,206,799 UART: [idev] --
1,207,828 UART: [ldev] ++
1,207,996 UART: [ldev] CDI.KEYID = 6
1,208,360 UART: [ldev] SUBJECT.KEYID = 5
1,208,787 UART: [ldev] AUTHORITY.KEYID = 7
1,209,250 UART: [ldev] FE.KEYID = 1
1,214,558 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,474 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,503 UART: [fwproc] Recv command 0x46574c44
1,281,236 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,402 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,404 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,127 >>> mbox cmd response: failed
1,182,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,133 >>> mbox cmd response: failed
1,182,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,139 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,384 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,084 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,175,058 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,199,254 UART: [idev] Sha1 KeyId Algorithm
1,208,316 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,280,975 UART: [fwproc] Wait for Commands...
1,281,564 UART: [fwproc] Recv command 0x46574c44
1,282,297 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,484 UART: ROM Fatal Error: 0x000B003F
1,330,643 >>> mbox cmd response: failed
1,330,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,649 >>> mbox cmd response: failed
1,330,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
891,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,138 UART: [kat] ++
895,290 UART: [kat] sha1
899,530 UART: [kat] SHA2-256
901,470 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,928 UART: [idev] Erasing UDS.KEYID = 0
1,198,866 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,864 UART: [fwproc] Recv command 0x46574c44
1,282,597 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,999 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,252 >>> mbox cmd response: failed
1,184,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,258 >>> mbox cmd response: failed
1,184,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,411 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,905 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,035 UART:
192,570 UART: Running Caliptra ROM ...
193,702 UART:
193,846 UART: [state] CFI Enabled
261,840 UART: [state] LifecycleState = Unprovisioned
263,770 UART: [state] DebugLocked = No
266,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,633 UART: [kat] SHA2-256
440,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,829 UART: [kat] ++
451,333 UART: [kat] sha1
462,068 UART: [kat] SHA2-256
464,758 UART: [kat] SHA2-384
469,186 UART: [kat] SHA2-512-ACC
471,582 UART: [kat] ECC-384
2,766,359 UART: [kat] HMAC-384Kdf
2,798,708 UART: [kat] LMS
3,988,997 UART: [kat] --
3,994,532 UART: [cold-reset] ++
3,996,469 UART: [fht] Storing FHT @ 0x50003400
4,008,982 UART: [idev] ++
4,009,561 UART: [idev] CDI.KEYID = 6
4,010,476 UART: [idev] SUBJECT.KEYID = 7
4,011,697 UART: [idev] UDS.KEYID = 0
4,014,235 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,634 UART: [idev] Erasing UDS.KEYID = 0
7,346,054 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,888 UART: [idev] --
7,372,162 UART: [ldev] ++
7,372,733 UART: [ldev] CDI.KEYID = 6
7,373,700 UART: [ldev] SUBJECT.KEYID = 5
7,374,912 UART: [ldev] AUTHORITY.KEYID = 7
7,376,744 UART: [ldev] FE.KEYID = 1
7,422,761 UART: [ldev] Erasing FE.KEYID = 1
10,755,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,908 UART: [ldev] --
13,135,743 UART: [fwproc] Waiting for Commands...
13,137,701 UART: [fwproc] Received command 0x46574c44
13,139,901 UART: [fwproc] Received Image of size 113760 bytes
15,845,357 UART: ROM Fatal Error: 0x000B003C
15,848,817 >>> mbox cmd response: failed
15,849,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,474 >>> mbox cmd response: failed
15,849,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,850,036 >>> mbox cmd response: failed
Initializing fuses
2,062,167 writing to cptra_bootfsm_go
2,251,483 UART:
2,251,828 UART: Running Caliptra ROM ...
2,252,964 UART:
2,253,131 UART: [state] CFI Enabled
2,311,465 UART: [state] LifecycleState = Unprovisioned
2,313,351 UART: [state] DebugLocked = No
2,315,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,987 UART: [kat] SHA2-256
2,489,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,205 UART: [kat] ++
2,500,698 UART: [kat] sha1
2,511,163 UART: [kat] SHA2-256
2,513,866 UART: [kat] SHA2-384
2,521,150 UART: [kat] SHA2-512-ACC
2,523,500 UART: [kat] ECC-384
4,813,544 UART: [kat] HMAC-384Kdf
4,847,552 UART: [kat] LMS
6,037,831 UART: [kat] --
6,042,431 UART: [cold-reset] ++
6,043,609 UART: [fht] Storing FHT @ 0x50003400
6,056,554 UART: [idev] ++
6,057,126 UART: [idev] CDI.KEYID = 6
6,058,086 UART: [idev] SUBJECT.KEYID = 7
6,059,307 UART: [idev] UDS.KEYID = 0
6,061,502 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,205,138 UART: [idev] Erasing UDS.KEYID = 0
9,392,417 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,077 UART: [idev] --
9,418,561 UART: [ldev] ++
9,419,185 UART: [ldev] CDI.KEYID = 6
9,420,068 UART: [ldev] SUBJECT.KEYID = 5
9,421,379 UART: [ldev] AUTHORITY.KEYID = 7
9,422,618 UART: [ldev] FE.KEYID = 1
9,470,587 UART: [ldev] Erasing FE.KEYID = 1
12,801,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,057 UART: [ldev] --
15,163,386 UART: [fwproc] Waiting for Commands...
15,166,616 UART: [fwproc] Received command 0x46574c44
15,168,802 UART: [fwproc] Received Image of size 113760 bytes
19,220,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,300,950 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,369,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,686,378 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,783,427 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,530,415 >>> mbox cmd response: failed
15,531,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,531,366 >>> mbox cmd response: failed
15,531,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,531,992 >>> mbox cmd response: failed
Initializing fuses
2,063,431 writing to cptra_bootfsm_go
5,850,646 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,938,566 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,604 UART:
192,961 UART: Running Caliptra ROM ...
194,164 UART:
603,696 UART: [state] CFI Enabled
618,537 UART: [state] LifecycleState = Unprovisioned
620,506 UART: [state] DebugLocked = No
622,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,509 UART: [kat] SHA2-256
797,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,800 UART: [kat] ++
808,284 UART: [kat] sha1
818,786 UART: [kat] SHA2-256
821,474 UART: [kat] SHA2-384
826,965 UART: [kat] SHA2-512-ACC
829,326 UART: [kat] ECC-384
3,113,960 UART: [kat] HMAC-384Kdf
3,126,198 UART: [kat] LMS
4,316,331 UART: [kat] --
4,319,515 UART: [cold-reset] ++
4,320,537 UART: [fht] Storing FHT @ 0x50003400
4,332,916 UART: [idev] ++
4,333,477 UART: [idev] CDI.KEYID = 6
4,334,418 UART: [idev] SUBJECT.KEYID = 7
4,335,689 UART: [idev] UDS.KEYID = 0
4,338,124 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,098 UART: [idev] Erasing UDS.KEYID = 0
7,623,760 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,554 UART: [idev] --
7,648,929 UART: [ldev] ++
7,649,499 UART: [ldev] CDI.KEYID = 6
7,650,621 UART: [ldev] SUBJECT.KEYID = 5
7,651,749 UART: [ldev] AUTHORITY.KEYID = 7
7,652,932 UART: [ldev] FE.KEYID = 1
7,663,686 UART: [ldev] Erasing FE.KEYID = 1
10,953,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,856 UART: [ldev] --
13,313,391 UART: [fwproc] Waiting for Commands...
13,316,351 UART: [fwproc] Received command 0x46574c44
13,318,545 UART: [fwproc] Received Image of size 113760 bytes
16,022,974 UART: ROM Fatal Error: 0x000B003C
16,026,435 >>> mbox cmd response: failed
16,026,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,208 >>> mbox cmd response: failed
16,027,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,783 >>> mbox cmd response: failed
Initializing fuses
2,055,236 writing to cptra_bootfsm_go
2,244,538 UART:
2,244,874 UART: Running Caliptra ROM ...
2,246,010 UART:
4,425,916 UART: [state] CFI Enabled
4,441,549 UART: [state] LifecycleState = Unprovisioned
4,443,466 UART: [state] DebugLocked = No
4,445,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,816 UART: [kat] SHA2-256
4,619,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,085 UART: [kat] ++
4,630,634 UART: [kat] sha1
4,643,150 UART: [kat] SHA2-256
4,645,837 UART: [kat] SHA2-384
4,651,450 UART: [kat] SHA2-512-ACC
4,653,808 UART: [kat] ECC-384
6,937,826 UART: [kat] HMAC-384Kdf
6,949,521 UART: [kat] LMS
8,139,656 UART: [kat] --
8,144,698 UART: [cold-reset] ++
8,147,284 UART: [fht] Storing FHT @ 0x50003400
8,158,495 UART: [idev] ++
8,159,070 UART: [idev] CDI.KEYID = 6
8,160,042 UART: [idev] SUBJECT.KEYID = 7
8,161,261 UART: [idev] UDS.KEYID = 0
8,163,569 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,306,594 UART: [idev] Erasing UDS.KEYID = 0
11,449,637 UART: [idev] Using Sha1 for KeyId Algorithm
11,471,988 UART: [idev] --
11,476,067 UART: [ldev] ++
11,476,648 UART: [ldev] CDI.KEYID = 6
11,477,614 UART: [ldev] SUBJECT.KEYID = 5
11,478,874 UART: [ldev] AUTHORITY.KEYID = 7
11,480,116 UART: [ldev] FE.KEYID = 1
11,490,329 UART: [ldev] Erasing FE.KEYID = 1
14,777,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,071,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,100,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,115,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,134,091 UART: [ldev] --
17,139,302 UART: [fwproc] Waiting for Commands...
17,142,227 UART: [fwproc] Received command 0x46574c44
17,144,456 UART: [fwproc] Received Image of size 113760 bytes
21,191,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,268,536 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,337,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,653,032 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
4,128,744 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,757,806 >>> mbox cmd response: failed
15,758,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,766 >>> mbox cmd response: failed
15,759,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,377 >>> mbox cmd response: failed
Initializing fuses
2,062,428 writing to cptra_bootfsm_go
8,239,257 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,169,940 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,317 UART:
192,665 UART: Running Caliptra ROM ...
193,864 UART:
194,039 UART: [state] CFI Enabled
259,639 UART: [state] LifecycleState = Unprovisioned
261,524 UART: [state] DebugLocked = No
263,668 UART: [state] WD Timer not started. Device not locked for debugging
267,172 UART: [kat] SHA2-256
446,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,879 UART: [kat] ++
458,416 UART: [kat] sha1
469,336 UART: [kat] SHA2-256
472,346 UART: [kat] SHA2-384
479,200 UART: [kat] SHA2-512-ACC
482,134 UART: [kat] ECC-384
2,947,170 UART: [kat] HMAC-384Kdf
2,970,315 UART: [kat] LMS
3,499,764 UART: [kat] --
3,503,164 UART: [cold-reset] ++
3,504,863 UART: [fht] FHT @ 0x50003400
3,515,853 UART: [idev] ++
3,516,428 UART: [idev] CDI.KEYID = 6
3,517,347 UART: [idev] SUBJECT.KEYID = 7
3,518,561 UART: [idev] UDS.KEYID = 0
3,521,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,749 UART: [idev] Erasing UDS.KEYID = 0
6,023,279 UART: [idev] Sha1 KeyId Algorithm
6,046,728 UART: [idev] --
6,050,726 UART: [ldev] ++
6,051,301 UART: [ldev] CDI.KEYID = 6
6,052,368 UART: [ldev] SUBJECT.KEYID = 5
6,053,475 UART: [ldev] AUTHORITY.KEYID = 7
6,054,656 UART: [ldev] FE.KEYID = 1
6,100,001 UART: [ldev] Erasing FE.KEYID = 1
8,601,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,892 UART: [ldev] --
10,392,664 UART: [fwproc] Wait for Commands...
10,394,766 UART: [fwproc] Recv command 0x46574c44
10,396,808 UART: [fwproc] Recv'd Img size: 114084 bytes
12,444,793 UART: ROM Fatal Error: 0x000B003C
12,447,866 >>> mbox cmd response: failed
12,448,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,596 >>> mbox cmd response: failed
12,448,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,153 >>> mbox cmd response: failed
Initializing fuses
2,054,727 writing to cptra_bootfsm_go
2,244,039 UART:
2,244,383 UART: Running Caliptra ROM ...
2,245,482 UART:
2,245,640 UART: [state] CFI Enabled
2,318,340 UART: [state] LifecycleState = Unprovisioned
2,320,224 UART: [state] DebugLocked = No
2,322,559 UART: [state] WD Timer not started. Device not locked for debugging
2,326,415 UART: [kat] SHA2-256
2,505,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,144 UART: [kat] ++
2,517,694 UART: [kat] sha1
2,529,186 UART: [kat] SHA2-256
2,532,201 UART: [kat] SHA2-384
2,538,525 UART: [kat] SHA2-512-ACC
2,541,491 UART: [kat] ECC-384
4,984,178 UART: [kat] HMAC-384Kdf
5,008,341 UART: [kat] LMS
5,537,811 UART: [kat] --
5,540,344 UART: [cold-reset] ++
5,542,222 UART: [fht] FHT @ 0x50003400
5,552,936 UART: [idev] ++
5,553,509 UART: [idev] CDI.KEYID = 6
5,554,475 UART: [idev] SUBJECT.KEYID = 7
5,555,633 UART: [idev] UDS.KEYID = 0
5,557,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,701,512 UART: [idev] Erasing UDS.KEYID = 0
8,063,456 UART: [idev] Sha1 KeyId Algorithm
8,087,120 UART: [idev] --
8,089,440 UART: [ldev] ++
8,090,015 UART: [ldev] CDI.KEYID = 6
8,090,954 UART: [ldev] SUBJECT.KEYID = 5
8,092,125 UART: [ldev] AUTHORITY.KEYID = 7
8,093,286 UART: [ldev] FE.KEYID = 1
8,138,130 UART: [ldev] Erasing FE.KEYID = 1
10,644,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,979 UART: [ldev] --
12,453,133 UART: [fwproc] Wait for Commands...
12,456,261 UART: [fwproc] Recv command 0x46574c44
12,458,356 UART: [fwproc] Recv'd Img size: 114084 bytes
15,856,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,318,267 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,374,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,268,415 >>> mbox cmd response: failed
12,269,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,269,400 >>> mbox cmd response: failed
12,269,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,269,974 >>> mbox cmd response: failed
Initializing fuses
2,055,844 writing to cptra_bootfsm_go
5,437,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,144,197 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,608 UART:
192,985 UART: Running Caliptra ROM ...
194,104 UART:
603,766 UART: [state] CFI Enabled
616,230 UART: [state] LifecycleState = Unprovisioned
618,114 UART: [state] DebugLocked = No
619,945 UART: [state] WD Timer not started. Device not locked for debugging
624,409 UART: [kat] SHA2-256
803,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,094 UART: [kat] ++
815,566 UART: [kat] sha1
826,877 UART: [kat] SHA2-256
829,946 UART: [kat] SHA2-384
836,028 UART: [kat] SHA2-512-ACC
839,016 UART: [kat] ECC-384
3,277,722 UART: [kat] HMAC-384Kdf
3,291,790 UART: [kat] LMS
3,821,289 UART: [kat] --
3,825,071 UART: [cold-reset] ++
3,826,143 UART: [fht] FHT @ 0x50003400
3,837,177 UART: [idev] ++
3,837,782 UART: [idev] CDI.KEYID = 6
3,838,707 UART: [idev] SUBJECT.KEYID = 7
3,839,870 UART: [idev] UDS.KEYID = 0
3,842,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,631 UART: [idev] Erasing UDS.KEYID = 0
6,309,711 UART: [idev] Sha1 KeyId Algorithm
6,333,479 UART: [idev] --
6,338,259 UART: [ldev] ++
6,338,839 UART: [ldev] CDI.KEYID = 6
6,339,750 UART: [ldev] SUBJECT.KEYID = 5
6,340,911 UART: [ldev] AUTHORITY.KEYID = 7
6,342,144 UART: [ldev] FE.KEYID = 1
6,352,899 UART: [ldev] Erasing FE.KEYID = 1
8,821,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,874 UART: [ldev] --
10,614,084 UART: [fwproc] Wait for Commands...
10,616,127 UART: [fwproc] Recv command 0x46574c44
10,618,185 UART: [fwproc] Recv'd Img size: 114084 bytes
12,668,501 UART: ROM Fatal Error: 0x000B003C
12,671,633 >>> mbox cmd response: failed
12,672,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,375 >>> mbox cmd response: failed
12,672,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,936 >>> mbox cmd response: failed
Initializing fuses
2,059,401 writing to cptra_bootfsm_go
2,248,736 UART:
2,249,096 UART: Running Caliptra ROM ...
2,250,187 UART:
7,782,510 UART: [state] CFI Enabled
7,799,143 UART: [state] LifecycleState = Unprovisioned
7,801,028 UART: [state] DebugLocked = No
7,802,816 UART: [state] WD Timer not started. Device not locked for debugging
7,806,299 UART: [kat] SHA2-256
7,985,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,996,980 UART: [kat] ++
7,997,446 UART: [kat] sha1
8,009,196 UART: [kat] SHA2-256
8,012,214 UART: [kat] SHA2-384
8,018,315 UART: [kat] SHA2-512-ACC
8,021,262 UART: [kat] ECC-384
10,463,153 UART: [kat] HMAC-384Kdf
10,476,462 UART: [kat] LMS
11,005,980 UART: [kat] --
11,010,171 UART: [cold-reset] ++
11,011,895 UART: [fht] FHT @ 0x50003400
11,021,967 UART: [idev] ++
11,022,558 UART: [idev] CDI.KEYID = 6
11,023,475 UART: [idev] SUBJECT.KEYID = 7
11,024,636 UART: [idev] UDS.KEYID = 0
11,027,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,170,408 UART: [idev] Erasing UDS.KEYID = 0
13,498,077 UART: [idev] Sha1 KeyId Algorithm
13,521,485 UART: [idev] --
13,525,695 UART: [ldev] ++
13,526,263 UART: [ldev] CDI.KEYID = 6
13,527,144 UART: [ldev] SUBJECT.KEYID = 5
13,528,360 UART: [ldev] AUTHORITY.KEYID = 7
13,529,648 UART: [ldev] FE.KEYID = 1
13,542,267 UART: [ldev] Erasing FE.KEYID = 1
16,014,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,735,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,751,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,767,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,783,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,802,601 UART: [ldev] --
17,808,069 UART: [fwproc] Wait for Commands...
17,810,350 UART: [fwproc] Recv command 0x46574c44
17,812,397 UART: [fwproc] Recv'd Img size: 114084 bytes
21,210,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,290,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,359,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,676,933 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,532 writing to cptra_bootfsm_go
3,698,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,456,519 >>> mbox cmd response: failed
12,457,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,403 >>> mbox cmd response: failed
12,457,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,918 >>> mbox cmd response: failed
Initializing fuses
2,053,114 writing to cptra_bootfsm_go
11,098,438 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,674,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,090 UART:
192,463 UART: Running Caliptra ROM ...
193,676 UART:
193,846 UART: [state] CFI Enabled
262,095 UART: [state] LifecycleState = Unprovisioned
264,511 UART: [state] DebugLocked = No
265,701 UART: [state] WD Timer not started. Device not locked for debugging
270,291 UART: [kat] SHA2-256
460,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,962 UART: [kat] ++
471,418 UART: [kat] sha1
483,270 UART: [kat] SHA2-256
486,286 UART: [kat] SHA2-384
492,273 UART: [kat] SHA2-512-ACC
494,832 UART: [kat] ECC-384
2,946,341 UART: [kat] HMAC-384Kdf
2,968,352 UART: [kat] LMS
3,500,135 UART: [kat] --
3,505,744 UART: [cold-reset] ++
3,507,129 UART: [fht] FHT @ 0x50003400
3,518,883 UART: [idev] ++
3,519,564 UART: [idev] CDI.KEYID = 6
3,520,585 UART: [idev] SUBJECT.KEYID = 7
3,521,748 UART: [idev] UDS.KEYID = 0
3,524,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,904 UART: [idev] Erasing UDS.KEYID = 0
6,026,669 UART: [idev] Sha1 KeyId Algorithm
6,049,268 UART: [idev] --
6,054,886 UART: [ldev] ++
6,055,573 UART: [ldev] CDI.KEYID = 6
6,056,485 UART: [ldev] SUBJECT.KEYID = 5
6,057,703 UART: [ldev] AUTHORITY.KEYID = 7
6,058,882 UART: [ldev] FE.KEYID = 1
6,098,750 UART: [ldev] Erasing FE.KEYID = 1
8,607,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,704 UART: [ldev] --
10,414,022 UART: [fwproc] Wait for Commands...
10,416,068 UART: [fwproc] Recv command 0x46574c44
10,418,388 UART: [fwproc] Recv'd Img size: 114084 bytes
12,496,372 UART: ROM Fatal Error: 0x000B003C
12,500,045 >>> mbox cmd response: failed
12,500,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,689 >>> mbox cmd response: failed
12,500,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,288 >>> mbox cmd response: failed
Initializing fuses
2,056,259 writing to cptra_bootfsm_go
2,245,559 UART:
2,245,909 UART: Running Caliptra ROM ...
2,247,045 UART:
2,247,214 UART: [state] CFI Enabled
2,309,419 UART: [state] LifecycleState = Unprovisioned
2,311,789 UART: [state] DebugLocked = No
2,314,694 UART: [state] WD Timer not started. Device not locked for debugging
2,318,457 UART: [kat] SHA2-256
2,508,131 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,933 UART: [kat] ++
2,519,423 UART: [kat] sha1
2,530,638 UART: [kat] SHA2-256
2,533,667 UART: [kat] SHA2-384
2,539,723 UART: [kat] SHA2-512-ACC
2,542,303 UART: [kat] ECC-384
4,996,572 UART: [kat] HMAC-384Kdf
5,019,447 UART: [kat] LMS
5,551,235 UART: [kat] --
5,556,110 UART: [cold-reset] ++
5,557,349 UART: [fht] FHT @ 0x50003400
5,568,604 UART: [idev] ++
5,569,319 UART: [idev] CDI.KEYID = 6
5,570,234 UART: [idev] SUBJECT.KEYID = 7
5,571,448 UART: [idev] UDS.KEYID = 0
5,573,709 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,717,159 UART: [idev] Erasing UDS.KEYID = 0
8,078,419 UART: [idev] Sha1 KeyId Algorithm
8,099,986 UART: [idev] --
8,103,785 UART: [ldev] ++
8,104,467 UART: [ldev] CDI.KEYID = 6
8,105,350 UART: [ldev] SUBJECT.KEYID = 5
8,106,562 UART: [ldev] AUTHORITY.KEYID = 7
8,107,803 UART: [ldev] FE.KEYID = 1
8,148,891 UART: [ldev] Erasing FE.KEYID = 1
10,653,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,856 UART: [ldev] --
12,462,242 UART: [fwproc] Wait for Commands...
12,464,609 UART: [fwproc] Recv command 0x46574c44
12,466,930 UART: [fwproc] Recv'd Img size: 114084 bytes
15,911,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,986,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,102,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,644,060 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,441,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,304,781 >>> mbox cmd response: failed
12,305,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,692 >>> mbox cmd response: failed
12,305,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,306,261 >>> mbox cmd response: failed
Initializing fuses
2,058,365 writing to cptra_bootfsm_go
5,493,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,779,368 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,430 UART:
192,805 UART: Running Caliptra ROM ...
193,933 UART:
603,603 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,685 UART: [state] DebugLocked = No
621,544 UART: [state] WD Timer not started. Device not locked for debugging
626,908 UART: [kat] SHA2-256
816,809 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,555 UART: [kat] ++
828,090 UART: [kat] sha1
840,004 UART: [kat] SHA2-256
843,013 UART: [kat] SHA2-384
847,915 UART: [kat] SHA2-512-ACC
850,476 UART: [kat] ECC-384
3,292,597 UART: [kat] HMAC-384Kdf
3,305,532 UART: [kat] LMS
3,837,392 UART: [kat] --
3,841,522 UART: [cold-reset] ++
3,842,425 UART: [fht] FHT @ 0x50003400
3,855,002 UART: [idev] ++
3,855,685 UART: [idev] CDI.KEYID = 6
3,856,623 UART: [idev] SUBJECT.KEYID = 7
3,857,843 UART: [idev] UDS.KEYID = 0
3,860,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,330 UART: [idev] Erasing UDS.KEYID = 0
6,331,131 UART: [idev] Sha1 KeyId Algorithm
6,354,032 UART: [idev] --
6,359,536 UART: [ldev] ++
6,360,217 UART: [ldev] CDI.KEYID = 6
6,361,183 UART: [ldev] SUBJECT.KEYID = 5
6,362,348 UART: [ldev] AUTHORITY.KEYID = 7
6,363,578 UART: [ldev] FE.KEYID = 1
6,375,030 UART: [ldev] Erasing FE.KEYID = 1
8,853,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,385 UART: [ldev] --
10,644,013 UART: [fwproc] Wait for Commands...
10,647,203 UART: [fwproc] Recv command 0x46574c44
10,649,518 UART: [fwproc] Recv'd Img size: 114084 bytes
12,736,046 UART: ROM Fatal Error: 0x000B003C
12,739,702 >>> mbox cmd response: failed
12,740,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,331 >>> mbox cmd response: failed
12,740,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,928 >>> mbox cmd response: failed
Initializing fuses
2,054,896 writing to cptra_bootfsm_go
2,244,208 UART:
2,244,558 UART: Running Caliptra ROM ...
2,245,694 UART:
7,711,104 UART: [state] CFI Enabled
7,724,371 UART: [state] LifecycleState = Unprovisioned
7,726,715 UART: [state] DebugLocked = No
7,729,371 UART: [state] WD Timer not started. Device not locked for debugging
7,734,614 UART: [kat] SHA2-256
7,924,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,935,255 UART: [kat] ++
7,935,857 UART: [kat] sha1
7,947,401 UART: [kat] SHA2-256
7,950,421 UART: [kat] SHA2-384
7,957,017 UART: [kat] SHA2-512-ACC
7,959,596 UART: [kat] ECC-384
10,402,342 UART: [kat] HMAC-384Kdf
10,416,788 UART: [kat] LMS
10,948,581 UART: [kat] --
10,953,818 UART: [cold-reset] ++
10,955,319 UART: [fht] FHT @ 0x50003400
10,967,165 UART: [idev] ++
10,967,900 UART: [idev] CDI.KEYID = 6
10,968,809 UART: [idev] SUBJECT.KEYID = 7
10,970,023 UART: [idev] UDS.KEYID = 0
10,972,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,115,742 UART: [idev] Erasing UDS.KEYID = 0
13,444,835 UART: [idev] Sha1 KeyId Algorithm
13,467,575 UART: [idev] --
13,473,134 UART: [ldev] ++
13,473,837 UART: [ldev] CDI.KEYID = 6
13,474,748 UART: [ldev] SUBJECT.KEYID = 5
13,475,912 UART: [ldev] AUTHORITY.KEYID = 7
13,477,142 UART: [ldev] FE.KEYID = 1
13,489,140 UART: [ldev] Erasing FE.KEYID = 1
15,967,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,686,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,717,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,751,841 UART: [ldev] --
17,758,195 UART: [fwproc] Wait for Commands...
17,760,951 UART: [fwproc] Recv command 0x46574c44
17,763,208 UART: [fwproc] Recv'd Img size: 114084 bytes
21,208,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,282,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,398,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,938,703 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,756,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,527,176 >>> mbox cmd response: failed
12,527,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,082 >>> mbox cmd response: failed
12,528,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,644 >>> mbox cmd response: failed
Initializing fuses
2,055,719 writing to cptra_bootfsm_go
11,096,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,285,005 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,157 UART: [kat] SHA2-256
892,095 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
906,732 UART: [kat] LMS
1,474,928 UART: [kat] --
1,475,733 UART: [cold-reset] ++
1,476,083 UART: [fht] Storing FHT @ 0x50003400
1,478,952 UART: [idev] ++
1,479,120 UART: [idev] CDI.KEYID = 6
1,479,480 UART: [idev] SUBJECT.KEYID = 7
1,479,904 UART: [idev] UDS.KEYID = 0
1,480,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,194 UART: [idev] Erasing UDS.KEYID = 0
1,504,570 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,254 UART: [idev] --
1,514,403 UART: [ldev] ++
1,514,571 UART: [ldev] CDI.KEYID = 6
1,514,934 UART: [ldev] SUBJECT.KEYID = 5
1,515,360 UART: [ldev] AUTHORITY.KEYID = 7
1,515,823 UART: [ldev] FE.KEYID = 1
1,521,029 UART: [ldev] Erasing FE.KEYID = 1
1,546,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,747 UART: [fwproc] Waiting for Commands...
1,586,614 UART: [fwproc] Received command 0x46574c44
1,587,405 UART: [fwproc] Received Image of size 114084 bytes
1,634,957 UART: ROM Fatal Error: 0x000B003C
1,636,116 >>> mbox cmd response: failed
1,636,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,122 >>> mbox cmd response: failed
1,636,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,143 UART: [kat] SHA2-256
892,081 UART: [kat] SHA2-384
894,696 UART: [kat] SHA2-512-ACC
896,597 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
907,034 UART: [kat] LMS
1,475,230 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,609 UART: [fht] Storing FHT @ 0x50003400
1,479,396 UART: [idev] ++
1,479,564 UART: [idev] CDI.KEYID = 6
1,479,924 UART: [idev] SUBJECT.KEYID = 7
1,480,348 UART: [idev] UDS.KEYID = 0
1,480,693 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,270 UART: [idev] Erasing UDS.KEYID = 0
1,505,436 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,514,793 UART: [ldev] ++
1,514,961 UART: [ldev] CDI.KEYID = 6
1,515,324 UART: [ldev] SUBJECT.KEYID = 5
1,515,750 UART: [ldev] AUTHORITY.KEYID = 7
1,516,213 UART: [ldev] FE.KEYID = 1
1,521,365 UART: [ldev] Erasing FE.KEYID = 1
1,546,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,884 UART: [ldev] --
1,586,355 UART: [fwproc] Waiting for Commands...
1,587,112 UART: [fwproc] Received command 0x46574c44
1,587,903 UART: [fwproc] Received Image of size 114084 bytes
2,883,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,565 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,679 >>> mbox cmd response: failed
1,487,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,685 >>> mbox cmd response: failed
1,487,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,299 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
87,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
891,150 UART: [kat] SHA2-256
893,088 UART: [kat] SHA2-384
895,813 UART: [kat] SHA2-512-ACC
897,714 UART: [kat] ECC-384
903,569 UART: [kat] HMAC-384Kdf
908,193 UART: [kat] LMS
1,476,389 UART: [kat] --
1,477,156 UART: [cold-reset] ++
1,477,682 UART: [fht] Storing FHT @ 0x50003400
1,480,569 UART: [idev] ++
1,480,737 UART: [idev] CDI.KEYID = 6
1,481,097 UART: [idev] SUBJECT.KEYID = 7
1,481,521 UART: [idev] UDS.KEYID = 0
1,481,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,423 UART: [idev] Erasing UDS.KEYID = 0
1,506,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,335 UART: [idev] --
1,516,564 UART: [ldev] ++
1,516,732 UART: [ldev] CDI.KEYID = 6
1,517,095 UART: [ldev] SUBJECT.KEYID = 5
1,517,521 UART: [ldev] AUTHORITY.KEYID = 7
1,517,984 UART: [ldev] FE.KEYID = 1
1,523,144 UART: [ldev] Erasing FE.KEYID = 1
1,548,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,271 UART: [ldev] --
1,587,734 UART: [fwproc] Waiting for Commands...
1,588,417 UART: [fwproc] Received command 0x46574c44
1,589,208 UART: [fwproc] Received Image of size 114084 bytes
1,636,052 UART: ROM Fatal Error: 0x000B003C
1,637,211 >>> mbox cmd response: failed
1,637,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,217 >>> mbox cmd response: failed
1,637,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,325 UART: [kat] SHA2-512-ACC
897,226 UART: [kat] ECC-384
902,705 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,656 UART: [cold-reset] ++
1,477,028 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,111 UART: [idev] Erasing UDS.KEYID = 0
1,505,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,359 UART: [idev] --
1,515,532 UART: [ldev] ++
1,515,700 UART: [ldev] CDI.KEYID = 6
1,516,063 UART: [ldev] SUBJECT.KEYID = 5
1,516,489 UART: [ldev] AUTHORITY.KEYID = 7
1,516,952 UART: [ldev] FE.KEYID = 1
1,522,232 UART: [ldev] Erasing FE.KEYID = 1
1,547,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,587 UART: [ldev] --
1,587,014 UART: [fwproc] Waiting for Commands...
1,587,717 UART: [fwproc] Received command 0x46574c44
1,588,508 UART: [fwproc] Received Image of size 114084 bytes
2,883,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,199 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,984 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,620 >>> mbox cmd response: failed
1,489,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,626 >>> mbox cmd response: failed
1,489,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,748 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,727 UART: [kat] SHA2-256
903,667 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,800 UART: [kat] HMAC-384Kdf
922,344 UART: [kat] LMS
1,170,672 UART: [kat] --
1,171,371 UART: [cold-reset] ++
1,171,745 UART: [fht] FHT @ 0x50003400
1,174,226 UART: [idev] ++
1,174,394 UART: [idev] CDI.KEYID = 6
1,174,754 UART: [idev] SUBJECT.KEYID = 7
1,175,178 UART: [idev] UDS.KEYID = 0
1,175,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,678 UART: [idev] Erasing UDS.KEYID = 0
1,199,527 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,129 UART: [ldev] ++
1,209,297 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,731 UART: [ldev] --
1,281,112 UART: [fwproc] Wait for Commands...
1,281,738 UART: [fwproc] Recv command 0x46574c44
1,282,466 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,922 UART: ROM Fatal Error: 0x000B003C
1,330,081 >>> mbox cmd response: failed
1,330,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,087 >>> mbox cmd response: failed
1,330,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,718 UART: [kat] HMAC-384Kdf
922,524 UART: [kat] LMS
1,170,852 UART: [kat] --
1,171,669 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,584 UART: [idev] ++
1,174,752 UART: [idev] CDI.KEYID = 6
1,175,112 UART: [idev] SUBJECT.KEYID = 7
1,175,536 UART: [idev] UDS.KEYID = 0
1,175,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,304 UART: [idev] Erasing UDS.KEYID = 0
1,200,787 UART: [idev] Sha1 KeyId Algorithm
1,209,217 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,980 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,253 UART: [ldev] --
1,282,574 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,008 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,900 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,122 >>> mbox cmd response: failed
1,188,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,128 >>> mbox cmd response: failed
1,188,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,135 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,836 UART: [fht] FHT @ 0x50003400
1,175,421 UART: [idev] ++
1,175,589 UART: [idev] CDI.KEYID = 6
1,175,949 UART: [idev] SUBJECT.KEYID = 7
1,176,373 UART: [idev] UDS.KEYID = 0
1,176,718 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,156 UART: [idev] --
1,211,218 UART: [ldev] ++
1,211,386 UART: [ldev] CDI.KEYID = 6
1,211,749 UART: [ldev] SUBJECT.KEYID = 5
1,212,175 UART: [ldev] AUTHORITY.KEYID = 7
1,212,638 UART: [ldev] FE.KEYID = 1
1,218,060 UART: [ldev] Erasing FE.KEYID = 1
1,244,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,615 UART: [fwproc] Wait for Commands...
1,284,319 UART: [fwproc] Recv command 0x46574c44
1,285,047 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,133 UART: ROM Fatal Error: 0x000B003C
1,333,292 >>> mbox cmd response: failed
1,333,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,298 >>> mbox cmd response: failed
1,333,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,990 UART: [kat] SHA2-256
903,930 UART: [kat] SHA2-384
906,667 UART: [kat] SHA2-512-ACC
908,568 UART: [kat] ECC-384
918,257 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,746 UART: [fht] FHT @ 0x50003400
1,175,371 UART: [idev] ++
1,175,539 UART: [idev] CDI.KEYID = 6
1,175,899 UART: [idev] SUBJECT.KEYID = 7
1,176,323 UART: [idev] UDS.KEYID = 0
1,176,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,200,904 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,318 UART: [ldev] ++
1,210,486 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,275 UART: [ldev] AUTHORITY.KEYID = 7
1,211,738 UART: [ldev] FE.KEYID = 1
1,217,074 UART: [ldev] Erasing FE.KEYID = 1
1,243,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,436 UART: [ldev] --
1,282,877 UART: [fwproc] Wait for Commands...
1,283,469 UART: [fwproc] Recv command 0x46574c44
1,284,197 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,647 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,189,353 >>> mbox cmd response: failed
1,189,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,359 >>> mbox cmd response: failed
1,189,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,352 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
920,100 UART: [kat] LMS
1,168,412 UART: [kat] --
1,169,429 UART: [cold-reset] ++
1,169,949 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,173,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,009 UART: [idev] Sha1 KeyId Algorithm
1,206,813 UART: [idev] --
1,207,972 UART: [ldev] ++
1,208,140 UART: [ldev] CDI.KEYID = 6
1,208,504 UART: [ldev] SUBJECT.KEYID = 5
1,208,931 UART: [ldev] AUTHORITY.KEYID = 7
1,209,394 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,240,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,630 UART: [ldev] --
1,280,030 UART: [fwproc] Wait for Commands...
1,280,729 UART: [fwproc] Recv command 0x46574c44
1,281,462 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,735 UART: ROM Fatal Error: 0x000B003C
1,329,894 >>> mbox cmd response: failed
1,329,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,900 >>> mbox cmd response: failed
1,329,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,347 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,766 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,956 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,877 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,504 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,415 >>> mbox cmd response: failed
1,182,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,421 >>> mbox cmd response: failed
1,182,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,848 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,050 UART: [idev] ++
1,173,218 UART: [idev] CDI.KEYID = 6
1,173,579 UART: [idev] SUBJECT.KEYID = 7
1,174,004 UART: [idev] UDS.KEYID = 0
1,174,350 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,157 UART: [ldev] ++
1,209,325 UART: [ldev] CDI.KEYID = 6
1,209,689 UART: [ldev] SUBJECT.KEYID = 5
1,210,116 UART: [ldev] AUTHORITY.KEYID = 7
1,210,579 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,413 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,094 UART: ROM Fatal Error: 0x000B003C
1,332,253 >>> mbox cmd response: failed
1,332,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,259 >>> mbox cmd response: failed
1,332,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,112 UART: [state] WD Timer not started. Device not locked for debugging
87,251 UART: [kat] SHA2-256
890,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,930 UART: [kat] ++
895,082 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
904,083 UART: [kat] SHA2-512-ACC
905,984 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,790 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,172,956 UART: [idev] ++
1,173,124 UART: [idev] CDI.KEYID = 6
1,173,485 UART: [idev] SUBJECT.KEYID = 7
1,173,910 UART: [idev] UDS.KEYID = 0
1,174,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,960 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,705 UART: [ldev] --
1,282,097 UART: [fwproc] Wait for Commands...
1,282,834 UART: [fwproc] Recv command 0x46574c44
1,283,567 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,005 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,825 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,806 >>> mbox cmd response: failed
1,183,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,812 >>> mbox cmd response: failed
1,183,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,593 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,214 UART:
192,559 UART: Running Caliptra ROM ...
193,742 UART:
193,893 UART: [state] CFI Enabled
261,272 UART: [state] LifecycleState = Manufacturing
263,237 UART: [state] DebugLocked = No
266,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,815 UART: [kat] SHA2-256
440,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,040 UART: [kat] ++
451,491 UART: [kat] sha1
461,781 UART: [kat] SHA2-256
464,480 UART: [kat] SHA2-384
470,085 UART: [kat] SHA2-512-ACC
472,464 UART: [kat] ECC-384
2,768,366 UART: [kat] HMAC-384Kdf
2,798,546 UART: [kat] LMS
3,988,843 UART: [kat] --
3,992,376 UART: [cold-reset] ++
3,994,585 UART: [fht] Storing FHT @ 0x50003400
4,005,367 UART: [idev] ++
4,005,942 UART: [idev] CDI.KEYID = 6
4,006,829 UART: [idev] SUBJECT.KEYID = 7
4,008,104 UART: [idev] UDS.KEYID = 0
4,010,812 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,108 UART: [idev] Erasing UDS.KEYID = 0
7,344,723 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,268 UART: [idev] --
7,370,108 UART: [ldev] ++
7,370,674 UART: [ldev] CDI.KEYID = 6
7,371,610 UART: [ldev] SUBJECT.KEYID = 5
7,372,883 UART: [ldev] AUTHORITY.KEYID = 7
7,374,033 UART: [ldev] FE.KEYID = 1
7,421,924 UART: [ldev] Erasing FE.KEYID = 1
10,755,732 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,275 UART: [ldev] --
13,137,060 UART: [fwproc] Waiting for Commands...
13,139,757 UART: [fwproc] Received command 0x46574c44
13,141,944 UART: [fwproc] Received Image of size 113760 bytes
17,224,108 UART: ROM Fatal Error: 0x000B002C
17,227,514 >>> mbox cmd response: failed
17,227,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,228,206 >>> mbox cmd response: failed
17,228,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,228,853 >>> mbox cmd response: failed
Initializing fuses
2,051,155 writing to cptra_bootfsm_go
2,240,424 UART:
2,240,769 UART: Running Caliptra ROM ...
2,241,809 UART:
2,241,966 UART: [state] CFI Enabled
2,301,944 UART: [state] LifecycleState = Manufacturing
2,303,903 UART: [state] DebugLocked = No
2,306,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,407 UART: [kat] SHA2-256
2,481,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,631 UART: [kat] ++
2,492,176 UART: [kat] sha1
2,503,021 UART: [kat] SHA2-256
2,505,668 UART: [kat] SHA2-384
2,510,846 UART: [kat] SHA2-512-ACC
2,513,198 UART: [kat] ECC-384
4,804,886 UART: [kat] HMAC-384Kdf
4,835,919 UART: [kat] LMS
6,026,216 UART: [kat] --
6,030,073 UART: [cold-reset] ++
6,031,637 UART: [fht] Storing FHT @ 0x50003400
6,043,725 UART: [idev] ++
6,044,359 UART: [idev] CDI.KEYID = 6
6,045,251 UART: [idev] SUBJECT.KEYID = 7
6,046,525 UART: [idev] UDS.KEYID = 0
6,049,000 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,192,073 UART: [idev] Erasing UDS.KEYID = 0
9,380,659 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,214 UART: [idev] --
9,407,046 UART: [ldev] ++
9,407,628 UART: [ldev] CDI.KEYID = 6
9,408,568 UART: [ldev] SUBJECT.KEYID = 5
9,409,830 UART: [ldev] AUTHORITY.KEYID = 7
9,410,986 UART: [ldev] FE.KEYID = 1
9,458,760 UART: [ldev] Erasing FE.KEYID = 1
12,790,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,362 UART: [ldev] --
15,151,445 UART: [fwproc] Waiting for Commands...
15,153,759 UART: [fwproc] Received command 0x46574c44
15,155,945 UART: [fwproc] Received Image of size 113760 bytes
19,238,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,315,569 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,384,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,701,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,807,910 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,198,436 >>> mbox cmd response: failed
17,199,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,199,631 >>> mbox cmd response: failed
17,199,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,200,187 >>> mbox cmd response: failed
Initializing fuses
2,050,002 writing to cptra_bootfsm_go
5,824,127 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,955,670 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,339 UART:
192,736 UART: Running Caliptra ROM ...
193,842 UART:
603,710 UART: [state] CFI Enabled
615,084 UART: [state] LifecycleState = Manufacturing
617,012 UART: [state] DebugLocked = No
618,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,277 UART: [kat] SHA2-256
793,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,595 UART: [kat] ++
804,041 UART: [kat] sha1
815,350 UART: [kat] SHA2-256
818,036 UART: [kat] SHA2-384
823,313 UART: [kat] SHA2-512-ACC
825,637 UART: [kat] ECC-384
3,110,280 UART: [kat] HMAC-384Kdf
3,122,343 UART: [kat] LMS
4,312,467 UART: [kat] --
4,316,155 UART: [cold-reset] ++
4,317,817 UART: [fht] Storing FHT @ 0x50003400
4,329,746 UART: [idev] ++
4,330,313 UART: [idev] CDI.KEYID = 6
4,331,250 UART: [idev] SUBJECT.KEYID = 7
4,332,516 UART: [idev] UDS.KEYID = 0
4,335,225 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,478,292 UART: [idev] Erasing UDS.KEYID = 0
7,619,511 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,577 UART: [idev] --
7,646,406 UART: [ldev] ++
7,646,981 UART: [ldev] CDI.KEYID = 6
7,647,955 UART: [ldev] SUBJECT.KEYID = 5
7,649,173 UART: [ldev] AUTHORITY.KEYID = 7
7,650,405 UART: [ldev] FE.KEYID = 1
7,661,805 UART: [ldev] Erasing FE.KEYID = 1
10,948,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,543 UART: [ldev] --
13,311,005 UART: [fwproc] Waiting for Commands...
13,313,773 UART: [fwproc] Received command 0x46574c44
13,315,963 UART: [fwproc] Received Image of size 113760 bytes
17,387,692 UART: ROM Fatal Error: 0x000B002C
17,391,094 >>> mbox cmd response: failed
17,391,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,391,763 >>> mbox cmd response: failed
17,392,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,392,455 >>> mbox cmd response: failed
Initializing fuses
2,055,291 writing to cptra_bootfsm_go
2,244,611 UART:
2,244,956 UART: Running Caliptra ROM ...
2,246,097 UART:
3,079,329 UART: [state] CFI Enabled
3,094,804 UART: [state] LifecycleState = Manufacturing
3,096,719 UART: [state] DebugLocked = No
3,098,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,102,146 UART: [kat] SHA2-256
3,271,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,282,451 UART: [kat] ++
3,282,996 UART: [kat] sha1
3,294,596 UART: [kat] SHA2-256
3,297,286 UART: [kat] SHA2-384
3,302,891 UART: [kat] SHA2-512-ACC
3,305,270 UART: [kat] ECC-384
5,590,083 UART: [kat] HMAC-384Kdf
5,601,882 UART: [kat] LMS
6,791,962 UART: [kat] --
6,798,015 UART: [cold-reset] ++
6,799,842 UART: [fht] Storing FHT @ 0x50003400
6,812,240 UART: [idev] ++
6,812,813 UART: [idev] CDI.KEYID = 6
6,813,778 UART: [idev] SUBJECT.KEYID = 7
6,815,001 UART: [idev] UDS.KEYID = 0
6,817,731 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,960,758 UART: [idev] Erasing UDS.KEYID = 0
10,102,945 UART: [idev] Using Sha1 for KeyId Algorithm
10,123,645 UART: [idev] --
10,127,423 UART: [ldev] ++
10,127,997 UART: [ldev] CDI.KEYID = 6
10,128,982 UART: [ldev] SUBJECT.KEYID = 5
10,130,196 UART: [ldev] AUTHORITY.KEYID = 7
10,131,436 UART: [ldev] FE.KEYID = 1
10,142,679 UART: [ldev] Erasing FE.KEYID = 1
13,432,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,726,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,741,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,756,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,770,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,790,583 UART: [ldev] --
15,794,822 UART: [fwproc] Waiting for Commands...
15,796,863 UART: [fwproc] Received command 0x46574c44
15,799,049 UART: [fwproc] Received Image of size 113760 bytes
19,874,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,950,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,019,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,335,718 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,127,753 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,366,940 >>> mbox cmd response: failed
17,367,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,885 >>> mbox cmd response: failed
17,368,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,451 >>> mbox cmd response: failed
Initializing fuses
2,051,503 writing to cptra_bootfsm_go
6,632,451 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,599,951 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,492 UART:
192,844 UART: Running Caliptra ROM ...
194,027 UART:
194,183 UART: [state] CFI Enabled
261,568 UART: [state] LifecycleState = Manufacturing
263,497 UART: [state] DebugLocked = No
266,365 UART: [state] WD Timer not started. Device not locked for debugging
270,739 UART: [kat] SHA2-256
449,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,437 UART: [kat] ++
461,982 UART: [kat] sha1
473,465 UART: [kat] SHA2-256
476,531 UART: [kat] SHA2-384
482,666 UART: [kat] SHA2-512-ACC
485,653 UART: [kat] ECC-384
2,949,198 UART: [kat] HMAC-384Kdf
2,971,048 UART: [kat] LMS
3,500,481 UART: [kat] --
3,503,449 UART: [cold-reset] ++
3,505,106 UART: [fht] FHT @ 0x50003400
3,515,407 UART: [idev] ++
3,515,982 UART: [idev] CDI.KEYID = 6
3,517,081 UART: [idev] SUBJECT.KEYID = 7
3,518,125 UART: [idev] UDS.KEYID = 0
3,521,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,803 UART: [idev] Erasing UDS.KEYID = 0
6,030,260 UART: [idev] Sha1 KeyId Algorithm
6,052,629 UART: [idev] --
6,057,114 UART: [ldev] ++
6,057,726 UART: [ldev] CDI.KEYID = 6
6,058,623 UART: [ldev] SUBJECT.KEYID = 5
6,059,793 UART: [ldev] AUTHORITY.KEYID = 7
6,061,026 UART: [ldev] FE.KEYID = 1
6,100,583 UART: [ldev] Erasing FE.KEYID = 1
8,604,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,385 UART: [ldev] --
10,414,683 UART: [fwproc] Wait for Commands...
10,417,589 UART: [fwproc] Recv command 0x46574c44
10,419,683 UART: [fwproc] Recv'd Img size: 114084 bytes
13,843,384 UART: ROM Fatal Error: 0x000B002C
13,846,514 >>> mbox cmd response: failed
13,846,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,847,288 >>> mbox cmd response: failed
13,847,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,847,891 >>> mbox cmd response: failed
Initializing fuses
2,049,096 writing to cptra_bootfsm_go
2,238,434 UART:
2,238,790 UART: Running Caliptra ROM ...
2,239,922 UART:
2,240,087 UART: [state] CFI Enabled
2,310,111 UART: [state] LifecycleState = Manufacturing
2,311,992 UART: [state] DebugLocked = No
2,313,278 UART: [state] WD Timer not started. Device not locked for debugging
2,316,268 UART: [kat] SHA2-256
2,495,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,944 UART: [kat] ++
2,507,483 UART: [kat] sha1
2,518,217 UART: [kat] SHA2-256
2,521,288 UART: [kat] SHA2-384
2,527,759 UART: [kat] SHA2-512-ACC
2,530,714 UART: [kat] ECC-384
4,994,587 UART: [kat] HMAC-384Kdf
5,017,377 UART: [kat] LMS
5,546,849 UART: [kat] --
5,551,185 UART: [cold-reset] ++
5,553,339 UART: [fht] FHT @ 0x50003400
5,565,832 UART: [idev] ++
5,566,407 UART: [idev] CDI.KEYID = 6
5,567,484 UART: [idev] SUBJECT.KEYID = 7
5,568,600 UART: [idev] UDS.KEYID = 0
5,571,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,714,864 UART: [idev] Erasing UDS.KEYID = 0
8,068,840 UART: [idev] Sha1 KeyId Algorithm
8,092,884 UART: [idev] --
8,098,123 UART: [ldev] ++
8,098,695 UART: [ldev] CDI.KEYID = 6
8,099,604 UART: [ldev] SUBJECT.KEYID = 5
8,100,769 UART: [ldev] AUTHORITY.KEYID = 7
8,101,998 UART: [ldev] FE.KEYID = 1
8,145,084 UART: [ldev] Erasing FE.KEYID = 1
10,648,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,157 UART: [ldev] --
12,459,652 UART: [fwproc] Wait for Commands...
12,461,864 UART: [fwproc] Recv command 0x46574c44
12,463,964 UART: [fwproc] Recv'd Img size: 114084 bytes
15,896,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,969,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,037,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,355,436 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,383,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,631,969 >>> mbox cmd response: failed
13,632,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,632,894 >>> mbox cmd response: failed
13,633,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,633,450 >>> mbox cmd response: failed
Initializing fuses
2,055,490 writing to cptra_bootfsm_go
5,430,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,137,811 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,320 UART:
192,699 UART: Running Caliptra ROM ...
193,831 UART:
603,485 UART: [state] CFI Enabled
616,909 UART: [state] LifecycleState = Manufacturing
618,733 UART: [state] DebugLocked = No
621,572 UART: [state] WD Timer not started. Device not locked for debugging
625,365 UART: [kat] SHA2-256
804,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,104 UART: [kat] ++
816,549 UART: [kat] sha1
828,285 UART: [kat] SHA2-256
831,341 UART: [kat] SHA2-384
837,960 UART: [kat] SHA2-512-ACC
840,891 UART: [kat] ECC-384
3,283,489 UART: [kat] HMAC-384Kdf
3,297,219 UART: [kat] LMS
3,826,719 UART: [kat] --
3,831,055 UART: [cold-reset] ++
3,832,948 UART: [fht] FHT @ 0x50003400
3,845,423 UART: [idev] ++
3,845,997 UART: [idev] CDI.KEYID = 6
3,846,963 UART: [idev] SUBJECT.KEYID = 7
3,848,066 UART: [idev] UDS.KEYID = 0
3,850,939 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,994,406 UART: [idev] Erasing UDS.KEYID = 0
6,319,363 UART: [idev] Sha1 KeyId Algorithm
6,341,780 UART: [idev] --
6,346,212 UART: [ldev] ++
6,346,779 UART: [ldev] CDI.KEYID = 6
6,347,665 UART: [ldev] SUBJECT.KEYID = 5
6,348,878 UART: [ldev] AUTHORITY.KEYID = 7
6,350,108 UART: [ldev] FE.KEYID = 1
6,361,859 UART: [ldev] Erasing FE.KEYID = 1
8,834,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,246 UART: [ldev] --
10,624,454 UART: [fwproc] Wait for Commands...
10,626,387 UART: [fwproc] Recv command 0x46574c44
10,628,428 UART: [fwproc] Recv'd Img size: 114084 bytes
14,057,295 UART: ROM Fatal Error: 0x000B002C
14,060,391 >>> mbox cmd response: failed
14,060,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,061,134 >>> mbox cmd response: failed
14,061,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,061,697 >>> mbox cmd response: failed
Initializing fuses
2,049,479 writing to cptra_bootfsm_go
2,238,771 UART:
2,239,114 UART: Running Caliptra ROM ...
2,240,253 UART:
6,393,057 UART: [state] CFI Enabled
6,403,530 UART: [state] LifecycleState = Manufacturing
6,405,390 UART: [state] DebugLocked = No
6,408,097 UART: [state] WD Timer not started. Device not locked for debugging
6,412,589 UART: [kat] SHA2-256
6,591,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,603,266 UART: [kat] ++
6,603,721 UART: [kat] sha1
6,614,354 UART: [kat] SHA2-256
6,617,375 UART: [kat] SHA2-384
6,622,604 UART: [kat] SHA2-512-ACC
6,625,545 UART: [kat] ECC-384
9,064,384 UART: [kat] HMAC-384Kdf
9,076,289 UART: [kat] LMS
9,605,783 UART: [kat] --
9,610,093 UART: [cold-reset] ++
9,611,072 UART: [fht] FHT @ 0x50003400
9,622,759 UART: [idev] ++
9,623,325 UART: [idev] CDI.KEYID = 6
9,624,238 UART: [idev] SUBJECT.KEYID = 7
9,625,453 UART: [idev] UDS.KEYID = 0
9,628,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,771,547 UART: [idev] Erasing UDS.KEYID = 0
12,099,499 UART: [idev] Sha1 KeyId Algorithm
12,120,704 UART: [idev] --
12,124,706 UART: [ldev] ++
12,125,282 UART: [ldev] CDI.KEYID = 6
12,126,190 UART: [ldev] SUBJECT.KEYID = 5
12,127,407 UART: [ldev] AUTHORITY.KEYID = 7
12,128,636 UART: [ldev] FE.KEYID = 1
12,140,089 UART: [ldev] Erasing FE.KEYID = 1
14,616,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,335,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,351,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,367,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,382,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,404,184 UART: [ldev] --
16,409,076 UART: [fwproc] Wait for Commands...
16,410,815 UART: [fwproc] Recv command 0x46574c44
16,412,953 UART: [fwproc] Recv'd Img size: 114084 bytes
19,848,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,922,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,990,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,307,272 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,693,715 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,827,185 >>> mbox cmd response: failed
13,827,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,828,070 >>> mbox cmd response: failed
13,828,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,828,636 >>> mbox cmd response: failed
Initializing fuses
2,044,497 writing to cptra_bootfsm_go
9,737,069 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,351,256 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,136 UART:
192,625 UART: Running Caliptra ROM ...
193,761 UART:
193,903 UART: [state] CFI Enabled
262,189 UART: [state] LifecycleState = Manufacturing
264,625 UART: [state] DebugLocked = No
265,852 UART: [state] WD Timer not started. Device not locked for debugging
270,136 UART: [kat] SHA2-256
460,037 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,823 UART: [kat] ++
471,317 UART: [kat] sha1
483,546 UART: [kat] SHA2-256
486,559 UART: [kat] SHA2-384
492,020 UART: [kat] SHA2-512-ACC
494,569 UART: [kat] ECC-384
2,948,020 UART: [kat] HMAC-384Kdf
2,973,469 UART: [kat] LMS
3,505,206 UART: [kat] --
3,508,548 UART: [cold-reset] ++
3,510,754 UART: [fht] FHT @ 0x50003400
3,522,870 UART: [idev] ++
3,523,553 UART: [idev] CDI.KEYID = 6
3,524,523 UART: [idev] SUBJECT.KEYID = 7
3,525,683 UART: [idev] UDS.KEYID = 0
3,528,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,354 UART: [idev] Erasing UDS.KEYID = 0
6,032,094 UART: [idev] Sha1 KeyId Algorithm
6,054,101 UART: [idev] --
6,057,676 UART: [ldev] ++
6,058,359 UART: [ldev] CDI.KEYID = 6
6,059,247 UART: [ldev] SUBJECT.KEYID = 5
6,060,327 UART: [ldev] AUTHORITY.KEYID = 7
6,061,684 UART: [ldev] FE.KEYID = 1
6,101,652 UART: [ldev] Erasing FE.KEYID = 1
8,606,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,235 UART: [ldev] --
10,415,889 UART: [fwproc] Wait for Commands...
10,418,381 UART: [fwproc] Recv command 0x46574c44
10,420,701 UART: [fwproc] Recv'd Img size: 114084 bytes
13,899,102 UART: ROM Fatal Error: 0x000B002C
13,902,773 >>> mbox cmd response: failed
13,903,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,903,524 >>> mbox cmd response: failed
13,903,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,904,107 >>> mbox cmd response: failed
Initializing fuses
2,055,074 writing to cptra_bootfsm_go
2,244,379 UART:
2,244,721 UART: Running Caliptra ROM ...
2,245,765 UART:
2,245,914 UART: [state] CFI Enabled
2,317,620 UART: [state] LifecycleState = Manufacturing
2,319,999 UART: [state] DebugLocked = No
2,322,765 UART: [state] WD Timer not started. Device not locked for debugging
2,327,224 UART: [kat] SHA2-256
2,517,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,881 UART: [kat] ++
2,528,360 UART: [kat] sha1
2,539,632 UART: [kat] SHA2-256
2,542,650 UART: [kat] SHA2-384
2,548,537 UART: [kat] SHA2-512-ACC
2,551,107 UART: [kat] ECC-384
5,003,198 UART: [kat] HMAC-384Kdf
5,027,583 UART: [kat] LMS
5,559,344 UART: [kat] --
5,561,883 UART: [cold-reset] ++
5,562,950 UART: [fht] FHT @ 0x50003400
5,574,993 UART: [idev] ++
5,575,727 UART: [idev] CDI.KEYID = 6
5,576,646 UART: [idev] SUBJECT.KEYID = 7
5,577,863 UART: [idev] UDS.KEYID = 0
5,580,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,034 UART: [idev] Erasing UDS.KEYID = 0
8,083,241 UART: [idev] Sha1 KeyId Algorithm
8,106,796 UART: [idev] --
8,110,549 UART: [ldev] ++
8,111,291 UART: [ldev] CDI.KEYID = 6
8,112,182 UART: [ldev] SUBJECT.KEYID = 5
8,113,296 UART: [ldev] AUTHORITY.KEYID = 7
8,114,590 UART: [ldev] FE.KEYID = 1
8,156,649 UART: [ldev] Erasing FE.KEYID = 1
10,664,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,839 UART: [ldev] --
12,470,892 UART: [fwproc] Wait for Commands...
12,473,700 UART: [fwproc] Recv command 0x46574c44
12,475,986 UART: [fwproc] Recv'd Img size: 114084 bytes
15,958,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,035,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,151,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,692,926 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,440,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,310,649 >>> mbox cmd response: failed
14,311,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,311,663 >>> mbox cmd response: failed
14,311,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,312,228 >>> mbox cmd response: failed
Initializing fuses
2,051,934 writing to cptra_bootfsm_go
5,486,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,819,343 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,537 UART:
192,916 UART: Running Caliptra ROM ...
194,059 UART:
603,902 UART: [state] CFI Enabled
617,222 UART: [state] LifecycleState = Manufacturing
619,611 UART: [state] DebugLocked = No
622,453 UART: [state] WD Timer not started. Device not locked for debugging
627,428 UART: [kat] SHA2-256
817,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,084 UART: [kat] ++
828,679 UART: [kat] sha1
840,321 UART: [kat] SHA2-256
843,338 UART: [kat] SHA2-384
849,315 UART: [kat] SHA2-512-ACC
851,922 UART: [kat] ECC-384
3,292,851 UART: [kat] HMAC-384Kdf
3,306,395 UART: [kat] LMS
3,838,201 UART: [kat] --
3,842,614 UART: [cold-reset] ++
3,843,906 UART: [fht] FHT @ 0x50003400
3,856,782 UART: [idev] ++
3,857,486 UART: [idev] CDI.KEYID = 6
3,858,506 UART: [idev] SUBJECT.KEYID = 7
3,859,824 UART: [idev] UDS.KEYID = 0
3,862,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,134 UART: [idev] Erasing UDS.KEYID = 0
6,338,230 UART: [idev] Sha1 KeyId Algorithm
6,360,839 UART: [idev] --
6,365,267 UART: [ldev] ++
6,365,948 UART: [ldev] CDI.KEYID = 6
6,366,891 UART: [ldev] SUBJECT.KEYID = 5
6,368,049 UART: [ldev] AUTHORITY.KEYID = 7
6,369,292 UART: [ldev] FE.KEYID = 1
6,380,080 UART: [ldev] Erasing FE.KEYID = 1
8,860,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,331 UART: [ldev] --
10,652,621 UART: [fwproc] Wait for Commands...
10,654,555 UART: [fwproc] Recv command 0x46574c44
10,656,807 UART: [fwproc] Recv'd Img size: 114084 bytes
14,129,780 UART: ROM Fatal Error: 0x000B002C
14,133,463 >>> mbox cmd response: failed
14,133,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,134,060 >>> mbox cmd response: failed
14,134,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,134,619 >>> mbox cmd response: failed
Initializing fuses
2,054,883 writing to cptra_bootfsm_go
2,244,185 UART:
2,244,524 UART: Running Caliptra ROM ...
2,245,571 UART:
6,322,955 UART: [state] CFI Enabled
6,335,942 UART: [state] LifecycleState = Manufacturing
6,338,292 UART: [state] DebugLocked = No
6,340,193 UART: [state] WD Timer not started. Device not locked for debugging
6,344,099 UART: [kat] SHA2-256
6,533,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,544,746 UART: [kat] ++
6,545,352 UART: [kat] sha1
6,557,541 UART: [kat] SHA2-256
6,560,568 UART: [kat] SHA2-384
6,566,563 UART: [kat] SHA2-512-ACC
6,569,133 UART: [kat] ECC-384
9,010,698 UART: [kat] HMAC-384Kdf
9,023,472 UART: [kat] LMS
9,555,256 UART: [kat] --
9,559,472 UART: [cold-reset] ++
9,561,191 UART: [fht] FHT @ 0x50003400
9,571,798 UART: [idev] ++
9,572,515 UART: [idev] CDI.KEYID = 6
9,573,435 UART: [idev] SUBJECT.KEYID = 7
9,574,654 UART: [idev] UDS.KEYID = 0
9,577,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,720,804 UART: [idev] Erasing UDS.KEYID = 0
12,053,002 UART: [idev] Sha1 KeyId Algorithm
12,074,348 UART: [idev] --
12,078,505 UART: [ldev] ++
12,079,190 UART: [ldev] CDI.KEYID = 6
12,080,271 UART: [ldev] SUBJECT.KEYID = 5
12,081,396 UART: [ldev] AUTHORITY.KEYID = 7
12,082,574 UART: [ldev] FE.KEYID = 1
12,092,792 UART: [ldev] Erasing FE.KEYID = 1
14,565,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,287,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,303,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,318,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,333,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,353,952 UART: [ldev] --
16,359,220 UART: [fwproc] Wait for Commands...
16,361,211 UART: [fwproc] Recv command 0x46574c44
16,363,470 UART: [fwproc] Recv'd Img size: 114084 bytes
19,843,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,026 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,039,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,580,135 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,755,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,544,396 >>> mbox cmd response: failed
14,544,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,545,293 >>> mbox cmd response: failed
14,545,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,545,862 >>> mbox cmd response: failed
Initializing fuses
2,049,439 writing to cptra_bootfsm_go
9,077,704 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,320,186 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Manufacturing
85,437 UART: [state] DebugLocked = No
85,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,627 UART: [kat] SHA2-256
881,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,673 UART: [kat] ++
885,825 UART: [kat] sha1
890,153 UART: [kat] SHA2-256
892,091 UART: [kat] SHA2-384
894,696 UART: [kat] SHA2-512-ACC
896,597 UART: [kat] ECC-384
902,098 UART: [kat] HMAC-384Kdf
906,648 UART: [kat] LMS
1,474,844 UART: [kat] --
1,475,343 UART: [cold-reset] ++
1,475,781 UART: [fht] Storing FHT @ 0x50003400
1,478,408 UART: [idev] ++
1,478,576 UART: [idev] CDI.KEYID = 6
1,478,936 UART: [idev] SUBJECT.KEYID = 7
1,479,360 UART: [idev] UDS.KEYID = 0
1,479,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,354 UART: [idev] Erasing UDS.KEYID = 0
1,504,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,840 UART: [idev] --
1,513,777 UART: [ldev] ++
1,513,945 UART: [ldev] CDI.KEYID = 6
1,514,308 UART: [ldev] SUBJECT.KEYID = 5
1,514,734 UART: [ldev] AUTHORITY.KEYID = 7
1,515,197 UART: [ldev] FE.KEYID = 1
1,520,319 UART: [ldev] Erasing FE.KEYID = 1
1,545,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,446 UART: [ldev] --
1,584,715 UART: [fwproc] Waiting for Commands...
1,585,516 UART: [fwproc] Received command 0x46574c44
1,586,307 UART: [fwproc] Received Image of size 114084 bytes
2,905,965 UART: ROM Fatal Error: 0x000B002C
2,907,124 >>> mbox cmd response: failed
2,907,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,907,130 >>> mbox cmd response: failed
2,907,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,907,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,940 UART: [kat] SHA2-512-ACC
896,841 UART: [kat] ECC-384
902,374 UART: [kat] HMAC-384Kdf
906,866 UART: [kat] LMS
1,475,062 UART: [kat] --
1,476,131 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
1,480,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,222 UART: [idev] Erasing UDS.KEYID = 0
1,505,112 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,443 UART: [ldev] ++
1,514,611 UART: [ldev] CDI.KEYID = 6
1,514,974 UART: [ldev] SUBJECT.KEYID = 5
1,515,400 UART: [ldev] AUTHORITY.KEYID = 7
1,515,863 UART: [ldev] FE.KEYID = 1
1,520,863 UART: [ldev] Erasing FE.KEYID = 1
1,546,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,314 UART: [fwproc] Received command 0x46574c44
1,587,105 UART: [fwproc] Received Image of size 114084 bytes
2,881,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,977 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,760,933 >>> mbox cmd response: failed
2,760,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,939 >>> mbox cmd response: failed
2,760,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,983 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Manufacturing
86,150 UART: [state] DebugLocked = No
86,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,317 UART: [kat] HMAC-384Kdf
908,055 UART: [kat] LMS
1,476,251 UART: [kat] --
1,477,002 UART: [cold-reset] ++
1,477,466 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,505,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,501 UART: [idev] --
1,515,534 UART: [ldev] ++
1,515,702 UART: [ldev] CDI.KEYID = 6
1,516,065 UART: [ldev] SUBJECT.KEYID = 5
1,516,491 UART: [ldev] AUTHORITY.KEYID = 7
1,516,954 UART: [ldev] FE.KEYID = 1
1,522,076 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,217 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,189 UART: [fwproc] Received command 0x46574c44
1,587,980 UART: [fwproc] Received Image of size 114084 bytes
2,906,780 UART: ROM Fatal Error: 0x000B002C
2,907,939 >>> mbox cmd response: failed
2,907,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,907,945 >>> mbox cmd response: failed
2,907,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,907,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,789 UART: [kat] SHA2-512-ACC
897,690 UART: [kat] ECC-384
903,437 UART: [kat] HMAC-384Kdf
908,015 UART: [kat] LMS
1,476,211 UART: [kat] --
1,476,920 UART: [cold-reset] ++
1,477,370 UART: [fht] Storing FHT @ 0x50003400
1,480,143 UART: [idev] ++
1,480,311 UART: [idev] CDI.KEYID = 6
1,480,671 UART: [idev] SUBJECT.KEYID = 7
1,481,095 UART: [idev] UDS.KEYID = 0
1,481,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,505,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,306 UART: [ldev] ++
1,515,474 UART: [ldev] CDI.KEYID = 6
1,515,837 UART: [ldev] SUBJECT.KEYID = 5
1,516,263 UART: [ldev] AUTHORITY.KEYID = 7
1,516,726 UART: [ldev] FE.KEYID = 1
1,521,916 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,151 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,331 UART: [fwproc] Received command 0x46574c44
1,588,122 UART: [fwproc] Received Image of size 114084 bytes
2,881,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,329 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,194 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,760,414 >>> mbox cmd response: failed
2,760,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,420 >>> mbox cmd response: failed
2,760,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,870 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Manufacturing
85,915 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
923,006 UART: [kat] LMS
1,171,334 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,503 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,349 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,879 UART: [ldev] ++
1,211,047 UART: [ldev] CDI.KEYID = 6
1,211,410 UART: [ldev] SUBJECT.KEYID = 5
1,211,836 UART: [ldev] AUTHORITY.KEYID = 7
1,212,299 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,244,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,127 UART: [ldev] --
1,283,604 UART: [fwproc] Wait for Commands...
1,284,268 UART: [fwproc] Recv command 0x46574c44
1,284,996 UART: [fwproc] Recv'd Img size: 114084 bytes
2,604,966 UART: ROM Fatal Error: 0x000B002C
2,606,125 >>> mbox cmd response: failed
2,606,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,131 >>> mbox cmd response: failed
2,606,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,175,306 UART: [idev] ++
1,175,474 UART: [idev] CDI.KEYID = 6
1,175,834 UART: [idev] SUBJECT.KEYID = 7
1,176,258 UART: [idev] UDS.KEYID = 0
1,176,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,568 UART: [idev] Erasing UDS.KEYID = 0
1,201,303 UART: [idev] Sha1 KeyId Algorithm
1,209,693 UART: [idev] --
1,210,745 UART: [ldev] ++
1,210,913 UART: [ldev] CDI.KEYID = 6
1,211,276 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,985 UART: [ldev] --
1,283,422 UART: [fwproc] Wait for Commands...
1,284,182 UART: [fwproc] Recv command 0x46574c44
1,284,910 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,832 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,779 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,458,496 >>> mbox cmd response: failed
2,458,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,502 >>> mbox cmd response: failed
2,458,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,723 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,933 UART: [state] LifecycleState = Manufacturing
85,588 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,461 UART: [kat] SHA2-256
893,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,236 UART: [kat] ++
897,388 UART: [kat] sha1
901,572 UART: [kat] SHA2-256
903,512 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
918,207 UART: [kat] HMAC-384Kdf
922,695 UART: [kat] LMS
1,171,023 UART: [kat] --
1,171,940 UART: [cold-reset] ++
1,172,312 UART: [fht] FHT @ 0x50003400
1,174,983 UART: [idev] ++
1,175,151 UART: [idev] CDI.KEYID = 6
1,175,511 UART: [idev] SUBJECT.KEYID = 7
1,175,935 UART: [idev] UDS.KEYID = 0
1,176,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,877 UART: [idev] Erasing UDS.KEYID = 0
1,201,518 UART: [idev] Sha1 KeyId Algorithm
1,210,004 UART: [idev] --
1,211,254 UART: [ldev] ++
1,211,422 UART: [ldev] CDI.KEYID = 6
1,211,785 UART: [ldev] SUBJECT.KEYID = 5
1,212,211 UART: [ldev] AUTHORITY.KEYID = 7
1,212,674 UART: [ldev] FE.KEYID = 1
1,217,808 UART: [ldev] Erasing FE.KEYID = 1
1,244,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,514 UART: [ldev] --
1,283,961 UART: [fwproc] Wait for Commands...
1,284,779 UART: [fwproc] Recv command 0x46574c44
1,285,507 UART: [fwproc] Recv'd Img size: 114084 bytes
2,605,513 UART: ROM Fatal Error: 0x000B002C
2,606,672 >>> mbox cmd response: failed
2,606,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,678 >>> mbox cmd response: failed
2,606,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
893,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,832 UART: [kat] ++
897,984 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,281 UART: [idev] ++
1,175,449 UART: [idev] CDI.KEYID = 6
1,175,809 UART: [idev] SUBJECT.KEYID = 7
1,176,233 UART: [idev] UDS.KEYID = 0
1,176,578 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,620 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,212 UART: [ldev] ++
1,211,380 UART: [ldev] CDI.KEYID = 6
1,211,743 UART: [ldev] SUBJECT.KEYID = 5
1,212,169 UART: [ldev] AUTHORITY.KEYID = 7
1,212,632 UART: [ldev] FE.KEYID = 1
1,217,770 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,154 UART: [ldev] --
1,283,417 UART: [fwproc] Wait for Commands...
1,284,057 UART: [fwproc] Recv command 0x46574c44
1,284,785 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,597 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,302 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,458,501 >>> mbox cmd response: failed
2,458,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,507 >>> mbox cmd response: failed
2,458,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Manufacturing
86,083 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,565 UART: [idev] ++
1,173,733 UART: [idev] CDI.KEYID = 6
1,174,094 UART: [idev] SUBJECT.KEYID = 7
1,174,519 UART: [idev] UDS.KEYID = 0
1,174,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,441 UART: [idev] Sha1 KeyId Algorithm
1,208,387 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,242,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,122 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,047 UART: [fwproc] Recv command 0x46574c44
1,282,780 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,597 UART: ROM Fatal Error: 0x000B002C
2,602,756 >>> mbox cmd response: failed
2,602,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,602,762 >>> mbox cmd response: failed
2,602,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,602,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,174,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,447 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,214,976 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,674 UART: [ldev] --
1,281,000 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,332 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,454,885 >>> mbox cmd response: failed
2,454,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,454,891 >>> mbox cmd response: failed
2,454,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,454,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,892 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,402 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Manufacturing
86,156 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,375 UART: [kat] LMS
1,168,687 UART: [kat] --
1,169,388 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,636 UART: [idev] ++
1,172,804 UART: [idev] CDI.KEYID = 6
1,173,165 UART: [idev] SUBJECT.KEYID = 7
1,173,590 UART: [idev] UDS.KEYID = 0
1,173,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,384 UART: [idev] Erasing UDS.KEYID = 0
1,197,884 UART: [idev] Sha1 KeyId Algorithm
1,206,866 UART: [idev] --
1,207,885 UART: [ldev] ++
1,208,053 UART: [ldev] CDI.KEYID = 6
1,208,417 UART: [ldev] SUBJECT.KEYID = 5
1,208,844 UART: [ldev] AUTHORITY.KEYID = 7
1,209,307 UART: [ldev] FE.KEYID = 1
1,214,511 UART: [ldev] Erasing FE.KEYID = 1
1,240,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,671 UART: [ldev] --
1,280,025 UART: [fwproc] Wait for Commands...
1,280,742 UART: [fwproc] Recv command 0x46574c44
1,281,475 UART: [fwproc] Recv'd Img size: 114084 bytes
2,600,788 UART: ROM Fatal Error: 0x000B002C
2,601,947 >>> mbox cmd response: failed
2,601,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,601,953 >>> mbox cmd response: failed
2,601,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,601,959 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,957 UART: [kat] HMAC-384Kdf
921,525 UART: [kat] LMS
1,169,837 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,174,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,548 UART: [idev] Sha1 KeyId Algorithm
1,209,384 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,377 UART: [ldev] --
1,282,737 UART: [fwproc] Wait for Commands...
1,283,388 UART: [fwproc] Recv command 0x46574c44
1,284,121 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,063 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,453,836 >>> mbox cmd response: failed
2,453,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,453,842 >>> mbox cmd response: failed
2,453,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,453,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,563 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,141 UART:
192,500 UART: Running Caliptra ROM ...
193,685 UART:
193,856 UART: [state] CFI Enabled
262,658 UART: [state] LifecycleState = Manufacturing
264,607 UART: [state] DebugLocked = No
266,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,015 UART: [kat] SHA2-256
440,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,206 UART: [kat] ++
451,679 UART: [kat] sha1
462,283 UART: [kat] SHA2-256
464,964 UART: [kat] SHA2-384
471,100 UART: [kat] SHA2-512-ACC
473,476 UART: [kat] ECC-384
2,767,673 UART: [kat] HMAC-384Kdf
2,798,752 UART: [kat] LMS
3,989,086 UART: [kat] --
3,994,869 UART: [cold-reset] ++
3,996,904 UART: [fht] Storing FHT @ 0x50003400
4,008,992 UART: [idev] ++
4,009,561 UART: [idev] CDI.KEYID = 6
4,010,447 UART: [idev] SUBJECT.KEYID = 7
4,011,717 UART: [idev] UDS.KEYID = 0
4,014,356 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,629 UART: [idev] Erasing UDS.KEYID = 0
7,345,374 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,454 UART: [idev] --
7,370,379 UART: [ldev] ++
7,370,955 UART: [ldev] CDI.KEYID = 6
7,371,894 UART: [ldev] SUBJECT.KEYID = 5
7,373,115 UART: [ldev] AUTHORITY.KEYID = 7
7,374,405 UART: [ldev] FE.KEYID = 1
7,421,750 UART: [ldev] Erasing FE.KEYID = 1
10,757,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,447 UART: [ldev] --
13,133,374 UART: [fwproc] Waiting for Commands...
13,135,691 UART: [fwproc] Received command 0x46574c44
13,137,879 UART: [fwproc] Received Image of size 113760 bytes
17,215,399 UART: ROM Fatal Error: 0x000B002E
17,218,862 >>> mbox cmd response: failed
17,219,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,219,642 >>> mbox cmd response: failed
17,219,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,220,201 >>> mbox cmd response: failed
Initializing fuses
2,053,331 writing to cptra_bootfsm_go
2,242,645 UART:
2,242,997 UART: Running Caliptra ROM ...
2,244,136 UART:
2,244,303 UART: [state] CFI Enabled
2,302,756 UART: [state] LifecycleState = Manufacturing
2,304,744 UART: [state] DebugLocked = No
2,306,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,310,719 UART: [kat] SHA2-256
2,480,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,490,929 UART: [kat] ++
2,491,473 UART: [kat] sha1
2,501,778 UART: [kat] SHA2-256
2,504,496 UART: [kat] SHA2-384
2,509,541 UART: [kat] SHA2-512-ACC
2,511,950 UART: [kat] ECC-384
4,810,573 UART: [kat] HMAC-384Kdf
4,841,709 UART: [kat] LMS
6,032,006 UART: [kat] --
6,035,583 UART: [cold-reset] ++
6,036,872 UART: [fht] Storing FHT @ 0x50003400
6,047,818 UART: [idev] ++
6,048,450 UART: [idev] CDI.KEYID = 6
6,049,366 UART: [idev] SUBJECT.KEYID = 7
6,050,584 UART: [idev] UDS.KEYID = 0
6,053,605 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,196,675 UART: [idev] Erasing UDS.KEYID = 0
9,388,908 UART: [idev] Using Sha1 for KeyId Algorithm
9,411,548 UART: [idev] --
9,415,674 UART: [ldev] ++
9,416,277 UART: [ldev] CDI.KEYID = 6
9,417,217 UART: [ldev] SUBJECT.KEYID = 5
9,418,482 UART: [ldev] AUTHORITY.KEYID = 7
9,419,584 UART: [ldev] FE.KEYID = 1
9,462,339 UART: [ldev] Erasing FE.KEYID = 1
12,793,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,089,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,103,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,118,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,151,913 UART: [ldev] --
15,156,151 UART: [fwproc] Waiting for Commands...
15,158,519 UART: [fwproc] Received command 0x46574c44
15,160,705 UART: [fwproc] Received Image of size 113760 bytes
19,247,954 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,329,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,398,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,714,477 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,788,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,182,161 >>> mbox cmd response: failed
17,182,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,183,138 >>> mbox cmd response: failed
17,183,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,183,701 >>> mbox cmd response: failed
Initializing fuses
2,048,025 writing to cptra_bootfsm_go
5,825,905 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,899,447 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,381 UART:
192,745 UART: Running Caliptra ROM ...
194,066 UART:
603,581 UART: [state] CFI Enabled
620,012 UART: [state] LifecycleState = Manufacturing
621,938 UART: [state] DebugLocked = No
624,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,487 UART: [kat] SHA2-256
799,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,792 UART: [kat] ++
810,256 UART: [kat] sha1
822,106 UART: [kat] SHA2-256
824,789 UART: [kat] SHA2-384
831,626 UART: [kat] SHA2-512-ACC
833,986 UART: [kat] ECC-384
3,116,914 UART: [kat] HMAC-384Kdf
3,127,313 UART: [kat] LMS
4,317,434 UART: [kat] --
4,321,525 UART: [cold-reset] ++
4,322,540 UART: [fht] Storing FHT @ 0x50003400
4,334,946 UART: [idev] ++
4,335,522 UART: [idev] CDI.KEYID = 6
4,336,489 UART: [idev] SUBJECT.KEYID = 7
4,337,706 UART: [idev] UDS.KEYID = 0
4,340,643 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,805 UART: [idev] Erasing UDS.KEYID = 0
7,627,714 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,628 UART: [idev] --
7,652,458 UART: [ldev] ++
7,653,048 UART: [ldev] CDI.KEYID = 6
7,654,130 UART: [ldev] SUBJECT.KEYID = 5
7,655,239 UART: [ldev] AUTHORITY.KEYID = 7
7,656,473 UART: [ldev] FE.KEYID = 1
7,667,365 UART: [ldev] Erasing FE.KEYID = 1
10,954,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,137 UART: [ldev] --
13,311,219 UART: [fwproc] Waiting for Commands...
13,313,213 UART: [fwproc] Received command 0x46574c44
13,315,468 UART: [fwproc] Received Image of size 113760 bytes
17,396,510 UART: ROM Fatal Error: 0x000B002E
17,399,943 >>> mbox cmd response: failed
17,400,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,400,760 >>> mbox cmd response: failed
17,401,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,401,325 >>> mbox cmd response: failed
Initializing fuses
2,059,341 writing to cptra_bootfsm_go
2,248,683 UART:
2,249,027 UART: Running Caliptra ROM ...
2,250,169 UART:
3,068,740 UART: [state] CFI Enabled
3,085,931 UART: [state] LifecycleState = Manufacturing
3,087,903 UART: [state] DebugLocked = No
3,090,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,095,013 UART: [kat] SHA2-256
3,264,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,275,301 UART: [kat] ++
3,275,853 UART: [kat] sha1
3,286,698 UART: [kat] SHA2-256
3,289,395 UART: [kat] SHA2-384
3,295,915 UART: [kat] SHA2-512-ACC
3,298,271 UART: [kat] ECC-384
5,581,607 UART: [kat] HMAC-384Kdf
5,592,765 UART: [kat] LMS
6,782,876 UART: [kat] --
6,788,293 UART: [cold-reset] ++
6,790,235 UART: [fht] Storing FHT @ 0x50003400
6,801,156 UART: [idev] ++
6,801,766 UART: [idev] CDI.KEYID = 6
6,802,685 UART: [idev] SUBJECT.KEYID = 7
6,803,900 UART: [idev] UDS.KEYID = 0
6,806,614 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,949,459 UART: [idev] Erasing UDS.KEYID = 0
10,095,968 UART: [idev] Using Sha1 for KeyId Algorithm
10,118,050 UART: [idev] --
10,121,454 UART: [ldev] ++
10,122,028 UART: [ldev] CDI.KEYID = 6
10,122,972 UART: [ldev] SUBJECT.KEYID = 5
10,124,240 UART: [ldev] AUTHORITY.KEYID = 7
10,125,480 UART: [ldev] FE.KEYID = 1
10,137,614 UART: [ldev] Erasing FE.KEYID = 1
13,426,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,720,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,734,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,749,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,764,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,781,943 UART: [ldev] --
15,786,127 UART: [fwproc] Waiting for Commands...
15,788,331 UART: [fwproc] Received command 0x46574c44
15,790,515 UART: [fwproc] Received Image of size 113760 bytes
19,873,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,949,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,018,158 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,334,936 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,131,969 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,379,168 >>> mbox cmd response: failed
17,379,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,019 >>> mbox cmd response: failed
17,380,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,588 >>> mbox cmd response: failed
Initializing fuses
2,052,542 writing to cptra_bootfsm_go
6,622,289 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,598,840 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,059 UART:
192,435 UART: Running Caliptra ROM ...
193,626 UART:
193,778 UART: [state] CFI Enabled
266,557 UART: [state] LifecycleState = Manufacturing
268,427 UART: [state] DebugLocked = No
270,535 UART: [state] WD Timer not started. Device not locked for debugging
274,463 UART: [kat] SHA2-256
453,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,160 UART: [kat] ++
465,611 UART: [kat] sha1
476,214 UART: [kat] SHA2-256
479,280 UART: [kat] SHA2-384
485,632 UART: [kat] SHA2-512-ACC
488,621 UART: [kat] ECC-384
2,948,440 UART: [kat] HMAC-384Kdf
2,969,747 UART: [kat] LMS
3,499,178 UART: [kat] --
3,503,714 UART: [cold-reset] ++
3,504,564 UART: [fht] FHT @ 0x50003400
3,515,597 UART: [idev] ++
3,516,162 UART: [idev] CDI.KEYID = 6
3,517,045 UART: [idev] SUBJECT.KEYID = 7
3,518,259 UART: [idev] UDS.KEYID = 0
3,521,104 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,788 UART: [idev] Erasing UDS.KEYID = 0
6,026,649 UART: [idev] Sha1 KeyId Algorithm
6,049,391 UART: [idev] --
6,052,828 UART: [ldev] ++
6,053,414 UART: [ldev] CDI.KEYID = 6
6,054,301 UART: [ldev] SUBJECT.KEYID = 5
6,055,465 UART: [ldev] AUTHORITY.KEYID = 7
6,056,696 UART: [ldev] FE.KEYID = 1
6,099,985 UART: [ldev] Erasing FE.KEYID = 1
8,611,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,327 UART: [ldev] --
10,418,284 UART: [fwproc] Wait for Commands...
10,419,844 UART: [fwproc] Recv command 0x46574c44
10,421,941 UART: [fwproc] Recv'd Img size: 114084 bytes
13,844,856 UART: ROM Fatal Error: 0x000B002E
13,847,986 >>> mbox cmd response: failed
13,848,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,848,725 >>> mbox cmd response: failed
13,848,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,849,369 >>> mbox cmd response: failed
Initializing fuses
2,052,582 writing to cptra_bootfsm_go
2,241,961 UART:
2,242,305 UART: Running Caliptra ROM ...
2,243,466 UART:
2,243,640 UART: [state] CFI Enabled
2,303,719 UART: [state] LifecycleState = Manufacturing
2,305,588 UART: [state] DebugLocked = No
2,307,299 UART: [state] WD Timer not started. Device not locked for debugging
2,311,425 UART: [kat] SHA2-256
2,490,554 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,502,093 UART: [kat] ++
2,502,641 UART: [kat] sha1
2,513,373 UART: [kat] SHA2-256
2,516,429 UART: [kat] SHA2-384
2,523,636 UART: [kat] SHA2-512-ACC
2,526,593 UART: [kat] ECC-384
4,988,478 UART: [kat] HMAC-384Kdf
5,011,496 UART: [kat] LMS
5,540,907 UART: [kat] --
5,544,805 UART: [cold-reset] ++
5,547,119 UART: [fht] FHT @ 0x50003400
5,558,849 UART: [idev] ++
5,559,452 UART: [idev] CDI.KEYID = 6
5,560,366 UART: [idev] SUBJECT.KEYID = 7
5,561,524 UART: [idev] UDS.KEYID = 0
5,564,131 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,707,594 UART: [idev] Erasing UDS.KEYID = 0
8,067,157 UART: [idev] Sha1 KeyId Algorithm
8,090,179 UART: [idev] --
8,095,156 UART: [ldev] ++
8,095,729 UART: [ldev] CDI.KEYID = 6
8,096,618 UART: [ldev] SUBJECT.KEYID = 5
8,097,836 UART: [ldev] AUTHORITY.KEYID = 7
8,099,072 UART: [ldev] FE.KEYID = 1
8,139,515 UART: [ldev] Erasing FE.KEYID = 1
10,640,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,854 UART: [ldev] --
12,431,658 UART: [fwproc] Wait for Commands...
12,433,591 UART: [fwproc] Recv command 0x46574c44
12,435,730 UART: [fwproc] Recv'd Img size: 114084 bytes
15,871,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,009,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,327,130 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,363,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,635,558 >>> mbox cmd response: failed
13,636,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,636,604 >>> mbox cmd response: failed
13,636,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,637,173 >>> mbox cmd response: failed
Initializing fuses
2,049,788 writing to cptra_bootfsm_go
5,394,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,133,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,816 UART:
193,188 UART: Running Caliptra ROM ...
194,281 UART:
603,887 UART: [state] CFI Enabled
617,249 UART: [state] LifecycleState = Manufacturing
619,133 UART: [state] DebugLocked = No
621,071 UART: [state] WD Timer not started. Device not locked for debugging
625,661 UART: [kat] SHA2-256
804,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,390 UART: [kat] ++
816,858 UART: [kat] sha1
827,624 UART: [kat] SHA2-256
830,689 UART: [kat] SHA2-384
837,907 UART: [kat] SHA2-512-ACC
840,819 UART: [kat] ECC-384
3,282,544 UART: [kat] HMAC-384Kdf
3,294,390 UART: [kat] LMS
3,823,865 UART: [kat] --
3,827,588 UART: [cold-reset] ++
3,828,391 UART: [fht] FHT @ 0x50003400
3,839,803 UART: [idev] ++
3,840,366 UART: [idev] CDI.KEYID = 6
3,841,278 UART: [idev] SUBJECT.KEYID = 7
3,842,488 UART: [idev] UDS.KEYID = 0
3,845,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,650 UART: [idev] Erasing UDS.KEYID = 0
6,310,301 UART: [idev] Sha1 KeyId Algorithm
6,333,915 UART: [idev] --
6,337,649 UART: [ldev] ++
6,338,221 UART: [ldev] CDI.KEYID = 6
6,339,129 UART: [ldev] SUBJECT.KEYID = 5
6,340,289 UART: [ldev] AUTHORITY.KEYID = 7
6,341,522 UART: [ldev] FE.KEYID = 1
6,350,712 UART: [ldev] Erasing FE.KEYID = 1
8,821,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,795 UART: [ldev] --
10,611,745 UART: [fwproc] Wait for Commands...
10,613,414 UART: [fwproc] Recv command 0x46574c44
10,615,477 UART: [fwproc] Recv'd Img size: 114084 bytes
14,044,497 UART: ROM Fatal Error: 0x000B002E
14,047,621 >>> mbox cmd response: failed
14,048,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,048,410 >>> mbox cmd response: failed
14,048,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,048,974 >>> mbox cmd response: failed
Initializing fuses
2,058,815 writing to cptra_bootfsm_go
2,248,131 UART:
2,248,472 UART: Running Caliptra ROM ...
2,249,523 UART:
6,412,965 UART: [state] CFI Enabled
6,427,615 UART: [state] LifecycleState = Manufacturing
6,429,432 UART: [state] DebugLocked = No
6,431,572 UART: [state] WD Timer not started. Device not locked for debugging
6,434,669 UART: [kat] SHA2-256
6,613,786 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,625,329 UART: [kat] ++
6,625,869 UART: [kat] sha1
6,637,416 UART: [kat] SHA2-256
6,640,468 UART: [kat] SHA2-384
6,646,999 UART: [kat] SHA2-512-ACC
6,649,995 UART: [kat] ECC-384
9,092,858 UART: [kat] HMAC-384Kdf
9,105,687 UART: [kat] LMS
9,635,132 UART: [kat] --
9,640,693 UART: [cold-reset] ++
9,643,167 UART: [fht] FHT @ 0x50003400
9,653,841 UART: [idev] ++
9,654,405 UART: [idev] CDI.KEYID = 6
9,655,342 UART: [idev] SUBJECT.KEYID = 7
9,656,555 UART: [idev] UDS.KEYID = 0
9,659,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,803,190 UART: [idev] Erasing UDS.KEYID = 0
12,126,707 UART: [idev] Sha1 KeyId Algorithm
12,149,288 UART: [idev] --
12,152,225 UART: [ldev] ++
12,152,803 UART: [ldev] CDI.KEYID = 6
12,153,690 UART: [ldev] SUBJECT.KEYID = 5
12,154,817 UART: [ldev] AUTHORITY.KEYID = 7
12,156,146 UART: [ldev] FE.KEYID = 1
12,168,657 UART: [ldev] Erasing FE.KEYID = 1
14,643,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,360,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,376,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,392,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,408,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,429,208 UART: [ldev] --
16,433,498 UART: [fwproc] Wait for Commands...
16,435,334 UART: [fwproc] Recv command 0x46574c44
16,437,432 UART: [fwproc] Recv'd Img size: 114084 bytes
19,866,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,942,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,011,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,328,489 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
3,692,869 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,820,685 >>> mbox cmd response: failed
13,821,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,821,570 >>> mbox cmd response: failed
13,821,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,131 >>> mbox cmd response: failed
Initializing fuses
2,049,234 writing to cptra_bootfsm_go
9,734,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,335,653 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,032 UART:
192,422 UART: Running Caliptra ROM ...
194,176 UART:
194,342 UART: [state] CFI Enabled
263,768 UART: [state] LifecycleState = Manufacturing
266,137 UART: [state] DebugLocked = No
268,438 UART: [state] WD Timer not started. Device not locked for debugging
273,257 UART: [kat] SHA2-256
463,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,909 UART: [kat] ++
474,438 UART: [kat] sha1
485,214 UART: [kat] SHA2-256
488,271 UART: [kat] SHA2-384
494,249 UART: [kat] SHA2-512-ACC
496,863 UART: [kat] ECC-384
2,947,015 UART: [kat] HMAC-384Kdf
2,971,583 UART: [kat] LMS
3,503,340 UART: [kat] --
3,510,056 UART: [cold-reset] ++
3,512,159 UART: [fht] FHT @ 0x50003400
3,523,788 UART: [idev] ++
3,524,463 UART: [idev] CDI.KEYID = 6
3,525,402 UART: [idev] SUBJECT.KEYID = 7
3,526,561 UART: [idev] UDS.KEYID = 0
3,529,320 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,673,013 UART: [idev] Erasing UDS.KEYID = 0
6,027,824 UART: [idev] Sha1 KeyId Algorithm
6,050,380 UART: [idev] --
6,054,471 UART: [ldev] ++
6,055,166 UART: [ldev] CDI.KEYID = 6
6,056,080 UART: [ldev] SUBJECT.KEYID = 5
6,057,304 UART: [ldev] AUTHORITY.KEYID = 7
6,058,487 UART: [ldev] FE.KEYID = 1
6,100,299 UART: [ldev] Erasing FE.KEYID = 1
8,606,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,034 UART: [ldev] --
10,414,686 UART: [fwproc] Wait for Commands...
10,416,785 UART: [fwproc] Recv command 0x46574c44
10,419,106 UART: [fwproc] Recv'd Img size: 114084 bytes
13,890,512 UART: ROM Fatal Error: 0x000B002E
13,894,180 >>> mbox cmd response: failed
13,894,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,894,961 >>> mbox cmd response: failed
13,895,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,895,517 >>> mbox cmd response: failed
Initializing fuses
2,054,534 writing to cptra_bootfsm_go
2,243,880 UART:
2,244,230 UART: Running Caliptra ROM ...
2,245,275 UART:
2,245,427 UART: [state] CFI Enabled
2,318,259 UART: [state] LifecycleState = Manufacturing
2,320,698 UART: [state] DebugLocked = No
2,322,758 UART: [state] WD Timer not started. Device not locked for debugging
2,326,472 UART: [kat] SHA2-256
2,516,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,121 UART: [kat] ++
2,527,604 UART: [kat] sha1
2,539,306 UART: [kat] SHA2-256
2,542,281 UART: [kat] SHA2-384
2,547,470 UART: [kat] SHA2-512-ACC
2,550,098 UART: [kat] ECC-384
5,001,834 UART: [kat] HMAC-384Kdf
5,025,363 UART: [kat] LMS
5,557,151 UART: [kat] --
5,561,597 UART: [cold-reset] ++
5,562,670 UART: [fht] FHT @ 0x50003400
5,572,713 UART: [idev] ++
5,573,384 UART: [idev] CDI.KEYID = 6
5,574,323 UART: [idev] SUBJECT.KEYID = 7
5,575,534 UART: [idev] UDS.KEYID = 0
5,578,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,722,189 UART: [idev] Erasing UDS.KEYID = 0
8,078,891 UART: [idev] Sha1 KeyId Algorithm
8,100,567 UART: [idev] --
8,106,153 UART: [ldev] ++
8,106,834 UART: [ldev] CDI.KEYID = 6
8,107,803 UART: [ldev] SUBJECT.KEYID = 5
8,108,963 UART: [ldev] AUTHORITY.KEYID = 7
8,110,139 UART: [ldev] FE.KEYID = 1
8,151,969 UART: [ldev] Erasing FE.KEYID = 1
10,658,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,239 UART: [ldev] --
12,467,922 UART: [fwproc] Wait for Commands...
12,469,814 UART: [fwproc] Recv command 0x46574c44
12,472,132 UART: [fwproc] Recv'd Img size: 114084 bytes
15,945,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,021,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,137,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,678,024 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,440,402 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,312,661 >>> mbox cmd response: failed
14,313,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,313,854 >>> mbox cmd response: failed
14,314,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,314,415 >>> mbox cmd response: failed
Initializing fuses
2,054,423 writing to cptra_bootfsm_go
5,487,394 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,824,596 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,426 UART:
192,786 UART: Running Caliptra ROM ...
193,985 UART:
603,498 UART: [state] CFI Enabled
617,569 UART: [state] LifecycleState = Manufacturing
619,941 UART: [state] DebugLocked = No
621,904 UART: [state] WD Timer not started. Device not locked for debugging
626,555 UART: [kat] SHA2-256
816,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,203 UART: [kat] ++
827,732 UART: [kat] sha1
840,556 UART: [kat] SHA2-256
843,567 UART: [kat] SHA2-384
849,921 UART: [kat] SHA2-512-ACC
852,531 UART: [kat] ECC-384
3,296,209 UART: [kat] HMAC-384Kdf
3,308,719 UART: [kat] LMS
3,840,543 UART: [kat] --
3,843,046 UART: [cold-reset] ++
3,844,874 UART: [fht] FHT @ 0x50003400
3,857,968 UART: [idev] ++
3,858,698 UART: [idev] CDI.KEYID = 6
3,859,636 UART: [idev] SUBJECT.KEYID = 7
3,860,847 UART: [idev] UDS.KEYID = 0
3,863,535 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,007,025 UART: [idev] Erasing UDS.KEYID = 0
6,335,733 UART: [idev] Sha1 KeyId Algorithm
6,357,597 UART: [idev] --
6,362,832 UART: [ldev] ++
6,363,511 UART: [ldev] CDI.KEYID = 6
6,364,396 UART: [ldev] SUBJECT.KEYID = 5
6,365,611 UART: [ldev] AUTHORITY.KEYID = 7
6,366,784 UART: [ldev] FE.KEYID = 1
6,377,618 UART: [ldev] Erasing FE.KEYID = 1
8,854,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,087 UART: [ldev] --
10,645,878 UART: [fwproc] Wait for Commands...
10,648,643 UART: [fwproc] Recv command 0x46574c44
10,650,955 UART: [fwproc] Recv'd Img size: 114084 bytes
14,119,472 UART: ROM Fatal Error: 0x000B002E
14,123,139 >>> mbox cmd response: failed
14,123,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,123,917 >>> mbox cmd response: failed
14,124,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,124,427 >>> mbox cmd response: failed
Initializing fuses
2,053,315 writing to cptra_bootfsm_go
2,242,641 UART:
2,242,991 UART: Running Caliptra ROM ...
2,244,129 UART:
6,328,762 UART: [state] CFI Enabled
6,340,816 UART: [state] LifecycleState = Manufacturing
6,343,192 UART: [state] DebugLocked = No
6,344,533 UART: [state] WD Timer not started. Device not locked for debugging
6,349,096 UART: [kat] SHA2-256
6,538,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,549,754 UART: [kat] ++
6,550,350 UART: [kat] sha1
6,562,055 UART: [kat] SHA2-256
6,565,079 UART: [kat] SHA2-384
6,569,996 UART: [kat] SHA2-512-ACC
6,572,563 UART: [kat] ECC-384
9,012,528 UART: [kat] HMAC-384Kdf
9,025,900 UART: [kat] LMS
9,557,698 UART: [kat] --
9,562,399 UART: [cold-reset] ++
9,564,517 UART: [fht] FHT @ 0x50003400
9,576,148 UART: [idev] ++
9,576,830 UART: [idev] CDI.KEYID = 6
9,577,850 UART: [idev] SUBJECT.KEYID = 7
9,579,009 UART: [idev] UDS.KEYID = 0
9,581,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
9,725,055 UART: [idev] Erasing UDS.KEYID = 0
12,057,179 UART: [idev] Sha1 KeyId Algorithm
12,079,876 UART: [idev] --
12,085,869 UART: [ldev] ++
12,086,553 UART: [ldev] CDI.KEYID = 6
12,087,467 UART: [ldev] SUBJECT.KEYID = 5
12,088,630 UART: [ldev] AUTHORITY.KEYID = 7
12,089,870 UART: [ldev] FE.KEYID = 1
12,099,394 UART: [ldev] Erasing FE.KEYID = 1
14,576,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,294,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,310,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,325,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,340,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,361,335 UART: [ldev] --
16,365,951 UART: [fwproc] Wait for Commands...
16,368,422 UART: [fwproc] Recv command 0x46574c44
16,370,683 UART: [fwproc] Recv'd Img size: 114084 bytes
19,846,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,921,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,038,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
20,579,122 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,754,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,532,066 >>> mbox cmd response: failed
14,532,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,532,975 >>> mbox cmd response: failed
14,533,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,533,541 >>> mbox cmd response: failed
Initializing fuses
2,056,729 writing to cptra_bootfsm_go
9,094,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,338,682 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Manufacturing
85,883 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,273 UART: [kat] SHA2-256
892,211 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,024 UART: [kat] LMS
1,475,220 UART: [kat] --
1,476,351 UART: [cold-reset] ++
1,476,929 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,642 UART: [idev] Erasing UDS.KEYID = 0
1,505,424 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,956 UART: [idev] --
1,515,035 UART: [ldev] ++
1,515,203 UART: [ldev] CDI.KEYID = 6
1,515,566 UART: [ldev] SUBJECT.KEYID = 5
1,515,992 UART: [ldev] AUTHORITY.KEYID = 7
1,516,455 UART: [ldev] FE.KEYID = 1
1,521,619 UART: [ldev] Erasing FE.KEYID = 1
1,547,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,118 UART: [ldev] --
1,586,577 UART: [fwproc] Waiting for Commands...
1,587,394 UART: [fwproc] Received command 0x46574c44
1,588,185 UART: [fwproc] Received Image of size 114084 bytes
2,907,757 UART: ROM Fatal Error: 0x000B002E
2,908,916 >>> mbox cmd response: failed
2,908,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,922 >>> mbox cmd response: failed
2,908,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,583 UART: [kat] SHA2-256
892,521 UART: [kat] SHA2-384
895,128 UART: [kat] SHA2-512-ACC
897,029 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,740 UART: [kat] LMS
1,475,936 UART: [kat] --
1,476,725 UART: [cold-reset] ++
1,477,163 UART: [fht] Storing FHT @ 0x50003400
1,479,992 UART: [idev] ++
1,480,160 UART: [idev] CDI.KEYID = 6
1,480,520 UART: [idev] SUBJECT.KEYID = 7
1,480,944 UART: [idev] UDS.KEYID = 0
1,481,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,978 UART: [idev] Erasing UDS.KEYID = 0
1,505,746 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,360 UART: [idev] --
1,515,465 UART: [ldev] ++
1,515,633 UART: [ldev] CDI.KEYID = 6
1,515,996 UART: [ldev] SUBJECT.KEYID = 5
1,516,422 UART: [ldev] AUTHORITY.KEYID = 7
1,516,885 UART: [ldev] FE.KEYID = 1
1,522,205 UART: [ldev] Erasing FE.KEYID = 1
1,547,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,270 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,224 UART: [fwproc] Received command 0x46574c44
1,588,015 UART: [fwproc] Received Image of size 114084 bytes
2,882,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,006 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,358 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,943 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,759,371 >>> mbox cmd response: failed
2,759,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,759,377 >>> mbox cmd response: failed
2,759,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,759,383 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,531 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Manufacturing
86,150 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,483 UART: [kat] SHA2-512-ACC
897,384 UART: [kat] ECC-384
902,841 UART: [kat] HMAC-384Kdf
907,453 UART: [kat] LMS
1,475,649 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,477,080 UART: [fht] Storing FHT @ 0x50003400
1,479,777 UART: [idev] ++
1,479,945 UART: [idev] CDI.KEYID = 6
1,480,305 UART: [idev] SUBJECT.KEYID = 7
1,480,729 UART: [idev] UDS.KEYID = 0
1,481,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,001 UART: [idev] Erasing UDS.KEYID = 0
1,506,031 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,547,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,845 UART: [ldev] --
1,586,152 UART: [fwproc] Waiting for Commands...
1,586,767 UART: [fwproc] Received command 0x46574c44
1,587,558 UART: [fwproc] Received Image of size 114084 bytes
2,907,242 UART: ROM Fatal Error: 0x000B002E
2,908,401 >>> mbox cmd response: failed
2,908,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,407 >>> mbox cmd response: failed
2,908,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,826 UART: [kat] SHA2-256
881,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,872 UART: [kat] ++
886,024 UART: [kat] sha1
890,210 UART: [kat] SHA2-256
892,148 UART: [kat] SHA2-384
894,903 UART: [kat] SHA2-512-ACC
896,804 UART: [kat] ECC-384
902,461 UART: [kat] HMAC-384Kdf
906,987 UART: [kat] LMS
1,475,183 UART: [kat] --
1,475,966 UART: [cold-reset] ++
1,476,426 UART: [fht] Storing FHT @ 0x50003400
1,479,273 UART: [idev] ++
1,479,441 UART: [idev] CDI.KEYID = 6
1,479,801 UART: [idev] SUBJECT.KEYID = 7
1,480,225 UART: [idev] UDS.KEYID = 0
1,480,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,311 UART: [idev] Erasing UDS.KEYID = 0
1,505,349 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,515,054 UART: [ldev] ++
1,515,222 UART: [ldev] CDI.KEYID = 6
1,515,585 UART: [ldev] SUBJECT.KEYID = 5
1,516,011 UART: [ldev] AUTHORITY.KEYID = 7
1,516,474 UART: [ldev] FE.KEYID = 1
1,521,874 UART: [ldev] Erasing FE.KEYID = 1
1,546,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,291 UART: [ldev] --
1,585,716 UART: [fwproc] Waiting for Commands...
1,586,437 UART: [fwproc] Received command 0x46574c44
1,587,228 UART: [fwproc] Received Image of size 114084 bytes
2,882,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,323 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,198 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,762,006 >>> mbox cmd response: failed
2,762,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,012 >>> mbox cmd response: failed
2,762,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,394 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,550 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Manufacturing
85,715 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,963 UART: [cold-reset] ++
1,172,373 UART: [fht] FHT @ 0x50003400
1,175,032 UART: [idev] ++
1,175,200 UART: [idev] CDI.KEYID = 6
1,175,560 UART: [idev] SUBJECT.KEYID = 7
1,175,984 UART: [idev] UDS.KEYID = 0
1,176,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,745 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,013 UART: [ldev] ++
1,210,181 UART: [ldev] CDI.KEYID = 6
1,210,544 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,643 UART: [ldev] Erasing FE.KEYID = 1
1,243,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,288 UART: [fwproc] Wait for Commands...
1,283,066 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 114084 bytes
2,602,512 UART: ROM Fatal Error: 0x000B002E
2,603,671 >>> mbox cmd response: failed
2,603,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,677 >>> mbox cmd response: failed
2,603,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
892,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,121 UART: [kat] ++
897,273 UART: [kat] sha1
901,703 UART: [kat] SHA2-256
903,643 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,748 UART: [kat] HMAC-384Kdf
922,426 UART: [kat] LMS
1,170,754 UART: [kat] --
1,171,563 UART: [cold-reset] ++
1,172,097 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,200,215 UART: [idev] Sha1 KeyId Algorithm
1,208,651 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,152 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,325 UART: [ldev] --
1,281,778 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,809 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,288 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,459,136 >>> mbox cmd response: failed
2,459,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,142 >>> mbox cmd response: failed
2,459,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,415 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,319 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Manufacturing
86,310 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
907,167 UART: [kat] SHA2-512-ACC
909,068 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,269 UART: [kat] LMS
1,171,597 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,883 UART: [idev] ++
1,176,051 UART: [idev] CDI.KEYID = 6
1,176,411 UART: [idev] SUBJECT.KEYID = 7
1,176,835 UART: [idev] UDS.KEYID = 0
1,177,180 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,192 UART: [ldev] ++
1,211,360 UART: [ldev] CDI.KEYID = 6
1,211,723 UART: [ldev] SUBJECT.KEYID = 5
1,212,149 UART: [ldev] AUTHORITY.KEYID = 7
1,212,612 UART: [ldev] FE.KEYID = 1
1,217,822 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,495 UART: [fwproc] Wait for Commands...
1,284,073 UART: [fwproc] Recv command 0x46574c44
1,284,801 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,147 UART: ROM Fatal Error: 0x000B002E
2,604,306 >>> mbox cmd response: failed
2,604,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,312 >>> mbox cmd response: failed
2,604,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
893,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,070 UART: [kat] ++
898,222 UART: [kat] sha1
902,318 UART: [kat] SHA2-256
904,258 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,701 UART: [kat] HMAC-384Kdf
923,537 UART: [kat] LMS
1,171,865 UART: [kat] --
1,172,786 UART: [cold-reset] ++
1,173,162 UART: [fht] FHT @ 0x50003400
1,175,889 UART: [idev] ++
1,176,057 UART: [idev] CDI.KEYID = 6
1,176,417 UART: [idev] SUBJECT.KEYID = 7
1,176,841 UART: [idev] UDS.KEYID = 0
1,177,186 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,069 UART: [idev] Erasing UDS.KEYID = 0
1,202,446 UART: [idev] Sha1 KeyId Algorithm
1,210,968 UART: [idev] --
1,211,824 UART: [ldev] ++
1,211,992 UART: [ldev] CDI.KEYID = 6
1,212,355 UART: [ldev] SUBJECT.KEYID = 5
1,212,781 UART: [ldev] AUTHORITY.KEYID = 7
1,213,244 UART: [ldev] FE.KEYID = 1
1,218,578 UART: [ldev] Erasing FE.KEYID = 1
1,245,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,352 UART: [ldev] --
1,284,761 UART: [fwproc] Wait for Commands...
1,285,531 UART: [fwproc] Recv command 0x46574c44
1,286,259 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,823 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,459,295 >>> mbox cmd response: failed
2,459,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,301 >>> mbox cmd response: failed
2,459,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,459,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,478 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Manufacturing
85,733 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,398 UART: [kat] SHA2-512-ACC
906,299 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,812 UART: [kat] LMS
1,169,124 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,515 UART: [idev] ++
1,173,683 UART: [idev] CDI.KEYID = 6
1,174,044 UART: [idev] SUBJECT.KEYID = 7
1,174,469 UART: [idev] UDS.KEYID = 0
1,174,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,375 UART: [idev] --
1,209,434 UART: [ldev] ++
1,209,602 UART: [ldev] CDI.KEYID = 6
1,209,966 UART: [ldev] SUBJECT.KEYID = 5
1,210,393 UART: [ldev] AUTHORITY.KEYID = 7
1,210,856 UART: [ldev] FE.KEYID = 1
1,216,134 UART: [ldev] Erasing FE.KEYID = 1
1,242,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,436 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 114084 bytes
2,601,671 UART: ROM Fatal Error: 0x000B002E
2,602,830 >>> mbox cmd response: failed
2,602,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,602,836 >>> mbox cmd response: failed
2,602,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,602,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,999 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
890,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,937 UART: [kat] ++
895,089 UART: [kat] sha1
899,373 UART: [kat] SHA2-256
901,313 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,036 UART: [kat] HMAC-384Kdf
920,690 UART: [kat] LMS
1,169,002 UART: [kat] --
1,170,003 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,916 UART: [ldev] ++
1,209,084 UART: [ldev] CDI.KEYID = 6
1,209,448 UART: [ldev] SUBJECT.KEYID = 5
1,209,875 UART: [ldev] AUTHORITY.KEYID = 7
1,210,338 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,467 UART: [fwproc] Recv command 0x46574c44
1,282,200 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,843 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,516 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,455,749 >>> mbox cmd response: failed
2,455,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,455,755 >>> mbox cmd response: failed
2,455,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,455,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,644 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Manufacturing
86,322 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [kat] SHA2-256
891,881 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,010 UART: [kat] ++
896,162 UART: [kat] sha1
900,522 UART: [kat] SHA2-256
902,462 UART: [kat] SHA2-384
905,227 UART: [kat] SHA2-512-ACC
907,128 UART: [kat] ECC-384
916,855 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,776 UART: [cold-reset] ++
1,171,114 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,175,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,686 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,329 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,480 UART: ROM Fatal Error: 0x000B002E
2,604,639 >>> mbox cmd response: failed
2,604,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,645 >>> mbox cmd response: failed
2,604,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,652 UART: [idev] --
1,209,615 UART: [ldev] ++
1,209,783 UART: [ldev] CDI.KEYID = 6
1,210,147 UART: [ldev] SUBJECT.KEYID = 5
1,210,574 UART: [ldev] AUTHORITY.KEYID = 7
1,211,037 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,459 UART: [ldev] --
1,280,745 UART: [fwproc] Wait for Commands...
1,281,490 UART: [fwproc] Recv command 0x46574c44
1,282,223 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,057 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,453,940 >>> mbox cmd response: failed
2,453,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,453,946 >>> mbox cmd response: failed
2,453,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,453,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,004 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,830 writing to cptra_bootfsm_go
4,881,502 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,635,069 >>> mbox cmd response: failed
16,635,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,636,032 >>> mbox cmd response: failed
16,636,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,636,594 >>> mbox cmd response: failed
Initializing fuses
2,056,783 writing to cptra_bootfsm_go
6,929,643 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,505,761 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
4,880,989 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,634,228 >>> mbox cmd response: failed
16,634,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,635,165 >>> mbox cmd response: failed
16,635,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,635,755 >>> mbox cmd response: failed
Initializing fuses
2,055,696 writing to cptra_bootfsm_go
6,914,936 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,458,812 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
5,185,188 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,803,070 >>> mbox cmd response: failed
16,803,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,804,040 >>> mbox cmd response: failed
16,804,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,804,600 >>> mbox cmd response: failed
Initializing fuses
2,063,390 writing to cptra_bootfsm_go
8,251,992 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,688,139 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
5,180,617 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,803,925 >>> mbox cmd response: failed
16,804,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,805,086 >>> mbox cmd response: failed
16,805,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,805,661 >>> mbox cmd response: failed
Initializing fuses
2,058,887 writing to cptra_bootfsm_go
8,246,276 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,688,226 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
3,436,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,420,784 >>> mbox cmd response: failed
12,421,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,421,745 >>> mbox cmd response: failed
12,422,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,422,314 >>> mbox cmd response: failed
Initializing fuses
2,060,876 writing to cptra_bootfsm_go
5,521,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,321,290 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,461,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,438,145 >>> mbox cmd response: failed
12,438,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,439,028 >>> mbox cmd response: failed
12,439,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,439,588 >>> mbox cmd response: failed
Initializing fuses
2,056,680 writing to cptra_bootfsm_go
5,526,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,346,304 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,787,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,653,284 >>> mbox cmd response: failed
12,653,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,266 >>> mbox cmd response: failed
12,654,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,830 >>> mbox cmd response: failed
Initializing fuses
2,059,855 writing to cptra_bootfsm_go
10,984,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,693,661 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,787,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,661,514 >>> mbox cmd response: failed
12,662,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,452 >>> mbox cmd response: failed
12,662,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,017 >>> mbox cmd response: failed
Initializing fuses
2,055,387 writing to cptra_bootfsm_go
10,984,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,703,368 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,466,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,434,587 >>> mbox cmd response: failed
12,435,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,435,858 >>> mbox cmd response: failed
12,436,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,423 >>> mbox cmd response: failed
Initializing fuses
2,058,466 writing to cptra_bootfsm_go
5,499,698 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,355,973 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,487,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,425,231 >>> mbox cmd response: failed
12,425,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,426,127 >>> mbox cmd response: failed
12,426,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,426,683 >>> mbox cmd response: failed
Initializing fuses
2,061,782 writing to cptra_bootfsm_go
5,519,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,328,051 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,700 writing to cptra_bootfsm_go
3,792,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,654,727 >>> mbox cmd response: failed
12,655,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,816 >>> mbox cmd response: failed
12,656,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,371 >>> mbox cmd response: failed
Initializing fuses
2,062,793 writing to cptra_bootfsm_go
10,976,911 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,693,515 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,792,764 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,636,396 >>> mbox cmd response: failed
12,637,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,637,682 >>> mbox cmd response: failed
12,637,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,638,249 >>> mbox cmd response: failed
Initializing fuses
2,063,108 writing to cptra_bootfsm_go
11,015,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,731,874 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,203,461 >>> mbox cmd response: failed
1,203,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,467 >>> mbox cmd response: failed
1,203,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,358 UART: [state] LifecycleState = Unprovisioned
86,013 UART: [state] DebugLocked = No
86,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
895,088 UART: [kat] SHA2-512-ACC
896,989 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,441 UART: [cold-reset] ++
1,476,961 UART: [fht] Storing FHT @ 0x50003400
1,479,758 UART: [idev] ++
1,479,926 UART: [idev] CDI.KEYID = 6
1,480,286 UART: [idev] SUBJECT.KEYID = 7
1,480,710 UART: [idev] UDS.KEYID = 0
1,481,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,216 UART: [idev] Erasing UDS.KEYID = 0
1,505,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,504 UART: [idev] --
1,515,599 UART: [ldev] ++
1,515,767 UART: [ldev] CDI.KEYID = 6
1,516,130 UART: [ldev] SUBJECT.KEYID = 5
1,516,556 UART: [ldev] AUTHORITY.KEYID = 7
1,517,019 UART: [ldev] FE.KEYID = 1
1,521,981 UART: [ldev] Erasing FE.KEYID = 1
1,547,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,104 UART: [ldev] --
1,586,515 UART: [fwproc] Waiting for Commands...
1,587,182 UART: [fwproc] Received command 0x46574c44
1,587,973 UART: [fwproc] Received Image of size 114084 bytes
2,882,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,288 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,640 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,119 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,827 >>> mbox cmd response: failed
1,202,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,833 >>> mbox cmd response: failed
1,202,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,305 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,964 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,354 >>> mbox cmd response: failed
1,202,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,360 >>> mbox cmd response: failed
1,202,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
890,964 UART: [kat] SHA2-256
892,902 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,399 UART: [kat] HMAC-384Kdf
908,075 UART: [kat] LMS
1,476,271 UART: [kat] --
1,476,926 UART: [cold-reset] ++
1,477,492 UART: [fht] Storing FHT @ 0x50003400
1,480,167 UART: [idev] ++
1,480,335 UART: [idev] CDI.KEYID = 6
1,480,695 UART: [idev] SUBJECT.KEYID = 7
1,481,119 UART: [idev] UDS.KEYID = 0
1,481,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,903 UART: [idev] Erasing UDS.KEYID = 0
1,505,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,333 UART: [idev] --
1,515,384 UART: [ldev] ++
1,515,552 UART: [ldev] CDI.KEYID = 6
1,515,915 UART: [ldev] SUBJECT.KEYID = 5
1,516,341 UART: [ldev] AUTHORITY.KEYID = 7
1,516,804 UART: [ldev] FE.KEYID = 1
1,521,992 UART: [ldev] Erasing FE.KEYID = 1
1,547,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,991 UART: [ldev] --
1,587,428 UART: [fwproc] Waiting for Commands...
1,588,075 UART: [fwproc] Received command 0x46574c44
1,588,866 UART: [fwproc] Received Image of size 114084 bytes
2,883,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,423 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,775 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,212 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,203,300 >>> mbox cmd response: failed
1,203,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,306 >>> mbox cmd response: failed
1,203,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,312 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,144 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,570 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,057 >>> mbox cmd response: failed
1,202,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,063 >>> mbox cmd response: failed
1,202,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
893,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,163 UART: [kat] ++
897,315 UART: [kat] sha1
901,557 UART: [kat] SHA2-256
903,497 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,608 UART: [kat] HMAC-384Kdf
922,158 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,355 UART: [cold-reset] ++
1,171,697 UART: [fht] FHT @ 0x50003400
1,174,294 UART: [idev] ++
1,174,462 UART: [idev] CDI.KEYID = 6
1,174,822 UART: [idev] SUBJECT.KEYID = 7
1,175,246 UART: [idev] UDS.KEYID = 0
1,175,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,994 UART: [idev] Erasing UDS.KEYID = 0
1,200,109 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,843 UART: [ldev] ++
1,210,011 UART: [ldev] CDI.KEYID = 6
1,210,374 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,342 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46574c44
1,283,716 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,494 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,603 >>> mbox cmd response: failed
1,202,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,609 >>> mbox cmd response: failed
1,202,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,169 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,360 >>> mbox cmd response: failed
1,202,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,366 >>> mbox cmd response: failed
1,202,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
893,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,608 UART: [kat] ++
897,760 UART: [kat] sha1
901,918 UART: [kat] SHA2-256
903,858 UART: [kat] SHA2-384
906,609 UART: [kat] SHA2-512-ACC
908,510 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,136 UART: [fht] FHT @ 0x50003400
1,175,887 UART: [idev] ++
1,176,055 UART: [idev] CDI.KEYID = 6
1,176,415 UART: [idev] SUBJECT.KEYID = 7
1,176,839 UART: [idev] UDS.KEYID = 0
1,177,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,033 UART: [idev] Erasing UDS.KEYID = 0
1,201,840 UART: [idev] Sha1 KeyId Algorithm
1,210,332 UART: [idev] --
1,211,368 UART: [ldev] ++
1,211,536 UART: [ldev] CDI.KEYID = 6
1,211,899 UART: [ldev] SUBJECT.KEYID = 5
1,212,325 UART: [ldev] AUTHORITY.KEYID = 7
1,212,788 UART: [ldev] FE.KEYID = 1
1,217,978 UART: [ldev] Erasing FE.KEYID = 1
1,244,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,706 UART: [ldev] --
1,283,095 UART: [fwproc] Wait for Commands...
1,283,779 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,377 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,203,768 >>> mbox cmd response: failed
1,203,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,774 >>> mbox cmd response: failed
1,203,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,874 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,894 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,853 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,203,393 >>> mbox cmd response: failed
1,203,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,399 >>> mbox cmd response: failed
1,203,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,672 UART: [state] LifecycleState = Unprovisioned
86,327 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
905,052 UART: [kat] SHA2-512-ACC
906,953 UART: [kat] ECC-384
916,644 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,623 UART: [cold-reset] ++
1,171,139 UART: [fht] FHT @ 0x50003400
1,173,749 UART: [idev] ++
1,173,917 UART: [idev] CDI.KEYID = 6
1,174,278 UART: [idev] SUBJECT.KEYID = 7
1,174,703 UART: [idev] UDS.KEYID = 0
1,175,049 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,220 UART: [ldev] ++
1,209,388 UART: [ldev] CDI.KEYID = 6
1,209,752 UART: [ldev] SUBJECT.KEYID = 5
1,210,179 UART: [ldev] AUTHORITY.KEYID = 7
1,210,642 UART: [ldev] FE.KEYID = 1
1,215,914 UART: [ldev] Erasing FE.KEYID = 1
1,242,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,138 UART: [ldev] --
1,282,508 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,626 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,737 >>> mbox cmd response: failed
1,202,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,743 >>> mbox cmd response: failed
1,202,743 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,406 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,008 >>> mbox cmd response: failed
1,202,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,014 >>> mbox cmd response: failed
1,202,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,779 UART: [fwproc] Wait for Commands...
1,282,566 UART: [fwproc] Recv command 0x46574c44
1,283,299 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,793 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,202,552 >>> mbox cmd response: failed
1,202,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,558 >>> mbox cmd response: failed
1,202,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,697 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,511 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,222 UART:
192,576 UART: Running Caliptra ROM ...
193,731 UART:
193,879 UART: [state] CFI Enabled
263,663 UART: [state] LifecycleState = Unprovisioned
265,604 UART: [state] DebugLocked = No
268,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,584 UART: [kat] SHA2-256
443,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,764 UART: [kat] ++
454,353 UART: [kat] sha1
465,509 UART: [kat] SHA2-256
468,203 UART: [kat] SHA2-384
472,940 UART: [kat] SHA2-512-ACC
475,277 UART: [kat] ECC-384
2,768,407 UART: [kat] HMAC-384Kdf
2,781,249 UART: [kat] LMS
3,971,546 UART: [kat] --
3,976,052 UART: [cold-reset] ++
3,977,453 UART: [fht] Storing FHT @ 0x50003400
3,987,858 UART: [idev] ++
3,988,453 UART: [idev] CDI.KEYID = 6
3,989,369 UART: [idev] SUBJECT.KEYID = 7
3,990,640 UART: [idev] UDS.KEYID = 0
3,993,211 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,514 UART: [idev] Erasing UDS.KEYID = 0
7,326,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,592 UART: [idev] --
7,353,502 UART: [ldev] ++
7,354,077 UART: [ldev] CDI.KEYID = 6
7,355,045 UART: [ldev] SUBJECT.KEYID = 5
7,356,266 UART: [ldev] AUTHORITY.KEYID = 7
7,357,497 UART: [ldev] FE.KEYID = 1
7,404,284 UART: [ldev] Erasing FE.KEYID = 1
10,734,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,950 UART: [ldev] --
13,098,398 UART: [fwproc] Waiting for Commands...
13,100,177 UART: [fwproc] Received command 0x46574c44
13,102,425 UART: [fwproc] Received Image of size 113760 bytes
15,805,657 UART: ROM Fatal Error: 0x000B0012
15,809,164 >>> mbox cmd response: failed
15,809,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,809,913 >>> mbox cmd response: failed
15,810,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,810,471 >>> mbox cmd response: failed
Initializing fuses
2,054,695 writing to cptra_bootfsm_go
2,244,004 UART:
2,244,370 UART: Running Caliptra ROM ...
2,245,418 UART:
2,245,568 UART: [state] CFI Enabled
2,307,640 UART: [state] LifecycleState = Unprovisioned
2,309,538 UART: [state] DebugLocked = No
2,311,276 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,488 UART: [kat] SHA2-256
2,485,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,684 UART: [kat] ++
2,496,150 UART: [kat] sha1
2,508,118 UART: [kat] SHA2-256
2,510,825 UART: [kat] SHA2-384
2,517,189 UART: [kat] SHA2-512-ACC
2,519,600 UART: [kat] ECC-384
4,815,239 UART: [kat] HMAC-384Kdf
4,849,693 UART: [kat] LMS
6,039,989 UART: [kat] --
6,045,940 UART: [cold-reset] ++
6,047,399 UART: [fht] Storing FHT @ 0x50003400
6,059,373 UART: [idev] ++
6,059,942 UART: [idev] CDI.KEYID = 6
6,060,911 UART: [idev] SUBJECT.KEYID = 7
6,062,130 UART: [idev] UDS.KEYID = 0
6,064,430 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,207,614 UART: [idev] Erasing UDS.KEYID = 0
9,397,309 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,665 UART: [idev] --
9,421,443 UART: [ldev] ++
9,422,080 UART: [ldev] CDI.KEYID = 6
9,422,993 UART: [ldev] SUBJECT.KEYID = 5
9,424,761 UART: [ldev] AUTHORITY.KEYID = 7
9,425,968 UART: [ldev] FE.KEYID = 1
9,472,818 UART: [ldev] Erasing FE.KEYID = 1
12,808,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,988 UART: [ldev] --
15,185,959 UART: [fwproc] Waiting for Commands...
15,188,435 UART: [fwproc] Received command 0x46574c44
15,190,635 UART: [fwproc] Received Image of size 113760 bytes
19,240,259 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,312,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,381,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,696,788 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,784,656 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,565,239 >>> mbox cmd response: failed
15,565,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,142 >>> mbox cmd response: failed
15,566,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,566,703 >>> mbox cmd response: failed
Initializing fuses
2,054,363 writing to cptra_bootfsm_go
5,835,126 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,923,921 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,537 UART:
192,907 UART: Running Caliptra ROM ...
194,122 UART:
603,630 UART: [state] CFI Enabled
618,774 UART: [state] LifecycleState = Unprovisioned
620,668 UART: [state] DebugLocked = No
623,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,692 UART: [kat] SHA2-256
797,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,931 UART: [kat] ++
808,377 UART: [kat] sha1
819,254 UART: [kat] SHA2-256
821,976 UART: [kat] SHA2-384
829,038 UART: [kat] SHA2-512-ACC
831,396 UART: [kat] ECC-384
3,114,404 UART: [kat] HMAC-384Kdf
3,126,689 UART: [kat] LMS
4,316,812 UART: [kat] --
4,321,423 UART: [cold-reset] ++
4,323,683 UART: [fht] Storing FHT @ 0x50003400
4,334,639 UART: [idev] ++
4,335,254 UART: [idev] CDI.KEYID = 6
4,336,139 UART: [idev] SUBJECT.KEYID = 7
4,337,414 UART: [idev] UDS.KEYID = 0
4,339,902 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,824 UART: [idev] Erasing UDS.KEYID = 0
7,623,194 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,720 UART: [idev] --
7,649,614 UART: [ldev] ++
7,650,190 UART: [ldev] CDI.KEYID = 6
7,651,213 UART: [ldev] SUBJECT.KEYID = 5
7,652,319 UART: [ldev] AUTHORITY.KEYID = 7
7,653,606 UART: [ldev] FE.KEYID = 1
7,663,713 UART: [ldev] Erasing FE.KEYID = 1
10,954,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,017 UART: [ldev] --
13,313,029 UART: [fwproc] Waiting for Commands...
13,315,619 UART: [fwproc] Received command 0x46574c44
13,317,807 UART: [fwproc] Received Image of size 113760 bytes
16,021,853 UART: ROM Fatal Error: 0x000B0012
16,025,417 >>> mbox cmd response: failed
16,025,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,133 >>> mbox cmd response: failed
16,026,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,711 >>> mbox cmd response: failed
Initializing fuses
2,062,443 writing to cptra_bootfsm_go
2,251,843 UART:
2,252,199 UART: Running Caliptra ROM ...
2,253,341 UART:
4,442,626 UART: [state] CFI Enabled
4,459,923 UART: [state] LifecycleState = Unprovisioned
4,461,846 UART: [state] DebugLocked = No
4,464,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,469,051 UART: [kat] SHA2-256
4,638,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,649,317 UART: [kat] ++
4,649,775 UART: [kat] sha1
4,660,121 UART: [kat] SHA2-256
4,662,812 UART: [kat] SHA2-384
4,669,827 UART: [kat] SHA2-512-ACC
4,672,173 UART: [kat] ECC-384
6,954,422 UART: [kat] HMAC-384Kdf
6,965,139 UART: [kat] LMS
8,155,249 UART: [kat] --
8,162,452 UART: [cold-reset] ++
8,164,817 UART: [fht] Storing FHT @ 0x50003400
8,174,628 UART: [idev] ++
8,175,246 UART: [idev] CDI.KEYID = 6
8,176,127 UART: [idev] SUBJECT.KEYID = 7
8,177,395 UART: [idev] UDS.KEYID = 0
8,179,633 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,322,607 UART: [idev] Erasing UDS.KEYID = 0
11,467,019 UART: [idev] Using Sha1 for KeyId Algorithm
11,488,828 UART: [idev] --
11,493,472 UART: [ldev] ++
11,494,040 UART: [ldev] CDI.KEYID = 6
11,495,005 UART: [ldev] SUBJECT.KEYID = 5
11,496,771 UART: [ldev] AUTHORITY.KEYID = 7
11,497,974 UART: [ldev] FE.KEYID = 1
11,509,513 UART: [ldev] Erasing FE.KEYID = 1
14,802,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,096,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,111,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,126,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,140,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,159,164 UART: [ldev] --
17,163,617 UART: [fwproc] Waiting for Commands...
17,166,034 UART: [fwproc] Received command 0x46574c44
17,168,220 UART: [fwproc] Received Image of size 113760 bytes
21,216,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,293,686 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,362,602 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,678,881 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
4,128,368 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,764,785 >>> mbox cmd response: failed
15,765,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,696 >>> mbox cmd response: failed
15,765,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,766,253 >>> mbox cmd response: failed
Initializing fuses
2,058,951 writing to cptra_bootfsm_go
8,233,894 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,162,953 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,362 UART:
192,733 UART: Running Caliptra ROM ...
193,955 UART:
194,109 UART: [state] CFI Enabled
262,003 UART: [state] LifecycleState = Unprovisioned
263,943 UART: [state] DebugLocked = No
265,136 UART: [state] WD Timer not started. Device not locked for debugging
268,853 UART: [kat] SHA2-256
447,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,702 UART: [kat] ++
460,181 UART: [kat] sha1
471,226 UART: [kat] SHA2-256
474,297 UART: [kat] SHA2-384
479,525 UART: [kat] SHA2-512-ACC
482,463 UART: [kat] ECC-384
2,945,077 UART: [kat] HMAC-384Kdf
2,970,282 UART: [kat] LMS
3,499,753 UART: [kat] --
3,504,150 UART: [cold-reset] ++
3,505,757 UART: [fht] FHT @ 0x50003400
3,516,795 UART: [idev] ++
3,517,364 UART: [idev] CDI.KEYID = 6
3,518,301 UART: [idev] SUBJECT.KEYID = 7
3,519,512 UART: [idev] UDS.KEYID = 0
3,521,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,575 UART: [idev] Erasing UDS.KEYID = 0
6,025,444 UART: [idev] Sha1 KeyId Algorithm
6,049,004 UART: [idev] --
6,052,034 UART: [ldev] ++
6,052,609 UART: [ldev] CDI.KEYID = 6
6,053,497 UART: [ldev] SUBJECT.KEYID = 5
6,054,713 UART: [ldev] AUTHORITY.KEYID = 7
6,055,954 UART: [ldev] FE.KEYID = 1
6,098,415 UART: [ldev] Erasing FE.KEYID = 1
8,601,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,892 UART: [ldev] --
10,411,723 UART: [fwproc] Wait for Commands...
10,414,629 UART: [fwproc] Recv command 0x46574c44
10,416,735 UART: [fwproc] Recv'd Img size: 114084 bytes
12,463,452 UART: ROM Fatal Error: 0x000B0012
12,466,531 >>> mbox cmd response: failed
12,466,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,198 >>> mbox cmd response: failed
12,467,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,811 >>> mbox cmd response: failed
Initializing fuses
2,052,802 writing to cptra_bootfsm_go
2,242,089 UART:
2,242,434 UART: Running Caliptra ROM ...
2,243,482 UART:
2,243,632 UART: [state] CFI Enabled
2,322,337 UART: [state] LifecycleState = Unprovisioned
2,324,218 UART: [state] DebugLocked = No
2,326,502 UART: [state] WD Timer not started. Device not locked for debugging
2,329,382 UART: [kat] SHA2-256
2,508,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,520,052 UART: [kat] ++
2,520,515 UART: [kat] sha1
2,532,536 UART: [kat] SHA2-256
2,535,572 UART: [kat] SHA2-384
2,542,755 UART: [kat] SHA2-512-ACC
2,545,712 UART: [kat] ECC-384
5,005,327 UART: [kat] HMAC-384Kdf
5,027,120 UART: [kat] LMS
5,556,556 UART: [kat] --
5,560,891 UART: [cold-reset] ++
5,563,317 UART: [fht] FHT @ 0x50003400
5,573,920 UART: [idev] ++
5,574,482 UART: [idev] CDI.KEYID = 6
5,575,422 UART: [idev] SUBJECT.KEYID = 7
5,576,632 UART: [idev] UDS.KEYID = 0
5,578,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,722,393 UART: [idev] Erasing UDS.KEYID = 0
8,082,291 UART: [idev] Sha1 KeyId Algorithm
8,103,796 UART: [idev] --
8,107,432 UART: [ldev] ++
8,107,998 UART: [ldev] CDI.KEYID = 6
8,108,881 UART: [ldev] SUBJECT.KEYID = 5
8,110,092 UART: [ldev] AUTHORITY.KEYID = 7
8,111,326 UART: [ldev] FE.KEYID = 1
8,155,597 UART: [ldev] Erasing FE.KEYID = 1
10,658,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,443,221 UART: [ldev] --
12,448,542 UART: [fwproc] Wait for Commands...
12,450,478 UART: [fwproc] Recv command 0x46574c44
12,452,575 UART: [fwproc] Recv'd Img size: 114084 bytes
15,855,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,930,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,998,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,315,426 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
3,384,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,248,668 >>> mbox cmd response: failed
12,249,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,249,547 >>> mbox cmd response: failed
12,249,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,250,115 >>> mbox cmd response: failed
Initializing fuses
2,057,623 writing to cptra_bootfsm_go
5,427,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,087,547 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,495 UART:
192,877 UART: Running Caliptra ROM ...
193,996 UART:
603,450 UART: [state] CFI Enabled
614,760 UART: [state] LifecycleState = Unprovisioned
616,646 UART: [state] DebugLocked = No
618,832 UART: [state] WD Timer not started. Device not locked for debugging
621,801 UART: [kat] SHA2-256
800,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,509 UART: [kat] ++
813,039 UART: [kat] sha1
824,145 UART: [kat] SHA2-256
827,157 UART: [kat] SHA2-384
834,157 UART: [kat] SHA2-512-ACC
837,087 UART: [kat] ECC-384
3,278,647 UART: [kat] HMAC-384Kdf
3,291,471 UART: [kat] LMS
3,820,943 UART: [kat] --
3,825,046 UART: [cold-reset] ++
3,827,141 UART: [fht] FHT @ 0x50003400
3,837,030 UART: [idev] ++
3,837,631 UART: [idev] CDI.KEYID = 6
3,838,549 UART: [idev] SUBJECT.KEYID = 7
3,839,713 UART: [idev] UDS.KEYID = 0
3,842,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,496 UART: [idev] Erasing UDS.KEYID = 0
6,316,445 UART: [idev] Sha1 KeyId Algorithm
6,339,825 UART: [idev] --
6,343,488 UART: [ldev] ++
6,344,056 UART: [ldev] CDI.KEYID = 6
6,344,969 UART: [ldev] SUBJECT.KEYID = 5
6,346,128 UART: [ldev] AUTHORITY.KEYID = 7
6,347,417 UART: [ldev] FE.KEYID = 1
6,357,485 UART: [ldev] Erasing FE.KEYID = 1
8,833,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,473 UART: [ldev] --
10,624,628 UART: [fwproc] Wait for Commands...
10,626,235 UART: [fwproc] Recv command 0x46574c44
10,628,308 UART: [fwproc] Recv'd Img size: 114084 bytes
12,685,101 UART: ROM Fatal Error: 0x000B0012
12,688,214 >>> mbox cmd response: failed
12,688,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,996 >>> mbox cmd response: failed
12,689,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,553 >>> mbox cmd response: failed
Initializing fuses
2,059,195 writing to cptra_bootfsm_go
2,248,512 UART:
2,248,851 UART: Running Caliptra ROM ...
2,249,899 UART:
7,786,757 UART: [state] CFI Enabled
7,800,476 UART: [state] LifecycleState = Unprovisioned
7,802,341 UART: [state] DebugLocked = No
7,804,002 UART: [state] WD Timer not started. Device not locked for debugging
7,807,373 UART: [kat] SHA2-256
7,986,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,998,068 UART: [kat] ++
7,998,614 UART: [kat] sha1
8,009,615 UART: [kat] SHA2-256
8,012,656 UART: [kat] SHA2-384
8,018,757 UART: [kat] SHA2-512-ACC
8,021,706 UART: [kat] ECC-384
10,462,003 UART: [kat] HMAC-384Kdf
10,475,525 UART: [kat] LMS
11,004,979 UART: [kat] --
11,010,054 UART: [cold-reset] ++
11,012,369 UART: [fht] FHT @ 0x50003400
11,023,079 UART: [idev] ++
11,023,645 UART: [idev] CDI.KEYID = 6
11,024,560 UART: [idev] SUBJECT.KEYID = 7
11,025,771 UART: [idev] UDS.KEYID = 0
11,028,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,171,494 UART: [idev] Erasing UDS.KEYID = 0
13,496,068 UART: [idev] Sha1 KeyId Algorithm
13,519,843 UART: [idev] --
13,523,047 UART: [ldev] ++
13,523,620 UART: [ldev] CDI.KEYID = 6
13,524,526 UART: [ldev] SUBJECT.KEYID = 5
13,525,683 UART: [ldev] AUTHORITY.KEYID = 7
13,526,964 UART: [ldev] FE.KEYID = 1
13,537,120 UART: [ldev] Erasing FE.KEYID = 1
16,011,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,729,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,745,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,761,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,777,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,797,148 UART: [ldev] --
17,801,719 UART: [fwproc] Wait for Commands...
17,803,981 UART: [fwproc] Recv command 0x46574c44
17,806,077 UART: [fwproc] Recv'd Img size: 114084 bytes
21,209,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,286,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,354,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,671,519 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,693,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,449,374 >>> mbox cmd response: failed
12,449,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,279 >>> mbox cmd response: failed
12,450,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,787 >>> mbox cmd response: failed
Initializing fuses
2,055,503 writing to cptra_bootfsm_go
11,117,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,685,865 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,205 UART:
192,558 UART: Running Caliptra ROM ...
193,770 UART:
193,924 UART: [state] CFI Enabled
261,035 UART: [state] LifecycleState = Unprovisioned
263,410 UART: [state] DebugLocked = No
265,680 UART: [state] WD Timer not started. Device not locked for debugging
270,499 UART: [kat] SHA2-256
460,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,145 UART: [kat] ++
471,685 UART: [kat] sha1
482,680 UART: [kat] SHA2-256
485,684 UART: [kat] SHA2-384
491,888 UART: [kat] SHA2-512-ACC
494,468 UART: [kat] ECC-384
2,948,877 UART: [kat] HMAC-384Kdf
2,971,650 UART: [kat] LMS
3,503,377 UART: [kat] --
3,508,171 UART: [cold-reset] ++
3,509,533 UART: [fht] FHT @ 0x50003400
3,521,498 UART: [idev] ++
3,522,176 UART: [idev] CDI.KEYID = 6
3,523,144 UART: [idev] SUBJECT.KEYID = 7
3,524,305 UART: [idev] UDS.KEYID = 0
3,526,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,856 UART: [idev] Erasing UDS.KEYID = 0
6,030,096 UART: [idev] Sha1 KeyId Algorithm
6,053,665 UART: [idev] --
6,058,211 UART: [ldev] ++
6,058,897 UART: [ldev] CDI.KEYID = 6
6,059,826 UART: [ldev] SUBJECT.KEYID = 5
6,060,989 UART: [ldev] AUTHORITY.KEYID = 7
6,062,225 UART: [ldev] FE.KEYID = 1
6,098,653 UART: [ldev] Erasing FE.KEYID = 1
8,604,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,682 UART: [ldev] --
10,413,924 UART: [fwproc] Wait for Commands...
10,416,619 UART: [fwproc] Recv command 0x46574c44
10,418,937 UART: [fwproc] Recv'd Img size: 114084 bytes
12,501,767 UART: ROM Fatal Error: 0x000B0012
12,505,403 >>> mbox cmd response: failed
12,505,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,177 >>> mbox cmd response: failed
12,506,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,749 >>> mbox cmd response: failed
Initializing fuses
2,061,182 writing to cptra_bootfsm_go
2,250,493 UART:
2,250,840 UART: Running Caliptra ROM ...
2,251,921 UART:
2,252,079 UART: [state] CFI Enabled
2,319,614 UART: [state] LifecycleState = Unprovisioned
2,321,999 UART: [state] DebugLocked = No
2,323,505 UART: [state] WD Timer not started. Device not locked for debugging
2,327,380 UART: [kat] SHA2-256
2,517,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,022 UART: [kat] ++
2,528,486 UART: [kat] sha1
2,539,488 UART: [kat] SHA2-256
2,542,517 UART: [kat] SHA2-384
2,548,026 UART: [kat] SHA2-512-ACC
2,550,655 UART: [kat] ECC-384
5,007,424 UART: [kat] HMAC-384Kdf
5,031,610 UART: [kat] LMS
5,563,374 UART: [kat] --
5,568,233 UART: [cold-reset] ++
5,569,894 UART: [fht] FHT @ 0x50003400
5,581,149 UART: [idev] ++
5,581,832 UART: [idev] CDI.KEYID = 6
5,582,798 UART: [idev] SUBJECT.KEYID = 7
5,584,012 UART: [idev] UDS.KEYID = 0
5,586,201 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,730,206 UART: [idev] Erasing UDS.KEYID = 0
8,089,625 UART: [idev] Sha1 KeyId Algorithm
8,112,762 UART: [idev] --
8,117,567 UART: [ldev] ++
8,118,305 UART: [ldev] CDI.KEYID = 6
8,119,398 UART: [ldev] SUBJECT.KEYID = 5
8,120,426 UART: [ldev] AUTHORITY.KEYID = 7
8,121,615 UART: [ldev] FE.KEYID = 1
8,158,977 UART: [ldev] Erasing FE.KEYID = 1
10,663,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,440 UART: [ldev] --
12,472,922 UART: [fwproc] Wait for Commands...
12,474,723 UART: [fwproc] Recv command 0x46574c44
12,477,042 UART: [fwproc] Recv'd Img size: 114084 bytes
15,923,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,003,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,119,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,661,141 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,805 writing to cptra_bootfsm_go
3,441,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,295,211 >>> mbox cmd response: failed
12,295,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,124 >>> mbox cmd response: failed
12,296,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,694 >>> mbox cmd response: failed
Initializing fuses
2,055,644 writing to cptra_bootfsm_go
5,476,944 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,763,124 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,566 UART:
192,921 UART: Running Caliptra ROM ...
194,085 UART:
603,872 UART: [state] CFI Enabled
615,000 UART: [state] LifecycleState = Unprovisioned
617,383 UART: [state] DebugLocked = No
619,102 UART: [state] WD Timer not started. Device not locked for debugging
623,689 UART: [kat] SHA2-256
813,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,340 UART: [kat] ++
824,871 UART: [kat] sha1
836,560 UART: [kat] SHA2-256
839,569 UART: [kat] SHA2-384
845,979 UART: [kat] SHA2-512-ACC
848,544 UART: [kat] ECC-384
3,292,259 UART: [kat] HMAC-384Kdf
3,303,741 UART: [kat] LMS
3,835,591 UART: [kat] --
3,838,451 UART: [cold-reset] ++
3,840,877 UART: [fht] FHT @ 0x50003400
3,852,838 UART: [idev] ++
3,853,513 UART: [idev] CDI.KEYID = 6
3,854,605 UART: [idev] SUBJECT.KEYID = 7
3,855,728 UART: [idev] UDS.KEYID = 0
3,858,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,379 UART: [idev] Erasing UDS.KEYID = 0
6,332,571 UART: [idev] Sha1 KeyId Algorithm
6,354,815 UART: [idev] --
6,360,109 UART: [ldev] ++
6,360,846 UART: [ldev] CDI.KEYID = 6
6,361,725 UART: [ldev] SUBJECT.KEYID = 5
6,362,934 UART: [ldev] AUTHORITY.KEYID = 7
6,364,108 UART: [ldev] FE.KEYID = 1
6,375,433 UART: [ldev] Erasing FE.KEYID = 1
8,848,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,928 UART: [ldev] --
10,639,784 UART: [fwproc] Wait for Commands...
10,642,849 UART: [fwproc] Recv command 0x46574c44
10,645,163 UART: [fwproc] Recv'd Img size: 114084 bytes
12,729,770 UART: ROM Fatal Error: 0x000B0012
12,733,438 >>> mbox cmd response: failed
12,734,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,365 >>> mbox cmd response: failed
12,734,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,934 >>> mbox cmd response: failed
Initializing fuses
2,061,615 writing to cptra_bootfsm_go
2,250,933 UART:
2,251,294 UART: Running Caliptra ROM ...
2,252,342 UART:
7,734,602 UART: [state] CFI Enabled
7,749,473 UART: [state] LifecycleState = Unprovisioned
7,751,820 UART: [state] DebugLocked = No
7,753,073 UART: [state] WD Timer not started. Device not locked for debugging
7,756,549 UART: [kat] SHA2-256
7,946,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,957,170 UART: [kat] ++
7,957,691 UART: [kat] sha1
7,967,933 UART: [kat] SHA2-256
7,970,956 UART: [kat] SHA2-384
7,977,489 UART: [kat] SHA2-512-ACC
7,980,056 UART: [kat] ECC-384
10,425,308 UART: [kat] HMAC-384Kdf
10,438,785 UART: [kat] LMS
10,970,596 UART: [kat] --
10,973,888 UART: [cold-reset] ++
10,975,550 UART: [fht] FHT @ 0x50003400
10,985,884 UART: [idev] ++
10,986,558 UART: [idev] CDI.KEYID = 6
10,987,525 UART: [idev] SUBJECT.KEYID = 7
10,988,687 UART: [idev] UDS.KEYID = 0
10,990,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,134,728 UART: [idev] Erasing UDS.KEYID = 0
13,468,440 UART: [idev] Sha1 KeyId Algorithm
13,491,564 UART: [idev] --
13,496,585 UART: [ldev] ++
13,497,264 UART: [ldev] CDI.KEYID = 6
13,498,179 UART: [ldev] SUBJECT.KEYID = 5
13,499,339 UART: [ldev] AUTHORITY.KEYID = 7
13,500,567 UART: [ldev] FE.KEYID = 1
13,509,670 UART: [ldev] Erasing FE.KEYID = 1
15,985,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,703,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,733,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,748,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,769,961 UART: [ldev] --
17,774,913 UART: [fwproc] Wait for Commands...
17,777,285 UART: [fwproc] Recv command 0x46574c44
17,779,599 UART: [fwproc] Recv'd Img size: 114084 bytes
21,221,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,299,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,416,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,956,872 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,761,890 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,537,492 >>> mbox cmd response: failed
12,538,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,750 >>> mbox cmd response: failed
12,539,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,539,313 >>> mbox cmd response: failed
Initializing fuses
2,058,670 writing to cptra_bootfsm_go
11,089,201 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,281,482 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,737 UART: [kat] SHA2-256
892,675 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,477,005 UART: [fht] Storing FHT @ 0x50003400
1,479,994 UART: [idev] ++
1,480,162 UART: [idev] CDI.KEYID = 6
1,480,522 UART: [idev] SUBJECT.KEYID = 7
1,480,946 UART: [idev] UDS.KEYID = 0
1,481,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,964 UART: [idev] Erasing UDS.KEYID = 0
1,505,422 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,976 UART: [idev] --
1,515,167 UART: [ldev] ++
1,515,335 UART: [ldev] CDI.KEYID = 6
1,515,698 UART: [ldev] SUBJECT.KEYID = 5
1,516,124 UART: [ldev] AUTHORITY.KEYID = 7
1,516,587 UART: [ldev] FE.KEYID = 1
1,521,551 UART: [ldev] Erasing FE.KEYID = 1
1,546,892 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,714 UART: [ldev] --
1,586,149 UART: [fwproc] Waiting for Commands...
1,586,982 UART: [fwproc] Received command 0x46574c44
1,587,773 UART: [fwproc] Received Image of size 114084 bytes
1,636,262 UART: ROM Fatal Error: 0x000B0012
1,637,419 >>> mbox cmd response: failed
1,637,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,425 >>> mbox cmd response: failed
1,637,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,085 UART: [kat] SHA2-256
882,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,131 UART: [kat] ++
886,283 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,674 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,475,917 UART: [cold-reset] ++
1,476,257 UART: [fht] Storing FHT @ 0x50003400
1,478,838 UART: [idev] ++
1,479,006 UART: [idev] CDI.KEYID = 6
1,479,366 UART: [idev] SUBJECT.KEYID = 7
1,479,790 UART: [idev] UDS.KEYID = 0
1,480,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,840 UART: [idev] Erasing UDS.KEYID = 0
1,504,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,052 UART: [idev] --
1,514,111 UART: [ldev] ++
1,514,279 UART: [ldev] CDI.KEYID = 6
1,514,642 UART: [ldev] SUBJECT.KEYID = 5
1,515,068 UART: [ldev] AUTHORITY.KEYID = 7
1,515,531 UART: [ldev] FE.KEYID = 1
1,520,835 UART: [ldev] Erasing FE.KEYID = 1
1,546,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,834 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,754 UART: [fwproc] Received command 0x46574c44
1,586,545 UART: [fwproc] Received Image of size 114084 bytes
2,881,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,716 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,601 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,764 >>> mbox cmd response: failed
1,487,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,770 >>> mbox cmd response: failed
1,487,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,767 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,388 UART: [kat] SHA2-256
882,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,434 UART: [kat] ++
886,586 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,617 UART: [kat] SHA2-512-ACC
897,518 UART: [kat] ECC-384
903,103 UART: [kat] HMAC-384Kdf
907,679 UART: [kat] LMS
1,475,875 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,475 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,101 UART: [idev] --
1,515,088 UART: [ldev] ++
1,515,256 UART: [ldev] CDI.KEYID = 6
1,515,619 UART: [ldev] SUBJECT.KEYID = 5
1,516,045 UART: [ldev] AUTHORITY.KEYID = 7
1,516,508 UART: [ldev] FE.KEYID = 1
1,521,804 UART: [ldev] Erasing FE.KEYID = 1
1,546,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,361 UART: [ldev] --
1,586,802 UART: [fwproc] Waiting for Commands...
1,587,503 UART: [fwproc] Received command 0x46574c44
1,588,294 UART: [fwproc] Received Image of size 114084 bytes
1,634,643 UART: ROM Fatal Error: 0x000B0012
1,635,800 >>> mbox cmd response: failed
1,635,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,806 >>> mbox cmd response: failed
1,635,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,386 UART: [kat] SHA2-256
882,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,432 UART: [kat] ++
886,584 UART: [kat] sha1
890,710 UART: [kat] SHA2-256
892,648 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,462 UART: [cold-reset] ++
1,477,008 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,101 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,521,762 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,643 UART: [ldev] --
1,587,080 UART: [fwproc] Waiting for Commands...
1,587,771 UART: [fwproc] Received command 0x46574c44
1,588,562 UART: [fwproc] Received Image of size 114084 bytes
2,884,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,054 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,105 >>> mbox cmd response: failed
1,488,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,111 >>> mbox cmd response: failed
1,488,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,830 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,668 UART: [kat] SHA2-512-ACC
908,569 UART: [kat] ECC-384
918,020 UART: [kat] HMAC-384Kdf
922,456 UART: [kat] LMS
1,170,784 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,171,865 UART: [fht] FHT @ 0x50003400
1,174,422 UART: [idev] ++
1,174,590 UART: [idev] CDI.KEYID = 6
1,174,950 UART: [idev] SUBJECT.KEYID = 7
1,175,374 UART: [idev] UDS.KEYID = 0
1,175,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,344 UART: [idev] Erasing UDS.KEYID = 0
1,200,089 UART: [idev] Sha1 KeyId Algorithm
1,208,539 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,968 UART: [ldev] SUBJECT.KEYID = 5
1,210,394 UART: [ldev] AUTHORITY.KEYID = 7
1,210,857 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,471 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114084 bytes
1,331,091 UART: ROM Fatal Error: 0x000B0012
1,332,248 >>> mbox cmd response: failed
1,332,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,254 >>> mbox cmd response: failed
1,332,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,260 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,735 UART: [kat] SHA2-256
903,675 UART: [kat] SHA2-384
906,284 UART: [kat] SHA2-512-ACC
908,185 UART: [kat] ECC-384
917,476 UART: [kat] HMAC-384Kdf
921,950 UART: [kat] LMS
1,170,278 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,580 UART: [idev] ++
1,174,748 UART: [idev] CDI.KEYID = 6
1,175,108 UART: [idev] SUBJECT.KEYID = 7
1,175,532 UART: [idev] UDS.KEYID = 0
1,175,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,488 UART: [idev] Erasing UDS.KEYID = 0
1,200,777 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,143 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,420 UART: [fwproc] Recv command 0x46574c44
1,284,148 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,850 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,186,021 >>> mbox cmd response: failed
1,186,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,027 >>> mbox cmd response: failed
1,186,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,453 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
893,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,848 UART: [kat] ++
898,000 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,661 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,524 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,498 UART: [idev] --
1,211,544 UART: [ldev] ++
1,211,712 UART: [ldev] CDI.KEYID = 6
1,212,075 UART: [ldev] SUBJECT.KEYID = 5
1,212,501 UART: [ldev] AUTHORITY.KEYID = 7
1,212,964 UART: [ldev] FE.KEYID = 1
1,218,434 UART: [ldev] Erasing FE.KEYID = 1
1,244,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,842 UART: [ldev] --
1,284,197 UART: [fwproc] Wait for Commands...
1,284,977 UART: [fwproc] Recv command 0x46574c44
1,285,705 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,554 UART: ROM Fatal Error: 0x000B0012
1,333,711 >>> mbox cmd response: failed
1,333,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,717 >>> mbox cmd response: failed
1,333,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,348 UART: [kat] SHA2-256
904,288 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
918,875 UART: [kat] HMAC-384Kdf
923,685 UART: [kat] LMS
1,172,013 UART: [kat] --
1,173,014 UART: [cold-reset] ++
1,173,496 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,097 UART: [idev] Erasing UDS.KEYID = 0
1,201,464 UART: [idev] Sha1 KeyId Algorithm
1,210,016 UART: [idev] --
1,211,056 UART: [ldev] ++
1,211,224 UART: [ldev] CDI.KEYID = 6
1,211,587 UART: [ldev] SUBJECT.KEYID = 5
1,212,013 UART: [ldev] AUTHORITY.KEYID = 7
1,212,476 UART: [ldev] FE.KEYID = 1
1,217,908 UART: [ldev] Erasing FE.KEYID = 1
1,244,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,815 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,262 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,715 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,186,622 >>> mbox cmd response: failed
1,186,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,628 >>> mbox cmd response: failed
1,186,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,896 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,916 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,353 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,679 UART: [idev] --
1,208,766 UART: [ldev] ++
1,208,934 UART: [ldev] CDI.KEYID = 6
1,209,298 UART: [ldev] SUBJECT.KEYID = 5
1,209,725 UART: [ldev] AUTHORITY.KEYID = 7
1,210,188 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,354 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,877 UART: ROM Fatal Error: 0x000B0012
1,330,034 >>> mbox cmd response: failed
1,330,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,040 >>> mbox cmd response: failed
1,330,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,174,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,628 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,000 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,990 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,111 >>> mbox cmd response: failed
1,183,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,117 >>> mbox cmd response: failed
1,183,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,854 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,552 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,174,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,437 UART: [ldev] --
1,281,725 UART: [fwproc] Wait for Commands...
1,282,368 UART: [fwproc] Recv command 0x46574c44
1,283,101 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,634 UART: ROM Fatal Error: 0x000B0012
1,330,791 >>> mbox cmd response: failed
1,330,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,797 >>> mbox cmd response: failed
1,330,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,082 UART: [state] WD Timer not started. Device not locked for debugging
88,391 UART: [kat] SHA2-256
891,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,070 UART: [kat] ++
896,222 UART: [kat] sha1
900,536 UART: [kat] SHA2-256
902,476 UART: [kat] SHA2-384
905,341 UART: [kat] SHA2-512-ACC
907,242 UART: [kat] ECC-384
916,871 UART: [kat] HMAC-384Kdf
921,623 UART: [kat] LMS
1,169,935 UART: [kat] --
1,170,750 UART: [cold-reset] ++
1,171,266 UART: [fht] FHT @ 0x50003400
1,173,864 UART: [idev] ++
1,174,032 UART: [idev] CDI.KEYID = 6
1,174,393 UART: [idev] SUBJECT.KEYID = 7
1,174,818 UART: [idev] UDS.KEYID = 0
1,175,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,100 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,163 UART: [ldev] ++
1,210,331 UART: [ldev] CDI.KEYID = 6
1,210,695 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,647 UART: [ldev] --
1,282,999 UART: [fwproc] Wait for Commands...
1,283,748 UART: [fwproc] Recv command 0x46574c44
1,284,481 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,351 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,660 >>> mbox cmd response: failed
1,182,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,666 >>> mbox cmd response: failed
1,182,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,637 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,068 UART:
192,435 UART: Running Caliptra ROM ...
193,640 UART:
193,803 UART: [state] CFI Enabled
262,276 UART: [state] LifecycleState = Unprovisioned
263,979 UART: [state] DebugLocked = No
266,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,007 UART: [kat] SHA2-256
441,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,229 UART: [kat] ++
452,708 UART: [kat] sha1
464,291 UART: [kat] SHA2-256
466,978 UART: [kat] SHA2-384
472,414 UART: [kat] SHA2-512-ACC
474,748 UART: [kat] ECC-384
2,767,717 UART: [kat] HMAC-384Kdf
2,800,236 UART: [kat] LMS
3,990,530 UART: [kat] --
3,994,288 UART: [cold-reset] ++
3,996,497 UART: [fht] Storing FHT @ 0x50003400
4,006,956 UART: [idev] ++
4,007,525 UART: [idev] CDI.KEYID = 6
4,008,493 UART: [idev] SUBJECT.KEYID = 7
4,009,714 UART: [idev] UDS.KEYID = 0
4,012,333 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,709 UART: [idev] Erasing UDS.KEYID = 0
7,347,959 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,998 UART: [idev] --
7,375,001 UART: [ldev] ++
7,375,582 UART: [ldev] CDI.KEYID = 6
7,376,474 UART: [ldev] SUBJECT.KEYID = 5
7,377,746 UART: [ldev] AUTHORITY.KEYID = 7
7,378,982 UART: [ldev] FE.KEYID = 1
7,423,209 UART: [ldev] Erasing FE.KEYID = 1
10,757,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,986 UART: [ldev] --
13,137,922 UART: [fwproc] Waiting for Commands...
13,139,799 UART: [fwproc] Received command 0x46574c44
13,141,985 UART: [fwproc] Received Image of size 113760 bytes
15,839,963 UART: ROM Fatal Error: 0x000B0010
15,843,424 >>> mbox cmd response: failed
15,843,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,174 >>> mbox cmd response: failed
15,844,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,844,738 >>> mbox cmd response: failed
Initializing fuses
2,054,140 writing to cptra_bootfsm_go
2,243,450 UART:
2,243,803 UART: Running Caliptra ROM ...
2,244,942 UART:
2,245,111 UART: [state] CFI Enabled
2,316,531 UART: [state] LifecycleState = Unprovisioned
2,318,471 UART: [state] DebugLocked = No
2,320,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,965 UART: [kat] SHA2-256
2,495,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,142 UART: [kat] ++
2,506,634 UART: [kat] sha1
2,518,772 UART: [kat] SHA2-256
2,521,476 UART: [kat] SHA2-384
2,528,410 UART: [kat] SHA2-512-ACC
2,530,817 UART: [kat] ECC-384
4,820,949 UART: [kat] HMAC-384Kdf
4,854,035 UART: [kat] LMS
6,044,340 UART: [kat] --
6,048,287 UART: [cold-reset] ++
6,049,842 UART: [fht] Storing FHT @ 0x50003400
6,062,028 UART: [idev] ++
6,062,596 UART: [idev] CDI.KEYID = 6
6,063,618 UART: [idev] SUBJECT.KEYID = 7
6,064,780 UART: [idev] UDS.KEYID = 0
6,067,084 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,210,278 UART: [idev] Erasing UDS.KEYID = 0
9,399,354 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,803 UART: [idev] --
9,423,691 UART: [ldev] ++
9,424,279 UART: [ldev] CDI.KEYID = 6
9,425,222 UART: [ldev] SUBJECT.KEYID = 5
9,426,496 UART: [ldev] AUTHORITY.KEYID = 7
9,427,652 UART: [ldev] FE.KEYID = 1
9,475,991 UART: [ldev] Erasing FE.KEYID = 1
12,810,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,121,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,165,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,184,144 UART: [ldev] --
15,188,110 UART: [fwproc] Waiting for Commands...
15,191,395 UART: [fwproc] Received command 0x46574c44
15,193,583 UART: [fwproc] Received Image of size 113760 bytes
19,242,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,322,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,391,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,707,101 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,806,141 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,568,582 >>> mbox cmd response: failed
15,569,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,569,537 >>> mbox cmd response: failed
15,569,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,103 >>> mbox cmd response: failed
Initializing fuses
2,059,319 writing to cptra_bootfsm_go
5,846,654 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,883,868 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,477 UART:
192,843 UART: Running Caliptra ROM ...
194,041 UART:
603,640 UART: [state] CFI Enabled
620,004 UART: [state] LifecycleState = Unprovisioned
621,946 UART: [state] DebugLocked = No
623,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,180 UART: [kat] SHA2-256
797,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,448 UART: [kat] ++
808,894 UART: [kat] sha1
820,699 UART: [kat] SHA2-256
823,422 UART: [kat] SHA2-384
827,845 UART: [kat] SHA2-512-ACC
830,238 UART: [kat] ECC-384
3,112,663 UART: [kat] HMAC-384Kdf
3,126,196 UART: [kat] LMS
4,316,278 UART: [kat] --
4,321,055 UART: [cold-reset] ++
4,322,585 UART: [fht] Storing FHT @ 0x50003400
4,333,853 UART: [idev] ++
4,334,460 UART: [idev] CDI.KEYID = 6
4,335,390 UART: [idev] SUBJECT.KEYID = 7
4,336,608 UART: [idev] UDS.KEYID = 0
4,339,263 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,217 UART: [idev] Erasing UDS.KEYID = 0
7,624,948 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,546 UART: [idev] --
7,650,319 UART: [ldev] ++
7,650,889 UART: [ldev] CDI.KEYID = 6
7,651,859 UART: [ldev] SUBJECT.KEYID = 5
7,653,074 UART: [ldev] AUTHORITY.KEYID = 7
7,654,311 UART: [ldev] FE.KEYID = 1
7,667,604 UART: [ldev] Erasing FE.KEYID = 1
10,957,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,574 UART: [ldev] --
13,314,909 UART: [fwproc] Waiting for Commands...
13,317,226 UART: [fwproc] Received command 0x46574c44
13,319,413 UART: [fwproc] Received Image of size 113760 bytes
16,010,149 UART: ROM Fatal Error: 0x000B0010
16,013,640 >>> mbox cmd response: failed
16,014,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,014,393 >>> mbox cmd response: failed
16,014,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,014,961 >>> mbox cmd response: failed
Initializing fuses
2,054,839 writing to cptra_bootfsm_go
2,244,167 UART:
2,244,535 UART: Running Caliptra ROM ...
2,245,673 UART:
4,447,925 UART: [state] CFI Enabled
4,460,661 UART: [state] LifecycleState = Unprovisioned
4,462,628 UART: [state] DebugLocked = No
4,465,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,470,867 UART: [kat] SHA2-256
4,640,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,651,176 UART: [kat] ++
4,651,723 UART: [kat] sha1
4,662,133 UART: [kat] SHA2-256
4,664,821 UART: [kat] SHA2-384
4,671,135 UART: [kat] SHA2-512-ACC
4,673,510 UART: [kat] ECC-384
6,956,020 UART: [kat] HMAC-384Kdf
6,967,332 UART: [kat] LMS
8,157,409 UART: [kat] --
8,163,082 UART: [cold-reset] ++
8,164,371 UART: [fht] Storing FHT @ 0x50003400
8,176,719 UART: [idev] ++
8,177,343 UART: [idev] CDI.KEYID = 6
8,178,252 UART: [idev] SUBJECT.KEYID = 7
8,179,462 UART: [idev] UDS.KEYID = 0
8,181,823 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,325,189 UART: [idev] Erasing UDS.KEYID = 0
11,467,387 UART: [idev] Using Sha1 for KeyId Algorithm
11,489,429 UART: [idev] --
11,493,422 UART: [ldev] ++
11,493,991 UART: [ldev] CDI.KEYID = 6
11,495,026 UART: [ldev] SUBJECT.KEYID = 5
11,496,235 UART: [ldev] AUTHORITY.KEYID = 7
11,497,415 UART: [ldev] FE.KEYID = 1
11,510,602 UART: [ldev] Erasing FE.KEYID = 1
14,797,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,088,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,103,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,118,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,132,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,151,304 UART: [ldev] --
17,155,327 UART: [fwproc] Waiting for Commands...
17,157,154 UART: [fwproc] Received command 0x46574c44
17,159,340 UART: [fwproc] Received Image of size 113760 bytes
21,213,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,296,529 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,365,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,682,300 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
4,128,460 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,750,782 >>> mbox cmd response: failed
15,751,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,775 >>> mbox cmd response: failed
15,752,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,752,344 >>> mbox cmd response: failed
Initializing fuses
2,054,730 writing to cptra_bootfsm_go
8,234,415 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,182,175 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,382 UART:
192,728 UART: Running Caliptra ROM ...
193,964 UART:
194,120 UART: [state] CFI Enabled
262,910 UART: [state] LifecycleState = Unprovisioned
264,829 UART: [state] DebugLocked = No
267,671 UART: [state] WD Timer not started. Device not locked for debugging
270,526 UART: [kat] SHA2-256
449,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,189 UART: [kat] ++
461,635 UART: [kat] sha1
472,459 UART: [kat] SHA2-256
475,508 UART: [kat] SHA2-384
481,545 UART: [kat] SHA2-512-ACC
484,482 UART: [kat] ECC-384
2,944,527 UART: [kat] HMAC-384Kdf
2,968,136 UART: [kat] LMS
3,497,589 UART: [kat] --
3,501,775 UART: [cold-reset] ++
3,503,773 UART: [fht] FHT @ 0x50003400
3,515,558 UART: [idev] ++
3,516,136 UART: [idev] CDI.KEYID = 6
3,517,060 UART: [idev] SUBJECT.KEYID = 7
3,518,229 UART: [idev] UDS.KEYID = 0
3,520,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,375 UART: [idev] Erasing UDS.KEYID = 0
6,023,247 UART: [idev] Sha1 KeyId Algorithm
6,046,485 UART: [idev] --
6,050,105 UART: [ldev] ++
6,050,676 UART: [ldev] CDI.KEYID = 6
6,051,591 UART: [ldev] SUBJECT.KEYID = 5
6,052,813 UART: [ldev] AUTHORITY.KEYID = 7
6,054,070 UART: [ldev] FE.KEYID = 1
6,098,385 UART: [ldev] Erasing FE.KEYID = 1
8,601,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,641 UART: [ldev] --
10,412,422 UART: [fwproc] Wait for Commands...
10,414,791 UART: [fwproc] Recv command 0x46574c44
10,416,886 UART: [fwproc] Recv'd Img size: 114084 bytes
12,461,349 UART: ROM Fatal Error: 0x000B0010
12,464,464 >>> mbox cmd response: failed
12,464,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,465,320 >>> mbox cmd response: failed
12,465,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,465,911 >>> mbox cmd response: failed
Initializing fuses
2,053,587 writing to cptra_bootfsm_go
2,242,895 UART:
2,243,244 UART: Running Caliptra ROM ...
2,244,289 UART:
2,244,441 UART: [state] CFI Enabled
2,299,444 UART: [state] LifecycleState = Unprovisioned
2,301,293 UART: [state] DebugLocked = No
2,303,571 UART: [state] WD Timer not started. Device not locked for debugging
2,307,692 UART: [kat] SHA2-256
2,486,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,396 UART: [kat] ++
2,498,856 UART: [kat] sha1
2,509,922 UART: [kat] SHA2-256
2,512,948 UART: [kat] SHA2-384
2,518,620 UART: [kat] SHA2-512-ACC
2,521,561 UART: [kat] ECC-384
4,985,800 UART: [kat] HMAC-384Kdf
5,007,500 UART: [kat] LMS
5,536,965 UART: [kat] --
5,542,710 UART: [cold-reset] ++
5,544,215 UART: [fht] FHT @ 0x50003400
5,555,841 UART: [idev] ++
5,556,411 UART: [idev] CDI.KEYID = 6
5,557,324 UART: [idev] SUBJECT.KEYID = 7
5,558,538 UART: [idev] UDS.KEYID = 0
5,560,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,704,345 UART: [idev] Erasing UDS.KEYID = 0
8,062,636 UART: [idev] Sha1 KeyId Algorithm
8,085,664 UART: [idev] --
8,089,968 UART: [ldev] ++
8,090,562 UART: [ldev] CDI.KEYID = 6
8,091,478 UART: [ldev] SUBJECT.KEYID = 5
8,092,643 UART: [ldev] AUTHORITY.KEYID = 7
8,093,880 UART: [ldev] FE.KEYID = 1
8,135,802 UART: [ldev] Erasing FE.KEYID = 1
10,637,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,355,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,371,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,387,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,402,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,840 UART: [ldev] --
12,428,243 UART: [fwproc] Wait for Commands...
12,430,613 UART: [fwproc] Recv command 0x46574c44
12,432,708 UART: [fwproc] Recv'd Img size: 114084 bytes
15,831,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,900,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,969,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,286,294 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,378,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,247,733 >>> mbox cmd response: failed
12,248,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,248,680 >>> mbox cmd response: failed
12,249,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,249,305 >>> mbox cmd response: failed
Initializing fuses
2,053,317 writing to cptra_bootfsm_go
5,402,844 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,090,314 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,615 UART:
193,003 UART: Running Caliptra ROM ...
194,214 UART:
603,517 UART: [state] CFI Enabled
617,882 UART: [state] LifecycleState = Unprovisioned
619,757 UART: [state] DebugLocked = No
621,321 UART: [state] WD Timer not started. Device not locked for debugging
624,812 UART: [kat] SHA2-256
803,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,502 UART: [kat] ++
815,953 UART: [kat] sha1
826,661 UART: [kat] SHA2-256
829,701 UART: [kat] SHA2-384
836,979 UART: [kat] SHA2-512-ACC
839,966 UART: [kat] ECC-384
3,281,646 UART: [kat] HMAC-384Kdf
3,293,436 UART: [kat] LMS
3,822,970 UART: [kat] --
3,825,628 UART: [cold-reset] ++
3,827,078 UART: [fht] FHT @ 0x50003400
3,838,222 UART: [idev] ++
3,838,793 UART: [idev] CDI.KEYID = 6
3,839,709 UART: [idev] SUBJECT.KEYID = 7
3,840,871 UART: [idev] UDS.KEYID = 0
3,843,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,986,791 UART: [idev] Erasing UDS.KEYID = 0
6,309,674 UART: [idev] Sha1 KeyId Algorithm
6,332,320 UART: [idev] --
6,336,043 UART: [ldev] ++
6,336,617 UART: [ldev] CDI.KEYID = 6
6,337,526 UART: [ldev] SUBJECT.KEYID = 5
6,338,683 UART: [ldev] AUTHORITY.KEYID = 7
6,340,073 UART: [ldev] FE.KEYID = 1
6,351,056 UART: [ldev] Erasing FE.KEYID = 1
8,831,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,716 UART: [ldev] --
10,619,956 UART: [fwproc] Wait for Commands...
10,621,997 UART: [fwproc] Recv command 0x46574c44
10,624,092 UART: [fwproc] Recv'd Img size: 114084 bytes
12,670,210 UART: ROM Fatal Error: 0x000B0010
12,673,332 >>> mbox cmd response: failed
12,673,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,985 >>> mbox cmd response: failed
12,674,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,674,538 >>> mbox cmd response: failed
Initializing fuses
2,052,861 writing to cptra_bootfsm_go
2,242,189 UART:
2,242,544 UART: Running Caliptra ROM ...
2,243,590 UART:
7,779,083 UART: [state] CFI Enabled
7,794,405 UART: [state] LifecycleState = Unprovisioned
7,796,278 UART: [state] DebugLocked = No
7,798,666 UART: [state] WD Timer not started. Device not locked for debugging
7,801,977 UART: [kat] SHA2-256
7,981,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,992,654 UART: [kat] ++
7,993,199 UART: [kat] sha1
8,004,743 UART: [kat] SHA2-256
8,007,732 UART: [kat] SHA2-384
8,013,675 UART: [kat] SHA2-512-ACC
8,016,624 UART: [kat] ECC-384
10,457,786 UART: [kat] HMAC-384Kdf
10,470,865 UART: [kat] LMS
11,000,384 UART: [kat] --
11,004,921 UART: [cold-reset] ++
11,006,201 UART: [fht] FHT @ 0x50003400
11,017,355 UART: [idev] ++
11,017,928 UART: [idev] CDI.KEYID = 6
11,018,865 UART: [idev] SUBJECT.KEYID = 7
11,020,079 UART: [idev] UDS.KEYID = 0
11,022,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,165,881 UART: [idev] Erasing UDS.KEYID = 0
13,494,113 UART: [idev] Sha1 KeyId Algorithm
13,516,535 UART: [idev] --
13,519,929 UART: [ldev] ++
13,520,512 UART: [ldev] CDI.KEYID = 6
13,521,398 UART: [ldev] SUBJECT.KEYID = 5
13,522,612 UART: [ldev] AUTHORITY.KEYID = 7
13,523,761 UART: [ldev] FE.KEYID = 1
13,535,996 UART: [ldev] Erasing FE.KEYID = 1
16,007,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,726,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,742,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,758,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,774,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,795,620 UART: [ldev] --
17,800,347 UART: [fwproc] Wait for Commands...
17,803,579 UART: [fwproc] Recv command 0x46574c44
17,805,676 UART: [fwproc] Recv'd Img size: 114084 bytes
21,198,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,268,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,337,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,653,860 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
3,695,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,436,203 >>> mbox cmd response: failed
12,436,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,088 >>> mbox cmd response: failed
12,437,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,659 >>> mbox cmd response: failed
Initializing fuses
2,053,732 writing to cptra_bootfsm_go
11,127,008 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,690,620 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,195 UART:
192,557 UART: Running Caliptra ROM ...
193,663 UART:
193,808 UART: [state] CFI Enabled
262,753 UART: [state] LifecycleState = Unprovisioned
265,165 UART: [state] DebugLocked = No
266,592 UART: [state] WD Timer not started. Device not locked for debugging
271,579 UART: [kat] SHA2-256
461,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,235 UART: [kat] ++
472,693 UART: [kat] sha1
483,193 UART: [kat] SHA2-256
486,209 UART: [kat] SHA2-384
493,436 UART: [kat] SHA2-512-ACC
496,051 UART: [kat] ECC-384
2,959,299 UART: [kat] HMAC-384Kdf
2,982,431 UART: [kat] LMS
3,514,166 UART: [kat] --
3,518,925 UART: [cold-reset] ++
3,521,072 UART: [fht] FHT @ 0x50003400
3,531,681 UART: [idev] ++
3,532,368 UART: [idev] CDI.KEYID = 6
3,533,269 UART: [idev] SUBJECT.KEYID = 7
3,534,486 UART: [idev] UDS.KEYID = 0
3,537,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,681,256 UART: [idev] Erasing UDS.KEYID = 0
6,038,502 UART: [idev] Sha1 KeyId Algorithm
6,060,575 UART: [idev] --
6,064,354 UART: [ldev] ++
6,065,217 UART: [ldev] CDI.KEYID = 6
6,066,163 UART: [ldev] SUBJECT.KEYID = 5
6,067,286 UART: [ldev] AUTHORITY.KEYID = 7
6,068,472 UART: [ldev] FE.KEYID = 1
6,111,601 UART: [ldev] Erasing FE.KEYID = 1
8,617,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,212 UART: [ldev] --
10,426,373 UART: [fwproc] Wait for Commands...
10,429,397 UART: [fwproc] Recv command 0x46574c44
10,431,662 UART: [fwproc] Recv'd Img size: 114084 bytes
12,501,453 UART: ROM Fatal Error: 0x000B0010
12,505,083 >>> mbox cmd response: failed
12,505,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,884 >>> mbox cmd response: failed
12,506,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,399 >>> mbox cmd response: failed
Initializing fuses
2,055,506 writing to cptra_bootfsm_go
2,244,875 UART:
2,245,245 UART: Running Caliptra ROM ...
2,246,387 UART:
2,246,561 UART: [state] CFI Enabled
2,314,814 UART: [state] LifecycleState = Unprovisioned
2,317,189 UART: [state] DebugLocked = No
2,319,014 UART: [state] WD Timer not started. Device not locked for debugging
2,323,384 UART: [kat] SHA2-256
2,513,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,020 UART: [kat] ++
2,524,489 UART: [kat] sha1
2,534,840 UART: [kat] SHA2-256
2,537,871 UART: [kat] SHA2-384
2,544,087 UART: [kat] SHA2-512-ACC
2,546,664 UART: [kat] ECC-384
5,001,371 UART: [kat] HMAC-384Kdf
5,026,141 UART: [kat] LMS
5,557,933 UART: [kat] --
5,562,674 UART: [cold-reset] ++
5,564,840 UART: [fht] FHT @ 0x50003400
5,575,511 UART: [idev] ++
5,576,199 UART: [idev] CDI.KEYID = 6
5,577,184 UART: [idev] SUBJECT.KEYID = 7
5,578,343 UART: [idev] UDS.KEYID = 0
5,580,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,611 UART: [idev] Erasing UDS.KEYID = 0
8,085,503 UART: [idev] Sha1 KeyId Algorithm
8,109,285 UART: [idev] --
8,113,501 UART: [ldev] ++
8,114,189 UART: [ldev] CDI.KEYID = 6
8,115,100 UART: [ldev] SUBJECT.KEYID = 5
8,116,260 UART: [ldev] AUTHORITY.KEYID = 7
8,117,494 UART: [ldev] FE.KEYID = 1
8,155,804 UART: [ldev] Erasing FE.KEYID = 1
10,662,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,452 UART: [ldev] --
12,470,262 UART: [fwproc] Wait for Commands...
12,473,279 UART: [fwproc] Recv command 0x46574c44
12,475,601 UART: [fwproc] Recv'd Img size: 114084 bytes
15,925,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,117,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,658,576 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,441,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,271,631 >>> mbox cmd response: failed
12,272,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,272,512 >>> mbox cmd response: failed
12,272,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,273,141 >>> mbox cmd response: failed
Initializing fuses
2,055,941 writing to cptra_bootfsm_go
5,476,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,771,620 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,376 UART:
192,724 UART: Running Caliptra ROM ...
193,926 UART:
603,446 UART: [state] CFI Enabled
618,072 UART: [state] LifecycleState = Unprovisioned
620,481 UART: [state] DebugLocked = No
622,935 UART: [state] WD Timer not started. Device not locked for debugging
626,999 UART: [kat] SHA2-256
816,870 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,642 UART: [kat] ++
828,148 UART: [kat] sha1
839,403 UART: [kat] SHA2-256
842,411 UART: [kat] SHA2-384
848,445 UART: [kat] SHA2-512-ACC
851,051 UART: [kat] ECC-384
3,290,762 UART: [kat] HMAC-384Kdf
3,303,753 UART: [kat] LMS
3,835,593 UART: [kat] --
3,840,183 UART: [cold-reset] ++
3,842,656 UART: [fht] FHT @ 0x50003400
3,852,887 UART: [idev] ++
3,853,564 UART: [idev] CDI.KEYID = 6
3,854,602 UART: [idev] SUBJECT.KEYID = 7
3,855,762 UART: [idev] UDS.KEYID = 0
3,858,253 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,731 UART: [idev] Erasing UDS.KEYID = 0
6,335,610 UART: [idev] Sha1 KeyId Algorithm
6,358,303 UART: [idev] --
6,364,680 UART: [ldev] ++
6,365,362 UART: [ldev] CDI.KEYID = 6
6,366,273 UART: [ldev] SUBJECT.KEYID = 5
6,367,435 UART: [ldev] AUTHORITY.KEYID = 7
6,368,666 UART: [ldev] FE.KEYID = 1
6,378,989 UART: [ldev] Erasing FE.KEYID = 1
8,859,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,528 UART: [ldev] --
10,649,307 UART: [fwproc] Wait for Commands...
10,651,022 UART: [fwproc] Recv command 0x46574c44
10,653,335 UART: [fwproc] Recv'd Img size: 114084 bytes
12,729,431 UART: ROM Fatal Error: 0x000B0010
12,733,090 >>> mbox cmd response: failed
12,733,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,727 >>> mbox cmd response: failed
12,734,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,411 >>> mbox cmd response: failed
Initializing fuses
2,063,116 writing to cptra_bootfsm_go
2,252,386 UART:
2,252,759 UART: Running Caliptra ROM ...
2,253,807 UART:
7,718,299 UART: [state] CFI Enabled
7,731,111 UART: [state] LifecycleState = Unprovisioned
7,733,485 UART: [state] DebugLocked = No
7,735,041 UART: [state] WD Timer not started. Device not locked for debugging
7,739,394 UART: [kat] SHA2-256
7,929,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,940,028 UART: [kat] ++
7,940,636 UART: [kat] sha1
7,952,192 UART: [kat] SHA2-256
7,955,221 UART: [kat] SHA2-384
7,961,970 UART: [kat] SHA2-512-ACC
7,964,530 UART: [kat] ECC-384
10,403,350 UART: [kat] HMAC-384Kdf
10,416,396 UART: [kat] LMS
10,948,200 UART: [kat] --
10,953,455 UART: [cold-reset] ++
10,955,063 UART: [fht] FHT @ 0x50003400
10,966,156 UART: [idev] ++
10,966,830 UART: [idev] CDI.KEYID = 6
10,967,845 UART: [idev] SUBJECT.KEYID = 7
10,969,008 UART: [idev] UDS.KEYID = 0
10,971,307 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,114,696 UART: [idev] Erasing UDS.KEYID = 0
13,443,943 UART: [idev] Sha1 KeyId Algorithm
13,465,605 UART: [idev] --
13,471,705 UART: [ldev] ++
13,472,385 UART: [ldev] CDI.KEYID = 6
13,473,292 UART: [ldev] SUBJECT.KEYID = 5
13,474,506 UART: [ldev] AUTHORITY.KEYID = 7
13,475,735 UART: [ldev] FE.KEYID = 1
13,486,732 UART: [ldev] Erasing FE.KEYID = 1
15,966,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,686,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,702,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,717,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,753,081 UART: [ldev] --
17,758,618 UART: [fwproc] Wait for Commands...
17,760,395 UART: [fwproc] Recv command 0x46574c44
17,762,666 UART: [fwproc] Recv'd Img size: 114084 bytes
21,202,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,274,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,390,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,930,981 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,754,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,518,035 >>> mbox cmd response: failed
12,518,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,518,908 >>> mbox cmd response: failed
12,519,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,483 >>> mbox cmd response: failed
Initializing fuses
2,060,579 writing to cptra_bootfsm_go
11,101,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,305,234 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,638 UART: [kat] SHA2-512-ACC
897,539 UART: [kat] ECC-384
903,392 UART: [kat] HMAC-384Kdf
907,802 UART: [kat] LMS
1,475,998 UART: [kat] --
1,477,155 UART: [cold-reset] ++
1,477,627 UART: [fht] Storing FHT @ 0x50003400
1,480,354 UART: [idev] ++
1,480,522 UART: [idev] CDI.KEYID = 6
1,480,882 UART: [idev] SUBJECT.KEYID = 7
1,481,306 UART: [idev] UDS.KEYID = 0
1,481,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,134 UART: [idev] Erasing UDS.KEYID = 0
1,505,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,284 UART: [idev] --
1,515,357 UART: [ldev] ++
1,515,525 UART: [ldev] CDI.KEYID = 6
1,515,888 UART: [ldev] SUBJECT.KEYID = 5
1,516,314 UART: [ldev] AUTHORITY.KEYID = 7
1,516,777 UART: [ldev] FE.KEYID = 1
1,521,825 UART: [ldev] Erasing FE.KEYID = 1
1,547,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,868 UART: [fwproc] Received command 0x46574c44
1,587,659 UART: [fwproc] Received Image of size 114084 bytes
1,631,104 UART: ROM Fatal Error: 0x000B0010
1,632,261 >>> mbox cmd response: failed
1,632,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,267 >>> mbox cmd response: failed
1,632,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,586 UART: [state] LifecycleState = Unprovisioned
86,241 UART: [state] DebugLocked = No
86,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,391 UART: [kat] SHA2-256
882,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,437 UART: [kat] ++
886,589 UART: [kat] sha1
890,985 UART: [kat] SHA2-256
892,923 UART: [kat] SHA2-384
895,562 UART: [kat] SHA2-512-ACC
897,463 UART: [kat] ECC-384
902,930 UART: [kat] HMAC-384Kdf
907,674 UART: [kat] LMS
1,475,870 UART: [kat] --
1,476,685 UART: [cold-reset] ++
1,477,225 UART: [fht] Storing FHT @ 0x50003400
1,480,094 UART: [idev] ++
1,480,262 UART: [idev] CDI.KEYID = 6
1,480,622 UART: [idev] SUBJECT.KEYID = 7
1,481,046 UART: [idev] UDS.KEYID = 0
1,481,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,950 UART: [idev] Erasing UDS.KEYID = 0
1,505,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,488 UART: [idev] --
1,515,385 UART: [ldev] ++
1,515,553 UART: [ldev] CDI.KEYID = 6
1,515,916 UART: [ldev] SUBJECT.KEYID = 5
1,516,342 UART: [ldev] AUTHORITY.KEYID = 7
1,516,805 UART: [ldev] FE.KEYID = 1
1,521,899 UART: [ldev] Erasing FE.KEYID = 1
1,547,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,262 UART: [ldev] --
1,586,565 UART: [fwproc] Waiting for Commands...
1,587,416 UART: [fwproc] Received command 0x46574c44
1,588,207 UART: [fwproc] Received Image of size 114084 bytes
2,882,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,665 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,017 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,484,174 >>> mbox cmd response: failed
1,484,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,180 >>> mbox cmd response: failed
1,484,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,615 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,280 UART: [kat] SHA2-256
882,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,326 UART: [kat] ++
886,478 UART: [kat] sha1
890,744 UART: [kat] SHA2-256
892,682 UART: [kat] SHA2-384
895,633 UART: [kat] SHA2-512-ACC
897,534 UART: [kat] ECC-384
903,407 UART: [kat] HMAC-384Kdf
908,049 UART: [kat] LMS
1,476,245 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,212 UART: [fht] Storing FHT @ 0x50003400
1,479,933 UART: [idev] ++
1,480,101 UART: [idev] CDI.KEYID = 6
1,480,461 UART: [idev] SUBJECT.KEYID = 7
1,480,885 UART: [idev] UDS.KEYID = 0
1,481,230 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,891 UART: [idev] Erasing UDS.KEYID = 0
1,505,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,099 UART: [idev] --
1,515,084 UART: [ldev] ++
1,515,252 UART: [ldev] CDI.KEYID = 6
1,515,615 UART: [ldev] SUBJECT.KEYID = 5
1,516,041 UART: [ldev] AUTHORITY.KEYID = 7
1,516,504 UART: [ldev] FE.KEYID = 1
1,521,650 UART: [ldev] Erasing FE.KEYID = 1
1,547,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,163 UART: [ldev] --
1,586,636 UART: [fwproc] Waiting for Commands...
1,587,417 UART: [fwproc] Received command 0x46574c44
1,588,208 UART: [fwproc] Received Image of size 114084 bytes
1,630,575 UART: ROM Fatal Error: 0x000B0010
1,631,732 >>> mbox cmd response: failed
1,631,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,738 >>> mbox cmd response: failed
1,631,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,744 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,333 UART: [kat] SHA2-512-ACC
897,234 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,183 UART: [kat] LMS
1,475,379 UART: [kat] --
1,476,206 UART: [cold-reset] ++
1,476,548 UART: [fht] Storing FHT @ 0x50003400
1,479,343 UART: [idev] ++
1,479,511 UART: [idev] CDI.KEYID = 6
1,479,871 UART: [idev] SUBJECT.KEYID = 7
1,480,295 UART: [idev] UDS.KEYID = 0
1,480,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,171 UART: [idev] Erasing UDS.KEYID = 0
1,505,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,647 UART: [idev] --
1,514,604 UART: [ldev] ++
1,514,772 UART: [ldev] CDI.KEYID = 6
1,515,135 UART: [ldev] SUBJECT.KEYID = 5
1,515,561 UART: [ldev] AUTHORITY.KEYID = 7
1,516,024 UART: [ldev] FE.KEYID = 1
1,521,200 UART: [ldev] Erasing FE.KEYID = 1
1,546,371 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,625 UART: [ldev] --
1,585,906 UART: [fwproc] Waiting for Commands...
1,586,729 UART: [fwproc] Received command 0x46574c44
1,587,520 UART: [fwproc] Received Image of size 114084 bytes
2,882,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,364 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,484,461 >>> mbox cmd response: failed
1,484,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,467 >>> mbox cmd response: failed
1,484,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,696 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,834 UART: [kat] SHA2-512-ACC
908,735 UART: [kat] ECC-384
918,814 UART: [kat] HMAC-384Kdf
923,474 UART: [kat] LMS
1,171,802 UART: [kat] --
1,172,933 UART: [cold-reset] ++
1,173,397 UART: [fht] FHT @ 0x50003400
1,176,244 UART: [idev] ++
1,176,412 UART: [idev] CDI.KEYID = 6
1,176,772 UART: [idev] SUBJECT.KEYID = 7
1,177,196 UART: [idev] UDS.KEYID = 0
1,177,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,728 UART: [idev] Erasing UDS.KEYID = 0
1,201,627 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,501 UART: [ldev] ++
1,211,669 UART: [ldev] CDI.KEYID = 6
1,212,032 UART: [ldev] SUBJECT.KEYID = 5
1,212,458 UART: [ldev] AUTHORITY.KEYID = 7
1,212,921 UART: [ldev] FE.KEYID = 1
1,218,081 UART: [ldev] Erasing FE.KEYID = 1
1,244,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,007 UART: [ldev] --
1,283,428 UART: [fwproc] Wait for Commands...
1,284,080 UART: [fwproc] Recv command 0x46574c44
1,284,808 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,145 UART: ROM Fatal Error: 0x000B0010
1,329,302 >>> mbox cmd response: failed
1,329,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,308 >>> mbox cmd response: failed
1,329,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,136 UART: [kat] SHA2-512-ACC
908,037 UART: [kat] ECC-384
917,990 UART: [kat] HMAC-384Kdf
922,662 UART: [kat] LMS
1,170,990 UART: [kat] --
1,172,061 UART: [cold-reset] ++
1,172,565 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,201,281 UART: [idev] Sha1 KeyId Algorithm
1,209,757 UART: [idev] --
1,210,755 UART: [ldev] ++
1,210,923 UART: [ldev] CDI.KEYID = 6
1,211,286 UART: [ldev] SUBJECT.KEYID = 5
1,211,712 UART: [ldev] AUTHORITY.KEYID = 7
1,212,175 UART: [ldev] FE.KEYID = 1
1,217,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,563 UART: [ldev] --
1,283,014 UART: [fwproc] Wait for Commands...
1,283,618 UART: [fwproc] Recv command 0x46574c44
1,284,346 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,482 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,105 >>> mbox cmd response: failed
1,182,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,111 >>> mbox cmd response: failed
1,182,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,397 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,919 UART: [state] LifecycleState = Unprovisioned
86,574 UART: [state] DebugLocked = No
87,140 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
894,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,272 UART: [kat] ++
898,424 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
919,081 UART: [kat] HMAC-384Kdf
923,611 UART: [kat] LMS
1,171,939 UART: [kat] --
1,172,976 UART: [cold-reset] ++
1,173,556 UART: [fht] FHT @ 0x50003400
1,176,083 UART: [idev] ++
1,176,251 UART: [idev] CDI.KEYID = 6
1,176,611 UART: [idev] SUBJECT.KEYID = 7
1,177,035 UART: [idev] UDS.KEYID = 0
1,177,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,964 UART: [idev] Sha1 KeyId Algorithm
1,210,398 UART: [idev] --
1,211,494 UART: [ldev] ++
1,211,662 UART: [ldev] CDI.KEYID = 6
1,212,025 UART: [ldev] SUBJECT.KEYID = 5
1,212,451 UART: [ldev] AUTHORITY.KEYID = 7
1,212,914 UART: [ldev] FE.KEYID = 1
1,218,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,576 UART: [ldev] --
1,282,873 UART: [fwproc] Wait for Commands...
1,283,493 UART: [fwproc] Recv command 0x46574c44
1,284,221 UART: [fwproc] Recv'd Img size: 114084 bytes
1,327,046 UART: ROM Fatal Error: 0x000B0010
1,328,203 >>> mbox cmd response: failed
1,328,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,209 >>> mbox cmd response: failed
1,328,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,215 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
893,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,766 UART: [kat] ++
897,918 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,862 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,623 UART: [idev] Erasing UDS.KEYID = 0
1,202,390 UART: [idev] Sha1 KeyId Algorithm
1,210,926 UART: [idev] --
1,211,964 UART: [ldev] ++
1,212,132 UART: [ldev] CDI.KEYID = 6
1,212,495 UART: [ldev] SUBJECT.KEYID = 5
1,212,921 UART: [ldev] AUTHORITY.KEYID = 7
1,213,384 UART: [ldev] FE.KEYID = 1
1,218,696 UART: [ldev] Erasing FE.KEYID = 1
1,245,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,412 UART: [ldev] --
1,284,899 UART: [fwproc] Wait for Commands...
1,285,589 UART: [fwproc] Recv command 0x46574c44
1,286,317 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,521 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,710 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,690 >>> mbox cmd response: failed
1,181,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,696 >>> mbox cmd response: failed
1,181,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,720 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
921,106 UART: [kat] LMS
1,169,418 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,174,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,643 UART: [idev] Erasing UDS.KEYID = 0
1,199,513 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,554 UART: [ldev] ++
1,209,722 UART: [ldev] CDI.KEYID = 6
1,210,086 UART: [ldev] SUBJECT.KEYID = 5
1,210,513 UART: [ldev] AUTHORITY.KEYID = 7
1,210,976 UART: [ldev] FE.KEYID = 1
1,216,136 UART: [ldev] Erasing FE.KEYID = 1
1,242,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,606 UART: [ldev] --
1,281,996 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,799 UART: ROM Fatal Error: 0x000B0010
1,326,956 >>> mbox cmd response: failed
1,326,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,962 >>> mbox cmd response: failed
1,326,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,738 UART: [state] LifecycleState = Unprovisioned
85,393 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,088 UART: [kat] SHA2-256
890,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,767 UART: [kat] ++
894,919 UART: [kat] sha1
899,107 UART: [kat] SHA2-256
901,047 UART: [kat] SHA2-384
903,866 UART: [kat] SHA2-512-ACC
905,767 UART: [kat] ECC-384
915,188 UART: [kat] HMAC-384Kdf
919,900 UART: [kat] LMS
1,168,212 UART: [kat] --
1,169,121 UART: [cold-reset] ++
1,169,513 UART: [fht] FHT @ 0x50003400
1,172,167 UART: [idev] ++
1,172,335 UART: [idev] CDI.KEYID = 6
1,172,696 UART: [idev] SUBJECT.KEYID = 7
1,173,121 UART: [idev] UDS.KEYID = 0
1,173,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,756 UART: [fwproc] Wait for Commands...
1,281,349 UART: [fwproc] Recv command 0x46574c44
1,282,082 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,144 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,504 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,257 >>> mbox cmd response: failed
1,180,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,263 >>> mbox cmd response: failed
1,180,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,412 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,182 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,114 UART: [kat] ++
896,266 UART: [kat] sha1
900,548 UART: [kat] SHA2-256
902,488 UART: [kat] SHA2-384
905,379 UART: [kat] SHA2-512-ACC
907,280 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,297 UART: [kat] LMS
1,169,609 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,058 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,174,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,498 UART: [idev] Sha1 KeyId Algorithm
1,208,548 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,927 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,249 UART: [fwproc] Recv'd Img size: 114084 bytes
1,325,920 UART: ROM Fatal Error: 0x000B0010
1,327,077 >>> mbox cmd response: failed
1,327,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,083 >>> mbox cmd response: failed
1,327,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,427 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,222 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,755 UART: [ldev] ++
1,209,923 UART: [ldev] CDI.KEYID = 6
1,210,287 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,895 UART: [fwproc] Wait for Commands...
1,282,640 UART: [fwproc] Recv command 0x46574c44
1,283,373 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,757 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,432 >>> mbox cmd response: failed
1,179,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,438 >>> mbox cmd response: failed
1,179,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,449 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,193 UART:
192,556 UART: Running Caliptra ROM ...
193,758 UART:
193,907 UART: [state] CFI Enabled
264,846 UART: [state] LifecycleState = Unprovisioned
266,763 UART: [state] DebugLocked = No
269,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,732 UART: [kat] SHA2-256
443,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,969 UART: [kat] ++
454,447 UART: [kat] sha1
465,056 UART: [kat] SHA2-256
467,770 UART: [kat] SHA2-384
472,137 UART: [kat] SHA2-512-ACC
474,516 UART: [kat] ECC-384
2,767,409 UART: [kat] HMAC-384Kdf
2,799,341 UART: [kat] LMS
3,989,610 UART: [kat] --
3,993,576 UART: [cold-reset] ++
3,994,704 UART: [fht] Storing FHT @ 0x50003400
4,005,924 UART: [idev] ++
4,006,504 UART: [idev] CDI.KEYID = 6
4,007,446 UART: [idev] SUBJECT.KEYID = 7
4,008,662 UART: [idev] UDS.KEYID = 0
4,011,218 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,566 UART: [idev] Erasing UDS.KEYID = 0
7,347,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,109 UART: [idev] --
7,372,824 UART: [ldev] ++
7,373,400 UART: [ldev] CDI.KEYID = 6
7,374,372 UART: [ldev] SUBJECT.KEYID = 5
7,375,531 UART: [ldev] AUTHORITY.KEYID = 7
7,376,824 UART: [ldev] FE.KEYID = 1
7,421,444 UART: [ldev] Erasing FE.KEYID = 1
10,757,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,760 UART: [ldev] --
13,134,783 UART: [fwproc] Waiting for Commands...
13,136,937 UART: [fwproc] Received command 0x46574c44
13,139,124 UART: [fwproc] Received Image of size 113760 bytes
15,842,017 UART: ROM Fatal Error: 0x000B0040
15,845,486 >>> mbox cmd response: failed
15,845,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,133 >>> mbox cmd response: failed
15,846,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,736 >>> mbox cmd response: failed
Initializing fuses
2,059,452 writing to cptra_bootfsm_go
2,248,760 UART:
2,249,115 UART: Running Caliptra ROM ...
2,250,160 UART:
2,250,313 UART: [state] CFI Enabled
2,310,290 UART: [state] LifecycleState = Unprovisioned
2,312,232 UART: [state] DebugLocked = No
2,314,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,570 UART: [kat] SHA2-256
2,490,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,783 UART: [kat] ++
2,501,242 UART: [kat] sha1
2,512,183 UART: [kat] SHA2-256
2,514,856 UART: [kat] SHA2-384
2,520,688 UART: [kat] SHA2-512-ACC
2,523,094 UART: [kat] ECC-384
4,816,561 UART: [kat] HMAC-384Kdf
4,850,007 UART: [kat] LMS
6,040,298 UART: [kat] --
6,044,917 UART: [cold-reset] ++
6,047,192 UART: [fht] Storing FHT @ 0x50003400
6,058,193 UART: [idev] ++
6,058,767 UART: [idev] CDI.KEYID = 6
6,059,786 UART: [idev] SUBJECT.KEYID = 7
6,060,969 UART: [idev] UDS.KEYID = 0
6,063,170 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,206,362 UART: [idev] Erasing UDS.KEYID = 0
9,393,758 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,661 UART: [idev] --
9,418,556 UART: [ldev] ++
9,419,181 UART: [ldev] CDI.KEYID = 6
9,420,061 UART: [ldev] SUBJECT.KEYID = 5
9,421,381 UART: [ldev] AUTHORITY.KEYID = 7
9,422,620 UART: [ldev] FE.KEYID = 1
9,449,664 UART: [ldev] Erasing FE.KEYID = 1
12,783,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,076,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,105,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,120,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,139,486 UART: [ldev] --
15,143,515 UART: [fwproc] Waiting for Commands...
15,145,597 UART: [fwproc] Received command 0x46574c44
15,147,798 UART: [fwproc] Received Image of size 113760 bytes
19,192,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,268,865 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,337,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,653,274 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,806,209 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,547,908 >>> mbox cmd response: failed
15,548,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,548,835 >>> mbox cmd response: failed
15,549,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,398 >>> mbox cmd response: failed
Initializing fuses
2,056,794 writing to cptra_bootfsm_go
5,832,359 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,904,968 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,421 UART:
193,094 UART: Running Caliptra ROM ...
194,301 UART:
603,654 UART: [state] CFI Enabled
619,947 UART: [state] LifecycleState = Unprovisioned
621,886 UART: [state] DebugLocked = No
624,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,932 UART: [kat] SHA2-256
798,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,217 UART: [kat] ++
809,701 UART: [kat] sha1
821,175 UART: [kat] SHA2-256
823,884 UART: [kat] SHA2-384
830,676 UART: [kat] SHA2-512-ACC
833,019 UART: [kat] ECC-384
3,119,589 UART: [kat] HMAC-384Kdf
3,131,131 UART: [kat] LMS
4,321,226 UART: [kat] --
4,325,676 UART: [cold-reset] ++
4,327,289 UART: [fht] Storing FHT @ 0x50003400
4,337,529 UART: [idev] ++
4,338,093 UART: [idev] CDI.KEYID = 6
4,339,110 UART: [idev] SUBJECT.KEYID = 7
4,340,272 UART: [idev] UDS.KEYID = 0
4,342,783 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,883 UART: [idev] Erasing UDS.KEYID = 0
7,622,948 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,798 UART: [idev] --
7,650,001 UART: [ldev] ++
7,650,590 UART: [ldev] CDI.KEYID = 6
7,651,501 UART: [ldev] SUBJECT.KEYID = 5
7,652,716 UART: [ldev] AUTHORITY.KEYID = 7
7,654,003 UART: [ldev] FE.KEYID = 1
7,665,251 UART: [ldev] Erasing FE.KEYID = 1
10,951,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,391 UART: [ldev] --
13,309,922 UART: [fwproc] Waiting for Commands...
13,313,221 UART: [fwproc] Received command 0x46574c44
13,315,448 UART: [fwproc] Received Image of size 113760 bytes
16,022,697 UART: ROM Fatal Error: 0x000B0040
16,026,225 >>> mbox cmd response: failed
16,026,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,969 >>> mbox cmd response: failed
16,027,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,530 >>> mbox cmd response: failed
Initializing fuses
2,055,709 writing to cptra_bootfsm_go
2,245,019 UART:
2,245,372 UART: Running Caliptra ROM ...
2,246,515 UART:
4,428,988 UART: [state] CFI Enabled
4,444,056 UART: [state] LifecycleState = Unprovisioned
4,445,974 UART: [state] DebugLocked = No
4,448,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,224 UART: [kat] SHA2-256
4,623,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,634,538 UART: [kat] ++
4,635,084 UART: [kat] sha1
4,645,390 UART: [kat] SHA2-256
4,648,077 UART: [kat] SHA2-384
4,653,860 UART: [kat] SHA2-512-ACC
4,656,223 UART: [kat] ECC-384
6,940,659 UART: [kat] HMAC-384Kdf
6,952,458 UART: [kat] LMS
8,142,546 UART: [kat] --
8,148,706 UART: [cold-reset] ++
8,150,748 UART: [fht] Storing FHT @ 0x50003400
8,162,826 UART: [idev] ++
8,163,447 UART: [idev] CDI.KEYID = 6
8,164,328 UART: [idev] SUBJECT.KEYID = 7
8,165,636 UART: [idev] UDS.KEYID = 0
8,168,022 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,310,860 UART: [idev] Erasing UDS.KEYID = 0
11,452,412 UART: [idev] Using Sha1 for KeyId Algorithm
11,473,522 UART: [idev] --
11,476,654 UART: [ldev] ++
11,477,226 UART: [ldev] CDI.KEYID = 6
11,478,192 UART: [ldev] SUBJECT.KEYID = 5
11,479,458 UART: [ldev] AUTHORITY.KEYID = 7
11,480,636 UART: [ldev] FE.KEYID = 1
11,491,552 UART: [ldev] Erasing FE.KEYID = 1
14,780,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,072,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,087,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,102,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,116,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,135,539 UART: [ldev] --
17,140,764 UART: [fwproc] Waiting for Commands...
17,143,188 UART: [fwproc] Received command 0x46574c44
17,145,431 UART: [fwproc] Received Image of size 113760 bytes
21,190,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,271,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,340,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
21,655,431 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,126,877 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,761,318 >>> mbox cmd response: failed
15,761,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,238 >>> mbox cmd response: failed
15,762,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,828 >>> mbox cmd response: failed
Initializing fuses
2,059,943 writing to cptra_bootfsm_go
8,237,715 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,177,552 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,190 UART:
192,539 UART: Running Caliptra ROM ...
193,669 UART:
193,809 UART: [state] CFI Enabled
258,817 UART: [state] LifecycleState = Unprovisioned
260,697 UART: [state] DebugLocked = No
262,322 UART: [state] WD Timer not started. Device not locked for debugging
265,824 UART: [kat] SHA2-256
444,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,498 UART: [kat] ++
457,029 UART: [kat] sha1
468,241 UART: [kat] SHA2-256
471,306 UART: [kat] SHA2-384
477,116 UART: [kat] SHA2-512-ACC
480,101 UART: [kat] ECC-384
2,922,364 UART: [kat] HMAC-384Kdf
2,946,818 UART: [kat] LMS
3,476,265 UART: [kat] --
3,478,706 UART: [cold-reset] ++
3,480,419 UART: [fht] FHT @ 0x50003400
3,491,345 UART: [idev] ++
3,491,927 UART: [idev] CDI.KEYID = 6
3,492,809 UART: [idev] SUBJECT.KEYID = 7
3,494,074 UART: [idev] UDS.KEYID = 0
3,496,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,640,244 UART: [idev] Erasing UDS.KEYID = 0
6,017,620 UART: [idev] Sha1 KeyId Algorithm
6,040,659 UART: [idev] --
6,043,126 UART: [ldev] ++
6,043,714 UART: [ldev] CDI.KEYID = 6
6,044,606 UART: [ldev] SUBJECT.KEYID = 5
6,045,735 UART: [ldev] AUTHORITY.KEYID = 7
6,047,072 UART: [ldev] FE.KEYID = 1
6,088,860 UART: [ldev] Erasing FE.KEYID = 1
8,594,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,693 UART: [ldev] --
10,404,687 UART: [fwproc] Wait for Commands...
10,406,629 UART: [fwproc] Recv command 0x46574c44
10,408,728 UART: [fwproc] Recv'd Img size: 114084 bytes
12,465,618 UART: ROM Fatal Error: 0x000B0040
12,468,741 >>> mbox cmd response: failed
12,469,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,480 >>> mbox cmd response: failed
12,469,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,470,058 >>> mbox cmd response: failed
Initializing fuses
2,056,815 writing to cptra_bootfsm_go
2,246,145 UART:
2,246,807 UART: Running Caliptra ROM ...
2,247,930 UART:
2,248,091 UART: [state] CFI Enabled
2,313,313 UART: [state] LifecycleState = Unprovisioned
2,315,195 UART: [state] DebugLocked = No
2,317,297 UART: [state] WD Timer not started. Device not locked for debugging
2,321,258 UART: [kat] SHA2-256
2,500,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,992 UART: [kat] ++
2,512,535 UART: [kat] sha1
2,523,541 UART: [kat] SHA2-256
2,526,563 UART: [kat] SHA2-384
2,533,156 UART: [kat] SHA2-512-ACC
2,536,101 UART: [kat] ECC-384
4,997,442 UART: [kat] HMAC-384Kdf
5,019,537 UART: [kat] LMS
5,549,106 UART: [kat] --
5,551,583 UART: [cold-reset] ++
5,553,511 UART: [fht] FHT @ 0x50003400
5,564,220 UART: [idev] ++
5,564,785 UART: [idev] CDI.KEYID = 6
5,565,755 UART: [idev] SUBJECT.KEYID = 7
5,566,915 UART: [idev] UDS.KEYID = 0
5,569,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,713,062 UART: [idev] Erasing UDS.KEYID = 0
8,078,770 UART: [idev] Sha1 KeyId Algorithm
8,100,549 UART: [idev] --
8,105,409 UART: [ldev] ++
8,105,986 UART: [ldev] CDI.KEYID = 6
8,106,896 UART: [ldev] SUBJECT.KEYID = 5
8,108,055 UART: [ldev] AUTHORITY.KEYID = 7
8,109,470 UART: [ldev] FE.KEYID = 1
8,149,027 UART: [ldev] Erasing FE.KEYID = 1
10,652,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,368,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,384,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,400,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,416,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,634 UART: [ldev] --
12,440,934 UART: [fwproc] Wait for Commands...
12,443,676 UART: [fwproc] Recv command 0x46574c44
12,445,724 UART: [fwproc] Recv'd Img size: 114084 bytes
15,845,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,917,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,986,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,302,700 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,388,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,265,575 >>> mbox cmd response: failed
12,266,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,266,499 >>> mbox cmd response: failed
12,266,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,267,068 >>> mbox cmd response: failed
Initializing fuses
2,061,866 writing to cptra_bootfsm_go
5,406,048 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,103,399 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,533 UART:
192,934 UART: Running Caliptra ROM ...
194,071 UART:
603,833 UART: [state] CFI Enabled
615,445 UART: [state] LifecycleState = Unprovisioned
617,333 UART: [state] DebugLocked = No
620,065 UART: [state] WD Timer not started. Device not locked for debugging
623,462 UART: [kat] SHA2-256
802,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,155 UART: [kat] ++
814,717 UART: [kat] sha1
825,926 UART: [kat] SHA2-256
828,933 UART: [kat] SHA2-384
835,502 UART: [kat] SHA2-512-ACC
838,491 UART: [kat] ECC-384
3,281,759 UART: [kat] HMAC-384Kdf
3,294,199 UART: [kat] LMS
3,823,680 UART: [kat] --
3,827,842 UART: [cold-reset] ++
3,829,239 UART: [fht] FHT @ 0x50003400
3,839,951 UART: [idev] ++
3,840,525 UART: [idev] CDI.KEYID = 6
3,841,543 UART: [idev] SUBJECT.KEYID = 7
3,842,646 UART: [idev] UDS.KEYID = 0
3,845,051 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,549 UART: [idev] Erasing UDS.KEYID = 0
6,317,629 UART: [idev] Sha1 KeyId Algorithm
6,340,350 UART: [idev] --
6,343,963 UART: [ldev] ++
6,344,546 UART: [ldev] CDI.KEYID = 6
6,345,434 UART: [ldev] SUBJECT.KEYID = 5
6,346,646 UART: [ldev] AUTHORITY.KEYID = 7
6,347,876 UART: [ldev] FE.KEYID = 1
6,359,925 UART: [ldev] Erasing FE.KEYID = 1
8,830,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,296 UART: [ldev] --
10,623,560 UART: [fwproc] Wait for Commands...
10,625,284 UART: [fwproc] Recv command 0x46574c44
10,627,348 UART: [fwproc] Recv'd Img size: 114084 bytes
12,677,557 UART: ROM Fatal Error: 0x000B0040
12,680,681 >>> mbox cmd response: failed
12,681,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,436 >>> mbox cmd response: failed
12,681,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,997 >>> mbox cmd response: failed
Initializing fuses
2,052,819 writing to cptra_bootfsm_go
2,242,147 UART:
2,242,494 UART: Running Caliptra ROM ...
2,243,545 UART:
7,773,089 UART: [state] CFI Enabled
7,787,856 UART: [state] LifecycleState = Unprovisioned
7,789,739 UART: [state] DebugLocked = No
7,792,647 UART: [state] WD Timer not started. Device not locked for debugging
7,795,963 UART: [kat] SHA2-256
7,975,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,986,658 UART: [kat] ++
7,987,203 UART: [kat] sha1
7,999,668 UART: [kat] SHA2-256
8,002,696 UART: [kat] SHA2-384
8,009,876 UART: [kat] SHA2-512-ACC
8,012,824 UART: [kat] ECC-384
10,456,687 UART: [kat] HMAC-384Kdf
10,469,129 UART: [kat] LMS
10,998,632 UART: [kat] --
11,002,740 UART: [cold-reset] ++
11,004,910 UART: [fht] FHT @ 0x50003400
11,016,340 UART: [idev] ++
11,016,938 UART: [idev] CDI.KEYID = 6
11,017,857 UART: [idev] SUBJECT.KEYID = 7
11,019,019 UART: [idev] UDS.KEYID = 0
11,021,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,164,750 UART: [idev] Erasing UDS.KEYID = 0
13,495,246 UART: [idev] Sha1 KeyId Algorithm
13,518,208 UART: [idev] --
13,523,124 UART: [ldev] ++
13,523,691 UART: [ldev] CDI.KEYID = 6
13,524,601 UART: [ldev] SUBJECT.KEYID = 5
13,525,766 UART: [ldev] AUTHORITY.KEYID = 7
13,526,999 UART: [ldev] FE.KEYID = 1
13,539,216 UART: [ldev] Erasing FE.KEYID = 1
16,012,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,732,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,748,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,764,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,780,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,801,657 UART: [ldev] --
17,806,436 UART: [fwproc] Wait for Commands...
17,808,686 UART: [fwproc] Recv command 0x46574c44
17,810,753 UART: [fwproc] Recv'd Img size: 114084 bytes
21,213,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,284,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,352,899 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,670,160 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
3,699,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,457,970 >>> mbox cmd response: failed
12,458,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,876 >>> mbox cmd response: failed
12,459,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,459,389 >>> mbox cmd response: failed
Initializing fuses
2,060,209 writing to cptra_bootfsm_go
11,103,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
21,673,319 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,240 UART:
192,601 UART: Running Caliptra ROM ...
193,792 UART:
193,947 UART: [state] CFI Enabled
261,137 UART: [state] LifecycleState = Unprovisioned
263,610 UART: [state] DebugLocked = No
266,353 UART: [state] WD Timer not started. Device not locked for debugging
270,557 UART: [kat] SHA2-256
460,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,205 UART: [kat] ++
471,703 UART: [kat] sha1
482,280 UART: [kat] SHA2-256
485,303 UART: [kat] SHA2-384
491,884 UART: [kat] SHA2-512-ACC
494,449 UART: [kat] ECC-384
2,949,174 UART: [kat] HMAC-384Kdf
2,969,680 UART: [kat] LMS
3,501,457 UART: [kat] --
3,507,681 UART: [cold-reset] ++
3,509,668 UART: [fht] FHT @ 0x50003400
3,522,001 UART: [idev] ++
3,522,690 UART: [idev] CDI.KEYID = 6
3,523,656 UART: [idev] SUBJECT.KEYID = 7
3,524,870 UART: [idev] UDS.KEYID = 0
3,527,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,971 UART: [idev] Erasing UDS.KEYID = 0
6,027,538 UART: [idev] Sha1 KeyId Algorithm
6,050,912 UART: [idev] --
6,057,074 UART: [ldev] ++
6,057,767 UART: [ldev] CDI.KEYID = 6
6,058,686 UART: [ldev] SUBJECT.KEYID = 5
6,059,850 UART: [ldev] AUTHORITY.KEYID = 7
6,061,254 UART: [ldev] FE.KEYID = 1
6,099,892 UART: [ldev] Erasing FE.KEYID = 1
8,604,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,573 UART: [ldev] --
10,413,163 UART: [fwproc] Wait for Commands...
10,414,987 UART: [fwproc] Recv command 0x46574c44
10,417,307 UART: [fwproc] Recv'd Img size: 114084 bytes
12,503,125 UART: ROM Fatal Error: 0x000B0040
12,506,804 >>> mbox cmd response: failed
12,507,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,548 >>> mbox cmd response: failed
12,507,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,117 >>> mbox cmd response: failed
Initializing fuses
2,057,951 writing to cptra_bootfsm_go
2,247,288 UART:
2,247,628 UART: Running Caliptra ROM ...
2,248,762 UART:
2,248,927 UART: [state] CFI Enabled
2,322,932 UART: [state] LifecycleState = Unprovisioned
2,325,309 UART: [state] DebugLocked = No
2,327,589 UART: [state] WD Timer not started. Device not locked for debugging
2,333,029 UART: [kat] SHA2-256
2,522,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,680 UART: [kat] ++
2,534,187 UART: [kat] sha1
2,546,155 UART: [kat] SHA2-256
2,549,177 UART: [kat] SHA2-384
2,555,763 UART: [kat] SHA2-512-ACC
2,558,392 UART: [kat] ECC-384
5,006,870 UART: [kat] HMAC-384Kdf
5,030,451 UART: [kat] LMS
5,562,209 UART: [kat] --
5,565,656 UART: [cold-reset] ++
5,567,977 UART: [fht] FHT @ 0x50003400
5,579,932 UART: [idev] ++
5,580,605 UART: [idev] CDI.KEYID = 6
5,581,590 UART: [idev] SUBJECT.KEYID = 7
5,582,752 UART: [idev] UDS.KEYID = 0
5,584,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,728,526 UART: [idev] Erasing UDS.KEYID = 0
8,088,655 UART: [idev] Sha1 KeyId Algorithm
8,111,802 UART: [idev] --
8,116,374 UART: [ldev] ++
8,117,074 UART: [ldev] CDI.KEYID = 6
8,117,964 UART: [ldev] SUBJECT.KEYID = 5
8,119,180 UART: [ldev] AUTHORITY.KEYID = 7
8,120,354 UART: [ldev] FE.KEYID = 1
8,159,411 UART: [ldev] Erasing FE.KEYID = 1
10,668,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,709 UART: [ldev] --
12,473,933 UART: [fwproc] Wait for Commands...
12,476,954 UART: [fwproc] Recv command 0x46574c44
12,479,222 UART: [fwproc] Recv'd Img size: 114084 bytes
15,926,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,119,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,659,362 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,416,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,280,666 >>> mbox cmd response: failed
12,281,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,519 >>> mbox cmd response: failed
12,281,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,282,097 >>> mbox cmd response: failed
Initializing fuses
2,056,079 writing to cptra_bootfsm_go
5,489,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,779,142 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,402 UART:
192,755 UART: Running Caliptra ROM ...
193,953 UART:
603,723 UART: [state] CFI Enabled
621,803 UART: [state] LifecycleState = Unprovisioned
624,193 UART: [state] DebugLocked = No
626,998 UART: [state] WD Timer not started. Device not locked for debugging
631,984 UART: [kat] SHA2-256
821,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,654 UART: [kat] ++
833,157 UART: [kat] sha1
844,413 UART: [kat] SHA2-256
847,423 UART: [kat] SHA2-384
852,702 UART: [kat] SHA2-512-ACC
855,254 UART: [kat] ECC-384
3,295,803 UART: [kat] HMAC-384Kdf
3,308,569 UART: [kat] LMS
3,840,409 UART: [kat] --
3,846,532 UART: [cold-reset] ++
3,847,882 UART: [fht] FHT @ 0x50003400
3,858,006 UART: [idev] ++
3,858,695 UART: [idev] CDI.KEYID = 6
3,859,735 UART: [idev] SUBJECT.KEYID = 7
3,860,838 UART: [idev] UDS.KEYID = 0
3,863,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,891 UART: [idev] Erasing UDS.KEYID = 0
6,337,072 UART: [idev] Sha1 KeyId Algorithm
6,359,938 UART: [idev] --
6,364,638 UART: [ldev] ++
6,365,318 UART: [ldev] CDI.KEYID = 6
6,366,333 UART: [ldev] SUBJECT.KEYID = 5
6,367,433 UART: [ldev] AUTHORITY.KEYID = 7
6,368,665 UART: [ldev] FE.KEYID = 1
6,378,075 UART: [ldev] Erasing FE.KEYID = 1
8,861,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,017 UART: [ldev] --
10,649,581 UART: [fwproc] Wait for Commands...
10,652,760 UART: [fwproc] Recv command 0x46574c44
10,655,079 UART: [fwproc] Recv'd Img size: 114084 bytes
12,741,580 UART: ROM Fatal Error: 0x000B0040
12,745,246 >>> mbox cmd response: failed
12,745,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,903 >>> mbox cmd response: failed
12,746,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,746,503 >>> mbox cmd response: failed
Initializing fuses
2,061,305 writing to cptra_bootfsm_go
2,250,632 UART:
2,250,992 UART: Running Caliptra ROM ...
2,252,144 UART:
7,699,272 UART: [state] CFI Enabled
7,712,889 UART: [state] LifecycleState = Unprovisioned
7,715,262 UART: [state] DebugLocked = No
7,717,598 UART: [state] WD Timer not started. Device not locked for debugging
7,721,998 UART: [kat] SHA2-256
7,911,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,922,679 UART: [kat] ++
7,923,192 UART: [kat] sha1
7,935,808 UART: [kat] SHA2-256
7,938,832 UART: [kat] SHA2-384
7,944,879 UART: [kat] SHA2-512-ACC
7,947,450 UART: [kat] ECC-384
10,387,210 UART: [kat] HMAC-384Kdf
10,399,010 UART: [kat] LMS
10,930,823 UART: [kat] --
10,933,473 UART: [cold-reset] ++
10,935,943 UART: [fht] FHT @ 0x50003400
10,947,140 UART: [idev] ++
10,947,808 UART: [idev] CDI.KEYID = 6
10,948,744 UART: [idev] SUBJECT.KEYID = 7
10,949,951 UART: [idev] UDS.KEYID = 0
10,952,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,095,588 UART: [idev] Erasing UDS.KEYID = 0
13,432,586 UART: [idev] Sha1 KeyId Algorithm
13,454,894 UART: [idev] --
13,460,125 UART: [ldev] ++
13,460,856 UART: [ldev] CDI.KEYID = 6
13,461,735 UART: [ldev] SUBJECT.KEYID = 5
13,462,940 UART: [ldev] AUTHORITY.KEYID = 7
13,464,171 UART: [ldev] FE.KEYID = 1
13,475,015 UART: [ldev] Erasing FE.KEYID = 1
15,953,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,671,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,686,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,701,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,717,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,737,811 UART: [ldev] --
17,742,373 UART: [fwproc] Wait for Commands...
17,744,956 UART: [fwproc] Recv command 0x46574c44
17,747,280 UART: [fwproc] Recv'd Img size: 114084 bytes
21,190,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,267,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,383,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
21,924,104 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,754,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,523,728 >>> mbox cmd response: failed
12,524,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,524,664 >>> mbox cmd response: failed
12,524,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,228 >>> mbox cmd response: failed
Initializing fuses
2,060,225 writing to cptra_bootfsm_go
11,094,763 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,288,923 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,929 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,557 UART: [kat] SHA2-256
881,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,603 UART: [kat] ++
885,755 UART: [kat] sha1
889,973 UART: [kat] SHA2-256
891,911 UART: [kat] SHA2-384
894,716 UART: [kat] SHA2-512-ACC
896,617 UART: [kat] ECC-384
902,296 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,476,031 UART: [cold-reset] ++
1,476,607 UART: [fht] Storing FHT @ 0x50003400
1,479,522 UART: [idev] ++
1,479,690 UART: [idev] CDI.KEYID = 6
1,480,050 UART: [idev] SUBJECT.KEYID = 7
1,480,474 UART: [idev] UDS.KEYID = 0
1,480,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,626 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,944 UART: [idev] --
1,514,959 UART: [ldev] ++
1,515,127 UART: [ldev] CDI.KEYID = 6
1,515,490 UART: [ldev] SUBJECT.KEYID = 5
1,515,916 UART: [ldev] AUTHORITY.KEYID = 7
1,516,379 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,784 UART: [ldev] --
1,586,221 UART: [fwproc] Waiting for Commands...
1,587,074 UART: [fwproc] Received command 0x46574c44
1,587,865 UART: [fwproc] Received Image of size 114084 bytes
1,635,844 UART: ROM Fatal Error: 0x000B0040
1,637,001 >>> mbox cmd response: failed
1,637,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,007 >>> mbox cmd response: failed
1,637,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,245 UART: [kat] SHA2-256
882,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,291 UART: [kat] ++
886,443 UART: [kat] sha1
890,645 UART: [kat] SHA2-256
892,583 UART: [kat] SHA2-384
895,472 UART: [kat] SHA2-512-ACC
897,373 UART: [kat] ECC-384
902,932 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,967 UART: [fht] Storing FHT @ 0x50003400
1,479,968 UART: [idev] ++
1,480,136 UART: [idev] CDI.KEYID = 6
1,480,496 UART: [idev] SUBJECT.KEYID = 7
1,480,920 UART: [idev] UDS.KEYID = 0
1,481,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,784 UART: [idev] Erasing UDS.KEYID = 0
1,505,080 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,660 UART: [idev] --
1,514,605 UART: [ldev] ++
1,514,773 UART: [ldev] CDI.KEYID = 6
1,515,136 UART: [ldev] SUBJECT.KEYID = 5
1,515,562 UART: [ldev] AUTHORITY.KEYID = 7
1,516,025 UART: [ldev] FE.KEYID = 1
1,521,239 UART: [ldev] Erasing FE.KEYID = 1
1,546,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,988 UART: [ldev] --
1,586,271 UART: [fwproc] Waiting for Commands...
1,587,110 UART: [fwproc] Received command 0x46574c44
1,587,901 UART: [fwproc] Received Image of size 114084 bytes
2,883,380 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,629 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,534 >>> mbox cmd response: failed
1,488,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,540 >>> mbox cmd response: failed
1,488,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,091 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,735 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,498 UART: [kat] SHA2-256
892,436 UART: [kat] SHA2-384
895,283 UART: [kat] SHA2-512-ACC
897,184 UART: [kat] ECC-384
902,469 UART: [kat] HMAC-384Kdf
907,071 UART: [kat] LMS
1,475,267 UART: [kat] --
1,476,078 UART: [cold-reset] ++
1,476,628 UART: [fht] Storing FHT @ 0x50003400
1,479,319 UART: [idev] ++
1,479,487 UART: [idev] CDI.KEYID = 6
1,479,847 UART: [idev] SUBJECT.KEYID = 7
1,480,271 UART: [idev] UDS.KEYID = 0
1,480,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,157 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,805 UART: [idev] --
1,514,666 UART: [ldev] ++
1,514,834 UART: [ldev] CDI.KEYID = 6
1,515,197 UART: [ldev] SUBJECT.KEYID = 5
1,515,623 UART: [ldev] AUTHORITY.KEYID = 7
1,516,086 UART: [ldev] FE.KEYID = 1
1,521,304 UART: [ldev] Erasing FE.KEYID = 1
1,546,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,163 UART: [ldev] --
1,585,574 UART: [fwproc] Waiting for Commands...
1,586,197 UART: [fwproc] Received command 0x46574c44
1,586,988 UART: [fwproc] Received Image of size 114084 bytes
1,634,397 UART: ROM Fatal Error: 0x000B0040
1,635,554 >>> mbox cmd response: failed
1,635,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,560 >>> mbox cmd response: failed
1,635,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,181 UART: [kat] SHA2-512-ACC
897,082 UART: [kat] ECC-384
902,343 UART: [kat] HMAC-384Kdf
907,147 UART: [kat] LMS
1,475,343 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,640 UART: [fht] Storing FHT @ 0x50003400
1,479,339 UART: [idev] ++
1,479,507 UART: [idev] CDI.KEYID = 6
1,479,867 UART: [idev] SUBJECT.KEYID = 7
1,480,291 UART: [idev] UDS.KEYID = 0
1,480,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,247 UART: [idev] Erasing UDS.KEYID = 0
1,504,945 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,485 UART: [idev] --
1,514,712 UART: [ldev] ++
1,514,880 UART: [ldev] CDI.KEYID = 6
1,515,243 UART: [ldev] SUBJECT.KEYID = 5
1,515,669 UART: [ldev] AUTHORITY.KEYID = 7
1,516,132 UART: [ldev] FE.KEYID = 1
1,521,620 UART: [ldev] Erasing FE.KEYID = 1
1,546,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,799 UART: [ldev] --
1,586,276 UART: [fwproc] Waiting for Commands...
1,586,911 UART: [fwproc] Received command 0x46574c44
1,587,702 UART: [fwproc] Received Image of size 114084 bytes
2,881,637 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,532 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,965 >>> mbox cmd response: failed
1,487,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,971 >>> mbox cmd response: failed
1,487,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,768 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
917,854 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,580 UART: [idev] Erasing UDS.KEYID = 0
1,200,375 UART: [idev] Sha1 KeyId Algorithm
1,208,977 UART: [idev] --
1,209,933 UART: [ldev] ++
1,210,101 UART: [ldev] CDI.KEYID = 6
1,210,464 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,390 UART: [fwproc] Recv command 0x46574c44
1,283,118 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,317 UART: ROM Fatal Error: 0x000B0040
1,330,474 >>> mbox cmd response: failed
1,330,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,480 >>> mbox cmd response: failed
1,330,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,486 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,063 UART: [kat] SHA2-256
904,003 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,552 UART: [kat] HMAC-384Kdf
923,180 UART: [kat] LMS
1,171,508 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,915 UART: [fht] FHT @ 0x50003400
1,175,496 UART: [idev] ++
1,175,664 UART: [idev] CDI.KEYID = 6
1,176,024 UART: [idev] SUBJECT.KEYID = 7
1,176,448 UART: [idev] UDS.KEYID = 0
1,176,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,032 UART: [idev] Erasing UDS.KEYID = 0
1,200,839 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,901 UART: [ldev] --
1,283,404 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,875 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,250 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,141 >>> mbox cmd response: failed
1,188,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,147 >>> mbox cmd response: failed
1,188,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,153 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,481 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,244 UART: [state] WD Timer not started. Device not locked for debugging
88,511 UART: [kat] SHA2-256
894,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,286 UART: [kat] ++
898,438 UART: [kat] sha1
902,896 UART: [kat] SHA2-256
904,836 UART: [kat] SHA2-384
907,673 UART: [kat] SHA2-512-ACC
909,574 UART: [kat] ECC-384
919,213 UART: [kat] HMAC-384Kdf
923,863 UART: [kat] LMS
1,172,191 UART: [kat] --
1,172,864 UART: [cold-reset] ++
1,173,364 UART: [fht] FHT @ 0x50003400
1,175,975 UART: [idev] ++
1,176,143 UART: [idev] CDI.KEYID = 6
1,176,503 UART: [idev] SUBJECT.KEYID = 7
1,176,927 UART: [idev] UDS.KEYID = 0
1,177,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,999 UART: [idev] Erasing UDS.KEYID = 0
1,202,018 UART: [idev] Sha1 KeyId Algorithm
1,210,588 UART: [idev] --
1,211,654 UART: [ldev] ++
1,211,822 UART: [ldev] CDI.KEYID = 6
1,212,185 UART: [ldev] SUBJECT.KEYID = 5
1,212,611 UART: [ldev] AUTHORITY.KEYID = 7
1,213,074 UART: [ldev] FE.KEYID = 1
1,218,424 UART: [ldev] Erasing FE.KEYID = 1
1,244,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,504 UART: [ldev] --
1,283,889 UART: [fwproc] Wait for Commands...
1,284,679 UART: [fwproc] Recv command 0x46574c44
1,285,407 UART: [fwproc] Recv'd Img size: 114084 bytes
1,332,736 UART: ROM Fatal Error: 0x000B0040
1,333,893 >>> mbox cmd response: failed
1,333,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,899 >>> mbox cmd response: failed
1,333,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,777 UART: [kat] SHA2-512-ACC
908,678 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,360 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,239 UART: [idev] ++
1,175,407 UART: [idev] CDI.KEYID = 6
1,175,767 UART: [idev] SUBJECT.KEYID = 7
1,176,191 UART: [idev] UDS.KEYID = 0
1,176,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,573 UART: [idev] Erasing UDS.KEYID = 0
1,202,124 UART: [idev] Sha1 KeyId Algorithm
1,210,596 UART: [idev] --
1,211,626 UART: [ldev] ++
1,211,794 UART: [ldev] CDI.KEYID = 6
1,212,157 UART: [ldev] SUBJECT.KEYID = 5
1,212,583 UART: [ldev] AUTHORITY.KEYID = 7
1,213,046 UART: [ldev] FE.KEYID = 1
1,218,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,247 UART: [fwproc] Wait for Commands...
1,284,893 UART: [fwproc] Recv command 0x46574c44
1,285,621 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,081 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,188,116 >>> mbox cmd response: failed
1,188,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,122 >>> mbox cmd response: failed
1,188,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,378 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,441 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,581 UART: [idev] Erasing UDS.KEYID = 0
1,199,725 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,494 UART: [ldev] ++
1,209,662 UART: [ldev] CDI.KEYID = 6
1,210,026 UART: [ldev] SUBJECT.KEYID = 5
1,210,453 UART: [ldev] AUTHORITY.KEYID = 7
1,210,916 UART: [ldev] FE.KEYID = 1
1,216,088 UART: [ldev] Erasing FE.KEYID = 1
1,242,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,326 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,297 UART: [fwproc] Recv command 0x46574c44
1,283,030 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,302 UART: ROM Fatal Error: 0x000B0040
1,331,459 >>> mbox cmd response: failed
1,331,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,465 >>> mbox cmd response: failed
1,331,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,053 UART: [kat] ++
895,205 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,432 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,121 UART: [cold-reset] ++
1,169,607 UART: [fht] FHT @ 0x50003400
1,172,333 UART: [idev] ++
1,172,501 UART: [idev] CDI.KEYID = 6
1,172,862 UART: [idev] SUBJECT.KEYID = 7
1,173,287 UART: [idev] UDS.KEYID = 0
1,173,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,739 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,328 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,052 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,830 >>> mbox cmd response: failed
1,183,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,836 >>> mbox cmd response: failed
1,183,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,328 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,221 UART: [kat] SHA2-512-ACC
906,122 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,463 UART: [kat] LMS
1,168,775 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,174,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,917 UART: [ldev] ++
1,209,085 UART: [ldev] CDI.KEYID = 6
1,209,449 UART: [ldev] SUBJECT.KEYID = 5
1,209,876 UART: [ldev] AUTHORITY.KEYID = 7
1,210,339 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,667 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,483 UART: ROM Fatal Error: 0x000B0040
1,331,640 >>> mbox cmd response: failed
1,331,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,646 >>> mbox cmd response: failed
1,331,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,652 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,558 UART: [kat] ++
895,710 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,618 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,322 UART: [idev] Erasing UDS.KEYID = 0
1,200,046 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,393 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,255 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,377 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,741 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,765 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,483 >>> mbox cmd response: failed
1,184,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,489 >>> mbox cmd response: failed
1,184,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,365 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,441 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,051 UART:
192,423 UART: Running Caliptra ROM ...
193,590 UART:
193,744 UART: [state] CFI Enabled
264,376 UART: [state] LifecycleState = Unprovisioned
266,309 UART: [state] DebugLocked = No
267,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,395 UART: [kat] SHA2-256
442,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,586 UART: [kat] ++
453,078 UART: [kat] sha1
463,852 UART: [kat] SHA2-256
466,535 UART: [kat] SHA2-384
473,592 UART: [kat] SHA2-512-ACC
475,948 UART: [kat] ECC-384
2,765,941 UART: [kat] HMAC-384Kdf
2,799,584 UART: [kat] LMS
3,989,880 UART: [kat] --
3,994,387 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,006,516 UART: [idev] ++
4,007,091 UART: [idev] CDI.KEYID = 6
4,008,117 UART: [idev] SUBJECT.KEYID = 7
4,009,283 UART: [idev] UDS.KEYID = 0
4,011,746 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,043 UART: [idev] Erasing UDS.KEYID = 0
7,347,090 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,458 UART: [idev] --
7,372,095 UART: [ldev] ++
7,372,665 UART: [ldev] CDI.KEYID = 6
7,373,658 UART: [ldev] SUBJECT.KEYID = 5
7,374,825 UART: [ldev] AUTHORITY.KEYID = 7
7,376,229 UART: [ldev] FE.KEYID = 1
7,402,770 UART: [ldev] Erasing FE.KEYID = 1
10,737,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,001 UART: [ldev] --
13,116,863 UART: [fwproc] Waiting for Commands...
13,120,201 UART: [fwproc] Received command 0x46574c44
13,122,396 UART: [fwproc] Received Image of size 113760 bytes
17,171,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,629,263 >>> mbox cmd response: success
17,631,444 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
17,756,101 UART: [afmc] ++
17,756,731 UART: [afmc] CDI.KEYID = 6
17,757,654 UART: [afmc] SUBJECT.KEYID = 7
17,758,762 UART: [afmc] AUTHORITY.KEYID = 5
21,005,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,445 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,850 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,662 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,087 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,958 UART: [afmc] --
23,380,084 UART: [cold-reset] --
23,384,281 UART: [state] Locking Datavault
23,387,857 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,575 UART: [state] Locking ICCM
23,391,562 UART: [exit] Launching FMC @ 0x40000130
23,399,967 UART:
23,400,209 UART: Running Caliptra FMC ...
23,401,316 UART:
23,401,485 UART: [state] CFI Enabled
23,469,764 UART: [fht] FMC Alias Private Key: 7
25,808,277 UART: [art] Extend RT PCRs Done
25,809,501 UART: [art] Lock RT PCRs Done
25,811,317 UART: [art] Populate DV Done
25,816,780 UART: [fht] FMC Alias Private Key: 7
25,818,368 UART: [art] Derive CDI
25,819,109 UART: [art] Store in in slot 0x4
25,878,800 UART: [art] Derive Key Pair
25,879,865 UART: [art] Store priv key in slot 0x5
29,172,958 UART: [art] Derive Key Pair - Done
29,186,161 UART: [art] Signing Cert with AUTHO
29,187,474 UART: RITY.KEYID = 7
31,473,401 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,910 UART: [art] PUB.X = EFE78B5028F92AD525339AB1C5ECE056DF62387CDF55F800F0B8C3F71585284470F6CFDCEA4154969CF2D9E8A38A0BAC
31,482,117 UART: [art] PUB.Y = 01E24BC3C068DA919FABF4932BE3E2C4C4306A8A9D9F3B5EA5B2E01A86A47A7EB8B19118E692CC7D5ACEF2C2F5C09190
31,489,421 UART: [art] SIG.R = A4026795FDE08C2AC257E2E14760636D043A22CDA8C8E45A213F7A9867D8FA7EB3D56FB7B51EF2D4F476E3C78FDC62A4
31,496,832 UART: [art] SIG.S = BFB0A5EFFD39560847230283ADACE02D299CFCD778A708414774E664ECE0FACCAE3CC75A3708D9AEC397E958BB75468E
32,802,134 UART: Caliptra RT
32,802,845 UART: [state] CFI Enabled
32,963,303 UART: [rt] RT listening for mailbox commands...
32,966,201 UART:
32,966,367 UART: Running Caliptra ROM ...
32,967,478 UART:
32,967,634 UART: [state] CFI Enabled
33,029,714 UART: [state] LifecycleState = Unprovisioned
33,031,642 UART: [state] DebugLocked = No
33,033,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,038,581 UART: [kat] SHA2-256
33,208,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,218,764 UART: [kat] ++
33,219,217 UART: [kat] sha1
33,231,397 UART: [kat] SHA2-256
33,234,096 UART: [kat] SHA2-384
33,240,298 UART: [kat] SHA2-512-ACC
33,242,698 UART: [kat] ECC-384
35,531,892 UART: [kat] HMAC-384Kdf
35,545,255 UART: [kat] LMS
36,735,604 UART: [kat] --
36,741,455 UART: [update-reset] ++
39,541,547 >>> mbox cmd response: failed
39,543,407 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
39,686,341 UART: ROM Non-Fatal Error: 0x000B001F
39,687,799 UART: [state] Locking Datavault
39,688,961 UART: [state] Locking PCR0, PCR1 and PCR31
39,690,501 UART: [state] Locking ICCM
39,691,409 UART: [exit] Launching FMC @ 0x40000130
39,692,836 UART:
39,692,995 UART: Running Caliptra FMC ...
39,694,093 UART:
39,694,254 UART: [state] CFI Enabled
39,695,172 UART: [art] Extend RT PCRs Done
39,696,440 UART: [art] Lock RT PCRs Done
39,697,434 UART: [art] Populate DV Done
39,698,471 UART: [fht] FMC Alias Private Key: 7
39,699,793 UART: [art] Derive CDI
39,700,531 UART: [art] Store in in slot 0x4
39,723,627 UART: [art] Derive Key Pair
39,724,626 UART: [art] Store priv key in slot 0x5
43,017,396 UART: [art] Derive Key Pair - Done
43,030,304 UART: [art] Signing Cert with AUTHO
43,031,614 UART: RITY.KEYID = 7
45,318,553 UART: [art] Erasing AUTHORITY.KEYID = 7
45,320,065 UART: [art] PUB.X = EFE78B5028F92AD525339AB1C5ECE056DF62387CDF55F800F0B8C3F71585284470F6CFDCEA4154969CF2D9E8A38A0BAC
45,327,271 UART: [art] PUB.Y = 01E24BC3C068DA919FABF4932BE3E2C4C4306A8A9D9F3B5EA5B2E01A86A47A7EB8B19118E692CC7D5ACEF2C2F5C09190
45,334,567 UART: [art] SIG.R = A4026795FDE08C2AC257E2E14760636D043A22CDA8C8E45A213F7A9867D8FA7EB3D56FB7B51EF2D4F476E3C78FDC62A4
45,341,975 UART: [art] SIG.S = BFB0A5EFFD39560847230283ADACE02D299CFCD778A708414774E664ECE0FACCAE3CC75A3708D9AEC397E958BB75468E
46,647,492 UART: Caliptra RT
46,648,197 UART: [state] CFI Enabled
46,984,739 UART: [rt] RT listening for mailbox commands...
46,987,178 UART:
46,987,347 UART: Running Caliptra ROM ...
46,988,408 UART:
46,988,561 UART: [state] CFI Enabled
47,047,184 UART: [state] LifecycleState = Unprovisioned
47,049,099 UART: [state] DebugLocked = No
47,050,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,055,953 UART: [kat] SHA2-256
47,225,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,236,164 UART: [kat] ++
47,236,621 UART: [kat] sha1
47,247,235 UART: [kat] SHA2-256
47,249,923 UART: [kat] SHA2-384
47,255,314 UART: [kat] SHA2-512-ACC
47,257,660 UART: [kat] ECC-384
49,549,385 UART: [kat] HMAC-384Kdf
49,582,356 UART: [kat] LMS
50,772,667 UART: [kat] --
50,778,061 UART: [update-reset] ++
54,913,880 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,918,100 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
55,299,104 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,786,114 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,363 >>> mbox cmd response: success
17,849,673 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
23,545,533 UART:
23,545,935 UART: Running Caliptra FMC ...
23,547,071 UART:
23,547,243 UART: [state] CFI Enabled
23,617,626 UART: [fht] FMC Alias Private Key: 7
25,955,985 UART: [art] Extend RT PCRs Done
25,957,204 UART: [art] Lock RT PCRs Done
25,959,153 UART: [art] Populate DV Done
25,964,716 UART: [fht] FMC Alias Private Key: 7
25,966,310 UART: [art] Derive CDI
25,967,130 UART: [art] Store in in slot 0x4
26,026,037 UART: [art] Derive Key Pair
26,027,112 UART: [art] Store priv key in slot 0x5
29,319,666 UART: [art] Derive Key Pair - Done
29,332,628 UART: [art] Signing Cert with AUTHO
29,333,945 UART: RITY.KEYID = 7
31,620,884 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,394 UART: [art] PUB.X = B567E82FD2E8C3A417EEEACA0919435F583F7E7518C8E7013D5B610D9998C4737F04480CDA8E331B5B84B0EA84EF7626
31,629,632 UART: [art] PUB.Y = CD9E9FAD5E12067B0C211B2F2D3306B582921D671FFD85DB5892B4A128F662E5193A4840F4D7495FF847C3847C4A6B08
31,636,874 UART: [art] SIG.R = C4A789E48A04516E7EF8A5BFC947DC748B3C3C89462A4BC12C41B812C179AA59CE82EBD14B236D2C102F57C1D4DE7895
31,644,274 UART: [art] SIG.S = DC91F47016D42652B73BE5DC706FF31A598884A0FD50A4A5509CDAE46AC67473B6C7EDC54FA436CA39BC9FE56E1D2209
32,949,144 UART: Caliptra RT
32,949,856 UART: [state] CFI Enabled
33,110,130 UART: [rt] RT listening for mailbox commands...
39,517,939 >>> mbox cmd response: failed
39,519,765 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
39,662,701 UART:
39,663,022 UART: Running Caliptra FMC ...
39,664,094 UART:
39,664,255 UART: [state] CFI Enabled
39,665,184 UART: [art] Extend RT PCRs Done
39,666,330 UART: [art] Lock RT PCRs Done
39,667,402 UART: [art] Populate DV Done
39,668,507 UART: [fht] FMC Alias Private Key: 7
39,669,835 UART: [art] Derive CDI
39,670,570 UART: [art] Store in in slot 0x4
39,696,928 UART: [art] Derive Key Pair
39,697,993 UART: [art] Store priv key in slot 0x5
42,990,961 UART: [art] Derive Key Pair - Done
43,003,638 UART: [art] Signing Cert with AUTHO
43,004,945 UART: RITY.KEYID = 7
45,291,923 UART: [art] Erasing AUTHORITY.KEYID = 7
45,293,427 UART: [art] PUB.X = B567E82FD2E8C3A417EEEACA0919435F583F7E7518C8E7013D5B610D9998C4737F04480CDA8E331B5B84B0EA84EF7626
45,300,677 UART: [art] PUB.Y = CD9E9FAD5E12067B0C211B2F2D3306B582921D671FFD85DB5892B4A128F662E5193A4840F4D7495FF847C3847C4A6B08
45,307,946 UART: [art] SIG.R = C4A789E48A04516E7EF8A5BFC947DC748B3C3C89462A4BC12C41B812C179AA59CE82EBD14B236D2C102F57C1D4DE7895
45,315,343 UART: [art] SIG.S = DC91F47016D42652B73BE5DC706FF31A598884A0FD50A4A5509CDAE46AC67473B6C7EDC54FA436CA39BC9FE56E1D2209
46,619,715 UART: Caliptra RT
46,620,412 UART: [state] CFI Enabled
46,954,172 UART: [rt] RT listening for mailbox commands...
55,536,353 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,470 UART:
192,847 UART: Running Caliptra ROM ...
194,063 UART:
603,878 UART: [state] CFI Enabled
619,212 UART: [state] LifecycleState = Unprovisioned
621,182 UART: [state] DebugLocked = No
623,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,643 UART: [kat] SHA2-256
798,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,909 UART: [kat] ++
809,352 UART: [kat] sha1
819,314 UART: [kat] SHA2-256
822,054 UART: [kat] SHA2-384
827,765 UART: [kat] SHA2-512-ACC
830,158 UART: [kat] ECC-384
3,112,611 UART: [kat] HMAC-384Kdf
3,124,839 UART: [kat] LMS
4,314,908 UART: [kat] --
4,319,656 UART: [cold-reset] ++
4,321,482 UART: [fht] Storing FHT @ 0x50003400
4,333,296 UART: [idev] ++
4,333,859 UART: [idev] CDI.KEYID = 6
4,334,795 UART: [idev] SUBJECT.KEYID = 7
4,336,065 UART: [idev] UDS.KEYID = 0
4,338,506 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,497 UART: [idev] Erasing UDS.KEYID = 0
7,624,107 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,422 UART: [idev] --
7,649,522 UART: [ldev] ++
7,650,091 UART: [ldev] CDI.KEYID = 6
7,651,059 UART: [ldev] SUBJECT.KEYID = 5
7,652,276 UART: [ldev] AUTHORITY.KEYID = 7
7,653,511 UART: [ldev] FE.KEYID = 1
7,663,835 UART: [ldev] Erasing FE.KEYID = 1
10,951,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,655 UART: [ldev] --
13,314,080 UART: [fwproc] Waiting for Commands...
13,316,458 UART: [fwproc] Received command 0x46574c44
13,318,648 UART: [fwproc] Received Image of size 113760 bytes
17,366,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,874 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,832,197 >>> mbox cmd response: success
17,834,408 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
17,958,862 UART: [afmc] ++
17,959,498 UART: [afmc] CDI.KEYID = 6
17,960,438 UART: [afmc] SUBJECT.KEYID = 7
17,961,482 UART: [afmc] AUTHORITY.KEYID = 5
21,151,902 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,164 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,555 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,358 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,840 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,017 UART: [afmc] --
23,519,728 UART: [cold-reset] --
23,524,672 UART: [state] Locking Datavault
23,529,651 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,407 UART: [state] Locking ICCM
23,533,774 UART: [exit] Launching FMC @ 0x40000130
23,542,167 UART:
23,542,403 UART: Running Caliptra FMC ...
23,543,527 UART:
23,543,694 UART: [state] CFI Enabled
23,551,714 UART: [fht] FMC Alias Private Key: 7
25,882,751 UART: [art] Extend RT PCRs Done
25,883,975 UART: [art] Lock RT PCRs Done
25,885,687 UART: [art] Populate DV Done
25,891,210 UART: [fht] FMC Alias Private Key: 7
25,892,861 UART: [art] Derive CDI
25,893,674 UART: [art] Store in in slot 0x4
25,936,164 UART: [art] Derive Key Pair
25,937,206 UART: [art] Store priv key in slot 0x5
29,179,443 UART: [art] Derive Key Pair - Done
29,192,553 UART: [art] Signing Cert with AUTHO
29,193,860 UART: RITY.KEYID = 7
31,473,699 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,213 UART: [art] PUB.X = 8744D7076BAAE14A0968CE962191B9B1F9253F016B1A40E4A8B517002E06DA845F7AC88E8E4EB227DCEBAA4C4835C7E2
31,482,450 UART: [art] PUB.Y = CE6BB6FB1E2D1CE9FA0DBAF7172F3CD7E4917828BA357E17B138607059532694007E05DA8B32B62D87EB4806441B18FD
31,489,673 UART: [art] SIG.R = 7E225F11DF9EE60E70B4A5AC5F21FB829AEAE5F6C35FEB74F3E2DE5A3039B14526F5141B37F9006D908FB52EB22345D8
31,497,104 UART: [art] SIG.S = CF138D6FDD2C953588A074B81F7A0EDD57B0E04513B8EAED6CA32A385FC3DCC5C7D3AAFEC3331BD4DCBB6317DC10AEB8
32,803,259 UART: Caliptra RT
32,803,949 UART: [state] CFI Enabled
32,921,605 UART: [rt] RT listening for mailbox commands...
32,924,823 UART:
32,925,071 UART: Running Caliptra ROM ...
32,926,183 UART:
32,926,451 UART: [state] CFI Enabled
32,940,062 UART: [state] LifecycleState = Unprovisioned
32,941,983 UART: [state] DebugLocked = No
32,943,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,948,849 UART: [kat] SHA2-256
33,118,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,129,095 UART: [kat] ++
33,129,602 UART: [kat] sha1
33,139,625 UART: [kat] SHA2-256
33,142,374 UART: [kat] SHA2-384
33,147,876 UART: [kat] SHA2-512-ACC
33,150,221 UART: [kat] ECC-384
35,435,607 UART: [kat] HMAC-384Kdf
35,447,296 UART: [kat] LMS
36,637,329 UART: [kat] --
36,642,536 UART: [update-reset] ++
39,441,977 >>> mbox cmd response: failed
39,443,755 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
39,586,950 UART: ROM Non-Fatal Error: 0x000B001F
39,588,397 UART: [state] Locking Datavault
39,589,509 UART: [state] Locking PCR0, PCR1 and PCR31
39,591,061 UART: [state] Locking ICCM
39,591,943 UART: [exit] Launching FMC @ 0x40000130
39,593,304 UART:
39,593,450 UART: Running Caliptra FMC ...
39,594,557 UART:
39,594,711 UART: [state] CFI Enabled
39,595,543 UART: [art] Extend RT PCRs Done
39,596,591 UART: [art] Lock RT PCRs Done
39,597,657 UART: [art] Populate DV Done
39,598,605 UART: [fht] FMC Alias Private Key: 7
39,599,835 UART: [art] Derive CDI
39,600,563 UART: [art] Store in in slot 0x4
39,601,732 UART: [art] Derive Key Pair
39,602,644 UART: [art] Store priv key in slot 0x5
42,805,105 UART: [art] Derive Key Pair - Done
42,818,106 UART: [art] Signing Cert with AUTHO
42,819,409 UART: RITY.KEYID = 7
45,098,702 UART: [art] Erasing AUTHORITY.KEYID = 7
45,100,229 UART: [art] PUB.X = 8744D7076BAAE14A0968CE962191B9B1F9253F016B1A40E4A8B517002E06DA845F7AC88E8E4EB227DCEBAA4C4835C7E2
45,107,479 UART: [art] PUB.Y = CE6BB6FB1E2D1CE9FA0DBAF7172F3CD7E4917828BA357E17B138607059532694007E05DA8B32B62D87EB4806441B18FD
45,114,701 UART: [art] SIG.R = 7E225F11DF9EE60E70B4A5AC5F21FB829AEAE5F6C35FEB74F3E2DE5A3039B14526F5141B37F9006D908FB52EB22345D8
45,122,088 UART: [art] SIG.S = CF138D6FDD2C953588A074B81F7A0EDD57B0E04513B8EAED6CA32A385FC3DCC5C7D3AAFEC3331BD4DCBB6317DC10AEB8
46,427,704 UART: Caliptra RT
46,428,421 UART: [state] CFI Enabled
46,713,509 UART: [rt] RT listening for mailbox commands...
46,716,096 UART:
46,716,295 UART: Running Caliptra ROM ...
46,717,318 UART:
46,717,741 UART: [state] CFI Enabled
46,734,061 UART: [state] LifecycleState = Unprovisioned
46,735,952 UART: [state] DebugLocked = No
46,738,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,744,493 UART: [kat] SHA2-256
46,914,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
46,924,715 UART: [kat] ++
46,925,310 UART: [kat] sha1
46,936,256 UART: [kat] SHA2-256
46,938,985 UART: [kat] SHA2-384
46,945,191 UART: [kat] SHA2-512-ACC
46,947,597 UART: [kat] ECC-384
49,233,337 UART: [kat] HMAC-384Kdf
49,246,314 UART: [kat] LMS
50,436,334 UART: [kat] --
50,441,475 UART: [update-reset] ++
54,579,356 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,582,300 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
54,963,273 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,131,162 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,065,783 >>> mbox cmd response: success
18,068,093 <<< Executing mbox cmd 0x46574c44 (99036 bytes) from SoC
23,703,855 UART:
23,704,251 UART: Running Caliptra FMC ...
23,705,400 UART:
23,705,582 UART: [state] CFI Enabled
23,713,506 UART: [fht] FMC Alias Private Key: 7
26,043,739 UART: [art] Extend RT PCRs Done
26,044,964 UART: [art] Lock RT PCRs Done
26,046,432 UART: [art] Populate DV Done
26,052,001 UART: [fht] FMC Alias Private Key: 7
26,053,557 UART: [art] Derive CDI
26,054,300 UART: [art] Store in in slot 0x4
26,096,786 UART: [art] Derive Key Pair
26,097,786 UART: [art] Store priv key in slot 0x5
29,339,964 UART: [art] Derive Key Pair - Done
29,352,970 UART: [art] Signing Cert with AUTHO
29,354,280 UART: RITY.KEYID = 7
31,633,902 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,419 UART: [art] PUB.X = 240400283F417C835EF011E8D512DA0A2B57D9D5134E9214CB91C8F73494BAF2A18F8AF69B3C2CF7902AC62C8CA98F50
31,642,636 UART: [art] PUB.Y = D03557851AB84B9A53271AE2E65EAC35AEB13CCD3465254C4F920C87CF9DABC67828866B2CE15161643E1B3311527F1D
31,649,896 UART: [art] SIG.R = 81B6BAD7EA68A3C5688CFFA2D0798A88AD0B51B76D48D1EDCBB8C81B01561476E38CFB7276BB0F2C75E3587D461FEB9C
31,657,306 UART: [art] SIG.S = 6487C87FE474AD902130E3F03F3982CA6AFBB59A0682B866BB906129C4AE94F0A74FAF9053AE0AD95E1B116AD5B65440
32,962,986 UART: Caliptra RT
32,963,706 UART: [state] CFI Enabled
33,081,710 UART: [rt] RT listening for mailbox commands...
39,423,593 >>> mbox cmd response: failed
39,425,528 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
39,568,525 UART:
39,568,851 UART: Running Caliptra FMC ...
39,569,977 UART:
39,570,153 UART: [state] CFI Enabled
39,571,077 UART: [art] Extend RT PCRs Done
39,572,220 UART: [art] Lock RT PCRs Done
39,573,287 UART: [art] Populate DV Done
39,574,408 UART: [fht] FMC Alias Private Key: 7
39,575,738 UART: [art] Derive CDI
39,576,499 UART: [art] Store in in slot 0x4
39,577,671 UART: [art] Derive Key Pair
39,578,615 UART: [art] Store priv key in slot 0x5
42,775,914 UART: [art] Derive Key Pair - Done
42,788,870 UART: [art] Signing Cert with AUTHO
42,790,183 UART: RITY.KEYID = 7
45,069,697 UART: [art] Erasing AUTHORITY.KEYID = 7
45,071,215 UART: [art] PUB.X = 240400283F417C835EF011E8D512DA0A2B57D9D5134E9214CB91C8F73494BAF2A18F8AF69B3C2CF7902AC62C8CA98F50
45,078,460 UART: [art] PUB.Y = D03557851AB84B9A53271AE2E65EAC35AEB13CCD3465254C4F920C87CF9DABC67828866B2CE15161643E1B3311527F1D
45,085,723 UART: [art] SIG.R = 81B6BAD7EA68A3C5688CFFA2D0798A88AD0B51B76D48D1EDCBB8C81B01561476E38CFB7276BB0F2C75E3587D461FEB9C
45,093,136 UART: [art] SIG.S = 6487C87FE474AD902130E3F03F3982CA6AFBB59A0682B866BB906129C4AE94F0A74FAF9053AE0AD95E1B116AD5B65440
46,397,614 UART: Caliptra RT
46,398,372 UART: [state] CFI Enabled
46,685,097 UART: [rt] RT listening for mailbox commands...
55,192,004 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,207 UART:
192,571 UART: Running Caliptra ROM ...
193,773 UART:
193,942 UART: [state] CFI Enabled
261,079 UART: [state] LifecycleState = Unprovisioned
262,947 UART: [state] DebugLocked = No
265,194 UART: [state] WD Timer not started. Device not locked for debugging
268,777 UART: [kat] SHA2-256
447,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,494 UART: [kat] ++
460,027 UART: [kat] sha1
470,923 UART: [kat] SHA2-256
473,978 UART: [kat] SHA2-384
480,122 UART: [kat] SHA2-512-ACC
483,111 UART: [kat] ECC-384
2,945,795 UART: [kat] HMAC-384Kdf
2,969,375 UART: [kat] LMS
3,498,845 UART: [kat] --
3,502,352 UART: [cold-reset] ++
3,504,514 UART: [fht] FHT @ 0x50003400
3,515,691 UART: [idev] ++
3,516,260 UART: [idev] CDI.KEYID = 6
3,517,141 UART: [idev] SUBJECT.KEYID = 7
3,518,353 UART: [idev] UDS.KEYID = 0
3,520,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,555 UART: [idev] Erasing UDS.KEYID = 0
6,027,099 UART: [idev] Sha1 KeyId Algorithm
6,051,637 UART: [idev] --
6,056,668 UART: [ldev] ++
6,057,244 UART: [ldev] CDI.KEYID = 6
6,058,156 UART: [ldev] SUBJECT.KEYID = 5
6,059,374 UART: [ldev] AUTHORITY.KEYID = 7
6,060,610 UART: [ldev] FE.KEYID = 1
6,097,446 UART: [ldev] Erasing FE.KEYID = 1
8,603,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,131 UART: [ldev] --
10,411,969 UART: [fwproc] Wait for Commands...
10,413,528 UART: [fwproc] Recv command 0x46574c44
10,415,625 UART: [fwproc] Recv'd Img size: 114084 bytes
13,816,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,281,546 >>> mbox cmd response: success
14,283,461 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
14,408,672 UART: [afmc] ++
14,409,305 UART: [afmc] CDI.KEYID = 6
14,410,194 UART: [afmc] SUBJECT.KEYID = 7
14,411,323 UART: [afmc] AUTHORITY.KEYID = 5
16,825,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,995 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,195 UART: [afmc] --
18,623,577 UART: [cold-reset] --
18,625,967 UART: [state] Locking Datavault
18,631,333 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,981 UART: [state] Locking ICCM
18,634,708 UART: [exit] Launching FMC @ 0x40000130
18,643,157 UART:
18,643,394 UART: Running Caliptra FMC ...
18,644,497 UART:
18,644,690 UART: [state] CFI Enabled
18,708,425 UART: [fht] FMC Alias Private Key: 7
20,471,794 UART: [art] Extend RT PCRs Done
20,473,019 UART: [art] Lock RT PCRs Done
20,474,433 UART: [art] Populate DV Done
20,479,851 UART: [fht] FMC Alias Private Key: 7
20,481,499 UART: [art] Derive CDI
20,482,320 UART: [art] Store in in slot 0x4
20,541,051 UART: [art] Derive Key Pair
20,542,122 UART: [art] Store priv key in slot 0x5
23,005,617 UART: [art] Derive Key Pair - Done
23,018,291 UART: [art] Signing Cert with AUTHO
23,019,605 UART: RITY.KEYID = 7
24,731,875 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,398 UART: [art] PUB.X = 1F6CBBF175A16C432FD8DBDDCC2272A73CA242C51F014F48B2C8472A4CF7CBB41D4925A219575E3043A7C297188BE104
24,740,665 UART: [art] PUB.Y = FE8A8BF2AF1EB28E013295486B81FE37E92DFCD0D2A9E53681E5B877E67391B4660DCCBD5BBB82CEA470815FFBEA1B68
24,747,981 UART: [art] SIG.R = 963340C2A54546DD0418E1F86873564ECCC7734BD285421B36CFB266DFCC4037EE282E22D9A26FCBB27F4E265D77739A
24,755,346 UART: [art] SIG.S = 81408A035B6F73C14E5971B8B672DBF1EE7E80BFA029E527C24C16498893D3431D6603F48AAB75245C89AE73DD3FC230
25,734,656 UART: Caliptra RT
25,735,375 UART: [state] CFI Enabled
25,899,456 UART: [rt] RT listening for mailbox commands...
25,902,257 UART:
25,902,436 UART: Running Caliptra ROM ...
25,903,747 UART:
25,903,917 UART: [state] CFI Enabled
25,967,826 UART: [state] LifecycleState = Unprovisioned
25,969,662 UART: [state] DebugLocked = No
25,971,989 UART: [state] WD Timer not started. Device not locked for debugging
25,975,778 UART: [kat] SHA2-256
26,154,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,166,459 UART: [kat] ++
26,166,915 UART: [kat] sha1
26,177,763 UART: [kat] SHA2-256
26,180,783 UART: [kat] SHA2-384
26,188,392 UART: [kat] SHA2-512-ACC
26,191,327 UART: [kat] ECC-384
28,649,081 UART: [kat] HMAC-384Kdf
28,673,568 UART: [kat] LMS
29,203,036 UART: [kat] --
29,207,306 UART: [update-reset] ++
31,288,532 >>> mbox cmd response: failed
31,290,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,434,258 UART: ROM Non-Fatal Error: 0x000B001F
31,435,687 UART: [state] Locking Datavault
31,436,765 UART: [state] Locking PCR0, PCR1 and PCR31
31,438,302 UART: [state] Locking ICCM
31,439,216 UART: [exit] Launching FMC @ 0x40000130
31,440,643 UART:
31,440,821 UART: Running Caliptra FMC ...
31,441,917 UART:
31,442,070 UART: [state] CFI Enabled
31,442,989 UART: [art] Extend RT PCRs Done
31,444,126 UART: [art] Lock RT PCRs Done
31,445,188 UART: [art] Populate DV Done
31,446,215 UART: [fht] FMC Alias Private Key: 7
31,447,531 UART: [art] Derive CDI
31,448,262 UART: [art] Store in in slot 0x4
31,484,858 UART: [art] Derive Key Pair
31,485,856 UART: [art] Store priv key in slot 0x5
33,948,746 UART: [art] Derive Key Pair - Done
33,961,798 UART: [art] Signing Cert with AUTHO
33,963,112 UART: RITY.KEYID = 7
35,674,703 UART: [art] Erasing AUTHORITY.KEYID = 7
35,676,183 UART: [art] PUB.X = 1F6CBBF175A16C432FD8DBDDCC2272A73CA242C51F014F48B2C8472A4CF7CBB41D4925A219575E3043A7C297188BE104
35,683,498 UART: [art] PUB.Y = FE8A8BF2AF1EB28E013295486B81FE37E92DFCD0D2A9E53681E5B877E67391B4660DCCBD5BBB82CEA470815FFBEA1B68
35,690,785 UART: [art] SIG.R = 963340C2A54546DD0418E1F86873564ECCC7734BD285421B36CFB266DFCC4037EE282E22D9A26FCBB27F4E265D77739A
35,698,186 UART: [art] SIG.S = 81408A035B6F73C14E5971B8B672DBF1EE7E80BFA029E527C24C16498893D3431D6603F48AAB75245C89AE73DD3FC230
36,676,937 UART: Caliptra RT
36,677,651 UART: [state] CFI Enabled
37,011,618 UART: [rt] RT listening for mailbox commands...
37,014,254 UART:
37,014,425 UART: Running Caliptra ROM ...
37,015,538 UART:
37,015,696 UART: [state] CFI Enabled
37,080,266 UART: [state] LifecycleState = Unprovisioned
37,082,144 UART: [state] DebugLocked = No
37,084,691 UART: [state] WD Timer not started. Device not locked for debugging
37,088,860 UART: [kat] SHA2-256
37,267,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
37,279,505 UART: [kat] ++
37,279,978 UART: [kat] sha1
37,290,808 UART: [kat] SHA2-256
37,293,871 UART: [kat] SHA2-384
37,299,695 UART: [kat] SHA2-512-ACC
37,302,635 UART: [kat] ECC-384
39,762,459 UART: [kat] HMAC-384Kdf
39,786,957 UART: [kat] LMS
40,316,418 UART: [kat] --
40,321,725 UART: [update-reset] ++
43,747,868 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,751,600 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
44,133,596 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,402,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,076,988 >>> mbox cmd response: success
14,079,520 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
18,361,675 UART:
18,362,114 UART: Running Caliptra FMC ...
18,363,283 UART:
18,363,447 UART: [state] CFI Enabled
18,428,708 UART: [fht] FMC Alias Private Key: 7
20,192,982 UART: [art] Extend RT PCRs Done
20,194,203 UART: [art] Lock RT PCRs Done
20,195,477 UART: [art] Populate DV Done
20,200,750 UART: [fht] FMC Alias Private Key: 7
20,202,293 UART: [art] Derive CDI
20,203,029 UART: [art] Store in in slot 0x4
20,261,453 UART: [art] Derive Key Pair
20,262,498 UART: [art] Store priv key in slot 0x5
22,724,810 UART: [art] Derive Key Pair - Done
22,737,967 UART: [art] Signing Cert with AUTHO
22,739,274 UART: RITY.KEYID = 7
24,450,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,251 UART: [art] PUB.X = 3E1DF41E89940F0B5394508CB682BF78D1CFA7BBC92EB92C74A4570138D708ADF6B5EFB289A6E28A0D59FB06BC8664D1
24,459,543 UART: [art] PUB.Y = F71A35557F2DC932C09319F85CA97729F5A6212BFDB11A2C824376CFFF39B4D506A8BAE2EA4BC443D8E8076EDFBEF31D
24,466,812 UART: [art] SIG.R = 5DD3F32B716AD9DD85BC04B5BEC0659AB316AA2D1C01AFE834FB2A058C9D9AAB9AEF3C2FCAFB3F53A6DE6E643C70EC3F
24,474,268 UART: [art] SIG.S = AC0408A366FA67DD2C3D6EF685C1A3031CB32AE4814CFCC66E05BEB58977EFEBC105922D3EA73921FCA0735CB0491B9E
25,452,906 UART: Caliptra RT
25,453,598 UART: [state] CFI Enabled
25,617,820 UART: [rt] RT listening for mailbox commands...
30,876,214 >>> mbox cmd response: failed
30,878,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,021,651 UART:
31,021,974 UART: Running Caliptra FMC ...
31,023,097 UART:
31,023,267 UART: [state] CFI Enabled
31,024,196 UART: [art] Extend RT PCRs Done
31,025,339 UART: [art] Lock RT PCRs Done
31,026,406 UART: [art] Populate DV Done
31,027,532 UART: [fht] FMC Alias Private Key: 7
31,028,858 UART: [art] Derive CDI
31,029,597 UART: [art] Store in in slot 0x4
31,055,392 UART: [art] Derive Key Pair
31,056,393 UART: [art] Store priv key in slot 0x5
33,521,390 UART: [art] Derive Key Pair - Done
33,534,437 UART: [art] Signing Cert with AUTHO
33,535,749 UART: RITY.KEYID = 7
35,246,858 UART: [art] Erasing AUTHORITY.KEYID = 7
35,248,373 UART: [art] PUB.X = 3E1DF41E89940F0B5394508CB682BF78D1CFA7BBC92EB92C74A4570138D708ADF6B5EFB289A6E28A0D59FB06BC8664D1
35,255,687 UART: [art] PUB.Y = F71A35557F2DC932C09319F85CA97729F5A6212BFDB11A2C824376CFFF39B4D506A8BAE2EA4BC443D8E8076EDFBEF31D
35,262,908 UART: [art] SIG.R = 5DD3F32B716AD9DD85BC04B5BEC0659AB316AA2D1C01AFE834FB2A058C9D9AAB9AEF3C2FCAFB3F53A6DE6E643C70EC3F
35,270,352 UART: [art] SIG.S = AC0408A366FA67DD2C3D6EF685C1A3031CB32AE4814CFCC66E05BEB58977EFEBC105922D3EA73921FCA0735CB0491B9E
36,249,146 UART: Caliptra RT
36,249,844 UART: [state] CFI Enabled
36,585,489 UART: [rt] RT listening for mailbox commands...
43,546,469 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,521 writing to cptra_bootfsm_go
192,684 UART:
193,047 UART: Running Caliptra ROM ...
194,248 UART:
603,678 UART: [state] CFI Enabled
617,584 UART: [state] LifecycleState = Unprovisioned
619,498 UART: [state] DebugLocked = No
620,992 UART: [state] WD Timer not started. Device not locked for debugging
623,975 UART: [kat] SHA2-256
803,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,662 UART: [kat] ++
815,198 UART: [kat] sha1
826,036 UART: [kat] SHA2-256
829,047 UART: [kat] SHA2-384
835,243 UART: [kat] SHA2-512-ACC
838,229 UART: [kat] ECC-384
3,278,556 UART: [kat] HMAC-384Kdf
3,291,173 UART: [kat] LMS
3,820,655 UART: [kat] --
3,826,269 UART: [cold-reset] ++
3,827,119 UART: [fht] FHT @ 0x50003400
3,839,070 UART: [idev] ++
3,839,644 UART: [idev] CDI.KEYID = 6
3,840,529 UART: [idev] SUBJECT.KEYID = 7
3,841,693 UART: [idev] UDS.KEYID = 0
3,844,184 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,785 UART: [idev] Erasing UDS.KEYID = 0
6,312,789 UART: [idev] Sha1 KeyId Algorithm
6,336,566 UART: [idev] --
6,339,591 UART: [ldev] ++
6,340,156 UART: [ldev] CDI.KEYID = 6
6,341,042 UART: [ldev] SUBJECT.KEYID = 5
6,342,259 UART: [ldev] AUTHORITY.KEYID = 7
6,343,492 UART: [ldev] FE.KEYID = 1
6,354,898 UART: [ldev] Erasing FE.KEYID = 1
8,826,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,273 UART: [ldev] --
10,618,525 UART: [fwproc] Wait for Commands...
10,620,117 UART: [fwproc] Recv command 0x46574c44
10,622,220 UART: [fwproc] Recv'd Img size: 114084 bytes
14,009,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,082,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,151,361 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,467,586 >>> mbox cmd response: success
14,469,536 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
14,594,288 UART: [afmc] ++
14,594,923 UART: [afmc] CDI.KEYID = 6
14,595,814 UART: [afmc] SUBJECT.KEYID = 7
14,596,919 UART: [afmc] AUTHORITY.KEYID = 5
16,974,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,695,878 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,697,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,713,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,729,572 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,745,481 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,767,696 UART: [afmc] --
18,770,651 UART: [cold-reset] --
18,772,838 UART: [state] Locking Datavault
18,779,830 UART: [state] Locking PCR0, PCR1 and PCR31
18,781,477 UART: [state] Locking ICCM
18,782,929 UART: [exit] Launching FMC @ 0x40000130
18,791,325 UART:
18,791,561 UART: Running Caliptra FMC ...
18,792,663 UART:
18,792,825 UART: [state] CFI Enabled
18,800,928 UART: [fht] FMC Alias Private Key: 7
20,558,300 UART: [art] Extend RT PCRs Done
20,559,532 UART: [art] Lock RT PCRs Done
20,560,753 UART: [art] Populate DV Done
20,566,108 UART: [fht] FMC Alias Private Key: 7
20,567,614 UART: [art] Derive CDI
20,568,376 UART: [art] Store in in slot 0x4
20,610,699 UART: [art] Derive Key Pair
20,611,749 UART: [art] Store priv key in slot 0x5
23,039,013 UART: [art] Derive Key Pair - Done
23,052,015 UART: [art] Signing Cert with AUTHO
23,053,330 UART: RITY.KEYID = 7
24,758,695 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,211 UART: [art] PUB.X = D247192A5F7C19147A16A45DBE34713C03392D6A25D50AE1977BDD9B347061C5705555549561A8138A61CF563C88D9D8
24,767,452 UART: [art] PUB.Y = 512207D6B6A7160101D50A207E20DA8BBA31750E376E739820DA98A9A39FECDB48A08C0C79C1E2806F0476CC72268898
24,774,710 UART: [art] SIG.R = 0CC8CEF9D53CBB6303984A2B4312B84CC44F442E374C26F08C42B56B60BD74A8565527EE61A9A320CB2B13504DB78A89
24,782,065 UART: [art] SIG.S = 176870E3256F9A3DD8F8802CAE96E41444D77715855701A95B1112E865CB29B85C8F1F3067DC6ED25749474A4764AA78
25,761,266 UART: Caliptra RT
25,761,974 UART: [state] CFI Enabled
25,879,665 UART: [rt] RT listening for mailbox commands...
25,882,782 UART:
25,883,062 UART: Running Caliptra ROM ...
25,884,176 UART:
25,884,333 UART: [state] CFI Enabled
25,898,977 UART: [state] LifecycleState = Unprovisioned
25,900,845 UART: [state] DebugLocked = No
25,903,145 UART: [state] WD Timer not started. Device not locked for debugging
25,906,352 UART: [kat] SHA2-256
26,085,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,097,098 UART: [kat] ++
26,097,635 UART: [kat] sha1
26,110,308 UART: [kat] SHA2-256
26,113,314 UART: [kat] SHA2-384
26,118,919 UART: [kat] SHA2-512-ACC
26,121,855 UART: [kat] ECC-384
28,565,650 UART: [kat] HMAC-384Kdf
28,578,196 UART: [kat] LMS
29,107,731 UART: [kat] --
29,112,268 UART: [update-reset] ++
31,200,734 >>> mbox cmd response: failed
31,202,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,345,832 UART: ROM Non-Fatal Error: 0x000B001F
31,347,268 UART: [state] Locking Datavault
31,348,371 UART: [state] Locking PCR0, PCR1 and PCR31
31,349,914 UART: [state] Locking ICCM
31,350,796 UART: [exit] Launching FMC @ 0x40000130
31,352,215 UART:
31,352,378 UART: Running Caliptra FMC ...
31,353,477 UART:
31,353,630 UART: [state] CFI Enabled
31,354,547 UART: [art] Extend RT PCRs Done
31,355,685 UART: [art] Lock RT PCRs Done
31,356,754 UART: [art] Populate DV Done
31,357,803 UART: [fht] FMC Alias Private Key: 7
31,359,122 UART: [art] Derive CDI
31,359,857 UART: [art] Store in in slot 0x4
31,361,028 UART: [art] Derive Key Pair
31,361,969 UART: [art] Store priv key in slot 0x5
33,747,180 UART: [art] Derive Key Pair - Done
33,760,191 UART: [art] Signing Cert with AUTHO
33,761,498 UART: RITY.KEYID = 7
35,467,221 UART: [art] Erasing AUTHORITY.KEYID = 7
35,468,703 UART: [art] PUB.X = D247192A5F7C19147A16A45DBE34713C03392D6A25D50AE1977BDD9B347061C5705555549561A8138A61CF563C88D9D8
35,475,949 UART: [art] PUB.Y = 512207D6B6A7160101D50A207E20DA8BBA31750E376E739820DA98A9A39FECDB48A08C0C79C1E2806F0476CC72268898
35,483,170 UART: [art] SIG.R = 0CC8CEF9D53CBB6303984A2B4312B84CC44F442E374C26F08C42B56B60BD74A8565527EE61A9A320CB2B13504DB78A89
35,490,784 UART: [art] SIG.S = 176870E3256F9A3DD8F8802CAE96E41444D77715855701A95B1112E865CB29B85C8F1F3067DC6ED25749474A4764AA78
36,468,888 UART: Caliptra RT
36,469,606 UART: [state] CFI Enabled
36,757,173 UART: [rt] RT listening for mailbox commands...
36,760,043 UART:
36,760,301 UART: Running Caliptra ROM ...
36,761,413 UART:
36,761,626 UART: [state] CFI Enabled
40,315,062 UART: [state] LifecycleState = Unprovisioned
40,316,985 UART: [state] DebugLocked = No
40,318,570 UART: [state] WD Timer not started. Device not locked for debugging
40,322,849 UART: [kat] SHA2-256
40,502,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,513,629 UART: [kat] ++
40,514,087 UART: [kat] sha1
40,525,677 UART: [kat] SHA2-256
40,528,748 UART: [kat] SHA2-384
40,534,778 UART: [kat] SHA2-512-ACC
40,537,699 UART: [kat] ECC-384
42,979,794 UART: [kat] HMAC-384Kdf
42,993,824 UART: [kat] LMS
43,523,351 UART: [kat] --
43,527,231 UART: [update-reset] ++
46,953,294 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,956,090 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,338,092 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,698,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,272,898 >>> mbox cmd response: success
14,275,068 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
18,525,056 UART:
18,525,466 UART: Running Caliptra FMC ...
18,526,573 UART:
18,526,733 UART: [state] CFI Enabled
18,534,886 UART: [fht] FMC Alias Private Key: 7
20,291,595 UART: [art] Extend RT PCRs Done
20,292,833 UART: [art] Lock RT PCRs Done
20,294,651 UART: [art] Populate DV Done
20,299,913 UART: [fht] FMC Alias Private Key: 7
20,301,459 UART: [art] Derive CDI
20,302,282 UART: [art] Store in in slot 0x4
20,344,995 UART: [art] Derive Key Pair
20,346,040 UART: [art] Store priv key in slot 0x5
22,773,280 UART: [art] Derive Key Pair - Done
22,786,134 UART: [art] Signing Cert with AUTHO
22,787,438 UART: RITY.KEYID = 7
24,492,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,334 UART: [art] PUB.X = 88184AA975D0CF64A7A2CEA2A74F18A0FBB21454165536B7E71CCBA69258F82D1836B2D5033994C3F3C3ADE5E3146570
24,501,603 UART: [art] PUB.Y = 2ACA0DB5C89DF88CC61C02F6244CD60F0AAE3D1D58D92102B9152829B2395E1BF15A6E7BC8BF0D3DB1D01B76513DE5AB
24,508,869 UART: [art] SIG.R = 3FA86D7D8EFF42F1877B929C78E36815F7645F2FB019AE983FCCC83A9A36C35DB6E4BF7A00AC9DD3B64A1BFA100B3EE1
24,516,257 UART: [art] SIG.S = 316091D97C43B89083EE27F0128EB9B0513742C902B671F6417E57CE5A6A7E38B534855B98D1537A3A1351B81EE30EE8
25,494,862 UART: Caliptra RT
25,495,553 UART: [state] CFI Enabled
25,612,805 UART: [rt] RT listening for mailbox commands...
30,777,000 >>> mbox cmd response: failed
30,778,899 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,922,331 UART:
30,922,652 UART: Running Caliptra FMC ...
30,923,724 UART:
30,923,878 UART: [state] CFI Enabled
30,924,827 UART: [art] Extend RT PCRs Done
30,925,970 UART: [art] Lock RT PCRs Done
30,927,037 UART: [art] Populate DV Done
30,928,145 UART: [fht] FMC Alias Private Key: 7
30,929,469 UART: [art] Derive CDI
30,930,211 UART: [art] Store in in slot 0x4
30,931,379 UART: [art] Derive Key Pair
30,932,320 UART: [art] Store priv key in slot 0x5
33,315,131 UART: [art] Derive Key Pair - Done
33,328,022 UART: [art] Signing Cert with AUTHO
33,329,328 UART: RITY.KEYID = 7
35,034,396 UART: [art] Erasing AUTHORITY.KEYID = 7
35,035,907 UART: [art] PUB.X = 88184AA975D0CF64A7A2CEA2A74F18A0FBB21454165536B7E71CCBA69258F82D1836B2D5033994C3F3C3ADE5E3146570
35,043,164 UART: [art] PUB.Y = 2ACA0DB5C89DF88CC61C02F6244CD60F0AAE3D1D58D92102B9152829B2395E1BF15A6E7BC8BF0D3DB1D01B76513DE5AB
35,050,478 UART: [art] SIG.R = 3FA86D7D8EFF42F1877B929C78E36815F7645F2FB019AE983FCCC83A9A36C35DB6E4BF7A00AC9DD3B64A1BFA100B3EE1
35,057,863 UART: [art] SIG.S = 316091D97C43B89083EE27F0128EB9B0513742C902B671F6417E57CE5A6A7E38B534855B98D1537A3A1351B81EE30EE8
36,036,737 UART: Caliptra RT
36,037,453 UART: [state] CFI Enabled
36,323,778 UART: [rt] RT listening for mailbox commands...
47,213,155 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,107 UART:
192,461 UART: Running Caliptra ROM ...
193,557 UART:
193,697 UART: [state] CFI Enabled
264,310 UART: [state] LifecycleState = Unprovisioned
266,664 UART: [state] DebugLocked = No
268,774 UART: [state] WD Timer not started. Device not locked for debugging
273,705 UART: [kat] SHA2-256
463,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,359 UART: [kat] ++
474,808 UART: [kat] sha1
487,683 UART: [kat] SHA2-256
490,707 UART: [kat] SHA2-384
497,521 UART: [kat] SHA2-512-ACC
500,088 UART: [kat] ECC-384
2,945,493 UART: [kat] HMAC-384Kdf
2,971,295 UART: [kat] LMS
3,503,034 UART: [kat] --
3,507,137 UART: [cold-reset] ++
3,508,497 UART: [fht] FHT @ 0x50003400
3,521,003 UART: [idev] ++
3,521,738 UART: [idev] CDI.KEYID = 6
3,522,801 UART: [idev] SUBJECT.KEYID = 7
3,523,907 UART: [idev] UDS.KEYID = 0
3,526,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,121 UART: [idev] Erasing UDS.KEYID = 0
6,031,052 UART: [idev] Sha1 KeyId Algorithm
6,054,573 UART: [idev] --
6,058,030 UART: [ldev] ++
6,058,734 UART: [ldev] CDI.KEYID = 6
6,059,617 UART: [ldev] SUBJECT.KEYID = 5
6,060,777 UART: [ldev] AUTHORITY.KEYID = 7
6,062,066 UART: [ldev] FE.KEYID = 1
6,098,682 UART: [ldev] Erasing FE.KEYID = 1
8,604,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,192 UART: [ldev] --
10,413,224 UART: [fwproc] Wait for Commands...
10,416,083 UART: [fwproc] Recv command 0x46574c44
10,418,350 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,604,760 >>> mbox cmd response: success
14,606,838 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
14,731,961 UART: [afmc] ++
14,732,615 UART: [afmc] CDI.KEYID = 6
14,733,712 UART: [afmc] SUBJECT.KEYID = 7
14,734,825 UART: [afmc] AUTHORITY.KEYID = 5
17,148,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,006 UART: [afmc] --
18,947,916 UART: [cold-reset] --
18,952,151 UART: [state] Locking Datavault
18,958,788 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,996 UART: [state] Locking ICCM
18,962,395 UART: [exit] Launching FMC @ 0x40000130
18,971,017 UART:
18,971,255 UART: Running Caliptra FMC ...
18,972,356 UART:
18,972,513 UART: [state] CFI Enabled
19,028,954 UART: [fht] FMC Alias Private Key: 7
20,793,470 UART: [art] Extend RT PCRs Done
20,794,686 UART: [art] Lock RT PCRs Done
20,796,366 UART: [art] Populate DV Done
20,801,726 UART: [fht] FMC Alias Private Key: 7
20,803,424 UART: [art] Derive CDI
20,804,238 UART: [art] Store in in slot 0x4
20,862,932 UART: [art] Derive Key Pair
20,863,933 UART: [art] Store priv key in slot 0x5
23,326,098 UART: [art] Derive Key Pair - Done
23,338,958 UART: [art] Signing Cert with AUTHO
23,340,264 UART: RITY.KEYID = 7
25,052,921 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,454 UART: [art] PUB.X = AE9CB8BF8B9E55799993B250DBBADD08AEB89F12EB43FFD5D3658C21819004C526766DEB554F1770525DA70AF3C24E7E
25,061,680 UART: [art] PUB.Y = FF315A86CF7650918AFBB77816C92904714990605ECCC6ED1F074DA9CBE189ABD536313BDC713E52FA2E1471AA842100
25,068,929 UART: [art] SIG.R = ADAB121DF76E25C898C1783A4549493C4CA384041CB00E2F209AB0ADF906E9C67098EF2B4A62C17CDABB3E82944E4F59
25,076,333 UART: [art] SIG.S = CCBB79039E9A8F0B927B13ED3007B8F6F80FB33DAE8B091678BD5ADC282D0F3FF2ADCA66FBE74DCC6E0D64AFD9009D22
26,055,120 UART: Caliptra RT
26,055,847 UART: [state] CFI Enabled
26,220,504 UART: [rt] RT listening for mailbox commands...
26,223,426 UART:
26,223,676 UART: Running Caliptra ROM ...
26,224,786 UART:
26,224,944 UART: [state] CFI Enabled
26,287,011 UART: [state] LifecycleState = Unprovisioned
26,289,131 UART: [state] DebugLocked = No
26,291,710 UART: [state] WD Timer not started. Device not locked for debugging
26,296,337 UART: [kat] SHA2-256
26,486,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,496,951 UART: [kat] ++
26,497,437 UART: [kat] sha1
26,509,138 UART: [kat] SHA2-256
26,512,162 UART: [kat] SHA2-384
26,518,315 UART: [kat] SHA2-512-ACC
26,520,878 UART: [kat] ECC-384
28,969,951 UART: [kat] HMAC-384Kdf
28,993,357 UART: [kat] LMS
29,524,933 UART: [kat] --
29,530,429 UART: [update-reset] ++
31,629,008 >>> mbox cmd response: failed
31,630,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,774,528 UART: ROM Non-Fatal Error: 0x000B001F
31,775,962 UART: [state] Locking Datavault
31,777,032 UART: [state] Locking PCR0, PCR1 and PCR31
31,778,575 UART: [state] Locking ICCM
31,779,454 UART: [exit] Launching FMC @ 0x40000130
31,780,799 UART:
31,780,948 UART: Running Caliptra FMC ...
31,782,047 UART:
31,782,202 UART: [state] CFI Enabled
31,783,040 UART: [art] Extend RT PCRs Done
31,784,094 UART: [art] Lock RT PCRs Done
31,785,074 UART: [art] Populate DV Done
31,786,101 UART: [fht] FMC Alias Private Key: 7
31,787,421 UART: [art] Derive CDI
31,788,150 UART: [art] Store in in slot 0x4
31,826,068 UART: [art] Derive Key Pair
31,827,088 UART: [art] Store priv key in slot 0x5
34,290,085 UART: [art] Derive Key Pair - Done
34,302,880 UART: [art] Signing Cert with AUTHO
34,304,185 UART: RITY.KEYID = 7
36,015,747 UART: [art] Erasing AUTHORITY.KEYID = 7
36,017,247 UART: [art] PUB.X = AE9CB8BF8B9E55799993B250DBBADD08AEB89F12EB43FFD5D3658C21819004C526766DEB554F1770525DA70AF3C24E7E
36,024,552 UART: [art] PUB.Y = FF315A86CF7650918AFBB77816C92904714990605ECCC6ED1F074DA9CBE189ABD536313BDC713E52FA2E1471AA842100
36,031,806 UART: [art] SIG.R = ADAB121DF76E25C898C1783A4549493C4CA384041CB00E2F209AB0ADF906E9C67098EF2B4A62C17CDABB3E82944E4F59
36,039,213 UART: [art] SIG.S = CCBB79039E9A8F0B927B13ED3007B8F6F80FB33DAE8B091678BD5ADC282D0F3FF2ADCA66FBE74DCC6E0D64AFD9009D22
37,018,012 UART: Caliptra RT
37,018,722 UART: [state] CFI Enabled
37,354,593 UART: [rt] RT listening for mailbox commands...
37,357,180 UART:
37,357,344 UART: Running Caliptra ROM ...
37,358,454 UART:
37,358,609 UART: [state] CFI Enabled
37,420,038 UART: [state] LifecycleState = Unprovisioned
37,422,098 UART: [state] DebugLocked = No
37,424,158 UART: [state] WD Timer not started. Device not locked for debugging
37,429,059 UART: [kat] SHA2-256
37,618,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,629,715 UART: [kat] ++
37,630,169 UART: [kat] sha1
37,642,456 UART: [kat] SHA2-256
37,645,477 UART: [kat] SHA2-384
37,651,951 UART: [kat] SHA2-512-ACC
37,654,573 UART: [kat] ECC-384
40,104,010 UART: [kat] HMAC-384Kdf
40,127,636 UART: [kat] LMS
40,659,189 UART: [kat] --
40,662,385 UART: [update-reset] ++
44,115,124 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,118,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
44,724,851 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,441,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,724,341 >>> mbox cmd response: success
14,726,623 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
19,024,236 UART:
19,024,722 UART: Running Caliptra FMC ...
19,025,837 UART:
19,026,004 UART: [state] CFI Enabled
19,090,289 UART: [fht] FMC Alias Private Key: 7
20,854,357 UART: [art] Extend RT PCRs Done
20,855,592 UART: [art] Lock RT PCRs Done
20,857,327 UART: [art] Populate DV Done
20,862,755 UART: [fht] FMC Alias Private Key: 7
20,864,352 UART: [art] Derive CDI
20,865,115 UART: [art] Store in in slot 0x4
20,914,517 UART: [art] Derive Key Pair
20,915,563 UART: [art] Store priv key in slot 0x5
23,379,253 UART: [art] Derive Key Pair - Done
23,392,568 UART: [art] Signing Cert with AUTHO
23,393,931 UART: RITY.KEYID = 7
25,104,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,737 UART: [art] PUB.X = B7D7E160CECF9C8C6999DD9A7DCF0A50F2B3F23EB7C05B091D28DF5205CCACBD100CA058CB11CA10E44B9BAE33AE55F6
25,113,049 UART: [art] PUB.Y = 0B8630F7909E3A09A0F34157ABAD25CB4386B9C9F364E7E80193A10691FDB5CC7B88E6BA1E8D031CD8C4A04EFDE062B9
25,120,309 UART: [art] SIG.R = 0C4D8A8B9D6ACE2E097940DE5C80D3478F7E23370A10443CC672D07731926B8A270805BC76143738851361AE1ECDC6B0
25,127,714 UART: [art] SIG.S = D72628D8B437A80EB6D30BDD46E3C41E2E9808CEDE0F0BEC8BE5F8DBD75DF1514F6F2BB3CDE94B82D64D8C8D4EEA8FAA
26,106,589 UART: Caliptra RT
26,107,304 UART: [state] CFI Enabled
26,272,095 UART: [rt] RT listening for mailbox commands...
31,621,017 >>> mbox cmd response: failed
31,623,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,766,873 UART:
31,767,204 UART: Running Caliptra FMC ...
31,768,336 UART:
31,768,514 UART: [state] CFI Enabled
31,769,441 UART: [art] Extend RT PCRs Done
31,770,579 UART: [art] Lock RT PCRs Done
31,771,661 UART: [art] Populate DV Done
31,772,771 UART: [fht] FMC Alias Private Key: 7
31,774,093 UART: [art] Derive CDI
31,774,833 UART: [art] Store in in slot 0x4
31,793,898 UART: [art] Derive Key Pair
31,794,941 UART: [art] Store priv key in slot 0x5
34,258,188 UART: [art] Derive Key Pair - Done
34,271,028 UART: [art] Signing Cert with AUTHO
34,272,374 UART: RITY.KEYID = 7
35,984,361 UART: [art] Erasing AUTHORITY.KEYID = 7
35,985,909 UART: [art] PUB.X = B7D7E160CECF9C8C6999DD9A7DCF0A50F2B3F23EB7C05B091D28DF5205CCACBD100CA058CB11CA10E44B9BAE33AE55F6
35,993,176 UART: [art] PUB.Y = 0B8630F7909E3A09A0F34157ABAD25CB4386B9C9F364E7E80193A10691FDB5CC7B88E6BA1E8D031CD8C4A04EFDE062B9
36,000,470 UART: [art] SIG.R = 0C4D8A8B9D6ACE2E097940DE5C80D3478F7E23370A10443CC672D07731926B8A270805BC76143738851361AE1ECDC6B0
36,007,812 UART: [art] SIG.S = D72628D8B437A80EB6D30BDD46E3C41E2E9808CEDE0F0BEC8BE5F8DBD75DF1514F6F2BB3CDE94B82D64D8C8D4EEA8FAA
36,986,466 UART: Caliptra RT
36,987,170 UART: [state] CFI Enabled
37,323,696 UART: [rt] RT listening for mailbox commands...
44,990,801 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,548 UART:
192,906 UART: Running Caliptra ROM ...
194,009 UART:
603,688 UART: [state] CFI Enabled
617,893 UART: [state] LifecycleState = Unprovisioned
620,248 UART: [state] DebugLocked = No
622,297 UART: [state] WD Timer not started. Device not locked for debugging
626,001 UART: [kat] SHA2-256
815,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,484 UART: [kat] ++
826,996 UART: [kat] sha1
838,847 UART: [kat] SHA2-256
841,874 UART: [kat] SHA2-384
848,223 UART: [kat] SHA2-512-ACC
850,811 UART: [kat] ECC-384
3,292,390 UART: [kat] HMAC-384Kdf
3,305,486 UART: [kat] LMS
3,837,306 UART: [kat] --
3,841,130 UART: [cold-reset] ++
3,843,493 UART: [fht] FHT @ 0x50003400
3,855,608 UART: [idev] ++
3,856,289 UART: [idev] CDI.KEYID = 6
3,857,256 UART: [idev] SUBJECT.KEYID = 7
3,858,472 UART: [idev] UDS.KEYID = 0
3,860,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,517 UART: [idev] Erasing UDS.KEYID = 0
6,334,213 UART: [idev] Sha1 KeyId Algorithm
6,355,389 UART: [idev] --
6,361,588 UART: [ldev] ++
6,362,313 UART: [ldev] CDI.KEYID = 6
6,363,251 UART: [ldev] SUBJECT.KEYID = 5
6,364,358 UART: [ldev] AUTHORITY.KEYID = 7
6,365,534 UART: [ldev] FE.KEYID = 1
6,377,533 UART: [ldev] Erasing FE.KEYID = 1
8,853,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,148 UART: [ldev] --
10,644,007 UART: [fwproc] Wait for Commands...
10,646,594 UART: [fwproc] Recv command 0x46574c44
10,648,852 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,829,246 >>> mbox cmd response: success
14,831,395 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
14,956,388 UART: [afmc] ++
14,957,026 UART: [afmc] CDI.KEYID = 6
14,957,924 UART: [afmc] SUBJECT.KEYID = 7
14,958,973 UART: [afmc] AUTHORITY.KEYID = 5
17,341,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,003 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,021 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,391 UART: [afmc] --
19,138,742 UART: [cold-reset] --
19,141,038 UART: [state] Locking Datavault
19,148,719 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,935 UART: [state] Locking ICCM
19,152,169 UART: [exit] Launching FMC @ 0x40000130
19,160,838 UART:
19,161,075 UART: Running Caliptra FMC ...
19,162,387 UART:
19,162,550 UART: [state] CFI Enabled
19,170,330 UART: [fht] FMC Alias Private Key: 7
20,927,322 UART: [art] Extend RT PCRs Done
20,928,547 UART: [art] Lock RT PCRs Done
20,930,148 UART: [art] Populate DV Done
20,935,618 UART: [fht] FMC Alias Private Key: 7
20,937,264 UART: [art] Derive CDI
20,938,080 UART: [art] Store in in slot 0x4
20,980,731 UART: [art] Derive Key Pair
20,981,730 UART: [art] Store priv key in slot 0x5
23,408,613 UART: [art] Derive Key Pair - Done
23,421,415 UART: [art] Signing Cert with AUTHO
23,422,727 UART: RITY.KEYID = 7
25,127,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,252 UART: [art] PUB.X = D750FEF8C5E7C3207DF09010E7212AAFD7C0D474CFF5EF8920F3639D279BFAB37A4F3E06C57A5E36354F145C2A539CDB
25,136,538 UART: [art] PUB.Y = 2865BB3B198C01B92927050E11794A15ECBA812E4A232A1093D2335A254A4D246EF798A7568091222AB4FD0231AE5166
25,143,794 UART: [art] SIG.R = 45FD8D28D4B693361321A6AAB29A31720624BD667D0BBD4DF6A657A4218BE9B558520B4189796C3C3618DE9E975300A1
25,151,191 UART: [art] SIG.S = 2AE65BE542259178DCA45F7966283EA98224F4E0C1B98BF75E2FA3BFE5B0B37FEE70A2A0D2699ED97B6451762981EA61
26,129,843 UART: Caliptra RT
26,130,551 UART: [state] CFI Enabled
26,248,797 UART: [rt] RT listening for mailbox commands...
26,251,977 UART:
26,252,228 UART: Running Caliptra ROM ...
26,253,334 UART:
26,253,548 UART: [state] CFI Enabled
26,268,401 UART: [state] LifecycleState = Unprovisioned
26,270,233 UART: [state] DebugLocked = No
26,273,246 UART: [state] WD Timer not started. Device not locked for debugging
26,278,131 UART: [kat] SHA2-256
26,468,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,478,766 UART: [kat] ++
26,479,309 UART: [kat] sha1
26,491,117 UART: [kat] SHA2-256
26,494,080 UART: [kat] SHA2-384
26,498,773 UART: [kat] SHA2-512-ACC
26,501,335 UART: [kat] ECC-384
28,940,909 UART: [kat] HMAC-384Kdf
28,953,880 UART: [kat] LMS
29,485,471 UART: [kat] --
29,488,915 UART: [update-reset] ++
31,597,122 >>> mbox cmd response: failed
31,599,082 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,742,454 UART: ROM Non-Fatal Error: 0x000B001F
31,743,911 UART: [state] Locking Datavault
31,745,075 UART: [state] Locking PCR0, PCR1 and PCR31
31,746,540 UART: [state] Locking ICCM
31,747,414 UART: [exit] Launching FMC @ 0x40000130
31,748,840 UART:
31,748,992 UART: Running Caliptra FMC ...
31,750,004 UART:
31,750,156 UART: [state] CFI Enabled
31,750,995 UART: [art] Extend RT PCRs Done
31,752,074 UART: [art] Lock RT PCRs Done
31,753,079 UART: [art] Populate DV Done
31,754,047 UART: [fht] FMC Alias Private Key: 7
31,755,365 UART: [art] Derive CDI
31,756,099 UART: [art] Store in in slot 0x4
31,757,188 UART: [art] Derive Key Pair
31,758,185 UART: [art] Store priv key in slot 0x5
34,144,904 UART: [art] Derive Key Pair - Done
34,157,566 UART: [art] Signing Cert with AUTHO
34,158,866 UART: RITY.KEYID = 7
35,864,559 UART: [art] Erasing AUTHORITY.KEYID = 7
35,866,065 UART: [art] PUB.X = D750FEF8C5E7C3207DF09010E7212AAFD7C0D474CFF5EF8920F3639D279BFAB37A4F3E06C57A5E36354F145C2A539CDB
35,873,346 UART: [art] PUB.Y = 2865BB3B198C01B92927050E11794A15ECBA812E4A232A1093D2335A254A4D246EF798A7568091222AB4FD0231AE5166
35,880,579 UART: [art] SIG.R = 45FD8D28D4B693361321A6AAB29A31720624BD667D0BBD4DF6A657A4218BE9B558520B4189796C3C3618DE9E975300A1
35,888,018 UART: [art] SIG.S = 2AE65BE542259178DCA45F7966283EA98224F4E0C1B98BF75E2FA3BFE5B0B37FEE70A2A0D2699ED97B6451762981EA61
36,866,512 UART: Caliptra RT
36,867,234 UART: [state] CFI Enabled
37,154,683 UART: [rt] RT listening for mailbox commands...
37,157,370 UART:
37,157,624 UART: Running Caliptra ROM ...
37,158,742 UART:
37,158,951 UART: [state] CFI Enabled
40,323,052 UART: [state] LifecycleState = Unprovisioned
40,324,997 UART: [state] DebugLocked = No
40,326,310 UART: [state] WD Timer not started. Device not locked for debugging
40,330,980 UART: [kat] SHA2-256
40,520,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,531,661 UART: [kat] ++
40,532,183 UART: [kat] sha1
40,542,694 UART: [kat] SHA2-256
40,545,715 UART: [kat] SHA2-384
40,552,135 UART: [kat] SHA2-512-ACC
40,554,752 UART: [kat] ECC-384
42,999,692 UART: [kat] HMAC-384Kdf
43,011,968 UART: [kat] LMS
43,543,608 UART: [kat] --
43,546,731 UART: [update-reset] ++
47,007,028 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,009,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,615,599 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,754,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,948,964 >>> mbox cmd response: success
14,951,367 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
19,200,913 UART:
19,201,304 UART: Running Caliptra FMC ...
19,202,404 UART:
19,202,558 UART: [state] CFI Enabled
19,210,446 UART: [fht] FMC Alias Private Key: 7
20,966,969 UART: [art] Extend RT PCRs Done
20,968,217 UART: [art] Lock RT PCRs Done
20,969,781 UART: [art] Populate DV Done
20,975,229 UART: [fht] FMC Alias Private Key: 7
20,976,836 UART: [art] Derive CDI
20,977,658 UART: [art] Store in in slot 0x4
21,020,364 UART: [art] Derive Key Pair
21,021,367 UART: [art] Store priv key in slot 0x5
23,447,543 UART: [art] Derive Key Pair - Done
23,460,500 UART: [art] Signing Cert with AUTHO
23,461,804 UART: RITY.KEYID = 7
25,166,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,491 UART: [art] PUB.X = C2FD3C0C130E14496561CAEA34C37A68F5D5D4C8D8A93369D512530BF91B66DAA0483FC3E3555E5EE5133FE5F97DD3E6
25,175,766 UART: [art] PUB.Y = E352F1573E3B4808D00E7CB7E2DB2A75B04A0B8DB98CCA174D1A90E3AD9F2B2326F9123FF470363D126CDF6055F62837
25,182,985 UART: [art] SIG.R = BF10D5B0AD791F23B6873B69DE8D4A58B63295BA5D0E124A2399FF9DA151C75D31DC31CC9883A423C63B90E0EC002A9B
25,190,404 UART: [art] SIG.S = ED7ABB664FB9333A123CCF86F7E570556C3A3AFDDF0CAEC033B8A6134B7C563972793A7FD2AA9E696D5B15D5F8906B23
26,169,110 UART: Caliptra RT
26,169,827 UART: [state] CFI Enabled
26,285,836 UART: [rt] RT listening for mailbox commands...
31,544,190 >>> mbox cmd response: failed
31,546,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
31,689,511 UART:
31,689,834 UART: Running Caliptra FMC ...
31,690,877 UART:
31,691,027 UART: [state] CFI Enabled
31,691,962 UART: [art] Extend RT PCRs Done
31,693,105 UART: [art] Lock RT PCRs Done
31,694,094 UART: [art] Populate DV Done
31,695,206 UART: [fht] FMC Alias Private Key: 7
31,696,447 UART: [art] Derive CDI
31,697,175 UART: [art] Store in in slot 0x4
31,698,344 UART: [art] Derive Key Pair
31,699,256 UART: [art] Store priv key in slot 0x5
34,083,462 UART: [art] Derive Key Pair - Done
34,096,378 UART: [art] Signing Cert with AUTHO
34,097,687 UART: RITY.KEYID = 7
35,802,925 UART: [art] Erasing AUTHORITY.KEYID = 7
35,804,430 UART: [art] PUB.X = C2FD3C0C130E14496561CAEA34C37A68F5D5D4C8D8A93369D512530BF91B66DAA0483FC3E3555E5EE5133FE5F97DD3E6
35,811,682 UART: [art] PUB.Y = E352F1573E3B4808D00E7CB7E2DB2A75B04A0B8DB98CCA174D1A90E3AD9F2B2326F9123FF470363D126CDF6055F62837
35,818,985 UART: [art] SIG.R = BF10D5B0AD791F23B6873B69DE8D4A58B63295BA5D0E124A2399FF9DA151C75D31DC31CC9883A423C63B90E0EC002A9B
35,826,363 UART: [art] SIG.S = ED7ABB664FB9333A123CCF86F7E570556C3A3AFDDF0CAEC033B8A6134B7C563972793A7FD2AA9E696D5B15D5F8906B23
36,805,714 UART: Caliptra RT
36,806,428 UART: [state] CFI Enabled
37,097,504 UART: [rt] RT listening for mailbox commands...
47,893,851 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
903,248 UART: [kat] HMAC-384Kdf
907,890 UART: [kat] LMS
1,476,086 UART: [kat] --
1,477,153 UART: [cold-reset] ++
1,477,705 UART: [fht] Storing FHT @ 0x50003400
1,480,464 UART: [idev] ++
1,480,632 UART: [idev] CDI.KEYID = 6
1,480,992 UART: [idev] SUBJECT.KEYID = 7
1,481,416 UART: [idev] UDS.KEYID = 0
1,481,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,174 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,368 UART: [idev] --
1,515,609 UART: [ldev] ++
1,515,777 UART: [ldev] CDI.KEYID = 6
1,516,140 UART: [ldev] SUBJECT.KEYID = 5
1,516,566 UART: [ldev] AUTHORITY.KEYID = 7
1,517,029 UART: [ldev] FE.KEYID = 1
1,522,013 UART: [ldev] Erasing FE.KEYID = 1
1,547,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,368 UART: [ldev] --
1,586,663 UART: [fwproc] Waiting for Commands...
1,587,326 UART: [fwproc] Received command 0x46574c44
1,588,117 UART: [fwproc] Received Image of size 114084 bytes
2,883,367 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,593 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,550 >>> mbox cmd response: success
3,075,550 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
3,076,602 UART: [afmc] ++
3,076,770 UART: [afmc] CDI.KEYID = 6
3,077,132 UART: [afmc] SUBJECT.KEYID = 7
3,077,557 UART: [afmc] AUTHORITY.KEYID = 5
3,113,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,796 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,189 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,879 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,996 UART: [afmc] --
3,157,046 UART: [cold-reset] --
3,157,746 UART: [state] Locking Datavault
3,159,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,823 UART: [state] Locking ICCM
3,160,387 UART: [exit] Launching FMC @ 0x40000130
3,165,716 UART:
3,165,732 UART: Running Caliptra FMC ...
3,166,140 UART:
3,166,194 UART: [state] CFI Enabled
3,176,709 UART: [fht] FMC Alias Private Key: 7
3,284,580 UART: [art] Extend RT PCRs Done
3,285,008 UART: [art] Lock RT PCRs Done
3,286,598 UART: [art] Populate DV Done
3,294,729 UART: [fht] FMC Alias Private Key: 7
3,295,817 UART: [art] Derive CDI
3,296,097 UART: [art] Store in in slot 0x4
3,381,682 UART: [art] Derive Key Pair
3,382,042 UART: [art] Store priv key in slot 0x5
3,395,592 UART: [art] Derive Key Pair - Done
3,409,835 UART: [art] Signing Cert with AUTHO
3,410,315 UART: RITY.KEYID = 7
3,425,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,444 UART: [art] PUB.X = A9B2ED01F360E700A8FB06082EF8185DCA957B73BE23050FCBAD8498CC887818CD92BC37603777C437DB78A0F772DCDF
3,433,189 UART: [art] PUB.Y = 9CDC830CF2306633C363606617463EAB8214705837F24C03D171C5EB2C9AB79F64BB19D000B0B6A0429B14F5E515B89E
3,440,109 UART: [art] SIG.R = 0B3823423F6A3F24B5FB06715BB65B03603ED4147359FB7E249992FA5A240B01DA217E702A07A0735F85B7BBA5C9FBF4
3,446,865 UART: [art] SIG.S = 1B24D8669CD2124FC8AFF79A2F62545C00D3B797F36D5C1FE6DA1007608876E632F1C304D05C82627A906661119A425B
3,470,966 UART: Caliptra RT
3,471,219 UART: [state] CFI Enabled
3,578,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,616 UART:
3,580,632 UART: Running Caliptra ROM ...
3,581,040 UART:
3,581,094 UART: [state] CFI Enabled
3,583,900 UART: [state] LifecycleState = Unprovisioned
3,584,555 UART: [state] DebugLocked = No
3,585,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,610 UART: [kat] SHA2-256
4,380,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,656 UART: [kat] ++
4,384,808 UART: [kat] sha1
4,388,908 UART: [kat] SHA2-256
4,390,846 UART: [kat] SHA2-384
4,393,585 UART: [kat] SHA2-512-ACC
4,395,485 UART: [kat] ECC-384
4,401,028 UART: [kat] HMAC-384Kdf
4,405,668 UART: [kat] LMS
4,973,864 UART: [kat] --
4,974,643 UART: [update-reset] ++
5,086,078 >>> mbox cmd response: failed
5,086,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,086,504 UART: ROM Non-Fatal Error: 0x000B001F
5,087,262 UART: [state] Locking Datavault
5,088,034 UART: [state] Locking PCR0, PCR1 and PCR31
5,088,638 UART: [state] Locking ICCM
5,089,208 UART: [exit] Launching FMC @ 0x40000130
5,094,537 UART:
5,094,553 UART: Running Caliptra FMC ...
5,094,961 UART:
5,095,015 UART: [state] CFI Enabled
5,184,190 UART: [art] Extend RT PCRs Done
5,184,618 UART: [art] Lock RT PCRs Done
5,185,775 UART: [art] Populate DV Done
5,194,268 UART: [fht] FMC Alias Private Key: 7
5,195,428 UART: [art] Derive CDI
5,195,708 UART: [art] Store in in slot 0x4
5,281,509 UART: [art] Derive Key Pair
5,281,869 UART: [art] Store priv key in slot 0x5
5,295,095 UART: [art] Derive Key Pair - Done
5,309,784 UART: [art] Signing Cert with AUTHO
5,310,264 UART: RITY.KEYID = 7
5,325,622 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,387 UART: [art] PUB.X = A9B2ED01F360E700A8FB06082EF8185DCA957B73BE23050FCBAD8498CC887818CD92BC37603777C437DB78A0F772DCDF
5,333,132 UART: [art] PUB.Y = 9CDC830CF2306633C363606617463EAB8214705837F24C03D171C5EB2C9AB79F64BB19D000B0B6A0429B14F5E515B89E
5,340,052 UART: [art] SIG.R = 0B3823423F6A3F24B5FB06715BB65B03603ED4147359FB7E249992FA5A240B01DA217E702A07A0735F85B7BBA5C9FBF4
5,346,808 UART: [art] SIG.S = 1B24D8669CD2124FC8AFF79A2F62545C00D3B797F36D5C1FE6DA1007608876E632F1C304D05C82627A906661119A425B
5,370,865 UART: Caliptra RT
5,371,118 UART: [state] CFI Enabled
5,651,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,653,188 UART:
5,653,204 UART: Running Caliptra ROM ...
5,653,612 UART:
5,653,666 UART: [state] CFI Enabled
5,656,182 UART: [state] LifecycleState = Unprovisioned
5,656,837 UART: [state] DebugLocked = No
5,657,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,659,186 UART: [kat] SHA2-256
6,453,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,457,232 UART: [kat] ++
6,457,384 UART: [kat] sha1
6,461,548 UART: [kat] SHA2-256
6,463,486 UART: [kat] SHA2-384
6,466,371 UART: [kat] SHA2-512-ACC
6,468,271 UART: [kat] ECC-384
6,473,800 UART: [kat] HMAC-384Kdf
6,478,240 UART: [kat] LMS
7,046,436 UART: [kat] --
7,047,223 UART: [update-reset] ++
8,378,535 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,379,619 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,529,123 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,272 >>> mbox cmd response: success
2,922,272 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,983,774 UART:
2,983,790 UART: Running Caliptra FMC ...
2,984,198 UART:
2,984,252 UART: [state] CFI Enabled
2,994,701 UART: [fht] FMC Alias Private Key: 7
3,102,762 UART: [art] Extend RT PCRs Done
3,103,190 UART: [art] Lock RT PCRs Done
3,104,728 UART: [art] Populate DV Done
3,113,011 UART: [fht] FMC Alias Private Key: 7
3,114,177 UART: [art] Derive CDI
3,114,457 UART: [art] Store in in slot 0x4
3,199,766 UART: [art] Derive Key Pair
3,200,126 UART: [art] Store priv key in slot 0x5
3,213,632 UART: [art] Derive Key Pair - Done
3,228,511 UART: [art] Signing Cert with AUTHO
3,228,991 UART: RITY.KEYID = 7
3,244,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,004 UART: [art] PUB.X = 541D47A7008E880A13250D3618DFF33AC3C2A0509B308EF8A72867EE77C933745119FA3997B528AC14DE30821992CBF8
3,251,742 UART: [art] PUB.Y = BCA1C5D5EF8D1AD36813D6AF9AD2B80B1B0F86CD5E1C44ECCC0FAFB3F3BDDE29D7958C366C55534B366A5B808BFC878A
3,258,713 UART: [art] SIG.R = DC2B2C0F4AF4E1473A7DC6BFB915433FF0801090339BD68B9E80900E948B452D4C44B54544CD3096196A09C5BC622B80
3,265,476 UART: [art] SIG.S = A547C553525C56E54E40E887FE560E8E1482A14C63CBDC225881CC3311F412C0510C2FCDDB61FE78D9B7C50E6A4A3CE4
3,289,762 UART: Caliptra RT
3,290,015 UART: [state] CFI Enabled
3,399,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,791,437 >>> mbox cmd response: failed
4,791,437 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,797,288 UART:
4,797,304 UART: Running Caliptra FMC ...
4,797,712 UART:
4,797,766 UART: [state] CFI Enabled
4,886,673 UART: [art] Extend RT PCRs Done
4,887,101 UART: [art] Lock RT PCRs Done
4,888,322 UART: [art] Populate DV Done
4,896,511 UART: [fht] FMC Alias Private Key: 7
4,897,559 UART: [art] Derive CDI
4,897,839 UART: [art] Store in in slot 0x4
4,983,434 UART: [art] Derive Key Pair
4,983,794 UART: [art] Store priv key in slot 0x5
4,996,700 UART: [art] Derive Key Pair - Done
5,011,777 UART: [art] Signing Cert with AUTHO
5,012,257 UART: RITY.KEYID = 7
5,027,731 UART: [art] Erasing AUTHORITY.KEYID = 7
5,028,496 UART: [art] PUB.X = 541D47A7008E880A13250D3618DFF33AC3C2A0509B308EF8A72867EE77C933745119FA3997B528AC14DE30821992CBF8
5,035,234 UART: [art] PUB.Y = BCA1C5D5EF8D1AD36813D6AF9AD2B80B1B0F86CD5E1C44ECCC0FAFB3F3BDDE29D7958C366C55534B366A5B808BFC878A
5,042,205 UART: [art] SIG.R = DC2B2C0F4AF4E1473A7DC6BFB915433FF0801090339BD68B9E80900E948B452D4C44B54544CD3096196A09C5BC622B80
5,048,968 UART: [art] SIG.S = A547C553525C56E54E40E887FE560E8E1482A14C63CBDC225881CC3311F412C0510C2FCDDB61FE78D9B7C50E6A4A3CE4
5,072,924 UART: Caliptra RT
5,073,177 UART: [state] CFI Enabled
5,354,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,115,106 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,921 UART: [state] LifecycleState = Unprovisioned
86,576 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,730 UART: [kat] SHA2-256
882,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,776 UART: [kat] ++
886,928 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,803 UART: [kat] SHA2-512-ACC
897,704 UART: [kat] ECC-384
903,443 UART: [kat] HMAC-384Kdf
908,073 UART: [kat] LMS
1,476,269 UART: [kat] --
1,476,982 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,480,161 UART: [idev] ++
1,480,329 UART: [idev] CDI.KEYID = 6
1,480,689 UART: [idev] SUBJECT.KEYID = 7
1,481,113 UART: [idev] UDS.KEYID = 0
1,481,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,594 UART: [ldev] ++
1,515,762 UART: [ldev] CDI.KEYID = 6
1,516,125 UART: [ldev] SUBJECT.KEYID = 5
1,516,551 UART: [ldev] AUTHORITY.KEYID = 7
1,517,014 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,191 UART: [ldev] --
1,586,674 UART: [fwproc] Waiting for Commands...
1,587,523 UART: [fwproc] Received command 0x46574c44
1,588,314 UART: [fwproc] Received Image of size 114084 bytes
2,884,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,894 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,613 >>> mbox cmd response: success
3,075,613 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
3,076,763 UART: [afmc] ++
3,076,931 UART: [afmc] CDI.KEYID = 6
3,077,293 UART: [afmc] SUBJECT.KEYID = 7
3,077,718 UART: [afmc] AUTHORITY.KEYID = 5
3,113,031 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,467 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,860 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,550 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,613 UART: [afmc] --
3,156,683 UART: [cold-reset] --
3,157,595 UART: [state] Locking Datavault
3,158,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,306 UART: [state] Locking ICCM
3,159,940 UART: [exit] Launching FMC @ 0x40000130
3,165,269 UART:
3,165,285 UART: Running Caliptra FMC ...
3,165,693 UART:
3,165,836 UART: [state] CFI Enabled
3,176,003 UART: [fht] FMC Alias Private Key: 7
3,284,204 UART: [art] Extend RT PCRs Done
3,284,632 UART: [art] Lock RT PCRs Done
3,286,022 UART: [art] Populate DV Done
3,294,123 UART: [fht] FMC Alias Private Key: 7
3,295,271 UART: [art] Derive CDI
3,295,551 UART: [art] Store in in slot 0x4
3,381,248 UART: [art] Derive Key Pair
3,381,608 UART: [art] Store priv key in slot 0x5
3,394,948 UART: [art] Derive Key Pair - Done
3,409,552 UART: [art] Signing Cert with AUTHO
3,410,032 UART: RITY.KEYID = 7
3,425,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,059 UART: [art] PUB.X = C6E3A38EC03B09FB66EDB1CE7A0A3EA1BA6C1D11D9C708AC39B49B3776C08DD7734F86EE3A99C36BBA8751FFEAF1476A
3,432,846 UART: [art] PUB.Y = 231D53EC50DE4000E5B875D010DF5C68C2A104F1377A27D3935CED4A23399871FA724DEC1FDD8C42DFCD4B4AB6341A46
3,439,783 UART: [art] SIG.R = 411726A316B523CA4B4B4445ACF9ECF241B373B29E785B32762EC6F33CAD27249F464ECFAE3A8B8E297629DCBFC22EF1
3,446,567 UART: [art] SIG.S = F3587D6B94246F90AFC460C7BBEE68BECA69A475A700BFAE66C1409F2ABAF44A808074B0483585B171B71B9857402EB8
3,470,102 UART: Caliptra RT
3,470,447 UART: [state] CFI Enabled
3,577,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,857 UART:
3,579,873 UART: Running Caliptra ROM ...
3,580,281 UART:
3,580,422 UART: [state] CFI Enabled
3,583,168 UART: [state] LifecycleState = Unprovisioned
3,583,823 UART: [state] DebugLocked = No
3,584,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,024 UART: [kat] SHA2-256
4,379,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,070 UART: [kat] ++
4,384,222 UART: [kat] sha1
4,388,508 UART: [kat] SHA2-256
4,390,446 UART: [kat] SHA2-384
4,393,193 UART: [kat] SHA2-512-ACC
4,395,093 UART: [kat] ECC-384
4,400,742 UART: [kat] HMAC-384Kdf
4,405,484 UART: [kat] LMS
4,973,680 UART: [kat] --
4,974,839 UART: [update-reset] ++
5,086,978 >>> mbox cmd response: failed
5,086,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,087,356 UART: ROM Non-Fatal Error: 0x000B001F
5,088,258 UART: [state] Locking Datavault
5,089,196 UART: [state] Locking PCR0, PCR1 and PCR31
5,089,800 UART: [state] Locking ICCM
5,090,350 UART: [exit] Launching FMC @ 0x40000130
5,095,679 UART:
5,095,695 UART: Running Caliptra FMC ...
5,096,103 UART:
5,096,246 UART: [state] CFI Enabled
5,185,421 UART: [art] Extend RT PCRs Done
5,185,849 UART: [art] Lock RT PCRs Done
5,187,372 UART: [art] Populate DV Done
5,195,661 UART: [fht] FMC Alias Private Key: 7
5,196,589 UART: [art] Derive CDI
5,196,869 UART: [art] Store in in slot 0x4
5,282,372 UART: [art] Derive Key Pair
5,282,732 UART: [art] Store priv key in slot 0x5
5,296,228 UART: [art] Derive Key Pair - Done
5,310,874 UART: [art] Signing Cert with AUTHO
5,311,354 UART: RITY.KEYID = 7
5,326,138 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,903 UART: [art] PUB.X = C6E3A38EC03B09FB66EDB1CE7A0A3EA1BA6C1D11D9C708AC39B49B3776C08DD7734F86EE3A99C36BBA8751FFEAF1476A
5,333,690 UART: [art] PUB.Y = 231D53EC50DE4000E5B875D010DF5C68C2A104F1377A27D3935CED4A23399871FA724DEC1FDD8C42DFCD4B4AB6341A46
5,340,627 UART: [art] SIG.R = 411726A316B523CA4B4B4445ACF9ECF241B373B29E785B32762EC6F33CAD27249F464ECFAE3A8B8E297629DCBFC22EF1
5,347,411 UART: [art] SIG.S = F3587D6B94246F90AFC460C7BBEE68BECA69A475A700BFAE66C1409F2ABAF44A808074B0483585B171B71B9857402EB8
5,371,274 UART: Caliptra RT
5,371,619 UART: [state] CFI Enabled
5,652,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,654,266 UART:
5,654,282 UART: Running Caliptra ROM ...
5,654,690 UART:
5,654,831 UART: [state] CFI Enabled
5,658,013 UART: [state] LifecycleState = Unprovisioned
5,658,668 UART: [state] DebugLocked = No
5,659,380 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,660,923 UART: [kat] SHA2-256
6,454,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,458,969 UART: [kat] ++
6,459,121 UART: [kat] sha1
6,463,303 UART: [kat] SHA2-256
6,465,241 UART: [kat] SHA2-384
6,468,180 UART: [kat] SHA2-512-ACC
6,470,080 UART: [kat] ECC-384
6,475,599 UART: [kat] HMAC-384Kdf
6,480,337 UART: [kat] LMS
7,048,533 UART: [kat] --
7,049,474 UART: [update-reset] ++
8,381,456 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,382,502 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,532,006 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,519 >>> mbox cmd response: success
2,924,519 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,986,321 UART:
2,986,337 UART: Running Caliptra FMC ...
2,986,745 UART:
2,986,888 UART: [state] CFI Enabled
2,997,575 UART: [fht] FMC Alias Private Key: 7
3,105,320 UART: [art] Extend RT PCRs Done
3,105,748 UART: [art] Lock RT PCRs Done
3,107,622 UART: [art] Populate DV Done
3,115,849 UART: [fht] FMC Alias Private Key: 7
3,116,971 UART: [art] Derive CDI
3,117,251 UART: [art] Store in in slot 0x4
3,203,006 UART: [art] Derive Key Pair
3,203,366 UART: [art] Store priv key in slot 0x5
3,216,150 UART: [art] Derive Key Pair - Done
3,231,186 UART: [art] Signing Cert with AUTHO
3,231,666 UART: RITY.KEYID = 7
3,246,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,655 UART: [art] PUB.X = D4FAC62BDB852FB99967855A3FE25D846176A7260643C0D1051958D2072B2A06F26EBACFAA0ED6BB10AE615E5470DA2B
3,254,422 UART: [art] PUB.Y = CAFAB968979935C36C6C950005EA31AABA5799E9A69CAF708BF050D9D67B6D52D6884D9801333626336CB1B9D168A1B2
3,261,348 UART: [art] SIG.R = EED1B272B56A6C487340BBF7C4A47F9D8296AB14448A0411445F8B02005CF74CCDA1094BD3FA21789DC36C0419AB5DBA
3,268,096 UART: [art] SIG.S = 6E91157A5E7B88E0251274A7FB566F06C3AEA52D3319432C6BD253736D1FE25723DC49162271B246FB177D7B787ED1E0
3,291,602 UART: Caliptra RT
3,291,947 UART: [state] CFI Enabled
3,400,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,791,705 >>> mbox cmd response: failed
4,791,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,797,352 UART:
4,797,368 UART: Running Caliptra FMC ...
4,797,776 UART:
4,797,919 UART: [state] CFI Enabled
4,886,472 UART: [art] Extend RT PCRs Done
4,886,900 UART: [art] Lock RT PCRs Done
4,888,085 UART: [art] Populate DV Done
4,896,376 UART: [fht] FMC Alias Private Key: 7
4,897,500 UART: [art] Derive CDI
4,897,780 UART: [art] Store in in slot 0x4
4,983,257 UART: [art] Derive Key Pair
4,983,617 UART: [art] Store priv key in slot 0x5
4,997,015 UART: [art] Derive Key Pair - Done
5,011,797 UART: [art] Signing Cert with AUTHO
5,012,277 UART: RITY.KEYID = 7
5,027,787 UART: [art] Erasing AUTHORITY.KEYID = 7
5,028,552 UART: [art] PUB.X = D4FAC62BDB852FB99967855A3FE25D846176A7260643C0D1051958D2072B2A06F26EBACFAA0ED6BB10AE615E5470DA2B
5,035,319 UART: [art] PUB.Y = CAFAB968979935C36C6C950005EA31AABA5799E9A69CAF708BF050D9D67B6D52D6884D9801333626336CB1B9D168A1B2
5,042,245 UART: [art] SIG.R = EED1B272B56A6C487340BBF7C4A47F9D8296AB14448A0411445F8B02005CF74CCDA1094BD3FA21789DC36C0419AB5DBA
5,048,993 UART: [art] SIG.S = 6E91157A5E7B88E0251274A7FB566F06C3AEA52D3319432C6BD253736D1FE25723DC49162271B246FB177D7B787ED1E0
5,072,237 UART: Caliptra RT
5,072,582 UART: [state] CFI Enabled
5,355,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,115,183 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,762 UART: [kat] SHA2-512-ACC
908,663 UART: [kat] ECC-384
918,392 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,619 UART: [fht] FHT @ 0x50003400
1,175,342 UART: [idev] ++
1,175,510 UART: [idev] CDI.KEYID = 6
1,175,870 UART: [idev] SUBJECT.KEYID = 7
1,176,294 UART: [idev] UDS.KEYID = 0
1,176,639 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,200,671 UART: [idev] Sha1 KeyId Algorithm
1,209,083 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,576 UART: [ldev] SUBJECT.KEYID = 5
1,211,002 UART: [ldev] AUTHORITY.KEYID = 7
1,211,465 UART: [ldev] FE.KEYID = 1
1,216,563 UART: [ldev] Erasing FE.KEYID = 1
1,243,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,765 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,282,826 UART: [fwproc] Recv command 0x46574c44
1,283,554 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,749 >>> mbox cmd response: success
2,769,749 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,770,793 UART: [afmc] ++
2,770,961 UART: [afmc] CDI.KEYID = 6
2,771,323 UART: [afmc] SUBJECT.KEYID = 7
2,771,748 UART: [afmc] AUTHORITY.KEYID = 5
2,807,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,808 UART: [afmc] --
2,850,810 UART: [cold-reset] --
2,851,798 UART: [state] Locking Datavault
2,853,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,673 UART: [state] Locking ICCM
2,854,223 UART: [exit] Launching FMC @ 0x40000130
2,859,552 UART:
2,859,568 UART: Running Caliptra FMC ...
2,859,976 UART:
2,860,030 UART: [state] CFI Enabled
2,870,743 UART: [fht] FMC Alias Private Key: 7
2,978,156 UART: [art] Extend RT PCRs Done
2,978,584 UART: [art] Lock RT PCRs Done
2,980,230 UART: [art] Populate DV Done
2,988,729 UART: [fht] FMC Alias Private Key: 7
2,989,681 UART: [art] Derive CDI
2,989,961 UART: [art] Store in in slot 0x4
3,075,234 UART: [art] Derive Key Pair
3,075,594 UART: [art] Store priv key in slot 0x5
3,088,514 UART: [art] Derive Key Pair - Done
3,103,286 UART: [art] Signing Cert with AUTHO
3,103,766 UART: RITY.KEYID = 7
3,119,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,985 UART: [art] PUB.X = 8B7AD7A7055EA21F3CF59C919EACE05868FE2575C7C6F8A29FE61D57BA14BF7828EEC82975201D45300331283B5B1364
3,126,753 UART: [art] PUB.Y = 613EEC04E3DEC6D8F95D4FDFF9B9D26B666F6EDED62F3B5CA6345056A447D050505A88C817DEB87D8F3B2D395B340236
3,133,711 UART: [art] SIG.R = EC3B07C07085FFA45929BD8D7B2003B06D6C8236E00888C17E85AB264EFEA9951E8CFF6AEFCBE62F6770342AAA2DECB6
3,140,492 UART: [art] SIG.S = 7F92934C51DB7A3B09E503008F2AEB78058FE44238AFC2C2A838DAE376A9E633F0132D59D532245E4D95A10A42A8602B
3,163,677 UART: Caliptra RT
3,163,930 UART: [state] CFI Enabled
3,271,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,985 UART:
3,273,001 UART: Running Caliptra ROM ...
3,273,409 UART:
3,273,464 UART: [state] CFI Enabled
3,276,248 UART: [state] LifecycleState = Unprovisioned
3,276,903 UART: [state] DebugLocked = No
3,277,433 UART: [state] WD Timer not started. Device not locked for debugging
3,278,579 UART: [kat] SHA2-256
4,084,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,088,354 UART: [kat] ++
4,088,506 UART: [kat] sha1
4,092,810 UART: [kat] SHA2-256
4,094,750 UART: [kat] SHA2-384
4,097,517 UART: [kat] SHA2-512-ACC
4,099,417 UART: [kat] ECC-384
4,109,166 UART: [kat] HMAC-384Kdf
4,113,924 UART: [kat] LMS
4,362,252 UART: [kat] --
4,363,024 UART: [update-reset] ++
4,451,575 >>> mbox cmd response: failed
4,451,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,452,087 UART: ROM Non-Fatal Error: 0x000B001F
4,452,997 UART: [state] Locking Datavault
4,453,849 UART: [state] Locking PCR0, PCR1 and PCR31
4,454,453 UART: [state] Locking ICCM
4,454,915 UART: [exit] Launching FMC @ 0x40000130
4,460,244 UART:
4,460,260 UART: Running Caliptra FMC ...
4,460,668 UART:
4,460,722 UART: [state] CFI Enabled
4,549,377 UART: [art] Extend RT PCRs Done
4,549,805 UART: [art] Lock RT PCRs Done
4,551,142 UART: [art] Populate DV Done
4,559,163 UART: [fht] FMC Alias Private Key: 7
4,560,171 UART: [art] Derive CDI
4,560,451 UART: [art] Store in in slot 0x4
4,646,014 UART: [art] Derive Key Pair
4,646,374 UART: [art] Store priv key in slot 0x5
4,659,210 UART: [art] Derive Key Pair - Done
4,673,822 UART: [art] Signing Cert with AUTHO
4,674,302 UART: RITY.KEYID = 7
4,689,506 UART: [art] Erasing AUTHORITY.KEYID = 7
4,690,271 UART: [art] PUB.X = 8B7AD7A7055EA21F3CF59C919EACE05868FE2575C7C6F8A29FE61D57BA14BF7828EEC82975201D45300331283B5B1364
4,697,039 UART: [art] PUB.Y = 613EEC04E3DEC6D8F95D4FDFF9B9D26B666F6EDED62F3B5CA6345056A447D050505A88C817DEB87D8F3B2D395B340236
4,703,997 UART: [art] SIG.R = EC3B07C07085FFA45929BD8D7B2003B06D6C8236E00888C17E85AB264EFEA9951E8CFF6AEFCBE62F6770342AAA2DECB6
4,710,778 UART: [art] SIG.S = 7F92934C51DB7A3B09E503008F2AEB78058FE44238AFC2C2A838DAE376A9E633F0132D59D532245E4D95A10A42A8602B
4,734,563 UART: Caliptra RT
4,734,816 UART: [state] CFI Enabled
5,017,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,019,374 UART:
5,019,390 UART: Running Caliptra ROM ...
5,019,798 UART:
5,019,853 UART: [state] CFI Enabled
5,022,157 UART: [state] LifecycleState = Unprovisioned
5,022,812 UART: [state] DebugLocked = No
5,023,312 UART: [state] WD Timer not started. Device not locked for debugging
5,024,608 UART: [kat] SHA2-256
5,830,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,834,383 UART: [kat] ++
5,834,535 UART: [kat] sha1
5,838,923 UART: [kat] SHA2-256
5,840,863 UART: [kat] SHA2-384
5,843,622 UART: [kat] SHA2-512-ACC
5,845,522 UART: [kat] ECC-384
5,855,231 UART: [kat] HMAC-384Kdf
5,859,959 UART: [kat] LMS
6,108,287 UART: [kat] --
6,109,485 UART: [update-reset] ++
7,419,543 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,420,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,570,000 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,424 >>> mbox cmd response: success
2,622,424 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,684,504 UART:
2,684,520 UART: Running Caliptra FMC ...
2,684,928 UART:
2,684,982 UART: [state] CFI Enabled
2,695,707 UART: [fht] FMC Alias Private Key: 7
2,803,348 UART: [art] Extend RT PCRs Done
2,803,776 UART: [art] Lock RT PCRs Done
2,805,398 UART: [art] Populate DV Done
2,813,331 UART: [fht] FMC Alias Private Key: 7
2,814,441 UART: [art] Derive CDI
2,814,721 UART: [art] Store in in slot 0x4
2,900,396 UART: [art] Derive Key Pair
2,900,756 UART: [art] Store priv key in slot 0x5
2,913,694 UART: [art] Derive Key Pair - Done
2,928,773 UART: [art] Signing Cert with AUTHO
2,929,253 UART: RITY.KEYID = 7
2,944,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,430 UART: [art] PUB.X = 348610E2736D0370F68C2F5CA06FC8FE753476FA858469E48B8122AC554574CEE80EDB610C75E23E568317C8FC29CB70
2,952,191 UART: [art] PUB.Y = 1CCB56C49B5EDEBE05EBF64AE3DD148B4CCD662E2E4C4A60E69427A5E5E0ED29DF984344FFC3F84B88D6EFC6095AD084
2,959,161 UART: [art] SIG.R = D324CD91245AF134D5D285E22E673A77B00957C294E7A18CA35AAA4A1AB36CC043FBF364559AB0816D5E866C96A901DD
2,965,933 UART: [art] SIG.S = EBA2B51EAD5DA7D2F85852FCF0F5794402C38FE70B1F0BD654F44C97327ABC4300044669A3D83F43A3D8B023D25AE31E
2,989,358 UART: Caliptra RT
2,989,611 UART: [state] CFI Enabled
3,096,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,329 >>> mbox cmd response: failed
4,164,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,170,044 UART:
4,170,060 UART: Running Caliptra FMC ...
4,170,468 UART:
4,170,522 UART: [state] CFI Enabled
4,259,579 UART: [art] Extend RT PCRs Done
4,260,007 UART: [art] Lock RT PCRs Done
4,261,080 UART: [art] Populate DV Done
4,269,219 UART: [fht] FMC Alias Private Key: 7
4,270,381 UART: [art] Derive CDI
4,270,661 UART: [art] Store in in slot 0x4
4,356,336 UART: [art] Derive Key Pair
4,356,696 UART: [art] Store priv key in slot 0x5
4,369,480 UART: [art] Derive Key Pair - Done
4,384,443 UART: [art] Signing Cert with AUTHO
4,384,923 UART: RITY.KEYID = 7
4,400,723 UART: [art] Erasing AUTHORITY.KEYID = 7
4,401,488 UART: [art] PUB.X = 348610E2736D0370F68C2F5CA06FC8FE753476FA858469E48B8122AC554574CEE80EDB610C75E23E568317C8FC29CB70
4,408,249 UART: [art] PUB.Y = 1CCB56C49B5EDEBE05EBF64AE3DD148B4CCD662E2E4C4A60E69427A5E5E0ED29DF984344FFC3F84B88D6EFC6095AD084
4,415,219 UART: [art] SIG.R = D324CD91245AF134D5D285E22E673A77B00957C294E7A18CA35AAA4A1AB36CC043FBF364559AB0816D5E866C96A901DD
4,421,991 UART: [art] SIG.S = EBA2B51EAD5DA7D2F85852FCF0F5794402C38FE70B1F0BD654F44C97327ABC4300044669A3D83F43A3D8B023D25AE31E
4,445,768 UART: Caliptra RT
4,446,021 UART: [state] CFI Enabled
4,726,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,162,633 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
893,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,580 UART: [kat] ++
897,732 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,401 UART: [kat] SHA2-512-ACC
908,302 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,471 UART: [kat] LMS
1,170,799 UART: [kat] --
1,171,806 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,174,951 UART: [idev] ++
1,175,119 UART: [idev] CDI.KEYID = 6
1,175,479 UART: [idev] SUBJECT.KEYID = 7
1,175,903 UART: [idev] UDS.KEYID = 0
1,176,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,721 UART: [idev] Erasing UDS.KEYID = 0
1,200,524 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,114 UART: [ldev] ++
1,210,282 UART: [ldev] CDI.KEYID = 6
1,210,645 UART: [ldev] SUBJECT.KEYID = 5
1,211,071 UART: [ldev] AUTHORITY.KEYID = 7
1,211,534 UART: [ldev] FE.KEYID = 1
1,216,944 UART: [ldev] Erasing FE.KEYID = 1
1,243,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,179 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,782 >>> mbox cmd response: success
2,770,782 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,771,888 UART: [afmc] ++
2,772,056 UART: [afmc] CDI.KEYID = 6
2,772,418 UART: [afmc] SUBJECT.KEYID = 7
2,772,843 UART: [afmc] AUTHORITY.KEYID = 5
2,809,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,820 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,539 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,423 UART: [afmc] --
2,852,453 UART: [cold-reset] --
2,853,181 UART: [state] Locking Datavault
2,854,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,784 UART: [state] Locking ICCM
2,855,242 UART: [exit] Launching FMC @ 0x40000130
2,860,571 UART:
2,860,587 UART: Running Caliptra FMC ...
2,860,995 UART:
2,861,138 UART: [state] CFI Enabled
2,871,805 UART: [fht] FMC Alias Private Key: 7
2,979,466 UART: [art] Extend RT PCRs Done
2,979,894 UART: [art] Lock RT PCRs Done
2,981,414 UART: [art] Populate DV Done
2,989,625 UART: [fht] FMC Alias Private Key: 7
2,990,605 UART: [art] Derive CDI
2,990,885 UART: [art] Store in in slot 0x4
3,076,854 UART: [art] Derive Key Pair
3,077,214 UART: [art] Store priv key in slot 0x5
3,090,380 UART: [art] Derive Key Pair - Done
3,104,822 UART: [art] Signing Cert with AUTHO
3,105,302 UART: RITY.KEYID = 7
3,120,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,891 UART: [art] PUB.X = F1714C4DFFC3757E2AB17130E3FC2EEEF51365F27B73974B19E2CC7EB75CD1DBA79C27E881CD96574E159CB866AA2A5B
3,127,679 UART: [art] PUB.Y = ACDF4C0D5C3554C3C108E83275CC7C39D0C2C6EBD58CF37887259AB9E0308A6B82E5CF285994250564BE4DE61C3B72CE
3,134,632 UART: [art] SIG.R = 8FAD70501D769035A59AC6CB171FEAC77F96A00938FB6A3032E080489F392420231A05C78D70F8A07F49559877D609AE
3,141,389 UART: [art] SIG.S = 9B54E89AC29E3C9150905D2971E8703B6A0DD48A52EA58CA466925265847BE1A195F61B4C2C2FC826868498A189DF50E
3,164,612 UART: Caliptra RT
3,164,957 UART: [state] CFI Enabled
3,272,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,853 UART:
3,274,869 UART: Running Caliptra ROM ...
3,275,277 UART:
3,275,419 UART: [state] CFI Enabled
3,278,197 UART: [state] LifecycleState = Unprovisioned
3,278,852 UART: [state] DebugLocked = No
3,279,574 UART: [state] WD Timer not started. Device not locked for debugging
3,280,866 UART: [kat] SHA2-256
4,086,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,641 UART: [kat] ++
4,090,793 UART: [kat] sha1
4,095,033 UART: [kat] SHA2-256
4,096,973 UART: [kat] SHA2-384
4,099,802 UART: [kat] SHA2-512-ACC
4,101,702 UART: [kat] ECC-384
4,111,553 UART: [kat] HMAC-384Kdf
4,116,341 UART: [kat] LMS
4,364,669 UART: [kat] --
4,365,441 UART: [update-reset] ++
4,455,042 >>> mbox cmd response: failed
4,455,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,455,346 UART: ROM Non-Fatal Error: 0x000B001F
4,456,208 UART: [state] Locking Datavault
4,456,916 UART: [state] Locking PCR0, PCR1 and PCR31
4,457,520 UART: [state] Locking ICCM
4,458,096 UART: [exit] Launching FMC @ 0x40000130
4,463,425 UART:
4,463,441 UART: Running Caliptra FMC ...
4,463,849 UART:
4,463,992 UART: [state] CFI Enabled
4,552,823 UART: [art] Extend RT PCRs Done
4,553,251 UART: [art] Lock RT PCRs Done
4,554,594 UART: [art] Populate DV Done
4,562,925 UART: [fht] FMC Alias Private Key: 7
4,563,977 UART: [art] Derive CDI
4,564,257 UART: [art] Store in in slot 0x4
4,649,818 UART: [art] Derive Key Pair
4,650,178 UART: [art] Store priv key in slot 0x5
4,663,486 UART: [art] Derive Key Pair - Done
4,678,214 UART: [art] Signing Cert with AUTHO
4,678,694 UART: RITY.KEYID = 7
4,694,246 UART: [art] Erasing AUTHORITY.KEYID = 7
4,695,011 UART: [art] PUB.X = F1714C4DFFC3757E2AB17130E3FC2EEEF51365F27B73974B19E2CC7EB75CD1DBA79C27E881CD96574E159CB866AA2A5B
4,701,799 UART: [art] PUB.Y = ACDF4C0D5C3554C3C108E83275CC7C39D0C2C6EBD58CF37887259AB9E0308A6B82E5CF285994250564BE4DE61C3B72CE
4,708,752 UART: [art] SIG.R = 8FAD70501D769035A59AC6CB171FEAC77F96A00938FB6A3032E080489F392420231A05C78D70F8A07F49559877D609AE
4,715,509 UART: [art] SIG.S = 9B54E89AC29E3C9150905D2971E8703B6A0DD48A52EA58CA466925265847BE1A195F61B4C2C2FC826868498A189DF50E
4,739,370 UART: Caliptra RT
4,739,715 UART: [state] CFI Enabled
5,021,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,023,654 UART:
5,023,670 UART: Running Caliptra ROM ...
5,024,078 UART:
5,024,220 UART: [state] CFI Enabled
5,026,834 UART: [state] LifecycleState = Unprovisioned
5,027,489 UART: [state] DebugLocked = No
5,028,145 UART: [state] WD Timer not started. Device not locked for debugging
5,029,281 UART: [kat] SHA2-256
5,834,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,839,056 UART: [kat] ++
5,839,208 UART: [kat] sha1
5,843,356 UART: [kat] SHA2-256
5,845,296 UART: [kat] SHA2-384
5,847,985 UART: [kat] SHA2-512-ACC
5,849,885 UART: [kat] ECC-384
5,859,552 UART: [kat] HMAC-384Kdf
5,864,210 UART: [kat] LMS
6,112,538 UART: [kat] --
6,113,122 UART: [update-reset] ++
7,421,362 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,422,531 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,571,983 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,677 >>> mbox cmd response: success
2,625,677 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,687,859 UART:
2,687,875 UART: Running Caliptra FMC ...
2,688,283 UART:
2,688,426 UART: [state] CFI Enabled
2,699,101 UART: [fht] FMC Alias Private Key: 7
2,806,882 UART: [art] Extend RT PCRs Done
2,807,310 UART: [art] Lock RT PCRs Done
2,808,978 UART: [art] Populate DV Done
2,817,255 UART: [fht] FMC Alias Private Key: 7
2,818,211 UART: [art] Derive CDI
2,818,491 UART: [art] Store in in slot 0x4
2,904,032 UART: [art] Derive Key Pair
2,904,392 UART: [art] Store priv key in slot 0x5
2,917,882 UART: [art] Derive Key Pair - Done
2,932,678 UART: [art] Signing Cert with AUTHO
2,933,158 UART: RITY.KEYID = 7
2,948,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,185 UART: [art] PUB.X = 39C71CE8E168AFFD572617B80DE0BED455FB56E2234D5517412CEDC8661845BF6939B4FABA427EC9170AD0991A7CC8B7
2,955,961 UART: [art] PUB.Y = EF982E96B377B3904212C217F90C8522C648EBBAF366D866AD062546145799CAFF47F053D4AF0E8D7E7798F6B3969213
2,962,900 UART: [art] SIG.R = B33C4B73C262707338C03B0A95D45B729F720148B63D2758D5429448B87AFF03A445AD893BD143A42D47A4C92D0D6D1D
2,969,656 UART: [art] SIG.S = CB349BA770C652BC9030BE87F819534E7C04395E51154A8D405F750D54070E23348CF60ED7C4FD8B0C58C3A24E83B5B9
2,993,059 UART: Caliptra RT
2,993,404 UART: [state] CFI Enabled
3,101,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,170,313 >>> mbox cmd response: failed
4,170,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,176,224 UART:
4,176,240 UART: Running Caliptra FMC ...
4,176,648 UART:
4,176,791 UART: [state] CFI Enabled
4,265,712 UART: [art] Extend RT PCRs Done
4,266,140 UART: [art] Lock RT PCRs Done
4,267,321 UART: [art] Populate DV Done
4,275,266 UART: [fht] FMC Alias Private Key: 7
4,276,254 UART: [art] Derive CDI
4,276,534 UART: [art] Store in in slot 0x4
4,362,439 UART: [art] Derive Key Pair
4,362,799 UART: [art] Store priv key in slot 0x5
4,376,471 UART: [art] Derive Key Pair - Done
4,391,229 UART: [art] Signing Cert with AUTHO
4,391,709 UART: RITY.KEYID = 7
4,407,563 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,328 UART: [art] PUB.X = 39C71CE8E168AFFD572617B80DE0BED455FB56E2234D5517412CEDC8661845BF6939B4FABA427EC9170AD0991A7CC8B7
4,415,104 UART: [art] PUB.Y = EF982E96B377B3904212C217F90C8522C648EBBAF366D866AD062546145799CAFF47F053D4AF0E8D7E7798F6B3969213
4,422,043 UART: [art] SIG.R = B33C4B73C262707338C03B0A95D45B729F720148B63D2758D5429448B87AFF03A445AD893BD143A42D47A4C92D0D6D1D
4,428,799 UART: [art] SIG.S = CB349BA770C652BC9030BE87F819534E7C04395E51154A8D405F750D54070E23348CF60ED7C4FD8B0C58C3A24E83B5B9
4,452,666 UART: Caliptra RT
4,453,011 UART: [state] CFI Enabled
4,735,551 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,171,630 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,538 UART: [kat] HMAC-384Kdf
921,078 UART: [kat] LMS
1,169,390 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,519 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,174,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,577 UART: [idev] Erasing UDS.KEYID = 0
1,199,725 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,876 UART: [ldev] ++
1,210,044 UART: [ldev] CDI.KEYID = 6
1,210,408 UART: [ldev] SUBJECT.KEYID = 5
1,210,835 UART: [ldev] AUTHORITY.KEYID = 7
1,211,298 UART: [ldev] FE.KEYID = 1
1,216,420 UART: [ldev] Erasing FE.KEYID = 1
1,242,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,948 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,282,925 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,570 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,255 >>> mbox cmd response: success
2,770,255 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,771,376 UART: [afmc] ++
2,771,544 UART: [afmc] CDI.KEYID = 6
2,771,907 UART: [afmc] SUBJECT.KEYID = 7
2,772,333 UART: [afmc] AUTHORITY.KEYID = 5
2,807,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,005 UART: [afmc] --
2,850,957 UART: [cold-reset] --
2,851,557 UART: [state] Locking Datavault
2,852,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,446 UART: [state] Locking ICCM
2,853,948 UART: [exit] Launching FMC @ 0x40000130
2,859,277 UART:
2,859,293 UART: Running Caliptra FMC ...
2,859,701 UART:
2,859,755 UART: [state] CFI Enabled
2,870,108 UART: [fht] FMC Alias Private Key: 7
2,978,191 UART: [art] Extend RT PCRs Done
2,978,619 UART: [art] Lock RT PCRs Done
2,980,137 UART: [art] Populate DV Done
2,988,310 UART: [fht] FMC Alias Private Key: 7
2,989,292 UART: [art] Derive CDI
2,989,572 UART: [art] Store in in slot 0x4
3,074,945 UART: [art] Derive Key Pair
3,075,305 UART: [art] Store priv key in slot 0x5
3,088,533 UART: [art] Derive Key Pair - Done
3,103,388 UART: [art] Signing Cert with AUTHO
3,103,868 UART: RITY.KEYID = 7
3,119,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,965 UART: [art] PUB.X = 5A9089C2EB7C201F326E0953B15106AF23A4E7F237699BE67F667BBBAE8E28FE05516425A51FFB0E10FDD0422E57542B
3,126,729 UART: [art] PUB.Y = 2166173CAB3D9858B2CC5109E0760C998B69556E3E7724DAFD1589D8F7C3FD68C2D7F7E7AD9EFF953DC4FB0C7CDD892F
3,133,686 UART: [art] SIG.R = 82215143C6AFB17579996418079C1A01A43507731746F3878254146C276C454B90D2E94F8A61E21B1E54094DE4184944
3,140,422 UART: [art] SIG.S = CCD19481425F8FC7A3F196AF318C380729BF08F1E5933EA2517DC9DB8819B8B067A2CBFD9C96DB1B54344F8669E8FC42
3,164,041 UART: Caliptra RT
3,164,294 UART: [state] CFI Enabled
3,272,110 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,624 UART:
3,273,640 UART: Running Caliptra ROM ...
3,274,048 UART:
3,274,103 UART: [state] CFI Enabled
3,277,227 UART: [state] LifecycleState = Unprovisioned
3,277,882 UART: [state] DebugLocked = No
3,278,544 UART: [state] WD Timer not started. Device not locked for debugging
3,279,742 UART: [kat] SHA2-256
4,083,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,421 UART: [kat] ++
4,087,573 UART: [kat] sha1
4,091,751 UART: [kat] SHA2-256
4,093,691 UART: [kat] SHA2-384
4,096,352 UART: [kat] SHA2-512-ACC
4,098,252 UART: [kat] ECC-384
4,108,061 UART: [kat] HMAC-384Kdf
4,112,731 UART: [kat] LMS
4,361,043 UART: [kat] --
4,361,853 UART: [update-reset] ++
4,451,277 >>> mbox cmd response: failed
4,451,277 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,451,693 UART: ROM Non-Fatal Error: 0x000B001F
4,452,613 UART: [state] Locking Datavault
4,453,379 UART: [state] Locking PCR0, PCR1 and PCR31
4,453,983 UART: [state] Locking ICCM
4,454,517 UART: [exit] Launching FMC @ 0x40000130
4,459,846 UART:
4,459,862 UART: Running Caliptra FMC ...
4,460,270 UART:
4,460,324 UART: [state] CFI Enabled
4,549,373 UART: [art] Extend RT PCRs Done
4,549,801 UART: [art] Lock RT PCRs Done
4,551,252 UART: [art] Populate DV Done
4,559,295 UART: [fht] FMC Alias Private Key: 7
4,560,261 UART: [art] Derive CDI
4,560,541 UART: [art] Store in in slot 0x4
4,646,244 UART: [art] Derive Key Pair
4,646,604 UART: [art] Store priv key in slot 0x5
4,659,708 UART: [art] Derive Key Pair - Done
4,674,327 UART: [art] Signing Cert with AUTHO
4,674,807 UART: RITY.KEYID = 7
4,689,507 UART: [art] Erasing AUTHORITY.KEYID = 7
4,690,272 UART: [art] PUB.X = 5A9089C2EB7C201F326E0953B15106AF23A4E7F237699BE67F667BBBAE8E28FE05516425A51FFB0E10FDD0422E57542B
4,697,036 UART: [art] PUB.Y = 2166173CAB3D9858B2CC5109E0760C998B69556E3E7724DAFD1589D8F7C3FD68C2D7F7E7AD9EFF953DC4FB0C7CDD892F
4,703,993 UART: [art] SIG.R = 82215143C6AFB17579996418079C1A01A43507731746F3878254146C276C454B90D2E94F8A61E21B1E54094DE4184944
4,710,729 UART: [art] SIG.S = CCD19481425F8FC7A3F196AF318C380729BF08F1E5933EA2517DC9DB8819B8B067A2CBFD9C96DB1B54344F8669E8FC42
4,734,068 UART: Caliptra RT
4,734,321 UART: [state] CFI Enabled
5,012,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,014,284 UART:
5,014,300 UART: Running Caliptra ROM ...
5,014,708 UART:
5,014,763 UART: [state] CFI Enabled
5,017,855 UART: [state] LifecycleState = Unprovisioned
5,018,510 UART: [state] DebugLocked = No
5,019,162 UART: [state] WD Timer not started. Device not locked for debugging
5,020,366 UART: [kat] SHA2-256
5,823,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,828,045 UART: [kat] ++
5,828,197 UART: [kat] sha1
5,832,601 UART: [kat] SHA2-256
5,834,541 UART: [kat] SHA2-384
5,837,344 UART: [kat] SHA2-512-ACC
5,839,244 UART: [kat] ECC-384
5,848,883 UART: [kat] HMAC-384Kdf
5,853,393 UART: [kat] LMS
6,101,705 UART: [kat] --
6,102,493 UART: [update-reset] ++
7,412,518 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,413,559 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,563,011 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,783 >>> mbox cmd response: success
2,618,783 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,680,301 UART:
2,680,317 UART: Running Caliptra FMC ...
2,680,725 UART:
2,680,779 UART: [state] CFI Enabled
2,691,642 UART: [fht] FMC Alias Private Key: 7
2,799,439 UART: [art] Extend RT PCRs Done
2,799,867 UART: [art] Lock RT PCRs Done
2,801,419 UART: [art] Populate DV Done
2,809,508 UART: [fht] FMC Alias Private Key: 7
2,810,660 UART: [art] Derive CDI
2,810,940 UART: [art] Store in in slot 0x4
2,896,469 UART: [art] Derive Key Pair
2,896,829 UART: [art] Store priv key in slot 0x5
2,910,567 UART: [art] Derive Key Pair - Done
2,925,327 UART: [art] Signing Cert with AUTHO
2,925,807 UART: RITY.KEYID = 7
2,941,053 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,818 UART: [art] PUB.X = 1FF43AA32F1FB610B7254737AC243FC8E41808DD2F055786FA933071741A3A887DCAED67D23EBE59101F65161DE28D42
2,948,586 UART: [art] PUB.Y = AAC69968B08F005D3E56EACA809CF8E119CAFFDB9EE6BAEF9875F49CFCCA293BCA9E1A19E90BBD3FBB6A6F045BA10763
2,955,539 UART: [art] SIG.R = D43D6C40C7607497154F2B44562FE7C07011CDA6C3F9A061579DCC2AD2D9D04B80C2172E2525ABF53407BE6DB5A8BCF6
2,962,316 UART: [art] SIG.S = AE0BD7BAA45B3D46FF7B5832ECEFF8D221D3DC52E365210341158E3CB8AD82B4DEF3F105752DCA9D169F5632123BA6FA
2,986,428 UART: Caliptra RT
2,986,681 UART: [state] CFI Enabled
3,094,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,754 >>> mbox cmd response: failed
4,156,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,162,295 UART:
4,162,311 UART: Running Caliptra FMC ...
4,162,719 UART:
4,162,773 UART: [state] CFI Enabled
4,251,602 UART: [art] Extend RT PCRs Done
4,252,030 UART: [art] Lock RT PCRs Done
4,253,471 UART: [art] Populate DV Done
4,261,830 UART: [fht] FMC Alias Private Key: 7
4,262,868 UART: [art] Derive CDI
4,263,148 UART: [art] Store in in slot 0x4
4,348,869 UART: [art] Derive Key Pair
4,349,229 UART: [art] Store priv key in slot 0x5
4,362,313 UART: [art] Derive Key Pair - Done
4,376,913 UART: [art] Signing Cert with AUTHO
4,377,393 UART: RITY.KEYID = 7
4,392,345 UART: [art] Erasing AUTHORITY.KEYID = 7
4,393,110 UART: [art] PUB.X = 1FF43AA32F1FB610B7254737AC243FC8E41808DD2F055786FA933071741A3A887DCAED67D23EBE59101F65161DE28D42
4,399,878 UART: [art] PUB.Y = AAC69968B08F005D3E56EACA809CF8E119CAFFDB9EE6BAEF9875F49CFCCA293BCA9E1A19E90BBD3FBB6A6F045BA10763
4,406,831 UART: [art] SIG.R = D43D6C40C7607497154F2B44562FE7C07011CDA6C3F9A061579DCC2AD2D9D04B80C2172E2525ABF53407BE6DB5A8BCF6
4,413,608 UART: [art] SIG.S = AE0BD7BAA45B3D46FF7B5832ECEFF8D221D3DC52E365210341158E3CB8AD82B4DEF3F105752DCA9D169F5632123BA6FA
4,437,182 UART: Caliptra RT
4,437,435 UART: [state] CFI Enabled
4,720,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,151,026 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,174,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,198,892 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,967 UART: [ldev] ++
1,209,135 UART: [ldev] CDI.KEYID = 6
1,209,499 UART: [ldev] SUBJECT.KEYID = 5
1,209,926 UART: [ldev] AUTHORITY.KEYID = 7
1,210,389 UART: [ldev] FE.KEYID = 1
1,215,655 UART: [ldev] Erasing FE.KEYID = 1
1,242,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,183 UART: [ldev] --
1,281,549 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,019 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,147 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,010 >>> mbox cmd response: success
2,770,010 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,771,215 UART: [afmc] ++
2,771,383 UART: [afmc] CDI.KEYID = 6
2,771,746 UART: [afmc] SUBJECT.KEYID = 7
2,772,172 UART: [afmc] AUTHORITY.KEYID = 5
2,808,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,338 UART: [afmc] --
2,851,434 UART: [cold-reset] --
2,852,592 UART: [state] Locking Datavault
2,853,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,547 UART: [state] Locking ICCM
2,855,175 UART: [exit] Launching FMC @ 0x40000130
2,860,504 UART:
2,860,520 UART: Running Caliptra FMC ...
2,860,928 UART:
2,861,071 UART: [state] CFI Enabled
2,871,570 UART: [fht] FMC Alias Private Key: 7
2,979,377 UART: [art] Extend RT PCRs Done
2,979,805 UART: [art] Lock RT PCRs Done
2,981,443 UART: [art] Populate DV Done
2,989,524 UART: [fht] FMC Alias Private Key: 7
2,990,666 UART: [art] Derive CDI
2,990,946 UART: [art] Store in in slot 0x4
3,076,825 UART: [art] Derive Key Pair
3,077,185 UART: [art] Store priv key in slot 0x5
3,090,497 UART: [art] Derive Key Pair - Done
3,105,355 UART: [art] Signing Cert with AUTHO
3,105,835 UART: RITY.KEYID = 7
3,121,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,848 UART: [art] PUB.X = 0DE4810E4AA93BD5917D7AF64176D65AF23AC3C31AE56EF7459A15689FB51A6A3F4013917E522F3FF3F8B80D4E2F80D8
3,128,619 UART: [art] PUB.Y = 672446052ACF43D20F1955EE4E7B04BA5360400437607C8A7B8EFA01DDA95B424F1DFEE182BAC1C560BA45E6F0A2391C
3,135,564 UART: [art] SIG.R = B78BFAE2F96D2EE316AC65F7B1182C54B57DCD915EF0457EE59856E4606F4310F7F92F8A6505C732D3CE1C2BCF5DED0C
3,142,346 UART: [art] SIG.S = 47D642FACD894D6B8149321D688F4E2BB60AE07E668B044568B5CD68891FBCE9DA5571CCD3860CA74724EF86893F5C3A
3,165,826 UART: Caliptra RT
3,166,171 UART: [state] CFI Enabled
3,273,298 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,300 UART:
3,275,316 UART: Running Caliptra ROM ...
3,275,724 UART:
3,275,866 UART: [state] CFI Enabled
3,278,846 UART: [state] LifecycleState = Unprovisioned
3,279,501 UART: [state] DebugLocked = No
3,280,031 UART: [state] WD Timer not started. Device not locked for debugging
3,281,275 UART: [kat] SHA2-256
4,084,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,954 UART: [kat] ++
4,089,106 UART: [kat] sha1
4,093,370 UART: [kat] SHA2-256
4,095,310 UART: [kat] SHA2-384
4,098,063 UART: [kat] SHA2-512-ACC
4,099,963 UART: [kat] ECC-384
4,109,686 UART: [kat] HMAC-384Kdf
4,114,262 UART: [kat] LMS
4,362,574 UART: [kat] --
4,363,442 UART: [update-reset] ++
4,452,944 >>> mbox cmd response: failed
4,452,944 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,453,402 UART: ROM Non-Fatal Error: 0x000B001F
4,454,182 UART: [state] Locking Datavault
4,455,082 UART: [state] Locking PCR0, PCR1 and PCR31
4,455,686 UART: [state] Locking ICCM
4,456,220 UART: [exit] Launching FMC @ 0x40000130
4,461,549 UART:
4,461,565 UART: Running Caliptra FMC ...
4,461,973 UART:
4,462,116 UART: [state] CFI Enabled
4,551,153 UART: [art] Extend RT PCRs Done
4,551,581 UART: [art] Lock RT PCRs Done
4,552,686 UART: [art] Populate DV Done
4,561,159 UART: [fht] FMC Alias Private Key: 7
4,562,199 UART: [art] Derive CDI
4,562,479 UART: [art] Store in in slot 0x4
4,648,358 UART: [art] Derive Key Pair
4,648,718 UART: [art] Store priv key in slot 0x5
4,662,026 UART: [art] Derive Key Pair - Done
4,676,642 UART: [art] Signing Cert with AUTHO
4,677,122 UART: RITY.KEYID = 7
4,692,650 UART: [art] Erasing AUTHORITY.KEYID = 7
4,693,415 UART: [art] PUB.X = 0DE4810E4AA93BD5917D7AF64176D65AF23AC3C31AE56EF7459A15689FB51A6A3F4013917E522F3FF3F8B80D4E2F80D8
4,700,186 UART: [art] PUB.Y = 672446052ACF43D20F1955EE4E7B04BA5360400437607C8A7B8EFA01DDA95B424F1DFEE182BAC1C560BA45E6F0A2391C
4,707,131 UART: [art] SIG.R = B78BFAE2F96D2EE316AC65F7B1182C54B57DCD915EF0457EE59856E4606F4310F7F92F8A6505C732D3CE1C2BCF5DED0C
4,713,913 UART: [art] SIG.S = 47D642FACD894D6B8149321D688F4E2BB60AE07E668B044568B5CD68891FBCE9DA5571CCD3860CA74724EF86893F5C3A
4,737,573 UART: Caliptra RT
4,737,918 UART: [state] CFI Enabled
5,020,039 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,021,672 UART:
5,021,688 UART: Running Caliptra ROM ...
5,022,096 UART:
5,022,238 UART: [state] CFI Enabled
5,024,736 UART: [state] LifecycleState = Unprovisioned
5,025,391 UART: [state] DebugLocked = No
5,025,985 UART: [state] WD Timer not started. Device not locked for debugging
5,027,247 UART: [kat] SHA2-256
5,830,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,834,926 UART: [kat] ++
5,835,078 UART: [kat] sha1
5,839,462 UART: [kat] SHA2-256
5,841,402 UART: [kat] SHA2-384
5,844,179 UART: [kat] SHA2-512-ACC
5,846,079 UART: [kat] ECC-384
5,855,752 UART: [kat] HMAC-384Kdf
5,860,424 UART: [kat] LMS
6,108,736 UART: [kat] --
6,109,592 UART: [update-reset] ++
7,420,343 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,421,462 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,570,914 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,782 >>> mbox cmd response: success
2,619,782 <<< Executing mbox cmd 0x46574c44 (99384 bytes) from SoC
2,681,748 UART:
2,681,764 UART: Running Caliptra FMC ...
2,682,172 UART:
2,682,315 UART: [state] CFI Enabled
2,693,078 UART: [fht] FMC Alias Private Key: 7
2,800,933 UART: [art] Extend RT PCRs Done
2,801,361 UART: [art] Lock RT PCRs Done
2,803,083 UART: [art] Populate DV Done
2,811,408 UART: [fht] FMC Alias Private Key: 7
2,812,586 UART: [art] Derive CDI
2,812,866 UART: [art] Store in in slot 0x4
2,898,505 UART: [art] Derive Key Pair
2,898,865 UART: [art] Store priv key in slot 0x5
2,911,823 UART: [art] Derive Key Pair - Done
2,926,576 UART: [art] Signing Cert with AUTHO
2,927,056 UART: RITY.KEYID = 7
2,942,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,975 UART: [art] PUB.X = F3B4C0D08781487C4BB220B113F9C10182ECD62033E2590EA5C4F0EE95944D61C85FA415911DB938959BD52EA93E247F
2,949,741 UART: [art] PUB.Y = A1A966F34A2BB317B8F46D31218A9DE26B75BB7365E29076F2F34F596B2CF9E1A8CBF16D920AB89AA8AED5E79EECB986
2,956,706 UART: [art] SIG.R = 26EDB74866570DB2737A4B97A2B536E2DF0D9AE244F42E6FAFE61578E66DC41FD0A649066CA5676199446BA6DBB0E844
2,963,475 UART: [art] SIG.S = 2B114F171D9ED50336A76CC7D582F571C9AA942BD69E7A772190D167B5A5432C681081FC810E4B0FA949E277C53FA2D8
2,987,419 UART: Caliptra RT
2,987,764 UART: [state] CFI Enabled
3,095,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,158,557 >>> mbox cmd response: failed
4,158,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,164,426 UART:
4,164,442 UART: Running Caliptra FMC ...
4,164,850 UART:
4,164,993 UART: [state] CFI Enabled
4,253,990 UART: [art] Extend RT PCRs Done
4,254,418 UART: [art] Lock RT PCRs Done
4,255,673 UART: [art] Populate DV Done
4,263,738 UART: [fht] FMC Alias Private Key: 7
4,264,820 UART: [art] Derive CDI
4,265,100 UART: [art] Store in in slot 0x4
4,350,893 UART: [art] Derive Key Pair
4,351,253 UART: [art] Store priv key in slot 0x5
4,364,465 UART: [art] Derive Key Pair - Done
4,379,108 UART: [art] Signing Cert with AUTHO
4,379,588 UART: RITY.KEYID = 7
4,395,192 UART: [art] Erasing AUTHORITY.KEYID = 7
4,395,957 UART: [art] PUB.X = F3B4C0D08781487C4BB220B113F9C10182ECD62033E2590EA5C4F0EE95944D61C85FA415911DB938959BD52EA93E247F
4,402,723 UART: [art] PUB.Y = A1A966F34A2BB317B8F46D31218A9DE26B75BB7365E29076F2F34F596B2CF9E1A8CBF16D920AB89AA8AED5E79EECB986
4,409,688 UART: [art] SIG.R = 26EDB74866570DB2737A4B97A2B536E2DF0D9AE244F42E6FAFE61578E66DC41FD0A649066CA5676199446BA6DBB0E844
4,416,457 UART: [art] SIG.S = 2B114F171D9ED50336A76CC7D582F571C9AA942BD69E7A772190D167B5A5432C681081FC810E4B0FA949E277C53FA2D8
4,440,705 UART: Caliptra RT
4,441,050 UART: [state] CFI Enabled
4,724,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,154,765 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,153 UART:
192,519 UART: Running Caliptra ROM ...
193,702 UART:
193,874 UART: [state] CFI Enabled
259,312 UART: [state] LifecycleState = Unprovisioned
261,220 UART: [state] DebugLocked = No
264,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,627 UART: [kat] SHA2-256
439,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,825 UART: [kat] ++
450,364 UART: [kat] sha1
461,787 UART: [kat] SHA2-256
464,473 UART: [kat] SHA2-384
470,825 UART: [kat] SHA2-512-ACC
473,219 UART: [kat] ECC-384
2,764,540 UART: [kat] HMAC-384Kdf
2,798,443 UART: [kat] LMS
3,988,750 UART: [kat] --
3,992,636 UART: [cold-reset] ++
3,995,295 UART: [fht] Storing FHT @ 0x50003400
4,008,074 UART: [idev] ++
4,008,650 UART: [idev] CDI.KEYID = 6
4,009,537 UART: [idev] SUBJECT.KEYID = 7
4,010,807 UART: [idev] UDS.KEYID = 0
4,013,594 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,864 UART: [idev] Erasing UDS.KEYID = 0
7,346,754 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,945 UART: [idev] --
7,372,151 UART: [ldev] ++
7,372,720 UART: [ldev] CDI.KEYID = 6
7,373,685 UART: [ldev] SUBJECT.KEYID = 5
7,374,910 UART: [ldev] AUTHORITY.KEYID = 7
7,376,146 UART: [ldev] FE.KEYID = 1
7,422,333 UART: [ldev] Erasing FE.KEYID = 1
10,756,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,110 UART: [ldev] --
13,117,889 UART: [fwproc] Waiting for Commands...
13,120,045 UART: [fwproc] Received command 0x46574c44
13,122,242 UART: [fwproc] Received Image of size 113760 bytes
17,168,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,481 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,213 >>> mbox cmd response: success
17,629,263 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,772,309 UART: [afmc] ++
17,772,936 UART: [afmc] CDI.KEYID = 6
17,773,861 UART: [afmc] SUBJECT.KEYID = 7
17,774,988 UART: [afmc] AUTHORITY.KEYID = 5
21,006,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,303,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,878 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,320,287 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,335,097 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,349,520 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,055 UART: [afmc] --
23,374,513 UART: [cold-reset] --
23,378,482 UART: [state] Locking Datavault
23,384,377 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,960 UART: [state] Locking ICCM
23,387,393 UART: [exit] Launching FMC @ 0x40000130
23,395,799 UART:
23,396,039 UART: Running Caliptra FMC ...
23,397,143 UART:
23,397,320 UART: [state] CFI Enabled
23,464,346 UART: [fht] FMC Alias Private Key: 7
25,802,062 UART: [art] Extend RT PCRs Done
25,803,289 UART: [art] Lock RT PCRs Done
25,804,913 UART: [art] Populate DV Done
25,810,431 UART: [fht] FMC Alias Private Key: 7
25,812,136 UART: [art] Derive CDI
25,812,944 UART: [art] Store in in slot 0x4
25,872,210 UART: [art] Derive Key Pair
25,873,263 UART: [art] Store priv key in slot 0x5
29,165,994 UART: [art] Derive Key Pair - Done
29,179,005 UART: [art] Signing Cert with AUTHO
29,180,307 UART: RITY.KEYID = 7
31,467,346 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,874 UART: [art] PUB.X = 67C5DCBB856882C47BB4AE638CFCE81AFBFD59DE5906AEFB302FF6D4D44CF94458AABF8C20AC7235BF2F8E26844D2E99
31,476,150 UART: [art] PUB.Y = E85310DAF9D5482166CA6194852EE6C2DD157B964340FDF239FF219790CA0AB8DB2D67C4514E1651CE22E4E08436764E
31,483,363 UART: [art] SIG.R = F4514896F638C317757346445A3C6AC854FA868A550C09E005711548FBFA07B1BF93B7A115BECE57AE4C62778BA4B950
31,490,767 UART: [art] SIG.S = 2EBE8218540BB9BDAEC60DE70C6A9E6D5F1BEE35FA145FEAE38567A6D5B08FE562B9587AF3B17A6E597E6A884ED55BDB
32,796,278 UART: Caliptra RT
32,796,985 UART: [state] CFI Enabled
32,956,290 UART: [rt] RT listening for mailbox commands...
32,959,303 UART:
32,959,469 UART: Running Caliptra ROM ...
32,960,488 UART:
32,960,639 UART: [state] CFI Enabled
33,024,642 UART: [state] LifecycleState = Unprovisioned
33,026,573 UART: [state] DebugLocked = No
33,029,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,034,130 UART: [kat] SHA2-256
33,203,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,214,311 UART: [kat] ++
33,214,764 UART: [kat] sha1
33,225,881 UART: [kat] SHA2-256
33,228,551 UART: [kat] SHA2-384
33,233,411 UART: [kat] SHA2-512-ACC
33,235,772 UART: [kat] ECC-384
35,527,329 UART: [kat] HMAC-384Kdf
35,557,597 UART: [kat] LMS
36,747,901 UART: [kat] --
36,751,753 UART: [update-reset] ++
36,855,491 >>> mbox cmd response: failed
36,857,280 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
37,000,345 UART: ROM Non-Fatal Error: 0x000B001D
37,001,778 UART: [state] Locking Datavault
37,002,855 UART: [state] Locking PCR0, PCR1 and PCR31
37,004,395 UART: [state] Locking ICCM
37,005,276 UART: [exit] Launching FMC @ 0x40000130
37,006,625 UART:
37,006,798 UART: Running Caliptra FMC ...
37,007,905 UART:
37,008,064 UART: [state] CFI Enabled
37,008,904 UART: [art] Extend RT PCRs Done
37,009,964 UART: [art] Lock RT PCRs Done
37,010,974 UART: [art] Populate DV Done
37,011,949 UART: [fht] FMC Alias Private Key: 7
37,013,268 UART: [art] Derive CDI
37,014,007 UART: [art] Store in in slot 0x4
37,047,964 UART: [art] Derive Key Pair
37,048,967 UART: [art] Store priv key in slot 0x5
40,341,592 UART: [art] Derive Key Pair - Done
40,354,678 UART: [art] Signing Cert with AUTHO
40,356,004 UART: RITY.KEYID = 7
42,642,828 UART: [art] Erasing AUTHORITY.KEYID = 7
42,644,351 UART: [art] PUB.X = 67C5DCBB856882C47BB4AE638CFCE81AFBFD59DE5906AEFB302FF6D4D44CF94458AABF8C20AC7235BF2F8E26844D2E99
42,651,643 UART: [art] PUB.Y = E85310DAF9D5482166CA6194852EE6C2DD157B964340FDF239FF219790CA0AB8DB2D67C4514E1651CE22E4E08436764E
42,658,837 UART: [art] SIG.R = F4514896F638C317757346445A3C6AC854FA868A550C09E005711548FBFA07B1BF93B7A115BECE57AE4C62778BA4B950
42,666,216 UART: [art] SIG.S = 2EBE8218540BB9BDAEC60DE70C6A9E6D5F1BEE35FA145FEAE38567A6D5B08FE562B9587AF3B17A6E597E6A884ED55BDB
43,970,843 UART: Caliptra RT
43,971,544 UART: [state] CFI Enabled
44,302,930 UART: [rt] RT listening for mailbox commands...
44,305,481 UART:
44,305,650 UART: Running Caliptra ROM ...
44,306,696 UART:
44,306,846 UART: [state] CFI Enabled
44,372,546 UART: [state] LifecycleState = Unprovisioned
44,374,481 UART: [state] DebugLocked = No
44,377,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,382,011 UART: [kat] SHA2-256
44,551,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,562,218 UART: [kat] ++
44,562,779 UART: [kat] sha1
44,574,491 UART: [kat] SHA2-256
44,577,176 UART: [kat] SHA2-384
44,583,965 UART: [kat] SHA2-512-ACC
44,586,349 UART: [kat] ECC-384
46,871,685 UART: [kat] HMAC-384Kdf
46,904,190 UART: [kat] LMS
48,094,546 UART: [kat] --
48,099,737 UART: [update-reset] ++
52,230,056 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,234,034 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
52,615,003 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,786,573 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,847,496 >>> mbox cmd response: success
17,849,445 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,546,042 UART:
23,546,441 UART: Running Caliptra FMC ...
23,547,566 UART:
23,547,723 UART: [state] CFI Enabled
23,615,618 UART: [fht] FMC Alias Private Key: 7
25,954,156 UART: [art] Extend RT PCRs Done
25,955,379 UART: [art] Lock RT PCRs Done
25,956,948 UART: [art] Populate DV Done
25,962,145 UART: [fht] FMC Alias Private Key: 7
25,963,685 UART: [art] Derive CDI
25,964,451 UART: [art] Store in in slot 0x4
26,023,849 UART: [art] Derive Key Pair
26,024,899 UART: [art] Store priv key in slot 0x5
29,317,507 UART: [art] Derive Key Pair - Done
29,330,558 UART: [art] Signing Cert with AUTHO
29,331,865 UART: RITY.KEYID = 7
31,618,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,367 UART: [art] PUB.X = 78FC4A91D2622D496B823F520907B7B54CAC96448FE0E3D8CBA1F87334A99E112A4547869A516065157FDBD9903DDE26
31,627,587 UART: [art] PUB.Y = 234DF33C54D8BC129914E24C970D274206ED82FEB056BC41A8C1376F116B94CC32BE57212CA152D9A829C32E0FDC1B60
31,634,841 UART: [art] SIG.R = 9AB115043937F2F6079B050FFEB4FF4D4CBA30E7D2B7285538A315460976557B23E1EE076BE4F05C53C6674F67D02C34
31,642,235 UART: [art] SIG.S = 5FDFCCF7285C056C211EFDBFA4A88C293D353ECE8CAF61073D675A4B5B811BFF00C65E9470699AE5F2BAFFFD8040E18E
32,947,617 UART: Caliptra RT
32,948,325 UART: [state] CFI Enabled
33,108,857 UART: [rt] RT listening for mailbox commands...
36,798,672 >>> mbox cmd response: failed
36,800,685 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,943,719 UART:
36,944,037 UART: Running Caliptra FMC ...
36,945,161 UART:
36,945,324 UART: [state] CFI Enabled
36,946,246 UART: [art] Extend RT PCRs Done
36,947,377 UART: [art] Lock RT PCRs Done
36,948,445 UART: [art] Populate DV Done
36,949,793 UART: [fht] FMC Alias Private Key: 7
36,951,056 UART: [art] Derive CDI
36,951,789 UART: [art] Store in in slot 0x4
36,986,345 UART: [art] Derive Key Pair
36,987,350 UART: [art] Store priv key in slot 0x5
40,279,634 UART: [art] Derive Key Pair - Done
40,292,546 UART: [art] Signing Cert with AUTHO
40,293,857 UART: RITY.KEYID = 7
42,580,873 UART: [art] Erasing AUTHORITY.KEYID = 7
42,582,376 UART: [art] PUB.X = 78FC4A91D2622D496B823F520907B7B54CAC96448FE0E3D8CBA1F87334A99E112A4547869A516065157FDBD9903DDE26
42,589,579 UART: [art] PUB.Y = 234DF33C54D8BC129914E24C970D274206ED82FEB056BC41A8C1376F116B94CC32BE57212CA152D9A829C32E0FDC1B60
42,596,876 UART: [art] SIG.R = 9AB115043937F2F6079B050FFEB4FF4D4CBA30E7D2B7285538A315460976557B23E1EE076BE4F05C53C6674F67D02C34
42,604,200 UART: [art] SIG.S = 5FDFCCF7285C056C211EFDBFA4A88C293D353ECE8CAF61073D675A4B5B811BFF00C65E9470699AE5F2BAFFFD8040E18E
43,909,639 UART: Caliptra RT
43,910,338 UART: [state] CFI Enabled
44,238,307 UART: [rt] RT listening for mailbox commands...
52,825,299 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,653 UART:
193,005 UART: Running Caliptra ROM ...
194,194 UART:
604,046 UART: [state] CFI Enabled
621,176 UART: [state] LifecycleState = Unprovisioned
623,130 UART: [state] DebugLocked = No
624,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,030 UART: [kat] SHA2-256
799,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,299 UART: [kat] ++
810,800 UART: [kat] sha1
822,916 UART: [kat] SHA2-256
825,656 UART: [kat] SHA2-384
831,363 UART: [kat] SHA2-512-ACC
833,753 UART: [kat] ECC-384
3,118,040 UART: [kat] HMAC-384Kdf
3,129,045 UART: [kat] LMS
4,319,172 UART: [kat] --
4,323,405 UART: [cold-reset] ++
4,325,502 UART: [fht] Storing FHT @ 0x50003400
4,337,095 UART: [idev] ++
4,337,673 UART: [idev] CDI.KEYID = 6
4,338,692 UART: [idev] SUBJECT.KEYID = 7
4,339,855 UART: [idev] UDS.KEYID = 0
4,342,934 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,041 UART: [idev] Erasing UDS.KEYID = 0
7,626,255 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,017 UART: [idev] --
7,652,341 UART: [ldev] ++
7,652,914 UART: [ldev] CDI.KEYID = 6
7,653,855 UART: [ldev] SUBJECT.KEYID = 5
7,655,139 UART: [ldev] AUTHORITY.KEYID = 7
7,656,294 UART: [ldev] FE.KEYID = 1
7,666,756 UART: [ldev] Erasing FE.KEYID = 1
10,951,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,703 UART: [ldev] --
13,310,998 UART: [fwproc] Waiting for Commands...
13,314,236 UART: [fwproc] Received command 0x46574c44
13,316,424 UART: [fwproc] Received Image of size 113760 bytes
17,368,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,445 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,835,783 >>> mbox cmd response: success
17,837,921 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,980,902 UART: [afmc] ++
17,981,550 UART: [afmc] CDI.KEYID = 6
17,982,474 UART: [afmc] SUBJECT.KEYID = 7
17,983,582 UART: [afmc] AUTHORITY.KEYID = 5
21,152,747 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,309 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,686 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,541 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,965 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,145 UART: [afmc] --
23,516,424 UART: [cold-reset] --
23,519,960 UART: [state] Locking Datavault
23,525,477 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,239 UART: [state] Locking ICCM
23,528,546 UART: [exit] Launching FMC @ 0x40000130
23,536,946 UART:
23,537,181 UART: Running Caliptra FMC ...
23,538,283 UART:
23,538,445 UART: [state] CFI Enabled
23,546,817 UART: [fht] FMC Alias Private Key: 7
25,877,551 UART: [art] Extend RT PCRs Done
25,878,779 UART: [art] Lock RT PCRs Done
25,880,529 UART: [art] Populate DV Done
25,886,267 UART: [fht] FMC Alias Private Key: 7
25,887,968 UART: [art] Derive CDI
25,888,788 UART: [art] Store in in slot 0x4
25,931,494 UART: [art] Derive Key Pair
25,932,537 UART: [art] Store priv key in slot 0x5
29,174,435 UART: [art] Derive Key Pair - Done
29,187,243 UART: [art] Signing Cert with AUTHO
29,188,607 UART: RITY.KEYID = 7
31,467,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,988 UART: [art] PUB.X = 97737AF0588712A783A735279EFCD705A88684386B7C81AE90F7A2C5810852926D77180088035C1BB27464C294EA837A
31,476,174 UART: [art] PUB.Y = 8C1D9DEA2EE5C2805DFFDE8827FB6E806E10A1310D794C476693F93FF41A83ECD2D9CCEBD72FCFFF01F9774CC77ADE87
31,483,466 UART: [art] SIG.R = 65D348B68276CB30EEA78DCE30BDFDC761D8EBBD19D87BFDDA0E7FED834E278BA163FEE4AA5123B91A8A445DD2EFF381
31,490,924 UART: [art] SIG.S = 6BB8CDE441D13E9AD65D90C03DF4800B5AADA865583991F5842E810D0D67E0D7626BE6E88C087B9B41427CCF81DC610B
32,796,388 UART: Caliptra RT
32,797,080 UART: [state] CFI Enabled
32,914,302 UART: [rt] RT listening for mailbox commands...
32,917,250 UART:
32,917,499 UART: Running Caliptra ROM ...
32,918,604 UART:
32,918,930 UART: [state] CFI Enabled
32,933,566 UART: [state] LifecycleState = Unprovisioned
32,935,443 UART: [state] DebugLocked = No
32,938,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,942,480 UART: [kat] SHA2-256
33,112,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,122,762 UART: [kat] ++
33,123,308 UART: [kat] sha1
33,135,280 UART: [kat] SHA2-256
33,138,023 UART: [kat] SHA2-384
33,144,816 UART: [kat] SHA2-512-ACC
33,147,164 UART: [kat] ECC-384
35,431,050 UART: [kat] HMAC-384Kdf
35,441,608 UART: [kat] LMS
36,631,672 UART: [kat] --
36,637,342 UART: [update-reset] ++
36,738,151 >>> mbox cmd response: failed
36,740,018 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,882,981 UART: ROM Non-Fatal Error: 0x000B001D
36,884,413 UART: [state] Locking Datavault
36,885,588 UART: [state] Locking PCR0, PCR1 and PCR31
36,887,130 UART: [state] Locking ICCM
36,888,037 UART: [exit] Launching FMC @ 0x40000130
36,889,472 UART:
36,889,633 UART: Running Caliptra FMC ...
36,890,735 UART:
36,890,894 UART: [state] CFI Enabled
36,891,826 UART: [art] Extend RT PCRs Done
36,892,885 UART: [art] Lock RT PCRs Done
36,893,864 UART: [art] Populate DV Done
36,894,893 UART: [fht] FMC Alias Private Key: 7
36,896,133 UART: [art] Derive CDI
36,896,863 UART: [art] Store in in slot 0x4
36,898,033 UART: [art] Derive Key Pair
36,898,978 UART: [art] Store priv key in slot 0x5
40,101,714 UART: [art] Derive Key Pair - Done
40,114,404 UART: [art] Signing Cert with AUTHO
40,115,871 UART: RITY.KEYID = 7
42,394,705 UART: [art] Erasing AUTHORITY.KEYID = 7
42,396,214 UART: [art] PUB.X = 97737AF0588712A783A735279EFCD705A88684386B7C81AE90F7A2C5810852926D77180088035C1BB27464C294EA837A
42,403,385 UART: [art] PUB.Y = 8C1D9DEA2EE5C2805DFFDE8827FB6E806E10A1310D794C476693F93FF41A83ECD2D9CCEBD72FCFFF01F9774CC77ADE87
42,410,719 UART: [art] SIG.R = 65D348B68276CB30EEA78DCE30BDFDC761D8EBBD19D87BFDDA0E7FED834E278BA163FEE4AA5123B91A8A445DD2EFF381
42,418,102 UART: [art] SIG.S = 6BB8CDE441D13E9AD65D90C03DF4800B5AADA865583991F5842E810D0D67E0D7626BE6E88C087B9B41427CCF81DC610B
43,723,153 UART: Caliptra RT
43,723,867 UART: [state] CFI Enabled
44,011,909 UART: [rt] RT listening for mailbox commands...
44,014,600 UART:
44,014,771 UART: Running Caliptra ROM ...
44,015,879 UART:
44,016,202 UART: [state] CFI Enabled
44,030,418 UART: [state] LifecycleState = Unprovisioned
44,032,356 UART: [state] DebugLocked = No
44,035,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,039,337 UART: [kat] SHA2-256
44,209,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,219,557 UART: [kat] ++
44,220,013 UART: [kat] sha1
44,232,409 UART: [kat] SHA2-256
44,235,102 UART: [kat] SHA2-384
44,240,059 UART: [kat] SHA2-512-ACC
44,242,407 UART: [kat] ECC-384
46,528,081 UART: [kat] HMAC-384Kdf
46,540,136 UART: [kat] LMS
47,730,189 UART: [kat] --
47,734,901 UART: [update-reset] ++
51,873,826 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,878,303 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
52,259,268 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
4,130,895 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,070,628 >>> mbox cmd response: success
18,072,500 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,708,000 UART:
23,708,419 UART: Running Caliptra FMC ...
23,709,554 UART:
23,709,737 UART: [state] CFI Enabled
23,717,091 UART: [fht] FMC Alias Private Key: 7
26,047,863 UART: [art] Extend RT PCRs Done
26,049,100 UART: [art] Lock RT PCRs Done
26,050,861 UART: [art] Populate DV Done
26,056,391 UART: [fht] FMC Alias Private Key: 7
26,057,939 UART: [art] Derive CDI
26,058,705 UART: [art] Store in in slot 0x4
26,101,575 UART: [art] Derive Key Pair
26,102,578 UART: [art] Store priv key in slot 0x5
29,345,204 UART: [art] Derive Key Pair - Done
29,358,488 UART: [art] Signing Cert with AUTHO
29,359,809 UART: RITY.KEYID = 7
31,638,856 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,372 UART: [art] PUB.X = E6162FDBE3933890D582C5670206C665E27FD3F4689E21A06FA2FFF48BA76DB0B393749FD23B38BE49D0A7B9CB7AC2CD
31,647,661 UART: [art] PUB.Y = 8CB5FBDB9916BE55275ABFBD5CD0D11BF6FC6164A5CDB061ED347877F0B1A59D33F5B83C4A3CC27336EC441318CDD3DE
31,654,908 UART: [art] SIG.R = 258784141DDEEE90297E3EBCF8DCD8F09DDC75F7AF9D30FE31242400CE99BA11A881203790FE64A2C52969CBDBAF1665
31,662,280 UART: [art] SIG.S = CA12A21ABEE71BA6214676FEC933E9193EA1764F81E2C533424D17DF4D39FF8A8B59032F889CC1F178C0C7D8D128D6A5
32,967,903 UART: Caliptra RT
32,968,619 UART: [state] CFI Enabled
33,085,166 UART: [rt] RT listening for mailbox commands...
36,717,597 >>> mbox cmd response: failed
36,719,297 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,862,266 UART:
36,862,599 UART: Running Caliptra FMC ...
36,863,642 UART:
36,863,793 UART: [state] CFI Enabled
36,864,726 UART: [art] Extend RT PCRs Done
36,865,870 UART: [art] Lock RT PCRs Done
36,866,859 UART: [art] Populate DV Done
36,867,971 UART: [fht] FMC Alias Private Key: 7
36,869,216 UART: [art] Derive CDI
36,869,967 UART: [art] Store in in slot 0x4
36,871,144 UART: [art] Derive Key Pair
36,872,061 UART: [art] Store priv key in slot 0x5
40,071,785 UART: [art] Derive Key Pair - Done
40,084,688 UART: [art] Signing Cert with AUTHO
40,086,004 UART: RITY.KEYID = 7
42,365,433 UART: [art] Erasing AUTHORITY.KEYID = 7
42,366,953 UART: [art] PUB.X = E6162FDBE3933890D582C5670206C665E27FD3F4689E21A06FA2FFF48BA76DB0B393749FD23B38BE49D0A7B9CB7AC2CD
42,374,218 UART: [art] PUB.Y = 8CB5FBDB9916BE55275ABFBD5CD0D11BF6FC6164A5CDB061ED347877F0B1A59D33F5B83C4A3CC27336EC441318CDD3DE
42,381,479 UART: [art] SIG.R = 258784141DDEEE90297E3EBCF8DCD8F09DDC75F7AF9D30FE31242400CE99BA11A881203790FE64A2C52969CBDBAF1665
42,388,849 UART: [art] SIG.S = CA12A21ABEE71BA6214676FEC933E9193EA1764F81E2C533424D17DF4D39FF8A8B59032F889CC1F178C0C7D8D128D6A5
43,693,865 UART: Caliptra RT
43,694,591 UART: [state] CFI Enabled
43,982,112 UART: [rt] RT listening for mailbox commands...
52,488,695 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,265 UART:
192,625 UART: Running Caliptra ROM ...
193,718 UART:
193,858 UART: [state] CFI Enabled
260,171 UART: [state] LifecycleState = Unprovisioned
262,105 UART: [state] DebugLocked = No
263,507 UART: [state] WD Timer not started. Device not locked for debugging
266,800 UART: [kat] SHA2-256
445,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,501 UART: [kat] ++
457,970 UART: [kat] sha1
468,643 UART: [kat] SHA2-256
471,684 UART: [kat] SHA2-384
478,206 UART: [kat] SHA2-512-ACC
481,199 UART: [kat] ECC-384
2,943,566 UART: [kat] HMAC-384Kdf
2,965,093 UART: [kat] LMS
3,494,553 UART: [kat] --
3,498,431 UART: [cold-reset] ++
3,499,549 UART: [fht] FHT @ 0x50003400
3,510,474 UART: [idev] ++
3,511,060 UART: [idev] CDI.KEYID = 6
3,511,945 UART: [idev] SUBJECT.KEYID = 7
3,513,161 UART: [idev] UDS.KEYID = 0
3,515,917 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,659,454 UART: [idev] Erasing UDS.KEYID = 0
6,016,985 UART: [idev] Sha1 KeyId Algorithm
6,039,143 UART: [idev] --
6,041,790 UART: [ldev] ++
6,042,366 UART: [ldev] CDI.KEYID = 6
6,043,285 UART: [ldev] SUBJECT.KEYID = 5
6,044,453 UART: [ldev] AUTHORITY.KEYID = 7
6,045,690 UART: [ldev] FE.KEYID = 1
6,092,269 UART: [ldev] Erasing FE.KEYID = 1
8,594,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,079 UART: [ldev] --
10,403,547 UART: [fwproc] Wait for Commands...
10,406,785 UART: [fwproc] Recv command 0x46574c44
10,408,851 UART: [fwproc] Recv'd Img size: 114084 bytes
13,803,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,273,496 >>> mbox cmd response: success
14,275,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,419,148 UART: [afmc] ++
14,419,797 UART: [afmc] CDI.KEYID = 6
14,420,721 UART: [afmc] SUBJECT.KEYID = 7
14,421,825 UART: [afmc] AUTHORITY.KEYID = 5
16,819,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,541,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,542,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,558,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,574,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,590,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,614,706 UART: [afmc] --
18,618,193 UART: [cold-reset] --
18,622,390 UART: [state] Locking Datavault
18,628,010 UART: [state] Locking PCR0, PCR1 and PCR31
18,629,668 UART: [state] Locking ICCM
18,631,392 UART: [exit] Launching FMC @ 0x40000130
18,639,786 UART:
18,640,020 UART: Running Caliptra FMC ...
18,641,123 UART:
18,641,287 UART: [state] CFI Enabled
18,700,862 UART: [fht] FMC Alias Private Key: 7
20,464,697 UART: [art] Extend RT PCRs Done
20,465,905 UART: [art] Lock RT PCRs Done
20,467,581 UART: [art] Populate DV Done
20,473,041 UART: [fht] FMC Alias Private Key: 7
20,474,737 UART: [art] Derive CDI
20,475,578 UART: [art] Store in in slot 0x4
20,532,599 UART: [art] Derive Key Pair
20,533,600 UART: [art] Store priv key in slot 0x5
22,996,343 UART: [art] Derive Key Pair - Done
23,009,499 UART: [art] Signing Cert with AUTHO
23,010,808 UART: RITY.KEYID = 7
24,722,319 UART: [art] Erasing AUTHORITY.KEYID = 7
24,723,828 UART: [art] PUB.X = 11EE06C5701F8DE934E2B7A743A5247E66CCC198DE1328D9545F27B4B6F8F412B76A8E3F9AEAEA1C8FD382ECE844B694
24,731,139 UART: [art] PUB.Y = 2458244F34BB0D8E4DF5BAAD708853AA460F37B3C97EBA464706170FA6D56194AC79604B51B7C0315B3D1B33A1671C96
24,738,374 UART: [art] SIG.R = 3D18428D500EFB4573B028C858B9991D427D67243340A8232108138DCD1662AFE0D0D21BBAB97F3509C2C8D2F2AB083D
24,745,769 UART: [art] SIG.S = 3E2647B4F2FEE81C4AB0C7964EC4189EC9775F9F516114162AFD4F316C8E64512095B8B6B52DAFC327EDFF906D67956C
25,724,448 UART: Caliptra RT
25,725,137 UART: [state] CFI Enabled
25,889,399 UART: [rt] RT listening for mailbox commands...
25,892,798 UART:
25,892,967 UART: Running Caliptra ROM ...
25,894,033 UART:
25,894,189 UART: [state] CFI Enabled
25,958,027 UART: [state] LifecycleState = Unprovisioned
25,959,900 UART: [state] DebugLocked = No
25,961,716 UART: [state] WD Timer not started. Device not locked for debugging
25,965,728 UART: [kat] SHA2-256
26,144,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,156,426 UART: [kat] ++
26,156,966 UART: [kat] sha1
26,168,021 UART: [kat] SHA2-256
26,171,032 UART: [kat] SHA2-384
26,177,190 UART: [kat] SHA2-512-ACC
26,180,132 UART: [kat] ECC-384
28,643,209 UART: [kat] HMAC-384Kdf
28,664,451 UART: [kat] LMS
29,193,889 UART: [kat] --
29,198,886 UART: [update-reset] ++
29,239,653 >>> mbox cmd response: failed
29,241,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,384,875 UART: ROM Non-Fatal Error: 0x000B001D
29,386,307 UART: [state] Locking Datavault
29,387,458 UART: [state] Locking PCR0, PCR1 and PCR31
29,388,992 UART: [state] Locking ICCM
29,389,967 UART: [exit] Launching FMC @ 0x40000130
29,391,389 UART:
29,391,544 UART: Running Caliptra FMC ...
29,392,638 UART:
29,392,793 UART: [state] CFI Enabled
29,393,707 UART: [art] Extend RT PCRs Done
29,394,842 UART: [art] Lock RT PCRs Done
29,395,904 UART: [art] Populate DV Done
29,396,931 UART: [fht] FMC Alias Private Key: 7
29,398,266 UART: [art] Derive CDI
29,399,000 UART: [art] Store in in slot 0x4
29,427,993 UART: [art] Derive Key Pair
29,429,039 UART: [art] Store priv key in slot 0x5
31,891,544 UART: [art] Derive Key Pair - Done
31,904,758 UART: [art] Signing Cert with AUTHO
31,906,094 UART: RITY.KEYID = 7
33,617,007 UART: [art] Erasing AUTHORITY.KEYID = 7
33,618,531 UART: [art] PUB.X = 11EE06C5701F8DE934E2B7A743A5247E66CCC198DE1328D9545F27B4B6F8F412B76A8E3F9AEAEA1C8FD382ECE844B694
33,625,824 UART: [art] PUB.Y = 2458244F34BB0D8E4DF5BAAD708853AA460F37B3C97EBA464706170FA6D56194AC79604B51B7C0315B3D1B33A1671C96
33,633,041 UART: [art] SIG.R = 3D18428D500EFB4573B028C858B9991D427D67243340A8232108138DCD1662AFE0D0D21BBAB97F3509C2C8D2F2AB083D
33,640,427 UART: [art] SIG.S = 3E2647B4F2FEE81C4AB0C7964EC4189EC9775F9F516114162AFD4F316C8E64512095B8B6B52DAFC327EDFF906D67956C
34,619,490 UART: Caliptra RT
34,620,182 UART: [state] CFI Enabled
34,952,268 UART: [rt] RT listening for mailbox commands...
34,955,004 UART:
34,955,198 UART: Running Caliptra ROM ...
34,956,306 UART:
34,956,464 UART: [state] CFI Enabled
35,023,353 UART: [state] LifecycleState = Unprovisioned
35,025,202 UART: [state] DebugLocked = No
35,027,756 UART: [state] WD Timer not started. Device not locked for debugging
35,030,850 UART: [kat] SHA2-256
35,209,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,221,517 UART: [kat] ++
35,221,970 UART: [kat] sha1
35,233,769 UART: [kat] SHA2-256
35,236,786 UART: [kat] SHA2-384
35,243,629 UART: [kat] SHA2-512-ACC
35,246,569 UART: [kat] ECC-384
37,705,646 UART: [kat] HMAC-384Kdf
37,730,132 UART: [kat] LMS
38,259,622 UART: [kat] --
38,264,316 UART: [update-reset] ++
41,687,042 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,690,532 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
42,072,582 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,380,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,071,255 >>> mbox cmd response: success
14,073,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,372,170 UART:
18,372,586 UART: Running Caliptra FMC ...
18,373,724 UART:
18,373,890 UART: [state] CFI Enabled
18,436,051 UART: [fht] FMC Alias Private Key: 7
20,200,326 UART: [art] Extend RT PCRs Done
20,201,531 UART: [art] Lock RT PCRs Done
20,202,961 UART: [art] Populate DV Done
20,208,332 UART: [fht] FMC Alias Private Key: 7
20,210,150 UART: [art] Derive CDI
20,211,009 UART: [art] Store in in slot 0x4
20,269,283 UART: [art] Derive Key Pair
20,270,284 UART: [art] Store priv key in slot 0x5
22,734,420 UART: [art] Derive Key Pair - Done
22,747,383 UART: [art] Signing Cert with AUTHO
22,748,694 UART: RITY.KEYID = 7
24,461,390 UART: [art] Erasing AUTHORITY.KEYID = 7
24,462,891 UART: [art] PUB.X = 20B0E53E63C63A14AE0CA84A0CE8F052455BD00DB1DEC27F0FB90EC6E66C2E431F94AF4A66ACD065035251146EE3B4F8
24,470,166 UART: [art] PUB.Y = 1E057D5F883E5AC12FFC7296E017BD0C35167EA2E5BC2DBB9EE258818E9C363CE8E957E73487AFE2B82F6B3E7C677DFB
24,477,436 UART: [art] SIG.R = 2FFFB5B47E07D58F79B8DEDD5F4D2ED73D829620226B160F7EE4187434BDFA6B846DF7721D435DC28F9C5222A5B84117
24,484,892 UART: [art] SIG.S = 3057F1D7B1386DD1A3C872A27F5DF40CA26366BC2E3BE6E25209F65B9727BE3EDCB68B097A23A4449A93BCB71B2D2E78
25,463,664 UART: Caliptra RT
25,464,381 UART: [state] CFI Enabled
25,629,695 UART: [rt] RT listening for mailbox commands...
28,821,449 >>> mbox cmd response: failed
28,823,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,967,116 UART:
28,967,445 UART: Running Caliptra FMC ...
28,968,490 UART:
28,968,636 UART: [state] CFI Enabled
28,969,498 UART: [art] Extend RT PCRs Done
28,970,575 UART: [art] Lock RT PCRs Done
28,971,649 UART: [art] Populate DV Done
28,972,727 UART: [fht] FMC Alias Private Key: 7
28,974,049 UART: [art] Derive CDI
28,974,784 UART: [art] Store in in slot 0x4
28,996,503 UART: [art] Derive Key Pair
28,997,503 UART: [art] Store priv key in slot 0x5
31,460,406 UART: [art] Derive Key Pair - Done
31,473,246 UART: [art] Signing Cert with AUTHO
31,474,571 UART: RITY.KEYID = 7
33,186,438 UART: [art] Erasing AUTHORITY.KEYID = 7
33,187,949 UART: [art] PUB.X = 20B0E53E63C63A14AE0CA84A0CE8F052455BD00DB1DEC27F0FB90EC6E66C2E431F94AF4A66ACD065035251146EE3B4F8
33,195,204 UART: [art] PUB.Y = 1E057D5F883E5AC12FFC7296E017BD0C35167EA2E5BC2DBB9EE258818E9C363CE8E957E73487AFE2B82F6B3E7C677DFB
33,202,548 UART: [art] SIG.R = 2FFFB5B47E07D58F79B8DEDD5F4D2ED73D829620226B160F7EE4187434BDFA6B846DF7721D435DC28F9C5222A5B84117
33,209,943 UART: [art] SIG.S = 3057F1D7B1386DD1A3C872A27F5DF40CA26366BC2E3BE6E25209F65B9727BE3EDCB68B097A23A4449A93BCB71B2D2E78
34,188,400 UART: Caliptra RT
34,189,091 UART: [state] CFI Enabled
34,521,649 UART: [rt] RT listening for mailbox commands...
41,508,674 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,556 UART:
192,918 UART: Running Caliptra ROM ...
194,069 UART:
603,619 UART: [state] CFI Enabled
618,199 UART: [state] LifecycleState = Unprovisioned
620,051 UART: [state] DebugLocked = No
621,999 UART: [state] WD Timer not started. Device not locked for debugging
626,192 UART: [kat] SHA2-256
805,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,906 UART: [kat] ++
817,356 UART: [kat] sha1
829,743 UART: [kat] SHA2-256
832,768 UART: [kat] SHA2-384
839,015 UART: [kat] SHA2-512-ACC
842,006 UART: [kat] ECC-384
3,285,230 UART: [kat] HMAC-384Kdf
3,296,562 UART: [kat] LMS
3,826,074 UART: [kat] --
3,831,434 UART: [cold-reset] ++
3,833,258 UART: [fht] FHT @ 0x50003400
3,844,829 UART: [idev] ++
3,845,400 UART: [idev] CDI.KEYID = 6
3,846,313 UART: [idev] SUBJECT.KEYID = 7
3,847,472 UART: [idev] UDS.KEYID = 0
3,850,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,731 UART: [idev] Erasing UDS.KEYID = 0
6,322,738 UART: [idev] Sha1 KeyId Algorithm
6,345,913 UART: [idev] --
6,350,249 UART: [ldev] ++
6,350,815 UART: [ldev] CDI.KEYID = 6
6,351,724 UART: [ldev] SUBJECT.KEYID = 5
6,352,948 UART: [ldev] AUTHORITY.KEYID = 7
6,354,179 UART: [ldev] FE.KEYID = 1
6,365,372 UART: [ldev] Erasing FE.KEYID = 1
8,837,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,166 UART: [ldev] --
10,628,299 UART: [fwproc] Wait for Commands...
10,631,317 UART: [fwproc] Recv command 0x46574c44
10,633,417 UART: [fwproc] Recv'd Img size: 114084 bytes
14,030,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,487,733 >>> mbox cmd response: success
14,489,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,633,035 UART: [afmc] ++
14,633,681 UART: [afmc] CDI.KEYID = 6
14,634,576 UART: [afmc] SUBJECT.KEYID = 7
14,635,627 UART: [afmc] AUTHORITY.KEYID = 5
16,990,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,986 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,998 UART: [afmc] --
18,784,871 UART: [cold-reset] --
18,788,805 UART: [state] Locking Datavault
18,792,331 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,975 UART: [state] Locking ICCM
18,795,098 UART: [exit] Launching FMC @ 0x40000130
18,803,549 UART:
18,803,788 UART: Running Caliptra FMC ...
18,804,889 UART:
18,805,050 UART: [state] CFI Enabled
18,813,045 UART: [fht] FMC Alias Private Key: 7
20,569,579 UART: [art] Extend RT PCRs Done
20,570,803 UART: [art] Lock RT PCRs Done
20,572,615 UART: [art] Populate DV Done
20,577,970 UART: [fht] FMC Alias Private Key: 7
20,579,505 UART: [art] Derive CDI
20,580,239 UART: [art] Store in in slot 0x4
20,622,610 UART: [art] Derive Key Pair
20,623,671 UART: [art] Store priv key in slot 0x5
23,050,697 UART: [art] Derive Key Pair - Done
23,063,793 UART: [art] Signing Cert with AUTHO
23,065,097 UART: RITY.KEYID = 7
24,770,574 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,080 UART: [art] PUB.X = C7EA69C28FD821BFED71E7F93CD1F1B74BAC9ACF277D031FEFDD5FB83F236FB9B0627FC6A27072800E2863F0A34A837C
24,779,355 UART: [art] PUB.Y = B74299244AE111663B9241C413BB7B2300383BFE682EC5B11EF040CB07A9746A3D3DFC7BFBC0A9CE40D64A6213D8BFD6
24,786,624 UART: [art] SIG.R = A6DD1C52C356FC6199B0454D4DE7E91866E2733DB4E4C74B1E7CBB0BAF1076FCCC709760A48F71F1742B325607B9288D
24,793,997 UART: [art] SIG.S = F7A5153FE75F57AB61EACFE8EFE1F77BB7FDA713A52DA03E9E7B3AE0D4892148B5577C358E0375D9832B0AAD25F1B133
25,773,282 UART: Caliptra RT
25,773,989 UART: [state] CFI Enabled
25,890,430 UART: [rt] RT listening for mailbox commands...
25,893,458 UART:
25,893,716 UART: Running Caliptra ROM ...
25,894,823 UART:
25,894,982 UART: [state] CFI Enabled
25,907,051 UART: [state] LifecycleState = Unprovisioned
25,908,886 UART: [state] DebugLocked = No
25,911,664 UART: [state] WD Timer not started. Device not locked for debugging
25,915,890 UART: [kat] SHA2-256
26,095,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,106,652 UART: [kat] ++
26,107,196 UART: [kat] sha1
26,117,117 UART: [kat] SHA2-256
26,120,232 UART: [kat] SHA2-384
26,125,868 UART: [kat] SHA2-512-ACC
26,128,810 UART: [kat] ECC-384
28,568,883 UART: [kat] HMAC-384Kdf
28,581,114 UART: [kat] LMS
29,110,625 UART: [kat] --
29,115,748 UART: [update-reset] ++
29,155,916 >>> mbox cmd response: failed
29,157,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,301,117 UART: ROM Non-Fatal Error: 0x000B001D
29,302,546 UART: [state] Locking Datavault
29,303,704 UART: [state] Locking PCR0, PCR1 and PCR31
29,305,242 UART: [state] Locking ICCM
29,306,148 UART: [exit] Launching FMC @ 0x40000130
29,307,570 UART:
29,307,732 UART: Running Caliptra FMC ...
29,308,828 UART:
29,308,984 UART: [state] CFI Enabled
29,309,903 UART: [art] Extend RT PCRs Done
29,311,040 UART: [art] Lock RT PCRs Done
29,312,111 UART: [art] Populate DV Done
29,313,140 UART: [fht] FMC Alias Private Key: 7
29,314,455 UART: [art] Derive CDI
29,315,188 UART: [art] Store in in slot 0x4
29,316,373 UART: [art] Derive Key Pair
29,317,314 UART: [art] Store priv key in slot 0x5
31,704,684 UART: [art] Derive Key Pair - Done
31,717,744 UART: [art] Signing Cert with AUTHO
31,719,052 UART: RITY.KEYID = 7
33,425,223 UART: [art] Erasing AUTHORITY.KEYID = 7
33,426,738 UART: [art] PUB.X = C7EA69C28FD821BFED71E7F93CD1F1B74BAC9ACF277D031FEFDD5FB83F236FB9B0627FC6A27072800E2863F0A34A837C
33,433,987 UART: [art] PUB.Y = B74299244AE111663B9241C413BB7B2300383BFE682EC5B11EF040CB07A9746A3D3DFC7BFBC0A9CE40D64A6213D8BFD6
33,441,229 UART: [art] SIG.R = A6DD1C52C356FC6199B0454D4DE7E91866E2733DB4E4C74B1E7CBB0BAF1076FCCC709760A48F71F1742B325607B9288D
33,448,670 UART: [art] SIG.S = F7A5153FE75F57AB61EACFE8EFE1F77BB7FDA713A52DA03E9E7B3AE0D4892148B5577C358E0375D9832B0AAD25F1B133
34,427,844 UART: Caliptra RT
34,428,555 UART: [state] CFI Enabled
34,714,607 UART: [rt] RT listening for mailbox commands...
34,717,352 UART:
34,717,521 UART: Running Caliptra ROM ...
34,718,629 UART:
34,718,860 UART: [state] CFI Enabled
40,316,510 UART: [state] LifecycleState = Unprovisioned
40,318,426 UART: [state] DebugLocked = No
40,321,252 UART: [state] WD Timer not started. Device not locked for debugging
40,325,207 UART: [kat] SHA2-256
40,504,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,515,934 UART: [kat] ++
40,516,391 UART: [kat] sha1
40,528,133 UART: [kat] SHA2-256
40,531,181 UART: [kat] SHA2-384
40,537,822 UART: [kat] SHA2-512-ACC
40,540,770 UART: [kat] ECC-384
42,982,932 UART: [kat] HMAC-384Kdf
42,995,581 UART: [kat] LMS
43,525,120 UART: [kat] --
43,529,926 UART: [update-reset] ++
46,952,498 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,956,620 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,338,650 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
3,703,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,032 >>> mbox cmd response: success
14,269,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,516,809 UART:
18,517,619 UART: Running Caliptra FMC ...
18,518,768 UART:
18,518,923 UART: [state] CFI Enabled
18,526,633 UART: [fht] FMC Alias Private Key: 7
20,284,065 UART: [art] Extend RT PCRs Done
20,285,440 UART: [art] Lock RT PCRs Done
20,286,556 UART: [art] Populate DV Done
20,291,969 UART: [fht] FMC Alias Private Key: 7
20,293,674 UART: [art] Derive CDI
20,294,493 UART: [art] Store in in slot 0x4
20,336,983 UART: [art] Derive Key Pair
20,337,987 UART: [art] Store priv key in slot 0x5
22,764,164 UART: [art] Derive Key Pair - Done
22,777,234 UART: [art] Signing Cert with AUTHO
22,778,548 UART: RITY.KEYID = 7
24,484,116 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,659 UART: [art] PUB.X = 21285B90A1E17C3A0F83AAE288AC3A183936B10D4A5DE05C4110B4281814A5A268A1664C17D15A0E16F5BFBD914E1895
24,492,938 UART: [art] PUB.Y = 3A9ECE9701A3F8CABED9BA137834883487D52FF0802742778BC7CD838FB22F5E7847168B9F906D6D2C8A4E7C589FD9CD
24,500,157 UART: [art] SIG.R = D89B57B4EE91E715E6E0B294A8803945323F1311DE6A3164ECF9E389C17D44608097262875C2356A5E1A9F83EB9CDD6D
24,507,551 UART: [art] SIG.S = 23F6CEAA84877669F82DFDB7B8DD2F497509289EBC27830996294917F61C6B1E8539EB3D14FA3A2B45FE1BAF9DD8593B
25,485,967 UART: Caliptra RT
25,486,652 UART: [state] CFI Enabled
25,604,409 UART: [rt] RT listening for mailbox commands...
28,728,442 >>> mbox cmd response: failed
28,730,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,874,243 UART:
28,874,560 UART: Running Caliptra FMC ...
28,875,688 UART:
28,875,860 UART: [state] CFI Enabled
28,876,787 UART: [art] Extend RT PCRs Done
28,877,923 UART: [art] Lock RT PCRs Done
28,878,989 UART: [art] Populate DV Done
28,880,081 UART: [fht] FMC Alias Private Key: 7
28,881,410 UART: [art] Derive CDI
28,882,149 UART: [art] Store in in slot 0x4
28,883,318 UART: [art] Derive Key Pair
28,884,283 UART: [art] Store priv key in slot 0x5
31,267,337 UART: [art] Derive Key Pair - Done
31,280,342 UART: [art] Signing Cert with AUTHO
31,281,649 UART: RITY.KEYID = 7
32,987,048 UART: [art] Erasing AUTHORITY.KEYID = 7
32,988,550 UART: [art] PUB.X = 21285B90A1E17C3A0F83AAE288AC3A183936B10D4A5DE05C4110B4281814A5A268A1664C17D15A0E16F5BFBD914E1895
32,995,813 UART: [art] PUB.Y = 3A9ECE9701A3F8CABED9BA137834883487D52FF0802742778BC7CD838FB22F5E7847168B9F906D6D2C8A4E7C589FD9CD
33,003,100 UART: [art] SIG.R = D89B57B4EE91E715E6E0B294A8803945323F1311DE6A3164ECF9E389C17D44608097262875C2356A5E1A9F83EB9CDD6D
33,010,476 UART: [art] SIG.S = 23F6CEAA84877669F82DFDB7B8DD2F497509289EBC27830996294917F61C6B1E8539EB3D14FA3A2B45FE1BAF9DD8593B
33,989,125 UART: Caliptra RT
33,989,824 UART: [state] CFI Enabled
34,280,842 UART: [rt] RT listening for mailbox commands...
47,209,577 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,182 UART:
192,539 UART: Running Caliptra ROM ...
193,736 UART:
193,892 UART: [state] CFI Enabled
260,660 UART: [state] LifecycleState = Unprovisioned
263,074 UART: [state] DebugLocked = No
265,170 UART: [state] WD Timer not started. Device not locked for debugging
269,757 UART: [kat] SHA2-256
459,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,412 UART: [kat] ++
470,905 UART: [kat] sha1
482,847 UART: [kat] SHA2-256
485,874 UART: [kat] SHA2-384
492,180 UART: [kat] SHA2-512-ACC
494,740 UART: [kat] ECC-384
2,941,474 UART: [kat] HMAC-384Kdf
2,967,440 UART: [kat] LMS
3,499,199 UART: [kat] --
3,505,523 UART: [cold-reset] ++
3,507,444 UART: [fht] FHT @ 0x50003400
3,519,685 UART: [idev] ++
3,520,361 UART: [idev] CDI.KEYID = 6
3,521,376 UART: [idev] SUBJECT.KEYID = 7
3,522,532 UART: [idev] UDS.KEYID = 0
3,525,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,102 UART: [idev] Erasing UDS.KEYID = 0
6,022,049 UART: [idev] Sha1 KeyId Algorithm
6,043,963 UART: [idev] --
6,047,862 UART: [ldev] ++
6,048,549 UART: [ldev] CDI.KEYID = 6
6,049,464 UART: [ldev] SUBJECT.KEYID = 5
6,050,629 UART: [ldev] AUTHORITY.KEYID = 7
6,051,864 UART: [ldev] FE.KEYID = 1
6,095,039 UART: [ldev] Erasing FE.KEYID = 1
8,601,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,308 UART: [ldev] --
10,408,022 UART: [fwproc] Wait for Commands...
10,411,205 UART: [fwproc] Recv command 0x46574c44
10,413,524 UART: [fwproc] Recv'd Img size: 114084 bytes
13,857,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,592,473 >>> mbox cmd response: success
14,594,486 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,738,016 UART: [afmc] ++
14,738,664 UART: [afmc] CDI.KEYID = 6
14,739,559 UART: [afmc] SUBJECT.KEYID = 7
14,740,605 UART: [afmc] AUTHORITY.KEYID = 5
17,120,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,847,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,849,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,864,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,879,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,894,752 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,918,516 UART: [afmc] --
18,921,217 UART: [cold-reset] --
18,925,623 UART: [state] Locking Datavault
18,930,931 UART: [state] Locking PCR0, PCR1 and PCR31
18,933,121 UART: [state] Locking ICCM
18,934,602 UART: [exit] Launching FMC @ 0x40000130
18,943,271 UART:
18,943,503 UART: Running Caliptra FMC ...
18,944,528 UART:
18,944,675 UART: [state] CFI Enabled
19,006,278 UART: [fht] FMC Alias Private Key: 7
20,770,998 UART: [art] Extend RT PCRs Done
20,772,214 UART: [art] Lock RT PCRs Done
20,773,706 UART: [art] Populate DV Done
20,779,012 UART: [fht] FMC Alias Private Key: 7
20,780,550 UART: [art] Derive CDI
20,781,313 UART: [art] Store in in slot 0x4
20,839,083 UART: [art] Derive Key Pair
20,840,119 UART: [art] Store priv key in slot 0x5
23,303,131 UART: [art] Derive Key Pair - Done
23,316,079 UART: [art] Signing Cert with AUTHO
23,317,387 UART: RITY.KEYID = 7
25,029,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,824 UART: [art] PUB.X = 93818B2FC975413511E8281C9C3618D8AB9F4CBCFF496944C418F9794FD42668B29A297E89449A91396D855DB26D3D69
25,038,084 UART: [art] PUB.Y = A794ABBB76D6993CA82E62C342D7BD9A2D8D56E2F5FF5272B8D240402F88C87E7D3ABAF70CA7E7AAD3F391C6428E5756
25,045,334 UART: [art] SIG.R = F348BAD118F119612B20BB2B0C31A567C549C1FB7AC8542A99B507400CF3BCC15FE3BF0B3DDA5EB79E431AED56B310B0
25,052,746 UART: [art] SIG.S = F8AC788D63836B14D8E2A6A5EDD472D7187145BE6910A09202424DAFC1149985BCD172496DECCE9D5F12B513541FC3B4
26,031,534 UART: Caliptra RT
26,032,247 UART: [state] CFI Enabled
26,197,357 UART: [rt] RT listening for mailbox commands...
26,200,258 UART:
26,200,427 UART: Running Caliptra ROM ...
26,201,531 UART:
26,201,708 UART: [state] CFI Enabled
26,266,356 UART: [state] LifecycleState = Unprovisioned
26,268,387 UART: [state] DebugLocked = No
26,270,502 UART: [state] WD Timer not started. Device not locked for debugging
26,275,333 UART: [kat] SHA2-256
26,465,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,475,981 UART: [kat] ++
26,476,436 UART: [kat] sha1
26,488,300 UART: [kat] SHA2-256
26,491,322 UART: [kat] SHA2-384
26,497,257 UART: [kat] SHA2-512-ACC
26,499,824 UART: [kat] ECC-384
28,948,217 UART: [kat] HMAC-384Kdf
28,973,530 UART: [kat] LMS
29,505,130 UART: [kat] --
29,510,767 UART: [update-reset] ++
29,567,908 >>> mbox cmd response: failed
29,569,605 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,713,619 UART: ROM Non-Fatal Error: 0x000B001D
29,715,067 UART: [state] Locking Datavault
29,716,150 UART: [state] Locking PCR0, PCR1 and PCR31
29,717,690 UART: [state] Locking ICCM
29,718,570 UART: [exit] Launching FMC @ 0x40000130
29,719,911 UART:
29,720,058 UART: Running Caliptra FMC ...
29,721,171 UART:
29,721,331 UART: [state] CFI Enabled
29,722,201 UART: [art] Extend RT PCRs Done
29,723,339 UART: [art] Lock RT PCRs Done
29,724,405 UART: [art] Populate DV Done
29,725,435 UART: [fht] FMC Alias Private Key: 7
29,726,749 UART: [art] Derive CDI
29,727,529 UART: [art] Store in in slot 0x4
29,757,948 UART: [art] Derive Key Pair
29,758,995 UART: [art] Store priv key in slot 0x5
32,221,296 UART: [art] Derive Key Pair - Done
32,234,197 UART: [art] Signing Cert with AUTHO
32,235,537 UART: RITY.KEYID = 7
33,947,353 UART: [art] Erasing AUTHORITY.KEYID = 7
33,948,848 UART: [art] PUB.X = 93818B2FC975413511E8281C9C3618D8AB9F4CBCFF496944C418F9794FD42668B29A297E89449A91396D855DB26D3D69
33,956,052 UART: [art] PUB.Y = A794ABBB76D6993CA82E62C342D7BD9A2D8D56E2F5FF5272B8D240402F88C87E7D3ABAF70CA7E7AAD3F391C6428E5756
33,963,356 UART: [art] SIG.R = F348BAD118F119612B20BB2B0C31A567C549C1FB7AC8542A99B507400CF3BCC15FE3BF0B3DDA5EB79E431AED56B310B0
33,970,763 UART: [art] SIG.S = F8AC788D63836B14D8E2A6A5EDD472D7187145BE6910A09202424DAFC1149985BCD172496DECCE9D5F12B513541FC3B4
34,949,230 UART: Caliptra RT
34,949,941 UART: [state] CFI Enabled
35,285,485 UART: [rt] RT listening for mailbox commands...
35,288,334 UART:
35,288,587 UART: Running Caliptra ROM ...
35,289,708 UART:
35,289,865 UART: [state] CFI Enabled
35,352,082 UART: [state] LifecycleState = Unprovisioned
35,354,168 UART: [state] DebugLocked = No
35,355,420 UART: [state] WD Timer not started. Device not locked for debugging
35,359,830 UART: [kat] SHA2-256
35,549,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,560,449 UART: [kat] ++
35,560,901 UART: [kat] sha1
35,572,759 UART: [kat] SHA2-256
35,575,787 UART: [kat] SHA2-384
35,582,047 UART: [kat] SHA2-512-ACC
35,584,617 UART: [kat] ECC-384
38,037,008 UART: [kat] HMAC-384Kdf
38,059,941 UART: [kat] LMS
38,591,476 UART: [kat] --
38,594,530 UART: [update-reset] ++
42,063,373 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,066,929 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
42,673,039 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,436,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,736,603 >>> mbox cmd response: success
14,738,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,045,299 UART:
19,045,700 UART: Running Caliptra FMC ...
19,046,830 UART:
19,046,991 UART: [state] CFI Enabled
19,116,180 UART: [fht] FMC Alias Private Key: 7
20,881,344 UART: [art] Extend RT PCRs Done
20,882,568 UART: [art] Lock RT PCRs Done
20,884,333 UART: [art] Populate DV Done
20,889,771 UART: [fht] FMC Alias Private Key: 7
20,891,439 UART: [art] Derive CDI
20,892,256 UART: [art] Store in in slot 0x4
20,949,834 UART: [art] Derive Key Pair
20,950,837 UART: [art] Store priv key in slot 0x5
23,414,140 UART: [art] Derive Key Pair - Done
23,427,027 UART: [art] Signing Cert with AUTHO
23,428,341 UART: RITY.KEYID = 7
25,139,875 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,419 UART: [art] PUB.X = D69CE253F8C3C80D71DFED0BF2CEE6220BDF39BB723674084AD1BBB05E8CDEE58745E0E28D74448F72AD798A6ECA87F4
25,148,663 UART: [art] PUB.Y = 00289C19774C0EC351EC6AC4A7B9F40883123DEB0AFB7BA869F4F71141DDA19E47018668E43CBAF1E819AA16F5266A29
25,155,938 UART: [art] SIG.R = 2E6DBB291C97141B11C1EFC2EFAE1D766F5143930A727E6A279937D7CFBC007918B7A7787C26EF34710BE00CB93D97A5
25,163,324 UART: [art] SIG.S = 07705671B55CF48CA0FFFA151A94321C96CFE940BCF768EC9FB6673E76CCBBE5BB7A9ECDA8B773C72A419610E7E8F279
26,142,379 UART: Caliptra RT
26,143,102 UART: [state] CFI Enabled
26,308,318 UART: [rt] RT listening for mailbox commands...
29,578,540 >>> mbox cmd response: failed
29,580,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,723,873 UART:
29,724,212 UART: Running Caliptra FMC ...
29,725,338 UART:
29,725,507 UART: [state] CFI Enabled
29,726,432 UART: [art] Extend RT PCRs Done
29,727,570 UART: [art] Lock RT PCRs Done
29,728,635 UART: [art] Populate DV Done
29,729,736 UART: [fht] FMC Alias Private Key: 7
29,731,058 UART: [art] Derive CDI
29,731,797 UART: [art] Store in in slot 0x4
29,761,966 UART: [art] Derive Key Pair
29,762,969 UART: [art] Store priv key in slot 0x5
32,226,348 UART: [art] Derive Key Pair - Done
32,239,340 UART: [art] Signing Cert with AUTHO
32,240,652 UART: RITY.KEYID = 7
33,951,410 UART: [art] Erasing AUTHORITY.KEYID = 7
33,952,921 UART: [art] PUB.X = D69CE253F8C3C80D71DFED0BF2CEE6220BDF39BB723674084AD1BBB05E8CDEE58745E0E28D74448F72AD798A6ECA87F4
33,960,245 UART: [art] PUB.Y = 00289C19774C0EC351EC6AC4A7B9F40883123DEB0AFB7BA869F4F71141DDA19E47018668E43CBAF1E819AA16F5266A29
33,967,461 UART: [art] SIG.R = 2E6DBB291C97141B11C1EFC2EFAE1D766F5143930A727E6A279937D7CFBC007918B7A7787C26EF34710BE00CB93D97A5
33,974,841 UART: [art] SIG.S = 07705671B55CF48CA0FFFA151A94321C96CFE940BCF768EC9FB6673E76CCBBE5BB7A9ECDA8B773C72A419610E7E8F279
34,954,158 UART: Caliptra RT
34,954,847 UART: [state] CFI Enabled
35,287,270 UART: [rt] RT listening for mailbox commands...
42,951,616 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,434 UART:
192,819 UART: Running Caliptra ROM ...
193,950 UART:
603,679 UART: [state] CFI Enabled
619,068 UART: [state] LifecycleState = Unprovisioned
621,465 UART: [state] DebugLocked = No
623,436 UART: [state] WD Timer not started. Device not locked for debugging
627,530 UART: [kat] SHA2-256
817,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,198 UART: [kat] ++
828,698 UART: [kat] sha1
840,445 UART: [kat] SHA2-256
843,452 UART: [kat] SHA2-384
850,344 UART: [kat] SHA2-512-ACC
852,958 UART: [kat] ECC-384
3,292,446 UART: [kat] HMAC-384Kdf
3,305,447 UART: [kat] LMS
3,837,229 UART: [kat] --
3,841,944 UART: [cold-reset] ++
3,843,344 UART: [fht] FHT @ 0x50003400
3,855,138 UART: [idev] ++
3,855,840 UART: [idev] CDI.KEYID = 6
3,856,725 UART: [idev] SUBJECT.KEYID = 7
3,857,939 UART: [idev] UDS.KEYID = 0
3,860,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,245 UART: [idev] Erasing UDS.KEYID = 0
6,338,018 UART: [idev] Sha1 KeyId Algorithm
6,362,041 UART: [idev] --
6,367,018 UART: [ldev] ++
6,367,712 UART: [ldev] CDI.KEYID = 6
6,368,624 UART: [ldev] SUBJECT.KEYID = 5
6,369,783 UART: [ldev] AUTHORITY.KEYID = 7
6,371,020 UART: [ldev] FE.KEYID = 1
6,381,615 UART: [ldev] Erasing FE.KEYID = 1
8,863,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,852 UART: [ldev] --
10,652,444 UART: [fwproc] Wait for Commands...
10,654,327 UART: [fwproc] Recv command 0x46574c44
10,656,642 UART: [fwproc] Recv'd Img size: 114084 bytes
14,099,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,837,305 >>> mbox cmd response: success
14,839,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,982,883 UART: [afmc] ++
14,983,519 UART: [afmc] CDI.KEYID = 6
14,984,440 UART: [afmc] SUBJECT.KEYID = 7
14,985,548 UART: [afmc] AUTHORITY.KEYID = 5
17,346,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,979 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,307 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,326 UART: [afmc] --
19,144,014 UART: [cold-reset] --
19,148,969 UART: [state] Locking Datavault
19,154,759 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,952 UART: [state] Locking ICCM
19,159,208 UART: [exit] Launching FMC @ 0x40000130
19,167,873 UART:
19,168,108 UART: Running Caliptra FMC ...
19,169,213 UART:
19,169,373 UART: [state] CFI Enabled
19,177,203 UART: [fht] FMC Alias Private Key: 7
20,934,743 UART: [art] Extend RT PCRs Done
20,935,966 UART: [art] Lock RT PCRs Done
20,937,700 UART: [art] Populate DV Done
20,943,009 UART: [fht] FMC Alias Private Key: 7
20,944,504 UART: [art] Derive CDI
20,945,268 UART: [art] Store in in slot 0x4
20,987,761 UART: [art] Derive Key Pair
20,988,798 UART: [art] Store priv key in slot 0x5
23,415,534 UART: [art] Derive Key Pair - Done
23,428,422 UART: [art] Signing Cert with AUTHO
23,429,720 UART: RITY.KEYID = 7
25,135,448 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,948 UART: [art] PUB.X = 22C6BF9C615A819E1DFE432D791D32F8053083F460DBF190A26DE2A4CCECED726283AA9C3BD4ECBF3AD90C1E9B05497A
25,144,300 UART: [art] PUB.Y = D92EF45F20FBB07DFB7408ED5B884A0168692F19B4DCD0752AC8F3FBF8AE621CED24812ADB2D8EEBC51FF403A70B7163
25,151,575 UART: [art] SIG.R = B4AE8D0CBD6405D39FDA1BA76EDDE552B9EC11A455A21AF6F8E0FA546A6C1AA76F25CECFF10339A1C27D921909CF9546
25,158,974 UART: [art] SIG.S = 201E03F8AE2A747A59BD52408E4EC63CC81700BB49E5278ACF894E359802909E0A9108D6ABA2C643145BAA1C85611BC5
26,137,761 UART: Caliptra RT
26,138,462 UART: [state] CFI Enabled
26,255,197 UART: [rt] RT listening for mailbox commands...
26,258,100 UART:
26,258,496 UART: Running Caliptra ROM ...
26,259,624 UART:
26,259,786 UART: [state] CFI Enabled
26,271,939 UART: [state] LifecycleState = Unprovisioned
26,273,773 UART: [state] DebugLocked = No
26,275,582 UART: [state] WD Timer not started. Device not locked for debugging
26,280,835 UART: [kat] SHA2-256
26,470,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,481,500 UART: [kat] ++
26,482,045 UART: [kat] sha1
26,493,206 UART: [kat] SHA2-256
26,496,223 UART: [kat] SHA2-384
26,502,137 UART: [kat] SHA2-512-ACC
26,504,699 UART: [kat] ECC-384
28,945,994 UART: [kat] HMAC-384Kdf
28,960,208 UART: [kat] LMS
29,491,833 UART: [kat] --
29,497,493 UART: [update-reset] ++
29,552,676 >>> mbox cmd response: failed
29,554,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,697,646 UART: ROM Non-Fatal Error: 0x000B001D
29,699,221 UART: [state] Locking Datavault
29,700,376 UART: [state] Locking PCR0, PCR1 and PCR31
29,701,910 UART: [state] Locking ICCM
29,702,815 UART: [exit] Launching FMC @ 0x40000130
29,704,237 UART:
29,704,397 UART: Running Caliptra FMC ...
29,705,491 UART:
29,705,665 UART: [state] CFI Enabled
29,706,582 UART: [art] Extend RT PCRs Done
29,707,726 UART: [art] Lock RT PCRs Done
29,708,789 UART: [art] Populate DV Done
29,709,815 UART: [fht] FMC Alias Private Key: 7
29,711,134 UART: [art] Derive CDI
29,711,868 UART: [art] Store in in slot 0x4
29,713,034 UART: [art] Derive Key Pair
29,714,025 UART: [art] Store priv key in slot 0x5
32,103,653 UART: [art] Derive Key Pair - Done
32,116,324 UART: [art] Signing Cert with AUTHO
32,117,623 UART: RITY.KEYID = 7
33,823,453 UART: [art] Erasing AUTHORITY.KEYID = 7
33,824,959 UART: [art] PUB.X = 22C6BF9C615A819E1DFE432D791D32F8053083F460DBF190A26DE2A4CCECED726283AA9C3BD4ECBF3AD90C1E9B05497A
33,832,257 UART: [art] PUB.Y = D92EF45F20FBB07DFB7408ED5B884A0168692F19B4DCD0752AC8F3FBF8AE621CED24812ADB2D8EEBC51FF403A70B7163
33,839,558 UART: [art] SIG.R = B4AE8D0CBD6405D39FDA1BA76EDDE552B9EC11A455A21AF6F8E0FA546A6C1AA76F25CECFF10339A1C27D921909CF9546
33,846,970 UART: [art] SIG.S = 201E03F8AE2A747A59BD52408E4EC63CC81700BB49E5278ACF894E359802909E0A9108D6ABA2C643145BAA1C85611BC5
34,826,332 UART: Caliptra RT
34,827,047 UART: [state] CFI Enabled
35,112,298 UART: [rt] RT listening for mailbox commands...
35,114,827 UART:
35,114,995 UART: Running Caliptra ROM ...
35,116,100 UART:
35,116,474 UART: [state] CFI Enabled
40,321,219 UART: [state] LifecycleState = Unprovisioned
40,323,130 UART: [state] DebugLocked = No
40,324,466 UART: [state] WD Timer not started. Device not locked for debugging
40,329,339 UART: [kat] SHA2-256
40,519,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,529,993 UART: [kat] ++
40,530,594 UART: [kat] sha1
40,541,753 UART: [kat] SHA2-256
40,544,781 UART: [kat] SHA2-384
40,550,280 UART: [kat] SHA2-512-ACC
40,552,851 UART: [kat] ECC-384
42,994,455 UART: [kat] HMAC-384Kdf
43,007,210 UART: [kat] LMS
43,538,803 UART: [kat] --
43,543,727 UART: [update-reset] ++
46,994,524 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,997,483 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,603,535 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,758,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,965,738 >>> mbox cmd response: success
14,967,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,226,041 UART:
19,226,492 UART: Running Caliptra FMC ...
19,227,608 UART:
19,227,768 UART: [state] CFI Enabled
19,235,868 UART: [fht] FMC Alias Private Key: 7
20,993,079 UART: [art] Extend RT PCRs Done
20,994,299 UART: [art] Lock RT PCRs Done
20,995,845 UART: [art] Populate DV Done
21,001,165 UART: [fht] FMC Alias Private Key: 7
21,002,712 UART: [art] Derive CDI
21,003,530 UART: [art] Store in in slot 0x4
21,046,295 UART: [art] Derive Key Pair
21,047,303 UART: [art] Store priv key in slot 0x5
23,474,123 UART: [art] Derive Key Pair - Done
23,487,016 UART: [art] Signing Cert with AUTHO
23,488,331 UART: RITY.KEYID = 7
25,193,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,927 UART: [art] PUB.X = A40D09484D3DCE0BA91AC5FA5D4D55605DE831BAF67C7CC72C07B631652ACEB4DB80455255AF2BF64E73BA5203D3AA49
25,202,228 UART: [art] PUB.Y = 69754F9CD6D5677D9021802984C602EEB19D949D66ACDA42FC7D4C85040360E702BA350693D771AD8E0CE879314EA820
25,209,486 UART: [art] SIG.R = 918EB62984352C729F7808353A5658545320CFB2FE8506267583C7CE6A3E5944FE58C871DAB9E6B2BA623D4E20F4F31D
25,216,876 UART: [art] SIG.S = 8A5F387F09FD4CA2DC62A133EF5EC9DA8861542DD3A7A747D7881F34CBE31C61FBAD9C34B1973E9754F8F9594A367BA5
26,196,019 UART: Caliptra RT
26,196,729 UART: [state] CFI Enabled
26,313,543 UART: [rt] RT listening for mailbox commands...
29,500,866 >>> mbox cmd response: failed
29,502,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,645,968 UART:
29,646,285 UART: Running Caliptra FMC ...
29,647,332 UART:
29,647,484 UART: [state] CFI Enabled
29,648,414 UART: [art] Extend RT PCRs Done
29,649,555 UART: [art] Lock RT PCRs Done
29,650,543 UART: [art] Populate DV Done
29,651,642 UART: [fht] FMC Alias Private Key: 7
29,652,880 UART: [art] Derive CDI
29,653,609 UART: [art] Store in in slot 0x4
29,654,778 UART: [art] Derive Key Pair
29,655,691 UART: [art] Store priv key in slot 0x5
32,038,531 UART: [art] Derive Key Pair - Done
32,051,443 UART: [art] Signing Cert with AUTHO
32,052,745 UART: RITY.KEYID = 7
33,758,113 UART: [art] Erasing AUTHORITY.KEYID = 7
33,759,621 UART: [art] PUB.X = A40D09484D3DCE0BA91AC5FA5D4D55605DE831BAF67C7CC72C07B631652ACEB4DB80455255AF2BF64E73BA5203D3AA49
33,766,931 UART: [art] PUB.Y = 69754F9CD6D5677D9021802984C602EEB19D949D66ACDA42FC7D4C85040360E702BA350693D771AD8E0CE879314EA820
33,774,178 UART: [art] SIG.R = 918EB62984352C729F7808353A5658545320CFB2FE8506267583C7CE6A3E5944FE58C871DAB9E6B2BA623D4E20F4F31D
33,781,571 UART: [art] SIG.S = 8A5F387F09FD4CA2DC62A133EF5EC9DA8861542DD3A7A747D7881F34CBE31C61FBAD9C34B1973E9754F8F9594A367BA5
34,760,332 UART: Caliptra RT
34,761,020 UART: [state] CFI Enabled
35,049,234 UART: [rt] RT listening for mailbox commands...
47,888,123 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,462 UART: [kat] SHA2-512-ACC
897,363 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,493 UART: [cold-reset] ++
1,476,941 UART: [fht] Storing FHT @ 0x50003400
1,479,672 UART: [idev] ++
1,479,840 UART: [idev] CDI.KEYID = 6
1,480,200 UART: [idev] SUBJECT.KEYID = 7
1,480,624 UART: [idev] UDS.KEYID = 0
1,480,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,490 UART: [idev] Erasing UDS.KEYID = 0
1,504,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,280 UART: [idev] --
1,514,257 UART: [ldev] ++
1,514,425 UART: [ldev] CDI.KEYID = 6
1,514,788 UART: [ldev] SUBJECT.KEYID = 5
1,515,214 UART: [ldev] AUTHORITY.KEYID = 7
1,515,677 UART: [ldev] FE.KEYID = 1
1,521,089 UART: [ldev] Erasing FE.KEYID = 1
1,546,316 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,354 UART: [ldev] --
1,585,679 UART: [fwproc] Waiting for Commands...
1,586,396 UART: [fwproc] Received command 0x46574c44
1,587,187 UART: [fwproc] Received Image of size 114084 bytes
2,881,593 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,273 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,236 >>> mbox cmd response: success
3,073,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,074,434 UART: [afmc] ++
3,074,602 UART: [afmc] CDI.KEYID = 6
3,074,964 UART: [afmc] SUBJECT.KEYID = 7
3,075,389 UART: [afmc] AUTHORITY.KEYID = 5
3,110,720 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,520 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,300 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,138,913 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,603 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,530 UART: [afmc] --
3,153,616 UART: [cold-reset] --
3,154,390 UART: [state] Locking Datavault
3,155,725 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,329 UART: [state] Locking ICCM
3,156,977 UART: [exit] Launching FMC @ 0x40000130
3,162,306 UART:
3,162,322 UART: Running Caliptra FMC ...
3,162,730 UART:
3,162,784 UART: [state] CFI Enabled
3,173,309 UART: [fht] FMC Alias Private Key: 7
3,281,798 UART: [art] Extend RT PCRs Done
3,282,226 UART: [art] Lock RT PCRs Done
3,283,890 UART: [art] Populate DV Done
3,292,235 UART: [fht] FMC Alias Private Key: 7
3,293,331 UART: [art] Derive CDI
3,293,611 UART: [art] Store in in slot 0x4
3,379,384 UART: [art] Derive Key Pair
3,379,744 UART: [art] Store priv key in slot 0x5
3,392,496 UART: [art] Derive Key Pair - Done
3,407,304 UART: [art] Signing Cert with AUTHO
3,407,784 UART: RITY.KEYID = 7
3,423,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,017 UART: [art] PUB.X = F6E054633F326124748B3977368779E95AD8B6184B7EB3BAB0C5C081E3D0EF8057702EE45FA15E71841FD06B9C5B3724
3,430,785 UART: [art] PUB.Y = 440A5EF70A224FD11848D36CA582FA51C37A43DB8AF68A1146CF986BCE23B8EBC07A47AD39CAA39C3DEB839F3F1D83E6
3,437,749 UART: [art] SIG.R = 1D34A23EE6B504645C3E5070067BE8BD04F31DA0B9492620C79405F003E14545512294EFFDE36E05FE77468D3C03F586
3,444,494 UART: [art] SIG.S = 22FBC39F69B050AB384B7A8DA78E093C1A633D7607848D211D8558ECCB92DFB5EF1167796A2DEE1D2E3C9B701B0683DA
3,467,852 UART: Caliptra RT
3,468,105 UART: [state] CFI Enabled
3,576,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,116 UART:
3,578,132 UART: Running Caliptra ROM ...
3,578,540 UART:
3,578,594 UART: [state] CFI Enabled
3,581,916 UART: [state] LifecycleState = Unprovisioned
3,582,571 UART: [state] DebugLocked = No
3,583,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,584,628 UART: [kat] SHA2-256
4,378,559 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,674 UART: [kat] ++
4,382,826 UART: [kat] sha1
4,387,138 UART: [kat] SHA2-256
4,389,076 UART: [kat] SHA2-384
4,391,695 UART: [kat] SHA2-512-ACC
4,393,595 UART: [kat] ECC-384
4,398,902 UART: [kat] HMAC-384Kdf
4,403,378 UART: [kat] LMS
4,971,574 UART: [kat] --
4,972,269 UART: [update-reset] ++
5,009,588 >>> mbox cmd response: failed
5,009,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,009,982 UART: ROM Non-Fatal Error: 0x000B001D
5,010,792 UART: [state] Locking Datavault
5,011,616 UART: [state] Locking PCR0, PCR1 and PCR31
5,012,220 UART: [state] Locking ICCM
5,012,690 UART: [exit] Launching FMC @ 0x40000130
5,018,019 UART:
5,018,035 UART: Running Caliptra FMC ...
5,018,443 UART:
5,018,497 UART: [state] CFI Enabled
5,107,664 UART: [art] Extend RT PCRs Done
5,108,092 UART: [art] Lock RT PCRs Done
5,109,379 UART: [art] Populate DV Done
5,117,512 UART: [fht] FMC Alias Private Key: 7
5,118,490 UART: [art] Derive CDI
5,118,770 UART: [art] Store in in slot 0x4
5,204,151 UART: [art] Derive Key Pair
5,204,511 UART: [art] Store priv key in slot 0x5
5,217,611 UART: [art] Derive Key Pair - Done
5,232,047 UART: [art] Signing Cert with AUTHO
5,232,527 UART: RITY.KEYID = 7
5,247,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,248,534 UART: [art] PUB.X = F6E054633F326124748B3977368779E95AD8B6184B7EB3BAB0C5C081E3D0EF8057702EE45FA15E71841FD06B9C5B3724
5,255,302 UART: [art] PUB.Y = 440A5EF70A224FD11848D36CA582FA51C37A43DB8AF68A1146CF986BCE23B8EBC07A47AD39CAA39C3DEB839F3F1D83E6
5,262,266 UART: [art] SIG.R = 1D34A23EE6B504645C3E5070067BE8BD04F31DA0B9492620C79405F003E14545512294EFFDE36E05FE77468D3C03F586
5,269,011 UART: [art] SIG.S = 22FBC39F69B050AB384B7A8DA78E093C1A633D7607848D211D8558ECCB92DFB5EF1167796A2DEE1D2E3C9B701B0683DA
5,292,735 UART: Caliptra RT
5,292,988 UART: [state] CFI Enabled
5,578,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,008 UART:
5,580,024 UART: Running Caliptra ROM ...
5,580,432 UART:
5,580,486 UART: [state] CFI Enabled
5,583,106 UART: [state] LifecycleState = Unprovisioned
5,583,761 UART: [state] DebugLocked = No
5,584,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,585,914 UART: [kat] SHA2-256
6,379,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,383,960 UART: [kat] ++
6,384,112 UART: [kat] sha1
6,388,188 UART: [kat] SHA2-256
6,390,126 UART: [kat] SHA2-384
6,392,855 UART: [kat] SHA2-512-ACC
6,394,755 UART: [kat] ECC-384
6,400,204 UART: [kat] HMAC-384Kdf
6,404,996 UART: [kat] LMS
6,973,192 UART: [kat] --
6,974,099 UART: [update-reset] ++
8,305,667 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,306,789 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,456,293 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,358 >>> mbox cmd response: success
2,924,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,046 UART:
2,986,062 UART: Running Caliptra FMC ...
2,986,470 UART:
2,986,524 UART: [state] CFI Enabled
2,997,001 UART: [fht] FMC Alias Private Key: 7
3,104,676 UART: [art] Extend RT PCRs Done
3,105,104 UART: [art] Lock RT PCRs Done
3,106,542 UART: [art] Populate DV Done
3,114,863 UART: [fht] FMC Alias Private Key: 7
3,115,991 UART: [art] Derive CDI
3,116,271 UART: [art] Store in in slot 0x4
3,201,812 UART: [art] Derive Key Pair
3,202,172 UART: [art] Store priv key in slot 0x5
3,215,638 UART: [art] Derive Key Pair - Done
3,230,479 UART: [art] Signing Cert with AUTHO
3,230,959 UART: RITY.KEYID = 7
3,246,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,884 UART: [art] PUB.X = 8BB8F9B5C57818DE6CE63728B2C562ED80B6CFC6114DBEFF270089F10F9E0FAA166D0F1085FAA5C2D8C89156160B4A51
3,253,634 UART: [art] PUB.Y = 923EE6DD7CEE81E9C7AA80067CB60C5D36EEF8E75B7899EDE610C3BDB31A631E8D6B2BEA7BC7891AF4C5B8619C9E589A
3,260,602 UART: [art] SIG.R = 36AB5F40B7DE588C03600231B6EE29698D24F1D2BE1158402B41FC3EBB61F9619E8BCACC057A8613ECB2264FD2756D49
3,267,371 UART: [art] SIG.S = 514029FF81A6A0610AB0DE0A54A7F45D05EE1FB4A9B5D87906F11F24E9DC2CA1D38C7292D1A9D026B7D13FF787B77D36
3,291,244 UART: Caliptra RT
3,291,497 UART: [state] CFI Enabled
3,399,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,716,657 >>> mbox cmd response: failed
4,716,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,722,192 UART:
4,722,208 UART: Running Caliptra FMC ...
4,722,616 UART:
4,722,670 UART: [state] CFI Enabled
4,811,569 UART: [art] Extend RT PCRs Done
4,811,997 UART: [art] Lock RT PCRs Done
4,812,972 UART: [art] Populate DV Done
4,821,147 UART: [fht] FMC Alias Private Key: 7
4,822,093 UART: [art] Derive CDI
4,822,373 UART: [art] Store in in slot 0x4
4,908,330 UART: [art] Derive Key Pair
4,908,690 UART: [art] Store priv key in slot 0x5
4,921,542 UART: [art] Derive Key Pair - Done
4,936,261 UART: [art] Signing Cert with AUTHO
4,936,741 UART: RITY.KEYID = 7
4,951,847 UART: [art] Erasing AUTHORITY.KEYID = 7
4,952,612 UART: [art] PUB.X = 8BB8F9B5C57818DE6CE63728B2C562ED80B6CFC6114DBEFF270089F10F9E0FAA166D0F1085FAA5C2D8C89156160B4A51
4,959,362 UART: [art] PUB.Y = 923EE6DD7CEE81E9C7AA80067CB60C5D36EEF8E75B7899EDE610C3BDB31A631E8D6B2BEA7BC7891AF4C5B8619C9E589A
4,966,330 UART: [art] SIG.R = 36AB5F40B7DE588C03600231B6EE29698D24F1D2BE1158402B41FC3EBB61F9619E8BCACC057A8613ECB2264FD2756D49
4,973,099 UART: [art] SIG.S = 514029FF81A6A0610AB0DE0A54A7F45D05EE1FB4A9B5D87906F11F24E9DC2CA1D38C7292D1A9D026B7D13FF787B77D36
4,996,698 UART: Caliptra RT
4,996,951 UART: [state] CFI Enabled
5,279,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,039,600 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,714 UART: [kat] SHA2-256
881,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,760 UART: [kat] ++
885,912 UART: [kat] sha1
890,278 UART: [kat] SHA2-256
892,216 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,766 UART: [fht] Storing FHT @ 0x50003400
1,479,575 UART: [idev] ++
1,479,743 UART: [idev] CDI.KEYID = 6
1,480,103 UART: [idev] SUBJECT.KEYID = 7
1,480,527 UART: [idev] UDS.KEYID = 0
1,480,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,345 UART: [idev] Erasing UDS.KEYID = 0
1,505,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,483 UART: [idev] --
1,514,514 UART: [ldev] ++
1,514,682 UART: [ldev] CDI.KEYID = 6
1,515,045 UART: [ldev] SUBJECT.KEYID = 5
1,515,471 UART: [ldev] AUTHORITY.KEYID = 7
1,515,934 UART: [ldev] FE.KEYID = 1
1,521,190 UART: [ldev] Erasing FE.KEYID = 1
1,546,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,585 UART: [ldev] --
1,585,968 UART: [fwproc] Waiting for Commands...
1,586,675 UART: [fwproc] Received command 0x46574c44
1,587,466 UART: [fwproc] Received Image of size 114084 bytes
2,883,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,859 >>> mbox cmd response: success
3,075,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,076,935 UART: [afmc] ++
3,077,103 UART: [afmc] CDI.KEYID = 6
3,077,465 UART: [afmc] SUBJECT.KEYID = 7
3,077,890 UART: [afmc] AUTHORITY.KEYID = 5
3,112,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,833 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,226 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,916 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,631 UART: [afmc] --
3,155,601 UART: [cold-reset] --
3,156,509 UART: [state] Locking Datavault
3,157,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,272 UART: [state] Locking ICCM
3,158,714 UART: [exit] Launching FMC @ 0x40000130
3,164,043 UART:
3,164,059 UART: Running Caliptra FMC ...
3,164,467 UART:
3,164,610 UART: [state] CFI Enabled
3,175,003 UART: [fht] FMC Alias Private Key: 7
3,282,976 UART: [art] Extend RT PCRs Done
3,283,404 UART: [art] Lock RT PCRs Done
3,284,846 UART: [art] Populate DV Done
3,292,947 UART: [fht] FMC Alias Private Key: 7
3,293,991 UART: [art] Derive CDI
3,294,271 UART: [art] Store in in slot 0x4
3,380,140 UART: [art] Derive Key Pair
3,380,500 UART: [art] Store priv key in slot 0x5
3,393,662 UART: [art] Derive Key Pair - Done
3,408,487 UART: [art] Signing Cert with AUTHO
3,408,967 UART: RITY.KEYID = 7
3,424,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,132 UART: [art] PUB.X = 04B7B9A4D19E76226ACE18384A2B7AB79B3568D7C7E77630A5CE5FB9618045B093FCBBD6B082A8EDFD277C284EC99AA0
3,431,913 UART: [art] PUB.Y = 72491397ED8D924F7F2AFAA8A1F61D3DE11330800DA67AFFC0EFB55A589684503786C72D7EC1418BF639E39E0AF16A51
3,438,865 UART: [art] SIG.R = D2E72DCB8338A2900AFC7BBEAA21AB5555334E969B44516A21800C1FAF80CA4F6AFC71D22DB6700CDF5729F8CE9A2547
3,445,642 UART: [art] SIG.S = 48D1FF99D93E0DD3086E138E604B474630A5BE6BDDD9E8DB176C1C1528A993E884B65B625E84E14867CB950E2ACE3998
3,469,342 UART: Caliptra RT
3,469,687 UART: [state] CFI Enabled
3,578,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,065 UART:
3,580,081 UART: Running Caliptra ROM ...
3,580,489 UART:
3,580,630 UART: [state] CFI Enabled
3,583,780 UART: [state] LifecycleState = Unprovisioned
3,584,435 UART: [state] DebugLocked = No
3,585,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,748 UART: [kat] SHA2-256
4,380,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,794 UART: [kat] ++
4,384,946 UART: [kat] sha1
4,389,078 UART: [kat] SHA2-256
4,391,016 UART: [kat] SHA2-384
4,393,799 UART: [kat] SHA2-512-ACC
4,395,699 UART: [kat] ECC-384
4,400,920 UART: [kat] HMAC-384Kdf
4,405,560 UART: [kat] LMS
4,973,756 UART: [kat] --
4,974,841 UART: [update-reset] ++
5,012,514 >>> mbox cmd response: failed
5,012,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,012,872 UART: ROM Non-Fatal Error: 0x000B001D
5,013,814 UART: [state] Locking Datavault
5,014,612 UART: [state] Locking PCR0, PCR1 and PCR31
5,015,216 UART: [state] Locking ICCM
5,015,660 UART: [exit] Launching FMC @ 0x40000130
5,020,989 UART:
5,021,005 UART: Running Caliptra FMC ...
5,021,413 UART:
5,021,556 UART: [state] CFI Enabled
5,110,877 UART: [art] Extend RT PCRs Done
5,111,305 UART: [art] Lock RT PCRs Done
5,112,274 UART: [art] Populate DV Done
5,120,401 UART: [fht] FMC Alias Private Key: 7
5,121,457 UART: [art] Derive CDI
5,121,737 UART: [art] Store in in slot 0x4
5,207,222 UART: [art] Derive Key Pair
5,207,582 UART: [art] Store priv key in slot 0x5
5,221,262 UART: [art] Derive Key Pair - Done
5,236,013 UART: [art] Signing Cert with AUTHO
5,236,493 UART: RITY.KEYID = 7
5,251,905 UART: [art] Erasing AUTHORITY.KEYID = 7
5,252,670 UART: [art] PUB.X = 04B7B9A4D19E76226ACE18384A2B7AB79B3568D7C7E77630A5CE5FB9618045B093FCBBD6B082A8EDFD277C284EC99AA0
5,259,451 UART: [art] PUB.Y = 72491397ED8D924F7F2AFAA8A1F61D3DE11330800DA67AFFC0EFB55A589684503786C72D7EC1418BF639E39E0AF16A51
5,266,403 UART: [art] SIG.R = D2E72DCB8338A2900AFC7BBEAA21AB5555334E969B44516A21800C1FAF80CA4F6AFC71D22DB6700CDF5729F8CE9A2547
5,273,180 UART: [art] SIG.S = 48D1FF99D93E0DD3086E138E604B474630A5BE6BDDD9E8DB176C1C1528A993E884B65B625E84E14867CB950E2ACE3998
5,297,566 UART: Caliptra RT
5,297,911 UART: [state] CFI Enabled
5,585,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,482 UART:
5,587,498 UART: Running Caliptra ROM ...
5,587,906 UART:
5,588,047 UART: [state] CFI Enabled
5,591,543 UART: [state] LifecycleState = Unprovisioned
5,592,198 UART: [state] DebugLocked = No
5,592,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,594,445 UART: [kat] SHA2-256
6,388,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,392,491 UART: [kat] ++
6,392,643 UART: [kat] sha1
6,396,905 UART: [kat] SHA2-256
6,398,843 UART: [kat] SHA2-384
6,401,440 UART: [kat] SHA2-512-ACC
6,403,340 UART: [kat] ECC-384
6,408,825 UART: [kat] HMAC-384Kdf
6,413,353 UART: [kat] LMS
6,981,549 UART: [kat] --
6,982,290 UART: [update-reset] ++
8,314,014 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,315,150 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,464,654 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,949 >>> mbox cmd response: success
2,923,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,101 UART:
2,986,117 UART: Running Caliptra FMC ...
2,986,525 UART:
2,986,668 UART: [state] CFI Enabled
2,997,143 UART: [fht] FMC Alias Private Key: 7
3,104,916 UART: [art] Extend RT PCRs Done
3,105,344 UART: [art] Lock RT PCRs Done
3,106,806 UART: [art] Populate DV Done
3,115,115 UART: [fht] FMC Alias Private Key: 7
3,116,103 UART: [art] Derive CDI
3,116,383 UART: [art] Store in in slot 0x4
3,201,922 UART: [art] Derive Key Pair
3,202,282 UART: [art] Store priv key in slot 0x5
3,216,106 UART: [art] Derive Key Pair - Done
3,230,962 UART: [art] Signing Cert with AUTHO
3,231,442 UART: RITY.KEYID = 7
3,246,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,623 UART: [art] PUB.X = 2B3DB81BF729F1B0623CC854BA65C41980EDE8E58C9E6D3766993AA003E286F169FC08C408F8A446C4277AFCC9EB9693
3,254,392 UART: [art] PUB.Y = 4BCF587509D2ED39C367F7F97D6D9024B0E18821B92FF6362DEECDBBE2E4085555344AEAEE3334DAE77260C09BF7D2F5
3,261,350 UART: [art] SIG.R = 696651A8C35D209ED2E22CDA3DE1AE7507F6737C2114F44BA2F3FCA88D18AD46AE91BF680CC9A5D4E054CBD41163EBAC
3,268,134 UART: [art] SIG.S = 39027E815A309B96BB0D36EE488F50D7BCA59815DDA457F72BDC7DCC9685945FF32B005023AB3CDDBFD807C960B95A2A
3,291,946 UART: Caliptra RT
3,292,291 UART: [state] CFI Enabled
3,400,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,718,840 >>> mbox cmd response: failed
4,718,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,724,717 UART:
4,724,733 UART: Running Caliptra FMC ...
4,725,141 UART:
4,725,284 UART: [state] CFI Enabled
4,814,929 UART: [art] Extend RT PCRs Done
4,815,357 UART: [art] Lock RT PCRs Done
4,816,744 UART: [art] Populate DV Done
4,825,105 UART: [fht] FMC Alias Private Key: 7
4,826,129 UART: [art] Derive CDI
4,826,409 UART: [art] Store in in slot 0x4
4,911,720 UART: [art] Derive Key Pair
4,912,080 UART: [art] Store priv key in slot 0x5
4,925,328 UART: [art] Derive Key Pair - Done
4,940,072 UART: [art] Signing Cert with AUTHO
4,940,552 UART: RITY.KEYID = 7
4,955,666 UART: [art] Erasing AUTHORITY.KEYID = 7
4,956,431 UART: [art] PUB.X = 2B3DB81BF729F1B0623CC854BA65C41980EDE8E58C9E6D3766993AA003E286F169FC08C408F8A446C4277AFCC9EB9693
4,963,200 UART: [art] PUB.Y = 4BCF587509D2ED39C367F7F97D6D9024B0E18821B92FF6362DEECDBBE2E4085555344AEAEE3334DAE77260C09BF7D2F5
4,970,158 UART: [art] SIG.R = 696651A8C35D209ED2E22CDA3DE1AE7507F6737C2114F44BA2F3FCA88D18AD46AE91BF680CC9A5D4E054CBD41163EBAC
4,976,942 UART: [art] SIG.S = 39027E815A309B96BB0D36EE488F50D7BCA59815DDA457F72BDC7DCC9685945FF32B005023AB3CDDBFD807C960B95A2A
5,001,034 UART: Caliptra RT
5,001,379 UART: [state] CFI Enabled
5,283,995 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,043,685 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,570 UART: [kat] SHA2-512-ACC
908,471 UART: [kat] ECC-384
917,922 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,891 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,987 UART: [idev] Sha1 KeyId Algorithm
1,209,385 UART: [idev] --
1,210,435 UART: [ldev] ++
1,210,603 UART: [ldev] CDI.KEYID = 6
1,210,966 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,177 UART: [ldev] --
1,282,460 UART: [fwproc] Wait for Commands...
1,283,254 UART: [fwproc] Recv command 0x46574c44
1,283,982 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,422 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,793 >>> mbox cmd response: success
2,770,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,771,945 UART: [afmc] ++
2,772,113 UART: [afmc] CDI.KEYID = 6
2,772,475 UART: [afmc] SUBJECT.KEYID = 7
2,772,900 UART: [afmc] AUTHORITY.KEYID = 5
2,807,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,068 UART: [afmc] --
2,850,958 UART: [cold-reset] --
2,851,758 UART: [state] Locking Datavault
2,852,661 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,265 UART: [state] Locking ICCM
2,853,819 UART: [exit] Launching FMC @ 0x40000130
2,859,148 UART:
2,859,164 UART: Running Caliptra FMC ...
2,859,572 UART:
2,859,626 UART: [state] CFI Enabled
2,870,033 UART: [fht] FMC Alias Private Key: 7
2,977,834 UART: [art] Extend RT PCRs Done
2,978,262 UART: [art] Lock RT PCRs Done
2,979,628 UART: [art] Populate DV Done
2,987,943 UART: [fht] FMC Alias Private Key: 7
2,989,051 UART: [art] Derive CDI
2,989,331 UART: [art] Store in in slot 0x4
3,075,062 UART: [art] Derive Key Pair
3,075,422 UART: [art] Store priv key in slot 0x5
3,088,724 UART: [art] Derive Key Pair - Done
3,103,289 UART: [art] Signing Cert with AUTHO
3,103,769 UART: RITY.KEYID = 7
3,119,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,000 UART: [art] PUB.X = 2A508C9D14F5408991026B252B7413476B5A4145E12750FCC43EC123615CFDB07F7546B1B7A7CD15DFD1397C01F78547
3,126,760 UART: [art] PUB.Y = 4D5104154EAA14097CC5BF5DC810A6CB49746C0052DD9E42ECE12A487B9F4FF95AD2D004BA2B3BE61A29D3170B5D20CF
3,133,692 UART: [art] SIG.R = 2F64550A51287031F659F3C2583934C94BAA00F8BC97633484A5EB27C516ED56989990207EC3B5280E2BFA54CDA80993
3,140,425 UART: [art] SIG.S = EC5BE486232BC974F220BE3D641C331B1A94A00A13279A361A3E7B5AD0E29CFE7BF5858A8E84C2E748441B487CA076C9
3,163,871 UART: Caliptra RT
3,164,124 UART: [state] CFI Enabled
3,271,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,547 UART:
3,273,563 UART: Running Caliptra ROM ...
3,273,971 UART:
3,274,026 UART: [state] CFI Enabled
3,276,602 UART: [state] LifecycleState = Unprovisioned
3,277,257 UART: [state] DebugLocked = No
3,277,925 UART: [state] WD Timer not started. Device not locked for debugging
3,279,085 UART: [kat] SHA2-256
4,084,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,088,860 UART: [kat] ++
4,089,012 UART: [kat] sha1
4,093,226 UART: [kat] SHA2-256
4,095,166 UART: [kat] SHA2-384
4,098,073 UART: [kat] SHA2-512-ACC
4,099,973 UART: [kat] ECC-384
4,109,760 UART: [kat] HMAC-384Kdf
4,114,376 UART: [kat] LMS
4,362,704 UART: [kat] --
4,363,462 UART: [update-reset] ++
4,379,101 >>> mbox cmd response: failed
4,379,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,379,543 UART: ROM Non-Fatal Error: 0x000B001D
4,380,475 UART: [state] Locking Datavault
4,381,191 UART: [state] Locking PCR0, PCR1 and PCR31
4,381,795 UART: [state] Locking ICCM
4,382,333 UART: [exit] Launching FMC @ 0x40000130
4,387,662 UART:
4,387,678 UART: Running Caliptra FMC ...
4,388,086 UART:
4,388,140 UART: [state] CFI Enabled
4,477,095 UART: [art] Extend RT PCRs Done
4,477,523 UART: [art] Lock RT PCRs Done
4,478,616 UART: [art] Populate DV Done
4,487,033 UART: [fht] FMC Alias Private Key: 7
4,488,037 UART: [art] Derive CDI
4,488,317 UART: [art] Store in in slot 0x4
4,573,694 UART: [art] Derive Key Pair
4,574,054 UART: [art] Store priv key in slot 0x5
4,587,368 UART: [art] Derive Key Pair - Done
4,602,247 UART: [art] Signing Cert with AUTHO
4,602,727 UART: RITY.KEYID = 7
4,618,233 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,998 UART: [art] PUB.X = 2A508C9D14F5408991026B252B7413476B5A4145E12750FCC43EC123615CFDB07F7546B1B7A7CD15DFD1397C01F78547
4,625,758 UART: [art] PUB.Y = 4D5104154EAA14097CC5BF5DC810A6CB49746C0052DD9E42ECE12A487B9F4FF95AD2D004BA2B3BE61A29D3170B5D20CF
4,632,690 UART: [art] SIG.R = 2F64550A51287031F659F3C2583934C94BAA00F8BC97633484A5EB27C516ED56989990207EC3B5280E2BFA54CDA80993
4,639,423 UART: [art] SIG.S = EC5BE486232BC974F220BE3D641C331B1A94A00A13279A361A3E7B5AD0E29CFE7BF5858A8E84C2E748441B487CA076C9
4,663,041 UART: Caliptra RT
4,663,294 UART: [state] CFI Enabled
4,946,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,236 UART:
4,948,252 UART: Running Caliptra ROM ...
4,948,660 UART:
4,948,715 UART: [state] CFI Enabled
4,951,167 UART: [state] LifecycleState = Unprovisioned
4,951,822 UART: [state] DebugLocked = No
4,952,504 UART: [state] WD Timer not started. Device not locked for debugging
4,953,768 UART: [kat] SHA2-256
5,759,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,763,543 UART: [kat] ++
5,763,695 UART: [kat] sha1
5,767,977 UART: [kat] SHA2-256
5,769,917 UART: [kat] SHA2-384
5,772,726 UART: [kat] SHA2-512-ACC
5,774,626 UART: [kat] ECC-384
5,784,437 UART: [kat] HMAC-384Kdf
5,788,877 UART: [kat] LMS
6,037,205 UART: [kat] --
6,037,765 UART: [update-reset] ++
7,345,823 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,346,908 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,496,360 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,052 >>> mbox cmd response: success
2,623,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,685,172 UART:
2,685,188 UART: Running Caliptra FMC ...
2,685,596 UART:
2,685,650 UART: [state] CFI Enabled
2,696,119 UART: [fht] FMC Alias Private Key: 7
2,803,942 UART: [art] Extend RT PCRs Done
2,804,370 UART: [art] Lock RT PCRs Done
2,806,180 UART: [art] Populate DV Done
2,814,435 UART: [fht] FMC Alias Private Key: 7
2,815,569 UART: [art] Derive CDI
2,815,849 UART: [art] Store in in slot 0x4
2,901,258 UART: [art] Derive Key Pair
2,901,618 UART: [art] Store priv key in slot 0x5
2,914,330 UART: [art] Derive Key Pair - Done
2,929,263 UART: [art] Signing Cert with AUTHO
2,929,743 UART: RITY.KEYID = 7
2,945,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,012 UART: [art] PUB.X = 325EB044CB150F7160505E3B7AD290BD04B54E470E940197FADC4C0112A2D9DDA145D513481C67A4A73E4E897E7204AF
2,952,768 UART: [art] PUB.Y = 03F4DDFE2945F706AAAA854F74F9CB46E4D0142F23C2AC2B8B877ADDD5787E3463711379F8E2638895DCDA8B9A0D2E36
2,959,721 UART: [art] SIG.R = A92596322BED8896133E47B6DA9B7008C9F8AD3F42B32F6E34503652E9B49E688AAECD6446FA0DC9570E608318206915
2,966,480 UART: [art] SIG.S = 667C0B7F0A232DF9BFB7977ABB23C845FA2F77A4CAAFC1A43BC8729A35E8476EE3E949230FA1C052984C3F94F92B8D3D
2,990,378 UART: Caliptra RT
2,990,631 UART: [state] CFI Enabled
3,098,018 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,102 >>> mbox cmd response: failed
4,091,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,096,963 UART:
4,096,979 UART: Running Caliptra FMC ...
4,097,387 UART:
4,097,441 UART: [state] CFI Enabled
4,186,182 UART: [art] Extend RT PCRs Done
4,186,610 UART: [art] Lock RT PCRs Done
4,188,075 UART: [art] Populate DV Done
4,196,518 UART: [fht] FMC Alias Private Key: 7
4,197,452 UART: [art] Derive CDI
4,197,732 UART: [art] Store in in slot 0x4
4,283,187 UART: [art] Derive Key Pair
4,283,547 UART: [art] Store priv key in slot 0x5
4,296,623 UART: [art] Derive Key Pair - Done
4,311,074 UART: [art] Signing Cert with AUTHO
4,311,554 UART: RITY.KEYID = 7
4,326,796 UART: [art] Erasing AUTHORITY.KEYID = 7
4,327,561 UART: [art] PUB.X = 325EB044CB150F7160505E3B7AD290BD04B54E470E940197FADC4C0112A2D9DDA145D513481C67A4A73E4E897E7204AF
4,334,317 UART: [art] PUB.Y = 03F4DDFE2945F706AAAA854F74F9CB46E4D0142F23C2AC2B8B877ADDD5787E3463711379F8E2638895DCDA8B9A0D2E36
4,341,270 UART: [art] SIG.R = A92596322BED8896133E47B6DA9B7008C9F8AD3F42B32F6E34503652E9B49E688AAECD6446FA0DC9570E608318206915
4,348,029 UART: [art] SIG.S = 667C0B7F0A232DF9BFB7977ABB23C845FA2F77A4CAAFC1A43BC8729A35E8476EE3E949230FA1C052984C3F94F92B8D3D
4,371,645 UART: Caliptra RT
4,371,898 UART: [state] CFI Enabled
4,656,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,092,005 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
893,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,348 UART: [kat] ++
897,500 UART: [kat] sha1
901,688 UART: [kat] SHA2-256
903,628 UART: [kat] SHA2-384
906,379 UART: [kat] SHA2-512-ACC
908,280 UART: [kat] ECC-384
918,545 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,485 UART: [idev] ++
1,175,653 UART: [idev] CDI.KEYID = 6
1,176,013 UART: [idev] SUBJECT.KEYID = 7
1,176,437 UART: [idev] UDS.KEYID = 0
1,176,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,201,440 UART: [idev] Sha1 KeyId Algorithm
1,210,024 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,243,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,760 UART: [ldev] --
1,283,255 UART: [fwproc] Wait for Commands...
1,283,877 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,101 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,532 >>> mbox cmd response: success
2,770,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,771,612 UART: [afmc] ++
2,771,780 UART: [afmc] CDI.KEYID = 6
2,772,142 UART: [afmc] SUBJECT.KEYID = 7
2,772,567 UART: [afmc] AUTHORITY.KEYID = 5
2,807,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,509 UART: [afmc] --
2,851,469 UART: [cold-reset] --
2,852,325 UART: [state] Locking Datavault
2,853,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,168 UART: [state] Locking ICCM
2,854,818 UART: [exit] Launching FMC @ 0x40000130
2,860,147 UART:
2,860,163 UART: Running Caliptra FMC ...
2,860,571 UART:
2,860,714 UART: [state] CFI Enabled
2,870,871 UART: [fht] FMC Alias Private Key: 7
2,978,640 UART: [art] Extend RT PCRs Done
2,979,068 UART: [art] Lock RT PCRs Done
2,980,636 UART: [art] Populate DV Done
2,988,885 UART: [fht] FMC Alias Private Key: 7
2,989,869 UART: [art] Derive CDI
2,990,149 UART: [art] Store in in slot 0x4
3,075,764 UART: [art] Derive Key Pair
3,076,124 UART: [art] Store priv key in slot 0x5
3,089,494 UART: [art] Derive Key Pair - Done
3,104,465 UART: [art] Signing Cert with AUTHO
3,104,945 UART: RITY.KEYID = 7
3,119,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,472 UART: [art] PUB.X = 30A35614614B60D0651A331BBDE0E76821386204CDFEB624211088BCBE5788108049B7EC78309D62F69682F0442B43F9
3,127,229 UART: [art] PUB.Y = 6F62AB7DDD151EB11A15E07BEA705A0CB0B499BA3A5422AE00B0BECC0F26EB1F62CAE109BA8575B627B2562A791AB6BC
3,134,172 UART: [art] SIG.R = AD733538169B7BD328F75023188D21D90E1D69EB8D76D8844A7D147DB8BDE5FC062470F23827944DCDF43EBEDB588006
3,140,937 UART: [art] SIG.S = E599510AA107552B2425E3461ECB2E90F72F745F969019DA8CD3969E656BD0DCD4CEB3EAAF7A9B2FDE86C53F5F723AB3
3,164,842 UART: Caliptra RT
3,165,187 UART: [state] CFI Enabled
3,273,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,859 UART:
3,274,875 UART: Running Caliptra ROM ...
3,275,283 UART:
3,275,425 UART: [state] CFI Enabled
3,278,353 UART: [state] LifecycleState = Unprovisioned
3,279,008 UART: [state] DebugLocked = No
3,279,660 UART: [state] WD Timer not started. Device not locked for debugging
3,280,888 UART: [kat] SHA2-256
4,086,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,663 UART: [kat] ++
4,090,815 UART: [kat] sha1
4,095,143 UART: [kat] SHA2-256
4,097,083 UART: [kat] SHA2-384
4,099,670 UART: [kat] SHA2-512-ACC
4,101,570 UART: [kat] ECC-384
4,111,551 UART: [kat] HMAC-384Kdf
4,116,215 UART: [kat] LMS
4,364,543 UART: [kat] --
4,365,361 UART: [update-reset] ++
4,380,886 >>> mbox cmd response: failed
4,380,886 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,381,502 UART: ROM Non-Fatal Error: 0x000B001D
4,382,410 UART: [state] Locking Datavault
4,383,220 UART: [state] Locking PCR0, PCR1 and PCR31
4,383,824 UART: [state] Locking ICCM
4,384,260 UART: [exit] Launching FMC @ 0x40000130
4,389,589 UART:
4,389,605 UART: Running Caliptra FMC ...
4,390,013 UART:
4,390,156 UART: [state] CFI Enabled
4,479,407 UART: [art] Extend RT PCRs Done
4,479,835 UART: [art] Lock RT PCRs Done
4,481,204 UART: [art] Populate DV Done
4,489,685 UART: [fht] FMC Alias Private Key: 7
4,490,751 UART: [art] Derive CDI
4,491,031 UART: [art] Store in in slot 0x4
4,576,762 UART: [art] Derive Key Pair
4,577,122 UART: [art] Store priv key in slot 0x5
4,590,492 UART: [art] Derive Key Pair - Done
4,605,025 UART: [art] Signing Cert with AUTHO
4,605,505 UART: RITY.KEYID = 7
4,621,021 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,786 UART: [art] PUB.X = 30A35614614B60D0651A331BBDE0E76821386204CDFEB624211088BCBE5788108049B7EC78309D62F69682F0442B43F9
4,628,543 UART: [art] PUB.Y = 6F62AB7DDD151EB11A15E07BEA705A0CB0B499BA3A5422AE00B0BECC0F26EB1F62CAE109BA8575B627B2562A791AB6BC
4,635,486 UART: [art] SIG.R = AD733538169B7BD328F75023188D21D90E1D69EB8D76D8844A7D147DB8BDE5FC062470F23827944DCDF43EBEDB588006
4,642,251 UART: [art] SIG.S = E599510AA107552B2425E3461ECB2E90F72F745F969019DA8CD3969E656BD0DCD4CEB3EAAF7A9B2FDE86C53F5F723AB3
4,666,906 UART: Caliptra RT
4,667,251 UART: [state] CFI Enabled
4,946,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,618 UART:
4,948,634 UART: Running Caliptra ROM ...
4,949,042 UART:
4,949,184 UART: [state] CFI Enabled
4,952,178 UART: [state] LifecycleState = Unprovisioned
4,952,833 UART: [state] DebugLocked = No
4,953,553 UART: [state] WD Timer not started. Device not locked for debugging
4,954,779 UART: [kat] SHA2-256
5,760,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,764,554 UART: [kat] ++
5,764,706 UART: [kat] sha1
5,768,850 UART: [kat] SHA2-256
5,770,790 UART: [kat] SHA2-384
5,773,723 UART: [kat] SHA2-512-ACC
5,775,623 UART: [kat] ECC-384
5,785,678 UART: [kat] HMAC-384Kdf
5,790,308 UART: [kat] LMS
6,038,636 UART: [kat] --
6,039,556 UART: [update-reset] ++
7,349,538 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,350,697 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,500,149 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,126 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,669 >>> mbox cmd response: success
2,623,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,686,017 UART:
2,686,033 UART: Running Caliptra FMC ...
2,686,441 UART:
2,686,584 UART: [state] CFI Enabled
2,697,407 UART: [fht] FMC Alias Private Key: 7
2,805,752 UART: [art] Extend RT PCRs Done
2,806,180 UART: [art] Lock RT PCRs Done
2,807,600 UART: [art] Populate DV Done
2,815,777 UART: [fht] FMC Alias Private Key: 7
2,816,945 UART: [art] Derive CDI
2,817,225 UART: [art] Store in in slot 0x4
2,903,188 UART: [art] Derive Key Pair
2,903,548 UART: [art] Store priv key in slot 0x5
2,917,512 UART: [art] Derive Key Pair - Done
2,931,794 UART: [art] Signing Cert with AUTHO
2,932,274 UART: RITY.KEYID = 7
2,947,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,325 UART: [art] PUB.X = ABD7B8D4C4AB69F5407C451DEED8A9CC0D72B8447D554F67906335C38637A3BF49A5BA4067ACA1E0344E01194E580225
2,955,092 UART: [art] PUB.Y = A16A4DE9F9FC7B45F5DD9D135FD16E7CFD505180A1A7FF54195370C3FA1ECD832858B148BDD188DADFC5EDEFF72F9E77
2,962,068 UART: [art] SIG.R = 719F58E00B9639CA8767181D8BE060C5DC176E8E1AA9BC3631A2C8E2D3AC0E3861A477ED35F0818E549A9ED4C56AB444
2,968,840 UART: [art] SIG.S = 1614AF925145F752FB19820AEBEDE7A6AD6E5E7D0D45A8E41FAD1BEC337E1394147A694D7488B49F947147615E9E561A
2,992,709 UART: Caliptra RT
2,993,054 UART: [state] CFI Enabled
3,101,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,540 >>> mbox cmd response: failed
4,093,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,099,235 UART:
4,099,251 UART: Running Caliptra FMC ...
4,099,659 UART:
4,099,802 UART: [state] CFI Enabled
4,189,135 UART: [art] Extend RT PCRs Done
4,189,563 UART: [art] Lock RT PCRs Done
4,190,856 UART: [art] Populate DV Done
4,198,925 UART: [fht] FMC Alias Private Key: 7
4,199,935 UART: [art] Derive CDI
4,200,215 UART: [art] Store in in slot 0x4
4,285,970 UART: [art] Derive Key Pair
4,286,330 UART: [art] Store priv key in slot 0x5
4,299,404 UART: [art] Derive Key Pair - Done
4,313,968 UART: [art] Signing Cert with AUTHO
4,314,448 UART: RITY.KEYID = 7
4,329,470 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,235 UART: [art] PUB.X = ABD7B8D4C4AB69F5407C451DEED8A9CC0D72B8447D554F67906335C38637A3BF49A5BA4067ACA1E0344E01194E580225
4,337,002 UART: [art] PUB.Y = A16A4DE9F9FC7B45F5DD9D135FD16E7CFD505180A1A7FF54195370C3FA1ECD832858B148BDD188DADFC5EDEFF72F9E77
4,343,978 UART: [art] SIG.R = 719F58E00B9639CA8767181D8BE060C5DC176E8E1AA9BC3631A2C8E2D3AC0E3861A477ED35F0818E549A9ED4C56AB444
4,350,750 UART: [art] SIG.S = 1614AF925145F752FB19820AEBEDE7A6AD6E5E7D0D45A8E41FAD1BEC337E1394147A694D7488B49F947147615E9E561A
4,373,817 UART: Caliptra RT
4,374,162 UART: [state] CFI Enabled
4,654,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,089,334 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,706 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,169,905 UART: [fht] FHT @ 0x50003400
1,172,407 UART: [idev] ++
1,172,575 UART: [idev] CDI.KEYID = 6
1,172,936 UART: [idev] SUBJECT.KEYID = 7
1,173,361 UART: [idev] UDS.KEYID = 0
1,173,707 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,198,705 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,241,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,394 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,929 >>> mbox cmd response: success
2,768,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,770,078 UART: [afmc] ++
2,770,246 UART: [afmc] CDI.KEYID = 6
2,770,609 UART: [afmc] SUBJECT.KEYID = 7
2,771,035 UART: [afmc] AUTHORITY.KEYID = 5
2,806,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,875 UART: [afmc] --
2,849,761 UART: [cold-reset] --
2,850,609 UART: [state] Locking Datavault
2,851,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,234 UART: [state] Locking ICCM
2,852,830 UART: [exit] Launching FMC @ 0x40000130
2,858,159 UART:
2,858,175 UART: Running Caliptra FMC ...
2,858,583 UART:
2,858,637 UART: [state] CFI Enabled
2,868,948 UART: [fht] FMC Alias Private Key: 7
2,976,593 UART: [art] Extend RT PCRs Done
2,977,021 UART: [art] Lock RT PCRs Done
2,978,545 UART: [art] Populate DV Done
2,986,580 UART: [fht] FMC Alias Private Key: 7
2,987,716 UART: [art] Derive CDI
2,987,996 UART: [art] Store in in slot 0x4
3,073,433 UART: [art] Derive Key Pair
3,073,793 UART: [art] Store priv key in slot 0x5
3,086,903 UART: [art] Derive Key Pair - Done
3,101,726 UART: [art] Signing Cert with AUTHO
3,102,206 UART: RITY.KEYID = 7
3,117,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,591 UART: [art] PUB.X = D6C66EC87BCC3288A23449E1F20DB5527C735B20CCF337A2B7A493C3298B6644CB997274E38C5C13FC725426468F2E94
3,125,358 UART: [art] PUB.Y = 577281E31173E07B5628ABE23B98F74B37B807359F142E2B82D5BD7A95BCC81212DB78208C6B4096EB69165F7EEA9A86
3,132,305 UART: [art] SIG.R = 6DCE770AB98860F0CE5A76B5162CA761E469FACDAB18EDA55E0496A8B9DB76B22C3682C9F274814CB7732DD63B3B7A2D
3,139,085 UART: [art] SIG.S = 24E19685F706DF518ECBE166956757858C9C1D4CA1230790ECB2C5A7860B6717A29831D145202F96DBE9C625329EF2CB
3,163,273 UART: Caliptra RT
3,163,526 UART: [state] CFI Enabled
3,271,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,073 UART:
3,273,089 UART: Running Caliptra ROM ...
3,273,497 UART:
3,273,552 UART: [state] CFI Enabled
3,275,716 UART: [state] LifecycleState = Unprovisioned
3,276,371 UART: [state] DebugLocked = No
3,276,917 UART: [state] WD Timer not started. Device not locked for debugging
3,278,121 UART: [kat] SHA2-256
4,081,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,800 UART: [kat] ++
4,085,952 UART: [kat] sha1
4,090,400 UART: [kat] SHA2-256
4,092,340 UART: [kat] SHA2-384
4,095,089 UART: [kat] SHA2-512-ACC
4,096,989 UART: [kat] ECC-384
4,106,796 UART: [kat] HMAC-384Kdf
4,111,288 UART: [kat] LMS
4,359,600 UART: [kat] --
4,360,524 UART: [update-reset] ++
4,375,777 >>> mbox cmd response: failed
4,375,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,376,189 UART: ROM Non-Fatal Error: 0x000B001D
4,376,953 UART: [state] Locking Datavault
4,377,641 UART: [state] Locking PCR0, PCR1 and PCR31
4,378,245 UART: [state] Locking ICCM
4,378,705 UART: [exit] Launching FMC @ 0x40000130
4,384,034 UART:
4,384,050 UART: Running Caliptra FMC ...
4,384,458 UART:
4,384,512 UART: [state] CFI Enabled
4,473,917 UART: [art] Extend RT PCRs Done
4,474,345 UART: [art] Lock RT PCRs Done
4,475,346 UART: [art] Populate DV Done
4,483,499 UART: [fht] FMC Alias Private Key: 7
4,484,499 UART: [art] Derive CDI
4,484,779 UART: [art] Store in in slot 0x4
4,570,122 UART: [art] Derive Key Pair
4,570,482 UART: [art] Store priv key in slot 0x5
4,583,464 UART: [art] Derive Key Pair - Done
4,598,483 UART: [art] Signing Cert with AUTHO
4,598,963 UART: RITY.KEYID = 7
4,614,363 UART: [art] Erasing AUTHORITY.KEYID = 7
4,615,128 UART: [art] PUB.X = D6C66EC87BCC3288A23449E1F20DB5527C735B20CCF337A2B7A493C3298B6644CB997274E38C5C13FC725426468F2E94
4,621,895 UART: [art] PUB.Y = 577281E31173E07B5628ABE23B98F74B37B807359F142E2B82D5BD7A95BCC81212DB78208C6B4096EB69165F7EEA9A86
4,628,842 UART: [art] SIG.R = 6DCE770AB98860F0CE5A76B5162CA761E469FACDAB18EDA55E0496A8B9DB76B22C3682C9F274814CB7732DD63B3B7A2D
4,635,622 UART: [art] SIG.S = 24E19685F706DF518ECBE166956757858C9C1D4CA1230790ECB2C5A7860B6717A29831D145202F96DBE9C625329EF2CB
4,659,456 UART: Caliptra RT
4,659,709 UART: [state] CFI Enabled
4,944,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,945,909 UART:
4,945,925 UART: Running Caliptra ROM ...
4,946,333 UART:
4,946,388 UART: [state] CFI Enabled
4,949,350 UART: [state] LifecycleState = Unprovisioned
4,950,005 UART: [state] DebugLocked = No
4,950,539 UART: [state] WD Timer not started. Device not locked for debugging
4,951,889 UART: [kat] SHA2-256
5,755,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,759,568 UART: [kat] ++
5,759,720 UART: [kat] sha1
5,763,912 UART: [kat] SHA2-256
5,765,852 UART: [kat] SHA2-384
5,768,673 UART: [kat] SHA2-512-ACC
5,770,573 UART: [kat] ECC-384
5,780,656 UART: [kat] HMAC-384Kdf
5,785,246 UART: [kat] LMS
6,033,558 UART: [kat] --
6,034,598 UART: [update-reset] ++
7,343,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,344,318 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,493,770 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,265 >>> mbox cmd response: success
2,620,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,682,431 UART:
2,682,447 UART: Running Caliptra FMC ...
2,682,855 UART:
2,682,909 UART: [state] CFI Enabled
2,693,322 UART: [fht] FMC Alias Private Key: 7
2,800,699 UART: [art] Extend RT PCRs Done
2,801,127 UART: [art] Lock RT PCRs Done
2,803,027 UART: [art] Populate DV Done
2,811,308 UART: [fht] FMC Alias Private Key: 7
2,812,406 UART: [art] Derive CDI
2,812,686 UART: [art] Store in in slot 0x4
2,898,301 UART: [art] Derive Key Pair
2,898,661 UART: [art] Store priv key in slot 0x5
2,912,091 UART: [art] Derive Key Pair - Done
2,926,638 UART: [art] Signing Cert with AUTHO
2,927,118 UART: RITY.KEYID = 7
2,942,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,875 UART: [art] PUB.X = 9BC6815A4E894DBDB40101F4E2DCBBFF52C3DF5ACC93D2F39061970EA33B17619637A42E0AEDA231CB02134F4188E979
2,949,642 UART: [art] PUB.Y = A600FE3935C386CA4FD584F540EA06E6D34D47CFEB6176B665139F03CC2D974DEEAA16939F14E04D8C2B80CE422DBBAD
2,956,582 UART: [art] SIG.R = 8DDE687462386CE41EE41663B23486049D05B8556438B684C4220CD8C77AD1B414EEDAD56A41B6DBDBEBADCB10BE8C16
2,963,357 UART: [art] SIG.S = C4EA5B0CD0749AE9EAD588645DB84F753AB3BD9141053379DCFCBF1B2FD1806F00F0BE3D03EF51744672F91E4AB6949B
2,987,103 UART: Caliptra RT
2,987,356 UART: [state] CFI Enabled
3,094,934 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,586 >>> mbox cmd response: failed
4,084,586 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,090,615 UART:
4,090,631 UART: Running Caliptra FMC ...
4,091,039 UART:
4,091,093 UART: [state] CFI Enabled
4,180,348 UART: [art] Extend RT PCRs Done
4,180,776 UART: [art] Lock RT PCRs Done
4,181,851 UART: [art] Populate DV Done
4,190,078 UART: [fht] FMC Alias Private Key: 7
4,191,008 UART: [art] Derive CDI
4,191,288 UART: [art] Store in in slot 0x4
4,277,109 UART: [art] Derive Key Pair
4,277,469 UART: [art] Store priv key in slot 0x5
4,290,491 UART: [art] Derive Key Pair - Done
4,304,988 UART: [art] Signing Cert with AUTHO
4,305,468 UART: RITY.KEYID = 7
4,321,028 UART: [art] Erasing AUTHORITY.KEYID = 7
4,321,793 UART: [art] PUB.X = 9BC6815A4E894DBDB40101F4E2DCBBFF52C3DF5ACC93D2F39061970EA33B17619637A42E0AEDA231CB02134F4188E979
4,328,560 UART: [art] PUB.Y = A600FE3935C386CA4FD584F540EA06E6D34D47CFEB6176B665139F03CC2D974DEEAA16939F14E04D8C2B80CE422DBBAD
4,335,500 UART: [art] SIG.R = 8DDE687462386CE41EE41663B23486049D05B8556438B684C4220CD8C77AD1B414EEDAD56A41B6DBDBEBADCB10BE8C16
4,342,275 UART: [art] SIG.S = C4EA5B0CD0749AE9EAD588645DB84F753AB3BD9141053379DCFCBF1B2FD1806F00F0BE3D03EF51744672F91E4AB6949B
4,365,561 UART: Caliptra RT
4,365,814 UART: [state] CFI Enabled
4,643,540 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,072,897 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,174,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,886 UART: [idev] Erasing UDS.KEYID = 0
1,198,928 UART: [idev] Sha1 KeyId Algorithm
1,207,770 UART: [idev] --
1,209,001 UART: [ldev] ++
1,209,169 UART: [ldev] CDI.KEYID = 6
1,209,533 UART: [ldev] SUBJECT.KEYID = 5
1,209,960 UART: [ldev] AUTHORITY.KEYID = 7
1,210,423 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,031 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,108 UART: [fwproc] Recv command 0x46574c44
1,282,841 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,080 >>> mbox cmd response: success
2,769,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,770,203 UART: [afmc] ++
2,770,371 UART: [afmc] CDI.KEYID = 6
2,770,734 UART: [afmc] SUBJECT.KEYID = 7
2,771,160 UART: [afmc] AUTHORITY.KEYID = 5
2,806,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,656 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,268 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,864 UART: [afmc] --
2,849,908 UART: [cold-reset] --
2,850,646 UART: [state] Locking Datavault
2,851,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,369 UART: [state] Locking ICCM
2,852,931 UART: [exit] Launching FMC @ 0x40000130
2,858,260 UART:
2,858,276 UART: Running Caliptra FMC ...
2,858,684 UART:
2,858,827 UART: [state] CFI Enabled
2,869,604 UART: [fht] FMC Alias Private Key: 7
2,977,303 UART: [art] Extend RT PCRs Done
2,977,731 UART: [art] Lock RT PCRs Done
2,979,359 UART: [art] Populate DV Done
2,987,632 UART: [fht] FMC Alias Private Key: 7
2,988,574 UART: [art] Derive CDI
2,988,854 UART: [art] Store in in slot 0x4
3,074,207 UART: [art] Derive Key Pair
3,074,567 UART: [art] Store priv key in slot 0x5
3,087,831 UART: [art] Derive Key Pair - Done
3,102,893 UART: [art] Signing Cert with AUTHO
3,103,373 UART: RITY.KEYID = 7
3,118,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,120 UART: [art] PUB.X = 474CDAF5C4B01A95A05C87A55FF7121B7D77BED45A105829590BF90BB0A536708FF2EC8A4DFA4301228192AD73F51880
3,125,887 UART: [art] PUB.Y = A52C623921D2305B1955BECF83FF99C96F7A44167372E03AFF45ECF95111CAEAE235B509DE8E23E52999A2F4DE48A4C1
3,132,844 UART: [art] SIG.R = C518D0AB94E662FF895E123170D18306EEC959144843061883E0CB9392D03A9A2F6CFB1E5D94CA25F273C211E9088C55
3,139,603 UART: [art] SIG.S = 4D0CDA1C631E5FDD0600FAA37441CAFA885FD8DB7B007BB950EB333CB4AFE6CB6E528F830A9D9E19BA1CB17A94EC6602
3,163,234 UART: Caliptra RT
3,163,579 UART: [state] CFI Enabled
3,271,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,980 UART:
3,272,996 UART: Running Caliptra ROM ...
3,273,404 UART:
3,273,546 UART: [state] CFI Enabled
3,276,416 UART: [state] LifecycleState = Unprovisioned
3,277,071 UART: [state] DebugLocked = No
3,277,671 UART: [state] WD Timer not started. Device not locked for debugging
3,278,885 UART: [kat] SHA2-256
4,082,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,086,564 UART: [kat] ++
4,086,716 UART: [kat] sha1
4,090,838 UART: [kat] SHA2-256
4,092,778 UART: [kat] SHA2-384
4,095,587 UART: [kat] SHA2-512-ACC
4,097,487 UART: [kat] ECC-384
4,107,252 UART: [kat] HMAC-384Kdf
4,111,866 UART: [kat] LMS
4,360,178 UART: [kat] --
4,360,838 UART: [update-reset] ++
4,376,207 >>> mbox cmd response: failed
4,376,207 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,376,727 UART: ROM Non-Fatal Error: 0x000B001D
4,377,599 UART: [state] Locking Datavault
4,378,481 UART: [state] Locking PCR0, PCR1 and PCR31
4,379,085 UART: [state] Locking ICCM
4,379,567 UART: [exit] Launching FMC @ 0x40000130
4,384,896 UART:
4,384,912 UART: Running Caliptra FMC ...
4,385,320 UART:
4,385,463 UART: [state] CFI Enabled
4,474,550 UART: [art] Extend RT PCRs Done
4,474,978 UART: [art] Lock RT PCRs Done
4,476,201 UART: [art] Populate DV Done
4,484,336 UART: [fht] FMC Alias Private Key: 7
4,485,332 UART: [art] Derive CDI
4,485,612 UART: [art] Store in in slot 0x4
4,571,467 UART: [art] Derive Key Pair
4,571,827 UART: [art] Store priv key in slot 0x5
4,585,241 UART: [art] Derive Key Pair - Done
4,600,305 UART: [art] Signing Cert with AUTHO
4,600,785 UART: RITY.KEYID = 7
4,616,069 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,834 UART: [art] PUB.X = 474CDAF5C4B01A95A05C87A55FF7121B7D77BED45A105829590BF90BB0A536708FF2EC8A4DFA4301228192AD73F51880
4,623,601 UART: [art] PUB.Y = A52C623921D2305B1955BECF83FF99C96F7A44167372E03AFF45ECF95111CAEAE235B509DE8E23E52999A2F4DE48A4C1
4,630,558 UART: [art] SIG.R = C518D0AB94E662FF895E123170D18306EEC959144843061883E0CB9392D03A9A2F6CFB1E5D94CA25F273C211E9088C55
4,637,317 UART: [art] SIG.S = 4D0CDA1C631E5FDD0600FAA37441CAFA885FD8DB7B007BB950EB333CB4AFE6CB6E528F830A9D9E19BA1CB17A94EC6602
4,661,542 UART: Caliptra RT
4,661,887 UART: [state] CFI Enabled
4,944,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,946,441 UART:
4,946,457 UART: Running Caliptra ROM ...
4,946,865 UART:
4,947,007 UART: [state] CFI Enabled
4,949,935 UART: [state] LifecycleState = Unprovisioned
4,950,590 UART: [state] DebugLocked = No
4,951,218 UART: [state] WD Timer not started. Device not locked for debugging
4,952,550 UART: [kat] SHA2-256
5,756,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,760,229 UART: [kat] ++
5,760,381 UART: [kat] sha1
5,764,623 UART: [kat] SHA2-256
5,766,563 UART: [kat] SHA2-384
5,769,330 UART: [kat] SHA2-512-ACC
5,771,230 UART: [kat] ECC-384
5,780,955 UART: [kat] HMAC-384Kdf
5,785,607 UART: [kat] LMS
6,033,919 UART: [kat] --
6,034,439 UART: [update-reset] ++
7,343,694 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,344,761 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,494,213 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,054 >>> mbox cmd response: success
2,618,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,681,376 UART:
2,681,392 UART: Running Caliptra FMC ...
2,681,800 UART:
2,681,943 UART: [state] CFI Enabled
2,692,398 UART: [fht] FMC Alias Private Key: 7
2,800,779 UART: [art] Extend RT PCRs Done
2,801,207 UART: [art] Lock RT PCRs Done
2,802,623 UART: [art] Populate DV Done
2,810,806 UART: [fht] FMC Alias Private Key: 7
2,811,790 UART: [art] Derive CDI
2,812,070 UART: [art] Store in in slot 0x4
2,897,497 UART: [art] Derive Key Pair
2,897,857 UART: [art] Store priv key in slot 0x5
2,910,789 UART: [art] Derive Key Pair - Done
2,925,402 UART: [art] Signing Cert with AUTHO
2,925,882 UART: RITY.KEYID = 7
2,941,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,813 UART: [art] PUB.X = 968615D9A65124B9265F92DADF44385F62DA9CB576539DA339FF595E4BC9E106EDA979FCB3A951C85CE23216CD49D40A
2,948,585 UART: [art] PUB.Y = 12980F53F3D1869D7ACBE41D0D1167E7710CE1B6FF97D7B019F952C3EFD52990A08582B40F08ED628CEEB359AEC0CFED
2,955,536 UART: [art] SIG.R = 1A98984FDC757A3568A4C4BAD458D70A6CECD179E9CF0F08223908618DA2BC2570E28E55F280E7AD6E4351C7997CD000
2,962,278 UART: [art] SIG.S = F9A33338BDF34C1E9D0454E4CF8FD368BA6959BF4AAE9BE873ACD5F9103947FE25673435D5E4847DE8F8DB53719CC98F
2,985,888 UART: Caliptra RT
2,986,233 UART: [state] CFI Enabled
3,093,992 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,509 >>> mbox cmd response: failed
4,082,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,088,272 UART:
4,088,288 UART: Running Caliptra FMC ...
4,088,696 UART:
4,088,839 UART: [state] CFI Enabled
4,178,262 UART: [art] Extend RT PCRs Done
4,178,690 UART: [art] Lock RT PCRs Done
4,179,641 UART: [art] Populate DV Done
4,187,874 UART: [fht] FMC Alias Private Key: 7
4,188,848 UART: [art] Derive CDI
4,189,128 UART: [art] Store in in slot 0x4
4,274,873 UART: [art] Derive Key Pair
4,275,233 UART: [art] Store priv key in slot 0x5
4,288,363 UART: [art] Derive Key Pair - Done
4,303,362 UART: [art] Signing Cert with AUTHO
4,303,842 UART: RITY.KEYID = 7
4,319,394 UART: [art] Erasing AUTHORITY.KEYID = 7
4,320,159 UART: [art] PUB.X = 968615D9A65124B9265F92DADF44385F62DA9CB576539DA339FF595E4BC9E106EDA979FCB3A951C85CE23216CD49D40A
4,326,931 UART: [art] PUB.Y = 12980F53F3D1869D7ACBE41D0D1167E7710CE1B6FF97D7B019F952C3EFD52990A08582B40F08ED628CEEB359AEC0CFED
4,333,882 UART: [art] SIG.R = 1A98984FDC757A3568A4C4BAD458D70A6CECD179E9CF0F08223908618DA2BC2570E28E55F280E7AD6E4351C7997CD000
4,340,624 UART: [art] SIG.S = F9A33338BDF34C1E9D0454E4CF8FD368BA6959BF4AAE9BE873ACD5F9103947FE25673435D5E4847DE8F8DB53719CC98F
4,364,258 UART: Caliptra RT
4,364,603 UART: [state] CFI Enabled
4,648,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,081,132 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,106 UART:
192,470 UART: Running Caliptra ROM ...
193,632 UART:
193,778 UART: [state] CFI Enabled
260,529 UART: [state] LifecycleState = Unprovisioned
262,479 UART: [state] DebugLocked = No
264,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,061 UART: [kat] SHA2-256
438,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,256 UART: [kat] ++
449,731 UART: [kat] sha1
460,179 UART: [kat] SHA2-256
462,871 UART: [kat] SHA2-384
469,924 UART: [kat] SHA2-512-ACC
472,276 UART: [kat] ECC-384
2,761,659 UART: [kat] HMAC-384Kdf
2,793,761 UART: [kat] LMS
3,984,059 UART: [kat] --
3,989,222 UART: [cold-reset] ++
3,990,622 UART: [fht] Storing FHT @ 0x50003400
4,001,244 UART: [idev] ++
4,001,828 UART: [idev] CDI.KEYID = 6
4,002,744 UART: [idev] SUBJECT.KEYID = 7
4,003,962 UART: [idev] UDS.KEYID = 0
4,006,725 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,150,012 UART: [idev] Erasing UDS.KEYID = 0
7,336,254 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,509 UART: [idev] --
7,362,861 UART: [ldev] ++
7,363,441 UART: [ldev] CDI.KEYID = 6
7,364,407 UART: [ldev] SUBJECT.KEYID = 5
7,365,624 UART: [ldev] AUTHORITY.KEYID = 7
7,366,862 UART: [ldev] FE.KEYID = 1
7,395,077 UART: [ldev] Erasing FE.KEYID = 1
10,725,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,227 UART: [ldev] --
13,088,421 UART: [fwproc] Waiting for Commands...
13,091,659 UART: [fwproc] Received command 0x46574c44
13,093,851 UART: [fwproc] Received Image of size 113760 bytes
17,139,620 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,216,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,382 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,600,866 >>> mbox cmd response: success
17,602,873 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,746,080 UART: [afmc] ++
17,746,722 UART: [afmc] CDI.KEYID = 6
17,747,667 UART: [afmc] SUBJECT.KEYID = 7
17,748,777 UART: [afmc] AUTHORITY.KEYID = 5
20,980,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,278,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,280,339 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,294,890 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,309,695 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,323,963 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,345,849 UART: [afmc] --
23,350,127 UART: [cold-reset] --
23,353,398 UART: [state] Locking Datavault
23,359,566 UART: [state] Locking PCR0, PCR1 and PCR31
23,361,276 UART: [state] Locking ICCM
23,363,208 UART: [exit] Launching FMC @ 0x40000130
23,371,606 UART:
23,371,844 UART: Running Caliptra FMC ...
23,372,966 UART:
23,373,125 UART: [state] CFI Enabled
23,438,003 UART: [fht] FMC Alias Private Key: 7
25,776,417 UART: [art] Extend RT PCRs Done
25,777,636 UART: [art] Lock RT PCRs Done
25,779,128 UART: [art] Populate DV Done
25,784,380 UART: [fht] FMC Alias Private Key: 7
25,785,972 UART: [art] Derive CDI
25,786,785 UART: [art] Store in in slot 0x4
25,845,888 UART: [art] Derive Key Pair
25,846,922 UART: [art] Store priv key in slot 0x5
29,139,901 UART: [art] Derive Key Pair - Done
29,153,067 UART: [art] Signing Cert with AUTHO
29,154,374 UART: RITY.KEYID = 7
31,441,664 UART: [art] Erasing AUTHORITY.KEYID = 7
31,443,169 UART: [art] PUB.X = E2CEB9E918A07220E3DB8770439E3886DD4F69351ACEC3D930043738721486B2BC434D038847AA53434452A5F5AEBE44
31,450,398 UART: [art] PUB.Y = BE9684EA1330A0B0E20CC39240568F6D927D93CF3A7EE42B303685215547B173CF81855C2925C658342735D1C30BF854
31,457,600 UART: [art] SIG.R = 2F4EAA5AB095443130ED7E52985D644B12EE8C3D21E2A8268C45102ECBF9BF5B6AF8DB94151B152F15747A6944D15C8C
31,465,011 UART: [art] SIG.S = E3EDF0AF459013E8FDDF82B9C1381E4FF0DC12DA50D71C9C720F4DEB213F8FC4A8968E0A6167ACA851D9C55605581811
32,770,330 UART: Caliptra RT
32,771,023 UART: [state] CFI Enabled
32,931,856 UART: [rt] RT listening for mailbox commands...
32,935,193 UART:
32,935,362 UART: Running Caliptra ROM ...
32,936,380 UART:
32,936,527 UART: [state] CFI Enabled
33,001,838 UART: [state] LifecycleState = Unprovisioned
33,003,764 UART: [state] DebugLocked = No
33,005,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,009,900 UART: [kat] SHA2-256
33,179,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,190,140 UART: [kat] ++
33,190,701 UART: [kat] sha1
33,201,224 UART: [kat] SHA2-256
33,203,922 UART: [kat] SHA2-384
33,208,667 UART: [kat] SHA2-512-ACC
33,211,011 UART: [kat] ECC-384
35,501,746 UART: [kat] HMAC-384Kdf
35,513,365 UART: [kat] LMS
36,703,670 UART: [kat] --
36,706,705 UART: [update-reset] ++
36,813,552 >>> mbox cmd response: failed
36,815,329 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,958,480 UART: ROM Non-Fatal Error: 0x000B001E
36,959,897 UART: [state] Locking Datavault
36,961,055 UART: [state] Locking PCR0, PCR1 and PCR31
36,962,600 UART: [state] Locking ICCM
36,963,509 UART: [exit] Launching FMC @ 0x40000130
36,964,954 UART:
36,965,113 UART: Running Caliptra FMC ...
36,966,212 UART:
36,966,373 UART: [state] CFI Enabled
36,967,293 UART: [art] Extend RT PCRs Done
36,968,434 UART: [art] Lock RT PCRs Done
36,969,501 UART: [art] Populate DV Done
36,970,536 UART: [fht] FMC Alias Private Key: 7
36,971,856 UART: [art] Derive CDI
36,972,592 UART: [art] Store in in slot 0x4
37,004,119 UART: [art] Derive Key Pair
37,005,118 UART: [art] Store priv key in slot 0x5
40,298,223 UART: [art] Derive Key Pair - Done
40,311,443 UART: [art] Signing Cert with AUTHO
40,312,781 UART: RITY.KEYID = 7
42,599,534 UART: [art] Erasing AUTHORITY.KEYID = 7
42,601,060 UART: [art] PUB.X = E2CEB9E918A07220E3DB8770439E3886DD4F69351ACEC3D930043738721486B2BC434D038847AA53434452A5F5AEBE44
42,608,263 UART: [art] PUB.Y = BE9684EA1330A0B0E20CC39240568F6D927D93CF3A7EE42B303685215547B173CF81855C2925C658342735D1C30BF854
42,615,463 UART: [art] SIG.R = 2F4EAA5AB095443130ED7E52985D644B12EE8C3D21E2A8268C45102ECBF9BF5B6AF8DB94151B152F15747A6944D15C8C
42,622,828 UART: [art] SIG.S = E3EDF0AF459013E8FDDF82B9C1381E4FF0DC12DA50D71C9C720F4DEB213F8FC4A8968E0A6167ACA851D9C55605581811
43,927,734 UART: Caliptra RT
43,928,456 UART: [state] CFI Enabled
44,264,934 UART: [rt] RT listening for mailbox commands...
44,267,572 UART:
44,267,768 UART: Running Caliptra ROM ...
44,268,813 UART:
44,268,962 UART: [state] CFI Enabled
44,327,622 UART: [state] LifecycleState = Unprovisioned
44,329,606 UART: [state] DebugLocked = No
44,331,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,336,490 UART: [kat] SHA2-256
44,506,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,516,691 UART: [kat] ++
44,517,171 UART: [kat] sha1
44,528,001 UART: [kat] SHA2-256
44,530,704 UART: [kat] SHA2-384
44,536,911 UART: [kat] SHA2-512-ACC
44,539,263 UART: [kat] ECC-384
46,830,528 UART: [kat] HMAC-384Kdf
46,841,369 UART: [kat] LMS
48,031,719 UART: [kat] --
48,037,222 UART: [update-reset] ++
52,168,048 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,172,493 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
52,553,461 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,808,189 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,102 >>> mbox cmd response: success
17,885,995 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,568,268 UART:
23,568,678 UART: Running Caliptra FMC ...
23,569,786 UART:
23,569,943 UART: [state] CFI Enabled
23,637,036 UART: [fht] FMC Alias Private Key: 7
25,974,890 UART: [art] Extend RT PCRs Done
25,976,117 UART: [art] Lock RT PCRs Done
25,977,859 UART: [art] Populate DV Done
25,983,382 UART: [fht] FMC Alias Private Key: 7
25,985,089 UART: [art] Derive CDI
25,985,927 UART: [art] Store in in slot 0x4
26,045,601 UART: [art] Derive Key Pair
26,046,647 UART: [art] Store priv key in slot 0x5
29,339,975 UART: [art] Derive Key Pair - Done
29,353,195 UART: [art] Signing Cert with AUTHO
29,354,507 UART: RITY.KEYID = 7
31,641,669 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,173 UART: [art] PUB.X = 410C39FF3CD22665A9E3C4D9984BEE738569BF598B2CCDD3860058FE93CB01B59701C8B11839068489BB0A44DB0E659D
31,650,411 UART: [art] PUB.Y = 0AC8DF0296208E25A44A6DBBF346BD658C0168EF397E31FBB3CA2CBDE5BBFC634053B1CB01B3F9833B062650BEC63BFE
31,657,665 UART: [art] SIG.R = 3BAB4CA858FBE6193948A62F954E10DB6299975F01B825A9F31655829DDE68B1ACBB7376FBAB1FF19A977ADA121A83B6
31,665,099 UART: [art] SIG.S = 030458DC8A7B4B5E215E2B9D97A28111CD774B8A9FCF013F111FDEB0DBA38CA528A23E8D3EECCB64E59DE99336FF4F98
32,970,666 UART: Caliptra RT
32,971,419 UART: [state] CFI Enabled
33,133,447 UART: [rt] RT listening for mailbox commands...
36,851,684 >>> mbox cmd response: failed
36,853,445 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,996,637 UART:
36,996,942 UART: Running Caliptra FMC ...
36,998,063 UART:
36,998,232 UART: [state] CFI Enabled
36,999,156 UART: [art] Extend RT PCRs Done
37,000,296 UART: [art] Lock RT PCRs Done
37,001,369 UART: [art] Populate DV Done
37,002,484 UART: [fht] FMC Alias Private Key: 7
37,003,820 UART: [art] Derive CDI
37,004,557 UART: [art] Store in in slot 0x4
37,033,927 UART: [art] Derive Key Pair
37,034,932 UART: [art] Store priv key in slot 0x5
40,327,393 UART: [art] Derive Key Pair - Done
40,340,321 UART: [art] Signing Cert with AUTHO
40,341,635 UART: RITY.KEYID = 7
42,629,297 UART: [art] Erasing AUTHORITY.KEYID = 7
42,630,818 UART: [art] PUB.X = 410C39FF3CD22665A9E3C4D9984BEE738569BF598B2CCDD3860058FE93CB01B59701C8B11839068489BB0A44DB0E659D
42,638,017 UART: [art] PUB.Y = 0AC8DF0296208E25A44A6DBBF346BD658C0168EF397E31FBB3CA2CBDE5BBFC634053B1CB01B3F9833B062650BEC63BFE
42,645,351 UART: [art] SIG.R = 3BAB4CA858FBE6193948A62F954E10DB6299975F01B825A9F31655829DDE68B1ACBB7376FBAB1FF19A977ADA121A83B6
42,652,764 UART: [art] SIG.S = 030458DC8A7B4B5E215E2B9D97A28111CD774B8A9FCF013F111FDEB0DBA38CA528A23E8D3EECCB64E59DE99336FF4F98
43,958,053 UART: Caliptra RT
43,958,769 UART: [state] CFI Enabled
44,289,980 UART: [rt] RT listening for mailbox commands...
52,872,763 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,560 UART:
192,912 UART: Running Caliptra ROM ...
194,097 UART:
603,707 UART: [state] CFI Enabled
621,898 UART: [state] LifecycleState = Unprovisioned
623,809 UART: [state] DebugLocked = No
625,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,846 UART: [kat] SHA2-256
799,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,130 UART: [kat] ++
810,578 UART: [kat] sha1
821,077 UART: [kat] SHA2-256
823,831 UART: [kat] SHA2-384
829,211 UART: [kat] SHA2-512-ACC
831,603 UART: [kat] ECC-384
3,114,434 UART: [kat] HMAC-384Kdf
3,125,325 UART: [kat] LMS
4,315,440 UART: [kat] --
4,321,335 UART: [cold-reset] ++
4,322,819 UART: [fht] Storing FHT @ 0x50003400
4,334,647 UART: [idev] ++
4,335,213 UART: [idev] CDI.KEYID = 6
4,336,150 UART: [idev] SUBJECT.KEYID = 7
4,337,382 UART: [idev] UDS.KEYID = 0
4,340,246 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,320 UART: [idev] Erasing UDS.KEYID = 0
7,621,683 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,811 UART: [idev] --
7,646,991 UART: [ldev] ++
7,647,558 UART: [ldev] CDI.KEYID = 6
7,648,497 UART: [ldev] SUBJECT.KEYID = 5
7,649,710 UART: [ldev] AUTHORITY.KEYID = 7
7,650,997 UART: [ldev] FE.KEYID = 1
7,662,700 UART: [ldev] Erasing FE.KEYID = 1
10,952,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,896 UART: [ldev] --
13,313,380 UART: [fwproc] Waiting for Commands...
13,315,686 UART: [fwproc] Received command 0x46574c44
13,317,867 UART: [fwproc] Received Image of size 113760 bytes
17,354,798 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,427,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,496,368 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,813,252 >>> mbox cmd response: success
17,815,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,958,297 UART: [afmc] ++
17,958,935 UART: [afmc] CDI.KEYID = 6
17,959,860 UART: [afmc] SUBJECT.KEYID = 7
17,960,968 UART: [afmc] AUTHORITY.KEYID = 5
21,139,001 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,695 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,449,241 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,464,004 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,478,268 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,498,712 UART: [afmc] --
23,501,812 UART: [cold-reset] --
23,504,427 UART: [state] Locking Datavault
23,510,749 UART: [state] Locking PCR0, PCR1 and PCR31
23,512,509 UART: [state] Locking ICCM
23,514,708 UART: [exit] Launching FMC @ 0x40000130
23,523,111 UART:
23,523,385 UART: Running Caliptra FMC ...
23,524,496 UART:
23,524,659 UART: [state] CFI Enabled
23,532,572 UART: [fht] FMC Alias Private Key: 7
25,863,494 UART: [art] Extend RT PCRs Done
25,864,713 UART: [art] Lock RT PCRs Done
25,866,596 UART: [art] Populate DV Done
25,871,897 UART: [fht] FMC Alias Private Key: 7
25,873,593 UART: [art] Derive CDI
25,874,406 UART: [art] Store in in slot 0x4
25,916,888 UART: [art] Derive Key Pair
25,918,082 UART: [art] Store priv key in slot 0x5
29,159,615 UART: [art] Derive Key Pair - Done
29,172,563 UART: [art] Signing Cert with AUTHO
29,173,872 UART: RITY.KEYID = 7
31,453,717 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,218 UART: [art] PUB.X = FBF312BE1F632071762E522081D12ACF5C594974FEF7B761F20054E40D27907C746A9FB7A11ECE22B4E253396D3550C1
31,462,444 UART: [art] PUB.Y = 373DA521426931E551C7B1906D788A4A3FFB6CE7A363ECB02D3CD63A3C41AD46E51F1CF8C5C3BF843DDB9176F43D200C
31,469,732 UART: [art] SIG.R = 3D40CD10246EDDAF6D712B8F23151BF21EF22E43CB95ED8F45DAE09DF05A74B8CBFDF67A1E76559DCFD762517BD356ED
31,477,125 UART: [art] SIG.S = 8C634F6E7B19193369391614DC2A83E30F149F564EE1243AC46F2617719068D9095DA10BC63C3A3367123CD81D3CE16B
32,782,390 UART: Caliptra RT
32,783,105 UART: [state] CFI Enabled
32,901,227 UART: [rt] RT listening for mailbox commands...
32,903,908 UART:
32,904,158 UART: Running Caliptra ROM ...
32,905,263 UART:
32,905,529 UART: [state] CFI Enabled
32,920,491 UART: [state] LifecycleState = Unprovisioned
32,922,423 UART: [state] DebugLocked = No
32,925,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,930,358 UART: [kat] SHA2-256
33,100,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,110,618 UART: [kat] ++
33,111,156 UART: [kat] sha1
33,121,350 UART: [kat] SHA2-256
33,124,027 UART: [kat] SHA2-384
33,130,619 UART: [kat] SHA2-512-ACC
33,132,964 UART: [kat] ECC-384
35,417,296 UART: [kat] HMAC-384Kdf
35,429,028 UART: [kat] LMS
36,619,078 UART: [kat] --
36,623,675 UART: [update-reset] ++
36,730,271 >>> mbox cmd response: failed
36,731,966 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,875,170 UART: ROM Non-Fatal Error: 0x000B001E
36,876,604 UART: [state] Locking Datavault
36,878,234 UART: [state] Locking PCR0, PCR1 and PCR31
36,879,795 UART: [state] Locking ICCM
36,880,681 UART: [exit] Launching FMC @ 0x40000130
36,882,018 UART:
36,882,166 UART: Running Caliptra FMC ...
36,883,275 UART:
36,883,431 UART: [state] CFI Enabled
36,884,261 UART: [art] Extend RT PCRs Done
36,885,386 UART: [art] Lock RT PCRs Done
36,886,370 UART: [art] Populate DV Done
36,887,340 UART: [fht] FMC Alias Private Key: 7
36,888,667 UART: [art] Derive CDI
36,889,430 UART: [art] Store in in slot 0x4
36,890,602 UART: [art] Derive Key Pair
36,891,595 UART: [art] Store priv key in slot 0x5
40,093,237 UART: [art] Derive Key Pair - Done
40,106,418 UART: [art] Signing Cert with AUTHO
40,107,830 UART: RITY.KEYID = 7
42,387,186 UART: [art] Erasing AUTHORITY.KEYID = 7
42,388,703 UART: [art] PUB.X = FBF312BE1F632071762E522081D12ACF5C594974FEF7B761F20054E40D27907C746A9FB7A11ECE22B4E253396D3550C1
42,395,926 UART: [art] PUB.Y = 373DA521426931E551C7B1906D788A4A3FFB6CE7A363ECB02D3CD63A3C41AD46E51F1CF8C5C3BF843DDB9176F43D200C
42,403,223 UART: [art] SIG.R = 3D40CD10246EDDAF6D712B8F23151BF21EF22E43CB95ED8F45DAE09DF05A74B8CBFDF67A1E76559DCFD762517BD356ED
42,410,634 UART: [art] SIG.S = 8C634F6E7B19193369391614DC2A83E30F149F564EE1243AC46F2617719068D9095DA10BC63C3A3367123CD81D3CE16B
43,715,457 UART: Caliptra RT
43,716,187 UART: [state] CFI Enabled
44,004,660 UART: [rt] RT listening for mailbox commands...
44,007,143 UART:
44,007,320 UART: Running Caliptra ROM ...
44,008,344 UART:
44,008,825 UART: [state] CFI Enabled
44,024,070 UART: [state] LifecycleState = Unprovisioned
44,026,020 UART: [state] DebugLocked = No
44,028,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,034,078 UART: [kat] SHA2-256
44,203,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,214,333 UART: [kat] ++
44,214,790 UART: [kat] sha1
44,225,566 UART: [kat] SHA2-256
44,228,303 UART: [kat] SHA2-384
44,234,120 UART: [kat] SHA2-512-ACC
44,236,482 UART: [kat] ECC-384
46,520,198 UART: [kat] HMAC-384Kdf
46,533,010 UART: [kat] LMS
47,723,083 UART: [kat] --
47,728,385 UART: [update-reset] ++
51,855,181 UART: [update-reset] Image verified using Vendor ECC Key Index 3
51,858,148 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
52,239,150 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,127,384 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,047,490 >>> mbox cmd response: success
18,049,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,685,551 UART:
23,685,995 UART: Running Caliptra FMC ...
23,687,142 UART:
23,687,307 UART: [state] CFI Enabled
23,695,089 UART: [fht] FMC Alias Private Key: 7
26,026,417 UART: [art] Extend RT PCRs Done
26,027,655 UART: [art] Lock RT PCRs Done
26,029,230 UART: [art] Populate DV Done
26,034,661 UART: [fht] FMC Alias Private Key: 7
26,036,208 UART: [art] Derive CDI
26,036,974 UART: [art] Store in in slot 0x4
26,079,633 UART: [art] Derive Key Pair
26,080,682 UART: [art] Store priv key in slot 0x5
29,323,092 UART: [art] Derive Key Pair - Done
29,336,045 UART: [art] Signing Cert with AUTHO
29,337,379 UART: RITY.KEYID = 7
31,616,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,394 UART: [art] PUB.X = FDE00C714ED494AB58977393BCBACEA487845EB2D683FB3B1CABD048AC05E48BF1130F99596E6F2FB5F8280A24FF1200
31,625,648 UART: [art] PUB.Y = D8F78B622BDE141A66F636D36320D279B1254B0585B2F0945BE88AC4FE41D424F5849FC864BE4017EE48F7B76A9D6533
31,632,916 UART: [art] SIG.R = 3BC6DD4F0EAB11872379C589FD9FE3B48737B9790066478C43575662D8C42FE16B58B992363A11D3D484185DE40D4143
31,640,298 UART: [art] SIG.S = CD26FE0771A9AF5BCBF50C5234F936E57C360F171AE137202DD7F941EFAE4B9D21B51E1629C550E5CAC41637E0ECA34B
32,945,285 UART: Caliptra RT
32,945,975 UART: [state] CFI Enabled
33,065,320 UART: [rt] RT listening for mailbox commands...
36,705,448 >>> mbox cmd response: failed
36,707,221 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
36,850,078 UART:
36,850,402 UART: Running Caliptra FMC ...
36,851,468 UART:
36,851,625 UART: [state] CFI Enabled
36,852,553 UART: [art] Extend RT PCRs Done
36,853,714 UART: [art] Lock RT PCRs Done
36,854,784 UART: [art] Populate DV Done
36,855,878 UART: [fht] FMC Alias Private Key: 7
36,857,196 UART: [art] Derive CDI
36,857,929 UART: [art] Store in in slot 0x4
36,859,097 UART: [art] Derive Key Pair
36,860,041 UART: [art] Store priv key in slot 0x5
40,058,170 UART: [art] Derive Key Pair - Done
40,071,187 UART: [art] Signing Cert with AUTHO
40,072,510 UART: RITY.KEYID = 7
42,351,785 UART: [art] Erasing AUTHORITY.KEYID = 7
42,353,299 UART: [art] PUB.X = FDE00C714ED494AB58977393BCBACEA487845EB2D683FB3B1CABD048AC05E48BF1130F99596E6F2FB5F8280A24FF1200
42,360,558 UART: [art] PUB.Y = D8F78B622BDE141A66F636D36320D279B1254B0585B2F0945BE88AC4FE41D424F5849FC864BE4017EE48F7B76A9D6533
42,367,792 UART: [art] SIG.R = 3BC6DD4F0EAB11872379C589FD9FE3B48737B9790066478C43575662D8C42FE16B58B992363A11D3D484185DE40D4143
42,375,137 UART: [art] SIG.S = CD26FE0771A9AF5BCBF50C5234F936E57C360F171AE137202DD7F941EFAE4B9D21B51E1629C550E5CAC41637E0ECA34B
43,679,902 UART: Caliptra RT
43,680,641 UART: [state] CFI Enabled
43,973,886 UART: [rt] RT listening for mailbox commands...
52,484,149 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,217 UART:
192,584 UART: Running Caliptra ROM ...
193,720 UART:
193,884 UART: [state] CFI Enabled
259,672 UART: [state] LifecycleState = Unprovisioned
261,594 UART: [state] DebugLocked = No
263,351 UART: [state] WD Timer not started. Device not locked for debugging
267,055 UART: [kat] SHA2-256
446,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,738 UART: [kat] ++
458,274 UART: [kat] sha1
469,591 UART: [kat] SHA2-256
472,647 UART: [kat] SHA2-384
477,711 UART: [kat] SHA2-512-ACC
480,644 UART: [kat] ECC-384
2,944,164 UART: [kat] HMAC-384Kdf
2,968,236 UART: [kat] LMS
3,497,666 UART: [kat] --
3,501,034 UART: [cold-reset] ++
3,502,072 UART: [fht] FHT @ 0x50003400
3,512,461 UART: [idev] ++
3,513,035 UART: [idev] CDI.KEYID = 6
3,514,001 UART: [idev] SUBJECT.KEYID = 7
3,515,160 UART: [idev] UDS.KEYID = 0
3,518,105 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,661,808 UART: [idev] Erasing UDS.KEYID = 0
6,022,809 UART: [idev] Sha1 KeyId Algorithm
6,046,599 UART: [idev] --
6,051,362 UART: [ldev] ++
6,051,940 UART: [ldev] CDI.KEYID = 6
6,052,857 UART: [ldev] SUBJECT.KEYID = 5
6,054,016 UART: [ldev] AUTHORITY.KEYID = 7
6,055,424 UART: [ldev] FE.KEYID = 1
6,095,279 UART: [ldev] Erasing FE.KEYID = 1
8,597,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,135 UART: [ldev] --
10,388,598 UART: [fwproc] Wait for Commands...
10,390,696 UART: [fwproc] Recv command 0x46574c44
10,392,749 UART: [fwproc] Recv'd Img size: 114084 bytes
13,789,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,861,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,930,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,248,159 >>> mbox cmd response: success
14,250,092 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,393,649 UART: [afmc] ++
14,394,283 UART: [afmc] CDI.KEYID = 6
14,395,202 UART: [afmc] SUBJECT.KEYID = 7
14,396,329 UART: [afmc] AUTHORITY.KEYID = 5
16,781,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,544 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,524,487 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,540,333 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,556,109 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,578,516 UART: [afmc] --
18,582,916 UART: [cold-reset] --
18,585,854 UART: [state] Locking Datavault
18,591,857 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,509 UART: [state] Locking ICCM
18,595,226 UART: [exit] Launching FMC @ 0x40000130
18,603,627 UART:
18,603,860 UART: Running Caliptra FMC ...
18,604,962 UART:
18,605,145 UART: [state] CFI Enabled
18,666,408 UART: [fht] FMC Alias Private Key: 7
20,430,147 UART: [art] Extend RT PCRs Done
20,431,394 UART: [art] Lock RT PCRs Done
20,433,209 UART: [art] Populate DV Done
20,438,780 UART: [fht] FMC Alias Private Key: 7
20,440,434 UART: [art] Derive CDI
20,441,252 UART: [art] Store in in slot 0x4
20,498,981 UART: [art] Derive Key Pair
20,500,021 UART: [art] Store priv key in slot 0x5
22,962,744 UART: [art] Derive Key Pair - Done
22,975,423 UART: [art] Signing Cert with AUTHO
22,976,734 UART: RITY.KEYID = 7
24,688,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,843 UART: [art] PUB.X = C7C9589E4BD2861C0E3664E78240E09A649887FF9ABA370FEDEE8D1E2C86BF164FE38289E6D2953C1A9B6567370D8468
24,697,172 UART: [art] PUB.Y = B76499B7D0C601D0115C65E65303DF3A41653288D8DCC3E48DCDD4552C0908E1F7E10DB5D8CF078B8447B7EA33345753
24,704,377 UART: [art] SIG.R = 333A691E6586E5C243B4DF3688964F9632A9B2D9DA97089FA53072BFB6F94171A9F274AB5ECF0B1809CBC4C151F4ABBC
24,711,767 UART: [art] SIG.S = 46C16AF352670FC8D9C8928236FC23725A92D67CA12A54596C3932FA4D68F5C9106C6321613B0A14390620A9F0591D40
25,690,559 UART: Caliptra RT
25,691,248 UART: [state] CFI Enabled
25,856,386 UART: [rt] RT listening for mailbox commands...
25,859,665 UART:
25,859,916 UART: Running Caliptra ROM ...
25,861,018 UART:
25,861,176 UART: [state] CFI Enabled
25,924,629 UART: [state] LifecycleState = Unprovisioned
25,926,498 UART: [state] DebugLocked = No
25,929,075 UART: [state] WD Timer not started. Device not locked for debugging
25,932,286 UART: [kat] SHA2-256
26,111,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,122,983 UART: [kat] ++
26,123,525 UART: [kat] sha1
26,134,869 UART: [kat] SHA2-256
26,137,912 UART: [kat] SHA2-384
26,143,593 UART: [kat] SHA2-512-ACC
26,146,547 UART: [kat] ECC-384
28,607,068 UART: [kat] HMAC-384Kdf
28,631,956 UART: [kat] LMS
29,161,377 UART: [kat] --
29,165,308 UART: [update-reset] ++
29,210,331 >>> mbox cmd response: failed
29,212,196 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,355,765 UART: ROM Non-Fatal Error: 0x000B001E
29,357,198 UART: [state] Locking Datavault
29,358,355 UART: [state] Locking PCR0, PCR1 and PCR31
29,359,898 UART: [state] Locking ICCM
29,360,809 UART: [exit] Launching FMC @ 0x40000130
29,362,234 UART:
29,362,411 UART: Running Caliptra FMC ...
29,363,513 UART:
29,363,670 UART: [state] CFI Enabled
29,364,506 UART: [art] Extend RT PCRs Done
29,365,555 UART: [art] Lock RT PCRs Done
29,366,615 UART: [art] Populate DV Done
29,367,647 UART: [fht] FMC Alias Private Key: 7
29,368,964 UART: [art] Derive CDI
29,369,700 UART: [art] Store in in slot 0x4
29,396,147 UART: [art] Derive Key Pair
29,397,153 UART: [art] Store priv key in slot 0x5
31,859,433 UART: [art] Derive Key Pair - Done
31,872,219 UART: [art] Signing Cert with AUTHO
31,873,526 UART: RITY.KEYID = 7
33,585,225 UART: [art] Erasing AUTHORITY.KEYID = 7
33,586,733 UART: [art] PUB.X = C7C9589E4BD2861C0E3664E78240E09A649887FF9ABA370FEDEE8D1E2C86BF164FE38289E6D2953C1A9B6567370D8468
33,593,995 UART: [art] PUB.Y = B76499B7D0C601D0115C65E65303DF3A41653288D8DCC3E48DCDD4552C0908E1F7E10DB5D8CF078B8447B7EA33345753
33,601,221 UART: [art] SIG.R = 333A691E6586E5C243B4DF3688964F9632A9B2D9DA97089FA53072BFB6F94171A9F274AB5ECF0B1809CBC4C151F4ABBC
33,608,650 UART: [art] SIG.S = 46C16AF352670FC8D9C8928236FC23725A92D67CA12A54596C3932FA4D68F5C9106C6321613B0A14390620A9F0591D40
34,587,021 UART: Caliptra RT
34,587,738 UART: [state] CFI Enabled
34,923,700 UART: [rt] RT listening for mailbox commands...
34,926,492 UART:
34,926,744 UART: Running Caliptra ROM ...
34,927,848 UART:
34,928,003 UART: [state] CFI Enabled
34,991,655 UART: [state] LifecycleState = Unprovisioned
34,993,523 UART: [state] DebugLocked = No
34,995,123 UART: [state] WD Timer not started. Device not locked for debugging
34,999,451 UART: [kat] SHA2-256
35,178,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,190,136 UART: [kat] ++
35,190,694 UART: [kat] sha1
35,201,857 UART: [kat] SHA2-256
35,204,875 UART: [kat] SHA2-384
35,210,533 UART: [kat] SHA2-512-ACC
35,213,525 UART: [kat] ECC-384
37,673,181 UART: [kat] HMAC-384Kdf
37,697,560 UART: [kat] LMS
38,227,022 UART: [kat] --
38,234,247 UART: [update-reset] ++
41,661,878 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,664,554 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
42,046,617 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,373,420 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,051,369 >>> mbox cmd response: success
14,053,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,340,993 UART:
18,341,384 UART: Running Caliptra FMC ...
18,342,528 UART:
18,342,696 UART: [state] CFI Enabled
18,405,619 UART: [fht] FMC Alias Private Key: 7
20,169,101 UART: [art] Extend RT PCRs Done
20,170,331 UART: [art] Lock RT PCRs Done
20,172,013 UART: [art] Populate DV Done
20,177,525 UART: [fht] FMC Alias Private Key: 7
20,179,171 UART: [art] Derive CDI
20,179,988 UART: [art] Store in in slot 0x4
20,238,471 UART: [art] Derive Key Pair
20,239,468 UART: [art] Store priv key in slot 0x5
22,702,336 UART: [art] Derive Key Pair - Done
22,715,455 UART: [art] Signing Cert with AUTHO
22,716,780 UART: RITY.KEYID = 7
24,429,031 UART: [art] Erasing AUTHORITY.KEYID = 7
24,430,543 UART: [art] PUB.X = 74FBEA7A0A583AA4671CBE9FB59478FFB0D80193E7374A96451D33EAB391251803331D46E1FA7F6EB565172B71587269
24,437,778 UART: [art] PUB.Y = E02E81D08B2379D6764B8D7947D45F63F4B4508CD724615ED54148B5653A61A46AFE1E785824DD90E78011F4EEEC5A8D
24,445,028 UART: [art] SIG.R = 664B8157172A185C965618F5E53A4445C633D7ADCEE6BA3A286D534F539A097319CE5C8E5C7778C486473122C0028D12
24,452,410 UART: [art] SIG.S = 4241564612E0B61F9F81F4DC5D2F9858D432D33DD92FFEDB82F6FE1CB649DCA4B5B03279F057F8A765B6A01BC9FBBD8E
25,430,590 UART: Caliptra RT
25,431,299 UART: [state] CFI Enabled
25,597,434 UART: [rt] RT listening for mailbox commands...
28,817,849 >>> mbox cmd response: failed
28,820,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,964,057 UART:
28,964,396 UART: Running Caliptra FMC ...
28,965,435 UART:
28,965,591 UART: [state] CFI Enabled
28,966,520 UART: [art] Extend RT PCRs Done
28,967,679 UART: [art] Lock RT PCRs Done
28,968,750 UART: [art] Populate DV Done
28,970,000 UART: [fht] FMC Alias Private Key: 7
28,971,342 UART: [art] Derive CDI
28,972,082 UART: [art] Store in in slot 0x4
29,006,578 UART: [art] Derive Key Pair
29,007,588 UART: [art] Store priv key in slot 0x5
31,470,586 UART: [art] Derive Key Pair - Done
31,483,131 UART: [art] Signing Cert with AUTHO
31,484,441 UART: RITY.KEYID = 7
33,196,949 UART: [art] Erasing AUTHORITY.KEYID = 7
33,198,465 UART: [art] PUB.X = 74FBEA7A0A583AA4671CBE9FB59478FFB0D80193E7374A96451D33EAB391251803331D46E1FA7F6EB565172B71587269
33,205,668 UART: [art] PUB.Y = E02E81D08B2379D6764B8D7947D45F63F4B4508CD724615ED54148B5653A61A46AFE1E785824DD90E78011F4EEEC5A8D
33,212,894 UART: [art] SIG.R = 664B8157172A185C965618F5E53A4445C633D7ADCEE6BA3A286D534F539A097319CE5C8E5C7778C486473122C0028D12
33,220,285 UART: [art] SIG.S = 4241564612E0B61F9F81F4DC5D2F9858D432D33DD92FFEDB82F6FE1CB649DCA4B5B03279F057F8A765B6A01BC9FBBD8E
34,198,969 UART: Caliptra RT
34,199,689 UART: [state] CFI Enabled
34,537,394 UART: [rt] RT listening for mailbox commands...
41,501,778 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,624 writing to cptra_bootfsm_go
192,850 UART:
193,209 UART: Running Caliptra ROM ...
194,405 UART:
604,086 UART: [state] CFI Enabled
619,757 UART: [state] LifecycleState = Unprovisioned
621,606 UART: [state] DebugLocked = No
624,390 UART: [state] WD Timer not started. Device not locked for debugging
628,204 UART: [kat] SHA2-256
807,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,923 UART: [kat] ++
819,471 UART: [kat] sha1
831,438 UART: [kat] SHA2-256
834,452 UART: [kat] SHA2-384
841,505 UART: [kat] SHA2-512-ACC
844,437 UART: [kat] ECC-384
3,283,701 UART: [kat] HMAC-384Kdf
3,296,039 UART: [kat] LMS
3,825,546 UART: [kat] --
3,829,823 UART: [cold-reset] ++
3,831,550 UART: [fht] FHT @ 0x50003400
3,844,108 UART: [idev] ++
3,844,674 UART: [idev] CDI.KEYID = 6
3,845,636 UART: [idev] SUBJECT.KEYID = 7
3,846,798 UART: [idev] UDS.KEYID = 0
3,849,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,993,356 UART: [idev] Erasing UDS.KEYID = 0
6,318,245 UART: [idev] Sha1 KeyId Algorithm
6,341,083 UART: [idev] --
6,343,615 UART: [ldev] ++
6,344,188 UART: [ldev] CDI.KEYID = 6
6,345,072 UART: [ldev] SUBJECT.KEYID = 5
6,346,297 UART: [ldev] AUTHORITY.KEYID = 7
6,347,530 UART: [ldev] FE.KEYID = 1
6,360,553 UART: [ldev] Erasing FE.KEYID = 1
8,836,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,283 UART: [ldev] --
10,625,153 UART: [fwproc] Wait for Commands...
10,627,473 UART: [fwproc] Recv command 0x46574c44
10,629,589 UART: [fwproc] Recv'd Img size: 114084 bytes
14,024,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,094,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,481,389 >>> mbox cmd response: success
14,483,121 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,626,365 UART: [afmc] ++
14,627,004 UART: [afmc] CDI.KEYID = 6
14,627,900 UART: [afmc] SUBJECT.KEYID = 7
14,629,007 UART: [afmc] AUTHORITY.KEYID = 5
16,991,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,909 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,730,859 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,746,689 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,762,458 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,785,977 UART: [afmc] --
18,790,126 UART: [cold-reset] --
18,794,362 UART: [state] Locking Datavault
18,798,746 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,385 UART: [state] Locking ICCM
18,802,159 UART: [exit] Launching FMC @ 0x40000130
18,810,563 UART:
18,810,797 UART: Running Caliptra FMC ...
18,811,896 UART:
18,812,058 UART: [state] CFI Enabled
18,820,698 UART: [fht] FMC Alias Private Key: 7
20,577,029 UART: [art] Extend RT PCRs Done
20,578,254 UART: [art] Lock RT PCRs Done
20,579,882 UART: [art] Populate DV Done
20,585,563 UART: [fht] FMC Alias Private Key: 7
20,587,163 UART: [art] Derive CDI
20,587,999 UART: [art] Store in in slot 0x4
20,630,822 UART: [art] Derive Key Pair
20,631,861 UART: [art] Store priv key in slot 0x5
23,058,273 UART: [art] Derive Key Pair - Done
23,070,944 UART: [art] Signing Cert with AUTHO
23,072,251 UART: RITY.KEYID = 7
24,777,817 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,320 UART: [art] PUB.X = 2247AA49AE1D5406EE746D84C709B1C975E21EBA853E655218FB444540513932D99673994C8C8D73499B9DE841A455BF
24,786,599 UART: [art] PUB.Y = C351F71AC6B5B3BF9217749B46D3C2D69EAE53BD40641AECB91D44B2007FD21DF85D7400ECA45BFF5677F05694547913
24,793,814 UART: [art] SIG.R = 7781DC4E2F8890512BD0B9A813DA2337AB1FDA2499D4E8CEF6F4244F1979742A836AF1E9FBDBCA0CFC0CA613E82392CB
24,801,196 UART: [art] SIG.S = C0D309BB051B4B1E1883233DC9B194F768F5C60C6F675A26386E326A804C5F357A7BDD1F1BAC4AC822C8B7A0E9E83164
25,779,674 UART: Caliptra RT
25,780,367 UART: [state] CFI Enabled
25,897,707 UART: [rt] RT listening for mailbox commands...
25,900,772 UART:
25,900,941 UART: Running Caliptra ROM ...
25,902,005 UART:
25,902,333 UART: [state] CFI Enabled
25,916,653 UART: [state] LifecycleState = Unprovisioned
25,918,485 UART: [state] DebugLocked = No
25,920,542 UART: [state] WD Timer not started. Device not locked for debugging
25,925,025 UART: [kat] SHA2-256
26,104,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,115,764 UART: [kat] ++
26,116,216 UART: [kat] sha1
26,126,556 UART: [kat] SHA2-256
26,129,572 UART: [kat] SHA2-384
26,135,715 UART: [kat] SHA2-512-ACC
26,138,643 UART: [kat] ECC-384
28,580,123 UART: [kat] HMAC-384Kdf
28,593,098 UART: [kat] LMS
29,122,575 UART: [kat] --
29,124,709 UART: [update-reset] ++
29,173,471 >>> mbox cmd response: failed
29,175,306 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,318,500 UART: ROM Non-Fatal Error: 0x000B001E
29,319,919 UART: [state] Locking Datavault
29,321,072 UART: [state] Locking PCR0, PCR1 and PCR31
29,322,614 UART: [state] Locking ICCM
29,323,527 UART: [exit] Launching FMC @ 0x40000130
29,324,948 UART:
29,325,106 UART: Running Caliptra FMC ...
29,326,204 UART:
29,326,362 UART: [state] CFI Enabled
29,327,279 UART: [art] Extend RT PCRs Done
29,328,412 UART: [art] Lock RT PCRs Done
29,329,477 UART: [art] Populate DV Done
29,330,504 UART: [fht] FMC Alias Private Key: 7
29,331,834 UART: [art] Derive CDI
29,332,570 UART: [art] Store in in slot 0x4
29,334,576 UART: [art] Derive Key Pair
29,335,533 UART: [art] Store priv key in slot 0x5
31,719,642 UART: [art] Derive Key Pair - Done
31,732,535 UART: [art] Signing Cert with AUTHO
31,734,029 UART: RITY.KEYID = 7
33,438,974 UART: [art] Erasing AUTHORITY.KEYID = 7
33,440,466 UART: [art] PUB.X = 2247AA49AE1D5406EE746D84C709B1C975E21EBA853E655218FB444540513932D99673994C8C8D73499B9DE841A455BF
33,447,698 UART: [art] PUB.Y = C351F71AC6B5B3BF9217749B46D3C2D69EAE53BD40641AECB91D44B2007FD21DF85D7400ECA45BFF5677F05694547913
33,454,976 UART: [art] SIG.R = 7781DC4E2F8890512BD0B9A813DA2337AB1FDA2499D4E8CEF6F4244F1979742A836AF1E9FBDBCA0CFC0CA613E82392CB
33,462,346 UART: [art] SIG.S = C0D309BB051B4B1E1883233DC9B194F768F5C60C6F675A26386E326A804C5F357A7BDD1F1BAC4AC822C8B7A0E9E83164
34,441,704 UART: Caliptra RT
34,442,404 UART: [state] CFI Enabled
34,730,757 UART: [rt] RT listening for mailbox commands...
34,733,737 UART:
34,734,028 UART: Running Caliptra ROM ...
34,735,063 UART:
34,735,273 UART: [state] CFI Enabled
40,320,293 UART: [state] LifecycleState = Unprovisioned
40,322,219 UART: [state] DebugLocked = No
40,323,940 UART: [state] WD Timer not started. Device not locked for debugging
40,328,548 UART: [kat] SHA2-256
40,507,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,519,304 UART: [kat] ++
40,519,846 UART: [kat] sha1
40,530,521 UART: [kat] SHA2-256
40,533,538 UART: [kat] SHA2-384
40,539,292 UART: [kat] SHA2-512-ACC
40,542,239 UART: [kat] ECC-384
42,985,105 UART: [kat] HMAC-384Kdf
42,997,050 UART: [kat] LMS
43,526,571 UART: [kat] --
43,531,276 UART: [update-reset] ++
46,954,269 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,956,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,338,813 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,699,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,475 >>> mbox cmd response: success
14,277,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
18,524,110 UART:
18,524,515 UART: Running Caliptra FMC ...
18,525,626 UART:
18,525,789 UART: [state] CFI Enabled
18,533,571 UART: [fht] FMC Alias Private Key: 7
20,290,450 UART: [art] Extend RT PCRs Done
20,291,676 UART: [art] Lock RT PCRs Done
20,293,631 UART: [art] Populate DV Done
20,298,979 UART: [fht] FMC Alias Private Key: 7
20,300,548 UART: [art] Derive CDI
20,301,369 UART: [art] Store in in slot 0x4
20,344,043 UART: [art] Derive Key Pair
20,345,082 UART: [art] Store priv key in slot 0x5
22,771,894 UART: [art] Derive Key Pair - Done
22,784,677 UART: [art] Signing Cert with AUTHO
22,785,987 UART: RITY.KEYID = 7
24,491,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,890 UART: [art] PUB.X = 05DDA8A04E0B871EBE065415399FBDB3EAB2EE21B7DEFD8746FFF0CE9DBDD432CC78AE284CC372CC72140DBBEB366A17
24,500,172 UART: [art] PUB.Y = 17FF8275DD146F2E9CF5AE4BD255DD4FB72D409A07E689B37C3AE0112F05FF273583C91BC0D2F11D612FF22E64C177A7
24,507,449 UART: [art] SIG.R = 653964ED9042142BCFED9C4D0E9F4E08D2588B77735C3B86C69EB1D1F5C2082480D8ACB97FC68C646ED89CEA47702B71
24,514,865 UART: [art] SIG.S = B76F773F1451952D12039779286EBAFD27D175AA615AB79B1A3208CC7B94EBD93344E774D5B1DE643B6803E779A2E28D
25,493,744 UART: Caliptra RT
25,494,462 UART: [state] CFI Enabled
25,611,584 UART: [rt] RT listening for mailbox commands...
28,739,516 >>> mbox cmd response: failed
28,741,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,885,014 UART:
28,885,321 UART: Running Caliptra FMC ...
28,886,441 UART:
28,886,610 UART: [state] CFI Enabled
28,887,531 UART: [art] Extend RT PCRs Done
28,888,670 UART: [art] Lock RT PCRs Done
28,889,741 UART: [art] Populate DV Done
28,890,809 UART: [fht] FMC Alias Private Key: 7
28,892,132 UART: [art] Derive CDI
28,892,869 UART: [art] Store in in slot 0x4
28,894,041 UART: [art] Derive Key Pair
28,894,985 UART: [art] Store priv key in slot 0x5
31,279,454 UART: [art] Derive Key Pair - Done
31,292,561 UART: [art] Signing Cert with AUTHO
31,293,872 UART: RITY.KEYID = 7
32,999,186 UART: [art] Erasing AUTHORITY.KEYID = 7
33,000,733 UART: [art] PUB.X = 05DDA8A04E0B871EBE065415399FBDB3EAB2EE21B7DEFD8746FFF0CE9DBDD432CC78AE284CC372CC72140DBBEB366A17
33,008,012 UART: [art] PUB.Y = 17FF8275DD146F2E9CF5AE4BD255DD4FB72D409A07E689B37C3AE0112F05FF273583C91BC0D2F11D612FF22E64C177A7
33,015,313 UART: [art] SIG.R = 653964ED9042142BCFED9C4D0E9F4E08D2588B77735C3B86C69EB1D1F5C2082480D8ACB97FC68C646ED89CEA47702B71
33,022,650 UART: [art] SIG.S = B76F773F1451952D12039779286EBAFD27D175AA615AB79B1A3208CC7B94EBD93344E774D5B1DE643B6803E779A2E28D
34,001,546 UART: Caliptra RT
34,002,244 UART: [state] CFI Enabled
34,289,980 UART: [rt] RT listening for mailbox commands...
47,209,137 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,034 writing to cptra_bootfsm_go
193,158 UART:
193,514 UART: Running Caliptra ROM ...
194,737 UART:
194,895 UART: [state] CFI Enabled
254,993 UART: [state] LifecycleState = Unprovisioned
257,335 UART: [state] DebugLocked = No
259,583 UART: [state] WD Timer not started. Device not locked for debugging
263,573 UART: [kat] SHA2-256
453,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,179 UART: [kat] ++
464,627 UART: [kat] sha1
475,832 UART: [kat] SHA2-256
478,842 UART: [kat] SHA2-384
485,097 UART: [kat] SHA2-512-ACC
487,661 UART: [kat] ECC-384
2,942,818 UART: [kat] HMAC-384Kdf
2,967,217 UART: [kat] LMS
3,498,993 UART: [kat] --
3,504,302 UART: [cold-reset] ++
3,505,589 UART: [fht] FHT @ 0x50003400
3,518,031 UART: [idev] ++
3,518,710 UART: [idev] CDI.KEYID = 6
3,519,727 UART: [idev] SUBJECT.KEYID = 7
3,520,891 UART: [idev] UDS.KEYID = 0
3,523,677 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,207 UART: [idev] Erasing UDS.KEYID = 0
6,043,563 UART: [idev] Sha1 KeyId Algorithm
6,065,093 UART: [idev] --
6,071,524 UART: [ldev] ++
6,072,207 UART: [ldev] CDI.KEYID = 6
6,073,120 UART: [ldev] SUBJECT.KEYID = 5
6,074,336 UART: [ldev] AUTHORITY.KEYID = 7
6,075,517 UART: [ldev] FE.KEYID = 1
6,115,497 UART: [ldev] Erasing FE.KEYID = 1
8,622,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,403,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,425,191 UART: [ldev] --
10,430,833 UART: [fwproc] Wait for Commands...
10,433,787 UART: [fwproc] Recv command 0x46574c44
10,436,108 UART: [fwproc] Recv'd Img size: 114084 bytes
13,875,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,953,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,610,754 >>> mbox cmd response: success
14,613,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,756,618 UART: [afmc] ++
14,757,258 UART: [afmc] CDI.KEYID = 6
14,758,167 UART: [afmc] SUBJECT.KEYID = 7
14,759,220 UART: [afmc] AUTHORITY.KEYID = 5
17,149,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,522 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,910,702 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,925,811 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,940,694 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,965,043 UART: [afmc] --
18,969,002 UART: [cold-reset] --
18,973,262 UART: [state] Locking Datavault
18,980,674 UART: [state] Locking PCR0, PCR1 and PCR31
18,982,818 UART: [state] Locking ICCM
18,984,650 UART: [exit] Launching FMC @ 0x40000130
18,993,329 UART:
18,993,562 UART: Running Caliptra FMC ...
18,994,684 UART:
18,994,842 UART: [state] CFI Enabled
19,049,025 UART: [fht] FMC Alias Private Key: 7
20,813,512 UART: [art] Extend RT PCRs Done
20,814,732 UART: [art] Lock RT PCRs Done
20,816,223 UART: [art] Populate DV Done
20,822,013 UART: [fht] FMC Alias Private Key: 7
20,823,619 UART: [art] Derive CDI
20,824,438 UART: [art] Store in in slot 0x4
20,881,721 UART: [art] Derive Key Pair
20,882,763 UART: [art] Store priv key in slot 0x5
23,345,780 UART: [art] Derive Key Pair - Done
23,358,607 UART: [art] Signing Cert with AUTHO
23,359,914 UART: RITY.KEYID = 7
25,072,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,572 UART: [art] PUB.X = 9E0542DD3459EE0CC477ACF7D5F2947019B9C23E44D01F26C0E8A8DEBAD1742656E0161C93E054653558AC419A045DD6
25,080,848 UART: [art] PUB.Y = 68EC71A6931E8293014BF90D48D6C28E8A8FE46368A013F7618564875415D4D8D1E4A0F377F6B2819192F22FBD056755
25,088,084 UART: [art] SIG.R = 980BB011156D4D6E5835DE2302FB07695136A1FA00E0F565D7E376B15BDEE75EA26897A83CBB04031133013E37DAEA6F
25,095,428 UART: [art] SIG.S = 77EA0508B21046AE8D6222F5FBA70B13E7E84CC7F1E1A3D6AF7F8838ACA12CC5AD6E1850633CA84A0A070F8F786C87D5
26,073,790 UART: Caliptra RT
26,074,498 UART: [state] CFI Enabled
26,238,845 UART: [rt] RT listening for mailbox commands...
26,241,743 UART:
26,242,041 UART: Running Caliptra ROM ...
26,243,160 UART:
26,243,321 UART: [state] CFI Enabled
26,307,000 UART: [state] LifecycleState = Unprovisioned
26,309,061 UART: [state] DebugLocked = No
26,310,659 UART: [state] WD Timer not started. Device not locked for debugging
26,315,438 UART: [kat] SHA2-256
26,505,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,516,049 UART: [kat] ++
26,516,559 UART: [kat] sha1
26,527,883 UART: [kat] SHA2-256
26,530,908 UART: [kat] SHA2-384
26,538,356 UART: [kat] SHA2-512-ACC
26,540,924 UART: [kat] ECC-384
28,991,125 UART: [kat] HMAC-384Kdf
29,012,914 UART: [kat] LMS
29,544,501 UART: [kat] --
29,549,352 UART: [update-reset] ++
29,611,285 >>> mbox cmd response: failed
29,613,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,756,437 UART: ROM Non-Fatal Error: 0x000B001E
29,757,856 UART: [state] Locking Datavault
29,759,017 UART: [state] Locking PCR0, PCR1 and PCR31
29,760,560 UART: [state] Locking ICCM
29,761,441 UART: [exit] Launching FMC @ 0x40000130
29,763,494 UART:
29,763,668 UART: Running Caliptra FMC ...
29,764,773 UART:
29,764,928 UART: [state] CFI Enabled
29,765,846 UART: [art] Extend RT PCRs Done
29,766,982 UART: [art] Lock RT PCRs Done
29,768,047 UART: [art] Populate DV Done
29,769,081 UART: [fht] FMC Alias Private Key: 7
29,770,400 UART: [art] Derive CDI
29,771,136 UART: [art] Store in in slot 0x4
29,798,822 UART: [art] Derive Key Pair
29,799,823 UART: [art] Store priv key in slot 0x5
32,262,508 UART: [art] Derive Key Pair - Done
32,275,399 UART: [art] Signing Cert with AUTHO
32,276,709 UART: RITY.KEYID = 7
33,987,681 UART: [art] Erasing AUTHORITY.KEYID = 7
33,989,212 UART: [art] PUB.X = 9E0542DD3459EE0CC477ACF7D5F2947019B9C23E44D01F26C0E8A8DEBAD1742656E0161C93E054653558AC419A045DD6
33,996,471 UART: [art] PUB.Y = 68EC71A6931E8293014BF90D48D6C28E8A8FE46368A013F7618564875415D4D8D1E4A0F377F6B2819192F22FBD056755
34,003,687 UART: [art] SIG.R = 980BB011156D4D6E5835DE2302FB07695136A1FA00E0F565D7E376B15BDEE75EA26897A83CBB04031133013E37DAEA6F
34,011,036 UART: [art] SIG.S = 77EA0508B21046AE8D6222F5FBA70B13E7E84CC7F1E1A3D6AF7F8838ACA12CC5AD6E1850633CA84A0A070F8F786C87D5
34,989,701 UART: Caliptra RT
34,990,397 UART: [state] CFI Enabled
35,322,507 UART: [rt] RT listening for mailbox commands...
35,325,297 UART:
35,325,554 UART: Running Caliptra ROM ...
35,326,665 UART:
35,326,823 UART: [state] CFI Enabled
35,392,897 UART: [state] LifecycleState = Unprovisioned
35,394,931 UART: [state] DebugLocked = No
35,396,990 UART: [state] WD Timer not started. Device not locked for debugging
35,401,508 UART: [kat] SHA2-256
35,591,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,602,146 UART: [kat] ++
35,602,613 UART: [kat] sha1
35,614,148 UART: [kat] SHA2-256
35,617,124 UART: [kat] SHA2-384
35,622,841 UART: [kat] SHA2-512-ACC
35,625,464 UART: [kat] ECC-384
38,078,258 UART: [kat] HMAC-384Kdf
38,099,174 UART: [kat] LMS
38,630,745 UART: [kat] --
38,634,539 UART: [update-reset] ++
42,087,296 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,090,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
42,696,424 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,437,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,716,697 >>> mbox cmd response: success
14,718,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,002,684 UART:
19,003,089 UART: Running Caliptra FMC ...
19,004,227 UART:
19,004,414 UART: [state] CFI Enabled
19,069,373 UART: [fht] FMC Alias Private Key: 7
20,832,540 UART: [art] Extend RT PCRs Done
20,833,745 UART: [art] Lock RT PCRs Done
20,835,363 UART: [art] Populate DV Done
20,840,805 UART: [fht] FMC Alias Private Key: 7
20,842,509 UART: [art] Derive CDI
20,843,328 UART: [art] Store in in slot 0x4
20,901,563 UART: [art] Derive Key Pair
20,902,636 UART: [art] Store priv key in slot 0x5
23,365,305 UART: [art] Derive Key Pair - Done
23,378,413 UART: [art] Signing Cert with AUTHO
23,379,726 UART: RITY.KEYID = 7
25,090,524 UART: [art] Erasing AUTHORITY.KEYID = 7
25,092,039 UART: [art] PUB.X = E6D18E00953420E87DEDDFE082E17D740DEB23C9A115BD06D06D5622F55E2EF6F3B13D73A9414F0B75645BD12B310E64
25,099,297 UART: [art] PUB.Y = 3DC0EDB5BB6C07094C0BFC5DD922B4FCECFBC601E5048D94A18CF63303122A03B358ECFA3F6FF2C61375F5EF28868F78
25,106,607 UART: [art] SIG.R = 636B9410A7F2C471D6ADA0CFCB9F193B7C2052801829732315036F48EAE940FE99E0526BA3EBAD74901A042AA0D940AC
25,113,970 UART: [art] SIG.S = 1E606FD5BED96B7F8517F2C70D5EAE67C44FDC09D0FFC2A926EF21A85717FC218327B3799664FB8A422C55837D2DA950
26,093,219 UART: Caliptra RT
26,093,918 UART: [state] CFI Enabled
26,257,966 UART: [rt] RT listening for mailbox commands...
29,539,457 >>> mbox cmd response: failed
29,541,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,685,160 UART:
29,685,481 UART: Running Caliptra FMC ...
29,686,520 UART:
29,686,670 UART: [state] CFI Enabled
29,687,599 UART: [art] Extend RT PCRs Done
29,688,751 UART: [art] Lock RT PCRs Done
29,689,741 UART: [art] Populate DV Done
29,690,805 UART: [fht] FMC Alias Private Key: 7
29,692,048 UART: [art] Derive CDI
29,692,801 UART: [art] Store in in slot 0x4
29,731,622 UART: [art] Derive Key Pair
29,732,624 UART: [art] Store priv key in slot 0x5
32,195,631 UART: [art] Derive Key Pair - Done
32,208,366 UART: [art] Signing Cert with AUTHO
32,209,674 UART: RITY.KEYID = 7
33,921,233 UART: [art] Erasing AUTHORITY.KEYID = 7
33,922,750 UART: [art] PUB.X = E6D18E00953420E87DEDDFE082E17D740DEB23C9A115BD06D06D5622F55E2EF6F3B13D73A9414F0B75645BD12B310E64
33,929,994 UART: [art] PUB.Y = 3DC0EDB5BB6C07094C0BFC5DD922B4FCECFBC601E5048D94A18CF63303122A03B358ECFA3F6FF2C61375F5EF28868F78
33,937,322 UART: [art] SIG.R = 636B9410A7F2C471D6ADA0CFCB9F193B7C2052801829732315036F48EAE940FE99E0526BA3EBAD74901A042AA0D940AC
33,944,715 UART: [art] SIG.S = 1E606FD5BED96B7F8517F2C70D5EAE67C44FDC09D0FFC2A926EF21A85717FC218327B3799664FB8A422C55837D2DA950
34,923,949 UART: Caliptra RT
34,924,667 UART: [state] CFI Enabled
35,259,238 UART: [rt] RT listening for mailbox commands...
42,922,162 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
192,543 UART:
192,905 UART: Running Caliptra ROM ...
194,005 UART:
603,908 UART: [state] CFI Enabled
616,716 UART: [state] LifecycleState = Unprovisioned
619,111 UART: [state] DebugLocked = No
622,007 UART: [state] WD Timer not started. Device not locked for debugging
625,775 UART: [kat] SHA2-256
815,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,251 UART: [kat] ++
826,839 UART: [kat] sha1
838,426 UART: [kat] SHA2-256
841,492 UART: [kat] SHA2-384
847,198 UART: [kat] SHA2-512-ACC
849,787 UART: [kat] ECC-384
3,289,153 UART: [kat] HMAC-384Kdf
3,302,138 UART: [kat] LMS
3,833,935 UART: [kat] --
3,838,523 UART: [cold-reset] ++
3,840,417 UART: [fht] FHT @ 0x50003400
3,852,206 UART: [idev] ++
3,852,888 UART: [idev] CDI.KEYID = 6
3,853,824 UART: [idev] SUBJECT.KEYID = 7
3,855,037 UART: [idev] UDS.KEYID = 0
3,857,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,278 UART: [idev] Erasing UDS.KEYID = 0
6,330,339 UART: [idev] Sha1 KeyId Algorithm
6,352,230 UART: [idev] --
6,357,575 UART: [ldev] ++
6,358,253 UART: [ldev] CDI.KEYID = 6
6,359,190 UART: [ldev] SUBJECT.KEYID = 5
6,360,351 UART: [ldev] AUTHORITY.KEYID = 7
6,361,582 UART: [ldev] FE.KEYID = 1
6,371,870 UART: [ldev] Erasing FE.KEYID = 1
8,849,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,331 UART: [ldev] --
10,641,953 UART: [fwproc] Wait for Commands...
10,643,842 UART: [fwproc] Recv command 0x46574c44
10,646,155 UART: [fwproc] Recv'd Img size: 114084 bytes
14,087,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,164,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,821,924 >>> mbox cmd response: success
14,823,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,967,293 UART: [afmc] ++
14,967,934 UART: [afmc] CDI.KEYID = 6
14,968,831 UART: [afmc] SUBJECT.KEYID = 7
14,969,896 UART: [afmc] AUTHORITY.KEYID = 5
17,333,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,092 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
19,073,232 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
19,088,399 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
19,103,265 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
19,125,668 UART: [afmc] --
19,128,829 UART: [cold-reset] --
19,132,852 UART: [state] Locking Datavault
19,137,451 UART: [state] Locking PCR0, PCR1 and PCR31
19,139,645 UART: [state] Locking ICCM
19,141,742 UART: [exit] Launching FMC @ 0x40000130
19,150,413 UART:
19,150,648 UART: Running Caliptra FMC ...
19,151,752 UART:
19,151,926 UART: [state] CFI Enabled
19,160,194 UART: [fht] FMC Alias Private Key: 7
20,917,113 UART: [art] Extend RT PCRs Done
20,918,330 UART: [art] Lock RT PCRs Done
20,919,598 UART: [art] Populate DV Done
20,925,177 UART: [fht] FMC Alias Private Key: 7
20,926,861 UART: [art] Derive CDI
20,927,605 UART: [art] Store in in slot 0x4
20,970,682 UART: [art] Derive Key Pair
20,971,687 UART: [art] Store priv key in slot 0x5
23,397,787 UART: [art] Derive Key Pair - Done
23,410,981 UART: [art] Signing Cert with AUTHO
23,412,312 UART: RITY.KEYID = 7
25,118,251 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,762 UART: [art] PUB.X = 9E6C315BDA51945291F9017F4FAC8E18D7535D926CE430909AF36FB1AD00B322A7438129AB2ADBD337BEE37043111AE3
25,126,984 UART: [art] PUB.Y = 40E6F8012262DD965C363F43DF6945F354883E43F626C95584AD100D2B26DA363EED22410D9656D427069ABE549409A6
25,134,280 UART: [art] SIG.R = 9A83069C2B26767D8E143FD2F3FD520885EB3EBAD93896647D64B792DA5114B6D222FCA00F2EF7BCC391338D7192A18D
25,141,646 UART: [art] SIG.S = C77FA1FC45B24B0A1A6EC26DF3F7F914CC3648A03A2460DEF9F88E307CA144C1798DE31CD2097F97F63639370DEA5FCE
26,120,879 UART: Caliptra RT
26,121,591 UART: [state] CFI Enabled
26,239,179 UART: [rt] RT listening for mailbox commands...
26,242,357 UART:
26,242,526 UART: Running Caliptra ROM ...
26,243,634 UART:
26,244,007 UART: [state] CFI Enabled
26,261,195 UART: [state] LifecycleState = Unprovisioned
26,263,020 UART: [state] DebugLocked = No
26,265,831 UART: [state] WD Timer not started. Device not locked for debugging
26,270,647 UART: [kat] SHA2-256
26,460,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,471,303 UART: [kat] ++
26,471,759 UART: [kat] sha1
26,484,287 UART: [kat] SHA2-256
26,487,256 UART: [kat] SHA2-384
26,492,159 UART: [kat] SHA2-512-ACC
26,494,725 UART: [kat] ECC-384
28,937,442 UART: [kat] HMAC-384Kdf
28,951,941 UART: [kat] LMS
29,483,560 UART: [kat] --
29,488,565 UART: [update-reset] ++
29,548,365 >>> mbox cmd response: failed
29,549,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,693,320 UART: ROM Non-Fatal Error: 0x000B001E
29,694,748 UART: [state] Locking Datavault
29,695,907 UART: [state] Locking PCR0, PCR1 and PCR31
29,697,366 UART: [state] Locking ICCM
29,698,238 UART: [exit] Launching FMC @ 0x40000130
29,699,659 UART:
29,699,831 UART: Running Caliptra FMC ...
29,700,845 UART:
29,700,989 UART: [state] CFI Enabled
29,701,823 UART: [art] Extend RT PCRs Done
29,702,901 UART: [art] Lock RT PCRs Done
29,703,908 UART: [art] Populate DV Done
29,704,876 UART: [fht] FMC Alias Private Key: 7
29,706,201 UART: [art] Derive CDI
29,706,931 UART: [art] Store in in slot 0x4
29,708,019 UART: [art] Derive Key Pair
29,709,016 UART: [art] Store priv key in slot 0x5
32,096,011 UART: [art] Derive Key Pair - Done
32,109,066 UART: [art] Signing Cert with AUTHO
32,110,372 UART: RITY.KEYID = 7
33,815,676 UART: [art] Erasing AUTHORITY.KEYID = 7
33,817,187 UART: [art] PUB.X = 9E6C315BDA51945291F9017F4FAC8E18D7535D926CE430909AF36FB1AD00B322A7438129AB2ADBD337BEE37043111AE3
33,824,490 UART: [art] PUB.Y = 40E6F8012262DD965C363F43DF6945F354883E43F626C95584AD100D2B26DA363EED22410D9656D427069ABE549409A6
33,831,707 UART: [art] SIG.R = 9A83069C2B26767D8E143FD2F3FD520885EB3EBAD93896647D64B792DA5114B6D222FCA00F2EF7BCC391338D7192A18D
33,839,096 UART: [art] SIG.S = C77FA1FC45B24B0A1A6EC26DF3F7F914CC3648A03A2460DEF9F88E307CA144C1798DE31CD2097F97F63639370DEA5FCE
34,818,334 UART: Caliptra RT
34,819,051 UART: [state] CFI Enabled
35,106,142 UART: [rt] RT listening for mailbox commands...
35,109,106 UART:
35,109,362 UART: Running Caliptra ROM ...
35,110,472 UART:
35,110,684 UART: [state] CFI Enabled
40,320,380 UART: [state] LifecycleState = Unprovisioned
40,322,301 UART: [state] DebugLocked = No
40,325,073 UART: [state] WD Timer not started. Device not locked for debugging
40,330,232 UART: [kat] SHA2-256
40,520,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,530,887 UART: [kat] ++
40,531,427 UART: [kat] sha1
40,541,937 UART: [kat] SHA2-256
40,544,950 UART: [kat] SHA2-384
40,550,719 UART: [kat] SHA2-512-ACC
40,553,289 UART: [kat] ECC-384
42,993,945 UART: [kat] HMAC-384Kdf
43,006,968 UART: [kat] LMS
43,538,553 UART: [kat] --
43,543,885 UART: [update-reset] ++
47,006,378 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,009,555 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
47,615,609 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,757,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,942,444 >>> mbox cmd response: success
14,944,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,199,670 UART:
19,200,073 UART: Running Caliptra FMC ...
19,201,213 UART:
19,201,372 UART: [state] CFI Enabled
19,209,014 UART: [fht] FMC Alias Private Key: 7
20,965,807 UART: [art] Extend RT PCRs Done
20,967,012 UART: [art] Lock RT PCRs Done
20,968,910 UART: [art] Populate DV Done
20,974,460 UART: [fht] FMC Alias Private Key: 7
20,975,957 UART: [art] Derive CDI
20,976,722 UART: [art] Store in in slot 0x4
21,019,264 UART: [art] Derive Key Pair
21,020,268 UART: [art] Store priv key in slot 0x5
23,446,987 UART: [art] Derive Key Pair - Done
23,459,597 UART: [art] Signing Cert with AUTHO
23,460,902 UART: RITY.KEYID = 7
25,166,339 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,829 UART: [art] PUB.X = 8040515287AE5F0C44CF3E54D532C9C10760C8BB6B2E2015C6B03CFCF348A12A913DAF0C2D79ACBA8D45A9065EF9A4D0
25,175,133 UART: [art] PUB.Y = B9115CA34E82860C6757B2253E4F5B4169E482F25B676C00E89B0993CA905B5C7C4E0746ACCF143F38A5C9A01E6247AA
25,182,459 UART: [art] SIG.R = 21B901BE0FEAAD495C63654C4856BB66AE2BEB75651109EF3F23C8108100DE8F91A1E2AC86A44197E06343300330702C
25,189,753 UART: [art] SIG.S = AC96EDCC33D9A6E94DEC4181ABD78EEE752E6EEB8B2DFB1D2B426EFC1C720D9ACE188DCC58AF5664E0ABACFFBD9C0811
26,168,350 UART: Caliptra RT
26,169,053 UART: [state] CFI Enabled
26,287,149 UART: [rt] RT listening for mailbox commands...
29,475,096 >>> mbox cmd response: failed
29,477,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,620,602 UART:
29,620,916 UART: Running Caliptra FMC ...
29,622,037 UART:
29,622,227 UART: [state] CFI Enabled
29,623,150 UART: [art] Extend RT PCRs Done
29,624,291 UART: [art] Lock RT PCRs Done
29,625,355 UART: [art] Populate DV Done
29,626,422 UART: [fht] FMC Alias Private Key: 7
29,627,744 UART: [art] Derive CDI
29,628,480 UART: [art] Store in in slot 0x4
29,629,649 UART: [art] Derive Key Pair
29,630,589 UART: [art] Store priv key in slot 0x5
32,013,693 UART: [art] Derive Key Pair - Done
32,026,630 UART: [art] Signing Cert with AUTHO
32,027,945 UART: RITY.KEYID = 7
33,733,429 UART: [art] Erasing AUTHORITY.KEYID = 7
33,734,929 UART: [art] PUB.X = 8040515287AE5F0C44CF3E54D532C9C10760C8BB6B2E2015C6B03CFCF348A12A913DAF0C2D79ACBA8D45A9065EF9A4D0
33,742,366 UART: [art] PUB.Y = B9115CA34E82860C6757B2253E4F5B4169E482F25B676C00E89B0993CA905B5C7C4E0746ACCF143F38A5C9A01E6247AA
33,749,440 UART: [art] SIG.R = 21B901BE0FEAAD495C63654C4856BB66AE2BEB75651109EF3F23C8108100DE8F91A1E2AC86A44197E06343300330702C
33,756,848 UART: [art] SIG.S = AC96EDCC33D9A6E94DEC4181ABD78EEE752E6EEB8B2DFB1D2B426EFC1C720D9ACE188DCC58AF5664E0ABACFFBD9C0811
34,736,002 UART: Caliptra RT
34,736,723 UART: [state] CFI Enabled
35,025,812 UART: [rt] RT listening for mailbox commands...
47,892,372 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,540 UART: [kat] SHA2-512-ACC
897,441 UART: [kat] ECC-384
903,084 UART: [kat] HMAC-384Kdf
907,686 UART: [kat] LMS
1,475,882 UART: [kat] --
1,476,959 UART: [cold-reset] ++
1,477,289 UART: [fht] Storing FHT @ 0x50003400
1,480,060 UART: [idev] ++
1,480,228 UART: [idev] CDI.KEYID = 6
1,480,588 UART: [idev] SUBJECT.KEYID = 7
1,481,012 UART: [idev] UDS.KEYID = 0
1,481,357 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,954 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,552 UART: [idev] --
1,515,443 UART: [ldev] ++
1,515,611 UART: [ldev] CDI.KEYID = 6
1,515,974 UART: [ldev] SUBJECT.KEYID = 5
1,516,400 UART: [ldev] AUTHORITY.KEYID = 7
1,516,863 UART: [ldev] FE.KEYID = 1
1,522,289 UART: [ldev] Erasing FE.KEYID = 1
1,547,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,780 UART: [ldev] --
1,587,161 UART: [fwproc] Waiting for Commands...
1,587,968 UART: [fwproc] Received command 0x46574c44
1,588,759 UART: [fwproc] Received Image of size 114084 bytes
2,884,047 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,993 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,826 >>> mbox cmd response: success
3,076,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,078,042 UART: [afmc] ++
3,078,210 UART: [afmc] CDI.KEYID = 6
3,078,572 UART: [afmc] SUBJECT.KEYID = 7
3,078,997 UART: [afmc] AUTHORITY.KEYID = 5
3,113,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,022 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,802 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,514 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,142,425 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,148,132 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,155,964 UART: [afmc] --
3,156,908 UART: [cold-reset] --
3,157,892 UART: [state] Locking Datavault
3,158,953 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,557 UART: [state] Locking ICCM
3,160,011 UART: [exit] Launching FMC @ 0x40000130
3,165,340 UART:
3,165,356 UART: Running Caliptra FMC ...
3,165,764 UART:
3,165,818 UART: [state] CFI Enabled
3,176,109 UART: [fht] FMC Alias Private Key: 7
3,283,693 UART: [art] Extend RT PCRs Done
3,284,121 UART: [art] Lock RT PCRs Done
3,285,699 UART: [art] Populate DV Done
3,293,774 UART: [fht] FMC Alias Private Key: 7
3,294,760 UART: [art] Derive CDI
3,295,040 UART: [art] Store in in slot 0x4
3,380,937 UART: [art] Derive Key Pair
3,381,297 UART: [art] Store priv key in slot 0x5
3,394,313 UART: [art] Derive Key Pair - Done
3,409,064 UART: [art] Signing Cert with AUTHO
3,409,544 UART: RITY.KEYID = 7
3,424,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,451 UART: [art] PUB.X = 3C2C7295D76271019C922604A5F8C54C9CACCE1E58C681F733DA612C72530A51DEFB50CD88693FB9969159F210495994
3,432,208 UART: [art] PUB.Y = FAE960A5B85409E6843C1F84B15A18111932A9A50EF734DF44E6F41035C4ADE6674C3F3D66C672C58EFE08786B9010FE
3,439,153 UART: [art] SIG.R = 6B806622A2DC6AB09018C1872F85A2EB484E116EB54A250E2F77823472536C10374F04A24D94B647D7DF9C8A2C7B887F
3,445,915 UART: [art] SIG.S = 73474665F83A215C791C24CB1C084A78C4C260EB4FB008144803FD683FC8F37E0B494A7E26772C16E33D022AA78C7CA3
3,469,775 UART: Caliptra RT
3,470,028 UART: [state] CFI Enabled
3,578,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,155 UART:
3,581,171 UART: Running Caliptra ROM ...
3,581,579 UART:
3,581,633 UART: [state] CFI Enabled
3,583,763 UART: [state] LifecycleState = Unprovisioned
3,584,418 UART: [state] DebugLocked = No
3,584,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,469 UART: [kat] SHA2-256
4,380,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,515 UART: [kat] ++
4,384,667 UART: [kat] sha1
4,389,067 UART: [kat] SHA2-256
4,391,005 UART: [kat] SHA2-384
4,393,558 UART: [kat] SHA2-512-ACC
4,395,458 UART: [kat] ECC-384
4,401,205 UART: [kat] HMAC-384Kdf
4,405,703 UART: [kat] LMS
4,973,899 UART: [kat] --
4,974,788 UART: [update-reset] ++
5,013,731 >>> mbox cmd response: failed
5,013,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,014,139 UART: ROM Non-Fatal Error: 0x000B001E
5,015,005 UART: [state] Locking Datavault
5,015,759 UART: [state] Locking PCR0, PCR1 and PCR31
5,016,363 UART: [state] Locking ICCM
5,016,897 UART: [exit] Launching FMC @ 0x40000130
5,022,226 UART:
5,022,242 UART: Running Caliptra FMC ...
5,022,650 UART:
5,022,704 UART: [state] CFI Enabled
5,111,593 UART: [art] Extend RT PCRs Done
5,112,021 UART: [art] Lock RT PCRs Done
5,113,232 UART: [art] Populate DV Done
5,121,445 UART: [fht] FMC Alias Private Key: 7
5,122,423 UART: [art] Derive CDI
5,122,703 UART: [art] Store in in slot 0x4
5,208,644 UART: [art] Derive Key Pair
5,209,004 UART: [art] Store priv key in slot 0x5
5,222,246 UART: [art] Derive Key Pair - Done
5,236,897 UART: [art] Signing Cert with AUTHO
5,237,377 UART: RITY.KEYID = 7
5,252,355 UART: [art] Erasing AUTHORITY.KEYID = 7
5,253,120 UART: [art] PUB.X = 3C2C7295D76271019C922604A5F8C54C9CACCE1E58C681F733DA612C72530A51DEFB50CD88693FB9969159F210495994
5,259,877 UART: [art] PUB.Y = FAE960A5B85409E6843C1F84B15A18111932A9A50EF734DF44E6F41035C4ADE6674C3F3D66C672C58EFE08786B9010FE
5,266,822 UART: [art] SIG.R = 6B806622A2DC6AB09018C1872F85A2EB484E116EB54A250E2F77823472536C10374F04A24D94B647D7DF9C8A2C7B887F
5,273,584 UART: [art] SIG.S = 73474665F83A215C791C24CB1C084A78C4C260EB4FB008144803FD683FC8F37E0B494A7E26772C16E33D022AA78C7CA3
5,296,982 UART: Caliptra RT
5,297,235 UART: [state] CFI Enabled
5,583,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,584,729 UART:
5,584,745 UART: Running Caliptra ROM ...
5,585,153 UART:
5,585,207 UART: [state] CFI Enabled
5,587,673 UART: [state] LifecycleState = Unprovisioned
5,588,328 UART: [state] DebugLocked = No
5,588,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,590,699 UART: [kat] SHA2-256
6,384,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,388,745 UART: [kat] ++
6,388,897 UART: [kat] sha1
6,393,105 UART: [kat] SHA2-256
6,395,043 UART: [kat] SHA2-384
6,397,762 UART: [kat] SHA2-512-ACC
6,399,662 UART: [kat] ECC-384
6,405,339 UART: [kat] HMAC-384Kdf
6,409,935 UART: [kat] LMS
6,978,131 UART: [kat] --
6,978,892 UART: [update-reset] ++
8,310,446 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,311,606 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,461,110 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,858 >>> mbox cmd response: success
2,921,858 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,983,428 UART:
2,983,444 UART: Running Caliptra FMC ...
2,983,852 UART:
2,983,906 UART: [state] CFI Enabled
2,994,553 UART: [fht] FMC Alias Private Key: 7
3,103,035 UART: [art] Extend RT PCRs Done
3,103,463 UART: [art] Lock RT PCRs Done
3,105,057 UART: [art] Populate DV Done
3,113,288 UART: [fht] FMC Alias Private Key: 7
3,114,304 UART: [art] Derive CDI
3,114,584 UART: [art] Store in in slot 0x4
3,200,107 UART: [art] Derive Key Pair
3,200,467 UART: [art] Store priv key in slot 0x5
3,213,837 UART: [art] Derive Key Pair - Done
3,228,567 UART: [art] Signing Cert with AUTHO
3,229,047 UART: RITY.KEYID = 7
3,244,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,132 UART: [art] PUB.X = 3A7AE1729815D0B65F1281860D20060BC331C6A513D888944584107B6A4173F3C5FDA88417C156F8C70D0CFEC43B7FBE
3,251,887 UART: [art] PUB.Y = 0091745AF150D03698A91008CF8596131D37F6C69A004F87F1B4A17299A153B65CD8CA99C4E12D36DBEE5B2825E96B13
3,258,788 UART: [art] SIG.R = 3575567D551DCB7B9DB015E9FD160BE2B41D48B80B0F20BA83B71D4C009484B58D79460A450989907B92B344F1A105F9
3,265,516 UART: [art] SIG.S = 800243434BF2020E4BFF4E876096E90A9A5DE7AE2BA2CF2D19668B3E623D63749BE36B30898CD9CECC146B6372DDB8AE
3,289,897 UART: Caliptra RT
3,290,150 UART: [state] CFI Enabled
3,397,985 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,716,567 >>> mbox cmd response: failed
4,716,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,722,314 UART:
4,722,330 UART: Running Caliptra FMC ...
4,722,738 UART:
4,722,792 UART: [state] CFI Enabled
4,811,475 UART: [art] Extend RT PCRs Done
4,811,903 UART: [art] Lock RT PCRs Done
4,813,390 UART: [art] Populate DV Done
4,821,667 UART: [fht] FMC Alias Private Key: 7
4,822,793 UART: [art] Derive CDI
4,823,073 UART: [art] Store in in slot 0x4
4,909,024 UART: [art] Derive Key Pair
4,909,384 UART: [art] Store priv key in slot 0x5
4,923,208 UART: [art] Derive Key Pair - Done
4,937,690 UART: [art] Signing Cert with AUTHO
4,938,170 UART: RITY.KEYID = 7
4,953,246 UART: [art] Erasing AUTHORITY.KEYID = 7
4,954,011 UART: [art] PUB.X = 3A7AE1729815D0B65F1281860D20060BC331C6A513D888944584107B6A4173F3C5FDA88417C156F8C70D0CFEC43B7FBE
4,960,766 UART: [art] PUB.Y = 0091745AF150D03698A91008CF8596131D37F6C69A004F87F1B4A17299A153B65CD8CA99C4E12D36DBEE5B2825E96B13
4,967,667 UART: [art] SIG.R = 3575567D551DCB7B9DB015E9FD160BE2B41D48B80B0F20BA83B71D4C009484B58D79460A450989907B92B344F1A105F9
4,974,395 UART: [art] SIG.S = 800243434BF2020E4BFF4E876096E90A9A5DE7AE2BA2CF2D19668B3E623D63749BE36B30898CD9CECC146B6372DDB8AE
4,997,466 UART: Caliptra RT
4,997,719 UART: [state] CFI Enabled
5,278,634 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,037,009 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,498 UART: [kat] SHA2-256
892,436 UART: [kat] SHA2-384
895,341 UART: [kat] SHA2-512-ACC
897,242 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
907,749 UART: [kat] LMS
1,475,945 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,332 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,197 UART: [idev] Erasing UDS.KEYID = 0
1,506,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,798 UART: [ldev] ++
1,515,966 UART: [ldev] CDI.KEYID = 6
1,516,329 UART: [ldev] SUBJECT.KEYID = 5
1,516,755 UART: [ldev] AUTHORITY.KEYID = 7
1,517,218 UART: [ldev] FE.KEYID = 1
1,522,536 UART: [ldev] Erasing FE.KEYID = 1
1,547,729 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,439 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,507 UART: [fwproc] Received command 0x46574c44
1,588,298 UART: [fwproc] Received Image of size 114084 bytes
2,882,801 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,910,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,502 >>> mbox cmd response: success
3,075,502 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,076,708 UART: [afmc] ++
3,076,876 UART: [afmc] CDI.KEYID = 6
3,077,238 UART: [afmc] SUBJECT.KEYID = 7
3,077,663 UART: [afmc] AUTHORITY.KEYID = 5
3,112,394 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,986 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,766 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,135,478 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,141,389 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,147,096 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,154,858 UART: [afmc] --
3,155,778 UART: [cold-reset] --
3,156,516 UART: [state] Locking Datavault
3,157,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,141 UART: [state] Locking ICCM
3,158,655 UART: [exit] Launching FMC @ 0x40000130
3,163,984 UART:
3,164,000 UART: Running Caliptra FMC ...
3,164,408 UART:
3,164,551 UART: [state] CFI Enabled
3,175,102 UART: [fht] FMC Alias Private Key: 7
3,283,102 UART: [art] Extend RT PCRs Done
3,283,530 UART: [art] Lock RT PCRs Done
3,285,326 UART: [art] Populate DV Done
3,293,447 UART: [fht] FMC Alias Private Key: 7
3,294,563 UART: [art] Derive CDI
3,294,843 UART: [art] Store in in slot 0x4
3,380,750 UART: [art] Derive Key Pair
3,381,110 UART: [art] Store priv key in slot 0x5
3,394,696 UART: [art] Derive Key Pair - Done
3,409,757 UART: [art] Signing Cert with AUTHO
3,410,237 UART: RITY.KEYID = 7
3,425,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,132 UART: [art] PUB.X = CF7DFE1505BCB608AC986A5BC736978AE42D4E0B4F6E5A4EE91A62F0EB728E94C85E7A2CE32E226DA8A1DD600BB8F67F
3,432,914 UART: [art] PUB.Y = 0688CE6A841AC1516040D7AC6F1CA752AAE109B710A7EDD1742BF46EF31A877A117D80C12F53E91150A2BA2A5A4B162B
3,439,868 UART: [art] SIG.R = 65A1C63603D223852A6485F94D4D0B90661090F092C78A5127078F8E662D00AD5A45AD548CFD56DBE89569193B4EC5A9
3,446,603 UART: [art] SIG.S = E765BAEF0F61050B64E922339BE38C69B73E13D5DF238653CDA56719F9BB6677B72F18BB4BADE1DB3DF90B0F086FFDFD
3,470,752 UART: Caliptra RT
3,471,097 UART: [state] CFI Enabled
3,578,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,793 UART:
3,580,809 UART: Running Caliptra ROM ...
3,581,217 UART:
3,581,358 UART: [state] CFI Enabled
3,583,986 UART: [state] LifecycleState = Unprovisioned
3,584,641 UART: [state] DebugLocked = No
3,585,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,587,012 UART: [kat] SHA2-256
4,380,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,385,058 UART: [kat] ++
4,385,210 UART: [kat] sha1
4,389,370 UART: [kat] SHA2-256
4,391,308 UART: [kat] SHA2-384
4,394,193 UART: [kat] SHA2-512-ACC
4,396,093 UART: [kat] ECC-384
4,402,008 UART: [kat] HMAC-384Kdf
4,406,784 UART: [kat] LMS
4,974,980 UART: [kat] --
4,975,853 UART: [update-reset] ++
5,014,692 >>> mbox cmd response: failed
5,014,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,015,320 UART: ROM Non-Fatal Error: 0x000B001E
5,016,150 UART: [state] Locking Datavault
5,017,082 UART: [state] Locking PCR0, PCR1 and PCR31
5,017,686 UART: [state] Locking ICCM
5,018,280 UART: [exit] Launching FMC @ 0x40000130
5,023,609 UART:
5,023,625 UART: Running Caliptra FMC ...
5,024,033 UART:
5,024,176 UART: [state] CFI Enabled
5,113,165 UART: [art] Extend RT PCRs Done
5,113,593 UART: [art] Lock RT PCRs Done
5,114,906 UART: [art] Populate DV Done
5,123,297 UART: [fht] FMC Alias Private Key: 7
5,124,389 UART: [art] Derive CDI
5,124,669 UART: [art] Store in in slot 0x4
5,210,424 UART: [art] Derive Key Pair
5,210,784 UART: [art] Store priv key in slot 0x5
5,223,680 UART: [art] Derive Key Pair - Done
5,238,371 UART: [art] Signing Cert with AUTHO
5,238,851 UART: RITY.KEYID = 7
5,253,753 UART: [art] Erasing AUTHORITY.KEYID = 7
5,254,518 UART: [art] PUB.X = CF7DFE1505BCB608AC986A5BC736978AE42D4E0B4F6E5A4EE91A62F0EB728E94C85E7A2CE32E226DA8A1DD600BB8F67F
5,261,300 UART: [art] PUB.Y = 0688CE6A841AC1516040D7AC6F1CA752AAE109B710A7EDD1742BF46EF31A877A117D80C12F53E91150A2BA2A5A4B162B
5,268,254 UART: [art] SIG.R = 65A1C63603D223852A6485F94D4D0B90661090F092C78A5127078F8E662D00AD5A45AD548CFD56DBE89569193B4EC5A9
5,274,989 UART: [art] SIG.S = E765BAEF0F61050B64E922339BE38C69B73E13D5DF238653CDA56719F9BB6677B72F18BB4BADE1DB3DF90B0F086FFDFD
5,298,170 UART: Caliptra RT
5,298,515 UART: [state] CFI Enabled
5,581,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,356 UART:
5,583,372 UART: Running Caliptra ROM ...
5,583,780 UART:
5,583,921 UART: [state] CFI Enabled
5,586,965 UART: [state] LifecycleState = Unprovisioned
5,587,620 UART: [state] DebugLocked = No
5,588,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,995 UART: [kat] SHA2-256
6,383,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,388,041 UART: [kat] ++
6,388,193 UART: [kat] sha1
6,392,473 UART: [kat] SHA2-256
6,394,411 UART: [kat] SHA2-384
6,397,108 UART: [kat] SHA2-512-ACC
6,399,008 UART: [kat] ECC-384
6,404,693 UART: [kat] HMAC-384Kdf
6,409,363 UART: [kat] LMS
6,977,559 UART: [kat] --
6,978,448 UART: [update-reset] ++
8,310,159 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,311,337 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
8,460,841 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,673 >>> mbox cmd response: success
2,925,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,987,107 UART:
2,987,123 UART: Running Caliptra FMC ...
2,987,531 UART:
2,987,674 UART: [state] CFI Enabled
2,998,351 UART: [fht] FMC Alias Private Key: 7
3,106,199 UART: [art] Extend RT PCRs Done
3,106,627 UART: [art] Lock RT PCRs Done
3,108,185 UART: [art] Populate DV Done
3,116,764 UART: [fht] FMC Alias Private Key: 7
3,117,724 UART: [art] Derive CDI
3,118,004 UART: [art] Store in in slot 0x4
3,203,901 UART: [art] Derive Key Pair
3,204,261 UART: [art] Store priv key in slot 0x5
3,217,777 UART: [art] Derive Key Pair - Done
3,232,732 UART: [art] Signing Cert with AUTHO
3,233,212 UART: RITY.KEYID = 7
3,248,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,201 UART: [art] PUB.X = 833CD33A10EC674B1AE280A08D6AB7CBBAA726333364A71B35748D742F2F9C715EE644DF0BAE79726D6679EB9D74A8EC
3,255,980 UART: [art] PUB.Y = 60E03A7DD677F3E3F1036E4F4A98225956FB431AAAEE65028F95BE71A2A40232D9C86238253C02159CB3BFC1F6CADD21
3,262,926 UART: [art] SIG.R = 0DD04318C8115C444F7537B742A83756B03A27CBE762A2E10BE577141056B6095A99E90529710E35CA084B59563E1109
3,269,661 UART: [art] SIG.S = 06231FAD0ACEDF1B7774016273CD8AA57F9420257E07AA599E83C13DDAD3CFA6028A6A1C48B37D59BC4D98FFBCAA20BB
3,293,151 UART: Caliptra RT
3,293,496 UART: [state] CFI Enabled
3,401,106 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,011 >>> mbox cmd response: failed
4,720,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,725,886 UART:
4,725,902 UART: Running Caliptra FMC ...
4,726,310 UART:
4,726,453 UART: [state] CFI Enabled
4,815,536 UART: [art] Extend RT PCRs Done
4,815,964 UART: [art] Lock RT PCRs Done
4,817,393 UART: [art] Populate DV Done
4,825,810 UART: [fht] FMC Alias Private Key: 7
4,826,934 UART: [art] Derive CDI
4,827,214 UART: [art] Store in in slot 0x4
4,913,027 UART: [art] Derive Key Pair
4,913,387 UART: [art] Store priv key in slot 0x5
4,926,565 UART: [art] Derive Key Pair - Done
4,941,594 UART: [art] Signing Cert with AUTHO
4,942,074 UART: RITY.KEYID = 7
4,957,178 UART: [art] Erasing AUTHORITY.KEYID = 7
4,957,943 UART: [art] PUB.X = 833CD33A10EC674B1AE280A08D6AB7CBBAA726333364A71B35748D742F2F9C715EE644DF0BAE79726D6679EB9D74A8EC
4,964,722 UART: [art] PUB.Y = 60E03A7DD677F3E3F1036E4F4A98225956FB431AAAEE65028F95BE71A2A40232D9C86238253C02159CB3BFC1F6CADD21
4,971,668 UART: [art] SIG.R = 0DD04318C8115C444F7537B742A83756B03A27CBE762A2E10BE577141056B6095A99E90529710E35CA084B59563E1109
4,978,403 UART: [art] SIG.S = 06231FAD0ACEDF1B7774016273CD8AA57F9420257E07AA599E83C13DDAD3CFA6028A6A1C48B37D59BC4D98FFBCAA20BB
5,002,065 UART: Caliptra RT
5,002,410 UART: [state] CFI Enabled
5,279,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,039,796 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
87,029 UART: [state] WD Timer not started. Device not locked for debugging
88,322 UART: [kat] SHA2-256
893,972 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,097 UART: [kat] ++
898,249 UART: [kat] sha1
902,373 UART: [kat] SHA2-256
904,313 UART: [kat] SHA2-384
907,106 UART: [kat] SHA2-512-ACC
909,007 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
923,062 UART: [kat] LMS
1,171,390 UART: [kat] --
1,172,727 UART: [cold-reset] ++
1,173,079 UART: [fht] FHT @ 0x50003400
1,175,726 UART: [idev] ++
1,175,894 UART: [idev] CDI.KEYID = 6
1,176,254 UART: [idev] SUBJECT.KEYID = 7
1,176,678 UART: [idev] UDS.KEYID = 0
1,177,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,524 UART: [idev] Erasing UDS.KEYID = 0
1,202,163 UART: [idev] Sha1 KeyId Algorithm
1,210,609 UART: [idev] --
1,211,673 UART: [ldev] ++
1,211,841 UART: [ldev] CDI.KEYID = 6
1,212,204 UART: [ldev] SUBJECT.KEYID = 5
1,212,630 UART: [ldev] AUTHORITY.KEYID = 7
1,213,093 UART: [ldev] FE.KEYID = 1
1,217,899 UART: [ldev] Erasing FE.KEYID = 1
1,244,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,041 UART: [ldev] --
1,283,524 UART: [fwproc] Wait for Commands...
1,284,176 UART: [fwproc] Recv command 0x46574c44
1,284,904 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,355 >>> mbox cmd response: success
2,772,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,773,433 UART: [afmc] ++
2,773,601 UART: [afmc] CDI.KEYID = 6
2,773,963 UART: [afmc] SUBJECT.KEYID = 7
2,774,388 UART: [afmc] AUTHORITY.KEYID = 5
2,809,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,826 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,538 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,449 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,163 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,993 UART: [afmc] --
2,853,051 UART: [cold-reset] --
2,853,715 UART: [state] Locking Datavault
2,854,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,446 UART: [state] Locking ICCM
2,855,910 UART: [exit] Launching FMC @ 0x40000130
2,861,239 UART:
2,861,255 UART: Running Caliptra FMC ...
2,861,663 UART:
2,861,717 UART: [state] CFI Enabled
2,872,224 UART: [fht] FMC Alias Private Key: 7
2,980,732 UART: [art] Extend RT PCRs Done
2,981,160 UART: [art] Lock RT PCRs Done
2,982,316 UART: [art] Populate DV Done
2,990,637 UART: [fht] FMC Alias Private Key: 7
2,991,581 UART: [art] Derive CDI
2,991,861 UART: [art] Store in in slot 0x4
3,077,876 UART: [art] Derive Key Pair
3,078,236 UART: [art] Store priv key in slot 0x5
3,091,844 UART: [art] Derive Key Pair - Done
3,106,657 UART: [art] Signing Cert with AUTHO
3,107,137 UART: RITY.KEYID = 7
3,122,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,194 UART: [art] PUB.X = 1C7B074220417F34EAE75B95EAE9F23FDE840558020D322CB63536F1EE397A738C92494D238FB0F51C956E50FD3986A4
3,129,952 UART: [art] PUB.Y = 03AD9529334A75C84A4C564A8F951ED19103AF1F630D1995D7807BC15C9A1532DCAEA9D762F55AAD353C0D6B5CAA5EE1
3,136,902 UART: [art] SIG.R = B266A423563976C6D5DEDC83DEC826BEA415DF1105FC64377C198171FB4F7665D8044AD5926744406D46817BF182751B
3,143,662 UART: [art] SIG.S = 9B89C44AA3CCCC2B2B5D0AC80D05113DF2D25E2EF3767E5680AE4C2BECD8C06F806BE26A37E060AE0A4028B01D44A425
3,166,893 UART: Caliptra RT
3,167,146 UART: [state] CFI Enabled
3,275,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,344 UART:
3,277,360 UART: Running Caliptra ROM ...
3,277,768 UART:
3,277,823 UART: [state] CFI Enabled
3,280,269 UART: [state] LifecycleState = Unprovisioned
3,280,924 UART: [state] DebugLocked = No
3,281,424 UART: [state] WD Timer not started. Device not locked for debugging
3,282,652 UART: [kat] SHA2-256
4,088,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,092,427 UART: [kat] ++
4,092,579 UART: [kat] sha1
4,097,013 UART: [kat] SHA2-256
4,098,953 UART: [kat] SHA2-384
4,101,656 UART: [kat] SHA2-512-ACC
4,103,556 UART: [kat] ECC-384
4,113,173 UART: [kat] HMAC-384Kdf
4,117,733 UART: [kat] LMS
4,366,061 UART: [kat] --
4,367,077 UART: [update-reset] ++
4,383,624 >>> mbox cmd response: failed
4,383,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,384,226 UART: ROM Non-Fatal Error: 0x000B001E
4,385,096 UART: [state] Locking Datavault
4,386,052 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,656 UART: [state] Locking ICCM
4,387,280 UART: [exit] Launching FMC @ 0x40000130
4,392,609 UART:
4,392,625 UART: Running Caliptra FMC ...
4,393,033 UART:
4,393,087 UART: [state] CFI Enabled
4,482,594 UART: [art] Extend RT PCRs Done
4,483,022 UART: [art] Lock RT PCRs Done
4,484,183 UART: [art] Populate DV Done
4,492,182 UART: [fht] FMC Alias Private Key: 7
4,493,122 UART: [art] Derive CDI
4,493,402 UART: [art] Store in in slot 0x4
4,578,889 UART: [art] Derive Key Pair
4,579,249 UART: [art] Store priv key in slot 0x5
4,592,103 UART: [art] Derive Key Pair - Done
4,606,666 UART: [art] Signing Cert with AUTHO
4,607,146 UART: RITY.KEYID = 7
4,622,446 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,211 UART: [art] PUB.X = 1C7B074220417F34EAE75B95EAE9F23FDE840558020D322CB63536F1EE397A738C92494D238FB0F51C956E50FD3986A4
4,629,969 UART: [art] PUB.Y = 03AD9529334A75C84A4C564A8F951ED19103AF1F630D1995D7807BC15C9A1532DCAEA9D762F55AAD353C0D6B5CAA5EE1
4,636,919 UART: [art] SIG.R = B266A423563976C6D5DEDC83DEC826BEA415DF1105FC64377C198171FB4F7665D8044AD5926744406D46817BF182751B
4,643,679 UART: [art] SIG.S = 9B89C44AA3CCCC2B2B5D0AC80D05113DF2D25E2EF3767E5680AE4C2BECD8C06F806BE26A37E060AE0A4028B01D44A425
4,668,296 UART: Caliptra RT
4,668,549 UART: [state] CFI Enabled
4,951,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,486 UART:
4,953,502 UART: Running Caliptra ROM ...
4,953,910 UART:
4,953,965 UART: [state] CFI Enabled
4,957,051 UART: [state] LifecycleState = Unprovisioned
4,957,706 UART: [state] DebugLocked = No
4,958,374 UART: [state] WD Timer not started. Device not locked for debugging
4,959,694 UART: [kat] SHA2-256
5,765,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,769,469 UART: [kat] ++
5,769,621 UART: [kat] sha1
5,773,999 UART: [kat] SHA2-256
5,775,939 UART: [kat] SHA2-384
5,778,592 UART: [kat] SHA2-512-ACC
5,780,492 UART: [kat] ECC-384
5,790,643 UART: [kat] HMAC-384Kdf
5,795,221 UART: [kat] LMS
6,043,549 UART: [kat] --
6,044,223 UART: [update-reset] ++
7,355,097 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,356,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,505,578 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,940 >>> mbox cmd response: success
2,619,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,681,728 UART:
2,681,744 UART: Running Caliptra FMC ...
2,682,152 UART:
2,682,206 UART: [state] CFI Enabled
2,692,719 UART: [fht] FMC Alias Private Key: 7
2,800,311 UART: [art] Extend RT PCRs Done
2,800,739 UART: [art] Lock RT PCRs Done
2,802,347 UART: [art] Populate DV Done
2,810,534 UART: [fht] FMC Alias Private Key: 7
2,811,576 UART: [art] Derive CDI
2,811,856 UART: [art] Store in in slot 0x4
2,897,411 UART: [art] Derive Key Pair
2,897,771 UART: [art] Store priv key in slot 0x5
2,910,485 UART: [art] Derive Key Pair - Done
2,925,476 UART: [art] Signing Cert with AUTHO
2,925,956 UART: RITY.KEYID = 7
2,940,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,543 UART: [art] PUB.X = 5FFF9D49195C2A12203B98953CB600BC9DFB50BB12267FAE04926020FB3370BFC1190F22FB3908A5EACD988BD5F262B9
2,948,292 UART: [art] PUB.Y = 1329B8D2FBD6FF07378334378D80066E716AE83CAE3FE68534CE572609621631FACA7E95D26AD314FB43AA686845C83A
2,955,235 UART: [art] SIG.R = 031C58C3E93DBA23F037552533D6114116AC19C463555809C1EAF1FC7CFF25F5EEE0DA17A06355F1359ED8D078F1D47E
2,962,005 UART: [art] SIG.S = 9E8A89830EEA3A6B1C84FBC234D1F08ED62C4B79D6155210207763707BA78EA7BC31D57E7C5285F6A1E7DBCA89BEAAE5
2,985,879 UART: Caliptra RT
2,986,132 UART: [state] CFI Enabled
3,093,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,929 >>> mbox cmd response: failed
4,087,929 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,093,688 UART:
4,093,704 UART: Running Caliptra FMC ...
4,094,112 UART:
4,094,166 UART: [state] CFI Enabled
4,183,279 UART: [art] Extend RT PCRs Done
4,183,707 UART: [art] Lock RT PCRs Done
4,185,044 UART: [art] Populate DV Done
4,193,315 UART: [fht] FMC Alias Private Key: 7
4,194,285 UART: [art] Derive CDI
4,194,565 UART: [art] Store in in slot 0x4
4,280,192 UART: [art] Derive Key Pair
4,280,552 UART: [art] Store priv key in slot 0x5
4,293,900 UART: [art] Derive Key Pair - Done
4,308,531 UART: [art] Signing Cert with AUTHO
4,309,011 UART: RITY.KEYID = 7
4,324,149 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,914 UART: [art] PUB.X = 5FFF9D49195C2A12203B98953CB600BC9DFB50BB12267FAE04926020FB3370BFC1190F22FB3908A5EACD988BD5F262B9
4,331,663 UART: [art] PUB.Y = 1329B8D2FBD6FF07378334378D80066E716AE83CAE3FE68534CE572609621631FACA7E95D26AD314FB43AA686845C83A
4,338,606 UART: [art] SIG.R = 031C58C3E93DBA23F037552533D6114116AC19C463555809C1EAF1FC7CFF25F5EEE0DA17A06355F1359ED8D078F1D47E
4,345,376 UART: [art] SIG.S = 9E8A89830EEA3A6B1C84FBC234D1F08ED62C4B79D6155210207763707BA78EA7BC31D57E7C5285F6A1E7DBCA89BEAAE5
4,369,646 UART: Caliptra RT
4,369,899 UART: [state] CFI Enabled
4,647,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,874 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,419 UART: [kat] SHA2-512-ACC
908,320 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,789 UART: [kat] LMS
1,171,117 UART: [kat] --
1,172,142 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,133 UART: [idev] ++
1,175,301 UART: [idev] CDI.KEYID = 6
1,175,661 UART: [idev] SUBJECT.KEYID = 7
1,176,085 UART: [idev] UDS.KEYID = 0
1,176,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,154 UART: [idev] Sha1 KeyId Algorithm
1,209,574 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,420 UART: [ldev] Erasing FE.KEYID = 1
1,244,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,166 UART: [ldev] --
1,283,441 UART: [fwproc] Wait for Commands...
1,284,191 UART: [fwproc] Recv command 0x46574c44
1,284,919 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,648 >>> mbox cmd response: success
2,771,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,772,804 UART: [afmc] ++
2,772,972 UART: [afmc] CDI.KEYID = 6
2,773,334 UART: [afmc] SUBJECT.KEYID = 7
2,773,759 UART: [afmc] AUTHORITY.KEYID = 5
2,809,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,685 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,397 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,308 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,022 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,788 UART: [afmc] --
2,852,902 UART: [cold-reset] --
2,853,790 UART: [state] Locking Datavault
2,855,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,675 UART: [state] Locking ICCM
2,856,341 UART: [exit] Launching FMC @ 0x40000130
2,861,670 UART:
2,861,686 UART: Running Caliptra FMC ...
2,862,094 UART:
2,862,237 UART: [state] CFI Enabled
2,872,828 UART: [fht] FMC Alias Private Key: 7
2,981,372 UART: [art] Extend RT PCRs Done
2,981,800 UART: [art] Lock RT PCRs Done
2,983,424 UART: [art] Populate DV Done
2,991,633 UART: [fht] FMC Alias Private Key: 7
2,992,815 UART: [art] Derive CDI
2,993,095 UART: [art] Store in in slot 0x4
3,078,426 UART: [art] Derive Key Pair
3,078,786 UART: [art] Store priv key in slot 0x5
3,092,378 UART: [art] Derive Key Pair - Done
3,106,968 UART: [art] Signing Cert with AUTHO
3,107,448 UART: RITY.KEYID = 7
3,123,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,883 UART: [art] PUB.X = D8285C79E88EEC16721227156BB3366EDC21790C294D91B3A9059B0EFDAFFDDF40DA87376EFFBFFD1C8BB33BE96874D6
3,130,662 UART: [art] PUB.Y = 8EF8D32DA5084831FFFCE6705129C1C11FA7CBA4EFB37900D0B8F9FC37B1D50781EE039B64A3DD4DFAE7FB651CE46B48
3,137,603 UART: [art] SIG.R = 92004635A0B4B88C859E1B18A35EF54C0DD4B453CA360477859C7080779F9A62E12AD724E240E2CF6B065385657091D6
3,144,334 UART: [art] SIG.S = 4DD992F46036A023CCE239791FBFE75F4C7206ED02D50794CEB9719A9AB9EF105B3020BCC79AF39DDC9E8EABE9BA96D1
3,168,214 UART: Caliptra RT
3,168,559 UART: [state] CFI Enabled
3,275,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,068 UART:
3,278,084 UART: Running Caliptra ROM ...
3,278,492 UART:
3,278,634 UART: [state] CFI Enabled
3,281,272 UART: [state] LifecycleState = Unprovisioned
3,281,927 UART: [state] DebugLocked = No
3,282,449 UART: [state] WD Timer not started. Device not locked for debugging
3,283,617 UART: [kat] SHA2-256
4,089,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,392 UART: [kat] ++
4,093,544 UART: [kat] sha1
4,097,706 UART: [kat] SHA2-256
4,099,646 UART: [kat] SHA2-384
4,102,379 UART: [kat] SHA2-512-ACC
4,104,279 UART: [kat] ECC-384
4,114,376 UART: [kat] HMAC-384Kdf
4,119,110 UART: [kat] LMS
4,367,438 UART: [kat] --
4,368,354 UART: [update-reset] ++
4,385,161 >>> mbox cmd response: failed
4,385,161 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,385,697 UART: ROM Non-Fatal Error: 0x000B001E
4,386,559 UART: [state] Locking Datavault
4,387,527 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,131 UART: [state] Locking ICCM
4,388,605 UART: [exit] Launching FMC @ 0x40000130
4,393,934 UART:
4,393,950 UART: Running Caliptra FMC ...
4,394,358 UART:
4,394,501 UART: [state] CFI Enabled
4,483,524 UART: [art] Extend RT PCRs Done
4,483,952 UART: [art] Lock RT PCRs Done
4,485,243 UART: [art] Populate DV Done
4,493,408 UART: [fht] FMC Alias Private Key: 7
4,494,404 UART: [art] Derive CDI
4,494,684 UART: [art] Store in in slot 0x4
4,580,827 UART: [art] Derive Key Pair
4,581,187 UART: [art] Store priv key in slot 0x5
4,594,933 UART: [art] Derive Key Pair - Done
4,609,593 UART: [art] Signing Cert with AUTHO
4,610,073 UART: RITY.KEYID = 7
4,624,945 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,710 UART: [art] PUB.X = D8285C79E88EEC16721227156BB3366EDC21790C294D91B3A9059B0EFDAFFDDF40DA87376EFFBFFD1C8BB33BE96874D6
4,632,489 UART: [art] PUB.Y = 8EF8D32DA5084831FFFCE6705129C1C11FA7CBA4EFB37900D0B8F9FC37B1D50781EE039B64A3DD4DFAE7FB651CE46B48
4,639,430 UART: [art] SIG.R = 92004635A0B4B88C859E1B18A35EF54C0DD4B453CA360477859C7080779F9A62E12AD724E240E2CF6B065385657091D6
4,646,161 UART: [art] SIG.S = 4DD992F46036A023CCE239791FBFE75F4C7206ED02D50794CEB9719A9AB9EF105B3020BCC79AF39DDC9E8EABE9BA96D1
4,669,821 UART: Caliptra RT
4,670,166 UART: [state] CFI Enabled
4,951,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,260 UART:
4,953,276 UART: Running Caliptra ROM ...
4,953,684 UART:
4,953,826 UART: [state] CFI Enabled
4,956,422 UART: [state] LifecycleState = Unprovisioned
4,957,077 UART: [state] DebugLocked = No
4,957,687 UART: [state] WD Timer not started. Device not locked for debugging
4,958,965 UART: [kat] SHA2-256
5,764,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,768,740 UART: [kat] ++
5,768,892 UART: [kat] sha1
5,773,174 UART: [kat] SHA2-256
5,775,114 UART: [kat] SHA2-384
5,777,871 UART: [kat] SHA2-512-ACC
5,779,771 UART: [kat] ECC-384
5,789,426 UART: [kat] HMAC-384Kdf
5,794,050 UART: [kat] LMS
6,042,378 UART: [kat] --
6,043,360 UART: [update-reset] ++
7,352,128 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,353,247 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,502,699 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,081 >>> mbox cmd response: success
2,622,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,683,953 UART:
2,683,969 UART: Running Caliptra FMC ...
2,684,377 UART:
2,684,520 UART: [state] CFI Enabled
2,695,205 UART: [fht] FMC Alias Private Key: 7
2,803,715 UART: [art] Extend RT PCRs Done
2,804,143 UART: [art] Lock RT PCRs Done
2,805,661 UART: [art] Populate DV Done
2,814,082 UART: [fht] FMC Alias Private Key: 7
2,815,070 UART: [art] Derive CDI
2,815,350 UART: [art] Store in in slot 0x4
2,900,885 UART: [art] Derive Key Pair
2,901,245 UART: [art] Store priv key in slot 0x5
2,914,749 UART: [art] Derive Key Pair - Done
2,929,267 UART: [art] Signing Cert with AUTHO
2,929,747 UART: RITY.KEYID = 7
2,944,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,648 UART: [art] PUB.X = D9288404D929BE699241806AF65D8327C932256B1DCDB64A59D36312E9AB641BB85C8252BBAABB84673CC3CEE063861A
2,952,419 UART: [art] PUB.Y = 84620C450E8FD58C582C71EEE6F9D49E2DE79B3B3FA6EFD6ABF502E8C70030136F32C3FF47F3CA9425007B4AFF88AC29
2,959,332 UART: [art] SIG.R = 5A68E862AF464F1A7B6EB2A227F101E44B66DB381DA92866E49BE0C1211E284E1ACCBCEBBA54270A8BC128D5B77C4B84
2,966,112 UART: [art] SIG.S = 026E9B0C89DB1F9C390D90A737FAC23493C768B1910DEFBA23C0F401A63FD3A6E5D9D0D107EFD6A41D6D8EEAD6A30F5A
2,989,990 UART: Caliptra RT
2,990,335 UART: [state] CFI Enabled
3,097,526 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,659 >>> mbox cmd response: failed
4,092,659 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,098,154 UART:
4,098,170 UART: Running Caliptra FMC ...
4,098,578 UART:
4,098,721 UART: [state] CFI Enabled
4,188,218 UART: [art] Extend RT PCRs Done
4,188,646 UART: [art] Lock RT PCRs Done
4,189,741 UART: [art] Populate DV Done
4,198,100 UART: [fht] FMC Alias Private Key: 7
4,199,204 UART: [art] Derive CDI
4,199,484 UART: [art] Store in in slot 0x4
4,285,133 UART: [art] Derive Key Pair
4,285,493 UART: [art] Store priv key in slot 0x5
4,298,949 UART: [art] Derive Key Pair - Done
4,313,827 UART: [art] Signing Cert with AUTHO
4,314,307 UART: RITY.KEYID = 7
4,329,683 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,448 UART: [art] PUB.X = D9288404D929BE699241806AF65D8327C932256B1DCDB64A59D36312E9AB641BB85C8252BBAABB84673CC3CEE063861A
4,337,219 UART: [art] PUB.Y = 84620C450E8FD58C582C71EEE6F9D49E2DE79B3B3FA6EFD6ABF502E8C70030136F32C3FF47F3CA9425007B4AFF88AC29
4,344,132 UART: [art] SIG.R = 5A68E862AF464F1A7B6EB2A227F101E44B66DB381DA92866E49BE0C1211E284E1ACCBCEBBA54270A8BC128D5B77C4B84
4,350,912 UART: [art] SIG.S = 026E9B0C89DB1F9C390D90A737FAC23493C768B1910DEFBA23C0F401A63FD3A6E5D9D0D107EFD6A41D6D8EEAD6A30F5A
4,374,746 UART: Caliptra RT
4,375,091 UART: [state] CFI Enabled
4,658,460 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,092,939 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,794 UART: [kat] LMS
1,169,106 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,174,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,208,972 UART: [ldev] ++
1,209,140 UART: [ldev] CDI.KEYID = 6
1,209,504 UART: [ldev] SUBJECT.KEYID = 5
1,209,931 UART: [ldev] AUTHORITY.KEYID = 7
1,210,394 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,370 UART: [fwproc] Wait for Commands...
1,282,067 UART: [fwproc] Recv command 0x46574c44
1,282,800 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,576 >>> mbox cmd response: success
2,769,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,770,713 UART: [afmc] ++
2,770,881 UART: [afmc] CDI.KEYID = 6
2,771,244 UART: [afmc] SUBJECT.KEYID = 7
2,771,670 UART: [afmc] AUTHORITY.KEYID = 5
2,807,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,390 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,103 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,012 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,726 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,439 UART: [afmc] --
2,850,423 UART: [cold-reset] --
2,851,317 UART: [state] Locking Datavault
2,852,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,158 UART: [state] Locking ICCM
2,853,594 UART: [exit] Launching FMC @ 0x40000130
2,858,923 UART:
2,858,939 UART: Running Caliptra FMC ...
2,859,347 UART:
2,859,401 UART: [state] CFI Enabled
2,869,354 UART: [fht] FMC Alias Private Key: 7
2,977,264 UART: [art] Extend RT PCRs Done
2,977,692 UART: [art] Lock RT PCRs Done
2,979,202 UART: [art] Populate DV Done
2,987,423 UART: [fht] FMC Alias Private Key: 7
2,988,509 UART: [art] Derive CDI
2,988,789 UART: [art] Store in in slot 0x4
3,074,416 UART: [art] Derive Key Pair
3,074,776 UART: [art] Store priv key in slot 0x5
3,087,962 UART: [art] Derive Key Pair - Done
3,102,610 UART: [art] Signing Cert with AUTHO
3,103,090 UART: RITY.KEYID = 7
3,118,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,805 UART: [art] PUB.X = 50D6CA84CDE16CC31D410E24B0B7F9E73D42AC434E42D70CD0F2524C5A5D9A0F3FA3348738CAA6C237C4346E16978ADA
3,125,580 UART: [art] PUB.Y = AE6D854FF59229C6CD5A3E440435A6150BBC11F4D31918FB9EB57E20F0079C19E64DC225DFF30F72AD2C9BE73303F0E4
3,132,527 UART: [art] SIG.R = C4F154BC334195DC633158835FCFCCD30C2D31DA98DD6E5F9F1BD5286150D051433B56B0D5553D2926B883143D54FCAB
3,139,300 UART: [art] SIG.S = E6A9085BAB8FE7F58BC7F829BFE6E943F64CA24CF2BF0B64A1360A7977909FB4ECA5947B2AFBB1AF9BB04F8683DAD4CF
3,163,404 UART: Caliptra RT
3,163,657 UART: [state] CFI Enabled
3,270,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,633 UART:
3,272,649 UART: Running Caliptra ROM ...
3,273,057 UART:
3,273,112 UART: [state] CFI Enabled
3,275,746 UART: [state] LifecycleState = Unprovisioned
3,276,401 UART: [state] DebugLocked = No
3,276,981 UART: [state] WD Timer not started. Device not locked for debugging
3,278,257 UART: [kat] SHA2-256
4,081,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,936 UART: [kat] ++
4,086,088 UART: [kat] sha1
4,090,504 UART: [kat] SHA2-256
4,092,444 UART: [kat] SHA2-384
4,095,337 UART: [kat] SHA2-512-ACC
4,097,237 UART: [kat] ECC-384
4,107,088 UART: [kat] HMAC-384Kdf
4,111,860 UART: [kat] LMS
4,360,172 UART: [kat] --
4,360,798 UART: [update-reset] ++
4,377,294 >>> mbox cmd response: failed
4,377,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,377,594 UART: ROM Non-Fatal Error: 0x000B001E
4,378,446 UART: [state] Locking Datavault
4,379,100 UART: [state] Locking PCR0, PCR1 and PCR31
4,379,704 UART: [state] Locking ICCM
4,380,258 UART: [exit] Launching FMC @ 0x40000130
4,385,587 UART:
4,385,603 UART: Running Caliptra FMC ...
4,386,011 UART:
4,386,065 UART: [state] CFI Enabled
4,475,508 UART: [art] Extend RT PCRs Done
4,475,936 UART: [art] Lock RT PCRs Done
4,477,425 UART: [art] Populate DV Done
4,485,528 UART: [fht] FMC Alias Private Key: 7
4,486,544 UART: [art] Derive CDI
4,486,824 UART: [art] Store in in slot 0x4
4,572,603 UART: [art] Derive Key Pair
4,572,963 UART: [art] Store priv key in slot 0x5
4,585,923 UART: [art] Derive Key Pair - Done
4,600,833 UART: [art] Signing Cert with AUTHO
4,601,313 UART: RITY.KEYID = 7
4,616,409 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,174 UART: [art] PUB.X = 50D6CA84CDE16CC31D410E24B0B7F9E73D42AC434E42D70CD0F2524C5A5D9A0F3FA3348738CAA6C237C4346E16978ADA
4,623,949 UART: [art] PUB.Y = AE6D854FF59229C6CD5A3E440435A6150BBC11F4D31918FB9EB57E20F0079C19E64DC225DFF30F72AD2C9BE73303F0E4
4,630,896 UART: [art] SIG.R = C4F154BC334195DC633158835FCFCCD30C2D31DA98DD6E5F9F1BD5286150D051433B56B0D5553D2926B883143D54FCAB
4,637,669 UART: [art] SIG.S = E6A9085BAB8FE7F58BC7F829BFE6E943F64CA24CF2BF0B64A1360A7977909FB4ECA5947B2AFBB1AF9BB04F8683DAD4CF
4,660,909 UART: Caliptra RT
4,661,162 UART: [state] CFI Enabled
4,941,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,943,351 UART:
4,943,367 UART: Running Caliptra ROM ...
4,943,775 UART:
4,943,830 UART: [state] CFI Enabled
4,946,396 UART: [state] LifecycleState = Unprovisioned
4,947,051 UART: [state] DebugLocked = No
4,947,593 UART: [state] WD Timer not started. Device not locked for debugging
4,948,855 UART: [kat] SHA2-256
5,752,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,756,534 UART: [kat] ++
5,756,686 UART: [kat] sha1
5,760,910 UART: [kat] SHA2-256
5,762,850 UART: [kat] SHA2-384
5,765,565 UART: [kat] SHA2-512-ACC
5,767,465 UART: [kat] ECC-384
5,776,716 UART: [kat] HMAC-384Kdf
5,781,372 UART: [kat] LMS
6,029,684 UART: [kat] --
6,030,696 UART: [update-reset] ++
7,338,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,339,935 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,489,387 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,964 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,190 >>> mbox cmd response: success
2,617,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,679,358 UART:
2,679,374 UART: Running Caliptra FMC ...
2,679,782 UART:
2,679,836 UART: [state] CFI Enabled
2,689,967 UART: [fht] FMC Alias Private Key: 7
2,797,993 UART: [art] Extend RT PCRs Done
2,798,421 UART: [art] Lock RT PCRs Done
2,799,895 UART: [art] Populate DV Done
2,808,284 UART: [fht] FMC Alias Private Key: 7
2,809,434 UART: [art] Derive CDI
2,809,714 UART: [art] Store in in slot 0x4
2,894,989 UART: [art] Derive Key Pair
2,895,349 UART: [art] Store priv key in slot 0x5
2,909,053 UART: [art] Derive Key Pair - Done
2,923,841 UART: [art] Signing Cert with AUTHO
2,924,321 UART: RITY.KEYID = 7
2,939,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,778 UART: [art] PUB.X = 7F13FC96645F93479D1BAA905AC074F4A61CC0ADDBD08CCD51BD209F8B3D6AA371BC9901CFEBEA7A529BB146ED0E95FD
2,946,570 UART: [art] PUB.Y = 02DA53E4C54417DED8FDCE2C1BBC0CCA0377CB4C9BBB2FD33167CB8ABE75E0010B6DFEF7BCC7B845D05199EDC709CD23
2,953,534 UART: [art] SIG.R = AD0D2E1924BA669989A55613392F44373A7FDBF9AA8CF1EFFF193184E9FB215D8A700EED9C5E7D24C3FB4E68049BCA1B
2,960,313 UART: [art] SIG.S = 4B8BD5E2E1770C8629687616B12EBED4C7F1804F9A1BA61DD31F881F3099342E4026EE6911C969770CE6CF4149B57D46
2,984,426 UART: Caliptra RT
2,984,679 UART: [state] CFI Enabled
3,093,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,015 >>> mbox cmd response: failed
4,083,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,088,684 UART:
4,088,700 UART: Running Caliptra FMC ...
4,089,108 UART:
4,089,162 UART: [state] CFI Enabled
4,178,123 UART: [art] Extend RT PCRs Done
4,178,551 UART: [art] Lock RT PCRs Done
4,179,716 UART: [art] Populate DV Done
4,187,667 UART: [fht] FMC Alias Private Key: 7
4,188,785 UART: [art] Derive CDI
4,189,065 UART: [art] Store in in slot 0x4
4,274,756 UART: [art] Derive Key Pair
4,275,116 UART: [art] Store priv key in slot 0x5
4,288,126 UART: [art] Derive Key Pair - Done
4,302,902 UART: [art] Signing Cert with AUTHO
4,303,382 UART: RITY.KEYID = 7
4,318,994 UART: [art] Erasing AUTHORITY.KEYID = 7
4,319,759 UART: [art] PUB.X = 7F13FC96645F93479D1BAA905AC074F4A61CC0ADDBD08CCD51BD209F8B3D6AA371BC9901CFEBEA7A529BB146ED0E95FD
4,326,551 UART: [art] PUB.Y = 02DA53E4C54417DED8FDCE2C1BBC0CCA0377CB4C9BBB2FD33167CB8ABE75E0010B6DFEF7BCC7B845D05199EDC709CD23
4,333,515 UART: [art] SIG.R = AD0D2E1924BA669989A55613392F44373A7FDBF9AA8CF1EFFF193184E9FB215D8A700EED9C5E7D24C3FB4E68049BCA1B
4,340,294 UART: [art] SIG.S = 4B8BD5E2E1770C8629687616B12EBED4C7F1804F9A1BA61DD31F881F3099342E4026EE6911C969770CE6CF4149B57D46
4,364,225 UART: Caliptra RT
4,364,478 UART: [state] CFI Enabled
4,649,283 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,079,165 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,185 UART: [fwproc] Wait for Commands...
1,283,008 UART: [fwproc] Recv command 0x46574c44
1,283,741 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,961 >>> mbox cmd response: success
2,768,961 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,770,052 UART: [afmc] ++
2,770,220 UART: [afmc] CDI.KEYID = 6
2,770,583 UART: [afmc] SUBJECT.KEYID = 7
2,771,009 UART: [afmc] AUTHORITY.KEYID = 5
2,806,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,233 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,946 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,855 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,569 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,450 UART: [afmc] --
2,850,440 UART: [cold-reset] --
2,851,378 UART: [state] Locking Datavault
2,852,371 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,975 UART: [state] Locking ICCM
2,853,575 UART: [exit] Launching FMC @ 0x40000130
2,858,904 UART:
2,858,920 UART: Running Caliptra FMC ...
2,859,328 UART:
2,859,471 UART: [state] CFI Enabled
2,870,278 UART: [fht] FMC Alias Private Key: 7
2,978,462 UART: [art] Extend RT PCRs Done
2,978,890 UART: [art] Lock RT PCRs Done
2,980,428 UART: [art] Populate DV Done
2,988,509 UART: [fht] FMC Alias Private Key: 7
2,989,453 UART: [art] Derive CDI
2,989,733 UART: [art] Store in in slot 0x4
3,075,142 UART: [art] Derive Key Pair
3,075,502 UART: [art] Store priv key in slot 0x5
3,088,992 UART: [art] Derive Key Pair - Done
3,104,140 UART: [art] Signing Cert with AUTHO
3,104,620 UART: RITY.KEYID = 7
3,120,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,841 UART: [art] PUB.X = 0AFA50527EBBE57A268A3DC38294BCDC7CDE698F53228E93607059496A93E083CDF61BAC4C9176CA316C991BEAF76D8E
3,127,622 UART: [art] PUB.Y = 72E9204AD4460E5A347F492AD78D8904A0B13E1D169688F1D7A4C312AFF445297DB7D904C31B6528F378742992C2A9F5
3,134,559 UART: [art] SIG.R = 258885BA8AE5EE9776D4013D49EE38E0179C92231E9339FA89714B00C8646F6CEBEB4427E539CF16D11DE5E9E799AED9
3,141,310 UART: [art] SIG.S = 6D1922682E57849A7E30BFB07E20135418AE678323FAA22D239D14E5015E83EB65AD005636F7917CB13D29AEDEA969B8
3,165,202 UART: Caliptra RT
3,165,547 UART: [state] CFI Enabled
3,273,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,916 UART:
3,274,932 UART: Running Caliptra ROM ...
3,275,340 UART:
3,275,482 UART: [state] CFI Enabled
3,278,288 UART: [state] LifecycleState = Unprovisioned
3,278,943 UART: [state] DebugLocked = No
3,279,501 UART: [state] WD Timer not started. Device not locked for debugging
3,280,823 UART: [kat] SHA2-256
4,084,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,502 UART: [kat] ++
4,088,654 UART: [kat] sha1
4,092,932 UART: [kat] SHA2-256
4,094,872 UART: [kat] SHA2-384
4,097,611 UART: [kat] SHA2-512-ACC
4,099,511 UART: [kat] ECC-384
4,109,662 UART: [kat] HMAC-384Kdf
4,114,446 UART: [kat] LMS
4,362,758 UART: [kat] --
4,363,598 UART: [update-reset] ++
4,380,514 >>> mbox cmd response: failed
4,380,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,380,810 UART: ROM Non-Fatal Error: 0x000B001E
4,381,710 UART: [state] Locking Datavault
4,382,616 UART: [state] Locking PCR0, PCR1 and PCR31
4,383,220 UART: [state] Locking ICCM
4,383,688 UART: [exit] Launching FMC @ 0x40000130
4,389,017 UART:
4,389,033 UART: Running Caliptra FMC ...
4,389,441 UART:
4,389,584 UART: [state] CFI Enabled
4,478,663 UART: [art] Extend RT PCRs Done
4,479,091 UART: [art] Lock RT PCRs Done
4,480,390 UART: [art] Populate DV Done
4,488,663 UART: [fht] FMC Alias Private Key: 7
4,489,747 UART: [art] Derive CDI
4,490,027 UART: [art] Store in in slot 0x4
4,575,868 UART: [art] Derive Key Pair
4,576,228 UART: [art] Store priv key in slot 0x5
4,589,686 UART: [art] Derive Key Pair - Done
4,604,632 UART: [art] Signing Cert with AUTHO
4,605,112 UART: RITY.KEYID = 7
4,620,616 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,381 UART: [art] PUB.X = 0AFA50527EBBE57A268A3DC38294BCDC7CDE698F53228E93607059496A93E083CDF61BAC4C9176CA316C991BEAF76D8E
4,628,162 UART: [art] PUB.Y = 72E9204AD4460E5A347F492AD78D8904A0B13E1D169688F1D7A4C312AFF445297DB7D904C31B6528F378742992C2A9F5
4,635,099 UART: [art] SIG.R = 258885BA8AE5EE9776D4013D49EE38E0179C92231E9339FA89714B00C8646F6CEBEB4427E539CF16D11DE5E9E799AED9
4,641,850 UART: [art] SIG.S = 6D1922682E57849A7E30BFB07E20135418AE678323FAA22D239D14E5015E83EB65AD005636F7917CB13D29AEDEA969B8
4,666,004 UART: Caliptra RT
4,666,349 UART: [state] CFI Enabled
4,945,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,947,865 UART:
4,947,881 UART: Running Caliptra ROM ...
4,948,289 UART:
4,948,431 UART: [state] CFI Enabled
4,950,781 UART: [state] LifecycleState = Unprovisioned
4,951,436 UART: [state] DebugLocked = No
4,952,076 UART: [state] WD Timer not started. Device not locked for debugging
4,953,320 UART: [kat] SHA2-256
5,756,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,760,999 UART: [kat] ++
5,761,151 UART: [kat] sha1
5,765,367 UART: [kat] SHA2-256
5,767,307 UART: [kat] SHA2-384
5,770,218 UART: [kat] SHA2-512-ACC
5,772,118 UART: [kat] ECC-384
5,781,681 UART: [kat] HMAC-384Kdf
5,786,465 UART: [kat] LMS
6,034,777 UART: [kat] --
6,035,797 UART: [update-reset] ++
7,344,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,346,004 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
7,495,456 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,891 >>> mbox cmd response: success
2,619,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,682,165 UART:
2,682,181 UART: Running Caliptra FMC ...
2,682,589 UART:
2,682,732 UART: [state] CFI Enabled
2,693,281 UART: [fht] FMC Alias Private Key: 7
2,801,421 UART: [art] Extend RT PCRs Done
2,801,849 UART: [art] Lock RT PCRs Done
2,803,479 UART: [art] Populate DV Done
2,811,656 UART: [fht] FMC Alias Private Key: 7
2,812,662 UART: [art] Derive CDI
2,812,942 UART: [art] Store in in slot 0x4
2,899,079 UART: [art] Derive Key Pair
2,899,439 UART: [art] Store priv key in slot 0x5
2,912,683 UART: [art] Derive Key Pair - Done
2,927,451 UART: [art] Signing Cert with AUTHO
2,927,931 UART: RITY.KEYID = 7
2,943,161 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,926 UART: [art] PUB.X = 0938086574FDB525769811F3FA8E176F7ADF022B750FE5F65C76B2CACE665E9E8002C4BF7E10F38A62986AC676CF89AB
2,950,689 UART: [art] PUB.Y = EBCD26CDCEF5DCC2A89352E3EBFD069BB528870C2FBDFE1717DE6BC234F6C91842A709121833B154ECE1BD154CE178EF
2,957,654 UART: [art] SIG.R = 48107253E489E11CDA40B79AECCEE07EEADCDBD3EB8AD47F450437132CFCDDE18E4252F3F7ED576849E5FE749C3C46EB
2,964,445 UART: [art] SIG.S = 21ED04E067FEE06507971222FF26812D5B4E2B9126FDA35E6793F462E3CAFBACB1B11B41D5BA81E825D7BADB610FCC31
2,988,855 UART: Caliptra RT
2,989,200 UART: [state] CFI Enabled
3,098,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,723 >>> mbox cmd response: failed
4,088,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,094,876 UART:
4,094,892 UART: Running Caliptra FMC ...
4,095,300 UART:
4,095,443 UART: [state] CFI Enabled
4,184,004 UART: [art] Extend RT PCRs Done
4,184,432 UART: [art] Lock RT PCRs Done
4,185,783 UART: [art] Populate DV Done
4,193,860 UART: [fht] FMC Alias Private Key: 7
4,195,002 UART: [art] Derive CDI
4,195,282 UART: [art] Store in in slot 0x4
4,281,029 UART: [art] Derive Key Pair
4,281,389 UART: [art] Store priv key in slot 0x5
4,294,583 UART: [art] Derive Key Pair - Done
4,309,365 UART: [art] Signing Cert with AUTHO
4,309,845 UART: RITY.KEYID = 7
4,324,903 UART: [art] Erasing AUTHORITY.KEYID = 7
4,325,668 UART: [art] PUB.X = 0938086574FDB525769811F3FA8E176F7ADF022B750FE5F65C76B2CACE665E9E8002C4BF7E10F38A62986AC676CF89AB
4,332,431 UART: [art] PUB.Y = EBCD26CDCEF5DCC2A89352E3EBFD069BB528870C2FBDFE1717DE6BC234F6C91842A709121833B154ECE1BD154CE178EF
4,339,396 UART: [art] SIG.R = 48107253E489E11CDA40B79AECCEE07EEADCDBD3EB8AD47F450437132CFCDDE18E4252F3F7ED576849E5FE749C3C46EB
4,346,187 UART: [art] SIG.S = 21ED04E067FEE06507971222FF26812D5B4E2B9126FDA35E6793F462E3CAFBACB1B11B41D5BA81E825D7BADB610FCC31
4,370,715 UART: Caliptra RT
4,371,060 UART: [state] CFI Enabled
4,653,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,596 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,896 writing to cptra_bootfsm_go
193,176 UART:
193,521 UART: Running Caliptra ROM ...
194,712 UART:
194,868 UART: [state] CFI Enabled
256,807 UART: [state] LifecycleState = Unprovisioned
258,784 UART: [state] DebugLocked = No
260,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,548 UART: [kat] SHA2-256
434,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,794 UART: [kat] ++
445,324 UART: [kat] sha1
455,235 UART: [kat] SHA2-256
457,964 UART: [kat] SHA2-384
463,164 UART: [kat] SHA2-512-ACC
465,563 UART: [kat] ECC-384
2,760,335 UART: [kat] HMAC-384Kdf
2,771,983 UART: [kat] LMS
3,962,251 UART: [kat] --
3,967,285 UART: [cold-reset] ++
3,968,689 UART: [fht] Storing FHT @ 0x50003400
3,980,553 UART: [idev] ++
3,981,115 UART: [idev] CDI.KEYID = 6
3,982,241 UART: [idev] SUBJECT.KEYID = 7
3,983,348 UART: [idev] UDS.KEYID = 0
3,986,102 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,129,381 UART: [idev] Erasing UDS.KEYID = 0
7,319,029 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,444 UART: [idev] --
7,345,549 UART: [ldev] ++
7,346,121 UART: [ldev] CDI.KEYID = 6
7,347,138 UART: [ldev] SUBJECT.KEYID = 5
7,348,299 UART: [ldev] AUTHORITY.KEYID = 7
7,349,485 UART: [ldev] FE.KEYID = 1
7,393,897 UART: [ldev] Erasing FE.KEYID = 1
10,726,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,433 UART: [ldev] --
13,109,581 UART: [fwproc] Waiting for Commands...
13,112,819 UART: [fwproc] Received command 0x46574c44
13,115,002 UART: [fwproc] Received Image of size 113760 bytes
21,591,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,670,531 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,739,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,055,905 >>> mbox cmd response: success
22,057,974 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,201,172 UART: [afmc] ++
22,201,810 UART: [afmc] CDI.KEYID = 6
22,202,885 UART: [afmc] SUBJECT.KEYID = 7
22,203,994 UART: [afmc] AUTHORITY.KEYID = 5
25,418,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,716,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,718,370 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,732,928 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,747,659 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,761,865 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,783,453 UART: [afmc] --
27,788,077 UART: [cold-reset] --
27,790,983 UART: [state] Locking Datavault
27,796,772 UART: [state] Locking PCR0, PCR1 and PCR31
27,798,526 UART: [state] Locking ICCM
27,800,675 UART: [exit] Launching FMC @ 0x40000130
27,809,075 UART:
27,809,321 UART: Running Caliptra FMC ...
27,810,424 UART:
27,810,588 UART: [state] CFI Enabled
27,877,349 UART: [fht] FMC Alias Private Key: 7
30,215,308 UART: [art] Extend RT PCRs Done
30,216,532 UART: [art] Lock RT PCRs Done
30,218,366 UART: [art] Populate DV Done
30,223,851 UART: [fht] FMC Alias Private Key: 7
30,225,555 UART: [art] Derive CDI
30,226,368 UART: [art] Store in in slot 0x4
30,285,385 UART: [art] Derive Key Pair
30,286,420 UART: [art] Store priv key in slot 0x5
33,579,488 UART: [art] Derive Key Pair - Done
33,592,440 UART: [art] Signing Cert with AUTHO
33,593,741 UART: RITY.KEYID = 7
35,879,936 UART: [art] Erasing AUTHORITY.KEYID = 7
35,881,448 UART: [art] PUB.X = D9C94E99A0426D06BCB8CA5E0893FBDA0E50FCA34B0F92615EEDAE610ADDC373D782BC9C32E90162B440DAB503182D72
35,888,693 UART: [art] PUB.Y = FC37A4BF932AA77B30C7CA9C1DFD1FFDE6BB42E421054AE07132F12C0F55968D517FDBB2B8C49D69B4626B385E3BB87A
35,895,940 UART: [art] SIG.R = 4EBA45BFB0417D45D10856CB53BBCADF87CFECE6F12999EF6B04C8297CBA8BF53EF17016CE6FF5E8F09EF02050178C7D
35,903,357 UART: [art] SIG.S = FC18E26593A7B763A32A031C2C2D4F1CD60303BFCD41F1BC11AE67A331634729667CB1599EC6197F5F228D1875DCDF7E
37,208,756 UART: Caliptra RT
37,209,472 UART: [state] CFI Enabled
37,369,491 UART: [rt] RT listening for mailbox commands...
37,372,369 UART:
37,372,631 UART: Running Caliptra ROM ...
37,373,744 UART:
37,373,901 UART: [state] CFI Enabled
37,435,759 UART: [state] LifecycleState = Unprovisioned
37,437,641 UART: [state] DebugLocked = No
37,439,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,443,764 UART: [kat] SHA2-256
37,613,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,623,971 UART: [kat] ++
37,624,423 UART: [kat] sha1
37,635,361 UART: [kat] SHA2-256
37,638,053 UART: [kat] SHA2-384
37,643,938 UART: [kat] SHA2-512-ACC
37,646,297 UART: [kat] ECC-384
39,940,136 UART: [kat] HMAC-384Kdf
39,969,905 UART: [kat] LMS
41,160,235 UART: [kat] --
41,163,647 UART: [update-reset] ++
41,274,177 >>> mbox cmd response: failed
41,275,940 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
41,419,094 UART: ROM Non-Fatal Error: 0x000B003D
41,420,528 UART: [state] Locking Datavault
41,421,685 UART: [state] Locking PCR0, PCR1 and PCR31
41,423,228 UART: [state] Locking ICCM
41,424,139 UART: [exit] Launching FMC @ 0x40000130
41,425,569 UART:
41,425,731 UART: Running Caliptra FMC ...
41,426,836 UART:
41,426,994 UART: [state] CFI Enabled
41,427,832 UART: [art] Extend RT PCRs Done
41,428,884 UART: [art] Lock RT PCRs Done
41,429,967 UART: [art] Populate DV Done
41,431,000 UART: [fht] FMC Alias Private Key: 7
41,432,326 UART: [art] Derive CDI
41,433,087 UART: [art] Store in in slot 0x4
41,461,116 UART: [art] Derive Key Pair
41,462,165 UART: [art] Store priv key in slot 0x5
44,755,564 UART: [art] Derive Key Pair - Done
44,768,798 UART: [art] Signing Cert with AUTHO
44,770,100 UART: RITY.KEYID = 7
47,056,825 UART: [art] Erasing AUTHORITY.KEYID = 7
47,058,339 UART: [art] PUB.X = D9C94E99A0426D06BCB8CA5E0893FBDA0E50FCA34B0F92615EEDAE610ADDC373D782BC9C32E90162B440DAB503182D72
47,065,610 UART: [art] PUB.Y = FC37A4BF932AA77B30C7CA9C1DFD1FFDE6BB42E421054AE07132F12C0F55968D517FDBB2B8C49D69B4626B385E3BB87A
47,072,858 UART: [art] SIG.R = 4EBA45BFB0417D45D10856CB53BBCADF87CFECE6F12999EF6B04C8297CBA8BF53EF17016CE6FF5E8F09EF02050178C7D
47,080,264 UART: [art] SIG.S = FC18E26593A7B763A32A031C2C2D4F1CD60303BFCD41F1BC11AE67A331634729667CB1599EC6197F5F228D1875DCDF7E
48,384,987 UART: Caliptra RT
48,385,689 UART: [state] CFI Enabled
48,720,535 UART: [rt] RT listening for mailbox commands...
48,723,442 UART:
48,723,728 UART: Running Caliptra ROM ...
48,724,841 UART:
48,725,001 UART: [state] CFI Enabled
48,784,749 UART: [state] LifecycleState = Unprovisioned
48,786,691 UART: [state] DebugLocked = No
48,787,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,793,559 UART: [kat] SHA2-256
48,963,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,973,735 UART: [kat] ++
48,974,198 UART: [kat] sha1
48,984,116 UART: [kat] SHA2-256
48,986,809 UART: [kat] SHA2-384
48,993,122 UART: [kat] SHA2-512-ACC
48,995,471 UART: [kat] ECC-384
51,286,736 UART: [kat] HMAC-384Kdf
51,318,890 UART: [kat] LMS
52,509,227 UART: [kat] --
52,513,756 UART: [update-reset] ++
61,072,300 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,075,834 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
61,456,791 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,806,004 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,994,620 >>> mbox cmd response: success
21,996,548 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
27,679,034 UART:
27,679,455 UART: Running Caliptra FMC ...
27,680,599 UART:
27,680,760 UART: [state] CFI Enabled
27,750,689 UART: [fht] FMC Alias Private Key: 7
30,088,310 UART: [art] Extend RT PCRs Done
30,089,533 UART: [art] Lock RT PCRs Done
30,091,086 UART: [art] Populate DV Done
30,096,639 UART: [fht] FMC Alias Private Key: 7
30,098,347 UART: [art] Derive CDI
30,099,169 UART: [art] Store in in slot 0x4
30,160,145 UART: [art] Derive Key Pair
30,161,191 UART: [art] Store priv key in slot 0x5
33,453,967 UART: [art] Derive Key Pair - Done
33,467,020 UART: [art] Signing Cert with AUTHO
33,468,337 UART: RITY.KEYID = 7
35,752,905 UART: [art] Erasing AUTHORITY.KEYID = 7
35,754,425 UART: [art] PUB.X = 15A1876AD850D235372C2344F7229A5303561AC5259FACF8B56CCADEE69E4A77791CD875E7E28AFE1B6EE8278AF86A89
35,761,689 UART: [art] PUB.Y = C5EFFA9EF0E20ADE16D05D263A373452DA120F2403A9512F6200C5B79ECF36E8C1425507B14C9DE55DD6D2B6493828B3
35,768,933 UART: [art] SIG.R = 0F292BA1653A65BFEFB9EA0AB36664A568DF7E66BCB4D9A2395F2552E826E585FCAB7F83D6233946F15F1CA29E68E63B
35,776,342 UART: [art] SIG.S = 78D9D7DBC114F07CE3953450B2724D2EB10FB75CA2892F0CC3E9973CE8B73523106EBFF8D82905626B500FE8D21B3FB6
37,081,625 UART: Caliptra RT
37,082,341 UART: [state] CFI Enabled
37,242,423 UART: [rt] RT listening for mailbox commands...
40,966,035 >>> mbox cmd response: failed
40,967,878 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
41,111,067 UART:
41,111,389 UART: Running Caliptra FMC ...
41,112,429 UART:
41,112,577 UART: [state] CFI Enabled
41,113,458 UART: [art] Extend RT PCRs Done
41,114,538 UART: [art] Lock RT PCRs Done
41,115,613 UART: [art] Populate DV Done
41,116,721 UART: [fht] FMC Alias Private Key: 7
41,118,045 UART: [art] Derive CDI
41,118,785 UART: [art] Store in in slot 0x4
41,141,506 UART: [art] Derive Key Pair
41,142,509 UART: [art] Store priv key in slot 0x5
44,434,698 UART: [art] Derive Key Pair - Done
44,447,756 UART: [art] Signing Cert with AUTHO
44,449,109 UART: RITY.KEYID = 7
46,738,039 UART: [art] Erasing AUTHORITY.KEYID = 7
46,739,550 UART: [art] PUB.X = 15A1876AD850D235372C2344F7229A5303561AC5259FACF8B56CCADEE69E4A77791CD875E7E28AFE1B6EE8278AF86A89
46,746,801 UART: [art] PUB.Y = C5EFFA9EF0E20ADE16D05D263A373452DA120F2403A9512F6200C5B79ECF36E8C1425507B14C9DE55DD6D2B6493828B3
46,754,075 UART: [art] SIG.R = 0F292BA1653A65BFEFB9EA0AB36664A568DF7E66BCB4D9A2395F2552E826E585FCAB7F83D6233946F15F1CA29E68E63B
46,761,444 UART: [art] SIG.S = 78D9D7DBC114F07CE3953450B2724D2EB10FB75CA2892F0CC3E9973CE8B73523106EBFF8D82905626B500FE8D21B3FB6
48,066,742 UART: Caliptra RT
48,067,456 UART: [state] CFI Enabled
48,395,432 UART: [rt] RT listening for mailbox commands...
61,092,534 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,571 UART:
192,919 UART: Running Caliptra ROM ...
194,102 UART:
603,652 UART: [state] CFI Enabled
617,695 UART: [state] LifecycleState = Unprovisioned
619,580 UART: [state] DebugLocked = No
622,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,920 UART: [kat] SHA2-256
796,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,189 UART: [kat] ++
807,790 UART: [kat] sha1
819,382 UART: [kat] SHA2-256
822,063 UART: [kat] SHA2-384
828,526 UART: [kat] SHA2-512-ACC
830,872 UART: [kat] ECC-384
3,113,798 UART: [kat] HMAC-384Kdf
3,125,654 UART: [kat] LMS
4,315,781 UART: [kat] --
4,320,558 UART: [cold-reset] ++
4,323,096 UART: [fht] Storing FHT @ 0x50003400
4,333,775 UART: [idev] ++
4,334,350 UART: [idev] CDI.KEYID = 6
4,335,264 UART: [idev] SUBJECT.KEYID = 7
4,336,555 UART: [idev] UDS.KEYID = 0
4,339,695 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,834 UART: [idev] Erasing UDS.KEYID = 0
7,621,674 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,023 UART: [idev] --
7,646,837 UART: [ldev] ++
7,647,409 UART: [ldev] CDI.KEYID = 6
7,648,373 UART: [ldev] SUBJECT.KEYID = 5
7,649,584 UART: [ldev] AUTHORITY.KEYID = 7
7,650,867 UART: [ldev] FE.KEYID = 1
7,660,434 UART: [ldev] Erasing FE.KEYID = 1
10,952,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,671 UART: [ldev] --
13,314,448 UART: [fwproc] Waiting for Commands...
13,317,358 UART: [fwproc] Received command 0x46574c44
13,319,541 UART: [fwproc] Received Image of size 113760 bytes
22,190,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,275,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,344,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,660,828 >>> mbox cmd response: success
22,663,257 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,806,273 UART: [afmc] ++
22,806,922 UART: [afmc] CDI.KEYID = 6
22,807,810 UART: [afmc] SUBJECT.KEYID = 7
22,808,873 UART: [afmc] AUTHORITY.KEYID = 5
25,983,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,276,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,278,866 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,293,423 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,308,166 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,322,453 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,344,331 UART: [afmc] --
28,348,584 UART: [cold-reset] --
28,352,553 UART: [state] Locking Datavault
28,356,882 UART: [state] Locking PCR0, PCR1 and PCR31
28,358,637 UART: [state] Locking ICCM
28,359,868 UART: [exit] Launching FMC @ 0x40000130
28,368,268 UART:
28,368,508 UART: Running Caliptra FMC ...
28,369,612 UART:
28,369,768 UART: [state] CFI Enabled
28,377,573 UART: [fht] FMC Alias Private Key: 7
30,708,236 UART: [art] Extend RT PCRs Done
30,709,464 UART: [art] Lock RT PCRs Done
30,711,214 UART: [art] Populate DV Done
30,716,590 UART: [fht] FMC Alias Private Key: 7
30,718,061 UART: [art] Derive CDI
30,718,993 UART: [art] Store in in slot 0x4
30,761,378 UART: [art] Derive Key Pair
30,762,379 UART: [art] Store priv key in slot 0x5
34,004,423 UART: [art] Derive Key Pair - Done
34,017,375 UART: [art] Signing Cert with AUTHO
34,018,681 UART: RITY.KEYID = 7
36,298,206 UART: [art] Erasing AUTHORITY.KEYID = 7
36,299,720 UART: [art] PUB.X = 413CF6D8BD709892957AF558A37E7E63C4AA1751EFF0B1CF4B4D90324AC7783625503AC0722FB3908CC1FBCCA42A0383
36,306,964 UART: [art] PUB.Y = 872D8143A323D2EA3500F16F72B7FFE0F915F5D45CD2D06802282BD3FFEAD1BA18FBEDF95F9AF4528E88244253B2EB3A
36,314,217 UART: [art] SIG.R = 058D7C1070CC0592B1CECF405531851CD52D1C6C8E3178B271D744DA5D9E6389D180780A4BCDCC0E74DBE43761828C06
36,321,603 UART: [art] SIG.S = E0DCA7F801B264841E79BE75FCA8B34CA152D5D6A53258D84605BC06B2174E9F705FD36D0954C2FB57FDCBA0432643A8
37,626,822 UART: Caliptra RT
37,627,515 UART: [state] CFI Enabled
37,746,371 UART: [rt] RT listening for mailbox commands...
37,749,702 UART:
37,749,953 UART: Running Caliptra ROM ...
37,751,062 UART:
37,751,331 UART: [state] CFI Enabled
37,764,726 UART: [state] LifecycleState = Unprovisioned
37,766,659 UART: [state] DebugLocked = No
37,769,396 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,773,532 UART: [kat] SHA2-256
37,943,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,953,806 UART: [kat] ++
37,954,347 UART: [kat] sha1
37,965,290 UART: [kat] SHA2-256
37,967,974 UART: [kat] SHA2-384
37,972,770 UART: [kat] SHA2-512-ACC
37,975,170 UART: [kat] ECC-384
40,259,553 UART: [kat] HMAC-384Kdf
40,270,586 UART: [kat] LMS
41,460,648 UART: [kat] --
41,465,466 UART: [update-reset] ++
41,579,503 >>> mbox cmd response: failed
41,582,079 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
41,725,043 UART: ROM Non-Fatal Error: 0x000B003D
41,726,481 UART: [state] Locking Datavault
41,727,635 UART: [state] Locking PCR0, PCR1 and PCR31
41,729,169 UART: [state] Locking ICCM
41,730,076 UART: [exit] Launching FMC @ 0x40000130
41,731,504 UART:
41,731,663 UART: Running Caliptra FMC ...
41,732,759 UART:
41,732,915 UART: [state] CFI Enabled
41,733,875 UART: [art] Extend RT PCRs Done
41,734,984 UART: [art] Lock RT PCRs Done
41,735,992 UART: [art] Populate DV Done
41,736,962 UART: [fht] FMC Alias Private Key: 7
41,738,277 UART: [art] Derive CDI
41,739,011 UART: [art] Store in in slot 0x4
41,740,182 UART: [art] Derive Key Pair
41,741,122 UART: [art] Store priv key in slot 0x5
44,940,311 UART: [art] Derive Key Pair - Done
44,953,136 UART: [art] Signing Cert with AUTHO
44,954,467 UART: RITY.KEYID = 7
47,233,741 UART: [art] Erasing AUTHORITY.KEYID = 7
47,235,248 UART: [art] PUB.X = 413CF6D8BD709892957AF558A37E7E63C4AA1751EFF0B1CF4B4D90324AC7783625503AC0722FB3908CC1FBCCA42A0383
47,242,496 UART: [art] PUB.Y = 872D8143A323D2EA3500F16F72B7FFE0F915F5D45CD2D06802282BD3FFEAD1BA18FBEDF95F9AF4528E88244253B2EB3A
47,249,734 UART: [art] SIG.R = 058D7C1070CC0592B1CECF405531851CD52D1C6C8E3178B271D744DA5D9E6389D180780A4BCDCC0E74DBE43761828C06
47,257,133 UART: [art] SIG.S = E0DCA7F801B264841E79BE75FCA8B34CA152D5D6A53258D84605BC06B2174E9F705FD36D0954C2FB57FDCBA0432643A8
48,562,692 UART: Caliptra RT
48,563,415 UART: [state] CFI Enabled
48,852,822 UART: [rt] RT listening for mailbox commands...
48,855,424 UART:
48,855,588 UART: Running Caliptra ROM ...
48,856,696 UART:
48,857,015 UART: [state] CFI Enabled
48,871,609 UART: [state] LifecycleState = Unprovisioned
48,873,581 UART: [state] DebugLocked = No
48,875,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,881,347 UART: [kat] SHA2-256
49,051,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,061,620 UART: [kat] ++
49,062,082 UART: [kat] sha1
49,073,562 UART: [kat] SHA2-256
49,076,305 UART: [kat] SHA2-384
49,082,244 UART: [kat] SHA2-512-ACC
49,084,622 UART: [kat] ECC-384
51,368,426 UART: [kat] HMAC-384Kdf
51,380,156 UART: [kat] LMS
52,570,220 UART: [kat] --
52,575,073 UART: [update-reset] ++
61,537,941 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,540,989 UART: [update-reset] Loading Runtime at address 0x40005000 len 89056
61,921,970 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
4,126,154 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,096,635 >>> mbox cmd response: success
22,098,704 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
27,732,401 UART:
27,732,817 UART: Running Caliptra FMC ...
27,733,959 UART:
27,734,126 UART: [state] CFI Enabled
27,741,940 UART: [fht] FMC Alias Private Key: 7
30,072,688 UART: [art] Extend RT PCRs Done
30,073,923 UART: [art] Lock RT PCRs Done
30,075,453 UART: [art] Populate DV Done
30,081,183 UART: [fht] FMC Alias Private Key: 7
30,082,900 UART: [art] Derive CDI
30,083,727 UART: [art] Store in in slot 0x4
30,126,432 UART: [art] Derive Key Pair
30,127,436 UART: [art] Store priv key in slot 0x5
33,370,007 UART: [art] Derive Key Pair - Done
33,382,857 UART: [art] Signing Cert with AUTHO
33,384,172 UART: RITY.KEYID = 7
35,663,460 UART: [art] Erasing AUTHORITY.KEYID = 7
35,664,968 UART: [art] PUB.X = 7707E85E86E2B7E7586284D5B321D9E598A730CA045F901F0F024DB4123F9CC70936E7D1DC8BB7C54F9AC9EA303862AE
35,672,227 UART: [art] PUB.Y = 46262980F81479AC30E0D5810711220677DB0382ADDB920DEAB3182A08039023F9875F4A59886AF0742D33B9C0427F07
35,679,454 UART: [art] SIG.R = A968A632B62FD692481D6A4CFD083492E0D66843714DE881DBDD49231E16EE5DED69AD2027F0C050DE811F86AEB9D3E0
35,686,816 UART: [art] SIG.S = 639FB147D9E2D73A4ACF89DB3231CAE648DD6CA032B1CAB8C97916175C6F91A14378C86D6FE92DF988D8C992623B8A51
36,991,960 UART: Caliptra RT
36,992,668 UART: [state] CFI Enabled
37,110,387 UART: [rt] RT listening for mailbox commands...
40,758,767 >>> mbox cmd response: failed
40,760,543 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
40,903,499 UART:
40,903,810 UART: Running Caliptra FMC ...
40,904,933 UART:
40,905,121 UART: [state] CFI Enabled
40,906,046 UART: [art] Extend RT PCRs Done
40,907,188 UART: [art] Lock RT PCRs Done
40,908,256 UART: [art] Populate DV Done
40,909,355 UART: [fht] FMC Alias Private Key: 7
40,910,678 UART: [art] Derive CDI
40,911,411 UART: [art] Store in in slot 0x4
40,912,578 UART: [art] Derive Key Pair
40,913,522 UART: [art] Store priv key in slot 0x5
44,114,333 UART: [art] Derive Key Pair - Done
44,127,491 UART: [art] Signing Cert with AUTHO
44,128,789 UART: RITY.KEYID = 7
46,408,481 UART: [art] Erasing AUTHORITY.KEYID = 7
46,409,994 UART: [art] PUB.X = 7707E85E86E2B7E7586284D5B321D9E598A730CA045F901F0F024DB4123F9CC70936E7D1DC8BB7C54F9AC9EA303862AE
46,417,198 UART: [art] PUB.Y = 46262980F81479AC30E0D5810711220677DB0382ADDB920DEAB3182A08039023F9875F4A59886AF0742D33B9C0427F07
46,424,420 UART: [art] SIG.R = A968A632B62FD692481D6A4CFD083492E0D66843714DE881DBDD49231E16EE5DED69AD2027F0C050DE811F86AEB9D3E0
46,431,858 UART: [art] SIG.S = 639FB147D9E2D73A4ACF89DB3231CAE648DD6CA032B1CAB8C97916175C6F91A14378C86D6FE92DF988D8C992623B8A51
47,737,076 UART: Caliptra RT
47,737,787 UART: [state] CFI Enabled
48,027,093 UART: [rt] RT listening for mailbox commands...
60,569,608 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,186 UART:
192,544 UART: Running Caliptra ROM ...
193,683 UART:
193,831 UART: [state] CFI Enabled
258,196 UART: [state] LifecycleState = Unprovisioned
260,138 UART: [state] DebugLocked = No
262,947 UART: [state] WD Timer not started. Device not locked for debugging
266,499 UART: [kat] SHA2-256
445,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,188 UART: [kat] ++
457,636 UART: [kat] sha1
468,514 UART: [kat] SHA2-256
471,506 UART: [kat] SHA2-384
477,440 UART: [kat] SHA2-512-ACC
480,377 UART: [kat] ECC-384
2,945,298 UART: [kat] HMAC-384Kdf
2,964,995 UART: [kat] LMS
3,494,442 UART: [kat] --
3,498,054 UART: [cold-reset] ++
3,500,530 UART: [fht] FHT @ 0x50003400
3,511,295 UART: [idev] ++
3,511,915 UART: [idev] CDI.KEYID = 6
3,512,828 UART: [idev] SUBJECT.KEYID = 7
3,513,991 UART: [idev] UDS.KEYID = 0
3,517,098 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,660,637 UART: [idev] Erasing UDS.KEYID = 0
6,021,866 UART: [idev] Sha1 KeyId Algorithm
6,044,727 UART: [idev] --
6,048,777 UART: [ldev] ++
6,049,351 UART: [ldev] CDI.KEYID = 6
6,050,265 UART: [ldev] SUBJECT.KEYID = 5
6,051,425 UART: [ldev] AUTHORITY.KEYID = 7
6,052,713 UART: [ldev] FE.KEYID = 1
6,093,516 UART: [ldev] Erasing FE.KEYID = 1
8,598,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,524 UART: [ldev] --
10,406,984 UART: [fwproc] Wait for Commands...
10,409,029 UART: [fwproc] Recv command 0x46574c44
10,411,129 UART: [fwproc] Recv'd Img size: 114084 bytes
14,957,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,033,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,101,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,418,807 >>> mbox cmd response: success
15,420,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,564,438 UART: [afmc] ++
15,565,076 UART: [afmc] CDI.KEYID = 6
15,565,978 UART: [afmc] SUBJECT.KEYID = 7
15,567,023 UART: [afmc] AUTHORITY.KEYID = 5
17,956,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,678,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,679,996 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,696,000 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,711,916 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,727,685 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,750,594 UART: [afmc] --
19,754,329 UART: [cold-reset] --
19,756,155 UART: [state] Locking Datavault
19,761,624 UART: [state] Locking PCR0, PCR1 and PCR31
19,763,266 UART: [state] Locking ICCM
19,765,088 UART: [exit] Launching FMC @ 0x40000130
19,773,543 UART:
19,773,777 UART: Running Caliptra FMC ...
19,774,883 UART:
19,775,040 UART: [state] CFI Enabled
19,837,653 UART: [fht] FMC Alias Private Key: 7
21,601,076 UART: [art] Extend RT PCRs Done
21,602,305 UART: [art] Lock RT PCRs Done
21,603,720 UART: [art] Populate DV Done
21,609,212 UART: [fht] FMC Alias Private Key: 7
21,610,697 UART: [art] Derive CDI
21,611,461 UART: [art] Store in in slot 0x4
21,670,319 UART: [art] Derive Key Pair
21,671,356 UART: [art] Store priv key in slot 0x5
24,134,247 UART: [art] Derive Key Pair - Done
24,147,235 UART: [art] Signing Cert with AUTHO
24,148,572 UART: RITY.KEYID = 7
25,859,347 UART: [art] Erasing AUTHORITY.KEYID = 7
25,860,859 UART: [art] PUB.X = 6E4FD9F7A5D68EC4679EDFFADC0F393C5B7E061B0E7A3E42AFCF1E2AD2D0DCB960A1D68C99A164C34FC1D169C4341EFD
25,868,151 UART: [art] PUB.Y = 46510A9E31E44CB0CC2EB771AF0D799B8E6B5C39CE96B0FB7E9335F45FECAB4348AFB5B07504F04D67F03C44956DE8E0
25,875,425 UART: [art] SIG.R = 24A74CB10CA14150AAEC23179D8227F330CF0899D19367A44E72C7F16D3012D30C109EBC268CA6CA341F202015374E7A
25,882,805 UART: [art] SIG.S = 75AD625F3C5D7C6828AD14C9FED04B4DC533EA463247196558C614A10D33188CB75EA49A9C027CBD954C714492460CB4
26,861,784 UART: Caliptra RT
26,862,480 UART: [state] CFI Enabled
27,025,454 UART: [rt] RT listening for mailbox commands...
27,028,504 UART:
27,028,758 UART: Running Caliptra ROM ...
27,029,785 UART:
27,029,937 UART: [state] CFI Enabled
27,094,646 UART: [state] LifecycleState = Unprovisioned
27,096,539 UART: [state] DebugLocked = No
27,099,374 UART: [state] WD Timer not started. Device not locked for debugging
27,103,331 UART: [kat] SHA2-256
27,282,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,294,060 UART: [kat] ++
27,294,611 UART: [kat] sha1
27,305,128 UART: [kat] SHA2-256
27,308,146 UART: [kat] SHA2-384
27,313,910 UART: [kat] SHA2-512-ACC
27,316,852 UART: [kat] ECC-384
29,775,384 UART: [kat] HMAC-384Kdf
29,799,439 UART: [kat] LMS
30,328,862 UART: [kat] --
30,333,332 UART: [update-reset] ++
30,383,598 >>> mbox cmd response: failed
30,386,029 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,529,495 UART: ROM Non-Fatal Error: 0x000B003D
30,530,926 UART: [state] Locking Datavault
30,531,997 UART: [state] Locking PCR0, PCR1 and PCR31
30,533,526 UART: [state] Locking ICCM
30,534,406 UART: [exit] Launching FMC @ 0x40000130
30,535,746 UART:
30,535,892 UART: Running Caliptra FMC ...
30,536,995 UART:
30,537,148 UART: [state] CFI Enabled
30,537,980 UART: [art] Extend RT PCRs Done
30,539,027 UART: [art] Lock RT PCRs Done
30,540,124 UART: [art] Populate DV Done
30,541,105 UART: [fht] FMC Alias Private Key: 7
30,542,427 UART: [art] Derive CDI
30,543,162 UART: [art] Store in in slot 0x4
30,564,075 UART: [art] Derive Key Pair
30,565,123 UART: [art] Store priv key in slot 0x5
33,028,890 UART: [art] Derive Key Pair - Done
33,041,947 UART: [art] Signing Cert with AUTHO
33,043,254 UART: RITY.KEYID = 7
34,754,668 UART: [art] Erasing AUTHORITY.KEYID = 7
34,756,184 UART: [art] PUB.X = 6E4FD9F7A5D68EC4679EDFFADC0F393C5B7E061B0E7A3E42AFCF1E2AD2D0DCB960A1D68C99A164C34FC1D169C4341EFD
34,763,487 UART: [art] PUB.Y = 46510A9E31E44CB0CC2EB771AF0D799B8E6B5C39CE96B0FB7E9335F45FECAB4348AFB5B07504F04D67F03C44956DE8E0
34,770,784 UART: [art] SIG.R = 24A74CB10CA14150AAEC23179D8227F330CF0899D19367A44E72C7F16D3012D30C109EBC268CA6CA341F202015374E7A
34,778,129 UART: [art] SIG.S = 75AD625F3C5D7C6828AD14C9FED04B4DC533EA463247196558C614A10D33188CB75EA49A9C027CBD954C714492460CB4
35,757,118 UART: Caliptra RT
35,757,834 UART: [state] CFI Enabled
36,091,672 UART: [rt] RT listening for mailbox commands...
36,094,482 UART:
36,094,653 UART: Running Caliptra ROM ...
36,095,769 UART:
36,095,933 UART: [state] CFI Enabled
36,156,664 UART: [state] LifecycleState = Unprovisioned
36,158,591 UART: [state] DebugLocked = No
36,160,379 UART: [state] WD Timer not started. Device not locked for debugging
36,163,736 UART: [kat] SHA2-256
36,342,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,354,423 UART: [kat] ++
36,354,884 UART: [kat] sha1
36,365,711 UART: [kat] SHA2-256
36,368,723 UART: [kat] SHA2-384
36,375,731 UART: [kat] SHA2-512-ACC
36,378,670 UART: [kat] ECC-384
38,843,723 UART: [kat] HMAC-384Kdf
38,865,671 UART: [kat] LMS
39,395,088 UART: [kat] --
39,400,262 UART: [update-reset] ++
43,961,777 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,965,637 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
44,347,699 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,363,856 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,044,226 >>> mbox cmd response: success
15,046,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,327,570 UART:
19,327,992 UART: Running Caliptra FMC ...
19,329,152 UART:
19,329,314 UART: [state] CFI Enabled
19,392,769 UART: [fht] FMC Alias Private Key: 7
21,156,334 UART: [art] Extend RT PCRs Done
21,157,562 UART: [art] Lock RT PCRs Done
21,159,359 UART: [art] Populate DV Done
21,164,780 UART: [fht] FMC Alias Private Key: 7
21,166,321 UART: [art] Derive CDI
21,167,156 UART: [art] Store in in slot 0x4
21,225,412 UART: [art] Derive Key Pair
21,226,450 UART: [art] Store priv key in slot 0x5
23,689,465 UART: [art] Derive Key Pair - Done
23,702,310 UART: [art] Signing Cert with AUTHO
23,703,618 UART: RITY.KEYID = 7
25,414,763 UART: [art] Erasing AUTHORITY.KEYID = 7
25,416,268 UART: [art] PUB.X = F3A4783523632134573FD9B33E714486A6FE3EDBCAD2F7DFD943CEC90B01FEAE3223282514DD0CE1A3B80BA2DCD5D025
25,423,537 UART: [art] PUB.Y = C06D3C2AFCB79CF147990E4B6AF7407C7E87ED8E2EE04D7EEA460CE9C006E14D143DC484374BECF3D23227778A8D3878
25,430,823 UART: [art] SIG.R = A0E513276C5003AFCE311DCF66C677B90C86E69F2DA639EB8071307BF9526334BF6D036A4C8A94D6FB3ED4EC8A26AEB5
25,438,219 UART: [art] SIG.S = 7006606F4F0367CF638B2E39BB75B93AA2A9617BDC61DDDCADA2C46309D184770A8B5083E43E028E7094888ECF79B313
26,417,418 UART: Caliptra RT
26,418,122 UART: [state] CFI Enabled
26,581,734 UART: [rt] RT listening for mailbox commands...
29,803,570 >>> mbox cmd response: failed
29,805,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,949,373 UART:
29,949,693 UART: Running Caliptra FMC ...
29,950,814 UART:
29,950,981 UART: [state] CFI Enabled
29,951,908 UART: [art] Extend RT PCRs Done
29,953,052 UART: [art] Lock RT PCRs Done
29,954,120 UART: [art] Populate DV Done
29,955,188 UART: [fht] FMC Alias Private Key: 7
29,956,514 UART: [art] Derive CDI
29,957,251 UART: [art] Store in in slot 0x4
29,992,721 UART: [art] Derive Key Pair
29,993,762 UART: [art] Store priv key in slot 0x5
32,455,882 UART: [art] Derive Key Pair - Done
32,468,878 UART: [art] Signing Cert with AUTHO
32,470,218 UART: RITY.KEYID = 7
34,181,726 UART: [art] Erasing AUTHORITY.KEYID = 7
34,183,258 UART: [art] PUB.X = F3A4783523632134573FD9B33E714486A6FE3EDBCAD2F7DFD943CEC90B01FEAE3223282514DD0CE1A3B80BA2DCD5D025
34,190,487 UART: [art] PUB.Y = C06D3C2AFCB79CF147990E4B6AF7407C7E87ED8E2EE04D7EEA460CE9C006E14D143DC484374BECF3D23227778A8D3878
34,197,738 UART: [art] SIG.R = A0E513276C5003AFCE311DCF66C677B90C86E69F2DA639EB8071307BF9526334BF6D036A4C8A94D6FB3ED4EC8A26AEB5
34,205,180 UART: [art] SIG.S = 7006606F4F0367CF638B2E39BB75B93AA2A9617BDC61DDDCADA2C46309D184770A8B5083E43E028E7094888ECF79B313
35,183,739 UART: Caliptra RT
35,184,447 UART: [state] CFI Enabled
35,518,436 UART: [rt] RT listening for mailbox commands...
43,503,314 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,671 UART:
193,042 UART: Running Caliptra ROM ...
194,226 UART:
603,745 UART: [state] CFI Enabled
617,025 UART: [state] LifecycleState = Unprovisioned
618,864 UART: [state] DebugLocked = No
620,426 UART: [state] WD Timer not started. Device not locked for debugging
624,025 UART: [kat] SHA2-256
803,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,687 UART: [kat] ++
815,133 UART: [kat] sha1
825,952 UART: [kat] SHA2-256
829,010 UART: [kat] SHA2-384
834,283 UART: [kat] SHA2-512-ACC
837,263 UART: [kat] ECC-384
3,283,303 UART: [kat] HMAC-384Kdf
3,296,838 UART: [kat] LMS
3,826,311 UART: [kat] --
3,830,424 UART: [cold-reset] ++
3,831,380 UART: [fht] FHT @ 0x50003400
3,840,921 UART: [idev] ++
3,841,486 UART: [idev] CDI.KEYID = 6
3,842,365 UART: [idev] SUBJECT.KEYID = 7
3,843,634 UART: [idev] UDS.KEYID = 0
3,846,579 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,096 UART: [idev] Erasing UDS.KEYID = 0
6,314,685 UART: [idev] Sha1 KeyId Algorithm
6,336,041 UART: [idev] --
6,339,932 UART: [ldev] ++
6,340,505 UART: [ldev] CDI.KEYID = 6
6,341,429 UART: [ldev] SUBJECT.KEYID = 5
6,342,587 UART: [ldev] AUTHORITY.KEYID = 7
6,343,818 UART: [ldev] FE.KEYID = 1
6,354,144 UART: [ldev] Erasing FE.KEYID = 1
8,828,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,250 UART: [ldev] --
10,621,036 UART: [fwproc] Wait for Commands...
10,623,749 UART: [fwproc] Recv command 0x46574c44
10,625,793 UART: [fwproc] Recv'd Img size: 114084 bytes
15,186,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,260,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,329,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,645,283 >>> mbox cmd response: success
15,647,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,790,760 UART: [afmc] ++
15,791,405 UART: [afmc] CDI.KEYID = 6
15,792,537 UART: [afmc] SUBJECT.KEYID = 7
15,793,662 UART: [afmc] AUTHORITY.KEYID = 5
18,156,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,876,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,877,912 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,893,861 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,909,850 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,925,641 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,948,707 UART: [afmc] --
19,953,058 UART: [cold-reset] --
19,956,956 UART: [state] Locking Datavault
19,963,991 UART: [state] Locking PCR0, PCR1 and PCR31
19,965,644 UART: [state] Locking ICCM
19,966,914 UART: [exit] Launching FMC @ 0x40000130
19,975,360 UART:
19,975,590 UART: Running Caliptra FMC ...
19,976,616 UART:
19,976,763 UART: [state] CFI Enabled
19,984,863 UART: [fht] FMC Alias Private Key: 7
21,741,180 UART: [art] Extend RT PCRs Done
21,742,399 UART: [art] Lock RT PCRs Done
21,743,973 UART: [art] Populate DV Done
21,749,382 UART: [fht] FMC Alias Private Key: 7
21,751,042 UART: [art] Derive CDI
21,751,862 UART: [art] Store in in slot 0x4
21,794,733 UART: [art] Derive Key Pair
21,795,773 UART: [art] Store priv key in slot 0x5
24,222,476 UART: [art] Derive Key Pair - Done
24,235,788 UART: [art] Signing Cert with AUTHO
24,237,087 UART: RITY.KEYID = 7
25,942,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,943,929 UART: [art] PUB.X = 7A71105EB889E4EAEFAD9BA7D3651E7EB3DECE9E012751054FD7FDBE641078B0A60330C589FAE39B4F833FDB2410C38D
25,951,247 UART: [art] PUB.Y = 9EA8303C93CCE177E926E0F7304D569C288A4DA69E692B6D1C81E956221B91537CE56A91425889549DEFB19B3DB49E97
25,958,510 UART: [art] SIG.R = 9037870936843082619A7D9D82F16AFBBC2EE4FEDE7670D257DEE9667EE13167F4C4A1E868533A2371D7F4093984DE9E
25,965,856 UART: [art] SIG.S = C72573DFACB634BD158D0B339C9E1AA5AC097B952F175485A4A842D76D49E2F699944ECAFC9E5A6EEB6A08263921F70F
26,944,837 UART: Caliptra RT
26,945,521 UART: [state] CFI Enabled
27,062,805 UART: [rt] RT listening for mailbox commands...
27,065,977 UART:
27,066,244 UART: Running Caliptra ROM ...
27,067,349 UART:
27,067,510 UART: [state] CFI Enabled
27,079,182 UART: [state] LifecycleState = Unprovisioned
27,081,056 UART: [state] DebugLocked = No
27,082,925 UART: [state] WD Timer not started. Device not locked for debugging
27,087,475 UART: [kat] SHA2-256
27,266,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,278,254 UART: [kat] ++
27,278,794 UART: [kat] sha1
27,291,195 UART: [kat] SHA2-256
27,294,213 UART: [kat] SHA2-384
27,300,467 UART: [kat] SHA2-512-ACC
27,303,403 UART: [kat] ECC-384
29,743,172 UART: [kat] HMAC-384Kdf
29,756,415 UART: [kat] LMS
30,285,935 UART: [kat] --
30,289,394 UART: [update-reset] ++
30,342,631 >>> mbox cmd response: failed
30,344,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,487,608 UART: ROM Non-Fatal Error: 0x000B003D
30,489,035 UART: [state] Locking Datavault
30,490,144 UART: [state] Locking PCR0, PCR1 and PCR31
30,491,679 UART: [state] Locking ICCM
30,492,588 UART: [exit] Launching FMC @ 0x40000130
30,494,025 UART:
30,494,183 UART: Running Caliptra FMC ...
30,495,194 UART:
30,495,336 UART: [state] CFI Enabled
30,496,167 UART: [art] Extend RT PCRs Done
30,497,303 UART: [art] Lock RT PCRs Done
30,498,290 UART: [art] Populate DV Done
30,499,335 UART: [fht] FMC Alias Private Key: 7
30,500,656 UART: [art] Derive CDI
30,501,391 UART: [art] Store in in slot 0x4
30,502,561 UART: [art] Derive Key Pair
30,503,554 UART: [art] Store priv key in slot 0x5
32,890,756 UART: [art] Derive Key Pair - Done
32,903,428 UART: [art] Signing Cert with AUTHO
32,904,734 UART: RITY.KEYID = 7
34,610,185 UART: [art] Erasing AUTHORITY.KEYID = 7
34,611,684 UART: [art] PUB.X = 7A71105EB889E4EAEFAD9BA7D3651E7EB3DECE9E012751054FD7FDBE641078B0A60330C589FAE39B4F833FDB2410C38D
34,618,990 UART: [art] PUB.Y = 9EA8303C93CCE177E926E0F7304D569C288A4DA69E692B6D1C81E956221B91537CE56A91425889549DEFB19B3DB49E97
34,626,229 UART: [art] SIG.R = 9037870936843082619A7D9D82F16AFBBC2EE4FEDE7670D257DEE9667EE13167F4C4A1E868533A2371D7F4093984DE9E
34,633,626 UART: [art] SIG.S = C72573DFACB634BD158D0B339C9E1AA5AC097B952F175485A4A842D76D49E2F699944ECAFC9E5A6EEB6A08263921F70F
35,612,618 UART: Caliptra RT
35,613,320 UART: [state] CFI Enabled
35,902,778 UART: [rt] RT listening for mailbox commands...
35,905,434 UART:
35,905,628 UART: Running Caliptra ROM ...
35,906,739 UART:
35,906,957 UART: [state] CFI Enabled
40,328,294 UART: [state] LifecycleState = Unprovisioned
40,330,203 UART: [state] DebugLocked = No
40,332,999 UART: [state] WD Timer not started. Device not locked for debugging
40,336,034 UART: [kat] SHA2-256
40,515,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,526,781 UART: [kat] ++
40,527,325 UART: [kat] sha1
40,537,085 UART: [kat] SHA2-256
40,540,106 UART: [kat] SHA2-384
40,546,304 UART: [kat] SHA2-512-ACC
40,549,294 UART: [kat] ECC-384
42,992,572 UART: [kat] HMAC-384Kdf
43,006,049 UART: [kat] LMS
43,535,609 UART: [kat] --
43,538,676 UART: [update-reset] ++
48,117,747 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,121,327 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
48,503,349 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,698,209 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,234,101 >>> mbox cmd response: success
15,236,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
19,482,414 UART:
19,482,908 UART: Running Caliptra FMC ...
19,484,021 UART:
19,484,184 UART: [state] CFI Enabled
19,491,903 UART: [fht] FMC Alias Private Key: 7
21,248,551 UART: [art] Extend RT PCRs Done
21,249,785 UART: [art] Lock RT PCRs Done
21,251,275 UART: [art] Populate DV Done
21,256,563 UART: [fht] FMC Alias Private Key: 7
21,258,225 UART: [art] Derive CDI
21,258,995 UART: [art] Store in in slot 0x4
21,301,611 UART: [art] Derive Key Pair
21,302,618 UART: [art] Store priv key in slot 0x5
23,729,089 UART: [art] Derive Key Pair - Done
23,741,874 UART: [art] Signing Cert with AUTHO
23,743,207 UART: RITY.KEYID = 7
25,448,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,450,201 UART: [art] PUB.X = 5B469DFC9D78452921E3269501BAB79AD24237783E4BF773DE42E6E314F1463CD11A11B1F99A59DF6E50F21B2A8DA3F6
25,457,453 UART: [art] PUB.Y = EE0F61765C992D75DDE8EFD0C40E6D3883EC213504105D4E8C646B2A404EC5F6655CEF4A4F16FDE6F4C44EEEA4CBFCF3
25,464,714 UART: [art] SIG.R = 7073E0F98778308D6B32A6BAA59C309D7C78B9BC4AA0D600280BE79FADB1CA3453353AF3E2C2250E7D36C47FB10E824E
25,472,121 UART: [art] SIG.S = D0EB24D43305C1FD1B166790DD8E09602D23F7000FA03ED81A98A88A58EA3AFFE8DCC73DE64FEEF7E05C3E07DA43168F
26,451,233 UART: Caliptra RT
26,451,940 UART: [state] CFI Enabled
26,569,665 UART: [rt] RT listening for mailbox commands...
29,717,067 >>> mbox cmd response: failed
29,719,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
29,862,883 UART:
29,863,219 UART: Running Caliptra FMC ...
29,864,346 UART:
29,864,510 UART: [state] CFI Enabled
29,865,434 UART: [art] Extend RT PCRs Done
29,866,570 UART: [art] Lock RT PCRs Done
29,867,636 UART: [art] Populate DV Done
29,868,699 UART: [fht] FMC Alias Private Key: 7
29,870,025 UART: [art] Derive CDI
29,870,765 UART: [art] Store in in slot 0x4
29,871,931 UART: [art] Derive Key Pair
29,872,872 UART: [art] Store priv key in slot 0x5
32,254,400 UART: [art] Derive Key Pair - Done
32,267,187 UART: [art] Signing Cert with AUTHO
32,268,501 UART: RITY.KEYID = 7
33,973,904 UART: [art] Erasing AUTHORITY.KEYID = 7
33,975,414 UART: [art] PUB.X = 5B469DFC9D78452921E3269501BAB79AD24237783E4BF773DE42E6E314F1463CD11A11B1F99A59DF6E50F21B2A8DA3F6
33,982,726 UART: [art] PUB.Y = EE0F61765C992D75DDE8EFD0C40E6D3883EC213504105D4E8C646B2A404EC5F6655CEF4A4F16FDE6F4C44EEEA4CBFCF3
33,989,992 UART: [art] SIG.R = 7073E0F98778308D6B32A6BAA59C309D7C78B9BC4AA0D600280BE79FADB1CA3453353AF3E2C2250E7D36C47FB10E824E
33,997,387 UART: [art] SIG.S = D0EB24D43305C1FD1B166790DD8E09602D23F7000FA03ED81A98A88A58EA3AFFE8DCC73DE64FEEF7E05C3E07DA43168F
34,976,781 UART: Caliptra RT
34,977,493 UART: [state] CFI Enabled
35,268,011 UART: [rt] RT listening for mailbox commands...
48,158,839 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,136 UART:
192,516 UART: Running Caliptra ROM ...
193,647 UART:
193,795 UART: [state] CFI Enabled
257,837 UART: [state] LifecycleState = Unprovisioned
260,205 UART: [state] DebugLocked = No
262,332 UART: [state] WD Timer not started. Device not locked for debugging
267,738 UART: [kat] SHA2-256
457,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,419 UART: [kat] ++
468,899 UART: [kat] sha1
480,270 UART: [kat] SHA2-256
483,279 UART: [kat] SHA2-384
490,122 UART: [kat] SHA2-512-ACC
492,690 UART: [kat] ECC-384
2,945,184 UART: [kat] HMAC-384Kdf
2,968,388 UART: [kat] LMS
3,500,159 UART: [kat] --
3,505,849 UART: [cold-reset] ++
3,508,056 UART: [fht] FHT @ 0x50003400
3,518,608 UART: [idev] ++
3,519,290 UART: [idev] CDI.KEYID = 6
3,520,252 UART: [idev] SUBJECT.KEYID = 7
3,521,409 UART: [idev] UDS.KEYID = 0
3,524,322 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,144 UART: [idev] Erasing UDS.KEYID = 0
6,025,196 UART: [idev] Sha1 KeyId Algorithm
6,048,601 UART: [idev] --
6,054,816 UART: [ldev] ++
6,055,500 UART: [ldev] CDI.KEYID = 6
6,056,412 UART: [ldev] SUBJECT.KEYID = 5
6,057,573 UART: [ldev] AUTHORITY.KEYID = 7
6,058,805 UART: [ldev] FE.KEYID = 1
6,096,460 UART: [ldev] Erasing FE.KEYID = 1
8,603,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,542 UART: [ldev] --
10,407,476 UART: [fwproc] Wait for Commands...
10,409,036 UART: [fwproc] Recv command 0x46574c44
10,411,311 UART: [fwproc] Recv'd Img size: 114084 bytes
15,032,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,113,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,229,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
15,770,335 >>> mbox cmd response: success
15,772,450 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,916,068 UART: [afmc] ++
15,916,725 UART: [afmc] CDI.KEYID = 6
15,917,648 UART: [afmc] SUBJECT.KEYID = 7
15,918,760 UART: [afmc] AUTHORITY.KEYID = 5
18,322,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,063,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,065,582 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,080,633 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,095,837 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,110,692 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,134,318 UART: [afmc] --
20,137,745 UART: [cold-reset] --
20,142,315 UART: [state] Locking Datavault
20,148,441 UART: [state] Locking PCR0, PCR1 and PCR31
20,150,638 UART: [state] Locking ICCM
20,152,842 UART: [exit] Launching FMC @ 0x40000130
20,161,518 UART:
20,161,754 UART: Running Caliptra FMC ...
20,162,854 UART:
20,163,013 UART: [state] CFI Enabled
20,221,076 UART: [fht] FMC Alias Private Key: 7
21,984,800 UART: [art] Extend RT PCRs Done
21,986,013 UART: [art] Lock RT PCRs Done
21,987,854 UART: [art] Populate DV Done
21,993,343 UART: [fht] FMC Alias Private Key: 7
21,994,933 UART: [art] Derive CDI
21,995,747 UART: [art] Store in in slot 0x4
22,053,266 UART: [art] Derive Key Pair
22,054,308 UART: [art] Store priv key in slot 0x5
24,516,863 UART: [art] Derive Key Pair - Done
24,529,659 UART: [art] Signing Cert with AUTHO
24,530,969 UART: RITY.KEYID = 7
26,243,125 UART: [art] Erasing AUTHORITY.KEYID = 7
26,244,629 UART: [art] PUB.X = D05516A9D73E2BEA50813494303764EEE4763DA70051513A9774E8709D82FA4A3AF9739245FEEBEDC7CF3BF542077472
26,251,881 UART: [art] PUB.Y = BB250C506EEF6493B229C2802A436B27BB46C92AB69128AEAE1C769DD36C86C3ED3265A388277169FC56EE8E0F2CFCE6
26,259,108 UART: [art] SIG.R = F83C618A67BD7496E6036F09A21177DBA37AA0BA0F360EB121700C89F1B3B2F9B7DC37ADDD9CE11CC3D98693A4DFA672
26,266,548 UART: [art] SIG.S = 1421895B024ED14A39A4D7BE55CE5161A667D24E5040D0FF4A00C791B2D806F739A158CFD05EEA77FA7E48579A07E89E
27,245,543 UART: Caliptra RT
27,246,232 UART: [state] CFI Enabled
27,410,139 UART: [rt] RT listening for mailbox commands...
27,413,439 UART:
27,413,694 UART: Running Caliptra ROM ...
27,414,800 UART:
27,414,955 UART: [state] CFI Enabled
27,476,040 UART: [state] LifecycleState = Unprovisioned
27,478,133 UART: [state] DebugLocked = No
27,479,682 UART: [state] WD Timer not started. Device not locked for debugging
27,484,470 UART: [kat] SHA2-256
27,674,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,685,101 UART: [kat] ++
27,685,559 UART: [kat] sha1
27,696,744 UART: [kat] SHA2-256
27,699,766 UART: [kat] SHA2-384
27,706,570 UART: [kat] SHA2-512-ACC
27,709,122 UART: [kat] ECC-384
30,160,889 UART: [kat] HMAC-384Kdf
30,185,391 UART: [kat] LMS
30,716,934 UART: [kat] --
30,720,293 UART: [update-reset] ++
30,782,119 >>> mbox cmd response: failed
30,783,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,927,438 UART: ROM Non-Fatal Error: 0x000B003D
30,928,871 UART: [state] Locking Datavault
30,930,027 UART: [state] Locking PCR0, PCR1 and PCR31
30,931,567 UART: [state] Locking ICCM
30,932,475 UART: [exit] Launching FMC @ 0x40000130
30,933,897 UART:
30,934,053 UART: Running Caliptra FMC ...
30,935,153 UART:
30,935,308 UART: [state] CFI Enabled
30,936,225 UART: [art] Extend RT PCRs Done
30,937,363 UART: [art] Lock RT PCRs Done
30,938,449 UART: [art] Populate DV Done
30,939,480 UART: [fht] FMC Alias Private Key: 7
30,940,795 UART: [art] Derive CDI
30,941,531 UART: [art] Store in in slot 0x4
30,970,143 UART: [art] Derive Key Pair
30,971,146 UART: [art] Store priv key in slot 0x5
33,434,106 UART: [art] Derive Key Pair - Done
33,446,842 UART: [art] Signing Cert with AUTHO
33,448,143 UART: RITY.KEYID = 7
35,159,621 UART: [art] Erasing AUTHORITY.KEYID = 7
35,161,129 UART: [art] PUB.X = D05516A9D73E2BEA50813494303764EEE4763DA70051513A9774E8709D82FA4A3AF9739245FEEBEDC7CF3BF542077472
35,168,391 UART: [art] PUB.Y = BB250C506EEF6493B229C2802A436B27BB46C92AB69128AEAE1C769DD36C86C3ED3265A388277169FC56EE8E0F2CFCE6
35,175,628 UART: [art] SIG.R = F83C618A67BD7496E6036F09A21177DBA37AA0BA0F360EB121700C89F1B3B2F9B7DC37ADDD9CE11CC3D98693A4DFA672
35,183,035 UART: [art] SIG.S = 1421895B024ED14A39A4D7BE55CE5161A667D24E5040D0FF4A00C791B2D806F739A158CFD05EEA77FA7E48579A07E89E
36,162,324 UART: Caliptra RT
36,163,032 UART: [state] CFI Enabled
36,495,878 UART: [rt] RT listening for mailbox commands...
36,498,683 UART:
36,498,850 UART: Running Caliptra ROM ...
36,499,967 UART:
36,500,123 UART: [state] CFI Enabled
36,566,427 UART: [state] LifecycleState = Unprovisioned
36,568,494 UART: [state] DebugLocked = No
36,569,697 UART: [state] WD Timer not started. Device not locked for debugging
36,572,574 UART: [kat] SHA2-256
36,762,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,772,985 UART: [kat] ++
36,773,442 UART: [kat] sha1
36,784,275 UART: [kat] SHA2-256
36,787,293 UART: [kat] SHA2-384
36,792,414 UART: [kat] SHA2-512-ACC
36,794,991 UART: [kat] ECC-384
39,246,263 UART: [kat] HMAC-384Kdf
39,270,961 UART: [kat] LMS
39,802,546 UART: [kat] --
39,806,697 UART: [update-reset] ++
44,439,725 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,442,456 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
45,048,523 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,441,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,828,947 >>> mbox cmd response: success
15,830,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,115,757 UART:
20,116,229 UART: Running Caliptra FMC ...
20,117,344 UART:
20,117,527 UART: [state] CFI Enabled
20,183,537 UART: [fht] FMC Alias Private Key: 7
21,947,386 UART: [art] Extend RT PCRs Done
21,948,596 UART: [art] Lock RT PCRs Done
21,950,302 UART: [art] Populate DV Done
21,955,658 UART: [fht] FMC Alias Private Key: 7
21,957,359 UART: [art] Derive CDI
21,958,179 UART: [art] Store in in slot 0x4
22,015,219 UART: [art] Derive Key Pair
22,016,267 UART: [art] Store priv key in slot 0x5
24,480,115 UART: [art] Derive Key Pair - Done
24,492,739 UART: [art] Signing Cert with AUTHO
24,494,042 UART: RITY.KEYID = 7
26,206,145 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,655 UART: [art] PUB.X = 22C90811F449E5B1DD5804ABBE42B28C54CEACC4064A03A7E786C516AA92313F2B845A1249ECC329674135BB5648B188
26,214,928 UART: [art] PUB.Y = 9A3C75A4BB53629E21DD01081E3B8FBD2AC70434F3CA9D201851C9929B9C9D22F4D6660EDC1BABB4AAD2A8838A72DAE5
26,222,202 UART: [art] SIG.R = 42929B343515B5820E394D6688383366C286D2BC1A9AA901870AA95E7D8486E3AC81D2E283B8D9E38A7B95FB8ADBDF7A
26,229,587 UART: [art] SIG.S = 22F8AD80309D1EE1C2A676343F9BA37B912E2D875FC810F0D7661EE490D81DC2A02C45B913B5F5652AEC0E3C2CB90223
27,208,697 UART: Caliptra RT
27,209,404 UART: [state] CFI Enabled
27,374,178 UART: [rt] RT listening for mailbox commands...
30,655,011 >>> mbox cmd response: failed
30,657,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,801,202 UART:
30,801,513 UART: Running Caliptra FMC ...
30,802,636 UART:
30,802,803 UART: [state] CFI Enabled
30,803,725 UART: [art] Extend RT PCRs Done
30,804,859 UART: [art] Lock RT PCRs Done
30,805,927 UART: [art] Populate DV Done
30,807,015 UART: [fht] FMC Alias Private Key: 7
30,808,341 UART: [art] Derive CDI
30,809,099 UART: [art] Store in in slot 0x4
30,847,120 UART: [art] Derive Key Pair
30,848,155 UART: [art] Store priv key in slot 0x5
33,311,459 UART: [art] Derive Key Pair - Done
33,324,288 UART: [art] Signing Cert with AUTHO
33,325,619 UART: RITY.KEYID = 7
35,036,644 UART: [art] Erasing AUTHORITY.KEYID = 7
35,038,155 UART: [art] PUB.X = 22C90811F449E5B1DD5804ABBE42B28C54CEACC4064A03A7E786C516AA92313F2B845A1249ECC329674135BB5648B188
35,045,436 UART: [art] PUB.Y = 9A3C75A4BB53629E21DD01081E3B8FBD2AC70434F3CA9D201851C9929B9C9D22F4D6660EDC1BABB4AAD2A8838A72DAE5
35,052,680 UART: [art] SIG.R = 42929B343515B5820E394D6688383366C286D2BC1A9AA901870AA95E7D8486E3AC81D2E283B8D9E38A7B95FB8ADBDF7A
35,060,059 UART: [art] SIG.S = 22F8AD80309D1EE1C2A676343F9BA37B912E2D875FC810F0D7661EE490D81DC2A02C45B913B5F5652AEC0E3C2CB90223
36,038,987 UART: Caliptra RT
36,039,693 UART: [state] CFI Enabled
36,369,939 UART: [rt] RT listening for mailbox commands...
45,138,466 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,385 UART:
192,746 UART: Running Caliptra ROM ...
193,885 UART:
603,613 UART: [state] CFI Enabled
618,630 UART: [state] LifecycleState = Unprovisioned
621,006 UART: [state] DebugLocked = No
623,871 UART: [state] WD Timer not started. Device not locked for debugging
628,069 UART: [kat] SHA2-256
817,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,698 UART: [kat] ++
829,284 UART: [kat] sha1
840,763 UART: [kat] SHA2-256
843,763 UART: [kat] SHA2-384
849,895 UART: [kat] SHA2-512-ACC
852,504 UART: [kat] ECC-384
3,292,992 UART: [kat] HMAC-384Kdf
3,306,139 UART: [kat] LMS
3,837,969 UART: [kat] --
3,843,585 UART: [cold-reset] ++
3,844,706 UART: [fht] FHT @ 0x50003400
3,856,929 UART: [idev] ++
3,857,650 UART: [idev] CDI.KEYID = 6
3,858,585 UART: [idev] SUBJECT.KEYID = 7
3,859,752 UART: [idev] UDS.KEYID = 0
3,862,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,021 UART: [idev] Erasing UDS.KEYID = 0
6,337,170 UART: [idev] Sha1 KeyId Algorithm
6,359,481 UART: [idev] --
6,364,113 UART: [ldev] ++
6,364,788 UART: [ldev] CDI.KEYID = 6
6,365,698 UART: [ldev] SUBJECT.KEYID = 5
6,366,910 UART: [ldev] AUTHORITY.KEYID = 7
6,368,085 UART: [ldev] FE.KEYID = 1
6,378,735 UART: [ldev] Erasing FE.KEYID = 1
8,860,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,359 UART: [ldev] --
10,654,461 UART: [fwproc] Wait for Commands...
10,657,428 UART: [fwproc] Recv command 0x46574c44
10,659,807 UART: [fwproc] Recv'd Img size: 114084 bytes
15,291,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,371,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,487,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,028,601 >>> mbox cmd response: success
16,030,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,173,802 UART: [afmc] ++
16,174,437 UART: [afmc] CDI.KEYID = 6
16,175,358 UART: [afmc] SUBJECT.KEYID = 7
16,176,614 UART: [afmc] AUTHORITY.KEYID = 5
18,538,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,261,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,263,101 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,278,201 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,293,395 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,308,247 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,332,225 UART: [afmc] --
20,336,198 UART: [cold-reset] --
20,340,105 UART: [state] Locking Datavault
20,347,209 UART: [state] Locking PCR0, PCR1 and PCR31
20,349,398 UART: [state] Locking ICCM
20,350,769 UART: [exit] Launching FMC @ 0x40000130
20,359,431 UART:
20,359,667 UART: Running Caliptra FMC ...
20,360,766 UART:
20,360,929 UART: [state] CFI Enabled
20,368,865 UART: [fht] FMC Alias Private Key: 7
22,125,609 UART: [art] Extend RT PCRs Done
22,126,843 UART: [art] Lock RT PCRs Done
22,128,361 UART: [art] Populate DV Done
22,133,822 UART: [fht] FMC Alias Private Key: 7
22,135,414 UART: [art] Derive CDI
22,136,228 UART: [art] Store in in slot 0x4
22,178,753 UART: [art] Derive Key Pair
22,179,796 UART: [art] Store priv key in slot 0x5
24,606,809 UART: [art] Derive Key Pair - Done
24,619,799 UART: [art] Signing Cert with AUTHO
24,621,109 UART: RITY.KEYID = 7
26,326,515 UART: [art] Erasing AUTHORITY.KEYID = 7
26,328,017 UART: [art] PUB.X = 83C638B6EEBCD0995DF46AD63A5C0677CCA75EB23B7EE0ABEEB2301154ADF8AB4496E3B8B48D44F3CA17CF39AE06FACE
26,335,296 UART: [art] PUB.Y = 43EE8E51B2B6F08D9B5AD89B14EC414A6A62FEE4863D719D7036CE8418716F0E6DD82F6C69654ABE4E6E5D4A190400E8
26,342,569 UART: [art] SIG.R = 057879A9D233425205FE518C60AFFD09853C95DAA13CB868A9920B58445B053605157492C12AC689CA5FDEA23EE4194A
26,349,953 UART: [art] SIG.S = 02B8732B4C85D6088F6528DEB8B35AD6ACF854B6DE44B15AC7B9DB63E1364DEFE2768B5EEA9E09EF0DB7FE51C44FA084
27,328,504 UART: Caliptra RT
27,329,229 UART: [state] CFI Enabled
27,447,270 UART: [rt] RT listening for mailbox commands...
27,450,008 UART:
27,450,271 UART: Running Caliptra ROM ...
27,451,318 UART:
27,451,632 UART: [state] CFI Enabled
27,466,386 UART: [state] LifecycleState = Unprovisioned
27,468,301 UART: [state] DebugLocked = No
27,470,360 UART: [state] WD Timer not started. Device not locked for debugging
27,474,538 UART: [kat] SHA2-256
27,664,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,675,168 UART: [kat] ++
27,675,761 UART: [kat] sha1
27,686,656 UART: [kat] SHA2-256
27,689,673 UART: [kat] SHA2-384
27,695,766 UART: [kat] SHA2-512-ACC
27,698,324 UART: [kat] ECC-384
30,140,613 UART: [kat] HMAC-384Kdf
30,153,928 UART: [kat] LMS
30,685,580 UART: [kat] --
30,690,169 UART: [update-reset] ++
30,756,417 >>> mbox cmd response: failed
30,758,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,901,408 UART: ROM Non-Fatal Error: 0x000B003D
30,902,826 UART: [state] Locking Datavault
30,903,978 UART: [state] Locking PCR0, PCR1 and PCR31
30,905,519 UART: [state] Locking ICCM
30,906,398 UART: [exit] Launching FMC @ 0x40000130
30,907,823 UART:
30,907,983 UART: Running Caliptra FMC ...
30,909,086 UART:
30,909,249 UART: [state] CFI Enabled
30,910,198 UART: [art] Extend RT PCRs Done
30,911,253 UART: [art] Lock RT PCRs Done
30,912,234 UART: [art] Populate DV Done
30,913,266 UART: [fht] FMC Alias Private Key: 7
30,914,505 UART: [art] Derive CDI
30,915,235 UART: [art] Store in in slot 0x4
30,916,397 UART: [art] Derive Key Pair
30,917,312 UART: [art] Store priv key in slot 0x5
33,304,487 UART: [art] Derive Key Pair - Done
33,317,212 UART: [art] Signing Cert with AUTHO
33,318,516 UART: RITY.KEYID = 7
35,023,723 UART: [art] Erasing AUTHORITY.KEYID = 7
35,025,248 UART: [art] PUB.X = 83C638B6EEBCD0995DF46AD63A5C0677CCA75EB23B7EE0ABEEB2301154ADF8AB4496E3B8B48D44F3CA17CF39AE06FACE
35,032,557 UART: [art] PUB.Y = 43EE8E51B2B6F08D9B5AD89B14EC414A6A62FEE4863D719D7036CE8418716F0E6DD82F6C69654ABE4E6E5D4A190400E8
35,039,794 UART: [art] SIG.R = 057879A9D233425205FE518C60AFFD09853C95DAA13CB868A9920B58445B053605157492C12AC689CA5FDEA23EE4194A
35,047,144 UART: [art] SIG.S = 02B8732B4C85D6088F6528DEB8B35AD6ACF854B6DE44B15AC7B9DB63E1364DEFE2768B5EEA9E09EF0DB7FE51C44FA084
36,025,769 UART: Caliptra RT
36,026,482 UART: [state] CFI Enabled
36,314,653 UART: [rt] RT listening for mailbox commands...
36,317,503 UART:
36,317,754 UART: Running Caliptra ROM ...
36,318,862 UART:
36,319,133 UART: [state] CFI Enabled
40,322,586 UART: [state] LifecycleState = Unprovisioned
40,324,497 UART: [state] DebugLocked = No
40,325,754 UART: [state] WD Timer not started. Device not locked for debugging
40,330,578 UART: [kat] SHA2-256
40,520,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,531,231 UART: [kat] ++
40,531,749 UART: [kat] sha1
40,543,217 UART: [kat] SHA2-256
40,546,231 UART: [kat] SHA2-384
40,551,322 UART: [kat] SHA2-512-ACC
40,553,939 UART: [kat] ECC-384
42,996,244 UART: [kat] HMAC-384Kdf
43,009,277 UART: [kat] LMS
43,540,889 UART: [kat] --
43,547,256 UART: [update-reset] ++
48,198,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,202,718 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
48,808,811 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,766,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,038,039 >>> mbox cmd response: success
16,040,236 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
20,289,731 UART:
20,290,153 UART: Running Caliptra FMC ...
20,291,273 UART:
20,291,425 UART: [state] CFI Enabled
20,299,498 UART: [fht] FMC Alias Private Key: 7
22,056,715 UART: [art] Extend RT PCRs Done
22,057,928 UART: [art] Lock RT PCRs Done
22,059,744 UART: [art] Populate DV Done
22,065,197 UART: [fht] FMC Alias Private Key: 7
22,066,899 UART: [art] Derive CDI
22,067,637 UART: [art] Store in in slot 0x4
22,110,610 UART: [art] Derive Key Pair
22,111,648 UART: [art] Store priv key in slot 0x5
24,538,794 UART: [art] Derive Key Pair - Done
24,551,803 UART: [art] Signing Cert with AUTHO
24,553,121 UART: RITY.KEYID = 7
26,258,546 UART: [art] Erasing AUTHORITY.KEYID = 7
26,260,042 UART: [art] PUB.X = B7A5ABFEDEEFE69C3A73B13060103FDE77E8C45C4ECC8F37C7E2A758C950235F9604256611AFDD9CEFDA288750A29525
26,267,316 UART: [art] PUB.Y = 7CAA5539EBF6B1751EC028104211D8371F7C5C11CAA309F978B10CF013725D7214F68A55FCE6CBA30763A68B58D7C13E
26,274,588 UART: [art] SIG.R = 9297801743043A84E683A982F374D3D3C1A15FD310C8981B5F08F716B0C6E2D5277B833B77F7212E2CC06AACF2EE6E57
26,281,944 UART: [art] SIG.S = B27413B5EE32A2A40E124ABE28F06EF176929B56814F43ACBE82085A444B4467F08BA7020CB49726C538FC4119E3355D
27,260,899 UART: Caliptra RT
27,261,611 UART: [state] CFI Enabled
27,378,846 UART: [rt] RT listening for mailbox commands...
30,576,084 >>> mbox cmd response: failed
30,577,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,721,356 UART:
30,721,678 UART: Running Caliptra FMC ...
30,722,798 UART:
30,722,957 UART: [state] CFI Enabled
30,723,877 UART: [art] Extend RT PCRs Done
30,725,014 UART: [art] Lock RT PCRs Done
30,726,080 UART: [art] Populate DV Done
30,727,200 UART: [fht] FMC Alias Private Key: 7
30,728,521 UART: [art] Derive CDI
30,729,255 UART: [art] Store in in slot 0x4
30,730,456 UART: [art] Derive Key Pair
30,731,375 UART: [art] Store priv key in slot 0x5
33,113,453 UART: [art] Derive Key Pair - Done
33,126,439 UART: [art] Signing Cert with AUTHO
33,127,789 UART: RITY.KEYID = 7
34,833,117 UART: [art] Erasing AUTHORITY.KEYID = 7
34,834,627 UART: [art] PUB.X = B7A5ABFEDEEFE69C3A73B13060103FDE77E8C45C4ECC8F37C7E2A758C950235F9604256611AFDD9CEFDA288750A29525
34,841,889 UART: [art] PUB.Y = 7CAA5539EBF6B1751EC028104211D8371F7C5C11CAA309F978B10CF013725D7214F68A55FCE6CBA30763A68B58D7C13E
34,849,143 UART: [art] SIG.R = 9297801743043A84E683A982F374D3D3C1A15FD310C8981B5F08F716B0C6E2D5277B833B77F7212E2CC06AACF2EE6E57
34,856,494 UART: [art] SIG.S = B27413B5EE32A2A40E124ABE28F06EF176929B56814F43ACBE82085A444B4467F08BA7020CB49726C538FC4119E3355D
35,835,595 UART: Caliptra RT
35,836,443 UART: [state] CFI Enabled
36,126,040 UART: [rt] RT listening for mailbox commands...
48,975,144 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,601 UART: [kat] SHA2-256
892,539 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,052 UART: [kat] LMS
1,475,248 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,683 UART: [fht] Storing FHT @ 0x50003400
1,479,612 UART: [idev] ++
1,479,780 UART: [idev] CDI.KEYID = 6
1,480,140 UART: [idev] SUBJECT.KEYID = 7
1,480,564 UART: [idev] UDS.KEYID = 0
1,480,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,298 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,846 UART: [idev] --
1,514,815 UART: [ldev] ++
1,514,983 UART: [ldev] CDI.KEYID = 6
1,515,346 UART: [ldev] SUBJECT.KEYID = 5
1,515,772 UART: [ldev] AUTHORITY.KEYID = 7
1,516,235 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,546,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,072 UART: [ldev] --
1,586,465 UART: [fwproc] Waiting for Commands...
1,587,112 UART: [fwproc] Received command 0x46574c44
1,587,903 UART: [fwproc] Received Image of size 114084 bytes
5,156,197 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,184,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,213,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,349,212 >>> mbox cmd response: success
5,349,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,350,382 UART: [afmc] ++
5,350,550 UART: [afmc] CDI.KEYID = 6
5,350,912 UART: [afmc] SUBJECT.KEYID = 7
5,351,337 UART: [afmc] AUTHORITY.KEYID = 5
5,386,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,403,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,403,979 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,409,688 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,415,580 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,421,281 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,428,997 UART: [afmc] --
5,430,033 UART: [cold-reset] --
5,430,813 UART: [state] Locking Datavault
5,432,142 UART: [state] Locking PCR0, PCR1 and PCR31
5,432,746 UART: [state] Locking ICCM
5,433,226 UART: [exit] Launching FMC @ 0x40000130
5,438,555 UART:
5,438,571 UART: Running Caliptra FMC ...
5,438,979 UART:
5,439,033 UART: [state] CFI Enabled
5,449,733 UART: [fht] FMC Alias Private Key: 7
5,557,867 UART: [art] Extend RT PCRs Done
5,558,295 UART: [art] Lock RT PCRs Done
5,559,781 UART: [art] Populate DV Done
5,567,919 UART: [fht] FMC Alias Private Key: 7
5,568,931 UART: [art] Derive CDI
5,569,211 UART: [art] Store in in slot 0x4
5,654,972 UART: [art] Derive Key Pair
5,655,332 UART: [art] Store priv key in slot 0x5
5,667,830 UART: [art] Derive Key Pair - Done
5,682,624 UART: [art] Signing Cert with AUTHO
5,683,104 UART: RITY.KEYID = 7
5,698,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,699,071 UART: [art] PUB.X = C022C8F5E367D104EBA9804FF807DFC898709690A40E4125C06447E95C894AC6A7EBF4D93F6CA49627104A1BD5E2280F
5,705,833 UART: [art] PUB.Y = AA921E4D4C5A8F43679F9C135BD54E8C07EE43B5C4989DF6889A117568542596AD67D0E71B1527ABB82E43BA43BE842D
5,712,786 UART: [art] SIG.R = 39521DDB06379ADCB694E44E9F0A823E020B94090B6A474CAAB792601CD0EB4979E8046725487D4061A88830622363FA
5,719,529 UART: [art] SIG.S = 8A29BD1FEA72E9031E35614079F47A40D6410B5F78FAE9B62698B8AA1433953640187F3E99E78EFA8806C8C0641B4F3A
5,743,491 UART: Caliptra RT
5,743,744 UART: [state] CFI Enabled
5,852,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,402 UART:
5,854,418 UART: Running Caliptra ROM ...
5,854,826 UART:
5,854,880 UART: [state] CFI Enabled
5,857,382 UART: [state] LifecycleState = Unprovisioned
5,858,037 UART: [state] DebugLocked = No
5,858,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,860,300 UART: [kat] SHA2-256
6,654,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,658,346 UART: [kat] ++
6,658,498 UART: [kat] sha1
6,662,890 UART: [kat] SHA2-256
6,664,828 UART: [kat] SHA2-384
6,667,627 UART: [kat] SHA2-512-ACC
6,669,527 UART: [kat] ECC-384
6,675,182 UART: [kat] HMAC-384Kdf
6,679,634 UART: [kat] LMS
7,247,830 UART: [kat] --
7,248,539 UART: [update-reset] ++
7,288,402 >>> mbox cmd response: failed
7,288,402 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
7,289,006 UART: ROM Non-Fatal Error: 0x000B003D
7,289,788 UART: [state] Locking Datavault
7,290,640 UART: [state] Locking PCR0, PCR1 and PCR31
7,291,244 UART: [state] Locking ICCM
7,291,804 UART: [exit] Launching FMC @ 0x40000130
7,297,133 UART:
7,297,149 UART: Running Caliptra FMC ...
7,297,557 UART:
7,297,611 UART: [state] CFI Enabled
7,386,746 UART: [art] Extend RT PCRs Done
7,387,174 UART: [art] Lock RT PCRs Done
7,388,253 UART: [art] Populate DV Done
7,396,619 UART: [fht] FMC Alias Private Key: 7
7,397,551 UART: [art] Derive CDI
7,397,831 UART: [art] Store in in slot 0x4
7,483,206 UART: [art] Derive Key Pair
7,483,566 UART: [art] Store priv key in slot 0x5
7,496,798 UART: [art] Derive Key Pair - Done
7,511,300 UART: [art] Signing Cert with AUTHO
7,511,780 UART: RITY.KEYID = 7
7,527,042 UART: [art] Erasing AUTHORITY.KEYID = 7
7,527,807 UART: [art] PUB.X = C022C8F5E367D104EBA9804FF807DFC898709690A40E4125C06447E95C894AC6A7EBF4D93F6CA49627104A1BD5E2280F
7,534,569 UART: [art] PUB.Y = AA921E4D4C5A8F43679F9C135BD54E8C07EE43B5C4989DF6889A117568542596AD67D0E71B1527ABB82E43BA43BE842D
7,541,522 UART: [art] SIG.R = 39521DDB06379ADCB694E44E9F0A823E020B94090B6A474CAAB792601CD0EB4979E8046725487D4061A88830622363FA
7,548,265 UART: [art] SIG.S = 8A29BD1FEA72E9031E35614079F47A40D6410B5F78FAE9B62698B8AA1433953640187F3E99E78EFA8806C8C0641B4F3A
7,572,077 UART: Caliptra RT
7,572,330 UART: [state] CFI Enabled
7,852,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,854,097 UART:
7,854,113 UART: Running Caliptra ROM ...
7,854,521 UART:
7,854,575 UART: [state] CFI Enabled
7,856,985 UART: [state] LifecycleState = Unprovisioned
7,857,640 UART: [state] DebugLocked = No
7,858,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,859,721 UART: [kat] SHA2-256
8,653,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,657,767 UART: [kat] ++
8,657,919 UART: [kat] sha1
8,662,213 UART: [kat] SHA2-256
8,664,151 UART: [kat] SHA2-384
8,666,894 UART: [kat] SHA2-512-ACC
8,668,794 UART: [kat] ECC-384
8,674,219 UART: [kat] HMAC-384Kdf
8,678,795 UART: [kat] LMS
9,246,991 UART: [kat] --
9,247,708 UART: [update-reset] ++
12,852,778 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,853,872 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
13,003,376 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,123,714 >>> mbox cmd response: success
5,123,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,184,353 UART:
5,184,369 UART: Running Caliptra FMC ...
5,184,777 UART:
5,184,831 UART: [state] CFI Enabled
5,195,215 UART: [fht] FMC Alias Private Key: 7
5,302,519 UART: [art] Extend RT PCRs Done
5,302,947 UART: [art] Lock RT PCRs Done
5,304,601 UART: [art] Populate DV Done
5,312,905 UART: [fht] FMC Alias Private Key: 7
5,313,875 UART: [art] Derive CDI
5,314,155 UART: [art] Store in in slot 0x4
5,399,634 UART: [art] Derive Key Pair
5,399,994 UART: [art] Store priv key in slot 0x5
5,413,580 UART: [art] Derive Key Pair - Done
5,428,613 UART: [art] Signing Cert with AUTHO
5,429,093 UART: RITY.KEYID = 7
5,444,129 UART: [art] Erasing AUTHORITY.KEYID = 7
5,444,894 UART: [art] PUB.X = BC2ACDB5E7A9272B5CCE1A66EC12A9EFA26918CD71E49A5037C23B153AB5176309B05280B1D8FF94AFEE7BC437EB4E26
5,451,681 UART: [art] PUB.Y = 3CD13C97A4D6DB971C66D38E2F54074FCBDB8948ED90488F8C2B30B3D35B70EA6F92F3755AAD2166B7B2179D95A02AEC
5,458,642 UART: [art] SIG.R = 0AD88956C37A78F690801DA7E033576C7F691A048D763F8E9605CD35DA8CD0C40064AC3BF7419E849E3968D39BC81491
5,465,379 UART: [art] SIG.S = F454ADEFC02B94705CD8A40C0FCA7DEA2F0627B0BB920C5AF1AD2A5A18A71B0C16A4EDC51DFE21469AAA39AE8BBD2DBD
5,489,199 UART: Caliptra RT
5,489,452 UART: [state] CFI Enabled
5,597,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,916,261 >>> mbox cmd response: failed
6,916,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,921,972 UART:
6,921,988 UART: Running Caliptra FMC ...
6,922,396 UART:
6,922,450 UART: [state] CFI Enabled
7,010,833 UART: [art] Extend RT PCRs Done
7,011,261 UART: [art] Lock RT PCRs Done
7,012,586 UART: [art] Populate DV Done
7,020,832 UART: [fht] FMC Alias Private Key: 7
7,021,882 UART: [art] Derive CDI
7,022,162 UART: [art] Store in in slot 0x4
7,107,793 UART: [art] Derive Key Pair
7,108,153 UART: [art] Store priv key in slot 0x5
7,121,247 UART: [art] Derive Key Pair - Done
7,135,916 UART: [art] Signing Cert with AUTHO
7,136,396 UART: RITY.KEYID = 7
7,151,572 UART: [art] Erasing AUTHORITY.KEYID = 7
7,152,337 UART: [art] PUB.X = BC2ACDB5E7A9272B5CCE1A66EC12A9EFA26918CD71E49A5037C23B153AB5176309B05280B1D8FF94AFEE7BC437EB4E26
7,159,124 UART: [art] PUB.Y = 3CD13C97A4D6DB971C66D38E2F54074FCBDB8948ED90488F8C2B30B3D35B70EA6F92F3755AAD2166B7B2179D95A02AEC
7,166,085 UART: [art] SIG.R = 0AD88956C37A78F690801DA7E033576C7F691A048D763F8E9605CD35DA8CD0C40064AC3BF7419E849E3968D39BC81491
7,172,822 UART: [art] SIG.S = F454ADEFC02B94705CD8A40C0FCA7DEA2F0627B0BB920C5AF1AD2A5A18A71B0C16A4EDC51DFE21469AAA39AE8BBD2DBD
7,196,356 UART: Caliptra RT
7,196,609 UART: [state] CFI Enabled
7,479,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,435,593 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,572 UART: [kat] SHA2-256
892,510 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,606 UART: [cold-reset] ++
1,477,156 UART: [fht] Storing FHT @ 0x50003400
1,479,809 UART: [idev] ++
1,479,977 UART: [idev] CDI.KEYID = 6
1,480,337 UART: [idev] SUBJECT.KEYID = 7
1,480,761 UART: [idev] UDS.KEYID = 0
1,481,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,727 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,725 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,316 UART: [ldev] Erasing FE.KEYID = 1
1,547,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,752 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 114084 bytes
5,118,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,146,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,176,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
5,311,744 >>> mbox cmd response: success
5,311,744 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,312,772 UART: [afmc] ++
5,312,940 UART: [afmc] CDI.KEYID = 6
5,313,302 UART: [afmc] SUBJECT.KEYID = 7
5,313,727 UART: [afmc] AUTHORITY.KEYID = 5
5,349,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,365,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,366,065 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,371,774 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,377,666 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,383,367 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,391,241 UART: [afmc] --
5,392,361 UART: [cold-reset] --
5,393,227 UART: [state] Locking Datavault
5,394,576 UART: [state] Locking PCR0, PCR1 and PCR31
5,395,180 UART: [state] Locking ICCM
5,395,620 UART: [exit] Launching FMC @ 0x40000130
5,400,949 UART:
5,400,965 UART: Running Caliptra FMC ...
5,401,373 UART:
5,401,516 UART: [state] CFI Enabled
5,411,794 UART: [fht] FMC Alias Private Key: 7
5,519,044 UART: [art] Extend RT PCRs Done
5,519,472 UART: [art] Lock RT PCRs Done
5,521,078 UART: [art] Populate DV Done
5,529,364 UART: [fht] FMC Alias Private Key: 7
5,530,472 UART: [art] Derive CDI
5,530,752 UART: [art] Store in in slot 0x4
5,616,351 UART: [art] Derive Key Pair
5,616,711 UART: [art] Store priv key in slot 0x5
5,630,257 UART: [art] Derive Key Pair - Done
5,644,957 UART: [art] Signing Cert with AUTHO
5,645,437 UART: RITY.KEYID = 7
5,660,921 UART: [art] Erasing AUTHORITY.KEYID = 7
5,661,686 UART: [art] PUB.X = 59D64D1D29B892930ED13C85F14C9F8860D12F0C55D313006ECE393212724ECC7287ECF55FF1CC11469E320E54E956AE
5,668,427 UART: [art] PUB.Y = 1589BA0A192AAE76791008C4CADC0AB34DCA9254BA22970CD92EE8BACFF1C4D76B8D5044FA4DA774DADFD819C4D84B1A
5,675,391 UART: [art] SIG.R = D63109795B9284BB5C9A0972EF322B083FA07D37BAFA3BE6BFF21C03F6353496A559D7D2CB9ABA060E4FB4FA82057A8B
5,682,154 UART: [art] SIG.S = 7796912A2D4640E7025FD343772534FA49C1B4BD3EA84F57B45F2A82C83C516ACC1CEF94F3633BF2FB84FEC384AF36BD
5,706,310 UART: Caliptra RT
5,706,655 UART: [state] CFI Enabled
5,814,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,816,355 UART:
5,816,371 UART: Running Caliptra ROM ...
5,816,779 UART:
5,816,920 UART: [state] CFI Enabled
5,820,178 UART: [state] LifecycleState = Unprovisioned
5,820,833 UART: [state] DebugLocked = No
5,821,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,822,958 UART: [kat] SHA2-256
6,616,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,621,004 UART: [kat] ++
6,621,156 UART: [kat] sha1
6,625,534 UART: [kat] SHA2-256
6,627,472 UART: [kat] SHA2-384
6,630,357 UART: [kat] SHA2-512-ACC
6,632,257 UART: [kat] ECC-384
6,638,082 UART: [kat] HMAC-384Kdf
6,642,842 UART: [kat] LMS
7,211,038 UART: [kat] --
7,211,861 UART: [update-reset] ++
7,252,050 >>> mbox cmd response: failed
7,252,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
7,252,452 UART: ROM Non-Fatal Error: 0x000B003D
7,253,432 UART: [state] Locking Datavault
7,254,152 UART: [state] Locking PCR0, PCR1 and PCR31
7,254,756 UART: [state] Locking ICCM
7,255,288 UART: [exit] Launching FMC @ 0x40000130
7,260,617 UART:
7,260,633 UART: Running Caliptra FMC ...
7,261,041 UART:
7,261,184 UART: [state] CFI Enabled
7,349,889 UART: [art] Extend RT PCRs Done
7,350,317 UART: [art] Lock RT PCRs Done
7,351,688 UART: [art] Populate DV Done
7,360,102 UART: [fht] FMC Alias Private Key: 7
7,361,056 UART: [art] Derive CDI
7,361,336 UART: [art] Store in in slot 0x4
7,447,371 UART: [art] Derive Key Pair
7,447,731 UART: [art] Store priv key in slot 0x5
7,461,285 UART: [art] Derive Key Pair - Done
7,475,997 UART: [art] Signing Cert with AUTHO
7,476,477 UART: RITY.KEYID = 7
7,491,781 UART: [art] Erasing AUTHORITY.KEYID = 7
7,492,546 UART: [art] PUB.X = 59D64D1D29B892930ED13C85F14C9F8860D12F0C55D313006ECE393212724ECC7287ECF55FF1CC11469E320E54E956AE
7,499,287 UART: [art] PUB.Y = 1589BA0A192AAE76791008C4CADC0AB34DCA9254BA22970CD92EE8BACFF1C4D76B8D5044FA4DA774DADFD819C4D84B1A
7,506,251 UART: [art] SIG.R = D63109795B9284BB5C9A0972EF322B083FA07D37BAFA3BE6BFF21C03F6353496A559D7D2CB9ABA060E4FB4FA82057A8B
7,513,014 UART: [art] SIG.S = 7796912A2D4640E7025FD343772534FA49C1B4BD3EA84F57B45F2A82C83C516ACC1CEF94F3633BF2FB84FEC384AF36BD
7,536,882 UART: Caliptra RT
7,537,227 UART: [state] CFI Enabled
7,816,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,818,212 UART:
7,818,228 UART: Running Caliptra ROM ...
7,818,636 UART:
7,818,777 UART: [state] CFI Enabled
7,821,477 UART: [state] LifecycleState = Unprovisioned
7,822,132 UART: [state] DebugLocked = No
7,822,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,824,365 UART: [kat] SHA2-256
8,618,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,622,411 UART: [kat] ++
8,622,563 UART: [kat] sha1
8,626,885 UART: [kat] SHA2-256
8,628,823 UART: [kat] SHA2-384
8,631,448 UART: [kat] SHA2-512-ACC
8,633,348 UART: [kat] ECC-384
8,639,183 UART: [kat] HMAC-384Kdf
8,643,821 UART: [kat] LMS
9,212,017 UART: [kat] --
9,212,630 UART: [update-reset] ++
12,780,389 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,781,495 UART: [update-reset] Loading Runtime at address 0x40005000 len 89400
12,930,999 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,084,812 >>> mbox cmd response: success
5,084,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,147,387 UART:
5,147,403 UART: Running Caliptra FMC ...
5,147,811 UART:
5,147,954 UART: [state] CFI Enabled
5,158,448 UART: [fht] FMC Alias Private Key: 7
5,266,498 UART: [art] Extend RT PCRs Done
5,266,926 UART: [art] Lock RT PCRs Done
5,268,594 UART: [art] Populate DV Done
5,276,698 UART: [fht] FMC Alias Private Key: 7
5,277,800 UART: [art] Derive CDI
5,278,080 UART: [art] Store in in slot 0x4
5,363,593 UART: [art] Derive Key Pair
5,363,953 UART: [art] Store priv key in slot 0x5
5,377,133 UART: [art] Derive Key Pair - Done
5,391,867 UART: [art] Signing Cert with AUTHO
5,392,347 UART: RITY.KEYID = 7
5,407,821 UART: [art] Erasing AUTHORITY.KEYID = 7
5,408,586 UART: [art] PUB.X = 9E8B00FEEE8244B6ADE89D275317FA70A8BCAEDB6C4B735A31C949A8F3F030F0F160A56EFEA1A55BB2CDC85A51666319
5,415,354 UART: [art] PUB.Y = 61601411B656E77FE890D8150D4874EEADA1DE33C73764670B64D965750452FBF79B418EA9018DD39E83834E5DB589DD
5,422,290 UART: [art] SIG.R = D4FE19B5EBA761E0C924EA263EC4C8166870063DA3E035229D2E61DEB52102CB549086F92181A5457AF1C907094690B4
5,429,046 UART: [art] SIG.S = 8C51323E98B6404B62CE71769B62FEA535AF96DC7D680A016F41E22DED0E416C85995CF4D24311F065938ADE2F0A3896
5,452,091 UART: Caliptra RT
5,452,436 UART: [state] CFI Enabled
5,559,704 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,879,385 >>> mbox cmd response: failed
6,879,385 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,885,546 UART:
6,885,562 UART: Running Caliptra FMC ...
6,885,970 UART:
6,886,113 UART: [state] CFI Enabled
6,974,836 UART: [art] Extend RT PCRs Done
6,975,264 UART: [art] Lock RT PCRs Done
6,976,523 UART: [art] Populate DV Done
6,984,727 UART: [fht] FMC Alias Private Key: 7
6,985,815 UART: [art] Derive CDI
6,986,095 UART: [art] Store in in slot 0x4
7,071,590 UART: [art] Derive Key Pair
7,071,950 UART: [art] Store priv key in slot 0x5
7,085,980 UART: [art] Derive Key Pair - Done
7,100,780 UART: [art] Signing Cert with AUTHO
7,101,260 UART: RITY.KEYID = 7
7,116,390 UART: [art] Erasing AUTHORITY.KEYID = 7
7,117,155 UART: [art] PUB.X = 9E8B00FEEE8244B6ADE89D275317FA70A8BCAEDB6C4B735A31C949A8F3F030F0F160A56EFEA1A55BB2CDC85A51666319
7,123,923 UART: [art] PUB.Y = 61601411B656E77FE890D8150D4874EEADA1DE33C73764670B64D965750452FBF79B418EA9018DD39E83834E5DB589DD
7,130,859 UART: [art] SIG.R = D4FE19B5EBA761E0C924EA263EC4C8166870063DA3E035229D2E61DEB52102CB549086F92181A5457AF1C907094690B4
7,137,615 UART: [art] SIG.S = 8C51323E98B6404B62CE71769B62FEA535AF96DC7D680A016F41E22DED0E416C85995CF4D24311F065938ADE2F0A3896
7,160,938 UART: Caliptra RT
7,161,283 UART: [state] CFI Enabled
7,444,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,364,020 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
892,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,063 UART: [kat] ++
897,215 UART: [kat] sha1
901,523 UART: [kat] SHA2-256
903,463 UART: [kat] SHA2-384
906,312 UART: [kat] SHA2-512-ACC
908,213 UART: [kat] ECC-384
918,238 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,825 UART: [cold-reset] ++
1,172,303 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,201,161 UART: [idev] Sha1 KeyId Algorithm
1,209,685 UART: [idev] --
1,210,829 UART: [ldev] ++
1,210,997 UART: [ldev] CDI.KEYID = 6
1,211,360 UART: [ldev] SUBJECT.KEYID = 5
1,211,786 UART: [ldev] AUTHORITY.KEYID = 7
1,212,249 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,619 UART: [ldev] --
1,282,946 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x46574c44
1,284,310 UART: [fwproc] Recv'd Img size: 114084 bytes
3,126,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,318,902 >>> mbox cmd response: success
3,318,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,319,936 UART: [afmc] ++
3,320,104 UART: [afmc] CDI.KEYID = 6
3,320,466 UART: [afmc] SUBJECT.KEYID = 7
3,320,891 UART: [afmc] AUTHORITY.KEYID = 5
3,355,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,344 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,053 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,945 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,656 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,449 UART: [afmc] --
3,399,447 UART: [cold-reset] --
3,400,273 UART: [state] Locking Datavault
3,401,466 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,070 UART: [state] Locking ICCM
3,402,606 UART: [exit] Launching FMC @ 0x40000130
3,407,935 UART:
3,407,951 UART: Running Caliptra FMC ...
3,408,359 UART:
3,408,413 UART: [state] CFI Enabled
3,419,169 UART: [fht] FMC Alias Private Key: 7
3,526,463 UART: [art] Extend RT PCRs Done
3,526,891 UART: [art] Lock RT PCRs Done
3,528,785 UART: [art] Populate DV Done
3,536,677 UART: [fht] FMC Alias Private Key: 7
3,537,735 UART: [art] Derive CDI
3,538,015 UART: [art] Store in in slot 0x4
3,623,834 UART: [art] Derive Key Pair
3,624,194 UART: [art] Store priv key in slot 0x5
3,637,312 UART: [art] Derive Key Pair - Done
3,652,050 UART: [art] Signing Cert with AUTHO
3,652,530 UART: RITY.KEYID = 7
3,667,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,239 UART: [art] PUB.X = 74D10B722B173E4A6BFEC8D6D8F83A2B244F0C2376EA9AC73FF760D70DB32B3CA4F55236256D0ABF458B26944242E859
3,675,005 UART: [art] PUB.Y = E92F64A0C556C38A281A1528F89AFAD6AC63E6BE3BA9A239AA684CAD68AF95E8A92440122E43E371D0219E8685906B8A
3,681,963 UART: [art] SIG.R = 88D83B853D7E5D7FD806A6005F18322935E05669AA7AA88A4F286500E23F22E0123944F3790F74472CD33BF75FA08886
3,688,675 UART: [art] SIG.S = CAA918674C26CC28A58065BD170C61AE0535D276C223401A8323B7EE9C39485AD780A5895717E912B2DE3C7B2D52B5E4
3,712,996 UART: Caliptra RT
3,713,249 UART: [state] CFI Enabled
3,820,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,618 UART:
3,822,634 UART: Running Caliptra ROM ...
3,823,042 UART:
3,823,097 UART: [state] CFI Enabled
3,825,297 UART: [state] LifecycleState = Unprovisioned
3,825,952 UART: [state] DebugLocked = No
3,826,662 UART: [state] WD Timer not started. Device not locked for debugging
3,827,830 UART: [kat] SHA2-256
4,633,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,637,605 UART: [kat] ++
4,637,757 UART: [kat] sha1
4,642,013 UART: [kat] SHA2-256
4,643,953 UART: [kat] SHA2-384
4,646,854 UART: [kat] SHA2-512-ACC
4,648,754 UART: [kat] ECC-384
4,658,897 UART: [kat] HMAC-384Kdf
4,663,487 UART: [kat] LMS
4,911,815 UART: [kat] --
4,912,353 UART: [update-reset] ++
4,930,874 >>> mbox cmd response: failed
4,930,874 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,931,334 UART: ROM Non-Fatal Error: 0x000B003D
4,932,344 UART: [state] Locking Datavault
4,933,136 UART: [state] Locking PCR0, PCR1 and PCR31
4,933,740 UART: [state] Locking ICCM
4,934,378 UART: [exit] Launching FMC @ 0x40000130
4,939,707 UART:
4,939,723 UART: Running Caliptra FMC ...
4,940,131 UART:
4,940,185 UART: [state] CFI Enabled
5,029,234 UART: [art] Extend RT PCRs Done
5,029,662 UART: [art] Lock RT PCRs Done
5,030,795 UART: [art] Populate DV Done
5,039,045 UART: [fht] FMC Alias Private Key: 7
5,040,077 UART: [art] Derive CDI
5,040,357 UART: [art] Store in in slot 0x4
5,126,080 UART: [art] Derive Key Pair
5,126,440 UART: [art] Store priv key in slot 0x5
5,139,836 UART: [art] Derive Key Pair - Done
5,154,478 UART: [art] Signing Cert with AUTHO
5,154,958 UART: RITY.KEYID = 7
5,170,026 UART: [art] Erasing AUTHORITY.KEYID = 7
5,170,791 UART: [art] PUB.X = 74D10B722B173E4A6BFEC8D6D8F83A2B244F0C2376EA9AC73FF760D70DB32B3CA4F55236256D0ABF458B26944242E859
5,177,557 UART: [art] PUB.Y = E92F64A0C556C38A281A1528F89AFAD6AC63E6BE3BA9A239AA684CAD68AF95E8A92440122E43E371D0219E8685906B8A
5,184,515 UART: [art] SIG.R = 88D83B853D7E5D7FD806A6005F18322935E05669AA7AA88A4F286500E23F22E0123944F3790F74472CD33BF75FA08886
5,191,227 UART: [art] SIG.S = CAA918674C26CC28A58065BD170C61AE0535D276C223401A8323B7EE9C39485AD780A5895717E912B2DE3C7B2D52B5E4
5,214,474 UART: Caliptra RT
5,214,727 UART: [state] CFI Enabled
5,496,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,498,411 UART:
5,498,427 UART: Running Caliptra ROM ...
5,498,835 UART:
5,498,890 UART: [state] CFI Enabled
5,501,714 UART: [state] LifecycleState = Unprovisioned
5,502,369 UART: [state] DebugLocked = No
5,503,081 UART: [state] WD Timer not started. Device not locked for debugging
5,504,285 UART: [kat] SHA2-256
6,309,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,314,060 UART: [kat] ++
6,314,212 UART: [kat] sha1
6,318,526 UART: [kat] SHA2-256
6,320,466 UART: [kat] SHA2-384
6,323,307 UART: [kat] SHA2-512-ACC
6,325,207 UART: [kat] ECC-384
6,334,886 UART: [kat] HMAC-384Kdf
6,339,378 UART: [kat] LMS
6,587,706 UART: [kat] --
6,588,554 UART: [update-reset] ++
8,444,441 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,445,452 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
8,594,904 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,385 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,163,296 >>> mbox cmd response: success
3,163,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,225,213 UART:
3,225,229 UART: Running Caliptra FMC ...
3,225,637 UART:
3,225,691 UART: [state] CFI Enabled
3,236,163 UART: [fht] FMC Alias Private Key: 7
3,344,519 UART: [art] Extend RT PCRs Done
3,344,947 UART: [art] Lock RT PCRs Done
3,346,249 UART: [art] Populate DV Done
3,354,527 UART: [fht] FMC Alias Private Key: 7
3,355,457 UART: [art] Derive CDI
3,355,737 UART: [art] Store in in slot 0x4
3,441,458 UART: [art] Derive Key Pair
3,441,818 UART: [art] Store priv key in slot 0x5
3,454,980 UART: [art] Derive Key Pair - Done
3,469,458 UART: [art] Signing Cert with AUTHO
3,469,938 UART: RITY.KEYID = 7
3,485,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,965 UART: [art] PUB.X = 5FEE52AAE5930F9A44F02BDF4DFCD53C451C56E3AD354B6E4E60A5B70B9DDACF76A3BD50BB2C3F1062017B163501F087
3,492,743 UART: [art] PUB.Y = E31418D5A94DCC4555C71E0E2DFEB931746E631F26CBEB972427D771E769851BF373EE025D0E0EDEC56C081D7C0FB1CE
3,499,689 UART: [art] SIG.R = 29A0AEF04FBEF1A5D85FB684321377FB34498132218870156B0987FA0538A6A0ECC3DD754B68E995EC07A4499C4E905D
3,506,452 UART: [art] SIG.S = 49EAD65EF7AB21ABFA9FBEEF609A5C16A808015A6F740AA4138BC5D267B216B3113693CA51996459C7ABE0474C81A90B
3,530,569 UART: Caliptra RT
3,530,822 UART: [state] CFI Enabled
3,638,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,633,741 >>> mbox cmd response: failed
4,633,741 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,639,194 UART:
4,639,210 UART: Running Caliptra FMC ...
4,639,618 UART:
4,639,672 UART: [state] CFI Enabled
4,728,375 UART: [art] Extend RT PCRs Done
4,728,803 UART: [art] Lock RT PCRs Done
4,730,144 UART: [art] Populate DV Done
4,738,366 UART: [fht] FMC Alias Private Key: 7
4,739,412 UART: [art] Derive CDI
4,739,692 UART: [art] Store in in slot 0x4
4,825,337 UART: [art] Derive Key Pair
4,825,697 UART: [art] Store priv key in slot 0x5
4,838,525 UART: [art] Derive Key Pair - Done
4,853,813 UART: [art] Signing Cert with AUTHO
4,854,293 UART: RITY.KEYID = 7
4,869,423 UART: [art] Erasing AUTHORITY.KEYID = 7
4,870,188 UART: [art] PUB.X = 5FEE52AAE5930F9A44F02BDF4DFCD53C451C56E3AD354B6E4E60A5B70B9DDACF76A3BD50BB2C3F1062017B163501F087
4,876,966 UART: [art] PUB.Y = E31418D5A94DCC4555C71E0E2DFEB931746E631F26CBEB972427D771E769851BF373EE025D0E0EDEC56C081D7C0FB1CE
4,883,912 UART: [art] SIG.R = 29A0AEF04FBEF1A5D85FB684321377FB34498132218870156B0987FA0538A6A0ECC3DD754B68E995EC07A4499C4E905D
4,890,675 UART: [art] SIG.S = 49EAD65EF7AB21ABFA9FBEEF609A5C16A808015A6F740AA4138BC5D267B216B3113693CA51996459C7ABE0474C81A90B
4,914,508 UART: Caliptra RT
4,914,761 UART: [state] CFI Enabled
5,196,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,171,424 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
893,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,112 UART: [kat] ++
898,264 UART: [kat] sha1
902,558 UART: [kat] SHA2-256
904,498 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,611 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,802 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,633 UART: [idev] Erasing UDS.KEYID = 0
1,201,750 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,052 UART: [ldev] ++
1,211,220 UART: [ldev] CDI.KEYID = 6
1,211,583 UART: [ldev] SUBJECT.KEYID = 5
1,212,009 UART: [ldev] AUTHORITY.KEYID = 7
1,212,472 UART: [ldev] FE.KEYID = 1
1,217,788 UART: [ldev] Erasing FE.KEYID = 1
1,243,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,908 UART: [ldev] --
1,283,175 UART: [fwproc] Wait for Commands...
1,283,933 UART: [fwproc] Recv command 0x46574c44
1,284,661 UART: [fwproc] Recv'd Img size: 114084 bytes
3,128,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,320,882 >>> mbox cmd response: success
3,320,882 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,322,086 UART: [afmc] ++
3,322,254 UART: [afmc] CDI.KEYID = 6
3,322,616 UART: [afmc] SUBJECT.KEYID = 7
3,323,041 UART: [afmc] AUTHORITY.KEYID = 5
3,358,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,258 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,967 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,859 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,570 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,435 UART: [afmc] --
3,402,353 UART: [cold-reset] --
3,403,305 UART: [state] Locking Datavault
3,404,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,894 UART: [state] Locking ICCM
3,405,388 UART: [exit] Launching FMC @ 0x40000130
3,410,717 UART:
3,410,733 UART: Running Caliptra FMC ...
3,411,141 UART:
3,411,284 UART: [state] CFI Enabled
3,421,832 UART: [fht] FMC Alias Private Key: 7
3,530,078 UART: [art] Extend RT PCRs Done
3,530,506 UART: [art] Lock RT PCRs Done
3,531,872 UART: [art] Populate DV Done
3,540,146 UART: [fht] FMC Alias Private Key: 7
3,541,270 UART: [art] Derive CDI
3,541,550 UART: [art] Store in in slot 0x4
3,627,619 UART: [art] Derive Key Pair
3,627,979 UART: [art] Store priv key in slot 0x5
3,641,561 UART: [art] Derive Key Pair - Done
3,656,137 UART: [art] Signing Cert with AUTHO
3,656,617 UART: RITY.KEYID = 7
3,671,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,610 UART: [art] PUB.X = 8331F0DD995825E771A1024F3DCB7328A4C45F27BD2EDC36F8821BEFA57C4C3E97E57BAB4C013DB4F21BE6635AA03D28
3,679,388 UART: [art] PUB.Y = 0A53BC6293AFC784392E34A83D396D42F755BD6C40E787FAE249B3C97416346AEA1A0717B30CB51F7317FD0EF2129FF2
3,686,332 UART: [art] SIG.R = 0C914B0778808AEF78ECB0FF45EAC22D4226D27346C98DA5E9DF8305A92FA5482129E8AB0FA0E685BBA058B9B8286B8A
3,693,102 UART: [art] SIG.S = BC29BFDDF8AA724E02B75D785BEE545A29B6E723532226CEF97057758D6E2A4C1970DE3E51D19AEDA18A7FBFFCB41AAA
3,717,100 UART: Caliptra RT
3,717,445 UART: [state] CFI Enabled
3,824,919 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,877 UART:
3,826,893 UART: Running Caliptra ROM ...
3,827,301 UART:
3,827,443 UART: [state] CFI Enabled
3,830,387 UART: [state] LifecycleState = Unprovisioned
3,831,042 UART: [state] DebugLocked = No
3,831,658 UART: [state] WD Timer not started. Device not locked for debugging
3,832,954 UART: [kat] SHA2-256
4,638,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,642,729 UART: [kat] ++
4,642,881 UART: [kat] sha1
4,647,115 UART: [kat] SHA2-256
4,649,055 UART: [kat] SHA2-384
4,651,688 UART: [kat] SHA2-512-ACC
4,653,588 UART: [kat] ECC-384
4,662,939 UART: [kat] HMAC-384Kdf
4,667,565 UART: [kat] LMS
4,915,893 UART: [kat] --
4,916,991 UART: [update-reset] ++
4,936,272 >>> mbox cmd response: failed
4,936,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,936,628 UART: ROM Non-Fatal Error: 0x000B003D
4,937,548 UART: [state] Locking Datavault
4,938,440 UART: [state] Locking PCR0, PCR1 and PCR31
4,939,044 UART: [state] Locking ICCM
4,939,518 UART: [exit] Launching FMC @ 0x40000130
4,944,847 UART:
4,944,863 UART: Running Caliptra FMC ...
4,945,271 UART:
4,945,414 UART: [state] CFI Enabled
5,034,135 UART: [art] Extend RT PCRs Done
5,034,563 UART: [art] Lock RT PCRs Done
5,035,568 UART: [art] Populate DV Done
5,043,888 UART: [fht] FMC Alias Private Key: 7
5,044,842 UART: [art] Derive CDI
5,045,122 UART: [art] Store in in slot 0x4
5,130,551 UART: [art] Derive Key Pair
5,130,911 UART: [art] Store priv key in slot 0x5
5,144,741 UART: [art] Derive Key Pair - Done
5,159,349 UART: [art] Signing Cert with AUTHO
5,159,829 UART: RITY.KEYID = 7
5,175,093 UART: [art] Erasing AUTHORITY.KEYID = 7
5,175,858 UART: [art] PUB.X = 8331F0DD995825E771A1024F3DCB7328A4C45F27BD2EDC36F8821BEFA57C4C3E97E57BAB4C013DB4F21BE6635AA03D28
5,182,636 UART: [art] PUB.Y = 0A53BC6293AFC784392E34A83D396D42F755BD6C40E787FAE249B3C97416346AEA1A0717B30CB51F7317FD0EF2129FF2
5,189,580 UART: [art] SIG.R = 0C914B0778808AEF78ECB0FF45EAC22D4226D27346C98DA5E9DF8305A92FA5482129E8AB0FA0E685BBA058B9B8286B8A
5,196,350 UART: [art] SIG.S = BC29BFDDF8AA724E02B75D785BEE545A29B6E723532226CEF97057758D6E2A4C1970DE3E51D19AEDA18A7FBFFCB41AAA
5,220,512 UART: Caliptra RT
5,220,857 UART: [state] CFI Enabled
5,499,989 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,501,726 UART:
5,501,742 UART: Running Caliptra ROM ...
5,502,150 UART:
5,502,292 UART: [state] CFI Enabled
5,505,846 UART: [state] LifecycleState = Unprovisioned
5,506,501 UART: [state] DebugLocked = No
5,507,209 UART: [state] WD Timer not started. Device not locked for debugging
5,508,397 UART: [kat] SHA2-256
6,314,047 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,318,172 UART: [kat] ++
6,318,324 UART: [kat] sha1
6,322,546 UART: [kat] SHA2-256
6,324,486 UART: [kat] SHA2-384
6,327,259 UART: [kat] SHA2-512-ACC
6,329,159 UART: [kat] ECC-384
6,338,746 UART: [kat] HMAC-384Kdf
6,343,302 UART: [kat] LMS
6,591,630 UART: [kat] --
6,592,570 UART: [update-reset] ++
8,450,540 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,451,539 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
8,600,991 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,172,601 >>> mbox cmd response: success
3,172,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,234,314 UART:
3,234,330 UART: Running Caliptra FMC ...
3,234,738 UART:
3,234,881 UART: [state] CFI Enabled
3,245,453 UART: [fht] FMC Alias Private Key: 7
3,353,483 UART: [art] Extend RT PCRs Done
3,353,911 UART: [art] Lock RT PCRs Done
3,355,599 UART: [art] Populate DV Done
3,363,889 UART: [fht] FMC Alias Private Key: 7
3,364,917 UART: [art] Derive CDI
3,365,197 UART: [art] Store in in slot 0x4
3,450,708 UART: [art] Derive Key Pair
3,451,068 UART: [art] Store priv key in slot 0x5
3,465,016 UART: [art] Derive Key Pair - Done
3,479,780 UART: [art] Signing Cert with AUTHO
3,480,260 UART: RITY.KEYID = 7
3,495,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,201 UART: [art] PUB.X = 678DB0F78351DCAE58AA44A2CCDBAFCAA1465B9F2499C9F06DD73B0A7216EEED9046565CA72FEF40B4D04CF5CD077134
3,502,987 UART: [art] PUB.Y = 692EE42D15CA4037E4C9FFCA024EFF2C867A254693661D5DA707C6CECC24CC40F32BC77110236BB07F9A7E1FE2468E2C
3,509,945 UART: [art] SIG.R = 0452C8336982F48B7DC06C649F09C35113FA9C9D99B9E9764FEB52DB358556031E09BB51F7F54B1E55725AD79C5A917F
3,516,703 UART: [art] SIG.S = 1B1BE62300688F30C5CFA2D3AB0B5B1421E4622C3FD16679623689D910941E04B2177FE59469693A2ECAEDAEB333669D
3,540,176 UART: Caliptra RT
3,540,521 UART: [state] CFI Enabled
3,647,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,643,557 >>> mbox cmd response: failed
4,643,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,649,394 UART:
4,649,410 UART: Running Caliptra FMC ...
4,649,818 UART:
4,649,961 UART: [state] CFI Enabled
4,738,856 UART: [art] Extend RT PCRs Done
4,739,284 UART: [art] Lock RT PCRs Done
4,740,521 UART: [art] Populate DV Done
4,748,747 UART: [fht] FMC Alias Private Key: 7
4,749,927 UART: [art] Derive CDI
4,750,207 UART: [art] Store in in slot 0x4
4,836,346 UART: [art] Derive Key Pair
4,836,706 UART: [art] Store priv key in slot 0x5
4,849,896 UART: [art] Derive Key Pair - Done
4,864,736 UART: [art] Signing Cert with AUTHO
4,865,216 UART: RITY.KEYID = 7
4,880,044 UART: [art] Erasing AUTHORITY.KEYID = 7
4,880,809 UART: [art] PUB.X = 678DB0F78351DCAE58AA44A2CCDBAFCAA1465B9F2499C9F06DD73B0A7216EEED9046565CA72FEF40B4D04CF5CD077134
4,887,595 UART: [art] PUB.Y = 692EE42D15CA4037E4C9FFCA024EFF2C867A254693661D5DA707C6CECC24CC40F32BC77110236BB07F9A7E1FE2468E2C
4,894,553 UART: [art] SIG.R = 0452C8336982F48B7DC06C649F09C35113FA9C9D99B9E9764FEB52DB358556031E09BB51F7F54B1E55725AD79C5A917F
4,901,311 UART: [art] SIG.S = 1B1BE62300688F30C5CFA2D3AB0B5B1421E4622C3FD16679623689D910941E04B2177FE59469693A2ECAEDAEB333669D
4,925,820 UART: Caliptra RT
4,926,165 UART: [state] CFI Enabled
5,207,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,190,487 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,173,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,197,933 UART: [idev] Sha1 KeyId Algorithm
1,206,967 UART: [idev] --
1,207,998 UART: [ldev] ++
1,208,166 UART: [ldev] CDI.KEYID = 6
1,208,530 UART: [ldev] SUBJECT.KEYID = 5
1,208,957 UART: [ldev] AUTHORITY.KEYID = 7
1,209,420 UART: [ldev] FE.KEYID = 1
1,214,454 UART: [ldev] Erasing FE.KEYID = 1
1,240,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,688 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,280,927 UART: [fwproc] Recv command 0x46574c44
1,281,660 UART: [fwproc] Recv'd Img size: 114084 bytes
3,122,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,315,629 >>> mbox cmd response: success
3,315,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,316,892 UART: [afmc] ++
3,317,060 UART: [afmc] CDI.KEYID = 6
3,317,423 UART: [afmc] SUBJECT.KEYID = 7
3,317,849 UART: [afmc] AUTHORITY.KEYID = 5
3,354,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,998 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,708 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,598 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,309 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,291 UART: [afmc] --
3,397,215 UART: [cold-reset] --
3,398,061 UART: [state] Locking Datavault
3,399,152 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,756 UART: [state] Locking ICCM
3,400,390 UART: [exit] Launching FMC @ 0x40000130
3,405,719 UART:
3,405,735 UART: Running Caliptra FMC ...
3,406,143 UART:
3,406,197 UART: [state] CFI Enabled
3,416,395 UART: [fht] FMC Alias Private Key: 7
3,523,711 UART: [art] Extend RT PCRs Done
3,524,139 UART: [art] Lock RT PCRs Done
3,525,445 UART: [art] Populate DV Done
3,533,611 UART: [fht] FMC Alias Private Key: 7
3,534,581 UART: [art] Derive CDI
3,534,861 UART: [art] Store in in slot 0x4
3,620,892 UART: [art] Derive Key Pair
3,621,252 UART: [art] Store priv key in slot 0x5
3,634,512 UART: [art] Derive Key Pair - Done
3,649,271 UART: [art] Signing Cert with AUTHO
3,649,751 UART: RITY.KEYID = 7
3,665,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,904 UART: [art] PUB.X = 80A125B79A683C0B914ACC79FF61E36A4F6EA38F13B3BE2BFAB623B6D48605287F2385C6924FA392694BFF73871BC4BF
3,672,678 UART: [art] PUB.Y = 0261ED08CA8A9FAC9BD8B682B1BDEDEF32F779B1ADD4FD5D75529917463EA3699FD90198D5105AE5B5D69E02B091D10D
3,679,629 UART: [art] SIG.R = 3C3A75E2FB9EF3D0F4E54BD3DAF77F3BA1E00AE0C55BF9BF7331DAACD3D3848A29FF327FB3C8444AF0961B7EC01CCD1E
3,686,428 UART: [art] SIG.S = 3C0BEEFC29A2D7B49707B6C770D0937091738A79F8D52F1D3DA1C0CCEF498DE4EFFDD2569736E0EA87C9BB280D89432C
3,710,312 UART: Caliptra RT
3,710,565 UART: [state] CFI Enabled
3,818,634 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,126 UART:
3,820,142 UART: Running Caliptra ROM ...
3,820,550 UART:
3,820,605 UART: [state] CFI Enabled
3,823,427 UART: [state] LifecycleState = Unprovisioned
3,824,082 UART: [state] DebugLocked = No
3,824,672 UART: [state] WD Timer not started. Device not locked for debugging
3,825,906 UART: [kat] SHA2-256
4,629,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,633,585 UART: [kat] ++
4,633,737 UART: [kat] sha1
4,638,029 UART: [kat] SHA2-256
4,639,969 UART: [kat] SHA2-384
4,642,702 UART: [kat] SHA2-512-ACC
4,644,602 UART: [kat] ECC-384
4,654,223 UART: [kat] HMAC-384Kdf
4,658,839 UART: [kat] LMS
4,907,151 UART: [kat] --
4,907,937 UART: [update-reset] ++
4,925,627 >>> mbox cmd response: failed
4,925,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,926,153 UART: ROM Non-Fatal Error: 0x000B003D
4,926,981 UART: [state] Locking Datavault
4,927,683 UART: [state] Locking PCR0, PCR1 and PCR31
4,928,287 UART: [state] Locking ICCM
4,928,849 UART: [exit] Launching FMC @ 0x40000130
4,934,178 UART:
4,934,194 UART: Running Caliptra FMC ...
4,934,602 UART:
4,934,656 UART: [state] CFI Enabled
5,023,367 UART: [art] Extend RT PCRs Done
5,023,795 UART: [art] Lock RT PCRs Done
5,025,014 UART: [art] Populate DV Done
5,033,162 UART: [fht] FMC Alias Private Key: 7
5,034,270 UART: [art] Derive CDI
5,034,550 UART: [art] Store in in slot 0x4
5,120,315 UART: [art] Derive Key Pair
5,120,675 UART: [art] Store priv key in slot 0x5
5,133,721 UART: [art] Derive Key Pair - Done
5,148,474 UART: [art] Signing Cert with AUTHO
5,148,954 UART: RITY.KEYID = 7
5,164,242 UART: [art] Erasing AUTHORITY.KEYID = 7
5,165,007 UART: [art] PUB.X = 80A125B79A683C0B914ACC79FF61E36A4F6EA38F13B3BE2BFAB623B6D48605287F2385C6924FA392694BFF73871BC4BF
5,171,781 UART: [art] PUB.Y = 0261ED08CA8A9FAC9BD8B682B1BDEDEF32F779B1ADD4FD5D75529917463EA3699FD90198D5105AE5B5D69E02B091D10D
5,178,732 UART: [art] SIG.R = 3C3A75E2FB9EF3D0F4E54BD3DAF77F3BA1E00AE0C55BF9BF7331DAACD3D3848A29FF327FB3C8444AF0961B7EC01CCD1E
5,185,531 UART: [art] SIG.S = 3C0BEEFC29A2D7B49707B6C770D0937091738A79F8D52F1D3DA1C0CCEF498DE4EFFDD2569736E0EA87C9BB280D89432C
5,208,953 UART: Caliptra RT
5,209,206 UART: [state] CFI Enabled
5,488,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,490,458 UART:
5,490,474 UART: Running Caliptra ROM ...
5,490,882 UART:
5,490,937 UART: [state] CFI Enabled
5,493,183 UART: [state] LifecycleState = Unprovisioned
5,493,838 UART: [state] DebugLocked = No
5,494,386 UART: [state] WD Timer not started. Device not locked for debugging
5,495,546 UART: [kat] SHA2-256
6,299,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,303,225 UART: [kat] ++
6,303,377 UART: [kat] sha1
6,307,717 UART: [kat] SHA2-256
6,309,657 UART: [kat] SHA2-384
6,312,372 UART: [kat] SHA2-512-ACC
6,314,272 UART: [kat] ECC-384
6,324,065 UART: [kat] HMAC-384Kdf
6,328,627 UART: [kat] LMS
6,576,939 UART: [kat] --
6,577,553 UART: [update-reset] ++
8,433,495 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,434,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
8,584,076 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,453 >>> mbox cmd response: success
3,166,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,228,952 UART:
3,228,968 UART: Running Caliptra FMC ...
3,229,376 UART:
3,229,430 UART: [state] CFI Enabled
3,240,176 UART: [fht] FMC Alias Private Key: 7
3,348,404 UART: [art] Extend RT PCRs Done
3,348,832 UART: [art] Lock RT PCRs Done
3,350,526 UART: [art] Populate DV Done
3,358,638 UART: [fht] FMC Alias Private Key: 7
3,359,620 UART: [art] Derive CDI
3,359,900 UART: [art] Store in in slot 0x4
3,445,367 UART: [art] Derive Key Pair
3,445,727 UART: [art] Store priv key in slot 0x5
3,459,277 UART: [art] Derive Key Pair - Done
3,473,925 UART: [art] Signing Cert with AUTHO
3,474,405 UART: RITY.KEYID = 7
3,490,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,160 UART: [art] PUB.X = CCB6916C1EE7C6432AFE0977ABC905B4D07116C7BFDBF02DB148EA442A27C6ED7C36E62BFA7A10C51F443151956C55BF
3,497,942 UART: [art] PUB.Y = 3EBC8A27A3019B6DED0894552F4C8CAEA138BB09466A104A163DF08F6D70F51CC81C3CE5F990EF4FC282D79074167BF9
3,504,895 UART: [art] SIG.R = E0C6F7E10644FBCD3B7B3155A246E045C4655C42D31A86A861956A592F1B84EF8FB3966D01B4CDC112626E5C36F1D0DA
3,511,667 UART: [art] SIG.S = 30467B67C7BF44B2A1D0E6616315F1AE3029F710CFF346641158682D621E1B9B6B15250DF231DE7174EC79EDEF304E4C
3,535,603 UART: Caliptra RT
3,535,856 UART: [state] CFI Enabled
3,643,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,634,213 >>> mbox cmd response: failed
4,634,213 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,639,864 UART:
4,639,880 UART: Running Caliptra FMC ...
4,640,288 UART:
4,640,342 UART: [state] CFI Enabled
4,729,463 UART: [art] Extend RT PCRs Done
4,729,891 UART: [art] Lock RT PCRs Done
4,731,118 UART: [art] Populate DV Done
4,739,550 UART: [fht] FMC Alias Private Key: 7
4,740,620 UART: [art] Derive CDI
4,740,900 UART: [art] Store in in slot 0x4
4,826,187 UART: [art] Derive Key Pair
4,826,547 UART: [art] Store priv key in slot 0x5
4,839,317 UART: [art] Derive Key Pair - Done
4,854,217 UART: [art] Signing Cert with AUTHO
4,854,697 UART: RITY.KEYID = 7
4,869,861 UART: [art] Erasing AUTHORITY.KEYID = 7
4,870,626 UART: [art] PUB.X = CCB6916C1EE7C6432AFE0977ABC905B4D07116C7BFDBF02DB148EA442A27C6ED7C36E62BFA7A10C51F443151956C55BF
4,877,408 UART: [art] PUB.Y = 3EBC8A27A3019B6DED0894552F4C8CAEA138BB09466A104A163DF08F6D70F51CC81C3CE5F990EF4FC282D79074167BF9
4,884,361 UART: [art] SIG.R = E0C6F7E10644FBCD3B7B3155A246E045C4655C42D31A86A861956A592F1B84EF8FB3966D01B4CDC112626E5C36F1D0DA
4,891,133 UART: [art] SIG.S = 30467B67C7BF44B2A1D0E6616315F1AE3029F710CFF346641158682D621E1B9B6B15250DF231DE7174EC79EDEF304E4C
4,915,023 UART: Caliptra RT
4,915,276 UART: [state] CFI Enabled
5,198,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,176,184 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,659 UART: [kat] HMAC-384Kdf
921,221 UART: [kat] LMS
1,169,533 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,604 UART: [idev] ++
1,173,772 UART: [idev] CDI.KEYID = 6
1,174,133 UART: [idev] SUBJECT.KEYID = 7
1,174,558 UART: [idev] UDS.KEYID = 0
1,174,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,274 UART: [idev] Sha1 KeyId Algorithm
1,209,156 UART: [idev] --
1,210,339 UART: [ldev] ++
1,210,507 UART: [ldev] CDI.KEYID = 6
1,210,871 UART: [ldev] SUBJECT.KEYID = 5
1,211,298 UART: [ldev] AUTHORITY.KEYID = 7
1,211,761 UART: [ldev] FE.KEYID = 1
1,216,991 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,283,059 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,583 UART: [fwproc] Recv'd Img size: 114084 bytes
3,129,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
3,322,691 >>> mbox cmd response: success
3,322,691 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,323,916 UART: [afmc] ++
3,324,084 UART: [afmc] CDI.KEYID = 6
3,324,447 UART: [afmc] SUBJECT.KEYID = 7
3,324,873 UART: [afmc] AUTHORITY.KEYID = 5
3,361,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,254 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,964 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,854 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,565 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,473 UART: [afmc] --
3,404,565 UART: [cold-reset] --
3,405,383 UART: [state] Locking Datavault
3,406,654 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,258 UART: [state] Locking ICCM
3,407,812 UART: [exit] Launching FMC @ 0x40000130
3,413,141 UART:
3,413,157 UART: Running Caliptra FMC ...
3,413,565 UART:
3,413,708 UART: [state] CFI Enabled
3,424,196 UART: [fht] FMC Alias Private Key: 7
3,532,190 UART: [art] Extend RT PCRs Done
3,532,618 UART: [art] Lock RT PCRs Done
3,534,416 UART: [art] Populate DV Done
3,542,836 UART: [fht] FMC Alias Private Key: 7
3,543,900 UART: [art] Derive CDI
3,544,180 UART: [art] Store in in slot 0x4
3,630,197 UART: [art] Derive Key Pair
3,630,557 UART: [art] Store priv key in slot 0x5
3,643,563 UART: [art] Derive Key Pair - Done
3,658,446 UART: [art] Signing Cert with AUTHO
3,658,926 UART: RITY.KEYID = 7
3,673,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,743 UART: [art] PUB.X = 79C6894004992B9DC3DBB47117C151255838F1D010DBE3230D2A100D7B9792E555C00848C813F6630A82CDB49025BF6C
3,681,492 UART: [art] PUB.Y = 16B3CCCB16B0B1D4BBD145F09E52D0E7D74BF183920C42126EBD242DCE2C3FD40B1CC29172ABFC54DD78465074D3ACD4
3,688,456 UART: [art] SIG.R = 969204F17540CC3ED6E27FCF0331030D0FBDD99FADA65871AF3C208FE4361D57CE825FE5D86A89703DBB3328473E813F
3,695,219 UART: [art] SIG.S = 30D2FEC74672AC1CAC807E5621974F25BA7DE3BB5D320B51434A4695B0731FE604C1DA1E7D63D3A676E7D4063A09A81C
3,718,808 UART: Caliptra RT
3,719,153 UART: [state] CFI Enabled
3,826,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,023 UART:
3,828,039 UART: Running Caliptra ROM ...
3,828,447 UART:
3,828,589 UART: [state] CFI Enabled
3,831,517 UART: [state] LifecycleState = Unprovisioned
3,832,172 UART: [state] DebugLocked = No
3,832,882 UART: [state] WD Timer not started. Device not locked for debugging
3,834,098 UART: [kat] SHA2-256
4,637,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,641,777 UART: [kat] ++
4,641,929 UART: [kat] sha1
4,646,061 UART: [kat] SHA2-256
4,648,001 UART: [kat] SHA2-384
4,650,672 UART: [kat] SHA2-512-ACC
4,652,572 UART: [kat] ECC-384
4,662,289 UART: [kat] HMAC-384Kdf
4,666,817 UART: [kat] LMS
4,915,129 UART: [kat] --
4,916,183 UART: [update-reset] ++
4,933,507 >>> mbox cmd response: failed
4,933,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,933,823 UART: ROM Non-Fatal Error: 0x000B003D
4,934,727 UART: [state] Locking Datavault
4,935,393 UART: [state] Locking PCR0, PCR1 and PCR31
4,935,997 UART: [state] Locking ICCM
4,936,497 UART: [exit] Launching FMC @ 0x40000130
4,941,826 UART:
4,941,842 UART: Running Caliptra FMC ...
4,942,250 UART:
4,942,393 UART: [state] CFI Enabled
5,031,264 UART: [art] Extend RT PCRs Done
5,031,692 UART: [art] Lock RT PCRs Done
5,032,873 UART: [art] Populate DV Done
5,040,919 UART: [fht] FMC Alias Private Key: 7
5,042,013 UART: [art] Derive CDI
5,042,293 UART: [art] Store in in slot 0x4
5,128,110 UART: [art] Derive Key Pair
5,128,470 UART: [art] Store priv key in slot 0x5
5,142,410 UART: [art] Derive Key Pair - Done
5,157,323 UART: [art] Signing Cert with AUTHO
5,157,803 UART: RITY.KEYID = 7
5,173,229 UART: [art] Erasing AUTHORITY.KEYID = 7
5,173,994 UART: [art] PUB.X = 79C6894004992B9DC3DBB47117C151255838F1D010DBE3230D2A100D7B9792E555C00848C813F6630A82CDB49025BF6C
5,180,743 UART: [art] PUB.Y = 16B3CCCB16B0B1D4BBD145F09E52D0E7D74BF183920C42126EBD242DCE2C3FD40B1CC29172ABFC54DD78465074D3ACD4
5,187,707 UART: [art] SIG.R = 969204F17540CC3ED6E27FCF0331030D0FBDD99FADA65871AF3C208FE4361D57CE825FE5D86A89703DBB3328473E813F
5,194,470 UART: [art] SIG.S = 30D2FEC74672AC1CAC807E5621974F25BA7DE3BB5D320B51434A4695B0731FE604C1DA1E7D63D3A676E7D4063A09A81C
5,218,673 UART: Caliptra RT
5,219,018 UART: [state] CFI Enabled
5,500,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,502,429 UART:
5,502,445 UART: Running Caliptra ROM ...
5,502,853 UART:
5,502,995 UART: [state] CFI Enabled
5,506,099 UART: [state] LifecycleState = Unprovisioned
5,506,754 UART: [state] DebugLocked = No
5,507,474 UART: [state] WD Timer not started. Device not locked for debugging
5,508,632 UART: [kat] SHA2-256
6,312,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,316,311 UART: [kat] ++
6,316,463 UART: [kat] sha1
6,320,585 UART: [kat] SHA2-256
6,322,525 UART: [kat] SHA2-384
6,325,402 UART: [kat] SHA2-512-ACC
6,327,302 UART: [kat] ECC-384
6,337,145 UART: [kat] HMAC-384Kdf
6,341,763 UART: [kat] LMS
6,590,075 UART: [kat] --
6,591,017 UART: [update-reset] ++
8,452,470 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,453,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89400
8,603,059 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,643 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,156,842 >>> mbox cmd response: success
3,156,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,219,429 UART:
3,219,445 UART: Running Caliptra FMC ...
3,219,853 UART:
3,219,996 UART: [state] CFI Enabled
3,230,522 UART: [fht] FMC Alias Private Key: 7
3,337,868 UART: [art] Extend RT PCRs Done
3,338,296 UART: [art] Lock RT PCRs Done
3,340,022 UART: [art] Populate DV Done
3,348,214 UART: [fht] FMC Alias Private Key: 7
3,349,292 UART: [art] Derive CDI
3,349,572 UART: [art] Store in in slot 0x4
3,435,127 UART: [art] Derive Key Pair
3,435,487 UART: [art] Store priv key in slot 0x5
3,448,429 UART: [art] Derive Key Pair - Done
3,463,249 UART: [art] Signing Cert with AUTHO
3,463,729 UART: RITY.KEYID = 7
3,478,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,624 UART: [art] PUB.X = 01537099E29F17DF2A77C9CAD6F8476CBBC1F4F5074460DC818BDD9A17B8409451C6E393147E67767509DBD93813C679
3,486,383 UART: [art] PUB.Y = FF951F73EBEFCD740782290B29EC068F7B110022880F5D13D51F78DB334CACF3647327475A2DCA2DFC8FA146033388BF
3,493,304 UART: [art] SIG.R = 8FE45E73E04DE7B5B1B958774473DEF0D50763AA80BB82DA36E1D27D7B434EB8CA8461BFB68B675625D1FCFE90251A16
3,500,083 UART: [art] SIG.S = 56E0040B0A9AD61103DAB815C28EA4A763AF840EBF1501A72D80D6F06F05144D365DC1A36A4E26CA852529BFBA178FF8
3,524,235 UART: Caliptra RT
3,524,580 UART: [state] CFI Enabled
3,632,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,623,250 >>> mbox cmd response: failed
4,623,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,629,019 UART:
4,629,035 UART: Running Caliptra FMC ...
4,629,443 UART:
4,629,586 UART: [state] CFI Enabled
4,718,797 UART: [art] Extend RT PCRs Done
4,719,225 UART: [art] Lock RT PCRs Done
4,720,638 UART: [art] Populate DV Done
4,728,888 UART: [fht] FMC Alias Private Key: 7
4,729,944 UART: [art] Derive CDI
4,730,224 UART: [art] Store in in slot 0x4
4,815,813 UART: [art] Derive Key Pair
4,816,173 UART: [art] Store priv key in slot 0x5
4,829,661 UART: [art] Derive Key Pair - Done
4,844,475 UART: [art] Signing Cert with AUTHO
4,844,955 UART: RITY.KEYID = 7
4,859,915 UART: [art] Erasing AUTHORITY.KEYID = 7
4,860,680 UART: [art] PUB.X = 01537099E29F17DF2A77C9CAD6F8476CBBC1F4F5074460DC818BDD9A17B8409451C6E393147E67767509DBD93813C679
4,867,439 UART: [art] PUB.Y = FF951F73EBEFCD740782290B29EC068F7B110022880F5D13D51F78DB334CACF3647327475A2DCA2DFC8FA146033388BF
4,874,360 UART: [art] SIG.R = 8FE45E73E04DE7B5B1B958774473DEF0D50763AA80BB82DA36E1D27D7B434EB8CA8461BFB68B675625D1FCFE90251A16
4,881,139 UART: [art] SIG.S = 56E0040B0A9AD61103DAB815C28EA4A763AF840EBF1501A72D80D6F06F05144D365DC1A36A4E26CA852529BFBA178FF8
4,905,041 UART: Caliptra RT
4,905,386 UART: [state] CFI Enabled
5,189,902 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,157,513 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,000 UART:
192,370 UART: Running Caliptra ROM ...
193,466 UART:
193,607 UART: [state] CFI Enabled
262,148 UART: [state] LifecycleState = Unprovisioned
264,125 UART: [state] DebugLocked = No
266,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,640 UART: [kat] SHA2-256
441,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,863 UART: [kat] ++
452,310 UART: [kat] sha1
463,807 UART: [kat] SHA2-256
466,495 UART: [kat] SHA2-384
472,315 UART: [kat] SHA2-512-ACC
474,710 UART: [kat] ECC-384
2,765,137 UART: [kat] HMAC-384Kdf
2,796,731 UART: [kat] LMS
3,987,069 UART: [kat] --
3,990,795 UART: [cold-reset] ++
3,992,458 UART: [fht] Storing FHT @ 0x50003400
4,003,346 UART: [idev] ++
4,003,921 UART: [idev] CDI.KEYID = 6
4,004,803 UART: [idev] SUBJECT.KEYID = 7
4,006,081 UART: [idev] UDS.KEYID = 0
4,008,597 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,151,897 UART: [idev] Erasing UDS.KEYID = 0
7,342,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,915 UART: [idev] --
7,366,862 UART: [ldev] ++
7,367,434 UART: [ldev] CDI.KEYID = 6
7,368,407 UART: [ldev] SUBJECT.KEYID = 5
7,369,572 UART: [ldev] AUTHORITY.KEYID = 7
7,370,863 UART: [ldev] FE.KEYID = 1
7,417,755 UART: [ldev] Erasing FE.KEYID = 1
10,749,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,935 UART: [ldev] --
13,134,470 UART: [fwproc] Waiting for Commands...
13,137,275 UART: [fwproc] Received command 0x46574c44
13,139,637 UART: [fwproc] Received Image of size 113760 bytes
14,532,867 UART: ROM Fatal Error: 0x000B000D
14,536,297 >>> mbox cmd response: failed
14,536,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,537,024 >>> mbox cmd response: failed
14,537,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,537,585 >>> mbox cmd response: failed
Initializing fuses
2,057,553 writing to cptra_bootfsm_go
2,246,852 UART:
2,247,192 UART: Running Caliptra ROM ...
2,248,240 UART:
2,248,394 UART: [state] CFI Enabled
2,314,469 UART: [state] LifecycleState = Unprovisioned
2,316,462 UART: [state] DebugLocked = No
2,317,897 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,881 UART: [kat] SHA2-256
2,491,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,065 UART: [kat] ++
2,502,524 UART: [kat] sha1
2,514,442 UART: [kat] SHA2-256
2,517,140 UART: [kat] SHA2-384
2,522,914 UART: [kat] SHA2-512-ACC
2,525,247 UART: [kat] ECC-384
4,819,115 UART: [kat] HMAC-384Kdf
4,852,139 UART: [kat] LMS
6,042,437 UART: [kat] --
6,047,676 UART: [cold-reset] ++
6,049,774 UART: [fht] Storing FHT @ 0x50003400
6,061,159 UART: [idev] ++
6,061,784 UART: [idev] CDI.KEYID = 6
6,062,717 UART: [idev] SUBJECT.KEYID = 7
6,063,939 UART: [idev] UDS.KEYID = 0
6,066,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,209,392 UART: [idev] Erasing UDS.KEYID = 0
9,398,121 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,485 UART: [idev] --
9,423,073 UART: [ldev] ++
9,423,651 UART: [ldev] CDI.KEYID = 6
9,424,620 UART: [ldev] SUBJECT.KEYID = 5
9,425,814 UART: [ldev] AUTHORITY.KEYID = 7
9,427,055 UART: [ldev] FE.KEYID = 1
9,473,294 UART: [ldev] Erasing FE.KEYID = 1
12,804,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,380 UART: [ldev] --
15,168,050 UART: [fwproc] Waiting for Commands...
15,170,326 UART: [fwproc] Received command 0x46574c44
15,172,529 UART: [fwproc] Received Image of size 113760 bytes
19,216,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,293,501 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,362,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,678,599 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,807,061 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,278,691 >>> mbox cmd response: failed
14,279,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,579 >>> mbox cmd response: failed
14,279,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,152 >>> mbox cmd response: failed
Initializing fuses
2,062,347 writing to cptra_bootfsm_go
5,867,245 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,951,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,438 UART:
192,786 UART: Running Caliptra ROM ...
193,974 UART:
603,497 UART: [state] CFI Enabled
616,994 UART: [state] LifecycleState = Unprovisioned
618,921 UART: [state] DebugLocked = No
620,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,621 UART: [kat] SHA2-256
795,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,898 UART: [kat] ++
806,348 UART: [kat] sha1
817,407 UART: [kat] SHA2-256
820,094 UART: [kat] SHA2-384
824,831 UART: [kat] SHA2-512-ACC
827,222 UART: [kat] ECC-384
3,113,390 UART: [kat] HMAC-384Kdf
3,125,855 UART: [kat] LMS
4,315,972 UART: [kat] --
4,320,683 UART: [cold-reset] ++
4,321,787 UART: [fht] Storing FHT @ 0x50003400
4,332,739 UART: [idev] ++
4,333,310 UART: [idev] CDI.KEYID = 6
4,334,329 UART: [idev] SUBJECT.KEYID = 7
4,335,489 UART: [idev] UDS.KEYID = 0
4,338,012 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,195 UART: [idev] Erasing UDS.KEYID = 0
7,617,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,142 UART: [idev] --
7,643,284 UART: [ldev] ++
7,643,857 UART: [ldev] CDI.KEYID = 6
7,644,824 UART: [ldev] SUBJECT.KEYID = 5
7,646,037 UART: [ldev] AUTHORITY.KEYID = 7
7,647,277 UART: [ldev] FE.KEYID = 1
7,658,354 UART: [ldev] Erasing FE.KEYID = 1
10,945,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,925 UART: [ldev] --
13,306,109 UART: [fwproc] Waiting for Commands...
13,309,283 UART: [fwproc] Received command 0x46574c44
13,311,466 UART: [fwproc] Received Image of size 113760 bytes
14,700,892 UART: ROM Fatal Error: 0x000B000D
14,704,341 >>> mbox cmd response: failed
14,704,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,705,002 >>> mbox cmd response: failed
14,705,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,705,609 >>> mbox cmd response: failed
Initializing fuses
2,054,663 writing to cptra_bootfsm_go
2,243,966 UART:
2,244,312 UART: Running Caliptra ROM ...
2,245,356 UART:
5,746,329 UART: [state] CFI Enabled
5,763,484 UART: [state] LifecycleState = Unprovisioned
5,765,403 UART: [state] DebugLocked = No
5,767,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,772,854 UART: [kat] SHA2-256
5,942,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,953,147 UART: [kat] ++
5,953,631 UART: [kat] sha1
5,964,577 UART: [kat] SHA2-256
5,967,281 UART: [kat] SHA2-384
5,971,761 UART: [kat] SHA2-512-ACC
5,974,166 UART: [kat] ECC-384
8,258,924 UART: [kat] HMAC-384Kdf
8,271,099 UART: [kat] LMS
9,461,214 UART: [kat] --
9,465,657 UART: [cold-reset] ++
9,467,055 UART: [fht] Storing FHT @ 0x50003400
9,478,380 UART: [idev] ++
9,478,946 UART: [idev] CDI.KEYID = 6
9,479,925 UART: [idev] SUBJECT.KEYID = 7
9,481,141 UART: [idev] UDS.KEYID = 0
9,483,555 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
9,626,537 UART: [idev] Erasing UDS.KEYID = 0
12,773,893 UART: [idev] Using Sha1 for KeyId Algorithm
12,795,594 UART: [idev] --
12,799,479 UART: [ldev] ++
12,800,046 UART: [ldev] CDI.KEYID = 6
12,801,068 UART: [ldev] SUBJECT.KEYID = 5
12,802,266 UART: [ldev] AUTHORITY.KEYID = 7
12,803,499 UART: [ldev] FE.KEYID = 1
12,815,238 UART: [ldev] Erasing FE.KEYID = 1
16,102,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,396,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,410,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,425,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,440,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,459,558 UART: [ldev] --
18,464,390 UART: [fwproc] Waiting for Commands...
18,467,249 UART: [fwproc] Received command 0x46574c44
18,469,491 UART: [fwproc] Received Image of size 113760 bytes
22,520,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,599,706 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,668,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,984,405 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,127,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,457,489 >>> mbox cmd response: failed
14,458,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,458,449 >>> mbox cmd response: failed
14,458,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,459,010 >>> mbox cmd response: failed
Initializing fuses
2,059,828 writing to cptra_bootfsm_go
9,525,015 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,450,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,170 UART:
192,543 UART: Running Caliptra ROM ...
193,762 UART:
193,915 UART: [state] CFI Enabled
260,787 UART: [state] LifecycleState = Unprovisioned
262,656 UART: [state] DebugLocked = No
264,762 UART: [state] WD Timer not started. Device not locked for debugging
268,718 UART: [kat] SHA2-256
447,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,431 UART: [kat] ++
459,967 UART: [kat] sha1
470,741 UART: [kat] SHA2-256
473,753 UART: [kat] SHA2-384
480,752 UART: [kat] SHA2-512-ACC
483,684 UART: [kat] ECC-384
2,943,171 UART: [kat] HMAC-384Kdf
2,967,755 UART: [kat] LMS
3,497,170 UART: [kat] --
3,500,267 UART: [cold-reset] ++
3,501,235 UART: [fht] FHT @ 0x50003400
3,511,856 UART: [idev] ++
3,512,437 UART: [idev] CDI.KEYID = 6
3,513,323 UART: [idev] SUBJECT.KEYID = 7
3,514,539 UART: [idev] UDS.KEYID = 0
3,516,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,660,639 UART: [idev] Erasing UDS.KEYID = 0
6,023,816 UART: [idev] Sha1 KeyId Algorithm
6,047,274 UART: [idev] --
6,051,983 UART: [ldev] ++
6,052,563 UART: [ldev] CDI.KEYID = 6
6,053,485 UART: [ldev] SUBJECT.KEYID = 5
6,054,650 UART: [ldev] AUTHORITY.KEYID = 7
6,055,942 UART: [ldev] FE.KEYID = 1
6,097,699 UART: [ldev] Erasing FE.KEYID = 1
8,602,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,048 UART: [ldev] --
10,412,158 UART: [fwproc] Wait for Commands...
10,413,716 UART: [fwproc] Recv command 0x46574c44
10,415,817 UART: [fwproc] Recv'd Img size: 114084 bytes
11,480,947 UART: ROM Fatal Error: 0x000B000D
11,484,061 >>> mbox cmd response: failed
11,484,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,484,821 >>> mbox cmd response: failed
11,485,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,485,393 >>> mbox cmd response: failed
Initializing fuses
2,059,603 writing to cptra_bootfsm_go
2,248,944 UART:
2,249,296 UART: Running Caliptra ROM ...
2,250,440 UART:
2,250,603 UART: [state] CFI Enabled
2,319,913 UART: [state] LifecycleState = Unprovisioned
2,321,793 UART: [state] DebugLocked = No
2,324,106 UART: [state] WD Timer not started. Device not locked for debugging
2,327,092 UART: [kat] SHA2-256
2,506,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,785 UART: [kat] ++
2,518,326 UART: [kat] sha1
2,528,192 UART: [kat] SHA2-256
2,531,213 UART: [kat] SHA2-384
2,537,626 UART: [kat] SHA2-512-ACC
2,540,554 UART: [kat] ECC-384
5,006,253 UART: [kat] HMAC-384Kdf
5,028,364 UART: [kat] LMS
5,557,843 UART: [kat] --
5,561,717 UART: [cold-reset] ++
5,562,728 UART: [fht] FHT @ 0x50003400
5,573,925 UART: [idev] ++
5,574,490 UART: [idev] CDI.KEYID = 6
5,575,575 UART: [idev] SUBJECT.KEYID = 7
5,576,681 UART: [idev] UDS.KEYID = 0
5,579,101 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,722,568 UART: [idev] Erasing UDS.KEYID = 0
8,085,037 UART: [idev] Sha1 KeyId Algorithm
8,108,216 UART: [idev] --
8,113,345 UART: [ldev] ++
8,113,913 UART: [ldev] CDI.KEYID = 6
8,114,879 UART: [ldev] SUBJECT.KEYID = 5
8,116,060 UART: [ldev] AUTHORITY.KEYID = 7
8,117,294 UART: [ldev] FE.KEYID = 1
8,157,916 UART: [ldev] Erasing FE.KEYID = 1
10,663,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,193 UART: [ldev] --
12,470,657 UART: [fwproc] Wait for Commands...
12,473,570 UART: [fwproc] Recv command 0x46574c44
12,475,616 UART: [fwproc] Recv'd Img size: 114084 bytes
15,872,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,944,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,013,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,330,292 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,897 writing to cptra_bootfsm_go
3,381,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,266,895 >>> mbox cmd response: failed
11,267,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,267,795 >>> mbox cmd response: failed
11,268,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,268,367 >>> mbox cmd response: failed
Initializing fuses
2,054,857 writing to cptra_bootfsm_go
5,401,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,099,473 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,630 UART:
193,054 UART: Running Caliptra ROM ...
194,234 UART:
603,773 UART: [state] CFI Enabled
616,347 UART: [state] LifecycleState = Unprovisioned
618,231 UART: [state] DebugLocked = No
620,799 UART: [state] WD Timer not started. Device not locked for debugging
625,049 UART: [kat] SHA2-256
804,187 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,722 UART: [kat] ++
816,260 UART: [kat] sha1
827,147 UART: [kat] SHA2-256
830,205 UART: [kat] SHA2-384
836,338 UART: [kat] SHA2-512-ACC
839,322 UART: [kat] ECC-384
3,282,232 UART: [kat] HMAC-384Kdf
3,294,688 UART: [kat] LMS
3,824,178 UART: [kat] --
3,828,933 UART: [cold-reset] ++
3,830,920 UART: [fht] FHT @ 0x50003400
3,841,298 UART: [idev] ++
3,841,861 UART: [idev] CDI.KEYID = 6
3,842,768 UART: [idev] SUBJECT.KEYID = 7
3,843,984 UART: [idev] UDS.KEYID = 0
3,846,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,301 UART: [idev] Erasing UDS.KEYID = 0
6,318,125 UART: [idev] Sha1 KeyId Algorithm
6,340,863 UART: [idev] --
6,346,092 UART: [ldev] ++
6,346,664 UART: [ldev] CDI.KEYID = 6
6,347,575 UART: [ldev] SUBJECT.KEYID = 5
6,348,736 UART: [ldev] AUTHORITY.KEYID = 7
6,349,969 UART: [ldev] FE.KEYID = 1
6,361,226 UART: [ldev] Erasing FE.KEYID = 1
8,833,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,687 UART: [ldev] --
10,623,696 UART: [fwproc] Wait for Commands...
10,626,108 UART: [fwproc] Recv command 0x46574c44
10,628,163 UART: [fwproc] Recv'd Img size: 114084 bytes
11,700,202 UART: ROM Fatal Error: 0x000B000D
11,703,309 >>> mbox cmd response: failed
11,703,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,703,963 >>> mbox cmd response: failed
11,704,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,704,519 >>> mbox cmd response: failed
Initializing fuses
2,053,081 writing to cptra_bootfsm_go
2,242,453 UART:
2,242,797 UART: Running Caliptra ROM ...
2,243,932 UART:
8,750,455 UART: [state] CFI Enabled
8,764,853 UART: [state] LifecycleState = Unprovisioned
8,766,736 UART: [state] DebugLocked = No
8,769,209 UART: [state] WD Timer not started. Device not locked for debugging
8,773,455 UART: [kat] SHA2-256
8,952,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,964,167 UART: [kat] ++
8,964,638 UART: [kat] sha1
8,975,583 UART: [kat] SHA2-256
8,978,619 UART: [kat] SHA2-384
8,984,346 UART: [kat] SHA2-512-ACC
8,987,287 UART: [kat] ECC-384
11,428,361 UART: [kat] HMAC-384Kdf
11,440,372 UART: [kat] LMS
11,969,875 UART: [kat] --
11,974,569 UART: [cold-reset] ++
11,975,741 UART: [fht] FHT @ 0x50003400
11,987,849 UART: [idev] ++
11,988,411 UART: [idev] CDI.KEYID = 6
11,989,318 UART: [idev] SUBJECT.KEYID = 7
11,990,532 UART: [idev] UDS.KEYID = 0
11,992,794 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,136,176 UART: [idev] Erasing UDS.KEYID = 0
14,463,648 UART: [idev] Sha1 KeyId Algorithm
14,486,232 UART: [idev] --
14,491,054 UART: [ldev] ++
14,491,628 UART: [ldev] CDI.KEYID = 6
14,492,697 UART: [ldev] SUBJECT.KEYID = 5
14,493,805 UART: [ldev] AUTHORITY.KEYID = 7
14,494,977 UART: [ldev] FE.KEYID = 1
14,504,259 UART: [ldev] Erasing FE.KEYID = 1
16,980,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,701,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,717,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,732,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,748,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,769,530 UART: [ldev] --
18,774,314 UART: [fwproc] Wait for Commands...
18,776,248 UART: [fwproc] Recv command 0x46574c44
18,778,343 UART: [fwproc] Recv'd Img size: 114084 bytes
22,176,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,247,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,316,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,632,922 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,696,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,478,857 >>> mbox cmd response: failed
11,479,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,479,758 >>> mbox cmd response: failed
11,480,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,480,326 >>> mbox cmd response: failed
Initializing fuses
2,059,271 writing to cptra_bootfsm_go
12,067,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,626,626 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,280 UART:
192,641 UART: Running Caliptra ROM ...
193,833 UART:
193,988 UART: [state] CFI Enabled
260,014 UART: [state] LifecycleState = Unprovisioned
262,426 UART: [state] DebugLocked = No
264,568 UART: [state] WD Timer not started. Device not locked for debugging
268,386 UART: [kat] SHA2-256
458,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,057 UART: [kat] ++
469,511 UART: [kat] sha1
481,201 UART: [kat] SHA2-256
484,218 UART: [kat] SHA2-384
490,525 UART: [kat] SHA2-512-ACC
493,141 UART: [kat] ECC-384
2,943,659 UART: [kat] HMAC-384Kdf
2,967,110 UART: [kat] LMS
3,498,916 UART: [kat] --
3,502,373 UART: [cold-reset] ++
3,503,390 UART: [fht] FHT @ 0x50003400
3,514,645 UART: [idev] ++
3,515,317 UART: [idev] CDI.KEYID = 6
3,516,284 UART: [idev] SUBJECT.KEYID = 7
3,517,463 UART: [idev] UDS.KEYID = 0
3,519,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,663,890 UART: [idev] Erasing UDS.KEYID = 0
6,023,359 UART: [idev] Sha1 KeyId Algorithm
6,046,865 UART: [idev] --
6,051,564 UART: [ldev] ++
6,052,496 UART: [ldev] CDI.KEYID = 6
6,053,422 UART: [ldev] SUBJECT.KEYID = 5
6,054,539 UART: [ldev] AUTHORITY.KEYID = 7
6,055,720 UART: [ldev] FE.KEYID = 1
6,096,446 UART: [ldev] Erasing FE.KEYID = 1
8,602,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,372 UART: [ldev] --
10,407,532 UART: [fwproc] Wait for Commands...
10,410,708 UART: [fwproc] Recv command 0x46574c44
10,412,974 UART: [fwproc] Recv'd Img size: 114084 bytes
11,506,421 UART: ROM Fatal Error: 0x000B000D
11,510,096 >>> mbox cmd response: failed
11,510,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,510,853 >>> mbox cmd response: failed
11,511,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,511,410 >>> mbox cmd response: failed
Initializing fuses
2,056,027 writing to cptra_bootfsm_go
2,245,419 UART:
2,245,766 UART: Running Caliptra ROM ...
2,246,922 UART:
2,247,100 UART: [state] CFI Enabled
2,318,583 UART: [state] LifecycleState = Unprovisioned
2,321,011 UART: [state] DebugLocked = No
2,323,319 UART: [state] WD Timer not started. Device not locked for debugging
2,327,082 UART: [kat] SHA2-256
2,516,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,501 UART: [kat] ++
2,527,958 UART: [kat] sha1
2,538,767 UART: [kat] SHA2-256
2,541,795 UART: [kat] SHA2-384
2,546,637 UART: [kat] SHA2-512-ACC
2,549,217 UART: [kat] ECC-384
5,000,219 UART: [kat] HMAC-384Kdf
5,024,109 UART: [kat] LMS
5,555,862 UART: [kat] --
5,560,030 UART: [cold-reset] ++
5,561,484 UART: [fht] FHT @ 0x50003400
5,571,985 UART: [idev] ++
5,572,670 UART: [idev] CDI.KEYID = 6
5,573,639 UART: [idev] SUBJECT.KEYID = 7
5,574,802 UART: [idev] UDS.KEYID = 0
5,577,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,720,634 UART: [idev] Erasing UDS.KEYID = 0
8,079,783 UART: [idev] Sha1 KeyId Algorithm
8,101,461 UART: [idev] --
8,106,920 UART: [ldev] ++
8,107,680 UART: [ldev] CDI.KEYID = 6
8,108,570 UART: [ldev] SUBJECT.KEYID = 5
8,109,675 UART: [ldev] AUTHORITY.KEYID = 7
8,110,917 UART: [ldev] FE.KEYID = 1
8,152,308 UART: [ldev] Erasing FE.KEYID = 1
10,657,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,749 UART: [ldev] --
12,466,324 UART: [fwproc] Wait for Commands...
12,468,699 UART: [fwproc] Recv command 0x46574c44
12,470,969 UART: [fwproc] Recv'd Img size: 114084 bytes
15,916,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,108,353 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,648,596 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,437,909 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,312,298 >>> mbox cmd response: failed
11,312,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,205 >>> mbox cmd response: failed
11,313,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,767 >>> mbox cmd response: failed
Initializing fuses
2,056,739 writing to cptra_bootfsm_go
5,476,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,759,492 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,422 UART:
192,788 UART: Running Caliptra ROM ...
193,929 UART:
603,666 UART: [state] CFI Enabled
619,214 UART: [state] LifecycleState = Unprovisioned
621,575 UART: [state] DebugLocked = No
623,869 UART: [state] WD Timer not started. Device not locked for debugging
627,775 UART: [kat] SHA2-256
817,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,444 UART: [kat] ++
828,954 UART: [kat] sha1
839,989 UART: [kat] SHA2-256
843,004 UART: [kat] SHA2-384
848,123 UART: [kat] SHA2-512-ACC
850,697 UART: [kat] ECC-384
3,293,415 UART: [kat] HMAC-384Kdf
3,306,886 UART: [kat] LMS
3,838,699 UART: [kat] --
3,842,594 UART: [cold-reset] ++
3,844,583 UART: [fht] FHT @ 0x50003400
3,856,969 UART: [idev] ++
3,857,649 UART: [idev] CDI.KEYID = 6
3,858,615 UART: [idev] SUBJECT.KEYID = 7
3,859,831 UART: [idev] UDS.KEYID = 0
3,862,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,005,843 UART: [idev] Erasing UDS.KEYID = 0
6,341,655 UART: [idev] Sha1 KeyId Algorithm
6,364,625 UART: [idev] --
6,369,323 UART: [ldev] ++
6,370,007 UART: [ldev] CDI.KEYID = 6
6,371,102 UART: [ldev] SUBJECT.KEYID = 5
6,372,212 UART: [ldev] AUTHORITY.KEYID = 7
6,373,385 UART: [ldev] FE.KEYID = 1
6,383,059 UART: [ldev] Erasing FE.KEYID = 1
8,861,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,854 UART: [ldev] --
10,654,201 UART: [fwproc] Wait for Commands...
10,657,001 UART: [fwproc] Recv command 0x46574c44
10,659,323 UART: [fwproc] Recv'd Img size: 114084 bytes
11,748,699 UART: ROM Fatal Error: 0x000B000D
11,752,368 >>> mbox cmd response: failed
11,752,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,122 >>> mbox cmd response: failed
11,753,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,753,683 >>> mbox cmd response: failed
Initializing fuses
2,053,556 writing to cptra_bootfsm_go
2,242,884 UART:
2,243,232 UART: Running Caliptra ROM ...
2,244,374 UART:
8,699,666 UART: [state] CFI Enabled
8,711,501 UART: [state] LifecycleState = Unprovisioned
8,713,906 UART: [state] DebugLocked = No
8,715,676 UART: [state] WD Timer not started. Device not locked for debugging
8,719,475 UART: [kat] SHA2-256
8,909,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,920,167 UART: [kat] ++
8,920,715 UART: [kat] sha1
8,932,312 UART: [kat] SHA2-256
8,935,327 UART: [kat] SHA2-384
8,941,586 UART: [kat] SHA2-512-ACC
8,944,163 UART: [kat] ECC-384
11,385,819 UART: [kat] HMAC-384Kdf
11,399,355 UART: [kat] LMS
11,931,206 UART: [kat] --
11,935,306 UART: [cold-reset] ++
11,937,127 UART: [fht] FHT @ 0x50003400
11,948,975 UART: [idev] ++
11,949,748 UART: [idev] CDI.KEYID = 6
11,950,657 UART: [idev] SUBJECT.KEYID = 7
11,951,875 UART: [idev] UDS.KEYID = 0
11,954,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,097,923 UART: [idev] Erasing UDS.KEYID = 0
14,425,278 UART: [idev] Sha1 KeyId Algorithm
14,447,577 UART: [idev] --
14,453,006 UART: [ldev] ++
14,453,693 UART: [ldev] CDI.KEYID = 6
14,454,579 UART: [ldev] SUBJECT.KEYID = 5
14,455,789 UART: [ldev] AUTHORITY.KEYID = 7
14,457,025 UART: [ldev] FE.KEYID = 1
14,467,084 UART: [ldev] Erasing FE.KEYID = 1
16,945,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,663,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,678,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,694,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,709,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,731,556 UART: [ldev] --
18,737,733 UART: [fwproc] Wait for Commands...
18,740,931 UART: [fwproc] Recv command 0x46574c44
18,743,193 UART: [fwproc] Recv'd Img size: 114084 bytes
22,183,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,262,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,378,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,920,484 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,751,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,528,546 >>> mbox cmd response: failed
11,529,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,529,403 >>> mbox cmd response: failed
11,529,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,529,963 >>> mbox cmd response: failed
Initializing fuses
2,061,809 writing to cptra_bootfsm_go
12,076,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,270,910 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,807 UART: [kat] SHA2-256
881,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,853 UART: [kat] ++
886,005 UART: [kat] sha1
890,143 UART: [kat] SHA2-256
892,081 UART: [kat] SHA2-384
894,874 UART: [kat] SHA2-512-ACC
896,775 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,292 UART: [kat] LMS
1,475,488 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,635 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,234 UART: [idev] Erasing UDS.KEYID = 0
1,505,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,673 UART: [ldev] ++
1,514,841 UART: [ldev] CDI.KEYID = 6
1,515,204 UART: [ldev] SUBJECT.KEYID = 5
1,515,630 UART: [ldev] AUTHORITY.KEYID = 7
1,516,093 UART: [ldev] FE.KEYID = 1
1,521,293 UART: [ldev] Erasing FE.KEYID = 1
1,546,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,583 UART: [fwproc] Waiting for Commands...
1,586,250 UART: [fwproc] Received command 0x46574c44
1,587,041 UART: [fwproc] Received Image of size 114084 bytes
1,625,326 UART: ROM Fatal Error: 0x000B000D
1,626,485 >>> mbox cmd response: failed
1,626,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,491 >>> mbox cmd response: failed
1,626,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,935 UART: [kat] SHA2-256
881,866 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,981 UART: [kat] ++
886,133 UART: [kat] sha1
890,385 UART: [kat] SHA2-256
892,323 UART: [kat] SHA2-384
895,012 UART: [kat] SHA2-512-ACC
896,913 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
907,214 UART: [kat] LMS
1,475,410 UART: [kat] --
1,476,439 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,744 UART: [idev] ++
1,479,912 UART: [idev] CDI.KEYID = 6
1,480,272 UART: [idev] SUBJECT.KEYID = 7
1,480,696 UART: [idev] UDS.KEYID = 0
1,481,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,286 UART: [idev] Erasing UDS.KEYID = 0
1,504,624 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,274 UART: [idev] --
1,514,503 UART: [ldev] ++
1,514,671 UART: [ldev] CDI.KEYID = 6
1,515,034 UART: [ldev] SUBJECT.KEYID = 5
1,515,460 UART: [ldev] AUTHORITY.KEYID = 7
1,515,923 UART: [ldev] FE.KEYID = 1
1,521,031 UART: [ldev] Erasing FE.KEYID = 1
1,546,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,108 UART: [ldev] --
1,585,569 UART: [fwproc] Waiting for Commands...
1,586,356 UART: [fwproc] Received command 0x46574c44
1,587,147 UART: [fwproc] Received Image of size 114084 bytes
2,882,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,882 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,825 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,477,214 >>> mbox cmd response: failed
1,477,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,220 >>> mbox cmd response: failed
1,477,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,852 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,396 UART: [kat] SHA2-256
892,334 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,476,964 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,504,927 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,491 UART: [idev] --
1,514,562 UART: [ldev] ++
1,514,730 UART: [ldev] CDI.KEYID = 6
1,515,093 UART: [ldev] SUBJECT.KEYID = 5
1,515,519 UART: [ldev] AUTHORITY.KEYID = 7
1,515,982 UART: [ldev] FE.KEYID = 1
1,521,372 UART: [ldev] Erasing FE.KEYID = 1
1,547,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,971 UART: [ldev] --
1,586,262 UART: [fwproc] Waiting for Commands...
1,586,885 UART: [fwproc] Received command 0x46574c44
1,587,676 UART: [fwproc] Received Image of size 114084 bytes
1,625,767 UART: ROM Fatal Error: 0x000B000D
1,626,926 >>> mbox cmd response: failed
1,626,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,932 >>> mbox cmd response: failed
1,626,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,850 UART: [kat] SHA2-256
881,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,896 UART: [kat] ++
886,048 UART: [kat] sha1
890,292 UART: [kat] SHA2-256
892,230 UART: [kat] SHA2-384
895,041 UART: [kat] SHA2-512-ACC
896,942 UART: [kat] ECC-384
902,419 UART: [kat] HMAC-384Kdf
906,881 UART: [kat] LMS
1,475,077 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,736 UART: [fht] Storing FHT @ 0x50003400
1,479,725 UART: [idev] ++
1,479,893 UART: [idev] CDI.KEYID = 6
1,480,253 UART: [idev] SUBJECT.KEYID = 7
1,480,677 UART: [idev] UDS.KEYID = 0
1,481,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,953 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,031 UART: [idev] --
1,515,088 UART: [ldev] ++
1,515,256 UART: [ldev] CDI.KEYID = 6
1,515,619 UART: [ldev] SUBJECT.KEYID = 5
1,516,045 UART: [ldev] AUTHORITY.KEYID = 7
1,516,508 UART: [ldev] FE.KEYID = 1
1,521,910 UART: [ldev] Erasing FE.KEYID = 1
1,547,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,233 UART: [ldev] --
1,586,554 UART: [fwproc] Waiting for Commands...
1,587,177 UART: [fwproc] Received command 0x46574c44
1,587,968 UART: [fwproc] Received Image of size 114084 bytes
2,882,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,999 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,481,265 >>> mbox cmd response: failed
1,481,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,271 >>> mbox cmd response: failed
1,481,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,424 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,139 UART: [kat] SHA2-256
904,079 UART: [kat] SHA2-384
906,944 UART: [kat] SHA2-512-ACC
908,845 UART: [kat] ECC-384
918,524 UART: [kat] HMAC-384Kdf
923,138 UART: [kat] LMS
1,171,466 UART: [kat] --
1,172,663 UART: [cold-reset] ++
1,173,239 UART: [fht] FHT @ 0x50003400
1,175,874 UART: [idev] ++
1,176,042 UART: [idev] CDI.KEYID = 6
1,176,402 UART: [idev] SUBJECT.KEYID = 7
1,176,826 UART: [idev] UDS.KEYID = 0
1,177,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,660 UART: [idev] Erasing UDS.KEYID = 0
1,201,359 UART: [idev] Sha1 KeyId Algorithm
1,209,761 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,303 UART: [ldev] Erasing FE.KEYID = 1
1,243,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 114084 bytes
1,322,401 UART: ROM Fatal Error: 0x000B000D
1,323,560 >>> mbox cmd response: failed
1,323,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,566 >>> mbox cmd response: failed
1,323,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
893,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,433 UART: [kat] ++
897,585 UART: [kat] sha1
901,723 UART: [kat] SHA2-256
903,663 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
918,452 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,172,191 UART: [cold-reset] ++
1,172,639 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,094 UART: [idev] Erasing UDS.KEYID = 0
1,201,199 UART: [idev] Sha1 KeyId Algorithm
1,209,661 UART: [idev] --
1,210,763 UART: [ldev] ++
1,210,931 UART: [ldev] CDI.KEYID = 6
1,211,294 UART: [ldev] SUBJECT.KEYID = 5
1,211,720 UART: [ldev] AUTHORITY.KEYID = 7
1,212,183 UART: [ldev] FE.KEYID = 1
1,217,535 UART: [ldev] Erasing FE.KEYID = 1
1,243,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,282,892 UART: [fwproc] Wait for Commands...
1,283,554 UART: [fwproc] Recv command 0x46574c44
1,284,282 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,248 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,423 >>> mbox cmd response: failed
1,178,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,429 >>> mbox cmd response: failed
1,178,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,681 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
893,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,436 UART: [kat] ++
897,588 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,499 UART: [kat] SHA2-512-ACC
908,400 UART: [kat] ECC-384
918,215 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,172,234 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,749 UART: [idev] Erasing UDS.KEYID = 0
1,202,216 UART: [idev] Sha1 KeyId Algorithm
1,210,536 UART: [idev] --
1,211,398 UART: [ldev] ++
1,211,566 UART: [ldev] CDI.KEYID = 6
1,211,929 UART: [ldev] SUBJECT.KEYID = 5
1,212,355 UART: [ldev] AUTHORITY.KEYID = 7
1,212,818 UART: [ldev] FE.KEYID = 1
1,217,866 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,178 UART: [ldev] --
1,283,469 UART: [fwproc] Wait for Commands...
1,284,049 UART: [fwproc] Recv command 0x46574c44
1,284,777 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,378 UART: ROM Fatal Error: 0x000B000D
1,324,537 >>> mbox cmd response: failed
1,324,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,543 >>> mbox cmd response: failed
1,324,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,969 UART: [state] LifecycleState = Unprovisioned
86,624 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,841 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,674 UART: [cold-reset] ++
1,173,188 UART: [fht] FHT @ 0x50003400
1,175,783 UART: [idev] ++
1,175,951 UART: [idev] CDI.KEYID = 6
1,176,311 UART: [idev] SUBJECT.KEYID = 7
1,176,735 UART: [idev] UDS.KEYID = 0
1,177,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,899 UART: [idev] Erasing UDS.KEYID = 0
1,202,294 UART: [idev] Sha1 KeyId Algorithm
1,210,816 UART: [idev] --
1,211,920 UART: [ldev] ++
1,212,088 UART: [ldev] CDI.KEYID = 6
1,212,451 UART: [ldev] SUBJECT.KEYID = 5
1,212,877 UART: [ldev] AUTHORITY.KEYID = 7
1,213,340 UART: [ldev] FE.KEYID = 1
1,218,556 UART: [ldev] Erasing FE.KEYID = 1
1,245,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,268 UART: [ldev] --
1,284,665 UART: [fwproc] Wait for Commands...
1,285,421 UART: [fwproc] Recv command 0x46574c44
1,286,149 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,845 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,318 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,508 >>> mbox cmd response: failed
1,179,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,514 >>> mbox cmd response: failed
1,179,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,043 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,424 UART: [state] LifecycleState = Unprovisioned
85,079 UART: [state] DebugLocked = No
85,739 UART: [state] WD Timer not started. Device not locked for debugging
86,850 UART: [kat] SHA2-256
890,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,529 UART: [kat] ++
894,681 UART: [kat] sha1
898,789 UART: [kat] SHA2-256
900,729 UART: [kat] SHA2-384
903,502 UART: [kat] SHA2-512-ACC
905,403 UART: [kat] ECC-384
915,040 UART: [kat] HMAC-384Kdf
919,716 UART: [kat] LMS
1,168,028 UART: [kat] --
1,168,651 UART: [cold-reset] ++
1,169,067 UART: [fht] FHT @ 0x50003400
1,171,853 UART: [idev] ++
1,172,021 UART: [idev] CDI.KEYID = 6
1,172,382 UART: [idev] SUBJECT.KEYID = 7
1,172,807 UART: [idev] UDS.KEYID = 0
1,173,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,263 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,176 UART: [ldev] ++
1,208,344 UART: [ldev] CDI.KEYID = 6
1,208,708 UART: [ldev] SUBJECT.KEYID = 5
1,209,135 UART: [ldev] AUTHORITY.KEYID = 7
1,209,598 UART: [ldev] FE.KEYID = 1
1,214,720 UART: [ldev] Erasing FE.KEYID = 1
1,240,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,488 UART: [ldev] --
1,279,816 UART: [fwproc] Wait for Commands...
1,280,481 UART: [fwproc] Recv command 0x46574c44
1,281,214 UART: [fwproc] Recv'd Img size: 114084 bytes
1,319,087 UART: ROM Fatal Error: 0x000B000D
1,320,246 >>> mbox cmd response: failed
1,320,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,252 >>> mbox cmd response: failed
1,320,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,154 UART: [kat] SHA2-256
890,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,833 UART: [kat] ++
894,985 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,078 UART: [kat] LMS
1,168,390 UART: [kat] --
1,169,235 UART: [cold-reset] ++
1,169,635 UART: [fht] FHT @ 0x50003400
1,172,199 UART: [idev] ++
1,172,367 UART: [idev] CDI.KEYID = 6
1,172,728 UART: [idev] SUBJECT.KEYID = 7
1,173,153 UART: [idev] UDS.KEYID = 0
1,173,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,091 UART: [idev] Erasing UDS.KEYID = 0
1,198,125 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,146 UART: [ldev] ++
1,208,314 UART: [ldev] CDI.KEYID = 6
1,208,678 UART: [ldev] SUBJECT.KEYID = 5
1,209,105 UART: [ldev] AUTHORITY.KEYID = 7
1,209,568 UART: [ldev] FE.KEYID = 1
1,214,340 UART: [ldev] Erasing FE.KEYID = 1
1,240,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,274 UART: [fwproc] Wait for Commands...
1,280,855 UART: [fwproc] Recv command 0x46574c44
1,281,588 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,532 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,899 >>> mbox cmd response: failed
1,173,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,905 >>> mbox cmd response: failed
1,173,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,088 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,748 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,449 UART: [kat] LMS
1,168,761 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,120 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,521 UART: [ldev] Erasing FE.KEYID = 1
1,241,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,757 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,840 UART: [fwproc] Recv command 0x46574c44
1,282,573 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,050 UART: ROM Fatal Error: 0x000B000D
1,322,209 >>> mbox cmd response: failed
1,322,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,215 >>> mbox cmd response: failed
1,322,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,221 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,185 UART: [ldev] SUBJECT.KEYID = 5
1,210,612 UART: [ldev] AUTHORITY.KEYID = 7
1,211,075 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,877 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,701 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,247 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,174,282 >>> mbox cmd response: failed
1,174,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,288 >>> mbox cmd response: failed
1,174,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,297 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,097 UART:
192,484 UART: Running Caliptra ROM ...
193,574 UART:
193,716 UART: [state] CFI Enabled
260,775 UART: [state] LifecycleState = Unprovisioned
262,697 UART: [state] DebugLocked = No
264,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,668 UART: [kat] SHA2-256
439,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,874 UART: [kat] ++
450,406 UART: [kat] sha1
460,317 UART: [kat] SHA2-256
462,999 UART: [kat] SHA2-384
468,541 UART: [kat] SHA2-512-ACC
470,880 UART: [kat] ECC-384
2,766,944 UART: [kat] HMAC-384Kdf
2,799,875 UART: [kat] LMS
3,990,223 UART: [kat] --
3,994,440 UART: [cold-reset] ++
3,996,210 UART: [fht] Storing FHT @ 0x50003400
4,007,968 UART: [idev] ++
4,008,548 UART: [idev] CDI.KEYID = 6
4,009,466 UART: [idev] SUBJECT.KEYID = 7
4,010,742 UART: [idev] UDS.KEYID = 0
4,013,469 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,778 UART: [idev] Erasing UDS.KEYID = 0
7,345,196 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,074 UART: [idev] --
7,371,181 UART: [ldev] ++
7,371,801 UART: [ldev] CDI.KEYID = 6
7,372,735 UART: [ldev] SUBJECT.KEYID = 5
7,373,946 UART: [ldev] AUTHORITY.KEYID = 7
7,375,254 UART: [ldev] FE.KEYID = 1
7,421,424 UART: [ldev] Erasing FE.KEYID = 1
10,752,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,496 UART: [ldev] --
13,113,952 UART: [fwproc] Waiting for Commands...
13,117,185 UART: [fwproc] Received command 0x46574c44
13,119,374 UART: [fwproc] Received Image of size 113760 bytes
13,191,211 UART: ROM Fatal Error: 0x000B0008
13,194,740 >>> mbox cmd response: failed
13,195,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,195,486 >>> mbox cmd response: failed
13,195,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,196,068 >>> mbox cmd response: failed
Initializing fuses
2,051,464 writing to cptra_bootfsm_go
2,240,794 UART:
2,241,151 UART: Running Caliptra ROM ...
2,242,290 UART:
2,242,459 UART: [state] CFI Enabled
2,321,120 UART: [state] LifecycleState = Unprovisioned
2,323,122 UART: [state] DebugLocked = No
2,324,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,827 UART: [kat] SHA2-256
2,498,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,046 UART: [kat] ++
2,509,621 UART: [kat] sha1
2,521,489 UART: [kat] SHA2-256
2,524,187 UART: [kat] SHA2-384
2,530,874 UART: [kat] SHA2-512-ACC
2,533,232 UART: [kat] ECC-384
4,822,753 UART: [kat] HMAC-384Kdf
4,855,636 UART: [kat] LMS
6,045,936 UART: [kat] --
6,049,732 UART: [cold-reset] ++
6,051,518 UART: [fht] Storing FHT @ 0x50003400
6,062,358 UART: [idev] ++
6,062,925 UART: [idev] CDI.KEYID = 6
6,063,893 UART: [idev] SUBJECT.KEYID = 7
6,065,162 UART: [idev] UDS.KEYID = 0
6,067,686 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,210,875 UART: [idev] Erasing UDS.KEYID = 0
9,400,718 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,779 UART: [idev] --
9,427,181 UART: [ldev] ++
9,427,758 UART: [ldev] CDI.KEYID = 6
9,428,667 UART: [ldev] SUBJECT.KEYID = 5
9,429,933 UART: [ldev] AUTHORITY.KEYID = 7
9,431,172 UART: [ldev] FE.KEYID = 1
9,478,292 UART: [ldev] Erasing FE.KEYID = 1
12,816,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,138,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,153,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,186,059 UART: [ldev] --
15,191,221 UART: [fwproc] Waiting for Commands...
15,194,565 UART: [fwproc] Received command 0x46574c44
15,196,777 UART: [fwproc] Received Image of size 113760 bytes
19,243,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,321,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,390,272 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,705,600 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,804,664 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,931,508 >>> mbox cmd response: failed
12,932,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,932,510 >>> mbox cmd response: failed
12,932,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,933,072 >>> mbox cmd response: failed
Initializing fuses
2,048,438 writing to cptra_bootfsm_go
5,823,944 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,881,013 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,598 UART:
192,964 UART: Running Caliptra ROM ...
194,152 UART:
603,645 UART: [state] CFI Enabled
615,920 UART: [state] LifecycleState = Unprovisioned
617,843 UART: [state] DebugLocked = No
619,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,409 UART: [kat] SHA2-256
794,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,685 UART: [kat] ++
805,197 UART: [kat] sha1
817,184 UART: [kat] SHA2-256
819,873 UART: [kat] SHA2-384
825,854 UART: [kat] SHA2-512-ACC
828,267 UART: [kat] ECC-384
3,109,819 UART: [kat] HMAC-384Kdf
3,121,678 UART: [kat] LMS
4,311,833 UART: [kat] --
4,315,038 UART: [cold-reset] ++
4,317,252 UART: [fht] Storing FHT @ 0x50003400
4,327,929 UART: [idev] ++
4,328,495 UART: [idev] CDI.KEYID = 6
4,329,405 UART: [idev] SUBJECT.KEYID = 7
4,330,676 UART: [idev] UDS.KEYID = 0
4,333,637 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,234 UART: [idev] Erasing UDS.KEYID = 0
7,612,485 UART: [idev] Using Sha1 for KeyId Algorithm
7,633,766 UART: [idev] --
7,638,681 UART: [ldev] ++
7,639,256 UART: [ldev] CDI.KEYID = 6
7,640,296 UART: [ldev] SUBJECT.KEYID = 5
7,641,405 UART: [ldev] AUTHORITY.KEYID = 7
7,642,700 UART: [ldev] FE.KEYID = 1
7,653,291 UART: [ldev] Erasing FE.KEYID = 1
10,939,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,231,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,246,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,261,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,275,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,295,709 UART: [ldev] --
13,299,835 UART: [fwproc] Waiting for Commands...
13,303,068 UART: [fwproc] Received command 0x46574c44
13,305,312 UART: [fwproc] Received Image of size 113760 bytes
13,375,460 UART: ROM Fatal Error: 0x000B0008
13,378,986 >>> mbox cmd response: failed
13,379,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,379,761 >>> mbox cmd response: failed
13,380,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,326 >>> mbox cmd response: failed
Initializing fuses
2,049,387 writing to cptra_bootfsm_go
2,238,690 UART:
2,239,037 UART: Running Caliptra ROM ...
2,240,178 UART:
7,078,563 UART: [state] CFI Enabled
7,096,280 UART: [state] LifecycleState = Unprovisioned
7,098,203 UART: [state] DebugLocked = No
7,100,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,106,278 UART: [kat] SHA2-256
7,276,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,286,596 UART: [kat] ++
7,287,059 UART: [kat] sha1
7,298,491 UART: [kat] SHA2-256
7,301,188 UART: [kat] SHA2-384
7,307,124 UART: [kat] SHA2-512-ACC
7,309,528 UART: [kat] ECC-384
9,592,786 UART: [kat] HMAC-384Kdf
9,602,805 UART: [kat] LMS
10,792,933 UART: [kat] --
10,797,253 UART: [cold-reset] ++
10,799,237 UART: [fht] Storing FHT @ 0x50003400
10,811,092 UART: [idev] ++
10,811,658 UART: [idev] CDI.KEYID = 6
10,812,596 UART: [idev] SUBJECT.KEYID = 7
10,813,861 UART: [idev] UDS.KEYID = 0
10,816,582 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,959,618 UART: [idev] Erasing UDS.KEYID = 0
14,100,738 UART: [idev] Using Sha1 for KeyId Algorithm
14,121,478 UART: [idev] --
14,125,663 UART: [ldev] ++
14,126,233 UART: [ldev] CDI.KEYID = 6
14,127,167 UART: [ldev] SUBJECT.KEYID = 5
14,128,516 UART: [ldev] AUTHORITY.KEYID = 7
14,129,615 UART: [ldev] FE.KEYID = 1
14,140,017 UART: [ldev] Erasing FE.KEYID = 1
17,429,769 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,720,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,735,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,750,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,764,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,783,837 UART: [ldev] --
19,789,281 UART: [fwproc] Waiting for Commands...
19,791,062 UART: [fwproc] Received command 0x46574c44
19,793,254 UART: [fwproc] Received Image of size 113760 bytes
23,839,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,909,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,978,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,294,273 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
4,129,012 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,134,483 >>> mbox cmd response: failed
13,135,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,135,406 >>> mbox cmd response: failed
13,135,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,135,973 >>> mbox cmd response: failed
Initializing fuses
2,046,272 writing to cptra_bootfsm_go
10,860,797 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,785,771 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,356 UART:
192,709 UART: Running Caliptra ROM ...
193,885 UART:
194,033 UART: [state] CFI Enabled
261,654 UART: [state] LifecycleState = Unprovisioned
263,519 UART: [state] DebugLocked = No
266,198 UART: [state] WD Timer not started. Device not locked for debugging
269,111 UART: [kat] SHA2-256
448,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,801 UART: [kat] ++
460,334 UART: [kat] sha1
472,140 UART: [kat] SHA2-256
475,151 UART: [kat] SHA2-384
482,387 UART: [kat] SHA2-512-ACC
485,334 UART: [kat] ECC-384
2,946,004 UART: [kat] HMAC-384Kdf
2,970,873 UART: [kat] LMS
3,500,362 UART: [kat] --
3,504,954 UART: [cold-reset] ++
3,506,879 UART: [fht] FHT @ 0x50003400
3,518,012 UART: [idev] ++
3,518,610 UART: [idev] CDI.KEYID = 6
3,519,495 UART: [idev] SUBJECT.KEYID = 7
3,520,707 UART: [idev] UDS.KEYID = 0
3,523,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,034 UART: [idev] Erasing UDS.KEYID = 0
6,026,632 UART: [idev] Sha1 KeyId Algorithm
6,049,085 UART: [idev] --
6,052,710 UART: [ldev] ++
6,053,282 UART: [ldev] CDI.KEYID = 6
6,054,202 UART: [ldev] SUBJECT.KEYID = 5
6,055,391 UART: [ldev] AUTHORITY.KEYID = 7
6,056,627 UART: [ldev] FE.KEYID = 1
6,099,475 UART: [ldev] Erasing FE.KEYID = 1
8,602,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,299 UART: [ldev] --
10,392,590 UART: [fwproc] Wait for Commands...
10,394,396 UART: [fwproc] Recv command 0x46574c44
10,396,451 UART: [fwproc] Recv'd Img size: 114084 bytes
10,470,266 UART: ROM Fatal Error: 0x000B0008
10,473,413 >>> mbox cmd response: failed
10,473,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,294 >>> mbox cmd response: failed
10,474,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,883 >>> mbox cmd response: failed
Initializing fuses
2,048,893 writing to cptra_bootfsm_go
2,238,207 UART:
2,238,559 UART: Running Caliptra ROM ...
2,239,693 UART:
2,239,857 UART: [state] CFI Enabled
2,311,433 UART: [state] LifecycleState = Unprovisioned
2,313,321 UART: [state] DebugLocked = No
2,315,780 UART: [state] WD Timer not started. Device not locked for debugging
2,319,058 UART: [kat] SHA2-256
2,498,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,735 UART: [kat] ++
2,510,198 UART: [kat] sha1
2,520,651 UART: [kat] SHA2-256
2,523,669 UART: [kat] SHA2-384
2,529,930 UART: [kat] SHA2-512-ACC
2,532,881 UART: [kat] ECC-384
4,996,670 UART: [kat] HMAC-384Kdf
5,019,760 UART: [kat] LMS
5,549,171 UART: [kat] --
5,553,700 UART: [cold-reset] ++
5,554,660 UART: [fht] FHT @ 0x50003400
5,565,798 UART: [idev] ++
5,566,358 UART: [idev] CDI.KEYID = 6
5,567,240 UART: [idev] SUBJECT.KEYID = 7
5,568,451 UART: [idev] UDS.KEYID = 0
5,571,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,715,408 UART: [idev] Erasing UDS.KEYID = 0
8,073,008 UART: [idev] Sha1 KeyId Algorithm
8,096,125 UART: [idev] --
8,100,149 UART: [ldev] ++
8,100,732 UART: [ldev] CDI.KEYID = 6
8,101,641 UART: [ldev] SUBJECT.KEYID = 5
8,102,803 UART: [ldev] AUTHORITY.KEYID = 7
8,104,035 UART: [ldev] FE.KEYID = 1
8,150,200 UART: [ldev] Erasing FE.KEYID = 1
10,651,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,369 UART: [ldev] --
12,460,715 UART: [fwproc] Wait for Commands...
12,463,859 UART: [fwproc] Recv command 0x46574c44
12,465,956 UART: [fwproc] Recv'd Img size: 114084 bytes
15,869,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,003,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,320,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,381,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,248,593 >>> mbox cmd response: failed
10,249,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,249,496 >>> mbox cmd response: failed
10,249,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,250,059 >>> mbox cmd response: failed
Initializing fuses
2,045,551 writing to cptra_bootfsm_go
5,396,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,099,530 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,681 UART:
193,033 UART: Running Caliptra ROM ...
194,224 UART:
603,694 UART: [state] CFI Enabled
616,363 UART: [state] LifecycleState = Unprovisioned
618,709 UART: [state] DebugLocked = No
620,000 UART: [state] WD Timer not started. Device not locked for debugging
624,195 UART: [kat] SHA2-256
803,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,891 UART: [kat] ++
815,420 UART: [kat] sha1
825,874 UART: [kat] SHA2-256
828,869 UART: [kat] SHA2-384
835,498 UART: [kat] SHA2-512-ACC
838,483 UART: [kat] ECC-384
3,278,247 UART: [kat] HMAC-384Kdf
3,290,370 UART: [kat] LMS
3,819,872 UART: [kat] --
3,824,667 UART: [cold-reset] ++
3,827,190 UART: [fht] FHT @ 0x50003400
3,837,421 UART: [idev] ++
3,837,984 UART: [idev] CDI.KEYID = 6
3,838,868 UART: [idev] SUBJECT.KEYID = 7
3,840,096 UART: [idev] UDS.KEYID = 0
3,843,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,987,406 UART: [idev] Erasing UDS.KEYID = 0
6,314,381 UART: [idev] Sha1 KeyId Algorithm
6,337,726 UART: [idev] --
6,341,247 UART: [ldev] ++
6,341,817 UART: [ldev] CDI.KEYID = 6
6,342,743 UART: [ldev] SUBJECT.KEYID = 5
6,343,842 UART: [ldev] AUTHORITY.KEYID = 7
6,345,126 UART: [ldev] FE.KEYID = 1
6,357,562 UART: [ldev] Erasing FE.KEYID = 1
8,832,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,769 UART: [ldev] --
10,625,071 UART: [fwproc] Wait for Commands...
10,627,674 UART: [fwproc] Recv command 0x46574c44
10,629,775 UART: [fwproc] Recv'd Img size: 114084 bytes
10,700,352 UART: ROM Fatal Error: 0x000B0008
10,703,437 >>> mbox cmd response: failed
10,703,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,704,189 >>> mbox cmd response: failed
10,704,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,704,746 >>> mbox cmd response: failed
Initializing fuses
2,049,638 writing to cptra_bootfsm_go
2,238,968 UART:
2,239,352 UART: Running Caliptra ROM ...
2,240,491 UART:
9,739,022 UART: [state] CFI Enabled
9,751,394 UART: [state] LifecycleState = Unprovisioned
9,753,428 UART: [state] DebugLocked = No
9,755,403 UART: [state] WD Timer not started. Device not locked for debugging
9,758,297 UART: [kat] SHA2-256
9,937,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,948,991 UART: [kat] ++
9,949,449 UART: [kat] sha1
9,959,471 UART: [kat] SHA2-256
9,962,490 UART: [kat] SHA2-384
9,969,079 UART: [kat] SHA2-512-ACC
9,972,027 UART: [kat] ECC-384
12,415,341 UART: [kat] HMAC-384Kdf
12,427,091 UART: [kat] LMS
12,956,575 UART: [kat] --
12,962,672 UART: [cold-reset] ++
12,965,041 UART: [fht] FHT @ 0x50003400
12,976,292 UART: [idev] ++
12,976,852 UART: [idev] CDI.KEYID = 6
12,977,733 UART: [idev] SUBJECT.KEYID = 7
12,978,945 UART: [idev] UDS.KEYID = 0
12,981,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,125,130 UART: [idev] Erasing UDS.KEYID = 0
15,445,787 UART: [idev] Sha1 KeyId Algorithm
15,469,821 UART: [idev] --
15,473,971 UART: [ldev] ++
15,474,538 UART: [ldev] CDI.KEYID = 6
15,475,479 UART: [ldev] SUBJECT.KEYID = 5
15,476,632 UART: [ldev] AUTHORITY.KEYID = 7
15,477,919 UART: [ldev] FE.KEYID = 1
15,487,258 UART: [ldev] Erasing FE.KEYID = 1
17,962,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,681,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,697,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,713,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,748,043 UART: [ldev] --
19,752,066 UART: [fwproc] Wait for Commands...
19,753,597 UART: [fwproc] Recv command 0x46574c44
19,755,557 UART: [fwproc] Recv'd Img size: 114084 bytes
23,158,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,231,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,299,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,617,744 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,699,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,479,386 >>> mbox cmd response: failed
10,479,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,321 >>> mbox cmd response: failed
10,480,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,881 >>> mbox cmd response: failed
Initializing fuses
2,046,313 writing to cptra_bootfsm_go
13,078,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,636,512 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,193 UART:
192,558 UART: Running Caliptra ROM ...
193,905 UART:
194,065 UART: [state] CFI Enabled
264,385 UART: [state] LifecycleState = Unprovisioned
266,768 UART: [state] DebugLocked = No
268,364 UART: [state] WD Timer not started. Device not locked for debugging
272,747 UART: [kat] SHA2-256
462,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,413 UART: [kat] ++
473,887 UART: [kat] sha1
485,472 UART: [kat] SHA2-256
488,543 UART: [kat] SHA2-384
494,793 UART: [kat] SHA2-512-ACC
497,407 UART: [kat] ECC-384
2,947,137 UART: [kat] HMAC-384Kdf
2,971,256 UART: [kat] LMS
3,503,028 UART: [kat] --
3,508,564 UART: [cold-reset] ++
3,509,526 UART: [fht] FHT @ 0x50003400
3,521,432 UART: [idev] ++
3,522,114 UART: [idev] CDI.KEYID = 6
3,523,076 UART: [idev] SUBJECT.KEYID = 7
3,524,239 UART: [idev] UDS.KEYID = 0
3,526,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,634 UART: [idev] Erasing UDS.KEYID = 0
6,050,361 UART: [idev] Sha1 KeyId Algorithm
6,072,044 UART: [idev] --
6,077,985 UART: [ldev] ++
6,078,726 UART: [ldev] CDI.KEYID = 6
6,079,637 UART: [ldev] SUBJECT.KEYID = 5
6,080,795 UART: [ldev] AUTHORITY.KEYID = 7
6,082,029 UART: [ldev] FE.KEYID = 1
6,122,513 UART: [ldev] Erasing FE.KEYID = 1
8,625,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,717 UART: [ldev] --
10,435,485 UART: [fwproc] Wait for Commands...
10,437,087 UART: [fwproc] Recv command 0x46574c44
10,439,420 UART: [fwproc] Recv'd Img size: 114084 bytes
10,542,199 UART: ROM Fatal Error: 0x000B0008
10,545,851 >>> mbox cmd response: failed
10,546,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,611 >>> mbox cmd response: failed
10,546,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,170 >>> mbox cmd response: failed
Initializing fuses
2,052,176 writing to cptra_bootfsm_go
2,241,464 UART:
2,241,809 UART: Running Caliptra ROM ...
2,242,895 UART:
2,243,052 UART: [state] CFI Enabled
2,306,649 UART: [state] LifecycleState = Unprovisioned
2,309,029 UART: [state] DebugLocked = No
2,310,640 UART: [state] WD Timer not started. Device not locked for debugging
2,314,654 UART: [kat] SHA2-256
2,504,499 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,311 UART: [kat] ++
2,515,821 UART: [kat] sha1
2,526,926 UART: [kat] SHA2-256
2,529,957 UART: [kat] SHA2-384
2,536,876 UART: [kat] SHA2-512-ACC
2,539,461 UART: [kat] ECC-384
4,989,284 UART: [kat] HMAC-384Kdf
5,012,480 UART: [kat] LMS
5,544,245 UART: [kat] --
5,549,309 UART: [cold-reset] ++
5,551,505 UART: [fht] FHT @ 0x50003400
5,562,174 UART: [idev] ++
5,562,850 UART: [idev] CDI.KEYID = 6
5,563,812 UART: [idev] SUBJECT.KEYID = 7
5,565,027 UART: [idev] UDS.KEYID = 0
5,567,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,711,349 UART: [idev] Erasing UDS.KEYID = 0
8,069,539 UART: [idev] Sha1 KeyId Algorithm
8,093,054 UART: [idev] --
8,098,586 UART: [ldev] ++
8,099,277 UART: [ldev] CDI.KEYID = 6
8,100,166 UART: [ldev] SUBJECT.KEYID = 5
8,101,378 UART: [ldev] AUTHORITY.KEYID = 7
8,102,616 UART: [ldev] FE.KEYID = 1
8,140,257 UART: [ldev] Erasing FE.KEYID = 1
10,645,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,778 UART: [ldev] --
12,453,889 UART: [fwproc] Wait for Commands...
12,457,029 UART: [fwproc] Recv command 0x46574c44
12,459,304 UART: [fwproc] Recv'd Img size: 114084 bytes
15,900,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,096,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,638,111 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,442,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,328,025 >>> mbox cmd response: failed
10,328,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,328,924 >>> mbox cmd response: failed
10,329,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,329,485 >>> mbox cmd response: failed
Initializing fuses
2,047,900 writing to cptra_bootfsm_go
5,473,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,761,762 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,438 UART:
192,819 UART: Running Caliptra ROM ...
194,363 UART:
603,721 UART: [state] CFI Enabled
618,063 UART: [state] LifecycleState = Unprovisioned
620,441 UART: [state] DebugLocked = No
622,682 UART: [state] WD Timer not started. Device not locked for debugging
627,207 UART: [kat] SHA2-256
817,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,836 UART: [kat] ++
828,475 UART: [kat] sha1
839,635 UART: [kat] SHA2-256
842,626 UART: [kat] SHA2-384
848,502 UART: [kat] SHA2-512-ACC
851,121 UART: [kat] ECC-384
3,294,494 UART: [kat] HMAC-384Kdf
3,308,453 UART: [kat] LMS
3,840,309 UART: [kat] --
3,844,142 UART: [cold-reset] ++
3,846,506 UART: [fht] FHT @ 0x50003400
3,858,409 UART: [idev] ++
3,859,082 UART: [idev] CDI.KEYID = 6
3,860,098 UART: [idev] SUBJECT.KEYID = 7
3,861,260 UART: [idev] UDS.KEYID = 0
3,863,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,007,806 UART: [idev] Erasing UDS.KEYID = 0
6,341,136 UART: [idev] Sha1 KeyId Algorithm
6,364,737 UART: [idev] --
6,370,923 UART: [ldev] ++
6,371,609 UART: [ldev] CDI.KEYID = 6
6,372,494 UART: [ldev] SUBJECT.KEYID = 5
6,373,702 UART: [ldev] AUTHORITY.KEYID = 7
6,374,938 UART: [ldev] FE.KEYID = 1
6,387,629 UART: [ldev] Erasing FE.KEYID = 1
8,866,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,522 UART: [ldev] --
10,657,408 UART: [fwproc] Wait for Commands...
10,659,125 UART: [fwproc] Recv command 0x46574c44
10,661,384 UART: [fwproc] Recv'd Img size: 114084 bytes
10,761,532 UART: ROM Fatal Error: 0x000B0008
10,765,225 >>> mbox cmd response: failed
10,765,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,765,951 >>> mbox cmd response: failed
10,766,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,506 >>> mbox cmd response: failed
Initializing fuses
2,051,199 writing to cptra_bootfsm_go
2,240,517 UART:
2,240,873 UART: Running Caliptra ROM ...
2,242,023 UART:
9,692,507 UART: [state] CFI Enabled
9,708,035 UART: [state] LifecycleState = Unprovisioned
9,710,387 UART: [state] DebugLocked = No
9,712,151 UART: [state] WD Timer not started. Device not locked for debugging
9,716,060 UART: [kat] SHA2-256
9,905,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,916,771 UART: [kat] ++
9,917,270 UART: [kat] sha1
9,928,831 UART: [kat] SHA2-256
9,931,861 UART: [kat] SHA2-384
9,939,206 UART: [kat] SHA2-512-ACC
9,941,779 UART: [kat] ECC-384
12,385,219 UART: [kat] HMAC-384Kdf
12,397,498 UART: [kat] LMS
12,929,296 UART: [kat] --
12,933,119 UART: [cold-reset] ++
12,934,452 UART: [fht] FHT @ 0x50003400
12,945,805 UART: [idev] ++
12,946,684 UART: [idev] CDI.KEYID = 6
12,947,603 UART: [idev] SUBJECT.KEYID = 7
12,948,718 UART: [idev] UDS.KEYID = 0
12,951,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,094,666 UART: [idev] Erasing UDS.KEYID = 0
15,428,107 UART: [idev] Sha1 KeyId Algorithm
15,450,548 UART: [idev] --
15,456,757 UART: [ldev] ++
15,457,441 UART: [ldev] CDI.KEYID = 6
15,458,347 UART: [ldev] SUBJECT.KEYID = 5
15,459,506 UART: [ldev] AUTHORITY.KEYID = 7
15,460,736 UART: [ldev] FE.KEYID = 1
15,471,085 UART: [ldev] Erasing FE.KEYID = 1
17,949,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,668,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,698,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,713,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,734,359 UART: [ldev] --
19,739,835 UART: [fwproc] Wait for Commands...
19,741,874 UART: [fwproc] Recv command 0x46574c44
19,744,186 UART: [fwproc] Recv'd Img size: 114084 bytes
23,191,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,272,160 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,388,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,929,699 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,757,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,534,201 >>> mbox cmd response: failed
10,534,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,127 >>> mbox cmd response: failed
10,535,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,721 >>> mbox cmd response: failed
Initializing fuses
2,052,350 writing to cptra_bootfsm_go
13,096,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,298,501 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,350 UART: [kat] LMS
1,475,546 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,813 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,276 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,018 UART: [idev] --
1,515,279 UART: [ldev] ++
1,515,447 UART: [ldev] CDI.KEYID = 6
1,515,810 UART: [ldev] SUBJECT.KEYID = 5
1,516,236 UART: [ldev] AUTHORITY.KEYID = 7
1,516,699 UART: [ldev] FE.KEYID = 1
1,521,745 UART: [ldev] Erasing FE.KEYID = 1
1,547,512 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,262 UART: [ldev] --
1,586,755 UART: [fwproc] Waiting for Commands...
1,587,610 UART: [fwproc] Received command 0x46574c44
1,588,401 UART: [fwproc] Received Image of size 114084 bytes
1,613,606 UART: ROM Fatal Error: 0x000B0008
1,614,763 >>> mbox cmd response: failed
1,614,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,769 >>> mbox cmd response: failed
1,614,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
895,124 UART: [kat] SHA2-512-ACC
897,025 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,202 UART: [kat] LMS
1,475,398 UART: [kat] --
1,476,163 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,504,802 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,464 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,521,097 UART: [ldev] Erasing FE.KEYID = 1
1,545,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,026 UART: [ldev] --
1,584,391 UART: [fwproc] Waiting for Commands...
1,585,156 UART: [fwproc] Received command 0x46574c44
1,585,947 UART: [fwproc] Received Image of size 114084 bytes
2,879,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,604 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,936,956 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,463 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,466,834 >>> mbox cmd response: failed
1,466,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,840 >>> mbox cmd response: failed
1,466,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,903 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,722 UART: [kat] SHA2-256
892,660 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,619 UART: [kat] HMAC-384Kdf
907,201 UART: [kat] LMS
1,475,397 UART: [kat] --
1,476,282 UART: [cold-reset] ++
1,476,754 UART: [fht] Storing FHT @ 0x50003400
1,479,747 UART: [idev] ++
1,479,915 UART: [idev] CDI.KEYID = 6
1,480,275 UART: [idev] SUBJECT.KEYID = 7
1,480,699 UART: [idev] UDS.KEYID = 0
1,481,044 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,506,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,023 UART: [idev] --
1,515,948 UART: [ldev] ++
1,516,116 UART: [ldev] CDI.KEYID = 6
1,516,479 UART: [ldev] SUBJECT.KEYID = 5
1,516,905 UART: [ldev] AUTHORITY.KEYID = 7
1,517,368 UART: [ldev] FE.KEYID = 1
1,522,696 UART: [ldev] Erasing FE.KEYID = 1
1,548,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,573 UART: [ldev] --
1,587,962 UART: [fwproc] Waiting for Commands...
1,588,617 UART: [fwproc] Received command 0x46574c44
1,589,408 UART: [fwproc] Received Image of size 114084 bytes
1,614,641 UART: ROM Fatal Error: 0x000B0008
1,615,798 >>> mbox cmd response: failed
1,615,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,804 >>> mbox cmd response: failed
1,615,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,619 UART: [kat] LMS
1,475,815 UART: [kat] --
1,476,916 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,313 UART: [idev] ++
1,480,481 UART: [idev] CDI.KEYID = 6
1,480,841 UART: [idev] SUBJECT.KEYID = 7
1,481,265 UART: [idev] UDS.KEYID = 0
1,481,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,121 UART: [idev] Erasing UDS.KEYID = 0
1,506,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,999 UART: [idev] --
1,516,044 UART: [ldev] ++
1,516,212 UART: [ldev] CDI.KEYID = 6
1,516,575 UART: [ldev] SUBJECT.KEYID = 5
1,517,001 UART: [ldev] AUTHORITY.KEYID = 7
1,517,464 UART: [ldev] FE.KEYID = 1
1,522,656 UART: [ldev] Erasing FE.KEYID = 1
1,548,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,961 UART: [ldev] --
1,587,382 UART: [fwproc] Waiting for Commands...
1,588,159 UART: [fwproc] Received command 0x46574c44
1,588,950 UART: [fwproc] Received Image of size 114084 bytes
2,883,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,849 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,794 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,465,661 >>> mbox cmd response: failed
1,465,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,667 >>> mbox cmd response: failed
1,465,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,673 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,792 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
918,070 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,171,797 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,710 UART: [idev] ++
1,174,878 UART: [idev] CDI.KEYID = 6
1,175,238 UART: [idev] SUBJECT.KEYID = 7
1,175,662 UART: [idev] UDS.KEYID = 0
1,176,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,809 UART: [idev] Sha1 KeyId Algorithm
1,209,109 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,216,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,801 UART: [ldev] --
1,281,152 UART: [fwproc] Wait for Commands...
1,281,884 UART: [fwproc] Recv command 0x46574c44
1,282,612 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,241 UART: ROM Fatal Error: 0x000B0008
1,308,398 >>> mbox cmd response: failed
1,308,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,404 >>> mbox cmd response: failed
1,308,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
893,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,749 UART: [kat] ++
897,901 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,362 UART: [kat] HMAC-384Kdf
923,134 UART: [kat] LMS
1,171,462 UART: [kat] --
1,172,389 UART: [cold-reset] ++
1,172,909 UART: [fht] FHT @ 0x50003400
1,175,482 UART: [idev] ++
1,175,650 UART: [idev] CDI.KEYID = 6
1,176,010 UART: [idev] SUBJECT.KEYID = 7
1,176,434 UART: [idev] UDS.KEYID = 0
1,176,779 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,352 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,757 UART: [ldev] ++
1,210,925 UART: [ldev] CDI.KEYID = 6
1,211,288 UART: [ldev] SUBJECT.KEYID = 5
1,211,714 UART: [ldev] AUTHORITY.KEYID = 7
1,212,177 UART: [ldev] FE.KEYID = 1
1,217,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,760 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,572 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,685 >>> mbox cmd response: failed
1,163,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,691 >>> mbox cmd response: failed
1,163,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,683 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,327 UART: [kat] SHA2-256
893,977 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,102 UART: [kat] ++
898,254 UART: [kat] sha1
902,668 UART: [kat] SHA2-256
904,608 UART: [kat] SHA2-384
907,397 UART: [kat] SHA2-512-ACC
909,298 UART: [kat] ECC-384
918,891 UART: [kat] HMAC-384Kdf
923,511 UART: [kat] LMS
1,171,839 UART: [kat] --
1,172,792 UART: [cold-reset] ++
1,173,226 UART: [fht] FHT @ 0x50003400
1,175,949 UART: [idev] ++
1,176,117 UART: [idev] CDI.KEYID = 6
1,176,477 UART: [idev] SUBJECT.KEYID = 7
1,176,901 UART: [idev] UDS.KEYID = 0
1,177,246 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,157 UART: [idev] Erasing UDS.KEYID = 0
1,203,124 UART: [idev] Sha1 KeyId Algorithm
1,211,672 UART: [idev] --
1,212,686 UART: [ldev] ++
1,212,854 UART: [ldev] CDI.KEYID = 6
1,213,217 UART: [ldev] SUBJECT.KEYID = 5
1,213,643 UART: [ldev] AUTHORITY.KEYID = 7
1,214,106 UART: [ldev] FE.KEYID = 1
1,219,244 UART: [ldev] Erasing FE.KEYID = 1
1,245,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,688 UART: [ldev] --
1,285,047 UART: [fwproc] Wait for Commands...
1,285,857 UART: [fwproc] Recv command 0x46574c44
1,286,585 UART: [fwproc] Recv'd Img size: 114084 bytes
1,311,080 UART: ROM Fatal Error: 0x000B0008
1,312,237 >>> mbox cmd response: failed
1,312,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,243 >>> mbox cmd response: failed
1,312,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
893,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,466 UART: [kat] ++
897,618 UART: [kat] sha1
901,896 UART: [kat] SHA2-256
903,836 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
917,647 UART: [kat] HMAC-384Kdf
922,273 UART: [kat] LMS
1,170,601 UART: [kat] --
1,171,392 UART: [cold-reset] ++
1,171,822 UART: [fht] FHT @ 0x50003400
1,174,475 UART: [idev] ++
1,174,643 UART: [idev] CDI.KEYID = 6
1,175,003 UART: [idev] SUBJECT.KEYID = 7
1,175,427 UART: [idev] UDS.KEYID = 0
1,175,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,475 UART: [idev] Erasing UDS.KEYID = 0
1,200,120 UART: [idev] Sha1 KeyId Algorithm
1,208,356 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,501 UART: [ldev] AUTHORITY.KEYID = 7
1,210,964 UART: [ldev] FE.KEYID = 1
1,216,300 UART: [ldev] Erasing FE.KEYID = 1
1,242,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,676 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,681 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,358 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,164,918 >>> mbox cmd response: failed
1,164,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,924 >>> mbox cmd response: failed
1,164,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,680 UART: [state] LifecycleState = Unprovisioned
85,335 UART: [state] DebugLocked = No
86,033 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,317 UART: [kat] SHA2-256
901,257 UART: [kat] SHA2-384
903,878 UART: [kat] SHA2-512-ACC
905,779 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,236 UART: [kat] LMS
1,168,548 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,503 UART: [idev] ++
1,172,671 UART: [idev] CDI.KEYID = 6
1,173,032 UART: [idev] SUBJECT.KEYID = 7
1,173,457 UART: [idev] UDS.KEYID = 0
1,173,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,850 UART: [ldev] --
1,280,358 UART: [fwproc] Wait for Commands...
1,281,007 UART: [fwproc] Recv command 0x46574c44
1,281,740 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,432 UART: ROM Fatal Error: 0x000B0008
1,307,589 >>> mbox cmd response: failed
1,307,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,595 >>> mbox cmd response: failed
1,307,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
890,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,847 UART: [kat] ++
894,999 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,900 UART: [kat] SHA2-512-ACC
905,801 UART: [kat] ECC-384
915,742 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,491 UART: [idev] ++
1,172,659 UART: [idev] CDI.KEYID = 6
1,173,020 UART: [idev] SUBJECT.KEYID = 7
1,173,445 UART: [idev] UDS.KEYID = 0
1,173,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,198,097 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,394 UART: [ldev] Erasing FE.KEYID = 1
1,240,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,456 UART: [ldev] --
1,279,840 UART: [fwproc] Wait for Commands...
1,280,645 UART: [fwproc] Recv command 0x46574c44
1,281,378 UART: [fwproc] Recv'd Img size: 114084 bytes
2,574,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,766,838 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,266 >>> mbox cmd response: failed
1,159,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,272 >>> mbox cmd response: failed
1,159,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,360 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,778 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,353 UART: [kat] LMS
1,168,665 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,169,860 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,564 UART: [idev] Erasing UDS.KEYID = 0
1,198,758 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,495 UART: [ldev] ++
1,208,663 UART: [ldev] CDI.KEYID = 6
1,209,027 UART: [ldev] SUBJECT.KEYID = 5
1,209,454 UART: [ldev] AUTHORITY.KEYID = 7
1,209,917 UART: [ldev] FE.KEYID = 1
1,215,103 UART: [ldev] Erasing FE.KEYID = 1
1,240,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,985 UART: [ldev] --
1,280,451 UART: [fwproc] Wait for Commands...
1,281,262 UART: [fwproc] Recv command 0x46574c44
1,281,995 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,047 UART: ROM Fatal Error: 0x000B0008
1,308,204 >>> mbox cmd response: failed
1,308,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,210 >>> mbox cmd response: failed
1,308,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,975 UART: [state] LifecycleState = Unprovisioned
85,630 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,353 UART: [kat] SHA2-256
890,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,032 UART: [kat] ++
895,184 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,174,250 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,198,984 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,853 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,119 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,111 >>> mbox cmd response: failed
1,161,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,117 >>> mbox cmd response: failed
1,161,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,531 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,267 UART:
192,619 UART: Running Caliptra ROM ...
193,797 UART:
193,949 UART: [state] CFI Enabled
264,591 UART: [state] LifecycleState = Unprovisioned
266,541 UART: [state] DebugLocked = No
268,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,469 UART: [kat] SHA2-256
442,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,866 UART: [kat] ++
453,386 UART: [kat] sha1
464,323 UART: [kat] SHA2-256
467,020 UART: [kat] SHA2-384
472,754 UART: [kat] SHA2-512-ACC
475,105 UART: [kat] ECC-384
2,766,556 UART: [kat] HMAC-384Kdf
2,797,978 UART: [kat] LMS
3,988,279 UART: [kat] --
3,992,671 UART: [cold-reset] ++
3,994,997 UART: [fht] Storing FHT @ 0x50003400
4,005,785 UART: [idev] ++
4,006,359 UART: [idev] CDI.KEYID = 6
4,007,275 UART: [idev] SUBJECT.KEYID = 7
4,008,552 UART: [idev] UDS.KEYID = 0
4,011,267 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,554 UART: [idev] Erasing UDS.KEYID = 0
7,345,245 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,660 UART: [idev] --
7,369,382 UART: [ldev] ++
7,369,978 UART: [ldev] CDI.KEYID = 6
7,370,889 UART: [ldev] SUBJECT.KEYID = 5
7,372,110 UART: [ldev] AUTHORITY.KEYID = 7
7,373,400 UART: [ldev] FE.KEYID = 1
7,421,102 UART: [ldev] Erasing FE.KEYID = 1
10,757,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,607 UART: [ldev] --
13,136,795 UART: [fwproc] Waiting for Commands...
13,139,011 UART: [fwproc] Received command 0x46574c44
13,141,205 UART: [fwproc] Received Image of size 113760 bytes
13,213,847 UART: ROM Fatal Error: 0x000B0009
13,217,368 >>> mbox cmd response: failed
13,217,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,218,143 >>> mbox cmd response: failed
13,218,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,218,704 >>> mbox cmd response: failed
Initializing fuses
2,048,212 writing to cptra_bootfsm_go
2,237,532 UART:
2,237,877 UART: Running Caliptra ROM ...
2,238,928 UART:
2,239,083 UART: [state] CFI Enabled
2,315,973 UART: [state] LifecycleState = Unprovisioned
2,317,926 UART: [state] DebugLocked = No
2,320,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,923 UART: [kat] SHA2-256
2,495,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,178 UART: [kat] ++
2,506,689 UART: [kat] sha1
2,517,020 UART: [kat] SHA2-256
2,519,733 UART: [kat] SHA2-384
2,525,029 UART: [kat] SHA2-512-ACC
2,527,440 UART: [kat] ECC-384
4,819,022 UART: [kat] HMAC-384Kdf
4,849,992 UART: [kat] LMS
6,040,287 UART: [kat] --
6,045,743 UART: [cold-reset] ++
6,046,704 UART: [fht] Storing FHT @ 0x50003400
6,057,951 UART: [idev] ++
6,058,511 UART: [idev] CDI.KEYID = 6
6,059,448 UART: [idev] SUBJECT.KEYID = 7
6,060,737 UART: [idev] UDS.KEYID = 0
6,063,284 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,206,511 UART: [idev] Erasing UDS.KEYID = 0
9,399,950 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,180 UART: [idev] --
9,425,392 UART: [ldev] ++
9,426,019 UART: [ldev] CDI.KEYID = 6
9,426,907 UART: [ldev] SUBJECT.KEYID = 5
9,428,155 UART: [ldev] AUTHORITY.KEYID = 7
9,429,447 UART: [ldev] FE.KEYID = 1
9,473,481 UART: [ldev] Erasing FE.KEYID = 1
12,807,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,119,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,134,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,149,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,163,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,183,129 UART: [ldev] --
15,187,583 UART: [fwproc] Waiting for Commands...
15,189,585 UART: [fwproc] Received command 0x46574c44
15,191,776 UART: [fwproc] Received Image of size 113760 bytes
19,241,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,313,682 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,382,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,699,359 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,807,507 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,954,943 >>> mbox cmd response: failed
12,955,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,955,851 >>> mbox cmd response: failed
12,956,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,956,407 >>> mbox cmd response: failed
Initializing fuses
2,047,581 writing to cptra_bootfsm_go
5,823,958 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,899,248 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,567 UART:
192,936 UART: Running Caliptra ROM ...
194,124 UART:
603,863 UART: [state] CFI Enabled
614,733 UART: [state] LifecycleState = Unprovisioned
616,904 UART: [state] DebugLocked = No
619,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,998 UART: [kat] SHA2-256
793,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,284 UART: [kat] ++
804,733 UART: [kat] sha1
816,850 UART: [kat] SHA2-256
819,536 UART: [kat] SHA2-384
826,055 UART: [kat] SHA2-512-ACC
828,448 UART: [kat] ECC-384
3,113,288 UART: [kat] HMAC-384Kdf
3,126,513 UART: [kat] LMS
4,316,615 UART: [kat] --
4,321,760 UART: [cold-reset] ++
4,323,856 UART: [fht] Storing FHT @ 0x50003400
4,335,612 UART: [idev] ++
4,336,182 UART: [idev] CDI.KEYID = 6
4,337,065 UART: [idev] SUBJECT.KEYID = 7
4,338,336 UART: [idev] UDS.KEYID = 0
4,341,027 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,484,086 UART: [idev] Erasing UDS.KEYID = 0
7,625,000 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,275 UART: [idev] --
7,649,789 UART: [ldev] ++
7,650,419 UART: [ldev] CDI.KEYID = 6
7,651,331 UART: [ldev] SUBJECT.KEYID = 5
7,652,551 UART: [ldev] AUTHORITY.KEYID = 7
7,653,841 UART: [ldev] FE.KEYID = 1
7,666,793 UART: [ldev] Erasing FE.KEYID = 1
10,954,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,642 UART: [ldev] --
13,317,043 UART: [fwproc] Waiting for Commands...
13,320,170 UART: [fwproc] Received command 0x46574c44
13,322,358 UART: [fwproc] Received Image of size 113760 bytes
13,396,781 UART: ROM Fatal Error: 0x000B0009
13,400,300 >>> mbox cmd response: failed
13,400,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,401,032 >>> mbox cmd response: failed
13,401,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,401,601 >>> mbox cmd response: failed
Initializing fuses
2,048,051 writing to cptra_bootfsm_go
2,237,322 UART:
2,237,675 UART: Running Caliptra ROM ...
2,238,725 UART:
7,066,733 UART: [state] CFI Enabled
7,082,347 UART: [state] LifecycleState = Unprovisioned
7,084,271 UART: [state] DebugLocked = No
7,087,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,185 UART: [kat] SHA2-256
7,261,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,445 UART: [kat] ++
7,272,907 UART: [kat] sha1
7,284,625 UART: [kat] SHA2-256
7,287,319 UART: [kat] SHA2-384
7,293,036 UART: [kat] SHA2-512-ACC
7,295,450 UART: [kat] ECC-384
9,579,502 UART: [kat] HMAC-384Kdf
9,591,843 UART: [kat] LMS
10,781,926 UART: [kat] --
10,788,082 UART: [cold-reset] ++
10,790,667 UART: [fht] Storing FHT @ 0x50003400
10,802,046 UART: [idev] ++
10,802,612 UART: [idev] CDI.KEYID = 6
10,803,627 UART: [idev] SUBJECT.KEYID = 7
10,804,793 UART: [idev] UDS.KEYID = 0
10,807,527 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,950,913 UART: [idev] Erasing UDS.KEYID = 0
14,089,762 UART: [idev] Using Sha1 for KeyId Algorithm
14,111,147 UART: [idev] --
14,114,630 UART: [ldev] ++
14,115,262 UART: [ldev] CDI.KEYID = 6
14,116,150 UART: [ldev] SUBJECT.KEYID = 5
14,117,402 UART: [ldev] AUTHORITY.KEYID = 7
14,118,640 UART: [ldev] FE.KEYID = 1
14,128,938 UART: [ldev] Erasing FE.KEYID = 1
17,417,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,709,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,724,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,739,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,753,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,773,032 UART: [ldev] --
19,778,044 UART: [fwproc] Waiting for Commands...
19,780,078 UART: [fwproc] Received command 0x46574c44
19,782,279 UART: [fwproc] Received Image of size 113760 bytes
23,826,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,900,040 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,968,959 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,285,445 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
4,126,391 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,132,670 >>> mbox cmd response: failed
13,133,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,604 >>> mbox cmd response: failed
13,133,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,134,115 >>> mbox cmd response: failed
Initializing fuses
2,044,720 writing to cptra_bootfsm_go
10,865,226 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,806,217 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,105 UART:
192,473 UART: Running Caliptra ROM ...
193,559 UART:
193,701 UART: [state] CFI Enabled
260,684 UART: [state] LifecycleState = Unprovisioned
262,674 UART: [state] DebugLocked = No
265,107 UART: [state] WD Timer not started. Device not locked for debugging
269,482 UART: [kat] SHA2-256
448,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,189 UART: [kat] ++
460,743 UART: [kat] sha1
472,059 UART: [kat] SHA2-256
475,069 UART: [kat] SHA2-384
481,805 UART: [kat] SHA2-512-ACC
484,794 UART: [kat] ECC-384
2,947,867 UART: [kat] HMAC-384Kdf
2,969,223 UART: [kat] LMS
3,498,654 UART: [kat] --
3,503,205 UART: [cold-reset] ++
3,505,357 UART: [fht] FHT @ 0x50003400
3,516,280 UART: [idev] ++
3,516,843 UART: [idev] CDI.KEYID = 6
3,517,824 UART: [idev] SUBJECT.KEYID = 7
3,518,986 UART: [idev] UDS.KEYID = 0
3,521,958 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,714 UART: [idev] Erasing UDS.KEYID = 0
6,026,108 UART: [idev] Sha1 KeyId Algorithm
6,049,894 UART: [idev] --
6,054,436 UART: [ldev] ++
6,055,007 UART: [ldev] CDI.KEYID = 6
6,055,923 UART: [ldev] SUBJECT.KEYID = 5
6,057,138 UART: [ldev] AUTHORITY.KEYID = 7
6,058,370 UART: [ldev] FE.KEYID = 1
6,098,080 UART: [ldev] Erasing FE.KEYID = 1
8,600,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,866 UART: [ldev] --
10,410,910 UART: [fwproc] Wait for Commands...
10,413,443 UART: [fwproc] Recv command 0x46574c44
10,415,558 UART: [fwproc] Recv'd Img size: 114084 bytes
10,487,921 UART: ROM Fatal Error: 0x000B0009
10,491,000 >>> mbox cmd response: failed
10,491,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,747 >>> mbox cmd response: failed
10,492,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,318 >>> mbox cmd response: failed
Initializing fuses
2,047,870 writing to cptra_bootfsm_go
2,237,187 UART:
2,237,529 UART: Running Caliptra ROM ...
2,238,660 UART:
2,238,831 UART: [state] CFI Enabled
2,312,432 UART: [state] LifecycleState = Unprovisioned
2,314,316 UART: [state] DebugLocked = No
2,316,946 UART: [state] WD Timer not started. Device not locked for debugging
2,319,937 UART: [kat] SHA2-256
2,499,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,612 UART: [kat] ++
2,511,155 UART: [kat] sha1
2,522,539 UART: [kat] SHA2-256
2,525,559 UART: [kat] SHA2-384
2,530,739 UART: [kat] SHA2-512-ACC
2,533,687 UART: [kat] ECC-384
4,997,789 UART: [kat] HMAC-384Kdf
5,020,607 UART: [kat] LMS
5,550,055 UART: [kat] --
5,555,741 UART: [cold-reset] ++
5,558,221 UART: [fht] FHT @ 0x50003400
5,569,822 UART: [idev] ++
5,570,391 UART: [idev] CDI.KEYID = 6
5,571,308 UART: [idev] SUBJECT.KEYID = 7
5,572,470 UART: [idev] UDS.KEYID = 0
5,575,164 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,718,769 UART: [idev] Erasing UDS.KEYID = 0
8,076,181 UART: [idev] Sha1 KeyId Algorithm
8,098,124 UART: [idev] --
8,101,834 UART: [ldev] ++
8,102,416 UART: [ldev] CDI.KEYID = 6
8,103,304 UART: [ldev] SUBJECT.KEYID = 5
8,104,521 UART: [ldev] AUTHORITY.KEYID = 7
8,105,758 UART: [ldev] FE.KEYID = 1
8,149,103 UART: [ldev] Erasing FE.KEYID = 1
10,654,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,704 UART: [ldev] --
12,461,806 UART: [fwproc] Wait for Commands...
12,464,127 UART: [fwproc] Recv command 0x46574c44
12,466,171 UART: [fwproc] Recv'd Img size: 114084 bytes
15,869,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,327,698 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,382,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,280,883 >>> mbox cmd response: failed
10,281,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,282,008 >>> mbox cmd response: failed
10,282,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,282,580 >>> mbox cmd response: failed
Initializing fuses
2,046,459 writing to cptra_bootfsm_go
5,409,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,093,166 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,492 UART:
192,860 UART: Running Caliptra ROM ...
194,044 UART:
603,484 UART: [state] CFI Enabled
615,735 UART: [state] LifecycleState = Unprovisioned
617,572 UART: [state] DebugLocked = No
618,970 UART: [state] WD Timer not started. Device not locked for debugging
623,230 UART: [kat] SHA2-256
802,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,886 UART: [kat] ++
814,329 UART: [kat] sha1
824,987 UART: [kat] SHA2-256
828,044 UART: [kat] SHA2-384
834,289 UART: [kat] SHA2-512-ACC
837,216 UART: [kat] ECC-384
3,280,001 UART: [kat] HMAC-384Kdf
3,292,614 UART: [kat] LMS
3,822,105 UART: [kat] --
3,827,281 UART: [cold-reset] ++
3,829,208 UART: [fht] FHT @ 0x50003400
3,840,308 UART: [idev] ++
3,840,880 UART: [idev] CDI.KEYID = 6
3,841,789 UART: [idev] SUBJECT.KEYID = 7
3,843,006 UART: [idev] UDS.KEYID = 0
3,845,690 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,173 UART: [idev] Erasing UDS.KEYID = 0
6,315,773 UART: [idev] Sha1 KeyId Algorithm
6,339,925 UART: [idev] --
6,344,412 UART: [ldev] ++
6,344,982 UART: [ldev] CDI.KEYID = 6
6,345,890 UART: [ldev] SUBJECT.KEYID = 5
6,347,109 UART: [ldev] AUTHORITY.KEYID = 7
6,348,341 UART: [ldev] FE.KEYID = 1
6,359,207 UART: [ldev] Erasing FE.KEYID = 1
8,833,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,275 UART: [ldev] --
10,623,714 UART: [fwproc] Wait for Commands...
10,626,496 UART: [fwproc] Recv command 0x46574c44
10,628,603 UART: [fwproc] Recv'd Img size: 114084 bytes
10,705,341 UART: ROM Fatal Error: 0x000B0009
10,708,432 >>> mbox cmd response: failed
10,708,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,072 >>> mbox cmd response: failed
10,709,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,633 >>> mbox cmd response: failed
Initializing fuses
2,048,597 writing to cptra_bootfsm_go
2,237,856 UART:
2,238,225 UART: Running Caliptra ROM ...
2,239,278 UART:
9,747,165 UART: [state] CFI Enabled
9,761,633 UART: [state] LifecycleState = Unprovisioned
9,763,526 UART: [state] DebugLocked = No
9,765,219 UART: [state] WD Timer not started. Device not locked for debugging
9,769,288 UART: [kat] SHA2-256
9,948,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,960,005 UART: [kat] ++
9,960,466 UART: [kat] sha1
9,972,484 UART: [kat] SHA2-256
9,975,505 UART: [kat] SHA2-384
9,980,794 UART: [kat] SHA2-512-ACC
9,983,759 UART: [kat] ECC-384
12,424,221 UART: [kat] HMAC-384Kdf
12,437,314 UART: [kat] LMS
12,966,791 UART: [kat] --
12,971,837 UART: [cold-reset] ++
12,972,908 UART: [fht] FHT @ 0x50003400
12,984,294 UART: [idev] ++
12,984,863 UART: [idev] CDI.KEYID = 6
12,985,748 UART: [idev] SUBJECT.KEYID = 7
12,986,959 UART: [idev] UDS.KEYID = 0
12,989,737 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,133,154 UART: [idev] Erasing UDS.KEYID = 0
15,461,078 UART: [idev] Sha1 KeyId Algorithm
15,484,315 UART: [idev] --
15,488,198 UART: [ldev] ++
15,488,764 UART: [ldev] CDI.KEYID = 6
15,489,665 UART: [ldev] SUBJECT.KEYID = 5
15,490,822 UART: [ldev] AUTHORITY.KEYID = 7
15,492,109 UART: [ldev] FE.KEYID = 1
15,503,620 UART: [ldev] Erasing FE.KEYID = 1
17,975,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,695,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,762,259 UART: [ldev] --
19,767,162 UART: [fwproc] Wait for Commands...
19,768,667 UART: [fwproc] Recv command 0x46574c44
19,770,765 UART: [fwproc] Recv'd Img size: 114084 bytes
23,176,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,249,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,318,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,635,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,694,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,475,589 >>> mbox cmd response: failed
10,476,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,479 >>> mbox cmd response: failed
10,476,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,083 >>> mbox cmd response: failed
Initializing fuses
2,052,207 writing to cptra_bootfsm_go
13,080,646 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,648,862 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,208 UART:
192,556 UART: Running Caliptra ROM ...
193,745 UART:
193,898 UART: [state] CFI Enabled
266,265 UART: [state] LifecycleState = Unprovisioned
268,628 UART: [state] DebugLocked = No
271,052 UART: [state] WD Timer not started. Device not locked for debugging
275,211 UART: [kat] SHA2-256
465,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,882 UART: [kat] ++
476,360 UART: [kat] sha1
489,292 UART: [kat] SHA2-256
492,311 UART: [kat] SHA2-384
498,991 UART: [kat] SHA2-512-ACC
501,548 UART: [kat] ECC-384
2,947,405 UART: [kat] HMAC-384Kdf
2,971,480 UART: [kat] LMS
3,503,249 UART: [kat] --
3,507,843 UART: [cold-reset] ++
3,509,131 UART: [fht] FHT @ 0x50003400
3,521,139 UART: [idev] ++
3,521,813 UART: [idev] CDI.KEYID = 6
3,522,827 UART: [idev] SUBJECT.KEYID = 7
3,523,988 UART: [idev] UDS.KEYID = 0
3,526,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,393 UART: [idev] Erasing UDS.KEYID = 0
6,051,977 UART: [idev] Sha1 KeyId Algorithm
6,074,406 UART: [idev] --
6,078,730 UART: [ldev] ++
6,079,413 UART: [ldev] CDI.KEYID = 6
6,080,324 UART: [ldev] SUBJECT.KEYID = 5
6,081,507 UART: [ldev] AUTHORITY.KEYID = 7
6,082,684 UART: [ldev] FE.KEYID = 1
6,120,236 UART: [ldev] Erasing FE.KEYID = 1
8,628,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,405,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,381 UART: [ldev] --
10,432,136 UART: [fwproc] Wait for Commands...
10,433,799 UART: [fwproc] Recv command 0x46574c44
10,436,131 UART: [fwproc] Recv'd Img size: 114084 bytes
10,538,919 UART: ROM Fatal Error: 0x000B0009
10,542,565 >>> mbox cmd response: failed
10,542,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,306 >>> mbox cmd response: failed
10,543,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,543,885 >>> mbox cmd response: failed
Initializing fuses
2,055,569 writing to cptra_bootfsm_go
2,244,878 UART:
2,245,226 UART: Running Caliptra ROM ...
2,246,363 UART:
2,246,534 UART: [state] CFI Enabled
2,306,154 UART: [state] LifecycleState = Unprovisioned
2,308,563 UART: [state] DebugLocked = No
2,310,343 UART: [state] WD Timer not started. Device not locked for debugging
2,315,512 UART: [kat] SHA2-256
2,505,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,207 UART: [kat] ++
2,516,755 UART: [kat] sha1
2,527,506 UART: [kat] SHA2-256
2,530,573 UART: [kat] SHA2-384
2,536,631 UART: [kat] SHA2-512-ACC
2,539,205 UART: [kat] ECC-384
4,988,105 UART: [kat] HMAC-384Kdf
5,012,172 UART: [kat] LMS
5,543,953 UART: [kat] --
5,549,021 UART: [cold-reset] ++
5,550,424 UART: [fht] FHT @ 0x50003400
5,561,411 UART: [idev] ++
5,562,087 UART: [idev] CDI.KEYID = 6
5,563,060 UART: [idev] SUBJECT.KEYID = 7
5,564,224 UART: [idev] UDS.KEYID = 0
5,566,989 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,710,465 UART: [idev] Erasing UDS.KEYID = 0
8,069,147 UART: [idev] Sha1 KeyId Algorithm
8,092,774 UART: [idev] --
8,097,855 UART: [ldev] ++
8,098,539 UART: [ldev] CDI.KEYID = 6
8,099,454 UART: [ldev] SUBJECT.KEYID = 5
8,100,626 UART: [ldev] AUTHORITY.KEYID = 7
8,101,858 UART: [ldev] FE.KEYID = 1
8,141,264 UART: [ldev] Erasing FE.KEYID = 1
10,648,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,271 UART: [ldev] --
12,452,147 UART: [fwproc] Wait for Commands...
12,454,919 UART: [fwproc] Recv command 0x46574c44
12,457,187 UART: [fwproc] Recv'd Img size: 114084 bytes
15,906,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,644,514 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,444,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,319,007 >>> mbox cmd response: failed
10,319,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,320,235 >>> mbox cmd response: failed
10,320,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,320,804 >>> mbox cmd response: failed
Initializing fuses
2,048,875 writing to cptra_bootfsm_go
5,473,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,758,146 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,481 UART:
192,836 UART: Running Caliptra ROM ...
194,387 UART:
603,513 UART: [state] CFI Enabled
620,305 UART: [state] LifecycleState = Unprovisioned
622,636 UART: [state] DebugLocked = No
624,878 UART: [state] WD Timer not started. Device not locked for debugging
628,715 UART: [kat] SHA2-256
818,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,382 UART: [kat] ++
829,915 UART: [kat] sha1
841,169 UART: [kat] SHA2-256
844,163 UART: [kat] SHA2-384
849,932 UART: [kat] SHA2-512-ACC
852,540 UART: [kat] ECC-384
3,293,425 UART: [kat] HMAC-384Kdf
3,306,543 UART: [kat] LMS
3,838,364 UART: [kat] --
3,844,593 UART: [cold-reset] ++
3,847,014 UART: [fht] FHT @ 0x50003400
3,859,510 UART: [idev] ++
3,860,192 UART: [idev] CDI.KEYID = 6
3,861,126 UART: [idev] SUBJECT.KEYID = 7
3,862,397 UART: [idev] UDS.KEYID = 0
3,865,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,784 UART: [idev] Erasing UDS.KEYID = 0
6,343,271 UART: [idev] Sha1 KeyId Algorithm
6,366,552 UART: [idev] --
6,372,083 UART: [ldev] ++
6,372,774 UART: [ldev] CDI.KEYID = 6
6,373,660 UART: [ldev] SUBJECT.KEYID = 5
6,374,871 UART: [ldev] AUTHORITY.KEYID = 7
6,376,068 UART: [ldev] FE.KEYID = 1
6,387,200 UART: [ldev] Erasing FE.KEYID = 1
8,864,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,293 UART: [ldev] --
10,656,582 UART: [fwproc] Wait for Commands...
10,659,700 UART: [fwproc] Recv command 0x46574c44
10,662,011 UART: [fwproc] Recv'd Img size: 114084 bytes
10,768,686 UART: ROM Fatal Error: 0x000B0009
10,772,368 >>> mbox cmd response: failed
10,772,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,773,019 >>> mbox cmd response: failed
10,773,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,773,596 >>> mbox cmd response: failed
Initializing fuses
2,048,588 writing to cptra_bootfsm_go
2,237,881 UART:
2,238,235 UART: Running Caliptra ROM ...
2,239,283 UART:
9,682,784 UART: [state] CFI Enabled
9,695,669 UART: [state] LifecycleState = Unprovisioned
9,698,019 UART: [state] DebugLocked = No
9,700,142 UART: [state] WD Timer not started. Device not locked for debugging
9,704,652 UART: [kat] SHA2-256
9,894,563 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,905,306 UART: [kat] ++
9,905,843 UART: [kat] sha1
9,918,353 UART: [kat] SHA2-256
9,921,386 UART: [kat] SHA2-384
9,927,762 UART: [kat] SHA2-512-ACC
9,930,334 UART: [kat] ECC-384
12,372,652 UART: [kat] HMAC-384Kdf
12,384,885 UART: [kat] LMS
12,916,721 UART: [kat] --
12,920,597 UART: [cold-reset] ++
12,922,688 UART: [fht] FHT @ 0x50003400
12,934,583 UART: [idev] ++
12,935,253 UART: [idev] CDI.KEYID = 6
12,936,215 UART: [idev] SUBJECT.KEYID = 7
12,937,427 UART: [idev] UDS.KEYID = 0
12,940,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,083,550 UART: [idev] Erasing UDS.KEYID = 0
15,419,145 UART: [idev] Sha1 KeyId Algorithm
15,441,996 UART: [idev] --
15,448,154 UART: [ldev] ++
15,448,833 UART: [ldev] CDI.KEYID = 6
15,449,743 UART: [ldev] SUBJECT.KEYID = 5
15,450,900 UART: [ldev] AUTHORITY.KEYID = 7
15,452,129 UART: [ldev] FE.KEYID = 1
15,461,208 UART: [ldev] Erasing FE.KEYID = 1
17,939,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,673,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,703,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,723,616 UART: [ldev] --
19,728,718 UART: [fwproc] Wait for Commands...
19,731,028 UART: [fwproc] Recv command 0x46574c44
19,733,370 UART: [fwproc] Recv'd Img size: 114084 bytes
23,173,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,245,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,362,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,902,519 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,755,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,531,698 >>> mbox cmd response: failed
10,532,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,532,652 >>> mbox cmd response: failed
10,532,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,224 >>> mbox cmd response: failed
Initializing fuses
2,050,056 writing to cptra_bootfsm_go
13,086,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,282,866 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,006 UART: [kat] SHA2-512-ACC
896,907 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,146 UART: [kat] LMS
1,475,342 UART: [kat] --
1,476,229 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,420 UART: [idev] Erasing UDS.KEYID = 0
1,504,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,218 UART: [idev] --
1,514,263 UART: [ldev] ++
1,514,431 UART: [ldev] CDI.KEYID = 6
1,514,794 UART: [ldev] SUBJECT.KEYID = 5
1,515,220 UART: [ldev] AUTHORITY.KEYID = 7
1,515,683 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,546,664 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,888 UART: [ldev] --
1,586,211 UART: [fwproc] Waiting for Commands...
1,586,838 UART: [fwproc] Received command 0x46574c44
1,587,629 UART: [fwproc] Received Image of size 114084 bytes
1,613,077 UART: ROM Fatal Error: 0x000B0009
1,614,234 >>> mbox cmd response: failed
1,614,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,240 >>> mbox cmd response: failed
1,614,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,411 UART: [kat] SHA2-256
892,349 UART: [kat] SHA2-384
894,938 UART: [kat] SHA2-512-ACC
896,839 UART: [kat] ECC-384
902,206 UART: [kat] HMAC-384Kdf
906,740 UART: [kat] LMS
1,474,936 UART: [kat] --
1,475,681 UART: [cold-reset] ++
1,476,171 UART: [fht] Storing FHT @ 0x50003400
1,478,860 UART: [idev] ++
1,479,028 UART: [idev] CDI.KEYID = 6
1,479,388 UART: [idev] SUBJECT.KEYID = 7
1,479,812 UART: [idev] UDS.KEYID = 0
1,480,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,858 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,226 UART: [idev] --
1,514,337 UART: [ldev] ++
1,514,505 UART: [ldev] CDI.KEYID = 6
1,514,868 UART: [ldev] SUBJECT.KEYID = 5
1,515,294 UART: [ldev] AUTHORITY.KEYID = 7
1,515,757 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,508 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,486 UART: [fwproc] Received command 0x46574c44
1,587,277 UART: [fwproc] Received Image of size 114084 bytes
2,881,948 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,836 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,677 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,466,529 >>> mbox cmd response: failed
1,466,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,535 >>> mbox cmd response: failed
1,466,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,541 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,519 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,311 UART: [kat] LMS
1,475,507 UART: [kat] --
1,476,282 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,453 UART: [idev] ++
1,479,621 UART: [idev] CDI.KEYID = 6
1,479,981 UART: [idev] SUBJECT.KEYID = 7
1,480,405 UART: [idev] UDS.KEYID = 0
1,480,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,127 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,987 UART: [idev] --
1,514,934 UART: [ldev] ++
1,515,102 UART: [ldev] CDI.KEYID = 6
1,515,465 UART: [ldev] SUBJECT.KEYID = 5
1,515,891 UART: [ldev] AUTHORITY.KEYID = 7
1,516,354 UART: [ldev] FE.KEYID = 1
1,521,640 UART: [ldev] Erasing FE.KEYID = 1
1,546,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,671 UART: [ldev] --
1,586,164 UART: [fwproc] Waiting for Commands...
1,586,897 UART: [fwproc] Received command 0x46574c44
1,587,688 UART: [fwproc] Received Image of size 114084 bytes
1,612,490 UART: ROM Fatal Error: 0x000B0009
1,613,647 >>> mbox cmd response: failed
1,613,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,653 >>> mbox cmd response: failed
1,613,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,752 UART: [kat] SHA2-256
892,690 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
903,081 UART: [kat] HMAC-384Kdf
907,705 UART: [kat] LMS
1,475,901 UART: [kat] --
1,476,678 UART: [cold-reset] ++
1,477,142 UART: [fht] Storing FHT @ 0x50003400
1,480,139 UART: [idev] ++
1,480,307 UART: [idev] CDI.KEYID = 6
1,480,667 UART: [idev] SUBJECT.KEYID = 7
1,481,091 UART: [idev] UDS.KEYID = 0
1,481,436 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,305 UART: [idev] Erasing UDS.KEYID = 0
1,506,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,601 UART: [idev] --
1,515,562 UART: [ldev] ++
1,515,730 UART: [ldev] CDI.KEYID = 6
1,516,093 UART: [ldev] SUBJECT.KEYID = 5
1,516,519 UART: [ldev] AUTHORITY.KEYID = 7
1,516,982 UART: [ldev] FE.KEYID = 1
1,522,404 UART: [ldev] Erasing FE.KEYID = 1
1,547,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,565 UART: [ldev] --
1,587,030 UART: [fwproc] Waiting for Commands...
1,587,671 UART: [fwproc] Received command 0x46574c44
1,588,462 UART: [fwproc] Received Image of size 114084 bytes
2,883,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,466,358 >>> mbox cmd response: failed
1,466,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,364 >>> mbox cmd response: failed
1,466,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,156 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,634 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
893,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,763 UART: [kat] ++
897,915 UART: [kat] sha1
902,077 UART: [kat] SHA2-256
904,017 UART: [kat] SHA2-384
906,874 UART: [kat] SHA2-512-ACC
908,775 UART: [kat] ECC-384
918,536 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,405 UART: [cold-reset] ++
1,172,817 UART: [fht] FHT @ 0x50003400
1,175,554 UART: [idev] ++
1,175,722 UART: [idev] CDI.KEYID = 6
1,176,082 UART: [idev] SUBJECT.KEYID = 7
1,176,506 UART: [idev] UDS.KEYID = 0
1,176,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,468 UART: [idev] Erasing UDS.KEYID = 0
1,201,519 UART: [idev] Sha1 KeyId Algorithm
1,210,103 UART: [idev] --
1,211,277 UART: [ldev] ++
1,211,445 UART: [ldev] CDI.KEYID = 6
1,211,808 UART: [ldev] SUBJECT.KEYID = 5
1,212,234 UART: [ldev] AUTHORITY.KEYID = 7
1,212,697 UART: [ldev] FE.KEYID = 1
1,217,971 UART: [ldev] Erasing FE.KEYID = 1
1,244,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,239 UART: [ldev] --
1,283,696 UART: [fwproc] Wait for Commands...
1,284,326 UART: [fwproc] Recv command 0x46574c44
1,285,054 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,998 UART: ROM Fatal Error: 0x000B0009
1,311,155 >>> mbox cmd response: failed
1,311,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,161 >>> mbox cmd response: failed
1,311,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,852 UART: [kat] LMS
1,171,180 UART: [kat] --
1,171,973 UART: [cold-reset] ++
1,172,459 UART: [fht] FHT @ 0x50003400
1,175,112 UART: [idev] ++
1,175,280 UART: [idev] CDI.KEYID = 6
1,175,640 UART: [idev] SUBJECT.KEYID = 7
1,176,064 UART: [idev] UDS.KEYID = 0
1,176,409 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,731 UART: [idev] Sha1 KeyId Algorithm
1,209,153 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,883 UART: [ldev] Erasing FE.KEYID = 1
1,243,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,540 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,950 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,416 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,165,414 >>> mbox cmd response: failed
1,165,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,420 >>> mbox cmd response: failed
1,165,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,437 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,153 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
894,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,134 UART: [kat] ++
898,286 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,967 UART: [kat] HMAC-384Kdf
923,679 UART: [kat] LMS
1,172,007 UART: [kat] --
1,172,942 UART: [cold-reset] ++
1,173,316 UART: [fht] FHT @ 0x50003400
1,176,169 UART: [idev] ++
1,176,337 UART: [idev] CDI.KEYID = 6
1,176,697 UART: [idev] SUBJECT.KEYID = 7
1,177,121 UART: [idev] UDS.KEYID = 0
1,177,466 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,185,701 UART: [idev] Erasing UDS.KEYID = 0
1,203,068 UART: [idev] Sha1 KeyId Algorithm
1,211,604 UART: [idev] --
1,212,648 UART: [ldev] ++
1,212,816 UART: [ldev] CDI.KEYID = 6
1,213,179 UART: [ldev] SUBJECT.KEYID = 5
1,213,605 UART: [ldev] AUTHORITY.KEYID = 7
1,214,068 UART: [ldev] FE.KEYID = 1
1,218,960 UART: [ldev] Erasing FE.KEYID = 1
1,245,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,176 UART: [ldev] --
1,284,561 UART: [fwproc] Wait for Commands...
1,285,145 UART: [fwproc] Recv command 0x46574c44
1,285,873 UART: [fwproc] Recv'd Img size: 114084 bytes
1,310,799 UART: ROM Fatal Error: 0x000B0009
1,311,956 >>> mbox cmd response: failed
1,311,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,962 >>> mbox cmd response: failed
1,311,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
893,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,428 UART: [kat] ++
897,580 UART: [kat] sha1
901,666 UART: [kat] SHA2-256
903,606 UART: [kat] SHA2-384
906,491 UART: [kat] SHA2-512-ACC
908,392 UART: [kat] ECC-384
918,037 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,171,724 UART: [cold-reset] ++
1,172,096 UART: [fht] FHT @ 0x50003400
1,174,733 UART: [idev] ++
1,174,901 UART: [idev] CDI.KEYID = 6
1,175,261 UART: [idev] SUBJECT.KEYID = 7
1,175,685 UART: [idev] UDS.KEYID = 0
1,176,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,695 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,592 UART: [ldev] ++
1,209,760 UART: [ldev] CDI.KEYID = 6
1,210,123 UART: [ldev] SUBJECT.KEYID = 5
1,210,549 UART: [ldev] AUTHORITY.KEYID = 7
1,211,012 UART: [ldev] FE.KEYID = 1
1,216,512 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,307 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,035 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,166,085 >>> mbox cmd response: failed
1,166,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,091 >>> mbox cmd response: failed
1,166,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,520 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,340 UART: [kat] HMAC-384Kdf
920,146 UART: [kat] LMS
1,168,458 UART: [kat] --
1,169,463 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,174,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,821 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,692 UART: [ldev] --
1,281,200 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: [fwproc] Recv'd Img size: 114084 bytes
1,307,614 UART: ROM Fatal Error: 0x000B0009
1,308,771 >>> mbox cmd response: failed
1,308,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,777 >>> mbox cmd response: failed
1,308,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,523 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,173,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,837 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,174 UART: [ldev] ++
1,209,342 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,133 UART: [ldev] AUTHORITY.KEYID = 7
1,210,596 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,976 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,217 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,770 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,308 >>> mbox cmd response: failed
1,161,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,314 >>> mbox cmd response: failed
1,161,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,880 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,560 UART: [cold-reset] ++
1,170,020 UART: [fht] FHT @ 0x50003400
1,172,548 UART: [idev] ++
1,172,716 UART: [idev] CDI.KEYID = 6
1,173,077 UART: [idev] SUBJECT.KEYID = 7
1,173,502 UART: [idev] UDS.KEYID = 0
1,173,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,564 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,782 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,481 UART: [ldev] Erasing FE.KEYID = 1
1,241,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,191 UART: [fwproc] Wait for Commands...
1,281,916 UART: [fwproc] Recv command 0x46574c44
1,282,649 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,223 UART: ROM Fatal Error: 0x000B0009
1,309,380 >>> mbox cmd response: failed
1,309,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,386 >>> mbox cmd response: failed
1,309,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,665 UART: [kat] SHA2-512-ACC
906,566 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,174,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,268 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,757 UART: [ldev] SUBJECT.KEYID = 5
1,211,184 UART: [ldev] AUTHORITY.KEYID = 7
1,211,647 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,828 UART: [fwproc] Recv command 0x46574c44
1,284,561 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,369 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,441 >>> mbox cmd response: failed
1,161,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,447 >>> mbox cmd response: failed
1,161,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,471 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,291 UART:
192,648 UART: Running Caliptra ROM ...
193,828 UART:
193,980 UART: [state] CFI Enabled
264,811 UART: [state] LifecycleState = Unprovisioned
266,781 UART: [state] DebugLocked = No
269,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,653 UART: [kat] SHA2-256
444,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,890 UART: [kat] ++
455,381 UART: [kat] sha1
465,882 UART: [kat] SHA2-256
468,566 UART: [kat] SHA2-384
474,165 UART: [kat] SHA2-512-ACC
476,513 UART: [kat] ECC-384
2,767,736 UART: [kat] HMAC-384Kdf
2,798,197 UART: [kat] LMS
3,988,503 UART: [kat] --
3,993,805 UART: [cold-reset] ++
3,995,148 UART: [fht] Storing FHT @ 0x50003400
4,007,989 UART: [idev] ++
4,008,586 UART: [idev] CDI.KEYID = 6
4,009,565 UART: [idev] SUBJECT.KEYID = 7
4,010,789 UART: [idev] UDS.KEYID = 0
4,013,680 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,156,981 UART: [idev] Erasing UDS.KEYID = 0
7,343,046 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,842 UART: [idev] --
7,367,115 UART: [ldev] ++
7,367,698 UART: [ldev] CDI.KEYID = 6
7,368,668 UART: [ldev] SUBJECT.KEYID = 5
7,369,773 UART: [ldev] AUTHORITY.KEYID = 7
7,371,133 UART: [ldev] FE.KEYID = 1
7,399,070 UART: [ldev] Erasing FE.KEYID = 1
10,731,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,490 UART: [ldev] --
13,110,672 UART: [fwproc] Waiting for Commands...
13,112,770 UART: [fwproc] Received command 0x46574c44
13,114,954 UART: [fwproc] Received Image of size 113760 bytes
14,507,019 UART: ROM Fatal Error: 0x000B000C
14,510,514 >>> mbox cmd response: failed
14,510,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,511,247 >>> mbox cmd response: failed
14,511,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,511,830 >>> mbox cmd response: failed
Initializing fuses
2,049,170 writing to cptra_bootfsm_go
2,238,475 UART:
2,238,831 UART: Running Caliptra ROM ...
2,239,969 UART:
2,240,132 UART: [state] CFI Enabled
2,302,639 UART: [state] LifecycleState = Unprovisioned
2,304,578 UART: [state] DebugLocked = No
2,307,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,278 UART: [kat] SHA2-256
2,481,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,500 UART: [kat] ++
2,493,065 UART: [kat] sha1
2,504,346 UART: [kat] SHA2-256
2,507,048 UART: [kat] SHA2-384
2,512,714 UART: [kat] SHA2-512-ACC
2,515,129 UART: [kat] ECC-384
4,805,285 UART: [kat] HMAC-384Kdf
4,839,030 UART: [kat] LMS
6,029,317 UART: [kat] --
6,033,154 UART: [cold-reset] ++
6,035,049 UART: [fht] Storing FHT @ 0x50003400
6,046,541 UART: [idev] ++
6,047,149 UART: [idev] CDI.KEYID = 6
6,048,084 UART: [idev] SUBJECT.KEYID = 7
6,049,311 UART: [idev] UDS.KEYID = 0
6,051,931 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,195,347 UART: [idev] Erasing UDS.KEYID = 0
9,386,371 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,622 UART: [idev] --
9,413,784 UART: [ldev] ++
9,414,363 UART: [ldev] CDI.KEYID = 6
9,415,279 UART: [ldev] SUBJECT.KEYID = 5
9,416,595 UART: [ldev] AUTHORITY.KEYID = 7
9,417,705 UART: [ldev] FE.KEYID = 1
9,461,629 UART: [ldev] Erasing FE.KEYID = 1
12,794,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,124,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,138,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,171,990 UART: [ldev] --
15,176,079 UART: [fwproc] Waiting for Commands...
15,179,428 UART: [fwproc] Received command 0x46574c44
15,181,634 UART: [fwproc] Received Image of size 113760 bytes
19,233,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,314,249 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,383,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,698,709 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,805,828 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,235,979 >>> mbox cmd response: failed
14,236,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,236,923 >>> mbox cmd response: failed
14,237,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,237,493 >>> mbox cmd response: failed
Initializing fuses
2,046,656 writing to cptra_bootfsm_go
5,845,215 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,908,158 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,358 UART:
192,720 UART: Running Caliptra ROM ...
193,852 UART:
603,722 UART: [state] CFI Enabled
615,126 UART: [state] LifecycleState = Unprovisioned
617,079 UART: [state] DebugLocked = No
618,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,702 UART: [kat] SHA2-256
792,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,015 UART: [kat] ++
803,467 UART: [kat] sha1
814,775 UART: [kat] SHA2-256
817,506 UART: [kat] SHA2-384
822,942 UART: [kat] SHA2-512-ACC
825,334 UART: [kat] ECC-384
3,108,375 UART: [kat] HMAC-384Kdf
3,120,413 UART: [kat] LMS
4,310,581 UART: [kat] --
4,314,269 UART: [cold-reset] ++
4,316,550 UART: [fht] Storing FHT @ 0x50003400
4,328,518 UART: [idev] ++
4,329,142 UART: [idev] CDI.KEYID = 6
4,330,055 UART: [idev] SUBJECT.KEYID = 7
4,331,274 UART: [idev] UDS.KEYID = 0
4,334,066 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,477,137 UART: [idev] Erasing UDS.KEYID = 0
7,622,358 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,027 UART: [idev] --
7,646,295 UART: [ldev] ++
7,646,910 UART: [ldev] CDI.KEYID = 6
7,647,802 UART: [ldev] SUBJECT.KEYID = 5
7,649,067 UART: [ldev] AUTHORITY.KEYID = 7
7,650,302 UART: [ldev] FE.KEYID = 1
7,663,914 UART: [ldev] Erasing FE.KEYID = 1
10,954,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,050 UART: [ldev] --
13,318,131 UART: [fwproc] Waiting for Commands...
13,321,422 UART: [fwproc] Received command 0x46574c44
13,323,612 UART: [fwproc] Received Image of size 113760 bytes
14,711,642 UART: ROM Fatal Error: 0x000B000C
14,715,140 >>> mbox cmd response: failed
14,715,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,715,905 >>> mbox cmd response: failed
14,716,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,470 >>> mbox cmd response: failed
Initializing fuses
2,055,612 writing to cptra_bootfsm_go
2,244,997 UART:
2,245,341 UART: Running Caliptra ROM ...
2,246,477 UART:
5,745,331 UART: [state] CFI Enabled
5,761,389 UART: [state] LifecycleState = Unprovisioned
5,763,303 UART: [state] DebugLocked = No
5,765,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,769,701 UART: [kat] SHA2-256
5,939,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,950,003 UART: [kat] ++
5,950,556 UART: [kat] sha1
5,962,586 UART: [kat] SHA2-256
5,965,284 UART: [kat] SHA2-384
5,971,729 UART: [kat] SHA2-512-ACC
5,974,128 UART: [kat] ECC-384
8,258,556 UART: [kat] HMAC-384Kdf
8,270,525 UART: [kat] LMS
9,460,632 UART: [kat] --
9,465,647 UART: [cold-reset] ++
9,468,022 UART: [fht] Storing FHT @ 0x50003400
9,480,750 UART: [idev] ++
9,481,313 UART: [idev] CDI.KEYID = 6
9,482,330 UART: [idev] SUBJECT.KEYID = 7
9,483,491 UART: [idev] UDS.KEYID = 0
9,486,367 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
9,629,390 UART: [idev] Erasing UDS.KEYID = 0
12,772,492 UART: [idev] Using Sha1 for KeyId Algorithm
12,793,776 UART: [idev] --
12,797,016 UART: [ldev] ++
12,797,606 UART: [ldev] CDI.KEYID = 6
12,798,555 UART: [ldev] SUBJECT.KEYID = 5
12,799,809 UART: [ldev] AUTHORITY.KEYID = 7
12,800,961 UART: [ldev] FE.KEYID = 1
12,811,792 UART: [ldev] Erasing FE.KEYID = 1
16,099,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,390,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,405,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,419,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,434,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,453,409 UART: [ldev] --
18,458,091 UART: [fwproc] Waiting for Commands...
18,461,433 UART: [fwproc] Received command 0x46574c44
18,463,682 UART: [fwproc] Received Image of size 113760 bytes
22,515,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,590,612 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,659,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
22,975,779 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,129,788 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,464,194 >>> mbox cmd response: failed
14,464,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,465,132 >>> mbox cmd response: failed
14,465,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,465,692 >>> mbox cmd response: failed
Initializing fuses
2,045,732 writing to cptra_bootfsm_go
9,529,822 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
23,471,199 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,255 UART:
192,629 UART: Running Caliptra ROM ...
193,723 UART:
193,870 UART: [state] CFI Enabled
261,326 UART: [state] LifecycleState = Unprovisioned
263,231 UART: [state] DebugLocked = No
265,642 UART: [state] WD Timer not started. Device not locked for debugging
269,259 UART: [kat] SHA2-256
448,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,983 UART: [kat] ++
460,523 UART: [kat] sha1
470,598 UART: [kat] SHA2-256
473,612 UART: [kat] SHA2-384
479,318 UART: [kat] SHA2-512-ACC
482,301 UART: [kat] ECC-384
2,944,747 UART: [kat] HMAC-384Kdf
2,971,214 UART: [kat] LMS
3,500,662 UART: [kat] --
3,505,709 UART: [cold-reset] ++
3,508,298 UART: [fht] FHT @ 0x50003400
3,519,934 UART: [idev] ++
3,520,504 UART: [idev] CDI.KEYID = 6
3,521,431 UART: [idev] SUBJECT.KEYID = 7
3,522,646 UART: [idev] UDS.KEYID = 0
3,525,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,264 UART: [idev] Erasing UDS.KEYID = 0
6,027,326 UART: [idev] Sha1 KeyId Algorithm
6,051,696 UART: [idev] --
6,055,961 UART: [ldev] ++
6,056,533 UART: [ldev] CDI.KEYID = 6
6,057,421 UART: [ldev] SUBJECT.KEYID = 5
6,058,642 UART: [ldev] AUTHORITY.KEYID = 7
6,059,880 UART: [ldev] FE.KEYID = 1
6,100,053 UART: [ldev] Erasing FE.KEYID = 1
8,604,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,197 UART: [ldev] --
10,413,597 UART: [fwproc] Wait for Commands...
10,416,209 UART: [fwproc] Recv command 0x46574c44
10,418,351 UART: [fwproc] Recv'd Img size: 114084 bytes
11,480,775 UART: ROM Fatal Error: 0x000B000C
11,483,898 >>> mbox cmd response: failed
11,484,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,484,569 >>> mbox cmd response: failed
11,484,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,485,166 >>> mbox cmd response: failed
Initializing fuses
2,054,596 writing to cptra_bootfsm_go
2,243,902 UART:
2,244,254 UART: Running Caliptra ROM ...
2,245,390 UART:
2,245,578 UART: [state] CFI Enabled
2,316,514 UART: [state] LifecycleState = Unprovisioned
2,318,399 UART: [state] DebugLocked = No
2,320,229 UART: [state] WD Timer not started. Device not locked for debugging
2,324,300 UART: [kat] SHA2-256
2,503,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,987 UART: [kat] ++
2,515,531 UART: [kat] sha1
2,528,260 UART: [kat] SHA2-256
2,531,283 UART: [kat] SHA2-384
2,537,955 UART: [kat] SHA2-512-ACC
2,540,914 UART: [kat] ECC-384
5,000,572 UART: [kat] HMAC-384Kdf
5,024,896 UART: [kat] LMS
5,554,335 UART: [kat] --
5,559,619 UART: [cold-reset] ++
5,560,488 UART: [fht] FHT @ 0x50003400
5,571,715 UART: [idev] ++
5,572,325 UART: [idev] CDI.KEYID = 6
5,573,218 UART: [idev] SUBJECT.KEYID = 7
5,574,325 UART: [idev] UDS.KEYID = 0
5,576,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,720,395 UART: [idev] Erasing UDS.KEYID = 0
8,079,341 UART: [idev] Sha1 KeyId Algorithm
8,102,143 UART: [idev] --
8,106,460 UART: [ldev] ++
8,107,043 UART: [ldev] CDI.KEYID = 6
8,107,958 UART: [ldev] SUBJECT.KEYID = 5
8,109,119 UART: [ldev] AUTHORITY.KEYID = 7
8,110,408 UART: [ldev] FE.KEYID = 1
8,154,268 UART: [ldev] Erasing FE.KEYID = 1
10,659,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,659 UART: [ldev] --
12,468,348 UART: [fwproc] Wait for Commands...
12,471,271 UART: [fwproc] Recv command 0x46574c44
12,473,372 UART: [fwproc] Recv'd Img size: 114084 bytes
15,867,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,945,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,014,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,331,712 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,362,312 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,265,574 >>> mbox cmd response: failed
11,266,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,266,591 >>> mbox cmd response: failed
11,266,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,267,143 >>> mbox cmd response: failed
Initializing fuses
2,050,982 writing to cptra_bootfsm_go
5,403,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,093,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,634 UART:
192,996 UART: Running Caliptra ROM ...
194,137 UART:
603,914 UART: [state] CFI Enabled
618,083 UART: [state] LifecycleState = Unprovisioned
620,018 UART: [state] DebugLocked = No
621,213 UART: [state] WD Timer not started. Device not locked for debugging
624,072 UART: [kat] SHA2-256
803,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,773 UART: [kat] ++
815,274 UART: [kat] sha1
826,149 UART: [kat] SHA2-256
829,153 UART: [kat] SHA2-384
834,804 UART: [kat] SHA2-512-ACC
837,785 UART: [kat] ECC-384
3,278,301 UART: [kat] HMAC-384Kdf
3,289,775 UART: [kat] LMS
3,819,296 UART: [kat] --
3,822,386 UART: [cold-reset] ++
3,824,756 UART: [fht] FHT @ 0x50003400
3,835,953 UART: [idev] ++
3,836,520 UART: [idev] CDI.KEYID = 6
3,837,405 UART: [idev] SUBJECT.KEYID = 7
3,838,616 UART: [idev] UDS.KEYID = 0
3,841,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,899 UART: [idev] Erasing UDS.KEYID = 0
6,311,957 UART: [idev] Sha1 KeyId Algorithm
6,333,951 UART: [idev] --
6,339,409 UART: [ldev] ++
6,339,983 UART: [ldev] CDI.KEYID = 6
6,340,893 UART: [ldev] SUBJECT.KEYID = 5
6,342,053 UART: [ldev] AUTHORITY.KEYID = 7
6,343,292 UART: [ldev] FE.KEYID = 1
6,352,779 UART: [ldev] Erasing FE.KEYID = 1
8,829,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,652 UART: [ldev] --
10,620,900 UART: [fwproc] Wait for Commands...
10,623,016 UART: [fwproc] Recv command 0x46574c44
10,625,062 UART: [fwproc] Recv'd Img size: 114084 bytes
11,684,458 UART: ROM Fatal Error: 0x000B000C
11,687,549 >>> mbox cmd response: failed
11,687,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,688,306 >>> mbox cmd response: failed
11,688,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,688,897 >>> mbox cmd response: failed
Initializing fuses
2,054,051 writing to cptra_bootfsm_go
2,243,371 UART:
2,243,732 UART: Running Caliptra ROM ...
2,244,869 UART:
8,759,871 UART: [state] CFI Enabled
8,776,508 UART: [state] LifecycleState = Unprovisioned
8,778,366 UART: [state] DebugLocked = No
8,779,592 UART: [state] WD Timer not started. Device not locked for debugging
8,782,905 UART: [kat] SHA2-256
8,962,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,973,637 UART: [kat] ++
8,974,181 UART: [kat] sha1
8,984,861 UART: [kat] SHA2-256
8,987,876 UART: [kat] SHA2-384
8,994,031 UART: [kat] SHA2-512-ACC
8,996,978 UART: [kat] ECC-384
11,436,226 UART: [kat] HMAC-384Kdf
11,448,609 UART: [kat] LMS
11,978,099 UART: [kat] --
11,983,007 UART: [cold-reset] ++
11,985,388 UART: [fht] FHT @ 0x50003400
11,996,368 UART: [idev] ++
11,996,931 UART: [idev] CDI.KEYID = 6
11,997,942 UART: [idev] SUBJECT.KEYID = 7
11,999,044 UART: [idev] UDS.KEYID = 0
12,002,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,145,492 UART: [idev] Erasing UDS.KEYID = 0
14,472,649 UART: [idev] Sha1 KeyId Algorithm
14,496,100 UART: [idev] --
14,501,125 UART: [ldev] ++
14,501,697 UART: [ldev] CDI.KEYID = 6
14,502,613 UART: [ldev] SUBJECT.KEYID = 5
14,503,773 UART: [ldev] AUTHORITY.KEYID = 7
14,505,002 UART: [ldev] FE.KEYID = 1
14,515,380 UART: [ldev] Erasing FE.KEYID = 1
16,989,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,706,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,722,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,737,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,753,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,774,326 UART: [ldev] --
18,779,768 UART: [fwproc] Wait for Commands...
18,782,525 UART: [fwproc] Recv command 0x46574c44
18,784,622 UART: [fwproc] Recv'd Img size: 114084 bytes
22,182,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,254,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,323,071 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,640,844 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,696,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,471,059 >>> mbox cmd response: failed
11,471,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,471,922 >>> mbox cmd response: failed
11,472,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,472,525 >>> mbox cmd response: failed
Initializing fuses
2,050,467 writing to cptra_bootfsm_go
12,081,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,664,926 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,080 UART:
192,478 UART: Running Caliptra ROM ...
193,683 UART:
193,840 UART: [state] CFI Enabled
262,054 UART: [state] LifecycleState = Unprovisioned
264,423 UART: [state] DebugLocked = No
266,447 UART: [state] WD Timer not started. Device not locked for debugging
271,534 UART: [kat] SHA2-256
461,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,180 UART: [kat] ++
472,629 UART: [kat] sha1
485,130 UART: [kat] SHA2-256
488,142 UART: [kat] SHA2-384
494,011 UART: [kat] SHA2-512-ACC
496,574 UART: [kat] ECC-384
2,949,882 UART: [kat] HMAC-384Kdf
2,972,649 UART: [kat] LMS
3,504,419 UART: [kat] --
3,510,740 UART: [cold-reset] ++
3,511,976 UART: [fht] FHT @ 0x50003400
3,523,607 UART: [idev] ++
3,524,289 UART: [idev] CDI.KEYID = 6
3,525,260 UART: [idev] SUBJECT.KEYID = 7
3,526,470 UART: [idev] UDS.KEYID = 0
3,529,241 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,944 UART: [idev] Erasing UDS.KEYID = 0
6,028,288 UART: [idev] Sha1 KeyId Algorithm
6,050,010 UART: [idev] --
6,055,928 UART: [ldev] ++
6,056,623 UART: [ldev] CDI.KEYID = 6
6,057,534 UART: [ldev] SUBJECT.KEYID = 5
6,058,696 UART: [ldev] AUTHORITY.KEYID = 7
6,059,926 UART: [ldev] FE.KEYID = 1
6,100,624 UART: [ldev] Erasing FE.KEYID = 1
8,606,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,383 UART: [ldev] --
10,413,270 UART: [fwproc] Wait for Commands...
10,416,394 UART: [fwproc] Recv command 0x46574c44
10,418,711 UART: [fwproc] Recv'd Img size: 114084 bytes
11,509,549 UART: ROM Fatal Error: 0x000B000C
11,513,162 >>> mbox cmd response: failed
11,513,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,513,903 >>> mbox cmd response: failed
11,514,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,514,465 >>> mbox cmd response: failed
Initializing fuses
2,049,822 writing to cptra_bootfsm_go
2,239,150 UART:
2,239,496 UART: Running Caliptra ROM ...
2,240,548 UART:
2,240,705 UART: [state] CFI Enabled
2,315,530 UART: [state] LifecycleState = Unprovisioned
2,317,959 UART: [state] DebugLocked = No
2,319,972 UART: [state] WD Timer not started. Device not locked for debugging
2,324,330 UART: [kat] SHA2-256
2,514,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,996 UART: [kat] ++
2,525,542 UART: [kat] sha1
2,536,569 UART: [kat] SHA2-256
2,539,602 UART: [kat] SHA2-384
2,545,814 UART: [kat] SHA2-512-ACC
2,548,386 UART: [kat] ECC-384
5,000,300 UART: [kat] HMAC-384Kdf
5,023,226 UART: [kat] LMS
5,554,970 UART: [kat] --
5,561,188 UART: [cold-reset] ++
5,563,375 UART: [fht] FHT @ 0x50003400
5,576,095 UART: [idev] ++
5,576,774 UART: [idev] CDI.KEYID = 6
5,577,794 UART: [idev] SUBJECT.KEYID = 7
5,578,953 UART: [idev] UDS.KEYID = 0
5,581,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,725,125 UART: [idev] Erasing UDS.KEYID = 0
8,104,785 UART: [idev] Sha1 KeyId Algorithm
8,127,552 UART: [idev] --
8,132,508 UART: [ldev] ++
8,133,202 UART: [ldev] CDI.KEYID = 6
8,134,084 UART: [ldev] SUBJECT.KEYID = 5
8,135,254 UART: [ldev] AUTHORITY.KEYID = 7
8,136,550 UART: [ldev] FE.KEYID = 1
8,172,181 UART: [ldev] Erasing FE.KEYID = 1
10,677,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,414,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,429,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,444,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,459,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,482,032 UART: [ldev] --
12,487,147 UART: [fwproc] Wait for Commands...
12,490,266 UART: [fwproc] Recv command 0x46574c44
12,492,584 UART: [fwproc] Recv'd Img size: 114084 bytes
15,935,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,015,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,132,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,673,061 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,444,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,312,346 >>> mbox cmd response: failed
11,313,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,709 >>> mbox cmd response: failed
11,313,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,314,275 >>> mbox cmd response: failed
Initializing fuses
2,048,378 writing to cptra_bootfsm_go
5,464,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,760,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,490 UART:
192,842 UART: Running Caliptra ROM ...
194,034 UART:
603,506 UART: [state] CFI Enabled
619,600 UART: [state] LifecycleState = Unprovisioned
621,975 UART: [state] DebugLocked = No
623,700 UART: [state] WD Timer not started. Device not locked for debugging
628,925 UART: [kat] SHA2-256
818,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,574 UART: [kat] ++
830,084 UART: [kat] sha1
842,366 UART: [kat] SHA2-256
845,374 UART: [kat] SHA2-384
850,429 UART: [kat] SHA2-512-ACC
853,048 UART: [kat] ECC-384
3,294,538 UART: [kat] HMAC-384Kdf
3,307,212 UART: [kat] LMS
3,839,076 UART: [kat] --
3,842,964 UART: [cold-reset] ++
3,844,412 UART: [fht] FHT @ 0x50003400
3,857,123 UART: [idev] ++
3,857,800 UART: [idev] CDI.KEYID = 6
3,858,819 UART: [idev] SUBJECT.KEYID = 7
3,859,921 UART: [idev] UDS.KEYID = 0
3,862,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,006,375 UART: [idev] Erasing UDS.KEYID = 0
6,336,174 UART: [idev] Sha1 KeyId Algorithm
6,359,619 UART: [idev] --
6,364,301 UART: [ldev] ++
6,365,018 UART: [ldev] CDI.KEYID = 6
6,365,935 UART: [ldev] SUBJECT.KEYID = 5
6,367,099 UART: [ldev] AUTHORITY.KEYID = 7
6,368,283 UART: [ldev] FE.KEYID = 1
6,380,283 UART: [ldev] Erasing FE.KEYID = 1
8,859,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,445 UART: [ldev] --
10,649,568 UART: [fwproc] Wait for Commands...
10,652,386 UART: [fwproc] Recv command 0x46574c44
10,654,646 UART: [fwproc] Recv'd Img size: 114084 bytes
11,744,915 UART: ROM Fatal Error: 0x000B000C
11,748,627 >>> mbox cmd response: failed
11,749,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,749,377 >>> mbox cmd response: failed
11,749,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,749,937 >>> mbox cmd response: failed
Initializing fuses
2,052,317 writing to cptra_bootfsm_go
2,241,633 UART:
2,241,988 UART: Running Caliptra ROM ...
2,243,132 UART:
8,707,640 UART: [state] CFI Enabled
8,722,683 UART: [state] LifecycleState = Unprovisioned
8,725,095 UART: [state] DebugLocked = No
8,727,947 UART: [state] WD Timer not started. Device not locked for debugging
8,731,754 UART: [kat] SHA2-256
8,921,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,932,422 UART: [kat] ++
8,933,019 UART: [kat] sha1
8,944,147 UART: [kat] SHA2-256
8,947,150 UART: [kat] SHA2-384
8,952,122 UART: [kat] SHA2-512-ACC
8,954,690 UART: [kat] ECC-384
11,396,388 UART: [kat] HMAC-384Kdf
11,410,176 UART: [kat] LMS
11,942,006 UART: [kat] --
11,944,915 UART: [cold-reset] ++
11,946,000 UART: [fht] FHT @ 0x50003400
11,958,666 UART: [idev] ++
11,959,348 UART: [idev] CDI.KEYID = 6
11,960,313 UART: [idev] SUBJECT.KEYID = 7
11,961,525 UART: [idev] UDS.KEYID = 0
11,964,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,107,707 UART: [idev] Erasing UDS.KEYID = 0
14,435,786 UART: [idev] Sha1 KeyId Algorithm
14,457,779 UART: [idev] --
14,461,906 UART: [ldev] ++
14,462,592 UART: [ldev] CDI.KEYID = 6
14,463,475 UART: [ldev] SUBJECT.KEYID = 5
14,464,783 UART: [ldev] AUTHORITY.KEYID = 7
14,465,963 UART: [ldev] FE.KEYID = 1
14,475,882 UART: [ldev] Erasing FE.KEYID = 1
16,956,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,674,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,689,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,704,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,719,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,740,950 UART: [ldev] --
18,746,351 UART: [fwproc] Wait for Commands...
18,748,777 UART: [fwproc] Recv command 0x46574c44
18,751,039 UART: [fwproc] Recv'd Img size: 114084 bytes
22,191,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,270,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,386,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,928,511 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,758,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,535,290 >>> mbox cmd response: failed
11,535,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,536,235 >>> mbox cmd response: failed
11,536,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,536,853 >>> mbox cmd response: failed
Initializing fuses
2,047,876 writing to cptra_bootfsm_go
12,089,582 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,280,495 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,640 UART: [kat] LMS
1,475,836 UART: [kat] --
1,476,813 UART: [cold-reset] ++
1,477,313 UART: [fht] Storing FHT @ 0x50003400
1,480,134 UART: [idev] ++
1,480,302 UART: [idev] CDI.KEYID = 6
1,480,662 UART: [idev] SUBJECT.KEYID = 7
1,481,086 UART: [idev] UDS.KEYID = 0
1,481,431 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,506,396 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,916 UART: [idev] --
1,516,051 UART: [ldev] ++
1,516,219 UART: [ldev] CDI.KEYID = 6
1,516,582 UART: [ldev] SUBJECT.KEYID = 5
1,517,008 UART: [ldev] AUTHORITY.KEYID = 7
1,517,471 UART: [ldev] FE.KEYID = 1
1,522,271 UART: [ldev] Erasing FE.KEYID = 1
1,547,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,882 UART: [ldev] --
1,587,147 UART: [fwproc] Waiting for Commands...
1,587,932 UART: [fwproc] Received command 0x46574c44
1,588,723 UART: [fwproc] Received Image of size 114084 bytes
1,626,557 UART: ROM Fatal Error: 0x000B000C
1,627,716 >>> mbox cmd response: failed
1,627,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,722 >>> mbox cmd response: failed
1,627,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,938 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,727 UART: [cold-reset] ++
1,477,155 UART: [fht] Storing FHT @ 0x50003400
1,480,050 UART: [idev] ++
1,480,218 UART: [idev] CDI.KEYID = 6
1,480,578 UART: [idev] SUBJECT.KEYID = 7
1,481,002 UART: [idev] UDS.KEYID = 0
1,481,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,158 UART: [idev] Erasing UDS.KEYID = 0
1,505,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,042 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,479 UART: [ldev] Erasing FE.KEYID = 1
1,546,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,456 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,564 UART: [fwproc] Received command 0x46574c44
1,587,355 UART: [fwproc] Received Image of size 114084 bytes
2,881,262 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,630 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,982 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,545 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,477,465 >>> mbox cmd response: failed
1,477,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,471 >>> mbox cmd response: failed
1,477,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,921,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
895,085 UART: [kat] SHA2-512-ACC
896,986 UART: [kat] ECC-384
902,341 UART: [kat] HMAC-384Kdf
906,981 UART: [kat] LMS
1,475,177 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,572 UART: [fht] Storing FHT @ 0x50003400
1,479,339 UART: [idev] ++
1,479,507 UART: [idev] CDI.KEYID = 6
1,479,867 UART: [idev] SUBJECT.KEYID = 7
1,480,291 UART: [idev] UDS.KEYID = 0
1,480,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,975 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,677 UART: [idev] --
1,515,790 UART: [ldev] ++
1,515,958 UART: [ldev] CDI.KEYID = 6
1,516,321 UART: [ldev] SUBJECT.KEYID = 5
1,516,747 UART: [ldev] AUTHORITY.KEYID = 7
1,517,210 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,041 UART: [ldev] --
1,587,374 UART: [fwproc] Waiting for Commands...
1,588,073 UART: [fwproc] Received command 0x46574c44
1,588,864 UART: [fwproc] Received Image of size 114084 bytes
1,626,504 UART: ROM Fatal Error: 0x000B000C
1,627,663 >>> mbox cmd response: failed
1,627,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,669 >>> mbox cmd response: failed
1,627,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,675 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
890,920 UART: [kat] SHA2-256
892,858 UART: [kat] SHA2-384
895,655 UART: [kat] SHA2-512-ACC
897,556 UART: [kat] ECC-384
903,051 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,369 UART: [idev] Erasing UDS.KEYID = 0
1,505,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,367 UART: [idev] --
1,515,372 UART: [ldev] ++
1,515,540 UART: [ldev] CDI.KEYID = 6
1,515,903 UART: [ldev] SUBJECT.KEYID = 5
1,516,329 UART: [ldev] AUTHORITY.KEYID = 7
1,516,792 UART: [ldev] FE.KEYID = 1
1,522,082 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,915 UART: [ldev] --
1,587,380 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 114084 bytes
2,883,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,365 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,717 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,198 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,478,804 >>> mbox cmd response: failed
1,478,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,810 >>> mbox cmd response: failed
1,478,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,438 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
893,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,743 UART: [kat] ++
897,895 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,902 UART: [kat] SHA2-512-ACC
908,803 UART: [kat] ECC-384
918,532 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,559 UART: [fht] FHT @ 0x50003400
1,175,332 UART: [idev] ++
1,175,500 UART: [idev] CDI.KEYID = 6
1,175,860 UART: [idev] SUBJECT.KEYID = 7
1,176,284 UART: [idev] UDS.KEYID = 0
1,176,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,260 UART: [idev] Erasing UDS.KEYID = 0
1,201,785 UART: [idev] Sha1 KeyId Algorithm
1,210,227 UART: [idev] --
1,211,367 UART: [ldev] ++
1,211,535 UART: [ldev] CDI.KEYID = 6
1,211,898 UART: [ldev] SUBJECT.KEYID = 5
1,212,324 UART: [ldev] AUTHORITY.KEYID = 7
1,212,787 UART: [ldev] FE.KEYID = 1
1,217,747 UART: [ldev] Erasing FE.KEYID = 1
1,244,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,085 UART: [ldev] --
1,283,416 UART: [fwproc] Wait for Commands...
1,284,008 UART: [fwproc] Recv command 0x46574c44
1,284,736 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,856 UART: ROM Fatal Error: 0x000B000C
1,323,015 >>> mbox cmd response: failed
1,323,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,021 >>> mbox cmd response: failed
1,323,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
892,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,015 UART: [kat] ++
897,167 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
906,262 UART: [kat] SHA2-512-ACC
908,163 UART: [kat] ECC-384
917,712 UART: [kat] HMAC-384Kdf
922,290 UART: [kat] LMS
1,170,618 UART: [kat] --
1,171,443 UART: [cold-reset] ++
1,171,799 UART: [fht] FHT @ 0x50003400
1,174,580 UART: [idev] ++
1,174,748 UART: [idev] CDI.KEYID = 6
1,175,108 UART: [idev] SUBJECT.KEYID = 7
1,175,532 UART: [idev] UDS.KEYID = 0
1,175,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,525 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,416 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,573 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,580 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,270 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,124 >>> mbox cmd response: failed
1,178,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,130 >>> mbox cmd response: failed
1,178,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,685 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,111 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,876 UART: [kat] SHA2-256
903,816 UART: [kat] SHA2-384
906,667 UART: [kat] SHA2-512-ACC
908,568 UART: [kat] ECC-384
918,303 UART: [kat] HMAC-384Kdf
922,917 UART: [kat] LMS
1,171,245 UART: [kat] --
1,172,028 UART: [cold-reset] ++
1,172,540 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,425 UART: [idev] Erasing UDS.KEYID = 0
1,201,030 UART: [idev] Sha1 KeyId Algorithm
1,209,310 UART: [idev] --
1,210,438 UART: [ldev] ++
1,210,606 UART: [ldev] CDI.KEYID = 6
1,210,969 UART: [ldev] SUBJECT.KEYID = 5
1,211,395 UART: [ldev] AUTHORITY.KEYID = 7
1,211,858 UART: [ldev] FE.KEYID = 1
1,217,378 UART: [ldev] Erasing FE.KEYID = 1
1,243,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,374 UART: [ldev] --
1,283,857 UART: [fwproc] Wait for Commands...
1,284,655 UART: [fwproc] Recv command 0x46574c44
1,285,383 UART: [fwproc] Recv'd Img size: 114084 bytes
1,323,497 UART: ROM Fatal Error: 0x000B000C
1,324,656 >>> mbox cmd response: failed
1,324,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,662 >>> mbox cmd response: failed
1,324,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,475 UART: [idev] ++
1,175,643 UART: [idev] CDI.KEYID = 6
1,176,003 UART: [idev] SUBJECT.KEYID = 7
1,176,427 UART: [idev] UDS.KEYID = 0
1,176,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,541 UART: [idev] Erasing UDS.KEYID = 0
1,201,130 UART: [idev] Sha1 KeyId Algorithm
1,209,552 UART: [idev] --
1,210,548 UART: [ldev] ++
1,210,716 UART: [ldev] CDI.KEYID = 6
1,211,079 UART: [ldev] SUBJECT.KEYID = 5
1,211,505 UART: [ldev] AUTHORITY.KEYID = 7
1,211,968 UART: [ldev] FE.KEYID = 1
1,217,110 UART: [ldev] Erasing FE.KEYID = 1
1,243,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,192 UART: [ldev] --
1,282,693 UART: [fwproc] Wait for Commands...
1,283,449 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,235 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,085 >>> mbox cmd response: failed
1,179,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,091 >>> mbox cmd response: failed
1,179,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,462 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,795 UART: [kat] ++
895,947 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,816 UART: [kat] SHA2-512-ACC
906,717 UART: [kat] ECC-384
916,786 UART: [kat] HMAC-384Kdf
921,278 UART: [kat] LMS
1,169,590 UART: [kat] --
1,170,777 UART: [cold-reset] ++
1,171,341 UART: [fht] FHT @ 0x50003400
1,174,081 UART: [idev] ++
1,174,249 UART: [idev] CDI.KEYID = 6
1,174,610 UART: [idev] SUBJECT.KEYID = 7
1,175,035 UART: [idev] UDS.KEYID = 0
1,175,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,067 UART: [idev] Erasing UDS.KEYID = 0
1,199,533 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,215,942 UART: [ldev] Erasing FE.KEYID = 1
1,242,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,412 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114084 bytes
1,320,714 UART: ROM Fatal Error: 0x000B000C
1,321,873 >>> mbox cmd response: failed
1,321,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,879 >>> mbox cmd response: failed
1,321,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,688 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,174,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,723 UART: [idev] Sha1 KeyId Algorithm
1,207,549 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,400 UART: [fwproc] Wait for Commands...
1,280,987 UART: [fwproc] Recv command 0x46574c44
1,281,720 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,338 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,456 >>> mbox cmd response: failed
1,173,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,462 >>> mbox cmd response: failed
1,173,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,306 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,412 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,199,760 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,764 UART: [fwproc] Recv command 0x46574c44
1,283,497 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,245 UART: ROM Fatal Error: 0x000B000C
1,322,404 >>> mbox cmd response: failed
1,322,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,410 >>> mbox cmd response: failed
1,322,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,174,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,564 UART: [idev] --
1,208,465 UART: [ldev] ++
1,208,633 UART: [ldev] CDI.KEYID = 6
1,208,997 UART: [ldev] SUBJECT.KEYID = 5
1,209,424 UART: [ldev] AUTHORITY.KEYID = 7
1,209,887 UART: [ldev] FE.KEYID = 1
1,215,195 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,365 UART: [ldev] --
1,280,859 UART: [fwproc] Wait for Commands...
1,281,582 UART: [fwproc] Recv command 0x46574c44
1,282,315 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,849 >>> mbox cmd response: failed
1,173,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,855 >>> mbox cmd response: failed
1,173,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,567 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
192,224 UART:
192,590 UART: Running Caliptra ROM ...
193,780 UART:
193,931 UART: [state] CFI Enabled
263,651 UART: [state] LifecycleState = Unprovisioned
265,598 UART: [state] DebugLocked = No
268,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,384 UART: [kat] SHA2-256
442,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,580 UART: [kat] ++
453,117 UART: [kat] sha1
463,293 UART: [kat] SHA2-256
465,981 UART: [kat] SHA2-384
471,795 UART: [kat] SHA2-512-ACC
474,189 UART: [kat] ECC-384
2,765,333 UART: [kat] HMAC-384Kdf
2,776,920 UART: [kat] LMS
3,967,196 UART: [kat] --
3,972,511 UART: [cold-reset] ++
3,974,238 UART: [fht] Storing FHT @ 0x50003400
3,985,626 UART: [idev] ++
3,986,249 UART: [idev] CDI.KEYID = 6
3,987,164 UART: [idev] SUBJECT.KEYID = 7
3,988,382 UART: [idev] UDS.KEYID = 0
3,991,337 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,111 UART: [idev] Erasing UDS.KEYID = 0
7,324,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,012 UART: [idev] --
7,349,903 UART: [ldev] ++
7,350,477 UART: [ldev] CDI.KEYID = 6
7,351,445 UART: [ldev] SUBJECT.KEYID = 5
7,352,610 UART: [ldev] AUTHORITY.KEYID = 7
7,353,897 UART: [ldev] FE.KEYID = 1
7,400,358 UART: [ldev] Erasing FE.KEYID = 1
10,736,942 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,531 UART: [ldev] --
13,115,378 UART: [fwproc] Waiting for Commands...
13,118,079 UART: [fwproc] Received command 0x46574c44
13,120,285 UART: [fwproc] Received Image of size 113760 bytes
13,217,326 UART: ROM Fatal Error: 0x000B001C
13,220,795 >>> mbox cmd response: failed
13,221,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,221,533 >>> mbox cmd response: failed
13,221,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,222,091 >>> mbox cmd response: failed
Initializing fuses
2,053,538 writing to cptra_bootfsm_go
2,242,884 UART:
2,243,221 UART: Running Caliptra ROM ...
2,244,359 UART:
2,244,553 UART: [state] CFI Enabled
2,317,943 UART: [state] LifecycleState = Unprovisioned
2,319,896 UART: [state] DebugLocked = No
2,322,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,085 UART: [kat] SHA2-256
2,497,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,262 UART: [kat] ++
2,508,759 UART: [kat] sha1
2,519,270 UART: [kat] SHA2-256
2,521,975 UART: [kat] SHA2-384
2,528,992 UART: [kat] SHA2-512-ACC
2,531,340 UART: [kat] ECC-384
4,821,025 UART: [kat] HMAC-384Kdf
4,851,568 UART: [kat] LMS
6,041,861 UART: [kat] --
6,045,012 UART: [cold-reset] ++
6,046,378 UART: [fht] Storing FHT @ 0x50003400
6,056,691 UART: [idev] ++
6,057,323 UART: [idev] CDI.KEYID = 6
6,058,251 UART: [idev] SUBJECT.KEYID = 7
6,059,420 UART: [idev] UDS.KEYID = 0
6,062,142 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,205,216 UART: [idev] Erasing UDS.KEYID = 0
9,398,957 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,133 UART: [idev] --
9,423,613 UART: [ldev] ++
9,424,191 UART: [ldev] CDI.KEYID = 6
9,425,130 UART: [ldev] SUBJECT.KEYID = 5
9,426,389 UART: [ldev] AUTHORITY.KEYID = 7
9,427,627 UART: [ldev] FE.KEYID = 1
9,472,785 UART: [ldev] Erasing FE.KEYID = 1
12,808,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,122,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,136,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,151,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,166,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,185,370 UART: [ldev] --
15,190,540 UART: [fwproc] Waiting for Commands...
15,193,612 UART: [fwproc] Received command 0x46574c44
15,195,801 UART: [fwproc] Received Image of size 113760 bytes
19,242,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,319,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,388,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,705,014 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,797,142 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,947,424 >>> mbox cmd response: failed
12,948,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,948,361 >>> mbox cmd response: failed
12,948,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,948,868 >>> mbox cmd response: failed
Initializing fuses
2,047,896 writing to cptra_bootfsm_go
5,845,415 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,938,682 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,521 UART:
192,893 UART: Running Caliptra ROM ...
194,081 UART:
603,600 UART: [state] CFI Enabled
617,640 UART: [state] LifecycleState = Unprovisioned
619,569 UART: [state] DebugLocked = No
621,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,996 UART: [kat] SHA2-256
795,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,329 UART: [kat] ++
806,783 UART: [kat] sha1
818,376 UART: [kat] SHA2-256
821,100 UART: [kat] SHA2-384
826,170 UART: [kat] SHA2-512-ACC
828,518 UART: [kat] ECC-384
3,113,408 UART: [kat] HMAC-384Kdf
3,124,888 UART: [kat] LMS
4,315,004 UART: [kat] --
4,318,483 UART: [cold-reset] ++
4,319,988 UART: [fht] Storing FHT @ 0x50003400
4,330,285 UART: [idev] ++
4,330,898 UART: [idev] CDI.KEYID = 6
4,331,791 UART: [idev] SUBJECT.KEYID = 7
4,333,082 UART: [idev] UDS.KEYID = 0
4,336,064 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,479,241 UART: [idev] Erasing UDS.KEYID = 0
7,622,567 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,158 UART: [idev] --
7,647,561 UART: [ldev] ++
7,648,188 UART: [ldev] CDI.KEYID = 6
7,649,105 UART: [ldev] SUBJECT.KEYID = 5
7,650,319 UART: [ldev] AUTHORITY.KEYID = 7
7,651,603 UART: [ldev] FE.KEYID = 1
7,662,035 UART: [ldev] Erasing FE.KEYID = 1
10,947,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,813 UART: [ldev] --
13,306,121 UART: [fwproc] Waiting for Commands...
13,307,793 UART: [fwproc] Received command 0x46574c44
13,310,036 UART: [fwproc] Received Image of size 113760 bytes
13,411,287 UART: ROM Fatal Error: 0x000B001C
13,414,756 >>> mbox cmd response: failed
13,415,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,415,514 >>> mbox cmd response: failed
13,415,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,416,079 >>> mbox cmd response: failed
Initializing fuses
2,059,544 writing to cptra_bootfsm_go
2,248,815 UART:
2,249,190 UART: Running Caliptra ROM ...
2,250,244 UART:
7,053,552 UART: [state] CFI Enabled
7,067,941 UART: [state] LifecycleState = Unprovisioned
7,069,866 UART: [state] DebugLocked = No
7,072,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,077,622 UART: [kat] SHA2-256
7,247,378 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,257,943 UART: [kat] ++
7,258,488 UART: [kat] sha1
7,269,924 UART: [kat] SHA2-256
7,272,622 UART: [kat] SHA2-384
7,280,178 UART: [kat] SHA2-512-ACC
7,282,527 UART: [kat] ECC-384
9,566,614 UART: [kat] HMAC-384Kdf
9,578,086 UART: [kat] LMS
10,768,224 UART: [kat] --
10,771,951 UART: [cold-reset] ++
10,773,565 UART: [fht] Storing FHT @ 0x50003400
10,785,259 UART: [idev] ++
10,785,824 UART: [idev] CDI.KEYID = 6
10,786,835 UART: [idev] SUBJECT.KEYID = 7
10,788,049 UART: [idev] UDS.KEYID = 0
10,790,680 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,933,699 UART: [idev] Erasing UDS.KEYID = 0
14,077,275 UART: [idev] Using Sha1 for KeyId Algorithm
14,098,344 UART: [idev] --
14,102,568 UART: [ldev] ++
14,103,142 UART: [ldev] CDI.KEYID = 6
14,104,160 UART: [ldev] SUBJECT.KEYID = 5
14,105,355 UART: [ldev] AUTHORITY.KEYID = 7
14,106,588 UART: [ldev] FE.KEYID = 1
14,117,970 UART: [ldev] Erasing FE.KEYID = 1
17,407,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,699,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,714,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,729,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,743,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,761,916 UART: [ldev] --
19,766,048 UART: [fwproc] Waiting for Commands...
19,769,119 UART: [fwproc] Received command 0x46574c44
19,771,361 UART: [fwproc] Received Image of size 113760 bytes
23,818,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,895,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,964,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,279,487 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,134,526 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,164,470 >>> mbox cmd response: failed
13,165,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,165,379 >>> mbox cmd response: failed
13,165,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,165,951 >>> mbox cmd response: failed
Initializing fuses
2,048,175 writing to cptra_bootfsm_go
10,825,904 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,761,487 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,241 UART:
192,606 UART: Running Caliptra ROM ...
193,797 UART:
193,950 UART: [state] CFI Enabled
264,839 UART: [state] LifecycleState = Unprovisioned
266,711 UART: [state] DebugLocked = No
269,665 UART: [state] WD Timer not started. Device not locked for debugging
272,747 UART: [kat] SHA2-256
451,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,435 UART: [kat] ++
464,020 UART: [kat] sha1
474,999 UART: [kat] SHA2-256
478,062 UART: [kat] SHA2-384
484,582 UART: [kat] SHA2-512-ACC
487,513 UART: [kat] ECC-384
2,946,422 UART: [kat] HMAC-384Kdf
2,970,216 UART: [kat] LMS
3,499,657 UART: [kat] --
3,504,262 UART: [cold-reset] ++
3,505,388 UART: [fht] FHT @ 0x50003400
3,516,803 UART: [idev] ++
3,517,367 UART: [idev] CDI.KEYID = 6
3,518,248 UART: [idev] SUBJECT.KEYID = 7
3,519,461 UART: [idev] UDS.KEYID = 0
3,522,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,971 UART: [idev] Erasing UDS.KEYID = 0
6,023,569 UART: [idev] Sha1 KeyId Algorithm
6,046,274 UART: [idev] --
6,051,299 UART: [ldev] ++
6,052,075 UART: [ldev] CDI.KEYID = 6
6,052,975 UART: [ldev] SUBJECT.KEYID = 5
6,054,044 UART: [ldev] AUTHORITY.KEYID = 7
6,055,228 UART: [ldev] FE.KEYID = 1
6,096,589 UART: [ldev] Erasing FE.KEYID = 1
8,600,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,011 UART: [ldev] --
10,412,098 UART: [fwproc] Wait for Commands...
10,414,304 UART: [fwproc] Recv command 0x46574c44
10,416,341 UART: [fwproc] Recv'd Img size: 114084 bytes
10,517,490 UART: ROM Fatal Error: 0x000B001C
10,520,628 >>> mbox cmd response: failed
10,520,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,276 >>> mbox cmd response: failed
10,521,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,831 >>> mbox cmd response: failed
Initializing fuses
2,058,673 writing to cptra_bootfsm_go
2,247,967 UART:
2,248,315 UART: Running Caliptra ROM ...
2,249,451 UART:
2,249,799 UART: [state] CFI Enabled
2,308,367 UART: [state] LifecycleState = Unprovisioned
2,310,238 UART: [state] DebugLocked = No
2,312,494 UART: [state] WD Timer not started. Device not locked for debugging
2,316,620 UART: [kat] SHA2-256
2,495,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,507,321 UART: [kat] ++
2,507,866 UART: [kat] sha1
2,519,626 UART: [kat] SHA2-256
2,522,638 UART: [kat] SHA2-384
2,529,379 UART: [kat] SHA2-512-ACC
2,532,334 UART: [kat] ECC-384
4,991,874 UART: [kat] HMAC-384Kdf
5,011,983 UART: [kat] LMS
5,541,470 UART: [kat] --
5,545,512 UART: [cold-reset] ++
5,546,738 UART: [fht] FHT @ 0x50003400
5,557,711 UART: [idev] ++
5,558,293 UART: [idev] CDI.KEYID = 6
5,559,208 UART: [idev] SUBJECT.KEYID = 7
5,560,368 UART: [idev] UDS.KEYID = 0
5,562,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,707,023 UART: [idev] Erasing UDS.KEYID = 0
8,068,199 UART: [idev] Sha1 KeyId Algorithm
8,089,979 UART: [idev] --
8,092,393 UART: [ldev] ++
8,092,982 UART: [ldev] CDI.KEYID = 6
8,093,897 UART: [ldev] SUBJECT.KEYID = 5
8,095,062 UART: [ldev] AUTHORITY.KEYID = 7
8,096,368 UART: [ldev] FE.KEYID = 1
8,141,242 UART: [ldev] Erasing FE.KEYID = 1
10,644,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,478 UART: [ldev] --
12,452,989 UART: [fwproc] Wait for Commands...
12,454,548 UART: [fwproc] Recv command 0x46574c44
12,456,648 UART: [fwproc] Recv'd Img size: 114084 bytes
15,853,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,798 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,317,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,363,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,291,789 >>> mbox cmd response: failed
10,292,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,292,836 >>> mbox cmd response: failed
10,293,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,293,393 >>> mbox cmd response: failed
Initializing fuses
2,059,301 writing to cptra_bootfsm_go
5,432,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,088,570 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,616 UART:
192,977 UART: Running Caliptra ROM ...
194,067 UART:
603,538 UART: [state] CFI Enabled
615,335 UART: [state] LifecycleState = Unprovisioned
617,163 UART: [state] DebugLocked = No
619,459 UART: [state] WD Timer not started. Device not locked for debugging
622,475 UART: [kat] SHA2-256
801,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,192 UART: [kat] ++
813,643 UART: [kat] sha1
825,977 UART: [kat] SHA2-256
828,979 UART: [kat] SHA2-384
836,354 UART: [kat] SHA2-512-ACC
839,347 UART: [kat] ECC-384
3,282,359 UART: [kat] HMAC-384Kdf
3,294,853 UART: [kat] LMS
3,824,352 UART: [kat] --
3,829,334 UART: [cold-reset] ++
3,830,734 UART: [fht] FHT @ 0x50003400
3,842,682 UART: [idev] ++
3,843,254 UART: [idev] CDI.KEYID = 6
3,844,163 UART: [idev] SUBJECT.KEYID = 7
3,845,376 UART: [idev] UDS.KEYID = 0
3,848,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,991,555 UART: [idev] Erasing UDS.KEYID = 0
6,318,503 UART: [idev] Sha1 KeyId Algorithm
6,339,839 UART: [idev] --
6,344,053 UART: [ldev] ++
6,344,626 UART: [ldev] CDI.KEYID = 6
6,345,534 UART: [ldev] SUBJECT.KEYID = 5
6,346,744 UART: [ldev] AUTHORITY.KEYID = 7
6,347,976 UART: [ldev] FE.KEYID = 1
6,358,246 UART: [ldev] Erasing FE.KEYID = 1
8,830,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,947 UART: [ldev] --
10,619,834 UART: [fwproc] Wait for Commands...
10,622,149 UART: [fwproc] Recv command 0x46574c44
10,624,246 UART: [fwproc] Recv'd Img size: 114084 bytes
10,726,516 UART: ROM Fatal Error: 0x000B001C
10,729,659 >>> mbox cmd response: failed
10,730,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,730,429 >>> mbox cmd response: failed
10,730,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,730,987 >>> mbox cmd response: failed
Initializing fuses
2,060,005 writing to cptra_bootfsm_go
2,249,332 UART:
2,249,685 UART: Running Caliptra ROM ...
2,250,842 UART:
9,724,216 UART: [state] CFI Enabled
9,737,728 UART: [state] LifecycleState = Unprovisioned
9,739,593 UART: [state] DebugLocked = No
9,742,008 UART: [state] WD Timer not started. Device not locked for debugging
9,745,380 UART: [kat] SHA2-256
9,924,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,936,047 UART: [kat] ++
9,936,595 UART: [kat] sha1
9,947,546 UART: [kat] SHA2-256
9,950,610 UART: [kat] SHA2-384
9,955,478 UART: [kat] SHA2-512-ACC
9,958,419 UART: [kat] ECC-384
12,403,232 UART: [kat] HMAC-384Kdf
12,414,106 UART: [kat] LMS
12,943,627 UART: [kat] --
12,948,796 UART: [cold-reset] ++
12,949,873 UART: [fht] FHT @ 0x50003400
12,960,312 UART: [idev] ++
12,960,877 UART: [idev] CDI.KEYID = 6
12,961,785 UART: [idev] SUBJECT.KEYID = 7
12,963,005 UART: [idev] UDS.KEYID = 0
12,965,752 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,109,183 UART: [idev] Erasing UDS.KEYID = 0
15,440,754 UART: [idev] Sha1 KeyId Algorithm
15,464,692 UART: [idev] --
15,469,040 UART: [ldev] ++
15,469,644 UART: [ldev] CDI.KEYID = 6
15,470,557 UART: [ldev] SUBJECT.KEYID = 5
15,471,718 UART: [ldev] AUTHORITY.KEYID = 7
15,472,946 UART: [ldev] FE.KEYID = 1
15,482,535 UART: [ldev] Erasing FE.KEYID = 1
17,958,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,677,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,693,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,709,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,724,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,935 UART: [ldev] --
19,750,820 UART: [fwproc] Wait for Commands...
19,753,027 UART: [fwproc] Recv command 0x46574c44
19,755,127 UART: [fwproc] Recv'd Img size: 114084 bytes
23,160,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,228,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,297,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,613,663 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,694,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,497,743 >>> mbox cmd response: failed
10,498,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,718 >>> mbox cmd response: failed
10,498,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,499,292 >>> mbox cmd response: failed
Initializing fuses
2,061,950 writing to cptra_bootfsm_go
13,066,653 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,648,746 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,132 UART:
192,501 UART: Running Caliptra ROM ...
193,704 UART:
193,856 UART: [state] CFI Enabled
261,685 UART: [state] LifecycleState = Unprovisioned
264,048 UART: [state] DebugLocked = No
265,405 UART: [state] WD Timer not started. Device not locked for debugging
270,442 UART: [kat] SHA2-256
460,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,104 UART: [kat] ++
471,558 UART: [kat] sha1
483,252 UART: [kat] SHA2-256
486,265 UART: [kat] SHA2-384
492,788 UART: [kat] SHA2-512-ACC
495,346 UART: [kat] ECC-384
2,945,782 UART: [kat] HMAC-384Kdf
2,970,323 UART: [kat] LMS
3,502,076 UART: [kat] --
3,507,139 UART: [cold-reset] ++
3,509,486 UART: [fht] FHT @ 0x50003400
3,521,194 UART: [idev] ++
3,521,875 UART: [idev] CDI.KEYID = 6
3,522,837 UART: [idev] SUBJECT.KEYID = 7
3,524,056 UART: [idev] UDS.KEYID = 0
3,526,937 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,674 UART: [idev] Erasing UDS.KEYID = 0
6,038,423 UART: [idev] Sha1 KeyId Algorithm
6,060,334 UART: [idev] --
6,064,391 UART: [ldev] ++
6,065,079 UART: [ldev] CDI.KEYID = 6
6,065,995 UART: [ldev] SUBJECT.KEYID = 5
6,067,156 UART: [ldev] AUTHORITY.KEYID = 7
6,068,544 UART: [ldev] FE.KEYID = 1
6,109,026 UART: [ldev] Erasing FE.KEYID = 1
8,614,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,720 UART: [ldev] --
10,425,584 UART: [fwproc] Wait for Commands...
10,427,093 UART: [fwproc] Recv command 0x46574c44
10,429,087 UART: [fwproc] Recv'd Img size: 114084 bytes
10,558,212 UART: ROM Fatal Error: 0x000B001C
10,561,827 >>> mbox cmd response: failed
10,562,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,589 >>> mbox cmd response: failed
10,562,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,563,152 >>> mbox cmd response: failed
Initializing fuses
2,059,455 writing to cptra_bootfsm_go
2,248,754 UART:
2,249,093 UART: Running Caliptra ROM ...
2,250,229 UART:
2,250,413 UART: [state] CFI Enabled
2,315,802 UART: [state] LifecycleState = Unprovisioned
2,318,181 UART: [state] DebugLocked = No
2,320,975 UART: [state] WD Timer not started. Device not locked for debugging
2,324,792 UART: [kat] SHA2-256
2,514,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,444 UART: [kat] ++
2,525,931 UART: [kat] sha1
2,536,820 UART: [kat] SHA2-256
2,539,841 UART: [kat] SHA2-384
2,546,654 UART: [kat] SHA2-512-ACC
2,549,276 UART: [kat] ECC-384
4,999,231 UART: [kat] HMAC-384Kdf
5,026,132 UART: [kat] LMS
5,557,909 UART: [kat] --
5,561,088 UART: [cold-reset] ++
5,563,727 UART: [fht] FHT @ 0x50003400
5,575,141 UART: [idev] ++
5,575,818 UART: [idev] CDI.KEYID = 6
5,576,786 UART: [idev] SUBJECT.KEYID = 7
5,577,998 UART: [idev] UDS.KEYID = 0
5,580,963 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,624 UART: [idev] Erasing UDS.KEYID = 0
8,084,083 UART: [idev] Sha1 KeyId Algorithm
8,105,005 UART: [idev] --
8,110,198 UART: [ldev] ++
8,110,878 UART: [ldev] CDI.KEYID = 6
8,111,787 UART: [ldev] SUBJECT.KEYID = 5
8,112,948 UART: [ldev] AUTHORITY.KEYID = 7
8,114,202 UART: [ldev] FE.KEYID = 1
8,154,071 UART: [ldev] Erasing FE.KEYID = 1
10,663,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,135 UART: [ldev] --
12,469,421 UART: [fwproc] Wait for Commands...
12,471,974 UART: [fwproc] Recv command 0x46574c44
12,474,242 UART: [fwproc] Recv'd Img size: 114084 bytes
15,919,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,996,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,112,178 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,653,027 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,441,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,350,264 >>> mbox cmd response: failed
10,350,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,351,173 >>> mbox cmd response: failed
10,351,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,351,752 >>> mbox cmd response: failed
Initializing fuses
2,052,150 writing to cptra_bootfsm_go
5,486,553 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,793,348 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,617 UART:
192,967 UART: Running Caliptra ROM ...
194,158 UART:
603,665 UART: [state] CFI Enabled
616,426 UART: [state] LifecycleState = Unprovisioned
618,796 UART: [state] DebugLocked = No
621,093 UART: [state] WD Timer not started. Device not locked for debugging
626,169 UART: [kat] SHA2-256
816,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,841 UART: [kat] ++
827,429 UART: [kat] sha1
838,961 UART: [kat] SHA2-256
842,015 UART: [kat] SHA2-384
847,221 UART: [kat] SHA2-512-ACC
849,807 UART: [kat] ECC-384
3,291,218 UART: [kat] HMAC-384Kdf
3,303,175 UART: [kat] LMS
3,835,049 UART: [kat] --
3,838,695 UART: [cold-reset] ++
3,840,901 UART: [fht] FHT @ 0x50003400
3,852,318 UART: [idev] ++
3,853,001 UART: [idev] CDI.KEYID = 6
3,854,025 UART: [idev] SUBJECT.KEYID = 7
3,855,134 UART: [idev] UDS.KEYID = 0
3,858,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,672 UART: [idev] Erasing UDS.KEYID = 0
6,328,940 UART: [idev] Sha1 KeyId Algorithm
6,351,791 UART: [idev] --
6,356,220 UART: [ldev] ++
6,356,902 UART: [ldev] CDI.KEYID = 6
6,357,813 UART: [ldev] SUBJECT.KEYID = 5
6,358,979 UART: [ldev] AUTHORITY.KEYID = 7
6,360,211 UART: [ldev] FE.KEYID = 1
6,371,119 UART: [ldev] Erasing FE.KEYID = 1
8,847,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,566 UART: [ldev] --
10,639,404 UART: [fwproc] Wait for Commands...
10,642,102 UART: [fwproc] Recv command 0x46574c44
10,644,410 UART: [fwproc] Recv'd Img size: 114084 bytes
10,772,788 UART: ROM Fatal Error: 0x000B001C
10,776,474 >>> mbox cmd response: failed
10,776,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,777,234 >>> mbox cmd response: failed
10,777,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,777,801 >>> mbox cmd response: failed
Initializing fuses
2,059,231 writing to cptra_bootfsm_go
2,248,582 UART:
2,248,926 UART: Running Caliptra ROM ...
2,250,016 UART:
9,678,730 UART: [state] CFI Enabled
9,690,758 UART: [state] LifecycleState = Unprovisioned
9,693,100 UART: [state] DebugLocked = No
9,695,136 UART: [state] WD Timer not started. Device not locked for debugging
9,699,318 UART: [kat] SHA2-256
9,889,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,899,960 UART: [kat] ++
9,900,566 UART: [kat] sha1
9,912,108 UART: [kat] SHA2-256
9,915,119 UART: [kat] SHA2-384
9,920,798 UART: [kat] SHA2-512-ACC
9,923,370 UART: [kat] ECC-384
12,364,122 UART: [kat] HMAC-384Kdf
12,378,348 UART: [kat] LMS
12,910,178 UART: [kat] --
12,917,566 UART: [cold-reset] ++
12,919,556 UART: [fht] FHT @ 0x50003400
12,931,995 UART: [idev] ++
12,932,729 UART: [idev] CDI.KEYID = 6
12,933,633 UART: [idev] SUBJECT.KEYID = 7
12,934,847 UART: [idev] UDS.KEYID = 0
12,937,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,081,027 UART: [idev] Erasing UDS.KEYID = 0
15,410,055 UART: [idev] Sha1 KeyId Algorithm
15,432,948 UART: [idev] --
15,438,592 UART: [ldev] ++
15,439,277 UART: [ldev] CDI.KEYID = 6
15,440,184 UART: [ldev] SUBJECT.KEYID = 5
15,441,396 UART: [ldev] AUTHORITY.KEYID = 7
15,442,625 UART: [ldev] FE.KEYID = 1
15,453,219 UART: [ldev] Erasing FE.KEYID = 1
17,932,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,651,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,666,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,681,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,696,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,717,421 UART: [ldev] --
19,723,028 UART: [fwproc] Wait for Commands...
19,725,187 UART: [fwproc] Recv command 0x46574c44
19,727,448 UART: [fwproc] Recv'd Img size: 114084 bytes
23,164,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,240,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,357,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,898,194 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,753,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,566,717 >>> mbox cmd response: failed
10,567,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,616 >>> mbox cmd response: failed
10,567,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,568,176 >>> mbox cmd response: failed
Initializing fuses
2,050,921 writing to cptra_bootfsm_go
13,061,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,253,135 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,600 UART: [kat] SHA2-512-ACC
897,501 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,682 UART: [kat] LMS
1,475,878 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,011 UART: [fht] Storing FHT @ 0x50003400
1,479,866 UART: [idev] ++
1,480,034 UART: [idev] CDI.KEYID = 6
1,480,394 UART: [idev] SUBJECT.KEYID = 7
1,480,818 UART: [idev] UDS.KEYID = 0
1,481,163 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,552 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,496 UART: [idev] --
1,514,431 UART: [ldev] ++
1,514,599 UART: [ldev] CDI.KEYID = 6
1,514,962 UART: [ldev] SUBJECT.KEYID = 5
1,515,388 UART: [ldev] AUTHORITY.KEYID = 7
1,515,851 UART: [ldev] FE.KEYID = 1
1,521,189 UART: [ldev] Erasing FE.KEYID = 1
1,546,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,058 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,344 UART: [fwproc] Received command 0x46574c44
1,587,135 UART: [fwproc] Received Image of size 114084 bytes
1,622,611 UART: ROM Fatal Error: 0x000B001C
1,623,770 >>> mbox cmd response: failed
1,623,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,776 >>> mbox cmd response: failed
1,623,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,564 UART: [state] LifecycleState = Unprovisioned
85,219 UART: [state] DebugLocked = No
85,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,249 UART: [kat] SHA2-256
881,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,295 UART: [kat] ++
885,447 UART: [kat] sha1
889,679 UART: [kat] SHA2-256
891,617 UART: [kat] SHA2-384
894,410 UART: [kat] SHA2-512-ACC
896,311 UART: [kat] ECC-384
901,914 UART: [kat] HMAC-384Kdf
906,386 UART: [kat] LMS
1,474,582 UART: [kat] --
1,475,559 UART: [cold-reset] ++
1,476,017 UART: [fht] Storing FHT @ 0x50003400
1,478,914 UART: [idev] ++
1,479,082 UART: [idev] CDI.KEYID = 6
1,479,442 UART: [idev] SUBJECT.KEYID = 7
1,479,866 UART: [idev] UDS.KEYID = 0
1,480,211 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,736 UART: [idev] Erasing UDS.KEYID = 0
1,504,408 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,784 UART: [idev] --
1,513,597 UART: [ldev] ++
1,513,765 UART: [ldev] CDI.KEYID = 6
1,514,128 UART: [ldev] SUBJECT.KEYID = 5
1,514,554 UART: [ldev] AUTHORITY.KEYID = 7
1,515,017 UART: [ldev] FE.KEYID = 1
1,520,155 UART: [ldev] Erasing FE.KEYID = 1
1,545,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,236 UART: [ldev] --
1,584,643 UART: [fwproc] Waiting for Commands...
1,585,394 UART: [fwproc] Received command 0x46574c44
1,586,185 UART: [fwproc] Received Image of size 114084 bytes
2,880,470 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,907,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,525 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,477,523 >>> mbox cmd response: failed
1,477,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,529 >>> mbox cmd response: failed
1,477,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,125 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,371 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,852 UART: [kat] SHA2-256
881,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,898 UART: [kat] ++
886,050 UART: [kat] sha1
890,302 UART: [kat] SHA2-256
892,240 UART: [kat] SHA2-384
895,007 UART: [kat] SHA2-512-ACC
896,908 UART: [kat] ECC-384
902,693 UART: [kat] HMAC-384Kdf
907,357 UART: [kat] LMS
1,475,553 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,742 UART: [fht] Storing FHT @ 0x50003400
1,479,687 UART: [idev] ++
1,479,855 UART: [idev] CDI.KEYID = 6
1,480,215 UART: [idev] SUBJECT.KEYID = 7
1,480,639 UART: [idev] UDS.KEYID = 0
1,480,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,289 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,075 UART: [idev] --
1,515,190 UART: [ldev] ++
1,515,358 UART: [ldev] CDI.KEYID = 6
1,515,721 UART: [ldev] SUBJECT.KEYID = 5
1,516,147 UART: [ldev] AUTHORITY.KEYID = 7
1,516,610 UART: [ldev] FE.KEYID = 1
1,521,884 UART: [ldev] Erasing FE.KEYID = 1
1,547,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,558 UART: [fwproc] Waiting for Commands...
1,588,377 UART: [fwproc] Received command 0x46574c44
1,589,168 UART: [fwproc] Received Image of size 114084 bytes
1,624,482 UART: ROM Fatal Error: 0x000B001C
1,625,641 >>> mbox cmd response: failed
1,625,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,647 >>> mbox cmd response: failed
1,625,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,059 UART: [kat] HMAC-384Kdf
907,773 UART: [kat] LMS
1,475,969 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,317 UART: [idev] ++
1,480,485 UART: [idev] CDI.KEYID = 6
1,480,845 UART: [idev] SUBJECT.KEYID = 7
1,481,269 UART: [idev] UDS.KEYID = 0
1,481,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,623 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,433 UART: [idev] --
1,515,542 UART: [ldev] ++
1,515,710 UART: [ldev] CDI.KEYID = 6
1,516,073 UART: [ldev] SUBJECT.KEYID = 5
1,516,499 UART: [ldev] AUTHORITY.KEYID = 7
1,516,962 UART: [ldev] FE.KEYID = 1
1,522,408 UART: [ldev] Erasing FE.KEYID = 1
1,548,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,825 UART: [ldev] --
1,588,298 UART: [fwproc] Waiting for Commands...
1,588,971 UART: [fwproc] Received command 0x46574c44
1,589,762 UART: [fwproc] Received Image of size 114084 bytes
2,885,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,077,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,478,330 >>> mbox cmd response: failed
1,478,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,336 >>> mbox cmd response: failed
1,478,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,100 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,106 UART: [kat] SHA2-512-ACC
908,007 UART: [kat] ECC-384
917,312 UART: [kat] HMAC-384Kdf
922,120 UART: [kat] LMS
1,170,448 UART: [kat] --
1,171,495 UART: [cold-reset] ++
1,171,937 UART: [fht] FHT @ 0x50003400
1,174,784 UART: [idev] ++
1,174,952 UART: [idev] CDI.KEYID = 6
1,175,312 UART: [idev] SUBJECT.KEYID = 7
1,175,736 UART: [idev] UDS.KEYID = 0
1,176,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,061 UART: [idev] Sha1 KeyId Algorithm
1,209,741 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,243,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,017 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,902 UART: [fwproc] Recv'd Img size: 114084 bytes
1,319,086 UART: ROM Fatal Error: 0x000B001C
1,320,245 >>> mbox cmd response: failed
1,320,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,251 >>> mbox cmd response: failed
1,320,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
901,739 UART: [kat] SHA2-256
903,679 UART: [kat] SHA2-384
906,462 UART: [kat] SHA2-512-ACC
908,363 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,095 UART: [cold-reset] ++
1,172,491 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,395 UART: [idev] Sha1 KeyId Algorithm
1,210,035 UART: [idev] --
1,211,207 UART: [ldev] ++
1,211,375 UART: [ldev] CDI.KEYID = 6
1,211,738 UART: [ldev] SUBJECT.KEYID = 5
1,212,164 UART: [ldev] AUTHORITY.KEYID = 7
1,212,627 UART: [ldev] FE.KEYID = 1
1,217,847 UART: [ldev] Erasing FE.KEYID = 1
1,244,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,147 UART: [ldev] --
1,283,588 UART: [fwproc] Wait for Commands...
1,284,354 UART: [fwproc] Recv command 0x46574c44
1,285,082 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,268 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,173,840 >>> mbox cmd response: failed
1,173,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,846 >>> mbox cmd response: failed
1,173,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,615 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
893,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,854 UART: [kat] ++
898,006 UART: [kat] sha1
902,446 UART: [kat] SHA2-256
904,386 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
923,069 UART: [kat] LMS
1,171,397 UART: [kat] --
1,172,178 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,301 UART: [idev] ++
1,175,469 UART: [idev] CDI.KEYID = 6
1,175,829 UART: [idev] SUBJECT.KEYID = 7
1,176,253 UART: [idev] UDS.KEYID = 0
1,176,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,283 UART: [idev] Erasing UDS.KEYID = 0
1,201,552 UART: [idev] Sha1 KeyId Algorithm
1,210,154 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,217,940 UART: [ldev] Erasing FE.KEYID = 1
1,244,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,456 UART: [ldev] --
1,283,747 UART: [fwproc] Wait for Commands...
1,284,555 UART: [fwproc] Recv command 0x46574c44
1,285,283 UART: [fwproc] Recv'd Img size: 114084 bytes
1,319,801 UART: ROM Fatal Error: 0x000B001C
1,320,960 >>> mbox cmd response: failed
1,320,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,966 >>> mbox cmd response: failed
1,320,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,514 UART: [kat] SHA2-256
904,454 UART: [kat] SHA2-384
907,125 UART: [kat] SHA2-512-ACC
909,026 UART: [kat] ECC-384
918,665 UART: [kat] HMAC-384Kdf
923,343 UART: [kat] LMS
1,171,671 UART: [kat] --
1,172,396 UART: [cold-reset] ++
1,172,928 UART: [fht] FHT @ 0x50003400
1,175,443 UART: [idev] ++
1,175,611 UART: [idev] CDI.KEYID = 6
1,175,971 UART: [idev] SUBJECT.KEYID = 7
1,176,395 UART: [idev] UDS.KEYID = 0
1,176,740 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,533 UART: [idev] Erasing UDS.KEYID = 0
1,200,988 UART: [idev] Sha1 KeyId Algorithm
1,209,264 UART: [idev] --
1,210,334 UART: [ldev] ++
1,210,502 UART: [ldev] CDI.KEYID = 6
1,210,865 UART: [ldev] SUBJECT.KEYID = 5
1,211,291 UART: [ldev] AUTHORITY.KEYID = 7
1,211,754 UART: [ldev] FE.KEYID = 1
1,217,222 UART: [ldev] Erasing FE.KEYID = 1
1,243,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,862 UART: [ldev] --
1,282,181 UART: [fwproc] Wait for Commands...
1,282,921 UART: [fwproc] Recv command 0x46574c44
1,283,649 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,159 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,015 >>> mbox cmd response: failed
1,175,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,021 >>> mbox cmd response: failed
1,175,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,834 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,930 UART: [kat] SHA2-512-ACC
906,831 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,649 UART: [fht] FHT @ 0x50003400
1,173,351 UART: [idev] ++
1,173,519 UART: [idev] CDI.KEYID = 6
1,173,880 UART: [idev] SUBJECT.KEYID = 7
1,174,305 UART: [idev] UDS.KEYID = 0
1,174,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,631 UART: [idev] Sha1 KeyId Algorithm
1,208,419 UART: [idev] --
1,209,548 UART: [ldev] ++
1,209,716 UART: [ldev] CDI.KEYID = 6
1,210,080 UART: [ldev] SUBJECT.KEYID = 5
1,210,507 UART: [ldev] AUTHORITY.KEYID = 7
1,210,970 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,362 UART: [ldev] --
1,281,766 UART: [fwproc] Wait for Commands...
1,282,439 UART: [fwproc] Recv command 0x46574c44
1,283,172 UART: [fwproc] Recv'd Img size: 114084 bytes
1,317,930 UART: ROM Fatal Error: 0x000B001C
1,319,089 >>> mbox cmd response: failed
1,319,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,095 >>> mbox cmd response: failed
1,319,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
915,674 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,189 UART: [cold-reset] ++
1,169,565 UART: [fht] FHT @ 0x50003400
1,172,255 UART: [idev] ++
1,172,423 UART: [idev] CDI.KEYID = 6
1,172,784 UART: [idev] SUBJECT.KEYID = 7
1,173,209 UART: [idev] UDS.KEYID = 0
1,173,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,987 UART: [idev] Sha1 KeyId Algorithm
1,208,035 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,215,522 UART: [ldev] Erasing FE.KEYID = 1
1,242,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,286 UART: [ldev] --
1,281,610 UART: [fwproc] Wait for Commands...
1,282,263 UART: [fwproc] Recv command 0x46574c44
1,282,996 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,832 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,170,226 >>> mbox cmd response: failed
1,170,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,232 >>> mbox cmd response: failed
1,170,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,948 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,402 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,599 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,257 UART: [ldev] --
1,282,613 UART: [fwproc] Wait for Commands...
1,283,192 UART: [fwproc] Recv command 0x46574c44
1,283,925 UART: [fwproc] Recv'd Img size: 114084 bytes
1,319,543 UART: ROM Fatal Error: 0x000B001C
1,320,702 >>> mbox cmd response: failed
1,320,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,708 >>> mbox cmd response: failed
1,320,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,372 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,174,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,567 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,929 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,685 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,170,453 >>> mbox cmd response: failed
1,170,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,459 >>> mbox cmd response: failed
1,170,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,121 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,539 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
4,878,532 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,023,434 >>> mbox cmd response: failed
14,024,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,024,624 >>> mbox cmd response: failed
14,024,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,025,195 >>> mbox cmd response: failed
Initializing fuses
2,062,201 writing to cptra_bootfsm_go
6,937,766 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,517,714 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
4,881,860 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,032,603 >>> mbox cmd response: failed
14,033,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,033,527 >>> mbox cmd response: failed
14,033,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,034,095 >>> mbox cmd response: failed
Initializing fuses
2,055,241 writing to cptra_bootfsm_go
6,927,061 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,505,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
5,186,867 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,201,558 >>> mbox cmd response: failed
14,202,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,202,777 >>> mbox cmd response: failed
14,203,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,203,352 >>> mbox cmd response: failed
Initializing fuses
2,057,460 writing to cptra_bootfsm_go
10,840,437 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,273,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
5,189,851 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,204,236 >>> mbox cmd response: failed
14,204,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,205,307 >>> mbox cmd response: failed
14,205,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,205,930 >>> mbox cmd response: failed
Initializing fuses
2,057,082 writing to cptra_bootfsm_go
10,845,615 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,284,699 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,484,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,485,553 >>> mbox cmd response: failed
10,486,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,486,471 >>> mbox cmd response: failed
10,486,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,024 >>> mbox cmd response: failed
Initializing fuses
2,057,273 writing to cptra_bootfsm_go
5,520,006 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,335,431 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,461,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,445,983 >>> mbox cmd response: failed
10,446,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,446,935 >>> mbox cmd response: failed
10,447,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,447,506 >>> mbox cmd response: failed
Initializing fuses
2,054,267 writing to cptra_bootfsm_go
5,512,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,297,548 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,783,748 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,674,129 >>> mbox cmd response: failed
10,674,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,675,074 >>> mbox cmd response: failed
10,675,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,675,655 >>> mbox cmd response: failed
Initializing fuses
2,057,424 writing to cptra_bootfsm_go
12,976,782 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,703,805 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,783,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,676,631 >>> mbox cmd response: failed
10,677,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,677,620 >>> mbox cmd response: failed
10,677,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,678,183 >>> mbox cmd response: failed
Initializing fuses
2,058,177 writing to cptra_bootfsm_go
12,977,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,718,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,443,245 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,462,840 >>> mbox cmd response: failed
10,463,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,463,790 >>> mbox cmd response: failed
10,464,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,464,358 >>> mbox cmd response: failed
Initializing fuses
2,055,787 writing to cptra_bootfsm_go
5,514,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,341,832 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,486,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,461,806 >>> mbox cmd response: failed
10,462,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,462,790 >>> mbox cmd response: failed
10,463,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,463,365 >>> mbox cmd response: failed
Initializing fuses
2,055,957 writing to cptra_bootfsm_go
5,523,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,337,290 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,595 writing to cptra_bootfsm_go
3,782,538 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,697,126 >>> mbox cmd response: failed
10,697,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,698,226 >>> mbox cmd response: failed
10,698,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,698,847 >>> mbox cmd response: failed
Initializing fuses
2,058,286 writing to cptra_bootfsm_go
12,954,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,684,885 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,268 writing to cptra_bootfsm_go
3,796,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,686,691 >>> mbox cmd response: failed
10,687,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,687,864 >>> mbox cmd response: failed
10,688,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,453 >>> mbox cmd response: failed
Initializing fuses
2,057,336 writing to cptra_bootfsm_go
12,970,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,700,143 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,033 >>> mbox cmd response: failed
1,195,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,039 >>> mbox cmd response: failed
1,195,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,841 UART: [kat] SHA2-256
881,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,887 UART: [kat] ++
886,039 UART: [kat] sha1
890,229 UART: [kat] SHA2-256
892,167 UART: [kat] SHA2-384
894,846 UART: [kat] SHA2-512-ACC
896,747 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
906,934 UART: [kat] LMS
1,475,130 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,473 UART: [fht] Storing FHT @ 0x50003400
1,479,198 UART: [idev] ++
1,479,366 UART: [idev] CDI.KEYID = 6
1,479,726 UART: [idev] SUBJECT.KEYID = 7
1,480,150 UART: [idev] UDS.KEYID = 0
1,480,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,244 UART: [idev] Erasing UDS.KEYID = 0
1,505,042 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,626 UART: [idev] --
1,514,571 UART: [ldev] ++
1,514,739 UART: [ldev] CDI.KEYID = 6
1,515,102 UART: [ldev] SUBJECT.KEYID = 5
1,515,528 UART: [ldev] AUTHORITY.KEYID = 7
1,515,991 UART: [ldev] FE.KEYID = 1
1,521,211 UART: [ldev] Erasing FE.KEYID = 1
1,546,220 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,976 UART: [ldev] --
1,585,393 UART: [fwproc] Waiting for Commands...
1,586,184 UART: [fwproc] Received command 0x46574c44
1,586,975 UART: [fwproc] Received Image of size 114084 bytes
2,882,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,969 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,194,357 >>> mbox cmd response: failed
1,194,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,363 >>> mbox cmd response: failed
1,194,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,369 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,581 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,356 >>> mbox cmd response: failed
1,195,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,362 >>> mbox cmd response: failed
1,195,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,368 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,224 UART: [kat] SHA2-256
882,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,270 UART: [kat] ++
886,422 UART: [kat] sha1
890,506 UART: [kat] SHA2-256
892,444 UART: [kat] SHA2-384
895,029 UART: [kat] SHA2-512-ACC
896,930 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,211 UART: [kat] LMS
1,475,407 UART: [kat] --
1,476,346 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,489 UART: [idev] ++
1,479,657 UART: [idev] CDI.KEYID = 6
1,480,017 UART: [idev] SUBJECT.KEYID = 7
1,480,441 UART: [idev] UDS.KEYID = 0
1,480,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,629 UART: [idev] Erasing UDS.KEYID = 0
1,505,241 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,871 UART: [idev] --
1,515,048 UART: [ldev] ++
1,515,216 UART: [ldev] CDI.KEYID = 6
1,515,579 UART: [ldev] SUBJECT.KEYID = 5
1,516,005 UART: [ldev] AUTHORITY.KEYID = 7
1,516,468 UART: [ldev] FE.KEYID = 1
1,521,848 UART: [ldev] Erasing FE.KEYID = 1
1,546,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,139 UART: [ldev] --
1,586,608 UART: [fwproc] Waiting for Commands...
1,587,383 UART: [fwproc] Received command 0x46574c44
1,588,174 UART: [fwproc] Received Image of size 114084 bytes
2,883,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,193,128 >>> mbox cmd response: failed
1,193,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,134 >>> mbox cmd response: failed
1,193,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,286 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,915 >>> mbox cmd response: failed
1,195,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,921 >>> mbox cmd response: failed
1,195,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
893,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,649 UART: [kat] ++
897,801 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,438 UART: [kat] HMAC-384Kdf
923,028 UART: [kat] LMS
1,171,356 UART: [kat] --
1,172,341 UART: [cold-reset] ++
1,172,849 UART: [fht] FHT @ 0x50003400
1,175,618 UART: [idev] ++
1,175,786 UART: [idev] CDI.KEYID = 6
1,176,146 UART: [idev] SUBJECT.KEYID = 7
1,176,570 UART: [idev] UDS.KEYID = 0
1,176,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,446 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,729 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,368 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,902 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,423 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,120 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,007 >>> mbox cmd response: failed
1,195,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,013 >>> mbox cmd response: failed
1,195,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,860 >>> mbox cmd response: failed
1,195,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,866 >>> mbox cmd response: failed
1,195,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,098 UART: [kat] SHA2-256
904,038 UART: [kat] SHA2-384
906,685 UART: [kat] SHA2-512-ACC
908,586 UART: [kat] ECC-384
918,251 UART: [kat] HMAC-384Kdf
923,071 UART: [kat] LMS
1,171,399 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,183 UART: [idev] ++
1,175,351 UART: [idev] CDI.KEYID = 6
1,175,711 UART: [idev] SUBJECT.KEYID = 7
1,176,135 UART: [idev] UDS.KEYID = 0
1,176,480 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,187 UART: [idev] Erasing UDS.KEYID = 0
1,201,212 UART: [idev] Sha1 KeyId Algorithm
1,209,806 UART: [idev] --
1,210,760 UART: [ldev] ++
1,210,928 UART: [ldev] CDI.KEYID = 6
1,211,291 UART: [ldev] SUBJECT.KEYID = 5
1,211,717 UART: [ldev] AUTHORITY.KEYID = 7
1,212,180 UART: [ldev] FE.KEYID = 1
1,217,574 UART: [ldev] Erasing FE.KEYID = 1
1,243,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,986 UART: [ldev] --
1,282,279 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,641 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,937 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,402 >>> mbox cmd response: failed
1,197,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,408 >>> mbox cmd response: failed
1,197,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,888 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,837 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,193,887 >>> mbox cmd response: failed
1,193,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,893 >>> mbox cmd response: failed
1,193,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,174,287 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,385 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,208,285 UART: [idev] --
1,209,324 UART: [ldev] ++
1,209,492 UART: [ldev] CDI.KEYID = 6
1,209,856 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,241,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,734 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,342 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,196,081 >>> mbox cmd response: failed
1,196,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,087 >>> mbox cmd response: failed
1,196,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,434 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,472 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,193,712 >>> mbox cmd response: failed
1,193,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,718 >>> mbox cmd response: failed
1,193,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,193,724 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,992 UART: [kat] ++
896,144 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,174,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,208,911 UART: [ldev] ++
1,209,079 UART: [ldev] CDI.KEYID = 6
1,209,443 UART: [ldev] SUBJECT.KEYID = 5
1,209,870 UART: [ldev] AUTHORITY.KEYID = 7
1,210,333 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,991 UART: [ldev] --
1,281,469 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,519 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,196,370 >>> mbox cmd response: failed
1,196,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,376 >>> mbox cmd response: failed
1,196,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,503 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,136 UART:
192,552 UART: Running Caliptra ROM ...
193,659 UART:
193,800 UART: [state] CFI Enabled
265,368 UART: [state] LifecycleState = Unprovisioned
267,361 UART: [state] DebugLocked = No
270,018 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,227 UART: [kat] SHA2-256
444,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,438 UART: [kat] ++
455,928 UART: [kat] sha1
466,861 UART: [kat] SHA2-256
469,543 UART: [kat] SHA2-384
476,596 UART: [kat] SHA2-512-ACC
478,945 UART: [kat] ECC-384
2,767,636 UART: [kat] HMAC-384Kdf
2,800,509 UART: [kat] LMS
3,990,793 UART: [kat] --
3,993,994 UART: [cold-reset] ++
3,995,281 UART: [fht] Storing FHT @ 0x50003400
4,006,511 UART: [idev] ++
4,007,087 UART: [idev] CDI.KEYID = 6
4,007,994 UART: [idev] SUBJECT.KEYID = 7
4,009,275 UART: [idev] UDS.KEYID = 0
4,011,830 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,155,182 UART: [idev] Erasing UDS.KEYID = 0
7,345,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,331 UART: [idev] --
7,372,461 UART: [ldev] ++
7,373,085 UART: [ldev] CDI.KEYID = 6
7,373,971 UART: [ldev] SUBJECT.KEYID = 5
7,375,239 UART: [ldev] AUTHORITY.KEYID = 7
7,376,470 UART: [ldev] FE.KEYID = 1
7,424,354 UART: [ldev] Erasing FE.KEYID = 1
10,755,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,448 UART: [ldev] --
13,119,470 UART: [fwproc] Waiting for Commands...
13,122,004 UART: [fwproc] Received command 0x46574c44
13,124,201 UART: [fwproc] Received Image of size 113760 bytes
17,131,602 UART: ROM Fatal Error: 0x000B0030
17,135,021 >>> mbox cmd response: failed
17,135,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,135,680 >>> mbox cmd response: failed
17,135,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,136,253 >>> mbox cmd response: failed
Initializing fuses
2,053,294 writing to cptra_bootfsm_go
2,242,545 UART:
2,242,979 UART: Running Caliptra ROM ...
2,244,232 UART:
2,244,398 UART: [state] CFI Enabled
2,304,471 UART: [state] LifecycleState = Unprovisioned
2,306,373 UART: [state] DebugLocked = No
2,308,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,970 UART: [kat] SHA2-256
2,483,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,172 UART: [kat] ++
2,494,626 UART: [kat] sha1
2,504,272 UART: [kat] SHA2-256
2,506,973 UART: [kat] SHA2-384
2,512,802 UART: [kat] SHA2-512-ACC
2,515,150 UART: [kat] ECC-384
4,805,600 UART: [kat] HMAC-384Kdf
4,818,043 UART: [kat] LMS
6,008,358 UART: [kat] --
6,014,495 UART: [cold-reset] ++
6,016,442 UART: [fht] Storing FHT @ 0x50003400
6,028,366 UART: [idev] ++
6,028,938 UART: [idev] CDI.KEYID = 6
6,029,959 UART: [idev] SUBJECT.KEYID = 7
6,031,124 UART: [idev] UDS.KEYID = 0
6,033,434 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,176,645 UART: [idev] Erasing UDS.KEYID = 0
9,362,470 UART: [idev] Using Sha1 for KeyId Algorithm
9,385,966 UART: [idev] --
9,391,156 UART: [ldev] ++
9,391,784 UART: [ldev] CDI.KEYID = 6
9,392,696 UART: [ldev] SUBJECT.KEYID = 5
9,393,941 UART: [ldev] AUTHORITY.KEYID = 7
9,395,187 UART: [ldev] FE.KEYID = 1
9,441,616 UART: [ldev] Erasing FE.KEYID = 1
12,775,258 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,101,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,149,477 UART: [ldev] --
15,154,746 UART: [fwproc] Waiting for Commands...
15,157,331 UART: [fwproc] Received command 0x46574c44
15,159,522 UART: [fwproc] Received Image of size 113760 bytes
19,209,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,285,158 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,354,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,669,760 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,785,313 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,590,718 >>> mbox cmd response: failed
16,591,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,591,707 >>> mbox cmd response: failed
16,591,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,592,216 >>> mbox cmd response: failed
Initializing fuses
2,051,207 writing to cptra_bootfsm_go
5,857,570 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,943,715 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,374 UART:
192,734 UART: Running Caliptra ROM ...
193,875 UART:
603,615 UART: [state] CFI Enabled
617,736 UART: [state] LifecycleState = Unprovisioned
619,686 UART: [state] DebugLocked = No
621,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,490 UART: [kat] SHA2-256
796,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,783 UART: [kat] ++
807,227 UART: [kat] sha1
818,287 UART: [kat] SHA2-256
821,022 UART: [kat] SHA2-384
827,327 UART: [kat] SHA2-512-ACC
829,660 UART: [kat] ECC-384
3,115,348 UART: [kat] HMAC-384Kdf
3,125,582 UART: [kat] LMS
4,315,683 UART: [kat] --
4,321,522 UART: [cold-reset] ++
4,322,817 UART: [fht] Storing FHT @ 0x50003400
4,335,112 UART: [idev] ++
4,335,675 UART: [idev] CDI.KEYID = 6
4,336,686 UART: [idev] SUBJECT.KEYID = 7
4,337,849 UART: [idev] UDS.KEYID = 0
4,340,418 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,483,529 UART: [idev] Erasing UDS.KEYID = 0
7,624,391 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,233 UART: [idev] --
7,650,526 UART: [ldev] ++
7,651,106 UART: [ldev] CDI.KEYID = 6
7,652,050 UART: [ldev] SUBJECT.KEYID = 5
7,653,263 UART: [ldev] AUTHORITY.KEYID = 7
7,654,555 UART: [ldev] FE.KEYID = 1
7,665,445 UART: [ldev] Erasing FE.KEYID = 1
10,956,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,821 UART: [ldev] --
13,317,277 UART: [fwproc] Waiting for Commands...
13,319,533 UART: [fwproc] Received command 0x46574c44
13,321,772 UART: [fwproc] Received Image of size 113760 bytes
17,408,381 UART: ROM Fatal Error: 0x000B0030
17,411,788 >>> mbox cmd response: failed
17,412,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,412,443 >>> mbox cmd response: failed
17,412,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,413,043 >>> mbox cmd response: failed
Initializing fuses
2,051,066 writing to cptra_bootfsm_go
2,240,381 UART:
2,240,738 UART: Running Caliptra ROM ...
2,241,841 UART:
3,049,009 UART: [state] CFI Enabled
3,064,692 UART: [state] LifecycleState = Unprovisioned
3,066,602 UART: [state] DebugLocked = No
3,068,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,074,207 UART: [kat] SHA2-256
3,243,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,254,498 UART: [kat] ++
3,254,982 UART: [kat] sha1
3,266,033 UART: [kat] SHA2-256
3,268,743 UART: [kat] SHA2-384
3,274,028 UART: [kat] SHA2-512-ACC
3,276,369 UART: [kat] ECC-384
5,558,959 UART: [kat] HMAC-384Kdf
5,570,491 UART: [kat] LMS
6,760,601 UART: [kat] --
6,766,131 UART: [cold-reset] ++
6,767,584 UART: [fht] Storing FHT @ 0x50003400
6,779,990 UART: [idev] ++
6,780,556 UART: [idev] CDI.KEYID = 6
6,781,543 UART: [idev] SUBJECT.KEYID = 7
6,782,758 UART: [idev] UDS.KEYID = 0
6,784,907 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,927,883 UART: [idev] Erasing UDS.KEYID = 0
10,071,752 UART: [idev] Using Sha1 for KeyId Algorithm
10,094,231 UART: [idev] --
10,098,066 UART: [ldev] ++
10,098,636 UART: [ldev] CDI.KEYID = 6
10,099,598 UART: [ldev] SUBJECT.KEYID = 5
10,100,854 UART: [ldev] AUTHORITY.KEYID = 7
10,102,087 UART: [ldev] FE.KEYID = 1
10,113,882 UART: [ldev] Erasing FE.KEYID = 1
13,408,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,701,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,716,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,730,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,745,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,763,695 UART: [ldev] --
15,768,536 UART: [fwproc] Waiting for Commands...
15,770,433 UART: [fwproc] Received command 0x46574c44
15,772,676 UART: [fwproc] Received Image of size 113760 bytes
19,813,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,884,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,953,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,269,192 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,127,931 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,580,256 >>> mbox cmd response: failed
16,581,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,581,668 >>> mbox cmd response: failed
16,581,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,582,234 >>> mbox cmd response: failed
Initializing fuses
2,053,916 writing to cptra_bootfsm_go
7,405,780 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,348,045 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,259 UART:
192,626 UART: Running Caliptra ROM ...
193,839 UART:
193,993 UART: [state] CFI Enabled
265,159 UART: [state] LifecycleState = Unprovisioned
267,081 UART: [state] DebugLocked = No
268,362 UART: [state] WD Timer not started. Device not locked for debugging
272,672 UART: [kat] SHA2-256
451,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,392 UART: [kat] ++
463,921 UART: [kat] sha1
473,905 UART: [kat] SHA2-256
476,963 UART: [kat] SHA2-384
484,015 UART: [kat] SHA2-512-ACC
486,948 UART: [kat] ECC-384
2,949,543 UART: [kat] HMAC-384Kdf
2,971,874 UART: [kat] LMS
3,501,293 UART: [kat] --
3,505,997 UART: [cold-reset] ++
3,507,873 UART: [fht] FHT @ 0x50003400
3,519,284 UART: [idev] ++
3,519,853 UART: [idev] CDI.KEYID = 6
3,520,764 UART: [idev] SUBJECT.KEYID = 7
3,521,978 UART: [idev] UDS.KEYID = 0
3,524,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,082 UART: [idev] Erasing UDS.KEYID = 0
6,025,928 UART: [idev] Sha1 KeyId Algorithm
6,049,131 UART: [idev] --
6,053,167 UART: [ldev] ++
6,053,757 UART: [ldev] CDI.KEYID = 6
6,054,670 UART: [ldev] SUBJECT.KEYID = 5
6,055,832 UART: [ldev] AUTHORITY.KEYID = 7
6,057,070 UART: [ldev] FE.KEYID = 1
6,102,070 UART: [ldev] Erasing FE.KEYID = 1
8,605,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,750 UART: [ldev] --
10,413,771 UART: [fwproc] Wait for Commands...
10,417,001 UART: [fwproc] Recv command 0x46574c44
10,419,101 UART: [fwproc] Recv'd Img size: 114084 bytes
12,072,140 UART: ROM Fatal Error: 0x000B0030
12,075,213 >>> mbox cmd response: failed
12,075,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,075,888 >>> mbox cmd response: failed
12,076,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,076,451 >>> mbox cmd response: failed
Initializing fuses
2,055,403 writing to cptra_bootfsm_go
2,244,688 UART:
2,245,034 UART: Running Caliptra ROM ...
2,246,173 UART:
2,246,333 UART: [state] CFI Enabled
2,308,301 UART: [state] LifecycleState = Unprovisioned
2,310,185 UART: [state] DebugLocked = No
2,311,921 UART: [state] WD Timer not started. Device not locked for debugging
2,315,940 UART: [kat] SHA2-256
2,495,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,631 UART: [kat] ++
2,507,092 UART: [kat] sha1
2,518,034 UART: [kat] SHA2-256
2,521,055 UART: [kat] SHA2-384
2,526,810 UART: [kat] SHA2-512-ACC
2,529,802 UART: [kat] ECC-384
4,974,209 UART: [kat] HMAC-384Kdf
4,995,029 UART: [kat] LMS
5,524,500 UART: [kat] --
5,527,192 UART: [cold-reset] ++
5,529,234 UART: [fht] FHT @ 0x50003400
5,540,861 UART: [idev] ++
5,541,436 UART: [idev] CDI.KEYID = 6
5,542,373 UART: [idev] SUBJECT.KEYID = 7
5,543,536 UART: [idev] UDS.KEYID = 0
5,545,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,689,561 UART: [idev] Erasing UDS.KEYID = 0
8,051,453 UART: [idev] Sha1 KeyId Algorithm
8,075,117 UART: [idev] --
8,079,706 UART: [ldev] ++
8,080,281 UART: [ldev] CDI.KEYID = 6
8,081,196 UART: [ldev] SUBJECT.KEYID = 5
8,082,413 UART: [ldev] AUTHORITY.KEYID = 7
8,083,647 UART: [ldev] FE.KEYID = 1
8,123,094 UART: [ldev] Erasing FE.KEYID = 1
10,628,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,367,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,383,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,399,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,415,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,178 UART: [ldev] --
12,441,381 UART: [fwproc] Wait for Commands...
12,443,204 UART: [fwproc] Recv command 0x46574c44
12,445,309 UART: [fwproc] Recv'd Img size: 114084 bytes
15,851,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,924,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,992,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,310,088 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,383,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,767,677 >>> mbox cmd response: failed
11,768,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,768,541 >>> mbox cmd response: failed
11,768,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,769,070 >>> mbox cmd response: failed
Initializing fuses
2,057,897 writing to cptra_bootfsm_go
5,416,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,097,657 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,397 UART:
192,836 UART: Running Caliptra ROM ...
193,977 UART:
603,406 UART: [state] CFI Enabled
617,542 UART: [state] LifecycleState = Unprovisioned
619,423 UART: [state] DebugLocked = No
621,288 UART: [state] WD Timer not started. Device not locked for debugging
624,843 UART: [kat] SHA2-256
803,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,499 UART: [kat] ++
816,032 UART: [kat] sha1
826,724 UART: [kat] SHA2-256
829,747 UART: [kat] SHA2-384
835,941 UART: [kat] SHA2-512-ACC
838,927 UART: [kat] ECC-384
3,283,347 UART: [kat] HMAC-384Kdf
3,295,751 UART: [kat] LMS
3,825,244 UART: [kat] --
3,829,947 UART: [cold-reset] ++
3,831,226 UART: [fht] FHT @ 0x50003400
3,842,154 UART: [idev] ++
3,842,723 UART: [idev] CDI.KEYID = 6
3,843,603 UART: [idev] SUBJECT.KEYID = 7
3,845,072 UART: [idev] UDS.KEYID = 0
3,847,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,821 UART: [idev] Erasing UDS.KEYID = 0
6,316,346 UART: [idev] Sha1 KeyId Algorithm
6,339,734 UART: [idev] --
6,345,215 UART: [ldev] ++
6,345,795 UART: [ldev] CDI.KEYID = 6
6,346,702 UART: [ldev] SUBJECT.KEYID = 5
6,347,919 UART: [ldev] AUTHORITY.KEYID = 7
6,349,148 UART: [ldev] FE.KEYID = 1
6,359,685 UART: [ldev] Erasing FE.KEYID = 1
8,833,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,774 UART: [ldev] --
10,625,278 UART: [fwproc] Wait for Commands...
10,628,186 UART: [fwproc] Recv command 0x46574c44
10,630,282 UART: [fwproc] Recv'd Img size: 114084 bytes
12,286,472 UART: ROM Fatal Error: 0x000B0030
12,289,600 >>> mbox cmd response: failed
12,289,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,258 >>> mbox cmd response: failed
12,290,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,810 >>> mbox cmd response: failed
Initializing fuses
2,049,639 writing to cptra_bootfsm_go
2,238,939 UART:
2,239,294 UART: Running Caliptra ROM ...
2,240,344 UART:
8,179,504 UART: [state] CFI Enabled
8,195,706 UART: [state] LifecycleState = Unprovisioned
8,197,590 UART: [state] DebugLocked = No
8,199,279 UART: [state] WD Timer not started. Device not locked for debugging
8,203,728 UART: [kat] SHA2-256
8,382,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,394,394 UART: [kat] ++
8,394,852 UART: [kat] sha1
8,406,706 UART: [kat] SHA2-256
8,409,724 UART: [kat] SHA2-384
8,416,466 UART: [kat] SHA2-512-ACC
8,419,463 UART: [kat] ECC-384
10,860,574 UART: [kat] HMAC-384Kdf
10,872,632 UART: [kat] LMS
11,402,141 UART: [kat] --
11,406,031 UART: [cold-reset] ++
11,408,366 UART: [fht] FHT @ 0x50003400
11,419,990 UART: [idev] ++
11,420,553 UART: [idev] CDI.KEYID = 6
11,421,434 UART: [idev] SUBJECT.KEYID = 7
11,422,643 UART: [idev] UDS.KEYID = 0
11,424,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,568,694 UART: [idev] Erasing UDS.KEYID = 0
13,894,451 UART: [idev] Sha1 KeyId Algorithm
13,917,456 UART: [idev] --
13,921,504 UART: [ldev] ++
13,922,073 UART: [ldev] CDI.KEYID = 6
13,923,039 UART: [ldev] SUBJECT.KEYID = 5
13,924,197 UART: [ldev] AUTHORITY.KEYID = 7
13,925,423 UART: [ldev] FE.KEYID = 1
13,938,445 UART: [ldev] Erasing FE.KEYID = 1
16,416,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,135,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,151,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,166,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,182,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,203,336 UART: [ldev] --
18,207,483 UART: [fwproc] Wait for Commands...
18,209,527 UART: [fwproc] Recv command 0x46574c44
18,211,571 UART: [fwproc] Recv'd Img size: 114084 bytes
21,615,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,688,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,757,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,073,632 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,696,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,955,083 >>> mbox cmd response: failed
11,955,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,956,051 >>> mbox cmd response: failed
11,956,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,956,618 >>> mbox cmd response: failed
Initializing fuses
2,051,111 writing to cptra_bootfsm_go
11,607,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,195,022 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,239 UART:
192,599 UART: Running Caliptra ROM ...
193,801 UART:
193,956 UART: [state] CFI Enabled
262,897 UART: [state] LifecycleState = Unprovisioned
265,311 UART: [state] DebugLocked = No
267,394 UART: [state] WD Timer not started. Device not locked for debugging
271,468 UART: [kat] SHA2-256
461,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,119 UART: [kat] ++
472,594 UART: [kat] sha1
484,397 UART: [kat] SHA2-256
487,406 UART: [kat] SHA2-384
494,198 UART: [kat] SHA2-512-ACC
496,774 UART: [kat] ECC-384
2,948,918 UART: [kat] HMAC-384Kdf
2,973,785 UART: [kat] LMS
3,505,558 UART: [kat] --
3,510,098 UART: [cold-reset] ++
3,511,286 UART: [fht] FHT @ 0x50003400
3,521,301 UART: [idev] ++
3,521,980 UART: [idev] CDI.KEYID = 6
3,522,943 UART: [idev] SUBJECT.KEYID = 7
3,524,156 UART: [idev] UDS.KEYID = 0
3,526,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,797 UART: [idev] Erasing UDS.KEYID = 0
6,027,683 UART: [idev] Sha1 KeyId Algorithm
6,050,060 UART: [idev] --
6,055,845 UART: [ldev] ++
6,056,532 UART: [ldev] CDI.KEYID = 6
6,057,434 UART: [ldev] SUBJECT.KEYID = 5
6,058,602 UART: [ldev] AUTHORITY.KEYID = 7
6,059,839 UART: [ldev] FE.KEYID = 1
6,100,612 UART: [ldev] Erasing FE.KEYID = 1
8,610,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,695 UART: [ldev] --
10,416,714 UART: [fwproc] Wait for Commands...
10,418,542 UART: [fwproc] Recv command 0x46574c44
10,420,856 UART: [fwproc] Recv'd Img size: 114084 bytes
12,114,894 UART: ROM Fatal Error: 0x000B0030
12,118,346 >>> mbox cmd response: failed
12,118,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,119,108 >>> mbox cmd response: failed
12,119,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,119,675 >>> mbox cmd response: failed
Initializing fuses
2,050,446 writing to cptra_bootfsm_go
2,239,744 UART:
2,240,096 UART: Running Caliptra ROM ...
2,241,147 UART:
2,241,296 UART: [state] CFI Enabled
2,309,206 UART: [state] LifecycleState = Unprovisioned
2,311,587 UART: [state] DebugLocked = No
2,314,515 UART: [state] WD Timer not started. Device not locked for debugging
2,318,219 UART: [kat] SHA2-256
2,508,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,847 UART: [kat] ++
2,519,307 UART: [kat] sha1
2,530,359 UART: [kat] SHA2-256
2,533,382 UART: [kat] SHA2-384
2,540,672 UART: [kat] SHA2-512-ACC
2,543,278 UART: [kat] ECC-384
4,990,561 UART: [kat] HMAC-384Kdf
5,015,376 UART: [kat] LMS
5,547,116 UART: [kat] --
5,551,701 UART: [cold-reset] ++
5,553,531 UART: [fht] FHT @ 0x50003400
5,565,540 UART: [idev] ++
5,566,226 UART: [idev] CDI.KEYID = 6
5,567,200 UART: [idev] SUBJECT.KEYID = 7
5,568,417 UART: [idev] UDS.KEYID = 0
5,570,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,714,246 UART: [idev] Erasing UDS.KEYID = 0
8,070,867 UART: [idev] Sha1 KeyId Algorithm
8,092,380 UART: [idev] --
8,095,892 UART: [ldev] ++
8,096,579 UART: [ldev] CDI.KEYID = 6
8,097,464 UART: [ldev] SUBJECT.KEYID = 5
8,098,682 UART: [ldev] AUTHORITY.KEYID = 7
8,099,836 UART: [ldev] FE.KEYID = 1
8,142,940 UART: [ldev] Erasing FE.KEYID = 1
10,646,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,616 UART: [ldev] --
12,455,150 UART: [fwproc] Wait for Commands...
12,458,077 UART: [fwproc] Recv command 0x46574c44
12,460,396 UART: [fwproc] Recv'd Img size: 114084 bytes
15,903,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,093,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,635,140 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,439,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,881,666 >>> mbox cmd response: failed
11,882,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,883,070 >>> mbox cmd response: failed
11,883,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,883,636 >>> mbox cmd response: failed
Initializing fuses
2,050,070 writing to cptra_bootfsm_go
5,481,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,770,384 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
192,805 UART:
193,158 UART: Running Caliptra ROM ...
194,354 UART:
603,801 UART: [state] CFI Enabled
615,775 UART: [state] LifecycleState = Unprovisioned
618,133 UART: [state] DebugLocked = No
619,642 UART: [state] WD Timer not started. Device not locked for debugging
624,931 UART: [kat] SHA2-256
814,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,548 UART: [kat] ++
826,052 UART: [kat] sha1
837,582 UART: [kat] SHA2-256
840,612 UART: [kat] SHA2-384
847,025 UART: [kat] SHA2-512-ACC
849,579 UART: [kat] ECC-384
3,290,687 UART: [kat] HMAC-384Kdf
3,303,533 UART: [kat] LMS
3,835,336 UART: [kat] --
3,839,355 UART: [cold-reset] ++
3,841,886 UART: [fht] FHT @ 0x50003400
3,852,704 UART: [idev] ++
3,853,269 UART: [idev] CDI.KEYID = 6
3,854,285 UART: [idev] SUBJECT.KEYID = 7
3,855,386 UART: [idev] UDS.KEYID = 0
3,857,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,451 UART: [idev] Erasing UDS.KEYID = 0
6,335,892 UART: [idev] Sha1 KeyId Algorithm
6,359,234 UART: [idev] --
6,362,768 UART: [ldev] ++
6,363,452 UART: [ldev] CDI.KEYID = 6
6,364,363 UART: [ldev] SUBJECT.KEYID = 5
6,365,577 UART: [ldev] AUTHORITY.KEYID = 7
6,366,752 UART: [ldev] FE.KEYID = 1
6,378,425 UART: [ldev] Erasing FE.KEYID = 1
8,853,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,462 UART: [ldev] --
10,643,576 UART: [fwproc] Wait for Commands...
10,646,321 UART: [fwproc] Recv command 0x46574c44
10,648,575 UART: [fwproc] Recv'd Img size: 114084 bytes
12,334,058 UART: ROM Fatal Error: 0x000B0030
12,337,475 >>> mbox cmd response: failed
12,337,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,338,131 >>> mbox cmd response: failed
12,338,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,338,686 >>> mbox cmd response: failed
Initializing fuses
2,053,027 writing to cptra_bootfsm_go
2,242,334 UART:
2,242,689 UART: Running Caliptra ROM ...
2,243,831 UART:
8,129,862 UART: [state] CFI Enabled
8,142,913 UART: [state] LifecycleState = Unprovisioned
8,145,318 UART: [state] DebugLocked = No
8,147,516 UART: [state] WD Timer not started. Device not locked for debugging
8,152,919 UART: [kat] SHA2-256
8,342,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,353,598 UART: [kat] ++
8,354,199 UART: [kat] sha1
8,365,689 UART: [kat] SHA2-256
8,368,697 UART: [kat] SHA2-384
8,373,774 UART: [kat] SHA2-512-ACC
8,376,401 UART: [kat] ECC-384
10,820,126 UART: [kat] HMAC-384Kdf
10,833,380 UART: [kat] LMS
11,365,157 UART: [kat] --
11,367,853 UART: [cold-reset] ++
11,370,217 UART: [fht] FHT @ 0x50003400
11,381,515 UART: [idev] ++
11,382,193 UART: [idev] CDI.KEYID = 6
11,383,132 UART: [idev] SUBJECT.KEYID = 7
11,384,359 UART: [idev] UDS.KEYID = 0
11,386,880 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,530,283 UART: [idev] Erasing UDS.KEYID = 0
13,858,654 UART: [idev] Sha1 KeyId Algorithm
13,881,821 UART: [idev] --
13,886,437 UART: [ldev] ++
13,887,178 UART: [ldev] CDI.KEYID = 6
13,888,078 UART: [ldev] SUBJECT.KEYID = 5
13,889,143 UART: [ldev] AUTHORITY.KEYID = 7
13,890,439 UART: [ldev] FE.KEYID = 1
13,902,624 UART: [ldev] Erasing FE.KEYID = 1
16,381,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,100,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,115,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,131,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,146,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,167,358 UART: [ldev] --
18,172,407 UART: [fwproc] Wait for Commands...
18,174,563 UART: [fwproc] Recv command 0x46574c44
18,176,875 UART: [fwproc] Recv'd Img size: 114084 bytes
21,621,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,703,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,820,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,361,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
3,753,084 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,081,492 >>> mbox cmd response: failed
12,082,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,082,435 >>> mbox cmd response: failed
12,082,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,083,006 >>> mbox cmd response: failed
Initializing fuses
2,053,423 writing to cptra_bootfsm_go
11,544,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,734,322 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,186 UART: [kat] HMAC-384Kdf
906,724 UART: [kat] LMS
1,474,920 UART: [kat] --
1,475,945 UART: [cold-reset] ++
1,476,287 UART: [fht] Storing FHT @ 0x50003400
1,479,044 UART: [idev] ++
1,479,212 UART: [idev] CDI.KEYID = 6
1,479,572 UART: [idev] SUBJECT.KEYID = 7
1,479,996 UART: [idev] UDS.KEYID = 0
1,480,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,956 UART: [idev] Erasing UDS.KEYID = 0
1,504,826 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,234 UART: [idev] --
1,514,129 UART: [ldev] ++
1,514,297 UART: [ldev] CDI.KEYID = 6
1,514,660 UART: [ldev] SUBJECT.KEYID = 5
1,515,086 UART: [ldev] AUTHORITY.KEYID = 7
1,515,549 UART: [ldev] FE.KEYID = 1
1,520,861 UART: [ldev] Erasing FE.KEYID = 1
1,545,710 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,402 UART: [ldev] --
1,584,845 UART: [fwproc] Waiting for Commands...
1,585,578 UART: [fwproc] Received command 0x46574c44
1,586,369 UART: [fwproc] Received Image of size 114084 bytes
2,724,104 UART: ROM Fatal Error: 0x000B0030
2,725,261 >>> mbox cmd response: failed
2,725,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,725,267 >>> mbox cmd response: failed
2,725,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,725,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,524 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,833 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,016 UART: [idev] Erasing UDS.KEYID = 0
1,505,332 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,940 UART: [idev] --
1,515,169 UART: [ldev] ++
1,515,337 UART: [ldev] CDI.KEYID = 6
1,515,700 UART: [ldev] SUBJECT.KEYID = 5
1,516,126 UART: [ldev] AUTHORITY.KEYID = 7
1,516,589 UART: [ldev] FE.KEYID = 1
1,521,767 UART: [ldev] Erasing FE.KEYID = 1
1,547,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,388 UART: [ldev] --
1,586,695 UART: [fwproc] Waiting for Commands...
1,587,416 UART: [fwproc] Received command 0x46574c44
1,588,207 UART: [fwproc] Received Image of size 114084 bytes
2,882,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,902 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,393 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,097 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,614,573 >>> mbox cmd response: failed
2,614,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,614,579 >>> mbox cmd response: failed
2,614,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,614,585 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,287 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,143 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,550 UART: [kat] SHA2-256
882,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,596 UART: [kat] ++
886,748 UART: [kat] sha1
891,016 UART: [kat] SHA2-256
892,954 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,401 UART: [kat] HMAC-384Kdf
907,877 UART: [kat] LMS
1,476,073 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,278 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,073 UART: [idev] Erasing UDS.KEYID = 0
1,505,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,018 UART: [ldev] ++
1,515,186 UART: [ldev] CDI.KEYID = 6
1,515,549 UART: [ldev] SUBJECT.KEYID = 5
1,515,975 UART: [ldev] AUTHORITY.KEYID = 7
1,516,438 UART: [ldev] FE.KEYID = 1
1,521,736 UART: [ldev] Erasing FE.KEYID = 1
1,546,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,167 UART: [ldev] --
1,586,666 UART: [fwproc] Waiting for Commands...
1,587,343 UART: [fwproc] Received command 0x46574c44
1,588,134 UART: [fwproc] Received Image of size 114084 bytes
2,725,077 UART: ROM Fatal Error: 0x000B0030
2,726,234 >>> mbox cmd response: failed
2,726,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,240 >>> mbox cmd response: failed
2,726,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,726,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,128 UART: [kat] SHA2-256
882,059 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,174 UART: [kat] ++
886,326 UART: [kat] sha1
890,434 UART: [kat] SHA2-256
892,372 UART: [kat] SHA2-384
895,115 UART: [kat] SHA2-512-ACC
897,016 UART: [kat] ECC-384
902,775 UART: [kat] HMAC-384Kdf
907,465 UART: [kat] LMS
1,475,661 UART: [kat] --
1,476,832 UART: [cold-reset] ++
1,477,250 UART: [fht] Storing FHT @ 0x50003400
1,480,199 UART: [idev] ++
1,480,367 UART: [idev] CDI.KEYID = 6
1,480,727 UART: [idev] SUBJECT.KEYID = 7
1,481,151 UART: [idev] UDS.KEYID = 0
1,481,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,217 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,945 UART: [idev] --
1,515,076 UART: [ldev] ++
1,515,244 UART: [ldev] CDI.KEYID = 6
1,515,607 UART: [ldev] SUBJECT.KEYID = 5
1,516,033 UART: [ldev] AUTHORITY.KEYID = 7
1,516,496 UART: [ldev] FE.KEYID = 1
1,521,684 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,933 UART: [ldev] --
1,586,330 UART: [fwproc] Waiting for Commands...
1,587,139 UART: [fwproc] Received command 0x46574c44
1,587,930 UART: [fwproc] Received Image of size 114084 bytes
2,881,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,499 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,330 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,731,861 >>> mbox cmd response: failed
2,731,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,731,867 >>> mbox cmd response: failed
2,731,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,731,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,690 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
893,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,317 UART: [kat] ++
897,469 UART: [kat] sha1
901,707 UART: [kat] SHA2-256
903,647 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
918,136 UART: [kat] HMAC-384Kdf
922,626 UART: [kat] LMS
1,170,954 UART: [kat] --
1,171,799 UART: [cold-reset] ++
1,172,183 UART: [fht] FHT @ 0x50003400
1,174,768 UART: [idev] ++
1,174,936 UART: [idev] CDI.KEYID = 6
1,175,296 UART: [idev] SUBJECT.KEYID = 7
1,175,720 UART: [idev] UDS.KEYID = 0
1,176,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,958 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,306 UART: [ldev] SUBJECT.KEYID = 5
1,210,732 UART: [ldev] AUTHORITY.KEYID = 7
1,211,195 UART: [ldev] FE.KEYID = 1
1,216,579 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,524 UART: [fwproc] Wait for Commands...
1,282,156 UART: [fwproc] Recv command 0x46574c44
1,282,884 UART: [fwproc] Recv'd Img size: 114084 bytes
1,598,719 UART: ROM Fatal Error: 0x000B0030
1,599,876 >>> mbox cmd response: failed
1,599,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,882 >>> mbox cmd response: failed
1,599,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
893,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,209 UART: [kat] ++
897,361 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,266 UART: [kat] SHA2-512-ACC
908,167 UART: [kat] ECC-384
917,292 UART: [kat] HMAC-384Kdf
921,922 UART: [kat] LMS
1,170,250 UART: [kat] --
1,171,067 UART: [cold-reset] ++
1,171,549 UART: [fht] FHT @ 0x50003400
1,174,130 UART: [idev] ++
1,174,298 UART: [idev] CDI.KEYID = 6
1,174,658 UART: [idev] SUBJECT.KEYID = 7
1,175,082 UART: [idev] UDS.KEYID = 0
1,175,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,028 UART: [idev] Erasing UDS.KEYID = 0
1,200,169 UART: [idev] Sha1 KeyId Algorithm
1,208,701 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,368 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,606 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,934 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,449,831 >>> mbox cmd response: failed
1,449,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,837 >>> mbox cmd response: failed
1,449,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,843 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,061 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
893,421 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,546 UART: [kat] ++
897,698 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,741 UART: [kat] SHA2-512-ACC
908,642 UART: [kat] ECC-384
918,107 UART: [kat] HMAC-384Kdf
922,659 UART: [kat] LMS
1,170,987 UART: [kat] --
1,171,672 UART: [cold-reset] ++
1,172,208 UART: [fht] FHT @ 0x50003400
1,174,901 UART: [idev] ++
1,175,069 UART: [idev] CDI.KEYID = 6
1,175,429 UART: [idev] SUBJECT.KEYID = 7
1,175,853 UART: [idev] UDS.KEYID = 0
1,176,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,865 UART: [idev] Erasing UDS.KEYID = 0
1,201,388 UART: [idev] Sha1 KeyId Algorithm
1,209,898 UART: [idev] --
1,211,074 UART: [ldev] ++
1,211,242 UART: [ldev] CDI.KEYID = 6
1,211,605 UART: [ldev] SUBJECT.KEYID = 5
1,212,031 UART: [ldev] AUTHORITY.KEYID = 7
1,212,494 UART: [ldev] FE.KEYID = 1
1,217,370 UART: [ldev] Erasing FE.KEYID = 1
1,243,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,402 UART: [ldev] --
1,282,747 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 114084 bytes
1,599,412 UART: ROM Fatal Error: 0x000B0030
1,600,569 >>> mbox cmd response: failed
1,600,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,575 >>> mbox cmd response: failed
1,600,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
893,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,092 UART: [kat] ++
898,244 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,269 UART: [kat] SHA2-512-ACC
909,170 UART: [kat] ECC-384
919,029 UART: [kat] HMAC-384Kdf
923,749 UART: [kat] LMS
1,172,077 UART: [kat] --
1,172,812 UART: [cold-reset] ++
1,173,282 UART: [fht] FHT @ 0x50003400
1,175,935 UART: [idev] ++
1,176,103 UART: [idev] CDI.KEYID = 6
1,176,463 UART: [idev] SUBJECT.KEYID = 7
1,176,887 UART: [idev] UDS.KEYID = 0
1,177,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,977 UART: [idev] Erasing UDS.KEYID = 0
1,202,278 UART: [idev] Sha1 KeyId Algorithm
1,210,758 UART: [idev] --
1,211,866 UART: [ldev] ++
1,212,034 UART: [ldev] CDI.KEYID = 6
1,212,397 UART: [ldev] SUBJECT.KEYID = 5
1,212,823 UART: [ldev] AUTHORITY.KEYID = 7
1,213,286 UART: [ldev] FE.KEYID = 1
1,218,708 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,024 UART: [ldev] --
1,284,521 UART: [fwproc] Wait for Commands...
1,285,119 UART: [fwproc] Recv command 0x46574c44
1,285,847 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,125 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,448,283 >>> mbox cmd response: failed
1,448,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,289 >>> mbox cmd response: failed
1,448,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,298 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,539 UART: [cold-reset] ++
1,170,969 UART: [fht] FHT @ 0x50003400
1,173,693 UART: [idev] ++
1,173,861 UART: [idev] CDI.KEYID = 6
1,174,222 UART: [idev] SUBJECT.KEYID = 7
1,174,647 UART: [idev] UDS.KEYID = 0
1,174,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,705 UART: [idev] Erasing UDS.KEYID = 0
1,199,917 UART: [idev] Sha1 KeyId Algorithm
1,208,903 UART: [idev] --
1,209,806 UART: [ldev] ++
1,209,974 UART: [ldev] CDI.KEYID = 6
1,210,338 UART: [ldev] SUBJECT.KEYID = 5
1,210,765 UART: [ldev] AUTHORITY.KEYID = 7
1,211,228 UART: [ldev] FE.KEYID = 1
1,216,266 UART: [ldev] Erasing FE.KEYID = 1
1,242,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,680 UART: [ldev] --
1,282,168 UART: [fwproc] Wait for Commands...
1,282,819 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 114084 bytes
1,601,260 UART: ROM Fatal Error: 0x000B0030
1,602,417 >>> mbox cmd response: failed
1,602,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,602,423 >>> mbox cmd response: failed
1,602,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,602,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,173,059 UART: [idev] ++
1,173,227 UART: [idev] CDI.KEYID = 6
1,173,588 UART: [idev] SUBJECT.KEYID = 7
1,174,013 UART: [idev] UDS.KEYID = 0
1,174,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,833 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,538 UART: [fwproc] Wait for Commands...
1,281,211 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,458 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,449,977 >>> mbox cmd response: failed
1,449,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,983 >>> mbox cmd response: failed
1,449,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,828 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,875 UART: [kat] SHA2-512-ACC
906,776 UART: [kat] ECC-384
917,047 UART: [kat] HMAC-384Kdf
921,673 UART: [kat] LMS
1,169,985 UART: [kat] --
1,170,890 UART: [cold-reset] ++
1,171,332 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,220 UART: [idev] Sha1 KeyId Algorithm
1,209,166 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,625 UART: [ldev] SUBJECT.KEYID = 5
1,211,052 UART: [ldev] AUTHORITY.KEYID = 7
1,211,515 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,814 UART: [fwproc] Recv command 0x46574c44
1,283,547 UART: [fwproc] Recv'd Img size: 114084 bytes
1,596,765 UART: ROM Fatal Error: 0x000B0030
1,597,922 >>> mbox cmd response: failed
1,597,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,928 >>> mbox cmd response: failed
1,597,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,284 UART: [kat] ++
895,436 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,119 UART: [kat] LMS
1,169,431 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,174,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,199,712 UART: [idev] Sha1 KeyId Algorithm
1,208,532 UART: [idev] --
1,209,635 UART: [ldev] ++
1,209,803 UART: [ldev] CDI.KEYID = 6
1,210,167 UART: [ldev] SUBJECT.KEYID = 5
1,210,594 UART: [ldev] AUTHORITY.KEYID = 7
1,211,057 UART: [ldev] FE.KEYID = 1
1,216,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,903 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,399 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,903 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,450,373 >>> mbox cmd response: failed
1,450,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,379 >>> mbox cmd response: failed
1,450,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,181 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,601 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,140 UART:
192,509 UART: Running Caliptra ROM ...
193,686 UART:
193,839 UART: [state] CFI Enabled
264,041 UART: [state] LifecycleState = Unprovisioned
265,991 UART: [state] DebugLocked = No
267,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,215 UART: [kat] SHA2-256
442,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,413 UART: [kat] ++
453,889 UART: [kat] sha1
463,955 UART: [kat] SHA2-256
466,645 UART: [kat] SHA2-384
472,622 UART: [kat] SHA2-512-ACC
474,956 UART: [kat] ECC-384
2,766,840 UART: [kat] HMAC-384Kdf
2,779,868 UART: [kat] LMS
3,970,138 UART: [kat] --
3,975,875 UART: [cold-reset] ++
3,977,159 UART: [fht] Storing FHT @ 0x50003400
3,989,402 UART: [idev] ++
3,989,973 UART: [idev] CDI.KEYID = 6
3,990,907 UART: [idev] SUBJECT.KEYID = 7
3,992,175 UART: [idev] UDS.KEYID = 0
3,994,824 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,138,324 UART: [idev] Erasing UDS.KEYID = 0
7,325,788 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,323 UART: [idev] --
7,350,434 UART: [ldev] ++
7,351,056 UART: [ldev] CDI.KEYID = 6
7,351,944 UART: [ldev] SUBJECT.KEYID = 5
7,353,212 UART: [ldev] AUTHORITY.KEYID = 7
7,354,524 UART: [ldev] FE.KEYID = 1
7,401,333 UART: [ldev] Erasing FE.KEYID = 1
10,733,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,071 UART: [ldev] --
13,097,559 UART: [fwproc] Waiting for Commands...
13,100,525 UART: [fwproc] Received command 0x46574c44
13,102,712 UART: [fwproc] Received Image of size 113760 bytes
13,178,865 UART: ROM Fatal Error: 0x000B0032
13,182,386 >>> mbox cmd response: failed
13,182,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,183,071 >>> mbox cmd response: failed
13,183,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,183,695 >>> mbox cmd response: failed
Initializing fuses
2,055,827 writing to cptra_bootfsm_go
2,245,114 UART:
2,245,468 UART: Running Caliptra ROM ...
2,246,511 UART:
2,246,664 UART: [state] CFI Enabled
2,310,974 UART: [state] LifecycleState = Unprovisioned
2,312,930 UART: [state] DebugLocked = No
2,315,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,765 UART: [kat] SHA2-256
2,490,466 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,001 UART: [kat] ++
2,501,484 UART: [kat] sha1
2,512,969 UART: [kat] SHA2-256
2,515,659 UART: [kat] SHA2-384
2,521,331 UART: [kat] SHA2-512-ACC
2,523,684 UART: [kat] ECC-384
4,818,085 UART: [kat] HMAC-384Kdf
4,847,984 UART: [kat] LMS
6,038,285 UART: [kat] --
6,043,093 UART: [cold-reset] ++
6,044,496 UART: [fht] Storing FHT @ 0x50003400
6,055,187 UART: [idev] ++
6,055,754 UART: [idev] CDI.KEYID = 6
6,056,695 UART: [idev] SUBJECT.KEYID = 7
6,057,966 UART: [idev] UDS.KEYID = 0
6,060,486 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,203,575 UART: [idev] Erasing UDS.KEYID = 0
9,394,889 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,592 UART: [idev] --
9,421,703 UART: [ldev] ++
9,422,276 UART: [ldev] CDI.KEYID = 6
9,423,243 UART: [ldev] SUBJECT.KEYID = 5
9,424,500 UART: [ldev] AUTHORITY.KEYID = 7
9,425,742 UART: [ldev] FE.KEYID = 1
9,471,378 UART: [ldev] Erasing FE.KEYID = 1
12,803,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,144 UART: [ldev] --
15,164,338 UART: [fwproc] Waiting for Commands...
15,165,950 UART: [fwproc] Received command 0x46574c44
15,168,160 UART: [fwproc] Received Image of size 113760 bytes
19,213,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,286,000 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,354,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,670,961 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,788,153 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,934,718 >>> mbox cmd response: failed
12,935,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,828 >>> mbox cmd response: failed
12,936,100 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,397 >>> mbox cmd response: failed
Initializing fuses
2,046,018 writing to cptra_bootfsm_go
5,824,020 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,871,411 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,556 UART:
192,929 UART: Running Caliptra ROM ...
194,070 UART:
603,705 UART: [state] CFI Enabled
619,484 UART: [state] LifecycleState = Unprovisioned
621,417 UART: [state] DebugLocked = No
623,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,413 UART: [kat] SHA2-256
798,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,717 UART: [kat] ++
809,249 UART: [kat] sha1
819,544 UART: [kat] SHA2-256
822,264 UART: [kat] SHA2-384
827,169 UART: [kat] SHA2-512-ACC
829,504 UART: [kat] ECC-384
3,114,110 UART: [kat] HMAC-384Kdf
3,124,953 UART: [kat] LMS
4,315,060 UART: [kat] --
4,318,000 UART: [cold-reset] ++
4,319,938 UART: [fht] Storing FHT @ 0x50003400
4,331,690 UART: [idev] ++
4,332,275 UART: [idev] CDI.KEYID = 6
4,333,165 UART: [idev] SUBJECT.KEYID = 7
4,334,430 UART: [idev] UDS.KEYID = 0
4,337,549 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,483 UART: [idev] Erasing UDS.KEYID = 0
7,620,242 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,926 UART: [idev] --
7,646,698 UART: [ldev] ++
7,647,268 UART: [ldev] CDI.KEYID = 6
7,648,205 UART: [ldev] SUBJECT.KEYID = 5
7,649,471 UART: [ldev] AUTHORITY.KEYID = 7
7,650,679 UART: [ldev] FE.KEYID = 1
7,662,472 UART: [ldev] Erasing FE.KEYID = 1
10,951,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,581 UART: [ldev] --
13,310,182 UART: [fwproc] Waiting for Commands...
13,313,043 UART: [fwproc] Received command 0x46574c44
13,315,232 UART: [fwproc] Received Image of size 113760 bytes
13,396,020 UART: ROM Fatal Error: 0x000B0032
13,399,536 >>> mbox cmd response: failed
13,399,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,400,270 >>> mbox cmd response: failed
13,400,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,400,830 >>> mbox cmd response: failed
Initializing fuses
2,048,577 writing to cptra_bootfsm_go
2,237,891 UART:
2,238,237 UART: Running Caliptra ROM ...
2,239,374 UART:
7,067,751 UART: [state] CFI Enabled
7,082,620 UART: [state] LifecycleState = Unprovisioned
7,084,533 UART: [state] DebugLocked = No
7,086,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,091,911 UART: [kat] SHA2-256
7,261,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,154 UART: [kat] ++
7,272,647 UART: [kat] sha1
7,284,887 UART: [kat] SHA2-256
7,287,582 UART: [kat] SHA2-384
7,292,596 UART: [kat] SHA2-512-ACC
7,294,950 UART: [kat] ECC-384
9,578,131 UART: [kat] HMAC-384Kdf
9,588,654 UART: [kat] LMS
10,778,714 UART: [kat] --
10,784,436 UART: [cold-reset] ++
10,786,420 UART: [fht] Storing FHT @ 0x50003400
10,797,574 UART: [idev] ++
10,798,140 UART: [idev] CDI.KEYID = 6
10,799,045 UART: [idev] SUBJECT.KEYID = 7
10,800,315 UART: [idev] UDS.KEYID = 0
10,803,175 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,946,195 UART: [idev] Erasing UDS.KEYID = 0
14,088,174 UART: [idev] Using Sha1 for KeyId Algorithm
14,110,858 UART: [idev] --
14,115,014 UART: [ldev] ++
14,115,585 UART: [ldev] CDI.KEYID = 6
14,116,547 UART: [ldev] SUBJECT.KEYID = 5
14,117,840 UART: [ldev] AUTHORITY.KEYID = 7
14,119,022 UART: [ldev] FE.KEYID = 1
14,130,109 UART: [ldev] Erasing FE.KEYID = 1
17,420,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,727,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,742,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,686 UART: [ldev] --
19,782,054 UART: [fwproc] Waiting for Commands...
19,784,152 UART: [fwproc] Received command 0x46574c44
19,786,337 UART: [fwproc] Received Image of size 113760 bytes
23,833,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,911,357 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,980,274 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,295,789 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,126,414 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,130,356 >>> mbox cmd response: failed
13,131,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,347 >>> mbox cmd response: failed
13,131,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,911 >>> mbox cmd response: failed
Initializing fuses
2,045,023 writing to cptra_bootfsm_go
10,860,376 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,782,361 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,135 UART:
192,516 UART: Running Caliptra ROM ...
193,707 UART:
193,860 UART: [state] CFI Enabled
261,936 UART: [state] LifecycleState = Unprovisioned
263,744 UART: [state] DebugLocked = No
265,884 UART: [state] WD Timer not started. Device not locked for debugging
269,071 UART: [kat] SHA2-256
448,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,748 UART: [kat] ++
460,298 UART: [kat] sha1
471,455 UART: [kat] SHA2-256
474,522 UART: [kat] SHA2-384
480,390 UART: [kat] SHA2-512-ACC
483,372 UART: [kat] ECC-384
2,944,518 UART: [kat] HMAC-384Kdf
2,969,607 UART: [kat] LMS
3,499,063 UART: [kat] --
3,503,333 UART: [cold-reset] ++
3,505,105 UART: [fht] FHT @ 0x50003400
3,516,514 UART: [idev] ++
3,517,078 UART: [idev] CDI.KEYID = 6
3,518,061 UART: [idev] SUBJECT.KEYID = 7
3,519,224 UART: [idev] UDS.KEYID = 0
3,522,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,665,946 UART: [idev] Erasing UDS.KEYID = 0
6,026,056 UART: [idev] Sha1 KeyId Algorithm
6,049,188 UART: [idev] --
6,054,054 UART: [ldev] ++
6,054,628 UART: [ldev] CDI.KEYID = 6
6,055,540 UART: [ldev] SUBJECT.KEYID = 5
6,056,704 UART: [ldev] AUTHORITY.KEYID = 7
6,057,936 UART: [ldev] FE.KEYID = 1
6,096,672 UART: [ldev] Erasing FE.KEYID = 1
8,600,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,752 UART: [ldev] --
10,410,557 UART: [fwproc] Wait for Commands...
10,412,712 UART: [fwproc] Recv command 0x46574c44
10,414,776 UART: [fwproc] Recv'd Img size: 114084 bytes
10,494,214 UART: ROM Fatal Error: 0x000B0032
10,497,300 >>> mbox cmd response: failed
10,497,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,041 >>> mbox cmd response: failed
10,498,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,498,607 >>> mbox cmd response: failed
Initializing fuses
2,049,028 writing to cptra_bootfsm_go
2,238,385 UART:
2,238,757 UART: Running Caliptra ROM ...
2,239,853 UART:
2,240,015 UART: [state] CFI Enabled
2,301,478 UART: [state] LifecycleState = Unprovisioned
2,303,366 UART: [state] DebugLocked = No
2,305,677 UART: [state] WD Timer not started. Device not locked for debugging
2,309,805 UART: [kat] SHA2-256
2,488,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,526 UART: [kat] ++
2,501,065 UART: [kat] sha1
2,512,449 UART: [kat] SHA2-256
2,515,521 UART: [kat] SHA2-384
2,521,452 UART: [kat] SHA2-512-ACC
2,524,396 UART: [kat] ECC-384
4,987,227 UART: [kat] HMAC-384Kdf
5,011,288 UART: [kat] LMS
5,540,778 UART: [kat] --
5,545,906 UART: [cold-reset] ++
5,547,726 UART: [fht] FHT @ 0x50003400
5,558,345 UART: [idev] ++
5,558,916 UART: [idev] CDI.KEYID = 6
5,559,824 UART: [idev] SUBJECT.KEYID = 7
5,561,038 UART: [idev] UDS.KEYID = 0
5,563,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,707,220 UART: [idev] Erasing UDS.KEYID = 0
8,067,160 UART: [idev] Sha1 KeyId Algorithm
8,089,869 UART: [idev] --
8,093,628 UART: [ldev] ++
8,094,235 UART: [ldev] CDI.KEYID = 6
8,095,152 UART: [ldev] SUBJECT.KEYID = 5
8,096,361 UART: [ldev] AUTHORITY.KEYID = 7
8,097,544 UART: [ldev] FE.KEYID = 1
8,141,253 UART: [ldev] Erasing FE.KEYID = 1
10,647,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,448,574 UART: [ldev] --
12,452,379 UART: [fwproc] Wait for Commands...
12,455,508 UART: [fwproc] Recv command 0x46574c44
12,457,605 UART: [fwproc] Recv'd Img size: 114084 bytes
15,860,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,001,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,318,315 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,399,523 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,309,975 >>> mbox cmd response: failed
10,310,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,310,851 >>> mbox cmd response: failed
10,311,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,311,414 >>> mbox cmd response: failed
Initializing fuses
2,046,989 writing to cptra_bootfsm_go
5,431,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,145,068 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,656 UART:
193,013 UART: Running Caliptra ROM ...
194,187 UART:
603,647 UART: [state] CFI Enabled
617,999 UART: [state] LifecycleState = Unprovisioned
619,893 UART: [state] DebugLocked = No
621,442 UART: [state] WD Timer not started. Device not locked for debugging
624,475 UART: [kat] SHA2-256
803,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,139 UART: [kat] ++
815,727 UART: [kat] sha1
826,824 UART: [kat] SHA2-256
829,831 UART: [kat] SHA2-384
834,616 UART: [kat] SHA2-512-ACC
837,568 UART: [kat] ECC-384
3,279,249 UART: [kat] HMAC-384Kdf
3,291,694 UART: [kat] LMS
3,821,177 UART: [kat] --
3,825,819 UART: [cold-reset] ++
3,827,808 UART: [fht] FHT @ 0x50003400
3,840,142 UART: [idev] ++
3,840,702 UART: [idev] CDI.KEYID = 6
3,841,720 UART: [idev] SUBJECT.KEYID = 7
3,842,829 UART: [idev] UDS.KEYID = 0
3,845,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,266 UART: [idev] Erasing UDS.KEYID = 0
6,311,452 UART: [idev] Sha1 KeyId Algorithm
6,334,950 UART: [idev] --
6,339,807 UART: [ldev] ++
6,340,380 UART: [ldev] CDI.KEYID = 6
6,341,308 UART: [ldev] SUBJECT.KEYID = 5
6,342,472 UART: [ldev] AUTHORITY.KEYID = 7
6,343,701 UART: [ldev] FE.KEYID = 1
6,356,344 UART: [ldev] Erasing FE.KEYID = 1
8,829,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,931 UART: [ldev] --
10,622,075 UART: [fwproc] Wait for Commands...
10,623,840 UART: [fwproc] Recv command 0x46574c44
10,625,901 UART: [fwproc] Recv'd Img size: 114084 bytes
10,702,145 UART: ROM Fatal Error: 0x000B0032
10,705,229 >>> mbox cmd response: failed
10,705,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,706,010 >>> mbox cmd response: failed
10,706,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,706,697 >>> mbox cmd response: failed
Initializing fuses
2,054,786 writing to cptra_bootfsm_go
2,244,141 UART:
2,244,497 UART: Running Caliptra ROM ...
2,245,637 UART:
9,747,465 UART: [state] CFI Enabled
9,762,972 UART: [state] LifecycleState = Unprovisioned
9,764,851 UART: [state] DebugLocked = No
9,767,112 UART: [state] WD Timer not started. Device not locked for debugging
9,771,241 UART: [kat] SHA2-256
9,950,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,961,931 UART: [kat] ++
9,962,475 UART: [kat] sha1
9,974,611 UART: [kat] SHA2-256
9,977,625 UART: [kat] SHA2-384
9,983,823 UART: [kat] SHA2-512-ACC
9,986,816 UART: [kat] ECC-384
12,426,511 UART: [kat] HMAC-384Kdf
12,440,350 UART: [kat] LMS
12,969,861 UART: [kat] --
12,974,566 UART: [cold-reset] ++
12,975,852 UART: [fht] FHT @ 0x50003400
12,986,719 UART: [idev] ++
12,987,280 UART: [idev] CDI.KEYID = 6
12,988,190 UART: [idev] SUBJECT.KEYID = 7
12,989,401 UART: [idev] UDS.KEYID = 0
12,992,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,135,533 UART: [idev] Erasing UDS.KEYID = 0
15,463,264 UART: [idev] Sha1 KeyId Algorithm
15,485,784 UART: [idev] --
15,488,805 UART: [ldev] ++
15,489,375 UART: [ldev] CDI.KEYID = 6
15,490,339 UART: [ldev] SUBJECT.KEYID = 5
15,491,499 UART: [ldev] AUTHORITY.KEYID = 7
15,492,732 UART: [ldev] FE.KEYID = 1
15,505,962 UART: [ldev] Erasing FE.KEYID = 1
17,977,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,695,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,763,708 UART: [ldev] --
19,767,599 UART: [fwproc] Wait for Commands...
19,770,346 UART: [fwproc] Recv command 0x46574c44
19,772,390 UART: [fwproc] Recv'd Img size: 114084 bytes
23,171,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,247,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,316,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,634,332 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,695,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,480,966 >>> mbox cmd response: failed
10,481,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,910 >>> mbox cmd response: failed
10,482,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,482,473 >>> mbox cmd response: failed
Initializing fuses
2,049,359 writing to cptra_bootfsm_go
13,085,037 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,653,324 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,133 UART:
192,480 UART: Running Caliptra ROM ...
193,581 UART:
193,720 UART: [state] CFI Enabled
263,004 UART: [state] LifecycleState = Unprovisioned
265,381 UART: [state] DebugLocked = No
267,115 UART: [state] WD Timer not started. Device not locked for debugging
271,939 UART: [kat] SHA2-256
461,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,613 UART: [kat] ++
473,080 UART: [kat] sha1
484,507 UART: [kat] SHA2-256
487,538 UART: [kat] SHA2-384
494,225 UART: [kat] SHA2-512-ACC
496,841 UART: [kat] ECC-384
2,946,670 UART: [kat] HMAC-384Kdf
2,970,299 UART: [kat] LMS
3,502,085 UART: [kat] --
3,505,996 UART: [cold-reset] ++
3,507,622 UART: [fht] FHT @ 0x50003400
3,519,637 UART: [idev] ++
3,520,312 UART: [idev] CDI.KEYID = 6
3,521,330 UART: [idev] SUBJECT.KEYID = 7
3,522,487 UART: [idev] UDS.KEYID = 0
3,525,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,852 UART: [idev] Erasing UDS.KEYID = 0
6,033,001 UART: [idev] Sha1 KeyId Algorithm
6,056,409 UART: [idev] --
6,061,251 UART: [ldev] ++
6,061,947 UART: [ldev] CDI.KEYID = 6
6,062,860 UART: [ldev] SUBJECT.KEYID = 5
6,064,023 UART: [ldev] AUTHORITY.KEYID = 7
6,065,260 UART: [ldev] FE.KEYID = 1
6,102,162 UART: [ldev] Erasing FE.KEYID = 1
8,611,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,809 UART: [ldev] --
10,418,236 UART: [fwproc] Wait for Commands...
10,421,197 UART: [fwproc] Recv command 0x46574c44
10,423,483 UART: [fwproc] Recv'd Img size: 114084 bytes
10,531,558 UART: ROM Fatal Error: 0x000B0032
10,535,211 >>> mbox cmd response: failed
10,535,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,894 >>> mbox cmd response: failed
10,536,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,536,457 >>> mbox cmd response: failed
Initializing fuses
2,048,243 writing to cptra_bootfsm_go
2,237,540 UART:
2,237,889 UART: Running Caliptra ROM ...
2,239,031 UART:
2,239,200 UART: [state] CFI Enabled
2,297,179 UART: [state] LifecycleState = Unprovisioned
2,299,577 UART: [state] DebugLocked = No
2,301,832 UART: [state] WD Timer not started. Device not locked for debugging
2,305,650 UART: [kat] SHA2-256
2,495,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,506,317 UART: [kat] ++
2,506,774 UART: [kat] sha1
2,517,930 UART: [kat] SHA2-256
2,520,956 UART: [kat] SHA2-384
2,528,297 UART: [kat] SHA2-512-ACC
2,530,873 UART: [kat] ECC-384
4,981,434 UART: [kat] HMAC-384Kdf
5,003,547 UART: [kat] LMS
5,535,302 UART: [kat] --
5,540,343 UART: [cold-reset] ++
5,541,254 UART: [fht] FHT @ 0x50003400
5,553,098 UART: [idev] ++
5,553,786 UART: [idev] CDI.KEYID = 6
5,554,809 UART: [idev] SUBJECT.KEYID = 7
5,555,912 UART: [idev] UDS.KEYID = 0
5,558,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,702,015 UART: [idev] Erasing UDS.KEYID = 0
8,073,772 UART: [idev] Sha1 KeyId Algorithm
8,096,215 UART: [idev] --
8,100,282 UART: [ldev] ++
8,100,969 UART: [ldev] CDI.KEYID = 6
8,101,893 UART: [ldev] SUBJECT.KEYID = 5
8,103,059 UART: [ldev] AUTHORITY.KEYID = 7
8,104,297 UART: [ldev] FE.KEYID = 1
8,145,409 UART: [ldev] Erasing FE.KEYID = 1
10,650,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,686 UART: [ldev] --
12,460,549 UART: [fwproc] Wait for Commands...
12,462,000 UART: [fwproc] Recv command 0x46574c44
12,464,322 UART: [fwproc] Recv'd Img size: 114084 bytes
15,909,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,644,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,443,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,324,818 >>> mbox cmd response: failed
10,325,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,932 >>> mbox cmd response: failed
10,326,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,326,495 >>> mbox cmd response: failed
Initializing fuses
2,052,288 writing to cptra_bootfsm_go
5,486,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,767,688 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,411 UART:
192,769 UART: Running Caliptra ROM ...
193,965 UART:
603,595 UART: [state] CFI Enabled
614,938 UART: [state] LifecycleState = Unprovisioned
617,317 UART: [state] DebugLocked = No
618,748 UART: [state] WD Timer not started. Device not locked for debugging
622,822 UART: [kat] SHA2-256
812,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,437 UART: [kat] ++
824,025 UART: [kat] sha1
835,830 UART: [kat] SHA2-256
838,831 UART: [kat] SHA2-384
844,220 UART: [kat] SHA2-512-ACC
846,829 UART: [kat] ECC-384
3,289,104 UART: [kat] HMAC-384Kdf
3,302,035 UART: [kat] LMS
3,833,869 UART: [kat] --
3,836,953 UART: [cold-reset] ++
3,839,533 UART: [fht] FHT @ 0x50003400
3,850,424 UART: [idev] ++
3,851,101 UART: [idev] CDI.KEYID = 6
3,852,081 UART: [idev] SUBJECT.KEYID = 7
3,853,249 UART: [idev] UDS.KEYID = 0
3,856,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,699 UART: [idev] Erasing UDS.KEYID = 0
6,335,741 UART: [idev] Sha1 KeyId Algorithm
6,358,768 UART: [idev] --
6,364,922 UART: [ldev] ++
6,365,604 UART: [ldev] CDI.KEYID = 6
6,366,622 UART: [ldev] SUBJECT.KEYID = 5
6,367,727 UART: [ldev] AUTHORITY.KEYID = 7
6,368,954 UART: [ldev] FE.KEYID = 1
6,381,661 UART: [ldev] Erasing FE.KEYID = 1
8,860,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,312 UART: [ldev] --
10,651,335 UART: [fwproc] Wait for Commands...
10,653,864 UART: [fwproc] Recv command 0x46574c44
10,656,131 UART: [fwproc] Recv'd Img size: 114084 bytes
10,761,047 UART: ROM Fatal Error: 0x000B0032
10,764,734 >>> mbox cmd response: failed
10,765,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,765,504 >>> mbox cmd response: failed
10,765,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,070 >>> mbox cmd response: failed
Initializing fuses
2,050,993 writing to cptra_bootfsm_go
2,240,324 UART:
2,240,678 UART: Running Caliptra ROM ...
2,241,820 UART:
9,692,826 UART: [state] CFI Enabled
9,708,250 UART: [state] LifecycleState = Unprovisioned
9,710,696 UART: [state] DebugLocked = No
9,712,259 UART: [state] WD Timer not started. Device not locked for debugging
9,716,982 UART: [kat] SHA2-256
9,906,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,917,608 UART: [kat] ++
9,918,300 UART: [kat] sha1
9,928,659 UART: [kat] SHA2-256
9,931,671 UART: [kat] SHA2-384
9,938,742 UART: [kat] SHA2-512-ACC
9,941,311 UART: [kat] ECC-384
12,382,737 UART: [kat] HMAC-384Kdf
12,394,757 UART: [kat] LMS
12,926,606 UART: [kat] --
12,930,486 UART: [cold-reset] ++
12,932,414 UART: [fht] FHT @ 0x50003400
12,944,953 UART: [idev] ++
12,945,625 UART: [idev] CDI.KEYID = 6
12,946,564 UART: [idev] SUBJECT.KEYID = 7
12,947,773 UART: [idev] UDS.KEYID = 0
12,950,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,094,023 UART: [idev] Erasing UDS.KEYID = 0
15,428,019 UART: [idev] Sha1 KeyId Algorithm
15,449,899 UART: [idev] --
15,454,429 UART: [ldev] ++
15,455,272 UART: [ldev] CDI.KEYID = 6
15,456,200 UART: [ldev] SUBJECT.KEYID = 5
15,457,321 UART: [ldev] AUTHORITY.KEYID = 7
15,458,451 UART: [ldev] FE.KEYID = 1
15,467,611 UART: [ldev] Erasing FE.KEYID = 1
17,943,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,663,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,679,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,694,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,709,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,729,615 UART: [ldev] --
19,735,754 UART: [fwproc] Wait for Commands...
19,737,802 UART: [fwproc] Recv command 0x46574c44
19,740,119 UART: [fwproc] Recv'd Img size: 114084 bytes
23,183,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,261,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,377,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,918,236 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,759,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,548,172 >>> mbox cmd response: failed
10,548,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,549,129 >>> mbox cmd response: failed
10,549,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,549,690 >>> mbox cmd response: failed
Initializing fuses
2,051,731 writing to cptra_bootfsm_go
13,067,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,267,312 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,345 UART: [kat] SHA2-256
882,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,391 UART: [kat] ++
886,543 UART: [kat] sha1
890,583 UART: [kat] SHA2-256
892,521 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,866 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,307 UART: [cold-reset] ++
1,476,765 UART: [fht] Storing FHT @ 0x50003400
1,479,662 UART: [idev] ++
1,479,830 UART: [idev] CDI.KEYID = 6
1,480,190 UART: [idev] SUBJECT.KEYID = 7
1,480,614 UART: [idev] UDS.KEYID = 0
1,480,959 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,000 UART: [idev] Erasing UDS.KEYID = 0
1,505,194 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,838 UART: [idev] --
1,515,033 UART: [ldev] ++
1,515,201 UART: [ldev] CDI.KEYID = 6
1,515,564 UART: [ldev] SUBJECT.KEYID = 5
1,515,990 UART: [ldev] AUTHORITY.KEYID = 7
1,516,453 UART: [ldev] FE.KEYID = 1
1,521,343 UART: [ldev] Erasing FE.KEYID = 1
1,546,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,866 UART: [ldev] --
1,585,131 UART: [fwproc] Waiting for Commands...
1,585,754 UART: [fwproc] Received command 0x46574c44
1,586,545 UART: [fwproc] Received Image of size 114084 bytes
1,612,117 UART: ROM Fatal Error: 0x000B0032
1,613,274 >>> mbox cmd response: failed
1,613,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,280 >>> mbox cmd response: failed
1,613,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,563 UART: [kat] SHA2-256
892,501 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,408 UART: [kat] LMS
1,475,604 UART: [kat] --
1,476,647 UART: [cold-reset] ++
1,477,121 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,702 UART: [idev] Erasing UDS.KEYID = 0
1,505,064 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,878 UART: [idev] --
1,514,861 UART: [ldev] ++
1,515,029 UART: [ldev] CDI.KEYID = 6
1,515,392 UART: [ldev] SUBJECT.KEYID = 5
1,515,818 UART: [ldev] AUTHORITY.KEYID = 7
1,516,281 UART: [ldev] FE.KEYID = 1
1,521,293 UART: [ldev] Erasing FE.KEYID = 1
1,546,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,382 UART: [ldev] --
1,585,861 UART: [fwproc] Waiting for Commands...
1,586,624 UART: [fwproc] Received command 0x46574c44
1,587,415 UART: [fwproc] Received Image of size 114084 bytes
2,881,538 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,072,901 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,465,717 >>> mbox cmd response: failed
1,465,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,723 >>> mbox cmd response: failed
1,465,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,679 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,350 UART: [kat] SHA2-256
882,281 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,396 UART: [kat] ++
886,548 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
903,181 UART: [kat] HMAC-384Kdf
907,877 UART: [kat] LMS
1,476,073 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,466 UART: [fht] Storing FHT @ 0x50003400
1,480,277 UART: [idev] ++
1,480,445 UART: [idev] CDI.KEYID = 6
1,480,805 UART: [idev] SUBJECT.KEYID = 7
1,481,229 UART: [idev] UDS.KEYID = 0
1,481,574 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,505,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,449 UART: [idev] --
1,515,600 UART: [ldev] ++
1,515,768 UART: [ldev] CDI.KEYID = 6
1,516,131 UART: [ldev] SUBJECT.KEYID = 5
1,516,557 UART: [ldev] AUTHORITY.KEYID = 7
1,517,020 UART: [ldev] FE.KEYID = 1
1,522,348 UART: [ldev] Erasing FE.KEYID = 1
1,548,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,867 UART: [ldev] --
1,587,138 UART: [fwproc] Waiting for Commands...
1,587,963 UART: [fwproc] Received command 0x46574c44
1,588,754 UART: [fwproc] Received Image of size 114084 bytes
1,614,408 UART: ROM Fatal Error: 0x000B0032
1,615,565 >>> mbox cmd response: failed
1,615,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,571 >>> mbox cmd response: failed
1,615,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,797 UART: [state] LifecycleState = Unprovisioned
85,452 UART: [state] DebugLocked = No
85,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,600 UART: [kat] SHA2-256
881,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,646 UART: [kat] ++
885,798 UART: [kat] sha1
890,054 UART: [kat] SHA2-256
891,992 UART: [kat] SHA2-384
894,813 UART: [kat] SHA2-512-ACC
896,714 UART: [kat] ECC-384
902,099 UART: [kat] HMAC-384Kdf
906,827 UART: [kat] LMS
1,475,023 UART: [kat] --
1,475,948 UART: [cold-reset] ++
1,476,294 UART: [fht] Storing FHT @ 0x50003400
1,479,167 UART: [idev] ++
1,479,335 UART: [idev] CDI.KEYID = 6
1,479,695 UART: [idev] SUBJECT.KEYID = 7
1,480,119 UART: [idev] UDS.KEYID = 0
1,480,464 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,919 UART: [idev] Erasing UDS.KEYID = 0
1,504,775 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,293 UART: [idev] --
1,514,468 UART: [ldev] ++
1,514,636 UART: [ldev] CDI.KEYID = 6
1,514,999 UART: [ldev] SUBJECT.KEYID = 5
1,515,425 UART: [ldev] AUTHORITY.KEYID = 7
1,515,888 UART: [ldev] FE.KEYID = 1
1,521,154 UART: [ldev] Erasing FE.KEYID = 1
1,546,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,657 UART: [ldev] --
1,585,924 UART: [fwproc] Waiting for Commands...
1,586,613 UART: [fwproc] Received command 0x46574c44
1,587,404 UART: [fwproc] Received Image of size 114084 bytes
2,882,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,861 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,213 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,722 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,467,398 >>> mbox cmd response: failed
1,467,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,404 >>> mbox cmd response: failed
1,467,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,410 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,036 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
893,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,697 UART: [kat] ++
897,849 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,696 UART: [kat] LMS
1,171,024 UART: [kat] --
1,171,945 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,154 UART: [idev] ++
1,175,322 UART: [idev] CDI.KEYID = 6
1,175,682 UART: [idev] SUBJECT.KEYID = 7
1,176,106 UART: [idev] UDS.KEYID = 0
1,176,451 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,092 UART: [idev] Erasing UDS.KEYID = 0
1,201,281 UART: [idev] Sha1 KeyId Algorithm
1,209,701 UART: [idev] --
1,210,781 UART: [ldev] ++
1,210,949 UART: [ldev] CDI.KEYID = 6
1,211,312 UART: [ldev] SUBJECT.KEYID = 5
1,211,738 UART: [ldev] AUTHORITY.KEYID = 7
1,212,201 UART: [ldev] FE.KEYID = 1
1,217,445 UART: [ldev] Erasing FE.KEYID = 1
1,243,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,841 UART: [ldev] --
1,283,248 UART: [fwproc] Wait for Commands...
1,283,916 UART: [fwproc] Recv command 0x46574c44
1,284,644 UART: [fwproc] Recv'd Img size: 114084 bytes
1,310,622 UART: ROM Fatal Error: 0x000B0032
1,311,779 >>> mbox cmd response: failed
1,311,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,785 >>> mbox cmd response: failed
1,311,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
893,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,375 UART: [kat] ++
897,527 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,236 UART: [kat] LMS
1,170,564 UART: [kat] --
1,171,535 UART: [cold-reset] ++
1,171,881 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,795 UART: [idev] Sha1 KeyId Algorithm
1,209,259 UART: [idev] --
1,210,335 UART: [ldev] ++
1,210,503 UART: [ldev] CDI.KEYID = 6
1,210,866 UART: [ldev] SUBJECT.KEYID = 5
1,211,292 UART: [ldev] AUTHORITY.KEYID = 7
1,211,755 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,244,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,155 UART: [ldev] --
1,283,544 UART: [fwproc] Wait for Commands...
1,284,166 UART: [fwproc] Recv command 0x46574c44
1,284,894 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,609 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,773,034 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,165,962 >>> mbox cmd response: failed
1,165,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,968 >>> mbox cmd response: failed
1,165,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,135 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,623,453 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Unprovisioned
85,616 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
893,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,248 UART: [kat] ++
897,400 UART: [kat] sha1
901,696 UART: [kat] SHA2-256
903,636 UART: [kat] SHA2-384
906,389 UART: [kat] SHA2-512-ACC
908,290 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,175,107 UART: [idev] ++
1,175,275 UART: [idev] CDI.KEYID = 6
1,175,635 UART: [idev] SUBJECT.KEYID = 7
1,176,059 UART: [idev] UDS.KEYID = 0
1,176,404 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,997 UART: [idev] Erasing UDS.KEYID = 0
1,200,942 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,598 UART: [ldev] ++
1,210,766 UART: [ldev] CDI.KEYID = 6
1,211,129 UART: [ldev] SUBJECT.KEYID = 5
1,211,555 UART: [ldev] AUTHORITY.KEYID = 7
1,212,018 UART: [ldev] FE.KEYID = 1
1,217,310 UART: [ldev] Erasing FE.KEYID = 1
1,243,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,564 UART: [ldev] --
1,282,877 UART: [fwproc] Wait for Commands...
1,283,533 UART: [fwproc] Recv command 0x46574c44
1,284,261 UART: [fwproc] Recv'd Img size: 114084 bytes
1,310,215 UART: ROM Fatal Error: 0x000B0032
1,311,372 >>> mbox cmd response: failed
1,311,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,378 >>> mbox cmd response: failed
1,311,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,718 UART: [kat] SHA2-256
903,658 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
922,873 UART: [kat] LMS
1,171,201 UART: [kat] --
1,172,284 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,057 UART: [idev] ++
1,175,225 UART: [idev] CDI.KEYID = 6
1,175,585 UART: [idev] SUBJECT.KEYID = 7
1,176,009 UART: [idev] UDS.KEYID = 0
1,176,354 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,157 UART: [idev] Erasing UDS.KEYID = 0
1,201,144 UART: [idev] Sha1 KeyId Algorithm
1,209,466 UART: [idev] --
1,210,326 UART: [ldev] ++
1,210,494 UART: [ldev] CDI.KEYID = 6
1,210,857 UART: [ldev] SUBJECT.KEYID = 5
1,211,283 UART: [ldev] AUTHORITY.KEYID = 7
1,211,746 UART: [ldev] FE.KEYID = 1
1,216,928 UART: [ldev] Erasing FE.KEYID = 1
1,243,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,836 UART: [ldev] --
1,283,351 UART: [fwproc] Wait for Commands...
1,284,119 UART: [fwproc] Recv command 0x46574c44
1,284,847 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,329 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,167,255 >>> mbox cmd response: failed
1,167,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,261 >>> mbox cmd response: failed
1,167,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,806 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,912 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,173,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,641 UART: [idev] Erasing UDS.KEYID = 0
1,197,669 UART: [idev] Sha1 KeyId Algorithm
1,206,607 UART: [idev] --
1,207,646 UART: [ldev] ++
1,207,814 UART: [ldev] CDI.KEYID = 6
1,208,178 UART: [ldev] SUBJECT.KEYID = 5
1,208,605 UART: [ldev] AUTHORITY.KEYID = 7
1,209,068 UART: [ldev] FE.KEYID = 1
1,214,376 UART: [ldev] Erasing FE.KEYID = 1
1,240,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,028 UART: [ldev] --
1,279,436 UART: [fwproc] Wait for Commands...
1,280,077 UART: [fwproc] Recv command 0x46574c44
1,280,810 UART: [fwproc] Recv'd Img size: 114084 bytes
1,306,796 UART: ROM Fatal Error: 0x000B0032
1,307,953 >>> mbox cmd response: failed
1,307,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,959 >>> mbox cmd response: failed
1,307,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,045 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,174,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,891 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,968 UART: [fwproc] Wait for Commands...
1,281,657 UART: [fwproc] Recv command 0x46574c44
1,282,390 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,360 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,848 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,228 >>> mbox cmd response: failed
1,160,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,234 >>> mbox cmd response: failed
1,160,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,416 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,026 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,228 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,185 UART: [ldev] --
1,281,571 UART: [fwproc] Wait for Commands...
1,282,350 UART: [fwproc] Recv command 0x46574c44
1,283,083 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,429 UART: ROM Fatal Error: 0x000B0032
1,309,586 >>> mbox cmd response: failed
1,309,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,592 >>> mbox cmd response: failed
1,309,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,953 UART: [state] LifecycleState = Unprovisioned
85,608 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,259 UART: [kat] SHA2-512-ACC
906,160 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,174,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,208,949 UART: [ldev] ++
1,209,117 UART: [ldev] CDI.KEYID = 6
1,209,481 UART: [ldev] SUBJECT.KEYID = 5
1,209,908 UART: [ldev] AUTHORITY.KEYID = 7
1,210,371 UART: [ldev] FE.KEYID = 1
1,215,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,820 UART: [fwproc] Recv command 0x46574c44
1,283,553 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,937 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,389 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,163,463 >>> mbox cmd response: failed
1,163,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,469 >>> mbox cmd response: failed
1,163,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,063 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,029 UART:
192,394 UART: Running Caliptra ROM ...
193,517 UART:
193,663 UART: [state] CFI Enabled
262,350 UART: [state] LifecycleState = Unprovisioned
264,309 UART: [state] DebugLocked = No
266,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,558 UART: [kat] SHA2-256
442,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,761 UART: [kat] ++
453,351 UART: [kat] sha1
463,753 UART: [kat] SHA2-256
466,433 UART: [kat] SHA2-384
471,884 UART: [kat] SHA2-512-ACC
474,232 UART: [kat] ECC-384
2,765,480 UART: [kat] HMAC-384Kdf
2,798,996 UART: [kat] LMS
3,989,273 UART: [kat] --
3,993,673 UART: [cold-reset] ++
3,995,714 UART: [fht] Storing FHT @ 0x50003400
4,008,926 UART: [idev] ++
4,009,530 UART: [idev] CDI.KEYID = 6
4,010,473 UART: [idev] SUBJECT.KEYID = 7
4,011,692 UART: [idev] UDS.KEYID = 0
4,014,453 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,157,587 UART: [idev] Erasing UDS.KEYID = 0
7,344,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,945 UART: [idev] --
7,371,891 UART: [ldev] ++
7,372,498 UART: [ldev] CDI.KEYID = 6
7,373,417 UART: [ldev] SUBJECT.KEYID = 5
7,374,635 UART: [ldev] AUTHORITY.KEYID = 7
7,375,928 UART: [ldev] FE.KEYID = 1
7,421,301 UART: [ldev] Erasing FE.KEYID = 1
10,755,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,721 UART: [ldev] --
13,114,801 UART: [fwproc] Waiting for Commands...
13,117,711 UART: [fwproc] Received command 0x46574c44
13,119,952 UART: [fwproc] Received Image of size 113760 bytes
13,199,512 UART: ROM Fatal Error: 0x00B0003A
13,202,978 >>> mbox cmd response: failed
13,203,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,738 >>> mbox cmd response: failed
13,204,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,204,306 >>> mbox cmd response: failed
Initializing fuses
2,055,906 writing to cptra_bootfsm_go
2,245,220 UART:
2,245,587 UART: Running Caliptra ROM ...
2,246,729 UART:
2,246,897 UART: [state] CFI Enabled
2,310,586 UART: [state] LifecycleState = Unprovisioned
2,312,480 UART: [state] DebugLocked = No
2,315,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,527 UART: [kat] SHA2-256
2,490,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,769 UART: [kat] ++
2,501,229 UART: [kat] sha1
2,512,982 UART: [kat] SHA2-256
2,515,685 UART: [kat] SHA2-384
2,521,026 UART: [kat] SHA2-512-ACC
2,523,381 UART: [kat] ECC-384
4,817,874 UART: [kat] HMAC-384Kdf
4,845,733 UART: [kat] LMS
6,036,041 UART: [kat] --
6,041,531 UART: [cold-reset] ++
6,042,938 UART: [fht] Storing FHT @ 0x50003400
6,054,922 UART: [idev] ++
6,055,546 UART: [idev] CDI.KEYID = 6
6,056,463 UART: [idev] SUBJECT.KEYID = 7
6,057,710 UART: [idev] UDS.KEYID = 0
6,060,514 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,203,732 UART: [idev] Erasing UDS.KEYID = 0
9,394,693 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,272 UART: [idev] --
9,419,324 UART: [ldev] ++
9,419,897 UART: [ldev] CDI.KEYID = 6
9,420,867 UART: [ldev] SUBJECT.KEYID = 5
9,422,088 UART: [ldev] AUTHORITY.KEYID = 7
9,423,339 UART: [ldev] FE.KEYID = 1
9,468,522 UART: [ldev] Erasing FE.KEYID = 1
12,802,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,131,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,146,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,482 UART: [ldev] --
15,183,783 UART: [fwproc] Waiting for Commands...
15,187,071 UART: [fwproc] Received command 0x46574c44
15,189,259 UART: [fwproc] Received Image of size 113760 bytes
19,233,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,315,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,384,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,700,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,784,941 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,944,468 >>> mbox cmd response: failed
12,945,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,945,363 >>> mbox cmd response: failed
12,945,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,945,928 >>> mbox cmd response: failed
Initializing fuses
2,052,967 writing to cptra_bootfsm_go
5,833,893 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,892,272 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,680 UART:
193,028 UART: Running Caliptra ROM ...
194,128 UART:
603,737 UART: [state] CFI Enabled
618,274 UART: [state] LifecycleState = Unprovisioned
620,237 UART: [state] DebugLocked = No
622,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,754 UART: [kat] SHA2-256
796,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,017 UART: [kat] ++
807,561 UART: [kat] sha1
818,768 UART: [kat] SHA2-256
821,509 UART: [kat] SHA2-384
827,216 UART: [kat] SHA2-512-ACC
829,573 UART: [kat] ECC-384
3,114,293 UART: [kat] HMAC-384Kdf
3,127,066 UART: [kat] LMS
4,317,202 UART: [kat] --
4,323,410 UART: [cold-reset] ++
4,325,125 UART: [fht] Storing FHT @ 0x50003400
4,336,337 UART: [idev] ++
4,336,964 UART: [idev] CDI.KEYID = 6
4,338,039 UART: [idev] SUBJECT.KEYID = 7
4,339,150 UART: [idev] UDS.KEYID = 0
4,342,117 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,262 UART: [idev] Erasing UDS.KEYID = 0
7,628,160 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,729 UART: [idev] --
7,654,706 UART: [ldev] ++
7,655,286 UART: [ldev] CDI.KEYID = 6
7,656,275 UART: [ldev] SUBJECT.KEYID = 5
7,657,493 UART: [ldev] AUTHORITY.KEYID = 7
7,658,730 UART: [ldev] FE.KEYID = 1
7,669,809 UART: [ldev] Erasing FE.KEYID = 1
10,955,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,718 UART: [ldev] --
13,315,634 UART: [fwproc] Waiting for Commands...
13,317,732 UART: [fwproc] Received command 0x46574c44
13,319,918 UART: [fwproc] Received Image of size 113760 bytes
13,399,793 UART: ROM Fatal Error: 0x00B0003A
13,403,211 >>> mbox cmd response: failed
13,403,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,403,968 >>> mbox cmd response: failed
13,404,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,404,527 >>> mbox cmd response: failed
Initializing fuses
2,058,954 writing to cptra_bootfsm_go
2,248,227 UART:
2,248,575 UART: Running Caliptra ROM ...
2,249,717 UART:
7,067,636 UART: [state] CFI Enabled
7,078,479 UART: [state] LifecycleState = Unprovisioned
7,080,453 UART: [state] DebugLocked = No
7,083,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,087,665 UART: [kat] SHA2-256
7,257,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,267,959 UART: [kat] ++
7,268,420 UART: [kat] sha1
7,280,221 UART: [kat] SHA2-256
7,282,912 UART: [kat] SHA2-384
7,288,499 UART: [kat] SHA2-512-ACC
7,290,837 UART: [kat] ECC-384
9,574,699 UART: [kat] HMAC-384Kdf
9,586,336 UART: [kat] LMS
10,776,460 UART: [kat] --
10,781,875 UART: [cold-reset] ++
10,783,050 UART: [fht] Storing FHT @ 0x50003400
10,794,912 UART: [idev] ++
10,795,482 UART: [idev] CDI.KEYID = 6
10,796,387 UART: [idev] SUBJECT.KEYID = 7
10,797,652 UART: [idev] UDS.KEYID = 0
10,800,318 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,943,308 UART: [idev] Erasing UDS.KEYID = 0
14,086,380 UART: [idev] Using Sha1 for KeyId Algorithm
14,107,543 UART: [idev] --
14,111,165 UART: [ldev] ++
14,111,734 UART: [ldev] CDI.KEYID = 6
14,112,670 UART: [ldev] SUBJECT.KEYID = 5
14,113,922 UART: [ldev] AUTHORITY.KEYID = 7
14,115,082 UART: [ldev] FE.KEYID = 1
14,127,916 UART: [ldev] Erasing FE.KEYID = 1
17,416,574 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,707,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,722,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,736,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,751,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,041 UART: [ldev] --
19,774,721 UART: [fwproc] Waiting for Commands...
19,776,669 UART: [fwproc] Received command 0x46574c44
19,778,857 UART: [fwproc] Received Image of size 113760 bytes
23,825,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,901,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,970,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,286,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
4,123,775 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,129,397 >>> mbox cmd response: failed
13,130,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,130,547 >>> mbox cmd response: failed
13,130,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,118 >>> mbox cmd response: failed
Initializing fuses
2,049,313 writing to cptra_bootfsm_go
10,862,739 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,800,176 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,171 UART:
192,541 UART: Running Caliptra ROM ...
193,722 UART:
193,872 UART: [state] CFI Enabled
263,751 UART: [state] LifecycleState = Unprovisioned
265,598 UART: [state] DebugLocked = No
268,110 UART: [state] WD Timer not started. Device not locked for debugging
272,101 UART: [kat] SHA2-256
451,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,826 UART: [kat] ++
463,373 UART: [kat] sha1
474,585 UART: [kat] SHA2-256
477,647 UART: [kat] SHA2-384
483,857 UART: [kat] SHA2-512-ACC
486,799 UART: [kat] ECC-384
2,948,890 UART: [kat] HMAC-384Kdf
2,969,943 UART: [kat] LMS
3,499,373 UART: [kat] --
3,503,484 UART: [cold-reset] ++
3,504,825 UART: [fht] FHT @ 0x50003400
3,516,568 UART: [idev] ++
3,517,133 UART: [idev] CDI.KEYID = 6
3,518,056 UART: [idev] SUBJECT.KEYID = 7
3,519,223 UART: [idev] UDS.KEYID = 0
3,522,144 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,306 UART: [idev] Erasing UDS.KEYID = 0
6,027,305 UART: [idev] Sha1 KeyId Algorithm
6,051,772 UART: [idev] --
6,055,965 UART: [ldev] ++
6,056,567 UART: [ldev] CDI.KEYID = 6
6,057,485 UART: [ldev] SUBJECT.KEYID = 5
6,058,535 UART: [ldev] AUTHORITY.KEYID = 7
6,059,876 UART: [ldev] FE.KEYID = 1
6,100,286 UART: [ldev] Erasing FE.KEYID = 1
8,605,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,284 UART: [ldev] --
10,413,766 UART: [fwproc] Wait for Commands...
10,416,508 UART: [fwproc] Recv command 0x46574c44
10,418,603 UART: [fwproc] Recv'd Img size: 114084 bytes
10,501,819 UART: ROM Fatal Error: 0x00B0003A
10,504,957 >>> mbox cmd response: failed
10,505,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,724 >>> mbox cmd response: failed
10,505,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,287 >>> mbox cmd response: failed
Initializing fuses
2,051,936 writing to cptra_bootfsm_go
2,241,214 UART:
2,241,560 UART: Running Caliptra ROM ...
2,242,692 UART:
2,242,859 UART: [state] CFI Enabled
2,299,353 UART: [state] LifecycleState = Unprovisioned
2,301,229 UART: [state] DebugLocked = No
2,303,916 UART: [state] WD Timer not started. Device not locked for debugging
2,308,111 UART: [kat] SHA2-256
2,487,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,828 UART: [kat] ++
2,499,377 UART: [kat] sha1
2,509,404 UART: [kat] SHA2-256
2,512,467 UART: [kat] SHA2-384
2,518,552 UART: [kat] SHA2-512-ACC
2,521,499 UART: [kat] ECC-384
4,984,750 UART: [kat] HMAC-384Kdf
5,009,180 UART: [kat] LMS
5,538,597 UART: [kat] --
5,544,492 UART: [cold-reset] ++
5,546,911 UART: [fht] FHT @ 0x50003400
5,558,646 UART: [idev] ++
5,559,212 UART: [idev] CDI.KEYID = 6
5,560,090 UART: [idev] SUBJECT.KEYID = 7
5,561,324 UART: [idev] UDS.KEYID = 0
5,563,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,707,521 UART: [idev] Erasing UDS.KEYID = 0
8,062,690 UART: [idev] Sha1 KeyId Algorithm
8,087,056 UART: [idev] --
8,091,759 UART: [ldev] ++
8,092,536 UART: [ldev] CDI.KEYID = 6
8,093,460 UART: [ldev] SUBJECT.KEYID = 5
8,094,567 UART: [ldev] AUTHORITY.KEYID = 7
8,095,744 UART: [ldev] FE.KEYID = 1
8,138,256 UART: [ldev] Erasing FE.KEYID = 1
10,639,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,405,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,578 UART: [ldev] --
12,429,451 UART: [fwproc] Wait for Commands...
12,431,172 UART: [fwproc] Recv command 0x46574c44
12,433,268 UART: [fwproc] Recv'd Img size: 114084 bytes
15,839,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,913,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,981,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,298,415 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,361,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,281,997 >>> mbox cmd response: failed
10,282,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,282,920 >>> mbox cmd response: failed
10,283,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,283,482 >>> mbox cmd response: failed
Initializing fuses
2,048,259 writing to cptra_bootfsm_go
5,427,675 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,120,140 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,539 UART:
192,900 UART: Running Caliptra ROM ...
194,027 UART:
603,859 UART: [state] CFI Enabled
616,625 UART: [state] LifecycleState = Unprovisioned
618,482 UART: [state] DebugLocked = No
620,807 UART: [state] WD Timer not started. Device not locked for debugging
623,767 UART: [kat] SHA2-256
802,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,472 UART: [kat] ++
814,919 UART: [kat] sha1
826,763 UART: [kat] SHA2-256
829,824 UART: [kat] SHA2-384
836,343 UART: [kat] SHA2-512-ACC
839,326 UART: [kat] ECC-384
3,280,295 UART: [kat] HMAC-384Kdf
3,293,486 UART: [kat] LMS
3,822,957 UART: [kat] --
3,827,171 UART: [cold-reset] ++
3,829,423 UART: [fht] FHT @ 0x50003400
3,839,752 UART: [idev] ++
3,840,313 UART: [idev] CDI.KEYID = 6
3,841,329 UART: [idev] SUBJECT.KEYID = 7
3,842,430 UART: [idev] UDS.KEYID = 0
3,845,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,423 UART: [idev] Erasing UDS.KEYID = 0
6,316,488 UART: [idev] Sha1 KeyId Algorithm
6,340,582 UART: [idev] --
6,344,037 UART: [ldev] ++
6,344,610 UART: [ldev] CDI.KEYID = 6
6,345,519 UART: [ldev] SUBJECT.KEYID = 5
6,346,681 UART: [ldev] AUTHORITY.KEYID = 7
6,347,969 UART: [ldev] FE.KEYID = 1
6,358,017 UART: [ldev] Erasing FE.KEYID = 1
8,834,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,708 UART: [ldev] --
10,625,581 UART: [fwproc] Wait for Commands...
10,627,644 UART: [fwproc] Recv command 0x46574c44
10,629,739 UART: [fwproc] Recv'd Img size: 114084 bytes
10,711,547 UART: ROM Fatal Error: 0x00B0003A
10,714,626 >>> mbox cmd response: failed
10,715,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,715,372 >>> mbox cmd response: failed
10,715,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,716,044 >>> mbox cmd response: failed
Initializing fuses
2,054,442 writing to cptra_bootfsm_go
2,243,760 UART:
2,244,110 UART: Running Caliptra ROM ...
2,245,246 UART:
9,737,073 UART: [state] CFI Enabled
9,750,639 UART: [state] LifecycleState = Unprovisioned
9,752,497 UART: [state] DebugLocked = No
9,754,478 UART: [state] WD Timer not started. Device not locked for debugging
9,758,064 UART: [kat] SHA2-256
9,937,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,948,774 UART: [kat] ++
9,949,323 UART: [kat] sha1
9,961,030 UART: [kat] SHA2-256
9,964,045 UART: [kat] SHA2-384
9,969,612 UART: [kat] SHA2-512-ACC
9,972,608 UART: [kat] ECC-384
12,410,658 UART: [kat] HMAC-384Kdf
12,422,775 UART: [kat] LMS
12,952,296 UART: [kat] --
12,956,982 UART: [cold-reset] ++
12,959,090 UART: [fht] FHT @ 0x50003400
12,969,864 UART: [idev] ++
12,970,433 UART: [idev] CDI.KEYID = 6
12,971,317 UART: [idev] SUBJECT.KEYID = 7
12,972,525 UART: [idev] UDS.KEYID = 0
12,975,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,118,904 UART: [idev] Erasing UDS.KEYID = 0
15,444,761 UART: [idev] Sha1 KeyId Algorithm
15,466,912 UART: [idev] --
15,470,958 UART: [ldev] ++
15,471,526 UART: [ldev] CDI.KEYID = 6
15,472,448 UART: [ldev] SUBJECT.KEYID = 5
15,473,605 UART: [ldev] AUTHORITY.KEYID = 7
15,474,835 UART: [ldev] FE.KEYID = 1
15,485,747 UART: [ldev] Erasing FE.KEYID = 1
17,958,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,677,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,693,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,709,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,724,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,690 UART: [ldev] --
19,750,585 UART: [fwproc] Wait for Commands...
19,753,113 UART: [fwproc] Recv command 0x46574c44
19,755,155 UART: [fwproc] Recv'd Img size: 114084 bytes
23,150,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,223,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,292,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,610,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,698,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,480,092 >>> mbox cmd response: failed
10,480,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,234 >>> mbox cmd response: failed
10,481,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,742 >>> mbox cmd response: failed
Initializing fuses
2,060,324 writing to cptra_bootfsm_go
13,082,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,642,380 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,095 UART:
192,465 UART: Running Caliptra ROM ...
193,669 UART:
193,820 UART: [state] CFI Enabled
261,525 UART: [state] LifecycleState = Unprovisioned
263,936 UART: [state] DebugLocked = No
266,134 UART: [state] WD Timer not started. Device not locked for debugging
271,435 UART: [kat] SHA2-256
461,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,085 UART: [kat] ++
472,545 UART: [kat] sha1
482,747 UART: [kat] SHA2-256
485,761 UART: [kat] SHA2-384
492,070 UART: [kat] SHA2-512-ACC
494,632 UART: [kat] ECC-384
2,948,237 UART: [kat] HMAC-384Kdf
2,972,417 UART: [kat] LMS
3,504,174 UART: [kat] --
3,510,335 UART: [cold-reset] ++
3,512,217 UART: [fht] FHT @ 0x50003400
3,523,851 UART: [idev] ++
3,524,532 UART: [idev] CDI.KEYID = 6
3,525,549 UART: [idev] SUBJECT.KEYID = 7
3,526,709 UART: [idev] UDS.KEYID = 0
3,529,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,673,225 UART: [idev] Erasing UDS.KEYID = 0
6,027,435 UART: [idev] Sha1 KeyId Algorithm
6,049,643 UART: [idev] --
6,054,153 UART: [ldev] ++
6,054,856 UART: [ldev] CDI.KEYID = 6
6,055,745 UART: [ldev] SUBJECT.KEYID = 5
6,056,884 UART: [ldev] AUTHORITY.KEYID = 7
6,058,095 UART: [ldev] FE.KEYID = 1
6,101,093 UART: [ldev] Erasing FE.KEYID = 1
8,607,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,905 UART: [ldev] --
10,416,877 UART: [fwproc] Wait for Commands...
10,418,539 UART: [fwproc] Recv command 0x46574c44
10,420,805 UART: [fwproc] Recv'd Img size: 114084 bytes
10,529,322 UART: ROM Fatal Error: 0x00B0003A
10,532,969 >>> mbox cmd response: failed
10,533,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,533,691 >>> mbox cmd response: failed
10,533,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,534,213 >>> mbox cmd response: failed
Initializing fuses
2,053,446 writing to cptra_bootfsm_go
2,242,836 UART:
2,243,191 UART: Running Caliptra ROM ...
2,244,330 UART:
2,244,522 UART: [state] CFI Enabled
2,319,139 UART: [state] LifecycleState = Unprovisioned
2,321,536 UART: [state] DebugLocked = No
2,323,364 UART: [state] WD Timer not started. Device not locked for debugging
2,327,346 UART: [kat] SHA2-256
2,517,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,995 UART: [kat] ++
2,528,489 UART: [kat] sha1
2,539,544 UART: [kat] SHA2-256
2,542,564 UART: [kat] SHA2-384
2,549,916 UART: [kat] SHA2-512-ACC
2,552,532 UART: [kat] ECC-384
4,999,742 UART: [kat] HMAC-384Kdf
5,025,039 UART: [kat] LMS
5,556,791 UART: [kat] --
5,563,149 UART: [cold-reset] ++
5,564,549 UART: [fht] FHT @ 0x50003400
5,575,700 UART: [idev] ++
5,576,396 UART: [idev] CDI.KEYID = 6
5,577,303 UART: [idev] SUBJECT.KEYID = 7
5,578,522 UART: [idev] UDS.KEYID = 0
5,581,116 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,724,742 UART: [idev] Erasing UDS.KEYID = 0
8,084,590 UART: [idev] Sha1 KeyId Algorithm
8,107,519 UART: [idev] --
8,113,087 UART: [ldev] ++
8,113,770 UART: [ldev] CDI.KEYID = 6
8,114,731 UART: [ldev] SUBJECT.KEYID = 5
8,115,813 UART: [ldev] AUTHORITY.KEYID = 7
8,117,107 UART: [ldev] FE.KEYID = 1
8,154,965 UART: [ldev] Erasing FE.KEYID = 1
10,662,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,595 UART: [ldev] --
12,467,725 UART: [fwproc] Wait for Commands...
12,469,985 UART: [fwproc] Recv command 0x46574c44
12,472,330 UART: [fwproc] Recv'd Img size: 114084 bytes
15,918,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,650,609 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,419,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,309,570 >>> mbox cmd response: failed
10,310,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,310,641 >>> mbox cmd response: failed
10,310,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,311,212 >>> mbox cmd response: failed
Initializing fuses
2,049,197 writing to cptra_bootfsm_go
5,481,928 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,736,368 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,624 UART:
193,004 UART: Running Caliptra ROM ...
194,150 UART:
603,805 UART: [state] CFI Enabled
618,023 UART: [state] LifecycleState = Unprovisioned
620,436 UART: [state] DebugLocked = No
623,065 UART: [state] WD Timer not started. Device not locked for debugging
627,191 UART: [kat] SHA2-256
817,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,870 UART: [kat] ++
828,453 UART: [kat] sha1
840,632 UART: [kat] SHA2-256
843,640 UART: [kat] SHA2-384
849,834 UART: [kat] SHA2-512-ACC
852,444 UART: [kat] ECC-384
3,296,210 UART: [kat] HMAC-384Kdf
3,308,726 UART: [kat] LMS
3,840,543 UART: [kat] --
3,846,262 UART: [cold-reset] ++
3,847,702 UART: [fht] FHT @ 0x50003400
3,859,113 UART: [idev] ++
3,859,794 UART: [idev] CDI.KEYID = 6
3,860,728 UART: [idev] SUBJECT.KEYID = 7
3,861,962 UART: [idev] UDS.KEYID = 0
3,864,697 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,008,148 UART: [idev] Erasing UDS.KEYID = 0
6,339,162 UART: [idev] Sha1 KeyId Algorithm
6,360,719 UART: [idev] --
6,366,346 UART: [ldev] ++
6,367,032 UART: [ldev] CDI.KEYID = 6
6,367,963 UART: [ldev] SUBJECT.KEYID = 5
6,369,127 UART: [ldev] AUTHORITY.KEYID = 7
6,370,360 UART: [ldev] FE.KEYID = 1
6,381,392 UART: [ldev] Erasing FE.KEYID = 1
8,859,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,037 UART: [ldev] --
10,651,039 UART: [fwproc] Wait for Commands...
10,652,929 UART: [fwproc] Recv command 0x46574c44
10,655,246 UART: [fwproc] Recv'd Img size: 114084 bytes
10,764,499 UART: ROM Fatal Error: 0x00B0003A
10,768,152 >>> mbox cmd response: failed
10,768,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,768,920 >>> mbox cmd response: failed
10,769,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,769,479 >>> mbox cmd response: failed
Initializing fuses
2,063,421 writing to cptra_bootfsm_go
2,252,767 UART:
2,253,126 UART: Running Caliptra ROM ...
2,254,268 UART:
9,677,641 UART: [state] CFI Enabled
9,691,611 UART: [state] LifecycleState = Unprovisioned
9,694,001 UART: [state] DebugLocked = No
9,695,778 UART: [state] WD Timer not started. Device not locked for debugging
9,699,921 UART: [kat] SHA2-256
9,889,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,900,601 UART: [kat] ++
9,901,114 UART: [kat] sha1
9,911,891 UART: [kat] SHA2-256
9,914,920 UART: [kat] SHA2-384
9,920,375 UART: [kat] SHA2-512-ACC
9,922,940 UART: [kat] ECC-384
12,366,244 UART: [kat] HMAC-384Kdf
12,379,028 UART: [kat] LMS
12,910,835 UART: [kat] --
12,913,598 UART: [cold-reset] ++
12,914,671 UART: [fht] FHT @ 0x50003400
12,925,214 UART: [idev] ++
12,925,885 UART: [idev] CDI.KEYID = 6
12,926,850 UART: [idev] SUBJECT.KEYID = 7
12,928,065 UART: [idev] UDS.KEYID = 0
12,930,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,074,202 UART: [idev] Erasing UDS.KEYID = 0
15,407,375 UART: [idev] Sha1 KeyId Algorithm
15,430,878 UART: [idev] --
15,434,918 UART: [ldev] ++
15,435,595 UART: [ldev] CDI.KEYID = 6
15,436,556 UART: [ldev] SUBJECT.KEYID = 5
15,437,715 UART: [ldev] AUTHORITY.KEYID = 7
15,438,965 UART: [ldev] FE.KEYID = 1
15,448,749 UART: [ldev] Erasing FE.KEYID = 1
17,928,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,647,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,662,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,678,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,693,317 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,712,562 UART: [ldev] --
19,717,559 UART: [fwproc] Wait for Commands...
19,720,139 UART: [fwproc] Recv command 0x46574c44
19,722,398 UART: [fwproc] Recv'd Img size: 114084 bytes
23,165,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,245,247 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,361,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,902,286 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,757,299 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,547,651 >>> mbox cmd response: failed
10,548,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,746 >>> mbox cmd response: failed
10,549,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,549,336 >>> mbox cmd response: failed
Initializing fuses
2,047,566 writing to cptra_bootfsm_go
13,079,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,259,831 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,398 UART: [kat] LMS
1,475,594 UART: [kat] --
1,476,623 UART: [cold-reset] ++
1,477,181 UART: [fht] Storing FHT @ 0x50003400
1,480,084 UART: [idev] ++
1,480,252 UART: [idev] CDI.KEYID = 6
1,480,612 UART: [idev] SUBJECT.KEYID = 7
1,481,036 UART: [idev] UDS.KEYID = 0
1,481,381 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,958 UART: [idev] Erasing UDS.KEYID = 0
1,505,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,176 UART: [idev] --
1,515,231 UART: [ldev] ++
1,515,399 UART: [ldev] CDI.KEYID = 6
1,515,762 UART: [ldev] SUBJECT.KEYID = 5
1,516,188 UART: [ldev] AUTHORITY.KEYID = 7
1,516,651 UART: [ldev] FE.KEYID = 1
1,521,749 UART: [ldev] Erasing FE.KEYID = 1
1,547,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,632 UART: [ldev] --
1,587,071 UART: [fwproc] Waiting for Commands...
1,587,798 UART: [fwproc] Received command 0x46574c44
1,588,589 UART: [fwproc] Received Image of size 114084 bytes
1,615,266 UART: ROM Fatal Error: 0x00B0003A
1,616,427 >>> mbox cmd response: failed
1,616,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,433 >>> mbox cmd response: failed
1,616,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,725 UART: [kat] SHA2-256
881,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,771 UART: [kat] ++
885,923 UART: [kat] sha1
890,191 UART: [kat] SHA2-256
892,129 UART: [kat] SHA2-384
894,894 UART: [kat] SHA2-512-ACC
896,795 UART: [kat] ECC-384
902,234 UART: [kat] HMAC-384Kdf
906,840 UART: [kat] LMS
1,475,036 UART: [kat] --
1,476,015 UART: [cold-reset] ++
1,476,437 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,246 UART: [idev] Erasing UDS.KEYID = 0
1,505,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,692 UART: [idev] --
1,514,897 UART: [ldev] ++
1,515,065 UART: [ldev] CDI.KEYID = 6
1,515,428 UART: [ldev] SUBJECT.KEYID = 5
1,515,854 UART: [ldev] AUTHORITY.KEYID = 7
1,516,317 UART: [ldev] FE.KEYID = 1
1,521,707 UART: [ldev] Erasing FE.KEYID = 1
1,546,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,902 UART: [ldev] --
1,586,251 UART: [fwproc] Waiting for Commands...
1,587,004 UART: [fwproc] Received command 0x46574c44
1,587,795 UART: [fwproc] Received Image of size 114084 bytes
2,882,810 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,928 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,280 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,673 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,468,844 >>> mbox cmd response: failed
1,468,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,850 >>> mbox cmd response: failed
1,468,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,213 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,184 UART: [kat] SHA2-256
893,122 UART: [kat] SHA2-384
895,939 UART: [kat] SHA2-512-ACC
897,840 UART: [kat] ECC-384
903,543 UART: [kat] HMAC-384Kdf
908,359 UART: [kat] LMS
1,476,555 UART: [kat] --
1,477,402 UART: [cold-reset] ++
1,477,928 UART: [fht] Storing FHT @ 0x50003400
1,480,815 UART: [idev] ++
1,480,983 UART: [idev] CDI.KEYID = 6
1,481,343 UART: [idev] SUBJECT.KEYID = 7
1,481,767 UART: [idev] UDS.KEYID = 0
1,482,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,367 UART: [idev] Erasing UDS.KEYID = 0
1,506,599 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,403 UART: [idev] --
1,516,510 UART: [ldev] ++
1,516,678 UART: [ldev] CDI.KEYID = 6
1,517,041 UART: [ldev] SUBJECT.KEYID = 5
1,517,467 UART: [ldev] AUTHORITY.KEYID = 7
1,517,930 UART: [ldev] FE.KEYID = 1
1,523,204 UART: [ldev] Erasing FE.KEYID = 1
1,548,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,409 UART: [ldev] --
1,587,736 UART: [fwproc] Waiting for Commands...
1,588,389 UART: [fwproc] Received command 0x46574c44
1,589,180 UART: [fwproc] Received Image of size 114084 bytes
1,614,997 UART: ROM Fatal Error: 0x00B0003A
1,616,158 >>> mbox cmd response: failed
1,616,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,164 >>> mbox cmd response: failed
1,616,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,137 UART: [kat] SHA2-512-ACC
897,038 UART: [kat] ECC-384
902,747 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,698 UART: [fht] Storing FHT @ 0x50003400
1,479,337 UART: [idev] ++
1,479,505 UART: [idev] CDI.KEYID = 6
1,479,865 UART: [idev] SUBJECT.KEYID = 7
1,480,289 UART: [idev] UDS.KEYID = 0
1,480,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,163 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,593 UART: [idev] --
1,514,580 UART: [ldev] ++
1,514,748 UART: [ldev] CDI.KEYID = 6
1,515,111 UART: [ldev] SUBJECT.KEYID = 5
1,515,537 UART: [ldev] AUTHORITY.KEYID = 7
1,516,000 UART: [ldev] FE.KEYID = 1
1,521,454 UART: [ldev] Erasing FE.KEYID = 1
1,547,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,345 UART: [ldev] --
1,586,704 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114084 bytes
2,882,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,806 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,468,585 >>> mbox cmd response: failed
1,468,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,591 >>> mbox cmd response: failed
1,468,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,246 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,050 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,522 UART: [kat] SHA2-512-ACC
908,423 UART: [kat] ECC-384
918,182 UART: [kat] HMAC-384Kdf
922,774 UART: [kat] LMS
1,171,102 UART: [kat] --
1,172,105 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,201,953 UART: [idev] Sha1 KeyId Algorithm
1,210,235 UART: [idev] --
1,211,205 UART: [ldev] ++
1,211,373 UART: [ldev] CDI.KEYID = 6
1,211,736 UART: [ldev] SUBJECT.KEYID = 5
1,212,162 UART: [ldev] AUTHORITY.KEYID = 7
1,212,625 UART: [ldev] FE.KEYID = 1
1,217,577 UART: [ldev] Erasing FE.KEYID = 1
1,244,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,737 UART: [ldev] --
1,284,196 UART: [fwproc] Wait for Commands...
1,284,912 UART: [fwproc] Recv command 0x46574c44
1,285,640 UART: [fwproc] Recv'd Img size: 114084 bytes
1,311,999 UART: ROM Fatal Error: 0x00B0003A
1,313,160 >>> mbox cmd response: failed
1,313,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,166 >>> mbox cmd response: failed
1,313,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
892,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,077 UART: [kat] ++
897,229 UART: [kat] sha1
901,289 UART: [kat] SHA2-256
903,229 UART: [kat] SHA2-384
906,138 UART: [kat] SHA2-512-ACC
908,039 UART: [kat] ECC-384
917,592 UART: [kat] HMAC-384Kdf
922,102 UART: [kat] LMS
1,170,430 UART: [kat] --
1,171,609 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,809 UART: [idev] Sha1 KeyId Algorithm
1,209,223 UART: [idev] --
1,210,235 UART: [ldev] ++
1,210,403 UART: [ldev] CDI.KEYID = 6
1,210,766 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,216,901 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,754 UART: [fwproc] Wait for Commands...
1,283,548 UART: [fwproc] Recv command 0x46574c44
1,284,276 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,528 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,165,609 >>> mbox cmd response: failed
1,165,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,615 >>> mbox cmd response: failed
1,165,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,621 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,305 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
901,846 UART: [kat] SHA2-256
903,786 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
917,737 UART: [kat] HMAC-384Kdf
922,379 UART: [kat] LMS
1,170,707 UART: [kat] --
1,171,674 UART: [cold-reset] ++
1,172,008 UART: [fht] FHT @ 0x50003400
1,174,595 UART: [idev] ++
1,174,763 UART: [idev] CDI.KEYID = 6
1,175,123 UART: [idev] SUBJECT.KEYID = 7
1,175,547 UART: [idev] UDS.KEYID = 0
1,175,892 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,200,786 UART: [idev] Sha1 KeyId Algorithm
1,209,434 UART: [idev] --
1,210,674 UART: [ldev] ++
1,210,842 UART: [ldev] CDI.KEYID = 6
1,211,205 UART: [ldev] SUBJECT.KEYID = 5
1,211,631 UART: [ldev] AUTHORITY.KEYID = 7
1,212,094 UART: [ldev] FE.KEYID = 1
1,217,270 UART: [ldev] Erasing FE.KEYID = 1
1,243,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,892 UART: [ldev] --
1,282,399 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,680 UART: ROM Fatal Error: 0x00B0003A
1,310,841 >>> mbox cmd response: failed
1,310,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,847 >>> mbox cmd response: failed
1,310,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,519 UART: [kat] SHA2-512-ACC
908,420 UART: [kat] ECC-384
918,451 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,402 UART: [cold-reset] ++
1,172,940 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,979 UART: [idev] Erasing UDS.KEYID = 0
1,201,800 UART: [idev] Sha1 KeyId Algorithm
1,210,168 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,217,844 UART: [ldev] Erasing FE.KEYID = 1
1,243,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,758 UART: [ldev] --
1,283,239 UART: [fwproc] Wait for Commands...
1,283,929 UART: [fwproc] Recv command 0x46574c44
1,284,657 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,601 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,066 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,167,072 >>> mbox cmd response: failed
1,167,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,078 >>> mbox cmd response: failed
1,167,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,167,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,326 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,005 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,173,129 UART: [idev] ++
1,173,297 UART: [idev] CDI.KEYID = 6
1,173,658 UART: [idev] SUBJECT.KEYID = 7
1,174,083 UART: [idev] UDS.KEYID = 0
1,174,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,909 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,241,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,054 UART: [ldev] --
1,280,414 UART: [fwproc] Wait for Commands...
1,281,235 UART: [fwproc] Recv command 0x46574c44
1,281,968 UART: [fwproc] Recv'd Img size: 114084 bytes
1,308,151 UART: ROM Fatal Error: 0x00B0003A
1,309,312 >>> mbox cmd response: failed
1,309,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,318 >>> mbox cmd response: failed
1,309,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,324 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,598 UART: [kat] LMS
1,168,910 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,955 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,209,158 UART: [ldev] ++
1,209,326 UART: [ldev] CDI.KEYID = 6
1,209,690 UART: [ldev] SUBJECT.KEYID = 5
1,210,117 UART: [ldev] AUTHORITY.KEYID = 7
1,210,580 UART: [ldev] FE.KEYID = 1
1,215,862 UART: [ldev] Erasing FE.KEYID = 1
1,242,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,123 UART: [fwproc] Recv command 0x46574c44
1,282,856 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,766 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,216 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,454 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,415 >>> mbox cmd response: failed
1,161,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,421 >>> mbox cmd response: failed
1,161,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,294 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,373 UART: [kat] SHA2-256
891,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,052 UART: [kat] ++
896,204 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,187 UART: [kat] SHA2-512-ACC
907,088 UART: [kat] ECC-384
916,659 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,742 UART: [idev] ++
1,173,910 UART: [idev] CDI.KEYID = 6
1,174,271 UART: [idev] SUBJECT.KEYID = 7
1,174,696 UART: [idev] UDS.KEYID = 0
1,175,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,342 UART: [idev] Sha1 KeyId Algorithm
1,209,306 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,663 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,284,003 UART: [fwproc] Recv'd Img size: 114084 bytes
1,309,552 UART: ROM Fatal Error: 0x00B0003A
1,310,713 >>> mbox cmd response: failed
1,310,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,719 >>> mbox cmd response: failed
1,310,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,277 UART: [kat] SHA2-256
891,827 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,956 UART: [kat] ++
896,108 UART: [kat] sha1
900,406 UART: [kat] SHA2-256
902,346 UART: [kat] SHA2-384
905,257 UART: [kat] SHA2-512-ACC
907,158 UART: [kat] ECC-384
917,077 UART: [kat] HMAC-384Kdf
921,667 UART: [kat] LMS
1,169,979 UART: [kat] --
1,170,968 UART: [cold-reset] ++
1,171,494 UART: [fht] FHT @ 0x50003400
1,174,318 UART: [idev] ++
1,174,486 UART: [idev] CDI.KEYID = 6
1,174,847 UART: [idev] SUBJECT.KEYID = 7
1,175,272 UART: [idev] UDS.KEYID = 0
1,175,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,290 UART: [idev] Erasing UDS.KEYID = 0
1,200,636 UART: [idev] Sha1 KeyId Algorithm
1,209,540 UART: [idev] --
1,210,773 UART: [ldev] ++
1,210,941 UART: [ldev] CDI.KEYID = 6
1,211,305 UART: [ldev] SUBJECT.KEYID = 5
1,211,732 UART: [ldev] AUTHORITY.KEYID = 7
1,212,195 UART: [ldev] FE.KEYID = 1
1,217,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,285 UART: [ldev] --
1,283,659 UART: [fwproc] Wait for Commands...
1,284,292 UART: [fwproc] Recv command 0x46574c44
1,285,025 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,311 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,919 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,161,434 >>> mbox cmd response: failed
1,161,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,440 >>> mbox cmd response: failed
1,161,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,151 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,123 UART:
192,488 UART: Running Caliptra ROM ...
194,010 UART:
194,175 UART: [state] CFI Enabled
264,758 UART: [state] LifecycleState = Unprovisioned
266,670 UART: [state] DebugLocked = No
268,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,619 UART: [kat] SHA2-256
443,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,774 UART: [kat] ++
454,249 UART: [kat] sha1
466,047 UART: [kat] SHA2-256
468,736 UART: [kat] SHA2-384
475,167 UART: [kat] SHA2-512-ACC
477,508 UART: [kat] ECC-384
2,768,253 UART: [kat] HMAC-384Kdf
2,799,466 UART: [kat] LMS
3,989,752 UART: [kat] --
3,995,496 UART: [cold-reset] ++
3,997,925 UART: [fht] Storing FHT @ 0x50003400
4,010,062 UART: [idev] ++
4,010,645 UART: [idev] CDI.KEYID = 6
4,011,609 UART: [idev] SUBJECT.KEYID = 7
4,012,828 UART: [idev] UDS.KEYID = 0
4,015,613 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,158,894 UART: [idev] Erasing UDS.KEYID = 0
7,345,191 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,813 UART: [idev] --
7,368,725 UART: [ldev] ++
7,369,313 UART: [ldev] CDI.KEYID = 6
7,370,257 UART: [ldev] SUBJECT.KEYID = 5
7,371,414 UART: [ldev] AUTHORITY.KEYID = 7
7,372,756 UART: [ldev] FE.KEYID = 1
7,401,174 UART: [ldev] Erasing FE.KEYID = 1
10,731,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,102 UART: [ldev] --
13,095,599 UART: [fwproc] Waiting for Commands...
13,098,727 UART: [fwproc] Received command 0x46574c44
13,100,915 UART: [fwproc] Received Image of size 113760 bytes
16,867,936 UART: ROM Fatal Error: 0x000B0033
16,871,391 >>> mbox cmd response: failed
16,871,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,872,117 >>> mbox cmd response: failed
16,872,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,872,806 >>> mbox cmd response: failed
Initializing fuses
2,048,334 writing to cptra_bootfsm_go
2,237,649 UART:
2,238,009 UART: Running Caliptra ROM ...
2,239,064 UART:
2,239,229 UART: [state] CFI Enabled
2,317,693 UART: [state] LifecycleState = Unprovisioned
2,319,690 UART: [state] DebugLocked = No
2,322,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,349 UART: [kat] SHA2-256
2,496,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,523 UART: [kat] ++
2,506,986 UART: [kat] sha1
2,516,901 UART: [kat] SHA2-256
2,519,603 UART: [kat] SHA2-384
2,525,461 UART: [kat] SHA2-512-ACC
2,527,845 UART: [kat] ECC-384
4,818,419 UART: [kat] HMAC-384Kdf
4,830,015 UART: [kat] LMS
6,020,336 UART: [kat] --
6,025,225 UART: [cold-reset] ++
6,027,596 UART: [fht] Storing FHT @ 0x50003400
6,039,569 UART: [idev] ++
6,040,145 UART: [idev] CDI.KEYID = 6
6,041,341 UART: [idev] SUBJECT.KEYID = 7
6,042,504 UART: [idev] UDS.KEYID = 0
6,045,144 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,188,217 UART: [idev] Erasing UDS.KEYID = 0
9,375,373 UART: [idev] Using Sha1 for KeyId Algorithm
9,397,210 UART: [idev] --
9,401,209 UART: [ldev] ++
9,401,839 UART: [ldev] CDI.KEYID = 6
9,402,759 UART: [ldev] SUBJECT.KEYID = 5
9,403,967 UART: [ldev] AUTHORITY.KEYID = 7
9,405,204 UART: [ldev] FE.KEYID = 1
9,431,624 UART: [ldev] Erasing FE.KEYID = 1
12,767,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,060,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,075,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,089,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,104,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,122,832 UART: [ldev] --
15,127,829 UART: [fwproc] Waiting for Commands...
15,130,687 UART: [fwproc] Received command 0x46574c44
15,132,874 UART: [fwproc] Received Image of size 113760 bytes
19,181,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,261,418 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,330,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,646,135 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,806,636 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,105,820 >>> mbox cmd response: failed
16,106,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,107,158 >>> mbox cmd response: failed
16,107,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,107,719 >>> mbox cmd response: failed
Initializing fuses
2,044,731 writing to cptra_bootfsm_go
5,824,067 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,884,957 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,370 UART:
192,741 UART: Running Caliptra ROM ...
193,932 UART:
603,706 UART: [state] CFI Enabled
618,669 UART: [state] LifecycleState = Unprovisioned
620,590 UART: [state] DebugLocked = No
623,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,371 UART: [kat] SHA2-256
797,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,692 UART: [kat] ++
808,223 UART: [kat] sha1
819,157 UART: [kat] SHA2-256
821,886 UART: [kat] SHA2-384
827,400 UART: [kat] SHA2-512-ACC
829,787 UART: [kat] ECC-384
3,114,290 UART: [kat] HMAC-384Kdf
3,127,273 UART: [kat] LMS
4,317,402 UART: [kat] --
4,322,010 UART: [cold-reset] ++
4,324,492 UART: [fht] Storing FHT @ 0x50003400
4,336,789 UART: [idev] ++
4,337,364 UART: [idev] CDI.KEYID = 6
4,338,350 UART: [idev] SUBJECT.KEYID = 7
4,339,564 UART: [idev] UDS.KEYID = 0
4,342,537 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,053 UART: [idev] Erasing UDS.KEYID = 0
7,625,859 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,143 UART: [idev] --
7,651,686 UART: [ldev] ++
7,652,278 UART: [ldev] CDI.KEYID = 6
7,653,298 UART: [ldev] SUBJECT.KEYID = 5
7,654,461 UART: [ldev] AUTHORITY.KEYID = 7
7,655,693 UART: [ldev] FE.KEYID = 1
7,666,991 UART: [ldev] Erasing FE.KEYID = 1
10,953,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,472 UART: [ldev] --
13,312,452 UART: [fwproc] Waiting for Commands...
13,314,129 UART: [fwproc] Received command 0x46574c44
13,316,377 UART: [fwproc] Received Image of size 113760 bytes
17,318,805 UART: ROM Fatal Error: 0x000B0033
17,322,260 >>> mbox cmd response: failed
17,322,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,323,039 >>> mbox cmd response: failed
17,323,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,323,605 >>> mbox cmd response: failed
Initializing fuses
2,053,332 writing to cptra_bootfsm_go
2,242,684 UART:
2,243,037 UART: Running Caliptra ROM ...
2,244,180 UART:
3,144,088 UART: [state] CFI Enabled
3,159,514 UART: [state] LifecycleState = Unprovisioned
3,161,424 UART: [state] DebugLocked = No
3,163,996 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,168,484 UART: [kat] SHA2-256
3,338,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,348,794 UART: [kat] ++
3,349,292 UART: [kat] sha1
3,360,667 UART: [kat] SHA2-256
3,363,360 UART: [kat] SHA2-384
3,368,279 UART: [kat] SHA2-512-ACC
3,370,684 UART: [kat] ECC-384
5,654,868 UART: [kat] HMAC-384Kdf
5,665,521 UART: [kat] LMS
6,855,625 UART: [kat] --
6,858,995 UART: [cold-reset] ++
6,860,716 UART: [fht] Storing FHT @ 0x50003400
6,871,307 UART: [idev] ++
6,871,905 UART: [idev] CDI.KEYID = 6
6,872,821 UART: [idev] SUBJECT.KEYID = 7
6,874,059 UART: [idev] UDS.KEYID = 0
6,876,776 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
7,019,676 UART: [idev] Erasing UDS.KEYID = 0
10,158,237 UART: [idev] Using Sha1 for KeyId Algorithm
10,179,400 UART: [idev] --
10,182,099 UART: [ldev] ++
10,182,672 UART: [ldev] CDI.KEYID = 6
10,183,633 UART: [ldev] SUBJECT.KEYID = 5
10,184,886 UART: [ldev] AUTHORITY.KEYID = 7
10,186,122 UART: [ldev] FE.KEYID = 1
10,198,765 UART: [ldev] Erasing FE.KEYID = 1
13,487,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,784,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,798,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,813,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,827,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,845,528 UART: [ldev] --
15,849,607 UART: [fwproc] Waiting for Commands...
15,852,353 UART: [fwproc] Received command 0x46574c44
15,854,591 UART: [fwproc] Received Image of size 113760 bytes
19,908,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,986,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,055,401 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,371,683 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
4,124,261 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
16,371,534 >>> mbox cmd response: failed
16,372,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,372,862 >>> mbox cmd response: failed
16,373,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,373,431 >>> mbox cmd response: failed
Initializing fuses
2,044,193 writing to cptra_bootfsm_go
7,622,632 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
21,546,797 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,361 UART:
192,729 UART: Running Caliptra ROM ...
193,935 UART:
194,094 UART: [state] CFI Enabled
261,276 UART: [state] LifecycleState = Unprovisioned
263,135 UART: [state] DebugLocked = No
264,518 UART: [state] WD Timer not started. Device not locked for debugging
268,400 UART: [kat] SHA2-256
447,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,089 UART: [kat] ++
459,627 UART: [kat] sha1
470,845 UART: [kat] SHA2-256
473,878 UART: [kat] SHA2-384
480,018 UART: [kat] SHA2-512-ACC
482,957 UART: [kat] ECC-384
2,947,351 UART: [kat] HMAC-384Kdf
2,969,804 UART: [kat] LMS
3,499,278 UART: [kat] --
3,503,132 UART: [cold-reset] ++
3,504,449 UART: [fht] FHT @ 0x50003400
3,515,599 UART: [idev] ++
3,516,167 UART: [idev] CDI.KEYID = 6
3,517,186 UART: [idev] SUBJECT.KEYID = 7
3,518,292 UART: [idev] UDS.KEYID = 0
3,521,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,956 UART: [idev] Erasing UDS.KEYID = 0
6,027,836 UART: [idev] Sha1 KeyId Algorithm
6,051,290 UART: [idev] --
6,055,296 UART: [ldev] ++
6,055,872 UART: [ldev] CDI.KEYID = 6
6,056,788 UART: [ldev] SUBJECT.KEYID = 5
6,057,952 UART: [ldev] AUTHORITY.KEYID = 7
6,059,185 UART: [ldev] FE.KEYID = 1
6,097,780 UART: [ldev] Erasing FE.KEYID = 1
8,601,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,557 UART: [ldev] --
10,411,001 UART: [fwproc] Wait for Commands...
10,413,372 UART: [fwproc] Recv command 0x46574c44
10,415,470 UART: [fwproc] Recv'd Img size: 114084 bytes
12,051,264 UART: ROM Fatal Error: 0x000B0033
12,054,376 >>> mbox cmd response: failed
12,054,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,055,157 >>> mbox cmd response: failed
12,055,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,055,771 >>> mbox cmd response: failed
Initializing fuses
2,059,953 writing to cptra_bootfsm_go
2,249,232 UART:
2,249,594 UART: Running Caliptra ROM ...
2,250,676 UART:
2,250,842 UART: [state] CFI Enabled
2,325,027 UART: [state] LifecycleState = Unprovisioned
2,326,910 UART: [state] DebugLocked = No
2,328,299 UART: [state] WD Timer not started. Device not locked for debugging
2,332,815 UART: [kat] SHA2-256
2,511,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,523,483 UART: [kat] ++
2,524,035 UART: [kat] sha1
2,534,398 UART: [kat] SHA2-256
2,537,438 UART: [kat] SHA2-384
2,542,780 UART: [kat] SHA2-512-ACC
2,545,730 UART: [kat] ECC-384
5,011,520 UART: [kat] HMAC-384Kdf
5,033,379 UART: [kat] LMS
5,562,874 UART: [kat] --
5,566,919 UART: [cold-reset] ++
5,568,362 UART: [fht] FHT @ 0x50003400
5,577,719 UART: [idev] ++
5,578,284 UART: [idev] CDI.KEYID = 6
5,579,197 UART: [idev] SUBJECT.KEYID = 7
5,580,411 UART: [idev] UDS.KEYID = 0
5,583,189 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,779 UART: [idev] Erasing UDS.KEYID = 0
8,089,059 UART: [idev] Sha1 KeyId Algorithm
8,111,226 UART: [idev] --
8,115,463 UART: [ldev] ++
8,116,042 UART: [ldev] CDI.KEYID = 6
8,116,953 UART: [ldev] SUBJECT.KEYID = 5
8,118,117 UART: [ldev] AUTHORITY.KEYID = 7
8,119,353 UART: [ldev] FE.KEYID = 1
8,161,003 UART: [ldev] Erasing FE.KEYID = 1
10,664,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,473,146 UART: [ldev] --
12,478,136 UART: [fwproc] Wait for Commands...
12,480,014 UART: [fwproc] Recv command 0x46574c44
12,482,061 UART: [fwproc] Recv'd Img size: 114084 bytes
15,880,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,954,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,023,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,340,949 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,386,662 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,741,171 >>> mbox cmd response: failed
11,741,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,742,338 >>> mbox cmd response: failed
11,742,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,742,922 >>> mbox cmd response: failed
Initializing fuses
2,046,490 writing to cptra_bootfsm_go
5,393,015 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,081,315 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,684 UART:
193,039 UART: Running Caliptra ROM ...
194,164 UART:
603,627 UART: [state] CFI Enabled
615,487 UART: [state] LifecycleState = Unprovisioned
617,341 UART: [state] DebugLocked = No
618,805 UART: [state] WD Timer not started. Device not locked for debugging
621,979 UART: [kat] SHA2-256
801,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,681 UART: [kat] ++
813,126 UART: [kat] sha1
823,944 UART: [kat] SHA2-256
826,953 UART: [kat] SHA2-384
833,681 UART: [kat] SHA2-512-ACC
836,611 UART: [kat] ECC-384
3,280,224 UART: [kat] HMAC-384Kdf
3,292,891 UART: [kat] LMS
3,822,417 UART: [kat] --
3,827,830 UART: [cold-reset] ++
3,829,980 UART: [fht] FHT @ 0x50003400
3,839,447 UART: [idev] ++
3,840,021 UART: [idev] CDI.KEYID = 6
3,840,933 UART: [idev] SUBJECT.KEYID = 7
3,842,094 UART: [idev] UDS.KEYID = 0
3,844,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,988,470 UART: [idev] Erasing UDS.KEYID = 0
6,313,745 UART: [idev] Sha1 KeyId Algorithm
6,335,796 UART: [idev] --
6,340,061 UART: [ldev] ++
6,340,635 UART: [ldev] CDI.KEYID = 6
6,341,519 UART: [ldev] SUBJECT.KEYID = 5
6,342,730 UART: [ldev] AUTHORITY.KEYID = 7
6,344,023 UART: [ldev] FE.KEYID = 1
6,355,560 UART: [ldev] Erasing FE.KEYID = 1
8,830,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,039 UART: [ldev] --
10,623,268 UART: [fwproc] Wait for Commands...
10,624,887 UART: [fwproc] Recv command 0x46574c44
10,626,996 UART: [fwproc] Recv'd Img size: 114084 bytes
12,289,899 UART: ROM Fatal Error: 0x000B0033
12,293,004 >>> mbox cmd response: failed
12,293,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,293,746 >>> mbox cmd response: failed
12,294,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,294,415 >>> mbox cmd response: failed
Initializing fuses
2,060,192 writing to cptra_bootfsm_go
2,249,579 UART:
2,249,942 UART: Running Caliptra ROM ...
2,251,080 UART:
8,159,665 UART: [state] CFI Enabled
8,175,403 UART: [state] LifecycleState = Unprovisioned
8,177,245 UART: [state] DebugLocked = No
8,178,537 UART: [state] WD Timer not started. Device not locked for debugging
8,181,419 UART: [kat] SHA2-256
8,360,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,372,136 UART: [kat] ++
8,372,679 UART: [kat] sha1
8,385,357 UART: [kat] SHA2-256
8,388,400 UART: [kat] SHA2-384
8,394,227 UART: [kat] SHA2-512-ACC
8,397,169 UART: [kat] ECC-384
10,838,271 UART: [kat] HMAC-384Kdf
10,851,263 UART: [kat] LMS
11,380,768 UART: [kat] --
11,384,964 UART: [cold-reset] ++
11,387,273 UART: [fht] FHT @ 0x50003400
11,397,815 UART: [idev] ++
11,398,374 UART: [idev] CDI.KEYID = 6
11,399,279 UART: [idev] SUBJECT.KEYID = 7
11,400,492 UART: [idev] UDS.KEYID = 0
11,403,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,546,690 UART: [idev] Erasing UDS.KEYID = 0
13,876,070 UART: [idev] Sha1 KeyId Algorithm
13,899,515 UART: [idev] --
13,904,397 UART: [ldev] ++
13,904,965 UART: [ldev] CDI.KEYID = 6
13,905,874 UART: [ldev] SUBJECT.KEYID = 5
13,907,035 UART: [ldev] AUTHORITY.KEYID = 7
13,908,320 UART: [ldev] FE.KEYID = 1
13,919,288 UART: [ldev] Erasing FE.KEYID = 1
16,395,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,111,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,127,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,143,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,158,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,179,673 UART: [ldev] --
18,183,653 UART: [fwproc] Wait for Commands...
18,186,776 UART: [fwproc] Recv command 0x46574c44
18,188,873 UART: [fwproc] Recv'd Img size: 114084 bytes
21,590,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,663,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,732,506 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,048,797 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,698,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,951,715 >>> mbox cmd response: failed
11,952,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,952,794 >>> mbox cmd response: failed
11,953,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,953,366 >>> mbox cmd response: failed
Initializing fuses
2,046,062 writing to cptra_bootfsm_go
11,604,195 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,168,636 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,157 UART:
192,513 UART: Running Caliptra ROM ...
193,655 UART:
193,799 UART: [state] CFI Enabled
262,925 UART: [state] LifecycleState = Unprovisioned
265,340 UART: [state] DebugLocked = No
268,178 UART: [state] WD Timer not started. Device not locked for debugging
272,615 UART: [kat] SHA2-256
462,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,262 UART: [kat] ++
473,742 UART: [kat] sha1
484,625 UART: [kat] SHA2-256
487,640 UART: [kat] SHA2-384
492,980 UART: [kat] SHA2-512-ACC
495,595 UART: [kat] ECC-384
2,944,148 UART: [kat] HMAC-384Kdf
2,968,988 UART: [kat] LMS
3,500,763 UART: [kat] --
3,505,038 UART: [cold-reset] ++
3,506,864 UART: [fht] FHT @ 0x50003400
3,518,767 UART: [idev] ++
3,519,442 UART: [idev] CDI.KEYID = 6
3,520,416 UART: [idev] SUBJECT.KEYID = 7
3,521,578 UART: [idev] UDS.KEYID = 0
3,524,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,244 UART: [idev] Erasing UDS.KEYID = 0
6,029,641 UART: [idev] Sha1 KeyId Algorithm
6,051,309 UART: [idev] --
6,055,072 UART: [ldev] ++
6,055,765 UART: [ldev] CDI.KEYID = 6
6,056,685 UART: [ldev] SUBJECT.KEYID = 5
6,057,847 UART: [ldev] AUTHORITY.KEYID = 7
6,059,085 UART: [ldev] FE.KEYID = 1
6,098,233 UART: [ldev] Erasing FE.KEYID = 1
8,600,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,204 UART: [ldev] --
10,389,579 UART: [fwproc] Wait for Commands...
10,391,645 UART: [fwproc] Recv command 0x46574c44
10,393,913 UART: [fwproc] Recv'd Img size: 114084 bytes
12,091,421 UART: ROM Fatal Error: 0x000B0033
12,094,822 >>> mbox cmd response: failed
12,095,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,095,503 >>> mbox cmd response: failed
12,095,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,096,069 >>> mbox cmd response: failed
Initializing fuses
2,051,769 writing to cptra_bootfsm_go
2,241,080 UART:
2,241,430 UART: Running Caliptra ROM ...
2,242,476 UART:
2,242,646 UART: [state] CFI Enabled
2,306,305 UART: [state] LifecycleState = Unprovisioned
2,308,686 UART: [state] DebugLocked = No
2,310,249 UART: [state] WD Timer not started. Device not locked for debugging
2,315,689 UART: [kat] SHA2-256
2,505,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,351 UART: [kat] ++
2,516,855 UART: [kat] sha1
2,528,392 UART: [kat] SHA2-256
2,531,416 UART: [kat] SHA2-384
2,538,109 UART: [kat] SHA2-512-ACC
2,540,679 UART: [kat] ECC-384
4,990,418 UART: [kat] HMAC-384Kdf
5,014,106 UART: [kat] LMS
5,545,853 UART: [kat] --
5,551,992 UART: [cold-reset] ++
5,552,999 UART: [fht] FHT @ 0x50003400
5,564,559 UART: [idev] ++
5,565,287 UART: [idev] CDI.KEYID = 6
5,566,225 UART: [idev] SUBJECT.KEYID = 7
5,567,437 UART: [idev] UDS.KEYID = 0
5,570,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,713,643 UART: [idev] Erasing UDS.KEYID = 0
8,072,058 UART: [idev] Sha1 KeyId Algorithm
8,095,351 UART: [idev] --
8,100,217 UART: [ldev] ++
8,100,901 UART: [ldev] CDI.KEYID = 6
8,101,779 UART: [ldev] SUBJECT.KEYID = 5
8,102,993 UART: [ldev] AUTHORITY.KEYID = 7
8,104,173 UART: [ldev] FE.KEYID = 1
8,142,968 UART: [ldev] Erasing FE.KEYID = 1
10,649,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,420,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,187 UART: [ldev] --
12,448,380 UART: [fwproc] Wait for Commands...
12,450,325 UART: [fwproc] Recv command 0x46574c44
12,452,651 UART: [fwproc] Recv'd Img size: 114084 bytes
15,886,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,964,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,081,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,622,058 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,428,262 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,825,814 >>> mbox cmd response: failed
11,826,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,826,881 >>> mbox cmd response: failed
11,827,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,827,448 >>> mbox cmd response: failed
Initializing fuses
2,047,240 writing to cptra_bootfsm_go
5,476,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,739,909 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,501 UART:
192,859 UART: Running Caliptra ROM ...
194,044 UART:
603,510 UART: [state] CFI Enabled
621,471 UART: [state] LifecycleState = Unprovisioned
623,848 UART: [state] DebugLocked = No
625,569 UART: [state] WD Timer not started. Device not locked for debugging
630,354 UART: [kat] SHA2-256
820,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,030 UART: [kat] ++
831,568 UART: [kat] sha1
843,418 UART: [kat] SHA2-256
846,484 UART: [kat] SHA2-384
853,919 UART: [kat] SHA2-512-ACC
856,478 UART: [kat] ECC-384
3,295,851 UART: [kat] HMAC-384Kdf
3,308,475 UART: [kat] LMS
3,840,292 UART: [kat] --
3,843,650 UART: [cold-reset] ++
3,845,047 UART: [fht] FHT @ 0x50003400
3,855,438 UART: [idev] ++
3,856,119 UART: [idev] CDI.KEYID = 6
3,857,102 UART: [idev] SUBJECT.KEYID = 7
3,858,263 UART: [idev] UDS.KEYID = 0
3,860,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,004,384 UART: [idev] Erasing UDS.KEYID = 0
6,332,611 UART: [idev] Sha1 KeyId Algorithm
6,354,055 UART: [idev] --
6,357,786 UART: [ldev] ++
6,358,464 UART: [ldev] CDI.KEYID = 6
6,359,362 UART: [ldev] SUBJECT.KEYID = 5
6,360,570 UART: [ldev] AUTHORITY.KEYID = 7
6,361,802 UART: [ldev] FE.KEYID = 1
6,373,236 UART: [ldev] Erasing FE.KEYID = 1
8,850,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,628 UART: [ldev] --
10,640,848 UART: [fwproc] Wait for Commands...
10,644,021 UART: [fwproc] Recv command 0x46574c44
10,646,287 UART: [fwproc] Recv'd Img size: 114084 bytes
12,317,608 UART: ROM Fatal Error: 0x000B0033
12,321,052 >>> mbox cmd response: failed
12,321,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,321,863 >>> mbox cmd response: failed
12,322,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,322,424 >>> mbox cmd response: failed
Initializing fuses
2,055,905 writing to cptra_bootfsm_go
2,245,233 UART:
2,245,590 UART: Running Caliptra ROM ...
2,246,725 UART:
8,136,762 UART: [state] CFI Enabled
8,151,632 UART: [state] LifecycleState = Unprovisioned
8,154,021 UART: [state] DebugLocked = No
8,156,558 UART: [state] WD Timer not started. Device not locked for debugging
8,160,805 UART: [kat] SHA2-256
8,350,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,361,478 UART: [kat] ++
8,362,076 UART: [kat] sha1
8,373,248 UART: [kat] SHA2-256
8,376,268 UART: [kat] SHA2-384
8,383,065 UART: [kat] SHA2-512-ACC
8,385,646 UART: [kat] ECC-384
10,830,442 UART: [kat] HMAC-384Kdf
10,842,907 UART: [kat] LMS
11,374,726 UART: [kat] --
11,379,305 UART: [cold-reset] ++
11,380,530 UART: [fht] FHT @ 0x50003400
11,393,289 UART: [idev] ++
11,393,969 UART: [idev] CDI.KEYID = 6
11,394,906 UART: [idev] SUBJECT.KEYID = 7
11,396,113 UART: [idev] UDS.KEYID = 0
11,398,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,542,227 UART: [idev] Erasing UDS.KEYID = 0
13,876,278 UART: [idev] Sha1 KeyId Algorithm
13,900,055 UART: [idev] --
13,905,350 UART: [ldev] ++
13,906,070 UART: [ldev] CDI.KEYID = 6
13,906,964 UART: [ldev] SUBJECT.KEYID = 5
13,908,127 UART: [ldev] AUTHORITY.KEYID = 7
13,909,382 UART: [ldev] FE.KEYID = 1
13,919,189 UART: [ldev] Erasing FE.KEYID = 1
16,395,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,115,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,130,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,146,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,161,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,182,707 UART: [ldev] --
18,187,918 UART: [fwproc] Wait for Commands...
18,190,501 UART: [fwproc] Recv command 0x46574c44
18,192,758 UART: [fwproc] Recv'd Img size: 114084 bytes
21,629,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,706,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,822,849 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
22,364,077 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,759,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,079,860 >>> mbox cmd response: failed
12,080,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,081,011 >>> mbox cmd response: failed
12,081,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,081,605 >>> mbox cmd response: failed
Initializing fuses
2,051,265 writing to cptra_bootfsm_go
11,541,139 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,724,010 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
906,814 UART: [kat] LMS
1,475,010 UART: [kat] --
1,475,911 UART: [cold-reset] ++
1,476,465 UART: [fht] Storing FHT @ 0x50003400
1,479,338 UART: [idev] ++
1,479,506 UART: [idev] CDI.KEYID = 6
1,479,866 UART: [idev] SUBJECT.KEYID = 7
1,480,290 UART: [idev] UDS.KEYID = 0
1,480,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,986 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,429 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,366 UART: [ldev] --
1,585,641 UART: [fwproc] Waiting for Commands...
1,586,444 UART: [fwproc] Received command 0x46574c44
1,587,235 UART: [fwproc] Received Image of size 114084 bytes
2,724,273 UART: ROM Fatal Error: 0x000B0033
2,725,430 >>> mbox cmd response: failed
2,725,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,725,436 >>> mbox cmd response: failed
2,725,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,725,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,169 UART: [kat] SHA2-256
882,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,215 UART: [kat] ++
886,367 UART: [kat] sha1
890,645 UART: [kat] SHA2-256
892,583 UART: [kat] SHA2-384
895,202 UART: [kat] SHA2-512-ACC
897,103 UART: [kat] ECC-384
902,442 UART: [kat] HMAC-384Kdf
906,872 UART: [kat] LMS
1,475,068 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,730 UART: [idev] Erasing UDS.KEYID = 0
1,505,720 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,268 UART: [idev] --
1,515,319 UART: [ldev] ++
1,515,487 UART: [ldev] CDI.KEYID = 6
1,515,850 UART: [ldev] SUBJECT.KEYID = 5
1,516,276 UART: [ldev] AUTHORITY.KEYID = 7
1,516,739 UART: [ldev] FE.KEYID = 1
1,521,761 UART: [ldev] Erasing FE.KEYID = 1
1,547,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,154 UART: [ldev] --
1,586,441 UART: [fwproc] Waiting for Commands...
1,587,310 UART: [fwproc] Received command 0x46574c44
1,588,101 UART: [fwproc] Received Image of size 114084 bytes
2,883,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,670 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,515 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,539,896 >>> mbox cmd response: failed
2,539,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,539,902 >>> mbox cmd response: failed
2,539,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,539,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,907 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,613 UART: [kat] HMAC-384Kdf
907,101 UART: [kat] LMS
1,475,297 UART: [kat] --
1,475,786 UART: [cold-reset] ++
1,476,208 UART: [fht] Storing FHT @ 0x50003400
1,478,985 UART: [idev] ++
1,479,153 UART: [idev] CDI.KEYID = 6
1,479,513 UART: [idev] SUBJECT.KEYID = 7
1,479,937 UART: [idev] UDS.KEYID = 0
1,480,282 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,823 UART: [idev] Erasing UDS.KEYID = 0
1,504,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,121 UART: [idev] --
1,514,068 UART: [ldev] ++
1,514,236 UART: [ldev] CDI.KEYID = 6
1,514,599 UART: [ldev] SUBJECT.KEYID = 5
1,515,025 UART: [ldev] AUTHORITY.KEYID = 7
1,515,488 UART: [ldev] FE.KEYID = 1
1,520,700 UART: [ldev] Erasing FE.KEYID = 1
1,545,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,627 UART: [ldev] --
1,584,996 UART: [fwproc] Waiting for Commands...
1,585,733 UART: [fwproc] Received command 0x46574c44
1,586,524 UART: [fwproc] Received Image of size 114084 bytes
2,761,619 UART: ROM Fatal Error: 0x000B0033
2,762,776 >>> mbox cmd response: failed
2,762,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,782 >>> mbox cmd response: failed
2,762,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,762,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
907,993 UART: [kat] LMS
1,476,189 UART: [kat] --
1,477,192 UART: [cold-reset] ++
1,477,738 UART: [fht] Storing FHT @ 0x50003400
1,480,323 UART: [idev] ++
1,480,491 UART: [idev] CDI.KEYID = 6
1,480,851 UART: [idev] SUBJECT.KEYID = 7
1,481,275 UART: [idev] UDS.KEYID = 0
1,481,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,255 UART: [idev] Erasing UDS.KEYID = 0
1,505,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,515 UART: [idev] --
1,515,514 UART: [ldev] ++
1,515,682 UART: [ldev] CDI.KEYID = 6
1,516,045 UART: [ldev] SUBJECT.KEYID = 5
1,516,471 UART: [ldev] AUTHORITY.KEYID = 7
1,516,934 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,393 UART: [ldev] --
1,586,804 UART: [fwproc] Waiting for Commands...
1,587,471 UART: [fwproc] Received command 0x46574c44
1,588,262 UART: [fwproc] Received Image of size 114084 bytes
2,882,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,845 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,674 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,592 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,540,435 >>> mbox cmd response: failed
2,540,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,441 >>> mbox cmd response: failed
2,540,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,927,298 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
893,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,723 UART: [kat] ++
897,875 UART: [kat] sha1
902,039 UART: [kat] SHA2-256
903,979 UART: [kat] SHA2-384
906,594 UART: [kat] SHA2-512-ACC
908,495 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,756 UART: [kat] LMS
1,171,084 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,521 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,092 UART: [idev] Erasing UDS.KEYID = 0
1,201,177 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,163 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,947 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,764 UART: [fwproc] Recv'd Img size: 114084 bytes
1,596,357 UART: ROM Fatal Error: 0x000B0033
1,597,514 >>> mbox cmd response: failed
1,597,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,520 >>> mbox cmd response: failed
1,597,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,597,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
893,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,743 UART: [kat] ++
897,895 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,754 UART: [kat] SHA2-512-ACC
908,655 UART: [kat] ECC-384
918,452 UART: [kat] HMAC-384Kdf
923,184 UART: [kat] LMS
1,171,512 UART: [kat] --
1,172,531 UART: [cold-reset] ++
1,172,969 UART: [fht] FHT @ 0x50003400
1,175,668 UART: [idev] ++
1,175,836 UART: [idev] CDI.KEYID = 6
1,176,196 UART: [idev] SUBJECT.KEYID = 7
1,176,620 UART: [idev] UDS.KEYID = 0
1,176,965 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,696 UART: [idev] Erasing UDS.KEYID = 0
1,201,741 UART: [idev] Sha1 KeyId Algorithm
1,210,341 UART: [idev] --
1,211,381 UART: [ldev] ++
1,211,549 UART: [ldev] CDI.KEYID = 6
1,211,912 UART: [ldev] SUBJECT.KEYID = 5
1,212,338 UART: [ldev] AUTHORITY.KEYID = 7
1,212,801 UART: [ldev] FE.KEYID = 1
1,217,923 UART: [ldev] Erasing FE.KEYID = 1
1,244,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,803 UART: [ldev] --
1,283,282 UART: [fwproc] Wait for Commands...
1,284,002 UART: [fwproc] Recv command 0x46574c44
1,284,730 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,447,829 >>> mbox cmd response: failed
1,447,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,835 >>> mbox cmd response: failed
1,447,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,173 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,757 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,434 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,657 UART: [idev] ++
1,175,825 UART: [idev] CDI.KEYID = 6
1,176,185 UART: [idev] SUBJECT.KEYID = 7
1,176,609 UART: [idev] UDS.KEYID = 0
1,176,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,741 UART: [idev] Erasing UDS.KEYID = 0
1,202,290 UART: [idev] Sha1 KeyId Algorithm
1,210,922 UART: [idev] --
1,212,084 UART: [ldev] ++
1,212,252 UART: [ldev] CDI.KEYID = 6
1,212,615 UART: [ldev] SUBJECT.KEYID = 5
1,213,041 UART: [ldev] AUTHORITY.KEYID = 7
1,213,504 UART: [ldev] FE.KEYID = 1
1,218,400 UART: [ldev] Erasing FE.KEYID = 1
1,244,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,822 UART: [ldev] --
1,284,315 UART: [fwproc] Wait for Commands...
1,285,125 UART: [fwproc] Recv command 0x46574c44
1,285,853 UART: [fwproc] Recv'd Img size: 114084 bytes
1,598,460 UART: ROM Fatal Error: 0x000B0033
1,599,617 >>> mbox cmd response: failed
1,599,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,623 >>> mbox cmd response: failed
1,599,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
922,849 UART: [kat] LMS
1,171,177 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,414 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,405 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,752 UART: [idev] --
1,210,794 UART: [ldev] ++
1,210,962 UART: [ldev] CDI.KEYID = 6
1,211,325 UART: [ldev] SUBJECT.KEYID = 5
1,211,751 UART: [ldev] AUTHORITY.KEYID = 7
1,212,214 UART: [ldev] FE.KEYID = 1
1,217,790 UART: [ldev] Erasing FE.KEYID = 1
1,244,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,560 UART: [ldev] --
1,283,865 UART: [fwproc] Wait for Commands...
1,284,657 UART: [fwproc] Recv command 0x46574c44
1,285,385 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,077 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,444,998 >>> mbox cmd response: failed
1,444,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,004 >>> mbox cmd response: failed
1,445,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,066 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,762 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
891,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,536 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,755 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,174,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,199,367 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,044 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 114084 bytes
1,597,380 UART: ROM Fatal Error: 0x000B0033
1,598,537 >>> mbox cmd response: failed
1,598,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,543 >>> mbox cmd response: failed
1,598,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,750 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,687 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,120 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,840 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,833 UART: [fwproc] Recv command 0x46574c44
1,282,566 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,631 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,424 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,592 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,447,400 >>> mbox cmd response: failed
1,447,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,406 >>> mbox cmd response: failed
1,447,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,447,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,204 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,890 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
905,081 UART: [kat] SHA2-512-ACC
906,982 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,647 UART: [kat] LMS
1,169,959 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,312 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,175,282 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,204 UART: [idev] Sha1 KeyId Algorithm
1,208,848 UART: [idev] --
1,209,845 UART: [ldev] ++
1,210,013 UART: [ldev] CDI.KEYID = 6
1,210,377 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,623 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,011 UART: [fwproc] Recv'd Img size: 114084 bytes
1,598,437 UART: ROM Fatal Error: 0x000B0033
1,599,594 >>> mbox cmd response: failed
1,599,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,600 >>> mbox cmd response: failed
1,599,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,754 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,370 UART: [idev] Sha1 KeyId Algorithm
1,208,178 UART: [idev] --
1,209,051 UART: [ldev] ++
1,209,219 UART: [ldev] CDI.KEYID = 6
1,209,583 UART: [ldev] SUBJECT.KEYID = 5
1,210,010 UART: [ldev] AUTHORITY.KEYID = 7
1,210,473 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,728 UART: [fwproc] Recv command 0x46574c44
1,283,461 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,383 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,439,136 >>> mbox cmd response: failed
1,439,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,142 >>> mbox cmd response: failed
1,439,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,439,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,813 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
4,877,066 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,326,959 >>> mbox cmd response: failed
15,327,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,327,933 >>> mbox cmd response: failed
15,328,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,328,507 >>> mbox cmd response: failed
Initializing fuses
2,049,733 writing to cptra_bootfsm_go
6,908,073 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,460,029 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
4,879,341 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,326,254 >>> mbox cmd response: failed
15,326,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,327,258 >>> mbox cmd response: failed
15,327,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,327,821 >>> mbox cmd response: failed
Initializing fuses
2,050,435 writing to cptra_bootfsm_go
6,909,168 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,503,692 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
5,186,800 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,499,644 >>> mbox cmd response: failed
15,500,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,500,577 >>> mbox cmd response: failed
15,500,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,501,138 >>> mbox cmd response: failed
Initializing fuses
2,049,295 writing to cptra_bootfsm_go
9,544,158 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,981,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
5,188,677 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,499,835 >>> mbox cmd response: failed
15,500,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,500,814 >>> mbox cmd response: failed
15,501,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,501,425 >>> mbox cmd response: failed
Initializing fuses
2,049,300 writing to cptra_bootfsm_go
9,546,786 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
22,980,753 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,481,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,438,842 >>> mbox cmd response: failed
11,439,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,439,782 >>> mbox cmd response: failed
11,440,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,440,351 >>> mbox cmd response: failed
Initializing fuses
2,054,741 writing to cptra_bootfsm_go
5,481,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,273,400 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,482,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,437,619 >>> mbox cmd response: failed
11,438,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,438,675 >>> mbox cmd response: failed
11,438,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,439,250 >>> mbox cmd response: failed
Initializing fuses
2,055,430 writing to cptra_bootfsm_go
5,527,986 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,325,065 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,785,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,647,210 >>> mbox cmd response: failed
11,647,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,648,323 >>> mbox cmd response: failed
11,648,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,648,885 >>> mbox cmd response: failed
Initializing fuses
2,049,101 writing to cptra_bootfsm_go
11,983,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,733,215 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
3,786,357 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,646,313 >>> mbox cmd response: failed
11,646,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,647,241 >>> mbox cmd response: failed
11,647,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,647,802 >>> mbox cmd response: failed
Initializing fuses
2,051,587 writing to cptra_bootfsm_go
11,991,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,697,665 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,464,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,409,626 >>> mbox cmd response: failed
11,410,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,410,625 >>> mbox cmd response: failed
11,410,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,411,205 >>> mbox cmd response: failed
Initializing fuses
2,059,776 writing to cptra_bootfsm_go
5,512,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,335,571 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,476,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,464,480 >>> mbox cmd response: failed
11,465,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,465,411 >>> mbox cmd response: failed
11,465,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,465,990 >>> mbox cmd response: failed
Initializing fuses
2,052,487 writing to cptra_bootfsm_go
5,509,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,339,839 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,797,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,647,906 >>> mbox cmd response: failed
11,648,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,649,165 >>> mbox cmd response: failed
11,649,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,649,728 >>> mbox cmd response: failed
Initializing fuses
2,053,931 writing to cptra_bootfsm_go
11,995,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,700,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,778,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
11,637,099 >>> mbox cmd response: failed
11,637,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,638,261 >>> mbox cmd response: failed
11,638,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,638,844 >>> mbox cmd response: failed
Initializing fuses
2,056,290 writing to cptra_bootfsm_go
12,004,504 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
22,727,837 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,949 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,881 >>> mbox cmd response: failed
1,197,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,887 >>> mbox cmd response: failed
1,197,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,993 UART: [kat] SHA2-256
881,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,039 UART: [kat] ++
886,191 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
894,954 UART: [kat] SHA2-512-ACC
896,855 UART: [kat] ECC-384
902,434 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,476,045 UART: [cold-reset] ++
1,476,505 UART: [fht] Storing FHT @ 0x50003400
1,479,220 UART: [idev] ++
1,479,388 UART: [idev] CDI.KEYID = 6
1,479,748 UART: [idev] SUBJECT.KEYID = 7
1,480,172 UART: [idev] UDS.KEYID = 0
1,480,517 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,890 UART: [idev] Erasing UDS.KEYID = 0
1,504,548 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,520,865 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,256 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,336 UART: [fwproc] Received command 0x46574c44
1,587,127 UART: [fwproc] Received Image of size 114084 bytes
2,881,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,201 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,465 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,213 >>> mbox cmd response: failed
1,197,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,219 >>> mbox cmd response: failed
1,197,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,564 >>> mbox cmd response: failed
1,197,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,570 >>> mbox cmd response: failed
1,197,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
907,953 UART: [kat] LMS
1,476,149 UART: [kat] --
1,476,980 UART: [cold-reset] ++
1,477,330 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,514,990 UART: [ldev] ++
1,515,158 UART: [ldev] CDI.KEYID = 6
1,515,521 UART: [ldev] SUBJECT.KEYID = 5
1,515,947 UART: [ldev] AUTHORITY.KEYID = 7
1,516,410 UART: [ldev] FE.KEYID = 1
1,521,690 UART: [ldev] Erasing FE.KEYID = 1
1,547,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,203 UART: [ldev] --
1,586,580 UART: [fwproc] Waiting for Commands...
1,587,389 UART: [fwproc] Received command 0x46574c44
1,588,180 UART: [fwproc] Received Image of size 114084 bytes
2,883,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,969 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,436 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,148 >>> mbox cmd response: failed
1,199,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,154 >>> mbox cmd response: failed
1,199,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,584 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,739 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,198,027 >>> mbox cmd response: failed
1,198,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,033 >>> mbox cmd response: failed
1,198,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
892,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,093 UART: [kat] ++
897,245 UART: [kat] sha1
901,563 UART: [kat] SHA2-256
903,503 UART: [kat] SHA2-384
906,224 UART: [kat] SHA2-512-ACC
908,125 UART: [kat] ECC-384
917,888 UART: [kat] HMAC-384Kdf
922,660 UART: [kat] LMS
1,170,988 UART: [kat] --
1,171,547 UART: [cold-reset] ++
1,172,117 UART: [fht] FHT @ 0x50003400
1,174,610 UART: [idev] ++
1,174,778 UART: [idev] CDI.KEYID = 6
1,175,138 UART: [idev] SUBJECT.KEYID = 7
1,175,562 UART: [idev] UDS.KEYID = 0
1,175,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,231 UART: [idev] --
1,210,201 UART: [ldev] ++
1,210,369 UART: [ldev] CDI.KEYID = 6
1,210,732 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,914 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,314 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,216 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,198,035 >>> mbox cmd response: failed
1,198,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,041 >>> mbox cmd response: failed
1,198,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,079 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,804 >>> mbox cmd response: failed
1,197,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,810 >>> mbox cmd response: failed
1,197,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,736 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,531 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,525 UART: [idev] ++
1,175,693 UART: [idev] CDI.KEYID = 6
1,176,053 UART: [idev] SUBJECT.KEYID = 7
1,176,477 UART: [idev] UDS.KEYID = 0
1,176,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,223 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,209,926 UART: [idev] --
1,211,078 UART: [ldev] ++
1,211,246 UART: [ldev] CDI.KEYID = 6
1,211,609 UART: [ldev] SUBJECT.KEYID = 5
1,212,035 UART: [ldev] AUTHORITY.KEYID = 7
1,212,498 UART: [ldev] FE.KEYID = 1
1,217,904 UART: [ldev] Erasing FE.KEYID = 1
1,244,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,177 UART: [fwproc] Recv command 0x46574c44
1,284,905 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,773 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,195,996 >>> mbox cmd response: failed
1,195,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,002 >>> mbox cmd response: failed
1,196,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,792 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,454 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,261 >>> mbox cmd response: failed
1,197,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,267 >>> mbox cmd response: failed
1,197,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,354 UART: [kat] LMS
1,168,666 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,174,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,553 UART: [idev] Erasing UDS.KEYID = 0
1,198,153 UART: [idev] Sha1 KeyId Algorithm
1,207,025 UART: [idev] --
1,208,130 UART: [ldev] ++
1,208,298 UART: [ldev] CDI.KEYID = 6
1,208,662 UART: [ldev] SUBJECT.KEYID = 5
1,209,089 UART: [ldev] AUTHORITY.KEYID = 7
1,209,552 UART: [ldev] FE.KEYID = 1
1,214,820 UART: [ldev] Erasing FE.KEYID = 1
1,240,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,912 UART: [ldev] --
1,280,400 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,631,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,156 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,197,205 >>> mbox cmd response: failed
1,197,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,211 >>> mbox cmd response: failed
1,197,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,314 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,200,464 >>> mbox cmd response: failed
1,200,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,470 >>> mbox cmd response: failed
1,200,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,993 UART: [state] LifecycleState = Unprovisioned
85,648 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
891,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,150 UART: [kat] ++
895,302 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,174,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,188 UART: [idev] Sha1 KeyId Algorithm
1,208,998 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,591 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,685 UART: [ldev] Erasing FE.KEYID = 1
1,243,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,973 UART: [ldev] --
1,283,265 UART: [fwproc] Wait for Commands...
1,284,042 UART: [fwproc] Recv command 0x46574c44
1,284,775 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,883 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,199,420 >>> mbox cmd response: failed
1,199,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,426 >>> mbox cmd response: failed
1,199,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,593 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
4,880,047 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,997,798 >>> mbox cmd response: failed
13,998,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,998,843 >>> mbox cmd response: failed
13,999,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,999,406 >>> mbox cmd response: failed
Initializing fuses
2,058,785 writing to cptra_bootfsm_go
6,920,873 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,534,142 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
4,882,694 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,975,809 >>> mbox cmd response: failed
13,976,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,976,782 >>> mbox cmd response: failed
13,977,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,977,347 >>> mbox cmd response: failed
Initializing fuses
2,058,095 writing to cptra_bootfsm_go
6,920,411 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,505,185 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
5,185,968 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,175,661 >>> mbox cmd response: failed
14,176,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,176,607 >>> mbox cmd response: failed
14,176,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,177,179 >>> mbox cmd response: failed
Initializing fuses
2,053,261 writing to cptra_bootfsm_go
10,867,685 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,323,843 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
5,180,340 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
14,150,299 >>> mbox cmd response: failed
14,150,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,265 >>> mbox cmd response: failed
14,151,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,831 >>> mbox cmd response: failed
Initializing fuses
2,058,434 writing to cptra_bootfsm_go
10,896,516 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,348,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,461,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,405,404 >>> mbox cmd response: failed
10,405,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,406,291 >>> mbox cmd response: failed
10,406,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,406,858 >>> mbox cmd response: failed
Initializing fuses
2,050,755 writing to cptra_bootfsm_go
5,526,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,396,015 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,462,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,433,401 >>> mbox cmd response: failed
10,434,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,434,494 >>> mbox cmd response: failed
10,434,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,435,088 >>> mbox cmd response: failed
Initializing fuses
2,050,683 writing to cptra_bootfsm_go
5,506,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,357,848 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,793,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,638,259 >>> mbox cmd response: failed
10,638,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,639,133 >>> mbox cmd response: failed
10,639,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,639,694 >>> mbox cmd response: failed
Initializing fuses
2,055,954 writing to cptra_bootfsm_go
13,019,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,771,659 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,778,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,624,718 >>> mbox cmd response: failed
10,625,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,620 >>> mbox cmd response: failed
10,625,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,183 >>> mbox cmd response: failed
Initializing fuses
2,058,066 writing to cptra_bootfsm_go
13,012,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,756,423 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,465,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,460,289 >>> mbox cmd response: failed
10,460,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,255 >>> mbox cmd response: failed
10,461,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,820 >>> mbox cmd response: failed
Initializing fuses
2,051,688 writing to cptra_bootfsm_go
5,520,134 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,342,855 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,443,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,378,235 >>> mbox cmd response: failed
10,378,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,379,179 >>> mbox cmd response: failed
10,379,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,379,761 >>> mbox cmd response: failed
Initializing fuses
2,051,276 writing to cptra_bootfsm_go
5,523,283 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,414,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,792,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,646,037 >>> mbox cmd response: failed
10,646,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,646,987 >>> mbox cmd response: failed
10,647,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,647,615 >>> mbox cmd response: failed
Initializing fuses
2,058,809 writing to cptra_bootfsm_go
13,001,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,755,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,783,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,624,212 >>> mbox cmd response: failed
10,624,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,154 >>> mbox cmd response: failed
10,625,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,720 >>> mbox cmd response: failed
Initializing fuses
2,055,104 writing to cptra_bootfsm_go
13,036,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,776,787 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,823 >>> mbox cmd response: failed
1,178,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,829 >>> mbox cmd response: failed
1,178,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,569 UART: [kat] SHA2-256
881,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,615 UART: [kat] ++
885,767 UART: [kat] sha1
889,951 UART: [kat] SHA2-256
891,889 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
902,426 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,538 UART: [idev] ++
1,479,706 UART: [idev] CDI.KEYID = 6
1,480,066 UART: [idev] SUBJECT.KEYID = 7
1,480,490 UART: [idev] UDS.KEYID = 0
1,480,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,478 UART: [idev] Erasing UDS.KEYID = 0
1,505,440 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,114 UART: [idev] --
1,515,093 UART: [ldev] ++
1,515,261 UART: [ldev] CDI.KEYID = 6
1,515,624 UART: [ldev] SUBJECT.KEYID = 5
1,516,050 UART: [ldev] AUTHORITY.KEYID = 7
1,516,513 UART: [ldev] FE.KEYID = 1
1,521,487 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,681 UART: [fwproc] Waiting for Commands...
1,586,400 UART: [fwproc] Received command 0x46574c44
1,587,191 UART: [fwproc] Received Image of size 114084 bytes
2,882,016 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,993 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,241 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,829 >>> mbox cmd response: failed
1,180,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,835 >>> mbox cmd response: failed
1,180,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,619 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,673 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,560 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,322 >>> mbox cmd response: failed
1,180,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,328 >>> mbox cmd response: failed
1,180,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,854 UART: [kat] SHA2-256
892,792 UART: [kat] SHA2-384
895,425 UART: [kat] SHA2-512-ACC
897,326 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,593 UART: [kat] LMS
1,475,789 UART: [kat] --
1,476,628 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,480,101 UART: [idev] ++
1,480,269 UART: [idev] CDI.KEYID = 6
1,480,629 UART: [idev] SUBJECT.KEYID = 7
1,481,053 UART: [idev] UDS.KEYID = 0
1,481,398 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,287 UART: [idev] Erasing UDS.KEYID = 0
1,505,979 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,746 UART: [ldev] ++
1,515,914 UART: [ldev] CDI.KEYID = 6
1,516,277 UART: [ldev] SUBJECT.KEYID = 5
1,516,703 UART: [ldev] AUTHORITY.KEYID = 7
1,517,166 UART: [ldev] FE.KEYID = 1
1,522,542 UART: [ldev] Erasing FE.KEYID = 1
1,548,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,581 UART: [ldev] --
1,586,976 UART: [fwproc] Waiting for Commands...
1,587,741 UART: [fwproc] Received command 0x46574c44
1,588,532 UART: [fwproc] Received Image of size 114084 bytes
2,882,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,932 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,552 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,212 >>> mbox cmd response: failed
1,180,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,218 >>> mbox cmd response: failed
1,180,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,164 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,779 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,178,045 >>> mbox cmd response: failed
1,178,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,051 >>> mbox cmd response: failed
1,178,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
893,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,833 UART: [kat] ++
897,985 UART: [kat] sha1
902,095 UART: [kat] SHA2-256
904,035 UART: [kat] SHA2-384
906,832 UART: [kat] SHA2-512-ACC
908,733 UART: [kat] ECC-384
918,122 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,243 UART: [fht] FHT @ 0x50003400
1,174,762 UART: [idev] ++
1,174,930 UART: [idev] CDI.KEYID = 6
1,175,290 UART: [idev] SUBJECT.KEYID = 7
1,175,714 UART: [idev] UDS.KEYID = 0
1,176,059 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,201,037 UART: [idev] Sha1 KeyId Algorithm
1,209,407 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,281,942 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,948 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,179,019 >>> mbox cmd response: failed
1,179,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,025 >>> mbox cmd response: failed
1,179,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,191 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,480 >>> mbox cmd response: failed
1,180,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,486 >>> mbox cmd response: failed
1,180,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
893,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,252 UART: [kat] ++
897,404 UART: [kat] sha1
901,662 UART: [kat] SHA2-256
903,602 UART: [kat] SHA2-384
906,231 UART: [kat] SHA2-512-ACC
908,132 UART: [kat] ECC-384
917,551 UART: [kat] HMAC-384Kdf
922,261 UART: [kat] LMS
1,170,589 UART: [kat] --
1,171,476 UART: [cold-reset] ++
1,171,844 UART: [fht] FHT @ 0x50003400
1,174,671 UART: [idev] ++
1,174,839 UART: [idev] CDI.KEYID = 6
1,175,199 UART: [idev] SUBJECT.KEYID = 7
1,175,623 UART: [idev] UDS.KEYID = 0
1,175,968 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,497 UART: [idev] Erasing UDS.KEYID = 0
1,200,726 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,210,014 UART: [ldev] ++
1,210,182 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,971 UART: [ldev] AUTHORITY.KEYID = 7
1,211,434 UART: [ldev] FE.KEYID = 1
1,216,984 UART: [ldev] Erasing FE.KEYID = 1
1,243,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,672 UART: [ldev] --
1,282,957 UART: [fwproc] Wait for Commands...
1,283,699 UART: [fwproc] Recv command 0x46574c44
1,284,427 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,697 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,738 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,850 >>> mbox cmd response: failed
1,180,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,856 >>> mbox cmd response: failed
1,180,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,438 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,207 >>> mbox cmd response: failed
1,180,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,213 >>> mbox cmd response: failed
1,180,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,219 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,528 UART: [kat] SHA2-512-ACC
906,429 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,777 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,862 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,744 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,091 >>> mbox cmd response: failed
1,180,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,097 >>> mbox cmd response: failed
1,180,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,324 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,386 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,978 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,212 >>> mbox cmd response: failed
1,180,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,218 >>> mbox cmd response: failed
1,180,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,405 UART: [kat] SHA2-256
890,955 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,084 UART: [kat] ++
895,236 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,602 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,174,096 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,702 UART: [idev] --
1,208,843 UART: [ldev] ++
1,209,011 UART: [ldev] CDI.KEYID = 6
1,209,375 UART: [ldev] SUBJECT.KEYID = 5
1,209,802 UART: [ldev] AUTHORITY.KEYID = 7
1,210,265 UART: [ldev] FE.KEYID = 1
1,215,213 UART: [ldev] Erasing FE.KEYID = 1
1,242,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,329 UART: [ldev] --
1,281,735 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,093 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,571 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,176 >>> mbox cmd response: failed
1,180,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,182 >>> mbox cmd response: failed
1,180,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,009 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,096 UART:
192,464 UART: Running Caliptra ROM ...
193,656 UART:
193,804 UART: [state] CFI Enabled
263,631 UART: [state] LifecycleState = Manufacturing
265,543 UART: [state] DebugLocked = No
266,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,640 UART: [kat] SHA2-256
441,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,808 UART: [kat] ++
452,405 UART: [kat] sha1
464,252 UART: [kat] SHA2-256
466,982 UART: [kat] SHA2-384
471,830 UART: [kat] SHA2-512-ACC
474,227 UART: [kat] ECC-384
2,767,978 UART: [kat] HMAC-384Kdf
2,801,024 UART: [kat] LMS
3,991,321 UART: [kat] --
3,996,097 UART: [cold-reset] ++
3,998,418 UART: [fht] Storing FHT @ 0x50003400
4,009,041 UART: [idev] ++
4,009,617 UART: [idev] CDI.KEYID = 6
4,010,598 UART: [idev] SUBJECT.KEYID = 7
4,011,820 UART: [idev] UDS.KEYID = 0
4,017,334 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,160,680 UART: [idev] Erasing UDS.KEYID = 0
7,346,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,244 UART: [idev] --
7,371,132 UART: [ldev] ++
7,371,703 UART: [ldev] CDI.KEYID = 6
7,372,688 UART: [ldev] SUBJECT.KEYID = 5
7,373,860 UART: [ldev] AUTHORITY.KEYID = 7
7,375,152 UART: [ldev] FE.KEYID = 1
7,400,848 UART: [ldev] Erasing FE.KEYID = 1
10,734,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,894 UART: [ldev] --
13,117,040 UART: [fwproc] Waiting for Commands...
13,118,873 UART: [fwproc] Received command 0x46574c44
13,121,059 UART: [fwproc] Received Image of size 113760 bytes
13,185,350 UART: ROM Fatal Error: 0x000B0003
13,188,869 >>> mbox cmd response: failed
13,189,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,189,558 >>> mbox cmd response: failed
13,189,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,190,119 >>> mbox cmd response: failed
Initializing fuses
2,051,858 writing to cptra_bootfsm_go
2,241,180 UART:
2,241,545 UART: Running Caliptra ROM ...
2,242,592 UART:
2,242,744 UART: [state] CFI Enabled
2,308,544 UART: [state] LifecycleState = Manufacturing
2,310,445 UART: [state] DebugLocked = No
2,312,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,317,950 UART: [kat] SHA2-256
2,487,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,175 UART: [kat] ++
2,498,636 UART: [kat] sha1
2,509,145 UART: [kat] SHA2-256
2,511,843 UART: [kat] SHA2-384
2,516,716 UART: [kat] SHA2-512-ACC
2,519,124 UART: [kat] ECC-384
4,807,890 UART: [kat] HMAC-384Kdf
4,839,199 UART: [kat] LMS
6,029,501 UART: [kat] --
6,034,905 UART: [cold-reset] ++
6,037,491 UART: [fht] Storing FHT @ 0x50003400
6,049,840 UART: [idev] ++
6,050,413 UART: [idev] CDI.KEYID = 6
6,051,301 UART: [idev] SUBJECT.KEYID = 7
6,052,574 UART: [idev] UDS.KEYID = 0
6,055,454 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,198,661 UART: [idev] Erasing UDS.KEYID = 0
9,387,763 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,882 UART: [idev] --
9,413,483 UART: [ldev] ++
9,414,071 UART: [ldev] CDI.KEYID = 6
9,415,011 UART: [ldev] SUBJECT.KEYID = 5
9,416,269 UART: [ldev] AUTHORITY.KEYID = 7
9,417,512 UART: [ldev] FE.KEYID = 1
9,462,805 UART: [ldev] Erasing FE.KEYID = 1
12,794,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,873 UART: [ldev] --
15,159,138 UART: [fwproc] Waiting for Commands...
15,162,102 UART: [fwproc] Received command 0x46574c44
15,164,287 UART: [fwproc] Received Image of size 113760 bytes
19,250,154 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,329,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,398,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,715,568 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,813,099 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,944,050 >>> mbox cmd response: failed
12,944,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,945,306 >>> mbox cmd response: failed
12,945,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,945,871 >>> mbox cmd response: failed
Initializing fuses
2,057,177 writing to cptra_bootfsm_go
5,860,708 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,963,094 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,776 UART:
193,556 UART: Running Caliptra ROM ...
194,690 UART:
603,951 UART: [state] CFI Enabled
617,884 UART: [state] LifecycleState = Manufacturing
619,830 UART: [state] DebugLocked = No
622,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,748 UART: [kat] SHA2-256
797,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,068 UART: [kat] ++
808,569 UART: [kat] sha1
819,980 UART: [kat] SHA2-256
822,673 UART: [kat] SHA2-384
827,652 UART: [kat] SHA2-512-ACC
829,999 UART: [kat] ECC-384
3,115,072 UART: [kat] HMAC-384Kdf
3,127,221 UART: [kat] LMS
4,317,345 UART: [kat] --
4,321,609 UART: [cold-reset] ++
4,323,110 UART: [fht] Storing FHT @ 0x50003400
4,334,644 UART: [idev] ++
4,335,210 UART: [idev] CDI.KEYID = 6
4,336,227 UART: [idev] SUBJECT.KEYID = 7
4,337,384 UART: [idev] UDS.KEYID = 0
4,343,296 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,486,920 UART: [idev] Erasing UDS.KEYID = 0
7,628,011 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,994 UART: [idev] --
7,653,877 UART: [ldev] ++
7,654,518 UART: [ldev] CDI.KEYID = 6
7,655,433 UART: [ldev] SUBJECT.KEYID = 5
7,656,650 UART: [ldev] AUTHORITY.KEYID = 7
7,657,885 UART: [ldev] FE.KEYID = 1
7,668,698 UART: [ldev] Erasing FE.KEYID = 1
10,953,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,014 UART: [ldev] --
13,315,094 UART: [fwproc] Waiting for Commands...
13,317,198 UART: [fwproc] Received command 0x46574c44
13,319,383 UART: [fwproc] Received Image of size 113760 bytes
13,380,922 UART: ROM Fatal Error: 0x000B0003
13,384,429 >>> mbox cmd response: failed
13,384,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,169 >>> mbox cmd response: failed
13,385,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,727 >>> mbox cmd response: failed
Initializing fuses
2,062,780 writing to cptra_bootfsm_go
2,252,062 UART:
2,252,406 UART: Running Caliptra ROM ...
2,253,475 UART:
7,091,104 UART: [state] CFI Enabled
7,103,923 UART: [state] LifecycleState = Manufacturing
7,105,902 UART: [state] DebugLocked = No
7,107,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,113,104 UART: [kat] SHA2-256
7,282,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,293,408 UART: [kat] ++
7,293,951 UART: [kat] sha1
7,303,852 UART: [kat] SHA2-256
7,306,549 UART: [kat] SHA2-384
7,313,566 UART: [kat] SHA2-512-ACC
7,315,923 UART: [kat] ECC-384
9,598,628 UART: [kat] HMAC-384Kdf
9,610,101 UART: [kat] LMS
10,800,194 UART: [kat] --
10,806,322 UART: [cold-reset] ++
10,808,959 UART: [fht] Storing FHT @ 0x50003400
10,820,124 UART: [idev] ++
10,820,732 UART: [idev] CDI.KEYID = 6
10,821,647 UART: [idev] SUBJECT.KEYID = 7
10,822,923 UART: [idev] UDS.KEYID = 0
10,825,594 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,968,442 UART: [idev] Erasing UDS.KEYID = 0
14,108,688 UART: [idev] Using Sha1 for KeyId Algorithm
14,130,606 UART: [idev] --
14,134,924 UART: [ldev] ++
14,135,550 UART: [ldev] CDI.KEYID = 6
14,136,457 UART: [ldev] SUBJECT.KEYID = 5
14,137,708 UART: [ldev] AUTHORITY.KEYID = 7
14,138,948 UART: [ldev] FE.KEYID = 1
14,150,507 UART: [ldev] Erasing FE.KEYID = 1
17,439,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,731,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,746,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,761,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,775,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,793,785 UART: [ldev] --
19,798,026 UART: [fwproc] Waiting for Commands...
19,800,290 UART: [fwproc] Received command 0x46574c44
19,802,477 UART: [fwproc] Received Image of size 113760 bytes
23,872,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,950,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,019,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,335,510 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,131,735 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,119,265 >>> mbox cmd response: failed
13,119,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,213 >>> mbox cmd response: failed
13,120,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,778 >>> mbox cmd response: failed
Initializing fuses
2,049,686 writing to cptra_bootfsm_go
10,876,005 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,851,181 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,343 UART:
192,713 UART: Running Caliptra ROM ...
193,827 UART:
193,972 UART: [state] CFI Enabled
264,030 UART: [state] LifecycleState = Manufacturing
265,899 UART: [state] DebugLocked = No
268,769 UART: [state] WD Timer not started. Device not locked for debugging
271,835 UART: [kat] SHA2-256
450,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,559 UART: [kat] ++
463,101 UART: [kat] sha1
474,906 UART: [kat] SHA2-256
477,967 UART: [kat] SHA2-384
482,593 UART: [kat] SHA2-512-ACC
485,590 UART: [kat] ECC-384
2,951,111 UART: [kat] HMAC-384Kdf
2,972,304 UART: [kat] LMS
3,501,752 UART: [kat] --
3,506,989 UART: [cold-reset] ++
3,508,540 UART: [fht] FHT @ 0x50003400
3,519,575 UART: [idev] ++
3,520,137 UART: [idev] CDI.KEYID = 6
3,521,020 UART: [idev] SUBJECT.KEYID = 7
3,522,235 UART: [idev] UDS.KEYID = 0
3,525,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,668,739 UART: [idev] Erasing UDS.KEYID = 0
6,029,633 UART: [idev] Sha1 KeyId Algorithm
6,052,942 UART: [idev] --
6,057,189 UART: [ldev] ++
6,057,771 UART: [ldev] CDI.KEYID = 6
6,058,687 UART: [ldev] SUBJECT.KEYID = 5
6,059,849 UART: [ldev] AUTHORITY.KEYID = 7
6,061,147 UART: [ldev] FE.KEYID = 1
6,101,495 UART: [ldev] Erasing FE.KEYID = 1
8,604,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,943 UART: [ldev] --
10,417,279 UART: [fwproc] Wait for Commands...
10,419,107 UART: [fwproc] Recv command 0x46574c44
10,421,202 UART: [fwproc] Recv'd Img size: 114084 bytes
10,483,034 UART: ROM Fatal Error: 0x000B0003
10,486,127 >>> mbox cmd response: failed
10,486,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,486,867 >>> mbox cmd response: failed
10,487,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,427 >>> mbox cmd response: failed
Initializing fuses
2,055,611 writing to cptra_bootfsm_go
2,244,982 UART:
2,245,354 UART: Running Caliptra ROM ...
2,246,491 UART:
2,246,660 UART: [state] CFI Enabled
2,319,690 UART: [state] LifecycleState = Manufacturing
2,321,570 UART: [state] DebugLocked = No
2,323,339 UART: [state] WD Timer not started. Device not locked for debugging
2,327,528 UART: [kat] SHA2-256
2,506,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,233 UART: [kat] ++
2,518,693 UART: [kat] sha1
2,529,638 UART: [kat] SHA2-256
2,532,688 UART: [kat] SHA2-384
2,537,983 UART: [kat] SHA2-512-ACC
2,540,935 UART: [kat] ECC-384
5,004,806 UART: [kat] HMAC-384Kdf
5,026,493 UART: [kat] LMS
5,555,920 UART: [kat] --
5,560,759 UART: [cold-reset] ++
5,562,066 UART: [fht] FHT @ 0x50003400
5,572,361 UART: [idev] ++
5,572,924 UART: [idev] CDI.KEYID = 6
5,573,805 UART: [idev] SUBJECT.KEYID = 7
5,575,016 UART: [idev] UDS.KEYID = 0
5,577,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,721,223 UART: [idev] Erasing UDS.KEYID = 0
8,081,261 UART: [idev] Sha1 KeyId Algorithm
8,104,877 UART: [idev] --
8,107,848 UART: [ldev] ++
8,108,418 UART: [ldev] CDI.KEYID = 6
8,109,306 UART: [ldev] SUBJECT.KEYID = 5
8,110,386 UART: [ldev] AUTHORITY.KEYID = 7
8,111,741 UART: [ldev] FE.KEYID = 1
8,156,098 UART: [ldev] Erasing FE.KEYID = 1
10,657,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,373,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,389,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,405,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,421,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,016 UART: [ldev] --
12,446,455 UART: [fwproc] Wait for Commands...
12,448,130 UART: [fwproc] Recv command 0x46574c44
12,450,174 UART: [fwproc] Recv'd Img size: 114084 bytes
15,882,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,956,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,025,359 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,341,774 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,386,865 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,283,635 >>> mbox cmd response: failed
10,284,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,284,707 >>> mbox cmd response: failed
10,284,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,285,260 >>> mbox cmd response: failed
Initializing fuses
2,050,295 writing to cptra_bootfsm_go
5,426,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,142,555 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,687 UART:
193,038 UART: Running Caliptra ROM ...
194,250 UART:
603,736 UART: [state] CFI Enabled
620,584 UART: [state] LifecycleState = Manufacturing
622,416 UART: [state] DebugLocked = No
624,334 UART: [state] WD Timer not started. Device not locked for debugging
628,263 UART: [kat] SHA2-256
807,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,932 UART: [kat] ++
819,469 UART: [kat] sha1
829,275 UART: [kat] SHA2-256
832,301 UART: [kat] SHA2-384
836,874 UART: [kat] SHA2-512-ACC
839,805 UART: [kat] ECC-384
3,279,521 UART: [kat] HMAC-384Kdf
3,293,308 UART: [kat] LMS
3,822,793 UART: [kat] --
3,828,513 UART: [cold-reset] ++
3,830,120 UART: [fht] FHT @ 0x50003400
3,840,664 UART: [idev] ++
3,841,270 UART: [idev] CDI.KEYID = 6
3,842,190 UART: [idev] SUBJECT.KEYID = 7
3,843,356 UART: [idev] UDS.KEYID = 0
3,846,243 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,614 UART: [idev] Erasing UDS.KEYID = 0
6,312,750 UART: [idev] Sha1 KeyId Algorithm
6,334,891 UART: [idev] --
6,338,474 UART: [ldev] ++
6,339,056 UART: [ldev] CDI.KEYID = 6
6,339,949 UART: [ldev] SUBJECT.KEYID = 5
6,341,165 UART: [ldev] AUTHORITY.KEYID = 7
6,342,401 UART: [ldev] FE.KEYID = 1
6,353,024 UART: [ldev] Erasing FE.KEYID = 1
8,824,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,277 UART: [ldev] --
10,615,164 UART: [fwproc] Wait for Commands...
10,616,942 UART: [fwproc] Recv command 0x46574c44
10,619,038 UART: [fwproc] Recv'd Img size: 114084 bytes
10,681,270 UART: ROM Fatal Error: 0x000B0003
10,684,380 >>> mbox cmd response: failed
10,684,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,685,036 >>> mbox cmd response: failed
10,685,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,685,636 >>> mbox cmd response: failed
Initializing fuses
2,055,134 writing to cptra_bootfsm_go
2,244,435 UART:
2,244,770 UART: Running Caliptra ROM ...
2,245,910 UART:
9,776,975 UART: [state] CFI Enabled
9,793,729 UART: [state] LifecycleState = Manufacturing
9,795,644 UART: [state] DebugLocked = No
9,796,932 UART: [state] WD Timer not started. Device not locked for debugging
9,800,627 UART: [kat] SHA2-256
9,979,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,991,348 UART: [kat] ++
9,991,895 UART: [kat] sha1
10,002,898 UART: [kat] SHA2-256
10,005,916 UART: [kat] SHA2-384
10,012,282 UART: [kat] SHA2-512-ACC
10,015,282 UART: [kat] ECC-384
12,455,740 UART: [kat] HMAC-384Kdf
12,468,453 UART: [kat] LMS
12,997,918 UART: [kat] --
13,003,927 UART: [cold-reset] ++
13,005,053 UART: [fht] FHT @ 0x50003400
13,016,143 UART: [idev] ++
13,016,735 UART: [idev] CDI.KEYID = 6
13,017,650 UART: [idev] SUBJECT.KEYID = 7
13,018,865 UART: [idev] UDS.KEYID = 0
13,021,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,165,073 UART: [idev] Erasing UDS.KEYID = 0
15,489,312 UART: [idev] Sha1 KeyId Algorithm
15,511,027 UART: [idev] --
15,514,845 UART: [ldev] ++
15,515,421 UART: [ldev] CDI.KEYID = 6
15,516,304 UART: [ldev] SUBJECT.KEYID = 5
15,517,516 UART: [ldev] AUTHORITY.KEYID = 7
15,518,749 UART: [ldev] FE.KEYID = 1
15,529,312 UART: [ldev] Erasing FE.KEYID = 1
18,007,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,724,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,740,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,756,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,792,068 UART: [ldev] --
19,797,592 UART: [fwproc] Wait for Commands...
19,800,508 UART: [fwproc] Recv command 0x46574c44
19,802,553 UART: [fwproc] Recv'd Img size: 114084 bytes
23,235,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,307,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,375,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,693,001 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,699,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,465,936 >>> mbox cmd response: failed
10,466,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,467,066 >>> mbox cmd response: failed
10,467,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,467,705 >>> mbox cmd response: failed
Initializing fuses
2,056,806 writing to cptra_bootfsm_go
13,101,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,697,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,167 UART:
192,541 UART: Running Caliptra ROM ...
193,688 UART:
193,834 UART: [state] CFI Enabled
262,576 UART: [state] LifecycleState = Manufacturing
264,980 UART: [state] DebugLocked = No
266,870 UART: [state] WD Timer not started. Device not locked for debugging
272,221 UART: [kat] SHA2-256
462,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,836 UART: [kat] ++
473,327 UART: [kat] sha1
484,396 UART: [kat] SHA2-256
487,417 UART: [kat] SHA2-384
493,397 UART: [kat] SHA2-512-ACC
495,956 UART: [kat] ECC-384
2,948,051 UART: [kat] HMAC-384Kdf
2,964,296 UART: [kat] LMS
3,496,052 UART: [kat] --
3,499,730 UART: [cold-reset] ++
3,502,264 UART: [fht] FHT @ 0x50003400
3,514,871 UART: [idev] ++
3,515,549 UART: [idev] CDI.KEYID = 6
3,516,542 UART: [idev] SUBJECT.KEYID = 7
3,517,706 UART: [idev] UDS.KEYID = 0
3,523,513 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,521 UART: [idev] Erasing UDS.KEYID = 0
6,022,883 UART: [idev] Sha1 KeyId Algorithm
6,045,965 UART: [idev] --
6,051,482 UART: [ldev] ++
6,052,166 UART: [ldev] CDI.KEYID = 6
6,053,110 UART: [ldev] SUBJECT.KEYID = 5
6,054,218 UART: [ldev] AUTHORITY.KEYID = 7
6,055,507 UART: [ldev] FE.KEYID = 1
6,093,462 UART: [ldev] Erasing FE.KEYID = 1
8,601,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,969 UART: [ldev] --
10,405,967 UART: [fwproc] Wait for Commands...
10,408,445 UART: [fwproc] Recv command 0x46574c44
10,410,707 UART: [fwproc] Recv'd Img size: 114084 bytes
10,497,995 UART: ROM Fatal Error: 0x000B0003
10,501,693 >>> mbox cmd response: failed
10,502,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,434 >>> mbox cmd response: failed
10,502,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,502,996 >>> mbox cmd response: failed
Initializing fuses
2,050,375 writing to cptra_bootfsm_go
2,239,689 UART:
2,240,034 UART: Running Caliptra ROM ...
2,241,171 UART:
2,241,333 UART: [state] CFI Enabled
2,297,835 UART: [state] LifecycleState = Manufacturing
2,300,228 UART: [state] DebugLocked = No
2,302,370 UART: [state] WD Timer not started. Device not locked for debugging
2,307,098 UART: [kat] SHA2-256
2,496,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,507,762 UART: [kat] ++
2,508,228 UART: [kat] sha1
2,519,798 UART: [kat] SHA2-256
2,522,837 UART: [kat] SHA2-384
2,528,509 UART: [kat] SHA2-512-ACC
2,531,132 UART: [kat] ECC-384
4,985,153 UART: [kat] HMAC-384Kdf
5,006,077 UART: [kat] LMS
5,537,832 UART: [kat] --
5,541,499 UART: [cold-reset] ++
5,542,893 UART: [fht] FHT @ 0x50003400
5,553,871 UART: [idev] ++
5,554,544 UART: [idev] CDI.KEYID = 6
5,555,558 UART: [idev] SUBJECT.KEYID = 7
5,556,715 UART: [idev] UDS.KEYID = 0
5,559,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,702,917 UART: [idev] Erasing UDS.KEYID = 0
8,067,972 UART: [idev] Sha1 KeyId Algorithm
8,090,043 UART: [idev] --
8,094,838 UART: [ldev] ++
8,095,532 UART: [ldev] CDI.KEYID = 6
8,096,453 UART: [ldev] SUBJECT.KEYID = 5
8,097,614 UART: [ldev] AUTHORITY.KEYID = 7
8,098,848 UART: [ldev] FE.KEYID = 1
8,135,043 UART: [ldev] Erasing FE.KEYID = 1
10,641,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,254 UART: [ldev] --
12,450,516 UART: [fwproc] Wait for Commands...
12,453,102 UART: [fwproc] Recv command 0x46574c44
12,455,368 UART: [fwproc] Recv'd Img size: 114084 bytes
15,932,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,132,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,673,990 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,059 writing to cptra_bootfsm_go
3,440,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,304,027 >>> mbox cmd response: failed
10,304,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,305,043 >>> mbox cmd response: failed
10,305,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,305,609 >>> mbox cmd response: failed
Initializing fuses
2,055,264 writing to cptra_bootfsm_go
5,483,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,819,032 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,611 UART:
192,968 UART: Running Caliptra ROM ...
194,127 UART:
603,931 UART: [state] CFI Enabled
615,757 UART: [state] LifecycleState = Manufacturing
618,078 UART: [state] DebugLocked = No
619,292 UART: [state] WD Timer not started. Device not locked for debugging
623,765 UART: [kat] SHA2-256
813,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,395 UART: [kat] ++
824,904 UART: [kat] sha1
836,968 UART: [kat] SHA2-256
839,974 UART: [kat] SHA2-384
847,356 UART: [kat] SHA2-512-ACC
849,908 UART: [kat] ECC-384
3,290,051 UART: [kat] HMAC-384Kdf
3,302,827 UART: [kat] LMS
3,834,691 UART: [kat] --
3,838,917 UART: [cold-reset] ++
3,840,370 UART: [fht] FHT @ 0x50003400
3,850,979 UART: [idev] ++
3,851,657 UART: [idev] CDI.KEYID = 6
3,852,673 UART: [idev] SUBJECT.KEYID = 7
3,853,831 UART: [idev] UDS.KEYID = 0
3,859,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,003,420 UART: [idev] Erasing UDS.KEYID = 0
6,327,378 UART: [idev] Sha1 KeyId Algorithm
6,349,300 UART: [idev] --
6,354,816 UART: [ldev] ++
6,355,496 UART: [ldev] CDI.KEYID = 6
6,356,428 UART: [ldev] SUBJECT.KEYID = 5
6,357,590 UART: [ldev] AUTHORITY.KEYID = 7
6,358,822 UART: [ldev] FE.KEYID = 1
6,367,903 UART: [ldev] Erasing FE.KEYID = 1
8,847,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,453 UART: [ldev] --
10,638,486 UART: [fwproc] Wait for Commands...
10,640,323 UART: [fwproc] Recv command 0x46574c44
10,642,585 UART: [fwproc] Recv'd Img size: 114084 bytes
10,733,841 UART: ROM Fatal Error: 0x000B0003
10,737,523 >>> mbox cmd response: failed
10,737,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,738,281 >>> mbox cmd response: failed
10,738,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,738,834 >>> mbox cmd response: failed
Initializing fuses
2,052,865 writing to cptra_bootfsm_go
2,242,183 UART:
2,242,537 UART: Running Caliptra ROM ...
2,243,675 UART:
9,731,955 UART: [state] CFI Enabled
9,743,355 UART: [state] LifecycleState = Manufacturing
9,745,753 UART: [state] DebugLocked = No
9,747,623 UART: [state] WD Timer not started. Device not locked for debugging
9,751,529 UART: [kat] SHA2-256
9,941,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,952,177 UART: [kat] ++
9,952,722 UART: [kat] sha1
9,963,496 UART: [kat] SHA2-256
9,966,536 UART: [kat] SHA2-384
9,972,428 UART: [kat] SHA2-512-ACC
9,975,004 UART: [kat] ECC-384
12,417,911 UART: [kat] HMAC-384Kdf
12,430,627 UART: [kat] LMS
12,962,491 UART: [kat] --
12,965,669 UART: [cold-reset] ++
12,966,628 UART: [fht] FHT @ 0x50003400
12,978,090 UART: [idev] ++
12,978,767 UART: [idev] CDI.KEYID = 6
12,979,732 UART: [idev] SUBJECT.KEYID = 7
12,980,943 UART: [idev] UDS.KEYID = 0
12,983,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,127,300 UART: [idev] Erasing UDS.KEYID = 0
15,460,893 UART: [idev] Sha1 KeyId Algorithm
15,482,615 UART: [idev] --
15,488,282 UART: [ldev] ++
15,489,019 UART: [ldev] CDI.KEYID = 6
15,489,939 UART: [ldev] SUBJECT.KEYID = 5
15,491,044 UART: [ldev] AUTHORITY.KEYID = 7
15,492,277 UART: [ldev] FE.KEYID = 1
15,501,787 UART: [ldev] Erasing FE.KEYID = 1
17,983,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,703,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,718,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,734,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,749,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,769,442 UART: [ldev] --
19,774,618 UART: [fwproc] Wait for Commands...
19,776,555 UART: [fwproc] Recv command 0x46574c44
19,778,823 UART: [fwproc] Recv'd Img size: 114084 bytes
23,251,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,325,940 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,442,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,983,069 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,761,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,528,862 >>> mbox cmd response: failed
10,529,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,529,791 >>> mbox cmd response: failed
10,530,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,357 >>> mbox cmd response: failed
Initializing fuses
2,057,344 writing to cptra_bootfsm_go
13,096,347 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,341,106 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Manufacturing
85,433 UART: [state] DebugLocked = No
86,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
895,146 UART: [kat] SHA2-512-ACC
897,047 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
906,986 UART: [kat] LMS
1,475,182 UART: [kat] --
1,476,003 UART: [cold-reset] ++
1,476,419 UART: [fht] Storing FHT @ 0x50003400
1,479,154 UART: [idev] ++
1,479,322 UART: [idev] CDI.KEYID = 6
1,479,682 UART: [idev] SUBJECT.KEYID = 7
1,480,106 UART: [idev] UDS.KEYID = 0
1,480,451 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,092 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,330 UART: [idev] --
1,514,409 UART: [ldev] ++
1,514,577 UART: [ldev] CDI.KEYID = 6
1,514,940 UART: [ldev] SUBJECT.KEYID = 5
1,515,366 UART: [ldev] AUTHORITY.KEYID = 7
1,515,829 UART: [ldev] FE.KEYID = 1
1,521,117 UART: [ldev] Erasing FE.KEYID = 1
1,546,634 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,876 UART: [ldev] --
1,586,319 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 114084 bytes
1,608,151 UART: ROM Fatal Error: 0x000B0003
1,609,308 >>> mbox cmd response: failed
1,609,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,314 >>> mbox cmd response: failed
1,609,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,100 UART: [kat] LMS
1,475,296 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,982 UART: [idev] Erasing UDS.KEYID = 0
1,504,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,816 UART: [idev] --
1,514,063 UART: [ldev] ++
1,514,231 UART: [ldev] CDI.KEYID = 6
1,514,594 UART: [ldev] SUBJECT.KEYID = 5
1,515,020 UART: [ldev] AUTHORITY.KEYID = 7
1,515,483 UART: [ldev] FE.KEYID = 1
1,520,821 UART: [ldev] Erasing FE.KEYID = 1
1,545,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,704 UART: [ldev] --
1,585,165 UART: [fwproc] Waiting for Commands...
1,585,872 UART: [fwproc] Received command 0x46574c44
1,586,663 UART: [fwproc] Received Image of size 114084 bytes
2,881,624 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,873 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,005 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,461,739 >>> mbox cmd response: failed
1,461,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,745 >>> mbox cmd response: failed
1,461,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Manufacturing
86,292 UART: [state] DebugLocked = No
87,002 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,563 UART: [kat] SHA2-512-ACC
897,464 UART: [kat] ECC-384
903,193 UART: [kat] HMAC-384Kdf
907,705 UART: [kat] LMS
1,475,901 UART: [kat] --
1,476,832 UART: [cold-reset] ++
1,477,186 UART: [fht] Storing FHT @ 0x50003400
1,479,915 UART: [idev] ++
1,480,083 UART: [idev] CDI.KEYID = 6
1,480,443 UART: [idev] SUBJECT.KEYID = 7
1,480,867 UART: [idev] UDS.KEYID = 0
1,481,212 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,663 UART: [idev] Erasing UDS.KEYID = 0
1,505,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,719 UART: [idev] --
1,514,846 UART: [ldev] ++
1,515,014 UART: [ldev] CDI.KEYID = 6
1,515,377 UART: [ldev] SUBJECT.KEYID = 5
1,515,803 UART: [ldev] AUTHORITY.KEYID = 7
1,516,266 UART: [ldev] FE.KEYID = 1
1,521,404 UART: [ldev] Erasing FE.KEYID = 1
1,546,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,619 UART: [ldev] --
1,586,096 UART: [fwproc] Waiting for Commands...
1,586,811 UART: [fwproc] Received command 0x46574c44
1,587,602 UART: [fwproc] Received Image of size 114084 bytes
1,608,418 UART: ROM Fatal Error: 0x000B0003
1,609,575 >>> mbox cmd response: failed
1,609,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,581 >>> mbox cmd response: failed
1,609,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,609,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
903,449 UART: [kat] HMAC-384Kdf
908,195 UART: [kat] LMS
1,476,391 UART: [kat] --
1,477,306 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,297 UART: [idev] ++
1,480,465 UART: [idev] CDI.KEYID = 6
1,480,825 UART: [idev] SUBJECT.KEYID = 7
1,481,249 UART: [idev] UDS.KEYID = 0
1,481,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,505,563 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,297 UART: [idev] --
1,515,278 UART: [ldev] ++
1,515,446 UART: [ldev] CDI.KEYID = 6
1,515,809 UART: [ldev] SUBJECT.KEYID = 5
1,516,235 UART: [ldev] AUTHORITY.KEYID = 7
1,516,698 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,881 UART: [ldev] --
1,587,386 UART: [fwproc] Waiting for Commands...
1,588,193 UART: [fwproc] Received command 0x46574c44
1,588,984 UART: [fwproc] Received Image of size 114084 bytes
2,882,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,675 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,463,982 >>> mbox cmd response: failed
1,463,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,988 >>> mbox cmd response: failed
1,463,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,456 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Manufacturing
85,843 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,478 UART: [kat] SHA2-512-ACC
908,379 UART: [kat] ECC-384
918,096 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,172,053 UART: [cold-reset] ++
1,172,541 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,270 UART: [idev] Erasing UDS.KEYID = 0
1,201,055 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,086 UART: [ldev] SUBJECT.KEYID = 5
1,211,512 UART: [ldev] AUTHORITY.KEYID = 7
1,211,975 UART: [ldev] FE.KEYID = 1
1,216,857 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,341 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,080 UART: ROM Fatal Error: 0x000B0003
1,305,237 >>> mbox cmd response: failed
1,305,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,243 >>> mbox cmd response: failed
1,305,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,598 UART: [kat] SHA2-512-ACC
908,499 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,109 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,500 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,781 UART: [ldev] --
1,281,064 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,328 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,159,256 >>> mbox cmd response: failed
1,159,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,262 >>> mbox cmd response: failed
1,159,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,963 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Manufacturing
85,788 UART: [state] DebugLocked = No
86,276 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
893,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,332 UART: [kat] ++
897,484 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
917,691 UART: [kat] HMAC-384Kdf
922,319 UART: [kat] LMS
1,170,647 UART: [kat] --
1,171,598 UART: [cold-reset] ++
1,172,004 UART: [fht] FHT @ 0x50003400
1,174,565 UART: [idev] ++
1,174,733 UART: [idev] CDI.KEYID = 6
1,175,093 UART: [idev] SUBJECT.KEYID = 7
1,175,517 UART: [idev] UDS.KEYID = 0
1,175,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,379 UART: [idev] Erasing UDS.KEYID = 0
1,200,508 UART: [idev] Sha1 KeyId Algorithm
1,209,088 UART: [idev] --
1,210,240 UART: [ldev] ++
1,210,408 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,197 UART: [ldev] AUTHORITY.KEYID = 7
1,211,660 UART: [ldev] FE.KEYID = 1
1,216,968 UART: [ldev] Erasing FE.KEYID = 1
1,243,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,054 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,279 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 114084 bytes
1,304,421 UART: ROM Fatal Error: 0x000B0003
1,305,578 >>> mbox cmd response: failed
1,305,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,584 >>> mbox cmd response: failed
1,305,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Unprovisioned
86,350 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,126 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,297 UART: [idev] ++
1,175,465 UART: [idev] CDI.KEYID = 6
1,175,825 UART: [idev] SUBJECT.KEYID = 7
1,176,249 UART: [idev] UDS.KEYID = 0
1,176,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,013 UART: [idev] Erasing UDS.KEYID = 0
1,200,928 UART: [idev] Sha1 KeyId Algorithm
1,209,350 UART: [idev] --
1,210,400 UART: [ldev] ++
1,210,568 UART: [ldev] CDI.KEYID = 6
1,210,931 UART: [ldev] SUBJECT.KEYID = 5
1,211,357 UART: [ldev] AUTHORITY.KEYID = 7
1,211,820 UART: [ldev] FE.KEYID = 1
1,217,434 UART: [ldev] Erasing FE.KEYID = 1
1,244,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,493 UART: [fwproc] Wait for Commands...
1,284,175 UART: [fwproc] Recv command 0x46574c44
1,284,903 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,503 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,964 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,160,355 >>> mbox cmd response: failed
1,160,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,361 >>> mbox cmd response: failed
1,160,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,784 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Manufacturing
85,821 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,397 UART: [cold-reset] ++
1,169,861 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,295 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,202 UART: [ldev] ++
1,208,370 UART: [ldev] CDI.KEYID = 6
1,208,734 UART: [ldev] SUBJECT.KEYID = 5
1,209,161 UART: [ldev] AUTHORITY.KEYID = 7
1,209,624 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,240,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,414 UART: [ldev] --
1,279,838 UART: [fwproc] Wait for Commands...
1,280,411 UART: [fwproc] Recv command 0x46574c44
1,281,144 UART: [fwproc] Recv'd Img size: 114084 bytes
1,301,127 UART: ROM Fatal Error: 0x000B0003
1,302,284 >>> mbox cmd response: failed
1,302,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,290 >>> mbox cmd response: failed
1,302,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,170,141 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,475 UART: [idev] ++
1,173,643 UART: [idev] CDI.KEYID = 6
1,174,004 UART: [idev] SUBJECT.KEYID = 7
1,174,429 UART: [idev] UDS.KEYID = 0
1,174,775 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,763 UART: [idev] Erasing UDS.KEYID = 0
1,200,063 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,209,982 UART: [ldev] ++
1,210,150 UART: [ldev] CDI.KEYID = 6
1,210,514 UART: [ldev] SUBJECT.KEYID = 5
1,210,941 UART: [ldev] AUTHORITY.KEYID = 7
1,211,404 UART: [ldev] FE.KEYID = 1
1,216,482 UART: [ldev] Erasing FE.KEYID = 1
1,242,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,540 UART: [ldev] --
1,281,938 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x46574c44
1,283,260 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,298 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,628 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,046 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,155,987 >>> mbox cmd response: failed
1,155,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,993 >>> mbox cmd response: failed
1,155,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,810 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Manufacturing
85,776 UART: [state] DebugLocked = No
86,310 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,883 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,198,802 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,411 UART: [ldev] Erasing FE.KEYID = 1
1,241,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,095 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 114084 bytes
1,303,142 UART: ROM Fatal Error: 0x000B0003
1,304,299 >>> mbox cmd response: failed
1,304,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,305 >>> mbox cmd response: failed
1,304,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
1,174,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,496 UART: [idev] Sha1 KeyId Algorithm
1,208,406 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,489 UART: [fwproc] Wait for Commands...
1,283,068 UART: [fwproc] Recv command 0x46574c44
1,283,801 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,631 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,156,254 >>> mbox cmd response: failed
1,156,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,260 >>> mbox cmd response: failed
1,156,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,103 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,034 UART:
192,415 UART: Running Caliptra ROM ...
193,559 UART:
193,708 UART: [state] CFI Enabled
267,117 UART: [state] LifecycleState = Unprovisioned
269,080 UART: [state] DebugLocked = No
270,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,874 UART: [kat] SHA2-256
445,562 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,036 UART: [kat] ++
456,541 UART: [kat] sha1
466,121 UART: [kat] SHA2-256
468,809 UART: [kat] SHA2-384
475,704 UART: [kat] SHA2-512-ACC
478,043 UART: [kat] ECC-384
2,768,323 UART: [kat] HMAC-384Kdf
2,780,420 UART: [kat] LMS
3,970,754 UART: [kat] --
3,976,500 UART: [cold-reset] ++
3,979,137 UART: [fht] Storing FHT @ 0x50003400
3,991,968 UART: [idev] ++
3,992,598 UART: [idev] CDI.KEYID = 6
3,993,506 UART: [idev] SUBJECT.KEYID = 7
3,994,775 UART: [idev] UDS.KEYID = 0
3,997,509 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,140,802 UART: [idev] Erasing UDS.KEYID = 0
7,328,058 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,395 UART: [idev] --
7,352,472 UART: [ldev] ++
7,353,041 UART: [ldev] CDI.KEYID = 6
7,354,064 UART: [ldev] SUBJECT.KEYID = 5
7,355,227 UART: [ldev] AUTHORITY.KEYID = 7
7,356,477 UART: [ldev] FE.KEYID = 1
7,403,750 UART: [ldev] Erasing FE.KEYID = 1
10,730,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,018 UART: [ldev] --
13,091,400 UART: [fwproc] Waiting for Commands...
13,093,401 UART: [fwproc] Received command 0x46574c44
13,095,593 UART: [fwproc] Received Image of size 113760 bytes
13,194,527 UART: ROM Fatal Error: 0x000B001B
13,198,048 >>> mbox cmd response: failed
13,198,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,198,807 >>> mbox cmd response: failed
13,199,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,402 >>> mbox cmd response: failed
Initializing fuses
2,059,749 writing to cptra_bootfsm_go
2,249,069 UART:
2,249,433 UART: Running Caliptra ROM ...
2,250,574 UART:
2,250,744 UART: [state] CFI Enabled
2,313,688 UART: [state] LifecycleState = Unprovisioned
2,315,624 UART: [state] DebugLocked = No
2,317,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,992 UART: [kat] SHA2-256
2,491,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,194 UART: [kat] ++
2,502,700 UART: [kat] sha1
2,514,997 UART: [kat] SHA2-256
2,517,703 UART: [kat] SHA2-384
2,524,988 UART: [kat] SHA2-512-ACC
2,527,396 UART: [kat] ECC-384
4,815,690 UART: [kat] HMAC-384Kdf
4,827,666 UART: [kat] LMS
6,017,972 UART: [kat] --
6,023,437 UART: [cold-reset] ++
6,025,890 UART: [fht] Storing FHT @ 0x50003400
6,036,690 UART: [idev] ++
6,037,327 UART: [idev] CDI.KEYID = 6
6,038,214 UART: [idev] SUBJECT.KEYID = 7
6,039,486 UART: [idev] UDS.KEYID = 0
6,042,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,185,445 UART: [idev] Erasing UDS.KEYID = 0
9,372,796 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,914 UART: [idev] --
9,398,968 UART: [ldev] ++
9,399,550 UART: [ldev] CDI.KEYID = 6
9,400,472 UART: [ldev] SUBJECT.KEYID = 5
9,401,733 UART: [ldev] AUTHORITY.KEYID = 7
9,402,974 UART: [ldev] FE.KEYID = 1
9,430,637 UART: [ldev] Erasing FE.KEYID = 1
12,761,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,056,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,071,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,085,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,100,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,120,323 UART: [ldev] --
15,125,702 UART: [fwproc] Waiting for Commands...
15,128,987 UART: [fwproc] Received command 0x46574c44
15,131,193 UART: [fwproc] Received Image of size 113760 bytes
19,188,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,272,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,341,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,658,033 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,786,534 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,957,484 >>> mbox cmd response: failed
12,958,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,958,554 >>> mbox cmd response: failed
12,958,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,959,118 >>> mbox cmd response: failed
Initializing fuses
2,046,555 writing to cptra_bootfsm_go
5,840,935 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,903,261 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,445 UART:
192,837 UART: Running Caliptra ROM ...
193,937 UART:
603,684 UART: [state] CFI Enabled
619,086 UART: [state] LifecycleState = Unprovisioned
621,021 UART: [state] DebugLocked = No
623,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,492 UART: [kat] SHA2-256
797,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,753 UART: [kat] ++
808,206 UART: [kat] sha1
819,622 UART: [kat] SHA2-256
822,300 UART: [kat] SHA2-384
827,682 UART: [kat] SHA2-512-ACC
830,073 UART: [kat] ECC-384
3,115,192 UART: [kat] HMAC-384Kdf
3,127,057 UART: [kat] LMS
4,317,172 UART: [kat] --
4,323,217 UART: [cold-reset] ++
4,325,767 UART: [fht] Storing FHT @ 0x50003400
4,338,711 UART: [idev] ++
4,339,332 UART: [idev] CDI.KEYID = 6
4,340,218 UART: [idev] SUBJECT.KEYID = 7
4,341,483 UART: [idev] UDS.KEYID = 0
4,344,200 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,487,288 UART: [idev] Erasing UDS.KEYID = 0
7,629,436 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,244 UART: [idev] --
7,656,039 UART: [ldev] ++
7,656,623 UART: [ldev] CDI.KEYID = 6
7,657,568 UART: [ldev] SUBJECT.KEYID = 5
7,658,781 UART: [ldev] AUTHORITY.KEYID = 7
7,660,070 UART: [ldev] FE.KEYID = 1
7,669,455 UART: [ldev] Erasing FE.KEYID = 1
10,960,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,859 UART: [ldev] --
13,323,795 UART: [fwproc] Waiting for Commands...
13,326,246 UART: [fwproc] Received command 0x46574c44
13,328,444 UART: [fwproc] Received Image of size 113760 bytes
13,424,532 UART: ROM Fatal Error: 0x000B001B
13,428,000 >>> mbox cmd response: failed
13,428,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,428,799 >>> mbox cmd response: failed
13,429,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,429,357 >>> mbox cmd response: failed
Initializing fuses
2,056,492 writing to cptra_bootfsm_go
2,245,796 UART:
2,246,136 UART: Running Caliptra ROM ...
2,247,280 UART:
7,032,368 UART: [state] CFI Enabled
7,045,992 UART: [state] LifecycleState = Unprovisioned
7,047,918 UART: [state] DebugLocked = No
7,050,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,054,932 UART: [kat] SHA2-256
7,224,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,235,187 UART: [kat] ++
7,235,679 UART: [kat] sha1
7,246,082 UART: [kat] SHA2-256
7,248,775 UART: [kat] SHA2-384
7,254,149 UART: [kat] SHA2-512-ACC
7,256,494 UART: [kat] ECC-384
9,539,137 UART: [kat] HMAC-384Kdf
9,550,501 UART: [kat] LMS
10,740,601 UART: [kat] --
10,747,860 UART: [cold-reset] ++
10,750,016 UART: [fht] Storing FHT @ 0x50003400
10,762,744 UART: [idev] ++
10,763,372 UART: [idev] CDI.KEYID = 6
10,764,281 UART: [idev] SUBJECT.KEYID = 7
10,765,551 UART: [idev] UDS.KEYID = 0
10,768,461 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,911,460 UART: [idev] Erasing UDS.KEYID = 0
14,054,355 UART: [idev] Using Sha1 for KeyId Algorithm
14,077,742 UART: [idev] --
14,082,870 UART: [ldev] ++
14,083,463 UART: [ldev] CDI.KEYID = 6
14,084,376 UART: [ldev] SUBJECT.KEYID = 5
14,085,649 UART: [ldev] AUTHORITY.KEYID = 7
14,086,887 UART: [ldev] FE.KEYID = 1
14,097,161 UART: [ldev] Erasing FE.KEYID = 1
17,385,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,677,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,691,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,706,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,721,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,739,968 UART: [ldev] --
19,744,271 UART: [fwproc] Waiting for Commands...
19,747,235 UART: [fwproc] Received command 0x46574c44
19,749,422 UART: [fwproc] Received Image of size 113760 bytes
23,798,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,870,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,939,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,255,808 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
4,131,858 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,161,511 >>> mbox cmd response: failed
13,162,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,444 >>> mbox cmd response: failed
13,162,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,163,011 >>> mbox cmd response: failed
Initializing fuses
2,048,334 writing to cptra_bootfsm_go
10,833,122 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,761,089 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,085 UART:
192,453 UART: Running Caliptra ROM ...
193,638 UART:
193,790 UART: [state] CFI Enabled
261,415 UART: [state] LifecycleState = Unprovisioned
263,229 UART: [state] DebugLocked = No
265,251 UART: [state] WD Timer not started. Device not locked for debugging
268,481 UART: [kat] SHA2-256
447,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,165 UART: [kat] ++
459,638 UART: [kat] sha1
470,947 UART: [kat] SHA2-256
473,954 UART: [kat] SHA2-384
478,960 UART: [kat] SHA2-512-ACC
481,887 UART: [kat] ECC-384
2,945,089 UART: [kat] HMAC-384Kdf
2,961,379 UART: [kat] LMS
3,490,829 UART: [kat] --
3,496,007 UART: [cold-reset] ++
3,497,073 UART: [fht] FHT @ 0x50003400
3,507,135 UART: [idev] ++
3,507,706 UART: [idev] CDI.KEYID = 6
3,508,613 UART: [idev] SUBJECT.KEYID = 7
3,509,826 UART: [idev] UDS.KEYID = 0
3,512,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,656,718 UART: [idev] Erasing UDS.KEYID = 0
6,016,803 UART: [idev] Sha1 KeyId Algorithm
6,039,428 UART: [idev] --
6,044,158 UART: [ldev] ++
6,044,743 UART: [ldev] CDI.KEYID = 6
6,045,632 UART: [ldev] SUBJECT.KEYID = 5
6,046,740 UART: [ldev] AUTHORITY.KEYID = 7
6,048,033 UART: [ldev] FE.KEYID = 1
6,088,741 UART: [ldev] Erasing FE.KEYID = 1
8,592,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,803 UART: [ldev] --
10,400,901 UART: [fwproc] Wait for Commands...
10,403,754 UART: [fwproc] Recv command 0x46574c44
10,405,874 UART: [fwproc] Recv'd Img size: 114084 bytes
10,505,523 UART: ROM Fatal Error: 0x000B001B
10,508,608 >>> mbox cmd response: failed
10,509,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,330 >>> mbox cmd response: failed
10,509,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,510,090 >>> mbox cmd response: failed
Initializing fuses
2,053,139 writing to cptra_bootfsm_go
2,242,542 UART:
2,242,907 UART: Running Caliptra ROM ...
2,244,042 UART:
2,244,212 UART: [state] CFI Enabled
2,313,317 UART: [state] LifecycleState = Unprovisioned
2,315,157 UART: [state] DebugLocked = No
2,317,890 UART: [state] WD Timer not started. Device not locked for debugging
2,320,901 UART: [kat] SHA2-256
2,499,979 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,588 UART: [kat] ++
2,512,048 UART: [kat] sha1
2,522,504 UART: [kat] SHA2-256
2,525,534 UART: [kat] SHA2-384
2,532,608 UART: [kat] SHA2-512-ACC
2,535,551 UART: [kat] ECC-384
4,992,022 UART: [kat] HMAC-384Kdf
5,015,060 UART: [kat] LMS
5,544,515 UART: [kat] --
5,549,716 UART: [cold-reset] ++
5,550,676 UART: [fht] FHT @ 0x50003400
5,563,291 UART: [idev] ++
5,563,870 UART: [idev] CDI.KEYID = 6
5,564,787 UART: [idev] SUBJECT.KEYID = 7
5,565,998 UART: [idev] UDS.KEYID = 0
5,568,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,712,291 UART: [idev] Erasing UDS.KEYID = 0
8,070,981 UART: [idev] Sha1 KeyId Algorithm
8,093,992 UART: [idev] --
8,097,314 UART: [ldev] ++
8,097,895 UART: [ldev] CDI.KEYID = 6
8,098,807 UART: [ldev] SUBJECT.KEYID = 5
8,099,974 UART: [ldev] AUTHORITY.KEYID = 7
8,101,214 UART: [ldev] FE.KEYID = 1
8,144,813 UART: [ldev] Erasing FE.KEYID = 1
10,648,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,454,169 UART: [ldev] --
12,459,431 UART: [fwproc] Wait for Commands...
12,461,050 UART: [fwproc] Recv command 0x46574c44
12,463,094 UART: [fwproc] Recv'd Img size: 114084 bytes
15,866,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,939,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,324,531 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,380,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,287,530 >>> mbox cmd response: failed
10,288,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,288,644 >>> mbox cmd response: failed
10,288,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,289,215 >>> mbox cmd response: failed
Initializing fuses
2,049,090 writing to cptra_bootfsm_go
5,393,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,068,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,522 UART:
192,914 UART: Running Caliptra ROM ...
194,208 UART:
603,789 UART: [state] CFI Enabled
619,301 UART: [state] LifecycleState = Unprovisioned
621,177 UART: [state] DebugLocked = No
622,791 UART: [state] WD Timer not started. Device not locked for debugging
625,674 UART: [kat] SHA2-256
804,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,375 UART: [kat] ++
816,824 UART: [kat] sha1
828,025 UART: [kat] SHA2-256
831,068 UART: [kat] SHA2-384
837,263 UART: [kat] SHA2-512-ACC
840,199 UART: [kat] ECC-384
3,282,704 UART: [kat] HMAC-384Kdf
3,295,107 UART: [kat] LMS
3,824,618 UART: [kat] --
3,828,356 UART: [cold-reset] ++
3,830,393 UART: [fht] FHT @ 0x50003400
3,841,205 UART: [idev] ++
3,841,769 UART: [idev] CDI.KEYID = 6
3,842,766 UART: [idev] SUBJECT.KEYID = 7
3,843,812 UART: [idev] UDS.KEYID = 0
3,846,926 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,990,468 UART: [idev] Erasing UDS.KEYID = 0
6,316,081 UART: [idev] Sha1 KeyId Algorithm
6,339,103 UART: [idev] --
6,341,513 UART: [ldev] ++
6,342,100 UART: [ldev] CDI.KEYID = 6
6,342,987 UART: [ldev] SUBJECT.KEYID = 5
6,344,116 UART: [ldev] AUTHORITY.KEYID = 7
6,345,450 UART: [ldev] FE.KEYID = 1
6,354,988 UART: [ldev] Erasing FE.KEYID = 1
8,833,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,166 UART: [ldev] --
10,621,135 UART: [fwproc] Wait for Commands...
10,623,013 UART: [fwproc] Recv command 0x46574c44
10,625,120 UART: [fwproc] Recv'd Img size: 114084 bytes
10,721,464 UART: ROM Fatal Error: 0x000B001B
10,724,553 >>> mbox cmd response: failed
10,724,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,725,234 >>> mbox cmd response: failed
10,725,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,725,793 >>> mbox cmd response: failed
Initializing fuses
2,051,206 writing to cptra_bootfsm_go
2,240,548 UART:
2,240,894 UART: Running Caliptra ROM ...
2,242,033 UART:
9,732,908 UART: [state] CFI Enabled
9,746,898 UART: [state] LifecycleState = Unprovisioned
9,748,761 UART: [state] DebugLocked = No
9,751,605 UART: [state] WD Timer not started. Device not locked for debugging
9,754,594 UART: [kat] SHA2-256
9,933,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,945,248 UART: [kat] ++
9,945,715 UART: [kat] sha1
9,957,299 UART: [kat] SHA2-256
9,960,368 UART: [kat] SHA2-384
9,966,569 UART: [kat] SHA2-512-ACC
9,969,512 UART: [kat] ECC-384
12,410,330 UART: [kat] HMAC-384Kdf
12,422,090 UART: [kat] LMS
12,951,578 UART: [kat] --
12,955,284 UART: [cold-reset] ++
12,956,787 UART: [fht] FHT @ 0x50003400
12,967,065 UART: [idev] ++
12,967,646 UART: [idev] CDI.KEYID = 6
12,968,531 UART: [idev] SUBJECT.KEYID = 7
12,969,743 UART: [idev] UDS.KEYID = 0
12,972,664 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,115,913 UART: [idev] Erasing UDS.KEYID = 0
15,439,518 UART: [idev] Sha1 KeyId Algorithm
15,461,724 UART: [idev] --
15,466,084 UART: [ldev] ++
15,466,662 UART: [ldev] CDI.KEYID = 6
15,467,546 UART: [ldev] SUBJECT.KEYID = 5
15,468,753 UART: [ldev] AUTHORITY.KEYID = 7
15,470,058 UART: [ldev] FE.KEYID = 1
15,480,033 UART: [ldev] Erasing FE.KEYID = 1
17,956,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,676,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,692,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,708,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,724,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,744,021 UART: [ldev] --
19,749,228 UART: [fwproc] Wait for Commands...
19,751,811 UART: [fwproc] Recv command 0x46574c44
19,753,903 UART: [fwproc] Recv'd Img size: 114084 bytes
23,148,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,223,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,292,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,609,710 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,699,632 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,505,810 >>> mbox cmd response: failed
10,506,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,689 >>> mbox cmd response: failed
10,506,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,507,254 >>> mbox cmd response: failed
Initializing fuses
2,048,498 writing to cptra_bootfsm_go
13,059,795 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,638,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,075 UART:
192,452 UART: Running Caliptra ROM ...
193,579 UART:
193,726 UART: [state] CFI Enabled
261,987 UART: [state] LifecycleState = Unprovisioned
264,390 UART: [state] DebugLocked = No
265,579 UART: [state] WD Timer not started. Device not locked for debugging
269,461 UART: [kat] SHA2-256
459,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,116 UART: [kat] ++
470,564 UART: [kat] sha1
481,120 UART: [kat] SHA2-256
484,140 UART: [kat] SHA2-384
488,877 UART: [kat] SHA2-512-ACC
491,494 UART: [kat] ECC-384
2,949,560 UART: [kat] HMAC-384Kdf
2,970,541 UART: [kat] LMS
3,502,328 UART: [kat] --
3,507,261 UART: [cold-reset] ++
3,509,792 UART: [fht] FHT @ 0x50003400
3,520,234 UART: [idev] ++
3,520,973 UART: [idev] CDI.KEYID = 6
3,521,882 UART: [idev] SUBJECT.KEYID = 7
3,523,099 UART: [idev] UDS.KEYID = 0
3,525,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,541 UART: [idev] Erasing UDS.KEYID = 0
6,027,104 UART: [idev] Sha1 KeyId Algorithm
6,047,979 UART: [idev] --
6,054,090 UART: [ldev] ++
6,054,788 UART: [ldev] CDI.KEYID = 6
6,055,702 UART: [ldev] SUBJECT.KEYID = 5
6,056,865 UART: [ldev] AUTHORITY.KEYID = 7
6,058,099 UART: [ldev] FE.KEYID = 1
6,099,545 UART: [ldev] Erasing FE.KEYID = 1
8,607,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,910 UART: [ldev] --
10,412,476 UART: [fwproc] Wait for Commands...
10,414,751 UART: [fwproc] Recv command 0x46574c44
10,417,059 UART: [fwproc] Recv'd Img size: 114084 bytes
10,543,048 UART: ROM Fatal Error: 0x000B001B
10,546,716 >>> mbox cmd response: failed
10,547,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,452 >>> mbox cmd response: failed
10,547,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,548,016 >>> mbox cmd response: failed
Initializing fuses
2,053,776 writing to cptra_bootfsm_go
2,243,096 UART:
2,243,447 UART: Running Caliptra ROM ...
2,244,583 UART:
2,244,754 UART: [state] CFI Enabled
2,320,560 UART: [state] LifecycleState = Unprovisioned
2,322,959 UART: [state] DebugLocked = No
2,324,360 UART: [state] WD Timer not started. Device not locked for debugging
2,329,373 UART: [kat] SHA2-256
2,519,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,047 UART: [kat] ++
2,530,539 UART: [kat] sha1
2,542,835 UART: [kat] SHA2-256
2,545,886 UART: [kat] SHA2-384
2,552,046 UART: [kat] SHA2-512-ACC
2,554,631 UART: [kat] ECC-384
5,001,956 UART: [kat] HMAC-384Kdf
5,028,019 UART: [kat] LMS
5,559,842 UART: [kat] --
5,563,997 UART: [cold-reset] ++
5,566,466 UART: [fht] FHT @ 0x50003400
5,577,393 UART: [idev] ++
5,578,119 UART: [idev] CDI.KEYID = 6
5,579,001 UART: [idev] SUBJECT.KEYID = 7
5,580,270 UART: [idev] UDS.KEYID = 0
5,582,961 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,726,577 UART: [idev] Erasing UDS.KEYID = 0
8,086,383 UART: [idev] Sha1 KeyId Algorithm
8,109,404 UART: [idev] --
8,115,071 UART: [ldev] ++
8,115,770 UART: [ldev] CDI.KEYID = 6
8,116,686 UART: [ldev] SUBJECT.KEYID = 5
8,117,898 UART: [ldev] AUTHORITY.KEYID = 7
8,119,072 UART: [ldev] FE.KEYID = 1
8,159,097 UART: [ldev] Erasing FE.KEYID = 1
10,664,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,468,233 UART: [ldev] --
12,472,901 UART: [fwproc] Wait for Commands...
12,474,785 UART: [fwproc] Recv command 0x46574c44
12,477,056 UART: [fwproc] Recv'd Img size: 114084 bytes
15,916,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,105,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,647,032 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,440,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,343,610 >>> mbox cmd response: failed
10,344,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,344,481 >>> mbox cmd response: failed
10,344,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,345,041 >>> mbox cmd response: failed
Initializing fuses
2,056,524 writing to cptra_bootfsm_go
5,487,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,755,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,534 UART:
192,899 UART: Running Caliptra ROM ...
194,036 UART:
603,646 UART: [state] CFI Enabled
614,515 UART: [state] LifecycleState = Unprovisioned
616,896 UART: [state] DebugLocked = No
619,680 UART: [state] WD Timer not started. Device not locked for debugging
624,287 UART: [kat] SHA2-256
814,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,968 UART: [kat] ++
825,556 UART: [kat] sha1
837,909 UART: [kat] SHA2-256
840,914 UART: [kat] SHA2-384
846,523 UART: [kat] SHA2-512-ACC
849,134 UART: [kat] ECC-384
3,290,207 UART: [kat] HMAC-384Kdf
3,301,949 UART: [kat] LMS
3,833,775 UART: [kat] --
3,837,004 UART: [cold-reset] ++
3,838,137 UART: [fht] FHT @ 0x50003400
3,850,893 UART: [idev] ++
3,851,566 UART: [idev] CDI.KEYID = 6
3,852,527 UART: [idev] SUBJECT.KEYID = 7
3,853,760 UART: [idev] UDS.KEYID = 0
3,856,503 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,000,005 UART: [idev] Erasing UDS.KEYID = 0
6,326,495 UART: [idev] Sha1 KeyId Algorithm
6,348,492 UART: [idev] --
6,352,590 UART: [ldev] ++
6,353,267 UART: [ldev] CDI.KEYID = 6
6,354,209 UART: [ldev] SUBJECT.KEYID = 5
6,355,322 UART: [ldev] AUTHORITY.KEYID = 7
6,356,623 UART: [ldev] FE.KEYID = 1
6,367,036 UART: [ldev] Erasing FE.KEYID = 1
8,847,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,162 UART: [ldev] --
10,638,251 UART: [fwproc] Wait for Commands...
10,640,455 UART: [fwproc] Recv command 0x46574c44
10,642,713 UART: [fwproc] Recv'd Img size: 114084 bytes
10,768,682 UART: ROM Fatal Error: 0x000B001B
10,772,371 >>> mbox cmd response: failed
10,772,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,773,177 >>> mbox cmd response: failed
10,773,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,773,739 >>> mbox cmd response: failed
Initializing fuses
2,059,199 writing to cptra_bootfsm_go
2,248,573 UART:
2,248,955 UART: Running Caliptra ROM ...
2,250,094 UART:
9,680,832 UART: [state] CFI Enabled
9,696,935 UART: [state] LifecycleState = Unprovisioned
9,699,337 UART: [state] DebugLocked = No
9,702,137 UART: [state] WD Timer not started. Device not locked for debugging
9,706,748 UART: [kat] SHA2-256
9,896,641 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,907,409 UART: [kat] ++
9,907,953 UART: [kat] sha1
9,920,197 UART: [kat] SHA2-256
9,923,212 UART: [kat] SHA2-384
9,928,172 UART: [kat] SHA2-512-ACC
9,930,736 UART: [kat] ECC-384
12,374,103 UART: [kat] HMAC-384Kdf
12,387,830 UART: [kat] LMS
12,919,646 UART: [kat] --
12,924,679 UART: [cold-reset] ++
12,926,778 UART: [fht] FHT @ 0x50003400
12,938,787 UART: [idev] ++
12,939,460 UART: [idev] CDI.KEYID = 6
12,940,472 UART: [idev] SUBJECT.KEYID = 7
12,941,629 UART: [idev] UDS.KEYID = 0
12,944,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,087,851 UART: [idev] Erasing UDS.KEYID = 0
15,421,814 UART: [idev] Sha1 KeyId Algorithm
15,445,125 UART: [idev] --
15,449,390 UART: [ldev] ++
15,450,068 UART: [ldev] CDI.KEYID = 6
15,450,985 UART: [ldev] SUBJECT.KEYID = 5
15,452,143 UART: [ldev] AUTHORITY.KEYID = 7
15,453,370 UART: [ldev] FE.KEYID = 1
15,464,305 UART: [ldev] Erasing FE.KEYID = 1
17,941,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,661,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,676,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,691,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,707,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,728,529 UART: [ldev] --
19,733,737 UART: [fwproc] Wait for Commands...
19,736,914 UART: [fwproc] Recv command 0x46574c44
19,739,225 UART: [fwproc] Recv'd Img size: 114084 bytes
23,173,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,251,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,367,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,908,562 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,757,461 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,565,289 >>> mbox cmd response: failed
10,566,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,566,367 >>> mbox cmd response: failed
10,566,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,566,927 >>> mbox cmd response: failed
Initializing fuses
2,050,253 writing to cptra_bootfsm_go
13,058,528 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,258,126 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
894,942 UART: [kat] SHA2-512-ACC
896,843 UART: [kat] ECC-384
902,578 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,764 UART: [idev] ++
1,479,932 UART: [idev] CDI.KEYID = 6
1,480,292 UART: [idev] SUBJECT.KEYID = 7
1,480,716 UART: [idev] UDS.KEYID = 0
1,481,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,934 UART: [idev] Erasing UDS.KEYID = 0
1,505,626 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,226 UART: [idev] --
1,515,319 UART: [ldev] ++
1,515,487 UART: [ldev] CDI.KEYID = 6
1,515,850 UART: [ldev] SUBJECT.KEYID = 5
1,516,276 UART: [ldev] AUTHORITY.KEYID = 7
1,516,739 UART: [ldev] FE.KEYID = 1
1,522,083 UART: [ldev] Erasing FE.KEYID = 1
1,547,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,078 UART: [ldev] --
1,587,579 UART: [fwproc] Waiting for Commands...
1,588,222 UART: [fwproc] Received command 0x46574c44
1,589,013 UART: [fwproc] Received Image of size 114084 bytes
1,624,400 UART: ROM Fatal Error: 0x000B001B
1,625,559 >>> mbox cmd response: failed
1,625,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,565 >>> mbox cmd response: failed
1,625,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,723 UART: [kat] SHA2-256
881,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,769 UART: [kat] ++
885,921 UART: [kat] sha1
890,249 UART: [kat] SHA2-256
892,187 UART: [kat] SHA2-384
895,000 UART: [kat] SHA2-512-ACC
896,901 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,476,969 UART: [fht] Storing FHT @ 0x50003400
1,479,852 UART: [idev] ++
1,480,020 UART: [idev] CDI.KEYID = 6
1,480,380 UART: [idev] SUBJECT.KEYID = 7
1,480,804 UART: [idev] UDS.KEYID = 0
1,481,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,715 UART: [ldev] ++
1,514,883 UART: [ldev] CDI.KEYID = 6
1,515,246 UART: [ldev] SUBJECT.KEYID = 5
1,515,672 UART: [ldev] AUTHORITY.KEYID = 7
1,516,135 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,534 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,114 UART: [ldev] --
1,585,613 UART: [fwproc] Waiting for Commands...
1,586,276 UART: [fwproc] Received command 0x46574c44
1,587,067 UART: [fwproc] Received Image of size 114084 bytes
2,881,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,462 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,371 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,477,266 >>> mbox cmd response: failed
1,477,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,272 >>> mbox cmd response: failed
1,477,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,557 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
903,343 UART: [kat] HMAC-384Kdf
907,925 UART: [kat] LMS
1,476,121 UART: [kat] --
1,476,914 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,995 UART: [idev] Erasing UDS.KEYID = 0
1,505,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,885 UART: [idev] --
1,514,936 UART: [ldev] ++
1,515,104 UART: [ldev] CDI.KEYID = 6
1,515,467 UART: [ldev] SUBJECT.KEYID = 5
1,515,893 UART: [ldev] AUTHORITY.KEYID = 7
1,516,356 UART: [ldev] FE.KEYID = 1
1,521,386 UART: [ldev] Erasing FE.KEYID = 1
1,546,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,663 UART: [ldev] --
1,586,002 UART: [fwproc] Waiting for Commands...
1,586,789 UART: [fwproc] Received command 0x46574c44
1,587,580 UART: [fwproc] Received Image of size 114084 bytes
1,622,521 UART: ROM Fatal Error: 0x000B001B
1,623,680 >>> mbox cmd response: failed
1,623,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,686 >>> mbox cmd response: failed
1,623,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,692 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,488 UART: [cold-reset] ++
1,477,032 UART: [fht] Storing FHT @ 0x50003400
1,479,615 UART: [idev] ++
1,479,783 UART: [idev] CDI.KEYID = 6
1,480,143 UART: [idev] SUBJECT.KEYID = 7
1,480,567 UART: [idev] UDS.KEYID = 0
1,480,912 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,609 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,342 UART: [ldev] ++
1,515,510 UART: [ldev] CDI.KEYID = 6
1,515,873 UART: [ldev] SUBJECT.KEYID = 5
1,516,299 UART: [ldev] AUTHORITY.KEYID = 7
1,516,762 UART: [ldev] FE.KEYID = 1
1,522,300 UART: [ldev] Erasing FE.KEYID = 1
1,547,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,753 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,881 UART: [fwproc] Received command 0x46574c44
1,588,672 UART: [fwproc] Received Image of size 114084 bytes
2,883,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,153 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,477,547 >>> mbox cmd response: failed
1,477,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,553 >>> mbox cmd response: failed
1,477,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,278 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,922,872 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
893,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,145 UART: [kat] ++
897,297 UART: [kat] sha1
901,397 UART: [kat] SHA2-256
903,337 UART: [kat] SHA2-384
906,230 UART: [kat] SHA2-512-ACC
908,131 UART: [kat] ECC-384
917,606 UART: [kat] HMAC-384Kdf
922,250 UART: [kat] LMS
1,170,578 UART: [kat] --
1,171,409 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,372 UART: [idev] ++
1,174,540 UART: [idev] CDI.KEYID = 6
1,174,900 UART: [idev] SUBJECT.KEYID = 7
1,175,324 UART: [idev] UDS.KEYID = 0
1,175,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,200,159 UART: [idev] Sha1 KeyId Algorithm
1,208,717 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,250 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 114084 bytes
1,318,497 UART: ROM Fatal Error: 0x000B001B
1,319,656 >>> mbox cmd response: failed
1,319,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,662 >>> mbox cmd response: failed
1,319,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,587 UART: [kat] SHA2-256
903,527 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
917,636 UART: [kat] HMAC-384Kdf
922,172 UART: [kat] LMS
1,170,500 UART: [kat] --
1,171,411 UART: [cold-reset] ++
1,171,937 UART: [fht] FHT @ 0x50003400
1,174,588 UART: [idev] ++
1,174,756 UART: [idev] CDI.KEYID = 6
1,175,116 UART: [idev] SUBJECT.KEYID = 7
1,175,540 UART: [idev] UDS.KEYID = 0
1,175,885 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,667 UART: [idev] Sha1 KeyId Algorithm
1,208,349 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,242,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,283 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,278 UART: [fwproc] Recv command 0x46574c44
1,283,006 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,610 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,321 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,501 >>> mbox cmd response: failed
1,175,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,507 >>> mbox cmd response: failed
1,175,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,927 UART: [kat] SHA2-512-ACC
908,828 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,311 UART: [idev] ++
1,175,479 UART: [idev] CDI.KEYID = 6
1,175,839 UART: [idev] SUBJECT.KEYID = 7
1,176,263 UART: [idev] UDS.KEYID = 0
1,176,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,199 UART: [idev] Erasing UDS.KEYID = 0
1,201,618 UART: [idev] Sha1 KeyId Algorithm
1,210,136 UART: [idev] --
1,211,174 UART: [ldev] ++
1,211,342 UART: [ldev] CDI.KEYID = 6
1,211,705 UART: [ldev] SUBJECT.KEYID = 5
1,212,131 UART: [ldev] AUTHORITY.KEYID = 7
1,212,594 UART: [ldev] FE.KEYID = 1
1,217,910 UART: [ldev] Erasing FE.KEYID = 1
1,244,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,996 UART: [ldev] --
1,284,403 UART: [fwproc] Wait for Commands...
1,285,107 UART: [fwproc] Recv command 0x46574c44
1,285,835 UART: [fwproc] Recv'd Img size: 114084 bytes
1,321,306 UART: ROM Fatal Error: 0x000B001B
1,322,465 >>> mbox cmd response: failed
1,322,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,471 >>> mbox cmd response: failed
1,322,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
893,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,682 UART: [kat] ++
897,834 UART: [kat] sha1
902,060 UART: [kat] SHA2-256
904,000 UART: [kat] SHA2-384
906,729 UART: [kat] SHA2-512-ACC
908,630 UART: [kat] ECC-384
918,651 UART: [kat] HMAC-384Kdf
923,261 UART: [kat] LMS
1,171,589 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,182 UART: [fht] FHT @ 0x50003400
1,175,909 UART: [idev] ++
1,176,077 UART: [idev] CDI.KEYID = 6
1,176,437 UART: [idev] SUBJECT.KEYID = 7
1,176,861 UART: [idev] UDS.KEYID = 0
1,177,206 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,599 UART: [idev] Erasing UDS.KEYID = 0
1,201,198 UART: [idev] Sha1 KeyId Algorithm
1,209,570 UART: [idev] --
1,210,548 UART: [ldev] ++
1,210,716 UART: [ldev] CDI.KEYID = 6
1,211,079 UART: [ldev] SUBJECT.KEYID = 5
1,211,505 UART: [ldev] AUTHORITY.KEYID = 7
1,211,968 UART: [ldev] FE.KEYID = 1
1,217,162 UART: [ldev] Erasing FE.KEYID = 1
1,243,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,140 UART: [ldev] --
1,282,485 UART: [fwproc] Wait for Commands...
1,283,095 UART: [fwproc] Recv command 0x46574c44
1,283,823 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,281 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,175,796 >>> mbox cmd response: failed
1,175,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,802 >>> mbox cmd response: failed
1,175,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,934 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,035 UART: [kat] SHA2-256
900,975 UART: [kat] SHA2-384
903,552 UART: [kat] SHA2-512-ACC
905,453 UART: [kat] ECC-384
915,134 UART: [kat] HMAC-384Kdf
919,738 UART: [kat] LMS
1,168,050 UART: [kat] --
1,168,819 UART: [cold-reset] ++
1,169,147 UART: [fht] FHT @ 0x50003400
1,171,719 UART: [idev] ++
1,171,887 UART: [idev] CDI.KEYID = 6
1,172,248 UART: [idev] SUBJECT.KEYID = 7
1,172,673 UART: [idev] UDS.KEYID = 0
1,173,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,180,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,881 UART: [idev] --
1,207,864 UART: [ldev] ++
1,208,032 UART: [ldev] CDI.KEYID = 6
1,208,396 UART: [ldev] SUBJECT.KEYID = 5
1,208,823 UART: [ldev] AUTHORITY.KEYID = 7
1,209,286 UART: [ldev] FE.KEYID = 1
1,214,266 UART: [ldev] Erasing FE.KEYID = 1
1,240,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,766 UART: [ldev] --
1,280,152 UART: [fwproc] Wait for Commands...
1,280,783 UART: [fwproc] Recv command 0x46574c44
1,281,516 UART: [fwproc] Recv'd Img size: 114084 bytes
1,316,873 UART: ROM Fatal Error: 0x000B001B
1,318,032 >>> mbox cmd response: failed
1,318,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,038 >>> mbox cmd response: failed
1,318,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,127 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,382 UART: [kat] HMAC-384Kdf
919,980 UART: [kat] LMS
1,168,292 UART: [kat] --
1,169,101 UART: [cold-reset] ++
1,169,653 UART: [fht] FHT @ 0x50003400
1,172,309 UART: [idev] ++
1,172,477 UART: [idev] CDI.KEYID = 6
1,172,838 UART: [idev] SUBJECT.KEYID = 7
1,173,263 UART: [idev] UDS.KEYID = 0
1,173,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,301 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,487 UART: [idev] --
1,208,508 UART: [ldev] ++
1,208,676 UART: [ldev] CDI.KEYID = 6
1,209,040 UART: [ldev] SUBJECT.KEYID = 5
1,209,467 UART: [ldev] AUTHORITY.KEYID = 7
1,209,930 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,884 UART: [fwproc] Wait for Commands...
1,281,459 UART: [fwproc] Recv command 0x46574c44
1,282,192 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,116 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,062 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,170,781 >>> mbox cmd response: failed
1,170,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,787 >>> mbox cmd response: failed
1,170,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,956 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,162 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,636 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,844 UART: [idev] Erasing UDS.KEYID = 0
1,198,714 UART: [idev] Sha1 KeyId Algorithm
1,207,698 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,227 UART: [ldev] SUBJECT.KEYID = 5
1,209,654 UART: [ldev] AUTHORITY.KEYID = 7
1,210,117 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,101 UART: [ldev] --
1,281,517 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114084 bytes
1,318,482 UART: ROM Fatal Error: 0x000B001B
1,319,641 >>> mbox cmd response: failed
1,319,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,647 >>> mbox cmd response: failed
1,319,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,681 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,872 UART: [idev] Sha1 KeyId Algorithm
1,208,882 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,615 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,145 UART: [ldev] --
1,282,531 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,047 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,371 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,171,476 >>> mbox cmd response: failed
1,171,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,482 >>> mbox cmd response: failed
1,171,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,845 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
193,106 UART:
193,462 UART: Running Caliptra ROM ...
194,552 UART:
194,694 UART: [state] CFI Enabled
264,779 UART: [state] LifecycleState = Manufacturing
266,745 UART: [state] DebugLocked = No
268,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,268 UART: [kat] SHA2-256
443,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,493 UART: [kat] ++
454,937 UART: [kat] sha1
465,271 UART: [kat] SHA2-256
467,955 UART: [kat] SHA2-384
473,282 UART: [kat] SHA2-512-ACC
475,628 UART: [kat] ECC-384
2,766,209 UART: [kat] HMAC-384Kdf
2,779,884 UART: [kat] LMS
3,970,168 UART: [kat] --
3,976,507 UART: [cold-reset] ++
3,978,663 UART: [fht] Storing FHT @ 0x50003400
3,989,663 UART: [idev] ++
3,990,226 UART: [idev] CDI.KEYID = 6
3,991,164 UART: [idev] SUBJECT.KEYID = 7
3,992,431 UART: [idev] UDS.KEYID = 0
3,998,360 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,141,691 UART: [idev] Erasing UDS.KEYID = 0
7,324,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,553 UART: [idev] --
7,350,546 UART: [ldev] ++
7,351,126 UART: [ldev] CDI.KEYID = 6
7,352,038 UART: [ldev] SUBJECT.KEYID = 5
7,353,279 UART: [ldev] AUTHORITY.KEYID = 7
7,354,516 UART: [ldev] FE.KEYID = 1
7,402,553 UART: [ldev] Erasing FE.KEYID = 1
10,735,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,001 UART: [ldev] --
13,098,382 UART: [fwproc] Waiting for Commands...
13,100,120 UART: [fwproc] Received command 0x46574c44
13,102,313 UART: [fwproc] Received Image of size 113760 bytes
13,195,072 UART: ROM Fatal Error: 0x000B0005
13,198,542 >>> mbox cmd response: failed
13,198,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,283 >>> mbox cmd response: failed
13,199,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,871 >>> mbox cmd response: failed
Initializing fuses
2,051,933 writing to cptra_bootfsm_go
2,241,285 UART:
2,241,634 UART: Running Caliptra ROM ...
2,242,868 UART:
2,243,035 UART: [state] CFI Enabled
2,321,669 UART: [state] LifecycleState = Manufacturing
2,323,639 UART: [state] DebugLocked = No
2,326,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,542 UART: [kat] SHA2-256
2,500,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,770 UART: [kat] ++
2,511,317 UART: [kat] sha1
2,522,966 UART: [kat] SHA2-256
2,525,665 UART: [kat] SHA2-384
2,532,736 UART: [kat] SHA2-512-ACC
2,535,088 UART: [kat] ECC-384
4,821,611 UART: [kat] HMAC-384Kdf
4,834,758 UART: [kat] LMS
6,025,082 UART: [kat] --
6,030,540 UART: [cold-reset] ++
6,033,126 UART: [fht] Storing FHT @ 0x50003400
6,044,125 UART: [idev] ++
6,044,723 UART: [idev] CDI.KEYID = 6
6,045,639 UART: [idev] SUBJECT.KEYID = 7
6,046,913 UART: [idev] UDS.KEYID = 0
6,049,502 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,192,714 UART: [idev] Erasing UDS.KEYID = 0
9,382,631 UART: [idev] Using Sha1 for KeyId Algorithm
9,404,559 UART: [idev] --
9,408,557 UART: [ldev] ++
9,409,185 UART: [ldev] CDI.KEYID = 6
9,410,096 UART: [ldev] SUBJECT.KEYID = 5
9,411,353 UART: [ldev] AUTHORITY.KEYID = 7
9,412,596 UART: [ldev] FE.KEYID = 1
9,458,746 UART: [ldev] Erasing FE.KEYID = 1
12,788,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,114,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,748 UART: [ldev] --
15,152,850 UART: [fwproc] Waiting for Commands...
15,155,812 UART: [fwproc] Received command 0x46574c44
15,158,002 UART: [fwproc] Received Image of size 113760 bytes
19,243,629 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,318,808 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,387,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,703,035 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,790,456 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
12,935,508 >>> mbox cmd response: failed
12,936,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,468 >>> mbox cmd response: failed
12,936,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,937,037 >>> mbox cmd response: failed
Initializing fuses
2,053,791 writing to cptra_bootfsm_go
5,821,962 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
19,939,186 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,528 UART:
192,891 UART: Running Caliptra ROM ...
194,000 UART:
603,805 UART: [state] CFI Enabled
617,469 UART: [state] LifecycleState = Manufacturing
619,398 UART: [state] DebugLocked = No
620,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,548 UART: [kat] SHA2-256
795,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,857 UART: [kat] ++
806,338 UART: [kat] sha1
817,704 UART: [kat] SHA2-256
820,446 UART: [kat] SHA2-384
826,693 UART: [kat] SHA2-512-ACC
829,030 UART: [kat] ECC-384
3,114,575 UART: [kat] HMAC-384Kdf
3,126,857 UART: [kat] LMS
4,317,004 UART: [kat] --
4,321,475 UART: [cold-reset] ++
4,322,820 UART: [fht] Storing FHT @ 0x50003400
4,333,652 UART: [idev] ++
4,334,271 UART: [idev] CDI.KEYID = 6
4,335,179 UART: [idev] SUBJECT.KEYID = 7
4,336,446 UART: [idev] UDS.KEYID = 0
4,341,939 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,485,052 UART: [idev] Erasing UDS.KEYID = 0
7,623,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,830 UART: [idev] --
7,649,934 UART: [ldev] ++
7,650,517 UART: [ldev] CDI.KEYID = 6
7,651,444 UART: [ldev] SUBJECT.KEYID = 5
7,652,663 UART: [ldev] AUTHORITY.KEYID = 7
7,653,951 UART: [ldev] FE.KEYID = 1
7,665,806 UART: [ldev] Erasing FE.KEYID = 1
10,952,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,255 UART: [ldev] --
13,313,525 UART: [fwproc] Waiting for Commands...
13,316,006 UART: [fwproc] Received command 0x46574c44
13,318,198 UART: [fwproc] Received Image of size 113760 bytes
13,415,705 UART: ROM Fatal Error: 0x000B0005
13,419,224 >>> mbox cmd response: failed
13,419,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,419,909 >>> mbox cmd response: failed
13,420,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,420,471 >>> mbox cmd response: failed
Initializing fuses
2,059,086 writing to cptra_bootfsm_go
2,248,382 UART:
2,248,732 UART: Running Caliptra ROM ...
2,249,780 UART:
7,055,807 UART: [state] CFI Enabled
7,070,201 UART: [state] LifecycleState = Manufacturing
7,072,121 UART: [state] DebugLocked = No
7,075,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,080,542 UART: [kat] SHA2-256
7,250,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,260,852 UART: [kat] ++
7,261,397 UART: [kat] sha1
7,272,611 UART: [kat] SHA2-256
7,275,298 UART: [kat] SHA2-384
7,282,794 UART: [kat] SHA2-512-ACC
7,285,198 UART: [kat] ECC-384
9,568,904 UART: [kat] HMAC-384Kdf
9,581,728 UART: [kat] LMS
10,771,806 UART: [kat] --
10,775,708 UART: [cold-reset] ++
10,777,215 UART: [fht] Storing FHT @ 0x50003400
10,788,102 UART: [idev] ++
10,788,667 UART: [idev] CDI.KEYID = 6
10,789,681 UART: [idev] SUBJECT.KEYID = 7
10,790,914 UART: [idev] UDS.KEYID = 0
10,793,608 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
10,936,598 UART: [idev] Erasing UDS.KEYID = 0
14,079,248 UART: [idev] Using Sha1 for KeyId Algorithm
14,100,906 UART: [idev] --
14,104,064 UART: [ldev] ++
14,104,642 UART: [ldev] CDI.KEYID = 6
14,105,606 UART: [ldev] SUBJECT.KEYID = 5
14,106,808 UART: [ldev] AUTHORITY.KEYID = 7
14,108,045 UART: [ldev] FE.KEYID = 1
14,119,342 UART: [ldev] Erasing FE.KEYID = 1
17,408,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,702,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,717,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,732,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,746,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,765,736 UART: [ldev] --
19,769,850 UART: [fwproc] Waiting for Commands...
19,772,329 UART: [fwproc] Received command 0x46574c44
19,774,514 UART: [fwproc] Received Image of size 113760 bytes
23,853,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,930,812 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,999,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
24,315,940 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
4,132,219 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
13,153,619 >>> mbox cmd response: failed
13,154,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,154,799 >>> mbox cmd response: failed
13,155,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,155,373 >>> mbox cmd response: failed
Initializing fuses
2,051,444 writing to cptra_bootfsm_go
10,836,044 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
24,797,461 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
192,890 UART:
193,257 UART: Running Caliptra ROM ...
194,479 UART:
194,632 UART: [state] CFI Enabled
265,370 UART: [state] LifecycleState = Manufacturing
267,249 UART: [state] DebugLocked = No
269,551 UART: [state] WD Timer not started. Device not locked for debugging
274,075 UART: [kat] SHA2-256
453,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,781 UART: [kat] ++
465,316 UART: [kat] sha1
476,576 UART: [kat] SHA2-256
479,576 UART: [kat] SHA2-384
485,723 UART: [kat] SHA2-512-ACC
488,650 UART: [kat] ECC-384
2,949,889 UART: [kat] HMAC-384Kdf
2,972,152 UART: [kat] LMS
3,501,608 UART: [kat] --
3,504,431 UART: [cold-reset] ++
3,505,446 UART: [fht] FHT @ 0x50003400
3,516,961 UART: [idev] ++
3,517,530 UART: [idev] CDI.KEYID = 6
3,518,416 UART: [idev] SUBJECT.KEYID = 7
3,519,630 UART: [idev] UDS.KEYID = 0
3,522,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,179 UART: [idev] Erasing UDS.KEYID = 0
6,023,984 UART: [idev] Sha1 KeyId Algorithm
6,047,166 UART: [idev] --
6,051,165 UART: [ldev] ++
6,051,737 UART: [ldev] CDI.KEYID = 6
6,052,648 UART: [ldev] SUBJECT.KEYID = 5
6,053,867 UART: [ldev] AUTHORITY.KEYID = 7
6,055,100 UART: [ldev] FE.KEYID = 1
6,092,444 UART: [ldev] Erasing FE.KEYID = 1
8,597,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,994 UART: [ldev] --
10,403,815 UART: [fwproc] Wait for Commands...
10,406,115 UART: [fwproc] Recv command 0x46574c44
10,408,163 UART: [fwproc] Recv'd Img size: 114084 bytes
10,499,226 UART: ROM Fatal Error: 0x000B0005
10,502,313 >>> mbox cmd response: failed
10,502,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,503,047 >>> mbox cmd response: failed
10,503,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,503,611 >>> mbox cmd response: failed
Initializing fuses
2,049,176 writing to cptra_bootfsm_go
2,238,428 UART:
2,238,787 UART: Running Caliptra ROM ...
2,239,930 UART:
2,240,089 UART: [state] CFI Enabled
2,326,146 UART: [state] LifecycleState = Manufacturing
2,328,026 UART: [state] DebugLocked = No
2,329,874 UART: [state] WD Timer not started. Device not locked for debugging
2,334,381 UART: [kat] SHA2-256
2,513,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,525,058 UART: [kat] ++
2,525,518 UART: [kat] sha1
2,536,241 UART: [kat] SHA2-256
2,539,309 UART: [kat] SHA2-384
2,546,277 UART: [kat] SHA2-512-ACC
2,549,232 UART: [kat] ECC-384
5,013,448 UART: [kat] HMAC-384Kdf
5,033,831 UART: [kat] LMS
5,563,280 UART: [kat] --
5,567,910 UART: [cold-reset] ++
5,569,409 UART: [fht] FHT @ 0x50003400
5,579,788 UART: [idev] ++
5,580,388 UART: [idev] CDI.KEYID = 6
5,581,309 UART: [idev] SUBJECT.KEYID = 7
5,582,474 UART: [idev] UDS.KEYID = 0
5,585,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,728,568 UART: [idev] Erasing UDS.KEYID = 0
8,090,044 UART: [idev] Sha1 KeyId Algorithm
8,113,335 UART: [idev] --
8,116,903 UART: [ldev] ++
8,117,564 UART: [ldev] CDI.KEYID = 6
8,118,454 UART: [ldev] SUBJECT.KEYID = 5
8,119,691 UART: [ldev] AUTHORITY.KEYID = 7
8,120,873 UART: [ldev] FE.KEYID = 1
8,163,099 UART: [ldev] Erasing FE.KEYID = 1
10,664,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,569 UART: [ldev] --
12,455,940 UART: [fwproc] Wait for Commands...
12,458,970 UART: [fwproc] Recv command 0x46574c44
12,461,120 UART: [fwproc] Recv'd Img size: 114084 bytes
15,892,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,967,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,036,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,353,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,362,393 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,279,698 >>> mbox cmd response: failed
10,280,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,280,756 >>> mbox cmd response: failed
10,281,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,281,356 >>> mbox cmd response: failed
Initializing fuses
2,051,317 writing to cptra_bootfsm_go
5,418,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,125,147 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,613 UART:
192,974 UART: Running Caliptra ROM ...
194,182 UART:
603,644 UART: [state] CFI Enabled
616,833 UART: [state] LifecycleState = Manufacturing
618,715 UART: [state] DebugLocked = No
620,885 UART: [state] WD Timer not started. Device not locked for debugging
623,941 UART: [kat] SHA2-256
803,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,607 UART: [kat] ++
815,054 UART: [kat] sha1
826,578 UART: [kat] SHA2-256
829,641 UART: [kat] SHA2-384
834,919 UART: [kat] SHA2-512-ACC
837,901 UART: [kat] ECC-384
3,277,032 UART: [kat] HMAC-384Kdf
3,289,159 UART: [kat] LMS
3,818,684 UART: [kat] --
3,823,894 UART: [cold-reset] ++
3,825,081 UART: [fht] FHT @ 0x50003400
3,836,325 UART: [idev] ++
3,836,933 UART: [idev] CDI.KEYID = 6
3,837,822 UART: [idev] SUBJECT.KEYID = 7
3,838,928 UART: [idev] UDS.KEYID = 0
3,841,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,984,998 UART: [idev] Erasing UDS.KEYID = 0
6,311,170 UART: [idev] Sha1 KeyId Algorithm
6,333,970 UART: [idev] --
6,336,861 UART: [ldev] ++
6,337,442 UART: [ldev] CDI.KEYID = 6
6,338,330 UART: [ldev] SUBJECT.KEYID = 5
6,339,462 UART: [ldev] AUTHORITY.KEYID = 7
6,340,795 UART: [ldev] FE.KEYID = 1
6,350,929 UART: [ldev] Erasing FE.KEYID = 1
8,823,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,636 UART: [ldev] --
10,609,659 UART: [fwproc] Wait for Commands...
10,611,769 UART: [fwproc] Recv command 0x46574c44
10,613,866 UART: [fwproc] Recv'd Img size: 114084 bytes
10,703,345 UART: ROM Fatal Error: 0x000B0005
10,706,485 >>> mbox cmd response: failed
10,706,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,156 >>> mbox cmd response: failed
10,707,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,707,710 >>> mbox cmd response: failed
Initializing fuses
2,050,584 writing to cptra_bootfsm_go
2,239,878 UART:
2,240,223 UART: Running Caliptra ROM ...
2,241,289 UART:
9,746,402 UART: [state] CFI Enabled
9,759,058 UART: [state] LifecycleState = Manufacturing
9,760,920 UART: [state] DebugLocked = No
9,762,954 UART: [state] WD Timer not started. Device not locked for debugging
9,765,955 UART: [kat] SHA2-256
9,945,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,956,650 UART: [kat] ++
9,957,201 UART: [kat] sha1
9,968,316 UART: [kat] SHA2-256
9,971,326 UART: [kat] SHA2-384
9,977,634 UART: [kat] SHA2-512-ACC
9,980,587 UART: [kat] ECC-384
12,421,161 UART: [kat] HMAC-384Kdf
12,433,756 UART: [kat] LMS
12,963,265 UART: [kat] --
12,969,451 UART: [cold-reset] ++
12,970,659 UART: [fht] FHT @ 0x50003400
12,980,516 UART: [idev] ++
12,981,090 UART: [idev] CDI.KEYID = 6
12,982,032 UART: [idev] SUBJECT.KEYID = 7
12,983,246 UART: [idev] UDS.KEYID = 0
12,986,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,129,421 UART: [idev] Erasing UDS.KEYID = 0
15,458,108 UART: [idev] Sha1 KeyId Algorithm
15,480,527 UART: [idev] --
15,484,248 UART: [ldev] ++
15,484,818 UART: [ldev] CDI.KEYID = 6
15,485,703 UART: [ldev] SUBJECT.KEYID = 5
15,486,907 UART: [ldev] AUTHORITY.KEYID = 7
15,488,191 UART: [ldev] FE.KEYID = 1
15,500,408 UART: [ldev] Erasing FE.KEYID = 1
17,974,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,692,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,708,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,723,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,739,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,437 UART: [ldev] --
19,764,625 UART: [fwproc] Wait for Commands...
19,767,474 UART: [fwproc] Recv command 0x46574c44
19,769,615 UART: [fwproc] Recv'd Img size: 114084 bytes
23,200,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,261,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,330,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,647,885 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,697,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,492,450 >>> mbox cmd response: failed
10,493,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,493,384 >>> mbox cmd response: failed
10,493,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,493,951 >>> mbox cmd response: failed
Initializing fuses
2,052,179 writing to cptra_bootfsm_go
13,064,462 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
23,663,844 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,003 UART:
192,488 UART: Running Caliptra ROM ...
193,640 UART:
193,786 UART: [state] CFI Enabled
262,926 UART: [state] LifecycleState = Manufacturing
265,304 UART: [state] DebugLocked = No
267,072 UART: [state] WD Timer not started. Device not locked for debugging
271,198 UART: [kat] SHA2-256
461,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,857 UART: [kat] ++
472,354 UART: [kat] sha1
483,881 UART: [kat] SHA2-256
486,904 UART: [kat] SHA2-384
492,348 UART: [kat] SHA2-512-ACC
494,962 UART: [kat] ECC-384
2,949,726 UART: [kat] HMAC-384Kdf
2,971,356 UART: [kat] LMS
3,503,097 UART: [kat] --
3,506,677 UART: [cold-reset] ++
3,508,555 UART: [fht] FHT @ 0x50003400
3,520,130 UART: [idev] ++
3,520,804 UART: [idev] CDI.KEYID = 6
3,521,767 UART: [idev] SUBJECT.KEYID = 7
3,522,999 UART: [idev] UDS.KEYID = 0
3,528,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,602 UART: [idev] Erasing UDS.KEYID = 0
6,028,801 UART: [idev] Sha1 KeyId Algorithm
6,051,453 UART: [idev] --
6,055,748 UART: [ldev] ++
6,056,436 UART: [ldev] CDI.KEYID = 6
6,057,355 UART: [ldev] SUBJECT.KEYID = 5
6,058,517 UART: [ldev] AUTHORITY.KEYID = 7
6,059,750 UART: [ldev] FE.KEYID = 1
6,100,803 UART: [ldev] Erasing FE.KEYID = 1
8,607,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,868 UART: [ldev] --
10,415,213 UART: [fwproc] Wait for Commands...
10,417,416 UART: [fwproc] Recv command 0x46574c44
10,419,736 UART: [fwproc] Recv'd Img size: 114084 bytes
10,541,926 UART: ROM Fatal Error: 0x000B0005
10,545,566 >>> mbox cmd response: failed
10,545,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,306 >>> mbox cmd response: failed
10,546,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,867 >>> mbox cmd response: failed
Initializing fuses
2,052,218 writing to cptra_bootfsm_go
2,241,512 UART:
2,241,870 UART: Running Caliptra ROM ...
2,243,007 UART:
2,243,175 UART: [state] CFI Enabled
2,303,631 UART: [state] LifecycleState = Manufacturing
2,306,060 UART: [state] DebugLocked = No
2,307,885 UART: [state] WD Timer not started. Device not locked for debugging
2,312,461 UART: [kat] SHA2-256
2,502,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,095 UART: [kat] ++
2,513,590 UART: [kat] sha1
2,525,127 UART: [kat] SHA2-256
2,528,171 UART: [kat] SHA2-384
2,534,334 UART: [kat] SHA2-512-ACC
2,536,758 UART: [kat] ECC-384
4,986,408 UART: [kat] HMAC-384Kdf
5,011,493 UART: [kat] LMS
5,543,224 UART: [kat] --
5,547,082 UART: [cold-reset] ++
5,548,486 UART: [fht] FHT @ 0x50003400
5,560,333 UART: [idev] ++
5,561,015 UART: [idev] CDI.KEYID = 6
5,561,983 UART: [idev] SUBJECT.KEYID = 7
5,563,197 UART: [idev] UDS.KEYID = 0
5,565,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,709,478 UART: [idev] Erasing UDS.KEYID = 0
8,070,421 UART: [idev] Sha1 KeyId Algorithm
8,092,213 UART: [idev] --
8,096,069 UART: [ldev] ++
8,096,762 UART: [ldev] CDI.KEYID = 6
8,097,675 UART: [ldev] SUBJECT.KEYID = 5
8,098,839 UART: [ldev] AUTHORITY.KEYID = 7
8,100,015 UART: [ldev] FE.KEYID = 1
8,138,923 UART: [ldev] Erasing FE.KEYID = 1
10,648,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,618 UART: [ldev] --
12,452,179 UART: [fwproc] Wait for Commands...
12,454,282 UART: [fwproc] Recv command 0x46574c44
12,456,589 UART: [fwproc] Recv'd Img size: 114084 bytes
15,936,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,132,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,673,648 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,441,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,347,463 >>> mbox cmd response: failed
10,348,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,348,404 >>> mbox cmd response: failed
10,348,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,348,972 >>> mbox cmd response: failed
Initializing fuses
2,053,061 writing to cptra_bootfsm_go
5,484,774 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,817,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
192,703 UART:
193,088 UART: Running Caliptra ROM ...
194,229 UART:
603,982 UART: [state] CFI Enabled
620,556 UART: [state] LifecycleState = Manufacturing
622,881 UART: [state] DebugLocked = No
625,552 UART: [state] WD Timer not started. Device not locked for debugging
630,609 UART: [kat] SHA2-256
820,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,271 UART: [kat] ++
831,858 UART: [kat] sha1
842,905 UART: [kat] SHA2-256
845,946 UART: [kat] SHA2-384
851,876 UART: [kat] SHA2-512-ACC
854,453 UART: [kat] ECC-384
3,295,819 UART: [kat] HMAC-384Kdf
3,308,695 UART: [kat] LMS
3,840,529 UART: [kat] --
3,845,269 UART: [cold-reset] ++
3,846,774 UART: [fht] FHT @ 0x50003400
3,858,247 UART: [idev] ++
3,858,917 UART: [idev] CDI.KEYID = 6
3,859,859 UART: [idev] SUBJECT.KEYID = 7
3,861,070 UART: [idev] UDS.KEYID = 0
3,866,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,010,357 UART: [idev] Erasing UDS.KEYID = 0
6,336,868 UART: [idev] Sha1 KeyId Algorithm
6,358,916 UART: [idev] --
6,364,933 UART: [ldev] ++
6,365,688 UART: [ldev] CDI.KEYID = 6
6,366,570 UART: [ldev] SUBJECT.KEYID = 5
6,367,728 UART: [ldev] AUTHORITY.KEYID = 7
6,368,962 UART: [ldev] FE.KEYID = 1
6,381,471 UART: [ldev] Erasing FE.KEYID = 1
8,861,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,721 UART: [ldev] --
10,650,631 UART: [fwproc] Wait for Commands...
10,653,806 UART: [fwproc] Recv command 0x46574c44
10,656,117 UART: [fwproc] Recv'd Img size: 114084 bytes
10,775,388 UART: ROM Fatal Error: 0x000B0005
10,779,077 >>> mbox cmd response: failed
10,779,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,779,853 >>> mbox cmd response: failed
10,780,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,780,410 >>> mbox cmd response: failed
Initializing fuses
2,056,864 writing to cptra_bootfsm_go
2,246,157 UART:
2,246,491 UART: Running Caliptra ROM ...
2,247,628 UART:
9,689,623 UART: [state] CFI Enabled
9,705,140 UART: [state] LifecycleState = Manufacturing
9,707,543 UART: [state] DebugLocked = No
9,708,903 UART: [state] WD Timer not started. Device not locked for debugging
9,714,157 UART: [kat] SHA2-256
9,904,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,914,836 UART: [kat] ++
9,915,354 UART: [kat] sha1
9,926,890 UART: [kat] SHA2-256
9,929,917 UART: [kat] SHA2-384
9,934,994 UART: [kat] SHA2-512-ACC
9,937,560 UART: [kat] ECC-384
12,378,450 UART: [kat] HMAC-384Kdf
12,392,564 UART: [kat] LMS
12,924,375 UART: [kat] --
12,927,668 UART: [cold-reset] ++
12,929,080 UART: [fht] FHT @ 0x50003400
12,939,849 UART: [idev] ++
12,940,562 UART: [idev] CDI.KEYID = 6
12,941,531 UART: [idev] SUBJECT.KEYID = 7
12,942,744 UART: [idev] UDS.KEYID = 0
12,945,693 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,088,968 UART: [idev] Erasing UDS.KEYID = 0
15,419,626 UART: [idev] Sha1 KeyId Algorithm
15,443,229 UART: [idev] --
15,447,920 UART: [ldev] ++
15,448,598 UART: [ldev] CDI.KEYID = 6
15,449,559 UART: [ldev] SUBJECT.KEYID = 5
15,450,711 UART: [ldev] AUTHORITY.KEYID = 7
15,451,939 UART: [ldev] FE.KEYID = 1
15,464,364 UART: [ldev] Erasing FE.KEYID = 1
17,938,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,659,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,674,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,689,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,704,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,724,910 UART: [ldev] --
19,729,849 UART: [fwproc] Wait for Commands...
19,731,402 UART: [fwproc] Recv command 0x46574c44
19,733,718 UART: [fwproc] Recv'd Img size: 114084 bytes
23,212,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,289,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,406,031 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
23,947,563 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,764,197 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
10,568,401 >>> mbox cmd response: failed
10,569,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,569,546 >>> mbox cmd response: failed
10,569,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,570,110 >>> mbox cmd response: failed
Initializing fuses
2,058,705 writing to cptra_bootfsm_go
13,056,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
24,294,234 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Manufacturing
85,665 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,791 UART: [kat] SHA2-256
881,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,837 UART: [kat] ++
885,989 UART: [kat] sha1
890,167 UART: [kat] SHA2-256
892,105 UART: [kat] SHA2-384
894,756 UART: [kat] SHA2-512-ACC
896,657 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
906,976 UART: [kat] LMS
1,475,172 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,528 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,318 UART: [idev] --
1,514,321 UART: [ldev] ++
1,514,489 UART: [ldev] CDI.KEYID = 6
1,514,852 UART: [ldev] SUBJECT.KEYID = 5
1,515,278 UART: [ldev] AUTHORITY.KEYID = 7
1,515,741 UART: [ldev] FE.KEYID = 1
1,521,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,682 UART: [ldev] --
1,586,091 UART: [fwproc] Waiting for Commands...
1,586,882 UART: [fwproc] Received command 0x46574c44
1,587,673 UART: [fwproc] Received Image of size 114084 bytes
1,632,476 UART: ROM Fatal Error: 0x000B0005
1,633,633 >>> mbox cmd response: failed
1,633,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,639 >>> mbox cmd response: failed
1,633,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,690 UART: [idev] ++
1,479,858 UART: [idev] CDI.KEYID = 6
1,480,218 UART: [idev] SUBJECT.KEYID = 7
1,480,642 UART: [idev] UDS.KEYID = 0
1,480,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,556 UART: [idev] Erasing UDS.KEYID = 0
1,504,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,226 UART: [idev] --
1,514,355 UART: [ldev] ++
1,514,523 UART: [ldev] CDI.KEYID = 6
1,514,886 UART: [ldev] SUBJECT.KEYID = 5
1,515,312 UART: [ldev] AUTHORITY.KEYID = 7
1,515,775 UART: [ldev] FE.KEYID = 1
1,520,955 UART: [ldev] Erasing FE.KEYID = 1
1,546,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,178 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,402 UART: [fwproc] Received command 0x46574c44
1,587,193 UART: [fwproc] Received Image of size 114084 bytes
2,882,830 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,049 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,486,030 >>> mbox cmd response: failed
1,486,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,036 >>> mbox cmd response: failed
1,486,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,661 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Manufacturing
86,246 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,467 UART: [kat] LMS
1,475,663 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,477,098 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,745 UART: [idev] Erasing UDS.KEYID = 0
1,505,985 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,771 UART: [idev] --
1,515,734 UART: [ldev] ++
1,515,902 UART: [ldev] CDI.KEYID = 6
1,516,265 UART: [ldev] SUBJECT.KEYID = 5
1,516,691 UART: [ldev] AUTHORITY.KEYID = 7
1,517,154 UART: [ldev] FE.KEYID = 1
1,522,108 UART: [ldev] Erasing FE.KEYID = 1
1,546,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,933 UART: [ldev] --
1,586,304 UART: [fwproc] Waiting for Commands...
1,586,929 UART: [fwproc] Received command 0x46574c44
1,587,720 UART: [fwproc] Received Image of size 114084 bytes
1,633,225 UART: ROM Fatal Error: 0x000B0005
1,634,382 >>> mbox cmd response: failed
1,634,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,388 >>> mbox cmd response: failed
1,634,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,278 UART: [cold-reset] ++
1,476,618 UART: [fht] Storing FHT @ 0x50003400
1,479,387 UART: [idev] ++
1,479,555 UART: [idev] CDI.KEYID = 6
1,479,915 UART: [idev] SUBJECT.KEYID = 7
1,480,339 UART: [idev] UDS.KEYID = 0
1,480,684 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,425 UART: [idev] Erasing UDS.KEYID = 0
1,505,385 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,209 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,521,774 UART: [ldev] Erasing FE.KEYID = 1
1,547,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,275 UART: [ldev] --
1,586,652 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 114084 bytes
2,882,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,943 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,712 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,403 >>> mbox cmd response: failed
1,487,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,409 >>> mbox cmd response: failed
1,487,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,590 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Manufacturing
86,279 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,081 UART: [kat] SHA2-256
904,021 UART: [kat] SHA2-384
906,828 UART: [kat] SHA2-512-ACC
908,729 UART: [kat] ECC-384
918,766 UART: [kat] HMAC-384Kdf
923,454 UART: [kat] LMS
1,171,782 UART: [kat] --
1,172,645 UART: [cold-reset] ++
1,173,187 UART: [fht] FHT @ 0x50003400
1,175,726 UART: [idev] ++
1,175,894 UART: [idev] CDI.KEYID = 6
1,176,254 UART: [idev] SUBJECT.KEYID = 7
1,176,678 UART: [idev] UDS.KEYID = 0
1,177,023 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,374 UART: [idev] Erasing UDS.KEYID = 0
1,202,171 UART: [idev] Sha1 KeyId Algorithm
1,210,731 UART: [idev] --
1,211,791 UART: [ldev] ++
1,211,959 UART: [ldev] CDI.KEYID = 6
1,212,322 UART: [ldev] SUBJECT.KEYID = 5
1,212,748 UART: [ldev] AUTHORITY.KEYID = 7
1,213,211 UART: [ldev] FE.KEYID = 1
1,218,307 UART: [ldev] Erasing FE.KEYID = 1
1,244,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,069 UART: [ldev] --
1,283,352 UART: [fwproc] Wait for Commands...
1,284,098 UART: [fwproc] Recv command 0x46574c44
1,284,826 UART: [fwproc] Recv'd Img size: 114084 bytes
1,329,989 UART: ROM Fatal Error: 0x000B0005
1,331,146 >>> mbox cmd response: failed
1,331,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,152 >>> mbox cmd response: failed
1,331,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
893,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,329 UART: [kat] ++
897,481 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,242 UART: [kat] SHA2-512-ACC
908,143 UART: [kat] ECC-384
917,928 UART: [kat] HMAC-384Kdf
922,312 UART: [kat] LMS
1,170,640 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,171,977 UART: [fht] FHT @ 0x50003400
1,174,432 UART: [idev] ++
1,174,600 UART: [idev] CDI.KEYID = 6
1,174,960 UART: [idev] SUBJECT.KEYID = 7
1,175,384 UART: [idev] UDS.KEYID = 0
1,175,729 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,583 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,588 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,288 UART: [fwproc] Wait for Commands...
1,282,998 UART: [fwproc] Recv command 0x46574c44
1,283,726 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,793 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,097 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,428 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,277 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,033 >>> mbox cmd response: failed
1,184,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,039 >>> mbox cmd response: failed
1,184,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,897 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Manufacturing
86,410 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,268 UART: [kat] SHA2-256
904,208 UART: [kat] SHA2-384
907,043 UART: [kat] SHA2-512-ACC
908,944 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,834 UART: [fht] FHT @ 0x50003400
1,175,695 UART: [idev] ++
1,175,863 UART: [idev] CDI.KEYID = 6
1,176,223 UART: [idev] SUBJECT.KEYID = 7
1,176,647 UART: [idev] UDS.KEYID = 0
1,176,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,823 UART: [idev] Erasing UDS.KEYID = 0
1,201,840 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,245,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,910 UART: [ldev] --
1,284,303 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 114084 bytes
1,330,556 UART: ROM Fatal Error: 0x000B0005
1,331,713 >>> mbox cmd response: failed
1,331,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,719 >>> mbox cmd response: failed
1,331,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
893,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,310 UART: [kat] ++
897,462 UART: [kat] sha1
901,522 UART: [kat] SHA2-256
903,462 UART: [kat] SHA2-384
906,057 UART: [kat] SHA2-512-ACC
907,958 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,651 UART: [kat] LMS
1,170,979 UART: [kat] --
1,171,988 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,174,743 UART: [idev] ++
1,174,911 UART: [idev] CDI.KEYID = 6
1,175,271 UART: [idev] SUBJECT.KEYID = 7
1,175,695 UART: [idev] UDS.KEYID = 0
1,176,040 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,751 UART: [idev] Erasing UDS.KEYID = 0
1,200,522 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,892 UART: [ldev] ++
1,210,060 UART: [ldev] CDI.KEYID = 6
1,210,423 UART: [ldev] SUBJECT.KEYID = 5
1,210,849 UART: [ldev] AUTHORITY.KEYID = 7
1,211,312 UART: [ldev] FE.KEYID = 1
1,216,538 UART: [ldev] Erasing FE.KEYID = 1
1,242,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,652 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,793 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,325 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,242 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,186,194 >>> mbox cmd response: failed
1,186,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,200 >>> mbox cmd response: failed
1,186,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,284 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Manufacturing
85,463 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
890,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,913 UART: [kat] ++
895,065 UART: [kat] sha1
899,319 UART: [kat] SHA2-256
901,259 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,490 UART: [kat] HMAC-384Kdf
920,108 UART: [kat] LMS
1,168,420 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,587 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,173,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,531 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,480 UART: [ldev] ++
1,208,648 UART: [ldev] CDI.KEYID = 6
1,209,012 UART: [ldev] SUBJECT.KEYID = 5
1,209,439 UART: [ldev] AUTHORITY.KEYID = 7
1,209,902 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,242,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,596 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,753 UART: [fwproc] Recv command 0x46574c44
1,283,486 UART: [fwproc] Recv'd Img size: 114084 bytes
1,328,225 UART: ROM Fatal Error: 0x000B0005
1,329,382 >>> mbox cmd response: failed
1,329,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,388 >>> mbox cmd response: failed
1,329,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,429 UART: [kat] SHA2-256
901,369 UART: [kat] SHA2-384
904,160 UART: [kat] SHA2-512-ACC
906,061 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,174,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,270 UART: [ldev] Erasing FE.KEYID = 1
1,240,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,596 UART: [ldev] --
1,280,056 UART: [fwproc] Wait for Commands...
1,280,871 UART: [fwproc] Recv command 0x46574c44
1,281,604 UART: [fwproc] Recv'd Img size: 114084 bytes
2,575,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,602,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,767,628 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,047 >>> mbox cmd response: failed
1,181,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,053 >>> mbox cmd response: failed
1,181,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,616,114 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Manufacturing
86,016 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,050 UART: [fht] FHT @ 0x50003400
1,172,654 UART: [idev] ++
1,172,822 UART: [idev] CDI.KEYID = 6
1,173,183 UART: [idev] SUBJECT.KEYID = 7
1,173,608 UART: [idev] UDS.KEYID = 0
1,173,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,238 UART: [idev] Sha1 KeyId Algorithm
1,207,298 UART: [idev] --
1,208,187 UART: [ldev] ++
1,208,355 UART: [ldev] CDI.KEYID = 6
1,208,719 UART: [ldev] SUBJECT.KEYID = 5
1,209,146 UART: [ldev] AUTHORITY.KEYID = 7
1,209,609 UART: [ldev] FE.KEYID = 1
1,214,967 UART: [ldev] Erasing FE.KEYID = 1
1,241,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,321 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,394 UART: [fwproc] Recv command 0x46574c44
1,282,127 UART: [fwproc] Recv'd Img size: 114084 bytes
1,326,622 UART: ROM Fatal Error: 0x000B0005
1,327,779 >>> mbox cmd response: failed
1,327,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,785 >>> mbox cmd response: failed
1,327,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
891,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,074 UART: [kat] ++
896,226 UART: [kat] sha1
900,534 UART: [kat] SHA2-256
902,474 UART: [kat] SHA2-384
905,401 UART: [kat] SHA2-512-ACC
907,302 UART: [kat] ECC-384
916,879 UART: [kat] HMAC-384Kdf
921,463 UART: [kat] LMS
1,169,775 UART: [kat] --
1,170,708 UART: [cold-reset] ++
1,171,220 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,480 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,913 UART: [ldev] --
1,282,289 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,655 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,997 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,779 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,430 >>> mbox cmd response: failed
1,182,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,436 >>> mbox cmd response: failed
1,182,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,618,297 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
191,608 UART:
191,971 UART: Running Caliptra ROM ...
193,136 UART:
193,289 UART: [state] CFI Enabled
260,857 UART: [state] LifecycleState = Unprovisioned
262,801 UART: [state] DebugLocked = Yes
264,701 UART: [state] Starting the Watchdog Timer 40000000 cycles
269,611 UART: [kat] SHA2-256
439,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,836 UART: [kat] ++
450,326 UART: [kat] sha1
459,804 UART: [kat] SHA2-256
462,539 UART: [kat] SHA2-384
468,194 UART: [kat] SHA2-512-ACC
470,543 UART: [kat] ECC-384
2,763,902 UART: [kat] HMAC-384Kdf
2,776,148 UART: [kat] LMS
3,966,457 UART: [kat] --
3,970,186 UART: [cold-reset] ++
3,972,444 UART: [fht] Storing FHT @ 0x50003400
3,985,113 UART: [idev] ++
3,985,678 UART: [idev] CDI.KEYID = 6
3,986,584 UART: [idev] SUBJECT.KEYID = 7
3,987,857 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,441 UART:
193,336 UART: Running Caliptra ROM ...
194,482 UART:
194,627 UART: [state] CFI Enabled
263,332 UART: [state] LifecycleState = Manufacturing
265,291 UART: [state] DebugLocked = Yes
266,716 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,486 UART: [kat] SHA2-256
441,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,711 UART: [kat] ++
452,217 UART: [kat] sha1
463,746 UART: [kat] SHA2-256
466,439 UART: [kat] SHA2-384
472,256 UART: [kat] SHA2-512-ACC
474,647 UART: [kat] ECC-384
2,767,720 UART: [kat] HMAC-384Kdf
2,799,867 UART: [kat] LMS
3,990,151 UART: [kat] --
3,995,899 UART: [cold-reset] ++
3,997,733 UART: [fht] Storing FHT @ 0x50003400
4,008,847 UART: [idev] ++
4,009,474 UART: [idev] CDI.KEYID = 6
4,010,365 UART: [idev] SUBJECT.KEYID = 7
4,011,656 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
191,611 UART:
191,980 UART: Running Caliptra ROM ...
193,262 UART:
193,417 UART: [state] CFI Enabled
262,542 UART: [state] LifecycleState = Unknown
264,275 UART: [state] DebugLocked = Yes
266,286 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,034 UART: [kat] SHA2-256
440,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,241 UART: [kat] ++
451,794 UART: [kat] sha1
462,891 UART: [kat] SHA2-256
465,576 UART: [kat] SHA2-384
470,046 UART: [kat] SHA2-512-ACC
472,394 UART: [kat] ECC-384
2,765,297 UART: [kat] HMAC-384Kdf
2,777,606 UART: [kat] LMS
3,967,913 UART: [kat] --
3,972,840 UART: [cold-reset] ++
3,974,667 UART: [fht] Storing FHT @ 0x50003400
3,986,148 UART: [idev] ++
3,986,723 UART: [idev] CDI.KEYID = 6
3,987,668 UART: [idev] SUBJECT.KEYID = 7
3,988,855 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
191,712 UART:
192,637 UART: Running Caliptra ROM ...
193,800 UART:
193,952 UART: [state] CFI Enabled
261,979 UART: [state] LifecycleState = Production
263,825 UART: [state] DebugLocked = Yes
266,638 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,367 UART: [kat] SHA2-256
442,088 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,614 UART: [kat] ++
453,168 UART: [kat] sha1
464,646 UART: [kat] SHA2-256
467,323 UART: [kat] SHA2-384
473,304 UART: [kat] SHA2-512-ACC
475,699 UART: [kat] ECC-384
2,763,367 UART: [kat] HMAC-384Kdf
2,775,360 UART: [kat] LMS
3,965,683 UART: [kat] --
3,970,229 UART: [cold-reset] ++
3,972,061 UART: [fht] Storing FHT @ 0x50003400
3,983,549 UART: [idev] ++
3,984,110 UART: [idev] CDI.KEYID = 6
3,985,071 UART: [idev] SUBJECT.KEYID = 7
3,986,292 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,316 UART:
193,219 UART: Running Caliptra ROM ...
194,381 UART:
194,526 UART: [state] CFI Enabled
267,690 UART: [state] LifecycleState = Unprovisioned
269,601 UART: [state] DebugLocked = No
272,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,898 UART: [kat] SHA2-256
446,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,098 UART: [kat] ++
457,605 UART: [kat] sha1
469,438 UART: [kat] SHA2-256
472,098 UART: [kat] SHA2-384
478,890 UART: [kat] SHA2-512-ACC
481,299 UART: [kat] ECC-384
2,770,269 UART: [kat] HMAC-384Kdf
2,801,653 UART: [kat] LMS
3,991,963 UART: [kat] --
3,997,924 UART: [cold-reset] ++
3,999,105 UART: [fht] Storing FHT @ 0x50003400
4,010,269 UART: [idev] ++
4,010,893 UART: [idev] CDI.KEYID = 6
4,011,806 UART: [idev] SUBJECT.KEYID = 7
4,013,074 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,359 UART:
192,716 UART: Running Caliptra ROM ...
193,866 UART:
194,012 UART: [state] CFI Enabled
259,766 UART: [state] LifecycleState = Manufacturing
261,739 UART: [state] DebugLocked = No
263,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,794 UART: [kat] SHA2-256
438,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,973 UART: [kat] ++
449,560 UART: [kat] sha1
461,816 UART: [kat] SHA2-256
464,543 UART: [kat] SHA2-384
470,790 UART: [kat] SHA2-512-ACC
473,178 UART: [kat] ECC-384
2,766,822 UART: [kat] HMAC-384Kdf
2,797,731 UART: [kat] LMS
3,988,039 UART: [kat] --
3,992,270 UART: [cold-reset] ++
3,993,777 UART: [fht] Storing FHT @ 0x50003400
4,006,847 UART: [idev] ++
4,007,428 UART: [idev] CDI.KEYID = 6
4,008,394 UART: [idev] SUBJECT.KEYID = 7
4,009,612 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,170 UART:
192,556 UART: Running Caliptra ROM ...
193,746 UART:
193,897 UART: [state] CFI Enabled
259,251 UART: [state] LifecycleState = Unknown
260,935 UART: [state] DebugLocked = No
263,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,146 UART: [kat] SHA2-256
436,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,335 UART: [kat] ++
447,922 UART: [kat] sha1
459,831 UART: [kat] SHA2-256
462,515 UART: [kat] SHA2-384
469,411 UART: [kat] SHA2-512-ACC
471,755 UART: [kat] ECC-384
2,763,527 UART: [kat] HMAC-384Kdf
2,775,200 UART: [kat] LMS
3,965,524 UART: [kat] --
3,969,217 UART: [cold-reset] ++
3,970,780 UART: [fht] Storing FHT @ 0x50003400
3,981,451 UART: [idev] ++
3,982,025 UART: [idev] CDI.KEYID = 6
3,982,999 UART: [idev] SUBJECT.KEYID = 7
3,984,236 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,182 UART:
192,548 UART: Running Caliptra ROM ...
193,747 UART:
193,903 UART: [state] CFI Enabled
264,666 UART: [state] LifecycleState = Production
266,510 UART: [state] DebugLocked = No
269,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,131 UART: [kat] SHA2-256
442,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,348 UART: [kat] ++
453,876 UART: [kat] sha1
465,036 UART: [kat] SHA2-256
467,721 UART: [kat] SHA2-384
474,400 UART: [kat] SHA2-512-ACC
476,791 UART: [kat] ECC-384
2,766,016 UART: [kat] HMAC-384Kdf
2,778,479 UART: [kat] LMS
3,968,792 UART: [kat] --
3,973,444 UART: [cold-reset] ++
3,974,464 UART: [fht] Storing FHT @ 0x50003400
3,985,892 UART: [idev] ++
3,986,455 UART: [idev] CDI.KEYID = 6
3,987,335 UART: [idev] SUBJECT.KEYID = 7
3,988,522 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
191,732 UART:
192,119 UART: Running Caliptra ROM ...
193,297 UART:
602,892 UART: [state] CFI Enabled
616,616 UART: [state] LifecycleState = Unprovisioned
618,529 UART: [state] DebugLocked = Yes
621,084 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,807 UART: [kat] SHA2-256
796,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,112 UART: [kat] ++
807,608 UART: [kat] sha1
818,632 UART: [kat] SHA2-256
821,303 UART: [kat] SHA2-384
826,646 UART: [kat] SHA2-512-ACC
829,046 UART: [kat] ECC-384
3,114,445 UART: [kat] HMAC-384Kdf
3,126,845 UART: [kat] LMS
4,316,986 UART: [kat] --
4,320,912 UART: [cold-reset] ++
4,323,172 UART: [fht] Storing FHT @ 0x50003400
4,334,709 UART: [idev] ++
4,335,283 UART: [idev] CDI.KEYID = 6
4,336,220 UART: [idev] SUBJECT.KEYID = 7
4,337,466 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,531 UART:
193,254 UART: Running Caliptra ROM ...
194,408 UART:
603,651 UART: [state] CFI Enabled
616,265 UART: [state] LifecycleState = Manufacturing
618,187 UART: [state] DebugLocked = Yes
620,195 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,480 UART: [kat] SHA2-256
795,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,808 UART: [kat] ++
806,271 UART: [kat] sha1
816,336 UART: [kat] SHA2-256
819,022 UART: [kat] SHA2-384
825,330 UART: [kat] SHA2-512-ACC
827,836 UART: [kat] ECC-384
3,112,314 UART: [kat] HMAC-384Kdf
3,123,699 UART: [kat] LMS
4,313,845 UART: [kat] --
4,320,335 UART: [cold-reset] ++
4,321,404 UART: [fht] Storing FHT @ 0x50003400
4,332,830 UART: [idev] ++
4,333,395 UART: [idev] CDI.KEYID = 6
4,334,362 UART: [idev] SUBJECT.KEYID = 7
4,335,574 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,643 writing to cptra_bootfsm_go
192,266 UART:
192,605 UART: Running Caliptra ROM ...
193,718 UART:
603,583 UART: [state] CFI Enabled
620,237 UART: [state] LifecycleState = Unknown
621,879 UART: [state] DebugLocked = Yes
624,638 UART: [state] Starting the Watchdog Timer 40000000 cycles
630,598 UART: [kat] SHA2-256
800,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,935 UART: [kat] ++
811,481 UART: [kat] sha1
822,060 UART: [kat] SHA2-256
824,754 UART: [kat] SHA2-384
829,924 UART: [kat] SHA2-512-ACC
832,313 UART: [kat] ECC-384
3,118,027 UART: [kat] HMAC-384Kdf
3,130,599 UART: [kat] LMS
4,320,716 UART: [kat] --
4,325,263 UART: [cold-reset] ++
4,327,035 UART: [fht] Storing FHT @ 0x50003400
4,339,161 UART: [idev] ++
4,339,777 UART: [idev] CDI.KEYID = 6
4,340,656 UART: [idev] SUBJECT.KEYID = 7
4,341,845 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
191,816 UART:
192,715 UART: Running Caliptra ROM ...
194,149 UART:
602,826 UART: [state] CFI Enabled
614,911 UART: [state] LifecycleState = Production
616,735 UART: [state] DebugLocked = Yes
618,313 UART: [state] Starting the Watchdog Timer 40000000 cycles
623,826 UART: [kat] SHA2-256
793,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,138 UART: [kat] ++
804,656 UART: [kat] sha1
815,317 UART: [kat] SHA2-256
818,006 UART: [kat] SHA2-384
824,807 UART: [kat] SHA2-512-ACC
827,143 UART: [kat] ECC-384
3,112,051 UART: [kat] HMAC-384Kdf
3,124,030 UART: [kat] LMS
4,314,200 UART: [kat] --
4,319,295 UART: [cold-reset] ++
4,320,318 UART: [fht] Storing FHT @ 0x50003400
4,333,174 UART: [idev] ++
4,333,750 UART: [idev] CDI.KEYID = 6
4,334,717 UART: [idev] SUBJECT.KEYID = 7
4,335,932 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,841 UART:
193,738 UART: Running Caliptra ROM ...
194,913 UART:
603,527 UART: [state] CFI Enabled
617,349 UART: [state] LifecycleState = Unprovisioned
619,282 UART: [state] DebugLocked = No
620,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,148 UART: [kat] SHA2-256
794,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,453 UART: [kat] ++
805,944 UART: [kat] sha1
816,444 UART: [kat] SHA2-256
819,133 UART: [kat] SHA2-384
824,408 UART: [kat] SHA2-512-ACC
826,746 UART: [kat] ECC-384
3,110,830 UART: [kat] HMAC-384Kdf
3,122,157 UART: [kat] LMS
4,312,284 UART: [kat] --
4,317,923 UART: [cold-reset] ++
4,319,216 UART: [fht] Storing FHT @ 0x50003400
4,331,249 UART: [idev] ++
4,331,812 UART: [idev] CDI.KEYID = 6
4,332,745 UART: [idev] SUBJECT.KEYID = 7
4,334,017 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
192,543 UART:
192,897 UART: Running Caliptra ROM ...
194,085 UART:
603,858 UART: [state] CFI Enabled
615,906 UART: [state] LifecycleState = Manufacturing
617,860 UART: [state] DebugLocked = No
619,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,262 UART: [kat] SHA2-256
793,993 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,504 UART: [kat] ++
805,090 UART: [kat] sha1
816,624 UART: [kat] SHA2-256
819,324 UART: [kat] SHA2-384
824,815 UART: [kat] SHA2-512-ACC
827,150 UART: [kat] ECC-384
3,110,868 UART: [kat] HMAC-384Kdf
3,123,719 UART: [kat] LMS
4,313,841 UART: [kat] --
4,318,831 UART: [cold-reset] ++
4,319,854 UART: [fht] Storing FHT @ 0x50003400
4,330,858 UART: [idev] ++
4,331,424 UART: [idev] CDI.KEYID = 6
4,332,435 UART: [idev] SUBJECT.KEYID = 7
4,333,597 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
192,620 UART:
192,978 UART: Running Caliptra ROM ...
194,169 UART:
603,927 UART: [state] CFI Enabled
616,760 UART: [state] LifecycleState = Unknown
618,636 UART: [state] DebugLocked = No
619,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,127 UART: [kat] SHA2-256
793,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,465 UART: [kat] ++
805,001 UART: [kat] sha1
816,541 UART: [kat] SHA2-256
819,225 UART: [kat] SHA2-384
825,902 UART: [kat] SHA2-512-ACC
828,242 UART: [kat] ECC-384
3,111,038 UART: [kat] HMAC-384Kdf
3,121,938 UART: [kat] LMS
4,312,009 UART: [kat] --
4,315,492 UART: [cold-reset] ++
4,317,543 UART: [fht] Storing FHT @ 0x50003400
4,329,190 UART: [idev] ++
4,329,775 UART: [idev] CDI.KEYID = 6
4,330,659 UART: [idev] SUBJECT.KEYID = 7
4,331,925 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
192,630 UART:
192,986 UART: Running Caliptra ROM ...
194,095 UART:
603,727 UART: [state] CFI Enabled
619,151 UART: [state] LifecycleState = Production
620,990 UART: [state] DebugLocked = No
623,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,247 UART: [kat] SHA2-256
798,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,562 UART: [kat] ++
810,012 UART: [kat] sha1
820,189 UART: [kat] SHA2-256
822,922 UART: [kat] SHA2-384
827,819 UART: [kat] SHA2-512-ACC
830,211 UART: [kat] ECC-384
3,116,636 UART: [kat] HMAC-384Kdf
3,128,070 UART: [kat] LMS
4,318,163 UART: [kat] --
4,323,129 UART: [cold-reset] ++
4,324,849 UART: [fht] Storing FHT @ 0x50003400
4,337,087 UART: [idev] ++
4,337,660 UART: [idev] CDI.KEYID = 6
4,338,595 UART: [idev] SUBJECT.KEYID = 7
4,339,865 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
191,657 UART:
192,048 UART: Running Caliptra ROM ...
193,227 UART:
193,586 UART: [state] CFI Enabled
265,470 UART: [state] LifecycleState = Unprovisioned
267,332 UART: [state] DebugLocked = Yes
268,582 UART: [state] Starting the WD Timer 40000000 cycles
273,704 UART: [kat] SHA2-256
452,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,112 UART: [kat] ++
464,610 UART: [kat] sha1
475,255 UART: [kat] SHA2-256
478,271 UART: [kat] SHA2-384
484,843 UART: [kat] SHA2-512-ACC
487,831 UART: [kat] ECC-384
2,946,484 UART: [kat] HMAC-384Kdf
2,967,934 UART: [kat] LMS
3,497,417 UART: [kat] --
3,502,805 UART: [cold-reset] ++
3,505,065 UART: [fht] FHT @ 0x50003400
3,517,725 UART: [idev] ++
3,518,290 UART: [idev] CDI.KEYID = 6
3,519,254 UART: [idev] SUBJECT.KEYID = 7
3,520,410 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
193,184 UART:
193,855 UART: Running Caliptra ROM ...
195,014 UART:
195,170 UART: [state] CFI Enabled
266,366 UART: [state] LifecycleState = Manufacturing
268,274 UART: [state] DebugLocked = Yes
270,141 UART: [state] Starting the WD Timer 40000000 cycles
274,896 UART: [kat] SHA2-256
454,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,592 UART: [kat] ++
466,162 UART: [kat] sha1
477,856 UART: [kat] SHA2-256
480,854 UART: [kat] SHA2-384
488,397 UART: [kat] SHA2-512-ACC
491,339 UART: [kat] ECC-384
2,952,123 UART: [kat] HMAC-384Kdf
2,975,611 UART: [kat] LMS
3,505,091 UART: [kat] --
3,507,214 UART: [cold-reset] ++
3,509,309 UART: [fht] FHT @ 0x50003400
3,521,044 UART: [idev] ++
3,521,611 UART: [idev] CDI.KEYID = 6
3,522,630 UART: [idev] SUBJECT.KEYID = 7
3,523,734 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
192,464 UART:
193,126 UART: Running Caliptra ROM ...
194,284 UART:
194,433 UART: [state] CFI Enabled
267,747 UART: [state] LifecycleState = Unknown
269,428 UART: [state] DebugLocked = Yes
272,055 UART: [state] Starting the WD Timer 40000000 cycles
276,986 UART: [kat] SHA2-256
456,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,702 UART: [kat] ++
468,243 UART: [kat] sha1
479,048 UART: [kat] SHA2-256
482,057 UART: [kat] SHA2-384
487,603 UART: [kat] SHA2-512-ACC
490,591 UART: [kat] ECC-384
2,950,469 UART: [kat] HMAC-384Kdf
2,971,853 UART: [kat] LMS
3,501,339 UART: [kat] --
3,506,365 UART: [cold-reset] ++
3,507,493 UART: [fht] FHT @ 0x50003400
3,517,618 UART: [idev] ++
3,518,184 UART: [idev] CDI.KEYID = 6
3,519,128 UART: [idev] SUBJECT.KEYID = 7
3,520,290 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,948 writing to cptra_bootfsm_go
192,474 UART:
193,278 UART: Running Caliptra ROM ...
194,389 UART:
194,528 UART: [state] CFI Enabled
261,714 UART: [state] LifecycleState = Production
263,476 UART: [state] DebugLocked = Yes
266,082 UART: [state] Starting the WD Timer 40000000 cycles
271,357 UART: [kat] SHA2-256
450,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,056 UART: [kat] ++
462,591 UART: [kat] sha1
472,790 UART: [kat] SHA2-256
475,822 UART: [kat] SHA2-384
480,503 UART: [kat] SHA2-512-ACC
483,437 UART: [kat] ECC-384
2,942,464 UART: [kat] HMAC-384Kdf
2,966,178 UART: [kat] LMS
3,495,645 UART: [kat] --
3,500,770 UART: [cold-reset] ++
3,502,109 UART: [fht] FHT @ 0x50003400
3,514,275 UART: [idev] ++
3,514,851 UART: [idev] CDI.KEYID = 6
3,515,761 UART: [idev] SUBJECT.KEYID = 7
3,516,974 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,105 writing to cptra_bootfsm_go
195,374 UART:
196,129 UART: Running Caliptra ROM ...
197,267 UART:
197,409 UART: [state] CFI Enabled
263,462 UART: [state] LifecycleState = Unprovisioned
265,368 UART: [state] DebugLocked = No
267,186 UART: [state] WD Timer not started. Device not locked for debugging
271,271 UART: [kat] SHA2-256
450,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,952 UART: [kat] ++
462,447 UART: [kat] sha1
472,162 UART: [kat] SHA2-256
475,181 UART: [kat] SHA2-384
481,593 UART: [kat] SHA2-512-ACC
484,578 UART: [kat] ECC-384
2,949,868 UART: [kat] HMAC-384Kdf
2,971,032 UART: [kat] LMS
3,500,456 UART: [kat] --
3,505,203 UART: [cold-reset] ++
3,507,563 UART: [fht] FHT @ 0x50003400
3,517,300 UART: [idev] ++
3,517,862 UART: [idev] CDI.KEYID = 6
3,518,825 UART: [idev] SUBJECT.KEYID = 7
3,519,985 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,347 UART:
192,703 UART: Running Caliptra ROM ...
193,834 UART:
193,980 UART: [state] CFI Enabled
263,948 UART: [state] LifecycleState = Manufacturing
265,880 UART: [state] DebugLocked = No
267,394 UART: [state] WD Timer not started. Device not locked for debugging
271,693 UART: [kat] SHA2-256
450,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,391 UART: [kat] ++
462,842 UART: [kat] sha1
473,716 UART: [kat] SHA2-256
476,788 UART: [kat] SHA2-384
483,035 UART: [kat] SHA2-512-ACC
486,025 UART: [kat] ECC-384
2,944,705 UART: [kat] HMAC-384Kdf
2,967,851 UART: [kat] LMS
3,497,291 UART: [kat] --
3,501,390 UART: [cold-reset] ++
3,503,760 UART: [fht] FHT @ 0x50003400
3,514,033 UART: [idev] ++
3,514,608 UART: [idev] CDI.KEYID = 6
3,515,569 UART: [idev] SUBJECT.KEYID = 7
3,516,727 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,300 UART:
192,658 UART: Running Caliptra ROM ...
193,859 UART:
194,014 UART: [state] CFI Enabled
261,311 UART: [state] LifecycleState = Unknown
262,965 UART: [state] DebugLocked = No
265,826 UART: [state] WD Timer not started. Device not locked for debugging
268,727 UART: [kat] SHA2-256
447,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,462 UART: [kat] ++
460,001 UART: [kat] sha1
471,593 UART: [kat] SHA2-256
474,596 UART: [kat] SHA2-384
481,150 UART: [kat] SHA2-512-ACC
484,094 UART: [kat] ECC-384
2,939,563 UART: [kat] HMAC-384Kdf
2,965,077 UART: [kat] LMS
3,494,515 UART: [kat] --
3,499,979 UART: [cold-reset] ++
3,500,887 UART: [fht] FHT @ 0x50003400
3,511,647 UART: [idev] ++
3,512,211 UART: [idev] CDI.KEYID = 6
3,513,225 UART: [idev] SUBJECT.KEYID = 7
3,514,327 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,199 UART:
192,565 UART: Running Caliptra ROM ...
193,888 UART:
194,043 UART: [state] CFI Enabled
257,141 UART: [state] LifecycleState = Production
258,858 UART: [state] DebugLocked = No
260,512 UART: [state] WD Timer not started. Device not locked for debugging
263,438 UART: [kat] SHA2-256
442,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,140 UART: [kat] ++
454,679 UART: [kat] sha1
466,592 UART: [kat] SHA2-256
469,649 UART: [kat] SHA2-384
475,676 UART: [kat] SHA2-512-ACC
478,612 UART: [kat] ECC-384
2,924,965 UART: [kat] HMAC-384Kdf
2,948,275 UART: [kat] LMS
3,477,692 UART: [kat] --
3,481,736 UART: [cold-reset] ++
3,484,048 UART: [fht] FHT @ 0x50003400
3,493,839 UART: [idev] ++
3,494,403 UART: [idev] CDI.KEYID = 6
3,495,314 UART: [idev] SUBJECT.KEYID = 7
3,496,527 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
28,073 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,831 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
10,014 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,779 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
191,937 UART:
192,313 UART: Running Caliptra ROM ...
193,448 UART:
603,106 UART: [state] CFI Enabled
615,851 UART: [state] LifecycleState = Unprovisioned
617,777 UART: [state] DebugLocked = Yes
619,626 UART: [state] Starting the WD Timer 40000000 cycles
625,346 UART: [kat] SHA2-256
804,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,043 UART: [kat] ++
816,619 UART: [kat] sha1
827,553 UART: [kat] SHA2-256
830,550 UART: [kat] SHA2-384
835,388 UART: [kat] SHA2-512-ACC
838,316 UART: [kat] ECC-384
3,278,462 UART: [kat] HMAC-384Kdf
3,290,611 UART: [kat] LMS
3,820,128 UART: [kat] --
3,825,477 UART: [cold-reset] ++
3,827,025 UART: [fht] FHT @ 0x50003400
3,838,929 UART: [idev] ++
3,839,497 UART: [idev] CDI.KEYID = 6
3,840,465 UART: [idev] SUBJECT.KEYID = 7
3,841,567 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
49,528 writing to cptra_bootfsm_go
239,056 UART:
239,807 UART: Running Caliptra ROM ...
240,978 UART:
650,067 UART: [state] CFI Enabled
663,350 UART: [state] LifecycleState = Manufacturing
665,215 UART: [state] DebugLocked = Yes
667,342 UART: [state] Starting the WD Timer 40000000 cycles
671,426 UART: [kat] SHA2-256
850,565 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
862,138 UART: [kat] ++
862,699 UART: [kat] sha1
873,208 UART: [kat] SHA2-256
876,209 UART: [kat] SHA2-384
883,539 UART: [kat] SHA2-512-ACC
886,469 UART: [kat] ECC-384
3,328,006 UART: [kat] HMAC-384Kdf
3,339,724 UART: [kat] LMS
3,869,257 UART: [kat] --
3,874,550 UART: [cold-reset] ++
3,876,002 UART: [fht] FHT @ 0x50003400
3,885,909 UART: [idev] ++
3,886,526 UART: [idev] CDI.KEYID = 6
3,887,416 UART: [idev] SUBJECT.KEYID = 7
3,888,629 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
7,426 writing to cptra_bootfsm_go
196,041 UART:
196,885 UART: Running Caliptra ROM ...
198,039 UART:
607,118 UART: [state] CFI Enabled
620,681 UART: [state] LifecycleState = Unknown
622,344 UART: [state] DebugLocked = Yes
623,972 UART: [state] Starting the WD Timer 40000000 cycles
628,662 UART: [kat] SHA2-256
807,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,372 UART: [kat] ++
819,900 UART: [kat] sha1
829,240 UART: [kat] SHA2-256
832,306 UART: [kat] SHA2-384
839,519 UART: [kat] SHA2-512-ACC
842,452 UART: [kat] ECC-384
3,285,880 UART: [kat] HMAC-384Kdf
3,300,055 UART: [kat] LMS
3,829,578 UART: [kat] --
3,834,223 UART: [cold-reset] ++
3,835,842 UART: [fht] FHT @ 0x50003400
3,847,380 UART: [idev] ++
3,847,950 UART: [idev] CDI.KEYID = 6
3,848,833 UART: [idev] SUBJECT.KEYID = 7
3,850,046 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,859 writing to cptra_bootfsm_go
192,484 UART:
193,116 UART: Running Caliptra ROM ...
194,224 UART:
603,536 UART: [state] CFI Enabled
615,018 UART: [state] LifecycleState = Production
616,786 UART: [state] DebugLocked = Yes
618,209 UART: [state] Starting the WD Timer 40000000 cycles
622,578 UART: [kat] SHA2-256
801,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,306 UART: [kat] ++
813,834 UART: [kat] sha1
824,145 UART: [kat] SHA2-256
827,210 UART: [kat] SHA2-384
833,040 UART: [kat] SHA2-512-ACC
836,032 UART: [kat] ECC-384
3,276,148 UART: [kat] HMAC-384Kdf
3,289,024 UART: [kat] LMS
3,818,528 UART: [kat] --
3,825,051 UART: [cold-reset] ++
3,826,233 UART: [fht] FHT @ 0x50003400
3,837,969 UART: [idev] ++
3,838,537 UART: [idev] CDI.KEYID = 6
3,839,500 UART: [idev] SUBJECT.KEYID = 7
3,840,658 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,311 writing to cptra_bootfsm_go
193,434 UART:
194,080 UART: Running Caliptra ROM ...
195,227 UART:
604,385 UART: [state] CFI Enabled
621,547 UART: [state] LifecycleState = Unprovisioned
623,425 UART: [state] DebugLocked = No
625,456 UART: [state] WD Timer not started. Device not locked for debugging
629,215 UART: [kat] SHA2-256
808,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,902 UART: [kat] ++
820,432 UART: [kat] sha1
831,880 UART: [kat] SHA2-256
834,878 UART: [kat] SHA2-384
841,209 UART: [kat] SHA2-512-ACC
844,170 UART: [kat] ECC-384
3,288,507 UART: [kat] HMAC-384Kdf
3,300,425 UART: [kat] LMS
3,829,936 UART: [kat] --
3,833,944 UART: [cold-reset] ++
3,836,150 UART: [fht] FHT @ 0x50003400
3,846,966 UART: [idev] ++
3,847,525 UART: [idev] CDI.KEYID = 6
3,848,467 UART: [idev] SUBJECT.KEYID = 7
3,849,676 UART: [idev] UDS.KEYID = 0
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,571 UART:
192,935 UART: Running Caliptra ROM ...
194,171 UART:
603,496 UART: [state] CFI Enabled
618,333 UART: [state] LifecycleState = Manufacturing
620,198 UART: [state] DebugLocked = No
621,957 UART: [state] WD Timer not started. Device not locked for debugging
625,773 UART: [kat] SHA2-256
804,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,458 UART: [kat] ++
816,985 UART: [kat] sha1
828,189 UART: [kat] SHA2-256
831,195 UART: [kat] SHA2-384
837,979 UART: [kat] SHA2-512-ACC
840,912 UART: [kat] ECC-384
3,282,572 UART: [kat] HMAC-384Kdf
3,296,047 UART: [kat] LMS
3,825,556 UART: [kat] --
3,830,424 UART: [cold-reset] ++
3,831,818 UART: [fht] FHT @ 0x50003400
3,842,630 UART: [idev] ++
3,843,199 UART: [idev] CDI.KEYID = 6
3,844,122 UART: [idev] SUBJECT.KEYID = 7
3,845,337 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,518 UART:
192,888 UART: Running Caliptra ROM ...
194,077 UART:
603,719 UART: [state] CFI Enabled
617,109 UART: [state] LifecycleState = Unknown
618,731 UART: [state] DebugLocked = No
621,452 UART: [state] WD Timer not started. Device not locked for debugging
624,993 UART: [kat] SHA2-256
804,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,663 UART: [kat] ++
816,195 UART: [kat] sha1
826,654 UART: [kat] SHA2-256
829,696 UART: [kat] SHA2-384
834,716 UART: [kat] SHA2-512-ACC
837,669 UART: [kat] ECC-384
3,278,167 UART: [kat] HMAC-384Kdf
3,290,621 UART: [kat] LMS
3,820,070 UART: [kat] --
3,825,105 UART: [cold-reset] ++
3,826,766 UART: [fht] FHT @ 0x50003400
3,837,419 UART: [idev] ++
3,837,981 UART: [idev] CDI.KEYID = 6
3,838,889 UART: [idev] SUBJECT.KEYID = 7
3,840,101 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,501 UART:
192,883 UART: Running Caliptra ROM ...
194,065 UART:
603,724 UART: [state] CFI Enabled
619,262 UART: [state] LifecycleState = Production
621,031 UART: [state] DebugLocked = No
622,794 UART: [state] WD Timer not started. Device not locked for debugging
626,086 UART: [kat] SHA2-256
805,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,780 UART: [kat] ++
817,326 UART: [kat] sha1
827,582 UART: [kat] SHA2-256
830,645 UART: [kat] SHA2-384
836,727 UART: [kat] SHA2-512-ACC
839,714 UART: [kat] ECC-384
3,283,905 UART: [kat] HMAC-384Kdf
3,295,061 UART: [kat] LMS
3,824,551 UART: [kat] --
3,829,135 UART: [cold-reset] ++
3,831,518 UART: [fht] FHT @ 0x50003400
3,841,856 UART: [idev] ++
3,842,429 UART: [idev] CDI.KEYID = 6
3,843,345 UART: [idev] SUBJECT.KEYID = 7
3,844,559 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,590 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
22,105 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
33,703 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
19,022 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,142 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,506 UART:
191,903 UART: Running Caliptra ROM ...
192,979 UART:
193,120 UART: [state] CFI Enabled
259,903 UART: [state] LifecycleState = Unprovisioned
262,252 UART: [state] DebugLocked = Yes
264,101 UART: [state] Starting the WD Timer 40000000 cycles
269,230 UART: [kat] SHA2-256
459,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,856 UART: [kat] ++
470,467 UART: [kat] sha1
481,427 UART: [kat] SHA2-256
484,437 UART: [kat] SHA2-384
490,740 UART: [kat] SHA2-512-ACC
493,362 UART: [kat] ECC-384
2,948,288 UART: [kat] HMAC-384Kdf
2,970,642 UART: [kat] LMS
3,502,382 UART: [kat] --
3,506,697 UART: [cold-reset] ++
3,508,525 UART: [fht] FHT @ 0x50003400
3,520,114 UART: [idev] ++
3,520,676 UART: [idev] CDI.KEYID = 6
3,521,650 UART: [idev] SUBJECT.KEYID = 7
3,522,806 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,337 UART:
193,220 UART: Running Caliptra ROM ...
194,381 UART:
194,526 UART: [state] CFI Enabled
264,469 UART: [state] LifecycleState = Manufacturing
266,871 UART: [state] DebugLocked = Yes
269,808 UART: [state] Starting the WD Timer 40000000 cycles
275,056 UART: [kat] SHA2-256
464,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,691 UART: [kat] ++
476,312 UART: [kat] sha1
487,904 UART: [kat] SHA2-256
490,919 UART: [kat] SHA2-384
496,911 UART: [kat] SHA2-512-ACC
499,506 UART: [kat] ECC-384
2,944,984 UART: [kat] HMAC-384Kdf
2,970,248 UART: [kat] LMS
3,501,990 UART: [kat] --
3,507,175 UART: [cold-reset] ++
3,509,053 UART: [fht] FHT @ 0x50003400
3,521,659 UART: [idev] ++
3,522,360 UART: [idev] CDI.KEYID = 6
3,523,300 UART: [idev] SUBJECT.KEYID = 7
3,524,515 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
191,641 UART:
192,550 UART: Running Caliptra ROM ...
193,663 UART:
193,804 UART: [state] CFI Enabled
248,300 UART: [state] LifecycleState = Unknown
250,001 UART: [state] DebugLocked = Yes
252,296 UART: [state] Starting the WD Timer 40000000 cycles
257,669 UART: [kat] SHA2-256
447,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,288 UART: [kat] ++
458,838 UART: [kat] sha1
469,845 UART: [kat] SHA2-256
472,860 UART: [kat] SHA2-384
480,038 UART: [kat] SHA2-512-ACC
482,667 UART: [kat] ECC-384
2,933,327 UART: [kat] HMAC-384Kdf
2,958,613 UART: [kat] LMS
3,490,375 UART: [kat] --
3,494,231 UART: [cold-reset] ++
3,496,605 UART: [fht] FHT @ 0x50003400
3,508,298 UART: [idev] ++
3,508,973 UART: [idev] CDI.KEYID = 6
3,509,936 UART: [idev] SUBJECT.KEYID = 7
3,511,171 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
191,832 UART:
192,708 UART: Running Caliptra ROM ...
193,879 UART:
194,023 UART: [state] CFI Enabled
260,184 UART: [state] LifecycleState = Production
262,425 UART: [state] DebugLocked = Yes
265,094 UART: [state] Starting the WD Timer 40000000 cycles
270,269 UART: [kat] SHA2-256
460,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,886 UART: [kat] ++
471,442 UART: [kat] sha1
484,289 UART: [kat] SHA2-256
487,311 UART: [kat] SHA2-384
493,185 UART: [kat] SHA2-512-ACC
495,744 UART: [kat] ECC-384
2,945,026 UART: [kat] HMAC-384Kdf
2,968,076 UART: [kat] LMS
3,499,889 UART: [kat] --
3,504,712 UART: [cold-reset] ++
3,506,841 UART: [fht] FHT @ 0x50003400
3,518,592 UART: [idev] ++
3,519,333 UART: [idev] CDI.KEYID = 6
3,520,215 UART: [idev] SUBJECT.KEYID = 7
3,521,446 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,680 writing to cptra_bootfsm_go
204,956 UART:
205,741 UART: Running Caliptra ROM ...
206,902 UART:
207,049 UART: [state] CFI Enabled
277,398 UART: [state] LifecycleState = Unprovisioned
279,839 UART: [state] DebugLocked = No
282,601 UART: [state] WD Timer not started. Device not locked for debugging
287,845 UART: [kat] SHA2-256
477,748 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
488,532 UART: [kat] ++
489,010 UART: [kat] sha1
500,163 UART: [kat] SHA2-256
503,182 UART: [kat] SHA2-384
509,812 UART: [kat] SHA2-512-ACC
512,392 UART: [kat] ECC-384
2,958,363 UART: [kat] HMAC-384Kdf
2,983,679 UART: [kat] LMS
3,515,443 UART: [kat] --
3,520,087 UART: [cold-reset] ++
3,521,104 UART: [fht] FHT @ 0x50003400
3,532,252 UART: [idev] ++
3,532,936 UART: [idev] CDI.KEYID = 6
3,533,956 UART: [idev] SUBJECT.KEYID = 7
3,535,117 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,206 UART:
192,568 UART: Running Caliptra ROM ...
193,710 UART:
193,854 UART: [state] CFI Enabled
257,894 UART: [state] LifecycleState = Manufacturing
260,304 UART: [state] DebugLocked = No
262,344 UART: [state] WD Timer not started. Device not locked for debugging
266,387 UART: [kat] SHA2-256
456,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,074 UART: [kat] ++
467,614 UART: [kat] sha1
480,386 UART: [kat] SHA2-256
483,391 UART: [kat] SHA2-384
489,584 UART: [kat] SHA2-512-ACC
492,196 UART: [kat] ECC-384
2,943,219 UART: [kat] HMAC-384Kdf
2,965,945 UART: [kat] LMS
3,497,708 UART: [kat] --
3,504,179 UART: [cold-reset] ++
3,505,724 UART: [fht] FHT @ 0x50003400
3,517,523 UART: [idev] ++
3,518,198 UART: [idev] CDI.KEYID = 6
3,519,180 UART: [idev] SUBJECT.KEYID = 7
3,520,339 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,321 UART:
192,678 UART: Running Caliptra ROM ...
193,782 UART:
193,924 UART: [state] CFI Enabled
260,672 UART: [state] LifecycleState = Unknown
262,754 UART: [state] DebugLocked = No
264,755 UART: [state] WD Timer not started. Device not locked for debugging
269,563 UART: [kat] SHA2-256
459,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,225 UART: [kat] ++
470,672 UART: [kat] sha1
482,275 UART: [kat] SHA2-256
485,291 UART: [kat] SHA2-384
490,248 UART: [kat] SHA2-512-ACC
492,810 UART: [kat] ECC-384
2,942,803 UART: [kat] HMAC-384Kdf
2,967,144 UART: [kat] LMS
3,498,946 UART: [kat] --
3,502,560 UART: [cold-reset] ++
3,503,955 UART: [fht] FHT @ 0x50003400
3,515,048 UART: [idev] ++
3,515,727 UART: [idev] CDI.KEYID = 6
3,516,694 UART: [idev] SUBJECT.KEYID = 7
3,517,853 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,192 UART:
192,571 UART: Running Caliptra ROM ...
193,714 UART:
193,858 UART: [state] CFI Enabled
258,649 UART: [state] LifecycleState = Production
260,903 UART: [state] DebugLocked = No
262,661 UART: [state] WD Timer not started. Device not locked for debugging
266,705 UART: [kat] SHA2-256
456,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,344 UART: [kat] ++
467,822 UART: [kat] sha1
478,217 UART: [kat] SHA2-256
481,228 UART: [kat] SHA2-384
487,327 UART: [kat] SHA2-512-ACC
489,944 UART: [kat] ECC-384
2,942,610 UART: [kat] HMAC-384Kdf
2,967,521 UART: [kat] LMS
3,499,242 UART: [kat] --
3,502,444 UART: [cold-reset] ++
3,504,767 UART: [fht] FHT @ 0x50003400
3,515,371 UART: [idev] ++
3,516,046 UART: [idev] CDI.KEYID = 6
3,516,989 UART: [idev] SUBJECT.KEYID = 7
3,518,201 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
191,773 UART:
192,134 UART: Running Caliptra ROM ...
193,296 UART:
602,816 UART: [state] CFI Enabled
615,890 UART: [state] LifecycleState = Unprovisioned
618,240 UART: [state] DebugLocked = Yes
619,539 UART: [state] Starting the WD Timer 40000000 cycles
625,040 UART: [kat] SHA2-256
814,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,749 UART: [kat] ++
826,379 UART: [kat] sha1
839,179 UART: [kat] SHA2-256
842,231 UART: [kat] SHA2-384
848,814 UART: [kat] SHA2-512-ACC
851,372 UART: [kat] ECC-384
3,292,891 UART: [kat] HMAC-384Kdf
3,306,008 UART: [kat] LMS
3,837,859 UART: [kat] --
3,842,443 UART: [cold-reset] ++
3,843,774 UART: [fht] FHT @ 0x50003400
3,854,536 UART: [idev] ++
3,855,213 UART: [idev] CDI.KEYID = 6
3,856,152 UART: [idev] SUBJECT.KEYID = 7
3,857,415 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
20,250 writing to cptra_bootfsm_go
211,096 UART:
212,050 UART: Running Caliptra ROM ...
213,212 UART:
622,102 UART: [state] CFI Enabled
637,314 UART: [state] LifecycleState = Manufacturing
639,675 UART: [state] DebugLocked = Yes
642,385 UART: [state] Starting the WD Timer 40000000 cycles
647,450 UART: [kat] SHA2-256
837,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
848,192 UART: [kat] ++
848,690 UART: [kat] sha1
860,382 UART: [kat] SHA2-256
863,391 UART: [kat] SHA2-384
870,019 UART: [kat] SHA2-512-ACC
872,587 UART: [kat] ECC-384
3,318,393 UART: [kat] HMAC-384Kdf
3,332,195 UART: [kat] LMS
3,864,054 UART: [kat] --
3,868,750 UART: [cold-reset] ++
3,869,661 UART: [fht] FHT @ 0x50003400
3,880,724 UART: [idev] ++
3,881,449 UART: [idev] CDI.KEYID = 6
3,882,386 UART: [idev] SUBJECT.KEYID = 7
3,883,595 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
32,379 writing to cptra_bootfsm_go
220,968 UART:
221,768 UART: Running Caliptra ROM ...
222,872 UART:
632,337 UART: [state] CFI Enabled
647,630 UART: [state] LifecycleState = Unknown
649,661 UART: [state] DebugLocked = Yes
652,100 UART: [state] Starting the WD Timer 40000000 cycles
657,608 UART: [kat] SHA2-256
847,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
858,335 UART: [kat] ++
858,919 UART: [kat] sha1
870,410 UART: [kat] SHA2-256
873,472 UART: [kat] SHA2-384
878,800 UART: [kat] SHA2-512-ACC
881,352 UART: [kat] ECC-384
3,325,258 UART: [kat] HMAC-384Kdf
3,339,086 UART: [kat] LMS
3,870,895 UART: [kat] --
3,875,457 UART: [cold-reset] ++
3,876,532 UART: [fht] FHT @ 0x50003400
3,887,490 UART: [idev] ++
3,888,173 UART: [idev] CDI.KEYID = 6
3,889,114 UART: [idev] SUBJECT.KEYID = 7
3,890,245 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
42,810 writing to cptra_bootfsm_go
231,432 UART:
232,170 UART: Running Caliptra ROM ...
233,370 UART:
642,711 UART: [state] CFI Enabled
658,233 UART: [state] LifecycleState = Production
660,431 UART: [state] DebugLocked = Yes
662,388 UART: [state] Starting the WD Timer 40000000 cycles
666,878 UART: [kat] SHA2-256
856,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
867,573 UART: [kat] ++
868,163 UART: [kat] sha1
878,964 UART: [kat] SHA2-256
881,982 UART: [kat] SHA2-384
888,008 UART: [kat] SHA2-512-ACC
890,575 UART: [kat] ECC-384
3,332,395 UART: [kat] HMAC-384Kdf
3,346,698 UART: [kat] LMS
3,878,543 UART: [kat] --
3,881,751 UART: [cold-reset] ++
3,882,824 UART: [fht] FHT @ 0x50003400
3,894,717 UART: [idev] ++
3,895,402 UART: [idev] CDI.KEYID = 6
3,896,422 UART: [idev] SUBJECT.KEYID = 7
3,897,581 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
38,785 writing to cptra_bootfsm_go
228,425 UART:
229,149 UART: Running Caliptra ROM ...
230,320 UART:
639,636 UART: [state] CFI Enabled
653,836 UART: [state] LifecycleState = Unprovisioned
656,268 UART: [state] DebugLocked = No
657,434 UART: [state] WD Timer not started. Device not locked for debugging
660,869 UART: [kat] SHA2-256
850,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
861,546 UART: [kat] ++
862,135 UART: [kat] sha1
872,050 UART: [kat] SHA2-256
875,121 UART: [kat] SHA2-384
880,845 UART: [kat] SHA2-512-ACC
883,457 UART: [kat] ECC-384
3,320,645 UART: [kat] HMAC-384Kdf
3,333,537 UART: [kat] LMS
3,865,371 UART: [kat] --
3,870,436 UART: [cold-reset] ++
3,871,824 UART: [fht] FHT @ 0x50003400
3,884,587 UART: [idev] ++
3,885,259 UART: [idev] CDI.KEYID = 6
3,886,197 UART: [idev] SUBJECT.KEYID = 7
3,887,462 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,523 UART:
192,894 UART: Running Caliptra ROM ...
194,041 UART:
603,809 UART: [state] CFI Enabled
615,039 UART: [state] LifecycleState = Manufacturing
617,409 UART: [state] DebugLocked = No
618,620 UART: [state] WD Timer not started. Device not locked for debugging
623,077 UART: [kat] SHA2-256
812,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,736 UART: [kat] ++
824,347 UART: [kat] sha1
835,993 UART: [kat] SHA2-256
838,992 UART: [kat] SHA2-384
846,062 UART: [kat] SHA2-512-ACC
848,676 UART: [kat] ECC-384
3,289,906 UART: [kat] HMAC-384Kdf
3,302,988 UART: [kat] LMS
3,834,787 UART: [kat] --
3,839,182 UART: [cold-reset] ++
3,841,767 UART: [fht] FHT @ 0x50003400
3,852,853 UART: [idev] ++
3,853,523 UART: [idev] CDI.KEYID = 6
3,854,463 UART: [idev] SUBJECT.KEYID = 7
3,855,728 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,579 UART:
192,949 UART: Running Caliptra ROM ...
194,170 UART:
603,877 UART: [state] CFI Enabled
616,923 UART: [state] LifecycleState = Unknown
618,962 UART: [state] DebugLocked = No
620,177 UART: [state] WD Timer not started. Device not locked for debugging
624,097 UART: [kat] SHA2-256
814,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,756 UART: [kat] ++
825,364 UART: [kat] sha1
837,977 UART: [kat] SHA2-256
840,993 UART: [kat] SHA2-384
845,835 UART: [kat] SHA2-512-ACC
848,440 UART: [kat] ECC-384
3,290,256 UART: [kat] HMAC-384Kdf
3,304,015 UART: [kat] LMS
3,835,867 UART: [kat] --
3,840,777 UART: [cold-reset] ++
3,843,248 UART: [fht] FHT @ 0x50003400
3,854,224 UART: [idev] ++
3,854,946 UART: [idev] CDI.KEYID = 6
3,855,869 UART: [idev] SUBJECT.KEYID = 7
3,857,032 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
7,228 writing to cptra_bootfsm_go
196,518 UART:
196,894 UART: Running Caliptra ROM ...
198,111 UART:
607,584 UART: [state] CFI Enabled
620,970 UART: [state] LifecycleState = Production
623,190 UART: [state] DebugLocked = No
624,620 UART: [state] WD Timer not started. Device not locked for debugging
629,909 UART: [kat] SHA2-256
819,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,591 UART: [kat] ++
831,130 UART: [kat] sha1
843,576 UART: [kat] SHA2-256
846,592 UART: [kat] SHA2-384
853,953 UART: [kat] SHA2-512-ACC
856,551 UART: [kat] ECC-384
3,299,315 UART: [kat] HMAC-384Kdf
3,311,785 UART: [kat] LMS
3,843,602 UART: [kat] --
3,848,633 UART: [cold-reset] ++
3,849,981 UART: [fht] FHT @ 0x50003400
3,861,074 UART: [idev] ++
3,861,755 UART: [idev] CDI.KEYID = 6
3,862,692 UART: [idev] SUBJECT.KEYID = 7
3,863,923 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
47,394 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
10,574 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
4,873,513 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,485,194 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
4,879,633 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,500,205 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
5,186,699 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,665,815 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
5,185,728 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,675,870 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,432,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,318,597 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,437,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,327,537 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,568 writing to cptra_bootfsm_go
3,773,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,549,307 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,781,297 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,560,828 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,455,422 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,354,402 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,448,431 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,376,521 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,781,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,557,643 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,787,534 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,558,045 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,578 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,662 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,034 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,583 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,670,256 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,244 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,971 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,667,271 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,158 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,668,406 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,352 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,669,321 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,670,138 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,669,812 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,670,060 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,483 UART:
191,862 UART: Running Caliptra ROM ...
193,021 UART:
193,178 UART: [state] CFI Enabled
264,424 UART: [state] LifecycleState = Production
266,253 UART: [state] DebugLocked = Yes
268,425 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,871 UART: [kat] SHA2-256
443,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,094 UART: [kat] ++
454,648 UART: [kat] sha1
465,313 UART: [kat] SHA2-256
467,990 UART: [kat] SHA2-384
474,903 UART: [kat] SHA2-512-ACC
477,277 UART: [kat] ECC-384
2,767,259 UART: [kat] HMAC-384Kdf
2,801,713 UART: [kat] LMS
3,991,993 UART: [kat] --
3,995,786 UART: [cold-reset] ++
3,997,124 UART: [fht] Storing FHT @ 0x50003400
4,008,454 UART: [idev] ++
4,009,022 UART: [idev] CDI.KEYID = 6
4,009,964 UART: [idev] SUBJECT.KEYID = 7
4,011,240 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,866 writing to cptra_bootfsm_go
192,461 UART:
192,834 UART: Running Caliptra ROM ...
194,014 UART:
603,681 UART: [state] CFI Enabled
618,506 UART: [state] LifecycleState = Production
620,313 UART: [state] DebugLocked = Yes
621,992 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,272 UART: [kat] SHA2-256
797,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,587 UART: [kat] ++
808,050 UART: [kat] sha1
818,010 UART: [kat] SHA2-256
820,698 UART: [kat] SHA2-384
826,887 UART: [kat] SHA2-512-ACC
829,280 UART: [kat] ECC-384
3,112,678 UART: [kat] HMAC-384Kdf
3,124,325 UART: [kat] LMS
4,314,466 UART: [kat] --
4,319,451 UART: [cold-reset] ++
4,321,838 UART: [fht] Storing FHT @ 0x50003400
4,333,264 UART: [idev] ++
4,333,839 UART: [idev] CDI.KEYID = 6
4,334,859 UART: [idev] SUBJECT.KEYID = 7
4,336,018 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
191,950 UART:
192,320 UART: Running Caliptra ROM ...
193,434 UART:
193,577 UART: [state] CFI Enabled
263,522 UART: [state] LifecycleState = Production
265,263 UART: [state] DebugLocked = Yes
266,512 UART: [state] Starting the WD Timer 40000000 cycles
271,382 UART: [kat] SHA2-256
450,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,069 UART: [kat] ++
462,610 UART: [kat] sha1
473,461 UART: [kat] SHA2-256
476,523 UART: [kat] SHA2-384
482,605 UART: [kat] SHA2-512-ACC
485,541 UART: [kat] ECC-384
2,948,042 UART: [kat] HMAC-384Kdf
2,971,076 UART: [kat] LMS
3,500,551 UART: [kat] --
3,505,085 UART: [cold-reset] ++
3,507,396 UART: [fht] FHT @ 0x50003400
3,518,375 UART: [idev] ++
3,518,941 UART: [idev] CDI.KEYID = 6
3,519,852 UART: [idev] SUBJECT.KEYID = 7
3,521,071 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,232 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
192,094 UART:
192,468 UART: Running Caliptra ROM ...
193,654 UART:
603,106 UART: [state] CFI Enabled
616,213 UART: [state] LifecycleState = Production
618,005 UART: [state] DebugLocked = Yes
620,995 UART: [state] Starting the WD Timer 40000000 cycles
625,045 UART: [kat] SHA2-256
804,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,757 UART: [kat] ++
816,341 UART: [kat] sha1
827,837 UART: [kat] SHA2-256
830,838 UART: [kat] SHA2-384
836,976 UART: [kat] SHA2-512-ACC
839,914 UART: [kat] ECC-384
3,281,421 UART: [kat] HMAC-384Kdf
3,294,299 UART: [kat] LMS
3,823,822 UART: [kat] --
3,828,356 UART: [cold-reset] ++
3,830,394 UART: [fht] FHT @ 0x50003400
3,840,397 UART: [idev] ++
3,840,961 UART: [idev] CDI.KEYID = 6
3,841,925 UART: [idev] SUBJECT.KEYID = 7
3,843,083 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,865 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
191,599 UART:
191,960 UART: Running Caliptra ROM ...
193,054 UART:
193,202 UART: [state] CFI Enabled
261,518 UART: [state] LifecycleState = Production
263,768 UART: [state] DebugLocked = Yes
265,637 UART: [state] Starting the WD Timer 40000000 cycles
271,306 UART: [kat] SHA2-256
461,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,949 UART: [kat] ++
472,598 UART: [kat] sha1
485,064 UART: [kat] SHA2-256
488,134 UART: [kat] SHA2-384
493,630 UART: [kat] SHA2-512-ACC
496,201 UART: [kat] ECC-384
2,947,839 UART: [kat] HMAC-384Kdf
2,970,034 UART: [kat] LMS
3,501,797 UART: [kat] --
3,507,542 UART: [cold-reset] ++
3,509,152 UART: [fht] FHT @ 0x50003400
3,521,538 UART: [idev] ++
3,522,220 UART: [idev] CDI.KEYID = 6
3,523,237 UART: [idev] SUBJECT.KEYID = 7
3,524,394 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
191,837 UART:
192,240 UART: Running Caliptra ROM ...
193,413 UART:
602,876 UART: [state] CFI Enabled
614,093 UART: [state] LifecycleState = Production
616,273 UART: [state] DebugLocked = Yes
619,084 UART: [state] Starting the WD Timer 40000000 cycles
624,308 UART: [kat] SHA2-256
814,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,056 UART: [kat] ++
825,647 UART: [kat] sha1
835,751 UART: [kat] SHA2-256
838,775 UART: [kat] SHA2-384
845,132 UART: [kat] SHA2-512-ACC
847,687 UART: [kat] ECC-384
3,290,355 UART: [kat] HMAC-384Kdf
3,302,646 UART: [kat] LMS
3,834,468 UART: [kat] --
3,839,482 UART: [cold-reset] ++
3,841,738 UART: [fht] FHT @ 0x50003400
3,854,606 UART: [idev] ++
3,855,471 UART: [idev] CDI.KEYID = 6
3,856,372 UART: [idev] SUBJECT.KEYID = 7
3,857,484 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Production
85,911 UART: [state] DebugLocked = Yes
86,661 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,427 UART: [kat] SHA2-256
882,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,473 UART: [kat] ++
886,625 UART: [kat] sha1
890,955 UART: [kat] SHA2-256
892,893 UART: [kat] SHA2-384
895,650 UART: [kat] SHA2-512-ACC
897,551 UART: [kat] ECC-384
903,242 UART: [kat] HMAC-384Kdf
907,646 UART: [kat] LMS
1,475,842 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Production
85,918 UART: [state] DebugLocked = Yes
86,676 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,293 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,476,900 UART: [cold-reset] ++
1,477,417 UART: [fht] Storing FHT @ 0x50003400
1,480,162 UART: [idev] ++
1,480,330 UART: [idev] CDI.KEYID = 6
1,480,690 UART: [idev] SUBJECT.KEYID = 7
1,481,114 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Production
85,955 UART: [state] DebugLocked = Yes
86,569 UART: [state] Starting the WD Timer 40000000 cycles
88,260 UART: [kat] SHA2-256
893,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,035 UART: [kat] ++
898,187 UART: [kat] sha1
902,525 UART: [kat] SHA2-256
904,465 UART: [kat] SHA2-384
907,168 UART: [kat] SHA2-512-ACC
909,069 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,221 UART: [cold-reset] ++
1,172,756 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Production
85,894 UART: [state] DebugLocked = Yes
86,612 UART: [state] Starting the WD Timer 40000000 cycles
88,255 UART: [kat] SHA2-256
893,905 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,030 UART: [kat] ++
898,182 UART: [kat] sha1
902,476 UART: [kat] SHA2-256
904,416 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,427 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,801 UART: [fht] FHT @ 0x50003400
1,175,448 UART: [idev] ++
1,175,616 UART: [idev] CDI.KEYID = 6
1,175,976 UART: [idev] SUBJECT.KEYID = 7
1,176,400 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,885 UART: [state] LifecycleState = Production
85,493 UART: [state] DebugLocked = Yes
86,091 UART: [state] Starting the WD Timer 40000000 cycles
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,966 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,959 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Production
86,110 UART: [state] DebugLocked = Yes
86,788 UART: [state] Starting the WD Timer 40000000 cycles
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,270 UART: [kat] SHA2-256
902,210 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
191,569 UART:
191,942 UART: Running Caliptra ROM ...
193,139 UART:
193,295 UART: [state] CFI Enabled
268,747 UART: [state] LifecycleState = Production
270,585 UART: [state] DebugLocked = Yes
271,879 UART: [state] Starting the Watchdog Timer 40000000 cycles
276,345 UART: [kat] SHA2-256
446,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,539 UART: [kat] ++
457,102 UART: [kat] sha1
468,125 UART: [kat] SHA2-256
470,783 UART: [kat] SHA2-384
475,855 UART: [kat] SHA2-512-ACC
478,229 UART: [kat] ECC-384
2,766,786 UART: [kat] HMAC-384Kdf
2,799,226 UART: [kat] LMS
3,989,526 UART: [kat] --
3,992,749 UART: [cold-reset] ++
3,995,065 UART: [fht] Storing FHT @ 0x50003400
4,007,125 UART: [idev] ++
4,007,697 UART: [idev] CDI.KEYID = 6
4,008,689 UART: [idev] SUBJECT.KEYID = 7
4,009,872 UART: [idev] UDS.KEYID = 0
4,010,934 ready_for_fw is high
4,011,178 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,154,433 UART: [idev] Erasing UDS.KEYID = 0
7,349,549 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,321 UART: [idev] --
7,375,491 UART: [ldev] ++
7,376,062 UART: [ldev] CDI.KEYID = 6
7,377,085 UART: [ldev] SUBJECT.KEYID = 5
7,378,192 UART: [ldev] AUTHORITY.KEYID = 7
7,379,480 UART: [ldev] FE.KEYID = 1
7,423,539 UART: [ldev] Erasing FE.KEYID = 1
10,758,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,928 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,078,463 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,093,116 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,107,509 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,125,754 UART: [ldev] --
13,130,641 UART: [fwproc] Waiting for Commands...
13,133,277 UART: [fwproc] Received command 0x46574c44
13,135,464 UART: [fwproc] Received Image of size 113760 bytes
17,221,547 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,204 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,370,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,686,464 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,781,782 ready_for_fw is high
3,782,183 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,884,761 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
191,816 UART:
192,188 UART: Running Caliptra ROM ...
193,376 UART:
602,971 UART: [state] CFI Enabled
618,758 UART: [state] LifecycleState = Production
620,536 UART: [state] DebugLocked = Yes
623,116 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,151 UART: [kat] SHA2-256
797,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,441 UART: [kat] ++
808,941 UART: [kat] sha1
819,750 UART: [kat] SHA2-256
822,478 UART: [kat] SHA2-384
828,922 UART: [kat] SHA2-512-ACC
831,271 UART: [kat] ECC-384
3,115,140 UART: [kat] HMAC-384Kdf
3,127,324 UART: [kat] LMS
4,317,471 UART: [kat] --
4,322,487 UART: [cold-reset] ++
4,324,709 UART: [fht] Storing FHT @ 0x50003400
4,335,694 UART: [idev] ++
4,336,263 UART: [idev] CDI.KEYID = 6
4,337,232 UART: [idev] SUBJECT.KEYID = 7
4,338,481 UART: [idev] UDS.KEYID = 0
4,339,382 ready_for_fw is high
4,339,584 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,482,515 UART: [idev] Erasing UDS.KEYID = 0
7,621,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,916 UART: [idev] --
7,647,762 UART: [ldev] ++
7,648,344 UART: [ldev] CDI.KEYID = 6
7,649,363 UART: [ldev] SUBJECT.KEYID = 5
7,650,525 UART: [ldev] AUTHORITY.KEYID = 7
7,651,757 UART: [ldev] FE.KEYID = 1
7,663,590 UART: [ldev] Erasing FE.KEYID = 1
10,948,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,516 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,255,080 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,269,721 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,284,065 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,303,096 UART: [ldev] --
13,307,722 UART: [fwproc] Waiting for Commands...
13,309,606 UART: [fwproc] Received command 0x46574c44
13,311,814 UART: [fwproc] Received Image of size 113760 bytes
17,390,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,466,740 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,535,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,850,957 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,128,756 ready_for_fw is high
4,129,452 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,098,906 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
191,850 UART:
192,235 UART: Running Caliptra ROM ...
193,458 UART:
193,609 UART: [state] CFI Enabled
263,926 UART: [state] LifecycleState = Production
265,619 UART: [state] DebugLocked = Yes
267,043 UART: [state] Starting the WD Timer 40000000 cycles
272,469 UART: [kat] SHA2-256
451,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,226 UART: [kat] ++
463,760 UART: [kat] sha1
475,041 UART: [kat] SHA2-256
478,053 UART: [kat] SHA2-384
483,334 UART: [kat] SHA2-512-ACC
486,280 UART: [kat] ECC-384
2,948,621 UART: [kat] HMAC-384Kdf
2,972,159 UART: [kat] LMS
3,501,636 UART: [kat] --
3,505,421 UART: [cold-reset] ++
3,508,004 UART: [fht] FHT @ 0x50003400
3,519,655 UART: [idev] ++
3,520,223 UART: [idev] CDI.KEYID = 6
3,521,208 UART: [idev] SUBJECT.KEYID = 7
3,522,385 UART: [idev] UDS.KEYID = 0
3,523,312 ready_for_fw is high
3,523,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,667,504 UART: [idev] Erasing UDS.KEYID = 0
6,027,250 UART: [idev] Sha1 KeyId Algorithm
6,050,355 UART: [idev] --
6,055,259 UART: [ldev] ++
6,055,838 UART: [ldev] CDI.KEYID = 6
6,056,752 UART: [ldev] SUBJECT.KEYID = 5
6,057,967 UART: [ldev] AUTHORITY.KEYID = 7
6,059,199 UART: [ldev] FE.KEYID = 1
6,101,873 UART: [ldev] Erasing FE.KEYID = 1
8,603,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,913 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,889 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,767 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,680 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,587 UART: [ldev] --
10,413,527 UART: [fwproc] Wait for Commands...
10,416,109 UART: [fwproc] Recv command 0x46574c44
10,418,204 UART: [fwproc] Recv'd Img size: 114084 bytes
13,852,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,343 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,997,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,314,530 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,359,783 ready_for_fw is high
3,360,398 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,070,060 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
191,936 UART:
192,301 UART: Running Caliptra ROM ...
193,523 UART:
603,237 UART: [state] CFI Enabled
611,993 UART: [state] LifecycleState = Production
613,799 UART: [state] DebugLocked = Yes
616,230 UART: [state] Starting the WD Timer 40000000 cycles
621,542 UART: [kat] SHA2-256
800,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,248 UART: [kat] ++
812,700 UART: [kat] sha1
823,760 UART: [kat] SHA2-256
826,791 UART: [kat] SHA2-384
833,644 UART: [kat] SHA2-512-ACC
836,585 UART: [kat] ECC-384
3,276,138 UART: [kat] HMAC-384Kdf
3,287,263 UART: [kat] LMS
3,816,732 UART: [kat] --
3,821,722 UART: [cold-reset] ++
3,824,014 UART: [fht] FHT @ 0x50003400
3,835,079 UART: [idev] ++
3,835,649 UART: [idev] CDI.KEYID = 6
3,836,633 UART: [idev] SUBJECT.KEYID = 7
3,837,855 UART: [idev] UDS.KEYID = 0
3,838,767 ready_for_fw is high
3,839,013 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,982,407 UART: [idev] Erasing UDS.KEYID = 0
6,310,372 UART: [idev] Sha1 KeyId Algorithm
6,334,479 UART: [idev] --
6,339,817 UART: [ldev] ++
6,340,383 UART: [ldev] CDI.KEYID = 6
6,341,293 UART: [ldev] SUBJECT.KEYID = 5
6,342,509 UART: [ldev] AUTHORITY.KEYID = 7
6,343,740 UART: [ldev] FE.KEYID = 1
6,355,945 UART: [ldev] Erasing FE.KEYID = 1
8,833,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,608 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,607 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,386 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,364 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,586 UART: [ldev] --
10,623,458 UART: [fwproc] Wait for Commands...
10,626,258 UART: [fwproc] Recv command 0x46574c44
10,628,356 UART: [fwproc] Recv'd Img size: 114084 bytes
14,055,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,129,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,197,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,514,162 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
3,698,578 ready_for_fw is high
3,699,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,303,871 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
192,456 UART:
192,821 UART: Running Caliptra ROM ...
193,927 UART:
194,071 UART: [state] CFI Enabled
263,909 UART: [state] LifecycleState = Production
266,136 UART: [state] DebugLocked = Yes
267,556 UART: [state] Starting the WD Timer 40000000 cycles
273,279 UART: [kat] SHA2-256
463,205 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,985 UART: [kat] ++
474,428 UART: [kat] sha1
487,655 UART: [kat] SHA2-256
490,645 UART: [kat] SHA2-384
496,439 UART: [kat] SHA2-512-ACC
499,032 UART: [kat] ECC-384
2,950,223 UART: [kat] HMAC-384Kdf
2,973,445 UART: [kat] LMS
3,505,191 UART: [kat] --
3,509,548 UART: [cold-reset] ++
3,510,490 UART: [fht] FHT @ 0x50003400
3,522,416 UART: [idev] ++
3,523,171 UART: [idev] CDI.KEYID = 6
3,524,103 UART: [idev] SUBJECT.KEYID = 7
3,525,288 UART: [idev] UDS.KEYID = 0
3,526,221 ready_for_fw is high
3,526,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,669,795 UART: [idev] Erasing UDS.KEYID = 0
6,029,642 UART: [idev] Sha1 KeyId Algorithm
6,052,724 UART: [idev] --
6,056,834 UART: [ldev] ++
6,057,525 UART: [ldev] CDI.KEYID = 6
6,058,442 UART: [ldev] SUBJECT.KEYID = 5
6,059,626 UART: [ldev] AUTHORITY.KEYID = 7
6,060,866 UART: [ldev] FE.KEYID = 1
6,101,218 UART: [ldev] Erasing FE.KEYID = 1
8,608,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,442 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,682 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,745 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,737 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,182 UART: [ldev] --
10,414,517 UART: [fwproc] Wait for Commands...
10,416,886 UART: [fwproc] Recv command 0x46574c44
10,418,891 UART: [fwproc] Recv'd Img size: 114084 bytes
13,905,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,104,236 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,644,808 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,438,178 ready_for_fw is high
3,438,581 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,745,594 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
191,898 UART:
192,278 UART: Running Caliptra ROM ...
193,479 UART:
603,023 UART: [state] CFI Enabled
616,497 UART: [state] LifecycleState = Production
618,725 UART: [state] DebugLocked = Yes
621,172 UART: [state] Starting the WD Timer 40000000 cycles
626,894 UART: [kat] SHA2-256
816,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,633 UART: [kat] ++
828,079 UART: [kat] sha1
838,876 UART: [kat] SHA2-256
841,892 UART: [kat] SHA2-384
847,701 UART: [kat] SHA2-512-ACC
850,334 UART: [kat] ECC-384
3,291,243 UART: [kat] HMAC-384Kdf
3,303,363 UART: [kat] LMS
3,835,156 UART: [kat] --
3,839,716 UART: [cold-reset] ++
3,841,153 UART: [fht] FHT @ 0x50003400
3,851,847 UART: [idev] ++
3,852,554 UART: [idev] CDI.KEYID = 6
3,853,486 UART: [idev] SUBJECT.KEYID = 7
3,854,664 UART: [idev] UDS.KEYID = 0
3,855,594 ready_for_fw is high
3,855,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,999,189 UART: [idev] Erasing UDS.KEYID = 0
6,328,395 UART: [idev] Sha1 KeyId Algorithm
6,350,480 UART: [idev] --
6,355,442 UART: [ldev] ++
6,356,118 UART: [ldev] CDI.KEYID = 6
6,357,055 UART: [ldev] SUBJECT.KEYID = 5
6,358,217 UART: [ldev] AUTHORITY.KEYID = 7
6,359,447 UART: [ldev] FE.KEYID = 1
6,369,894 UART: [ldev] Erasing FE.KEYID = 1
8,844,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,758 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,578,962 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,594,024 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,609,045 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,629,957 UART: [ldev] --
10,634,572 UART: [fwproc] Wait for Commands...
10,637,532 UART: [fwproc] Recv command 0x46574c44
10,639,463 UART: [fwproc] Recv'd Img size: 114084 bytes
14,115,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,195,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,852,760 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,759,438 ready_for_fw is high
3,760,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
15,005,312 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Production
85,989 UART: [state] DebugLocked = Yes
86,607 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,393 UART: [kat] SHA2-256
882,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,439 UART: [kat] ++
886,591 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,386 UART: [kat] SHA2-512-ACC
897,287 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,460 UART: [kat] LMS
1,475,656 UART: [kat] --
1,476,489 UART: [cold-reset] ++
1,476,838 UART: [fht] Storing FHT @ 0x50003400
1,479,753 UART: [idev] ++
1,479,921 UART: [idev] CDI.KEYID = 6
1,480,281 UART: [idev] SUBJECT.KEYID = 7
1,480,705 UART: [idev] UDS.KEYID = 0
1,481,050 ready_for_fw is high
1,481,050 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,844 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,637 UART: [ldev] Erasing FE.KEYID = 1
1,547,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,303 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,009 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,073 UART: [ldev] --
1,586,390 UART: [fwproc] Waiting for Commands...
1,587,201 UART: [fwproc] Received command 0x46574c44
1,587,992 UART: [fwproc] Received Image of size 114084 bytes
2,908,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,935,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,964,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,100,106 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,058 ready_for_fw is high
1,363,058 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,952,350 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Production
85,994 UART: [state] DebugLocked = Yes
86,674 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,549 UART: [kat] SHA2-512-ACC
897,450 UART: [kat] ECC-384
903,229 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,792 UART: [cold-reset] ++
1,477,193 UART: [fht] Storing FHT @ 0x50003400
1,479,994 UART: [idev] ++
1,480,162 UART: [idev] CDI.KEYID = 6
1,480,522 UART: [idev] SUBJECT.KEYID = 7
1,480,946 UART: [idev] UDS.KEYID = 0
1,481,291 ready_for_fw is high
1,481,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,935 UART: [idev] Erasing UDS.KEYID = 0
1,505,620 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,377 UART: [idev] --
1,515,296 UART: [ldev] ++
1,515,464 UART: [ldev] CDI.KEYID = 6
1,515,827 UART: [ldev] SUBJECT.KEYID = 5
1,516,253 UART: [ldev] AUTHORITY.KEYID = 7
1,516,716 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,547,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,452 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,146 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,018 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,724 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,760 UART: [ldev] --
1,587,055 UART: [fwproc] Waiting for Commands...
1,587,776 UART: [fwproc] Received command 0x46574c44
1,588,567 UART: [fwproc] Received Image of size 114084 bytes
2,908,492 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,936,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,965,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,101,127 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,531 ready_for_fw is high
1,363,531 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,950,731 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Production
86,129 UART: [state] DebugLocked = Yes
86,689 UART: [state] Starting the WD Timer 40000000 cycles
88,386 UART: [kat] SHA2-256
894,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,161 UART: [kat] ++
898,313 UART: [kat] sha1
902,575 UART: [kat] SHA2-256
904,515 UART: [kat] SHA2-384
907,252 UART: [kat] SHA2-512-ACC
909,153 UART: [kat] ECC-384
919,038 UART: [kat] HMAC-384Kdf
923,568 UART: [kat] LMS
1,171,896 UART: [kat] --
1,172,625 UART: [cold-reset] ++
1,173,028 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 ready_for_fw is high
1,176,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,196 UART: [idev] Erasing UDS.KEYID = 0
1,201,424 UART: [idev] Sha1 KeyId Algorithm
1,210,059 UART: [idev] --
1,211,233 UART: [ldev] ++
1,211,401 UART: [ldev] CDI.KEYID = 6
1,211,764 UART: [ldev] SUBJECT.KEYID = 5
1,212,190 UART: [ldev] AUTHORITY.KEYID = 7
1,212,653 UART: [ldev] FE.KEYID = 1
1,217,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,195 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,889 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,761 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,467 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,474 UART: [ldev] --
1,282,947 UART: [fwproc] Wait for Commands...
1,283,655 UART: [fwproc] Recv command 0x46574c44
1,284,383 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,795,865 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 ready_for_fw is high
1,060,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,648,320 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Production
86,136 UART: [state] DebugLocked = Yes
86,728 UART: [state] Starting the WD Timer 40000000 cycles
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,375 UART: [kat] LMS
1,171,703 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,149 UART: [fht] FHT @ 0x50003400
1,175,964 UART: [idev] ++
1,176,132 UART: [idev] CDI.KEYID = 6
1,176,492 UART: [idev] SUBJECT.KEYID = 7
1,176,916 UART: [idev] UDS.KEYID = 0
1,177,261 ready_for_fw is high
1,177,261 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,909 UART: [idev] Erasing UDS.KEYID = 0
1,201,837 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,530 UART: [ldev] ++
1,211,698 UART: [ldev] CDI.KEYID = 6
1,212,061 UART: [ldev] SUBJECT.KEYID = 5
1,212,487 UART: [ldev] AUTHORITY.KEYID = 7
1,212,950 UART: [ldev] FE.KEYID = 1
1,217,910 UART: [ldev] Erasing FE.KEYID = 1
1,244,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,840 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,534 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,406 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,112 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,301 UART: [ldev] --
1,283,560 UART: [fwproc] Wait for Commands...
1,284,352 UART: [fwproc] Recv command 0x46574c44
1,285,080 UART: [fwproc] Recv'd Img size: 114084 bytes
2,606,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,797,576 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,863 ready_for_fw is high
1,060,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,649,023 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Production
86,117 UART: [state] DebugLocked = Yes
86,797 UART: [state] Starting the WD Timer 40000000 cycles
88,380 UART: [kat] SHA2-256
891,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,059 UART: [kat] ++
896,211 UART: [kat] sha1
900,575 UART: [kat] SHA2-256
902,515 UART: [kat] SHA2-384
905,318 UART: [kat] SHA2-512-ACC
907,219 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,351 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,434 UART: [idev] ++
1,173,602 UART: [idev] CDI.KEYID = 6
1,173,963 UART: [idev] SUBJECT.KEYID = 7
1,174,388 UART: [idev] UDS.KEYID = 0
1,174,734 ready_for_fw is high
1,174,734 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,524 UART: [ldev] ++
1,209,692 UART: [ldev] CDI.KEYID = 6
1,210,056 UART: [ldev] SUBJECT.KEYID = 5
1,210,483 UART: [ldev] AUTHORITY.KEYID = 7
1,210,946 UART: [ldev] FE.KEYID = 1
1,216,002 UART: [ldev] Erasing FE.KEYID = 1
1,242,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,717 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,587 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,375 UART: [ldev] --
1,281,721 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,217 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,823 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 ready_for_fw is high
1,056,275 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,473 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Production
86,010 UART: [state] DebugLocked = Yes
86,756 UART: [state] Starting the WD Timer 40000000 cycles
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,358 UART: [kat] SHA2-256
902,298 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,849 UART: [kat] HMAC-384Kdf
921,501 UART: [kat] LMS
1,169,813 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,185 UART: [fht] FHT @ 0x50003400
1,173,785 UART: [idev] ++
1,173,953 UART: [idev] CDI.KEYID = 6
1,174,314 UART: [idev] SUBJECT.KEYID = 7
1,174,739 UART: [idev] UDS.KEYID = 0
1,175,085 ready_for_fw is high
1,175,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,699 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,744 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,614 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,320 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,318 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,571 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: [fwproc] Recv'd Img size: 114084 bytes
2,603,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,794,630 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,726 ready_for_fw is high
1,057,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,916 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
7,088,443 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
7,083,094 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
7,396,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,480 writing to cptra_bootfsm_go
7,401,763 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
5,667,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
5,667,454 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
6,006,270 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,578 writing to cptra_bootfsm_go
6,001,038 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
5,660,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
5,663,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
6,000,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
6,001,322 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,621 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,957 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,651 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,043 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,853 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,348 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,152 UART:
192,528 UART: Running Caliptra ROM ...
193,684 UART:
193,837 UART: [state] CFI Enabled
262,853 UART: [state] LifecycleState = Unprovisioned
265,232 UART: [state] DebugLocked = No
266,501 UART: [state] WD Timer not started. Device not locked for debugging
270,501 UART: [kat] SHA2-256
452,397 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,584 UART: ROM integrity test failed
464,838 UART: ROM Fatal Error: 0x90080001
2,723,456 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,867,062 >>> mbox cmd response: failed
2,867,790 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,010,563 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,122 UART:
192,486 UART: Running Caliptra ROM ...
193,644 UART:
193,819 UART: [state] CFI Enabled
266,268 UART: [state] LifecycleState = Unprovisioned
268,640 UART: [state] DebugLocked = No
271,315 UART: [state] WD Timer not started. Device not locked for debugging
275,769 UART: [kat] SHA2-256
457,736 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,892 UART: ROM integrity test failed
470,153 UART: ROM Fatal Error: 0x90080001
2,727,862 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,871,619 >>> mbox cmd response: failed
2,872,206 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,015,085 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,441 UART:
192,814 UART: Running Caliptra ROM ...
193,984 UART:
603,533 UART: [state] CFI Enabled
617,248 UART: [state] LifecycleState = Unprovisioned
619,597 UART: [state] DebugLocked = No
621,726 UART: [state] WD Timer not started. Device not locked for debugging
625,490 UART: [kat] SHA2-256
807,219 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,435 UART: ROM integrity test failed
819,661 UART: ROM Fatal Error: 0x90080001
3,078,924 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,222,687 >>> mbox cmd response: failed
3,223,247 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,365,976 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,534 UART:
192,930 UART: Running Caliptra ROM ...
194,094 UART:
603,662 UART: [state] CFI Enabled
620,163 UART: [state] LifecycleState = Unprovisioned
622,461 UART: [state] DebugLocked = No
623,752 UART: [state] WD Timer not started. Device not locked for debugging
626,926 UART: [kat] SHA2-256
808,874 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,121 UART: ROM integrity test failed
821,334 UART: ROM Fatal Error: 0x90080001
3,073,234 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,217,010 >>> mbox cmd response: failed
3,217,583 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,360,310 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,384 UART:
192,740 UART: Running Caliptra ROM ...
193,924 UART:
194,075 UART: [state] CFI Enabled
263,718 UART: [state] LifecycleState = Unprovisioned
265,607 UART: [state] DebugLocked = No
266,718 UART: [state] WD Timer not started. Device not locked for debugging
269,732 UART: [kat] SHA2-256
448,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,894 UART: ROM integrity test failed
461,154 UART: ROM Fatal Error: 0x90080001
2,710,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,854,592 >>> mbox cmd response: failed
2,855,159 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,998,302 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,213 UART:
192,576 UART: Running Caliptra ROM ...
193,699 UART:
193,853 UART: [state] CFI Enabled
262,298 UART: [state] LifecycleState = Unprovisioned
264,147 UART: [state] DebugLocked = No
265,586 UART: [state] WD Timer not started. Device not locked for debugging
268,523 UART: [kat] SHA2-256
447,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,719 UART: ROM integrity test failed
459,920 UART: ROM Fatal Error: 0x90080001
2,706,642 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,850,898 >>> mbox cmd response: failed
2,851,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,994,598 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,553 UART:
192,935 UART: Running Caliptra ROM ...
194,074 UART:
603,584 UART: [state] CFI Enabled
617,190 UART: [state] LifecycleState = Unprovisioned
619,060 UART: [state] DebugLocked = No
621,416 UART: [state] WD Timer not started. Device not locked for debugging
624,635 UART: [kat] SHA2-256
803,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,788 UART: ROM integrity test failed
816,017 UART: ROM Fatal Error: 0x90080001
3,080,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,224,245 >>> mbox cmd response: failed
3,224,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,368,101 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,588 UART:
192,977 UART: Running Caliptra ROM ...
194,082 UART:
603,871 UART: [state] CFI Enabled
615,913 UART: [state] LifecycleState = Unprovisioned
617,771 UART: [state] DebugLocked = No
620,661 UART: [state] WD Timer not started. Device not locked for debugging
623,871 UART: [kat] SHA2-256
803,011 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,065 UART: ROM integrity test failed
815,268 UART: ROM Fatal Error: 0x90080001
3,068,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,212,564 >>> mbox cmd response: failed
3,213,120 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,356,247 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,142 UART:
192,551 UART: Running Caliptra ROM ...
193,719 UART:
193,874 UART: [state] CFI Enabled
261,819 UART: [state] LifecycleState = Unprovisioned
263,714 UART: [state] DebugLocked = No
265,422 UART: [state] WD Timer not started. Device not locked for debugging
269,761 UART: [kat] SHA2-256
448,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,951 UART: ROM integrity test failed
461,156 UART: ROM Fatal Error: 0x90080001
2,718,010 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,862,237 >>> mbox cmd response: failed
2,862,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,006,139 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,055 UART:
192,454 UART: Running Caliptra ROM ...
193,621 UART:
193,772 UART: [state] CFI Enabled
262,275 UART: [state] LifecycleState = Unprovisioned
264,126 UART: [state] DebugLocked = No
266,913 UART: [state] WD Timer not started. Device not locked for debugging
270,131 UART: [kat] SHA2-256
449,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,294 UART: ROM integrity test failed
461,566 UART: ROM Fatal Error: 0x90080001
2,713,002 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,857,217 >>> mbox cmd response: failed
2,857,796 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,001,092 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,625 writing to cptra_bootfsm_go
192,825 UART:
193,196 UART: Running Caliptra ROM ...
194,467 UART:
603,947 UART: [state] CFI Enabled
617,588 UART: [state] LifecycleState = Unprovisioned
619,446 UART: [state] DebugLocked = No
621,687 UART: [state] WD Timer not started. Device not locked for debugging
626,243 UART: [kat] SHA2-256
805,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,368 UART: ROM integrity test failed
817,609 UART: ROM Fatal Error: 0x90080001
3,080,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,225,099 >>> mbox cmd response: failed
3,225,677 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,368,965 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,535 UART:
192,904 UART: Running Caliptra ROM ...
194,079 UART:
603,461 UART: [state] CFI Enabled
616,969 UART: [state] LifecycleState = Unprovisioned
618,832 UART: [state] DebugLocked = No
620,317 UART: [state] WD Timer not started. Device not locked for debugging
623,424 UART: [kat] SHA2-256
802,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,586 UART: ROM integrity test failed
814,841 UART: ROM Fatal Error: 0x90080001
3,064,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,209,168 >>> mbox cmd response: failed
3,209,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,352,879 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: ROM integrity test failed
895,522 UART: ROM Fatal Error: 0x90080001
897,137 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,143 >>> mbox cmd response: failed
897,143 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,149 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: ROM integrity test failed
895,744 UART: ROM Fatal Error: 0x90080001
897,359 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,365 >>> mbox cmd response: failed
897,365 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,371 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
891,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: ROM integrity test failed
895,545 UART: ROM Fatal Error: 0x90080001
897,160 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,166 >>> mbox cmd response: failed
897,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,172 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,465 UART: [kat] SHA2-256
891,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,986 UART: ROM integrity test failed
895,433 UART: ROM Fatal Error: 0x90080001
897,048 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,054 >>> mbox cmd response: failed
897,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,060 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: ROM integrity test failed
895,928 UART: ROM Fatal Error: 0x90080001
897,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,549 >>> mbox cmd response: failed
897,549 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,555 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,209 UART: ROM integrity test failed
895,656 UART: ROM Fatal Error: 0x90080001
897,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,277 >>> mbox cmd response: failed
897,277 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,283 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,204 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,904 UART: ROM integrity test failed
895,351 UART: ROM Fatal Error: 0x90080001
896,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
896,972 >>> mbox cmd response: failed
896,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
896,978 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: ROM integrity test failed
896,055 UART: ROM Fatal Error: 0x90080001
897,670 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,676 >>> mbox cmd response: failed
897,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,682 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,065 UART: ROM integrity test failed
895,512 UART: ROM Fatal Error: 0x90080001
897,127 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,133 >>> mbox cmd response: failed
897,133 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,139 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
891,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: ROM integrity test failed
896,028 UART: ROM Fatal Error: 0x90080001
897,643 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,649 >>> mbox cmd response: failed
897,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,655 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: ROM integrity test failed
895,659 UART: ROM Fatal Error: 0x90080001
897,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,280 >>> mbox cmd response: failed
897,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,286 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "1d35f149e0c97bc85828012a61a67ccdf378c5338b81f705ca43231bf14ed98c320b0e92575c6a316ef1302f3f2263f0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: ROM integrity test failed
895,921 UART: ROM Fatal Error: 0x90080001
897,536 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,542 >>> mbox cmd response: failed
897,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
897,548 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
2,691,360 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,835,115 >>> mbox cmd response: failed
2,835,704 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,978,581 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,850,500 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,424,068 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,706,963 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,850,738 >>> mbox cmd response: failed
2,851,306 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,994,178 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,872,638 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,457,108 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,051,344 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,195,062 >>> mbox cmd response: failed
3,195,626 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,338,344 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
21,585,567 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,020,831 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,023 writing to cptra_bootfsm_go
3,054,698 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,198,297 >>> mbox cmd response: failed
3,198,854 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,342,233 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
21,590,128 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,014,500 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,714,431 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,858,635 >>> mbox cmd response: failed
2,859,201 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,003,075 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,422,140 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,229,805 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
2,705,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,849,731 >>> mbox cmd response: failed
2,850,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,993,503 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,429,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,210,567 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
3,062,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,206,435 >>> mbox cmd response: failed
3,207,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,350,303 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,183,798 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,897,035 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,062,624 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,206,775 >>> mbox cmd response: failed
3,207,362 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,350,635 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,180,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,889,300 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,712,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,856,970 >>> mbox cmd response: failed
2,857,547 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,000,689 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,451,363 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,309,427 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
2,715,689 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,859,840 >>> mbox cmd response: failed
2,860,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,003,808 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,421,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,252,753 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,073,672 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,218,564 >>> mbox cmd response: failed
3,219,151 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,362,288 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,180,511 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,894,047 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,070,878 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,215,027 >>> mbox cmd response: failed
3,215,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,358,886 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
20,181,687 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,902,405 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,758 >>> mbox cmd response: failed
814,758 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,995 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,026 >>> mbox cmd response: failed
815,026 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,577 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,793 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,801 >>> mbox cmd response: failed
814,801 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,826 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,305 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,313 >>> mbox cmd response: failed
814,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,244 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,278 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,680 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,688 >>> mbox cmd response: failed
814,688 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,559 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,313 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,208 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,216 >>> mbox cmd response: failed
814,216 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,821 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,649 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,657 >>> mbox cmd response: failed
814,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,678 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,271 >>> mbox cmd response: failed
815,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,928 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,848 >>> mbox cmd response: failed
814,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,175 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,786 >>> mbox cmd response: failed
814,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,541 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,011 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,789 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,797 >>> mbox cmd response: failed
814,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
814,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,554 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,407 >>> mbox cmd response: failed
815,407 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
815,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,766 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,222 UART:
192,580 UART: Running Caliptra ROM ...
193,772 UART:
193,925 UART: [state] CFI Enabled
262,386 UART: [state] LifecycleState = Unprovisioned
264,364 UART: [state] DebugLocked = No
266,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,782 UART: [kat] SHA2-256
440,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,998 UART: [kat] ++
451,479 UART: [kat] sha1
462,516 UART: [kat] SHA2-256
465,183 UART: [kat] SHA2-384
470,881 UART: [kat] SHA2-512-ACC
473,231 UART: [kat] ECC-384
2,767,807 UART: [kat] HMAC-384Kdf
2,798,966 UART: [kat] LMS
3,989,253 UART: [kat] --
3,991,530 UART: [cold-reset] ++
3,993,478 UART: [fht] Storing FHT @ 0x50003400
4,004,891 UART: [idev] ++
4,005,474 UART: [idev] CDI.KEYID = 6
4,006,396 UART: [idev] SUBJECT.KEYID = 7
4,007,654 UART: [idev] UDS.KEYID = 0
4,008,736 ready_for_fw is high
4,008,960 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,153,198 UART: [idev] Erasing UDS.KEYID = 0
7,348,856 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,067 UART: [idev] --
7,373,663 UART: [ldev] ++
7,374,234 UART: [ldev] CDI.KEYID = 6
7,375,202 UART: [ldev] SUBJECT.KEYID = 5
7,376,416 UART: [ldev] AUTHORITY.KEYID = 7
7,377,650 UART: [ldev] FE.KEYID = 1
7,424,084 UART: [ldev] Erasing FE.KEYID = 1
10,760,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,895 UART: [ldev] --
13,136,404 UART: [fwproc] Waiting for Commands...
13,138,826 UART: [fwproc] Received command 0x46574c44
13,141,031 UART: [fwproc] Received Image of size 114632 bytes
17,201,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,351,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,670,144 >>> mbox cmd response: success
17,674,408 UART: [afmc] ++
17,674,998 UART: [afmc] CDI.KEYID = 6
17,675,908 UART: [afmc] SUBJECT.KEYID = 7
17,677,123 UART: [afmc] AUTHORITY.KEYID = 5
21,047,389 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,362 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,363,758 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,378,621 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,393,049 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,414,766 UART: [afmc] --
23,418,000 UART: [cold-reset] --
23,422,303 UART: [state] Locking Datavault
23,428,108 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,898 UART: [state] Locking ICCM
23,431,914 UART: [exit] Launching FMC @ 0x40000130
23,440,312 UART:
23,440,547 UART: Running Caliptra FMC ...
23,441,654 UART:
23,441,811 UART: [state] CFI Enabled
23,507,419 UART: [fht] FMC Alias Private Key: 7
25,845,603 UART: [art] Extend RT PCRs Done
25,846,823 UART: [art] Lock RT PCRs Done
25,848,445 UART: [art] Populate DV Done
25,854,131 UART: [fht] FMC Alias Private Key: 7
25,855,680 UART: [art] Derive CDI
25,856,502 UART: [art] Store in in slot 0x4
25,914,872 UART: [art] Derive Key Pair
25,915,908 UART: [art] Store priv key in slot 0x5
29,208,520 UART: [art] Derive Key Pair - Done
29,221,737 UART: [art] Signing Cert with AUTHO
29,223,047 UART: RITY.KEYID = 7
31,509,136 UART: [art] Erasing AUTHORITY.KEYID = 7
31,510,644 UART: [art] PUB.X = 8B357DE3FC2F8B3A9C159BA15C8E9F2CAD17E9CA509B70EAA503241EF6E7D503278ACAFB56BD91216BFA5CF963447671
31,517,959 UART: [art] PUB.Y = 21F72F1622ECDE12B23C3D8C2FC77D2C351A1D276944CD9104424709367BA84264C977A518519E566FCAAD29739C0ED5
31,525,142 UART: [art] SIG.R = 99F570D8410103B31731B5923B1B715628315563CD0C0EBAEA27260814FC84F131503A165FE5E5EFC8F99F4D10F9BCC1
31,532,541 UART: [art] SIG.S = 36F0B5471C61D6B5D0DC51CB30CC470875AE2411B5B03B6487E2C11435491F36E29819F4786EFFFFB9289BD466EBB0C9
32,837,808 UART: Caliptra RT
32,838,513 UART: [state] CFI Enabled
32,997,954 UART: [rt] RT listening for mailbox commands...
32,999,803 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,029,332 UART: [rt]cmd =0x46504c54, len=4
33,030,782 >>> mbox cmd response data (8 bytes)
33,031,734 UART: [rt] FIPS self test
33,032,690 UART: [kat] ++
33,033,199 UART: [kat] sha1
33,037,605 UART: [kat] SHA2-256
33,039,539 UART: [kat] SHA2-384
33,042,562 UART: [kat] SHA2-512-ACC
33,044,809 UART: [kat] ECC-384
33,046,985 UART: Fatal Error: 0x90040004
33,082,213 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,226,189 >>> mbox cmd response: failed
33,226,833 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,370,745 >>> mbox cmd response: failed
Initializing fuses
927 writing to cptra_bootfsm_go
190,061 UART:
190,356 UART: Running Caliptra ROM ...
191,401 UART:
191,542 UART: [state] CFI Enabled
250,307 UART: [state] LifecycleState = Unprovisioned
252,227 UART: [state] DebugLocked = No
254,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,632 UART: [kat] SHA2-256
428,356 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,876 UART: [kat] ++
439,405 UART: [kat] sha1
449,368 UART: [kat] SHA2-256
452,101 UART: [kat] SHA2-384
457,969 UART: [kat] SHA2-512-ACC
460,291 UART: [kat] ECC-384
2,751,100 UART: [kat] HMAC-384Kdf
2,782,228 UART: [kat] LMS
3,972,551 UART: [kat] --
3,977,741 UART: [cold-reset] ++
3,978,749 UART: [fht] Storing FHT @ 0x50003400
3,990,407 UART: [idev] ++
3,990,978 UART: [idev] CDI.KEYID = 6
3,991,896 UART: [idev] SUBJECT.KEYID = 7
3,993,173 UART: [idev] UDS.KEYID = 0
3,994,696 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,138,818 UART: [idev] Erasing UDS.KEYID = 0
7,329,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,959 UART: [idev] --
7,354,924 UART: [ldev] ++
7,355,502 UART: [ldev] CDI.KEYID = 6
7,356,416 UART: [ldev] SUBJECT.KEYID = 5
7,357,634 UART: [ldev] AUTHORITY.KEYID = 7
7,358,921 UART: [ldev] FE.KEYID = 1
7,405,510 UART: [ldev] Erasing FE.KEYID = 1
10,739,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,193 UART: [ldev] --
13,099,766 UART: [fwproc] Waiting for Commands...
13,103,102 UART: [fwproc] Received command 0x46574c44
13,105,308 UART: [fwproc] Received Image of size 114632 bytes
17,163,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,489 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,629,669 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,782,322 ready_for_fw is high
3,782,745 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,882,836 >>> mbox cmd response: success
23,567,893 UART:
23,568,311 UART: Running Caliptra FMC ...
23,569,460 UART:
23,569,625 UART: [state] CFI Enabled
23,636,330 UART: [fht] FMC Alias Private Key: 7
25,974,139 UART: [art] Extend RT PCRs Done
25,975,364 UART: [art] Lock RT PCRs Done
25,976,941 UART: [art] Populate DV Done
25,982,408 UART: [fht] FMC Alias Private Key: 7
25,984,111 UART: [art] Derive CDI
25,984,928 UART: [art] Store in in slot 0x4
26,033,366 UART: [art] Derive Key Pair
26,034,371 UART: [art] Store priv key in slot 0x5
29,327,638 UART: [art] Derive Key Pair - Done
29,340,354 UART: [art] Signing Cert with AUTHO
29,341,691 UART: RITY.KEYID = 7
31,629,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,538 UART: [art] PUB.X = 5F221DA9E1E02536F687449FEF4A9CE2FB60AA98D7B72673CA9F25C5D6D24B6B25E2EC2D718CC5B8A55F67819D17B1C2
31,637,791 UART: [art] PUB.Y = 0602E1E11DEF43E891FD34431F7A8460166D0DC4A58313D67082C79C7EFD7CCAE6A2349886195CDADEDD0639EE19EF9B
31,645,034 UART: [art] SIG.R = 120A540D5A87262D7BD92989CB3CEDAC1FFC8E2302CDD7395B95075082C3C53F0ECA6E73563B6937E11CF1FBA5E49BF7
31,652,487 UART: [art] SIG.S = A12C18EFBBA357015ACE0CD2E6891B7824FD6A0C0CE0385CD21A8273510FD33A373B5B3705D7C7D7D5121B66DF4BEEF7
32,957,135 UART: Caliptra RT
32,957,853 UART: [state] CFI Enabled
33,118,709 UART: [rt] RT listening for mailbox commands...
33,120,569 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,150,255 UART: [rt]cmd =0x46504c54, len=4
33,151,726 >>> mbox cmd response data (8 bytes)
33,152,624 UART: [rt] FIPS self test
33,153,563 UART: [kat] ++
33,154,018 UART: [kat] sha1
33,158,474 UART: [kat] SHA2-256
33,160,406 UART: [kat] SHA2-384
33,163,214 UART: [kat] SHA2-512-ACC
33,165,484 UART: [kat] ECC-384
33,167,604 UART: Fatal Error: 0x90040004
33,202,996 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,347,037 >>> mbox cmd response: failed
33,347,698 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,491,593 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,769,778 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,869,812 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,497 UART:
192,855 UART: Running Caliptra ROM ...
193,975 UART:
603,810 UART: [state] CFI Enabled
615,826 UART: [state] LifecycleState = Unprovisioned
617,704 UART: [state] DebugLocked = No
619,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,234 UART: [kat] SHA2-256
793,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,485 UART: [kat] ++
805,009 UART: [kat] sha1
815,958 UART: [kat] SHA2-256
818,680 UART: [kat] SHA2-384
824,743 UART: [kat] SHA2-512-ACC
827,119 UART: [kat] ECC-384
3,111,088 UART: [kat] HMAC-384Kdf
3,122,708 UART: [kat] LMS
4,312,847 UART: [kat] --
4,315,741 UART: [cold-reset] ++
4,317,113 UART: [fht] Storing FHT @ 0x50003400
4,327,679 UART: [idev] ++
4,328,251 UART: [idev] CDI.KEYID = 6
4,329,215 UART: [idev] SUBJECT.KEYID = 7
4,330,461 UART: [idev] UDS.KEYID = 0
4,331,467 ready_for_fw is high
4,331,681 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,475,752 UART: [idev] Erasing UDS.KEYID = 0
7,614,670 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,673 UART: [idev] --
7,638,430 UART: [ldev] ++
7,639,001 UART: [ldev] CDI.KEYID = 6
7,639,975 UART: [ldev] SUBJECT.KEYID = 5
7,641,190 UART: [ldev] AUTHORITY.KEYID = 7
7,642,423 UART: [ldev] FE.KEYID = 1
7,653,876 UART: [ldev] Erasing FE.KEYID = 1
10,939,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,247,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,262,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,061 UART: [ldev] --
13,301,383 UART: [fwproc] Waiting for Commands...
13,303,868 UART: [fwproc] Received command 0x46574c44
13,306,057 UART: [fwproc] Received Image of size 114632 bytes
17,366,293 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,373 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,263 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,832,497 >>> mbox cmd response: success
17,836,637 UART: [afmc] ++
17,837,229 UART: [afmc] CDI.KEYID = 6
17,838,246 UART: [afmc] SUBJECT.KEYID = 7
17,839,405 UART: [afmc] AUTHORITY.KEYID = 5
21,158,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,197 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,554 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,416 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,835 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,369 UART: [afmc] --
23,526,940 UART: [cold-reset] --
23,530,745 UART: [state] Locking Datavault
23,536,690 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,450 UART: [state] Locking ICCM
23,540,277 UART: [exit] Launching FMC @ 0x40000130
23,548,621 UART:
23,548,855 UART: Running Caliptra FMC ...
23,549,957 UART:
23,550,116 UART: [state] CFI Enabled
23,558,702 UART: [fht] FMC Alias Private Key: 7
25,889,809 UART: [art] Extend RT PCRs Done
25,891,029 UART: [art] Lock RT PCRs Done
25,892,824 UART: [art] Populate DV Done
25,897,930 UART: [fht] FMC Alias Private Key: 7
25,899,523 UART: [art] Derive CDI
25,900,337 UART: [art] Store in in slot 0x4
25,942,888 UART: [art] Derive Key Pair
25,943,934 UART: [art] Store priv key in slot 0x5
29,186,123 UART: [art] Derive Key Pair - Done
29,199,330 UART: [art] Signing Cert with AUTHO
29,200,666 UART: RITY.KEYID = 7
31,479,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,159 UART: [art] PUB.X = B26D2D72A4F383ACFA12AA8D03EC197C91D0A8263645877BE8A0FD5BBB8BE76840E83CED98AEA4D24B61A4238746E659
31,488,413 UART: [art] PUB.Y = 3E9B692EDBF4C5F5DE35B2E96F228EB5B0A43D9BC12AD73C040F26949E39296547FB603E803F0665B7F180C9D5AF4B86
31,495,652 UART: [art] SIG.R = CEDD4AFAC475F2681FDBFE3D2BC7265EBB40663ACB72CCEA22AD3BC328FB082218F0AE7A10E4C44EB5E35B5B613CB095
31,503,098 UART: [art] SIG.S = EC143B4616A44A8F1D1566BB2DF6E4F7B493B3E61E871C3F06149EB2DF047245E46B994388D5A4A591FBC4F62592E8AA
32,807,998 UART: Caliptra RT
32,808,721 UART: [state] CFI Enabled
32,927,033 UART: [rt] RT listening for mailbox commands...
32,928,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,958,696 UART: [rt]cmd =0x46504c54, len=4
32,960,257 >>> mbox cmd response data (8 bytes)
32,961,435 UART: [rt] FIPS self test
32,962,383 UART: [kat] ++
32,962,833 UART: [kat] sha1
32,967,451 UART: [kat] SHA2-256
32,969,380 UART: [kat] SHA2-384
32,972,230 UART: [kat] SHA2-512-ACC
32,974,519 UART: [kat] ECC-384
32,976,681 UART: Fatal Error: 0x90040004
33,011,881 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,155,852 >>> mbox cmd response: failed
33,156,477 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,300,366 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
190,108 UART:
190,400 UART: Running Caliptra ROM ...
191,511 UART:
7,232,553 UART: [state] CFI Enabled
7,248,561 UART: [state] LifecycleState = Unprovisioned
7,250,719 UART: [state] DebugLocked = No
7,252,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,256,315 UART: [kat] SHA2-256
7,426,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,590 UART: [kat] ++
7,437,054 UART: [kat] sha1
7,447,242 UART: [kat] SHA2-256
7,449,936 UART: [kat] SHA2-384
7,455,548 UART: [kat] SHA2-512-ACC
7,457,904 UART: [kat] ECC-384
9,741,120 UART: [kat] HMAC-384Kdf
9,753,774 UART: [kat] LMS
10,943,896 UART: [kat] --
10,948,633 UART: [cold-reset] ++
10,951,156 UART: [fht] Storing FHT @ 0x50003400
10,963,175 UART: [idev] ++
10,963,801 UART: [idev] CDI.KEYID = 6
10,964,682 UART: [idev] SUBJECT.KEYID = 7
10,965,944 UART: [idev] UDS.KEYID = 0
10,967,491 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,111,477 UART: [idev] Erasing UDS.KEYID = 0
14,250,466 UART: [idev] Using Sha1 for KeyId Algorithm
14,272,328 UART: [idev] --
14,276,208 UART: [ldev] ++
14,276,827 UART: [ldev] CDI.KEYID = 6
14,277,767 UART: [ldev] SUBJECT.KEYID = 5
14,278,998 UART: [ldev] AUTHORITY.KEYID = 7
14,280,230 UART: [ldev] FE.KEYID = 1
14,291,557 UART: [ldev] Erasing FE.KEYID = 1
17,581,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,874,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,889,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,918,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,936,701 UART: [ldev] --
19,941,801 UART: [fwproc] Waiting for Commands...
19,943,896 UART: [fwproc] Received command 0x46574c44
19,946,086 UART: [fwproc] Received Image of size 114632 bytes
24,003,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,078,870 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,147,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,466,174 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,655 writing to cptra_bootfsm_go
4,126,531 ready_for_fw is high
4,126,974 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,080,035 >>> mbox cmd response: success
23,725,110 UART:
23,725,534 UART: Running Caliptra FMC ...
23,726,685 UART:
23,726,873 UART: [state] CFI Enabled
23,734,508 UART: [fht] FMC Alias Private Key: 7
26,064,787 UART: [art] Extend RT PCRs Done
26,066,012 UART: [art] Lock RT PCRs Done
26,067,965 UART: [art] Populate DV Done
26,073,280 UART: [fht] FMC Alias Private Key: 7
26,074,883 UART: [art] Derive CDI
26,075,626 UART: [art] Store in in slot 0x4
26,118,237 UART: [art] Derive Key Pair
26,119,297 UART: [art] Store priv key in slot 0x5
29,361,426 UART: [art] Derive Key Pair - Done
29,374,765 UART: [art] Signing Cert with AUTHO
29,376,069 UART: RITY.KEYID = 7
31,655,491 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,998 UART: [art] PUB.X = 66B4D05D26915B5B355067680DA2B44F571640AB7396D470B4C2EA6EEA7D7FCD27381A7C71274388FA2AE6639D0B3150
31,664,199 UART: [art] PUB.Y = AF15AC4782685BEF0D7F67E9F50127F9E8471CDD57B5BCD0A531C8B6542BCF1307D72AF031EB9F62E97C656A4D52C19D
31,671,457 UART: [art] SIG.R = 2A0C82C7C0218FC27F36B5013AA77E8458D86302EE911FD7A5E55A41612950CF5AA02B68C9342D1F9EBFDB38F35B5FE6
31,678,853 UART: [art] SIG.S = D1EC1A6BA14CD0F2C4813ECEDA67529F9A90AF1A8B86BFEBC7E1C9D4C2BF0EECE46EA6286714B9EBBF99BC2F93EBFD12
32,984,826 UART: Caliptra RT
32,985,539 UART: [state] CFI Enabled
33,103,579 UART: [rt] RT listening for mailbox commands...
33,105,431 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,135,182 UART: [rt]cmd =0x46504c54, len=4
33,136,680 >>> mbox cmd response data (8 bytes)
33,137,796 UART: [rt] FIPS self test
33,138,736 UART: [kat] ++
33,139,188 UART: [kat] sha1
33,143,648 UART: [kat] SHA2-256
33,145,578 UART: [kat] SHA2-384
33,148,591 UART: [kat] SHA2-512-ACC
33,150,842 UART: [kat] ECC-384
33,152,738 UART: Fatal Error: 0x90040004
33,187,957 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,331,954 >>> mbox cmd response: failed
33,332,620 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,476,493 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
10,587,473 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,547,694 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
193,045 UART:
193,430 UART: Running Caliptra ROM ...
194,558 UART:
194,699 UART: [state] CFI Enabled
265,332 UART: [state] LifecycleState = Unprovisioned
267,254 UART: [state] DebugLocked = No
268,850 UART: [state] WD Timer not started. Device not locked for debugging
272,121 UART: [kat] SHA2-256
451,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,776 UART: [kat] ++
463,219 UART: [kat] sha1
474,872 UART: [kat] SHA2-256
477,877 UART: [kat] SHA2-384
484,109 UART: [kat] SHA2-512-ACC
487,012 UART: [kat] ECC-384
2,948,884 UART: [kat] HMAC-384Kdf
2,972,929 UART: [kat] LMS
3,502,344 UART: [kat] --
3,508,548 UART: [cold-reset] ++
3,510,762 UART: [fht] FHT @ 0x50003400
3,522,619 UART: [idev] ++
3,523,247 UART: [idev] CDI.KEYID = 6
3,524,178 UART: [idev] SUBJECT.KEYID = 7
3,525,289 UART: [idev] UDS.KEYID = 0
3,526,215 ready_for_fw is high
3,526,419 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,022 UART: [idev] Erasing UDS.KEYID = 0
6,027,172 UART: [idev] Sha1 KeyId Algorithm
6,048,555 UART: [idev] --
6,051,692 UART: [ldev] ++
6,052,261 UART: [ldev] CDI.KEYID = 6
6,053,174 UART: [ldev] SUBJECT.KEYID = 5
6,054,395 UART: [ldev] AUTHORITY.KEYID = 7
6,055,579 UART: [ldev] FE.KEYID = 1
6,100,667 UART: [ldev] Erasing FE.KEYID = 1
8,604,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,352 UART: [ldev] --
10,414,383 UART: [fwproc] Wait for Commands...
10,416,046 UART: [fwproc] Recv command 0x46574c44
10,418,090 UART: [fwproc] Recv'd Img size: 114940 bytes
13,830,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,089 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,293,116 >>> mbox cmd response: success
14,296,550 UART: [afmc] ++
14,297,143 UART: [afmc] CDI.KEYID = 6
14,298,054 UART: [afmc] SUBJECT.KEYID = 7
14,299,276 UART: [afmc] AUTHORITY.KEYID = 5
16,826,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,875 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,691 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,700 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,555 UART: [afmc] --
18,628,874 UART: [cold-reset] --
18,634,136 UART: [state] Locking Datavault
18,638,627 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,269 UART: [state] Locking ICCM
18,642,739 UART: [exit] Launching FMC @ 0x40000130
18,651,161 UART:
18,651,405 UART: Running Caliptra FMC ...
18,652,509 UART:
18,652,670 UART: [state] CFI Enabled
18,713,300 UART: [fht] FMC Alias Private Key: 7
20,476,657 UART: [art] Extend RT PCRs Done
20,477,873 UART: [art] Lock RT PCRs Done
20,479,641 UART: [art] Populate DV Done
20,485,103 UART: [fht] FMC Alias Private Key: 7
20,486,623 UART: [art] Derive CDI
20,487,362 UART: [art] Store in in slot 0x4
20,546,290 UART: [art] Derive Key Pair
20,547,284 UART: [art] Store priv key in slot 0x5
23,009,951 UART: [art] Derive Key Pair - Done
23,022,999 UART: [art] Signing Cert with AUTHO
23,024,304 UART: RITY.KEYID = 7
24,735,607 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,092 UART: [art] PUB.X = 25E6F44FEC765139575E95B119141409DDD321E42086293B4E765D65954DDC9E138A1773B40A276D46B8F3564BDA4741
24,744,350 UART: [art] PUB.Y = 76366AC9DE66DFEF83631E37F9F160BFB828E3BB75368EA363FD4B733E04B1E89E02367D1FC3775C7B716E8F7C226B09
24,751,640 UART: [art] SIG.R = 6E06CEEAEAEEBB34703CF6D7ADA2D1C57353C8558852890291F16EE0CE3529C01610DA0C7CF60C86D34B115C100F7F59
24,759,034 UART: [art] SIG.S = 8FD09DCF5FF74AE25A0C6F57246200335F47E23DDD112215D1678422B5B27D9FC6A68CCF0C2DFA664469F420D2E1309A
25,738,366 UART: Caliptra RT
25,739,082 UART: [state] CFI Enabled
25,903,398 UART: [rt] RT listening for mailbox commands...
25,905,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,982 UART: [rt]cmd =0x46504c54, len=4
25,936,378 >>> mbox cmd response data (8 bytes)
25,937,407 UART: [rt] FIPS self test
25,938,352 UART: [kat] ++
25,938,803 UART: [kat] sha1
25,943,097 UART: [kat] SHA2-256
25,944,979 UART: [kat] SHA2-384
25,947,778 UART: [kat] SHA2-512-ACC
25,950,015 UART: [kat] ECC-384
25,951,696 UART: Fatal Error: 0x90040004
25,986,899 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,131,245 >>> mbox cmd response: failed
26,131,915 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,276,205 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,096 UART:
190,386 UART: Running Caliptra ROM ...
191,499 UART:
191,652 UART: [state] CFI Enabled
251,489 UART: [state] LifecycleState = Unprovisioned
253,349 UART: [state] DebugLocked = No
255,000 UART: [state] WD Timer not started. Device not locked for debugging
259,009 UART: [kat] SHA2-256
438,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,695 UART: [kat] ++
450,231 UART: [kat] sha1
460,791 UART: [kat] SHA2-256
463,815 UART: [kat] SHA2-384
469,900 UART: [kat] SHA2-512-ACC
472,831 UART: [kat] ECC-384
2,934,303 UART: [kat] HMAC-384Kdf
2,956,359 UART: [kat] LMS
3,485,830 UART: [kat] --
3,489,983 UART: [cold-reset] ++
3,491,209 UART: [fht] FHT @ 0x50003400
3,503,048 UART: [idev] ++
3,503,615 UART: [idev] CDI.KEYID = 6
3,504,738 UART: [idev] SUBJECT.KEYID = 7
3,505,843 UART: [idev] UDS.KEYID = 0
3,507,352 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,651,945 UART: [idev] Erasing UDS.KEYID = 0
6,008,441 UART: [idev] Sha1 KeyId Algorithm
6,030,865 UART: [idev] --
6,034,231 UART: [ldev] ++
6,034,807 UART: [ldev] CDI.KEYID = 6
6,035,720 UART: [ldev] SUBJECT.KEYID = 5
6,036,885 UART: [ldev] AUTHORITY.KEYID = 7
6,038,178 UART: [ldev] FE.KEYID = 1
6,063,530 UART: [ldev] Erasing FE.KEYID = 1
8,565,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,333,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,353,049 UART: [ldev] --
10,357,180 UART: [fwproc] Wait for Commands...
10,359,275 UART: [fwproc] Recv command 0x46574c44
10,361,372 UART: [fwproc] Recv'd Img size: 114940 bytes
13,768,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,839,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,908,598 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,229,093 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,358,950 ready_for_fw is high
3,359,342 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,045,027 >>> mbox cmd response: success
18,331,049 UART:
18,331,460 UART: Running Caliptra FMC ...
18,332,612 UART:
18,332,775 UART: [state] CFI Enabled
18,395,235 UART: [fht] FMC Alias Private Key: 7
20,159,350 UART: [art] Extend RT PCRs Done
20,160,570 UART: [art] Lock RT PCRs Done
20,162,203 UART: [art] Populate DV Done
20,167,510 UART: [fht] FMC Alias Private Key: 7
20,169,004 UART: [art] Derive CDI
20,169,773 UART: [art] Store in in slot 0x4
20,227,415 UART: [art] Derive Key Pair
20,228,453 UART: [art] Store priv key in slot 0x5
22,691,306 UART: [art] Derive Key Pair - Done
22,703,933 UART: [art] Signing Cert with AUTHO
22,705,272 UART: RITY.KEYID = 7
24,417,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,419,242 UART: [art] PUB.X = 9E48578C5BBA1EC77BF13AB9FBD71F73A1E90F5BC38C11FBF9D49F060070E0FA3DEE83A1CE782C3058EC20EE60B7457B
24,426,507 UART: [art] PUB.Y = 7E092951BBB38D765E2EF063E0C36363021FE41FDE7B6369AD7B7FCFEEEDD395B0AEAF396C55EF2FEC4B1D4853CC9A0A
24,433,814 UART: [art] SIG.R = 522F38674C3C849DBA6075F5660D3D05CBC69CC6745CF52CB76C38DC9EA530629ED3E79DF05EDD0F767ADE65D01A1F61
24,441,236 UART: [art] SIG.S = 8F5A560536F2845E891819F3CACD9394CC723BA87349C90345C3F8108AB9716A14EA3BE8D3C39E55D73F5B784CDD08CF
25,419,370 UART: Caliptra RT
25,420,086 UART: [state] CFI Enabled
25,585,217 UART: [rt] RT listening for mailbox commands...
25,587,072 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,616,709 UART: [rt]cmd =0x46504c54, len=4
25,618,236 >>> mbox cmd response data (8 bytes)
25,619,400 UART: [rt] FIPS self test
25,620,344 UART: [kat] ++
25,620,797 UART: [kat] sha1
25,625,197 UART: [kat] SHA2-256
25,627,126 UART: [kat] SHA2-384
25,630,132 UART: [kat] SHA2-512-ACC
25,632,406 UART: [kat] ECC-384
25,634,409 UART: Fatal Error: 0x90040004
25,669,793 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,814,043 >>> mbox cmd response: failed
25,814,690 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,958,927 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,346,023 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,044,666 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,411 UART:
192,786 UART: Running Caliptra ROM ...
193,991 UART:
603,493 UART: [state] CFI Enabled
616,116 UART: [state] LifecycleState = Unprovisioned
618,044 UART: [state] DebugLocked = No
619,447 UART: [state] WD Timer not started. Device not locked for debugging
623,709 UART: [kat] SHA2-256
802,820 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,392 UART: [kat] ++
814,843 UART: [kat] sha1
826,569 UART: [kat] SHA2-256
829,580 UART: [kat] SHA2-384
835,995 UART: [kat] SHA2-512-ACC
838,931 UART: [kat] ECC-384
3,280,882 UART: [kat] HMAC-384Kdf
3,294,186 UART: [kat] LMS
3,823,667 UART: [kat] --
3,828,450 UART: [cold-reset] ++
3,829,742 UART: [fht] FHT @ 0x50003400
3,840,817 UART: [idev] ++
3,841,405 UART: [idev] CDI.KEYID = 6
3,842,289 UART: [idev] SUBJECT.KEYID = 7
3,843,541 UART: [idev] UDS.KEYID = 0
3,844,443 ready_for_fw is high
3,844,650 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,989,022 UART: [idev] Erasing UDS.KEYID = 0
6,315,545 UART: [idev] Sha1 KeyId Algorithm
6,337,443 UART: [idev] --
6,340,798 UART: [ldev] ++
6,341,370 UART: [ldev] CDI.KEYID = 6
6,342,290 UART: [ldev] SUBJECT.KEYID = 5
6,343,454 UART: [ldev] AUTHORITY.KEYID = 7
6,344,689 UART: [ldev] FE.KEYID = 1
6,356,659 UART: [ldev] Erasing FE.KEYID = 1
8,833,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,505 UART: [ldev] --
10,623,295 UART: [fwproc] Wait for Commands...
10,624,853 UART: [fwproc] Recv command 0x46574c44
10,626,946 UART: [fwproc] Recv'd Img size: 114940 bytes
14,036,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,113,568 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,319 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,503,144 >>> mbox cmd response: success
14,508,101 UART: [afmc] ++
14,508,681 UART: [afmc] CDI.KEYID = 6
14,509,563 UART: [afmc] SUBJECT.KEYID = 7
14,510,775 UART: [afmc] AUTHORITY.KEYID = 5
17,011,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,732,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,734,082 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,749,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,765,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,781,810 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,803,510 UART: [afmc] --
18,807,370 UART: [cold-reset] --
18,810,583 UART: [state] Locking Datavault
18,815,071 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,779 UART: [state] Locking ICCM
18,819,039 UART: [exit] Launching FMC @ 0x40000130
18,827,490 UART:
18,827,726 UART: Running Caliptra FMC ...
18,828,830 UART:
18,828,989 UART: [state] CFI Enabled
18,837,361 UART: [fht] FMC Alias Private Key: 7
20,594,045 UART: [art] Extend RT PCRs Done
20,595,271 UART: [art] Lock RT PCRs Done
20,596,709 UART: [art] Populate DV Done
20,602,284 UART: [fht] FMC Alias Private Key: 7
20,603,985 UART: [art] Derive CDI
20,604,721 UART: [art] Store in in slot 0x4
20,647,311 UART: [art] Derive Key Pair
20,648,353 UART: [art] Store priv key in slot 0x5
23,075,008 UART: [art] Derive Key Pair - Done
23,088,019 UART: [art] Signing Cert with AUTHO
23,089,334 UART: RITY.KEYID = 7
24,794,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,966 UART: [art] PUB.X = A6C2D5BEA6FBDFC8CCBDBFC965EB45AB626F92D34F9D058B180094B0A94788D9399B6063419DACC5EE9FF8D1C86DA8C2
24,803,220 UART: [art] PUB.Y = F9272A6236F865DE13220C32BE9A49C4229CAE447FE2A92E533DB3CD28993F7D50A2C642C8430B28E74B44CD7DA44F0A
24,810,508 UART: [art] SIG.R = BB8D575F43E4C965A61C94130703C8DDCD9424595226B7AF557069026DC75D717E51C62B30BCC6B767DD21A918CA9F71
24,817,900 UART: [art] SIG.S = E07ED9BFDF48162B35846F8DC79F133ACF463A20CB97AC10C0A5C3206C65274B1752DD4A064AC6A339D1571E664E4312
25,796,973 UART: Caliptra RT
25,797,671 UART: [state] CFI Enabled
25,915,437 UART: [rt] RT listening for mailbox commands...
25,917,293 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,946,761 UART: [rt]cmd =0x46504c54, len=4
25,948,284 >>> mbox cmd response data (8 bytes)
25,949,400 UART: [rt] FIPS self test
25,950,339 UART: [kat] ++
25,950,791 UART: [kat] sha1
25,955,193 UART: [kat] SHA2-256
25,957,063 UART: [kat] SHA2-384
25,959,972 UART: [kat] SHA2-512-ACC
25,962,207 UART: [kat] ECC-384
25,964,103 UART: Fatal Error: 0x90040004
25,999,822 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,144,281 >>> mbox cmd response: failed
26,144,946 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,289,120 >>> mbox cmd response: failed
Initializing fuses
1,531 writing to cptra_bootfsm_go
190,735 UART:
191,021 UART: Running Caliptra ROM ...
192,131 UART:
14,236,621 UART: [state] CFI Enabled
14,249,779 UART: [state] LifecycleState = Unprovisioned
14,251,688 UART: [state] DebugLocked = No
14,253,083 UART: [state] WD Timer not started. Device not locked for debugging
14,256,287 UART: [kat] SHA2-256
14,435,426 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,447,010 UART: [kat] ++
14,447,561 UART: [kat] sha1
14,458,402 UART: [kat] SHA2-256
14,461,434 UART: [kat] SHA2-384
14,467,920 UART: [kat] SHA2-512-ACC
14,470,866 UART: [kat] ECC-384
16,914,048 UART: [kat] HMAC-384Kdf
16,926,765 UART: [kat] LMS
17,456,267 UART: [kat] --
17,461,882 UART: [cold-reset] ++
17,463,116 UART: [fht] FHT @ 0x50003400
17,473,339 UART: [idev] ++
17,473,905 UART: [idev] CDI.KEYID = 6
17,474,809 UART: [idev] SUBJECT.KEYID = 7
17,476,021 UART: [idev] UDS.KEYID = 0
17,477,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,621,822 UART: [idev] Erasing UDS.KEYID = 0
19,946,526 UART: [idev] Sha1 KeyId Algorithm
19,969,427 UART: [idev] --
19,972,088 UART: [ldev] ++
19,972,661 UART: [ldev] CDI.KEYID = 6
19,973,546 UART: [ldev] SUBJECT.KEYID = 5
19,974,674 UART: [ldev] AUTHORITY.KEYID = 7
19,975,956 UART: [ldev] FE.KEYID = 1
19,987,435 UART: [ldev] Erasing FE.KEYID = 1
22,461,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,177,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,193,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,209,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,225,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,246,508 UART: [ldev] --
24,251,732 UART: [fwproc] Wait for Commands...
24,254,045 UART: [fwproc] Recv command 0x46574c44
24,256,151 UART: [fwproc] Recv'd Img size: 114940 bytes
27,672,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,748,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,817,010 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,136,471 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,695,763 ready_for_fw is high
3,696,435 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,274,376 >>> mbox cmd response: success
18,527,576 UART:
18,527,953 UART: Running Caliptra FMC ...
18,529,104 UART:
18,529,264 UART: [state] CFI Enabled
18,537,178 UART: [fht] FMC Alias Private Key: 7
20,293,821 UART: [art] Extend RT PCRs Done
20,295,042 UART: [art] Lock RT PCRs Done
20,296,646 UART: [art] Populate DV Done
20,301,962 UART: [fht] FMC Alias Private Key: 7
20,303,507 UART: [art] Derive CDI
20,304,328 UART: [art] Store in in slot 0x4
20,346,867 UART: [art] Derive Key Pair
20,347,871 UART: [art] Store priv key in slot 0x5
22,774,843 UART: [art] Derive Key Pair - Done
22,787,765 UART: [art] Signing Cert with AUTHO
22,789,072 UART: RITY.KEYID = 7
24,494,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,789 UART: [art] PUB.X = 4996FDE091C807056FD4FA0A6F3DF1BA29E2453F831DB8B05EDF6686DB1ABDC734C63F819587932786F9D2730C94DC22
24,503,051 UART: [art] PUB.Y = EECB86A9D7FD5B82E07A8DEC44D5677A6FF277A5995551947DC7FD5F3F0429DEA2565EDC3A5E10367077F8CFBE76FC41
24,510,369 UART: [art] SIG.R = 92AD3A9F3C42EE54AE8DF5ACAA8DD7B4F56225BCC6A9555E175679A339548B950DDBEFBFA4F3F0FDD58AD09609CEE2AD
24,517,774 UART: [art] SIG.S = 8BEE3B0E90C426A49B61CA8D25A648BCFDE8C0ED440A8A45B423B85D3C1AF2E5C93F2D4587A9AB3E2137DB208F1AA715
25,496,613 UART: Caliptra RT
25,497,317 UART: [state] CFI Enabled
25,614,946 UART: [rt] RT listening for mailbox commands...
25,616,793 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,646,520 UART: [rt]cmd =0x46504c54, len=4
25,648,038 >>> mbox cmd response data (8 bytes)
25,649,412 UART: [rt] FIPS self test
25,650,348 UART: [kat] ++
25,650,996 UART: [kat] sha1
25,655,244 UART: [kat] SHA2-256
25,657,186 UART: [kat] SHA2-384
25,660,150 UART: [kat] SHA2-512-ACC
25,662,425 UART: [kat] ECC-384
25,664,540 UART: Fatal Error: 0x90040004
25,699,708 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,844,051 >>> mbox cmd response: failed
25,844,672 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,989,001 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
17,643,590 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,225,774 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,160 UART:
192,552 UART: Running Caliptra ROM ...
193,748 UART:
193,905 UART: [state] CFI Enabled
264,520 UART: [state] LifecycleState = Unprovisioned
266,917 UART: [state] DebugLocked = No
268,234 UART: [state] WD Timer not started. Device not locked for debugging
273,633 UART: [kat] SHA2-256
463,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,236 UART: [kat] ++
474,686 UART: [kat] sha1
485,496 UART: [kat] SHA2-256
488,504 UART: [kat] SHA2-384
494,500 UART: [kat] SHA2-512-ACC
497,094 UART: [kat] ECC-384
2,946,892 UART: [kat] HMAC-384Kdf
2,970,507 UART: [kat] LMS
3,502,295 UART: [kat] --
3,505,725 UART: [cold-reset] ++
3,506,953 UART: [fht] FHT @ 0x50003400
3,519,992 UART: [idev] ++
3,520,708 UART: [idev] CDI.KEYID = 6
3,521,639 UART: [idev] SUBJECT.KEYID = 7
3,522,815 UART: [idev] UDS.KEYID = 0
3,523,742 ready_for_fw is high
3,523,932 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,668,524 UART: [idev] Erasing UDS.KEYID = 0
6,026,683 UART: [idev] Sha1 KeyId Algorithm
6,048,848 UART: [idev] --
6,053,713 UART: [ldev] ++
6,054,408 UART: [ldev] CDI.KEYID = 6
6,055,300 UART: [ldev] SUBJECT.KEYID = 5
6,056,413 UART: [ldev] AUTHORITY.KEYID = 7
6,057,686 UART: [ldev] FE.KEYID = 1
6,096,448 UART: [ldev] Erasing FE.KEYID = 1
8,600,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,973 UART: [ldev] --
10,409,349 UART: [fwproc] Wait for Commands...
10,411,608 UART: [fwproc] Recv command 0x46574c44
10,413,936 UART: [fwproc] Recv'd Img size: 114940 bytes
13,860,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,282 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,599,320 >>> mbox cmd response: success
14,604,099 UART: [afmc] ++
14,604,828 UART: [afmc] CDI.KEYID = 6
14,605,989 UART: [afmc] SUBJECT.KEYID = 7
14,607,478 UART: [afmc] AUTHORITY.KEYID = 5
17,145,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,995 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,146 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,765 UART: [afmc] --
18,944,578 UART: [cold-reset] --
18,949,241 UART: [state] Locking Datavault
18,955,479 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,617 UART: [state] Locking ICCM
18,959,282 UART: [exit] Launching FMC @ 0x40000130
18,967,950 UART:
18,968,203 UART: Running Caliptra FMC ...
18,969,317 UART:
18,969,478 UART: [state] CFI Enabled
19,029,389 UART: [fht] FMC Alias Private Key: 7
20,793,329 UART: [art] Extend RT PCRs Done
20,794,541 UART: [art] Lock RT PCRs Done
20,796,275 UART: [art] Populate DV Done
20,801,791 UART: [fht] FMC Alias Private Key: 7
20,803,489 UART: [art] Derive CDI
20,804,305 UART: [art] Store in in slot 0x4
20,862,075 UART: [art] Derive Key Pair
20,863,118 UART: [art] Store priv key in slot 0x5
23,325,803 UART: [art] Derive Key Pair - Done
23,338,649 UART: [art] Signing Cert with AUTHO
23,339,964 UART: RITY.KEYID = 7
25,052,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,035 UART: [art] PUB.X = C3C4D0F3D834A3E583CFDE2A3E5E13F1B8DCB10214466C40DF1B9063748407F05E488D66D0C29629D5AA8DD55263EA09
25,061,269 UART: [art] PUB.Y = 783FD2DC34C3279EF67590CAF1B97C02B4BD9E01FDFE0A431E4B6B5C2E78EF6D58579624E81978DB7249AEFC82F8D8AC
25,068,537 UART: [art] SIG.R = B6400EEFD85605CDCF4E034A471307D9359A53F1D207AF05C93EFC513C7692646F3D7F874FAA35A86043603E97FE7A6F
25,075,924 UART: [art] SIG.S = 9BA69DC05C61B9E3AB79093D9F30BC3FAD1399B2F7EF5BAB0DA1D0EF1C78E4DF446E4CA2E16A60D4CA323167BE3EA357
26,054,797 UART: Caliptra RT
26,055,516 UART: [state] CFI Enabled
26,221,457 UART: [rt] RT listening for mailbox commands...
26,223,452 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,243 UART: [rt]cmd =0x46504c54, len=4
26,254,822 >>> mbox cmd response data (8 bytes)
26,256,216 UART: [rt] FIPS self test
26,257,164 UART: [kat] ++
26,257,614 UART: [kat] sha1
26,262,122 UART: [kat] SHA2-256
26,264,050 UART: [kat] SHA2-384
26,267,230 UART: [kat] SHA2-512-ACC
26,269,486 UART: [kat] ECC-384
26,271,215 UART: Fatal Error: 0x90040004
26,306,537 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,450,826 >>> mbox cmd response: failed
26,451,492 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,595,824 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,110 UART:
190,401 UART: Running Caliptra ROM ...
191,512 UART:
191,661 UART: [state] CFI Enabled
266,951 UART: [state] LifecycleState = Unprovisioned
269,361 UART: [state] DebugLocked = No
270,684 UART: [state] WD Timer not started. Device not locked for debugging
275,618 UART: [kat] SHA2-256
465,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,279 UART: [kat] ++
476,817 UART: [kat] sha1
488,838 UART: [kat] SHA2-256
491,849 UART: [kat] SHA2-384
497,778 UART: [kat] SHA2-512-ACC
500,336 UART: [kat] ECC-384
2,953,963 UART: [kat] HMAC-384Kdf
2,976,070 UART: [kat] LMS
3,507,835 UART: [kat] --
3,511,620 UART: [cold-reset] ++
3,513,612 UART: [fht] FHT @ 0x50003400
3,525,029 UART: [idev] ++
3,525,705 UART: [idev] CDI.KEYID = 6
3,526,721 UART: [idev] SUBJECT.KEYID = 7
3,527,881 UART: [idev] UDS.KEYID = 0
3,529,428 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,673,927 UART: [idev] Erasing UDS.KEYID = 0
6,035,092 UART: [idev] Sha1 KeyId Algorithm
6,058,315 UART: [idev] --
6,062,312 UART: [ldev] ++
6,062,998 UART: [ldev] CDI.KEYID = 6
6,063,910 UART: [ldev] SUBJECT.KEYID = 5
6,065,072 UART: [ldev] AUTHORITY.KEYID = 7
6,066,310 UART: [ldev] FE.KEYID = 1
6,106,939 UART: [ldev] Erasing FE.KEYID = 1
8,611,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,970 UART: [ldev] --
10,418,523 UART: [fwproc] Wait for Commands...
10,421,106 UART: [fwproc] Recv command 0x46574c44
10,423,374 UART: [fwproc] Recv'd Img size: 114940 bytes
13,874,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,324 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,618,304 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,438,057 ready_for_fw is high
3,438,495 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,747,439 >>> mbox cmd response: success
19,026,641 UART:
19,027,023 UART: Running Caliptra FMC ...
19,028,140 UART:
19,028,296 UART: [state] CFI Enabled
19,093,377 UART: [fht] FMC Alias Private Key: 7
20,857,374 UART: [art] Extend RT PCRs Done
20,858,615 UART: [art] Lock RT PCRs Done
20,860,508 UART: [art] Populate DV Done
20,866,049 UART: [fht] FMC Alias Private Key: 7
20,867,597 UART: [art] Derive CDI
20,868,362 UART: [art] Store in in slot 0x4
20,926,778 UART: [art] Derive Key Pair
20,927,818 UART: [art] Store priv key in slot 0x5
23,390,358 UART: [art] Derive Key Pair - Done
23,403,407 UART: [art] Signing Cert with AUTHO
23,404,709 UART: RITY.KEYID = 7
25,115,973 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,469 UART: [art] PUB.X = 835C3BB2A47A5ABBD80B1DBF352B261FF8F5925FFA9C723479AD87A0818DD1B3526036DF988864A03CB8BF69541868B4
25,124,729 UART: [art] PUB.Y = EC7A20CF95B2D7F1B5634D5ECF26ECC3E874F5EC6BCF8F4124ADD460AEA5608A2D896FE4C8FE10CA17F39FB33B1EB61B
25,132,026 UART: [art] SIG.R = C4309459A89F57472F61E3499883A97B1BF1E25ECD0F6C900D630F02E7DB18EBFFEFD666052B6C0155001304F5061858
25,139,380 UART: [art] SIG.S = F5936F047D04017500378510A04A2AD42B4BDAF9124D51245A8241064D154BF79E0869E2864E5AB74CCBCB128319AF40
26,117,919 UART: Caliptra RT
26,118,616 UART: [state] CFI Enabled
26,283,619 UART: [rt] RT listening for mailbox commands...
26,285,481 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,315,055 UART: [rt]cmd =0x46504c54, len=4
26,316,749 >>> mbox cmd response data (8 bytes)
26,317,819 UART: [rt] FIPS self test
26,318,771 UART: [kat] ++
26,319,221 UART: [kat] sha1
26,323,622 UART: [kat] SHA2-256
26,325,554 UART: [kat] SHA2-384
26,328,460 UART: [kat] SHA2-512-ACC
26,330,710 UART: [kat] ECC-384
26,332,887 UART: Fatal Error: 0x90040004
26,368,269 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,512,650 >>> mbox cmd response: failed
26,513,307 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,657,442 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,435,924 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,755,035 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,462 UART:
192,848 UART: Running Caliptra ROM ...
194,043 UART:
603,842 UART: [state] CFI Enabled
616,286 UART: [state] LifecycleState = Unprovisioned
618,660 UART: [state] DebugLocked = No
621,256 UART: [state] WD Timer not started. Device not locked for debugging
626,720 UART: [kat] SHA2-256
816,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,413 UART: [kat] ++
828,013 UART: [kat] sha1
838,049 UART: [kat] SHA2-256
841,067 UART: [kat] SHA2-384
847,578 UART: [kat] SHA2-512-ACC
850,200 UART: [kat] ECC-384
3,290,405 UART: [kat] HMAC-384Kdf
3,304,864 UART: [kat] LMS
3,836,706 UART: [kat] --
3,840,773 UART: [cold-reset] ++
3,843,270 UART: [fht] FHT @ 0x50003400
3,853,184 UART: [idev] ++
3,853,907 UART: [idev] CDI.KEYID = 6
3,854,792 UART: [idev] SUBJECT.KEYID = 7
3,856,039 UART: [idev] UDS.KEYID = 0
3,856,973 ready_for_fw is high
3,857,181 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,001,603 UART: [idev] Erasing UDS.KEYID = 0
6,334,089 UART: [idev] Sha1 KeyId Algorithm
6,356,274 UART: [idev] --
6,361,678 UART: [ldev] ++
6,362,356 UART: [ldev] CDI.KEYID = 6
6,363,264 UART: [ldev] SUBJECT.KEYID = 5
6,364,570 UART: [ldev] AUTHORITY.KEYID = 7
6,365,771 UART: [ldev] FE.KEYID = 1
6,376,637 UART: [ldev] Erasing FE.KEYID = 1
8,859,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,417 UART: [ldev] --
10,647,577 UART: [fwproc] Wait for Commands...
10,650,272 UART: [fwproc] Recv command 0x46574c44
10,652,530 UART: [fwproc] Recv'd Img size: 114940 bytes
14,113,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,396 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,851,933 >>> mbox cmd response: success
14,855,309 UART: [afmc] ++
14,856,033 UART: [afmc] CDI.KEYID = 6
14,857,141 UART: [afmc] SUBJECT.KEYID = 7
14,858,677 UART: [afmc] AUTHORITY.KEYID = 5
17,364,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,086,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,088,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,103,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,012 UART: [afmc] --
19,160,074 UART: [cold-reset] --
19,163,887 UART: [state] Locking Datavault
19,169,452 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,647 UART: [state] Locking ICCM
19,174,337 UART: [exit] Launching FMC @ 0x40000130
19,183,003 UART:
19,183,335 UART: Running Caliptra FMC ...
19,184,398 UART:
19,184,552 UART: [state] CFI Enabled
19,192,969 UART: [fht] FMC Alias Private Key: 7
20,950,118 UART: [art] Extend RT PCRs Done
20,951,338 UART: [art] Lock RT PCRs Done
20,952,964 UART: [art] Populate DV Done
20,958,648 UART: [fht] FMC Alias Private Key: 7
20,960,187 UART: [art] Derive CDI
20,961,001 UART: [art] Store in in slot 0x4
21,003,661 UART: [art] Derive Key Pair
21,004,706 UART: [art] Store priv key in slot 0x5
23,431,135 UART: [art] Derive Key Pair - Done
23,444,402 UART: [art] Signing Cert with AUTHO
23,445,711 UART: RITY.KEYID = 7
25,151,247 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,768 UART: [art] PUB.X = D872F374E994FECE306B3D8D93783E029C6A2E32F7010E81FEB6DE8C447831715BABC4F12459DD382FEF7475A638F0AE
25,160,019 UART: [art] PUB.Y = 9D3464C327C1F0569DE163D503FB4C922ABD483B5E18CA13B0F7BF708539EDB300A8C4D282899E30BCB67B3380410349
25,167,299 UART: [art] SIG.R = CCF9C9DA22DE511F6D60891B0A18FFC6799445EE9CED190CC83E85C797ABCDEA76C6A6F57D5F741D7FD4CC5D7E6C3133
25,174,708 UART: [art] SIG.S = 6B37A8BE311F8A12D67D4EB2C711C8F4594D71E472BF5DBD6DC86E92541199784A281B6637987AE3DCBD5D9EABD6651F
26,154,288 UART: Caliptra RT
26,154,992 UART: [state] CFI Enabled
26,271,833 UART: [rt] RT listening for mailbox commands...
26,273,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,303,195 UART: [rt]cmd =0x46504c54, len=4
26,304,581 >>> mbox cmd response data (8 bytes)
26,305,450 UART: [rt] FIPS self test
26,306,398 UART: [kat] ++
26,306,853 UART: [kat] sha1
26,311,363 UART: [kat] SHA2-256
26,313,294 UART: [kat] SHA2-384
26,316,208 UART: [kat] SHA2-512-ACC
26,318,465 UART: [kat] ECC-384
26,320,527 UART: Fatal Error: 0x90040004
26,355,732 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,500,118 >>> mbox cmd response: failed
26,500,782 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,645,049 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,091 UART:
190,387 UART: Running Caliptra ROM ...
191,495 UART:
13,893,466 UART: [state] CFI Enabled
13,907,829 UART: [state] LifecycleState = Unprovisioned
13,910,237 UART: [state] DebugLocked = No
13,912,598 UART: [state] WD Timer not started. Device not locked for debugging
13,917,045 UART: [kat] SHA2-256
14,106,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,117,674 UART: [kat] ++
14,118,400 UART: [kat] sha1
14,129,027 UART: [kat] SHA2-256
14,132,054 UART: [kat] SHA2-384
14,138,203 UART: [kat] SHA2-512-ACC
14,140,777 UART: [kat] ECC-384
16,584,065 UART: [kat] HMAC-384Kdf
16,596,182 UART: [kat] LMS
17,128,037 UART: [kat] --
17,132,105 UART: [cold-reset] ++
17,134,308 UART: [fht] FHT @ 0x50003400
17,146,311 UART: [idev] ++
17,146,981 UART: [idev] CDI.KEYID = 6
17,147,916 UART: [idev] SUBJECT.KEYID = 7
17,149,187 UART: [idev] UDS.KEYID = 0
17,150,708 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,294,973 UART: [idev] Erasing UDS.KEYID = 0
19,630,919 UART: [idev] Sha1 KeyId Algorithm
19,652,691 UART: [idev] --
19,657,463 UART: [ldev] ++
19,658,154 UART: [ldev] CDI.KEYID = 6
19,659,068 UART: [ldev] SUBJECT.KEYID = 5
19,660,229 UART: [ldev] AUTHORITY.KEYID = 7
19,661,458 UART: [ldev] FE.KEYID = 1
19,672,102 UART: [ldev] Erasing FE.KEYID = 1
22,153,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,872,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,888,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,903,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,918,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,938,193 UART: [ldev] --
23,942,884 UART: [fwproc] Wait for Commands...
23,944,873 UART: [fwproc] Recv command 0x46574c44
23,947,188 UART: [fwproc] Recv'd Img size: 114940 bytes
27,398,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,475,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,591,295 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,138,053 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,755,570 ready_for_fw is high
3,755,971 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,953,267 >>> mbox cmd response: success
19,195,482 UART:
19,195,874 UART: Running Caliptra FMC ...
19,196,991 UART:
19,197,153 UART: [state] CFI Enabled
19,204,789 UART: [fht] FMC Alias Private Key: 7
20,960,968 UART: [art] Extend RT PCRs Done
20,962,191 UART: [art] Lock RT PCRs Done
20,963,875 UART: [art] Populate DV Done
20,968,962 UART: [fht] FMC Alias Private Key: 7
20,970,610 UART: [art] Derive CDI
20,971,427 UART: [art] Store in in slot 0x4
21,014,526 UART: [art] Derive Key Pair
21,015,537 UART: [art] Store priv key in slot 0x5
23,442,974 UART: [art] Derive Key Pair - Done
23,456,037 UART: [art] Signing Cert with AUTHO
23,457,359 UART: RITY.KEYID = 7
25,163,379 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,941 UART: [art] PUB.X = ACF7CE1CF878C09AAC8F04E9D5F71287ADE1F55E87A6A35869AD376A3F84F9C791D3260EBA74DB9F7476A776024DCD0B
25,172,202 UART: [art] PUB.Y = B50178E141DBF52CA7DC2847AF9291A3CE135FEE1134661BF70D3E11540EB08BB19DD42F49F6F9381913722654499082
25,179,432 UART: [art] SIG.R = 09F682764BC1A922DE241FE3C00E58EA2E33D750FDCBA60FD564D8E0D3F885EE2F63965AB9723391DCC47EB828633F75
25,186,932 UART: [art] SIG.S = 42CB53056FF5DCC517057511C497DD0DE153C83B6BBAEBE7CF1C7F54234580C1FEC068896DBBA24C2F4AB15A161FC00A
26,166,113 UART: Caliptra RT
26,166,803 UART: [state] CFI Enabled
26,283,755 UART: [rt] RT listening for mailbox commands...
26,285,610 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,315,407 UART: [rt]cmd =0x46504c54, len=4
26,316,957 >>> mbox cmd response data (8 bytes)
26,318,244 UART: [rt] FIPS self test
26,319,096 UART: [kat] ++
26,319,535 UART: [kat] sha1
26,323,986 UART: [kat] SHA2-256
26,325,882 UART: [kat] SHA2-384
26,328,683 UART: [kat] SHA2-512-ACC
26,330,987 UART: [kat] ECC-384
26,332,775 UART: Fatal Error: 0x90040004
26,367,982 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,512,331 >>> mbox cmd response: failed
26,513,000 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,657,339 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
17,018,880 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,226,719 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,398 UART: [kat] LMS
1,475,594 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,764 UART: [idev] ++
1,479,932 UART: [idev] CDI.KEYID = 6
1,480,292 UART: [idev] SUBJECT.KEYID = 7
1,480,716 UART: [idev] UDS.KEYID = 0
1,481,061 ready_for_fw is high
1,481,061 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,884 UART: [idev] Erasing UDS.KEYID = 0
1,505,644 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,292 UART: [idev] --
1,515,189 UART: [ldev] ++
1,515,357 UART: [ldev] CDI.KEYID = 6
1,515,720 UART: [ldev] SUBJECT.KEYID = 5
1,516,146 UART: [ldev] AUTHORITY.KEYID = 7
1,516,609 UART: [ldev] FE.KEYID = 1
1,521,635 UART: [ldev] Erasing FE.KEYID = 1
1,547,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,744 UART: [ldev] --
1,587,057 UART: [fwproc] Waiting for Commands...
1,587,704 UART: [fwproc] Received command 0x46574c44
1,588,495 UART: [fwproc] Received Image of size 114940 bytes
2,893,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,810 >>> mbox cmd response: success
3,089,028 UART: [afmc] ++
3,089,196 UART: [afmc] CDI.KEYID = 6
3,089,558 UART: [afmc] SUBJECT.KEYID = 7
3,089,983 UART: [afmc] AUTHORITY.KEYID = 5
3,124,816 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,166 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,946 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,559 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,249 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,340 UART: [afmc] --
3,168,252 UART: [cold-reset] --
3,169,402 UART: [state] Locking Datavault
3,170,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,317 UART: [state] Locking ICCM
3,171,969 UART: [exit] Launching FMC @ 0x40000130
3,177,298 UART:
3,177,314 UART: Running Caliptra FMC ...
3,177,722 UART:
3,177,776 UART: [state] CFI Enabled
3,188,097 UART: [fht] FMC Alias Private Key: 7
3,295,364 UART: [art] Extend RT PCRs Done
3,295,792 UART: [art] Lock RT PCRs Done
3,297,348 UART: [art] Populate DV Done
3,305,729 UART: [fht] FMC Alias Private Key: 7
3,306,895 UART: [art] Derive CDI
3,307,175 UART: [art] Store in in slot 0x4
3,392,492 UART: [art] Derive Key Pair
3,392,852 UART: [art] Store priv key in slot 0x5
3,405,438 UART: [art] Derive Key Pair - Done
3,420,433 UART: [art] Signing Cert with AUTHO
3,420,913 UART: RITY.KEYID = 7
3,435,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,600 UART: [art] PUB.X = 18AC558D3DB451DBC608F45FC72E18DE8A40583466AD09E70FD89BFE1FB8778044CA2AA492801A741860EF6837E6616A
3,443,367 UART: [art] PUB.Y = 24E7BF4A14BD55F47324BE2901BEBF0C84F3FAFF1832B73A14D4190ED42E11525BE3323CC2673DD54467118E375E1A74
3,450,314 UART: [art] SIG.R = B7C8A7786DF9481929CF89925BE5CEABE85A3F01BADD6139A5449831782F8FB67273B38FE1939EB331EB516F1225A535
3,457,085 UART: [art] SIG.S = 053179FED49D5E16CD9FA4CE7D22AC85940D5197AB812316354DB63E1DB5D7D6CDBCC35B72D255A9D3072F4E2C8138DF
3,480,909 UART: Caliptra RT
3,481,162 UART: [state] CFI Enabled
3,589,699 UART: [rt] RT listening for mailbox commands...
3,590,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,247 UART: [rt]cmd =0x46504c54, len=4
3,621,463 >>> mbox cmd response data (8 bytes)
3,621,680 UART: [rt] FIPS self test
3,622,008 UART: [kat] ++
3,622,160 UART: [kat] sha1
3,626,546 UART: [kat] SHA2-256
3,628,568 UART: [kat] SHA2-384
3,631,505 UART: [kat] SHA2-512-ACC
3,633,432 UART: [kat] ECC-384
3,635,265 UART: Fatal Error: 0x90040004
3,636,804 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,636,809 >>> mbox cmd response: failed
3,636,809 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,636,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,209 UART: [kat] SHA2-256
892,147 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,090 UART: [kat] HMAC-384Kdf
906,932 UART: [kat] LMS
1,475,128 UART: [kat] --
1,475,799 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,478,892 UART: [idev] ++
1,479,060 UART: [idev] CDI.KEYID = 6
1,479,420 UART: [idev] SUBJECT.KEYID = 7
1,479,844 UART: [idev] UDS.KEYID = 0
1,480,189 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,580 UART: [idev] Erasing UDS.KEYID = 0
1,504,020 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,714 UART: [idev] --
1,513,781 UART: [ldev] ++
1,513,949 UART: [ldev] CDI.KEYID = 6
1,514,312 UART: [ldev] SUBJECT.KEYID = 5
1,514,738 UART: [ldev] AUTHORITY.KEYID = 7
1,515,201 UART: [ldev] FE.KEYID = 1
1,519,953 UART: [ldev] Erasing FE.KEYID = 1
1,545,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,194 UART: [ldev] --
1,584,457 UART: [fwproc] Waiting for Commands...
1,585,316 UART: [fwproc] Received command 0x46574c44
1,586,107 UART: [fwproc] Received Image of size 114940 bytes
2,890,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,649 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,083,664 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,321 ready_for_fw is high
1,362,321 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,770 >>> mbox cmd response: success
2,997,460 UART:
2,997,476 UART: Running Caliptra FMC ...
2,997,884 UART:
2,997,938 UART: [state] CFI Enabled
3,008,139 UART: [fht] FMC Alias Private Key: 7
3,117,010 UART: [art] Extend RT PCRs Done
3,117,438 UART: [art] Lock RT PCRs Done
3,119,250 UART: [art] Populate DV Done
3,127,215 UART: [fht] FMC Alias Private Key: 7
3,128,329 UART: [art] Derive CDI
3,128,609 UART: [art] Store in in slot 0x4
3,214,430 UART: [art] Derive Key Pair
3,214,790 UART: [art] Store priv key in slot 0x5
3,228,104 UART: [art] Derive Key Pair - Done
3,243,124 UART: [art] Signing Cert with AUTHO
3,243,604 UART: RITY.KEYID = 7
3,258,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,427 UART: [art] PUB.X = FFA8F82F37689F9B2B2B7A857D08F2F61B1446FEEC101A8129DE7DA0F6A9ABCF659D8B03819FD965F4606B27F0D76F30
3,266,205 UART: [art] PUB.Y = AE31C111BF1E9D9B5181D64B43752C20079279799EBACFCAA0E21F0B6A948C36E05FF3DEEBB2907B1D8E97EBCF8DA61B
3,273,171 UART: [art] SIG.R = 4C075E1C40E887208E5C9AD348A904EFACB85BE7870598B71C2DC2FBFA268AC59A80D1FF5019C5FEF9233839360766C4
3,279,937 UART: [art] SIG.S = B391CA0DE304DB1150CDF79E36960269F1F283BDB0F18F091104B7532EEE6EBB2F155B918555F408BE0369430C57D1E5
3,303,988 UART: Caliptra RT
3,304,241 UART: [state] CFI Enabled
3,412,910 UART: [rt] RT listening for mailbox commands...
3,413,573 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,386 UART: [rt]cmd =0x46504c54, len=4
3,444,628 >>> mbox cmd response data (8 bytes)
3,444,941 UART: [rt] FIPS self test
3,445,269 UART: [kat] ++
3,445,421 UART: [kat] sha1
3,449,713 UART: [kat] SHA2-256
3,451,735 UART: [kat] SHA2-384
3,454,518 UART: [kat] SHA2-512-ACC
3,456,445 UART: [kat] ECC-384
3,457,990 UART: Fatal Error: 0x90040004
3,459,529 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,459,534 >>> mbox cmd response: failed
3,459,534 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,459,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,589 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,760 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,685 UART: [kat] SHA2-512-ACC
897,586 UART: [kat] ECC-384
903,203 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,608 UART: [cold-reset] ++
1,477,052 UART: [fht] Storing FHT @ 0x50003400
1,479,799 UART: [idev] ++
1,479,967 UART: [idev] CDI.KEYID = 6
1,480,327 UART: [idev] SUBJECT.KEYID = 7
1,480,751 UART: [idev] UDS.KEYID = 0
1,481,096 ready_for_fw is high
1,481,096 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,731 UART: [idev] --
1,514,768 UART: [ldev] ++
1,514,936 UART: [ldev] CDI.KEYID = 6
1,515,299 UART: [ldev] SUBJECT.KEYID = 5
1,515,725 UART: [ldev] AUTHORITY.KEYID = 7
1,516,188 UART: [ldev] FE.KEYID = 1
1,521,712 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,159 UART: [ldev] --
1,586,542 UART: [fwproc] Waiting for Commands...
1,587,405 UART: [fwproc] Received command 0x46574c44
1,588,196 UART: [fwproc] Received Image of size 114940 bytes
2,892,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,783 >>> mbox cmd response: success
3,086,967 UART: [afmc] ++
3,087,135 UART: [afmc] CDI.KEYID = 6
3,087,497 UART: [afmc] SUBJECT.KEYID = 7
3,087,922 UART: [afmc] AUTHORITY.KEYID = 5
3,123,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,523 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,031 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,916 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,606 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,653 UART: [afmc] --
3,166,599 UART: [cold-reset] --
3,167,507 UART: [state] Locking Datavault
3,168,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,272 UART: [state] Locking ICCM
3,169,746 UART: [exit] Launching FMC @ 0x40000130
3,175,075 UART:
3,175,091 UART: Running Caliptra FMC ...
3,175,499 UART:
3,175,642 UART: [state] CFI Enabled
3,186,383 UART: [fht] FMC Alias Private Key: 7
3,294,248 UART: [art] Extend RT PCRs Done
3,294,676 UART: [art] Lock RT PCRs Done
3,296,246 UART: [art] Populate DV Done
3,304,179 UART: [fht] FMC Alias Private Key: 7
3,305,123 UART: [art] Derive CDI
3,305,403 UART: [art] Store in in slot 0x4
3,390,860 UART: [art] Derive Key Pair
3,391,220 UART: [art] Store priv key in slot 0x5
3,403,858 UART: [art] Derive Key Pair - Done
3,418,598 UART: [art] Signing Cert with AUTHO
3,419,078 UART: RITY.KEYID = 7
3,434,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,127 UART: [art] PUB.X = 995C3612FD41C3DE96B2245CB6479E941B3CCE368A4E39413654134C06AC433385886D67538C5ADE4FF2877B4555B394
3,441,888 UART: [art] PUB.Y = AA6FB81F9EB4488C417C284BC669AFF3550F9C8CC841EDBB8D28510B8632E6D9765B9070964B4C409CDDD64382E6EA59
3,448,842 UART: [art] SIG.R = D0188BA125CB54C4DD770488B7248F8594241BF8292C22E2568F72B4D7272D76471F44DB4B7A987E5F756C4A6D46AEA1
3,455,609 UART: [art] SIG.S = F3B9D0100C21DC2A6E5CA164D467A9DA507BFBD0248477EEDFFFAB1C61E6838FC20DE9742EE477B48477A0DA25B8943A
3,479,680 UART: Caliptra RT
3,480,025 UART: [state] CFI Enabled
3,588,791 UART: [rt] RT listening for mailbox commands...
3,589,454 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,497 UART: [rt]cmd =0x46504c54, len=4
3,620,431 >>> mbox cmd response data (8 bytes)
3,620,752 UART: [rt] FIPS self test
3,621,080 UART: [kat] ++
3,621,232 UART: [kat] sha1
3,625,480 UART: [kat] SHA2-256
3,627,502 UART: [kat] SHA2-384
3,630,357 UART: [kat] SHA2-512-ACC
3,632,284 UART: [kat] ECC-384
3,633,613 UART: Fatal Error: 0x90040004
3,635,152 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,157 >>> mbox cmd response: failed
3,635,157 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,554 UART: [kat] SHA2-256
892,492 UART: [kat] SHA2-384
895,103 UART: [kat] SHA2-512-ACC
897,004 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,831 UART: [idev] ++
1,479,999 UART: [idev] CDI.KEYID = 6
1,480,359 UART: [idev] SUBJECT.KEYID = 7
1,480,783 UART: [idev] UDS.KEYID = 0
1,481,128 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,505,673 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,548 UART: [ldev] ++
1,515,716 UART: [ldev] CDI.KEYID = 6
1,516,079 UART: [ldev] SUBJECT.KEYID = 5
1,516,505 UART: [ldev] AUTHORITY.KEYID = 7
1,516,968 UART: [ldev] FE.KEYID = 1
1,522,200 UART: [ldev] Erasing FE.KEYID = 1
1,547,425 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,357 UART: [ldev] --
1,586,828 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 114940 bytes
2,893,026 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,871 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,184 ready_for_fw is high
1,362,184 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,107 >>> mbox cmd response: success
2,999,023 UART:
2,999,039 UART: Running Caliptra FMC ...
2,999,447 UART:
2,999,590 UART: [state] CFI Enabled
3,009,911 UART: [fht] FMC Alias Private Key: 7
3,117,648 UART: [art] Extend RT PCRs Done
3,118,076 UART: [art] Lock RT PCRs Done
3,119,726 UART: [art] Populate DV Done
3,127,879 UART: [fht] FMC Alias Private Key: 7
3,129,039 UART: [art] Derive CDI
3,129,319 UART: [art] Store in in slot 0x4
3,215,188 UART: [art] Derive Key Pair
3,215,548 UART: [art] Store priv key in slot 0x5
3,228,348 UART: [art] Derive Key Pair - Done
3,243,061 UART: [art] Signing Cert with AUTHO
3,243,541 UART: RITY.KEYID = 7
3,258,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,488 UART: [art] PUB.X = 5AF9111FE97DC49D11F15295A26D1E0C5CE6092BAB8930AD9FEDFD6A6B2FE4EF6278C5CB9E397BFB10B191F26D2DBF8F
3,266,278 UART: [art] PUB.Y = DCF2404D5A7AA5F8C0146480A3C7CB0302599443BDC4851CFA858132182B471CEDE7E09EB76D21F31C3BFD07CC30320F
3,273,226 UART: [art] SIG.R = ACD429B9CD5F2F0AA7141FC2EAF651E1F2FF32A157BB5D10B562C70E7EC62092934789427D937ACB1605C50E6EB36D6B
3,279,998 UART: [art] SIG.S = 34D0D0595AB690B06FE39EA1B7C8347A15B7E0B7567AD64ABA44BB686ABF5871E62394023C4D94B4C603849CB91C9FF9
3,304,009 UART: Caliptra RT
3,304,354 UART: [state] CFI Enabled
3,412,555 UART: [rt] RT listening for mailbox commands...
3,413,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,069 UART: [rt]cmd =0x46504c54, len=4
3,444,345 >>> mbox cmd response data (8 bytes)
3,444,494 UART: [rt] FIPS self test
3,444,822 UART: [kat] ++
3,444,974 UART: [kat] sha1
3,449,340 UART: [kat] SHA2-256
3,451,362 UART: [kat] SHA2-384
3,454,305 UART: [kat] SHA2-512-ACC
3,456,232 UART: [kat] ECC-384
3,457,987 UART: Fatal Error: 0x90040004
3,459,526 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,459,531 >>> mbox cmd response: failed
3,459,531 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,459,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,924 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,643 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,741 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
893,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,625 UART: [kat] ++
897,777 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,776 UART: [kat] LMS
1,171,104 UART: [kat] --
1,172,097 UART: [cold-reset] ++
1,172,449 UART: [fht] FHT @ 0x50003400
1,175,006 UART: [idev] ++
1,175,174 UART: [idev] CDI.KEYID = 6
1,175,534 UART: [idev] SUBJECT.KEYID = 7
1,175,958 UART: [idev] UDS.KEYID = 0
1,176,303 ready_for_fw is high
1,176,303 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,084 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,621 UART: [idev] --
1,210,803 UART: [ldev] ++
1,210,971 UART: [ldev] CDI.KEYID = 6
1,211,334 UART: [ldev] SUBJECT.KEYID = 5
1,211,760 UART: [ldev] AUTHORITY.KEYID = 7
1,212,223 UART: [ldev] FE.KEYID = 1
1,217,469 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,333 UART: [ldev] --
1,283,758 UART: [fwproc] Wait for Commands...
1,284,546 UART: [fwproc] Recv command 0x46574c44
1,285,274 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,321 >>> mbox cmd response: success
2,784,507 UART: [afmc] ++
2,784,675 UART: [afmc] CDI.KEYID = 6
2,785,037 UART: [afmc] SUBJECT.KEYID = 7
2,785,462 UART: [afmc] AUTHORITY.KEYID = 5
2,821,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,406 UART: [afmc] --
2,864,518 UART: [cold-reset] --
2,865,516 UART: [state] Locking Datavault
2,866,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,497 UART: [state] Locking ICCM
2,868,031 UART: [exit] Launching FMC @ 0x40000130
2,873,360 UART:
2,873,376 UART: Running Caliptra FMC ...
2,873,784 UART:
2,873,838 UART: [state] CFI Enabled
2,883,973 UART: [fht] FMC Alias Private Key: 7
2,991,960 UART: [art] Extend RT PCRs Done
2,992,388 UART: [art] Lock RT PCRs Done
2,994,016 UART: [art] Populate DV Done
3,002,395 UART: [fht] FMC Alias Private Key: 7
3,003,515 UART: [art] Derive CDI
3,003,795 UART: [art] Store in in slot 0x4
3,089,696 UART: [art] Derive Key Pair
3,090,056 UART: [art] Store priv key in slot 0x5
3,103,148 UART: [art] Derive Key Pair - Done
3,117,928 UART: [art] Signing Cert with AUTHO
3,118,408 UART: RITY.KEYID = 7
3,133,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,647 UART: [art] PUB.X = BF446DAD6644C66E7772543F1803DDE6EA4EBD5C479E1BDC06D833D7281D84D9E3DE80C540101B1E0DDAC6476096DEB7
3,141,422 UART: [art] PUB.Y = 529F69DEB4B817D81B761E965E781B49C97C5491989D7C091894E69DE89C28C856EE0158BC3004A22BA24EFF84796BEC
3,148,365 UART: [art] SIG.R = 9AF6CDB5DE14E72927D2CBE53A037D2716F205F604BDD5CBA42329DBA9F4D3A7C4577A0007B427F9E9A3EE09A2AD9762
3,155,114 UART: [art] SIG.S = EE12A25469B484BEFDD6245570C57138DA70C7AADD04200D65C7F1841E6C517AF6411674EB016DB651745DA605D11078
3,178,361 UART: Caliptra RT
3,178,614 UART: [state] CFI Enabled
3,286,258 UART: [rt] RT listening for mailbox commands...
3,286,921 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,528 UART: [rt]cmd =0x46504c54, len=4
3,317,592 >>> mbox cmd response data (8 bytes)
3,317,927 UART: [rt] FIPS self test
3,318,255 UART: [kat] ++
3,318,407 UART: [kat] sha1
3,322,711 UART: [kat] SHA2-256
3,324,733 UART: [kat] SHA2-384
3,327,612 UART: [kat] SHA2-512-ACC
3,329,539 UART: [kat] ECC-384
3,331,350 UART: Fatal Error: 0x90040004
3,332,889 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,332,894 >>> mbox cmd response: failed
3,332,894 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,332,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
902,079 UART: [kat] SHA2-256
904,019 UART: [kat] SHA2-384
906,796 UART: [kat] SHA2-512-ACC
908,697 UART: [kat] ECC-384
918,848 UART: [kat] HMAC-384Kdf
923,630 UART: [kat] LMS
1,171,958 UART: [kat] --
1,172,915 UART: [cold-reset] ++
1,173,439 UART: [fht] FHT @ 0x50003400
1,176,030 UART: [idev] ++
1,176,198 UART: [idev] CDI.KEYID = 6
1,176,558 UART: [idev] SUBJECT.KEYID = 7
1,176,982 UART: [idev] UDS.KEYID = 0
1,177,327 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,854 UART: [idev] Erasing UDS.KEYID = 0
1,201,703 UART: [idev] Sha1 KeyId Algorithm
1,210,211 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,835 UART: [ldev] Erasing FE.KEYID = 1
1,243,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,745 UART: [ldev] --
1,283,148 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,070 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,735 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 ready_for_fw is high
1,060,065 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,214 >>> mbox cmd response: success
2,696,420 UART:
2,696,436 UART: Running Caliptra FMC ...
2,696,844 UART:
2,696,898 UART: [state] CFI Enabled
2,707,135 UART: [fht] FMC Alias Private Key: 7
2,815,212 UART: [art] Extend RT PCRs Done
2,815,640 UART: [art] Lock RT PCRs Done
2,816,944 UART: [art] Populate DV Done
2,825,035 UART: [fht] FMC Alias Private Key: 7
2,826,167 UART: [art] Derive CDI
2,826,447 UART: [art] Store in in slot 0x4
2,911,722 UART: [art] Derive Key Pair
2,912,082 UART: [art] Store priv key in slot 0x5
2,924,696 UART: [art] Derive Key Pair - Done
2,939,823 UART: [art] Signing Cert with AUTHO
2,940,303 UART: RITY.KEYID = 7
2,955,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,268 UART: [art] PUB.X = 80B2633A38FD2C68A99EB7ABCE8AE941706ED121AAECD521C9AA80E2A2CC9BF60B58257CF901C172EDD69FDDF8CB3FB7
2,963,060 UART: [art] PUB.Y = DF5B7D17845267CF9CA07CD50525512A0A70D1A6162E16A602391D78FE9F2A9E95B8C84B132D62A3CCE6CA2FF11FFFDA
2,970,017 UART: [art] SIG.R = AB272255FE5BADA8E5568E3677AE99EB5C33101F0D406A94D919D9BBED3322D83659BE876822C191B0BC9F892012FE37
2,976,790 UART: [art] SIG.S = C95115C61ED55A818A2C22D5E370EDD28B93AF715E2458C370FEFBFF71AB964EBC9B3706815B20529ADEC4F00C384AC3
3,000,611 UART: Caliptra RT
3,000,864 UART: [state] CFI Enabled
3,108,684 UART: [rt] RT listening for mailbox commands...
3,109,347 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,244 UART: [rt]cmd =0x46504c54, len=4
3,140,204 >>> mbox cmd response data (8 bytes)
3,140,533 UART: [rt] FIPS self test
3,140,861 UART: [kat] ++
3,141,013 UART: [kat] sha1
3,145,427 UART: [kat] SHA2-256
3,147,449 UART: [kat] SHA2-384
3,150,416 UART: [kat] SHA2-512-ACC
3,152,343 UART: [kat] ECC-384
3,154,040 UART: Fatal Error: 0x90040004
3,155,579 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,584 >>> mbox cmd response: failed
3,155,584 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,599 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,483 UART: [kat] HMAC-384Kdf
923,193 UART: [kat] LMS
1,171,521 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,621 UART: [idev] ++
1,175,789 UART: [idev] CDI.KEYID = 6
1,176,149 UART: [idev] SUBJECT.KEYID = 7
1,176,573 UART: [idev] UDS.KEYID = 0
1,176,918 ready_for_fw is high
1,176,918 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,202,180 UART: [idev] Sha1 KeyId Algorithm
1,210,538 UART: [idev] --
1,211,710 UART: [ldev] ++
1,211,878 UART: [ldev] CDI.KEYID = 6
1,212,241 UART: [ldev] SUBJECT.KEYID = 5
1,212,667 UART: [ldev] AUTHORITY.KEYID = 7
1,213,130 UART: [ldev] FE.KEYID = 1
1,218,584 UART: [ldev] Erasing FE.KEYID = 1
1,245,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,706 UART: [ldev] --
1,285,129 UART: [fwproc] Wait for Commands...
1,285,719 UART: [fwproc] Recv command 0x46574c44
1,286,447 UART: [fwproc] Recv'd Img size: 114940 bytes
2,591,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,711 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,784,312 >>> mbox cmd response: success
2,785,396 UART: [afmc] ++
2,785,564 UART: [afmc] CDI.KEYID = 6
2,785,926 UART: [afmc] SUBJECT.KEYID = 7
2,786,351 UART: [afmc] AUTHORITY.KEYID = 5
2,822,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,465 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,819 UART: [afmc] --
2,864,909 UART: [cold-reset] --
2,865,769 UART: [state] Locking Datavault
2,867,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,646 UART: [state] Locking ICCM
2,868,250 UART: [exit] Launching FMC @ 0x40000130
2,873,579 UART:
2,873,595 UART: Running Caliptra FMC ...
2,874,003 UART:
2,874,146 UART: [state] CFI Enabled
2,884,551 UART: [fht] FMC Alias Private Key: 7
2,992,976 UART: [art] Extend RT PCRs Done
2,993,404 UART: [art] Lock RT PCRs Done
2,994,886 UART: [art] Populate DV Done
3,003,133 UART: [fht] FMC Alias Private Key: 7
3,004,249 UART: [art] Derive CDI
3,004,529 UART: [art] Store in in slot 0x4
3,090,510 UART: [art] Derive Key Pair
3,090,870 UART: [art] Store priv key in slot 0x5
3,104,470 UART: [art] Derive Key Pair - Done
3,119,318 UART: [art] Signing Cert with AUTHO
3,119,798 UART: RITY.KEYID = 7
3,134,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,601 UART: [art] PUB.X = CEBF594873CDC425C550EDF15B4B8313C9C5CED370498E00C379C4F1DEAC085930372EBE197B2BE81DFC90D1B49E77F3
3,142,362 UART: [art] PUB.Y = 2FBA68BBA57E7ECC5A95DB9968436FFDA365A3CA33F212835E09301B4DF9D88867AC665F2E862EE731235806EC57C696
3,149,314 UART: [art] SIG.R = 87076E0DAC76F24BB60504A74444C2FA1E18AC1FDB54AE22FC75CBEDCFF370409510D9E7DBF219B88B4E1E0A4C284B92
3,156,087 UART: [art] SIG.S = D09AEBCA9E081323EC2832043DCA9D63ED0ECE221C122EF6E53A9AA7B79FF65304103392BF023642A1396ACA0ECFCA4B
3,180,352 UART: Caliptra RT
3,180,697 UART: [state] CFI Enabled
3,289,785 UART: [rt] RT listening for mailbox commands...
3,290,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,577 UART: [rt]cmd =0x46504c54, len=4
3,321,847 >>> mbox cmd response data (8 bytes)
3,322,046 UART: [rt] FIPS self test
3,322,374 UART: [kat] ++
3,322,526 UART: [kat] sha1
3,326,666 UART: [kat] SHA2-256
3,328,688 UART: [kat] SHA2-384
3,331,615 UART: [kat] SHA2-512-ACC
3,333,542 UART: [kat] ECC-384
3,335,121 UART: Fatal Error: 0x90040004
3,336,660 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,336,665 >>> mbox cmd response: failed
3,336,665 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,336,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
893,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,412 UART: [kat] ++
897,564 UART: [kat] sha1
901,938 UART: [kat] SHA2-256
903,878 UART: [kat] SHA2-384
906,761 UART: [kat] SHA2-512-ACC
908,662 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
922,729 UART: [kat] LMS
1,171,057 UART: [kat] --
1,171,832 UART: [cold-reset] ++
1,172,238 UART: [fht] FHT @ 0x50003400
1,174,837 UART: [idev] ++
1,175,005 UART: [idev] CDI.KEYID = 6
1,175,365 UART: [idev] SUBJECT.KEYID = 7
1,175,789 UART: [idev] UDS.KEYID = 0
1,176,134 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,267 UART: [idev] Erasing UDS.KEYID = 0
1,200,796 UART: [idev] Sha1 KeyId Algorithm
1,209,040 UART: [idev] --
1,210,184 UART: [ldev] ++
1,210,352 UART: [ldev] CDI.KEYID = 6
1,210,715 UART: [ldev] SUBJECT.KEYID = 5
1,211,141 UART: [ldev] AUTHORITY.KEYID = 7
1,211,604 UART: [ldev] FE.KEYID = 1
1,216,814 UART: [ldev] Erasing FE.KEYID = 1
1,243,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,308 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,359 UART: [fwproc] Recv command 0x46574c44
1,284,087 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,715 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,480 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,158 ready_for_fw is high
1,060,158 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,641 >>> mbox cmd response: success
2,697,525 UART:
2,697,541 UART: Running Caliptra FMC ...
2,697,949 UART:
2,698,092 UART: [state] CFI Enabled
2,708,551 UART: [fht] FMC Alias Private Key: 7
2,816,798 UART: [art] Extend RT PCRs Done
2,817,226 UART: [art] Lock RT PCRs Done
2,818,876 UART: [art] Populate DV Done
2,827,055 UART: [fht] FMC Alias Private Key: 7
2,828,127 UART: [art] Derive CDI
2,828,407 UART: [art] Store in in slot 0x4
2,914,008 UART: [art] Derive Key Pair
2,914,368 UART: [art] Store priv key in slot 0x5
2,927,876 UART: [art] Derive Key Pair - Done
2,942,526 UART: [art] Signing Cert with AUTHO
2,943,006 UART: RITY.KEYID = 7
2,958,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,085 UART: [art] PUB.X = 3F2950F195099767C02A214409AC13C772610C9A0C74D60690182C07BFB60C46DC771807669835F6C59CBBB1ABDA6582
2,965,825 UART: [art] PUB.Y = B00E79BC2D0D847CFB72A58C17E694FE3CD03493ECF92EAD831B506E6F093A9088F3A49A4ABFCE357A579D1698014EC4
2,972,777 UART: [art] SIG.R = 80A7DCF87C3663C0DF75083673D9EBD18623F233187679C00121AFDE3E134D48D26EEA5D2C3A9126542F4CC51E53283A
2,979,543 UART: [art] SIG.S = AA6B06696C578A838D7E6991A7CB4A3BC477A303FF1362D46EDD454956780E55AAB7476C0595062BBBC5DE96D01CB019
3,003,509 UART: Caliptra RT
3,003,854 UART: [state] CFI Enabled
3,111,402 UART: [rt] RT listening for mailbox commands...
3,112,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,960 UART: [rt]cmd =0x46504c54, len=4
3,143,200 >>> mbox cmd response data (8 bytes)
3,143,565 UART: [rt] FIPS self test
3,143,893 UART: [kat] ++
3,144,045 UART: [kat] sha1
3,148,083 UART: [kat] SHA2-256
3,150,105 UART: [kat] SHA2-384
3,153,004 UART: [kat] SHA2-512-ACC
3,154,931 UART: [kat] ECC-384
3,156,200 UART: Fatal Error: 0x90040004
3,157,739 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,157,744 >>> mbox cmd response: failed
3,157,744 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,157,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,359 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,288 UART: [kat] SHA2-256
891,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,967 UART: [kat] ++
896,119 UART: [kat] sha1
900,441 UART: [kat] SHA2-256
902,381 UART: [kat] SHA2-384
905,024 UART: [kat] SHA2-512-ACC
906,925 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,172 UART: [kat] LMS
1,169,484 UART: [kat] --
1,170,319 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,653 UART: [idev] ++
1,173,821 UART: [idev] CDI.KEYID = 6
1,174,182 UART: [idev] SUBJECT.KEYID = 7
1,174,607 UART: [idev] UDS.KEYID = 0
1,174,953 ready_for_fw is high
1,174,953 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,009 UART: [idev] Erasing UDS.KEYID = 0
1,200,225 UART: [idev] Sha1 KeyId Algorithm
1,208,921 UART: [idev] --
1,209,814 UART: [ldev] ++
1,209,982 UART: [ldev] CDI.KEYID = 6
1,210,346 UART: [ldev] SUBJECT.KEYID = 5
1,210,773 UART: [ldev] AUTHORITY.KEYID = 7
1,211,236 UART: [ldev] FE.KEYID = 1
1,216,246 UART: [ldev] Erasing FE.KEYID = 1
1,242,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,208 UART: [ldev] --
1,281,700 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,176 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,485 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,113 >>> mbox cmd response: success
2,782,194 UART: [afmc] ++
2,782,362 UART: [afmc] CDI.KEYID = 6
2,782,725 UART: [afmc] SUBJECT.KEYID = 7
2,783,151 UART: [afmc] AUTHORITY.KEYID = 5
2,818,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,481 UART: [afmc] --
2,862,525 UART: [cold-reset] --
2,863,155 UART: [state] Locking Datavault
2,864,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,944 UART: [state] Locking ICCM
2,865,388 UART: [exit] Launching FMC @ 0x40000130
2,870,717 UART:
2,870,733 UART: Running Caliptra FMC ...
2,871,141 UART:
2,871,195 UART: [state] CFI Enabled
2,881,622 UART: [fht] FMC Alias Private Key: 7
2,989,267 UART: [art] Extend RT PCRs Done
2,989,695 UART: [art] Lock RT PCRs Done
2,991,227 UART: [art] Populate DV Done
2,999,194 UART: [fht] FMC Alias Private Key: 7
3,000,264 UART: [art] Derive CDI
3,000,544 UART: [art] Store in in slot 0x4
3,085,893 UART: [art] Derive Key Pair
3,086,253 UART: [art] Store priv key in slot 0x5
3,099,761 UART: [art] Derive Key Pair - Done
3,114,647 UART: [art] Signing Cert with AUTHO
3,115,127 UART: RITY.KEYID = 7
3,130,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,920 UART: [art] PUB.X = 4A8D026F463C91038BDC42B005BF95781874B693179F720540A45885B8AE9B29096CB0C21D217EFDDDE8BDD8B3EF40BF
3,137,683 UART: [art] PUB.Y = FF79908E553A813D4A2331794FC52CFAC5B68F00B12D752E5089485388A1A71BC99ED0D473B709590E0AE5C9CF086ED1
3,144,603 UART: [art] SIG.R = 3B33C4400CA6C77CF99038F0CCC6DC5FCDB92EBB7DD543B1CB0873EBAB3A4EC6EA4DE14EBE8834F53F7F6EF6518C942E
3,151,397 UART: [art] SIG.S = DE73319688D9E9E764E4E8C032E9B454A0BA540AE2E60A1AF530BD2C161A6A3EDD15C21712A713D92670753B502BC412
3,175,176 UART: Caliptra RT
3,175,429 UART: [state] CFI Enabled
3,283,324 UART: [rt] RT listening for mailbox commands...
3,283,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,628 UART: [rt]cmd =0x46504c54, len=4
3,314,724 >>> mbox cmd response data (8 bytes)
3,315,025 UART: [rt] FIPS self test
3,315,353 UART: [kat] ++
3,315,505 UART: [kat] sha1
3,319,883 UART: [kat] SHA2-256
3,321,905 UART: [kat] SHA2-384
3,324,944 UART: [kat] SHA2-512-ACC
3,326,871 UART: [kat] ECC-384
3,328,398 UART: Fatal Error: 0x90040004
3,329,937 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,942 >>> mbox cmd response: failed
3,329,942 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,285 UART: [kat] SHA2-256
901,225 UART: [kat] SHA2-384
903,836 UART: [kat] SHA2-512-ACC
905,737 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,889 UART: [idev] ++
1,173,057 UART: [idev] CDI.KEYID = 6
1,173,418 UART: [idev] SUBJECT.KEYID = 7
1,173,843 UART: [idev] UDS.KEYID = 0
1,174,189 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,545 UART: [idev] Sha1 KeyId Algorithm
1,208,383 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,216,098 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,979 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,779 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,456 ready_for_fw is high
1,056,456 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,783 >>> mbox cmd response: success
2,693,569 UART:
2,693,585 UART: Running Caliptra FMC ...
2,693,993 UART:
2,694,047 UART: [state] CFI Enabled
2,704,310 UART: [fht] FMC Alias Private Key: 7
2,811,591 UART: [art] Extend RT PCRs Done
2,812,019 UART: [art] Lock RT PCRs Done
2,813,565 UART: [art] Populate DV Done
2,821,714 UART: [fht] FMC Alias Private Key: 7
2,822,826 UART: [art] Derive CDI
2,823,106 UART: [art] Store in in slot 0x4
2,908,677 UART: [art] Derive Key Pair
2,909,037 UART: [art] Store priv key in slot 0x5
2,921,831 UART: [art] Derive Key Pair - Done
2,936,172 UART: [art] Signing Cert with AUTHO
2,936,652 UART: RITY.KEYID = 7
2,951,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,103 UART: [art] PUB.X = 7C2AE9916DE859E20FBDF21CF7181954ECB17235EEA37DC442D1277A8D64F4557CA233D36CEF4E60A64A7517DADD8289
2,958,882 UART: [art] PUB.Y = 600B22D77D99155D048031AC0FD0B362921BC63FABC1A055FDC5E988B4BDAA11181184E2D464C915B4B7FCC99439CF34
2,965,831 UART: [art] SIG.R = D655875EF17081CC51A06BD8E28D47EA1BCF174548062A56132653A37A753DA02EC223772361062584D67FF27067207F
2,972,585 UART: [art] SIG.S = F3E8FCDCB15613B414CF23E65F2278BFA32F9967E3223C8E69C5DA9B43ADEC3E945EC72B3D5053A4F8BEB45A777A2448
2,996,270 UART: Caliptra RT
2,996,523 UART: [state] CFI Enabled
3,104,009 UART: [rt] RT listening for mailbox commands...
3,104,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,611 UART: [rt]cmd =0x46504c54, len=4
3,135,895 >>> mbox cmd response data (8 bytes)
3,136,188 UART: [rt] FIPS self test
3,136,516 UART: [kat] ++
3,136,668 UART: [kat] sha1
3,140,946 UART: [kat] SHA2-256
3,142,968 UART: [kat] SHA2-384
3,145,905 UART: [kat] SHA2-512-ACC
3,147,832 UART: [kat] ECC-384
3,149,419 UART: Fatal Error: 0x90040004
3,150,958 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,963 >>> mbox cmd response: failed
3,150,963 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,228 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,159 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,487 UART: [kat] SHA2-256
891,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,166 UART: [kat] ++
895,318 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,087 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 ready_for_fw is high
1,174,550 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,209,025 UART: [ldev] ++
1,209,193 UART: [ldev] CDI.KEYID = 6
1,209,557 UART: [ldev] SUBJECT.KEYID = 5
1,209,984 UART: [ldev] AUTHORITY.KEYID = 7
1,210,447 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,241,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,555 UART: [ldev] --
1,280,943 UART: [fwproc] Wait for Commands...
1,281,592 UART: [fwproc] Recv command 0x46574c44
1,282,325 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,118 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,890 >>> mbox cmd response: success
2,781,019 UART: [afmc] ++
2,781,187 UART: [afmc] CDI.KEYID = 6
2,781,550 UART: [afmc] SUBJECT.KEYID = 7
2,781,976 UART: [afmc] AUTHORITY.KEYID = 5
2,818,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,346 UART: [afmc] --
2,861,322 UART: [cold-reset] --
2,862,286 UART: [state] Locking Datavault
2,863,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,863 UART: [state] Locking ICCM
2,864,339 UART: [exit] Launching FMC @ 0x40000130
2,869,668 UART:
2,869,684 UART: Running Caliptra FMC ...
2,870,092 UART:
2,870,235 UART: [state] CFI Enabled
2,880,690 UART: [fht] FMC Alias Private Key: 7
2,988,347 UART: [art] Extend RT PCRs Done
2,988,775 UART: [art] Lock RT PCRs Done
2,990,251 UART: [art] Populate DV Done
2,998,544 UART: [fht] FMC Alias Private Key: 7
2,999,482 UART: [art] Derive CDI
2,999,762 UART: [art] Store in in slot 0x4
3,085,619 UART: [art] Derive Key Pair
3,085,979 UART: [art] Store priv key in slot 0x5
3,098,987 UART: [art] Derive Key Pair - Done
3,113,317 UART: [art] Signing Cert with AUTHO
3,113,797 UART: RITY.KEYID = 7
3,129,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,914 UART: [art] PUB.X = 132A5836AE7C8D44A1D5D4A621E36BEC612D04C487F8E4AB93ABC7BF74039427F3AA3C74FD7F22CE0B20064EC69BE2B8
3,136,688 UART: [art] PUB.Y = 34EE82C9DCDECDCDEF6746A1F9D0B03E8FB8AEA4D247AF7258AC81C1752A779E5AFA6675DCC8FF76D786F0D3E4D2C0E1
3,143,668 UART: [art] SIG.R = 463FCD0C4A59AC33BE4AB2C4E1783E095A55B984DF33163DE7B52906A6FF6EF1332CFFAB5DA4971AA229A47AA51BE5C7
3,150,449 UART: [art] SIG.S = DF921C79DB4365265B32E1DE86625CE8A4BCF6A1BE559C3EAF5AEC713E075E5884B7FD64B09216510356A6714F7F60E7
3,174,004 UART: Caliptra RT
3,174,349 UART: [state] CFI Enabled
3,282,754 UART: [rt] RT listening for mailbox commands...
3,283,417 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,278 UART: [rt]cmd =0x46504c54, len=4
3,314,454 >>> mbox cmd response data (8 bytes)
3,314,721 UART: [rt] FIPS self test
3,315,049 UART: [kat] ++
3,315,201 UART: [kat] sha1
3,319,665 UART: [kat] SHA2-256
3,321,687 UART: [kat] SHA2-384
3,324,504 UART: [kat] SHA2-512-ACC
3,326,431 UART: [kat] ECC-384
3,328,016 UART: Fatal Error: 0x90040004
3,329,555 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,560 >>> mbox cmd response: failed
3,329,560 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,350 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,199,126 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,501 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,634 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,414 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,913 ready_for_fw is high
1,055,913 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,908 >>> mbox cmd response: success
2,692,364 UART:
2,692,380 UART: Running Caliptra FMC ...
2,692,788 UART:
2,692,931 UART: [state] CFI Enabled
2,703,538 UART: [fht] FMC Alias Private Key: 7
2,811,545 UART: [art] Extend RT PCRs Done
2,811,973 UART: [art] Lock RT PCRs Done
2,813,801 UART: [art] Populate DV Done
2,821,674 UART: [fht] FMC Alias Private Key: 7
2,822,788 UART: [art] Derive CDI
2,823,068 UART: [art] Store in in slot 0x4
2,908,553 UART: [art] Derive Key Pair
2,908,913 UART: [art] Store priv key in slot 0x5
2,922,195 UART: [art] Derive Key Pair - Done
2,937,148 UART: [art] Signing Cert with AUTHO
2,937,628 UART: RITY.KEYID = 7
2,952,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,363 UART: [art] PUB.X = DFBEBF04E9B062D79B534DEEE561A997CE7370DAF0C636FB3579434A64A6552020216117437FC9B41D94F013F78A4664
2,960,132 UART: [art] PUB.Y = CA9696D854BBF4A260A82EF10BC8B45A7B7F8F71B9363AA83BD24D093DE966F8F06B89C07B6462F46217EDD7F9C728A1
2,967,088 UART: [art] SIG.R = 43274234CA06482DE4577953244029902EC703C6E24CE806777F32AD0B6A354906208BFE0DB82617E9515FF1A7A80E90
2,973,827 UART: [art] SIG.S = 52DAE0A1F76EC620D6B6B5C1B2D660CBC27044A4236695FAA645553AA0C01E3F791C37F22BA2F916132AFBD2057A879C
2,997,705 UART: Caliptra RT
2,998,050 UART: [state] CFI Enabled
3,106,765 UART: [rt] RT listening for mailbox commands...
3,107,428 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,033 UART: [rt]cmd =0x46504c54, len=4
3,138,303 >>> mbox cmd response data (8 bytes)
3,138,670 UART: [rt] FIPS self test
3,138,998 UART: [kat] ++
3,139,150 UART: [kat] sha1
3,143,356 UART: [kat] SHA2-256
3,145,378 UART: [kat] SHA2-384
3,148,111 UART: [kat] SHA2-512-ACC
3,150,038 UART: [kat] ECC-384
3,151,373 UART: Fatal Error: 0x90040004
3,152,912 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,917 >>> mbox cmd response: failed
3,152,917 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,047 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,718 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
5,972,847 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,116,554 >>> mbox cmd response: failed
6,117,115 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,259,989 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,864,340 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,410,940 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
5,973,997 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,117,645 >>> mbox cmd response: failed
6,118,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,261,091 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,863,615 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,433,979 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
6,296,702 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,440,352 >>> mbox cmd response: failed
6,440,914 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,583,818 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
18,463,833 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,904,518 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,288,045 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,431,704 >>> mbox cmd response: failed
6,432,270 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,575,146 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
18,479,182 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,917,854 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,767 writing to cptra_bootfsm_go
5,149,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,293,597 >>> mbox cmd response: failed
5,294,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,437,292 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,464,112 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,296,987 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,103 writing to cptra_bootfsm_go
5,146,263 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,290,422 >>> mbox cmd response: failed
5,290,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,434,682 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,419,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,249,680 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
5,502,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,646,923 >>> mbox cmd response: failed
5,647,490 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,790,617 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,848,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,556,035 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
5,495,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,639,284 >>> mbox cmd response: failed
5,639,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,783,443 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,872,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,581,744 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
5,153,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,297,181 >>> mbox cmd response: failed
5,297,747 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,441,041 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
3,431,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,242,714 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
5,145,148 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,289,546 >>> mbox cmd response: failed
5,290,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,433,430 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,418,620 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,219,607 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
5,504,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,648,962 >>> mbox cmd response: failed
5,649,528 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,792,667 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
17,843,158 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,570,109 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
5,494,683 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,638,717 >>> mbox cmd response: failed
5,639,271 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,782,560 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
17,878,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,604,826 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,554 >>> mbox cmd response: failed
821,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,057 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,266 >>> mbox cmd response: failed
822,266 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,655 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,351 >>> mbox cmd response: failed
823,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,677 >>> mbox cmd response: failed
821,677 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,386 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,892 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,220 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,228 >>> mbox cmd response: failed
822,228 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,485 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,061 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,042 >>> mbox cmd response: failed
822,042 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,325 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,445 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,087 >>> mbox cmd response: failed
822,087 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,130 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,654 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,657 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,665 >>> mbox cmd response: failed
822,665 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,671 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,138 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,102 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,110 >>> mbox cmd response: failed
822,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,736 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,070 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,078 >>> mbox cmd response: failed
822,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,601 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,397 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,405 >>> mbox cmd response: failed
822,405 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,398 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,597 >>> mbox cmd response: failed
821,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,572 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,002 UART:
192,409 UART: Running Caliptra ROM ...
193,518 UART:
193,663 UART: [state] CFI Enabled
265,458 UART: [state] LifecycleState = Unprovisioned
267,572 UART: [state] DebugLocked = No
270,043 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,071 UART: [kat] SHA2-256
444,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,310 UART: [kat] ++
455,760 UART: [kat] sha1
466,357 UART: [kat] SHA2-256
469,088 UART: [kat] SHA2-384
475,581 UART: [kat] SHA2-512-ACC
477,949 UART: [kat] ECC-384
2,766,677 UART: [kat] HMAC-384Kdf
2,780,351 UART: [kat] LMS
3,970,621 UART: [kat] --
3,974,617 UART: [cold-reset] ++
3,976,691 UART: [fht] Storing FHT @ 0x50003400
3,989,243 UART: [idev] ++
3,989,818 UART: [idev] CDI.KEYID = 6
3,990,801 UART: [idev] SUBJECT.KEYID = 7
3,991,980 UART: [idev] UDS.KEYID = 0
3,993,017 ready_for_fw is high
3,993,236 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,137,428 UART: [idev] Erasing UDS.KEYID = 0
7,326,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,113 UART: [idev] --
7,351,521 UART: [ldev] ++
7,352,091 UART: [ldev] CDI.KEYID = 6
7,353,066 UART: [ldev] SUBJECT.KEYID = 5
7,354,285 UART: [ldev] AUTHORITY.KEYID = 7
7,355,593 UART: [ldev] FE.KEYID = 1
7,383,315 UART: [ldev] Erasing FE.KEYID = 1
10,715,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,923 UART: [ldev] --
13,096,197 UART: [fwproc] Waiting for Commands...
13,098,408 UART: [fwproc] Received command 0x46574c44
13,100,603 UART: [fwproc] Received Image of size 114632 bytes
17,158,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,886 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,756 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,620,685 >>> mbox cmd response: success
17,624,410 UART: [afmc] ++
17,625,021 UART: [afmc] CDI.KEYID = 6
17,625,938 UART: [afmc] SUBJECT.KEYID = 7
17,627,154 UART: [afmc] AUTHORITY.KEYID = 5
20,991,596 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,745 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,177 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,023 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,462 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,160 UART: [afmc] --
23,358,483 UART: [cold-reset] --
23,362,563 UART: [state] Locking Datavault
23,368,674 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,373 UART: [state] Locking ICCM
23,371,551 UART: [exit] Launching FMC @ 0x40000130
23,379,953 UART:
23,380,212 UART: Running Caliptra FMC ...
23,381,321 UART:
23,381,485 UART: [state] CFI Enabled
23,447,100 UART: [fht] FMC Alias Private Key: 7
25,785,657 UART: [art] Extend RT PCRs Done
25,786,893 UART: [art] Lock RT PCRs Done
25,788,728 UART: [art] Populate DV Done
25,794,208 UART: [fht] FMC Alias Private Key: 7
25,795,697 UART: [art] Derive CDI
25,796,433 UART: [art] Store in in slot 0x4
25,856,172 UART: [art] Derive Key Pair
25,857,172 UART: [art] Store priv key in slot 0x5
29,149,449 UART: [art] Derive Key Pair - Done
29,162,444 UART: [art] Signing Cert with AUTHO
29,163,744 UART: RITY.KEYID = 7
31,451,550 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,087 UART: [art] PUB.X = 398F2884DEE908D4E5C13AD859DBFE94E91AB60201F64D38A76B2C12BEB290107BA44CE9170C3F25059CAEC665924D69
31,460,342 UART: [art] PUB.Y = F79CB33D9848C727DFCBA9700EB9BFDF7E34CACDDA089619491D13DF4CA8D464A52E6BA42597A06B141D78B6EB4388EE
31,467,548 UART: [art] SIG.R = 1404B8BA20CFDAF4D6FF535F4769EEC667B6F03A6B67049CCF1BEF96AFD0C755B8AAFC36B12C83612C9A281BA33A1825
31,475,000 UART: [art] SIG.S = F7E28FB7046B997AF4B574FBB347188929227A0DF0468D33BE6423D35D30E98ACB69D5E9A74A49623852461C02B975E4
32,780,217 UART: Caliptra RT
32,780,925 UART: [state] CFI Enabled
32,943,332 UART: [rt] RT listening for mailbox commands...
32,945,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,974,882 UART: [rt]cmd =0x46504c54, len=4
32,976,465 >>> mbox cmd response data (8 bytes)
32,977,644 UART: [rt] FIPS self test
32,978,589 UART: [kat] ++
32,979,044 UART: [kat] sha1
32,983,507 UART: [kat] SHA2-256
32,985,439 UART: [kat] SHA2-384
32,988,398 UART: [kat] SHA2-512-ACC
32,990,685 UART: [kat] ECC-384
36,254,206 UART: Fatal Error: 0x90040005
36,289,614 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,433,629 >>> mbox cmd response: failed
36,434,295 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,578,097 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,108 UART:
190,411 UART: Running Caliptra ROM ...
191,533 UART:
191,684 UART: [state] CFI Enabled
250,981 UART: [state] LifecycleState = Unprovisioned
252,904 UART: [state] DebugLocked = No
255,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,204 UART: [kat] SHA2-256
429,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,410 UART: [kat] ++
440,997 UART: [kat] sha1
451,768 UART: [kat] SHA2-256
454,447 UART: [kat] SHA2-384
460,093 UART: [kat] SHA2-512-ACC
462,442 UART: [kat] ECC-384
2,753,892 UART: [kat] HMAC-384Kdf
2,783,808 UART: [kat] LMS
3,974,109 UART: [kat] --
3,978,891 UART: [cold-reset] ++
3,981,535 UART: [fht] Storing FHT @ 0x50003400
3,993,945 UART: [idev] ++
3,994,567 UART: [idev] CDI.KEYID = 6
3,995,488 UART: [idev] SUBJECT.KEYID = 7
3,996,703 UART: [idev] UDS.KEYID = 0
3,998,313 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,142,461 UART: [idev] Erasing UDS.KEYID = 0
7,329,518 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,191 UART: [idev] --
7,356,402 UART: [ldev] ++
7,356,971 UART: [ldev] CDI.KEYID = 6
7,357,935 UART: [ldev] SUBJECT.KEYID = 5
7,359,149 UART: [ldev] AUTHORITY.KEYID = 7
7,360,387 UART: [ldev] FE.KEYID = 1
7,407,120 UART: [ldev] Erasing FE.KEYID = 1
10,737,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,033,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,077,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,235 UART: [ldev] --
13,100,847 UART: [fwproc] Waiting for Commands...
13,103,272 UART: [fwproc] Received command 0x46574c44
13,105,470 UART: [fwproc] Received Image of size 114632 bytes
17,170,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,955 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,631,163 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,802,792 ready_for_fw is high
3,803,263 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,892,553 >>> mbox cmd response: success
23,588,311 UART:
23,588,722 UART: Running Caliptra FMC ...
23,589,839 UART:
23,590,003 UART: [state] CFI Enabled
23,657,421 UART: [fht] FMC Alias Private Key: 7
25,995,346 UART: [art] Extend RT PCRs Done
25,996,565 UART: [art] Lock RT PCRs Done
25,998,519 UART: [art] Populate DV Done
26,003,984 UART: [fht] FMC Alias Private Key: 7
26,005,691 UART: [art] Derive CDI
26,006,531 UART: [art] Store in in slot 0x4
26,065,407 UART: [art] Derive Key Pair
26,066,447 UART: [art] Store priv key in slot 0x5
29,359,661 UART: [art] Derive Key Pair - Done
29,372,487 UART: [art] Signing Cert with AUTHO
29,373,974 UART: RITY.KEYID = 7
31,662,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,632 UART: [art] PUB.X = 3FCFBC60F650F489520549984DC1389FE4B813BE2F2E8371B4A64E5CEB2F336DD8CB79B4FE21B3537CE0084471E5A7E1
31,670,887 UART: [art] PUB.Y = CE4D9D57784E4769AEDE9373C718EA7E696C82B40C891649D9EC0AA53CC906564584310B901DF6CE0C749BE5921EE2AF
31,678,134 UART: [art] SIG.R = 4B0A0D3162FC05128412044F4BDC03CE8CCCEDE207AD4DE1343F6FFDA3821B755932DA571B653E4B5A3624451227E492
31,685,527 UART: [art] SIG.S = 7CFA1B31C64A751D3B26825800C8F32822CE915E3008ACD4C97C44F3648F0EB8F1E4E71BFAD988A7A6772654E80B9599
32,990,551 UART: Caliptra RT
32,991,254 UART: [state] CFI Enabled
33,152,194 UART: [rt] RT listening for mailbox commands...
33,154,061 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,183,867 UART: [rt]cmd =0x46504c54, len=4
33,185,411 >>> mbox cmd response data (8 bytes)
33,186,687 UART: [rt] FIPS self test
33,187,637 UART: [kat] ++
33,188,089 UART: [kat] sha1
33,192,492 UART: [kat] SHA2-256
33,194,421 UART: [kat] SHA2-384
33,197,491 UART: [kat] SHA2-512-ACC
33,199,735 UART: [kat] ECC-384
36,464,458 UART: Fatal Error: 0x90040005
36,499,848 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,643,703 >>> mbox cmd response: failed
36,644,359 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,788,305 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,768,611 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,821,866 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,469 UART:
192,847 UART: Running Caliptra ROM ...
194,054 UART:
603,667 UART: [state] CFI Enabled
618,031 UART: [state] LifecycleState = Unprovisioned
619,914 UART: [state] DebugLocked = No
622,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,190 UART: [kat] SHA2-256
797,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,539 UART: [kat] ++
807,987 UART: [kat] sha1
820,587 UART: [kat] SHA2-256
823,277 UART: [kat] SHA2-384
829,277 UART: [kat] SHA2-512-ACC
831,650 UART: [kat] ECC-384
3,115,723 UART: [kat] HMAC-384Kdf
3,128,238 UART: [kat] LMS
4,318,304 UART: [kat] --
4,323,142 UART: [cold-reset] ++
4,324,658 UART: [fht] Storing FHT @ 0x50003400
4,335,678 UART: [idev] ++
4,336,288 UART: [idev] CDI.KEYID = 6
4,337,205 UART: [idev] SUBJECT.KEYID = 7
4,338,260 UART: [idev] UDS.KEYID = 0
4,339,292 ready_for_fw is high
4,339,521 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,483,442 UART: [idev] Erasing UDS.KEYID = 0
7,630,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,959 UART: [idev] --
7,654,468 UART: [ldev] ++
7,655,094 UART: [ldev] CDI.KEYID = 6
7,656,011 UART: [ldev] SUBJECT.KEYID = 5
7,657,231 UART: [ldev] AUTHORITY.KEYID = 7
7,658,518 UART: [ldev] FE.KEYID = 1
7,668,785 UART: [ldev] Erasing FE.KEYID = 1
10,958,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,470 UART: [ldev] --
13,320,909 UART: [fwproc] Waiting for Commands...
13,323,286 UART: [fwproc] Received command 0x46574c44
13,325,482 UART: [fwproc] Received Image of size 114632 bytes
17,391,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,462,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,531,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,849,919 >>> mbox cmd response: success
17,853,376 UART: [afmc] ++
17,853,975 UART: [afmc] CDI.KEYID = 6
17,854,887 UART: [afmc] SUBJECT.KEYID = 7
17,856,193 UART: [afmc] AUTHORITY.KEYID = 5
21,171,930 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,465,146 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,534 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,494,380 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,795 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,428 UART: [afmc] --
23,534,505 UART: [cold-reset] --
23,538,799 UART: [state] Locking Datavault
23,543,659 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,416 UART: [state] Locking ICCM
23,548,139 UART: [exit] Launching FMC @ 0x40000130
23,556,529 UART:
23,556,763 UART: Running Caliptra FMC ...
23,557,866 UART:
23,558,022 UART: [state] CFI Enabled
23,566,450 UART: [fht] FMC Alias Private Key: 7
25,897,286 UART: [art] Extend RT PCRs Done
25,898,532 UART: [art] Lock RT PCRs Done
25,900,345 UART: [art] Populate DV Done
25,905,705 UART: [fht] FMC Alias Private Key: 7
25,907,399 UART: [art] Derive CDI
25,908,131 UART: [art] Store in in slot 0x4
25,950,670 UART: [art] Derive Key Pair
25,951,712 UART: [art] Store priv key in slot 0x5
29,194,333 UART: [art] Derive Key Pair - Done
29,207,165 UART: [art] Signing Cert with AUTHO
29,208,468 UART: RITY.KEYID = 7
31,487,884 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,395 UART: [art] PUB.X = B2941C24BA811A03FC376912801EFF486F8D67032503F2647BBFB1542AE6179902182ABC1EEAC03437C0A9B8FEB48396
31,496,642 UART: [art] PUB.Y = FF7D383DC3C6D0D979C56F00F69A6C26F49FCD406047A3770FE98BABEF615C11C8064546BB753D2D68DD15D59972BC43
31,503,927 UART: [art] SIG.R = D539D5319C06DC6058333C3E271AA69C40B38A475CABA9C64E2D64FF5D55BD3DD35939AAE8005DD6450F71039B4F15D0
31,511,273 UART: [art] SIG.S = 10E0B3B5A8AECBA96271D422B3C50AB01CCBCD7052A75289A3C7E46EC10A8BC7A862ECD9A8E16C4036F1A2B2BB9D1C60
32,816,105 UART: Caliptra RT
32,816,831 UART: [state] CFI Enabled
32,934,922 UART: [rt] RT listening for mailbox commands...
32,936,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,966,568 UART: [rt]cmd =0x46504c54, len=4
32,967,982 >>> mbox cmd response data (8 bytes)
32,969,322 UART: [rt] FIPS self test
32,970,268 UART: [kat] ++
32,970,719 UART: [kat] sha1
32,975,368 UART: [kat] SHA2-256
32,977,295 UART: [kat] SHA2-384
32,980,323 UART: [kat] SHA2-512-ACC
32,982,563 UART: [kat] ECC-384
36,221,645 UART: Fatal Error: 0x90040005
36,257,086 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,400,955 >>> mbox cmd response: failed
36,401,569 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,545,523 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,109 UART:
190,403 UART: Running Caliptra ROM ...
191,514 UART:
3,980,401 UART: [state] CFI Enabled
3,994,882 UART: [state] LifecycleState = Unprovisioned
3,996,787 UART: [state] DebugLocked = No
3,998,037 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,003,147 UART: [kat] SHA2-256
4,172,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,183,399 UART: [kat] ++
4,183,859 UART: [kat] sha1
4,193,288 UART: [kat] SHA2-256
4,196,015 UART: [kat] SHA2-384
4,201,770 UART: [kat] SHA2-512-ACC
4,204,126 UART: [kat] ECC-384
6,488,669 UART: [kat] HMAC-384Kdf
6,500,842 UART: [kat] LMS
7,690,940 UART: [kat] --
7,694,843 UART: [cold-reset] ++
7,696,132 UART: [fht] Storing FHT @ 0x50003400
7,707,404 UART: [idev] ++
7,708,023 UART: [idev] CDI.KEYID = 6
7,708,935 UART: [idev] SUBJECT.KEYID = 7
7,710,308 UART: [idev] UDS.KEYID = 0
7,711,834 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
7,855,611 UART: [idev] Erasing UDS.KEYID = 0
10,995,369 UART: [idev] Using Sha1 for KeyId Algorithm
11,017,508 UART: [idev] --
11,020,437 UART: [ldev] ++
11,021,032 UART: [ldev] CDI.KEYID = 6
11,021,944 UART: [ldev] SUBJECT.KEYID = 5
11,023,164 UART: [ldev] AUTHORITY.KEYID = 7
11,024,454 UART: [ldev] FE.KEYID = 1
11,034,883 UART: [ldev] Erasing FE.KEYID = 1
14,325,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,615,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,630,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,645,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,659,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,679,950 UART: [ldev] --
16,685,391 UART: [fwproc] Waiting for Commands...
16,687,974 UART: [fwproc] Received command 0x46574c44
16,690,158 UART: [fwproc] Received Image of size 114632 bytes
20,750,184 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,826,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,895,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
21,214,594 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,127,028 ready_for_fw is high
4,127,465 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,077,707 >>> mbox cmd response: success
23,715,324 UART:
23,715,716 UART: Running Caliptra FMC ...
23,716,825 UART:
23,716,990 UART: [state] CFI Enabled
23,725,111 UART: [fht] FMC Alias Private Key: 7
26,056,612 UART: [art] Extend RT PCRs Done
26,057,885 UART: [art] Lock RT PCRs Done
26,059,818 UART: [art] Populate DV Done
26,064,860 UART: [fht] FMC Alias Private Key: 7
26,066,621 UART: [art] Derive CDI
26,067,360 UART: [art] Store in in slot 0x4
26,110,138 UART: [art] Derive Key Pair
26,111,201 UART: [art] Store priv key in slot 0x5
29,353,135 UART: [art] Derive Key Pair - Done
29,365,920 UART: [art] Signing Cert with AUTHO
29,367,265 UART: RITY.KEYID = 7
31,646,520 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,031 UART: [art] PUB.X = 9AC1FA4229135E5C21F2D816F09B545C0CD3AF266BDB46BFBF518053685A9A8BC7218B7193C29786394728B0B5F38620
31,655,286 UART: [art] PUB.Y = 6321D7D94376BD4249014E41D5BCF1BDEF5E0428919FD075178CBC96D14A4029D0BD805CDD899D6BE026490C8C1EB0BB
31,662,517 UART: [art] SIG.R = 0823D5A120E20E41FB3DABD9BE29A78F306A7A3C48EEBFAB83FD843A0DD8CCB1DDD8E3D42B45E4A1F27990020D9AFFAA
31,669,919 UART: [art] SIG.S = 186C7BFDB6EF3367F57CAF622FCE507E0EC1521FE4E4F15B1BA4867C439E0F3C6CD03CA1245E5F7A59F9C77CC2FE7B8E
32,975,304 UART: Caliptra RT
32,976,022 UART: [state] CFI Enabled
33,094,062 UART: [rt] RT listening for mailbox commands...
33,095,911 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,125,439 UART: [rt]cmd =0x46504c54, len=4
33,127,048 >>> mbox cmd response data (8 bytes)
33,128,177 UART: [rt] FIPS self test
33,129,125 UART: [kat] ++
33,129,592 UART: [kat] sha1
33,133,995 UART: [kat] SHA2-256
33,135,926 UART: [kat] SHA2-384
33,138,919 UART: [kat] SHA2-512-ACC
33,141,163 UART: [kat] ECC-384
36,380,422 UART: Fatal Error: 0x90040005
36,415,870 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,560,208 >>> mbox cmd response: failed
36,560,867 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,704,667 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
7,355,866 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
21,301,674 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,452 UART:
192,835 UART: Running Caliptra ROM ...
194,055 UART:
194,219 UART: [state] CFI Enabled
265,774 UART: [state] LifecycleState = Unprovisioned
267,631 UART: [state] DebugLocked = No
269,002 UART: [state] WD Timer not started. Device not locked for debugging
272,497 UART: [kat] SHA2-256
451,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,174 UART: [kat] ++
463,729 UART: [kat] sha1
473,761 UART: [kat] SHA2-256
476,769 UART: [kat] SHA2-384
483,822 UART: [kat] SHA2-512-ACC
486,765 UART: [kat] ECC-384
2,950,394 UART: [kat] HMAC-384Kdf
2,973,461 UART: [kat] LMS
3,502,888 UART: [kat] --
3,508,903 UART: [cold-reset] ++
3,509,992 UART: [fht] FHT @ 0x50003400
3,520,761 UART: [idev] ++
3,521,324 UART: [idev] CDI.KEYID = 6
3,522,304 UART: [idev] SUBJECT.KEYID = 7
3,523,480 UART: [idev] UDS.KEYID = 0
3,524,426 ready_for_fw is high
3,524,661 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,360 UART: [idev] Erasing UDS.KEYID = 0
6,027,229 UART: [idev] Sha1 KeyId Algorithm
6,050,141 UART: [idev] --
6,053,899 UART: [ldev] ++
6,054,481 UART: [ldev] CDI.KEYID = 6
6,055,394 UART: [ldev] SUBJECT.KEYID = 5
6,056,554 UART: [ldev] AUTHORITY.KEYID = 7
6,057,792 UART: [ldev] FE.KEYID = 1
6,102,843 UART: [ldev] Erasing FE.KEYID = 1
8,609,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,393 UART: [ldev] --
10,418,170 UART: [fwproc] Wait for Commands...
10,420,016 UART: [fwproc] Recv command 0x46574c44
10,422,069 UART: [fwproc] Recv'd Img size: 114940 bytes
13,830,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,616 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,291,971 >>> mbox cmd response: success
14,296,857 UART: [afmc] ++
14,297,453 UART: [afmc] CDI.KEYID = 6
14,298,364 UART: [afmc] SUBJECT.KEYID = 7
14,299,523 UART: [afmc] AUTHORITY.KEYID = 5
16,833,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,385 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,931 UART: [afmc] --
18,633,225 UART: [cold-reset] --
18,637,134 UART: [state] Locking Datavault
18,642,273 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,923 UART: [state] Locking ICCM
18,645,028 UART: [exit] Launching FMC @ 0x40000130
18,653,482 UART:
18,653,717 UART: Running Caliptra FMC ...
18,654,819 UART:
18,654,976 UART: [state] CFI Enabled
18,713,932 UART: [fht] FMC Alias Private Key: 7
20,478,196 UART: [art] Extend RT PCRs Done
20,479,418 UART: [art] Lock RT PCRs Done
20,480,905 UART: [art] Populate DV Done
20,486,486 UART: [fht] FMC Alias Private Key: 7
20,488,126 UART: [art] Derive CDI
20,488,886 UART: [art] Store in in slot 0x4
20,546,468 UART: [art] Derive Key Pair
20,547,507 UART: [art] Store priv key in slot 0x5
23,010,930 UART: [art] Derive Key Pair - Done
23,023,928 UART: [art] Signing Cert with AUTHO
23,025,230 UART: RITY.KEYID = 7
24,736,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,174 UART: [art] PUB.X = 76EAF318F3AC6FB6AF47288E035F4EA78FF7EBDEA563C7CD99A04427F225519F987E06922163AB74B372326DC5698104
24,745,427 UART: [art] PUB.Y = 708B77DFCCDDA7AD2C7E11B71223A3C1F5FD87B14AF72587B553AB43AB0F1F8DFF3BFC7D9154DAA0B76A658A30B851F2
24,752,750 UART: [art] SIG.R = 5DAD76BF9CD7C7BF3D303E9110F8BC68B0D33CB7B93BBA0484187BD719C8DB957C47C1B74672D1EE705AA32F5864FACD
24,760,159 UART: [art] SIG.S = 152E458CD6262C41DFEB5650C0BD726383DA968C7534405412E349391CC1821C70D39107C80FDF37435F4A33258A9FDA
25,738,771 UART: Caliptra RT
25,739,469 UART: [state] CFI Enabled
25,904,778 UART: [rt] RT listening for mailbox commands...
25,906,624 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,082 UART: [rt]cmd =0x46504c54, len=4
25,937,836 >>> mbox cmd response data (8 bytes)
25,939,178 UART: [rt] FIPS self test
25,940,115 UART: [kat] ++
25,940,561 UART: [kat] sha1
25,945,176 UART: [kat] SHA2-256
25,947,106 UART: [kat] SHA2-384
25,950,024 UART: [kat] SHA2-512-ACC
25,952,303 UART: [kat] ECC-384
28,387,005 UART: Fatal Error: 0x90040005
28,422,310 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,566,745 >>> mbox cmd response: failed
28,567,380 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,711,724 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,025 UART:
190,337 UART: Running Caliptra ROM ...
191,364 UART:
191,503 UART: [state] CFI Enabled
244,550 UART: [state] LifecycleState = Unprovisioned
246,411 UART: [state] DebugLocked = No
249,218 UART: [state] WD Timer not started. Device not locked for debugging
253,009 UART: [kat] SHA2-256
432,141 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
443,698 UART: [kat] ++
444,142 UART: [kat] sha1
455,935 UART: [kat] SHA2-256
458,938 UART: [kat] SHA2-384
465,352 UART: [kat] SHA2-512-ACC
468,339 UART: [kat] ECC-384
2,929,382 UART: [kat] HMAC-384Kdf
2,953,917 UART: [kat] LMS
3,483,377 UART: [kat] --
3,488,177 UART: [cold-reset] ++
3,489,942 UART: [fht] FHT @ 0x50003400
3,500,867 UART: [idev] ++
3,501,440 UART: [idev] CDI.KEYID = 6
3,502,322 UART: [idev] SUBJECT.KEYID = 7
3,503,588 UART: [idev] UDS.KEYID = 0
3,505,079 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,650,068 UART: [idev] Erasing UDS.KEYID = 0
6,009,853 UART: [idev] Sha1 KeyId Algorithm
6,032,111 UART: [idev] --
6,036,166 UART: [ldev] ++
6,036,923 UART: [ldev] CDI.KEYID = 6
6,037,830 UART: [ldev] SUBJECT.KEYID = 5
6,038,948 UART: [ldev] AUTHORITY.KEYID = 7
6,040,137 UART: [ldev] FE.KEYID = 1
6,082,267 UART: [ldev] Erasing FE.KEYID = 1
8,587,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,101 UART: [ldev] --
10,399,154 UART: [fwproc] Wait for Commands...
10,402,228 UART: [fwproc] Recv command 0x46574c44
10,404,323 UART: [fwproc] Recv'd Img size: 114940 bytes
13,816,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,460 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,275,271 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,373,412 ready_for_fw is high
3,374,070 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,077,834 >>> mbox cmd response: success
18,357,641 UART:
18,358,034 UART: Running Caliptra FMC ...
18,359,181 UART:
18,359,345 UART: [state] CFI Enabled
18,425,547 UART: [fht] FMC Alias Private Key: 7
20,189,915 UART: [art] Extend RT PCRs Done
20,191,131 UART: [art] Lock RT PCRs Done
20,192,757 UART: [art] Populate DV Done
20,198,341 UART: [fht] FMC Alias Private Key: 7
20,199,936 UART: [art] Derive CDI
20,200,752 UART: [art] Store in in slot 0x4
20,257,421 UART: [art] Derive Key Pair
20,258,464 UART: [art] Store priv key in slot 0x5
22,721,343 UART: [art] Derive Key Pair - Done
22,734,299 UART: [art] Signing Cert with AUTHO
22,735,643 UART: RITY.KEYID = 7
24,446,980 UART: [art] Erasing AUTHORITY.KEYID = 7
24,448,459 UART: [art] PUB.X = A86F8AE891439EB59310894E2B3D21E8964A10A80622C68B9B5FE223D27571E866089018887AFFF7082F5D66A0662833
24,455,721 UART: [art] PUB.Y = E264901CCA7DC2FC7F711E929F102A2C5BCB47081543EE8AB5F85DF43A37877B17A1293ECFC53106E77842353EF9BBFB
24,462,972 UART: [art] SIG.R = E72B5718BC8CE5711D44CEED05CEE96CB353AAE2A02F87A65CAA4FAF4A0AB1FF3CC5DE5BBDF9C3606F601B33FCE66047
24,470,420 UART: [art] SIG.S = 956970AAE7083A4FC0E16272A1506EB21B7BAF42A0376B90A42F5FBE9C8C13F3235E3F2432FD04EBF35AD94567710C11
25,449,269 UART: Caliptra RT
25,449,984 UART: [state] CFI Enabled
25,615,038 UART: [rt] RT listening for mailbox commands...
25,616,936 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,646,572 UART: [rt]cmd =0x46504c54, len=4
25,648,261 >>> mbox cmd response data (8 bytes)
25,649,647 UART: [rt] FIPS self test
25,650,585 UART: [kat] ++
25,651,036 UART: [kat] sha1
25,655,511 UART: [kat] SHA2-256
25,657,442 UART: [kat] SHA2-384
25,660,402 UART: [kat] SHA2-512-ACC
25,662,624 UART: [kat] ECC-384
28,096,704 UART: Fatal Error: 0x90040005
28,131,994 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,276,407 >>> mbox cmd response: failed
28,277,064 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,421,352 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,342,524 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,059,263 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
192,665 UART:
193,046 UART: Running Caliptra ROM ...
194,180 UART:
603,607 UART: [state] CFI Enabled
618,432 UART: [state] LifecycleState = Unprovisioned
620,312 UART: [state] DebugLocked = No
622,757 UART: [state] WD Timer not started. Device not locked for debugging
626,821 UART: [kat] SHA2-256
805,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,530 UART: [kat] ++
817,982 UART: [kat] sha1
828,434 UART: [kat] SHA2-256
831,438 UART: [kat] SHA2-384
837,434 UART: [kat] SHA2-512-ACC
840,382 UART: [kat] ECC-384
3,281,627 UART: [kat] HMAC-384Kdf
3,294,099 UART: [kat] LMS
3,823,639 UART: [kat] --
3,826,997 UART: [cold-reset] ++
3,828,218 UART: [fht] FHT @ 0x50003400
3,839,475 UART: [idev] ++
3,840,045 UART: [idev] CDI.KEYID = 6
3,840,962 UART: [idev] SUBJECT.KEYID = 7
3,842,162 UART: [idev] UDS.KEYID = 0
3,843,147 ready_for_fw is high
3,843,391 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,987,841 UART: [idev] Erasing UDS.KEYID = 0
6,312,944 UART: [idev] Sha1 KeyId Algorithm
6,335,224 UART: [idev] --
6,339,143 UART: [ldev] ++
6,339,720 UART: [ldev] CDI.KEYID = 6
6,340,603 UART: [ldev] SUBJECT.KEYID = 5
6,341,815 UART: [ldev] AUTHORITY.KEYID = 7
6,343,048 UART: [ldev] FE.KEYID = 1
6,353,347 UART: [ldev] Erasing FE.KEYID = 1
8,830,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,842 UART: [ldev] --
10,623,269 UART: [fwproc] Wait for Commands...
10,624,770 UART: [fwproc] Recv command 0x46574c44
10,626,867 UART: [fwproc] Recv'd Img size: 114940 bytes
14,035,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,909 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,497,979 >>> mbox cmd response: success
14,502,886 UART: [afmc] ++
14,503,480 UART: [afmc] CDI.KEYID = 6
14,504,363 UART: [afmc] SUBJECT.KEYID = 7
14,505,578 UART: [afmc] AUTHORITY.KEYID = 5
17,003,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,803 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,907 UART: [afmc] --
18,800,447 UART: [cold-reset] --
18,803,982 UART: [state] Locking Datavault
18,809,496 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,292 UART: [state] Locking ICCM
18,813,457 UART: [exit] Launching FMC @ 0x40000130
18,821,911 UART:
18,822,151 UART: Running Caliptra FMC ...
18,823,260 UART:
18,823,421 UART: [state] CFI Enabled
18,831,739 UART: [fht] FMC Alias Private Key: 7
20,588,756 UART: [art] Extend RT PCRs Done
20,589,981 UART: [art] Lock RT PCRs Done
20,591,707 UART: [art] Populate DV Done
20,596,759 UART: [fht] FMC Alias Private Key: 7
20,598,304 UART: [art] Derive CDI
20,599,120 UART: [art] Store in in slot 0x4
20,641,723 UART: [art] Derive Key Pair
20,642,726 UART: [art] Store priv key in slot 0x5
23,069,675 UART: [art] Derive Key Pair - Done
23,082,896 UART: [art] Signing Cert with AUTHO
23,084,204 UART: RITY.KEYID = 7
24,789,698 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,208 UART: [art] PUB.X = 9DF6AE752D93E1CF2F42DF7147BBFBE3F8055E06622288BD9880728785E711BFC9936683300F5FA9B2B14150E3070B3A
24,798,521 UART: [art] PUB.Y = E9AE264086FE453E4E52240823F4074D4B5050703FA044116CEED608391DCA678B809E40EE9E57EFE33A2DEE09973446
24,805,753 UART: [art] SIG.R = 943B7EDE2D43CF1282605482F1B3BC6DD844BB82001ACBEFBA7705901095CFD36544C47D57B91AA4899445DDA7986334
24,813,138 UART: [art] SIG.S = 4478C332475599C164166007539DCF05E3DAFA7A80AB0A95331144E98FD20B2AC38498CA3EB56CC99BDC1EFE1FB3BFC2
25,791,958 UART: Caliptra RT
25,792,665 UART: [state] CFI Enabled
25,909,744 UART: [rt] RT listening for mailbox commands...
25,911,598 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,941,431 UART: [rt]cmd =0x46504c54, len=4
25,942,985 >>> mbox cmd response data (8 bytes)
25,943,999 UART: [rt] FIPS self test
25,944,945 UART: [kat] ++
25,945,400 UART: [kat] sha1
25,949,690 UART: [kat] SHA2-256
25,951,622 UART: [kat] SHA2-384
25,954,640 UART: [kat] SHA2-512-ACC
25,956,879 UART: [kat] ECC-384
28,380,816 UART: Fatal Error: 0x90040005
28,416,202 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,560,485 >>> mbox cmd response: failed
28,561,093 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,705,360 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,007 UART:
190,300 UART: Running Caliptra ROM ...
191,326 UART:
11,822,904 UART: [state] CFI Enabled
11,833,684 UART: [state] LifecycleState = Unprovisioned
11,835,540 UART: [state] DebugLocked = No
11,837,553 UART: [state] WD Timer not started. Device not locked for debugging
11,841,075 UART: [kat] SHA2-256
12,020,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,031,770 UART: [kat] ++
12,032,239 UART: [kat] sha1
12,043,610 UART: [kat] SHA2-256
12,046,631 UART: [kat] SHA2-384
12,054,140 UART: [kat] SHA2-512-ACC
12,057,099 UART: [kat] ECC-384
14,499,967 UART: [kat] HMAC-384Kdf
14,510,946 UART: [kat] LMS
15,040,471 UART: [kat] --
15,045,217 UART: [cold-reset] ++
15,046,553 UART: [fht] FHT @ 0x50003400
15,057,268 UART: [idev] ++
15,057,831 UART: [idev] CDI.KEYID = 6
15,058,849 UART: [idev] SUBJECT.KEYID = 7
15,059,953 UART: [idev] UDS.KEYID = 0
15,061,585 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
15,206,066 UART: [idev] Erasing UDS.KEYID = 0
17,535,342 UART: [idev] Sha1 KeyId Algorithm
17,558,417 UART: [idev] --
17,562,176 UART: [ldev] ++
17,562,752 UART: [ldev] CDI.KEYID = 6
17,563,658 UART: [ldev] SUBJECT.KEYID = 5
17,564,819 UART: [ldev] AUTHORITY.KEYID = 7
17,566,058 UART: [ldev] FE.KEYID = 1
17,577,463 UART: [ldev] Erasing FE.KEYID = 1
20,052,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,770,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,786,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,802,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,818,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,839,644 UART: [ldev] --
21,843,560 UART: [fwproc] Wait for Commands...
21,846,576 UART: [fwproc] Recv command 0x46574c44
21,848,676 UART: [fwproc] Recv'd Img size: 114940 bytes
25,255,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,331,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,400,147 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,719,936 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,690,963 ready_for_fw is high
3,691,454 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,273,394 >>> mbox cmd response: success
18,527,439 UART:
18,527,824 UART: Running Caliptra FMC ...
18,528,949 UART:
18,529,104 UART: [state] CFI Enabled
18,537,109 UART: [fht] FMC Alias Private Key: 7
20,294,080 UART: [art] Extend RT PCRs Done
20,295,305 UART: [art] Lock RT PCRs Done
20,297,048 UART: [art] Populate DV Done
20,302,389 UART: [fht] FMC Alias Private Key: 7
20,303,989 UART: [art] Derive CDI
20,304,808 UART: [art] Store in in slot 0x4
20,347,461 UART: [art] Derive Key Pair
20,348,504 UART: [art] Store priv key in slot 0x5
22,775,452 UART: [art] Derive Key Pair - Done
22,788,456 UART: [art] Signing Cert with AUTHO
22,789,759 UART: RITY.KEYID = 7
24,495,406 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,891 UART: [art] PUB.X = 4424EF244F2F15574D861235A25DC6F853DA17A8ABAD797219211FDB0EEA9E1C596BA45172553117F04A4B88FE98659E
24,504,143 UART: [art] PUB.Y = 618085BCDFEDF4524E05025E2CABD1EF2675752A17638C18FB9386114C31C06EE5E0DD98F745682116D9B793080EE7B6
24,511,436 UART: [art] SIG.R = 3DF9923135E25CB71F100E7CDAA339252A6A682FD0BBE48F59A572B614DF1E0D8707FEA85FE085A7DB8FDB0007ADED98
24,518,833 UART: [art] SIG.S = 03C65EE58263BBE5D3C1368D1AB6B77D2FAF310C277F618D8FA48C4B5E169B39F5B3139474620EF446C03DF233535C14
25,497,848 UART: Caliptra RT
25,498,571 UART: [state] CFI Enabled
25,615,823 UART: [rt] RT listening for mailbox commands...
25,617,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,647,478 UART: [rt]cmd =0x46504c54, len=4
25,649,002 >>> mbox cmd response data (8 bytes)
25,649,790 UART: [rt] FIPS self test
25,650,731 UART: [kat] ++
25,651,184 UART: [kat] sha1
25,655,639 UART: [kat] SHA2-256
25,657,566 UART: [kat] SHA2-384
25,660,533 UART: [kat] SHA2-512-ACC
25,662,800 UART: [kat] ECC-384
28,086,566 UART: Fatal Error: 0x90040005
28,121,943 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,266,357 >>> mbox cmd response: failed
28,266,972 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,411,300 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
15,223,143 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,807,498 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,042 UART:
192,406 UART: Running Caliptra ROM ...
193,606 UART:
193,763 UART: [state] CFI Enabled
261,266 UART: [state] LifecycleState = Unprovisioned
263,672 UART: [state] DebugLocked = No
266,062 UART: [state] WD Timer not started. Device not locked for debugging
270,744 UART: [kat] SHA2-256
460,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,406 UART: [kat] ++
471,859 UART: [kat] sha1
482,454 UART: [kat] SHA2-256
485,473 UART: [kat] SHA2-384
492,414 UART: [kat] SHA2-512-ACC
495,003 UART: [kat] ECC-384
2,950,357 UART: [kat] HMAC-384Kdf
2,973,296 UART: [kat] LMS
3,505,067 UART: [kat] --
3,508,075 UART: [cold-reset] ++
3,509,445 UART: [fht] FHT @ 0x50003400
3,520,714 UART: [idev] ++
3,521,432 UART: [idev] CDI.KEYID = 6
3,522,345 UART: [idev] SUBJECT.KEYID = 7
3,523,596 UART: [idev] UDS.KEYID = 0
3,524,524 ready_for_fw is high
3,524,790 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,489 UART: [idev] Erasing UDS.KEYID = 0
6,031,035 UART: [idev] Sha1 KeyId Algorithm
6,054,735 UART: [idev] --
6,059,655 UART: [ldev] ++
6,060,350 UART: [ldev] CDI.KEYID = 6
6,061,265 UART: [ldev] SUBJECT.KEYID = 5
6,062,431 UART: [ldev] AUTHORITY.KEYID = 7
6,063,665 UART: [ldev] FE.KEYID = 1
6,103,862 UART: [ldev] Erasing FE.KEYID = 1
8,607,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,827 UART: [ldev] --
10,415,494 UART: [fwproc] Wait for Commands...
10,417,809 UART: [fwproc] Recv command 0x46574c44
10,420,076 UART: [fwproc] Recv'd Img size: 114940 bytes
13,865,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,693 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,605,632 >>> mbox cmd response: success
14,608,886 UART: [afmc] ++
14,609,593 UART: [afmc] CDI.KEYID = 6
14,610,784 UART: [afmc] SUBJECT.KEYID = 7
14,612,278 UART: [afmc] AUTHORITY.KEYID = 5
17,153,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,006 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,350 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,980 UART: [afmc] --
18,950,993 UART: [cold-reset] --
18,955,833 UART: [state] Locking Datavault
18,960,198 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,397 UART: [state] Locking ICCM
18,965,415 UART: [exit] Launching FMC @ 0x40000130
18,974,084 UART:
18,974,324 UART: Running Caliptra FMC ...
18,975,428 UART:
18,975,592 UART: [state] CFI Enabled
19,034,874 UART: [fht] FMC Alias Private Key: 7
20,799,438 UART: [art] Extend RT PCRs Done
20,800,689 UART: [art] Lock RT PCRs Done
20,802,505 UART: [art] Populate DV Done
20,807,867 UART: [fht] FMC Alias Private Key: 7
20,809,350 UART: [art] Derive CDI
20,810,113 UART: [art] Store in in slot 0x4
20,868,152 UART: [art] Derive Key Pair
20,869,203 UART: [art] Store priv key in slot 0x5
23,332,140 UART: [art] Derive Key Pair - Done
23,345,246 UART: [art] Signing Cert with AUTHO
23,346,560 UART: RITY.KEYID = 7
25,058,015 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,538 UART: [art] PUB.X = 6B5EE270A1AEE69D3392079656E65ECFA791E924A50227D2D9ABC7AB3A5A90179CD3FA5B74721CBF66FBBBD2CC62C037
25,066,823 UART: [art] PUB.Y = C4A9CE463A846C8AD64E94617B86307A4C2EA49B8FCFCA5DA6DA0E9AEB62418C4DA32FCA13F621958C78C980C067ADE0
25,074,094 UART: [art] SIG.R = C616DF4EBE55EE799EC896BB422319E175BF92DEE25DE111251604C59AB83A7DA3507582B8B591D1054C3D52F2FB1DA6
25,081,502 UART: [art] SIG.S = BB20E5F40DB2640A9F7E343F52D50C9392DF5C366ACCBBB71FC0BF3D35D3EB763A38A838DDF2678B107E127FAE6C86A8
26,060,664 UART: Caliptra RT
26,061,390 UART: [state] CFI Enabled
26,226,905 UART: [rt] RT listening for mailbox commands...
26,228,754 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,258,343 UART: [rt]cmd =0x46504c54, len=4
26,259,864 >>> mbox cmd response data (8 bytes)
26,260,781 UART: [rt] FIPS self test
26,261,725 UART: [kat] ++
26,262,199 UART: [kat] sha1
26,266,821 UART: [kat] SHA2-256
26,268,747 UART: [kat] SHA2-384
26,271,600 UART: [kat] SHA2-512-ACC
26,273,839 UART: [kat] ECC-384
28,708,229 UART: Fatal Error: 0x90040005
28,743,521 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,887,879 >>> mbox cmd response: failed
28,888,551 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,032,884 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,056 UART:
190,348 UART: Running Caliptra ROM ...
191,405 UART:
191,547 UART: [state] CFI Enabled
246,654 UART: [state] LifecycleState = Unprovisioned
249,013 UART: [state] DebugLocked = No
250,184 UART: [state] WD Timer not started. Device not locked for debugging
253,483 UART: [kat] SHA2-256
443,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
454,115 UART: [kat] ++
454,592 UART: [kat] sha1
467,525 UART: [kat] SHA2-256
470,534 UART: [kat] SHA2-384
475,716 UART: [kat] SHA2-512-ACC
478,334 UART: [kat] ECC-384
2,931,815 UART: [kat] HMAC-384Kdf
2,956,439 UART: [kat] LMS
3,488,197 UART: [kat] --
3,493,814 UART: [cold-reset] ++
3,496,426 UART: [fht] FHT @ 0x50003400
3,507,588 UART: [idev] ++
3,508,267 UART: [idev] CDI.KEYID = 6
3,509,206 UART: [idev] SUBJECT.KEYID = 7
3,510,421 UART: [idev] UDS.KEYID = 0
3,511,914 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,656,435 UART: [idev] Erasing UDS.KEYID = 0
6,018,805 UART: [idev] Sha1 KeyId Algorithm
6,041,457 UART: [idev] --
6,046,427 UART: [ldev] ++
6,047,110 UART: [ldev] CDI.KEYID = 6
6,047,994 UART: [ldev] SUBJECT.KEYID = 5
6,049,210 UART: [ldev] AUTHORITY.KEYID = 7
6,050,447 UART: [ldev] FE.KEYID = 1
6,085,774 UART: [ldev] Erasing FE.KEYID = 1
8,590,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,488 UART: [ldev] --
10,400,160 UART: [fwproc] Wait for Commands...
10,402,908 UART: [fwproc] Recv command 0x46574c44
10,405,175 UART: [fwproc] Recv'd Img size: 114940 bytes
13,863,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,810 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,609,165 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,416,465 ready_for_fw is high
3,416,890 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,719,054 >>> mbox cmd response: success
19,001,331 UART:
19,001,738 UART: Running Caliptra FMC ...
19,002,858 UART:
19,003,038 UART: [state] CFI Enabled
19,066,077 UART: [fht] FMC Alias Private Key: 7
20,828,909 UART: [art] Extend RT PCRs Done
20,830,141 UART: [art] Lock RT PCRs Done
20,831,900 UART: [art] Populate DV Done
20,837,202 UART: [fht] FMC Alias Private Key: 7
20,838,738 UART: [art] Derive CDI
20,839,474 UART: [art] Store in in slot 0x4
20,898,516 UART: [art] Derive Key Pair
20,899,512 UART: [art] Store priv key in slot 0x5
23,362,474 UART: [art] Derive Key Pair - Done
23,375,575 UART: [art] Signing Cert with AUTHO
23,376,877 UART: RITY.KEYID = 7
25,088,791 UART: [art] Erasing AUTHORITY.KEYID = 7
25,090,301 UART: [art] PUB.X = CD7C30107411284D6B00203D6F476B2D1083AE0A1F730AAEF50CAFBFDE0EDE1050AF6C527A99E649CAED4E34814ACF5E
25,097,570 UART: [art] PUB.Y = 7E9E5204C7493945641BA1D513AA49FA2B6DAB6CC20CA9C3EA7929B8AB8C23BC327D7FE3073608A0980A66331D2312A3
25,104,790 UART: [art] SIG.R = 85CB4E036D47CFF19F51419CAFC4DB2EC83645F05B32CE5F8CD73E93FEB3F244C53BB814036D0F280BF1C529FA0CEFA8
25,112,244 UART: [art] SIG.S = 8B2EC807929098111FD353C6F3B912F1D44C649EFAB80124B4D75A875E079FE8EB369F14B25573D0490222872E6A2507
26,090,617 UART: Caliptra RT
26,091,335 UART: [state] CFI Enabled
26,258,079 UART: [rt] RT listening for mailbox commands...
26,259,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,289,696 UART: [rt]cmd =0x46504c54, len=4
26,291,364 >>> mbox cmd response data (8 bytes)
26,292,421 UART: [rt] FIPS self test
26,293,372 UART: [kat] ++
26,293,822 UART: [kat] sha1
26,298,386 UART: [kat] SHA2-256
26,300,313 UART: [kat] SHA2-384
26,303,466 UART: [kat] SHA2-512-ACC
26,305,763 UART: [kat] ECC-384
28,740,184 UART: Fatal Error: 0x90040005
28,775,649 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,920,088 >>> mbox cmd response: failed
28,920,742 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,065,019 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,422,823 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,730,661 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,548 UART:
192,914 UART: Running Caliptra ROM ...
194,044 UART:
603,608 UART: [state] CFI Enabled
615,079 UART: [state] LifecycleState = Unprovisioned
617,413 UART: [state] DebugLocked = No
618,667 UART: [state] WD Timer not started. Device not locked for debugging
622,500 UART: [kat] SHA2-256
812,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,192 UART: [kat] ++
823,638 UART: [kat] sha1
834,870 UART: [kat] SHA2-256
837,949 UART: [kat] SHA2-384
844,825 UART: [kat] SHA2-512-ACC
847,378 UART: [kat] ECC-384
3,291,564 UART: [kat] HMAC-384Kdf
3,304,658 UART: [kat] LMS
3,836,516 UART: [kat] --
3,838,724 UART: [cold-reset] ++
3,840,958 UART: [fht] FHT @ 0x50003400
3,852,512 UART: [idev] ++
3,853,172 UART: [idev] CDI.KEYID = 6
3,854,128 UART: [idev] SUBJECT.KEYID = 7
3,855,374 UART: [idev] UDS.KEYID = 0
3,856,310 ready_for_fw is high
3,856,519 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,000,978 UART: [idev] Erasing UDS.KEYID = 0
6,333,749 UART: [idev] Sha1 KeyId Algorithm
6,355,213 UART: [idev] --
6,360,229 UART: [ldev] ++
6,360,910 UART: [ldev] CDI.KEYID = 6
6,361,997 UART: [ldev] SUBJECT.KEYID = 5
6,363,054 UART: [ldev] AUTHORITY.KEYID = 7
6,364,173 UART: [ldev] FE.KEYID = 1
6,373,928 UART: [ldev] Erasing FE.KEYID = 1
8,850,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,259 UART: [ldev] --
10,643,018 UART: [fwproc] Wait for Commands...
10,645,874 UART: [fwproc] Recv command 0x46574c44
10,648,132 UART: [fwproc] Recv'd Img size: 114940 bytes
14,096,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,351 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,837,901 >>> mbox cmd response: success
14,841,279 UART: [afmc] ++
14,842,049 UART: [afmc] CDI.KEYID = 6
14,843,193 UART: [afmc] SUBJECT.KEYID = 7
14,844,625 UART: [afmc] AUTHORITY.KEYID = 5
17,346,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,549 UART: [afmc] --
19,144,844 UART: [cold-reset] --
19,147,673 UART: [state] Locking Datavault
19,152,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,841 UART: [state] Locking ICCM
19,157,048 UART: [exit] Launching FMC @ 0x40000130
19,165,666 UART:
19,165,940 UART: Running Caliptra FMC ...
19,167,051 UART:
19,167,227 UART: [state] CFI Enabled
19,175,222 UART: [fht] FMC Alias Private Key: 7
20,933,109 UART: [art] Extend RT PCRs Done
20,934,332 UART: [art] Lock RT PCRs Done
20,935,765 UART: [art] Populate DV Done
20,941,018 UART: [fht] FMC Alias Private Key: 7
20,942,557 UART: [art] Derive CDI
20,943,375 UART: [art] Store in in slot 0x4
20,985,535 UART: [art] Derive Key Pair
20,986,528 UART: [art] Store priv key in slot 0x5
23,413,362 UART: [art] Derive Key Pair - Done
23,426,246 UART: [art] Signing Cert with AUTHO
23,427,555 UART: RITY.KEYID = 7
25,133,011 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,523 UART: [art] PUB.X = 85EC4EE14BB852BD405047550C7C39D80D4C5DEC28F50727F0EE30244CB514B8531CE293A595ED01FDD8E2464820FF73
25,141,777 UART: [art] PUB.Y = 466877AEA55EBF6AFBC2FB440699344737C22924CAD783BFCBD40AD0FE508E301B7C15B6D037D32ECE1DB30E6FBCBB9A
25,149,021 UART: [art] SIG.R = 46F8EA658B21DE95AE18D87C76391551EB4E0622A513876AC842EEF472B7D178EF74A2747AFE06C6E9BF6CCFFFB2E9B4
25,156,467 UART: [art] SIG.S = A368B0D7D251CF2448D1CC944998EBB27EAB7DA88BB4E49598B694B656D0DF8D4A4781772CDBB3F91D6D89E25CEAACF6
26,134,990 UART: Caliptra RT
26,135,707 UART: [state] CFI Enabled
26,252,719 UART: [rt] RT listening for mailbox commands...
26,254,564 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,284,294 UART: [rt]cmd =0x46504c54, len=4
26,286,006 >>> mbox cmd response data (8 bytes)
26,287,294 UART: [rt] FIPS self test
26,288,237 UART: [kat] ++
26,288,691 UART: [kat] sha1
26,293,035 UART: [kat] SHA2-256
26,294,971 UART: [kat] SHA2-384
26,297,874 UART: [kat] SHA2-512-ACC
26,300,166 UART: [kat] ECC-384
28,723,889 UART: Fatal Error: 0x90040005
28,759,181 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,903,541 >>> mbox cmd response: failed
28,904,185 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,048,448 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,135 UART:
190,424 UART: Running Caliptra ROM ...
191,445 UART:
11,473,453 UART: [state] CFI Enabled
11,488,093 UART: [state] LifecycleState = Unprovisioned
11,490,436 UART: [state] DebugLocked = No
11,491,952 UART: [state] WD Timer not started. Device not locked for debugging
11,496,445 UART: [kat] SHA2-256
11,686,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,697,079 UART: [kat] ++
11,697,594 UART: [kat] sha1
11,708,856 UART: [kat] SHA2-256
11,711,837 UART: [kat] SHA2-384
11,718,455 UART: [kat] SHA2-512-ACC
11,721,032 UART: [kat] ECC-384
14,160,203 UART: [kat] HMAC-384Kdf
14,173,085 UART: [kat] LMS
14,704,884 UART: [kat] --
14,711,197 UART: [cold-reset] ++
14,712,263 UART: [fht] FHT @ 0x50003400
14,724,752 UART: [idev] ++
14,725,430 UART: [idev] CDI.KEYID = 6
14,726,443 UART: [idev] SUBJECT.KEYID = 7
14,727,600 UART: [idev] UDS.KEYID = 0
14,729,118 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,873,389 UART: [idev] Erasing UDS.KEYID = 0
17,202,209 UART: [idev] Sha1 KeyId Algorithm
17,224,203 UART: [idev] --
17,228,810 UART: [ldev] ++
17,229,548 UART: [ldev] CDI.KEYID = 6
17,230,457 UART: [ldev] SUBJECT.KEYID = 5
17,231,614 UART: [ldev] AUTHORITY.KEYID = 7
17,233,000 UART: [ldev] FE.KEYID = 1
17,243,068 UART: [ldev] Erasing FE.KEYID = 1
19,719,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,441,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,456,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,471,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,486,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,507,065 UART: [ldev] --
21,512,006 UART: [fwproc] Wait for Commands...
21,514,701 UART: [fwproc] Recv command 0x46574c44
21,517,028 UART: [fwproc] Recv'd Img size: 114940 bytes
24,968,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,044,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,160,234 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,705,693 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,756,684 ready_for_fw is high
3,757,495 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,975,912 >>> mbox cmd response: success
19,230,730 UART:
19,231,123 UART: Running Caliptra FMC ...
19,232,266 UART:
19,232,433 UART: [state] CFI Enabled
19,240,608 UART: [fht] FMC Alias Private Key: 7
20,997,281 UART: [art] Extend RT PCRs Done
20,998,494 UART: [art] Lock RT PCRs Done
21,000,200 UART: [art] Populate DV Done
21,005,520 UART: [fht] FMC Alias Private Key: 7
21,007,067 UART: [art] Derive CDI
21,007,898 UART: [art] Store in in slot 0x4
21,050,880 UART: [art] Derive Key Pair
21,051,881 UART: [art] Store priv key in slot 0x5
23,478,964 UART: [art] Derive Key Pair - Done
23,492,029 UART: [art] Signing Cert with AUTHO
23,493,337 UART: RITY.KEYID = 7
25,198,831 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,328 UART: [art] PUB.X = F7F1626D4832C9538F322DA67D7A6523BCF4C61D381DDBF3ED56F6386568F7EEB7E32553F38F3BC35E0947C2727D80F3
25,207,570 UART: [art] PUB.Y = 7DD3B813CEC392FDF028A2115BEA88553B7E1023DFC7E041C6EE10C41F307DDD77FDA0595D61742EBCA9849ECF0489EB
25,214,914 UART: [art] SIG.R = B3D21A11CACCFA62E30EE42D6E5ECFBE6FBE1860CB1823DF8A6F5EEC690A583114FDCCF20E96C71B3BB1EBB23FE4BD32
25,222,453 UART: [art] SIG.S = 7A0772D331F2BBA750D40BED89B5CF1551E0547B4BF6B6CFD221ADE04C2483D51FA235B15F14A95E93BB547765CFC069
26,202,165 UART: Caliptra RT
26,202,852 UART: [state] CFI Enabled
26,320,146 UART: [rt] RT listening for mailbox commands...
26,321,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,554 UART: [rt]cmd =0x46504c54, len=4
26,353,326 >>> mbox cmd response data (8 bytes)
26,354,541 UART: [rt] FIPS self test
26,355,486 UART: [kat] ++
26,355,936 UART: [kat] sha1
26,360,390 UART: [kat] SHA2-256
26,362,319 UART: [kat] SHA2-384
26,365,548 UART: [kat] SHA2-512-ACC
26,367,803 UART: [kat] ECC-384
28,791,914 UART: Fatal Error: 0x90040005
28,827,304 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,971,587 >>> mbox cmd response: failed
28,972,230 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,116,506 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
14,577,386 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,788,575 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
894,980 UART: [kat] SHA2-512-ACC
896,881 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,166 UART: [kat] LMS
1,475,362 UART: [kat] --
1,476,061 UART: [cold-reset] ++
1,476,555 UART: [fht] Storing FHT @ 0x50003400
1,479,390 UART: [idev] ++
1,479,558 UART: [idev] CDI.KEYID = 6
1,479,918 UART: [idev] SUBJECT.KEYID = 7
1,480,342 UART: [idev] UDS.KEYID = 0
1,480,687 ready_for_fw is high
1,480,687 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,288 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,600 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,287 UART: [fwproc] Waiting for Commands...
1,586,942 UART: [fwproc] Received command 0x46574c44
1,587,733 UART: [fwproc] Received Image of size 114940 bytes
2,893,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,027 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,242 >>> mbox cmd response: success
3,088,258 UART: [afmc] ++
3,088,426 UART: [afmc] CDI.KEYID = 6
3,088,788 UART: [afmc] SUBJECT.KEYID = 7
3,089,213 UART: [afmc] AUTHORITY.KEYID = 5
3,124,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,329 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,019 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,876 UART: [afmc] --
3,167,768 UART: [cold-reset] --
3,168,604 UART: [state] Locking Datavault
3,169,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,191 UART: [state] Locking ICCM
3,170,625 UART: [exit] Launching FMC @ 0x40000130
3,175,954 UART:
3,175,970 UART: Running Caliptra FMC ...
3,176,378 UART:
3,176,432 UART: [state] CFI Enabled
3,186,727 UART: [fht] FMC Alias Private Key: 7
3,294,424 UART: [art] Extend RT PCRs Done
3,294,852 UART: [art] Lock RT PCRs Done
3,296,526 UART: [art] Populate DV Done
3,304,753 UART: [fht] FMC Alias Private Key: 7
3,305,861 UART: [art] Derive CDI
3,306,141 UART: [art] Store in in slot 0x4
3,391,838 UART: [art] Derive Key Pair
3,392,198 UART: [art] Store priv key in slot 0x5
3,405,048 UART: [art] Derive Key Pair - Done
3,419,693 UART: [art] Signing Cert with AUTHO
3,420,173 UART: RITY.KEYID = 7
3,435,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,106 UART: [art] PUB.X = 412B1A13AB1DA8D5E87E5F75FD9B705B98F97EC38C0B28C01EEA9B649A00F1E7049D24E92E23EFEEDCBA23782144B7C1
3,442,866 UART: [art] PUB.Y = 8B3A8DF2DE8B4C325A13CD53384A79D8900E538A687ADCC9AC41328B68F9680515B54B354E51B14431B6FFDF922E27F0
3,449,816 UART: [art] SIG.R = D194EA21BA9A7C42AB33044D8AA5B671C1870198060EBFFE92F14A0262D274BE645EAA4F8E488E56E55B15CB208D9FBE
3,456,585 UART: [art] SIG.S = 7B313AF7875CD48D741BDD6EB6E8978ABD287CF9D0A94DF769346D04ADD8B71AAF6551F522EB31AFDA77A4F5DE73C1E9
3,480,729 UART: Caliptra RT
3,480,982 UART: [state] CFI Enabled
3,589,793 UART: [rt] RT listening for mailbox commands...
3,590,456 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,965 UART: [rt]cmd =0x46504c54, len=4
3,621,103 >>> mbox cmd response data (8 bytes)
3,621,400 UART: [rt] FIPS self test
3,621,728 UART: [kat] ++
3,621,880 UART: [kat] sha1
3,625,978 UART: [kat] SHA2-256
3,628,000 UART: [kat] SHA2-384
3,630,817 UART: [kat] SHA2-512-ACC
3,632,744 UART: [kat] ECC-384
3,641,671 UART: Fatal Error: 0x90040005
3,643,210 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,643,215 >>> mbox cmd response: failed
3,643,215 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,643,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,785 UART: [kat] SHA2-256
881,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,831 UART: [kat] ++
885,983 UART: [kat] sha1
890,269 UART: [kat] SHA2-256
892,207 UART: [kat] SHA2-384
894,986 UART: [kat] SHA2-512-ACC
896,887 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
907,000 UART: [kat] LMS
1,475,196 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,684 UART: [idev] ++
1,479,852 UART: [idev] CDI.KEYID = 6
1,480,212 UART: [idev] SUBJECT.KEYID = 7
1,480,636 UART: [idev] UDS.KEYID = 0
1,480,981 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,058 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,084 UART: [idev] --
1,515,089 UART: [ldev] ++
1,515,257 UART: [ldev] CDI.KEYID = 6
1,515,620 UART: [ldev] SUBJECT.KEYID = 5
1,516,046 UART: [ldev] AUTHORITY.KEYID = 7
1,516,509 UART: [ldev] FE.KEYID = 1
1,521,471 UART: [ldev] Erasing FE.KEYID = 1
1,547,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,248 UART: [ldev] --
1,586,633 UART: [fwproc] Waiting for Commands...
1,587,430 UART: [fwproc] Received command 0x46574c44
1,588,221 UART: [fwproc] Received Image of size 114940 bytes
2,893,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,020 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 ready_for_fw is high
1,363,159 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,416 >>> mbox cmd response: success
2,997,400 UART:
2,997,416 UART: Running Caliptra FMC ...
2,997,824 UART:
2,997,878 UART: [state] CFI Enabled
3,008,585 UART: [fht] FMC Alias Private Key: 7
3,117,104 UART: [art] Extend RT PCRs Done
3,117,532 UART: [art] Lock RT PCRs Done
3,119,308 UART: [art] Populate DV Done
3,127,749 UART: [fht] FMC Alias Private Key: 7
3,128,757 UART: [art] Derive CDI
3,129,037 UART: [art] Store in in slot 0x4
3,214,536 UART: [art] Derive Key Pair
3,214,896 UART: [art] Store priv key in slot 0x5
3,227,680 UART: [art] Derive Key Pair - Done
3,242,409 UART: [art] Signing Cert with AUTHO
3,242,889 UART: RITY.KEYID = 7
3,258,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,154 UART: [art] PUB.X = 192C1409265F36BFC6A7D1954C0016258154BA46BD4B492BB60C5C968380FE53F5B163CF9543040E69BEFA334ECBCD28
3,265,894 UART: [art] PUB.Y = 2F54C723DF4707343CD891EF19E5CEA12AD697B630F772D104D7756AD108F4212FD5F3C79B46245E35183B2CB7AD3CDB
3,272,843 UART: [art] SIG.R = 5D46CDB6AFB9306D8C6B926B1A96DBFA544BAEB80B9641263263B6A4BB85FA19958511AC30FB07138D09C77514C13FBA
3,279,616 UART: [art] SIG.S = B801688D4546BD15DD824AE78588138151B6826B3B5497D7E40BB11121A6AA5EC2C90C5D3562FE52DE56817FF0413F5A
3,303,448 UART: Caliptra RT
3,303,701 UART: [state] CFI Enabled
3,411,800 UART: [rt] RT listening for mailbox commands...
3,412,463 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,410 UART: [rt]cmd =0x46504c54, len=4
3,443,778 >>> mbox cmd response data (8 bytes)
3,444,107 UART: [rt] FIPS self test
3,444,435 UART: [kat] ++
3,444,587 UART: [kat] sha1
3,448,641 UART: [kat] SHA2-256
3,450,663 UART: [kat] SHA2-384
3,453,280 UART: [kat] SHA2-512-ACC
3,455,207 UART: [kat] ECC-384
3,464,116 UART: Fatal Error: 0x90040005
3,465,655 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,465,660 >>> mbox cmd response: failed
3,465,660 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,465,665 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,095 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,590 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,410 UART: [kat] SHA2-256
892,348 UART: [kat] SHA2-384
895,003 UART: [kat] SHA2-512-ACC
896,904 UART: [kat] ECC-384
902,383 UART: [kat] HMAC-384Kdf
907,093 UART: [kat] LMS
1,475,289 UART: [kat] --
1,476,164 UART: [cold-reset] ++
1,476,726 UART: [fht] Storing FHT @ 0x50003400
1,479,651 UART: [idev] ++
1,479,819 UART: [idev] CDI.KEYID = 6
1,480,179 UART: [idev] SUBJECT.KEYID = 7
1,480,603 UART: [idev] UDS.KEYID = 0
1,480,948 ready_for_fw is high
1,480,948 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,865 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,409 UART: [idev] --
1,515,568 UART: [ldev] ++
1,515,736 UART: [ldev] CDI.KEYID = 6
1,516,099 UART: [ldev] SUBJECT.KEYID = 5
1,516,525 UART: [ldev] AUTHORITY.KEYID = 7
1,516,988 UART: [ldev] FE.KEYID = 1
1,522,406 UART: [ldev] Erasing FE.KEYID = 1
1,548,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,587,030 UART: [fwproc] Waiting for Commands...
1,587,821 UART: [fwproc] Received command 0x46574c44
1,588,612 UART: [fwproc] Received Image of size 114940 bytes
2,893,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,331 >>> mbox cmd response: success
3,088,567 UART: [afmc] ++
3,088,735 UART: [afmc] CDI.KEYID = 6
3,089,097 UART: [afmc] SUBJECT.KEYID = 7
3,089,522 UART: [afmc] AUTHORITY.KEYID = 5
3,124,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,414 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,104 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,909 UART: [afmc] --
3,167,935 UART: [cold-reset] --
3,168,889 UART: [state] Locking Datavault
3,169,838 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,442 UART: [state] Locking ICCM
3,171,070 UART: [exit] Launching FMC @ 0x40000130
3,176,399 UART:
3,176,415 UART: Running Caliptra FMC ...
3,176,823 UART:
3,176,966 UART: [state] CFI Enabled
3,187,301 UART: [fht] FMC Alias Private Key: 7
3,295,156 UART: [art] Extend RT PCRs Done
3,295,584 UART: [art] Lock RT PCRs Done
3,296,922 UART: [art] Populate DV Done
3,305,387 UART: [fht] FMC Alias Private Key: 7
3,306,337 UART: [art] Derive CDI
3,306,617 UART: [art] Store in in slot 0x4
3,392,360 UART: [art] Derive Key Pair
3,392,720 UART: [art] Store priv key in slot 0x5
3,406,368 UART: [art] Derive Key Pair - Done
3,420,758 UART: [art] Signing Cert with AUTHO
3,421,238 UART: RITY.KEYID = 7
3,436,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,557 UART: [art] PUB.X = F5B417F91E5858AFEE11BBD8F6EE076B4181232C2FA81BC0253E70EC9F63668B9678A98DEBD350AA7298CE0E8CD41049
3,444,333 UART: [art] PUB.Y = FCE5FEAC182C9BE7F8AB321F3AC142075D0DE3F7BEC2420F78479E054E42A66A8EA3274C4953037EB9A70E68328C1AFA
3,451,281 UART: [art] SIG.R = 22A07D372F0AEF9237A350EF59009A46F5A00D9FC20FF9988AF0FFE3645C564FC5C23411B5BA9999BA3A794E17ABEA40
3,458,032 UART: [art] SIG.S = 00A25247DF745CF114706E67DC8E6731682BA3DB65280FB53B081AB86F33ADC3EB66F8EF98DA564E70CAC1D45A52EA5C
3,482,353 UART: Caliptra RT
3,482,698 UART: [state] CFI Enabled
3,590,891 UART: [rt] RT listening for mailbox commands...
3,591,554 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,295 UART: [rt]cmd =0x46504c54, len=4
3,622,583 >>> mbox cmd response data (8 bytes)
3,622,850 UART: [rt] FIPS self test
3,623,178 UART: [kat] ++
3,623,330 UART: [kat] sha1
3,627,610 UART: [kat] SHA2-256
3,629,632 UART: [kat] SHA2-384
3,632,541 UART: [kat] SHA2-512-ACC
3,634,468 UART: [kat] ECC-384
3,642,919 UART: Fatal Error: 0x90040005
3,644,458 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,644,463 >>> mbox cmd response: failed
3,644,463 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,644,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,365 UART: [kat] SHA2-512-ACC
897,266 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,810 UART: [cold-reset] ++
1,477,376 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,209 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,611 UART: [idev] --
1,515,516 UART: [ldev] ++
1,515,684 UART: [ldev] CDI.KEYID = 6
1,516,047 UART: [ldev] SUBJECT.KEYID = 5
1,516,473 UART: [ldev] AUTHORITY.KEYID = 7
1,516,936 UART: [ldev] FE.KEYID = 1
1,522,220 UART: [ldev] Erasing FE.KEYID = 1
1,546,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,107 UART: [ldev] --
1,586,488 UART: [fwproc] Waiting for Commands...
1,587,141 UART: [fwproc] Received command 0x46574c44
1,587,932 UART: [fwproc] Received Image of size 114940 bytes
2,894,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,424 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,637 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,374 ready_for_fw is high
1,362,374 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,075 >>> mbox cmd response: success
2,998,257 UART:
2,998,273 UART: Running Caliptra FMC ...
2,998,681 UART:
2,998,824 UART: [state] CFI Enabled
3,009,303 UART: [fht] FMC Alias Private Key: 7
3,116,908 UART: [art] Extend RT PCRs Done
3,117,336 UART: [art] Lock RT PCRs Done
3,118,644 UART: [art] Populate DV Done
3,126,831 UART: [fht] FMC Alias Private Key: 7
3,127,869 UART: [art] Derive CDI
3,128,149 UART: [art] Store in in slot 0x4
3,213,896 UART: [art] Derive Key Pair
3,214,256 UART: [art] Store priv key in slot 0x5
3,227,352 UART: [art] Derive Key Pair - Done
3,242,110 UART: [art] Signing Cert with AUTHO
3,242,590 UART: RITY.KEYID = 7
3,257,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,709 UART: [art] PUB.X = 531961DD3E9DF7288C530BF99C671B85303C9F0492DB140B1CE4B51CDEF52F41EFFF0F67997D659A078961E0BC9ECAAD
3,265,478 UART: [art] PUB.Y = 070A35394E63D170E29150A068091A59288D51DB0B37FC4EA8BDF13C6C351000E7F4AC1FD4746F7CA6EB2CD630BF4099
3,272,400 UART: [art] SIG.R = 319919FD792B1EB8C7DCEA53EEBFC6BBC1F18FDE260E9D0F10A5026D44A54E0F4EEE41F4465915737BC96ECE148BEB18
3,279,180 UART: [art] SIG.S = D62DB346D831A4323D14502CA6FBA433BA2408B31936ED08B3B6A084EC2E2324056D804AF293382EC6C50937C4902126
3,302,817 UART: Caliptra RT
3,303,162 UART: [state] CFI Enabled
3,412,699 UART: [rt] RT listening for mailbox commands...
3,413,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,891 UART: [rt]cmd =0x46504c54, len=4
3,444,079 >>> mbox cmd response data (8 bytes)
3,444,270 UART: [rt] FIPS self test
3,444,598 UART: [kat] ++
3,444,750 UART: [kat] sha1
3,449,132 UART: [kat] SHA2-256
3,451,154 UART: [kat] SHA2-384
3,454,057 UART: [kat] SHA2-512-ACC
3,455,984 UART: [kat] ECC-384
3,464,927 UART: Fatal Error: 0x90040005
3,466,466 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,466,471 >>> mbox cmd response: failed
3,466,471 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,466,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,660 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,873 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,586 UART: [kat] LMS
1,170,914 UART: [kat] --
1,171,871 UART: [cold-reset] ++
1,172,345 UART: [fht] FHT @ 0x50003400
1,174,984 UART: [idev] ++
1,175,152 UART: [idev] CDI.KEYID = 6
1,175,512 UART: [idev] SUBJECT.KEYID = 7
1,175,936 UART: [idev] UDS.KEYID = 0
1,176,281 ready_for_fw is high
1,176,281 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,102 UART: [idev] Erasing UDS.KEYID = 0
1,201,039 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,325 UART: [ldev] Erasing FE.KEYID = 1
1,243,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,835 UART: [ldev] --
1,283,250 UART: [fwproc] Wait for Commands...
1,283,876 UART: [fwproc] Recv command 0x46574c44
1,284,604 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,764 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,068 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,703 >>> mbox cmd response: success
2,783,929 UART: [afmc] ++
2,784,097 UART: [afmc] CDI.KEYID = 6
2,784,459 UART: [afmc] SUBJECT.KEYID = 7
2,784,884 UART: [afmc] AUTHORITY.KEYID = 5
2,820,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,398 UART: [afmc] --
2,863,464 UART: [cold-reset] --
2,864,478 UART: [state] Locking Datavault
2,865,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,861 UART: [state] Locking ICCM
2,866,313 UART: [exit] Launching FMC @ 0x40000130
2,871,642 UART:
2,871,658 UART: Running Caliptra FMC ...
2,872,066 UART:
2,872,120 UART: [state] CFI Enabled
2,882,447 UART: [fht] FMC Alias Private Key: 7
2,991,078 UART: [art] Extend RT PCRs Done
2,991,506 UART: [art] Lock RT PCRs Done
2,993,162 UART: [art] Populate DV Done
3,001,575 UART: [fht] FMC Alias Private Key: 7
3,002,655 UART: [art] Derive CDI
3,002,935 UART: [art] Store in in slot 0x4
3,088,788 UART: [art] Derive Key Pair
3,089,148 UART: [art] Store priv key in slot 0x5
3,102,210 UART: [art] Derive Key Pair - Done
3,117,043 UART: [art] Signing Cert with AUTHO
3,117,523 UART: RITY.KEYID = 7
3,132,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,586 UART: [art] PUB.X = 20AC51729746053F3BAD55BB76F87FE6A739AD19405AA21010AFB0550C70F186CF330DE54F8F3614E46852E02AD0E518
3,140,349 UART: [art] PUB.Y = A01BBB22E73FC2FC4B41CD7CEB3B169A122F526F1F6B2F6B67961B10BCC82D684583D2B8F69B665EEE2AFC34D4F630AB
3,147,321 UART: [art] SIG.R = A786C5AF85CE02901FFD4062DCE637C1230F5E4E2F3230B0C4A2C31A1E01092AB558031C0F600DC83673BA9CFE742E83
3,154,078 UART: [art] SIG.S = E766523E1E60298A91638B4F26CE1A9F0037AD8B41B57440229C84CB39E0C410764CF6F8AD64F493383F48377916A39B
3,177,471 UART: Caliptra RT
3,177,724 UART: [state] CFI Enabled
3,285,212 UART: [rt] RT listening for mailbox commands...
3,285,875 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,694 UART: [rt]cmd =0x46504c54, len=4
3,316,788 >>> mbox cmd response data (8 bytes)
3,317,097 UART: [rt] FIPS self test
3,317,425 UART: [kat] ++
3,317,577 UART: [kat] sha1
3,321,975 UART: [kat] SHA2-256
3,323,997 UART: [kat] SHA2-384
3,326,790 UART: [kat] SHA2-512-ACC
3,328,717 UART: [kat] ECC-384
3,337,652 UART: Fatal Error: 0x90040005
3,339,191 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,339,196 >>> mbox cmd response: failed
3,339,196 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,339,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [kat] SHA2-256
893,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,923 UART: [kat] ++
898,075 UART: [kat] sha1
902,367 UART: [kat] SHA2-256
904,307 UART: [kat] SHA2-384
907,072 UART: [kat] SHA2-512-ACC
908,973 UART: [kat] ECC-384
918,486 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,171,961 UART: [cold-reset] ++
1,172,299 UART: [fht] FHT @ 0x50003400
1,174,814 UART: [idev] ++
1,174,982 UART: [idev] CDI.KEYID = 6
1,175,342 UART: [idev] SUBJECT.KEYID = 7
1,175,766 UART: [idev] UDS.KEYID = 0
1,176,111 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,209,013 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,090 UART: [ldev] AUTHORITY.KEYID = 7
1,211,553 UART: [ldev] FE.KEYID = 1
1,216,643 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,026 UART: [fwproc] Wait for Commands...
1,282,604 UART: [fwproc] Recv command 0x46574c44
1,283,332 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,430 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,111 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,145 ready_for_fw is high
1,060,145 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,956 >>> mbox cmd response: success
2,695,128 UART:
2,695,144 UART: Running Caliptra FMC ...
2,695,552 UART:
2,695,606 UART: [state] CFI Enabled
2,706,137 UART: [fht] FMC Alias Private Key: 7
2,814,510 UART: [art] Extend RT PCRs Done
2,814,938 UART: [art] Lock RT PCRs Done
2,816,598 UART: [art] Populate DV Done
2,824,863 UART: [fht] FMC Alias Private Key: 7
2,825,901 UART: [art] Derive CDI
2,826,181 UART: [art] Store in in slot 0x4
2,911,912 UART: [art] Derive Key Pair
2,912,272 UART: [art] Store priv key in slot 0x5
2,925,402 UART: [art] Derive Key Pair - Done
2,940,302 UART: [art] Signing Cert with AUTHO
2,940,782 UART: RITY.KEYID = 7
2,955,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,535 UART: [art] PUB.X = 405879F529BAFDE216B2324BE7159D1C24769EC269E49114CF7FB405B241C7F421EB7A9D74644D4A206607EE51F61B91
2,963,299 UART: [art] PUB.Y = B4A1B9D78FE4F281E9BB90A24EA5670B3857A424E2FA83820094FB3C5D83F0CC8656486D3310D35B4EBDFB0A6050901F
2,970,229 UART: [art] SIG.R = BA71F480845AE351EB166592DC0629BE08CC8DC66F9E0AEFA2C275352F385640D590491B0CBDD2D8A30AC8AAE1798946
2,976,994 UART: [art] SIG.S = D81E456B380032E904FC23632631FED402360BF0A8B36DD306B2715EC5272371F5C2E1FA34C7C42F7223C253AE9AC98A
3,000,949 UART: Caliptra RT
3,001,202 UART: [state] CFI Enabled
3,109,114 UART: [rt] RT listening for mailbox commands...
3,109,777 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,414 UART: [rt]cmd =0x46504c54, len=4
3,140,640 >>> mbox cmd response data (8 bytes)
3,140,755 UART: [rt] FIPS self test
3,141,083 UART: [kat] ++
3,141,235 UART: [kat] sha1
3,145,353 UART: [kat] SHA2-256
3,147,375 UART: [kat] SHA2-384
3,150,176 UART: [kat] SHA2-512-ACC
3,152,103 UART: [kat] ECC-384
3,160,774 UART: Fatal Error: 0x90040005
3,162,313 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,162,318 >>> mbox cmd response: failed
3,162,318 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,162,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,429 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,318 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
893,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,388 UART: [kat] ++
897,540 UART: [kat] sha1
901,678 UART: [kat] SHA2-256
903,618 UART: [kat] SHA2-384
906,243 UART: [kat] SHA2-512-ACC
908,144 UART: [kat] ECC-384
917,907 UART: [kat] HMAC-384Kdf
922,387 UART: [kat] LMS
1,170,715 UART: [kat] --
1,171,702 UART: [cold-reset] ++
1,172,120 UART: [fht] FHT @ 0x50003400
1,174,595 UART: [idev] ++
1,174,763 UART: [idev] CDI.KEYID = 6
1,175,123 UART: [idev] SUBJECT.KEYID = 7
1,175,547 UART: [idev] UDS.KEYID = 0
1,175,892 ready_for_fw is high
1,175,892 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,479 UART: [idev] Erasing UDS.KEYID = 0
1,200,676 UART: [idev] Sha1 KeyId Algorithm
1,209,240 UART: [idev] --
1,210,212 UART: [ldev] ++
1,210,380 UART: [ldev] CDI.KEYID = 6
1,210,743 UART: [ldev] SUBJECT.KEYID = 5
1,211,169 UART: [ldev] AUTHORITY.KEYID = 7
1,211,632 UART: [ldev] FE.KEYID = 1
1,217,002 UART: [ldev] Erasing FE.KEYID = 1
1,243,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,218 UART: [ldev] --
1,282,731 UART: [fwproc] Wait for Commands...
1,283,479 UART: [fwproc] Recv command 0x46574c44
1,284,207 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,235 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,539 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,156 >>> mbox cmd response: success
2,783,166 UART: [afmc] ++
2,783,334 UART: [afmc] CDI.KEYID = 6
2,783,696 UART: [afmc] SUBJECT.KEYID = 7
2,784,121 UART: [afmc] AUTHORITY.KEYID = 5
2,819,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,579 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,464 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,833 UART: [afmc] --
2,862,801 UART: [cold-reset] --
2,863,863 UART: [state] Locking Datavault
2,865,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,676 UART: [state] Locking ICCM
2,866,300 UART: [exit] Launching FMC @ 0x40000130
2,871,629 UART:
2,871,645 UART: Running Caliptra FMC ...
2,872,053 UART:
2,872,196 UART: [state] CFI Enabled
2,882,685 UART: [fht] FMC Alias Private Key: 7
2,990,638 UART: [art] Extend RT PCRs Done
2,991,066 UART: [art] Lock RT PCRs Done
2,992,672 UART: [art] Populate DV Done
3,000,953 UART: [fht] FMC Alias Private Key: 7
3,001,937 UART: [art] Derive CDI
3,002,217 UART: [art] Store in in slot 0x4
3,087,766 UART: [art] Derive Key Pair
3,088,126 UART: [art] Store priv key in slot 0x5
3,101,766 UART: [art] Derive Key Pair - Done
3,116,535 UART: [art] Signing Cert with AUTHO
3,117,015 UART: RITY.KEYID = 7
3,132,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,848 UART: [art] PUB.X = DE56C7EBB106749B6D3053CA6544EC59BF12162DDD0F96B7A3ECFDE50FB3680CF4067904654584BEC6221E84E007DC08
3,139,604 UART: [art] PUB.Y = 09B0D25604044B2715B2BBF2DB4C02E5F2E745A57E1B022CB4B8F58B858FCE8392C3FCAE4F14864D40DD1F8E8EF17C3F
3,146,555 UART: [art] SIG.R = 267197223F7B6628F8B50F397F5640C2801518F21F367B218E6165CC8104C7D9B2724B95C88A4FDC134E2D215A7EE47B
3,153,313 UART: [art] SIG.S = 11F0DE5A139E5AE5D88ACFCBDCCA3DD2E2F6862D0C36F829E77A563CA2F049286E7F138F50FD01E38EA487CBA6B15413
3,177,120 UART: Caliptra RT
3,177,465 UART: [state] CFI Enabled
3,285,578 UART: [rt] RT listening for mailbox commands...
3,286,241 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,082 UART: [rt]cmd =0x46504c54, len=4
3,317,192 >>> mbox cmd response data (8 bytes)
3,317,335 UART: [rt] FIPS self test
3,317,663 UART: [kat] ++
3,317,815 UART: [kat] sha1
3,321,991 UART: [kat] SHA2-256
3,324,013 UART: [kat] SHA2-384
3,326,874 UART: [kat] SHA2-512-ACC
3,328,801 UART: [kat] ECC-384
3,337,198 UART: Fatal Error: 0x90040005
3,338,737 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,338,742 >>> mbox cmd response: failed
3,338,742 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,338,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
893,521 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,646 UART: [kat] ++
897,798 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
917,935 UART: [kat] HMAC-384Kdf
922,643 UART: [kat] LMS
1,170,971 UART: [kat] --
1,172,018 UART: [cold-reset] ++
1,172,510 UART: [fht] FHT @ 0x50003400
1,175,171 UART: [idev] ++
1,175,339 UART: [idev] CDI.KEYID = 6
1,175,699 UART: [idev] SUBJECT.KEYID = 7
1,176,123 UART: [idev] UDS.KEYID = 0
1,176,468 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,189 UART: [idev] Erasing UDS.KEYID = 0
1,201,678 UART: [idev] Sha1 KeyId Algorithm
1,210,220 UART: [idev] --
1,211,224 UART: [ldev] ++
1,211,392 UART: [ldev] CDI.KEYID = 6
1,211,755 UART: [ldev] SUBJECT.KEYID = 5
1,212,181 UART: [ldev] AUTHORITY.KEYID = 7
1,212,644 UART: [ldev] FE.KEYID = 1
1,218,048 UART: [ldev] Erasing FE.KEYID = 1
1,244,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,898 UART: [ldev] --
1,284,221 UART: [fwproc] Wait for Commands...
1,284,877 UART: [fwproc] Recv command 0x46574c44
1,285,605 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,999 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,612 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,522 ready_for_fw is high
1,060,522 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,161 >>> mbox cmd response: success
2,696,891 UART:
2,696,907 UART: Running Caliptra FMC ...
2,697,315 UART:
2,697,458 UART: [state] CFI Enabled
2,708,185 UART: [fht] FMC Alias Private Key: 7
2,815,734 UART: [art] Extend RT PCRs Done
2,816,162 UART: [art] Lock RT PCRs Done
2,817,738 UART: [art] Populate DV Done
2,826,227 UART: [fht] FMC Alias Private Key: 7
2,827,253 UART: [art] Derive CDI
2,827,533 UART: [art] Store in in slot 0x4
2,913,072 UART: [art] Derive Key Pair
2,913,432 UART: [art] Store priv key in slot 0x5
2,927,164 UART: [art] Derive Key Pair - Done
2,941,997 UART: [art] Signing Cert with AUTHO
2,942,477 UART: RITY.KEYID = 7
2,957,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,516 UART: [art] PUB.X = CB06B8F0F7D669BD3AC77872C886F9DBE039E59E13BDFCFF10B7D4C57538013DB66FACF7DF2746A14196D412BEB243AF
2,965,300 UART: [art] PUB.Y = B446F262769220D311B62B9798FEFBE77802FA015C3D87FA6E77790A7F280657C3C73A8783A7011E2573F8C2CCCE440B
2,972,232 UART: [art] SIG.R = 3E65C184C24CD705658C4E57C478DFF0AC846597A275F3594B64292161340FD6D4933120EB5D136E2809FC2C8FB52827
2,978,987 UART: [art] SIG.S = E981C3A1A61636C905E11CA5657A83A137BA1AA47385B5B79A79F2D79582BE2F73BA6B2B0CEFC1B67021612BC47E94CD
3,002,702 UART: Caliptra RT
3,003,047 UART: [state] CFI Enabled
3,110,974 UART: [rt] RT listening for mailbox commands...
3,111,637 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,378 UART: [rt]cmd =0x46504c54, len=4
3,142,578 >>> mbox cmd response data (8 bytes)
3,142,785 UART: [rt] FIPS self test
3,143,113 UART: [kat] ++
3,143,265 UART: [kat] sha1
3,147,565 UART: [kat] SHA2-256
3,149,587 UART: [kat] SHA2-384
3,152,332 UART: [kat] SHA2-512-ACC
3,154,259 UART: [kat] ECC-384
3,163,298 UART: Fatal Error: 0x90040005
3,164,837 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,164,842 >>> mbox cmd response: failed
3,164,842 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,164,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,849 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,929 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,173,965 ready_for_fw is high
1,173,965 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,351 UART: [idev] Sha1 KeyId Algorithm
1,207,153 UART: [idev] --
1,208,104 UART: [ldev] ++
1,208,272 UART: [ldev] CDI.KEYID = 6
1,208,636 UART: [ldev] SUBJECT.KEYID = 5
1,209,063 UART: [ldev] AUTHORITY.KEYID = 7
1,209,526 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,194 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x46574c44
1,282,224 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,541 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,153 >>> mbox cmd response: success
2,781,374 UART: [afmc] ++
2,781,542 UART: [afmc] CDI.KEYID = 6
2,781,905 UART: [afmc] SUBJECT.KEYID = 7
2,782,331 UART: [afmc] AUTHORITY.KEYID = 5
2,817,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,125 UART: [afmc] --
2,861,185 UART: [cold-reset] --
2,861,929 UART: [state] Locking Datavault
2,862,976 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,580 UART: [state] Locking ICCM
2,864,120 UART: [exit] Launching FMC @ 0x40000130
2,869,449 UART:
2,869,465 UART: Running Caliptra FMC ...
2,869,873 UART:
2,869,927 UART: [state] CFI Enabled
2,880,898 UART: [fht] FMC Alias Private Key: 7
2,988,603 UART: [art] Extend RT PCRs Done
2,989,031 UART: [art] Lock RT PCRs Done
2,990,755 UART: [art] Populate DV Done
2,998,924 UART: [fht] FMC Alias Private Key: 7
2,999,858 UART: [art] Derive CDI
3,000,138 UART: [art] Store in in slot 0x4
3,085,537 UART: [art] Derive Key Pair
3,085,897 UART: [art] Store priv key in slot 0x5
3,099,371 UART: [art] Derive Key Pair - Done
3,114,348 UART: [art] Signing Cert with AUTHO
3,114,828 UART: RITY.KEYID = 7
3,130,358 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,123 UART: [art] PUB.X = E60842727FACEF1CE53A72E3E693FBECE15A077EE157774D8A534AF607644198851F4EAB24BE034A70A7E3A9909049E8
3,137,887 UART: [art] PUB.Y = 232A535840CF2A6652D9E06527C8F692683B5639F1936831F608CABD8F67C2CED7F35A55A2431842694427BE78A3EDB5
3,144,830 UART: [art] SIG.R = EB4F6EAB829118A7A9D96975AEA72C60B153E0634C33C235114C1A19A01781BB238152876C6B0C2A04A07A43F53C4B81
3,151,594 UART: [art] SIG.S = 2F35F620322C989A1BB6557843CF125EFFDF934234B2B9191505F9E7B4B816AE91D52703D56DA002D4AA202C848D767B
3,175,118 UART: Caliptra RT
3,175,371 UART: [state] CFI Enabled
3,282,926 UART: [rt] RT listening for mailbox commands...
3,283,589 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,446 UART: [rt]cmd =0x46504c54, len=4
3,314,552 >>> mbox cmd response data (8 bytes)
3,314,801 UART: [rt] FIPS self test
3,315,129 UART: [kat] ++
3,315,281 UART: [kat] sha1
3,319,609 UART: [kat] SHA2-256
3,321,631 UART: [kat] SHA2-384
3,324,578 UART: [kat] SHA2-512-ACC
3,326,505 UART: [kat] ECC-384
3,335,140 UART: Fatal Error: 0x90040005
3,336,679 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,336,684 >>> mbox cmd response: failed
3,336,684 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,336,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,023 UART: [kat] ++
895,175 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,688 UART: [kat] LMS
1,169,000 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,291 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,834 UART: [ldev] ++
1,209,002 UART: [ldev] CDI.KEYID = 6
1,209,366 UART: [ldev] SUBJECT.KEYID = 5
1,209,793 UART: [ldev] AUTHORITY.KEYID = 7
1,210,256 UART: [ldev] FE.KEYID = 1
1,215,388 UART: [ldev] Erasing FE.KEYID = 1
1,241,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,150 UART: [fwproc] Wait for Commands...
1,280,805 UART: [fwproc] Recv command 0x46574c44
1,281,538 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,445 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,109 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,922 ready_for_fw is high
1,055,922 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,493 >>> mbox cmd response: success
2,693,369 UART:
2,693,385 UART: Running Caliptra FMC ...
2,693,793 UART:
2,693,847 UART: [state] CFI Enabled
2,704,176 UART: [fht] FMC Alias Private Key: 7
2,812,335 UART: [art] Extend RT PCRs Done
2,812,763 UART: [art] Lock RT PCRs Done
2,814,117 UART: [art] Populate DV Done
2,822,488 UART: [fht] FMC Alias Private Key: 7
2,823,620 UART: [art] Derive CDI
2,823,900 UART: [art] Store in in slot 0x4
2,909,865 UART: [art] Derive Key Pair
2,910,225 UART: [art] Store priv key in slot 0x5
2,923,193 UART: [art] Derive Key Pair - Done
2,938,180 UART: [art] Signing Cert with AUTHO
2,938,660 UART: RITY.KEYID = 7
2,953,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,343 UART: [art] PUB.X = D4264AD5B0152A5EE4F18B51F2D04DCF498F0991DF52E311CB41BEA00123B863D75BDA82705202A9BFF68A06CEA29CC9
2,961,115 UART: [art] PUB.Y = 69F3DEED0B9AFA0F5ED0F99C861890277FAC44286FEF7A7A7E85853396B7F937E3E18560C0349D7B50ADA772080087C2
2,968,040 UART: [art] SIG.R = 340D279DB0BE18298559F071D9FC105597BCF81C69BE46FB56285F869B15E3A684FEEBD02A5CACAC50BF2A71ADFAA6D8
2,974,827 UART: [art] SIG.S = 4413A27272858CC12FBEEFFC36B9941E258FC22F0E23DC4327303CFD164813A2D15E1A2F5701002300A9DC2A514F24A7
2,997,920 UART: Caliptra RT
2,998,173 UART: [state] CFI Enabled
3,107,302 UART: [rt] RT listening for mailbox commands...
3,107,965 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,644 UART: [rt]cmd =0x46504c54, len=4
3,138,702 >>> mbox cmd response data (8 bytes)
3,139,023 UART: [rt] FIPS self test
3,139,351 UART: [kat] ++
3,139,503 UART: [kat] sha1
3,143,709 UART: [kat] SHA2-256
3,145,731 UART: [kat] SHA2-384
3,148,808 UART: [kat] SHA2-512-ACC
3,150,735 UART: [kat] ECC-384
3,159,156 UART: Fatal Error: 0x90040005
3,160,695 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,700 >>> mbox cmd response: failed
3,160,700 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,330 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,107 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,209 UART: [kat] SHA2-512-ACC
906,110 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,587 UART: [kat] LMS
1,168,899 UART: [kat] --
1,169,716 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,173,926 ready_for_fw is high
1,173,926 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,874 UART: [idev] Erasing UDS.KEYID = 0
1,198,492 UART: [idev] Sha1 KeyId Algorithm
1,207,544 UART: [idev] --
1,208,625 UART: [ldev] ++
1,208,793 UART: [ldev] CDI.KEYID = 6
1,209,157 UART: [ldev] SUBJECT.KEYID = 5
1,209,584 UART: [ldev] AUTHORITY.KEYID = 7
1,210,047 UART: [ldev] FE.KEYID = 1
1,215,149 UART: [ldev] Erasing FE.KEYID = 1
1,241,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,657 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x46574c44
1,282,377 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,340 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,988 >>> mbox cmd response: success
2,782,079 UART: [afmc] ++
2,782,247 UART: [afmc] CDI.KEYID = 6
2,782,610 UART: [afmc] SUBJECT.KEYID = 7
2,783,036 UART: [afmc] AUTHORITY.KEYID = 5
2,818,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,388 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,706 UART: [afmc] --
2,861,726 UART: [cold-reset] --
2,862,634 UART: [state] Locking Datavault
2,864,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,639 UART: [state] Locking ICCM
2,865,115 UART: [exit] Launching FMC @ 0x40000130
2,870,444 UART:
2,870,460 UART: Running Caliptra FMC ...
2,870,868 UART:
2,871,011 UART: [state] CFI Enabled
2,881,408 UART: [fht] FMC Alias Private Key: 7
2,989,817 UART: [art] Extend RT PCRs Done
2,990,245 UART: [art] Lock RT PCRs Done
2,991,841 UART: [art] Populate DV Done
3,000,138 UART: [fht] FMC Alias Private Key: 7
3,001,176 UART: [art] Derive CDI
3,001,456 UART: [art] Store in in slot 0x4
3,087,083 UART: [art] Derive Key Pair
3,087,443 UART: [art] Store priv key in slot 0x5
3,100,327 UART: [art] Derive Key Pair - Done
3,114,813 UART: [art] Signing Cert with AUTHO
3,115,293 UART: RITY.KEYID = 7
3,130,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,392 UART: [art] PUB.X = 235209D8A1188D4700AE0351C4D00A56C94A99C91EB70BF762FF895623D5D798D992E04EAB6434686C702BBE40CBB913
3,138,128 UART: [art] PUB.Y = 39111BC37C45BC2AEBD85BCF07296C130CD3CD59C72AAB407EEDC94C62381C6C3AE3F037662D40C0D537CDDA34A33F2A
3,145,092 UART: [art] SIG.R = B9D1BEA5ABBB94D90FD9915431434B5C031CCC2C5E508B4241F53FD56A70E2B9AE03EAC30C971A28BDE7CD28875E726C
3,151,868 UART: [art] SIG.S = 6F74AF8AFA90D1D677644941CA7619C3B02521E6E63790FB88FED23A68F08B9BAA504E5B7456AD35E58109F5930F1D8F
3,175,957 UART: Caliptra RT
3,176,302 UART: [state] CFI Enabled
3,285,089 UART: [rt] RT listening for mailbox commands...
3,285,752 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,425 UART: [rt]cmd =0x46504c54, len=4
3,316,515 >>> mbox cmd response data (8 bytes)
3,316,736 UART: [rt] FIPS self test
3,317,064 UART: [kat] ++
3,317,216 UART: [kat] sha1
3,321,342 UART: [kat] SHA2-256
3,323,364 UART: [kat] SHA2-384
3,326,081 UART: [kat] SHA2-512-ACC
3,328,008 UART: [kat] ECC-384
3,336,427 UART: Fatal Error: 0x90040005
3,337,966 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,337,971 >>> mbox cmd response: failed
3,337,971 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,337,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,880 UART: [kat] ++
896,032 UART: [kat] sha1
900,448 UART: [kat] SHA2-256
902,388 UART: [kat] SHA2-384
905,103 UART: [kat] SHA2-512-ACC
907,004 UART: [kat] ECC-384
916,967 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,552 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,277 UART: [fwproc] Wait for Commands...
1,283,102 UART: [fwproc] Recv command 0x46574c44
1,283,835 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,536 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 ready_for_fw is high
1,056,327 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,674 >>> mbox cmd response: success
2,694,244 UART:
2,694,260 UART: Running Caliptra FMC ...
2,694,668 UART:
2,694,811 UART: [state] CFI Enabled
2,705,668 UART: [fht] FMC Alias Private Key: 7
2,814,185 UART: [art] Extend RT PCRs Done
2,814,613 UART: [art] Lock RT PCRs Done
2,815,889 UART: [art] Populate DV Done
2,824,278 UART: [fht] FMC Alias Private Key: 7
2,825,252 UART: [art] Derive CDI
2,825,532 UART: [art] Store in in slot 0x4
2,911,195 UART: [art] Derive Key Pair
2,911,555 UART: [art] Store priv key in slot 0x5
2,924,895 UART: [art] Derive Key Pair - Done
2,939,765 UART: [art] Signing Cert with AUTHO
2,940,245 UART: RITY.KEYID = 7
2,955,385 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,150 UART: [art] PUB.X = 60DB38ADBCCB1EE17E430F528249D79EAAA0A3092D6A6B0542349481E4C1EA46C565D1EAE72E27892CEF27F96CE47E4D
2,962,927 UART: [art] PUB.Y = 87EDC5E25FDA15E461BED79007BBBE8B4632EF788BA4E8E00B21BC42713822AF8AE298D2392F4F3C00C1DEE1E202C631
2,969,862 UART: [art] SIG.R = 528138B42B5D1EFDAAC9988B38210510D80C4F07C1E115AA6A87D4564962B878345F8285A0DE21F6CE3F623A495664C3
2,976,621 UART: [art] SIG.S = 5B1078CDDC096E5A77C16157563705060C1E1F21C34B5D413DDCF15985F3204354446A001EEB9F2606EFE517BA177698
3,000,361 UART: Caliptra RT
3,000,706 UART: [state] CFI Enabled
3,108,455 UART: [rt] RT listening for mailbox commands...
3,109,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,017 UART: [rt]cmd =0x46504c54, len=4
3,140,245 >>> mbox cmd response data (8 bytes)
3,140,364 UART: [rt] FIPS self test
3,140,692 UART: [kat] ++
3,140,844 UART: [kat] sha1
3,144,934 UART: [kat] SHA2-256
3,146,956 UART: [kat] SHA2-384
3,149,743 UART: [kat] SHA2-512-ACC
3,151,670 UART: [kat] ECC-384
3,160,009 UART: Fatal Error: 0x90040005
3,161,548 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,161,553 >>> mbox cmd response: failed
3,161,553 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,161,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,097 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,912 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,672,995 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,816,780 >>> mbox cmd response: failed
3,817,352 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,960,229 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,858,761 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,436,969 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,674,700 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,819,024 >>> mbox cmd response: failed
3,819,625 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,962,556 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
4,858,180 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,446,236 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,039 writing to cptra_bootfsm_go
4,008,594 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,152,204 >>> mbox cmd response: failed
4,152,777 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,295,631 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,746,575 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,186,778 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
4,016,409 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,160,186 >>> mbox cmd response: failed
4,160,831 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,303,712 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,749,152 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
34,175,027 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,461,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,605,599 >>> mbox cmd response: failed
3,606,157 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,749,443 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,419,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,244,160 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,457,494 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,601,673 >>> mbox cmd response: failed
3,602,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,745,533 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,467,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,276 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,792,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,936,844 >>> mbox cmd response: failed
3,937,427 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,080,695 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
19,569,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,299,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,546 writing to cptra_bootfsm_go
3,780,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,924,259 >>> mbox cmd response: failed
3,924,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,068,254 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
19,584,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,308,046 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,457,827 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,602,252 >>> mbox cmd response: failed
3,602,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,745,977 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,441,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,251,628 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,453,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,598,087 >>> mbox cmd response: failed
3,598,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,741,820 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,449,660 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,306,598 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,781,800 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,926,026 >>> mbox cmd response: failed
3,926,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,070,498 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
19,581,727 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,291,503 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,798,425 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,942,609 >>> mbox cmd response: failed
3,943,167 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,086,444 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
19,568,946 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,300,998 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,117 >>> mbox cmd response: failed
817,117 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,575 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,029 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,993 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,001 >>> mbox cmd response: failed
817,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,347 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,860 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,868 >>> mbox cmd response: failed
817,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,942 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,554 >>> mbox cmd response: failed
816,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,506 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,761 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,769 >>> mbox cmd response: failed
816,769 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,369 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,527 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,019 >>> mbox cmd response: failed
817,019 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,021 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,304 >>> mbox cmd response: failed
817,304 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,310 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,548 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,550 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,558 >>> mbox cmd response: failed
817,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,012 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,413 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,421 >>> mbox cmd response: failed
817,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
817,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,169 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,361 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,991 >>> mbox cmd response: failed
816,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,377 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,779 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,840 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,848 >>> mbox cmd response: failed
816,848 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,512 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,138 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,548 >>> mbox cmd response: failed
816,548 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
816,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,650 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,250 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,203 UART:
192,570 UART: Running Caliptra ROM ...
193,753 UART:
193,906 UART: [state] CFI Enabled
264,588 UART: [state] LifecycleState = Unprovisioned
266,580 UART: [state] DebugLocked = No
268,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,716 UART: [kat] SHA2-256
442,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,902 UART: [kat] ++
453,351 UART: [kat] sha1
464,366 UART: [kat] SHA2-256
467,025 UART: [kat] SHA2-384
472,099 UART: [kat] SHA2-512-ACC
474,491 UART: [kat] ECC-384
2,765,998 UART: [kat] HMAC-384Kdf
2,797,943 UART: [kat] LMS
3,988,279 UART: [kat] --
3,992,082 UART: [cold-reset] ++
3,994,170 UART: [fht] Storing FHT @ 0x50003400
4,006,630 UART: [idev] ++
4,007,227 UART: [idev] CDI.KEYID = 6
4,008,165 UART: [idev] SUBJECT.KEYID = 7
4,009,352 UART: [idev] UDS.KEYID = 0
4,010,404 ready_for_fw is high
4,010,614 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,154,612 UART: [idev] Erasing UDS.KEYID = 0
7,344,266 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,067 UART: [idev] --
7,369,555 UART: [ldev] ++
7,370,150 UART: [ldev] CDI.KEYID = 6
7,371,099 UART: [ldev] SUBJECT.KEYID = 5
7,372,321 UART: [ldev] AUTHORITY.KEYID = 7
7,373,473 UART: [ldev] FE.KEYID = 1
7,419,685 UART: [ldev] Erasing FE.KEYID = 1
10,752,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,484 UART: [ldev] --
13,134,493 UART: [fwproc] Waiting for Commands...
13,137,673 UART: [fwproc] Received command 0x46574c44
13,139,859 UART: [fwproc] Received Image of size 114632 bytes
17,193,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,060 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,654,963 >>> mbox cmd response: success
17,658,402 UART: [afmc] ++
17,658,994 UART: [afmc] CDI.KEYID = 6
17,659,936 UART: [afmc] SUBJECT.KEYID = 7
17,661,206 UART: [afmc] AUTHORITY.KEYID = 5
21,025,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,393 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,655 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,095 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,888 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,380 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,847 UART: [afmc] --
23,397,194 UART: [cold-reset] --
23,401,382 UART: [state] Locking Datavault
23,406,469 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,242 UART: [state] Locking ICCM
23,409,960 UART: [exit] Launching FMC @ 0x40000130
23,418,303 UART:
23,418,543 UART: Running Caliptra FMC ...
23,419,647 UART:
23,419,819 UART: [state] CFI Enabled
23,486,034 UART: [fht] FMC Alias Private Key: 7
25,824,164 UART: [art] Extend RT PCRs Done
25,825,385 UART: [art] Lock RT PCRs Done
25,826,872 UART: [art] Populate DV Done
25,832,130 UART: [fht] FMC Alias Private Key: 7
25,833,613 UART: [art] Derive CDI
25,834,378 UART: [art] Store in in slot 0x4
25,896,345 UART: [art] Derive Key Pair
25,897,387 UART: [art] Store priv key in slot 0x5
29,190,275 UART: [art] Derive Key Pair - Done
29,203,234 UART: [art] Signing Cert with AUTHO
29,204,566 UART: RITY.KEYID = 7
31,491,731 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,242 UART: [art] PUB.X = 052E42A82669A30D849254674F93BDFC87FC444EF9F00D3F3C95916D8D04918A028EBEB442F652D4278EC1C24A5E7E69
31,500,444 UART: [art] PUB.Y = 891EE67930E64C3D77DB19D85D7543A86975B2D75502738366D2D9C1FA30E5857A82ECC34DACE79D0C9422934287E586
31,507,691 UART: [art] SIG.R = 170EE32B7E01DCE55ED6AEBDD7C8764DAE9C371BE6DEE0879EFCA1ABAD09802423C4D2303D3468CA47AAD9CDBAEDB768
31,515,095 UART: [art] SIG.S = A4656521568DC546CCC03B8124E524CCB172E356027ADBD6CE89DE4C892FEDB82F462EDF1E1B884EA89F98C452959FB9
32,820,007 UART: Caliptra RT
32,820,715 UART: [state] CFI Enabled
32,983,290 UART: [rt] RT listening for mailbox commands...
32,985,164 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,014,633 UART: [rt]cmd =0x46504c54, len=4
33,016,114 >>> mbox cmd response data (8 bytes)
33,017,403 UART: [rt] FIPS self test
33,018,352 UART: [kat] ++
33,018,810 UART: [kat] sha1
33,023,431 UART: [kat] SHA2-256
33,025,319 UART: [kat] SHA2-384
33,028,551 UART: [kat] SHA2-512-ACC
33,030,800 UART: [kat] ECC-384
33,998,779 UART: Fatal Error: 0x90040004
34,034,041 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,178,073 >>> mbox cmd response: failed
34,178,715 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,322,668 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
189,975 UART:
190,263 UART: Running Caliptra ROM ...
191,289 UART:
191,428 UART: [state] CFI Enabled
261,702 UART: [state] LifecycleState = Unprovisioned
263,638 UART: [state] DebugLocked = No
266,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,121 UART: [kat] SHA2-256
440,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,309 UART: [kat] ++
451,757 UART: [kat] sha1
463,499 UART: [kat] SHA2-256
466,178 UART: [kat] SHA2-384
471,992 UART: [kat] SHA2-512-ACC
474,374 UART: [kat] ECC-384
2,766,164 UART: [kat] HMAC-384Kdf
2,797,059 UART: [kat] LMS
3,987,351 UART: [kat] --
3,992,703 UART: [cold-reset] ++
3,993,744 UART: [fht] Storing FHT @ 0x50003400
4,004,595 UART: [idev] ++
4,005,185 UART: [idev] CDI.KEYID = 6
4,006,210 UART: [idev] SUBJECT.KEYID = 7
4,007,382 UART: [idev] UDS.KEYID = 0
4,008,893 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,153,009 UART: [idev] Erasing UDS.KEYID = 0
7,342,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,624 UART: [idev] --
7,368,135 UART: [ldev] ++
7,368,717 UART: [ldev] CDI.KEYID = 6
7,369,655 UART: [ldev] SUBJECT.KEYID = 5
7,370,870 UART: [ldev] AUTHORITY.KEYID = 7
7,372,161 UART: [ldev] FE.KEYID = 1
7,420,702 UART: [ldev] Erasing FE.KEYID = 1
10,753,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,682 UART: [ldev] --
13,134,240 UART: [fwproc] Waiting for Commands...
13,135,916 UART: [fwproc] Received command 0x46574c44
13,138,113 UART: [fwproc] Received Image of size 114632 bytes
17,197,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,162 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,348,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,666,767 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,804,697 ready_for_fw is high
3,805,096 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,886,808 >>> mbox cmd response: success
23,586,469 UART:
23,586,893 UART: Running Caliptra FMC ...
23,588,007 UART:
23,588,183 UART: [state] CFI Enabled
23,655,524 UART: [fht] FMC Alias Private Key: 7
25,994,054 UART: [art] Extend RT PCRs Done
25,995,280 UART: [art] Lock RT PCRs Done
25,996,803 UART: [art] Populate DV Done
26,002,433 UART: [fht] FMC Alias Private Key: 7
26,004,089 UART: [art] Derive CDI
26,004,915 UART: [art] Store in in slot 0x4
26,063,892 UART: [art] Derive Key Pair
26,064,950 UART: [art] Store priv key in slot 0x5
29,357,492 UART: [art] Derive Key Pair - Done
29,370,542 UART: [art] Signing Cert with AUTHO
29,371,840 UART: RITY.KEYID = 7
31,658,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,492 UART: [art] PUB.X = D77436E7C26D6980016B89E36C7D08690CA931C7D4724112C3A318B0882CD15765DA6E3AA0C123FC31838D45AE17C6EB
31,667,694 UART: [art] PUB.Y = E7E223FD4C60325B724CAFA22875E3EAB057D8B55A837540F7CD499E9EA52940DD86E2ACC572B2BB5F83BB402B80AD88
31,674,994 UART: [art] SIG.R = D6796344AF328364C43EBC2513371049665CD592CE06480FD006530995960DD3CFD17E8B551BE20F68A6ADDFEC46CDC5
31,682,333 UART: [art] SIG.S = 7854C9ECDF2CB64D43742A4D9315BA875B0CF51768E3EE2BC1350D9209EA0ABF1B86106221ADA2D22BE3B6F67CAE4EBE
32,987,923 UART: Caliptra RT
32,988,633 UART: [state] CFI Enabled
33,150,285 UART: [rt] RT listening for mailbox commands...
33,152,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,181,948 UART: [rt]cmd =0x46504c54, len=4
33,183,510 >>> mbox cmd response data (8 bytes)
33,184,702 UART: [rt] FIPS self test
33,185,656 UART: [kat] ++
33,186,114 UART: [kat] sha1
33,190,790 UART: [kat] SHA2-256
33,192,722 UART: [kat] SHA2-384
33,195,574 UART: [kat] SHA2-512-ACC
33,197,821 UART: [kat] ECC-384
34,167,048 UART: Fatal Error: 0x90040004
34,202,317 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,346,340 >>> mbox cmd response: failed
34,347,001 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,491,342 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,804,361 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,897,077 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,449 UART:
193,063 UART: Running Caliptra ROM ...
194,287 UART:
603,513 UART: [state] CFI Enabled
615,280 UART: [state] LifecycleState = Unprovisioned
617,238 UART: [state] DebugLocked = No
619,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,415 UART: [kat] SHA2-256
794,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,693 UART: [kat] ++
805,172 UART: [kat] sha1
816,758 UART: [kat] SHA2-256
819,406 UART: [kat] SHA2-384
825,043 UART: [kat] SHA2-512-ACC
827,349 UART: [kat] ECC-384
3,112,024 UART: [kat] HMAC-384Kdf
3,124,904 UART: [kat] LMS
4,315,001 UART: [kat] --
4,318,093 UART: [cold-reset] ++
4,320,179 UART: [fht] Storing FHT @ 0x50003400
4,331,968 UART: [idev] ++
4,332,544 UART: [idev] CDI.KEYID = 6
4,333,454 UART: [idev] SUBJECT.KEYID = 7
4,334,703 UART: [idev] UDS.KEYID = 0
4,335,763 ready_for_fw is high
4,335,997 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,480,084 UART: [idev] Erasing UDS.KEYID = 0
7,624,126 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,642 UART: [idev] --
7,649,736 UART: [ldev] ++
7,650,371 UART: [ldev] CDI.KEYID = 6
7,651,283 UART: [ldev] SUBJECT.KEYID = 5
7,652,503 UART: [ldev] AUTHORITY.KEYID = 7
7,653,792 UART: [ldev] FE.KEYID = 1
7,665,191 UART: [ldev] Erasing FE.KEYID = 1
10,955,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,288 UART: [ldev] --
13,318,377 UART: [fwproc] Waiting for Commands...
13,321,790 UART: [fwproc] Received command 0x46574c44
13,323,984 UART: [fwproc] Received Image of size 114632 bytes
17,380,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,991 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,845,625 >>> mbox cmd response: success
17,848,960 UART: [afmc] ++
17,849,556 UART: [afmc] CDI.KEYID = 6
17,850,474 UART: [afmc] SUBJECT.KEYID = 7
17,851,745 UART: [afmc] AUTHORITY.KEYID = 5
21,167,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,827 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,479,234 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,494,002 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,423 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,530,129 UART: [afmc] --
23,533,672 UART: [cold-reset] --
23,537,161 UART: [state] Locking Datavault
23,542,571 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,322 UART: [state] Locking ICCM
23,546,707 UART: [exit] Launching FMC @ 0x40000130
23,555,081 UART:
23,555,376 UART: Running Caliptra FMC ...
23,556,489 UART:
23,556,654 UART: [state] CFI Enabled
23,564,594 UART: [fht] FMC Alias Private Key: 7
25,895,407 UART: [art] Extend RT PCRs Done
25,896,633 UART: [art] Lock RT PCRs Done
25,898,298 UART: [art] Populate DV Done
25,903,604 UART: [fht] FMC Alias Private Key: 7
25,905,145 UART: [art] Derive CDI
25,905,879 UART: [art] Store in in slot 0x4
25,948,471 UART: [art] Derive Key Pair
25,949,471 UART: [art] Store priv key in slot 0x5
29,191,719 UART: [art] Derive Key Pair - Done
29,204,874 UART: [art] Signing Cert with AUTHO
29,206,206 UART: RITY.KEYID = 7
31,485,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,891 UART: [art] PUB.X = 073BBEF1A7DC3856F20F2F73BA24515C926EC5D86EAC29A3927AC5ABA2C8D942D023CC993FD185F675098CADDBEAF72F
31,494,146 UART: [art] PUB.Y = E160683E597869C101D4013C18A2E095169BD131EDC5FC36500D07CBD3BAAFCB981277759CB6B9FE015BF5E5A9A4C1FD
31,501,380 UART: [art] SIG.R = 39E10EB11277B53860CC090454201D7DAE7D4545EAEAF9128627A88A5689EEB6DAB27198629748318ED54366A073BF91
31,508,779 UART: [art] SIG.S = E5D39B5FA0097F1C4923CE647D04D122720014907CD501BFC9B71BDA550F2DA86692A33157A579FBF7AE7E072C517E93
32,814,393 UART: Caliptra RT
32,815,111 UART: [state] CFI Enabled
32,934,073 UART: [rt] RT listening for mailbox commands...
32,935,929 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,965,757 UART: [rt]cmd =0x46504c54, len=4
32,967,277 >>> mbox cmd response data (8 bytes)
32,968,623 UART: [rt] FIPS self test
32,969,564 UART: [kat] ++
32,970,009 UART: [kat] sha1
32,974,416 UART: [kat] SHA2-256
32,976,311 UART: [kat] SHA2-384
32,979,140 UART: [kat] SHA2-512-ACC
32,981,426 UART: [kat] ECC-384
33,945,261 UART: Fatal Error: 0x90040004
33,980,657 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,124,647 >>> mbox cmd response: failed
34,125,300 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,269,048 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,008 UART:
190,306 UART: Running Caliptra ROM ...
191,334 UART:
6,253,512 UART: [state] CFI Enabled
6,267,063 UART: [state] LifecycleState = Unprovisioned
6,269,029 UART: [state] DebugLocked = No
6,270,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,274,400 UART: [kat] SHA2-256
6,444,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,454,684 UART: [kat] ++
6,455,154 UART: [kat] sha1
6,467,066 UART: [kat] SHA2-256
6,469,769 UART: [kat] SHA2-384
6,475,003 UART: [kat] SHA2-512-ACC
6,477,358 UART: [kat] ECC-384
8,760,992 UART: [kat] HMAC-384Kdf
8,773,217 UART: [kat] LMS
9,963,339 UART: [kat] --
9,969,278 UART: [cold-reset] ++
9,971,104 UART: [fht] Storing FHT @ 0x50003400
9,981,774 UART: [idev] ++
9,982,341 UART: [idev] CDI.KEYID = 6
9,983,329 UART: [idev] SUBJECT.KEYID = 7
9,984,549 UART: [idev] UDS.KEYID = 0
9,986,134 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
10,130,383 UART: [idev] Erasing UDS.KEYID = 0
13,275,078 UART: [idev] Using Sha1 for KeyId Algorithm
13,297,113 UART: [idev] --
13,300,332 UART: [ldev] ++
13,300,910 UART: [ldev] CDI.KEYID = 6
13,301,875 UART: [ldev] SUBJECT.KEYID = 5
13,303,094 UART: [ldev] AUTHORITY.KEYID = 7
13,304,387 UART: [ldev] FE.KEYID = 1
13,316,922 UART: [ldev] Erasing FE.KEYID = 1
16,608,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,900,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,915,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,929,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,944,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,963,796 UART: [ldev] --
18,967,694 UART: [fwproc] Waiting for Commands...
18,969,637 UART: [fwproc] Received command 0x46574c44
18,971,819 UART: [fwproc] Received Image of size 114632 bytes
23,030,115 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,102,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,171,427 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
23,489,823 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,127,707 ready_for_fw is high
4,128,189 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,080,392 >>> mbox cmd response: success
23,722,309 UART:
23,722,733 UART: Running Caliptra FMC ...
23,723,870 UART:
23,724,032 UART: [state] CFI Enabled
23,731,890 UART: [fht] FMC Alias Private Key: 7
26,062,800 UART: [art] Extend RT PCRs Done
26,064,030 UART: [art] Lock RT PCRs Done
26,066,039 UART: [art] Populate DV Done
26,071,572 UART: [fht] FMC Alias Private Key: 7
26,073,151 UART: [art] Derive CDI
26,073,980 UART: [art] Store in in slot 0x4
26,116,916 UART: [art] Derive Key Pair
26,117,961 UART: [art] Store priv key in slot 0x5
29,360,911 UART: [art] Derive Key Pair - Done
29,373,855 UART: [art] Signing Cert with AUTHO
29,375,176 UART: RITY.KEYID = 7
31,654,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,982 UART: [art] PUB.X = 7A31A79E6730D0BDF854BA6B309202632DEB5CD7B657CC14A705E4F50845EA04C201524C5D0C9B3C1BDCADD49B16350E
31,663,229 UART: [art] PUB.Y = CC246460D9F91E3E1D3D8B41BB987E07B4C8D53CB59B8E4DACA5E4DB6504A9158F52C5C48D0D682E9AF3D0DD36A2347C
31,670,466 UART: [art] SIG.R = 8CAB624D77F502128EA203E3A0265F33C7AE41900CAE868E0987061B12D20F8E8E45369CA7B8BEC1D8BD53030F2A2AC6
31,677,858 UART: [art] SIG.S = D075F5FEC976AC0DC9AA219D72FF0DAE87C37BE17A6F0A418D8BEFD2619BF0E59D302772C07E563B8270F4625CD7A4F7
32,983,450 UART: Caliptra RT
32,984,164 UART: [state] CFI Enabled
33,101,404 UART: [rt] RT listening for mailbox commands...
33,103,270 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,132,820 UART: [rt]cmd =0x46504c54, len=4
33,134,343 >>> mbox cmd response data (8 bytes)
33,135,296 UART: [rt] FIPS self test
33,136,236 UART: [kat] ++
33,136,686 UART: [kat] sha1
33,141,357 UART: [kat] SHA2-256
33,143,294 UART: [kat] SHA2-384
33,146,360 UART: [kat] SHA2-512-ACC
33,148,606 UART: [kat] ECC-384
34,113,101 UART: Fatal Error: 0x90040004
34,148,378 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,292,399 >>> mbox cmd response: failed
34,293,052 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
34,436,988 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
9,622,269 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
23,584,957 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,166 UART:
192,546 UART: Running Caliptra ROM ...
193,676 UART:
193,838 UART: [state] CFI Enabled
265,840 UART: [state] LifecycleState = Unprovisioned
267,703 UART: [state] DebugLocked = No
270,294 UART: [state] WD Timer not started. Device not locked for debugging
274,301 UART: [kat] SHA2-256
453,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,014 UART: [kat] ++
465,465 UART: [kat] sha1
476,483 UART: [kat] SHA2-256
479,575 UART: [kat] SHA2-384
486,488 UART: [kat] SHA2-512-ACC
489,427 UART: [kat] ECC-384
2,949,084 UART: [kat] HMAC-384Kdf
2,972,032 UART: [kat] LMS
3,501,499 UART: [kat] --
3,506,804 UART: [cold-reset] ++
3,508,197 UART: [fht] FHT @ 0x50003400
3,519,112 UART: [idev] ++
3,519,685 UART: [idev] CDI.KEYID = 6
3,520,677 UART: [idev] SUBJECT.KEYID = 7
3,521,853 UART: [idev] UDS.KEYID = 0
3,522,777 ready_for_fw is high
3,523,008 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,672 UART: [idev] Erasing UDS.KEYID = 0
6,028,668 UART: [idev] Sha1 KeyId Algorithm
6,052,059 UART: [idev] --
6,055,385 UART: [ldev] ++
6,055,965 UART: [ldev] CDI.KEYID = 6
6,056,876 UART: [ldev] SUBJECT.KEYID = 5
6,058,043 UART: [ldev] AUTHORITY.KEYID = 7
6,059,280 UART: [ldev] FE.KEYID = 1
6,101,735 UART: [ldev] Erasing FE.KEYID = 1
8,604,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,561 UART: [ldev] --
10,413,420 UART: [fwproc] Wait for Commands...
10,416,281 UART: [fwproc] Recv command 0x46574c44
10,418,377 UART: [fwproc] Recv'd Img size: 114940 bytes
13,828,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,275 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,287,060 >>> mbox cmd response: success
14,291,541 UART: [afmc] ++
14,292,131 UART: [afmc] CDI.KEYID = 6
14,293,048 UART: [afmc] SUBJECT.KEYID = 7
14,294,232 UART: [afmc] AUTHORITY.KEYID = 5
16,827,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,508 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,587 UART: [afmc] --
18,629,804 UART: [cold-reset] --
18,632,153 UART: [state] Locking Datavault
18,636,703 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,348 UART: [state] Locking ICCM
18,640,173 UART: [exit] Launching FMC @ 0x40000130
18,648,568 UART:
18,648,802 UART: Running Caliptra FMC ...
18,649,902 UART:
18,650,079 UART: [state] CFI Enabled
18,712,183 UART: [fht] FMC Alias Private Key: 7
20,476,397 UART: [art] Extend RT PCRs Done
20,477,621 UART: [art] Lock RT PCRs Done
20,479,300 UART: [art] Populate DV Done
20,484,762 UART: [fht] FMC Alias Private Key: 7
20,486,461 UART: [art] Derive CDI
20,487,278 UART: [art] Store in in slot 0x4
20,544,178 UART: [art] Derive Key Pair
20,545,226 UART: [art] Store priv key in slot 0x5
23,008,463 UART: [art] Derive Key Pair - Done
23,021,255 UART: [art] Signing Cert with AUTHO
23,022,570 UART: RITY.KEYID = 7
24,733,766 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,280 UART: [art] PUB.X = 6A5DA3C0DCE11A339CA821F768A6337AF6E0676396F3D919D679F05160CD0F1961418C844FD1FF6F73D2008D97B62B15
24,742,543 UART: [art] PUB.Y = 12F2FEDAA411E9B1FDD895EAA73C0B89EE430C44CE62A07AA8F08B8737E8C44D52ADBC2391B60057FCEEC410F6FBC195
24,749,809 UART: [art] SIG.R = 6BCF8AB4A59B97987A5F76BC522535A638B554669D2E43805FAEC2C0968036A8509B4C8C9B469ED50076FEEF3F827ECC
24,757,233 UART: [art] SIG.S = 873B0BB20424F710623FFE6A168513D6A7E6BB571A78141D769BC3FBDFDCDDC74C9F291C466E3739613C016F91F6FBAD
25,736,032 UART: Caliptra RT
25,736,738 UART: [state] CFI Enabled
25,901,420 UART: [rt] RT listening for mailbox commands...
25,903,269 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,932,960 UART: [rt]cmd =0x46504c54, len=4
25,934,757 >>> mbox cmd response data (8 bytes)
25,935,677 UART: [rt] FIPS self test
25,936,631 UART: [kat] ++
25,937,079 UART: [kat] sha1
25,941,425 UART: [kat] SHA2-256
25,943,355 UART: [kat] SHA2-384
25,946,341 UART: [kat] SHA2-512-ACC
25,948,572 UART: [kat] ECC-384
26,677,488 UART: Fatal Error: 0x90040004
26,712,793 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,857,202 >>> mbox cmd response: failed
26,857,842 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,002,174 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,040 UART:
190,336 UART: Running Caliptra ROM ...
191,366 UART:
191,503 UART: [state] CFI Enabled
268,627 UART: [state] LifecycleState = Unprovisioned
270,493 UART: [state] DebugLocked = No
271,655 UART: [state] WD Timer not started. Device not locked for debugging
275,546 UART: [kat] SHA2-256
454,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,260 UART: [kat] ++
466,811 UART: [kat] sha1
479,441 UART: [kat] SHA2-256
482,494 UART: [kat] SHA2-384
487,508 UART: [kat] SHA2-512-ACC
490,443 UART: [kat] ECC-384
2,948,832 UART: [kat] HMAC-384Kdf
2,974,883 UART: [kat] LMS
3,504,356 UART: [kat] --
3,508,470 UART: [cold-reset] ++
3,509,318 UART: [fht] FHT @ 0x50003400
3,520,794 UART: [idev] ++
3,521,371 UART: [idev] CDI.KEYID = 6
3,522,278 UART: [idev] SUBJECT.KEYID = 7
3,523,496 UART: [idev] UDS.KEYID = 0
3,525,003 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,531 UART: [idev] Erasing UDS.KEYID = 0
6,031,687 UART: [idev] Sha1 KeyId Algorithm
6,054,167 UART: [idev] --
6,058,063 UART: [ldev] ++
6,058,642 UART: [ldev] CDI.KEYID = 6
6,059,533 UART: [ldev] SUBJECT.KEYID = 5
6,060,754 UART: [ldev] AUTHORITY.KEYID = 7
6,061,989 UART: [ldev] FE.KEYID = 1
6,103,457 UART: [ldev] Erasing FE.KEYID = 1
8,607,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,811 UART: [ldev] --
10,417,024 UART: [fwproc] Wait for Commands...
10,419,554 UART: [fwproc] Recv command 0x46574c44
10,421,616 UART: [fwproc] Recv'd Img size: 114940 bytes
13,838,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,729 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,295,082 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,383,454 ready_for_fw is high
3,383,893 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,106,741 >>> mbox cmd response: success
18,389,287 UART:
18,389,674 UART: Running Caliptra FMC ...
18,390,828 UART:
18,390,994 UART: [state] CFI Enabled
18,457,418 UART: [fht] FMC Alias Private Key: 7
20,221,013 UART: [art] Extend RT PCRs Done
20,222,235 UART: [art] Lock RT PCRs Done
20,223,966 UART: [art] Populate DV Done
20,229,599 UART: [fht] FMC Alias Private Key: 7
20,231,197 UART: [art] Derive CDI
20,232,010 UART: [art] Store in in slot 0x4
20,290,301 UART: [art] Derive Key Pair
20,291,334 UART: [art] Store priv key in slot 0x5
22,754,189 UART: [art] Derive Key Pair - Done
22,767,057 UART: [art] Signing Cert with AUTHO
22,768,362 UART: RITY.KEYID = 7
24,480,992 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,501 UART: [art] PUB.X = 07EEE6BC9388EEBC7CFB193EF770CD291EFFC14FCBE4DB041C7AAB18F489FFCBA35C5CC968AE4CB4ABB80F57F1146DCB
24,489,833 UART: [art] PUB.Y = 5D451238373BE511887D9441CD72EE4D0A15767A9900C6E75A1ED2102E3596851AD93F1C136ABAFEB20EF4B2E14D1F9C
24,497,093 UART: [art] SIG.R = 418086220D96AF522750D2726621F9CBD4ADDD0E1DB84D70EA6220C02F7EDA85C402EAF24416DB3B8F26F44820CA020F
24,504,441 UART: [art] SIG.S = DB1647E3D098A75C7BABADD55BB43BDAA5140E13962BABA55BB81F04545A88D77E8309672D660BEDDC2134F22E8E259A
25,483,125 UART: Caliptra RT
25,483,830 UART: [state] CFI Enabled
25,647,572 UART: [rt] RT listening for mailbox commands...
25,649,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,679,083 UART: [rt]cmd =0x46504c54, len=4
25,680,720 >>> mbox cmd response data (8 bytes)
25,681,893 UART: [rt] FIPS self test
25,682,831 UART: [kat] ++
25,683,280 UART: [kat] sha1
25,687,740 UART: [kat] SHA2-256
25,689,611 UART: [kat] SHA2-384
25,692,565 UART: [kat] SHA2-512-ACC
25,694,840 UART: [kat] ECC-384
26,423,800 UART: Fatal Error: 0x90040004
26,459,164 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,603,535 >>> mbox cmd response: failed
26,604,165 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,748,332 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
3,367,056 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,056,482 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,464 UART:
192,839 UART: Running Caliptra ROM ...
193,983 UART:
603,474 UART: [state] CFI Enabled
618,849 UART: [state] LifecycleState = Unprovisioned
620,726 UART: [state] DebugLocked = No
622,686 UART: [state] WD Timer not started. Device not locked for debugging
626,939 UART: [kat] SHA2-256
806,071 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,647 UART: [kat] ++
818,129 UART: [kat] sha1
829,797 UART: [kat] SHA2-256
832,783 UART: [kat] SHA2-384
839,211 UART: [kat] SHA2-512-ACC
842,154 UART: [kat] ECC-384
3,283,338 UART: [kat] HMAC-384Kdf
3,296,365 UART: [kat] LMS
3,825,906 UART: [kat] --
3,829,974 UART: [cold-reset] ++
3,831,050 UART: [fht] FHT @ 0x50003400
3,842,033 UART: [idev] ++
3,842,594 UART: [idev] CDI.KEYID = 6
3,843,506 UART: [idev] SUBJECT.KEYID = 7
3,844,684 UART: [idev] UDS.KEYID = 0
3,845,633 ready_for_fw is high
3,845,871 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,990,703 UART: [idev] Erasing UDS.KEYID = 0
6,315,849 UART: [idev] Sha1 KeyId Algorithm
6,338,584 UART: [idev] --
6,342,472 UART: [ldev] ++
6,343,085 UART: [ldev] CDI.KEYID = 6
6,344,003 UART: [ldev] SUBJECT.KEYID = 5
6,345,174 UART: [ldev] AUTHORITY.KEYID = 7
6,346,408 UART: [ldev] FE.KEYID = 1
6,359,482 UART: [ldev] Erasing FE.KEYID = 1
8,829,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,366 UART: [ldev] --
10,619,905 UART: [fwproc] Wait for Commands...
10,622,225 UART: [fwproc] Recv command 0x46574c44
10,624,271 UART: [fwproc] Recv'd Img size: 114940 bytes
14,033,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,228 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,492,037 >>> mbox cmd response: success
14,496,362 UART: [afmc] ++
14,496,963 UART: [afmc] CDI.KEYID = 6
14,497,883 UART: [afmc] SUBJECT.KEYID = 7
14,499,049 UART: [afmc] AUTHORITY.KEYID = 5
17,001,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,038 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,705 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,318 UART: [afmc] --
18,799,830 UART: [cold-reset] --
18,802,446 UART: [state] Locking Datavault
18,806,611 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,309 UART: [state] Locking ICCM
18,809,976 UART: [exit] Launching FMC @ 0x40000130
18,818,422 UART:
18,818,666 UART: Running Caliptra FMC ...
18,820,581 UART:
18,820,766 UART: [state] CFI Enabled
18,828,124 UART: [fht] FMC Alias Private Key: 7
20,585,224 UART: [art] Extend RT PCRs Done
20,586,443 UART: [art] Lock RT PCRs Done
20,588,499 UART: [art] Populate DV Done
20,593,715 UART: [fht] FMC Alias Private Key: 7
20,595,305 UART: [art] Derive CDI
20,596,053 UART: [art] Store in in slot 0x4
20,639,025 UART: [art] Derive Key Pair
20,640,026 UART: [art] Store priv key in slot 0x5
23,066,309 UART: [art] Derive Key Pair - Done
23,079,629 UART: [art] Signing Cert with AUTHO
23,080,936 UART: RITY.KEYID = 7
24,786,495 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,992 UART: [art] PUB.X = 7387D42AF96DF70874A282C8DFCA48193408BD8BA90F6E99BEBF208727862E6DEC8B0C9BC0F0ADC5CBCB1001C056D2D0
24,795,298 UART: [art] PUB.Y = 08C67C6C958DA3159AA17194ED76D3102CB42621F6082DCFD427ED3D5E6752CB874163AADC6B424EB42CCA49213DED42
24,802,535 UART: [art] SIG.R = 5287DFAEEE342B5FB40AAFBC4D293C92A70072D1C0BBA1283CA206C7061331B3C6B281B816F845AE77C8B9B1471E76BA
24,809,923 UART: [art] SIG.S = 9D2732FCD12393A1268527A2D8A06F635BE0A424B6F82E2E48937990CEA0E2F8E25E01EBA3747C72138E29D18683EA6A
25,788,800 UART: Caliptra RT
25,789,497 UART: [state] CFI Enabled
25,906,387 UART: [rt] RT listening for mailbox commands...
25,908,241 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,937,865 UART: [rt]cmd =0x46504c54, len=4
25,939,441 >>> mbox cmd response data (8 bytes)
25,941,064 UART: [rt] FIPS self test
25,942,033 UART: [kat] ++
25,942,490 UART: [kat] sha1
25,947,111 UART: [kat] SHA2-256
25,948,993 UART: [kat] SHA2-384
25,952,064 UART: [kat] SHA2-512-ACC
25,954,312 UART: [kat] ECC-384
26,676,888 UART: Fatal Error: 0x90040004
26,712,090 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,856,795 >>> mbox cmd response: failed
26,857,455 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,001,738 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,128 UART:
190,411 UART: Running Caliptra ROM ...
191,523 UART:
13,530,760 UART: [state] CFI Enabled
13,546,409 UART: [state] LifecycleState = Unprovisioned
13,548,270 UART: [state] DebugLocked = No
13,550,870 UART: [state] WD Timer not started. Device not locked for debugging
13,555,089 UART: [kat] SHA2-256
13,734,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
13,745,791 UART: [kat] ++
13,746,255 UART: [kat] sha1
13,758,657 UART: [kat] SHA2-256
13,761,679 UART: [kat] SHA2-384
13,768,689 UART: [kat] SHA2-512-ACC
13,771,632 UART: [kat] ECC-384
16,211,774 UART: [kat] HMAC-384Kdf
16,225,441 UART: [kat] LMS
16,754,913 UART: [kat] --
16,759,504 UART: [cold-reset] ++
16,760,726 UART: [fht] FHT @ 0x50003400
16,772,621 UART: [idev] ++
16,773,184 UART: [idev] CDI.KEYID = 6
16,774,090 UART: [idev] SUBJECT.KEYID = 7
16,775,304 UART: [idev] UDS.KEYID = 0
16,776,816 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
16,921,097 UART: [idev] Erasing UDS.KEYID = 0
19,246,171 UART: [idev] Sha1 KeyId Algorithm
19,269,227 UART: [idev] --
19,274,761 UART: [ldev] ++
19,275,335 UART: [ldev] CDI.KEYID = 6
19,276,239 UART: [ldev] SUBJECT.KEYID = 5
19,277,473 UART: [ldev] AUTHORITY.KEYID = 7
19,278,704 UART: [ldev] FE.KEYID = 1
19,288,920 UART: [ldev] Erasing FE.KEYID = 1
21,765,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,481,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,497,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,513,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,529,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,550,127 UART: [ldev] --
23,554,690 UART: [fwproc] Wait for Commands...
23,556,354 UART: [fwproc] Recv command 0x46574c44
23,558,450 UART: [fwproc] Recv'd Img size: 114940 bytes
26,959,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,030,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,099,243 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
27,419,249 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
3,697,742 ready_for_fw is high
3,698,139 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,273,468 >>> mbox cmd response: success
18,523,914 UART:
18,524,323 UART: Running Caliptra FMC ...
18,525,444 UART:
18,525,600 UART: [state] CFI Enabled
18,533,606 UART: [fht] FMC Alias Private Key: 7
20,289,999 UART: [art] Extend RT PCRs Done
20,291,213 UART: [art] Lock RT PCRs Done
20,292,890 UART: [art] Populate DV Done
20,298,221 UART: [fht] FMC Alias Private Key: 7
20,299,709 UART: [art] Derive CDI
20,300,445 UART: [art] Store in in slot 0x4
20,343,136 UART: [art] Derive Key Pair
20,344,203 UART: [art] Store priv key in slot 0x5
22,770,894 UART: [art] Derive Key Pair - Done
22,783,903 UART: [art] Signing Cert with AUTHO
22,785,205 UART: RITY.KEYID = 7
24,490,517 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,999 UART: [art] PUB.X = 1C0FCE756E81302A118E2FC20F5CBC25429946C449ED28D46FB0CCF76506846700D0CCF7225DD149D152B99C6511AEFC
24,499,275 UART: [art] PUB.Y = 81DFA251EF4A0B313135F4AD3A337B43E67F21787369884685137859B0DD42DA3C281E5B5E57F6C04D77DE14D05C0057
24,506,474 UART: [art] SIG.R = 830E510A1C62131143E67EC0B7AE005E2FD3FCC5A6432C3B5A8062D6E3BA0CC2EABE69A1A551FA1463A2EB9168BB53AF
24,513,866 UART: [art] SIG.S = 41FA75D817BD3E54800B5D10F54DC0D197256464F2437FAEF4AABB014C0712CD8790C0DF0EF26C92A6732253E50A7333
25,493,121 UART: Caliptra RT
25,493,829 UART: [state] CFI Enabled
25,610,781 UART: [rt] RT listening for mailbox commands...
25,612,645 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,642,326 UART: [rt]cmd =0x46504c54, len=4
25,643,880 >>> mbox cmd response data (8 bytes)
25,644,876 UART: [rt] FIPS self test
25,645,821 UART: [kat] ++
25,646,268 UART: [kat] sha1
25,650,664 UART: [kat] SHA2-256
25,652,591 UART: [kat] SHA2-384
25,655,768 UART: [kat] SHA2-512-ACC
25,658,037 UART: [kat] ECC-384
26,380,380 UART: Fatal Error: 0x90040004
26,415,584 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,559,926 >>> mbox cmd response: failed
26,560,583 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,705,265 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
16,927,127 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,513,475 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,038 UART:
192,426 UART: Running Caliptra ROM ...
193,607 UART:
193,757 UART: [state] CFI Enabled
267,383 UART: [state] LifecycleState = Unprovisioned
269,791 UART: [state] DebugLocked = No
271,831 UART: [state] WD Timer not started. Device not locked for debugging
276,808 UART: [kat] SHA2-256
466,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,441 UART: [kat] ++
477,898 UART: [kat] sha1
489,725 UART: [kat] SHA2-256
492,757 UART: [kat] SHA2-384
497,264 UART: [kat] SHA2-512-ACC
499,852 UART: [kat] ECC-384
2,950,515 UART: [kat] HMAC-384Kdf
2,972,059 UART: [kat] LMS
3,503,825 UART: [kat] --
3,508,334 UART: [cold-reset] ++
3,510,066 UART: [fht] FHT @ 0x50003400
3,522,049 UART: [idev] ++
3,522,765 UART: [idev] CDI.KEYID = 6
3,523,803 UART: [idev] SUBJECT.KEYID = 7
3,524,905 UART: [idev] UDS.KEYID = 0
3,525,831 ready_for_fw is high
3,526,037 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,670,698 UART: [idev] Erasing UDS.KEYID = 0
6,030,113 UART: [idev] Sha1 KeyId Algorithm
6,053,876 UART: [idev] --
6,059,252 UART: [ldev] ++
6,059,942 UART: [ldev] CDI.KEYID = 6
6,060,856 UART: [ldev] SUBJECT.KEYID = 5
6,062,019 UART: [ldev] AUTHORITY.KEYID = 7
6,063,257 UART: [ldev] FE.KEYID = 1
6,102,017 UART: [ldev] Erasing FE.KEYID = 1
8,610,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,079 UART: [ldev] --
10,414,752 UART: [fwproc] Wait for Commands...
10,416,364 UART: [fwproc] Recv command 0x46574c44
10,418,682 UART: [fwproc] Recv'd Img size: 114940 bytes
13,874,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,528 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,615,005 >>> mbox cmd response: success
14,618,534 UART: [afmc] ++
14,619,232 UART: [afmc] CDI.KEYID = 6
14,620,411 UART: [afmc] SUBJECT.KEYID = 7
14,621,906 UART: [afmc] AUTHORITY.KEYID = 5
17,154,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,873 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,796 UART: [afmc] --
18,948,349 UART: [cold-reset] --
18,951,891 UART: [state] Locking Datavault
18,957,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,710 UART: [state] Locking ICCM
18,962,238 UART: [exit] Launching FMC @ 0x40000130
18,970,912 UART:
18,971,152 UART: Running Caliptra FMC ...
18,972,273 UART:
18,972,434 UART: [state] CFI Enabled
19,033,728 UART: [fht] FMC Alias Private Key: 7
20,798,193 UART: [art] Extend RT PCRs Done
20,799,419 UART: [art] Lock RT PCRs Done
20,800,989 UART: [art] Populate DV Done
20,806,346 UART: [fht] FMC Alias Private Key: 7
20,807,829 UART: [art] Derive CDI
20,808,592 UART: [art] Store in in slot 0x4
20,866,608 UART: [art] Derive Key Pair
20,867,648 UART: [art] Store priv key in slot 0x5
23,330,473 UART: [art] Derive Key Pair - Done
23,343,625 UART: [art] Signing Cert with AUTHO
23,344,937 UART: RITY.KEYID = 7
25,056,913 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,416 UART: [art] PUB.X = 9704D43BB8F2A5F860688B33A6A53BBF187E17605925F0990D2ADF52EF005AF28841624406517FEACC60E8F19610FEC5
25,065,713 UART: [art] PUB.Y = DFAC7399940484EDD169FF810E894D47A64B514A342EDD373310574AC5EC163EBDA78C9996302E9A4F8FF3E0D759D074
25,072,939 UART: [art] SIG.R = 2974469D66FBC8DA46624AEF3289BF7FD7688B13BB02FF96E181E19417482AF44C3F68F7C82986313C22D16C0A93410C
25,080,350 UART: [art] SIG.S = F8B1FC8A5F6DAFE1498266A59BC84D1C6CFF65BBB3DA04A0B49EEA8126EE412AF2E89B3313AC4C787CE288DEB95A54AD
26,059,385 UART: Caliptra RT
26,060,101 UART: [state] CFI Enabled
26,225,219 UART: [rt] RT listening for mailbox commands...
26,227,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,256,877 UART: [rt]cmd =0x46504c54, len=4
26,258,514 >>> mbox cmd response data (8 bytes)
26,259,549 UART: [rt] FIPS self test
26,260,492 UART: [kat] ++
26,260,945 UART: [kat] sha1
26,265,402 UART: [kat] SHA2-256
26,267,278 UART: [kat] SHA2-384
26,270,234 UART: [kat] SHA2-512-ACC
26,272,467 UART: [kat] ECC-384
27,002,146 UART: Fatal Error: 0x90040004
27,037,420 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,181,788 >>> mbox cmd response: failed
27,182,435 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,326,775 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,110 UART:
190,421 UART: Running Caliptra ROM ...
191,543 UART:
191,694 UART: [state] CFI Enabled
267,424 UART: [state] LifecycleState = Unprovisioned
269,841 UART: [state] DebugLocked = No
271,221 UART: [state] WD Timer not started. Device not locked for debugging
275,078 UART: [kat] SHA2-256
464,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,752 UART: [kat] ++
476,202 UART: [kat] sha1
488,595 UART: [kat] SHA2-256
491,606 UART: [kat] SHA2-384
498,237 UART: [kat] SHA2-512-ACC
500,796 UART: [kat] ECC-384
2,950,845 UART: [kat] HMAC-384Kdf
2,974,200 UART: [kat] LMS
3,505,977 UART: [kat] --
3,509,642 UART: [cold-reset] ++
3,510,926 UART: [fht] FHT @ 0x50003400
3,522,324 UART: [idev] ++
3,523,010 UART: [idev] CDI.KEYID = 6
3,524,032 UART: [idev] SUBJECT.KEYID = 7
3,525,198 UART: [idev] UDS.KEYID = 0
3,526,727 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,091 UART: [idev] Erasing UDS.KEYID = 0
6,028,980 UART: [idev] Sha1 KeyId Algorithm
6,052,600 UART: [idev] --
6,056,761 UART: [ldev] ++
6,057,447 UART: [ldev] CDI.KEYID = 6
6,058,414 UART: [ldev] SUBJECT.KEYID = 5
6,059,576 UART: [ldev] AUTHORITY.KEYID = 7
6,060,808 UART: [ldev] FE.KEYID = 1
6,103,543 UART: [ldev] Erasing FE.KEYID = 1
8,612,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,892 UART: [ldev] --
10,416,845 UART: [fwproc] Wait for Commands...
10,419,507 UART: [fwproc] Recv command 0x46574c44
10,421,779 UART: [fwproc] Recv'd Img size: 114940 bytes
13,879,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,627 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,776 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,621,472 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,436,385 ready_for_fw is high
3,436,780 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,750,267 >>> mbox cmd response: success
19,048,340 UART:
19,048,724 UART: Running Caliptra FMC ...
19,050,046 UART:
19,050,216 UART: [state] CFI Enabled
19,116,198 UART: [fht] FMC Alias Private Key: 7
20,879,912 UART: [art] Extend RT PCRs Done
20,881,154 UART: [art] Lock RT PCRs Done
20,882,836 UART: [art] Populate DV Done
20,888,098 UART: [fht] FMC Alias Private Key: 7
20,889,749 UART: [art] Derive CDI
20,890,570 UART: [art] Store in in slot 0x4
20,948,540 UART: [art] Derive Key Pair
20,949,578 UART: [art] Store priv key in slot 0x5
23,412,068 UART: [art] Derive Key Pair - Done
23,425,023 UART: [art] Signing Cert with AUTHO
23,426,374 UART: RITY.KEYID = 7
25,138,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,251 UART: [art] PUB.X = 68F2EA52FDC1C02326A85C2C0236129911CBCC5722554073BD412B1B741860F7D999E85D789D28399BC91EC306A7DD10
25,147,463 UART: [art] PUB.Y = F0E8D1B3B62528A57A5D36FD5101437EB98B31E12D342172FC50CFEF3F5E26C3E9D958314F8060D6F718905F0F100FD7
25,154,728 UART: [art] SIG.R = BCC012037F31B0285448F47E012BBFB524ABEA724F083C091DC9AF70146EDCF06B158CA1C10A9767DAF4B9481C785254
25,162,134 UART: [art] SIG.S = D9CBD3342D743050FCB690FD2AD1B1AA7D1491DE28E82249D6AB431FFFFE1C237ABE6DDB38540EE8BE6269A25FA5A3B8
26,141,265 UART: Caliptra RT
26,142,009 UART: [state] CFI Enabled
26,306,938 UART: [rt] RT listening for mailbox commands...
26,308,803 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,363 UART: [rt]cmd =0x46504c54, len=4
26,340,109 >>> mbox cmd response data (8 bytes)
26,341,117 UART: [rt] FIPS self test
26,342,066 UART: [kat] ++
26,342,515 UART: [kat] sha1
26,346,968 UART: [kat] SHA2-256
26,348,895 UART: [kat] SHA2-384
26,351,813 UART: [kat] SHA2-512-ACC
26,354,075 UART: [kat] ECC-384
27,082,824 UART: Fatal Error: 0x90040004
27,118,265 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,262,686 >>> mbox cmd response: failed
27,263,339 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,407,600 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
3,421,658 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,741,976 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,431 UART:
192,794 UART: Running Caliptra ROM ...
193,905 UART:
603,509 UART: [state] CFI Enabled
617,583 UART: [state] LifecycleState = Unprovisioned
619,947 UART: [state] DebugLocked = No
621,338 UART: [state] WD Timer not started. Device not locked for debugging
625,228 UART: [kat] SHA2-256
815,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,938 UART: [kat] ++
826,386 UART: [kat] sha1
838,633 UART: [kat] SHA2-256
841,650 UART: [kat] SHA2-384
848,358 UART: [kat] SHA2-512-ACC
850,944 UART: [kat] ECC-384
3,294,131 UART: [kat] HMAC-384Kdf
3,307,617 UART: [kat] LMS
3,839,416 UART: [kat] --
3,843,481 UART: [cold-reset] ++
3,845,767 UART: [fht] FHT @ 0x50003400
3,856,462 UART: [idev] ++
3,857,179 UART: [idev] CDI.KEYID = 6
3,858,216 UART: [idev] SUBJECT.KEYID = 7
3,859,324 UART: [idev] UDS.KEYID = 0
3,860,257 ready_for_fw is high
3,860,464 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,004,901 UART: [idev] Erasing UDS.KEYID = 0
6,334,454 UART: [idev] Sha1 KeyId Algorithm
6,357,949 UART: [idev] --
6,364,319 UART: [ldev] ++
6,364,999 UART: [ldev] CDI.KEYID = 6
6,365,915 UART: [ldev] SUBJECT.KEYID = 5
6,367,134 UART: [ldev] AUTHORITY.KEYID = 7
6,368,310 UART: [ldev] FE.KEYID = 1
6,376,741 UART: [ldev] Erasing FE.KEYID = 1
8,852,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,024 UART: [ldev] --
10,640,870 UART: [fwproc] Wait for Commands...
10,643,561 UART: [fwproc] Recv command 0x46574c44
10,645,903 UART: [fwproc] Recv'd Img size: 114940 bytes
14,107,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,930 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,842,975 >>> mbox cmd response: success
14,846,551 UART: [afmc] ++
14,847,250 UART: [afmc] CDI.KEYID = 6
14,848,497 UART: [afmc] SUBJECT.KEYID = 7
14,849,930 UART: [afmc] AUTHORITY.KEYID = 5
17,358,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,733 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,754 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,213 UART: [afmc] --
19,153,337 UART: [cold-reset] --
19,156,393 UART: [state] Locking Datavault
19,161,968 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,108 UART: [state] Locking ICCM
19,166,906 UART: [exit] Launching FMC @ 0x40000130
19,175,573 UART:
19,175,809 UART: Running Caliptra FMC ...
19,176,911 UART:
19,177,066 UART: [state] CFI Enabled
19,185,445 UART: [fht] FMC Alias Private Key: 7
20,942,311 UART: [art] Extend RT PCRs Done
20,943,527 UART: [art] Lock RT PCRs Done
20,945,304 UART: [art] Populate DV Done
20,950,894 UART: [fht] FMC Alias Private Key: 7
20,952,543 UART: [art] Derive CDI
20,953,278 UART: [art] Store in in slot 0x4
20,996,211 UART: [art] Derive Key Pair
20,997,214 UART: [art] Store priv key in slot 0x5
23,424,393 UART: [art] Derive Key Pair - Done
23,437,274 UART: [art] Signing Cert with AUTHO
23,438,581 UART: RITY.KEYID = 7
25,144,179 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,686 UART: [art] PUB.X = 511B9D9EE590516FFB20303A2052C76B3491451664E924C30E391993B65CC68D8F09570F11CA9A622F71C7DE0553B6EE
25,152,934 UART: [art] PUB.Y = 98E7903EB7F43267D3CAC538FA61B4FA908E8D5224C2E735536CACACDE92137C2E01E210569EA5576BF1D823343FF164
25,160,228 UART: [art] SIG.R = 0B40D7986C0C238934B3918691B263AD9770E98651183FB66A2DAF0CB33848AEEDD5711302C37A90AF313F524F272EA1
25,167,564 UART: [art] SIG.S = 42AE0B50A9D8BE5931701C66747A522A227AA2D1FB8769F5E6408337CF50289F0E013543755F5D94A2E93B6FD7E3958C
26,146,212 UART: Caliptra RT
26,146,918 UART: [state] CFI Enabled
26,265,007 UART: [rt] RT listening for mailbox commands...
26,266,865 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,640 UART: [rt]cmd =0x46504c54, len=4
26,298,211 >>> mbox cmd response data (8 bytes)
26,299,236 UART: [rt] FIPS self test
26,300,180 UART: [kat] ++
26,300,628 UART: [kat] sha1
26,305,303 UART: [kat] SHA2-256
26,307,219 UART: [kat] SHA2-384
26,310,266 UART: [kat] SHA2-512-ACC
26,312,514 UART: [kat] ECC-384
27,035,367 UART: Fatal Error: 0x90040004
27,070,570 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,215,490 >>> mbox cmd response: failed
27,216,182 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,360,449 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
189,999 UART:
190,293 UART: Running Caliptra ROM ...
191,337 UART:
13,170,461 UART: [state] CFI Enabled
13,183,532 UART: [state] LifecycleState = Unprovisioned
13,185,952 UART: [state] DebugLocked = No
13,188,604 UART: [state] WD Timer not started. Device not locked for debugging
13,192,460 UART: [kat] SHA2-256
13,382,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,393,136 UART: [kat] ++
13,393,649 UART: [kat] sha1
13,405,887 UART: [kat] SHA2-256
13,408,899 UART: [kat] SHA2-384
13,414,024 UART: [kat] SHA2-512-ACC
13,416,593 UART: [kat] ECC-384
15,858,411 UART: [kat] HMAC-384Kdf
15,871,498 UART: [kat] LMS
16,403,328 UART: [kat] --
16,406,790 UART: [cold-reset] ++
16,409,102 UART: [fht] FHT @ 0x50003400
16,419,860 UART: [idev] ++
16,420,538 UART: [idev] CDI.KEYID = 6
16,421,474 UART: [idev] SUBJECT.KEYID = 7
16,422,683 UART: [idev] UDS.KEYID = 0
16,424,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
16,568,476 UART: [idev] Erasing UDS.KEYID = 0
18,896,247 UART: [idev] Sha1 KeyId Algorithm
18,918,445 UART: [idev] --
18,923,133 UART: [ldev] ++
18,923,810 UART: [ldev] CDI.KEYID = 6
18,924,770 UART: [ldev] SUBJECT.KEYID = 5
18,925,923 UART: [ldev] AUTHORITY.KEYID = 7
18,927,148 UART: [ldev] FE.KEYID = 1
18,940,466 UART: [ldev] Erasing FE.KEYID = 1
21,417,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,136,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,152,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,167,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,182,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,202,652 UART: [ldev] --
23,207,439 UART: [fwproc] Wait for Commands...
23,209,377 UART: [fwproc] Recv command 0x46574c44
23,211,728 UART: [fwproc] Recv'd Img size: 114940 bytes
26,662,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,745,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
26,861,270 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
27,407,230 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,755,746 ready_for_fw is high
3,756,424 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,961,958 >>> mbox cmd response: success
19,212,003 UART:
19,212,397 UART: Running Caliptra FMC ...
19,213,554 UART:
19,213,737 UART: [state] CFI Enabled
19,221,633 UART: [fht] FMC Alias Private Key: 7
20,979,263 UART: [art] Extend RT PCRs Done
20,980,496 UART: [art] Lock RT PCRs Done
20,981,911 UART: [art] Populate DV Done
20,987,451 UART: [fht] FMC Alias Private Key: 7
20,989,158 UART: [art] Derive CDI
20,989,979 UART: [art] Store in in slot 0x4
21,032,482 UART: [art] Derive Key Pair
21,033,583 UART: [art] Store priv key in slot 0x5
23,460,068 UART: [art] Derive Key Pair - Done
23,473,053 UART: [art] Signing Cert with AUTHO
23,474,392 UART: RITY.KEYID = 7
25,179,691 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,204 UART: [art] PUB.X = ADD8F387C49791BCE8F65EA0AA9F74F8CE1178B28411AE194DB7C32315D9CB8425B19FE338CB0F0B36D21F476A867194
25,188,454 UART: [art] PUB.Y = 053D83B6DA69CA1B6581BF7CA202D9E43F490C343098DCB4149B8BAC64FC3B055B95D048599322524FFF726891958F2C
25,195,709 UART: [art] SIG.R = 62BDF97A88742B160E8376E54F01C65B2CD8D7FD317658A321A5A76184D8B1B7B966C087B4F4C5CDD0048C3128708C3F
25,203,096 UART: [art] SIG.S = 08002AA58C333F64D41087FFFDAA6AB1EFCC94176A6B2AC435B939A2FE8413E0A2CCA2C0587D23C56C8126867BB07570
26,182,305 UART: Caliptra RT
26,182,992 UART: [state] CFI Enabled
26,300,070 UART: [rt] RT listening for mailbox commands...
26,301,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,331,477 UART: [rt]cmd =0x46504c54, len=4
26,333,154 >>> mbox cmd response data (8 bytes)
26,334,256 UART: [rt] FIPS self test
26,335,194 UART: [kat] ++
26,335,647 UART: [kat] sha1
26,340,212 UART: [kat] SHA2-256
26,342,097 UART: [kat] SHA2-384
26,344,898 UART: [kat] SHA2-512-ACC
26,347,144 UART: [kat] ECC-384
27,069,332 UART: Fatal Error: 0x90040004
27,104,802 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,249,168 >>> mbox cmd response: failed
27,249,778 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,394,203 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
16,285,288 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
27,495,413 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,303 UART: [kat] SHA2-256
882,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,349 UART: [kat] ++
886,501 UART: [kat] sha1
890,791 UART: [kat] SHA2-256
892,729 UART: [kat] SHA2-384
895,370 UART: [kat] SHA2-512-ACC
897,271 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,376 UART: [kat] LMS
1,475,572 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,652 UART: [idev] ++
1,479,820 UART: [idev] CDI.KEYID = 6
1,480,180 UART: [idev] SUBJECT.KEYID = 7
1,480,604 UART: [idev] UDS.KEYID = 0
1,480,949 ready_for_fw is high
1,480,949 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,312 UART: [idev] Erasing UDS.KEYID = 0
1,504,796 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,414 UART: [idev] --
1,514,299 UART: [ldev] ++
1,514,467 UART: [ldev] CDI.KEYID = 6
1,514,830 UART: [ldev] SUBJECT.KEYID = 5
1,515,256 UART: [ldev] AUTHORITY.KEYID = 7
1,515,719 UART: [ldev] FE.KEYID = 1
1,520,965 UART: [ldev] Erasing FE.KEYID = 1
1,545,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,632 UART: [ldev] --
1,585,133 UART: [fwproc] Waiting for Commands...
1,585,786 UART: [fwproc] Received command 0x46574c44
1,586,577 UART: [fwproc] Received Image of size 114940 bytes
2,892,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,276 >>> mbox cmd response: success
3,086,448 UART: [afmc] ++
3,086,616 UART: [afmc] CDI.KEYID = 6
3,086,978 UART: [afmc] SUBJECT.KEYID = 7
3,087,403 UART: [afmc] AUTHORITY.KEYID = 5
3,122,894 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,783 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,473 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,302 UART: [afmc] --
3,166,374 UART: [cold-reset] --
3,167,458 UART: [state] Locking Datavault
3,168,255 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,859 UART: [state] Locking ICCM
3,169,505 UART: [exit] Launching FMC @ 0x40000130
3,174,834 UART:
3,174,850 UART: Running Caliptra FMC ...
3,175,258 UART:
3,175,312 UART: [state] CFI Enabled
3,185,691 UART: [fht] FMC Alias Private Key: 7
3,293,396 UART: [art] Extend RT PCRs Done
3,293,824 UART: [art] Lock RT PCRs Done
3,295,420 UART: [art] Populate DV Done
3,303,735 UART: [fht] FMC Alias Private Key: 7
3,304,705 UART: [art] Derive CDI
3,304,985 UART: [art] Store in in slot 0x4
3,390,754 UART: [art] Derive Key Pair
3,391,114 UART: [art] Store priv key in slot 0x5
3,403,940 UART: [art] Derive Key Pair - Done
3,418,725 UART: [art] Signing Cert with AUTHO
3,419,205 UART: RITY.KEYID = 7
3,434,429 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,194 UART: [art] PUB.X = B35F1B496F05AEDDB321840DD0F29A5350770A84C658DD5D4FDCF466413374DB83E223DF78C3971C81550B38ADDBC763
3,441,960 UART: [art] PUB.Y = 165327CBE0D1E00788197B19D86A331E323CFF78E7E9C9999C572D1CCF11C82248DF0D2A3282C31FAA2BD0FE4DD073B6
3,448,914 UART: [art] SIG.R = 9771C19E3715922B58895F121C77D9A2EADE8EED87846D73E935D5CFA18FB56221D4A8A7460F82230422CB383495B723
3,455,674 UART: [art] SIG.S = 13777D84BA0E77DD7BD5D5D33A04030F84B9CCB10570B6866BBF8EEA48782167DBFF47A2BDC2D94CBC5DE565243E1459
3,479,538 UART: Caliptra RT
3,479,791 UART: [state] CFI Enabled
3,588,078 UART: [rt] RT listening for mailbox commands...
3,588,741 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,526 UART: [rt]cmd =0x46504c54, len=4
3,619,712 >>> mbox cmd response data (8 bytes)
3,620,035 UART: [rt] FIPS self test
3,620,363 UART: [kat] ++
3,620,515 UART: [kat] sha1
3,624,745 UART: [kat] SHA2-256
3,626,767 UART: [kat] SHA2-384
3,629,676 UART: [kat] SHA2-512-ACC
3,631,603 UART: [kat] ECC-384
3,635,237 UART: Fatal Error: 0x90040004
3,636,776 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,636,781 >>> mbox cmd response: failed
3,636,781 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,636,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,049 UART: [kat] SHA2-256
881,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,095 UART: [kat] ++
886,247 UART: [kat] sha1
890,523 UART: [kat] SHA2-256
892,461 UART: [kat] SHA2-384
895,038 UART: [kat] SHA2-512-ACC
896,939 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,274 UART: [kat] LMS
1,475,470 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,286 UART: [idev] ++
1,479,454 UART: [idev] CDI.KEYID = 6
1,479,814 UART: [idev] SUBJECT.KEYID = 7
1,480,238 UART: [idev] UDS.KEYID = 0
1,480,583 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,505,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,154 UART: [idev] --
1,515,379 UART: [ldev] ++
1,515,547 UART: [ldev] CDI.KEYID = 6
1,515,910 UART: [ldev] SUBJECT.KEYID = 5
1,516,336 UART: [ldev] AUTHORITY.KEYID = 7
1,516,799 UART: [ldev] FE.KEYID = 1
1,522,035 UART: [ldev] Erasing FE.KEYID = 1
1,547,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,484 UART: [ldev] --
1,586,867 UART: [fwproc] Waiting for Commands...
1,587,568 UART: [fwproc] Received command 0x46574c44
1,588,359 UART: [fwproc] Received Image of size 114940 bytes
2,893,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,652 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,229 ready_for_fw is high
1,362,229 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,834 >>> mbox cmd response: success
2,996,542 UART:
2,996,558 UART: Running Caliptra FMC ...
2,996,966 UART:
2,997,020 UART: [state] CFI Enabled
3,007,669 UART: [fht] FMC Alias Private Key: 7
3,115,416 UART: [art] Extend RT PCRs Done
3,115,844 UART: [art] Lock RT PCRs Done
3,117,408 UART: [art] Populate DV Done
3,125,661 UART: [fht] FMC Alias Private Key: 7
3,126,807 UART: [art] Derive CDI
3,127,087 UART: [art] Store in in slot 0x4
3,212,928 UART: [art] Derive Key Pair
3,213,288 UART: [art] Store priv key in slot 0x5
3,226,484 UART: [art] Derive Key Pair - Done
3,241,221 UART: [art] Signing Cert with AUTHO
3,241,701 UART: RITY.KEYID = 7
3,256,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,602 UART: [art] PUB.X = 1A6B4657117A3A639311E42A32BBB0A7DD090683BA4A5BF21FF5F821FDE8E8FFEC7BA6176B3E27806A1E491FCF2AFA7F
3,264,386 UART: [art] PUB.Y = EC7EB0C9DC2CDCED3F072B432C9768C9F94B045FF24957366E1D9BE4D966510CF1E36EF98A779B166548744B76E00B87
3,271,332 UART: [art] SIG.R = 2855E43C39915C032057711D50801D47500303B5BEBBC87958B9DC791DED854989A85F5DC89A3738901550BBB79B59F7
3,278,085 UART: [art] SIG.S = 58B21D3A94AE466609B75A130D73C603E3B8DA9D5EE70AA46D248F12981DAB71DD5081D20B1429F515AD7171F6EC4BE4
3,302,151 UART: Caliptra RT
3,302,404 UART: [state] CFI Enabled
3,410,610 UART: [rt] RT listening for mailbox commands...
3,411,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,204 UART: [rt]cmd =0x46504c54, len=4
3,442,278 >>> mbox cmd response data (8 bytes)
3,442,579 UART: [rt] FIPS self test
3,442,907 UART: [kat] ++
3,443,059 UART: [kat] sha1
3,447,075 UART: [kat] SHA2-256
3,449,097 UART: [kat] SHA2-384
3,451,950 UART: [kat] SHA2-512-ACC
3,453,877 UART: [kat] ECC-384
3,457,259 UART: Fatal Error: 0x90040004
3,458,798 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,458,803 >>> mbox cmd response: failed
3,458,803 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,458,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,044 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,213 UART: [kat] HMAC-384Kdf
907,919 UART: [kat] LMS
1,476,115 UART: [kat] --
1,477,210 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,461 UART: [idev] ++
1,480,629 UART: [idev] CDI.KEYID = 6
1,480,989 UART: [idev] SUBJECT.KEYID = 7
1,481,413 UART: [idev] UDS.KEYID = 0
1,481,758 ready_for_fw is high
1,481,758 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,849 UART: [idev] Erasing UDS.KEYID = 0
1,506,441 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,135 UART: [idev] --
1,516,282 UART: [ldev] ++
1,516,450 UART: [ldev] CDI.KEYID = 6
1,516,813 UART: [ldev] SUBJECT.KEYID = 5
1,517,239 UART: [ldev] AUTHORITY.KEYID = 7
1,517,702 UART: [ldev] FE.KEYID = 1
1,522,874 UART: [ldev] Erasing FE.KEYID = 1
1,548,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,311 UART: [ldev] --
1,587,764 UART: [fwproc] Waiting for Commands...
1,588,629 UART: [fwproc] Received command 0x46574c44
1,589,420 UART: [fwproc] Received Image of size 114940 bytes
2,894,398 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,322 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,088,083 >>> mbox cmd response: success
3,089,241 UART: [afmc] ++
3,089,409 UART: [afmc] CDI.KEYID = 6
3,089,771 UART: [afmc] SUBJECT.KEYID = 7
3,090,196 UART: [afmc] AUTHORITY.KEYID = 5
3,125,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,777 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,170 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,860 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,709 UART: [afmc] --
3,168,623 UART: [cold-reset] --
3,169,551 UART: [state] Locking Datavault
3,170,644 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,248 UART: [state] Locking ICCM
3,171,888 UART: [exit] Launching FMC @ 0x40000130
3,177,217 UART:
3,177,233 UART: Running Caliptra FMC ...
3,177,641 UART:
3,177,784 UART: [state] CFI Enabled
3,188,413 UART: [fht] FMC Alias Private Key: 7
3,296,474 UART: [art] Extend RT PCRs Done
3,296,902 UART: [art] Lock RT PCRs Done
3,298,722 UART: [art] Populate DV Done
3,307,059 UART: [fht] FMC Alias Private Key: 7
3,307,989 UART: [art] Derive CDI
3,308,269 UART: [art] Store in in slot 0x4
3,394,346 UART: [art] Derive Key Pair
3,394,706 UART: [art] Store priv key in slot 0x5
3,407,948 UART: [art] Derive Key Pair - Done
3,422,761 UART: [art] Signing Cert with AUTHO
3,423,241 UART: RITY.KEYID = 7
3,438,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,224 UART: [art] PUB.X = A432A42F62AC48315FB3781278CEE043C8F5E4E9CB29938FF1D5672965A139C934F6BBF2360AAD01499140CF0E4C324A
3,445,989 UART: [art] PUB.Y = 94AA83BDC9A810404EFE50A4715F64A756E9962252F05FE81553917664CBC5CE9BB45964705EF3D0C940A8183BED4452
3,452,939 UART: [art] SIG.R = 48598977CF2A664145F4A08AF4BD1F7E1956664BB4B5E7711457B0C121C32CEF089A9F4262FA8175D2654C0CEB1DFADB
3,459,711 UART: [art] SIG.S = F2A6BBEB9F542267CE2C953E814C1F69CB8258A9F2BF7CF03D85B133AE91BE3D29C9A742B3EA190C3A7F8DEF8F3B4838
3,484,121 UART: Caliptra RT
3,484,466 UART: [state] CFI Enabled
3,592,751 UART: [rt] RT listening for mailbox commands...
3,593,414 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,213 UART: [rt]cmd =0x46504c54, len=4
3,624,185 >>> mbox cmd response data (8 bytes)
3,624,344 UART: [rt] FIPS self test
3,624,672 UART: [kat] ++
3,624,824 UART: [kat] sha1
3,629,204 UART: [kat] SHA2-256
3,631,226 UART: [kat] SHA2-384
3,634,115 UART: [kat] SHA2-512-ACC
3,636,042 UART: [kat] ECC-384
3,639,572 UART: Fatal Error: 0x90040004
3,641,111 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,641,116 >>> mbox cmd response: failed
3,641,116 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,641,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,671 UART: [kat] SHA2-512-ACC
897,572 UART: [kat] ECC-384
903,261 UART: [kat] HMAC-384Kdf
907,819 UART: [kat] LMS
1,476,015 UART: [kat] --
1,476,868 UART: [cold-reset] ++
1,477,348 UART: [fht] Storing FHT @ 0x50003400
1,480,015 UART: [idev] ++
1,480,183 UART: [idev] CDI.KEYID = 6
1,480,543 UART: [idev] SUBJECT.KEYID = 7
1,480,967 UART: [idev] UDS.KEYID = 0
1,481,312 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,149 UART: [idev] Erasing UDS.KEYID = 0
1,505,903 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,472 UART: [ldev] ++
1,515,640 UART: [ldev] CDI.KEYID = 6
1,516,003 UART: [ldev] SUBJECT.KEYID = 5
1,516,429 UART: [ldev] AUTHORITY.KEYID = 7
1,516,892 UART: [ldev] FE.KEYID = 1
1,522,288 UART: [ldev] Erasing FE.KEYID = 1
1,547,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,719 UART: [ldev] --
1,587,108 UART: [fwproc] Waiting for Commands...
1,587,747 UART: [fwproc] Received command 0x46574c44
1,588,538 UART: [fwproc] Received Image of size 114940 bytes
2,894,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,330 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,435 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,788 ready_for_fw is high
1,362,788 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,715 >>> mbox cmd response: success
2,999,375 UART:
2,999,391 UART: Running Caliptra FMC ...
2,999,799 UART:
2,999,942 UART: [state] CFI Enabled
3,010,181 UART: [fht] FMC Alias Private Key: 7
3,117,498 UART: [art] Extend RT PCRs Done
3,117,926 UART: [art] Lock RT PCRs Done
3,119,636 UART: [art] Populate DV Done
3,128,061 UART: [fht] FMC Alias Private Key: 7
3,129,009 UART: [art] Derive CDI
3,129,289 UART: [art] Store in in slot 0x4
3,214,944 UART: [art] Derive Key Pair
3,215,304 UART: [art] Store priv key in slot 0x5
3,228,076 UART: [art] Derive Key Pair - Done
3,242,926 UART: [art] Signing Cert with AUTHO
3,243,406 UART: RITY.KEYID = 7
3,258,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,305 UART: [art] PUB.X = 5CC4EC220F7C31EA39F5F1A314F67020FEB35B48660F7A4C7237DD59DACEFAE7B376CB94E0FC4C51F4DFAAAA2CB8502B
3,266,097 UART: [art] PUB.Y = 3A4AAF62909131265FB4543F2808A07FF68B0DCC7417FF3041CB5E7B5564E09AF30CB070F9A1AB09B3E4A32336BCAE6A
3,273,047 UART: [art] SIG.R = 4B700ED4E6D4F3FC3867F03BC16AD1FE214E05A592DC8BCCCDE508173802A27FD6A5B4D729D2D6805BC611442B81DDD0
3,279,821 UART: [art] SIG.S = EFB322C2FEDF4A356343D62CA6C3C25C4ABB50EE04FF66F2F5449D17AA282D60769BF48A9FF0AE301760BE8B9EE1329E
3,303,073 UART: Caliptra RT
3,303,418 UART: [state] CFI Enabled
3,412,831 UART: [rt] RT listening for mailbox commands...
3,413,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,177 UART: [rt]cmd =0x46504c54, len=4
3,444,183 >>> mbox cmd response data (8 bytes)
3,444,538 UART: [rt] FIPS self test
3,444,866 UART: [kat] ++
3,445,018 UART: [kat] sha1
3,449,268 UART: [kat] SHA2-256
3,451,290 UART: [kat] SHA2-384
3,454,165 UART: [kat] SHA2-512-ACC
3,456,092 UART: [kat] ECC-384
3,460,028 UART: Fatal Error: 0x90040004
3,461,567 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,461,572 >>> mbox cmd response: failed
3,461,572 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,461,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,123 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,190 UART: [kat] SHA2-256
892,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,965 UART: [kat] ++
897,117 UART: [kat] sha1
901,275 UART: [kat] SHA2-256
903,215 UART: [kat] SHA2-384
905,864 UART: [kat] SHA2-512-ACC
907,765 UART: [kat] ECC-384
917,326 UART: [kat] HMAC-384Kdf
921,842 UART: [kat] LMS
1,170,170 UART: [kat] --
1,171,245 UART: [cold-reset] ++
1,171,713 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,372 UART: [idev] UDS.KEYID = 0
1,175,717 ready_for_fw is high
1,175,717 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,687 UART: [ldev] --
1,280,962 UART: [fwproc] Wait for Commands...
1,281,708 UART: [fwproc] Recv command 0x46574c44
1,282,436 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,054 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,691 >>> mbox cmd response: success
2,781,869 UART: [afmc] ++
2,782,037 UART: [afmc] CDI.KEYID = 6
2,782,399 UART: [afmc] SUBJECT.KEYID = 7
2,782,824 UART: [afmc] AUTHORITY.KEYID = 5
2,817,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,038 UART: [afmc] --
2,860,964 UART: [cold-reset] --
2,861,906 UART: [state] Locking Datavault
2,863,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,789 UART: [state] Locking ICCM
2,864,227 UART: [exit] Launching FMC @ 0x40000130
2,869,556 UART:
2,869,572 UART: Running Caliptra FMC ...
2,869,980 UART:
2,870,034 UART: [state] CFI Enabled
2,880,737 UART: [fht] FMC Alias Private Key: 7
2,989,026 UART: [art] Extend RT PCRs Done
2,989,454 UART: [art] Lock RT PCRs Done
2,990,986 UART: [art] Populate DV Done
2,999,019 UART: [fht] FMC Alias Private Key: 7
3,000,085 UART: [art] Derive CDI
3,000,365 UART: [art] Store in in slot 0x4
3,085,828 UART: [art] Derive Key Pair
3,086,188 UART: [art] Store priv key in slot 0x5
3,099,406 UART: [art] Derive Key Pair - Done
3,114,317 UART: [art] Signing Cert with AUTHO
3,114,797 UART: RITY.KEYID = 7
3,129,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,590 UART: [art] PUB.X = 6D4412F759C30072D27FA9475F8B8C8BE33DFF3AE9BBAB8535090DFFE8DFDEECBE03B38CE0D139DAD74852D68CB051FC
3,137,355 UART: [art] PUB.Y = A5C5AF64CFCCE71C58EAEDDE6A3AA8FD6455E44BF45E79261999AEEA76000C5204F258335FC94890D7CBA17C83656745
3,144,291 UART: [art] SIG.R = 6205850F5BEB728EAE872629EA31E9CEFD368D67D12CE11E3DD3771A5CF9782A7BFC533E891B51D691C600431BDE8DD3
3,151,045 UART: [art] SIG.S = 009F5DCCC680B73B65205F149583FBACC99311760BA355B53D758AEF63C8350C60A4666FE53A6B32A818CA305403BBD7
3,174,947 UART: Caliptra RT
3,175,200 UART: [state] CFI Enabled
3,282,312 UART: [rt] RT listening for mailbox commands...
3,282,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,484 UART: [rt]cmd =0x46504c54, len=4
3,313,762 >>> mbox cmd response data (8 bytes)
3,314,095 UART: [rt] FIPS self test
3,314,423 UART: [kat] ++
3,314,575 UART: [kat] sha1
3,318,697 UART: [kat] SHA2-256
3,320,719 UART: [kat] SHA2-384
3,323,424 UART: [kat] SHA2-512-ACC
3,325,351 UART: [kat] ECC-384
3,329,239 UART: Fatal Error: 0x90040004
3,330,778 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,783 >>> mbox cmd response: failed
3,330,783 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Unprovisioned
85,423 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,545 UART: [kat] SHA2-256
903,485 UART: [kat] SHA2-384
906,298 UART: [kat] SHA2-512-ACC
908,199 UART: [kat] ECC-384
917,982 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,397 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,510 UART: [idev] ++
1,174,678 UART: [idev] CDI.KEYID = 6
1,175,038 UART: [idev] SUBJECT.KEYID = 7
1,175,462 UART: [idev] UDS.KEYID = 0
1,175,807 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,438 UART: [idev] Erasing UDS.KEYID = 0
1,200,219 UART: [idev] Sha1 KeyId Algorithm
1,208,679 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,252 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,961 UART: [ldev] --
1,281,342 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,408 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,103 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,637 ready_for_fw is high
1,059,637 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,608 >>> mbox cmd response: success
2,694,842 UART:
2,694,858 UART: Running Caliptra FMC ...
2,695,266 UART:
2,695,320 UART: [state] CFI Enabled
2,705,989 UART: [fht] FMC Alias Private Key: 7
2,813,772 UART: [art] Extend RT PCRs Done
2,814,200 UART: [art] Lock RT PCRs Done
2,815,934 UART: [art] Populate DV Done
2,824,297 UART: [fht] FMC Alias Private Key: 7
2,825,257 UART: [art] Derive CDI
2,825,537 UART: [art] Store in in slot 0x4
2,911,046 UART: [art] Derive Key Pair
2,911,406 UART: [art] Store priv key in slot 0x5
2,924,682 UART: [art] Derive Key Pair - Done
2,939,443 UART: [art] Signing Cert with AUTHO
2,939,923 UART: RITY.KEYID = 7
2,955,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,974 UART: [art] PUB.X = 7F7B9C37B78D3749CC6636028601E9C1039F990CF9AC7F1808DCF534FD6C729AB2FD08B9BDEADC9CA1DB1A4AC8389087
2,962,742 UART: [art] PUB.Y = BE3048D3F8C6BCCD495C8C0886025978196FB12D1A15A5545D1C336EF42E42FFB4886BD272E0B78EB23022A23786ECB9
2,969,692 UART: [art] SIG.R = 5D81172420D4459CA1E903CF095335471E5BA249384FE341967D8307926A0BF087E56085F061EC53C33CC89A2CEA6A3C
2,976,446 UART: [art] SIG.S = 86B7A013AB849441D7699E51F5CBF0869D94960960CF2CB76B6B8E3C181913AFDED8207F870891CA4AAF9C6C5C8F7CF6
3,000,191 UART: Caliptra RT
3,000,444 UART: [state] CFI Enabled
3,109,039 UART: [rt] RT listening for mailbox commands...
3,109,702 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,629 UART: [rt]cmd =0x46504c54, len=4
3,140,635 >>> mbox cmd response data (8 bytes)
3,140,820 UART: [rt] FIPS self test
3,141,148 UART: [kat] ++
3,141,300 UART: [kat] sha1
3,145,436 UART: [kat] SHA2-256
3,147,458 UART: [kat] SHA2-384
3,150,153 UART: [kat] SHA2-512-ACC
3,152,080 UART: [kat] ECC-384
3,155,982 UART: Fatal Error: 0x90040004
3,157,521 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,157,526 >>> mbox cmd response: failed
3,157,526 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,157,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,723 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,998 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,565 UART: [kat] HMAC-384Kdf
923,311 UART: [kat] LMS
1,171,639 UART: [kat] --
1,172,470 UART: [cold-reset] ++
1,172,810 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,881 UART: [idev] Erasing UDS.KEYID = 0
1,200,826 UART: [idev] Sha1 KeyId Algorithm
1,209,102 UART: [idev] --
1,210,204 UART: [ldev] ++
1,210,372 UART: [ldev] CDI.KEYID = 6
1,210,735 UART: [ldev] SUBJECT.KEYID = 5
1,211,161 UART: [ldev] AUTHORITY.KEYID = 7
1,211,624 UART: [ldev] FE.KEYID = 1
1,217,146 UART: [ldev] Erasing FE.KEYID = 1
1,243,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,252 UART: [ldev] --
1,282,709 UART: [fwproc] Wait for Commands...
1,283,293 UART: [fwproc] Recv command 0x46574c44
1,284,021 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,035 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,686 >>> mbox cmd response: success
2,783,844 UART: [afmc] ++
2,784,012 UART: [afmc] CDI.KEYID = 6
2,784,374 UART: [afmc] SUBJECT.KEYID = 7
2,784,799 UART: [afmc] AUTHORITY.KEYID = 5
2,820,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,114 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,833 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,669 UART: [afmc] --
2,863,651 UART: [cold-reset] --
2,864,409 UART: [state] Locking Datavault
2,865,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,236 UART: [state] Locking ICCM
2,866,840 UART: [exit] Launching FMC @ 0x40000130
2,872,169 UART:
2,872,185 UART: Running Caliptra FMC ...
2,872,593 UART:
2,872,736 UART: [state] CFI Enabled
2,883,347 UART: [fht] FMC Alias Private Key: 7
2,991,436 UART: [art] Extend RT PCRs Done
2,991,864 UART: [art] Lock RT PCRs Done
2,993,534 UART: [art] Populate DV Done
3,001,813 UART: [fht] FMC Alias Private Key: 7
3,002,955 UART: [art] Derive CDI
3,003,235 UART: [art] Store in in slot 0x4
3,089,494 UART: [art] Derive Key Pair
3,089,854 UART: [art] Store priv key in slot 0x5
3,103,436 UART: [art] Derive Key Pair - Done
3,117,786 UART: [art] Signing Cert with AUTHO
3,118,266 UART: RITY.KEYID = 7
3,133,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,989 UART: [art] PUB.X = E0C06F368C4514F125BB8C718801A13F6FDF4C8ECB9D1C573F911496BF28D681FC56FF80D74CB63E1DB08904AD8D1D91
3,140,765 UART: [art] PUB.Y = D14D5CA75DC6E4E10BA0F7D734584641EBAF697AB56B90B727A96CD661FF1B0AF541DB219FCCBF7459124B5D95C97733
3,147,723 UART: [art] SIG.R = 42B6B6A9E178998CFA3EDC36191FBDEE05BC754C4A999DEF2F9725199B487F4C08C3393427A131C009D40AA501CC8D08
3,154,483 UART: [art] SIG.S = CA454EA8120ABB6AA7CA6F64BE50BE449E28978030C0B69B09DA3425D2C9BA752D99E21BBA31C4F1F3BA48CAAF36FECA
3,178,138 UART: Caliptra RT
3,178,483 UART: [state] CFI Enabled
3,287,106 UART: [rt] RT listening for mailbox commands...
3,287,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,894 UART: [rt]cmd =0x46504c54, len=4
3,318,958 >>> mbox cmd response data (8 bytes)
3,319,097 UART: [rt] FIPS self test
3,319,425 UART: [kat] ++
3,319,577 UART: [kat] sha1
3,323,933 UART: [kat] SHA2-256
3,325,955 UART: [kat] SHA2-384
3,328,818 UART: [kat] SHA2-512-ACC
3,330,745 UART: [kat] ECC-384
3,334,369 UART: Fatal Error: 0x90040004
3,335,908 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,335,913 >>> mbox cmd response: failed
3,335,913 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,335,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,841 UART: [kat] SHA2-512-ACC
908,742 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,458 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,581 UART: [idev] ++
1,175,749 UART: [idev] CDI.KEYID = 6
1,176,109 UART: [idev] SUBJECT.KEYID = 7
1,176,533 UART: [idev] UDS.KEYID = 0
1,176,878 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,573 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,168 UART: [idev] --
1,211,060 UART: [ldev] ++
1,211,228 UART: [ldev] CDI.KEYID = 6
1,211,591 UART: [ldev] SUBJECT.KEYID = 5
1,212,017 UART: [ldev] AUTHORITY.KEYID = 7
1,212,480 UART: [ldev] FE.KEYID = 1
1,217,486 UART: [ldev] Erasing FE.KEYID = 1
1,243,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,014 UART: [ldev] --
1,282,501 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,349 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,006 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,770 ready_for_fw is high
1,061,770 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,721 >>> mbox cmd response: success
2,698,177 UART:
2,698,193 UART: Running Caliptra FMC ...
2,698,601 UART:
2,698,744 UART: [state] CFI Enabled
2,709,219 UART: [fht] FMC Alias Private Key: 7
2,817,672 UART: [art] Extend RT PCRs Done
2,818,100 UART: [art] Lock RT PCRs Done
2,819,532 UART: [art] Populate DV Done
2,827,631 UART: [fht] FMC Alias Private Key: 7
2,828,711 UART: [art] Derive CDI
2,828,991 UART: [art] Store in in slot 0x4
2,914,816 UART: [art] Derive Key Pair
2,915,176 UART: [art] Store priv key in slot 0x5
2,928,168 UART: [art] Derive Key Pair - Done
2,942,823 UART: [art] Signing Cert with AUTHO
2,943,303 UART: RITY.KEYID = 7
2,958,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,016 UART: [art] PUB.X = 45209EC95469C584BDE774441F2926376C20E3E344534F4D0C28FBE596CF2947E97B24CAE5085E582FD04FD50E4F0055
2,965,753 UART: [art] PUB.Y = 72A140FC617DF9CACF05D8438556617B3DA5C1B59CEF4E7C101D53C7791D4CD9B39E2257832D70D22F19FAA7F653D42B
2,972,710 UART: [art] SIG.R = 2802E92DD48C18066B12CF1C8913E5020CEB315D0E7476A86590AF002541338B8E5D47E93710542AC21ACCE346E45623
2,979,437 UART: [art] SIG.S = B3F8490197EF9F05CB1CD6D964972CC19E66A43175B874D747F9EABA7C632E62461868DD433F012C9E6BD336A106A1B9
3,002,672 UART: Caliptra RT
3,003,017 UART: [state] CFI Enabled
3,111,464 UART: [rt] RT listening for mailbox commands...
3,112,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,974 UART: [rt]cmd =0x46504c54, len=4
3,143,166 >>> mbox cmd response data (8 bytes)
3,143,417 UART: [rt] FIPS self test
3,143,745 UART: [kat] ++
3,143,897 UART: [kat] sha1
3,148,171 UART: [kat] SHA2-256
3,150,193 UART: [kat] SHA2-384
3,153,046 UART: [kat] SHA2-512-ACC
3,154,973 UART: [kat] ECC-384
3,158,671 UART: Fatal Error: 0x90040004
3,160,210 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,215 >>> mbox cmd response: failed
3,160,215 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,184 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,169 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
900,161 UART: [kat] SHA2-256
902,101 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,174,749 ready_for_fw is high
1,174,749 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,279 UART: [idev] --
1,209,328 UART: [ldev] ++
1,209,496 UART: [ldev] CDI.KEYID = 6
1,209,860 UART: [ldev] SUBJECT.KEYID = 5
1,210,287 UART: [ldev] AUTHORITY.KEYID = 7
1,210,750 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,418 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,389 UART: [fwproc] Recv command 0x46574c44
1,283,122 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,509 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,149 >>> mbox cmd response: success
2,783,390 UART: [afmc] ++
2,783,558 UART: [afmc] CDI.KEYID = 6
2,783,921 UART: [afmc] SUBJECT.KEYID = 7
2,784,347 UART: [afmc] AUTHORITY.KEYID = 5
2,820,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,752 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,635 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,354 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,275 UART: [afmc] --
2,863,237 UART: [cold-reset] --
2,863,917 UART: [state] Locking Datavault
2,864,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,512 UART: [state] Locking ICCM
2,866,008 UART: [exit] Launching FMC @ 0x40000130
2,871,337 UART:
2,871,353 UART: Running Caliptra FMC ...
2,871,761 UART:
2,871,815 UART: [state] CFI Enabled
2,882,200 UART: [fht] FMC Alias Private Key: 7
2,990,681 UART: [art] Extend RT PCRs Done
2,991,109 UART: [art] Lock RT PCRs Done
2,992,451 UART: [art] Populate DV Done
3,000,698 UART: [fht] FMC Alias Private Key: 7
3,001,724 UART: [art] Derive CDI
3,002,004 UART: [art] Store in in slot 0x4
3,087,763 UART: [art] Derive Key Pair
3,088,123 UART: [art] Store priv key in slot 0x5
3,100,949 UART: [art] Derive Key Pair - Done
3,115,559 UART: [art] Signing Cert with AUTHO
3,116,039 UART: RITY.KEYID = 7
3,131,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,846 UART: [art] PUB.X = DBA97E1118943733EFD1373B4CD58E668DF2FBC9880FE800A06B7F39B270AFC3B55C5655F74AF05D8C1B77E954F76772
3,138,599 UART: [art] PUB.Y = 714BD741B08D1F04B2AD00B7A5F7DB05D2333729D0AFB0222A2E3F2A2E63D32DA595CA3AB3FB787A96FAF156873E14EE
3,145,537 UART: [art] SIG.R = BD73DDDD13306CA8E08A2BE4E9304EA36A2CF82FC371EE94B60A4C724DFCBFC4F661F264EFFC6E59174D6EE4FDA0E8C9
3,152,334 UART: [art] SIG.S = 61C03646E0D9194DE3EB9A5379B8CFE3B9307145ED3D9F89D6B11E017B0EB3B16939BD679702E9C61D7F95AACFAA5FE6
3,176,056 UART: Caliptra RT
3,176,309 UART: [state] CFI Enabled
3,284,520 UART: [rt] RT listening for mailbox commands...
3,285,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,948 UART: [rt]cmd =0x46504c54, len=4
3,316,218 >>> mbox cmd response data (8 bytes)
3,316,455 UART: [rt] FIPS self test
3,316,783 UART: [kat] ++
3,316,935 UART: [kat] sha1
3,321,237 UART: [kat] SHA2-256
3,323,259 UART: [kat] SHA2-384
3,326,084 UART: [kat] SHA2-512-ACC
3,328,011 UART: [kat] ECC-384
3,331,725 UART: Fatal Error: 0x90040004
3,333,264 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,333,269 >>> mbox cmd response: failed
3,333,269 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,333,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,598 UART: [kat] SHA2-512-ACC
906,499 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,839 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,761 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,291 UART: [fwproc] Recv command 0x46574c44
1,282,024 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,867 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,501 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,298 ready_for_fw is high
1,055,298 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,323 >>> mbox cmd response: success
2,692,593 UART:
2,692,609 UART: Running Caliptra FMC ...
2,693,017 UART:
2,693,071 UART: [state] CFI Enabled
2,703,698 UART: [fht] FMC Alias Private Key: 7
2,810,969 UART: [art] Extend RT PCRs Done
2,811,397 UART: [art] Lock RT PCRs Done
2,813,003 UART: [art] Populate DV Done
2,821,196 UART: [fht] FMC Alias Private Key: 7
2,822,162 UART: [art] Derive CDI
2,822,442 UART: [art] Store in in slot 0x4
2,907,947 UART: [art] Derive Key Pair
2,908,307 UART: [art] Store priv key in slot 0x5
2,922,523 UART: [art] Derive Key Pair - Done
2,937,452 UART: [art] Signing Cert with AUTHO
2,937,932 UART: RITY.KEYID = 7
2,953,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,259 UART: [art] PUB.X = AA3CEBAFA1DAE69223C78F45ABB38F667EB9B433BA0B08C1D17C1FB65FE16EB215217AA1DE58D9BA6B537FFBA93B0431
2,961,048 UART: [art] PUB.Y = C37070034D269B46EECC266C04CBBCAC3C2174E0F5EE0D992208786B7066323837B5CB8CE2F04951CA2409799EA78FF7
2,967,987 UART: [art] SIG.R = 83B68452A5F40E565BEB06C64A2081F3D2485194AA3C5E0F4477FB5B18F29BD6C5CBD8C96B9FFBE8A6836A1A2C706822
2,974,758 UART: [art] SIG.S = 66F16FA59CDD335E162F8AA2BF398301AEEDCB95F8DA6E67C9A8B47BAD4DF6A1314A2BEAB2CD882778E32E6635C73ACC
2,999,202 UART: Caliptra RT
2,999,455 UART: [state] CFI Enabled
3,107,354 UART: [rt] RT listening for mailbox commands...
3,108,017 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,812 UART: [rt]cmd =0x46504c54, len=4
3,139,056 >>> mbox cmd response data (8 bytes)
3,139,249 UART: [rt] FIPS self test
3,139,577 UART: [kat] ++
3,139,729 UART: [kat] sha1
3,143,913 UART: [kat] SHA2-256
3,145,935 UART: [kat] SHA2-384
3,148,784 UART: [kat] SHA2-512-ACC
3,150,711 UART: [kat] ECC-384
3,154,517 UART: Fatal Error: 0x90040004
3,156,056 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,061 >>> mbox cmd response: failed
3,156,061 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,422 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,085 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,400 UART: [kat] SHA2-256
902,340 UART: [kat] SHA2-384
905,155 UART: [kat] SHA2-512-ACC
907,056 UART: [kat] ECC-384
917,107 UART: [kat] HMAC-384Kdf
921,919 UART: [kat] LMS
1,170,231 UART: [kat] --
1,170,760 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,882 UART: [idev] ++
1,174,050 UART: [idev] CDI.KEYID = 6
1,174,411 UART: [idev] SUBJECT.KEYID = 7
1,174,836 UART: [idev] UDS.KEYID = 0
1,175,182 ready_for_fw is high
1,175,182 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,209,044 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,283,036 UART: [fwproc] Recv command 0x46574c44
1,283,769 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,209 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,518 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,262 >>> mbox cmd response: success
2,782,279 UART: [afmc] ++
2,782,447 UART: [afmc] CDI.KEYID = 6
2,782,810 UART: [afmc] SUBJECT.KEYID = 7
2,783,236 UART: [afmc] AUTHORITY.KEYID = 5
2,818,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,776 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,495 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,200 UART: [afmc] --
2,862,106 UART: [cold-reset] --
2,862,876 UART: [state] Locking Datavault
2,864,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,847 UART: [state] Locking ICCM
2,865,437 UART: [exit] Launching FMC @ 0x40000130
2,870,766 UART:
2,870,782 UART: Running Caliptra FMC ...
2,871,190 UART:
2,871,333 UART: [state] CFI Enabled
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,990,609 UART: [art] Extend RT PCRs Done
2,991,037 UART: [art] Lock RT PCRs Done
2,992,835 UART: [art] Populate DV Done
3,000,924 UART: [fht] FMC Alias Private Key: 7
3,001,946 UART: [art] Derive CDI
3,002,226 UART: [art] Store in in slot 0x4
3,088,013 UART: [art] Derive Key Pair
3,088,373 UART: [art] Store priv key in slot 0x5
3,101,845 UART: [art] Derive Key Pair - Done
3,116,627 UART: [art] Signing Cert with AUTHO
3,117,107 UART: RITY.KEYID = 7
3,132,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,032 UART: [art] PUB.X = C94D44CA8296F53D80654C903EAE830CC82D2A7A8DF29C2117894AC1E936C4B42F40D12F7E168D6413A77DB1E367C0FD
3,139,807 UART: [art] PUB.Y = 0E852AE3CC6BD08A61D4AF11AEA1AEC3EDA834A3D6984E13C5FCC3D642EFE1BB4B780E08DD7DC63F328341731CC82DB5
3,146,774 UART: [art] SIG.R = 99766611ACD30F8075FC24A535A9E612E153C71D47C8064DC952B7E98238A1C9BF5ACA0FB8CDF0139CEE7E3941EFE8DF
3,153,549 UART: [art] SIG.S = 53B7E6A576F0AEF1435AAD9701901BDABF7522776E4155571EDC3F1049F78F453444458E3A0AF60A79FB33B17A371277
3,177,941 UART: Caliptra RT
3,178,286 UART: [state] CFI Enabled
3,285,549 UART: [rt] RT listening for mailbox commands...
3,286,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,219 UART: [rt]cmd =0x46504c54, len=4
3,317,521 >>> mbox cmd response data (8 bytes)
3,317,768 UART: [rt] FIPS self test
3,318,096 UART: [kat] ++
3,318,248 UART: [kat] sha1
3,322,472 UART: [kat] SHA2-256
3,324,494 UART: [kat] SHA2-384
3,327,367 UART: [kat] SHA2-512-ACC
3,329,294 UART: [kat] ECC-384
3,333,238 UART: Fatal Error: 0x90040004
3,334,777 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,334,782 >>> mbox cmd response: failed
3,334,782 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,334,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,893 UART: [kat] SHA2-256
891,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
915,807 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,906 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,173,042 UART: [idev] ++
1,173,210 UART: [idev] CDI.KEYID = 6
1,173,571 UART: [idev] SUBJECT.KEYID = 7
1,173,996 UART: [idev] UDS.KEYID = 0
1,174,342 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,904 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,217 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,380 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,024 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,799 ready_for_fw is high
1,055,799 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,052 >>> mbox cmd response: success
2,693,214 UART:
2,693,230 UART: Running Caliptra FMC ...
2,693,638 UART:
2,693,781 UART: [state] CFI Enabled
2,704,164 UART: [fht] FMC Alias Private Key: 7
2,812,611 UART: [art] Extend RT PCRs Done
2,813,039 UART: [art] Lock RT PCRs Done
2,814,891 UART: [art] Populate DV Done
2,823,174 UART: [fht] FMC Alias Private Key: 7
2,824,278 UART: [art] Derive CDI
2,824,558 UART: [art] Store in in slot 0x4
2,910,343 UART: [art] Derive Key Pair
2,910,703 UART: [art] Store priv key in slot 0x5
2,923,741 UART: [art] Derive Key Pair - Done
2,938,551 UART: [art] Signing Cert with AUTHO
2,939,031 UART: RITY.KEYID = 7
2,954,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,172 UART: [art] PUB.X = E3BF24E963384711BB83774E12EB25CA78880857F7F8F3F39186043E2AB99630D79D835E3CCA5369F5C2EF1F36FA8DA8
2,961,940 UART: [art] PUB.Y = ECD90A8AA8938DA0DCF8BD28269681E850DF8F2F5044678D3899118DBE3E5FAEDB5D6616BFC21F2AF9D8B0DC32CAF5B0
2,968,911 UART: [art] SIG.R = 25F27F8CC4F8C2FD7EFC826912442F3E04B770CEEBE4584886D0A38C7842155386C3E72E5529BB96E00B5778688D4A9E
2,975,677 UART: [art] SIG.S = AAB2D7CFC6FF7B31612AA4072894E544E37B46FE1FB0565E06128876E122CCD0F7E2CE1BC7AC0CAB7D05E202090742EF
3,000,059 UART: Caliptra RT
3,000,404 UART: [state] CFI Enabled
3,107,223 UART: [rt] RT listening for mailbox commands...
3,107,886 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,703 UART: [rt]cmd =0x46504c54, len=4
3,138,635 >>> mbox cmd response data (8 bytes)
3,138,900 UART: [rt] FIPS self test
3,139,228 UART: [kat] ++
3,139,380 UART: [kat] sha1
3,143,626 UART: [kat] SHA2-256
3,145,648 UART: [kat] SHA2-384
3,148,557 UART: [kat] SHA2-512-ACC
3,150,484 UART: [kat] ECC-384
3,154,042 UART: Fatal Error: 0x90040004
3,155,581 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,586 >>> mbox cmd response: failed
3,155,586 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,817 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,308 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
5,979,932 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,123,689 >>> mbox cmd response: failed
6,124,253 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,267,125 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
4,875,716 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,430,429 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
5,982,626 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,126,236 >>> mbox cmd response: failed
6,126,788 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,269,686 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
4,875,495 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,465,289 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
6,305,189 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,449,442 >>> mbox cmd response: failed
6,450,005 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,592,885 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
18,451,247 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,898,846 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
6,296,692 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,440,489 >>> mbox cmd response: failed
6,441,060 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,583,953 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
18,470,272 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,913,394 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
5,175,334 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,319,494 >>> mbox cmd response: failed
5,320,056 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,463,203 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,438,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,261,107 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
5,195,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,339,953 >>> mbox cmd response: failed
5,340,522 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,483,655 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,438,486 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,298 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
5,504,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,648,210 >>> mbox cmd response: failed
5,648,783 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,792,070 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,858,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,576,225 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
5,493,172 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,637,366 >>> mbox cmd response: failed
5,637,941 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,781,449 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
17,871,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,593,363 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
5,152,877 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,297,076 >>> mbox cmd response: failed
5,297,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,440,950 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,460,726 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,294,275 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
5,185,003 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,329,385 >>> mbox cmd response: failed
5,329,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,473,114 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,474,755 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,289,234 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
5,511,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,655,322 >>> mbox cmd response: failed
5,655,891 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,799,160 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
17,839,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,554,500 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
5,496,262 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,640,968 >>> mbox cmd response: failed
5,641,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,785,290 >>> mbox cmd response: failed
Initializing fuses
986 writing to cptra_bootfsm_go
17,863,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,581,124 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,055 >>> mbox cmd response: failed
823,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,909 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,875 >>> mbox cmd response: failed
822,875 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,164 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,720 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,728 >>> mbox cmd response: failed
822,728 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,582 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,262 >>> mbox cmd response: failed
823,262 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,892 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,955 >>> mbox cmd response: failed
821,955 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
821,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,749 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,521 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,385 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,393 >>> mbox cmd response: failed
822,393 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,367 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,565 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,916 >>> mbox cmd response: failed
822,916 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,838 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,036 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,588 >>> mbox cmd response: failed
822,588 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,704 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,866 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,645 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,653 >>> mbox cmd response: failed
822,653 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,267 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,551 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,467 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,475 >>> mbox cmd response: failed
822,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,329 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,939 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,950 >>> mbox cmd response: failed
822,950 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,882 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,572 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,580 >>> mbox cmd response: failed
822,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
822,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,296 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,796 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
192,050 UART:
192,436 UART: Running Caliptra ROM ...
193,623 UART:
193,772 UART: [state] CFI Enabled
262,848 UART: [state] LifecycleState = Unprovisioned
264,767 UART: [state] DebugLocked = No
267,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,531 UART: [kat] SHA2-256
441,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,701 UART: [kat] ++
452,189 UART: [kat] sha1
462,851 UART: [kat] SHA2-256
465,509 UART: [kat] SHA2-384
471,514 UART: [kat] SHA2-512-ACC
473,886 UART: [kat] ECC-384
2,766,793 UART: [kat] HMAC-384Kdf
2,778,209 UART: [kat] LMS
3,968,539 UART: [kat] --
3,972,927 UART: [cold-reset] ++
3,975,107 UART: [fht] Storing FHT @ 0x50003400
3,988,093 UART: [idev] ++
3,988,664 UART: [idev] CDI.KEYID = 6
3,989,646 UART: [idev] SUBJECT.KEYID = 7
3,990,896 UART: [idev] UDS.KEYID = 0
3,991,935 ready_for_fw is high
3,992,143 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,136,337 UART: [idev] Erasing UDS.KEYID = 0
7,328,425 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,574 UART: [idev] --
7,353,734 UART: [ldev] ++
7,354,306 UART: [ldev] CDI.KEYID = 6
7,355,273 UART: [ldev] SUBJECT.KEYID = 5
7,356,490 UART: [ldev] AUTHORITY.KEYID = 7
7,357,750 UART: [ldev] FE.KEYID = 1
7,402,046 UART: [ldev] Erasing FE.KEYID = 1
10,735,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,152 UART: [ldev] --
13,092,136 UART: [fwproc] Waiting for Commands...
13,093,963 UART: [fwproc] Received command 0x46574c44
13,096,164 UART: [fwproc] Received Image of size 114632 bytes
17,159,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,619,543 >>> mbox cmd response: success
17,624,351 UART: [afmc] ++
17,624,967 UART: [afmc] CDI.KEYID = 6
17,625,884 UART: [afmc] SUBJECT.KEYID = 7
17,627,102 UART: [afmc] AUTHORITY.KEYID = 5
20,985,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,196 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,460 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,847 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,712 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,178 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,492 UART: [afmc] --
23,355,935 UART: [cold-reset] --
23,360,824 UART: [state] Locking Datavault
23,367,963 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,673 UART: [state] Locking ICCM
23,372,473 UART: [exit] Launching FMC @ 0x40000130
23,380,815 UART:
23,381,071 UART: Running Caliptra FMC ...
23,382,179 UART:
23,382,342 UART: [state] CFI Enabled
23,444,331 UART: [fht] FMC Alias Private Key: 7
25,782,391 UART: [art] Extend RT PCRs Done
25,783,621 UART: [art] Lock RT PCRs Done
25,785,357 UART: [art] Populate DV Done
25,791,035 UART: [fht] FMC Alias Private Key: 7
25,792,520 UART: [art] Derive CDI
25,793,284 UART: [art] Store in in slot 0x4
25,852,550 UART: [art] Derive Key Pair
25,853,594 UART: [art] Store priv key in slot 0x5
29,146,005 UART: [art] Derive Key Pair - Done
29,159,167 UART: [art] Signing Cert with AUTHO
29,160,475 UART: RITY.KEYID = 7
31,448,896 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,424 UART: [art] PUB.X = E4F791A69C39A75F7ACBAA2FC760E77564237AC503CB7AA9F029501F472598102DAFF34C5620BE044EF3A9B9D3430192
31,457,631 UART: [art] PUB.Y = 63B859C72D61FED8C038206E3E3A30EA54BAFAE5C11C3257882D67A691B47CDF974C452471625296482B7B4B82E280BF
31,464,880 UART: [art] SIG.R = 47ACE569B8560D269A9187790482092ACC3469DC1835DBB39472923DB62B1B659F927E639B892ECBB359E17AF4915DB0
31,472,233 UART: [art] SIG.S = EA3D5264E2FD4E1E823D37CA5E8603AF0AFE58DAE511BFCFBC77CE0FECA959DA16EB367D3096F98E92A1273A5C3916EF
32,777,548 UART: Caliptra RT
32,778,270 UART: [state] CFI Enabled
32,940,424 UART: [rt] RT listening for mailbox commands...
32,942,298 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,972,042 UART: [rt]cmd =0x46504c54, len=4
32,973,786 >>> mbox cmd response data (8 bytes)
32,974,971 UART: [rt] FIPS self test
32,975,913 UART: [kat] ++
32,976,361 UART: [kat] sha1
32,980,926 UART: [kat] SHA2-256
32,982,855 UART: [kat] SHA2-384
32,985,981 UART: [kat] SHA2-512-ACC
32,988,234 UART: [kat] ECC-384
36,253,230 UART: Fatal Error: 0x90040003
36,288,536 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,432,526 >>> mbox cmd response: failed
36,433,192 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,577,712 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,101 UART:
190,400 UART: Running Caliptra ROM ...
191,701 UART:
191,865 UART: [state] CFI Enabled
266,390 UART: [state] LifecycleState = Unprovisioned
268,273 UART: [state] DebugLocked = No
270,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,323 UART: [kat] SHA2-256
446,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,546 UART: [kat] ++
457,073 UART: [kat] sha1
468,123 UART: [kat] SHA2-256
470,812 UART: [kat] SHA2-384
477,381 UART: [kat] SHA2-512-ACC
479,778 UART: [kat] ECC-384
2,773,064 UART: [kat] HMAC-384Kdf
2,803,444 UART: [kat] LMS
3,993,729 UART: [kat] --
3,998,102 UART: [cold-reset] ++
4,000,574 UART: [fht] Storing FHT @ 0x50003400
4,011,355 UART: [idev] ++
4,011,931 UART: [idev] CDI.KEYID = 6
4,012,869 UART: [idev] SUBJECT.KEYID = 7
4,014,138 UART: [idev] UDS.KEYID = 0
4,015,654 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,160,136 UART: [idev] Erasing UDS.KEYID = 0
7,346,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,273 UART: [idev] --
7,371,457 UART: [ldev] ++
7,372,083 UART: [ldev] CDI.KEYID = 6
7,372,995 UART: [ldev] SUBJECT.KEYID = 5
7,374,211 UART: [ldev] AUTHORITY.KEYID = 7
7,375,495 UART: [ldev] FE.KEYID = 1
7,404,353 UART: [ldev] Erasing FE.KEYID = 1
10,736,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,559 UART: [ldev] --
13,098,636 UART: [fwproc] Waiting for Commands...
13,101,551 UART: [fwproc] Received command 0x46574c44
13,103,738 UART: [fwproc] Received Image of size 114632 bytes
17,158,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,151 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,618,383 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,786,987 ready_for_fw is high
3,787,393 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,892,181 >>> mbox cmd response: success
23,593,018 UART:
23,593,424 UART: Running Caliptra FMC ...
23,594,740 UART:
23,594,918 UART: [state] CFI Enabled
23,660,812 UART: [fht] FMC Alias Private Key: 7
25,998,771 UART: [art] Extend RT PCRs Done
25,999,999 UART: [art] Lock RT PCRs Done
26,001,674 UART: [art] Populate DV Done
26,007,272 UART: [fht] FMC Alias Private Key: 7
26,008,876 UART: [art] Derive CDI
26,009,628 UART: [art] Store in in slot 0x4
26,069,056 UART: [art] Derive Key Pair
26,070,064 UART: [art] Store priv key in slot 0x5
29,363,253 UART: [art] Derive Key Pair - Done
29,375,878 UART: [art] Signing Cert with AUTHO
29,377,187 UART: RITY.KEYID = 7
31,665,487 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,000 UART: [art] PUB.X = E572F1C768A3546A9DDD3C8749C690DC2311DEDF0B86A63CCFD044F757E97ED66D04B0A9789CB4AF0FDDE6181BDE7D75
31,674,288 UART: [art] PUB.Y = 45548A18F53F244E42F86EB1CB812D8DF435E6ADABC378915101EE31E198DB2EA600BD4D76420294CDA24059C0D405CE
31,681,493 UART: [art] SIG.R = 4297E67425BB32DEF74FFC790479B13C9FAB1171291BC06142BC39861C7D3368129F6D63F7D7A81FC3CC6DC1E4657CB5
31,688,892 UART: [art] SIG.S = A582EC891FE5037806429F1DDD9F7AD3ECC67078E00D2542196DE275742E2F6976E594587C7FE06D5842863F43764A7D
32,994,106 UART: Caliptra RT
32,994,822 UART: [state] CFI Enabled
33,154,617 UART: [rt] RT listening for mailbox commands...
33,156,479 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,186,118 UART: [rt]cmd =0x46504c54, len=4
33,187,648 >>> mbox cmd response data (8 bytes)
33,188,451 UART: [rt] FIPS self test
33,189,398 UART: [kat] ++
33,189,854 UART: [kat] sha1
33,194,539 UART: [kat] SHA2-256
33,196,468 UART: [kat] SHA2-384
33,199,329 UART: [kat] SHA2-512-ACC
33,201,583 UART: [kat] ECC-384
36,468,146 UART: Fatal Error: 0x90040003
36,503,554 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,647,618 >>> mbox cmd response: failed
36,648,272 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,792,220 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,768,466 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,874,400 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,465 UART:
192,830 UART: Running Caliptra ROM ...
194,021 UART:
603,548 UART: [state] CFI Enabled
616,290 UART: [state] LifecycleState = Unprovisioned
618,272 UART: [state] DebugLocked = No
620,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,445 UART: [kat] SHA2-256
794,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,724 UART: [kat] ++
805,257 UART: [kat] sha1
817,777 UART: [kat] SHA2-256
820,432 UART: [kat] SHA2-384
824,791 UART: [kat] SHA2-512-ACC
827,180 UART: [kat] ECC-384
3,112,448 UART: [kat] HMAC-384Kdf
3,123,761 UART: [kat] LMS
4,313,866 UART: [kat] --
4,319,039 UART: [cold-reset] ++
4,321,556 UART: [fht] Storing FHT @ 0x50003400
4,334,533 UART: [idev] ++
4,335,101 UART: [idev] CDI.KEYID = 6
4,336,023 UART: [idev] SUBJECT.KEYID = 7
4,337,277 UART: [idev] UDS.KEYID = 0
4,338,366 ready_for_fw is high
4,338,600 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,482,660 UART: [idev] Erasing UDS.KEYID = 0
7,622,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,817 UART: [idev] --
7,649,519 UART: [ldev] ++
7,650,314 UART: [ldev] CDI.KEYID = 6
7,651,209 UART: [ldev] SUBJECT.KEYID = 5
7,652,263 UART: [ldev] AUTHORITY.KEYID = 7
7,653,508 UART: [ldev] FE.KEYID = 1
7,662,993 UART: [ldev] Erasing FE.KEYID = 1
10,952,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,623 UART: [ldev] --
13,311,400 UART: [fwproc] Waiting for Commands...
13,314,583 UART: [fwproc] Received command 0x46574c44
13,316,777 UART: [fwproc] Received Image of size 114632 bytes
17,378,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,845,843 >>> mbox cmd response: success
17,850,602 UART: [afmc] ++
17,851,195 UART: [afmc] CDI.KEYID = 6
17,852,135 UART: [afmc] SUBJECT.KEYID = 7
17,853,406 UART: [afmc] AUTHORITY.KEYID = 5
21,168,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,222 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,425 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,855 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,862 UART: [afmc] --
23,532,139 UART: [cold-reset] --
23,536,434 UART: [state] Locking Datavault
23,543,459 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,177 UART: [state] Locking ICCM
23,547,650 UART: [exit] Launching FMC @ 0x40000130
23,556,052 UART:
23,556,292 UART: Running Caliptra FMC ...
23,557,395 UART:
23,557,552 UART: [state] CFI Enabled
23,565,491 UART: [fht] FMC Alias Private Key: 7
25,896,180 UART: [art] Extend RT PCRs Done
25,897,402 UART: [art] Lock RT PCRs Done
25,898,935 UART: [art] Populate DV Done
25,904,566 UART: [fht] FMC Alias Private Key: 7
25,906,265 UART: [art] Derive CDI
25,907,078 UART: [art] Store in in slot 0x4
25,949,940 UART: [art] Derive Key Pair
25,950,941 UART: [art] Store priv key in slot 0x5
29,193,451 UART: [art] Derive Key Pair - Done
29,206,583 UART: [art] Signing Cert with AUTHO
29,207,888 UART: RITY.KEYID = 7
31,487,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,105 UART: [art] PUB.X = 172651FF0E8C0C17DD53673B31BC8DB1EE481CA190A6ABC4CDC12301DEEF33B6524D5E86D817939AF98595B8666FB175
31,496,330 UART: [art] PUB.Y = 94FAC1D0351EAFD0F137291AE748DFF567305CF6377B794E2B3778DD9F661954C2AC25A5E56297FA7CE0A0BA276E1CDD
31,503,574 UART: [art] SIG.R = D59C482FD3FF53968267B2CFD1AB2119DD8219EA1F8F27497367F56A2098902C33C000DA0C573060CC47B7B73908B0F5
31,510,916 UART: [art] SIG.S = D64F5D4426D151E85D0144A775C543703D9F50EA79DEEFA3F53B6587BD43C3C8003720A2F4167D712C013B371B28B70F
32,816,464 UART: Caliptra RT
32,817,184 UART: [state] CFI Enabled
32,935,719 UART: [rt] RT listening for mailbox commands...
32,937,572 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,149 UART: [rt]cmd =0x46504c54, len=4
32,968,836 >>> mbox cmd response data (8 bytes)
32,970,078 UART: [rt] FIPS self test
32,971,018 UART: [kat] ++
32,971,469 UART: [kat] sha1
32,975,840 UART: [kat] SHA2-256
32,977,771 UART: [kat] SHA2-384
32,980,680 UART: [kat] SHA2-512-ACC
32,982,916 UART: [kat] ECC-384
36,223,908 UART: Fatal Error: 0x90040003
36,259,196 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,403,198 >>> mbox cmd response: failed
36,403,832 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,548,062 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,027 UART:
190,348 UART: Running Caliptra ROM ...
191,381 UART:
3,981,717 UART: [state] CFI Enabled
3,997,064 UART: [state] LifecycleState = Unprovisioned
3,999,056 UART: [state] DebugLocked = No
4,001,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,006,990 UART: [kat] SHA2-256
4,176,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,187,235 UART: [kat] ++
4,187,697 UART: [kat] sha1
4,199,828 UART: [kat] SHA2-256
4,202,532 UART: [kat] SHA2-384
4,207,716 UART: [kat] SHA2-512-ACC
4,210,070 UART: [kat] ECC-384
6,495,464 UART: [kat] HMAC-384Kdf
6,506,937 UART: [kat] LMS
7,697,070 UART: [kat] --
7,702,515 UART: [cold-reset] ++
7,704,561 UART: [fht] Storing FHT @ 0x50003400
7,716,154 UART: [idev] ++
7,716,737 UART: [idev] CDI.KEYID = 6
7,717,757 UART: [idev] SUBJECT.KEYID = 7
7,718,918 UART: [idev] UDS.KEYID = 0
7,720,558 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
7,864,490 UART: [idev] Erasing UDS.KEYID = 0
11,006,574 UART: [idev] Using Sha1 for KeyId Algorithm
11,027,602 UART: [idev] --
11,032,283 UART: [ldev] ++
11,032,920 UART: [ldev] CDI.KEYID = 6
11,033,831 UART: [ldev] SUBJECT.KEYID = 5
11,035,049 UART: [ldev] AUTHORITY.KEYID = 7
11,036,346 UART: [ldev] FE.KEYID = 1
11,048,026 UART: [ldev] Erasing FE.KEYID = 1
14,337,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,628,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,642,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,657,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,672,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,690,587 UART: [ldev] --
16,695,748 UART: [fwproc] Waiting for Commands...
16,698,180 UART: [fwproc] Received command 0x46574c44
16,700,368 UART: [fwproc] Received Image of size 114632 bytes
20,763,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,836,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,905,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
21,225,090 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,127,691 ready_for_fw is high
4,128,176 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,081,739 >>> mbox cmd response: success
23,720,494 UART:
23,720,902 UART: Running Caliptra FMC ...
23,722,042 UART:
23,722,210 UART: [state] CFI Enabled
23,730,035 UART: [fht] FMC Alias Private Key: 7
26,060,797 UART: [art] Extend RT PCRs Done
26,062,029 UART: [art] Lock RT PCRs Done
26,063,874 UART: [art] Populate DV Done
26,069,145 UART: [fht] FMC Alias Private Key: 7
26,070,855 UART: [art] Derive CDI
26,071,674 UART: [art] Store in in slot 0x4
26,113,904 UART: [art] Derive Key Pair
26,114,952 UART: [art] Store priv key in slot 0x5
29,357,467 UART: [art] Derive Key Pair - Done
29,370,253 UART: [art] Signing Cert with AUTHO
29,371,566 UART: RITY.KEYID = 7
31,650,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,407 UART: [art] PUB.X = 64022F44D84F2E41C53754F9A28FCF71AB93EB5F72F192E30B5DC2BCC35D3005E141BB8C5173935B188D1316106E6279
31,659,604 UART: [art] PUB.Y = 092EF4C09562A206615E00B4369DCC6B6D132D7D7816BEA26919007B0165EC0A94438182E2442DC72873CC0B05E5DD40
31,666,842 UART: [art] SIG.R = F7B7D77E749DFEB8AC7C66F0A51B42D22E326A166412240E73AAE6A1AFEB9CCA7AB793753B6CC14020F385BEB0DC890E
31,674,246 UART: [art] SIG.S = 0557E68F9B28B48F9AB98747D8335BD9EB1D7A5555C8197151ED04265B0340FEAA5D4DC4B32C7460A4A58147FBCD0275
32,979,992 UART: Caliptra RT
32,980,697 UART: [state] CFI Enabled
33,098,719 UART: [rt] RT listening for mailbox commands...
33,100,589 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,130,218 UART: [rt]cmd =0x46504c54, len=4
33,131,682 >>> mbox cmd response data (8 bytes)
33,132,835 UART: [rt] FIPS self test
33,133,777 UART: [kat] ++
33,134,228 UART: [kat] sha1
33,138,630 UART: [kat] SHA2-256
33,140,561 UART: [kat] SHA2-384
33,143,397 UART: [kat] SHA2-512-ACC
33,145,640 UART: [kat] ECC-384
36,386,903 UART: Fatal Error: 0x90040003
36,422,290 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,566,161 >>> mbox cmd response: failed
36,566,817 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,710,697 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
7,344,729 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
21,304,102 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,384 UART:
192,763 UART: Running Caliptra ROM ...
193,989 UART:
194,148 UART: [state] CFI Enabled
265,856 UART: [state] LifecycleState = Unprovisioned
267,769 UART: [state] DebugLocked = No
269,524 UART: [state] WD Timer not started. Device not locked for debugging
273,721 UART: [kat] SHA2-256
452,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,382 UART: [kat] ++
464,914 UART: [kat] sha1
475,827 UART: [kat] SHA2-256
478,872 UART: [kat] SHA2-384
484,371 UART: [kat] SHA2-512-ACC
487,311 UART: [kat] ECC-384
2,953,001 UART: [kat] HMAC-384Kdf
2,973,278 UART: [kat] LMS
3,502,696 UART: [kat] --
3,507,780 UART: [cold-reset] ++
3,510,079 UART: [fht] FHT @ 0x50003400
3,519,815 UART: [idev] ++
3,520,416 UART: [idev] CDI.KEYID = 6
3,521,333 UART: [idev] SUBJECT.KEYID = 7
3,522,511 UART: [idev] UDS.KEYID = 0
3,523,440 ready_for_fw is high
3,523,646 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,668,093 UART: [idev] Erasing UDS.KEYID = 0
6,028,620 UART: [idev] Sha1 KeyId Algorithm
6,052,128 UART: [idev] --
6,056,238 UART: [ldev] ++
6,056,813 UART: [ldev] CDI.KEYID = 6
6,057,706 UART: [ldev] SUBJECT.KEYID = 5
6,058,922 UART: [ldev] AUTHORITY.KEYID = 7
6,060,176 UART: [ldev] FE.KEYID = 1
6,103,353 UART: [ldev] Erasing FE.KEYID = 1
8,605,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,798 UART: [ldev] --
10,415,180 UART: [fwproc] Wait for Commands...
10,417,385 UART: [fwproc] Recv command 0x46574c44
10,419,481 UART: [fwproc] Recv'd Img size: 114940 bytes
13,829,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,824 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,287,556 >>> mbox cmd response: success
14,292,501 UART: [afmc] ++
14,293,114 UART: [afmc] CDI.KEYID = 6
14,294,042 UART: [afmc] SUBJECT.KEYID = 7
14,295,150 UART: [afmc] AUTHORITY.KEYID = 5
16,827,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,298 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,089 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,660 UART: [afmc] --
18,630,107 UART: [cold-reset] --
18,632,137 UART: [state] Locking Datavault
18,637,348 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,034 UART: [state] Locking ICCM
18,640,498 UART: [exit] Launching FMC @ 0x40000130
18,648,897 UART:
18,649,163 UART: Running Caliptra FMC ...
18,650,270 UART:
18,650,429 UART: [state] CFI Enabled
18,711,391 UART: [fht] FMC Alias Private Key: 7
20,475,204 UART: [art] Extend RT PCRs Done
20,476,433 UART: [art] Lock RT PCRs Done
20,478,276 UART: [art] Populate DV Done
20,483,851 UART: [fht] FMC Alias Private Key: 7
20,485,442 UART: [art] Derive CDI
20,486,256 UART: [art] Store in in slot 0x4
20,544,111 UART: [art] Derive Key Pair
20,545,113 UART: [art] Store priv key in slot 0x5
23,007,702 UART: [art] Derive Key Pair - Done
23,020,888 UART: [art] Signing Cert with AUTHO
23,022,194 UART: RITY.KEYID = 7
24,747,569 UART: [art] Erasing AUTHORITY.KEYID = 7
24,749,085 UART: [art] PUB.X = A5BA0835A1C9076B866D89EB61F231A5AA0CF55F41662CA5BCACE39D3F1B81C0E06AF779F2164000EE101BDC6A01ED18
24,756,338 UART: [art] PUB.Y = DEF27D6EC11A14E517798CF04E8471CBE2E9CE3B29CEF6065908CAFB736DD6091CD32DE189FE5656F67AD6A80DC18710
24,763,627 UART: [art] SIG.R = 52CC95DF356CF461B28CEAE300FEDB2AAE825062A458AC82AC8F5648161F8E4DD6611F5E8F7F1264A872A95B485A3A0E
24,771,031 UART: [art] SIG.S = 2E384AB6FB6ADAAB15BAC924B82B131ADAAD4E7C99B6290A2B93060C1F640B3FA7FD403656655EE3C92656B3E87FDC51
25,750,000 UART: Caliptra RT
25,750,717 UART: [state] CFI Enabled
25,915,415 UART: [rt] RT listening for mailbox commands...
25,917,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,947,271 UART: [rt]cmd =0x46504c54, len=4
25,948,773 >>> mbox cmd response data (8 bytes)
25,949,763 UART: [rt] FIPS self test
25,950,708 UART: [kat] ++
25,951,159 UART: [kat] sha1
25,955,505 UART: [kat] SHA2-256
25,957,378 UART: [kat] SHA2-384
25,960,475 UART: [kat] SHA2-512-ACC
25,962,725 UART: [kat] ECC-384
28,398,639 UART: Fatal Error: 0x90040003
28,433,960 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,578,335 >>> mbox cmd response: failed
28,578,981 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,723,261 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,143 UART:
190,451 UART: Running Caliptra ROM ...
191,484 UART:
191,622 UART: [state] CFI Enabled
265,890 UART: [state] LifecycleState = Unprovisioned
267,758 UART: [state] DebugLocked = No
269,701 UART: [state] WD Timer not started. Device not locked for debugging
272,788 UART: [kat] SHA2-256
451,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,509 UART: [kat] ++
463,958 UART: [kat] sha1
475,859 UART: [kat] SHA2-256
478,910 UART: [kat] SHA2-384
486,572 UART: [kat] SHA2-512-ACC
489,509 UART: [kat] ECC-384
2,947,638 UART: [kat] HMAC-384Kdf
2,973,303 UART: [kat] LMS
3,502,803 UART: [kat] --
3,506,416 UART: [cold-reset] ++
3,507,592 UART: [fht] FHT @ 0x50003400
3,518,624 UART: [idev] ++
3,519,236 UART: [idev] CDI.KEYID = 6
3,520,129 UART: [idev] SUBJECT.KEYID = 7
3,521,234 UART: [idev] UDS.KEYID = 0
3,522,872 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,205 UART: [idev] Erasing UDS.KEYID = 0
6,028,592 UART: [idev] Sha1 KeyId Algorithm
6,052,146 UART: [idev] --
6,057,116 UART: [ldev] ++
6,057,691 UART: [ldev] CDI.KEYID = 6
6,058,579 UART: [ldev] SUBJECT.KEYID = 5
6,059,798 UART: [ldev] AUTHORITY.KEYID = 7
6,061,036 UART: [ldev] FE.KEYID = 1
6,101,641 UART: [ldev] Erasing FE.KEYID = 1
8,605,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,137 UART: [ldev] --
10,416,169 UART: [fwproc] Wait for Commands...
10,418,007 UART: [fwproc] Recv command 0x46574c44
10,420,059 UART: [fwproc] Recv'd Img size: 114940 bytes
13,834,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,881 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,294,208 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,360,680 ready_for_fw is high
3,361,126 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,072,744 >>> mbox cmd response: success
18,364,543 UART:
18,364,938 UART: Running Caliptra FMC ...
18,366,066 UART:
18,366,225 UART: [state] CFI Enabled
18,431,964 UART: [fht] FMC Alias Private Key: 7
20,195,666 UART: [art] Extend RT PCRs Done
20,196,900 UART: [art] Lock RT PCRs Done
20,198,027 UART: [art] Populate DV Done
20,203,751 UART: [fht] FMC Alias Private Key: 7
20,205,345 UART: [art] Derive CDI
20,206,085 UART: [art] Store in in slot 0x4
20,264,104 UART: [art] Derive Key Pair
20,265,172 UART: [art] Store priv key in slot 0x5
22,727,871 UART: [art] Derive Key Pair - Done
22,741,252 UART: [art] Signing Cert with AUTHO
22,742,583 UART: RITY.KEYID = 7
24,454,027 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,539 UART: [art] PUB.X = 2EDDFDCDC264893D7A76A015E482B5B542894F275DB1CAD967BB9709104763625287B41E4431278FF767CE5CC688FBC1
24,462,801 UART: [art] PUB.Y = 4AC58EFE9E99D918491DF148C2462FDFC4A77C5C7B74EC3C6C7321F47ACC7A51F01EE92EE50D16608D2EED10FCCECE42
24,470,103 UART: [art] SIG.R = 7319E1F9D9A7F17B1A39866DB446EBF3BD7810F38F86149BED32988D4648691189E624010BFAEC264DAEDCD06BAD3505
24,477,450 UART: [art] SIG.S = BF596FF98DB978C4F78B5B2945B5EC7D5246A3BC6DAA530B7069096AC09D2FF9A2D21D456DCF4E11267F4182DD8F067A
25,456,119 UART: Caliptra RT
25,456,824 UART: [state] CFI Enabled
25,621,862 UART: [rt] RT listening for mailbox commands...
25,623,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,653,678 UART: [rt]cmd =0x46504c54, len=4
25,655,308 >>> mbox cmd response data (8 bytes)
25,656,459 UART: [rt] FIPS self test
25,657,401 UART: [kat] ++
25,657,846 UART: [kat] sha1
25,662,517 UART: [kat] SHA2-256
25,664,446 UART: [kat] SHA2-384
25,667,243 UART: [kat] SHA2-512-ACC
25,669,505 UART: [kat] ECC-384
28,105,366 UART: Fatal Error: 0x90040003
28,140,655 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,285,008 >>> mbox cmd response: failed
28,285,658 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,429,947 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,383,546 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,102,418 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,475 UART:
192,849 UART: Running Caliptra ROM ...
194,065 UART:
603,616 UART: [state] CFI Enabled
616,074 UART: [state] LifecycleState = Unprovisioned
617,998 UART: [state] DebugLocked = No
619,970 UART: [state] WD Timer not started. Device not locked for debugging
623,877 UART: [kat] SHA2-256
802,995 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,571 UART: [kat] ++
815,110 UART: [kat] sha1
827,077 UART: [kat] SHA2-256
830,104 UART: [kat] SHA2-384
835,458 UART: [kat] SHA2-512-ACC
838,392 UART: [kat] ECC-384
3,283,179 UART: [kat] HMAC-384Kdf
3,295,269 UART: [kat] LMS
3,824,739 UART: [kat] --
3,829,441 UART: [cold-reset] ++
3,830,733 UART: [fht] FHT @ 0x50003400
3,841,501 UART: [idev] ++
3,842,063 UART: [idev] CDI.KEYID = 6
3,842,978 UART: [idev] SUBJECT.KEYID = 7
3,844,156 UART: [idev] UDS.KEYID = 0
3,845,084 ready_for_fw is high
3,845,298 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,990,025 UART: [idev] Erasing UDS.KEYID = 0
6,313,579 UART: [idev] Sha1 KeyId Algorithm
6,336,596 UART: [idev] --
6,341,075 UART: [ldev] ++
6,341,646 UART: [ldev] CDI.KEYID = 6
6,342,525 UART: [ldev] SUBJECT.KEYID = 5
6,343,738 UART: [ldev] AUTHORITY.KEYID = 7
6,344,975 UART: [ldev] FE.KEYID = 1
6,356,780 UART: [ldev] Erasing FE.KEYID = 1
8,829,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,656 UART: [ldev] --
10,620,718 UART: [fwproc] Wait for Commands...
10,623,365 UART: [fwproc] Recv command 0x46574c44
10,625,484 UART: [fwproc] Recv'd Img size: 114940 bytes
14,028,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,139 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,488,590 >>> mbox cmd response: success
14,492,299 UART: [afmc] ++
14,492,892 UART: [afmc] CDI.KEYID = 6
14,493,777 UART: [afmc] SUBJECT.KEYID = 7
14,494,990 UART: [afmc] AUTHORITY.KEYID = 5
16,993,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,213 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,023 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,216 UART: [afmc] --
18,792,401 UART: [cold-reset] --
18,795,887 UART: [state] Locking Datavault
18,801,676 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,321 UART: [state] Locking ICCM
18,805,798 UART: [exit] Launching FMC @ 0x40000130
18,814,248 UART:
18,814,483 UART: Running Caliptra FMC ...
18,815,589 UART:
18,815,752 UART: [state] CFI Enabled
18,824,234 UART: [fht] FMC Alias Private Key: 7
20,580,898 UART: [art] Extend RT PCRs Done
20,582,105 UART: [art] Lock RT PCRs Done
20,583,675 UART: [art] Populate DV Done
20,589,032 UART: [fht] FMC Alias Private Key: 7
20,590,573 UART: [art] Derive CDI
20,591,385 UART: [art] Store in in slot 0x4
20,633,849 UART: [art] Derive Key Pair
20,634,912 UART: [art] Store priv key in slot 0x5
23,060,772 UART: [art] Derive Key Pair - Done
23,073,937 UART: [art] Signing Cert with AUTHO
23,075,242 UART: RITY.KEYID = 7
24,780,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,353 UART: [art] PUB.X = 2C0CB648F9ED7749BBBC4D9E9A9DC22EFDF68921DCF968D00A281FBB3B2FC241F83D46B6A65D4270715BDA64BB68DD71
24,789,601 UART: [art] PUB.Y = 5BCD3C6CC800ED34194BB1779754056CD4D51E67857D677B9B07F86BD8ECD042F4C272932466A0B884997C67672D86C2
24,796,850 UART: [art] SIG.R = 455F05DB43CF6B4B3E3C76945FE3093D97A9217CB4B017C816E4B70B417EE36CA263137C69031A549B8C9CC6A56907CF
24,804,239 UART: [art] SIG.S = 2A1D87ABB37A3A8FDB0D941D437ED9A5FAC281A9867D1800C83B1ED5830DC8A3C217843C3FD40B2B856852597A7156CA
25,783,449 UART: Caliptra RT
25,784,134 UART: [state] CFI Enabled
25,901,594 UART: [rt] RT listening for mailbox commands...
25,903,438 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,933,100 UART: [rt]cmd =0x46504c54, len=4
25,934,778 >>> mbox cmd response data (8 bytes)
25,936,183 UART: [rt] FIPS self test
25,937,130 UART: [kat] ++
25,937,581 UART: [kat] sha1
25,942,248 UART: [kat] SHA2-256
25,944,122 UART: [kat] SHA2-384
25,947,082 UART: [kat] SHA2-512-ACC
25,949,320 UART: [kat] ECC-384
28,375,136 UART: Fatal Error: 0x90040003
28,410,443 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,554,853 >>> mbox cmd response: failed
28,555,432 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,699,763 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
190,142 UART:
190,434 UART: Running Caliptra ROM ...
191,488 UART:
11,831,695 UART: [state] CFI Enabled
11,848,340 UART: [state] LifecycleState = Unprovisioned
11,850,205 UART: [state] DebugLocked = No
11,852,704 UART: [state] WD Timer not started. Device not locked for debugging
11,855,791 UART: [kat] SHA2-256
12,034,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,046,497 UART: [kat] ++
12,046,954 UART: [kat] sha1
12,057,730 UART: [kat] SHA2-256
12,060,804 UART: [kat] SHA2-384
12,066,140 UART: [kat] SHA2-512-ACC
12,069,070 UART: [kat] ECC-384
14,510,672 UART: [kat] HMAC-384Kdf
14,522,252 UART: [kat] LMS
15,051,745 UART: [kat] --
15,056,636 UART: [cold-reset] ++
15,058,952 UART: [fht] FHT @ 0x50003400
15,070,091 UART: [idev] ++
15,070,656 UART: [idev] CDI.KEYID = 6
15,071,592 UART: [idev] SUBJECT.KEYID = 7
15,072,799 UART: [idev] UDS.KEYID = 0
15,074,308 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
15,218,630 UART: [idev] Erasing UDS.KEYID = 0
17,542,677 UART: [idev] Sha1 KeyId Algorithm
17,564,868 UART: [idev] --
17,568,704 UART: [ldev] ++
17,569,275 UART: [ldev] CDI.KEYID = 6
17,570,181 UART: [ldev] SUBJECT.KEYID = 5
17,571,397 UART: [ldev] AUTHORITY.KEYID = 7
17,572,547 UART: [ldev] FE.KEYID = 1
17,583,378 UART: [ldev] Erasing FE.KEYID = 1
20,056,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,772,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,788,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,804,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,820,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,840,293 UART: [ldev] --
21,845,406 UART: [fwproc] Wait for Commands...
21,847,396 UART: [fwproc] Recv command 0x46574c44
21,849,501 UART: [fwproc] Recv'd Img size: 114940 bytes
25,263,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,333,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,402,715 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,723,136 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,433 writing to cptra_bootfsm_go
3,699,807 ready_for_fw is high
3,700,356 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,287,954 >>> mbox cmd response: success
18,538,511 UART:
18,538,917 UART: Running Caliptra FMC ...
18,540,060 UART:
18,540,224 UART: [state] CFI Enabled
18,548,114 UART: [fht] FMC Alias Private Key: 7
20,304,291 UART: [art] Extend RT PCRs Done
20,305,520 UART: [art] Lock RT PCRs Done
20,307,339 UART: [art] Populate DV Done
20,312,733 UART: [fht] FMC Alias Private Key: 7
20,314,226 UART: [art] Derive CDI
20,314,991 UART: [art] Store in in slot 0x4
20,357,433 UART: [art] Derive Key Pair
20,358,475 UART: [art] Store priv key in slot 0x5
22,785,606 UART: [art] Derive Key Pair - Done
22,798,605 UART: [art] Signing Cert with AUTHO
22,799,906 UART: RITY.KEYID = 7
24,505,417 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,918 UART: [art] PUB.X = CB0979654D70A555D148FB9918B509049C7C74841CDD6663C3281488A990179CB3986E74420BC54261351FB74670F24B
24,514,166 UART: [art] PUB.Y = EF52C79D08D8844FAC23895F66BEBD00E789FC2DB631C807A4F57E47B88E56224B9878901AB08EF18F5C30FB5A9D5D99
24,521,409 UART: [art] SIG.R = E4DBCCA76C895B4C8B2A0F7924222F1406313C00C7833E7D7FDEA3C74AE59BE5CEC3E1E0030BE056E3E14216B0C3A625
24,528,756 UART: [art] SIG.S = 7673A20C47C2BECEB2104306B4729A27C9A29146AE80D9E1A926136214ECCA70110B1E57EA4E3D31B127ECC8AF884BD0
25,507,928 UART: Caliptra RT
25,508,666 UART: [state] CFI Enabled
25,625,950 UART: [rt] RT listening for mailbox commands...
25,627,815 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,397 UART: [rt]cmd =0x46504c54, len=4
25,658,974 >>> mbox cmd response data (8 bytes)
25,659,808 UART: [rt] FIPS self test
25,660,747 UART: [kat] ++
25,661,198 UART: [kat] sha1
25,665,708 UART: [kat] SHA2-256
25,667,633 UART: [kat] SHA2-384
25,670,750 UART: [kat] SHA2-512-ACC
25,673,019 UART: [kat] ECC-384
28,098,678 UART: Fatal Error: 0x90040003
28,134,143 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,278,584 >>> mbox cmd response: failed
28,279,259 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,423,603 >>> mbox cmd response: failed
Initializing fuses
992 writing to cptra_bootfsm_go
15,200,269 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,776,385 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,227 UART:
192,594 UART: Running Caliptra ROM ...
193,791 UART:
193,941 UART: [state] CFI Enabled
263,536 UART: [state] LifecycleState = Unprovisioned
265,950 UART: [state] DebugLocked = No
267,776 UART: [state] WD Timer not started. Device not locked for debugging
272,866 UART: [kat] SHA2-256
462,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,493 UART: [kat] ++
473,969 UART: [kat] sha1
485,628 UART: [kat] SHA2-256
488,639 UART: [kat] SHA2-384
494,350 UART: [kat] SHA2-512-ACC
496,954 UART: [kat] ECC-384
2,949,259 UART: [kat] HMAC-384Kdf
2,973,149 UART: [kat] LMS
3,504,911 UART: [kat] --
3,509,651 UART: [cold-reset] ++
3,510,806 UART: [fht] FHT @ 0x50003400
3,521,454 UART: [idev] ++
3,522,094 UART: [idev] CDI.KEYID = 6
3,523,054 UART: [idev] SUBJECT.KEYID = 7
3,524,300 UART: [idev] UDS.KEYID = 0
3,525,229 ready_for_fw is high
3,525,438 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,670,026 UART: [idev] Erasing UDS.KEYID = 0
6,029,943 UART: [idev] Sha1 KeyId Algorithm
6,053,454 UART: [idev] --
6,057,121 UART: [ldev] ++
6,057,834 UART: [ldev] CDI.KEYID = 6
6,058,752 UART: [ldev] SUBJECT.KEYID = 5
6,059,917 UART: [ldev] AUTHORITY.KEYID = 7
6,061,155 UART: [ldev] FE.KEYID = 1
6,102,596 UART: [ldev] Erasing FE.KEYID = 1
8,611,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,909 UART: [ldev] --
10,414,631 UART: [fwproc] Wait for Commands...
10,416,142 UART: [fwproc] Recv command 0x46574c44
10,418,465 UART: [fwproc] Recv'd Img size: 114940 bytes
13,870,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,758 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,610,719 >>> mbox cmd response: success
14,615,232 UART: [afmc] ++
14,615,957 UART: [afmc] CDI.KEYID = 6
14,617,156 UART: [afmc] SUBJECT.KEYID = 7
14,618,599 UART: [afmc] AUTHORITY.KEYID = 5
17,154,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,899,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,901,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,916,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,931,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,946,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,971,545 UART: [afmc] --
18,974,813 UART: [cold-reset] --
18,979,750 UART: [state] Locking Datavault
18,983,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,954 UART: [state] Locking ICCM
18,987,923 UART: [exit] Launching FMC @ 0x40000130
18,996,591 UART:
18,996,831 UART: Running Caliptra FMC ...
18,997,854 UART:
18,998,000 UART: [state] CFI Enabled
19,056,963 UART: [fht] FMC Alias Private Key: 7
20,820,319 UART: [art] Extend RT PCRs Done
20,821,546 UART: [art] Lock RT PCRs Done
20,823,148 UART: [art] Populate DV Done
20,828,669 UART: [fht] FMC Alias Private Key: 7
20,830,261 UART: [art] Derive CDI
20,831,002 UART: [art] Store in in slot 0x4
20,890,044 UART: [art] Derive Key Pair
20,891,089 UART: [art] Store priv key in slot 0x5
23,354,000 UART: [art] Derive Key Pair - Done
23,366,855 UART: [art] Signing Cert with AUTHO
23,368,156 UART: RITY.KEYID = 7
25,079,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,081,053 UART: [art] PUB.X = 91FF482EA68141D309995F1A480559F8205F8DFB3D6709055C44A34FBD8264ADAD443F8D4EEECB319B74C5FE7ADCDFF9
25,088,344 UART: [art] PUB.Y = 774A3F7960ADC7233CE492FBDCB5A8CB3A244FE2241D9CE068EE2E7CDD60FBD5DE5A3860EA6CA3F06AED0CC0907893F7
25,095,644 UART: [art] SIG.R = 180065A159AC6810885EBCC1624DBF4E72292F41BE5F7F056CA8242228EE380F68063275BF9198FCF73F11C3840B1B74
25,103,016 UART: [art] SIG.S = 6E2FAD56DDE904C6E03AC812CB291C6520C15D1A5EAE7769746EAA5C03FC03B709BF5F839FB60302E4CFDE031AC75EA0
26,081,776 UART: Caliptra RT
26,082,478 UART: [state] CFI Enabled
26,248,133 UART: [rt] RT listening for mailbox commands...
26,249,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,279,611 UART: [rt]cmd =0x46504c54, len=4
26,281,026 >>> mbox cmd response data (8 bytes)
26,282,247 UART: [rt] FIPS self test
26,283,188 UART: [kat] ++
26,283,681 UART: [kat] sha1
26,288,130 UART: [kat] SHA2-256
26,290,069 UART: [kat] SHA2-384
26,293,099 UART: [kat] SHA2-512-ACC
26,295,351 UART: [kat] ECC-384
28,731,877 UART: Fatal Error: 0x90040003
28,767,175 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,911,557 >>> mbox cmd response: failed
28,912,142 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,056,486 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,104 UART:
190,399 UART: Running Caliptra ROM ...
191,425 UART:
191,565 UART: [state] CFI Enabled
266,471 UART: [state] LifecycleState = Unprovisioned
268,848 UART: [state] DebugLocked = No
271,061 UART: [state] WD Timer not started. Device not locked for debugging
275,186 UART: [kat] SHA2-256
465,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,838 UART: [kat] ++
476,282 UART: [kat] sha1
488,561 UART: [kat] SHA2-256
491,573 UART: [kat] SHA2-384
498,305 UART: [kat] SHA2-512-ACC
500,917 UART: [kat] ECC-384
2,948,836 UART: [kat] HMAC-384Kdf
2,973,268 UART: [kat] LMS
3,505,050 UART: [kat] --
3,508,253 UART: [cold-reset] ++
3,509,492 UART: [fht] FHT @ 0x50003400
3,521,986 UART: [idev] ++
3,522,679 UART: [idev] CDI.KEYID = 6
3,523,701 UART: [idev] SUBJECT.KEYID = 7
3,524,805 UART: [idev] UDS.KEYID = 0
3,526,315 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,670,799 UART: [idev] Erasing UDS.KEYID = 0
6,031,782 UART: [idev] Sha1 KeyId Algorithm
6,055,407 UART: [idev] --
6,061,485 UART: [ldev] ++
6,062,171 UART: [ldev] CDI.KEYID = 6
6,063,055 UART: [ldev] SUBJECT.KEYID = 5
6,064,274 UART: [ldev] AUTHORITY.KEYID = 7
6,065,453 UART: [ldev] FE.KEYID = 1
6,102,490 UART: [ldev] Erasing FE.KEYID = 1
8,610,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,811 UART: [ldev] --
10,416,425 UART: [fwproc] Wait for Commands...
10,418,522 UART: [fwproc] Recv command 0x46574c44
10,420,844 UART: [fwproc] Recv'd Img size: 114940 bytes
13,877,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,694 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,620,693 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,442,529 ready_for_fw is high
3,442,974 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,749,164 >>> mbox cmd response: success
19,025,163 UART:
19,025,553 UART: Running Caliptra FMC ...
19,026,707 UART:
19,026,869 UART: [state] CFI Enabled
19,096,446 UART: [fht] FMC Alias Private Key: 7
20,859,874 UART: [art] Extend RT PCRs Done
20,861,089 UART: [art] Lock RT PCRs Done
20,862,769 UART: [art] Populate DV Done
20,868,291 UART: [fht] FMC Alias Private Key: 7
20,869,889 UART: [art] Derive CDI
20,870,706 UART: [art] Store in in slot 0x4
20,928,777 UART: [art] Derive Key Pair
20,929,819 UART: [art] Store priv key in slot 0x5
23,392,889 UART: [art] Derive Key Pair - Done
23,405,732 UART: [art] Signing Cert with AUTHO
23,407,035 UART: RITY.KEYID = 7
25,118,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,479 UART: [art] PUB.X = 87A18FAEADBE0AA67BC25C97075F53458865449AEF4D8C7DED1954CA71E06127E5AD85B90C021DF19232EA51C3D9E3C6
25,127,783 UART: [art] PUB.Y = 3E76601591DB535B36E2A144F49C79F50931F5BC52C433147F5E089D4FC72D6D866303157401FC7CC64B96F44F13975B
25,135,003 UART: [art] SIG.R = 542FC766EDDA5B2FE289F68550D3E5C62ED780CF9C31C28B1F1C7DD99A5F90C299FF56ACFD612CB1691745AB80AE4F4D
25,142,431 UART: [art] SIG.S = 6FABA6A4DF62F45F838B74EF8C37A8AD446422CB7780256E71E76FB4B208F791822D6F8326CDDC663825FEB4ACDB5A01
26,121,775 UART: Caliptra RT
26,122,498 UART: [state] CFI Enabled
26,288,595 UART: [rt] RT listening for mailbox commands...
26,290,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,320,181 UART: [rt]cmd =0x46504c54, len=4
26,321,600 >>> mbox cmd response data (8 bytes)
26,322,466 UART: [rt] FIPS self test
26,323,407 UART: [kat] ++
26,323,859 UART: [kat] sha1
26,328,259 UART: [kat] SHA2-256
26,330,188 UART: [kat] SHA2-384
26,333,107 UART: [kat] SHA2-512-ACC
26,335,341 UART: [kat] ECC-384
28,771,623 UART: Fatal Error: 0x90040003
28,806,920 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,951,295 >>> mbox cmd response: failed
28,951,944 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,096,285 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,420,053 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,734,459 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,496 writing to cptra_bootfsm_go
193,813 UART:
194,166 UART: Running Caliptra ROM ...
195,261 UART:
604,763 UART: [state] CFI Enabled
620,112 UART: [state] LifecycleState = Unprovisioned
622,485 UART: [state] DebugLocked = No
624,858 UART: [state] WD Timer not started. Device not locked for debugging
629,469 UART: [kat] SHA2-256
819,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,166 UART: [kat] ++
830,680 UART: [kat] sha1
842,214 UART: [kat] SHA2-256
845,233 UART: [kat] SHA2-384
852,083 UART: [kat] SHA2-512-ACC
854,668 UART: [kat] ECC-384
3,296,606 UART: [kat] HMAC-384Kdf
3,308,995 UART: [kat] LMS
3,840,781 UART: [kat] --
3,847,157 UART: [cold-reset] ++
3,848,099 UART: [fht] FHT @ 0x50003400
3,860,295 UART: [idev] ++
3,861,014 UART: [idev] CDI.KEYID = 6
3,861,903 UART: [idev] SUBJECT.KEYID = 7
3,863,156 UART: [idev] UDS.KEYID = 0
3,864,083 ready_for_fw is high
3,864,291 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,008,656 UART: [idev] Erasing UDS.KEYID = 0
6,344,620 UART: [idev] Sha1 KeyId Algorithm
6,365,800 UART: [idev] --
6,370,448 UART: [ldev] ++
6,371,131 UART: [ldev] CDI.KEYID = 6
6,372,041 UART: [ldev] SUBJECT.KEYID = 5
6,373,260 UART: [ldev] AUTHORITY.KEYID = 7
6,374,432 UART: [ldev] FE.KEYID = 1
6,385,454 UART: [ldev] Erasing FE.KEYID = 1
8,864,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,214 UART: [ldev] --
10,659,307 UART: [fwproc] Wait for Commands...
10,661,840 UART: [fwproc] Recv command 0x46574c44
10,664,117 UART: [fwproc] Recv'd Img size: 114940 bytes
14,110,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,074 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,853,370 >>> mbox cmd response: success
14,857,776 UART: [afmc] ++
14,858,486 UART: [afmc] CDI.KEYID = 6
14,859,672 UART: [afmc] SUBJECT.KEYID = 7
14,861,158 UART: [afmc] AUTHORITY.KEYID = 5
17,362,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,944 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,058 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,116 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,827 UART: [afmc] --
19,158,846 UART: [cold-reset] --
19,163,030 UART: [state] Locking Datavault
19,169,840 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,021 UART: [state] Locking ICCM
19,174,260 UART: [exit] Launching FMC @ 0x40000130
19,182,915 UART:
19,183,147 UART: Running Caliptra FMC ...
19,184,172 UART:
19,184,319 UART: [state] CFI Enabled
19,192,745 UART: [fht] FMC Alias Private Key: 7
20,949,533 UART: [art] Extend RT PCRs Done
20,950,757 UART: [art] Lock RT PCRs Done
20,952,033 UART: [art] Populate DV Done
20,957,179 UART: [fht] FMC Alias Private Key: 7
20,958,721 UART: [art] Derive CDI
20,959,485 UART: [art] Store in in slot 0x4
21,001,435 UART: [art] Derive Key Pair
21,002,483 UART: [art] Store priv key in slot 0x5
23,428,549 UART: [art] Derive Key Pair - Done
23,441,379 UART: [art] Signing Cert with AUTHO
23,442,709 UART: RITY.KEYID = 7
25,148,248 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,753 UART: [art] PUB.X = 3318A99493DBF5E62D647C9472B61E8C099CA2939DADC31404C2A68E7D6145A91CBF8801EF38FBB221755014B0305256
25,157,005 UART: [art] PUB.Y = A745ADA1A0EB953143AAEAE8D67D80689050E6F736EAA4DBD17659078F460EBDDDB404BF8770605C674B9BD1CEFABAAD
25,164,306 UART: [art] SIG.R = 36590B90A2E56E9D7700605183B2A8834290C72C33D250824DE7B984CCBC5A26F3DB3ED582FF7F1FFBDFA79E77BD9676
25,171,650 UART: [art] SIG.S = F71492F97C1E169086ABCF847BD8C69ACB512FC8C0355ABC8FDD43AD4083A23797B109764C1372668CE6EFC3C5F16442
26,150,489 UART: Caliptra RT
26,151,201 UART: [state] CFI Enabled
26,268,876 UART: [rt] RT listening for mailbox commands...
26,270,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,452 UART: [rt]cmd =0x46504c54, len=4
26,302,194 >>> mbox cmd response data (8 bytes)
26,303,206 UART: [rt] FIPS self test
26,304,149 UART: [kat] ++
26,304,602 UART: [kat] sha1
26,308,950 UART: [kat] SHA2-256
26,310,874 UART: [kat] SHA2-384
26,313,937 UART: [kat] SHA2-512-ACC
26,316,172 UART: [kat] ECC-384
28,741,818 UART: Fatal Error: 0x90040003
28,777,041 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,921,448 >>> mbox cmd response: failed
28,922,051 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,066,384 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,061 UART:
190,349 UART: Running Caliptra ROM ...
191,475 UART:
11,467,451 UART: [state] CFI Enabled
11,484,408 UART: [state] LifecycleState = Unprovisioned
11,486,805 UART: [state] DebugLocked = No
11,489,753 UART: [state] WD Timer not started. Device not locked for debugging
11,493,605 UART: [kat] SHA2-256
11,683,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,694,303 UART: [kat] ++
11,694,816 UART: [kat] sha1
11,705,866 UART: [kat] SHA2-256
11,708,884 UART: [kat] SHA2-384
11,715,902 UART: [kat] SHA2-512-ACC
11,718,522 UART: [kat] ECC-384
14,160,617 UART: [kat] HMAC-384Kdf
14,174,738 UART: [kat] LMS
14,706,527 UART: [kat] --
14,709,830 UART: [cold-reset] ++
14,711,115 UART: [fht] FHT @ 0x50003400
14,721,989 UART: [idev] ++
14,722,675 UART: [idev] CDI.KEYID = 6
14,723,692 UART: [idev] SUBJECT.KEYID = 7
14,724,851 UART: [idev] UDS.KEYID = 0
14,726,371 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,870,635 UART: [idev] Erasing UDS.KEYID = 0
17,198,966 UART: [idev] Sha1 KeyId Algorithm
17,222,624 UART: [idev] --
17,225,969 UART: [ldev] ++
17,226,649 UART: [ldev] CDI.KEYID = 6
17,227,557 UART: [ldev] SUBJECT.KEYID = 5
17,228,711 UART: [ldev] AUTHORITY.KEYID = 7
17,229,942 UART: [ldev] FE.KEYID = 1
17,241,558 UART: [ldev] Erasing FE.KEYID = 1
19,720,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,438,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,454,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,469,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,484,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,505,004 UART: [ldev] --
21,509,961 UART: [fwproc] Wait for Commands...
21,513,036 UART: [fwproc] Recv command 0x46574c44
21,515,363 UART: [fwproc] Recv'd Img size: 114940 bytes
24,971,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,052,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,168,540 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,714,210 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,747,711 ready_for_fw is high
3,748,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,959,142 >>> mbox cmd response: success
19,210,308 UART:
19,210,696 UART: Running Caliptra FMC ...
19,211,825 UART:
19,211,978 UART: [state] CFI Enabled
19,220,245 UART: [fht] FMC Alias Private Key: 7
20,976,748 UART: [art] Extend RT PCRs Done
20,977,968 UART: [art] Lock RT PCRs Done
20,979,323 UART: [art] Populate DV Done
20,984,850 UART: [fht] FMC Alias Private Key: 7
20,986,505 UART: [art] Derive CDI
20,987,322 UART: [art] Store in in slot 0x4
21,029,704 UART: [art] Derive Key Pair
21,030,709 UART: [art] Store priv key in slot 0x5
23,457,638 UART: [art] Derive Key Pair - Done
23,470,929 UART: [art] Signing Cert with AUTHO
23,472,233 UART: RITY.KEYID = 7
25,177,579 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,089 UART: [art] PUB.X = B6512F13DF5A1ADF55F9025E52EF43DD7C83F96D0093CFA389907FC132690081037713C020245A8AEE8CCE58F3B45584
25,186,276 UART: [art] PUB.Y = EB31CD455C8B3CD91E30857F65F2298BAD96E8DD77DB6A98BEC38E67CC6283D6E59C4BC4C62381981CE09A44C2A6D86E
25,193,557 UART: [art] SIG.R = B3A0BDC6A27F4B65E0E78A3CE502DFD535ED14BC18C32627982F813DA63895C7F1F4422209943A0E44F1CD656E7C835E
25,200,948 UART: [art] SIG.S = 5897AEFBB287575480661BB8B169A19C848E911A292A73DED5399BBEEED0CD24A664A048BF8D0289281134C1D4957F07
26,180,187 UART: Caliptra RT
26,180,901 UART: [state] CFI Enabled
26,298,020 UART: [rt] RT listening for mailbox commands...
26,299,874 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,329,829 UART: [rt]cmd =0x46504c54, len=4
26,331,291 >>> mbox cmd response data (8 bytes)
26,332,193 UART: [rt] FIPS self test
26,333,139 UART: [kat] ++
26,333,592 UART: [kat] sha1
26,338,175 UART: [kat] SHA2-256
26,340,111 UART: [kat] SHA2-384
26,343,122 UART: [kat] SHA2-512-ACC
26,345,372 UART: [kat] ECC-384
28,770,972 UART: Fatal Error: 0x90040003
28,806,218 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,950,637 >>> mbox cmd response: failed
28,951,253 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,095,519 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
14,582,487 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,798,489 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,419 UART: [kat] SHA2-256
882,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,465 UART: [kat] ++
886,617 UART: [kat] sha1
890,647 UART: [kat] SHA2-256
892,585 UART: [kat] SHA2-384
895,312 UART: [kat] SHA2-512-ACC
897,213 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,619 UART: [fht] Storing FHT @ 0x50003400
1,479,234 UART: [idev] ++
1,479,402 UART: [idev] CDI.KEYID = 6
1,479,762 UART: [idev] SUBJECT.KEYID = 7
1,480,186 UART: [idev] UDS.KEYID = 0
1,480,531 ready_for_fw is high
1,480,531 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,016 UART: [idev] Erasing UDS.KEYID = 0
1,504,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,521,145 UART: [ldev] Erasing FE.KEYID = 1
1,546,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,378 UART: [ldev] --
1,585,653 UART: [fwproc] Waiting for Commands...
1,586,268 UART: [fwproc] Received command 0x46574c44
1,587,059 UART: [fwproc] Received Image of size 114940 bytes
2,893,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,580 >>> mbox cmd response: success
3,087,704 UART: [afmc] ++
3,087,872 UART: [afmc] CDI.KEYID = 6
3,088,234 UART: [afmc] SUBJECT.KEYID = 7
3,088,659 UART: [afmc] AUTHORITY.KEYID = 5
3,123,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,564 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,344 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,957 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,647 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,510 UART: [afmc] --
3,167,466 UART: [cold-reset] --
3,168,460 UART: [state] Locking Datavault
3,169,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,117 UART: [state] Locking ICCM
3,170,693 UART: [exit] Launching FMC @ 0x40000130
3,176,022 UART:
3,176,038 UART: Running Caliptra FMC ...
3,176,446 UART:
3,176,500 UART: [state] CFI Enabled
3,186,957 UART: [fht] FMC Alias Private Key: 7
3,294,730 UART: [art] Extend RT PCRs Done
3,295,158 UART: [art] Lock RT PCRs Done
3,296,594 UART: [art] Populate DV Done
3,304,933 UART: [fht] FMC Alias Private Key: 7
3,306,013 UART: [art] Derive CDI
3,306,293 UART: [art] Store in in slot 0x4
3,391,614 UART: [art] Derive Key Pair
3,391,974 UART: [art] Store priv key in slot 0x5
3,405,012 UART: [art] Derive Key Pair - Done
3,419,687 UART: [art] Signing Cert with AUTHO
3,420,167 UART: RITY.KEYID = 7
3,435,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,860 UART: [art] PUB.X = 336A7D5C215226A6EABC4004812AD866CCB0C024378456155A1012E448BF4BCE08B1060EAC597D2F096EB942A987749E
3,442,615 UART: [art] PUB.Y = 1790F6D2707D2D8A8666B6A5F719B346FB24F5152A0E5089B50F30F4807118D58C22289F495193266AC41F5A1AE6A7D0
3,449,553 UART: [art] SIG.R = E4AF3376DB5F98B6535946155F6953F3D45CDDDFA66C98EE3CDD74D607602DB0FA09A7693211AB86783526C9B022176C
3,456,321 UART: [art] SIG.S = FFD5F52C0BB871FBFD043E6A5C9AD47EA6F3041C60A11F205B688746A5B05D35F8EE16CB4AF96630C461A094FACD9F01
3,480,004 UART: Caliptra RT
3,480,257 UART: [state] CFI Enabled
3,589,257 UART: [rt] RT listening for mailbox commands...
3,589,920 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,861 UART: [rt]cmd =0x46504c54, len=4
3,621,019 >>> mbox cmd response data (8 bytes)
3,621,192 UART: [rt] FIPS self test
3,621,520 UART: [kat] ++
3,621,672 UART: [kat] sha1
3,625,934 UART: [kat] SHA2-256
3,627,956 UART: [kat] SHA2-384
3,630,647 UART: [kat] SHA2-512-ACC
3,632,574 UART: [kat] ECC-384
3,642,286 UART: Fatal Error: 0x90040003
3,643,825 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,643,830 >>> mbox cmd response: failed
3,643,830 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,643,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,729 UART: [kat] SHA2-256
881,660 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,775 UART: [kat] ++
885,927 UART: [kat] sha1
889,949 UART: [kat] SHA2-256
891,887 UART: [kat] SHA2-384
894,392 UART: [kat] SHA2-512-ACC
896,293 UART: [kat] ECC-384
901,920 UART: [kat] HMAC-384Kdf
906,418 UART: [kat] LMS
1,474,614 UART: [kat] --
1,475,419 UART: [cold-reset] ++
1,475,761 UART: [fht] Storing FHT @ 0x50003400
1,478,524 UART: [idev] ++
1,478,692 UART: [idev] CDI.KEYID = 6
1,479,052 UART: [idev] SUBJECT.KEYID = 7
1,479,476 UART: [idev] UDS.KEYID = 0
1,479,821 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,674 UART: [idev] Erasing UDS.KEYID = 0
1,504,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,038 UART: [idev] --
1,514,021 UART: [ldev] ++
1,514,189 UART: [ldev] CDI.KEYID = 6
1,514,552 UART: [ldev] SUBJECT.KEYID = 5
1,514,978 UART: [ldev] AUTHORITY.KEYID = 7
1,515,441 UART: [ldev] FE.KEYID = 1
1,520,713 UART: [ldev] Erasing FE.KEYID = 1
1,545,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,866 UART: [ldev] --
1,585,321 UART: [fwproc] Waiting for Commands...
1,586,008 UART: [fwproc] Received command 0x46574c44
1,586,799 UART: [fwproc] Received Image of size 114940 bytes
2,892,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,621 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,638 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,435 ready_for_fw is high
1,362,435 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,206 >>> mbox cmd response: success
2,996,116 UART:
2,996,132 UART: Running Caliptra FMC ...
2,996,540 UART:
2,996,594 UART: [state] CFI Enabled
3,007,141 UART: [fht] FMC Alias Private Key: 7
3,115,240 UART: [art] Extend RT PCRs Done
3,115,668 UART: [art] Lock RT PCRs Done
3,117,550 UART: [art] Populate DV Done
3,125,715 UART: [fht] FMC Alias Private Key: 7
3,126,761 UART: [art] Derive CDI
3,127,041 UART: [art] Store in in slot 0x4
3,212,534 UART: [art] Derive Key Pair
3,212,894 UART: [art] Store priv key in slot 0x5
3,225,986 UART: [art] Derive Key Pair - Done
3,240,909 UART: [art] Signing Cert with AUTHO
3,241,389 UART: RITY.KEYID = 7
3,256,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,102 UART: [art] PUB.X = 0BCEDC0E78E26D4D8D0275C3FED5B2318CF57C471F2A51F951F5B987D5A7D3C284BDC2660329B14A06968AD7534C4053
3,263,865 UART: [art] PUB.Y = 3283EDBC0DBBBA4AC7EFE25F938D5F5EAED232FBF728B92E35EBBF372139AAA2AA9D9BB8638FAF902171E9AC5BCFDA25
3,270,848 UART: [art] SIG.R = F93128B0B8AA744BAB23C3C12B61A0BB1F1A637BF2BF24B14ACAFBE69CA0D22296B8B3A92C2A595EC06437C0A986E846
3,277,636 UART: [art] SIG.S = 59DD6E2D2E3D0D84165A8A0CE4818CFD820A8AE7F69BDCCB32DF80A30E3E7AE82A16E244B40D9EEA25C3B4B54CE22372
3,301,794 UART: Caliptra RT
3,302,047 UART: [state] CFI Enabled
3,409,260 UART: [rt] RT listening for mailbox commands...
3,409,923 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,810 UART: [rt]cmd =0x46504c54, len=4
3,440,814 >>> mbox cmd response data (8 bytes)
3,441,141 UART: [rt] FIPS self test
3,441,469 UART: [kat] ++
3,441,621 UART: [kat] sha1
3,445,963 UART: [kat] SHA2-256
3,447,985 UART: [kat] SHA2-384
3,450,630 UART: [kat] SHA2-512-ACC
3,452,557 UART: [kat] ECC-384
3,462,169 UART: Fatal Error: 0x90040003
3,463,708 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,463,713 >>> mbox cmd response: failed
3,463,713 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,463,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,031 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,376 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,661 UART: [kat] SHA2-512-ACC
897,562 UART: [kat] ECC-384
903,327 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 ready_for_fw is high
1,481,328 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,783 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,680 UART: [ldev] ++
1,515,848 UART: [ldev] CDI.KEYID = 6
1,516,211 UART: [ldev] SUBJECT.KEYID = 5
1,516,637 UART: [ldev] AUTHORITY.KEYID = 7
1,517,100 UART: [ldev] FE.KEYID = 1
1,521,994 UART: [ldev] Erasing FE.KEYID = 1
1,547,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,461 UART: [ldev] --
1,586,784 UART: [fwproc] Waiting for Commands...
1,587,497 UART: [fwproc] Received command 0x46574c44
1,588,288 UART: [fwproc] Received Image of size 114940 bytes
2,894,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,885 >>> mbox cmd response: success
3,089,067 UART: [afmc] ++
3,089,235 UART: [afmc] CDI.KEYID = 6
3,089,597 UART: [afmc] SUBJECT.KEYID = 7
3,090,022 UART: [afmc] AUTHORITY.KEYID = 5
3,125,509 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,679 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,072 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,762 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,715 UART: [afmc] --
3,168,747 UART: [cold-reset] --
3,169,757 UART: [state] Locking Datavault
3,170,766 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,370 UART: [state] Locking ICCM
3,171,832 UART: [exit] Launching FMC @ 0x40000130
3,177,161 UART:
3,177,177 UART: Running Caliptra FMC ...
3,177,585 UART:
3,177,728 UART: [state] CFI Enabled
3,188,043 UART: [fht] FMC Alias Private Key: 7
3,295,644 UART: [art] Extend RT PCRs Done
3,296,072 UART: [art] Lock RT PCRs Done
3,297,220 UART: [art] Populate DV Done
3,305,387 UART: [fht] FMC Alias Private Key: 7
3,306,361 UART: [art] Derive CDI
3,306,641 UART: [art] Store in in slot 0x4
3,392,196 UART: [art] Derive Key Pair
3,392,556 UART: [art] Store priv key in slot 0x5
3,406,186 UART: [art] Derive Key Pair - Done
3,420,901 UART: [art] Signing Cert with AUTHO
3,421,381 UART: RITY.KEYID = 7
3,436,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,560 UART: [art] PUB.X = 324E85EEB10C6440AC75D9264E20A833B1BCE8C9AE48B276AD0F374EE818EC9E28E7A71199821C2CB3A16401DCD7B673
3,444,331 UART: [art] PUB.Y = 8F36AC3BFA2C7033DF894F16BD970A5207415E62D29E8FD2892C34DC15E48966F21CF3A4777A82E989F006CDBF155E79
3,451,278 UART: [art] SIG.R = 17C84AE4A28BF9C32F635E4B992DDAEAD5B1F78173D3326444181A2CFD9CC0ED25937821CF581FE5E37501611181E316
3,458,049 UART: [art] SIG.S = 0C5DC12183830294765B2F67CD0A73B247A2BAA362A572ECDAE79E8A3921B26828C3C2FE76393DE65074FB2EE57C338B
3,481,977 UART: Caliptra RT
3,482,322 UART: [state] CFI Enabled
3,590,560 UART: [rt] RT listening for mailbox commands...
3,591,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,278 UART: [rt]cmd =0x46504c54, len=4
3,622,318 >>> mbox cmd response data (8 bytes)
3,622,559 UART: [rt] FIPS self test
3,622,887 UART: [kat] ++
3,623,039 UART: [kat] sha1
3,627,165 UART: [kat] SHA2-256
3,629,187 UART: [kat] SHA2-384
3,632,174 UART: [kat] SHA2-512-ACC
3,634,101 UART: [kat] ECC-384
3,644,081 UART: Fatal Error: 0x90040003
3,645,620 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,625 >>> mbox cmd response: failed
3,645,625 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,477 UART: [kat] SHA2-512-ACC
897,378 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,581 UART: [kat] LMS
1,475,777 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,344 UART: [fht] Storing FHT @ 0x50003400
1,480,125 UART: [idev] ++
1,480,293 UART: [idev] CDI.KEYID = 6
1,480,653 UART: [idev] SUBJECT.KEYID = 7
1,481,077 UART: [idev] UDS.KEYID = 0
1,481,422 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,201 UART: [idev] --
1,515,478 UART: [ldev] ++
1,515,646 UART: [ldev] CDI.KEYID = 6
1,516,009 UART: [ldev] SUBJECT.KEYID = 5
1,516,435 UART: [ldev] AUTHORITY.KEYID = 7
1,516,898 UART: [ldev] FE.KEYID = 1
1,522,292 UART: [ldev] Erasing FE.KEYID = 1
1,547,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,389 UART: [ldev] --
1,587,828 UART: [fwproc] Waiting for Commands...
1,588,603 UART: [fwproc] Received command 0x46574c44
1,589,394 UART: [fwproc] Received Image of size 114940 bytes
2,894,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,088,275 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,240 ready_for_fw is high
1,363,240 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,315 >>> mbox cmd response: success
2,998,945 UART:
2,998,961 UART: Running Caliptra FMC ...
2,999,369 UART:
2,999,512 UART: [state] CFI Enabled
3,010,083 UART: [fht] FMC Alias Private Key: 7
3,117,638 UART: [art] Extend RT PCRs Done
3,118,066 UART: [art] Lock RT PCRs Done
3,119,780 UART: [art] Populate DV Done
3,127,857 UART: [fht] FMC Alias Private Key: 7
3,128,883 UART: [art] Derive CDI
3,129,163 UART: [art] Store in in slot 0x4
3,214,938 UART: [art] Derive Key Pair
3,215,298 UART: [art] Store priv key in slot 0x5
3,228,484 UART: [art] Derive Key Pair - Done
3,243,574 UART: [art] Signing Cert with AUTHO
3,244,054 UART: RITY.KEYID = 7
3,259,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,081 UART: [art] PUB.X = 8AC6E4B926B55397BD2FC5B49DF1814E9B15AAAB1645A436C5479FCD226F7920F56C255F09ADB00EEEF284ACABAC22AC
3,266,867 UART: [art] PUB.Y = 538361F8A2D5620891601BD8CB55D8CD176F410E45033088A065B44F6FF1FD14450A9EBD1A8A1BF005C03F2FA35797A0
3,273,804 UART: [art] SIG.R = D45DE85E93307C1B0BEC48545841FBCEF175225B562CFA8F81B8997A980620CD4EFC12B0E731DC8601CB7EC2429AD1D3
3,280,577 UART: [art] SIG.S = 334DAF9A5A46B383F3FC8AD36F369EF14CE50BE091A2EF3B0D7431F211E984A7A0F0670726D8007C07D9A92910AEECEA
3,304,592 UART: Caliptra RT
3,304,937 UART: [state] CFI Enabled
3,413,502 UART: [rt] RT listening for mailbox commands...
3,414,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,018 UART: [rt]cmd =0x46504c54, len=4
3,445,138 >>> mbox cmd response data (8 bytes)
3,445,287 UART: [rt] FIPS self test
3,445,615 UART: [kat] ++
3,445,767 UART: [kat] sha1
3,449,843 UART: [kat] SHA2-256
3,451,865 UART: [kat] SHA2-384
3,454,810 UART: [kat] SHA2-512-ACC
3,456,737 UART: [kat] ECC-384
3,466,573 UART: Fatal Error: 0x90040003
3,468,112 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,468,117 >>> mbox cmd response: failed
3,468,117 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,468,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,784 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,933,191 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,612 UART: [kat] HMAC-384Kdf
923,378 UART: [kat] LMS
1,171,706 UART: [kat] --
1,172,611 UART: [cold-reset] ++
1,173,045 UART: [fht] FHT @ 0x50003400
1,175,908 UART: [idev] ++
1,176,076 UART: [idev] CDI.KEYID = 6
1,176,436 UART: [idev] SUBJECT.KEYID = 7
1,176,860 UART: [idev] UDS.KEYID = 0
1,177,205 ready_for_fw is high
1,177,205 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,876 UART: [idev] Erasing UDS.KEYID = 0
1,201,411 UART: [idev] Sha1 KeyId Algorithm
1,209,847 UART: [idev] --
1,210,911 UART: [ldev] ++
1,211,079 UART: [ldev] CDI.KEYID = 6
1,211,442 UART: [ldev] SUBJECT.KEYID = 5
1,211,868 UART: [ldev] AUTHORITY.KEYID = 7
1,212,331 UART: [ldev] FE.KEYID = 1
1,217,651 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,525 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,534 UART: [fwproc] Recv command 0x46574c44
1,284,262 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,390 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,225 >>> mbox cmd response: success
2,784,443 UART: [afmc] ++
2,784,611 UART: [afmc] CDI.KEYID = 6
2,784,973 UART: [afmc] SUBJECT.KEYID = 7
2,785,398 UART: [afmc] AUTHORITY.KEYID = 5
2,820,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,684 UART: [afmc] --
2,863,618 UART: [cold-reset] --
2,864,532 UART: [state] Locking Datavault
2,865,639 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,243 UART: [state] Locking ICCM
2,866,889 UART: [exit] Launching FMC @ 0x40000130
2,872,218 UART:
2,872,234 UART: Running Caliptra FMC ...
2,872,642 UART:
2,872,696 UART: [state] CFI Enabled
2,883,249 UART: [fht] FMC Alias Private Key: 7
2,991,258 UART: [art] Extend RT PCRs Done
2,991,686 UART: [art] Lock RT PCRs Done
2,993,048 UART: [art] Populate DV Done
3,001,545 UART: [fht] FMC Alias Private Key: 7
3,002,575 UART: [art] Derive CDI
3,002,855 UART: [art] Store in in slot 0x4
3,088,732 UART: [art] Derive Key Pair
3,089,092 UART: [art] Store priv key in slot 0x5
3,102,644 UART: [art] Derive Key Pair - Done
3,117,004 UART: [art] Signing Cert with AUTHO
3,117,484 UART: RITY.KEYID = 7
3,132,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,711 UART: [art] PUB.X = 044B2DB6A0BE646B0727CB73E9F8C1373EF429B7269C8391CD5CC33DC2622B0BB1B03E385822280C0254EF9D7145B79C
3,140,470 UART: [art] PUB.Y = 6822A4F69BC26B8FD34D179AECDE2067B7D215853E76922F515E6FDEDB7613949FF937734103066765F3F14FA6628B89
3,147,412 UART: [art] SIG.R = 1E5A75DDD7BCD054F22BA3336DDDA25AE7C4E9D708A5EE498E75227E319A8DCADC05658F31EB2E6957572F1F685DC674
3,154,192 UART: [art] SIG.S = 40C9C850C636BE6813F494BE677B002BFB9B717800131F4194C15A228C15A679153F3B5E4AB1C9BDC64D2C87803E7B52
3,178,181 UART: Caliptra RT
3,178,434 UART: [state] CFI Enabled
3,286,165 UART: [rt] RT listening for mailbox commands...
3,286,828 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,863 UART: [rt]cmd =0x46504c54, len=4
3,318,019 >>> mbox cmd response data (8 bytes)
3,318,194 UART: [rt] FIPS self test
3,318,522 UART: [kat] ++
3,318,674 UART: [kat] sha1
3,322,694 UART: [kat] SHA2-256
3,324,716 UART: [kat] SHA2-384
3,327,377 UART: [kat] SHA2-512-ACC
3,329,304 UART: [kat] ECC-384
3,338,948 UART: Fatal Error: 0x90040003
3,340,487 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,492 >>> mbox cmd response: failed
3,340,492 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
893,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,687 UART: [kat] ++
897,839 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,113 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,174,952 UART: [idev] ++
1,175,120 UART: [idev] CDI.KEYID = 6
1,175,480 UART: [idev] SUBJECT.KEYID = 7
1,175,904 UART: [idev] UDS.KEYID = 0
1,176,249 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,777 UART: [idev] Sha1 KeyId Algorithm
1,209,293 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,918 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,367 UART: [ldev] --
1,281,724 UART: [fwproc] Wait for Commands...
1,282,474 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,014 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,703 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,593 ready_for_fw is high
1,059,593 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,022 >>> mbox cmd response: success
2,694,282 UART:
2,694,298 UART: Running Caliptra FMC ...
2,694,706 UART:
2,694,760 UART: [state] CFI Enabled
2,705,253 UART: [fht] FMC Alias Private Key: 7
2,813,036 UART: [art] Extend RT PCRs Done
2,813,464 UART: [art] Lock RT PCRs Done
2,815,156 UART: [art] Populate DV Done
2,823,255 UART: [fht] FMC Alias Private Key: 7
2,824,185 UART: [art] Derive CDI
2,824,465 UART: [art] Store in in slot 0x4
2,910,334 UART: [art] Derive Key Pair
2,910,694 UART: [art] Store priv key in slot 0x5
2,924,024 UART: [art] Derive Key Pair - Done
2,938,601 UART: [art] Signing Cert with AUTHO
2,939,081 UART: RITY.KEYID = 7
2,953,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,526 UART: [art] PUB.X = 4F0AFEC48A7E18FA1F737D56B3032759EE5EF7C2CFF8C44BA97414439528C42B4799A3AA298675DE895BCD3ED126A86F
2,961,302 UART: [art] PUB.Y = 49319B45CB7DC0CBB8FCE77B54BD95851563C7279B6DF743387DAC9905BD796CC78579F959B9CFC2ABA39559B260076D
2,968,254 UART: [art] SIG.R = 2BDCBA995FDFB9D6B37A87042191EF10ECEC545F03AB4364997D31EC25E9B1439CA2A680216D1CB0F17279277E47B155
2,975,026 UART: [art] SIG.S = 1F908196F66711C9891BF40B37DB64F9599CABDBC4F0F90377DEDB56DE0D695BA6E5624FAAF35DCE0F8234908FBE3116
2,998,931 UART: Caliptra RT
2,999,184 UART: [state] CFI Enabled
3,106,341 UART: [rt] RT listening for mailbox commands...
3,107,004 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,833 UART: [rt]cmd =0x46504c54, len=4
3,138,039 >>> mbox cmd response data (8 bytes)
3,138,210 UART: [rt] FIPS self test
3,138,538 UART: [kat] ++
3,138,690 UART: [kat] sha1
3,142,910 UART: [kat] SHA2-256
3,144,932 UART: [kat] SHA2-384
3,147,743 UART: [kat] SHA2-512-ACC
3,149,670 UART: [kat] ECC-384
3,159,374 UART: Fatal Error: 0x90040003
3,160,913 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,918 >>> mbox cmd response: failed
3,160,918 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,972 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,132 UART: [kat] SHA2-256
904,072 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,911 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,770 UART: [cold-reset] ++
1,173,264 UART: [fht] FHT @ 0x50003400
1,176,071 UART: [idev] ++
1,176,239 UART: [idev] CDI.KEYID = 6
1,176,599 UART: [idev] SUBJECT.KEYID = 7
1,177,023 UART: [idev] UDS.KEYID = 0
1,177,368 ready_for_fw is high
1,177,368 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,028 UART: [idev] Sha1 KeyId Algorithm
1,210,482 UART: [idev] --
1,211,484 UART: [ldev] ++
1,211,652 UART: [ldev] CDI.KEYID = 6
1,212,015 UART: [ldev] SUBJECT.KEYID = 5
1,212,441 UART: [ldev] AUTHORITY.KEYID = 7
1,212,904 UART: [ldev] FE.KEYID = 1
1,218,132 UART: [ldev] Erasing FE.KEYID = 1
1,244,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,560 UART: [ldev] --
1,284,051 UART: [fwproc] Wait for Commands...
1,284,833 UART: [fwproc] Recv command 0x46574c44
1,285,561 UART: [fwproc] Recv'd Img size: 114940 bytes
2,591,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,385 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,784,138 >>> mbox cmd response: success
2,785,308 UART: [afmc] ++
2,785,476 UART: [afmc] CDI.KEYID = 6
2,785,838 UART: [afmc] SUBJECT.KEYID = 7
2,786,263 UART: [afmc] AUTHORITY.KEYID = 5
2,822,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,637 UART: [afmc] --
2,865,559 UART: [cold-reset] --
2,866,523 UART: [state] Locking Datavault
2,867,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,232 UART: [state] Locking ICCM
2,868,662 UART: [exit] Launching FMC @ 0x40000130
2,873,991 UART:
2,874,007 UART: Running Caliptra FMC ...
2,874,415 UART:
2,874,558 UART: [state] CFI Enabled
2,885,153 UART: [fht] FMC Alias Private Key: 7
2,993,168 UART: [art] Extend RT PCRs Done
2,993,596 UART: [art] Lock RT PCRs Done
2,995,168 UART: [art] Populate DV Done
3,003,287 UART: [fht] FMC Alias Private Key: 7
3,004,361 UART: [art] Derive CDI
3,004,641 UART: [art] Store in in slot 0x4
3,090,714 UART: [art] Derive Key Pair
3,091,074 UART: [art] Store priv key in slot 0x5
3,104,096 UART: [art] Derive Key Pair - Done
3,118,791 UART: [art] Signing Cert with AUTHO
3,119,271 UART: RITY.KEYID = 7
3,134,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,454 UART: [art] PUB.X = 48C3A45D49B9AC3EDC663FE65C02FA053DF1DE6CA8B5F3AC2FC096914808D82A9DA559BC196B17337DC269DA910869DD
3,142,228 UART: [art] PUB.Y = D9040433325AFE60ACF0079829968084D275C117F67C68F829FA7933E4652F26D0D7280AB1738D2E411DF48067ABCC00
3,149,138 UART: [art] SIG.R = 889576092BB75FDFC2B1750F0998D7AC11DFEC356081C45C7D8DBAD42E215650B6938CCFA2EC4BF8D29F17AF58287468
3,155,909 UART: [art] SIG.S = 7D1A470655027746664334153BD2728CC91097707B0B7639E7258AB7DC6B104CD81A863F468F554A2E725D7BBDC2DFF2
3,179,899 UART: Caliptra RT
3,180,244 UART: [state] CFI Enabled
3,287,655 UART: [rt] RT listening for mailbox commands...
3,288,318 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,131 UART: [rt]cmd =0x46504c54, len=4
3,319,317 >>> mbox cmd response data (8 bytes)
3,319,662 UART: [rt] FIPS self test
3,319,990 UART: [kat] ++
3,320,142 UART: [kat] sha1
3,324,382 UART: [kat] SHA2-256
3,326,404 UART: [kat] SHA2-384
3,329,343 UART: [kat] SHA2-512-ACC
3,331,270 UART: [kat] ECC-384
3,341,096 UART: Fatal Error: 0x90040003
3,342,635 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,342,640 >>> mbox cmd response: failed
3,342,640 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,342,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
893,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,976 UART: [kat] ++
898,128 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,099 UART: [kat] SHA2-512-ACC
909,000 UART: [kat] ECC-384
919,345 UART: [kat] HMAC-384Kdf
924,103 UART: [kat] LMS
1,172,431 UART: [kat] --
1,173,214 UART: [cold-reset] ++
1,173,748 UART: [fht] FHT @ 0x50003400
1,176,461 UART: [idev] ++
1,176,629 UART: [idev] CDI.KEYID = 6
1,176,989 UART: [idev] SUBJECT.KEYID = 7
1,177,413 UART: [idev] UDS.KEYID = 0
1,177,758 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,185,623 UART: [idev] Erasing UDS.KEYID = 0
1,202,886 UART: [idev] Sha1 KeyId Algorithm
1,211,394 UART: [idev] --
1,212,414 UART: [ldev] ++
1,212,582 UART: [ldev] CDI.KEYID = 6
1,212,945 UART: [ldev] SUBJECT.KEYID = 5
1,213,371 UART: [ldev] AUTHORITY.KEYID = 7
1,213,834 UART: [ldev] FE.KEYID = 1
1,219,018 UART: [ldev] Erasing FE.KEYID = 1
1,245,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,260 UART: [ldev] --
1,284,651 UART: [fwproc] Wait for Commands...
1,285,375 UART: [fwproc] Recv command 0x46574c44
1,286,103 UART: [fwproc] Recv'd Img size: 114940 bytes
2,591,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,503 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,785,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,674 ready_for_fw is high
1,060,674 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,637,023 >>> mbox cmd response: success
2,698,789 UART:
2,698,805 UART: Running Caliptra FMC ...
2,699,213 UART:
2,699,356 UART: [state] CFI Enabled
2,709,863 UART: [fht] FMC Alias Private Key: 7
2,818,246 UART: [art] Extend RT PCRs Done
2,818,674 UART: [art] Lock RT PCRs Done
2,820,314 UART: [art] Populate DV Done
2,828,849 UART: [fht] FMC Alias Private Key: 7
2,829,909 UART: [art] Derive CDI
2,830,189 UART: [art] Store in in slot 0x4
2,915,772 UART: [art] Derive Key Pair
2,916,132 UART: [art] Store priv key in slot 0x5
2,928,888 UART: [art] Derive Key Pair - Done
2,944,054 UART: [art] Signing Cert with AUTHO
2,944,534 UART: RITY.KEYID = 7
2,959,400 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,165 UART: [art] PUB.X = A51AE01E2DA50FD24EDE7A73C41F1F0E59B40C57B5C4BFA4C09D5F695C8863EA089C21302E66CD81197190BBAE6B9DA8
2,966,941 UART: [art] PUB.Y = 61A62FE6462036BF51B17518511E9C9EF485D052A5875EBED37217AFE8D653AE4115CBA39934D78794D740ABAC8118BF
2,973,895 UART: [art] SIG.R = 619855BBE5DB72543193F621E38F59DC8984C9380A0CCF32124A2AA0CA7267DAC698B279DCD59DA314193C25DFBE0C1D
2,980,666 UART: [art] SIG.S = 0C9B8562BFB62B7BF664BC2DD2810905F88EB1A9A1534E28CBA61039DC281B0BD55DC30C104D1146E23B11EC6BB55AFD
3,004,044 UART: Caliptra RT
3,004,389 UART: [state] CFI Enabled
3,111,512 UART: [rt] RT listening for mailbox commands...
3,112,175 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,892 UART: [rt]cmd =0x46504c54, len=4
3,143,144 >>> mbox cmd response data (8 bytes)
3,143,269 UART: [rt] FIPS self test
3,143,597 UART: [kat] ++
3,143,749 UART: [kat] sha1
3,148,031 UART: [kat] SHA2-256
3,150,053 UART: [kat] SHA2-384
3,153,112 UART: [kat] SHA2-512-ACC
3,155,039 UART: [kat] ECC-384
3,164,657 UART: Fatal Error: 0x90040003
3,166,196 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,166,201 >>> mbox cmd response: failed
3,166,201 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,166,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,072 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,475 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,177 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,123 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,174,091 ready_for_fw is high
1,174,091 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,853 UART: [idev] Erasing UDS.KEYID = 0
1,198,931 UART: [idev] Sha1 KeyId Algorithm
1,207,985 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,213 UART: [fwproc] Recv command 0x46574c44
1,282,946 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,635 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,395 >>> mbox cmd response: success
2,781,562 UART: [afmc] ++
2,781,730 UART: [afmc] CDI.KEYID = 6
2,782,093 UART: [afmc] SUBJECT.KEYID = 7
2,782,519 UART: [afmc] AUTHORITY.KEYID = 5
2,817,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,399 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,128 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,011 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,563 UART: [afmc] --
2,860,557 UART: [cold-reset] --
2,861,383 UART: [state] Locking Datavault
2,862,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,136 UART: [state] Locking ICCM
2,863,586 UART: [exit] Launching FMC @ 0x40000130
2,868,915 UART:
2,868,931 UART: Running Caliptra FMC ...
2,869,339 UART:
2,869,393 UART: [state] CFI Enabled
2,879,828 UART: [fht] FMC Alias Private Key: 7
2,987,155 UART: [art] Extend RT PCRs Done
2,987,583 UART: [art] Lock RT PCRs Done
2,989,409 UART: [art] Populate DV Done
2,997,448 UART: [fht] FMC Alias Private Key: 7
2,998,620 UART: [art] Derive CDI
2,998,900 UART: [art] Store in in slot 0x4
3,084,497 UART: [art] Derive Key Pair
3,084,857 UART: [art] Store priv key in slot 0x5
3,097,437 UART: [art] Derive Key Pair - Done
3,112,366 UART: [art] Signing Cert with AUTHO
3,112,846 UART: RITY.KEYID = 7
3,127,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,735 UART: [art] PUB.X = A738EAC12B9AA80345B4B05F9AF0633A388A7FE23263B87D59CA2A831E942B9A7454961F39509CD76CAADD7C27032289
3,135,503 UART: [art] PUB.Y = B718CA8A148677B363C7537F272E95E6F390EE5D77ABB25AC4A1174EE619ED23B57A7813DFF28047D1D76C9587077831
3,142,450 UART: [art] SIG.R = 917A24521A11C95706291361CF4E8D7B2C73C789734A93065522EBA8A424D5EF93B338FB68E45D52D83BC221D5C9C796
3,149,210 UART: [art] SIG.S = 086007EAA3ED379ED041FD1F9570968A2BCF980F546D351653F9D94712A193AEC4E2A3B66D88130A15975EB26A46FBF4
3,172,545 UART: Caliptra RT
3,172,798 UART: [state] CFI Enabled
3,280,953 UART: [rt] RT listening for mailbox commands...
3,281,616 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,531 UART: [rt]cmd =0x46504c54, len=4
3,312,531 >>> mbox cmd response data (8 bytes)
3,312,674 UART: [rt] FIPS self test
3,313,002 UART: [kat] ++
3,313,154 UART: [kat] sha1
3,317,414 UART: [kat] SHA2-256
3,319,436 UART: [kat] SHA2-384
3,322,273 UART: [kat] SHA2-512-ACC
3,324,200 UART: [kat] ECC-384
3,333,790 UART: Fatal Error: 0x90040003
3,335,329 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,335,334 >>> mbox cmd response: failed
3,335,334 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,335,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,678 UART: [state] LifecycleState = Unprovisioned
85,333 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,019 UART: [kat] ++
895,171 UART: [kat] sha1
899,259 UART: [kat] SHA2-256
901,199 UART: [kat] SHA2-384
903,850 UART: [kat] SHA2-512-ACC
905,751 UART: [kat] ECC-384
915,528 UART: [kat] HMAC-384Kdf
920,188 UART: [kat] LMS
1,168,500 UART: [kat] --
1,169,221 UART: [cold-reset] ++
1,169,597 UART: [fht] FHT @ 0x50003400
1,172,033 UART: [idev] ++
1,172,201 UART: [idev] CDI.KEYID = 6
1,172,562 UART: [idev] SUBJECT.KEYID = 7
1,172,987 UART: [idev] UDS.KEYID = 0
1,173,333 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,180,615 UART: [idev] Erasing UDS.KEYID = 0
1,197,505 UART: [idev] Sha1 KeyId Algorithm
1,206,499 UART: [idev] --
1,207,578 UART: [ldev] ++
1,207,746 UART: [ldev] CDI.KEYID = 6
1,208,110 UART: [ldev] SUBJECT.KEYID = 5
1,208,537 UART: [ldev] AUTHORITY.KEYID = 7
1,209,000 UART: [ldev] FE.KEYID = 1
1,214,432 UART: [ldev] Erasing FE.KEYID = 1
1,240,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,068 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,301 UART: [fwproc] Recv command 0x46574c44
1,282,034 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,045 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,743 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,118 ready_for_fw is high
1,056,118 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,043 >>> mbox cmd response: success
2,690,463 UART:
2,690,479 UART: Running Caliptra FMC ...
2,690,887 UART:
2,690,941 UART: [state] CFI Enabled
2,701,720 UART: [fht] FMC Alias Private Key: 7
2,809,571 UART: [art] Extend RT PCRs Done
2,809,999 UART: [art] Lock RT PCRs Done
2,811,327 UART: [art] Populate DV Done
2,819,464 UART: [fht] FMC Alias Private Key: 7
2,820,604 UART: [art] Derive CDI
2,820,884 UART: [art] Store in in slot 0x4
2,906,233 UART: [art] Derive Key Pair
2,906,593 UART: [art] Store priv key in slot 0x5
2,919,525 UART: [art] Derive Key Pair - Done
2,934,420 UART: [art] Signing Cert with AUTHO
2,934,900 UART: RITY.KEYID = 7
2,950,404 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,169 UART: [art] PUB.X = 37904B384BADA3B860E69FC8B29793082EE6DD3EBB6F85A234F98E48BC6B30454B5C2A21C756466A0E7603878057DB6B
2,957,934 UART: [art] PUB.Y = DA426ABE5138FC4C8FFBDFE658A95F18ADA8E8D1EA184564E79CD17F3CC30831C7E0A755E606D707EF88A68B10F53D67
2,964,893 UART: [art] SIG.R = CD30FFA230AC2B46B45CDB16EE13992DE4C527E8B6F1141A08A1B1BFF81A6D6920DC8FBD63FD0F25B10087FAE7AED0E4
2,971,661 UART: [art] SIG.S = B029CBC299DD4D97840830E0191386BE734E0597D6F126BF96744434200A39E7EE06A4C4F5BD068A583651A90C7EB2E1
2,995,140 UART: Caliptra RT
2,995,393 UART: [state] CFI Enabled
3,103,981 UART: [rt] RT listening for mailbox commands...
3,104,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,461 UART: [rt]cmd =0x46504c54, len=4
3,135,677 >>> mbox cmd response data (8 bytes)
3,136,042 UART: [rt] FIPS self test
3,136,370 UART: [kat] ++
3,136,522 UART: [kat] sha1
3,140,658 UART: [kat] SHA2-256
3,142,680 UART: [kat] SHA2-384
3,145,681 UART: [kat] SHA2-512-ACC
3,147,608 UART: [kat] ECC-384
3,157,284 UART: Fatal Error: 0x90040003
3,158,823 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,158,828 >>> mbox cmd response: failed
3,158,828 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,158,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,149 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,409 UART: [kat] SHA2-256
890,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,088 UART: [kat] ++
895,240 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,234 UART: [idev] ++
1,173,402 UART: [idev] CDI.KEYID = 6
1,173,763 UART: [idev] SUBJECT.KEYID = 7
1,174,188 UART: [idev] UDS.KEYID = 0
1,174,534 ready_for_fw is high
1,174,534 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,311 UART: [ldev] Erasing FE.KEYID = 1
1,241,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,865 UART: [ldev] --
1,281,261 UART: [fwproc] Wait for Commands...
1,281,978 UART: [fwproc] Recv command 0x46574c44
1,282,711 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,384 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,106 >>> mbox cmd response: success
2,782,311 UART: [afmc] ++
2,782,479 UART: [afmc] CDI.KEYID = 6
2,782,842 UART: [afmc] SUBJECT.KEYID = 7
2,783,268 UART: [afmc] AUTHORITY.KEYID = 5
2,818,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,228 UART: [afmc] --
2,862,226 UART: [cold-reset] --
2,863,030 UART: [state] Locking Datavault
2,864,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,101 UART: [state] Locking ICCM
2,865,585 UART: [exit] Launching FMC @ 0x40000130
2,870,914 UART:
2,870,930 UART: Running Caliptra FMC ...
2,871,338 UART:
2,871,481 UART: [state] CFI Enabled
2,882,078 UART: [fht] FMC Alias Private Key: 7
2,989,487 UART: [art] Extend RT PCRs Done
2,989,915 UART: [art] Lock RT PCRs Done
2,991,225 UART: [art] Populate DV Done
2,999,270 UART: [fht] FMC Alias Private Key: 7
3,000,386 UART: [art] Derive CDI
3,000,666 UART: [art] Store in in slot 0x4
3,086,155 UART: [art] Derive Key Pair
3,086,515 UART: [art] Store priv key in slot 0x5
3,099,419 UART: [art] Derive Key Pair - Done
3,114,244 UART: [art] Signing Cert with AUTHO
3,114,724 UART: RITY.KEYID = 7
3,129,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,359 UART: [art] PUB.X = 16175BDFA2A8C1213B1FCDFD82AC49CF381F5C5EB2DF6C47403CD01506452AC7C3560043A218EBE2D02F427E536EF19C
3,137,118 UART: [art] PUB.Y = C6BF753FA596891C58EE3A1C93CEC8F1E6F03FF1723C9F25F1D4C31ADCA50E325032C173AC3791E4523E85949D5EFBD0
3,144,079 UART: [art] SIG.R = 4729130CAEC3045C4F78D1C0B0F7158DE666AC4B288D52493F0217F63C40876D34F54E19674A293EB5F3FBCDF397DEC0
3,150,846 UART: [art] SIG.S = F2E25C877940B52FEEAD3D663EB70CF5C1592CE2AB3EABC532458158B32A1CEEDEE17A8ADCA382968170C63E9CC13203
3,174,793 UART: Caliptra RT
3,175,138 UART: [state] CFI Enabled
3,282,997 UART: [rt] RT listening for mailbox commands...
3,283,660 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,375 UART: [rt]cmd =0x46504c54, len=4
3,314,353 >>> mbox cmd response data (8 bytes)
3,314,680 UART: [rt] FIPS self test
3,315,008 UART: [kat] ++
3,315,160 UART: [kat] sha1
3,319,476 UART: [kat] SHA2-256
3,321,498 UART: [kat] SHA2-384
3,324,169 UART: [kat] SHA2-512-ACC
3,326,096 UART: [kat] ECC-384
3,335,788 UART: Fatal Error: 0x90040003
3,337,327 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,337,332 >>> mbox cmd response: failed
3,337,332 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,337,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,885 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,172,886 UART: [idev] ++
1,173,054 UART: [idev] CDI.KEYID = 6
1,173,415 UART: [idev] SUBJECT.KEYID = 7
1,173,840 UART: [idev] UDS.KEYID = 0
1,174,186 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,198,428 UART: [idev] Sha1 KeyId Algorithm
1,207,238 UART: [idev] --
1,208,189 UART: [ldev] ++
1,208,357 UART: [ldev] CDI.KEYID = 6
1,208,721 UART: [ldev] SUBJECT.KEYID = 5
1,209,148 UART: [ldev] AUTHORITY.KEYID = 7
1,209,611 UART: [ldev] FE.KEYID = 1
1,215,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,139 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,884 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,506 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,909 ready_for_fw is high
1,056,909 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,204 >>> mbox cmd response: success
2,694,484 UART:
2,694,500 UART: Running Caliptra FMC ...
2,694,908 UART:
2,695,051 UART: [state] CFI Enabled
2,705,672 UART: [fht] FMC Alias Private Key: 7
2,813,665 UART: [art] Extend RT PCRs Done
2,814,093 UART: [art] Lock RT PCRs Done
2,815,603 UART: [art] Populate DV Done
2,823,680 UART: [fht] FMC Alias Private Key: 7
2,824,616 UART: [art] Derive CDI
2,824,896 UART: [art] Store in in slot 0x4
2,910,867 UART: [art] Derive Key Pair
2,911,227 UART: [art] Store priv key in slot 0x5
2,924,215 UART: [art] Derive Key Pair - Done
2,939,154 UART: [art] Signing Cert with AUTHO
2,939,634 UART: RITY.KEYID = 7
2,954,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,497 UART: [art] PUB.X = 14DE362497BFB0971E52A81AA7A23ADBAA07FDFAA9DF556DA61CCD490CC969207AA10D92F952DBCF89B4609993AAA193
2,962,278 UART: [art] PUB.Y = 2EE2C3103681EA704DF19131E007FEFF952295D80B6C178D38E7771106A666D52C4B502B14356BA453339C11C48B05FF
2,969,212 UART: [art] SIG.R = 4BADFA7CE0817DE4D8E8DD4DF8D46D7D54EEFDD6B4594E5F5C3E2852E357A6085AA5B00A1DF1902D652300667DB2783E
2,975,972 UART: [art] SIG.S = 60BEDF21C6ED0C12BCB0DADA9C0FD85A56EF77036DC62D59FC73CF1D3B531168720C5F570A17B63A8B7BD40B5B203AE6
3,000,133 UART: Caliptra RT
3,000,478 UART: [state] CFI Enabled
3,108,435 UART: [rt] RT listening for mailbox commands...
3,109,098 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,143 UART: [rt]cmd =0x46504c54, len=4
3,140,153 >>> mbox cmd response data (8 bytes)
3,140,460 UART: [rt] FIPS self test
3,140,788 UART: [kat] ++
3,140,940 UART: [kat] sha1
3,145,344 UART: [kat] SHA2-256
3,147,366 UART: [kat] SHA2-384
3,150,257 UART: [kat] SHA2-512-ACC
3,152,184 UART: [kat] ECC-384
3,161,910 UART: Fatal Error: 0x90040003
3,163,449 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,163,454 >>> mbox cmd response: failed
3,163,454 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,163,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,961 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,076 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,594 writing to cptra_bootfsm_go
277,164 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
277,225 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
619,828 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
653,236 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
276,453 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
311,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
653,689 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
653,882 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
277,541 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
311,326 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
654,022 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
652,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,628 writing to cptra_bootfsm_go
5,982,880 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,126,555 >>> mbox cmd response: failed
6,127,131 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,269,998 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
4,856,832 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,418,055 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
5,980,529 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,124,166 >>> mbox cmd response: failed
6,124,724 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,267,612 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
4,857,561 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,430,100 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
6,300,033 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,443,867 >>> mbox cmd response: failed
6,444,425 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,587,298 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
18,455,378 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,888,558 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
6,306,906 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,450,667 >>> mbox cmd response: failed
6,451,219 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,594,078 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
18,457,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,890,952 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
5,178,266 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,322,447 >>> mbox cmd response: failed
5,323,018 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,466,311 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,441,723 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,743 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
5,143,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,287,507 >>> mbox cmd response: failed
5,288,061 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,431,350 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,467,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,319,215 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
5,501,781 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,645,869 >>> mbox cmd response: failed
5,646,474 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,789,744 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
17,862,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,581,984 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,505,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,649,481 >>> mbox cmd response: failed
5,650,045 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,793,213 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
17,855,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,573,862 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
5,172,109 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,316,312 >>> mbox cmd response: failed
5,316,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,460,200 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,437,913 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,251,018 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,156,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,300,318 >>> mbox cmd response: failed
5,300,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,444,183 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,432,097 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,271,674 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
5,507,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,651,254 >>> mbox cmd response: failed
5,651,835 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,795,100 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,843,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,590,914 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
5,506,254 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,650,422 >>> mbox cmd response: failed
5,650,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,794,257 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,863,192 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,584,471 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,821 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,829 >>> mbox cmd response: failed
823,829 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,835 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,771 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,433 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,625 >>> mbox cmd response: failed
823,625 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,843 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,992 >>> mbox cmd response: failed
823,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,594 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,124 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,132 >>> mbox cmd response: failed
824,132 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,982 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,564 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,861 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,869 >>> mbox cmd response: failed
823,869 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,253 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,403 >>> mbox cmd response: failed
824,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,065 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,197 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,438 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,446 >>> mbox cmd response: failed
824,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,364 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,606 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,614 >>> mbox cmd response: failed
824,614 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,546 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,726 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,901 >>> mbox cmd response: failed
823,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
823,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,669 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,787 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,343 >>> mbox cmd response: failed
824,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,307 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,582 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,590 >>> mbox cmd response: failed
824,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
824,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,690 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,986 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,128 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
825,136 >>> mbox cmd response: failed
825,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
825,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,972 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,196 UART:
192,564 UART: Running Caliptra ROM ...
193,753 UART:
193,905 UART: [state] CFI Enabled
265,675 UART: [state] LifecycleState = Unprovisioned
267,599 UART: [state] DebugLocked = No
270,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,743 UART: [kat] SHA2-256
444,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,972 UART: [kat] ++
455,450 UART: [kat] sha1
466,441 UART: [kat] SHA2-256
469,099 UART: [kat] SHA2-384
474,746 UART: [kat] SHA2-512-ACC
477,120 UART: [kat] ECC-384
2,767,272 UART: [kat] HMAC-384Kdf
2,779,221 UART: [kat] LMS
3,969,487 UART: [kat] --
3,974,625 UART: [cold-reset] ++
3,975,642 UART: [fht] Storing FHT @ 0x50003400
3,986,344 UART: [idev] ++
3,986,919 UART: [idev] CDI.KEYID = 6
3,987,957 UART: [idev] SUBJECT.KEYID = 7
3,989,154 UART: [idev] UDS.KEYID = 0
3,990,199 ready_for_fw is high
3,990,409 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,134,566 UART: [idev] Erasing UDS.KEYID = 0
7,326,118 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,268 UART: [idev] --
7,352,267 UART: [ldev] ++
7,352,839 UART: [ldev] CDI.KEYID = 6
7,353,805 UART: [ldev] SUBJECT.KEYID = 5
7,355,019 UART: [ldev] AUTHORITY.KEYID = 7
7,356,356 UART: [ldev] FE.KEYID = 1
7,400,530 UART: [ldev] Erasing FE.KEYID = 1
10,732,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,751 UART: [ldev] --
13,097,022 UART: [fwproc] Waiting for Commands...
13,100,097 UART: [fwproc] Received command 0x46574c44
13,102,292 UART: [fwproc] Received Image of size 114632 bytes
17,159,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,624,031 >>> mbox cmd response: success
17,628,012 UART: [afmc] ++
17,628,604 UART: [afmc] CDI.KEYID = 6
17,629,569 UART: [afmc] SUBJECT.KEYID = 7
17,630,787 UART: [afmc] AUTHORITY.KEYID = 5
20,983,646 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,955 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,406 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,218 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,634 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,999 UART: [afmc] --
23,360,586 UART: [cold-reset] --
23,364,079 UART: [state] Locking Datavault
23,370,090 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,796 UART: [state] Locking ICCM
23,373,944 UART: [exit] Launching FMC @ 0x40000130
23,382,340 UART:
23,382,583 UART: Running Caliptra FMC ...
23,383,686 UART:
23,383,845 UART: [state] CFI Enabled
23,446,480 UART: [fht] FMC Alias Private Key: 7
25,784,095 UART: [art] Extend RT PCRs Done
25,785,316 UART: [art] Lock RT PCRs Done
25,787,046 UART: [art] Populate DV Done
25,792,296 UART: [fht] FMC Alias Private Key: 7
25,793,846 UART: [art] Derive CDI
25,794,664 UART: [art] Store in in slot 0x4
25,854,365 UART: [art] Derive Key Pair
25,855,437 UART: [art] Store priv key in slot 0x5
29,148,587 UART: [art] Derive Key Pair - Done
29,161,650 UART: [art] Signing Cert with AUTHO
29,162,961 UART: RITY.KEYID = 7
31,449,780 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,286 UART: [art] PUB.X = 4D1D09592AF98AC30D136D8AA75F0F93A83FC9FCFB0A61EDBE72485410AD7C3CA3A3AC56B379D2E3EFEF5BE5EF00B5B3
31,458,543 UART: [art] PUB.Y = 328943DB66C3A6FE86C0F26B438DB31F927B63323AD93B855727C3AF9C44B4555D3000025D1A92AA7FE366C5577CAE47
31,465,783 UART: [art] SIG.R = B77D72E2B7A17FE4223C4602418A6A146BC0445A87C82CF4F51D87223E8616FED60E22CAFD04757E64A24BC3EA9DA58D
31,473,191 UART: [art] SIG.S = 50B780DFAE6A00C7E3C828BE40121DD4C0A8756A4B371EF3DF14930BE3BDA925B4ADCE01885FE3120ECCD06D41A70FEA
32,778,261 UART: Caliptra RT
32,778,975 UART: [state] CFI Enabled
32,940,322 UART: [rt] RT listening for mailbox commands...
32,942,174 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,971,792 UART: [rt]cmd =0x46504c54, len=4
32,973,242 >>> mbox cmd response data (8 bytes)
32,974,547 UART: [rt] FIPS self test
32,975,505 UART: [kat] ++
32,975,957 UART: [kat] sha1
32,980,144 UART: [kat] SHA2-256
32,982,075 UART: [kat] SHA2-384
32,985,149 UART: [kat] SHA2-512-ACC
32,987,384 UART: [kat] ECC-384
36,256,115 UART: [kat] HMAC-384Kdf
36,257,489 UART: Fatal Error: 0x90030001
36,292,638 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,436,624 >>> mbox cmd response: failed
36,437,276 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,581,252 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,054 UART:
190,347 UART: Running Caliptra ROM ...
191,461 UART:
191,611 UART: [state] CFI Enabled
265,180 UART: [state] LifecycleState = Unprovisioned
267,102 UART: [state] DebugLocked = No
268,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,856 UART: [kat] SHA2-256
443,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,064 UART: [kat] ++
454,594 UART: [kat] sha1
465,644 UART: [kat] SHA2-256
468,332 UART: [kat] SHA2-384
474,925 UART: [kat] SHA2-512-ACC
477,325 UART: [kat] ECC-384
2,769,569 UART: [kat] HMAC-384Kdf
2,780,659 UART: [kat] LMS
3,970,978 UART: [kat] --
3,973,421 UART: [cold-reset] ++
3,974,997 UART: [fht] Storing FHT @ 0x50003400
3,986,866 UART: [idev] ++
3,987,438 UART: [idev] CDI.KEYID = 6
3,988,349 UART: [idev] SUBJECT.KEYID = 7
3,989,619 UART: [idev] UDS.KEYID = 0
3,991,130 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,135,220 UART: [idev] Erasing UDS.KEYID = 0
7,325,637 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,493 UART: [idev] --
7,351,029 UART: [ldev] ++
7,351,683 UART: [ldev] CDI.KEYID = 6
7,352,596 UART: [ldev] SUBJECT.KEYID = 5
7,353,817 UART: [ldev] AUTHORITY.KEYID = 7
7,355,055 UART: [ldev] FE.KEYID = 1
7,382,028 UART: [ldev] Erasing FE.KEYID = 1
10,714,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,015 UART: [ldev] --
13,077,283 UART: [fwproc] Waiting for Commands...
13,080,463 UART: [fwproc] Received command 0x46574c44
13,082,654 UART: [fwproc] Received Image of size 114632 bytes
17,146,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,759 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,608,993 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,807,843 ready_for_fw is high
3,808,445 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,883,913 >>> mbox cmd response: success
23,569,869 UART:
23,570,253 UART: Running Caliptra FMC ...
23,571,373 UART:
23,571,558 UART: [state] CFI Enabled
23,640,761 UART: [fht] FMC Alias Private Key: 7
25,978,623 UART: [art] Extend RT PCRs Done
25,979,863 UART: [art] Lock RT PCRs Done
25,981,580 UART: [art] Populate DV Done
25,987,157 UART: [fht] FMC Alias Private Key: 7
25,988,653 UART: [art] Derive CDI
25,989,391 UART: [art] Store in in slot 0x4
26,049,471 UART: [art] Derive Key Pair
26,050,525 UART: [art] Store priv key in slot 0x5
29,343,251 UART: [art] Derive Key Pair - Done
29,356,093 UART: [art] Signing Cert with AUTHO
29,357,405 UART: RITY.KEYID = 7
31,644,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,997 UART: [art] PUB.X = 6A3E72F986ED4B4CF83CF4BAF6C4778BAA7C58B3AA818F9D9EAB1436A455E42FD6CFFD7D99AF56781E9AC3D4DDFF4C87
31,653,271 UART: [art] PUB.Y = A09212697A71AF10D8B63DA1A8CE99B62BC715ED3F9D27F084602D7749DD4A5C709BC23197BC0367E38610CA5F2FA346
31,660,489 UART: [art] SIG.R = 7B0CBDA7662F74D31934CAC651529B0D3FD02C4B796E03346D8BA7044A3F582A2E5739BC92E9B8C07F4BAD56C1712643
31,667,895 UART: [art] SIG.S = 87372CEE8B92ADD5817CA8AA2B252D4A85EFDD064EE77BB6119863D7D128C090B53601BB98745A62D69AE8DBA15D9DB0
32,973,108 UART: Caliptra RT
32,973,830 UART: [state] CFI Enabled
33,134,471 UART: [rt] RT listening for mailbox commands...
33,136,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,165,861 UART: [rt]cmd =0x46504c54, len=4
33,167,421 >>> mbox cmd response data (8 bytes)
33,168,591 UART: [rt] FIPS self test
33,169,543 UART: [kat] ++
33,169,997 UART: [kat] sha1
33,174,349 UART: [kat] SHA2-256
33,176,277 UART: [kat] SHA2-384
33,179,511 UART: [kat] SHA2-512-ACC
33,181,775 UART: [kat] ECC-384
36,449,464 UART: [kat] HMAC-384Kdf
36,450,847 UART: Fatal Error: 0x90030001
36,486,024 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,630,057 >>> mbox cmd response: failed
36,630,675 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,774,581 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,787,703 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,887,019 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,535 UART:
192,894 UART: Running Caliptra ROM ...
194,019 UART:
603,667 UART: [state] CFI Enabled
616,525 UART: [state] LifecycleState = Unprovisioned
618,508 UART: [state] DebugLocked = No
620,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,524 UART: [kat] SHA2-256
795,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,836 UART: [kat] ++
806,286 UART: [kat] sha1
818,226 UART: [kat] SHA2-256
820,885 UART: [kat] SHA2-384
826,883 UART: [kat] SHA2-512-ACC
829,254 UART: [kat] ECC-384
3,111,122 UART: [kat] HMAC-384Kdf
3,122,999 UART: [kat] LMS
4,313,116 UART: [kat] --
4,317,473 UART: [cold-reset] ++
4,319,192 UART: [fht] Storing FHT @ 0x50003400
4,329,896 UART: [idev] ++
4,330,480 UART: [idev] CDI.KEYID = 6
4,331,394 UART: [idev] SUBJECT.KEYID = 7
4,332,646 UART: [idev] UDS.KEYID = 0
4,333,690 ready_for_fw is high
4,333,921 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,478,347 UART: [idev] Erasing UDS.KEYID = 0
7,619,426 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,022 UART: [idev] --
7,644,745 UART: [ldev] ++
7,645,319 UART: [ldev] CDI.KEYID = 6
7,646,286 UART: [ldev] SUBJECT.KEYID = 5
7,647,506 UART: [ldev] AUTHORITY.KEYID = 7
7,648,798 UART: [ldev] FE.KEYID = 1
7,659,994 UART: [ldev] Erasing FE.KEYID = 1
10,943,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,556 UART: [ldev] --
13,304,117 UART: [fwproc] Waiting for Commands...
13,307,080 UART: [fwproc] Received command 0x46574c44
13,309,270 UART: [fwproc] Received Image of size 114632 bytes
17,366,097 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,829,590 >>> mbox cmd response: success
17,833,085 UART: [afmc] ++
17,833,733 UART: [afmc] CDI.KEYID = 6
17,834,623 UART: [afmc] SUBJECT.KEYID = 7
17,835,888 UART: [afmc] AUTHORITY.KEYID = 5
21,151,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,184 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,434 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,819 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,671 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,091 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,600 UART: [afmc] --
23,516,046 UART: [cold-reset] --
23,519,155 UART: [state] Locking Datavault
23,523,053 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,809 UART: [state] Locking ICCM
23,526,984 UART: [exit] Launching FMC @ 0x40000130
23,535,387 UART:
23,535,625 UART: Running Caliptra FMC ...
23,536,652 UART:
23,536,795 UART: [state] CFI Enabled
23,544,901 UART: [fht] FMC Alias Private Key: 7
25,876,140 UART: [art] Extend RT PCRs Done
25,877,365 UART: [art] Lock RT PCRs Done
25,878,694 UART: [art] Populate DV Done
25,884,438 UART: [fht] FMC Alias Private Key: 7
25,885,924 UART: [art] Derive CDI
25,886,656 UART: [art] Store in in slot 0x4
25,929,248 UART: [art] Derive Key Pair
25,930,287 UART: [art] Store priv key in slot 0x5
29,172,387 UART: [art] Derive Key Pair - Done
29,185,398 UART: [art] Signing Cert with AUTHO
29,186,728 UART: RITY.KEYID = 7
31,466,151 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,666 UART: [art] PUB.X = 987F1C5C8527C2F297AAB4DC98F604A0EE85DDB8932FFB3D0C4A8790D2E989118BF31193C264B5225808645DF8B2AEE9
31,474,860 UART: [art] PUB.Y = 94881BDD76A48A4234611AE25E81AA942A29ED3B9DA92928AFB4C084FB4702A3883C4C18786CCBE4CB4C803734674B9F
31,482,101 UART: [art] SIG.R = 466011EA3EE52F3214558D12111F0835E89E756884FC6818AB7B07F00A2B5D30A4F9AB8CB8E75C418D190BBCA4A20AE9
31,489,498 UART: [art] SIG.S = 9756DB9595EEF6746BAD7D1117633C2E68023D991F8CB87E8EE3752D126C6A5C86A27DF767047BD5EE19C3FFDD6D7349
32,794,995 UART: Caliptra RT
32,795,723 UART: [state] CFI Enabled
32,913,543 UART: [rt] RT listening for mailbox commands...
32,915,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,944,967 UART: [rt]cmd =0x46504c54, len=4
32,946,466 >>> mbox cmd response data (8 bytes)
32,947,480 UART: [rt] FIPS self test
32,948,358 UART: [kat] ++
32,948,800 UART: [kat] sha1
32,953,280 UART: [kat] SHA2-256
32,955,222 UART: [kat] SHA2-384
32,958,309 UART: [kat] SHA2-512-ACC
32,960,547 UART: [kat] ECC-384
36,202,824 UART: [kat] HMAC-384Kdf
36,203,989 UART: Fatal Error: 0x90030001
36,239,384 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,383,306 >>> mbox cmd response: failed
36,383,942 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,527,832 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,023 UART:
190,318 UART: Running Caliptra ROM ...
191,345 UART:
4,007,264 UART: [state] CFI Enabled
4,021,952 UART: [state] LifecycleState = Unprovisioned
4,023,893 UART: [state] DebugLocked = No
4,025,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,030,536 UART: [kat] SHA2-256
4,200,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,210,784 UART: [kat] ++
4,211,247 UART: [kat] sha1
4,222,098 UART: [kat] SHA2-256
4,224,818 UART: [kat] SHA2-384
4,230,770 UART: [kat] SHA2-512-ACC
4,233,128 UART: [kat] ECC-384
6,518,788 UART: [kat] HMAC-384Kdf
6,531,931 UART: [kat] LMS
7,722,052 UART: [kat] --
7,729,587 UART: [cold-reset] ++
7,731,904 UART: [fht] Storing FHT @ 0x50003400
7,743,492 UART: [idev] ++
7,744,119 UART: [idev] CDI.KEYID = 6
7,745,027 UART: [idev] SUBJECT.KEYID = 7
7,746,298 UART: [idev] UDS.KEYID = 0
7,747,828 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
7,891,749 UART: [idev] Erasing UDS.KEYID = 0
11,035,574 UART: [idev] Using Sha1 for KeyId Algorithm
11,057,235 UART: [idev] --
11,059,963 UART: [ldev] ++
11,060,595 UART: [ldev] CDI.KEYID = 6
11,061,509 UART: [ldev] SUBJECT.KEYID = 5
11,062,727 UART: [ldev] AUTHORITY.KEYID = 7
11,064,015 UART: [ldev] FE.KEYID = 1
11,075,314 UART: [ldev] Erasing FE.KEYID = 1
14,365,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,658,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,672,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,687,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,702,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,721,147 UART: [ldev] --
16,725,762 UART: [fwproc] Waiting for Commands...
16,727,534 UART: [fwproc] Received command 0x46574c44
16,729,722 UART: [fwproc] Received Image of size 114632 bytes
20,792,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,864,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,933,711 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
21,252,745 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
4,127,186 ready_for_fw is high
4,127,784 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,084,123 >>> mbox cmd response: success
23,728,406 UART:
23,728,799 UART: Running Caliptra FMC ...
23,729,937 UART:
23,730,101 UART: [state] CFI Enabled
23,738,106 UART: [fht] FMC Alias Private Key: 7
26,069,279 UART: [art] Extend RT PCRs Done
26,070,505 UART: [art] Lock RT PCRs Done
26,071,966 UART: [art] Populate DV Done
26,077,115 UART: [fht] FMC Alias Private Key: 7
26,078,712 UART: [art] Derive CDI
26,079,529 UART: [art] Store in in slot 0x4
26,122,393 UART: [art] Derive Key Pair
26,123,387 UART: [art] Store priv key in slot 0x5
29,365,734 UART: [art] Derive Key Pair - Done
29,378,213 UART: [art] Signing Cert with AUTHO
29,379,527 UART: RITY.KEYID = 7
31,659,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,526 UART: [art] PUB.X = 18EB7E9BD093C29CD15F4987FFE5D05979CBD0537960A1B4E3FC998263D4338EE5956B1C3C7B212A5166F094CAA1BAFD
31,667,797 UART: [art] PUB.Y = 2C5494813CC93C8CD2AEB4D60776D65F23081B3452879E72EBF6C899A676FCB154E03C9BD1390AF552D1A4D003AD76F9
31,675,052 UART: [art] SIG.R = 81B49ABC56FD89B9842B3AE17A2DAD3503B805BF8E6DF5CC0DD1ACCCC3CBFA0DFA1C4900A068A0B8158FE2CD358A7552
31,682,455 UART: [art] SIG.S = 94467BDA4B2F32A093BF96C17B77C282C5EB2198ACE71C1F2B857D7DBBBA522B2AD90F4138125ED5ABD7CF8453A1DA25
32,987,237 UART: Caliptra RT
32,987,954 UART: [state] CFI Enabled
33,105,342 UART: [rt] RT listening for mailbox commands...
33,107,193 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,818 UART: [rt]cmd =0x46504c54, len=4
33,138,290 >>> mbox cmd response data (8 bytes)
33,139,545 UART: [rt] FIPS self test
33,140,491 UART: [kat] ++
33,140,946 UART: [kat] sha1
33,145,368 UART: [kat] SHA2-256
33,147,301 UART: [kat] SHA2-384
33,150,154 UART: [kat] SHA2-512-ACC
33,152,411 UART: [kat] ECC-384
36,395,007 UART: [kat] HMAC-384Kdf
36,396,435 UART: Fatal Error: 0x90030001
36,431,663 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,576,040 >>> mbox cmd response: failed
36,576,675 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,720,981 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
7,341,699 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
21,292,152 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,325 UART:
192,685 UART: Running Caliptra ROM ...
193,816 UART:
193,956 UART: [state] CFI Enabled
262,267 UART: [state] LifecycleState = Unprovisioned
264,108 UART: [state] DebugLocked = No
265,707 UART: [state] WD Timer not started. Device not locked for debugging
268,966 UART: [kat] SHA2-256
448,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,694 UART: [kat] ++
460,164 UART: [kat] sha1
471,185 UART: [kat] SHA2-256
474,161 UART: [kat] SHA2-384
480,378 UART: [kat] SHA2-512-ACC
483,325 UART: [kat] ECC-384
2,946,375 UART: [kat] HMAC-384Kdf
2,971,426 UART: [kat] LMS
3,500,841 UART: [kat] --
3,504,205 UART: [cold-reset] ++
3,506,635 UART: [fht] FHT @ 0x50003400
3,516,919 UART: [idev] ++
3,517,511 UART: [idev] CDI.KEYID = 6
3,518,398 UART: [idev] SUBJECT.KEYID = 7
3,519,649 UART: [idev] UDS.KEYID = 0
3,520,555 ready_for_fw is high
3,520,757 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,665,214 UART: [idev] Erasing UDS.KEYID = 0
6,027,103 UART: [idev] Sha1 KeyId Algorithm
6,049,796 UART: [idev] --
6,054,228 UART: [ldev] ++
6,054,855 UART: [ldev] CDI.KEYID = 6
6,055,744 UART: [ldev] SUBJECT.KEYID = 5
6,056,860 UART: [ldev] AUTHORITY.KEYID = 7
6,058,148 UART: [ldev] FE.KEYID = 1
6,100,297 UART: [ldev] Erasing FE.KEYID = 1
8,604,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,272 UART: [ldev] --
10,413,330 UART: [fwproc] Wait for Commands...
10,415,998 UART: [fwproc] Recv command 0x46574c44
10,418,101 UART: [fwproc] Recv'd Img size: 114940 bytes
13,838,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,689 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,984,500 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,304,549 >>> mbox cmd response: success
14,309,401 UART: [afmc] ++
14,310,177 UART: [afmc] CDI.KEYID = 6
14,311,090 UART: [afmc] SUBJECT.KEYID = 7
14,312,138 UART: [afmc] AUTHORITY.KEYID = 5
16,850,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,877 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,590,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,606,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,622,443 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,644,497 UART: [afmc] --
18,647,781 UART: [cold-reset] --
18,653,103 UART: [state] Locking Datavault
18,659,591 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,287 UART: [state] Locking ICCM
18,663,487 UART: [exit] Launching FMC @ 0x40000130
18,671,877 UART:
18,672,112 UART: Running Caliptra FMC ...
18,673,210 UART:
18,673,367 UART: [state] CFI Enabled
18,730,215 UART: [fht] FMC Alias Private Key: 7
20,494,332 UART: [art] Extend RT PCRs Done
20,495,556 UART: [art] Lock RT PCRs Done
20,497,290 UART: [art] Populate DV Done
20,502,861 UART: [fht] FMC Alias Private Key: 7
20,504,613 UART: [art] Derive CDI
20,505,443 UART: [art] Store in in slot 0x4
20,562,592 UART: [art] Derive Key Pair
20,563,633 UART: [art] Store priv key in slot 0x5
23,026,128 UART: [art] Derive Key Pair - Done
23,039,121 UART: [art] Signing Cert with AUTHO
23,040,455 UART: RITY.KEYID = 7
24,751,898 UART: [art] Erasing AUTHORITY.KEYID = 7
24,753,406 UART: [art] PUB.X = 998AC0A74A970F3354E9E2632CAD89A21C900DD81CBAA1ED544B0632FA84ADEF843D39C7E0DCDDE6B5E72E0B1F8767C0
24,760,718 UART: [art] PUB.Y = D7314B8A12E1F9C8B1150C27C35042794ECD444F81D73B0DEB6C93518193D0F4ACF73971497D7AF75E36810287929E44
24,767,968 UART: [art] SIG.R = 80253D3BDC391FEE1EEF52F66D139257322060DEDAA1D36F4986C4F6C68F63CA130DFA9CC0DC3D1C4C3B466339CF915D
24,775,367 UART: [art] SIG.S = D962FA47B4F653B068ABD6E5818FF17C043B21811BDAF3E028776FA549FF60DB4646873AD595B0E7DE5748C11E61A739
25,754,899 UART: Caliptra RT
25,755,621 UART: [state] CFI Enabled
25,918,206 UART: [rt] RT listening for mailbox commands...
25,920,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,949,794 UART: [rt]cmd =0x46504c54, len=4
25,951,345 >>> mbox cmd response data (8 bytes)
25,952,136 UART: [rt] FIPS self test
25,953,083 UART: [kat] ++
25,953,583 UART: [kat] sha1
25,958,070 UART: [kat] SHA2-256
25,959,953 UART: [kat] SHA2-384
25,962,855 UART: [kat] SHA2-512-ACC
25,965,146 UART: [kat] ECC-384
28,404,437 UART: [kat] HMAC-384Kdf
28,405,748 UART: Fatal Error: 0x90030001
28,440,973 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,585,392 >>> mbox cmd response: failed
28,586,054 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,730,408 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,118 UART:
190,408 UART: Running Caliptra ROM ...
191,520 UART:
191,671 UART: [state] CFI Enabled
262,575 UART: [state] LifecycleState = Unprovisioned
264,427 UART: [state] DebugLocked = No
266,777 UART: [state] WD Timer not started. Device not locked for debugging
270,989 UART: [kat] SHA2-256
450,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,728 UART: [kat] ++
462,258 UART: [kat] sha1
474,112 UART: [kat] SHA2-256
477,116 UART: [kat] SHA2-384
482,609 UART: [kat] SHA2-512-ACC
485,548 UART: [kat] ECC-384
2,947,948 UART: [kat] HMAC-384Kdf
2,971,331 UART: [kat] LMS
3,500,762 UART: [kat] --
3,506,073 UART: [cold-reset] ++
3,507,957 UART: [fht] FHT @ 0x50003400
3,518,879 UART: [idev] ++
3,519,445 UART: [idev] CDI.KEYID = 6
3,520,360 UART: [idev] SUBJECT.KEYID = 7
3,521,577 UART: [idev] UDS.KEYID = 0
3,523,093 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,694 UART: [idev] Erasing UDS.KEYID = 0
6,025,351 UART: [idev] Sha1 KeyId Algorithm
6,048,089 UART: [idev] --
6,053,006 UART: [ldev] ++
6,053,585 UART: [ldev] CDI.KEYID = 6
6,054,500 UART: [ldev] SUBJECT.KEYID = 5
6,055,659 UART: [ldev] AUTHORITY.KEYID = 7
6,056,912 UART: [ldev] FE.KEYID = 1
6,099,143 UART: [ldev] Erasing FE.KEYID = 1
8,604,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,536 UART: [ldev] --
10,413,799 UART: [fwproc] Wait for Commands...
10,416,111 UART: [fwproc] Recv command 0x46574c44
10,418,205 UART: [fwproc] Recv'd Img size: 114940 bytes
13,825,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,659 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,283,507 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,380,501 ready_for_fw is high
3,380,932 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,077,442 >>> mbox cmd response: success
18,364,658 UART:
18,365,065 UART: Running Caliptra FMC ...
18,366,187 UART:
18,366,352 UART: [state] CFI Enabled
18,430,502 UART: [fht] FMC Alias Private Key: 7
20,194,733 UART: [art] Extend RT PCRs Done
20,195,955 UART: [art] Lock RT PCRs Done
20,197,215 UART: [art] Populate DV Done
20,202,590 UART: [fht] FMC Alias Private Key: 7
20,204,135 UART: [art] Derive CDI
20,204,952 UART: [art] Store in in slot 0x4
20,263,320 UART: [art] Derive Key Pair
20,264,364 UART: [art] Store priv key in slot 0x5
22,727,236 UART: [art] Derive Key Pair - Done
22,740,074 UART: [art] Signing Cert with AUTHO
22,741,379 UART: RITY.KEYID = 7
24,453,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,841 UART: [art] PUB.X = EE7D0FFDD7F15FB87F9D565F09D6D6C75E99D2E0AFD0F40E4C6916561385A0B46CC1E110E4E6BD0A5CA30AB99E1E15D1
24,462,102 UART: [art] PUB.Y = 3CC6FF50B53B7C3B86AA097E8D84A69EAB406E6C4788D5299139487B829DE1D996138676C689E8565AA7E13DCF64E1A8
24,469,400 UART: [art] SIG.R = F6692D5E6C6513C2E7356BC443C03563B571E22DC7005D758ED1AB77D22671406B9A858F916D4449D61EB9323439C4C5
24,476,782 UART: [art] SIG.S = 6AE1776662516CA7291110FD7B295F0C0624569263F11AF5394C99336FB3CC8F0C76758D74E012536D13BB460F1163A1
25,455,565 UART: Caliptra RT
25,456,265 UART: [state] CFI Enabled
25,621,061 UART: [rt] RT listening for mailbox commands...
25,622,920 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,652,767 UART: [rt]cmd =0x46504c54, len=4
25,654,347 >>> mbox cmd response data (8 bytes)
25,655,476 UART: [rt] FIPS self test
25,656,423 UART: [kat] ++
25,656,875 UART: [kat] sha1
25,661,113 UART: [kat] SHA2-256
25,662,994 UART: [kat] SHA2-384
25,665,931 UART: [kat] SHA2-512-ACC
25,668,196 UART: [kat] ECC-384
28,107,329 UART: [kat] HMAC-384Kdf
28,108,557 UART: Fatal Error: 0x90030001
28,143,814 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,288,234 >>> mbox cmd response: failed
28,288,895 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,433,877 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,352,214 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,070,915 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,640 UART:
193,012 UART: Running Caliptra ROM ...
194,222 UART:
603,745 UART: [state] CFI Enabled
616,273 UART: [state] LifecycleState = Unprovisioned
618,154 UART: [state] DebugLocked = No
619,677 UART: [state] WD Timer not started. Device not locked for debugging
623,008 UART: [kat] SHA2-256
802,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,709 UART: [kat] ++
814,154 UART: [kat] sha1
824,672 UART: [kat] SHA2-256
827,676 UART: [kat] SHA2-384
833,952 UART: [kat] SHA2-512-ACC
836,894 UART: [kat] ECC-384
3,280,879 UART: [kat] HMAC-384Kdf
3,293,563 UART: [kat] LMS
3,823,069 UART: [kat] --
3,827,425 UART: [cold-reset] ++
3,829,785 UART: [fht] FHT @ 0x50003400
3,840,921 UART: [idev] ++
3,841,518 UART: [idev] CDI.KEYID = 6
3,842,405 UART: [idev] SUBJECT.KEYID = 7
3,843,584 UART: [idev] UDS.KEYID = 0
3,844,538 ready_for_fw is high
3,844,777 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,989,049 UART: [idev] Erasing UDS.KEYID = 0
6,312,915 UART: [idev] Sha1 KeyId Algorithm
6,335,616 UART: [idev] --
6,339,269 UART: [ldev] ++
6,339,848 UART: [ldev] CDI.KEYID = 6
6,340,762 UART: [ldev] SUBJECT.KEYID = 5
6,341,923 UART: [ldev] AUTHORITY.KEYID = 7
6,343,208 UART: [ldev] FE.KEYID = 1
6,356,014 UART: [ldev] Erasing FE.KEYID = 1
8,829,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,227 UART: [ldev] --
10,619,087 UART: [fwproc] Wait for Commands...
10,621,780 UART: [fwproc] Recv command 0x46574c44
10,623,874 UART: [fwproc] Recv'd Img size: 114940 bytes
14,038,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,406 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,154 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,500,725 >>> mbox cmd response: success
14,505,525 UART: [afmc] ++
14,506,125 UART: [afmc] CDI.KEYID = 6
14,507,204 UART: [afmc] SUBJECT.KEYID = 7
14,508,312 UART: [afmc] AUTHORITY.KEYID = 5
17,006,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,503 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,609 UART: [afmc] --
18,801,349 UART: [cold-reset] --
18,804,191 UART: [state] Locking Datavault
18,808,418 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,063 UART: [state] Locking ICCM
18,811,298 UART: [exit] Launching FMC @ 0x40000130
18,819,689 UART:
18,819,927 UART: Running Caliptra FMC ...
18,821,030 UART:
18,821,195 UART: [state] CFI Enabled
18,829,401 UART: [fht] FMC Alias Private Key: 7
20,585,760 UART: [art] Extend RT PCRs Done
20,586,958 UART: [art] Lock RT PCRs Done
20,588,480 UART: [art] Populate DV Done
20,593,753 UART: [fht] FMC Alias Private Key: 7
20,595,297 UART: [art] Derive CDI
20,596,116 UART: [art] Store in in slot 0x4
20,638,541 UART: [art] Derive Key Pair
20,639,581 UART: [art] Store priv key in slot 0x5
23,066,481 UART: [art] Derive Key Pair - Done
23,079,859 UART: [art] Signing Cert with AUTHO
23,081,168 UART: RITY.KEYID = 7
24,786,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,435 UART: [art] PUB.X = D19AF308D052A9D26C8C3CCFD8B5B55C597EDA08E7953E21E88E751762AC75ED2CF03765C4EC119CEE5B20BA6F9FAFD6
24,795,530 UART: [art] PUB.Y = FBD3C697CAF9BE06653B1C8DF04AE08BF196599949BEF2934AE791AE96759B3361887937CF5E27C1959BD85FE906DDC3
24,802,786 UART: [art] SIG.R = 745AD4FBFBA775EA017ED4D7C93493E2574C9807147523070FE922F155C953F6BDF1C1CD304E05B0199FCAD258CE79C7
24,810,144 UART: [art] SIG.S = AD4F67DDEB8B63324879DD8221471F4D0E3C75BEBBFF6D3FAE064E1FB3045C91A8FC3BCF68FCD39EE620D53E6C9AA8E2
25,788,905 UART: Caliptra RT
25,789,648 UART: [state] CFI Enabled
25,907,092 UART: [rt] RT listening for mailbox commands...
25,908,967 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,727 UART: [rt]cmd =0x46504c54, len=4
25,940,392 >>> mbox cmd response data (8 bytes)
25,941,350 UART: [rt] FIPS self test
25,942,299 UART: [kat] ++
25,942,751 UART: [kat] sha1
25,947,204 UART: [kat] SHA2-256
25,949,134 UART: [kat] SHA2-384
25,952,210 UART: [kat] SHA2-512-ACC
25,954,507 UART: [kat] ECC-384
28,382,198 UART: [kat] HMAC-384Kdf
28,383,884 UART: Fatal Error: 0x90030001
28,419,203 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,563,666 >>> mbox cmd response: failed
28,564,348 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,708,474 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,005 UART:
190,314 UART: Running Caliptra ROM ...
191,344 UART:
11,835,522 UART: [state] CFI Enabled
11,848,461 UART: [state] LifecycleState = Unprovisioned
11,850,348 UART: [state] DebugLocked = No
11,851,959 UART: [state] WD Timer not started. Device not locked for debugging
11,854,836 UART: [kat] SHA2-256
12,033,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,045,549 UART: [kat] ++
12,046,097 UART: [kat] sha1
12,057,375 UART: [kat] SHA2-256
12,060,395 UART: [kat] SHA2-384
12,067,248 UART: [kat] SHA2-512-ACC
12,070,213 UART: [kat] ECC-384
14,508,930 UART: [kat] HMAC-384Kdf
14,522,446 UART: [kat] LMS
15,051,938 UART: [kat] --
15,056,595 UART: [cold-reset] ++
15,058,853 UART: [fht] FHT @ 0x50003400
15,070,641 UART: [idev] ++
15,071,202 UART: [idev] CDI.KEYID = 6
15,072,114 UART: [idev] SUBJECT.KEYID = 7
15,073,330 UART: [idev] UDS.KEYID = 0
15,074,867 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
15,219,369 UART: [idev] Erasing UDS.KEYID = 0
17,542,793 UART: [idev] Sha1 KeyId Algorithm
17,565,796 UART: [idev] --
17,570,706 UART: [ldev] ++
17,571,279 UART: [ldev] CDI.KEYID = 6
17,572,208 UART: [ldev] SUBJECT.KEYID = 5
17,573,372 UART: [ldev] AUTHORITY.KEYID = 7
17,574,602 UART: [ldev] FE.KEYID = 1
17,585,621 UART: [ldev] Erasing FE.KEYID = 1
20,057,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,774,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,790,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,806,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,822,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,844,316 UART: [ldev] --
21,848,394 UART: [fwproc] Wait for Commands...
21,851,233 UART: [fwproc] Recv command 0x46574c44
21,853,338 UART: [fwproc] Recv'd Img size: 114940 bytes
25,260,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,339,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,408,546 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,728,627 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,700,367 ready_for_fw is high
3,700,796 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,280,033 >>> mbox cmd response: success
18,533,306 UART:
18,533,703 UART: Running Caliptra FMC ...
18,534,914 UART:
18,535,081 UART: [state] CFI Enabled
18,543,137 UART: [fht] FMC Alias Private Key: 7
20,299,529 UART: [art] Extend RT PCRs Done
20,300,758 UART: [art] Lock RT PCRs Done
20,302,118 UART: [art] Populate DV Done
20,307,377 UART: [fht] FMC Alias Private Key: 7
20,308,919 UART: [art] Derive CDI
20,309,679 UART: [art] Store in in slot 0x4
20,352,058 UART: [art] Derive Key Pair
20,353,106 UART: [art] Store priv key in slot 0x5
22,780,247 UART: [art] Derive Key Pair - Done
22,793,037 UART: [art] Signing Cert with AUTHO
22,794,352 UART: RITY.KEYID = 7
24,499,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,456 UART: [art] PUB.X = 164995FF0F262B2C6E9F97D51E8381770CDD95C5E0589E3C87D79F92CF7EAD66B7DF464D1F9F68422BEC8F6E824F97A9
24,508,712 UART: [art] PUB.Y = 9C8DA18D0FE860FF036FDA61AFF942F73944821E3F105A9E1AB159E5F27A31D1B854BF0FCDD9CB7F3E940F06ACDD3FF9
24,516,019 UART: [art] SIG.R = CB75705814DE63C10884AAA54388385260243F0D5C11751F22D54386F00F1FB2999B33196606DD272ED05FA053C14421
24,523,365 UART: [art] SIG.S = E777897D428C49639D7C2B93D04EE53FD99E4828928456010A84CAA2FE8C7FD804D0AEBF5DC3895BA8B256077A6AD8A2
25,502,749 UART: Caliptra RT
25,503,468 UART: [state] CFI Enabled
25,621,470 UART: [rt] RT listening for mailbox commands...
25,623,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,652,987 UART: [rt]cmd =0x46504c54, len=4
25,654,613 >>> mbox cmd response data (8 bytes)
25,655,867 UART: [rt] FIPS self test
25,656,812 UART: [kat] ++
25,657,264 UART: [kat] sha1
25,661,772 UART: [kat] SHA2-256
25,663,699 UART: [kat] SHA2-384
25,666,719 UART: [kat] SHA2-512-ACC
25,669,014 UART: [kat] ECC-384
28,096,633 UART: [kat] HMAC-384Kdf
28,098,109 UART: Fatal Error: 0x90030001
28,133,251 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,277,632 >>> mbox cmd response: failed
28,278,228 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,422,493 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
15,194,350 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,785,459 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,274 UART:
192,634 UART: Running Caliptra ROM ...
193,851 UART:
194,009 UART: [state] CFI Enabled
263,896 UART: [state] LifecycleState = Unprovisioned
266,305 UART: [state] DebugLocked = No
268,838 UART: [state] WD Timer not started. Device not locked for debugging
272,735 UART: [kat] SHA2-256
462,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,394 UART: [kat] ++
473,888 UART: [kat] sha1
486,051 UART: [kat] SHA2-256
489,078 UART: [kat] SHA2-384
495,999 UART: [kat] SHA2-512-ACC
498,589 UART: [kat] ECC-384
2,945,773 UART: [kat] HMAC-384Kdf
2,971,236 UART: [kat] LMS
3,503,019 UART: [kat] --
3,507,327 UART: [cold-reset] ++
3,508,493 UART: [fht] FHT @ 0x50003400
3,518,626 UART: [idev] ++
3,519,337 UART: [idev] CDI.KEYID = 6
3,520,248 UART: [idev] SUBJECT.KEYID = 7
3,521,496 UART: [idev] UDS.KEYID = 0
3,522,427 ready_for_fw is high
3,522,626 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,607 UART: [idev] Erasing UDS.KEYID = 0
6,032,329 UART: [idev] Sha1 KeyId Algorithm
6,055,562 UART: [idev] --
6,060,816 UART: [ldev] ++
6,061,544 UART: [ldev] CDI.KEYID = 6
6,062,438 UART: [ldev] SUBJECT.KEYID = 5
6,063,547 UART: [ldev] AUTHORITY.KEYID = 7
6,064,788 UART: [ldev] FE.KEYID = 1
6,100,932 UART: [ldev] Erasing FE.KEYID = 1
8,607,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,533 UART: [ldev] --
10,415,179 UART: [fwproc] Wait for Commands...
10,417,277 UART: [fwproc] Recv command 0x46574c44
10,419,538 UART: [fwproc] Recv'd Img size: 114940 bytes
13,871,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,192 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,611,576 >>> mbox cmd response: success
14,615,787 UART: [afmc] ++
14,616,499 UART: [afmc] CDI.KEYID = 6
14,617,627 UART: [afmc] SUBJECT.KEYID = 7
14,619,165 UART: [afmc] AUTHORITY.KEYID = 5
17,149,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,632 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,760 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,572 UART: [afmc] --
18,951,852 UART: [cold-reset] --
18,955,505 UART: [state] Locking Datavault
18,962,051 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,196 UART: [state] Locking ICCM
18,967,085 UART: [exit] Launching FMC @ 0x40000130
18,975,705 UART:
18,975,941 UART: Running Caliptra FMC ...
18,977,063 UART:
18,977,223 UART: [state] CFI Enabled
19,034,182 UART: [fht] FMC Alias Private Key: 7
20,797,839 UART: [art] Extend RT PCRs Done
20,799,055 UART: [art] Lock RT PCRs Done
20,800,576 UART: [art] Populate DV Done
20,805,886 UART: [fht] FMC Alias Private Key: 7
20,807,432 UART: [art] Derive CDI
20,808,247 UART: [art] Store in in slot 0x4
20,866,804 UART: [art] Derive Key Pair
20,867,841 UART: [art] Store priv key in slot 0x5
23,330,485 UART: [art] Derive Key Pair - Done
23,343,587 UART: [art] Signing Cert with AUTHO
23,344,928 UART: RITY.KEYID = 7
25,056,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,292 UART: [art] PUB.X = 8A0CF6FF9418B186E841D047EC0330AA8AC56462DF9345FDDA281904470435955D9BA009C8CA7F092F1A411A30DAFA64
25,065,549 UART: [art] PUB.Y = 6B7923ADD33A48758B2710B483EFC03B92A0B1C15751161398DC4BFDADFB62ACEFD46B9F20331AC40B74F571444B8D54
25,072,778 UART: [art] SIG.R = A1B6B041B372787CA9D15DE7929B19672BCD2A834C506C830D91413970843B8E8E8C1B05415CAD65F6CB5D4A1114354D
25,080,142 UART: [art] SIG.S = CCB453B7F161B16EBF0863601977CF30D6FAB45E991ECE4ECCB29BFDD9941063075E961C5FA812D40AA2503E7EAEF777
26,059,165 UART: Caliptra RT
26,059,864 UART: [state] CFI Enabled
26,225,612 UART: [rt] RT listening for mailbox commands...
26,227,469 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,257,003 UART: [rt]cmd =0x46504c54, len=4
26,258,642 >>> mbox cmd response data (8 bytes)
26,259,935 UART: [rt] FIPS self test
26,260,875 UART: [kat] ++
26,261,329 UART: [kat] sha1
26,265,891 UART: [kat] SHA2-256
26,267,817 UART: [kat] SHA2-384
26,270,728 UART: [kat] SHA2-512-ACC
26,273,016 UART: [kat] ECC-384
28,712,705 UART: [kat] HMAC-384Kdf
28,714,240 UART: Fatal Error: 0x90030001
28,749,474 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,893,847 >>> mbox cmd response: failed
28,894,460 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,038,754 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,100 UART:
190,382 UART: Running Caliptra ROM ...
191,439 UART:
191,582 UART: [state] CFI Enabled
267,244 UART: [state] LifecycleState = Unprovisioned
269,659 UART: [state] DebugLocked = No
271,685 UART: [state] WD Timer not started. Device not locked for debugging
275,538 UART: [kat] SHA2-256
465,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,184 UART: [kat] ++
476,657 UART: [kat] sha1
487,809 UART: [kat] SHA2-256
490,869 UART: [kat] SHA2-384
496,640 UART: [kat] SHA2-512-ACC
499,204 UART: [kat] ECC-384
2,946,138 UART: [kat] HMAC-384Kdf
2,970,028 UART: [kat] LMS
3,501,832 UART: [kat] --
3,504,803 UART: [cold-reset] ++
3,506,298 UART: [fht] FHT @ 0x50003400
3,517,281 UART: [idev] ++
3,518,015 UART: [idev] CDI.KEYID = 6
3,518,925 UART: [idev] SUBJECT.KEYID = 7
3,520,143 UART: [idev] UDS.KEYID = 0
3,521,679 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,666,512 UART: [idev] Erasing UDS.KEYID = 0
6,027,711 UART: [idev] Sha1 KeyId Algorithm
6,050,144 UART: [idev] --
6,055,982 UART: [ldev] ++
6,056,667 UART: [ldev] CDI.KEYID = 6
6,057,583 UART: [ldev] SUBJECT.KEYID = 5
6,058,746 UART: [ldev] AUTHORITY.KEYID = 7
6,059,978 UART: [ldev] FE.KEYID = 1
6,101,001 UART: [ldev] Erasing FE.KEYID = 1
8,610,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,399 UART: [ldev] --
10,415,961 UART: [fwproc] Wait for Commands...
10,418,442 UART: [fwproc] Recv command 0x46574c44
10,420,763 UART: [fwproc] Recv'd Img size: 114940 bytes
13,876,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,077,154 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,623,798 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,416,497 ready_for_fw is high
3,416,905 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,729,252 >>> mbox cmd response: success
19,027,477 UART:
19,027,884 UART: Running Caliptra FMC ...
19,029,223 UART:
19,029,391 UART: [state] CFI Enabled
19,094,137 UART: [fht] FMC Alias Private Key: 7
20,857,406 UART: [art] Extend RT PCRs Done
20,858,618 UART: [art] Lock RT PCRs Done
20,860,270 UART: [art] Populate DV Done
20,865,862 UART: [fht] FMC Alias Private Key: 7
20,867,408 UART: [art] Derive CDI
20,868,184 UART: [art] Store in in slot 0x4
20,926,315 UART: [art] Derive Key Pair
20,927,323 UART: [art] Store priv key in slot 0x5
23,390,517 UART: [art] Derive Key Pair - Done
23,403,414 UART: [art] Signing Cert with AUTHO
23,404,721 UART: RITY.KEYID = 7
25,116,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,182 UART: [art] PUB.X = 7FD8C6FB5D908F7E52E208E66F8222075694965DFEE4DC16373416697C51122CA8B3BE8DC4457F2D9EC6FB50FDDA4065
25,125,394 UART: [art] PUB.Y = 682C917D51120480D7B60A844B7394D2AB722997FF304FA4AEF890B7848494A1C47EA4F11C91B5F799FF5C17F20E9771
25,132,646 UART: [art] SIG.R = 42F2989A8F69F2E4BC9F55B4C04BE276146BDA06E8142C61081CBF3F63EEADC707DB992640A8C0F93DC86705724EC6D2
25,140,046 UART: [art] SIG.S = 26B31D14F8DE367B39EA8DC66B4A96F6CBCDAC12CDA98A307E2D7E5152E04614EBFB0C0AAFEE9FF9847B6B09A77E1110
26,118,895 UART: Caliptra RT
26,119,612 UART: [state] CFI Enabled
26,282,943 UART: [rt] RT listening for mailbox commands...
26,284,803 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,314,571 UART: [rt]cmd =0x46504c54, len=4
26,316,177 >>> mbox cmd response data (8 bytes)
26,317,344 UART: [rt] FIPS self test
26,318,291 UART: [kat] ++
26,318,741 UART: [kat] sha1
26,323,086 UART: [kat] SHA2-256
26,325,031 UART: [kat] SHA2-384
26,328,052 UART: [kat] SHA2-512-ACC
26,330,362 UART: [kat] ECC-384
28,769,184 UART: [kat] HMAC-384Kdf
28,770,563 UART: Fatal Error: 0x90030001
28,805,959 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,950,409 >>> mbox cmd response: failed
28,951,085 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,095,225 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,437,631 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,740,112 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,565 UART:
192,923 UART: Running Caliptra ROM ...
194,109 UART:
603,721 UART: [state] CFI Enabled
618,332 UART: [state] LifecycleState = Unprovisioned
620,679 UART: [state] DebugLocked = No
622,349 UART: [state] WD Timer not started. Device not locked for debugging
627,814 UART: [kat] SHA2-256
817,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,496 UART: [kat] ++
829,022 UART: [kat] sha1
840,965 UART: [kat] SHA2-256
843,984 UART: [kat] SHA2-384
849,837 UART: [kat] SHA2-512-ACC
852,420 UART: [kat] ECC-384
3,290,129 UART: [kat] HMAC-384Kdf
3,303,566 UART: [kat] LMS
3,835,441 UART: [kat] --
3,839,862 UART: [cold-reset] ++
3,841,297 UART: [fht] FHT @ 0x50003400
3,851,993 UART: [idev] ++
3,852,721 UART: [idev] CDI.KEYID = 6
3,853,645 UART: [idev] SUBJECT.KEYID = 7
3,854,893 UART: [idev] UDS.KEYID = 0
3,855,822 ready_for_fw is high
3,856,037 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,000,524 UART: [idev] Erasing UDS.KEYID = 0
6,334,982 UART: [idev] Sha1 KeyId Algorithm
6,357,621 UART: [idev] --
6,362,796 UART: [ldev] ++
6,363,589 UART: [ldev] CDI.KEYID = 6
6,364,481 UART: [ldev] SUBJECT.KEYID = 5
6,365,587 UART: [ldev] AUTHORITY.KEYID = 7
6,366,822 UART: [ldev] FE.KEYID = 1
6,378,022 UART: [ldev] Erasing FE.KEYID = 1
8,853,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,687 UART: [ldev] --
10,647,956 UART: [fwproc] Wait for Commands...
10,650,117 UART: [fwproc] Recv command 0x46574c44
10,652,431 UART: [fwproc] Recv'd Img size: 114940 bytes
14,109,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,531 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,848,969 >>> mbox cmd response: success
14,853,001 UART: [afmc] ++
14,853,709 UART: [afmc] CDI.KEYID = 6
14,855,121 UART: [afmc] SUBJECT.KEYID = 7
14,856,323 UART: [afmc] AUTHORITY.KEYID = 5
17,360,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,736 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,759 UART: [afmc] --
19,159,055 UART: [cold-reset] --
19,161,726 UART: [state] Locking Datavault
19,168,757 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,886 UART: [state] Locking ICCM
19,172,748 UART: [exit] Launching FMC @ 0x40000130
19,181,388 UART:
19,181,644 UART: Running Caliptra FMC ...
19,182,670 UART:
19,182,815 UART: [state] CFI Enabled
19,191,087 UART: [fht] FMC Alias Private Key: 7
20,947,883 UART: [art] Extend RT PCRs Done
20,949,097 UART: [art] Lock RT PCRs Done
20,950,757 UART: [art] Populate DV Done
20,956,275 UART: [fht] FMC Alias Private Key: 7
20,957,974 UART: [art] Derive CDI
20,958,788 UART: [art] Store in in slot 0x4
21,001,271 UART: [art] Derive Key Pair
21,002,275 UART: [art] Store priv key in slot 0x5
23,429,552 UART: [art] Derive Key Pair - Done
23,442,488 UART: [art] Signing Cert with AUTHO
23,443,805 UART: RITY.KEYID = 7
25,149,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,832 UART: [art] PUB.X = 341B3A137A86262441DEB2558709FAD83C36054BFE00F41460D55F66E639C6254DC025DC2869F8A8EEA8A23C4A3582F1
25,158,088 UART: [art] PUB.Y = 48FF6283FE1FF13E5DA2AD0A822884DF55E8DDE919F447311FB52BDFC855B68A53C6E365E8FA114662F2056FF58A891F
25,165,409 UART: [art] SIG.R = F8E0654CA3A4CAAF1B78E355658C81A93ADC9F3B93B4FB229AA2ACD63DC3254F458441CBE979EA5E1747B25E9049F222
25,172,805 UART: [art] SIG.S = 6F168C86DC776064D3F885152E7F80D71F104DE151237CA712580921BE2F6C48BF09245449D6B793EC3903192DE84E0A
26,151,730 UART: Caliptra RT
26,152,430 UART: [state] CFI Enabled
26,269,333 UART: [rt] RT listening for mailbox commands...
26,271,180 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,943 UART: [rt]cmd =0x46504c54, len=4
26,302,498 >>> mbox cmd response data (8 bytes)
26,303,494 UART: [rt] FIPS self test
26,304,449 UART: [kat] ++
26,304,906 UART: [kat] sha1
26,309,363 UART: [kat] SHA2-256
26,311,295 UART: [kat] SHA2-384
26,314,415 UART: [kat] SHA2-512-ACC
26,316,718 UART: [kat] ECC-384
28,744,290 UART: [kat] HMAC-384Kdf
28,745,514 UART: Fatal Error: 0x90030001
28,780,846 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,925,068 >>> mbox cmd response: failed
28,925,746 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,070,016 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
190,098 UART:
190,393 UART: Running Caliptra ROM ...
191,632 UART:
11,457,117 UART: [state] CFI Enabled
11,469,821 UART: [state] LifecycleState = Unprovisioned
11,472,203 UART: [state] DebugLocked = No
11,474,838 UART: [state] WD Timer not started. Device not locked for debugging
11,478,698 UART: [kat] SHA2-256
11,668,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,679,373 UART: [kat] ++
11,679,973 UART: [kat] sha1
11,690,053 UART: [kat] SHA2-256
11,693,067 UART: [kat] SHA2-384
11,698,089 UART: [kat] SHA2-512-ACC
11,700,654 UART: [kat] ECC-384
14,142,018 UART: [kat] HMAC-384Kdf
14,155,328 UART: [kat] LMS
14,687,140 UART: [kat] --
14,692,586 UART: [cold-reset] ++
14,693,818 UART: [fht] FHT @ 0x50003400
14,705,765 UART: [idev] ++
14,706,440 UART: [idev] CDI.KEYID = 6
14,707,454 UART: [idev] SUBJECT.KEYID = 7
14,708,612 UART: [idev] UDS.KEYID = 0
14,710,161 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,854,877 UART: [idev] Erasing UDS.KEYID = 0
17,184,845 UART: [idev] Sha1 KeyId Algorithm
17,206,449 UART: [idev] --
17,210,169 UART: [ldev] ++
17,210,856 UART: [ldev] CDI.KEYID = 6
17,211,764 UART: [ldev] SUBJECT.KEYID = 5
17,212,922 UART: [ldev] AUTHORITY.KEYID = 7
17,214,147 UART: [ldev] FE.KEYID = 1
17,225,659 UART: [ldev] Erasing FE.KEYID = 1
19,709,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,428,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,443,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,459,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,474,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,494,610 UART: [ldev] --
21,500,740 UART: [fwproc] Wait for Commands...
21,503,394 UART: [fwproc] Recv command 0x46574c44
21,505,655 UART: [fwproc] Recv'd Img size: 114940 bytes
24,952,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,030,429 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,146,617 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,692,619 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,754,970 ready_for_fw is high
3,755,670 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,973,140 >>> mbox cmd response: success
19,225,748 UART:
19,226,141 UART: Running Caliptra FMC ...
19,227,263 UART:
19,227,421 UART: [state] CFI Enabled
19,235,522 UART: [fht] FMC Alias Private Key: 7
20,992,126 UART: [art] Extend RT PCRs Done
20,993,337 UART: [art] Lock RT PCRs Done
20,995,184 UART: [art] Populate DV Done
21,000,762 UART: [fht] FMC Alias Private Key: 7
21,002,474 UART: [art] Derive CDI
21,003,299 UART: [art] Store in in slot 0x4
21,045,739 UART: [art] Derive Key Pair
21,046,759 UART: [art] Store priv key in slot 0x5
23,473,158 UART: [art] Derive Key Pair - Done
23,486,111 UART: [art] Signing Cert with AUTHO
23,487,419 UART: RITY.KEYID = 7
25,193,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,915 UART: [art] PUB.X = E63982D163E70BC9D882894B8192186CD9F76D96FF03064B61ED9E891B84B18A254F5C1CB7EF362D0DD6B66D0F940A0D
25,202,213 UART: [art] PUB.Y = 04A23EC1762800A5C69FED543C55635C522E7B82AEFB350EA41A00E40496E86453805B58B3BDC9A23394DD021E12209D
25,209,387 UART: [art] SIG.R = 89CDFF5E78B45E96BFDAEC42C3861788AB86519A2E1A690CBCB58E9AD51C6B283F8493FEA56DA1F5B8DB32B82140CBEB
25,216,872 UART: [art] SIG.S = 3014D3AD14E06E5F04264DF8E662DB9CBD4CEC1AE37BB258F4ABB43C3CBE63013EB85B68FE91392562F0EF20DFF43506
26,195,898 UART: Caliptra RT
26,196,600 UART: [state] CFI Enabled
26,314,142 UART: [rt] RT listening for mailbox commands...
26,315,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,345,742 UART: [rt]cmd =0x46504c54, len=4
26,347,454 >>> mbox cmd response data (8 bytes)
26,348,768 UART: [rt] FIPS self test
26,349,728 UART: [kat] ++
26,350,181 UART: [kat] sha1
26,354,530 UART: [kat] SHA2-256
26,356,419 UART: [kat] SHA2-384
26,359,382 UART: [kat] SHA2-512-ACC
26,361,687 UART: [kat] ECC-384
28,789,120 UART: [kat] HMAC-384Kdf
28,790,273 UART: Fatal Error: 0x90030001
28,825,663 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,969,880 >>> mbox cmd response: failed
28,970,507 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,114,776 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
14,568,400 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,781,186 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
903,028 UART: [kat] HMAC-384Kdf
907,544 UART: [kat] LMS
1,475,740 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 ready_for_fw is high
1,481,107 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,092 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,642 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,415 UART: [ldev] Erasing FE.KEYID = 1
1,546,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,474 UART: [ldev] --
1,585,829 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114940 bytes
2,893,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,541 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,772 >>> mbox cmd response: success
3,087,936 UART: [afmc] ++
3,088,104 UART: [afmc] CDI.KEYID = 6
3,088,466 UART: [afmc] SUBJECT.KEYID = 7
3,088,891 UART: [afmc] AUTHORITY.KEYID = 5
3,123,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,682 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,567 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,257 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,028 UART: [afmc] --
3,167,158 UART: [cold-reset] --
3,167,870 UART: [state] Locking Datavault
3,169,001 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,605 UART: [state] Locking ICCM
3,170,121 UART: [exit] Launching FMC @ 0x40000130
3,175,450 UART:
3,175,466 UART: Running Caliptra FMC ...
3,175,874 UART:
3,175,928 UART: [state] CFI Enabled
3,186,173 UART: [fht] FMC Alias Private Key: 7
3,293,988 UART: [art] Extend RT PCRs Done
3,294,416 UART: [art] Lock RT PCRs Done
3,296,360 UART: [art] Populate DV Done
3,304,741 UART: [fht] FMC Alias Private Key: 7
3,305,697 UART: [art] Derive CDI
3,305,977 UART: [art] Store in in slot 0x4
3,391,756 UART: [art] Derive Key Pair
3,392,116 UART: [art] Store priv key in slot 0x5
3,405,442 UART: [art] Derive Key Pair - Done
3,420,217 UART: [art] Signing Cert with AUTHO
3,420,697 UART: RITY.KEYID = 7
3,435,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,730 UART: [art] PUB.X = 56B4C68B06DFD5D4295505A6F73C6984872ABD4E4CA8B14CE7BB2A6E67C32E599F2373E211D00FE5C84F6D29E926758C
3,443,499 UART: [art] PUB.Y = 286D14F19024540564C6005C492F1ABEBEC3976F167AF26257BFCFA751492CA63DEED384A67D38C68F9CCBA8A9FB5848
3,450,434 UART: [art] SIG.R = 57698EF8EA9BE5A23B69000E6863A027A1B11D535A74A3A9F6C0C4D61C292C3FDDC4D198555CE9629FBBC65F90AE3705
3,457,186 UART: [art] SIG.S = 5D0B70DC8F2469B68DA7DB2EFC70149B6E5DA6F774DBC98A8A928728D5B9A961015EEB9A740B701814F5735DA37E476D
3,481,018 UART: Caliptra RT
3,481,271 UART: [state] CFI Enabled
3,589,161 UART: [rt] RT listening for mailbox commands...
3,589,824 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,737 UART: [rt]cmd =0x46504c54, len=4
3,620,907 >>> mbox cmd response data (8 bytes)
3,621,248 UART: [rt] FIPS self test
3,621,576 UART: [kat] ++
3,621,728 UART: [kat] sha1
3,625,924 UART: [kat] SHA2-256
3,627,946 UART: [kat] SHA2-384
3,630,955 UART: [kat] SHA2-512-ACC
3,632,882 UART: [kat] ECC-384
3,642,900 UART: [kat] HMAC-384Kdf
3,644,148 UART: Fatal Error: 0x90030001
3,645,687 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,692 >>> mbox cmd response: failed
3,645,692 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,401 UART: [kat] SHA2-256
882,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,447 UART: [kat] ++
886,599 UART: [kat] sha1
890,887 UART: [kat] SHA2-256
892,825 UART: [kat] SHA2-384
895,492 UART: [kat] SHA2-512-ACC
897,393 UART: [kat] ECC-384
903,030 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,929 UART: [cold-reset] ++
1,477,321 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,000 UART: [idev] Erasing UDS.KEYID = 0
1,505,106 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,930 UART: [idev] --
1,515,053 UART: [ldev] ++
1,515,221 UART: [ldev] CDI.KEYID = 6
1,515,584 UART: [ldev] SUBJECT.KEYID = 5
1,516,010 UART: [ldev] AUTHORITY.KEYID = 7
1,516,473 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,546,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,152 UART: [ldev] --
1,585,525 UART: [fwproc] Waiting for Commands...
1,586,308 UART: [fwproc] Received command 0x46574c44
1,587,099 UART: [fwproc] Received Image of size 114940 bytes
2,892,455 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,063 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,904 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,899 ready_for_fw is high
1,362,899 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,168 >>> mbox cmd response: success
2,997,034 UART:
2,997,050 UART: Running Caliptra FMC ...
2,997,458 UART:
2,997,512 UART: [state] CFI Enabled
3,008,085 UART: [fht] FMC Alias Private Key: 7
3,115,884 UART: [art] Extend RT PCRs Done
3,116,312 UART: [art] Lock RT PCRs Done
3,117,880 UART: [art] Populate DV Done
3,125,925 UART: [fht] FMC Alias Private Key: 7
3,127,075 UART: [art] Derive CDI
3,127,355 UART: [art] Store in in slot 0x4
3,212,884 UART: [art] Derive Key Pair
3,213,244 UART: [art] Store priv key in slot 0x5
3,226,630 UART: [art] Derive Key Pair - Done
3,241,848 UART: [art] Signing Cert with AUTHO
3,242,328 UART: RITY.KEYID = 7
3,257,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,775 UART: [art] PUB.X = 37B6066E1A453B517269C9B1C7025BF957D76867E33BF8DA3564A7529528E287FB726808372207B3FE326C05E256453F
3,264,518 UART: [art] PUB.Y = 8A701B4D51F39F5464B3E858D9A7A630D4FAB4AAF6ACBD84685DB483042D79734948B868510A8383E7D64995D1436C69
3,271,460 UART: [art] SIG.R = 96C72E45278F281DA856224F35D896EF9ECEFBCA76CA880847E959B0FDCC1DB6E0EB7571919AC72DBC6B4A19505395FF
3,278,241 UART: [art] SIG.S = 437BC8887941EE68672861E98430176C2753421B67672215D849B79E2CD021C7056597EF38229DE23C96F2B0BD37689D
3,302,093 UART: Caliptra RT
3,302,346 UART: [state] CFI Enabled
3,411,003 UART: [rt] RT listening for mailbox commands...
3,411,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,377 UART: [rt]cmd =0x46504c54, len=4
3,442,557 >>> mbox cmd response data (8 bytes)
3,442,700 UART: [rt] FIPS self test
3,443,028 UART: [kat] ++
3,443,180 UART: [kat] sha1
3,447,262 UART: [kat] SHA2-256
3,449,284 UART: [kat] SHA2-384
3,452,131 UART: [kat] SHA2-512-ACC
3,454,058 UART: [kat] ECC-384
3,464,060 UART: [kat] HMAC-384Kdf
3,465,026 UART: Fatal Error: 0x90030001
3,466,565 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,466,570 >>> mbox cmd response: failed
3,466,570 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,466,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,121 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,308 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,924 UART: [kat] SHA2-256
882,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,970 UART: [kat] ++
887,122 UART: [kat] sha1
891,304 UART: [kat] SHA2-256
893,242 UART: [kat] SHA2-384
895,851 UART: [kat] SHA2-512-ACC
897,752 UART: [kat] ECC-384
903,673 UART: [kat] HMAC-384Kdf
908,317 UART: [kat] LMS
1,476,513 UART: [kat] --
1,477,400 UART: [cold-reset] ++
1,477,814 UART: [fht] Storing FHT @ 0x50003400
1,480,557 UART: [idev] ++
1,480,725 UART: [idev] CDI.KEYID = 6
1,481,085 UART: [idev] SUBJECT.KEYID = 7
1,481,509 UART: [idev] UDS.KEYID = 0
1,481,854 ready_for_fw is high
1,481,854 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,899 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,067 UART: [idev] --
1,516,026 UART: [ldev] ++
1,516,194 UART: [ldev] CDI.KEYID = 6
1,516,557 UART: [ldev] SUBJECT.KEYID = 5
1,516,983 UART: [ldev] AUTHORITY.KEYID = 7
1,517,446 UART: [ldev] FE.KEYID = 1
1,522,912 UART: [ldev] Erasing FE.KEYID = 1
1,548,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,355 UART: [ldev] --
1,587,790 UART: [fwproc] Waiting for Commands...
1,588,537 UART: [fwproc] Received command 0x46574c44
1,589,328 UART: [fwproc] Received Image of size 114940 bytes
2,894,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,072 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,939 >>> mbox cmd response: success
3,089,027 UART: [afmc] ++
3,089,195 UART: [afmc] CDI.KEYID = 6
3,089,557 UART: [afmc] SUBJECT.KEYID = 7
3,089,982 UART: [afmc] AUTHORITY.KEYID = 5
3,125,559 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,101 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,881 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,609 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,494 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,184 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,973 UART: [afmc] --
3,168,921 UART: [cold-reset] --
3,169,833 UART: [state] Locking Datavault
3,170,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,582 UART: [state] Locking ICCM
3,172,020 UART: [exit] Launching FMC @ 0x40000130
3,177,349 UART:
3,177,365 UART: Running Caliptra FMC ...
3,177,773 UART:
3,177,916 UART: [state] CFI Enabled
3,188,761 UART: [fht] FMC Alias Private Key: 7
3,296,900 UART: [art] Extend RT PCRs Done
3,297,328 UART: [art] Lock RT PCRs Done
3,298,638 UART: [art] Populate DV Done
3,306,907 UART: [fht] FMC Alias Private Key: 7
3,307,951 UART: [art] Derive CDI
3,308,231 UART: [art] Store in in slot 0x4
3,393,662 UART: [art] Derive Key Pair
3,394,022 UART: [art] Store priv key in slot 0x5
3,407,318 UART: [art] Derive Key Pair - Done
3,421,906 UART: [art] Signing Cert with AUTHO
3,422,386 UART: RITY.KEYID = 7
3,438,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,851 UART: [art] PUB.X = A87A62584C96199B7E72EA9DC1112CD9F4DBE13AE2582EB0917C937AD498938B1AC5DA628865D28EDB57913681115205
3,445,618 UART: [art] PUB.Y = 7A78C6185F92B9DE45C5C9042139AE67EE22720EB4BEFC88B24FBF8706995802D4163F86E1D5E70F0395603A42CDC98D
3,452,554 UART: [art] SIG.R = 25394DB1A0A4066B1C37BB2A03907D8786A0A597178EB1292F6D54CD01C8DA40A09AFBF0157ABDC7C8A40ACF83825B33
3,459,322 UART: [art] SIG.S = E01EBF4689DB46E5233CC9634CC3EB35F347C030C0685FCF77855EE87ABD05E0BADBFA875C1DC9A61D82B19DED9F86A5
3,483,156 UART: Caliptra RT
3,483,501 UART: [state] CFI Enabled
3,592,096 UART: [rt] RT listening for mailbox commands...
3,592,759 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,694 UART: [rt]cmd =0x46504c54, len=4
3,623,912 >>> mbox cmd response data (8 bytes)
3,624,155 UART: [rt] FIPS self test
3,624,483 UART: [kat] ++
3,624,635 UART: [kat] sha1
3,628,851 UART: [kat] SHA2-256
3,630,873 UART: [kat] SHA2-384
3,633,816 UART: [kat] SHA2-512-ACC
3,635,743 UART: [kat] ECC-384
3,646,031 UART: [kat] HMAC-384Kdf
3,646,935 UART: Fatal Error: 0x90030001
3,648,474 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,648,479 >>> mbox cmd response: failed
3,648,479 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,648,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,433 UART: [kat] SHA2-512-ACC
897,334 UART: [kat] ECC-384
903,227 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,748 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,069 UART: [idev] Erasing UDS.KEYID = 0
1,505,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,276 UART: [ldev] ++
1,515,444 UART: [ldev] CDI.KEYID = 6
1,515,807 UART: [ldev] SUBJECT.KEYID = 5
1,516,233 UART: [ldev] AUTHORITY.KEYID = 7
1,516,696 UART: [ldev] FE.KEYID = 1
1,521,916 UART: [ldev] Erasing FE.KEYID = 1
1,547,001 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,540 UART: [fwproc] Waiting for Commands...
1,587,277 UART: [fwproc] Received command 0x46574c44
1,588,068 UART: [fwproc] Received Image of size 114940 bytes
2,893,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,596 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,741 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,881 >>> mbox cmd response: success
2,999,085 UART:
2,999,101 UART: Running Caliptra FMC ...
2,999,509 UART:
2,999,652 UART: [state] CFI Enabled
3,010,283 UART: [fht] FMC Alias Private Key: 7
3,118,836 UART: [art] Extend RT PCRs Done
3,119,264 UART: [art] Lock RT PCRs Done
3,121,172 UART: [art] Populate DV Done
3,129,467 UART: [fht] FMC Alias Private Key: 7
3,130,503 UART: [art] Derive CDI
3,130,783 UART: [art] Store in in slot 0x4
3,216,306 UART: [art] Derive Key Pair
3,216,666 UART: [art] Store priv key in slot 0x5
3,229,962 UART: [art] Derive Key Pair - Done
3,244,498 UART: [art] Signing Cert with AUTHO
3,244,978 UART: RITY.KEYID = 7
3,259,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,713 UART: [art] PUB.X = A1C3276965FCF2317AD4B3AC3954BEAFFF4895F3430DFF314C42F2BCD3B8EEB6C9D50ED50A89769DF6822D354117AD71
3,267,490 UART: [art] PUB.Y = 0D7530E66B26B61269F0AF26C1DF0C39A4561D17A9FD05DE8F92552D100078F922F4A83152DAD50449AFF75630C5C6C0
3,274,408 UART: [art] SIG.R = 0187FE99F6BBD50231A012939DEF426519C48B0399A427D6984896788A262947E105E7915C51DEA06F5CDAD67CB39E9E
3,281,164 UART: [art] SIG.S = BBCB5AD2D12CD3D3739231F61321CEE03B317ACAF61F0C139CF2776B593FC317A40EB2C8F61C2CDA4B1407D16FE527FC
3,304,894 UART: Caliptra RT
3,305,239 UART: [state] CFI Enabled
3,413,178 UART: [rt] RT listening for mailbox commands...
3,413,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,612 UART: [rt]cmd =0x46504c54, len=4
3,444,788 >>> mbox cmd response data (8 bytes)
3,444,991 UART: [rt] FIPS self test
3,445,319 UART: [kat] ++
3,445,471 UART: [kat] sha1
3,449,749 UART: [kat] SHA2-256
3,451,771 UART: [kat] SHA2-384
3,454,556 UART: [kat] SHA2-512-ACC
3,456,483 UART: [kat] ECC-384
3,466,151 UART: [kat] HMAC-384Kdf
3,467,293 UART: Fatal Error: 0x90030001
3,468,832 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,468,837 >>> mbox cmd response: failed
3,468,837 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,468,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,786 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,849 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,222 UART: [kat] SHA2-256
892,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,997 UART: [kat] ++
897,149 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,392 UART: [kat] HMAC-384Kdf
921,914 UART: [kat] LMS
1,170,242 UART: [kat] --
1,171,269 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,348 UART: [idev] ++
1,174,516 UART: [idev] CDI.KEYID = 6
1,174,876 UART: [idev] SUBJECT.KEYID = 7
1,175,300 UART: [idev] UDS.KEYID = 0
1,175,645 ready_for_fw is high
1,175,645 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,200,709 UART: [idev] Sha1 KeyId Algorithm
1,209,125 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,514 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,693 UART: [ldev] Erasing FE.KEYID = 1
1,243,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,381 UART: [ldev] --
1,282,650 UART: [fwproc] Wait for Commands...
1,283,286 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,522 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,251 >>> mbox cmd response: success
2,783,373 UART: [afmc] ++
2,783,541 UART: [afmc] CDI.KEYID = 6
2,783,903 UART: [afmc] SUBJECT.KEYID = 7
2,784,328 UART: [afmc] AUTHORITY.KEYID = 5
2,819,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,100 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,432 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,340 UART: [afmc] --
2,862,356 UART: [cold-reset] --
2,863,062 UART: [state] Locking Datavault
2,864,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,953 UART: [state] Locking ICCM
2,865,421 UART: [exit] Launching FMC @ 0x40000130
2,870,750 UART:
2,870,766 UART: Running Caliptra FMC ...
2,871,174 UART:
2,871,228 UART: [state] CFI Enabled
2,881,775 UART: [fht] FMC Alias Private Key: 7
2,989,220 UART: [art] Extend RT PCRs Done
2,989,648 UART: [art] Lock RT PCRs Done
2,991,284 UART: [art] Populate DV Done
2,999,409 UART: [fht] FMC Alias Private Key: 7
3,000,541 UART: [art] Derive CDI
3,000,821 UART: [art] Store in in slot 0x4
3,086,570 UART: [art] Derive Key Pair
3,086,930 UART: [art] Store priv key in slot 0x5
3,100,638 UART: [art] Derive Key Pair - Done
3,115,193 UART: [art] Signing Cert with AUTHO
3,115,673 UART: RITY.KEYID = 7
3,130,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,686 UART: [art] PUB.X = 0C856DCA74BB424B4C8C482582162EBE58F117DC2A9C891E8AEE9F14595C8CF29ABFB43FF72122421ABF3EFEC1EE367B
3,138,473 UART: [art] PUB.Y = 6D5C1A202A44D8534F45B5465AFE1C586B3ED012C48428405B52618271B564DFB3B8D2F8FAD1D71DFE515941D12C3F2B
3,145,429 UART: [art] SIG.R = ED4867BDBFE4D2CFCCA0BBAB91BA83D8797A008B4ECA63E849CB5A65ED00BA91E80E88FBF7B789D3E459F5440F201965
3,152,173 UART: [art] SIG.S = 6B9D67A4759F8DD4BBFDA315119ED0AC3EBFD0D170DA3919C712ABCF377374727CEC895F416C4439197A366E59EB68D5
3,176,412 UART: Caliptra RT
3,176,665 UART: [state] CFI Enabled
3,284,666 UART: [rt] RT listening for mailbox commands...
3,285,329 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,448 UART: [rt]cmd =0x46504c54, len=4
3,316,604 >>> mbox cmd response data (8 bytes)
3,316,729 UART: [rt] FIPS self test
3,317,057 UART: [kat] ++
3,317,209 UART: [kat] sha1
3,321,269 UART: [kat] SHA2-256
3,323,291 UART: [kat] SHA2-384
3,326,278 UART: [kat] SHA2-512-ACC
3,328,205 UART: [kat] ECC-384
3,338,431 UART: [kat] HMAC-384Kdf
3,339,495 UART: Fatal Error: 0x90030001
3,341,034 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,341,039 >>> mbox cmd response: failed
3,341,039 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,341,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,744 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,557 UART: [cold-reset] ++
1,171,891 UART: [fht] FHT @ 0x50003400
1,174,708 UART: [idev] ++
1,174,876 UART: [idev] CDI.KEYID = 6
1,175,236 UART: [idev] SUBJECT.KEYID = 7
1,175,660 UART: [idev] UDS.KEYID = 0
1,176,005 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,529 UART: [idev] Sha1 KeyId Algorithm
1,208,931 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,384 UART: [ldev] SUBJECT.KEYID = 5
1,210,810 UART: [ldev] AUTHORITY.KEYID = 7
1,211,273 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,427 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,520 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,339 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 ready_for_fw is high
1,060,191 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,532 >>> mbox cmd response: success
2,697,220 UART:
2,697,236 UART: Running Caliptra FMC ...
2,697,644 UART:
2,697,698 UART: [state] CFI Enabled
2,708,585 UART: [fht] FMC Alias Private Key: 7
2,816,404 UART: [art] Extend RT PCRs Done
2,816,832 UART: [art] Lock RT PCRs Done
2,818,634 UART: [art] Populate DV Done
2,827,025 UART: [fht] FMC Alias Private Key: 7
2,828,003 UART: [art] Derive CDI
2,828,283 UART: [art] Store in in slot 0x4
2,913,586 UART: [art] Derive Key Pair
2,913,946 UART: [art] Store priv key in slot 0x5
2,927,462 UART: [art] Derive Key Pair - Done
2,942,211 UART: [art] Signing Cert with AUTHO
2,942,691 UART: RITY.KEYID = 7
2,958,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,892 UART: [art] PUB.X = 3CD0334721DD367297C7F0A4B0CE0BEF6782FA2753930835022134882A1992FAFB567F2B1FBF608063FB1218681BB8F7
2,965,651 UART: [art] PUB.Y = 6C89CD45AB0AF967DD23C12AB5302C8B376B19A92C5AB66ADA6ABF0740B42AC86E11AB25C4C93A2D195AC2CB0B5EBC3E
2,972,618 UART: [art] SIG.R = 41861F15CEA5F40BBB3A8E2002D51BB5F028165E2B1AF062FF2F42189EA96696B95DF6D96E0F2CA35B0ADAE11857C646
2,979,388 UART: [art] SIG.S = 8403118FC814F44724E2CF6830E2B74B206AEBFC35E81611F6CCF565160F7DF2CD10FDDB0D1313A742732B6010FE83CD
3,003,212 UART: Caliptra RT
3,003,465 UART: [state] CFI Enabled
3,111,322 UART: [rt] RT listening for mailbox commands...
3,111,985 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,050 UART: [rt]cmd =0x46504c54, len=4
3,142,982 >>> mbox cmd response data (8 bytes)
3,143,309 UART: [rt] FIPS self test
3,143,637 UART: [kat] ++
3,143,789 UART: [kat] sha1
3,148,145 UART: [kat] SHA2-256
3,150,167 UART: [kat] SHA2-384
3,152,990 UART: [kat] SHA2-512-ACC
3,154,917 UART: [kat] ECC-384
3,164,719 UART: [kat] HMAC-384Kdf
3,165,707 UART: Fatal Error: 0x90030001
3,167,246 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,251 >>> mbox cmd response: failed
3,167,251 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,133 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,946 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,479 UART: [kat] SHA2-512-ACC
908,380 UART: [kat] ECC-384
918,089 UART: [kat] HMAC-384Kdf
922,659 UART: [kat] LMS
1,170,987 UART: [kat] --
1,171,800 UART: [cold-reset] ++
1,172,244 UART: [fht] FHT @ 0x50003400
1,174,797 UART: [idev] ++
1,174,965 UART: [idev] CDI.KEYID = 6
1,175,325 UART: [idev] SUBJECT.KEYID = 7
1,175,749 UART: [idev] UDS.KEYID = 0
1,176,094 ready_for_fw is high
1,176,094 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,679 UART: [idev] Erasing UDS.KEYID = 0
1,200,840 UART: [idev] Sha1 KeyId Algorithm
1,209,372 UART: [idev] --
1,210,358 UART: [ldev] ++
1,210,526 UART: [ldev] CDI.KEYID = 6
1,210,889 UART: [ldev] SUBJECT.KEYID = 5
1,211,315 UART: [ldev] AUTHORITY.KEYID = 7
1,211,778 UART: [ldev] FE.KEYID = 1
1,216,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,490 UART: [ldev] --
1,282,923 UART: [fwproc] Wait for Commands...
1,283,727 UART: [fwproc] Recv command 0x46574c44
1,284,455 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,095 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,399 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,086 >>> mbox cmd response: success
2,782,188 UART: [afmc] ++
2,782,356 UART: [afmc] CDI.KEYID = 6
2,782,718 UART: [afmc] SUBJECT.KEYID = 7
2,783,143 UART: [afmc] AUTHORITY.KEYID = 5
2,818,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,381 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,713 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,525 UART: [afmc] --
2,861,487 UART: [cold-reset] --
2,862,267 UART: [state] Locking Datavault
2,863,490 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,094 UART: [state] Locking ICCM
2,864,690 UART: [exit] Launching FMC @ 0x40000130
2,870,019 UART:
2,870,035 UART: Running Caliptra FMC ...
2,870,443 UART:
2,870,586 UART: [state] CFI Enabled
2,881,113 UART: [fht] FMC Alias Private Key: 7
2,989,266 UART: [art] Extend RT PCRs Done
2,989,694 UART: [art] Lock RT PCRs Done
2,991,472 UART: [art] Populate DV Done
2,999,549 UART: [fht] FMC Alias Private Key: 7
3,000,731 UART: [art] Derive CDI
3,001,011 UART: [art] Store in in slot 0x4
3,086,844 UART: [art] Derive Key Pair
3,087,204 UART: [art] Store priv key in slot 0x5
3,100,774 UART: [art] Derive Key Pair - Done
3,115,848 UART: [art] Signing Cert with AUTHO
3,116,328 UART: RITY.KEYID = 7
3,131,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,045 UART: [art] PUB.X = C09D0056A596A559793385BBC2FF63B76F65A6BCFD24CAFC20772D703E9FAB5924340886CE47FF593E3B314D5B7EF8B8
3,138,800 UART: [art] PUB.Y = 3979A9E9CC472173DAA4B19CEBA628231722C238F0A295FFE6453FEBCE60397177298A25BE8D63A01C50B41CA143B350
3,145,754 UART: [art] SIG.R = DD8E473AE1ED690D29509BAAED30363E5854CB1EECAA93F7E9E851AB3CABCADB6BE4E9504D9A921EF238AF170254F49D
3,152,544 UART: [art] SIG.S = 0168C648BDDDDFA8841E7438145170EA3682B714A9B52B3575139CE01BE5F62340DB4F84F3F4A3BC7B99306D0BEEBF4B
3,176,827 UART: Caliptra RT
3,177,172 UART: [state] CFI Enabled
3,284,319 UART: [rt] RT listening for mailbox commands...
3,284,982 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,681 UART: [rt]cmd =0x46504c54, len=4
3,316,013 >>> mbox cmd response data (8 bytes)
3,316,140 UART: [rt] FIPS self test
3,316,468 UART: [kat] ++
3,316,620 UART: [kat] sha1
3,320,792 UART: [kat] SHA2-256
3,322,814 UART: [kat] SHA2-384
3,325,625 UART: [kat] SHA2-512-ACC
3,327,552 UART: [kat] ECC-384
3,337,848 UART: [kat] HMAC-384Kdf
3,338,876 UART: Fatal Error: 0x90030001
3,340,415 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,420 >>> mbox cmd response: failed
3,340,420 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
893,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,948 UART: [kat] ++
898,100 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,147 UART: [kat] SHA2-512-ACC
909,048 UART: [kat] ECC-384
918,897 UART: [kat] HMAC-384Kdf
923,395 UART: [kat] LMS
1,171,723 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,429 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,652 UART: [ldev] ++
1,210,820 UART: [ldev] CDI.KEYID = 6
1,211,183 UART: [ldev] SUBJECT.KEYID = 5
1,211,609 UART: [ldev] AUTHORITY.KEYID = 7
1,212,072 UART: [ldev] FE.KEYID = 1
1,217,320 UART: [ldev] Erasing FE.KEYID = 1
1,243,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,702 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,773 UART: [fwproc] Recv command 0x46574c44
1,284,501 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,947 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,658 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 ready_for_fw is high
1,060,748 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,631 >>> mbox cmd response: success
2,698,797 UART:
2,698,813 UART: Running Caliptra FMC ...
2,699,221 UART:
2,699,364 UART: [state] CFI Enabled
2,709,685 UART: [fht] FMC Alias Private Key: 7
2,817,802 UART: [art] Extend RT PCRs Done
2,818,230 UART: [art] Lock RT PCRs Done
2,819,746 UART: [art] Populate DV Done
2,828,143 UART: [fht] FMC Alias Private Key: 7
2,829,261 UART: [art] Derive CDI
2,829,541 UART: [art] Store in in slot 0x4
2,915,072 UART: [art] Derive Key Pair
2,915,432 UART: [art] Store priv key in slot 0x5
2,929,076 UART: [art] Derive Key Pair - Done
2,943,995 UART: [art] Signing Cert with AUTHO
2,944,475 UART: RITY.KEYID = 7
2,959,203 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,968 UART: [art] PUB.X = E1C7F0B5E6B2AC51047AF20E00174B5FC753EEFB7332AD40DCB40B9B697A19DDCD84AC8442F1F721CF6C559EEDB3B719
2,966,729 UART: [art] PUB.Y = BF8AEBB2D49FF10E1FFEAAE57A6DBB3D39CDBB2001174F14316B45CC1F4884FE8EB6984C55EFE33729BB555D94025BF2
2,973,694 UART: [art] SIG.R = 433985F802F9466D91E3359BDE0CBDE5ACFE0D500321391CFF8C19AD059A973EA97593FEC87B2E549D108FD7292E2C6D
2,980,459 UART: [art] SIG.S = 4F31EFAD62600928E5DBEB8C11D038B50DF12623BCFF3C5AD8514DC25CAAF16AC7FC7DD539AF958328881BA4DF0CF80B
3,003,792 UART: Caliptra RT
3,004,137 UART: [state] CFI Enabled
3,111,158 UART: [rt] RT listening for mailbox commands...
3,111,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,602 UART: [rt]cmd =0x46504c54, len=4
3,142,820 >>> mbox cmd response data (8 bytes)
3,143,159 UART: [rt] FIPS self test
3,143,487 UART: [kat] ++
3,143,639 UART: [kat] sha1
3,147,683 UART: [kat] SHA2-256
3,149,705 UART: [kat] SHA2-384
3,152,666 UART: [kat] SHA2-512-ACC
3,154,593 UART: [kat] ECC-384
3,164,871 UART: [kat] HMAC-384Kdf
3,165,971 UART: Fatal Error: 0x90030001
3,167,510 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,515 >>> mbox cmd response: failed
3,167,515 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,968 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,903 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,338 UART: [kat] LMS
1,168,650 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,751 UART: [fht] FHT @ 0x50003400
1,172,465 UART: [idev] ++
1,172,633 UART: [idev] CDI.KEYID = 6
1,172,994 UART: [idev] SUBJECT.KEYID = 7
1,173,419 UART: [idev] UDS.KEYID = 0
1,173,765 ready_for_fw is high
1,173,765 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,288 UART: [ldev] ++
1,208,456 UART: [ldev] CDI.KEYID = 6
1,208,820 UART: [ldev] SUBJECT.KEYID = 5
1,209,247 UART: [ldev] AUTHORITY.KEYID = 7
1,209,710 UART: [ldev] FE.KEYID = 1
1,214,936 UART: [ldev] Erasing FE.KEYID = 1
1,241,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,799 UART: [fwproc] Recv command 0x46574c44
1,282,532 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,411 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,023 >>> mbox cmd response: success
2,782,292 UART: [afmc] ++
2,782,460 UART: [afmc] CDI.KEYID = 6
2,782,823 UART: [afmc] SUBJECT.KEYID = 7
2,783,249 UART: [afmc] AUTHORITY.KEYID = 5
2,819,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,045 UART: [afmc] --
2,862,077 UART: [cold-reset] --
2,863,039 UART: [state] Locking Datavault
2,863,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,584 UART: [state] Locking ICCM
2,865,168 UART: [exit] Launching FMC @ 0x40000130
2,870,497 UART:
2,870,513 UART: Running Caliptra FMC ...
2,870,921 UART:
2,870,975 UART: [state] CFI Enabled
2,881,388 UART: [fht] FMC Alias Private Key: 7
2,989,303 UART: [art] Extend RT PCRs Done
2,989,731 UART: [art] Lock RT PCRs Done
2,991,457 UART: [art] Populate DV Done
2,999,828 UART: [fht] FMC Alias Private Key: 7
3,000,920 UART: [art] Derive CDI
3,001,200 UART: [art] Store in in slot 0x4
3,086,869 UART: [art] Derive Key Pair
3,087,229 UART: [art] Store priv key in slot 0x5
3,100,251 UART: [art] Derive Key Pair - Done
3,115,081 UART: [art] Signing Cert with AUTHO
3,115,561 UART: RITY.KEYID = 7
3,130,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,462 UART: [art] PUB.X = A9968FCC7F1C312A23396C9CD20A255478CF61C4ACBB89CE9FCC5AF3FDCF7EB45CA6D2266D991D6E3EFE54800D99ED8C
3,138,252 UART: [art] PUB.Y = 1C0432945C0CD3B3B2F59FE93A22061B7428E74F1256C1F56F93D91069B291FAD3BB90ED158E73403860E1744421FAAF
3,145,193 UART: [art] SIG.R = 4EFE13777FC60E23F0FA8F513F35964FFAC31C8C41EA2FDB0C0B3ACC721DC5DA3C982CA95AFAD777071236C355862F83
3,151,969 UART: [art] SIG.S = 22CDA5BD2DD35AEE43FEACD6F7C782320A1721238CA6CC53F7E13C360916FA7C4F657F26B111726955BB32B16D17034D
3,175,417 UART: Caliptra RT
3,175,670 UART: [state] CFI Enabled
3,283,553 UART: [rt] RT listening for mailbox commands...
3,284,216 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,427 UART: [rt]cmd =0x46504c54, len=4
3,315,537 >>> mbox cmd response data (8 bytes)
3,315,820 UART: [rt] FIPS self test
3,316,148 UART: [kat] ++
3,316,300 UART: [kat] sha1
3,320,584 UART: [kat] SHA2-256
3,322,606 UART: [kat] SHA2-384
3,325,387 UART: [kat] SHA2-512-ACC
3,327,314 UART: [kat] ECC-384
3,337,234 UART: [kat] HMAC-384Kdf
3,338,168 UART: Fatal Error: 0x90030001
3,339,707 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,339,712 >>> mbox cmd response: failed
3,339,712 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,339,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,512 UART: [state] LifecycleState = Unprovisioned
85,167 UART: [state] DebugLocked = No
85,813 UART: [state] WD Timer not started. Device not locked for debugging
87,164 UART: [kat] SHA2-256
890,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,843 UART: [kat] ++
894,995 UART: [kat] sha1
899,067 UART: [kat] SHA2-256
901,007 UART: [kat] SHA2-384
903,808 UART: [kat] SHA2-512-ACC
905,709 UART: [kat] ECC-384
915,274 UART: [kat] HMAC-384Kdf
919,960 UART: [kat] LMS
1,168,272 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,609 UART: [fht] FHT @ 0x50003400
1,172,283 UART: [idev] ++
1,172,451 UART: [idev] CDI.KEYID = 6
1,172,812 UART: [idev] SUBJECT.KEYID = 7
1,173,237 UART: [idev] UDS.KEYID = 0
1,173,583 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,351 UART: [idev] Erasing UDS.KEYID = 0
1,198,353 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,240,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,204 UART: [ldev] --
1,279,670 UART: [fwproc] Wait for Commands...
1,280,425 UART: [fwproc] Recv command 0x46574c44
1,281,158 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,067 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,829 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,230 ready_for_fw is high
1,056,230 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,701 >>> mbox cmd response: success
2,691,847 UART:
2,691,863 UART: Running Caliptra FMC ...
2,692,271 UART:
2,692,325 UART: [state] CFI Enabled
2,702,420 UART: [fht] FMC Alias Private Key: 7
2,810,897 UART: [art] Extend RT PCRs Done
2,811,325 UART: [art] Lock RT PCRs Done
2,812,969 UART: [art] Populate DV Done
2,821,310 UART: [fht] FMC Alias Private Key: 7
2,822,488 UART: [art] Derive CDI
2,822,768 UART: [art] Store in in slot 0x4
2,908,803 UART: [art] Derive Key Pair
2,909,163 UART: [art] Store priv key in slot 0x5
2,921,859 UART: [art] Derive Key Pair - Done
2,936,244 UART: [art] Signing Cert with AUTHO
2,936,724 UART: RITY.KEYID = 7
2,951,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,565 UART: [art] PUB.X = C47CA2A91EC1E3530911916DAB47CE877240579DD13467D80DF64E0D38FD42A5A7FE4DB0CE66AAAD0932694C886BA614
2,959,333 UART: [art] PUB.Y = AFD0ADA0B11A31DDE55C659BA01C4118516862549FBC50B75558EDD9B045052F811042D52F4CED460E393923C734066D
2,966,276 UART: [art] SIG.R = E8541C1D56154F6B08208F9F971A248842FE4EE6707ACB5272A9DC35B0CFA8B5BA4CA8B75FFB630AA705812911D6417A
2,973,045 UART: [art] SIG.S = 110454D1A721CB893B30A2A31810F8204156AB72C1596F6E43C8457AED8FC7DEC283ACD9C37CBC633348FDD9CDE8A3DC
2,997,055 UART: Caliptra RT
2,997,308 UART: [state] CFI Enabled
3,105,119 UART: [rt] RT listening for mailbox commands...
3,105,782 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,421 UART: [rt]cmd =0x46504c54, len=4
3,136,401 >>> mbox cmd response data (8 bytes)
3,136,704 UART: [rt] FIPS self test
3,137,032 UART: [kat] ++
3,137,184 UART: [kat] sha1
3,141,282 UART: [kat] SHA2-256
3,143,304 UART: [kat] SHA2-384
3,145,969 UART: [kat] SHA2-512-ACC
3,147,896 UART: [kat] ECC-384
3,157,936 UART: [kat] HMAC-384Kdf
3,159,050 UART: Fatal Error: 0x90030001
3,160,589 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,594 >>> mbox cmd response: failed
3,160,594 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,160,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,911 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,766 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,173,960 ready_for_fw is high
1,173,960 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,199,006 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,829 UART: [ldev] ++
1,208,997 UART: [ldev] CDI.KEYID = 6
1,209,361 UART: [ldev] SUBJECT.KEYID = 5
1,209,788 UART: [ldev] AUTHORITY.KEYID = 7
1,210,251 UART: [ldev] FE.KEYID = 1
1,215,479 UART: [ldev] Erasing FE.KEYID = 1
1,241,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,603 UART: [ldev] --
1,281,007 UART: [fwproc] Wait for Commands...
1,281,818 UART: [fwproc] Recv command 0x46574c44
1,282,551 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,164 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,856 >>> mbox cmd response: success
2,781,897 UART: [afmc] ++
2,782,065 UART: [afmc] CDI.KEYID = 6
2,782,428 UART: [afmc] SUBJECT.KEYID = 7
2,782,854 UART: [afmc] AUTHORITY.KEYID = 5
2,818,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,818 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,149 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,072 UART: [afmc] --
2,862,082 UART: [cold-reset] --
2,862,794 UART: [state] Locking Datavault
2,863,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,559 UART: [state] Locking ICCM
2,865,139 UART: [exit] Launching FMC @ 0x40000130
2,870,468 UART:
2,870,484 UART: Running Caliptra FMC ...
2,870,892 UART:
2,871,035 UART: [state] CFI Enabled
2,881,280 UART: [fht] FMC Alias Private Key: 7
2,989,457 UART: [art] Extend RT PCRs Done
2,989,885 UART: [art] Lock RT PCRs Done
2,991,487 UART: [art] Populate DV Done
2,999,768 UART: [fht] FMC Alias Private Key: 7
3,000,936 UART: [art] Derive CDI
3,001,216 UART: [art] Store in in slot 0x4
3,086,597 UART: [art] Derive Key Pair
3,086,957 UART: [art] Store priv key in slot 0x5
3,100,265 UART: [art] Derive Key Pair - Done
3,115,082 UART: [art] Signing Cert with AUTHO
3,115,562 UART: RITY.KEYID = 7
3,130,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,747 UART: [art] PUB.X = AECC419D9EA47B55B85190C66752BF1154AE1A15E67BA0AC0457A5D00A12EC76B9D89A6D63AC6D0E5D14E2D88B7BEAC4
3,138,528 UART: [art] PUB.Y = 794E6A638EDF325D72B416206253FAAC816735A53A54B2B4B2A87A7E7509D53FA1ECD5FD6DEBC7E8291F95D1F2C36120
3,145,485 UART: [art] SIG.R = 4FB46464521102222D81CEF9C5AE4D699553BFC4509272BD89818DFC495AAA46804D5197CC8315690B38674655083748
3,152,234 UART: [art] SIG.S = 39EE7A104322D6C4BB084C313C9E46C1D5000DD5346393B49C8823E1F8E3BCA98AFB28794C16569D83D7DA6804885550
3,176,146 UART: Caliptra RT
3,176,491 UART: [state] CFI Enabled
3,284,178 UART: [rt] RT listening for mailbox commands...
3,284,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,772 UART: [rt]cmd =0x46504c54, len=4
3,315,964 >>> mbox cmd response data (8 bytes)
3,316,229 UART: [rt] FIPS self test
3,316,557 UART: [kat] ++
3,316,709 UART: [kat] sha1
3,320,993 UART: [kat] SHA2-256
3,323,015 UART: [kat] SHA2-384
3,325,914 UART: [kat] SHA2-512-ACC
3,327,841 UART: [kat] ECC-384
3,337,905 UART: [kat] HMAC-384Kdf
3,338,969 UART: Fatal Error: 0x90030001
3,340,508 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,513 >>> mbox cmd response: failed
3,340,513 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,340,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,112 UART: [idev] Sha1 KeyId Algorithm
1,207,838 UART: [idev] --
1,208,893 UART: [ldev] ++
1,209,061 UART: [ldev] CDI.KEYID = 6
1,209,425 UART: [ldev] SUBJECT.KEYID = 5
1,209,852 UART: [ldev] AUTHORITY.KEYID = 7
1,210,315 UART: [ldev] FE.KEYID = 1
1,215,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,687 UART: [fwproc] Wait for Commands...
1,282,508 UART: [fwproc] Recv command 0x46574c44
1,283,241 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,200 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,008 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,347 ready_for_fw is high
1,056,347 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,686 >>> mbox cmd response: success
2,693,358 UART:
2,693,374 UART: Running Caliptra FMC ...
2,693,782 UART:
2,693,925 UART: [state] CFI Enabled
2,704,046 UART: [fht] FMC Alias Private Key: 7
2,811,893 UART: [art] Extend RT PCRs Done
2,812,321 UART: [art] Lock RT PCRs Done
2,813,825 UART: [art] Populate DV Done
2,822,218 UART: [fht] FMC Alias Private Key: 7
2,823,310 UART: [art] Derive CDI
2,823,590 UART: [art] Store in in slot 0x4
2,908,707 UART: [art] Derive Key Pair
2,909,067 UART: [art] Store priv key in slot 0x5
2,922,629 UART: [art] Derive Key Pair - Done
2,937,470 UART: [art] Signing Cert with AUTHO
2,937,950 UART: RITY.KEYID = 7
2,953,206 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,971 UART: [art] PUB.X = 70F03E9065B1AE227559EE1F1CD915C0BC8E4ACACCAF0AD200D8CD553456525D0D1C70BB14AA8FABBFE16B1E3B09F859
2,960,734 UART: [art] PUB.Y = 213C85E0CF39E3573B406AB06E8348456F8F5E9FBD00B747E934562ADAFAC152529775A27EB4354454D8DFB1A53F6284
2,967,664 UART: [art] SIG.R = BF0FAE55CA8EF9EB06A99048B432007FB470C2270F319A792A73F80CB94F338B492466D1252B93B8A1C48AF3E08BA91E
2,974,408 UART: [art] SIG.S = 5E430168FA866447C07E5CA129C538CB3E6CD411D3AD3739E0D1D7B06C8FE060542635CDE641804BCE57D7AA6F944563
2,998,134 UART: Caliptra RT
2,998,479 UART: [state] CFI Enabled
3,107,080 UART: [rt] RT listening for mailbox commands...
3,107,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,666 UART: [rt]cmd =0x46504c54, len=4
3,138,750 >>> mbox cmd response data (8 bytes)
3,138,905 UART: [rt] FIPS self test
3,139,233 UART: [kat] ++
3,139,385 UART: [kat] sha1
3,143,749 UART: [kat] SHA2-256
3,145,771 UART: [kat] SHA2-384
3,148,454 UART: [kat] SHA2-512-ACC
3,150,381 UART: [kat] ECC-384
3,160,221 UART: [kat] HMAC-384Kdf
3,161,189 UART: Fatal Error: 0x90030001
3,162,728 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,162,733 >>> mbox cmd response: failed
3,162,733 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,162,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,173 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,814 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
6,008,886 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,152,652 >>> mbox cmd response: failed
6,153,216 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,296,091 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,869,804 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,440,515 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
6,003,205 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,147,397 >>> mbox cmd response: failed
6,147,976 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,290,876 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,855,899 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,436,633 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
6,310,919 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,454,707 >>> mbox cmd response: failed
6,455,277 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,598,119 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
18,451,764 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,886,846 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
6,305,255 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,449,118 >>> mbox cmd response: failed
6,449,687 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
6,592,436 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
18,456,900 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
31,897,798 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
5,172,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,316,616 >>> mbox cmd response: failed
5,317,166 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,460,794 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,434,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,795 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,208,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,352,228 >>> mbox cmd response: failed
5,352,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,496,069 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,467,356 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,297,020 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
5,516,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,660,701 >>> mbox cmd response: failed
5,661,274 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,804,522 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
17,838,300 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,557,347 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
5,517,601 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,662,009 >>> mbox cmd response: failed
5,662,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,805,757 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,843,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,576,561 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,187,027 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,331,239 >>> mbox cmd response: failed
5,331,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,474,932 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,442,589 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,790 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
5,189,994 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,334,190 >>> mbox cmd response: failed
5,334,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,477,908 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,421,694 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,278,660 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
5,512,920 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,657,318 >>> mbox cmd response: failed
5,657,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,801,696 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,835,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,568,489 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,486 writing to cptra_bootfsm_go
5,511,733 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,655,763 >>> mbox cmd response: failed
5,656,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,799,588 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
17,853,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,578,122 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,830 >>> mbox cmd response: failed
827,830 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,239 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,154 >>> mbox cmd response: failed
827,154 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,653 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,011 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,711 >>> mbox cmd response: failed
827,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,590 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,202 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,677 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,685 >>> mbox cmd response: failed
827,685 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,078 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,816 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
826,666 >>> mbox cmd response: failed
826,666 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
826,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,295 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,600 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,608 >>> mbox cmd response: failed
827,608 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,015 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,951 >>> mbox cmd response: failed
827,951 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,450 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,906 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
828,187 >>> mbox cmd response: failed
828,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
828,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,268 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,376 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,384 >>> mbox cmd response: failed
827,384 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,271 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,142 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,150 >>> mbox cmd response: failed
827,150 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,505 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,025 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
828,033 >>> mbox cmd response: failed
828,033 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
828,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,268 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,884 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,759 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,767 >>> mbox cmd response: failed
827,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
827,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,730 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,900 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,040 UART:
192,414 UART: Running Caliptra ROM ...
193,511 UART:
193,653 UART: [state] CFI Enabled
265,923 UART: [state] LifecycleState = Unprovisioned
267,847 UART: [state] DebugLocked = No
269,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,267 UART: [kat] SHA2-256
444,953 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,429 UART: [kat] ++
455,957 UART: [kat] sha1
465,837 UART: [kat] SHA2-256
468,495 UART: [kat] SHA2-384
475,058 UART: [kat] SHA2-512-ACC
477,431 UART: [kat] ECC-384
2,769,285 UART: [kat] HMAC-384Kdf
2,799,501 UART: [kat] LMS
3,989,774 UART: [kat] --
3,993,507 UART: [cold-reset] ++
3,995,228 UART: [fht] Storing FHT @ 0x50003400
4,006,710 UART: [idev] ++
4,007,290 UART: [idev] CDI.KEYID = 6
4,008,175 UART: [idev] SUBJECT.KEYID = 7
4,009,522 UART: [idev] UDS.KEYID = 0
4,010,489 ready_for_fw is high
4,010,687 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,154,880 UART: [idev] Erasing UDS.KEYID = 0
7,350,947 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,479 UART: [idev] --
7,376,345 UART: [ldev] ++
7,376,974 UART: [ldev] CDI.KEYID = 6
7,377,885 UART: [ldev] SUBJECT.KEYID = 5
7,379,105 UART: [ldev] AUTHORITY.KEYID = 7
7,380,402 UART: [ldev] FE.KEYID = 1
7,424,002 UART: [ldev] Erasing FE.KEYID = 1
10,757,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,739 UART: [ldev] --
13,118,630 UART: [fwproc] Waiting for Commands...
13,121,750 UART: [fwproc] Received command 0x46574c44
13,123,935 UART: [fwproc] Received Image of size 114632 bytes
17,189,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,954 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,827 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,653,350 >>> mbox cmd response: success
17,657,677 UART: [afmc] ++
17,658,284 UART: [afmc] CDI.KEYID = 6
17,659,360 UART: [afmc] SUBJECT.KEYID = 7
17,660,473 UART: [afmc] AUTHORITY.KEYID = 5
21,031,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,804 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,349,266 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,364,087 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,523 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,400,197 UART: [afmc] --
23,404,663 UART: [cold-reset] --
23,408,731 UART: [state] Locking Datavault
23,414,204 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,959 UART: [state] Locking ICCM
23,417,624 UART: [exit] Launching FMC @ 0x40000130
23,426,022 UART:
23,426,268 UART: Running Caliptra FMC ...
23,427,376 UART:
23,427,541 UART: [state] CFI Enabled
23,493,696 UART: [fht] FMC Alias Private Key: 7
25,831,400 UART: [art] Extend RT PCRs Done
25,832,617 UART: [art] Lock RT PCRs Done
25,834,210 UART: [art] Populate DV Done
25,840,002 UART: [fht] FMC Alias Private Key: 7
25,841,545 UART: [art] Derive CDI
25,842,360 UART: [art] Store in in slot 0x4
25,901,959 UART: [art] Derive Key Pair
25,903,003 UART: [art] Store priv key in slot 0x5
29,195,512 UART: [art] Derive Key Pair - Done
29,208,756 UART: [art] Signing Cert with AUTHO
29,210,063 UART: RITY.KEYID = 7
31,497,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,498,916 UART: [art] PUB.X = 0B146DA9532CA2AFE822821C4620D0D3AC9B564599478C03DD71F27323E0DB26296A4C1C0DE3B41AD120C7600876C644
31,506,130 UART: [art] PUB.Y = 496ED83C78BE431C7E4027609B349EFF0C1AA2B0DAF0DC9342ABE7050F4496F54A6295870AF3126A1DDD33F0DF48FEFA
31,513,380 UART: [art] SIG.R = 67B0510A1D34DA81F3A794DB038AC7D0532D884A2912E82AB9FC774EF0E72C68365C3DB1E5D06083A0398CC2154A5956
31,520,791 UART: [art] SIG.S = 281B15BD5AB21BAB5DCCCA157BB1884A7F414C4608144BFBD97E522DD896D04F98B5FA6C02D600227E9FFBE18560FA46
32,825,639 UART: Caliptra RT
32,826,353 UART: [state] CFI Enabled
32,987,816 UART: [rt] RT listening for mailbox commands...
32,989,678 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,019,199 UART: [rt]cmd =0x46504c54, len=4
33,020,973 >>> mbox cmd response data (8 bytes)
33,022,070 UART: [rt] FIPS self test
33,023,020 UART: [kat] ++
33,023,477 UART: [kat] sha1
33,027,936 UART: [kat] SHA2-256
33,029,869 UART: [kat] SHA2-384
33,032,993 UART: [kat] SHA2-512-ACC
33,035,233 UART: [kat] ECC-384
36,301,759 UART: [kat] HMAC-384Kdf
36,309,955 UART: Fatal Error: 0x90030002
36,345,184 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,489,155 >>> mbox cmd response: failed
36,489,818 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,633,786 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,012 UART:
190,302 UART: Running Caliptra ROM ...
191,325 UART:
191,463 UART: [state] CFI Enabled
263,150 UART: [state] LifecycleState = Unprovisioned
265,074 UART: [state] DebugLocked = No
267,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,949 UART: [kat] SHA2-256
441,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,156 UART: [kat] ++
452,600 UART: [kat] sha1
462,833 UART: [kat] SHA2-256
465,522 UART: [kat] SHA2-384
470,115 UART: [kat] SHA2-512-ACC
472,515 UART: [kat] ECC-384
2,763,989 UART: [kat] HMAC-384Kdf
2,794,517 UART: [kat] LMS
3,984,832 UART: [kat] --
3,990,514 UART: [cold-reset] ++
3,992,995 UART: [fht] Storing FHT @ 0x50003400
4,005,559 UART: [idev] ++
4,006,133 UART: [idev] CDI.KEYID = 6
4,007,042 UART: [idev] SUBJECT.KEYID = 7
4,008,319 UART: [idev] UDS.KEYID = 0
4,009,830 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,153,940 UART: [idev] Erasing UDS.KEYID = 0
7,340,542 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,997 UART: [idev] --
7,368,072 UART: [ldev] ++
7,368,666 UART: [ldev] CDI.KEYID = 6
7,369,577 UART: [ldev] SUBJECT.KEYID = 5
7,370,796 UART: [ldev] AUTHORITY.KEYID = 7
7,372,085 UART: [ldev] FE.KEYID = 1
7,417,197 UART: [ldev] Erasing FE.KEYID = 1
10,747,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,910 UART: [ldev] --
13,112,239 UART: [fwproc] Waiting for Commands...
13,114,077 UART: [fwproc] Received command 0x46574c44
13,116,270 UART: [fwproc] Received Image of size 114632 bytes
17,174,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,066 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,637,509 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,784,328 ready_for_fw is high
3,784,745 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,893,459 >>> mbox cmd response: success
23,591,058 UART:
23,591,457 UART: Running Caliptra FMC ...
23,592,608 UART:
23,592,768 UART: [state] CFI Enabled
23,659,367 UART: [fht] FMC Alias Private Key: 7
25,997,308 UART: [art] Extend RT PCRs Done
25,998,527 UART: [art] Lock RT PCRs Done
26,000,100 UART: [art] Populate DV Done
26,005,519 UART: [fht] FMC Alias Private Key: 7
26,007,066 UART: [art] Derive CDI
26,007,884 UART: [art] Store in in slot 0x4
26,067,328 UART: [art] Derive Key Pair
26,068,376 UART: [art] Store priv key in slot 0x5
29,360,955 UART: [art] Derive Key Pair - Done
29,374,020 UART: [art] Signing Cert with AUTHO
29,375,336 UART: RITY.KEYID = 7
31,662,378 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,883 UART: [art] PUB.X = 6E7923D056071F7A5E957A5EFEF904E9492B219E49833CA601D6433B5C9605DC1A76684874888A457E1B4DF0E192FF7D
31,671,080 UART: [art] PUB.Y = 9CC2FC11183BA47ACDB59195434740AA9E1006B73925AD34FC11B27D55A356D42F5D28AB4293400D97A84415C06E3110
31,678,333 UART: [art] SIG.R = AC7EE7B06F1DAAF15BE65C6D0A31D62A2F4121D75DB2AB64CE9602E0EDF20DA9534B177EC216B7B9FB4287050786F84F
31,685,730 UART: [art] SIG.S = 71B7ADE8D4DE816E3CD3E1572B85DE24C81A733BD9F99F264A237A7CA784014D8017112EBBBE9A02E1FF8297BE5BEF74
32,990,705 UART: Caliptra RT
32,991,415 UART: [state] CFI Enabled
33,153,031 UART: [rt] RT listening for mailbox commands...
33,154,893 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,184,586 UART: [rt]cmd =0x46504c54, len=4
33,186,162 >>> mbox cmd response data (8 bytes)
33,187,068 UART: [rt] FIPS self test
33,188,022 UART: [kat] ++
33,188,481 UART: [kat] sha1
33,192,883 UART: [kat] SHA2-256
33,194,770 UART: [kat] SHA2-384
33,197,967 UART: [kat] SHA2-512-ACC
33,200,277 UART: [kat] ECC-384
36,469,444 UART: [kat] HMAC-384Kdf
36,476,048 UART: Fatal Error: 0x90030002
36,511,383 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,655,228 >>> mbox cmd response: failed
36,655,805 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,799,769 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,780,740 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,876,958 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,613 UART:
192,963 UART: Running Caliptra ROM ...
194,149 UART:
603,904 UART: [state] CFI Enabled
618,013 UART: [state] LifecycleState = Unprovisioned
619,921 UART: [state] DebugLocked = No
622,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,604 UART: [kat] SHA2-256
796,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,884 UART: [kat] ++
807,367 UART: [kat] sha1
816,964 UART: [kat] SHA2-256
819,710 UART: [kat] SHA2-384
826,273 UART: [kat] SHA2-512-ACC
828,658 UART: [kat] ECC-384
3,112,504 UART: [kat] HMAC-384Kdf
3,123,149 UART: [kat] LMS
4,313,225 UART: [kat] --
4,318,075 UART: [cold-reset] ++
4,319,450 UART: [fht] Storing FHT @ 0x50003400
4,331,220 UART: [idev] ++
4,331,788 UART: [idev] CDI.KEYID = 6
4,332,701 UART: [idev] SUBJECT.KEYID = 7
4,333,953 UART: [idev] UDS.KEYID = 0
4,335,021 ready_for_fw is high
4,335,255 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,479,334 UART: [idev] Erasing UDS.KEYID = 0
7,624,194 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,094 UART: [idev] --
7,651,287 UART: [ldev] ++
7,651,917 UART: [ldev] CDI.KEYID = 6
7,653,133 UART: [ldev] SUBJECT.KEYID = 5
7,654,266 UART: [ldev] AUTHORITY.KEYID = 7
7,655,452 UART: [ldev] FE.KEYID = 1
7,664,156 UART: [ldev] Erasing FE.KEYID = 1
10,954,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,329 UART: [ldev] --
13,314,947 UART: [fwproc] Waiting for Commands...
13,318,284 UART: [fwproc] Received command 0x46574c44
13,320,469 UART: [fwproc] Received Image of size 114632 bytes
17,380,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,845,174 >>> mbox cmd response: success
17,849,650 UART: [afmc] ++
17,850,246 UART: [afmc] CDI.KEYID = 6
17,851,212 UART: [afmc] SUBJECT.KEYID = 7
17,852,441 UART: [afmc] AUTHORITY.KEYID = 5
21,165,597 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,689 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,942 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,319 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,150 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,612 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,651 UART: [afmc] --
23,530,460 UART: [cold-reset] --
23,533,636 UART: [state] Locking Datavault
23,540,181 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,930 UART: [state] Locking ICCM
23,542,996 UART: [exit] Launching FMC @ 0x40000130
23,551,387 UART:
23,551,623 UART: Running Caliptra FMC ...
23,552,727 UART:
23,552,889 UART: [state] CFI Enabled
23,560,609 UART: [fht] FMC Alias Private Key: 7
25,890,849 UART: [art] Extend RT PCRs Done
25,892,071 UART: [art] Lock RT PCRs Done
25,893,920 UART: [art] Populate DV Done
25,899,561 UART: [fht] FMC Alias Private Key: 7
25,901,047 UART: [art] Derive CDI
25,901,784 UART: [art] Store in in slot 0x4
25,943,940 UART: [art] Derive Key Pair
25,944,955 UART: [art] Store priv key in slot 0x5
29,186,681 UART: [art] Derive Key Pair - Done
29,199,789 UART: [art] Signing Cert with AUTHO
29,201,101 UART: RITY.KEYID = 7
31,480,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,272 UART: [art] PUB.X = D329A1C2F425FD60F696470DAC0CC7F3E73C1082802A7DCD15B63D7CA07C1A26FBABB027074984E1F4897621EECC09F0
31,489,529 UART: [art] PUB.Y = 3B16FECB4317C7AA7B770CB24C13132874B980DA3950EF414D506D825482275B73335E04D6DEB2BB56AAF84A73F611D5
31,496,746 UART: [art] SIG.R = F21ED6126A583DF9BFDEBBE64BDC8845DA6DEE3C0BBD3EF9233DF77597CB10BE8E81F7B510D93474DED1A206B762F359
31,504,156 UART: [art] SIG.S = 97AF6A3CC2C25436B9E94E5D7E2A45B17E6869906590DE8A96017A0A82473837F583DB41410E522EA0353CAE96820A26
32,809,782 UART: Caliptra RT
32,810,507 UART: [state] CFI Enabled
32,929,040 UART: [rt] RT listening for mailbox commands...
32,930,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,748 UART: [rt]cmd =0x46504c54, len=4
32,962,298 >>> mbox cmd response data (8 bytes)
32,963,532 UART: [rt] FIPS self test
32,964,492 UART: [kat] ++
32,964,948 UART: [kat] sha1
32,969,459 UART: [kat] SHA2-256
32,971,389 UART: [kat] SHA2-384
32,974,457 UART: [kat] SHA2-512-ACC
32,976,748 UART: [kat] ECC-384
36,219,499 UART: [kat] HMAC-384Kdf
36,225,183 UART: Fatal Error: 0x90030002
36,260,361 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,404,385 >>> mbox cmd response: failed
36,405,037 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,548,929 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,091 UART:
190,385 UART: Running Caliptra ROM ...
191,523 UART:
3,974,401 UART: [state] CFI Enabled
3,988,057 UART: [state] LifecycleState = Unprovisioned
3,989,997 UART: [state] DebugLocked = No
3,992,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,997,915 UART: [kat] SHA2-256
4,167,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,178,213 UART: [kat] ++
4,178,750 UART: [kat] sha1
4,188,998 UART: [kat] SHA2-256
4,191,699 UART: [kat] SHA2-384
4,197,362 UART: [kat] SHA2-512-ACC
4,199,769 UART: [kat] ECC-384
6,483,890 UART: [kat] HMAC-384Kdf
6,496,179 UART: [kat] LMS
7,686,254 UART: [kat] --
7,690,315 UART: [cold-reset] ++
7,692,460 UART: [fht] Storing FHT @ 0x50003400
7,703,887 UART: [idev] ++
7,704,452 UART: [idev] CDI.KEYID = 6
7,705,471 UART: [idev] SUBJECT.KEYID = 7
7,706,632 UART: [idev] UDS.KEYID = 0
7,708,259 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
7,852,191 UART: [idev] Erasing UDS.KEYID = 0
11,002,656 UART: [idev] Using Sha1 for KeyId Algorithm
11,024,305 UART: [idev] --
11,028,494 UART: [ldev] ++
11,029,131 UART: [ldev] CDI.KEYID = 6
11,030,044 UART: [ldev] SUBJECT.KEYID = 5
11,031,261 UART: [ldev] AUTHORITY.KEYID = 7
11,032,550 UART: [ldev] FE.KEYID = 1
11,044,592 UART: [ldev] Erasing FE.KEYID = 1
14,336,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,629,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,644,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,658,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,673,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,693,041 UART: [ldev] --
16,697,333 UART: [fwproc] Waiting for Commands...
16,700,509 UART: [fwproc] Received command 0x46574c44
16,702,746 UART: [fwproc] Received Image of size 114632 bytes
20,764,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,840,369 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,909,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
21,228,546 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
4,128,172 ready_for_fw is high
4,128,840 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,083,280 >>> mbox cmd response: success
23,723,391 UART:
23,723,801 UART: Running Caliptra FMC ...
23,724,919 UART:
23,725,087 UART: [state] CFI Enabled
23,733,263 UART: [fht] FMC Alias Private Key: 7
26,064,357 UART: [art] Extend RT PCRs Done
26,065,714 UART: [art] Lock RT PCRs Done
26,067,196 UART: [art] Populate DV Done
26,072,408 UART: [fht] FMC Alias Private Key: 7
26,073,908 UART: [art] Derive CDI
26,074,678 UART: [art] Store in in slot 0x4
26,117,547 UART: [art] Derive Key Pair
26,118,552 UART: [art] Store priv key in slot 0x5
29,360,656 UART: [art] Derive Key Pair - Done
29,373,764 UART: [art] Signing Cert with AUTHO
29,375,068 UART: RITY.KEYID = 7
31,654,806 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,322 UART: [art] PUB.X = 976267BA95292437BD738ABBCA9D70EF4E068AA7CC3BC91BCEA581B2E226CE472BAF8F105D62D25C88091AB50144D0A6
31,663,571 UART: [art] PUB.Y = F9FA01ABC0CD285B70B02FCC43B5C33B0A0E9E577F5DDE37C87AEE7097C939A5819C806772B9465F71A82ECFB4152E8B
31,670,865 UART: [art] SIG.R = CBD14C0A8AC4752FEE8F8216B79FFAFE049844AE0534C937B8F282B2FA7DB2FDB3320894411CD9CAB794D1A5CD99AA1A
31,678,214 UART: [art] SIG.S = 105222C9A56C645A2C570DA48D89A9CAD48A0FE06E66BE461162E88B1E9B7517FB34F02E7475981A42AA6C4C85BE50E0
32,983,381 UART: Caliptra RT
32,984,088 UART: [state] CFI Enabled
33,101,920 UART: [rt] RT listening for mailbox commands...
33,103,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,133,355 UART: [rt]cmd =0x46504c54, len=4
33,135,025 >>> mbox cmd response data (8 bytes)
33,135,880 UART: [rt] FIPS self test
33,136,827 UART: [kat] ++
33,137,283 UART: [kat] sha1
33,141,955 UART: [kat] SHA2-256
33,143,895 UART: [kat] SHA2-384
33,146,922 UART: [kat] SHA2-512-ACC
33,149,174 UART: [kat] ECC-384
36,392,248 UART: [kat] HMAC-384Kdf
36,397,558 UART: Fatal Error: 0x90030002
36,432,787 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,576,798 >>> mbox cmd response: failed
36,577,468 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
36,721,360 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
7,337,463 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
21,291,367 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,245 UART:
192,613 UART: Running Caliptra ROM ...
193,837 UART:
193,991 UART: [state] CFI Enabled
262,083 UART: [state] LifecycleState = Unprovisioned
263,984 UART: [state] DebugLocked = No
265,878 UART: [state] WD Timer not started. Device not locked for debugging
270,495 UART: [kat] SHA2-256
449,664 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,244 UART: [kat] ++
461,777 UART: [kat] sha1
472,787 UART: [kat] SHA2-256
475,843 UART: [kat] SHA2-384
480,998 UART: [kat] SHA2-512-ACC
483,939 UART: [kat] ECC-384
2,928,195 UART: [kat] HMAC-384Kdf
2,942,652 UART: [kat] LMS
3,472,119 UART: [kat] --
3,476,781 UART: [cold-reset] ++
3,478,652 UART: [fht] FHT @ 0x50003400
3,489,583 UART: [idev] ++
3,490,158 UART: [idev] CDI.KEYID = 6
3,491,194 UART: [idev] SUBJECT.KEYID = 7
3,492,295 UART: [idev] UDS.KEYID = 0
3,493,222 ready_for_fw is high
3,493,426 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,638,409 UART: [idev] Erasing UDS.KEYID = 0
5,998,312 UART: [idev] Sha1 KeyId Algorithm
6,020,138 UART: [idev] --
6,024,627 UART: [ldev] ++
6,025,204 UART: [ldev] CDI.KEYID = 6
6,026,090 UART: [ldev] SUBJECT.KEYID = 5
6,027,261 UART: [ldev] AUTHORITY.KEYID = 7
6,028,445 UART: [ldev] FE.KEYID = 1
6,071,703 UART: [ldev] Erasing FE.KEYID = 1
8,576,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,391 UART: [ldev] --
10,384,256 UART: [fwproc] Wait for Commands...
10,386,498 UART: [fwproc] Recv command 0x46574c44
10,388,601 UART: [fwproc] Recv'd Img size: 114940 bytes
13,802,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,916 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,263,975 >>> mbox cmd response: success
14,268,006 UART: [afmc] ++
14,268,605 UART: [afmc] CDI.KEYID = 6
14,269,487 UART: [afmc] SUBJECT.KEYID = 7
14,270,703 UART: [afmc] AUTHORITY.KEYID = 5
16,800,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,523,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,525,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,541,180 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,557,167 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,573,061 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,594,607 UART: [afmc] --
18,597,764 UART: [cold-reset] --
18,602,438 UART: [state] Locking Datavault
18,608,606 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,304 UART: [state] Locking ICCM
18,611,480 UART: [exit] Launching FMC @ 0x40000130
18,619,878 UART:
18,620,115 UART: Running Caliptra FMC ...
18,621,217 UART:
18,621,374 UART: [state] CFI Enabled
18,683,536 UART: [fht] FMC Alias Private Key: 7
20,448,328 UART: [art] Extend RT PCRs Done
20,449,555 UART: [art] Lock RT PCRs Done
20,451,315 UART: [art] Populate DV Done
20,456,780 UART: [fht] FMC Alias Private Key: 7
20,458,372 UART: [art] Derive CDI
20,459,187 UART: [art] Store in in slot 0x4
20,517,258 UART: [art] Derive Key Pair
20,518,300 UART: [art] Store priv key in slot 0x5
22,981,692 UART: [art] Derive Key Pair - Done
22,994,746 UART: [art] Signing Cert with AUTHO
22,996,056 UART: RITY.KEYID = 7
24,706,794 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,304 UART: [art] PUB.X = 91790A4ADC21D2BC4172ABDB6E0C0355221E05792FE2F36C6EDA5AE3E05F9C07ADB4CBC56D10A251F2EFFC8CD11DC4BF
24,715,560 UART: [art] PUB.Y = D099C5630D2FC97786AC79962193D228A7180B3146C34256AF7527617E899BF829A2D3C62D521566318B663C6E46C130
24,722,786 UART: [art] SIG.R = 8F69C06025C7B1146E0BC60CFF0EEAC086DF20297289B25F36468EDE8288E9DBADF1B53923A57CB6DE6675E81DB7710F
24,730,207 UART: [art] SIG.S = 30F839ABB2DA1B16B436EAD7A3C97C702E6E3DE3454EC819FD5158A66DE71D2ABF6984B421E2ACC73500C71A668FF1DE
25,709,517 UART: Caliptra RT
25,710,214 UART: [state] CFI Enabled
25,874,315 UART: [rt] RT listening for mailbox commands...
25,876,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,905,954 UART: [rt]cmd =0x46504c54, len=4
25,907,510 >>> mbox cmd response data (8 bytes)
25,908,786 UART: [rt] FIPS self test
25,909,732 UART: [kat] ++
25,910,180 UART: [kat] sha1
25,914,634 UART: [kat] SHA2-256
25,916,505 UART: [kat] SHA2-384
25,919,546 UART: [kat] SHA2-512-ACC
25,921,829 UART: [kat] ECC-384
28,360,116 UART: [kat] HMAC-384Kdf
28,365,763 UART: Fatal Error: 0x90030002
28,401,174 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,545,911 >>> mbox cmd response: failed
28,546,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,690,772 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
190,100 UART:
190,393 UART: Running Caliptra ROM ...
191,420 UART:
191,558 UART: [state] CFI Enabled
254,321 UART: [state] LifecycleState = Unprovisioned
256,236 UART: [state] DebugLocked = No
259,126 UART: [state] WD Timer not started. Device not locked for debugging
262,427 UART: [kat] SHA2-256
441,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
453,131 UART: [kat] ++
453,678 UART: [kat] sha1
465,696 UART: [kat] SHA2-256
468,759 UART: [kat] SHA2-384
476,244 UART: [kat] SHA2-512-ACC
479,228 UART: [kat] ECC-384
2,935,446 UART: [kat] HMAC-384Kdf
2,957,398 UART: [kat] LMS
3,486,854 UART: [kat] --
3,491,550 UART: [cold-reset] ++
3,492,723 UART: [fht] FHT @ 0x50003400
3,502,787 UART: [idev] ++
3,503,356 UART: [idev] CDI.KEYID = 6
3,504,319 UART: [idev] SUBJECT.KEYID = 7
3,505,483 UART: [idev] UDS.KEYID = 0
3,507,044 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,651,562 UART: [idev] Erasing UDS.KEYID = 0
6,009,424 UART: [idev] Sha1 KeyId Algorithm
6,032,218 UART: [idev] --
6,036,242 UART: [ldev] ++
6,036,822 UART: [ldev] CDI.KEYID = 6
6,037,733 UART: [ldev] SUBJECT.KEYID = 5
6,038,903 UART: [ldev] AUTHORITY.KEYID = 7
6,040,142 UART: [ldev] FE.KEYID = 1
6,084,978 UART: [ldev] Erasing FE.KEYID = 1
8,589,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,165 UART: [ldev] --
10,398,534 UART: [fwproc] Wait for Commands...
10,400,845 UART: [fwproc] Recv command 0x46574c44
10,402,914 UART: [fwproc] Recv'd Img size: 114940 bytes
13,815,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,668 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,277,903 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,381,217 ready_for_fw is high
3,381,711 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,086,144 >>> mbox cmd response: success
18,382,908 UART:
18,383,298 UART: Running Caliptra FMC ...
18,384,425 UART:
18,384,578 UART: [state] CFI Enabled
18,452,142 UART: [fht] FMC Alias Private Key: 7
20,216,149 UART: [art] Extend RT PCRs Done
20,217,372 UART: [art] Lock RT PCRs Done
20,219,186 UART: [art] Populate DV Done
20,224,441 UART: [fht] FMC Alias Private Key: 7
20,226,091 UART: [art] Derive CDI
20,226,909 UART: [art] Store in in slot 0x4
20,284,916 UART: [art] Derive Key Pair
20,285,921 UART: [art] Store priv key in slot 0x5
22,748,651 UART: [art] Derive Key Pair - Done
22,761,544 UART: [art] Signing Cert with AUTHO
22,762,845 UART: RITY.KEYID = 7
24,474,190 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,705 UART: [art] PUB.X = F453F1379276565875B0A53898B78D09A34E6EB114E82E532A6652F06BF00F3F314F352DD3AED671120782C77CB06FB4
24,482,971 UART: [art] PUB.Y = F518F4E8D352E5D2B7398F50C5F6E7F56E0A337ABD10EE4FA52B665F87E739A6392B0BE45F85F5536779988E21E7BF7C
24,490,231 UART: [art] SIG.R = F9EB01582FFE11C003AEE7F87403B1631764C557BB4CA1FA61083724E54E86927BE6BDAA52C1A03041ED2F51153789B3
24,497,639 UART: [art] SIG.S = EF3D2449A4DC304FEDC6551F21382134255987DF1181CDF681D5B841A7FFD497FD500C74149EA6B9237F3AF255D85CAB
25,476,121 UART: Caliptra RT
25,476,835 UART: [state] CFI Enabled
25,641,593 UART: [rt] RT listening for mailbox commands...
25,643,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,673,075 UART: [rt]cmd =0x46504c54, len=4
25,674,740 >>> mbox cmd response data (8 bytes)
25,675,755 UART: [rt] FIPS self test
25,676,706 UART: [kat] ++
25,677,173 UART: [kat] sha1
25,681,521 UART: [kat] SHA2-256
25,683,449 UART: [kat] SHA2-384
25,686,416 UART: [kat] SHA2-512-ACC
25,688,681 UART: [kat] ECC-384
28,127,535 UART: [kat] HMAC-384Kdf
28,152,797 UART: Fatal Error: 0x90030002
28,188,006 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,332,867 >>> mbox cmd response: failed
28,333,506 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,477,788 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,375,726 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,074,579 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,414 UART:
192,780 UART: Running Caliptra ROM ...
193,963 UART:
603,655 UART: [state] CFI Enabled
617,480 UART: [state] LifecycleState = Unprovisioned
619,367 UART: [state] DebugLocked = No
621,752 UART: [state] WD Timer not started. Device not locked for debugging
625,169 UART: [kat] SHA2-256
804,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,881 UART: [kat] ++
816,326 UART: [kat] sha1
827,284 UART: [kat] SHA2-256
830,329 UART: [kat] SHA2-384
835,621 UART: [kat] SHA2-512-ACC
838,634 UART: [kat] ECC-384
3,276,612 UART: [kat] HMAC-384Kdf
3,290,345 UART: [kat] LMS
3,819,790 UART: [kat] --
3,824,466 UART: [cold-reset] ++
3,825,335 UART: [fht] FHT @ 0x50003400
3,837,233 UART: [idev] ++
3,837,800 UART: [idev] CDI.KEYID = 6
3,838,681 UART: [idev] SUBJECT.KEYID = 7
3,839,931 UART: [idev] UDS.KEYID = 0
3,840,867 ready_for_fw is high
3,841,092 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,985,555 UART: [idev] Erasing UDS.KEYID = 0
6,308,192 UART: [idev] Sha1 KeyId Algorithm
6,331,145 UART: [idev] --
6,334,810 UART: [ldev] ++
6,335,380 UART: [ldev] CDI.KEYID = 6
6,336,293 UART: [ldev] SUBJECT.KEYID = 5
6,337,451 UART: [ldev] AUTHORITY.KEYID = 7
6,338,739 UART: [ldev] FE.KEYID = 1
6,352,926 UART: [ldev] Erasing FE.KEYID = 1
8,830,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,406 UART: [ldev] --
10,619,075 UART: [fwproc] Wait for Commands...
10,621,769 UART: [fwproc] Recv command 0x46574c44
10,623,860 UART: [fwproc] Recv'd Img size: 114940 bytes
14,034,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,479 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,495,102 >>> mbox cmd response: success
14,499,731 UART: [afmc] ++
14,500,320 UART: [afmc] CDI.KEYID = 6
14,501,247 UART: [afmc] SUBJECT.KEYID = 7
14,502,489 UART: [afmc] AUTHORITY.KEYID = 5
17,012,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,438 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,531 UART: [afmc] --
18,806,012 UART: [cold-reset] --
18,810,088 UART: [state] Locking Datavault
18,813,711 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,350 UART: [state] Locking ICCM
18,816,771 UART: [exit] Launching FMC @ 0x40000130
18,825,166 UART:
18,825,441 UART: Running Caliptra FMC ...
18,826,496 UART:
18,826,648 UART: [state] CFI Enabled
18,834,703 UART: [fht] FMC Alias Private Key: 7
20,591,364 UART: [art] Extend RT PCRs Done
20,592,584 UART: [art] Lock RT PCRs Done
20,594,232 UART: [art] Populate DV Done
20,599,805 UART: [fht] FMC Alias Private Key: 7
20,601,289 UART: [art] Derive CDI
20,602,052 UART: [art] Store in in slot 0x4
20,645,135 UART: [art] Derive Key Pair
20,646,136 UART: [art] Store priv key in slot 0x5
23,073,338 UART: [art] Derive Key Pair - Done
23,086,390 UART: [art] Signing Cert with AUTHO
23,087,708 UART: RITY.KEYID = 7
24,793,425 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,926 UART: [art] PUB.X = AEA6DBB3A4CE1434FF3B0A452850A00481C466A0126A5CD6B0AB67F873EEFDDF60D9F79A54B083C713CC16D2BF975759
24,802,199 UART: [art] PUB.Y = 7349E42B371134F59BA714C7A00A63BDE5B08785B7B57AC0E878460CE13DECE365D6F454320D04F404A122F8BB084E72
24,809,444 UART: [art] SIG.R = B90432A2745B4A183EDCF7D7BF0B7B4130A2A10575B61C3336E0AE43040C6D5EADD82591CD4238A06EE522045554C3F2
24,816,841 UART: [art] SIG.S = 96F84E4656679DC9807410864193377BD953EC50223CEF4B867E8B9732650A5B094DF36F52C2034BB85E231FF63149B5
25,796,036 UART: Caliptra RT
25,796,740 UART: [state] CFI Enabled
25,913,968 UART: [rt] RT listening for mailbox commands...
25,915,813 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,270 UART: [rt]cmd =0x46504c54, len=4
25,946,770 >>> mbox cmd response data (8 bytes)
25,947,721 UART: [rt] FIPS self test
25,948,663 UART: [kat] ++
25,949,112 UART: [kat] sha1
25,953,404 UART: [kat] SHA2-256
25,955,329 UART: [kat] SHA2-384
25,958,127 UART: [kat] SHA2-512-ACC
25,960,427 UART: [kat] ECC-384
28,387,450 UART: [kat] HMAC-384Kdf
28,392,705 UART: Fatal Error: 0x90030002
28,428,039 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,572,256 >>> mbox cmd response: failed
28,572,842 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,717,512 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,144 UART:
190,434 UART: Running Caliptra ROM ...
191,486 UART:
11,817,998 UART: [state] CFI Enabled
11,833,049 UART: [state] LifecycleState = Unprovisioned
11,834,908 UART: [state] DebugLocked = No
11,836,375 UART: [state] WD Timer not started. Device not locked for debugging
11,840,164 UART: [kat] SHA2-256
12,019,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,030,884 UART: [kat] ++
12,031,347 UART: [kat] sha1
12,042,824 UART: [kat] SHA2-256
12,045,892 UART: [kat] SHA2-384
12,051,132 UART: [kat] SHA2-512-ACC
12,054,073 UART: [kat] ECC-384
14,496,957 UART: [kat] HMAC-384Kdf
14,508,148 UART: [kat] LMS
15,037,645 UART: [kat] --
15,040,346 UART: [cold-reset] ++
15,041,465 UART: [fht] FHT @ 0x50003400
15,053,203 UART: [idev] ++
15,053,771 UART: [idev] CDI.KEYID = 6
15,054,714 UART: [idev] SUBJECT.KEYID = 7
15,055,929 UART: [idev] UDS.KEYID = 0
15,057,438 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
15,201,707 UART: [idev] Erasing UDS.KEYID = 0
17,529,100 UART: [idev] Sha1 KeyId Algorithm
17,551,505 UART: [idev] --
17,555,790 UART: [ldev] ++
17,556,363 UART: [ldev] CDI.KEYID = 6
17,557,270 UART: [ldev] SUBJECT.KEYID = 5
17,558,485 UART: [ldev] AUTHORITY.KEYID = 7
17,559,715 UART: [ldev] FE.KEYID = 1
17,570,745 UART: [ldev] Erasing FE.KEYID = 1
20,048,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,765,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,781,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,797,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,813,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,834,979 UART: [ldev] --
21,839,987 UART: [fwproc] Wait for Commands...
21,842,254 UART: [fwproc] Recv command 0x46574c44
21,844,349 UART: [fwproc] Recv'd Img size: 114940 bytes
25,255,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,328,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,397,425 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,717,032 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,696,659 ready_for_fw is high
3,697,073 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,284,381 >>> mbox cmd response: success
18,539,556 UART:
18,539,951 UART: Running Caliptra FMC ...
18,541,058 UART:
18,541,213 UART: [state] CFI Enabled
18,549,426 UART: [fht] FMC Alias Private Key: 7
20,305,888 UART: [art] Extend RT PCRs Done
20,307,117 UART: [art] Lock RT PCRs Done
20,308,776 UART: [art] Populate DV Done
20,314,139 UART: [fht] FMC Alias Private Key: 7
20,315,682 UART: [art] Derive CDI
20,316,495 UART: [art] Store in in slot 0x4
20,359,091 UART: [art] Derive Key Pair
20,360,136 UART: [art] Store priv key in slot 0x5
22,786,921 UART: [art] Derive Key Pair - Done
22,799,649 UART: [art] Signing Cert with AUTHO
22,800,957 UART: RITY.KEYID = 7
24,506,531 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,055 UART: [art] PUB.X = 75191D19C7C3B3DEA6E11581AA89F15A29B530E89EE7BFB75A6D062064FCA86715F4034BA2FBA5A90A0B540E9FA53725
24,515,320 UART: [art] PUB.Y = 2A837396ED4ED4DBA7EABE481BECE159F93F8243CD03FE75E484A9CFD3BF361ACAB8039ED60E4DEFA54C1E33198DF406
24,522,634 UART: [art] SIG.R = AF5FEF328079EE7DC3CC06454BB0758591AD8ADAA89B1F8FC87658A2AA87E70929AD5935E6156F6FB2FB22D99198EEF4
24,530,031 UART: [art] SIG.S = 2EE04D5F5647D096C6DD084C83A04800708C8FEA253F1DA896B8F3A03F32E3E29810028B57D984548B86F933C283C915
25,508,884 UART: Caliptra RT
25,509,598 UART: [state] CFI Enabled
25,626,736 UART: [rt] RT listening for mailbox commands...
25,628,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,658,380 UART: [rt]cmd =0x46504c54, len=4
25,660,061 >>> mbox cmd response data (8 bytes)
25,661,275 UART: [rt] FIPS self test
25,662,217 UART: [kat] ++
25,662,669 UART: [kat] sha1
25,667,228 UART: [kat] SHA2-256
25,669,153 UART: [kat] SHA2-384
25,672,057 UART: [kat] SHA2-512-ACC
25,674,327 UART: [kat] ECC-384
28,101,859 UART: [kat] HMAC-384Kdf
28,107,282 UART: Fatal Error: 0x90030002
28,142,508 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,286,923 >>> mbox cmd response: failed
28,287,553 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,431,877 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
15,198,879 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,773,974 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,118 UART:
192,488 UART: Running Caliptra ROM ...
193,641 UART:
193,790 UART: [state] CFI Enabled
264,330 UART: [state] LifecycleState = Unprovisioned
266,675 UART: [state] DebugLocked = No
268,723 UART: [state] WD Timer not started. Device not locked for debugging
273,467 UART: [kat] SHA2-256
463,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,105 UART: [kat] ++
474,576 UART: [kat] sha1
485,667 UART: [kat] SHA2-256
488,735 UART: [kat] SHA2-384
495,197 UART: [kat] SHA2-512-ACC
497,791 UART: [kat] ECC-384
2,949,807 UART: [kat] HMAC-384Kdf
2,971,229 UART: [kat] LMS
3,503,033 UART: [kat] --
3,506,251 UART: [cold-reset] ++
3,508,471 UART: [fht] FHT @ 0x50003400
3,520,528 UART: [idev] ++
3,521,167 UART: [idev] CDI.KEYID = 6
3,522,202 UART: [idev] SUBJECT.KEYID = 7
3,523,385 UART: [idev] UDS.KEYID = 0
3,524,311 ready_for_fw is high
3,524,514 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,145 UART: [idev] Erasing UDS.KEYID = 0
6,031,394 UART: [idev] Sha1 KeyId Algorithm
6,054,653 UART: [idev] --
6,058,494 UART: [ldev] ++
6,059,182 UART: [ldev] CDI.KEYID = 6
6,060,065 UART: [ldev] SUBJECT.KEYID = 5
6,061,282 UART: [ldev] AUTHORITY.KEYID = 7
6,062,521 UART: [ldev] FE.KEYID = 1
6,100,808 UART: [ldev] Erasing FE.KEYID = 1
8,605,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,436 UART: [ldev] --
10,415,040 UART: [fwproc] Wait for Commands...
10,416,933 UART: [fwproc] Recv command 0x46574c44
10,419,199 UART: [fwproc] Recv'd Img size: 114940 bytes
13,866,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,196 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,605,353 >>> mbox cmd response: success
14,609,567 UART: [afmc] ++
14,610,274 UART: [afmc] CDI.KEYID = 6
14,611,459 UART: [afmc] SUBJECT.KEYID = 7
14,612,953 UART: [afmc] AUTHORITY.KEYID = 5
17,149,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,916 UART: [afmc] --
18,950,212 UART: [cold-reset] --
18,953,175 UART: [state] Locking Datavault
18,958,105 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,294 UART: [state] Locking ICCM
18,962,394 UART: [exit] Launching FMC @ 0x40000130
18,971,015 UART:
18,971,294 UART: Running Caliptra FMC ...
18,972,408 UART:
18,972,564 UART: [state] CFI Enabled
19,030,549 UART: [fht] FMC Alias Private Key: 7
20,794,593 UART: [art] Extend RT PCRs Done
20,795,816 UART: [art] Lock RT PCRs Done
20,797,501 UART: [art] Populate DV Done
20,803,074 UART: [fht] FMC Alias Private Key: 7
20,804,776 UART: [art] Derive CDI
20,805,587 UART: [art] Store in in slot 0x4
20,863,495 UART: [art] Derive Key Pair
20,864,556 UART: [art] Store priv key in slot 0x5
23,327,059 UART: [art] Derive Key Pair - Done
23,339,684 UART: [art] Signing Cert with AUTHO
23,340,985 UART: RITY.KEYID = 7
25,052,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,346 UART: [art] PUB.X = 3DE3EA88C5E8594B760E15E7EEFA960ADA98FC1A4D5E871F9280E1AC03A9BE93EFE5DFB3FEF8A9969D447975ACB5B6DB
25,061,619 UART: [art] PUB.Y = 6AEF876DB9B0F1D2D0C2A008E29D4BF4DD7664328EC60826902CBFBE15629E09E10C6C2FAEB66F1A087AB5AEF3EFBBFE
25,068,940 UART: [art] SIG.R = D62CD54316294D706749503FA31028810B8C4C5B314F21A09A64FAC95E73E3694E5C2AD68CC38CBB6BD719F7D49764AA
25,076,310 UART: [art] SIG.S = BFAE902F2B267F02F5A0D8BAE8A47239530C1E963BE87FEAB890425713F9629268661984AD336419F60C5186D4E02B4B
26,055,083 UART: Caliptra RT
26,055,783 UART: [state] CFI Enabled
26,219,225 UART: [rt] RT listening for mailbox commands...
26,221,077 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,250,714 UART: [rt]cmd =0x46504c54, len=4
26,252,431 >>> mbox cmd response data (8 bytes)
26,253,622 UART: [rt] FIPS self test
26,254,586 UART: [kat] ++
26,255,040 UART: [kat] sha1
26,259,606 UART: [kat] SHA2-256
26,261,486 UART: [kat] SHA2-384
26,264,553 UART: [kat] SHA2-512-ACC
26,266,799 UART: [kat] ECC-384
28,705,274 UART: [kat] HMAC-384Kdf
28,710,742 UART: Fatal Error: 0x90030002
28,746,127 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,890,929 >>> mbox cmd response: failed
28,891,592 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,035,737 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,006 UART:
190,302 UART: Running Caliptra ROM ...
191,353 UART:
191,495 UART: [state] CFI Enabled
258,409 UART: [state] LifecycleState = Unprovisioned
260,769 UART: [state] DebugLocked = No
263,090 UART: [state] WD Timer not started. Device not locked for debugging
267,757 UART: [kat] SHA2-256
457,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,372 UART: [kat] ++
468,843 UART: [kat] sha1
479,888 UART: [kat] SHA2-256
482,904 UART: [kat] SHA2-384
490,291 UART: [kat] SHA2-512-ACC
492,884 UART: [kat] ECC-384
2,942,321 UART: [kat] HMAC-384Kdf
2,965,459 UART: [kat] LMS
3,497,259 UART: [kat] --
3,500,628 UART: [cold-reset] ++
3,503,052 UART: [fht] FHT @ 0x50003400
3,513,931 UART: [idev] ++
3,514,605 UART: [idev] CDI.KEYID = 6
3,515,622 UART: [idev] SUBJECT.KEYID = 7
3,516,780 UART: [idev] UDS.KEYID = 0
3,518,291 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,662,787 UART: [idev] Erasing UDS.KEYID = 0
6,025,193 UART: [idev] Sha1 KeyId Algorithm
6,048,380 UART: [idev] --
6,052,865 UART: [ldev] ++
6,053,548 UART: [ldev] CDI.KEYID = 6
6,054,433 UART: [ldev] SUBJECT.KEYID = 5
6,055,649 UART: [ldev] AUTHORITY.KEYID = 7
6,056,888 UART: [ldev] FE.KEYID = 1
6,097,231 UART: [ldev] Erasing FE.KEYID = 1
8,604,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,361 UART: [ldev] --
10,412,597 UART: [fwproc] Wait for Commands...
10,415,815 UART: [fwproc] Recv command 0x46574c44
10,418,086 UART: [fwproc] Recv'd Img size: 114940 bytes
13,860,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,160 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,602,739 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,419,052 ready_for_fw is high
3,419,478 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,736,458 >>> mbox cmd response: success
19,029,599 UART:
19,030,348 UART: Running Caliptra FMC ...
19,031,491 UART:
19,031,646 UART: [state] CFI Enabled
19,100,584 UART: [fht] FMC Alias Private Key: 7
20,864,875 UART: [art] Extend RT PCRs Done
20,866,093 UART: [art] Lock RT PCRs Done
20,867,861 UART: [art] Populate DV Done
20,873,278 UART: [fht] FMC Alias Private Key: 7
20,874,767 UART: [art] Derive CDI
20,875,505 UART: [art] Store in in slot 0x4
20,934,407 UART: [art] Derive Key Pair
20,935,453 UART: [art] Store priv key in slot 0x5
23,397,992 UART: [art] Derive Key Pair - Done
23,410,934 UART: [art] Signing Cert with AUTHO
23,412,244 UART: RITY.KEYID = 7
25,123,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,253 UART: [art] PUB.X = 40CD5F918FD86F9809D22BF4A4ADDE8B4F177F85A2E9E0293A59816F93D4CD5552E267252CEB61F0D014F4676EF64E5A
25,132,524 UART: [art] PUB.Y = 45130EE783E83F6886230473B0C444383FC4BFEEA3C86A4BAE62CEFF2EEDB23406A341F294112B3E828B93735F7CAD9E
25,139,810 UART: [art] SIG.R = C294F08806FFD07CE1782BB93BCAA0816EBED55DF134214F306E56B31AC6E7437B021EE8C6E238D62F9B7858856EBB85
25,147,233 UART: [art] SIG.S = EEF212DDA7BF4F9025768436FF9B8BD3F842CFCDCA37D0CEBCDAA11CABAED99A51333191A2C911C997CB25D2E655A975
26,126,520 UART: Caliptra RT
26,127,235 UART: [state] CFI Enabled
26,291,546 UART: [rt] RT listening for mailbox commands...
26,293,404 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,323,230 UART: [rt]cmd =0x46504c54, len=4
26,324,921 >>> mbox cmd response data (8 bytes)
26,326,227 UART: [rt] FIPS self test
26,327,167 UART: [kat] ++
26,327,617 UART: [kat] sha1
26,331,909 UART: [kat] SHA2-256
26,333,838 UART: [kat] SHA2-384
26,336,740 UART: [kat] SHA2-512-ACC
26,338,991 UART: [kat] ECC-384
28,777,815 UART: [kat] HMAC-384Kdf
28,804,238 UART: Fatal Error: 0x90030002
28,839,582 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,984,033 >>> mbox cmd response: failed
28,984,654 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,128,801 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,409,528 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,728,016 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,610 UART:
192,965 UART: Running Caliptra ROM ...
194,149 UART:
603,685 UART: [state] CFI Enabled
614,445 UART: [state] LifecycleState = Unprovisioned
616,476 UART: [state] DebugLocked = No
618,938 UART: [state] WD Timer not started. Device not locked for debugging
624,041 UART: [kat] SHA2-256
813,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,665 UART: [kat] ++
825,270 UART: [kat] sha1
836,369 UART: [kat] SHA2-256
839,393 UART: [kat] SHA2-384
844,966 UART: [kat] SHA2-512-ACC
847,553 UART: [kat] ECC-384
3,289,001 UART: [kat] HMAC-384Kdf
3,302,524 UART: [kat] LMS
3,834,322 UART: [kat] --
3,838,968 UART: [cold-reset] ++
3,840,863 UART: [fht] FHT @ 0x50003400
3,852,637 UART: [idev] ++
3,853,276 UART: [idev] CDI.KEYID = 6
3,854,309 UART: [idev] SUBJECT.KEYID = 7
3,855,488 UART: [idev] UDS.KEYID = 0
3,856,417 ready_for_fw is high
3,856,638 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,001,077 UART: [idev] Erasing UDS.KEYID = 0
6,328,746 UART: [idev] Sha1 KeyId Algorithm
6,351,353 UART: [idev] --
6,357,512 UART: [ldev] ++
6,358,250 UART: [ldev] CDI.KEYID = 6
6,359,175 UART: [ldev] SUBJECT.KEYID = 5
6,360,340 UART: [ldev] AUTHORITY.KEYID = 7
6,361,518 UART: [ldev] FE.KEYID = 1
6,373,841 UART: [ldev] Erasing FE.KEYID = 1
8,850,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,883 UART: [ldev] --
10,643,106 UART: [fwproc] Wait for Commands...
10,645,047 UART: [fwproc] Recv command 0x46574c44
10,647,368 UART: [fwproc] Recv'd Img size: 114940 bytes
14,103,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,297 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,840,608 >>> mbox cmd response: success
14,845,375 UART: [afmc] ++
14,846,073 UART: [afmc] CDI.KEYID = 6
14,847,182 UART: [afmc] SUBJECT.KEYID = 7
14,848,717 UART: [afmc] AUTHORITY.KEYID = 5
17,353,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,176 UART: [afmc] --
19,150,255 UART: [cold-reset] --
19,154,894 UART: [state] Locking Datavault
19,158,465 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,656 UART: [state] Locking ICCM
19,163,073 UART: [exit] Launching FMC @ 0x40000130
19,171,746 UART:
19,171,988 UART: Running Caliptra FMC ...
19,173,094 UART:
19,173,257 UART: [state] CFI Enabled
19,181,682 UART: [fht] FMC Alias Private Key: 7
20,938,853 UART: [art] Extend RT PCRs Done
20,940,063 UART: [art] Lock RT PCRs Done
20,941,745 UART: [art] Populate DV Done
20,947,157 UART: [fht] FMC Alias Private Key: 7
20,948,856 UART: [art] Derive CDI
20,949,667 UART: [art] Store in in slot 0x4
20,992,221 UART: [art] Derive Key Pair
20,993,282 UART: [art] Store priv key in slot 0x5
23,419,965 UART: [art] Derive Key Pair - Done
23,432,773 UART: [art] Signing Cert with AUTHO
23,434,105 UART: RITY.KEYID = 7
25,139,614 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,114 UART: [art] PUB.X = ABA1B6439F67A7E253BC74A14D39CDF7885639F5E8933148FBCBA2F3077789B4C92D4A89AC0840C356895410A412A0AD
25,148,371 UART: [art] PUB.Y = FEC9C85A4CF5BE025ADDBFA41CBFC4B4B02D2F5B917E171799AAC1A0FC95D87C519DCFD357B982331A9F976A13A73A38
25,155,661 UART: [art] SIG.R = BBAEADA1F03EA69C16D9FDE355C70FF266B717358B3F1E377DF226E8648AE0E4976D286BE1DC679A2D228CB987C44A9C
25,163,052 UART: [art] SIG.S = F57CCB66F3750002BB3C94BBE00D02F95AB3965F07A3D28F692F6D8BDF6C3CB4E8A449FA77684A079DEC87C6BFB6D923
26,142,231 UART: Caliptra RT
26,142,935 UART: [state] CFI Enabled
26,261,201 UART: [rt] RT listening for mailbox commands...
26,263,062 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,292,733 UART: [rt]cmd =0x46504c54, len=4
26,294,421 >>> mbox cmd response data (8 bytes)
26,295,538 UART: [rt] FIPS self test
26,296,502 UART: [kat] ++
26,297,006 UART: [kat] sha1
26,301,361 UART: [kat] SHA2-256
26,303,234 UART: [kat] SHA2-384
26,306,082 UART: [kat] SHA2-512-ACC
26,308,374 UART: [kat] ECC-384
28,735,494 UART: [kat] HMAC-384Kdf
28,741,074 UART: Fatal Error: 0x90030002
28,776,307 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,920,660 >>> mbox cmd response: failed
28,921,273 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,065,524 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,140 UART:
190,429 UART: Running Caliptra ROM ...
191,554 UART:
11,463,242 UART: [state] CFI Enabled
11,477,399 UART: [state] LifecycleState = Unprovisioned
11,479,748 UART: [state] DebugLocked = No
11,482,104 UART: [state] WD Timer not started. Device not locked for debugging
11,486,394 UART: [kat] SHA2-256
11,676,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,687,107 UART: [kat] ++
11,687,646 UART: [kat] sha1
11,700,108 UART: [kat] SHA2-256
11,703,122 UART: [kat] SHA2-384
11,708,629 UART: [kat] SHA2-512-ACC
11,711,248 UART: [kat] ECC-384
14,151,834 UART: [kat] HMAC-384Kdf
14,165,140 UART: [kat] LMS
14,696,940 UART: [kat] --
14,700,072 UART: [cold-reset] ++
14,702,659 UART: [fht] FHT @ 0x50003400
14,713,369 UART: [idev] ++
14,714,097 UART: [idev] CDI.KEYID = 6
14,714,979 UART: [idev] SUBJECT.KEYID = 7
14,716,240 UART: [idev] UDS.KEYID = 0
14,717,735 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,862,043 UART: [idev] Erasing UDS.KEYID = 0
17,194,129 UART: [idev] Sha1 KeyId Algorithm
17,217,571 UART: [idev] --
17,221,344 UART: [ldev] ++
17,222,073 UART: [ldev] CDI.KEYID = 6
17,222,954 UART: [ldev] SUBJECT.KEYID = 5
17,224,164 UART: [ldev] AUTHORITY.KEYID = 7
17,225,342 UART: [ldev] FE.KEYID = 1
17,236,986 UART: [ldev] Erasing FE.KEYID = 1
19,716,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,438,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,453,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,468,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,483,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,504,244 UART: [ldev] --
21,508,990 UART: [fwproc] Wait for Commands...
21,512,170 UART: [fwproc] Recv command 0x46574c44
21,514,482 UART: [fwproc] Recv'd Img size: 114940 bytes
24,973,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,053,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,169,256 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,715,629 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,759,124 ready_for_fw is high
3,759,580 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,962,839 >>> mbox cmd response: success
19,213,911 UART:
19,214,329 UART: Running Caliptra FMC ...
19,215,452 UART:
19,215,608 UART: [state] CFI Enabled
19,223,666 UART: [fht] FMC Alias Private Key: 7
20,980,794 UART: [art] Extend RT PCRs Done
20,982,045 UART: [art] Lock RT PCRs Done
20,983,307 UART: [art] Populate DV Done
20,988,947 UART: [fht] FMC Alias Private Key: 7
20,990,378 UART: [art] Derive CDI
20,991,295 UART: [art] Store in in slot 0x4
21,033,849 UART: [art] Derive Key Pair
21,034,893 UART: [art] Store priv key in slot 0x5
23,461,974 UART: [art] Derive Key Pair - Done
23,474,758 UART: [art] Signing Cert with AUTHO
23,476,062 UART: RITY.KEYID = 7
25,181,377 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,883 UART: [art] PUB.X = 70CF7E3DFBF3E60929E7809ACB895C8AA726F1507F6DEF0718D2DA82909126D9027F86F2C8FFBF883538309FA88EFB90
25,190,183 UART: [art] PUB.Y = A841CCB16AAC85400E62444375466FF62E7DBD81423CF845F1185D246B1871BAF4BB613F12482D8AFEDD11150A370C81
25,197,411 UART: [art] SIG.R = C6BB4CC90E265A05D7E3754C009DA624EA942C38CB1AC56ECF212B558E339B127074A8CCDCE3BAFA3283838915E201D9
25,204,795 UART: [art] SIG.S = E29BB806A9C92E118EF7ACC80824451F8EC90FF7FA11A4C1220E7505B3FDA37BCB3ED86ABEFA5A6EDE1C84909284C7B3
26,184,132 UART: Caliptra RT
26,184,863 UART: [state] CFI Enabled
26,302,050 UART: [rt] RT listening for mailbox commands...
26,303,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,333,368 UART: [rt]cmd =0x46504c54, len=4
26,334,713 >>> mbox cmd response data (8 bytes)
26,335,504 UART: [rt] FIPS self test
26,336,454 UART: [kat] ++
26,336,908 UART: [kat] sha1
26,341,312 UART: [kat] SHA2-256
26,343,242 UART: [kat] SHA2-384
26,346,201 UART: [kat] SHA2-512-ACC
26,348,506 UART: [kat] ECC-384
28,775,810 UART: [kat] HMAC-384Kdf
28,781,122 UART: Fatal Error: 0x90030002
28,816,342 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,960,685 >>> mbox cmd response: failed
28,961,328 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,105,651 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
14,584,928 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,800,360 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,031 UART: [kat] SHA2-256
891,969 UART: [kat] SHA2-384
894,802 UART: [kat] SHA2-512-ACC
896,703 UART: [kat] ECC-384
902,158 UART: [kat] HMAC-384Kdf
906,790 UART: [kat] LMS
1,474,986 UART: [kat] --
1,475,773 UART: [cold-reset] ++
1,476,123 UART: [fht] Storing FHT @ 0x50003400
1,478,782 UART: [idev] ++
1,478,950 UART: [idev] CDI.KEYID = 6
1,479,310 UART: [idev] SUBJECT.KEYID = 7
1,479,734 UART: [idev] UDS.KEYID = 0
1,480,079 ready_for_fw is high
1,480,079 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,738 UART: [idev] Erasing UDS.KEYID = 0
1,504,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,894 UART: [idev] --
1,514,129 UART: [ldev] ++
1,514,297 UART: [ldev] CDI.KEYID = 6
1,514,660 UART: [ldev] SUBJECT.KEYID = 5
1,515,086 UART: [ldev] AUTHORITY.KEYID = 7
1,515,549 UART: [ldev] FE.KEYID = 1
1,520,673 UART: [ldev] Erasing FE.KEYID = 1
1,545,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,432 UART: [ldev] --
1,584,695 UART: [fwproc] Waiting for Commands...
1,585,402 UART: [fwproc] Received command 0x46574c44
1,586,193 UART: [fwproc] Received Image of size 114940 bytes
2,891,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,656 >>> mbox cmd response: success
3,085,714 UART: [afmc] ++
3,085,882 UART: [afmc] CDI.KEYID = 6
3,086,244 UART: [afmc] SUBJECT.KEYID = 7
3,086,669 UART: [afmc] AUTHORITY.KEYID = 5
3,121,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,137,494 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,138,274 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,144,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,149,887 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,155,577 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,163,638 UART: [afmc] --
3,164,632 UART: [cold-reset] --
3,165,450 UART: [state] Locking Datavault
3,166,621 UART: [state] Locking PCR0, PCR1 and PCR31
3,167,225 UART: [state] Locking ICCM
3,167,673 UART: [exit] Launching FMC @ 0x40000130
3,173,002 UART:
3,173,018 UART: Running Caliptra FMC ...
3,173,426 UART:
3,173,480 UART: [state] CFI Enabled
3,183,851 UART: [fht] FMC Alias Private Key: 7
3,291,548 UART: [art] Extend RT PCRs Done
3,291,976 UART: [art] Lock RT PCRs Done
3,293,934 UART: [art] Populate DV Done
3,302,053 UART: [fht] FMC Alias Private Key: 7
3,302,985 UART: [art] Derive CDI
3,303,265 UART: [art] Store in in slot 0x4
3,389,096 UART: [art] Derive Key Pair
3,389,456 UART: [art] Store priv key in slot 0x5
3,402,520 UART: [art] Derive Key Pair - Done
3,417,457 UART: [art] Signing Cert with AUTHO
3,417,937 UART: RITY.KEYID = 7
3,433,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,844 UART: [art] PUB.X = 08028D35095C3289FDCCFEA6098A25D79CD52A40476A2FF6D3536E25B7572196337B77297147848FFA93482B6A4B08E8
3,440,593 UART: [art] PUB.Y = 17EFF36FA0443C19124726B730717FB20CB8C4FABDF1E10913BD29DB2D67C2DC689E18F94A3E43D0B9F3746AFDAAC6BD
3,447,557 UART: [art] SIG.R = F4C6B48DE97F6E69DDC89C56D05D93FA62F6D7FB2091B90FF8DDC62C2BDEB4547B8ED719132B09E003B307E19C88D1E1
3,454,333 UART: [art] SIG.S = C03D557CCB73AACABB45D141009762D1AD8CB3E7A23445C6810005FC4D1A0057C2BBA3E3AB6BCE7E70F71332D9E6E579
3,477,937 UART: Caliptra RT
3,478,190 UART: [state] CFI Enabled
3,586,196 UART: [rt] RT listening for mailbox commands...
3,586,859 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,698 UART: [rt]cmd =0x46504c54, len=4
3,617,930 >>> mbox cmd response data (8 bytes)
3,618,271 UART: [rt] FIPS self test
3,618,599 UART: [kat] ++
3,618,751 UART: [kat] sha1
3,623,133 UART: [kat] SHA2-256
3,625,155 UART: [kat] SHA2-384
3,627,966 UART: [kat] SHA2-512-ACC
3,629,893 UART: [kat] ECC-384
3,639,719 UART: [kat] HMAC-384Kdf
3,644,249 UART: Fatal Error: 0x90030002
3,645,788 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,793 >>> mbox cmd response: failed
3,645,793 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,645,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,287 UART: [kat] SHA2-256
882,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,333 UART: [kat] ++
886,485 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,400 UART: [kat] LMS
1,475,596 UART: [kat] --
1,476,437 UART: [cold-reset] ++
1,476,885 UART: [fht] Storing FHT @ 0x50003400
1,479,532 UART: [idev] ++
1,479,700 UART: [idev] CDI.KEYID = 6
1,480,060 UART: [idev] SUBJECT.KEYID = 7
1,480,484 UART: [idev] UDS.KEYID = 0
1,480,829 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,505,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,022 UART: [idev] --
1,514,983 UART: [ldev] ++
1,515,151 UART: [ldev] CDI.KEYID = 6
1,515,514 UART: [ldev] SUBJECT.KEYID = 5
1,515,940 UART: [ldev] AUTHORITY.KEYID = 7
1,516,403 UART: [ldev] FE.KEYID = 1
1,521,773 UART: [ldev] Erasing FE.KEYID = 1
1,547,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,556 UART: [ldev] --
1,586,819 UART: [fwproc] Waiting for Commands...
1,587,614 UART: [fwproc] Received command 0x46574c44
1,588,405 UART: [fwproc] Received Image of size 114940 bytes
2,893,771 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,063 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,415 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,192 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 ready_for_fw is high
1,362,647 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,156 >>> mbox cmd response: success
2,997,472 UART:
2,997,488 UART: Running Caliptra FMC ...
2,997,896 UART:
2,997,950 UART: [state] CFI Enabled
3,008,157 UART: [fht] FMC Alias Private Key: 7
3,116,472 UART: [art] Extend RT PCRs Done
3,116,900 UART: [art] Lock RT PCRs Done
3,118,592 UART: [art] Populate DV Done
3,126,843 UART: [fht] FMC Alias Private Key: 7
3,127,997 UART: [art] Derive CDI
3,128,277 UART: [art] Store in in slot 0x4
3,213,862 UART: [art] Derive Key Pair
3,214,222 UART: [art] Store priv key in slot 0x5
3,227,038 UART: [art] Derive Key Pair - Done
3,241,688 UART: [art] Signing Cert with AUTHO
3,242,168 UART: RITY.KEYID = 7
3,257,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,227 UART: [art] PUB.X = 042D769EA1CAB8EDC6AA2E19E909CE66D487CED6D2B25B148C86CCAEFD056053620AB8B1403A13BA5FEA380DCAC1D8A2
3,265,008 UART: [art] PUB.Y = E4CBEF673AEE293FB406C01742EFA93E16014088D7E7D8302ABCF2453C27562761DE84ECE075D4B93115DE63FB7A58CE
3,271,964 UART: [art] SIG.R = 1B246AEA74260DD2D8F2BC93D4B6DC50718CB537211D587D01B197A53D0C457EF1F7555D24328302413D6CC5C7A7DF38
3,278,726 UART: [art] SIG.S = 47F6282BA71F7FDBD1272F13937F47647F3A091F808D784B7F228C2881EFFBE1251FD8CB747AC43B998CA8B35ABD5E99
3,302,730 UART: Caliptra RT
3,302,983 UART: [state] CFI Enabled
3,411,637 UART: [rt] RT listening for mailbox commands...
3,412,300 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,109 UART: [rt]cmd =0x46504c54, len=4
3,443,279 >>> mbox cmd response data (8 bytes)
3,443,584 UART: [rt] FIPS self test
3,443,912 UART: [kat] ++
3,444,064 UART: [kat] sha1
3,448,314 UART: [kat] SHA2-256
3,450,336 UART: [kat] SHA2-384
3,453,353 UART: [kat] SHA2-512-ACC
3,455,280 UART: [kat] ECC-384
3,465,282 UART: [kat] HMAC-384Kdf
3,469,912 UART: Fatal Error: 0x90030002
3,471,451 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,471,456 >>> mbox cmd response: failed
3,471,456 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,471,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,750 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,850 UART: [kat] SHA2-256
881,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,896 UART: [kat] ++
886,048 UART: [kat] sha1
890,160 UART: [kat] SHA2-256
892,098 UART: [kat] SHA2-384
894,671 UART: [kat] SHA2-512-ACC
896,572 UART: [kat] ECC-384
902,487 UART: [kat] HMAC-384Kdf
907,141 UART: [kat] LMS
1,475,337 UART: [kat] --
1,476,098 UART: [cold-reset] ++
1,476,462 UART: [fht] Storing FHT @ 0x50003400
1,479,401 UART: [idev] ++
1,479,569 UART: [idev] CDI.KEYID = 6
1,479,929 UART: [idev] SUBJECT.KEYID = 7
1,480,353 UART: [idev] UDS.KEYID = 0
1,480,698 ready_for_fw is high
1,480,698 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,375 UART: [idev] Erasing UDS.KEYID = 0
1,505,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,941 UART: [idev] --
1,514,874 UART: [ldev] ++
1,515,042 UART: [ldev] CDI.KEYID = 6
1,515,405 UART: [ldev] SUBJECT.KEYID = 5
1,515,831 UART: [ldev] AUTHORITY.KEYID = 7
1,516,294 UART: [ldev] FE.KEYID = 1
1,521,476 UART: [ldev] Erasing FE.KEYID = 1
1,546,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,491 UART: [ldev] --
1,585,782 UART: [fwproc] Waiting for Commands...
1,586,505 UART: [fwproc] Received command 0x46574c44
1,587,296 UART: [fwproc] Received Image of size 114940 bytes
2,891,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,942 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,105 >>> mbox cmd response: success
3,086,323 UART: [afmc] ++
3,086,491 UART: [afmc] CDI.KEYID = 6
3,086,853 UART: [afmc] SUBJECT.KEYID = 7
3,087,278 UART: [afmc] AUTHORITY.KEYID = 5
3,122,303 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,023 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,803 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,531 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,416 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,106 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,867 UART: [afmc] --
3,165,981 UART: [cold-reset] --
3,167,111 UART: [state] Locking Datavault
3,168,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,910 UART: [state] Locking ICCM
3,169,464 UART: [exit] Launching FMC @ 0x40000130
3,174,793 UART:
3,174,809 UART: Running Caliptra FMC ...
3,175,217 UART:
3,175,360 UART: [state] CFI Enabled
3,186,109 UART: [fht] FMC Alias Private Key: 7
3,294,134 UART: [art] Extend RT PCRs Done
3,294,562 UART: [art] Lock RT PCRs Done
3,296,106 UART: [art] Populate DV Done
3,304,237 UART: [fht] FMC Alias Private Key: 7
3,305,313 UART: [art] Derive CDI
3,305,593 UART: [art] Store in in slot 0x4
3,391,032 UART: [art] Derive Key Pair
3,391,392 UART: [art] Store priv key in slot 0x5
3,404,692 UART: [art] Derive Key Pair - Done
3,419,181 UART: [art] Signing Cert with AUTHO
3,419,661 UART: RITY.KEYID = 7
3,434,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,444 UART: [art] PUB.X = 33B2EAA65DA374541AED5E5A0252E2C74FB08CC5795D482872C96384DF7D03D88B70B17AFA30489D96C386041E771432
3,442,205 UART: [art] PUB.Y = C5DAB66A942FE9EDDE8BE3E8AA187AD030FD8E45102CC550401CA66CF25092C57BCBDF63861714D42CE48B47AAB92CAA
3,449,179 UART: [art] SIG.R = FCE611C1C316095C1FAA3BAF37C72A856F6935FAE3A9EF596161A43366A29F6E856F03A91DA5F9EA880CFF709AF6BC6B
3,455,958 UART: [art] SIG.S = 687C38CFF7676B60F68E4372941D707A8296A070E02641AB9C82C3B0B4764ABDB8D19BA77961B2224DB297B7D6718FA9
3,478,933 UART: Caliptra RT
3,479,278 UART: [state] CFI Enabled
3,587,171 UART: [rt] RT listening for mailbox commands...
3,587,834 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,669 UART: [rt]cmd =0x46504c54, len=4
3,618,817 >>> mbox cmd response data (8 bytes)
3,619,162 UART: [rt] FIPS self test
3,619,490 UART: [kat] ++
3,619,642 UART: [kat] sha1
3,623,944 UART: [kat] SHA2-256
3,625,966 UART: [kat] SHA2-384
3,628,825 UART: [kat] SHA2-512-ACC
3,630,752 UART: [kat] ECC-384
3,640,950 UART: [kat] HMAC-384Kdf
3,645,412 UART: Fatal Error: 0x90030002
3,646,951 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,646,956 >>> mbox cmd response: failed
3,646,956 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,646,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,846 UART: [kat] SHA2-256
892,784 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
903,101 UART: [kat] HMAC-384Kdf
907,745 UART: [kat] LMS
1,475,941 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,508 UART: [fht] Storing FHT @ 0x50003400
1,480,261 UART: [idev] ++
1,480,429 UART: [idev] CDI.KEYID = 6
1,480,789 UART: [idev] SUBJECT.KEYID = 7
1,481,213 UART: [idev] UDS.KEYID = 0
1,481,558 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,141 UART: [idev] Erasing UDS.KEYID = 0
1,505,873 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,393 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,304 UART: [ldev] Erasing FE.KEYID = 1
1,547,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,125 UART: [ldev] --
1,587,576 UART: [fwproc] Waiting for Commands...
1,588,233 UART: [fwproc] Received command 0x46574c44
1,589,024 UART: [fwproc] Received Image of size 114940 bytes
2,893,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,987 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 ready_for_fw is high
1,362,588 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,589 >>> mbox cmd response: success
2,998,063 UART:
2,998,079 UART: Running Caliptra FMC ...
2,998,487 UART:
2,998,630 UART: [state] CFI Enabled
3,009,077 UART: [fht] FMC Alias Private Key: 7
3,117,374 UART: [art] Extend RT PCRs Done
3,117,802 UART: [art] Lock RT PCRs Done
3,118,902 UART: [art] Populate DV Done
3,127,333 UART: [fht] FMC Alias Private Key: 7
3,128,299 UART: [art] Derive CDI
3,128,579 UART: [art] Store in in slot 0x4
3,214,400 UART: [art] Derive Key Pair
3,214,760 UART: [art] Store priv key in slot 0x5
3,228,148 UART: [art] Derive Key Pair - Done
3,242,820 UART: [art] Signing Cert with AUTHO
3,243,300 UART: RITY.KEYID = 7
3,258,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,983 UART: [art] PUB.X = 657F5179A42F7AE92FEDC276917C0DEB7DEE58F9A5E34A3B915967BDE8FF1F92B36E47FA621289097E2E7467AFD44FB3
3,265,761 UART: [art] PUB.Y = 489B78693A0F1E72FC9BE8C9937E543D8CEAA71A023F69EB0CAA92A462E19449EDBDFF90BAF64B78D066A2D7B3B69D06
3,272,717 UART: [art] SIG.R = 506A68EED7E0026CE1CAA1A69AD01CD894F5E9F2C0612E68E56D6B7C0721EEABD3750A86CC344AC7648F499A2F30B55B
3,279,494 UART: [art] SIG.S = AFDC795DEC90776324E0B0624FE63B04481E76F271B246B0DD8CC29D41B2E80F1B2FC2F4ADF78F8A9E413DE375E5F785
3,303,319 UART: Caliptra RT
3,303,664 UART: [state] CFI Enabled
3,412,127 UART: [rt] RT listening for mailbox commands...
3,412,790 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,779 UART: [rt]cmd =0x46504c54, len=4
3,444,039 >>> mbox cmd response data (8 bytes)
3,444,218 UART: [rt] FIPS self test
3,444,546 UART: [kat] ++
3,444,698 UART: [kat] sha1
3,448,920 UART: [kat] SHA2-256
3,450,942 UART: [kat] SHA2-384
3,453,947 UART: [kat] SHA2-512-ACC
3,455,874 UART: [kat] ECC-384
3,465,978 UART: [kat] HMAC-384Kdf
3,470,514 UART: Fatal Error: 0x90030002
3,472,053 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,472,058 >>> mbox cmd response: failed
3,472,058 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,472,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,108 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,691 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
893,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,009 UART: [kat] ++
898,161 UART: [kat] sha1
902,639 UART: [kat] SHA2-256
904,579 UART: [kat] SHA2-384
907,362 UART: [kat] SHA2-512-ACC
909,263 UART: [kat] ECC-384
918,800 UART: [kat] HMAC-384Kdf
923,434 UART: [kat] LMS
1,171,762 UART: [kat] --
1,172,629 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,758 UART: [idev] ++
1,175,926 UART: [idev] CDI.KEYID = 6
1,176,286 UART: [idev] SUBJECT.KEYID = 7
1,176,710 UART: [idev] UDS.KEYID = 0
1,177,055 ready_for_fw is high
1,177,055 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,914 UART: [idev] Erasing UDS.KEYID = 0
1,201,963 UART: [idev] Sha1 KeyId Algorithm
1,210,417 UART: [idev] --
1,211,503 UART: [ldev] ++
1,211,671 UART: [ldev] CDI.KEYID = 6
1,212,034 UART: [ldev] SUBJECT.KEYID = 5
1,212,460 UART: [ldev] AUTHORITY.KEYID = 7
1,212,923 UART: [ldev] FE.KEYID = 1
1,217,919 UART: [ldev] Erasing FE.KEYID = 1
1,244,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,087 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,283,976 UART: [fwproc] Recv command 0x46574c44
1,284,704 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,258 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,901 >>> mbox cmd response: success
2,783,919 UART: [afmc] ++
2,784,087 UART: [afmc] CDI.KEYID = 6
2,784,449 UART: [afmc] SUBJECT.KEYID = 7
2,784,874 UART: [afmc] AUTHORITY.KEYID = 5
2,820,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,943 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,662 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,458 UART: [afmc] --
2,863,374 UART: [cold-reset] --
2,864,136 UART: [state] Locking Datavault
2,865,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,953 UART: [state] Locking ICCM
2,866,379 UART: [exit] Launching FMC @ 0x40000130
2,871,708 UART:
2,871,724 UART: Running Caliptra FMC ...
2,872,132 UART:
2,872,186 UART: [state] CFI Enabled
2,882,523 UART: [fht] FMC Alias Private Key: 7
2,990,762 UART: [art] Extend RT PCRs Done
2,991,190 UART: [art] Lock RT PCRs Done
2,992,352 UART: [art] Populate DV Done
3,000,669 UART: [fht] FMC Alias Private Key: 7
3,001,723 UART: [art] Derive CDI
3,002,003 UART: [art] Store in in slot 0x4
3,087,784 UART: [art] Derive Key Pair
3,088,144 UART: [art] Store priv key in slot 0x5
3,101,448 UART: [art] Derive Key Pair - Done
3,116,138 UART: [art] Signing Cert with AUTHO
3,116,618 UART: RITY.KEYID = 7
3,131,472 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,237 UART: [art] PUB.X = A80B8A31559BA223C2EF75A41FF5DCA5D782CCDD20DBA53834FD9D7E0B8F77CDF14144375194F8EBA955564E797A5D78
3,139,015 UART: [art] PUB.Y = 895D92F60B8357FD5F4F03256369671065C6D99448BB36BA2F4B2D40953A38D15E05BC76D952410D2599638D45E6684D
3,145,943 UART: [art] SIG.R = 0954B0F18A1B39FBA1E086DCD72F922493680A9208606E49EFD31231D9FDCDD92C30BE90584E48181AACBEB0A02134C7
3,152,712 UART: [art] SIG.S = DAF3FE506A63B8852CE596FE5263F305C78CBA8DA71B30F4478CEF46061F403A1407F4A22805EB11F8805AA7192E4724
3,177,681 UART: Caliptra RT
3,177,934 UART: [state] CFI Enabled
3,286,721 UART: [rt] RT listening for mailbox commands...
3,287,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,249 UART: [rt]cmd =0x46504c54, len=4
3,318,223 >>> mbox cmd response data (8 bytes)
3,318,456 UART: [rt] FIPS self test
3,318,784 UART: [kat] ++
3,318,936 UART: [kat] sha1
3,323,262 UART: [kat] SHA2-256
3,325,284 UART: [kat] SHA2-384
3,328,105 UART: [kat] SHA2-512-ACC
3,330,032 UART: [kat] ECC-384
3,340,280 UART: [kat] HMAC-384Kdf
3,344,752 UART: Fatal Error: 0x90030002
3,346,291 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,346,296 >>> mbox cmd response: failed
3,346,296 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,346,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,900 UART: [kat] SHA2-256
893,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,675 UART: [kat] ++
897,827 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,894 UART: [kat] SHA2-512-ACC
908,795 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
923,022 UART: [kat] LMS
1,171,350 UART: [kat] --
1,172,499 UART: [cold-reset] ++
1,173,031 UART: [fht] FHT @ 0x50003400
1,175,774 UART: [idev] ++
1,175,942 UART: [idev] CDI.KEYID = 6
1,176,302 UART: [idev] SUBJECT.KEYID = 7
1,176,726 UART: [idev] UDS.KEYID = 0
1,177,071 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,976 UART: [idev] Erasing UDS.KEYID = 0
1,201,657 UART: [idev] Sha1 KeyId Algorithm
1,210,287 UART: [idev] --
1,211,227 UART: [ldev] ++
1,211,395 UART: [ldev] CDI.KEYID = 6
1,211,758 UART: [ldev] SUBJECT.KEYID = 5
1,212,184 UART: [ldev] AUTHORITY.KEYID = 7
1,212,647 UART: [ldev] FE.KEYID = 1
1,217,697 UART: [ldev] Erasing FE.KEYID = 1
1,244,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,329 UART: [ldev] --
1,283,646 UART: [fwproc] Wait for Commands...
1,284,344 UART: [fwproc] Recv command 0x46574c44
1,285,072 UART: [fwproc] Recv'd Img size: 114940 bytes
2,592,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,934 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,785,729 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 ready_for_fw is high
1,060,527 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,516 >>> mbox cmd response: success
2,696,068 UART:
2,696,084 UART: Running Caliptra FMC ...
2,696,492 UART:
2,696,546 UART: [state] CFI Enabled
2,707,199 UART: [fht] FMC Alias Private Key: 7
2,815,436 UART: [art] Extend RT PCRs Done
2,815,864 UART: [art] Lock RT PCRs Done
2,817,072 UART: [art] Populate DV Done
2,825,403 UART: [fht] FMC Alias Private Key: 7
2,826,513 UART: [art] Derive CDI
2,826,793 UART: [art] Store in in slot 0x4
2,912,438 UART: [art] Derive Key Pair
2,912,798 UART: [art] Store priv key in slot 0x5
2,925,504 UART: [art] Derive Key Pair - Done
2,940,126 UART: [art] Signing Cert with AUTHO
2,940,606 UART: RITY.KEYID = 7
2,955,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,405 UART: [art] PUB.X = 97AA92C9C04457021E2D45D3905F62DE5493E9ED58D97CA73CD1C90A8BC00BFA7463C6EA6735C669CCE7827C1BE92489
2,963,174 UART: [art] PUB.Y = B97197E6D1E70161697773BA0A6EA7FDAFE7C18C4A2C7C466B4ED239D04B88FAC1BC3B05DD4D3141733B687809DCC671
2,970,124 UART: [art] SIG.R = C9F82F36BBC19017AD271F7BF43B926883CC58C90E2C28EB1C83A4FB9473A74D877EDF5B4C9E3055E341A9DB75EA7B8E
2,976,907 UART: [art] SIG.S = D9403BE9BF71BD46B51B1EC49B7851104954F0E706B84DE0B9CFFEA58113F3D1866F77B0B045321291E30A2750E7B66C
3,000,960 UART: Caliptra RT
3,001,213 UART: [state] CFI Enabled
3,108,781 UART: [rt] RT listening for mailbox commands...
3,109,444 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,253 UART: [rt]cmd =0x46504c54, len=4
3,140,357 >>> mbox cmd response data (8 bytes)
3,140,648 UART: [rt] FIPS self test
3,140,976 UART: [kat] ++
3,141,128 UART: [kat] sha1
3,145,394 UART: [kat] SHA2-256
3,147,416 UART: [kat] SHA2-384
3,150,255 UART: [kat] SHA2-512-ACC
3,152,182 UART: [kat] ECC-384
3,162,466 UART: [kat] HMAC-384Kdf
3,166,882 UART: Fatal Error: 0x90030002
3,168,421 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,168,426 >>> mbox cmd response: failed
3,168,426 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,168,431 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,523 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,916 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,779 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,416 UART: [cold-reset] ++
1,172,828 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 ready_for_fw is high
1,176,680 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,373 UART: [idev] Erasing UDS.KEYID = 0
1,200,808 UART: [idev] Sha1 KeyId Algorithm
1,209,468 UART: [idev] --
1,210,680 UART: [ldev] ++
1,210,848 UART: [ldev] CDI.KEYID = 6
1,211,211 UART: [ldev] SUBJECT.KEYID = 5
1,211,637 UART: [ldev] AUTHORITY.KEYID = 7
1,212,100 UART: [ldev] FE.KEYID = 1
1,217,434 UART: [ldev] Erasing FE.KEYID = 1
1,244,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,922 UART: [ldev] --
1,283,339 UART: [fwproc] Wait for Commands...
1,283,947 UART: [fwproc] Recv command 0x46574c44
1,284,675 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,813 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,784,480 >>> mbox cmd response: success
2,785,596 UART: [afmc] ++
2,785,764 UART: [afmc] CDI.KEYID = 6
2,786,126 UART: [afmc] SUBJECT.KEYID = 7
2,786,551 UART: [afmc] AUTHORITY.KEYID = 5
2,821,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,058 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,777 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,675 UART: [afmc] --
2,864,645 UART: [cold-reset] --
2,865,343 UART: [state] Locking Datavault
2,866,580 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,184 UART: [state] Locking ICCM
2,867,840 UART: [exit] Launching FMC @ 0x40000130
2,873,169 UART:
2,873,185 UART: Running Caliptra FMC ...
2,873,593 UART:
2,873,736 UART: [state] CFI Enabled
2,884,321 UART: [fht] FMC Alias Private Key: 7
2,992,452 UART: [art] Extend RT PCRs Done
2,992,880 UART: [art] Lock RT PCRs Done
2,994,484 UART: [art] Populate DV Done
3,002,657 UART: [fht] FMC Alias Private Key: 7
3,003,701 UART: [art] Derive CDI
3,003,981 UART: [art] Store in in slot 0x4
3,089,820 UART: [art] Derive Key Pair
3,090,180 UART: [art] Store priv key in slot 0x5
3,103,422 UART: [art] Derive Key Pair - Done
3,118,508 UART: [art] Signing Cert with AUTHO
3,118,988 UART: RITY.KEYID = 7
3,133,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,667 UART: [art] PUB.X = 3B2D5ADC3C7EDC212B592A22D14BAB5BF41F8EE706FB324F003C334447EA82F28EF1556B9919AD10ECE49CCAE09C376C
3,141,432 UART: [art] PUB.Y = 667EF5DB35792A7BF165BCBB758A5CB8B33EB398EA09C233EE59EAE44BF90FA61983BC299219840E25FF86DF44CB8BC2
3,148,391 UART: [art] SIG.R = 368737F26C80AFBAC29C7BC182D8362FC8AC13D56A472DF332D9DC4CBD2BE0F29E9E0366EA671AA9297737C6578A7DAB
3,155,174 UART: [art] SIG.S = 116C320FB7A5BF93C8BA03BB5D0194A04C19694B734CABBF4E8186A0378944F6985B8BEA4C42B62AC021DE55D79EBCD6
3,179,462 UART: Caliptra RT
3,179,807 UART: [state] CFI Enabled
3,287,680 UART: [rt] RT listening for mailbox commands...
3,288,343 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,108 UART: [rt]cmd =0x46504c54, len=4
3,319,202 >>> mbox cmd response data (8 bytes)
3,319,431 UART: [rt] FIPS self test
3,319,759 UART: [kat] ++
3,319,911 UART: [kat] sha1
3,324,333 UART: [kat] SHA2-256
3,326,355 UART: [kat] SHA2-384
3,329,190 UART: [kat] SHA2-512-ACC
3,331,117 UART: [kat] ECC-384
3,341,339 UART: [kat] HMAC-384Kdf
3,345,959 UART: Fatal Error: 0x90030002
3,347,498 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,347,503 >>> mbox cmd response: failed
3,347,503 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,347,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
902,028 UART: [kat] SHA2-256
903,968 UART: [kat] SHA2-384
906,793 UART: [kat] SHA2-512-ACC
908,694 UART: [kat] ECC-384
917,853 UART: [kat] HMAC-384Kdf
922,567 UART: [kat] LMS
1,170,895 UART: [kat] --
1,171,786 UART: [cold-reset] ++
1,172,116 UART: [fht] FHT @ 0x50003400
1,174,837 UART: [idev] ++
1,175,005 UART: [idev] CDI.KEYID = 6
1,175,365 UART: [idev] SUBJECT.KEYID = 7
1,175,789 UART: [idev] UDS.KEYID = 0
1,176,134 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,033 UART: [idev] Erasing UDS.KEYID = 0
1,201,638 UART: [idev] Sha1 KeyId Algorithm
1,210,260 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,218,228 UART: [ldev] Erasing FE.KEYID = 1
1,245,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,002 UART: [ldev] --
1,284,367 UART: [fwproc] Wait for Commands...
1,285,079 UART: [fwproc] Recv command 0x46574c44
1,285,807 UART: [fwproc] Recv'd Img size: 114940 bytes
2,591,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,775 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,784,474 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,988 ready_for_fw is high
1,060,988 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,637,379 >>> mbox cmd response: success
2,700,291 UART:
2,700,307 UART: Running Caliptra FMC ...
2,700,715 UART:
2,700,858 UART: [state] CFI Enabled
2,711,283 UART: [fht] FMC Alias Private Key: 7
2,819,014 UART: [art] Extend RT PCRs Done
2,819,442 UART: [art] Lock RT PCRs Done
2,821,282 UART: [art] Populate DV Done
2,829,447 UART: [fht] FMC Alias Private Key: 7
2,830,573 UART: [art] Derive CDI
2,830,853 UART: [art] Store in in slot 0x4
2,916,526 UART: [art] Derive Key Pair
2,916,886 UART: [art] Store priv key in slot 0x5
2,930,714 UART: [art] Derive Key Pair - Done
2,945,330 UART: [art] Signing Cert with AUTHO
2,945,810 UART: RITY.KEYID = 7
2,960,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,689 UART: [art] PUB.X = E676DB14164A72D382F2BE5777BC2919AC06128099F0BDDF50F7ACF4E0BB0F454B10092B557E9BB3CBE9BCCA38A899C6
2,968,466 UART: [art] PUB.Y = 67BA7F0FA65A7B3BBF4E8068E5A9FA443338FD9879F65180A85EC18A937A63215C5D43DF504E6CAD0D184C8253DF2599
2,975,418 UART: [art] SIG.R = 012E12FAD7B1741D54B577EA6E35820FED71C9B8D0F063E13BED15EDE55939E7FA52E29049010ED8385CA41945B3BB15
2,982,184 UART: [art] SIG.S = 4C76EC44BD070FC2FA2516FEFB92C2A635FDCCCDD80F9AA63678C2ADFD6F111B6E2299C29AFA4103F7BBD65782B1167F
3,006,061 UART: Caliptra RT
3,006,406 UART: [state] CFI Enabled
3,114,243 UART: [rt] RT listening for mailbox commands...
3,114,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,375 UART: [rt]cmd =0x46504c54, len=4
3,145,553 >>> mbox cmd response data (8 bytes)
3,145,876 UART: [rt] FIPS self test
3,146,204 UART: [kat] ++
3,146,356 UART: [kat] sha1
3,150,356 UART: [kat] SHA2-256
3,152,378 UART: [kat] SHA2-384
3,155,021 UART: [kat] SHA2-512-ACC
3,156,948 UART: [kat] ECC-384
3,167,104 UART: [kat] HMAC-384Kdf
3,172,002 UART: Fatal Error: 0x90030002
3,173,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,173,546 >>> mbox cmd response: failed
3,173,546 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,173,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,819 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,582 UART: [kat] HMAC-384Kdf
919,976 UART: [kat] LMS
1,168,288 UART: [kat] --
1,168,913 UART: [cold-reset] ++
1,169,359 UART: [fht] FHT @ 0x50003400
1,172,101 UART: [idev] ++
1,172,269 UART: [idev] CDI.KEYID = 6
1,172,630 UART: [idev] SUBJECT.KEYID = 7
1,173,055 UART: [idev] UDS.KEYID = 0
1,173,401 ready_for_fw is high
1,173,401 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,551 UART: [idev] Sha1 KeyId Algorithm
1,207,351 UART: [idev] --
1,208,530 UART: [ldev] ++
1,208,698 UART: [ldev] CDI.KEYID = 6
1,209,062 UART: [ldev] SUBJECT.KEYID = 5
1,209,489 UART: [ldev] AUTHORITY.KEYID = 7
1,209,952 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,240,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,588 UART: [ldev] --
1,280,104 UART: [fwproc] Wait for Commands...
1,280,835 UART: [fwproc] Recv command 0x46574c44
1,281,568 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,765 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,413 >>> mbox cmd response: success
2,780,458 UART: [afmc] ++
2,780,626 UART: [afmc] CDI.KEYID = 6
2,780,989 UART: [afmc] SUBJECT.KEYID = 7
2,781,415 UART: [afmc] AUTHORITY.KEYID = 5
2,816,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,604 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,683 UART: [afmc] --
2,860,689 UART: [cold-reset] --
2,861,589 UART: [state] Locking Datavault
2,862,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,288 UART: [state] Locking ICCM
2,863,756 UART: [exit] Launching FMC @ 0x40000130
2,869,085 UART:
2,869,101 UART: Running Caliptra FMC ...
2,869,509 UART:
2,869,563 UART: [state] CFI Enabled
2,880,316 UART: [fht] FMC Alias Private Key: 7
2,987,635 UART: [art] Extend RT PCRs Done
2,988,063 UART: [art] Lock RT PCRs Done
2,989,567 UART: [art] Populate DV Done
2,998,090 UART: [fht] FMC Alias Private Key: 7
2,999,026 UART: [art] Derive CDI
2,999,306 UART: [art] Store in in slot 0x4
3,085,007 UART: [art] Derive Key Pair
3,085,367 UART: [art] Store priv key in slot 0x5
3,098,907 UART: [art] Derive Key Pair - Done
3,113,575 UART: [art] Signing Cert with AUTHO
3,114,055 UART: RITY.KEYID = 7
3,129,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,980 UART: [art] PUB.X = 37D8D7BEB23D33D7AF94308D5D09B6D8D6294FFA5C0493225834CB5D2D5C8A1A74A88D977F66E6B0D5FF3D496A340E3F
3,136,753 UART: [art] PUB.Y = 41A2316FF58FB066B1A98D25D43F772E64186C0A3DD41AD1EE72516E6A30557182BF8D64DF5A3BD9E613F14A761127E4
3,143,704 UART: [art] SIG.R = 0967A4CFCE2BD64BC4A83FBC88996235B5FF2965913F5F48EAA076D4444429621049FA7A48FE0E77158669C18BAD538B
3,150,472 UART: [art] SIG.S = 2E1CCEE265535BA0C734A27151971ADA0DADCB2C467FB70A87A89A3D70B3DE1A51AA5DA8A0F4CF9E5A09D13A4FBF6710
3,174,554 UART: Caliptra RT
3,174,807 UART: [state] CFI Enabled
3,282,976 UART: [rt] RT listening for mailbox commands...
3,283,639 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,756 UART: [rt]cmd =0x46504c54, len=4
3,314,984 >>> mbox cmd response data (8 bytes)
3,315,181 UART: [rt] FIPS self test
3,315,509 UART: [kat] ++
3,315,661 UART: [kat] sha1
3,320,087 UART: [kat] SHA2-256
3,322,109 UART: [kat] SHA2-384
3,325,070 UART: [kat] SHA2-512-ACC
3,326,997 UART: [kat] ECC-384
3,336,769 UART: [kat] HMAC-384Kdf
3,341,591 UART: Fatal Error: 0x90030002
3,343,130 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,343,135 >>> mbox cmd response: failed
3,343,135 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,343,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,662 UART: [kat] SHA2-512-ACC
906,563 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,174,647 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,198,901 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,534 UART: [ldev] --
1,280,984 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x46574c44
1,282,310 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,448 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,757 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,451 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,964 ready_for_fw is high
1,056,964 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,837 >>> mbox cmd response: success
2,693,089 UART:
2,693,105 UART: Running Caliptra FMC ...
2,693,513 UART:
2,693,567 UART: [state] CFI Enabled
2,703,786 UART: [fht] FMC Alias Private Key: 7
2,811,923 UART: [art] Extend RT PCRs Done
2,812,351 UART: [art] Lock RT PCRs Done
2,813,715 UART: [art] Populate DV Done
2,822,144 UART: [fht] FMC Alias Private Key: 7
2,823,310 UART: [art] Derive CDI
2,823,590 UART: [art] Store in in slot 0x4
2,908,805 UART: [art] Derive Key Pair
2,909,165 UART: [art] Store priv key in slot 0x5
2,922,631 UART: [art] Derive Key Pair - Done
2,937,619 UART: [art] Signing Cert with AUTHO
2,938,099 UART: RITY.KEYID = 7
2,952,777 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,542 UART: [art] PUB.X = 466CBDCB1935BA4BD5CF215C7DA59897090ADE44E6EF3AEACD425057ACB434BEED9CAB5BF2526CF72EEB581329F2860C
2,960,329 UART: [art] PUB.Y = DBE97A3ABE03706103F27EE269ACC51672F39308DC2BCE805DD5919862DA29A07B52D8991B5EB59D8D474406BCC3ADC1
2,967,279 UART: [art] SIG.R = 940FA492EA99E2AEF6CD8C09758C455E971049FAE09AA3E666557B5DF580285DBB852436A6A8A5FCB7E27736D9835F17
2,974,049 UART: [art] SIG.S = 89078DF838526579D8A5E2DFD0B50A0033F381BDFCA0E99688A8D976D6FFFAF02FE05153BB4AB0EE5D8B20B1F4867809
2,997,823 UART: Caliptra RT
2,998,076 UART: [state] CFI Enabled
3,105,372 UART: [rt] RT listening for mailbox commands...
3,106,035 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,804 UART: [rt]cmd =0x46504c54, len=4
3,136,848 >>> mbox cmd response data (8 bytes)
3,137,057 UART: [rt] FIPS self test
3,137,385 UART: [kat] ++
3,137,537 UART: [kat] sha1
3,141,967 UART: [kat] SHA2-256
3,143,989 UART: [kat] SHA2-384
3,146,864 UART: [kat] SHA2-512-ACC
3,148,791 UART: [kat] ECC-384
3,158,999 UART: [kat] HMAC-384Kdf
3,163,729 UART: Fatal Error: 0x90030002
3,165,268 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,165,273 >>> mbox cmd response: failed
3,165,273 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,165,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,627,735 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,984 UART: [kat] ++
896,136 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
905,093 UART: [kat] SHA2-512-ACC
906,994 UART: [kat] ECC-384
916,799 UART: [kat] HMAC-384Kdf
921,645 UART: [kat] LMS
1,169,957 UART: [kat] --
1,170,742 UART: [cold-reset] ++
1,171,068 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,175,070 ready_for_fw is high
1,175,070 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,155 UART: [ldev] ++
1,209,323 UART: [ldev] CDI.KEYID = 6
1,209,687 UART: [ldev] SUBJECT.KEYID = 5
1,210,114 UART: [ldev] AUTHORITY.KEYID = 7
1,210,577 UART: [ldev] FE.KEYID = 1
1,215,995 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,857 UART: [fwproc] Wait for Commands...
1,282,486 UART: [fwproc] Recv command 0x46574c44
1,283,219 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,876 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,528 >>> mbox cmd response: success
2,782,737 UART: [afmc] ++
2,782,905 UART: [afmc] CDI.KEYID = 6
2,783,268 UART: [afmc] SUBJECT.KEYID = 7
2,783,694 UART: [afmc] AUTHORITY.KEYID = 5
2,819,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,770 UART: [afmc] --
2,862,704 UART: [cold-reset] --
2,863,472 UART: [state] Locking Datavault
2,864,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,107 UART: [state] Locking ICCM
2,865,781 UART: [exit] Launching FMC @ 0x40000130
2,871,110 UART:
2,871,126 UART: Running Caliptra FMC ...
2,871,534 UART:
2,871,677 UART: [state] CFI Enabled
2,882,280 UART: [fht] FMC Alias Private Key: 7
2,990,609 UART: [art] Extend RT PCRs Done
2,991,037 UART: [art] Lock RT PCRs Done
2,992,423 UART: [art] Populate DV Done
3,000,492 UART: [fht] FMC Alias Private Key: 7
3,001,464 UART: [art] Derive CDI
3,001,744 UART: [art] Store in in slot 0x4
3,087,649 UART: [art] Derive Key Pair
3,088,009 UART: [art] Store priv key in slot 0x5
3,101,139 UART: [art] Derive Key Pair - Done
3,115,913 UART: [art] Signing Cert with AUTHO
3,116,393 UART: RITY.KEYID = 7
3,131,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,276 UART: [art] PUB.X = 11F057F30934302270CE6F50DB1974EF375FE14383BD0FF9D2DB67F7BFDA7398300F4B5586F2BE56E80FE7FDFDD443F7
3,139,046 UART: [art] PUB.Y = 9D4D66CB3D19BEC134797B0311CEE7B671E90B6CD1009BA5CCAEC10F07AA194DF00DBE8FA83FFF0FBE44AE78A40D090B
3,145,975 UART: [art] SIG.R = E6F22C1CA7666EC64EB27F2CEE842C8E4E1B39DADA85D20CC54E16515FB0ED758A8B46A3C0620A2DD083B72FDA6A53AC
3,152,763 UART: [art] SIG.S = D331BA52D8E27CFED1F3268B4268F9AB4784D0318F5B519EE81A3ADE627E9EF7CCEE0958186E3FF2859414EEBE827A66
3,176,361 UART: Caliptra RT
3,176,706 UART: [state] CFI Enabled
3,285,744 UART: [rt] RT listening for mailbox commands...
3,286,407 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,216 UART: [rt]cmd =0x46504c54, len=4
3,317,396 >>> mbox cmd response data (8 bytes)
3,317,685 UART: [rt] FIPS self test
3,318,013 UART: [kat] ++
3,318,165 UART: [kat] sha1
3,322,259 UART: [kat] SHA2-256
3,324,281 UART: [kat] SHA2-384
3,327,152 UART: [kat] SHA2-512-ACC
3,329,079 UART: [kat] ECC-384
3,339,363 UART: [kat] HMAC-384Kdf
3,344,061 UART: Fatal Error: 0x90030002
3,345,600 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,345,605 >>> mbox cmd response: failed
3,345,605 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,345,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,523 UART: [kat] HMAC-384Kdf
921,165 UART: [kat] LMS
1,169,477 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,222 UART: [idev] ++
1,173,390 UART: [idev] CDI.KEYID = 6
1,173,751 UART: [idev] SUBJECT.KEYID = 7
1,174,176 UART: [idev] UDS.KEYID = 0
1,174,522 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,811 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,038 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,712 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,781 ready_for_fw is high
1,056,781 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,988 >>> mbox cmd response: success
2,693,414 UART:
2,693,430 UART: Running Caliptra FMC ...
2,693,838 UART:
2,693,981 UART: [state] CFI Enabled
2,704,674 UART: [fht] FMC Alias Private Key: 7
2,812,449 UART: [art] Extend RT PCRs Done
2,812,877 UART: [art] Lock RT PCRs Done
2,814,623 UART: [art] Populate DV Done
2,822,992 UART: [fht] FMC Alias Private Key: 7
2,823,990 UART: [art] Derive CDI
2,824,270 UART: [art] Store in in slot 0x4
2,910,365 UART: [art] Derive Key Pair
2,910,725 UART: [art] Store priv key in slot 0x5
2,924,229 UART: [art] Derive Key Pair - Done
2,939,202 UART: [art] Signing Cert with AUTHO
2,939,682 UART: RITY.KEYID = 7
2,954,472 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,237 UART: [art] PUB.X = 2F540C7421E73247CAF8D85534F8E2BB6FFAD87E30B1FF2D43736AD6D7ABA59A5D54A72C32A1410198F317589603F1AD
2,962,006 UART: [art] PUB.Y = 7D098C6A91ADCEBCE10141AB7B0A25C5A8F92C786A904D3916F20DBAE6C2E79F646D841D9C5DBB0BEF71B5F033D668A3
2,968,961 UART: [art] SIG.R = 84A730EFB3F0522B6C8CE842CC26FB7ABA60C46B58CEE30B54BE1DAD1B70E1EDFC339F0AA7AFA6C6DC648B6EE24B00F7
2,975,735 UART: [art] SIG.S = DC23C9F3F8B3BB8363CA2B511F360C659E13B77D0FF51E11309434187EACF70B61D5EC7142375A4ADD411372DFACFF8C
3,000,059 UART: Caliptra RT
3,000,404 UART: [state] CFI Enabled
3,107,098 UART: [rt] RT listening for mailbox commands...
3,107,761 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,570 UART: [rt]cmd =0x46504c54, len=4
3,138,628 >>> mbox cmd response data (8 bytes)
3,138,855 UART: [rt] FIPS self test
3,139,183 UART: [kat] ++
3,139,335 UART: [kat] sha1
3,143,695 UART: [kat] SHA2-256
3,145,717 UART: [kat] SHA2-384
3,148,658 UART: [kat] SHA2-512-ACC
3,150,585 UART: [kat] ECC-384
3,160,715 UART: [kat] HMAC-384Kdf
3,165,471 UART: Fatal Error: 0x90030002
3,167,010 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,015 >>> mbox cmd response: failed
3,167,015 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,167,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,487 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,896 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
8,191,603 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,335,327 >>> mbox cmd response: failed
8,335,911 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,478,782 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
4,861,389 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,441,520 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
8,191,572 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,335,329 >>> mbox cmd response: failed
8,335,889 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,478,772 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
4,861,739 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,421,939 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
8,499,123 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,642,723 >>> mbox cmd response: failed
8,643,294 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,786,171 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
16,261,225 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
29,702,944 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
8,498,446 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,642,238 >>> mbox cmd response: failed
8,642,816 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
8,785,682 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
16,267,730 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
29,710,684 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
5,721,832 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,866,018 >>> mbox cmd response: failed
5,866,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,009,921 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,461,232 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,291,322 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,709 writing to cptra_bootfsm_go
5,716,366 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,861,026 >>> mbox cmd response: failed
5,861,852 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,005,153 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,447,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,303,660 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
6,067,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,211,985 >>> mbox cmd response: failed
6,212,558 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,355,822 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,296,170 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,021,648 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
6,072,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,216,368 >>> mbox cmd response: failed
6,216,938 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,360,220 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,287,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,012,213 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
5,738,147 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,882,296 >>> mbox cmd response: failed
5,882,843 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,026,014 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,447,368 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,257,686 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
5,732,822 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
5,877,198 >>> mbox cmd response: failed
5,877,767 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,022,677 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,476,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,317,525 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
6,070,094 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,214,197 >>> mbox cmd response: failed
6,214,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,358,016 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
17,297,820 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,022,714 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
6,070,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,214,922 >>> mbox cmd response: failed
6,215,475 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
6,359,327 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,293,917 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
28,003,514 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,706 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,714 >>> mbox cmd response: failed
1,097,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,979 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,029 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,626 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,634 >>> mbox cmd response: failed
1,097,634 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,819 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,639,933 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,781 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,789 >>> mbox cmd response: failed
1,097,789 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,192 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,525 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,533 >>> mbox cmd response: failed
1,098,533 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,368 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,818 >>> mbox cmd response: failed
1,097,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,981 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,349 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,604 >>> mbox cmd response: failed
1,097,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,713 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,817 >>> mbox cmd response: failed
1,097,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,552 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,479 >>> mbox cmd response: failed
1,098,479 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,308 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,770 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,778 >>> mbox cmd response: failed
1,097,778 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,445 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,554 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,562 >>> mbox cmd response: failed
1,097,562 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,097,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,215 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,869 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,039 >>> mbox cmd response: failed
1,098,039 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,390 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,258 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,647 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,655 >>> mbox cmd response: failed
1,098,655 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,098,661 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,984 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,153 UART:
192,538 UART: Running Caliptra ROM ...
193,626 UART:
193,767 UART: [state] CFI Enabled
262,032 UART: [state] LifecycleState = Unprovisioned
263,966 UART: [state] DebugLocked = No
265,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,382 UART: [kat] SHA2-256
441,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,565 UART: [kat] ++
452,176 UART: [kat] sha1
462,773 UART: [kat] SHA2-256
465,430 UART: [kat] SHA2-384
471,532 UART: [kat] SHA2-512-ACC
473,879 UART: [kat] ECC-384
2,767,837 UART: [kat] HMAC-384Kdf
2,799,344 UART: [kat] LMS
3,989,646 UART: [kat] --
3,992,086 UART: [cold-reset] ++
3,994,527 UART: [fht] Storing FHT @ 0x50003400
4,007,580 UART: [idev] ++
4,008,155 UART: [idev] CDI.KEYID = 6
4,009,197 UART: [idev] SUBJECT.KEYID = 7
4,010,380 UART: [idev] UDS.KEYID = 0
4,011,460 ready_for_fw is high
4,011,692 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,156,417 UART: [idev] Erasing UDS.KEYID = 0
7,344,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,461 UART: [idev] --
7,368,358 UART: [ldev] ++
7,368,943 UART: [ldev] CDI.KEYID = 6
7,369,885 UART: [ldev] SUBJECT.KEYID = 5
7,371,061 UART: [ldev] AUTHORITY.KEYID = 7
7,372,375 UART: [ldev] FE.KEYID = 1
7,401,635 UART: [ldev] Erasing FE.KEYID = 1
10,730,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,804 UART: [ldev] --
13,094,399 UART: [fwproc] Waiting for Commands...
13,096,289 UART: [fwproc] Received command 0x46574c44
13,098,478 UART: [fwproc] Received Image of size 114632 bytes
17,153,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,128 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,619,442 >>> mbox cmd response: success
17,623,904 UART: [afmc] ++
17,624,521 UART: [afmc] CDI.KEYID = 6
17,625,440 UART: [afmc] SUBJECT.KEYID = 7
17,626,656 UART: [afmc] AUTHORITY.KEYID = 5
20,979,169 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,277,727 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,280,014 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,294,402 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,309,224 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,323,661 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,345,098 UART: [afmc] --
23,348,497 UART: [cold-reset] --
23,353,157 UART: [state] Locking Datavault
23,358,361 UART: [state] Locking PCR0, PCR1 and PCR31
23,360,121 UART: [state] Locking ICCM
23,361,408 UART: [exit] Launching FMC @ 0x40000130
23,369,752 UART:
23,370,018 UART: Running Caliptra FMC ...
23,371,131 UART:
23,371,291 UART: [state] CFI Enabled
23,435,610 UART: [fht] FMC Alias Private Key: 7
25,774,007 UART: [art] Extend RT PCRs Done
25,775,251 UART: [art] Lock RT PCRs Done
25,776,886 UART: [art] Populate DV Done
25,782,253 UART: [fht] FMC Alias Private Key: 7
25,783,789 UART: [art] Derive CDI
25,784,527 UART: [art] Store in in slot 0x4
25,844,322 UART: [art] Derive Key Pair
25,845,363 UART: [art] Store priv key in slot 0x5
29,138,047 UART: [art] Derive Key Pair - Done
29,151,208 UART: [art] Signing Cert with AUTHO
29,152,561 UART: RITY.KEYID = 7
31,439,193 UART: [art] Erasing AUTHORITY.KEYID = 7
31,440,723 UART: [art] PUB.X = 7D9EC28B89E95D34687D9C9BEF923220107C38C159727B8169ECD8D84FD9E1F2FADCA6D3FD72911A8AE0F1C65B142FFF
31,447,937 UART: [art] PUB.Y = CACE9FAEF0CD65C379423CAB89C6FD1E5D878FE885CEAEAA1DF928200EFD6F3B31E16AC6EAE7D235C9D219B77FB3D8DE
31,455,236 UART: [art] SIG.R = A9ABF18433AF11A8FFE536C542423907676A60178AD35D380A6D589F77DBCDE6615D0A0ED029B5403F20A91AC8BFDA36
31,462,648 UART: [art] SIG.S = 8DFCA558BCDC8B963543B5C71CF47F13E7278EE7B2421C1D47FBAA8AA21141F0ADD51D4C37B0E5FA4834058B843D6C34
32,768,133 UART: Caliptra RT
32,768,840 UART: [state] CFI Enabled
32,929,850 UART: [rt] RT listening for mailbox commands...
32,931,705 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,961,449 UART: [rt]cmd =0x46504c54, len=4
32,962,951 >>> mbox cmd response data (8 bytes)
32,964,256 UART: [rt] FIPS self test
32,965,208 UART: [kat] ++
32,965,662 UART: [kat] sha1
32,970,012 UART: [kat] SHA2-256
32,971,957 UART: [kat] SHA2-384
32,974,812 UART: [kat] SHA2-512-ACC
32,977,073 UART: [kat] ECC-384
36,246,196 UART: [kat] HMAC-384Kdf
36,253,088 UART: [kat] LMS
37,103,413 UART: Fatal Error: 0x90070002
37,138,831 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,282,830 >>> mbox cmd response: failed
37,283,452 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,427,852 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
189,998 UART:
190,289 UART: Running Caliptra ROM ...
191,318 UART:
191,461 UART: [state] CFI Enabled
262,757 UART: [state] LifecycleState = Unprovisioned
264,680 UART: [state] DebugLocked = No
267,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,487 UART: [kat] SHA2-256
442,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,679 UART: [kat] ++
453,210 UART: [kat] sha1
465,231 UART: [kat] SHA2-256
467,913 UART: [kat] SHA2-384
474,972 UART: [kat] SHA2-512-ACC
477,324 UART: [kat] ECC-384
2,769,010 UART: [kat] HMAC-384Kdf
2,799,612 UART: [kat] LMS
3,989,935 UART: [kat] --
3,993,763 UART: [cold-reset] ++
3,995,217 UART: [fht] Storing FHT @ 0x50003400
4,007,031 UART: [idev] ++
4,007,648 UART: [idev] CDI.KEYID = 6
4,008,587 UART: [idev] SUBJECT.KEYID = 7
4,009,813 UART: [idev] UDS.KEYID = 0
4,011,335 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,155,633 UART: [idev] Erasing UDS.KEYID = 0
7,343,593 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,574 UART: [idev] --
7,369,796 UART: [ldev] ++
7,370,386 UART: [ldev] CDI.KEYID = 6
7,371,357 UART: [ldev] SUBJECT.KEYID = 5
7,372,521 UART: [ldev] AUTHORITY.KEYID = 7
7,373,811 UART: [ldev] FE.KEYID = 1
7,400,606 UART: [ldev] Erasing FE.KEYID = 1
10,732,944 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,731 UART: [ldev] --
13,115,563 UART: [fwproc] Waiting for Commands...
13,117,892 UART: [fwproc] Received command 0x46574c44
13,120,125 UART: [fwproc] Received Image of size 114632 bytes
17,180,465 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,700 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,327,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,647,209 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
3,783,349 ready_for_fw is high
3,783,947 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,835,731 >>> mbox cmd response: success
23,523,700 UART:
23,524,097 UART: Running Caliptra FMC ...
23,525,250 UART:
23,525,432 UART: [state] CFI Enabled
23,594,458 UART: [fht] FMC Alias Private Key: 7
25,931,976 UART: [art] Extend RT PCRs Done
25,933,211 UART: [art] Lock RT PCRs Done
25,934,947 UART: [art] Populate DV Done
25,940,425 UART: [fht] FMC Alias Private Key: 7
25,941,968 UART: [art] Derive CDI
25,942,787 UART: [art] Store in in slot 0x4
26,003,240 UART: [art] Derive Key Pair
26,004,297 UART: [art] Store priv key in slot 0x5
29,297,139 UART: [art] Derive Key Pair - Done
29,309,930 UART: [art] Signing Cert with AUTHO
29,311,245 UART: RITY.KEYID = 7
31,599,866 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,377 UART: [art] PUB.X = 387375B489786223179494C00A26677CD604505A49030E8CA6688D995286DE1E6665AE3D23AD253F55DA5AC9DC7B7977
31,608,619 UART: [art] PUB.Y = C2C5E9BBD081D9AB2475290A05F71E368DC9BE7FC08044605AB836592E2190BADD93773BDD9020542F1F271F8329DEAC
31,615,844 UART: [art] SIG.R = 5DD287C5E1898A1F67792C672DEE32D94DF4599ED97CC88C863D32BB2D1391084014A5D182AA3B525C3376FED55FF87F
31,623,192 UART: [art] SIG.S = C3231C533BBE8D5CB905B79FDB8A2DFC5EF4F300B4AFF69A4C34A78B69CE6F94219EA39963DF58A19436DAC9A9066DDB
32,928,848 UART: Caliptra RT
32,929,604 UART: [state] CFI Enabled
33,111,006 UART: [rt] RT listening for mailbox commands...
33,112,876 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,142,450 UART: [rt]cmd =0x46504c54, len=4
33,144,062 >>> mbox cmd response data (8 bytes)
33,144,862 UART: [rt] FIPS self test
33,145,812 UART: [kat] ++
33,146,268 UART: [kat] sha1
33,150,839 UART: [kat] SHA2-256
33,152,765 UART: [kat] SHA2-384
33,155,726 UART: [kat] SHA2-512-ACC
33,157,976 UART: [kat] ECC-384
36,426,479 UART: [kat] HMAC-384Kdf
36,432,543 UART: [kat] LMS
37,282,834 UART: Fatal Error: 0x90070002
37,318,205 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,462,351 >>> mbox cmd response: failed
37,462,963 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,606,924 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,804,763 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,888,560 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,401 UART:
192,855 UART: Running Caliptra ROM ...
193,986 UART:
603,670 UART: [state] CFI Enabled
615,875 UART: [state] LifecycleState = Unprovisioned
617,846 UART: [state] DebugLocked = No
619,378 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,411 UART: [kat] SHA2-256
793,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,727 UART: [kat] ++
804,183 UART: [kat] sha1
814,826 UART: [kat] SHA2-256
817,553 UART: [kat] SHA2-384
823,763 UART: [kat] SHA2-512-ACC
826,133 UART: [kat] ECC-384
3,108,570 UART: [kat] HMAC-384Kdf
3,119,393 UART: [kat] LMS
4,309,516 UART: [kat] --
4,316,673 UART: [cold-reset] ++
4,318,330 UART: [fht] Storing FHT @ 0x50003400
4,329,601 UART: [idev] ++
4,330,165 UART: [idev] CDI.KEYID = 6
4,331,122 UART: [idev] SUBJECT.KEYID = 7
4,332,367 UART: [idev] UDS.KEYID = 0
4,333,568 ready_for_fw is high
4,333,830 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,477,944 UART: [idev] Erasing UDS.KEYID = 0
7,616,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,129 UART: [idev] --
7,642,047 UART: [ldev] ++
7,642,624 UART: [ldev] CDI.KEYID = 6
7,643,598 UART: [ldev] SUBJECT.KEYID = 5
7,644,812 UART: [ldev] AUTHORITY.KEYID = 7
7,646,049 UART: [ldev] FE.KEYID = 1
7,658,353 UART: [ldev] Erasing FE.KEYID = 1
10,949,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,778 UART: [ldev] --
13,313,750 UART: [fwproc] Waiting for Commands...
13,315,375 UART: [fwproc] Received command 0x46574c44
13,317,568 UART: [fwproc] Received Image of size 114632 bytes
17,377,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,129 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,838,309 >>> mbox cmd response: success
17,842,465 UART: [afmc] ++
17,843,055 UART: [afmc] CDI.KEYID = 6
17,844,026 UART: [afmc] SUBJECT.KEYID = 7
17,845,243 UART: [afmc] AUTHORITY.KEYID = 5
21,157,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,514 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,772 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,134 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,983 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,452 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,779 UART: [afmc] --
23,524,802 UART: [cold-reset] --
23,528,387 UART: [state] Locking Datavault
23,534,338 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,036 UART: [state] Locking ICCM
23,537,521 UART: [exit] Launching FMC @ 0x40000130
23,545,911 UART:
23,546,146 UART: Running Caliptra FMC ...
23,547,248 UART:
23,547,403 UART: [state] CFI Enabled
23,555,504 UART: [fht] FMC Alias Private Key: 7
25,886,502 UART: [art] Extend RT PCRs Done
25,887,721 UART: [art] Lock RT PCRs Done
25,889,211 UART: [art] Populate DV Done
25,894,568 UART: [fht] FMC Alias Private Key: 7
25,896,230 UART: [art] Derive CDI
25,896,969 UART: [art] Store in in slot 0x4
25,939,358 UART: [art] Derive Key Pair
25,940,361 UART: [art] Store priv key in slot 0x5
29,182,646 UART: [art] Derive Key Pair - Done
29,195,490 UART: [art] Signing Cert with AUTHO
29,196,798 UART: RITY.KEYID = 7
31,476,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,720 UART: [art] PUB.X = 7DF4C175B1AB9E662DA84A475B6658CE61C06275CFE05AB563554D7A1B225E419AB20EE885D5690547B163080BA5BBBD
31,484,917 UART: [art] PUB.Y = 752FA6E9D8AA009A3557FD5EE45DB1AD1EC31760CD2BC33138C668099AEEE87083357B6F35E97EEC239646F097D2E67C
31,492,195 UART: [art] SIG.R = 862217244ECC4F3DFC16B72916C2AE225251F1026F247FB70B7E42419DA43D21F20712C6A8C618A0146BD744850D9F86
31,499,610 UART: [art] SIG.S = 7639BE292A3FA4BC10CF6C050BF59A3AA91537AC0C2A56CDC8E06F7CB125D65663F6642BBE9F199CD19E9A83E004FA98
32,804,788 UART: Caliptra RT
32,805,499 UART: [state] CFI Enabled
32,922,182 UART: [rt] RT listening for mailbox commands...
32,924,036 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,953,805 UART: [rt]cmd =0x46504c54, len=4
32,955,531 >>> mbox cmd response data (8 bytes)
32,956,657 UART: [rt] FIPS self test
32,957,606 UART: [kat] ++
32,958,057 UART: [kat] sha1
32,962,546 UART: [kat] SHA2-256
32,964,426 UART: [kat] SHA2-384
32,967,351 UART: [kat] SHA2-512-ACC
32,969,588 UART: [kat] ECC-384
36,212,483 UART: [kat] HMAC-384Kdf
36,218,241 UART: [kat] LMS
37,068,517 UART: Fatal Error: 0x90070002
37,103,963 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,247,960 >>> mbox cmd response: failed
37,248,567 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,392,299 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,121 UART:
190,420 UART: Running Caliptra ROM ...
191,537 UART:
3,145,570 UART: [state] CFI Enabled
3,159,114 UART: [state] LifecycleState = Unprovisioned
3,161,018 UART: [state] DebugLocked = No
3,162,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,168,178 UART: [kat] SHA2-256
3,337,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,348,488 UART: [kat] ++
3,349,025 UART: [kat] sha1
3,360,789 UART: [kat] SHA2-256
3,363,489 UART: [kat] SHA2-384
3,369,961 UART: [kat] SHA2-512-ACC
3,372,332 UART: [kat] ECC-384
5,658,509 UART: [kat] HMAC-384Kdf
5,671,608 UART: [kat] LMS
6,861,703 UART: [kat] --
6,865,636 UART: [cold-reset] ++
6,867,298 UART: [fht] Storing FHT @ 0x50003400
6,879,050 UART: [idev] ++
6,879,622 UART: [idev] CDI.KEYID = 6
6,880,583 UART: [idev] SUBJECT.KEYID = 7
6,881,800 UART: [idev] UDS.KEYID = 0
6,883,381 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
7,027,305 UART: [idev] Erasing UDS.KEYID = 0
10,170,607 UART: [idev] Using Sha1 for KeyId Algorithm
10,192,974 UART: [idev] --
10,197,490 UART: [ldev] ++
10,198,065 UART: [ldev] CDI.KEYID = 6
10,199,108 UART: [ldev] SUBJECT.KEYID = 5
10,200,217 UART: [ldev] AUTHORITY.KEYID = 7
10,201,499 UART: [ldev] FE.KEYID = 1
10,211,875 UART: [ldev] Erasing FE.KEYID = 1
13,499,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,793,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,807,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,822,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,837,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,855,880 UART: [ldev] --
15,861,125 UART: [fwproc] Waiting for Commands...
15,862,852 UART: [fwproc] Received command 0x46574c44
15,865,044 UART: [fwproc] Received Image of size 114632 bytes
19,919,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,995,722 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,064,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
20,383,108 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
4,128,334 ready_for_fw is high
4,128,980 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,087,296 >>> mbox cmd response: success
23,729,285 UART:
23,729,685 UART: Running Caliptra FMC ...
23,730,805 UART:
23,730,961 UART: [state] CFI Enabled
23,738,545 UART: [fht] FMC Alias Private Key: 7
26,069,198 UART: [art] Extend RT PCRs Done
26,070,439 UART: [art] Lock RT PCRs Done
26,072,582 UART: [art] Populate DV Done
26,077,741 UART: [fht] FMC Alias Private Key: 7
26,079,237 UART: [art] Derive CDI
26,079,980 UART: [art] Store in in slot 0x4
26,122,631 UART: [art] Derive Key Pair
26,123,631 UART: [art] Store priv key in slot 0x5
29,365,983 UART: [art] Derive Key Pair - Done
29,379,044 UART: [art] Signing Cert with AUTHO
29,380,360 UART: RITY.KEYID = 7
31,659,904 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,415 UART: [art] PUB.X = 1537C7E5ED31744FDEE97A85A4443DFA407814ECBD3DF7D121F53CA7190E78DA20F4A665D975CF216FC19BEA9DF2BFF0
31,668,718 UART: [art] PUB.Y = 5E69F5788A347F25BC54F5FBAFE2D34E5E8844F6829EFE1261FCFD37E1014DB34040D34E713ECB41F8AB2B8EF68E46F2
31,675,957 UART: [art] SIG.R = C7E87C6F24E83EC274AAC9CA8B247D27C6A4B56F87F6F901FCA021AD5B3ABBE9139BA14E75F1B88AF30F9C292CAFFC4F
31,683,403 UART: [art] SIG.S = C632942A0E614F19D8F9F56B5A9358D788EC691AF3056CB39FF474B5D088360DAAE8A06BB97F9EC5FF962058DE818F2E
32,988,723 UART: Caliptra RT
32,989,432 UART: [state] CFI Enabled
33,107,479 UART: [rt] RT listening for mailbox commands...
33,109,330 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,139,119 UART: [rt]cmd =0x46504c54, len=4
33,140,642 >>> mbox cmd response data (8 bytes)
33,142,085 UART: [rt] FIPS self test
33,143,026 UART: [kat] ++
33,143,483 UART: [kat] sha1
33,147,994 UART: [kat] SHA2-256
33,149,925 UART: [kat] SHA2-384
33,152,938 UART: [kat] SHA2-512-ACC
33,155,200 UART: [kat] ECC-384
36,398,239 UART: [kat] HMAC-384Kdf
36,404,145 UART: [kat] LMS
37,254,594 UART: Fatal Error: 0x90070002
37,289,909 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,433,948 >>> mbox cmd response: failed
37,434,584 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
37,578,473 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
6,482,729 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
20,435,770 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,139 UART:
192,511 UART: Running Caliptra ROM ...
193,722 UART:
193,896 UART: [state] CFI Enabled
264,666 UART: [state] LifecycleState = Unprovisioned
266,574 UART: [state] DebugLocked = No
268,253 UART: [state] WD Timer not started. Device not locked for debugging
272,801 UART: [kat] SHA2-256
451,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,526 UART: [kat] ++
464,061 UART: [kat] sha1
475,161 UART: [kat] SHA2-256
478,175 UART: [kat] SHA2-384
484,326 UART: [kat] SHA2-512-ACC
487,266 UART: [kat] ECC-384
2,949,420 UART: [kat] HMAC-384Kdf
2,974,339 UART: [kat] LMS
3,503,785 UART: [kat] --
3,508,371 UART: [cold-reset] ++
3,509,460 UART: [fht] FHT @ 0x50003400
3,520,448 UART: [idev] ++
3,521,018 UART: [idev] CDI.KEYID = 6
3,521,933 UART: [idev] SUBJECT.KEYID = 7
3,523,110 UART: [idev] UDS.KEYID = 0
3,524,040 ready_for_fw is high
3,524,281 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,668,951 UART: [idev] Erasing UDS.KEYID = 0
6,028,468 UART: [idev] Sha1 KeyId Algorithm
6,051,052 UART: [idev] --
6,054,902 UART: [ldev] ++
6,055,474 UART: [ldev] CDI.KEYID = 6
6,056,387 UART: [ldev] SUBJECT.KEYID = 5
6,057,553 UART: [ldev] AUTHORITY.KEYID = 7
6,058,796 UART: [ldev] FE.KEYID = 1
6,102,046 UART: [ldev] Erasing FE.KEYID = 1
8,607,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,513 UART: [ldev] --
10,416,696 UART: [fwproc] Wait for Commands...
10,418,959 UART: [fwproc] Recv command 0x46574c44
10,421,096 UART: [fwproc] Recv'd Img size: 114940 bytes
13,834,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,472 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,302,735 >>> mbox cmd response: success
14,307,127 UART: [afmc] ++
14,307,713 UART: [afmc] CDI.KEYID = 6
14,308,622 UART: [afmc] SUBJECT.KEYID = 7
14,309,777 UART: [afmc] AUTHORITY.KEYID = 5
16,855,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,577,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,594,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,610,720 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,626,551 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,648,466 UART: [afmc] --
18,651,786 UART: [cold-reset] --
18,656,723 UART: [state] Locking Datavault
18,663,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,720 UART: [state] Locking ICCM
18,666,177 UART: [exit] Launching FMC @ 0x40000130
18,674,578 UART:
18,674,814 UART: Running Caliptra FMC ...
18,675,916 UART:
18,676,076 UART: [state] CFI Enabled
18,736,598 UART: [fht] FMC Alias Private Key: 7
20,500,791 UART: [art] Extend RT PCRs Done
20,502,015 UART: [art] Lock RT PCRs Done
20,503,542 UART: [art] Populate DV Done
20,508,846 UART: [fht] FMC Alias Private Key: 7
20,510,548 UART: [art] Derive CDI
20,511,362 UART: [art] Store in in slot 0x4
20,570,290 UART: [art] Derive Key Pair
20,571,283 UART: [art] Store priv key in slot 0x5
23,034,077 UART: [art] Derive Key Pair - Done
23,047,409 UART: [art] Signing Cert with AUTHO
23,048,712 UART: RITY.KEYID = 7
24,759,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,761,335 UART: [art] PUB.X = E5B41B0D3E26DDA993852BC7D60443DF248AFED23E36AD026BFC7EFD684149E5F0D1977F32008FF5CF2C0840FB660B38
24,768,600 UART: [art] PUB.Y = 1125EC98F0746C4A041698C7E4002583851C230EC239650FEB11B1604D15C3AE44B4EE3020E4749AE711E674D7E167C0
24,775,801 UART: [art] SIG.R = ED82EC29152585F5DDAC742139DAC8F414392876617164CEB2CF9AD0FDA90B3E0396B258CB8553D3DCF9663FECF8E961
24,783,211 UART: [art] SIG.S = B2245BD85D200F0340AA0C819E9A5822633A00B1D8D590561BC0806881ACDA9F832EAC4712E3EC6CEC4CE31DF9E4D164
25,762,343 UART: Caliptra RT
25,763,031 UART: [state] CFI Enabled
25,928,352 UART: [rt] RT listening for mailbox commands...
25,930,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,959,952 UART: [rt]cmd =0x46504c54, len=4
25,961,749 >>> mbox cmd response data (8 bytes)
25,962,783 UART: [rt] FIPS self test
25,963,732 UART: [kat] ++
25,964,204 UART: [kat] sha1
25,968,554 UART: [kat] SHA2-256
25,970,480 UART: [kat] SHA2-384
25,973,439 UART: [kat] SHA2-512-ACC
25,975,673 UART: [kat] ECC-384
28,413,639 UART: [kat] HMAC-384Kdf
28,440,136 UART: [kat] LMS
28,665,276 UART: Fatal Error: 0x90070002
28,700,548 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,844,912 >>> mbox cmd response: failed
28,845,535 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,990,309 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,093 UART:
190,396 UART: Running Caliptra ROM ...
191,530 UART:
191,684 UART: [state] CFI Enabled
268,487 UART: [state] LifecycleState = Unprovisioned
270,346 UART: [state] DebugLocked = No
272,587 UART: [state] WD Timer not started. Device not locked for debugging
275,778 UART: [kat] SHA2-256
454,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,492 UART: [kat] ++
467,020 UART: [kat] sha1
478,289 UART: [kat] SHA2-256
481,329 UART: [kat] SHA2-384
488,067 UART: [kat] SHA2-512-ACC
491,017 UART: [kat] ECC-384
2,953,401 UART: [kat] HMAC-384Kdf
2,975,400 UART: [kat] LMS
3,504,804 UART: [kat] --
3,510,166 UART: [cold-reset] ++
3,511,591 UART: [fht] FHT @ 0x50003400
3,522,801 UART: [idev] ++
3,523,367 UART: [idev] CDI.KEYID = 6
3,524,281 UART: [idev] SUBJECT.KEYID = 7
3,525,499 UART: [idev] UDS.KEYID = 0
3,527,012 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,507 UART: [idev] Erasing UDS.KEYID = 0
6,027,928 UART: [idev] Sha1 KeyId Algorithm
6,050,945 UART: [idev] --
6,054,295 UART: [ldev] ++
6,054,866 UART: [ldev] CDI.KEYID = 6
6,055,779 UART: [ldev] SUBJECT.KEYID = 5
6,056,940 UART: [ldev] AUTHORITY.KEYID = 7
6,058,176 UART: [ldev] FE.KEYID = 1
6,104,846 UART: [ldev] Erasing FE.KEYID = 1
8,611,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,296 UART: [ldev] --
10,419,588 UART: [fwproc] Wait for Commands...
10,421,635 UART: [fwproc] Recv command 0x46574c44
10,423,681 UART: [fwproc] Recv'd Img size: 114940 bytes
13,832,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,291,680 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,361,519 ready_for_fw is high
3,362,157 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,061,286 >>> mbox cmd response: success
18,341,849 UART:
18,342,249 UART: Running Caliptra FMC ...
18,343,379 UART:
18,343,531 UART: [state] CFI Enabled
18,410,450 UART: [fht] FMC Alias Private Key: 7
20,174,068 UART: [art] Extend RT PCRs Done
20,175,299 UART: [art] Lock RT PCRs Done
20,177,247 UART: [art] Populate DV Done
20,182,837 UART: [fht] FMC Alias Private Key: 7
20,184,544 UART: [art] Derive CDI
20,185,284 UART: [art] Store in in slot 0x4
20,242,709 UART: [art] Derive Key Pair
20,243,747 UART: [art] Store priv key in slot 0x5
22,706,461 UART: [art] Derive Key Pair - Done
22,719,858 UART: [art] Signing Cert with AUTHO
22,721,170 UART: RITY.KEYID = 7
24,431,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,069 UART: [art] PUB.X = 607C58C2C516F5951405BADD01410AA02DD3C3FE527EAE52198C50CCE31864B4993C958F7D31F7E784221DDD4DCAC9D3
24,440,391 UART: [art] PUB.Y = A09D52B6680959EEE0E86C1D9B635990E9E1E93B4683D6F5E6A81078FF987D5713A99E1330A29340A4892634B2CA5ABA
24,447,598 UART: [art] SIG.R = ECBFF7B4C30E31669496BB29F2B894CBE2D4FF641F1ABB8C0001E6F61E19CF5EC72EF120BC040C415DBEA64BBEBD164A
24,455,000 UART: [art] SIG.S = 00697B7AF1C3665ED866727796621BDBC0E4AD7F64EED1D4C003696706720AA2232BAB6B7084B3501D2CF60B9A48C043
25,433,824 UART: Caliptra RT
25,434,529 UART: [state] CFI Enabled
25,598,418 UART: [rt] RT listening for mailbox commands...
25,600,297 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,630,201 UART: [rt]cmd =0x46504c54, len=4
25,631,646 >>> mbox cmd response data (8 bytes)
25,632,708 UART: [rt] FIPS self test
25,633,650 UART: [kat] ++
25,634,104 UART: [kat] sha1
25,638,592 UART: [kat] SHA2-256
25,640,526 UART: [kat] SHA2-384
25,643,481 UART: [kat] SHA2-512-ACC
25,645,745 UART: [kat] ECC-384
28,084,442 UART: [kat] HMAC-384Kdf
28,091,166 UART: [kat] LMS
28,316,256 UART: Fatal Error: 0x90070002
28,351,671 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,495,967 >>> mbox cmd response: failed
28,496,638 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,640,921 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,366,023 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,091,770 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,516 UART:
192,903 UART: Running Caliptra ROM ...
194,030 UART:
603,486 UART: [state] CFI Enabled
617,716 UART: [state] LifecycleState = Unprovisioned
619,599 UART: [state] DebugLocked = No
622,057 UART: [state] WD Timer not started. Device not locked for debugging
626,256 UART: [kat] SHA2-256
805,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,942 UART: [kat] ++
817,473 UART: [kat] sha1
828,308 UART: [kat] SHA2-256
831,350 UART: [kat] SHA2-384
838,062 UART: [kat] SHA2-512-ACC
841,006 UART: [kat] ECC-384
3,283,181 UART: [kat] HMAC-384Kdf
3,295,779 UART: [kat] LMS
3,825,304 UART: [kat] --
3,831,138 UART: [cold-reset] ++
3,832,932 UART: [fht] FHT @ 0x50003400
3,843,573 UART: [idev] ++
3,844,139 UART: [idev] CDI.KEYID = 6
3,845,177 UART: [idev] SUBJECT.KEYID = 7
3,846,284 UART: [idev] UDS.KEYID = 0
3,847,219 ready_for_fw is high
3,847,445 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,991,829 UART: [idev] Erasing UDS.KEYID = 0
6,317,738 UART: [idev] Sha1 KeyId Algorithm
6,341,032 UART: [idev] --
6,343,845 UART: [ldev] ++
6,344,622 UART: [ldev] CDI.KEYID = 6
6,345,616 UART: [ldev] SUBJECT.KEYID = 5
6,346,754 UART: [ldev] AUTHORITY.KEYID = 7
6,347,933 UART: [ldev] FE.KEYID = 1
6,358,526 UART: [ldev] Erasing FE.KEYID = 1
8,828,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,506 UART: [ldev] --
10,618,636 UART: [fwproc] Wait for Commands...
10,621,490 UART: [fwproc] Recv command 0x46574c44
10,623,589 UART: [fwproc] Recv'd Img size: 114940 bytes
14,024,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,884 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,487,511 >>> mbox cmd response: success
14,491,506 UART: [afmc] ++
14,492,102 UART: [afmc] CDI.KEYID = 6
14,493,016 UART: [afmc] SUBJECT.KEYID = 7
14,494,181 UART: [afmc] AUTHORITY.KEYID = 5
16,990,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,693 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,615 UART: [afmc] --
18,787,208 UART: [cold-reset] --
18,790,643 UART: [state] Locking Datavault
18,797,890 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,588 UART: [state] Locking ICCM
18,800,606 UART: [exit] Launching FMC @ 0x40000130
18,809,023 UART:
18,809,272 UART: Running Caliptra FMC ...
18,810,382 UART:
18,810,549 UART: [state] CFI Enabled
18,818,763 UART: [fht] FMC Alias Private Key: 7
20,575,621 UART: [art] Extend RT PCRs Done
20,576,827 UART: [art] Lock RT PCRs Done
20,578,612 UART: [art] Populate DV Done
20,583,912 UART: [fht] FMC Alias Private Key: 7
20,585,536 UART: [art] Derive CDI
20,586,304 UART: [art] Store in in slot 0x4
20,628,628 UART: [art] Derive Key Pair
20,629,632 UART: [art] Store priv key in slot 0x5
23,056,578 UART: [art] Derive Key Pair - Done
23,069,891 UART: [art] Signing Cert with AUTHO
23,071,232 UART: RITY.KEYID = 7
24,776,825 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,309 UART: [art] PUB.X = 34E276A1BDDE31A3141BACB0FD8A4148D43EDCBF860C8447F96392F108DD97F8B9179185420DA8E92BFAFEC8512728F0
24,785,616 UART: [art] PUB.Y = 881F2EB39304E088C8834EDF5D6023AEEF85C50E220145CDE181434F57FE338F18B31467A89DE54B42B37F3733C61801
24,792,854 UART: [art] SIG.R = B0678A771A3B5521A838E59618C578D270521385EA0D2FC4134D7EAF7AC2EFAFA7D94037D326E38C2139E857D4C97EF4
24,800,250 UART: [art] SIG.S = FC341E5A01799A9F79F207CA5262BBFA5639994C457F75A153E015ACA69009A8EFD8618E3878AFD01BBDDAD2C058416E
25,779,490 UART: Caliptra RT
25,780,208 UART: [state] CFI Enabled
25,896,632 UART: [rt] RT listening for mailbox commands...
25,898,477 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,928,335 UART: [rt]cmd =0x46504c54, len=4
25,930,124 >>> mbox cmd response data (8 bytes)
25,931,079 UART: [rt] FIPS self test
25,932,025 UART: [kat] ++
25,932,482 UART: [kat] sha1
25,936,832 UART: [kat] SHA2-256
25,938,717 UART: [kat] SHA2-384
25,941,750 UART: [kat] SHA2-512-ACC
25,944,044 UART: [kat] ECC-384
28,371,577 UART: [kat] HMAC-384Kdf
28,377,547 UART: [kat] LMS
28,602,582 UART: Fatal Error: 0x90070002
28,637,791 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,782,186 >>> mbox cmd response: failed
28,782,825 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,927,141 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,136 UART:
190,445 UART: Running Caliptra ROM ...
191,564 UART:
11,603,434 UART: [state] CFI Enabled
11,618,192 UART: [state] LifecycleState = Unprovisioned
11,620,069 UART: [state] DebugLocked = No
11,621,893 UART: [state] WD Timer not started. Device not locked for debugging
11,625,800 UART: [kat] SHA2-256
11,804,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
11,816,468 UART: [kat] ++
11,816,926 UART: [kat] sha1
11,827,343 UART: [kat] SHA2-256
11,830,371 UART: [kat] SHA2-384
11,835,820 UART: [kat] SHA2-512-ACC
11,838,766 UART: [kat] ECC-384
14,280,407 UART: [kat] HMAC-384Kdf
14,292,846 UART: [kat] LMS
14,822,317 UART: [kat] --
14,826,056 UART: [cold-reset] ++
14,827,237 UART: [fht] FHT @ 0x50003400
14,838,700 UART: [idev] ++
14,839,287 UART: [idev] CDI.KEYID = 6
14,840,197 UART: [idev] SUBJECT.KEYID = 7
14,841,359 UART: [idev] UDS.KEYID = 0
14,842,861 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,987,330 UART: [idev] Erasing UDS.KEYID = 0
17,313,014 UART: [idev] Sha1 KeyId Algorithm
17,336,622 UART: [idev] --
17,342,043 UART: [ldev] ++
17,342,630 UART: [ldev] CDI.KEYID = 6
17,343,538 UART: [ldev] SUBJECT.KEYID = 5
17,344,699 UART: [ldev] AUTHORITY.KEYID = 7
17,345,983 UART: [ldev] FE.KEYID = 1
17,356,083 UART: [ldev] Erasing FE.KEYID = 1
19,836,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,553,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,569,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,585,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,601,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,622,201 UART: [ldev] --
21,626,979 UART: [fwproc] Wait for Commands...
21,629,560 UART: [fwproc] Recv command 0x46574c44
21,631,667 UART: [fwproc] Recv'd Img size: 114940 bytes
25,048,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,126,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,195,476 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,516,281 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,698,988 ready_for_fw is high
3,699,467 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,266,187 >>> mbox cmd response: success
18,510,843 UART:
18,511,245 UART: Running Caliptra FMC ...
18,512,363 UART:
18,512,732 UART: [state] CFI Enabled
18,520,558 UART: [fht] FMC Alias Private Key: 7
20,276,937 UART: [art] Extend RT PCRs Done
20,278,160 UART: [art] Lock RT PCRs Done
20,279,809 UART: [art] Populate DV Done
20,285,285 UART: [fht] FMC Alias Private Key: 7
20,286,994 UART: [art] Derive CDI
20,287,732 UART: [art] Store in in slot 0x4
20,330,006 UART: [art] Derive Key Pair
20,331,013 UART: [art] Store priv key in slot 0x5
22,757,770 UART: [art] Derive Key Pair - Done
22,771,041 UART: [art] Signing Cert with AUTHO
22,772,349 UART: RITY.KEYID = 7
24,477,987 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,488 UART: [art] PUB.X = 6B90B36B144F22CC581FBB560CA1C92464F7D1C83F732B85328983985784CB2B5104BBD6115CD9CB89D267704AEE730E
24,486,739 UART: [art] PUB.Y = 50E2D8F9224C28A4AB31CBEEE52432B27B3F5B9ADD1D88F5AEECD813BED281319059C301B2C9F2B4C26D00ECCFA58C01
24,493,984 UART: [art] SIG.R = 3822D6C98F0ED1B2680EA843298061E0717E2CB460008DC78B6C005C5776AB173C6756C616241354CF0389CE451040E6
24,501,345 UART: [art] SIG.S = CC2430AD8DE387B1DB0F276091D40C43FA22A24B9D18D52C09776566F12BE6C980E7510F345EF3B38BAEFF191DD7716D
25,480,190 UART: Caliptra RT
25,480,890 UART: [state] CFI Enabled
25,598,756 UART: [rt] RT listening for mailbox commands...
25,600,602 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,630,112 UART: [rt]cmd =0x46504c54, len=4
25,631,633 >>> mbox cmd response data (8 bytes)
25,632,683 UART: [rt] FIPS self test
25,633,595 UART: [kat] ++
25,634,040 UART: [kat] sha1
25,638,307 UART: [kat] SHA2-256
25,640,193 UART: [kat] SHA2-384
25,643,237 UART: [kat] SHA2-512-ACC
25,645,503 UART: [kat] ECC-384
28,072,947 UART: [kat] HMAC-384Kdf
28,078,705 UART: [kat] LMS
28,303,719 UART: Fatal Error: 0x90070002
28,339,005 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,483,432 >>> mbox cmd response: failed
28,484,117 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,632,271 >>> mbox cmd response: failed
Initializing fuses
1,001 writing to cptra_bootfsm_go
14,989,024 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,567,490 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,264 UART:
192,629 UART: Running Caliptra ROM ...
193,724 UART:
193,867 UART: [state] CFI Enabled
264,207 UART: [state] LifecycleState = Unprovisioned
266,484 UART: [state] DebugLocked = No
269,358 UART: [state] WD Timer not started. Device not locked for debugging
274,171 UART: [kat] SHA2-256
464,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,785 UART: [kat] ++
475,237 UART: [kat] sha1
487,626 UART: [kat] SHA2-256
490,645 UART: [kat] SHA2-384
496,494 UART: [kat] SHA2-512-ACC
499,079 UART: [kat] ECC-384
2,951,128 UART: [kat] HMAC-384Kdf
2,973,051 UART: [kat] LMS
3,504,835 UART: [kat] --
3,509,549 UART: [cold-reset] ++
3,512,060 UART: [fht] FHT @ 0x50003400
3,522,481 UART: [idev] ++
3,523,189 UART: [idev] CDI.KEYID = 6
3,524,151 UART: [idev] SUBJECT.KEYID = 7
3,525,324 UART: [idev] UDS.KEYID = 0
3,526,233 ready_for_fw is high
3,526,450 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,120 UART: [idev] Erasing UDS.KEYID = 0
6,031,532 UART: [idev] Sha1 KeyId Algorithm
6,053,600 UART: [idev] --
6,059,273 UART: [ldev] ++
6,059,960 UART: [ldev] CDI.KEYID = 6
6,061,000 UART: [ldev] SUBJECT.KEYID = 5
6,062,114 UART: [ldev] AUTHORITY.KEYID = 7
6,063,299 UART: [ldev] FE.KEYID = 1
6,101,182 UART: [ldev] Erasing FE.KEYID = 1
8,606,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,974 UART: [ldev] --
10,413,755 UART: [fwproc] Wait for Commands...
10,416,338 UART: [fwproc] Recv command 0x46574c44
10,418,656 UART: [fwproc] Recv'd Img size: 114940 bytes
13,868,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,465 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,586 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,606,510 >>> mbox cmd response: success
14,610,475 UART: [afmc] ++
14,611,177 UART: [afmc] CDI.KEYID = 6
14,612,418 UART: [afmc] SUBJECT.KEYID = 7
14,613,851 UART: [afmc] AUTHORITY.KEYID = 5
17,149,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,901 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,779 UART: [afmc] --
18,967,889 UART: [cold-reset] --
18,973,586 UART: [state] Locking Datavault
18,978,020 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,158 UART: [state] Locking ICCM
18,982,304 UART: [exit] Launching FMC @ 0x40000130
18,990,971 UART:
18,991,218 UART: Running Caliptra FMC ...
18,992,243 UART:
18,992,388 UART: [state] CFI Enabled
19,050,690 UART: [fht] FMC Alias Private Key: 7
20,814,047 UART: [art] Extend RT PCRs Done
20,815,278 UART: [art] Lock RT PCRs Done
20,816,754 UART: [art] Populate DV Done
20,822,333 UART: [fht] FMC Alias Private Key: 7
20,824,151 UART: [art] Derive CDI
20,825,009 UART: [art] Store in in slot 0x4
20,883,233 UART: [art] Derive Key Pair
20,884,231 UART: [art] Store priv key in slot 0x5
23,346,618 UART: [art] Derive Key Pair - Done
23,359,431 UART: [art] Signing Cert with AUTHO
23,360,750 UART: RITY.KEYID = 7
25,073,037 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,561 UART: [art] PUB.X = C2D81AB77B643996BDA71D4B641801A6E94F1504953B3934DF177F1B904054C2D84E60DA8CCAB3B2F81FBA6EECFE2CF9
25,081,856 UART: [art] PUB.Y = 10DA59173A9E217EEE93AF8C883EFE15798B56D0783E02CDFC3826068B08A569A8538E4E8C9687C1B71F495BF13DF57F
25,089,123 UART: [art] SIG.R = 687401DE7E66E40D3FE6DF37613AF5F14348832D96C4FB19447C294981515892D26F59662FB64697E058A7C66D76763B
25,096,451 UART: [art] SIG.S = 7D8CF255094CAC693A62B2895FB5DB3805D289FD63488FF2392CA357785C888805B3C2C7D370AD1AA3476CE2C6A2E58D
26,075,306 UART: Caliptra RT
26,076,024 UART: [state] CFI Enabled
26,241,535 UART: [rt] RT listening for mailbox commands...
26,243,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,272,835 UART: [rt]cmd =0x46504c54, len=4
26,274,323 >>> mbox cmd response data (8 bytes)
26,275,681 UART: [rt] FIPS self test
26,276,628 UART: [kat] ++
26,277,078 UART: [kat] sha1
26,281,592 UART: [kat] SHA2-256
26,283,485 UART: [kat] SHA2-384
26,286,477 UART: [kat] SHA2-512-ACC
26,288,766 UART: [kat] ECC-384
28,725,961 UART: [kat] HMAC-384Kdf
28,752,583 UART: [kat] LMS
28,977,799 UART: Fatal Error: 0x90070002
29,013,214 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,157,592 >>> mbox cmd response: failed
29,158,230 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,302,368 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,194 UART:
190,483 UART: Running Caliptra ROM ...
191,512 UART:
191,651 UART: [state] CFI Enabled
270,951 UART: [state] LifecycleState = Unprovisioned
273,312 UART: [state] DebugLocked = No
275,687 UART: [state] WD Timer not started. Device not locked for debugging
280,247 UART: [kat] SHA2-256
470,123 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
480,875 UART: [kat] ++
481,616 UART: [kat] sha1
493,254 UART: [kat] SHA2-256
496,276 UART: [kat] SHA2-384
501,829 UART: [kat] SHA2-512-ACC
504,458 UART: [kat] ECC-384
2,952,589 UART: [kat] HMAC-384Kdf
2,974,587 UART: [kat] LMS
3,506,341 UART: [kat] --
3,513,035 UART: [cold-reset] ++
3,515,288 UART: [fht] FHT @ 0x50003400
3,526,719 UART: [idev] ++
3,527,441 UART: [idev] CDI.KEYID = 6
3,528,328 UART: [idev] SUBJECT.KEYID = 7
3,529,545 UART: [idev] UDS.KEYID = 0
3,531,058 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,675,413 UART: [idev] Erasing UDS.KEYID = 0
6,029,214 UART: [idev] Sha1 KeyId Algorithm
6,051,859 UART: [idev] --
6,055,373 UART: [ldev] ++
6,056,057 UART: [ldev] CDI.KEYID = 6
6,056,971 UART: [ldev] SUBJECT.KEYID = 5
6,058,074 UART: [ldev] AUTHORITY.KEYID = 7
6,059,361 UART: [ldev] FE.KEYID = 1
6,102,741 UART: [ldev] Erasing FE.KEYID = 1
8,611,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,541 UART: [ldev] --
10,415,410 UART: [fwproc] Wait for Commands...
10,417,400 UART: [fwproc] Recv command 0x46574c44
10,419,665 UART: [fwproc] Recv'd Img size: 114940 bytes
13,875,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,532 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,615,620 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,440,968 ready_for_fw is high
3,441,590 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,740,621 >>> mbox cmd response: success
19,042,018 UART:
19,042,417 UART: Running Caliptra FMC ...
19,043,533 UART:
19,043,694 UART: [state] CFI Enabled
19,094,518 UART: [fht] FMC Alias Private Key: 7
20,858,210 UART: [art] Extend RT PCRs Done
20,859,445 UART: [art] Lock RT PCRs Done
20,860,694 UART: [art] Populate DV Done
20,866,128 UART: [fht] FMC Alias Private Key: 7
20,867,838 UART: [art] Derive CDI
20,868,575 UART: [art] Store in in slot 0x4
20,927,189 UART: [art] Derive Key Pair
20,928,232 UART: [art] Store priv key in slot 0x5
23,391,008 UART: [art] Derive Key Pair - Done
23,404,286 UART: [art] Signing Cert with AUTHO
23,405,589 UART: RITY.KEYID = 7
25,115,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,423 UART: [art] PUB.X = F903A51E3A360894FDFBE47ECAFEB42D0F5223BEFFE0D15466EE87FAFBD90A7CB502303359D13BB4884284A619FB9058
25,124,695 UART: [art] PUB.Y = 6E18465622F392041935E7784B61C77842B519A4E4B4577CEF652BF7E8B6D98DA57A05283ECE7FB07BBADE1DFACAA798
25,131,921 UART: [art] SIG.R = AB239C38672B70600CB73632630A903188E390EB57E2C844387A9DDEE37E6819F437D33D1674F5CED4DFAA0CD4AEEBFB
25,139,335 UART: [art] SIG.S = B4B36A9BACE20EBB82582872503C2ED6F033154FCAFDFEF771FE5BE078236DBA6056F3A7A5A21225E8046D24D6AFD54C
26,117,973 UART: Caliptra RT
26,118,686 UART: [state] CFI Enabled
26,282,995 UART: [rt] RT listening for mailbox commands...
26,284,860 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,314,750 UART: [rt]cmd =0x46504c54, len=4
26,316,493 >>> mbox cmd response data (8 bytes)
26,317,538 UART: [rt] FIPS self test
26,318,477 UART: [kat] ++
26,318,951 UART: [kat] sha1
26,323,357 UART: [kat] SHA2-256
26,325,234 UART: [kat] SHA2-384
26,328,142 UART: [kat] SHA2-512-ACC
26,330,402 UART: [kat] ECC-384
28,768,307 UART: [kat] HMAC-384Kdf
28,774,429 UART: [kat] LMS
28,999,493 UART: Fatal Error: 0x90070002
29,034,727 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,179,154 >>> mbox cmd response: failed
29,179,811 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,324,094 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,418,188 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,733,725 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,734 UART:
193,084 UART: Running Caliptra ROM ...
194,285 UART:
603,950 UART: [state] CFI Enabled
614,122 UART: [state] LifecycleState = Unprovisioned
616,472 UART: [state] DebugLocked = No
618,223 UART: [state] WD Timer not started. Device not locked for debugging
622,755 UART: [kat] SHA2-256
812,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,421 UART: [kat] ++
824,028 UART: [kat] sha1
835,129 UART: [kat] SHA2-256
838,146 UART: [kat] SHA2-384
842,859 UART: [kat] SHA2-512-ACC
845,443 UART: [kat] ECC-384
3,286,513 UART: [kat] HMAC-384Kdf
3,299,963 UART: [kat] LMS
3,831,838 UART: [kat] --
3,837,391 UART: [cold-reset] ++
3,839,984 UART: [fht] FHT @ 0x50003400
3,851,395 UART: [idev] ++
3,852,116 UART: [idev] CDI.KEYID = 6
3,853,150 UART: [idev] SUBJECT.KEYID = 7
3,854,250 UART: [idev] UDS.KEYID = 0
3,855,189 ready_for_fw is high
3,855,383 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,999,755 UART: [idev] Erasing UDS.KEYID = 0
6,332,522 UART: [idev] Sha1 KeyId Algorithm
6,353,812 UART: [idev] --
6,357,690 UART: [ldev] ++
6,358,370 UART: [ldev] CDI.KEYID = 6
6,359,281 UART: [ldev] SUBJECT.KEYID = 5
6,360,443 UART: [ldev] AUTHORITY.KEYID = 7
6,361,675 UART: [ldev] FE.KEYID = 1
6,371,074 UART: [ldev] Erasing FE.KEYID = 1
8,846,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,777 UART: [ldev] --
10,638,050 UART: [fwproc] Wait for Commands...
10,640,960 UART: [fwproc] Recv command 0x46574c44
10,643,267 UART: [fwproc] Recv'd Img size: 114940 bytes
14,099,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,155 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,843,508 >>> mbox cmd response: success
14,847,505 UART: [afmc] ++
14,848,198 UART: [afmc] CDI.KEYID = 6
14,849,359 UART: [afmc] SUBJECT.KEYID = 7
14,850,912 UART: [afmc] AUTHORITY.KEYID = 5
17,353,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,337 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,720 UART: [afmc] --
19,147,832 UART: [cold-reset] --
19,151,042 UART: [state] Locking Datavault
19,156,071 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,207 UART: [state] Locking ICCM
19,160,675 UART: [exit] Launching FMC @ 0x40000130
19,169,350 UART:
19,169,585 UART: Running Caliptra FMC ...
19,170,685 UART:
19,170,864 UART: [state] CFI Enabled
19,178,808 UART: [fht] FMC Alias Private Key: 7
20,935,568 UART: [art] Extend RT PCRs Done
20,936,786 UART: [art] Lock RT PCRs Done
20,938,225 UART: [art] Populate DV Done
20,943,477 UART: [fht] FMC Alias Private Key: 7
20,945,129 UART: [art] Derive CDI
20,945,868 UART: [art] Store in in slot 0x4
20,988,618 UART: [art] Derive Key Pair
20,989,613 UART: [art] Store priv key in slot 0x5
23,416,421 UART: [art] Derive Key Pair - Done
23,429,041 UART: [art] Signing Cert with AUTHO
23,430,346 UART: RITY.KEYID = 7
25,135,770 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,273 UART: [art] PUB.X = 567329A196FED0C8EEC706979FB7E23D330150AF0CFB78811DAC11F38C9F10FC2EE505CE52E82B3123DDA4680E96D4C6
25,144,525 UART: [art] PUB.Y = DC8415482442DF0EFFF4ECD281B4D625E736FFEF33F3EF0F87837D4E721398DD795190A08CF28B2D53A4383506430ACD
25,151,825 UART: [art] SIG.R = E997A04A081341B7EA193F57ACEDFB88840F5FDD99BD327C1CF380F883BF20277A670FB22C4CB9645734404C055783FA
25,159,185 UART: [art] SIG.S = 2EFFC90C669BE5F20C323674BB7EED025B409A8CDDF25712E8EC38C6576595C7A08234706CA21B75778D44445879D29D
26,138,043 UART: Caliptra RT
26,138,760 UART: [state] CFI Enabled
26,256,038 UART: [rt] RT listening for mailbox commands...
26,257,898 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,287,359 UART: [rt]cmd =0x46504c54, len=4
26,289,042 >>> mbox cmd response data (8 bytes)
26,290,274 UART: [rt] FIPS self test
26,291,217 UART: [kat] ++
26,291,665 UART: [kat] sha1
26,296,239 UART: [kat] SHA2-256
26,298,159 UART: [kat] SHA2-384
26,301,080 UART: [kat] SHA2-512-ACC
26,303,324 UART: [kat] ECC-384
28,730,539 UART: [kat] HMAC-384Kdf
28,736,521 UART: [kat] LMS
28,961,660 UART: Fatal Error: 0x90070002
28,996,923 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,141,279 >>> mbox cmd response: failed
29,141,901 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,286,166 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
189,992 UART:
190,276 UART: Running Caliptra ROM ...
191,304 UART:
11,241,225 UART: [state] CFI Enabled
11,255,111 UART: [state] LifecycleState = Unprovisioned
11,257,508 UART: [state] DebugLocked = No
11,260,365 UART: [state] WD Timer not started. Device not locked for debugging
11,264,862 UART: [kat] SHA2-256
11,454,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,465,509 UART: [kat] ++
11,466,105 UART: [kat] sha1
11,478,244 UART: [kat] SHA2-256
11,481,263 UART: [kat] SHA2-384
11,487,679 UART: [kat] SHA2-512-ACC
11,490,273 UART: [kat] ECC-384
13,931,896 UART: [kat] HMAC-384Kdf
13,945,362 UART: [kat] LMS
14,477,181 UART: [kat] --
14,479,495 UART: [cold-reset] ++
14,482,068 UART: [fht] FHT @ 0x50003400
14,493,966 UART: [idev] ++
14,494,637 UART: [idev] CDI.KEYID = 6
14,495,599 UART: [idev] SUBJECT.KEYID = 7
14,496,813 UART: [idev] UDS.KEYID = 0
14,498,374 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,642,669 UART: [idev] Erasing UDS.KEYID = 0
16,970,489 UART: [idev] Sha1 KeyId Algorithm
16,992,432 UART: [idev] --
16,996,316 UART: [ldev] ++
16,996,996 UART: [ldev] CDI.KEYID = 6
16,997,904 UART: [ldev] SUBJECT.KEYID = 5
16,999,114 UART: [ldev] AUTHORITY.KEYID = 7
17,000,346 UART: [ldev] FE.KEYID = 1
17,011,431 UART: [ldev] Erasing FE.KEYID = 1
19,486,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,205,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,221,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,236,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,251,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,272,619 UART: [ldev] --
21,278,882 UART: [fwproc] Wait for Commands...
21,281,310 UART: [fwproc] Recv command 0x46574c44
21,283,620 UART: [fwproc] Recv'd Img size: 114940 bytes
24,731,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,807,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
24,923,738 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
25,470,671 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,755,795 ready_for_fw is high
3,756,179 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,961,617 >>> mbox cmd response: success
19,213,226 UART:
19,213,629 UART: Running Caliptra FMC ...
19,214,748 UART:
19,214,908 UART: [state] CFI Enabled
19,222,925 UART: [fht] FMC Alias Private Key: 7
20,979,362 UART: [art] Extend RT PCRs Done
20,980,601 UART: [art] Lock RT PCRs Done
20,982,236 UART: [art] Populate DV Done
20,987,657 UART: [fht] FMC Alias Private Key: 7
20,989,310 UART: [art] Derive CDI
20,990,132 UART: [art] Store in in slot 0x4
21,032,743 UART: [art] Derive Key Pair
21,033,792 UART: [art] Store priv key in slot 0x5
23,460,374 UART: [art] Derive Key Pair - Done
23,473,486 UART: [art] Signing Cert with AUTHO
23,474,801 UART: RITY.KEYID = 7
25,180,112 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,630 UART: [art] PUB.X = 0E48C5090EDB38C13FF8EC59E10A63BC808B3D9AD4FE6A310CA5E621EC3D5A03D110792358FC7B864DAD4C9EB6009513
25,188,876 UART: [art] PUB.Y = 8B61E5BB756B9690904C29F5AD348324A02FEAAE63AB8CBB51A9F46367A5E55424E757C3802D9E0903DA1FEE5A72E7C7
25,196,119 UART: [art] SIG.R = 189CD59CB2D4BEDBC96F9763CB544905E296DB0A92595972B49CCACE3CB799B547CEB79F94691E4FD1F2E421A732F0CB
25,203,527 UART: [art] SIG.S = 3FCDA9F199AB5689F6A13719233660E1FC25E6BB9F9B62674338238C352A6AED01DCB53EBFF83247DF8DD035DE07D64E
26,182,721 UART: Caliptra RT
26,183,412 UART: [state] CFI Enabled
26,300,852 UART: [rt] RT listening for mailbox commands...
26,302,695 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,332,353 UART: [rt]cmd =0x46504c54, len=4
26,334,040 >>> mbox cmd response data (8 bytes)
26,335,405 UART: [rt] FIPS self test
26,336,344 UART: [kat] ++
26,336,797 UART: [kat] sha1
26,341,255 UART: [kat] SHA2-256
26,343,183 UART: [kat] SHA2-384
26,346,090 UART: [kat] SHA2-512-ACC
26,348,356 UART: [kat] ECC-384
28,776,162 UART: [kat] HMAC-384Kdf
28,781,963 UART: [kat] LMS
29,007,119 UART: Fatal Error: 0x90070002
29,042,542 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,186,892 >>> mbox cmd response: failed
29,187,545 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
29,331,665 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
14,354,631 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,559,252 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
85,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,487 UART: [kat] SHA2-256
881,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,533 UART: [kat] ++
885,685 UART: [kat] sha1
889,873 UART: [kat] SHA2-256
891,811 UART: [kat] SHA2-384
894,670 UART: [kat] SHA2-512-ACC
896,571 UART: [kat] ECC-384
902,340 UART: [kat] HMAC-384Kdf
907,038 UART: [kat] LMS
1,475,234 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,382 UART: [idev] ++
1,479,550 UART: [idev] CDI.KEYID = 6
1,479,910 UART: [idev] SUBJECT.KEYID = 7
1,480,334 UART: [idev] UDS.KEYID = 0
1,480,679 ready_for_fw is high
1,480,679 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,070 UART: [idev] Erasing UDS.KEYID = 0
1,504,776 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,521,005 UART: [ldev] Erasing FE.KEYID = 1
1,546,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,396 UART: [ldev] --
1,585,859 UART: [fwproc] Waiting for Commands...
1,586,566 UART: [fwproc] Received command 0x46574c44
1,587,357 UART: [fwproc] Received Image of size 114940 bytes
2,892,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,113 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,114 >>> mbox cmd response: success
3,087,288 UART: [afmc] ++
3,087,456 UART: [afmc] CDI.KEYID = 6
3,087,818 UART: [afmc] SUBJECT.KEYID = 7
3,088,243 UART: [afmc] AUTHORITY.KEYID = 5
3,122,750 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,511 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,201 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,930 UART: [afmc] --
3,165,956 UART: [cold-reset] --
3,166,744 UART: [state] Locking Datavault
3,167,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,263 UART: [state] Locking ICCM
3,168,893 UART: [exit] Launching FMC @ 0x40000130
3,174,222 UART:
3,174,238 UART: Running Caliptra FMC ...
3,174,646 UART:
3,174,700 UART: [state] CFI Enabled
3,184,893 UART: [fht] FMC Alias Private Key: 7
3,293,558 UART: [art] Extend RT PCRs Done
3,293,986 UART: [art] Lock RT PCRs Done
3,295,358 UART: [art] Populate DV Done
3,303,669 UART: [fht] FMC Alias Private Key: 7
3,304,649 UART: [art] Derive CDI
3,304,929 UART: [art] Store in in slot 0x4
3,390,824 UART: [art] Derive Key Pair
3,391,184 UART: [art] Store priv key in slot 0x5
3,404,096 UART: [art] Derive Key Pair - Done
3,418,822 UART: [art] Signing Cert with AUTHO
3,419,302 UART: RITY.KEYID = 7
3,434,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,389 UART: [art] PUB.X = 266A82A27A82634DC4C219D197EDC51CD05984748950729EFBDB83750B0567E20B4EF4F2552E2763774A6028193CB1D7
3,442,144 UART: [art] PUB.Y = 2CA85F8421D24D72D51475E9AF2EF4C8B1766B8A5113783721984E08DCC7D3C4E17F6AC5BB2A1B83931DEEBD2781B0B9
3,449,101 UART: [art] SIG.R = 33580279DE4811CD8020A7B081CBAF88783F32BCF151555F511284F6971778B920C08DC8B9988DDFE8CA07A090D6E3BB
3,455,867 UART: [art] SIG.S = FB8618666A97C812CAF9210812B3CA7E5A3FD4A4512DCBC307A683A85AD62B127E620C6199AC683204BDDCC72ACFBBAC
3,479,492 UART: Caliptra RT
3,479,745 UART: [state] CFI Enabled
3,587,732 UART: [rt] RT listening for mailbox commands...
3,588,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,300 UART: [rt]cmd =0x46504c54, len=4
3,619,426 >>> mbox cmd response data (8 bytes)
3,619,721 UART: [rt] FIPS self test
3,620,049 UART: [kat] ++
3,620,201 UART: [kat] sha1
3,624,487 UART: [kat] SHA2-256
3,626,509 UART: [kat] SHA2-384
3,629,172 UART: [kat] SHA2-512-ACC
3,631,099 UART: [kat] ECC-384
3,641,089 UART: [kat] HMAC-384Kdf
3,645,553 UART: [kat] LMS
3,914,027 UART: Fatal Error: 0x90070002
3,915,566 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,915,571 >>> mbox cmd response: failed
3,915,571 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,915,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,489 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,167 UART: [kat] SHA2-256
882,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,213 UART: [kat] ++
886,365 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,876 UART: [kat] HMAC-384Kdf
907,460 UART: [kat] LMS
1,475,656 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,477,025 UART: [fht] Storing FHT @ 0x50003400
1,479,846 UART: [idev] ++
1,480,014 UART: [idev] CDI.KEYID = 6
1,480,374 UART: [idev] SUBJECT.KEYID = 7
1,480,798 UART: [idev] UDS.KEYID = 0
1,481,143 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,844 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,874 UART: [idev] --
1,514,851 UART: [ldev] ++
1,515,019 UART: [ldev] CDI.KEYID = 6
1,515,382 UART: [ldev] SUBJECT.KEYID = 5
1,515,808 UART: [ldev] AUTHORITY.KEYID = 7
1,516,271 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,432 UART: [ldev] --
1,585,783 UART: [fwproc] Waiting for Commands...
1,586,462 UART: [fwproc] Received command 0x46574c44
1,587,253 UART: [fwproc] Received Image of size 114940 bytes
2,892,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,285 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,637 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,532 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 ready_for_fw is high
1,362,443 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,898 >>> mbox cmd response: success
2,998,158 UART:
2,998,174 UART: Running Caliptra FMC ...
2,998,582 UART:
2,998,636 UART: [state] CFI Enabled
3,009,021 UART: [fht] FMC Alias Private Key: 7
3,117,250 UART: [art] Extend RT PCRs Done
3,117,678 UART: [art] Lock RT PCRs Done
3,119,082 UART: [art] Populate DV Done
3,127,209 UART: [fht] FMC Alias Private Key: 7
3,128,225 UART: [art] Derive CDI
3,128,505 UART: [art] Store in in slot 0x4
3,213,964 UART: [art] Derive Key Pair
3,214,324 UART: [art] Store priv key in slot 0x5
3,227,632 UART: [art] Derive Key Pair - Done
3,242,252 UART: [art] Signing Cert with AUTHO
3,242,732 UART: RITY.KEYID = 7
3,258,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,889 UART: [art] PUB.X = 3FDE066964AFA559BA791B6FF0EB16DF41CB54508BA156141BF7A8582BC82D88ED59FFB33FDB84E6D8E0D22517F93058
3,265,670 UART: [art] PUB.Y = 5514B9B2EA03E5CF6177CD6B1BE2966994EB1E3157BB89EBC0510464E4DA93D580D30EFA6A8FECFD9F24DCD7079182D1
3,272,624 UART: [art] SIG.R = 93786A8047D8DDC657576CB4DDB9D277A6F05425E681D5EF9CFD5D0BC68505B9A2E7D758DD36D389C0D51D4B3289F459
3,279,396 UART: [art] SIG.S = 922724C21507671D0553FFB96F54AE17D88A7357076352BEFF2C1721A4C333ADABE4152FA1D2A82E81FC2847B0F67F9C
3,302,804 UART: Caliptra RT
3,303,057 UART: [state] CFI Enabled
3,411,247 UART: [rt] RT listening for mailbox commands...
3,411,910 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,711 UART: [rt]cmd =0x46504c54, len=4
3,442,679 >>> mbox cmd response data (8 bytes)
3,442,944 UART: [rt] FIPS self test
3,443,272 UART: [kat] ++
3,443,424 UART: [kat] sha1
3,447,696 UART: [kat] SHA2-256
3,449,718 UART: [kat] SHA2-384
3,452,387 UART: [kat] SHA2-512-ACC
3,454,314 UART: [kat] ECC-384
3,464,192 UART: [kat] HMAC-384Kdf
3,468,822 UART: [kat] LMS
3,737,530 UART: Fatal Error: 0x90070002
3,739,069 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,739,074 >>> mbox cmd response: failed
3,739,074 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,739,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,180 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,111 UART: [state] LifecycleState = Unprovisioned
86,766 UART: [state] DebugLocked = No
87,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,126 UART: [kat] SHA2-256
883,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,172 UART: [kat] ++
887,324 UART: [kat] sha1
891,346 UART: [kat] SHA2-256
893,284 UART: [kat] SHA2-384
896,089 UART: [kat] SHA2-512-ACC
897,990 UART: [kat] ECC-384
903,937 UART: [kat] HMAC-384Kdf
908,425 UART: [kat] LMS
1,476,621 UART: [kat] --
1,477,480 UART: [cold-reset] ++
1,477,820 UART: [fht] Storing FHT @ 0x50003400
1,480,593 UART: [idev] ++
1,480,761 UART: [idev] CDI.KEYID = 6
1,481,121 UART: [idev] SUBJECT.KEYID = 7
1,481,545 UART: [idev] UDS.KEYID = 0
1,481,890 ready_for_fw is high
1,481,890 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,537 UART: [idev] Erasing UDS.KEYID = 0
1,506,273 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,971 UART: [idev] --
1,516,008 UART: [ldev] ++
1,516,176 UART: [ldev] CDI.KEYID = 6
1,516,539 UART: [ldev] SUBJECT.KEYID = 5
1,516,965 UART: [ldev] AUTHORITY.KEYID = 7
1,517,428 UART: [ldev] FE.KEYID = 1
1,522,760 UART: [ldev] Erasing FE.KEYID = 1
1,548,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,376 UART: [fwproc] Waiting for Commands...
1,588,043 UART: [fwproc] Received command 0x46574c44
1,588,834 UART: [fwproc] Received Image of size 114940 bytes
2,894,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,872 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,095 >>> mbox cmd response: success
3,088,311 UART: [afmc] ++
3,088,479 UART: [afmc] CDI.KEYID = 6
3,088,841 UART: [afmc] SUBJECT.KEYID = 7
3,089,266 UART: [afmc] AUTHORITY.KEYID = 5
3,124,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,570 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,260 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,195 UART: [afmc] --
3,167,131 UART: [cold-reset] --
3,167,873 UART: [state] Locking Datavault
3,169,246 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,850 UART: [state] Locking ICCM
3,170,520 UART: [exit] Launching FMC @ 0x40000130
3,175,849 UART:
3,175,865 UART: Running Caliptra FMC ...
3,176,273 UART:
3,176,416 UART: [state] CFI Enabled
3,187,003 UART: [fht] FMC Alias Private Key: 7
3,294,952 UART: [art] Extend RT PCRs Done
3,295,380 UART: [art] Lock RT PCRs Done
3,296,620 UART: [art] Populate DV Done
3,304,871 UART: [fht] FMC Alias Private Key: 7
3,306,041 UART: [art] Derive CDI
3,306,321 UART: [art] Store in in slot 0x4
3,391,930 UART: [art] Derive Key Pair
3,392,290 UART: [art] Store priv key in slot 0x5
3,405,830 UART: [art] Derive Key Pair - Done
3,420,284 UART: [art] Signing Cert with AUTHO
3,420,764 UART: RITY.KEYID = 7
3,435,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,585 UART: [art] PUB.X = 85A0EBC0DD0C87C06105C2F5334AC61F293106D1357DB3217B32DD38E8F34CD31F4465132C06CA76C4BC175D976514AF
3,443,347 UART: [art] PUB.Y = 7EF787E83072DCCD849F86B2FDE609AAE566B4AC8942673C5F5810C69D98F4F9A0AF9C9FF065AAC69D0FDEC6CC86B3FC
3,450,315 UART: [art] SIG.R = 74D5B35334018AAC698396161B1F641E5A706604DF3F4430BDCD3A010FFC18C255A1124E85F1BE2BEEC7141E177E1C97
3,457,077 UART: [art] SIG.S = 331C999971521F03E712A66BB294A987903DDB6A8414EBC8FED5CEB0F328818A296821DDE635AC217D9E686C2EB2A96C
3,480,375 UART: Caliptra RT
3,480,720 UART: [state] CFI Enabled
3,589,040 UART: [rt] RT listening for mailbox commands...
3,589,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,544 UART: [rt]cmd =0x46504c54, len=4
3,620,812 >>> mbox cmd response data (8 bytes)
3,621,007 UART: [rt] FIPS self test
3,621,335 UART: [kat] ++
3,621,487 UART: [kat] sha1
3,625,699 UART: [kat] SHA2-256
3,627,721 UART: [kat] SHA2-384
3,630,630 UART: [kat] SHA2-512-ACC
3,632,557 UART: [kat] ECC-384
3,642,851 UART: [kat] HMAC-384Kdf
3,647,451 UART: [kat] LMS
3,916,037 UART: Fatal Error: 0x90070002
3,917,576 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,917,581 >>> mbox cmd response: failed
3,917,581 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,917,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,746 UART: [kat] SHA2-256
882,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,792 UART: [kat] ++
886,944 UART: [kat] sha1
891,168 UART: [kat] SHA2-256
893,106 UART: [kat] SHA2-384
895,857 UART: [kat] SHA2-512-ACC
897,758 UART: [kat] ECC-384
903,419 UART: [kat] HMAC-384Kdf
907,975 UART: [kat] LMS
1,476,171 UART: [kat] --
1,477,048 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,229 UART: [idev] ++
1,480,397 UART: [idev] CDI.KEYID = 6
1,480,757 UART: [idev] SUBJECT.KEYID = 7
1,481,181 UART: [idev] UDS.KEYID = 0
1,481,526 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,229 UART: [idev] Erasing UDS.KEYID = 0
1,506,085 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,573 UART: [idev] --
1,515,800 UART: [ldev] ++
1,515,968 UART: [ldev] CDI.KEYID = 6
1,516,331 UART: [ldev] SUBJECT.KEYID = 5
1,516,757 UART: [ldev] AUTHORITY.KEYID = 7
1,517,220 UART: [ldev] FE.KEYID = 1
1,522,410 UART: [ldev] Erasing FE.KEYID = 1
1,547,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,595 UART: [ldev] --
1,587,038 UART: [fwproc] Waiting for Commands...
1,587,877 UART: [fwproc] Received command 0x46574c44
1,588,668 UART: [fwproc] Received Image of size 114940 bytes
2,894,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,228 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,399 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,136 ready_for_fw is high
1,363,136 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,527 >>> mbox cmd response: success
2,998,913 UART:
2,998,929 UART: Running Caliptra FMC ...
2,999,337 UART:
2,999,480 UART: [state] CFI Enabled
3,010,041 UART: [fht] FMC Alias Private Key: 7
3,117,928 UART: [art] Extend RT PCRs Done
3,118,356 UART: [art] Lock RT PCRs Done
3,119,690 UART: [art] Populate DV Done
3,127,981 UART: [fht] FMC Alias Private Key: 7
3,129,077 UART: [art] Derive CDI
3,129,357 UART: [art] Store in in slot 0x4
3,214,670 UART: [art] Derive Key Pair
3,215,030 UART: [art] Store priv key in slot 0x5
3,228,208 UART: [art] Derive Key Pair - Done
3,243,061 UART: [art] Signing Cert with AUTHO
3,243,541 UART: RITY.KEYID = 7
3,259,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,966 UART: [art] PUB.X = 5F9273EB25E3B58606790F025E8312C2AF88B24F326742E4199C631CE8BDA1C3389A8A1A083ABBEEBC9B50E7AD9032F5
3,266,732 UART: [art] PUB.Y = AABFCF1F45A9135165FE795E818D0256B013927698D1309D6AA36369FBFAC457F5DC18BD0729D24B8A2084C58B2BAAD2
3,273,686 UART: [art] SIG.R = DDE6E4BF01CDA5CC13EFD25E39861F232AC7102F77137B7DF4DAFC2E8757E84B60381260440F626A12F94CD7DC42755D
3,280,462 UART: [art] SIG.S = D6985DCFF9E9985B20E76F28BDECB277FD5C65D6FE18D3A8F96A8842A0B3B1BED35E57122DC3365B9834E4817EF80C71
3,304,218 UART: Caliptra RT
3,304,563 UART: [state] CFI Enabled
3,413,047 UART: [rt] RT listening for mailbox commands...
3,413,710 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,519 UART: [rt]cmd =0x46504c54, len=4
3,444,587 >>> mbox cmd response data (8 bytes)
3,444,870 UART: [rt] FIPS self test
3,445,198 UART: [kat] ++
3,445,350 UART: [kat] sha1
3,449,562 UART: [kat] SHA2-256
3,451,584 UART: [kat] SHA2-384
3,454,431 UART: [kat] SHA2-512-ACC
3,456,358 UART: [kat] ECC-384
3,466,494 UART: [kat] HMAC-384Kdf
3,471,032 UART: [kat] LMS
3,739,578 UART: Fatal Error: 0x90070002
3,741,117 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,741,122 >>> mbox cmd response: failed
3,741,122 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,741,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,548 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,247 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
893,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,171 UART: [kat] ++
897,323 UART: [kat] sha1
901,385 UART: [kat] SHA2-256
903,325 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,440 UART: [kat] HMAC-384Kdf
922,022 UART: [kat] LMS
1,170,350 UART: [kat] --
1,171,091 UART: [cold-reset] ++
1,171,585 UART: [fht] FHT @ 0x50003400
1,174,378 UART: [idev] ++
1,174,546 UART: [idev] CDI.KEYID = 6
1,174,906 UART: [idev] SUBJECT.KEYID = 7
1,175,330 UART: [idev] UDS.KEYID = 0
1,175,675 ready_for_fw is high
1,175,675 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,354 UART: [idev] Erasing UDS.KEYID = 0
1,200,259 UART: [idev] Sha1 KeyId Algorithm
1,208,935 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,452 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,678 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,042 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,765 >>> mbox cmd response: success
2,783,813 UART: [afmc] ++
2,783,981 UART: [afmc] CDI.KEYID = 6
2,784,343 UART: [afmc] SUBJECT.KEYID = 7
2,784,768 UART: [afmc] AUTHORITY.KEYID = 5
2,820,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,681 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,400 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,180 UART: [afmc] --
2,863,286 UART: [cold-reset] --
2,864,020 UART: [state] Locking Datavault
2,865,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,853 UART: [state] Locking ICCM
2,866,327 UART: [exit] Launching FMC @ 0x40000130
2,871,656 UART:
2,871,672 UART: Running Caliptra FMC ...
2,872,080 UART:
2,872,134 UART: [state] CFI Enabled
2,882,707 UART: [fht] FMC Alias Private Key: 7
2,990,504 UART: [art] Extend RT PCRs Done
2,990,932 UART: [art] Lock RT PCRs Done
2,992,260 UART: [art] Populate DV Done
3,000,265 UART: [fht] FMC Alias Private Key: 7
3,001,321 UART: [art] Derive CDI
3,001,601 UART: [art] Store in in slot 0x4
3,087,202 UART: [art] Derive Key Pair
3,087,562 UART: [art] Store priv key in slot 0x5
3,100,070 UART: [art] Derive Key Pair - Done
3,114,957 UART: [art] Signing Cert with AUTHO
3,115,437 UART: RITY.KEYID = 7
3,130,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,334 UART: [art] PUB.X = 4AD6B3F2BEBC2D2FA4B7F9AED0CD0AAABCB52593F74F3F293D37015FBB0F1D1BADE7FC79BDE514C3905C12261E8E3123
3,138,125 UART: [art] PUB.Y = 2A87D5829472DA5F9F7C273F1EB17F0C8534983337415063007304152882A06D0D8C466054B3DEA8ED36E6FA20FA0FCB
3,145,039 UART: [art] SIG.R = 82E9ECB4C0E171C39E649DEEDC104E45A3F99CF1B2294E0E80BEE111BCF1A2802499B1C3DD0FE2C1FC5C066A1DD1CB29
3,151,824 UART: [art] SIG.S = 905E3489FAB2AE4373E904EEB45B89781B55A1683C972062D1230F2856B15A5EE8D6BF4FC1F0E38AC3A77271D1BA31A7
3,175,953 UART: Caliptra RT
3,176,206 UART: [state] CFI Enabled
3,284,542 UART: [rt] RT listening for mailbox commands...
3,285,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,092 UART: [rt]cmd =0x46504c54, len=4
3,316,156 >>> mbox cmd response data (8 bytes)
3,316,321 UART: [rt] FIPS self test
3,316,649 UART: [kat] ++
3,316,801 UART: [kat] sha1
3,320,901 UART: [kat] SHA2-256
3,322,923 UART: [kat] SHA2-384
3,325,882 UART: [kat] SHA2-512-ACC
3,327,809 UART: [kat] ECC-384
3,337,901 UART: [kat] HMAC-384Kdf
3,342,445 UART: [kat] LMS
3,610,923 UART: Fatal Error: 0x90070002
3,612,462 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,612,467 >>> mbox cmd response: failed
3,612,467 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,612,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,856 UART: [kat] LMS
1,171,184 UART: [kat] --
1,172,297 UART: [cold-reset] ++
1,172,687 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,407 UART: [idev] Sha1 KeyId Algorithm
1,210,071 UART: [idev] --
1,211,097 UART: [ldev] ++
1,211,265 UART: [ldev] CDI.KEYID = 6
1,211,628 UART: [ldev] SUBJECT.KEYID = 5
1,212,054 UART: [ldev] AUTHORITY.KEYID = 7
1,212,517 UART: [ldev] FE.KEYID = 1
1,217,667 UART: [ldev] Erasing FE.KEYID = 1
1,244,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,173 UART: [ldev] --
1,283,596 UART: [fwproc] Wait for Commands...
1,284,218 UART: [fwproc] Recv command 0x46574c44
1,284,946 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,196 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,841 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 ready_for_fw is high
1,059,905 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,648 >>> mbox cmd response: success
2,695,774 UART:
2,695,790 UART: Running Caliptra FMC ...
2,696,198 UART:
2,696,252 UART: [state] CFI Enabled
2,706,621 UART: [fht] FMC Alias Private Key: 7
2,814,060 UART: [art] Extend RT PCRs Done
2,814,488 UART: [art] Lock RT PCRs Done
2,816,004 UART: [art] Populate DV Done
2,824,251 UART: [fht] FMC Alias Private Key: 7
2,825,219 UART: [art] Derive CDI
2,825,499 UART: [art] Store in in slot 0x4
2,910,708 UART: [art] Derive Key Pair
2,911,068 UART: [art] Store priv key in slot 0x5
2,924,356 UART: [art] Derive Key Pair - Done
2,938,839 UART: [art] Signing Cert with AUTHO
2,939,319 UART: RITY.KEYID = 7
2,954,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,474 UART: [art] PUB.X = 3A7B4E2073F113347AEC046C7FEB7FD851F87016F028491FC7ABC991610B6ADA65A59C5C3363881D8CA7EBF965D6E6A7
2,962,248 UART: [art] PUB.Y = D014374A38CEC63A6C7088298E95F406E45BBEE4952A938FA44EA4FA20E241A03D965DFAABFE82C554A0EC86C8557372
2,969,205 UART: [art] SIG.R = 3627EC484360BAABE5308C3D7EF9E36A906D8C6B1DAD85D07F4079D5EBDEBBA10C1263AE844F582B96B45FD045061BD1
2,975,985 UART: [art] SIG.S = 93E46A20A24AC9D378767E05C70C843C58BE44CF938CEF52AE2E649AC0887A8021BF3D8580688DD0697845B94807B210
2,999,419 UART: Caliptra RT
2,999,672 UART: [state] CFI Enabled
3,107,429 UART: [rt] RT listening for mailbox commands...
3,108,092 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,935 UART: [rt]cmd =0x46504c54, len=4
3,138,919 >>> mbox cmd response data (8 bytes)
3,139,246 UART: [rt] FIPS self test
3,139,574 UART: [kat] ++
3,139,726 UART: [kat] sha1
3,144,032 UART: [kat] SHA2-256
3,146,054 UART: [kat] SHA2-384
3,148,877 UART: [kat] SHA2-512-ACC
3,150,804 UART: [kat] ECC-384
3,160,908 UART: [kat] HMAC-384Kdf
3,165,416 UART: [kat] LMS
3,434,074 UART: Fatal Error: 0x90070002
3,435,613 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,435,618 >>> mbox cmd response: failed
3,435,618 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,435,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,192 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
893,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,710 UART: [kat] ++
897,862 UART: [kat] sha1
901,992 UART: [kat] SHA2-256
903,932 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,193 UART: [kat] LMS
1,171,521 UART: [kat] --
1,172,538 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,697 UART: [idev] ++
1,175,865 UART: [idev] CDI.KEYID = 6
1,176,225 UART: [idev] SUBJECT.KEYID = 7
1,176,649 UART: [idev] UDS.KEYID = 0
1,176,994 ready_for_fw is high
1,176,994 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,520 UART: [idev] Sha1 KeyId Algorithm
1,209,950 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,766 UART: [ldev] Erasing FE.KEYID = 1
1,243,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,008 UART: [ldev] --
1,283,313 UART: [fwproc] Wait for Commands...
1,283,937 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,391 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,156 >>> mbox cmd response: success
2,784,406 UART: [afmc] ++
2,784,574 UART: [afmc] CDI.KEYID = 6
2,784,936 UART: [afmc] SUBJECT.KEYID = 7
2,785,361 UART: [afmc] AUTHORITY.KEYID = 5
2,821,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,184 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,699 UART: [afmc] --
2,864,739 UART: [cold-reset] --
2,865,421 UART: [state] Locking Datavault
2,866,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,102 UART: [state] Locking ICCM
2,867,720 UART: [exit] Launching FMC @ 0x40000130
2,873,049 UART:
2,873,065 UART: Running Caliptra FMC ...
2,873,473 UART:
2,873,616 UART: [state] CFI Enabled
2,884,207 UART: [fht] FMC Alias Private Key: 7
2,992,340 UART: [art] Extend RT PCRs Done
2,992,768 UART: [art] Lock RT PCRs Done
2,994,248 UART: [art] Populate DV Done
3,002,515 UART: [fht] FMC Alias Private Key: 7
3,003,461 UART: [art] Derive CDI
3,003,741 UART: [art] Store in in slot 0x4
3,089,302 UART: [art] Derive Key Pair
3,089,662 UART: [art] Store priv key in slot 0x5
3,102,908 UART: [art] Derive Key Pair - Done
3,118,121 UART: [art] Signing Cert with AUTHO
3,118,601 UART: RITY.KEYID = 7
3,133,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,198 UART: [art] PUB.X = 3AB959D0E121BAEFFC5363EBBDFE0C49499273FC584EADF1D6F68B027FB8A44490AD5563D4FBD49A162203E83AD5038E
3,140,974 UART: [art] PUB.Y = 51F24915BA6AD22A0DB5B17F91FE2F6F9E391DA9BE3397F9887979B6C5483C15CEE4C0A662F4FD5648FB97CB9469D924
3,147,931 UART: [art] SIG.R = 4AE790915F967AF679B886CFE1C500AC14D831CFAD731BF188F9F5011DFCD8A7194479DF55ACEF57F6C6761DDC162AF6
3,154,692 UART: [art] SIG.S = 7542C7CAAE4236C2F3B43AA29FD7440AF6622393E99CE6740E82076DC9C34DE78A2F7E51F6B339412289C0EB07168F56
3,178,187 UART: Caliptra RT
3,178,532 UART: [state] CFI Enabled
3,286,293 UART: [rt] RT listening for mailbox commands...
3,286,956 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,833 UART: [rt]cmd =0x46504c54, len=4
3,317,987 >>> mbox cmd response data (8 bytes)
3,318,142 UART: [rt] FIPS self test
3,318,470 UART: [kat] ++
3,318,622 UART: [kat] sha1
3,322,946 UART: [kat] SHA2-256
3,324,968 UART: [kat] SHA2-384
3,327,593 UART: [kat] SHA2-512-ACC
3,329,520 UART: [kat] ECC-384
3,339,960 UART: [kat] HMAC-384Kdf
3,344,746 UART: [kat] LMS
3,613,418 UART: Fatal Error: 0x90070002
3,614,957 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,614,962 >>> mbox cmd response: failed
3,614,962 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,614,967 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,172,224 UART: [cold-reset] ++
1,172,638 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,115 UART: [idev] Erasing UDS.KEYID = 0
1,201,068 UART: [idev] Sha1 KeyId Algorithm
1,209,624 UART: [idev] --
1,210,752 UART: [ldev] ++
1,210,920 UART: [ldev] CDI.KEYID = 6
1,211,283 UART: [ldev] SUBJECT.KEYID = 5
1,211,709 UART: [ldev] AUTHORITY.KEYID = 7
1,212,172 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,243,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,792 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,813 UART: [fwproc] Recv command 0x46574c44
1,284,541 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,509 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,784,160 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,778 ready_for_fw is high
1,059,778 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,965 >>> mbox cmd response: success
2,696,709 UART:
2,696,725 UART: Running Caliptra FMC ...
2,697,133 UART:
2,697,276 UART: [state] CFI Enabled
2,707,637 UART: [fht] FMC Alias Private Key: 7
2,815,790 UART: [art] Extend RT PCRs Done
2,816,218 UART: [art] Lock RT PCRs Done
2,818,056 UART: [art] Populate DV Done
2,826,201 UART: [fht] FMC Alias Private Key: 7
2,827,173 UART: [art] Derive CDI
2,827,453 UART: [art] Store in in slot 0x4
2,913,732 UART: [art] Derive Key Pair
2,914,092 UART: [art] Store priv key in slot 0x5
2,926,980 UART: [art] Derive Key Pair - Done
2,941,802 UART: [art] Signing Cert with AUTHO
2,942,282 UART: RITY.KEYID = 7
2,957,076 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,841 UART: [art] PUB.X = E978535DBE3F8D5C166467DCADD447E1F92868C22BC0E0D9AAD3B1CDC77493C0725DECE48705D692085AF353B5ACC17A
2,964,621 UART: [art] PUB.Y = 88BA0D0A220C0EC07F52A9ADA59487DC24A723189E80841121AE4BB3C3CEA460F4F39F6A72C37DDFD99EFE1DE04C8FE6
2,971,579 UART: [art] SIG.R = 96EF386D719857EBBA84AB70152C73CC228F90C0DDB0FC30DF664085D4CC26AC97C08F73F3D9AAB9A5BB34BED41552AD
2,978,369 UART: [art] SIG.S = B6E5D00BB00E21F90464E35E423FE88C3760152AAC35942F4DBE9E2FDBB4E3B106FE53BFEAABAD7B3EA9B10410D38B3E
3,001,753 UART: Caliptra RT
3,002,098 UART: [state] CFI Enabled
3,109,244 UART: [rt] RT listening for mailbox commands...
3,109,907 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,512 UART: [rt]cmd =0x46504c54, len=4
3,140,602 >>> mbox cmd response data (8 bytes)
3,140,869 UART: [rt] FIPS self test
3,141,197 UART: [kat] ++
3,141,349 UART: [kat] sha1
3,145,453 UART: [kat] SHA2-256
3,147,475 UART: [kat] SHA2-384
3,150,524 UART: [kat] SHA2-512-ACC
3,152,451 UART: [kat] ECC-384
3,162,551 UART: [kat] HMAC-384Kdf
3,166,947 UART: [kat] LMS
3,435,493 UART: Fatal Error: 0x90070002
3,437,032 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,437,037 >>> mbox cmd response: failed
3,437,037 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,437,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,596 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,373 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,174,043 ready_for_fw is high
1,174,043 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,411 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,280,044 UART: [fwproc] Wait for Commands...
1,280,649 UART: [fwproc] Recv command 0x46574c44
1,281,382 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,155 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,778,799 >>> mbox cmd response: success
2,780,000 UART: [afmc] ++
2,780,168 UART: [afmc] CDI.KEYID = 6
2,780,531 UART: [afmc] SUBJECT.KEYID = 7
2,780,957 UART: [afmc] AUTHORITY.KEYID = 5
2,815,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,017 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,348 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,225 UART: [afmc] --
2,859,217 UART: [cold-reset] --
2,859,955 UART: [state] Locking Datavault
2,861,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,734 UART: [state] Locking ICCM
2,862,188 UART: [exit] Launching FMC @ 0x40000130
2,867,517 UART:
2,867,533 UART: Running Caliptra FMC ...
2,867,941 UART:
2,867,995 UART: [state] CFI Enabled
2,878,662 UART: [fht] FMC Alias Private Key: 7
2,987,031 UART: [art] Extend RT PCRs Done
2,987,459 UART: [art] Lock RT PCRs Done
2,989,101 UART: [art] Populate DV Done
2,997,222 UART: [fht] FMC Alias Private Key: 7
2,998,178 UART: [art] Derive CDI
2,998,458 UART: [art] Store in in slot 0x4
3,084,243 UART: [art] Derive Key Pair
3,084,603 UART: [art] Store priv key in slot 0x5
3,097,353 UART: [art] Derive Key Pair - Done
3,112,244 UART: [art] Signing Cert with AUTHO
3,112,724 UART: RITY.KEYID = 7
3,128,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,859 UART: [art] PUB.X = 117C3CD1930B6C63DF33773CDB5D0EDBACA8D2A2A4C789290417783191B50CA6CA543C858A895CEBB88370981FACAC81
3,135,629 UART: [art] PUB.Y = E0233AE5D1443CC6AA31570CA96373917D6AC6DBFE76E7E386513D66F32F8E6827327B27917070703FF985E9EB12E4EC
3,142,578 UART: [art] SIG.R = 13768192E3EB6C3245E636D76EC916CEA3FB5513AF18843B59FC9226950E635788AEE21C5550807F276A582FF59B74FB
3,149,343 UART: [art] SIG.S = F6CAD9DD0FDEA9E6AD9F94CA4F3947AD1F6F010CC663D7AA1865A5AE25A9FFBF501E44AC51737FA5190ADCE81EF7AC1B
3,172,572 UART: Caliptra RT
3,172,825 UART: [state] CFI Enabled
3,280,376 UART: [rt] RT listening for mailbox commands...
3,281,039 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,632 UART: [rt]cmd =0x46504c54, len=4
3,311,756 >>> mbox cmd response data (8 bytes)
3,312,087 UART: [rt] FIPS self test
3,312,415 UART: [kat] ++
3,312,567 UART: [kat] sha1
3,316,775 UART: [kat] SHA2-256
3,318,797 UART: [kat] SHA2-384
3,321,648 UART: [kat] SHA2-512-ACC
3,323,575 UART: [kat] ECC-384
3,333,451 UART: [kat] HMAC-384Kdf
3,338,017 UART: [kat] LMS
3,606,737 UART: Fatal Error: 0x90070002
3,608,276 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,608,281 >>> mbox cmd response: failed
3,608,281 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,608,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
915,662 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,174,037 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,319 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,688 UART: [ldev] Erasing FE.KEYID = 1
1,241,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,692 UART: [ldev] --
1,279,974 UART: [fwproc] Wait for Commands...
1,280,639 UART: [fwproc] Recv command 0x46574c44
1,281,372 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,055 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,835 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,906 ready_for_fw is high
1,055,906 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,645 >>> mbox cmd response: success
2,692,185 UART:
2,692,201 UART: Running Caliptra FMC ...
2,692,609 UART:
2,692,663 UART: [state] CFI Enabled
2,702,814 UART: [fht] FMC Alias Private Key: 7
2,811,031 UART: [art] Extend RT PCRs Done
2,811,459 UART: [art] Lock RT PCRs Done
2,813,183 UART: [art] Populate DV Done
2,821,328 UART: [fht] FMC Alias Private Key: 7
2,822,324 UART: [art] Derive CDI
2,822,604 UART: [art] Store in in slot 0x4
2,908,403 UART: [art] Derive Key Pair
2,908,763 UART: [art] Store priv key in slot 0x5
2,921,871 UART: [art] Derive Key Pair - Done
2,936,377 UART: [art] Signing Cert with AUTHO
2,936,857 UART: RITY.KEYID = 7
2,952,247 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,012 UART: [art] PUB.X = 2BA0F58BADAC53E9BC36554319F296F8AF9241358CA1853E6EE101C66076906D1613749EA1618403E6F71B37E3DDFD89
2,959,778 UART: [art] PUB.Y = C62E2E7F79D681EEC2FFC978D2AA4230A1F59F66631CEB973A6BE1E2A381B2B39D0B6AB934FC213BED5E43C73046C7D6
2,966,743 UART: [art] SIG.R = DD1DDDA6A58911AB3E1A55966B7D078D59F51D0194F794F5AA46F3C2730E30FED140DF3F2E28D739812F71E2D39F7A70
2,973,514 UART: [art] SIG.S = 19A6504BC8DC01996A56274828D79C6BEA8D788BFF91B0F1618EFEBB3EABAB785471D7927496A8F44743680D9E6C5539
2,997,133 UART: Caliptra RT
2,997,386 UART: [state] CFI Enabled
3,105,237 UART: [rt] RT listening for mailbox commands...
3,105,900 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,811 UART: [rt]cmd =0x46504c54, len=4
3,137,025 >>> mbox cmd response data (8 bytes)
3,137,138 UART: [rt] FIPS self test
3,137,466 UART: [kat] ++
3,137,618 UART: [kat] sha1
3,141,832 UART: [kat] SHA2-256
3,143,854 UART: [kat] SHA2-384
3,146,675 UART: [kat] SHA2-512-ACC
3,148,602 UART: [kat] ECC-384
3,158,612 UART: [kat] HMAC-384Kdf
3,163,148 UART: [kat] LMS
3,431,858 UART: Fatal Error: 0x90070002
3,433,397 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,433,402 >>> mbox cmd response: failed
3,433,402 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,433,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,270 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,845 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
905,079 UART: [kat] SHA2-512-ACC
906,980 UART: [kat] ECC-384
916,893 UART: [kat] HMAC-384Kdf
921,361 UART: [kat] LMS
1,169,673 UART: [kat] --
1,170,708 UART: [cold-reset] ++
1,171,226 UART: [fht] FHT @ 0x50003400
1,173,900 UART: [idev] ++
1,174,068 UART: [idev] CDI.KEYID = 6
1,174,429 UART: [idev] SUBJECT.KEYID = 7
1,174,854 UART: [idev] UDS.KEYID = 0
1,175,200 ready_for_fw is high
1,175,200 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,746 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,627 UART: [ldev] ++
1,209,795 UART: [ldev] CDI.KEYID = 6
1,210,159 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,217 UART: [ldev] --
1,281,607 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x46574c44
1,283,065 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,402 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,258 >>> mbox cmd response: success
2,783,415 UART: [afmc] ++
2,783,583 UART: [afmc] CDI.KEYID = 6
2,783,946 UART: [afmc] SUBJECT.KEYID = 7
2,784,372 UART: [afmc] AUTHORITY.KEYID = 5
2,820,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,152 UART: [afmc] --
2,864,208 UART: [cold-reset] --
2,864,832 UART: [state] Locking Datavault
2,866,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,629 UART: [state] Locking ICCM
2,867,083 UART: [exit] Launching FMC @ 0x40000130
2,872,412 UART:
2,872,428 UART: Running Caliptra FMC ...
2,872,836 UART:
2,872,979 UART: [state] CFI Enabled
2,883,470 UART: [fht] FMC Alias Private Key: 7
2,991,121 UART: [art] Extend RT PCRs Done
2,991,549 UART: [art] Lock RT PCRs Done
2,993,085 UART: [art] Populate DV Done
3,001,102 UART: [fht] FMC Alias Private Key: 7
3,002,248 UART: [art] Derive CDI
3,002,528 UART: [art] Store in in slot 0x4
3,088,259 UART: [art] Derive Key Pair
3,088,619 UART: [art] Store priv key in slot 0x5
3,102,569 UART: [art] Derive Key Pair - Done
3,117,353 UART: [art] Signing Cert with AUTHO
3,117,833 UART: RITY.KEYID = 7
3,133,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,272 UART: [art] PUB.X = 987FF845DBA8C216F0D89DF4B8097F0513AF2F60F8117EF3275986B6B05E4A1AE4ADFEC0A92AF71C248EAB053D56B410
3,141,047 UART: [art] PUB.Y = 076DD1E8FDA9276E62C086A97397E583E8E07AEFBED2D9D399F45DC53013E64D5F3ECF401C8A5301C10572520B65AC50
3,147,993 UART: [art] SIG.R = 71B85C3C3EE17716F402160E37437B7B3E4877EE3469B025FD3C8F1B3A4F0FCEDD413A4E0AE891BFFE34BE252A2AAD3D
3,154,769 UART: [art] SIG.S = 15CD49B6973A3AF094F488B48814B9D03C82989A654FEBD47AD178B442B08F80CA2F6677146033CEA6CBEF41E2003C62
3,178,260 UART: Caliptra RT
3,178,605 UART: [state] CFI Enabled
3,286,538 UART: [rt] RT listening for mailbox commands...
3,287,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,906 UART: [rt]cmd =0x46504c54, len=4
3,318,182 >>> mbox cmd response data (8 bytes)
3,318,467 UART: [rt] FIPS self test
3,318,795 UART: [kat] ++
3,318,947 UART: [kat] sha1
3,322,999 UART: [kat] SHA2-256
3,325,021 UART: [kat] SHA2-384
3,327,892 UART: [kat] SHA2-512-ACC
3,329,819 UART: [kat] ECC-384
3,339,997 UART: [kat] HMAC-384Kdf
3,344,749 UART: [kat] LMS
3,613,321 UART: Fatal Error: 0x90070002
3,614,860 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,614,865 >>> mbox cmd response: failed
3,614,865 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,614,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,629 UART: [kat] HMAC-384Kdf
921,183 UART: [kat] LMS
1,169,495 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,170,960 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,175,040 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,704 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,215,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,740 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,590 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,883 ready_for_fw is high
1,056,883 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,950 >>> mbox cmd response: success
2,693,546 UART:
2,693,562 UART: Running Caliptra FMC ...
2,693,970 UART:
2,694,113 UART: [state] CFI Enabled
2,704,832 UART: [fht] FMC Alias Private Key: 7
2,812,823 UART: [art] Extend RT PCRs Done
2,813,251 UART: [art] Lock RT PCRs Done
2,814,903 UART: [art] Populate DV Done
2,823,066 UART: [fht] FMC Alias Private Key: 7
2,824,056 UART: [art] Derive CDI
2,824,336 UART: [art] Store in in slot 0x4
2,910,051 UART: [art] Derive Key Pair
2,910,411 UART: [art] Store priv key in slot 0x5
2,923,449 UART: [art] Derive Key Pair - Done
2,938,361 UART: [art] Signing Cert with AUTHO
2,938,841 UART: RITY.KEYID = 7
2,954,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,994 UART: [art] PUB.X = 0738BBBF1C8CCDD563D294C46B81634DC9E88DA307F1EDB720B4CF3F373402EACCF364EC6E7A35B4B23DF7AD5FFA26A1
2,961,781 UART: [art] PUB.Y = AF06D178B526F0E60DC342B05D825D7BCE469E73CAD0675CDDE8D9D63CF643DD6DBAFD190C9522B24EECF0A99873C978
2,968,742 UART: [art] SIG.R = 0992780D228E2D24C62D83D7B21501C20FDC5F4B0F2CB23D7F6FEDDDCC1FF46433ACE1BC675D4D0A8E8997FBFAC6D25D
2,975,518 UART: [art] SIG.S = 99E9C8933FC7A73DF4EE1ACFD8B6321768C5848A6B4FF439C27A32521189649F08137341E29C6B5D83051A57429EDB81
2,998,919 UART: Caliptra RT
2,999,264 UART: [state] CFI Enabled
3,107,319 UART: [rt] RT listening for mailbox commands...
3,107,982 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,873 UART: [rt]cmd =0x46504c54, len=4
3,139,069 >>> mbox cmd response data (8 bytes)
3,139,404 UART: [rt] FIPS self test
3,139,732 UART: [kat] ++
3,139,884 UART: [kat] sha1
3,144,276 UART: [kat] SHA2-256
3,146,298 UART: [kat] SHA2-384
3,149,231 UART: [kat] SHA2-512-ACC
3,151,158 UART: [kat] ECC-384
3,160,766 UART: [kat] HMAC-384Kdf
3,165,550 UART: [kat] LMS
3,434,180 UART: Fatal Error: 0x90070002
3,435,719 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,435,724 >>> mbox cmd response: failed
3,435,724 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,435,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,752 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
2,666,302 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,810,033 >>> mbox cmd response: failed
2,810,591 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,953,317 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,866,386 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,434,802 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,672,019 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,815,857 >>> mbox cmd response: failed
2,816,420 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,959,154 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,859,917 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,409,282 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,026,309 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,170,086 >>> mbox cmd response: failed
3,170,722 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,313,584 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
21,580,715 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,022,448 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,017,096 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,160,922 >>> mbox cmd response: failed
3,161,481 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,304,341 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
21,588,719 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,023,992 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
2,684,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,828,939 >>> mbox cmd response: failed
2,829,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,972,782 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,456,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,264,386 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,690,404 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,834,411 >>> mbox cmd response: failed
2,834,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,978,322 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,465,524 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,297,817 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,033,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,177,796 >>> mbox cmd response: failed
3,178,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,321,649 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
20,186,086 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,898,379 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,033,960 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,178,364 >>> mbox cmd response: failed
3,178,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,322,276 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,197,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,909,500 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,313 writing to cptra_bootfsm_go
2,694,461 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,839,618 >>> mbox cmd response: failed
2,840,225 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,983,547 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,481,152 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,279,946 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,686,498 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,831,168 >>> mbox cmd response: failed
2,831,756 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,975,612 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,444,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,312,462 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,334 writing to cptra_bootfsm_go
3,058,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,202,288 >>> mbox cmd response: failed
3,202,845 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,346,181 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,159,991 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,873,628 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,034,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,179,265 >>> mbox cmd response: failed
3,179,817 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,323,111 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,183,183 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,906,660 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,836 >>> mbox cmd response: failed
803,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,123 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,539 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,864 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,872 >>> mbox cmd response: failed
803,872 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,607 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,233 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,547 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,555 >>> mbox cmd response: failed
803,555 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,598 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,718 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,529 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,537 >>> mbox cmd response: failed
804,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,750 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,440 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,532 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,540 >>> mbox cmd response: failed
803,540 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,391 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,346 >>> mbox cmd response: failed
803,346 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,943 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,124 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,439 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,447 >>> mbox cmd response: failed
804,447 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,661 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,409 >>> mbox cmd response: failed
804,409 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,294 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,568 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,012 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,020 >>> mbox cmd response: failed
804,020 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,119 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,448 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,456 >>> mbox cmd response: failed
803,456 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
803,462 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,435 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,387 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,395 >>> mbox cmd response: failed
804,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,058 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,343 >>> mbox cmd response: failed
804,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
804,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,308 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,928 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,124 UART:
192,499 UART: Running Caliptra ROM ...
193,627 UART:
193,777 UART: [state] CFI Enabled
262,540 UART: [state] LifecycleState = Unprovisioned
264,538 UART: [state] DebugLocked = No
266,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,015 UART: [kat] SHA2-256
440,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,229 UART: [kat] ++
451,835 UART: [kat] sha1
462,295 UART: [kat] SHA2-256
464,944 UART: [kat] SHA2-384
471,715 UART: [kat] SHA2-512-ACC
474,098 UART: [kat] ECC-384
2,767,195 UART: [kat] HMAC-384Kdf
2,800,343 UART: [kat] LMS
3,990,641 UART: [kat] --
3,994,595 UART: [cold-reset] ++
3,996,051 UART: [fht] Storing FHT @ 0x50003400
4,007,541 UART: [idev] ++
4,008,113 UART: [idev] CDI.KEYID = 6
4,009,191 UART: [idev] SUBJECT.KEYID = 7
4,010,522 UART: [idev] UDS.KEYID = 0
4,011,565 ready_for_fw is high
4,011,798 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,155,897 UART: [idev] Erasing UDS.KEYID = 0
7,348,272 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,314 UART: [idev] --
7,374,021 UART: [ldev] ++
7,374,635 UART: [ldev] CDI.KEYID = 6
7,375,521 UART: [ldev] SUBJECT.KEYID = 5
7,376,758 UART: [ldev] AUTHORITY.KEYID = 7
7,377,992 UART: [ldev] FE.KEYID = 1
7,416,706 UART: [ldev] Erasing FE.KEYID = 1
10,749,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,222 UART: [ldev] --
13,130,282 UART: [fwproc] Waiting for Commands...
13,132,963 UART: [fwproc] Received command 0x46574c44
13,135,164 UART: [fwproc] Received Image of size 114632 bytes
17,197,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,841 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,662,197 >>> mbox cmd response: success
17,667,059 UART: [afmc] ++
17,667,666 UART: [afmc] CDI.KEYID = 6
17,668,580 UART: [afmc] SUBJECT.KEYID = 7
17,669,797 UART: [afmc] AUTHORITY.KEYID = 5
21,024,213 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,856 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,246 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,115 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,544 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,723 UART: [afmc] --
23,394,873 UART: [cold-reset] --
23,400,949 UART: [state] Locking Datavault
23,407,654 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,410 UART: [state] Locking ICCM
23,412,102 UART: [exit] Launching FMC @ 0x40000130
23,420,475 UART:
23,420,717 UART: Running Caliptra FMC ...
23,421,817 UART:
23,421,978 UART: [state] CFI Enabled
23,484,973 UART: [fht] FMC Alias Private Key: 7
25,822,690 UART: [art] Extend RT PCRs Done
25,823,919 UART: [art] Lock RT PCRs Done
25,825,271 UART: [art] Populate DV Done
25,830,584 UART: [fht] FMC Alias Private Key: 7
25,832,175 UART: [art] Derive CDI
25,832,992 UART: [art] Store in in slot 0x4
25,894,101 UART: [art] Derive Key Pair
25,895,143 UART: [art] Store priv key in slot 0x5
29,188,150 UART: [art] Derive Key Pair - Done
29,201,058 UART: [art] Signing Cert with AUTHO
29,202,377 UART: RITY.KEYID = 7
31,490,723 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,239 UART: [art] PUB.X = 38474EE4C28EC820EC01DE42BF9B7A9FD43F1426E421D7DE35C5C0925AED65ADE5671C69643A8C4E768570588F140501
31,499,514 UART: [art] PUB.Y = E19E9DBCD406D7A492833B2544D7D472616F94BD7CFB3AF3494730537B7FC8805C7CCFF0B28EBF559BE9BAE149C35CD2
31,506,761 UART: [art] SIG.R = 4B38A37FECD3BA5CD36EC3F048E1FC833C94F52D02A565249E67BB50789AFA580F4F87D2D3A4276965792F192D31B89C
31,514,131 UART: [art] SIG.S = 02AD4F0CD1B5F7547A031A93EE03C8C66973F3EE317F09A96A6C1C20537AFF78906FC91C8C512A5EF80515DA33E842F7
32,819,286 UART: Caliptra RT
32,819,988 UART: [state] CFI Enabled
32,979,597 UART: [rt] RT listening for mailbox commands...
32,981,475 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,011,208 UART: [rt]cmd =0x46504c54, len=4
33,012,841 >>> mbox cmd response data (8 bytes)
33,014,079 UART: [rt] FIPS self test
33,015,026 UART: [kat] ++
33,015,476 UART: [kat] sha1
33,015,989 UART: Fatal Error: 0x90060001
33,051,289 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,195,224 >>> mbox cmd response: failed
33,195,817 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,339,709 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,085 UART:
190,379 UART: Running Caliptra ROM ...
191,485 UART:
191,638 UART: [state] CFI Enabled
260,600 UART: [state] LifecycleState = Unprovisioned
262,482 UART: [state] DebugLocked = No
265,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,448 UART: [kat] SHA2-256
439,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,673 UART: [kat] ++
450,147 UART: [kat] sha1
461,962 UART: [kat] SHA2-256
464,652 UART: [kat] SHA2-384
471,711 UART: [kat] SHA2-512-ACC
474,105 UART: [kat] ECC-384
2,766,186 UART: [kat] HMAC-384Kdf
2,798,290 UART: [kat] LMS
3,988,567 UART: [kat] --
3,995,171 UART: [cold-reset] ++
3,996,673 UART: [fht] Storing FHT @ 0x50003400
4,008,803 UART: [idev] ++
4,009,371 UART: [idev] CDI.KEYID = 6
4,010,311 UART: [idev] SUBJECT.KEYID = 7
4,011,579 UART: [idev] UDS.KEYID = 0
4,013,097 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,157,201 UART: [idev] Erasing UDS.KEYID = 0
7,343,625 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,787 UART: [idev] --
7,369,625 UART: [ldev] ++
7,370,196 UART: [ldev] CDI.KEYID = 6
7,371,215 UART: [ldev] SUBJECT.KEYID = 5
7,372,375 UART: [ldev] AUTHORITY.KEYID = 7
7,373,607 UART: [ldev] FE.KEYID = 1
7,422,612 UART: [ldev] Erasing FE.KEYID = 1
10,752,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,436 UART: [ldev] --
13,113,650 UART: [fwproc] Waiting for Commands...
13,116,450 UART: [fwproc] Received command 0x46574c44
13,118,691 UART: [fwproc] Received Image of size 114632 bytes
17,177,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,795 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,640,339 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,785,537 ready_for_fw is high
3,786,063 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,871,735 >>> mbox cmd response: success
23,563,583 UART:
23,564,001 UART: Running Caliptra FMC ...
23,565,155 UART:
23,565,319 UART: [state] CFI Enabled
23,615,399 UART: [fht] FMC Alias Private Key: 7
25,952,791 UART: [art] Extend RT PCRs Done
25,954,021 UART: [art] Lock RT PCRs Done
25,956,028 UART: [art] Populate DV Done
25,961,038 UART: [fht] FMC Alias Private Key: 7
25,962,544 UART: [art] Derive CDI
25,963,310 UART: [art] Store in in slot 0x4
26,024,141 UART: [art] Derive Key Pair
26,025,144 UART: [art] Store priv key in slot 0x5
29,317,896 UART: [art] Derive Key Pair - Done
29,330,684 UART: [art] Signing Cert with AUTHO
29,331,991 UART: RITY.KEYID = 7
31,620,484 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,023 UART: [art] PUB.X = 09A0D67EA916B3FD6680AF7FF92F76176BDD3A90A309570A98C9EC55489429B56B0B7DDF91CF8D99DCF836589109C609
31,629,278 UART: [art] PUB.Y = 2938AB98393BD785EF8D21A1F01176AE4BC21CFD524A1C05F8FAFE5AD3A0D08651567ECF6280AC68E9918AF1423DAF71
31,636,473 UART: [art] SIG.R = 0221E6C348D18D2AFD6BEF9C020FF41975F1D385DE0D21493A71152A97FAADBB662AB49F672E00D1C7439FBD115D9F08
31,643,890 UART: [art] SIG.S = 8397933741551ADC293C271B7E157F114F08F458252CBBC3FECBFD64CA69C2CCED3753EC1ADED45172BAF1677EB09BE1
32,949,126 UART: Caliptra RT
32,949,835 UART: [state] CFI Enabled
33,111,781 UART: [rt] RT listening for mailbox commands...
33,113,641 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,143,280 UART: [rt]cmd =0x46504c54, len=4
33,144,993 >>> mbox cmd response data (8 bytes)
33,145,947 UART: [rt] FIPS self test
33,146,895 UART: [kat] ++
33,147,348 UART: [kat] sha1
33,148,079 UART: Fatal Error: 0x90060001
33,183,459 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,327,525 >>> mbox cmd response: failed
33,328,210 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,472,018 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,781,043 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,869,509 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,506 UART:
192,852 UART: Running Caliptra ROM ...
194,025 UART:
603,709 UART: [state] CFI Enabled
616,883 UART: [state] LifecycleState = Unprovisioned
618,836 UART: [state] DebugLocked = No
621,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,616 UART: [kat] SHA2-256
795,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,937 UART: [kat] ++
806,417 UART: [kat] sha1
817,718 UART: [kat] SHA2-256
820,442 UART: [kat] SHA2-384
825,795 UART: [kat] SHA2-512-ACC
828,165 UART: [kat] ECC-384
3,111,848 UART: [kat] HMAC-384Kdf
3,123,834 UART: [kat] LMS
4,313,885 UART: [kat] --
4,318,601 UART: [cold-reset] ++
4,319,540 UART: [fht] Storing FHT @ 0x50003400
4,331,799 UART: [idev] ++
4,332,444 UART: [idev] CDI.KEYID = 6
4,333,351 UART: [idev] SUBJECT.KEYID = 7
4,334,598 UART: [idev] UDS.KEYID = 0
4,335,661 ready_for_fw is high
4,335,892 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,480,338 UART: [idev] Erasing UDS.KEYID = 0
7,623,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,097 UART: [idev] --
7,650,536 UART: [ldev] ++
7,651,119 UART: [ldev] CDI.KEYID = 6
7,652,031 UART: [ldev] SUBJECT.KEYID = 5
7,653,252 UART: [ldev] AUTHORITY.KEYID = 7
7,654,542 UART: [ldev] FE.KEYID = 1
7,665,891 UART: [ldev] Erasing FE.KEYID = 1
10,957,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,715 UART: [ldev] --
13,318,793 UART: [fwproc] Waiting for Commands...
13,320,900 UART: [fwproc] Received command 0x46574c44
13,323,101 UART: [fwproc] Received Image of size 114632 bytes
17,380,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,399 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,848,131 >>> mbox cmd response: success
17,851,797 UART: [afmc] ++
17,852,393 UART: [afmc] CDI.KEYID = 6
17,853,308 UART: [afmc] SUBJECT.KEYID = 7
17,854,581 UART: [afmc] AUTHORITY.KEYID = 5
21,171,315 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,465,772 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,026 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,482,425 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,497,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,511,688 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,533,454 UART: [afmc] --
23,537,053 UART: [cold-reset] --
23,539,836 UART: [state] Locking Datavault
23,546,595 UART: [state] Locking PCR0, PCR1 and PCR31
23,548,354 UART: [state] Locking ICCM
23,549,829 UART: [exit] Launching FMC @ 0x40000130
23,558,219 UART:
23,558,461 UART: Running Caliptra FMC ...
23,559,773 UART:
23,559,942 UART: [state] CFI Enabled
23,567,777 UART: [fht] FMC Alias Private Key: 7
25,899,034 UART: [art] Extend RT PCRs Done
25,900,253 UART: [art] Lock RT PCRs Done
25,901,874 UART: [art] Populate DV Done
25,907,393 UART: [fht] FMC Alias Private Key: 7
25,908,981 UART: [art] Derive CDI
25,909,816 UART: [art] Store in in slot 0x4
25,952,090 UART: [art] Derive Key Pair
25,953,093 UART: [art] Store priv key in slot 0x5
29,195,152 UART: [art] Derive Key Pair - Done
29,208,311 UART: [art] Signing Cert with AUTHO
29,209,612 UART: RITY.KEYID = 7
31,489,298 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,808 UART: [art] PUB.X = 315C0AF7894B0A974C2664BCCF6AA5C3DDE557068F56D1DF20A3E466B42F7CF9C28AAFF4D7A3114D5B132B2329E6C4E8
31,498,069 UART: [art] PUB.Y = C8CF96349B05A8E57EF34731431435D39E0A5E14ED40220E3A794FFA2ED7610F051CE48C2A891BFAB091F0D8A1A8CAF8
31,505,315 UART: [art] SIG.R = BF57F57A89CC30AA381FADBFDD545C535D3511235A9A1F6036642C698A924C67C10746DAA1B2560048A4DBD956F4718C
31,512,710 UART: [art] SIG.S = 6DC9C10211444F48A876BEEF9198439F589E96689352847D856CB3FAEF0BC906048C5DD79041F7310B96157980062030
32,817,454 UART: Caliptra RT
32,818,158 UART: [state] CFI Enabled
32,935,887 UART: [rt] RT listening for mailbox commands...
32,937,740 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,967,746 UART: [rt]cmd =0x46504c54, len=4
32,969,340 >>> mbox cmd response data (8 bytes)
32,970,413 UART: [rt] FIPS self test
32,971,355 UART: [kat] ++
32,971,805 UART: [kat] sha1
32,972,316 UART: Fatal Error: 0x90060001
33,007,682 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,151,555 >>> mbox cmd response: failed
33,152,179 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,296,115 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,109 UART:
190,398 UART: Running Caliptra ROM ...
191,424 UART:
7,235,431 UART: [state] CFI Enabled
7,247,059 UART: [state] LifecycleState = Unprovisioned
7,249,042 UART: [state] DebugLocked = No
7,250,974 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,256,735 UART: [kat] SHA2-256
7,426,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,437,030 UART: [kat] ++
7,437,491 UART: [kat] sha1
7,448,104 UART: [kat] SHA2-256
7,450,850 UART: [kat] SHA2-384
7,456,996 UART: [kat] SHA2-512-ACC
7,459,398 UART: [kat] ECC-384
9,745,520 UART: [kat] HMAC-384Kdf
9,758,175 UART: [kat] LMS
10,948,301 UART: [kat] --
10,952,252 UART: [cold-reset] ++
10,953,751 UART: [fht] Storing FHT @ 0x50003400
10,964,857 UART: [idev] ++
10,965,438 UART: [idev] CDI.KEYID = 6
10,966,347 UART: [idev] SUBJECT.KEYID = 7
10,967,611 UART: [idev] UDS.KEYID = 0
10,969,127 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,113,012 UART: [idev] Erasing UDS.KEYID = 0
14,255,633 UART: [idev] Using Sha1 for KeyId Algorithm
14,277,274 UART: [idev] --
14,281,676 UART: [ldev] ++
14,282,251 UART: [ldev] CDI.KEYID = 6
14,283,213 UART: [ldev] SUBJECT.KEYID = 5
14,284,427 UART: [ldev] AUTHORITY.KEYID = 7
14,285,712 UART: [ldev] FE.KEYID = 1
14,298,004 UART: [ldev] Erasing FE.KEYID = 1
17,589,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,883,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,897,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,912,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,927,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,945,851 UART: [ldev] --
19,951,263 UART: [fwproc] Waiting for Commands...
19,953,645 UART: [fwproc] Received command 0x46574c44
19,955,832 UART: [fwproc] Received Image of size 114632 bytes
24,013,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,081,551 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,150,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,468,685 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,121,918 ready_for_fw is high
4,122,551 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,080,249 >>> mbox cmd response: success
23,724,576 UART:
23,724,993 UART: Running Caliptra FMC ...
23,726,103 UART:
23,726,265 UART: [state] CFI Enabled
23,734,232 UART: [fht] FMC Alias Private Key: 7
26,064,790 UART: [art] Extend RT PCRs Done
26,066,017 UART: [art] Lock RT PCRs Done
26,068,034 UART: [art] Populate DV Done
26,073,418 UART: [fht] FMC Alias Private Key: 7
26,074,963 UART: [art] Derive CDI
26,075,727 UART: [art] Store in in slot 0x4
26,118,483 UART: [art] Derive Key Pair
26,119,508 UART: [art] Store priv key in slot 0x5
29,361,619 UART: [art] Derive Key Pair - Done
29,374,226 UART: [art] Signing Cert with AUTHO
29,375,532 UART: RITY.KEYID = 7
31,655,007 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,531 UART: [art] PUB.X = 1EF9B3B8A46C29ED45C37657BAE4FC42FFEA76DD81681FBCB2F1B55A0592EE082D24EAF832E02F370B8A2E2E5F994729
31,663,793 UART: [art] PUB.Y = CFE71FEADD5DB181CA82900DE574BCBD1FF987AEBE5B45B5F2CE470C71F940CB20E1889E58350CF132900375D9299A80
31,671,003 UART: [art] SIG.R = 741451EEAA7A88F5601CC27AEC905BE38B07604E9C7F6C41CCFE2161A31909C1BA1C6EAAEE8F334366C72B7EB373796B
31,678,406 UART: [art] SIG.S = EAA95F7658B61325E2CFA78557B9BB240EBC1D5CAAE19D92BFD727CC164CD3FB1EDE78545E547205A5B5F56E186A7058
32,983,394 UART: Caliptra RT
32,984,116 UART: [state] CFI Enabled
33,102,447 UART: [rt] RT listening for mailbox commands...
33,104,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,134,009 UART: [rt]cmd =0x46504c54, len=4
33,135,760 >>> mbox cmd response data (8 bytes)
33,137,204 UART: [rt] FIPS self test
33,138,166 UART: [kat] ++
33,138,614 UART: [kat] sha1
33,139,343 UART: Fatal Error: 0x90060001
33,174,666 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,318,511 >>> mbox cmd response: failed
33,319,147 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,463,090 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,599,854 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,553,192 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,414 UART:
192,778 UART: Running Caliptra ROM ...
193,984 UART:
194,139 UART: [state] CFI Enabled
263,727 UART: [state] LifecycleState = Unprovisioned
265,651 UART: [state] DebugLocked = No
266,908 UART: [state] WD Timer not started. Device not locked for debugging
270,812 UART: [kat] SHA2-256
449,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,541 UART: [kat] ++
462,075 UART: [kat] sha1
473,531 UART: [kat] SHA2-256
476,567 UART: [kat] SHA2-384
483,607 UART: [kat] SHA2-512-ACC
486,510 UART: [kat] ECC-384
2,945,888 UART: [kat] HMAC-384Kdf
2,972,204 UART: [kat] LMS
3,501,654 UART: [kat] --
3,505,224 UART: [cold-reset] ++
3,506,093 UART: [fht] FHT @ 0x50003400
3,517,659 UART: [idev] ++
3,518,304 UART: [idev] CDI.KEYID = 6
3,519,225 UART: [idev] SUBJECT.KEYID = 7
3,520,333 UART: [idev] UDS.KEYID = 0
3,521,236 ready_for_fw is high
3,521,434 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,665,866 UART: [idev] Erasing UDS.KEYID = 0
6,026,726 UART: [idev] Sha1 KeyId Algorithm
6,049,257 UART: [idev] --
6,053,469 UART: [ldev] ++
6,054,062 UART: [ldev] CDI.KEYID = 6
6,054,953 UART: [ldev] SUBJECT.KEYID = 5
6,056,112 UART: [ldev] AUTHORITY.KEYID = 7
6,057,402 UART: [ldev] FE.KEYID = 1
6,099,953 UART: [ldev] Erasing FE.KEYID = 1
8,606,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,557 UART: [ldev] --
10,407,133 UART: [fwproc] Wait for Commands...
10,408,640 UART: [fwproc] Recv command 0x46574c44
10,410,736 UART: [fwproc] Recv'd Img size: 114940 bytes
13,819,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,148 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,278,265 >>> mbox cmd response: success
14,282,177 UART: [afmc] ++
14,282,767 UART: [afmc] CDI.KEYID = 6
14,283,682 UART: [afmc] SUBJECT.KEYID = 7
14,284,842 UART: [afmc] AUTHORITY.KEYID = 5
16,820,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,548,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,070 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,595,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,290 UART: [afmc] --
18,623,428 UART: [cold-reset] --
18,628,201 UART: [state] Locking Datavault
18,633,931 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,793 UART: [state] Locking ICCM
18,636,713 UART: [exit] Launching FMC @ 0x40000130
18,645,123 UART:
18,645,360 UART: Running Caliptra FMC ...
18,646,465 UART:
18,646,624 UART: [state] CFI Enabled
18,704,288 UART: [fht] FMC Alias Private Key: 7
20,467,943 UART: [art] Extend RT PCRs Done
20,469,160 UART: [art] Lock RT PCRs Done
20,471,005 UART: [art] Populate DV Done
20,476,261 UART: [fht] FMC Alias Private Key: 7
20,477,945 UART: [art] Derive CDI
20,478,772 UART: [art] Store in in slot 0x4
20,536,890 UART: [art] Derive Key Pair
20,537,888 UART: [art] Store priv key in slot 0x5
23,000,876 UART: [art] Derive Key Pair - Done
23,013,622 UART: [art] Signing Cert with AUTHO
23,014,926 UART: RITY.KEYID = 7
24,726,378 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,881 UART: [art] PUB.X = 651D726278F9A178439F5DF54A7CBB975745B4A1FC49676BF6B479EB16C31C4CD447632D4FB5151DE719EF4CAB77300E
24,735,199 UART: [art] PUB.Y = 0F9A2847AA2C9B877F5D583058926387A60CF49A57C19095355E1165D0FCE30CB12D38DF59B8DB0235FE2EAE7EA9FB57
24,742,452 UART: [art] SIG.R = A06BD26EC68C1F639CDFA8053F91EE96F7435D621363FDF872336C60009E86E2D90315FE6D80853208B52E4B130039BA
24,749,799 UART: [art] SIG.S = 38DBD3FED58F5E63E2C30AD17E1781C66041065BA47E08359EC3A02335FA984387720B58A888927A5C8001552F76895A
25,727,904 UART: Caliptra RT
25,728,662 UART: [state] CFI Enabled
25,893,675 UART: [rt] RT listening for mailbox commands...
25,895,530 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,925,372 UART: [rt]cmd =0x46504c54, len=4
25,926,953 >>> mbox cmd response data (8 bytes)
25,927,966 UART: [rt] FIPS self test
25,928,914 UART: [kat] ++
25,929,368 UART: [kat] sha1
25,929,934 UART: Fatal Error: 0x90060001
25,965,083 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,109,446 >>> mbox cmd response: failed
26,110,049 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,254,337 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
190,103 UART:
190,420 UART: Running Caliptra ROM ...
191,485 UART:
191,629 UART: [state] CFI Enabled
261,417 UART: [state] LifecycleState = Unprovisioned
263,337 UART: [state] DebugLocked = No
265,366 UART: [state] WD Timer not started. Device not locked for debugging
269,150 UART: [kat] SHA2-256
448,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,883 UART: [kat] ++
460,565 UART: [kat] sha1
471,463 UART: [kat] SHA2-256
474,526 UART: [kat] SHA2-384
480,719 UART: [kat] SHA2-512-ACC
483,658 UART: [kat] ECC-384
2,945,694 UART: [kat] HMAC-384Kdf
2,967,206 UART: [kat] LMS
3,496,664 UART: [kat] --
3,499,354 UART: [cold-reset] ++
3,500,580 UART: [fht] FHT @ 0x50003400
3,509,980 UART: [idev] ++
3,510,552 UART: [idev] CDI.KEYID = 6
3,511,462 UART: [idev] SUBJECT.KEYID = 7
3,512,629 UART: [idev] UDS.KEYID = 0
3,514,188 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,658,572 UART: [idev] Erasing UDS.KEYID = 0
6,024,617 UART: [idev] Sha1 KeyId Algorithm
6,047,035 UART: [idev] --
6,049,520 UART: [ldev] ++
6,050,095 UART: [ldev] CDI.KEYID = 6
6,051,010 UART: [ldev] SUBJECT.KEYID = 5
6,052,171 UART: [ldev] AUTHORITY.KEYID = 7
6,053,404 UART: [ldev] FE.KEYID = 1
6,095,434 UART: [ldev] Erasing FE.KEYID = 1
8,595,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,901 UART: [ldev] --
10,390,203 UART: [fwproc] Wait for Commands...
10,392,009 UART: [fwproc] Recv command 0x46574c44
10,394,118 UART: [fwproc] Recv'd Img size: 114940 bytes
13,810,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,349 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,269,260 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,362,254 ready_for_fw is high
3,362,664 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,080,538 >>> mbox cmd response: success
18,367,091 UART:
18,367,590 UART: Running Caliptra FMC ...
18,368,719 UART:
18,368,871 UART: [state] CFI Enabled
18,434,840 UART: [fht] FMC Alias Private Key: 7
20,198,283 UART: [art] Extend RT PCRs Done
20,199,522 UART: [art] Lock RT PCRs Done
20,201,073 UART: [art] Populate DV Done
20,206,400 UART: [fht] FMC Alias Private Key: 7
20,207,999 UART: [art] Derive CDI
20,208,741 UART: [art] Store in in slot 0x4
20,267,025 UART: [art] Derive Key Pair
20,268,091 UART: [art] Store priv key in slot 0x5
22,731,417 UART: [art] Derive Key Pair - Done
22,744,746 UART: [art] Signing Cert with AUTHO
22,746,048 UART: RITY.KEYID = 7
24,456,738 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,229 UART: [art] PUB.X = 7C4DCEA85EF73532D59D214688922EFC0406F3927094F55193C5C8068C6F13F6ACC1C865D875A0B10C5C0E847D415DC4
24,465,547 UART: [art] PUB.Y = A56EC99759EF6B9C3DA436820232CB0B2B073D4157BA841573C88538908E013D122DF486B9C92AFB2D4010EA78597505
24,472,748 UART: [art] SIG.R = 48CC970847E8BD3589846FF5CC3E6FA5801BA5EDBCA7A8B8C8BFF7A40E1268C281E852E0468BDCD0FD743FFCB0484CF2
24,480,199 UART: [art] SIG.S = 4BCE0D2F2B320095888A58125A8DEA9363A2138C8023423D47304F4E2830EF9183A67F2958113C1AB2801A8C1D2C1D2B
25,458,591 UART: Caliptra RT
25,459,311 UART: [state] CFI Enabled
25,624,438 UART: [rt] RT listening for mailbox commands...
25,626,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,786 UART: [rt]cmd =0x46504c54, len=4
25,657,503 >>> mbox cmd response data (8 bytes)
25,658,513 UART: [rt] FIPS self test
25,659,485 UART: [kat] ++
25,659,941 UART: [kat] sha1
25,660,503 UART: Fatal Error: 0x90060001
25,695,653 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,840,076 >>> mbox cmd response: failed
25,840,750 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,984,991 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,359,033 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,070,336 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,498 UART:
192,873 UART: Running Caliptra ROM ...
194,021 UART:
603,540 UART: [state] CFI Enabled
619,905 UART: [state] LifecycleState = Unprovisioned
621,781 UART: [state] DebugLocked = No
624,309 UART: [state] WD Timer not started. Device not locked for debugging
628,505 UART: [kat] SHA2-256
807,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,267 UART: [kat] ++
819,819 UART: [kat] sha1
830,988 UART: [kat] SHA2-256
833,994 UART: [kat] SHA2-384
838,922 UART: [kat] SHA2-512-ACC
841,869 UART: [kat] ECC-384
3,283,899 UART: [kat] HMAC-384Kdf
3,297,058 UART: [kat] LMS
3,826,504 UART: [kat] --
3,830,531 UART: [cold-reset] ++
3,831,478 UART: [fht] FHT @ 0x50003400
3,843,027 UART: [idev] ++
3,843,597 UART: [idev] CDI.KEYID = 6
3,844,505 UART: [idev] SUBJECT.KEYID = 7
3,845,680 UART: [idev] UDS.KEYID = 0
3,846,679 ready_for_fw is high
3,846,918 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,991,339 UART: [idev] Erasing UDS.KEYID = 0
6,314,934 UART: [idev] Sha1 KeyId Algorithm
6,338,363 UART: [idev] --
6,341,250 UART: [ldev] ++
6,341,825 UART: [ldev] CDI.KEYID = 6
6,342,733 UART: [ldev] SUBJECT.KEYID = 5
6,343,895 UART: [ldev] AUTHORITY.KEYID = 7
6,345,126 UART: [ldev] FE.KEYID = 1
6,356,045 UART: [ldev] Erasing FE.KEYID = 1
8,828,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,068 UART: [ldev] --
10,615,265 UART: [fwproc] Wait for Commands...
10,617,111 UART: [fwproc] Recv command 0x46574c44
10,619,211 UART: [fwproc] Recv'd Img size: 114940 bytes
14,031,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,861 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,492,750 >>> mbox cmd response: success
14,496,298 UART: [afmc] ++
14,496,947 UART: [afmc] CDI.KEYID = 6
14,498,027 UART: [afmc] SUBJECT.KEYID = 7
14,499,154 UART: [afmc] AUTHORITY.KEYID = 5
16,999,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,944 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,830 UART: [afmc] --
18,795,706 UART: [cold-reset] --
18,800,540 UART: [state] Locking Datavault
18,806,490 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,188 UART: [state] Locking ICCM
18,809,475 UART: [exit] Launching FMC @ 0x40000130
18,817,880 UART:
18,818,154 UART: Running Caliptra FMC ...
18,819,268 UART:
18,819,432 UART: [state] CFI Enabled
18,827,269 UART: [fht] FMC Alias Private Key: 7
20,584,061 UART: [art] Extend RT PCRs Done
20,585,284 UART: [art] Lock RT PCRs Done
20,586,960 UART: [art] Populate DV Done
20,592,426 UART: [fht] FMC Alias Private Key: 7
20,593,976 UART: [art] Derive CDI
20,594,817 UART: [art] Store in in slot 0x4
20,637,470 UART: [art] Derive Key Pair
20,638,471 UART: [art] Store priv key in slot 0x5
23,065,464 UART: [art] Derive Key Pair - Done
23,078,470 UART: [art] Signing Cert with AUTHO
23,079,774 UART: RITY.KEYID = 7
24,784,981 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,490 UART: [art] PUB.X = 043818EFD143E4BC7F8EED0FA65408836680D21BD01CFF9136D1FF185F2661E1CDD02039337AC219E5CB86A912EFC3D3
24,793,741 UART: [art] PUB.Y = 00287B0DF806612FB82C2F10288110923685CE653B0B459506FEA08F541050A3C51E0033BC15C2EF03D76404AFC4D5C7
24,800,925 UART: [art] SIG.R = 7750B2750856D7BEF1EB8B6640C61F656F1ACD6766D0E9FB7B69B195D92640FEC43C145FD5B93C77EE9824F161A8153A
24,808,324 UART: [art] SIG.S = AEB93C9351929FB315B34F24D5841B402ED26AFB451A7843DFEE7471340B13349A38ACF7604C303ED9C96C9F9B7C13E7
25,787,207 UART: Caliptra RT
25,787,902 UART: [state] CFI Enabled
25,906,634 UART: [rt] RT listening for mailbox commands...
25,908,473 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,152 UART: [rt]cmd =0x46504c54, len=4
25,939,775 >>> mbox cmd response data (8 bytes)
25,940,858 UART: [rt] FIPS self test
25,941,801 UART: [kat] ++
25,942,300 UART: [kat] sha1
25,942,818 UART: Fatal Error: 0x90060001
25,977,970 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,122,340 >>> mbox cmd response: failed
26,122,985 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,267,303 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,041 UART:
190,332 UART: Running Caliptra ROM ...
191,357 UART:
14,266,501 UART: [state] CFI Enabled
14,280,934 UART: [state] LifecycleState = Unprovisioned
14,282,862 UART: [state] DebugLocked = No
14,285,166 UART: [state] WD Timer not started. Device not locked for debugging
14,289,715 UART: [kat] SHA2-256
14,468,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,480,391 UART: [kat] ++
14,480,854 UART: [kat] sha1
14,491,899 UART: [kat] SHA2-256
14,494,908 UART: [kat] SHA2-384
14,501,860 UART: [kat] SHA2-512-ACC
14,504,863 UART: [kat] ECC-384
16,945,472 UART: [kat] HMAC-384Kdf
16,957,808 UART: [kat] LMS
17,487,278 UART: [kat] --
17,493,424 UART: [cold-reset] ++
17,495,842 UART: [fht] FHT @ 0x50003400
17,506,499 UART: [idev] ++
17,507,088 UART: [idev] CDI.KEYID = 6
17,508,007 UART: [idev] SUBJECT.KEYID = 7
17,509,171 UART: [idev] UDS.KEYID = 0
17,510,863 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,655,064 UART: [idev] Erasing UDS.KEYID = 0
19,986,180 UART: [idev] Sha1 KeyId Algorithm
20,008,487 UART: [idev] --
20,012,197 UART: [ldev] ++
20,012,775 UART: [ldev] CDI.KEYID = 6
20,013,657 UART: [ldev] SUBJECT.KEYID = 5
20,014,872 UART: [ldev] AUTHORITY.KEYID = 7
20,016,104 UART: [ldev] FE.KEYID = 1
20,026,641 UART: [ldev] Erasing FE.KEYID = 1
22,505,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,224,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,240,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,256,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,293,260 UART: [ldev] --
24,298,039 UART: [fwproc] Wait for Commands...
24,300,353 UART: [fwproc] Recv command 0x46574c44
24,302,449 UART: [fwproc] Recv'd Img size: 114940 bytes
27,709,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,785,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,854,438 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,174,767 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,696,136 ready_for_fw is high
3,696,561 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,273,518 >>> mbox cmd response: success
18,520,015 UART:
18,520,439 UART: Running Caliptra FMC ...
18,521,559 UART:
18,521,712 UART: [state] CFI Enabled
18,529,852 UART: [fht] FMC Alias Private Key: 7
20,286,319 UART: [art] Extend RT PCRs Done
20,287,543 UART: [art] Lock RT PCRs Done
20,289,324 UART: [art] Populate DV Done
20,294,630 UART: [fht] FMC Alias Private Key: 7
20,296,287 UART: [art] Derive CDI
20,297,107 UART: [art] Store in in slot 0x4
20,339,757 UART: [art] Derive Key Pair
20,340,757 UART: [art] Store priv key in slot 0x5
22,768,224 UART: [art] Derive Key Pair - Done
22,780,804 UART: [art] Signing Cert with AUTHO
22,782,104 UART: RITY.KEYID = 7
24,488,161 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,666 UART: [art] PUB.X = 2287C7FF116BA5979B135C20EEB6767EEFD5B61BA173835228D101D73E8F0A130E36D5CC644CAE2F3C05762C7DC739FB
24,496,924 UART: [art] PUB.Y = F0D42657EE47237D9A0705FDC88FE37DAC64053BC913F18374BBA676124402B116D1DE3BA6E10B6F419FA90AEA46807E
24,504,222 UART: [art] SIG.R = EFAFF1C2C6E7232B5F1D5F1D131BCF040A8A1746CF06CFABB0AAFF8F12CC7B3A621BE3575DCB7D88B5A284FA9C67DBEA
24,511,625 UART: [art] SIG.S = BD3479914AC529027EDF9FE107639FFAF42624A4225D4EFFBC465FA23BA06758D47E6DCC96026DF4817FFAFB2F626722
25,490,936 UART: Caliptra RT
25,491,637 UART: [state] CFI Enabled
25,608,987 UART: [rt] RT listening for mailbox commands...
25,610,833 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,640,632 UART: [rt]cmd =0x46504c54, len=4
25,642,310 >>> mbox cmd response data (8 bytes)
25,643,124 UART: [rt] FIPS self test
25,644,082 UART: [kat] ++
25,644,540 UART: [kat] sha1
25,645,216 UART: Fatal Error: 0x90060001
25,680,423 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,824,817 >>> mbox cmd response: failed
25,825,487 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,969,765 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,654,228 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,233,584 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,162 UART:
192,548 UART: Running Caliptra ROM ...
193,748 UART:
193,906 UART: [state] CFI Enabled
263,018 UART: [state] LifecycleState = Unprovisioned
265,352 UART: [state] DebugLocked = No
266,889 UART: [state] WD Timer not started. Device not locked for debugging
271,993 UART: [kat] SHA2-256
461,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,673 UART: [kat] ++
473,171 UART: [kat] sha1
484,552 UART: [kat] SHA2-256
487,579 UART: [kat] SHA2-384
494,220 UART: [kat] SHA2-512-ACC
496,804 UART: [kat] ECC-384
2,946,753 UART: [kat] HMAC-384Kdf
2,971,428 UART: [kat] LMS
3,503,212 UART: [kat] --
3,509,412 UART: [cold-reset] ++
3,511,556 UART: [fht] FHT @ 0x50003400
3,523,530 UART: [idev] ++
3,524,249 UART: [idev] CDI.KEYID = 6
3,525,133 UART: [idev] SUBJECT.KEYID = 7
3,526,378 UART: [idev] UDS.KEYID = 0
3,527,308 ready_for_fw is high
3,527,506 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,672,085 UART: [idev] Erasing UDS.KEYID = 0
6,050,718 UART: [idev] Sha1 KeyId Algorithm
6,071,857 UART: [idev] --
6,077,992 UART: [ldev] ++
6,078,696 UART: [ldev] CDI.KEYID = 6
6,079,842 UART: [ldev] SUBJECT.KEYID = 5
6,080,878 UART: [ldev] AUTHORITY.KEYID = 7
6,081,990 UART: [ldev] FE.KEYID = 1
6,119,560 UART: [ldev] Erasing FE.KEYID = 1
8,625,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,370 UART: [ldev] --
10,434,039 UART: [fwproc] Wait for Commands...
10,437,057 UART: [fwproc] Recv command 0x46574c44
10,439,381 UART: [fwproc] Recv'd Img size: 114940 bytes
13,890,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,969,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,085,608 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,631,116 >>> mbox cmd response: success
14,635,219 UART: [afmc] ++
14,635,953 UART: [afmc] CDI.KEYID = 6
14,637,145 UART: [afmc] SUBJECT.KEYID = 7
14,638,576 UART: [afmc] AUTHORITY.KEYID = 5
17,171,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,915,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,917,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,932,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,947,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,962,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,986,011 UART: [afmc] --
18,988,797 UART: [cold-reset] --
18,994,603 UART: [state] Locking Datavault
18,999,481 UART: [state] Locking PCR0, PCR1 and PCR31
19,001,619 UART: [state] Locking ICCM
19,004,152 UART: [exit] Launching FMC @ 0x40000130
19,012,825 UART:
19,013,081 UART: Running Caliptra FMC ...
19,014,189 UART:
19,014,355 UART: [state] CFI Enabled
19,073,098 UART: [fht] FMC Alias Private Key: 7
20,837,048 UART: [art] Extend RT PCRs Done
20,838,798 UART: [art] Lock RT PCRs Done
20,839,983 UART: [art] Populate DV Done
20,845,312 UART: [fht] FMC Alias Private Key: 7
20,846,963 UART: [art] Derive CDI
20,847,786 UART: [art] Store in in slot 0x4
20,907,663 UART: [art] Derive Key Pair
20,908,706 UART: [art] Store priv key in slot 0x5
23,372,297 UART: [art] Derive Key Pair - Done
23,385,434 UART: [art] Signing Cert with AUTHO
23,386,750 UART: RITY.KEYID = 7
25,098,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,828 UART: [art] PUB.X = 835CEC90AC5F2B856E2A372249CC62801418A663C0412107FF86140725CB6FABABF10A2B21244EB10ADF6FE186B1D313
25,107,154 UART: [art] PUB.Y = F85802B731A0569872E8AC9C0A9CEAE73836A1C245757E71AF898D0B2675B4E351338DE6A5F7576B52D544BFD0E2B51E
25,114,316 UART: [art] SIG.R = DCD5B7F2DECCFE1865DF5785B4B14EA134A4407EC9B83C1EEC14E6966A6528BFCDD1FCB7526586126F60ABACB9FE589C
25,121,748 UART: [art] SIG.S = 2A667A2CCC3F0DE4921B68B51588F7EA1636F2274A1597D016EABE751E3DE14BCBA4892311E8A2EFD431C9D3893722B9
26,100,691 UART: Caliptra RT
26,101,383 UART: [state] CFI Enabled
26,266,726 UART: [rt] RT listening for mailbox commands...
26,268,582 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,298,244 UART: [rt]cmd =0x46504c54, len=4
26,299,722 >>> mbox cmd response data (8 bytes)
26,300,786 UART: [rt] FIPS self test
26,301,952 UART: [kat] ++
26,302,416 UART: [kat] sha1
26,302,930 UART: Fatal Error: 0x90060001
26,338,084 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,482,448 >>> mbox cmd response: failed
26,483,143 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,627,797 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,108 UART:
190,418 UART: Running Caliptra ROM ...
191,448 UART:
191,588 UART: [state] CFI Enabled
259,531 UART: [state] LifecycleState = Unprovisioned
261,949 UART: [state] DebugLocked = No
264,267 UART: [state] WD Timer not started. Device not locked for debugging
268,128 UART: [kat] SHA2-256
458,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,804 UART: [kat] ++
469,256 UART: [kat] sha1
481,647 UART: [kat] SHA2-256
484,711 UART: [kat] SHA2-384
489,619 UART: [kat] SHA2-512-ACC
492,237 UART: [kat] ECC-384
2,944,521 UART: [kat] HMAC-384Kdf
2,967,116 UART: [kat] LMS
3,498,910 UART: [kat] --
3,503,715 UART: [cold-reset] ++
3,506,304 UART: [fht] FHT @ 0x50003400
3,518,368 UART: [idev] ++
3,519,083 UART: [idev] CDI.KEYID = 6
3,520,028 UART: [idev] SUBJECT.KEYID = 7
3,521,251 UART: [idev] UDS.KEYID = 0
3,522,932 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,288 UART: [idev] Erasing UDS.KEYID = 0
6,026,293 UART: [idev] Sha1 KeyId Algorithm
6,049,703 UART: [idev] --
6,054,697 UART: [ldev] ++
6,055,385 UART: [ldev] CDI.KEYID = 6
6,056,406 UART: [ldev] SUBJECT.KEYID = 5
6,057,512 UART: [ldev] AUTHORITY.KEYID = 7
6,058,689 UART: [ldev] FE.KEYID = 1
6,098,349 UART: [ldev] Erasing FE.KEYID = 1
8,600,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,981 UART: [ldev] --
10,411,972 UART: [fwproc] Wait for Commands...
10,414,881 UART: [fwproc] Recv command 0x46574c44
10,417,149 UART: [fwproc] Recv'd Img size: 114940 bytes
13,870,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,828 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,616,233 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,435,795 ready_for_fw is high
3,436,187 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,748,606 >>> mbox cmd response: success
19,024,976 UART:
19,025,399 UART: Running Caliptra FMC ...
19,026,564 UART:
19,026,738 UART: [state] CFI Enabled
19,094,954 UART: [fht] FMC Alias Private Key: 7
20,858,485 UART: [art] Extend RT PCRs Done
20,859,712 UART: [art] Lock RT PCRs Done
20,861,231 UART: [art] Populate DV Done
20,866,811 UART: [fht] FMC Alias Private Key: 7
20,868,517 UART: [art] Derive CDI
20,869,346 UART: [art] Store in in slot 0x4
20,927,414 UART: [art] Derive Key Pair
20,928,417 UART: [art] Store priv key in slot 0x5
23,391,592 UART: [art] Derive Key Pair - Done
23,404,643 UART: [art] Signing Cert with AUTHO
23,405,953 UART: RITY.KEYID = 7
25,117,810 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,345 UART: [art] PUB.X = B7A1AB482BD1BA096549930A7AC32612AC37F5ED8FB71063B2D85C7D347E0BDE2DB07527087A114978F9BFE752F80E07
25,126,563 UART: [art] PUB.Y = C97DEAE192C11B9358D98972F9035F83C1F107F05D8F1035C575F37C1F8C269DAEC584EEF16BF4B171023EBFDBB37FCD
25,133,863 UART: [art] SIG.R = 073B8E8F9E94C2ADB6CFB58AC71B123D0AA64A8DC063C968D7361B2651F1354D1AD7BC0BF86E645B76EB0EDBB5E2FCD4
25,141,273 UART: [art] SIG.S = 1ECFB1486ABEC71E4166F369AA4C5AE969FF0636041919C9057A599A42BE87A2EC09568BF6DA6B46ABA025DC6E34B4D9
26,120,331 UART: Caliptra RT
26,121,044 UART: [state] CFI Enabled
26,287,032 UART: [rt] RT listening for mailbox commands...
26,288,902 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,318,594 UART: [rt]cmd =0x46504c54, len=4
26,319,936 >>> mbox cmd response data (8 bytes)
26,321,262 UART: [rt] FIPS self test
26,322,207 UART: [kat] ++
26,322,658 UART: [kat] sha1
26,323,335 UART: Fatal Error: 0x90060001
26,358,536 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,502,944 >>> mbox cmd response: failed
26,503,645 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,647,932 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,434,890 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,719,538 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
192,658 UART:
193,012 UART: Running Caliptra ROM ...
194,216 UART:
603,867 UART: [state] CFI Enabled
618,236 UART: [state] LifecycleState = Unprovisioned
620,613 UART: [state] DebugLocked = No
623,334 UART: [state] WD Timer not started. Device not locked for debugging
628,459 UART: [kat] SHA2-256
818,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,189 UART: [kat] ++
829,665 UART: [kat] sha1
840,971 UART: [kat] SHA2-256
844,058 UART: [kat] SHA2-384
850,133 UART: [kat] SHA2-512-ACC
852,721 UART: [kat] ECC-384
3,293,894 UART: [kat] HMAC-384Kdf
3,305,790 UART: [kat] LMS
3,837,612 UART: [kat] --
3,840,900 UART: [cold-reset] ++
3,843,263 UART: [fht] FHT @ 0x50003400
3,856,019 UART: [idev] ++
3,856,657 UART: [idev] CDI.KEYID = 6
3,857,613 UART: [idev] SUBJECT.KEYID = 7
3,858,857 UART: [idev] UDS.KEYID = 0
3,859,780 ready_for_fw is high
3,859,985 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,004,349 UART: [idev] Erasing UDS.KEYID = 0
6,336,759 UART: [idev] Sha1 KeyId Algorithm
6,359,936 UART: [idev] --
6,365,707 UART: [ldev] ++
6,366,387 UART: [ldev] CDI.KEYID = 6
6,367,296 UART: [ldev] SUBJECT.KEYID = 5
6,368,512 UART: [ldev] AUTHORITY.KEYID = 7
6,369,686 UART: [ldev] FE.KEYID = 1
6,380,011 UART: [ldev] Erasing FE.KEYID = 1
8,859,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,224 UART: [ldev] --
10,650,086 UART: [fwproc] Wait for Commands...
10,652,238 UART: [fwproc] Recv command 0x46574c44
10,654,557 UART: [fwproc] Recv'd Img size: 114940 bytes
14,111,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,641 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,766 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,853,438 >>> mbox cmd response: success
14,858,358 UART: [afmc] ++
14,859,065 UART: [afmc] CDI.KEYID = 6
14,860,249 UART: [afmc] SUBJECT.KEYID = 7
14,861,740 UART: [afmc] AUTHORITY.KEYID = 5
17,363,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,083,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,085,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,100,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,115,668 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,130,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,230 UART: [afmc] --
19,158,283 UART: [cold-reset] --
19,163,658 UART: [state] Locking Datavault
19,169,552 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,736 UART: [state] Locking ICCM
19,173,994 UART: [exit] Launching FMC @ 0x40000130
19,182,609 UART:
19,182,886 UART: Running Caliptra FMC ...
19,183,997 UART:
19,184,161 UART: [state] CFI Enabled
19,192,320 UART: [fht] FMC Alias Private Key: 7
20,949,094 UART: [art] Extend RT PCRs Done
20,950,311 UART: [art] Lock RT PCRs Done
20,952,041 UART: [art] Populate DV Done
20,957,258 UART: [fht] FMC Alias Private Key: 7
20,958,742 UART: [art] Derive CDI
20,959,503 UART: [art] Store in in slot 0x4
21,001,989 UART: [art] Derive Key Pair
21,002,996 UART: [art] Store priv key in slot 0x5
23,429,768 UART: [art] Derive Key Pair - Done
23,442,779 UART: [art] Signing Cert with AUTHO
23,444,090 UART: RITY.KEYID = 7
25,149,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,363 UART: [art] PUB.X = 0FEF337263CE01A7FBFDE750E0C13618467224D84D47CF1685E3CDBDCB8398E9DC720347CF6E75943AC35C7D76929E26
25,158,613 UART: [art] PUB.Y = 50924D7447D36DB5E3B56664A46034E146B83DB5574A7BAEBD6AD5D1888B292C9628DA90FF81EA67A4FCE6C9157F86E2
25,165,903 UART: [art] SIG.R = 58712FD5EC83EC6F020D5C891758F21C108EA4F72F425DCDA3090B6E7D8D336CDC7FD3F89FA379142DB74A1FAAAE84CA
25,173,300 UART: [art] SIG.S = C62C8178419C00BD4F2787E53E7B2CC00FEA6442CF4C481FA1D1CAC4F5603768F368413AB532E6BCE6D33C594E64E60C
26,152,844 UART: Caliptra RT
26,153,539 UART: [state] CFI Enabled
26,271,095 UART: [rt] RT listening for mailbox commands...
26,272,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,302,398 UART: [rt]cmd =0x46504c54, len=4
26,304,014 >>> mbox cmd response data (8 bytes)
26,305,300 UART: [rt] FIPS self test
26,306,239 UART: [kat] ++
26,306,696 UART: [kat] sha1
26,307,211 UART: Fatal Error: 0x90060001
26,342,356 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,486,759 >>> mbox cmd response: failed
26,487,370 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,631,648 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,021 UART:
190,317 UART: Running Caliptra ROM ...
191,345 UART:
13,895,293 UART: [state] CFI Enabled
13,908,270 UART: [state] LifecycleState = Unprovisioned
13,910,700 UART: [state] DebugLocked = No
13,913,182 UART: [state] WD Timer not started. Device not locked for debugging
13,918,059 UART: [kat] SHA2-256
14,107,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,118,713 UART: [kat] ++
14,119,243 UART: [kat] sha1
14,131,913 UART: [kat] SHA2-256
14,134,926 UART: [kat] SHA2-384
14,140,324 UART: [kat] SHA2-512-ACC
14,142,941 UART: [kat] ECC-384
16,585,008 UART: [kat] HMAC-384Kdf
16,598,748 UART: [kat] LMS
17,130,536 UART: [kat] --
17,135,066 UART: [cold-reset] ++
17,136,592 UART: [fht] FHT @ 0x50003400
17,147,250 UART: [idev] ++
17,147,975 UART: [idev] CDI.KEYID = 6
17,148,910 UART: [idev] SUBJECT.KEYID = 7
17,150,119 UART: [idev] UDS.KEYID = 0
17,151,643 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,296,307 UART: [idev] Erasing UDS.KEYID = 0
19,625,314 UART: [idev] Sha1 KeyId Algorithm
19,646,282 UART: [idev] --
19,650,983 UART: [ldev] ++
19,651,723 UART: [ldev] CDI.KEYID = 6
19,652,611 UART: [ldev] SUBJECT.KEYID = 5
19,653,768 UART: [ldev] AUTHORITY.KEYID = 7
19,654,997 UART: [ldev] FE.KEYID = 1
19,664,753 UART: [ldev] Erasing FE.KEYID = 1
22,143,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,861,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,876,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,892,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,907,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,928,874 UART: [ldev] --
23,933,930 UART: [fwproc] Wait for Commands...
23,935,377 UART: [fwproc] Recv command 0x46574c44
23,937,367 UART: [fwproc] Recv'd Img size: 114940 bytes
27,394,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,470,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,586,900 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,132,680 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,255 writing to cptra_bootfsm_go
3,755,954 ready_for_fw is high
3,756,383 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,959,473 >>> mbox cmd response: success
19,208,686 UART:
19,209,075 UART: Running Caliptra FMC ...
19,210,216 UART:
19,210,368 UART: [state] CFI Enabled
19,218,635 UART: [fht] FMC Alias Private Key: 7
20,975,815 UART: [art] Extend RT PCRs Done
20,977,048 UART: [art] Lock RT PCRs Done
20,978,969 UART: [art] Populate DV Done
20,984,172 UART: [fht] FMC Alias Private Key: 7
20,985,770 UART: [art] Derive CDI
20,986,517 UART: [art] Store in in slot 0x4
21,029,434 UART: [art] Derive Key Pair
21,030,439 UART: [art] Store priv key in slot 0x5
23,456,672 UART: [art] Derive Key Pair - Done
23,469,600 UART: [art] Signing Cert with AUTHO
23,470,912 UART: RITY.KEYID = 7
25,176,367 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,881 UART: [art] PUB.X = 0A8A9FBBF91D4D307CF2739574EE7CF8A4F62005AC2A86FB8A5B847EB9E44D73AEE67CA7D501E45A282E552DE86F3F5E
25,185,122 UART: [art] PUB.Y = 480AA1E491179A2A47AAB225B4434DB7C6074982449C1EC13DC94729E976B32B22243BC5F9943B87D5FF1C3E762E8CA6
25,192,424 UART: [art] SIG.R = 98EA6DFD78F96239E811950F98C5884A4F80AF736AA087F4E9DFFCEA012FE4662E2A3ED3E5D739B1D9D9E0F0F40DB3D1
25,199,806 UART: [art] SIG.S = B006C09106A9F2D7ED559CDAD244F4A250DE4AC8C98B47739FB1F98B00A102B808DE17D638B886BC1B04F7BE5E369CDC
26,178,872 UART: Caliptra RT
26,179,602 UART: [state] CFI Enabled
26,297,210 UART: [rt] RT listening for mailbox commands...
26,299,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,328,946 UART: [rt]cmd =0x46504c54, len=4
26,330,445 >>> mbox cmd response data (8 bytes)
26,331,729 UART: [rt] FIPS self test
26,332,677 UART: [kat] ++
26,333,130 UART: [kat] sha1
26,333,692 UART: Fatal Error: 0x90060001
26,368,783 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,513,129 >>> mbox cmd response: failed
26,513,797 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,658,127 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,033,640 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,247,276 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
85,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,519 UART: [kat] SHA2-256
881,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,565 UART: [kat] ++
885,717 UART: [kat] sha1
889,813 UART: [kat] SHA2-256
891,751 UART: [kat] SHA2-384
894,556 UART: [kat] SHA2-512-ACC
896,457 UART: [kat] ECC-384
902,084 UART: [kat] HMAC-384Kdf
906,610 UART: [kat] LMS
1,474,806 UART: [kat] --
1,475,673 UART: [cold-reset] ++
1,476,213 UART: [fht] Storing FHT @ 0x50003400
1,479,074 UART: [idev] ++
1,479,242 UART: [idev] CDI.KEYID = 6
1,479,602 UART: [idev] SUBJECT.KEYID = 7
1,480,026 UART: [idev] UDS.KEYID = 0
1,480,371 ready_for_fw is high
1,480,371 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,000 UART: [idev] Erasing UDS.KEYID = 0
1,504,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,322 UART: [idev] --
1,514,487 UART: [ldev] ++
1,514,655 UART: [ldev] CDI.KEYID = 6
1,515,018 UART: [ldev] SUBJECT.KEYID = 5
1,515,444 UART: [ldev] AUTHORITY.KEYID = 7
1,515,907 UART: [ldev] FE.KEYID = 1
1,520,863 UART: [ldev] Erasing FE.KEYID = 1
1,546,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,062 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 114940 bytes
2,893,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,141 >>> mbox cmd response: success
3,087,331 UART: [afmc] ++
3,087,499 UART: [afmc] CDI.KEYID = 6
3,087,861 UART: [afmc] SUBJECT.KEYID = 7
3,088,286 UART: [afmc] AUTHORITY.KEYID = 5
3,122,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,675 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,068 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,758 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,725 UART: [afmc] --
3,165,763 UART: [cold-reset] --
3,166,609 UART: [state] Locking Datavault
3,167,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,366 UART: [state] Locking ICCM
3,168,868 UART: [exit] Launching FMC @ 0x40000130
3,174,197 UART:
3,174,213 UART: Running Caliptra FMC ...
3,174,621 UART:
3,174,675 UART: [state] CFI Enabled
3,184,990 UART: [fht] FMC Alias Private Key: 7
3,293,081 UART: [art] Extend RT PCRs Done
3,293,509 UART: [art] Lock RT PCRs Done
3,295,051 UART: [art] Populate DV Done
3,303,588 UART: [fht] FMC Alias Private Key: 7
3,304,610 UART: [art] Derive CDI
3,304,890 UART: [art] Store in in slot 0x4
3,390,305 UART: [art] Derive Key Pair
3,390,665 UART: [art] Store priv key in slot 0x5
3,403,455 UART: [art] Derive Key Pair - Done
3,418,022 UART: [art] Signing Cert with AUTHO
3,418,502 UART: RITY.KEYID = 7
3,433,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,669 UART: [art] PUB.X = 51E4EB3BF0AA0C46EA5B7E08B5925DCC9E85E0949C5C866D794810BEA5C96727F4464AF8C26850DFFA3EFA10B0AE55FB
3,441,453 UART: [art] PUB.Y = 3572A50EEE45ACC451CA33955024DB6162EA056A4288B1EF9FF96BAF005EBB7354CBE48E420D8500549108608D7FD2CA
3,448,355 UART: [art] SIG.R = A099241EA170CAAAB1BEA5BBB585FABC3F99908517859C1BAD3AB7187B247B8C9E3E552334BF91AF8E685C9CD463F908
3,455,138 UART: [art] SIG.S = 468C2443FB4522F020222E7B2BBF5F4CD95F033E22FDC82BF3E8F3D5754003BDC422F05B76DB6ED8B0CE18DCA1DD22E9
3,478,631 UART: Caliptra RT
3,478,884 UART: [state] CFI Enabled
3,587,857 UART: [rt] RT listening for mailbox commands...
3,588,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,143 UART: [rt]cmd =0x46504c54, len=4
3,619,365 >>> mbox cmd response data (8 bytes)
3,619,636 UART: [rt] FIPS self test
3,619,964 UART: [kat] ++
3,620,116 UART: [kat] sha1
3,621,006 UART: Fatal Error: 0x90060001
3,622,545 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,622,550 >>> mbox cmd response: failed
3,622,550 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,622,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,475,759 UART: [cold-reset] ++
1,476,147 UART: [fht] Storing FHT @ 0x50003400
1,478,996 UART: [idev] ++
1,479,164 UART: [idev] CDI.KEYID = 6
1,479,524 UART: [idev] SUBJECT.KEYID = 7
1,479,948 UART: [idev] UDS.KEYID = 0
1,480,293 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,284 UART: [idev] Erasing UDS.KEYID = 0
1,505,506 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,198 UART: [idev] --
1,515,155 UART: [ldev] ++
1,515,323 UART: [ldev] CDI.KEYID = 6
1,515,686 UART: [ldev] SUBJECT.KEYID = 5
1,516,112 UART: [ldev] AUTHORITY.KEYID = 7
1,516,575 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,834 UART: [ldev] --
1,586,183 UART: [fwproc] Waiting for Commands...
1,586,916 UART: [fwproc] Received command 0x46574c44
1,587,707 UART: [fwproc] Received Image of size 114940 bytes
2,892,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,475 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,285 ready_for_fw is high
1,362,285 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,336 >>> mbox cmd response: success
2,997,456 UART:
2,997,472 UART: Running Caliptra FMC ...
2,997,880 UART:
2,997,934 UART: [state] CFI Enabled
3,008,819 UART: [fht] FMC Alias Private Key: 7
3,117,308 UART: [art] Extend RT PCRs Done
3,117,736 UART: [art] Lock RT PCRs Done
3,118,918 UART: [art] Populate DV Done
3,127,213 UART: [fht] FMC Alias Private Key: 7
3,128,307 UART: [art] Derive CDI
3,128,587 UART: [art] Store in in slot 0x4
3,214,520 UART: [art] Derive Key Pair
3,214,880 UART: [art] Store priv key in slot 0x5
3,228,046 UART: [art] Derive Key Pair - Done
3,243,121 UART: [art] Signing Cert with AUTHO
3,243,601 UART: RITY.KEYID = 7
3,258,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,324 UART: [art] PUB.X = 97973DDC0A3FDF60AE11E6D3E79E5F48406C12A6F457B317572DF75C8499C03ABCF44DCD1187A24951B9CB745B4BFDFE
3,266,107 UART: [art] PUB.Y = D1F151A91059AF814751F487ECF8A790E86E7DE4D409BBE2A80332E3DB93F74F09E4C48ED41B143FFDE0C5F89B2AA185
3,273,062 UART: [art] SIG.R = 3C8BD05BB78EA956E4E2A6F1AAEA4092BEBCFFE65F58A813D291A5E9EB4EBA92FFD0FABAEDFE1F505139801C6C2C15A5
3,279,866 UART: [art] SIG.S = CE72437E8B0DA9D87C8E98EC0492452B72BF217F49D347E4C94F2C2B00502FE4177FE27A3ADECA2C579BDA37E4F50C4A
3,303,132 UART: Caliptra RT
3,303,385 UART: [state] CFI Enabled
3,410,968 UART: [rt] RT listening for mailbox commands...
3,411,631 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,110 UART: [rt]cmd =0x46504c54, len=4
3,442,376 >>> mbox cmd response data (8 bytes)
3,442,599 UART: [rt] FIPS self test
3,442,927 UART: [kat] ++
3,443,079 UART: [kat] sha1
3,443,653 UART: Fatal Error: 0x90060001
3,445,192 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,445,197 >>> mbox cmd response: failed
3,445,197 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,445,202 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,508 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,193 UART: [state] LifecycleState = Unprovisioned
86,848 UART: [state] DebugLocked = No
87,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,094 UART: [kat] SHA2-256
883,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,140 UART: [kat] ++
887,292 UART: [kat] sha1
891,554 UART: [kat] SHA2-256
893,492 UART: [kat] SHA2-384
896,247 UART: [kat] SHA2-512-ACC
898,148 UART: [kat] ECC-384
903,571 UART: [kat] HMAC-384Kdf
908,211 UART: [kat] LMS
1,476,407 UART: [kat] --
1,477,172 UART: [cold-reset] ++
1,477,654 UART: [fht] Storing FHT @ 0x50003400
1,480,491 UART: [idev] ++
1,480,659 UART: [idev] CDI.KEYID = 6
1,481,019 UART: [idev] SUBJECT.KEYID = 7
1,481,443 UART: [idev] UDS.KEYID = 0
1,481,788 ready_for_fw is high
1,481,788 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,557 UART: [idev] Erasing UDS.KEYID = 0
1,505,829 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,471 UART: [idev] --
1,515,500 UART: [ldev] ++
1,515,668 UART: [ldev] CDI.KEYID = 6
1,516,031 UART: [ldev] SUBJECT.KEYID = 5
1,516,457 UART: [ldev] AUTHORITY.KEYID = 7
1,516,920 UART: [ldev] FE.KEYID = 1
1,522,326 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,477 UART: [ldev] --
1,586,940 UART: [fwproc] Waiting for Commands...
1,587,759 UART: [fwproc] Received command 0x46574c44
1,588,550 UART: [fwproc] Received Image of size 114940 bytes
2,892,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,997 >>> mbox cmd response: success
3,087,133 UART: [afmc] ++
3,087,301 UART: [afmc] CDI.KEYID = 6
3,087,663 UART: [afmc] SUBJECT.KEYID = 7
3,088,088 UART: [afmc] AUTHORITY.KEYID = 5
3,123,313 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,180 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,870 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,851 UART: [afmc] --
3,166,849 UART: [cold-reset] --
3,167,497 UART: [state] Locking Datavault
3,168,514 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,118 UART: [state] Locking ICCM
3,169,592 UART: [exit] Launching FMC @ 0x40000130
3,174,921 UART:
3,174,937 UART: Running Caliptra FMC ...
3,175,345 UART:
3,175,488 UART: [state] CFI Enabled
3,186,049 UART: [fht] FMC Alias Private Key: 7
3,294,430 UART: [art] Extend RT PCRs Done
3,294,858 UART: [art] Lock RT PCRs Done
3,296,280 UART: [art] Populate DV Done
3,304,245 UART: [fht] FMC Alias Private Key: 7
3,305,297 UART: [art] Derive CDI
3,305,577 UART: [art] Store in in slot 0x4
3,391,546 UART: [art] Derive Key Pair
3,391,906 UART: [art] Store priv key in slot 0x5
3,405,530 UART: [art] Derive Key Pair - Done
3,419,737 UART: [art] Signing Cert with AUTHO
3,420,217 UART: RITY.KEYID = 7
3,435,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,488 UART: [art] PUB.X = C81809108898D964B0348D9C83B22C85515087B97E883CEBAA4F4030727A3530862A0B9BA86825D10D134F1B18F354E6
3,443,239 UART: [art] PUB.Y = 21CD78228484DB440F4CEF3C9AF5AD0752537793789B022D74EF92AB509D8E3D2189127384FD850BEF2779269D245A08
3,450,170 UART: [art] SIG.R = B493FE23AEDD1F42757CCD95B2A6F656752947300C180EB4D3714138B652BB3C7279A65FC6BB82387CB0A7CD9A2D4F69
3,456,942 UART: [art] SIG.S = 964CDB015F7AA752E4019A992AEE6C8B4D8A18D9C5CA6C877FF92352FAA24D48CD752773CDDA5C73AEE10B3F07BF4DB3
3,480,155 UART: Caliptra RT
3,480,500 UART: [state] CFI Enabled
3,587,524 UART: [rt] RT listening for mailbox commands...
3,588,187 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,180 UART: [rt]cmd =0x46504c54, len=4
3,619,484 >>> mbox cmd response data (8 bytes)
3,619,755 UART: [rt] FIPS self test
3,620,083 UART: [kat] ++
3,620,235 UART: [kat] sha1
3,621,185 UART: Fatal Error: 0x90060001
3,622,724 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,622,729 >>> mbox cmd response: failed
3,622,729 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,622,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,808 UART: [kat] SHA2-256
881,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,854 UART: [kat] ++
886,006 UART: [kat] sha1
890,204 UART: [kat] SHA2-256
892,142 UART: [kat] SHA2-384
894,963 UART: [kat] SHA2-512-ACC
896,864 UART: [kat] ECC-384
902,669 UART: [kat] HMAC-384Kdf
907,337 UART: [kat] LMS
1,475,533 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,476,950 UART: [fht] Storing FHT @ 0x50003400
1,479,911 UART: [idev] ++
1,480,079 UART: [idev] CDI.KEYID = 6
1,480,439 UART: [idev] SUBJECT.KEYID = 7
1,480,863 UART: [idev] UDS.KEYID = 0
1,481,208 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,051 UART: [idev] Erasing UDS.KEYID = 0
1,505,941 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,457 UART: [idev] --
1,515,506 UART: [ldev] ++
1,515,674 UART: [ldev] CDI.KEYID = 6
1,516,037 UART: [ldev] SUBJECT.KEYID = 5
1,516,463 UART: [ldev] AUTHORITY.KEYID = 7
1,516,926 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,591 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,748 UART: [fwproc] Waiting for Commands...
1,587,447 UART: [fwproc] Received command 0x46574c44
1,588,238 UART: [fwproc] Received Image of size 114940 bytes
2,892,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,946 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,773 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,426 ready_for_fw is high
1,362,426 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,025 >>> mbox cmd response: success
2,997,565 UART:
2,997,581 UART: Running Caliptra FMC ...
2,997,989 UART:
2,998,132 UART: [state] CFI Enabled
3,008,653 UART: [fht] FMC Alias Private Key: 7
3,116,964 UART: [art] Extend RT PCRs Done
3,117,392 UART: [art] Lock RT PCRs Done
3,118,768 UART: [art] Populate DV Done
3,127,127 UART: [fht] FMC Alias Private Key: 7
3,128,193 UART: [art] Derive CDI
3,128,473 UART: [art] Store in in slot 0x4
3,214,114 UART: [art] Derive Key Pair
3,214,474 UART: [art] Store priv key in slot 0x5
3,227,916 UART: [art] Derive Key Pair - Done
3,242,175 UART: [art] Signing Cert with AUTHO
3,242,655 UART: RITY.KEYID = 7
3,257,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,588 UART: [art] PUB.X = 54094D6543EE7A5B0E85251FF37A9FA42A90D33233C48850D71334AAF1899D69B1DF43D7E24073C5C4991ACE01FA2003
3,265,346 UART: [art] PUB.Y = 651BDDA5EB569AEF09502F6A5CCA6514797058752E1AF71F966EC28D185677F4290DA81C697EFB2EE5A16AF609A74648
3,272,293 UART: [art] SIG.R = 36F6998453B1D63D94F349809B76ED1A53FA9909C393643CEC87AF3D9F297AA318BE0F02F576292C8DAFA293D17B7DC3
3,279,060 UART: [art] SIG.S = 7D45B0F79CCA9511865355421855FC943BDFF09D22E184C7DB77EF697A20262C3DABD7BC4F36D8F0750957EADC501CF5
3,303,736 UART: Caliptra RT
3,304,081 UART: [state] CFI Enabled
3,412,019 UART: [rt] RT listening for mailbox commands...
3,412,682 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,413 UART: [rt]cmd =0x46504c54, len=4
3,443,649 >>> mbox cmd response data (8 bytes)
3,443,892 UART: [rt] FIPS self test
3,444,220 UART: [kat] ++
3,444,372 UART: [kat] sha1
3,445,052 UART: Fatal Error: 0x90060001
3,446,591 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,446,596 >>> mbox cmd response: failed
3,446,596 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,446,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,842 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,938,205 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
893,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,295 UART: [kat] ++
897,447 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,366 UART: [kat] SHA2-512-ACC
908,267 UART: [kat] ECC-384
917,798 UART: [kat] HMAC-384Kdf
922,320 UART: [kat] LMS
1,170,648 UART: [kat] --
1,171,429 UART: [cold-reset] ++
1,171,841 UART: [fht] FHT @ 0x50003400
1,174,486 UART: [idev] ++
1,174,654 UART: [idev] CDI.KEYID = 6
1,175,014 UART: [idev] SUBJECT.KEYID = 7
1,175,438 UART: [idev] UDS.KEYID = 0
1,175,783 ready_for_fw is high
1,175,783 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,066 UART: [idev] Erasing UDS.KEYID = 0
1,200,103 UART: [idev] Sha1 KeyId Algorithm
1,208,561 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,232 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,166 UART: [fwproc] Recv command 0x46574c44
1,282,894 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,498 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,161 >>> mbox cmd response: success
2,781,213 UART: [afmc] ++
2,781,381 UART: [afmc] CDI.KEYID = 6
2,781,743 UART: [afmc] SUBJECT.KEYID = 7
2,782,168 UART: [afmc] AUTHORITY.KEYID = 5
2,817,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,155 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,916 UART: [afmc] --
2,860,960 UART: [cold-reset] --
2,861,806 UART: [state] Locking Datavault
2,862,689 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,293 UART: [state] Locking ICCM
2,863,957 UART: [exit] Launching FMC @ 0x40000130
2,869,286 UART:
2,869,302 UART: Running Caliptra FMC ...
2,869,710 UART:
2,869,764 UART: [state] CFI Enabled
2,880,309 UART: [fht] FMC Alias Private Key: 7
2,988,326 UART: [art] Extend RT PCRs Done
2,988,754 UART: [art] Lock RT PCRs Done
2,990,418 UART: [art] Populate DV Done
2,998,919 UART: [fht] FMC Alias Private Key: 7
2,999,903 UART: [art] Derive CDI
3,000,183 UART: [art] Store in in slot 0x4
3,085,704 UART: [art] Derive Key Pair
3,086,064 UART: [art] Store priv key in slot 0x5
3,099,448 UART: [art] Derive Key Pair - Done
3,114,572 UART: [art] Signing Cert with AUTHO
3,115,052 UART: RITY.KEYID = 7
3,130,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,975 UART: [art] PUB.X = 9F5F88F527918678E5AABFCDC76BE748C3665B32100E95F395D865A5495004124E93E0B1C3980F5AADB2EFAE116AA265
3,137,742 UART: [art] PUB.Y = ACAD90D19E7A79A43AAAA0503F35AAF50DBBD8A6B04B59F457839302FFE90509207888C11568838397A39F01CB09C044
3,144,678 UART: [art] SIG.R = ED0F9CA0403914BF91406FC302D5F9AB7EAA443C9FF73E322893C72CD744C6AD6706C166356343620E0FD191018DB04C
3,151,434 UART: [art] SIG.S = 8D08E918109F6570FBF112AED532AFD6AF566513977B2231D3302DF68400EA39C4748960EAE80F19ED412B54BFBA250B
3,174,850 UART: Caliptra RT
3,175,103 UART: [state] CFI Enabled
3,283,437 UART: [rt] RT listening for mailbox commands...
3,284,100 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,619 UART: [rt]cmd =0x46504c54, len=4
3,314,583 >>> mbox cmd response data (8 bytes)
3,314,724 UART: [rt] FIPS self test
3,315,052 UART: [kat] ++
3,315,204 UART: [kat] sha1
3,316,130 UART: Fatal Error: 0x90060001
3,317,669 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,317,674 >>> mbox cmd response: failed
3,317,674 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,317,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,873 UART: [state] WD Timer not started. Device not locked for debugging
88,204 UART: [kat] SHA2-256
893,854 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,979 UART: [kat] ++
898,131 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,814 UART: [kat] SHA2-512-ACC
908,715 UART: [kat] ECC-384
918,670 UART: [kat] HMAC-384Kdf
923,306 UART: [kat] LMS
1,171,634 UART: [kat] --
1,172,443 UART: [cold-reset] ++
1,172,811 UART: [fht] FHT @ 0x50003400
1,175,424 UART: [idev] ++
1,175,592 UART: [idev] CDI.KEYID = 6
1,175,952 UART: [idev] SUBJECT.KEYID = 7
1,176,376 UART: [idev] UDS.KEYID = 0
1,176,721 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,356 UART: [idev] Erasing UDS.KEYID = 0
1,201,569 UART: [idev] Sha1 KeyId Algorithm
1,209,923 UART: [idev] --
1,211,097 UART: [ldev] ++
1,211,265 UART: [ldev] CDI.KEYID = 6
1,211,628 UART: [ldev] SUBJECT.KEYID = 5
1,212,054 UART: [ldev] AUTHORITY.KEYID = 7
1,212,517 UART: [ldev] FE.KEYID = 1
1,217,661 UART: [ldev] Erasing FE.KEYID = 1
1,243,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,737 UART: [ldev] --
1,283,022 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,278 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,937 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 ready_for_fw is high
1,060,433 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,584 >>> mbox cmd response: success
2,695,214 UART:
2,695,230 UART: Running Caliptra FMC ...
2,695,638 UART:
2,695,692 UART: [state] CFI Enabled
2,706,033 UART: [fht] FMC Alias Private Key: 7
2,813,566 UART: [art] Extend RT PCRs Done
2,813,994 UART: [art] Lock RT PCRs Done
2,815,772 UART: [art] Populate DV Done
2,824,137 UART: [fht] FMC Alias Private Key: 7
2,825,155 UART: [art] Derive CDI
2,825,435 UART: [art] Store in in slot 0x4
2,911,464 UART: [art] Derive Key Pair
2,911,824 UART: [art] Store priv key in slot 0x5
2,925,018 UART: [art] Derive Key Pair - Done
2,940,094 UART: [art] Signing Cert with AUTHO
2,940,574 UART: RITY.KEYID = 7
2,955,876 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,641 UART: [art] PUB.X = 1AB53805F37D69DE48BE3259CD9203720985B77ECA103F8BFB6DAC0BB94B4E81156993CA528CFC896CD5FDE491F1D66B
2,963,413 UART: [art] PUB.Y = AE61372B29BE6892812868123C67ACBF9754F0103717F9AFA0E74D7353B5EE30C5C91624093270F501F423EF732BC8C2
2,970,353 UART: [art] SIG.R = 3B8300823FFD0313D019333F4AFDE05AEDAEE1CE84065C61E188ABFF4655DF665EB14438B552E9EBD81D7CCA06C23807
2,977,103 UART: [art] SIG.S = 9D5FEDDA3B588658E9DE508E26C3E3FD1CD80DF26E1871020297A7D68BF531BC1989B4B9A206AF9FEB11DFD2ED05918B
3,000,893 UART: Caliptra RT
3,001,146 UART: [state] CFI Enabled
3,109,441 UART: [rt] RT listening for mailbox commands...
3,110,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,959 UART: [rt]cmd =0x46504c54, len=4
3,141,035 >>> mbox cmd response data (8 bytes)
3,141,340 UART: [rt] FIPS self test
3,141,668 UART: [kat] ++
3,141,820 UART: [kat] sha1
3,142,508 UART: Fatal Error: 0x90060001
3,144,047 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,144,052 >>> mbox cmd response: failed
3,144,052 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,144,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,665 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,088 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
902,070 UART: [kat] SHA2-256
904,010 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,408 UART: [fht] FHT @ 0x50003400
1,175,033 UART: [idev] ++
1,175,201 UART: [idev] CDI.KEYID = 6
1,175,561 UART: [idev] SUBJECT.KEYID = 7
1,175,985 UART: [idev] UDS.KEYID = 0
1,176,330 ready_for_fw is high
1,176,330 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,476 UART: [ldev] ++
1,210,644 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,433 UART: [ldev] AUTHORITY.KEYID = 7
1,211,896 UART: [ldev] FE.KEYID = 1
1,216,996 UART: [ldev] Erasing FE.KEYID = 1
1,243,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,656 UART: [ldev] --
1,282,919 UART: [fwproc] Wait for Commands...
1,283,649 UART: [fwproc] Recv command 0x46574c44
1,284,377 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,311 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,615 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,330 >>> mbox cmd response: success
2,784,526 UART: [afmc] ++
2,784,694 UART: [afmc] CDI.KEYID = 6
2,785,056 UART: [afmc] SUBJECT.KEYID = 7
2,785,481 UART: [afmc] AUTHORITY.KEYID = 5
2,820,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,011 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,739 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,365 UART: [afmc] --
2,864,463 UART: [cold-reset] --
2,865,227 UART: [state] Locking Datavault
2,866,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,920 UART: [state] Locking ICCM
2,867,520 UART: [exit] Launching FMC @ 0x40000130
2,872,849 UART:
2,872,865 UART: Running Caliptra FMC ...
2,873,273 UART:
2,873,416 UART: [state] CFI Enabled
2,884,305 UART: [fht] FMC Alias Private Key: 7
2,991,884 UART: [art] Extend RT PCRs Done
2,992,312 UART: [art] Lock RT PCRs Done
2,993,950 UART: [art] Populate DV Done
3,002,275 UART: [fht] FMC Alias Private Key: 7
3,003,453 UART: [art] Derive CDI
3,003,733 UART: [art] Store in in slot 0x4
3,089,450 UART: [art] Derive Key Pair
3,089,810 UART: [art] Store priv key in slot 0x5
3,103,030 UART: [art] Derive Key Pair - Done
3,118,022 UART: [art] Signing Cert with AUTHO
3,118,502 UART: RITY.KEYID = 7
3,133,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,385 UART: [art] PUB.X = BB5EB5C35DEE9E339C00611D899F135F2E89909796D8AFBB5FD22A91F030CCBC1233E667D0F4D287949D06B6ACAA1349
3,141,142 UART: [art] PUB.Y = 8A72135B4DDA9D75AC87D47D798EE0B346101C346BFF89E2520426824BE8104209FB2FE0100919A07CA71DFDB20196B3
3,148,082 UART: [art] SIG.R = DCE7E86B4F5C93BDDA80459657C3B00C3CC14116A77D59A302725B698B451CEBB52D335E5CF7A9FF3259D17E4F1E08DD
3,154,857 UART: [art] SIG.S = AA1E9F44D74652501A05C804F1A19EDC400DCC436A2BE157AA2E0162FB54D32C408FE5F46614A549715DE33D29373FFD
3,178,370 UART: Caliptra RT
3,178,715 UART: [state] CFI Enabled
3,285,609 UART: [rt] RT listening for mailbox commands...
3,286,272 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,105 UART: [rt]cmd =0x46504c54, len=4
3,317,327 >>> mbox cmd response data (8 bytes)
3,317,616 UART: [rt] FIPS self test
3,317,944 UART: [kat] ++
3,318,096 UART: [kat] sha1
3,318,538 UART: Fatal Error: 0x90060001
3,320,077 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,320,082 >>> mbox cmd response: failed
3,320,082 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,320,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
893,541 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,666 UART: [kat] ++
897,818 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,539 UART: [kat] SHA2-512-ACC
908,440 UART: [kat] ECC-384
918,109 UART: [kat] HMAC-384Kdf
922,631 UART: [kat] LMS
1,170,959 UART: [kat] --
1,171,722 UART: [cold-reset] ++
1,172,276 UART: [fht] FHT @ 0x50003400
1,174,949 UART: [idev] ++
1,175,117 UART: [idev] CDI.KEYID = 6
1,175,477 UART: [idev] SUBJECT.KEYID = 7
1,175,901 UART: [idev] UDS.KEYID = 0
1,176,246 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,371 UART: [idev] Erasing UDS.KEYID = 0
1,201,466 UART: [idev] Sha1 KeyId Algorithm
1,210,032 UART: [idev] --
1,211,040 UART: [ldev] ++
1,211,208 UART: [ldev] CDI.KEYID = 6
1,211,571 UART: [ldev] SUBJECT.KEYID = 5
1,211,997 UART: [ldev] AUTHORITY.KEYID = 7
1,212,460 UART: [ldev] FE.KEYID = 1
1,217,826 UART: [ldev] Erasing FE.KEYID = 1
1,243,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,386 UART: [ldev] --
1,282,833 UART: [fwproc] Wait for Commands...
1,283,427 UART: [fwproc] Recv command 0x46574c44
1,284,155 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,517 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,821 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,506 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 ready_for_fw is high
1,059,946 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,499 >>> mbox cmd response: success
2,697,195 UART:
2,697,211 UART: Running Caliptra FMC ...
2,697,619 UART:
2,697,762 UART: [state] CFI Enabled
2,708,517 UART: [fht] FMC Alias Private Key: 7
2,816,980 UART: [art] Extend RT PCRs Done
2,817,408 UART: [art] Lock RT PCRs Done
2,818,872 UART: [art] Populate DV Done
2,827,209 UART: [fht] FMC Alias Private Key: 7
2,828,285 UART: [art] Derive CDI
2,828,565 UART: [art] Store in in slot 0x4
2,914,664 UART: [art] Derive Key Pair
2,915,024 UART: [art] Store priv key in slot 0x5
2,927,756 UART: [art] Derive Key Pair - Done
2,942,135 UART: [art] Signing Cert with AUTHO
2,942,615 UART: RITY.KEYID = 7
2,958,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,936 UART: [art] PUB.X = 23848B324294AA66C667F5BCA0C328AEB329DCB7CC0E510244639E7759A42DAB6170928D6D9295210C3886C14622837D
2,965,691 UART: [art] PUB.Y = 845DDE2F9639C43098421F4F32B45623E4D42D8ED605EE797D25792AD3A4F16D35E46513779FD691A31A8EAEFEDC3B95
2,972,644 UART: [art] SIG.R = CA1993481B554BD639383C3F435AA1CB6588537DA63375B91F9772B9D7738780A8825891BC19C70F9D1946917BF097FA
2,979,403 UART: [art] SIG.S = 3C302F7BDD0DAE464FCF45E97DEBBB1F720BCC4A83DE40FE862C33DF510CBE34B6CBCFAA70730E06D954E11D28F030BD
3,002,717 UART: Caliptra RT
3,003,062 UART: [state] CFI Enabled
3,110,745 UART: [rt] RT listening for mailbox commands...
3,111,408 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,477 UART: [rt]cmd =0x46504c54, len=4
3,142,705 >>> mbox cmd response data (8 bytes)
3,143,070 UART: [rt] FIPS self test
3,143,398 UART: [kat] ++
3,143,550 UART: [kat] sha1
3,144,308 UART: Fatal Error: 0x90060001
3,145,847 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,145,852 >>> mbox cmd response: failed
3,145,852 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,145,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,061 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,180 UART: [kat] SHA2-256
890,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,859 UART: [kat] ++
895,011 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,030 UART: [kat] SHA2-512-ACC
905,931 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,978 UART: [kat] LMS
1,168,290 UART: [kat] --
1,169,217 UART: [cold-reset] ++
1,169,683 UART: [fht] FHT @ 0x50003400
1,172,229 UART: [idev] ++
1,172,397 UART: [idev] CDI.KEYID = 6
1,172,758 UART: [idev] SUBJECT.KEYID = 7
1,173,183 UART: [idev] UDS.KEYID = 0
1,173,529 ready_for_fw is high
1,173,529 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,261 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,834 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,143 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,835 >>> mbox cmd response: success
2,780,928 UART: [afmc] ++
2,781,096 UART: [afmc] CDI.KEYID = 6
2,781,459 UART: [afmc] SUBJECT.KEYID = 7
2,781,885 UART: [afmc] AUTHORITY.KEYID = 5
2,817,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,569 UART: [afmc] --
2,860,507 UART: [cold-reset] --
2,861,261 UART: [state] Locking Datavault
2,862,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,060 UART: [state] Locking ICCM
2,863,620 UART: [exit] Launching FMC @ 0x40000130
2,868,949 UART:
2,868,965 UART: Running Caliptra FMC ...
2,869,373 UART:
2,869,427 UART: [state] CFI Enabled
2,879,594 UART: [fht] FMC Alias Private Key: 7
2,988,035 UART: [art] Extend RT PCRs Done
2,988,463 UART: [art] Lock RT PCRs Done
2,989,945 UART: [art] Populate DV Done
2,997,952 UART: [fht] FMC Alias Private Key: 7
2,998,976 UART: [art] Derive CDI
2,999,256 UART: [art] Store in in slot 0x4
3,084,849 UART: [art] Derive Key Pair
3,085,209 UART: [art] Store priv key in slot 0x5
3,097,655 UART: [art] Derive Key Pair - Done
3,112,351 UART: [art] Signing Cert with AUTHO
3,112,831 UART: RITY.KEYID = 7
3,127,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,478 UART: [art] PUB.X = E43E5F4112494C9AF92F86C69BA6B27A3A34FFD356F276D6CCB5C64EEEDCC8C63EA87FFF8A308D23C817441EC0FDD6DC
3,135,274 UART: [art] PUB.Y = 937A67A21EF27A18BAB8C0BCFDEBB4FDF38B6FC8317938AAB8B5EBED644D911EAC40A5D4E0D4D3D60A894FDC0C84428C
3,142,248 UART: [art] SIG.R = 7AE7404ED0A877A063AA0819C7124082F98F0AE847176F5DAFE43C13D359F86761B31736EB214ADF38A82E699642C44A
3,149,012 UART: [art] SIG.S = 5F4B027C39D917FCD6A1DE750199E6BEBE86F1BB938C18CFC7FE461C9BE28028459B78DA0A4870CFA12C0F562B4F88F9
3,172,561 UART: Caliptra RT
3,172,814 UART: [state] CFI Enabled
3,279,987 UART: [rt] RT listening for mailbox commands...
3,280,650 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,333 UART: [rt]cmd =0x46504c54, len=4
3,311,427 >>> mbox cmd response data (8 bytes)
3,311,604 UART: [rt] FIPS self test
3,311,932 UART: [kat] ++
3,312,084 UART: [kat] sha1
3,312,716 UART: Fatal Error: 0x90060001
3,314,255 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,314,260 >>> mbox cmd response: failed
3,314,260 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,314,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,468 UART: [kat] LMS
1,168,780 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,705 UART: [idev] ++
1,172,873 UART: [idev] CDI.KEYID = 6
1,173,234 UART: [idev] SUBJECT.KEYID = 7
1,173,659 UART: [idev] UDS.KEYID = 0
1,174,005 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,715 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,895 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,739 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 ready_for_fw is high
1,055,852 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,515 >>> mbox cmd response: success
2,691,555 UART:
2,691,571 UART: Running Caliptra FMC ...
2,691,979 UART:
2,692,033 UART: [state] CFI Enabled
2,702,552 UART: [fht] FMC Alias Private Key: 7
2,810,101 UART: [art] Extend RT PCRs Done
2,810,529 UART: [art] Lock RT PCRs Done
2,812,013 UART: [art] Populate DV Done
2,820,270 UART: [fht] FMC Alias Private Key: 7
2,821,318 UART: [art] Derive CDI
2,821,598 UART: [art] Store in in slot 0x4
2,907,461 UART: [art] Derive Key Pair
2,907,821 UART: [art] Store priv key in slot 0x5
2,921,449 UART: [art] Derive Key Pair - Done
2,936,263 UART: [art] Signing Cert with AUTHO
2,936,743 UART: RITY.KEYID = 7
2,952,221 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,986 UART: [art] PUB.X = 52651D37D6C4B6799B850C560230FC482E7DDC57211F2058F59465EDE8CD7D6CEA6D773D9F2FDE63A736847AEC7F8F80
2,959,758 UART: [art] PUB.Y = C125DFC9D7E7221A36E6991F3F7D423DDF1977C4FDC8EB054C793CA08BF3E4BBD4D15A485752BDA8FDB9C73E55C6EF58
2,966,727 UART: [art] SIG.R = 89673A1D275910AE78D2578B4EF0B437E9A2FC3BF8805703243D9285AD70646F3E1D215BA32F7728244DFFA3C8BC4AA7
2,973,498 UART: [art] SIG.S = 663D18A0DD15E59FC1212F91E530FD3CE877BF0A1A42D827B750CD202416499838157022502EE16505EB1AE5C2AEB117
2,997,847 UART: Caliptra RT
2,998,100 UART: [state] CFI Enabled
3,105,641 UART: [rt] RT listening for mailbox commands...
3,106,304 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,169 UART: [rt]cmd =0x46504c54, len=4
3,137,283 >>> mbox cmd response data (8 bytes)
3,137,478 UART: [rt] FIPS self test
3,137,806 UART: [kat] ++
3,137,958 UART: [kat] sha1
3,138,580 UART: Fatal Error: 0x90060001
3,140,119 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,140,124 >>> mbox cmd response: failed
3,140,124 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,140,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,148 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,037 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,275 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,094 UART: [cold-reset] ++
1,170,532 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,174,692 ready_for_fw is high
1,174,692 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,782 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,303 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,259 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,586 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,228 >>> mbox cmd response: success
2,783,319 UART: [afmc] ++
2,783,487 UART: [afmc] CDI.KEYID = 6
2,783,850 UART: [afmc] SUBJECT.KEYID = 7
2,784,276 UART: [afmc] AUTHORITY.KEYID = 5
2,819,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,024 UART: [afmc] --
2,863,024 UART: [cold-reset] --
2,863,868 UART: [state] Locking Datavault
2,864,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,507 UART: [state] Locking ICCM
2,866,077 UART: [exit] Launching FMC @ 0x40000130
2,871,406 UART:
2,871,422 UART: Running Caliptra FMC ...
2,871,830 UART:
2,871,973 UART: [state] CFI Enabled
2,882,770 UART: [fht] FMC Alias Private Key: 7
2,990,807 UART: [art] Extend RT PCRs Done
2,991,235 UART: [art] Lock RT PCRs Done
2,992,965 UART: [art] Populate DV Done
3,001,156 UART: [fht] FMC Alias Private Key: 7
3,002,120 UART: [art] Derive CDI
3,002,400 UART: [art] Store in in slot 0x4
3,088,187 UART: [art] Derive Key Pair
3,088,547 UART: [art] Store priv key in slot 0x5
3,101,905 UART: [art] Derive Key Pair - Done
3,116,724 UART: [art] Signing Cert with AUTHO
3,117,204 UART: RITY.KEYID = 7
3,132,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,105 UART: [art] PUB.X = A2619D6862AC0C0A4A9F5E18B605CD14F305A9A5993D8098B2F0256E1A55A369C0258AF04B1EA551D36907550ACDA93B
3,139,861 UART: [art] PUB.Y = 8278DDCF05D690BFF74818C1E567284D93507BE6D2D9A3770168293B7C3758277365EA79F05781BB7201864ED2E7820F
3,146,791 UART: [art] SIG.R = FC30996511BA5C04C30F46683B0FDACA1346D0F6C83EDC21D08D70E976BC2D9DF292CE9419EBBD5C80A208719083BDFA
3,153,565 UART: [art] SIG.S = C60A4326687F305D843E8B651BA5D2E63D05AF71E136451B91C06314E7FAE6A4BC53540931FD055F74FC0FEA437245D3
3,177,239 UART: Caliptra RT
3,177,584 UART: [state] CFI Enabled
3,286,276 UART: [rt] RT listening for mailbox commands...
3,286,939 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,816 UART: [rt]cmd =0x46504c54, len=4
3,318,116 >>> mbox cmd response data (8 bytes)
3,318,461 UART: [rt] FIPS self test
3,318,789 UART: [kat] ++
3,318,941 UART: [kat] sha1
3,319,721 UART: Fatal Error: 0x90060001
3,321,260 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,265 >>> mbox cmd response: failed
3,321,265 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,765 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,576 UART: [cold-reset] ++
1,170,992 UART: [fht] FHT @ 0x50003400
1,173,784 UART: [idev] ++
1,173,952 UART: [idev] CDI.KEYID = 6
1,174,313 UART: [idev] SUBJECT.KEYID = 7
1,174,738 UART: [idev] UDS.KEYID = 0
1,175,084 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,241,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,535 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,660 UART: [fwproc] Recv command 0x46574c44
1,282,393 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,388 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,128 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,235 ready_for_fw is high
1,056,235 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,652 >>> mbox cmd response: success
2,694,470 UART:
2,694,486 UART: Running Caliptra FMC ...
2,694,894 UART:
2,695,037 UART: [state] CFI Enabled
2,706,140 UART: [fht] FMC Alias Private Key: 7
2,814,071 UART: [art] Extend RT PCRs Done
2,814,499 UART: [art] Lock RT PCRs Done
2,816,019 UART: [art] Populate DV Done
2,824,518 UART: [fht] FMC Alias Private Key: 7
2,825,584 UART: [art] Derive CDI
2,825,864 UART: [art] Store in in slot 0x4
2,911,901 UART: [art] Derive Key Pair
2,912,261 UART: [art] Store priv key in slot 0x5
2,925,119 UART: [art] Derive Key Pair - Done
2,939,740 UART: [art] Signing Cert with AUTHO
2,940,220 UART: RITY.KEYID = 7
2,955,444 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,209 UART: [art] PUB.X = 8B05E611BD155A5139415712E15F4463E9E1DFB253FA94553695EB7FE4C5389FB87DD78F713EF13C12BA81FDD48F9B3F
2,962,984 UART: [art] PUB.Y = 42EFC26FB46EC3E2159C24701CFAC6BA2693F126CCADF5D8645EDA760849A5B9701BBC1D390338FAE8D9D4D14C8FB76A
2,969,948 UART: [art] SIG.R = 5CBA1187FECC7E9FBC1CB7E6F8959001E0253FDD05112CA67E2696AA1F9F5E33B7112E61BC0FD59CC07864788C8CEA36
2,976,725 UART: [art] SIG.S = 01A166B956FE8056FD40324361F6191662C6F7F1020BAA81186E5DF200251F7B4D3DC70C4F2537E99AD8ED7BD089FC1B
3,000,308 UART: Caliptra RT
3,000,653 UART: [state] CFI Enabled
3,108,536 UART: [rt] RT listening for mailbox commands...
3,109,199 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,016 UART: [rt]cmd =0x46504c54, len=4
3,140,132 >>> mbox cmd response data (8 bytes)
3,140,267 UART: [rt] FIPS self test
3,140,595 UART: [kat] ++
3,140,747 UART: [kat] sha1
3,141,571 UART: Fatal Error: 0x90060001
3,143,110 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,143,115 >>> mbox cmd response: failed
3,143,115 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,143,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,788 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,682,783 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,826,367 >>> mbox cmd response: failed
2,826,918 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,969,797 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
4,867,411 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,438,666 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,678,977 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,822,724 >>> mbox cmd response: failed
2,823,300 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,966,182 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
4,875,432 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,475,260 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,029,719 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,173,543 >>> mbox cmd response: failed
3,174,111 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,317,603 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,577,456 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,009,987 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,031,590 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,175,912 >>> mbox cmd response: failed
3,176,558 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,319,438 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,585,522 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,023,086 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
2,681,335 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,825,536 >>> mbox cmd response: failed
2,826,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,969,394 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,451,805 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,301,149 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
2,690,338 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,834,659 >>> mbox cmd response: failed
2,835,224 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,979,050 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,445,681 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,293,170 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
3,058,568 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,202,700 >>> mbox cmd response: failed
3,203,259 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,346,388 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,183,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,909,922 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,038,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,182,604 >>> mbox cmd response: failed
3,183,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,326,435 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
20,178,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,904,667 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,690,809 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,835,004 >>> mbox cmd response: failed
2,835,579 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,978,933 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,448,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,303,325 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,692,253 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,836,482 >>> mbox cmd response: failed
2,837,034 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,980,387 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,465,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,274,245 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,048,452 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,192,450 >>> mbox cmd response: failed
3,193,009 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,336,317 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,178,252 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,913,104 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
3,044,931 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,189,087 >>> mbox cmd response: failed
3,189,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,332,952 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,180,000 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,906,324 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,273 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,281 >>> mbox cmd response: failed
807,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,811 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,377 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,507 >>> mbox cmd response: failed
807,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,497 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,223 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,668 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,676 >>> mbox cmd response: failed
807,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,613 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,256 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,264 >>> mbox cmd response: failed
807,264 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,654 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,762 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,047 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,055 >>> mbox cmd response: failed
807,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,061 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,465 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,827 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,879 >>> mbox cmd response: failed
807,879 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,125 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,438 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,446 >>> mbox cmd response: failed
807,446 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,332 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,998 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,910 >>> mbox cmd response: failed
807,910 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,568 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,301 >>> mbox cmd response: failed
807,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,499 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,895 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
806,903 >>> mbox cmd response: failed
806,903 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
806,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,813 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,337 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,374 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,382 >>> mbox cmd response: failed
807,382 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,524 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,544 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,552 >>> mbox cmd response: failed
807,552 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
807,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,344 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,066 UART:
192,452 UART: Running Caliptra ROM ...
193,582 UART:
193,727 UART: [state] CFI Enabled
264,577 UART: [state] LifecycleState = Unprovisioned
266,510 UART: [state] DebugLocked = No
268,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,911 UART: [kat] SHA2-256
442,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,081 UART: [kat] ++
453,532 UART: [kat] sha1
465,121 UART: [kat] SHA2-256
467,777 UART: [kat] SHA2-384
473,204 UART: [kat] SHA2-512-ACC
475,577 UART: [kat] ECC-384
2,766,454 UART: [kat] HMAC-384Kdf
2,780,692 UART: [kat] LMS
3,970,949 UART: [kat] --
3,976,741 UART: [cold-reset] ++
3,978,969 UART: [fht] Storing FHT @ 0x50003400
3,990,666 UART: [idev] ++
3,991,314 UART: [idev] CDI.KEYID = 6
3,992,222 UART: [idev] SUBJECT.KEYID = 7
3,993,471 UART: [idev] UDS.KEYID = 0
3,994,529 ready_for_fw is high
3,994,745 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,138,921 UART: [idev] Erasing UDS.KEYID = 0
7,326,817 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,827 UART: [idev] --
7,352,687 UART: [ldev] ++
7,353,257 UART: [ldev] CDI.KEYID = 6
7,354,194 UART: [ldev] SUBJECT.KEYID = 5
7,355,460 UART: [ldev] AUTHORITY.KEYID = 7
7,356,694 UART: [ldev] FE.KEYID = 1
7,405,513 UART: [ldev] Erasing FE.KEYID = 1
10,734,686 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,482 UART: [ldev] --
13,096,574 UART: [fwproc] Waiting for Commands...
13,098,189 UART: [fwproc] Received command 0x46574c44
13,100,385 UART: [fwproc] Received Image of size 114632 bytes
17,158,366 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,624,545 >>> mbox cmd response: success
17,629,007 UART: [afmc] ++
17,629,604 UART: [afmc] CDI.KEYID = 6
17,630,573 UART: [afmc] SUBJECT.KEYID = 7
17,631,975 UART: [afmc] AUTHORITY.KEYID = 5
20,989,425 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,963 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,227 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,609 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,480 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,931 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,428 UART: [afmc] --
23,356,021 UART: [cold-reset] --
23,359,720 UART: [state] Locking Datavault
23,363,720 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,480 UART: [state] Locking ICCM
23,368,115 UART: [exit] Launching FMC @ 0x40000130
23,376,509 UART:
23,376,746 UART: Running Caliptra FMC ...
23,377,847 UART:
23,378,005 UART: [state] CFI Enabled
23,446,921 UART: [fht] FMC Alias Private Key: 7
25,784,703 UART: [art] Extend RT PCRs Done
25,785,986 UART: [art] Lock RT PCRs Done
25,787,562 UART: [art] Populate DV Done
25,793,002 UART: [fht] FMC Alias Private Key: 7
25,794,587 UART: [art] Derive CDI
25,795,415 UART: [art] Store in in slot 0x4
25,855,271 UART: [art] Derive Key Pair
25,856,275 UART: [art] Store priv key in slot 0x5
29,148,649 UART: [art] Derive Key Pair - Done
29,161,705 UART: [art] Signing Cert with AUTHO
29,163,042 UART: RITY.KEYID = 7
31,450,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,632 UART: [art] PUB.X = A28279C42EC85967B2125C08D2BB7074F0103DFA7E9C0EA51770B38F025733467DD7A290681C0D4737AFF5B3AEF5E3AA
31,458,849 UART: [art] PUB.Y = B443C453B58B5693D642EE5F18BBD2945FB9A62EC278B26615386C424B6F7980167B995EC81AF8C8F273F13CA6C73CF3
31,466,101 UART: [art] SIG.R = D171FD0566B60BC817B8A8491E42B49050A8C1442F53ED4594609DB14A3E2CE40EBE9ABE227935D2365BC4FE5844F0E3
31,473,495 UART: [art] SIG.S = AFC0CB305EAE511227A2B9CFCF36C3402317135E766B64C72CE69AAB82AB51059F61554BDA08165A6064CBC3519CC4F9
32,778,572 UART: Caliptra RT
32,779,289 UART: [state] CFI Enabled
32,939,593 UART: [rt] RT listening for mailbox commands...
32,941,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,970,997 UART: [rt]cmd =0x46504c54, len=4
32,972,580 >>> mbox cmd response data (8 bytes)
32,973,654 UART: [rt] FIPS self test
32,974,601 UART: [kat] ++
32,975,053 UART: [kat] sha1
32,979,486 UART: Fatal Error: 0x90060002
33,014,859 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,158,851 >>> mbox cmd response: failed
33,159,443 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,303,199 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
190,079 UART:
190,382 UART: Running Caliptra ROM ...
191,490 UART:
191,661 UART: [state] CFI Enabled
254,531 UART: [state] LifecycleState = Unprovisioned
256,505 UART: [state] DebugLocked = No
257,991 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,287 UART: [kat] SHA2-256
432,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,476 UART: [kat] ++
442,955 UART: [kat] sha1
453,723 UART: [kat] SHA2-256
456,408 UART: [kat] SHA2-384
462,494 UART: [kat] SHA2-512-ACC
464,890 UART: [kat] ECC-384
2,759,399 UART: [kat] HMAC-384Kdf
2,771,050 UART: [kat] LMS
3,961,300 UART: [kat] --
3,964,071 UART: [cold-reset] ++
3,965,650 UART: [fht] Storing FHT @ 0x50003400
3,977,082 UART: [idev] ++
3,977,653 UART: [idev] CDI.KEYID = 6
3,978,533 UART: [idev] SUBJECT.KEYID = 7
3,979,798 UART: [idev] UDS.KEYID = 0
3,981,348 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,125,631 UART: [idev] Erasing UDS.KEYID = 0
7,318,698 UART: [idev] Using Sha1 for KeyId Algorithm
7,339,432 UART: [idev] --
7,342,827 UART: [ldev] ++
7,343,407 UART: [ldev] CDI.KEYID = 6
7,344,378 UART: [ldev] SUBJECT.KEYID = 5
7,345,593 UART: [ldev] AUTHORITY.KEYID = 7
7,346,874 UART: [ldev] FE.KEYID = 1
7,392,783 UART: [ldev] Erasing FE.KEYID = 1
10,726,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,160 UART: [ldev] --
13,104,885 UART: [fwproc] Waiting for Commands...
13,108,013 UART: [fwproc] Received command 0x46574c44
13,110,212 UART: [fwproc] Received Image of size 114632 bytes
17,168,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,824 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,630,284 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,785,310 ready_for_fw is high
3,785,741 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,882,780 >>> mbox cmd response: success
23,567,267 UART:
23,567,667 UART: Running Caliptra FMC ...
23,568,805 UART:
23,568,962 UART: [state] CFI Enabled
23,635,043 UART: [fht] FMC Alias Private Key: 7
25,973,812 UART: [art] Extend RT PCRs Done
25,975,060 UART: [art] Lock RT PCRs Done
25,976,636 UART: [art] Populate DV Done
25,981,993 UART: [fht] FMC Alias Private Key: 7
25,983,544 UART: [art] Derive CDI
25,984,307 UART: [art] Store in in slot 0x4
26,043,463 UART: [art] Derive Key Pair
26,044,507 UART: [art] Store priv key in slot 0x5
29,337,244 UART: [art] Derive Key Pair - Done
29,350,418 UART: [art] Signing Cert with AUTHO
29,351,725 UART: RITY.KEYID = 7
31,639,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,654 UART: [art] PUB.X = 61D51349BA569F29B1EE962B56AD48541576513E4E2F53741394B2C0178061EBA12E6CC9DA307E244502233F9090F8F0
31,647,863 UART: [art] PUB.Y = 34553AA90CF26E833E746E93856771FC3C53D9CDF165571D4A75563A44BF36A036846A0CC5F9F01FD455696EC841A0AC
31,655,058 UART: [art] SIG.R = F9CAE20445E95A4D4663205E379F7FE2FC76BF52C823F73C5049C3AC2E4980F16567BB474477FBF2F699F2F701C2817C
31,662,455 UART: [art] SIG.S = 28A4EC5CB22D96D393C5EE18883D64177680C264D84F15BD4B45568312DA2046191DDE806262B550CC2E04D27598ABFE
32,968,198 UART: Caliptra RT
32,968,938 UART: [state] CFI Enabled
33,150,110 UART: [rt] RT listening for mailbox commands...
33,151,986 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,181,712 UART: [rt]cmd =0x46504c54, len=4
33,183,344 >>> mbox cmd response data (8 bytes)
33,184,289 UART: [rt] FIPS self test
33,185,238 UART: [kat] ++
33,185,688 UART: [kat] sha1
33,189,982 UART: Fatal Error: 0x90060002
33,225,364 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,369,355 >>> mbox cmd response: failed
33,369,923 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,513,727 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,797,111 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,895,968 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,526 UART:
192,894 UART: Running Caliptra ROM ...
194,231 UART:
603,629 UART: [state] CFI Enabled
616,857 UART: [state] LifecycleState = Unprovisioned
618,783 UART: [state] DebugLocked = No
621,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,547 UART: [kat] SHA2-256
795,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,847 UART: [kat] ++
806,342 UART: [kat] sha1
817,360 UART: [kat] SHA2-256
820,111 UART: [kat] SHA2-384
826,528 UART: [kat] SHA2-512-ACC
828,901 UART: [kat] ECC-384
3,112,947 UART: [kat] HMAC-384Kdf
3,125,813 UART: [kat] LMS
4,315,928 UART: [kat] --
4,320,591 UART: [cold-reset] ++
4,321,747 UART: [fht] Storing FHT @ 0x50003400
4,331,816 UART: [idev] ++
4,332,391 UART: [idev] CDI.KEYID = 6
4,333,282 UART: [idev] SUBJECT.KEYID = 7
4,334,525 UART: [idev] UDS.KEYID = 0
4,335,519 ready_for_fw is high
4,335,748 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,479,815 UART: [idev] Erasing UDS.KEYID = 0
7,625,594 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,349 UART: [idev] --
7,651,164 UART: [ldev] ++
7,651,791 UART: [ldev] CDI.KEYID = 6
7,652,715 UART: [ldev] SUBJECT.KEYID = 5
7,653,930 UART: [ldev] AUTHORITY.KEYID = 7
7,655,166 UART: [ldev] FE.KEYID = 1
7,664,971 UART: [ldev] Erasing FE.KEYID = 1
10,954,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,832 UART: [ldev] --
13,314,158 UART: [fwproc] Waiting for Commands...
13,316,686 UART: [fwproc] Received command 0x46574c44
13,318,872 UART: [fwproc] Received Image of size 114632 bytes
17,370,869 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,252 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,121 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,836,364 >>> mbox cmd response: success
17,841,005 UART: [afmc] ++
17,841,601 UART: [afmc] CDI.KEYID = 6
17,842,512 UART: [afmc] SUBJECT.KEYID = 7
17,843,780 UART: [afmc] AUTHORITY.KEYID = 5
21,156,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,031 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,283 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,663 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,525 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,948 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,230 UART: [afmc] --
23,521,315 UART: [cold-reset] --
23,526,208 UART: [state] Locking Datavault
23,531,711 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,417 UART: [state] Locking ICCM
23,535,571 UART: [exit] Launching FMC @ 0x40000130
23,543,966 UART:
23,544,202 UART: Running Caliptra FMC ...
23,545,251 UART:
23,545,406 UART: [state] CFI Enabled
23,553,886 UART: [fht] FMC Alias Private Key: 7
25,884,682 UART: [art] Extend RT PCRs Done
25,885,906 UART: [art] Lock RT PCRs Done
25,887,590 UART: [art] Populate DV Done
25,892,954 UART: [fht] FMC Alias Private Key: 7
25,894,506 UART: [art] Derive CDI
25,895,272 UART: [art] Store in in slot 0x4
25,938,251 UART: [art] Derive Key Pair
25,939,315 UART: [art] Store priv key in slot 0x5
29,181,400 UART: [art] Derive Key Pair - Done
29,194,617 UART: [art] Signing Cert with AUTHO
29,195,921 UART: RITY.KEYID = 7
31,475,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,659 UART: [art] PUB.X = 7B9B9DF02CDB5C6D328A1CEE86029D1145042AB9E9C3A86E24D704FE96E9059C02A1D5B843EFEEE1168C878A034F1B6C
31,483,913 UART: [art] PUB.Y = E40CD1E2315C253BFD910AA5E6C2ECDDF1CC84B9B58BFFB6623FCD0BE764AAB05CA15F0283D30BB069F4BE055F2B62D0
31,491,208 UART: [art] SIG.R = 2EB8B52F030860EB06280E88C41614ED13016A9EE57A020EEEC8EC39E3DF4BE34D4A838DC60D5565A35D8763AD256A6E
31,498,589 UART: [art] SIG.S = D09A44B87CDD4F9AB9713E178E029EE83D1F40134DF3D1E17238C1DF177F76624DA4E8E894802F51F1A488DD908300C8
32,803,947 UART: Caliptra RT
32,804,646 UART: [state] CFI Enabled
32,922,892 UART: [rt] RT listening for mailbox commands...
32,924,734 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,954,360 UART: [rt]cmd =0x46504c54, len=4
32,955,913 >>> mbox cmd response data (8 bytes)
32,957,160 UART: [rt] FIPS self test
32,958,132 UART: [kat] ++
32,958,589 UART: [kat] sha1
32,962,830 UART: Fatal Error: 0x90060002
32,998,035 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,142,450 >>> mbox cmd response: failed
33,143,102 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,286,983 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,112 UART:
190,403 UART: Running Caliptra ROM ...
191,519 UART:
7,248,113 UART: [state] CFI Enabled
7,260,236 UART: [state] LifecycleState = Unprovisioned
7,262,185 UART: [state] DebugLocked = No
7,263,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,268,753 UART: [kat] SHA2-256
7,438,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,449,033 UART: [kat] ++
7,449,494 UART: [kat] sha1
7,459,896 UART: [kat] SHA2-256
7,462,590 UART: [kat] SHA2-384
7,468,793 UART: [kat] SHA2-512-ACC
7,471,142 UART: [kat] ECC-384
9,754,948 UART: [kat] HMAC-384Kdf
9,766,201 UART: [kat] LMS
10,956,304 UART: [kat] --
10,962,912 UART: [cold-reset] ++
10,964,357 UART: [fht] Storing FHT @ 0x50003400
10,975,900 UART: [idev] ++
10,976,522 UART: [idev] CDI.KEYID = 6
10,977,429 UART: [idev] SUBJECT.KEYID = 7
10,978,719 UART: [idev] UDS.KEYID = 0
10,980,240 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,124,174 UART: [idev] Erasing UDS.KEYID = 0
14,267,206 UART: [idev] Using Sha1 for KeyId Algorithm
14,289,729 UART: [idev] --
14,292,299 UART: [ldev] ++
14,292,897 UART: [ldev] CDI.KEYID = 6
14,293,964 UART: [ldev] SUBJECT.KEYID = 5
14,295,073 UART: [ldev] AUTHORITY.KEYID = 7
14,296,308 UART: [ldev] FE.KEYID = 1
14,308,519 UART: [ldev] Erasing FE.KEYID = 1
17,604,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,899,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,914,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,928,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,943,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,962,234 UART: [ldev] --
19,966,153 UART: [fwproc] Waiting for Commands...
19,968,200 UART: [fwproc] Received command 0x46574c44
19,970,535 UART: [fwproc] Received Image of size 114632 bytes
24,030,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,108,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,177,140 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,496,370 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,125,809 ready_for_fw is high
4,126,464 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,078,923 >>> mbox cmd response: success
23,712,898 UART:
23,713,335 UART: Running Caliptra FMC ...
23,714,457 UART:
23,714,616 UART: [state] CFI Enabled
23,722,684 UART: [fht] FMC Alias Private Key: 7
26,054,171 UART: [art] Extend RT PCRs Done
26,055,407 UART: [art] Lock RT PCRs Done
26,056,702 UART: [art] Populate DV Done
26,062,228 UART: [fht] FMC Alias Private Key: 7
26,063,887 UART: [art] Derive CDI
26,064,756 UART: [art] Store in in slot 0x4
26,107,297 UART: [art] Derive Key Pair
26,108,351 UART: [art] Store priv key in slot 0x5
29,350,799 UART: [art] Derive Key Pair - Done
29,363,642 UART: [art] Signing Cert with AUTHO
29,364,945 UART: RITY.KEYID = 7
31,644,787 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,313 UART: [art] PUB.X = E0850E57D89D0FD48E6C3F8CCBA6EA8634B08CC965D6D91849FE29E2F49FD9B8866E3E5148E9E0367BE15316C3337A41
31,653,571 UART: [art] PUB.Y = 89EC46491138264A228CF6CBD290076737F579B18015949D3D49CF2567CF9D75404CDB662A11F81E92E8AB756D3613A4
31,660,754 UART: [art] SIG.R = DC4EAE029115220F062CF521FCECB00782B4ED75EAB90EF8049E8A810F7D25E8616018901039C1741E14EEABB960779A
31,668,152 UART: [art] SIG.S = 2F1659E2F7321A7CB0E08247B2313F8E057FD1CCAA0DE55F47E65F5301400EA155BFA377F8A902DC9E9B8F9DBA766A56
32,973,734 UART: Caliptra RT
32,974,448 UART: [state] CFI Enabled
33,092,320 UART: [rt] RT listening for mailbox commands...
33,094,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,879 UART: [rt]cmd =0x46504c54, len=4
33,125,628 >>> mbox cmd response data (8 bytes)
33,126,515 UART: [rt] FIPS self test
33,127,461 UART: [kat] ++
33,127,917 UART: [kat] sha1
33,132,378 UART: Fatal Error: 0x90060002
33,167,740 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,311,757 >>> mbox cmd response: failed
33,312,399 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,456,294 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
10,596,370 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,550,394 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,131 UART:
192,503 UART: Running Caliptra ROM ...
193,630 UART:
193,771 UART: [state] CFI Enabled
262,894 UART: [state] LifecycleState = Unprovisioned
264,747 UART: [state] DebugLocked = No
267,138 UART: [state] WD Timer not started. Device not locked for debugging
271,150 UART: [kat] SHA2-256
450,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,820 UART: [kat] ++
462,353 UART: [kat] sha1
473,525 UART: [kat] SHA2-256
476,533 UART: [kat] SHA2-384
482,379 UART: [kat] SHA2-512-ACC
485,389 UART: [kat] ECC-384
2,948,385 UART: [kat] HMAC-384Kdf
2,971,855 UART: [kat] LMS
3,501,270 UART: [kat] --
3,507,334 UART: [cold-reset] ++
3,508,275 UART: [fht] FHT @ 0x50003400
3,519,478 UART: [idev] ++
3,520,043 UART: [idev] CDI.KEYID = 6
3,520,950 UART: [idev] SUBJECT.KEYID = 7
3,522,217 UART: [idev] UDS.KEYID = 0
3,523,141 ready_for_fw is high
3,523,347 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,935 UART: [idev] Erasing UDS.KEYID = 0
6,026,773 UART: [idev] Sha1 KeyId Algorithm
6,050,440 UART: [idev] --
6,054,633 UART: [ldev] ++
6,055,215 UART: [ldev] CDI.KEYID = 6
6,056,126 UART: [ldev] SUBJECT.KEYID = 5
6,057,289 UART: [ldev] AUTHORITY.KEYID = 7
6,058,578 UART: [ldev] FE.KEYID = 1
6,101,577 UART: [ldev] Erasing FE.KEYID = 1
8,603,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,454 UART: [ldev] --
10,415,292 UART: [fwproc] Wait for Commands...
10,417,067 UART: [fwproc] Recv command 0x46574c44
10,419,116 UART: [fwproc] Recv'd Img size: 114940 bytes
13,825,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,530 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,343 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,287,930 >>> mbox cmd response: success
14,292,077 UART: [afmc] ++
14,292,670 UART: [afmc] CDI.KEYID = 6
14,293,559 UART: [afmc] SUBJECT.KEYID = 7
14,294,775 UART: [afmc] AUTHORITY.KEYID = 5
16,829,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,029 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,852 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,735 UART: [afmc] --
18,630,416 UART: [cold-reset] --
18,633,364 UART: [state] Locking Datavault
18,636,996 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,695 UART: [state] Locking ICCM
18,641,390 UART: [exit] Launching FMC @ 0x40000130
18,649,839 UART:
18,650,073 UART: Running Caliptra FMC ...
18,651,179 UART:
18,651,336 UART: [state] CFI Enabled
18,710,251 UART: [fht] FMC Alias Private Key: 7
20,474,403 UART: [art] Extend RT PCRs Done
20,475,628 UART: [art] Lock RT PCRs Done
20,477,572 UART: [art] Populate DV Done
20,482,663 UART: [fht] FMC Alias Private Key: 7
20,484,311 UART: [art] Derive CDI
20,485,050 UART: [art] Store in in slot 0x4
20,542,959 UART: [art] Derive Key Pair
20,544,001 UART: [art] Store priv key in slot 0x5
23,006,888 UART: [art] Derive Key Pair - Done
23,020,063 UART: [art] Signing Cert with AUTHO
23,021,382 UART: RITY.KEYID = 7
24,733,287 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,788 UART: [art] PUB.X = 370E92C3FBEBB6850EF47BE894B3D2B748394313FE4A4EC5F21F62032F0AFD45259244FC9371DF40AC93BD81556756A2
24,742,040 UART: [art] PUB.Y = F06E16D96B7C33DB07BFC27F6D8EE081258C4CEEE613B9CD60F80AFE6E12F6F797CD14FFCF2C74F27ACA246EE58AE752
24,749,389 UART: [art] SIG.R = 25AA83E5ACFB52AAFE31ECE4C212A29029D0D6A508B6540EF2F0C3BCD9E9E5AAE3148D2B017D89CEFC426E48D6E0F997
24,756,789 UART: [art] SIG.S = 17BF9421C4C8570DAA2406B22AFEC58545656DF1D507CB0726D07D29CF2189855611902C0858AE9263EFAED8D0573681
25,735,702 UART: Caliptra RT
25,736,412 UART: [state] CFI Enabled
25,902,550 UART: [rt] RT listening for mailbox commands...
25,904,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,111 UART: [rt]cmd =0x46504c54, len=4
25,935,803 >>> mbox cmd response data (8 bytes)
25,937,094 UART: [rt] FIPS self test
25,938,042 UART: [kat] ++
25,938,525 UART: [kat] sha1
25,942,713 UART: Fatal Error: 0x90060002
25,978,038 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,122,276 >>> mbox cmd response: failed
26,122,941 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,267,282 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,107 UART:
190,394 UART: Running Caliptra ROM ...
191,520 UART:
191,673 UART: [state] CFI Enabled
256,325 UART: [state] LifecycleState = Unprovisioned
258,150 UART: [state] DebugLocked = No
259,716 UART: [state] WD Timer not started. Device not locked for debugging
263,023 UART: [kat] SHA2-256
442,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
453,743 UART: [kat] ++
454,186 UART: [kat] sha1
465,444 UART: [kat] SHA2-256
468,447 UART: [kat] SHA2-384
475,560 UART: [kat] SHA2-512-ACC
478,544 UART: [kat] ECC-384
2,937,910 UART: [kat] HMAC-384Kdf
2,962,563 UART: [kat] LMS
3,492,020 UART: [kat] --
3,496,140 UART: [cold-reset] ++
3,497,428 UART: [fht] FHT @ 0x50003400
3,509,597 UART: [idev] ++
3,510,164 UART: [idev] CDI.KEYID = 6
3,511,078 UART: [idev] SUBJECT.KEYID = 7
3,512,237 UART: [idev] UDS.KEYID = 0
3,513,854 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,658,434 UART: [idev] Erasing UDS.KEYID = 0
6,017,800 UART: [idev] Sha1 KeyId Algorithm
6,040,744 UART: [idev] --
6,044,855 UART: [ldev] ++
6,045,429 UART: [ldev] CDI.KEYID = 6
6,046,344 UART: [ldev] SUBJECT.KEYID = 5
6,047,506 UART: [ldev] AUTHORITY.KEYID = 7
6,048,738 UART: [ldev] FE.KEYID = 1
6,090,765 UART: [ldev] Erasing FE.KEYID = 1
8,596,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,723 UART: [ldev] --
10,404,509 UART: [fwproc] Wait for Commands...
10,406,444 UART: [fwproc] Recv command 0x46574c44
10,408,542 UART: [fwproc] Recv'd Img size: 114940 bytes
13,813,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,427 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,276,764 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,360,012 ready_for_fw is high
3,360,494 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,065,327 >>> mbox cmd response: success
18,342,613 UART:
18,343,000 UART: Running Caliptra FMC ...
18,344,144 UART:
18,344,298 UART: [state] CFI Enabled
18,411,060 UART: [fht] FMC Alias Private Key: 7
20,175,549 UART: [art] Extend RT PCRs Done
20,176,776 UART: [art] Lock RT PCRs Done
20,178,656 UART: [art] Populate DV Done
20,183,807 UART: [fht] FMC Alias Private Key: 7
20,185,294 UART: [art] Derive CDI
20,186,422 UART: [art] Store in in slot 0x4
20,243,258 UART: [art] Derive Key Pair
20,244,264 UART: [art] Store priv key in slot 0x5
22,706,936 UART: [art] Derive Key Pair - Done
22,720,039 UART: [art] Signing Cert with AUTHO
22,721,346 UART: RITY.KEYID = 7
24,432,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,750 UART: [art] PUB.X = C749382F468C77B16E2E10E0B36E055B4044AC2D9776F74E125445B9A4447DDF26D40893F8CC967720C73139F76E3665
24,440,978 UART: [art] PUB.Y = 36A3E7FAAF75F4B1ABCC20DC78B6B52FFC2CF507E60C5EFD9C10AE9CFBA12BF06B74227BED6DD93770EC027879709E03
24,448,275 UART: [art] SIG.R = 50E72C765BFCFD7F6B02EE73DF4E7E5D5878F57AA4506C63EF9787279330D33AB3E386215AFE154F9A4973D9D20C267D
24,455,680 UART: [art] SIG.S = D09929C760980E72082334421FB6E7E200903F0DBC7BBB4404B94709C4DEAFD7ED7367622322F3F1E372ADB47E4A9D58
25,434,740 UART: Caliptra RT
25,435,443 UART: [state] CFI Enabled
25,599,031 UART: [rt] RT listening for mailbox commands...
25,600,911 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,630,601 UART: [rt]cmd =0x46504c54, len=4
25,632,219 >>> mbox cmd response data (8 bytes)
25,633,377 UART: [rt] FIPS self test
25,634,330 UART: [kat] ++
25,634,783 UART: [kat] sha1
25,639,183 UART: Fatal Error: 0x90060002
25,674,385 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,818,804 >>> mbox cmd response: failed
25,819,413 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,963,715 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,355,875 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,060,433 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,512 UART:
192,894 UART: Running Caliptra ROM ...
194,007 UART:
603,780 UART: [state] CFI Enabled
617,658 UART: [state] LifecycleState = Unprovisioned
619,495 UART: [state] DebugLocked = No
621,449 UART: [state] WD Timer not started. Device not locked for debugging
624,427 UART: [kat] SHA2-256
803,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,084 UART: [kat] ++
815,537 UART: [kat] sha1
826,764 UART: [kat] SHA2-256
829,783 UART: [kat] SHA2-384
837,407 UART: [kat] SHA2-512-ACC
840,420 UART: [kat] ECC-384
3,282,931 UART: [kat] HMAC-384Kdf
3,296,240 UART: [kat] LMS
3,825,761 UART: [kat] --
3,830,349 UART: [cold-reset] ++
3,831,670 UART: [fht] FHT @ 0x50003400
3,843,651 UART: [idev] ++
3,844,222 UART: [idev] CDI.KEYID = 6
3,845,147 UART: [idev] SUBJECT.KEYID = 7
3,846,327 UART: [idev] UDS.KEYID = 0
3,847,333 ready_for_fw is high
3,847,560 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,991,935 UART: [idev] Erasing UDS.KEYID = 0
6,313,501 UART: [idev] Sha1 KeyId Algorithm
6,335,650 UART: [idev] --
6,338,296 UART: [ldev] ++
6,338,871 UART: [ldev] CDI.KEYID = 6
6,339,788 UART: [ldev] SUBJECT.KEYID = 5
6,340,946 UART: [ldev] AUTHORITY.KEYID = 7
6,342,179 UART: [ldev] FE.KEYID = 1
6,354,876 UART: [ldev] Erasing FE.KEYID = 1
8,828,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,347 UART: [ldev] --
10,619,577 UART: [fwproc] Wait for Commands...
10,621,680 UART: [fwproc] Recv command 0x46574c44
10,623,778 UART: [fwproc] Recv'd Img size: 114940 bytes
14,038,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,263 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,499,492 >>> mbox cmd response: success
14,503,109 UART: [afmc] ++
14,503,697 UART: [afmc] CDI.KEYID = 6
14,504,609 UART: [afmc] SUBJECT.KEYID = 7
14,505,792 UART: [afmc] AUTHORITY.KEYID = 5
17,006,623 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,909 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,488 UART: [afmc] --
18,804,140 UART: [cold-reset] --
18,806,649 UART: [state] Locking Datavault
18,812,059 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,715 UART: [state] Locking ICCM
18,816,031 UART: [exit] Launching FMC @ 0x40000130
18,824,483 UART:
18,824,718 UART: Running Caliptra FMC ...
18,825,821 UART:
18,826,002 UART: [state] CFI Enabled
18,834,278 UART: [fht] FMC Alias Private Key: 7
20,591,635 UART: [art] Extend RT PCRs Done
20,592,854 UART: [art] Lock RT PCRs Done
20,594,809 UART: [art] Populate DV Done
20,600,178 UART: [fht] FMC Alias Private Key: 7
20,601,890 UART: [art] Derive CDI
20,602,627 UART: [art] Store in in slot 0x4
20,644,904 UART: [art] Derive Key Pair
20,645,942 UART: [art] Store priv key in slot 0x5
23,072,567 UART: [art] Derive Key Pair - Done
23,085,640 UART: [art] Signing Cert with AUTHO
23,086,947 UART: RITY.KEYID = 7
24,792,351 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,858 UART: [art] PUB.X = 08DD14E2A8FC260CA21C2DCC5BFA57EFDB28E8CDB74724F51614207F546399D038C1567217062F476C139658C32E7C69
24,801,111 UART: [art] PUB.Y = 17B943FD8A3107AF799DCFF53986C12587315F95203305B78B5E00645F431E42E2D0EDB672A959115B76868BE8226DEA
24,808,308 UART: [art] SIG.R = D1714BCB79C4BEBE5B8017317FD909620451E02FCCD0B27F2F07EF5AC23C7DEB88588EFCB2F7A8D799D92BD33D02C9AB
24,815,710 UART: [art] SIG.S = BD2B19A43883F8934B5961E222BADF0C722B64FA3265D3AE00D9E0631E14F442E908803AC63CF066E88E3CE576CF5C5E
25,794,927 UART: Caliptra RT
25,795,628 UART: [state] CFI Enabled
25,912,320 UART: [rt] RT listening for mailbox commands...
25,914,169 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,944,076 UART: [rt]cmd =0x46504c54, len=4
25,945,769 >>> mbox cmd response data (8 bytes)
25,947,003 UART: [rt] FIPS self test
25,947,954 UART: [kat] ++
25,948,407 UART: [kat] sha1
25,952,807 UART: Fatal Error: 0x90060002
25,988,179 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,132,553 >>> mbox cmd response: failed
26,133,237 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,277,716 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,022 UART:
190,319 UART: Running Caliptra ROM ...
191,342 UART:
14,245,475 UART: [state] CFI Enabled
14,260,347 UART: [state] LifecycleState = Unprovisioned
14,262,238 UART: [state] DebugLocked = No
14,263,794 UART: [state] WD Timer not started. Device not locked for debugging
14,267,158 UART: [kat] SHA2-256
14,446,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,457,876 UART: [kat] ++
14,458,416 UART: [kat] sha1
14,470,498 UART: [kat] SHA2-256
14,473,519 UART: [kat] SHA2-384
14,478,366 UART: [kat] SHA2-512-ACC
14,481,327 UART: [kat] ECC-384
16,924,710 UART: [kat] HMAC-384Kdf
16,938,557 UART: [kat] LMS
17,468,071 UART: [kat] --
17,472,224 UART: [cold-reset] ++
17,474,798 UART: [fht] FHT @ 0x50003400
17,485,824 UART: [idev] ++
17,486,387 UART: [idev] CDI.KEYID = 6
17,487,270 UART: [idev] SUBJECT.KEYID = 7
17,488,478 UART: [idev] UDS.KEYID = 0
17,490,100 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,634,399 UART: [idev] Erasing UDS.KEYID = 0
19,958,345 UART: [idev] Sha1 KeyId Algorithm
19,981,028 UART: [idev] --
19,984,052 UART: [ldev] ++
19,984,623 UART: [ldev] CDI.KEYID = 6
19,985,610 UART: [ldev] SUBJECT.KEYID = 5
19,986,770 UART: [ldev] AUTHORITY.KEYID = 7
19,987,998 UART: [ldev] FE.KEYID = 1
19,999,714 UART: [ldev] Erasing FE.KEYID = 1
22,469,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,188,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,204,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,220,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,236,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,255,746 UART: [ldev] --
24,260,263 UART: [fwproc] Wait for Commands...
24,262,793 UART: [fwproc] Recv command 0x46574c44
24,264,838 UART: [fwproc] Recv'd Img size: 114940 bytes
27,670,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,749,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,818,634 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,138,059 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
3,697,303 ready_for_fw is high
3,697,900 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,301,119 >>> mbox cmd response: success
18,553,282 UART:
18,553,668 UART: Running Caliptra FMC ...
18,554,823 UART:
18,554,978 UART: [state] CFI Enabled
18,563,134 UART: [fht] FMC Alias Private Key: 7
20,320,093 UART: [art] Extend RT PCRs Done
20,321,319 UART: [art] Lock RT PCRs Done
20,322,950 UART: [art] Populate DV Done
20,328,256 UART: [fht] FMC Alias Private Key: 7
20,329,906 UART: [art] Derive CDI
20,330,726 UART: [art] Store in in slot 0x4
20,373,438 UART: [art] Derive Key Pair
20,374,481 UART: [art] Store priv key in slot 0x5
22,801,064 UART: [art] Derive Key Pair - Done
22,813,879 UART: [art] Signing Cert with AUTHO
22,815,188 UART: RITY.KEYID = 7
24,520,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,521,867 UART: [art] PUB.X = 9F4F15E8FED6568FDA5BE8D048ED2BBEED2741AFA606D86351ED12FA2E8D455C52CF3EA89389973235C4736388179BC8
24,529,126 UART: [art] PUB.Y = 5A5F50B5EFF58361032264DE3A8247A76A1D6B114BA52EABB00EB6D9A78F5BD072D5BC46D2D93125FEF98E28F1BE79C4
24,536,401 UART: [art] SIG.R = 2B05D40F85ABE85D380A05E1B4CCEABAC66190376112D8196BADDB44440EE166B3B809B74DBA7C12CF6F64A095117BE0
24,543,820 UART: [art] SIG.S = C5F25B534D75E11F6E7D760E995621FAE8FA09BFF9A242A0A8E0E4F49B04E99DE472B250F0E17EDD0D556C69233D1782
25,522,052 UART: Caliptra RT
25,522,766 UART: [state] CFI Enabled
25,639,561 UART: [rt] RT listening for mailbox commands...
25,641,412 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,671,251 UART: [rt]cmd =0x46504c54, len=4
25,672,755 >>> mbox cmd response data (8 bytes)
25,673,764 UART: [rt] FIPS self test
25,674,711 UART: [kat] ++
25,675,166 UART: [kat] sha1
25,679,263 UART: Fatal Error: 0x90060002
25,714,470 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,858,821 >>> mbox cmd response: failed
25,859,447 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,003,750 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
17,617,351 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,212,971 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,112 UART:
192,487 UART: Running Caliptra ROM ...
193,629 UART:
193,779 UART: [state] CFI Enabled
262,781 UART: [state] LifecycleState = Unprovisioned
265,140 UART: [state] DebugLocked = No
267,383 UART: [state] WD Timer not started. Device not locked for debugging
272,071 UART: [kat] SHA2-256
461,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,716 UART: [kat] ++
473,194 UART: [kat] sha1
484,146 UART: [kat] SHA2-256
487,183 UART: [kat] SHA2-384
491,970 UART: [kat] SHA2-512-ACC
494,566 UART: [kat] ECC-384
2,949,278 UART: [kat] HMAC-384Kdf
2,973,182 UART: [kat] LMS
3,504,951 UART: [kat] --
3,509,740 UART: [cold-reset] ++
3,510,970 UART: [fht] FHT @ 0x50003400
3,522,737 UART: [idev] ++
3,523,459 UART: [idev] CDI.KEYID = 6
3,524,373 UART: [idev] SUBJECT.KEYID = 7
3,525,549 UART: [idev] UDS.KEYID = 0
3,526,474 ready_for_fw is high
3,526,677 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,268 UART: [idev] Erasing UDS.KEYID = 0
6,026,352 UART: [idev] Sha1 KeyId Algorithm
6,049,959 UART: [idev] --
6,056,320 UART: [ldev] ++
6,057,025 UART: [ldev] CDI.KEYID = 6
6,057,943 UART: [ldev] SUBJECT.KEYID = 5
6,059,116 UART: [ldev] AUTHORITY.KEYID = 7
6,060,356 UART: [ldev] FE.KEYID = 1
6,102,921 UART: [ldev] Erasing FE.KEYID = 1
8,611,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,870 UART: [ldev] --
10,418,753 UART: [fwproc] Wait for Commands...
10,421,343 UART: [fwproc] Recv command 0x46574c44
10,423,663 UART: [fwproc] Recv'd Img size: 114940 bytes
13,879,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,338 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,621,223 >>> mbox cmd response: success
14,624,467 UART: [afmc] ++
14,625,240 UART: [afmc] CDI.KEYID = 6
14,626,329 UART: [afmc] SUBJECT.KEYID = 7
14,627,829 UART: [afmc] AUTHORITY.KEYID = 5
17,154,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,879,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,963 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,896,135 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,911,306 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,926,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,701 UART: [afmc] --
18,952,408 UART: [cold-reset] --
18,956,732 UART: [state] Locking Datavault
18,962,468 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,657 UART: [state] Locking ICCM
18,967,508 UART: [exit] Launching FMC @ 0x40000130
18,976,172 UART:
18,976,414 UART: Running Caliptra FMC ...
18,977,518 UART:
18,977,680 UART: [state] CFI Enabled
19,035,251 UART: [fht] FMC Alias Private Key: 7
20,799,234 UART: [art] Extend RT PCRs Done
20,800,466 UART: [art] Lock RT PCRs Done
20,801,931 UART: [art] Populate DV Done
20,807,450 UART: [fht] FMC Alias Private Key: 7
20,809,094 UART: [art] Derive CDI
20,809,915 UART: [art] Store in in slot 0x4
20,868,250 UART: [art] Derive Key Pair
20,869,307 UART: [art] Store priv key in slot 0x5
23,331,991 UART: [art] Derive Key Pair - Done
23,345,141 UART: [art] Signing Cert with AUTHO
23,346,444 UART: RITY.KEYID = 7
25,057,987 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,501 UART: [art] PUB.X = A9F2D23754AFDD55ACEC7BF2AA0EB03133E4092EDA54E0671CCD9B4EF60D6EFCAF032B418A0CA8C54DF7855DBC5CB2B7
25,066,835 UART: [art] PUB.Y = 301A13CAECFCB48603FF31F9F150706565DA801FC00E2D5B609C127BA20AF003BD5B8B1871AE2306D6D55ED1584F7BCD
25,074,084 UART: [art] SIG.R = A293D7B339B29DECDABAF9B9AD5B18EA1E0FD96E47EEA6FD8E128B37DB21F91BED3EDFF270AA468D4B10E21151B7A88A
25,081,523 UART: [art] SIG.S = 5D47F1A45ED038D1F8CD69027DEAFBCCBF27A7BE24D8DB7FF1A2BB4F2B12085BED08EDC04F380793E86CACF42E7E1940
26,059,972 UART: Caliptra RT
26,060,683 UART: [state] CFI Enabled
26,227,663 UART: [rt] RT listening for mailbox commands...
26,229,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,259,386 UART: [rt]cmd =0x46504c54, len=4
26,260,965 >>> mbox cmd response data (8 bytes)
26,262,363 UART: [rt] FIPS self test
26,263,321 UART: [kat] ++
26,263,769 UART: [kat] sha1
26,268,170 UART: Fatal Error: 0x90060002
26,303,584 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,447,948 >>> mbox cmd response: failed
26,448,536 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,592,882 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,140 UART:
190,427 UART: Running Caliptra ROM ...
191,452 UART:
191,592 UART: [state] CFI Enabled
257,209 UART: [state] LifecycleState = Unprovisioned
259,621 UART: [state] DebugLocked = No
261,943 UART: [state] WD Timer not started. Device not locked for debugging
266,092 UART: [kat] SHA2-256
455,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,724 UART: [kat] ++
467,168 UART: [kat] sha1
478,910 UART: [kat] SHA2-256
481,962 UART: [kat] SHA2-384
487,411 UART: [kat] SHA2-512-ACC
490,024 UART: [kat] ECC-384
2,940,863 UART: [kat] HMAC-384Kdf
2,964,185 UART: [kat] LMS
3,495,944 UART: [kat] --
3,501,630 UART: [cold-reset] ++
3,502,595 UART: [fht] FHT @ 0x50003400
3,514,715 UART: [idev] ++
3,515,390 UART: [idev] CDI.KEYID = 6
3,516,472 UART: [idev] SUBJECT.KEYID = 7
3,517,611 UART: [idev] UDS.KEYID = 0
3,519,127 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,663,470 UART: [idev] Erasing UDS.KEYID = 0
6,023,098 UART: [idev] Sha1 KeyId Algorithm
6,046,174 UART: [idev] --
6,050,173 UART: [ldev] ++
6,050,857 UART: [ldev] CDI.KEYID = 6
6,051,770 UART: [ldev] SUBJECT.KEYID = 5
6,052,991 UART: [ldev] AUTHORITY.KEYID = 7
6,054,172 UART: [ldev] FE.KEYID = 1
6,095,184 UART: [ldev] Erasing FE.KEYID = 1
8,600,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,770 UART: [ldev] --
10,411,585 UART: [fwproc] Wait for Commands...
10,413,307 UART: [fwproc] Recv command 0x46574c44
10,415,569 UART: [fwproc] Recv'd Img size: 114940 bytes
13,868,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,780 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,612,626 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,441,622 ready_for_fw is high
3,442,058 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,748,701 >>> mbox cmd response: success
19,043,780 UART:
19,044,291 UART: Running Caliptra FMC ...
19,045,417 UART:
19,045,577 UART: [state] CFI Enabled
19,114,092 UART: [fht] FMC Alias Private Key: 7
20,878,565 UART: [art] Extend RT PCRs Done
20,879,793 UART: [art] Lock RT PCRs Done
20,881,392 UART: [art] Populate DV Done
20,886,867 UART: [fht] FMC Alias Private Key: 7
20,888,358 UART: [art] Derive CDI
20,889,146 UART: [art] Store in in slot 0x4
20,946,148 UART: [art] Derive Key Pair
20,947,192 UART: [art] Store priv key in slot 0x5
23,410,458 UART: [art] Derive Key Pair - Done
23,423,459 UART: [art] Signing Cert with AUTHO
23,424,765 UART: RITY.KEYID = 7
25,135,438 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,950 UART: [art] PUB.X = D418C9CA93D4ABC5F3E7F0A799B96BA7944D9FF7F5A5B98A970B4DA5C38717661D5D914C00A1CC870CCACBBA8DEF8362
25,144,221 UART: [art] PUB.Y = 25BE42D85A69FB071B21EFD0D3993E1A1FB6FAB174FED190A2986B6A6F336E788DEF07C309F5184BC1705D8FDB41FD2E
25,151,478 UART: [art] SIG.R = 527B8953E46A56F4D5F2D5387E08D6E513786A347F2118779922D88375CA68FAA6122DBFAA652E048FC3DB58BDD47058
25,158,878 UART: [art] SIG.S = D2C1B329DE878750A15104C8319DD5312BB5ED609696F4A9584741AEF8ED6C566AB87015FC33A98B7AB233DC6B9A2FC4
26,138,406 UART: Caliptra RT
26,139,122 UART: [state] CFI Enabled
26,304,294 UART: [rt] RT listening for mailbox commands...
26,306,158 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,335,630 UART: [rt]cmd =0x46504c54, len=4
26,337,157 >>> mbox cmd response data (8 bytes)
26,338,057 UART: [rt] FIPS self test
26,339,011 UART: [kat] ++
26,339,466 UART: [kat] sha1
26,343,629 UART: Fatal Error: 0x90060002
26,378,777 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,523,197 >>> mbox cmd response: failed
26,523,852 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,668,139 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,431,437 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,726,393 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,500 UART:
192,858 UART: Running Caliptra ROM ...
194,005 UART:
603,531 UART: [state] CFI Enabled
619,149 UART: [state] LifecycleState = Unprovisioned
621,559 UART: [state] DebugLocked = No
623,383 UART: [state] WD Timer not started. Device not locked for debugging
628,349 UART: [kat] SHA2-256
818,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,030 UART: [kat] ++
829,582 UART: [kat] sha1
840,249 UART: [kat] SHA2-256
843,260 UART: [kat] SHA2-384
849,912 UART: [kat] SHA2-512-ACC
852,538 UART: [kat] ECC-384
3,294,897 UART: [kat] HMAC-384Kdf
3,308,188 UART: [kat] LMS
3,840,011 UART: [kat] --
3,843,162 UART: [cold-reset] ++
3,845,472 UART: [fht] FHT @ 0x50003400
3,856,739 UART: [idev] ++
3,857,448 UART: [idev] CDI.KEYID = 6
3,858,354 UART: [idev] SUBJECT.KEYID = 7
3,859,603 UART: [idev] UDS.KEYID = 0
3,860,533 ready_for_fw is high
3,860,735 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,005,538 UART: [idev] Erasing UDS.KEYID = 0
6,334,009 UART: [idev] Sha1 KeyId Algorithm
6,356,167 UART: [idev] --
6,361,400 UART: [ldev] ++
6,362,083 UART: [ldev] CDI.KEYID = 6
6,362,998 UART: [ldev] SUBJECT.KEYID = 5
6,364,212 UART: [ldev] AUTHORITY.KEYID = 7
6,365,387 UART: [ldev] FE.KEYID = 1
6,376,024 UART: [ldev] Erasing FE.KEYID = 1
8,852,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,292 UART: [ldev] --
10,642,500 UART: [fwproc] Wait for Commands...
10,643,961 UART: [fwproc] Recv command 0x46574c44
10,645,956 UART: [fwproc] Recv'd Img size: 114940 bytes
14,096,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,250 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,829,989 >>> mbox cmd response: success
14,833,342 UART: [afmc] ++
14,834,045 UART: [afmc] CDI.KEYID = 6
14,835,280 UART: [afmc] SUBJECT.KEYID = 7
14,836,727 UART: [afmc] AUTHORITY.KEYID = 5
17,344,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,760 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,958 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,076 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,095 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,065 UART: [afmc] --
19,142,212 UART: [cold-reset] --
19,145,532 UART: [state] Locking Datavault
19,151,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,671 UART: [state] Locking ICCM
19,155,817 UART: [exit] Launching FMC @ 0x40000130
19,164,491 UART:
19,164,729 UART: Running Caliptra FMC ...
19,165,828 UART:
19,166,002 UART: [state] CFI Enabled
19,174,221 UART: [fht] FMC Alias Private Key: 7
20,931,559 UART: [art] Extend RT PCRs Done
20,932,782 UART: [art] Lock RT PCRs Done
20,934,438 UART: [art] Populate DV Done
20,939,855 UART: [fht] FMC Alias Private Key: 7
20,941,348 UART: [art] Derive CDI
20,942,112 UART: [art] Store in in slot 0x4
20,984,381 UART: [art] Derive Key Pair
20,985,383 UART: [art] Store priv key in slot 0x5
23,411,788 UART: [art] Derive Key Pair - Done
23,425,002 UART: [art] Signing Cert with AUTHO
23,426,304 UART: RITY.KEYID = 7
25,132,009 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,528 UART: [art] PUB.X = 68A5399AC90165AB96898FEA44E17A753A4F6986F7D950437FAFBA3FFA9EC4D89AA289A91B653ED175EB78A06CCEACB5
25,140,831 UART: [art] PUB.Y = 1AA6DD1978AA5B207E310A99B1C7765A54EA78B8147EB6C7771D467CC46BD1279C244AD8831B03E72407ACB30AB127F9
25,148,081 UART: [art] SIG.R = 7135F2926146A0097055D845A0325FCCE7ACFB5E70D7B78C3DF6CB5607CCC17601B58E7066ECB5B39E7FFA5EE821A0D0
25,155,484 UART: [art] SIG.S = 5FCC4EA4ADE21BB1539034678AEF01C49B17EED2C5962E7ED275FCEBDCCD0E23AECC7EE8802E4D430195FB1DEE2B63FA
26,134,331 UART: Caliptra RT
26,135,022 UART: [state] CFI Enabled
26,251,971 UART: [rt] RT listening for mailbox commands...
26,253,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,283,596 UART: [rt]cmd =0x46504c54, len=4
26,285,164 >>> mbox cmd response data (8 bytes)
26,286,017 UART: [rt] FIPS self test
26,286,964 UART: [kat] ++
26,287,414 UART: [kat] sha1
26,291,691 UART: Fatal Error: 0x90060002
26,326,884 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,471,281 >>> mbox cmd response: failed
26,471,891 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,616,218 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,013 UART:
190,306 UART: Running Caliptra ROM ...
191,329 UART:
13,910,764 UART: [state] CFI Enabled
13,923,334 UART: [state] LifecycleState = Unprovisioned
13,925,704 UART: [state] DebugLocked = No
13,928,231 UART: [state] WD Timer not started. Device not locked for debugging
13,933,663 UART: [kat] SHA2-256
14,123,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,134,360 UART: [kat] ++
14,134,874 UART: [kat] sha1
14,145,813 UART: [kat] SHA2-256
14,148,836 UART: [kat] SHA2-384
14,154,773 UART: [kat] SHA2-512-ACC
14,157,394 UART: [kat] ECC-384
16,599,077 UART: [kat] HMAC-384Kdf
16,612,169 UART: [kat] LMS
17,143,986 UART: [kat] --
17,149,991 UART: [cold-reset] ++
17,152,249 UART: [fht] FHT @ 0x50003400
17,164,735 UART: [idev] ++
17,165,413 UART: [idev] CDI.KEYID = 6
17,166,376 UART: [idev] SUBJECT.KEYID = 7
17,167,586 UART: [idev] UDS.KEYID = 0
17,169,114 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,313,392 UART: [idev] Erasing UDS.KEYID = 0
19,649,967 UART: [idev] Sha1 KeyId Algorithm
19,672,323 UART: [idev] --
19,677,644 UART: [ldev] ++
19,678,337 UART: [ldev] CDI.KEYID = 6
19,679,268 UART: [ldev] SUBJECT.KEYID = 5
19,680,433 UART: [ldev] AUTHORITY.KEYID = 7
19,681,610 UART: [ldev] FE.KEYID = 1
19,691,284 UART: [ldev] Erasing FE.KEYID = 1
22,169,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,887,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,902,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,917,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,933,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,954,013 UART: [ldev] --
23,959,442 UART: [fwproc] Wait for Commands...
23,962,139 UART: [fwproc] Recv command 0x46574c44
23,964,455 UART: [fwproc] Recv'd Img size: 114940 bytes
27,416,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,487,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,603,767 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,150,592 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,763,842 ready_for_fw is high
3,764,513 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,984,103 >>> mbox cmd response: success
19,238,478 UART:
19,238,874 UART: Running Caliptra FMC ...
19,240,000 UART:
19,240,160 UART: [state] CFI Enabled
19,248,007 UART: [fht] FMC Alias Private Key: 7
21,004,701 UART: [art] Extend RT PCRs Done
21,005,936 UART: [art] Lock RT PCRs Done
21,007,546 UART: [art] Populate DV Done
21,012,942 UART: [fht] FMC Alias Private Key: 7
21,014,545 UART: [art] Derive CDI
21,015,290 UART: [art] Store in in slot 0x4
21,057,727 UART: [art] Derive Key Pair
21,058,778 UART: [art] Store priv key in slot 0x5
23,485,839 UART: [art] Derive Key Pair - Done
23,499,068 UART: [art] Signing Cert with AUTHO
23,500,381 UART: RITY.KEYID = 7
25,205,370 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,877 UART: [art] PUB.X = 9B6B998D82E2A370B85996414AC588F9C972370F01A677B4C2662C04E0C2A70645529441D49AADDA81C7147DAD134B05
25,214,074 UART: [art] PUB.Y = 07E2E85D25ADA39128501D4B50B0D888B8F4E49176D655B649C9B7E647C16B600F08691985CCF9D4459686220FE627BC
25,221,332 UART: [art] SIG.R = 0C4C49FA7DEA885E768BC6A62D327E807D506BFFA2808FB15ADCFD413E0C40861AAB22DA259CE0A01CF556958CE1C918
25,228,721 UART: [art] SIG.S = 2CD7B0FD0821689F8B5586D415BE0C4D04BAC19F64BF4748B8B2B2F904A458B7835F243A269E44F14F68195CDE7D74AA
26,208,309 UART: Caliptra RT
26,209,025 UART: [state] CFI Enabled
26,325,880 UART: [rt] RT listening for mailbox commands...
26,327,767 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,171 UART: [rt]cmd =0x46504c54, len=4
26,358,702 >>> mbox cmd response data (8 bytes)
26,359,994 UART: [rt] FIPS self test
26,360,938 UART: [kat] ++
26,361,391 UART: [kat] sha1
26,365,738 UART: Fatal Error: 0x90060002
26,400,943 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,545,292 >>> mbox cmd response: failed
26,545,935 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,690,211 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
16,983,100 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,205,402 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,278 UART: [kat] HMAC-384Kdf
907,026 UART: [kat] LMS
1,475,222 UART: [kat] --
1,476,037 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,086 UART: [idev] ++
1,479,254 UART: [idev] CDI.KEYID = 6
1,479,614 UART: [idev] SUBJECT.KEYID = 7
1,480,038 UART: [idev] UDS.KEYID = 0
1,480,383 ready_for_fw is high
1,480,383 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,994 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,566 UART: [idev] --
1,514,685 UART: [ldev] ++
1,514,853 UART: [ldev] CDI.KEYID = 6
1,515,216 UART: [ldev] SUBJECT.KEYID = 5
1,515,642 UART: [ldev] AUTHORITY.KEYID = 7
1,516,105 UART: [ldev] FE.KEYID = 1
1,521,223 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,214 UART: [ldev] --
1,585,681 UART: [fwproc] Waiting for Commands...
1,586,328 UART: [fwproc] Received command 0x46574c44
1,587,119 UART: [fwproc] Received Image of size 114940 bytes
2,892,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,760 >>> mbox cmd response: success
3,087,004 UART: [afmc] ++
3,087,172 UART: [afmc] CDI.KEYID = 6
3,087,534 UART: [afmc] SUBJECT.KEYID = 7
3,087,959 UART: [afmc] AUTHORITY.KEYID = 5
3,123,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,682 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,190 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,075 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,765 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,518 UART: [afmc] --
3,166,482 UART: [cold-reset] --
3,167,282 UART: [state] Locking Datavault
3,168,327 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,931 UART: [state] Locking ICCM
3,169,393 UART: [exit] Launching FMC @ 0x40000130
3,174,722 UART:
3,174,738 UART: Running Caliptra FMC ...
3,175,146 UART:
3,175,200 UART: [state] CFI Enabled
3,185,637 UART: [fht] FMC Alias Private Key: 7
3,293,194 UART: [art] Extend RT PCRs Done
3,293,622 UART: [art] Lock RT PCRs Done
3,295,394 UART: [art] Populate DV Done
3,303,741 UART: [fht] FMC Alias Private Key: 7
3,304,685 UART: [art] Derive CDI
3,304,965 UART: [art] Store in in slot 0x4
3,390,756 UART: [art] Derive Key Pair
3,391,116 UART: [art] Store priv key in slot 0x5
3,404,350 UART: [art] Derive Key Pair - Done
3,418,828 UART: [art] Signing Cert with AUTHO
3,419,308 UART: RITY.KEYID = 7
3,434,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,427 UART: [art] PUB.X = A86BA47659738D43F544418FDCF295E4A1E329B1FE21DFE5CB6A97FC524618EE967A797709D760B77A5A647D7C39C84E
3,442,200 UART: [art] PUB.Y = A89CE30F4581A2C2803A3EAFB2A37B234A21225F4578B4ECE2A1FCAA6AB5144BEB2B258E4A9A6C1D30837F568A4A83AE
3,449,165 UART: [art] SIG.R = 3431F395CC57D9A10026E992DBF362CC822B12AF576F5B5DDF6EAE7C56B52CFAF6813A5B4064A8B4278D72C5955918D6
3,455,921 UART: [art] SIG.S = 4EE05542C972A847843B1B3C2547BF647DA27502CEDE9385295ADE4BFD43F2B77977FF5448DA5EDCACE5DBCCEB3673BE
3,479,471 UART: Caliptra RT
3,479,724 UART: [state] CFI Enabled
3,587,076 UART: [rt] RT listening for mailbox commands...
3,587,739 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,700 UART: [rt]cmd =0x46504c54, len=4
3,618,862 >>> mbox cmd response data (8 bytes)
3,618,989 UART: [rt] FIPS self test
3,619,317 UART: [kat] ++
3,619,469 UART: [kat] sha1
3,623,960 UART: Fatal Error: 0x90060002
3,625,499 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,625,504 >>> mbox cmd response: failed
3,625,504 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,625,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,877 UART: [kat] SHA2-256
881,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,923 UART: [kat] ++
886,075 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,744 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,547 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,984 UART: [idev] --
1,513,949 UART: [ldev] ++
1,514,117 UART: [ldev] CDI.KEYID = 6
1,514,480 UART: [ldev] SUBJECT.KEYID = 5
1,514,906 UART: [ldev] AUTHORITY.KEYID = 7
1,515,369 UART: [ldev] FE.KEYID = 1
1,520,665 UART: [ldev] Erasing FE.KEYID = 1
1,545,748 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,648 UART: [ldev] --
1,585,093 UART: [fwproc] Waiting for Commands...
1,585,878 UART: [fwproc] Received command 0x46574c44
1,586,669 UART: [fwproc] Received Image of size 114940 bytes
2,891,345 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,813 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,584 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,475 ready_for_fw is high
1,362,475 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,972 >>> mbox cmd response: success
2,997,516 UART:
2,997,532 UART: Running Caliptra FMC ...
2,997,940 UART:
2,997,994 UART: [state] CFI Enabled
3,008,205 UART: [fht] FMC Alias Private Key: 7
3,116,460 UART: [art] Extend RT PCRs Done
3,116,888 UART: [art] Lock RT PCRs Done
3,118,268 UART: [art] Populate DV Done
3,126,371 UART: [fht] FMC Alias Private Key: 7
3,127,375 UART: [art] Derive CDI
3,127,655 UART: [art] Store in in slot 0x4
3,213,366 UART: [art] Derive Key Pair
3,213,726 UART: [art] Store priv key in slot 0x5
3,227,112 UART: [art] Derive Key Pair - Done
3,241,813 UART: [art] Signing Cert with AUTHO
3,242,293 UART: RITY.KEYID = 7
3,257,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,862 UART: [art] PUB.X = 820E49F5569A35218FC0FC23664E964F606D2C6FD1425DCDFDCA7AB0C6EE1A9A549EA7F285AD6DCC295BF61C1BC7DFC9
3,264,653 UART: [art] PUB.Y = EE6344AFCC86858028E88B2AC8430DB218B164F890202021F8BE23DC9A7020DABD619F510D32FDCDA5AF5AE68D1C6209
3,271,606 UART: [art] SIG.R = E5091E200FF384549BEE4AE12586073144260FCD2ADB872CCA8DEB757C0974CC84448DB9B93D7E861BEB6F51A1045638
3,278,364 UART: [art] SIG.S = CF2185C988359DD5D32CD9ADBCF46D5AFA7786A663BE0D21CA5CB22CC38ECC80897453EB206F5658F12CE0CC6BB1847C
3,302,878 UART: Caliptra RT
3,303,131 UART: [state] CFI Enabled
3,410,441 UART: [rt] RT listening for mailbox commands...
3,411,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,929 UART: [rt]cmd =0x46504c54, len=4
3,442,025 >>> mbox cmd response data (8 bytes)
3,442,382 UART: [rt] FIPS self test
3,442,710 UART: [kat] ++
3,442,862 UART: [kat] sha1
3,447,207 UART: Fatal Error: 0x90060002
3,448,746 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,448,751 >>> mbox cmd response: failed
3,448,751 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,448,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,847 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,640 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,659 UART: [kat] LMS
1,475,855 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,532 UART: [fht] Storing FHT @ 0x50003400
1,480,363 UART: [idev] ++
1,480,531 UART: [idev] CDI.KEYID = 6
1,480,891 UART: [idev] SUBJECT.KEYID = 7
1,481,315 UART: [idev] UDS.KEYID = 0
1,481,660 ready_for_fw is high
1,481,660 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,463 UART: [idev] Erasing UDS.KEYID = 0
1,506,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,529 UART: [idev] --
1,515,502 UART: [ldev] ++
1,515,670 UART: [ldev] CDI.KEYID = 6
1,516,033 UART: [ldev] SUBJECT.KEYID = 5
1,516,459 UART: [ldev] AUTHORITY.KEYID = 7
1,516,922 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,547,313 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,503 UART: [ldev] --
1,586,878 UART: [fwproc] Waiting for Commands...
1,587,579 UART: [fwproc] Received command 0x46574c44
1,588,370 UART: [fwproc] Received Image of size 114940 bytes
2,892,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,877 >>> mbox cmd response: success
3,087,107 UART: [afmc] ++
3,087,275 UART: [afmc] CDI.KEYID = 6
3,087,637 UART: [afmc] SUBJECT.KEYID = 7
3,088,062 UART: [afmc] AUTHORITY.KEYID = 5
3,123,249 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,511 UART: [afmc] --
3,166,477 UART: [cold-reset] --
3,167,355 UART: [state] Locking Datavault
3,168,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,352 UART: [state] Locking ICCM
3,169,990 UART: [exit] Launching FMC @ 0x40000130
3,175,319 UART:
3,175,335 UART: Running Caliptra FMC ...
3,175,743 UART:
3,175,886 UART: [state] CFI Enabled
3,186,585 UART: [fht] FMC Alias Private Key: 7
3,294,806 UART: [art] Extend RT PCRs Done
3,295,234 UART: [art] Lock RT PCRs Done
3,296,774 UART: [art] Populate DV Done
3,304,801 UART: [fht] FMC Alias Private Key: 7
3,305,823 UART: [art] Derive CDI
3,306,103 UART: [art] Store in in slot 0x4
3,391,924 UART: [art] Derive Key Pair
3,392,284 UART: [art] Store priv key in slot 0x5
3,405,868 UART: [art] Derive Key Pair - Done
3,420,360 UART: [art] Signing Cert with AUTHO
3,420,840 UART: RITY.KEYID = 7
3,436,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,805 UART: [art] PUB.X = D88FED8542B1D20EA647519A9E32B238FE834095A4521F636729EE0B1D0681EE90E667A4571E7CF0196862B1F0132BAA
3,443,566 UART: [art] PUB.Y = 9238651C67C23FA88594D9BC65A5B7B8F5EA25C099FA4B96093D75598455AE6F5EE0425C9310076B92EAB6FBA5DDA330
3,450,516 UART: [art] SIG.R = 82B1C5592D6DDEB8A01A6696119B5D5C5550FD8B3F2EE98114F601403BBD173EDFBB0D97C26F8CD98EDF85E20957A48F
3,457,291 UART: [art] SIG.S = A6AFC1B13DAA729118CCFC2D036B378B58F4E5A8E5321317DA396E95868CD9FC1729A01BC784807F3AEF266C065D1D4E
3,480,624 UART: Caliptra RT
3,480,969 UART: [state] CFI Enabled
3,588,611 UART: [rt] RT listening for mailbox commands...
3,589,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,013 UART: [rt]cmd =0x46504c54, len=4
3,620,117 >>> mbox cmd response data (8 bytes)
3,620,250 UART: [rt] FIPS self test
3,620,578 UART: [kat] ++
3,620,730 UART: [kat] sha1
3,625,115 UART: Fatal Error: 0x90060002
3,626,654 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,626,659 >>> mbox cmd response: failed
3,626,659 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,626,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,728 UART: [kat] SHA2-256
892,666 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
902,765 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,964 UART: [fht] Storing FHT @ 0x50003400
1,479,653 UART: [idev] ++
1,479,821 UART: [idev] CDI.KEYID = 6
1,480,181 UART: [idev] SUBJECT.KEYID = 7
1,480,605 UART: [idev] UDS.KEYID = 0
1,480,950 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,195 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,859 UART: [idev] --
1,514,924 UART: [ldev] ++
1,515,092 UART: [ldev] CDI.KEYID = 6
1,515,455 UART: [ldev] SUBJECT.KEYID = 5
1,515,881 UART: [ldev] AUTHORITY.KEYID = 7
1,516,344 UART: [ldev] FE.KEYID = 1
1,521,656 UART: [ldev] Erasing FE.KEYID = 1
1,546,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,589 UART: [ldev] --
1,585,862 UART: [fwproc] Waiting for Commands...
1,586,487 UART: [fwproc] Received command 0x46574c44
1,587,278 UART: [fwproc] Received Image of size 114940 bytes
2,892,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,662 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,767 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,976 ready_for_fw is high
1,362,976 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,321 >>> mbox cmd response: success
2,999,115 UART:
2,999,131 UART: Running Caliptra FMC ...
2,999,539 UART:
2,999,682 UART: [state] CFI Enabled
3,010,183 UART: [fht] FMC Alias Private Key: 7
3,118,568 UART: [art] Extend RT PCRs Done
3,118,996 UART: [art] Lock RT PCRs Done
3,120,538 UART: [art] Populate DV Done
3,128,635 UART: [fht] FMC Alias Private Key: 7
3,129,669 UART: [art] Derive CDI
3,129,949 UART: [art] Store in in slot 0x4
3,215,686 UART: [art] Derive Key Pair
3,216,046 UART: [art] Store priv key in slot 0x5
3,229,246 UART: [art] Derive Key Pair - Done
3,243,929 UART: [art] Signing Cert with AUTHO
3,244,409 UART: RITY.KEYID = 7
3,259,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,346 UART: [art] PUB.X = DD68F4FF378D33AFAB12D10A7671B18D21377ACD8FE4DE022255C1284A17A4B56C2F421ACABE13B384530E362D0C463E
3,267,116 UART: [art] PUB.Y = 61AB5C391C25B23DCBFFD61942714FFF9DA7CF1483591FE1BB761BFB53DCE594EBD9C7022018BAE033E6BC54FEB85F15
3,274,085 UART: [art] SIG.R = F233BB9D549A2E38B749B71A64889D90A3AB05CA4011C1191B80E767E766CAA81D883C9462087C17C6494FC80DF23AC8
3,280,848 UART: [art] SIG.S = 84968AFFD3E46E9C5BCFE70375FA9FF5AC4F57F2AAFEE385DDCB04B8DE587B5180F6D6D3CD0A7CFBF4FA8531C30E8461
3,304,767 UART: Caliptra RT
3,305,112 UART: [state] CFI Enabled
3,413,538 UART: [rt] RT listening for mailbox commands...
3,414,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,998 UART: [rt]cmd =0x46504c54, len=4
3,445,100 >>> mbox cmd response data (8 bytes)
3,445,361 UART: [rt] FIPS self test
3,445,689 UART: [kat] ++
3,445,841 UART: [kat] sha1
3,450,240 UART: Fatal Error: 0x90060002
3,451,779 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,451,784 >>> mbox cmd response: failed
3,451,784 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,451,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,992 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,677 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
893,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,313 UART: [kat] ++
897,465 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
917,642 UART: [kat] HMAC-384Kdf
922,298 UART: [kat] LMS
1,170,626 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,968 UART: [idev] ++
1,175,136 UART: [idev] CDI.KEYID = 6
1,175,496 UART: [idev] SUBJECT.KEYID = 7
1,175,920 UART: [idev] UDS.KEYID = 0
1,176,265 ready_for_fw is high
1,176,265 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,809 UART: [idev] Sha1 KeyId Algorithm
1,209,395 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,904 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,216,821 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,282,930 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,662 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,966 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,683 >>> mbox cmd response: success
2,783,885 UART: [afmc] ++
2,784,053 UART: [afmc] CDI.KEYID = 6
2,784,415 UART: [afmc] SUBJECT.KEYID = 7
2,784,840 UART: [afmc] AUTHORITY.KEYID = 5
2,820,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,358 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,690 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,342 UART: [afmc] --
2,863,354 UART: [cold-reset] --
2,863,964 UART: [state] Locking Datavault
2,865,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,613 UART: [state] Locking ICCM
2,866,043 UART: [exit] Launching FMC @ 0x40000130
2,871,372 UART:
2,871,388 UART: Running Caliptra FMC ...
2,871,796 UART:
2,871,850 UART: [state] CFI Enabled
2,882,507 UART: [fht] FMC Alias Private Key: 7
2,990,214 UART: [art] Extend RT PCRs Done
2,990,642 UART: [art] Lock RT PCRs Done
2,992,308 UART: [art] Populate DV Done
3,000,679 UART: [fht] FMC Alias Private Key: 7
3,001,835 UART: [art] Derive CDI
3,002,115 UART: [art] Store in in slot 0x4
3,088,072 UART: [art] Derive Key Pair
3,088,432 UART: [art] Store priv key in slot 0x5
3,100,922 UART: [art] Derive Key Pair - Done
3,115,668 UART: [art] Signing Cert with AUTHO
3,116,148 UART: RITY.KEYID = 7
3,131,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,167 UART: [art] PUB.X = F7559D9EF2D8DCEBF548A9D0DF0511B47A7F6CCFEB4C7D3629034A95D359FF375D368063B6B649BF2C144A179DD861A6
3,138,945 UART: [art] PUB.Y = 3A46C7D1207A3E7B3B04ABCD33D08383A9B98F1990720508E19DA61B558D1EB345228782D149B305AE94A7637C2FB6E9
3,145,883 UART: [art] SIG.R = 005B774D0A2CEB84296539795CB254743998DB4C33588913C31747E3289FD9B2A580EC6795D09A65F6B0422D5F10E89D
3,152,620 UART: [art] SIG.S = 41BAB1D11CA704397A57D4F8767F32F55CA87619FFF1DEDA568E2DF3BD0B367E4AD155664F949BCF23F2E61A67CC48C4
3,176,403 UART: Caliptra RT
3,176,656 UART: [state] CFI Enabled
3,284,719 UART: [rt] RT listening for mailbox commands...
3,285,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,375 UART: [rt]cmd =0x46504c54, len=4
3,316,561 >>> mbox cmd response data (8 bytes)
3,316,846 UART: [rt] FIPS self test
3,317,174 UART: [kat] ++
3,317,326 UART: [kat] sha1
3,321,611 UART: Fatal Error: 0x90060002
3,323,150 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,155 >>> mbox cmd response: failed
3,323,155 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
893,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,235 UART: [kat] ++
897,387 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,264 UART: [kat] SHA2-512-ACC
908,165 UART: [kat] ECC-384
917,654 UART: [kat] HMAC-384Kdf
922,340 UART: [kat] LMS
1,170,668 UART: [kat] --
1,171,477 UART: [cold-reset] ++
1,172,029 UART: [fht] FHT @ 0x50003400
1,174,820 UART: [idev] ++
1,174,988 UART: [idev] CDI.KEYID = 6
1,175,348 UART: [idev] SUBJECT.KEYID = 7
1,175,772 UART: [idev] UDS.KEYID = 0
1,176,117 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,216 UART: [idev] Erasing UDS.KEYID = 0
1,201,283 UART: [idev] Sha1 KeyId Algorithm
1,209,905 UART: [idev] --
1,210,901 UART: [ldev] ++
1,211,069 UART: [ldev] CDI.KEYID = 6
1,211,432 UART: [ldev] SUBJECT.KEYID = 5
1,211,858 UART: [ldev] AUTHORITY.KEYID = 7
1,212,321 UART: [ldev] FE.KEYID = 1
1,217,673 UART: [ldev] Erasing FE.KEYID = 1
1,243,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,087 UART: [ldev] --
1,283,404 UART: [fwproc] Wait for Commands...
1,284,202 UART: [fwproc] Recv command 0x46574c44
1,284,930 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,550 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,261 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 ready_for_fw is high
1,060,059 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,354 >>> mbox cmd response: success
2,698,516 UART:
2,698,532 UART: Running Caliptra FMC ...
2,698,940 UART:
2,698,994 UART: [state] CFI Enabled
2,709,363 UART: [fht] FMC Alias Private Key: 7
2,817,526 UART: [art] Extend RT PCRs Done
2,817,954 UART: [art] Lock RT PCRs Done
2,819,646 UART: [art] Populate DV Done
2,827,835 UART: [fht] FMC Alias Private Key: 7
2,828,925 UART: [art] Derive CDI
2,829,205 UART: [art] Store in in slot 0x4
2,914,804 UART: [art] Derive Key Pair
2,915,164 UART: [art] Store priv key in slot 0x5
2,928,420 UART: [art] Derive Key Pair - Done
2,943,416 UART: [art] Signing Cert with AUTHO
2,943,896 UART: RITY.KEYID = 7
2,959,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,013 UART: [art] PUB.X = A3398E55D6F96AC508EE4CA6FAAA6096D0E0A0888B7976BFAF05719A68548CF622A7E724E2B3BCC45954856ABAF9D671
2,966,789 UART: [art] PUB.Y = DFE68E77A3C6746D2CAC0042E0D1E86669315714C3B2E67506EE108C58A77D8887836805731D9570317BE23512C77AF6
2,973,703 UART: [art] SIG.R = D141EBF6F02B85C8F1B6B36F1010CF2B79A4276DD83CA1DCE4B0964E81C3B4B3E19BEF2B15A680095117974A613C3BBC
2,980,484 UART: [art] SIG.S = 358891C7B9AB31893B8616CDC0189EDC6D491891F3CDE1DCBEB35CAB7D82CCE123B6234B178E5FD35C022BA396E20DA5
3,004,573 UART: Caliptra RT
3,004,826 UART: [state] CFI Enabled
3,112,483 UART: [rt] RT listening for mailbox commands...
3,113,146 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,863 UART: [rt]cmd =0x46504c54, len=4
3,143,965 >>> mbox cmd response data (8 bytes)
3,144,224 UART: [rt] FIPS self test
3,144,552 UART: [kat] ++
3,144,704 UART: [kat] sha1
3,148,997 UART: Fatal Error: 0x90060002
3,150,536 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,541 >>> mbox cmd response: failed
3,150,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,518 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,429 UART: [kat] SHA2-256
893,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,204 UART: [kat] ++
897,356 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,211 UART: [kat] SHA2-512-ACC
908,112 UART: [kat] ECC-384
918,031 UART: [kat] HMAC-384Kdf
922,535 UART: [kat] LMS
1,170,863 UART: [kat] --
1,171,904 UART: [cold-reset] ++
1,172,320 UART: [fht] FHT @ 0x50003400
1,174,881 UART: [idev] ++
1,175,049 UART: [idev] CDI.KEYID = 6
1,175,409 UART: [idev] SUBJECT.KEYID = 7
1,175,833 UART: [idev] UDS.KEYID = 0
1,176,178 ready_for_fw is high
1,176,178 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,731 UART: [idev] Erasing UDS.KEYID = 0
1,200,796 UART: [idev] Sha1 KeyId Algorithm
1,209,336 UART: [idev] --
1,210,564 UART: [ldev] ++
1,210,732 UART: [ldev] CDI.KEYID = 6
1,211,095 UART: [ldev] SUBJECT.KEYID = 5
1,211,521 UART: [ldev] AUTHORITY.KEYID = 7
1,211,984 UART: [ldev] FE.KEYID = 1
1,216,910 UART: [ldev] Erasing FE.KEYID = 1
1,243,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,302 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,497 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,073 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,377 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,196 >>> mbox cmd response: success
2,783,224 UART: [afmc] ++
2,783,392 UART: [afmc] CDI.KEYID = 6
2,783,754 UART: [afmc] SUBJECT.KEYID = 7
2,784,179 UART: [afmc] AUTHORITY.KEYID = 5
2,819,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,041 UART: [afmc] --
2,863,117 UART: [cold-reset] --
2,863,867 UART: [state] Locking Datavault
2,865,096 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,700 UART: [state] Locking ICCM
2,866,172 UART: [exit] Launching FMC @ 0x40000130
2,871,501 UART:
2,871,517 UART: Running Caliptra FMC ...
2,871,925 UART:
2,872,068 UART: [state] CFI Enabled
2,882,511 UART: [fht] FMC Alias Private Key: 7
2,990,938 UART: [art] Extend RT PCRs Done
2,991,366 UART: [art] Lock RT PCRs Done
2,992,592 UART: [art] Populate DV Done
3,000,663 UART: [fht] FMC Alias Private Key: 7
3,001,723 UART: [art] Derive CDI
3,002,003 UART: [art] Store in in slot 0x4
3,088,220 UART: [art] Derive Key Pair
3,088,580 UART: [art] Store priv key in slot 0x5
3,101,894 UART: [art] Derive Key Pair - Done
3,116,556 UART: [art] Signing Cert with AUTHO
3,117,036 UART: RITY.KEYID = 7
3,132,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,031 UART: [art] PUB.X = AC8E77EC65AF0A97B1BC1764014577DF86F1F0C6A99AEFEEA9549F2B83EDA0A55B7A152FF245FC9B7F13A415DF008942
3,139,791 UART: [art] PUB.Y = BF454B61677DCF33DCCAC69513A3A365666B73E7E055952A11ABFFD6BB9C0C64D077CF0C662380C5EB7DF4BFBE13B054
3,146,753 UART: [art] SIG.R = 045E570DB7F2CCF76EB80A2E745318763A66B2F5DD86EE20CBF3D9841807C1311752B25FDBDE27C657D2B849740BDE2F
3,153,518 UART: [art] SIG.S = 0F2D147B928B8420DD46B0E153B8DDF357DF6D5703F5D5E256BADE00F103367C44FEB71236813B2A424E66D3091E54AE
3,177,183 UART: Caliptra RT
3,177,528 UART: [state] CFI Enabled
3,285,027 UART: [rt] RT listening for mailbox commands...
3,285,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,387 UART: [rt]cmd =0x46504c54, len=4
3,316,715 >>> mbox cmd response data (8 bytes)
3,317,044 UART: [rt] FIPS self test
3,317,372 UART: [kat] ++
3,317,524 UART: [kat] sha1
3,321,613 UART: Fatal Error: 0x90060002
3,323,152 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,157 >>> mbox cmd response: failed
3,323,157 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,153 UART: [state] LifecycleState = Unprovisioned
86,808 UART: [state] DebugLocked = No
87,318 UART: [state] WD Timer not started. Device not locked for debugging
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,408 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,467 UART: [idev] ++
1,175,635 UART: [idev] CDI.KEYID = 6
1,175,995 UART: [idev] SUBJECT.KEYID = 7
1,176,419 UART: [idev] UDS.KEYID = 0
1,176,764 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,718 UART: [idev] Sha1 KeyId Algorithm
1,210,212 UART: [idev] --
1,211,268 UART: [ldev] ++
1,211,436 UART: [ldev] CDI.KEYID = 6
1,211,799 UART: [ldev] SUBJECT.KEYID = 5
1,212,225 UART: [ldev] AUTHORITY.KEYID = 7
1,212,688 UART: [ldev] FE.KEYID = 1
1,217,966 UART: [ldev] Erasing FE.KEYID = 1
1,244,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,771 UART: [fwproc] Wait for Commands...
1,284,403 UART: [fwproc] Recv command 0x46574c44
1,285,131 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,385 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,058 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,802 ready_for_fw is high
1,060,802 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,795 >>> mbox cmd response: success
2,698,351 UART:
2,698,367 UART: Running Caliptra FMC ...
2,698,775 UART:
2,698,918 UART: [state] CFI Enabled
2,709,489 UART: [fht] FMC Alias Private Key: 7
2,816,796 UART: [art] Extend RT PCRs Done
2,817,224 UART: [art] Lock RT PCRs Done
2,818,936 UART: [art] Populate DV Done
2,827,105 UART: [fht] FMC Alias Private Key: 7
2,828,105 UART: [art] Derive CDI
2,828,385 UART: [art] Store in in slot 0x4
2,914,266 UART: [art] Derive Key Pair
2,914,626 UART: [art] Store priv key in slot 0x5
2,928,290 UART: [art] Derive Key Pair - Done
2,942,910 UART: [art] Signing Cert with AUTHO
2,943,390 UART: RITY.KEYID = 7
2,958,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,375 UART: [art] PUB.X = E17D2A0D58E37E46B27F569F779DCFA09576C256A964B8B84350B3E8899C2C3C08024D738B7AEFFF1F7127A49D131FCE
2,966,144 UART: [art] PUB.Y = 03193BF8284EAD223DF025DD039415CB6B58924E940E4F24454B475A1FCCD37C6997E5DBA081E1019DDC1CEB7D4096F4
2,973,090 UART: [art] SIG.R = A114111DD172BED7035B1CE24BD97E38402FA5977B610190D863F7A67051EF5A7B0ED5269D68D6B32C0B62E641F804F4
2,979,847 UART: [art] SIG.S = 9577DB97747D544BA6C3BD0B84788E10546EE8E65E358A3602D0653EC65B4CB8ABCCADF034645FF165F92154B1AF1EB2
3,004,132 UART: Caliptra RT
3,004,477 UART: [state] CFI Enabled
3,112,507 UART: [rt] RT listening for mailbox commands...
3,113,170 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,297 UART: [rt]cmd =0x46504c54, len=4
3,144,565 >>> mbox cmd response data (8 bytes)
3,144,770 UART: [rt] FIPS self test
3,145,098 UART: [kat] ++
3,145,250 UART: [kat] sha1
3,149,595 UART: Fatal Error: 0x90060002
3,151,134 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,139 >>> mbox cmd response: failed
3,151,139 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,242 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,469 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,139 UART: [idev] ++
1,173,307 UART: [idev] CDI.KEYID = 6
1,173,668 UART: [idev] SUBJECT.KEYID = 7
1,174,093 UART: [idev] UDS.KEYID = 0
1,174,439 ready_for_fw is high
1,174,439 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,163 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,056 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,714 UART: [ldev] --
1,280,048 UART: [fwproc] Wait for Commands...
1,280,777 UART: [fwproc] Recv command 0x46574c44
1,281,510 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,211 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,777,967 >>> mbox cmd response: success
2,779,078 UART: [afmc] ++
2,779,246 UART: [afmc] CDI.KEYID = 6
2,779,609 UART: [afmc] SUBJECT.KEYID = 7
2,780,035 UART: [afmc] AUTHORITY.KEYID = 5
2,815,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,536 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,138 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,857,801 UART: [afmc] --
2,858,735 UART: [cold-reset] --
2,859,651 UART: [state] Locking Datavault
2,861,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,730 UART: [state] Locking ICCM
2,862,290 UART: [exit] Launching FMC @ 0x40000130
2,867,619 UART:
2,867,635 UART: Running Caliptra FMC ...
2,868,043 UART:
2,868,097 UART: [state] CFI Enabled
2,878,596 UART: [fht] FMC Alias Private Key: 7
2,986,335 UART: [art] Extend RT PCRs Done
2,986,763 UART: [art] Lock RT PCRs Done
2,988,345 UART: [art] Populate DV Done
2,996,558 UART: [fht] FMC Alias Private Key: 7
2,997,590 UART: [art] Derive CDI
2,997,870 UART: [art] Store in in slot 0x4
3,083,683 UART: [art] Derive Key Pair
3,084,043 UART: [art] Store priv key in slot 0x5
3,097,363 UART: [art] Derive Key Pair - Done
3,112,221 UART: [art] Signing Cert with AUTHO
3,112,701 UART: RITY.KEYID = 7
3,128,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,796 UART: [art] PUB.X = 2964952688EF9EC7250FEDFDFC5BBF55D57D4C898B0DEFA38626324BEE727615CBDBBB72B3AA613ADD673567A0E1473D
3,135,578 UART: [art] PUB.Y = 115AD4F471A9DC3B86B5CFDEAF345E9154FF5DB943705317074B7BCDFBDAAB3C27C410B4C90C62A81879C3F39E4A8E7E
3,142,542 UART: [art] SIG.R = F44D2135704186EEC3FE879C2A939DB4BC7A2D40BEA373DE97185748A8281462572D823D2CC35D035EAE06EEBE484CB5
3,149,314 UART: [art] SIG.S = 6E571784128DD748FFB1B722792DBAA4EA767127BBE888875E7CFFF4BF93924AAA1CDFB48986C60D3EA6BABD551D56C2
3,173,202 UART: Caliptra RT
3,173,455 UART: [state] CFI Enabled
3,281,254 UART: [rt] RT listening for mailbox commands...
3,281,917 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,774 UART: [rt]cmd =0x46504c54, len=4
3,312,898 >>> mbox cmd response data (8 bytes)
3,313,239 UART: [rt] FIPS self test
3,313,567 UART: [kat] ++
3,313,719 UART: [kat] sha1
3,317,998 UART: Fatal Error: 0x90060002
3,319,537 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,319,542 >>> mbox cmd response: failed
3,319,542 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,319,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,126 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,871 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,470 UART: [ldev] SUBJECT.KEYID = 5
1,209,897 UART: [ldev] AUTHORITY.KEYID = 7
1,210,360 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,241,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,964 UART: [fwproc] Wait for Commands...
1,281,785 UART: [fwproc] Recv command 0x46574c44
1,282,518 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,587 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,198 ready_for_fw is high
1,055,198 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,883 >>> mbox cmd response: success
2,692,065 UART:
2,692,081 UART: Running Caliptra FMC ...
2,692,489 UART:
2,692,543 UART: [state] CFI Enabled
2,702,974 UART: [fht] FMC Alias Private Key: 7
2,811,045 UART: [art] Extend RT PCRs Done
2,811,473 UART: [art] Lock RT PCRs Done
2,813,271 UART: [art] Populate DV Done
2,821,574 UART: [fht] FMC Alias Private Key: 7
2,822,660 UART: [art] Derive CDI
2,822,940 UART: [art] Store in in slot 0x4
2,908,787 UART: [art] Derive Key Pair
2,909,147 UART: [art] Store priv key in slot 0x5
2,921,891 UART: [art] Derive Key Pair - Done
2,936,738 UART: [art] Signing Cert with AUTHO
2,937,218 UART: RITY.KEYID = 7
2,952,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,313 UART: [art] PUB.X = 398B17D7F7996E6AF9D181A5776C3600AA261F89F8261674FDA0DE45D3989A1F6547CCE8359C3418760C3A8257FE3B48
2,960,056 UART: [art] PUB.Y = 6B44635804D9B40D7E7C195AA9EFEE7106E31D375BA6DEED25D47A748F0521DBC30991850CD0A387191792C0B2D9B5C7
2,966,994 UART: [art] SIG.R = 99907A687794FD3262C7703429E35978AEB14078776BB06A80C00F9BFA13FD834E3BB3D1ED1B6AB36B97613FAB6FAEF8
2,973,769 UART: [art] SIG.S = 6B3915F62F97E9DCEBCDD76D46BE7E6B4B0EFBE58901A718F82A4B684C8D51FB5A53681093D9DF1DC07AEAADBA398D20
2,998,222 UART: Caliptra RT
2,998,475 UART: [state] CFI Enabled
3,105,844 UART: [rt] RT listening for mailbox commands...
3,106,507 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,448 UART: [rt]cmd =0x46504c54, len=4
3,137,476 >>> mbox cmd response data (8 bytes)
3,137,695 UART: [rt] FIPS self test
3,138,023 UART: [kat] ++
3,138,175 UART: [kat] sha1
3,142,470 UART: Fatal Error: 0x90060002
3,144,009 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,144,014 >>> mbox cmd response: failed
3,144,014 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,144,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,714 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,628,853 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,481 UART: [kat] SHA2-256
892,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,160 UART: [kat] ++
896,312 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
905,169 UART: [kat] SHA2-512-ACC
907,070 UART: [kat] ECC-384
916,935 UART: [kat] HMAC-384Kdf
921,725 UART: [kat] LMS
1,170,037 UART: [kat] --
1,171,112 UART: [cold-reset] ++
1,171,684 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,711 UART: [idev] SUBJECT.KEYID = 7
1,175,136 UART: [idev] UDS.KEYID = 0
1,175,482 ready_for_fw is high
1,175,482 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,480 UART: [idev] Erasing UDS.KEYID = 0
1,200,784 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,499 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,692 UART: [fwproc] Recv command 0x46574c44
1,283,425 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,934 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,592 >>> mbox cmd response: success
2,781,683 UART: [afmc] ++
2,781,851 UART: [afmc] CDI.KEYID = 6
2,782,214 UART: [afmc] SUBJECT.KEYID = 7
2,782,640 UART: [afmc] AUTHORITY.KEYID = 5
2,818,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,506 UART: [afmc] --
2,861,514 UART: [cold-reset] --
2,862,410 UART: [state] Locking Datavault
2,863,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,049 UART: [state] Locking ICCM
2,864,495 UART: [exit] Launching FMC @ 0x40000130
2,869,824 UART:
2,869,840 UART: Running Caliptra FMC ...
2,870,248 UART:
2,870,391 UART: [state] CFI Enabled
2,880,854 UART: [fht] FMC Alias Private Key: 7
2,988,093 UART: [art] Extend RT PCRs Done
2,988,521 UART: [art] Lock RT PCRs Done
2,989,827 UART: [art] Populate DV Done
2,997,866 UART: [fht] FMC Alias Private Key: 7
2,998,896 UART: [art] Derive CDI
2,999,176 UART: [art] Store in in slot 0x4
3,085,103 UART: [art] Derive Key Pair
3,085,463 UART: [art] Store priv key in slot 0x5
3,098,877 UART: [art] Derive Key Pair - Done
3,113,664 UART: [art] Signing Cert with AUTHO
3,114,144 UART: RITY.KEYID = 7
3,129,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,349 UART: [art] PUB.X = B7AB2FC5752BA101FABF6AAEABB330600003CA2D97D77CF39AB58620C1B70BDC1B4B22BB374B66E1C3BAA8273C48F8FF
3,137,114 UART: [art] PUB.Y = 13AFF35CE20B55EE1DEBF516C849ABEE0AC1657D0E943C62A0A7F10D794ED7B1FB6CF4F438A7CC929381D122362E6356
3,144,068 UART: [art] SIG.R = 9555B97BB2FB5D55D94D0F77A870FBEDA26A03FA96FF4AD5661C4CC40C1E1F2500565F4734FFEA0ACE99333FD846CD70
3,150,822 UART: [art] SIG.S = 833E57C3B074BF603967208D797C67EAD11C17436F08C2C90E19F604DB6BC8682CE220A096DB6AD753D655CF99B951E4
3,175,084 UART: Caliptra RT
3,175,429 UART: [state] CFI Enabled
3,283,085 UART: [rt] RT listening for mailbox commands...
3,283,748 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,591 UART: [rt]cmd =0x46504c54, len=4
3,314,693 >>> mbox cmd response data (8 bytes)
3,314,840 UART: [rt] FIPS self test
3,315,168 UART: [kat] ++
3,315,320 UART: [kat] sha1
3,319,705 UART: Fatal Error: 0x90060002
3,321,244 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,249 >>> mbox cmd response: failed
3,321,249 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,840 UART: [kat] ++
895,992 UART: [kat] sha1
900,362 UART: [kat] SHA2-256
902,302 UART: [kat] SHA2-384
905,125 UART: [kat] SHA2-512-ACC
907,026 UART: [kat] ECC-384
916,831 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,594 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,174,826 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,884 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,891 UART: [ldev] --
1,282,381 UART: [fwproc] Wait for Commands...
1,283,156 UART: [fwproc] Recv command 0x46574c44
1,283,889 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,176 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,940 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 ready_for_fw is high
1,056,313 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,464 >>> mbox cmd response: success
2,695,294 UART:
2,695,310 UART: Running Caliptra FMC ...
2,695,718 UART:
2,695,861 UART: [state] CFI Enabled
2,706,262 UART: [fht] FMC Alias Private Key: 7
2,814,507 UART: [art] Extend RT PCRs Done
2,814,935 UART: [art] Lock RT PCRs Done
2,816,391 UART: [art] Populate DV Done
2,824,582 UART: [fht] FMC Alias Private Key: 7
2,825,574 UART: [art] Derive CDI
2,825,854 UART: [art] Store in in slot 0x4
2,911,463 UART: [art] Derive Key Pair
2,911,823 UART: [art] Store priv key in slot 0x5
2,924,901 UART: [art] Derive Key Pair - Done
2,939,646 UART: [art] Signing Cert with AUTHO
2,940,126 UART: RITY.KEYID = 7
2,955,616 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,381 UART: [art] PUB.X = EF882E7DD19FB1B751F1BAEDED2BEDD5A011FA2B69F04399A6C23A4B55BB2B97D20291A28287AECC42BF17DE3BF801A3
2,963,171 UART: [art] PUB.Y = 388CFFABEE17B7E73B67594044E7FD31377548B4138BCDBF9A337391D15A8A34AAFFAAC4A7E9F6EF62443E293FE5657B
2,970,137 UART: [art] SIG.R = DA542E68AF4E66CF6D92EBC30920F0DC70C57C9E80D63BE80E6CD36DF1EEFBBC20DB40A53422C7699B9DF95233CB2341
2,976,921 UART: [art] SIG.S = FD09A9E1FCA370CF2A2D06F9570977A4DCDF7861B31E408179BF7D2BE421BF9F2E7F213EF67DEA7F5C3D9190684A0B47
3,000,076 UART: Caliptra RT
3,000,421 UART: [state] CFI Enabled
3,108,187 UART: [rt] RT listening for mailbox commands...
3,108,850 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,511 UART: [rt]cmd =0x46504c54, len=4
3,139,705 >>> mbox cmd response data (8 bytes)
3,139,872 UART: [rt] FIPS self test
3,140,200 UART: [kat] ++
3,140,352 UART: [kat] sha1
3,144,587 UART: Fatal Error: 0x90060002
3,146,126 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,146,131 >>> mbox cmd response: failed
3,146,131 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,146,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,903 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,308 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,515,387 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,659,248 >>> mbox cmd response: failed
2,659,820 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,802,725 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
4,867,197 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,425,913 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,510,476 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,654,062 >>> mbox cmd response: failed
2,654,617 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,797,496 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
4,869,920 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,436,086 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,858,664 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,002,988 >>> mbox cmd response: failed
3,003,574 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,146,461 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
21,587,985 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,028,716 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,864,849 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,008,449 >>> mbox cmd response: failed
3,009,011 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,151,857 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,583,803 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,014,332 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
2,518,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,663,195 >>> mbox cmd response: failed
2,663,752 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,806,892 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,446,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,529 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,517,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,662,300 >>> mbox cmd response: failed
2,662,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,806,288 >>> mbox cmd response: failed
Initializing fuses
994 writing to cptra_bootfsm_go
3,461,696 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,291,307 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
2,878,571 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,023,276 >>> mbox cmd response: failed
3,023,851 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,166,979 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,177,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,883,907 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,873,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,017,546 >>> mbox cmd response: failed
3,018,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,161,393 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,172,543 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,921,787 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,517,551 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,661,733 >>> mbox cmd response: failed
2,662,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,806,106 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,445,622 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,256,950 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,523,421 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,667,615 >>> mbox cmd response: failed
2,668,182 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,811,473 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,448,776 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,240,291 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,877,923 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,022,122 >>> mbox cmd response: failed
3,022,692 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,165,825 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,184,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,912,927 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,870,859 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,015,284 >>> mbox cmd response: failed
3,015,862 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,159,028 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
20,183,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,900,360 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,604 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,612 >>> mbox cmd response: failed
85,612 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,249 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,525 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,336 >>> mbox cmd response: failed
86,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,829 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,257 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,265 >>> mbox cmd response: failed
86,265 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,463 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,599 >>> mbox cmd response: failed
85,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,116 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,626 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,746 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,754 >>> mbox cmd response: failed
85,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,731 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,797 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,500 >>> mbox cmd response: failed
85,500 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,291 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,461 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,365 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,373 >>> mbox cmd response: failed
86,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,178 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,153 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,161 >>> mbox cmd response: failed
86,161 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,052 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,418 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,054 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,062 >>> mbox cmd response: failed
85,062 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,871 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,926 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,934 >>> mbox cmd response: failed
85,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,223 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,473 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,889 >>> mbox cmd response: failed
85,889 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,074 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,319 >>> mbox cmd response: failed
85,319 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
85,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,482 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,582 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,143 UART:
192,508 UART: Running Caliptra ROM ...
193,626 UART:
193,773 UART: [state] CFI Enabled
265,054 UART: [state] LifecycleState = Unprovisioned
267,041 UART: [state] DebugLocked = No
268,725 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,092 UART: [kat] SHA2-256
443,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,310 UART: [kat] ++
454,790 UART: [kat] sha1
464,531 UART: [kat] SHA2-256
467,261 UART: [kat] SHA2-384
474,030 UART: [kat] SHA2-512-ACC
476,363 UART: [kat] ECC-384
2,769,711 UART: [kat] HMAC-384Kdf
2,799,776 UART: [kat] LMS
3,990,048 UART: [kat] --
3,994,423 UART: [cold-reset] ++
3,996,933 UART: [fht] Storing FHT @ 0x50003400
4,007,365 UART: [idev] ++
4,007,937 UART: [idev] CDI.KEYID = 6
4,008,978 UART: [idev] SUBJECT.KEYID = 7
4,010,163 UART: [idev] UDS.KEYID = 0
4,011,251 ready_for_fw is high
4,011,488 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,155,758 UART: [idev] Erasing UDS.KEYID = 0
7,348,828 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,321 UART: [idev] --
7,374,267 UART: [ldev] ++
7,374,865 UART: [ldev] CDI.KEYID = 6
7,375,847 UART: [ldev] SUBJECT.KEYID = 5
7,376,948 UART: [ldev] AUTHORITY.KEYID = 7
7,378,294 UART: [ldev] FE.KEYID = 1
7,422,783 UART: [ldev] Erasing FE.KEYID = 1
10,756,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,905 UART: [ldev] --
13,116,935 UART: [fwproc] Waiting for Commands...
13,119,513 UART: [fwproc] Received command 0x46574c44
13,121,709 UART: [fwproc] Received Image of size 114632 bytes
17,178,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,641,140 >>> mbox cmd response: success
17,645,723 UART: [afmc] ++
17,646,372 UART: [afmc] CDI.KEYID = 6
17,647,280 UART: [afmc] SUBJECT.KEYID = 7
17,648,494 UART: [afmc] AUTHORITY.KEYID = 5
21,007,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,018 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,440 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,265 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,684 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,216 UART: [afmc] --
23,378,301 UART: [cold-reset] --
23,382,916 UART: [state] Locking Datavault
23,386,973 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,744 UART: [state] Locking ICCM
23,389,922 UART: [exit] Launching FMC @ 0x40000130
23,398,322 UART:
23,398,608 UART: Running Caliptra FMC ...
23,399,723 UART:
23,399,883 UART: [state] CFI Enabled
23,465,056 UART: [fht] FMC Alias Private Key: 7
25,803,402 UART: [art] Extend RT PCRs Done
25,804,615 UART: [art] Lock RT PCRs Done
25,806,139 UART: [art] Populate DV Done
25,811,493 UART: [fht] FMC Alias Private Key: 7
25,813,039 UART: [art] Derive CDI
25,813,857 UART: [art] Store in in slot 0x4
25,872,734 UART: [art] Derive Key Pair
25,873,735 UART: [art] Store priv key in slot 0x5
29,166,682 UART: [art] Derive Key Pair - Done
29,179,878 UART: [art] Signing Cert with AUTHO
29,181,184 UART: RITY.KEYID = 7
31,468,162 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,665 UART: [art] PUB.X = 5004E034AD231DA401ED72382F383F226C39CDCB9289FDD93EEFA4B2DEE1FD4BB6FBE7995AEBE8CC440087E5901E5610
31,476,918 UART: [art] PUB.Y = 19B08CA0BDA4999658038537B8DBF997CC93CB7BADBEB64D081A098645F9F7DFE62338A7A9B0AD69BEDC73D303B2F993
31,484,200 UART: [art] SIG.R = 6E0ABED511473329A16EDC22576C7F9FCF5748F47667D75F3F755146415C4188283B311D9F7DF9CA19E2B62A56F34602
31,491,560 UART: [art] SIG.S = 74083C0BC8B4FC178C9DF633995B91AAD6E555004E30057A9E28FC52B8ED7B436259119A5F80FB37FCD2CECD1529592A
32,796,444 UART: Caliptra RT
32,797,161 UART: [state] CFI Enabled
32,958,987 UART: [rt] RT listening for mailbox commands...
32,960,848 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,990,524 UART: [rt]cmd =0x46504c54, len=4
32,992,209 >>> mbox cmd response data (8 bytes)
32,993,336 UART: [rt] FIPS self test
32,994,277 UART: [kat] ++
32,994,728 UART: [kat] sha1
32,998,996 UART: [kat] SHA2-256
32,999,891 UART: Fatal Error: 0x90010001
33,035,107 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,179,078 >>> mbox cmd response: failed
33,179,684 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,323,614 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,091 UART:
190,394 UART: Running Caliptra ROM ...
191,452 UART:
191,598 UART: [state] CFI Enabled
257,369 UART: [state] LifecycleState = Unprovisioned
259,290 UART: [state] DebugLocked = No
261,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,643 UART: [kat] SHA2-256
436,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,839 UART: [kat] ++
447,365 UART: [kat] sha1
457,817 UART: [kat] SHA2-256
460,503 UART: [kat] SHA2-384
466,319 UART: [kat] SHA2-512-ACC
468,658 UART: [kat] ECC-384
2,759,630 UART: [kat] HMAC-384Kdf
2,770,466 UART: [kat] LMS
3,960,741 UART: [kat] --
3,965,213 UART: [cold-reset] ++
3,966,663 UART: [fht] Storing FHT @ 0x50003400
3,977,236 UART: [idev] ++
3,977,813 UART: [idev] CDI.KEYID = 6
3,978,724 UART: [idev] SUBJECT.KEYID = 7
3,979,995 UART: [idev] UDS.KEYID = 0
3,981,659 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,125,824 UART: [idev] Erasing UDS.KEYID = 0
7,315,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,337,099 UART: [idev] --
7,341,364 UART: [ldev] ++
7,341,932 UART: [ldev] CDI.KEYID = 6
7,342,870 UART: [ldev] SUBJECT.KEYID = 5
7,344,084 UART: [ldev] AUTHORITY.KEYID = 7
7,345,380 UART: [ldev] FE.KEYID = 1
7,392,572 UART: [ldev] Erasing FE.KEYID = 1
10,727,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,019,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,034,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,049,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,063,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,083,201 UART: [ldev] --
13,088,001 UART: [fwproc] Waiting for Commands...
13,091,239 UART: [fwproc] Received command 0x46574c44
13,093,429 UART: [fwproc] Received Image of size 114632 bytes
17,153,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,621,472 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,784,475 ready_for_fw is high
3,785,101 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,869,241 >>> mbox cmd response: success
23,568,990 UART:
23,569,386 UART: Running Caliptra FMC ...
23,570,523 UART:
23,570,680 UART: [state] CFI Enabled
23,639,617 UART: [fht] FMC Alias Private Key: 7
25,977,620 UART: [art] Extend RT PCRs Done
25,978,845 UART: [art] Lock RT PCRs Done
25,980,499 UART: [art] Populate DV Done
25,986,025 UART: [fht] FMC Alias Private Key: 7
25,987,628 UART: [art] Derive CDI
25,988,367 UART: [art] Store in in slot 0x4
26,047,903 UART: [art] Derive Key Pair
26,048,951 UART: [art] Store priv key in slot 0x5
29,341,591 UART: [art] Derive Key Pair - Done
29,354,532 UART: [art] Signing Cert with AUTHO
29,355,840 UART: RITY.KEYID = 7
31,643,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,123 UART: [art] PUB.X = A129DA15E38933EE8B99E50F0D23E0056C648F1D7100536B854E583C18F81BADA162BC84BAE294C86B5142C0E413AAC3
31,652,381 UART: [art] PUB.Y = E19445E3D129EA69C70DDCBDD87E202FE24D05831D1D7BE590324F6F67184ED84BC811EC89BF4CE933CED9BE1A9562A3
31,659,623 UART: [art] SIG.R = F069AEEAF731F47E374AE2F341ACDEB9BAD075AE1328C05EFA5174FED1ABBC9FA54B53C2918AA9CD8412D2833D25F1DE
31,667,126 UART: [art] SIG.S = 22CA27F1B0F216D60C9428C26329B4464FFD5C0BBE2A8936E0F882E8E7B53207F10AFD085A9BD88BF727637ED0A7085D
32,972,786 UART: Caliptra RT
32,973,506 UART: [state] CFI Enabled
33,134,736 UART: [rt] RT listening for mailbox commands...
33,136,595 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,166,185 UART: [rt]cmd =0x46504c54, len=4
33,167,798 >>> mbox cmd response data (8 bytes)
33,168,642 UART: [rt] FIPS self test
33,169,523 UART: [kat] ++
33,170,017 UART: [kat] sha1
33,174,694 UART: [kat] SHA2-256
33,175,612 UART: Fatal Error: 0x90010001
33,210,817 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,355,129 >>> mbox cmd response: failed
33,355,741 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,499,708 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,776,900 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,848,004 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,597 UART:
192,953 UART: Running Caliptra ROM ...
194,503 UART:
603,692 UART: [state] CFI Enabled
620,039 UART: [state] LifecycleState = Unprovisioned
621,997 UART: [state] DebugLocked = No
624,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,851 UART: [kat] SHA2-256
798,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,180 UART: [kat] ++
809,723 UART: [kat] sha1
821,170 UART: [kat] SHA2-256
823,824 UART: [kat] SHA2-384
829,465 UART: [kat] SHA2-512-ACC
831,836 UART: [kat] ECC-384
3,115,414 UART: [kat] HMAC-384Kdf
3,126,188 UART: [kat] LMS
4,316,341 UART: [kat] --
4,322,065 UART: [cold-reset] ++
4,324,001 UART: [fht] Storing FHT @ 0x50003400
4,335,417 UART: [idev] ++
4,335,988 UART: [idev] CDI.KEYID = 6
4,337,044 UART: [idev] SUBJECT.KEYID = 7
4,338,231 UART: [idev] UDS.KEYID = 0
4,339,315 ready_for_fw is high
4,339,548 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,483,632 UART: [idev] Erasing UDS.KEYID = 0
7,630,075 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,157 UART: [idev] --
7,656,300 UART: [ldev] ++
7,656,887 UART: [ldev] CDI.KEYID = 6
7,657,775 UART: [ldev] SUBJECT.KEYID = 5
7,659,044 UART: [ldev] AUTHORITY.KEYID = 7
7,660,280 UART: [ldev] FE.KEYID = 1
7,670,063 UART: [ldev] Erasing FE.KEYID = 1
10,954,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,002 UART: [ldev] --
13,316,095 UART: [fwproc] Waiting for Commands...
13,318,780 UART: [fwproc] Received command 0x46574c44
13,320,976 UART: [fwproc] Received Image of size 114632 bytes
17,378,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,843,069 >>> mbox cmd response: success
17,846,507 UART: [afmc] ++
17,847,103 UART: [afmc] CDI.KEYID = 6
17,847,987 UART: [afmc] SUBJECT.KEYID = 7
17,849,254 UART: [afmc] AUTHORITY.KEYID = 5
21,163,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,454,595 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,866 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,262 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,062 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,555 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,498 UART: [afmc] --
23,524,884 UART: [cold-reset] --
23,530,038 UART: [state] Locking Datavault
23,537,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,927 UART: [state] Locking ICCM
23,540,834 UART: [exit] Launching FMC @ 0x40000130
23,549,231 UART:
23,549,469 UART: Running Caliptra FMC ...
23,550,571 UART:
23,550,727 UART: [state] CFI Enabled
23,558,787 UART: [fht] FMC Alias Private Key: 7
25,889,882 UART: [art] Extend RT PCRs Done
25,891,126 UART: [art] Lock RT PCRs Done
25,892,938 UART: [art] Populate DV Done
25,898,517 UART: [fht] FMC Alias Private Key: 7
25,900,163 UART: [art] Derive CDI
25,900,903 UART: [art] Store in in slot 0x4
25,943,391 UART: [art] Derive Key Pair
25,944,392 UART: [art] Store priv key in slot 0x5
29,186,009 UART: [art] Derive Key Pair - Done
29,198,687 UART: [art] Signing Cert with AUTHO
29,199,988 UART: RITY.KEYID = 7
31,479,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,481,010 UART: [art] PUB.X = 1F4046EA65F385F769AA7229E8D8CEA18BEDBBE69D158B6EB1171C9AFF9E47FB1CAD031D0254957126ED45D7E06F49FB
31,488,261 UART: [art] PUB.Y = 119D7C250DBB1D1D202D1624771D5C43EE9F427922F63D24329727C8FA2C08207B2B714B4C34A133491CDBE38AEDF36E
31,495,500 UART: [art] SIG.R = 772BB1023D1550575319730EE3D734450A77DE3AA38D6BC1D4A936ABEE62759E513F4EBD07BA8C48A1EBCDA48098C74B
31,502,899 UART: [art] SIG.S = 12794E6F0380A913702CED9FD23A9E6B92BECDCD6767E7EFB782C73B58F27A59BE5B31F0EAFDBFF8E0780296D66A2C77
32,808,090 UART: Caliptra RT
32,808,815 UART: [state] CFI Enabled
32,925,718 UART: [rt] RT listening for mailbox commands...
32,927,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,224 UART: [rt]cmd =0x46504c54, len=4
32,958,967 >>> mbox cmd response data (8 bytes)
32,959,712 UART: [rt] FIPS self test
32,960,653 UART: [kat] ++
32,961,104 UART: [kat] sha1
32,965,481 UART: [kat] SHA2-256
32,966,395 UART: Fatal Error: 0x90010001
33,001,723 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,145,627 >>> mbox cmd response: failed
33,146,290 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,290,175 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,092 UART:
190,389 UART: Running Caliptra ROM ...
191,503 UART:
7,230,132 UART: [state] CFI Enabled
7,245,474 UART: [state] LifecycleState = Unprovisioned
7,247,388 UART: [state] DebugLocked = No
7,250,394 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,255,777 UART: [kat] SHA2-256
7,425,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,436,041 UART: [kat] ++
7,436,530 UART: [kat] sha1
7,448,497 UART: [kat] SHA2-256
7,451,192 UART: [kat] SHA2-384
7,457,127 UART: [kat] SHA2-512-ACC
7,459,478 UART: [kat] ECC-384
9,742,220 UART: [kat] HMAC-384Kdf
9,753,547 UART: [kat] LMS
10,943,640 UART: [kat] --
10,949,918 UART: [cold-reset] ++
10,952,337 UART: [fht] Storing FHT @ 0x50003400
10,963,652 UART: [idev] ++
10,964,214 UART: [idev] CDI.KEYID = 6
10,965,228 UART: [idev] SUBJECT.KEYID = 7
10,966,440 UART: [idev] UDS.KEYID = 0
10,967,955 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,111,861 UART: [idev] Erasing UDS.KEYID = 0
14,251,526 UART: [idev] Using Sha1 for KeyId Algorithm
14,273,070 UART: [idev] --
14,277,411 UART: [ldev] ++
14,278,041 UART: [ldev] CDI.KEYID = 6
14,278,955 UART: [ldev] SUBJECT.KEYID = 5
14,280,170 UART: [ldev] AUTHORITY.KEYID = 7
14,281,476 UART: [ldev] FE.KEYID = 1
14,294,014 UART: [ldev] Erasing FE.KEYID = 1
17,585,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,877,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,892,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,907,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,921,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,940,953 UART: [ldev] --
19,945,765 UART: [fwproc] Waiting for Commands...
19,948,983 UART: [fwproc] Received command 0x46574c44
19,951,177 UART: [fwproc] Received Image of size 114632 bytes
24,012,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,086,857 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,155,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,474,205 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
4,129,553 ready_for_fw is high
4,130,055 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,078,925 >>> mbox cmd response: success
23,716,385 UART:
23,716,797 UART: Running Caliptra FMC ...
23,717,916 UART:
23,718,077 UART: [state] CFI Enabled
23,726,081 UART: [fht] FMC Alias Private Key: 7
26,056,446 UART: [art] Extend RT PCRs Done
26,057,684 UART: [art] Lock RT PCRs Done
26,059,559 UART: [art] Populate DV Done
26,065,018 UART: [fht] FMC Alias Private Key: 7
26,066,627 UART: [art] Derive CDI
26,067,454 UART: [art] Store in in slot 0x4
26,109,956 UART: [art] Derive Key Pair
26,110,994 UART: [art] Store priv key in slot 0x5
29,353,200 UART: [art] Derive Key Pair - Done
29,365,934 UART: [art] Signing Cert with AUTHO
29,367,243 UART: RITY.KEYID = 7
31,646,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,129 UART: [art] PUB.X = FA67D9E774C673250E23C8ADABA40F401FF4F7170C30855A9969E8041A898751AAEA2BFD2438F7F936D2291EDF182052
31,655,329 UART: [art] PUB.Y = 42BA9942101C5519F1A4E73A797FC962BF1DFE7CAC18BC3D7141BFAAEC3BF54F648EF6BE6D8C3E1F813CE42EE02C9DD4
31,662,604 UART: [art] SIG.R = 94E8B629F03A827A83E883856B37F7002DA5F3792F56A7DD4E9C96D9790C72A0B960C1761FD9ED3CD92771172B67473E
31,669,944 UART: [art] SIG.S = 3EE2C5ECADA7FF0132E1E1E189E580C4B734B3C2887C85C29981C4B08827E6AED4399CDD144D9BE59440DE651D4EB3C9
32,974,953 UART: Caliptra RT
32,975,665 UART: [state] CFI Enabled
33,092,523 UART: [rt] RT listening for mailbox commands...
33,094,394 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,997 UART: [rt]cmd =0x46504c54, len=4
33,125,582 >>> mbox cmd response data (8 bytes)
33,126,756 UART: [rt] FIPS self test
33,127,700 UART: [kat] ++
33,128,151 UART: [kat] sha1
33,132,833 UART: [kat] SHA2-256
33,133,618 UART: Fatal Error: 0x90010001
33,168,849 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,312,824 >>> mbox cmd response: failed
33,313,484 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,457,711 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
10,600,377 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,550,596 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,319 UART:
192,680 UART: Running Caliptra ROM ...
193,907 UART:
194,083 UART: [state] CFI Enabled
265,198 UART: [state] LifecycleState = Unprovisioned
267,102 UART: [state] DebugLocked = No
269,419 UART: [state] WD Timer not started. Device not locked for debugging
273,114 UART: [kat] SHA2-256
452,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,814 UART: [kat] ++
464,355 UART: [kat] sha1
476,375 UART: [kat] SHA2-256
479,383 UART: [kat] SHA2-384
485,587 UART: [kat] SHA2-512-ACC
488,527 UART: [kat] ECC-384
2,950,269 UART: [kat] HMAC-384Kdf
2,973,722 UART: [kat] LMS
3,503,191 UART: [kat] --
3,507,564 UART: [cold-reset] ++
3,509,167 UART: [fht] FHT @ 0x50003400
3,520,513 UART: [idev] ++
3,521,085 UART: [idev] CDI.KEYID = 6
3,521,998 UART: [idev] SUBJECT.KEYID = 7
3,523,177 UART: [idev] UDS.KEYID = 0
3,524,232 ready_for_fw is high
3,524,444 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,602 UART: [idev] Erasing UDS.KEYID = 0
6,030,026 UART: [idev] Sha1 KeyId Algorithm
6,054,064 UART: [idev] --
6,057,573 UART: [ldev] ++
6,058,140 UART: [ldev] CDI.KEYID = 6
6,059,046 UART: [ldev] SUBJECT.KEYID = 5
6,060,266 UART: [ldev] AUTHORITY.KEYID = 7
6,061,503 UART: [ldev] FE.KEYID = 1
6,103,148 UART: [ldev] Erasing FE.KEYID = 1
8,606,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,189 UART: [ldev] --
10,417,128 UART: [fwproc] Wait for Commands...
10,420,096 UART: [fwproc] Recv command 0x46574c44
10,422,194 UART: [fwproc] Recv'd Img size: 114940 bytes
13,830,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,646 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,289,381 >>> mbox cmd response: success
14,294,512 UART: [afmc] ++
14,295,099 UART: [afmc] CDI.KEYID = 6
14,296,017 UART: [afmc] SUBJECT.KEYID = 7
14,297,195 UART: [afmc] AUTHORITY.KEYID = 5
16,830,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,914 UART: [afmc] --
18,632,819 UART: [cold-reset] --
18,636,898 UART: [state] Locking Datavault
18,639,927 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,573 UART: [state] Locking ICCM
18,642,594 UART: [exit] Launching FMC @ 0x40000130
18,650,990 UART:
18,651,227 UART: Running Caliptra FMC ...
18,652,329 UART:
18,652,511 UART: [state] CFI Enabled
18,707,300 UART: [fht] FMC Alias Private Key: 7
20,470,532 UART: [art] Extend RT PCRs Done
20,471,753 UART: [art] Lock RT PCRs Done
20,473,872 UART: [art] Populate DV Done
20,479,553 UART: [fht] FMC Alias Private Key: 7
20,481,253 UART: [art] Derive CDI
20,482,064 UART: [art] Store in in slot 0x4
20,539,374 UART: [art] Derive Key Pair
20,540,374 UART: [art] Store priv key in slot 0x5
23,003,491 UART: [art] Derive Key Pair - Done
23,016,595 UART: [art] Signing Cert with AUTHO
23,017,905 UART: RITY.KEYID = 7
24,728,329 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,835 UART: [art] PUB.X = 6FA964DF1CA3EF2CE2DA8AB78B6C8C72A8D082DB5464FBCF738C0E3147738E6673561CDA2615301004E5AA0C17C48C3A
24,737,085 UART: [art] PUB.Y = 7980CAFCCE4D2704C0D555639DECD302E192BF0B5DFBDCEE61997533EC8115AE1608D43D29BD0F845BD279EEDDE1B821
24,744,352 UART: [art] SIG.R = 892BFB6FF474A97DBD7E004B4221F10A0B92AF08243A00DAB6FC0ED7B793BECBAF62E57244A0039A30D8D2C6E386C503
24,751,755 UART: [art] SIG.S = 8DFFFD829AADE2879240856111DB3AEF3E168845A61CAE2D6275A5024A24EBF25C53DE6910D2262A530E6DFEF729546E
25,730,336 UART: Caliptra RT
25,731,039 UART: [state] CFI Enabled
25,895,193 UART: [rt] RT listening for mailbox commands...
25,897,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,926,853 UART: [rt]cmd =0x46504c54, len=4
25,928,574 >>> mbox cmd response data (8 bytes)
25,929,670 UART: [rt] FIPS self test
25,930,617 UART: [kat] ++
25,931,072 UART: [kat] sha1
25,935,477 UART: [kat] SHA2-256
25,936,328 UART: Fatal Error: 0x90010001
25,971,537 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,116,277 >>> mbox cmd response: failed
26,116,975 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,261,286 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,018 UART:
190,317 UART: Running Caliptra ROM ...
191,344 UART:
191,483 UART: [state] CFI Enabled
257,325 UART: [state] LifecycleState = Unprovisioned
259,191 UART: [state] DebugLocked = No
262,050 UART: [state] WD Timer not started. Device not locked for debugging
265,464 UART: [kat] SHA2-256
444,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,141 UART: [kat] ++
456,590 UART: [kat] sha1
467,519 UART: [kat] SHA2-256
470,523 UART: [kat] SHA2-384
476,407 UART: [kat] SHA2-512-ACC
479,396 UART: [kat] ECC-384
2,941,100 UART: [kat] HMAC-384Kdf
2,962,620 UART: [kat] LMS
3,492,051 UART: [kat] --
3,496,430 UART: [cold-reset] ++
3,498,412 UART: [fht] FHT @ 0x50003400
3,509,448 UART: [idev] ++
3,510,011 UART: [idev] CDI.KEYID = 6
3,511,033 UART: [idev] SUBJECT.KEYID = 7
3,512,144 UART: [idev] UDS.KEYID = 0
3,513,662 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,658,434 UART: [idev] Erasing UDS.KEYID = 0
6,017,143 UART: [idev] Sha1 KeyId Algorithm
6,039,294 UART: [idev] --
6,043,091 UART: [ldev] ++
6,043,726 UART: [ldev] CDI.KEYID = 6
6,044,618 UART: [ldev] SUBJECT.KEYID = 5
6,045,784 UART: [ldev] AUTHORITY.KEYID = 7
6,047,026 UART: [ldev] FE.KEYID = 1
6,091,568 UART: [ldev] Erasing FE.KEYID = 1
8,596,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,026 UART: [ldev] --
10,406,348 UART: [fwproc] Wait for Commands...
10,408,882 UART: [fwproc] Recv command 0x46574c44
10,410,980 UART: [fwproc] Recv'd Img size: 114940 bytes
13,822,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,108 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,282,277 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,377,610 ready_for_fw is high
3,378,002 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,092,686 >>> mbox cmd response: success
18,381,803 UART:
18,382,213 UART: Running Caliptra FMC ...
18,383,365 UART:
18,383,528 UART: [state] CFI Enabled
18,450,560 UART: [fht] FMC Alias Private Key: 7
20,214,807 UART: [art] Extend RT PCRs Done
20,216,052 UART: [art] Lock RT PCRs Done
20,217,626 UART: [art] Populate DV Done
20,223,075 UART: [fht] FMC Alias Private Key: 7
20,224,685 UART: [art] Derive CDI
20,225,433 UART: [art] Store in in slot 0x4
20,282,847 UART: [art] Derive Key Pair
20,283,849 UART: [art] Store priv key in slot 0x5
22,746,987 UART: [art] Derive Key Pair - Done
22,759,930 UART: [art] Signing Cert with AUTHO
22,761,239 UART: RITY.KEYID = 7
24,471,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,946 UART: [art] PUB.X = FA5E2F92E7F48C177E23D13C3125245286685D3E1E3586325B46B42353EF90898F689042D09E132484C9772F2721CF69
24,480,164 UART: [art] PUB.Y = 8F47ACBB5CB329F92B09EAC5FB4CB9BCDF40F16C0683B3C16A9649C5C4FB66B976DBC7F778A65160B43F1418EFE3D198
24,487,411 UART: [art] SIG.R = 7098901C7D75E0CCC84EBE9E30C7CD1183C49E88A20E8929AB390DCBC308E6DE32D9A8FC4EF225A17C7A34384D03C3AA
24,494,882 UART: [art] SIG.S = 5128F206168F575EB0288E40CDD4018DB38AF3E3C67667D169B56CDC67ABAFBA0FA273A94535EEED2CFD32E34F071B18
25,474,147 UART: Caliptra RT
25,474,853 UART: [state] CFI Enabled
25,639,274 UART: [rt] RT listening for mailbox commands...
25,641,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,670,657 UART: [rt]cmd =0x46504c54, len=4
25,672,297 >>> mbox cmd response data (8 bytes)
25,673,625 UART: [rt] FIPS self test
25,674,584 UART: [kat] ++
25,675,035 UART: [kat] sha1
25,679,419 UART: [kat] SHA2-256
25,680,161 UART: Fatal Error: 0x90010001
25,715,338 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,859,701 >>> mbox cmd response: failed
25,860,325 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,004,606 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
3,354,250 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,046,362 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,663 UART:
193,026 UART: Running Caliptra ROM ...
194,244 UART:
603,758 UART: [state] CFI Enabled
617,345 UART: [state] LifecycleState = Unprovisioned
619,223 UART: [state] DebugLocked = No
621,396 UART: [state] WD Timer not started. Device not locked for debugging
625,153 UART: [kat] SHA2-256
804,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,888 UART: [kat] ++
816,419 UART: [kat] sha1
828,436 UART: [kat] SHA2-256
831,465 UART: [kat] SHA2-384
837,463 UART: [kat] SHA2-512-ACC
840,402 UART: [kat] ECC-384
3,280,463 UART: [kat] HMAC-384Kdf
3,293,227 UART: [kat] LMS
3,822,722 UART: [kat] --
3,827,108 UART: [cold-reset] ++
3,828,973 UART: [fht] FHT @ 0x50003400
3,840,129 UART: [idev] ++
3,840,701 UART: [idev] CDI.KEYID = 6
3,841,587 UART: [idev] SUBJECT.KEYID = 7
3,842,843 UART: [idev] UDS.KEYID = 0
3,843,749 ready_for_fw is high
3,843,984 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,988,292 UART: [idev] Erasing UDS.KEYID = 0
6,317,984 UART: [idev] Sha1 KeyId Algorithm
6,341,342 UART: [idev] --
6,346,524 UART: [ldev] ++
6,347,095 UART: [ldev] CDI.KEYID = 6
6,348,011 UART: [ldev] SUBJECT.KEYID = 5
6,349,226 UART: [ldev] AUTHORITY.KEYID = 7
6,350,458 UART: [ldev] FE.KEYID = 1
6,361,536 UART: [ldev] Erasing FE.KEYID = 1
8,831,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,058 UART: [ldev] --
10,624,515 UART: [fwproc] Wait for Commands...
10,626,177 UART: [fwproc] Recv command 0x46574c44
10,628,275 UART: [fwproc] Recv'd Img size: 114940 bytes
14,040,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,986 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,733 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,497,966 >>> mbox cmd response: success
14,501,849 UART: [afmc] ++
14,502,435 UART: [afmc] CDI.KEYID = 6
14,503,318 UART: [afmc] SUBJECT.KEYID = 7
14,504,532 UART: [afmc] AUTHORITY.KEYID = 5
17,007,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,709 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,636 UART: [afmc] --
18,803,163 UART: [cold-reset] --
18,807,098 UART: [state] Locking Datavault
18,810,352 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,054 UART: [state] Locking ICCM
18,814,454 UART: [exit] Launching FMC @ 0x40000130
18,822,853 UART:
18,823,092 UART: Running Caliptra FMC ...
18,824,132 UART:
18,824,279 UART: [state] CFI Enabled
18,832,327 UART: [fht] FMC Alias Private Key: 7
20,589,225 UART: [art] Extend RT PCRs Done
20,590,450 UART: [art] Lock RT PCRs Done
20,592,109 UART: [art] Populate DV Done
20,597,356 UART: [fht] FMC Alias Private Key: 7
20,598,900 UART: [art] Derive CDI
20,599,636 UART: [art] Store in in slot 0x4
20,642,659 UART: [art] Derive Key Pair
20,643,714 UART: [art] Store priv key in slot 0x5
23,070,575 UART: [art] Derive Key Pair - Done
23,083,574 UART: [art] Signing Cert with AUTHO
23,084,876 UART: RITY.KEYID = 7
24,790,453 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,959 UART: [art] PUB.X = 9D34208D9484F59ED0B6E3573DCE0D3EED32BA23FB9F89703CF2FE9F4FED57D111D572AED2082458C666E3DE0DDB9921
24,799,271 UART: [art] PUB.Y = DDDF415D27F0C272A598A4202957EC19A74FAE9DC96FC77C1FABF6CD7B4167D1E20992791C4A5342EF991DF030973903
24,806,510 UART: [art] SIG.R = B79483D51382CDE1463E3603A40C097BCD33B6201DB205FF2FBB1824E163B2C42163CB6260434FD3299C6779ABA1040A
24,813,914 UART: [art] SIG.S = 9D44F5B440936E0DF3EE91844B159DAF33331C89617B65934722033C937B40709B58735519C0C00356D38E8316B45EBD
25,792,999 UART: Caliptra RT
25,793,699 UART: [state] CFI Enabled
25,910,503 UART: [rt] RT listening for mailbox commands...
25,912,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,942,022 UART: [rt]cmd =0x46504c54, len=4
25,943,494 >>> mbox cmd response data (8 bytes)
25,944,614 UART: [rt] FIPS self test
25,945,576 UART: [kat] ++
25,946,028 UART: [kat] sha1
25,950,380 UART: [kat] SHA2-256
25,951,126 UART: Fatal Error: 0x90010001
25,986,230 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,131,004 >>> mbox cmd response: failed
26,131,672 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,276,002 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,131 UART:
190,417 UART: Running Caliptra ROM ...
191,530 UART:
14,249,622 UART: [state] CFI Enabled
14,263,846 UART: [state] LifecycleState = Unprovisioned
14,265,705 UART: [state] DebugLocked = No
14,268,247 UART: [state] WD Timer not started. Device not locked for debugging
14,271,666 UART: [kat] SHA2-256
14,450,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,462,358 UART: [kat] ++
14,462,900 UART: [kat] sha1
14,475,036 UART: [kat] SHA2-256
14,478,053 UART: [kat] SHA2-384
14,484,422 UART: [kat] SHA2-512-ACC
14,487,362 UART: [kat] ECC-384
16,928,236 UART: [kat] HMAC-384Kdf
16,940,507 UART: [kat] LMS
17,470,006 UART: [kat] --
17,473,932 UART: [cold-reset] ++
17,475,681 UART: [fht] FHT @ 0x50003400
17,486,074 UART: [idev] ++
17,486,640 UART: [idev] CDI.KEYID = 6
17,487,574 UART: [idev] SUBJECT.KEYID = 7
17,488,736 UART: [idev] UDS.KEYID = 0
17,490,303 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,634,584 UART: [idev] Erasing UDS.KEYID = 0
19,962,971 UART: [idev] Sha1 KeyId Algorithm
19,986,026 UART: [idev] --
19,989,529 UART: [ldev] ++
19,990,096 UART: [ldev] CDI.KEYID = 6
19,991,004 UART: [ldev] SUBJECT.KEYID = 5
19,992,222 UART: [ldev] AUTHORITY.KEYID = 7
19,993,450 UART: [ldev] FE.KEYID = 1
20,003,553 UART: [ldev] Erasing FE.KEYID = 1
22,477,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,194,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,210,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,226,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,242,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,263,137 UART: [ldev] --
24,267,593 UART: [fwproc] Wait for Commands...
24,270,551 UART: [fwproc] Recv command 0x46574c44
24,272,797 UART: [fwproc] Recv'd Img size: 114940 bytes
27,681,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,754,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,823,002 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,142,469 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,690,323 ready_for_fw is high
3,690,970 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,279,567 >>> mbox cmd response: success
18,530,076 UART:
18,530,468 UART: Running Caliptra FMC ...
18,531,609 UART:
18,531,769 UART: [state] CFI Enabled
18,539,607 UART: [fht] FMC Alias Private Key: 7
20,297,030 UART: [art] Extend RT PCRs Done
20,298,261 UART: [art] Lock RT PCRs Done
20,300,433 UART: [art] Populate DV Done
20,305,906 UART: [fht] FMC Alias Private Key: 7
20,307,354 UART: [art] Derive CDI
20,308,093 UART: [art] Store in in slot 0x4
20,350,747 UART: [art] Derive Key Pair
20,351,793 UART: [art] Store priv key in slot 0x5
22,778,609 UART: [art] Derive Key Pair - Done
22,791,600 UART: [art] Signing Cert with AUTHO
22,792,913 UART: RITY.KEYID = 7
24,498,324 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,826 UART: [art] PUB.X = 97B14FC984F44FC1CBA58DB70D5397EF6D440B21F4578CBAE37EDDB0C7A07DC7B7286EA1CDDA41D9D8327DD17C2E2A3B
24,507,142 UART: [art] PUB.Y = 2F6E423C6F1DB7CCDAEB6592EFCF58A01519655405041F0301F3814BEBE9B509D62890DE3C580AFC69DCCCECB9A44805
24,514,416 UART: [art] SIG.R = 38B4DA0089F342BC39A99239A70CC9A6DA186C8E2CE874FBC0CD649E3199E154A0A8926565577B6C2098D4D52491D917
24,521,773 UART: [art] SIG.S = 6FC0FD952B3D09251FD9CFC8C4418E7F8FAF851C7B293A199206E839748DB8B5827E66C0B6A966998C40194D96C1DEC3
25,501,382 UART: Caliptra RT
25,502,104 UART: [state] CFI Enabled
25,620,226 UART: [rt] RT listening for mailbox commands...
25,622,074 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,651,661 UART: [rt]cmd =0x46504c54, len=4
25,653,163 >>> mbox cmd response data (8 bytes)
25,654,427 UART: [rt] FIPS self test
25,655,370 UART: [kat] ++
25,655,824 UART: [kat] sha1
25,660,040 UART: [kat] SHA2-256
25,660,896 UART: Fatal Error: 0x90010001
25,696,135 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,840,531 >>> mbox cmd response: failed
25,841,163 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,985,446 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
17,650,136 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,237,035 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,197 UART:
192,564 UART: Running Caliptra ROM ...
193,716 UART:
193,863 UART: [state] CFI Enabled
263,390 UART: [state] LifecycleState = Unprovisioned
265,719 UART: [state] DebugLocked = No
267,050 UART: [state] WD Timer not started. Device not locked for debugging
272,021 UART: [kat] SHA2-256
461,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,674 UART: [kat] ++
473,149 UART: [kat] sha1
485,239 UART: [kat] SHA2-256
488,262 UART: [kat] SHA2-384
495,206 UART: [kat] SHA2-512-ACC
497,830 UART: [kat] ECC-384
2,949,950 UART: [kat] HMAC-384Kdf
2,972,024 UART: [kat] LMS
3,503,802 UART: [kat] --
3,508,858 UART: [cold-reset] ++
3,510,724 UART: [fht] FHT @ 0x50003400
3,522,136 UART: [idev] ++
3,522,782 UART: [idev] CDI.KEYID = 6
3,523,772 UART: [idev] SUBJECT.KEYID = 7
3,524,946 UART: [idev] UDS.KEYID = 0
3,525,850 ready_for_fw is high
3,526,093 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,670,748 UART: [idev] Erasing UDS.KEYID = 0
6,031,870 UART: [idev] Sha1 KeyId Algorithm
6,053,456 UART: [idev] --
6,059,457 UART: [ldev] ++
6,060,143 UART: [ldev] CDI.KEYID = 6
6,061,032 UART: [ldev] SUBJECT.KEYID = 5
6,062,158 UART: [ldev] AUTHORITY.KEYID = 7
6,063,449 UART: [ldev] FE.KEYID = 1
6,100,770 UART: [ldev] Erasing FE.KEYID = 1
8,608,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,345 UART: [ldev] --
10,416,513 UART: [fwproc] Wait for Commands...
10,418,191 UART: [fwproc] Recv command 0x46574c44
10,420,468 UART: [fwproc] Recv'd Img size: 114940 bytes
13,873,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,403 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,617,071 >>> mbox cmd response: success
14,620,471 UART: [afmc] ++
14,621,174 UART: [afmc] CDI.KEYID = 6
14,622,336 UART: [afmc] SUBJECT.KEYID = 7
14,623,874 UART: [afmc] AUTHORITY.KEYID = 5
17,165,337 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,907,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,909,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,924,584 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,939,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,954,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,978,467 UART: [afmc] --
18,982,427 UART: [cold-reset] --
18,986,679 UART: [state] Locking Datavault
18,991,828 UART: [state] Locking PCR0, PCR1 and PCR31
18,994,012 UART: [state] Locking ICCM
18,996,254 UART: [exit] Launching FMC @ 0x40000130
19,004,925 UART:
19,005,169 UART: Running Caliptra FMC ...
19,006,277 UART:
19,006,439 UART: [state] CFI Enabled
19,065,184 UART: [fht] FMC Alias Private Key: 7
20,829,910 UART: [art] Extend RT PCRs Done
20,831,137 UART: [art] Lock RT PCRs Done
20,832,518 UART: [art] Populate DV Done
20,838,097 UART: [fht] FMC Alias Private Key: 7
20,839,711 UART: [art] Derive CDI
20,840,529 UART: [art] Store in in slot 0x4
20,897,846 UART: [art] Derive Key Pair
20,898,880 UART: [art] Store priv key in slot 0x5
23,362,009 UART: [art] Derive Key Pair - Done
23,374,684 UART: [art] Signing Cert with AUTHO
23,376,011 UART: RITY.KEYID = 7
25,087,837 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,347 UART: [art] PUB.X = 7ADA155A6929E704F0FE7DA311655027FCF56999DA69F42811B57A85ECDD73760D2D2BB6B1EFBAD5701783E3D0F94C38
25,096,642 UART: [art] PUB.Y = 6B61D676C2E3D1414D29A09F21B73ED9AAE8A7D0A22764BEAA7F4D299D5D38D18EBFEF52C93F7E9C418480957A9FE100
25,103,859 UART: [art] SIG.R = 0A2298758A2FF2595AB430C588A7260559EAB15607887AB8742BCB74F3676347B58FE8D93F2B43E0A7D6BB7CF4ADBFF8
25,111,283 UART: [art] SIG.S = 13BAA32EFD8071239CBB24B3319064D9E502306B9B45EF6B7FFEF934C3B58E4136452818C6472ADCBDCCE988DD04DA17
26,089,720 UART: Caliptra RT
26,090,435 UART: [state] CFI Enabled
26,256,235 UART: [rt] RT listening for mailbox commands...
26,258,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,287,518 UART: [rt]cmd =0x46504c54, len=4
26,289,205 >>> mbox cmd response data (8 bytes)
26,290,125 UART: [rt] FIPS self test
26,291,066 UART: [kat] ++
26,291,517 UART: [kat] sha1
26,295,753 UART: [kat] SHA2-256
26,296,609 UART: Fatal Error: 0x90010001
26,331,989 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,476,478 >>> mbox cmd response: failed
26,477,131 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,621,407 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,110 UART:
190,405 UART: Running Caliptra ROM ...
191,514 UART:
191,684 UART: [state] CFI Enabled
258,221 UART: [state] LifecycleState = Unprovisioned
260,599 UART: [state] DebugLocked = No
262,973 UART: [state] WD Timer not started. Device not locked for debugging
267,365 UART: [kat] SHA2-256
457,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,044 UART: [kat] ++
468,496 UART: [kat] sha1
480,402 UART: [kat] SHA2-256
483,416 UART: [kat] SHA2-384
489,992 UART: [kat] SHA2-512-ACC
492,602 UART: [kat] ECC-384
2,938,863 UART: [kat] HMAC-384Kdf
2,964,531 UART: [kat] LMS
3,496,293 UART: [kat] --
3,500,264 UART: [cold-reset] ++
3,502,820 UART: [fht] FHT @ 0x50003400
3,513,480 UART: [idev] ++
3,514,167 UART: [idev] CDI.KEYID = 6
3,515,188 UART: [idev] SUBJECT.KEYID = 7
3,516,348 UART: [idev] UDS.KEYID = 0
3,517,865 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,662,363 UART: [idev] Erasing UDS.KEYID = 0
6,021,698 UART: [idev] Sha1 KeyId Algorithm
6,044,934 UART: [idev] --
6,050,366 UART: [ldev] ++
6,051,069 UART: [ldev] CDI.KEYID = 6
6,051,990 UART: [ldev] SUBJECT.KEYID = 5
6,053,154 UART: [ldev] AUTHORITY.KEYID = 7
6,054,336 UART: [ldev] FE.KEYID = 1
6,092,098 UART: [ldev] Erasing FE.KEYID = 1
8,594,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,283 UART: [ldev] --
10,405,953 UART: [fwproc] Wait for Commands...
10,407,614 UART: [fwproc] Recv command 0x46574c44
10,409,878 UART: [fwproc] Recv'd Img size: 114940 bytes
13,868,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,018 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,613,796 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,440,287 ready_for_fw is high
3,440,732 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,741,206 >>> mbox cmd response: success
19,029,837 UART:
19,030,229 UART: Running Caliptra FMC ...
19,031,569 UART:
19,031,738 UART: [state] CFI Enabled
19,095,058 UART: [fht] FMC Alias Private Key: 7
20,859,526 UART: [art] Extend RT PCRs Done
20,860,754 UART: [art] Lock RT PCRs Done
20,862,574 UART: [art] Populate DV Done
20,868,047 UART: [fht] FMC Alias Private Key: 7
20,869,645 UART: [art] Derive CDI
20,870,380 UART: [art] Store in in slot 0x4
20,927,907 UART: [art] Derive Key Pair
20,928,953 UART: [art] Store priv key in slot 0x5
23,392,059 UART: [art] Derive Key Pair - Done
23,405,016 UART: [art] Signing Cert with AUTHO
23,406,324 UART: RITY.KEYID = 7
25,118,035 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,557 UART: [art] PUB.X = D997924935D84BF787A5410941A25F2AB3AB45EEE81928EF0ADCAF0E34176E5CB399308EDFB42DEA55C1683A1AE10705
25,126,852 UART: [art] PUB.Y = 7BAABC5111F509D8BC1BA75F2BDFA58E14BD308195A028C793A49F6B68B32C6E97453171051BDBA21404C827A279BF64
25,134,119 UART: [art] SIG.R = 56CD367E7E479230CC70F2C729504F0322E8F62C4C2A911D447E2FC6F7747632AE8518269BA5D302E34BCFEEFE174E4B
25,141,511 UART: [art] SIG.S = A43B23CDEB688157482B0701DCA26EC68CE212D052D73E0FC42BF9A94B2FDFBC9B9BA74B403E75FE288BE9708E505DC5
26,121,007 UART: Caliptra RT
26,121,733 UART: [state] CFI Enabled
26,286,806 UART: [rt] RT listening for mailbox commands...
26,288,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,318,291 UART: [rt]cmd =0x46504c54, len=4
26,319,976 >>> mbox cmd response data (8 bytes)
26,320,916 UART: [rt] FIPS self test
26,321,857 UART: [kat] ++
26,322,312 UART: [kat] sha1
26,326,619 UART: [kat] SHA2-256
26,327,454 UART: Fatal Error: 0x90010001
26,362,733 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,507,088 >>> mbox cmd response: failed
26,507,744 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,652,057 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,432,107 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,748,008 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,522 UART:
192,903 UART: Running Caliptra ROM ...
194,011 UART:
603,854 UART: [state] CFI Enabled
618,354 UART: [state] LifecycleState = Unprovisioned
620,727 UART: [state] DebugLocked = No
622,607 UART: [state] WD Timer not started. Device not locked for debugging
627,777 UART: [kat] SHA2-256
817,673 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,449 UART: [kat] ++
828,973 UART: [kat] sha1
840,343 UART: [kat] SHA2-256
843,382 UART: [kat] SHA2-384
849,381 UART: [kat] SHA2-512-ACC
851,967 UART: [kat] ECC-384
3,295,001 UART: [kat] HMAC-384Kdf
3,307,336 UART: [kat] LMS
3,839,200 UART: [kat] --
3,843,054 UART: [cold-reset] ++
3,844,280 UART: [fht] FHT @ 0x50003400
3,856,469 UART: [idev] ++
3,857,188 UART: [idev] CDI.KEYID = 6
3,858,102 UART: [idev] SUBJECT.KEYID = 7
3,859,357 UART: [idev] UDS.KEYID = 0
3,860,264 ready_for_fw is high
3,860,472 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,005,333 UART: [idev] Erasing UDS.KEYID = 0
6,340,493 UART: [idev] Sha1 KeyId Algorithm
6,362,199 UART: [idev] --
6,368,414 UART: [ldev] ++
6,369,091 UART: [ldev] CDI.KEYID = 6
6,369,971 UART: [ldev] SUBJECT.KEYID = 5
6,371,182 UART: [ldev] AUTHORITY.KEYID = 7
6,372,415 UART: [ldev] FE.KEYID = 1
6,381,629 UART: [ldev] Erasing FE.KEYID = 1
8,859,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,197 UART: [ldev] --
10,649,919 UART: [fwproc] Wait for Commands...
10,651,902 UART: [fwproc] Recv command 0x46574c44
10,654,216 UART: [fwproc] Recv'd Img size: 114940 bytes
14,099,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,382 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,838,675 >>> mbox cmd response: success
14,842,479 UART: [afmc] ++
14,843,174 UART: [afmc] CDI.KEYID = 6
14,844,336 UART: [afmc] SUBJECT.KEYID = 7
14,845,870 UART: [afmc] AUTHORITY.KEYID = 5
17,348,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,613 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,107 UART: [afmc] --
19,142,646 UART: [cold-reset] --
19,146,511 UART: [state] Locking Datavault
19,152,146 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,336 UART: [state] Locking ICCM
19,155,872 UART: [exit] Launching FMC @ 0x40000130
19,164,537 UART:
19,164,772 UART: Running Caliptra FMC ...
19,165,877 UART:
19,166,033 UART: [state] CFI Enabled
19,174,140 UART: [fht] FMC Alias Private Key: 7
20,930,334 UART: [art] Extend RT PCRs Done
20,931,550 UART: [art] Lock RT PCRs Done
20,933,504 UART: [art] Populate DV Done
20,939,027 UART: [fht] FMC Alias Private Key: 7
20,940,676 UART: [art] Derive CDI
20,941,489 UART: [art] Store in in slot 0x4
20,983,813 UART: [art] Derive Key Pair
20,984,876 UART: [art] Store priv key in slot 0x5
23,411,999 UART: [art] Derive Key Pair - Done
23,424,786 UART: [art] Signing Cert with AUTHO
23,426,099 UART: RITY.KEYID = 7
25,131,561 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,063 UART: [art] PUB.X = 47DE38510BBB65643A052A1A6C497A3AB3DC9E64CEE845D0DBE91DACB5BF8A25043CA134A6AD2055E9DAF2C5202F94A7
25,140,370 UART: [art] PUB.Y = ED89DA09DBDAED4B3AE4BA2D321525455BF5C39199D34BAD7915176A7D218A2AA94ADC6FF690BDEB316A3BDD21034447
25,147,644 UART: [art] SIG.R = F18FC136491C7AFFD96C17588254F0189118940ECE2AD45DFF9E65FDBD5B9C28B7328F850F54FB13E2C6A0365EEBCCA7
25,155,001 UART: [art] SIG.S = 74CF6A3B78F330A4EB2F081FC059ED0D9506DB4A052B322EFD4335E2B15828DA8A0A16904DD58D129A06E01DD0A8A8EE
26,134,187 UART: Caliptra RT
26,134,875 UART: [state] CFI Enabled
26,252,169 UART: [rt] RT listening for mailbox commands...
26,254,015 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,283,685 UART: [rt]cmd =0x46504c54, len=4
26,285,400 >>> mbox cmd response data (8 bytes)
26,286,306 UART: [rt] FIPS self test
26,287,273 UART: [kat] ++
26,287,726 UART: [kat] sha1
26,292,128 UART: [kat] SHA2-256
26,292,865 UART: Fatal Error: 0x90010001
26,328,072 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,472,473 >>> mbox cmd response: failed
26,473,114 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,617,473 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,140 UART:
190,428 UART: Running Caliptra ROM ...
191,455 UART:
13,905,799 UART: [state] CFI Enabled
13,917,749 UART: [state] LifecycleState = Unprovisioned
13,920,151 UART: [state] DebugLocked = No
13,923,064 UART: [state] WD Timer not started. Device not locked for debugging
13,927,403 UART: [kat] SHA2-256
14,117,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,128,098 UART: [kat] ++
14,128,647 UART: [kat] sha1
14,139,437 UART: [kat] SHA2-256
14,142,444 UART: [kat] SHA2-384
14,148,320 UART: [kat] SHA2-512-ACC
14,150,885 UART: [kat] ECC-384
16,590,934 UART: [kat] HMAC-384Kdf
16,603,811 UART: [kat] LMS
17,135,631 UART: [kat] --
17,140,770 UART: [cold-reset] ++
17,141,683 UART: [fht] FHT @ 0x50003400
17,153,737 UART: [idev] ++
17,154,472 UART: [idev] CDI.KEYID = 6
17,155,375 UART: [idev] SUBJECT.KEYID = 7
17,156,591 UART: [idev] UDS.KEYID = 0
17,158,113 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,302,399 UART: [idev] Erasing UDS.KEYID = 0
19,636,384 UART: [idev] Sha1 KeyId Algorithm
19,658,782 UART: [idev] --
19,663,716 UART: [ldev] ++
19,664,399 UART: [ldev] CDI.KEYID = 6
19,665,277 UART: [ldev] SUBJECT.KEYID = 5
19,666,429 UART: [ldev] AUTHORITY.KEYID = 7
19,667,714 UART: [ldev] FE.KEYID = 1
19,678,821 UART: [ldev] Erasing FE.KEYID = 1
22,157,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,876,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,891,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,906,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,922,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,941,983 UART: [ldev] --
23,946,815 UART: [fwproc] Wait for Commands...
23,949,179 UART: [fwproc] Recv command 0x46574c44
23,951,486 UART: [fwproc] Recv'd Img size: 114940 bytes
27,408,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,486,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,602,376 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,147,745 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,753,241 ready_for_fw is high
3,753,915 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,979,347 >>> mbox cmd response: success
19,234,086 UART:
19,234,492 UART: Running Caliptra FMC ...
19,235,705 UART:
19,235,872 UART: [state] CFI Enabled
19,243,863 UART: [fht] FMC Alias Private Key: 7
21,000,796 UART: [art] Extend RT PCRs Done
21,002,023 UART: [art] Lock RT PCRs Done
21,003,715 UART: [art] Populate DV Done
21,009,082 UART: [fht] FMC Alias Private Key: 7
21,010,686 UART: [art] Derive CDI
21,011,504 UART: [art] Store in in slot 0x4
21,054,099 UART: [art] Derive Key Pair
21,055,108 UART: [art] Store priv key in slot 0x5
23,482,412 UART: [art] Derive Key Pair - Done
23,495,300 UART: [art] Signing Cert with AUTHO
23,496,613 UART: RITY.KEYID = 7
25,201,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,291 UART: [art] PUB.X = AFA07FD8DFA17E9196B5A7E74794E16018B275CE1A0B76C74E916C6099E9CEC48FD2BC432DA18FE93011D669861250E9
25,210,537 UART: [art] PUB.Y = 6770640DC2E9769B26C45013D13BFCF83155BF777EA0C34B22625626C7D904B6851B5FD399271705733B1A33A90E9EC2
25,217,773 UART: [art] SIG.R = 0C40180F639767D8FC3DA0C9D1F9F954AD822C93B4BBFF52BDE648C9E63FF375875206A734D1293D4A95B5EA0BB4696E
25,225,156 UART: [art] SIG.S = FD491F82CA1F83EF5115E5FF0AA4D422B92E4E62CAB9540CC3CE210FBBBF70A68385272FEC69FE87B572DF03C7585976
26,203,771 UART: Caliptra RT
26,204,462 UART: [state] CFI Enabled
26,322,598 UART: [rt] RT listening for mailbox commands...
26,324,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,353,991 UART: [rt]cmd =0x46504c54, len=4
26,355,730 >>> mbox cmd response data (8 bytes)
26,356,943 UART: [rt] FIPS self test
26,357,923 UART: [kat] ++
26,358,380 UART: [kat] sha1
26,362,595 UART: [kat] SHA2-256
26,363,504 UART: Fatal Error: 0x90010001
26,398,727 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,543,394 >>> mbox cmd response: failed
26,544,029 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,688,301 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
16,993,273 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,218,305 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,323 UART: [kat] SHA2-256
882,254 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,369 UART: [kat] ++
886,521 UART: [kat] sha1
890,895 UART: [kat] SHA2-256
892,833 UART: [kat] SHA2-384
895,560 UART: [kat] SHA2-512-ACC
897,461 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,568 UART: [kat] LMS
1,475,764 UART: [kat] --
1,476,555 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,830 UART: [idev] ++
1,479,998 UART: [idev] CDI.KEYID = 6
1,480,358 UART: [idev] SUBJECT.KEYID = 7
1,480,782 UART: [idev] UDS.KEYID = 0
1,481,127 ready_for_fw is high
1,481,127 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,792 UART: [idev] Erasing UDS.KEYID = 0
1,505,478 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,186 UART: [idev] --
1,515,189 UART: [ldev] ++
1,515,357 UART: [ldev] CDI.KEYID = 6
1,515,720 UART: [ldev] SUBJECT.KEYID = 5
1,516,146 UART: [ldev] AUTHORITY.KEYID = 7
1,516,609 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,546,586 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,586,077 UART: [fwproc] Waiting for Commands...
1,586,796 UART: [fwproc] Received command 0x46574c44
1,587,587 UART: [fwproc] Received Image of size 114940 bytes
2,892,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,050 >>> mbox cmd response: success
3,087,308 UART: [afmc] ++
3,087,476 UART: [afmc] CDI.KEYID = 6
3,087,838 UART: [afmc] SUBJECT.KEYID = 7
3,088,263 UART: [afmc] AUTHORITY.KEYID = 5
3,123,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,680 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,073 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,763 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,622 UART: [afmc] --
3,166,678 UART: [cold-reset] --
3,167,436 UART: [state] Locking Datavault
3,168,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,353 UART: [state] Locking ICCM
3,169,819 UART: [exit] Launching FMC @ 0x40000130
3,175,148 UART:
3,175,164 UART: Running Caliptra FMC ...
3,175,572 UART:
3,175,626 UART: [state] CFI Enabled
3,186,111 UART: [fht] FMC Alias Private Key: 7
3,294,448 UART: [art] Extend RT PCRs Done
3,294,876 UART: [art] Lock RT PCRs Done
3,296,470 UART: [art] Populate DV Done
3,304,803 UART: [fht] FMC Alias Private Key: 7
3,305,983 UART: [art] Derive CDI
3,306,263 UART: [art] Store in in slot 0x4
3,391,710 UART: [art] Derive Key Pair
3,392,070 UART: [art] Store priv key in slot 0x5
3,404,766 UART: [art] Derive Key Pair - Done
3,419,552 UART: [art] Signing Cert with AUTHO
3,420,032 UART: RITY.KEYID = 7
3,435,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,955 UART: [art] PUB.X = 064EAC6D4F3CFAAEB5A0C6CDA9519FC434A061B19E1500CB8B4C070FDF79868592BB0A29959970640244B515FA8F985A
3,442,698 UART: [art] PUB.Y = B37471E600F3E859A8FCA7B9C92A0A15199679AFC90034EEC7CED68BC07AE5E14445A549601A05615587897779B1C34D
3,449,598 UART: [art] SIG.R = 3ACBF6DFE0CBE1EE873D0B79817A82C5F3E642FA7BB218614F14F0DD59EBA928A44F6E14746AB2188CAFCB52540519F7
3,456,380 UART: [art] SIG.S = CBDD7CB87F72C34D4B6E44B0F9025A45FE4D077A31FF3CB436B50A605EBEB3FA8AACBDA93EFC0E2488D9050462035215
3,480,576 UART: Caliptra RT
3,480,829 UART: [state] CFI Enabled
3,588,732 UART: [rt] RT listening for mailbox commands...
3,589,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,126 UART: [rt]cmd =0x46504c54, len=4
3,620,292 >>> mbox cmd response data (8 bytes)
3,620,475 UART: [rt] FIPS self test
3,620,803 UART: [kat] ++
3,620,955 UART: [kat] sha1
3,625,015 UART: [kat] SHA2-256
3,625,417 UART: Fatal Error: 0x90010001
3,626,956 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,626,961 >>> mbox cmd response: failed
3,626,961 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,626,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,937 UART: [kat] SHA2-256
892,875 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
903,228 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,577 UART: [cold-reset] ++
1,477,005 UART: [fht] Storing FHT @ 0x50003400
1,479,736 UART: [idev] ++
1,479,904 UART: [idev] CDI.KEYID = 6
1,480,264 UART: [idev] SUBJECT.KEYID = 7
1,480,688 UART: [idev] UDS.KEYID = 0
1,481,033 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,500 UART: [idev] Erasing UDS.KEYID = 0
1,504,938 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,460 UART: [idev] --
1,514,591 UART: [ldev] ++
1,514,759 UART: [ldev] CDI.KEYID = 6
1,515,122 UART: [ldev] SUBJECT.KEYID = 5
1,515,548 UART: [ldev] AUTHORITY.KEYID = 7
1,516,011 UART: [ldev] FE.KEYID = 1
1,521,093 UART: [ldev] Erasing FE.KEYID = 1
1,546,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,612 UART: [ldev] --
1,586,117 UART: [fwproc] Waiting for Commands...
1,586,768 UART: [fwproc] Received command 0x46574c44
1,587,559 UART: [fwproc] Received Image of size 114940 bytes
2,891,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,539 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,660 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,241 ready_for_fw is high
1,362,241 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,044 >>> mbox cmd response: success
2,996,856 UART:
2,996,872 UART: Running Caliptra FMC ...
2,997,280 UART:
2,997,334 UART: [state] CFI Enabled
3,007,573 UART: [fht] FMC Alias Private Key: 7
3,115,724 UART: [art] Extend RT PCRs Done
3,116,152 UART: [art] Lock RT PCRs Done
3,117,672 UART: [art] Populate DV Done
3,125,703 UART: [fht] FMC Alias Private Key: 7
3,126,667 UART: [art] Derive CDI
3,126,947 UART: [art] Store in in slot 0x4
3,212,840 UART: [art] Derive Key Pair
3,213,200 UART: [art] Store priv key in slot 0x5
3,226,212 UART: [art] Derive Key Pair - Done
3,240,699 UART: [art] Signing Cert with AUTHO
3,241,179 UART: RITY.KEYID = 7
3,256,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,064 UART: [art] PUB.X = 93DA8AF7D1D91D25CEAC79F9510C726D61EF3CE291BCDD60BB2DF36B7645C5756AC65F3A27BE727B9E266179899759B6
3,263,843 UART: [art] PUB.Y = 20D3842EAF8A17C7B9A9437D46AC28880CC4FFC9D0A9A0043553DDF8D37639A5D7EE6A01B22E6EC944F856C1231BC263
3,270,794 UART: [art] SIG.R = CCBACE95FF036A0E3C0D47F807F52F646D340C312A2FF50A732D5FA6FD83244B546B1B3E0E8E8A6895AD55EEB699BBDD
3,277,565 UART: [art] SIG.S = 9EB5BAF2A364E19AAD0CADAE47BAEFBDC4AD7D5360F41EB6D6C692FD160DCC08498BEFB4AD27B58D257544AF12A3F87C
3,301,615 UART: Caliptra RT
3,301,868 UART: [state] CFI Enabled
3,410,112 UART: [rt] RT listening for mailbox commands...
3,410,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,392 UART: [rt]cmd =0x46504c54, len=4
3,441,540 >>> mbox cmd response data (8 bytes)
3,441,907 UART: [rt] FIPS self test
3,442,235 UART: [kat] ++
3,442,387 UART: [kat] sha1
3,446,433 UART: [kat] SHA2-256
3,446,803 UART: Fatal Error: 0x90010001
3,448,342 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,448,347 >>> mbox cmd response: failed
3,448,347 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,448,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,907 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,292 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,417 UART: [kat] SHA2-512-ACC
897,318 UART: [kat] ECC-384
902,981 UART: [kat] HMAC-384Kdf
907,757 UART: [kat] LMS
1,475,953 UART: [kat] --
1,476,944 UART: [cold-reset] ++
1,477,326 UART: [fht] Storing FHT @ 0x50003400
1,480,083 UART: [idev] ++
1,480,251 UART: [idev] CDI.KEYID = 6
1,480,611 UART: [idev] SUBJECT.KEYID = 7
1,481,035 UART: [idev] UDS.KEYID = 0
1,481,380 ready_for_fw is high
1,481,380 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,506,147 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,751 UART: [idev] --
1,515,740 UART: [ldev] ++
1,515,908 UART: [ldev] CDI.KEYID = 6
1,516,271 UART: [ldev] SUBJECT.KEYID = 5
1,516,697 UART: [ldev] AUTHORITY.KEYID = 7
1,517,160 UART: [ldev] FE.KEYID = 1
1,522,290 UART: [ldev] Erasing FE.KEYID = 1
1,548,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,997 UART: [ldev] --
1,587,388 UART: [fwproc] Waiting for Commands...
1,588,035 UART: [fwproc] Received command 0x46574c44
1,588,826 UART: [fwproc] Received Image of size 114940 bytes
2,893,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,290 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,525 >>> mbox cmd response: success
3,087,593 UART: [afmc] ++
3,087,761 UART: [afmc] CDI.KEYID = 6
3,088,123 UART: [afmc] SUBJECT.KEYID = 7
3,088,548 UART: [afmc] AUTHORITY.KEYID = 5
3,124,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,660 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,350 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,053 UART: [afmc] --
3,167,129 UART: [cold-reset] --
3,167,879 UART: [state] Locking Datavault
3,168,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,516 UART: [state] Locking ICCM
3,170,114 UART: [exit] Launching FMC @ 0x40000130
3,175,443 UART:
3,175,459 UART: Running Caliptra FMC ...
3,175,867 UART:
3,176,010 UART: [state] CFI Enabled
3,186,603 UART: [fht] FMC Alias Private Key: 7
3,294,858 UART: [art] Extend RT PCRs Done
3,295,286 UART: [art] Lock RT PCRs Done
3,296,886 UART: [art] Populate DV Done
3,305,303 UART: [fht] FMC Alias Private Key: 7
3,306,305 UART: [art] Derive CDI
3,306,585 UART: [art] Store in in slot 0x4
3,392,468 UART: [art] Derive Key Pair
3,392,828 UART: [art] Store priv key in slot 0x5
3,406,502 UART: [art] Derive Key Pair - Done
3,421,040 UART: [art] Signing Cert with AUTHO
3,421,520 UART: RITY.KEYID = 7
3,436,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,523 UART: [art] PUB.X = 9A442BE4E3C04F375204E1657752F74AA4DA1AB03A8D381EBAB3D382499CCFEA46E67C849D53A039E4CA8ACA2506C60C
3,444,298 UART: [art] PUB.Y = F347EB342FB57EDA50F1F0F26B21FAD51709E3D00B9F46C8E74574B7F83F673F1A8C4D4D1CD62C353BEF15B4CB9FB3B6
3,451,262 UART: [art] SIG.R = EA32B54B6F85FAA7828D7DF351B1C7C63752386AD10D5C264E0E4B47B76F00E4E63AA574A35BC10E3F8710AC02F4D338
3,458,008 UART: [art] SIG.S = 78B14FDA4721451B03514E871322DA9FC6CB0899553120634DFAC6E6D7AD3643669F4F651816416DB1D51A029F82FBD6
3,481,870 UART: Caliptra RT
3,482,215 UART: [state] CFI Enabled
3,590,108 UART: [rt] RT listening for mailbox commands...
3,590,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,712 UART: [rt]cmd =0x46504c54, len=4
3,621,716 >>> mbox cmd response data (8 bytes)
3,621,875 UART: [rt] FIPS self test
3,622,203 UART: [kat] ++
3,622,355 UART: [kat] sha1
3,626,661 UART: [kat] SHA2-256
3,627,219 UART: Fatal Error: 0x90010001
3,628,758 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,628,763 >>> mbox cmd response: failed
3,628,763 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,628,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,378 UART: [kat] SHA2-256
882,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,424 UART: [kat] ++
886,576 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,853 UART: [kat] HMAC-384Kdf
907,577 UART: [kat] LMS
1,475,773 UART: [kat] --
1,476,662 UART: [cold-reset] ++
1,477,092 UART: [fht] Storing FHT @ 0x50003400
1,479,853 UART: [idev] ++
1,480,021 UART: [idev] CDI.KEYID = 6
1,480,381 UART: [idev] SUBJECT.KEYID = 7
1,480,805 UART: [idev] UDS.KEYID = 0
1,481,150 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,223 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,887 UART: [idev] --
1,514,964 UART: [ldev] ++
1,515,132 UART: [ldev] CDI.KEYID = 6
1,515,495 UART: [ldev] SUBJECT.KEYID = 5
1,515,921 UART: [ldev] AUTHORITY.KEYID = 7
1,516,384 UART: [ldev] FE.KEYID = 1
1,521,516 UART: [ldev] Erasing FE.KEYID = 1
1,547,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,439 UART: [ldev] --
1,586,940 UART: [fwproc] Waiting for Commands...
1,587,737 UART: [fwproc] Received command 0x46574c44
1,588,528 UART: [fwproc] Received Image of size 114940 bytes
2,893,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,317 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,662 ready_for_fw is high
1,362,662 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,761 >>> mbox cmd response: success
2,997,719 UART:
2,997,735 UART: Running Caliptra FMC ...
2,998,143 UART:
2,998,286 UART: [state] CFI Enabled
3,008,661 UART: [fht] FMC Alias Private Key: 7
3,116,724 UART: [art] Extend RT PCRs Done
3,117,152 UART: [art] Lock RT PCRs Done
3,118,568 UART: [art] Populate DV Done
3,126,911 UART: [fht] FMC Alias Private Key: 7
3,128,049 UART: [art] Derive CDI
3,128,329 UART: [art] Store in in slot 0x4
3,214,026 UART: [art] Derive Key Pair
3,214,386 UART: [art] Store priv key in slot 0x5
3,227,416 UART: [art] Derive Key Pair - Done
3,242,148 UART: [art] Signing Cert with AUTHO
3,242,628 UART: RITY.KEYID = 7
3,257,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,725 UART: [art] PUB.X = B9E705606C717ADCE525226FA1A7EE0E2D81F5D69BA2039917CDCF78392C2343273D83398634842DE8CDEA1BC57CBD6C
3,265,496 UART: [art] PUB.Y = B326394FD06CFC819BA2F81FEB518470EA29A217184180B079A5996D6AFC6F67C0D4BF9689188E37D711A249228797BF
3,272,446 UART: [art] SIG.R = 92D3DF00898BF6AE029D05E5BCFDF1F31BEBA5B8CE9A91C782F4AFBFEF8FC018F628B454C5AFA5058BF1CEAE64B7C0AA
3,279,221 UART: [art] SIG.S = 404A527F252EF0706D6C46E24941B47BF9F42CC9972651B174B62C625EE5AF9034D8651986A43C6CE49D00E0BD825A63
3,303,050 UART: Caliptra RT
3,303,395 UART: [state] CFI Enabled
3,411,080 UART: [rt] RT listening for mailbox commands...
3,411,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,586 UART: [rt]cmd =0x46504c54, len=4
3,442,684 >>> mbox cmd response data (8 bytes)
3,443,007 UART: [rt] FIPS self test
3,443,335 UART: [kat] ++
3,443,487 UART: [kat] sha1
3,447,533 UART: [kat] SHA2-256
3,448,011 UART: Fatal Error: 0x90010001
3,449,550 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,449,555 >>> mbox cmd response: failed
3,449,555 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,449,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,204 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,237 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
901,965 UART: [kat] SHA2-256
903,905 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,118 UART: [kat] HMAC-384Kdf
922,554 UART: [kat] LMS
1,170,882 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,113 UART: [fht] FHT @ 0x50003400
1,174,702 UART: [idev] ++
1,174,870 UART: [idev] CDI.KEYID = 6
1,175,230 UART: [idev] SUBJECT.KEYID = 7
1,175,654 UART: [idev] UDS.KEYID = 0
1,175,999 ready_for_fw is high
1,175,999 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,387 UART: [idev] Sha1 KeyId Algorithm
1,208,889 UART: [idev] --
1,209,839 UART: [ldev] ++
1,210,007 UART: [ldev] CDI.KEYID = 6
1,210,370 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,517 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,388 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,322 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,971 >>> mbox cmd response: success
2,783,157 UART: [afmc] ++
2,783,325 UART: [afmc] CDI.KEYID = 6
2,783,687 UART: [afmc] SUBJECT.KEYID = 7
2,784,112 UART: [afmc] AUTHORITY.KEYID = 5
2,819,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,460 UART: [afmc] --
2,862,486 UART: [cold-reset] --
2,863,228 UART: [state] Locking Datavault
2,864,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,831 UART: [state] Locking ICCM
2,865,411 UART: [exit] Launching FMC @ 0x40000130
2,870,740 UART:
2,870,756 UART: Running Caliptra FMC ...
2,871,164 UART:
2,871,218 UART: [state] CFI Enabled
2,881,653 UART: [fht] FMC Alias Private Key: 7
2,989,820 UART: [art] Extend RT PCRs Done
2,990,248 UART: [art] Lock RT PCRs Done
2,991,960 UART: [art] Populate DV Done
3,000,249 UART: [fht] FMC Alias Private Key: 7
3,001,331 UART: [art] Derive CDI
3,001,611 UART: [art] Store in in slot 0x4
3,087,284 UART: [art] Derive Key Pair
3,087,644 UART: [art] Store priv key in slot 0x5
3,100,962 UART: [art] Derive Key Pair - Done
3,115,458 UART: [art] Signing Cert with AUTHO
3,115,938 UART: RITY.KEYID = 7
3,130,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,729 UART: [art] PUB.X = EBBB432A329DD83AEA951B275F98B25211F8EC8A720BA0BE493FC7F37D50314CB147D8A811D825D3A94819477FEBE645
3,138,506 UART: [art] PUB.Y = 48FD66132B13258316A2D4340121ECC57635F370EC95F121092A79663C186ED106EFABBF009D4D76FD04CD9A3A0C7927
3,145,419 UART: [art] SIG.R = A4142897FCAD1B2245A77AB3BD497947F8AB90AA3EF9ABEC930CDB331247CF270592D98DF25BEF308EC44CB10BCC171E
3,152,200 UART: [art] SIG.S = ECA1C55F67EF6CADFD5C94F3A1B1F0A39DDF81151A3914CE9B170121DEA4D21194C7FCB99E08FAE3C345F261D96AEEAA
3,175,645 UART: Caliptra RT
3,175,898 UART: [state] CFI Enabled
3,283,486 UART: [rt] RT listening for mailbox commands...
3,284,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,716 UART: [rt]cmd =0x46504c54, len=4
3,314,968 >>> mbox cmd response data (8 bytes)
3,315,265 UART: [rt] FIPS self test
3,315,593 UART: [kat] ++
3,315,745 UART: [kat] sha1
3,319,881 UART: [kat] SHA2-256
3,320,401 UART: Fatal Error: 0x90010001
3,321,940 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,945 >>> mbox cmd response: failed
3,321,945 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,321,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
893,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,703 UART: [kat] ++
897,855 UART: [kat] sha1
902,113 UART: [kat] SHA2-256
904,053 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,282 UART: [kat] HMAC-384Kdf
923,094 UART: [kat] LMS
1,171,422 UART: [kat] --
1,172,681 UART: [cold-reset] ++
1,173,125 UART: [fht] FHT @ 0x50003400
1,175,804 UART: [idev] ++
1,175,972 UART: [idev] CDI.KEYID = 6
1,176,332 UART: [idev] SUBJECT.KEYID = 7
1,176,756 UART: [idev] UDS.KEYID = 0
1,177,101 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,442 UART: [idev] Erasing UDS.KEYID = 0
1,201,151 UART: [idev] Sha1 KeyId Algorithm
1,209,381 UART: [idev] --
1,210,449 UART: [ldev] ++
1,210,617 UART: [ldev] CDI.KEYID = 6
1,210,980 UART: [ldev] SUBJECT.KEYID = 5
1,211,406 UART: [ldev] AUTHORITY.KEYID = 7
1,211,869 UART: [ldev] FE.KEYID = 1
1,217,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,565 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,652 UART: [fwproc] Recv command 0x46574c44
1,284,380 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,488 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,335 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 ready_for_fw is high
1,060,537 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,100 >>> mbox cmd response: success
2,694,644 UART:
2,694,660 UART: Running Caliptra FMC ...
2,695,068 UART:
2,695,122 UART: [state] CFI Enabled
2,705,777 UART: [fht] FMC Alias Private Key: 7
2,813,446 UART: [art] Extend RT PCRs Done
2,813,874 UART: [art] Lock RT PCRs Done
2,815,608 UART: [art] Populate DV Done
2,823,739 UART: [fht] FMC Alias Private Key: 7
2,824,735 UART: [art] Derive CDI
2,825,015 UART: [art] Store in in slot 0x4
2,910,528 UART: [art] Derive Key Pair
2,910,888 UART: [art] Store priv key in slot 0x5
2,924,658 UART: [art] Derive Key Pair - Done
2,939,587 UART: [art] Signing Cert with AUTHO
2,940,067 UART: RITY.KEYID = 7
2,955,401 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,166 UART: [art] PUB.X = 46643D751D185A85FD8FBA12BFD0BEA172A546EBFD5E5EE3F56A31C67A444424732ADE2B378A33FEF149BA8278552AEA
2,962,952 UART: [art] PUB.Y = 42DD0B12C1C69CB48EE71E927794211E44F9601C7619B46D24A81D0A8E4A2FD9028A6BC055B129FBB5B394D2AA118D0B
2,969,898 UART: [art] SIG.R = 8C890D3C1C9F8B6E56DDC883BFA35AE02A3F0A7ED356E9DB56BA67B66786849FA38C31AAB92B6D4FFA9663BA79481805
2,976,675 UART: [art] SIG.S = 56AB37C5FB35756AE8ECB5509FF2C17D6B841E756695A7DCC3056D376F77DD9E5B9BE0A066363052BF86AA4E867BC7A8
3,000,417 UART: Caliptra RT
3,000,670 UART: [state] CFI Enabled
3,109,229 UART: [rt] RT listening for mailbox commands...
3,109,892 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,907 UART: [rt]cmd =0x46504c54, len=4
3,141,191 >>> mbox cmd response data (8 bytes)
3,141,550 UART: [rt] FIPS self test
3,141,878 UART: [kat] ++
3,142,030 UART: [kat] sha1
3,146,322 UART: [kat] SHA2-256
3,146,712 UART: Fatal Error: 0x90010001
3,148,251 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,256 >>> mbox cmd response: failed
3,148,256 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,219 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,458 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,497 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,452 UART: [cold-reset] ++
1,172,968 UART: [fht] FHT @ 0x50003400
1,175,495 UART: [idev] ++
1,175,663 UART: [idev] CDI.KEYID = 6
1,176,023 UART: [idev] SUBJECT.KEYID = 7
1,176,447 UART: [idev] UDS.KEYID = 0
1,176,792 ready_for_fw is high
1,176,792 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,627 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,982 UART: [idev] --
1,211,068 UART: [ldev] ++
1,211,236 UART: [ldev] CDI.KEYID = 6
1,211,599 UART: [ldev] SUBJECT.KEYID = 5
1,212,025 UART: [ldev] AUTHORITY.KEYID = 7
1,212,488 UART: [ldev] FE.KEYID = 1
1,217,864 UART: [ldev] Erasing FE.KEYID = 1
1,243,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,738 UART: [ldev] --
1,283,117 UART: [fwproc] Wait for Commands...
1,283,867 UART: [fwproc] Recv command 0x46574c44
1,284,595 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,419 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,723 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,530 >>> mbox cmd response: success
2,782,646 UART: [afmc] ++
2,782,814 UART: [afmc] CDI.KEYID = 6
2,783,176 UART: [afmc] SUBJECT.KEYID = 7
2,783,601 UART: [afmc] AUTHORITY.KEYID = 5
2,819,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,417 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,021 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,735 UART: [afmc] --
2,862,799 UART: [cold-reset] --
2,863,681 UART: [state] Locking Datavault
2,864,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,570 UART: [state] Locking ICCM
2,866,084 UART: [exit] Launching FMC @ 0x40000130
2,871,413 UART:
2,871,429 UART: Running Caliptra FMC ...
2,871,837 UART:
2,871,980 UART: [state] CFI Enabled
2,882,929 UART: [fht] FMC Alias Private Key: 7
2,990,722 UART: [art] Extend RT PCRs Done
2,991,150 UART: [art] Lock RT PCRs Done
2,992,338 UART: [art] Populate DV Done
3,000,541 UART: [fht] FMC Alias Private Key: 7
3,001,705 UART: [art] Derive CDI
3,001,985 UART: [art] Store in in slot 0x4
3,087,870 UART: [art] Derive Key Pair
3,088,230 UART: [art] Store priv key in slot 0x5
3,101,908 UART: [art] Derive Key Pair - Done
3,116,776 UART: [art] Signing Cert with AUTHO
3,117,256 UART: RITY.KEYID = 7
3,132,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,189 UART: [art] PUB.X = 982BF973D9313B7296A4EF3D8E43FA34B51812F2103D7AE64930C63A23F1C39E28BA729B9D0E64B5F2B2485EEDF40A69
3,139,959 UART: [art] PUB.Y = 41DDA9149930916EC8E6D4B9796236ADBC2DC7F63D703A8456E157A3AD1E1A0DDD0C3C8AF620999671AA3A3D7712A795
3,146,911 UART: [art] SIG.R = 3EC671E54ED3FD2CBD94E02A577C4782E438B66C3ED4070CF0054300E4F88693A5FF99A9F890BBDD394544E91B924737
3,153,654 UART: [art] SIG.S = 82790D03DFE484BAF852D491AAAA227B99A74D3939CA383C9765B29970C16327E1BC2D769C62E0A9FD001602D4BF017A
3,177,157 UART: Caliptra RT
3,177,502 UART: [state] CFI Enabled
3,285,285 UART: [rt] RT listening for mailbox commands...
3,285,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,729 UART: [rt]cmd =0x46504c54, len=4
3,316,807 >>> mbox cmd response data (8 bytes)
3,317,068 UART: [rt] FIPS self test
3,317,396 UART: [kat] ++
3,317,548 UART: [kat] sha1
3,321,656 UART: [kat] SHA2-256
3,322,228 UART: Fatal Error: 0x90010001
3,323,767 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,772 >>> mbox cmd response: failed
3,323,772 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,777 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
901,830 UART: [kat] SHA2-256
903,770 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,118 UART: [cold-reset] ++
1,172,444 UART: [fht] FHT @ 0x50003400
1,175,205 UART: [idev] ++
1,175,373 UART: [idev] CDI.KEYID = 6
1,175,733 UART: [idev] SUBJECT.KEYID = 7
1,176,157 UART: [idev] UDS.KEYID = 0
1,176,502 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,819 UART: [idev] Erasing UDS.KEYID = 0
1,201,050 UART: [idev] Sha1 KeyId Algorithm
1,209,484 UART: [idev] --
1,210,620 UART: [ldev] ++
1,210,788 UART: [ldev] CDI.KEYID = 6
1,211,151 UART: [ldev] SUBJECT.KEYID = 5
1,211,577 UART: [ldev] AUTHORITY.KEYID = 7
1,212,040 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,243,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,007 UART: [fwproc] Wait for Commands...
1,283,719 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,433 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,230 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,060 ready_for_fw is high
1,061,060 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,115 >>> mbox cmd response: success
2,698,295 UART:
2,698,311 UART: Running Caliptra FMC ...
2,698,719 UART:
2,698,862 UART: [state] CFI Enabled
2,709,481 UART: [fht] FMC Alias Private Key: 7
2,816,796 UART: [art] Extend RT PCRs Done
2,817,224 UART: [art] Lock RT PCRs Done
2,818,736 UART: [art] Populate DV Done
2,827,061 UART: [fht] FMC Alias Private Key: 7
2,828,171 UART: [art] Derive CDI
2,828,451 UART: [art] Store in in slot 0x4
2,914,302 UART: [art] Derive Key Pair
2,914,662 UART: [art] Store priv key in slot 0x5
2,927,476 UART: [art] Derive Key Pair - Done
2,942,189 UART: [art] Signing Cert with AUTHO
2,942,669 UART: RITY.KEYID = 7
2,958,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,830 UART: [art] PUB.X = A35C488527B782709A75C57C3A7DDDEF008D43666F3C5FD0E7134968D7FE226738D57D2EF119076F4F8750B0837D5018
2,965,571 UART: [art] PUB.Y = FC6C7AC0461B0E7C6E3952BC799642EF19AEFBCE85839C3A0BA5FDFA8507D005E21BBF791AFDCD48166AE462F4107BDA
2,972,533 UART: [art] SIG.R = 6BEB4C600C7A15A5AE3B17D620B652BFF25BC3B1763D60B91182F3434B787D45D284AA052AD6C72D8C4E54BB37663C1E
2,979,307 UART: [art] SIG.S = 539F14BA16413534D7EB1A9007151B91759DC9368D44FC4C39B16B78F58C22521D1E23FB8804367D8A6AF95F46233365
3,002,692 UART: Caliptra RT
3,003,037 UART: [state] CFI Enabled
3,111,022 UART: [rt] RT listening for mailbox commands...
3,111,685 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,138 UART: [rt]cmd =0x46504c54, len=4
3,142,324 >>> mbox cmd response data (8 bytes)
3,142,589 UART: [rt] FIPS self test
3,142,917 UART: [kat] ++
3,143,069 UART: [kat] sha1
3,147,287 UART: [kat] SHA2-256
3,147,881 UART: Fatal Error: 0x90010001
3,149,420 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,425 >>> mbox cmd response: failed
3,149,425 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,065 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,113 UART: [cold-reset] ++
1,169,561 UART: [fht] FHT @ 0x50003400
1,172,321 UART: [idev] ++
1,172,489 UART: [idev] CDI.KEYID = 6
1,172,850 UART: [idev] SUBJECT.KEYID = 7
1,173,275 UART: [idev] UDS.KEYID = 0
1,173,621 ready_for_fw is high
1,173,621 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,285 UART: [idev] Erasing UDS.KEYID = 0
1,198,057 UART: [idev] Sha1 KeyId Algorithm
1,206,909 UART: [idev] --
1,207,860 UART: [ldev] ++
1,208,028 UART: [ldev] CDI.KEYID = 6
1,208,392 UART: [ldev] SUBJECT.KEYID = 5
1,208,819 UART: [ldev] AUTHORITY.KEYID = 7
1,209,282 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,040 UART: [ldev] --
1,280,344 UART: [fwproc] Wait for Commands...
1,281,079 UART: [fwproc] Recv command 0x46574c44
1,281,812 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,275 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,031 >>> mbox cmd response: success
2,782,106 UART: [afmc] ++
2,782,274 UART: [afmc] CDI.KEYID = 6
2,782,637 UART: [afmc] SUBJECT.KEYID = 7
2,783,063 UART: [afmc] AUTHORITY.KEYID = 5
2,818,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,805 UART: [afmc] --
2,861,743 UART: [cold-reset] --
2,862,915 UART: [state] Locking Datavault
2,864,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,820 UART: [state] Locking ICCM
2,865,442 UART: [exit] Launching FMC @ 0x40000130
2,870,771 UART:
2,870,787 UART: Running Caliptra FMC ...
2,871,195 UART:
2,871,249 UART: [state] CFI Enabled
2,881,866 UART: [fht] FMC Alias Private Key: 7
2,989,115 UART: [art] Extend RT PCRs Done
2,989,543 UART: [art] Lock RT PCRs Done
2,991,407 UART: [art] Populate DV Done
2,999,668 UART: [fht] FMC Alias Private Key: 7
3,000,638 UART: [art] Derive CDI
3,000,918 UART: [art] Store in in slot 0x4
3,086,759 UART: [art] Derive Key Pair
3,087,119 UART: [art] Store priv key in slot 0x5
3,099,899 UART: [art] Derive Key Pair - Done
3,114,668 UART: [art] Signing Cert with AUTHO
3,115,148 UART: RITY.KEYID = 7
3,130,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,355 UART: [art] PUB.X = C724FE40B6F2C57578E18D7F9E8DF5DF2613C004BE0929BB2D38CAA3E2D306FD2C453E2D15591427C0D6DAD606FF3B39
3,138,127 UART: [art] PUB.Y = 8FAFBD1DD4E0FFD0B22F105DD53327E81BC88280BFC25522EB33B967079D987B5FA1F8D63C152789D3ADAB9DDACED76C
3,145,098 UART: [art] SIG.R = 3CD5979A6E15EEF90506EA21BD5D8BD6F29AAC02FD5DB1E9547D76EAE71A91C14892EFB741F95A07D7BB0A2400133929
3,151,845 UART: [art] SIG.S = 139337D4ACCCB97183CE3C5EF24254FDB69E59C26312922B853BEFC777F7B0D59573463A74E74C5631D68B0D2E75D42A
3,175,457 UART: Caliptra RT
3,175,710 UART: [state] CFI Enabled
3,283,861 UART: [rt] RT listening for mailbox commands...
3,284,524 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,317 UART: [rt]cmd =0x46504c54, len=4
3,315,459 >>> mbox cmd response data (8 bytes)
3,315,742 UART: [rt] FIPS self test
3,316,070 UART: [kat] ++
3,316,222 UART: [kat] sha1
3,320,586 UART: [kat] SHA2-256
3,321,040 UART: Fatal Error: 0x90010001
3,322,579 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,322,584 >>> mbox cmd response: failed
3,322,584 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,322,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,387 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,174,337 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,774 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,435 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,619 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,231 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,606 ready_for_fw is high
1,055,606 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,113 >>> mbox cmd response: success
2,690,543 UART:
2,690,559 UART: Running Caliptra FMC ...
2,690,967 UART:
2,691,021 UART: [state] CFI Enabled
2,701,652 UART: [fht] FMC Alias Private Key: 7
2,808,967 UART: [art] Extend RT PCRs Done
2,809,395 UART: [art] Lock RT PCRs Done
2,810,699 UART: [art] Populate DV Done
2,818,644 UART: [fht] FMC Alias Private Key: 7
2,819,606 UART: [art] Derive CDI
2,819,886 UART: [art] Store in in slot 0x4
2,905,547 UART: [art] Derive Key Pair
2,905,907 UART: [art] Store priv key in slot 0x5
2,919,147 UART: [art] Derive Key Pair - Done
2,933,734 UART: [art] Signing Cert with AUTHO
2,934,214 UART: RITY.KEYID = 7
2,949,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,081 UART: [art] PUB.X = F2028F066BAE83797F6F290712BD56CA4F1A9E5878D4E1F7D577ADF7ED2A8F969D3253FE7B4B57D11FD8BCC42505E512
2,956,851 UART: [art] PUB.Y = 1CCF625676E4B13360E30F246B6A2E4B91BC09C6611B6B5519A0E25A320F24D418331BACFF91CD3E77D1278332EFEEBE
2,963,802 UART: [art] SIG.R = 2116D6B0E76A9ECB14518CD9F2535D2BEA36AC89AA8C6C39E458FAD2560F2ECDB5695AFE0D5397DEB56D9AA7C80D8122
2,970,583 UART: [art] SIG.S = A71D276EDA2AE368A70C5FB75E58C9BE9997F9E4B0D7177F7F2E76CFEC80FA3730816D457485988F3691D73E01766B21
2,993,940 UART: Caliptra RT
2,994,193 UART: [state] CFI Enabled
3,102,024 UART: [rt] RT listening for mailbox commands...
3,102,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,456 UART: [rt]cmd =0x46504c54, len=4
3,133,766 >>> mbox cmd response data (8 bytes)
3,134,089 UART: [rt] FIPS self test
3,134,417 UART: [kat] ++
3,134,569 UART: [kat] sha1
3,138,653 UART: [kat] SHA2-256
3,139,177 UART: Fatal Error: 0x90010001
3,140,716 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,140,721 >>> mbox cmd response: failed
3,140,721 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,140,726 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,552 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,411 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,222 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,174,768 ready_for_fw is high
1,174,768 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,623 UART: [ldev] ++
1,209,791 UART: [ldev] CDI.KEYID = 6
1,210,155 UART: [ldev] SUBJECT.KEYID = 5
1,210,582 UART: [ldev] AUTHORITY.KEYID = 7
1,211,045 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,949 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,854 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,590 >>> mbox cmd response: success
2,782,829 UART: [afmc] ++
2,782,997 UART: [afmc] CDI.KEYID = 6
2,783,360 UART: [afmc] SUBJECT.KEYID = 7
2,783,786 UART: [afmc] AUTHORITY.KEYID = 5
2,819,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,360 UART: [afmc] --
2,863,334 UART: [cold-reset] --
2,864,182 UART: [state] Locking Datavault
2,865,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,043 UART: [state] Locking ICCM
2,866,641 UART: [exit] Launching FMC @ 0x40000130
2,871,970 UART:
2,871,986 UART: Running Caliptra FMC ...
2,872,394 UART:
2,872,537 UART: [state] CFI Enabled
2,883,160 UART: [fht] FMC Alias Private Key: 7
2,991,021 UART: [art] Extend RT PCRs Done
2,991,449 UART: [art] Lock RT PCRs Done
2,993,205 UART: [art] Populate DV Done
3,001,374 UART: [fht] FMC Alias Private Key: 7
3,002,452 UART: [art] Derive CDI
3,002,732 UART: [art] Store in in slot 0x4
3,088,577 UART: [art] Derive Key Pair
3,088,937 UART: [art] Store priv key in slot 0x5
3,102,309 UART: [art] Derive Key Pair - Done
3,117,265 UART: [art] Signing Cert with AUTHO
3,117,745 UART: RITY.KEYID = 7
3,133,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,852 UART: [art] PUB.X = B64B68D04A06341086CAFBF271D154E25AF2C636D2FF02B56E2C644C54405F363368344B4F89B5EDFFA03764FF4D89E3
3,140,622 UART: [art] PUB.Y = 3AF7B3FD2646D178198F89DC46A6F70C0C15DB40B6FBA1B72F1E3950574BF4DC0E61839B46A8E23BB13B2690CF6B458A
3,147,575 UART: [art] SIG.R = 4702AA9C13F3166A428E200252A0E022602E08789EFD99D23A41D34DC1685FFFAA294C1A0B5F75E75E9FCE578E3690B1
3,154,337 UART: [art] SIG.S = 5A84B27A2B0815E1A211F9FFCBAD8DB620A97E4411946F814C57435BA84AA71250CFC570599846C5AE615B2DD37D251F
3,177,871 UART: Caliptra RT
3,178,216 UART: [state] CFI Enabled
3,285,921 UART: [rt] RT listening for mailbox commands...
3,286,584 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,957 UART: [rt]cmd =0x46504c54, len=4
3,317,131 >>> mbox cmd response data (8 bytes)
3,317,426 UART: [rt] FIPS self test
3,317,754 UART: [kat] ++
3,317,906 UART: [kat] sha1
3,322,034 UART: [kat] SHA2-256
3,322,424 UART: Fatal Error: 0x90010001
3,323,963 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,968 >>> mbox cmd response: failed
3,323,968 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
900,144 UART: [kat] SHA2-256
902,084 UART: [kat] SHA2-384
904,881 UART: [kat] SHA2-512-ACC
906,782 UART: [kat] ECC-384
916,617 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,006 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,175,018 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,698 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,800 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,243,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,473 UART: [ldev] --
1,282,821 UART: [fwproc] Wait for Commands...
1,283,416 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,378 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,024 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,388 >>> mbox cmd response: success
2,694,050 UART:
2,694,066 UART: Running Caliptra FMC ...
2,694,474 UART:
2,694,617 UART: [state] CFI Enabled
2,705,262 UART: [fht] FMC Alias Private Key: 7
2,814,047 UART: [art] Extend RT PCRs Done
2,814,475 UART: [art] Lock RT PCRs Done
2,816,083 UART: [art] Populate DV Done
2,824,510 UART: [fht] FMC Alias Private Key: 7
2,825,670 UART: [art] Derive CDI
2,825,950 UART: [art] Store in in slot 0x4
2,911,453 UART: [art] Derive Key Pair
2,911,813 UART: [art] Store priv key in slot 0x5
2,925,159 UART: [art] Derive Key Pair - Done
2,939,888 UART: [art] Signing Cert with AUTHO
2,940,368 UART: RITY.KEYID = 7
2,955,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,421 UART: [art] PUB.X = 2D88F0E95525BBD8031214708C62B6913BFE103D1AB6A817C78FD4412833C61CF4B44914AFF47F71159DBD68F6813354
2,963,186 UART: [art] PUB.Y = 0367643E7935711CC969B54A760E231557AB0896CD84E19F8D154FDB3A3ABDF1EAE70D76FE025C9636EEF18FC6C4440D
2,970,126 UART: [art] SIG.R = 47F93188CF9D8198910C8DB00169CC29D973FC5064EB31E256B902F1ABCA1088948E1657DAEF98F054167F67B07CC333
2,976,887 UART: [art] SIG.S = 75EF12CB8DE57FBF7FB190F9A4F1E3D755BA2CF0270590988523CD8475DA08A3D100F9846EB72B38088172E0F03FCF1A
3,000,909 UART: Caliptra RT
3,001,254 UART: [state] CFI Enabled
3,109,983 UART: [rt] RT listening for mailbox commands...
3,110,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,353 UART: [rt]cmd =0x46504c54, len=4
3,141,441 >>> mbox cmd response data (8 bytes)
3,141,564 UART: [rt] FIPS self test
3,141,892 UART: [kat] ++
3,142,044 UART: [kat] sha1
3,146,258 UART: [kat] SHA2-256
3,146,800 UART: Fatal Error: 0x90010001
3,148,339 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,344 >>> mbox cmd response: failed
3,148,344 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,127 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,584 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,519,210 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,662,786 >>> mbox cmd response: failed
2,663,337 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,806,206 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
4,862,287 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,444,919 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,518,755 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,662,361 >>> mbox cmd response: failed
2,662,892 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,805,753 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
4,862,806 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,439,072 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,864,320 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,008,453 >>> mbox cmd response: failed
3,009,067 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,151,982 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,584,026 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,009,530 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
2,861,253 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,005,190 >>> mbox cmd response: failed
3,005,770 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,148,652 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
21,585,277 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,017,314 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,521,628 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,666,016 >>> mbox cmd response: failed
2,666,594 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,810,048 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,447,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,271,789 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
2,520,878 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,664,912 >>> mbox cmd response: failed
2,665,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,808,748 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,431,871 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,242,965 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
2,866,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,010,393 >>> mbox cmd response: failed
3,010,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,154,250 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,176,881 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,903,205 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
2,867,616 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,012,359 >>> mbox cmd response: failed
3,012,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,156,246 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,196,186 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,918,057 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,517,210 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,661,388 >>> mbox cmd response: failed
2,661,967 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,805,247 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,449,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,322,273 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
2,520,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,664,902 >>> mbox cmd response: failed
2,665,458 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,808,743 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,426,989 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,230,858 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,876,850 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,021,005 >>> mbox cmd response: failed
3,021,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,164,838 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,186,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,910,089 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,404 writing to cptra_bootfsm_go
2,872,898 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,017,310 >>> mbox cmd response: failed
3,017,900 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,161,284 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,168,146 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,891,901 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,816 >>> mbox cmd response: failed
86,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
86,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,339 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,181 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,406 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,414 >>> mbox cmd response: failed
87,414 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,063 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,421 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,591 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,599 >>> mbox cmd response: failed
87,599 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,664 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,972 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,623 >>> mbox cmd response: failed
87,623 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,808 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,444 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,370 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,378 >>> mbox cmd response: failed
87,378 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,384 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,711 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,060 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,068 >>> mbox cmd response: failed
87,068 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,327 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,979 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,745 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,753 >>> mbox cmd response: failed
87,753 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,330 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,751 >>> mbox cmd response: failed
87,751 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,892 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,396 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,618 >>> mbox cmd response: failed
87,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,107 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,553 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,328 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,336 >>> mbox cmd response: failed
87,336 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,617 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,387 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,171 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,179 >>> mbox cmd response: failed
87,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,732 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,744 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,505 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,513 >>> mbox cmd response: failed
87,513 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
87,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,688 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,190 UART:
192,568 UART: Running Caliptra ROM ...
193,663 UART:
193,804 UART: [state] CFI Enabled
262,493 UART: [state] LifecycleState = Unprovisioned
264,486 UART: [state] DebugLocked = No
267,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,890 UART: [kat] SHA2-256
442,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,107 UART: [kat] ++
453,630 UART: [kat] sha1
465,423 UART: [kat] SHA2-256
468,086 UART: [kat] SHA2-384
473,586 UART: [kat] SHA2-512-ACC
475,957 UART: [kat] ECC-384
2,765,421 UART: [kat] HMAC-384Kdf
2,779,016 UART: [kat] LMS
3,969,297 UART: [kat] --
3,974,295 UART: [cold-reset] ++
3,976,583 UART: [fht] Storing FHT @ 0x50003400
3,987,995 UART: [idev] ++
3,988,570 UART: [idev] CDI.KEYID = 6
3,989,609 UART: [idev] SUBJECT.KEYID = 7
3,990,787 UART: [idev] UDS.KEYID = 0
3,991,839 ready_for_fw is high
3,992,050 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,136,242 UART: [idev] Erasing UDS.KEYID = 0
7,325,157 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,187 UART: [idev] --
7,351,187 UART: [ldev] ++
7,351,811 UART: [ldev] CDI.KEYID = 6
7,352,690 UART: [ldev] SUBJECT.KEYID = 5
7,353,956 UART: [ldev] AUTHORITY.KEYID = 7
7,355,190 UART: [ldev] FE.KEYID = 1
7,401,306 UART: [ldev] Erasing FE.KEYID = 1
10,733,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,027 UART: [ldev] --
13,095,472 UART: [fwproc] Waiting for Commands...
13,097,681 UART: [fwproc] Received command 0x46574c44
13,099,872 UART: [fwproc] Received Image of size 114632 bytes
17,157,923 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,394 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,301,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,620,085 >>> mbox cmd response: success
17,624,234 UART: [afmc] ++
17,624,821 UART: [afmc] CDI.KEYID = 6
17,625,791 UART: [afmc] SUBJECT.KEYID = 7
17,627,006 UART: [afmc] AUTHORITY.KEYID = 5
20,987,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,457 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,902 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,707 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,181 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,355,556 UART: [afmc] --
23,359,038 UART: [cold-reset] --
23,364,149 UART: [state] Locking Datavault
23,370,531 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,283 UART: [state] Locking ICCM
23,374,429 UART: [exit] Launching FMC @ 0x40000130
23,382,822 UART:
23,383,067 UART: Running Caliptra FMC ...
23,384,173 UART:
23,384,329 UART: [state] CFI Enabled
23,446,488 UART: [fht] FMC Alias Private Key: 7
25,784,874 UART: [art] Extend RT PCRs Done
25,786,095 UART: [art] Lock RT PCRs Done
25,787,892 UART: [art] Populate DV Done
25,793,270 UART: [fht] FMC Alias Private Key: 7
25,794,921 UART: [art] Derive CDI
25,795,738 UART: [art] Store in in slot 0x4
25,856,023 UART: [art] Derive Key Pair
25,857,067 UART: [art] Store priv key in slot 0x5
29,150,091 UART: [art] Derive Key Pair - Done
29,162,972 UART: [art] Signing Cert with AUTHO
29,164,298 UART: RITY.KEYID = 7
31,450,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,276 UART: [art] PUB.X = 2B9E7CC67DE6E2EB1A9205C3399F0F305A5183A0B2A4ACBCD06DD7586F09FBA4C1DCE308ADC545235E0D951F41CCF90C
31,459,531 UART: [art] PUB.Y = 2F6A74D153F78E3C28D292C2B7F762BC80C873A77EA74E149F218AD8C4C3E878706E296797FC91203FFB97130D43996B
31,466,771 UART: [art] SIG.R = 814604CF5F8651BA035D4E23CB527A8F7CFE09D2F022AF4F24733996F3EAF11C1CFDBB9E6E23E29A7DFDB02C4A045490
31,474,122 UART: [art] SIG.S = 2D9C4A1EF01EB4C3D35FBC6061E0F2AAA3EFF197D5527A8C4D90E6DF9A67FA5F901CF6163B7100048A824768C5016826
32,779,155 UART: Caliptra RT
32,779,865 UART: [state] CFI Enabled
32,939,413 UART: [rt] RT listening for mailbox commands...
32,941,284 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,971,082 UART: [rt]cmd =0x46504c54, len=4
32,972,774 >>> mbox cmd response data (8 bytes)
32,974,163 UART: [rt] FIPS self test
32,975,100 UART: [kat] ++
32,975,552 UART: [kat] sha1
32,980,062 UART: [kat] SHA2-256
32,981,721 UART: Fatal Error: 0x90010002
33,017,049 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,161,107 >>> mbox cmd response: failed
33,161,737 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,305,495 >>> mbox cmd response: failed
Initializing fuses
930 writing to cptra_bootfsm_go
190,069 UART:
190,363 UART: Running Caliptra ROM ...
191,437 UART:
191,581 UART: [state] CFI Enabled
254,547 UART: [state] LifecycleState = Unprovisioned
256,517 UART: [state] DebugLocked = No
258,863 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,264 UART: [kat] SHA2-256
432,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,500 UART: [kat] ++
444,031 UART: [kat] sha1
455,623 UART: [kat] SHA2-256
458,309 UART: [kat] SHA2-384
464,447 UART: [kat] SHA2-512-ACC
466,838 UART: [kat] ECC-384
2,760,425 UART: [kat] HMAC-384Kdf
2,791,555 UART: [kat] LMS
3,981,891 UART: [kat] --
3,986,287 UART: [cold-reset] ++
3,988,871 UART: [fht] Storing FHT @ 0x50003400
4,000,245 UART: [idev] ++
4,000,822 UART: [idev] CDI.KEYID = 6
4,001,793 UART: [idev] SUBJECT.KEYID = 7
4,003,013 UART: [idev] UDS.KEYID = 0
4,004,522 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,148,623 UART: [idev] Erasing UDS.KEYID = 0
7,339,385 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,039 UART: [idev] --
7,366,228 UART: [ldev] ++
7,366,854 UART: [ldev] CDI.KEYID = 6
7,367,741 UART: [ldev] SUBJECT.KEYID = 5
7,369,010 UART: [ldev] AUTHORITY.KEYID = 7
7,370,244 UART: [ldev] FE.KEYID = 1
7,413,474 UART: [ldev] Erasing FE.KEYID = 1
10,745,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,049 UART: [ldev] --
13,106,629 UART: [fwproc] Waiting for Commands...
13,109,761 UART: [fwproc] Received command 0x46574c44
13,111,953 UART: [fwproc] Received Image of size 114632 bytes
17,172,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,753 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,630,492 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,805,887 ready_for_fw is high
3,806,347 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,903,010 >>> mbox cmd response: success
23,589,574 UART:
23,589,994 UART: Running Caliptra FMC ...
23,591,112 UART:
23,591,266 UART: [state] CFI Enabled
23,657,663 UART: [fht] FMC Alias Private Key: 7
25,995,766 UART: [art] Extend RT PCRs Done
25,996,993 UART: [art] Lock RT PCRs Done
25,998,594 UART: [art] Populate DV Done
26,003,846 UART: [fht] FMC Alias Private Key: 7
26,005,563 UART: [art] Derive CDI
26,006,305 UART: [art] Store in in slot 0x4
26,065,905 UART: [art] Derive Key Pair
26,066,960 UART: [art] Store priv key in slot 0x5
29,359,621 UART: [art] Derive Key Pair - Done
29,372,588 UART: [art] Signing Cert with AUTHO
29,373,895 UART: RITY.KEYID = 7
31,661,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,534 UART: [art] PUB.X = 8D1A918F158528F90644F8BD766549EF007A1FD7E10DB34239C385B4917EE74A712550AA133935E0D4C1772B278C4A16
31,669,742 UART: [art] PUB.Y = 184D18DCEE5AB2ECEA9C927666C3C047F3281D69C8B995C4A665AA35BFAECE0016FBD4B44232B5DC02A008952CD829F7
31,677,033 UART: [art] SIG.R = EEC3D91A374CC672F5C6FECB109C88329729C85C4A850A76C9FD5B76A92CEA44BA3EA4A7DEEAF9D64FBB0B1DE1C76A1C
31,684,429 UART: [art] SIG.S = 8F1ACFA552A40BC045FFD21FBCA4A351427147B95333708C837230C748C783A67518952971CFEB5B76121968BF5C24DD
32,989,979 UART: Caliptra RT
32,990,700 UART: [state] CFI Enabled
33,172,762 UART: [rt] RT listening for mailbox commands...
33,174,623 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,204,040 UART: [rt]cmd =0x46504c54, len=4
33,205,728 >>> mbox cmd response data (8 bytes)
33,206,679 UART: [rt] FIPS self test
33,207,632 UART: [kat] ++
33,208,088 UART: [kat] sha1
33,212,675 UART: [kat] SHA2-256
33,214,121 UART: Fatal Error: 0x90010002
33,249,565 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,393,479 >>> mbox cmd response: failed
33,394,106 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,538,016 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,796,746 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,850,447 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
192,680 UART:
193,032 UART: Running Caliptra ROM ...
194,216 UART:
604,053 UART: [state] CFI Enabled
621,151 UART: [state] LifecycleState = Unprovisioned
623,141 UART: [state] DebugLocked = No
625,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,546 UART: [kat] SHA2-256
800,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,827 UART: [kat] ++
811,357 UART: [kat] sha1
822,309 UART: [kat] SHA2-256
824,973 UART: [kat] SHA2-384
830,894 UART: [kat] SHA2-512-ACC
833,268 UART: [kat] ECC-384
3,117,640 UART: [kat] HMAC-384Kdf
3,128,755 UART: [kat] LMS
4,318,913 UART: [kat] --
4,323,478 UART: [cold-reset] ++
4,325,347 UART: [fht] Storing FHT @ 0x50003400
4,336,406 UART: [idev] ++
4,336,974 UART: [idev] CDI.KEYID = 6
4,338,011 UART: [idev] SUBJECT.KEYID = 7
4,339,194 UART: [idev] UDS.KEYID = 0
4,340,178 ready_for_fw is high
4,340,385 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,484,370 UART: [idev] Erasing UDS.KEYID = 0
7,627,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,980 UART: [idev] --
7,653,037 UART: [ldev] ++
7,653,611 UART: [ldev] CDI.KEYID = 6
7,654,593 UART: [ldev] SUBJECT.KEYID = 5
7,655,713 UART: [ldev] AUTHORITY.KEYID = 7
7,657,054 UART: [ldev] FE.KEYID = 1
7,667,554 UART: [ldev] Erasing FE.KEYID = 1
10,956,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,983 UART: [ldev] --
13,318,355 UART: [fwproc] Waiting for Commands...
13,321,110 UART: [fwproc] Received command 0x46574c44
13,323,298 UART: [fwproc] Received Image of size 114632 bytes
17,378,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,904 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,800 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,843,064 >>> mbox cmd response: success
17,847,530 UART: [afmc] ++
17,848,135 UART: [afmc] CDI.KEYID = 6
17,849,048 UART: [afmc] SUBJECT.KEYID = 7
17,850,323 UART: [afmc] AUTHORITY.KEYID = 5
21,161,781 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,429 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,828 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,623 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,101 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,793 UART: [afmc] --
23,527,143 UART: [cold-reset] --
23,529,976 UART: [state] Locking Datavault
23,535,501 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,254 UART: [state] Locking ICCM
23,538,430 UART: [exit] Launching FMC @ 0x40000130
23,546,791 UART:
23,547,030 UART: Running Caliptra FMC ...
23,548,137 UART:
23,548,298 UART: [state] CFI Enabled
23,556,346 UART: [fht] FMC Alias Private Key: 7
25,887,985 UART: [art] Extend RT PCRs Done
25,889,213 UART: [art] Lock RT PCRs Done
25,890,866 UART: [art] Populate DV Done
25,896,498 UART: [fht] FMC Alias Private Key: 7
25,898,096 UART: [art] Derive CDI
25,898,919 UART: [art] Store in in slot 0x4
25,941,453 UART: [art] Derive Key Pair
25,942,461 UART: [art] Store priv key in slot 0x5
29,184,797 UART: [art] Derive Key Pair - Done
29,197,636 UART: [art] Signing Cert with AUTHO
29,198,942 UART: RITY.KEYID = 7
31,478,099 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,614 UART: [art] PUB.X = A9F48EE3C3195887FAB76E7B87E32BE1B2BE56387301E7467CD46C355CEDBA777CB86DF47727117686A4E14C8DBC3F08
31,486,816 UART: [art] PUB.Y = 1378F4F1F99F0D6263891A04FAAF6BDD4CA0AACB1C025181DB0DAF19027439BFABE5C516282B9B823215EB71597096A8
31,494,102 UART: [art] SIG.R = B6AFDDECB215D2405C1F6808BE589E4DF35990DF78E6AD831B016587734314C502FF51A7EEE1751CE0FE10194287D8F1
31,501,487 UART: [art] SIG.S = BB5C2D3EAEB87D6386F3315AFC530BA63301EA89150AA781ADA20F7055578446DE3682041B3C33351FAE5D6683288A63
32,806,965 UART: Caliptra RT
32,807,682 UART: [state] CFI Enabled
32,924,423 UART: [rt] RT listening for mailbox commands...
32,926,268 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,955,842 UART: [rt]cmd =0x46504c54, len=4
32,957,236 >>> mbox cmd response data (8 bytes)
32,958,412 UART: [rt] FIPS self test
32,959,358 UART: [kat] ++
32,959,809 UART: [kat] sha1
32,964,321 UART: [kat] SHA2-256
32,965,927 UART: Fatal Error: 0x90010002
33,001,101 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,145,064 >>> mbox cmd response: failed
33,145,710 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,289,654 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,042 UART:
190,331 UART: Running Caliptra ROM ...
191,356 UART:
7,239,030 UART: [state] CFI Enabled
7,254,048 UART: [state] LifecycleState = Unprovisioned
7,255,996 UART: [state] DebugLocked = No
7,258,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,263,697 UART: [kat] SHA2-256
7,433,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,444,001 UART: [kat] ++
7,444,568 UART: [kat] sha1
7,455,846 UART: [kat] SHA2-256
7,458,538 UART: [kat] SHA2-384
7,464,967 UART: [kat] SHA2-512-ACC
7,467,320 UART: [kat] ECC-384
9,749,790 UART: [kat] HMAC-384Kdf
9,760,895 UART: [kat] LMS
10,951,008 UART: [kat] --
10,958,127 UART: [cold-reset] ++
10,959,736 UART: [fht] Storing FHT @ 0x50003400
10,970,577 UART: [idev] ++
10,971,140 UART: [idev] CDI.KEYID = 6
10,972,155 UART: [idev] SUBJECT.KEYID = 7
10,973,313 UART: [idev] UDS.KEYID = 0
10,974,883 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,119,165 UART: [idev] Erasing UDS.KEYID = 0
14,261,438 UART: [idev] Using Sha1 for KeyId Algorithm
14,284,384 UART: [idev] --
14,287,352 UART: [ldev] ++
14,287,921 UART: [ldev] CDI.KEYID = 6
14,288,885 UART: [ldev] SUBJECT.KEYID = 5
14,290,246 UART: [ldev] AUTHORITY.KEYID = 7
14,291,432 UART: [ldev] FE.KEYID = 1
14,299,763 UART: [ldev] Erasing FE.KEYID = 1
17,584,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,879,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,894,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,909,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,923,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,943,992 UART: [ldev] --
19,947,907 UART: [fwproc] Waiting for Commands...
19,950,164 UART: [fwproc] Received command 0x46574c44
19,952,370 UART: [fwproc] Received Image of size 114632 bytes
24,009,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,083,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,152,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,470,974 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,129,108 ready_for_fw is high
4,129,591 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,091,609 >>> mbox cmd response: success
23,727,141 UART:
23,727,549 UART: Running Caliptra FMC ...
23,728,708 UART:
23,728,871 UART: [state] CFI Enabled
23,736,456 UART: [fht] FMC Alias Private Key: 7
26,066,849 UART: [art] Extend RT PCRs Done
26,068,092 UART: [art] Lock RT PCRs Done
26,069,292 UART: [art] Populate DV Done
26,074,716 UART: [fht] FMC Alias Private Key: 7
26,076,318 UART: [art] Derive CDI
26,077,138 UART: [art] Store in in slot 0x4
26,119,904 UART: [art] Derive Key Pair
26,120,946 UART: [art] Store priv key in slot 0x5
29,363,078 UART: [art] Derive Key Pair - Done
29,376,244 UART: [art] Signing Cert with AUTHO
29,377,627 UART: RITY.KEYID = 7
31,656,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,827 UART: [art] PUB.X = 94E08468FD6855BF71C4401EA9983907F309F4DD9FB1FD7703D4B916CD33156191A20F71CAD4BAA574C4D90464F0124C
31,665,028 UART: [art] PUB.Y = 5C42301AC18385DEAC1FC550325B901DD8B0FF2E8E0B5ACE8F1E1948A13F6D83B32C3F5A0AAD3154441C36D1699AED04
31,672,325 UART: [art] SIG.R = 0259E8C68B2E3DF7A3ADDBD918F96845B257A146EF004F4382DE61277B22691FD9A521CEF9B6D6B35061CC0704C1B878
31,679,664 UART: [art] SIG.S = 8CC9C8BEFD227D8ED620B0C5CDF108F917A590BF498DB56FA94EB47E35DB80F842912AEED6274F2EC7AA2DA9415E8836
32,984,693 UART: Caliptra RT
32,985,415 UART: [state] CFI Enabled
33,103,535 UART: [rt] RT listening for mailbox commands...
33,105,385 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,135,123 UART: [rt]cmd =0x46504c54, len=4
33,136,756 >>> mbox cmd response data (8 bytes)
33,138,024 UART: [rt] FIPS self test
33,138,966 UART: [kat] ++
33,139,415 UART: [kat] sha1
33,143,814 UART: [kat] SHA2-256
33,145,385 UART: Fatal Error: 0x90010002
33,180,842 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,324,830 >>> mbox cmd response: failed
33,325,485 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,469,424 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
10,585,818 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,539,405 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,222 UART:
192,585 UART: Running Caliptra ROM ...
193,714 UART:
193,857 UART: [state] CFI Enabled
266,724 UART: [state] LifecycleState = Unprovisioned
268,639 UART: [state] DebugLocked = No
270,307 UART: [state] WD Timer not started. Device not locked for debugging
273,936 UART: [kat] SHA2-256
453,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,674 UART: [kat] ++
465,213 UART: [kat] sha1
476,104 UART: [kat] SHA2-256
479,148 UART: [kat] SHA2-384
484,934 UART: [kat] SHA2-512-ACC
487,877 UART: [kat] ECC-384
2,953,600 UART: [kat] HMAC-384Kdf
2,975,510 UART: [kat] LMS
3,505,001 UART: [kat] --
3,510,847 UART: [cold-reset] ++
3,513,214 UART: [fht] FHT @ 0x50003400
3,523,064 UART: [idev] ++
3,523,635 UART: [idev] CDI.KEYID = 6
3,524,546 UART: [idev] SUBJECT.KEYID = 7
3,525,727 UART: [idev] UDS.KEYID = 0
3,526,660 ready_for_fw is high
3,526,875 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,671,473 UART: [idev] Erasing UDS.KEYID = 0
6,030,847 UART: [idev] Sha1 KeyId Algorithm
6,053,502 UART: [idev] --
6,058,022 UART: [ldev] ++
6,058,607 UART: [ldev] CDI.KEYID = 6
6,059,526 UART: [ldev] SUBJECT.KEYID = 5
6,060,633 UART: [ldev] AUTHORITY.KEYID = 7
6,061,928 UART: [ldev] FE.KEYID = 1
6,107,573 UART: [ldev] Erasing FE.KEYID = 1
8,607,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,592 UART: [ldev] --
10,399,695 UART: [fwproc] Wait for Commands...
10,401,305 UART: [fwproc] Recv command 0x46574c44
10,403,349 UART: [fwproc] Recv'd Img size: 114940 bytes
13,818,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,237 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,281,811 >>> mbox cmd response: success
14,286,767 UART: [afmc] ++
14,287,383 UART: [afmc] CDI.KEYID = 6
14,288,301 UART: [afmc] SUBJECT.KEYID = 7
14,289,464 UART: [afmc] AUTHORITY.KEYID = 5
16,814,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,537,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,539,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,554,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,570,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,586,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,609,233 UART: [afmc] --
18,613,727 UART: [cold-reset] --
18,616,708 UART: [state] Locking Datavault
18,622,933 UART: [state] Locking PCR0, PCR1 and PCR31
18,624,579 UART: [state] Locking ICCM
18,626,839 UART: [exit] Launching FMC @ 0x40000130
18,635,233 UART:
18,635,474 UART: Running Caliptra FMC ...
18,636,577 UART:
18,636,739 UART: [state] CFI Enabled
18,693,948 UART: [fht] FMC Alias Private Key: 7
20,457,503 UART: [art] Extend RT PCRs Done
20,458,730 UART: [art] Lock RT PCRs Done
20,460,439 UART: [art] Populate DV Done
20,465,800 UART: [fht] FMC Alias Private Key: 7
20,467,501 UART: [art] Derive CDI
20,468,315 UART: [art] Store in in slot 0x4
20,525,620 UART: [art] Derive Key Pair
20,526,670 UART: [art] Store priv key in slot 0x5
22,990,152 UART: [art] Derive Key Pair - Done
23,002,923 UART: [art] Signing Cert with AUTHO
23,004,264 UART: RITY.KEYID = 7
24,714,457 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,964 UART: [art] PUB.X = C7F4C248E4D7803C71D99A350215F4417B7CA63600DAC12D0D25888227FE2BFE9324B6DFC85E99320E4A7CCBBA930244
24,723,216 UART: [art] PUB.Y = 4DC5D091EBE7D849D84D8EB48D25D03AC60D6F59A51DBC601EF6A52D409B0BA67B4C5D0336C4439B84912C01F70B0E44
24,730,467 UART: [art] SIG.R = 02B99F25418422DCCB31518CE98D0445CA3374F74F6AE9C47465406EEBD89A3435A63C48C0137E406460AB9C23738BB8
24,737,873 UART: [art] SIG.S = FB514EC68672850F6953157BCD8E2E79F7E543E48294B0C044C100DF21EBB51440C0ADCF980293F1248DCF10A1534F12
25,716,845 UART: Caliptra RT
25,717,565 UART: [state] CFI Enabled
25,882,350 UART: [rt] RT listening for mailbox commands...
25,884,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,913,908 UART: [rt]cmd =0x46504c54, len=4
25,915,435 >>> mbox cmd response data (8 bytes)
25,916,626 UART: [rt] FIPS self test
25,917,585 UART: [kat] ++
25,918,040 UART: [kat] sha1
25,922,553 UART: [kat] SHA2-256
25,923,943 UART: Fatal Error: 0x90010002
25,959,148 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,103,564 >>> mbox cmd response: failed
26,104,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,248,458 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,133 UART:
190,418 UART: Running Caliptra ROM ...
191,528 UART:
191,675 UART: [state] CFI Enabled
253,772 UART: [state] LifecycleState = Unprovisioned
255,630 UART: [state] DebugLocked = No
257,680 UART: [state] WD Timer not started. Device not locked for debugging
262,116 UART: [kat] SHA2-256
441,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,822 UART: [kat] ++
453,352 UART: [kat] sha1
464,016 UART: [kat] SHA2-256
467,074 UART: [kat] SHA2-384
474,830 UART: [kat] SHA2-512-ACC
477,816 UART: [kat] ECC-384
2,937,759 UART: [kat] HMAC-384Kdf
2,963,329 UART: [kat] LMS
3,492,728 UART: [kat] --
3,497,652 UART: [cold-reset] ++
3,498,574 UART: [fht] FHT @ 0x50003400
3,510,528 UART: [idev] ++
3,511,092 UART: [idev] CDI.KEYID = 6
3,512,021 UART: [idev] SUBJECT.KEYID = 7
3,513,187 UART: [idev] UDS.KEYID = 0
3,514,807 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,659,408 UART: [idev] Erasing UDS.KEYID = 0
6,018,791 UART: [idev] Sha1 KeyId Algorithm
6,041,267 UART: [idev] --
6,044,704 UART: [ldev] ++
6,045,290 UART: [ldev] CDI.KEYID = 6
6,046,181 UART: [ldev] SUBJECT.KEYID = 5
6,047,400 UART: [ldev] AUTHORITY.KEYID = 7
6,048,560 UART: [ldev] FE.KEYID = 1
6,092,212 UART: [ldev] Erasing FE.KEYID = 1
8,594,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,848 UART: [ldev] --
10,385,467 UART: [fwproc] Wait for Commands...
10,388,208 UART: [fwproc] Recv command 0x46574c44
10,390,251 UART: [fwproc] Recv'd Img size: 114940 bytes
13,798,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,510 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,263,499 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,363,093 ready_for_fw is high
3,363,586 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,083,723 >>> mbox cmd response: success
18,366,592 UART:
18,366,986 UART: Running Caliptra FMC ...
18,368,126 UART:
18,368,289 UART: [state] CFI Enabled
18,432,825 UART: [fht] FMC Alias Private Key: 7
20,196,622 UART: [art] Extend RT PCRs Done
20,197,855 UART: [art] Lock RT PCRs Done
20,199,616 UART: [art] Populate DV Done
20,205,201 UART: [fht] FMC Alias Private Key: 7
20,206,904 UART: [art] Derive CDI
20,207,639 UART: [art] Store in in slot 0x4
20,265,279 UART: [art] Derive Key Pair
20,266,322 UART: [art] Store priv key in slot 0x5
22,729,178 UART: [art] Derive Key Pair - Done
22,741,904 UART: [art] Signing Cert with AUTHO
22,743,205 UART: RITY.KEYID = 7
24,456,321 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,828 UART: [art] PUB.X = ABDE4BFDBC8623363332D67458CE2F653018C6BA5005EC4CC86EFEC2DD3F4761406F06A4C869C20A7DF8F853EC89F830
24,465,082 UART: [art] PUB.Y = B75AD3B84F8ECE4FFD9409207A2FDFCEFFACCCF788DA8A33C6B48C8DCAC08B0B337EF5D104F3951B2E003127AE529E06
24,472,380 UART: [art] SIG.R = B193AE988BE826316DFFBB86890A9ACF81B35B334304249851EAC133A765238C1A473258F6AF5A74E8BFF40D15593171
24,479,734 UART: [art] SIG.S = 2D6BEF46B0CF14EA4E601196100D79EE7752EFE80ABD85B74AD6C6AA889EDD93A771C01FF16E4D29D65A1EFEA84D6935
25,458,732 UART: Caliptra RT
25,459,426 UART: [state] CFI Enabled
25,624,593 UART: [rt] RT listening for mailbox commands...
25,626,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,656,309 UART: [rt]cmd =0x46504c54, len=4
25,657,837 >>> mbox cmd response data (8 bytes)
25,658,999 UART: [rt] FIPS self test
25,659,939 UART: [kat] ++
25,660,391 UART: [kat] sha1
25,664,953 UART: [kat] SHA2-256
25,666,557 UART: Fatal Error: 0x90010002
25,701,758 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,846,163 >>> mbox cmd response: failed
25,846,767 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,991,468 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,369,691 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,073,539 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,492 UART:
192,880 UART: Running Caliptra ROM ...
194,099 UART:
603,547 UART: [state] CFI Enabled
617,920 UART: [state] LifecycleState = Unprovisioned
619,797 UART: [state] DebugLocked = No
621,636 UART: [state] WD Timer not started. Device not locked for debugging
624,676 UART: [kat] SHA2-256
803,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,414 UART: [kat] ++
815,956 UART: [kat] sha1
826,201 UART: [kat] SHA2-256
829,287 UART: [kat] SHA2-384
836,055 UART: [kat] SHA2-512-ACC
839,001 UART: [kat] ECC-384
3,282,742 UART: [kat] HMAC-384Kdf
3,294,527 UART: [kat] LMS
3,824,034 UART: [kat] --
3,826,868 UART: [cold-reset] ++
3,828,312 UART: [fht] FHT @ 0x50003400
3,839,082 UART: [idev] ++
3,839,651 UART: [idev] CDI.KEYID = 6
3,840,709 UART: [idev] SUBJECT.KEYID = 7
3,841,819 UART: [idev] UDS.KEYID = 0
3,842,757 ready_for_fw is high
3,842,980 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,987,445 UART: [idev] Erasing UDS.KEYID = 0
6,314,996 UART: [idev] Sha1 KeyId Algorithm
6,339,301 UART: [idev] --
6,343,435 UART: [ldev] ++
6,344,013 UART: [ldev] CDI.KEYID = 6
6,344,928 UART: [ldev] SUBJECT.KEYID = 5
6,346,094 UART: [ldev] AUTHORITY.KEYID = 7
6,347,383 UART: [ldev] FE.KEYID = 1
6,358,630 UART: [ldev] Erasing FE.KEYID = 1
8,830,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,314 UART: [ldev] --
10,621,072 UART: [fwproc] Wait for Commands...
10,622,740 UART: [fwproc] Recv command 0x46574c44
10,624,838 UART: [fwproc] Recv'd Img size: 114940 bytes
14,038,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,219 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,502,458 >>> mbox cmd response: success
14,507,182 UART: [afmc] ++
14,507,769 UART: [afmc] CDI.KEYID = 6
14,508,838 UART: [afmc] SUBJECT.KEYID = 7
14,509,940 UART: [afmc] AUTHORITY.KEYID = 5
17,008,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,994 UART: [afmc] --
18,805,454 UART: [cold-reset] --
18,810,342 UART: [state] Locking Datavault
18,815,252 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,912 UART: [state] Locking ICCM
18,818,631 UART: [exit] Launching FMC @ 0x40000130
18,827,031 UART:
18,827,271 UART: Running Caliptra FMC ...
18,828,376 UART:
18,828,533 UART: [state] CFI Enabled
18,836,743 UART: [fht] FMC Alias Private Key: 7
20,593,595 UART: [art] Extend RT PCRs Done
20,594,851 UART: [art] Lock RT PCRs Done
20,596,802 UART: [art] Populate DV Done
20,602,380 UART: [fht] FMC Alias Private Key: 7
20,603,929 UART: [art] Derive CDI
20,604,746 UART: [art] Store in in slot 0x4
20,646,908 UART: [art] Derive Key Pair
20,647,909 UART: [art] Store priv key in slot 0x5
23,074,370 UART: [art] Derive Key Pair - Done
23,087,204 UART: [art] Signing Cert with AUTHO
23,088,512 UART: RITY.KEYID = 7
24,794,232 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,748 UART: [art] PUB.X = 3F97A3D668EBB4389AD7ACDAFF8C4309579DF7243360A6003DDA563AAE4CD7DF6DDDCCF74D6D9BC28EF80630FA6DA2B2
24,803,001 UART: [art] PUB.Y = 0EA34AED8E300B71301ABA896B8C12B981A7B4F8C142097E92A67C32FADB8E942B1A3A432D6F24676F38AC85AF9F200C
24,810,299 UART: [art] SIG.R = 1FA19459EB3A2E8B0806D70A44CEB938FC8D69CC86651004143A8DF59A2C2A0B3FEA4D00E0CAE71E7B07B81E3A2454D0
24,817,668 UART: [art] SIG.S = D080958B79A23D4E034AD1769EC9A09933088CECF4335BDE51CC0C857F03CA7B85A9862F6C8E6E0E0AC8802A592BAF40
25,796,546 UART: Caliptra RT
25,797,270 UART: [state] CFI Enabled
25,915,467 UART: [rt] RT listening for mailbox commands...
25,917,313 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,946,931 UART: [rt]cmd =0x46504c54, len=4
25,948,598 >>> mbox cmd response data (8 bytes)
25,949,776 UART: [rt] FIPS self test
25,950,725 UART: [kat] ++
25,951,181 UART: [kat] sha1
25,955,508 UART: [kat] SHA2-256
25,956,967 UART: Fatal Error: 0x90010002
25,992,120 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,136,494 >>> mbox cmd response: failed
26,137,118 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,281,387 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
190,128 UART:
190,416 UART: Running Caliptra ROM ...
191,525 UART:
14,250,421 UART: [state] CFI Enabled
14,268,406 UART: [state] LifecycleState = Unprovisioned
14,270,273 UART: [state] DebugLocked = No
14,273,224 UART: [state] WD Timer not started. Device not locked for debugging
14,277,725 UART: [kat] SHA2-256
14,456,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,468,388 UART: [kat] ++
14,468,937 UART: [kat] sha1
14,479,124 UART: [kat] SHA2-256
14,482,140 UART: [kat] SHA2-384
14,489,039 UART: [kat] SHA2-512-ACC
14,491,980 UART: [kat] ECC-384
16,933,759 UART: [kat] HMAC-384Kdf
16,947,082 UART: [kat] LMS
17,476,566 UART: [kat] --
17,481,439 UART: [cold-reset] ++
17,482,454 UART: [fht] FHT @ 0x50003400
17,492,345 UART: [idev] ++
17,492,957 UART: [idev] CDI.KEYID = 6
17,493,875 UART: [idev] SUBJECT.KEYID = 7
17,495,038 UART: [idev] UDS.KEYID = 0
17,496,555 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,640,693 UART: [idev] Erasing UDS.KEYID = 0
19,969,049 UART: [idev] Sha1 KeyId Algorithm
19,991,790 UART: [idev] --
19,996,643 UART: [ldev] ++
19,997,213 UART: [ldev] CDI.KEYID = 6
19,998,121 UART: [ldev] SUBJECT.KEYID = 5
19,999,280 UART: [ldev] AUTHORITY.KEYID = 7
20,000,586 UART: [ldev] FE.KEYID = 1
20,009,725 UART: [ldev] Erasing FE.KEYID = 1
22,488,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,206,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,222,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,238,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,254,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,274,574 UART: [ldev] --
24,279,509 UART: [fwproc] Wait for Commands...
24,281,979 UART: [fwproc] Recv command 0x46574c44
24,284,024 UART: [fwproc] Recv'd Img size: 114940 bytes
27,698,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,774,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,843,689 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,164,066 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,699,460 ready_for_fw is high
3,700,572 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,284,663 >>> mbox cmd response: success
18,535,162 UART:
18,535,546 UART: Running Caliptra FMC ...
18,536,657 UART:
18,536,828 UART: [state] CFI Enabled
18,544,719 UART: [fht] FMC Alias Private Key: 7
20,302,102 UART: [art] Extend RT PCRs Done
20,303,321 UART: [art] Lock RT PCRs Done
20,304,923 UART: [art] Populate DV Done
20,310,076 UART: [fht] FMC Alias Private Key: 7
20,311,725 UART: [art] Derive CDI
20,312,541 UART: [art] Store in in slot 0x4
20,354,779 UART: [art] Derive Key Pair
20,355,852 UART: [art] Store priv key in slot 0x5
22,782,459 UART: [art] Derive Key Pair - Done
22,795,359 UART: [art] Signing Cert with AUTHO
22,796,675 UART: RITY.KEYID = 7
24,502,617 UART: [art] Erasing AUTHORITY.KEYID = 7
24,504,121 UART: [art] PUB.X = 59678E5FEE01737DC42AADCE080E1CAAB0C9ABC2AC4049867A029AF4810B15F6DF830D8244C5C73C37529E840AF9ED3B
24,511,374 UART: [art] PUB.Y = 8A077E0BEE96660DE46699A6D123422D11AE4927EA7CEC166A4B8370925ECA86E8749D1E1255883DE6712C5364C13804
24,518,639 UART: [art] SIG.R = 6E027C89616BC8C648C4F1FFC75B7D64B6603F2E663F466354E2C59001AB9F9DCA9FABED1A742F2B82253139FAD2FD3E
24,526,033 UART: [art] SIG.S = 50510CDA2CFF0E070B36FD911355558E58F62DDE628053D08C499C018AE172E7BEC4D3F73D20948F38C71251B87D9BF3
25,504,822 UART: Caliptra RT
25,505,526 UART: [state] CFI Enabled
25,623,448 UART: [rt] RT listening for mailbox commands...
25,625,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,025 UART: [rt]cmd =0x46504c54, len=4
25,656,449 >>> mbox cmd response data (8 bytes)
25,657,446 UART: [rt] FIPS self test
25,658,328 UART: [kat] ++
25,658,814 UART: [kat] sha1
25,663,325 UART: [kat] SHA2-256
25,664,937 UART: Fatal Error: 0x90010002
25,700,292 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,844,515 >>> mbox cmd response: failed
25,845,108 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,989,458 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,631,189 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,205,473 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,251 UART:
192,625 UART: Running Caliptra ROM ...
193,827 UART:
193,982 UART: [state] CFI Enabled
263,292 UART: [state] LifecycleState = Unprovisioned
265,705 UART: [state] DebugLocked = No
267,462 UART: [state] WD Timer not started. Device not locked for debugging
272,278 UART: [kat] SHA2-256
462,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,894 UART: [kat] ++
473,387 UART: [kat] sha1
485,547 UART: [kat] SHA2-256
488,569 UART: [kat] SHA2-384
494,634 UART: [kat] SHA2-512-ACC
497,220 UART: [kat] ECC-384
2,948,397 UART: [kat] HMAC-384Kdf
2,964,684 UART: [kat] LMS
3,496,414 UART: [kat] --
3,500,412 UART: [cold-reset] ++
3,502,707 UART: [fht] FHT @ 0x50003400
3,514,000 UART: [idev] ++
3,514,756 UART: [idev] CDI.KEYID = 6
3,515,680 UART: [idev] SUBJECT.KEYID = 7
3,516,860 UART: [idev] UDS.KEYID = 0
3,517,788 ready_for_fw is high
3,518,029 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,662,564 UART: [idev] Erasing UDS.KEYID = 0
6,021,475 UART: [idev] Sha1 KeyId Algorithm
6,044,397 UART: [idev] --
6,048,939 UART: [ldev] ++
6,049,682 UART: [ldev] CDI.KEYID = 6
6,050,594 UART: [ldev] SUBJECT.KEYID = 5
6,051,759 UART: [ldev] AUTHORITY.KEYID = 7
6,052,938 UART: [ldev] FE.KEYID = 1
6,094,230 UART: [ldev] Erasing FE.KEYID = 1
8,597,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,345 UART: [ldev] --
10,406,429 UART: [fwproc] Wait for Commands...
10,408,318 UART: [fwproc] Recv command 0x46574c44
10,410,585 UART: [fwproc] Recv'd Img size: 114940 bytes
13,868,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,699 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,819 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,600,097 >>> mbox cmd response: success
14,603,822 UART: [afmc] ++
14,604,534 UART: [afmc] CDI.KEYID = 6
14,605,777 UART: [afmc] SUBJECT.KEYID = 7
14,607,211 UART: [afmc] AUTHORITY.KEYID = 5
17,145,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,463 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,233 UART: [afmc] --
18,946,885 UART: [cold-reset] --
18,950,868 UART: [state] Locking Datavault
18,957,508 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,714 UART: [state] Locking ICCM
18,962,299 UART: [exit] Launching FMC @ 0x40000130
18,970,918 UART:
18,971,155 UART: Running Caliptra FMC ...
18,972,254 UART:
18,972,413 UART: [state] CFI Enabled
19,026,604 UART: [fht] FMC Alias Private Key: 7
20,790,785 UART: [art] Extend RT PCRs Done
20,792,021 UART: [art] Lock RT PCRs Done
20,793,353 UART: [art] Populate DV Done
20,798,830 UART: [fht] FMC Alias Private Key: 7
20,800,442 UART: [art] Derive CDI
20,801,195 UART: [art] Store in in slot 0x4
20,859,115 UART: [art] Derive Key Pair
20,860,115 UART: [art] Store priv key in slot 0x5
23,322,852 UART: [art] Derive Key Pair - Done
23,335,965 UART: [art] Signing Cert with AUTHO
23,337,269 UART: RITY.KEYID = 7
25,049,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,114 UART: [art] PUB.X = 970E8EB338AAFDAE7F273EA124829F576400359465B8289984D78B74B92A49C02413FFF97A13C494DF2D7E61658DC32A
25,058,344 UART: [art] PUB.Y = 121733615F90F6F45F73B2B2B976A46429E3F6D62CF8DD74F6524F97B39E7C67DB3132ACE3DAB57BB13FE72BDC077101
25,065,564 UART: [art] SIG.R = 188D46E1154C00B5671F46D5AB957F5DBA37143B50DDF609526FC95137E6A1BB9DEB622DE0A70B2D4F5F7E42649C5189
25,072,981 UART: [art] SIG.S = 57375F4A1AA8E747820CF292414857319AE73486D389217F2B99F609DAC01D11802BBE5F1CC16F8017A4CC2D7269C3A0
26,051,896 UART: Caliptra RT
26,052,599 UART: [state] CFI Enabled
26,217,494 UART: [rt] RT listening for mailbox commands...
26,219,349 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,249,106 UART: [rt]cmd =0x46504c54, len=4
26,250,779 >>> mbox cmd response data (8 bytes)
26,252,125 UART: [rt] FIPS self test
26,253,070 UART: [kat] ++
26,253,523 UART: [kat] sha1
26,257,922 UART: [kat] SHA2-256
26,259,528 UART: Fatal Error: 0x90010002
26,294,683 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,439,035 >>> mbox cmd response: failed
26,439,652 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,583,950 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,000 UART:
190,297 UART: Running Caliptra ROM ...
191,322 UART:
191,481 UART: [state] CFI Enabled
253,973 UART: [state] LifecycleState = Unprovisioned
256,388 UART: [state] DebugLocked = No
258,167 UART: [state] WD Timer not started. Device not locked for debugging
262,832 UART: [kat] SHA2-256
452,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,453 UART: [kat] ++
463,903 UART: [kat] sha1
476,510 UART: [kat] SHA2-256
479,523 UART: [kat] SHA2-384
484,371 UART: [kat] SHA2-512-ACC
486,931 UART: [kat] ECC-384
2,941,063 UART: [kat] HMAC-384Kdf
2,962,180 UART: [kat] LMS
3,493,941 UART: [kat] --
3,496,711 UART: [cold-reset] ++
3,499,133 UART: [fht] FHT @ 0x50003400
3,510,490 UART: [idev] ++
3,511,172 UART: [idev] CDI.KEYID = 6
3,512,112 UART: [idev] SUBJECT.KEYID = 7
3,513,325 UART: [idev] UDS.KEYID = 0
3,514,822 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,659,335 UART: [idev] Erasing UDS.KEYID = 0
6,018,915 UART: [idev] Sha1 KeyId Algorithm
6,040,913 UART: [idev] --
6,044,483 UART: [ldev] ++
6,045,350 UART: [ldev] CDI.KEYID = 6
6,046,250 UART: [ldev] SUBJECT.KEYID = 5
6,047,301 UART: [ldev] AUTHORITY.KEYID = 7
6,048,486 UART: [ldev] FE.KEYID = 1
6,090,645 UART: [ldev] Erasing FE.KEYID = 1
8,597,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,449 UART: [ldev] --
10,406,255 UART: [fwproc] Wait for Commands...
10,408,943 UART: [fwproc] Recv command 0x46574c44
10,411,261 UART: [fwproc] Recv'd Img size: 114940 bytes
13,868,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,474 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,609,566 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,437,168 ready_for_fw is high
3,437,745 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,722,474 >>> mbox cmd response: success
19,022,951 UART:
19,023,329 UART: Running Caliptra FMC ...
19,024,543 UART:
19,024,711 UART: [state] CFI Enabled
19,092,441 UART: [fht] FMC Alias Private Key: 7
20,856,364 UART: [art] Extend RT PCRs Done
20,857,574 UART: [art] Lock RT PCRs Done
20,859,318 UART: [art] Populate DV Done
20,864,728 UART: [fht] FMC Alias Private Key: 7
20,866,388 UART: [art] Derive CDI
20,867,208 UART: [art] Store in in slot 0x4
20,915,710 UART: [art] Derive Key Pair
20,916,755 UART: [art] Store priv key in slot 0x5
23,379,356 UART: [art] Derive Key Pair - Done
23,392,312 UART: [art] Signing Cert with AUTHO
23,393,620 UART: RITY.KEYID = 7
25,105,574 UART: [art] Erasing AUTHORITY.KEYID = 7
25,107,069 UART: [art] PUB.X = 8330F37826768DBA73F806783FB26FE1F09E6EF3E69AE95DE1A347C4ACFEA7C0C949E3859E51D4EF0BD9F82CB20C9DE8
25,114,388 UART: [art] PUB.Y = EFC850F8DE478EEFB13D8E2B4B70D9E9DABD1264F47AD795A011D2F2A52F52E81E2B6E744F4B0ED323E3E27EC955E09F
25,121,624 UART: [art] SIG.R = 45F69C14F2A21B35F4F279E6534155059AFF6C302241F8F947CCFF4E7DFD73B45188DA5727F93BBA4B3608B0901CDC82
25,129,037 UART: [art] SIG.S = A86BDAB12EE921AEE9356284D70FC9C52DDFEC89BE35A724FE8E4A7B433059CF4EE490B4B7A00AC4508ACC5C293F4A09
26,108,149 UART: Caliptra RT
26,108,846 UART: [state] CFI Enabled
26,273,738 UART: [rt] RT listening for mailbox commands...
26,275,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,305,212 UART: [rt]cmd =0x46504c54, len=4
26,306,630 >>> mbox cmd response data (8 bytes)
26,307,865 UART: [rt] FIPS self test
26,308,806 UART: [kat] ++
26,309,255 UART: [kat] sha1
26,313,690 UART: [kat] SHA2-256
26,315,283 UART: Fatal Error: 0x90010002
26,350,568 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,494,901 >>> mbox cmd response: failed
26,495,499 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,639,832 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,431,933 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,732,804 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,608 writing to cptra_bootfsm_go
192,733 UART:
193,104 UART: Running Caliptra ROM ...
194,290 UART:
603,851 UART: [state] CFI Enabled
616,176 UART: [state] LifecycleState = Unprovisioned
618,591 UART: [state] DebugLocked = No
620,188 UART: [state] WD Timer not started. Device not locked for debugging
624,796 UART: [kat] SHA2-256
814,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,423 UART: [kat] ++
825,950 UART: [kat] sha1
837,181 UART: [kat] SHA2-256
840,191 UART: [kat] SHA2-384
846,184 UART: [kat] SHA2-512-ACC
848,777 UART: [kat] ECC-384
3,292,064 UART: [kat] HMAC-384Kdf
3,305,174 UART: [kat] LMS
3,837,037 UART: [kat] --
3,840,494 UART: [cold-reset] ++
3,842,789 UART: [fht] FHT @ 0x50003400
3,853,778 UART: [idev] ++
3,854,421 UART: [idev] CDI.KEYID = 6
3,855,457 UART: [idev] SUBJECT.KEYID = 7
3,856,633 UART: [idev] UDS.KEYID = 0
3,857,559 ready_for_fw is high
3,857,772 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,002,266 UART: [idev] Erasing UDS.KEYID = 0
6,336,601 UART: [idev] Sha1 KeyId Algorithm
6,359,146 UART: [idev] --
6,365,307 UART: [ldev] ++
6,366,000 UART: [ldev] CDI.KEYID = 6
6,366,913 UART: [ldev] SUBJECT.KEYID = 5
6,368,073 UART: [ldev] AUTHORITY.KEYID = 7
6,369,325 UART: [ldev] FE.KEYID = 1
6,380,306 UART: [ldev] Erasing FE.KEYID = 1
8,858,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,713 UART: [ldev] --
10,651,732 UART: [fwproc] Wait for Commands...
10,654,909 UART: [fwproc] Recv command 0x46574c44
10,657,166 UART: [fwproc] Recv'd Img size: 114940 bytes
14,114,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,187 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,852,760 >>> mbox cmd response: success
14,857,145 UART: [afmc] ++
14,857,892 UART: [afmc] CDI.KEYID = 6
14,859,081 UART: [afmc] SUBJECT.KEYID = 7
14,860,523 UART: [afmc] AUTHORITY.KEYID = 5
17,362,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,828 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,425 UART: [afmc] --
19,158,430 UART: [cold-reset] --
19,161,699 UART: [state] Locking Datavault
19,167,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,356 UART: [state] Locking ICCM
19,171,774 UART: [exit] Launching FMC @ 0x40000130
19,180,427 UART:
19,180,695 UART: Running Caliptra FMC ...
19,181,803 UART:
19,181,964 UART: [state] CFI Enabled
19,189,743 UART: [fht] FMC Alias Private Key: 7
20,946,623 UART: [art] Extend RT PCRs Done
20,947,847 UART: [art] Lock RT PCRs Done
20,949,823 UART: [art] Populate DV Done
20,955,398 UART: [fht] FMC Alias Private Key: 7
20,956,988 UART: [art] Derive CDI
20,957,731 UART: [art] Store in in slot 0x4
21,000,865 UART: [art] Derive Key Pair
21,001,869 UART: [art] Store priv key in slot 0x5
23,428,563 UART: [art] Derive Key Pair - Done
23,441,502 UART: [art] Signing Cert with AUTHO
23,442,804 UART: RITY.KEYID = 7
25,148,319 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,845 UART: [art] PUB.X = 61AA3510BF612D6170C4064F3B67AC77AFD9F42BC631ED35F2E8B1863438BE22E1881E391C13A1D7095382DBC6641A4F
25,157,103 UART: [art] PUB.Y = 6E9162176D6575EA23E61F59E18CB183A5F0C4439A4B74DDC5D230B4F0B7C4EB630699474C14FED346AF3B44EF893DC3
25,164,395 UART: [art] SIG.R = B8A7FB05D0C8B8BFFF748CAEAF3742A74289D7EAF20F61D099504E88F17A0F9190F0F895B16AC548B1FA715FF3F82D67
25,171,789 UART: [art] SIG.S = 74FBA99EF51C3577EE027EC241EF530A3C1B3A8100A994E5D8DAB6E5A0AAD00DA3861FD1A36FBE0CC9195D292F420115
26,150,603 UART: Caliptra RT
26,151,317 UART: [state] CFI Enabled
26,268,757 UART: [rt] RT listening for mailbox commands...
26,270,610 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,227 UART: [rt]cmd =0x46504c54, len=4
26,301,666 >>> mbox cmd response data (8 bytes)
26,302,512 UART: [rt] FIPS self test
26,303,458 UART: [kat] ++
26,303,911 UART: [kat] sha1
26,308,365 UART: [kat] SHA2-256
26,309,913 UART: Fatal Error: 0x90010002
26,345,124 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,489,511 >>> mbox cmd response: failed
26,490,124 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,634,465 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,127 UART:
190,436 UART: Running Caliptra ROM ...
191,557 UART:
13,900,013 UART: [state] CFI Enabled
13,913,697 UART: [state] LifecycleState = Unprovisioned
13,916,105 UART: [state] DebugLocked = No
13,919,001 UART: [state] WD Timer not started. Device not locked for debugging
13,922,805 UART: [kat] SHA2-256
14,112,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,123,459 UART: [kat] ++
14,124,055 UART: [kat] sha1
14,136,375 UART: [kat] SHA2-256
14,139,386 UART: [kat] SHA2-384
14,145,254 UART: [kat] SHA2-512-ACC
14,147,829 UART: [kat] ECC-384
16,589,317 UART: [kat] HMAC-384Kdf
16,602,517 UART: [kat] LMS
17,134,326 UART: [kat] --
17,138,873 UART: [cold-reset] ++
17,140,111 UART: [fht] FHT @ 0x50003400
17,151,744 UART: [idev] ++
17,152,419 UART: [idev] CDI.KEYID = 6
17,153,435 UART: [idev] SUBJECT.KEYID = 7
17,154,591 UART: [idev] UDS.KEYID = 0
17,156,114 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,300,374 UART: [idev] Erasing UDS.KEYID = 0
19,635,445 UART: [idev] Sha1 KeyId Algorithm
19,657,178 UART: [idev] --
19,661,563 UART: [ldev] ++
19,662,285 UART: [ldev] CDI.KEYID = 6
19,663,201 UART: [ldev] SUBJECT.KEYID = 5
19,664,252 UART: [ldev] AUTHORITY.KEYID = 7
19,665,536 UART: [ldev] FE.KEYID = 1
19,676,620 UART: [ldev] Erasing FE.KEYID = 1
22,158,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,877,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,893,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,908,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,923,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,943,612 UART: [ldev] --
23,948,500 UART: [fwproc] Wait for Commands...
23,951,514 UART: [fwproc] Recv command 0x46574c44
23,953,771 UART: [fwproc] Recv'd Img size: 114940 bytes
27,413,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,491,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,608,177 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,155,106 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,758,439 ready_for_fw is high
3,758,834 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,972,863 >>> mbox cmd response: success
19,218,425 UART:
19,218,816 UART: Running Caliptra FMC ...
19,219,933 UART:
19,220,090 UART: [state] CFI Enabled
19,228,146 UART: [fht] FMC Alias Private Key: 7
20,984,930 UART: [art] Extend RT PCRs Done
20,986,156 UART: [art] Lock RT PCRs Done
20,987,918 UART: [art] Populate DV Done
20,993,280 UART: [fht] FMC Alias Private Key: 7
20,994,824 UART: [art] Derive CDI
20,995,660 UART: [art] Store in in slot 0x4
21,038,297 UART: [art] Derive Key Pair
21,039,335 UART: [art] Store priv key in slot 0x5
23,466,331 UART: [art] Derive Key Pair - Done
23,479,437 UART: [art] Signing Cert with AUTHO
23,480,739 UART: RITY.KEYID = 7
25,185,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,356 UART: [art] PUB.X = 7B5BFA05536FC808A001C6340D2D2E8F210B05D7BC85FEF0E235A4E3376E72D401D04B5C67A7BB7D4940D28302C4A6F6
25,194,627 UART: [art] PUB.Y = 95C7F745A64F84BF91C35F42346BFE90F806FA83B285AD2A12B79FB14660DE6E43A203D9675C0335C805A1B22E2C0B17
25,201,872 UART: [art] SIG.R = C9BF3BA16F6A37865042050444410450A0ED69EC48D031E5D3DE06371911A3D72EF55CE4CE82CB9392562E3B6D11A3F2
25,209,265 UART: [art] SIG.S = 3A6C916F4BFB4B55E13C25390DE32C76FACFBAFE854EFF426A11608AC3A673D4FCCC569F407391019D5F1FFE1E75887F
26,188,483 UART: Caliptra RT
26,189,174 UART: [state] CFI Enabled
26,306,878 UART: [rt] RT listening for mailbox commands...
26,308,860 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,878 UART: [rt]cmd =0x46504c54, len=4
26,340,421 >>> mbox cmd response data (8 bytes)
26,341,476 UART: [rt] FIPS self test
26,342,422 UART: [kat] ++
26,342,874 UART: [kat] sha1
26,347,438 UART: [kat] SHA2-256
26,348,881 UART: Fatal Error: 0x90010002
26,384,154 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,528,554 >>> mbox cmd response: failed
26,529,190 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,673,454 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
17,013,455 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,227,236 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,671 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,170 UART: [idev] Erasing UDS.KEYID = 0
1,505,062 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,696 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,545,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,706 UART: [ldev] --
1,584,993 UART: [fwproc] Waiting for Commands...
1,585,770 UART: [fwproc] Received command 0x46574c44
1,586,561 UART: [fwproc] Received Image of size 114940 bytes
2,892,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,261 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,390 >>> mbox cmd response: success
3,086,524 UART: [afmc] ++
3,086,692 UART: [afmc] CDI.KEYID = 6
3,087,054 UART: [afmc] SUBJECT.KEYID = 7
3,087,479 UART: [afmc] AUTHORITY.KEYID = 5
3,122,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,640 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,148 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,033 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,723 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,606 UART: [afmc] --
3,165,578 UART: [cold-reset] --
3,166,502 UART: [state] Locking Datavault
3,167,603 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,207 UART: [state] Locking ICCM
3,168,681 UART: [exit] Launching FMC @ 0x40000130
3,174,010 UART:
3,174,026 UART: Running Caliptra FMC ...
3,174,434 UART:
3,174,488 UART: [state] CFI Enabled
3,185,091 UART: [fht] FMC Alias Private Key: 7
3,292,924 UART: [art] Extend RT PCRs Done
3,293,352 UART: [art] Lock RT PCRs Done
3,295,020 UART: [art] Populate DV Done
3,303,351 UART: [fht] FMC Alias Private Key: 7
3,304,485 UART: [art] Derive CDI
3,304,765 UART: [art] Store in in slot 0x4
3,390,594 UART: [art] Derive Key Pair
3,390,954 UART: [art] Store priv key in slot 0x5
3,404,294 UART: [art] Derive Key Pair - Done
3,418,908 UART: [art] Signing Cert with AUTHO
3,419,388 UART: RITY.KEYID = 7
3,434,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,155 UART: [art] PUB.X = AC2FF958F59F4306E9773600A9FB22DEB3D6A9EEE6C5A0E69E9B908E761BB2E2995BE1A9811048846A32D9B9E013DF62
3,441,910 UART: [art] PUB.Y = F0A20A8CAE65CC90BBD487FDCB33D225AE67B7366113C66DD33643B08133ADD3135B1B46D8EFCF9ED9BF00D72EF86718
3,448,853 UART: [art] SIG.R = 3AF308A0B4511C97CB30C43A67676FCE45F7FD3216DF3BC90BCD616D7015243B8AD903E4254303EF197943DCC3C62F61
3,455,617 UART: [art] SIG.S = 7A41C9E1B464F1460859621B835FFC95E9C2ECFD5252E40741A9F40D82CD8319A84B41F5D628625FCA6F6A8B0C60601F
3,479,312 UART: Caliptra RT
3,479,565 UART: [state] CFI Enabled
3,587,547 UART: [rt] RT listening for mailbox commands...
3,588,210 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,019 UART: [rt]cmd =0x46504c54, len=4
3,619,285 >>> mbox cmd response data (8 bytes)
3,619,448 UART: [rt] FIPS self test
3,619,776 UART: [kat] ++
3,619,928 UART: [kat] sha1
3,624,230 UART: [kat] SHA2-256
3,626,346 UART: Fatal Error: 0x90010002
3,627,885 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,627,890 >>> mbox cmd response: failed
3,627,890 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,627,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,751 UART: [kat] SHA2-256
892,689 UART: [kat] SHA2-384
895,486 UART: [kat] SHA2-512-ACC
897,387 UART: [kat] ECC-384
903,256 UART: [kat] HMAC-384Kdf
907,930 UART: [kat] LMS
1,476,126 UART: [kat] --
1,477,091 UART: [cold-reset] ++
1,477,467 UART: [fht] Storing FHT @ 0x50003400
1,480,284 UART: [idev] ++
1,480,452 UART: [idev] CDI.KEYID = 6
1,480,812 UART: [idev] SUBJECT.KEYID = 7
1,481,236 UART: [idev] UDS.KEYID = 0
1,481,581 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,294 UART: [idev] Erasing UDS.KEYID = 0
1,506,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,714 UART: [idev] --
1,515,763 UART: [ldev] ++
1,515,931 UART: [ldev] CDI.KEYID = 6
1,516,294 UART: [ldev] SUBJECT.KEYID = 5
1,516,720 UART: [ldev] AUTHORITY.KEYID = 7
1,517,183 UART: [ldev] FE.KEYID = 1
1,522,665 UART: [ldev] Erasing FE.KEYID = 1
1,547,638 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,494 UART: [ldev] --
1,586,759 UART: [fwproc] Waiting for Commands...
1,587,464 UART: [fwproc] Received command 0x46574c44
1,588,255 UART: [fwproc] Received Image of size 114940 bytes
2,892,817 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,171 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,842 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,101 ready_for_fw is high
1,362,101 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,076 >>> mbox cmd response: success
2,995,802 UART:
2,995,818 UART: Running Caliptra FMC ...
2,996,226 UART:
2,996,280 UART: [state] CFI Enabled
3,006,495 UART: [fht] FMC Alias Private Key: 7
3,114,430 UART: [art] Extend RT PCRs Done
3,114,858 UART: [art] Lock RT PCRs Done
3,116,378 UART: [art] Populate DV Done
3,124,641 UART: [fht] FMC Alias Private Key: 7
3,125,761 UART: [art] Derive CDI
3,126,041 UART: [art] Store in in slot 0x4
3,211,302 UART: [art] Derive Key Pair
3,211,662 UART: [art] Store priv key in slot 0x5
3,225,164 UART: [art] Derive Key Pair - Done
3,239,598 UART: [art] Signing Cert with AUTHO
3,240,078 UART: RITY.KEYID = 7
3,255,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,255,939 UART: [art] PUB.X = 8F7C3E66961244023C660EDE36F23B65D30228029B68D7B932DD39493074C1BCFBE95BEB727F975C8BC855E58F9CAD62
3,262,701 UART: [art] PUB.Y = DC43CF3712C7E5B4A34698582F25C1CB2A07416C5832B56590569082B682E42DEB12BEEE903DBCBD94CEC4BAE3A2A41F
3,269,662 UART: [art] SIG.R = 5982F2A34DA4163155897A92C1E13E4E4D5D1B4713E23FE0F222BA72DC8465194F79CA1223E376DC1EC28E1CB78F4676
3,276,434 UART: [art] SIG.S = C95E14F5362649C932A0CAAE215A1A06DF12673AFF0E73441DBB0C1555AF37C489A29239147FB6E51A7A7847CEB5AFDD
3,300,858 UART: Caliptra RT
3,301,111 UART: [state] CFI Enabled
3,409,520 UART: [rt] RT listening for mailbox commands...
3,410,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,158 UART: [rt]cmd =0x46504c54, len=4
3,441,288 >>> mbox cmd response data (8 bytes)
3,441,449 UART: [rt] FIPS self test
3,441,777 UART: [kat] ++
3,441,929 UART: [kat] sha1
3,446,035 UART: [kat] SHA2-256
3,448,101 UART: Fatal Error: 0x90010002
3,449,640 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,449,645 >>> mbox cmd response: failed
3,449,645 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,449,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,812 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
903,477 UART: [kat] HMAC-384Kdf
908,173 UART: [kat] LMS
1,476,369 UART: [kat] --
1,477,152 UART: [cold-reset] ++
1,477,654 UART: [fht] Storing FHT @ 0x50003400
1,480,415 UART: [idev] ++
1,480,583 UART: [idev] CDI.KEYID = 6
1,480,943 UART: [idev] SUBJECT.KEYID = 7
1,481,367 UART: [idev] UDS.KEYID = 0
1,481,712 ready_for_fw is high
1,481,712 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,615 UART: [idev] Erasing UDS.KEYID = 0
1,506,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,329 UART: [idev] --
1,516,398 UART: [ldev] ++
1,516,566 UART: [ldev] CDI.KEYID = 6
1,516,929 UART: [ldev] SUBJECT.KEYID = 5
1,517,355 UART: [ldev] AUTHORITY.KEYID = 7
1,517,818 UART: [ldev] FE.KEYID = 1
1,523,098 UART: [ldev] Erasing FE.KEYID = 1
1,548,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,037 UART: [ldev] --
1,587,432 UART: [fwproc] Waiting for Commands...
1,588,111 UART: [fwproc] Received command 0x46574c44
1,588,902 UART: [fwproc] Received Image of size 114940 bytes
2,893,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,149 >>> mbox cmd response: success
3,088,197 UART: [afmc] ++
3,088,365 UART: [afmc] CDI.KEYID = 6
3,088,727 UART: [afmc] SUBJECT.KEYID = 7
3,089,152 UART: [afmc] AUTHORITY.KEYID = 5
3,124,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,059 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,567 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,452 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,142 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,025 UART: [afmc] --
3,168,005 UART: [cold-reset] --
3,168,747 UART: [state] Locking Datavault
3,170,076 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,680 UART: [state] Locking ICCM
3,171,254 UART: [exit] Launching FMC @ 0x40000130
3,176,583 UART:
3,176,599 UART: Running Caliptra FMC ...
3,177,007 UART:
3,177,150 UART: [state] CFI Enabled
3,187,785 UART: [fht] FMC Alias Private Key: 7
3,296,272 UART: [art] Extend RT PCRs Done
3,296,700 UART: [art] Lock RT PCRs Done
3,298,196 UART: [art] Populate DV Done
3,306,389 UART: [fht] FMC Alias Private Key: 7
3,307,321 UART: [art] Derive CDI
3,307,601 UART: [art] Store in in slot 0x4
3,393,206 UART: [art] Derive Key Pair
3,393,566 UART: [art] Store priv key in slot 0x5
3,407,168 UART: [art] Derive Key Pair - Done
3,422,054 UART: [art] Signing Cert with AUTHO
3,422,534 UART: RITY.KEYID = 7
3,437,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,443 UART: [art] PUB.X = 65F8392B158B2714AF61676F108BD680627B611C82D3210EDEBD3BDC43D53D0946EC7549A6EC13CC511A89D8E8E6D169
3,445,211 UART: [art] PUB.Y = 7946B0055F98EE80A7261C0588FE8DB82C6EDF35D50BAED5CD993194B359961B4093FA4B40DE4561F3C01CF68B44033D
3,452,155 UART: [art] SIG.R = 7DAD348EC45190C7BFF011FA326FA0F7F92F2B582E0C49EE3C4EAFB55CA71D6155D5CBFEC94C6D245A011577A6B89FB5
3,458,941 UART: [art] SIG.S = E85524F4B6A849F620D0CBFD666531AF36A25FDF182BA8BB5FA77C8992B7866576ED85108ED8D26A461C8AD0DAA61890
3,482,320 UART: Caliptra RT
3,482,665 UART: [state] CFI Enabled
3,590,822 UART: [rt] RT listening for mailbox commands...
3,591,485 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,336 UART: [rt]cmd =0x46504c54, len=4
3,622,546 >>> mbox cmd response data (8 bytes)
3,622,673 UART: [rt] FIPS self test
3,623,001 UART: [kat] ++
3,623,153 UART: [kat] sha1
3,627,361 UART: [kat] SHA2-256
3,629,397 UART: Fatal Error: 0x90010002
3,630,936 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,630,941 >>> mbox cmd response: failed
3,630,941 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,630,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,876 UART: [kat] SHA2-256
892,814 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,291 UART: [kat] HMAC-384Kdf
907,921 UART: [kat] LMS
1,476,117 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,558 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,357 UART: [idev] Erasing UDS.KEYID = 0
1,506,243 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,985 UART: [idev] --
1,516,126 UART: [ldev] ++
1,516,294 UART: [ldev] CDI.KEYID = 6
1,516,657 UART: [ldev] SUBJECT.KEYID = 5
1,517,083 UART: [ldev] AUTHORITY.KEYID = 7
1,517,546 UART: [ldev] FE.KEYID = 1
1,522,830 UART: [ldev] Erasing FE.KEYID = 1
1,548,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,009 UART: [ldev] --
1,588,448 UART: [fwproc] Waiting for Commands...
1,589,133 UART: [fwproc] Received command 0x46574c44
1,589,924 UART: [fwproc] Received Image of size 114940 bytes
2,894,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,080 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,432 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,088,141 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,328 ready_for_fw is high
1,363,328 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,085 >>> mbox cmd response: success
2,999,099 UART:
2,999,115 UART: Running Caliptra FMC ...
2,999,523 UART:
2,999,666 UART: [state] CFI Enabled
3,010,503 UART: [fht] FMC Alias Private Key: 7
3,118,104 UART: [art] Extend RT PCRs Done
3,118,532 UART: [art] Lock RT PCRs Done
3,119,866 UART: [art] Populate DV Done
3,128,261 UART: [fht] FMC Alias Private Key: 7
3,129,389 UART: [art] Derive CDI
3,129,669 UART: [art] Store in in slot 0x4
3,215,576 UART: [art] Derive Key Pair
3,215,936 UART: [art] Store priv key in slot 0x5
3,228,884 UART: [art] Derive Key Pair - Done
3,243,675 UART: [art] Signing Cert with AUTHO
3,244,155 UART: RITY.KEYID = 7
3,259,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,282 UART: [art] PUB.X = 1DE277B462C6E0A4B391631C1897FB70F544F9BE259194A6748F541C976A26F1CDF2A09EB96835BE29BAB588FEE7CED1
3,267,062 UART: [art] PUB.Y = 54FD26AB8C64179D6AFD3ECA5B8B3DD7CFE1AA187D32DBAD60B9EDFB43B02244EF0104FB034FDE649C5D59E6389B2807
3,274,024 UART: [art] SIG.R = FE3C67AEE1E19CECB369B5222C4C5ED87C1213CA4DB910661120C432B6686CAE78B1BA709B49E9FAF33FF139572711DF
3,280,808 UART: [art] SIG.S = 7F50695A417B3058A9C111FE26170C30AA96A6405BE87F27EE72E59E9909A89A2CB68870525D3816CCB9985BB9452943
3,303,881 UART: Caliptra RT
3,304,226 UART: [state] CFI Enabled
3,412,471 UART: [rt] RT listening for mailbox commands...
3,413,134 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,679 UART: [rt]cmd =0x46504c54, len=4
3,443,885 >>> mbox cmd response data (8 bytes)
3,444,124 UART: [rt] FIPS self test
3,444,452 UART: [kat] ++
3,444,604 UART: [kat] sha1
3,448,808 UART: [kat] SHA2-256
3,450,780 UART: Fatal Error: 0x90010002
3,452,319 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,452,324 >>> mbox cmd response: failed
3,452,324 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,452,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,606 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,047 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
893,454 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,579 UART: [kat] ++
897,731 UART: [kat] sha1
902,219 UART: [kat] SHA2-256
904,159 UART: [kat] SHA2-384
907,056 UART: [kat] SHA2-512-ACC
908,957 UART: [kat] ECC-384
918,740 UART: [kat] HMAC-384Kdf
923,398 UART: [kat] LMS
1,171,726 UART: [kat] --
1,172,889 UART: [cold-reset] ++
1,173,449 UART: [fht] FHT @ 0x50003400
1,176,296 UART: [idev] ++
1,176,464 UART: [idev] CDI.KEYID = 6
1,176,824 UART: [idev] SUBJECT.KEYID = 7
1,177,248 UART: [idev] UDS.KEYID = 0
1,177,593 ready_for_fw is high
1,177,593 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,694 UART: [idev] Erasing UDS.KEYID = 0
1,201,989 UART: [idev] Sha1 KeyId Algorithm
1,210,405 UART: [idev] --
1,211,293 UART: [ldev] ++
1,211,461 UART: [ldev] CDI.KEYID = 6
1,211,824 UART: [ldev] SUBJECT.KEYID = 5
1,212,250 UART: [ldev] AUTHORITY.KEYID = 7
1,212,713 UART: [ldev] FE.KEYID = 1
1,217,765 UART: [ldev] Erasing FE.KEYID = 1
1,244,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,533 UART: [ldev] --
1,283,830 UART: [fwproc] Wait for Commands...
1,284,504 UART: [fwproc] Recv command 0x46574c44
1,285,232 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,854 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,627 >>> mbox cmd response: success
2,783,813 UART: [afmc] ++
2,783,981 UART: [afmc] CDI.KEYID = 6
2,784,343 UART: [afmc] SUBJECT.KEYID = 7
2,784,768 UART: [afmc] AUTHORITY.KEYID = 5
2,820,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,696 UART: [afmc] --
2,863,606 UART: [cold-reset] --
2,864,318 UART: [state] Locking Datavault
2,865,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,981 UART: [state] Locking ICCM
2,866,637 UART: [exit] Launching FMC @ 0x40000130
2,871,966 UART:
2,871,982 UART: Running Caliptra FMC ...
2,872,390 UART:
2,872,444 UART: [state] CFI Enabled
2,882,835 UART: [fht] FMC Alias Private Key: 7
2,990,716 UART: [art] Extend RT PCRs Done
2,991,144 UART: [art] Lock RT PCRs Done
2,992,684 UART: [art] Populate DV Done
3,001,181 UART: [fht] FMC Alias Private Key: 7
3,002,209 UART: [art] Derive CDI
3,002,489 UART: [art] Store in in slot 0x4
3,088,366 UART: [art] Derive Key Pair
3,088,726 UART: [art] Store priv key in slot 0x5
3,101,530 UART: [art] Derive Key Pair - Done
3,116,289 UART: [art] Signing Cert with AUTHO
3,116,769 UART: RITY.KEYID = 7
3,132,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,996 UART: [art] PUB.X = AD9CF16FA337B67E8BE8A4C18E74A7C929A2A4A74DB66D2978DB9C8969A35FC7F92B7B4D658341113E85F1D159F8CA1C
3,139,780 UART: [art] PUB.Y = 2538DA82B29AEEBDF074DDF06277FDA02A5C6619E6525A7533B765C7B71C13A98C25C2FE2CC893632A34AA4A1E92F315
3,146,740 UART: [art] SIG.R = AFB8EAF70D832B8E74CA958C64FA04E5F5CE5F442E87CA194FCA4AE0AB2D3559CDABFB2F514BEB26910DA5EDF9A2B467
3,153,533 UART: [art] SIG.S = 5D6AAD89F077A9305EC02C8CF706F09FFF930CE99D851A03A5DE3E6CBB530FD2A6F58C9DB07598B6C20590A6A3AAE897
3,177,045 UART: Caliptra RT
3,177,298 UART: [state] CFI Enabled
3,284,981 UART: [rt] RT listening for mailbox commands...
3,285,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,365 UART: [rt]cmd =0x46504c54, len=4
3,316,279 >>> mbox cmd response data (8 bytes)
3,316,510 UART: [rt] FIPS self test
3,316,838 UART: [kat] ++
3,316,990 UART: [kat] sha1
3,321,400 UART: [kat] SHA2-256
3,323,358 UART: Fatal Error: 0x90010002
3,324,897 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,902 >>> mbox cmd response: failed
3,324,902 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
893,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,009 UART: [kat] ++
898,161 UART: [kat] sha1
902,359 UART: [kat] SHA2-256
904,299 UART: [kat] SHA2-384
907,240 UART: [kat] SHA2-512-ACC
909,141 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,236 UART: [kat] LMS
1,171,564 UART: [kat] --
1,172,293 UART: [cold-reset] ++
1,172,869 UART: [fht] FHT @ 0x50003400
1,175,542 UART: [idev] ++
1,175,710 UART: [idev] CDI.KEYID = 6
1,176,070 UART: [idev] SUBJECT.KEYID = 7
1,176,494 UART: [idev] UDS.KEYID = 0
1,176,839 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,796 UART: [idev] Erasing UDS.KEYID = 0
1,201,707 UART: [idev] Sha1 KeyId Algorithm
1,210,107 UART: [idev] --
1,211,091 UART: [ldev] ++
1,211,259 UART: [ldev] CDI.KEYID = 6
1,211,622 UART: [ldev] SUBJECT.KEYID = 5
1,212,048 UART: [ldev] AUTHORITY.KEYID = 7
1,212,511 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,244,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,901 UART: [ldev] --
1,283,228 UART: [fwproc] Wait for Commands...
1,283,870 UART: [fwproc] Recv command 0x46574c44
1,284,598 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,840 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,571 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,445 ready_for_fw is high
1,059,445 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,034 >>> mbox cmd response: success
2,694,992 UART:
2,695,008 UART: Running Caliptra FMC ...
2,695,416 UART:
2,695,470 UART: [state] CFI Enabled
2,705,695 UART: [fht] FMC Alias Private Key: 7
2,813,404 UART: [art] Extend RT PCRs Done
2,813,832 UART: [art] Lock RT PCRs Done
2,815,330 UART: [art] Populate DV Done
2,823,737 UART: [fht] FMC Alias Private Key: 7
2,824,851 UART: [art] Derive CDI
2,825,131 UART: [art] Store in in slot 0x4
2,910,458 UART: [art] Derive Key Pair
2,910,818 UART: [art] Store priv key in slot 0x5
2,923,952 UART: [art] Derive Key Pair - Done
2,938,848 UART: [art] Signing Cert with AUTHO
2,939,328 UART: RITY.KEYID = 7
2,955,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,809 UART: [art] PUB.X = 33A4FD062B55BD2C51FDF146FFB7BB3D5AFAE1315492083E8BBEA871348A10A2D44E79ECDBD389056121A7563E7716DA
2,962,584 UART: [art] PUB.Y = 85ACD64825BEE528072541C069DA98491152400D1327E0FD5E3BC2238609BA4C49957BF24E7A9136BCC117865ABC4414
2,969,521 UART: [art] SIG.R = 76F38B67A71B72688140B782AB5BEE080FB3F48CAECFA1618E8A3F6125245C1D0D696CBAF94AA53D809653BB7F4CE379
2,976,294 UART: [art] SIG.S = C84EABED2F38AE682DA8DC7311BF6D0C4D8A2069436B0EBDE4B8C3AC83896773EF135D1BB7AE39D4709B10D2A2295767
2,999,637 UART: Caliptra RT
2,999,890 UART: [state] CFI Enabled
3,107,715 UART: [rt] RT listening for mailbox commands...
3,108,378 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,189 UART: [rt]cmd =0x46504c54, len=4
3,139,323 >>> mbox cmd response data (8 bytes)
3,139,636 UART: [rt] FIPS self test
3,139,964 UART: [kat] ++
3,140,116 UART: [kat] sha1
3,144,494 UART: [kat] SHA2-256
3,146,474 UART: Fatal Error: 0x90010002
3,148,013 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,018 >>> mbox cmd response: failed
3,148,018 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,521 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,458 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,969 UART: [state] LifecycleState = Unprovisioned
86,624 UART: [state] DebugLocked = No
87,342 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [kat] SHA2-256
894,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,288 UART: [kat] ++
898,440 UART: [kat] sha1
902,836 UART: [kat] SHA2-256
904,776 UART: [kat] SHA2-384
907,521 UART: [kat] SHA2-512-ACC
909,422 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,172,940 UART: [cold-reset] ++
1,173,274 UART: [fht] FHT @ 0x50003400
1,176,003 UART: [idev] ++
1,176,171 UART: [idev] CDI.KEYID = 6
1,176,531 UART: [idev] SUBJECT.KEYID = 7
1,176,955 UART: [idev] UDS.KEYID = 0
1,177,300 ready_for_fw is high
1,177,300 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,857 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,310 UART: [idev] --
1,211,326 UART: [ldev] ++
1,211,494 UART: [ldev] CDI.KEYID = 6
1,211,857 UART: [ldev] SUBJECT.KEYID = 5
1,212,283 UART: [ldev] AUTHORITY.KEYID = 7
1,212,746 UART: [ldev] FE.KEYID = 1
1,217,962 UART: [ldev] Erasing FE.KEYID = 1
1,244,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,680 UART: [ldev] --
1,283,049 UART: [fwproc] Wait for Commands...
1,283,649 UART: [fwproc] Recv command 0x46574c44
1,284,377 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,135 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,439 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,192 >>> mbox cmd response: success
2,782,354 UART: [afmc] ++
2,782,522 UART: [afmc] CDI.KEYID = 6
2,782,884 UART: [afmc] SUBJECT.KEYID = 7
2,783,309 UART: [afmc] AUTHORITY.KEYID = 5
2,818,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,055 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,783 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,668 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,387 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,315 UART: [afmc] --
2,862,329 UART: [cold-reset] --
2,863,087 UART: [state] Locking Datavault
2,864,124 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,728 UART: [state] Locking ICCM
2,865,286 UART: [exit] Launching FMC @ 0x40000130
2,870,615 UART:
2,870,631 UART: Running Caliptra FMC ...
2,871,039 UART:
2,871,182 UART: [state] CFI Enabled
2,881,799 UART: [fht] FMC Alias Private Key: 7
2,989,900 UART: [art] Extend RT PCRs Done
2,990,328 UART: [art] Lock RT PCRs Done
2,992,214 UART: [art] Populate DV Done
3,000,263 UART: [fht] FMC Alias Private Key: 7
3,001,193 UART: [art] Derive CDI
3,001,473 UART: [art] Store in in slot 0x4
3,087,066 UART: [art] Derive Key Pair
3,087,426 UART: [art] Store priv key in slot 0x5
3,100,844 UART: [art] Derive Key Pair - Done
3,115,916 UART: [art] Signing Cert with AUTHO
3,116,396 UART: RITY.KEYID = 7
3,131,812 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,577 UART: [art] PUB.X = 88FBF15BE46571D6C3571D6CA04F5D02EB57F06E4D9362DE34BAA6487B4F6AC64B4F6375D8C01AF1F2055F4B60220EB0
3,139,350 UART: [art] PUB.Y = E6D5ABC67769B000D145773D350760AD90D01FEE512F50BAFDBD8B373B03B074FFCEAEECE0FABA91B3B92E82E47FFF1C
3,146,300 UART: [art] SIG.R = 0CAB784BEC68043824A537B9D3C0C57B0BCBAA417C3DF5F0D90D5B93B7333AEBB372101C424DDDEB39A2851EC8F146F0
3,153,076 UART: [art] SIG.S = D00245F4A215005767D6435A0A57586A09375D86F46D134ABDAF2C9A827856C0A23CBE2D923156EF5BB2B27BF06D7FE3
3,176,640 UART: Caliptra RT
3,176,985 UART: [state] CFI Enabled
3,285,320 UART: [rt] RT listening for mailbox commands...
3,285,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,936 UART: [rt]cmd =0x46504c54, len=4
3,317,152 >>> mbox cmd response data (8 bytes)
3,317,361 UART: [rt] FIPS self test
3,317,689 UART: [kat] ++
3,317,841 UART: [kat] sha1
3,322,009 UART: [kat] SHA2-256
3,324,153 UART: Fatal Error: 0x90010002
3,325,692 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,697 >>> mbox cmd response: failed
3,325,697 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
893,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,714 UART: [kat] ++
897,866 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,857 UART: [kat] SHA2-512-ACC
908,758 UART: [kat] ECC-384
918,313 UART: [kat] HMAC-384Kdf
922,857 UART: [kat] LMS
1,171,185 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,820 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,057 UART: [idev] Erasing UDS.KEYID = 0
1,200,982 UART: [idev] Sha1 KeyId Algorithm
1,209,620 UART: [idev] --
1,210,566 UART: [ldev] ++
1,210,734 UART: [ldev] CDI.KEYID = 6
1,211,097 UART: [ldev] SUBJECT.KEYID = 5
1,211,523 UART: [ldev] AUTHORITY.KEYID = 7
1,211,986 UART: [ldev] FE.KEYID = 1
1,217,262 UART: [ldev] Erasing FE.KEYID = 1
1,243,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,364 UART: [ldev] --
1,282,833 UART: [fwproc] Wait for Commands...
1,283,485 UART: [fwproc] Recv command 0x46574c44
1,284,213 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,385 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,204 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,998 ready_for_fw is high
1,059,998 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,883 >>> mbox cmd response: success
2,696,707 UART:
2,696,723 UART: Running Caliptra FMC ...
2,697,131 UART:
2,697,274 UART: [state] CFI Enabled
2,707,801 UART: [fht] FMC Alias Private Key: 7
2,815,404 UART: [art] Extend RT PCRs Done
2,815,832 UART: [art] Lock RT PCRs Done
2,817,248 UART: [art] Populate DV Done
2,825,497 UART: [fht] FMC Alias Private Key: 7
2,826,639 UART: [art] Derive CDI
2,826,919 UART: [art] Store in in slot 0x4
2,912,562 UART: [art] Derive Key Pair
2,912,922 UART: [art] Store priv key in slot 0x5
2,926,734 UART: [art] Derive Key Pair - Done
2,941,536 UART: [art] Signing Cert with AUTHO
2,942,016 UART: RITY.KEYID = 7
2,957,236 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,001 UART: [art] PUB.X = F7FC488FD2D7409B1B73257368C5B22814E22E7A62FD02B36F1E92B4A261F0B48D4A46921D1EFC8B26E653868B7B6D0B
2,964,771 UART: [art] PUB.Y = 49E9D56F22C710F5BE14A2FD965B2350009136D20839A00256D414B90F1CEA0AD521EDDB38C1084B7466DC0C9FC55AF7
2,971,687 UART: [art] SIG.R = 4F5E72158D9AE9E2CAA816EE34B28D7B42152B712AE37E462814B86070C7885EF1B52126725D93E216128C4F14F492ED
2,978,455 UART: [art] SIG.S = 3529E08A3A713A5BE760352B0CEFA1BD859893E18C87A9D378FFF8216C172799573FDE7CDA7DDA7070009A2644091C9F
3,001,544 UART: Caliptra RT
3,001,889 UART: [state] CFI Enabled
3,109,752 UART: [rt] RT listening for mailbox commands...
3,110,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,290 UART: [rt]cmd =0x46504c54, len=4
3,141,212 >>> mbox cmd response data (8 bytes)
3,141,449 UART: [rt] FIPS self test
3,141,777 UART: [kat] ++
3,141,929 UART: [kat] sha1
3,146,183 UART: [kat] SHA2-256
3,148,315 UART: Fatal Error: 0x90010002
3,149,854 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,859 >>> mbox cmd response: failed
3,149,859 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,045 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,090 UART: [kat] SHA2-512-ACC
905,991 UART: [kat] ECC-384
915,566 UART: [kat] HMAC-384Kdf
920,248 UART: [kat] LMS
1,168,560 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,137 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,137 UART: [idev] Erasing UDS.KEYID = 0
1,199,089 UART: [idev] Sha1 KeyId Algorithm
1,208,133 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,792 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,222 UART: [ldev] --
1,281,734 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,006 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,616 >>> mbox cmd response: success
2,781,767 UART: [afmc] ++
2,781,935 UART: [afmc] CDI.KEYID = 6
2,782,298 UART: [afmc] SUBJECT.KEYID = 7
2,782,724 UART: [afmc] AUTHORITY.KEYID = 5
2,818,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,250 UART: [afmc] --
2,861,362 UART: [cold-reset] --
2,862,184 UART: [state] Locking Datavault
2,863,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,945 UART: [state] Locking ICCM
2,864,465 UART: [exit] Launching FMC @ 0x40000130
2,869,794 UART:
2,869,810 UART: Running Caliptra FMC ...
2,870,218 UART:
2,870,272 UART: [state] CFI Enabled
2,880,787 UART: [fht] FMC Alias Private Key: 7
2,987,886 UART: [art] Extend RT PCRs Done
2,988,314 UART: [art] Lock RT PCRs Done
2,989,744 UART: [art] Populate DV Done
2,998,049 UART: [fht] FMC Alias Private Key: 7
2,999,003 UART: [art] Derive CDI
2,999,283 UART: [art] Store in in slot 0x4
3,085,082 UART: [art] Derive Key Pair
3,085,442 UART: [art] Store priv key in slot 0x5
3,098,684 UART: [art] Derive Key Pair - Done
3,113,531 UART: [art] Signing Cert with AUTHO
3,114,011 UART: RITY.KEYID = 7
3,129,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,888 UART: [art] PUB.X = 75FFBB6C4A45B1FB12AE04FE5FC0C9E715195C01BB8CECD2C6CFDAB40155381C4C924C334814037009EB816C42E09371
3,136,655 UART: [art] PUB.Y = 83C2241B7694C7D386A1D22E3A7D19FB5579EB87D0B1F92CA0D17A3C1E7890E98E48598E8CC67F680094537BD09D0940
3,143,580 UART: [art] SIG.R = C116E658A36F13B98709D3390656603543730163964A753F5522D06E786D66595AB7EC01BBF6A331C82197275C30E0E3
3,150,322 UART: [art] SIG.S = 6BC7E4817F84A9A13256961EAAB806D366D364CFFFC2F2C52D7DBF2BCBC6F08B5AE493E55EC35F1840E2FC8D0B880A6A
3,174,360 UART: Caliptra RT
3,174,613 UART: [state] CFI Enabled
3,282,952 UART: [rt] RT listening for mailbox commands...
3,283,615 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,280 UART: [rt]cmd =0x46504c54, len=4
3,314,310 >>> mbox cmd response data (8 bytes)
3,314,615 UART: [rt] FIPS self test
3,314,943 UART: [kat] ++
3,315,095 UART: [kat] sha1
3,319,371 UART: [kat] SHA2-256
3,321,263 UART: Fatal Error: 0x90010002
3,322,802 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,322,807 >>> mbox cmd response: failed
3,322,807 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,322,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,271 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,174,425 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,414 UART: [ldev] ++
1,208,582 UART: [ldev] CDI.KEYID = 6
1,208,946 UART: [ldev] SUBJECT.KEYID = 5
1,209,373 UART: [ldev] AUTHORITY.KEYID = 7
1,209,836 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,240,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,522 UART: [fwproc] Wait for Commands...
1,280,101 UART: [fwproc] Recv command 0x46574c44
1,280,834 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,626 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,416 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,594 ready_for_fw is high
1,055,594 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,307 >>> mbox cmd response: success
2,690,763 UART:
2,690,779 UART: Running Caliptra FMC ...
2,691,187 UART:
2,691,241 UART: [state] CFI Enabled
2,701,750 UART: [fht] FMC Alias Private Key: 7
2,810,225 UART: [art] Extend RT PCRs Done
2,810,653 UART: [art] Lock RT PCRs Done
2,812,183 UART: [art] Populate DV Done
2,820,460 UART: [fht] FMC Alias Private Key: 7
2,821,498 UART: [art] Derive CDI
2,821,778 UART: [art] Store in in slot 0x4
2,907,373 UART: [art] Derive Key Pair
2,907,733 UART: [art] Store priv key in slot 0x5
2,920,691 UART: [art] Derive Key Pair - Done
2,935,106 UART: [art] Signing Cert with AUTHO
2,935,586 UART: RITY.KEYID = 7
2,950,508 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,273 UART: [art] PUB.X = 7DA454F7739D89D42144FBC9F4E04CD1F2F9EC6A3BAA179AF9B5F2D92EA9DD2CB138C6967CB8B659CADE5AF36BA56D48
2,958,069 UART: [art] PUB.Y = BAD8C1F3AED2366BA25D471237DF95F852643A42B7744332C47BA2B4D9F4DEB4B35689E62AD49A2602F003649314CF38
2,965,017 UART: [art] SIG.R = 7BCE3437664AA6487116BD338E7ABEA1EBD55A7156F45F021392C698EB320559F309456482B1F67DA012E14A0E6B741C
2,971,775 UART: [art] SIG.S = EA2E9D5B789A48C60847F8302A7729921A4589CC83B96524F81F0BB78203AB29F426AF76B9AB0AB065086A51E412CC4C
2,995,687 UART: Caliptra RT
2,995,940 UART: [state] CFI Enabled
3,103,305 UART: [rt] RT listening for mailbox commands...
3,103,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,725 UART: [rt]cmd =0x46504c54, len=4
3,134,893 >>> mbox cmd response data (8 bytes)
3,135,118 UART: [rt] FIPS self test
3,135,446 UART: [kat] ++
3,135,598 UART: [kat] sha1
3,139,646 UART: [kat] SHA2-256
3,141,572 UART: Fatal Error: 0x90010002
3,143,111 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,143,116 >>> mbox cmd response: failed
3,143,116 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,143,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,314 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,777 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
915,377 UART: [kat] HMAC-384Kdf
920,001 UART: [kat] LMS
1,168,313 UART: [kat] --
1,169,188 UART: [cold-reset] ++
1,169,698 UART: [fht] FHT @ 0x50003400
1,172,428 UART: [idev] ++
1,172,596 UART: [idev] CDI.KEYID = 6
1,172,957 UART: [idev] SUBJECT.KEYID = 7
1,173,382 UART: [idev] UDS.KEYID = 0
1,173,728 ready_for_fw is high
1,173,728 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,378 UART: [idev] Erasing UDS.KEYID = 0
1,198,438 UART: [idev] Sha1 KeyId Algorithm
1,207,466 UART: [idev] --
1,208,505 UART: [ldev] ++
1,208,673 UART: [ldev] CDI.KEYID = 6
1,209,037 UART: [ldev] SUBJECT.KEYID = 5
1,209,464 UART: [ldev] AUTHORITY.KEYID = 7
1,209,927 UART: [ldev] FE.KEYID = 1
1,215,059 UART: [ldev] Erasing FE.KEYID = 1
1,241,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,491 UART: [ldev] --
1,280,861 UART: [fwproc] Wait for Commands...
1,281,578 UART: [fwproc] Recv command 0x46574c44
1,282,311 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,070 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,830 >>> mbox cmd response: success
2,782,937 UART: [afmc] ++
2,783,105 UART: [afmc] CDI.KEYID = 6
2,783,468 UART: [afmc] SUBJECT.KEYID = 7
2,783,894 UART: [afmc] AUTHORITY.KEYID = 5
2,819,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,369 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,846 UART: [afmc] --
2,862,848 UART: [cold-reset] --
2,863,498 UART: [state] Locking Datavault
2,864,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,111 UART: [state] Locking ICCM
2,865,711 UART: [exit] Launching FMC @ 0x40000130
2,871,040 UART:
2,871,056 UART: Running Caliptra FMC ...
2,871,464 UART:
2,871,607 UART: [state] CFI Enabled
2,882,228 UART: [fht] FMC Alias Private Key: 7
2,989,909 UART: [art] Extend RT PCRs Done
2,990,337 UART: [art] Lock RT PCRs Done
2,992,321 UART: [art] Populate DV Done
3,000,442 UART: [fht] FMC Alias Private Key: 7
3,001,580 UART: [art] Derive CDI
3,001,860 UART: [art] Store in in slot 0x4
3,087,679 UART: [art] Derive Key Pair
3,088,039 UART: [art] Store priv key in slot 0x5
3,100,519 UART: [art] Derive Key Pair - Done
3,115,292 UART: [art] Signing Cert with AUTHO
3,115,772 UART: RITY.KEYID = 7
3,131,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,005 UART: [art] PUB.X = D0E6B5AC098B459AE33527CFBD5F8C3A0297832A855E101C3AEDA2C9F69886D1FCC7CBEE68050E0818DAD0A3646771C3
3,138,774 UART: [art] PUB.Y = E49F9CBD1D1691F05AC2DAF779F162FDD34EDCB42133A4AADD7E63CF4F6BFF58BF393D3A6187ACA59269A075E674F67A
3,145,748 UART: [art] SIG.R = 9A44FF878C257B525DD0815F1D310627FBBFFD88D36A657F9659EA25A0BA37AD6E16C6A6B48EB5209E1A284531AB7B9E
3,152,527 UART: [art] SIG.S = 9AE796997C55C8FFA459C72148ABBE07FFF717328903138303A9C0ACB1BC6E919FA997BA19FD43128978A2306BDE74EE
3,176,063 UART: Caliptra RT
3,176,408 UART: [state] CFI Enabled
3,284,176 UART: [rt] RT listening for mailbox commands...
3,284,839 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,598 UART: [rt]cmd =0x46504c54, len=4
3,315,686 >>> mbox cmd response data (8 bytes)
3,315,825 UART: [rt] FIPS self test
3,316,153 UART: [kat] ++
3,316,305 UART: [kat] sha1
3,320,641 UART: [kat] SHA2-256
3,322,615 UART: Fatal Error: 0x90010002
3,324,154 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,159 >>> mbox cmd response: failed
3,324,159 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,291 UART: [kat] HMAC-384Kdf
921,007 UART: [kat] LMS
1,169,319 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,175,014 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,364 UART: [idev] Sha1 KeyId Algorithm
1,209,208 UART: [idev] --
1,210,195 UART: [ldev] ++
1,210,363 UART: [ldev] CDI.KEYID = 6
1,210,727 UART: [ldev] SUBJECT.KEYID = 5
1,211,154 UART: [ldev] AUTHORITY.KEYID = 7
1,211,617 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,138 UART: [fwproc] Recv command 0x46574c44
1,283,871 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,218 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,070 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,005 ready_for_fw is high
1,057,005 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,514 >>> mbox cmd response: success
2,695,154 UART:
2,695,170 UART: Running Caliptra FMC ...
2,695,578 UART:
2,695,721 UART: [state] CFI Enabled
2,705,948 UART: [fht] FMC Alias Private Key: 7
2,813,209 UART: [art] Extend RT PCRs Done
2,813,637 UART: [art] Lock RT PCRs Done
2,815,039 UART: [art] Populate DV Done
2,823,302 UART: [fht] FMC Alias Private Key: 7
2,824,284 UART: [art] Derive CDI
2,824,564 UART: [art] Store in in slot 0x4
2,909,785 UART: [art] Derive Key Pair
2,910,145 UART: [art] Store priv key in slot 0x5
2,923,713 UART: [art] Derive Key Pair - Done
2,938,443 UART: [art] Signing Cert with AUTHO
2,938,923 UART: RITY.KEYID = 7
2,953,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,762 UART: [art] PUB.X = 4D14667A5F10F0A33B6F55E71AC6172CAD17F55A5AF88A31C210B42E224857D4F09FD95C408E53081EDBFA1AA978DC29
2,961,539 UART: [art] PUB.Y = 9EB0C23D479A0F37213E9CC0539E740A14E60721A876E3999E589C9D326F71424F54E174A7521C07C4482E6FAAA75911
2,968,471 UART: [art] SIG.R = A1CFC6FA03ABCDFE7EED39586FC6B5AA4E3601222011ED62FFB443E904AAAD72DB2EDB5E9868432F5BC4CED29BB78970
2,975,260 UART: [art] SIG.S = 9EC5FDCB01065E6C02F2290EF29B82674649B9F17957B711B10F4EB1E05710B0A573525D21AFB0B3EBF4D000A94018BE
2,999,004 UART: Caliptra RT
2,999,349 UART: [state] CFI Enabled
3,107,727 UART: [rt] RT listening for mailbox commands...
3,108,390 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,155 UART: [rt]cmd =0x46504c54, len=4
3,139,161 >>> mbox cmd response data (8 bytes)
3,139,470 UART: [rt] FIPS self test
3,139,798 UART: [kat] ++
3,139,950 UART: [kat] sha1
3,144,034 UART: [kat] SHA2-256
3,146,172 UART: Fatal Error: 0x90010002
3,147,711 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,147,716 >>> mbox cmd response: failed
3,147,716 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,147,721 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,033 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,038 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,743,743 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,887,598 >>> mbox cmd response: failed
2,888,606 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,032,018 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
4,877,168 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,460,416 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,682,709 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,826,491 >>> mbox cmd response: failed
2,827,061 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,969,989 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
4,868,160 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,459,612 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,036,060 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,179,830 >>> mbox cmd response: failed
3,180,409 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,323,787 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
21,586,410 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,026,711 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,045,622 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,189,239 >>> mbox cmd response: failed
3,189,815 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,332,711 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,588,419 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,025,332 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,706,444 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,850,611 >>> mbox cmd response: failed
2,851,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,994,475 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,444,031 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,255,374 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,698,000 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,842,211 >>> mbox cmd response: failed
2,842,772 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,054 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,436,883 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,270,224 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,575 writing to cptra_bootfsm_go
3,055,311 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,199,875 >>> mbox cmd response: failed
3,200,476 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,343,635 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,186,364 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,901,992 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,059,518 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,203,530 >>> mbox cmd response: failed
3,204,075 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,347,376 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,168,904 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,897,539 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
2,701,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,846,432 >>> mbox cmd response: failed
2,847,011 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,990,315 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,466,613 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,325,293 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,701,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,845,255 >>> mbox cmd response: failed
2,845,826 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,988,964 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,438,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,236,429 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,055,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,200,046 >>> mbox cmd response: failed
3,200,609 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,344,679 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
20,175,714 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,908,655 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,052,345 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,197,201 >>> mbox cmd response: failed
3,197,797 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,341,207 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
20,177,076 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,904,328 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,122 >>> mbox cmd response: failed
812,122 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,773 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,119 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,932 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,940 >>> mbox cmd response: failed
811,940 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,907 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,953 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,507 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,515 >>> mbox cmd response: failed
812,515 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,812 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,150 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,519 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,527 >>> mbox cmd response: failed
812,527 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,956 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,194 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,202 >>> mbox cmd response: failed
812,202 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,208 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,137 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,426 >>> mbox cmd response: failed
812,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,847 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,355 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,985 >>> mbox cmd response: failed
811,985 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,542 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,032 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,629 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,637 >>> mbox cmd response: failed
812,637 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,908 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,010 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,280 >>> mbox cmd response: failed
812,280 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,105 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,933 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,192 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,200 >>> mbox cmd response: failed
812,200 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,593 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,127 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,999 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,007 >>> mbox cmd response: failed
812,007 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,770 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,638 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,383 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,391 >>> mbox cmd response: failed
812,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,138 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,024 UART:
192,398 UART: Running Caliptra ROM ...
193,610 UART:
193,765 UART: [state] CFI Enabled
267,459 UART: [state] LifecycleState = Unprovisioned
269,446 UART: [state] DebugLocked = No
271,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,581 UART: [kat] SHA2-256
445,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,854 UART: [kat] ++
456,350 UART: [kat] sha1
468,365 UART: [kat] SHA2-256
471,031 UART: [kat] SHA2-384
475,686 UART: [kat] SHA2-512-ACC
478,059 UART: [kat] ECC-384
2,768,654 UART: [kat] HMAC-384Kdf
2,801,333 UART: [kat] LMS
3,991,644 UART: [kat] --
3,997,258 UART: [cold-reset] ++
3,999,415 UART: [fht] Storing FHT @ 0x50003400
4,010,828 UART: [idev] ++
4,011,397 UART: [idev] CDI.KEYID = 6
4,012,314 UART: [idev] SUBJECT.KEYID = 7
4,013,566 UART: [idev] UDS.KEYID = 0
4,014,655 ready_for_fw is high
4,014,881 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,159,524 UART: [idev] Erasing UDS.KEYID = 0
7,346,905 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,264 UART: [idev] --
7,373,854 UART: [ldev] ++
7,374,419 UART: [ldev] CDI.KEYID = 6
7,375,355 UART: [ldev] SUBJECT.KEYID = 5
7,376,630 UART: [ldev] AUTHORITY.KEYID = 7
7,377,783 UART: [ldev] FE.KEYID = 1
7,423,204 UART: [ldev] Erasing FE.KEYID = 1
10,759,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,951 UART: [ldev] --
13,138,030 UART: [fwproc] Waiting for Commands...
13,140,779 UART: [fwproc] Received command 0x46574c44
13,142,969 UART: [fwproc] Received Image of size 114632 bytes
17,195,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,966 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,826 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,658,929 >>> mbox cmd response: success
17,663,620 UART: [afmc] ++
17,664,209 UART: [afmc] CDI.KEYID = 6
17,665,110 UART: [afmc] SUBJECT.KEYID = 7
17,666,382 UART: [afmc] AUTHORITY.KEYID = 5
21,028,864 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,451 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,765 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,148 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,004 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,435 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,355 UART: [afmc] --
23,397,895 UART: [cold-reset] --
23,401,376 UART: [state] Locking Datavault
23,405,229 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,975 UART: [state] Locking ICCM
23,409,684 UART: [exit] Launching FMC @ 0x40000130
23,418,084 UART:
23,418,329 UART: Running Caliptra FMC ...
23,419,454 UART:
23,419,614 UART: [state] CFI Enabled
23,488,742 UART: [fht] FMC Alias Private Key: 7
25,826,726 UART: [art] Extend RT PCRs Done
25,827,953 UART: [art] Lock RT PCRs Done
25,829,633 UART: [art] Populate DV Done
25,835,316 UART: [fht] FMC Alias Private Key: 7
25,836,915 UART: [art] Derive CDI
25,837,732 UART: [art] Store in in slot 0x4
25,896,674 UART: [art] Derive Key Pair
25,897,718 UART: [art] Store priv key in slot 0x5
29,189,858 UART: [art] Derive Key Pair - Done
29,202,918 UART: [art] Signing Cert with AUTHO
29,204,221 UART: RITY.KEYID = 7
31,490,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,437 UART: [art] PUB.X = E68C2CBC119AA6A051DB155629A84B57308C04B4E5809D6062445B1D7C2727386D97EA24166EEB2DD51AB9F804BF917A
31,499,723 UART: [art] PUB.Y = D88D0E04CF9CEA5C01180D5CD09B0EA59AB780E5217EC6E8063BCDE25B283025F7A8BFECE4E707F30B976ED9E491F2B4
31,506,914 UART: [art] SIG.R = 7B456F7AFEC758692723EF294EBE8C4933EACBDDCC6A21215144AF61EEB81FB5EF8006469830A9E18C7F8B1CA311A3CB
31,514,317 UART: [art] SIG.S = D6AF95A4A9207842F59A85E8830AC03A58503012DFA4B6993E55B48A001338DFDDC3133AB420B10663C0B20FF95982DA
32,819,012 UART: Caliptra RT
32,819,717 UART: [state] CFI Enabled
32,979,907 UART: [rt] RT listening for mailbox commands...
32,981,756 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,011,599 UART: [rt]cmd =0x46504c54, len=4
33,013,266 >>> mbox cmd response data (8 bytes)
33,014,399 UART: [rt] FIPS self test
33,015,351 UART: [kat] ++
33,015,804 UART: [kat] sha1
33,020,265 UART: [kat] SHA2-256
33,022,195 UART: [kat] SHA2-384
33,025,271 UART: [kat] SHA2-512-ACC
33,026,161 UART: Droping operation
33,026,954 UART: Fatal Error: 0x90050002
33,062,108 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,206,076 >>> mbox cmd response: failed
33,206,733 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,351,062 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,098 UART:
190,397 UART: Running Caliptra ROM ...
191,423 UART:
191,563 UART: [state] CFI Enabled
249,509 UART: [state] LifecycleState = Unprovisioned
251,433 UART: [state] DebugLocked = No
254,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,408 UART: [kat] SHA2-256
429,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,611 UART: [kat] ++
440,056 UART: [kat] sha1
450,667 UART: [kat] SHA2-256
453,358 UART: [kat] SHA2-384
458,886 UART: [kat] SHA2-512-ACC
461,285 UART: [kat] ECC-384
2,752,576 UART: [kat] HMAC-384Kdf
2,783,103 UART: [kat] LMS
3,973,412 UART: [kat] --
3,979,078 UART: [cold-reset] ++
3,981,715 UART: [fht] Storing FHT @ 0x50003400
3,993,361 UART: [idev] ++
3,993,924 UART: [idev] CDI.KEYID = 6
3,994,948 UART: [idev] SUBJECT.KEYID = 7
3,996,109 UART: [idev] UDS.KEYID = 0
3,997,725 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,142,245 UART: [idev] Erasing UDS.KEYID = 0
7,330,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,263 UART: [idev] --
7,357,893 UART: [ldev] ++
7,358,525 UART: [ldev] CDI.KEYID = 6
7,359,433 UART: [ldev] SUBJECT.KEYID = 5
7,360,652 UART: [ldev] AUTHORITY.KEYID = 7
7,361,939 UART: [ldev] FE.KEYID = 1
7,405,697 UART: [ldev] Erasing FE.KEYID = 1
10,740,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,122 UART: [ldev] --
13,118,151 UART: [fwproc] Waiting for Commands...
13,120,759 UART: [fwproc] Received command 0x46574c44
13,122,955 UART: [fwproc] Received Image of size 114632 bytes
17,180,399 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,644,654 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,783,264 ready_for_fw is high
3,783,898 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,857,563 >>> mbox cmd response: success
23,561,542 UART:
23,561,937 UART: Running Caliptra FMC ...
23,563,079 UART:
23,563,246 UART: [state] CFI Enabled
23,629,661 UART: [fht] FMC Alias Private Key: 7
25,967,024 UART: [art] Extend RT PCRs Done
25,968,262 UART: [art] Lock RT PCRs Done
25,970,135 UART: [art] Populate DV Done
25,975,602 UART: [fht] FMC Alias Private Key: 7
25,977,249 UART: [art] Derive CDI
25,977,988 UART: [art] Store in in slot 0x4
26,038,504 UART: [art] Derive Key Pair
26,039,547 UART: [art] Store priv key in slot 0x5
29,332,380 UART: [art] Derive Key Pair - Done
29,345,689 UART: [art] Signing Cert with AUTHO
29,347,001 UART: RITY.KEYID = 7
31,634,770 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,274 UART: [art] PUB.X = 50237C7E4A4B2F57C847B5A1B2E90D6ECB44CFC90FBB9866B5B09B27273D69228F0115508A5574FD14BDD192B5893686
31,643,484 UART: [art] PUB.Y = 2B5C0784E6F342241F34F97637808FA0D4CB93310EEBCB2FC17F2E3C374539050ECA058188919281E0FFFD32C4CD0AE6
31,650,753 UART: [art] SIG.R = D56AF26E5563CDFDB740E03254EDD9EB544A9D8A82F1BE66F276D0B91AD06BC33F07B5BC4ECFDE615DFBC53B1301209F
31,658,155 UART: [art] SIG.S = B0BE37A57949150D521E134F44BC128843D75CFA3D1661A696A537808D1E704184BD736AEB5BB7E125DCE3CB6A4A4A4D
32,963,111 UART: Caliptra RT
32,963,825 UART: [state] CFI Enabled
33,127,650 UART: [rt] RT listening for mailbox commands...
33,129,509 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,159,204 UART: [rt]cmd =0x46504c54, len=4
33,160,817 >>> mbox cmd response data (8 bytes)
33,161,953 UART: [rt] FIPS self test
33,162,897 UART: [kat] ++
33,163,348 UART: [kat] sha1
33,167,806 UART: [kat] SHA2-256
33,169,737 UART: [kat] SHA2-384
33,172,588 UART: [kat] SHA2-512-ACC
33,173,537 UART: Droping operation
33,174,312 UART: Fatal Error: 0x90050002
33,209,459 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,353,491 >>> mbox cmd response: failed
33,354,144 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,498,054 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,789,691 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,845,131 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,381 UART:
192,737 UART: Running Caliptra ROM ...
193,925 UART:
603,698 UART: [state] CFI Enabled
618,382 UART: [state] LifecycleState = Unprovisioned
620,298 UART: [state] DebugLocked = No
622,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,985 UART: [kat] SHA2-256
797,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,243 UART: [kat] ++
808,853 UART: [kat] sha1
820,160 UART: [kat] SHA2-256
822,883 UART: [kat] SHA2-384
828,733 UART: [kat] SHA2-512-ACC
831,113 UART: [kat] ECC-384
3,117,360 UART: [kat] HMAC-384Kdf
3,130,169 UART: [kat] LMS
4,320,286 UART: [kat] --
4,324,233 UART: [cold-reset] ++
4,325,677 UART: [fht] Storing FHT @ 0x50003400
4,337,185 UART: [idev] ++
4,337,755 UART: [idev] CDI.KEYID = 6
4,338,753 UART: [idev] SUBJECT.KEYID = 7
4,339,936 UART: [idev] UDS.KEYID = 0
4,340,979 ready_for_fw is high
4,341,188 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,485,182 UART: [idev] Erasing UDS.KEYID = 0
7,626,264 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,972 UART: [idev] --
7,650,858 UART: [ldev] ++
7,651,484 UART: [ldev] CDI.KEYID = 6
7,652,373 UART: [ldev] SUBJECT.KEYID = 5
7,653,640 UART: [ldev] AUTHORITY.KEYID = 7
7,654,871 UART: [ldev] FE.KEYID = 1
7,665,991 UART: [ldev] Erasing FE.KEYID = 1
10,956,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,162 UART: [ldev] --
13,315,991 UART: [fwproc] Waiting for Commands...
13,318,470 UART: [fwproc] Received command 0x46574c44
13,320,655 UART: [fwproc] Received Image of size 114632 bytes
17,371,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,032 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,837,560 >>> mbox cmd response: success
17,841,812 UART: [afmc] ++
17,842,458 UART: [afmc] CDI.KEYID = 6
17,843,349 UART: [afmc] SUBJECT.KEYID = 7
17,844,614 UART: [afmc] AUTHORITY.KEYID = 5
21,154,294 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,797 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,218 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,015 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,435 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,063 UART: [afmc] --
23,522,893 UART: [cold-reset] --
23,526,487 UART: [state] Locking Datavault
23,531,572 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,267 UART: [state] Locking ICCM
23,535,551 UART: [exit] Launching FMC @ 0x40000130
23,543,892 UART:
23,544,134 UART: Running Caliptra FMC ...
23,545,237 UART:
23,545,393 UART: [state] CFI Enabled
23,553,246 UART: [fht] FMC Alias Private Key: 7
25,884,255 UART: [art] Extend RT PCRs Done
25,885,479 UART: [art] Lock RT PCRs Done
25,887,398 UART: [art] Populate DV Done
25,892,652 UART: [fht] FMC Alias Private Key: 7
25,894,356 UART: [art] Derive CDI
25,895,094 UART: [art] Store in in slot 0x4
25,937,694 UART: [art] Derive Key Pair
25,938,736 UART: [art] Store priv key in slot 0x5
29,180,671 UART: [art] Derive Key Pair - Done
29,193,404 UART: [art] Signing Cert with AUTHO
29,194,705 UART: RITY.KEYID = 7
31,474,343 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,851 UART: [art] PUB.X = 5EFFF28016F602FBEC50577BF67DE9E4581EC21C22D5E4D8BA463D444350F2C2A475E3A2CA619DB786ADDDE36197B16E
31,483,105 UART: [art] PUB.Y = 9B39A347BEEBB9B9E91026678C7B93C1049E57417DC1216DF27589385DAC3605D1CC5EBE756AF19DB146DB3E311F9503
31,490,359 UART: [art] SIG.R = 13801B029B220C1433D6C849B3688A1E334A64AD5CDDF8AAD22C7ADFE7C8AAADA2C1C2F52D573C6ADEA3B4D7EE643F64
31,497,820 UART: [art] SIG.S = 6F7C1CA3FF8BADCE3665BBAC6ECFA8E65A8177449EFC8D018B11BCD0555079BE880CFE866971230B4FE1E10E37E73E31
32,803,141 UART: Caliptra RT
32,803,855 UART: [state] CFI Enabled
32,921,023 UART: [rt] RT listening for mailbox commands...
32,922,878 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,952,838 UART: [rt]cmd =0x46504c54, len=4
32,954,613 >>> mbox cmd response data (8 bytes)
32,955,736 UART: [rt] FIPS self test
32,956,692 UART: [kat] ++
32,957,151 UART: [kat] sha1
32,961,500 UART: [kat] SHA2-256
32,963,432 UART: [kat] SHA2-384
32,966,390 UART: [kat] SHA2-512-ACC
32,967,277 UART: Droping operation
32,968,050 UART: Fatal Error: 0x90050002
33,003,198 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,147,232 >>> mbox cmd response: failed
33,147,841 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,291,817 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,098 UART:
190,402 UART: Running Caliptra ROM ...
191,512 UART:
7,236,184 UART: [state] CFI Enabled
7,251,755 UART: [state] LifecycleState = Unprovisioned
7,253,694 UART: [state] DebugLocked = No
7,255,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,261,342 UART: [kat] SHA2-256
7,431,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,441,643 UART: [kat] ++
7,442,291 UART: [kat] sha1
7,451,916 UART: [kat] SHA2-256
7,454,619 UART: [kat] SHA2-384
7,461,255 UART: [kat] SHA2-512-ACC
7,463,603 UART: [kat] ECC-384
9,746,090 UART: [kat] HMAC-384Kdf
9,758,055 UART: [kat] LMS
10,948,135 UART: [kat] --
10,951,641 UART: [cold-reset] ++
10,952,925 UART: [fht] Storing FHT @ 0x50003400
10,963,601 UART: [idev] ++
10,964,166 UART: [idev] CDI.KEYID = 6
10,965,186 UART: [idev] SUBJECT.KEYID = 7
10,966,393 UART: [idev] UDS.KEYID = 0
10,967,896 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,111,877 UART: [idev] Erasing UDS.KEYID = 0
14,253,925 UART: [idev] Using Sha1 for KeyId Algorithm
14,274,567 UART: [idev] --
14,279,535 UART: [ldev] ++
14,280,106 UART: [ldev] CDI.KEYID = 6
14,281,073 UART: [ldev] SUBJECT.KEYID = 5
14,282,291 UART: [ldev] AUTHORITY.KEYID = 7
14,283,527 UART: [ldev] FE.KEYID = 1
14,294,663 UART: [ldev] Erasing FE.KEYID = 1
17,584,260 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,875,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,890,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,905,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,919,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,939,241 UART: [ldev] --
19,944,232 UART: [fwproc] Waiting for Commands...
19,946,715 UART: [fwproc] Received command 0x46574c44
19,948,904 UART: [fwproc] Received Image of size 114632 bytes
24,010,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,087,543 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,156,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,475,914 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,875 writing to cptra_bootfsm_go
4,127,896 ready_for_fw is high
4,128,361 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,075,646 >>> mbox cmd response: success
23,713,508 UART:
23,713,916 UART: Running Caliptra FMC ...
23,715,069 UART:
23,715,233 UART: [state] CFI Enabled
23,723,064 UART: [fht] FMC Alias Private Key: 7
26,053,503 UART: [art] Extend RT PCRs Done
26,054,739 UART: [art] Lock RT PCRs Done
26,056,317 UART: [art] Populate DV Done
26,061,688 UART: [fht] FMC Alias Private Key: 7
26,063,236 UART: [art] Derive CDI
26,064,061 UART: [art] Store in in slot 0x4
26,106,838 UART: [art] Derive Key Pair
26,107,889 UART: [art] Store priv key in slot 0x5
29,349,783 UART: [art] Derive Key Pair - Done
29,363,185 UART: [art] Signing Cert with AUTHO
29,364,524 UART: RITY.KEYID = 7
31,643,745 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,274 UART: [art] PUB.X = 31DAD916DC61D33DEF71FE7787C396E1D430FCDCBA295FA1695AA3AB361082438B2C39926496A8E7F9C7BC645E263B36
31,652,532 UART: [art] PUB.Y = 13F725597BAD5EC3A96C6A47A6CDE34EADE5DE6EEEEE5EBC1E5741D7B595BF4A1F65F9D82F4198C554E2D40DE9D54623
31,659,786 UART: [art] SIG.R = 86FE6A78ACF53E8414D5F31560D34E3BADDEB91C4B08E2EABD813E0D2145EC8BD52D21C799564271159193FE737DAEDE
31,667,179 UART: [art] SIG.S = FE12D377F5691010202246CB268FCD5A5E2425EB35B9FCF2D6B497AB3BEDAD6FF1DD88D89015171A12537206C04E598E
32,972,592 UART: Caliptra RT
32,973,315 UART: [state] CFI Enabled
33,091,732 UART: [rt] RT listening for mailbox commands...
33,093,597 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,123,468 UART: [rt]cmd =0x46504c54, len=4
33,124,924 >>> mbox cmd response data (8 bytes)
33,126,487 UART: [rt] FIPS self test
33,127,435 UART: [kat] ++
33,127,886 UART: [kat] sha1
33,132,417 UART: [kat] SHA2-256
33,134,296 UART: [kat] SHA2-384
33,137,126 UART: [kat] SHA2-512-ACC
33,138,073 UART: Droping operation
33,138,849 UART: Fatal Error: 0x90050002
33,173,911 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,317,927 >>> mbox cmd response: failed
33,318,585 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,462,531 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
10,602,535 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,553,811 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,221 UART:
192,605 UART: Running Caliptra ROM ...
193,769 UART:
193,915 UART: [state] CFI Enabled
265,753 UART: [state] LifecycleState = Unprovisioned
267,596 UART: [state] DebugLocked = No
269,921 UART: [state] WD Timer not started. Device not locked for debugging
273,549 UART: [kat] SHA2-256
452,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,260 UART: [kat] ++
464,795 UART: [kat] sha1
475,682 UART: [kat] SHA2-256
478,705 UART: [kat] SHA2-384
484,491 UART: [kat] SHA2-512-ACC
487,428 UART: [kat] ECC-384
2,949,676 UART: [kat] HMAC-384Kdf
2,982,381 UART: [kat] LMS
3,511,888 UART: [kat] --
3,516,102 UART: [cold-reset] ++
3,517,900 UART: [fht] FHT @ 0x50003400
3,528,814 UART: [idev] ++
3,529,378 UART: [idev] CDI.KEYID = 6
3,530,288 UART: [idev] SUBJECT.KEYID = 7
3,531,468 UART: [idev] UDS.KEYID = 0
3,532,412 ready_for_fw is high
3,532,620 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,677,196 UART: [idev] Erasing UDS.KEYID = 0
6,038,897 UART: [idev] Sha1 KeyId Algorithm
6,062,762 UART: [idev] --
6,066,901 UART: [ldev] ++
6,067,486 UART: [ldev] CDI.KEYID = 6
6,068,403 UART: [ldev] SUBJECT.KEYID = 5
6,069,570 UART: [ldev] AUTHORITY.KEYID = 7
6,070,804 UART: [ldev] FE.KEYID = 1
6,110,021 UART: [ldev] Erasing FE.KEYID = 1
8,612,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,090 UART: [ldev] --
10,423,058 UART: [fwproc] Wait for Commands...
10,425,478 UART: [fwproc] Recv command 0x46574c44
10,427,572 UART: [fwproc] Recv'd Img size: 114940 bytes
13,838,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,886 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,294,443 >>> mbox cmd response: success
14,299,294 UART: [afmc] ++
14,299,882 UART: [afmc] CDI.KEYID = 6
14,300,813 UART: [afmc] SUBJECT.KEYID = 7
14,301,976 UART: [afmc] AUTHORITY.KEYID = 5
16,831,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,588,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,604,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,620,813 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,642,847 UART: [afmc] --
18,647,468 UART: [cold-reset] --
18,651,975 UART: [state] Locking Datavault
18,658,039 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,688 UART: [state] Locking ICCM
18,661,782 UART: [exit] Launching FMC @ 0x40000130
18,670,179 UART:
18,670,413 UART: Running Caliptra FMC ...
18,671,516 UART:
18,671,680 UART: [state] CFI Enabled
18,730,901 UART: [fht] FMC Alias Private Key: 7
20,495,040 UART: [art] Extend RT PCRs Done
20,496,270 UART: [art] Lock RT PCRs Done
20,497,958 UART: [art] Populate DV Done
20,503,390 UART: [fht] FMC Alias Private Key: 7
20,504,873 UART: [art] Derive CDI
20,505,637 UART: [art] Store in in slot 0x4
20,563,816 UART: [art] Derive Key Pair
20,564,860 UART: [art] Store priv key in slot 0x5
23,028,167 UART: [art] Derive Key Pair - Done
23,041,006 UART: [art] Signing Cert with AUTHO
23,042,319 UART: RITY.KEYID = 7
24,753,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,115 UART: [art] PUB.X = 53C9280801CE4A29251CBD598990EBB487BAFDDDF5A7248FCE140EB1B2B53D9783B5F83DE4F02EF10F715FAEC3085670
24,762,554 UART: [art] PUB.Y = 3FCF152F2C8375F52B5387551B3D3486693E1311F3DBD447FED2823D3E132F73C5FE416DEA2125D4DE19952DB61B8BE3
24,769,716 UART: [art] SIG.R = F1CF7FA8CD34097CD2A154B88A5D231D4D384A6AAB25C69534C4941D25F0A676860502BB6D86E497868482689BCC5FAF
24,777,076 UART: [art] SIG.S = 68BED4C8ABC602114A07C33E880A7C0B3D3050171AEE00B4471196499A37E85CDC1117C58917EBCA3EF80CDA6D859FEC
25,756,124 UART: Caliptra RT
25,756,840 UART: [state] CFI Enabled
25,921,896 UART: [rt] RT listening for mailbox commands...
25,923,772 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,953,507 UART: [rt]cmd =0x46504c54, len=4
25,955,084 >>> mbox cmd response data (8 bytes)
25,956,147 UART: [rt] FIPS self test
25,957,097 UART: [kat] ++
25,957,603 UART: [kat] sha1
25,961,738 UART: [kat] SHA2-256
25,963,692 UART: [kat] SHA2-384
25,966,730 UART: [kat] SHA2-512-ACC
25,967,621 UART: Droping operation
25,968,396 UART: Fatal Error: 0x90050002
26,003,541 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,147,955 >>> mbox cmd response: failed
26,148,589 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,292,918 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
190,126 UART:
190,415 UART: Running Caliptra ROM ...
191,522 UART:
191,672 UART: [state] CFI Enabled
248,808 UART: [state] LifecycleState = Unprovisioned
250,718 UART: [state] DebugLocked = No
252,985 UART: [state] WD Timer not started. Device not locked for debugging
257,574 UART: [kat] SHA2-256
436,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
448,264 UART: [kat] ++
448,709 UART: [kat] sha1
460,231 UART: [kat] SHA2-256
463,293 UART: [kat] SHA2-384
468,511 UART: [kat] SHA2-512-ACC
471,470 UART: [kat] ECC-384
2,934,743 UART: [kat] HMAC-384Kdf
2,958,114 UART: [kat] LMS
3,487,549 UART: [kat] --
3,491,175 UART: [cold-reset] ++
3,492,620 UART: [fht] FHT @ 0x50003400
3,502,460 UART: [idev] ++
3,503,021 UART: [idev] CDI.KEYID = 6
3,503,962 UART: [idev] SUBJECT.KEYID = 7
3,505,172 UART: [idev] UDS.KEYID = 0
3,506,683 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,651,269 UART: [idev] Erasing UDS.KEYID = 0
6,013,087 UART: [idev] Sha1 KeyId Algorithm
6,035,990 UART: [idev] --
6,041,065 UART: [ldev] ++
6,041,639 UART: [ldev] CDI.KEYID = 6
6,042,552 UART: [ldev] SUBJECT.KEYID = 5
6,043,737 UART: [ldev] AUTHORITY.KEYID = 7
6,044,975 UART: [ldev] FE.KEYID = 1
6,085,113 UART: [ldev] Erasing FE.KEYID = 1
8,590,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,953 UART: [ldev] --
10,397,351 UART: [fwproc] Wait for Commands...
10,399,893 UART: [fwproc] Recv command 0x46574c44
10,401,995 UART: [fwproc] Recv'd Img size: 114940 bytes
13,818,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,376 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,282,999 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,360,377 ready_for_fw is high
3,360,878 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,080,723 >>> mbox cmd response: success
18,371,216 UART:
18,371,617 UART: Running Caliptra FMC ...
18,372,760 UART:
18,372,924 UART: [state] CFI Enabled
18,436,710 UART: [fht] FMC Alias Private Key: 7
20,200,818 UART: [art] Extend RT PCRs Done
20,202,042 UART: [art] Lock RT PCRs Done
20,203,402 UART: [art] Populate DV Done
20,208,979 UART: [fht] FMC Alias Private Key: 7
20,210,462 UART: [art] Derive CDI
20,211,223 UART: [art] Store in in slot 0x4
20,270,318 UART: [art] Derive Key Pair
20,271,352 UART: [art] Store priv key in slot 0x5
22,734,563 UART: [art] Derive Key Pair - Done
22,747,441 UART: [art] Signing Cert with AUTHO
22,748,782 UART: RITY.KEYID = 7
24,460,041 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,551 UART: [art] PUB.X = DAFC592B11D5DF80772C040875D25A6D7EF809182D03934804EA869FBAB3494422FBD1AAB2EDA3277622AB4F08F9A686
24,468,822 UART: [art] PUB.Y = 141E9D95B25306CA1A0B925FA4BD8FFAD902281802906FB74C052BF0F983CC3E7D0D24919645A54067BEE35DCEA82DB6
24,476,068 UART: [art] SIG.R = 8BCC446C6D96B8A1895208FF2D4CE4FFFAA9433992FE508504CF25E764BA67E1D73AB8067A5B2C15E3E08BCD14B5A230
24,483,449 UART: [art] SIG.S = DC0F08D506A85C230AFACE493EE469520D80518B7872CA428413FB7E9E15C84FF386A32AE7139D5A8F58353B01DCC240
25,462,365 UART: Caliptra RT
25,463,082 UART: [state] CFI Enabled
25,628,584 UART: [rt] RT listening for mailbox commands...
25,630,439 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,660,172 UART: [rt]cmd =0x46504c54, len=4
25,661,798 >>> mbox cmd response data (8 bytes)
25,662,845 UART: [rt] FIPS self test
25,663,793 UART: [kat] ++
25,664,242 UART: [kat] sha1
25,668,647 UART: [kat] SHA2-256
25,670,574 UART: [kat] SHA2-384
25,673,689 UART: [kat] SHA2-512-ACC
25,674,605 UART: Droping operation
25,675,375 UART: Fatal Error: 0x90050002
25,710,748 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,855,033 >>> mbox cmd response: failed
25,855,640 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,999,903 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,367,470 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,062,910 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,760 UART:
193,203 UART: Running Caliptra ROM ...
194,370 UART:
603,942 UART: [state] CFI Enabled
615,546 UART: [state] LifecycleState = Unprovisioned
617,423 UART: [state] DebugLocked = No
619,738 UART: [state] WD Timer not started. Device not locked for debugging
623,077 UART: [kat] SHA2-256
802,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,784 UART: [kat] ++
814,340 UART: [kat] sha1
824,369 UART: [kat] SHA2-256
827,459 UART: [kat] SHA2-384
832,313 UART: [kat] SHA2-512-ACC
835,252 UART: [kat] ECC-384
3,274,040 UART: [kat] HMAC-384Kdf
3,286,918 UART: [kat] LMS
3,816,400 UART: [kat] --
3,820,903 UART: [cold-reset] ++
3,823,473 UART: [fht] FHT @ 0x50003400
3,834,687 UART: [idev] ++
3,835,296 UART: [idev] CDI.KEYID = 6
3,836,185 UART: [idev] SUBJECT.KEYID = 7
3,837,326 UART: [idev] UDS.KEYID = 0
3,838,298 ready_for_fw is high
3,838,514 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,982,808 UART: [idev] Erasing UDS.KEYID = 0
6,307,187 UART: [idev] Sha1 KeyId Algorithm
6,330,330 UART: [idev] --
6,335,788 UART: [ldev] ++
6,336,362 UART: [ldev] CDI.KEYID = 6
6,337,243 UART: [ldev] SUBJECT.KEYID = 5
6,338,456 UART: [ldev] AUTHORITY.KEYID = 7
6,339,689 UART: [ldev] FE.KEYID = 1
6,352,201 UART: [ldev] Erasing FE.KEYID = 1
8,823,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,446 UART: [ldev] --
10,610,951 UART: [fwproc] Wait for Commands...
10,612,957 UART: [fwproc] Recv command 0x46574c44
10,615,057 UART: [fwproc] Recv'd Img size: 114940 bytes
14,021,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,532 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,478,291 >>> mbox cmd response: success
14,482,038 UART: [afmc] ++
14,482,624 UART: [afmc] CDI.KEYID = 6
14,483,535 UART: [afmc] SUBJECT.KEYID = 7
14,484,694 UART: [afmc] AUTHORITY.KEYID = 5
16,984,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,218 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,424 UART: [afmc] --
18,781,669 UART: [cold-reset] --
18,786,499 UART: [state] Locking Datavault
18,793,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,918 UART: [state] Locking ICCM
18,796,617 UART: [exit] Launching FMC @ 0x40000130
18,805,013 UART:
18,805,252 UART: Running Caliptra FMC ...
18,806,280 UART:
18,806,427 UART: [state] CFI Enabled
18,814,689 UART: [fht] FMC Alias Private Key: 7
20,571,501 UART: [art] Extend RT PCRs Done
20,572,725 UART: [art] Lock RT PCRs Done
20,574,376 UART: [art] Populate DV Done
20,579,788 UART: [fht] FMC Alias Private Key: 7
20,581,327 UART: [art] Derive CDI
20,582,161 UART: [art] Store in in slot 0x4
20,624,758 UART: [art] Derive Key Pair
20,625,762 UART: [art] Store priv key in slot 0x5
23,053,084 UART: [art] Derive Key Pair - Done
23,066,023 UART: [art] Signing Cert with AUTHO
23,067,339 UART: RITY.KEYID = 7
24,772,590 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,096 UART: [art] PUB.X = 4972F0FE6BD71B1497E51DFDE5C8BE8DBBAC13584EE42C0F5A45D911CE1B6D15ECD90387F863ABAB193B3A881F14C64A
24,781,404 UART: [art] PUB.Y = 67FB18AF606F58AAB4593EF82317BC9B35B7F194C72AE3E2665F4FAC6C1550176C9C1173AF25877FB4CE11034B03F7D7
24,788,729 UART: [art] SIG.R = 807CEBB84C2F6E63B685083DE27D20FDCF890108B1DA182C6A525422EDC498661FD48D5D81C0907513D737DAA53D8352
24,796,085 UART: [art] SIG.S = 415C4626C64E3F1749276F88DBBDCCCE44CF1A65ABF9274EC2B5BCC6E5EDE4872E1C6B140578F249F6E495724974EE8F
25,775,051 UART: Caliptra RT
25,775,758 UART: [state] CFI Enabled
25,892,982 UART: [rt] RT listening for mailbox commands...
25,894,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,924,686 UART: [rt]cmd =0x46504c54, len=4
25,926,419 >>> mbox cmd response data (8 bytes)
25,927,754 UART: [rt] FIPS self test
25,928,698 UART: [kat] ++
25,929,146 UART: [kat] sha1
25,933,754 UART: [kat] SHA2-256
25,935,686 UART: [kat] SHA2-384
25,938,592 UART: [kat] SHA2-512-ACC
25,939,486 UART: Droping operation
25,940,263 UART: Fatal Error: 0x90050002
25,975,466 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,120,255 >>> mbox cmd response: failed
26,120,910 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,265,194 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,094 UART:
190,412 UART: Running Caliptra ROM ...
191,523 UART:
14,261,849 UART: [state] CFI Enabled
14,274,680 UART: [state] LifecycleState = Unprovisioned
14,276,543 UART: [state] DebugLocked = No
14,279,280 UART: [state] WD Timer not started. Device not locked for debugging
14,282,757 UART: [kat] SHA2-256
14,461,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,473,249 UART: [kat] ++
14,473,795 UART: [kat] sha1
14,485,714 UART: [kat] SHA2-256
14,488,788 UART: [kat] SHA2-384
14,494,340 UART: [kat] SHA2-512-ACC
14,497,285 UART: [kat] ECC-384
16,936,349 UART: [kat] HMAC-384Kdf
16,947,782 UART: [kat] LMS
17,477,299 UART: [kat] --
17,482,791 UART: [cold-reset] ++
17,485,020 UART: [fht] FHT @ 0x50003400
17,495,907 UART: [idev] ++
17,496,469 UART: [idev] CDI.KEYID = 6
17,497,406 UART: [idev] SUBJECT.KEYID = 7
17,498,612 UART: [idev] UDS.KEYID = 0
17,500,225 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,644,524 UART: [idev] Erasing UDS.KEYID = 0
19,972,973 UART: [idev] Sha1 KeyId Algorithm
19,996,310 UART: [idev] --
20,001,335 UART: [ldev] ++
20,001,912 UART: [ldev] CDI.KEYID = 6
20,002,833 UART: [ldev] SUBJECT.KEYID = 5
20,003,995 UART: [ldev] AUTHORITY.KEYID = 7
20,005,284 UART: [ldev] FE.KEYID = 1
20,016,282 UART: [ldev] Erasing FE.KEYID = 1
22,489,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,207,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,223,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,239,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,255,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,274,610 UART: [ldev] --
24,280,088 UART: [fwproc] Wait for Commands...
24,282,893 UART: [fwproc] Recv command 0x46574c44
24,284,873 UART: [fwproc] Recv'd Img size: 114940 bytes
27,699,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,774,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,843,651 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,163,282 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,692,600 ready_for_fw is high
3,693,102 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,272,885 >>> mbox cmd response: success
18,524,662 UART:
18,525,055 UART: Running Caliptra FMC ...
18,526,196 UART:
18,526,354 UART: [state] CFI Enabled
18,534,354 UART: [fht] FMC Alias Private Key: 7
20,291,327 UART: [art] Extend RT PCRs Done
20,292,539 UART: [art] Lock RT PCRs Done
20,294,192 UART: [art] Populate DV Done
20,299,662 UART: [fht] FMC Alias Private Key: 7
20,301,312 UART: [art] Derive CDI
20,302,127 UART: [art] Store in in slot 0x4
20,344,635 UART: [art] Derive Key Pair
20,345,693 UART: [art] Store priv key in slot 0x5
22,772,503 UART: [art] Derive Key Pair - Done
22,785,336 UART: [art] Signing Cert with AUTHO
22,786,644 UART: RITY.KEYID = 7
24,492,183 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,706 UART: [art] PUB.X = E6D2576F16870C567FD2705B464F24CEFABD61F4A7E935CCFB217B97D6D689441382470B95413454026C3E7B763ED177
24,500,961 UART: [art] PUB.Y = FD2ED69FA23C9CDC2520E32E7600B47D76D379251ACFDBB1CE1C58610ECA846F79544988301BA5F57F0C0FA275DE48F6
24,508,203 UART: [art] SIG.R = A32386E6DEE3027C8BCF350C6C79545A3A716894DB70E54F1D81CAC7664CEBF24C00E7D5D8A21F23C0222D039C0ADC1E
24,515,596 UART: [art] SIG.S = 656912E1D48B48F36CD472C39898F5EEF1B57D13120D2DD9D7C65A9A4465E105B223A898D75F23E4B5CE9AE86C24B0A0
25,494,402 UART: Caliptra RT
25,495,118 UART: [state] CFI Enabled
25,612,909 UART: [rt] RT listening for mailbox commands...
25,614,765 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,644,335 UART: [rt]cmd =0x46504c54, len=4
25,646,076 >>> mbox cmd response data (8 bytes)
25,647,328 UART: [rt] FIPS self test
25,648,263 UART: [kat] ++
25,648,714 UART: [kat] sha1
25,652,953 UART: [kat] SHA2-256
25,654,880 UART: [kat] SHA2-384
25,657,732 UART: [kat] SHA2-512-ACC
25,658,670 UART: Droping operation
25,659,448 UART: Fatal Error: 0x90050002
25,694,768 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,839,054 >>> mbox cmd response: failed
25,839,643 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,983,970 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,642,719 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,228,637 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,242 UART:
192,618 UART: Running Caliptra ROM ...
193,846 UART:
194,005 UART: [state] CFI Enabled
262,530 UART: [state] LifecycleState = Unprovisioned
264,943 UART: [state] DebugLocked = No
266,841 UART: [state] WD Timer not started. Device not locked for debugging
271,888 UART: [kat] SHA2-256
461,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,582 UART: [kat] ++
473,037 UART: [kat] sha1
484,446 UART: [kat] SHA2-256
487,472 UART: [kat] SHA2-384
493,612 UART: [kat] SHA2-512-ACC
496,199 UART: [kat] ECC-384
2,947,869 UART: [kat] HMAC-384Kdf
2,972,352 UART: [kat] LMS
3,504,128 UART: [kat] --
3,510,872 UART: [cold-reset] ++
3,512,604 UART: [fht] FHT @ 0x50003400
3,525,083 UART: [idev] ++
3,525,806 UART: [idev] CDI.KEYID = 6
3,526,876 UART: [idev] SUBJECT.KEYID = 7
3,527,986 UART: [idev] UDS.KEYID = 0
3,528,918 ready_for_fw is high
3,529,135 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,673,772 UART: [idev] Erasing UDS.KEYID = 0
6,030,720 UART: [idev] Sha1 KeyId Algorithm
6,054,295 UART: [idev] --
6,059,442 UART: [ldev] ++
6,060,167 UART: [ldev] CDI.KEYID = 6
6,061,060 UART: [ldev] SUBJECT.KEYID = 5
6,062,170 UART: [ldev] AUTHORITY.KEYID = 7
6,063,465 UART: [ldev] FE.KEYID = 1
6,100,902 UART: [ldev] Erasing FE.KEYID = 1
8,607,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,962 UART: [ldev] --
10,417,313 UART: [fwproc] Wait for Commands...
10,419,148 UART: [fwproc] Recv command 0x46574c44
10,421,417 UART: [fwproc] Recv'd Img size: 114940 bytes
13,878,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,096 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,615,442 >>> mbox cmd response: success
14,620,040 UART: [afmc] ++
14,620,762 UART: [afmc] CDI.KEYID = 6
14,621,973 UART: [afmc] SUBJECT.KEYID = 7
14,623,424 UART: [afmc] AUTHORITY.KEYID = 5
17,151,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,176 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,949 UART: [afmc] --
18,952,255 UART: [cold-reset] --
18,955,527 UART: [state] Locking Datavault
18,961,586 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,769 UART: [state] Locking ICCM
18,965,898 UART: [exit] Launching FMC @ 0x40000130
18,974,572 UART:
18,974,813 UART: Running Caliptra FMC ...
18,975,939 UART:
18,976,095 UART: [state] CFI Enabled
19,044,528 UART: [fht] FMC Alias Private Key: 7
20,808,919 UART: [art] Extend RT PCRs Done
20,810,174 UART: [art] Lock RT PCRs Done
20,811,832 UART: [art] Populate DV Done
20,817,243 UART: [fht] FMC Alias Private Key: 7
20,818,836 UART: [art] Derive CDI
20,819,576 UART: [art] Store in in slot 0x4
20,876,989 UART: [art] Derive Key Pair
20,878,028 UART: [art] Store priv key in slot 0x5
23,341,101 UART: [art] Derive Key Pair - Done
23,354,433 UART: [art] Signing Cert with AUTHO
23,355,741 UART: RITY.KEYID = 7
25,066,437 UART: [art] Erasing AUTHORITY.KEYID = 7
25,067,950 UART: [art] PUB.X = 095C27DCC3AC2E8718A5D543936E115003DD3DDB4B038F07DE6649DA6C0051F72E5C792B203F10D15CB7B2D9FD0034E8
25,075,203 UART: [art] PUB.Y = FFE6DB2E367FF3FECD879A34C2822A60C56C58D0BAED6623DE6F716DF35E6680D112FEAEE828EABF29E49AAE4B715B2D
25,082,519 UART: [art] SIG.R = 7000D2BC2CD7145E9783E4848DD7697E85664253445CD3BF7BC4A8DCD4A9013379B7FCE20C5BF9A9463A967624FDD6D8
25,089,837 UART: [art] SIG.S = CB8B4DFA5BF853442CDE68D615A8CC4BB46C2D7E60A7F72216C5C68F2B050E66E31840CEF7DFCACBA1AEA185A5C96388
26,068,764 UART: Caliptra RT
26,069,460 UART: [state] CFI Enabled
26,233,766 UART: [rt] RT listening for mailbox commands...
26,235,622 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,265,304 UART: [rt]cmd =0x46504c54, len=4
26,266,943 >>> mbox cmd response data (8 bytes)
26,268,197 UART: [rt] FIPS self test
26,269,137 UART: [kat] ++
26,269,588 UART: [kat] sha1
26,274,073 UART: [kat] SHA2-256
26,275,962 UART: [kat] SHA2-384
26,278,976 UART: [kat] SHA2-512-ACC
26,279,859 UART: Droping operation
26,280,655 UART: Fatal Error: 0x90050002
26,315,976 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,460,719 >>> mbox cmd response: failed
26,461,369 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,605,535 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,017 UART:
190,314 UART: Running Caliptra ROM ...
191,337 UART:
191,476 UART: [state] CFI Enabled
251,959 UART: [state] LifecycleState = Unprovisioned
254,373 UART: [state] DebugLocked = No
257,020 UART: [state] WD Timer not started. Device not locked for debugging
261,259 UART: [kat] SHA2-256
451,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,905 UART: [kat] ++
462,353 UART: [kat] sha1
473,018 UART: [kat] SHA2-256
476,081 UART: [kat] SHA2-384
482,766 UART: [kat] SHA2-512-ACC
485,323 UART: [kat] ECC-384
2,934,030 UART: [kat] HMAC-384Kdf
2,956,259 UART: [kat] LMS
3,488,014 UART: [kat] --
3,492,455 UART: [cold-reset] ++
3,494,775 UART: [fht] FHT @ 0x50003400
3,506,352 UART: [idev] ++
3,507,038 UART: [idev] CDI.KEYID = 6
3,508,064 UART: [idev] SUBJECT.KEYID = 7
3,509,171 UART: [idev] UDS.KEYID = 0
3,510,685 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,655,193 UART: [idev] Erasing UDS.KEYID = 0
6,014,438 UART: [idev] Sha1 KeyId Algorithm
6,037,306 UART: [idev] --
6,041,089 UART: [ldev] ++
6,041,788 UART: [ldev] CDI.KEYID = 6
6,042,703 UART: [ldev] SUBJECT.KEYID = 5
6,043,871 UART: [ldev] AUTHORITY.KEYID = 7
6,045,109 UART: [ldev] FE.KEYID = 1
6,084,788 UART: [ldev] Erasing FE.KEYID = 1
8,602,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,701 UART: [ldev] --
10,411,951 UART: [fwproc] Wait for Commands...
10,413,891 UART: [fwproc] Recv command 0x46574c44
10,416,167 UART: [fwproc] Recv'd Img size: 114940 bytes
13,872,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,561 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,729 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,615,308 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,442,442 ready_for_fw is high
3,443,042 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,755,883 >>> mbox cmd response: success
19,067,553 UART:
19,067,962 UART: Running Caliptra FMC ...
19,069,118 UART:
19,069,280 UART: [state] CFI Enabled
19,138,603 UART: [fht] FMC Alias Private Key: 7
20,901,939 UART: [art] Extend RT PCRs Done
20,903,165 UART: [art] Lock RT PCRs Done
20,904,846 UART: [art] Populate DV Done
20,910,270 UART: [fht] FMC Alias Private Key: 7
20,911,759 UART: [art] Derive CDI
20,912,524 UART: [art] Store in in slot 0x4
20,971,028 UART: [art] Derive Key Pair
20,972,127 UART: [art] Store priv key in slot 0x5
23,435,128 UART: [art] Derive Key Pair - Done
23,447,800 UART: [art] Signing Cert with AUTHO
23,449,106 UART: RITY.KEYID = 7
25,160,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,635 UART: [art] PUB.X = D737D5E8909E61127562806271BF260D2E71AECE8EC535B3AA94BAEC78DBA6DB6FFEE67FCCD405C901B18867B0BC0A98
25,168,903 UART: [art] PUB.Y = B912FDA8849BFF91C1199785BF5E46113E33C9E70E7CF6CAB9C21860BFFF3DFEE486EA817084BD00B7D5763A8C15C5ED
25,176,144 UART: [art] SIG.R = 44ABD316CC39F0EAD2909C4A08987AF22A648E3581CF02C10458E1947ABBB4E436CE2DB9552252E4B91FB7373C4C5D41
25,183,584 UART: [art] SIG.S = 5E4A2165A11227235E1E8DECFAD2063AB7CC3A0D6380010AE9267DCC87C22EB006D5BD753966F8B80B2FA3478F3F36FD
26,163,194 UART: Caliptra RT
26,163,900 UART: [state] CFI Enabled
26,327,989 UART: [rt] RT listening for mailbox commands...
26,329,850 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,359,751 UART: [rt]cmd =0x46504c54, len=4
26,361,552 >>> mbox cmd response data (8 bytes)
26,362,984 UART: [rt] FIPS self test
26,363,921 UART: [kat] ++
26,364,368 UART: [kat] sha1
26,368,915 UART: [kat] SHA2-256
26,370,842 UART: [kat] SHA2-384
26,373,638 UART: [kat] SHA2-512-ACC
26,374,600 UART: Droping operation
26,375,376 UART: Fatal Error: 0x90050002
26,410,697 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,555,110 >>> mbox cmd response: failed
26,555,761 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,700,095 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,413,582 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,740,108 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,368 UART:
192,730 UART: Running Caliptra ROM ...
193,918 UART:
603,390 UART: [state] CFI Enabled
615,130 UART: [state] LifecycleState = Unprovisioned
617,492 UART: [state] DebugLocked = No
618,799 UART: [state] WD Timer not started. Device not locked for debugging
623,044 UART: [kat] SHA2-256
812,916 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,698 UART: [kat] ++
824,219 UART: [kat] sha1
835,380 UART: [kat] SHA2-256
838,396 UART: [kat] SHA2-384
844,888 UART: [kat] SHA2-512-ACC
847,466 UART: [kat] ECC-384
3,289,535 UART: [kat] HMAC-384Kdf
3,302,789 UART: [kat] LMS
3,834,607 UART: [kat] --
3,838,666 UART: [cold-reset] ++
3,839,890 UART: [fht] FHT @ 0x50003400
3,851,584 UART: [idev] ++
3,852,302 UART: [idev] CDI.KEYID = 6
3,853,217 UART: [idev] SUBJECT.KEYID = 7
3,854,469 UART: [idev] UDS.KEYID = 0
3,855,398 ready_for_fw is high
3,855,592 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,999,951 UART: [idev] Erasing UDS.KEYID = 0
6,332,360 UART: [idev] Sha1 KeyId Algorithm
6,356,382 UART: [idev] --
6,361,567 UART: [ldev] ++
6,362,248 UART: [ldev] CDI.KEYID = 6
6,363,131 UART: [ldev] SUBJECT.KEYID = 5
6,364,358 UART: [ldev] AUTHORITY.KEYID = 7
6,365,545 UART: [ldev] FE.KEYID = 1
6,376,924 UART: [ldev] Erasing FE.KEYID = 1
8,855,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,284 UART: [ldev] --
10,644,212 UART: [fwproc] Wait for Commands...
10,646,371 UART: [fwproc] Recv command 0x46574c44
10,648,686 UART: [fwproc] Recv'd Img size: 114940 bytes
14,102,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,551 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,843,358 >>> mbox cmd response: success
14,848,101 UART: [afmc] ++
14,848,805 UART: [afmc] CDI.KEYID = 6
14,849,964 UART: [afmc] SUBJECT.KEYID = 7
14,851,445 UART: [afmc] AUTHORITY.KEYID = 5
17,352,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,645 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,692 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,324 UART: [afmc] --
19,148,674 UART: [cold-reset] --
19,152,911 UART: [state] Locking Datavault
19,158,102 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,294 UART: [state] Locking ICCM
19,163,149 UART: [exit] Launching FMC @ 0x40000130
19,171,778 UART:
19,172,014 UART: Running Caliptra FMC ...
19,173,116 UART:
19,173,271 UART: [state] CFI Enabled
19,181,749 UART: [fht] FMC Alias Private Key: 7
20,938,728 UART: [art] Extend RT PCRs Done
20,939,952 UART: [art] Lock RT PCRs Done
20,941,494 UART: [art] Populate DV Done
20,946,955 UART: [fht] FMC Alias Private Key: 7
20,948,543 UART: [art] Derive CDI
20,949,279 UART: [art] Store in in slot 0x4
20,991,707 UART: [art] Derive Key Pair
20,992,742 UART: [art] Store priv key in slot 0x5
23,419,539 UART: [art] Derive Key Pair - Done
23,432,312 UART: [art] Signing Cert with AUTHO
23,433,781 UART: RITY.KEYID = 7
25,138,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,456 UART: [art] PUB.X = 64EE0B62D094016EC013F629E8F006E7A2F5EA9530E4DE49C8D9A2FB80EDD00E1B85BDBAC0A3ABA1923480B41B18C89D
25,147,706 UART: [art] PUB.Y = 1FBE0C38636571E21119F8B98E8EDA78E772DA6103F2DEDAB8DCB6AAEE05E7721C508CFA62EEA1D5EBC7808FB27B79EC
25,155,048 UART: [art] SIG.R = FA00D9CAAE8392626F2C00A0AD996F5D9B61E83B6CE7067BAB3FAA90AEEE7E4C0169936B576296DF33639113C9CB8B91
25,162,393 UART: [art] SIG.S = F4B7B6C82A37D50AAC61318BF030C8293ED6D645011DE6BA246BA70C31F4CFCE76B169176639D875F9314FE9BE9A6D32
26,140,779 UART: Caliptra RT
26,141,482 UART: [state] CFI Enabled
26,259,400 UART: [rt] RT listening for mailbox commands...
26,261,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,291,027 UART: [rt]cmd =0x46504c54, len=4
26,292,547 >>> mbox cmd response data (8 bytes)
26,293,385 UART: [rt] FIPS self test
26,294,323 UART: [kat] ++
26,294,773 UART: [kat] sha1
26,299,173 UART: [kat] SHA2-256
26,301,100 UART: [kat] SHA2-384
26,304,126 UART: [kat] SHA2-512-ACC
26,305,013 UART: Droping operation
26,305,789 UART: Fatal Error: 0x90050002
26,341,157 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,485,517 >>> mbox cmd response: failed
26,486,104 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,630,203 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
190,026 UART:
190,320 UART: Running Caliptra ROM ...
191,348 UART:
13,897,895 UART: [state] CFI Enabled
13,910,278 UART: [state] LifecycleState = Unprovisioned
13,912,616 UART: [state] DebugLocked = No
13,915,292 UART: [state] WD Timer not started. Device not locked for debugging
13,919,001 UART: [kat] SHA2-256
14,108,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,119,464 UART: [kat] ++
14,120,064 UART: [kat] sha1
14,130,587 UART: [kat] SHA2-256
14,133,554 UART: [kat] SHA2-384
14,139,598 UART: [kat] SHA2-512-ACC
14,142,214 UART: [kat] ECC-384
16,585,119 UART: [kat] HMAC-384Kdf
16,597,828 UART: [kat] LMS
17,129,657 UART: [kat] --
17,134,131 UART: [cold-reset] ++
17,136,543 UART: [fht] FHT @ 0x50003400
17,147,296 UART: [idev] ++
17,147,974 UART: [idev] CDI.KEYID = 6
17,148,935 UART: [idev] SUBJECT.KEYID = 7
17,150,170 UART: [idev] UDS.KEYID = 0
17,151,697 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,295,996 UART: [idev] Erasing UDS.KEYID = 0
19,628,839 UART: [idev] Sha1 KeyId Algorithm
19,652,126 UART: [idev] --
19,656,499 UART: [ldev] ++
19,657,178 UART: [ldev] CDI.KEYID = 6
19,658,192 UART: [ldev] SUBJECT.KEYID = 5
19,659,296 UART: [ldev] AUTHORITY.KEYID = 7
19,660,525 UART: [ldev] FE.KEYID = 1
19,673,438 UART: [ldev] Erasing FE.KEYID = 1
22,147,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,865,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,880,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,896,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,911,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,932,488 UART: [ldev] --
23,938,308 UART: [fwproc] Wait for Commands...
23,939,866 UART: [fwproc] Recv command 0x46574c44
23,942,179 UART: [fwproc] Recv'd Img size: 114940 bytes
27,393,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,472,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,588,709 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,134,813 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,755,589 ready_for_fw is high
3,755,975 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,975,132 >>> mbox cmd response: success
19,230,414 UART:
19,230,831 UART: Running Caliptra FMC ...
19,232,176 UART:
19,232,345 UART: [state] CFI Enabled
19,240,454 UART: [fht] FMC Alias Private Key: 7
20,996,487 UART: [art] Extend RT PCRs Done
20,997,714 UART: [art] Lock RT PCRs Done
20,999,556 UART: [art] Populate DV Done
21,005,085 UART: [fht] FMC Alias Private Key: 7
21,006,639 UART: [art] Derive CDI
21,007,461 UART: [art] Store in in slot 0x4
21,050,009 UART: [art] Derive Key Pair
21,051,062 UART: [art] Store priv key in slot 0x5
23,477,943 UART: [art] Derive Key Pair - Done
23,490,938 UART: [art] Signing Cert with AUTHO
23,492,251 UART: RITY.KEYID = 7
25,197,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,260 UART: [art] PUB.X = 8AACDF26B38EA57BF0DA80BA9AB0E6AFEA6DC27D6822229861855E762DAF5F2A3C6FE7EBB5D97499B243629714A7120F
25,206,505 UART: [art] PUB.Y = A1AAFCC7172290ABB75E5D8855A9A9C1000197C40CEA711A9C64C8581C30631F4CAFE52147C1FDA1AD025013222B2133
25,213,740 UART: [art] SIG.R = FF2008DF9D13B6C58579EE9EA8B5D01EA77EA82072C94CFBE34D54A516068373AE39AAE1E9CA4092D0C2037673015B9A
25,221,127 UART: [art] SIG.S = 7FADE5B2B95B50638282587D88C7318F3CC60FDF8B4277703C091E14CD20C5E96AEFFEDF280FFCDF93F1988D2E2E9AAF
26,199,493 UART: Caliptra RT
26,200,184 UART: [state] CFI Enabled
26,318,274 UART: [rt] RT listening for mailbox commands...
26,320,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,350,107 UART: [rt]cmd =0x46504c54, len=4
26,351,688 >>> mbox cmd response data (8 bytes)
26,352,895 UART: [rt] FIPS self test
26,353,840 UART: [kat] ++
26,354,292 UART: [kat] sha1
26,358,853 UART: [kat] SHA2-256
26,360,782 UART: [kat] SHA2-384
26,363,846 UART: [kat] SHA2-512-ACC
26,364,815 UART: Droping operation
26,365,592 UART: Fatal Error: 0x90050002
26,400,922 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,545,141 >>> mbox cmd response: failed
26,545,955 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,690,141 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
16,995,857 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,209,709 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,726 UART: [kat] SHA2-512-ACC
897,627 UART: [kat] ECC-384
903,190 UART: [kat] HMAC-384Kdf
907,834 UART: [kat] LMS
1,476,030 UART: [kat] --
1,477,093 UART: [cold-reset] ++
1,477,609 UART: [fht] Storing FHT @ 0x50003400
1,480,446 UART: [idev] ++
1,480,614 UART: [idev] CDI.KEYID = 6
1,480,974 UART: [idev] SUBJECT.KEYID = 7
1,481,398 UART: [idev] UDS.KEYID = 0
1,481,743 ready_for_fw is high
1,481,743 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,148 UART: [idev] Erasing UDS.KEYID = 0
1,505,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,458 UART: [idev] --
1,515,557 UART: [ldev] ++
1,515,725 UART: [ldev] CDI.KEYID = 6
1,516,088 UART: [ldev] SUBJECT.KEYID = 5
1,516,514 UART: [ldev] AUTHORITY.KEYID = 7
1,516,977 UART: [ldev] FE.KEYID = 1
1,522,131 UART: [ldev] Erasing FE.KEYID = 1
1,547,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,202 UART: [ldev] --
1,586,665 UART: [fwproc] Waiting for Commands...
1,587,436 UART: [fwproc] Received command 0x46574c44
1,588,227 UART: [fwproc] Received Image of size 114940 bytes
2,892,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,983 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,335 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,054 >>> mbox cmd response: success
3,087,094 UART: [afmc] ++
3,087,262 UART: [afmc] CDI.KEYID = 6
3,087,624 UART: [afmc] SUBJECT.KEYID = 7
3,088,049 UART: [afmc] AUTHORITY.KEYID = 5
3,123,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,502 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,010 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,895 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,585 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,638 UART: [afmc] --
3,166,516 UART: [cold-reset] --
3,167,452 UART: [state] Locking Datavault
3,168,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,051 UART: [state] Locking ICCM
3,169,507 UART: [exit] Launching FMC @ 0x40000130
3,174,836 UART:
3,174,852 UART: Running Caliptra FMC ...
3,175,260 UART:
3,175,314 UART: [state] CFI Enabled
3,186,071 UART: [fht] FMC Alias Private Key: 7
3,294,300 UART: [art] Extend RT PCRs Done
3,294,728 UART: [art] Lock RT PCRs Done
3,296,292 UART: [art] Populate DV Done
3,304,727 UART: [fht] FMC Alias Private Key: 7
3,305,801 UART: [art] Derive CDI
3,306,081 UART: [art] Store in in slot 0x4
3,391,882 UART: [art] Derive Key Pair
3,392,242 UART: [art] Store priv key in slot 0x5
3,405,240 UART: [art] Derive Key Pair - Done
3,420,181 UART: [art] Signing Cert with AUTHO
3,420,661 UART: RITY.KEYID = 7
3,435,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,442 UART: [art] PUB.X = E30E29F55B73E8E7385DDB222192EC3126F2AB49DA1685C0DB50E41CA5465D61696E8725B0C31811152BF9EAC015A9AF
3,443,215 UART: [art] PUB.Y = 0F5DE96DCE235D9700B3747F54294AC8AF8E66D5765DA68AD876EFF77D22DE5CFCA4B490E55DB44F64665D2C36A3F4F9
3,450,156 UART: [art] SIG.R = F8669DA0D7B3E0F4A300C1A8678E228A220F19A90B624A8951BC8530CD2B9643F85247D75580D1AE59F2C50A07D663E2
3,456,892 UART: [art] SIG.S = 963C8D9C5078F92EAECF83236954198648E82F9ECF8385704F9D669F44186899290A0A57BA0504D1D3ABA43490A9D21E
3,480,715 UART: Caliptra RT
3,480,968 UART: [state] CFI Enabled
3,590,636 UART: [rt] RT listening for mailbox commands...
3,591,299 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,280 UART: [rt]cmd =0x46504c54, len=4
3,622,428 >>> mbox cmd response data (8 bytes)
3,622,773 UART: [rt] FIPS self test
3,623,101 UART: [kat] ++
3,623,253 UART: [kat] sha1
3,627,415 UART: [kat] SHA2-256
3,629,437 UART: [kat] SHA2-384
3,632,424 UART: [kat] SHA2-512-ACC
3,632,829 UART: Droping operation
3,633,330 UART: Fatal Error: 0x90050002
3,634,869 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,634,874 >>> mbox cmd response: failed
3,634,874 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,634,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,665 UART: [kat] SHA2-256
881,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,711 UART: [kat] ++
885,863 UART: [kat] sha1
889,969 UART: [kat] SHA2-256
891,907 UART: [kat] SHA2-384
894,614 UART: [kat] SHA2-512-ACC
896,515 UART: [kat] ECC-384
902,118 UART: [kat] HMAC-384Kdf
906,646 UART: [kat] LMS
1,474,842 UART: [kat] --
1,475,619 UART: [cold-reset] ++
1,476,083 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,606 UART: [idev] Erasing UDS.KEYID = 0
1,503,810 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,370 UART: [idev] --
1,513,339 UART: [ldev] ++
1,513,507 UART: [ldev] CDI.KEYID = 6
1,513,870 UART: [ldev] SUBJECT.KEYID = 5
1,514,296 UART: [ldev] AUTHORITY.KEYID = 7
1,514,759 UART: [ldev] FE.KEYID = 1
1,520,067 UART: [ldev] Erasing FE.KEYID = 1
1,545,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,794 UART: [ldev] --
1,585,087 UART: [fwproc] Waiting for Commands...
1,585,904 UART: [fwproc] Received command 0x46574c44
1,586,695 UART: [fwproc] Received Image of size 114940 bytes
2,891,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,014 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,833 ready_for_fw is high
1,362,833 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,982 >>> mbox cmd response: success
2,998,108 UART:
2,998,124 UART: Running Caliptra FMC ...
2,998,532 UART:
2,998,586 UART: [state] CFI Enabled
3,008,589 UART: [fht] FMC Alias Private Key: 7
3,116,534 UART: [art] Extend RT PCRs Done
3,116,962 UART: [art] Lock RT PCRs Done
3,118,530 UART: [art] Populate DV Done
3,126,935 UART: [fht] FMC Alias Private Key: 7
3,128,067 UART: [art] Derive CDI
3,128,347 UART: [art] Store in in slot 0x4
3,213,994 UART: [art] Derive Key Pair
3,214,354 UART: [art] Store priv key in slot 0x5
3,227,164 UART: [art] Derive Key Pair - Done
3,241,756 UART: [art] Signing Cert with AUTHO
3,242,236 UART: RITY.KEYID = 7
3,257,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,195 UART: [art] PUB.X = 68B7F92255E2A2190001411172C392FA907FA080B26A5A7D002152CDA600559309976623FF801C6F3BA4DCD5F7358045
3,264,883 UART: [art] PUB.Y = 8913E6C73EE66AB0A434877A213C2466C4D36872CB1A36FEE324DC1EAF984C17E12A7A511F4ED67DC426C776DF4C7727
3,271,841 UART: [art] SIG.R = 03373B7913C26AF2393C5E390C8B6E22ADA149E174FC028199A34CB9D0BDB759291D6E77163E75369DFCCD5FBE63877B
3,278,608 UART: [art] SIG.S = 07417EF3786E7FFE529E875A58912FBD0B423C4E4D84A9AECCBC72C6FE9822DEEB61BA125402EC682BDC450A1608FF79
3,302,344 UART: Caliptra RT
3,302,597 UART: [state] CFI Enabled
3,411,709 UART: [rt] RT listening for mailbox commands...
3,412,372 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,045 UART: [rt]cmd =0x46504c54, len=4
3,443,087 >>> mbox cmd response data (8 bytes)
3,443,322 UART: [rt] FIPS self test
3,443,650 UART: [kat] ++
3,443,802 UART: [kat] sha1
3,448,152 UART: [kat] SHA2-256
3,450,174 UART: [kat] SHA2-384
3,452,951 UART: [kat] SHA2-512-ACC
3,453,356 UART: Droping operation
3,453,785 UART: Fatal Error: 0x90050002
3,455,324 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,455,329 >>> mbox cmd response: failed
3,455,329 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,455,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,227 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,984 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,024 UART: [kat] SHA2-256
881,955 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,070 UART: [kat] ++
886,222 UART: [kat] sha1
890,334 UART: [kat] SHA2-256
892,272 UART: [kat] SHA2-384
894,929 UART: [kat] SHA2-512-ACC
896,830 UART: [kat] ECC-384
902,283 UART: [kat] HMAC-384Kdf
907,017 UART: [kat] LMS
1,475,213 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,774 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,733 UART: [idev] Erasing UDS.KEYID = 0
1,505,335 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,927 UART: [idev] --
1,515,114 UART: [ldev] ++
1,515,282 UART: [ldev] CDI.KEYID = 6
1,515,645 UART: [ldev] SUBJECT.KEYID = 5
1,516,071 UART: [ldev] AUTHORITY.KEYID = 7
1,516,534 UART: [ldev] FE.KEYID = 1
1,521,684 UART: [ldev] Erasing FE.KEYID = 1
1,547,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,223 UART: [ldev] --
1,586,526 UART: [fwproc] Waiting for Commands...
1,587,327 UART: [fwproc] Received command 0x46574c44
1,588,118 UART: [fwproc] Received Image of size 114940 bytes
2,893,382 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,303 >>> mbox cmd response: success
3,088,377 UART: [afmc] ++
3,088,545 UART: [afmc] CDI.KEYID = 6
3,088,907 UART: [afmc] SUBJECT.KEYID = 7
3,089,332 UART: [afmc] AUTHORITY.KEYID = 5
3,124,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,111 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,724 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,414 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,209 UART: [afmc] --
3,167,139 UART: [cold-reset] --
3,167,841 UART: [state] Locking Datavault
3,168,786 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,390 UART: [state] Locking ICCM
3,169,900 UART: [exit] Launching FMC @ 0x40000130
3,175,229 UART:
3,175,245 UART: Running Caliptra FMC ...
3,175,653 UART:
3,175,796 UART: [state] CFI Enabled
3,186,667 UART: [fht] FMC Alias Private Key: 7
3,294,754 UART: [art] Extend RT PCRs Done
3,295,182 UART: [art] Lock RT PCRs Done
3,296,856 UART: [art] Populate DV Done
3,305,371 UART: [fht] FMC Alias Private Key: 7
3,306,315 UART: [art] Derive CDI
3,306,595 UART: [art] Store in in slot 0x4
3,392,288 UART: [art] Derive Key Pair
3,392,648 UART: [art] Store priv key in slot 0x5
3,406,030 UART: [art] Derive Key Pair - Done
3,420,799 UART: [art] Signing Cert with AUTHO
3,421,279 UART: RITY.KEYID = 7
3,436,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,512 UART: [art] PUB.X = 53255F446EB17C38B998640150997F924DB75B4C26B24E93B3214458FE8CB14A01E5AF4E3E2FC8758668065FBE1B8664
3,444,269 UART: [art] PUB.Y = 96D0EB2E13C77A4B739EE6957E564BE78630367CB4988B2709E8B493A729E6D97B479E492543F968F397B7CA3642CAA4
3,451,214 UART: [art] SIG.R = 38BAC3E6BE1D5948BE377B987F14174EFC3ECCB430D235DCE60AC7A450EDCBDFC478F8BA8B45A2FA844CA3568AAD86A9
3,458,009 UART: [art] SIG.S = 249A6B0B868A45348F906E92D58F3852A10A75661B21A33A0671AEBF15B444EC7CD1788D639DE4543EF1F48845544FA0
3,481,961 UART: Caliptra RT
3,482,306 UART: [state] CFI Enabled
3,591,226 UART: [rt] RT listening for mailbox commands...
3,591,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,754 UART: [rt]cmd =0x46504c54, len=4
3,623,034 >>> mbox cmd response data (8 bytes)
3,623,331 UART: [rt] FIPS self test
3,623,659 UART: [kat] ++
3,623,811 UART: [kat] sha1
3,628,227 UART: [kat] SHA2-256
3,630,249 UART: [kat] SHA2-384
3,633,288 UART: [kat] SHA2-512-ACC
3,633,693 UART: Droping operation
3,634,274 UART: Fatal Error: 0x90050002
3,635,813 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,818 >>> mbox cmd response: failed
3,635,818 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,974 UART: [kat] SHA2-256
881,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,020 UART: [kat] ++
886,172 UART: [kat] sha1
890,394 UART: [kat] SHA2-256
892,332 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,545 UART: [kat] HMAC-384Kdf
907,107 UART: [kat] LMS
1,475,303 UART: [kat] --
1,476,138 UART: [cold-reset] ++
1,476,508 UART: [fht] Storing FHT @ 0x50003400
1,479,299 UART: [idev] ++
1,479,467 UART: [idev] CDI.KEYID = 6
1,479,827 UART: [idev] SUBJECT.KEYID = 7
1,480,251 UART: [idev] UDS.KEYID = 0
1,480,596 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,263 UART: [idev] Erasing UDS.KEYID = 0
1,504,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,319 UART: [idev] --
1,514,410 UART: [ldev] ++
1,514,578 UART: [ldev] CDI.KEYID = 6
1,514,941 UART: [ldev] SUBJECT.KEYID = 5
1,515,367 UART: [ldev] AUTHORITY.KEYID = 7
1,515,830 UART: [ldev] FE.KEYID = 1
1,520,836 UART: [ldev] Erasing FE.KEYID = 1
1,546,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,311 UART: [ldev] --
1,585,770 UART: [fwproc] Waiting for Commands...
1,586,529 UART: [fwproc] Received command 0x46574c44
1,587,320 UART: [fwproc] Received Image of size 114940 bytes
2,892,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,923 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,937,393 >>> mbox cmd response: success
2,999,279 UART:
2,999,295 UART: Running Caliptra FMC ...
2,999,703 UART:
2,999,846 UART: [state] CFI Enabled
3,010,385 UART: [fht] FMC Alias Private Key: 7
3,118,286 UART: [art] Extend RT PCRs Done
3,118,714 UART: [art] Lock RT PCRs Done
3,120,416 UART: [art] Populate DV Done
3,128,703 UART: [fht] FMC Alias Private Key: 7
3,129,817 UART: [art] Derive CDI
3,130,097 UART: [art] Store in in slot 0x4
3,215,716 UART: [art] Derive Key Pair
3,216,076 UART: [art] Store priv key in slot 0x5
3,229,442 UART: [art] Derive Key Pair - Done
3,244,072 UART: [art] Signing Cert with AUTHO
3,244,552 UART: RITY.KEYID = 7
3,259,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,607 UART: [art] PUB.X = 5508606594CA595005C1EAFAA397BC093F13F65028D381A24CCFD38EA3544B15B79BB216F2AA6A4065149D92643DEEF4
3,267,372 UART: [art] PUB.Y = C114CF960D8BBA9E8C910AB04408F3FE028EED4D04AA0CADF9050EE494A5DE2BF328105267266A45B2BC01406155C75F
3,274,307 UART: [art] SIG.R = AF3DB221BCDF42B0913552DDF0483A16947C0B50131FA8D2FFA29C91C6F2CBA32F77DEEAE08F17D9D11D7AD76818E49C
3,281,094 UART: [art] SIG.S = BD95130BF704A669B3D346806D54364362922C74C542F233C31CA87D71444E6638497D572BE153AC83A72C3A8A34C597
3,304,499 UART: Caliptra RT
3,304,844 UART: [state] CFI Enabled
3,413,820 UART: [rt] RT listening for mailbox commands...
3,414,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,376 UART: [rt]cmd =0x46504c54, len=4
3,445,624 >>> mbox cmd response data (8 bytes)
3,445,883 UART: [rt] FIPS self test
3,446,211 UART: [kat] ++
3,446,363 UART: [kat] sha1
3,450,343 UART: [kat] SHA2-256
3,452,365 UART: [kat] SHA2-384
3,455,078 UART: [kat] SHA2-512-ACC
3,455,483 UART: Droping operation
3,455,994 UART: Fatal Error: 0x90050002
3,457,533 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,538 >>> mbox cmd response: failed
3,457,538 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,955 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,630 UART: [kat] SHA2-512-ACC
908,531 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,379 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,370 UART: [idev] ++
1,174,538 UART: [idev] CDI.KEYID = 6
1,174,898 UART: [idev] SUBJECT.KEYID = 7
1,175,322 UART: [idev] UDS.KEYID = 0
1,175,667 ready_for_fw is high
1,175,667 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,045 UART: [idev] Sha1 KeyId Algorithm
1,208,429 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,082 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,215,913 UART: [ldev] Erasing FE.KEYID = 1
1,241,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,013 UART: [ldev] --
1,280,528 UART: [fwproc] Wait for Commands...
1,281,260 UART: [fwproc] Recv command 0x46574c44
1,281,988 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,382 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,211 >>> mbox cmd response: success
2,781,265 UART: [afmc] ++
2,781,433 UART: [afmc] CDI.KEYID = 6
2,781,795 UART: [afmc] SUBJECT.KEYID = 7
2,782,220 UART: [afmc] AUTHORITY.KEYID = 5
2,818,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,142 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,216 UART: [afmc] --
2,861,202 UART: [cold-reset] --
2,862,188 UART: [state] Locking Datavault
2,863,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,087 UART: [state] Locking ICCM
2,864,665 UART: [exit] Launching FMC @ 0x40000130
2,869,994 UART:
2,870,010 UART: Running Caliptra FMC ...
2,870,418 UART:
2,870,472 UART: [state] CFI Enabled
2,880,537 UART: [fht] FMC Alias Private Key: 7
2,988,248 UART: [art] Extend RT PCRs Done
2,988,676 UART: [art] Lock RT PCRs Done
2,989,868 UART: [art] Populate DV Done
2,998,169 UART: [fht] FMC Alias Private Key: 7
2,999,325 UART: [art] Derive CDI
2,999,605 UART: [art] Store in in slot 0x4
3,085,540 UART: [art] Derive Key Pair
3,085,900 UART: [art] Store priv key in slot 0x5
3,098,872 UART: [art] Derive Key Pair - Done
3,113,455 UART: [art] Signing Cert with AUTHO
3,113,935 UART: RITY.KEYID = 7
3,129,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,870 UART: [art] PUB.X = 1F69F9A60A6721B2D98EE39F3AFBCDC0AC9427A0CF225E3AA8331200BAE6DE43286F66E8BF7F11C8DE276848DBCAC580
3,136,635 UART: [art] PUB.Y = 046CBA7C22B3FC55F91FD97489B14AF06D6F953D14B409E7193B7FB450F8FA8362F062CDD328FC8D8AE830D5CB96F601
3,143,588 UART: [art] SIG.R = 9BB744AEDB812C8F551EDE2D426E7420E6BDA537A01C56EC8C80541AF0AA83F4218FA9843CFE580891815BCA99379EBB
3,150,369 UART: [art] SIG.S = 51C913C27D00AF382B5194C5E47B067E7A0A0942E2095E10532D054C9EDF860D402A1B2DCE4A8692B6E7E0CBF0C0B2F0
3,174,102 UART: Caliptra RT
3,174,355 UART: [state] CFI Enabled
3,282,294 UART: [rt] RT listening for mailbox commands...
3,282,957 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,940 UART: [rt]cmd =0x46504c54, len=4
3,314,082 >>> mbox cmd response data (8 bytes)
3,314,391 UART: [rt] FIPS self test
3,314,719 UART: [kat] ++
3,314,871 UART: [kat] sha1
3,319,091 UART: [kat] SHA2-256
3,321,113 UART: [kat] SHA2-384
3,323,758 UART: [kat] SHA2-512-ACC
3,324,163 UART: Droping operation
3,324,662 UART: Fatal Error: 0x90050002
3,326,201 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,326,206 >>> mbox cmd response: failed
3,326,206 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,326,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,470 UART: [kat] HMAC-384Kdf
922,918 UART: [kat] LMS
1,171,246 UART: [kat] --
1,172,119 UART: [cold-reset] ++
1,172,601 UART: [fht] FHT @ 0x50003400
1,175,334 UART: [idev] ++
1,175,502 UART: [idev] CDI.KEYID = 6
1,175,862 UART: [idev] SUBJECT.KEYID = 7
1,176,286 UART: [idev] UDS.KEYID = 0
1,176,631 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,297 UART: [idev] Sha1 KeyId Algorithm
1,209,625 UART: [idev] --
1,210,783 UART: [ldev] ++
1,210,951 UART: [ldev] CDI.KEYID = 6
1,211,314 UART: [ldev] SUBJECT.KEYID = 5
1,211,740 UART: [ldev] AUTHORITY.KEYID = 7
1,212,203 UART: [ldev] FE.KEYID = 1
1,217,503 UART: [ldev] Erasing FE.KEYID = 1
1,244,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,691 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,502 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,756 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,515 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,877 ready_for_fw is high
1,059,877 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,480 >>> mbox cmd response: success
2,698,018 UART:
2,698,034 UART: Running Caliptra FMC ...
2,698,442 UART:
2,698,496 UART: [state] CFI Enabled
2,708,853 UART: [fht] FMC Alias Private Key: 7
2,816,798 UART: [art] Extend RT PCRs Done
2,817,226 UART: [art] Lock RT PCRs Done
2,818,602 UART: [art] Populate DV Done
2,826,861 UART: [fht] FMC Alias Private Key: 7
2,827,889 UART: [art] Derive CDI
2,828,169 UART: [art] Store in in slot 0x4
2,913,422 UART: [art] Derive Key Pair
2,913,782 UART: [art] Store priv key in slot 0x5
2,926,786 UART: [art] Derive Key Pair - Done
2,941,537 UART: [art] Signing Cert with AUTHO
2,942,017 UART: RITY.KEYID = 7
2,957,091 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,856 UART: [art] PUB.X = 5EBAFF09F1991861C5A5B47301A69CD6E39F8ADFC3B85742CE35FDDC3AEDFFA6A70A1DE8B3A62CDB987E662852F817A0
2,964,641 UART: [art] PUB.Y = 0DD0F7CABDB34E8E129540432A07A299237E82F6156D67D1256DAE58E0AE1FB913240E1839238F8B20D2A246E598B7A9
2,971,584 UART: [art] SIG.R = EFBB387385C066659DF4975637D66CCB5E69AFD9453F6AF71797D4E495CC85BC107F83998CBC07AB7BF207EC66EA158C
2,978,360 UART: [art] SIG.S = 10ECD6FEAE59236CF2C65940C048FB1FC4F1269DD616F6D88C87D9121057356C95CC0CA4EB9FDEAF331171E2CA989C3A
3,002,520 UART: Caliptra RT
3,002,773 UART: [state] CFI Enabled
3,109,996 UART: [rt] RT listening for mailbox commands...
3,110,659 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,422 UART: [rt]cmd =0x46504c54, len=4
3,141,464 >>> mbox cmd response data (8 bytes)
3,141,655 UART: [rt] FIPS self test
3,141,983 UART: [kat] ++
3,142,135 UART: [kat] sha1
3,146,443 UART: [kat] SHA2-256
3,148,465 UART: [kat] SHA2-384
3,151,342 UART: [kat] SHA2-512-ACC
3,151,747 UART: Droping operation
3,152,134 UART: Fatal Error: 0x90050002
3,153,673 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,153,678 >>> mbox cmd response: failed
3,153,678 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,153,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,013 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,800 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
893,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,398 UART: [kat] ++
897,550 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,735 UART: [kat] SHA2-512-ACC
908,636 UART: [kat] ECC-384
918,545 UART: [kat] HMAC-384Kdf
923,277 UART: [kat] LMS
1,171,605 UART: [kat] --
1,172,632 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,775 UART: [idev] ++
1,175,943 UART: [idev] CDI.KEYID = 6
1,176,303 UART: [idev] SUBJECT.KEYID = 7
1,176,727 UART: [idev] UDS.KEYID = 0
1,177,072 ready_for_fw is high
1,177,072 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,803 UART: [idev] Erasing UDS.KEYID = 0
1,202,048 UART: [idev] Sha1 KeyId Algorithm
1,210,568 UART: [idev] --
1,211,440 UART: [ldev] ++
1,211,608 UART: [ldev] CDI.KEYID = 6
1,211,971 UART: [ldev] SUBJECT.KEYID = 5
1,212,397 UART: [ldev] AUTHORITY.KEYID = 7
1,212,860 UART: [ldev] FE.KEYID = 1
1,218,160 UART: [ldev] Erasing FE.KEYID = 1
1,244,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,468 UART: [ldev] --
1,283,813 UART: [fwproc] Wait for Commands...
1,284,591 UART: [fwproc] Recv command 0x46574c44
1,285,319 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,081 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,876 >>> mbox cmd response: success
2,785,082 UART: [afmc] ++
2,785,250 UART: [afmc] CDI.KEYID = 6
2,785,612 UART: [afmc] SUBJECT.KEYID = 7
2,786,037 UART: [afmc] AUTHORITY.KEYID = 5
2,821,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,956 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,361 UART: [afmc] --
2,864,421 UART: [cold-reset] --
2,865,343 UART: [state] Locking Datavault
2,866,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,242 UART: [state] Locking ICCM
2,867,886 UART: [exit] Launching FMC @ 0x40000130
2,873,215 UART:
2,873,231 UART: Running Caliptra FMC ...
2,873,639 UART:
2,873,782 UART: [state] CFI Enabled
2,884,233 UART: [fht] FMC Alias Private Key: 7
2,992,268 UART: [art] Extend RT PCRs Done
2,992,696 UART: [art] Lock RT PCRs Done
2,994,302 UART: [art] Populate DV Done
3,002,443 UART: [fht] FMC Alias Private Key: 7
3,003,457 UART: [art] Derive CDI
3,003,737 UART: [art] Store in in slot 0x4
3,089,394 UART: [art] Derive Key Pair
3,089,754 UART: [art] Store priv key in slot 0x5
3,103,206 UART: [art] Derive Key Pair - Done
3,118,321 UART: [art] Signing Cert with AUTHO
3,118,801 UART: RITY.KEYID = 7
3,134,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,986 UART: [art] PUB.X = 53D7C223C9F00DA94A6C50293B9BB04521C681B67B9B298B644BAA9E7A8A8317BA6DD196802E64E7C3ADEB2C9F8D7B8C
3,141,767 UART: [art] PUB.Y = 77603ED0F8A4556617E3B7A8DD12AD8DAAEF556665FA12BBDF2D1F25E90187573EE3DD3B866BE73A94D8CBB57A2191D0
3,148,730 UART: [art] SIG.R = 7A40D262B4194D4B879E36494725B587F7B019D702C7AD36A442861AC81FBC6B1F52CE00F4550B6871628A979315FCE4
3,155,468 UART: [art] SIG.S = 0590A5E56CFBF9CF3721177AF937EBC22D046918420381FB7CB75F6011DEC60E880908C5D1DCDAC3231B2E0D122BD3F8
3,179,452 UART: Caliptra RT
3,179,797 UART: [state] CFI Enabled
3,287,444 UART: [rt] RT listening for mailbox commands...
3,288,107 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,596 UART: [rt]cmd =0x46504c54, len=4
3,318,760 >>> mbox cmd response data (8 bytes)
3,319,121 UART: [rt] FIPS self test
3,319,449 UART: [kat] ++
3,319,601 UART: [kat] sha1
3,323,771 UART: [kat] SHA2-256
3,325,793 UART: [kat] SHA2-384
3,328,694 UART: [kat] SHA2-512-ACC
3,329,099 UART: Droping operation
3,329,552 UART: Fatal Error: 0x90050002
3,331,091 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,331,096 >>> mbox cmd response: failed
3,331,096 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,331,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,521 UART: [kat] SHA2-512-ACC
908,422 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,699 UART: [kat] LMS
1,171,027 UART: [kat] --
1,172,008 UART: [cold-reset] ++
1,172,490 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,485 UART: [idev] Erasing UDS.KEYID = 0
1,202,100 UART: [idev] Sha1 KeyId Algorithm
1,210,560 UART: [idev] --
1,211,590 UART: [ldev] ++
1,211,758 UART: [ldev] CDI.KEYID = 6
1,212,121 UART: [ldev] SUBJECT.KEYID = 5
1,212,547 UART: [ldev] AUTHORITY.KEYID = 7
1,213,010 UART: [ldev] FE.KEYID = 1
1,218,266 UART: [ldev] Erasing FE.KEYID = 1
1,244,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,742 UART: [ldev] --
1,284,019 UART: [fwproc] Wait for Commands...
1,284,841 UART: [fwproc] Recv command 0x46574c44
1,285,569 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,381 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,004 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 ready_for_fw is high
1,060,626 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,453 >>> mbox cmd response: success
2,697,417 UART:
2,697,433 UART: Running Caliptra FMC ...
2,697,841 UART:
2,697,984 UART: [state] CFI Enabled
2,708,481 UART: [fht] FMC Alias Private Key: 7
2,815,576 UART: [art] Extend RT PCRs Done
2,816,004 UART: [art] Lock RT PCRs Done
2,817,518 UART: [art] Populate DV Done
2,825,625 UART: [fht] FMC Alias Private Key: 7
2,826,673 UART: [art] Derive CDI
2,826,953 UART: [art] Store in in slot 0x4
2,913,032 UART: [art] Derive Key Pair
2,913,392 UART: [art] Store priv key in slot 0x5
2,926,834 UART: [art] Derive Key Pair - Done
2,941,612 UART: [art] Signing Cert with AUTHO
2,942,092 UART: RITY.KEYID = 7
2,957,530 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,295 UART: [art] PUB.X = 9F9A6658A6F7E19B9CC768BBBC495A6B66653403909A9CBA7525108E2DE4E1B3BE39534C7973CEC7FD7EE2EDE885342D
2,965,074 UART: [art] PUB.Y = 783A1F6BB64FEDF4303C794CC366AAD750C3B145E19950F6AF45ABBA6295C843CC855BAC267C8AE6369C4C0689E8EF0B
2,972,034 UART: [art] SIG.R = 3876A0B697BDDD28B534F94949AE7D8E40072EB6FE4A2A4F23822F714138C05A41C0E0FF10DE051BC135A0A56F861184
2,978,802 UART: [art] SIG.S = 796990862673DF1657A7140E5886DAE5BD692501AFE7FD60A61EDF9EE7BDCE1D7DB4537AE2119A2608207B33E50B1F6D
3,002,695 UART: Caliptra RT
3,003,040 UART: [state] CFI Enabled
3,111,473 UART: [rt] RT listening for mailbox commands...
3,112,136 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,977 UART: [rt]cmd =0x46504c54, len=4
3,143,307 >>> mbox cmd response data (8 bytes)
3,143,448 UART: [rt] FIPS self test
3,143,776 UART: [kat] ++
3,143,928 UART: [kat] sha1
3,148,292 UART: [kat] SHA2-256
3,150,314 UART: [kat] SHA2-384
3,153,063 UART: [kat] SHA2-512-ACC
3,153,468 UART: Droping operation
3,154,089 UART: Fatal Error: 0x90050002
3,155,628 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,633 >>> mbox cmd response: failed
3,155,633 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,974 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,125 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,814 UART: [kat] SHA2-256
891,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,493 UART: [kat] ++
895,645 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,238 UART: [kat] LMS
1,169,550 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,633 UART: [idev] ++
1,173,801 UART: [idev] CDI.KEYID = 6
1,174,162 UART: [idev] SUBJECT.KEYID = 7
1,174,587 UART: [idev] UDS.KEYID = 0
1,174,933 ready_for_fw is high
1,174,933 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,693 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,786 UART: [ldev] ++
1,209,954 UART: [ldev] CDI.KEYID = 6
1,210,318 UART: [ldev] SUBJECT.KEYID = 5
1,210,745 UART: [ldev] AUTHORITY.KEYID = 7
1,211,208 UART: [ldev] FE.KEYID = 1
1,216,510 UART: [ldev] Erasing FE.KEYID = 1
1,242,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,072 UART: [ldev] --
1,282,548 UART: [fwproc] Wait for Commands...
1,283,367 UART: [fwproc] Recv command 0x46574c44
1,284,100 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,721 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,521 >>> mbox cmd response: success
2,783,704 UART: [afmc] ++
2,783,872 UART: [afmc] CDI.KEYID = 6
2,784,235 UART: [afmc] SUBJECT.KEYID = 7
2,784,661 UART: [afmc] AUTHORITY.KEYID = 5
2,820,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,253 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,507 UART: [afmc] --
2,863,615 UART: [cold-reset] --
2,864,159 UART: [state] Locking Datavault
2,865,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,918 UART: [state] Locking ICCM
2,866,510 UART: [exit] Launching FMC @ 0x40000130
2,871,839 UART:
2,871,855 UART: Running Caliptra FMC ...
2,872,263 UART:
2,872,317 UART: [state] CFI Enabled
2,882,950 UART: [fht] FMC Alias Private Key: 7
2,990,267 UART: [art] Extend RT PCRs Done
2,990,695 UART: [art] Lock RT PCRs Done
2,992,345 UART: [art] Populate DV Done
3,000,380 UART: [fht] FMC Alias Private Key: 7
3,001,356 UART: [art] Derive CDI
3,001,636 UART: [art] Store in in slot 0x4
3,087,607 UART: [art] Derive Key Pair
3,087,967 UART: [art] Store priv key in slot 0x5
3,100,667 UART: [art] Derive Key Pair - Done
3,115,704 UART: [art] Signing Cert with AUTHO
3,116,184 UART: RITY.KEYID = 7
3,131,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,197 UART: [art] PUB.X = 9005C2765E9DECEDE075867D8158920990FAD8D1D1D32EEE4A90BFC3A77D1107563602C041605760212170BDAB2DC4B4
3,138,957 UART: [art] PUB.Y = 27D9192FBFA792086843B44DD313F92F604AB90711EC92326EB6869B530148C7C408A724E36D2E7596B72B5C28337D33
3,145,887 UART: [art] SIG.R = 1036A7DBFD869F6AB27F0542F21707E92F387918B7D3852367F2D1844669C823F01D8FBB42480CADA41AD4DF82AB90E8
3,152,652 UART: [art] SIG.S = B4F07202A88045E07C36425A0726ACC413C6FD8CCE4241EAC95FAB3BCDE11464CB0966AF96C4DDB2B67EB8CD9A7931B9
3,176,716 UART: Caliptra RT
3,176,969 UART: [state] CFI Enabled
3,285,100 UART: [rt] RT listening for mailbox commands...
3,285,763 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,506 UART: [rt]cmd =0x46504c54, len=4
3,316,624 >>> mbox cmd response data (8 bytes)
3,316,775 UART: [rt] FIPS self test
3,317,103 UART: [kat] ++
3,317,255 UART: [kat] sha1
3,321,429 UART: [kat] SHA2-256
3,323,451 UART: [kat] SHA2-384
3,326,396 UART: [kat] SHA2-512-ACC
3,326,801 UART: Droping operation
3,327,248 UART: Fatal Error: 0x90050002
3,328,787 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,328,792 >>> mbox cmd response: failed
3,328,792 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,328,797 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,744 UART: [state] LifecycleState = Unprovisioned
86,399 UART: [state] DebugLocked = No
87,077 UART: [state] WD Timer not started. Device not locked for debugging
88,438 UART: [kat] SHA2-256
891,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,117 UART: [kat] ++
896,269 UART: [kat] sha1
900,389 UART: [kat] SHA2-256
902,329 UART: [kat] SHA2-384
905,036 UART: [kat] SHA2-512-ACC
906,937 UART: [kat] ECC-384
916,550 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,943 UART: [fht] FHT @ 0x50003400
1,173,653 UART: [idev] ++
1,173,821 UART: [idev] CDI.KEYID = 6
1,174,182 UART: [idev] SUBJECT.KEYID = 7
1,174,607 UART: [idev] UDS.KEYID = 0
1,174,953 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,470 UART: [fwproc] Wait for Commands...
1,281,263 UART: [fwproc] Recv command 0x46574c44
1,281,996 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,823 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,455 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,702 ready_for_fw is high
1,055,702 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,628,523 >>> mbox cmd response: success
2,690,359 UART:
2,690,375 UART: Running Caliptra FMC ...
2,690,783 UART:
2,690,837 UART: [state] CFI Enabled
2,701,406 UART: [fht] FMC Alias Private Key: 7
2,809,371 UART: [art] Extend RT PCRs Done
2,809,799 UART: [art] Lock RT PCRs Done
2,811,319 UART: [art] Populate DV Done
2,819,578 UART: [fht] FMC Alias Private Key: 7
2,820,594 UART: [art] Derive CDI
2,820,874 UART: [art] Store in in slot 0x4
2,906,095 UART: [art] Derive Key Pair
2,906,455 UART: [art] Store priv key in slot 0x5
2,919,979 UART: [art] Derive Key Pair - Done
2,934,730 UART: [art] Signing Cert with AUTHO
2,935,210 UART: RITY.KEYID = 7
2,950,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,279 UART: [art] PUB.X = 730EF562C0B6505728873E12F9440AA640D12B22A5AB452483E56FC7AA3566C6743D0DEC56A16C020E84E9A454FC5F18
2,958,034 UART: [art] PUB.Y = 759C20E367F3C440C0F41754CEF3DF78FE1E8BB6CE0905F756EE5F8CCC48509024401DC28261FAB9926E68E0BED9BB11
2,964,990 UART: [art] SIG.R = C9676F92F760B9A102BD10E5514A8BBB991780F06DF4EFDBF206933ED610FDD41B9751DF76D499A9B90621045A694FFA
2,971,756 UART: [art] SIG.S = 2E35CE1360FC55DDE1CFFD812156146D7BB14D115A0232234A2C4A07DA75C9338630E2FC4828DC618D4B4AF926DB626C
2,995,701 UART: Caliptra RT
2,995,954 UART: [state] CFI Enabled
3,104,351 UART: [rt] RT listening for mailbox commands...
3,105,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,875 UART: [rt]cmd =0x46504c54, len=4
3,136,045 >>> mbox cmd response data (8 bytes)
3,136,256 UART: [rt] FIPS self test
3,136,584 UART: [kat] ++
3,136,736 UART: [kat] sha1
3,141,154 UART: [kat] SHA2-256
3,143,176 UART: [kat] SHA2-384
3,146,189 UART: [kat] SHA2-512-ACC
3,146,594 UART: Droping operation
3,147,037 UART: Fatal Error: 0x90050002
3,148,576 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,581 >>> mbox cmd response: failed
3,148,581 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,622 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,723 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,501 UART: [kat] LMS
1,168,813 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,174,088 ready_for_fw is high
1,174,088 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,703 UART: [ldev] ++
1,209,871 UART: [ldev] CDI.KEYID = 6
1,210,235 UART: [ldev] SUBJECT.KEYID = 5
1,210,662 UART: [ldev] AUTHORITY.KEYID = 7
1,211,125 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,310 UART: [fwproc] Recv command 0x46574c44
1,283,043 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,536 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,310 >>> mbox cmd response: success
2,782,329 UART: [afmc] ++
2,782,497 UART: [afmc] CDI.KEYID = 6
2,782,860 UART: [afmc] SUBJECT.KEYID = 7
2,783,286 UART: [afmc] AUTHORITY.KEYID = 5
2,819,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,614 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,660 UART: [afmc] --
2,862,544 UART: [cold-reset] --
2,863,420 UART: [state] Locking Datavault
2,864,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,375 UART: [state] Locking ICCM
2,865,999 UART: [exit] Launching FMC @ 0x40000130
2,871,328 UART:
2,871,344 UART: Running Caliptra FMC ...
2,871,752 UART:
2,871,895 UART: [state] CFI Enabled
2,882,436 UART: [fht] FMC Alias Private Key: 7
2,990,017 UART: [art] Extend RT PCRs Done
2,990,445 UART: [art] Lock RT PCRs Done
2,992,091 UART: [art] Populate DV Done
3,000,184 UART: [fht] FMC Alias Private Key: 7
3,001,276 UART: [art] Derive CDI
3,001,556 UART: [art] Store in in slot 0x4
3,086,647 UART: [art] Derive Key Pair
3,087,007 UART: [art] Store priv key in slot 0x5
3,100,249 UART: [art] Derive Key Pair - Done
3,115,398 UART: [art] Signing Cert with AUTHO
3,115,878 UART: RITY.KEYID = 7
3,130,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,741 UART: [art] PUB.X = 39458311540255D6570C14B93307E466994C687978865A1E86F1DB84F1811EC726FDA04B88C0D53DA757DA104B5A86D3
3,138,492 UART: [art] PUB.Y = A98CC132B44E0A76B7E3C71A626181CE5B2EFBE7B10E53684A52E9873EF7DC3136CB329BA8EF7103B841CD91CEBA25A4
3,145,449 UART: [art] SIG.R = AA9A80AD06C3A48C9BC870C785ECC79A4C3778EF4EDFDF094BDF9BD8F750D10972D63EC307E52B86499FC8AF7E0EDAE9
3,152,230 UART: [art] SIG.S = BF0FE7B232DBD169D2D7639B96C00A34E8C5545AB077A5255D2C91AF96BF40D2AA579B601DB02989B6A49F180350EFEF
3,176,028 UART: Caliptra RT
3,176,373 UART: [state] CFI Enabled
3,283,403 UART: [rt] RT listening for mailbox commands...
3,284,066 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,931 UART: [rt]cmd =0x46504c54, len=4
3,314,889 >>> mbox cmd response data (8 bytes)
3,315,224 UART: [rt] FIPS self test
3,315,552 UART: [kat] ++
3,315,704 UART: [kat] sha1
3,320,052 UART: [kat] SHA2-256
3,322,074 UART: [kat] SHA2-384
3,324,951 UART: [kat] SHA2-512-ACC
3,325,356 UART: Droping operation
3,325,757 UART: Fatal Error: 0x90050002
3,327,296 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,327,301 >>> mbox cmd response: failed
3,327,301 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,327,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,174,758 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,241,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,951 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,432 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,144 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 ready_for_fw is high
1,056,583 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,824 >>> mbox cmd response: success
2,694,302 UART:
2,694,318 UART: Running Caliptra FMC ...
2,694,726 UART:
2,694,869 UART: [state] CFI Enabled
2,705,662 UART: [fht] FMC Alias Private Key: 7
2,813,231 UART: [art] Extend RT PCRs Done
2,813,659 UART: [art] Lock RT PCRs Done
2,814,893 UART: [art] Populate DV Done
2,822,902 UART: [fht] FMC Alias Private Key: 7
2,823,884 UART: [art] Derive CDI
2,824,164 UART: [art] Store in in slot 0x4
2,909,909 UART: [art] Derive Key Pair
2,910,269 UART: [art] Store priv key in slot 0x5
2,924,283 UART: [art] Derive Key Pair - Done
2,939,466 UART: [art] Signing Cert with AUTHO
2,939,946 UART: RITY.KEYID = 7
2,955,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,813 UART: [art] PUB.X = F7654356D9BD8015FBFC3777FBFAC8C6EAAFE511D647B7E83AA55A5948E1A81939C42DC59B3A12241F9C7ECB8FD737C3
2,962,601 UART: [art] PUB.Y = EDC0E24D3F68E688D6CE1BD469CA99C0BA79CB3794E8076EEF73EDB3A40AC97E7AE7321977C39A99198A7CE4D2DB1C3B
2,969,567 UART: [art] SIG.R = 26E985414821260F0EE9F71235D2F87F2AD14177C0E6CC1B31FD4182662828540F6D21DD9E501B06F2F1C28B91985397
2,976,317 UART: [art] SIG.S = 5B42CFFC8F682E6D55774905256B3DB3FCA83423663D932EEBC8AD35F472E97FE94E3DFDC96C641223CDBD36C4A4BE01
2,999,806 UART: Caliptra RT
3,000,151 UART: [state] CFI Enabled
3,108,762 UART: [rt] RT listening for mailbox commands...
3,109,425 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,142 UART: [rt]cmd =0x46504c54, len=4
3,140,338 >>> mbox cmd response data (8 bytes)
3,140,609 UART: [rt] FIPS self test
3,140,937 UART: [kat] ++
3,141,089 UART: [kat] sha1
3,145,373 UART: [kat] SHA2-256
3,147,395 UART: [kat] SHA2-384
3,150,364 UART: [kat] SHA2-512-ACC
3,150,769 UART: Droping operation
3,151,160 UART: Fatal Error: 0x90050002
3,152,699 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,704 >>> mbox cmd response: failed
3,152,704 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,387 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,512 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,689,915 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,833,891 >>> mbox cmd response: failed
2,834,468 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,977,500 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
4,863,260 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,437,872 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
2,688,393 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,832,654 >>> mbox cmd response: failed
2,833,271 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,976,230 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
4,863,669 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,412,184 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,042,011 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,185,786 >>> mbox cmd response: failed
3,186,356 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,329,224 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
21,578,467 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,006,503 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,038,159 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,183,087 >>> mbox cmd response: failed
3,183,696 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,326,646 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,575,976 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,017,266 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,701,083 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,845,232 >>> mbox cmd response: failed
2,845,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,989,143 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,478,530 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,274,789 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,703,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,847,744 >>> mbox cmd response: failed
2,848,295 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,991,600 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,455,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,309,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
3,053,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,197,605 >>> mbox cmd response: failed
3,198,175 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,341,634 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,165,810 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,869,000 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,060,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,204,429 >>> mbox cmd response: failed
3,205,001 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,348,173 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
20,180,426 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,900,417 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,702,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,846,610 >>> mbox cmd response: failed
2,847,176 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,990,476 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,446,384 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,226,688 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,702,641 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,846,861 >>> mbox cmd response: failed
2,847,429 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,990,572 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,454,884 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,286,562 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,498 writing to cptra_bootfsm_go
3,055,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,199,748 >>> mbox cmd response: failed
3,200,561 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,343,873 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,173,936 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,887,683 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,055,846 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,200,006 >>> mbox cmd response: failed
3,200,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,343,860 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
20,175,136 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,892,577 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,032 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,040 >>> mbox cmd response: failed
813,040 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,441 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,103 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,636 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,644 >>> mbox cmd response: failed
812,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,975 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,695 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,893 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,901 >>> mbox cmd response: failed
812,901 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,074 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,266 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,663 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,671 >>> mbox cmd response: failed
813,671 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,748 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,934 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,942 >>> mbox cmd response: failed
812,942 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,615 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,395 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,682 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,690 >>> mbox cmd response: failed
813,690 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,696 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,867 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,329 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,627 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,635 >>> mbox cmd response: failed
813,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,322 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,285 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,293 >>> mbox cmd response: failed
813,293 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,676 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,054 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,576 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,584 >>> mbox cmd response: failed
813,584 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,703 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,129 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,408 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,416 >>> mbox cmd response: failed
813,416 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,085 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,099 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,351 >>> mbox cmd response: failed
813,351 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,816 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,315 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,323 >>> mbox cmd response: failed
813,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
813,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,674 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,139 UART:
192,504 UART: Running Caliptra ROM ...
193,692 UART:
193,848 UART: [state] CFI Enabled
265,495 UART: [state] LifecycleState = Unprovisioned
267,499 UART: [state] DebugLocked = No
270,391 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,905 UART: [kat] SHA2-256
445,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,082 UART: [kat] ++
456,717 UART: [kat] sha1
468,095 UART: [kat] SHA2-256
470,756 UART: [kat] SHA2-384
476,175 UART: [kat] SHA2-512-ACC
478,543 UART: [kat] ECC-384
2,766,612 UART: [kat] HMAC-384Kdf
2,778,723 UART: [kat] LMS
3,969,075 UART: [kat] --
3,972,973 UART: [cold-reset] ++
3,975,441 UART: [fht] Storing FHT @ 0x50003400
3,987,221 UART: [idev] ++
3,987,794 UART: [idev] CDI.KEYID = 6
3,988,752 UART: [idev] SUBJECT.KEYID = 7
3,990,000 UART: [idev] UDS.KEYID = 0
3,990,968 ready_for_fw is high
3,991,170 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,135,385 UART: [idev] Erasing UDS.KEYID = 0
7,328,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,230 UART: [idev] --
7,354,152 UART: [ldev] ++
7,354,730 UART: [ldev] CDI.KEYID = 6
7,355,699 UART: [ldev] SUBJECT.KEYID = 5
7,356,912 UART: [ldev] AUTHORITY.KEYID = 7
7,358,143 UART: [ldev] FE.KEYID = 1
7,402,273 UART: [ldev] Erasing FE.KEYID = 1
10,738,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,963 UART: [ldev] --
13,117,964 UART: [fwproc] Waiting for Commands...
13,120,733 UART: [fwproc] Received command 0x46574c44
13,122,925 UART: [fwproc] Received Image of size 114632 bytes
17,179,931 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,773 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,645,038 >>> mbox cmd response: success
17,649,205 UART: [afmc] ++
17,649,796 UART: [afmc] CDI.KEYID = 6
17,650,710 UART: [afmc] SUBJECT.KEYID = 7
17,652,189 UART: [afmc] AUTHORITY.KEYID = 5
21,013,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,685 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,067 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,912 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,343 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,366 UART: [afmc] --
23,381,529 UART: [cold-reset] --
23,385,130 UART: [state] Locking Datavault
23,388,597 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,298 UART: [state] Locking ICCM
23,391,961 UART: [exit] Launching FMC @ 0x40000130
23,400,352 UART:
23,400,589 UART: Running Caliptra FMC ...
23,401,694 UART:
23,401,855 UART: [state] CFI Enabled
23,472,017 UART: [fht] FMC Alias Private Key: 7
25,810,727 UART: [art] Extend RT PCRs Done
25,812,090 UART: [art] Lock RT PCRs Done
25,813,730 UART: [art] Populate DV Done
25,819,152 UART: [fht] FMC Alias Private Key: 7
25,820,688 UART: [art] Derive CDI
25,821,522 UART: [art] Store in in slot 0x4
25,879,971 UART: [art] Derive Key Pair
25,880,971 UART: [art] Store priv key in slot 0x5
29,173,962 UART: [art] Derive Key Pair - Done
29,187,137 UART: [art] Signing Cert with AUTHO
29,188,441 UART: RITY.KEYID = 7
31,475,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,569 UART: [art] PUB.X = D4276317CF7902887D42B79A3F2F0D5D5A7210DAF8AFBBCF13AFB1420C8450A594CB773FF8B76E01E7B98A459EEE7AE1
31,483,836 UART: [art] PUB.Y = D8A75353736894C800B1B26382594A4D041110E1A8B6319EE0454696DB157ABD228AE1E863E9EBAFFE9908BF0C5C02D4
31,491,074 UART: [art] SIG.R = 852483F78A3647EC6428C6353E56992B44CB51D29F6BA9355C72F63B29D7C3BF885C14FBB37A430D9857BE3152534920
31,498,469 UART: [art] SIG.S = 8924F5C84DA12CB397C1493B08160B6F8240C01EE56B179EBF457ACD891FA294468DCDE3477AF460295D62C8EC0B81F6
32,803,400 UART: Caliptra RT
32,804,116 UART: [state] CFI Enabled
32,966,375 UART: [rt] RT listening for mailbox commands...
32,968,236 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,997,755 UART: [rt]cmd =0x46504c54, len=4
32,999,302 >>> mbox cmd response data (8 bytes)
33,000,542 UART: [rt] FIPS self test
33,001,491 UART: [kat] ++
33,001,947 UART: [kat] sha1
33,006,410 UART: [kat] SHA2-256
33,008,343 UART: [kat] SHA2-384
33,011,255 UART: [kat] SHA2-512-ACC
33,012,350 UART: Droping operation
33,013,193 UART: Fatal Error: 0x90050003
33,048,406 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,192,427 >>> mbox cmd response: failed
33,193,097 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,337,049 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,103 UART:
190,417 UART: Running Caliptra ROM ...
191,474 UART:
191,620 UART: [state] CFI Enabled
248,722 UART: [state] LifecycleState = Unprovisioned
250,645 UART: [state] DebugLocked = No
253,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,490 UART: [kat] SHA2-256
428,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,733 UART: [kat] ++
439,267 UART: [kat] sha1
449,881 UART: [kat] SHA2-256
452,563 UART: [kat] SHA2-384
459,508 UART: [kat] SHA2-512-ACC
461,845 UART: [kat] ECC-384
2,751,637 UART: [kat] HMAC-384Kdf
2,764,195 UART: [kat] LMS
3,954,483 UART: [kat] --
3,959,471 UART: [cold-reset] ++
3,962,059 UART: [fht] Storing FHT @ 0x50003400
3,974,030 UART: [idev] ++
3,974,602 UART: [idev] CDI.KEYID = 6
3,975,510 UART: [idev] SUBJECT.KEYID = 7
3,976,783 UART: [idev] UDS.KEYID = 0
3,978,298 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,122,543 UART: [idev] Erasing UDS.KEYID = 0
7,308,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,329,691 UART: [idev] --
7,332,825 UART: [ldev] ++
7,333,395 UART: [ldev] CDI.KEYID = 6
7,334,358 UART: [ldev] SUBJECT.KEYID = 5
7,335,571 UART: [ldev] AUTHORITY.KEYID = 7
7,336,800 UART: [ldev] FE.KEYID = 1
7,385,013 UART: [ldev] Erasing FE.KEYID = 1
10,717,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,949 UART: [ldev] --
13,101,331 UART: [fwproc] Waiting for Commands...
13,103,107 UART: [fwproc] Received command 0x46574c44
13,105,292 UART: [fwproc] Received Image of size 114632 bytes
17,155,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,710 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,295,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,614,512 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,784,708 ready_for_fw is high
3,785,103 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,884,225 >>> mbox cmd response: success
23,566,644 UART:
23,567,032 UART: Running Caliptra FMC ...
23,568,153 UART:
23,568,303 UART: [state] CFI Enabled
23,635,511 UART: [fht] FMC Alias Private Key: 7
25,973,975 UART: [art] Extend RT PCRs Done
25,975,238 UART: [art] Lock RT PCRs Done
25,976,839 UART: [art] Populate DV Done
25,982,550 UART: [fht] FMC Alias Private Key: 7
25,984,136 UART: [art] Derive CDI
25,984,907 UART: [art] Store in in slot 0x4
26,044,388 UART: [art] Derive Key Pair
26,045,392 UART: [art] Store priv key in slot 0x5
29,338,987 UART: [art] Derive Key Pair - Done
29,352,235 UART: [art] Signing Cert with AUTHO
29,353,547 UART: RITY.KEYID = 7
31,640,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,682 UART: [art] PUB.X = 60273AC084F5BF91798128AF9B0CA8F8F11E0F82912F547A02FA394FC47323F44E982A011997E5063556CE944ED6296B
31,648,943 UART: [art] PUB.Y = D9A24656E647C6135000F708EF2745F8BFB94FA09A4835D394180D9C0B5E7FA24D555D78E7DF7656BEB6EBC7B31C5C47
31,656,141 UART: [art] SIG.R = 693DB90CD3B35004EE28B2C2572B10EEC82FF5FF45D8934BB0F71E9E361ED328131F7F381E3862FA0B2005D2F7D60262
31,663,581 UART: [art] SIG.S = 8B1349AB6ECD47DA3125B38CCDB70F2907ED7E34D9FC2887016915488DADBBA0D6A92A5CBD73EAC7258D525239C84608
32,968,494 UART: Caliptra RT
32,969,198 UART: [state] CFI Enabled
33,129,460 UART: [rt] RT listening for mailbox commands...
33,131,339 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,160,991 UART: [rt]cmd =0x46504c54, len=4
33,162,573 >>> mbox cmd response data (8 bytes)
33,163,371 UART: [rt] FIPS self test
33,164,314 UART: [kat] ++
33,164,766 UART: [kat] sha1
33,169,006 UART: [kat] SHA2-256
33,170,891 UART: [kat] SHA2-384
33,173,908 UART: [kat] SHA2-512-ACC
33,174,877 UART: Droping operation
33,175,814 UART: Fatal Error: 0x90050003
33,211,201 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,355,218 >>> mbox cmd response: failed
33,355,900 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,499,659 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,770,832 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,846,670 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,499 UART:
192,858 UART: Running Caliptra ROM ...
194,041 UART:
603,510 UART: [state] CFI Enabled
618,884 UART: [state] LifecycleState = Unprovisioned
620,845 UART: [state] DebugLocked = No
623,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,561 UART: [kat] SHA2-256
798,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,820 UART: [kat] ++
809,312 UART: [kat] sha1
820,686 UART: [kat] SHA2-256
823,341 UART: [kat] SHA2-384
829,474 UART: [kat] SHA2-512-ACC
831,853 UART: [kat] ECC-384
3,116,632 UART: [kat] HMAC-384Kdf
3,127,594 UART: [kat] LMS
4,317,717 UART: [kat] --
4,322,809 UART: [cold-reset] ++
4,324,753 UART: [fht] Storing FHT @ 0x50003400
4,335,740 UART: [idev] ++
4,336,305 UART: [idev] CDI.KEYID = 6
4,337,256 UART: [idev] SUBJECT.KEYID = 7
4,338,500 UART: [idev] UDS.KEYID = 0
4,339,488 ready_for_fw is high
4,339,696 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,483,687 UART: [idev] Erasing UDS.KEYID = 0
7,625,058 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,756 UART: [idev] --
7,651,327 UART: [ldev] ++
7,651,899 UART: [ldev] CDI.KEYID = 6
7,652,888 UART: [ldev] SUBJECT.KEYID = 5
7,654,104 UART: [ldev] AUTHORITY.KEYID = 7
7,655,339 UART: [ldev] FE.KEYID = 1
7,663,907 UART: [ldev] Erasing FE.KEYID = 1
10,951,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,676 UART: [ldev] --
13,314,135 UART: [fwproc] Waiting for Commands...
13,315,801 UART: [fwproc] Received command 0x46574c44
13,317,983 UART: [fwproc] Received Image of size 114632 bytes
17,375,699 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,841,418 >>> mbox cmd response: success
17,845,010 UART: [afmc] ++
17,845,639 UART: [afmc] CDI.KEYID = 6
17,846,530 UART: [afmc] SUBJECT.KEYID = 7
17,847,801 UART: [afmc] AUTHORITY.KEYID = 5
21,161,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,312 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,692 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,496 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,500,968 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,013 UART: [afmc] --
23,525,974 UART: [cold-reset] --
23,529,132 UART: [state] Locking Datavault
23,536,212 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,968 UART: [state] Locking ICCM
23,539,164 UART: [exit] Launching FMC @ 0x40000130
23,547,561 UART:
23,547,798 UART: Running Caliptra FMC ...
23,548,900 UART:
23,549,055 UART: [state] CFI Enabled
23,556,941 UART: [fht] FMC Alias Private Key: 7
25,887,852 UART: [art] Extend RT PCRs Done
25,889,074 UART: [art] Lock RT PCRs Done
25,890,699 UART: [art] Populate DV Done
25,896,272 UART: [fht] FMC Alias Private Key: 7
25,897,756 UART: [art] Derive CDI
25,898,491 UART: [art] Store in in slot 0x4
25,941,353 UART: [art] Derive Key Pair
25,942,395 UART: [art] Store priv key in slot 0x5
29,184,716 UART: [art] Derive Key Pair - Done
29,197,721 UART: [art] Signing Cert with AUTHO
29,199,041 UART: RITY.KEYID = 7
31,478,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,188 UART: [art] PUB.X = 426A755E698ABE9A7FF54EFA735660217505B9614535DDE5906A6E431F6125DE672BBD7119C82E793797A4E7E8273CDA
31,487,446 UART: [art] PUB.Y = E67FB83E04E2C0CE362B2A81D1091C2A616B274287FA8DB0221E096FDEEFBFB80253F2CCC55871E9BB66ED7114617D04
31,494,684 UART: [art] SIG.R = 2B496F674AE625A4656A0214406B80B437378FB95706F01E292934DD79C0E5A0277AC903D68A2CE375C4B5AA620B42C5
31,502,023 UART: [art] SIG.S = 03BF044D97D1CB7105635A296761ADE9505E47B8683579232DB8F37B7B9E8E7FE76354D44EC24990DBEF0DC1947C54FD
32,807,188 UART: Caliptra RT
32,807,893 UART: [state] CFI Enabled
32,925,923 UART: [rt] RT listening for mailbox commands...
32,927,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,513 UART: [rt]cmd =0x46504c54, len=4
32,959,122 >>> mbox cmd response data (8 bytes)
32,960,197 UART: [rt] FIPS self test
32,961,141 UART: [kat] ++
32,961,588 UART: [kat] sha1
32,966,041 UART: [kat] SHA2-256
32,967,991 UART: [kat] SHA2-384
32,970,876 UART: [kat] SHA2-512-ACC
32,971,919 UART: Droping operation
32,972,743 UART: Fatal Error: 0x90050003
33,007,940 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,151,957 >>> mbox cmd response: failed
33,152,627 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,296,919 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,007 UART:
190,306 UART: Running Caliptra ROM ...
191,335 UART:
7,235,692 UART: [state] CFI Enabled
7,250,226 UART: [state] LifecycleState = Unprovisioned
7,252,171 UART: [state] DebugLocked = No
7,254,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,258,725 UART: [kat] SHA2-256
7,428,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,439,034 UART: [kat] ++
7,439,494 UART: [kat] sha1
7,449,677 UART: [kat] SHA2-256
7,452,364 UART: [kat] SHA2-384
7,459,001 UART: [kat] SHA2-512-ACC
7,461,363 UART: [kat] ECC-384
9,743,748 UART: [kat] HMAC-384Kdf
9,755,164 UART: [kat] LMS
10,945,291 UART: [kat] --
10,950,319 UART: [cold-reset] ++
10,951,385 UART: [fht] Storing FHT @ 0x50003400
10,963,078 UART: [idev] ++
10,963,707 UART: [idev] CDI.KEYID = 6
10,964,634 UART: [idev] SUBJECT.KEYID = 7
10,965,846 UART: [idev] UDS.KEYID = 0
10,967,432 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,111,434 UART: [idev] Erasing UDS.KEYID = 0
14,252,096 UART: [idev] Using Sha1 for KeyId Algorithm
14,273,103 UART: [idev] --
14,277,798 UART: [ldev] ++
14,278,366 UART: [ldev] CDI.KEYID = 6
14,279,328 UART: [ldev] SUBJECT.KEYID = 5
14,280,543 UART: [ldev] AUTHORITY.KEYID = 7
14,281,825 UART: [ldev] FE.KEYID = 1
14,291,878 UART: [ldev] Erasing FE.KEYID = 1
17,578,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,873,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,936,311 UART: [ldev] --
19,941,471 UART: [fwproc] Waiting for Commands...
19,943,571 UART: [fwproc] Received command 0x46574c44
19,945,761 UART: [fwproc] Received Image of size 114632 bytes
24,004,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,084,535 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,153,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,472,497 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,124,705 ready_for_fw is high
4,125,110 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,082,615 >>> mbox cmd response: success
23,720,495 UART:
23,720,912 UART: Running Caliptra FMC ...
23,722,241 UART:
23,722,411 UART: [state] CFI Enabled
23,730,039 UART: [fht] FMC Alias Private Key: 7
26,061,059 UART: [art] Extend RT PCRs Done
26,062,297 UART: [art] Lock RT PCRs Done
26,064,061 UART: [art] Populate DV Done
26,069,222 UART: [fht] FMC Alias Private Key: 7
26,070,878 UART: [art] Derive CDI
26,071,698 UART: [art] Store in in slot 0x4
26,114,296 UART: [art] Derive Key Pair
26,115,300 UART: [art] Store priv key in slot 0x5
29,357,628 UART: [art] Derive Key Pair - Done
29,370,635 UART: [art] Signing Cert with AUTHO
29,371,945 UART: RITY.KEYID = 7
31,651,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,192 UART: [art] PUB.X = 1C5726F55E9F6C56DA55B829533AD89DEF9C85072B7C2E85C46113C1D57236C1734FAF28A848ED14E817AC45CBE699FA
31,660,418 UART: [art] PUB.Y = 3FA55F9AC9B9B244E9D040A0AEB9FD633D65F7E4362375ECBB9DC39A279E2A389D4547E861836A775D6D8B1211BEEF89
31,667,663 UART: [art] SIG.R = 210DD10891CFBC5328D3C834F83EAB76643B7D1A4BECF1C76E4346D55836C229502B13EEEA39C1AFECBFEFC826DB3979
31,675,054 UART: [art] SIG.S = 538BADDECE4F1FF88BBC34A839E8A57C97F4330A2338F60FFE5C70B20580AD63FC4626DD06D7284FB3793AB92BD0E20A
32,980,228 UART: Caliptra RT
32,980,951 UART: [state] CFI Enabled
33,099,045 UART: [rt] RT listening for mailbox commands...
33,100,909 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,130,647 UART: [rt]cmd =0x46504c54, len=4
33,132,501 >>> mbox cmd response data (8 bytes)
33,133,403 UART: [rt] FIPS self test
33,134,351 UART: [kat] ++
33,134,803 UART: [kat] sha1
33,139,212 UART: [kat] SHA2-256
33,141,146 UART: [kat] SHA2-384
33,144,163 UART: [kat] SHA2-512-ACC
33,145,190 UART: Droping operation
33,145,996 UART: Fatal Error: 0x90050003
33,181,326 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,325,169 >>> mbox cmd response: failed
33,325,835 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,469,718 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
10,585,942 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,531,460 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,342 UART:
192,714 UART: Running Caliptra ROM ...
193,943 UART:
194,094 UART: [state] CFI Enabled
263,618 UART: [state] LifecycleState = Unprovisioned
265,534 UART: [state] DebugLocked = No
267,133 UART: [state] WD Timer not started. Device not locked for debugging
270,038 UART: [kat] SHA2-256
449,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,768 UART: [kat] ++
461,217 UART: [kat] sha1
472,012 UART: [kat] SHA2-256
475,015 UART: [kat] SHA2-384
480,386 UART: [kat] SHA2-512-ACC
483,333 UART: [kat] ECC-384
2,946,444 UART: [kat] HMAC-384Kdf
2,969,979 UART: [kat] LMS
3,499,399 UART: [kat] --
3,505,142 UART: [cold-reset] ++
3,506,041 UART: [fht] FHT @ 0x50003400
3,517,813 UART: [idev] ++
3,518,387 UART: [idev] CDI.KEYID = 6
3,519,303 UART: [idev] SUBJECT.KEYID = 7
3,520,481 UART: [idev] UDS.KEYID = 0
3,521,407 ready_for_fw is high
3,521,614 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,666,213 UART: [idev] Erasing UDS.KEYID = 0
6,024,810 UART: [idev] Sha1 KeyId Algorithm
6,048,439 UART: [idev] --
6,052,062 UART: [ldev] ++
6,052,644 UART: [ldev] CDI.KEYID = 6
6,053,564 UART: [ldev] SUBJECT.KEYID = 5
6,054,729 UART: [ldev] AUTHORITY.KEYID = 7
6,055,962 UART: [ldev] FE.KEYID = 1
6,097,891 UART: [ldev] Erasing FE.KEYID = 1
8,600,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,602 UART: [ldev] --
10,411,026 UART: [fwproc] Wait for Commands...
10,413,558 UART: [fwproc] Recv command 0x46574c44
10,415,663 UART: [fwproc] Recv'd Img size: 114940 bytes
13,823,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,049 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,844 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,287,284 >>> mbox cmd response: success
14,291,403 UART: [afmc] ++
14,291,986 UART: [afmc] CDI.KEYID = 6
14,292,903 UART: [afmc] SUBJECT.KEYID = 7
14,294,065 UART: [afmc] AUTHORITY.KEYID = 5
16,820,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,546,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,547,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,563,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,579,765 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,595,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,617,349 UART: [afmc] --
18,620,950 UART: [cold-reset] --
18,625,058 UART: [state] Locking Datavault
18,630,353 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,008 UART: [state] Locking ICCM
18,633,245 UART: [exit] Launching FMC @ 0x40000130
18,641,651 UART:
18,641,889 UART: Running Caliptra FMC ...
18,642,990 UART:
18,643,154 UART: [state] CFI Enabled
18,704,860 UART: [fht] FMC Alias Private Key: 7
20,469,234 UART: [art] Extend RT PCRs Done
20,470,455 UART: [art] Lock RT PCRs Done
20,472,324 UART: [art] Populate DV Done
20,478,057 UART: [fht] FMC Alias Private Key: 7
20,479,704 UART: [art] Derive CDI
20,480,517 UART: [art] Store in in slot 0x4
20,537,770 UART: [art] Derive Key Pair
20,538,790 UART: [art] Store priv key in slot 0x5
23,001,808 UART: [art] Derive Key Pair - Done
23,014,917 UART: [art] Signing Cert with AUTHO
23,016,215 UART: RITY.KEYID = 7
24,727,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,059 UART: [art] PUB.X = DAC6810675D5C33B14E8CED1573A0C1CD9E66D31E249DFCE2977ED2998545016081E245D956B7136561376B38699B605
24,736,317 UART: [art] PUB.Y = 670CDA5149E47ABC6B5417AE06AE17B2E1B402F58D9B000176741E90CE12CF54771CDBABC4D900F21D668D1E3B573450
24,743,503 UART: [art] SIG.R = CDCC25256D52D6FF47375A1A67A460B6DC35077E1B0B0B69AE1CA83DFEA8209A93F77065BB984B1ACAE7034382B1B718
24,750,894 UART: [art] SIG.S = 1290B290247918DD09E3558BBC9536A1225214ED8DF32FACDBCBF5E5DB9CDDE6C1FE97ADA5D39D60980DB82D2D6ECC2E
25,729,796 UART: Caliptra RT
25,730,497 UART: [state] CFI Enabled
25,896,480 UART: [rt] RT listening for mailbox commands...
25,898,329 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,928,175 UART: [rt]cmd =0x46504c54, len=4
25,929,734 >>> mbox cmd response data (8 bytes)
25,930,917 UART: [rt] FIPS self test
25,931,880 UART: [kat] ++
25,932,332 UART: [kat] sha1
25,936,791 UART: [kat] SHA2-256
25,938,720 UART: [kat] SHA2-384
25,941,784 UART: [kat] SHA2-512-ACC
25,942,777 UART: Droping operation
25,943,576 UART: Fatal Error: 0x90050003
25,978,723 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,123,485 >>> mbox cmd response: failed
26,124,163 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,268,482 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,051 UART:
190,345 UART: Running Caliptra ROM ...
191,375 UART:
191,533 UART: [state] CFI Enabled
250,464 UART: [state] LifecycleState = Unprovisioned
252,334 UART: [state] DebugLocked = No
254,523 UART: [state] WD Timer not started. Device not locked for debugging
258,416 UART: [kat] SHA2-256
437,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,117 UART: [kat] ++
449,645 UART: [kat] sha1
461,876 UART: [kat] SHA2-256
464,942 UART: [kat] SHA2-384
470,589 UART: [kat] SHA2-512-ACC
473,576 UART: [kat] ECC-384
2,929,678 UART: [kat] HMAC-384Kdf
2,955,574 UART: [kat] LMS
3,484,996 UART: [kat] --
3,490,114 UART: [cold-reset] ++
3,491,956 UART: [fht] FHT @ 0x50003400
3,504,235 UART: [idev] ++
3,504,809 UART: [idev] CDI.KEYID = 6
3,505,718 UART: [idev] SUBJECT.KEYID = 7
3,506,935 UART: [idev] UDS.KEYID = 0
3,508,452 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,653,037 UART: [idev] Erasing UDS.KEYID = 0
6,013,013 UART: [idev] Sha1 KeyId Algorithm
6,035,093 UART: [idev] --
6,039,778 UART: [ldev] ++
6,040,368 UART: [ldev] CDI.KEYID = 6
6,041,253 UART: [ldev] SUBJECT.KEYID = 5
6,042,359 UART: [ldev] AUTHORITY.KEYID = 7
6,043,705 UART: [ldev] FE.KEYID = 1
6,085,164 UART: [ldev] Erasing FE.KEYID = 1
8,586,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,026 UART: [ldev] --
10,398,590 UART: [fwproc] Wait for Commands...
10,401,495 UART: [fwproc] Recv command 0x46574c44
10,403,595 UART: [fwproc] Recv'd Img size: 114940 bytes
13,810,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,885 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,282,112 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,361,547 ready_for_fw is high
3,362,019 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,066,919 >>> mbox cmd response: success
18,364,601 UART:
18,364,997 UART: Running Caliptra FMC ...
18,366,118 UART:
18,366,273 UART: [state] CFI Enabled
18,431,503 UART: [fht] FMC Alias Private Key: 7
20,194,863 UART: [art] Extend RT PCRs Done
20,196,086 UART: [art] Lock RT PCRs Done
20,197,578 UART: [art] Populate DV Done
20,202,952 UART: [fht] FMC Alias Private Key: 7
20,204,478 UART: [art] Derive CDI
20,205,218 UART: [art] Store in in slot 0x4
20,263,989 UART: [art] Derive Key Pair
20,264,991 UART: [art] Store priv key in slot 0x5
22,727,925 UART: [art] Derive Key Pair - Done
22,740,606 UART: [art] Signing Cert with AUTHO
22,741,904 UART: RITY.KEYID = 7
24,453,810 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,315 UART: [art] PUB.X = 08B2C0CC7A21C20ABA4821C97B6708D58253AFEAEDF0EE08CD44D8C03E274C911CE0844B6C2B5832049B92F42AE5415D
24,462,571 UART: [art] PUB.Y = 705F3017B85EC77DEDDE1386D6F5933B6AE410BE02BCCC7068A9AF1AD2F43BBA3E34D2F6836E2D5C922E58AE82A7264D
24,469,883 UART: [art] SIG.R = F2C6655F2272D1867C7910F94D1B9D557DFE029AC10E77E89030BF1B12C547EDC33484754B84696C650DB33017C4142C
24,477,225 UART: [art] SIG.S = B265599FC1760A271F45A4BEB2983EDEA5D9D64FB7D4E92D9917A894CB38A5BB9AC10B377F72BB5EA62922D95D8C98DF
25,456,464 UART: Caliptra RT
25,457,180 UART: [state] CFI Enabled
25,622,942 UART: [rt] RT listening for mailbox commands...
25,624,796 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,414 UART: [rt]cmd =0x46504c54, len=4
25,656,081 >>> mbox cmd response data (8 bytes)
25,657,033 UART: [rt] FIPS self test
25,657,983 UART: [kat] ++
25,658,434 UART: [kat] sha1
25,662,659 UART: [kat] SHA2-256
25,664,590 UART: [kat] SHA2-384
25,667,736 UART: [kat] SHA2-512-ACC
25,668,712 UART: Droping operation
25,669,517 UART: Fatal Error: 0x90050003
25,704,602 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,848,952 >>> mbox cmd response: failed
25,849,583 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,993,870 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,371,032 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,088,737 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,639 UART:
192,994 UART: Running Caliptra ROM ...
194,197 UART:
603,934 UART: [state] CFI Enabled
620,468 UART: [state] LifecycleState = Unprovisioned
622,280 UART: [state] DebugLocked = No
623,812 UART: [state] WD Timer not started. Device not locked for debugging
628,211 UART: [kat] SHA2-256
807,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,918 UART: [kat] ++
819,452 UART: [kat] sha1
829,694 UART: [kat] SHA2-256
832,700 UART: [kat] SHA2-384
839,047 UART: [kat] SHA2-512-ACC
841,983 UART: [kat] ECC-384
3,284,755 UART: [kat] HMAC-384Kdf
3,298,272 UART: [kat] LMS
3,827,770 UART: [kat] --
3,833,470 UART: [cold-reset] ++
3,834,348 UART: [fht] FHT @ 0x50003400
3,846,070 UART: [idev] ++
3,846,677 UART: [idev] CDI.KEYID = 6
3,847,568 UART: [idev] SUBJECT.KEYID = 7
3,848,750 UART: [idev] UDS.KEYID = 0
3,849,684 ready_for_fw is high
3,849,886 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,994,090 UART: [idev] Erasing UDS.KEYID = 0
6,320,420 UART: [idev] Sha1 KeyId Algorithm
6,343,442 UART: [idev] --
6,347,984 UART: [ldev] ++
6,348,553 UART: [ldev] CDI.KEYID = 6
6,349,465 UART: [ldev] SUBJECT.KEYID = 5
6,350,626 UART: [ldev] AUTHORITY.KEYID = 7
6,351,862 UART: [ldev] FE.KEYID = 1
6,362,940 UART: [ldev] Erasing FE.KEYID = 1
8,835,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,167 UART: [ldev] --
10,626,993 UART: [fwproc] Wait for Commands...
10,628,823 UART: [fwproc] Recv command 0x46574c44
10,630,914 UART: [fwproc] Recv'd Img size: 114940 bytes
14,039,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,184,877 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,505,306 >>> mbox cmd response: success
14,509,043 UART: [afmc] ++
14,509,627 UART: [afmc] CDI.KEYID = 6
14,510,511 UART: [afmc] SUBJECT.KEYID = 7
14,511,723 UART: [afmc] AUTHORITY.KEYID = 5
17,008,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,501 UART: [afmc] --
18,804,917 UART: [cold-reset] --
18,808,997 UART: [state] Locking Datavault
18,815,920 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,621 UART: [state] Locking ICCM
18,818,961 UART: [exit] Launching FMC @ 0x40000130
18,827,415 UART:
18,827,659 UART: Running Caliptra FMC ...
18,828,766 UART:
18,828,926 UART: [state] CFI Enabled
18,836,831 UART: [fht] FMC Alias Private Key: 7
20,593,703 UART: [art] Extend RT PCRs Done
20,594,929 UART: [art] Lock RT PCRs Done
20,596,637 UART: [art] Populate DV Done
20,602,212 UART: [fht] FMC Alias Private Key: 7
20,603,859 UART: [art] Derive CDI
20,604,597 UART: [art] Store in in slot 0x4
20,647,194 UART: [art] Derive Key Pair
20,648,238 UART: [art] Store priv key in slot 0x5
23,074,940 UART: [art] Derive Key Pair - Done
23,088,154 UART: [art] Signing Cert with AUTHO
23,089,468 UART: RITY.KEYID = 7
24,795,319 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,820 UART: [art] PUB.X = DD53A0CF356715AA6EEF3EC462C06B51EE2844429A266F55C98FB3B25E9B6AF3EC85F5EA09E63EABC69A56BF85E81766
24,804,168 UART: [art] PUB.Y = 4BFF176098DBFA57BC836133C9CBE11A7F9D772522768C6E3F90CE00C47DBCC56FE135FDECB77BC69EF46A76533E63E0
24,811,421 UART: [art] SIG.R = 0B4E0991DD0A5584FA339F137886A0092C84A6F55865872D65AC37B54102C02D967B0759326B14A75F45E6C2B9A9517A
24,818,773 UART: [art] SIG.S = C0820AC909B04B3339AA8F3E9054123FA6FF960B371E90831A07CB45847196F485D8E4D5A6034AB05B19C586DEEF4C3E
25,798,019 UART: Caliptra RT
25,798,718 UART: [state] CFI Enabled
25,916,025 UART: [rt] RT listening for mailbox commands...
25,918,067 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,947,825 UART: [rt]cmd =0x46504c54, len=4
25,949,465 >>> mbox cmd response data (8 bytes)
25,950,567 UART: [rt] FIPS self test
25,951,514 UART: [kat] ++
25,951,958 UART: [kat] sha1
25,956,193 UART: [kat] SHA2-256
25,958,121 UART: [kat] SHA2-384
25,961,137 UART: [kat] SHA2-512-ACC
25,962,130 UART: Droping operation
25,962,899 UART: Fatal Error: 0x90050003
25,998,212 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,142,449 >>> mbox cmd response: failed
26,143,034 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,287,306 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,041 UART:
190,448 UART: Running Caliptra ROM ...
191,467 UART:
14,236,472 UART: [state] CFI Enabled
14,248,105 UART: [state] LifecycleState = Unprovisioned
14,249,965 UART: [state] DebugLocked = No
14,251,700 UART: [state] WD Timer not started. Device not locked for debugging
14,256,137 UART: [kat] SHA2-256
14,435,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,446,864 UART: [kat] ++
14,447,318 UART: [kat] sha1
14,459,080 UART: [kat] SHA2-256
14,462,101 UART: [kat] SHA2-384
14,469,003 UART: [kat] SHA2-512-ACC
14,471,999 UART: [kat] ECC-384
16,915,741 UART: [kat] HMAC-384Kdf
16,927,743 UART: [kat] LMS
17,457,273 UART: [kat] --
17,460,558 UART: [cold-reset] ++
17,461,627 UART: [fht] FHT @ 0x50003400
17,473,683 UART: [idev] ++
17,474,277 UART: [idev] CDI.KEYID = 6
17,475,164 UART: [idev] SUBJECT.KEYID = 7
17,476,374 UART: [idev] UDS.KEYID = 0
17,477,902 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,622,145 UART: [idev] Erasing UDS.KEYID = 0
19,947,530 UART: [idev] Sha1 KeyId Algorithm
19,971,536 UART: [idev] --
19,974,592 UART: [ldev] ++
19,975,172 UART: [ldev] CDI.KEYID = 6
19,976,084 UART: [ldev] SUBJECT.KEYID = 5
19,977,245 UART: [ldev] AUTHORITY.KEYID = 7
19,978,527 UART: [ldev] FE.KEYID = 1
19,989,874 UART: [ldev] Erasing FE.KEYID = 1
22,463,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,182,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,198,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,214,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,229,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,250,616 UART: [ldev] --
24,255,775 UART: [fwproc] Wait for Commands...
24,258,679 UART: [fwproc] Recv command 0x46574c44
24,260,721 UART: [fwproc] Recv'd Img size: 114940 bytes
27,671,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,747,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,815,982 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,135,659 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,695,588 ready_for_fw is high
3,695,994 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,281,338 >>> mbox cmd response: success
18,531,641 UART:
18,532,054 UART: Running Caliptra FMC ...
18,533,179 UART:
18,533,341 UART: [state] CFI Enabled
18,541,078 UART: [fht] FMC Alias Private Key: 7
20,298,566 UART: [art] Extend RT PCRs Done
20,299,797 UART: [art] Lock RT PCRs Done
20,301,274 UART: [art] Populate DV Done
20,306,596 UART: [fht] FMC Alias Private Key: 7
20,308,251 UART: [art] Derive CDI
20,309,072 UART: [art] Store in in slot 0x4
20,351,300 UART: [art] Derive Key Pair
20,352,351 UART: [art] Store priv key in slot 0x5
22,779,541 UART: [art] Derive Key Pair - Done
22,792,474 UART: [art] Signing Cert with AUTHO
22,793,808 UART: RITY.KEYID = 7
24,499,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,837 UART: [art] PUB.X = C5C1845B58DDDD594F9972CAFCEBF341049EE86034168752B6652C084B7308C3CA2C853892471F5FC624F3C337726CEF
24,508,101 UART: [art] PUB.Y = 7AFEA066BDC6604FBE56C852964A5920349C8E23940FDD76577351879AA79A229AB79A6B1ECC6A5D55ED66EB2A70B423
24,515,363 UART: [art] SIG.R = 64ADF8D6BC289D90101439D7255578BB68EB3A16CE64D8C23B64A4908669FB16C8D38E94448671E0FC14863E6D69FEBA
24,522,762 UART: [art] SIG.S = A18CEAE98E26529A32A0FE1956220B1EFEF9B6F560E307040B5F9DC5855C3056C20B01F7AC30D4177899EEDDDED9D204
25,501,628 UART: Caliptra RT
25,502,338 UART: [state] CFI Enabled
25,619,032 UART: [rt] RT listening for mailbox commands...
25,620,891 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,650,542 UART: [rt]cmd =0x46504c54, len=4
25,652,168 >>> mbox cmd response data (8 bytes)
25,653,438 UART: [rt] FIPS self test
25,654,377 UART: [kat] ++
25,654,829 UART: [kat] sha1
25,659,390 UART: [kat] SHA2-256
25,661,285 UART: [kat] SHA2-384
25,664,141 UART: [kat] SHA2-512-ACC
25,665,184 UART: Droping operation
25,666,042 UART: Fatal Error: 0x90050003
25,701,421 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,845,827 >>> mbox cmd response: failed
25,846,499 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,990,675 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
17,630,529 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,223,633 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,134 UART:
192,505 UART: Running Caliptra ROM ...
193,826 UART:
193,984 UART: [state] CFI Enabled
262,385 UART: [state] LifecycleState = Unprovisioned
264,796 UART: [state] DebugLocked = No
266,336 UART: [state] WD Timer not started. Device not locked for debugging
270,731 UART: [kat] SHA2-256
460,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,364 UART: [kat] ++
471,817 UART: [kat] sha1
482,652 UART: [kat] SHA2-256
485,666 UART: [kat] SHA2-384
492,238 UART: [kat] SHA2-512-ACC
494,826 UART: [kat] ECC-384
2,948,689 UART: [kat] HMAC-384Kdf
2,970,870 UART: [kat] LMS
3,502,646 UART: [kat] --
3,506,930 UART: [cold-reset] ++
3,508,867 UART: [fht] FHT @ 0x50003400
3,521,432 UART: [idev] ++
3,522,144 UART: [idev] CDI.KEYID = 6
3,523,025 UART: [idev] SUBJECT.KEYID = 7
3,524,278 UART: [idev] UDS.KEYID = 0
3,525,185 ready_for_fw is high
3,525,393 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,993 UART: [idev] Erasing UDS.KEYID = 0
6,031,612 UART: [idev] Sha1 KeyId Algorithm
6,052,822 UART: [idev] --
6,058,531 UART: [ldev] ++
6,059,227 UART: [ldev] CDI.KEYID = 6
6,060,146 UART: [ldev] SUBJECT.KEYID = 5
6,061,310 UART: [ldev] AUTHORITY.KEYID = 7
6,062,548 UART: [ldev] FE.KEYID = 1
6,099,605 UART: [ldev] Erasing FE.KEYID = 1
8,607,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,579 UART: [ldev] --
10,413,822 UART: [fwproc] Wait for Commands...
10,415,434 UART: [fwproc] Recv command 0x46574c44
10,417,750 UART: [fwproc] Recv'd Img size: 114940 bytes
13,870,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,602 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,607,306 >>> mbox cmd response: success
14,611,229 UART: [afmc] ++
14,611,933 UART: [afmc] CDI.KEYID = 6
14,613,118 UART: [afmc] SUBJECT.KEYID = 7
14,614,601 UART: [afmc] AUTHORITY.KEYID = 5
17,146,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,322 UART: [afmc] --
18,946,302 UART: [cold-reset] --
18,950,056 UART: [state] Locking Datavault
18,956,821 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,007 UART: [state] Locking ICCM
18,961,760 UART: [exit] Launching FMC @ 0x40000130
18,970,429 UART:
18,970,661 UART: Running Caliptra FMC ...
18,971,764 UART:
18,971,918 UART: [state] CFI Enabled
19,030,827 UART: [fht] FMC Alias Private Key: 7
20,795,634 UART: [art] Extend RT PCRs Done
20,796,859 UART: [art] Lock RT PCRs Done
20,798,511 UART: [art] Populate DV Done
20,803,975 UART: [fht] FMC Alias Private Key: 7
20,805,568 UART: [art] Derive CDI
20,806,385 UART: [art] Store in in slot 0x4
20,864,950 UART: [art] Derive Key Pair
20,865,990 UART: [art] Store priv key in slot 0x5
23,328,659 UART: [art] Derive Key Pair - Done
23,341,385 UART: [art] Signing Cert with AUTHO
23,342,691 UART: RITY.KEYID = 7
25,054,232 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,744 UART: [art] PUB.X = A19B2E2FAAEB6FACDCFBDABAE5C81C098BEC8658AFDC02576C8BC3557418F9FCD385D8A3B588AB59768A45B216587C81
25,063,029 UART: [art] PUB.Y = 5A87B337085529ECB31CD674453680E88D448998E88E0417FCAFE266B78B5E7055C660895A563F8FEAE6CF8CBD23DA42
25,070,298 UART: [art] SIG.R = A351D82F768CEDEB5D7223E7B2772A9E097AF43C629A3E550ED7049E1CE33DF40F57D9B0E51EB4F5A0B7C85A91B15EAA
25,077,723 UART: [art] SIG.S = 3F6A3E695E8587536B6D23FD7D40EB72CFA5DC715B1946E75BADAE21410B79B8B01E0A117A8BD52DA99881C36C3A3E21
26,057,245 UART: Caliptra RT
26,057,948 UART: [state] CFI Enabled
26,222,469 UART: [rt] RT listening for mailbox commands...
26,224,323 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,254,175 UART: [rt]cmd =0x46504c54, len=4
26,255,759 >>> mbox cmd response data (8 bytes)
26,257,116 UART: [rt] FIPS self test
26,258,059 UART: [kat] ++
26,258,513 UART: [kat] sha1
26,263,073 UART: [kat] SHA2-256
26,264,949 UART: [kat] SHA2-384
26,268,046 UART: [kat] SHA2-512-ACC
26,269,039 UART: Droping operation
26,269,976 UART: Fatal Error: 0x90050003
26,305,295 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,449,711 >>> mbox cmd response: failed
26,450,331 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,594,521 >>> mbox cmd response: failed
Initializing fuses
1,129 writing to cptra_bootfsm_go
190,232 UART:
190,521 UART: Running Caliptra ROM ...
191,549 UART:
191,689 UART: [state] CFI Enabled
254,514 UART: [state] LifecycleState = Unprovisioned
256,928 UART: [state] DebugLocked = No
259,576 UART: [state] WD Timer not started. Device not locked for debugging
265,059 UART: [kat] SHA2-256
454,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,689 UART: [kat] ++
466,140 UART: [kat] sha1
476,664 UART: [kat] SHA2-256
479,674 UART: [kat] SHA2-384
484,856 UART: [kat] SHA2-512-ACC
487,465 UART: [kat] ECC-384
2,932,062 UART: [kat] HMAC-384Kdf
2,956,765 UART: [kat] LMS
3,488,572 UART: [kat] --
3,494,088 UART: [cold-reset] ++
3,494,999 UART: [fht] FHT @ 0x50003400
3,506,636 UART: [idev] ++
3,507,322 UART: [idev] CDI.KEYID = 6
3,508,286 UART: [idev] SUBJECT.KEYID = 7
3,509,499 UART: [idev] UDS.KEYID = 0
3,511,015 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,655,509 UART: [idev] Erasing UDS.KEYID = 0
6,014,057 UART: [idev] Sha1 KeyId Algorithm
6,036,238 UART: [idev] --
6,042,179 UART: [ldev] ++
6,042,873 UART: [ldev] CDI.KEYID = 6
6,043,759 UART: [ldev] SUBJECT.KEYID = 5
6,044,972 UART: [ldev] AUTHORITY.KEYID = 7
6,046,153 UART: [ldev] FE.KEYID = 1
6,086,108 UART: [ldev] Erasing FE.KEYID = 1
8,591,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,073 UART: [ldev] --
10,396,963 UART: [fwproc] Wait for Commands...
10,399,924 UART: [fwproc] Recv command 0x46574c44
10,402,237 UART: [fwproc] Recv'd Img size: 114940 bytes
13,859,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,456 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,602,415 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,440,174 ready_for_fw is high
3,440,625 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,750,540 >>> mbox cmd response: success
19,050,123 UART:
19,050,525 UART: Running Caliptra FMC ...
19,051,665 UART:
19,051,821 UART: [state] CFI Enabled
19,119,063 UART: [fht] FMC Alias Private Key: 7
20,883,385 UART: [art] Extend RT PCRs Done
20,884,616 UART: [art] Lock RT PCRs Done
20,886,105 UART: [art] Populate DV Done
20,891,493 UART: [fht] FMC Alias Private Key: 7
20,893,078 UART: [art] Derive CDI
20,893,871 UART: [art] Store in in slot 0x4
20,953,461 UART: [art] Derive Key Pair
20,954,456 UART: [art] Store priv key in slot 0x5
23,417,345 UART: [art] Derive Key Pair - Done
23,430,404 UART: [art] Signing Cert with AUTHO
23,431,715 UART: RITY.KEYID = 7
25,143,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,538 UART: [art] PUB.X = C8073AB888E8290E7A6AF6D2F5E4C1CA3533133F8D1C553A0B2B68BECA29585A9B05B564BACA01705D0F9C1D2BCFE173
25,151,752 UART: [art] PUB.Y = CB09C49F6ACA142DCC0CA308A10519110D4C35AD3B0A55832887CFB3A048B2D8C3928F806628F4357C567159E6D15B37
25,158,998 UART: [art] SIG.R = CE4398CAFFC90F591B6E60562194505CB0435577CF0638967BA3FDFA1D116F580125DF3AE9AF7D0D71767A6E18886E53
25,166,400 UART: [art] SIG.S = BA096DE8B721A41BEB1891F460DA34D21B2CFAC7C21B26B176096294F6B02B1BBAC0E299BC9889D9CF99E1C22A4C39F6
26,145,317 UART: Caliptra RT
26,146,013 UART: [state] CFI Enabled
26,311,030 UART: [rt] RT listening for mailbox commands...
26,312,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,342,623 UART: [rt]cmd =0x46504c54, len=4
26,344,303 >>> mbox cmd response data (8 bytes)
26,345,206 UART: [rt] FIPS self test
26,346,153 UART: [kat] ++
26,346,602 UART: [kat] sha1
26,351,055 UART: [kat] SHA2-256
26,352,985 UART: [kat] SHA2-384
26,355,975 UART: [kat] SHA2-512-ACC
26,356,971 UART: Droping operation
26,357,907 UART: Fatal Error: 0x90050003
26,393,114 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,537,529 >>> mbox cmd response: failed
26,538,165 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,682,446 >>> mbox cmd response: failed
Initializing fuses
925 writing to cptra_bootfsm_go
3,423,151 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,735,583 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,416 UART:
192,794 UART: Running Caliptra ROM ...
193,957 UART:
603,654 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,701 UART: [state] DebugLocked = No
621,548 UART: [state] WD Timer not started. Device not locked for debugging
626,124 UART: [kat] SHA2-256
815,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,757 UART: [kat] ++
827,281 UART: [kat] sha1
840,143 UART: [kat] SHA2-256
843,155 UART: [kat] SHA2-384
849,857 UART: [kat] SHA2-512-ACC
852,389 UART: [kat] ECC-384
3,292,431 UART: [kat] HMAC-384Kdf
3,306,220 UART: [kat] LMS
3,838,042 UART: [kat] --
3,842,330 UART: [cold-reset] ++
3,844,898 UART: [fht] FHT @ 0x50003400
3,857,299 UART: [idev] ++
3,858,007 UART: [idev] CDI.KEYID = 6
3,858,937 UART: [idev] SUBJECT.KEYID = 7
3,860,184 UART: [idev] UDS.KEYID = 0
3,861,112 ready_for_fw is high
3,861,341 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,005,890 UART: [idev] Erasing UDS.KEYID = 0
6,337,111 UART: [idev] Sha1 KeyId Algorithm
6,359,319 UART: [idev] --
6,364,818 UART: [ldev] ++
6,365,520 UART: [ldev] CDI.KEYID = 6
6,366,445 UART: [ldev] SUBJECT.KEYID = 5
6,367,605 UART: [ldev] AUTHORITY.KEYID = 7
6,368,778 UART: [ldev] FE.KEYID = 1
6,377,858 UART: [ldev] Erasing FE.KEYID = 1
8,856,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,101 UART: [ldev] --
10,649,011 UART: [fwproc] Wait for Commands...
10,651,434 UART: [fwproc] Recv command 0x46574c44
10,653,696 UART: [fwproc] Recv'd Img size: 114940 bytes
14,110,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,953 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,849,894 >>> mbox cmd response: success
14,853,180 UART: [afmc] ++
14,853,881 UART: [afmc] CDI.KEYID = 6
14,855,053 UART: [afmc] SUBJECT.KEYID = 7
14,856,538 UART: [afmc] AUTHORITY.KEYID = 5
17,361,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,498 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,482 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,483 UART: [afmc] --
19,158,188 UART: [cold-reset] --
19,162,424 UART: [state] Locking Datavault
19,168,587 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,743 UART: [state] Locking ICCM
19,172,897 UART: [exit] Launching FMC @ 0x40000130
19,181,572 UART:
19,181,847 UART: Running Caliptra FMC ...
19,182,959 UART:
19,183,114 UART: [state] CFI Enabled
19,190,839 UART: [fht] FMC Alias Private Key: 7
20,948,073 UART: [art] Extend RT PCRs Done
20,949,279 UART: [art] Lock RT PCRs Done
20,950,738 UART: [art] Populate DV Done
20,956,475 UART: [fht] FMC Alias Private Key: 7
20,958,069 UART: [art] Derive CDI
20,958,886 UART: [art] Store in in slot 0x4
21,001,426 UART: [art] Derive Key Pair
21,002,434 UART: [art] Store priv key in slot 0x5
23,428,940 UART: [art] Derive Key Pair - Done
23,441,681 UART: [art] Signing Cert with AUTHO
23,442,989 UART: RITY.KEYID = 7
25,148,965 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,455 UART: [art] PUB.X = 846330329296459C12DDE82DE607DC7CA34179710BD093D2CB5EDD364293925E9598E79C7D8110B2E35FE5D10F10D448
25,157,700 UART: [art] PUB.Y = AF249AD2BE070FA8F3F0DF1EFF4B969E216DE8811BED1DB3BDE44A371AF3823AC6F9ADA3A82989CE9A289D66230F8352
25,164,984 UART: [art] SIG.R = 19C01BCF65759CB3AD0246A8B071FA4508CB4B58662CE5C9F3337770B9147D9D7ADD090C4FE1CCEDD1219EF90F7C6F75
25,172,373 UART: [art] SIG.S = 844B098799CCBCBBC914E6F8835CAD2CD57CB4C0E5E026323C388FF98EF75FC181940224E6DF40679438E1D8BAF4E664
26,151,751 UART: Caliptra RT
26,152,467 UART: [state] CFI Enabled
26,269,523 UART: [rt] RT listening for mailbox commands...
26,271,372 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,878 UART: [rt]cmd =0x46504c54, len=4
26,302,325 >>> mbox cmd response data (8 bytes)
26,303,552 UART: [rt] FIPS self test
26,304,499 UART: [kat] ++
26,304,950 UART: [kat] sha1
26,309,420 UART: [kat] SHA2-256
26,311,350 UART: [kat] SHA2-384
26,314,342 UART: [kat] SHA2-512-ACC
26,315,328 UART: Droping operation
26,316,205 UART: Fatal Error: 0x90050003
26,351,403 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,495,799 >>> mbox cmd response: failed
26,496,477 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,640,742 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
190,064 UART:
190,349 UART: Running Caliptra ROM ...
191,371 UART:
13,890,359 UART: [state] CFI Enabled
13,902,728 UART: [state] LifecycleState = Unprovisioned
13,905,178 UART: [state] DebugLocked = No
13,907,245 UART: [state] WD Timer not started. Device not locked for debugging
13,911,257 UART: [kat] SHA2-256
14,101,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,111,933 UART: [kat] ++
14,112,442 UART: [kat] sha1
14,124,464 UART: [kat] SHA2-256
14,127,474 UART: [kat] SHA2-384
14,133,841 UART: [kat] SHA2-512-ACC
14,136,405 UART: [kat] ECC-384
16,578,144 UART: [kat] HMAC-384Kdf
16,591,983 UART: [kat] LMS
17,123,803 UART: [kat] --
17,128,279 UART: [cold-reset] ++
17,130,052 UART: [fht] FHT @ 0x50003400
17,141,404 UART: [idev] ++
17,142,148 UART: [idev] CDI.KEYID = 6
17,143,027 UART: [idev] SUBJECT.KEYID = 7
17,144,294 UART: [idev] UDS.KEYID = 0
17,145,816 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,290,091 UART: [idev] Erasing UDS.KEYID = 0
19,617,955 UART: [idev] Sha1 KeyId Algorithm
19,641,462 UART: [idev] --
19,646,367 UART: [ldev] ++
19,647,042 UART: [ldev] CDI.KEYID = 6
19,647,979 UART: [ldev] SUBJECT.KEYID = 5
19,649,130 UART: [ldev] AUTHORITY.KEYID = 7
19,650,360 UART: [ldev] FE.KEYID = 1
19,663,227 UART: [ldev] Erasing FE.KEYID = 1
22,141,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,863,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,879,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,894,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,909,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,931,032 UART: [ldev] --
23,937,002 UART: [fwproc] Wait for Commands...
23,939,965 UART: [fwproc] Recv command 0x46574c44
23,942,286 UART: [fwproc] Recv'd Img size: 114940 bytes
27,399,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,475,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,591,823 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,137,046 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,757,437 ready_for_fw is high
3,757,846 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,969,377 >>> mbox cmd response: success
19,226,391 UART:
19,226,799 UART: Running Caliptra FMC ...
19,227,981 UART:
19,228,142 UART: [state] CFI Enabled
19,235,814 UART: [fht] FMC Alias Private Key: 7
20,993,193 UART: [art] Extend RT PCRs Done
20,994,423 UART: [art] Lock RT PCRs Done
20,995,996 UART: [art] Populate DV Done
21,001,368 UART: [fht] FMC Alias Private Key: 7
21,002,982 UART: [art] Derive CDI
21,003,806 UART: [art] Store in in slot 0x4
21,046,366 UART: [art] Derive Key Pair
21,047,399 UART: [art] Store priv key in slot 0x5
23,473,459 UART: [art] Derive Key Pair - Done
23,486,346 UART: [art] Signing Cert with AUTHO
23,487,646 UART: RITY.KEYID = 7
25,193,187 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,700 UART: [art] PUB.X = BBE7499DBCB6444AD25F2635BDABAC1427749098D496A6D31ACAAB484E8F1F0D188C41A6FFEA29F6607D49DFAC72776D
25,202,016 UART: [art] PUB.Y = FAB75550AB38C118A061ECF65B3715A063E8CE9035B7611BB8537AA1E948A4C6867B590F33F7A16B3EEBA39439833C54
25,209,270 UART: [art] SIG.R = B44FA26EBCBB8A3CCE0F4EC2BE31224D16EC0266174DD88C0AA262AF597029CA6E725C209389436ACBAF692DEC53F4BC
25,216,672 UART: [art] SIG.S = CEBFCF50E1FED76AD03BDCD713049F0EE539944AB472B9253917E1CD7CC7C60B536BECBF28D2084E93C42D1F1197AAA9
26,195,273 UART: Caliptra RT
26,195,986 UART: [state] CFI Enabled
26,314,559 UART: [rt] RT listening for mailbox commands...
26,316,404 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,084 UART: [rt]cmd =0x46504c54, len=4
26,347,649 >>> mbox cmd response data (8 bytes)
26,348,648 UART: [rt] FIPS self test
26,349,597 UART: [kat] ++
26,350,056 UART: [kat] sha1
26,354,514 UART: [kat] SHA2-256
26,356,387 UART: [kat] SHA2-384
26,359,235 UART: [kat] SHA2-512-ACC
26,360,240 UART: Droping operation
26,361,061 UART: Fatal Error: 0x90050003
26,396,220 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,540,596 >>> mbox cmd response: failed
26,541,263 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,685,538 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,008,032 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,219,070 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,682 UART: [kat] SHA2-512-ACC
896,583 UART: [kat] ECC-384
902,222 UART: [kat] HMAC-384Kdf
906,910 UART: [kat] LMS
1,475,106 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,079 UART: [fht] Storing FHT @ 0x50003400
1,478,872 UART: [idev] ++
1,479,040 UART: [idev] CDI.KEYID = 6
1,479,400 UART: [idev] SUBJECT.KEYID = 7
1,479,824 UART: [idev] UDS.KEYID = 0
1,480,169 ready_for_fw is high
1,480,169 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,038 UART: [idev] Erasing UDS.KEYID = 0
1,504,620 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,086 UART: [idev] --
1,514,277 UART: [ldev] ++
1,514,445 UART: [ldev] CDI.KEYID = 6
1,514,808 UART: [ldev] SUBJECT.KEYID = 5
1,515,234 UART: [ldev] AUTHORITY.KEYID = 7
1,515,697 UART: [ldev] FE.KEYID = 1
1,520,971 UART: [ldev] Erasing FE.KEYID = 1
1,546,612 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,928 UART: [ldev] --
1,586,355 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 114940 bytes
2,892,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,833 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,958 >>> mbox cmd response: success
3,086,166 UART: [afmc] ++
3,086,334 UART: [afmc] CDI.KEYID = 6
3,086,696 UART: [afmc] SUBJECT.KEYID = 7
3,087,121 UART: [afmc] AUTHORITY.KEYID = 5
3,122,306 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,616 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,009 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,699 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,596 UART: [afmc] --
3,165,580 UART: [cold-reset] --
3,166,436 UART: [state] Locking Datavault
3,167,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,003 UART: [state] Locking ICCM
3,168,609 UART: [exit] Launching FMC @ 0x40000130
3,173,938 UART:
3,173,954 UART: Running Caliptra FMC ...
3,174,362 UART:
3,174,416 UART: [state] CFI Enabled
3,184,591 UART: [fht] FMC Alias Private Key: 7
3,292,054 UART: [art] Extend RT PCRs Done
3,292,482 UART: [art] Lock RT PCRs Done
3,294,238 UART: [art] Populate DV Done
3,302,531 UART: [fht] FMC Alias Private Key: 7
3,303,525 UART: [art] Derive CDI
3,303,805 UART: [art] Store in in slot 0x4
3,389,444 UART: [art] Derive Key Pair
3,389,804 UART: [art] Store priv key in slot 0x5
3,403,312 UART: [art] Derive Key Pair - Done
3,418,093 UART: [art] Signing Cert with AUTHO
3,418,573 UART: RITY.KEYID = 7
3,433,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,542 UART: [art] PUB.X = D786E9B91CB005B7353DFDEAA912AC223D2709E9F255E1312A2EA3B2CC0E99507E47D90810999E31240E129A2D8C4AC3
3,441,303 UART: [art] PUB.Y = 5C810CD62EA1E40E0166A230EA383E5DADDB7C6B1FB1640588DFC69C0A0ED2874FC8C944CB6A17E762E8E16D188E4028
3,448,249 UART: [art] SIG.R = 8AD11144F791B69B37343379C9C54DFB69C4A50E06F69BB722CAC200A54D3DDB9434B6C62AAF463F041E939CD3C488A1
3,454,996 UART: [art] SIG.S = 719A96DA8F08874CDF8A8F1536C27178682D8DF0056EEB44DEA76AB4939146FB83E4744433836A4D6515221B152CDDE3
3,479,101 UART: Caliptra RT
3,479,354 UART: [state] CFI Enabled
3,587,167 UART: [rt] RT listening for mailbox commands...
3,587,830 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,553 UART: [rt]cmd =0x46504c54, len=4
3,618,781 >>> mbox cmd response data (8 bytes)
3,619,082 UART: [rt] FIPS self test
3,619,410 UART: [kat] ++
3,619,562 UART: [kat] sha1
3,623,876 UART: [kat] SHA2-256
3,625,898 UART: [kat] SHA2-384
3,628,989 UART: [kat] SHA2-512-ACC
3,630,472 UART: Droping operation
3,631,063 UART: Fatal Error: 0x90050003
3,632,602 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,607 >>> mbox cmd response: failed
3,632,607 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,755 UART: [kat] SHA2-256
881,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,801 UART: [kat] ++
885,953 UART: [kat] sha1
890,081 UART: [kat] SHA2-256
892,019 UART: [kat] SHA2-384
894,606 UART: [kat] SHA2-512-ACC
896,507 UART: [kat] ECC-384
901,784 UART: [kat] HMAC-384Kdf
906,340 UART: [kat] LMS
1,474,536 UART: [kat] --
1,475,531 UART: [cold-reset] ++
1,476,077 UART: [fht] Storing FHT @ 0x50003400
1,478,886 UART: [idev] ++
1,479,054 UART: [idev] CDI.KEYID = 6
1,479,414 UART: [idev] SUBJECT.KEYID = 7
1,479,838 UART: [idev] UDS.KEYID = 0
1,480,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,514 UART: [idev] Erasing UDS.KEYID = 0
1,503,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,144 UART: [idev] --
1,513,181 UART: [ldev] ++
1,513,349 UART: [ldev] CDI.KEYID = 6
1,513,712 UART: [ldev] SUBJECT.KEYID = 5
1,514,138 UART: [ldev] AUTHORITY.KEYID = 7
1,514,601 UART: [ldev] FE.KEYID = 1
1,519,763 UART: [ldev] Erasing FE.KEYID = 1
1,544,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,802 UART: [ldev] --
1,584,145 UART: [fwproc] Waiting for Commands...
1,584,870 UART: [fwproc] Received command 0x46574c44
1,585,661 UART: [fwproc] Received Image of size 114940 bytes
2,890,109 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,946,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,083,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,219 ready_for_fw is high
1,362,219 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,100 >>> mbox cmd response: success
2,996,198 UART:
2,996,214 UART: Running Caliptra FMC ...
2,996,622 UART:
2,996,676 UART: [state] CFI Enabled
3,007,069 UART: [fht] FMC Alias Private Key: 7
3,115,144 UART: [art] Extend RT PCRs Done
3,115,572 UART: [art] Lock RT PCRs Done
3,117,306 UART: [art] Populate DV Done
3,125,343 UART: [fht] FMC Alias Private Key: 7
3,126,337 UART: [art] Derive CDI
3,126,617 UART: [art] Store in in slot 0x4
3,211,880 UART: [art] Derive Key Pair
3,212,240 UART: [art] Store priv key in slot 0x5
3,225,294 UART: [art] Derive Key Pair - Done
3,239,941 UART: [art] Signing Cert with AUTHO
3,240,421 UART: RITY.KEYID = 7
3,255,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,476 UART: [art] PUB.X = 841DBA85368B45A6B16DE5AB7694159C6F8AA4AD020285A3D4E687456D5327CBEFEBA0513ED6C092B425C804EA3175CC
3,263,247 UART: [art] PUB.Y = 2383D53F63FDB87AC754F818C2E569C8A2D6B8638C1EF2D2D5B2D4F49E6AF631544AB8BDE6FB0ED0976981D26B40D2F3
3,270,208 UART: [art] SIG.R = ED217A65F20F524D475F21373678C30CB4469EEDBE94BCC52C2664C6D0D690CBF74D3760959EBA14F71CE91DE0713F36
3,276,980 UART: [art] SIG.S = 14D3DBF18E8004D486DE3A3CB09BFB4E832FECC1DB471C0CB1200F2D3CBD54BA0F5FA0A26486863050EF3A377BCEF1EC
3,300,907 UART: Caliptra RT
3,301,160 UART: [state] CFI Enabled
3,409,701 UART: [rt] RT listening for mailbox commands...
3,410,364 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,511 UART: [rt]cmd =0x46504c54, len=4
3,441,469 >>> mbox cmd response data (8 bytes)
3,441,600 UART: [rt] FIPS self test
3,441,928 UART: [kat] ++
3,442,080 UART: [kat] sha1
3,446,092 UART: [kat] SHA2-256
3,448,114 UART: [kat] SHA2-384
3,450,949 UART: [kat] SHA2-512-ACC
3,452,432 UART: Droping operation
3,453,065 UART: Fatal Error: 0x90050003
3,454,604 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,609 >>> mbox cmd response: failed
3,454,609 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,737 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,486 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
903,175 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,780 UART: [cold-reset] ++
1,477,214 UART: [fht] Storing FHT @ 0x50003400
1,480,101 UART: [idev] ++
1,480,269 UART: [idev] CDI.KEYID = 6
1,480,629 UART: [idev] SUBJECT.KEYID = 7
1,481,053 UART: [idev] UDS.KEYID = 0
1,481,398 ready_for_fw is high
1,481,398 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,779 UART: [idev] Erasing UDS.KEYID = 0
1,505,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,673 UART: [idev] --
1,514,722 UART: [ldev] ++
1,514,890 UART: [ldev] CDI.KEYID = 6
1,515,253 UART: [ldev] SUBJECT.KEYID = 5
1,515,679 UART: [ldev] AUTHORITY.KEYID = 7
1,516,142 UART: [ldev] FE.KEYID = 1
1,521,312 UART: [ldev] Erasing FE.KEYID = 1
1,546,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,133 UART: [ldev] --
1,585,486 UART: [fwproc] Waiting for Commands...
1,586,347 UART: [fwproc] Received command 0x46574c44
1,587,138 UART: [fwproc] Received Image of size 114940 bytes
2,890,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,333 >>> mbox cmd response: success
3,085,491 UART: [afmc] ++
3,085,659 UART: [afmc] CDI.KEYID = 6
3,086,021 UART: [afmc] SUBJECT.KEYID = 7
3,086,446 UART: [afmc] AUTHORITY.KEYID = 5
3,121,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,137,881 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,138,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,144,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,150,274 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,155,964 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,163,827 UART: [afmc] --
3,164,883 UART: [cold-reset] --
3,165,747 UART: [state] Locking Datavault
3,166,882 UART: [state] Locking PCR0, PCR1 and PCR31
3,167,486 UART: [state] Locking ICCM
3,168,024 UART: [exit] Launching FMC @ 0x40000130
3,173,353 UART:
3,173,369 UART: Running Caliptra FMC ...
3,173,777 UART:
3,173,920 UART: [state] CFI Enabled
3,184,409 UART: [fht] FMC Alias Private Key: 7
3,291,908 UART: [art] Extend RT PCRs Done
3,292,336 UART: [art] Lock RT PCRs Done
3,293,538 UART: [art] Populate DV Done
3,301,781 UART: [fht] FMC Alias Private Key: 7
3,302,909 UART: [art] Derive CDI
3,303,189 UART: [art] Store in in slot 0x4
3,389,124 UART: [art] Derive Key Pair
3,389,484 UART: [art] Store priv key in slot 0x5
3,402,554 UART: [art] Derive Key Pair - Done
3,417,678 UART: [art] Signing Cert with AUTHO
3,418,158 UART: RITY.KEYID = 7
3,433,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,433,907 UART: [art] PUB.X = 377F46CAD65AC852D19334C161AE1547F65F931093D78D9202D75ED8491CC9A952F09A0A1F2E26988832658B8D2E13C3
3,440,667 UART: [art] PUB.Y = B40A936C3D9BAA50705CFAEEC972A5378183C133029B2947B7EACC78CC768BCE8AE19BAFBA8690834CE5E3723CA0AADC
3,447,633 UART: [art] SIG.R = BE5837D5386C8E4E45A774E7D2714A82A1AC58A468AB549D59372826E9F560F0B2E7125AB7AC75F250FD509D7493694F
3,454,403 UART: [art] SIG.S = B68794C7A103739E8DE81DD2945BD38B22ADD5023110527E41387B76964D1CEBD124E02B3DEB21E55D0F0BB6FB0FF982
3,478,449 UART: Caliptra RT
3,478,794 UART: [state] CFI Enabled
3,587,820 UART: [rt] RT listening for mailbox commands...
3,588,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,462 UART: [rt]cmd =0x46504c54, len=4
3,619,548 >>> mbox cmd response data (8 bytes)
3,619,727 UART: [rt] FIPS self test
3,620,055 UART: [kat] ++
3,620,207 UART: [kat] sha1
3,624,499 UART: [kat] SHA2-256
3,626,521 UART: [kat] SHA2-384
3,629,304 UART: [kat] SHA2-512-ACC
3,630,787 UART: Droping operation
3,631,344 UART: Fatal Error: 0x90050003
3,632,883 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,888 >>> mbox cmd response: failed
3,632,888 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,696 UART: [kat] SHA2-256
892,634 UART: [kat] SHA2-384
895,321 UART: [kat] SHA2-512-ACC
897,222 UART: [kat] ECC-384
902,665 UART: [kat] HMAC-384Kdf
907,295 UART: [kat] LMS
1,475,491 UART: [kat] --
1,476,632 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,479,863 UART: [idev] ++
1,480,031 UART: [idev] CDI.KEYID = 6
1,480,391 UART: [idev] SUBJECT.KEYID = 7
1,480,815 UART: [idev] UDS.KEYID = 0
1,481,160 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,907 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,317 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,522,050 UART: [ldev] Erasing FE.KEYID = 1
1,547,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,789 UART: [ldev] --
1,587,206 UART: [fwproc] Waiting for Commands...
1,587,925 UART: [fwproc] Received command 0x46574c44
1,588,716 UART: [fwproc] Received Image of size 114940 bytes
2,892,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,269 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,968 ready_for_fw is high
1,362,968 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,938,081 >>> mbox cmd response: success
2,999,175 UART:
2,999,191 UART: Running Caliptra FMC ...
2,999,599 UART:
2,999,742 UART: [state] CFI Enabled
3,010,643 UART: [fht] FMC Alias Private Key: 7
3,118,036 UART: [art] Extend RT PCRs Done
3,118,464 UART: [art] Lock RT PCRs Done
3,120,382 UART: [art] Populate DV Done
3,128,283 UART: [fht] FMC Alias Private Key: 7
3,129,261 UART: [art] Derive CDI
3,129,541 UART: [art] Store in in slot 0x4
3,215,132 UART: [art] Derive Key Pair
3,215,492 UART: [art] Store priv key in slot 0x5
3,229,336 UART: [art] Derive Key Pair - Done
3,244,187 UART: [art] Signing Cert with AUTHO
3,244,667 UART: RITY.KEYID = 7
3,259,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,280 UART: [art] PUB.X = 18E4E70999A267481B20021AAEAE83D72CEB4E154823806A01ADCD36CC9CD7B6A569F974293059F463E85B948A8E996F
3,267,043 UART: [art] PUB.Y = 15AC26C498EC34D0EF954DB3F7E36F6FC3F0F1F77E3B5FB5DBAC992069D553F10B7ADE973B3D2C9E1290685FDF00D670
3,273,986 UART: [art] SIG.R = 6FF3F476A0D7F66F0005A2C8F4E8FF932B8059E1ACE171B7472497D26F3CDC9081CEDAD90B6C78384E4722F4BC733B46
3,280,738 UART: [art] SIG.S = 3869DE601EF9A2A722F4B1CE5CB7236FC5E1916924DBAFA7C978C382755B6939B37E8CB9A22D5527F54172076C2539A9
3,304,862 UART: Caliptra RT
3,305,207 UART: [state] CFI Enabled
3,412,421 UART: [rt] RT listening for mailbox commands...
3,413,084 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,857 UART: [rt]cmd =0x46504c54, len=4
3,444,223 >>> mbox cmd response data (8 bytes)
3,444,410 UART: [rt] FIPS self test
3,444,738 UART: [kat] ++
3,444,890 UART: [kat] sha1
3,449,266 UART: [kat] SHA2-256
3,451,288 UART: [kat] SHA2-384
3,454,159 UART: [kat] SHA2-512-ACC
3,455,642 UART: Droping operation
3,456,145 UART: Fatal Error: 0x90050003
3,457,684 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,689 >>> mbox cmd response: failed
3,457,689 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,671 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,141 UART: [kat] SHA2-256
904,081 UART: [kat] SHA2-384
906,858 UART: [kat] SHA2-512-ACC
908,759 UART: [kat] ECC-384
918,514 UART: [kat] HMAC-384Kdf
923,304 UART: [kat] LMS
1,171,632 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,841 UART: [fht] FHT @ 0x50003400
1,175,380 UART: [idev] ++
1,175,548 UART: [idev] CDI.KEYID = 6
1,175,908 UART: [idev] SUBJECT.KEYID = 7
1,176,332 UART: [idev] UDS.KEYID = 0
1,176,677 ready_for_fw is high
1,176,677 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,460 UART: [idev] Erasing UDS.KEYID = 0
1,201,591 UART: [idev] Sha1 KeyId Algorithm
1,210,131 UART: [idev] --
1,211,379 UART: [ldev] ++
1,211,547 UART: [ldev] CDI.KEYID = 6
1,211,910 UART: [ldev] SUBJECT.KEYID = 5
1,212,336 UART: [ldev] AUTHORITY.KEYID = 7
1,212,799 UART: [ldev] FE.KEYID = 1
1,218,029 UART: [ldev] Erasing FE.KEYID = 1
1,243,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,757 UART: [ldev] --
1,283,244 UART: [fwproc] Wait for Commands...
1,283,838 UART: [fwproc] Recv command 0x46574c44
1,284,566 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,960 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,655 >>> mbox cmd response: success
2,783,815 UART: [afmc] ++
2,783,983 UART: [afmc] CDI.KEYID = 6
2,784,345 UART: [afmc] SUBJECT.KEYID = 7
2,784,770 UART: [afmc] AUTHORITY.KEYID = 5
2,819,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,416 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,248 UART: [afmc] --
2,863,330 UART: [cold-reset] --
2,864,174 UART: [state] Locking Datavault
2,865,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,837 UART: [state] Locking ICCM
2,866,289 UART: [exit] Launching FMC @ 0x40000130
2,871,618 UART:
2,871,634 UART: Running Caliptra FMC ...
2,872,042 UART:
2,872,096 UART: [state] CFI Enabled
2,882,555 UART: [fht] FMC Alias Private Key: 7
2,989,768 UART: [art] Extend RT PCRs Done
2,990,196 UART: [art] Lock RT PCRs Done
2,992,014 UART: [art] Populate DV Done
3,000,349 UART: [fht] FMC Alias Private Key: 7
3,001,469 UART: [art] Derive CDI
3,001,749 UART: [art] Store in in slot 0x4
3,087,410 UART: [art] Derive Key Pair
3,087,770 UART: [art] Store priv key in slot 0x5
3,101,512 UART: [art] Derive Key Pair - Done
3,116,184 UART: [art] Signing Cert with AUTHO
3,116,664 UART: RITY.KEYID = 7
3,131,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,415 UART: [art] PUB.X = 0102684E3B54264B8623725ABC7E4026D6E1763BF5EABC46F655AF035842013216020B7C6A0EC50135A2840F67B127D7
3,139,150 UART: [art] PUB.Y = C5E7F44FE45D4BB38E750DF4E403DB5B18762C61EECBB205A3FBF2A5BF2A649F801E4FED565D641ED8D6D9BDCBC2BA43
3,146,121 UART: [art] SIG.R = FFAF190B662C783AF2E1ED84E334EF81C098B61421937EEE07AF5A2723A6F4A759708E660F89E3CD0224B8131418EFB2
3,152,885 UART: [art] SIG.S = 6C48547D80758C1BFE248DFF855D0E25F7446A3CB84EBFDA6A69C7E675DF8BF3692EDC6071F01F8B7BF0A4625615383E
3,177,257 UART: Caliptra RT
3,177,510 UART: [state] CFI Enabled
3,284,927 UART: [rt] RT listening for mailbox commands...
3,285,590 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,487 UART: [rt]cmd =0x46504c54, len=4
3,316,609 >>> mbox cmd response data (8 bytes)
3,316,788 UART: [rt] FIPS self test
3,317,116 UART: [kat] ++
3,317,268 UART: [kat] sha1
3,321,488 UART: [kat] SHA2-256
3,323,510 UART: [kat] SHA2-384
3,326,301 UART: [kat] SHA2-512-ACC
3,327,784 UART: Droping operation
3,328,359 UART: Fatal Error: 0x90050003
3,329,898 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,903 >>> mbox cmd response: failed
3,329,903 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,638 UART: [kat] SHA2-512-ACC
908,539 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,810 UART: [kat] LMS
1,171,138 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,327 UART: [fht] FHT @ 0x50003400
1,175,110 UART: [idev] ++
1,175,278 UART: [idev] CDI.KEYID = 6
1,175,638 UART: [idev] SUBJECT.KEYID = 7
1,176,062 UART: [idev] UDS.KEYID = 0
1,176,407 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,388 UART: [idev] Erasing UDS.KEYID = 0
1,201,167 UART: [idev] Sha1 KeyId Algorithm
1,209,643 UART: [idev] --
1,210,749 UART: [ldev] ++
1,210,917 UART: [ldev] CDI.KEYID = 6
1,211,280 UART: [ldev] SUBJECT.KEYID = 5
1,211,706 UART: [ldev] AUTHORITY.KEYID = 7
1,212,169 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,725 UART: [ldev] --
1,283,180 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,038 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,342 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,947 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,973 ready_for_fw is high
1,059,973 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,436 >>> mbox cmd response: success
2,695,844 UART:
2,695,860 UART: Running Caliptra FMC ...
2,696,268 UART:
2,696,322 UART: [state] CFI Enabled
2,706,667 UART: [fht] FMC Alias Private Key: 7
2,814,576 UART: [art] Extend RT PCRs Done
2,815,004 UART: [art] Lock RT PCRs Done
2,816,922 UART: [art] Populate DV Done
2,824,837 UART: [fht] FMC Alias Private Key: 7
2,825,959 UART: [art] Derive CDI
2,826,239 UART: [art] Store in in slot 0x4
2,911,896 UART: [art] Derive Key Pair
2,912,256 UART: [art] Store priv key in slot 0x5
2,925,472 UART: [art] Derive Key Pair - Done
2,940,290 UART: [art] Signing Cert with AUTHO
2,940,770 UART: RITY.KEYID = 7
2,955,738 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,503 UART: [art] PUB.X = FB444C8855B952C0AFEA6C4E20212F37A39ADB1F7466D4382FBB1F19D31BD1805C7A9B73B0002379892C20820CC82F5F
2,963,254 UART: [art] PUB.Y = CE39D5BA72C50AB909A215D6159EFE19B6F08382BE8FD7F62B751E36276AA0F4A4DBFB2A5768086B56A626B672FF1E1C
2,970,209 UART: [art] SIG.R = 7F7C095DDC565278A9D8E9D64B411EE78AA769737E9BB11D9B5D7E6AA10C4B858D47171B8EF4A2CD106A7202E0B6F0A1
2,976,982 UART: [art] SIG.S = 451EE44B2D54DF54BAF2737C0FD15792E4D94A245C33C8909ACBC39A6C1FC016CE7A2CBA0084791DBF0EAC3B9B24F376
3,000,657 UART: Caliptra RT
3,000,910 UART: [state] CFI Enabled
3,108,719 UART: [rt] RT listening for mailbox commands...
3,109,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,385 UART: [rt]cmd =0x46504c54, len=4
3,140,659 >>> mbox cmd response data (8 bytes)
3,140,922 UART: [rt] FIPS self test
3,141,250 UART: [kat] ++
3,141,402 UART: [kat] sha1
3,145,500 UART: [kat] SHA2-256
3,147,522 UART: [kat] SHA2-384
3,150,525 UART: [kat] SHA2-512-ACC
3,152,008 UART: Droping operation
3,152,523 UART: Fatal Error: 0x90050003
3,154,062 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,154,067 >>> mbox cmd response: failed
3,154,067 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,154,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,632,594 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,740 UART: [cold-reset] ++
1,173,084 UART: [fht] FHT @ 0x50003400
1,175,597 UART: [idev] ++
1,175,765 UART: [idev] CDI.KEYID = 6
1,176,125 UART: [idev] SUBJECT.KEYID = 7
1,176,549 UART: [idev] UDS.KEYID = 0
1,176,894 ready_for_fw is high
1,176,894 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,939 UART: [idev] Erasing UDS.KEYID = 0
1,202,250 UART: [idev] Sha1 KeyId Algorithm
1,210,792 UART: [idev] --
1,211,930 UART: [ldev] ++
1,212,098 UART: [ldev] CDI.KEYID = 6
1,212,461 UART: [ldev] SUBJECT.KEYID = 5
1,212,887 UART: [ldev] AUTHORITY.KEYID = 7
1,213,350 UART: [ldev] FE.KEYID = 1
1,218,592 UART: [ldev] Erasing FE.KEYID = 1
1,244,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,283,939 UART: [fwproc] Wait for Commands...
1,284,575 UART: [fwproc] Recv command 0x46574c44
1,285,303 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,725 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,406 >>> mbox cmd response: success
2,783,444 UART: [afmc] ++
2,783,612 UART: [afmc] CDI.KEYID = 6
2,783,974 UART: [afmc] SUBJECT.KEYID = 7
2,784,399 UART: [afmc] AUTHORITY.KEYID = 5
2,820,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,462 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,181 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,979 UART: [afmc] --
2,863,943 UART: [cold-reset] --
2,864,955 UART: [state] Locking Datavault
2,866,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,710 UART: [state] Locking ICCM
2,867,270 UART: [exit] Launching FMC @ 0x40000130
2,872,599 UART:
2,872,615 UART: Running Caliptra FMC ...
2,873,023 UART:
2,873,166 UART: [state] CFI Enabled
2,883,687 UART: [fht] FMC Alias Private Key: 7
2,991,198 UART: [art] Extend RT PCRs Done
2,991,626 UART: [art] Lock RT PCRs Done
2,993,272 UART: [art] Populate DV Done
3,001,329 UART: [fht] FMC Alias Private Key: 7
3,002,359 UART: [art] Derive CDI
3,002,639 UART: [art] Store in in slot 0x4
3,088,298 UART: [art] Derive Key Pair
3,088,658 UART: [art] Store priv key in slot 0x5
3,101,822 UART: [art] Derive Key Pair - Done
3,116,688 UART: [art] Signing Cert with AUTHO
3,117,168 UART: RITY.KEYID = 7
3,132,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,299 UART: [art] PUB.X = 85CCC5D9DAFF87E3E6F613F63B3A535A22C4F0C0BA93235FE1275236D53F198F51D6600F93BC40F81E816FE6FF18B2B5
3,140,078 UART: [art] PUB.Y = B00AB683494D7349887E2593CEA412459639BD41DC9F98BA7493F169B721E42521D1DD0E3C6F7EDD09233E99608964B2
3,147,015 UART: [art] SIG.R = 4C54CE44C562C656ACF567B524502131FC47F571C820AF6E94EA15EB88DB60FDA230165861D716C7CF174ECBE45511B3
3,153,791 UART: [art] SIG.S = 9BF7F63A927CA43017FC7C310F701130E34B184511E893D3745B96BA2BC3F72FA1445958251F3E89ACB9A7E164F812F4
3,177,327 UART: Caliptra RT
3,177,672 UART: [state] CFI Enabled
3,284,819 UART: [rt] RT listening for mailbox commands...
3,285,482 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,171 UART: [rt]cmd =0x46504c54, len=4
3,316,251 >>> mbox cmd response data (8 bytes)
3,316,428 UART: [rt] FIPS self test
3,316,756 UART: [kat] ++
3,316,908 UART: [kat] sha1
3,321,058 UART: [kat] SHA2-256
3,323,080 UART: [kat] SHA2-384
3,325,787 UART: [kat] SHA2-512-ACC
3,327,270 UART: Droping operation
3,327,827 UART: Fatal Error: 0x90050003
3,329,366 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,371 >>> mbox cmd response: failed
3,329,371 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,769 UART: [kat] SHA2-512-ACC
908,670 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,003 UART: [kat] LMS
1,171,331 UART: [kat] --
1,172,102 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,373 UART: [idev] ++
1,175,541 UART: [idev] CDI.KEYID = 6
1,175,901 UART: [idev] SUBJECT.KEYID = 7
1,176,325 UART: [idev] UDS.KEYID = 0
1,176,670 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,202,082 UART: [idev] Sha1 KeyId Algorithm
1,210,694 UART: [idev] --
1,211,656 UART: [ldev] ++
1,211,824 UART: [ldev] CDI.KEYID = 6
1,212,187 UART: [ldev] SUBJECT.KEYID = 5
1,212,613 UART: [ldev] AUTHORITY.KEYID = 7
1,213,076 UART: [ldev] FE.KEYID = 1
1,218,586 UART: [ldev] Erasing FE.KEYID = 1
1,245,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,980 UART: [ldev] --
1,285,291 UART: [fwproc] Wait for Commands...
1,286,069 UART: [fwproc] Recv command 0x46574c44
1,286,797 UART: [fwproc] Recv'd Img size: 114940 bytes
2,592,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,407 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,786,224 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,438 ready_for_fw is high
1,060,438 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,733 >>> mbox cmd response: success
2,697,547 UART:
2,697,563 UART: Running Caliptra FMC ...
2,697,971 UART:
2,698,114 UART: [state] CFI Enabled
2,708,485 UART: [fht] FMC Alias Private Key: 7
2,816,472 UART: [art] Extend RT PCRs Done
2,816,900 UART: [art] Lock RT PCRs Done
2,818,502 UART: [art] Populate DV Done
2,826,383 UART: [fht] FMC Alias Private Key: 7
2,827,491 UART: [art] Derive CDI
2,827,771 UART: [art] Store in in slot 0x4
2,913,868 UART: [art] Derive Key Pair
2,914,228 UART: [art] Store priv key in slot 0x5
2,927,456 UART: [art] Derive Key Pair - Done
2,942,295 UART: [art] Signing Cert with AUTHO
2,942,775 UART: RITY.KEYID = 7
2,957,453 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,218 UART: [art] PUB.X = 24571438B12ECF2505DAC96E3D727BC82E07ABC739B6B0F94EB151795803C43F9D47DC8892C193029480686DE90A6330
2,964,969 UART: [art] PUB.Y = B4E07CE20274197C2149082287B9CAE2022C927358B82197786720DDF917CE6ACA350AE654A8B96ECBD7811254DEAC0A
2,971,906 UART: [art] SIG.R = 506038447A24CC2443A24937372772C244743208940C0D4427B9E19B6610C9064165EE325328629A3D9CC6D3BDCD8A67
2,978,648 UART: [art] SIG.S = 114BAF266660244313ADF1AB9ECB42D172364B7B9AED998466B82D3D76F881F1EAB0E03469ED950C83B374E4E4269885
3,003,002 UART: Caliptra RT
3,003,347 UART: [state] CFI Enabled
3,110,776 UART: [rt] RT listening for mailbox commands...
3,111,439 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,524 UART: [rt]cmd =0x46504c54, len=4
3,142,882 >>> mbox cmd response data (8 bytes)
3,143,197 UART: [rt] FIPS self test
3,143,525 UART: [kat] ++
3,143,677 UART: [kat] sha1
3,147,825 UART: [kat] SHA2-256
3,149,847 UART: [kat] SHA2-384
3,152,596 UART: [kat] SHA2-512-ACC
3,154,079 UART: Droping operation
3,154,654 UART: Fatal Error: 0x90050003
3,156,193 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,198 >>> mbox cmd response: failed
3,156,198 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,278 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,067 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,652 UART: [kat] SHA2-512-ACC
906,553 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,455 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,174 UART: [ldev] ++
1,209,342 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,133 UART: [ldev] AUTHORITY.KEYID = 7
1,210,596 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,242,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,408 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,531 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,933 >>> mbox cmd response: success
2,783,058 UART: [afmc] ++
2,783,226 UART: [afmc] CDI.KEYID = 6
2,783,589 UART: [afmc] SUBJECT.KEYID = 7
2,784,015 UART: [afmc] AUTHORITY.KEYID = 5
2,820,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,730 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,210 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,093 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,705 UART: [afmc] --
2,863,623 UART: [cold-reset] --
2,864,581 UART: [state] Locking Datavault
2,865,430 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,034 UART: [state] Locking ICCM
2,866,560 UART: [exit] Launching FMC @ 0x40000130
2,871,889 UART:
2,871,905 UART: Running Caliptra FMC ...
2,872,313 UART:
2,872,367 UART: [state] CFI Enabled
2,883,198 UART: [fht] FMC Alias Private Key: 7
2,991,599 UART: [art] Extend RT PCRs Done
2,992,027 UART: [art] Lock RT PCRs Done
2,993,589 UART: [art] Populate DV Done
3,001,546 UART: [fht] FMC Alias Private Key: 7
3,002,562 UART: [art] Derive CDI
3,002,842 UART: [art] Store in in slot 0x4
3,088,265 UART: [art] Derive Key Pair
3,088,625 UART: [art] Store priv key in slot 0x5
3,102,539 UART: [art] Derive Key Pair - Done
3,117,282 UART: [art] Signing Cert with AUTHO
3,117,762 UART: RITY.KEYID = 7
3,133,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,799 UART: [art] PUB.X = 2EBBDDF8C0F08DBAB246E1930A10618A414B55E95D4E105F9414300BC69A1DDD4D864B8FCB14C50FB1F72C5847AC831D
3,140,576 UART: [art] PUB.Y = BA1AF4A0C69AB018E93850EE4716B1080E512AF753CEC691485BC32369E25AD6C34FA4571B7860397B42B1F310FDEC9C
3,147,528 UART: [art] SIG.R = B328BF04F458ACDB4C598DC2FC8D96DFFA33F173C6D13D9A7815C83899A2D168853A5E1D4BD61133950E5BCA60084B08
3,154,296 UART: [art] SIG.S = 0FA13E6736D98ADF0B560155CC3D420557D87147C18AAA5A0A5117272C80AB3A24BF137236BCDCB32CAE24134BB86C23
3,177,844 UART: Caliptra RT
3,178,097 UART: [state] CFI Enabled
3,285,446 UART: [rt] RT listening for mailbox commands...
3,286,109 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,110 UART: [rt]cmd =0x46504c54, len=4
3,317,154 >>> mbox cmd response data (8 bytes)
3,317,461 UART: [rt] FIPS self test
3,317,789 UART: [kat] ++
3,317,941 UART: [kat] sha1
3,322,033 UART: [kat] SHA2-256
3,324,055 UART: [kat] SHA2-384
3,326,980 UART: [kat] SHA2-512-ACC
3,328,463 UART: Droping operation
3,329,026 UART: Fatal Error: 0x90050003
3,330,565 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,570 >>> mbox cmd response: failed
3,330,570 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,170,277 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,569 UART: [idev] Sha1 KeyId Algorithm
1,208,269 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,724 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,235 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,917 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,138 ready_for_fw is high
1,056,138 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,431 >>> mbox cmd response: success
2,692,493 UART:
2,692,509 UART: Running Caliptra FMC ...
2,692,917 UART:
2,692,971 UART: [state] CFI Enabled
2,703,720 UART: [fht] FMC Alias Private Key: 7
2,812,277 UART: [art] Extend RT PCRs Done
2,812,705 UART: [art] Lock RT PCRs Done
2,814,369 UART: [art] Populate DV Done
2,822,848 UART: [fht] FMC Alias Private Key: 7
2,823,808 UART: [art] Derive CDI
2,824,088 UART: [art] Store in in slot 0x4
2,909,355 UART: [art] Derive Key Pair
2,909,715 UART: [art] Store priv key in slot 0x5
2,922,447 UART: [art] Derive Key Pair - Done
2,936,974 UART: [art] Signing Cert with AUTHO
2,937,454 UART: RITY.KEYID = 7
2,952,602 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,367 UART: [art] PUB.X = 1EE59C00ECA6CD0FA7BCCC50784424183A990558D30EBA1D8685C9C3F41F43883CF4875C6ACA35A19F034905B6A24B90
2,960,108 UART: [art] PUB.Y = F8E2CE9872180711A6B84028CB8E406919FDAC094EBC085DED4A7102D5A5D76D823A67DC4FC218A490399434F09DB5BA
2,967,054 UART: [art] SIG.R = A38D710276AD591B452AAFE98B74860F6F51632D7087557265860161BE012C52E1C54E71355B69B5818A3BF8CCD0F1F2
2,973,808 UART: [art] SIG.S = A4928CA2F2F240BF1055C428A24955AA960269A4967F0C07589EA72390428C624F3A8DDB4913807886C1308E16A3AA3F
2,997,920 UART: Caliptra RT
2,998,173 UART: [state] CFI Enabled
3,105,591 UART: [rt] RT listening for mailbox commands...
3,106,254 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,251 UART: [rt]cmd =0x46504c54, len=4
3,137,415 >>> mbox cmd response data (8 bytes)
3,137,570 UART: [rt] FIPS self test
3,137,898 UART: [kat] ++
3,138,050 UART: [kat] sha1
3,142,186 UART: [kat] SHA2-256
3,144,208 UART: [kat] SHA2-384
3,147,057 UART: [kat] SHA2-512-ACC
3,148,540 UART: Droping operation
3,149,123 UART: Fatal Error: 0x90050003
3,150,662 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,667 >>> mbox cmd response: failed
3,150,667 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,582 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,609 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,513 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,208,935 UART: [ldev] ++
1,209,103 UART: [ldev] CDI.KEYID = 6
1,209,467 UART: [ldev] SUBJECT.KEYID = 5
1,209,894 UART: [ldev] AUTHORITY.KEYID = 7
1,210,357 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,241,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,649 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,778 UART: [fwproc] Recv command 0x46574c44
1,282,511 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,494 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,146 >>> mbox cmd response: success
2,781,267 UART: [afmc] ++
2,781,435 UART: [afmc] CDI.KEYID = 6
2,781,798 UART: [afmc] SUBJECT.KEYID = 7
2,782,224 UART: [afmc] AUTHORITY.KEYID = 5
2,818,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,744 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,463 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,282 UART: [afmc] --
2,861,342 UART: [cold-reset] --
2,862,144 UART: [state] Locking Datavault
2,863,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,773 UART: [state] Locking ICCM
2,864,307 UART: [exit] Launching FMC @ 0x40000130
2,869,636 UART:
2,869,652 UART: Running Caliptra FMC ...
2,870,060 UART:
2,870,203 UART: [state] CFI Enabled
2,880,978 UART: [fht] FMC Alias Private Key: 7
2,989,133 UART: [art] Extend RT PCRs Done
2,989,561 UART: [art] Lock RT PCRs Done
2,991,331 UART: [art] Populate DV Done
2,999,682 UART: [fht] FMC Alias Private Key: 7
3,000,734 UART: [art] Derive CDI
3,001,014 UART: [art] Store in in slot 0x4
3,086,665 UART: [art] Derive Key Pair
3,087,025 UART: [art] Store priv key in slot 0x5
3,099,869 UART: [art] Derive Key Pair - Done
3,114,630 UART: [art] Signing Cert with AUTHO
3,115,110 UART: RITY.KEYID = 7
3,130,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,381 UART: [art] PUB.X = 6136F5E933A16C3A207395C4FE260E81A0A5C30B4EC8A3DED2EB17400AEC2ED72994BA6BF16C9F15024D5654925FBFC1
3,138,151 UART: [art] PUB.Y = 7A523BEF02570DC4D8CE76132119AC00D66275CA3E06CC26E6A2EEBAC442F659FE6D9C1B7FC08EBA0583BE7FB93A6667
3,145,085 UART: [art] SIG.R = 2935EE00A265BE37FB02754D79C1E5F9667901654CB242DD3E311DD883D0973686C6DE606528058982100A77CE44DE30
3,151,813 UART: [art] SIG.S = 68023878AF668338BE88D664D25AAEA360CC2DA38CA55B75302E1C4E6F250E63789FE9C0470E43B1D51728E5D6E83096
3,176,027 UART: Caliptra RT
3,176,372 UART: [state] CFI Enabled
3,283,901 UART: [rt] RT listening for mailbox commands...
3,284,564 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,527 UART: [rt]cmd =0x46504c54, len=4
3,315,739 >>> mbox cmd response data (8 bytes)
3,316,004 UART: [rt] FIPS self test
3,316,332 UART: [kat] ++
3,316,484 UART: [kat] sha1
3,320,806 UART: [kat] SHA2-256
3,322,828 UART: [kat] SHA2-384
3,325,691 UART: [kat] SHA2-512-ACC
3,327,174 UART: Droping operation
3,327,713 UART: Fatal Error: 0x90050003
3,329,252 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,257 >>> mbox cmd response: failed
3,329,257 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
921,069 UART: [kat] LMS
1,169,381 UART: [kat] --
1,170,302 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,484 UART: [idev] ++
1,173,652 UART: [idev] CDI.KEYID = 6
1,174,013 UART: [idev] SUBJECT.KEYID = 7
1,174,438 UART: [idev] UDS.KEYID = 0
1,174,784 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,509 UART: [fwproc] Wait for Commands...
1,283,284 UART: [fwproc] Recv command 0x46574c44
1,284,017 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,038 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,854 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,797 ready_for_fw is high
1,055,797 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,958 >>> mbox cmd response: success
2,691,422 UART:
2,691,438 UART: Running Caliptra FMC ...
2,691,846 UART:
2,691,989 UART: [state] CFI Enabled
2,702,628 UART: [fht] FMC Alias Private Key: 7
2,811,317 UART: [art] Extend RT PCRs Done
2,811,745 UART: [art] Lock RT PCRs Done
2,813,475 UART: [art] Populate DV Done
2,821,870 UART: [fht] FMC Alias Private Key: 7
2,822,928 UART: [art] Derive CDI
2,823,208 UART: [art] Store in in slot 0x4
2,908,491 UART: [art] Derive Key Pair
2,908,851 UART: [art] Store priv key in slot 0x5
2,922,967 UART: [art] Derive Key Pair - Done
2,937,990 UART: [art] Signing Cert with AUTHO
2,938,470 UART: RITY.KEYID = 7
2,953,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,319 UART: [art] PUB.X = 834C2ECB2043BB2C8ABE42A61D3FD97E1CD7B03BCB19BDC4D4CAE351DF01BC4017049B62596B7C93C314F1AF9D058FF9
2,961,102 UART: [art] PUB.Y = 6C8B93672035B5209B8276B0775E5FF001E57BB3100938086FBC48116FC5A227A0F2F5689FBF0B836C834100FFBF71B8
2,968,016 UART: [art] SIG.R = C7A315317B910FDB6C073CC4420656F254B988790E2437D27418D17443AED96A4A3126871CA70A784700FD6775B0CDD1
2,974,743 UART: [art] SIG.S = E881658C4EEE72E5213821B9F9515667CF580C2086CE9C1E8315B34DC6CD389449F744CAF1B6CD889483C96C7FA9771C
2,998,503 UART: Caliptra RT
2,998,848 UART: [state] CFI Enabled
3,107,052 UART: [rt] RT listening for mailbox commands...
3,107,715 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,420 UART: [rt]cmd =0x46504c54, len=4
3,138,460 >>> mbox cmd response data (8 bytes)
3,138,643 UART: [rt] FIPS self test
3,138,971 UART: [kat] ++
3,139,123 UART: [kat] sha1
3,143,503 UART: [kat] SHA2-256
3,145,525 UART: [kat] SHA2-384
3,148,396 UART: [kat] SHA2-512-ACC
3,149,879 UART: Droping operation
3,150,392 UART: Fatal Error: 0x90050003
3,151,931 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,936 >>> mbox cmd response: failed
3,151,936 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,635 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,006 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,686,957 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,830,555 >>> mbox cmd response: failed
2,831,109 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,973,984 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
4,859,366 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,408,836 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,691,232 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,835,041 >>> mbox cmd response: failed
2,835,617 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,978,485 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,859,802 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,415,846 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,038,210 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,182,031 >>> mbox cmd response: failed
3,182,594 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,325,961 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,581,995 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,009,793 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,032,278 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,176,065 >>> mbox cmd response: failed
3,176,628 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,319,489 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
21,587,425 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,026,776 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,707,174 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,851,376 >>> mbox cmd response: failed
2,852,108 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,995,423 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
3,446,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,287,720 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,697,289 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,841,435 >>> mbox cmd response: failed
2,841,995 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,985,276 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,463,569 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,305,018 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
3,051,831 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,196,005 >>> mbox cmd response: failed
3,196,579 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,339,700 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,175,508 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,911,940 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,047,733 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,191,931 >>> mbox cmd response: failed
3,192,510 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,336,308 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,186,457 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,888,298 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,697,580 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,841,980 >>> mbox cmd response: failed
2,842,585 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,066 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,457,401 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,288,908 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,697,281 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,841,918 >>> mbox cmd response: failed
2,842,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,985,805 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,456,868 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,247,610 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,056,440 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,200,815 >>> mbox cmd response: failed
3,201,403 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,344,579 >>> mbox cmd response: failed
Initializing fuses
995 writing to cptra_bootfsm_go
20,183,395 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,894,152 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,061,922 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,206,092 >>> mbox cmd response: failed
3,206,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,349,933 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,186,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,905,435 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,828 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,836 >>> mbox cmd response: failed
811,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,251 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,653 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,082 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,090 >>> mbox cmd response: failed
812,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,379 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,007 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,861 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,869 >>> mbox cmd response: failed
811,869 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,240 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,808 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,777 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,785 >>> mbox cmd response: failed
811,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,656 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,840 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,410 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,418 >>> mbox cmd response: failed
811,418 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,424 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,699 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,894 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,902 >>> mbox cmd response: failed
812,902 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,849 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,261 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,897 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,905 >>> mbox cmd response: failed
811,905 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,604 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,141 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,149 >>> mbox cmd response: failed
812,149 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,155 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,742 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,412 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,284 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,292 >>> mbox cmd response: failed
812,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,807 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,855 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,610 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,618 >>> mbox cmd response: failed
811,618 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,515 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,219 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,323 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,331 >>> mbox cmd response: failed
812,331 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,080 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,312 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,537 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,545 >>> mbox cmd response: failed
812,545 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,022 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,321 UART:
192,677 UART: Running Caliptra ROM ...
193,860 UART:
194,011 UART: [state] CFI Enabled
266,470 UART: [state] LifecycleState = Unprovisioned
268,472 UART: [state] DebugLocked = No
271,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,324 UART: [kat] SHA2-256
445,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,526 UART: [kat] ++
456,983 UART: [kat] sha1
467,007 UART: [kat] SHA2-256
469,668 UART: [kat] SHA2-384
475,872 UART: [kat] SHA2-512-ACC
478,251 UART: [kat] ECC-384
2,769,538 UART: [kat] HMAC-384Kdf
2,799,941 UART: [kat] LMS
3,990,190 UART: [kat] --
3,995,484 UART: [cold-reset] ++
3,997,921 UART: [fht] Storing FHT @ 0x50003400
4,008,775 UART: [idev] ++
4,009,346 UART: [idev] CDI.KEYID = 6
4,010,270 UART: [idev] SUBJECT.KEYID = 7
4,011,545 UART: [idev] UDS.KEYID = 0
4,012,625 ready_for_fw is high
4,012,857 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,157,116 UART: [idev] Erasing UDS.KEYID = 0
7,344,346 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,407 UART: [idev] --
7,370,102 UART: [ldev] ++
7,370,673 UART: [ldev] CDI.KEYID = 6
7,371,694 UART: [ldev] SUBJECT.KEYID = 5
7,372,852 UART: [ldev] AUTHORITY.KEYID = 7
7,374,084 UART: [ldev] FE.KEYID = 1
7,400,784 UART: [ldev] Erasing FE.KEYID = 1
10,732,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,150 UART: [ldev] --
13,096,327 UART: [fwproc] Waiting for Commands...
13,099,445 UART: [fwproc] Received command 0x46574c44
13,101,654 UART: [fwproc] Received Image of size 114632 bytes
17,157,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,621,498 >>> mbox cmd response: success
17,626,179 UART: [afmc] ++
17,626,772 UART: [afmc] CDI.KEYID = 6
17,627,798 UART: [afmc] SUBJECT.KEYID = 7
17,628,953 UART: [afmc] AUTHORITY.KEYID = 5
20,989,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,564 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,982 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,787 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,206 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,908 UART: [afmc] --
23,358,792 UART: [cold-reset] --
23,361,523 UART: [state] Locking Datavault
23,364,987 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,738 UART: [state] Locking ICCM
23,368,456 UART: [exit] Launching FMC @ 0x40000130
23,376,849 UART:
23,377,094 UART: Running Caliptra FMC ...
23,378,200 UART:
23,378,361 UART: [state] CFI Enabled
23,447,869 UART: [fht] FMC Alias Private Key: 7
25,785,907 UART: [art] Extend RT PCRs Done
25,787,130 UART: [art] Lock RT PCRs Done
25,789,150 UART: [art] Populate DV Done
25,794,619 UART: [fht] FMC Alias Private Key: 7
25,796,047 UART: [art] Derive CDI
25,796,810 UART: [art] Store in in slot 0x4
25,856,064 UART: [art] Derive Key Pair
25,857,113 UART: [art] Store priv key in slot 0x5
29,151,175 UART: [art] Derive Key Pair - Done
29,164,389 UART: [art] Signing Cert with AUTHO
29,165,696 UART: RITY.KEYID = 7
31,452,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,993 UART: [art] PUB.X = 5349A4C448788DA6D0AB058F4421178786CAEEBD92353D5DDDD5D915BA9461D34CE388FD6334930C7C3BA66656DED393
31,461,199 UART: [art] PUB.Y = 84D9B849C931F76809837C7530BF8013F079784B9E24A1E9BA92504C9C3B0122580E964B819F794048375D3E4ACB1FF0
31,468,448 UART: [art] SIG.R = 6648F04C267EE790910B5CD09A77715B591F3F0C0CB60281F969F55B6A348EC276C31D8B911DA18469F3A9FB01AAB21A
31,475,854 UART: [art] SIG.S = 8AB361625F893CACB10C3D5754DC864E917F647EECB908D26DD1A154C258B9D40E352AD283A38506C3D5F35C8CD409FC
32,780,600 UART: Caliptra RT
32,781,323 UART: [state] CFI Enabled
32,942,902 UART: [rt] RT listening for mailbox commands...
32,944,757 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,974,650 UART: [rt]cmd =0x46504c54, len=4
32,976,343 >>> mbox cmd response data (8 bytes)
32,977,413 UART: [rt] FIPS self test
32,978,360 UART: [kat] ++
32,978,815 UART: [kat] sha1
32,983,435 UART: [kat] SHA2-256
32,985,321 UART: [kat] SHA2-384
32,988,124 UART: [kat] SHA2-512-ACC
32,989,171 UART: Fatal Error: 0x90050001
33,024,561 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,168,476 >>> mbox cmd response: failed
33,169,049 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,312,940 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,018 UART:
190,329 UART: Running Caliptra ROM ...
191,354 UART:
191,495 UART: [state] CFI Enabled
255,114 UART: [state] LifecycleState = Unprovisioned
256,999 UART: [state] DebugLocked = No
258,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,555 UART: [kat] SHA2-256
433,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,752 UART: [kat] ++
444,337 UART: [kat] sha1
456,028 UART: [kat] SHA2-256
458,765 UART: [kat] SHA2-384
464,791 UART: [kat] SHA2-512-ACC
467,191 UART: [kat] ECC-384
2,753,821 UART: [kat] HMAC-384Kdf
2,766,540 UART: [kat] LMS
3,956,820 UART: [kat] --
3,960,127 UART: [cold-reset] ++
3,961,579 UART: [fht] Storing FHT @ 0x50003400
3,973,711 UART: [idev] ++
3,974,284 UART: [idev] CDI.KEYID = 6
3,975,250 UART: [idev] SUBJECT.KEYID = 7
3,976,464 UART: [idev] UDS.KEYID = 0
3,978,022 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,122,212 UART: [idev] Erasing UDS.KEYID = 0
7,314,925 UART: [idev] Using Sha1 for KeyId Algorithm
7,336,791 UART: [idev] --
7,340,029 UART: [ldev] ++
7,340,601 UART: [ldev] CDI.KEYID = 6
7,341,569 UART: [ldev] SUBJECT.KEYID = 5
7,342,804 UART: [ldev] AUTHORITY.KEYID = 7
7,344,042 UART: [ldev] FE.KEYID = 1
7,388,992 UART: [ldev] Erasing FE.KEYID = 1
10,719,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,030,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,045,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,597 UART: [ldev] --
13,084,472 UART: [fwproc] Waiting for Commands...
13,086,415 UART: [fwproc] Received command 0x46574c44
13,088,604 UART: [fwproc] Received Image of size 114632 bytes
17,148,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,091 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,613,640 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,805,639 ready_for_fw is high
3,806,039 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,855,626 >>> mbox cmd response: success
23,543,276 UART:
23,543,686 UART: Running Caliptra FMC ...
23,544,836 UART:
23,545,016 UART: [state] CFI Enabled
23,614,795 UART: [fht] FMC Alias Private Key: 7
25,952,069 UART: [art] Extend RT PCRs Done
25,953,296 UART: [art] Lock RT PCRs Done
25,954,946 UART: [art] Populate DV Done
25,960,314 UART: [fht] FMC Alias Private Key: 7
25,961,970 UART: [art] Derive CDI
25,962,785 UART: [art] Store in in slot 0x4
26,023,023 UART: [art] Derive Key Pair
26,024,075 UART: [art] Store priv key in slot 0x5
29,316,537 UART: [art] Derive Key Pair - Done
29,329,485 UART: [art] Signing Cert with AUTHO
29,330,785 UART: RITY.KEYID = 7
31,617,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,188 UART: [art] PUB.X = 1087941B7ABC0D4616BED06408E1D9AE6768A1C2079E64306C9A34994DDDCB7A44AE31BD0AAA578D6B08486B43587EEF
31,626,451 UART: [art] PUB.Y = 67F8290FF045FA83E99236B2DBC109BC8D7ABBE9425104F964397813C334F6AE736324CF5C4CA78CB4557C22CE339F7C
31,633,665 UART: [art] SIG.R = 63D013F97F169FE394BF029E7347531E4F5B1AFD83063DB31DED233CA56AB197DFCC6E9B339765FAED7F0C155C9DB189
31,641,078 UART: [art] SIG.S = 271A04C971D0F3BB134428AF60FF563F018A518C33A2B8F523FEB18E1864A0F9806500CB541F4A3CE2D73BB56993E315
32,946,358 UART: Caliptra RT
32,947,076 UART: [state] CFI Enabled
33,109,229 UART: [rt] RT listening for mailbox commands...
33,111,084 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,140,593 UART: [rt]cmd =0x46504c54, len=4
33,142,121 >>> mbox cmd response data (8 bytes)
33,143,015 UART: [rt] FIPS self test
33,143,902 UART: [kat] ++
33,144,391 UART: [kat] sha1
33,149,065 UART: [kat] SHA2-256
33,150,956 UART: [kat] SHA2-384
33,153,998 UART: [kat] SHA2-512-ACC
33,154,943 UART: Fatal Error: 0x90050001
33,190,274 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,334,141 >>> mbox cmd response: failed
33,334,724 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,478,695 >>> mbox cmd response: failed
Initializing fuses
916 writing to cptra_bootfsm_go
3,792,210 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,885,059 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,590 UART:
192,951 UART: Running Caliptra ROM ...
194,144 UART:
603,948 UART: [state] CFI Enabled
619,881 UART: [state] LifecycleState = Unprovisioned
621,877 UART: [state] DebugLocked = No
623,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,875 UART: [kat] SHA2-256
797,585 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,150 UART: [kat] ++
808,690 UART: [kat] sha1
820,496 UART: [kat] SHA2-256
823,249 UART: [kat] SHA2-384
830,095 UART: [kat] SHA2-512-ACC
832,471 UART: [kat] ECC-384
3,115,271 UART: [kat] HMAC-384Kdf
3,127,725 UART: [kat] LMS
4,317,820 UART: [kat] --
4,321,543 UART: [cold-reset] ++
4,323,119 UART: [fht] Storing FHT @ 0x50003400
4,333,679 UART: [idev] ++
4,334,244 UART: [idev] CDI.KEYID = 6
4,335,202 UART: [idev] SUBJECT.KEYID = 7
4,336,456 UART: [idev] UDS.KEYID = 0
4,337,408 ready_for_fw is high
4,337,604 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,481,586 UART: [idev] Erasing UDS.KEYID = 0
7,625,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,307 UART: [idev] --
7,651,273 UART: [ldev] ++
7,651,843 UART: [ldev] CDI.KEYID = 6
7,652,860 UART: [ldev] SUBJECT.KEYID = 5
7,654,019 UART: [ldev] AUTHORITY.KEYID = 7
7,655,253 UART: [ldev] FE.KEYID = 1
7,667,645 UART: [ldev] Erasing FE.KEYID = 1
10,953,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,015 UART: [ldev] --
13,313,282 UART: [fwproc] Waiting for Commands...
13,314,954 UART: [fwproc] Received command 0x46574c44
13,317,196 UART: [fwproc] Received Image of size 114632 bytes
17,377,292 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,366 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,274 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,841,666 >>> mbox cmd response: success
17,846,073 UART: [afmc] ++
17,846,671 UART: [afmc] CDI.KEYID = 6
17,847,585 UART: [afmc] SUBJECT.KEYID = 7
17,848,853 UART: [afmc] AUTHORITY.KEYID = 5
21,167,732 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,438 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,795 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,652 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,091 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,205 UART: [afmc] --
23,530,536 UART: [cold-reset] --
23,534,847 UART: [state] Locking Datavault
23,542,201 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,955 UART: [state] Locking ICCM
23,546,406 UART: [exit] Launching FMC @ 0x40000130
23,554,803 UART:
23,555,039 UART: Running Caliptra FMC ...
23,556,145 UART:
23,556,302 UART: [state] CFI Enabled
23,563,811 UART: [fht] FMC Alias Private Key: 7
25,895,363 UART: [art] Extend RT PCRs Done
25,896,592 UART: [art] Lock RT PCRs Done
25,898,140 UART: [art] Populate DV Done
25,903,561 UART: [fht] FMC Alias Private Key: 7
25,905,200 UART: [art] Derive CDI
25,906,022 UART: [art] Store in in slot 0x4
25,948,459 UART: [art] Derive Key Pair
25,949,482 UART: [art] Store priv key in slot 0x5
29,191,731 UART: [art] Derive Key Pair - Done
29,204,824 UART: [art] Signing Cert with AUTHO
29,206,122 UART: RITY.KEYID = 7
31,485,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,654 UART: [art] PUB.X = D6D21FA4013320CC22D0FC173CCCD839A819FA98229E0D1FCC3645DD4191AAFBC9B5644848D5EDC16F73DB8AD5B77894
31,493,906 UART: [art] PUB.Y = 61582A0633C9FE40C8258E7FA126A2ABC2A181EC5651BC3B3767B4424A3A65B793D61D1D2660F5A986ED0D8EF19F676A
31,501,276 UART: [art] SIG.R = 023281D3C283FB85FFD41CF282D857569E0EDCF2082EF4F643882C620C4DBFEA5C8F951ED05E900D08F2736995CFD342
31,508,521 UART: [art] SIG.S = B892B7CFC1ED733A44BA0E6364D16693DDDDF36F50CA87CFF337C5E65248A035D7C36C5DBFF60E7A760711C6EF2BA71C
32,813,849 UART: Caliptra RT
32,814,561 UART: [state] CFI Enabled
32,931,678 UART: [rt] RT listening for mailbox commands...
32,933,526 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,963,042 UART: [rt]cmd =0x46504c54, len=4
32,964,818 >>> mbox cmd response data (8 bytes)
32,965,623 UART: [rt] FIPS self test
32,966,586 UART: [kat] ++
32,967,036 UART: [kat] sha1
32,971,258 UART: [kat] SHA2-256
32,973,189 UART: [kat] SHA2-384
32,976,092 UART: [kat] SHA2-512-ACC
32,977,138 UART: Fatal Error: 0x90050001
33,012,267 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,156,224 >>> mbox cmd response: failed
33,156,842 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,300,779 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
189,962 UART:
190,250 UART: Running Caliptra ROM ...
191,274 UART:
7,229,418 UART: [state] CFI Enabled
7,243,280 UART: [state] LifecycleState = Unprovisioned
7,245,224 UART: [state] DebugLocked = No
7,248,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,252,268 UART: [kat] SHA2-256
7,422,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,432,567 UART: [kat] ++
7,433,053 UART: [kat] sha1
7,443,676 UART: [kat] SHA2-256
7,446,379 UART: [kat] SHA2-384
7,451,400 UART: [kat] SHA2-512-ACC
7,453,752 UART: [kat] ECC-384
9,737,562 UART: [kat] HMAC-384Kdf
9,750,597 UART: [kat] LMS
10,940,659 UART: [kat] --
10,945,400 UART: [cold-reset] ++
10,947,826 UART: [fht] Storing FHT @ 0x50003400
10,959,275 UART: [idev] ++
10,959,842 UART: [idev] CDI.KEYID = 6
10,960,784 UART: [idev] SUBJECT.KEYID = 7
10,962,046 UART: [idev] UDS.KEYID = 0
10,963,580 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,107,513 UART: [idev] Erasing UDS.KEYID = 0
14,246,192 UART: [idev] Using Sha1 for KeyId Algorithm
14,266,542 UART: [idev] --
14,270,422 UART: [ldev] ++
14,270,991 UART: [ldev] CDI.KEYID = 6
14,271,952 UART: [ldev] SUBJECT.KEYID = 5
14,273,161 UART: [ldev] AUTHORITY.KEYID = 7
14,274,446 UART: [ldev] FE.KEYID = 1
14,285,038 UART: [ldev] Erasing FE.KEYID = 1
17,570,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,863,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,877,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,892,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,907,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,925,035 UART: [ldev] --
19,928,901 UART: [fwproc] Waiting for Commands...
19,932,130 UART: [fwproc] Received command 0x46574c44
19,934,372 UART: [fwproc] Received Image of size 114632 bytes
23,995,691 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,070,961 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,139,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,459,468 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,126,524 ready_for_fw is high
4,126,941 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,067,885 >>> mbox cmd response: success
23,711,626 UART:
23,712,039 UART: Running Caliptra FMC ...
23,713,157 UART:
23,713,320 UART: [state] CFI Enabled
23,721,226 UART: [fht] FMC Alias Private Key: 7
26,052,075 UART: [art] Extend RT PCRs Done
26,053,311 UART: [art] Lock RT PCRs Done
26,054,846 UART: [art] Populate DV Done
26,060,229 UART: [fht] FMC Alias Private Key: 7
26,061,877 UART: [art] Derive CDI
26,062,711 UART: [art] Store in in slot 0x4
26,104,935 UART: [art] Derive Key Pair
26,105,940 UART: [art] Store priv key in slot 0x5
29,348,835 UART: [art] Derive Key Pair - Done
29,361,661 UART: [art] Signing Cert with AUTHO
29,362,972 UART: RITY.KEYID = 7
31,642,304 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,825 UART: [art] PUB.X = 145387F78CAAA3744B1D537FCAF789E0E0A4D1B80DE7DA5182D97DA4311E091CD71177DCF3347A395B6CFFC1598FBDCD
31,651,023 UART: [art] PUB.Y = 7122EFF2B9B12AF8BB9D844655CC6E78C8B0FA76385EBB3AC40B60DB6D03CDDF8AAB60B0916456AC0B024EDEFDB38101
31,658,345 UART: [art] SIG.R = 664F16A5F8AC52C478750B7764D7C70D5F6589F84A36B73CBC0F4F470C02834CD0586879D1342DC9CA90659D6DC2E229
31,665,733 UART: [art] SIG.S = C2AB04AA616AE7168EAD129DF209D9BE1BFDD36ED5D49F240222B8FB763695B0E59D82638D40E81B0185BCD3D2716E10
32,970,768 UART: Caliptra RT
32,971,475 UART: [state] CFI Enabled
33,089,835 UART: [rt] RT listening for mailbox commands...
33,091,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,121,367 UART: [rt]cmd =0x46504c54, len=4
33,122,985 >>> mbox cmd response data (8 bytes)
33,124,115 UART: [rt] FIPS self test
33,125,061 UART: [kat] ++
33,125,513 UART: [kat] sha1
33,129,845 UART: [kat] SHA2-256
33,131,731 UART: [kat] SHA2-384
33,134,718 UART: [kat] SHA2-512-ACC
33,135,699 UART: Fatal Error: 0x90050001
33,170,855 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,315,243 >>> mbox cmd response: failed
33,315,923 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,459,851 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
10,599,750 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,546,077 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,309 UART:
192,692 UART: Running Caliptra ROM ...
193,898 UART:
194,053 UART: [state] CFI Enabled
263,494 UART: [state] LifecycleState = Unprovisioned
265,328 UART: [state] DebugLocked = No
266,655 UART: [state] WD Timer not started. Device not locked for debugging
269,631 UART: [kat] SHA2-256
448,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,303 UART: [kat] ++
460,755 UART: [kat] sha1
473,477 UART: [kat] SHA2-256
476,500 UART: [kat] SHA2-384
482,704 UART: [kat] SHA2-512-ACC
485,651 UART: [kat] ECC-384
2,950,490 UART: [kat] HMAC-384Kdf
2,973,648 UART: [kat] LMS
3,503,110 UART: [kat] --
3,506,535 UART: [cold-reset] ++
3,507,827 UART: [fht] FHT @ 0x50003400
3,518,850 UART: [idev] ++
3,519,409 UART: [idev] CDI.KEYID = 6
3,520,294 UART: [idev] SUBJECT.KEYID = 7
3,521,542 UART: [idev] UDS.KEYID = 0
3,522,469 ready_for_fw is high
3,522,726 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,407 UART: [idev] Erasing UDS.KEYID = 0
6,026,727 UART: [idev] Sha1 KeyId Algorithm
6,049,748 UART: [idev] --
6,054,337 UART: [ldev] ++
6,054,907 UART: [ldev] CDI.KEYID = 6
6,055,787 UART: [ldev] SUBJECT.KEYID = 5
6,057,003 UART: [ldev] AUTHORITY.KEYID = 7
6,058,241 UART: [ldev] FE.KEYID = 1
6,102,735 UART: [ldev] Erasing FE.KEYID = 1
8,607,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,518 UART: [ldev] --
10,416,033 UART: [fwproc] Wait for Commands...
10,419,113 UART: [fwproc] Recv command 0x46574c44
10,421,215 UART: [fwproc] Recv'd Img size: 114940 bytes
13,829,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,802 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,289,737 >>> mbox cmd response: success
14,294,617 UART: [afmc] ++
14,295,205 UART: [afmc] CDI.KEYID = 6
14,296,114 UART: [afmc] SUBJECT.KEYID = 7
14,297,274 UART: [afmc] AUTHORITY.KEYID = 5
16,833,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,885 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,595 UART: [afmc] --
18,634,354 UART: [cold-reset] --
18,638,696 UART: [state] Locking Datavault
18,641,403 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,100 UART: [state] Locking ICCM
18,644,143 UART: [exit] Launching FMC @ 0x40000130
18,652,538 UART:
18,652,817 UART: Running Caliptra FMC ...
18,653,931 UART:
18,654,089 UART: [state] CFI Enabled
18,715,311 UART: [fht] FMC Alias Private Key: 7
20,479,121 UART: [art] Extend RT PCRs Done
20,480,342 UART: [art] Lock RT PCRs Done
20,482,075 UART: [art] Populate DV Done
20,487,597 UART: [fht] FMC Alias Private Key: 7
20,489,244 UART: [art] Derive CDI
20,490,017 UART: [art] Store in in slot 0x4
20,547,548 UART: [art] Derive Key Pair
20,548,550 UART: [art] Store priv key in slot 0x5
23,012,216 UART: [art] Derive Key Pair - Done
23,025,612 UART: [art] Signing Cert with AUTHO
23,026,927 UART: RITY.KEYID = 7
24,737,970 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,477 UART: [art] PUB.X = 0C4E1E5F172BE5D3D474A9E73E824B14A43F85F258763F14B31EF9F87116D2886F92C33B3B2E4C91DB8EC5592B51A9FF
24,746,741 UART: [art] PUB.Y = F0D0108B6165BD0E870459009F9636B70A18CE760185B40DA4CD04FD286CF9BA670427D2EB095E77DB3738941E4D287C
24,753,980 UART: [art] SIG.R = 25D19491F88130165F2D0D32709F0E82DA2CA168B97E89A0B3C66691C79FC5C3E0EC76DA0933CA875D19717B17334C79
24,761,326 UART: [art] SIG.S = 402340FCB5FD5402A9CD8FD1532F0240EF148F868F4E496FD3452D106FAF258F1FA14B81AB713245608551666EEFE8F8
25,739,761 UART: Caliptra RT
25,740,480 UART: [state] CFI Enabled
25,905,551 UART: [rt] RT listening for mailbox commands...
25,907,416 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,937,029 UART: [rt]cmd =0x46504c54, len=4
25,938,810 >>> mbox cmd response data (8 bytes)
25,939,833 UART: [rt] FIPS self test
25,940,783 UART: [kat] ++
25,941,238 UART: [kat] sha1
25,945,477 UART: [kat] SHA2-256
25,947,409 UART: [kat] SHA2-384
25,950,310 UART: [kat] SHA2-512-ACC
25,951,248 UART: Fatal Error: 0x90050001
25,986,455 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,130,811 >>> mbox cmd response: failed
26,131,455 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,275,788 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,148 UART:
190,457 UART: Running Caliptra ROM ...
191,484 UART:
191,623 UART: [state] CFI Enabled
251,785 UART: [state] LifecycleState = Unprovisioned
253,704 UART: [state] DebugLocked = No
255,861 UART: [state] WD Timer not started. Device not locked for debugging
260,182 UART: [kat] SHA2-256
439,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,902 UART: [kat] ++
451,350 UART: [kat] sha1
461,788 UART: [kat] SHA2-256
464,836 UART: [kat] SHA2-384
470,709 UART: [kat] SHA2-512-ACC
473,648 UART: [kat] ECC-384
2,937,113 UART: [kat] HMAC-384Kdf
2,960,045 UART: [kat] LMS
3,489,515 UART: [kat] --
3,494,597 UART: [cold-reset] ++
3,496,997 UART: [fht] FHT @ 0x50003400
3,508,854 UART: [idev] ++
3,509,425 UART: [idev] CDI.KEYID = 6
3,510,543 UART: [idev] SUBJECT.KEYID = 7
3,511,648 UART: [idev] UDS.KEYID = 0
3,513,166 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,657,764 UART: [idev] Erasing UDS.KEYID = 0
6,016,871 UART: [idev] Sha1 KeyId Algorithm
6,039,884 UART: [idev] --
6,043,771 UART: [ldev] ++
6,044,344 UART: [ldev] CDI.KEYID = 6
6,045,256 UART: [ldev] SUBJECT.KEYID = 5
6,046,417 UART: [ldev] AUTHORITY.KEYID = 7
6,047,650 UART: [ldev] FE.KEYID = 1
6,088,677 UART: [ldev] Erasing FE.KEYID = 1
8,593,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,710 UART: [ldev] --
10,402,434 UART: [fwproc] Wait for Commands...
10,404,917 UART: [fwproc] Recv command 0x46574c44
10,407,016 UART: [fwproc] Recv'd Img size: 114940 bytes
13,813,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,224 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,284,473 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,358,892 ready_for_fw is high
3,359,289 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,051,616 >>> mbox cmd response: success
18,340,031 UART:
18,340,428 UART: Running Caliptra FMC ...
18,341,583 UART:
18,341,746 UART: [state] CFI Enabled
18,409,032 UART: [fht] FMC Alias Private Key: 7
20,172,877 UART: [art] Extend RT PCRs Done
20,174,094 UART: [art] Lock RT PCRs Done
20,175,647 UART: [art] Populate DV Done
20,181,078 UART: [fht] FMC Alias Private Key: 7
20,182,740 UART: [art] Derive CDI
20,183,561 UART: [art] Store in in slot 0x4
20,241,153 UART: [art] Derive Key Pair
20,242,188 UART: [art] Store priv key in slot 0x5
22,707,035 UART: [art] Derive Key Pair - Done
22,719,610 UART: [art] Signing Cert with AUTHO
22,720,972 UART: RITY.KEYID = 7
24,431,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,689 UART: [art] PUB.X = D646728CB6737386257A0D0F6B1D8C62781E4FB49B89AFA6EF220B4847464C0359A0EA6A7CF8CB8CDDE67FF1EE9811F8
24,440,639 UART: [art] PUB.Y = 8B60C01E273FAEBFEDECEAC8D174B6227CEF4F20A5ABF8EDE7BFC62959E61944E47C58B3517A08AA8B608610F7DBB8B3
24,447,924 UART: [art] SIG.R = 32671445B83981DA50D251508E370AD372E1AC89FF8FD7C94254221A252B4F836B77EE9DD922B798FE4882CB510CBF0F
24,455,324 UART: [art] SIG.S = 3C9F7A92E77E86E17BAC2C4C613BF16EFBC048D72E06646B1F08ECE6EB41CC6AE0453053BE11032E7A3CF3E45C0B8388
25,434,778 UART: Caliptra RT
25,435,502 UART: [state] CFI Enabled
25,601,581 UART: [rt] RT listening for mailbox commands...
25,603,438 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,633,039 UART: [rt]cmd =0x46504c54, len=4
25,634,462 >>> mbox cmd response data (8 bytes)
25,635,492 UART: [rt] FIPS self test
25,636,437 UART: [kat] ++
25,636,893 UART: [kat] sha1
25,641,513 UART: [kat] SHA2-256
25,643,464 UART: [kat] SHA2-384
25,646,318 UART: [kat] SHA2-512-ACC
25,647,247 UART: Fatal Error: 0x90050001
25,682,629 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,826,872 >>> mbox cmd response: failed
25,827,546 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,971,860 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,368,114 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,058,588 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
192,710 UART:
193,102 UART: Running Caliptra ROM ...
194,335 UART:
603,938 UART: [state] CFI Enabled
615,043 UART: [state] LifecycleState = Unprovisioned
616,853 UART: [state] DebugLocked = No
620,112 UART: [state] WD Timer not started. Device not locked for debugging
624,007 UART: [kat] SHA2-256
803,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,653 UART: [kat] ++
815,185 UART: [kat] sha1
826,633 UART: [kat] SHA2-256
829,646 UART: [kat] SHA2-384
836,277 UART: [kat] SHA2-512-ACC
839,215 UART: [kat] ECC-384
3,280,250 UART: [kat] HMAC-384Kdf
3,292,978 UART: [kat] LMS
3,822,460 UART: [kat] --
3,827,236 UART: [cold-reset] ++
3,828,669 UART: [fht] FHT @ 0x50003400
3,839,510 UART: [idev] ++
3,840,072 UART: [idev] CDI.KEYID = 6
3,840,955 UART: [idev] SUBJECT.KEYID = 7
3,842,074 UART: [idev] UDS.KEYID = 0
3,843,070 ready_for_fw is high
3,843,291 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,987,630 UART: [idev] Erasing UDS.KEYID = 0
6,316,277 UART: [idev] Sha1 KeyId Algorithm
6,338,059 UART: [idev] --
6,342,225 UART: [ldev] ++
6,342,804 UART: [ldev] CDI.KEYID = 6
6,343,716 UART: [ldev] SUBJECT.KEYID = 5
6,344,878 UART: [ldev] AUTHORITY.KEYID = 7
6,346,126 UART: [ldev] FE.KEYID = 1
6,357,963 UART: [ldev] Erasing FE.KEYID = 1
8,831,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,168 UART: [ldev] --
10,622,677 UART: [fwproc] Wait for Commands...
10,625,941 UART: [fwproc] Recv command 0x46574c44
10,628,047 UART: [fwproc] Recv'd Img size: 114940 bytes
14,039,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,332 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,499,111 >>> mbox cmd response: success
14,503,802 UART: [afmc] ++
14,504,411 UART: [afmc] CDI.KEYID = 6
14,505,322 UART: [afmc] SUBJECT.KEYID = 7
14,506,482 UART: [afmc] AUTHORITY.KEYID = 5
17,008,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,389 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,803,314 UART: [afmc] --
18,807,398 UART: [cold-reset] --
18,811,313 UART: [state] Locking Datavault
18,818,069 UART: [state] Locking PCR0, PCR1 and PCR31
18,819,722 UART: [state] Locking ICCM
18,821,983 UART: [exit] Launching FMC @ 0x40000130
18,830,378 UART:
18,830,631 UART: Running Caliptra FMC ...
18,831,738 UART:
18,831,904 UART: [state] CFI Enabled
18,840,004 UART: [fht] FMC Alias Private Key: 7
20,596,879 UART: [art] Extend RT PCRs Done
20,598,102 UART: [art] Lock RT PCRs Done
20,599,459 UART: [art] Populate DV Done
20,604,825 UART: [fht] FMC Alias Private Key: 7
20,606,414 UART: [art] Derive CDI
20,607,232 UART: [art] Store in in slot 0x4
20,650,049 UART: [art] Derive Key Pair
20,651,087 UART: [art] Store priv key in slot 0x5
23,077,137 UART: [art] Derive Key Pair - Done
23,090,077 UART: [art] Signing Cert with AUTHO
23,091,381 UART: RITY.KEYID = 7
24,796,847 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,376 UART: [art] PUB.X = 12FA0A3D86D33B5F6D42321A40C3F13E4E634F997F29C956106BBBCEC13673958025CD94679DC2C054929D65D0C299F5
24,805,580 UART: [art] PUB.Y = B3AD655D58B305EFAC2BBBB8A821955E2647BE113B7CAEB59A715BA24013F93AECB69C88C2FEBB814FF146EABBE9E765
24,812,924 UART: [art] SIG.R = 07124B2EEDEA21E09848CBA8FA27E4A0717A83FD4CF7C87FAC3B361AADFE0756481DA2871469BA59825180942A6693EE
24,820,325 UART: [art] SIG.S = F66B6A5B13A302ADAB48F255F0A9A13F443447790EDE84DB9B9748A946547A5E149A61926E373A18279E7435CA19606D
25,799,482 UART: Caliptra RT
25,800,192 UART: [state] CFI Enabled
25,917,254 UART: [rt] RT listening for mailbox commands...
25,919,104 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,948,593 UART: [rt]cmd =0x46504c54, len=4
25,950,114 >>> mbox cmd response data (8 bytes)
25,951,610 UART: [rt] FIPS self test
25,952,547 UART: [kat] ++
25,952,995 UART: [kat] sha1
25,957,235 UART: [kat] SHA2-256
25,959,160 UART: [kat] SHA2-384
25,962,012 UART: [kat] SHA2-512-ACC
25,962,922 UART: Fatal Error: 0x90050001
25,998,233 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,142,649 >>> mbox cmd response: failed
26,143,305 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,287,420 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,093 UART:
190,438 UART: Running Caliptra ROM ...
191,474 UART:
14,247,951 UART: [state] CFI Enabled
14,261,166 UART: [state] LifecycleState = Unprovisioned
14,263,070 UART: [state] DebugLocked = No
14,264,465 UART: [state] WD Timer not started. Device not locked for debugging
14,268,529 UART: [kat] SHA2-256
14,447,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,459,210 UART: [kat] ++
14,459,753 UART: [kat] sha1
14,471,131 UART: [kat] SHA2-256
14,474,148 UART: [kat] SHA2-384
14,480,458 UART: [kat] SHA2-512-ACC
14,483,394 UART: [kat] ECC-384
16,924,889 UART: [kat] HMAC-384Kdf
16,935,868 UART: [kat] LMS
17,465,380 UART: [kat] --
17,471,202 UART: [cold-reset] ++
17,472,319 UART: [fht] FHT @ 0x50003400
17,482,948 UART: [idev] ++
17,483,503 UART: [idev] CDI.KEYID = 6
17,484,442 UART: [idev] SUBJECT.KEYID = 7
17,485,650 UART: [idev] UDS.KEYID = 0
17,487,161 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,631,578 UART: [idev] Erasing UDS.KEYID = 0
19,958,573 UART: [idev] Sha1 KeyId Algorithm
19,981,520 UART: [idev] --
19,986,749 UART: [ldev] ++
19,987,315 UART: [ldev] CDI.KEYID = 6
19,988,226 UART: [ldev] SUBJECT.KEYID = 5
19,989,384 UART: [ldev] AUTHORITY.KEYID = 7
19,990,669 UART: [ldev] FE.KEYID = 1
20,000,282 UART: [ldev] Erasing FE.KEYID = 1
22,475,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,190,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,205,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,221,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,237,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,258,033 UART: [ldev] --
24,262,450 UART: [fwproc] Wait for Commands...
24,265,437 UART: [fwproc] Recv command 0x46574c44
24,267,483 UART: [fwproc] Recv'd Img size: 114940 bytes
27,679,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,748,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,817,642 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,137,197 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,697,539 ready_for_fw is high
3,697,951 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,283,112 >>> mbox cmd response: success
18,537,810 UART:
18,538,232 UART: Running Caliptra FMC ...
18,539,354 UART:
18,539,530 UART: [state] CFI Enabled
18,547,327 UART: [fht] FMC Alias Private Key: 7
20,304,401 UART: [art] Extend RT PCRs Done
20,305,775 UART: [art] Lock RT PCRs Done
20,307,274 UART: [art] Populate DV Done
20,312,540 UART: [fht] FMC Alias Private Key: 7
20,314,186 UART: [art] Derive CDI
20,314,925 UART: [art] Store in in slot 0x4
20,357,193 UART: [art] Derive Key Pair
20,358,196 UART: [art] Store priv key in slot 0x5
22,785,163 UART: [art] Derive Key Pair - Done
22,798,114 UART: [art] Signing Cert with AUTHO
22,799,425 UART: RITY.KEYID = 7
24,504,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,268 UART: [art] PUB.X = 9E4699D0B249CB687D746F6FA0565109D7059AD2BC6B26ED8211E43A7A8A63F5A7EC5748FD83E47E6D4900884CE38CD9
24,513,532 UART: [art] PUB.Y = F6A9FB233FA981D5F628D97BDC9BEB780E7C1C77661AD5949842E8C1D59506C40305CC10AF9DE12FB0C7EC3E1E9C97E7
24,520,800 UART: [art] SIG.R = 072BBB521099831C410FCD23BC919A6C4CA77AB8D8CB08820A7FDCB7B09DFF6E2889E512E3A4DE5B3C7B719C59E43709
24,528,199 UART: [art] SIG.S = F9E3C414D5E35BB3C0490F64702030D522C6349E6C3E01E112354F3045CD59C4175F83746966CDF63A0F1052113AD7A5
25,507,097 UART: Caliptra RT
25,507,821 UART: [state] CFI Enabled
25,624,679 UART: [rt] RT listening for mailbox commands...
25,626,532 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,656,487 UART: [rt]cmd =0x46504c54, len=4
25,658,007 >>> mbox cmd response data (8 bytes)
25,659,119 UART: [rt] FIPS self test
25,660,063 UART: [kat] ++
25,660,518 UART: [kat] sha1
25,664,883 UART: [kat] SHA2-256
25,666,807 UART: [kat] SHA2-384
25,669,882 UART: [kat] SHA2-512-ACC
25,670,911 UART: Fatal Error: 0x90050001
25,706,119 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,850,881 >>> mbox cmd response: failed
25,851,563 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,995,893 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,633,146 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,226,143 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,202 UART:
192,563 UART: Running Caliptra ROM ...
193,763 UART:
193,918 UART: [state] CFI Enabled
265,985 UART: [state] LifecycleState = Unprovisioned
268,343 UART: [state] DebugLocked = No
270,525 UART: [state] WD Timer not started. Device not locked for debugging
275,486 UART: [kat] SHA2-256
465,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,134 UART: [kat] ++
476,626 UART: [kat] sha1
488,075 UART: [kat] SHA2-256
491,105 UART: [kat] SHA2-384
497,669 UART: [kat] SHA2-512-ACC
500,258 UART: [kat] ECC-384
2,948,906 UART: [kat] HMAC-384Kdf
2,972,013 UART: [kat] LMS
3,503,744 UART: [kat] --
3,508,044 UART: [cold-reset] ++
3,510,278 UART: [fht] FHT @ 0x50003400
3,521,341 UART: [idev] ++
3,522,070 UART: [idev] CDI.KEYID = 6
3,522,958 UART: [idev] SUBJECT.KEYID = 7
3,524,207 UART: [idev] UDS.KEYID = 0
3,525,112 ready_for_fw is high
3,525,311 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,902 UART: [idev] Erasing UDS.KEYID = 0
6,033,491 UART: [idev] Sha1 KeyId Algorithm
6,056,450 UART: [idev] --
6,060,962 UART: [ldev] ++
6,061,657 UART: [ldev] CDI.KEYID = 6
6,062,545 UART: [ldev] SUBJECT.KEYID = 5
6,063,763 UART: [ldev] AUTHORITY.KEYID = 7
6,064,995 UART: [ldev] FE.KEYID = 1
6,101,248 UART: [ldev] Erasing FE.KEYID = 1
8,608,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,492 UART: [ldev] --
10,412,681 UART: [fwproc] Wait for Commands...
10,414,785 UART: [fwproc] Recv command 0x46574c44
10,417,050 UART: [fwproc] Recv'd Img size: 114940 bytes
13,878,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,398 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,614,342 >>> mbox cmd response: success
14,618,425 UART: [afmc] ++
14,619,121 UART: [afmc] CDI.KEYID = 6
14,620,365 UART: [afmc] SUBJECT.KEYID = 7
14,621,799 UART: [afmc] AUTHORITY.KEYID = 5
17,148,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,961 UART: [afmc] --
18,948,462 UART: [cold-reset] --
18,954,003 UART: [state] Locking Datavault
18,958,827 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,012 UART: [state] Locking ICCM
18,963,867 UART: [exit] Launching FMC @ 0x40000130
18,972,543 UART:
18,972,781 UART: Running Caliptra FMC ...
18,973,885 UART:
18,974,047 UART: [state] CFI Enabled
19,030,636 UART: [fht] FMC Alias Private Key: 7
20,794,115 UART: [art] Extend RT PCRs Done
20,795,336 UART: [art] Lock RT PCRs Done
20,797,017 UART: [art] Populate DV Done
20,802,488 UART: [fht] FMC Alias Private Key: 7
20,803,979 UART: [art] Derive CDI
20,804,714 UART: [art] Store in in slot 0x4
20,863,481 UART: [art] Derive Key Pair
20,864,525 UART: [art] Store priv key in slot 0x5
23,327,869 UART: [art] Derive Key Pair - Done
23,340,927 UART: [art] Signing Cert with AUTHO
23,342,260 UART: RITY.KEYID = 7
25,053,261 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,777 UART: [art] PUB.X = 6562C7EBDC850E3DE5E943D911037CF2E58E97B561D23A7BFA813968FF82CF68DEF8CAF00E3B8CABE84C9DB1210B6662
25,062,109 UART: [art] PUB.Y = 442ACFC863DD00948A187D25929272E9CDEDDDBBD3E964084D37426A777FBB0B8F91BE96B91AC5C00E51CC934DAFB8C0
25,069,329 UART: [art] SIG.R = A695ECFF541DCD8BEB5377581A0FE9681F2C0AFD238C401ADCE3CA3E1131FD045D299A0CB2435EEF771359DAD60E332B
25,076,754 UART: [art] SIG.S = 626B3EBE70A22CFAFCC03C3EAF091810B5CC0748620BFC0FE187AD05EB1FED31C69A43DF3E823CB5B55D34A69A9A0097
26,055,220 UART: Caliptra RT
26,055,918 UART: [state] CFI Enabled
26,221,817 UART: [rt] RT listening for mailbox commands...
26,223,689 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,529 UART: [rt]cmd =0x46504c54, len=4
26,254,914 >>> mbox cmd response data (8 bytes)
26,256,100 UART: [rt] FIPS self test
26,257,056 UART: [kat] ++
26,257,512 UART: [kat] sha1
26,261,971 UART: [kat] SHA2-256
26,263,852 UART: [kat] SHA2-384
26,266,761 UART: [kat] SHA2-512-ACC
26,267,646 UART: Fatal Error: 0x90050001
26,303,029 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,447,355 >>> mbox cmd response: failed
26,448,005 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,592,312 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,120 UART:
190,414 UART: Running Caliptra ROM ...
191,440 UART:
191,583 UART: [state] CFI Enabled
248,883 UART: [state] LifecycleState = Unprovisioned
251,266 UART: [state] DebugLocked = No
253,856 UART: [state] WD Timer not started. Device not locked for debugging
257,712 UART: [kat] SHA2-256
447,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,186 UART: [kat] ++
458,633 UART: [kat] sha1
470,486 UART: [kat] SHA2-256
473,495 UART: [kat] SHA2-384
480,197 UART: [kat] SHA2-512-ACC
482,759 UART: [kat] ECC-384
2,936,325 UART: [kat] HMAC-384Kdf
2,960,180 UART: [kat] LMS
3,491,932 UART: [kat] --
3,495,125 UART: [cold-reset] ++
3,496,466 UART: [fht] FHT @ 0x50003400
3,508,423 UART: [idev] ++
3,509,109 UART: [idev] CDI.KEYID = 6
3,510,075 UART: [idev] SUBJECT.KEYID = 7
3,511,299 UART: [idev] UDS.KEYID = 0
3,513,094 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,657,678 UART: [idev] Erasing UDS.KEYID = 0
6,018,845 UART: [idev] Sha1 KeyId Algorithm
6,042,049 UART: [idev] --
6,047,626 UART: [ldev] ++
6,048,336 UART: [ldev] CDI.KEYID = 6
6,049,226 UART: [ldev] SUBJECT.KEYID = 5
6,050,385 UART: [ldev] AUTHORITY.KEYID = 7
6,051,625 UART: [ldev] FE.KEYID = 1
6,087,910 UART: [ldev] Erasing FE.KEYID = 1
8,594,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,553 UART: [ldev] --
10,398,437 UART: [fwproc] Wait for Commands...
10,400,262 UART: [fwproc] Recv command 0x46574c44
10,402,526 UART: [fwproc] Recv'd Img size: 114940 bytes
13,863,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,016 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,602,377 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,439,274 ready_for_fw is high
3,439,797 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,744,036 >>> mbox cmd response: success
19,047,884 UART:
19,048,275 UART: Running Caliptra FMC ...
19,049,424 UART:
19,049,583 UART: [state] CFI Enabled
19,115,743 UART: [fht] FMC Alias Private Key: 7
20,880,121 UART: [art] Extend RT PCRs Done
20,881,341 UART: [art] Lock RT PCRs Done
20,882,916 UART: [art] Populate DV Done
20,888,279 UART: [fht] FMC Alias Private Key: 7
20,889,817 UART: [art] Derive CDI
20,890,633 UART: [art] Store in in slot 0x4
20,948,283 UART: [art] Derive Key Pair
20,949,321 UART: [art] Store priv key in slot 0x5
23,412,172 UART: [art] Derive Key Pair - Done
23,425,409 UART: [art] Signing Cert with AUTHO
23,426,709 UART: RITY.KEYID = 7
25,138,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,683 UART: [art] PUB.X = C7FF196A048D4A7F8FD562181B16064E85CB5ADE25F0A4787918C4BA4CD0886E0A14ABCAD559FDC4731DE4806EF09749
25,146,944 UART: [art] PUB.Y = B05126FE2E19AAB9FE1E558E04581B6A1F17E81D0E955569E2D1F43BD1F452F83F2284D6C8BF2E67E41EF0C077159AFA
25,154,227 UART: [art] SIG.R = EE400B6FF2EBF7E4CE52DB0FB968760973B03BDBB3889EC4E720BE18EB15E8943BD5525D529BC6F505C05902F27B64D6
25,161,644 UART: [art] SIG.S = 3FC4679DDE010A79388B8E477EF0DB2928CD3072B6F8361B62EFE3AA105F8CDCD86EC04846D57C1E20E25A29A503FB9E
26,140,474 UART: Caliptra RT
26,141,191 UART: [state] CFI Enabled
26,305,556 UART: [rt] RT listening for mailbox commands...
26,307,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,141 UART: [rt]cmd =0x46504c54, len=4
26,338,880 >>> mbox cmd response data (8 bytes)
26,339,879 UART: [rt] FIPS self test
26,340,827 UART: [kat] ++
26,341,279 UART: [kat] sha1
26,345,703 UART: [kat] SHA2-256
26,347,647 UART: [kat] SHA2-384
26,350,392 UART: [kat] SHA2-512-ACC
26,351,344 UART: Fatal Error: 0x90050001
26,386,673 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,531,044 >>> mbox cmd response: failed
26,531,647 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,675,910 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,425,354 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,727,200 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,431 UART:
192,829 UART: Running Caliptra ROM ...
194,032 UART:
603,745 UART: [state] CFI Enabled
615,490 UART: [state] LifecycleState = Unprovisioned
617,864 UART: [state] DebugLocked = No
620,392 UART: [state] WD Timer not started. Device not locked for debugging
624,215 UART: [kat] SHA2-256
814,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,876 UART: [kat] ++
825,326 UART: [kat] sha1
837,765 UART: [kat] SHA2-256
840,730 UART: [kat] SHA2-384
847,737 UART: [kat] SHA2-512-ACC
850,327 UART: [kat] ECC-384
3,294,477 UART: [kat] HMAC-384Kdf
3,307,583 UART: [kat] LMS
3,839,455 UART: [kat] --
3,845,365 UART: [cold-reset] ++
3,846,595 UART: [fht] FHT @ 0x50003400
3,857,575 UART: [idev] ++
3,858,286 UART: [idev] CDI.KEYID = 6
3,859,196 UART: [idev] SUBJECT.KEYID = 7
3,860,444 UART: [idev] UDS.KEYID = 0
3,861,370 ready_for_fw is high
3,861,579 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,005,945 UART: [idev] Erasing UDS.KEYID = 0
6,339,917 UART: [idev] Sha1 KeyId Algorithm
6,361,886 UART: [idev] --
6,366,343 UART: [ldev] ++
6,367,035 UART: [ldev] CDI.KEYID = 6
6,367,952 UART: [ldev] SUBJECT.KEYID = 5
6,369,114 UART: [ldev] AUTHORITY.KEYID = 7
6,370,364 UART: [ldev] FE.KEYID = 1
6,382,249 UART: [ldev] Erasing FE.KEYID = 1
8,861,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,676 UART: [ldev] --
10,653,992 UART: [fwproc] Wait for Commands...
10,657,272 UART: [fwproc] Recv command 0x46574c44
10,659,537 UART: [fwproc] Recv'd Img size: 114940 bytes
14,114,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,310,061 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,856,462 >>> mbox cmd response: success
14,860,241 UART: [afmc] ++
14,860,965 UART: [afmc] CDI.KEYID = 6
14,862,073 UART: [afmc] SUBJECT.KEYID = 7
14,863,610 UART: [afmc] AUTHORITY.KEYID = 5
17,362,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,907 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,905 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,451 UART: [afmc] --
19,158,118 UART: [cold-reset] --
19,161,926 UART: [state] Locking Datavault
19,167,387 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,517 UART: [state] Locking ICCM
19,171,697 UART: [exit] Launching FMC @ 0x40000130
19,180,367 UART:
19,180,622 UART: Running Caliptra FMC ...
19,181,729 UART:
19,181,889 UART: [state] CFI Enabled
19,189,829 UART: [fht] FMC Alias Private Key: 7
20,946,670 UART: [art] Extend RT PCRs Done
20,947,883 UART: [art] Lock RT PCRs Done
20,949,600 UART: [art] Populate DV Done
20,954,959 UART: [fht] FMC Alias Private Key: 7
20,956,559 UART: [art] Derive CDI
20,957,308 UART: [art] Store in in slot 0x4
21,000,038 UART: [art] Derive Key Pair
21,001,108 UART: [art] Store priv key in slot 0x5
23,428,287 UART: [art] Derive Key Pair - Done
23,441,123 UART: [art] Signing Cert with AUTHO
23,442,426 UART: RITY.KEYID = 7
25,148,179 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,698 UART: [art] PUB.X = E77A0DC5EF335B3D72AFD8DF943EFF67F29BD6EA1BF82C0FF8B4827DFB5A59EC013D2F182F16BD9D8607B49B0B5DF43B
25,157,002 UART: [art] PUB.Y = 68E09158B1C1E6E7BCAB491290EBF087E5C49FCBB332C668AAB5D4DB0477D3952B81E13786A3768F8F85A1A3CF499516
25,164,239 UART: [art] SIG.R = A2EEA1B75C4BFCE98EFFFC6FF42AA7AEB1BDB5F0383BA9808CCCAF429D8B72D3D497B0D9252EED99EA08A2DA83E4C3E2
25,171,695 UART: [art] SIG.S = 63CBF9233E6C8233922E86918EFB68CFFDEBDB192F3B8FF49C1420C1267F3E9D5386BC5216E17371891764D5BAD761C9
26,150,947 UART: Caliptra RT
26,151,643 UART: [state] CFI Enabled
26,268,450 UART: [rt] RT listening for mailbox commands...
26,270,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,073 UART: [rt]cmd =0x46504c54, len=4
26,301,655 >>> mbox cmd response data (8 bytes)
26,302,724 UART: [rt] FIPS self test
26,303,669 UART: [kat] ++
26,304,120 UART: [kat] sha1
26,308,596 UART: [kat] SHA2-256
26,310,478 UART: [kat] SHA2-384
26,313,380 UART: [kat] SHA2-512-ACC
26,314,339 UART: Fatal Error: 0x90050001
26,349,668 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,493,945 >>> mbox cmd response: failed
26,494,571 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,638,883 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,123 UART:
190,412 UART: Running Caliptra ROM ...
191,463 UART:
13,895,468 UART: [state] CFI Enabled
13,904,533 UART: [state] LifecycleState = Unprovisioned
13,906,882 UART: [state] DebugLocked = No
13,908,997 UART: [state] WD Timer not started. Device not locked for debugging
13,913,707 UART: [kat] SHA2-256
14,103,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,114,384 UART: [kat] ++
14,114,903 UART: [kat] sha1
14,125,520 UART: [kat] SHA2-256
14,128,534 UART: [kat] SHA2-384
14,134,356 UART: [kat] SHA2-512-ACC
14,136,982 UART: [kat] ECC-384
16,577,116 UART: [kat] HMAC-384Kdf
16,590,267 UART: [kat] LMS
17,122,113 UART: [kat] --
17,127,776 UART: [cold-reset] ++
17,129,331 UART: [fht] FHT @ 0x50003400
17,139,231 UART: [idev] ++
17,139,801 UART: [idev] CDI.KEYID = 6
17,140,734 UART: [idev] SUBJECT.KEYID = 7
17,141,943 UART: [idev] UDS.KEYID = 0
17,143,449 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,288,140 UART: [idev] Erasing UDS.KEYID = 0
19,623,085 UART: [idev] Sha1 KeyId Algorithm
19,644,888 UART: [idev] --
19,649,908 UART: [ldev] ++
19,650,595 UART: [ldev] CDI.KEYID = 6
19,651,477 UART: [ldev] SUBJECT.KEYID = 5
19,652,686 UART: [ldev] AUTHORITY.KEYID = 7
19,653,922 UART: [ldev] FE.KEYID = 1
19,665,402 UART: [ldev] Erasing FE.KEYID = 1
22,143,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,859,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,875,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,890,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,905,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,926,960 UART: [ldev] --
23,931,634 UART: [fwproc] Wait for Commands...
23,933,909 UART: [fwproc] Recv command 0x46574c44
23,936,224 UART: [fwproc] Recv'd Img size: 114940 bytes
27,390,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,464,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,580,360 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,127,001 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,755,104 ready_for_fw is high
3,755,740 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,975,211 >>> mbox cmd response: success
19,225,200 UART:
19,225,593 UART: Running Caliptra FMC ...
19,226,720 UART:
19,226,874 UART: [state] CFI Enabled
19,234,981 UART: [fht] FMC Alias Private Key: 7
20,991,824 UART: [art] Extend RT PCRs Done
20,993,049 UART: [art] Lock RT PCRs Done
20,994,925 UART: [art] Populate DV Done
21,000,514 UART: [fht] FMC Alias Private Key: 7
21,002,122 UART: [art] Derive CDI
21,002,869 UART: [art] Store in in slot 0x4
21,045,478 UART: [art] Derive Key Pair
21,046,524 UART: [art] Store priv key in slot 0x5
23,473,244 UART: [art] Derive Key Pair - Done
23,486,256 UART: [art] Signing Cert with AUTHO
23,487,572 UART: RITY.KEYID = 7
25,193,588 UART: [art] Erasing AUTHORITY.KEYID = 7
25,195,098 UART: [art] PUB.X = 57D63748D03CD29E4349D3182D55BFCEA3D3AE105174267EEC5A2FD7E6BF31FA6F9122B6E5CA6051860C9D51943934EB
25,202,396 UART: [art] PUB.Y = 26214434AD7923FDB387550133076701BB4D213079107002372E58EE283BDD103746A1DD0F2D050C014FFFFD4EFDE8EE
25,209,640 UART: [art] SIG.R = CB567CD9D828699678CB9AC99BCA586BE8E2EFFDE9DA2FFFC909E19BBDA86E781ECC3479EB4E9632C9173D1EEF008C9B
25,217,028 UART: [art] SIG.S = 78103186AC3FE8BC93E23F75C527EC5AEC13B57920E01BFE05D279E038A9910CDEAA23943FBC6F1D7C3614AE7550DE54
26,195,337 UART: Caliptra RT
26,196,057 UART: [state] CFI Enabled
26,313,681 UART: [rt] RT listening for mailbox commands...
26,315,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,345,213 UART: [rt]cmd =0x46504c54, len=4
26,346,845 >>> mbox cmd response data (8 bytes)
26,348,375 UART: [rt] FIPS self test
26,349,313 UART: [kat] ++
26,349,782 UART: [kat] sha1
26,354,350 UART: [kat] SHA2-256
26,356,276 UART: [kat] SHA2-384
26,359,183 UART: [kat] SHA2-512-ACC
26,360,134 UART: Fatal Error: 0x90050001
26,395,464 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,539,685 >>> mbox cmd response: failed
26,540,333 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,684,609 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,001,371 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,217,339 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,899 UART: [kat] SHA2-256
881,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,945 UART: [kat] ++
886,097 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,104 UART: [kat] LMS
1,475,300 UART: [kat] --
1,476,071 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,446 UART: [idev] ++
1,479,614 UART: [idev] CDI.KEYID = 6
1,479,974 UART: [idev] SUBJECT.KEYID = 7
1,480,398 UART: [idev] UDS.KEYID = 0
1,480,743 ready_for_fw is high
1,480,743 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,576 UART: [idev] Erasing UDS.KEYID = 0
1,504,970 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,694 UART: [idev] --
1,514,959 UART: [ldev] ++
1,515,127 UART: [ldev] CDI.KEYID = 6
1,515,490 UART: [ldev] SUBJECT.KEYID = 5
1,515,916 UART: [ldev] AUTHORITY.KEYID = 7
1,516,379 UART: [ldev] FE.KEYID = 1
1,521,495 UART: [ldev] Erasing FE.KEYID = 1
1,547,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,070 UART: [ldev] --
1,586,561 UART: [fwproc] Waiting for Commands...
1,587,326 UART: [fwproc] Received command 0x46574c44
1,588,117 UART: [fwproc] Received Image of size 114940 bytes
2,892,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,007 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,736 >>> mbox cmd response: success
3,085,972 UART: [afmc] ++
3,086,140 UART: [afmc] CDI.KEYID = 6
3,086,502 UART: [afmc] SUBJECT.KEYID = 7
3,086,927 UART: [afmc] AUTHORITY.KEYID = 5
3,122,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,400 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,144,908 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,150,793 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,483 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,364 UART: [afmc] --
3,165,270 UART: [cold-reset] --
3,166,082 UART: [state] Locking Datavault
3,167,167 UART: [state] Locking PCR0, PCR1 and PCR31
3,167,771 UART: [state] Locking ICCM
3,168,287 UART: [exit] Launching FMC @ 0x40000130
3,173,616 UART:
3,173,632 UART: Running Caliptra FMC ...
3,174,040 UART:
3,174,094 UART: [state] CFI Enabled
3,184,327 UART: [fht] FMC Alias Private Key: 7
3,292,662 UART: [art] Extend RT PCRs Done
3,293,090 UART: [art] Lock RT PCRs Done
3,294,594 UART: [art] Populate DV Done
3,302,883 UART: [fht] FMC Alias Private Key: 7
3,303,923 UART: [art] Derive CDI
3,304,203 UART: [art] Store in in slot 0x4
3,389,962 UART: [art] Derive Key Pair
3,390,322 UART: [art] Store priv key in slot 0x5
3,403,762 UART: [art] Derive Key Pair - Done
3,418,596 UART: [art] Signing Cert with AUTHO
3,419,076 UART: RITY.KEYID = 7
3,434,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,939 UART: [art] PUB.X = 818C0B6D129AE69543576DFB5564BC89CD0D8C54999E970FCC7B426B6FFEF0AB8EB9268AE340985EF016A595DFC2B4FE
3,441,716 UART: [art] PUB.Y = 3466A97F86661D19F3C3C27DCF32FE6680C8B778DD6ADEF57E86665330D8E56B22B0536B674F7493E53388E056A96FED
3,448,668 UART: [art] SIG.R = C925DE63963CD1AB504A4318AFB6684A2F99250A95D6C996820F111A2B00ED429C79222E72C19C3584EA2C441778E084
3,455,406 UART: [art] SIG.S = 3CE39B357E32C819FE4A27EDD2A178864E52A49C9589FF57E0AB7B4AF213879BCF27E20311C9FC7BDA2339B2BDECF07B
3,479,196 UART: Caliptra RT
3,479,449 UART: [state] CFI Enabled
3,587,346 UART: [rt] RT listening for mailbox commands...
3,588,009 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,044 UART: [rt]cmd =0x46504c54, len=4
3,619,172 >>> mbox cmd response data (8 bytes)
3,619,427 UART: [rt] FIPS self test
3,619,755 UART: [kat] ++
3,619,907 UART: [kat] sha1
3,624,021 UART: [kat] SHA2-256
3,626,043 UART: [kat] SHA2-384
3,628,784 UART: [kat] SHA2-512-ACC
3,629,490 UART: Fatal Error: 0x90050001
3,631,029 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,631,034 >>> mbox cmd response: failed
3,631,034 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,631,039 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,580 UART: [state] LifecycleState = Unprovisioned
85,235 UART: [state] DebugLocked = No
85,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,377 UART: [kat] SHA2-256
881,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,423 UART: [kat] ++
885,575 UART: [kat] sha1
889,781 UART: [kat] SHA2-256
891,719 UART: [kat] SHA2-384
894,340 UART: [kat] SHA2-512-ACC
896,241 UART: [kat] ECC-384
901,734 UART: [kat] HMAC-384Kdf
906,322 UART: [kat] LMS
1,474,518 UART: [kat] --
1,475,435 UART: [cold-reset] ++
1,475,775 UART: [fht] Storing FHT @ 0x50003400
1,478,544 UART: [idev] ++
1,478,712 UART: [idev] CDI.KEYID = 6
1,479,072 UART: [idev] SUBJECT.KEYID = 7
1,479,496 UART: [idev] UDS.KEYID = 0
1,479,841 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,622 UART: [idev] Erasing UDS.KEYID = 0
1,503,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,124 UART: [idev] --
1,513,285 UART: [ldev] ++
1,513,453 UART: [ldev] CDI.KEYID = 6
1,513,816 UART: [ldev] SUBJECT.KEYID = 5
1,514,242 UART: [ldev] AUTHORITY.KEYID = 7
1,514,705 UART: [ldev] FE.KEYID = 1
1,519,853 UART: [ldev] Erasing FE.KEYID = 1
1,545,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,610 UART: [ldev] --
1,584,915 UART: [fwproc] Waiting for Commands...
1,585,558 UART: [fwproc] Received command 0x46574c44
1,586,349 UART: [fwproc] Received Image of size 114940 bytes
2,891,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,076 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,311 ready_for_fw is high
1,362,311 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,720 >>> mbox cmd response: success
2,997,418 UART:
2,997,434 UART: Running Caliptra FMC ...
2,997,842 UART:
2,997,896 UART: [state] CFI Enabled
3,008,687 UART: [fht] FMC Alias Private Key: 7
3,116,790 UART: [art] Extend RT PCRs Done
3,117,218 UART: [art] Lock RT PCRs Done
3,118,864 UART: [art] Populate DV Done
3,127,213 UART: [fht] FMC Alias Private Key: 7
3,128,395 UART: [art] Derive CDI
3,128,675 UART: [art] Store in in slot 0x4
3,214,192 UART: [art] Derive Key Pair
3,214,552 UART: [art] Store priv key in slot 0x5
3,227,654 UART: [art] Derive Key Pair - Done
3,242,278 UART: [art] Signing Cert with AUTHO
3,242,758 UART: RITY.KEYID = 7
3,258,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,909 UART: [art] PUB.X = DD70D8191CA81EBD7957D0A4F031D18E45A13965D28349339D76D37B40A2599AD2A789424B5D2CF7B54345702AE94DD7
3,265,679 UART: [art] PUB.Y = E34DC8058921EAA7EC4B0DEBF7A1EA71D65CA6B870BBB0D8462A4AE681E3A92726D62799D51E1A5E82B22C0E1C8DA53A
3,272,640 UART: [art] SIG.R = 658F9A861004FD0F883EA0EE7B7A0F210A7DA199CBFEEF257056CC3DFA64A318C651B06F737DDC83079BA2287A86B8A8
3,279,409 UART: [art] SIG.S = A2445A270C0966B92E09EBF38A3EDBECB0C88DC59E852466BB4B61CA9263CBE10FC0F1EDAC11288A7451414804D50CA2
3,302,968 UART: Caliptra RT
3,303,221 UART: [state] CFI Enabled
3,411,110 UART: [rt] RT listening for mailbox commands...
3,411,773 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,660 UART: [rt]cmd =0x46504c54, len=4
3,442,800 >>> mbox cmd response data (8 bytes)
3,442,933 UART: [rt] FIPS self test
3,443,261 UART: [kat] ++
3,443,413 UART: [kat] sha1
3,447,799 UART: [kat] SHA2-256
3,449,821 UART: [kat] SHA2-384
3,452,744 UART: [kat] SHA2-512-ACC
3,453,360 UART: Fatal Error: 0x90050001
3,454,899 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,904 >>> mbox cmd response: failed
3,454,904 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,092 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
86,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,645 UART: [kat] SHA2-512-ACC
897,546 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
907,993 UART: [kat] LMS
1,476,189 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,479,985 UART: [idev] ++
1,480,153 UART: [idev] CDI.KEYID = 6
1,480,513 UART: [idev] SUBJECT.KEYID = 7
1,480,937 UART: [idev] UDS.KEYID = 0
1,481,282 ready_for_fw is high
1,481,282 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,417 UART: [idev] Erasing UDS.KEYID = 0
1,506,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,765 UART: [idev] --
1,515,648 UART: [ldev] ++
1,515,816 UART: [ldev] CDI.KEYID = 6
1,516,179 UART: [ldev] SUBJECT.KEYID = 5
1,516,605 UART: [ldev] AUTHORITY.KEYID = 7
1,517,068 UART: [ldev] FE.KEYID = 1
1,522,468 UART: [ldev] Erasing FE.KEYID = 1
1,548,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,157 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,275 UART: [fwproc] Received command 0x46574c44
1,589,066 UART: [fwproc] Received Image of size 114940 bytes
2,895,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,820 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,088,987 >>> mbox cmd response: success
3,090,223 UART: [afmc] ++
3,090,391 UART: [afmc] CDI.KEYID = 6
3,090,753 UART: [afmc] SUBJECT.KEYID = 7
3,091,178 UART: [afmc] AUTHORITY.KEYID = 5
3,126,257 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,763 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,543 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,156 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,846 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,751 UART: [afmc] --
3,169,681 UART: [cold-reset] --
3,170,749 UART: [state] Locking Datavault
3,172,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,742 UART: [state] Locking ICCM
3,173,276 UART: [exit] Launching FMC @ 0x40000130
3,178,605 UART:
3,178,621 UART: Running Caliptra FMC ...
3,179,029 UART:
3,179,172 UART: [state] CFI Enabled
3,190,409 UART: [fht] FMC Alias Private Key: 7
3,298,090 UART: [art] Extend RT PCRs Done
3,298,518 UART: [art] Lock RT PCRs Done
3,299,804 UART: [art] Populate DV Done
3,307,851 UART: [fht] FMC Alias Private Key: 7
3,308,829 UART: [art] Derive CDI
3,309,109 UART: [art] Store in in slot 0x4
3,394,628 UART: [art] Derive Key Pair
3,394,988 UART: [art] Store priv key in slot 0x5
3,408,580 UART: [art] Derive Key Pair - Done
3,423,439 UART: [art] Signing Cert with AUTHO
3,423,919 UART: RITY.KEYID = 7
3,438,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,630 UART: [art] PUB.X = FA5B44076E967A689B55523D3A9D9D4FC16C14818D1EC11A7A4EBB1464D8B69E1CA053806928D46B82936087E9E0D3F0
3,446,399 UART: [art] PUB.Y = 608224B099802FB954545719B80295CD208BBF2B3DDE48888FE91962815019CEED59AE74979A462B50F002FD67DD7AEF
3,453,343 UART: [art] SIG.R = 6B533C05B607783D99F3744BE8D4470FDDB3E055F6BB1470D0D0D927C7C98D23B5B0F6A3C69A130533E70E3622ADDD61
3,460,104 UART: [art] SIG.S = 704333B1BDA0BA470AF0878C7AC3310DB3066B19EE4FC007D52BFD123DD2F710B2EBF0E3DD088DEE0DF050415BECEE01
3,483,644 UART: Caliptra RT
3,483,989 UART: [state] CFI Enabled
3,592,027 UART: [rt] RT listening for mailbox commands...
3,592,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,393 UART: [rt]cmd =0x46504c54, len=4
3,623,481 >>> mbox cmd response data (8 bytes)
3,623,716 UART: [rt] FIPS self test
3,624,044 UART: [kat] ++
3,624,196 UART: [kat] sha1
3,628,522 UART: [kat] SHA2-256
3,630,544 UART: [kat] SHA2-384
3,633,195 UART: [kat] SHA2-512-ACC
3,633,689 UART: Fatal Error: 0x90050001
3,635,228 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,233 >>> mbox cmd response: failed
3,635,233 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,635,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,576 UART: [kat] SHA2-256
882,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,622 UART: [kat] ++
886,774 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,989 UART: [kat] HMAC-384Kdf
907,779 UART: [kat] LMS
1,475,975 UART: [kat] --
1,476,468 UART: [cold-reset] ++
1,477,006 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,007 UART: [idev] Erasing UDS.KEYID = 0
1,505,733 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,521,900 UART: [ldev] Erasing FE.KEYID = 1
1,548,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,061 UART: [ldev] --
1,587,474 UART: [fwproc] Waiting for Commands...
1,588,257 UART: [fwproc] Received command 0x46574c44
1,589,048 UART: [fwproc] Received Image of size 114940 bytes
2,894,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,757 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,860 ready_for_fw is high
1,362,860 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,639 >>> mbox cmd response: success
2,997,657 UART:
2,997,673 UART: Running Caliptra FMC ...
2,998,081 UART:
2,998,224 UART: [state] CFI Enabled
3,008,817 UART: [fht] FMC Alias Private Key: 7
3,117,538 UART: [art] Extend RT PCRs Done
3,117,966 UART: [art] Lock RT PCRs Done
3,119,690 UART: [art] Populate DV Done
3,127,753 UART: [fht] FMC Alias Private Key: 7
3,128,809 UART: [art] Derive CDI
3,129,089 UART: [art] Store in in slot 0x4
3,214,624 UART: [art] Derive Key Pair
3,214,984 UART: [art] Store priv key in slot 0x5
3,228,296 UART: [art] Derive Key Pair - Done
3,243,208 UART: [art] Signing Cert with AUTHO
3,243,688 UART: RITY.KEYID = 7
3,258,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,527 UART: [art] PUB.X = 5E7B6A14D46F70047A1465ABC345DAE34421B5E78EB6C1F2B8324D3BDAE04D36F0FCB69C835450D24D5566C6D0ABC633
3,266,306 UART: [art] PUB.Y = D87C6E95852CC4037FAC0C98091035CEBF4CFE1CA3CAAE39F612809051E783B4457E1120A8E7BFC27CC4FDF171E636F3
3,273,261 UART: [art] SIG.R = 566495720797D239D056C211D74D153F6C56CF4C3DEC2898ADDDEDAD6B27586F2C72C60BBD9BD72AF373158E58654689
3,280,029 UART: [art] SIG.S = 70B362EC0A65D51F4CE0574C2A067C977A3317883364C6EC100207EEF93CF8E916B2A455AC16EC274CB9D1EEEDE54320
3,303,990 UART: Caliptra RT
3,304,335 UART: [state] CFI Enabled
3,413,239 UART: [rt] RT listening for mailbox commands...
3,413,902 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,751 UART: [rt]cmd =0x46504c54, len=4
3,444,893 >>> mbox cmd response data (8 bytes)
3,445,200 UART: [rt] FIPS self test
3,445,528 UART: [kat] ++
3,445,680 UART: [kat] sha1
3,449,814 UART: [kat] SHA2-256
3,451,836 UART: [kat] SHA2-384
3,454,661 UART: [kat] SHA2-512-ACC
3,455,261 UART: Fatal Error: 0x90050001
3,456,800 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,456,805 >>> mbox cmd response: failed
3,456,805 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,456,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,938,853 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,680 UART: [state] LifecycleState = Unprovisioned
85,335 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
892,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,059 UART: [kat] ++
897,211 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,104 UART: [kat] SHA2-512-ACC
908,005 UART: [kat] ECC-384
917,540 UART: [kat] HMAC-384Kdf
922,046 UART: [kat] LMS
1,170,374 UART: [kat] --
1,171,155 UART: [cold-reset] ++
1,171,517 UART: [fht] FHT @ 0x50003400
1,174,272 UART: [idev] ++
1,174,440 UART: [idev] CDI.KEYID = 6
1,174,800 UART: [idev] SUBJECT.KEYID = 7
1,175,224 UART: [idev] UDS.KEYID = 0
1,175,569 ready_for_fw is high
1,175,569 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,543 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,604 UART: [ldev] SUBJECT.KEYID = 5
1,210,030 UART: [ldev] AUTHORITY.KEYID = 7
1,210,493 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,241,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,233 UART: [ldev] --
1,280,686 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,144 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,232 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,979 >>> mbox cmd response: success
2,782,133 UART: [afmc] ++
2,782,301 UART: [afmc] CDI.KEYID = 6
2,782,663 UART: [afmc] SUBJECT.KEYID = 7
2,783,088 UART: [afmc] AUTHORITY.KEYID = 5
2,818,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,676 UART: [afmc] --
2,861,720 UART: [cold-reset] --
2,862,502 UART: [state] Locking Datavault
2,863,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,303 UART: [state] Locking ICCM
2,864,769 UART: [exit] Launching FMC @ 0x40000130
2,870,098 UART:
2,870,114 UART: Running Caliptra FMC ...
2,870,522 UART:
2,870,576 UART: [state] CFI Enabled
2,880,653 UART: [fht] FMC Alias Private Key: 7
2,988,328 UART: [art] Extend RT PCRs Done
2,988,756 UART: [art] Lock RT PCRs Done
2,990,510 UART: [art] Populate DV Done
2,998,811 UART: [fht] FMC Alias Private Key: 7
2,999,985 UART: [art] Derive CDI
3,000,265 UART: [art] Store in in slot 0x4
3,085,734 UART: [art] Derive Key Pair
3,086,094 UART: [art] Store priv key in slot 0x5
3,099,178 UART: [art] Derive Key Pair - Done
3,114,068 UART: [art] Signing Cert with AUTHO
3,114,548 UART: RITY.KEYID = 7
3,129,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,753 UART: [art] PUB.X = 9661DFAFE7474BF35BD5DF6B1C6B2192A49070552D2AFB1EA1B52DEA7EBF5059021D640F0C62F7D1837CA92AAD43BE7B
3,137,534 UART: [art] PUB.Y = 9FCBA040676ABEABDD66EFAF4623FCB1A7CFA45E085D0AE2A400EFBECB0F979FC5F21B39106D489F930FF10BACB6AE25
3,144,481 UART: [art] SIG.R = 980C12E97D840B0CEBD23EDC7566C3CE126FC988937B319A3B74F66D7CC9F1B135ED929C39D8B532E2164BEE545222A6
3,151,250 UART: [art] SIG.S = 36DF89D1DBEAC782B1DE173B768C70EFDC33EDDA47DD430C0B447B54E042377E3003CEBE47732CD58847917DD05EA437
3,174,580 UART: Caliptra RT
3,174,833 UART: [state] CFI Enabled
3,281,558 UART: [rt] RT listening for mailbox commands...
3,282,221 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,982 UART: [rt]cmd =0x46504c54, len=4
3,313,120 >>> mbox cmd response data (8 bytes)
3,313,315 UART: [rt] FIPS self test
3,313,643 UART: [kat] ++
3,313,795 UART: [kat] sha1
3,318,159 UART: [kat] SHA2-256
3,320,181 UART: [kat] SHA2-384
3,323,040 UART: [kat] SHA2-512-ACC
3,323,686 UART: Fatal Error: 0x90050001
3,325,225 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,230 >>> mbox cmd response: failed
3,325,230 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
88,004 UART: [kat] SHA2-256
893,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,779 UART: [kat] ++
897,931 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
907,034 UART: [kat] SHA2-512-ACC
908,935 UART: [kat] ECC-384
918,134 UART: [kat] HMAC-384Kdf
922,654 UART: [kat] LMS
1,170,982 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,183 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,828 UART: [idev] Erasing UDS.KEYID = 0
1,201,087 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,681 UART: [ldev] ++
1,210,849 UART: [ldev] CDI.KEYID = 6
1,211,212 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,315 UART: [ldev] Erasing FE.KEYID = 1
1,244,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,157 UART: [ldev] --
1,283,578 UART: [fwproc] Wait for Commands...
1,284,148 UART: [fwproc] Recv command 0x46574c44
1,284,876 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,840 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,595 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,233 ready_for_fw is high
1,061,233 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,646 >>> mbox cmd response: success
2,698,620 UART:
2,698,636 UART: Running Caliptra FMC ...
2,699,044 UART:
2,699,098 UART: [state] CFI Enabled
2,709,375 UART: [fht] FMC Alias Private Key: 7
2,817,052 UART: [art] Extend RT PCRs Done
2,817,480 UART: [art] Lock RT PCRs Done
2,819,146 UART: [art] Populate DV Done
2,827,323 UART: [fht] FMC Alias Private Key: 7
2,828,403 UART: [art] Derive CDI
2,828,683 UART: [art] Store in in slot 0x4
2,914,688 UART: [art] Derive Key Pair
2,915,048 UART: [art] Store priv key in slot 0x5
2,928,062 UART: [art] Derive Key Pair - Done
2,942,782 UART: [art] Signing Cert with AUTHO
2,943,262 UART: RITY.KEYID = 7
2,958,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,213 UART: [art] PUB.X = 17F753E6BA70212322F3BCF73DEB8F256C313A019A810917812FB10AEB948A61BC80962BD2116037F739A20FDE1AD853
2,965,973 UART: [art] PUB.Y = 06461665AD851B5E22492DDAAA0DE6AEF6E3B2E74DC9E913084F85179A5197450F87615778DBE81604D937CEC89605C6
2,972,905 UART: [art] SIG.R = D76C9C0B6F5E5736B07CABDD887C883D425C66D0D4E3AE67722F4E3E96D66F42BF43534CDEDDD9C4D8264083CCC01175
2,979,686 UART: [art] SIG.S = 43B3540FBB3A856D2EE0A6263F935FC37211558AE7C4C129AA768BA0162C63F395D62F298544714DB25F73000096AB3D
3,003,522 UART: Caliptra RT
3,003,775 UART: [state] CFI Enabled
3,111,856 UART: [rt] RT listening for mailbox commands...
3,112,519 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,466 UART: [rt]cmd =0x46504c54, len=4
3,143,676 >>> mbox cmd response data (8 bytes)
3,143,927 UART: [rt] FIPS self test
3,144,255 UART: [kat] ++
3,144,407 UART: [kat] sha1
3,148,687 UART: [kat] SHA2-256
3,150,709 UART: [kat] SHA2-384
3,153,668 UART: [kat] SHA2-512-ACC
3,154,182 UART: Fatal Error: 0x90050001
3,155,721 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,726 >>> mbox cmd response: failed
3,155,726 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,155,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,185 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,908 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,473 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,862 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 ready_for_fw is high
1,176,960 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,887 UART: [idev] Erasing UDS.KEYID = 0
1,202,012 UART: [idev] Sha1 KeyId Algorithm
1,210,464 UART: [idev] --
1,211,330 UART: [ldev] ++
1,211,498 UART: [ldev] CDI.KEYID = 6
1,211,861 UART: [ldev] SUBJECT.KEYID = 5
1,212,287 UART: [ldev] AUTHORITY.KEYID = 7
1,212,750 UART: [ldev] FE.KEYID = 1
1,218,084 UART: [ldev] Erasing FE.KEYID = 1
1,245,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,246 UART: [ldev] --
1,284,759 UART: [fwproc] Wait for Commands...
1,285,439 UART: [fwproc] Recv command 0x46574c44
1,286,167 UART: [fwproc] Recv'd Img size: 114940 bytes
2,592,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,673 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,785,392 >>> mbox cmd response: success
2,786,628 UART: [afmc] ++
2,786,796 UART: [afmc] CDI.KEYID = 6
2,787,158 UART: [afmc] SUBJECT.KEYID = 7
2,787,583 UART: [afmc] AUTHORITY.KEYID = 5
2,823,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,485 UART: [afmc] --
2,866,557 UART: [cold-reset] --
2,867,559 UART: [state] Locking Datavault
2,868,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,494 UART: [state] Locking ICCM
2,870,078 UART: [exit] Launching FMC @ 0x40000130
2,875,407 UART:
2,875,423 UART: Running Caliptra FMC ...
2,875,831 UART:
2,875,974 UART: [state] CFI Enabled
2,886,117 UART: [fht] FMC Alias Private Key: 7
2,994,856 UART: [art] Extend RT PCRs Done
2,995,284 UART: [art] Lock RT PCRs Done
2,996,816 UART: [art] Populate DV Done
3,005,073 UART: [fht] FMC Alias Private Key: 7
3,006,081 UART: [art] Derive CDI
3,006,361 UART: [art] Store in in slot 0x4
3,092,646 UART: [art] Derive Key Pair
3,093,006 UART: [art] Store priv key in slot 0x5
3,106,242 UART: [art] Derive Key Pair - Done
3,120,996 UART: [art] Signing Cert with AUTHO
3,121,476 UART: RITY.KEYID = 7
3,136,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,521 UART: [art] PUB.X = D6FFD81247A41ECA63B74C0A5B2FEE050AF057354C2C350D02C95ACFB69F2DECEF7F70318BF7867EB60ABD22AC249291
3,144,293 UART: [art] PUB.Y = E31C01FDCDE6FA50B36C6589A13C4EB8FDAAF70F32BCD0033BBCD6EF31C1B553165CDEE9D3A1967C2A3E1AF6B4F5E6BA
3,151,268 UART: [art] SIG.R = 9E71D92BBA3C57361FD9CB6994EF5CBD3382340818BB0BE56C5695FEBF65914C3EC913F2343424D8BDB5E3EFAA1A0026
3,158,024 UART: [art] SIG.S = 8954ACB1917947CFDE619C599433E86AB6864EA377599D4AA74898040242FA6753E7CDF82B3D3B226E6B179CB7589BC1
3,182,035 UART: Caliptra RT
3,182,380 UART: [state] CFI Enabled
3,290,142 UART: [rt] RT listening for mailbox commands...
3,290,805 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,876 UART: [rt]cmd =0x46504c54, len=4
3,322,174 >>> mbox cmd response data (8 bytes)
3,322,363 UART: [rt] FIPS self test
3,322,691 UART: [kat] ++
3,322,843 UART: [kat] sha1
3,327,145 UART: [kat] SHA2-256
3,329,167 UART: [kat] SHA2-384
3,331,984 UART: [kat] SHA2-512-ACC
3,332,558 UART: Fatal Error: 0x90050001
3,334,097 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,334,102 >>> mbox cmd response: failed
3,334,102 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,334,107 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,280 UART: [state] WD Timer not started. Device not locked for debugging
88,555 UART: [kat] SHA2-256
894,205 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,330 UART: [kat] ++
898,482 UART: [kat] sha1
902,674 UART: [kat] SHA2-256
904,614 UART: [kat] SHA2-384
907,257 UART: [kat] SHA2-512-ACC
909,158 UART: [kat] ECC-384
918,859 UART: [kat] HMAC-384Kdf
923,599 UART: [kat] LMS
1,171,927 UART: [kat] --
1,172,618 UART: [cold-reset] ++
1,173,122 UART: [fht] FHT @ 0x50003400
1,175,773 UART: [idev] ++
1,175,941 UART: [idev] CDI.KEYID = 6
1,176,301 UART: [idev] SUBJECT.KEYID = 7
1,176,725 UART: [idev] UDS.KEYID = 0
1,177,070 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,629 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,924 UART: [ldev] ++
1,211,092 UART: [ldev] CDI.KEYID = 6
1,211,455 UART: [ldev] SUBJECT.KEYID = 5
1,211,881 UART: [ldev] AUTHORITY.KEYID = 7
1,212,344 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,960 UART: [ldev] --
1,283,341 UART: [fwproc] Wait for Commands...
1,284,087 UART: [fwproc] Recv command 0x46574c44
1,284,815 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,131 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,435 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,136 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,372 ready_for_fw is high
1,061,372 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,115 >>> mbox cmd response: success
2,698,309 UART:
2,698,325 UART: Running Caliptra FMC ...
2,698,733 UART:
2,698,876 UART: [state] CFI Enabled
2,709,453 UART: [fht] FMC Alias Private Key: 7
2,817,386 UART: [art] Extend RT PCRs Done
2,817,814 UART: [art] Lock RT PCRs Done
2,819,510 UART: [art] Populate DV Done
2,827,725 UART: [fht] FMC Alias Private Key: 7
2,828,857 UART: [art] Derive CDI
2,829,137 UART: [art] Store in in slot 0x4
2,914,706 UART: [art] Derive Key Pair
2,915,066 UART: [art] Store priv key in slot 0x5
2,929,066 UART: [art] Derive Key Pair - Done
2,943,768 UART: [art] Signing Cert with AUTHO
2,944,248 UART: RITY.KEYID = 7
2,959,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,393 UART: [art] PUB.X = A60FC8FA8869F738109ED7C72BD77C25ADEC5D625BCBB7AC5EA1ED2B921438290EA7A77AAA7B2105A79242BF3A0E4A2E
2,967,173 UART: [art] PUB.Y = A609472374E0FB049F834FCCE4E79E77BA7C44E8AF330310BBB90458617E349F598F16EF24B8A33983E229F4AC70B250
2,974,113 UART: [art] SIG.R = E428BEEBE0E808921B16BEECC4C5927F13C92EE5BD837BEFBE2EC364337EDE6BBBD7858288F25EF028BB96D0A9F99899
2,980,902 UART: [art] SIG.S = 36A79EE88BF2E1672845B4294B91F6DAA85A3EC17C843DA102456488420F0878069BDAABA1AA8DADCE0A28898C3E73C3
3,004,612 UART: Caliptra RT
3,004,957 UART: [state] CFI Enabled
3,112,840 UART: [rt] RT listening for mailbox commands...
3,113,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,436 UART: [rt]cmd =0x46504c54, len=4
3,144,716 >>> mbox cmd response data (8 bytes)
3,145,071 UART: [rt] FIPS self test
3,145,399 UART: [kat] ++
3,145,551 UART: [kat] sha1
3,149,845 UART: [kat] SHA2-256
3,151,867 UART: [kat] SHA2-384
3,154,720 UART: [kat] SHA2-512-ACC
3,155,238 UART: Fatal Error: 0x90050001
3,156,777 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,782 >>> mbox cmd response: failed
3,156,782 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,824 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,761 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,492 UART: [kat] LMS
1,168,804 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,759 UART: [idev] ++
1,172,927 UART: [idev] CDI.KEYID = 6
1,173,288 UART: [idev] SUBJECT.KEYID = 7
1,173,713 UART: [idev] UDS.KEYID = 0
1,174,059 ready_for_fw is high
1,174,059 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,269 UART: [idev] --
1,209,376 UART: [ldev] ++
1,209,544 UART: [ldev] CDI.KEYID = 6
1,209,908 UART: [ldev] SUBJECT.KEYID = 5
1,210,335 UART: [ldev] AUTHORITY.KEYID = 7
1,210,798 UART: [ldev] FE.KEYID = 1
1,216,234 UART: [ldev] Erasing FE.KEYID = 1
1,242,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,630 UART: [fwproc] Wait for Commands...
1,282,399 UART: [fwproc] Recv command 0x46574c44
1,283,132 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,627 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,247 >>> mbox cmd response: success
2,782,370 UART: [afmc] ++
2,782,538 UART: [afmc] CDI.KEYID = 6
2,782,901 UART: [afmc] SUBJECT.KEYID = 7
2,783,327 UART: [afmc] AUTHORITY.KEYID = 5
2,819,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,211 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,191 UART: [afmc] --
2,862,311 UART: [cold-reset] --
2,863,249 UART: [state] Locking Datavault
2,864,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,008 UART: [state] Locking ICCM
2,865,662 UART: [exit] Launching FMC @ 0x40000130
2,870,991 UART:
2,871,007 UART: Running Caliptra FMC ...
2,871,415 UART:
2,871,469 UART: [state] CFI Enabled
2,881,758 UART: [fht] FMC Alias Private Key: 7
2,990,025 UART: [art] Extend RT PCRs Done
2,990,453 UART: [art] Lock RT PCRs Done
2,992,069 UART: [art] Populate DV Done
3,000,308 UART: [fht] FMC Alias Private Key: 7
3,001,470 UART: [art] Derive CDI
3,001,750 UART: [art] Store in in slot 0x4
3,087,625 UART: [art] Derive Key Pair
3,087,985 UART: [art] Store priv key in slot 0x5
3,101,133 UART: [art] Derive Key Pair - Done
3,115,901 UART: [art] Signing Cert with AUTHO
3,116,381 UART: RITY.KEYID = 7
3,131,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,636 UART: [art] PUB.X = 1B6BC2F57AF0356DE824B4D4202024C242863717003F1E1998E3759DC9A0764BFCFB4C386CC2A147422304485806004A
3,139,348 UART: [art] PUB.Y = 0A409E621E09F86147CE3D372496A0FE7C60909FEB61F82FDBEF98043198DC160535CFCC19F92BFE215AC5CA108B9B12
3,146,296 UART: [art] SIG.R = 09468C1056F66CD2B8CFE863DBBF6D0F7FB18F4C325E2085E73FD38D5015632469546570F7465661C5C9BF9AB45426AC
3,153,062 UART: [art] SIG.S = 76A4511627D24A5C66A7E4DEE83835CDBF442C603276E66E38C1132CC9F6EBA62C568A699CA8907550EF6359ECF4C544
3,176,919 UART: Caliptra RT
3,177,172 UART: [state] CFI Enabled
3,285,925 UART: [rt] RT listening for mailbox commands...
3,286,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,343 UART: [rt]cmd =0x46504c54, len=4
3,317,301 >>> mbox cmd response data (8 bytes)
3,317,600 UART: [rt] FIPS self test
3,317,928 UART: [kat] ++
3,318,080 UART: [kat] sha1
3,322,246 UART: [kat] SHA2-256
3,324,268 UART: [kat] SHA2-384
3,327,001 UART: [kat] SHA2-512-ACC
3,327,665 UART: Fatal Error: 0x90050001
3,329,204 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,209 >>> mbox cmd response: failed
3,329,209 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,329,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,492 UART: [kat] HMAC-384Kdf
919,928 UART: [kat] LMS
1,168,240 UART: [kat] --
1,168,939 UART: [cold-reset] ++
1,169,499 UART: [fht] FHT @ 0x50003400
1,172,329 UART: [idev] ++
1,172,497 UART: [idev] CDI.KEYID = 6
1,172,858 UART: [idev] SUBJECT.KEYID = 7
1,173,283 UART: [idev] UDS.KEYID = 0
1,173,629 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,217 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,206,939 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,240,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,428 UART: [ldev] --
1,279,808 UART: [fwproc] Wait for Commands...
1,280,385 UART: [fwproc] Recv command 0x46574c44
1,281,118 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,256 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,565 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,778,239 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,386 ready_for_fw is high
1,056,386 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,867 >>> mbox cmd response: success
2,693,001 UART:
2,693,017 UART: Running Caliptra FMC ...
2,693,425 UART:
2,693,479 UART: [state] CFI Enabled
2,704,082 UART: [fht] FMC Alias Private Key: 7
2,812,575 UART: [art] Extend RT PCRs Done
2,813,003 UART: [art] Lock RT PCRs Done
2,814,721 UART: [art] Populate DV Done
2,822,728 UART: [fht] FMC Alias Private Key: 7
2,823,684 UART: [art] Derive CDI
2,823,964 UART: [art] Store in in slot 0x4
2,909,645 UART: [art] Derive Key Pair
2,910,005 UART: [art] Store priv key in slot 0x5
2,923,725 UART: [art] Derive Key Pair - Done
2,938,642 UART: [art] Signing Cert with AUTHO
2,939,122 UART: RITY.KEYID = 7
2,954,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,059 UART: [art] PUB.X = 70B0E407E77DE892F926E6FEA9DE1C448007F870D13BB2BAF9F8652F3A06FB222C89280988B0A45746D2DDB9F85F9C82
2,961,825 UART: [art] PUB.Y = A58EB9B0623C67B076321E30786716FFBD7B6FD13253E8459E15D3A748FBA4A96CD30D1ED281204F809C7714EBEEE945
2,968,778 UART: [art] SIG.R = E1BD4ACF3B39C4541AA148DCE0C5C94DEE971F8BD9DCC29222914B54B2CB31B51E3A2C1EC501BD163F76A362F8D6A7FA
2,975,569 UART: [art] SIG.S = D5D35AB112B4273CDAC2FFEBB5117FAD3747D3CA243987975D9F05C924BBD2DFA93483CD6ED0FE852A6E42C3DDBF1098
2,999,267 UART: Caliptra RT
2,999,520 UART: [state] CFI Enabled
3,108,004 UART: [rt] RT listening for mailbox commands...
3,108,667 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,476 UART: [rt]cmd =0x46504c54, len=4
3,139,590 >>> mbox cmd response data (8 bytes)
3,139,845 UART: [rt] FIPS self test
3,140,173 UART: [kat] ++
3,140,325 UART: [kat] sha1
3,144,367 UART: [kat] SHA2-256
3,146,389 UART: [kat] SHA2-384
3,149,182 UART: [kat] SHA2-512-ACC
3,149,774 UART: Fatal Error: 0x90050001
3,151,313 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,318 >>> mbox cmd response: failed
3,151,318 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,854 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,628,555 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,048 UART: [fht] FHT @ 0x50003400
1,172,544 UART: [idev] ++
1,172,712 UART: [idev] CDI.KEYID = 6
1,173,073 UART: [idev] SUBJECT.KEYID = 7
1,173,498 UART: [idev] UDS.KEYID = 0
1,173,844 ready_for_fw is high
1,173,844 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,519 UART: [ldev] ++
1,209,687 UART: [ldev] CDI.KEYID = 6
1,210,051 UART: [ldev] SUBJECT.KEYID = 5
1,210,478 UART: [ldev] AUTHORITY.KEYID = 7
1,210,941 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,242,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,715 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,283,014 UART: [fwproc] Recv command 0x46574c44
1,283,747 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,057 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,366 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,038 >>> mbox cmd response: success
2,783,109 UART: [afmc] ++
2,783,277 UART: [afmc] CDI.KEYID = 6
2,783,640 UART: [afmc] SUBJECT.KEYID = 7
2,784,066 UART: [afmc] AUTHORITY.KEYID = 5
2,819,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,647 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,462 UART: [afmc] --
2,862,594 UART: [cold-reset] --
2,863,620 UART: [state] Locking Datavault
2,864,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,441 UART: [state] Locking ICCM
2,866,043 UART: [exit] Launching FMC @ 0x40000130
2,871,372 UART:
2,871,388 UART: Running Caliptra FMC ...
2,871,796 UART:
2,871,939 UART: [state] CFI Enabled
2,882,540 UART: [fht] FMC Alias Private Key: 7
2,990,831 UART: [art] Extend RT PCRs Done
2,991,259 UART: [art] Lock RT PCRs Done
2,992,849 UART: [art] Populate DV Done
3,001,206 UART: [fht] FMC Alias Private Key: 7
3,002,318 UART: [art] Derive CDI
3,002,598 UART: [art] Store in in slot 0x4
3,088,485 UART: [art] Derive Key Pair
3,088,845 UART: [art] Store priv key in slot 0x5
3,102,141 UART: [art] Derive Key Pair - Done
3,116,663 UART: [art] Signing Cert with AUTHO
3,117,143 UART: RITY.KEYID = 7
3,131,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,696 UART: [art] PUB.X = 94A1FAE1AACC36536E8CDB94BB30575C98FC9F368A967F6214D1A7067A10A21E916781A68C882D13596F2F925E062EB2
3,139,464 UART: [art] PUB.Y = F749D7493DD80EA7059D42211700FBB55D33C202AAE9E92708B97E9CB89A7B5F76B23D10C4C81BE05C806433CA2B8EA6
3,146,388 UART: [art] SIG.R = D094DCCC1B3A1AE32831C38742CD5AE1F65D7B98FF2F88D4D79D3DB268AF4F9F7D7BA61D11A258EEB0C8677C1DEDDDDA
3,153,188 UART: [art] SIG.S = AA5FB071A61E36839CFD1A23EBAA4347FB04066A312E20768084E08398F5495A78854ECB2522BAD17BBDEDF7EE33FB46
3,176,861 UART: Caliptra RT
3,177,206 UART: [state] CFI Enabled
3,284,568 UART: [rt] RT listening for mailbox commands...
3,285,231 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,100 UART: [rt]cmd =0x46504c54, len=4
3,316,272 >>> mbox cmd response data (8 bytes)
3,316,527 UART: [rt] FIPS self test
3,316,855 UART: [kat] ++
3,317,007 UART: [kat] sha1
3,321,289 UART: [kat] SHA2-256
3,323,311 UART: [kat] SHA2-384
3,326,210 UART: [kat] SHA2-512-ACC
3,326,874 UART: Fatal Error: 0x90050001
3,328,413 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,328,418 >>> mbox cmd response: failed
3,328,418 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,328,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,511 UART: [kat] LMS
1,169,823 UART: [kat] --
1,170,542 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,174,992 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,200,010 UART: [idev] Sha1 KeyId Algorithm
1,209,044 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,243,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,771 UART: [ldev] --
1,283,087 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,495 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,290 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,126 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,461 ready_for_fw is high
1,056,461 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,624 >>> mbox cmd response: success
2,693,692 UART:
2,693,708 UART: Running Caliptra FMC ...
2,694,116 UART:
2,694,259 UART: [state] CFI Enabled
2,704,652 UART: [fht] FMC Alias Private Key: 7
2,813,393 UART: [art] Extend RT PCRs Done
2,813,821 UART: [art] Lock RT PCRs Done
2,815,259 UART: [art] Populate DV Done
2,823,662 UART: [fht] FMC Alias Private Key: 7
2,824,610 UART: [art] Derive CDI
2,824,890 UART: [art] Store in in slot 0x4
2,910,277 UART: [art] Derive Key Pair
2,910,637 UART: [art] Store priv key in slot 0x5
2,924,033 UART: [art] Derive Key Pair - Done
2,938,940 UART: [art] Signing Cert with AUTHO
2,939,420 UART: RITY.KEYID = 7
2,954,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,139 UART: [art] PUB.X = 6BED0D949BBEDED72E062FB800771CED52C633BC0C39885E70466AE16B83C5813EABA45F36659566CB4B2C0E522CD24E
2,961,889 UART: [art] PUB.Y = E2576A6F92D907E3BC0A0BBF9824DA4C1AF41525C7B1D415D6F3B7953C4B888D6799489CA9C1109B8D08D112A02E8BCD
2,968,837 UART: [art] SIG.R = 3644B5E96C7BF28C59D385B93F4F13F3613FAF205989B19283706ACDAA9262A5FDB8320B2404DDED887BD8A24B70B2CB
2,975,611 UART: [art] SIG.S = 4F5CDC9DEDC894D2A0496BC152479394C1024DF226CF07C285CA6A43B881A309C859A2AD27756536980305EE0DF46024
2,999,686 UART: Caliptra RT
3,000,031 UART: [state] CFI Enabled
3,107,662 UART: [rt] RT listening for mailbox commands...
3,108,325 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,060 UART: [rt]cmd =0x46504c54, len=4
3,139,402 >>> mbox cmd response data (8 bytes)
3,139,663 UART: [rt] FIPS self test
3,139,991 UART: [kat] ++
3,140,143 UART: [kat] sha1
3,144,519 UART: [kat] SHA2-256
3,146,541 UART: [kat] SHA2-384
3,149,442 UART: [kat] SHA2-512-ACC
3,150,154 UART: Fatal Error: 0x90050001
3,151,693 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,698 >>> mbox cmd response: failed
3,151,698 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,151,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,679 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,872 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,677,967 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,821,749 >>> mbox cmd response: failed
2,822,294 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,965,167 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,880,282 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,457,444 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,686,804 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,830,638 >>> mbox cmd response: failed
2,831,193 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,974,074 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
4,861,110 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,449,036 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,046,085 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,189,835 >>> mbox cmd response: failed
3,190,406 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,333,276 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
21,583,331 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,024,072 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,042,499 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,186,302 >>> mbox cmd response: failed
3,186,869 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,329,734 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
21,589,140 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,024,119 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,699,053 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,236 >>> mbox cmd response: failed
2,843,814 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,987,086 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,458,118 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,275,120 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,700,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,844,282 >>> mbox cmd response: failed
2,844,866 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,988,191 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,439,473 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,267,135 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,051,716 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,195,849 >>> mbox cmd response: failed
3,196,423 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,339,698 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,187,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,887,738 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,051,459 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,195,668 >>> mbox cmd response: failed
3,196,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,339,508 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,186,635 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,924,164 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,698,399 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,842,564 >>> mbox cmd response: failed
2,843,129 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,759 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,479,099 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,321,777 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,699,499 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,531 >>> mbox cmd response: failed
2,844,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,987,400 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
3,441,987 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,273,697 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,063,258 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,207,407 >>> mbox cmd response: failed
3,207,969 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,351,224 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,197,566 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,924,660 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,053,004 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,197,793 >>> mbox cmd response: failed
3,198,373 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,341,655 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,181,485 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,913,284 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,700 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,708 >>> mbox cmd response: failed
809,708 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,714 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,323 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,380 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,388 >>> mbox cmd response: failed
809,388 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,173 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,681 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,557 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,565 >>> mbox cmd response: failed
810,565 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,110 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,120 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,735 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,743 >>> mbox cmd response: failed
809,743 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,514 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,090 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,780 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,788 >>> mbox cmd response: failed
809,788 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,653 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,641,995 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,976 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,984 >>> mbox cmd response: failed
809,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,445 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,471 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,081 >>> mbox cmd response: failed
810,081 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,138 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,088 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,453 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,461 >>> mbox cmd response: failed
810,461 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,766 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,920 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,984 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,992 >>> mbox cmd response: failed
809,992 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,089 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,579 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,754 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,762 >>> mbox cmd response: failed
809,762 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
809,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,165 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,640,837 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,493 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,501 >>> mbox cmd response: failed
810,501 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,784 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,510 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,815 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,823 >>> mbox cmd response: failed
810,823 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
810,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,978 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,151 UART:
192,527 UART: Running Caliptra ROM ...
193,707 UART:
193,859 UART: [state] CFI Enabled
265,448 UART: [state] LifecycleState = Unprovisioned
267,360 UART: [state] DebugLocked = No
269,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,141 UART: [kat] SHA2-256
443,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,324 UART: [kat] ++
454,866 UART: [kat] sha1
467,383 UART: [kat] SHA2-256
470,111 UART: [kat] SHA2-384
475,180 UART: [kat] SHA2-512-ACC
477,552 UART: [kat] ECC-384
2,769,539 UART: [kat] HMAC-384Kdf
2,801,427 UART: [kat] LMS
3,991,744 UART: [kat] --
3,996,310 UART: [cold-reset] ++
3,998,106 UART: [fht] Storing FHT @ 0x50003400
4,009,803 UART: [idev] ++
4,010,383 UART: [idev] CDI.KEYID = 6
4,011,443 UART: [idev] SUBJECT.KEYID = 7
4,012,558 UART: [idev] UDS.KEYID = 0
4,013,609 ready_for_fw is high
4,013,829 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,158,447 UART: [idev] Erasing UDS.KEYID = 0
7,346,629 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,611 UART: [idev] --
7,373,257 UART: [ldev] ++
7,373,825 UART: [ldev] CDI.KEYID = 6
7,374,767 UART: [ldev] SUBJECT.KEYID = 5
7,375,981 UART: [ldev] AUTHORITY.KEYID = 7
7,377,199 UART: [ldev] FE.KEYID = 1
7,424,190 UART: [ldev] Erasing FE.KEYID = 1
10,755,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,119 UART: [ldev] --
13,137,842 UART: [fwproc] Waiting for Commands...
13,140,322 UART: [fwproc] Received command 0x46574c44
13,142,509 UART: [fwproc] Received Image of size 114632 bytes
17,204,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,347,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,666,338 >>> mbox cmd response: success
17,669,763 UART: [afmc] ++
17,670,359 UART: [afmc] CDI.KEYID = 6
17,671,328 UART: [afmc] SUBJECT.KEYID = 7
17,672,540 UART: [afmc] AUTHORITY.KEYID = 5
21,027,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,332,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,456 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,861 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,670 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,378,137 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,400,187 UART: [afmc] --
23,403,671 UART: [cold-reset] --
23,407,153 UART: [state] Locking Datavault
23,412,130 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,867 UART: [state] Locking ICCM
23,415,110 UART: [exit] Launching FMC @ 0x40000130
23,423,458 UART:
23,423,697 UART: Running Caliptra FMC ...
23,424,800 UART:
23,424,961 UART: [state] CFI Enabled
23,492,253 UART: [fht] FMC Alias Private Key: 7
25,830,342 UART: [art] Extend RT PCRs Done
25,831,576 UART: [art] Lock RT PCRs Done
25,832,722 UART: [art] Populate DV Done
25,838,242 UART: [fht] FMC Alias Private Key: 7
25,839,947 UART: [art] Derive CDI
25,840,771 UART: [art] Store in in slot 0x4
25,899,874 UART: [art] Derive Key Pair
25,900,915 UART: [art] Store priv key in slot 0x5
29,193,310 UART: [art] Derive Key Pair - Done
29,206,314 UART: [art] Signing Cert with AUTHO
29,207,615 UART: RITY.KEYID = 7
31,494,577 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,080 UART: [art] PUB.X = 3ABCB1841FB0F48510C6CE2D73E94D1C35034E1EB7AF7E25E26BEB36057A4DB24AFC7341A7A8D4F9145C00BF48ED58AF
31,503,352 UART: [art] PUB.Y = DBEF9AF489E0BEC852B0CECC275C6CEC78460F135E80223B5F165DCFC604F70EFC52E6152DC4401C8CB0BFFDD13B25EB
31,510,646 UART: [art] SIG.R = 86FE304564709F891D4129BD6AE0F60914379041201F33D04D5F9BA424B9251270C17A2BCE87B8FD1D0125BDB6E82D50
31,518,050 UART: [art] SIG.S = 926E85670512F0CAD4BF6473CE02DCC289A9BAE0C100B6E2DC07F8F77C7EC9B39585D42630D977969638BF45769BD8BB
32,822,764 UART: Caliptra RT
32,823,490 UART: [state] CFI Enabled
32,995,744 UART: [rt] RT listening for mailbox commands...
32,997,604 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,027,507 UART: [rt]cmd =0x46504c54, len=4
33,029,067 >>> mbox cmd response data (8 bytes)
33,030,171 UART: [rt] FIPS self test
33,031,137 UART: [kat] ++
33,031,598 UART: [kat] sha1
33,036,113 UART: [kat] SHA2-256
33,038,053 UART: [kat] SHA2-384
33,039,403 UART: Fatal Error: 0x90020001
33,074,628 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,218,961 >>> mbox cmd response: failed
33,219,624 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,363,522 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,004 UART:
190,305 UART: Running Caliptra ROM ...
191,333 UART:
191,473 UART: [state] CFI Enabled
252,877 UART: [state] LifecycleState = Unprovisioned
254,802 UART: [state] DebugLocked = No
257,751 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,210 UART: [kat] SHA2-256
431,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,454 UART: [kat] ++
442,902 UART: [kat] sha1
452,639 UART: [kat] SHA2-256
455,311 UART: [kat] SHA2-384
459,945 UART: [kat] SHA2-512-ACC
462,283 UART: [kat] ECC-384
2,755,103 UART: [kat] HMAC-384Kdf
2,786,953 UART: [kat] LMS
3,977,260 UART: [kat] --
3,981,643 UART: [cold-reset] ++
3,983,740 UART: [fht] Storing FHT @ 0x50003400
3,994,685 UART: [idev] ++
3,995,262 UART: [idev] CDI.KEYID = 6
3,996,173 UART: [idev] SUBJECT.KEYID = 7
3,997,447 UART: [idev] UDS.KEYID = 0
3,998,969 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,143,491 UART: [idev] Erasing UDS.KEYID = 0
7,332,271 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,924 UART: [idev] --
7,358,027 UART: [ldev] ++
7,358,605 UART: [ldev] CDI.KEYID = 6
7,359,569 UART: [ldev] SUBJECT.KEYID = 5
7,360,811 UART: [ldev] AUTHORITY.KEYID = 7
7,362,050 UART: [ldev] FE.KEYID = 1
7,389,289 UART: [ldev] Erasing FE.KEYID = 1
10,720,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,014,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,028,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,043,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,058,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,075,703 UART: [ldev] --
13,081,186 UART: [fwproc] Waiting for Commands...
13,083,670 UART: [fwproc] Received command 0x46574c44
13,085,861 UART: [fwproc] Received Image of size 114632 bytes
17,146,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,608,431 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,804,205 ready_for_fw is high
3,804,831 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,866,443 >>> mbox cmd response: success
23,563,687 UART:
23,564,089 UART: Running Caliptra FMC ...
23,565,199 UART:
23,565,355 UART: [state] CFI Enabled
23,634,247 UART: [fht] FMC Alias Private Key: 7
25,972,547 UART: [art] Extend RT PCRs Done
25,973,775 UART: [art] Lock RT PCRs Done
25,975,863 UART: [art] Populate DV Done
25,981,494 UART: [fht] FMC Alias Private Key: 7
25,983,089 UART: [art] Derive CDI
25,983,835 UART: [art] Store in in slot 0x4
26,043,041 UART: [art] Derive Key Pair
26,044,089 UART: [art] Store priv key in slot 0x5
29,336,110 UART: [art] Derive Key Pair - Done
29,348,897 UART: [art] Signing Cert with AUTHO
29,350,202 UART: RITY.KEYID = 7
31,637,884 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,393 UART: [art] PUB.X = 7881B24C947E02DA0EF4E2A5F3AD2B71EFC33B3A5568D5CB6CFDA890D6DB00BCA5956868626362130AF2D9424EBEB28B
31,646,670 UART: [art] PUB.Y = 26930E063065413DC065735C1E5AD1227F42C37F27EB996144D6D4A5F75906539A155F1BB8DCBC22B35E0E6D2BB932F5
31,653,868 UART: [art] SIG.R = 741AA5388CEA73118F3319F537EA7A79B4B4F3D97F72D117DF71B394393DC666EC7A85BD287CA1536FF23606056992AF
31,661,301 UART: [art] SIG.S = F466CB576D64B290149398060C1E1674EC52FAF2FCEA2B0EC4786E0A2D67C49E606A23CD9DA37FB74B9992D753056E85
32,966,343 UART: Caliptra RT
32,967,063 UART: [state] CFI Enabled
33,127,603 UART: [rt] RT listening for mailbox commands...
33,129,468 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,159,301 UART: [rt]cmd =0x46504c54, len=4
33,160,970 >>> mbox cmd response data (8 bytes)
33,162,037 UART: [rt] FIPS self test
33,162,986 UART: [kat] ++
33,163,439 UART: [kat] sha1
33,167,896 UART: [kat] SHA2-256
33,169,822 UART: [kat] SHA2-384
33,171,105 UART: Fatal Error: 0x90020001
33,206,321 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,350,284 >>> mbox cmd response: failed
33,350,894 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,494,816 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,792,182 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,877,248 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,500 UART:
192,872 UART: Running Caliptra ROM ...
193,969 UART:
603,786 UART: [state] CFI Enabled
617,094 UART: [state] LifecycleState = Unprovisioned
618,976 UART: [state] DebugLocked = No
620,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,150 UART: [kat] SHA2-256
795,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,432 UART: [kat] ++
806,885 UART: [kat] sha1
818,539 UART: [kat] SHA2-256
821,273 UART: [kat] SHA2-384
825,850 UART: [kat] SHA2-512-ACC
828,225 UART: [kat] ECC-384
3,113,967 UART: [kat] HMAC-384Kdf
3,126,302 UART: [kat] LMS
4,316,438 UART: [kat] --
4,319,680 UART: [cold-reset] ++
4,322,128 UART: [fht] Storing FHT @ 0x50003400
4,334,035 UART: [idev] ++
4,334,614 UART: [idev] CDI.KEYID = 6
4,335,601 UART: [idev] SUBJECT.KEYID = 7
4,336,783 UART: [idev] UDS.KEYID = 0
4,337,787 ready_for_fw is high
4,338,031 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,482,084 UART: [idev] Erasing UDS.KEYID = 0
7,628,235 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,050 UART: [idev] --
7,653,463 UART: [ldev] ++
7,654,044 UART: [ldev] CDI.KEYID = 6
7,655,067 UART: [ldev] SUBJECT.KEYID = 5
7,656,232 UART: [ldev] AUTHORITY.KEYID = 7
7,657,464 UART: [ldev] FE.KEYID = 1
7,670,486 UART: [ldev] Erasing FE.KEYID = 1
10,956,835 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,269 UART: [ldev] --
13,315,528 UART: [fwproc] Waiting for Commands...
13,318,657 UART: [fwproc] Received command 0x46574c44
13,320,847 UART: [fwproc] Received Image of size 114632 bytes
17,375,972 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,563 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,835,666 >>> mbox cmd response: success
17,840,353 UART: [afmc] ++
17,840,951 UART: [afmc] CDI.KEYID = 6
17,841,867 UART: [afmc] SUBJECT.KEYID = 7
17,843,087 UART: [afmc] AUTHORITY.KEYID = 5
21,161,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,900 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,284 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,123 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,600 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,524,239 UART: [afmc] --
23,527,460 UART: [cold-reset] --
23,531,915 UART: [state] Locking Datavault
23,535,868 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,620 UART: [state] Locking ICCM
23,539,932 UART: [exit] Launching FMC @ 0x40000130
23,548,327 UART:
23,548,563 UART: Running Caliptra FMC ...
23,549,666 UART:
23,549,825 UART: [state] CFI Enabled
23,557,769 UART: [fht] FMC Alias Private Key: 7
25,888,919 UART: [art] Extend RT PCRs Done
25,890,146 UART: [art] Lock RT PCRs Done
25,891,688 UART: [art] Populate DV Done
25,896,987 UART: [fht] FMC Alias Private Key: 7
25,898,652 UART: [art] Derive CDI
25,899,392 UART: [art] Store in in slot 0x4
25,941,932 UART: [art] Derive Key Pair
25,942,935 UART: [art] Store priv key in slot 0x5
29,184,664 UART: [art] Derive Key Pair - Done
29,197,558 UART: [art] Signing Cert with AUTHO
29,198,868 UART: RITY.KEYID = 7
31,478,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,158 UART: [art] PUB.X = EB4E6C68D5BD010EFE4F7C2A34C9F4302E1F2FB99291D8EA5D8748ECAD343003ACD8AD0218938324462AA673F72AE2AA
31,487,430 UART: [art] PUB.Y = A568A52D8614A4D8C197D440671B9AB8D8079CD0A6822760AE1B82FE236271B736194A81912D161C8EC6A37F878343D2
31,494,677 UART: [art] SIG.R = 2CEF6E8A0A9DC7939BCA795F7C234D66A842E8F006D288AB0214153337E2532776D0CAC0C0C3FAF2870E13F37FFB0A93
31,502,033 UART: [art] SIG.S = 2A70AA834C580FDA8E8175750A15785D24955F5E6CEE1B75FA740EBEA42AB083150A9BF11C3A5B9798A72AA4E544B8F5
32,806,869 UART: Caliptra RT
32,807,584 UART: [state] CFI Enabled
32,925,527 UART: [rt] RT listening for mailbox commands...
32,927,379 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,957,292 UART: [rt]cmd =0x46504c54, len=4
32,958,872 >>> mbox cmd response data (8 bytes)
32,959,996 UART: [rt] FIPS self test
32,960,947 UART: [kat] ++
32,961,398 UART: [kat] sha1
32,965,905 UART: [kat] SHA2-256
32,967,779 UART: [kat] SHA2-384
32,969,043 UART: Fatal Error: 0x90020001
33,004,413 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,148,314 >>> mbox cmd response: failed
33,148,928 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,292,817 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,156 UART:
190,450 UART: Running Caliptra ROM ...
191,578 UART:
7,236,845 UART: [state] CFI Enabled
7,250,355 UART: [state] LifecycleState = Unprovisioned
7,252,268 UART: [state] DebugLocked = No
7,255,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,259,523 UART: [kat] SHA2-256
7,429,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,439,786 UART: [kat] ++
7,440,274 UART: [kat] sha1
7,450,782 UART: [kat] SHA2-256
7,453,485 UART: [kat] SHA2-384
7,459,960 UART: [kat] SHA2-512-ACC
7,462,362 UART: [kat] ECC-384
9,746,645 UART: [kat] HMAC-384Kdf
9,757,899 UART: [kat] LMS
10,948,033 UART: [kat] --
10,953,627 UART: [cold-reset] ++
10,954,858 UART: [fht] Storing FHT @ 0x50003400
10,966,611 UART: [idev] ++
10,967,180 UART: [idev] CDI.KEYID = 6
10,968,144 UART: [idev] SUBJECT.KEYID = 7
10,969,354 UART: [idev] UDS.KEYID = 0
10,970,926 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,114,833 UART: [idev] Erasing UDS.KEYID = 0
14,256,234 UART: [idev] Using Sha1 for KeyId Algorithm
14,277,718 UART: [idev] --
14,281,251 UART: [ldev] ++
14,281,831 UART: [ldev] CDI.KEYID = 6
14,282,797 UART: [ldev] SUBJECT.KEYID = 5
14,284,014 UART: [ldev] AUTHORITY.KEYID = 7
14,285,304 UART: [ldev] FE.KEYID = 1
14,297,354 UART: [ldev] Erasing FE.KEYID = 1
17,586,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,878,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,893,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,908,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,922,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,941,206 UART: [ldev] --
19,945,676 UART: [fwproc] Waiting for Commands...
19,947,728 UART: [fwproc] Received command 0x46574c44
19,949,964 UART: [fwproc] Received Image of size 114632 bytes
24,008,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,079,505 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,148,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,467,850 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,129,564 ready_for_fw is high
4,130,001 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,085,548 >>> mbox cmd response: success
23,725,928 UART:
23,726,333 UART: Running Caliptra FMC ...
23,727,444 UART:
23,727,609 UART: [state] CFI Enabled
23,735,633 UART: [fht] FMC Alias Private Key: 7
26,066,394 UART: [art] Extend RT PCRs Done
26,067,627 UART: [art] Lock RT PCRs Done
26,069,591 UART: [art] Populate DV Done
26,075,279 UART: [fht] FMC Alias Private Key: 7
26,076,880 UART: [art] Derive CDI
26,077,701 UART: [art] Store in in slot 0x4
26,120,468 UART: [art] Derive Key Pair
26,121,509 UART: [art] Store priv key in slot 0x5
29,363,387 UART: [art] Derive Key Pair - Done
29,376,335 UART: [art] Signing Cert with AUTHO
29,377,642 UART: RITY.KEYID = 7
31,657,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,657 UART: [art] PUB.X = 2D7FF6787063C37BBB5690B5DFBCB37266EB0E8B18AD7C13AEAD050D46E42D5A17D77FD4A10F49198D7483B77A1E332A
31,665,908 UART: [art] PUB.Y = 7C7675E85019542F9FA19859167F4953E5423FF01ABC2BDEC81962B58BC9D5418BB3CB105AE120291F8A57FD109FEFAA
31,673,146 UART: [art] SIG.R = 7BD600384A55F86B2743A77CBF9ED4F93C809A9F274B86F8F908C9F94267684B88E4C70ADDB7365C2FA6A78C5485BC4D
31,680,543 UART: [art] SIG.S = 47C70C80A92ED282CCF25538BE40838E2241FCBF2814A83035C98E5CA6464234AEDFA63C29D585D6E32D50F8AB78FE81
32,986,107 UART: Caliptra RT
32,986,829 UART: [state] CFI Enabled
33,103,969 UART: [rt] RT listening for mailbox commands...
33,105,823 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,135,622 UART: [rt]cmd =0x46504c54, len=4
33,137,040 >>> mbox cmd response data (8 bytes)
33,138,212 UART: [rt] FIPS self test
33,139,153 UART: [kat] ++
33,139,607 UART: [kat] sha1
33,143,902 UART: [kat] SHA2-256
33,145,829 UART: [kat] SHA2-384
33,147,006 UART: Fatal Error: 0x90020001
33,182,401 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,326,441 >>> mbox cmd response: failed
33,327,081 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,470,878 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
10,588,144 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,546,029 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,298 UART:
192,658 UART: Running Caliptra ROM ...
193,872 UART:
194,047 UART: [state] CFI Enabled
263,099 UART: [state] LifecycleState = Unprovisioned
265,007 UART: [state] DebugLocked = No
267,043 UART: [state] WD Timer not started. Device not locked for debugging
270,170 UART: [kat] SHA2-256
449,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,924 UART: [kat] ++
461,465 UART: [kat] sha1
472,779 UART: [kat] SHA2-256
475,793 UART: [kat] SHA2-384
482,990 UART: [kat] SHA2-512-ACC
485,932 UART: [kat] ECC-384
2,946,389 UART: [kat] HMAC-384Kdf
2,961,342 UART: [kat] LMS
3,490,746 UART: [kat] --
3,497,525 UART: [cold-reset] ++
3,499,934 UART: [fht] FHT @ 0x50003400
3,512,279 UART: [idev] ++
3,512,853 UART: [idev] CDI.KEYID = 6
3,513,740 UART: [idev] SUBJECT.KEYID = 7
3,514,865 UART: [idev] UDS.KEYID = 0
3,515,838 ready_for_fw is high
3,516,062 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,660,712 UART: [idev] Erasing UDS.KEYID = 0
6,017,789 UART: [idev] Sha1 KeyId Algorithm
6,042,212 UART: [idev] --
6,046,747 UART: [ldev] ++
6,047,324 UART: [ldev] CDI.KEYID = 6
6,048,208 UART: [ldev] SUBJECT.KEYID = 5
6,049,421 UART: [ldev] AUTHORITY.KEYID = 7
6,050,659 UART: [ldev] FE.KEYID = 1
6,091,211 UART: [ldev] Erasing FE.KEYID = 1
8,593,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,962 UART: [ldev] --
10,406,469 UART: [fwproc] Wait for Commands...
10,408,672 UART: [fwproc] Recv command 0x46574c44
10,410,769 UART: [fwproc] Recv'd Img size: 114940 bytes
13,827,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,306 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,283,825 >>> mbox cmd response: success
14,288,679 UART: [afmc] ++
14,289,272 UART: [afmc] CDI.KEYID = 6
14,290,154 UART: [afmc] SUBJECT.KEYID = 7
14,291,331 UART: [afmc] AUTHORITY.KEYID = 5
16,817,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,099 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,615,522 UART: [afmc] --
18,619,580 UART: [cold-reset] --
18,622,745 UART: [state] Locking Datavault
18,628,476 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,184 UART: [state] Locking ICCM
18,631,793 UART: [exit] Launching FMC @ 0x40000130
18,640,187 UART:
18,640,421 UART: Running Caliptra FMC ...
18,641,522 UART:
18,641,699 UART: [state] CFI Enabled
18,703,094 UART: [fht] FMC Alias Private Key: 7
20,466,496 UART: [art] Extend RT PCRs Done
20,467,717 UART: [art] Lock RT PCRs Done
20,469,824 UART: [art] Populate DV Done
20,475,075 UART: [fht] FMC Alias Private Key: 7
20,476,622 UART: [art] Derive CDI
20,477,357 UART: [art] Store in in slot 0x4
20,535,529 UART: [art] Derive Key Pair
20,536,567 UART: [art] Store priv key in slot 0x5
22,999,409 UART: [art] Derive Key Pair - Done
23,012,023 UART: [art] Signing Cert with AUTHO
23,013,515 UART: RITY.KEYID = 7
24,724,668 UART: [art] Erasing AUTHORITY.KEYID = 7
24,726,172 UART: [art] PUB.X = C9AEECBCD1B2A72AD07ACFD76BCFF17E127594129383818BF94407CC93997EFC792281BBEF9674851296BDDF6F05AAB3
24,733,502 UART: [art] PUB.Y = 49A0D1D1CE5CD1CF31FB55E3A12B748E5C401C5ACDA7B751B8A023272490F44BE5FE22625B6C8193A8413EE5CC4880A1
24,740,769 UART: [art] SIG.R = 8F3ABBE97BFEFC550EA22FF44007D53CB9A94B4C042A10BFB266228F3D6BD9D734A4AD52C45F916E7460E5F0A28B2952
24,748,167 UART: [art] SIG.S = 9FFDA02B0C54658385741E555002EE433D3CAB888B1D88E659590B32BDF6DC7D23BED0543E819D85608598FCBC947257
25,726,796 UART: Caliptra RT
25,727,512 UART: [state] CFI Enabled
25,892,096 UART: [rt] RT listening for mailbox commands...
25,894,085 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,923,718 UART: [rt]cmd =0x46504c54, len=4
25,925,459 >>> mbox cmd response data (8 bytes)
25,926,575 UART: [rt] FIPS self test
25,927,519 UART: [kat] ++
25,927,969 UART: [kat] sha1
25,932,535 UART: [kat] SHA2-256
25,934,466 UART: [kat] SHA2-384
25,935,533 UART: Fatal Error: 0x90020001
25,970,735 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,115,089 >>> mbox cmd response: failed
26,115,742 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,260,081 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,140 UART:
190,431 UART: Running Caliptra ROM ...
191,456 UART:
191,597 UART: [state] CFI Enabled
254,548 UART: [state] LifecycleState = Unprovisioned
256,440 UART: [state] DebugLocked = No
259,297 UART: [state] WD Timer not started. Device not locked for debugging
263,289 UART: [kat] SHA2-256
442,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
453,943 UART: [kat] ++
454,390 UART: [kat] sha1
466,776 UART: [kat] SHA2-256
469,806 UART: [kat] SHA2-384
475,679 UART: [kat] SHA2-512-ACC
478,610 UART: [kat] ECC-384
2,938,186 UART: [kat] HMAC-384Kdf
2,960,472 UART: [kat] LMS
3,489,921 UART: [kat] --
3,495,006 UART: [cold-reset] ++
3,497,107 UART: [fht] FHT @ 0x50003400
3,506,679 UART: [idev] ++
3,507,241 UART: [idev] CDI.KEYID = 6
3,508,206 UART: [idev] SUBJECT.KEYID = 7
3,509,364 UART: [idev] UDS.KEYID = 0
3,510,982 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,655,575 UART: [idev] Erasing UDS.KEYID = 0
6,017,049 UART: [idev] Sha1 KeyId Algorithm
6,040,327 UART: [idev] --
6,044,911 UART: [ldev] ++
6,045,498 UART: [ldev] CDI.KEYID = 6
6,046,566 UART: [ldev] SUBJECT.KEYID = 5
6,047,675 UART: [ldev] AUTHORITY.KEYID = 7
6,048,850 UART: [ldev] FE.KEYID = 1
6,089,912 UART: [ldev] Erasing FE.KEYID = 1
8,594,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,973 UART: [ldev] --
10,403,101 UART: [fwproc] Wait for Commands...
10,404,936 UART: [fwproc] Recv command 0x46574c44
10,406,999 UART: [fwproc] Recv'd Img size: 114940 bytes
13,814,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,874 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,634 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,283,233 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,362,323 ready_for_fw is high
3,362,778 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,029,732 >>> mbox cmd response: success
18,321,364 UART:
18,321,790 UART: Running Caliptra FMC ...
18,322,927 UART:
18,323,088 UART: [state] CFI Enabled
18,391,759 UART: [fht] FMC Alias Private Key: 7
20,154,430 UART: [art] Extend RT PCRs Done
20,155,657 UART: [art] Lock RT PCRs Done
20,157,020 UART: [art] Populate DV Done
20,162,500 UART: [fht] FMC Alias Private Key: 7
20,164,043 UART: [art] Derive CDI
20,164,885 UART: [art] Store in in slot 0x4
20,223,891 UART: [art] Derive Key Pair
20,224,937 UART: [art] Store priv key in slot 0x5
22,687,193 UART: [art] Derive Key Pair - Done
22,699,979 UART: [art] Signing Cert with AUTHO
22,701,283 UART: RITY.KEYID = 7
24,413,233 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,739 UART: [art] PUB.X = A4FCED8A420086A1960C3D753DCB4D730A1ED732AA07339CF9E9BB235FBA901110D2A6103FBC648106084914A65329A0
24,421,941 UART: [art] PUB.Y = F5078DB8E2FA412382E1B81BFD8C7A625FCABED98D3D3C05262FCCFF75FC3BECB55E7C13A1608654DE936F46E8C00077
24,429,230 UART: [art] SIG.R = 08A904AC8F0C13EC6B66C4AD05EE03EB8D01541E41031957DA7A2E2FB2F2E9AEBDB81E6F1ACAEE6BC8A6794076EF8628
24,436,640 UART: [art] SIG.S = B2987FAA9AF79F40E2BA414FBFB77E2FBD5B1794F3115727ED91BD62714B263FDBC06151800AE3222BC9075BED1157F0
25,415,304 UART: Caliptra RT
25,416,008 UART: [state] CFI Enabled
25,582,508 UART: [rt] RT listening for mailbox commands...
25,584,363 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,614,099 UART: [rt]cmd =0x46504c54, len=4
25,615,809 >>> mbox cmd response data (8 bytes)
25,616,745 UART: [rt] FIPS self test
25,617,689 UART: [kat] ++
25,618,133 UART: [kat] sha1
25,622,532 UART: [kat] SHA2-256
25,624,467 UART: [kat] SHA2-384
25,625,469 UART: Fatal Error: 0x90020001
25,660,670 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,805,080 >>> mbox cmd response: failed
25,805,727 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,950,379 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,350,881 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,065,570 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,511 UART:
192,883 UART: Running Caliptra ROM ...
194,096 UART:
603,800 UART: [state] CFI Enabled
617,820 UART: [state] LifecycleState = Unprovisioned
619,624 UART: [state] DebugLocked = No
621,672 UART: [state] WD Timer not started. Device not locked for debugging
625,014 UART: [kat] SHA2-256
804,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,681 UART: [kat] ++
816,212 UART: [kat] sha1
826,382 UART: [kat] SHA2-256
829,399 UART: [kat] SHA2-384
836,881 UART: [kat] SHA2-512-ACC
839,817 UART: [kat] ECC-384
3,282,669 UART: [kat] HMAC-384Kdf
3,295,945 UART: [kat] LMS
3,825,457 UART: [kat] --
3,830,018 UART: [cold-reset] ++
3,832,533 UART: [fht] FHT @ 0x50003400
3,844,369 UART: [idev] ++
3,844,979 UART: [idev] CDI.KEYID = 6
3,845,885 UART: [idev] SUBJECT.KEYID = 7
3,847,069 UART: [idev] UDS.KEYID = 0
3,848,008 ready_for_fw is high
3,848,251 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,992,663 UART: [idev] Erasing UDS.KEYID = 0
6,324,236 UART: [idev] Sha1 KeyId Algorithm
6,346,468 UART: [idev] --
6,351,502 UART: [ldev] ++
6,352,073 UART: [ldev] CDI.KEYID = 6
6,352,987 UART: [ldev] SUBJECT.KEYID = 5
6,354,146 UART: [ldev] AUTHORITY.KEYID = 7
6,355,378 UART: [ldev] FE.KEYID = 1
6,366,862 UART: [ldev] Erasing FE.KEYID = 1
8,837,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,477 UART: [ldev] --
10,625,875 UART: [fwproc] Wait for Commands...
10,628,505 UART: [fwproc] Recv command 0x46574c44
10,630,614 UART: [fwproc] Recv'd Img size: 114940 bytes
14,047,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,123,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,192,337 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,512,942 >>> mbox cmd response: success
14,517,425 UART: [afmc] ++
14,518,016 UART: [afmc] CDI.KEYID = 6
14,518,932 UART: [afmc] SUBJECT.KEYID = 7
14,520,144 UART: [afmc] AUTHORITY.KEYID = 5
17,016,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,734,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,736,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,752,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,768,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,784,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,103 UART: [afmc] --
18,811,653 UART: [cold-reset] --
18,813,463 UART: [state] Locking Datavault
18,820,004 UART: [state] Locking PCR0, PCR1 and PCR31
18,821,655 UART: [state] Locking ICCM
18,823,213 UART: [exit] Launching FMC @ 0x40000130
18,831,610 UART:
18,831,847 UART: Running Caliptra FMC ...
18,832,952 UART:
18,833,112 UART: [state] CFI Enabled
18,841,211 UART: [fht] FMC Alias Private Key: 7
20,597,666 UART: [art] Extend RT PCRs Done
20,598,910 UART: [art] Lock RT PCRs Done
20,600,337 UART: [art] Populate DV Done
20,605,963 UART: [fht] FMC Alias Private Key: 7
20,607,497 UART: [art] Derive CDI
20,608,312 UART: [art] Store in in slot 0x4
20,651,228 UART: [art] Derive Key Pair
20,652,271 UART: [art] Store priv key in slot 0x5
23,078,821 UART: [art] Derive Key Pair - Done
23,091,821 UART: [art] Signing Cert with AUTHO
23,093,133 UART: RITY.KEYID = 7
24,798,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,811 UART: [art] PUB.X = 1F614255AA9990E6FC6DE428716DD90ECF21996852095BEA5BFCB10AA33308F45F09B90A4A74880E2BE2F46282938A63
24,807,068 UART: [art] PUB.Y = D58DA97FC2FA0E342D1A9990B4499BAAD9055F8DBC6B58FCEF156D6559507E0850B79A256E8C44BA2C8F92DF4EBD9808
24,814,372 UART: [art] SIG.R = 873BD5C51D090FBD42696EEFD180E3A798746903CA1F70627DA6BD961A457DEC848830AEB62D59B5EA614FABDE73F5B7
24,821,764 UART: [art] SIG.S = AD3BFB7D286E4479FE2DEA8A03CCDB3C6FBDD8C83C680F9B78B57A7A63A5484BFCC38199E9C935C33AB6F38A1CEF8D23
25,800,790 UART: Caliptra RT
25,801,508 UART: [state] CFI Enabled
25,918,029 UART: [rt] RT listening for mailbox commands...
25,919,901 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,949,707 UART: [rt]cmd =0x46504c54, len=4
25,951,286 >>> mbox cmd response data (8 bytes)
25,952,560 UART: [rt] FIPS self test
25,953,497 UART: [kat] ++
25,953,944 UART: [kat] sha1
25,958,267 UART: [kat] SHA2-256
25,960,196 UART: [kat] SHA2-384
25,961,430 UART: Fatal Error: 0x90020001
25,996,814 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,141,043 >>> mbox cmd response: failed
26,141,701 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,285,974 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
190,039 UART:
190,336 UART: Running Caliptra ROM ...
191,363 UART:
14,248,893 UART: [state] CFI Enabled
14,264,113 UART: [state] LifecycleState = Unprovisioned
14,266,007 UART: [state] DebugLocked = No
14,267,626 UART: [state] WD Timer not started. Device not locked for debugging
14,272,125 UART: [kat] SHA2-256
14,451,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,462,852 UART: [kat] ++
14,463,393 UART: [kat] sha1
14,474,991 UART: [kat] SHA2-256
14,478,003 UART: [kat] SHA2-384
14,484,910 UART: [kat] SHA2-512-ACC
14,487,853 UART: [kat] ECC-384
16,928,298 UART: [kat] HMAC-384Kdf
16,940,199 UART: [kat] LMS
17,469,708 UART: [kat] --
17,473,157 UART: [cold-reset] ++
17,474,602 UART: [fht] FHT @ 0x50003400
17,485,150 UART: [idev] ++
17,485,721 UART: [idev] CDI.KEYID = 6
17,486,689 UART: [idev] SUBJECT.KEYID = 7
17,487,844 UART: [idev] UDS.KEYID = 0
17,489,490 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,633,788 UART: [idev] Erasing UDS.KEYID = 0
19,959,632 UART: [idev] Sha1 KeyId Algorithm
19,982,475 UART: [idev] --
19,986,304 UART: [ldev] ++
19,986,870 UART: [ldev] CDI.KEYID = 6
19,987,753 UART: [ldev] SUBJECT.KEYID = 5
19,988,983 UART: [ldev] AUTHORITY.KEYID = 7
19,990,217 UART: [ldev] FE.KEYID = 1
20,000,538 UART: [ldev] Erasing FE.KEYID = 1
22,473,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,190,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,206,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,222,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,237,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,257,957 UART: [ldev] --
24,262,469 UART: [fwproc] Wait for Commands...
24,264,283 UART: [fwproc] Recv command 0x46574c44
24,266,330 UART: [fwproc] Recv'd Img size: 114940 bytes
27,674,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,751,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,820,163 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,140,490 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,698,839 ready_for_fw is high
3,699,319 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,296,210 >>> mbox cmd response: success
18,547,944 UART:
18,548,326 UART: Running Caliptra FMC ...
18,549,496 UART:
18,549,659 UART: [state] CFI Enabled
18,557,222 UART: [fht] FMC Alias Private Key: 7
20,314,242 UART: [art] Extend RT PCRs Done
20,315,468 UART: [art] Lock RT PCRs Done
20,317,322 UART: [art] Populate DV Done
20,323,069 UART: [fht] FMC Alias Private Key: 7
20,324,669 UART: [art] Derive CDI
20,325,487 UART: [art] Store in in slot 0x4
20,368,036 UART: [art] Derive Key Pair
20,369,086 UART: [art] Store priv key in slot 0x5
22,795,865 UART: [art] Derive Key Pair - Done
22,808,984 UART: [art] Signing Cert with AUTHO
22,810,296 UART: RITY.KEYID = 7
24,515,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,517,166 UART: [art] PUB.X = D477D2CCA43CBCD574EB371CE2523D06DC21C5CF3D459AB4DEEC3AF45588E3B4511903A00B9ABFCEE7D692823D58FB8B
24,524,496 UART: [art] PUB.Y = 0DFA99172A276DAF640568AB8011ADA27696BEC171F5E199DB9006014ECED8B4E2765FF6C281E38E41823A345476A664
24,531,751 UART: [art] SIG.R = 865D1E9EBFB8347A9F8DC14C4694ED744627BD4B1ACCBB51F7D342946E33E8CEF060D7BC32CF96A8CC471AE8F8E321D3
24,539,151 UART: [art] SIG.S = 1BC6F50366ED06C7C98D5DBF296E9F830895B1328751358E536871B71EBAA80FEC6BD1CB0D903F6D4ECFF80342E2E384
25,518,722 UART: Caliptra RT
25,519,440 UART: [state] CFI Enabled
25,637,027 UART: [rt] RT listening for mailbox commands...
25,638,892 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,668,466 UART: [rt]cmd =0x46504c54, len=4
25,670,098 >>> mbox cmd response data (8 bytes)
25,671,259 UART: [rt] FIPS self test
25,672,194 UART: [kat] ++
25,672,646 UART: [kat] sha1
25,677,158 UART: [kat] SHA2-256
25,679,085 UART: [kat] SHA2-384
25,680,532 UART: Fatal Error: 0x90020001
25,715,882 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,860,297 >>> mbox cmd response: failed
25,860,957 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,005,134 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,618,033 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,201,717 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,054 UART:
192,429 UART: Running Caliptra ROM ...
193,531 UART:
193,672 UART: [state] CFI Enabled
263,568 UART: [state] LifecycleState = Unprovisioned
266,002 UART: [state] DebugLocked = No
267,619 UART: [state] WD Timer not started. Device not locked for debugging
271,382 UART: [kat] SHA2-256
461,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,820 UART: [kat] ++
472,276 UART: [kat] sha1
485,144 UART: [kat] SHA2-256
488,162 UART: [kat] SHA2-384
493,382 UART: [kat] SHA2-512-ACC
495,970 UART: [kat] ECC-384
2,947,983 UART: [kat] HMAC-384Kdf
2,972,804 UART: [kat] LMS
3,504,616 UART: [kat] --
3,508,261 UART: [cold-reset] ++
3,510,834 UART: [fht] FHT @ 0x50003400
3,521,383 UART: [idev] ++
3,522,040 UART: [idev] CDI.KEYID = 6
3,523,080 UART: [idev] SUBJECT.KEYID = 7
3,524,183 UART: [idev] UDS.KEYID = 0
3,525,108 ready_for_fw is high
3,525,320 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,669,881 UART: [idev] Erasing UDS.KEYID = 0
6,033,232 UART: [idev] Sha1 KeyId Algorithm
6,055,660 UART: [idev] --
6,060,934 UART: [ldev] ++
6,061,623 UART: [ldev] CDI.KEYID = 6
6,062,511 UART: [ldev] SUBJECT.KEYID = 5
6,063,621 UART: [ldev] AUTHORITY.KEYID = 7
6,064,906 UART: [ldev] FE.KEYID = 1
6,101,431 UART: [ldev] Erasing FE.KEYID = 1
8,609,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,420 UART: [ldev] --
10,415,221 UART: [fwproc] Wait for Commands...
10,417,695 UART: [fwproc] Recv command 0x46574c44
10,419,960 UART: [fwproc] Recv'd Img size: 114940 bytes
13,873,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,196 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,610,042 >>> mbox cmd response: success
14,613,343 UART: [afmc] ++
14,614,044 UART: [afmc] CDI.KEYID = 6
14,615,286 UART: [afmc] SUBJECT.KEYID = 7
14,616,721 UART: [afmc] AUTHORITY.KEYID = 5
17,149,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,460 UART: [afmc] --
18,948,408 UART: [cold-reset] --
18,952,325 UART: [state] Locking Datavault
18,957,680 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,876 UART: [state] Locking ICCM
18,962,354 UART: [exit] Launching FMC @ 0x40000130
18,971,027 UART:
18,971,264 UART: Running Caliptra FMC ...
18,972,364 UART:
18,972,518 UART: [state] CFI Enabled
19,030,610 UART: [fht] FMC Alias Private Key: 7
20,794,678 UART: [art] Extend RT PCRs Done
20,795,897 UART: [art] Lock RT PCRs Done
20,797,469 UART: [art] Populate DV Done
20,802,882 UART: [fht] FMC Alias Private Key: 7
20,804,634 UART: [art] Derive CDI
20,805,452 UART: [art] Store in in slot 0x4
20,863,122 UART: [art] Derive Key Pair
20,864,166 UART: [art] Store priv key in slot 0x5
23,326,432 UART: [art] Derive Key Pair - Done
23,339,493 UART: [art] Signing Cert with AUTHO
23,340,796 UART: RITY.KEYID = 7
25,052,607 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,121 UART: [art] PUB.X = A4747A07A4F0468CD340AA55B171474E9AC3F53BC3D0368FD42AFB459E0D4C744A4851A0C5AAB94C097C4EA5D73917B1
25,061,399 UART: [art] PUB.Y = FEB69655988AAB8AFEA9A2B5A87EA174326B290A75471AD2659A7A47A6C355D88AA6D2F347F2E880201268B7F9F483A4
25,068,670 UART: [art] SIG.R = 95452B7A7253D8BA87176DCE7772BD002C7186CA9CD1AA698C00244525F1F4C2FE049158E61332A25A893737BE9ECA35
25,076,021 UART: [art] SIG.S = 4B608AA63773E63AE5CDE5B42599B24B064447073D309B2C24120F8B12A18C23A0500E42B34AAEC0D1CDC8300D10021B
26,054,890 UART: Caliptra RT
26,055,583 UART: [state] CFI Enabled
26,220,698 UART: [rt] RT listening for mailbox commands...
26,222,550 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,252,222 UART: [rt]cmd =0x46504c54, len=4
26,253,690 >>> mbox cmd response data (8 bytes)
26,254,697 UART: [rt] FIPS self test
26,255,639 UART: [kat] ++
26,256,087 UART: [kat] sha1
26,260,465 UART: [kat] SHA2-256
26,262,349 UART: [kat] SHA2-384
26,263,399 UART: Fatal Error: 0x90020001
26,298,712 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,443,147 >>> mbox cmd response: failed
26,443,791 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,587,928 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,038 UART:
190,347 UART: Running Caliptra ROM ...
191,373 UART:
191,511 UART: [state] CFI Enabled
254,229 UART: [state] LifecycleState = Unprovisioned
256,648 UART: [state] DebugLocked = No
258,863 UART: [state] WD Timer not started. Device not locked for debugging
262,934 UART: [kat] SHA2-256
452,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,563 UART: [kat] ++
464,007 UART: [kat] sha1
475,652 UART: [kat] SHA2-256
478,668 UART: [kat] SHA2-384
484,379 UART: [kat] SHA2-512-ACC
486,959 UART: [kat] ECC-384
2,937,415 UART: [kat] HMAC-384Kdf
2,961,203 UART: [kat] LMS
3,492,989 UART: [kat] --
3,495,811 UART: [cold-reset] ++
3,497,583 UART: [fht] FHT @ 0x50003400
3,510,082 UART: [idev] ++
3,510,767 UART: [idev] CDI.KEYID = 6
3,511,736 UART: [idev] SUBJECT.KEYID = 7
3,512,897 UART: [idev] UDS.KEYID = 0
3,514,468 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,659,009 UART: [idev] Erasing UDS.KEYID = 0
6,018,355 UART: [idev] Sha1 KeyId Algorithm
6,040,908 UART: [idev] --
6,045,622 UART: [ldev] ++
6,046,313 UART: [ldev] CDI.KEYID = 6
6,047,224 UART: [ldev] SUBJECT.KEYID = 5
6,048,345 UART: [ldev] AUTHORITY.KEYID = 7
6,049,634 UART: [ldev] FE.KEYID = 1
6,090,575 UART: [ldev] Erasing FE.KEYID = 1
8,597,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,837 UART: [ldev] --
10,404,418 UART: [fwproc] Wait for Commands...
10,407,123 UART: [fwproc] Recv command 0x46574c44
10,409,435 UART: [fwproc] Recv'd Img size: 114940 bytes
13,862,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,895 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,603,379 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,439,320 ready_for_fw is high
3,439,765 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,741,622 >>> mbox cmd response: success
19,044,097 UART:
19,044,507 UART: Running Caliptra FMC ...
19,045,666 UART:
19,045,835 UART: [state] CFI Enabled
19,113,629 UART: [fht] FMC Alias Private Key: 7
20,877,645 UART: [art] Extend RT PCRs Done
20,878,864 UART: [art] Lock RT PCRs Done
20,880,457 UART: [art] Populate DV Done
20,885,771 UART: [fht] FMC Alias Private Key: 7
20,887,421 UART: [art] Derive CDI
20,888,237 UART: [art] Store in in slot 0x4
20,946,737 UART: [art] Derive Key Pair
20,947,772 UART: [art] Store priv key in slot 0x5
23,410,657 UART: [art] Derive Key Pair - Done
23,423,597 UART: [art] Signing Cert with AUTHO
23,424,892 UART: RITY.KEYID = 7
25,136,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,279 UART: [art] PUB.X = 73BA5C36F25E3D2791BFCE2041961AD4869C0566E5858A4109F5A1FF664A2406315DBDD89566DB862846E033C9ADAF33
25,145,546 UART: [art] PUB.Y = 76BF43996C932C48C76619456871E2600FB92D2CFB6FD7D45A7B602ADD807EFF864D34B4951B1D31B1A140FB772ECC91
25,152,813 UART: [art] SIG.R = B196E69C9E88BF8D448D8F6951BE345E1362796460F01DC1EC8307E42C255E423FF0151E1818E09D55F6C1B761AFC794
25,160,213 UART: [art] SIG.S = CFF16D0CD70172D48B5D9F02A25DDEE77835EB22C9A8E325541BEAAEB5459A6AF5799F9F78DA51C6338E4C92F54946A4
26,139,298 UART: Caliptra RT
26,140,745 UART: [state] CFI Enabled
26,308,983 UART: [rt] RT listening for mailbox commands...
26,311,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,341,067 UART: [rt]cmd =0x46504c54, len=4
26,342,542 >>> mbox cmd response data (8 bytes)
26,343,512 UART: [rt] FIPS self test
26,344,462 UART: [kat] ++
26,344,913 UART: [kat] sha1
26,349,527 UART: [kat] SHA2-256
26,351,402 UART: [kat] SHA2-384
26,352,418 UART: Fatal Error: 0x90020001
26,387,907 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,532,844 >>> mbox cmd response: failed
26,533,499 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,677,814 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,425,743 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,733,368 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,550 UART:
192,912 UART: Running Caliptra ROM ...
194,049 UART:
603,558 UART: [state] CFI Enabled
617,709 UART: [state] LifecycleState = Unprovisioned
620,085 UART: [state] DebugLocked = No
622,547 UART: [state] WD Timer not started. Device not locked for debugging
626,799 UART: [kat] SHA2-256
816,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,486 UART: [kat] ++
827,959 UART: [kat] sha1
840,261 UART: [kat] SHA2-256
843,256 UART: [kat] SHA2-384
847,786 UART: [kat] SHA2-512-ACC
850,393 UART: [kat] ECC-384
3,291,642 UART: [kat] HMAC-384Kdf
3,303,442 UART: [kat] LMS
3,835,302 UART: [kat] --
3,840,748 UART: [cold-reset] ++
3,842,404 UART: [fht] FHT @ 0x50003400
3,855,304 UART: [idev] ++
3,855,948 UART: [idev] CDI.KEYID = 6
3,856,940 UART: [idev] SUBJECT.KEYID = 7
3,858,058 UART: [idev] UDS.KEYID = 0
3,859,118 ready_for_fw is high
3,859,346 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,003,819 UART: [idev] Erasing UDS.KEYID = 0
6,332,986 UART: [idev] Sha1 KeyId Algorithm
6,355,917 UART: [idev] --
6,361,374 UART: [ldev] ++
6,362,040 UART: [ldev] CDI.KEYID = 6
6,362,963 UART: [ldev] SUBJECT.KEYID = 5
6,364,075 UART: [ldev] AUTHORITY.KEYID = 7
6,365,312 UART: [ldev] FE.KEYID = 1
6,376,667 UART: [ldev] Erasing FE.KEYID = 1
8,854,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,757 UART: [ldev] --
10,649,113 UART: [fwproc] Wait for Commands...
10,651,748 UART: [fwproc] Recv command 0x46574c44
10,654,007 UART: [fwproc] Recv'd Img size: 114940 bytes
14,108,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,187,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,303,361 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,849,974 >>> mbox cmd response: success
14,854,586 UART: [afmc] ++
14,855,292 UART: [afmc] CDI.KEYID = 6
14,856,479 UART: [afmc] SUBJECT.KEYID = 7
14,857,967 UART: [afmc] AUTHORITY.KEYID = 5
17,361,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,602 UART: [afmc] --
19,158,885 UART: [cold-reset] --
19,163,591 UART: [state] Locking Datavault
19,171,693 UART: [state] Locking PCR0, PCR1 and PCR31
19,173,884 UART: [state] Locking ICCM
19,176,878 UART: [exit] Launching FMC @ 0x40000130
19,185,545 UART:
19,185,781 UART: Running Caliptra FMC ...
19,186,805 UART:
19,186,951 UART: [state] CFI Enabled
19,194,943 UART: [fht] FMC Alias Private Key: 7
20,952,247 UART: [art] Extend RT PCRs Done
20,953,467 UART: [art] Lock RT PCRs Done
20,954,848 UART: [art] Populate DV Done
20,960,617 UART: [fht] FMC Alias Private Key: 7
20,962,242 UART: [art] Derive CDI
20,962,985 UART: [art] Store in in slot 0x4
21,005,642 UART: [art] Derive Key Pair
21,006,714 UART: [art] Store priv key in slot 0x5
23,433,091 UART: [art] Derive Key Pair - Done
23,446,309 UART: [art] Signing Cert with AUTHO
23,447,613 UART: RITY.KEYID = 7
25,152,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,511 UART: [art] PUB.X = DF3C618BF89609A95AA3701E055112A223560EA482C583262859F2E0E5A299B3EF17971FFF5769C7B122C008335A9E85
25,161,842 UART: [art] PUB.Y = 0BEF670F746213919475F4DDCAE8FF9A1D1C85F73D4C5641BB9E2333A71828E11434F049EA38A1013C2BECDBBE73AC29
25,169,038 UART: [art] SIG.R = B29875919702EF1E22F4E7C290F4CA8B52485E029D3AC47C075978CA3164327217AE3B550F680B9BEB11D290B6B86E06
25,176,390 UART: [art] SIG.S = 7894D28C6CCD5C0E1C80F0CED9C5608F14D0080CA3497B66B71175A2C4E158E0D6A5F70828203FC3AFA7FD9796D9D6CD
26,154,883 UART: Caliptra RT
26,155,571 UART: [state] CFI Enabled
26,272,599 UART: [rt] RT listening for mailbox commands...
26,274,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,303,964 UART: [rt]cmd =0x46504c54, len=4
26,305,627 >>> mbox cmd response data (8 bytes)
26,306,806 UART: [rt] FIPS self test
26,307,770 UART: [kat] ++
26,308,224 UART: [kat] sha1
26,312,626 UART: [kat] SHA2-256
26,314,554 UART: [kat] SHA2-384
26,315,571 UART: Fatal Error: 0x90020001
26,350,721 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,495,053 >>> mbox cmd response: failed
26,495,701 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,640,022 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,111 UART:
190,423 UART: Running Caliptra ROM ...
191,455 UART:
13,901,802 UART: [state] CFI Enabled
13,915,430 UART: [state] LifecycleState = Unprovisioned
13,917,851 UART: [state] DebugLocked = No
13,920,529 UART: [state] WD Timer not started. Device not locked for debugging
13,925,625 UART: [kat] SHA2-256
14,115,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,126,324 UART: [kat] ++
14,126,868 UART: [kat] sha1
14,138,574 UART: [kat] SHA2-256
14,141,588 UART: [kat] SHA2-384
14,146,221 UART: [kat] SHA2-512-ACC
14,148,837 UART: [kat] ECC-384
16,588,842 UART: [kat] HMAC-384Kdf
16,601,027 UART: [kat] LMS
17,132,841 UART: [kat] --
17,137,066 UART: [cold-reset] ++
17,139,659 UART: [fht] FHT @ 0x50003400
17,152,207 UART: [idev] ++
17,152,902 UART: [idev] CDI.KEYID = 6
17,153,806 UART: [idev] SUBJECT.KEYID = 7
17,155,021 UART: [idev] UDS.KEYID = 0
17,156,556 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,300,839 UART: [idev] Erasing UDS.KEYID = 0
19,630,644 UART: [idev] Sha1 KeyId Algorithm
19,653,326 UART: [idev] --
19,657,401 UART: [ldev] ++
19,658,087 UART: [ldev] CDI.KEYID = 6
19,658,971 UART: [ldev] SUBJECT.KEYID = 5
19,660,182 UART: [ldev] AUTHORITY.KEYID = 7
19,661,413 UART: [ldev] FE.KEYID = 1
19,672,250 UART: [ldev] Erasing FE.KEYID = 1
22,150,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,868,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,883,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,899,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,914,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,934,612 UART: [ldev] --
23,939,927 UART: [fwproc] Wait for Commands...
23,941,374 UART: [fwproc] Recv command 0x46574c44
23,943,308 UART: [fwproc] Recv'd Img size: 114940 bytes
27,391,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,470,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,586,263 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,133,164 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,752,840 ready_for_fw is high
3,753,499 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,962,472 >>> mbox cmd response: success
19,218,581 UART:
19,218,963 UART: Running Caliptra FMC ...
19,220,200 UART:
19,220,375 UART: [state] CFI Enabled
19,227,994 UART: [fht] FMC Alias Private Key: 7
20,984,980 UART: [art] Extend RT PCRs Done
20,986,201 UART: [art] Lock RT PCRs Done
20,988,131 UART: [art] Populate DV Done
20,993,437 UART: [fht] FMC Alias Private Key: 7
20,994,983 UART: [art] Derive CDI
20,995,753 UART: [art] Store in in slot 0x4
21,038,406 UART: [art] Derive Key Pair
21,039,452 UART: [art] Store priv key in slot 0x5
23,465,742 UART: [art] Derive Key Pair - Done
23,478,801 UART: [art] Signing Cert with AUTHO
23,480,109 UART: RITY.KEYID = 7
25,185,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,028 UART: [art] PUB.X = ADE67DF098E65E25BB8C665AFCCF870E6BB77D158843BE5B971886B72F81E2E4B4E6BF7C58793602972FE49125E4ED9E
25,194,292 UART: [art] PUB.Y = 9C05A8AFCD8A58784CBA91B09846FC5CD47D63539B75ACD53DADDFA9DEAB84480AD9C1756C75A7D5F8B0A72169009780
25,201,573 UART: [art] SIG.R = 9A303388606F03A25C93D8B9EB21B986C1B7B1D254D5851EBC764053DDFBEF706478DC9BB1572BD1F2E1A733D5D8C938
25,208,962 UART: [art] SIG.S = 685CA0F1A5674DB42CEDCBDF4C225F48E8191F485D8DCFD192681EAD5BE50C8B4137A1CBE71DA7E766E6264904CF9BF1
26,188,091 UART: Caliptra RT
26,188,807 UART: [state] CFI Enabled
26,306,599 UART: [rt] RT listening for mailbox commands...
26,308,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,343 UART: [rt]cmd =0x46504c54, len=4
26,339,976 >>> mbox cmd response data (8 bytes)
26,340,922 UART: [rt] FIPS self test
26,341,863 UART: [kat] ++
26,342,362 UART: [kat] sha1
26,346,656 UART: [kat] SHA2-256
26,348,533 UART: [kat] SHA2-384
26,349,926 UART: Fatal Error: 0x90020001
26,385,324 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,529,569 >>> mbox cmd response: failed
26,530,181 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,674,457 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
17,006,803 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,217,307 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,879 UART: [kat] SHA2-256
881,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,925 UART: [kat] ++
886,077 UART: [kat] sha1
890,153 UART: [kat] SHA2-256
892,091 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,333 UART: [fht] Storing FHT @ 0x50003400
1,479,130 UART: [idev] ++
1,479,298 UART: [idev] CDI.KEYID = 6
1,479,658 UART: [idev] SUBJECT.KEYID = 7
1,480,082 UART: [idev] UDS.KEYID = 0
1,480,427 ready_for_fw is high
1,480,427 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,487,950 UART: [idev] Erasing UDS.KEYID = 0
1,504,136 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,710 UART: [idev] --
1,513,575 UART: [ldev] ++
1,513,743 UART: [ldev] CDI.KEYID = 6
1,514,106 UART: [ldev] SUBJECT.KEYID = 5
1,514,532 UART: [ldev] AUTHORITY.KEYID = 7
1,514,995 UART: [ldev] FE.KEYID = 1
1,520,385 UART: [ldev] Erasing FE.KEYID = 1
1,545,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,616 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,784 UART: [fwproc] Received command 0x46574c44
1,586,575 UART: [fwproc] Received Image of size 114940 bytes
2,892,019 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,161 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,974 >>> mbox cmd response: success
3,087,170 UART: [afmc] ++
3,087,338 UART: [afmc] CDI.KEYID = 6
3,087,700 UART: [afmc] SUBJECT.KEYID = 7
3,088,125 UART: [afmc] AUTHORITY.KEYID = 5
3,123,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,031 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,721 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,606 UART: [afmc] --
3,166,644 UART: [cold-reset] --
3,167,488 UART: [state] Locking Datavault
3,168,591 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,195 UART: [state] Locking ICCM
3,169,805 UART: [exit] Launching FMC @ 0x40000130
3,175,134 UART:
3,175,150 UART: Running Caliptra FMC ...
3,175,558 UART:
3,175,612 UART: [state] CFI Enabled
3,186,173 UART: [fht] FMC Alias Private Key: 7
3,293,838 UART: [art] Extend RT PCRs Done
3,294,266 UART: [art] Lock RT PCRs Done
3,295,982 UART: [art] Populate DV Done
3,304,389 UART: [fht] FMC Alias Private Key: 7
3,305,563 UART: [art] Derive CDI
3,305,843 UART: [art] Store in in slot 0x4
3,391,352 UART: [art] Derive Key Pair
3,391,712 UART: [art] Store priv key in slot 0x5
3,405,056 UART: [art] Derive Key Pair - Done
3,419,926 UART: [art] Signing Cert with AUTHO
3,420,406 UART: RITY.KEYID = 7
3,435,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,205 UART: [art] PUB.X = 3E49F49D1F417418F546E5F358618EAF04B0209661707C57DF29142FB52878B13ECEEA403BBB922CD566A8C2275B8B16
3,442,972 UART: [art] PUB.Y = 9442470E622386CF44F40A4786C04A3E75C92DCE956474A78CB2DBC2D8A58B3177F16DBF04BA5D2E15EFF2E8A1C0AF44
3,449,925 UART: [art] SIG.R = 9E9854834CCE4F9C63C49751016EAE71536F8F4CD039F702D69C84D65DD633B61F1DCD14173B2B0C1BA33182829C124A
3,456,688 UART: [art] SIG.S = 034BD4B8BDF7206AC0E511782B7718BE9B13559016BA6E22A1E6903006802CF61E0082F122FD7DBAD9B7FC4DDEEEDD85
3,480,465 UART: Caliptra RT
3,480,718 UART: [state] CFI Enabled
3,588,605 UART: [rt] RT listening for mailbox commands...
3,589,268 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,197 UART: [rt]cmd =0x46504c54, len=4
3,620,333 >>> mbox cmd response data (8 bytes)
3,620,480 UART: [rt] FIPS self test
3,620,808 UART: [kat] ++
3,620,960 UART: [kat] sha1
3,625,220 UART: [kat] SHA2-256
3,627,242 UART: [kat] SHA2-384
3,628,278 UART: Fatal Error: 0x90020001
3,629,817 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,629,822 >>> mbox cmd response: failed
3,629,822 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,629,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,497 UART: [kat] SHA2-256
882,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,543 UART: [kat] ++
886,695 UART: [kat] sha1
890,967 UART: [kat] SHA2-256
892,905 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
902,850 UART: [kat] HMAC-384Kdf
907,332 UART: [kat] LMS
1,475,528 UART: [kat] --
1,476,503 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,554 UART: [idev] Erasing UDS.KEYID = 0
1,504,822 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,478 UART: [idev] --
1,514,629 UART: [ldev] ++
1,514,797 UART: [ldev] CDI.KEYID = 6
1,515,160 UART: [ldev] SUBJECT.KEYID = 5
1,515,586 UART: [ldev] AUTHORITY.KEYID = 7
1,516,049 UART: [ldev] FE.KEYID = 1
1,521,327 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,032 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,334 UART: [fwproc] Received command 0x46574c44
1,587,125 UART: [fwproc] Received Image of size 114940 bytes
2,891,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,399 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,084,560 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,593 ready_for_fw is high
1,362,593 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,670 >>> mbox cmd response: success
2,996,772 UART:
2,996,788 UART: Running Caliptra FMC ...
2,997,196 UART:
2,997,250 UART: [state] CFI Enabled
3,007,277 UART: [fht] FMC Alias Private Key: 7
3,115,630 UART: [art] Extend RT PCRs Done
3,116,058 UART: [art] Lock RT PCRs Done
3,117,414 UART: [art] Populate DV Done
3,125,519 UART: [fht] FMC Alias Private Key: 7
3,126,643 UART: [art] Derive CDI
3,126,923 UART: [art] Store in in slot 0x4
3,212,692 UART: [art] Derive Key Pair
3,213,052 UART: [art] Store priv key in slot 0x5
3,226,462 UART: [art] Derive Key Pair - Done
3,241,532 UART: [art] Signing Cert with AUTHO
3,242,012 UART: RITY.KEYID = 7
3,257,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,815 UART: [art] PUB.X = F03379B7BD757EBDB640EC1904F4550F62AAA160DD5E65C66D454C424114D97C046E106DC1FB1ABA02189E3C315BA548
3,264,581 UART: [art] PUB.Y = B1E7E4A0F70CD7EACE28EEC8C47BFD2954121F42F8E745511FEC6748F30FC3189DEE881E87A5D3F831B88DA63697C090
3,271,539 UART: [art] SIG.R = A373D78E30D38A089899C5CAB3B75209CCB0BE50EF82DFC05C11A9C95ED01E7B88431CF51CA61D2A74DED58C003FE17A
3,278,299 UART: [art] SIG.S = EF43197867895515DE8C89152FA53208E02573B4290B2B00704DDDFA7B2C62D74C8CBDC94FD769F3A3FF00EACAA6907A
3,302,494 UART: Caliptra RT
3,302,747 UART: [state] CFI Enabled
3,410,727 UART: [rt] RT listening for mailbox commands...
3,411,390 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,321 UART: [rt]cmd =0x46504c54, len=4
3,442,451 >>> mbox cmd response data (8 bytes)
3,442,770 UART: [rt] FIPS self test
3,443,098 UART: [kat] ++
3,443,250 UART: [kat] sha1
3,447,610 UART: [kat] SHA2-256
3,449,632 UART: [kat] SHA2-384
3,450,442 UART: Fatal Error: 0x90020001
3,451,981 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,451,986 >>> mbox cmd response: failed
3,451,986 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,451,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,291 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,878 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,678 UART: [kat] SHA2-256
892,616 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,645 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,128 UART: [cold-reset] ++
1,476,470 UART: [fht] Storing FHT @ 0x50003400
1,479,357 UART: [idev] ++
1,479,525 UART: [idev] CDI.KEYID = 6
1,479,885 UART: [idev] SUBJECT.KEYID = 7
1,480,309 UART: [idev] UDS.KEYID = 0
1,480,654 ready_for_fw is high
1,480,654 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,185 UART: [idev] Erasing UDS.KEYID = 0
1,504,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,341 UART: [idev] --
1,514,556 UART: [ldev] ++
1,514,724 UART: [ldev] CDI.KEYID = 6
1,515,087 UART: [ldev] SUBJECT.KEYID = 5
1,515,513 UART: [ldev] AUTHORITY.KEYID = 7
1,515,976 UART: [ldev] FE.KEYID = 1
1,521,178 UART: [ldev] Erasing FE.KEYID = 1
1,546,839 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,428 UART: [fwproc] Waiting for Commands...
1,587,165 UART: [fwproc] Received command 0x46574c44
1,587,956 UART: [fwproc] Received Image of size 114940 bytes
2,893,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,504 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,856 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,631 >>> mbox cmd response: success
3,088,819 UART: [afmc] ++
3,088,987 UART: [afmc] CDI.KEYID = 6
3,089,349 UART: [afmc] SUBJECT.KEYID = 7
3,089,774 UART: [afmc] AUTHORITY.KEYID = 5
3,125,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,267 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,660 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,350 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,123 UART: [afmc] --
3,168,203 UART: [cold-reset] --
3,169,271 UART: [state] Locking Datavault
3,170,452 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,056 UART: [state] Locking ICCM
3,171,640 UART: [exit] Launching FMC @ 0x40000130
3,176,969 UART:
3,176,985 UART: Running Caliptra FMC ...
3,177,393 UART:
3,177,536 UART: [state] CFI Enabled
3,187,969 UART: [fht] FMC Alias Private Key: 7
3,295,804 UART: [art] Extend RT PCRs Done
3,296,232 UART: [art] Lock RT PCRs Done
3,297,954 UART: [art] Populate DV Done
3,306,165 UART: [fht] FMC Alias Private Key: 7
3,307,165 UART: [art] Derive CDI
3,307,445 UART: [art] Store in in slot 0x4
3,392,824 UART: [art] Derive Key Pair
3,393,184 UART: [art] Store priv key in slot 0x5
3,405,904 UART: [art] Derive Key Pair - Done
3,420,896 UART: [art] Signing Cert with AUTHO
3,421,376 UART: RITY.KEYID = 7
3,436,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,413 UART: [art] PUB.X = 52194E5C6EE7B9BCEF45578D8DEBADE6F2B10432B81C4FF4BA64D2854B72632B72CE5114673AB35BC3893238FFD58939
3,444,190 UART: [art] PUB.Y = 312A49928CC917646D268FF1B4A7DC6D62EB0A0C2E1783B8619721B71DF9D5A5DA257F5A794BEEBCF0F641AA3EB6C718
3,451,148 UART: [art] SIG.R = 86AED9FFFDDB6A1856DAF1318794CB7478A223F6905F7E0DFF5F5E48F3768CF027C8662EE2AB9453CBBE57B45682CE2A
3,457,933 UART: [art] SIG.S = 5B55926413E77E946B3DF462C19978FCB135639FEE7908155E1D66B25C8E0A72947B19324A4D07F2D722DA836AA7E40D
3,481,562 UART: Caliptra RT
3,481,907 UART: [state] CFI Enabled
3,588,918 UART: [rt] RT listening for mailbox commands...
3,589,581 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,268 UART: [rt]cmd =0x46504c54, len=4
3,620,514 >>> mbox cmd response data (8 bytes)
3,620,695 UART: [rt] FIPS self test
3,621,023 UART: [kat] ++
3,621,175 UART: [kat] sha1
3,625,245 UART: [kat] SHA2-256
3,627,267 UART: [kat] SHA2-384
3,628,189 UART: Fatal Error: 0x90020001
3,629,728 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,629,733 >>> mbox cmd response: failed
3,629,733 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,629,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,276 UART: [kat] SHA2-256
882,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,322 UART: [kat] ++
886,474 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
903,143 UART: [kat] HMAC-384Kdf
907,851 UART: [kat] LMS
1,476,047 UART: [kat] --
1,477,024 UART: [cold-reset] ++
1,477,388 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,506,213 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,721 UART: [idev] --
1,515,952 UART: [ldev] ++
1,516,120 UART: [ldev] CDI.KEYID = 6
1,516,483 UART: [ldev] SUBJECT.KEYID = 5
1,516,909 UART: [ldev] AUTHORITY.KEYID = 7
1,517,372 UART: [ldev] FE.KEYID = 1
1,522,680 UART: [ldev] Erasing FE.KEYID = 1
1,548,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,347 UART: [ldev] --
1,587,776 UART: [fwproc] Waiting for Commands...
1,588,573 UART: [fwproc] Received command 0x46574c44
1,589,364 UART: [fwproc] Received Image of size 114940 bytes
2,894,074 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,235 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 ready_for_fw is high
1,363,242 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,939,189 >>> mbox cmd response: success
3,000,869 UART:
3,000,885 UART: Running Caliptra FMC ...
3,001,293 UART:
3,001,436 UART: [state] CFI Enabled
3,012,267 UART: [fht] FMC Alias Private Key: 7
3,120,612 UART: [art] Extend RT PCRs Done
3,121,040 UART: [art] Lock RT PCRs Done
3,122,784 UART: [art] Populate DV Done
3,131,041 UART: [fht] FMC Alias Private Key: 7
3,132,217 UART: [art] Derive CDI
3,132,497 UART: [art] Store in in slot 0x4
3,218,176 UART: [art] Derive Key Pair
3,218,536 UART: [art] Store priv key in slot 0x5
3,231,930 UART: [art] Derive Key Pair - Done
3,246,549 UART: [art] Signing Cert with AUTHO
3,247,029 UART: RITY.KEYID = 7
3,262,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,590 UART: [art] PUB.X = D57B4E01775451C855D82A64A6CF4C96C0074E605D1465DA38D22880148BAF73D8B643A88BD37BC582245792112CAE38
3,270,350 UART: [art] PUB.Y = 109C8F4264B7CB4A9529E1F52A020A9D03D68860325256D9A1D409EC68AB5250544171C455AE4B5563ED02AD02400149
3,277,271 UART: [art] SIG.R = B4DC1F4F875FFF8014210BDF5D505B3E2CEAABCDDC0B257F3BB2FEF3528AA312A2EEB3AEF705C034D19C8E4A8FA9DE89
3,284,066 UART: [art] SIG.S = BC88BBE2E6BD1956AC833DF90B37ACC119311C0900A066C136B1621FFB8EBA15AA9BF9B36F6486941E428FA17153294F
3,307,891 UART: Caliptra RT
3,308,236 UART: [state] CFI Enabled
3,416,756 UART: [rt] RT listening for mailbox commands...
3,417,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,246 UART: [rt]cmd =0x46504c54, len=4
3,448,376 >>> mbox cmd response data (8 bytes)
3,448,687 UART: [rt] FIPS self test
3,449,015 UART: [kat] ++
3,449,167 UART: [kat] sha1
3,453,401 UART: [kat] SHA2-256
3,455,423 UART: [kat] SHA2-384
3,456,307 UART: Fatal Error: 0x90020001
3,457,846 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,851 >>> mbox cmd response: failed
3,457,851 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,457,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,434 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,913 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
893,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,447 UART: [kat] ++
897,599 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,112 UART: [kat] HMAC-384Kdf
922,670 UART: [kat] LMS
1,170,998 UART: [kat] --
1,172,007 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,174 UART: [idev] ++
1,175,342 UART: [idev] CDI.KEYID = 6
1,175,702 UART: [idev] SUBJECT.KEYID = 7
1,176,126 UART: [idev] UDS.KEYID = 0
1,176,471 ready_for_fw is high
1,176,471 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,200,965 UART: [idev] Sha1 KeyId Algorithm
1,209,391 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,986 UART: [ldev] SUBJECT.KEYID = 5
1,211,412 UART: [ldev] AUTHORITY.KEYID = 7
1,211,875 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,816 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,483 >>> mbox cmd response: success
2,780,659 UART: [afmc] ++
2,780,827 UART: [afmc] CDI.KEYID = 6
2,781,189 UART: [afmc] SUBJECT.KEYID = 7
2,781,614 UART: [afmc] AUTHORITY.KEYID = 5
2,816,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,144 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,029 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,748 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,766 UART: [afmc] --
2,860,690 UART: [cold-reset] --
2,861,780 UART: [state] Locking Datavault
2,863,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,781 UART: [state] Locking ICCM
2,864,375 UART: [exit] Launching FMC @ 0x40000130
2,869,704 UART:
2,869,720 UART: Running Caliptra FMC ...
2,870,128 UART:
2,870,182 UART: [state] CFI Enabled
2,880,751 UART: [fht] FMC Alias Private Key: 7
2,988,382 UART: [art] Extend RT PCRs Done
2,988,810 UART: [art] Lock RT PCRs Done
2,990,524 UART: [art] Populate DV Done
2,998,879 UART: [fht] FMC Alias Private Key: 7
2,999,811 UART: [art] Derive CDI
3,000,091 UART: [art] Store in in slot 0x4
3,085,376 UART: [art] Derive Key Pair
3,085,736 UART: [art] Store priv key in slot 0x5
3,098,946 UART: [art] Derive Key Pair - Done
3,113,746 UART: [art] Signing Cert with AUTHO
3,114,226 UART: RITY.KEYID = 7
3,129,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,267 UART: [art] PUB.X = 0B755E1B49CE8685670FBFDAC26906409B08C9A95A15E6250B646EBD2FE3CACE142B869710DAAEEBD3189FF9E1C540FA
3,137,040 UART: [art] PUB.Y = B3C304814F39F23F6DED87666BF5B48DEF9977D0C89007BBC303894A003E812878D73BAF55206E92459A62168A4108EB
3,143,954 UART: [art] SIG.R = 2440457D3FAF9853D5E207E96BBDDE0E056C09AACCF7E2622329DD016BDA437A1A34D0218C09935BEF55FD6CA077813E
3,150,718 UART: [art] SIG.S = 787C79A5813931077BEBDB713085FDA3DBB08E4B7DB88764D961E6192226CC72A1B36EA60C6DDCF5E647C09FF2FFE51E
3,174,453 UART: Caliptra RT
3,174,706 UART: [state] CFI Enabled
3,282,011 UART: [rt] RT listening for mailbox commands...
3,282,674 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,669 UART: [rt]cmd =0x46504c54, len=4
3,313,713 >>> mbox cmd response data (8 bytes)
3,313,962 UART: [rt] FIPS self test
3,314,290 UART: [kat] ++
3,314,442 UART: [kat] sha1
3,318,550 UART: [kat] SHA2-256
3,320,572 UART: [kat] SHA2-384
3,321,586 UART: Fatal Error: 0x90020001
3,323,125 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,130 >>> mbox cmd response: failed
3,323,130 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
917,964 UART: [kat] HMAC-384Kdf
922,464 UART: [kat] LMS
1,170,792 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,296 UART: [idev] ++
1,175,464 UART: [idev] CDI.KEYID = 6
1,175,824 UART: [idev] SUBJECT.KEYID = 7
1,176,248 UART: [idev] UDS.KEYID = 0
1,176,593 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,048 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,515 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,258 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,047 UART: [ldev] --
1,282,482 UART: [fwproc] Wait for Commands...
1,283,056 UART: [fwproc] Recv command 0x46574c44
1,283,784 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,740 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,583 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,513 ready_for_fw is high
1,059,513 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,719 >>> mbox cmd response: success
2,696,723 UART:
2,696,739 UART: Running Caliptra FMC ...
2,697,147 UART:
2,697,201 UART: [state] CFI Enabled
2,708,032 UART: [fht] FMC Alias Private Key: 7
2,815,809 UART: [art] Extend RT PCRs Done
2,816,237 UART: [art] Lock RT PCRs Done
2,817,631 UART: [art] Populate DV Done
2,826,056 UART: [fht] FMC Alias Private Key: 7
2,827,190 UART: [art] Derive CDI
2,827,470 UART: [art] Store in in slot 0x4
2,913,165 UART: [art] Derive Key Pair
2,913,525 UART: [art] Store priv key in slot 0x5
2,926,839 UART: [art] Derive Key Pair - Done
2,941,942 UART: [art] Signing Cert with AUTHO
2,942,422 UART: RITY.KEYID = 7
2,957,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,151 UART: [art] PUB.X = D7A95E8CD8720CD50863D5A187309E70D88B0BA6D6C271C6E9ECF284DC7070E4BD193B39316CFCBBC363FDF7AA14EB16
2,964,930 UART: [art] PUB.Y = 08460869237E06FD313BB9750C3D8C9BA0E8FEF465F20B2161CE9A544B935DA6AB78BEBF9098DD1B3243D7B44ABA5250
2,971,875 UART: [art] SIG.R = F6C12E96BFA0374CF3FFF685B9135DAE667075F90644E95EC49BAFC180BCD24A208E2FBFB51393AD3B832C1676F72A09
2,978,653 UART: [art] SIG.S = 107A87F91A1D363D380D8D35356DCADDF10026131DD4CE5755F7A8C058B4D2428E2444BD92BE7872203DA7AAEEECE90A
3,002,828 UART: Caliptra RT
3,003,081 UART: [state] CFI Enabled
3,109,044 UART: [rt] RT listening for mailbox commands...
3,109,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,638 UART: [rt]cmd =0x46504c54, len=4
3,140,758 >>> mbox cmd response data (8 bytes)
3,140,915 UART: [rt] FIPS self test
3,141,243 UART: [kat] ++
3,141,395 UART: [kat] sha1
3,145,663 UART: [kat] SHA2-256
3,147,685 UART: [kat] SHA2-384
3,148,587 UART: Fatal Error: 0x90020001
3,150,126 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,131 >>> mbox cmd response: failed
3,150,131 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,150,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,579 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,633,867 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
901,738 UART: [kat] SHA2-256
903,678 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
917,897 UART: [kat] HMAC-384Kdf
922,459 UART: [kat] LMS
1,170,787 UART: [kat] --
1,171,774 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,175,031 UART: [idev] ++
1,175,199 UART: [idev] CDI.KEYID = 6
1,175,559 UART: [idev] SUBJECT.KEYID = 7
1,175,983 UART: [idev] UDS.KEYID = 0
1,176,328 ready_for_fw is high
1,176,328 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,200,954 UART: [idev] Sha1 KeyId Algorithm
1,209,292 UART: [idev] --
1,210,406 UART: [ldev] ++
1,210,574 UART: [ldev] CDI.KEYID = 6
1,210,937 UART: [ldev] SUBJECT.KEYID = 5
1,211,363 UART: [ldev] AUTHORITY.KEYID = 7
1,211,826 UART: [ldev] FE.KEYID = 1
1,216,870 UART: [ldev] Erasing FE.KEYID = 1
1,243,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,436 UART: [ldev] --
1,282,753 UART: [fwproc] Wait for Commands...
1,283,323 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,737 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,338 >>> mbox cmd response: success
2,783,432 UART: [afmc] ++
2,783,600 UART: [afmc] CDI.KEYID = 6
2,783,962 UART: [afmc] SUBJECT.KEYID = 7
2,784,387 UART: [afmc] AUTHORITY.KEYID = 5
2,820,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,964 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,387 UART: [afmc] --
2,863,349 UART: [cold-reset] --
2,864,263 UART: [state] Locking Datavault
2,865,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,990 UART: [state] Locking ICCM
2,866,652 UART: [exit] Launching FMC @ 0x40000130
2,871,981 UART:
2,871,997 UART: Running Caliptra FMC ...
2,872,405 UART:
2,872,548 UART: [state] CFI Enabled
2,883,085 UART: [fht] FMC Alias Private Key: 7
2,990,466 UART: [art] Extend RT PCRs Done
2,990,894 UART: [art] Lock RT PCRs Done
2,992,182 UART: [art] Populate DV Done
3,000,247 UART: [fht] FMC Alias Private Key: 7
3,001,215 UART: [art] Derive CDI
3,001,495 UART: [art] Store in in slot 0x4
3,087,480 UART: [art] Derive Key Pair
3,087,840 UART: [art] Store priv key in slot 0x5
3,100,658 UART: [art] Derive Key Pair - Done
3,115,218 UART: [art] Signing Cert with AUTHO
3,115,698 UART: RITY.KEYID = 7
3,131,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,771 UART: [art] PUB.X = 7D5BD5BDDEE29471B7D031A1C80452B21DEC78F5E609677F37ECC6388A9A81468DDD28915A1DEF37F99A5D72722D4212
3,138,543 UART: [art] PUB.Y = E2DBEEAA621B7334AF1F12F672B349E3AAB64360A6B2A80F1257BA06FE96051CBAC9804D33F9027ACAC867DA480534D3
3,145,492 UART: [art] SIG.R = F5EFAB3C93362A892CCF87E86FAC0910F3C731F5C8795F73A29D1D33A953FFBA007C8BCA90A0A58CD4AB8D5A671F95CE
3,152,259 UART: [art] SIG.S = CC15B902D64C693E563B90D8B8C91816DC9256D2BCB5F887447CF03F7599B4B3CD335F3163499DCA4C6A22A970A8FD91
3,176,325 UART: Caliptra RT
3,176,670 UART: [state] CFI Enabled
3,283,312 UART: [rt] RT listening for mailbox commands...
3,283,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,964 UART: [rt]cmd =0x46504c54, len=4
3,315,142 >>> mbox cmd response data (8 bytes)
3,315,407 UART: [rt] FIPS self test
3,315,735 UART: [kat] ++
3,315,887 UART: [kat] sha1
3,320,213 UART: [kat] SHA2-256
3,322,235 UART: [kat] SHA2-384
3,323,111 UART: Fatal Error: 0x90020001
3,324,650 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,655 >>> mbox cmd response: failed
3,324,655 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,324,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Unprovisioned
86,588 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
893,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,114 UART: [kat] ++
898,266 UART: [kat] sha1
902,660 UART: [kat] SHA2-256
904,600 UART: [kat] SHA2-384
907,387 UART: [kat] SHA2-512-ACC
909,288 UART: [kat] ECC-384
918,805 UART: [kat] HMAC-384Kdf
923,615 UART: [kat] LMS
1,171,943 UART: [kat] --
1,172,846 UART: [cold-reset] ++
1,173,336 UART: [fht] FHT @ 0x50003400
1,176,035 UART: [idev] ++
1,176,203 UART: [idev] CDI.KEYID = 6
1,176,563 UART: [idev] SUBJECT.KEYID = 7
1,176,987 UART: [idev] UDS.KEYID = 0
1,177,332 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,202,006 UART: [idev] Sha1 KeyId Algorithm
1,210,534 UART: [idev] --
1,211,426 UART: [ldev] ++
1,211,594 UART: [ldev] CDI.KEYID = 6
1,211,957 UART: [ldev] SUBJECT.KEYID = 5
1,212,383 UART: [ldev] AUTHORITY.KEYID = 7
1,212,846 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,282 UART: [ldev] --
1,283,647 UART: [fwproc] Wait for Commands...
1,284,325 UART: [fwproc] Recv command 0x46574c44
1,285,053 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,211 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,876 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 ready_for_fw is high
1,060,792 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,113 >>> mbox cmd response: success
2,699,133 UART:
2,699,149 UART: Running Caliptra FMC ...
2,699,557 UART:
2,699,700 UART: [state] CFI Enabled
2,710,415 UART: [fht] FMC Alias Private Key: 7
2,818,524 UART: [art] Extend RT PCRs Done
2,818,952 UART: [art] Lock RT PCRs Done
2,820,216 UART: [art] Populate DV Done
2,828,157 UART: [fht] FMC Alias Private Key: 7
2,829,267 UART: [art] Derive CDI
2,829,547 UART: [art] Store in in slot 0x4
2,915,108 UART: [art] Derive Key Pair
2,915,468 UART: [art] Store priv key in slot 0x5
2,928,704 UART: [art] Derive Key Pair - Done
2,943,860 UART: [art] Signing Cert with AUTHO
2,944,340 UART: RITY.KEYID = 7
2,959,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,301 UART: [art] PUB.X = 07C8775E374CCD79215171AFE0BFFBA2257B362BC2BE5FB4D3FB8FDC9E29FEF144F0E92360C128F8C24189ABF93F13F5
2,967,086 UART: [art] PUB.Y = C0A42F9F47A7C314A3902F48485E40EB3CAC57321A66600A1F40F968FF19C6005BD1D0B2D9CEB316DE5E294A2AA2C031
2,974,021 UART: [art] SIG.R = C043AFBDC7D399BD6E629C101790395DD1064CB4C354053AD8CD13190CD91B510D822AC630C61A5F51DEC8144796BEB2
2,980,787 UART: [art] SIG.S = 5BCF3E7B329F9D7BF0DC71D68BC619A13AE4924CFD2A5364CB0A8CF0A4277FEACAF618470A97E243E84C6BB423E771F0
3,004,540 UART: Caliptra RT
3,004,885 UART: [state] CFI Enabled
3,112,480 UART: [rt] RT listening for mailbox commands...
3,113,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,966 UART: [rt]cmd =0x46504c54, len=4
3,144,210 >>> mbox cmd response data (8 bytes)
3,144,437 UART: [rt] FIPS self test
3,144,765 UART: [kat] ++
3,144,917 UART: [kat] sha1
3,149,047 UART: [kat] SHA2-256
3,151,069 UART: [kat] SHA2-384
3,151,973 UART: Fatal Error: 0x90020001
3,153,512 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,153,517 >>> mbox cmd response: failed
3,153,517 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,153,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,878 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,151 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,613 UART: [kat] ++
895,765 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,685 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,321 UART: [idev] --
1,208,368 UART: [ldev] ++
1,208,536 UART: [ldev] CDI.KEYID = 6
1,208,900 UART: [ldev] SUBJECT.KEYID = 5
1,209,327 UART: [ldev] AUTHORITY.KEYID = 7
1,209,790 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,884 UART: [ldev] --
1,280,278 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,825 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,447 >>> mbox cmd response: success
2,780,664 UART: [afmc] ++
2,780,832 UART: [afmc] CDI.KEYID = 6
2,781,195 UART: [afmc] SUBJECT.KEYID = 7
2,781,621 UART: [afmc] AUTHORITY.KEYID = 5
2,816,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,721 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,719 UART: [afmc] --
2,859,811 UART: [cold-reset] --
2,860,823 UART: [state] Locking Datavault
2,862,154 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,758 UART: [state] Locking ICCM
2,863,336 UART: [exit] Launching FMC @ 0x40000130
2,868,665 UART:
2,868,681 UART: Running Caliptra FMC ...
2,869,089 UART:
2,869,143 UART: [state] CFI Enabled
2,879,574 UART: [fht] FMC Alias Private Key: 7
2,987,799 UART: [art] Extend RT PCRs Done
2,988,227 UART: [art] Lock RT PCRs Done
2,989,985 UART: [art] Populate DV Done
2,998,264 UART: [fht] FMC Alias Private Key: 7
2,999,310 UART: [art] Derive CDI
2,999,590 UART: [art] Store in in slot 0x4
3,085,017 UART: [art] Derive Key Pair
3,085,377 UART: [art] Store priv key in slot 0x5
3,098,655 UART: [art] Derive Key Pair - Done
3,113,221 UART: [art] Signing Cert with AUTHO
3,113,701 UART: RITY.KEYID = 7
3,128,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,624 UART: [art] PUB.X = F9CCBCBA4DA2F827A6DC88BA6F2E0600B52AAB7D8A21DC9E8B6C011FFFB97BFBA0C69763CD7AF6B05DE33A1D084B34CA
3,136,399 UART: [art] PUB.Y = 336DEE0914DF5B0C19ED8C3CD977C366E15173503EA2BD74C13E69F7C584E3F49A396190D4EB3FAB70AB4467F36971D2
3,143,351 UART: [art] SIG.R = 2BF84E921D42325F4F5141197FD45A35DA9BCAAFA114615AA35B6E724767F37B80CE551B4180F40485E18F2E703BA0CC
3,150,124 UART: [art] SIG.S = 645E60588DDFDBA972A431AED355781C5030DD457956E485056FCCDF9984BA7CD5EB8CEA3595A6C362C0E953FE8BA7AB
3,174,256 UART: Caliptra RT
3,174,509 UART: [state] CFI Enabled
3,281,976 UART: [rt] RT listening for mailbox commands...
3,282,639 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,812 UART: [rt]cmd =0x46504c54, len=4
3,313,926 >>> mbox cmd response data (8 bytes)
3,314,235 UART: [rt] FIPS self test
3,314,563 UART: [kat] ++
3,314,715 UART: [kat] sha1
3,319,101 UART: [kat] SHA2-256
3,321,123 UART: [kat] SHA2-384
3,321,957 UART: Fatal Error: 0x90020001
3,323,496 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,501 >>> mbox cmd response: failed
3,323,501 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,323,506 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
890,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,007 UART: [kat] ++
895,159 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,202 UART: [kat] HMAC-384Kdf
919,860 UART: [kat] LMS
1,168,172 UART: [kat] --
1,168,967 UART: [cold-reset] ++
1,169,427 UART: [fht] FHT @ 0x50003400
1,172,223 UART: [idev] ++
1,172,391 UART: [idev] CDI.KEYID = 6
1,172,752 UART: [idev] SUBJECT.KEYID = 7
1,173,177 UART: [idev] UDS.KEYID = 0
1,173,523 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,180,797 UART: [idev] Erasing UDS.KEYID = 0
1,197,793 UART: [idev] Sha1 KeyId Algorithm
1,206,593 UART: [idev] --
1,207,604 UART: [ldev] ++
1,207,772 UART: [ldev] CDI.KEYID = 6
1,208,136 UART: [ldev] SUBJECT.KEYID = 5
1,208,563 UART: [ldev] AUTHORITY.KEYID = 7
1,209,026 UART: [ldev] FE.KEYID = 1
1,214,460 UART: [ldev] Erasing FE.KEYID = 1
1,240,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,923 UART: [fwproc] Recv command 0x46574c44
1,281,656 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,778,747 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,820 ready_for_fw is high
1,055,820 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,627 >>> mbox cmd response: success
2,691,835 UART:
2,691,851 UART: Running Caliptra FMC ...
2,692,259 UART:
2,692,313 UART: [state] CFI Enabled
2,703,090 UART: [fht] FMC Alias Private Key: 7
2,811,009 UART: [art] Extend RT PCRs Done
2,811,437 UART: [art] Lock RT PCRs Done
2,813,023 UART: [art] Populate DV Done
2,821,000 UART: [fht] FMC Alias Private Key: 7
2,822,082 UART: [art] Derive CDI
2,822,362 UART: [art] Store in in slot 0x4
2,907,997 UART: [art] Derive Key Pair
2,908,357 UART: [art] Store priv key in slot 0x5
2,921,301 UART: [art] Derive Key Pair - Done
2,935,938 UART: [art] Signing Cert with AUTHO
2,936,418 UART: RITY.KEYID = 7
2,951,880 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,645 UART: [art] PUB.X = 0F7ECA0E26756CC1B3442A98D5855B319304B61D821B87F1276B7485AD20279337146C810E49A62FAF6C4C7D60790521
2,959,392 UART: [art] PUB.Y = 69AADC5DB2B0A76A90851E22972D5F63EE6F47A395E49586934AE44C4652EA6FC7149174900340A306B075A8B0601BCA
2,966,336 UART: [art] SIG.R = 1A38F1532C6C519E877ECAFC8D5814B1ABB0904026F09BFD40A6CE4815F668D21389A2464B0C36E09F8721C81B336692
2,973,103 UART: [art] SIG.S = 6477B7BF25F4A2EFD7C9E2B1E368CB21FC9B35D93C3861D89CD7C29DC31862B65D3587E0DBEC030A75AE3CD5C529052B
2,996,543 UART: Caliptra RT
2,996,796 UART: [state] CFI Enabled
3,105,235 UART: [rt] RT listening for mailbox commands...
3,105,898 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,895 UART: [rt]cmd =0x46504c54, len=4
3,136,903 >>> mbox cmd response data (8 bytes)
3,137,086 UART: [rt] FIPS self test
3,137,414 UART: [kat] ++
3,137,566 UART: [kat] sha1
3,141,724 UART: [kat] SHA2-256
3,143,746 UART: [kat] SHA2-384
3,144,472 UART: Fatal Error: 0x90020001
3,146,011 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,146,016 >>> mbox cmd response: failed
3,146,016 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,146,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,660 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,113 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,447 UART: [kat] LMS
1,169,759 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,174,992 ready_for_fw is high
1,174,992 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,412 UART: [idev] --
1,209,425 UART: [ldev] ++
1,209,593 UART: [ldev] CDI.KEYID = 6
1,209,957 UART: [ldev] SUBJECT.KEYID = 5
1,210,384 UART: [ldev] AUTHORITY.KEYID = 7
1,210,847 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,127 UART: [ldev] --
1,281,401 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,540 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,300 >>> mbox cmd response: success
2,782,519 UART: [afmc] ++
2,782,687 UART: [afmc] CDI.KEYID = 6
2,783,050 UART: [afmc] SUBJECT.KEYID = 7
2,783,476 UART: [afmc] AUTHORITY.KEYID = 5
2,819,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,912 UART: [afmc] --
2,862,934 UART: [cold-reset] --
2,863,798 UART: [state] Locking Datavault
2,864,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,553 UART: [state] Locking ICCM
2,866,063 UART: [exit] Launching FMC @ 0x40000130
2,871,392 UART:
2,871,408 UART: Running Caliptra FMC ...
2,871,816 UART:
2,871,959 UART: [state] CFI Enabled
2,882,824 UART: [fht] FMC Alias Private Key: 7
2,990,229 UART: [art] Extend RT PCRs Done
2,990,657 UART: [art] Lock RT PCRs Done
2,992,125 UART: [art] Populate DV Done
3,000,198 UART: [fht] FMC Alias Private Key: 7
3,001,174 UART: [art] Derive CDI
3,001,454 UART: [art] Store in in slot 0x4
3,087,521 UART: [art] Derive Key Pair
3,087,881 UART: [art] Store priv key in slot 0x5
3,101,611 UART: [art] Derive Key Pair - Done
3,116,617 UART: [art] Signing Cert with AUTHO
3,117,097 UART: RITY.KEYID = 7
3,132,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,462 UART: [art] PUB.X = FE18E61B353B4A5A430B1D832C2E656CF30DB73E59989C104A40D4A8AD65FB1FBF665FFA12326664955CB036D30EA6D9
3,140,233 UART: [art] PUB.Y = 222BD3F1FCE8CD68ABEB16F2E8EE553A67D1190195CD42F3B0D22DEF9CD858A87EDB6F7BF23F7710E8A937FB669298BF
3,147,202 UART: [art] SIG.R = 5210C8491E613D2D1ADCB8FD3AA8948C07104C09F2C6E04B3C04D3B3A99C5A82E10174D562D9819C98BF5FFE69D45D46
3,153,968 UART: [art] SIG.S = A181AFE025A827A505122CA3D2D1FA310264FC261D33C15EA1522A0E4CF8F9A50894AF8C6720147A42511F283BEB1385
3,177,611 UART: Caliptra RT
3,177,956 UART: [state] CFI Enabled
3,286,051 UART: [rt] RT listening for mailbox commands...
3,286,714 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,441 UART: [rt]cmd =0x46504c54, len=4
3,317,517 >>> mbox cmd response data (8 bytes)
3,317,822 UART: [rt] FIPS self test
3,318,150 UART: [kat] ++
3,318,302 UART: [kat] sha1
3,322,318 UART: [kat] SHA2-256
3,324,340 UART: [kat] SHA2-384
3,325,078 UART: Fatal Error: 0x90020001
3,326,617 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,326,622 >>> mbox cmd response: failed
3,326,622 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,326,627 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,330 UART: [kat] ++
895,482 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,170,024 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,174,368 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,692 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,242,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,281,209 UART: [fwproc] Wait for Commands...
1,281,958 UART: [fwproc] Recv command 0x46574c44
1,282,691 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,238 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,860 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,719 ready_for_fw is high
1,056,719 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,902 >>> mbox cmd response: success
2,693,964 UART:
2,693,980 UART: Running Caliptra FMC ...
2,694,388 UART:
2,694,531 UART: [state] CFI Enabled
2,705,484 UART: [fht] FMC Alias Private Key: 7
2,813,783 UART: [art] Extend RT PCRs Done
2,814,211 UART: [art] Lock RT PCRs Done
2,815,775 UART: [art] Populate DV Done
2,824,312 UART: [fht] FMC Alias Private Key: 7
2,825,300 UART: [art] Derive CDI
2,825,580 UART: [art] Store in in slot 0x4
2,911,093 UART: [art] Derive Key Pair
2,911,453 UART: [art] Store priv key in slot 0x5
2,924,829 UART: [art] Derive Key Pair - Done
2,939,783 UART: [art] Signing Cert with AUTHO
2,940,263 UART: RITY.KEYID = 7
2,955,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,930 UART: [art] PUB.X = E5990F60869680D1A4CE133CA95D76139D20EB8539DB501D5A47039C3DE2CE2792D32104CC5ABE535CA1DA41BD9EDFA8
2,962,703 UART: [art] PUB.Y = 65D2EEBCEB5538D6DA56F08F4C69957AAC65A03F851B1F5F16FB687758D8F14D4273B70BD992E758F60E56AB0EC3E40C
2,969,655 UART: [art] SIG.R = 9CD962CF51856316C0644F31ABB134A289687FDAA44A8FCA2C83AAA28C25FBC32C8E211CE65995AD6B3EEDEDEC91D451
2,976,445 UART: [art] SIG.S = 82FBD175351471FA09C692EC63FE8B694FF48CDA7B0D4D801721F9CDD29B00B42650C1718540E1FF133F0547D8DA4DEA
2,999,883 UART: Caliptra RT
3,000,228 UART: [state] CFI Enabled
3,107,992 UART: [rt] RT listening for mailbox commands...
3,108,655 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,194 UART: [rt]cmd =0x46504c54, len=4
3,139,352 >>> mbox cmd response data (8 bytes)
3,139,571 UART: [rt] FIPS self test
3,139,899 UART: [kat] ++
3,140,051 UART: [kat] sha1
3,144,253 UART: [kat] SHA2-256
3,146,275 UART: [kat] SHA2-384
3,147,185 UART: Fatal Error: 0x90020001
3,148,724 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,729 >>> mbox cmd response: failed
3,148,729 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,148,734 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,203 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,798 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,682,251 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,825,947 >>> mbox cmd response: failed
2,826,522 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,969,252 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
4,867,948 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,444,864 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,687,755 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,831,483 >>> mbox cmd response: failed
2,832,049 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
2,975,241 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,868,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,438,845 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,042,347 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,186,098 >>> mbox cmd response: failed
3,186,672 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,330,768 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
21,581,517 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,011,924 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
3,042,003 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,185,668 >>> mbox cmd response: failed
3,186,230 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
3,329,092 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
21,591,126 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
35,022,975 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
2,700,496 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,844,654 >>> mbox cmd response: failed
2,845,222 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,988,523 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,457,673 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,462 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,692,114 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,836,305 >>> mbox cmd response: failed
2,836,876 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,980,007 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,451,229 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,237,864 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
3,049,090 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,193,236 >>> mbox cmd response: failed
3,193,791 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,337,063 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,164,035 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,905,495 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,051,428 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,195,646 >>> mbox cmd response: failed
3,196,203 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,339,330 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,180,915 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,906,759 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,699,484 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,843,678 >>> mbox cmd response: failed
2,844,234 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,987,523 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,457,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,292,547 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,698,454 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,842,940 >>> mbox cmd response: failed
2,843,495 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,986,838 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,443,785 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,263,828 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,059,658 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,204,035 >>> mbox cmd response: failed
3,204,603 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,348,069 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,156,272 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,886,295 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,055,392 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,199,662 >>> mbox cmd response: failed
3,200,235 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,343,525 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,184,093 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
30,909,689 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,855 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,863 >>> mbox cmd response: failed
811,863 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,667 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,153 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,463 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,471 >>> mbox cmd response: failed
811,471 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,055 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,753 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,870 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,878 >>> mbox cmd response: failed
811,878 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,884 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,645,542 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,640 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,648 >>> mbox cmd response: failed
811,648 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,324 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,902 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,219 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,227 >>> mbox cmd response: failed
811,227 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,115 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,807 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,341 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,349 >>> mbox cmd response: failed
811,349 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,419 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,269 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,460 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,468 >>> mbox cmd response: failed
812,468 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
812,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,506 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,642,376 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,716 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,724 >>> mbox cmd response: failed
811,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,730 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,966 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,454 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,179 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,187 >>> mbox cmd response: failed
811,187 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,301 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,015 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,231 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,239 >>> mbox cmd response: failed
811,239 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,269 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,397 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,954 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,962 >>> mbox cmd response: failed
811,962 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,492 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,643,590 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,842 >>> mbox cmd response: failed
811,842 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
811,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "6321a11b4c2df86c17ad02c1641c2dce2de623dc7641d07503848a6e9528695363453beffab3bdd0e86e0c45393f4264",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,226 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,644,930 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,240 UART:
192,628 UART: Running Caliptra ROM ...
193,805 UART:
193,960 UART: [state] CFI Enabled
264,036 UART: [state] LifecycleState = Unprovisioned
265,954 UART: [state] DebugLocked = No
267,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,787 UART: [kat] SHA2-256
442,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,023 UART: [kat] ++
453,511 UART: [kat] sha1
463,037 UART: [kat] SHA2-256
465,700 UART: [kat] SHA2-384
471,412 UART: [kat] SHA2-512-ACC
473,818 UART: [kat] ECC-384
2,767,666 UART: [kat] HMAC-384Kdf
2,801,245 UART: [kat] LMS
3,991,580 UART: [kat] --
3,996,625 UART: [cold-reset] ++
3,997,527 UART: [fht] Storing FHT @ 0x50003400
4,009,152 UART: [idev] ++
4,009,806 UART: [idev] CDI.KEYID = 6
4,010,729 UART: [idev] SUBJECT.KEYID = 7
4,011,917 UART: [idev] UDS.KEYID = 0
4,013,000 ready_for_fw is high
4,013,243 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,157,518 UART: [idev] Erasing UDS.KEYID = 0
7,345,364 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,028 UART: [idev] --
7,371,870 UART: [ldev] ++
7,372,453 UART: [ldev] CDI.KEYID = 6
7,373,393 UART: [ldev] SUBJECT.KEYID = 5
7,374,605 UART: [ldev] AUTHORITY.KEYID = 7
7,375,857 UART: [ldev] FE.KEYID = 1
7,422,941 UART: [ldev] Erasing FE.KEYID = 1
10,746,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,325 UART: [ldev] --
13,104,726 UART: [fwproc] Waiting for Commands...
13,107,105 UART: [fwproc] Received command 0x46574c44
13,109,296 UART: [fwproc] Received Image of size 114632 bytes
17,169,097 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,847 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,635,021 >>> mbox cmd response: success
17,639,815 UART: [afmc] ++
17,640,411 UART: [afmc] CDI.KEYID = 6
17,641,340 UART: [afmc] SUBJECT.KEYID = 7
17,642,556 UART: [afmc] AUTHORITY.KEYID = 5
20,998,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,296,016 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,298,293 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,312,678 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,327,530 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,341,954 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,363,930 UART: [afmc] --
23,367,606 UART: [cold-reset] --
23,372,450 UART: [state] Locking Datavault
23,378,350 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,060 UART: [state] Locking ICCM
23,381,462 UART: [exit] Launching FMC @ 0x40000130
23,389,826 UART:
23,390,068 UART: Running Caliptra FMC ...
23,391,173 UART:
23,391,349 UART: [state] CFI Enabled
23,458,329 UART: [fht] FMC Alias Private Key: 7
25,796,596 UART: [art] Extend RT PCRs Done
25,797,813 UART: [art] Lock RT PCRs Done
25,799,815 UART: [art] Populate DV Done
25,805,118 UART: [fht] FMC Alias Private Key: 7
25,806,603 UART: [art] Derive CDI
25,807,365 UART: [art] Store in in slot 0x4
25,866,781 UART: [art] Derive Key Pair
25,867,815 UART: [art] Store priv key in slot 0x5
29,161,072 UART: [art] Derive Key Pair - Done
29,174,176 UART: [art] Signing Cert with AUTHO
29,175,485 UART: RITY.KEYID = 7
31,462,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,071 UART: [art] PUB.X = AB5322B07EA2C598FC1A0A3D76D1EDBF8C4DE7FA12DC0F05F8BBAF9C0AA3A07FB5E028B2E86E01C5AD35FC8AE9857720
31,471,390 UART: [art] PUB.Y = B3C28304B7D1DEA60B699D7D93FFE76C73B5037A26D7CCB607555A43D4282DC85F5D1E51EA3EE2262A6464792958C4CC
31,478,586 UART: [art] SIG.R = FA38D054EF3B7620276504ADE41E4C9DAB7985209000F37DAD987476BA14B1ED0CC04AE2AE2B0C13286D1703D9E9C423
31,485,939 UART: [art] SIG.S = 4A1327F98D4EF93B14DAF6DF9709B6424F103528CB8193639A7424CE539E15DAD53E54018D205B01E50C85E2A46C21C2
32,790,792 UART: Caliptra RT
32,791,515 UART: [state] CFI Enabled
32,952,578 UART: [rt] RT listening for mailbox commands...
32,954,545 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,984,402 UART: [rt]cmd =0x46504c54, len=4
32,985,879 >>> mbox cmd response data (8 bytes)
32,987,067 UART: [rt] FIPS self test
32,988,019 UART: [kat] ++
32,988,472 UART: [kat] sha1
32,992,925 UART: [kat] SHA2-256
32,994,856 UART: [kat] SHA2-384
32,997,198 UART: Fatal Error: 0x90020002
33,032,355 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,176,342 >>> mbox cmd response: failed
33,177,005 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,320,911 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
189,998 UART:
190,290 UART: Running Caliptra ROM ...
191,351 UART:
191,496 UART: [state] CFI Enabled
251,546 UART: [state] LifecycleState = Unprovisioned
253,443 UART: [state] DebugLocked = No
255,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,650 UART: [kat] SHA2-256
429,382 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,890 UART: [kat] ++
440,371 UART: [kat] sha1
451,899 UART: [kat] SHA2-256
454,578 UART: [kat] SHA2-384
460,877 UART: [kat] SHA2-512-ACC
463,224 UART: [kat] ECC-384
2,757,121 UART: [kat] HMAC-384Kdf
2,787,987 UART: [kat] LMS
3,978,275 UART: [kat] --
3,982,980 UART: [cold-reset] ++
3,984,435 UART: [fht] Storing FHT @ 0x50003400
3,996,782 UART: [idev] ++
3,997,350 UART: [idev] CDI.KEYID = 6
3,998,370 UART: [idev] SUBJECT.KEYID = 7
3,999,528 UART: [idev] UDS.KEYID = 0
4,001,152 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,145,329 UART: [idev] Erasing UDS.KEYID = 0
7,335,999 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,089 UART: [idev] --
7,362,035 UART: [ldev] ++
7,362,611 UART: [ldev] CDI.KEYID = 6
7,363,552 UART: [ldev] SUBJECT.KEYID = 5
7,364,767 UART: [ldev] AUTHORITY.KEYID = 7
7,366,000 UART: [ldev] FE.KEYID = 1
7,412,043 UART: [ldev] Erasing FE.KEYID = 1
10,742,988 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,663 UART: [ldev] --
13,104,692 UART: [fwproc] Waiting for Commands...
13,106,877 UART: [fwproc] Received command 0x46574c44
13,109,073 UART: [fwproc] Received Image of size 114632 bytes
17,166,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,631,667 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,781,988 ready_for_fw is high
3,782,384 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,876,667 >>> mbox cmd response: success
23,566,473 UART:
23,566,864 UART: Running Caliptra FMC ...
23,568,184 UART:
23,568,349 UART: [state] CFI Enabled
23,631,914 UART: [fht] FMC Alias Private Key: 7
25,970,112 UART: [art] Extend RT PCRs Done
25,971,348 UART: [art] Lock RT PCRs Done
25,973,239 UART: [art] Populate DV Done
25,978,730 UART: [fht] FMC Alias Private Key: 7
25,980,275 UART: [art] Derive CDI
25,981,011 UART: [art] Store in in slot 0x4
26,039,842 UART: [art] Derive Key Pair
26,040,891 UART: [art] Store priv key in slot 0x5
29,333,316 UART: [art] Derive Key Pair - Done
29,346,594 UART: [art] Signing Cert with AUTHO
29,347,907 UART: RITY.KEYID = 7
31,634,925 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,433 UART: [art] PUB.X = 9FA16083758B9DA1E909908BE375A6B27BAD13E87D79857AE129D218E760374E8C1B5CCCC7A4D04630A759F4B038B758
31,643,688 UART: [art] PUB.Y = F186570E86FE7A3C290012F560713B5031EBE7CBBD4A95FBB5068F68929682685073E8F4553CF782AD6C91F5112A2DB0
31,650,942 UART: [art] SIG.R = D11597CD071A01A8E57D9EDB34BC8E1E0F21B649767E80FA1E959D61EB63E376BAA157A6F3D08D9B3A0AC2B1CFD78EAB
31,658,340 UART: [art] SIG.S = A05989BCF7FC48C9CF8E0BD887311C8C4D22983D3AFED118FEACD4A5B305DD2EFDE8A470165BB09EDB0F763DD8FB84B6
32,963,767 UART: Caliptra RT
32,964,482 UART: [state] CFI Enabled
33,124,263 UART: [rt] RT listening for mailbox commands...
33,126,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,155,802 UART: [rt]cmd =0x46504c54, len=4
33,157,431 >>> mbox cmd response data (8 bytes)
33,158,643 UART: [rt] FIPS self test
33,159,584 UART: [kat] ++
33,160,034 UART: [kat] sha1
33,164,331 UART: [kat] SHA2-256
33,166,256 UART: [kat] SHA2-384
33,168,622 UART: Fatal Error: 0x90020002
33,204,014 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,347,873 >>> mbox cmd response: failed
33,348,458 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,492,409 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,793,339 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,895,979 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,551 UART:
192,977 UART: Running Caliptra ROM ...
194,103 UART:
603,658 UART: [state] CFI Enabled
617,103 UART: [state] LifecycleState = Unprovisioned
619,067 UART: [state] DebugLocked = No
620,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,367 UART: [kat] SHA2-256
795,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,727 UART: [kat] ++
806,256 UART: [kat] sha1
817,774 UART: [kat] SHA2-256
820,504 UART: [kat] SHA2-384
825,996 UART: [kat] SHA2-512-ACC
828,368 UART: [kat] ECC-384
3,114,143 UART: [kat] HMAC-384Kdf
3,125,133 UART: [kat] LMS
4,315,266 UART: [kat] --
4,319,573 UART: [cold-reset] ++
4,321,734 UART: [fht] Storing FHT @ 0x50003400
4,333,364 UART: [idev] ++
4,333,930 UART: [idev] CDI.KEYID = 6
4,334,869 UART: [idev] SUBJECT.KEYID = 7
4,336,119 UART: [idev] UDS.KEYID = 0
4,337,181 ready_for_fw is high
4,337,414 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,481,481 UART: [idev] Erasing UDS.KEYID = 0
7,620,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,727 UART: [idev] --
7,646,647 UART: [ldev] ++
7,647,225 UART: [ldev] CDI.KEYID = 6
7,648,141 UART: [ldev] SUBJECT.KEYID = 5
7,649,358 UART: [ldev] AUTHORITY.KEYID = 7
7,650,645 UART: [ldev] FE.KEYID = 1
7,661,883 UART: [ldev] Erasing FE.KEYID = 1
10,947,694 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,713 UART: [ldev] --
13,308,789 UART: [fwproc] Waiting for Commands...
13,311,698 UART: [fwproc] Received command 0x46574c44
13,313,880 UART: [fwproc] Received Image of size 114632 bytes
17,376,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,836,133 >>> mbox cmd response: success
17,839,834 UART: [afmc] ++
17,840,431 UART: [afmc] CDI.KEYID = 6
17,841,345 UART: [afmc] SUBJECT.KEYID = 7
17,842,615 UART: [afmc] AUTHORITY.KEYID = 5
21,160,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,759 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,157 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,944 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,429 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,910 UART: [afmc] --
23,521,180 UART: [cold-reset] --
23,526,012 UART: [state] Locking Datavault
23,532,666 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,371 UART: [state] Locking ICCM
23,536,517 UART: [exit] Launching FMC @ 0x40000130
23,544,917 UART:
23,545,149 UART: Running Caliptra FMC ...
23,546,253 UART:
23,546,419 UART: [state] CFI Enabled
23,554,583 UART: [fht] FMC Alias Private Key: 7
25,885,202 UART: [art] Extend RT PCRs Done
25,886,447 UART: [art] Lock RT PCRs Done
25,888,184 UART: [art] Populate DV Done
25,893,758 UART: [fht] FMC Alias Private Key: 7
25,895,455 UART: [art] Derive CDI
25,896,270 UART: [art] Store in in slot 0x4
25,938,915 UART: [art] Derive Key Pair
25,939,918 UART: [art] Store priv key in slot 0x5
29,182,132 UART: [art] Derive Key Pair - Done
29,194,984 UART: [art] Signing Cert with AUTHO
29,196,304 UART: RITY.KEYID = 7
31,476,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,539 UART: [art] PUB.X = EFADA1445054BB82EA68F72B40E1B4A24D3505F8CCAAC522D7A49C1168C1B8B1E8FC702AF3209874BCF2A712F4B14E87
31,484,820 UART: [art] PUB.Y = 632BC194A91C085A071206B4D985393238F7A4713FD3A59F8064DAC960973AB46C39DC653BD04134E71DAAEB7DB04609
31,492,072 UART: [art] SIG.R = 71E86B7BDA71FAF21D44548ED98BDA105207D28C30187A249A875A24F8F44450543283C17B2307BEDB36A39FBCA000C5
31,499,434 UART: [art] SIG.S = 203C91BBB92A35C58E1115CF1D864B14BCEE8971AD602486FA4AFADC2EC37DE21E22981DCCB0F59BE62D088A0DEC8C97
32,804,859 UART: Caliptra RT
32,805,591 UART: [state] CFI Enabled
32,923,492 UART: [rt] RT listening for mailbox commands...
32,925,344 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,955,133 UART: [rt]cmd =0x46504c54, len=4
32,956,815 >>> mbox cmd response data (8 bytes)
32,958,107 UART: [rt] FIPS self test
32,959,048 UART: [kat] ++
32,959,504 UART: [kat] sha1
32,963,907 UART: [kat] SHA2-256
32,965,837 UART: [kat] SHA2-384
32,968,047 UART: Fatal Error: 0x90020002
33,003,433 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,147,336 >>> mbox cmd response: failed
33,147,922 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,291,808 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,138 UART:
190,433 UART: Running Caliptra ROM ...
191,465 UART:
7,240,953 UART: [state] CFI Enabled
7,254,777 UART: [state] LifecycleState = Unprovisioned
7,256,693 UART: [state] DebugLocked = No
7,259,265 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,264,268 UART: [kat] SHA2-256
7,434,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,444,540 UART: [kat] ++
7,445,035 UART: [kat] sha1
7,454,794 UART: [kat] SHA2-256
7,457,496 UART: [kat] SHA2-384
7,464,454 UART: [kat] SHA2-512-ACC
7,466,804 UART: [kat] ECC-384
9,749,763 UART: [kat] HMAC-384Kdf
9,762,538 UART: [kat] LMS
10,952,626 UART: [kat] --
10,957,962 UART: [cold-reset] ++
10,959,141 UART: [fht] Storing FHT @ 0x50003400
10,971,106 UART: [idev] ++
10,971,668 UART: [idev] CDI.KEYID = 6
10,972,679 UART: [idev] SUBJECT.KEYID = 7
10,973,835 UART: [idev] UDS.KEYID = 0
10,975,467 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
11,119,394 UART: [idev] Erasing UDS.KEYID = 0
14,264,911 UART: [idev] Using Sha1 for KeyId Algorithm
14,286,017 UART: [idev] --
14,289,718 UART: [ldev] ++
14,290,294 UART: [ldev] CDI.KEYID = 6
14,291,312 UART: [ldev] SUBJECT.KEYID = 5
14,292,491 UART: [ldev] AUTHORITY.KEYID = 7
14,293,722 UART: [ldev] FE.KEYID = 1
14,305,073 UART: [ldev] Erasing FE.KEYID = 1
17,590,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,883,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,898,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,913,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,927,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,947,022 UART: [ldev] --
19,952,614 UART: [fwproc] Waiting for Commands...
19,955,404 UART: [fwproc] Received command 0x46574c44
19,957,597 UART: [fwproc] Received Image of size 114632 bytes
24,019,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,095,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,164,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
24,484,194 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,128,486 ready_for_fw is high
4,128,933 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,076,985 >>> mbox cmd response: success
23,718,704 UART:
23,719,093 UART: Running Caliptra FMC ...
23,720,240 UART:
23,720,402 UART: [state] CFI Enabled
23,728,414 UART: [fht] FMC Alias Private Key: 7
26,059,240 UART: [art] Extend RT PCRs Done
26,060,472 UART: [art] Lock RT PCRs Done
26,062,262 UART: [art] Populate DV Done
26,067,780 UART: [fht] FMC Alias Private Key: 7
26,069,355 UART: [art] Derive CDI
26,070,181 UART: [art] Store in in slot 0x4
26,112,791 UART: [art] Derive Key Pair
26,113,839 UART: [art] Store priv key in slot 0x5
29,355,913 UART: [art] Derive Key Pair - Done
29,368,752 UART: [art] Signing Cert with AUTHO
29,370,065 UART: RITY.KEYID = 7
31,649,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,650,717 UART: [art] PUB.X = C2C7620BD3E112CF8B9FF92E0926DC8530DE1018CB01049444D9FD6BDBF3F073E6F010C2CEB2BF796487DF548393FFEF
31,657,968 UART: [art] PUB.Y = 348BF3A35DB2646482174D3B5D3AAD48C4454115B875B1CE0DFB3428A1200EEE415D908F1DDA0AF126A5DC4BE9C513CE
31,665,249 UART: [art] SIG.R = DAA841CDF5DC06F580E6A2B2268CCDA94DB3657FC7E2238A027E113DF52AAF405790CBD14B5134E348D047BE4BD1B73A
31,672,639 UART: [art] SIG.S = 77022A4639864E8DEF249FF6614491721BA752EB7011D77DB96457A1C1348E650EC1B669218C75FB2F30AC608104D1AE
32,978,309 UART: Caliptra RT
32,979,027 UART: [state] CFI Enabled
33,096,527 UART: [rt] RT listening for mailbox commands...
33,098,382 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,927 UART: [rt]cmd =0x46504c54, len=4
33,129,617 >>> mbox cmd response data (8 bytes)
33,130,665 UART: [rt] FIPS self test
33,131,613 UART: [kat] ++
33,132,065 UART: [kat] sha1
33,136,717 UART: [kat] SHA2-256
33,138,658 UART: [kat] SHA2-384
33,140,822 UART: Fatal Error: 0x90020002
33,176,053 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,320,074 >>> mbox cmd response: failed
33,320,698 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
33,464,586 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
10,587,648 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
24,546,796 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,238 UART:
192,612 UART: Running Caliptra ROM ...
193,734 UART:
193,877 UART: [state] CFI Enabled
260,841 UART: [state] LifecycleState = Unprovisioned
262,690 UART: [state] DebugLocked = No
265,286 UART: [state] WD Timer not started. Device not locked for debugging
268,361 UART: [kat] SHA2-256
447,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,099 UART: [kat] ++
459,559 UART: [kat] sha1
470,146 UART: [kat] SHA2-256
473,168 UART: [kat] SHA2-384
478,743 UART: [kat] SHA2-512-ACC
481,682 UART: [kat] ECC-384
2,926,738 UART: [kat] HMAC-384Kdf
2,949,806 UART: [kat] LMS
3,479,282 UART: [kat] --
3,484,198 UART: [cold-reset] ++
3,486,492 UART: [fht] FHT @ 0x50003400
3,497,569 UART: [idev] ++
3,498,169 UART: [idev] CDI.KEYID = 6
3,499,089 UART: [idev] SUBJECT.KEYID = 7
3,500,218 UART: [idev] UDS.KEYID = 0
3,501,158 ready_for_fw is high
3,501,388 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,646,291 UART: [idev] Erasing UDS.KEYID = 0
6,005,850 UART: [idev] Sha1 KeyId Algorithm
6,029,404 UART: [idev] --
6,031,787 UART: [ldev] ++
6,032,362 UART: [ldev] CDI.KEYID = 6
6,033,283 UART: [ldev] SUBJECT.KEYID = 5
6,034,448 UART: [ldev] AUTHORITY.KEYID = 7
6,035,682 UART: [ldev] FE.KEYID = 1
6,080,580 UART: [ldev] Erasing FE.KEYID = 1
8,585,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,406 UART: [ldev] --
10,393,759 UART: [fwproc] Wait for Commands...
10,396,128 UART: [fwproc] Recv command 0x46574c44
10,398,223 UART: [fwproc] Recv'd Img size: 114940 bytes
13,806,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,877,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,946,078 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,265,459 >>> mbox cmd response: success
14,270,154 UART: [afmc] ++
14,270,741 UART: [afmc] CDI.KEYID = 6
14,271,654 UART: [afmc] SUBJECT.KEYID = 7
14,272,870 UART: [afmc] AUTHORITY.KEYID = 5
16,809,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,947 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,809 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,608,064 UART: [afmc] --
18,611,611 UART: [cold-reset] --
18,616,319 UART: [state] Locking Datavault
18,620,929 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,576 UART: [state] Locking ICCM
18,623,592 UART: [exit] Launching FMC @ 0x40000130
18,632,051 UART:
18,632,294 UART: Running Caliptra FMC ...
18,633,397 UART:
18,633,554 UART: [state] CFI Enabled
18,691,356 UART: [fht] FMC Alias Private Key: 7
20,455,513 UART: [art] Extend RT PCRs Done
20,456,747 UART: [art] Lock RT PCRs Done
20,458,479 UART: [art] Populate DV Done
20,463,626 UART: [fht] FMC Alias Private Key: 7
20,465,169 UART: [art] Derive CDI
20,465,986 UART: [art] Store in in slot 0x4
20,524,056 UART: [art] Derive Key Pair
20,525,064 UART: [art] Store priv key in slot 0x5
22,988,531 UART: [art] Derive Key Pair - Done
23,001,312 UART: [art] Signing Cert with AUTHO
23,002,617 UART: RITY.KEYID = 7
24,714,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,012 UART: [art] PUB.X = 0D7BD4A9385843D35D5A3ABB5DA0E9FE9EB3664FD9FA2683394CCCDC094B4C26EA7420980B5BE4AF786A54597F4B16BA
24,723,279 UART: [art] PUB.Y = D5275910D42C3CD5FA55F433F1C717E770E6C087B0AE2970530B4E2566A01254B85632078B4862F5F7939202879284C5
24,730,476 UART: [art] SIG.R = 412212712F28341B881F12D68F683A78BCE887834461B4709DEE474CC063B22CBAB038B30FCE7A297567F92EA8E5B7D9
24,737,874 UART: [art] SIG.S = 2E2D4A67FBA9955FD9A97E07556804422FDC65FF450ED49D7A6B54D22DE892A1113CF0C995D20FC9428A53B1AB7C7CBD
25,716,745 UART: Caliptra RT
25,717,458 UART: [state] CFI Enabled
25,883,361 UART: [rt] RT listening for mailbox commands...
25,885,213 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,914,953 UART: [rt]cmd =0x46504c54, len=4
25,916,726 >>> mbox cmd response data (8 bytes)
25,917,491 UART: [rt] FIPS self test
25,918,438 UART: [kat] ++
25,918,893 UART: [kat] sha1
25,923,187 UART: [kat] SHA2-256
25,925,074 UART: [kat] SHA2-384
25,927,391 UART: Fatal Error: 0x90020002
25,962,598 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,106,945 >>> mbox cmd response: failed
26,107,575 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,252,407 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,124 UART:
190,416 UART: Running Caliptra ROM ...
191,530 UART:
191,680 UART: [state] CFI Enabled
251,754 UART: [state] LifecycleState = Unprovisioned
253,644 UART: [state] DebugLocked = No
255,593 UART: [state] WD Timer not started. Device not locked for debugging
258,625 UART: [kat] SHA2-256
437,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
449,333 UART: [kat] ++
449,781 UART: [kat] sha1
461,086 UART: [kat] SHA2-256
464,086 UART: [kat] SHA2-384
469,791 UART: [kat] SHA2-512-ACC
472,728 UART: [kat] ECC-384
2,937,822 UART: [kat] HMAC-384Kdf
2,960,112 UART: [kat] LMS
3,489,585 UART: [kat] --
3,495,330 UART: [cold-reset] ++
3,496,616 UART: [fht] FHT @ 0x50003400
3,508,455 UART: [idev] ++
3,509,029 UART: [idev] CDI.KEYID = 6
3,509,945 UART: [idev] SUBJECT.KEYID = 7
3,511,163 UART: [idev] UDS.KEYID = 0
3,512,689 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,657,320 UART: [idev] Erasing UDS.KEYID = 0
6,014,679 UART: [idev] Sha1 KeyId Algorithm
6,037,434 UART: [idev] --
6,042,554 UART: [ldev] ++
6,043,136 UART: [ldev] CDI.KEYID = 6
6,044,025 UART: [ldev] SUBJECT.KEYID = 5
6,045,246 UART: [ldev] AUTHORITY.KEYID = 7
6,046,500 UART: [ldev] FE.KEYID = 1
6,089,021 UART: [ldev] Erasing FE.KEYID = 1
8,592,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,170 UART: [ldev] --
10,403,949 UART: [fwproc] Wait for Commands...
10,407,123 UART: [fwproc] Recv command 0x46574c44
10,409,226 UART: [fwproc] Recv'd Img size: 114940 bytes
13,822,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,177 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,933 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,285,146 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,362,716 ready_for_fw is high
3,363,182 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,056,637 >>> mbox cmd response: success
18,346,289 UART:
18,346,698 UART: Running Caliptra FMC ...
18,347,844 UART:
18,348,004 UART: [state] CFI Enabled
18,414,914 UART: [fht] FMC Alias Private Key: 7
20,178,445 UART: [art] Extend RT PCRs Done
20,179,668 UART: [art] Lock RT PCRs Done
20,181,240 UART: [art] Populate DV Done
20,186,821 UART: [fht] FMC Alias Private Key: 7
20,188,307 UART: [art] Derive CDI
20,189,045 UART: [art] Store in in slot 0x4
20,247,650 UART: [art] Derive Key Pair
20,248,642 UART: [art] Store priv key in slot 0x5
22,711,777 UART: [art] Derive Key Pair - Done
22,724,674 UART: [art] Signing Cert with AUTHO
22,725,985 UART: RITY.KEYID = 7
24,437,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,341 UART: [art] PUB.X = 979EE7A7CE5BC84A8A3C3720039A746CCF28BF65C09FB82FA3EA399673FAFD96EC25C0454D41CE665B498228F9BB0855
24,446,602 UART: [art] PUB.Y = 9DE3EB1B43D9A2C8CD94D90414241B06E7713F26D2748426F37202795D9240D50410D5B12B1440FD582812EEA117C22A
24,453,857 UART: [art] SIG.R = ADA654A3A0A0576A6F96FC23781DF00D7D4FA2EB1CFAB720CFAA3B6AE0CA8A951A6D3257F97A50522EEB9214DB16C014
24,461,265 UART: [art] SIG.S = 0972680751B94B303D2A7619E44274AE6676545C6FC4180575102EAD11149745EEB2C915A11B5691BD12D104CB3D8191
25,440,374 UART: Caliptra RT
25,441,091 UART: [state] CFI Enabled
25,605,677 UART: [rt] RT listening for mailbox commands...
25,607,535 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,637,281 UART: [rt]cmd =0x46504c54, len=4
25,638,785 >>> mbox cmd response data (8 bytes)
25,639,834 UART: [rt] FIPS self test
25,640,776 UART: [kat] ++
25,641,223 UART: [kat] sha1
25,645,546 UART: [kat] SHA2-256
25,647,477 UART: [kat] SHA2-384
25,649,574 UART: Fatal Error: 0x90020002
25,684,759 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,829,173 >>> mbox cmd response: failed
25,829,841 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,974,100 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,371,176 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,069,711 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,505 UART:
192,877 UART: Running Caliptra ROM ...
194,088 UART:
603,743 UART: [state] CFI Enabled
618,976 UART: [state] LifecycleState = Unprovisioned
620,901 UART: [state] DebugLocked = No
623,720 UART: [state] WD Timer not started. Device not locked for debugging
628,133 UART: [kat] SHA2-256
807,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,844 UART: [kat] ++
819,293 UART: [kat] sha1
832,155 UART: [kat] SHA2-256
835,235 UART: [kat] SHA2-384
840,878 UART: [kat] SHA2-512-ACC
843,817 UART: [kat] ECC-384
3,285,616 UART: [kat] HMAC-384Kdf
3,298,454 UART: [kat] LMS
3,827,906 UART: [kat] --
3,832,472 UART: [cold-reset] ++
3,833,345 UART: [fht] FHT @ 0x50003400
3,843,972 UART: [idev] ++
3,844,554 UART: [idev] CDI.KEYID = 6
3,845,519 UART: [idev] SUBJECT.KEYID = 7
3,846,628 UART: [idev] UDS.KEYID = 0
3,847,571 ready_for_fw is high
3,847,798 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,992,230 UART: [idev] Erasing UDS.KEYID = 0
6,317,530 UART: [idev] Sha1 KeyId Algorithm
6,340,392 UART: [idev] --
6,344,495 UART: [ldev] ++
6,345,067 UART: [ldev] CDI.KEYID = 6
6,345,982 UART: [ldev] SUBJECT.KEYID = 5
6,347,201 UART: [ldev] AUTHORITY.KEYID = 7
6,348,434 UART: [ldev] FE.KEYID = 1
6,358,596 UART: [ldev] Erasing FE.KEYID = 1
8,834,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,478 UART: [ldev] --
10,622,830 UART: [fwproc] Wait for Commands...
10,624,817 UART: [fwproc] Recv command 0x46574c44
10,626,910 UART: [fwproc] Recv'd Img size: 114940 bytes
14,040,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,099 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,503,368 >>> mbox cmd response: success
14,508,101 UART: [afmc] ++
14,508,696 UART: [afmc] CDI.KEYID = 6
14,509,607 UART: [afmc] SUBJECT.KEYID = 7
14,510,771 UART: [afmc] AUTHORITY.KEYID = 5
17,014,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,645 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,690 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,563 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,029 UART: [afmc] --
18,810,058 UART: [cold-reset] --
18,813,497 UART: [state] Locking Datavault
18,819,175 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,820 UART: [state] Locking ICCM
18,823,021 UART: [exit] Launching FMC @ 0x40000130
18,831,472 UART:
18,831,714 UART: Running Caliptra FMC ...
18,832,818 UART:
18,832,975 UART: [state] CFI Enabled
18,841,185 UART: [fht] FMC Alias Private Key: 7
20,598,325 UART: [art] Extend RT PCRs Done
20,599,542 UART: [art] Lock RT PCRs Done
20,601,219 UART: [art] Populate DV Done
20,606,578 UART: [fht] FMC Alias Private Key: 7
20,608,271 UART: [art] Derive CDI
20,609,063 UART: [art] Store in in slot 0x4
20,651,693 UART: [art] Derive Key Pair
20,652,703 UART: [art] Store priv key in slot 0x5
23,079,755 UART: [art] Derive Key Pair - Done
23,092,700 UART: [art] Signing Cert with AUTHO
23,094,048 UART: RITY.KEYID = 7
24,799,586 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,092 UART: [art] PUB.X = 377832759340DB1239C55E84C0C33DF371C94EB3F7F3A3255401E9421A176A15D67426223739260EA81CA81C943F9A23
24,808,309 UART: [art] PUB.Y = 3BBD4FF528399AF34EE99C32FFCB07B01D48FC6F183FE27D791C85D02227AFB08F06A891E4262CD3A1EE342CB3E35B80
24,815,604 UART: [art] SIG.R = 4E3C320C5164DDA8E4C522AE60F6A18A040F7E36296137DFF1F99797F31C2AF2FF493933E6F4255A7706DA1A3F3F238D
24,822,948 UART: [art] SIG.S = 0DB5230BE4942A38196B2E91BE208F76B56CE0C0D6AC31F912D046596B7DE68E497F9FFB861C962CF0934B7C52CFFB2D
25,802,241 UART: Caliptra RT
25,803,569 UART: [state] CFI Enabled
25,919,859 UART: [rt] RT listening for mailbox commands...
25,921,721 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,951,377 UART: [rt]cmd =0x46504c54, len=4
25,953,007 >>> mbox cmd response data (8 bytes)
25,954,359 UART: [rt] FIPS self test
25,955,302 UART: [kat] ++
25,955,749 UART: [kat] sha1
25,960,146 UART: [kat] SHA2-256
25,962,079 UART: [kat] SHA2-384
25,964,294 UART: Fatal Error: 0x90020002
25,999,661 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,144,088 >>> mbox cmd response: failed
26,144,791 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,289,068 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
190,020 UART:
190,315 UART: Running Caliptra ROM ...
191,340 UART:
14,244,879 UART: [state] CFI Enabled
14,256,980 UART: [state] LifecycleState = Unprovisioned
14,258,835 UART: [state] DebugLocked = No
14,260,110 UART: [state] WD Timer not started. Device not locked for debugging
14,263,521 UART: [kat] SHA2-256
14,442,649 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,454,244 UART: [kat] ++
14,454,787 UART: [kat] sha1
14,465,139 UART: [kat] SHA2-256
14,468,199 UART: [kat] SHA2-384
14,473,805 UART: [kat] SHA2-512-ACC
14,476,764 UART: [kat] ECC-384
16,918,898 UART: [kat] HMAC-384Kdf
16,931,995 UART: [kat] LMS
17,461,462 UART: [kat] --
17,464,967 UART: [cold-reset] ++
17,465,867 UART: [fht] FHT @ 0x50003400
17,476,463 UART: [idev] ++
17,477,033 UART: [idev] CDI.KEYID = 6
17,477,946 UART: [idev] SUBJECT.KEYID = 7
17,479,154 UART: [idev] UDS.KEYID = 0
17,480,654 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,625,011 UART: [idev] Erasing UDS.KEYID = 0
19,946,804 UART: [idev] Sha1 KeyId Algorithm
19,970,835 UART: [idev] --
19,973,581 UART: [ldev] ++
19,974,144 UART: [ldev] CDI.KEYID = 6
19,975,069 UART: [ldev] SUBJECT.KEYID = 5
19,976,231 UART: [ldev] AUTHORITY.KEYID = 7
19,977,462 UART: [ldev] FE.KEYID = 1
19,988,596 UART: [ldev] Erasing FE.KEYID = 1
22,462,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,180,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,196,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,212,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,227,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,247,065 UART: [ldev] --
24,252,014 UART: [fwproc] Wait for Commands...
24,254,544 UART: [fwproc] Recv command 0x46574c44
24,256,587 UART: [fwproc] Recv'd Img size: 114940 bytes
27,673,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,744,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,813,592 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,133,177 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,689,294 ready_for_fw is high
3,689,919 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,273,492 >>> mbox cmd response: success
18,523,011 UART:
18,523,411 UART: Running Caliptra FMC ...
18,524,561 UART:
18,524,718 UART: [state] CFI Enabled
18,532,609 UART: [fht] FMC Alias Private Key: 7
20,289,582 UART: [art] Extend RT PCRs Done
20,290,831 UART: [art] Lock RT PCRs Done
20,292,647 UART: [art] Populate DV Done
20,297,853 UART: [fht] FMC Alias Private Key: 7
20,299,447 UART: [art] Derive CDI
20,300,187 UART: [art] Store in in slot 0x4
20,342,997 UART: [art] Derive Key Pair
20,344,035 UART: [art] Store priv key in slot 0x5
22,770,846 UART: [art] Derive Key Pair - Done
22,783,469 UART: [art] Signing Cert with AUTHO
22,784,781 UART: RITY.KEYID = 7
24,490,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,788 UART: [art] PUB.X = B17940DC09B2ECC52E4A5EA2BCAEBD095C58962FB15A8CAC9775456F4ED753383B20B2273B61985D75C3AF89099E3FEE
24,499,056 UART: [art] PUB.Y = 0EC26CDFC99943424F7FD54D3387473B10E64304B5B7FF6503C0DC55E5DC04A8B50D40734C28CD58B9046D229E5972FA
24,506,316 UART: [art] SIG.R = A9D2D8D60F2737E7FC4BA2DC2D71D24AEA4BE49175328A901C06231E15F7D739A8598321818FDF976552C21E84728EE5
24,513,714 UART: [art] SIG.S = 696DD630E305D4CA11DCF7C742AC190309E7A9E690664EEA9F38C29BF8EA5BA905373CA955DABFFE5AA99B74FC6E06FA
25,492,795 UART: Caliptra RT
25,493,514 UART: [state] CFI Enabled
25,610,787 UART: [rt] RT listening for mailbox commands...
25,612,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,642,051 UART: [rt]cmd =0x46504c54, len=4
25,643,682 >>> mbox cmd response data (8 bytes)
25,644,999 UART: [rt] FIPS self test
25,645,938 UART: [kat] ++
25,646,387 UART: [kat] sha1
25,650,669 UART: [kat] SHA2-256
25,652,600 UART: [kat] SHA2-384
25,654,967 UART: Fatal Error: 0x90020002
25,690,316 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,835,140 >>> mbox cmd response: failed
25,835,773 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
25,979,904 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
17,643,059 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,240,266 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,169 UART:
192,567 UART: Running Caliptra ROM ...
193,770 UART:
193,926 UART: [state] CFI Enabled
265,734 UART: [state] LifecycleState = Unprovisioned
268,066 UART: [state] DebugLocked = No
270,821 UART: [state] WD Timer not started. Device not locked for debugging
274,723 UART: [kat] SHA2-256
464,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,406 UART: [kat] ++
475,878 UART: [kat] sha1
486,545 UART: [kat] SHA2-256
489,570 UART: [kat] SHA2-384
495,708 UART: [kat] SHA2-512-ACC
498,292 UART: [kat] ECC-384
2,948,432 UART: [kat] HMAC-384Kdf
2,972,612 UART: [kat] LMS
3,504,373 UART: [kat] --
3,510,520 UART: [cold-reset] ++
3,512,674 UART: [fht] FHT @ 0x50003400
3,524,293 UART: [idev] ++
3,525,014 UART: [idev] CDI.KEYID = 6
3,526,157 UART: [idev] SUBJECT.KEYID = 7
3,527,264 UART: [idev] UDS.KEYID = 0
3,528,195 ready_for_fw is high
3,528,399 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,673,021 UART: [idev] Erasing UDS.KEYID = 0
6,027,458 UART: [idev] Sha1 KeyId Algorithm
6,050,539 UART: [idev] --
6,055,060 UART: [ldev] ++
6,055,758 UART: [ldev] CDI.KEYID = 6
6,056,679 UART: [ldev] SUBJECT.KEYID = 5
6,057,841 UART: [ldev] AUTHORITY.KEYID = 7
6,059,021 UART: [ldev] FE.KEYID = 1
6,101,052 UART: [ldev] Erasing FE.KEYID = 1
8,612,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,807 UART: [ldev] --
10,415,391 UART: [fwproc] Wait for Commands...
10,416,971 UART: [fwproc] Recv command 0x46574c44
10,419,293 UART: [fwproc] Recv'd Img size: 114940 bytes
13,880,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,469 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,623,765 >>> mbox cmd response: success
14,628,340 UART: [afmc] ++
14,629,042 UART: [afmc] CDI.KEYID = 6
14,630,229 UART: [afmc] SUBJECT.KEYID = 7
14,631,713 UART: [afmc] AUTHORITY.KEYID = 5
17,172,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,902 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,550 UART: [afmc] --
18,971,279 UART: [cold-reset] --
18,975,897 UART: [state] Locking Datavault
18,981,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,931 UART: [state] Locking ICCM
18,985,380 UART: [exit] Launching FMC @ 0x40000130
18,994,047 UART:
18,994,286 UART: Running Caliptra FMC ...
18,995,388 UART:
18,995,546 UART: [state] CFI Enabled
19,055,259 UART: [fht] FMC Alias Private Key: 7
20,819,410 UART: [art] Extend RT PCRs Done
20,820,632 UART: [art] Lock RT PCRs Done
20,822,377 UART: [art] Populate DV Done
20,827,894 UART: [fht] FMC Alias Private Key: 7
20,829,654 UART: [art] Derive CDI
20,830,484 UART: [art] Store in in slot 0x4
20,887,915 UART: [art] Derive Key Pair
20,888,960 UART: [art] Store priv key in slot 0x5
23,351,850 UART: [art] Derive Key Pair - Done
23,364,748 UART: [art] Signing Cert with AUTHO
23,366,060 UART: RITY.KEYID = 7
25,078,430 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,943 UART: [art] PUB.X = B6BD3EA6DE9AF8BECF561D14F1C100D568AA03334926419EE2477A4723870771024B2423E1D7F4AE847B19D0C246AF93
25,087,209 UART: [art] PUB.Y = 4CE541DBEB5A0CD70B01CB6694C04F5FD70731B59CD72A0EA8A84FAAD5C465234DA5EFA32CA0699D5F59ABE2A4BDB1CF
25,094,477 UART: [art] SIG.R = B8348E98ECF3030F7C9BAD3D5519F7A6B2C086EE4D8DD6148CBB812392D8D0EDFFE0B983EABF1E97BBC6F943CD585084
25,101,903 UART: [art] SIG.S = 733F31FA55CCFEC062D5693F0A720800643666FE8643DE9B17E02C31CEFD30A441B4D86A6F164A134D5B8EF63C4DE2A5
26,081,199 UART: Caliptra RT
26,081,892 UART: [state] CFI Enabled
26,246,132 UART: [rt] RT listening for mailbox commands...
26,247,984 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,277,715 UART: [rt]cmd =0x46504c54, len=4
26,279,475 >>> mbox cmd response data (8 bytes)
26,280,434 UART: [rt] FIPS self test
26,281,382 UART: [kat] ++
26,281,836 UART: [kat] sha1
26,286,128 UART: [kat] SHA2-256
26,288,074 UART: [kat] SHA2-384
26,290,350 UART: Fatal Error: 0x90020002
26,325,505 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,469,934 >>> mbox cmd response: failed
26,470,590 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,614,875 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,030 UART:
190,331 UART: Running Caliptra ROM ...
191,355 UART:
191,514 UART: [state] CFI Enabled
252,324 UART: [state] LifecycleState = Unprovisioned
254,688 UART: [state] DebugLocked = No
255,986 UART: [state] WD Timer not started. Device not locked for debugging
261,084 UART: [kat] SHA2-256
450,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,746 UART: [kat] ++
462,191 UART: [kat] sha1
472,473 UART: [kat] SHA2-256
475,461 UART: [kat] SHA2-384
481,773 UART: [kat] SHA2-512-ACC
484,399 UART: [kat] ECC-384
2,939,026 UART: [kat] HMAC-384Kdf
2,960,985 UART: [kat] LMS
3,492,773 UART: [kat] --
3,497,314 UART: [cold-reset] ++
3,499,212 UART: [fht] FHT @ 0x50003400
3,510,577 UART: [idev] ++
3,511,292 UART: [idev] CDI.KEYID = 6
3,512,207 UART: [idev] SUBJECT.KEYID = 7
3,513,425 UART: [idev] UDS.KEYID = 0
3,514,945 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,659,284 UART: [idev] Erasing UDS.KEYID = 0
6,015,627 UART: [idev] Sha1 KeyId Algorithm
6,036,883 UART: [idev] --
6,040,389 UART: [ldev] ++
6,041,071 UART: [ldev] CDI.KEYID = 6
6,041,966 UART: [ldev] SUBJECT.KEYID = 5
6,043,182 UART: [ldev] AUTHORITY.KEYID = 7
6,044,310 UART: [ldev] FE.KEYID = 1
6,089,196 UART: [ldev] Erasing FE.KEYID = 1
8,592,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,830 UART: [ldev] --
10,404,081 UART: [fwproc] Wait for Commands...
10,405,857 UART: [fwproc] Recv command 0x46574c44
10,408,174 UART: [fwproc] Recv'd Img size: 114940 bytes
13,862,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,369 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,598,098 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,439,798 ready_for_fw is high
3,440,248 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,766,276 >>> mbox cmd response: success
19,068,966 UART:
19,069,368 UART: Running Caliptra FMC ...
19,070,517 UART:
19,070,682 UART: [state] CFI Enabled
19,135,575 UART: [fht] FMC Alias Private Key: 7
20,900,414 UART: [art] Extend RT PCRs Done
20,901,631 UART: [art] Lock RT PCRs Done
20,903,429 UART: [art] Populate DV Done
20,908,750 UART: [fht] FMC Alias Private Key: 7
20,910,350 UART: [art] Derive CDI
20,911,169 UART: [art] Store in in slot 0x4
20,968,275 UART: [art] Derive Key Pair
20,969,319 UART: [art] Store priv key in slot 0x5
23,432,155 UART: [art] Derive Key Pair - Done
23,445,175 UART: [art] Signing Cert with AUTHO
23,446,489 UART: RITY.KEYID = 7
25,158,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,718 UART: [art] PUB.X = DCCCC6A2521834C75F73C6EF8C46A0C90BD64126DA5BD58D6EE08D7272EE8D67B43F04C2A834219880819D2093833106
25,166,980 UART: [art] PUB.Y = 62387308439DDFFC250CAE1E39F175BA2D190A677BD2F96F1B565875A8D415C3BDF3B75DACC7D2DE1704C5F37779FFF9
25,174,212 UART: [art] SIG.R = 501ACB29B98EAFA3ADFD1ABDE04C3F5968E07244FB3AC48B4E4D9F1B37479D7B63E9600601191E7A16DDA017FFEEA88F
25,181,679 UART: [art] SIG.S = 2EAAC2791E4B3CCF36018641F80EEA7BDFE527236B15C26385F40FAB3B0C82A691F860E3393DE1F5A8C30F3B136A9734
26,160,333 UART: Caliptra RT
26,161,023 UART: [state] CFI Enabled
26,324,931 UART: [rt] RT listening for mailbox commands...
26,326,796 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,530 UART: [rt]cmd =0x46504c54, len=4
26,358,112 >>> mbox cmd response data (8 bytes)
26,359,173 UART: [rt] FIPS self test
26,360,114 UART: [kat] ++
26,360,562 UART: [kat] sha1
26,365,064 UART: [kat] SHA2-256
26,367,001 UART: [kat] SHA2-384
26,369,213 UART: Fatal Error: 0x90020002
26,404,592 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,549,022 >>> mbox cmd response: failed
26,549,687 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,694,023 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,431,169 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,734,622 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,450 UART:
192,813 UART: Running Caliptra ROM ...
193,956 UART:
603,727 UART: [state] CFI Enabled
617,012 UART: [state] LifecycleState = Unprovisioned
619,336 UART: [state] DebugLocked = No
622,079 UART: [state] WD Timer not started. Device not locked for debugging
626,686 UART: [kat] SHA2-256
816,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,367 UART: [kat] ++
827,843 UART: [kat] sha1
839,434 UART: [kat] SHA2-256
842,447 UART: [kat] SHA2-384
849,718 UART: [kat] SHA2-512-ACC
852,320 UART: [kat] ECC-384
3,293,932 UART: [kat] HMAC-384Kdf
3,307,046 UART: [kat] LMS
3,838,860 UART: [kat] --
3,843,515 UART: [cold-reset] ++
3,845,529 UART: [fht] FHT @ 0x50003400
3,857,387 UART: [idev] ++
3,858,029 UART: [idev] CDI.KEYID = 6
3,858,987 UART: [idev] SUBJECT.KEYID = 7
3,860,228 UART: [idev] UDS.KEYID = 0
3,861,139 ready_for_fw is high
3,861,367 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,005,648 UART: [idev] Erasing UDS.KEYID = 0
6,340,419 UART: [idev] Sha1 KeyId Algorithm
6,362,471 UART: [idev] --
6,366,784 UART: [ldev] ++
6,367,462 UART: [ldev] CDI.KEYID = 6
6,368,345 UART: [ldev] SUBJECT.KEYID = 5
6,369,560 UART: [ldev] AUTHORITY.KEYID = 7
6,370,738 UART: [ldev] FE.KEYID = 1
6,382,494 UART: [ldev] Erasing FE.KEYID = 1
8,859,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,475 UART: [ldev] --
10,650,475 UART: [fwproc] Wait for Commands...
10,653,164 UART: [fwproc] Recv command 0x46574c44
10,655,476 UART: [fwproc] Recv'd Img size: 114940 bytes
14,106,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,285 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,455 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,844,800 >>> mbox cmd response: success
14,849,410 UART: [afmc] ++
14,850,115 UART: [afmc] CDI.KEYID = 6
14,851,222 UART: [afmc] SUBJECT.KEYID = 7
14,852,760 UART: [afmc] AUTHORITY.KEYID = 5
17,358,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,698 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,037 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,049 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,063 UART: [afmc] --
19,155,314 UART: [cold-reset] --
19,159,718 UART: [state] Locking Datavault
19,164,914 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,043 UART: [state] Locking ICCM
19,169,301 UART: [exit] Launching FMC @ 0x40000130
19,177,970 UART:
19,178,211 UART: Running Caliptra FMC ...
19,179,313 UART:
19,179,475 UART: [state] CFI Enabled
19,187,381 UART: [fht] FMC Alias Private Key: 7
20,944,003 UART: [art] Extend RT PCRs Done
20,945,237 UART: [art] Lock RT PCRs Done
20,947,164 UART: [art] Populate DV Done
20,952,685 UART: [fht] FMC Alias Private Key: 7
20,954,281 UART: [art] Derive CDI
20,955,096 UART: [art] Store in in slot 0x4
20,997,538 UART: [art] Derive Key Pair
20,998,580 UART: [art] Store priv key in slot 0x5
23,425,592 UART: [art] Derive Key Pair - Done
23,438,484 UART: [art] Signing Cert with AUTHO
23,439,791 UART: RITY.KEYID = 7
25,145,000 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,514 UART: [art] PUB.X = E77A80553676E6A61F043736F3AD084F4408D0DBA47E9035621C2D3682B62EEEA3D5AE3748520C062EA34494783EC2C9
25,153,767 UART: [art] PUB.Y = F72EEFF0E4E6D0F4FE3FEB5AFB7DEF49E647C1EBD969456DF3229A2FC8E60CFD40644D7EA2B2CAB866319DA217041893
25,161,053 UART: [art] SIG.R = 05724BD33F89934651C88BC59984B8868167B6F4A3BEFAF35258BF623CCF4EAED987D7C80B90ACDA6F636DAF57D4F911
25,168,413 UART: [art] SIG.S = 0A2581B4FE24C2221D9A43F544B5E0EE179D41A0EDB6ADEAA74FE244E7CA104ED1D3B0E488AF18BCCBBEDFE10DEEEE41
26,146,977 UART: Caliptra RT
26,147,673 UART: [state] CFI Enabled
26,265,290 UART: [rt] RT listening for mailbox commands...
26,267,151 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,296,915 UART: [rt]cmd =0x46504c54, len=4
26,298,390 >>> mbox cmd response data (8 bytes)
26,299,356 UART: [rt] FIPS self test
26,300,301 UART: [kat] ++
26,300,757 UART: [kat] sha1
26,305,266 UART: [kat] SHA2-256
26,307,193 UART: [kat] SHA2-384
26,309,403 UART: Fatal Error: 0x90020002
26,345,170 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,489,481 >>> mbox cmd response: failed
26,490,089 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,634,420 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
190,057 UART:
190,356 UART: Running Caliptra ROM ...
191,408 UART:
13,898,350 UART: [state] CFI Enabled
13,910,796 UART: [state] LifecycleState = Unprovisioned
13,913,194 UART: [state] DebugLocked = No
13,914,740 UART: [state] WD Timer not started. Device not locked for debugging
13,919,347 UART: [kat] SHA2-256
14,109,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,120,022 UART: [kat] ++
14,120,618 UART: [kat] sha1
14,132,700 UART: [kat] SHA2-256
14,135,768 UART: [kat] SHA2-384
14,141,288 UART: [kat] SHA2-512-ACC
14,143,851 UART: [kat] ECC-384
16,587,980 UART: [kat] HMAC-384Kdf
16,600,257 UART: [kat] LMS
17,132,095 UART: [kat] --
17,138,078 UART: [cold-reset] ++
17,140,169 UART: [fht] FHT @ 0x50003400
17,152,000 UART: [idev] ++
17,152,715 UART: [idev] CDI.KEYID = 6
17,153,600 UART: [idev] SUBJECT.KEYID = 7
17,154,865 UART: [idev] UDS.KEYID = 0
17,156,361 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
17,300,510 UART: [idev] Erasing UDS.KEYID = 0
19,629,603 UART: [idev] Sha1 KeyId Algorithm
19,652,075 UART: [idev] --
19,657,314 UART: [ldev] ++
19,658,011 UART: [ldev] CDI.KEYID = 6
19,658,897 UART: [ldev] SUBJECT.KEYID = 5
19,659,998 UART: [ldev] AUTHORITY.KEYID = 7
19,661,281 UART: [ldev] FE.KEYID = 1
19,672,550 UART: [ldev] Erasing FE.KEYID = 1
22,149,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,868,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,884,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,899,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,914,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,935,882 UART: [ldev] --
23,942,165 UART: [fwproc] Wait for Commands...
23,944,638 UART: [fwproc] Recv command 0x46574c44
23,946,944 UART: [fwproc] Recv'd Img size: 114940 bytes
27,396,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,478,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,594,234 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
28,140,396 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
3,752,502 ready_for_fw is high
3,752,905 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,965,704 >>> mbox cmd response: success
19,216,656 UART:
19,217,049 UART: Running Caliptra FMC ...
19,218,192 UART:
19,218,357 UART: [state] CFI Enabled
19,226,456 UART: [fht] FMC Alias Private Key: 7
20,983,485 UART: [art] Extend RT PCRs Done
20,984,717 UART: [art] Lock RT PCRs Done
20,986,291 UART: [art] Populate DV Done
20,991,870 UART: [fht] FMC Alias Private Key: 7
20,993,383 UART: [art] Derive CDI
20,994,148 UART: [art] Store in in slot 0x4
21,037,028 UART: [art] Derive Key Pair
21,038,080 UART: [art] Store priv key in slot 0x5
23,465,475 UART: [art] Derive Key Pair - Done
23,478,374 UART: [art] Signing Cert with AUTHO
23,479,681 UART: RITY.KEYID = 7
25,185,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,622 UART: [art] PUB.X = 34DA07B42D32442165F3483D63E5E5DDC973D5DE5A8F907B616C53D468E9EE1D6194FC1B369F204E3BA33FFF0A08BA84
25,193,860 UART: [art] PUB.Y = 5E28F23DE3EC0D1312CEDD08B4189A9D52CEE257CFD6081D6F859B3A52251D6892C693678A41D94F37B804F1B3838C58
25,201,142 UART: [art] SIG.R = DF292DC8E4A47F07DA270F0ABB2A36D2022197821C75332927E3FB9D7FE6A32EAE97972346EFAF927D6E74D45C8086D4
25,208,541 UART: [art] SIG.S = 9B509B2C9E633C16E8C745314D1C3A15DE75349DB3A058B12C1520E688F768C4C38392F0372FB55E37ABF63805FE8A4E
26,187,582 UART: Caliptra RT
26,188,273 UART: [state] CFI Enabled
26,305,401 UART: [rt] RT listening for mailbox commands...
26,307,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,001 UART: [rt]cmd =0x46504c54, len=4
26,338,697 >>> mbox cmd response data (8 bytes)
26,340,179 UART: [rt] FIPS self test
26,341,119 UART: [kat] ++
26,341,565 UART: [kat] sha1
26,346,127 UART: [kat] SHA2-256
26,348,052 UART: [kat] SHA2-384
26,350,371 UART: Fatal Error: 0x90020002
26,385,764 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,530,200 >>> mbox cmd response: failed
26,530,799 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
26,674,981 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
17,018,014 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
28,234,382 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,483 UART: [kat] SHA2-256
882,414 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,529 UART: [kat] ++
886,681 UART: [kat] sha1
890,881 UART: [kat] SHA2-256
892,819 UART: [kat] SHA2-384
895,730 UART: [kat] SHA2-512-ACC
897,631 UART: [kat] ECC-384
903,360 UART: [kat] HMAC-384Kdf
907,804 UART: [kat] LMS
1,476,000 UART: [kat] --
1,476,839 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,554 UART: [idev] Erasing UDS.KEYID = 0
1,505,432 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,514,933 UART: [ldev] ++
1,515,101 UART: [ldev] CDI.KEYID = 6
1,515,464 UART: [ldev] SUBJECT.KEYID = 5
1,515,890 UART: [ldev] AUTHORITY.KEYID = 7
1,516,353 UART: [ldev] FE.KEYID = 1
1,521,503 UART: [ldev] Erasing FE.KEYID = 1
1,546,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,678 UART: [ldev] --
1,586,027 UART: [fwproc] Waiting for Commands...
1,586,656 UART: [fwproc] Received command 0x46574c44
1,587,447 UART: [fwproc] Received Image of size 114940 bytes
2,892,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,744 >>> mbox cmd response: success
3,086,832 UART: [afmc] ++
3,087,000 UART: [afmc] CDI.KEYID = 6
3,087,362 UART: [afmc] SUBJECT.KEYID = 7
3,087,787 UART: [afmc] AUTHORITY.KEYID = 5
3,122,668 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,666 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,174 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,059 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,749 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,758 UART: [afmc] --
3,165,740 UART: [cold-reset] --
3,166,812 UART: [state] Locking Datavault
3,168,113 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,717 UART: [state] Locking ICCM
3,169,223 UART: [exit] Launching FMC @ 0x40000130
3,174,552 UART:
3,174,568 UART: Running Caliptra FMC ...
3,174,976 UART:
3,175,030 UART: [state] CFI Enabled
3,185,755 UART: [fht] FMC Alias Private Key: 7
3,294,162 UART: [art] Extend RT PCRs Done
3,294,590 UART: [art] Lock RT PCRs Done
3,296,300 UART: [art] Populate DV Done
3,304,709 UART: [fht] FMC Alias Private Key: 7
3,305,785 UART: [art] Derive CDI
3,306,065 UART: [art] Store in in slot 0x4
3,391,192 UART: [art] Derive Key Pair
3,391,552 UART: [art] Store priv key in slot 0x5
3,405,188 UART: [art] Derive Key Pair - Done
3,419,912 UART: [art] Signing Cert with AUTHO
3,420,392 UART: RITY.KEYID = 7
3,435,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,513 UART: [art] PUB.X = 1A43699EEFE3FEFC39F7454CF1FDF04D374638FD42162067CBFE235DD8F58A6D8DB260E92CBDDC67F4A8774A774C91BB
3,443,303 UART: [art] PUB.Y = 7587A602E57C2ED3D10208A18CDDD7745DDFBED7C421E7F45F97D52316C3B3832A7AD2CD8BFA6DBFA18C3031EF0176D5
3,450,259 UART: [art] SIG.R = 1ABEEB151749B2E5B59A63833A4A77FEFD2812C6F49313EC43A3DFCBCFB8FE6FFCE8863E3D6CF5A8C69D899CB42D9128
3,457,053 UART: [art] SIG.S = 9564C51C157AA64BADD268E24D034B0EACEB0FAC42F8AA394D5ABE7ACBDCBA7753716722186DBB7C5DC7B69EEA1553FE
3,480,621 UART: Caliptra RT
3,480,874 UART: [state] CFI Enabled
3,589,881 UART: [rt] RT listening for mailbox commands...
3,590,544 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,069 UART: [rt]cmd =0x46504c54, len=4
3,621,129 >>> mbox cmd response data (8 bytes)
3,621,360 UART: [rt] FIPS self test
3,621,688 UART: [kat] ++
3,621,840 UART: [kat] sha1
3,625,988 UART: [kat] SHA2-256
3,628,010 UART: [kat] SHA2-384
3,630,717 UART: Fatal Error: 0x90020002
3,632,256 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,261 >>> mbox cmd response: failed
3,632,261 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,632,266 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,360 UART: [kat] LMS
1,475,556 UART: [kat] --
1,476,709 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,840 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,331 UART: [ldev] Erasing FE.KEYID = 1
1,546,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,878 UART: [ldev] --
1,586,315 UART: [fwproc] Waiting for Commands...
1,587,122 UART: [fwproc] Received command 0x46574c44
1,587,913 UART: [fwproc] Received Image of size 114940 bytes
2,891,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,085,112 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,013 ready_for_fw is high
1,363,013 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,936,552 >>> mbox cmd response: success
2,998,384 UART:
2,998,400 UART: Running Caliptra FMC ...
2,998,808 UART:
2,998,862 UART: [state] CFI Enabled
3,009,169 UART: [fht] FMC Alias Private Key: 7
3,117,392 UART: [art] Extend RT PCRs Done
3,117,820 UART: [art] Lock RT PCRs Done
3,119,558 UART: [art] Populate DV Done
3,127,651 UART: [fht] FMC Alias Private Key: 7
3,128,745 UART: [art] Derive CDI
3,129,025 UART: [art] Store in in slot 0x4
3,214,328 UART: [art] Derive Key Pair
3,214,688 UART: [art] Store priv key in slot 0x5
3,227,970 UART: [art] Derive Key Pair - Done
3,242,271 UART: [art] Signing Cert with AUTHO
3,242,751 UART: RITY.KEYID = 7
3,257,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,268 UART: [art] PUB.X = C089C14A59C93694267646EC72FB5513014309EBC0E4E80F656485715D836F3CDC627FCB9A8BB22DB8D49B5A39ED4658
3,265,031 UART: [art] PUB.Y = A0AD654B8E371DC529C1CFB185D4858546CD166C540910F6B6ABF31BCFBEC32E1E64C5E819634BE01267584CCBD871D2
3,271,990 UART: [art] SIG.R = 5F653362BF7E5B3FA1DF2D62F5EDC5CC81238239FACA3B9D400744D2D023286989108AA14F0AC85DAF094D64128540C5
3,278,757 UART: [art] SIG.S = D2ABDD2545593FF67990370270565CFED923A36DF3632C41EC0C344B419B7CF4A4EA08DF4DF8D26A566C3DFDB47951E1
3,303,049 UART: Caliptra RT
3,303,302 UART: [state] CFI Enabled
3,411,811 UART: [rt] RT listening for mailbox commands...
3,412,474 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,349 UART: [rt]cmd =0x46504c54, len=4
3,443,465 >>> mbox cmd response data (8 bytes)
3,443,794 UART: [rt] FIPS self test
3,444,122 UART: [kat] ++
3,444,274 UART: [kat] sha1
3,448,396 UART: [kat] SHA2-256
3,450,418 UART: [kat] SHA2-384
3,453,069 UART: Fatal Error: 0x90020002
3,454,608 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,613 >>> mbox cmd response: failed
3,454,613 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,454,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,868 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,957 UART: [state] LifecycleState = Unprovisioned
86,612 UART: [state] DebugLocked = No
87,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,844 UART: [kat] SHA2-256
882,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,890 UART: [kat] ++
887,042 UART: [kat] sha1
891,176 UART: [kat] SHA2-256
893,114 UART: [kat] SHA2-384
895,851 UART: [kat] SHA2-512-ACC
897,752 UART: [kat] ECC-384
903,391 UART: [kat] HMAC-384Kdf
908,041 UART: [kat] LMS
1,476,237 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,656 UART: [fht] Storing FHT @ 0x50003400
1,480,343 UART: [idev] ++
1,480,511 UART: [idev] CDI.KEYID = 6
1,480,871 UART: [idev] SUBJECT.KEYID = 7
1,481,295 UART: [idev] UDS.KEYID = 0
1,481,640 ready_for_fw is high
1,481,640 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,665 UART: [idev] Erasing UDS.KEYID = 0
1,506,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,229 UART: [idev] --
1,516,444 UART: [ldev] ++
1,516,612 UART: [ldev] CDI.KEYID = 6
1,516,975 UART: [ldev] SUBJECT.KEYID = 5
1,517,401 UART: [ldev] AUTHORITY.KEYID = 7
1,517,864 UART: [ldev] FE.KEYID = 1
1,523,156 UART: [ldev] Erasing FE.KEYID = 1
1,548,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,139 UART: [ldev] --
1,587,420 UART: [fwproc] Waiting for Commands...
1,588,071 UART: [fwproc] Received command 0x46574c44
1,588,862 UART: [fwproc] Received Image of size 114940 bytes
2,894,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,519 >>> mbox cmd response: success
3,088,685 UART: [afmc] ++
3,088,853 UART: [afmc] CDI.KEYID = 6
3,089,215 UART: [afmc] SUBJECT.KEYID = 7
3,089,640 UART: [afmc] AUTHORITY.KEYID = 5
3,124,765 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,785 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,398 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,088 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,861 UART: [afmc] --
3,167,837 UART: [cold-reset] --
3,168,635 UART: [state] Locking Datavault
3,169,940 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,544 UART: [state] Locking ICCM
3,171,204 UART: [exit] Launching FMC @ 0x40000130
3,176,533 UART:
3,176,549 UART: Running Caliptra FMC ...
3,176,957 UART:
3,177,100 UART: [state] CFI Enabled
3,187,679 UART: [fht] FMC Alias Private Key: 7
3,296,412 UART: [art] Extend RT PCRs Done
3,296,840 UART: [art] Lock RT PCRs Done
3,298,254 UART: [art] Populate DV Done
3,306,823 UART: [fht] FMC Alias Private Key: 7
3,307,811 UART: [art] Derive CDI
3,308,091 UART: [art] Store in in slot 0x4
3,393,620 UART: [art] Derive Key Pair
3,393,980 UART: [art] Store priv key in slot 0x5
3,406,936 UART: [art] Derive Key Pair - Done
3,421,346 UART: [art] Signing Cert with AUTHO
3,421,826 UART: RITY.KEYID = 7
3,436,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,359 UART: [art] PUB.X = C63008634F8957820D3780F8DF9F0849C66AB81E55C86F4F8F7C34F9EFC092B406E80EACAA87CE22ABBB78A477B4328B
3,444,124 UART: [art] PUB.Y = 25867D45A7B3BCC0039CAEE0C24D5A99987E43BFA37F5F26F6927F729EFE8E6CDAA01DFF22A0462868155364C98944F1
3,451,079 UART: [art] SIG.R = AFC0E60EF340948FD4BB24BE85D088CD6A5C7016657798754ED169D65E647215B4FE2FEF7FA6BB94E75967577333511C
3,457,850 UART: [art] SIG.S = EDF056AE00B1A9E5BECBA4D7A2487BBA13BFF36C25E43DA27C6938D5FC56C490F25145D4EF5AF87D42E6D1F17177BD0E
3,481,628 UART: Caliptra RT
3,481,973 UART: [state] CFI Enabled
3,590,283 UART: [rt] RT listening for mailbox commands...
3,590,946 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,875 UART: [rt]cmd =0x46504c54, len=4
3,621,987 >>> mbox cmd response data (8 bytes)
3,622,324 UART: [rt] FIPS self test
3,622,652 UART: [kat] ++
3,622,804 UART: [kat] sha1
3,627,020 UART: [kat] SHA2-256
3,629,042 UART: [kat] SHA2-384
3,631,787 UART: Fatal Error: 0x90020002
3,633,326 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,633,331 >>> mbox cmd response: failed
3,633,331 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,633,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,095 UART: [state] LifecycleState = Unprovisioned
86,750 UART: [state] DebugLocked = No
87,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,114 UART: [kat] SHA2-256
883,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,160 UART: [kat] ++
887,312 UART: [kat] sha1
891,532 UART: [kat] SHA2-256
893,470 UART: [kat] SHA2-384
896,253 UART: [kat] SHA2-512-ACC
898,154 UART: [kat] ECC-384
903,913 UART: [kat] HMAC-384Kdf
908,559 UART: [kat] LMS
1,476,755 UART: [kat] --
1,477,802 UART: [cold-reset] ++
1,478,280 UART: [fht] Storing FHT @ 0x50003400
1,480,989 UART: [idev] ++
1,481,157 UART: [idev] CDI.KEYID = 6
1,481,517 UART: [idev] SUBJECT.KEYID = 7
1,481,941 UART: [idev] UDS.KEYID = 0
1,482,286 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,489,911 UART: [idev] Erasing UDS.KEYID = 0
1,506,743 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,317 UART: [idev] --
1,516,462 UART: [ldev] ++
1,516,630 UART: [ldev] CDI.KEYID = 6
1,516,993 UART: [ldev] SUBJECT.KEYID = 5
1,517,419 UART: [ldev] AUTHORITY.KEYID = 7
1,517,882 UART: [ldev] FE.KEYID = 1
1,523,596 UART: [ldev] Erasing FE.KEYID = 1
1,548,587 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,923 UART: [ldev] --
1,588,396 UART: [fwproc] Waiting for Commands...
1,589,213 UART: [fwproc] Received command 0x46574c44
1,590,004 UART: [fwproc] Received Image of size 114940 bytes
2,895,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,992 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,090,231 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,236 ready_for_fw is high
1,362,236 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,934,929 >>> mbox cmd response: success
2,996,281 UART:
2,996,297 UART: Running Caliptra FMC ...
2,996,705 UART:
2,996,848 UART: [state] CFI Enabled
3,007,785 UART: [fht] FMC Alias Private Key: 7
3,115,892 UART: [art] Extend RT PCRs Done
3,116,320 UART: [art] Lock RT PCRs Done
3,118,046 UART: [art] Populate DV Done
3,126,099 UART: [fht] FMC Alias Private Key: 7
3,127,171 UART: [art] Derive CDI
3,127,451 UART: [art] Store in in slot 0x4
3,212,968 UART: [art] Derive Key Pair
3,213,328 UART: [art] Store priv key in slot 0x5
3,226,448 UART: [art] Derive Key Pair - Done
3,241,221 UART: [art] Signing Cert with AUTHO
3,241,701 UART: RITY.KEYID = 7
3,256,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,638 UART: [art] PUB.X = B43CB799B2FC8BB5C6118693234DA99EC2764003EBD0813A8A0DD91BDB0EF4F445BD333B91310E964B37EE0493E6511D
3,264,401 UART: [art] PUB.Y = 510DDA21002FBDEC7E3999598E82EC032B66DCF357175719E6B66C7AFA2135909E18ED53682561CC506D7D519B724DCC
3,271,327 UART: [art] SIG.R = 5D063D743A186DC0425913476BD4B675691B8EB325035E04AD710F1234ECFDB71BB8E39A49A65BAB68B381E1FA6AC87F
3,278,093 UART: [art] SIG.S = 32911D8B9865BB4F179A3455C3F4D6EFBDA08234A659CA03AACB03150F98715B3CE680AF381C7D9C7D405BBBBD3FBC32
3,301,853 UART: Caliptra RT
3,302,198 UART: [state] CFI Enabled
3,410,114 UART: [rt] RT listening for mailbox commands...
3,410,777 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,492 UART: [rt]cmd =0x46504c54, len=4
3,441,566 >>> mbox cmd response data (8 bytes)
3,441,819 UART: [rt] FIPS self test
3,442,147 UART: [kat] ++
3,442,299 UART: [kat] sha1
3,446,523 UART: [kat] SHA2-256
3,448,545 UART: [kat] SHA2-384
3,451,330 UART: Fatal Error: 0x90020002
3,452,869 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,452,874 >>> mbox cmd response: failed
3,452,874 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,452,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,670 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,825 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
893,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,827 UART: [kat] ++
897,979 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,902 UART: [kat] SHA2-512-ACC
908,803 UART: [kat] ECC-384
918,624 UART: [kat] HMAC-384Kdf
923,294 UART: [kat] LMS
1,171,622 UART: [kat] --
1,172,749 UART: [cold-reset] ++
1,173,323 UART: [fht] FHT @ 0x50003400
1,175,948 UART: [idev] ++
1,176,116 UART: [idev] CDI.KEYID = 6
1,176,476 UART: [idev] SUBJECT.KEYID = 7
1,176,900 UART: [idev] UDS.KEYID = 0
1,177,245 ready_for_fw is high
1,177,245 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,437 UART: [idev] Sha1 KeyId Algorithm
1,209,885 UART: [idev] --
1,210,967 UART: [ldev] ++
1,211,135 UART: [ldev] CDI.KEYID = 6
1,211,498 UART: [ldev] SUBJECT.KEYID = 5
1,211,924 UART: [ldev] AUTHORITY.KEYID = 7
1,212,387 UART: [ldev] FE.KEYID = 1
1,217,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,023 UART: [ldev] --
1,283,374 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,754 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,523 >>> mbox cmd response: success
2,783,713 UART: [afmc] ++
2,783,881 UART: [afmc] CDI.KEYID = 6
2,784,243 UART: [afmc] SUBJECT.KEYID = 7
2,784,668 UART: [afmc] AUTHORITY.KEYID = 5
2,820,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,456 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,069 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,764 UART: [afmc] --
2,863,874 UART: [cold-reset] --
2,864,596 UART: [state] Locking Datavault
2,865,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,063 UART: [state] Locking ICCM
2,866,537 UART: [exit] Launching FMC @ 0x40000130
2,871,866 UART:
2,871,882 UART: Running Caliptra FMC ...
2,872,290 UART:
2,872,344 UART: [state] CFI Enabled
2,882,819 UART: [fht] FMC Alias Private Key: 7
2,991,194 UART: [art] Extend RT PCRs Done
2,991,622 UART: [art] Lock RT PCRs Done
2,993,088 UART: [art] Populate DV Done
3,001,227 UART: [fht] FMC Alias Private Key: 7
3,002,239 UART: [art] Derive CDI
3,002,519 UART: [art] Store in in slot 0x4
3,088,074 UART: [art] Derive Key Pair
3,088,434 UART: [art] Store priv key in slot 0x5
3,101,688 UART: [art] Derive Key Pair - Done
3,116,659 UART: [art] Signing Cert with AUTHO
3,117,139 UART: RITY.KEYID = 7
3,132,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,818 UART: [art] PUB.X = 906BBD0510B680A7C8FDC49A91DA88250D07E39E5768B5B5B59FEB5FC9CC9A6280AD9CC94FEE2160A28E8A35017617A5
3,139,588 UART: [art] PUB.Y = AA3D425BC4CC6B9815970D2BE87F4CF7E1DADB75AFFDDB0054551EED1EAE493EB462F6CCDDAAA0B22A6EE15D56DD15D3
3,146,549 UART: [art] SIG.R = 95B2CC2E7D7EB8973DFDCE48DD67A9D4E916D8DBCAF74F0B48C783256C808FBCF127FE2B2A9C98A98E4BE41599B523A2
3,153,338 UART: [art] SIG.S = C24CD258581BE92F216AE750D07F4DA903216C92FAC5D736BC92B593E6FB73CF970F5D45BC088C455EB4E87089E4E584
3,177,090 UART: Caliptra RT
3,177,343 UART: [state] CFI Enabled
3,284,227 UART: [rt] RT listening for mailbox commands...
3,284,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,801 UART: [rt]cmd =0x46504c54, len=4
3,315,937 >>> mbox cmd response data (8 bytes)
3,316,280 UART: [rt] FIPS self test
3,316,608 UART: [kat] ++
3,316,760 UART: [kat] sha1
3,321,030 UART: [kat] SHA2-256
3,323,052 UART: [kat] SHA2-384
3,325,815 UART: Fatal Error: 0x90020002
3,327,354 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,327,359 >>> mbox cmd response: failed
3,327,359 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,327,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,737 UART: [kat] SHA2-256
903,677 UART: [kat] SHA2-384
906,364 UART: [kat] SHA2-512-ACC
908,265 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,413 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,201,269 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,947 UART: [ldev] ++
1,211,115 UART: [ldev] CDI.KEYID = 6
1,211,478 UART: [ldev] SUBJECT.KEYID = 5
1,211,904 UART: [ldev] AUTHORITY.KEYID = 7
1,212,367 UART: [ldev] FE.KEYID = 1
1,217,711 UART: [ldev] Erasing FE.KEYID = 1
1,244,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,831 UART: [ldev] --
1,283,272 UART: [fwproc] Wait for Commands...
1,283,918 UART: [fwproc] Recv command 0x46574c44
1,284,646 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,870 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,174 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,925 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,061 ready_for_fw is high
1,061,061 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,454 >>> mbox cmd response: success
2,696,392 UART:
2,696,408 UART: Running Caliptra FMC ...
2,696,816 UART:
2,696,870 UART: [state] CFI Enabled
2,707,371 UART: [fht] FMC Alias Private Key: 7
2,815,192 UART: [art] Extend RT PCRs Done
2,815,620 UART: [art] Lock RT PCRs Done
2,817,208 UART: [art] Populate DV Done
2,825,643 UART: [fht] FMC Alias Private Key: 7
2,826,793 UART: [art] Derive CDI
2,827,073 UART: [art] Store in in slot 0x4
2,912,610 UART: [art] Derive Key Pair
2,912,970 UART: [art] Store priv key in slot 0x5
2,926,510 UART: [art] Derive Key Pair - Done
2,941,275 UART: [art] Signing Cert with AUTHO
2,941,755 UART: RITY.KEYID = 7
2,956,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,170 UART: [art] PUB.X = 061202C7DBB9453C56568337A1976E5265444621322826AC9AE7BB9CC9B13807CC89D920932F49DD8BF6C9BE0E04E464
2,963,921 UART: [art] PUB.Y = D4E5D9B15D6AF3B1C787B906A0A1EE0FA7D1D80A84252952430E363DDACBCD0FE13D95BF2539607052F7BC79937F6784
2,970,866 UART: [art] SIG.R = EAC8E5A114CCCC703ECF39E26B50C08354FBAF3E0AB3B69A69EE02BFA789CD5B3D67446FC072BBA3F00BA87DF23AD769
2,977,655 UART: [art] SIG.S = 34BD8DF2199FA25CD381A42114F2303FD0201F92D22DC709B6E8C6438032FFD17A77DFD27B1B70D60996F1237757C138
3,000,918 UART: Caliptra RT
3,001,171 UART: [state] CFI Enabled
3,109,596 UART: [rt] RT listening for mailbox commands...
3,110,259 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,946 UART: [rt]cmd =0x46504c54, len=4
3,141,096 >>> mbox cmd response data (8 bytes)
3,141,437 UART: [rt] FIPS self test
3,141,765 UART: [kat] ++
3,141,917 UART: [kat] sha1
3,146,187 UART: [kat] SHA2-256
3,148,209 UART: [kat] SHA2-384
3,150,982 UART: Fatal Error: 0x90020002
3,152,521 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,526 >>> mbox cmd response: failed
3,152,526 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,152,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,183 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,146 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
893,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,638 UART: [kat] ++
897,790 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,463 UART: [kat] SHA2-512-ACC
908,364 UART: [kat] ECC-384
918,163 UART: [kat] HMAC-384Kdf
922,993 UART: [kat] LMS
1,171,321 UART: [kat] --
1,172,210 UART: [cold-reset] ++
1,172,782 UART: [fht] FHT @ 0x50003400
1,175,257 UART: [idev] ++
1,175,425 UART: [idev] CDI.KEYID = 6
1,175,785 UART: [idev] SUBJECT.KEYID = 7
1,176,209 UART: [idev] UDS.KEYID = 0
1,176,554 ready_for_fw is high
1,176,554 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,025 UART: [idev] Erasing UDS.KEYID = 0
1,201,120 UART: [idev] Sha1 KeyId Algorithm
1,209,548 UART: [idev] --
1,210,542 UART: [ldev] ++
1,210,710 UART: [ldev] CDI.KEYID = 6
1,211,073 UART: [ldev] SUBJECT.KEYID = 5
1,211,499 UART: [ldev] AUTHORITY.KEYID = 7
1,211,962 UART: [ldev] FE.KEYID = 1
1,217,018 UART: [ldev] Erasing FE.KEYID = 1
1,242,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,648 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,329 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,021 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,762 >>> mbox cmd response: success
2,781,968 UART: [afmc] ++
2,782,136 UART: [afmc] CDI.KEYID = 6
2,782,498 UART: [afmc] SUBJECT.KEYID = 7
2,782,923 UART: [afmc] AUTHORITY.KEYID = 5
2,819,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,457 UART: [afmc] --
2,862,531 UART: [cold-reset] --
2,863,391 UART: [state] Locking Datavault
2,864,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,118 UART: [state] Locking ICCM
2,865,576 UART: [exit] Launching FMC @ 0x40000130
2,870,905 UART:
2,870,921 UART: Running Caliptra FMC ...
2,871,329 UART:
2,871,472 UART: [state] CFI Enabled
2,882,329 UART: [fht] FMC Alias Private Key: 7
2,991,130 UART: [art] Extend RT PCRs Done
2,991,558 UART: [art] Lock RT PCRs Done
2,993,284 UART: [art] Populate DV Done
3,001,755 UART: [fht] FMC Alias Private Key: 7
3,002,851 UART: [art] Derive CDI
3,003,131 UART: [art] Store in in slot 0x4
3,088,922 UART: [art] Derive Key Pair
3,089,282 UART: [art] Store priv key in slot 0x5
3,102,578 UART: [art] Derive Key Pair - Done
3,117,485 UART: [art] Signing Cert with AUTHO
3,117,965 UART: RITY.KEYID = 7
3,133,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,170 UART: [art] PUB.X = BDAE64245D6965AECF41044019624EFDD080D96CAB497F5E8DC361DF173E0013155E9C568E591E0F1A6964F5B809AE1F
3,140,917 UART: [art] PUB.Y = AB1F5BD3832FD6E4A5D71416951CEB4852497C4E2C9B63813946F6718260AFD0B2A3DF4EA2FEAD985D3D1B43EEFDF5BE
3,147,887 UART: [art] SIG.R = 6185E45061E5C750D66E9A16A91DD9FFAF7F89DA56224B0B8F38E773E755DAC09133FB2FBD5C313373E6A7D848478DF6
3,154,662 UART: [art] SIG.S = 22607B3EE3F7AFB4FFC724462BC04D6CE0BF4FF60E7B33E5EE0C823CBCBD5A01E5A3D965EEA056C474751F48F53D66F5
3,179,054 UART: Caliptra RT
3,179,399 UART: [state] CFI Enabled
3,287,476 UART: [rt] RT listening for mailbox commands...
3,288,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,960 UART: [rt]cmd =0x46504c54, len=4
3,319,200 >>> mbox cmd response data (8 bytes)
3,319,395 UART: [rt] FIPS self test
3,319,723 UART: [kat] ++
3,319,875 UART: [kat] sha1
3,323,953 UART: [kat] SHA2-256
3,325,975 UART: [kat] SHA2-384
3,328,748 UART: Fatal Error: 0x90020002
3,330,287 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,292 >>> mbox cmd response: failed
3,330,292 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,330,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,479 UART: [kat] LMS
1,171,807 UART: [kat] --
1,172,684 UART: [cold-reset] ++
1,173,138 UART: [fht] FHT @ 0x50003400
1,175,965 UART: [idev] ++
1,176,133 UART: [idev] CDI.KEYID = 6
1,176,493 UART: [idev] SUBJECT.KEYID = 7
1,176,917 UART: [idev] UDS.KEYID = 0
1,177,262 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,883 UART: [idev] Erasing UDS.KEYID = 0
1,201,944 UART: [idev] Sha1 KeyId Algorithm
1,210,272 UART: [idev] --
1,211,396 UART: [ldev] ++
1,211,564 UART: [ldev] CDI.KEYID = 6
1,211,927 UART: [ldev] SUBJECT.KEYID = 5
1,212,353 UART: [ldev] AUTHORITY.KEYID = 7
1,212,816 UART: [ldev] FE.KEYID = 1
1,218,212 UART: [ldev] Erasing FE.KEYID = 1
1,244,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,778 UART: [ldev] --
1,284,091 UART: [fwproc] Wait for Commands...
1,284,771 UART: [fwproc] Recv command 0x46574c44
1,285,499 UART: [fwproc] Recv'd Img size: 114940 bytes
2,590,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,011 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,782,850 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,518 ready_for_fw is high
1,060,518 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,735 >>> mbox cmd response: success
2,698,279 UART:
2,698,295 UART: Running Caliptra FMC ...
2,698,703 UART:
2,698,846 UART: [state] CFI Enabled
2,709,649 UART: [fht] FMC Alias Private Key: 7
2,818,322 UART: [art] Extend RT PCRs Done
2,818,750 UART: [art] Lock RT PCRs Done
2,820,336 UART: [art] Populate DV Done
2,828,555 UART: [fht] FMC Alias Private Key: 7
2,829,657 UART: [art] Derive CDI
2,829,937 UART: [art] Store in in slot 0x4
2,915,296 UART: [art] Derive Key Pair
2,915,656 UART: [art] Store priv key in slot 0x5
2,929,336 UART: [art] Derive Key Pair - Done
2,943,723 UART: [art] Signing Cert with AUTHO
2,944,203 UART: RITY.KEYID = 7
2,959,691 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,456 UART: [art] PUB.X = DC934ABCC02BE3B8A49F27711D5FFACC1FDA701F35DF3EF7E3780B8027BA574B19DBFECA3D58D0A85D20BFE24CC1768B
2,967,253 UART: [art] PUB.Y = 546686CD3C17ADE4D6C3954E6FBC005657ACA11F6029B23AEA29B6EB8339FDDF8E3BEBC6618F5118D08A29A9821BD4E8
2,974,197 UART: [art] SIG.R = A521B45B55E3CD792515474453C05037276F67385F456D85BA358A1E29AD69068866566292DCF975CE5EFED62B16DCD1
2,980,960 UART: [art] SIG.S = 7F43AAB5599670251865DA3F7625B91DB351577CFC2A5EB629202AB5E7F7D2BDE79445D1E5C041CAD593088154F287C7
3,004,406 UART: Caliptra RT
3,004,751 UART: [state] CFI Enabled
3,113,840 UART: [rt] RT listening for mailbox commands...
3,114,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,372 UART: [rt]cmd =0x46504c54, len=4
3,145,630 >>> mbox cmd response data (8 bytes)
3,145,883 UART: [rt] FIPS self test
3,146,211 UART: [kat] ++
3,146,363 UART: [kat] sha1
3,150,435 UART: [kat] SHA2-256
3,152,457 UART: [kat] SHA2-384
3,155,046 UART: Fatal Error: 0x90020002
3,156,585 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,590 >>> mbox cmd response: failed
3,156,590 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,156,595 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,530 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,636,791 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,532 UART: [state] LifecycleState = Unprovisioned
85,187 UART: [state] DebugLocked = No
85,849 UART: [state] WD Timer not started. Device not locked for debugging
87,118 UART: [kat] SHA2-256
890,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,797 UART: [kat] ++
894,949 UART: [kat] sha1
899,157 UART: [kat] SHA2-256
901,097 UART: [kat] SHA2-384
903,940 UART: [kat] SHA2-512-ACC
905,841 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 ready_for_fw is high
1,174,289 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,650 UART: [ldev] ++
1,208,818 UART: [ldev] CDI.KEYID = 6
1,209,182 UART: [ldev] SUBJECT.KEYID = 5
1,209,609 UART: [ldev] AUTHORITY.KEYID = 7
1,210,072 UART: [ldev] FE.KEYID = 1
1,214,988 UART: [ldev] Erasing FE.KEYID = 1
1,241,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,820 UART: [fwproc] Wait for Commands...
1,281,401 UART: [fwproc] Recv command 0x46574c44
1,282,134 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,875 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,705 >>> mbox cmd response: success
2,781,882 UART: [afmc] ++
2,782,050 UART: [afmc] CDI.KEYID = 6
2,782,413 UART: [afmc] SUBJECT.KEYID = 7
2,782,839 UART: [afmc] AUTHORITY.KEYID = 5
2,817,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,688 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,145 UART: [afmc] --
2,861,051 UART: [cold-reset] --
2,861,935 UART: [state] Locking Datavault
2,863,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,724 UART: [state] Locking ICCM
2,864,232 UART: [exit] Launching FMC @ 0x40000130
2,869,561 UART:
2,869,577 UART: Running Caliptra FMC ...
2,869,985 UART:
2,870,039 UART: [state] CFI Enabled
2,880,750 UART: [fht] FMC Alias Private Key: 7
2,988,075 UART: [art] Extend RT PCRs Done
2,988,503 UART: [art] Lock RT PCRs Done
2,990,031 UART: [art] Populate DV Done
2,997,974 UART: [fht] FMC Alias Private Key: 7
2,999,052 UART: [art] Derive CDI
2,999,332 UART: [art] Store in in slot 0x4
3,085,183 UART: [art] Derive Key Pair
3,085,543 UART: [art] Store priv key in slot 0x5
3,098,921 UART: [art] Derive Key Pair - Done
3,113,595 UART: [art] Signing Cert with AUTHO
3,114,075 UART: RITY.KEYID = 7
3,129,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,156 UART: [art] PUB.X = D80526834DF60C706C4EC20768FE476178B265D7E05FAB28DD5150A29E6957DA40D9F203D5C15726513FB76E4E49840A
3,136,909 UART: [art] PUB.Y = 8CD6BD87B56590A749E9ED324E539DA8AA208BEAE018225C4B90FB0064117D5706C7E503900A6A2D011D62037D849A55
3,143,822 UART: [art] SIG.R = 103A7924A04C0D51471D274800FFE2009BF8B9FAC220743023843333D226C8A9E7EC6E276440738E7D1E9D1651233472
3,150,533 UART: [art] SIG.S = 056F0E04E071D978D1E8A7755A26AA85188D3DF3E26C09E2CA6114C3D2EC5A23AC4B73511382F62969A7749764CB4744
3,174,724 UART: Caliptra RT
3,174,977 UART: [state] CFI Enabled
3,282,864 UART: [rt] RT listening for mailbox commands...
3,283,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,362 UART: [rt]cmd =0x46504c54, len=4
3,314,524 >>> mbox cmd response data (8 bytes)
3,314,807 UART: [rt] FIPS self test
3,315,135 UART: [kat] ++
3,315,287 UART: [kat] sha1
3,319,497 UART: [kat] SHA2-256
3,321,519 UART: [kat] SHA2-384
3,324,334 UART: Fatal Error: 0x90020002
3,325,873 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,878 >>> mbox cmd response: failed
3,325,878 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
891,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,184 UART: [kat] SHA2-512-ACC
906,085 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,173,927 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,469 UART: [idev] Erasing UDS.KEYID = 0
1,198,491 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,822 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,468 UART: [ldev] --
1,279,952 UART: [fwproc] Wait for Commands...
1,280,761 UART: [fwproc] Recv command 0x46574c44
1,281,494 UART: [fwproc] Recv'd Img size: 114940 bytes
2,585,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,897 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,778,511 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,212 ready_for_fw is high
1,056,212 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,629,723 >>> mbox cmd response: success
2,692,411 UART:
2,692,427 UART: Running Caliptra FMC ...
2,692,835 UART:
2,692,889 UART: [state] CFI Enabled
2,703,346 UART: [fht] FMC Alias Private Key: 7
2,811,465 UART: [art] Extend RT PCRs Done
2,811,893 UART: [art] Lock RT PCRs Done
2,813,149 UART: [art] Populate DV Done
2,821,388 UART: [fht] FMC Alias Private Key: 7
2,822,480 UART: [art] Derive CDI
2,822,760 UART: [art] Store in in slot 0x4
2,908,505 UART: [art] Derive Key Pair
2,908,865 UART: [art] Store priv key in slot 0x5
2,921,827 UART: [art] Derive Key Pair - Done
2,936,668 UART: [art] Signing Cert with AUTHO
2,937,148 UART: RITY.KEYID = 7
2,952,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,991 UART: [art] PUB.X = 7BAB8E6F96FB3B6F8FA0B63C3056CF5B9422E7CCFAF978B005BB0139E270671A8E97328724B2BB2C023B2967D80784C5
2,959,757 UART: [art] PUB.Y = 2BF43487275E466A524E5679A77F79EBD6044E5185BCA0690E1E5DF88294A0A031075098DC51693A64E94D11A8D9E104
2,966,689 UART: [art] SIG.R = 0D6818C55DC85CDDB6780C921C82363F76BAAFB8E78F618ADCB63B7DE003979205033A3D5F9491FC1C85585F0E462288
2,973,445 UART: [art] SIG.S = 80D35EFB2BF0139EA791DAC33867676316DC858C775A47E81AD4B1BA2CD9AF74B55E30944846ED3BE2D2C38A4BA1B80C
2,997,223 UART: Caliptra RT
2,997,476 UART: [state] CFI Enabled
3,106,353 UART: [rt] RT listening for mailbox commands...
3,107,016 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,997 UART: [rt]cmd =0x46504c54, len=4
3,138,173 >>> mbox cmd response data (8 bytes)
3,138,404 UART: [rt] FIPS self test
3,138,732 UART: [kat] ++
3,138,884 UART: [kat] sha1
3,143,164 UART: [kat] SHA2-256
3,145,186 UART: [kat] SHA2-384
3,148,051 UART: Fatal Error: 0x90020002
3,149,590 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,595 >>> mbox cmd response: failed
3,149,595 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,414 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,931 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,503 UART: [kat] SHA2-256
891,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 ready_for_fw is high
1,174,276 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,636 UART: [idev] --
1,208,647 UART: [ldev] ++
1,208,815 UART: [ldev] CDI.KEYID = 6
1,209,179 UART: [ldev] SUBJECT.KEYID = 5
1,209,606 UART: [ldev] AUTHORITY.KEYID = 7
1,210,069 UART: [ldev] FE.KEYID = 1
1,215,481 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,073 UART: [ldev] --
1,281,365 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,683 UART: [fwproc] Recv'd Img size: 114940 bytes
2,587,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,206 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,780,932 >>> mbox cmd response: success
2,782,023 UART: [afmc] ++
2,782,191 UART: [afmc] CDI.KEYID = 6
2,782,554 UART: [afmc] SUBJECT.KEYID = 7
2,782,980 UART: [afmc] AUTHORITY.KEYID = 5
2,818,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,462 UART: [afmc] --
2,861,478 UART: [cold-reset] --
2,862,212 UART: [state] Locking Datavault
2,863,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,009 UART: [state] Locking ICCM
2,864,509 UART: [exit] Launching FMC @ 0x40000130
2,869,838 UART:
2,869,854 UART: Running Caliptra FMC ...
2,870,262 UART:
2,870,405 UART: [state] CFI Enabled
2,881,252 UART: [fht] FMC Alias Private Key: 7
2,989,029 UART: [art] Extend RT PCRs Done
2,989,457 UART: [art] Lock RT PCRs Done
2,990,607 UART: [art] Populate DV Done
2,998,510 UART: [fht] FMC Alias Private Key: 7
2,999,574 UART: [art] Derive CDI
2,999,854 UART: [art] Store in in slot 0x4
3,085,371 UART: [art] Derive Key Pair
3,085,731 UART: [art] Store priv key in slot 0x5
3,098,785 UART: [art] Derive Key Pair - Done
3,113,603 UART: [art] Signing Cert with AUTHO
3,114,083 UART: RITY.KEYID = 7
3,129,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,394 UART: [art] PUB.X = AACBF96B76B9148D65728271D3039857987472026B441CA3399B69D1AF1492CC002851BFDED5B41AB65A03DBF43CD941
3,137,135 UART: [art] PUB.Y = EFB03EE0E21B12653BA73925D1880B5CBB949303F4C286F2CE478902C73917FE029D2C95B2D9F59ECDA4A584886516E1
3,144,077 UART: [art] SIG.R = AB775F5CE6A333596DA64AD10686F6ECCE0E388DB40313CB9E150B19BD43D2B8A7FA129DED93CFEFAE2CDBFB10C3E620
3,150,863 UART: [art] SIG.S = A236C3E427F8D040956E60AB212D1036C2A1A7F5C253097A9BA562D76768296C603C2CD8F7C1EF252F9BB78DB3E79865
3,174,901 UART: Caliptra RT
3,175,246 UART: [state] CFI Enabled
3,282,992 UART: [rt] RT listening for mailbox commands...
3,283,655 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,372 UART: [rt]cmd =0x46504c54, len=4
3,314,502 >>> mbox cmd response data (8 bytes)
3,314,815 UART: [rt] FIPS self test
3,315,143 UART: [kat] ++
3,315,295 UART: [kat] sha1
3,319,593 UART: [kat] SHA2-256
3,321,615 UART: [kat] SHA2-384
3,324,370 UART: Fatal Error: 0x90020002
3,325,909 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,914 >>> mbox cmd response: failed
3,325,914 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,325,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Unprovisioned
85,658 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,220 UART: [kat] ++
895,372 UART: [kat] sha1
899,488 UART: [kat] SHA2-256
901,428 UART: [kat] SHA2-384
904,115 UART: [kat] SHA2-512-ACC
906,016 UART: [kat] ECC-384
915,665 UART: [kat] HMAC-384Kdf
920,255 UART: [kat] LMS
1,168,567 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,376 UART: [idev] ++
1,172,544 UART: [idev] CDI.KEYID = 6
1,172,905 UART: [idev] SUBJECT.KEYID = 7
1,173,330 UART: [idev] UDS.KEYID = 0
1,173,676 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,420 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,207,920 UART: [idev] --
1,208,735 UART: [ldev] ++
1,208,903 UART: [ldev] CDI.KEYID = 6
1,209,267 UART: [ldev] SUBJECT.KEYID = 5
1,209,694 UART: [ldev] AUTHORITY.KEYID = 7
1,210,157 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,551 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114940 bytes
2,588,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,510 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,781,124 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,273 ready_for_fw is high
1,056,273 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,292 >>> mbox cmd response: success
2,693,302 UART:
2,693,318 UART: Running Caliptra FMC ...
2,693,726 UART:
2,693,869 UART: [state] CFI Enabled
2,704,194 UART: [fht] FMC Alias Private Key: 7
2,811,905 UART: [art] Extend RT PCRs Done
2,812,333 UART: [art] Lock RT PCRs Done
2,813,807 UART: [art] Populate DV Done
2,822,238 UART: [fht] FMC Alias Private Key: 7
2,823,250 UART: [art] Derive CDI
2,823,530 UART: [art] Store in in slot 0x4
2,909,253 UART: [art] Derive Key Pair
2,909,613 UART: [art] Store priv key in slot 0x5
2,923,133 UART: [art] Derive Key Pair - Done
2,937,550 UART: [art] Signing Cert with AUTHO
2,938,030 UART: RITY.KEYID = 7
2,953,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,333 UART: [art] PUB.X = 52F1DEB16C7BF15EEF539C127A7F697FC69879A950F3EAD7C72B80BE3F27DE8AD765947879E225348D4CC27DC7F9FB1B
2,961,119 UART: [art] PUB.Y = 5F95A4757800A9BD953B5437CE183FF818DF8BE0706A4C0D97E1C2CF16BEC7315035E474AF9C09AACACEB792F8E470FB
2,968,057 UART: [art] SIG.R = F58F723FFBB86F3F616AA879309626161B54391EDDE0029527E2021DC33093AC7E4DAF1306D481978C72830CB665A8BB
2,974,815 UART: [art] SIG.S = EEC7C0999EE4B360DE1437278DF50F98329AF3AAB1FD4362D19C668ECACB460CE08A7A3E631131FA770FEE646F168332
2,998,929 UART: Caliptra RT
2,999,274 UART: [state] CFI Enabled
3,106,728 UART: [rt] RT listening for mailbox commands...
3,107,391 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,296 UART: [rt]cmd =0x46504c54, len=4
3,138,386 >>> mbox cmd response data (8 bytes)
3,138,721 UART: [rt] FIPS self test
3,139,049 UART: [kat] ++
3,139,201 UART: [kat] sha1
3,143,501 UART: [kat] SHA2-256
3,145,523 UART: [kat] SHA2-384
3,148,174 UART: Fatal Error: 0x90020002
3,149,713 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,718 >>> mbox cmd response: failed
3,149,718 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,149,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,139 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,631,246 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,113 UART:
192,502 UART: Running Caliptra ROM ...
193,656 UART:
193,814 UART: [state] CFI Enabled
264,402 UART: [state] LifecycleState = Unprovisioned
266,355 UART: [state] DebugLocked = No
268,058 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,667 UART: [kat] SHA2-256
443,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,877 UART: [kat] ++
454,467 UART: [kat] sha1
466,866 UART: [kat] SHA2-256
469,553 UART: [kat] SHA2-384
474,722 UART: [kat] SHA2-512-ACC
477,117 UART: [kat] ECC-384
2,767,809 UART: [kat] HMAC-384Kdf
2,798,306 UART: [kat] LMS
3,988,642 UART: [kat] --
3,992,594 UART: [cold-reset] ++
3,994,101 UART: [fht] Storing FHT @ 0x50003400
4,005,963 UART: [idev] ++
4,006,533 UART: [idev] CDI.KEYID = 6
4,007,419 UART: [idev] SUBJECT.KEYID = 7
4,008,687 UART: [idev] UDS.KEYID = 0
4,009,763 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,033,137 UART: [idev] Erasing UDS.KEYID = 0
7,345,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,886 UART: [idev] --
7,371,481 UART: [ldev] ++
7,372,052 UART: [ldev] CDI.KEYID = 6
7,373,018 UART: [ldev] SUBJECT.KEYID = 5
7,374,259 UART: [ldev] AUTHORITY.KEYID = 7
7,375,591 UART: [ldev] FE.KEYID = 1
7,421,218 UART: [ldev] Erasing FE.KEYID = 1
10,755,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,974 UART: [ldev] --
13,130,651 UART: [fwproc] Waiting for Commands...
13,132,754 UART: [fwproc] Received command 0x46505652
13,135,135 UART: [rt] FIPS Version
13,136,791 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,805,906 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,843,674 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,557 UART:
192,911 UART: Running Caliptra ROM ...
194,010 UART:
603,750 UART: [state] CFI Enabled
620,166 UART: [state] LifecycleState = Unprovisioned
622,123 UART: [state] DebugLocked = No
624,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,195 UART: [kat] SHA2-256
799,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,477 UART: [kat] ++
811,010 UART: [kat] sha1
822,218 UART: [kat] SHA2-256
824,902 UART: [kat] SHA2-384
831,093 UART: [kat] SHA2-512-ACC
833,436 UART: [kat] ECC-384
3,119,121 UART: [kat] HMAC-384Kdf
3,131,690 UART: [kat] LMS
4,321,815 UART: [kat] --
4,326,562 UART: [cold-reset] ++
4,327,858 UART: [fht] Storing FHT @ 0x50003400
4,338,913 UART: [idev] ++
4,339,477 UART: [idev] CDI.KEYID = 6
4,340,420 UART: [idev] SUBJECT.KEYID = 7
4,341,688 UART: [idev] UDS.KEYID = 0
4,342,732 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,359,193 UART: [idev] Erasing UDS.KEYID = 0
7,636,547 UART: [idev] Using Sha1 for KeyId Algorithm
7,659,002 UART: [idev] --
7,663,411 UART: [ldev] ++
7,663,995 UART: [ldev] CDI.KEYID = 6
7,665,018 UART: [ldev] SUBJECT.KEYID = 5
7,666,185 UART: [ldev] AUTHORITY.KEYID = 7
7,667,418 UART: [ldev] FE.KEYID = 1
7,678,338 UART: [ldev] Erasing FE.KEYID = 1
10,968,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,262,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,276,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,291,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,306,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,325,756 UART: [ldev] --
13,331,256 UART: [fwproc] Waiting for Commands...
13,334,580 UART: [fwproc] Received command 0x46505652
13,336,996 UART: [rt] FIPS Version
13,338,588 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,130,565 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,040,714 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,207 UART:
192,701 UART: Running Caliptra ROM ...
193,821 UART:
193,973 UART: [state] CFI Enabled
260,263 UART: [state] LifecycleState = Unprovisioned
262,172 UART: [state] DebugLocked = No
264,425 UART: [state] WD Timer not started. Device not locked for debugging
268,884 UART: [kat] SHA2-256
447,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,565 UART: [kat] ++
460,104 UART: [kat] sha1
472,611 UART: [kat] SHA2-256
475,668 UART: [kat] SHA2-384
481,856 UART: [kat] SHA2-512-ACC
484,840 UART: [kat] ECC-384
2,946,438 UART: [kat] HMAC-384Kdf
2,968,617 UART: [kat] LMS
3,498,025 UART: [kat] --
3,502,289 UART: [cold-reset] ++
3,504,376 UART: [fht] FHT @ 0x50003400
3,516,824 UART: [idev] ++
3,517,387 UART: [idev] CDI.KEYID = 6
3,518,270 UART: [idev] SUBJECT.KEYID = 7
3,519,482 UART: [idev] UDS.KEYID = 0
3,520,479 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,541,321 UART: [idev] Erasing UDS.KEYID = 0
6,023,956 UART: [idev] Sha1 KeyId Algorithm
6,047,030 UART: [idev] --
6,051,522 UART: [ldev] ++
6,052,136 UART: [ldev] CDI.KEYID = 6
6,053,061 UART: [ldev] SUBJECT.KEYID = 5
6,054,171 UART: [ldev] AUTHORITY.KEYID = 7
6,055,404 UART: [ldev] FE.KEYID = 1
6,097,332 UART: [ldev] Erasing FE.KEYID = 1
8,602,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,675 UART: [ldev] --
10,411,724 UART: [fwproc] Wait for Commands...
10,414,897 UART: [fwproc] Recv command 0x46505652
10,417,265 UART: [rt] FIPS Version
10,418,717 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,183 writing to cptra_bootfsm_go
3,394,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,237,346 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,179 writing to cptra_bootfsm_go
193,486 UART:
193,838 UART: Running Caliptra ROM ...
195,015 UART:
604,628 UART: [state] CFI Enabled
616,336 UART: [state] LifecycleState = Unprovisioned
618,205 UART: [state] DebugLocked = No
620,338 UART: [state] WD Timer not started. Device not locked for debugging
623,661 UART: [kat] SHA2-256
802,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,347 UART: [kat] ++
814,791 UART: [kat] sha1
827,123 UART: [kat] SHA2-256
830,152 UART: [kat] SHA2-384
836,991 UART: [kat] SHA2-512-ACC
839,980 UART: [kat] ECC-384
3,280,602 UART: [kat] HMAC-384Kdf
3,292,258 UART: [kat] LMS
3,821,761 UART: [kat] --
3,826,961 UART: [cold-reset] ++
3,829,281 UART: [fht] FHT @ 0x50003400
3,839,988 UART: [idev] ++
3,840,767 UART: [idev] CDI.KEYID = 6
3,841,691 UART: [idev] SUBJECT.KEYID = 7
3,842,801 UART: [idev] UDS.KEYID = 0
3,843,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,857,585 UART: [idev] Erasing UDS.KEYID = 0
6,311,248 UART: [idev] Sha1 KeyId Algorithm
6,335,403 UART: [idev] --
6,339,937 UART: [ldev] ++
6,340,522 UART: [ldev] CDI.KEYID = 6
6,341,435 UART: [ldev] SUBJECT.KEYID = 5
6,342,650 UART: [ldev] AUTHORITY.KEYID = 7
6,343,882 UART: [ldev] FE.KEYID = 1
6,354,362 UART: [ldev] Erasing FE.KEYID = 1
8,822,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,697 UART: [ldev] --
10,613,204 UART: [fwproc] Wait for Commands...
10,615,787 UART: [fwproc] Recv command 0x46505652
10,618,100 UART: [rt] FIPS Version
10,619,611 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,031 writing to cptra_bootfsm_go
3,704,304 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,413,256 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,254 UART:
192,628 UART: Running Caliptra ROM ...
193,790 UART:
193,942 UART: [state] CFI Enabled
261,287 UART: [state] LifecycleState = Unprovisioned
263,676 UART: [state] DebugLocked = No
265,435 UART: [state] WD Timer not started. Device not locked for debugging
270,493 UART: [kat] SHA2-256
460,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,183 UART: [kat] ++
471,661 UART: [kat] sha1
482,594 UART: [kat] SHA2-256
485,610 UART: [kat] SHA2-384
492,186 UART: [kat] SHA2-512-ACC
494,746 UART: [kat] ECC-384
2,942,106 UART: [kat] HMAC-384Kdf
2,980,375 UART: [kat] LMS
3,512,119 UART: [kat] --
3,514,926 UART: [cold-reset] ++
3,517,021 UART: [fht] FHT @ 0x50003400
3,528,817 UART: [idev] ++
3,529,499 UART: [idev] CDI.KEYID = 6
3,530,442 UART: [idev] SUBJECT.KEYID = 7
3,531,655 UART: [idev] UDS.KEYID = 0
3,532,634 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,552,501 UART: [idev] Erasing UDS.KEYID = 0
6,037,514 UART: [idev] Sha1 KeyId Algorithm
6,059,893 UART: [idev] --
6,064,408 UART: [ldev] ++
6,065,103 UART: [ldev] CDI.KEYID = 6
6,066,020 UART: [ldev] SUBJECT.KEYID = 5
6,067,183 UART: [ldev] AUTHORITY.KEYID = 7
6,068,415 UART: [ldev] FE.KEYID = 1
6,110,238 UART: [ldev] Erasing FE.KEYID = 1
8,615,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,352,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,368,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,527 UART: [ldev] --
10,426,331 UART: [fwproc] Wait for Commands...
10,428,181 UART: [fwproc] Recv command 0x46505652
10,430,722 UART: [rt] FIPS Version
10,432,449 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
12,841 writing to cptra_bootfsm_go
3,438,948 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,748 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,546 UART:
192,907 UART: Running Caliptra ROM ...
194,045 UART:
603,573 UART: [state] CFI Enabled
617,051 UART: [state] LifecycleState = Unprovisioned
619,439 UART: [state] DebugLocked = No
621,635 UART: [state] WD Timer not started. Device not locked for debugging
626,525 UART: [kat] SHA2-256
816,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,196 UART: [kat] ++
827,782 UART: [kat] sha1
838,178 UART: [kat] SHA2-256
841,186 UART: [kat] SHA2-384
848,027 UART: [kat] SHA2-512-ACC
850,639 UART: [kat] ECC-384
3,292,035 UART: [kat] HMAC-384Kdf
3,305,039 UART: [kat] LMS
3,836,819 UART: [kat] --
3,840,989 UART: [cold-reset] ++
3,842,870 UART: [fht] FHT @ 0x50003400
3,854,111 UART: [idev] ++
3,854,785 UART: [idev] CDI.KEYID = 6
3,855,799 UART: [idev] SUBJECT.KEYID = 7
3,856,957 UART: [idev] UDS.KEYID = 0
3,857,951 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,871,839 UART: [idev] Erasing UDS.KEYID = 0
6,334,958 UART: [idev] Sha1 KeyId Algorithm
6,357,527 UART: [idev] --
6,362,441 UART: [ldev] ++
6,363,119 UART: [ldev] CDI.KEYID = 6
6,364,036 UART: [ldev] SUBJECT.KEYID = 5
6,365,194 UART: [ldev] AUTHORITY.KEYID = 7
6,366,421 UART: [ldev] FE.KEYID = 1
6,379,096 UART: [ldev] Erasing FE.KEYID = 1
8,857,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,340 UART: [ldev] --
10,649,036 UART: [fwproc] Wait for Commands...
10,651,080 UART: [fwproc] Recv command 0x46505652
10,653,620 UART: [rt] FIPS Version
10,655,343 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,750,489 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,462,704 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
86,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,527 UART: [kat] SHA2-256
882,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,573 UART: [kat] ++
886,725 UART: [kat] sha1
891,139 UART: [kat] SHA2-256
893,077 UART: [kat] SHA2-384
895,994 UART: [kat] SHA2-512-ACC
897,895 UART: [kat] ECC-384
903,630 UART: [kat] HMAC-384Kdf
908,060 UART: [kat] LMS
1,476,256 UART: [kat] --
1,477,233 UART: [cold-reset] ++
1,477,635 UART: [fht] Storing FHT @ 0x50003400
1,480,384 UART: [idev] ++
1,480,552 UART: [idev] CDI.KEYID = 6
1,480,912 UART: [idev] SUBJECT.KEYID = 7
1,481,336 UART: [idev] UDS.KEYID = 0
1,481,681 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,354 UART: [idev] Erasing UDS.KEYID = 0
1,506,182 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,720 UART: [idev] --
1,515,747 UART: [ldev] ++
1,515,915 UART: [ldev] CDI.KEYID = 6
1,516,278 UART: [ldev] SUBJECT.KEYID = 5
1,516,704 UART: [ldev] AUTHORITY.KEYID = 7
1,517,167 UART: [ldev] FE.KEYID = 1
1,521,995 UART: [ldev] Erasing FE.KEYID = 1
1,547,812 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,786 UART: [ldev] --
1,587,059 UART: [fwproc] Waiting for Commands...
1,587,678 UART: [fwproc] Received command 0x46505652
1,588,560 UART: [rt] FIPS Version
1,589,113 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,845 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,652 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,662 UART: [kat] SHA2-256
892,600 UART: [kat] SHA2-384
895,285 UART: [kat] SHA2-512-ACC
897,186 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,845 UART: [kat] LMS
1,476,041 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,479,937 UART: [idev] ++
1,480,105 UART: [idev] CDI.KEYID = 6
1,480,465 UART: [idev] SUBJECT.KEYID = 7
1,480,889 UART: [idev] UDS.KEYID = 0
1,481,234 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,505,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,363 UART: [idev] --
1,515,270 UART: [ldev] ++
1,515,438 UART: [ldev] CDI.KEYID = 6
1,515,801 UART: [ldev] SUBJECT.KEYID = 5
1,516,227 UART: [ldev] AUTHORITY.KEYID = 7
1,516,690 UART: [ldev] FE.KEYID = 1
1,522,086 UART: [ldev] Erasing FE.KEYID = 1
1,547,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,899 UART: [ldev] --
1,587,336 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46505652
1,588,939 UART: [rt] FIPS Version
1,589,492 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,624 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,409 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
892,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,093 UART: [kat] ++
897,245 UART: [kat] sha1
901,427 UART: [kat] SHA2-256
903,367 UART: [kat] SHA2-384
906,082 UART: [kat] SHA2-512-ACC
907,983 UART: [kat] ECC-384
917,736 UART: [kat] HMAC-384Kdf
922,274 UART: [kat] LMS
1,170,602 UART: [kat] --
1,171,345 UART: [cold-reset] ++
1,171,873 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,175,901 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,746 UART: [idev] Erasing UDS.KEYID = 0
1,200,555 UART: [idev] Sha1 KeyId Algorithm
1,208,947 UART: [idev] --
1,210,111 UART: [ldev] ++
1,210,279 UART: [ldev] CDI.KEYID = 6
1,210,642 UART: [ldev] SUBJECT.KEYID = 5
1,211,068 UART: [ldev] AUTHORITY.KEYID = 7
1,211,531 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,625 UART: [ldev] --
1,283,020 UART: [fwproc] Wait for Commands...
1,283,692 UART: [fwproc] Recv command 0x46505652
1,284,513 UART: [rt] FIPS Version
1,285,067 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,769 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,383 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
893,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,960 UART: [kat] ++
898,112 UART: [kat] sha1
902,418 UART: [kat] SHA2-256
904,358 UART: [kat] SHA2-384
907,107 UART: [kat] SHA2-512-ACC
909,008 UART: [kat] ECC-384
919,057 UART: [kat] HMAC-384Kdf
923,829 UART: [kat] LMS
1,172,157 UART: [kat] --
1,173,170 UART: [cold-reset] ++
1,173,732 UART: [fht] FHT @ 0x50003400
1,176,317 UART: [idev] ++
1,176,485 UART: [idev] CDI.KEYID = 6
1,176,845 UART: [idev] SUBJECT.KEYID = 7
1,177,269 UART: [idev] UDS.KEYID = 0
1,177,614 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,553 UART: [idev] Erasing UDS.KEYID = 0
1,202,626 UART: [idev] Sha1 KeyId Algorithm
1,211,252 UART: [idev] --
1,212,302 UART: [ldev] ++
1,212,470 UART: [ldev] CDI.KEYID = 6
1,212,833 UART: [ldev] SUBJECT.KEYID = 5
1,213,259 UART: [ldev] AUTHORITY.KEYID = 7
1,213,722 UART: [ldev] FE.KEYID = 1
1,218,870 UART: [ldev] Erasing FE.KEYID = 1
1,245,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,716 UART: [ldev] --
1,285,137 UART: [fwproc] Wait for Commands...
1,285,721 UART: [fwproc] Recv command 0x46505652
1,286,542 UART: [rt] FIPS Version
1,287,096 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,858 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,106 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,572 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,587 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,199,081 UART: [idev] Sha1 KeyId Algorithm
1,207,977 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,692 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46505652
1,283,218 UART: [rt] FIPS Version
1,283,779 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,698 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,966 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,787 UART: [kat] SHA2-512-ACC
906,688 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,386 UART: [idev] Sha1 KeyId Algorithm
1,207,058 UART: [idev] --
1,208,077 UART: [ldev] ++
1,208,245 UART: [ldev] CDI.KEYID = 6
1,208,609 UART: [ldev] SUBJECT.KEYID = 5
1,209,036 UART: [ldev] AUTHORITY.KEYID = 7
1,209,499 UART: [ldev] FE.KEYID = 1
1,214,869 UART: [ldev] Erasing FE.KEYID = 1
1,241,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,527 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,500 UART: [fwproc] Recv command 0x46505652
1,282,327 UART: [rt] FIPS Version
1,282,888 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,129 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,869 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,188 UART:
192,553 UART: Running Caliptra ROM ...
193,727 UART:
193,881 UART: [state] CFI Enabled
261,919 UART: [state] LifecycleState = Unprovisioned
263,833 UART: [state] DebugLocked = No
266,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,406 UART: [kat] SHA2-256
440,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,613 UART: [kat] ++
451,067 UART: [kat] sha1
461,879 UART: [kat] SHA2-256
464,537 UART: [kat] SHA2-384
470,754 UART: [kat] SHA2-512-ACC
473,052 UART: [kat] ECC-384
2,766,370 UART: [kat] HMAC-384Kdf
2,778,774 UART: [kat] LMS
3,969,119 UART: [kat] --
3,972,310 UART: [cold-reset] ++
3,974,681 UART: [fht] Storing FHT @ 0x50003400
3,985,603 UART: [idev] ++
3,986,180 UART: [idev] CDI.KEYID = 6
3,987,097 UART: [idev] SUBJECT.KEYID = 7
3,988,350 UART: [idev] UDS.KEYID = 0
3,989,468 ready_for_fw is high
3,989,698 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,132,848 UART: [idev] Erasing UDS.KEYID = 0
7,325,998 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,914 UART: [idev] --
7,351,668 UART: [ldev] ++
7,352,254 UART: [ldev] CDI.KEYID = 6
7,353,184 UART: [ldev] SUBJECT.KEYID = 5
7,354,404 UART: [ldev] AUTHORITY.KEYID = 7
7,355,640 UART: [ldev] FE.KEYID = 1
7,400,960 UART: [ldev] Erasing FE.KEYID = 1
10,736,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,587 UART: [ldev] --
13,117,635 UART: [fwproc] Waiting for Commands...
13,119,841 UART: [fwproc] Received command 0x46574c44
13,122,033 UART: [fwproc] Received Image of size 113760 bytes
17,172,623 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,698 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,567 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,636,409 >>> mbox cmd response: success
17,636,979 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,640,922 UART: [afmc] ++
17,641,504 UART: [afmc] CDI.KEYID = 6
17,642,440 UART: [afmc] SUBJECT.KEYID = 7
17,643,708 UART: [afmc] AUTHORITY.KEYID = 5
21,009,543 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,982 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,243 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,648 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,490 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,938 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,188 UART: [afmc] --
23,380,891 UART: [cold-reset] --
23,385,893 UART: [state] Locking Datavault
23,391,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,238 UART: [state] Locking ICCM
23,394,604 UART: [exit] Launching FMC @ 0x40000130
23,402,994 UART:
23,403,237 UART: Running Caliptra FMC ...
23,404,340 UART:
23,404,498 UART: [state] CFI Enabled
23,469,825 UART: [fht] FMC Alias Private Key: 7
25,808,014 UART: [art] Extend RT PCRs Done
25,809,367 UART: [art] Lock RT PCRs Done
25,811,118 UART: [art] Populate DV Done
25,816,693 UART: [fht] FMC Alias Private Key: 7
25,818,335 UART: [art] Derive CDI
25,819,068 UART: [art] Store in in slot 0x4
25,878,833 UART: [art] Derive Key Pair
25,879,831 UART: [art] Store priv key in slot 0x5
29,172,657 UART: [art] Derive Key Pair - Done
29,185,939 UART: [art] Signing Cert with AUTHO
29,187,243 UART: RITY.KEYID = 7
31,474,191 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,696 UART: [art] PUB.X = CAD5C94CDEAA342446A7AB8507BC45AA7396C9C189D8BEE9999722F6AACDE78961BFE47E63B90CB0B3AD5ADCE0FD9A8A
31,482,989 UART: [art] PUB.Y = ABE1649DBE86713AF37B994F3DB0AD7298FD51F7751A20FD0FA9EE9ED9AAD244A62E4E6E4867F4B3AC8D25B1E345EA28
31,490,244 UART: [art] SIG.R = EB51DB666119C585828A65CB1F11DB0AF58A4FE9C79F6E29B4720BD0F8BC9DA9EFBDD97238E1C0EDE6CBA89688523989
31,497,647 UART: [art] SIG.S = BB6FB92AE137B16DBD2005D414B02F237C0A31CEFC3CE44ABEEE9A850C0E7C50285019B69F3623588AD98D2E0A5A6660
32,802,520 UART: Caliptra RT
32,803,228 UART: [state] CFI Enabled
32,963,945 UART: [rt] RT listening for mailbox commands...
32,995,521 UART: [rt]cmd =0x46505652, len=4
32,996,771 UART: [rt] FIPS Version
32,997,825 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
3,787,153 ready_for_fw is high
3,787,686 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,849,421 >>> mbox cmd response: success
17,850,116 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,547,640 UART:
23,548,034 UART: Running Caliptra FMC ...
23,549,203 UART:
23,549,361 UART: [state] CFI Enabled
23,617,398 UART: [fht] FMC Alias Private Key: 7
25,955,524 UART: [art] Extend RT PCRs Done
25,956,748 UART: [art] Lock RT PCRs Done
25,958,266 UART: [art] Populate DV Done
25,963,617 UART: [fht] FMC Alias Private Key: 7
25,965,109 UART: [art] Derive CDI
25,965,849 UART: [art] Store in in slot 0x4
26,025,812 UART: [art] Derive Key Pair
26,026,901 UART: [art] Store priv key in slot 0x5
29,319,773 UART: [art] Derive Key Pair - Done
29,332,602 UART: [art] Signing Cert with AUTHO
29,333,898 UART: RITY.KEYID = 7
31,621,096 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,617 UART: [art] PUB.X = B84485984EF842C0E81A1B543BF7F528B86F66E6AF912A740C36C399037762590705B299EE8E8CD19D02E6C0521E361C
31,629,824 UART: [art] PUB.Y = B0064EF66F212CD815D0681F84E996B6F1C49410C98EFEA5F1CA701368BD170C83E984B2B1BBDAF266CC2942BA3A9F67
31,637,088 UART: [art] SIG.R = E8464FBDB93F5FF51D0B7D0F2853704ACBA281803D6F6EBEFD74E9F530754D8E7B4E527FFFB84EBAC5DF34C39E9A782E
31,644,500 UART: [art] SIG.S = 5D5D41F575CD2CB32A383B3077D881D07DB89A54DCBB8004008352927B7C99D9E305EC63FCF152954989A5287A742EE9
32,949,816 UART: Caliptra RT
32,950,529 UART: [state] CFI Enabled
33,113,359 UART: [rt] RT listening for mailbox commands...
33,144,824 UART: [rt]cmd =0x46505652, len=4
33,146,102 UART: [rt] FIPS Version
33,147,264 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,638 UART:
193,019 UART: Running Caliptra ROM ...
194,203 UART:
603,987 UART: [state] CFI Enabled
617,816 UART: [state] LifecycleState = Unprovisioned
619,729 UART: [state] DebugLocked = No
621,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,655 UART: [kat] SHA2-256
795,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,956 UART: [kat] ++
806,401 UART: [kat] sha1
817,061 UART: [kat] SHA2-256
819,724 UART: [kat] SHA2-384
826,002 UART: [kat] SHA2-512-ACC
828,380 UART: [kat] ECC-384
3,112,724 UART: [kat] HMAC-384Kdf
3,125,535 UART: [kat] LMS
4,315,643 UART: [kat] --
4,320,799 UART: [cold-reset] ++
4,322,536 UART: [fht] Storing FHT @ 0x50003400
4,333,667 UART: [idev] ++
4,334,235 UART: [idev] CDI.KEYID = 6
4,335,270 UART: [idev] SUBJECT.KEYID = 7
4,336,445 UART: [idev] UDS.KEYID = 0
4,337,512 ready_for_fw is high
4,337,736 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,652 UART: [idev] Erasing UDS.KEYID = 0
7,625,874 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,352 UART: [idev] --
7,651,131 UART: [ldev] ++
7,651,751 UART: [ldev] CDI.KEYID = 6
7,652,686 UART: [ldev] SUBJECT.KEYID = 5
7,653,850 UART: [ldev] AUTHORITY.KEYID = 7
7,655,160 UART: [ldev] FE.KEYID = 1
7,666,779 UART: [ldev] Erasing FE.KEYID = 1
10,957,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,845 UART: [ldev] --
13,318,160 UART: [fwproc] Waiting for Commands...
13,319,778 UART: [fwproc] Received command 0x46574c44
13,322,021 UART: [fwproc] Received Image of size 113760 bytes
17,371,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,835,827 >>> mbox cmd response: success
17,836,400 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,840,787 UART: [afmc] ++
17,841,376 UART: [afmc] CDI.KEYID = 6
17,842,289 UART: [afmc] SUBJECT.KEYID = 7
17,843,557 UART: [afmc] AUTHORITY.KEYID = 5
21,158,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,213 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,588 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,441 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,900 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,118 UART: [afmc] --
23,524,849 UART: [cold-reset] --
23,530,384 UART: [state] Locking Datavault
23,536,552 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,252 UART: [state] Locking ICCM
23,539,786 UART: [exit] Launching FMC @ 0x40000130
23,548,194 UART:
23,548,432 UART: Running Caliptra FMC ...
23,549,534 UART:
23,549,690 UART: [state] CFI Enabled
23,557,738 UART: [fht] FMC Alias Private Key: 7
25,889,119 UART: [art] Extend RT PCRs Done
25,890,474 UART: [art] Lock RT PCRs Done
25,892,064 UART: [art] Populate DV Done
25,897,533 UART: [fht] FMC Alias Private Key: 7
25,899,076 UART: [art] Derive CDI
25,899,896 UART: [art] Store in in slot 0x4
25,942,490 UART: [art] Derive Key Pair
25,943,486 UART: [art] Store priv key in slot 0x5
29,185,680 UART: [art] Derive Key Pair - Done
29,198,741 UART: [art] Signing Cert with AUTHO
29,200,050 UART: RITY.KEYID = 7
31,479,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,982 UART: [art] PUB.X = CE44C2D4A939D3A96BE307E6BE331B5D25A099CCF569611C3AED7F2C70B258EAF203C87880E4E69BB0CE1067408E697B
31,488,219 UART: [art] PUB.Y = 28A96553623ED0A1D4CCAE45A113532615A47B7CECB48340173ECD227B763F79FFEF32238A23AB05CE023EF7F51D6B94
31,495,462 UART: [art] SIG.R = 4FA3A275EC58221C6F5958948CACD68A2CCBCDC6B7E5A136DE39CF1A23A83C0D030B28EB30117E4065231CEF63DF8D68
31,502,908 UART: [art] SIG.S = AF30CE71DAD8DDDEF05AF5CABD80A09A4D3AA47851329E4DBD007553ED338457C4F7C50FCEE6B9D3FE33204E26C6B7F1
32,807,982 UART: Caliptra RT
32,808,703 UART: [state] CFI Enabled
32,926,635 UART: [rt] RT listening for mailbox commands...
32,957,940 UART: [rt]cmd =0x46505652, len=4
32,959,218 UART: [rt] FIPS Version
32,960,374 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,143 writing to cptra_bootfsm_go
4,129,757 ready_for_fw is high
4,130,202 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,059,589 >>> mbox cmd response: success
18,060,421 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,701,258 UART:
23,701,722 UART: Running Caliptra FMC ...
23,702,868 UART:
23,703,030 UART: [state] CFI Enabled
23,711,306 UART: [fht] FMC Alias Private Key: 7
26,041,626 UART: [art] Extend RT PCRs Done
26,042,849 UART: [art] Lock RT PCRs Done
26,044,541 UART: [art] Populate DV Done
26,049,858 UART: [fht] FMC Alias Private Key: 7
26,051,349 UART: [art] Derive CDI
26,052,119 UART: [art] Store in in slot 0x4
26,094,612 UART: [art] Derive Key Pair
26,095,660 UART: [art] Store priv key in slot 0x5
29,338,175 UART: [art] Derive Key Pair - Done
29,350,955 UART: [art] Signing Cert with AUTHO
29,352,291 UART: RITY.KEYID = 7
31,631,662 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,164 UART: [art] PUB.X = 8530A57687FB486E37486353B5C0F4A0D8670B90F4E3F36EE9E4176125D2355EEE82DFA2463CA53B2623A43314EE98F5
31,640,440 UART: [art] PUB.Y = A5DCE176A7B2320AEB5266610349034A8B484DB626B75AEB0AC09BBE43A9E6EB6BA3A490F20EDB2F1803DA9F2FF232B0
31,647,697 UART: [art] SIG.R = 340256C35A8126E28D75182D647DC19C8D2D25F0F2DD9CAC2218218A8F12588554DDF0B39578A41A2C2EF4D3FCE740CC
31,655,053 UART: [art] SIG.S = F9243512C70A85E8FDF3A5A9D4F705C8B0C54406241DFFCBD0822080E9921F5FAAAD4696F1634857CE0A285D71C7142D
32,960,679 UART: Caliptra RT
32,961,371 UART: [state] CFI Enabled
33,079,841 UART: [rt] RT listening for mailbox commands...
33,111,203 UART: [rt]cmd =0x46505652, len=4
33,112,451 UART: [rt] FIPS Version
33,113,607 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,111 UART:
192,508 UART: Running Caliptra ROM ...
193,727 UART:
193,880 UART: [state] CFI Enabled
265,453 UART: [state] LifecycleState = Unprovisioned
267,381 UART: [state] DebugLocked = No
269,138 UART: [state] WD Timer not started. Device not locked for debugging
272,475 UART: [kat] SHA2-256
451,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,137 UART: [kat] ++
463,673 UART: [kat] sha1
475,130 UART: [kat] SHA2-256
478,143 UART: [kat] SHA2-384
483,709 UART: [kat] SHA2-512-ACC
486,644 UART: [kat] ECC-384
2,947,924 UART: [kat] HMAC-384Kdf
2,971,381 UART: [kat] LMS
3,500,834 UART: [kat] --
3,503,415 UART: [cold-reset] ++
3,504,641 UART: [fht] FHT @ 0x50003400
3,517,183 UART: [idev] ++
3,517,753 UART: [idev] CDI.KEYID = 6
3,518,678 UART: [idev] SUBJECT.KEYID = 7
3,519,853 UART: [idev] UDS.KEYID = 0
3,520,773 ready_for_fw is high
3,520,977 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,664,459 UART: [idev] Erasing UDS.KEYID = 0
6,026,685 UART: [idev] Sha1 KeyId Algorithm
6,049,057 UART: [idev] --
6,051,863 UART: [ldev] ++
6,052,470 UART: [ldev] CDI.KEYID = 6
6,053,387 UART: [ldev] SUBJECT.KEYID = 5
6,054,550 UART: [ldev] AUTHORITY.KEYID = 7
6,055,805 UART: [ldev] FE.KEYID = 1
6,100,479 UART: [ldev] Erasing FE.KEYID = 1
8,602,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,849 UART: [ldev] --
10,391,913 UART: [fwproc] Wait for Commands...
10,394,608 UART: [fwproc] Recv command 0x46574c44
10,396,654 UART: [fwproc] Recv'd Img size: 114084 bytes
13,800,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,257,399 >>> mbox cmd response: success
14,257,976 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,261,006 UART: [afmc] ++
14,261,603 UART: [afmc] CDI.KEYID = 6
14,262,524 UART: [afmc] SUBJECT.KEYID = 7
14,263,685 UART: [afmc] AUTHORITY.KEYID = 5
16,804,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,068 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,943 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,573 UART: [afmc] --
18,606,621 UART: [cold-reset] --
18,611,130 UART: [state] Locking Datavault
18,615,493 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,200 UART: [state] Locking ICCM
18,618,215 UART: [exit] Launching FMC @ 0x40000130
18,626,631 UART:
18,626,865 UART: Running Caliptra FMC ...
18,627,967 UART:
18,628,122 UART: [state] CFI Enabled
18,689,037 UART: [fht] FMC Alias Private Key: 7
20,452,631 UART: [art] Extend RT PCRs Done
20,453,850 UART: [art] Lock RT PCRs Done
20,455,387 UART: [art] Populate DV Done
20,461,171 UART: [fht] FMC Alias Private Key: 7
20,462,757 UART: [art] Derive CDI
20,463,489 UART: [art] Store in in slot 0x4
20,520,930 UART: [art] Derive Key Pair
20,521,927 UART: [art] Store priv key in slot 0x5
22,984,977 UART: [art] Derive Key Pair - Done
22,998,346 UART: [art] Signing Cert with AUTHO
22,999,653 UART: RITY.KEYID = 7
24,710,342 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,831 UART: [art] PUB.X = 8B03215203922449990497AB5E3492EF17389954A1318DED95FDE034B3208BFBB52496D7ECD5D168C3F0B10FE1AE8C22
24,719,114 UART: [art] PUB.Y = 64EA886F85137B9D20C10CE5E8CE75C2D12D53DDAC43511B22AC1646541150D15A8E67B6AD023E2CA8309BB1AA2F4A6A
24,726,388 UART: [art] SIG.R = 3FEBFEB4AE2D30FEEF135E4B6D2CBC2B37E002F57AD078E4E2AA84048E36F7AC93DED521623F6B950D1A639FD43DDC65
24,733,772 UART: [art] SIG.S = 53CA322FBAFA68F20359B4BB614592191F7AC154C6997CE995A95AFCDB0E70C9789E64B16A869D0AE87C9980E34DC554
25,712,660 UART: Caliptra RT
25,713,378 UART: [state] CFI Enabled
25,877,767 UART: [rt] RT listening for mailbox commands...
25,909,063 UART: [rt]cmd =0x46505652, len=4
25,910,395 UART: [rt] FIPS Version
25,911,560 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,359,689 ready_for_fw is high
3,360,100 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,065,967 >>> mbox cmd response: success
14,066,826 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,345,553 UART:
18,345,933 UART: Running Caliptra FMC ...
18,347,100 UART:
18,347,259 UART: [state] CFI Enabled
18,413,543 UART: [fht] FMC Alias Private Key: 7
20,177,385 UART: [art] Extend RT PCRs Done
20,178,613 UART: [art] Lock RT PCRs Done
20,180,099 UART: [art] Populate DV Done
20,185,570 UART: [fht] FMC Alias Private Key: 7
20,187,117 UART: [art] Derive CDI
20,187,847 UART: [art] Store in in slot 0x4
20,246,483 UART: [art] Derive Key Pair
20,247,525 UART: [art] Store priv key in slot 0x5
22,710,479 UART: [art] Derive Key Pair - Done
22,723,258 UART: [art] Signing Cert with AUTHO
22,724,560 UART: RITY.KEYID = 7
24,436,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,289 UART: [art] PUB.X = E964E38CF77AD6631151C0818D7252D6833D6880FBC057CB98771913EDA52108F4E02D6AB95E1B00F3652CEE01E1226B
24,445,507 UART: [art] PUB.Y = ACF499F1F905BA3F6E079A0D206803290BF6351CE2F3D2607367AAB8AC1F25623579381541305265B7AF263B95C77322
24,452,704 UART: [art] SIG.R = 310C1505058A3DE7BF1A1E34CBF0D4E9C653C353ED0249913754FFC5F1B03A22CC4B77483579C2C4FF8C5BDCCD06A1B8
24,460,147 UART: [art] SIG.S = C79F1DEE3BE46585C62BED4DEF3DB0E11BB7744F7B233D3ACBACD7E227EBC169F3AB234D54DEC24C9F579A9A5A57491D
25,438,881 UART: Caliptra RT
25,439,587 UART: [state] CFI Enabled
25,605,650 UART: [rt] RT listening for mailbox commands...
25,637,226 UART: [rt]cmd =0x46505652, len=4
25,638,470 UART: [rt] FIPS Version
25,639,734 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,515 UART:
192,907 UART: Running Caliptra ROM ...
194,054 UART:
603,573 UART: [state] CFI Enabled
615,747 UART: [state] LifecycleState = Unprovisioned
617,555 UART: [state] DebugLocked = No
620,433 UART: [state] WD Timer not started. Device not locked for debugging
624,337 UART: [kat] SHA2-256
803,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,996 UART: [kat] ++
815,528 UART: [kat] sha1
825,436 UART: [kat] SHA2-256
828,485 UART: [kat] SHA2-384
834,559 UART: [kat] SHA2-512-ACC
837,499 UART: [kat] ECC-384
3,276,884 UART: [kat] HMAC-384Kdf
3,290,695 UART: [kat] LMS
3,820,234 UART: [kat] --
3,823,167 UART: [cold-reset] ++
3,824,626 UART: [fht] FHT @ 0x50003400
3,834,118 UART: [idev] ++
3,834,683 UART: [idev] CDI.KEYID = 6
3,835,590 UART: [idev] SUBJECT.KEYID = 7
3,836,765 UART: [idev] UDS.KEYID = 0
3,837,821 ready_for_fw is high
3,838,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,981,353 UART: [idev] Erasing UDS.KEYID = 0
6,311,376 UART: [idev] Sha1 KeyId Algorithm
6,335,528 UART: [idev] --
6,339,529 UART: [ldev] ++
6,340,296 UART: [ldev] CDI.KEYID = 6
6,341,223 UART: [ldev] SUBJECT.KEYID = 5
6,342,328 UART: [ldev] AUTHORITY.KEYID = 7
6,343,504 UART: [ldev] FE.KEYID = 1
6,354,826 UART: [ldev] Erasing FE.KEYID = 1
8,834,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,717 UART: [ldev] --
10,623,736 UART: [fwproc] Wait for Commands...
10,626,911 UART: [fwproc] Recv command 0x46574c44
10,629,008 UART: [fwproc] Recv'd Img size: 114084 bytes
14,032,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,234 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,491,060 >>> mbox cmd response: success
14,491,624 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,495,375 UART: [afmc] ++
14,495,965 UART: [afmc] CDI.KEYID = 6
14,497,052 UART: [afmc] SUBJECT.KEYID = 7
14,498,164 UART: [afmc] AUTHORITY.KEYID = 5
17,000,226 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,336 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,797,024 UART: [afmc] --
18,801,597 UART: [cold-reset] --
18,804,212 UART: [state] Locking Datavault
18,808,969 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,664 UART: [state] Locking ICCM
18,811,814 UART: [exit] Launching FMC @ 0x40000130
18,820,208 UART:
18,820,480 UART: Running Caliptra FMC ...
18,821,525 UART:
18,821,675 UART: [state] CFI Enabled
18,829,995 UART: [fht] FMC Alias Private Key: 7
20,587,129 UART: [art] Extend RT PCRs Done
20,588,349 UART: [art] Lock RT PCRs Done
20,590,048 UART: [art] Populate DV Done
20,595,354 UART: [fht] FMC Alias Private Key: 7
20,596,939 UART: [art] Derive CDI
20,597,688 UART: [art] Store in in slot 0x4
20,640,005 UART: [art] Derive Key Pair
20,641,009 UART: [art] Store priv key in slot 0x5
23,067,585 UART: [art] Derive Key Pair - Done
23,080,797 UART: [art] Signing Cert with AUTHO
23,082,105 UART: RITY.KEYID = 7
24,787,994 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,490 UART: [art] PUB.X = 62B541F93502F78B08C41E411278E9D3A81B4D48BF11B96DF094FBC27E36BB56E62F396D47BB974BBD185E3BB35833A7
24,796,792 UART: [art] PUB.Y = F388044EFA9FB23431C2B5D0A36D8D4D65147738EADA1A5B01DDC10B42B881A8C9B4C8E3441BD96D8C12D703D37FF887
24,804,030 UART: [art] SIG.R = E4341E1D4B1D7BCB6C6A319A31EB0F893BF6AD5B5E9B1D9179562A3260DCF2CFCA4EF7C72145B4770FC114427D1C471B
24,811,426 UART: [art] SIG.S = ECF837349B4B3DCC4A70BE3307BFAF03D0347CEDCA0499823CB7BDF0EF27CC4AD7FFA6231D6AD4F224B48E31C4D5AB2C
25,790,406 UART: Caliptra RT
25,791,097 UART: [state] CFI Enabled
25,908,726 UART: [rt] RT listening for mailbox commands...
25,940,108 UART: [rt]cmd =0x46505652, len=4
25,941,326 UART: [rt] FIPS Version
25,942,480 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,699,078 ready_for_fw is high
3,699,481 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,268,502 >>> mbox cmd response: success
14,269,311 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,513,408 UART:
18,513,806 UART: Running Caliptra FMC ...
18,514,956 UART:
18,515,139 UART: [state] CFI Enabled
18,522,854 UART: [fht] FMC Alias Private Key: 7
20,279,725 UART: [art] Extend RT PCRs Done
20,280,945 UART: [art] Lock RT PCRs Done
20,282,848 UART: [art] Populate DV Done
20,288,153 UART: [fht] FMC Alias Private Key: 7
20,289,645 UART: [art] Derive CDI
20,290,406 UART: [art] Store in in slot 0x4
20,332,899 UART: [art] Derive Key Pair
20,333,947 UART: [art] Store priv key in slot 0x5
22,760,682 UART: [art] Derive Key Pair - Done
22,773,469 UART: [art] Signing Cert with AUTHO
22,774,768 UART: RITY.KEYID = 7
24,480,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,101 UART: [art] PUB.X = 89CC8480F60F1608E134E002EC03C455CAEBA1AE319D5F1F31ECF890A6C4977CC19E3AEA5B615A2E7EBF0513DE1DCCEF
24,489,405 UART: [art] PUB.Y = B238E2644016CE420B372FDCC39532BBFE8C66B39C33FF9548EF7C07076E077F5F57A5E7FEF66368CF69C4387F592988
24,496,655 UART: [art] SIG.R = 1E9B6495361B4C1E562D93995BCD19F481AC06FAE260B6AC303CFBCE80EBE2259AEE0A9EFF432B16186DA138640D4F6E
24,504,059 UART: [art] SIG.S = 95D333B4BA614AE3943FCED2149D2860B31B47B49EA75A2645426373987AAFF8DEC62D138953B1EBBDA2495A85834C6D
25,483,158 UART: Caliptra RT
25,483,860 UART: [state] CFI Enabled
25,601,040 UART: [rt] RT listening for mailbox commands...
25,632,294 UART: [rt]cmd =0x46505652, len=4
25,633,541 UART: [rt] FIPS Version
25,634,856 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,096 writing to cptra_bootfsm_go
193,375 UART:
193,726 UART: Running Caliptra ROM ...
194,856 UART:
195,002 UART: [state] CFI Enabled
264,692 UART: [state] LifecycleState = Unprovisioned
266,758 UART: [state] DebugLocked = No
268,444 UART: [state] WD Timer not started. Device not locked for debugging
272,653 UART: [kat] SHA2-256
462,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,290 UART: [kat] ++
473,766 UART: [kat] sha1
483,675 UART: [kat] SHA2-256
486,726 UART: [kat] SHA2-384
494,151 UART: [kat] SHA2-512-ACC
496,745 UART: [kat] ECC-384
2,949,051 UART: [kat] HMAC-384Kdf
2,974,123 UART: [kat] LMS
3,505,879 UART: [kat] --
3,512,577 UART: [cold-reset] ++
3,514,806 UART: [fht] FHT @ 0x50003400
3,525,459 UART: [idev] ++
3,526,209 UART: [idev] CDI.KEYID = 6
3,527,132 UART: [idev] SUBJECT.KEYID = 7
3,528,332 UART: [idev] UDS.KEYID = 0
3,529,265 ready_for_fw is high
3,529,472 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,672,862 UART: [idev] Erasing UDS.KEYID = 0
6,033,709 UART: [idev] Sha1 KeyId Algorithm
6,057,183 UART: [idev] --
6,062,699 UART: [ldev] ++
6,063,391 UART: [ldev] CDI.KEYID = 6
6,064,315 UART: [ldev] SUBJECT.KEYID = 5
6,065,478 UART: [ldev] AUTHORITY.KEYID = 7
6,066,658 UART: [ldev] FE.KEYID = 1
6,094,235 UART: [ldev] Erasing FE.KEYID = 1
8,599,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,369 UART: [ldev] --
10,405,488 UART: [fwproc] Wait for Commands...
10,408,332 UART: [fwproc] Recv command 0x46574c44
10,410,669 UART: [fwproc] Recv'd Img size: 114084 bytes
13,850,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,040,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,582,070 >>> mbox cmd response: success
14,582,689 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,586,406 UART: [afmc] ++
14,587,162 UART: [afmc] CDI.KEYID = 6
14,588,267 UART: [afmc] SUBJECT.KEYID = 7
14,589,809 UART: [afmc] AUTHORITY.KEYID = 5
17,121,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,846,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,848,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,863,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,879,123 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,894,158 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,918,620 UART: [afmc] --
18,921,677 UART: [cold-reset] --
18,924,680 UART: [state] Locking Datavault
18,929,288 UART: [state] Locking PCR0, PCR1 and PCR31
18,931,430 UART: [state] Locking ICCM
18,934,394 UART: [exit] Launching FMC @ 0x40000130
18,943,067 UART:
18,943,308 UART: Running Caliptra FMC ...
18,944,411 UART:
18,944,570 UART: [state] CFI Enabled
19,003,067 UART: [fht] FMC Alias Private Key: 7
20,766,974 UART: [art] Extend RT PCRs Done
20,768,220 UART: [art] Lock RT PCRs Done
20,770,066 UART: [art] Populate DV Done
20,775,599 UART: [fht] FMC Alias Private Key: 7
20,777,299 UART: [art] Derive CDI
20,778,110 UART: [art] Store in in slot 0x4
20,836,906 UART: [art] Derive Key Pair
20,837,951 UART: [art] Store priv key in slot 0x5
23,300,867 UART: [art] Derive Key Pair - Done
23,313,431 UART: [art] Signing Cert with AUTHO
23,314,736 UART: RITY.KEYID = 7
25,026,280 UART: [art] Erasing AUTHORITY.KEYID = 7
25,027,791 UART: [art] PUB.X = 0EBB2198D90889D03C2429B493B9AD9045F44B0AB828EB5C596395AB0B91F70CF145F9D0089ECDDFFB6090F14C495D02
25,035,101 UART: [art] PUB.Y = ACDCF605F7C3F04FBF012BD22257A3A15C498EC7BF393353FB976ED22833C6EAA127B3AFF8612CEC75797082A250B8BB
25,042,540 UART: [art] SIG.R = 2F78FAE18286D214C0C1B758F38B1A31CE5C9BC85103F8688FC6FEF5BC0846DDEC1A06B17A79EA6D750FD5B425D8CE02
25,049,765 UART: [art] SIG.S = 4E07028F0B1934ADDC50B3B84A53B343243A20DF8E0F2A0337C7FF9B2D89872AB36B4B2C31F03CA76A03C7A66F3588AC
26,028,857 UART: Caliptra RT
26,029,592 UART: [state] CFI Enabled
26,194,044 UART: [rt] RT listening for mailbox commands...
26,225,516 UART: [rt]cmd =0x46505652, len=4
26,226,770 UART: [rt] FIPS Version
26,228,203 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,415,557 ready_for_fw is high
3,415,998 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,728,080 >>> mbox cmd response: success
14,728,781 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,007,002 UART:
19,007,451 UART: Running Caliptra FMC ...
19,008,589 UART:
19,008,770 UART: [state] CFI Enabled
19,072,387 UART: [fht] FMC Alias Private Key: 7
20,836,211 UART: [art] Extend RT PCRs Done
20,837,435 UART: [art] Lock RT PCRs Done
20,839,353 UART: [art] Populate DV Done
20,844,936 UART: [fht] FMC Alias Private Key: 7
20,846,640 UART: [art] Derive CDI
20,847,377 UART: [art] Store in in slot 0x4
20,905,861 UART: [art] Derive Key Pair
20,906,902 UART: [art] Store priv key in slot 0x5
23,369,718 UART: [art] Derive Key Pair - Done
23,382,983 UART: [art] Signing Cert with AUTHO
23,384,288 UART: RITY.KEYID = 7
25,094,818 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,340 UART: [art] PUB.X = 5C3A83AB3BD012A9C6A1F25E0E80D402DD5286E4DC5C71ACD384154961E8E3EB3C6A59A2F32B70AC548838203415604D
25,103,564 UART: [art] PUB.Y = 65801DD8EBA61C9C723A72799526C3A61B77A86C82AB554542072AC8301F8D52479A627CEB1949050D7DEE84BB037C0D
25,110,805 UART: [art] SIG.R = 667B46CDAC6E317D4657AC6578D1E81584B09DA70A4FD4B28277E53B8331C84DC99318F9A166773FA583E8E8DC613212
25,118,228 UART: [art] SIG.S = 8AE1104B5CC37211A02843EE65B556FD0AB706F2289BBD65D53CEC109CA4A3D7557602667CF8A29232CD8EC32DDC7506
26,097,330 UART: Caliptra RT
26,098,033 UART: [state] CFI Enabled
26,261,244 UART: [rt] RT listening for mailbox commands...
26,292,765 UART: [rt]cmd =0x46505652, len=4
26,294,040 UART: [rt] FIPS Version
26,295,369 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,437 UART:
192,825 UART: Running Caliptra ROM ...
193,929 UART:
603,722 UART: [state] CFI Enabled
615,881 UART: [state] LifecycleState = Unprovisioned
618,250 UART: [state] DebugLocked = No
619,912 UART: [state] WD Timer not started. Device not locked for debugging
623,890 UART: [kat] SHA2-256
813,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,556 UART: [kat] ++
825,078 UART: [kat] sha1
837,240 UART: [kat] SHA2-256
840,254 UART: [kat] SHA2-384
845,965 UART: [kat] SHA2-512-ACC
848,552 UART: [kat] ECC-384
3,289,885 UART: [kat] HMAC-384Kdf
3,302,835 UART: [kat] LMS
3,834,661 UART: [kat] --
3,838,761 UART: [cold-reset] ++
3,839,923 UART: [fht] FHT @ 0x50003400
3,850,835 UART: [idev] ++
3,851,547 UART: [idev] CDI.KEYID = 6
3,852,473 UART: [idev] SUBJECT.KEYID = 7
3,853,655 UART: [idev] UDS.KEYID = 0
3,854,584 ready_for_fw is high
3,854,803 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,998,166 UART: [idev] Erasing UDS.KEYID = 0
6,331,661 UART: [idev] Sha1 KeyId Algorithm
6,353,694 UART: [idev] --
6,359,875 UART: [ldev] ++
6,360,560 UART: [ldev] CDI.KEYID = 6
6,361,439 UART: [ldev] SUBJECT.KEYID = 5
6,362,652 UART: [ldev] AUTHORITY.KEYID = 7
6,363,908 UART: [ldev] FE.KEYID = 1
6,373,829 UART: [ldev] Erasing FE.KEYID = 1
8,848,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,731 UART: [ldev] --
10,638,427 UART: [fwproc] Wait for Commands...
10,640,522 UART: [fwproc] Recv command 0x46574c44
10,642,780 UART: [fwproc] Recv'd Img size: 114084 bytes
14,081,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,276,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,816,887 >>> mbox cmd response: success
14,817,440 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,820,836 UART: [afmc] ++
14,821,538 UART: [afmc] CDI.KEYID = 6
14,822,726 UART: [afmc] SUBJECT.KEYID = 7
14,824,211 UART: [afmc] AUTHORITY.KEYID = 5
17,324,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,045,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,047,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,062,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,077,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,092,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,116,521 UART: [afmc] --
19,120,539 UART: [cold-reset] --
19,123,272 UART: [state] Locking Datavault
19,127,491 UART: [state] Locking PCR0, PCR1 and PCR31
19,129,620 UART: [state] Locking ICCM
19,131,224 UART: [exit] Launching FMC @ 0x40000130
19,139,857 UART:
19,140,134 UART: Running Caliptra FMC ...
19,141,243 UART:
19,141,404 UART: [state] CFI Enabled
19,149,452 UART: [fht] FMC Alias Private Key: 7
20,907,164 UART: [art] Extend RT PCRs Done
20,908,373 UART: [art] Lock RT PCRs Done
20,909,752 UART: [art] Populate DV Done
20,915,322 UART: [fht] FMC Alias Private Key: 7
20,916,966 UART: [art] Derive CDI
20,917,703 UART: [art] Store in in slot 0x4
20,960,672 UART: [art] Derive Key Pair
20,961,669 UART: [art] Store priv key in slot 0x5
23,388,489 UART: [art] Derive Key Pair - Done
23,401,812 UART: [art] Signing Cert with AUTHO
23,403,125 UART: RITY.KEYID = 7
25,108,845 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,335 UART: [art] PUB.X = 9B57B3A03DC6CE142C0DDECDDF8531E334B4B7B2722DC3814779513EE0A6F4E14FC8C76E36466B456B7635D5FC0C1BD1
25,117,659 UART: [art] PUB.Y = 34F566ADA6DA49F973C5B0F908CD5BB7CA2FE2B6F044FCE3507FBCADEC5D0E69D2FEA0573E8C5E18FB90F82F434695B9
25,124,921 UART: [art] SIG.R = E4F674FD1AD4AA07E562CFE05C53B50BF91E7DB76C464CF000BA5158E1B2F7EBF618165142E8BF6E5CAA47AE3BAFB9C8
25,132,345 UART: [art] SIG.S = 05121AC707AADD2514322EF6A2D7D2EF13528D65534E6926B16F7291DB78BA1C483372EAE6EA9BAEB67E69665A8901C6
26,111,852 UART: Caliptra RT
26,112,547 UART: [state] CFI Enabled
26,230,246 UART: [rt] RT listening for mailbox commands...
26,261,698 UART: [rt]cmd =0x46505652, len=4
26,263,023 UART: [rt] FIPS Version
26,264,297 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,756,412 ready_for_fw is high
3,757,073 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,949,199 >>> mbox cmd response: success
14,949,859 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,198,695 UART:
19,199,146 UART: Running Caliptra FMC ...
19,200,292 UART:
19,200,459 UART: [state] CFI Enabled
19,208,552 UART: [fht] FMC Alias Private Key: 7
20,964,849 UART: [art] Extend RT PCRs Done
20,966,084 UART: [art] Lock RT PCRs Done
20,967,989 UART: [art] Populate DV Done
20,973,196 UART: [fht] FMC Alias Private Key: 7
20,974,633 UART: [art] Derive CDI
20,975,373 UART: [art] Store in in slot 0x4
21,018,076 UART: [art] Derive Key Pair
21,019,123 UART: [art] Store priv key in slot 0x5
23,446,209 UART: [art] Derive Key Pair - Done
23,459,104 UART: [art] Signing Cert with AUTHO
23,460,407 UART: RITY.KEYID = 7
25,166,488 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,017 UART: [art] PUB.X = 52CC607143D8132B73FE490ACCC0971EE2259C3C4B9B96226CB218FD053C99EDD518789E9663C7A5C95491399FA65CBC
25,175,221 UART: [art] PUB.Y = FFC9471E5CBE2D74AD6B9179F8060E87CE886ACA799386C653D20B0799E1068EBA5065E5A82702471182AE09A15C9F17
25,182,496 UART: [art] SIG.R = CE9E4BC70499091C0B4B76C1656834CF7CB2852AB0998AAB2792AFD851D27EBCB48881E7E04C001E725CC7B66DE591F2
25,189,838 UART: [art] SIG.S = E5DE858A8BE94C5CF8648CE28EDEE752E6799993243D163731B281B8359BB53B555C35179ECF2153A2F826AB7C8401DB
26,168,529 UART: Caliptra RT
26,169,217 UART: [state] CFI Enabled
26,285,429 UART: [rt] RT listening for mailbox commands...
26,317,171 UART: [rt]cmd =0x46505652, len=4
26,318,420 UART: [rt] FIPS Version
26,319,741 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,958 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,539 UART: [cold-reset] ++
1,477,059 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 ready_for_fw is high
1,480,947 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,286 UART: [idev] Erasing UDS.KEYID = 0
1,504,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,194 UART: [idev] --
1,514,211 UART: [ldev] ++
1,514,379 UART: [ldev] CDI.KEYID = 6
1,514,742 UART: [ldev] SUBJECT.KEYID = 5
1,515,168 UART: [ldev] AUTHORITY.KEYID = 7
1,515,631 UART: [ldev] FE.KEYID = 1
1,521,047 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,030 UART: [ldev] --
1,585,507 UART: [fwproc] Waiting for Commands...
1,586,258 UART: [fwproc] Received command 0x46574c44
1,587,049 UART: [fwproc] Received Image of size 114084 bytes
2,881,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,514 >>> mbox cmd response: success
3,074,514 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,075,638 UART: [afmc] ++
3,075,806 UART: [afmc] CDI.KEYID = 6
3,076,168 UART: [afmc] SUBJECT.KEYID = 7
3,076,593 UART: [afmc] AUTHORITY.KEYID = 5
3,112,262 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,476 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,089 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,779 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,466 UART: [afmc] --
3,155,450 UART: [cold-reset] --
3,156,182 UART: [state] Locking Datavault
3,157,415 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,019 UART: [state] Locking ICCM
3,158,613 UART: [exit] Launching FMC @ 0x40000130
3,163,942 UART:
3,163,958 UART: Running Caliptra FMC ...
3,164,366 UART:
3,164,420 UART: [state] CFI Enabled
3,174,715 UART: [fht] FMC Alias Private Key: 7
3,282,440 UART: [art] Extend RT PCRs Done
3,282,868 UART: [art] Lock RT PCRs Done
3,284,502 UART: [art] Populate DV Done
3,292,947 UART: [fht] FMC Alias Private Key: 7
3,294,031 UART: [art] Derive CDI
3,294,311 UART: [art] Store in in slot 0x4
3,379,730 UART: [art] Derive Key Pair
3,380,090 UART: [art] Store priv key in slot 0x5
3,393,104 UART: [art] Derive Key Pair - Done
3,407,459 UART: [art] Signing Cert with AUTHO
3,407,939 UART: RITY.KEYID = 7
3,422,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,452 UART: [art] PUB.X = 6103A1B1D1AACDE5C6F53734CA0EC6D23B2DE5B1AC29B43D2C7FD12E3B64A7D83F2F8B62306C1CD1F60B601A3371CD96
3,430,233 UART: [art] PUB.Y = CD1D8FA54F2D4FEB205CB8B159A54A7E4D0A67EDBE24D3F1837B1E85BA58EE4CFC5294767CCD20B6D4D7F91CE9D33C36
3,437,206 UART: [art] SIG.R = BC43F8469F6C151206FAF579BA047FA3A009998C438AA297563A128D035DE84E271DCE31665738C7B35A9A35D31BAE6C
3,443,968 UART: [art] SIG.S = A798E0472197F0EBBE504E91796DAA416B4D43F7FB69DEF63E4A9D4DA31D95402F799BBE7E6A6825648814DA2002D638
3,467,644 UART: Caliptra RT
3,467,897 UART: [state] CFI Enabled
3,576,391 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,065 UART: [rt]cmd =0x46505652, len=4
3,607,725 UART: [rt] FIPS Version
3,608,758 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 ready_for_fw is high
1,362,623 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,942 >>> mbox cmd response: success
2,924,942 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,987,836 UART:
2,987,852 UART: Running Caliptra FMC ...
2,988,260 UART:
2,988,314 UART: [state] CFI Enabled
2,998,635 UART: [fht] FMC Alias Private Key: 7
3,106,852 UART: [art] Extend RT PCRs Done
3,107,280 UART: [art] Lock RT PCRs Done
3,108,712 UART: [art] Populate DV Done
3,116,617 UART: [fht] FMC Alias Private Key: 7
3,117,737 UART: [art] Derive CDI
3,118,017 UART: [art] Store in in slot 0x4
3,204,048 UART: [art] Derive Key Pair
3,204,408 UART: [art] Store priv key in slot 0x5
3,217,444 UART: [art] Derive Key Pair - Done
3,232,075 UART: [art] Signing Cert with AUTHO
3,232,555 UART: RITY.KEYID = 7
3,248,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,866 UART: [art] PUB.X = 8C451FE5E80F888809C5632D897C1716E9EAAE12929D6925FE947C773CDE9EF40A73446C59243E26F2CF51BC9A8D3DCA
3,255,635 UART: [art] PUB.Y = 437A663A16C857E301EB241A57F9B7E9D45FC85C0A7123C5F9279A87ECA21ECDE23B64692FC54D94C47045FE4B916541
3,262,583 UART: [art] SIG.R = E76BBC14A1B064E810097721FE7E219A3F20F6B8457E144C627FF0ABC9E3E7F2F04E8E87FEDFB3329B6D9DF3A03E5775
3,269,364 UART: [art] SIG.S = 0A86DD224BBB13AB389F2279A2E887A07400F68E12A63273235D86E2B8F67EFFFA0CB9AB834C64034768AC514023A133
3,293,000 UART: Caliptra RT
3,293,253 UART: [state] CFI Enabled
3,401,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,520 UART: [rt]cmd =0x46505652, len=4
3,432,180 UART: [rt] FIPS Version
3,433,265 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,834 UART: [kat] SHA2-256
882,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,880 UART: [kat] ++
887,032 UART: [kat] sha1
891,104 UART: [kat] SHA2-256
893,042 UART: [kat] SHA2-384
895,911 UART: [kat] SHA2-512-ACC
897,812 UART: [kat] ECC-384
903,751 UART: [kat] HMAC-384Kdf
908,241 UART: [kat] LMS
1,476,437 UART: [kat] --
1,477,488 UART: [cold-reset] ++
1,477,982 UART: [fht] Storing FHT @ 0x50003400
1,480,893 UART: [idev] ++
1,481,061 UART: [idev] CDI.KEYID = 6
1,481,421 UART: [idev] SUBJECT.KEYID = 7
1,481,845 UART: [idev] UDS.KEYID = 0
1,482,190 ready_for_fw is high
1,482,190 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,489,875 UART: [idev] Erasing UDS.KEYID = 0
1,506,303 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,971 UART: [idev] --
1,515,968 UART: [ldev] ++
1,516,136 UART: [ldev] CDI.KEYID = 6
1,516,499 UART: [ldev] SUBJECT.KEYID = 5
1,516,925 UART: [ldev] AUTHORITY.KEYID = 7
1,517,388 UART: [ldev] FE.KEYID = 1
1,522,700 UART: [ldev] Erasing FE.KEYID = 1
1,547,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,941 UART: [ldev] --
1,587,312 UART: [fwproc] Waiting for Commands...
1,588,013 UART: [fwproc] Received command 0x46574c44
1,588,804 UART: [fwproc] Received Image of size 114084 bytes
2,883,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,651 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,148 >>> mbox cmd response: success
3,076,148 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,214 UART: [afmc] ++
3,077,382 UART: [afmc] CDI.KEYID = 6
3,077,744 UART: [afmc] SUBJECT.KEYID = 7
3,078,169 UART: [afmc] AUTHORITY.KEYID = 5
3,113,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,984 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,492 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,377 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,067 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,972 UART: [afmc] --
3,156,914 UART: [cold-reset] --
3,157,926 UART: [state] Locking Datavault
3,159,059 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,663 UART: [state] Locking ICCM
3,160,325 UART: [exit] Launching FMC @ 0x40000130
3,165,654 UART:
3,165,670 UART: Running Caliptra FMC ...
3,166,078 UART:
3,166,221 UART: [state] CFI Enabled
3,176,986 UART: [fht] FMC Alias Private Key: 7
3,285,173 UART: [art] Extend RT PCRs Done
3,285,601 UART: [art] Lock RT PCRs Done
3,286,777 UART: [art] Populate DV Done
3,295,016 UART: [fht] FMC Alias Private Key: 7
3,296,156 UART: [art] Derive CDI
3,296,436 UART: [art] Store in in slot 0x4
3,382,391 UART: [art] Derive Key Pair
3,382,751 UART: [art] Store priv key in slot 0x5
3,395,783 UART: [art] Derive Key Pair - Done
3,410,487 UART: [art] Signing Cert with AUTHO
3,410,967 UART: RITY.KEYID = 7
3,425,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,454 UART: [art] PUB.X = 8DB3E3704B23AD1E05E5FA7DD92A1CCA57987A292ED0BA54F957B0160C869FFE8121A95C00100B59CB84C03669CABD13
3,433,205 UART: [art] PUB.Y = C52C12AB92CA07BE11DB7E76B3A979986209064EAC466D1700BEDEB4F3BEE3189AC392784D34909B28ED82BDA75297DC
3,440,136 UART: [art] SIG.R = CF2537D0534A1C6B50D238F1C8F7A2A714BFD82B385401CCCC3348892BBD0CBD8B947B11AF90ADE9846DA2517C327EEB
3,446,916 UART: [art] SIG.S = 82C24CC15C684233D4C6E83CE64D0476910C5F1D68480507132AB6C01CFA2CC85E5E9642D294CF89B984278651DE7380
3,470,229 UART: Caliptra RT
3,470,574 UART: [state] CFI Enabled
3,578,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,236 UART: [rt]cmd =0x46505652, len=4
3,609,896 UART: [rt] FIPS Version
3,610,925 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 ready_for_fw is high
1,362,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,397 >>> mbox cmd response: success
2,923,397 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,984,347 UART:
2,984,363 UART: Running Caliptra FMC ...
2,984,771 UART:
2,984,914 UART: [state] CFI Enabled
2,995,991 UART: [fht] FMC Alias Private Key: 7
3,104,394 UART: [art] Extend RT PCRs Done
3,104,822 UART: [art] Lock RT PCRs Done
3,106,154 UART: [art] Populate DV Done
3,114,343 UART: [fht] FMC Alias Private Key: 7
3,115,453 UART: [art] Derive CDI
3,115,733 UART: [art] Store in in slot 0x4
3,201,528 UART: [art] Derive Key Pair
3,201,888 UART: [art] Store priv key in slot 0x5
3,215,198 UART: [art] Derive Key Pair - Done
3,230,170 UART: [art] Signing Cert with AUTHO
3,230,650 UART: RITY.KEYID = 7
3,246,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,765 UART: [art] PUB.X = 5774303EC6724D7A58B13485F0279C45E15A96E9AF0CA639DA8CD2EFC90C9234426BC7AD1D9BB2B01B2ACE91C78E6724
3,253,539 UART: [art] PUB.Y = EE4E44F6A14474D9A24F81B5043A9AC4C51D2B5F4E8DAA395037459365F292439DF4C0BD476C584136D51F218B8B22CB
3,260,490 UART: [art] SIG.R = F7F6FF222E1B6C3AA3B6D7A08D81422A0BED9A12166F559EAAED0AF6E18767A0FBC5D6756E9C6F4FFE0D344976A9FDF9
3,267,275 UART: [art] SIG.S = 643350EAF090477EE1440BA86F5FEA05FD39B4F2275D35E3AD27BD3DE7E9A9E9563E25C9B591C2D4B25910B792145908
3,290,517 UART: Caliptra RT
3,290,862 UART: [state] CFI Enabled
3,400,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,517 UART: [rt]cmd =0x46505652, len=4
3,431,177 UART: [rt] FIPS Version
3,432,338 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,440 UART: [kat] HMAC-384Kdf
923,156 UART: [kat] LMS
1,171,484 UART: [kat] --
1,172,249 UART: [cold-reset] ++
1,172,711 UART: [fht] FHT @ 0x50003400
1,175,334 UART: [idev] ++
1,175,502 UART: [idev] CDI.KEYID = 6
1,175,862 UART: [idev] SUBJECT.KEYID = 7
1,176,286 UART: [idev] UDS.KEYID = 0
1,176,631 ready_for_fw is high
1,176,631 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,154 UART: [idev] Erasing UDS.KEYID = 0
1,201,505 UART: [idev] Sha1 KeyId Algorithm
1,210,063 UART: [idev] --
1,211,091 UART: [ldev] ++
1,211,259 UART: [ldev] CDI.KEYID = 6
1,211,622 UART: [ldev] SUBJECT.KEYID = 5
1,212,048 UART: [ldev] AUTHORITY.KEYID = 7
1,212,511 UART: [ldev] FE.KEYID = 1
1,217,693 UART: [ldev] Erasing FE.KEYID = 1
1,244,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,737 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,752 UART: [fwproc] Recv command 0x46574c44
1,284,480 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,320 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,727 >>> mbox cmd response: success
2,771,727 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,943 UART: [afmc] ++
2,773,111 UART: [afmc] CDI.KEYID = 6
2,773,473 UART: [afmc] SUBJECT.KEYID = 7
2,773,898 UART: [afmc] AUTHORITY.KEYID = 5
2,809,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,954 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,674 UART: [afmc] --
2,852,796 UART: [cold-reset] --
2,853,778 UART: [state] Locking Datavault
2,854,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,467 UART: [state] Locking ICCM
2,855,933 UART: [exit] Launching FMC @ 0x40000130
2,861,262 UART:
2,861,278 UART: Running Caliptra FMC ...
2,861,686 UART:
2,861,740 UART: [state] CFI Enabled
2,872,113 UART: [fht] FMC Alias Private Key: 7
2,980,246 UART: [art] Extend RT PCRs Done
2,980,674 UART: [art] Lock RT PCRs Done
2,982,492 UART: [art] Populate DV Done
2,990,637 UART: [fht] FMC Alias Private Key: 7
2,991,651 UART: [art] Derive CDI
2,991,931 UART: [art] Store in in slot 0x4
3,077,316 UART: [art] Derive Key Pair
3,077,676 UART: [art] Store priv key in slot 0x5
3,090,674 UART: [art] Derive Key Pair - Done
3,105,507 UART: [art] Signing Cert with AUTHO
3,105,987 UART: RITY.KEYID = 7
3,121,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,898 UART: [art] PUB.X = C2C044BB10D6C1D2402F2B451476625C76B5EC79874E476F09BE154E6DF711FCC5D50DFAACABE7495784CD9FBF4A4766
3,128,676 UART: [art] PUB.Y = DE32747B1318D33CB31B13A88F5D5BEC3B8C500812F6DDEECA2723C2CEBD26FA2BE3C1F408FB51F38FEC057FF88EE28F
3,135,643 UART: [art] SIG.R = AD2BAF56451F0956D84CA0156C0BCF6E3A55EBF5574CA6F3B133144A948C99E189D0D410109FDAA4D768E1BE12B9C9F9
3,142,421 UART: [art] SIG.S = 31EAA340DBA2F39F6D5BEF34DC6D1FC30271457045CE3649F0734BCD10705AE85D05081131E2BC9B72A26EB31DC9FC1C
3,166,333 UART: Caliptra RT
3,166,586 UART: [state] CFI Enabled
3,273,971 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,419 UART: [rt]cmd =0x46505652, len=4
3,305,079 UART: [rt] FIPS Version
3,305,980 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,343 ready_for_fw is high
1,060,343 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,150 >>> mbox cmd response: success
2,624,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,384 UART:
2,686,400 UART: Running Caliptra FMC ...
2,686,808 UART:
2,686,862 UART: [state] CFI Enabled
2,697,237 UART: [fht] FMC Alias Private Key: 7
2,805,242 UART: [art] Extend RT PCRs Done
2,805,670 UART: [art] Lock RT PCRs Done
2,807,154 UART: [art] Populate DV Done
2,815,363 UART: [fht] FMC Alias Private Key: 7
2,816,295 UART: [art] Derive CDI
2,816,575 UART: [art] Store in in slot 0x4
2,901,848 UART: [art] Derive Key Pair
2,902,208 UART: [art] Store priv key in slot 0x5
2,915,612 UART: [art] Derive Key Pair - Done
2,930,319 UART: [art] Signing Cert with AUTHO
2,930,799 UART: RITY.KEYID = 7
2,945,543 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,308 UART: [art] PUB.X = 0138F98048B02C5786F0667645926167DC7011D2C7DFB5DB8E65272401A7110E2E9FD268632BFDBB1B3E274ED4B52CA9
2,953,069 UART: [art] PUB.Y = 113FB21D8E5DA48FE7784A83349026B3A257E0A73B4637811F41D3761DA09FBB73B53EC0AA753E127FE5C95A4BABA3F1
2,960,029 UART: [art] SIG.R = 8DBEAB27E1EFDA5D1314FB9945D5A7C4990FEDEFB291300279BE15786AB1DD4F25827FDFD117ECF226F06F5428FC28D7
2,966,813 UART: [art] SIG.S = F8F8257B49721E4FA97A4531B2A9BE5698775D7C426548F83D9D29DC585CBD17C9A2C2E67A8B53537F29BFDC99A9675F
2,990,558 UART: Caliptra RT
2,990,811 UART: [state] CFI Enabled
3,098,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,627 UART: [rt]cmd =0x46505652, len=4
3,129,287 UART: [rt] FIPS Version
3,130,374 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
907,171 UART: [kat] SHA2-512-ACC
909,072 UART: [kat] ECC-384
918,809 UART: [kat] HMAC-384Kdf
923,591 UART: [kat] LMS
1,171,919 UART: [kat] --
1,172,918 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,175,995 UART: [idev] ++
1,176,163 UART: [idev] CDI.KEYID = 6
1,176,523 UART: [idev] SUBJECT.KEYID = 7
1,176,947 UART: [idev] UDS.KEYID = 0
1,177,292 ready_for_fw is high
1,177,292 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,797 UART: [idev] Erasing UDS.KEYID = 0
1,201,870 UART: [idev] Sha1 KeyId Algorithm
1,210,424 UART: [idev] --
1,211,492 UART: [ldev] ++
1,211,660 UART: [ldev] CDI.KEYID = 6
1,212,023 UART: [ldev] SUBJECT.KEYID = 5
1,212,449 UART: [ldev] AUTHORITY.KEYID = 7
1,212,912 UART: [ldev] FE.KEYID = 1
1,218,404 UART: [ldev] Erasing FE.KEYID = 1
1,245,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,110 UART: [ldev] --
1,284,481 UART: [fwproc] Wait for Commands...
1,285,261 UART: [fwproc] Recv command 0x46574c44
1,285,989 UART: [fwproc] Recv'd Img size: 114084 bytes
2,581,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,655 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,774,108 >>> mbox cmd response: success
2,774,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,342 UART: [afmc] ++
2,775,510 UART: [afmc] CDI.KEYID = 6
2,775,872 UART: [afmc] SUBJECT.KEYID = 7
2,776,297 UART: [afmc] AUTHORITY.KEYID = 5
2,811,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,187 UART: [afmc] --
2,855,245 UART: [cold-reset] --
2,856,231 UART: [state] Locking Datavault
2,857,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,896 UART: [state] Locking ICCM
2,858,490 UART: [exit] Launching FMC @ 0x40000130
2,863,819 UART:
2,863,835 UART: Running Caliptra FMC ...
2,864,243 UART:
2,864,386 UART: [state] CFI Enabled
2,874,973 UART: [fht] FMC Alias Private Key: 7
2,983,212 UART: [art] Extend RT PCRs Done
2,983,640 UART: [art] Lock RT PCRs Done
2,985,292 UART: [art] Populate DV Done
2,993,541 UART: [fht] FMC Alias Private Key: 7
2,994,651 UART: [art] Derive CDI
2,994,931 UART: [art] Store in in slot 0x4
3,080,544 UART: [art] Derive Key Pair
3,080,904 UART: [art] Store priv key in slot 0x5
3,094,424 UART: [art] Derive Key Pair - Done
3,109,306 UART: [art] Signing Cert with AUTHO
3,109,786 UART: RITY.KEYID = 7
3,125,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,131 UART: [art] PUB.X = 7F29A851A051FAD91BD607873D81AE78CEADE4E6CA36412A6CBAACF692C00B490085E51A9C1F7CDD6CE7C7FD5A7C5685
3,132,895 UART: [art] PUB.Y = 97588A4327FA2DC020258065DB14EBC12697E1C5DFEABEC7F8FA3540865124F190E2AFBF166FD9DAB851FF4985D23FBE
3,139,861 UART: [art] SIG.R = 4BC44A838D9EDCB41A1502A5A8ADD4698C96FCCEB9E67AE824B47A01665C58669847FBD7C168D722BAFF849CD5783BF6
3,146,641 UART: [art] SIG.S = B07E365E73E08656174032E31B67D2261B0DF8BC5FA610618B92364292FFB8865D123DDA128864E88F510069B9E7210A
3,170,060 UART: Caliptra RT
3,170,405 UART: [state] CFI Enabled
3,277,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,284 UART: [rt]cmd =0x46505652, len=4
3,308,944 UART: [rt] FIPS Version
3,309,897 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 ready_for_fw is high
1,060,836 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,851 >>> mbox cmd response: success
2,622,851 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,247 UART:
2,685,263 UART: Running Caliptra FMC ...
2,685,671 UART:
2,685,814 UART: [state] CFI Enabled
2,696,437 UART: [fht] FMC Alias Private Key: 7
2,804,222 UART: [art] Extend RT PCRs Done
2,804,650 UART: [art] Lock RT PCRs Done
2,805,872 UART: [art] Populate DV Done
2,814,045 UART: [fht] FMC Alias Private Key: 7
2,815,213 UART: [art] Derive CDI
2,815,493 UART: [art] Store in in slot 0x4
2,901,430 UART: [art] Derive Key Pair
2,901,790 UART: [art] Store priv key in slot 0x5
2,915,164 UART: [art] Derive Key Pair - Done
2,929,870 UART: [art] Signing Cert with AUTHO
2,930,350 UART: RITY.KEYID = 7
2,945,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,653 UART: [art] PUB.X = BD5E77E360079F8A5A4E2BEA9F5F7893E2B588E23C41F897B602EAED97E844C22068F8C7628D22876D4B0E76B998C279
2,953,418 UART: [art] PUB.Y = 0356121BC39472336B193661261D9A3FB418FD82B1C30F2AEEE365A17BDACAEAC51CCA4705545E7B4F3493A54278477D
2,960,363 UART: [art] SIG.R = 6972DDE11FD25817DF49FD8FC4C9F3F4AF81040C78230D727AD719E81A6773B832DB2426CA32E03EBD74530D6321EE3E
2,967,129 UART: [art] SIG.S = 81241F0DB9AA124036EFD51CFD58A93E3116FCEF36288806D26E7BCF1FB4E10AA5313FAAFE74475EAC614009D1FDA3F7
2,991,172 UART: Caliptra RT
2,991,517 UART: [state] CFI Enabled
3,100,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,652 UART: [rt]cmd =0x46505652, len=4
3,131,312 UART: [rt] FIPS Version
3,132,447 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,785 UART: [kat] SHA2-256
901,725 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,885 UART: [idev] ++
1,173,053 UART: [idev] CDI.KEYID = 6
1,173,414 UART: [idev] SUBJECT.KEYID = 7
1,173,839 UART: [idev] UDS.KEYID = 0
1,174,185 ready_for_fw is high
1,174,185 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,599 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,470 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,232 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,379 UART: [fwproc] Recv command 0x46574c44
1,283,112 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,039 >>> mbox cmd response: success
2,770,039 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,170 UART: [afmc] ++
2,771,338 UART: [afmc] CDI.KEYID = 6
2,771,701 UART: [afmc] SUBJECT.KEYID = 7
2,772,127 UART: [afmc] AUTHORITY.KEYID = 5
2,807,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,761 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,490 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,092 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,983 UART: [afmc] --
2,851,021 UART: [cold-reset] --
2,852,069 UART: [state] Locking Datavault
2,853,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,998 UART: [state] Locking ICCM
2,854,628 UART: [exit] Launching FMC @ 0x40000130
2,859,957 UART:
2,859,973 UART: Running Caliptra FMC ...
2,860,381 UART:
2,860,435 UART: [state] CFI Enabled
2,870,938 UART: [fht] FMC Alias Private Key: 7
2,979,043 UART: [art] Extend RT PCRs Done
2,979,471 UART: [art] Lock RT PCRs Done
2,981,035 UART: [art] Populate DV Done
2,989,264 UART: [fht] FMC Alias Private Key: 7
2,990,250 UART: [art] Derive CDI
2,990,530 UART: [art] Store in in slot 0x4
3,076,175 UART: [art] Derive Key Pair
3,076,535 UART: [art] Store priv key in slot 0x5
3,089,489 UART: [art] Derive Key Pair - Done
3,104,149 UART: [art] Signing Cert with AUTHO
3,104,629 UART: RITY.KEYID = 7
3,119,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,314 UART: [art] PUB.X = 788A760FF591BF701BEC9FB98B8E616751D5D8D4C441C0FDFAECFB52A9B85C9FC2D54809E638728C2781C815AC11B004
3,127,087 UART: [art] PUB.Y = 7200DE7D501183D3BD7670145436B784EE2A2FC68AE89292D346EA6857EBED12939FC059946C87354677390474E6FC0D
3,134,003 UART: [art] SIG.R = D065683F5A7F4C324DA190332C6467DD75259A295BE8B1F6447E926383EFCA2D8D4834847DFB2F6E980F21A68542DC4F
3,140,772 UART: [art] SIG.S = C1C6463369B3BF9693A9C85A9CFD1AD9781A74E67B3E6AB46C6301C49F1ADD442D47465C4E4ABEE56BAFFCD34F251E96
3,164,952 UART: Caliptra RT
3,165,205 UART: [state] CFI Enabled
3,272,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,915 UART: [rt]cmd =0x46505652, len=4
3,303,575 UART: [rt] FIPS Version
3,304,672 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,400 ready_for_fw is high
1,055,400 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,953 >>> mbox cmd response: success
2,617,953 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,679,909 UART:
2,679,925 UART: Running Caliptra FMC ...
2,680,333 UART:
2,680,387 UART: [state] CFI Enabled
2,691,208 UART: [fht] FMC Alias Private Key: 7
2,798,951 UART: [art] Extend RT PCRs Done
2,799,379 UART: [art] Lock RT PCRs Done
2,801,029 UART: [art] Populate DV Done
2,809,122 UART: [fht] FMC Alias Private Key: 7
2,810,250 UART: [art] Derive CDI
2,810,530 UART: [art] Store in in slot 0x4
2,895,767 UART: [art] Derive Key Pair
2,896,127 UART: [art] Store priv key in slot 0x5
2,909,391 UART: [art] Derive Key Pair - Done
2,923,894 UART: [art] Signing Cert with AUTHO
2,924,374 UART: RITY.KEYID = 7
2,939,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,477 UART: [art] PUB.X = 8D222DC67F7D53138985A4764600B87E861D5E2ADDE0776A7D4BE062F0C3DB6ADF85468A8CD17E4C1BCF371DFFC4EA12
2,947,241 UART: [art] PUB.Y = 80C1CC5D337D35371B92712C258CD922D838F35F4A6F3D1A2FBC4EC2E740848C9BB5C62BED911257D88B2EE71D802B84
2,954,199 UART: [art] SIG.R = 6B4FDB9B76C7FF742D4ED8580A5F10AE218E5A2CC036D56FC151A0D017EE0FEE583C108F92ADEE52FBCFC99B05724D5C
2,960,984 UART: [art] SIG.S = 0009470A73A3D9847C35B38508D340C821007D0E86D22B7FFC9766394E750D12AB382E4EDABF50FE0A00C89337F1EF6B
2,985,373 UART: Caliptra RT
2,985,626 UART: [state] CFI Enabled
3,092,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,038 UART: [rt]cmd =0x46505652, len=4
3,123,698 UART: [rt] FIPS Version
3,124,863 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,372 UART: [kat] ++
895,524 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,756 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 ready_for_fw is high
1,174,290 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,690 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,199 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,963 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,638 >>> mbox cmd response: success
2,769,638 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,770,685 UART: [afmc] ++
2,770,853 UART: [afmc] CDI.KEYID = 6
2,771,216 UART: [afmc] SUBJECT.KEYID = 7
2,771,642 UART: [afmc] AUTHORITY.KEYID = 5
2,807,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,342 UART: [afmc] --
2,851,464 UART: [cold-reset] --
2,852,346 UART: [state] Locking Datavault
2,853,411 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,015 UART: [state] Locking ICCM
2,854,449 UART: [exit] Launching FMC @ 0x40000130
2,859,778 UART:
2,859,794 UART: Running Caliptra FMC ...
2,860,202 UART:
2,860,345 UART: [state] CFI Enabled
2,870,874 UART: [fht] FMC Alias Private Key: 7
2,979,881 UART: [art] Extend RT PCRs Done
2,980,309 UART: [art] Lock RT PCRs Done
2,981,839 UART: [art] Populate DV Done
2,990,170 UART: [fht] FMC Alias Private Key: 7
2,991,124 UART: [art] Derive CDI
2,991,404 UART: [art] Store in in slot 0x4
3,077,153 UART: [art] Derive Key Pair
3,077,513 UART: [art] Store priv key in slot 0x5
3,090,829 UART: [art] Derive Key Pair - Done
3,105,511 UART: [art] Signing Cert with AUTHO
3,105,991 UART: RITY.KEYID = 7
3,121,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,088 UART: [art] PUB.X = 0F5230A0CE03195521A6177033CE2385B741FD6724E21E67496E6603085ED558D2D3D608CB8E43A65DAE7645573C2783
3,128,833 UART: [art] PUB.Y = 2FF75A6683D7748F0D95031026BAABBEDC8247D3CD1F6310D5671B530803F22C50BD387A0AF95BBE023E7B831C042BED
3,135,772 UART: [art] SIG.R = 315F81567C894DFB0A078BD08CD0F13FCB059606AD1F7CF536E75687FAB26318829B8DC44E0415146BACC08802C7D058
3,142,528 UART: [art] SIG.S = A187DBB872C3DAF72741ADF1A69314D058B9EB936F26F3E4DD6EF1C09F790234AEDC154FAAEA5D50AB4669CD8D885B21
3,166,178 UART: Caliptra RT
3,166,523 UART: [state] CFI Enabled
3,274,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,860 UART: [rt]cmd =0x46505652, len=4
3,305,520 UART: [rt] FIPS Version
3,306,711 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,417 ready_for_fw is high
1,055,417 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,174 >>> mbox cmd response: success
2,619,174 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,050 UART:
2,682,066 UART: Running Caliptra FMC ...
2,682,474 UART:
2,682,617 UART: [state] CFI Enabled
2,693,112 UART: [fht] FMC Alias Private Key: 7
2,800,631 UART: [art] Extend RT PCRs Done
2,801,059 UART: [art] Lock RT PCRs Done
2,802,283 UART: [art] Populate DV Done
2,810,550 UART: [fht] FMC Alias Private Key: 7
2,811,718 UART: [art] Derive CDI
2,811,998 UART: [art] Store in in slot 0x4
2,897,673 UART: [art] Derive Key Pair
2,898,033 UART: [art] Store priv key in slot 0x5
2,911,151 UART: [art] Derive Key Pair - Done
2,925,933 UART: [art] Signing Cert with AUTHO
2,926,413 UART: RITY.KEYID = 7
2,941,903 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,668 UART: [art] PUB.X = ADD308C1E67FED62D6E575C87CA93C6DB83A1BAD0176ED935FF6E3D05424110BC08AFDEFD4315C12C580A41D32D3E571
2,949,447 UART: [art] PUB.Y = 9640DFBC7B0ACCAEE90BB3A4561593D08100F6A3B7C919271DC6E3B89C17496F5A8968D1A8D2B3AB565BA0FE524699AA
2,956,383 UART: [art] SIG.R = A9E99199DA8608164F9802C840198444AF9C98CC58A349052271C76EAD3DA414C0C8D10DAADCC7208BD1F0A1DCB8BC5F
2,963,153 UART: [art] SIG.S = 78BC10B0DC3CED4BC31AA616FD938C613C35F982030075DA0B773339D8DBD3069EC6F4A447D9389BF4AC370D92A1634C
2,986,882 UART: Caliptra RT
2,987,227 UART: [state] CFI Enabled
3,093,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,362 UART: [rt]cmd =0x46505652, len=4
3,125,022 UART: [rt] FIPS Version
3,126,227 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
192,001 UART:
192,550 UART: Running Caliptra ROM ...
193,640 UART:
193,792 UART: [state] CFI Enabled
262,243 UART: [state] LifecycleState = Unprovisioned
264,181 UART: [state] DebugLocked = No
267,130 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,614 UART: [kat] SHA2-256
441,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,805 UART: [kat] ++
452,298 UART: [kat] sha1
462,207 UART: [kat] SHA2-256
464,898 UART: [kat] SHA2-384
471,359 UART: [kat] SHA2-512-ACC
473,757 UART: [kat] ECC-384
2,768,224 UART: [kat] HMAC-384Kdf
2,800,092 UART: [kat] LMS
3,990,399 UART: [kat] --
3,995,495 UART: [cold-reset] ++
3,997,215 UART: [fht] Storing FHT @ 0x50003400
4,008,165 UART: [idev] ++
4,008,733 UART: [idev] CDI.KEYID = 6
4,009,646 UART: [idev] SUBJECT.KEYID = 7
4,010,923 UART: [idev] UDS.KEYID = 0
4,097,156 UART: [idev] Erasing UDS.KEYID = 0
4,099,352 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,345,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,752 UART: [idev] --
7,373,783 UART: [ldev] ++
7,374,435 UART: [ldev] CDI.KEYID = 6
7,375,409 UART: [ldev] SUBJECT.KEYID = 5
7,376,570 UART: [ldev] AUTHORITY.KEYID = 7
7,377,802 UART: [ldev] FE.KEYID = 1
7,424,089 UART: [ldev] Erasing FE.KEYID = 1
10,755,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,340 UART: [ldev] --
13,117,286 UART: [fwproc] Waiting for Commands...
13,119,063 UART: [fwproc] Received command 0x46505652
13,121,468 UART: [rt] FIPS Version
13,123,082 >>> mbox cmd response data (36 bytes)
13,123,931 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,124,291 UART: [fwproc] Received command 0x46504c54
13,126,830 UART: [kat] SHA2-256
13,296,446 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,306,850 UART: [kat] ++
13,307,340 UART: [kat] sha1
13,317,318 UART: [kat] SHA2-256
13,320,018 UART: [kat] SHA2-384
13,325,091 UART: [kat] SHA2-512-ACC
13,327,497 UART: [kat] ECC-384
15,631,051 UART: [kat] HMAC-384Kdf
15,664,074 UART: [kat] LMS
16,853,548 UART: [kat] --
16,854,275 >>> mbox cmd response data (8 bytes)
16,854,614 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,855,485 UART: [fwproc] Received command 0x46504c67
16,858,161 >>> mbox cmd response data (8 bytes)
16,858,484 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,858,851 UART: [fwproc] Received command 0x43415053
16,861,859 >>> mbox cmd response data (24 bytes)
16,862,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,863,102 UART: [fwproc] Received command 0x4d454153
16,872,058 >>> mbox cmd response data (12 bytes)
16,872,482 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,873,402 UART: [fwproc] Received command 0x46505344
16,876,195 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,889,191 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,865,217 >>> mbox cmd response data (36 bytes)
12,866,626 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,376,380 >>> mbox cmd response data (8 bytes)
16,377,059 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,379,165 >>> mbox cmd response data (8 bytes)
16,379,593 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,381,112 >>> mbox cmd response data (24 bytes)
16,381,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,390,592 >>> mbox cmd response data (12 bytes)
16,391,065 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,392,269 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,530 UART:
192,886 UART: Running Caliptra ROM ...
193,955 UART:
603,908 UART: [state] CFI Enabled
616,935 UART: [state] LifecycleState = Unprovisioned
618,913 UART: [state] DebugLocked = No
620,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,407 UART: [kat] SHA2-256
795,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,694 UART: [kat] ++
806,286 UART: [kat] sha1
816,793 UART: [kat] SHA2-256
819,471 UART: [kat] SHA2-384
824,905 UART: [kat] SHA2-512-ACC
827,295 UART: [kat] ECC-384
3,111,005 UART: [kat] HMAC-384Kdf
3,124,314 UART: [kat] LMS
4,314,416 UART: [kat] --
4,320,838 UART: [cold-reset] ++
4,322,045 UART: [fht] Storing FHT @ 0x50003400
4,334,078 UART: [idev] ++
4,334,655 UART: [idev] CDI.KEYID = 6
4,335,598 UART: [idev] SUBJECT.KEYID = 7
4,336,862 UART: [idev] UDS.KEYID = 0
4,423,508 UART: [idev] Erasing UDS.KEYID = 0
4,425,694 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,624,501 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,830 UART: [idev] --
7,650,128 UART: [ldev] ++
7,650,701 UART: [ldev] CDI.KEYID = 6
7,651,646 UART: [ldev] SUBJECT.KEYID = 5
7,652,861 UART: [ldev] AUTHORITY.KEYID = 7
7,654,155 UART: [ldev] FE.KEYID = 1
7,665,801 UART: [ldev] Erasing FE.KEYID = 1
10,951,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,281 UART: [ldev] --
13,314,549 UART: [fwproc] Waiting for Commands...
13,316,327 UART: [fwproc] Received command 0x46505652
13,318,734 UART: [rt] FIPS Version
13,320,397 >>> mbox cmd response data (36 bytes)
13,321,174 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,321,594 UART: [fwproc] Received command 0x46504c54
13,324,139 UART: [kat] SHA2-256
13,493,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,504,122 UART: [kat] ++
13,504,576 UART: [kat] sha1
13,516,438 UART: [kat] SHA2-256
13,519,169 UART: [kat] SHA2-384
13,524,458 UART: [kat] SHA2-512-ACC
13,526,825 UART: [kat] ECC-384
15,810,181 UART: [kat] HMAC-384Kdf
15,821,703 UART: [kat] LMS
17,011,188 UART: [kat] --
17,011,858 >>> mbox cmd response data (8 bytes)
17,012,208 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,013,677 UART: [fwproc] Received command 0x46504c67
17,016,322 >>> mbox cmd response data (8 bytes)
17,016,641 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,017,174 UART: [fwproc] Received command 0x43415053
17,020,190 >>> mbox cmd response data (24 bytes)
17,020,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,021,501 UART: [fwproc] Received command 0x4d454153
17,030,473 >>> mbox cmd response data (12 bytes)
17,030,948 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,032,306 UART: [fwproc] Received command 0x46505344
17,035,073 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,217,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,046,069 >>> mbox cmd response data (36 bytes)
13,047,108 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,542,861 >>> mbox cmd response data (8 bytes)
16,543,364 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,544,630 >>> mbox cmd response data (8 bytes)
16,544,938 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,547,093 >>> mbox cmd response data (24 bytes)
16,547,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,555,850 >>> mbox cmd response data (12 bytes)
16,556,283 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,558,501 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,047 UART:
192,433 UART: Running Caliptra ROM ...
193,637 UART:
193,790 UART: [state] CFI Enabled
261,901 UART: [state] LifecycleState = Unprovisioned
263,794 UART: [state] DebugLocked = No
266,039 UART: [state] WD Timer not started. Device not locked for debugging
270,233 UART: [kat] SHA2-256
449,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,917 UART: [kat] ++
461,449 UART: [kat] sha1
472,602 UART: [kat] SHA2-256
475,655 UART: [kat] SHA2-384
481,464 UART: [kat] SHA2-512-ACC
484,404 UART: [kat] ECC-384
2,945,813 UART: [kat] HMAC-384Kdf
2,969,893 UART: [kat] LMS
3,499,356 UART: [kat] --
3,503,269 UART: [cold-reset] ++
3,504,338 UART: [fht] FHT @ 0x50003400
3,516,346 UART: [idev] ++
3,516,912 UART: [idev] CDI.KEYID = 6
3,517,828 UART: [idev] SUBJECT.KEYID = 7
3,519,044 UART: [idev] UDS.KEYID = 0
3,601,330 UART: [idev] Erasing UDS.KEYID = 0
3,603,536 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,026,563 UART: [idev] Sha1 KeyId Algorithm
6,050,701 UART: [idev] --
6,055,937 UART: [ldev] ++
6,056,521 UART: [ldev] CDI.KEYID = 6
6,057,608 UART: [ldev] SUBJECT.KEYID = 5
6,058,726 UART: [ldev] AUTHORITY.KEYID = 7
6,059,904 UART: [ldev] FE.KEYID = 1
6,100,206 UART: [ldev] Erasing FE.KEYID = 1
8,604,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,502 UART: [ldev] --
10,414,118 UART: [fwproc] Wait for Commands...
10,416,536 UART: [fwproc] Recv command 0x46505652
10,418,901 UART: [rt] FIPS Version
10,420,409 >>> mbox cmd response data (36 bytes)
10,421,181 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,421,597 UART: [fwproc] Recv command 0x46504c54
10,423,930 UART: [kat] SHA2-256
10,603,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,614,716 UART: [kat] ++
10,615,259 UART: [kat] sha1
10,625,828 UART: [kat] SHA2-256
10,628,888 UART: [kat] SHA2-384
10,634,392 UART: [kat] SHA2-512-ACC
10,637,354 UART: [kat] ECC-384
13,100,804 UART: [kat] HMAC-384Kdf
13,126,261 UART: [kat] LMS
13,655,843 UART: [kat] --
13,656,506 >>> mbox cmd response data (8 bytes)
13,656,859 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,658,215 UART: [fwproc] Recv command 0x46504c67
13,660,818 >>> mbox cmd response data (8 bytes)
13,661,139 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,661,620 UART: [fwproc] Recv command 0x43415053
13,664,324 >>> mbox cmd response data (24 bytes)
13,664,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,666,416 UART: [fwproc] Recv command 0x4d454153
13,674,953 >>> mbox cmd response data (12 bytes)
13,675,367 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,676,013 UART: [fwproc] Recv command 0x46505344
13,678,515 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,414 writing to cptra_bootfsm_go
3,441,178 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,202,705 >>> mbox cmd response data (36 bytes)
10,203,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,304,559 >>> mbox cmd response data (8 bytes)
13,305,080 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,306,295 >>> mbox cmd response data (8 bytes)
13,306,711 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,308,444 >>> mbox cmd response data (24 bytes)
13,308,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,316,902 >>> mbox cmd response data (12 bytes)
13,317,315 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,319,106 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,598 UART:
192,975 UART: Running Caliptra ROM ...
194,173 UART:
603,751 UART: [state] CFI Enabled
617,903 UART: [state] LifecycleState = Unprovisioned
619,746 UART: [state] DebugLocked = No
622,102 UART: [state] WD Timer not started. Device not locked for debugging
626,508 UART: [kat] SHA2-256
805,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,231 UART: [kat] ++
817,674 UART: [kat] sha1
827,736 UART: [kat] SHA2-256
830,800 UART: [kat] SHA2-384
836,558 UART: [kat] SHA2-512-ACC
839,550 UART: [kat] ECC-384
3,281,640 UART: [kat] HMAC-384Kdf
3,294,363 UART: [kat] LMS
3,823,865 UART: [kat] --
3,827,765 UART: [cold-reset] ++
3,828,962 UART: [fht] FHT @ 0x50003400
3,839,289 UART: [idev] ++
3,839,859 UART: [idev] CDI.KEYID = 6
3,840,775 UART: [idev] SUBJECT.KEYID = 7
3,841,938 UART: [idev] UDS.KEYID = 0
3,921,920 UART: [idev] Erasing UDS.KEYID = 0
3,924,148 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,313,604 UART: [idev] Sha1 KeyId Algorithm
6,335,298 UART: [idev] --
6,338,920 UART: [ldev] ++
6,339,488 UART: [ldev] CDI.KEYID = 6
6,340,401 UART: [ldev] SUBJECT.KEYID = 5
6,341,563 UART: [ldev] AUTHORITY.KEYID = 7
6,342,791 UART: [ldev] FE.KEYID = 1
6,351,600 UART: [ldev] Erasing FE.KEYID = 1
8,816,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,566,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,582,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,602,207 UART: [ldev] --
10,606,499 UART: [fwproc] Wait for Commands...
10,609,571 UART: [fwproc] Recv command 0x46505652
10,611,892 UART: [rt] FIPS Version
10,613,401 >>> mbox cmd response data (36 bytes)
10,614,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,615,455 UART: [fwproc] Recv command 0x46504c54
10,617,796 UART: [kat] SHA2-256
10,796,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,808,616 UART: [kat] ++
10,809,162 UART: [kat] sha1
10,820,598 UART: [kat] SHA2-256
10,823,615 UART: [kat] SHA2-384
10,829,654 UART: [kat] SHA2-512-ACC
10,832,595 UART: [kat] ECC-384
13,275,365 UART: [kat] HMAC-384Kdf
13,286,856 UART: [kat] LMS
13,816,526 UART: [kat] --
13,817,172 >>> mbox cmd response data (8 bytes)
13,817,536 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,818,506 UART: [fwproc] Recv command 0x46504c67
13,821,061 >>> mbox cmd response data (8 bytes)
13,821,382 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,822,617 UART: [fwproc] Recv command 0x43415053
13,825,323 >>> mbox cmd response data (24 bytes)
13,825,798 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,826,582 UART: [fwproc] Recv command 0x4d454153
13,835,071 >>> mbox cmd response data (12 bytes)
13,835,487 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,836,083 UART: [fwproc] Recv command 0x46505344
13,838,575 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,767 writing to cptra_bootfsm_go
3,780,126 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,407,796 >>> mbox cmd response data (36 bytes)
10,409,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,474,019 >>> mbox cmd response data (8 bytes)
13,474,529 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,476,173 >>> mbox cmd response data (8 bytes)
13,476,578 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,478,743 >>> mbox cmd response data (24 bytes)
13,479,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,487,200 >>> mbox cmd response data (12 bytes)
13,487,617 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,489,996 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,149 UART:
192,538 UART: Running Caliptra ROM ...
193,708 UART:
193,863 UART: [state] CFI Enabled
262,029 UART: [state] LifecycleState = Unprovisioned
264,437 UART: [state] DebugLocked = No
266,306 UART: [state] WD Timer not started. Device not locked for debugging
270,833 UART: [kat] SHA2-256
460,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,498 UART: [kat] ++
471,984 UART: [kat] sha1
484,479 UART: [kat] SHA2-256
487,494 UART: [kat] SHA2-384
494,075 UART: [kat] SHA2-512-ACC
496,641 UART: [kat] ECC-384
2,944,923 UART: [kat] HMAC-384Kdf
2,969,430 UART: [kat] LMS
3,501,166 UART: [kat] --
3,504,560 UART: [cold-reset] ++
3,507,101 UART: [fht] FHT @ 0x50003400
3,518,846 UART: [idev] ++
3,519,521 UART: [idev] CDI.KEYID = 6
3,520,459 UART: [idev] SUBJECT.KEYID = 7
3,521,670 UART: [idev] UDS.KEYID = 0
3,607,962 UART: [idev] Erasing UDS.KEYID = 0
3,610,184 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,024,554 UART: [idev] Sha1 KeyId Algorithm
6,047,253 UART: [idev] --
6,052,942 UART: [ldev] ++
6,053,634 UART: [ldev] CDI.KEYID = 6
6,054,521 UART: [ldev] SUBJECT.KEYID = 5
6,055,739 UART: [ldev] AUTHORITY.KEYID = 7
6,056,922 UART: [ldev] FE.KEYID = 1
6,097,148 UART: [ldev] Erasing FE.KEYID = 1
8,604,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,919 UART: [ldev] --
10,409,754 UART: [fwproc] Wait for Commands...
10,411,640 UART: [fwproc] Recv command 0x46505652
10,414,199 UART: [rt] FIPS Version
10,415,876 >>> mbox cmd response data (36 bytes)
10,416,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,417,093 UART: [fwproc] Recv command 0x46504c54
10,419,324 UART: [kat] SHA2-256
10,609,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,619,831 UART: [kat] ++
10,620,343 UART: [kat] sha1
10,631,338 UART: [kat] SHA2-256
10,634,351 UART: [kat] SHA2-384
10,640,068 UART: [kat] SHA2-512-ACC
10,642,639 UART: [kat] ECC-384
13,098,703 UART: [kat] HMAC-384Kdf
13,122,334 UART: [kat] LMS
13,654,151 UART: [kat] --
13,654,856 >>> mbox cmd response data (8 bytes)
13,655,220 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,655,600 UART: [fwproc] Recv command 0x46504c67
13,658,155 >>> mbox cmd response data (8 bytes)
13,658,470 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,659,218 UART: [fwproc] Recv command 0x43415053
13,662,199 >>> mbox cmd response data (24 bytes)
13,662,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,663,857 UART: [fwproc] Recv command 0x4d454153
13,673,543 >>> mbox cmd response data (12 bytes)
13,673,959 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,674,769 UART: [fwproc] Recv command 0x46505344
13,677,481 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,523,483 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,248,222 >>> mbox cmd response data (36 bytes)
10,249,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,407,334 >>> mbox cmd response data (8 bytes)
13,407,839 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,408,725 >>> mbox cmd response data (8 bytes)
13,409,072 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,410,800 >>> mbox cmd response data (24 bytes)
13,411,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,419,335 >>> mbox cmd response data (12 bytes)
13,419,758 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,420,570 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
192,465 UART:
192,838 UART: Running Caliptra ROM ...
193,979 UART:
603,708 UART: [state] CFI Enabled
617,322 UART: [state] LifecycleState = Unprovisioned
619,743 UART: [state] DebugLocked = No
622,256 UART: [state] WD Timer not started. Device not locked for debugging
626,815 UART: [kat] SHA2-256
816,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,483 UART: [kat] ++
828,077 UART: [kat] sha1
840,482 UART: [kat] SHA2-256
843,485 UART: [kat] SHA2-384
849,999 UART: [kat] SHA2-512-ACC
852,566 UART: [kat] ECC-384
3,295,884 UART: [kat] HMAC-384Kdf
3,309,160 UART: [kat] LMS
3,840,970 UART: [kat] --
3,844,473 UART: [cold-reset] ++
3,846,086 UART: [fht] FHT @ 0x50003400
3,858,962 UART: [idev] ++
3,859,677 UART: [idev] CDI.KEYID = 6
3,860,568 UART: [idev] SUBJECT.KEYID = 7
3,861,835 UART: [idev] UDS.KEYID = 0
3,947,947 UART: [idev] Erasing UDS.KEYID = 0
3,950,152 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,339,848 UART: [idev] Sha1 KeyId Algorithm
6,363,390 UART: [idev] --
6,368,904 UART: [ldev] ++
6,369,595 UART: [ldev] CDI.KEYID = 6
6,370,526 UART: [ldev] SUBJECT.KEYID = 5
6,371,688 UART: [ldev] AUTHORITY.KEYID = 7
6,372,866 UART: [ldev] FE.KEYID = 1
6,384,216 UART: [ldev] Erasing FE.KEYID = 1
8,863,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,629 UART: [ldev] --
10,654,109 UART: [fwproc] Wait for Commands...
10,655,989 UART: [fwproc] Recv command 0x46505652
10,658,530 UART: [rt] FIPS Version
10,660,244 >>> mbox cmd response data (36 bytes)
10,661,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,661,697 UART: [fwproc] Recv command 0x46504c54
10,663,967 UART: [kat] SHA2-256
10,853,714 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,864,455 UART: [kat] ++
10,864,973 UART: [kat] sha1
10,876,940 UART: [kat] SHA2-256
10,879,960 UART: [kat] SHA2-384
10,885,316 UART: [kat] SHA2-512-ACC
10,887,933 UART: [kat] ECC-384
13,331,646 UART: [kat] HMAC-384Kdf
13,344,637 UART: [kat] LMS
13,876,526 UART: [kat] --
13,877,222 >>> mbox cmd response data (8 bytes)
13,877,567 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,878,644 UART: [fwproc] Recv command 0x46504c67
13,881,140 >>> mbox cmd response data (8 bytes)
13,881,453 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,881,879 UART: [fwproc] Recv command 0x43415053
13,884,585 >>> mbox cmd response data (24 bytes)
13,885,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,886,639 UART: [fwproc] Recv command 0x4d454153
13,896,364 >>> mbox cmd response data (12 bytes)
13,896,791 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,897,623 UART: [fwproc] Recv command 0x46505344
13,900,323 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,846,266 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,476,520 >>> mbox cmd response data (36 bytes)
10,477,552 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,598,965 >>> mbox cmd response data (8 bytes)
13,599,476 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,600,639 >>> mbox cmd response data (8 bytes)
13,601,050 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,603,165 >>> mbox cmd response data (24 bytes)
13,603,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,612,515 >>> mbox cmd response data (12 bytes)
13,612,957 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,614,043 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,279 UART: [state] DebugLocked = No
86,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,433 UART: [kat] SHA2-256
882,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,479 UART: [kat] ++
886,631 UART: [kat] sha1
890,905 UART: [kat] SHA2-256
892,843 UART: [kat] SHA2-384
895,720 UART: [kat] SHA2-512-ACC
897,621 UART: [kat] ECC-384
903,172 UART: [kat] HMAC-384Kdf
907,726 UART: [kat] LMS
1,475,922 UART: [kat] --
1,476,687 UART: [cold-reset] ++
1,477,099 UART: [fht] Storing FHT @ 0x50003400
1,479,948 UART: [idev] ++
1,480,116 UART: [idev] CDI.KEYID = 6
1,480,476 UART: [idev] SUBJECT.KEYID = 7
1,480,900 UART: [idev] UDS.KEYID = 0
1,481,245 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,616 UART: [idev] Erasing UDS.KEYID = 0
1,504,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,659 UART: [ldev] ++
1,514,827 UART: [ldev] CDI.KEYID = 6
1,515,190 UART: [ldev] SUBJECT.KEYID = 5
1,515,616 UART: [ldev] AUTHORITY.KEYID = 7
1,516,079 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,130 UART: [ldev] --
1,585,465 UART: [fwproc] Waiting for Commands...
1,586,152 UART: [fwproc] Received command 0x46505652
1,587,034 UART: [rt] FIPS Version
1,587,587 >>> mbox cmd response data (36 bytes)
1,587,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,587,750 UART: [fwproc] Received command 0x46504c54
1,588,657 UART: [kat] SHA2-256
2,382,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,703 UART: [kat] ++
2,386,855 UART: [kat] sha1
2,391,263 UART: [kat] SHA2-256
2,393,201 UART: [kat] SHA2-384
2,396,034 UART: [kat] SHA2-512-ACC
2,397,934 UART: [kat] ECC-384
2,403,431 UART: [kat] HMAC-384Kdf
2,407,977 UART: [kat] LMS
2,976,173 UART: [kat] --
2,976,411 >>> mbox cmd response data (8 bytes)
2,976,412 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,560 UART: [fwproc] Received command 0x46504c67
2,977,514 >>> mbox cmd response data (8 bytes)
2,977,515 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,977,667 UART: [fwproc] Received command 0x43415053
2,978,715 >>> mbox cmd response data (24 bytes)
2,978,716 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,978,974 UART: [fwproc] Received command 0x4d454153
2,983,038 >>> mbox cmd response data (12 bytes)
2,983,039 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,183 UART: [fwproc] Received command 0x46505344
2,984,131 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,670 >>> mbox cmd response data (36 bytes)
1,441,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,550 >>> mbox cmd response data (8 bytes)
2,716,551 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,975 >>> mbox cmd response data (8 bytes)
2,716,976 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,408 >>> mbox cmd response data (24 bytes)
2,717,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,720,981 >>> mbox cmd response data (12 bytes)
2,720,982 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,453 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
894,993 UART: [kat] SHA2-512-ACC
896,894 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,480,051 UART: [idev] ++
1,480,219 UART: [idev] CDI.KEYID = 6
1,480,579 UART: [idev] SUBJECT.KEYID = 7
1,481,003 UART: [idev] UDS.KEYID = 0
1,481,348 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] --
1,514,784 UART: [ldev] ++
1,514,952 UART: [ldev] CDI.KEYID = 6
1,515,315 UART: [ldev] SUBJECT.KEYID = 5
1,515,741 UART: [ldev] AUTHORITY.KEYID = 7
1,516,204 UART: [ldev] FE.KEYID = 1
1,521,444 UART: [ldev] Erasing FE.KEYID = 1
1,547,053 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,707 UART: [ldev] --
1,585,968 UART: [fwproc] Waiting for Commands...
1,586,701 UART: [fwproc] Received command 0x46505652
1,587,583 UART: [rt] FIPS Version
1,588,136 >>> mbox cmd response data (36 bytes)
1,588,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,197 UART: [fwproc] Received command 0x46504c54
1,589,104 UART: [kat] SHA2-256
2,383,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,150 UART: [kat] ++
2,387,302 UART: [kat] sha1
2,391,468 UART: [kat] SHA2-256
2,393,406 UART: [kat] SHA2-384
2,396,159 UART: [kat] SHA2-512-ACC
2,398,059 UART: [kat] ECC-384
2,403,558 UART: [kat] HMAC-384Kdf
2,408,130 UART: [kat] LMS
2,976,326 UART: [kat] --
2,976,564 >>> mbox cmd response data (8 bytes)
2,976,565 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,803 UART: [fwproc] Received command 0x46504c67
2,977,757 >>> mbox cmd response data (8 bytes)
2,977,758 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,977,844 UART: [fwproc] Received command 0x43415053
2,978,892 >>> mbox cmd response data (24 bytes)
2,978,893 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,103 UART: [fwproc] Received command 0x4d454153
2,983,167 >>> mbox cmd response data (12 bytes)
2,983,168 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,260 UART: [fwproc] Received command 0x46505344
2,984,208 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,443,253 >>> mbox cmd response data (36 bytes)
1,443,254 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,718,297 >>> mbox cmd response data (8 bytes)
2,718,298 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,786 >>> mbox cmd response data (8 bytes)
2,718,787 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,719,213 >>> mbox cmd response data (24 bytes)
2,719,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,722,770 >>> mbox cmd response data (12 bytes)
2,722,771 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,723,154 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,348 UART: [kat] SHA2-512-ACC
908,249 UART: [kat] ECC-384
917,398 UART: [kat] HMAC-384Kdf
922,022 UART: [kat] LMS
1,170,350 UART: [kat] --
1,171,387 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,700 UART: [idev] ++
1,174,868 UART: [idev] CDI.KEYID = 6
1,175,228 UART: [idev] SUBJECT.KEYID = 7
1,175,652 UART: [idev] UDS.KEYID = 0
1,175,997 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,209,005 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,558 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,561 UART: [ldev] Erasing FE.KEYID = 1
1,243,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,331 UART: [ldev] --
1,282,814 UART: [fwproc] Wait for Commands...
1,283,442 UART: [fwproc] Recv command 0x46505652
1,284,263 UART: [rt] FIPS Version
1,284,817 >>> mbox cmd response data (36 bytes)
1,284,818 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,032 UART: [fwproc] Recv command 0x46504c54
1,285,878 UART: [kat] SHA2-256
2,091,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,653 UART: [kat] ++
2,095,805 UART: [kat] sha1
2,100,113 UART: [kat] SHA2-256
2,102,053 UART: [kat] SHA2-384
2,104,832 UART: [kat] SHA2-512-ACC
2,106,732 UART: [kat] ECC-384
2,116,729 UART: [kat] HMAC-384Kdf
2,121,305 UART: [kat] LMS
2,369,633 UART: [kat] --
2,369,871 >>> mbox cmd response data (8 bytes)
2,369,872 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,177 UART: [fwproc] Recv command 0x46504c67
2,371,070 >>> mbox cmd response data (8 bytes)
2,371,071 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,256 UART: [fwproc] Recv command 0x43415053
2,372,239 >>> mbox cmd response data (24 bytes)
2,372,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,441 UART: [fwproc] Recv command 0x4d454153
2,376,450 >>> mbox cmd response data (12 bytes)
2,376,451 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,684 UART: [fwproc] Recv command 0x46505344
2,377,571 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,887 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,607 >>> mbox cmd response data (36 bytes)
1,140,608 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,572 >>> mbox cmd response data (8 bytes)
2,113,573 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,941 >>> mbox cmd response data (8 bytes)
2,113,942 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,114,498 >>> mbox cmd response data (24 bytes)
2,114,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,941 >>> mbox cmd response data (12 bytes)
2,117,942 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,118,236 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,629 UART: [kat] SHA2-512-ACC
908,530 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,784 UART: [cold-reset] ++
1,173,190 UART: [fht] FHT @ 0x50003400
1,175,853 UART: [idev] ++
1,176,021 UART: [idev] CDI.KEYID = 6
1,176,381 UART: [idev] SUBJECT.KEYID = 7
1,176,805 UART: [idev] UDS.KEYID = 0
1,177,150 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,999 UART: [idev] Erasing UDS.KEYID = 0
1,202,076 UART: [idev] Sha1 KeyId Algorithm
1,210,488 UART: [idev] --
1,211,460 UART: [ldev] ++
1,211,628 UART: [ldev] CDI.KEYID = 6
1,211,991 UART: [ldev] SUBJECT.KEYID = 5
1,212,417 UART: [ldev] AUTHORITY.KEYID = 7
1,212,880 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,245,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,196 UART: [ldev] --
1,284,467 UART: [fwproc] Wait for Commands...
1,285,147 UART: [fwproc] Recv command 0x46505652
1,285,968 UART: [rt] FIPS Version
1,286,522 >>> mbox cmd response data (36 bytes)
1,286,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,286,775 UART: [fwproc] Recv command 0x46504c54
1,287,621 UART: [kat] SHA2-256
2,093,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,097,396 UART: [kat] ++
2,097,548 UART: [kat] sha1
2,101,730 UART: [kat] SHA2-256
2,103,670 UART: [kat] SHA2-384
2,106,455 UART: [kat] SHA2-512-ACC
2,108,355 UART: [kat] ECC-384
2,118,108 UART: [kat] HMAC-384Kdf
2,122,690 UART: [kat] LMS
2,371,018 UART: [kat] --
2,371,256 >>> mbox cmd response data (8 bytes)
2,371,257 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,371,324 UART: [fwproc] Recv command 0x46504c67
2,372,217 >>> mbox cmd response data (8 bytes)
2,372,218 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,372,395 UART: [fwproc] Recv command 0x43415053
2,373,378 >>> mbox cmd response data (24 bytes)
2,373,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,373,468 UART: [fwproc] Recv command 0x4d454153
2,377,477 >>> mbox cmd response data (12 bytes)
2,377,478 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,377,697 UART: [fwproc] Recv command 0x46505344
2,378,584 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,336 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,350 >>> mbox cmd response data (36 bytes)
1,139,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,963 >>> mbox cmd response data (8 bytes)
2,111,964 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,452 >>> mbox cmd response data (8 bytes)
2,112,453 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,112,903 >>> mbox cmd response data (24 bytes)
2,112,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,468 >>> mbox cmd response data (12 bytes)
2,116,469 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,711 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,281 UART: [kat] SHA2-256
902,221 UART: [kat] SHA2-384
905,120 UART: [kat] SHA2-512-ACC
907,021 UART: [kat] ECC-384
917,078 UART: [kat] HMAC-384Kdf
921,680 UART: [kat] LMS
1,169,992 UART: [kat] --
1,171,015 UART: [cold-reset] ++
1,171,521 UART: [fht] FHT @ 0x50003400
1,174,109 UART: [idev] ++
1,174,277 UART: [idev] CDI.KEYID = 6
1,174,638 UART: [idev] SUBJECT.KEYID = 7
1,175,063 UART: [idev] UDS.KEYID = 0
1,175,409 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,735 UART: [idev] Erasing UDS.KEYID = 0
1,199,795 UART: [idev] Sha1 KeyId Algorithm
1,208,709 UART: [idev] --
1,209,792 UART: [ldev] ++
1,209,960 UART: [ldev] CDI.KEYID = 6
1,210,324 UART: [ldev] SUBJECT.KEYID = 5
1,210,751 UART: [ldev] AUTHORITY.KEYID = 7
1,211,214 UART: [ldev] FE.KEYID = 1
1,216,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,650 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,643 UART: [fwproc] Recv command 0x46505652
1,283,470 UART: [rt] FIPS Version
1,284,031 >>> mbox cmd response data (36 bytes)
1,284,032 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,293 UART: [fwproc] Recv command 0x46504c54
1,285,147 UART: [kat] SHA2-256
2,088,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,826 UART: [kat] ++
2,092,978 UART: [kat] sha1
2,097,058 UART: [kat] SHA2-256
2,098,998 UART: [kat] SHA2-384
2,101,601 UART: [kat] SHA2-512-ACC
2,103,501 UART: [kat] ECC-384
2,113,384 UART: [kat] HMAC-384Kdf
2,118,004 UART: [kat] LMS
2,366,316 UART: [kat] --
2,366,557 >>> mbox cmd response data (8 bytes)
2,366,558 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,730 UART: [fwproc] Recv command 0x46504c67
2,367,634 >>> mbox cmd response data (8 bytes)
2,367,635 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,753 UART: [fwproc] Recv command 0x43415053
2,368,748 >>> mbox cmd response data (24 bytes)
2,368,749 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,904 UART: [fwproc] Recv command 0x4d454153
2,372,931 >>> mbox cmd response data (12 bytes)
2,372,932 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,373,141 UART: [fwproc] Recv command 0x46505344
2,374,044 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,676 >>> mbox cmd response data (36 bytes)
1,135,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,305 >>> mbox cmd response data (8 bytes)
2,104,306 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,578 >>> mbox cmd response data (8 bytes)
2,104,579 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,174 >>> mbox cmd response data (24 bytes)
2,105,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,108,627 >>> mbox cmd response data (12 bytes)
2,108,628 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,108,980 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,997 UART: [state] LifecycleState = Unprovisioned
86,652 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,633 UART: [kat] SHA2-256
892,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,312 UART: [kat] ++
896,464 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,147 UART: [kat] SHA2-512-ACC
907,048 UART: [kat] ECC-384
917,175 UART: [kat] HMAC-384Kdf
921,661 UART: [kat] LMS
1,169,973 UART: [kat] --
1,170,772 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,829 UART: [fwproc] Wait for Commands...
1,283,480 UART: [fwproc] Recv command 0x46505652
1,284,307 UART: [rt] FIPS Version
1,284,868 >>> mbox cmd response data (36 bytes)
1,284,869 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,284,960 UART: [fwproc] Recv command 0x46504c54
1,285,814 UART: [kat] SHA2-256
2,089,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,093,493 UART: [kat] ++
2,093,645 UART: [kat] sha1
2,097,819 UART: [kat] SHA2-256
2,099,759 UART: [kat] SHA2-384
2,102,596 UART: [kat] SHA2-512-ACC
2,104,496 UART: [kat] ECC-384
2,114,305 UART: [kat] HMAC-384Kdf
2,119,033 UART: [kat] LMS
2,367,345 UART: [kat] --
2,367,586 >>> mbox cmd response data (8 bytes)
2,367,587 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,775 UART: [fwproc] Recv command 0x46504c67
2,368,679 >>> mbox cmd response data (8 bytes)
2,368,680 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,758 UART: [fwproc] Recv command 0x43415053
2,369,753 >>> mbox cmd response data (24 bytes)
2,369,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,370,063 UART: [fwproc] Recv command 0x4d454153
2,374,090 >>> mbox cmd response data (12 bytes)
2,374,091 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,374,300 UART: [fwproc] Recv command 0x46505344
2,375,203 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,157 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,735 >>> mbox cmd response data (36 bytes)
1,135,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,238 >>> mbox cmd response data (8 bytes)
2,104,239 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,567 >>> mbox cmd response data (8 bytes)
2,104,568 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,097 >>> mbox cmd response data (24 bytes)
2,105,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,108,708 >>> mbox cmd response data (12 bytes)
2,108,709 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,109,143 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,283 UART:
192,647 UART: Running Caliptra ROM ...
193,840 UART:
193,994 UART: [state] CFI Enabled
264,394 UART: [state] LifecycleState = Unprovisioned
266,367 UART: [state] DebugLocked = No
267,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,486 UART: [kat] SHA2-256
442,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,675 UART: [kat] ++
453,164 UART: [kat] sha1
464,469 UART: [kat] SHA2-256
467,194 UART: [kat] SHA2-384
473,470 UART: [kat] SHA2-512-ACC
475,838 UART: [kat] ECC-384
2,766,981 UART: [kat] HMAC-384Kdf
2,779,425 UART: [kat] LMS
3,969,679 UART: [kat] --
3,975,543 UART: [cold-reset] ++
3,977,768 UART: [fht] Storing FHT @ 0x50003400
3,990,175 UART: [idev] ++
3,990,746 UART: [idev] CDI.KEYID = 6
3,991,704 UART: [idev] SUBJECT.KEYID = 7
3,992,958 UART: [idev] UDS.KEYID = 0
3,993,964 ready_for_fw is high
3,994,178 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,137,357 UART: [idev] Erasing UDS.KEYID = 0
7,322,513 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,831 UART: [idev] --
7,347,748 UART: [ldev] ++
7,348,318 UART: [ldev] CDI.KEYID = 6
7,349,256 UART: [ldev] SUBJECT.KEYID = 5
7,350,550 UART: [ldev] AUTHORITY.KEYID = 7
7,351,787 UART: [ldev] FE.KEYID = 1
7,381,372 UART: [ldev] Erasing FE.KEYID = 1
10,716,348 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,543 UART: [ldev] --
13,094,804 UART: [fwproc] Waiting for Commands...
13,096,907 UART: [fwproc] Received command 0x46574c44
13,099,099 UART: [fwproc] Received Image of size 113760 bytes
17,142,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,217,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,286,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,602,223 >>> mbox cmd response: success
17,605,149 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,606,845 UART: [afmc] ++
17,607,435 UART: [afmc] CDI.KEYID = 6
17,608,345 UART: [afmc] SUBJECT.KEYID = 7
17,609,560 UART: [afmc] AUTHORITY.KEYID = 5
20,964,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,267,034 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,269,300 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,283,714 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,298,569 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,312,993 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,334,056 UART: [afmc] --
23,337,452 UART: [cold-reset] --
23,339,858 UART: [state] Locking Datavault
23,345,159 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,918 UART: [state] Locking ICCM
23,348,330 UART: [exit] Launching FMC @ 0x40000130
23,356,674 UART:
23,356,912 UART: Running Caliptra FMC ...
23,358,015 UART:
23,358,188 UART: [state] CFI Enabled
23,425,038 UART: [fht] FMC Alias Private Key: 7
25,763,292 UART: [art] Extend RT PCRs Done
25,764,518 UART: [art] Lock RT PCRs Done
25,766,260 UART: [art] Populate DV Done
25,771,619 UART: [fht] FMC Alias Private Key: 7
25,773,160 UART: [art] Derive CDI
25,773,919 UART: [art] Store in in slot 0x4
25,833,973 UART: [art] Derive Key Pair
25,835,016 UART: [art] Store priv key in slot 0x5
29,127,428 UART: [art] Derive Key Pair - Done
29,140,320 UART: [art] Signing Cert with AUTHO
29,141,641 UART: RITY.KEYID = 7
31,429,327 UART: [art] Erasing AUTHORITY.KEYID = 7
31,430,828 UART: [art] PUB.X = D26A0222C022C3E8FD5B0D1C98EFD0B5F1FF9B7D6F135EEC00A77C6571BB274C299792CFF7B2034C0BE2251A462E11BE
31,438,150 UART: [art] PUB.Y = 3987296BB8BA0B556BBB1032F726C07F63928FFEB4F9BA6220407AF36F75F4D2B274D6AA8BF83F6B0CBF1595A9D71045
31,445,348 UART: [art] SIG.R = D6C3743284ED985F74EC3E8D37F1A6C9D588E8A7B532205F140A2B1DF35D6A44E69BA9F5DE07B339AD2E24E86D672AA5
31,452,755 UART: [art] SIG.S = 4450A178721B01A597F90DDF621AF0A8E7CF6A7347AB98451CF5B870A35B150C57C804DF1E23FCB30486BE7857E6853C
32,758,023 UART: Caliptra RT
32,758,739 UART: [state] CFI Enabled
32,919,469 UART: [rt] RT listening for mailbox commands...
32,951,318 UART: [rt]cmd =0x46505652, len=4
32,952,595 UART: [rt] FIPS Version
32,953,703 >>> mbox cmd response data (36 bytes)
32,954,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,984,275 UART: [rt]cmd =0x46504c54, len=4
32,985,754 >>> mbox cmd response data (8 bytes)
32,986,091 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,015,987 UART: [rt]cmd =0x46504c67, len=4
33,017,375 >>> mbox cmd response: failed
33,018,508 UART: [rt] FIPS self test
33,019,446 UART: [kat] ++
33,019,901 UART: [kat] sha1
33,024,528 UART: [kat] SHA2-256
33,026,324 UART: [kat] SHA2-384
33,029,139 UART: [kat] SHA2-512-ACC
33,031,381 UART: [kat] ECC-384
36,297,935 UART: [kat] HMAC-384Kdf
36,305,098 UART: [kat] LMS
36,714,668 UART: [kat] --
40,690,604 UART: [rt] Verify complete
40,858,408 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,888,306 UART: [rt]cmd =0x46504c67, len=4
40,890,004 >>> mbox cmd response data (8 bytes)
40,890,368 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,920,075 UART: [rt]cmd =0x49444543, len=4
40,926,921 >>> mbox cmd response data (37 bytes)
40,927,564 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,957,335 UART: [rt]cmd =0x49444549, len=4
40,960,159 >>> mbox cmd response data (104 bytes)
40,960,952 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,990,896 UART: [rt]cmd =0x49444550, len=4
41,001,548 >>> mbox cmd response data (8 bytes)
41,001,960 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,031,694 UART: [rt]cmd =0x4c444556, len=4
41,042,770 >>> mbox cmd response data (687 bytes)
41,046,295 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,075,876 UART: [rt]cmd =0x43455246, len=4
41,088,863 >>> mbox cmd response data (920 bytes)
41,093,463 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,123,122 UART: [rt]cmd =0x43455252, len=4
41,134,423 >>> mbox cmd response data (783 bytes)
41,139,131 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,170,544 UART: [rt]cmd =0x53494756, len=196
42,462,068 >>> mbox cmd response data (8 bytes)
42,462,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,493,204 UART: [rt]cmd =0x4d454153, len=108
42,511,977 >>> mbox cmd response data (12 bytes)
42,512,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,542,120 UART: [rt]cmd =0x494e464f, len=4
42,546,592 >>> mbox cmd response data (312 bytes)
42,549,113 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,578,930 UART: [rt]cmd =0x54514754, len=24
42,581,529 >>> mbox cmd response data (8 bytes)
42,581,945 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,611,807 UART: [rt]cmd =0x47544744, len=8
42,615,009 >>> mbox cmd response data (104 bytes)
42,615,898 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,645,502 UART: [rt]cmd =0x50435252, len=8
42,647,461 >>> mbox cmd response data (8 bytes)
42,647,822 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,677,833 UART: [rt]cmd =0x50435251, len=36
43,851,514 >>> mbox cmd response data (1848 bytes)
43,860,435 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,890,601 UART: [rt]cmd =0x50435245, len=56
43,893,391 >>> mbox cmd response data (8 bytes)
43,893,841 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,923,572 UART: [rt]cmd =0x44504543, len=20
43,944,084 >>> mbox cmd response data (44 bytes)
43,944,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,974,928 UART: [rt]cmd =0x44504543, len=24
44,019,729 >>> mbox cmd response data (40 bytes)
44,020,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,050,860 UART: [rt]cmd =0x44504543, len=96
44,090,157 >>> mbox cmd response data (56 bytes)
44,090,897 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,121,259 UART: [rt]cmd =0x44504543, len=92
52,182,669 >>> mbox cmd response data (6284 bytes)
52,211,995 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,242,995 UART: [rt]cmd =0x44504543, len=136
57,880,112 >>> mbox cmd response data (136 bytes)
57,881,325 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,911,202 UART: [rt]cmd =0x44504543, len=40
57,950,939 >>> mbox cmd response data (40 bytes)
57,951,605 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,981,414 UART: [rt]cmd =0x44504543, len=28
58,024,276 >>> mbox cmd response data (2076 bytes)
58,034,177 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,064,176 UART: [rt]cmd =0x44504543, len=36
58,093,687 >>> mbox cmd response data (24 bytes)
58,094,260 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,124,148 UART: [rt]cmd =0x4453424c, len=4
61,423,547 >>> mbox cmd response data (8 bytes)
61,424,038 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,454,075 UART: [rt]cmd =0x46505344, len=4
61,564,186 UART: Fatal Error: 0x000E0008
61,565,390 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,782,671 ready_for_fw is high
3,783,126 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,844,426 >>> mbox cmd response: success
17,847,393 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,548,166 UART:
23,548,546 UART: Running Caliptra FMC ...
23,549,722 UART:
23,549,885 UART: [state] CFI Enabled
23,617,338 UART: [fht] FMC Alias Private Key: 7
25,955,198 UART: [art] Extend RT PCRs Done
25,956,426 UART: [art] Lock RT PCRs Done
25,958,055 UART: [art] Populate DV Done
25,963,470 UART: [fht] FMC Alias Private Key: 7
25,964,959 UART: [art] Derive CDI
25,965,726 UART: [art] Store in in slot 0x4
26,025,604 UART: [art] Derive Key Pair
26,026,606 UART: [art] Store priv key in slot 0x5
29,319,599 UART: [art] Derive Key Pair - Done
29,332,382 UART: [art] Signing Cert with AUTHO
29,333,682 UART: RITY.KEYID = 7
31,633,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,419 UART: [art] PUB.X = DF800816A424A659C58E009852DBFAC74780821F6AF6B51CF7E4D7EAF80F07AE6BB32C8DFEB1883FC92F9F7E8D261EAC
31,642,703 UART: [art] PUB.Y = FBD99F3BEC3FB8A75C04A4024990381025B0356F2B5E0008A2B44BCB831DB1EE00883D30161F53EE1E78ED2749CD8154
31,649,875 UART: [art] SIG.R = CA2A48B6BFB6694FAF4EE76C0CA470F2A9125F1D66221479995CB553697116EED7D99E41F7C669D8B96A09BE0E15FCE7
31,657,284 UART: [art] SIG.S = A8CA86E6EBA0B7E16D36C25D0D5E1BD3FF4A73045DC0E60B0CEE2C52E10A7B287A53CF401D26A7C56BE287AEEC471431
32,962,624 UART: Caliptra RT
32,963,345 UART: [state] CFI Enabled
33,124,277 UART: [rt] RT listening for mailbox commands...
33,155,797 UART: [rt]cmd =0x46505652, len=4
33,157,126 UART: [rt] FIPS Version
33,158,286 >>> mbox cmd response data (36 bytes)
33,158,985 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,188,706 UART: [rt]cmd =0x46504c54, len=4
33,190,236 >>> mbox cmd response data (8 bytes)
33,190,568 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,220,699 UART: [rt]cmd =0x46504c67, len=4
33,222,036 >>> mbox cmd response: failed
33,223,030 UART: [rt] FIPS self test
33,224,034 UART: [kat] ++
33,224,488 UART: [kat] sha1
33,228,754 UART: [kat] SHA2-256
33,230,562 UART: [kat] SHA2-384
33,233,561 UART: [kat] SHA2-512-ACC
33,235,775 UART: [kat] ECC-384
36,502,322 UART: [kat] HMAC-384Kdf
36,509,263 UART: [kat] LMS
36,918,812 UART: [kat] --
40,872,976 UART: [rt] Verify complete
41,063,970 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,093,753 UART: [rt]cmd =0x46504c67, len=4
41,095,153 >>> mbox cmd response data (8 bytes)
41,095,517 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,125,111 UART: [rt]cmd =0x49444543, len=4
41,131,982 >>> mbox cmd response data (37 bytes)
41,132,587 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,162,363 UART: [rt]cmd =0x49444549, len=4
41,165,113 >>> mbox cmd response data (104 bytes)
41,165,999 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,195,736 UART: [rt]cmd =0x49444550, len=4
41,206,338 >>> mbox cmd response data (8 bytes)
41,206,730 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,236,550 UART: [rt]cmd =0x4c444556, len=4
41,247,878 >>> mbox cmd response data (687 bytes)
41,251,390 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,281,190 UART: [rt]cmd =0x43455246, len=4
41,294,328 >>> mbox cmd response data (920 bytes)
41,298,873 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,328,574 UART: [rt]cmd =0x43455252, len=4
41,339,639 >>> mbox cmd response data (784 bytes)
41,344,353 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,375,925 UART: [rt]cmd =0x53494756, len=196
42,667,222 >>> mbox cmd response data (8 bytes)
42,667,715 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,698,429 UART: [rt]cmd =0x4d454153, len=108
42,717,350 >>> mbox cmd response data (12 bytes)
42,717,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,747,552 UART: [rt]cmd =0x494e464f, len=4
42,751,817 >>> mbox cmd response data (312 bytes)
42,754,033 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,784,325 UART: [rt]cmd =0x54514754, len=24
42,786,922 >>> mbox cmd response data (8 bytes)
42,787,332 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,816,986 UART: [rt]cmd =0x47544744, len=8
42,819,862 >>> mbox cmd response data (104 bytes)
42,820,715 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,850,610 UART: [rt]cmd =0x50435252, len=8
42,852,567 >>> mbox cmd response data (8 bytes)
42,852,937 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,883,000 UART: [rt]cmd =0x50435251, len=36
44,055,108 >>> mbox cmd response data (1848 bytes)
44,064,011 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,093,961 UART: [rt]cmd =0x50435245, len=56
44,096,711 >>> mbox cmd response data (8 bytes)
44,097,150 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,126,950 UART: [rt]cmd =0x44504543, len=20
44,147,442 >>> mbox cmd response data (44 bytes)
44,148,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,177,951 UART: [rt]cmd =0x44504543, len=24
44,224,022 >>> mbox cmd response data (40 bytes)
44,224,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,255,416 UART: [rt]cmd =0x44504543, len=96
44,294,330 >>> mbox cmd response data (56 bytes)
44,295,155 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,325,519 UART: [rt]cmd =0x44504543, len=92
52,386,855 >>> mbox cmd response data (6284 bytes)
52,415,945 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,446,998 UART: [rt]cmd =0x44504543, len=136
58,079,983 >>> mbox cmd response data (136 bytes)
58,081,189 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,111,176 UART: [rt]cmd =0x44504543, len=40
58,149,934 >>> mbox cmd response data (40 bytes)
58,150,600 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,180,612 UART: [rt]cmd =0x44504543, len=28
58,223,159 >>> mbox cmd response data (2076 bytes)
58,233,087 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,262,995 UART: [rt]cmd =0x44504543, len=36
58,292,648 >>> mbox cmd response data (24 bytes)
58,293,246 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,322,973 UART: [rt]cmd =0x4453424c, len=4
61,622,217 >>> mbox cmd response data (8 bytes)
61,622,709 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,652,626 UART: [rt]cmd =0x46505344, len=4
61,762,022 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,553 UART:
192,936 UART: Running Caliptra ROM ...
194,129 UART:
603,793 UART: [state] CFI Enabled
619,147 UART: [state] LifecycleState = Unprovisioned
621,099 UART: [state] DebugLocked = No
622,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,572 UART: [kat] SHA2-256
798,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,855 UART: [kat] ++
809,375 UART: [kat] sha1
819,418 UART: [kat] SHA2-256
822,135 UART: [kat] SHA2-384
826,861 UART: [kat] SHA2-512-ACC
829,236 UART: [kat] ECC-384
3,111,403 UART: [kat] HMAC-384Kdf
3,122,696 UART: [kat] LMS
4,312,778 UART: [kat] --
4,317,989 UART: [cold-reset] ++
4,319,215 UART: [fht] Storing FHT @ 0x50003400
4,331,481 UART: [idev] ++
4,332,117 UART: [idev] CDI.KEYID = 6
4,333,035 UART: [idev] SUBJECT.KEYID = 7
4,334,284 UART: [idev] UDS.KEYID = 0
4,335,380 ready_for_fw is high
4,335,604 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,480,077 UART: [idev] Erasing UDS.KEYID = 0
7,627,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,943 UART: [idev] --
7,652,019 UART: [ldev] ++
7,652,645 UART: [ldev] CDI.KEYID = 6
7,653,555 UART: [ldev] SUBJECT.KEYID = 5
7,654,776 UART: [ldev] AUTHORITY.KEYID = 7
7,656,066 UART: [ldev] FE.KEYID = 1
7,668,715 UART: [ldev] Erasing FE.KEYID = 1
10,955,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,206 UART: [ldev] --
13,315,106 UART: [fwproc] Waiting for Commands...
13,317,528 UART: [fwproc] Received command 0x46574c44
13,319,713 UART: [fwproc] Received Image of size 113760 bytes
17,365,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,644 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,559 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,823 >>> mbox cmd response: success
17,833,755 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,835,440 UART: [afmc] ++
17,836,028 UART: [afmc] CDI.KEYID = 6
17,836,947 UART: [afmc] SUBJECT.KEYID = 7
17,838,161 UART: [afmc] AUTHORITY.KEYID = 5
21,149,021 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,012 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,279 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,699 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,507 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,931 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,447 UART: [afmc] --
23,515,064 UART: [cold-reset] --
23,518,711 UART: [state] Locking Datavault
23,525,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,062 UART: [state] Locking ICCM
23,528,999 UART: [exit] Launching FMC @ 0x40000130
23,537,409 UART:
23,537,687 UART: Running Caliptra FMC ...
23,538,719 UART:
23,538,872 UART: [state] CFI Enabled
23,546,709 UART: [fht] FMC Alias Private Key: 7
25,878,298 UART: [art] Extend RT PCRs Done
25,879,523 UART: [art] Lock RT PCRs Done
25,881,066 UART: [art] Populate DV Done
25,886,751 UART: [fht] FMC Alias Private Key: 7
25,888,343 UART: [art] Derive CDI
25,889,084 UART: [art] Store in in slot 0x4
25,931,587 UART: [art] Derive Key Pair
25,932,593 UART: [art] Store priv key in slot 0x5
29,174,690 UART: [art] Derive Key Pair - Done
29,187,692 UART: [art] Signing Cert with AUTHO
29,189,000 UART: RITY.KEYID = 7
31,468,901 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,415 UART: [art] PUB.X = 459AF28D2669D9C3C6F53A4A9F41FD3B9EB51F65086FA7052B20CA2D69BC697DBFCCE84443E880B8EC32E0BAE715FECB
31,477,642 UART: [art] PUB.Y = E2055D6BDE1CC2B9276F17AA92C2292A23894FAADA043F9A2B9A6668B56B9805A1883F3A351FC1313B39370DA07A5C7F
31,484,862 UART: [art] SIG.R = BD9998CA251D0FFF117861841DFD38F12E71328141A2DD77868C4C141E88A9FFE85196D46B92E9965EE8758376C5A1F1
31,492,239 UART: [art] SIG.S = 8CC4AB03EF79B15F2FD1DCB14984364B339272E7897236358B027A8AF2FD71D25B7A16D590E5E24F91E77B4ED675AB32
32,797,427 UART: Caliptra RT
32,798,141 UART: [state] CFI Enabled
32,916,092 UART: [rt] RT listening for mailbox commands...
32,947,456 UART: [rt]cmd =0x46505652, len=4
32,948,701 UART: [rt] FIPS Version
32,950,071 >>> mbox cmd response data (36 bytes)
32,950,775 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,980,400 UART: [rt]cmd =0x46504c54, len=4
32,981,750 >>> mbox cmd response data (8 bytes)
32,982,089 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,011,799 UART: [rt]cmd =0x46504c67, len=4
33,013,094 >>> mbox cmd response: failed
33,014,226 UART: [rt] FIPS self test
33,015,159 UART: [kat] ++
33,015,610 UART: [kat] sha1
33,019,983 UART: [kat] SHA2-256
33,021,779 UART: [kat] SHA2-384
33,024,449 UART: [kat] SHA2-512-ACC
33,026,688 UART: [kat] ECC-384
36,269,058 UART: [kat] HMAC-384Kdf
36,275,071 UART: [kat] LMS
36,684,648 UART: [kat] --
40,660,447 UART: [rt] Verify complete
40,856,574 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,886,637 UART: [rt]cmd =0x46504c67, len=4
40,888,167 >>> mbox cmd response data (8 bytes)
40,888,506 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,918,483 UART: [rt]cmd =0x49444543, len=4
40,925,497 >>> mbox cmd response data (37 bytes)
40,926,085 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,955,742 UART: [rt]cmd =0x49444549, len=4
40,958,669 >>> mbox cmd response data (104 bytes)
40,959,547 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,989,372 UART: [rt]cmd =0x49444550, len=4
40,999,986 >>> mbox cmd response data (8 bytes)
41,000,392 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,030,101 UART: [rt]cmd =0x4c444556, len=4
41,041,347 >>> mbox cmd response data (687 bytes)
41,044,872 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,074,792 UART: [rt]cmd =0x43455246, len=4
41,087,912 >>> mbox cmd response data (920 bytes)
41,092,479 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,122,124 UART: [rt]cmd =0x43455252, len=4
41,133,530 >>> mbox cmd response data (784 bytes)
41,138,405 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,169,882 UART: [rt]cmd =0x53494756, len=196
42,461,519 >>> mbox cmd response data (8 bytes)
42,461,994 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,492,701 UART: [rt]cmd =0x4d454153, len=108
42,511,208 >>> mbox cmd response data (12 bytes)
42,511,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,541,226 UART: [rt]cmd =0x494e464f, len=4
42,545,552 >>> mbox cmd response data (312 bytes)
42,548,010 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,577,939 UART: [rt]cmd =0x54514754, len=24
42,580,582 >>> mbox cmd response data (8 bytes)
42,581,009 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,610,886 UART: [rt]cmd =0x47544744, len=8
42,613,812 >>> mbox cmd response data (104 bytes)
42,614,664 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,644,483 UART: [rt]cmd =0x50435252, len=8
42,646,434 >>> mbox cmd response data (8 bytes)
42,646,792 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,676,774 UART: [rt]cmd =0x50435251, len=36
43,832,315 >>> mbox cmd response data (1848 bytes)
43,841,215 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,871,484 UART: [rt]cmd =0x50435245, len=56
43,874,597 >>> mbox cmd response data (8 bytes)
43,874,993 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,904,880 UART: [rt]cmd =0x44504543, len=20
43,925,363 >>> mbox cmd response data (44 bytes)
43,926,061 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,955,927 UART: [rt]cmd =0x44504543, len=24
43,982,258 >>> mbox cmd response data (40 bytes)
43,982,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,013,297 UART: [rt]cmd =0x44504543, len=96
44,050,304 >>> mbox cmd response data (56 bytes)
44,051,082 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,081,449 UART: [rt]cmd =0x44504543, len=92
52,063,323 >>> mbox cmd response data (6284 bytes)
52,092,397 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,123,288 UART: [rt]cmd =0x44504543, len=136
57,684,530 >>> mbox cmd response data (136 bytes)
57,685,731 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,715,779 UART: [rt]cmd =0x44504543, len=40
57,742,064 >>> mbox cmd response data (40 bytes)
57,742,760 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,772,830 UART: [rt]cmd =0x44504543, len=28
57,815,888 >>> mbox cmd response data (2076 bytes)
57,825,846 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,856,140 UART: [rt]cmd =0x44504543, len=36
57,885,619 >>> mbox cmd response data (24 bytes)
57,886,193 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
57,916,062 UART: [rt]cmd =0x4453424c, len=4
61,159,168 >>> mbox cmd response data (8 bytes)
61,159,665 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,189,485 UART: [rt]cmd =0x46505344, len=4
61,298,774 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,127,100 ready_for_fw is high
4,127,707 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,063,149 >>> mbox cmd response: success
18,066,262 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,696,365 UART:
23,696,792 UART: Running Caliptra FMC ...
23,697,935 UART:
23,698,088 UART: [state] CFI Enabled
23,705,874 UART: [fht] FMC Alias Private Key: 7
26,036,616 UART: [art] Extend RT PCRs Done
26,037,853 UART: [art] Lock RT PCRs Done
26,039,490 UART: [art] Populate DV Done
26,045,077 UART: [fht] FMC Alias Private Key: 7
26,046,788 UART: [art] Derive CDI
26,047,610 UART: [art] Store in in slot 0x4
26,090,080 UART: [art] Derive Key Pair
26,091,129 UART: [art] Store priv key in slot 0x5
29,333,034 UART: [art] Derive Key Pair - Done
29,345,653 UART: [art] Signing Cert with AUTHO
29,346,992 UART: RITY.KEYID = 7
31,626,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,626 UART: [art] PUB.X = C08921D4DAE2C795A691B134B10E61A96A0B6ABD8C0EA39B72D589117CA5BE6307A1F603A90C5921D7FED0181EB85A4C
31,634,881 UART: [art] PUB.Y = 272128E68D366A1D33830B086FCE26AA83D1C5A0634278B861D976C6D63DFC52B507BA35A5BBDD3B9CD64CB9E3A39163
31,642,133 UART: [art] SIG.R = 2F01E401B9CA87786E4C433CF4E832EBA60EEA16A4B67D5FE420B72E8719D49051DC43AA8FAF43E1263FDA92D645F644
31,649,527 UART: [art] SIG.S = D02983C4CA6B5EBEAF87B157A49FC448023ECC3E28B0E5018CCCA0374E318BECB8FA28B28B88DB89859CD4F772EAB929
32,955,217 UART: Caliptra RT
32,955,931 UART: [state] CFI Enabled
33,073,695 UART: [rt] RT listening for mailbox commands...
33,105,321 UART: [rt]cmd =0x46505652, len=4
33,106,602 UART: [rt] FIPS Version
33,107,712 >>> mbox cmd response data (36 bytes)
33,108,452 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,137,995 UART: [rt]cmd =0x46504c54, len=4
33,139,530 >>> mbox cmd response data (8 bytes)
33,139,875 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,170,165 UART: [rt]cmd =0x46504c67, len=4
33,171,451 >>> mbox cmd response: failed
33,172,645 UART: [rt] FIPS self test
33,173,630 UART: [kat] ++
33,174,077 UART: [kat] sha1
33,178,398 UART: [kat] SHA2-256
33,180,204 UART: [kat] SHA2-384
33,182,874 UART: [kat] SHA2-512-ACC
33,185,095 UART: [kat] ECC-384
36,427,822 UART: [kat] HMAC-384Kdf
36,433,623 UART: [kat] LMS
36,843,156 UART: [kat] --
40,797,956 UART: [rt] Verify complete
41,015,066 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,044,935 UART: [rt]cmd =0x46504c67, len=4
41,046,453 >>> mbox cmd response data (8 bytes)
41,046,815 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,076,468 UART: [rt]cmd =0x49444543, len=4
41,083,402 >>> mbox cmd response data (37 bytes)
41,083,982 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,113,918 UART: [rt]cmd =0x49444549, len=4
41,116,723 >>> mbox cmd response data (104 bytes)
41,117,606 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,147,363 UART: [rt]cmd =0x49444550, len=4
41,157,898 >>> mbox cmd response data (8 bytes)
41,158,297 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,187,897 UART: [rt]cmd =0x4c444556, len=4
41,199,018 >>> mbox cmd response data (687 bytes)
41,202,561 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,232,411 UART: [rt]cmd =0x43455246, len=4
41,245,443 >>> mbox cmd response data (920 bytes)
41,249,994 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,279,755 UART: [rt]cmd =0x43455252, len=4
41,291,090 >>> mbox cmd response data (783 bytes)
41,295,818 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,327,535 UART: [rt]cmd =0x53494756, len=196
42,619,170 >>> mbox cmd response data (8 bytes)
42,619,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,650,207 UART: [rt]cmd =0x4d454153, len=108
42,669,446 >>> mbox cmd response data (12 bytes)
42,669,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,699,596 UART: [rt]cmd =0x494e464f, len=4
42,704,014 >>> mbox cmd response data (312 bytes)
42,706,225 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,736,382 UART: [rt]cmd =0x54514754, len=24
42,738,816 >>> mbox cmd response data (8 bytes)
42,739,228 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,768,883 UART: [rt]cmd =0x47544744, len=8
42,771,541 >>> mbox cmd response data (104 bytes)
42,772,395 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,802,190 UART: [rt]cmd =0x50435252, len=8
42,804,080 >>> mbox cmd response data (8 bytes)
42,804,427 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,834,489 UART: [rt]cmd =0x50435251, len=36
43,989,508 >>> mbox cmd response data (1848 bytes)
43,998,431 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,028,682 UART: [rt]cmd =0x50435245, len=56
44,031,821 >>> mbox cmd response data (8 bytes)
44,032,273 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,061,974 UART: [rt]cmd =0x44504543, len=20
44,082,066 >>> mbox cmd response data (44 bytes)
44,082,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,112,749 UART: [rt]cmd =0x44504543, len=24
44,139,045 >>> mbox cmd response data (40 bytes)
44,139,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,170,317 UART: [rt]cmd =0x44504543, len=96
44,207,126 >>> mbox cmd response data (56 bytes)
44,207,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,238,459 UART: [rt]cmd =0x44504543, len=92
52,219,503 >>> mbox cmd response data (6284 bytes)
52,248,870 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,279,878 UART: [rt]cmd =0x44504543, len=136
57,840,468 >>> mbox cmd response data (136 bytes)
57,841,692 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,871,822 UART: [rt]cmd =0x44504543, len=40
57,897,755 >>> mbox cmd response data (40 bytes)
57,898,432 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,928,551 UART: [rt]cmd =0x44504543, len=28
57,971,032 >>> mbox cmd response data (2076 bytes)
57,981,104 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,011,457 UART: [rt]cmd =0x44504543, len=36
58,041,164 >>> mbox cmd response data (24 bytes)
58,041,738 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,071,416 UART: [rt]cmd =0x4453424c, len=4
61,314,034 >>> mbox cmd response data (8 bytes)
61,314,525 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,344,199 UART: [rt]cmd =0x46505344, len=4
61,453,924 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,425 UART:
192,827 UART: Running Caliptra ROM ...
194,035 UART:
194,196 UART: [state] CFI Enabled
265,888 UART: [state] LifecycleState = Unprovisioned
267,751 UART: [state] DebugLocked = No
268,924 UART: [state] WD Timer not started. Device not locked for debugging
273,254 UART: [kat] SHA2-256
452,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,942 UART: [kat] ++
464,478 UART: [kat] sha1
475,148 UART: [kat] SHA2-256
478,155 UART: [kat] SHA2-384
484,928 UART: [kat] SHA2-512-ACC
487,880 UART: [kat] ECC-384
2,948,403 UART: [kat] HMAC-384Kdf
2,971,880 UART: [kat] LMS
3,501,293 UART: [kat] --
3,505,109 UART: [cold-reset] ++
3,507,481 UART: [fht] FHT @ 0x50003400
3,518,958 UART: [idev] ++
3,519,522 UART: [idev] CDI.KEYID = 6
3,520,511 UART: [idev] SUBJECT.KEYID = 7
3,521,688 UART: [idev] UDS.KEYID = 0
3,522,618 ready_for_fw is high
3,522,818 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,666,359 UART: [idev] Erasing UDS.KEYID = 0
6,026,156 UART: [idev] Sha1 KeyId Algorithm
6,050,060 UART: [idev] --
6,054,913 UART: [ldev] ++
6,055,498 UART: [ldev] CDI.KEYID = 6
6,056,422 UART: [ldev] SUBJECT.KEYID = 5
6,057,470 UART: [ldev] AUTHORITY.KEYID = 7
6,058,833 UART: [ldev] FE.KEYID = 1
6,102,813 UART: [ldev] Erasing FE.KEYID = 1
8,604,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,584 UART: [ldev] --
10,414,521 UART: [fwproc] Wait for Commands...
10,417,049 UART: [fwproc] Recv command 0x46574c44
10,419,148 UART: [fwproc] Recv'd Img size: 114084 bytes
13,823,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,459 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,284,572 >>> mbox cmd response: success
14,287,550 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,289,742 UART: [afmc] ++
14,290,333 UART: [afmc] CDI.KEYID = 6
14,291,250 UART: [afmc] SUBJECT.KEYID = 7
14,292,411 UART: [afmc] AUTHORITY.KEYID = 5
16,832,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,308 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,178 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,405 UART: [afmc] --
18,633,384 UART: [cold-reset] --
18,636,278 UART: [state] Locking Datavault
18,641,850 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,492 UART: [state] Locking ICCM
18,646,103 UART: [exit] Launching FMC @ 0x40000130
18,654,516 UART:
18,654,749 UART: Running Caliptra FMC ...
18,655,775 UART:
18,655,922 UART: [state] CFI Enabled
18,714,799 UART: [fht] FMC Alias Private Key: 7
20,478,467 UART: [art] Extend RT PCRs Done
20,479,683 UART: [art] Lock RT PCRs Done
20,481,117 UART: [art] Populate DV Done
20,486,585 UART: [fht] FMC Alias Private Key: 7
20,488,277 UART: [art] Derive CDI
20,489,011 UART: [art] Store in in slot 0x4
20,546,674 UART: [art] Derive Key Pair
20,547,711 UART: [art] Store priv key in slot 0x5
23,010,845 UART: [art] Derive Key Pair - Done
23,023,948 UART: [art] Signing Cert with AUTHO
23,025,252 UART: RITY.KEYID = 7
24,737,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,077 UART: [art] PUB.X = A2317F3B2EC705540776B3D7B9FCD878D63F732B10EA958DCE036271FF0820C05134344AE4AD5520902C7BC4678D4CA5
24,746,306 UART: [art] PUB.Y = DE9A2F851B5AA8679D9093E8380638429861FE70DF8B54F600C0F3085D8D074007BCF8A15C8DC3F920594DE85F2341FD
24,753,575 UART: [art] SIG.R = 1312F493C6AC76996F273534CBFBF5B8E5E1DE46118E849B378F8BF70B4835160A5053021D7BEA319DC67D1E53B21629
24,760,950 UART: [art] SIG.S = 71E5A9C7B570E470A48A8D4DA7ADEC8A347F198184AC8986E9111FF3C37DB820CBBB397A5132BE92745449CED00C7537
25,740,078 UART: Caliptra RT
25,740,778 UART: [state] CFI Enabled
25,907,156 UART: [rt] RT listening for mailbox commands...
25,938,303 UART: [rt]cmd =0x46505652, len=4
25,939,544 UART: [rt] FIPS Version
25,940,815 >>> mbox cmd response data (36 bytes)
25,941,441 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,971,217 UART: [rt]cmd =0x46504c54, len=4
25,972,561 >>> mbox cmd response data (8 bytes)
25,972,904 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,002,285 UART: [rt]cmd =0x46504c67, len=4
26,003,598 >>> mbox cmd response: failed
26,004,500 UART: [rt] FIPS self test
26,005,354 UART: [kat] ++
26,005,799 UART: [kat] sha1
26,010,121 UART: [kat] SHA2-256
26,011,919 UART: [kat] SHA2-384
26,014,796 UART: [kat] SHA2-512-ACC
26,017,004 UART: [kat] ECC-384
28,456,438 UART: [kat] HMAC-384Kdf
28,482,816 UART: [kat] LMS
28,680,123 UART: [kat] --
32,008,586 UART: [rt] Verify complete
32,142,699 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,172,706 UART: [rt]cmd =0x46504c67, len=4
32,174,248 >>> mbox cmd response data (8 bytes)
32,174,636 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,204,266 UART: [rt]cmd =0x49444543, len=4
32,211,070 >>> mbox cmd response data (37 bytes)
32,211,677 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,241,490 UART: [rt]cmd =0x49444549, len=4
32,244,092 >>> mbox cmd response data (104 bytes)
32,244,966 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,274,401 UART: [rt]cmd =0x49444550, len=4
32,284,997 >>> mbox cmd response data (8 bytes)
32,285,420 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,314,963 UART: [rt]cmd =0x4c444556, len=4
32,326,179 >>> mbox cmd response data (687 bytes)
32,329,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,359,693 UART: [rt]cmd =0x43455246, len=4
32,372,175 >>> mbox cmd response data (887 bytes)
32,376,588 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,406,657 UART: [rt]cmd =0x43455252, len=4
32,418,028 >>> mbox cmd response data (782 bytes)
32,422,733 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,454,171 UART: [rt]cmd =0x53494756, len=196
33,419,681 >>> mbox cmd response data (8 bytes)
33,420,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,450,967 UART: [rt]cmd =0x4d454153, len=108
33,469,580 >>> mbox cmd response data (12 bytes)
33,470,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,499,506 UART: [rt]cmd =0x494e464f, len=4
33,503,929 >>> mbox cmd response data (312 bytes)
33,506,322 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,536,345 UART: [rt]cmd =0x54514754, len=24
33,538,992 >>> mbox cmd response data (8 bytes)
33,539,404 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,569,001 UART: [rt]cmd =0x47544744, len=8
33,572,045 >>> mbox cmd response data (104 bytes)
33,572,947 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,602,858 UART: [rt]cmd =0x50435252, len=8
33,604,706 >>> mbox cmd response data (8 bytes)
33,605,037 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,635,238 UART: [rt]cmd =0x50435251, len=36
34,544,069 >>> mbox cmd response data (1848 bytes)
34,553,010 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,583,166 UART: [rt]cmd =0x50435245, len=56
34,586,403 >>> mbox cmd response data (8 bytes)
34,586,850 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,616,806 UART: [rt]cmd =0x44504543, len=20
34,636,976 >>> mbox cmd response data (44 bytes)
34,637,703 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,667,496 UART: [rt]cmd =0x44504543, len=24
34,704,387 >>> mbox cmd response data (40 bytes)
34,705,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,735,536 UART: [rt]cmd =0x44504543, len=96
34,775,288 >>> mbox cmd response data (56 bytes)
34,776,072 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,806,442 UART: [rt]cmd =0x44504543, len=92
40,907,379 >>> mbox cmd response data (6284 bytes)
40,936,629 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,967,579 UART: [rt]cmd =0x44504543, len=136
45,195,335 >>> mbox cmd response data (136 bytes)
45,196,531 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,226,683 UART: [rt]cmd =0x44504543, len=40
45,263,804 >>> mbox cmd response data (40 bytes)
45,264,504 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,294,522 UART: [rt]cmd =0x44504543, len=28
45,337,349 >>> mbox cmd response data (2076 bytes)
45,347,285 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,377,627 UART: [rt]cmd =0x44504543, len=36
45,407,404 >>> mbox cmd response data (24 bytes)
45,408,010 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,437,782 UART: [rt]cmd =0x4453424c, len=4
47,905,887 >>> mbox cmd response data (8 bytes)
47,906,884 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,936,736 UART: [rt]cmd =0x46505344, len=4
48,046,297 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,375,850 ready_for_fw is high
3,376,509 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,080,751 >>> mbox cmd response: success
14,083,828 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,359,151 UART:
18,359,543 UART: Running Caliptra FMC ...
18,360,804 UART:
18,360,977 UART: [state] CFI Enabled
18,425,793 UART: [fht] FMC Alias Private Key: 7
20,189,896 UART: [art] Extend RT PCRs Done
20,191,118 UART: [art] Lock RT PCRs Done
20,192,752 UART: [art] Populate DV Done
20,197,984 UART: [fht] FMC Alias Private Key: 7
20,199,596 UART: [art] Derive CDI
20,200,424 UART: [art] Store in in slot 0x4
20,258,312 UART: [art] Derive Key Pair
20,259,306 UART: [art] Store priv key in slot 0x5
22,722,693 UART: [art] Derive Key Pair - Done
22,735,693 UART: [art] Signing Cert with AUTHO
22,737,004 UART: RITY.KEYID = 7
24,448,606 UART: [art] Erasing AUTHORITY.KEYID = 7
24,450,114 UART: [art] PUB.X = C1135FDF3EC25EDFD2FF8C13491F3AA5759373D2A7CAE5FB0C721F56E48CDFA47CAF64ECC263A3F01958797583B36F86
24,457,378 UART: [art] PUB.Y = 8713F3681A4E2EE28309EC596E2E9497954B548F4801A0626B88E4BF3482538F3FE6C4EE4ADD0B35ABA07DBD9053F61B
24,464,667 UART: [art] SIG.R = 43FCAAB9EB3EED88DB6ADDACD21587889586B0367F56093830C726A0387E9F5B3506BEBD20FB7441E949B6DDE2B8817B
24,472,089 UART: [art] SIG.S = 0294670152096B3FA4D8BBAF5ECE8AE7ABABE0A8F02826C2497ECABE231A21FD8DBB0AF7C355B4559342A9CA03058CE2
25,450,832 UART: Caliptra RT
25,451,522 UART: [state] CFI Enabled
25,615,915 UART: [rt] RT listening for mailbox commands...
25,647,334 UART: [rt]cmd =0x46505652, len=4
25,648,667 UART: [rt] FIPS Version
25,649,883 >>> mbox cmd response data (36 bytes)
25,650,517 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,680,268 UART: [rt]cmd =0x46504c54, len=4
25,681,805 >>> mbox cmd response data (8 bytes)
25,682,140 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,712,165 UART: [rt]cmd =0x46504c67, len=4
25,713,667 >>> mbox cmd response: failed
25,714,676 UART: [rt] FIPS self test
25,715,643 UART: [kat] ++
25,716,095 UART: [kat] sha1
25,720,439 UART: [kat] SHA2-256
25,722,272 UART: [kat] SHA2-384
25,725,285 UART: [kat] SHA2-512-ACC
25,727,528 UART: [kat] ECC-384
28,168,072 UART: [kat] HMAC-384Kdf
28,194,913 UART: [kat] LMS
28,392,185 UART: [kat] --
31,700,766 UART: [rt] Verify complete
31,852,500 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,882,190 UART: [rt]cmd =0x46504c67, len=4
31,883,692 >>> mbox cmd response data (8 bytes)
31,884,040 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,913,584 UART: [rt]cmd =0x49444543, len=4
31,920,727 >>> mbox cmd response data (37 bytes)
31,921,314 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,951,066 UART: [rt]cmd =0x49444549, len=4
31,953,766 >>> mbox cmd response data (104 bytes)
31,954,684 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,984,392 UART: [rt]cmd =0x49444550, len=4
31,994,876 >>> mbox cmd response data (8 bytes)
31,995,281 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,024,983 UART: [rt]cmd =0x4c444556, len=4
32,036,078 >>> mbox cmd response data (687 bytes)
32,039,627 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,069,497 UART: [rt]cmd =0x43455246, len=4
32,082,422 >>> mbox cmd response data (887 bytes)
32,086,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,116,586 UART: [rt]cmd =0x43455252, len=4
32,127,975 >>> mbox cmd response data (782 bytes)
32,132,675 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,164,131 UART: [rt]cmd =0x53494756, len=196
33,129,624 >>> mbox cmd response data (8 bytes)
33,130,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,160,876 UART: [rt]cmd =0x4d454153, len=108
33,179,473 >>> mbox cmd response data (12 bytes)
33,179,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,209,725 UART: [rt]cmd =0x494e464f, len=4
33,214,055 >>> mbox cmd response data (312 bytes)
33,216,275 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,246,595 UART: [rt]cmd =0x54514754, len=24
33,249,392 >>> mbox cmd response data (8 bytes)
33,249,826 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,279,704 UART: [rt]cmd =0x47544744, len=8
33,282,740 >>> mbox cmd response data (104 bytes)
33,283,600 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,313,303 UART: [rt]cmd =0x50435252, len=8
33,315,356 >>> mbox cmd response data (8 bytes)
33,315,782 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,345,819 UART: [rt]cmd =0x50435251, len=36
34,255,265 >>> mbox cmd response data (1848 bytes)
34,264,169 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,294,556 UART: [rt]cmd =0x50435245, len=56
34,297,663 >>> mbox cmd response data (8 bytes)
34,298,115 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,327,953 UART: [rt]cmd =0x44504543, len=20
34,347,974 >>> mbox cmd response data (44 bytes)
34,348,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,378,654 UART: [rt]cmd =0x44504543, len=24
34,415,896 >>> mbox cmd response data (40 bytes)
34,416,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,447,011 UART: [rt]cmd =0x44504543, len=96
34,487,385 >>> mbox cmd response data (56 bytes)
34,488,133 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,518,400 UART: [rt]cmd =0x44504543, len=92
40,618,399 >>> mbox cmd response data (6284 bytes)
40,647,655 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,678,832 UART: [rt]cmd =0x44504543, len=136
44,906,328 >>> mbox cmd response data (136 bytes)
44,907,559 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,937,470 UART: [rt]cmd =0x44504543, len=40
44,975,807 >>> mbox cmd response data (40 bytes)
44,976,491 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,006,306 UART: [rt]cmd =0x44504543, len=28
45,049,123 >>> mbox cmd response data (2076 bytes)
45,059,036 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,089,253 UART: [rt]cmd =0x44504543, len=36
45,118,413 >>> mbox cmd response data (24 bytes)
45,118,996 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,148,657 UART: [rt]cmd =0x4453424c, len=4
47,617,835 >>> mbox cmd response data (8 bytes)
47,618,363 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,648,105 UART: [rt]cmd =0x46505344, len=4
47,757,730 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,585 UART:
192,954 UART: Running Caliptra ROM ...
194,157 UART:
603,660 UART: [state] CFI Enabled
619,026 UART: [state] LifecycleState = Unprovisioned
620,918 UART: [state] DebugLocked = No
623,093 UART: [state] WD Timer not started. Device not locked for debugging
626,721 UART: [kat] SHA2-256
805,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,480 UART: [kat] ++
818,017 UART: [kat] sha1
829,047 UART: [kat] SHA2-256
832,065 UART: [kat] SHA2-384
837,663 UART: [kat] SHA2-512-ACC
840,643 UART: [kat] ECC-384
3,280,759 UART: [kat] HMAC-384Kdf
3,294,313 UART: [kat] LMS
3,823,815 UART: [kat] --
3,829,117 UART: [cold-reset] ++
3,831,693 UART: [fht] FHT @ 0x50003400
3,841,755 UART: [idev] ++
3,842,326 UART: [idev] CDI.KEYID = 6
3,843,239 UART: [idev] SUBJECT.KEYID = 7
3,844,419 UART: [idev] UDS.KEYID = 0
3,845,474 ready_for_fw is high
3,845,724 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,989,142 UART: [idev] Erasing UDS.KEYID = 0
6,317,058 UART: [idev] Sha1 KeyId Algorithm
6,339,645 UART: [idev] --
6,344,936 UART: [ldev] ++
6,345,507 UART: [ldev] CDI.KEYID = 6
6,346,387 UART: [ldev] SUBJECT.KEYID = 5
6,347,619 UART: [ldev] AUTHORITY.KEYID = 7
6,348,857 UART: [ldev] FE.KEYID = 1
6,360,724 UART: [ldev] Erasing FE.KEYID = 1
8,833,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,183 UART: [ldev] --
10,623,638 UART: [fwproc] Wait for Commands...
10,625,246 UART: [fwproc] Recv command 0x46574c44
10,627,337 UART: [fwproc] Recv'd Img size: 114084 bytes
14,026,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,484,673 >>> mbox cmd response: success
14,487,631 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,489,468 UART: [afmc] ++
14,490,056 UART: [afmc] CDI.KEYID = 6
14,490,972 UART: [afmc] SUBJECT.KEYID = 7
14,492,186 UART: [afmc] AUTHORITY.KEYID = 5
16,993,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,762 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,510 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,222 UART: [afmc] --
18,788,542 UART: [cold-reset] --
18,791,212 UART: [state] Locking Datavault
18,796,025 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,679 UART: [state] Locking ICCM
18,799,905 UART: [exit] Launching FMC @ 0x40000130
18,808,357 UART:
18,808,591 UART: Running Caliptra FMC ...
18,809,693 UART:
18,809,853 UART: [state] CFI Enabled
18,818,386 UART: [fht] FMC Alias Private Key: 7
20,575,252 UART: [art] Extend RT PCRs Done
20,576,473 UART: [art] Lock RT PCRs Done
20,577,893 UART: [art] Populate DV Done
20,583,091 UART: [fht] FMC Alias Private Key: 7
20,584,788 UART: [art] Derive CDI
20,585,602 UART: [art] Store in in slot 0x4
20,628,254 UART: [art] Derive Key Pair
20,629,292 UART: [art] Store priv key in slot 0x5
23,056,159 UART: [art] Derive Key Pair - Done
23,069,155 UART: [art] Signing Cert with AUTHO
23,070,475 UART: RITY.KEYID = 7
24,775,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,477 UART: [art] PUB.X = 75BA577452F196D488062FE48754A7F69DDBAEA88E23B8B4F0048E7CD6065CBDD27E9C693C7B3C95EDC11B3A30E142B1
24,784,722 UART: [art] PUB.Y = 68F7EC4F14CC4FF96717190A2047825B4A7603BF6A7F039C35CCE173FC00A33E891FCAE4386A61BBDBAC7E0FA7F2922C
24,792,007 UART: [art] SIG.R = 8FB24D95D7A5E0217D010F62A10399883EB5DCE0282FF1B8F740226A528A968762D778209C5E0E1A295C967B6547DBA3
24,799,348 UART: [art] SIG.S = 41F7B166E283715BFDB4B07D9B9D25329F4193D5C6B14A37FF53C834A8497B20BB6ECD3E8487FD16A35E7A999468DA53
25,777,597 UART: Caliptra RT
25,778,301 UART: [state] CFI Enabled
25,896,505 UART: [rt] RT listening for mailbox commands...
25,927,756 UART: [rt]cmd =0x46505652, len=4
25,929,054 UART: [rt] FIPS Version
25,930,432 >>> mbox cmd response data (36 bytes)
25,931,107 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,960,834 UART: [rt]cmd =0x46504c54, len=4
25,962,345 >>> mbox cmd response data (8 bytes)
25,962,702 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,993,123 UART: [rt]cmd =0x46504c67, len=4
25,994,416 >>> mbox cmd response: failed
25,995,724 UART: [rt] FIPS self test
25,996,659 UART: [kat] ++
25,997,109 UART: [kat] sha1
26,001,457 UART: [kat] SHA2-256
26,003,259 UART: [kat] SHA2-384
26,006,323 UART: [kat] SHA2-512-ACC
26,008,541 UART: [kat] ECC-384
28,435,839 UART: [kat] HMAC-384Kdf
28,441,706 UART: [kat] LMS
28,639,000 UART: [kat] --
31,967,491 UART: [rt] Verify complete
32,133,500 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,163,614 UART: [rt]cmd =0x46504c67, len=4
32,165,250 >>> mbox cmd response data (8 bytes)
32,165,628 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,195,327 UART: [rt]cmd =0x49444543, len=4
32,202,291 >>> mbox cmd response data (37 bytes)
32,202,894 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,232,548 UART: [rt]cmd =0x49444549, len=4
32,235,318 >>> mbox cmd response data (104 bytes)
32,236,193 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,265,930 UART: [rt]cmd =0x49444550, len=4
32,276,701 >>> mbox cmd response data (8 bytes)
32,277,139 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,306,953 UART: [rt]cmd =0x4c444556, len=4
32,318,143 >>> mbox cmd response data (687 bytes)
32,321,639 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,351,438 UART: [rt]cmd =0x43455246, len=4
32,364,037 >>> mbox cmd response data (887 bytes)
32,368,485 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,398,356 UART: [rt]cmd =0x43455252, len=4
32,409,759 >>> mbox cmd response data (783 bytes)
32,414,480 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,445,997 UART: [rt]cmd =0x53494756, len=196
33,411,510 >>> mbox cmd response data (8 bytes)
33,412,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,442,718 UART: [rt]cmd =0x4d454153, len=108
33,462,032 >>> mbox cmd response data (12 bytes)
33,462,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,492,231 UART: [rt]cmd =0x494e464f, len=4
33,496,597 >>> mbox cmd response data (312 bytes)
33,499,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,529,083 UART: [rt]cmd =0x54514754, len=24
33,531,513 >>> mbox cmd response data (8 bytes)
33,531,926 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,561,653 UART: [rt]cmd =0x47544744, len=8
33,565,012 >>> mbox cmd response data (104 bytes)
33,565,881 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,595,888 UART: [rt]cmd =0x50435252, len=8
33,597,675 >>> mbox cmd response data (8 bytes)
33,598,005 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,627,963 UART: [rt]cmd =0x50435251, len=36
34,535,675 >>> mbox cmd response data (1848 bytes)
34,544,570 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,574,834 UART: [rt]cmd =0x50435245, len=56
34,577,904 >>> mbox cmd response data (8 bytes)
34,578,341 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,608,024 UART: [rt]cmd =0x44504543, len=20
34,628,142 >>> mbox cmd response data (44 bytes)
34,628,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,658,877 UART: [rt]cmd =0x44504543, len=24
34,684,961 >>> mbox cmd response data (40 bytes)
34,685,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,716,045 UART: [rt]cmd =0x44504543, len=96
34,752,331 >>> mbox cmd response data (56 bytes)
34,753,065 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,783,384 UART: [rt]cmd =0x44504543, len=92
40,801,416 >>> mbox cmd response data (6284 bytes)
40,830,501 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,861,549 UART: [rt]cmd =0x44504543, len=136
45,033,225 >>> mbox cmd response data (136 bytes)
45,034,410 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,064,660 UART: [rt]cmd =0x44504543, len=40
45,090,698 >>> mbox cmd response data (40 bytes)
45,091,401 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,121,254 UART: [rt]cmd =0x44504543, len=28
45,163,865 >>> mbox cmd response data (2076 bytes)
45,173,800 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,204,101 UART: [rt]cmd =0x44504543, len=36
45,233,306 >>> mbox cmd response data (24 bytes)
45,233,857 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,263,530 UART: [rt]cmd =0x4453424c, len=4
47,690,887 >>> mbox cmd response data (8 bytes)
47,691,376 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,721,312 UART: [rt]cmd =0x46505344, len=4
47,830,646 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,697,817 ready_for_fw is high
3,698,477 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,260,254 >>> mbox cmd response: success
14,263,316 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,509,831 UART:
18,510,200 UART: Running Caliptra FMC ...
18,511,389 UART:
18,511,556 UART: [state] CFI Enabled
18,519,222 UART: [fht] FMC Alias Private Key: 7
20,275,943 UART: [art] Extend RT PCRs Done
20,277,169 UART: [art] Lock RT PCRs Done
20,278,636 UART: [art] Populate DV Done
20,284,221 UART: [fht] FMC Alias Private Key: 7
20,285,785 UART: [art] Derive CDI
20,286,537 UART: [art] Store in in slot 0x4
20,329,362 UART: [art] Derive Key Pair
20,330,381 UART: [art] Store priv key in slot 0x5
22,757,309 UART: [art] Derive Key Pair - Done
22,770,285 UART: [art] Signing Cert with AUTHO
22,771,623 UART: RITY.KEYID = 7
24,477,352 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,852 UART: [art] PUB.X = 237F1AC0A6242ED376CEE24F1394540ECBFEF343D582D0F9E4D1D4745706EA295772D1F73FBA60DDC1792B358D3F5C31
24,486,154 UART: [art] PUB.Y = 916AD41BDEF2865A1C0ABAB74CECB92BC207ED579A6932E946AC10427CD3CF49E93A29A1E716F71A0CE9488136A75C4E
24,493,399 UART: [art] SIG.R = 40E879EA423E91EDB9337888DC08B6821590D2C6686FC0A2A494DE42927D4C3A0D1AF78E6A3B2A159270F797466188EC
24,500,805 UART: [art] SIG.S = 067902BC9E35272ADBFD479EF060130DEC3DA3139D63FCB177A9EB6938A214CC99719DC257BD3AD6802AE61E72A57DAD
25,479,844 UART: Caliptra RT
25,480,542 UART: [state] CFI Enabled
25,597,378 UART: [rt] RT listening for mailbox commands...
25,628,839 UART: [rt]cmd =0x46505652, len=4
25,630,140 UART: [rt] FIPS Version
25,631,405 >>> mbox cmd response data (36 bytes)
25,632,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,661,495 UART: [rt]cmd =0x46504c54, len=4
25,663,220 >>> mbox cmd response data (8 bytes)
25,663,568 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,693,965 UART: [rt]cmd =0x46504c67, len=4
25,695,360 >>> mbox cmd response: failed
25,696,598 UART: [rt] FIPS self test
25,697,558 UART: [kat] ++
25,698,010 UART: [kat] sha1
25,702,407 UART: [kat] SHA2-256
25,704,207 UART: [kat] SHA2-384
25,706,995 UART: [kat] SHA2-512-ACC
25,709,209 UART: [kat] ECC-384
28,136,251 UART: [kat] HMAC-384Kdf
28,142,193 UART: [kat] LMS
28,339,481 UART: [kat] --
31,647,728 UART: [rt] Verify complete
31,834,294 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,864,251 UART: [rt]cmd =0x46504c67, len=4
31,865,836 >>> mbox cmd response data (8 bytes)
31,866,171 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,895,931 UART: [rt]cmd =0x49444543, len=4
31,902,946 >>> mbox cmd response data (37 bytes)
31,903,540 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,933,245 UART: [rt]cmd =0x49444549, len=4
31,935,953 >>> mbox cmd response data (104 bytes)
31,936,834 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,966,735 UART: [rt]cmd =0x49444550, len=4
31,977,306 >>> mbox cmd response data (8 bytes)
31,977,718 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,007,532 UART: [rt]cmd =0x4c444556, len=4
32,018,509 >>> mbox cmd response data (687 bytes)
32,022,013 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,052,022 UART: [rt]cmd =0x43455246, len=4
32,064,680 >>> mbox cmd response data (887 bytes)
32,069,096 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,098,841 UART: [rt]cmd =0x43455252, len=4
32,110,248 >>> mbox cmd response data (782 bytes)
32,114,931 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,146,291 UART: [rt]cmd =0x53494756, len=196
33,111,831 >>> mbox cmd response data (8 bytes)
33,112,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,142,769 UART: [rt]cmd =0x4d454153, len=108
33,161,545 >>> mbox cmd response data (12 bytes)
33,161,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,191,521 UART: [rt]cmd =0x494e464f, len=4
33,195,939 >>> mbox cmd response data (312 bytes)
33,198,420 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,228,501 UART: [rt]cmd =0x54514754, len=24
33,230,900 >>> mbox cmd response data (8 bytes)
33,231,315 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,261,152 UART: [rt]cmd =0x47544744, len=8
33,264,443 >>> mbox cmd response data (104 bytes)
33,265,305 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,294,963 UART: [rt]cmd =0x50435252, len=8
33,296,757 >>> mbox cmd response data (8 bytes)
33,297,087 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,326,825 UART: [rt]cmd =0x50435251, len=36
34,234,812 >>> mbox cmd response data (1848 bytes)
34,243,726 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,274,054 UART: [rt]cmd =0x50435245, len=56
34,277,074 >>> mbox cmd response data (8 bytes)
34,277,521 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,307,428 UART: [rt]cmd =0x44504543, len=20
34,327,770 >>> mbox cmd response data (44 bytes)
34,328,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,358,305 UART: [rt]cmd =0x44504543, len=24
34,384,628 >>> mbox cmd response data (40 bytes)
34,385,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,416,128 UART: [rt]cmd =0x44504543, len=96
34,452,815 >>> mbox cmd response data (56 bytes)
34,453,590 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,483,901 UART: [rt]cmd =0x44504543, len=92
40,502,132 >>> mbox cmd response data (6284 bytes)
40,531,362 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,562,416 UART: [rt]cmd =0x44504543, len=136
44,733,751 >>> mbox cmd response data (136 bytes)
44,734,934 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,765,048 UART: [rt]cmd =0x44504543, len=40
44,790,850 >>> mbox cmd response data (40 bytes)
44,791,521 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
44,821,454 UART: [rt]cmd =0x44504543, len=28
44,864,407 >>> mbox cmd response data (2076 bytes)
44,874,348 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
44,904,588 UART: [rt]cmd =0x44504543, len=36
44,934,065 >>> mbox cmd response data (24 bytes)
44,934,663 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,964,649 UART: [rt]cmd =0x4453424c, len=4
47,391,979 >>> mbox cmd response data (8 bytes)
47,392,479 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,422,251 UART: [rt]cmd =0x46505344, len=4
47,531,646 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,261 UART:
192,607 UART: Running Caliptra ROM ...
193,790 UART:
193,945 UART: [state] CFI Enabled
263,411 UART: [state] LifecycleState = Unprovisioned
265,840 UART: [state] DebugLocked = No
267,242 UART: [state] WD Timer not started. Device not locked for debugging
272,000 UART: [kat] SHA2-256
461,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,690 UART: [kat] ++
473,200 UART: [kat] sha1
484,578 UART: [kat] SHA2-256
487,591 UART: [kat] SHA2-384
493,304 UART: [kat] SHA2-512-ACC
495,895 UART: [kat] ECC-384
2,948,467 UART: [kat] HMAC-384Kdf
2,972,291 UART: [kat] LMS
3,504,070 UART: [kat] --
3,508,779 UART: [cold-reset] ++
3,511,289 UART: [fht] FHT @ 0x50003400
3,522,705 UART: [idev] ++
3,523,417 UART: [idev] CDI.KEYID = 6
3,524,406 UART: [idev] SUBJECT.KEYID = 7
3,525,582 UART: [idev] UDS.KEYID = 0
3,526,509 ready_for_fw is high
3,526,705 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,580 UART: [idev] Erasing UDS.KEYID = 0
6,031,322 UART: [idev] Sha1 KeyId Algorithm
6,054,622 UART: [idev] --
6,060,409 UART: [ldev] ++
6,061,136 UART: [ldev] CDI.KEYID = 6
6,062,028 UART: [ldev] SUBJECT.KEYID = 5
6,063,139 UART: [ldev] AUTHORITY.KEYID = 7
6,064,380 UART: [ldev] FE.KEYID = 1
6,099,044 UART: [ldev] Erasing FE.KEYID = 1
8,601,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,634 UART: [ldev] --
10,413,899 UART: [fwproc] Wait for Commands...
10,417,102 UART: [fwproc] Recv command 0x46574c44
10,419,428 UART: [fwproc] Recv'd Img size: 114084 bytes
13,863,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,760 >>> mbox cmd response: success
14,603,764 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,604,484 UART: [afmc] ++
14,605,193 UART: [afmc] CDI.KEYID = 6
14,606,440 UART: [afmc] SUBJECT.KEYID = 7
14,607,875 UART: [afmc] AUTHORITY.KEYID = 5
17,138,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,863,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,865,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,880,708 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,895,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,910,863 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,064 UART: [afmc] --
18,938,399 UART: [cold-reset] --
18,941,662 UART: [state] Locking Datavault
18,946,708 UART: [state] Locking PCR0, PCR1 and PCR31
18,948,910 UART: [state] Locking ICCM
18,951,603 UART: [exit] Launching FMC @ 0x40000130
18,960,226 UART:
18,960,458 UART: Running Caliptra FMC ...
18,961,562 UART:
18,961,723 UART: [state] CFI Enabled
19,022,866 UART: [fht] FMC Alias Private Key: 7
20,786,819 UART: [art] Extend RT PCRs Done
20,788,036 UART: [art] Lock RT PCRs Done
20,789,962 UART: [art] Populate DV Done
20,795,536 UART: [fht] FMC Alias Private Key: 7
20,797,198 UART: [art] Derive CDI
20,797,934 UART: [art] Store in in slot 0x4
20,854,793 UART: [art] Derive Key Pair
20,855,792 UART: [art] Store priv key in slot 0x5
23,319,591 UART: [art] Derive Key Pair - Done
23,332,641 UART: [art] Signing Cert with AUTHO
23,333,948 UART: RITY.KEYID = 7
25,045,367 UART: [art] Erasing AUTHORITY.KEYID = 7
25,046,882 UART: [art] PUB.X = A88FA2AAE354588101D4431B03A86D6D36DCC97CDA4871AC0B32338D0FB2AEF3050BA19AE89FAFED5EF4EBCF79FD5289
25,054,200 UART: [art] PUB.Y = 99D789E37E6396F39531061F4EE88DE4996E1D9A7935FF1A1957F855E12546920733A23409563E3A5FB2B31DCC103EE7
25,061,443 UART: [art] SIG.R = 82A759010EA463070D0C0E75B16333BBF899A8FC6FDE0AFDA7C811054864D91A7F5E48390C3A1548E86D714C98B0F603
25,068,846 UART: [art] SIG.S = 32198AB92AD654E0AB069EBFD18A502D8DE6B99C5C80939909D1F5D04F876FE3C14E5DA6A8B7DFD877C61D0321558820
26,047,762 UART: Caliptra RT
26,048,455 UART: [state] CFI Enabled
26,213,117 UART: [rt] RT listening for mailbox commands...
26,244,751 UART: [rt]cmd =0x46505652, len=4
26,246,047 UART: [rt] FIPS Version
26,247,325 >>> mbox cmd response data (36 bytes)
26,248,012 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,277,898 UART: [rt]cmd =0x46504c54, len=4
26,279,323 >>> mbox cmd response data (8 bytes)
26,279,661 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,309,917 UART: [rt]cmd =0x46504c67, len=4
26,311,245 >>> mbox cmd response: failed
26,312,107 UART: [rt] FIPS self test
26,312,951 UART: [kat] ++
26,313,389 UART: [kat] sha1
26,317,947 UART: [kat] SHA2-256
26,319,757 UART: [kat] SHA2-384
26,322,584 UART: [kat] SHA2-512-ACC
26,324,805 UART: [kat] ECC-384
28,762,157 UART: [kat] HMAC-384Kdf
28,788,647 UART: [kat] LMS
28,985,905 UART: [kat] --
32,315,241 UART: [rt] Verify complete
32,450,178 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,480,061 UART: [rt]cmd =0x46504c67, len=4
32,481,581 >>> mbox cmd response data (8 bytes)
32,481,935 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,511,850 UART: [rt]cmd =0x49444543, len=4
32,518,941 >>> mbox cmd response data (37 bytes)
32,519,530 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,549,128 UART: [rt]cmd =0x49444549, len=4
32,551,974 >>> mbox cmd response data (104 bytes)
32,552,859 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,582,513 UART: [rt]cmd =0x49444550, len=4
32,592,996 >>> mbox cmd response data (8 bytes)
32,593,398 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,623,300 UART: [rt]cmd =0x4c444556, len=4
32,634,364 >>> mbox cmd response data (687 bytes)
32,637,887 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,667,525 UART: [rt]cmd =0x43455246, len=4
32,680,114 >>> mbox cmd response data (887 bytes)
32,684,505 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,714,217 UART: [rt]cmd =0x43455252, len=4
32,725,665 >>> mbox cmd response data (783 bytes)
32,730,371 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,761,662 UART: [rt]cmd =0x53494756, len=196
33,726,909 >>> mbox cmd response data (8 bytes)
33,727,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,758,016 UART: [rt]cmd =0x4d454153, len=108
33,776,394 >>> mbox cmd response data (12 bytes)
33,776,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,806,432 UART: [rt]cmd =0x494e464f, len=4
33,810,838 >>> mbox cmd response data (312 bytes)
33,813,118 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,843,169 UART: [rt]cmd =0x54514754, len=24
33,845,907 >>> mbox cmd response data (8 bytes)
33,846,330 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,875,982 UART: [rt]cmd =0x47544744, len=8
33,879,286 >>> mbox cmd response data (104 bytes)
33,880,140 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,909,928 UART: [rt]cmd =0x50435252, len=8
33,911,966 >>> mbox cmd response data (8 bytes)
33,912,396 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,942,252 UART: [rt]cmd =0x50435251, len=36
34,849,877 >>> mbox cmd response data (1848 bytes)
34,859,281 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,889,527 UART: [rt]cmd =0x50435245, len=56
34,892,446 >>> mbox cmd response data (8 bytes)
34,892,840 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,922,621 UART: [rt]cmd =0x44504543, len=20
34,943,266 >>> mbox cmd response data (44 bytes)
34,944,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,973,923 UART: [rt]cmd =0x44504543, len=24
35,010,155 >>> mbox cmd response data (40 bytes)
35,010,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,041,261 UART: [rt]cmd =0x44504543, len=96
35,080,823 >>> mbox cmd response data (56 bytes)
35,081,580 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,112,238 UART: [rt]cmd =0x44504543, len=92
41,194,651 >>> mbox cmd response data (6284 bytes)
41,223,750 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,254,834 UART: [rt]cmd =0x44504543, len=136
45,482,923 >>> mbox cmd response data (136 bytes)
45,484,126 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,514,427 UART: [rt]cmd =0x44504543, len=40
45,551,672 >>> mbox cmd response data (40 bytes)
45,552,337 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,582,207 UART: [rt]cmd =0x44504543, len=28
45,624,742 >>> mbox cmd response data (2076 bytes)
45,634,644 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,664,942 UART: [rt]cmd =0x44504543, len=36
45,694,137 >>> mbox cmd response data (24 bytes)
45,694,703 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,724,356 UART: [rt]cmd =0x4453424c, len=4
48,193,301 >>> mbox cmd response data (8 bytes)
48,193,914 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,223,487 UART: [rt]cmd =0x46505344, len=4
48,333,009 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,439,834 ready_for_fw is high
3,440,221 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,755,828 >>> mbox cmd response: success
14,759,093 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,046,812 UART:
19,047,197 UART: Running Caliptra FMC ...
19,048,333 UART:
19,048,489 UART: [state] CFI Enabled
19,114,972 UART: [fht] FMC Alias Private Key: 7
20,878,726 UART: [art] Extend RT PCRs Done
20,879,953 UART: [art] Lock RT PCRs Done
20,881,858 UART: [art] Populate DV Done
20,887,386 UART: [fht] FMC Alias Private Key: 7
20,888,929 UART: [art] Derive CDI
20,889,666 UART: [art] Store in in slot 0x4
20,947,771 UART: [art] Derive Key Pair
20,948,813 UART: [art] Store priv key in slot 0x5
23,412,354 UART: [art] Derive Key Pair - Done
23,425,461 UART: [art] Signing Cert with AUTHO
23,426,762 UART: RITY.KEYID = 7
25,137,835 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,333 UART: [art] PUB.X = 8EC2D3AA19E9DBA40C2D6539E5843054C57D217D6CA5C64DAD5E2C627FE501C2D534DF06BC30DCD33757D586BEA1B7AF
25,146,644 UART: [art] PUB.Y = DE9016A4CDA3D44EE62F5E1FC2985D3503C77CF4BD5DAE382F7788C27DF58FF225E49805C91F06A858AB10555F55F3C5
25,153,887 UART: [art] SIG.R = 843C26AF647B11472E920EF04A01B27A3454F8351571712F123136E83D8F8F28BC2F3378731941DE65D7D156B19717B5
25,161,233 UART: [art] SIG.S = 3B120D69DEDF5DD7C23129E580F8F45C0C3290F7FE64785494CAED6A207C09A62EBB9028C808223CF3F0C9D35F18B203
26,140,149 UART: Caliptra RT
26,140,865 UART: [state] CFI Enabled
26,306,391 UART: [rt] RT listening for mailbox commands...
26,337,889 UART: [rt]cmd =0x46505652, len=4
26,339,144 UART: [rt] FIPS Version
26,340,519 >>> mbox cmd response data (36 bytes)
26,341,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,371,096 UART: [rt]cmd =0x46504c54, len=4
26,372,415 >>> mbox cmd response data (8 bytes)
26,372,756 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,402,901 UART: [rt]cmd =0x46504c67, len=4
26,404,177 >>> mbox cmd response: failed
26,405,247 UART: [rt] FIPS self test
26,406,234 UART: [kat] ++
26,406,682 UART: [kat] sha1
26,411,027 UART: [kat] SHA2-256
26,412,808 UART: [kat] SHA2-384
26,415,733 UART: [kat] SHA2-512-ACC
26,417,979 UART: [kat] ECC-384
28,855,152 UART: [kat] HMAC-384Kdf
28,881,587 UART: [kat] LMS
29,078,910 UART: [kat] --
32,387,215 UART: [rt] Verify complete
32,543,607 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,573,276 UART: [rt]cmd =0x46504c67, len=4
32,574,902 >>> mbox cmd response data (8 bytes)
32,575,267 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,604,918 UART: [rt]cmd =0x49444543, len=4
32,611,903 >>> mbox cmd response data (37 bytes)
32,612,497 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,642,138 UART: [rt]cmd =0x49444549, len=4
32,645,101 >>> mbox cmd response data (104 bytes)
32,646,016 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,675,677 UART: [rt]cmd =0x49444550, len=4
32,686,272 >>> mbox cmd response data (8 bytes)
32,686,680 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,716,552 UART: [rt]cmd =0x4c444556, len=4
32,727,828 >>> mbox cmd response data (687 bytes)
32,731,346 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,760,982 UART: [rt]cmd =0x43455246, len=4
32,773,516 >>> mbox cmd response data (887 bytes)
32,777,906 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,807,656 UART: [rt]cmd =0x43455252, len=4
32,818,928 >>> mbox cmd response data (783 bytes)
32,823,634 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,854,914 UART: [rt]cmd =0x53494756, len=196
33,820,326 >>> mbox cmd response data (8 bytes)
33,820,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,851,355 UART: [rt]cmd =0x4d454153, len=108
33,870,278 >>> mbox cmd response data (12 bytes)
33,870,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,900,418 UART: [rt]cmd =0x494e464f, len=4
33,904,804 >>> mbox cmd response data (312 bytes)
33,906,999 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,937,185 UART: [rt]cmd =0x54514754, len=24
33,939,756 >>> mbox cmd response data (8 bytes)
33,940,174 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,969,993 UART: [rt]cmd =0x47544744, len=8
33,972,650 >>> mbox cmd response data (104 bytes)
33,973,511 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,003,446 UART: [rt]cmd =0x50435252, len=8
34,005,499 >>> mbox cmd response data (8 bytes)
34,005,932 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,035,632 UART: [rt]cmd =0x50435251, len=36
34,944,154 >>> mbox cmd response data (1848 bytes)
34,953,277 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,983,837 UART: [rt]cmd =0x50435245, len=56
34,987,030 >>> mbox cmd response data (8 bytes)
34,987,483 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,017,445 UART: [rt]cmd =0x44504543, len=20
35,037,388 >>> mbox cmd response data (44 bytes)
35,038,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,068,138 UART: [rt]cmd =0x44504543, len=24
35,103,891 >>> mbox cmd response data (40 bytes)
35,104,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,135,097 UART: [rt]cmd =0x44504543, len=96
35,174,335 >>> mbox cmd response data (56 bytes)
35,175,082 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,205,351 UART: [rt]cmd =0x44504543, len=92
41,306,671 >>> mbox cmd response data (6284 bytes)
41,336,338 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,367,512 UART: [rt]cmd =0x44504543, len=136
45,594,146 >>> mbox cmd response data (136 bytes)
45,595,365 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,625,787 UART: [rt]cmd =0x44504543, len=40
45,662,853 >>> mbox cmd response data (40 bytes)
45,663,517 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,693,434 UART: [rt]cmd =0x44504543, len=28
45,735,914 >>> mbox cmd response data (2076 bytes)
45,745,807 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,775,890 UART: [rt]cmd =0x44504543, len=36
45,805,295 >>> mbox cmd response data (24 bytes)
45,805,878 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,835,545 UART: [rt]cmd =0x4453424c, len=4
48,305,671 >>> mbox cmd response data (8 bytes)
48,306,178 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,336,108 UART: [rt]cmd =0x46505344, len=4
48,445,711 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,279 UART:
192,654 UART: Running Caliptra ROM ...
193,857 UART:
603,348 UART: [state] CFI Enabled
615,377 UART: [state] LifecycleState = Unprovisioned
617,696 UART: [state] DebugLocked = No
619,161 UART: [state] WD Timer not started. Device not locked for debugging
623,632 UART: [kat] SHA2-256
813,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,306 UART: [kat] ++
824,917 UART: [kat] sha1
836,086 UART: [kat] SHA2-256
839,101 UART: [kat] SHA2-384
846,234 UART: [kat] SHA2-512-ACC
848,829 UART: [kat] ECC-384
3,290,502 UART: [kat] HMAC-384Kdf
3,302,870 UART: [kat] LMS
3,834,688 UART: [kat] --
3,839,824 UART: [cold-reset] ++
3,841,285 UART: [fht] FHT @ 0x50003400
3,853,905 UART: [idev] ++
3,854,547 UART: [idev] CDI.KEYID = 6
3,855,587 UART: [idev] SUBJECT.KEYID = 7
3,856,692 UART: [idev] UDS.KEYID = 0
3,857,636 ready_for_fw is high
3,857,833 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,001,128 UART: [idev] Erasing UDS.KEYID = 0
6,327,638 UART: [idev] Sha1 KeyId Algorithm
6,350,882 UART: [idev] --
6,354,444 UART: [ldev] ++
6,355,125 UART: [ldev] CDI.KEYID = 6
6,356,008 UART: [ldev] SUBJECT.KEYID = 5
6,357,227 UART: [ldev] AUTHORITY.KEYID = 7
6,358,465 UART: [ldev] FE.KEYID = 1
6,370,492 UART: [ldev] Erasing FE.KEYID = 1
8,848,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,787 UART: [ldev] --
10,642,084 UART: [fwproc] Wait for Commands...
10,643,808 UART: [fwproc] Recv command 0x46574c44
10,646,062 UART: [fwproc] Recv'd Img size: 114084 bytes
14,093,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,828,143 >>> mbox cmd response: success
14,831,021 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,832,919 UART: [afmc] ++
14,833,618 UART: [afmc] CDI.KEYID = 6
14,834,824 UART: [afmc] SUBJECT.KEYID = 7
14,836,258 UART: [afmc] AUTHORITY.KEYID = 5
17,342,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,495 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,191 UART: [afmc] --
19,142,554 UART: [cold-reset] --
19,146,796 UART: [state] Locking Datavault
19,152,369 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,514 UART: [state] Locking ICCM
19,156,987 UART: [exit] Launching FMC @ 0x40000130
19,165,653 UART:
19,165,890 UART: Running Caliptra FMC ...
19,167,013 UART:
19,167,176 UART: [state] CFI Enabled
19,175,171 UART: [fht] FMC Alias Private Key: 7
20,931,627 UART: [art] Extend RT PCRs Done
20,932,858 UART: [art] Lock RT PCRs Done
20,934,323 UART: [art] Populate DV Done
20,939,636 UART: [fht] FMC Alias Private Key: 7
20,941,120 UART: [art] Derive CDI
20,941,882 UART: [art] Store in in slot 0x4
20,984,627 UART: [art] Derive Key Pair
20,985,697 UART: [art] Store priv key in slot 0x5
23,412,184 UART: [art] Derive Key Pair - Done
23,424,748 UART: [art] Signing Cert with AUTHO
23,426,051 UART: RITY.KEYID = 7
25,131,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,911 UART: [art] PUB.X = 51F501FD18AEA79E2A78B3CF4399F640D888950AA87D29211FFC513F34C92915DFE7B9DB7FC0175B4CD26D58C1F87CA7
25,140,165 UART: [art] PUB.Y = 67ACF5B55496943C58FC5A7AF9528E3269EEED2A07E90AD040F7E3FCF479E1D66CE59B9C180170896B8424E76BAA3F9A
25,147,446 UART: [art] SIG.R = 2357DED26E31F2ABEFF3AE795AB069052C3E905AE9B13D475594A5D70CEB5EF4B828A736C43AE44D0468BA052C8D6C3C
25,154,844 UART: [art] SIG.S = 98A1785A13118F7DEFD384D098B7E5CC52636E3A9DD9DAC213FA1B882A5D327E6ECA8637D9926FFBC1CC5400C87D7CE9
26,133,376 UART: Caliptra RT
26,134,066 UART: [state] CFI Enabled
26,251,256 UART: [rt] RT listening for mailbox commands...
26,282,554 UART: [rt]cmd =0x46505652, len=4
26,283,804 UART: [rt] FIPS Version
26,285,015 >>> mbox cmd response data (36 bytes)
26,285,735 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,315,673 UART: [rt]cmd =0x46504c54, len=4
26,317,177 >>> mbox cmd response data (8 bytes)
26,317,528 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,347,873 UART: [rt]cmd =0x46504c67, len=4
26,349,218 >>> mbox cmd response: failed
26,350,483 UART: [rt] FIPS self test
26,351,438 UART: [kat] ++
26,351,890 UART: [kat] sha1
26,356,311 UART: [kat] SHA2-256
26,358,102 UART: [kat] SHA2-384
26,360,790 UART: [kat] SHA2-512-ACC
26,363,042 UART: [kat] ECC-384
28,790,196 UART: [kat] HMAC-384Kdf
28,795,998 UART: [kat] LMS
28,993,257 UART: [kat] --
32,322,715 UART: [rt] Verify complete
32,488,279 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,518,098 UART: [rt]cmd =0x46504c67, len=4
32,519,798 >>> mbox cmd response data (8 bytes)
32,520,149 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,549,706 UART: [rt]cmd =0x49444543, len=4
32,556,560 >>> mbox cmd response data (37 bytes)
32,557,174 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,586,885 UART: [rt]cmd =0x49444549, len=4
32,589,758 >>> mbox cmd response data (104 bytes)
32,590,633 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,620,319 UART: [rt]cmd =0x49444550, len=4
32,631,036 >>> mbox cmd response data (8 bytes)
32,631,487 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,661,202 UART: [rt]cmd =0x4c444556, len=4
32,672,337 >>> mbox cmd response data (687 bytes)
32,675,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,705,643 UART: [rt]cmd =0x43455246, len=4
32,718,362 >>> mbox cmd response data (887 bytes)
32,722,804 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,752,556 UART: [rt]cmd =0x43455252, len=4
32,763,911 >>> mbox cmd response data (783 bytes)
32,768,600 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,799,926 UART: [rt]cmd =0x53494756, len=196
33,765,366 >>> mbox cmd response data (8 bytes)
33,765,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,796,561 UART: [rt]cmd =0x4d454153, len=108
33,815,011 >>> mbox cmd response data (12 bytes)
33,815,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,845,214 UART: [rt]cmd =0x494e464f, len=4
33,849,425 >>> mbox cmd response data (312 bytes)
33,851,879 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,882,064 UART: [rt]cmd =0x54514754, len=24
33,884,712 >>> mbox cmd response data (8 bytes)
33,885,123 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,915,034 UART: [rt]cmd =0x47544744, len=8
33,917,918 >>> mbox cmd response data (104 bytes)
33,918,791 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,948,561 UART: [rt]cmd =0x50435252, len=8
33,950,866 >>> mbox cmd response data (8 bytes)
33,951,282 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,981,404 UART: [rt]cmd =0x50435251, len=36
34,888,707 >>> mbox cmd response data (1848 bytes)
34,897,653 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,927,927 UART: [rt]cmd =0x50435245, len=56
34,930,951 >>> mbox cmd response data (8 bytes)
34,931,338 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,961,295 UART: [rt]cmd =0x44504543, len=20
34,981,845 >>> mbox cmd response data (44 bytes)
34,982,550 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,012,506 UART: [rt]cmd =0x44504543, len=24
35,039,088 >>> mbox cmd response data (40 bytes)
35,039,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,070,374 UART: [rt]cmd =0x44504543, len=96
35,107,800 >>> mbox cmd response data (56 bytes)
35,108,562 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,138,997 UART: [rt]cmd =0x44504543, len=92
41,156,079 >>> mbox cmd response data (6284 bytes)
41,185,160 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,216,080 UART: [rt]cmd =0x44504543, len=136
45,388,354 >>> mbox cmd response data (136 bytes)
45,389,554 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,419,433 UART: [rt]cmd =0x44504543, len=40
45,445,051 >>> mbox cmd response data (40 bytes)
45,445,752 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,475,717 UART: [rt]cmd =0x44504543, len=28
45,518,285 >>> mbox cmd response data (2076 bytes)
45,528,219 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,558,232 UART: [rt]cmd =0x44504543, len=36
45,587,475 >>> mbox cmd response data (24 bytes)
45,588,037 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,617,690 UART: [rt]cmd =0x4453424c, len=4
48,045,817 >>> mbox cmd response data (8 bytes)
48,046,309 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,076,257 UART: [rt]cmd =0x46505344, len=4
48,185,989 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,756,814 ready_for_fw is high
3,757,217 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,957,727 >>> mbox cmd response: success
14,961,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,211,284 UART:
19,211,668 UART: Running Caliptra FMC ...
19,212,807 UART:
19,212,962 UART: [state] CFI Enabled
19,220,780 UART: [fht] FMC Alias Private Key: 7
20,978,161 UART: [art] Extend RT PCRs Done
20,979,386 UART: [art] Lock RT PCRs Done
20,980,960 UART: [art] Populate DV Done
20,986,242 UART: [fht] FMC Alias Private Key: 7
20,987,840 UART: [art] Derive CDI
20,988,658 UART: [art] Store in in slot 0x4
21,030,827 UART: [art] Derive Key Pair
21,031,876 UART: [art] Store priv key in slot 0x5
23,458,256 UART: [art] Derive Key Pair - Done
23,471,471 UART: [art] Signing Cert with AUTHO
23,472,772 UART: RITY.KEYID = 7
25,178,149 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,657 UART: [art] PUB.X = 1F2C4B4189A77B446FC42553CA0EB94DE5ACF1F00DC3643B493A5B2268A3C3AD128DA10AE7E06147B98014C99C3E18CC
25,186,935 UART: [art] PUB.Y = 93E69FC55C7CB3D72FBE3B18D88E9C0890BEC33397180B5141598808D1600FEA7D0B5FF3D995F23625547F887E0783F0
25,194,187 UART: [art] SIG.R = 3F7A5F6E21C6BF9DDA70D9EEE39980C373E176A9A868BF2CB645D5ACD3CE46CEE5B92254D5E48D0D4F6A9E4820AA1058
25,201,560 UART: [art] SIG.S = 3D9F6679F3BE4C242FF3D09064AD2F95B3627CEA01EF91268458DC9F6E33A21C6FA3A220C86585B7ABDABA99045DC1EB
26,180,721 UART: Caliptra RT
26,181,436 UART: [state] CFI Enabled
26,298,119 UART: [rt] RT listening for mailbox commands...
26,329,414 UART: [rt]cmd =0x46505652, len=4
26,330,699 UART: [rt] FIPS Version
26,331,921 >>> mbox cmd response data (36 bytes)
26,332,658 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,362,492 UART: [rt]cmd =0x46504c54, len=4
26,363,978 >>> mbox cmd response data (8 bytes)
26,364,308 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,394,670 UART: [rt]cmd =0x46504c67, len=4
26,396,000 >>> mbox cmd response: failed
26,396,942 UART: [rt] FIPS self test
26,397,940 UART: [kat] ++
26,398,390 UART: [kat] sha1
26,402,814 UART: [kat] SHA2-256
26,404,609 UART: [kat] SHA2-384
26,407,295 UART: [kat] SHA2-512-ACC
26,409,507 UART: [kat] ECC-384
28,836,352 UART: [kat] HMAC-384Kdf
28,842,181 UART: [kat] LMS
29,039,470 UART: [kat] --
32,348,479 UART: [rt] Verify complete
32,534,380 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,564,132 UART: [rt]cmd =0x46504c67, len=4
32,565,756 >>> mbox cmd response data (8 bytes)
32,566,122 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,595,762 UART: [rt]cmd =0x49444543, len=4
32,602,691 >>> mbox cmd response data (37 bytes)
32,603,271 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,633,151 UART: [rt]cmd =0x49444549, len=4
32,635,793 >>> mbox cmd response data (104 bytes)
32,636,585 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,666,228 UART: [rt]cmd =0x49444550, len=4
32,676,880 >>> mbox cmd response data (8 bytes)
32,677,302 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,707,025 UART: [rt]cmd =0x4c444556, len=4
32,718,148 >>> mbox cmd response data (687 bytes)
32,721,661 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,751,457 UART: [rt]cmd =0x43455246, len=4
32,764,110 >>> mbox cmd response data (887 bytes)
32,768,504 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,798,208 UART: [rt]cmd =0x43455252, len=4
32,809,651 >>> mbox cmd response data (782 bytes)
32,814,345 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,845,852 UART: [rt]cmd =0x53494756, len=196
33,811,492 >>> mbox cmd response data (8 bytes)
33,811,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,842,399 UART: [rt]cmd =0x4d454153, len=108
33,860,289 >>> mbox cmd response data (12 bytes)
33,860,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,890,554 UART: [rt]cmd =0x494e464f, len=4
33,894,668 >>> mbox cmd response data (312 bytes)
33,897,145 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,926,975 UART: [rt]cmd =0x54514754, len=24
33,929,224 >>> mbox cmd response data (8 bytes)
33,929,650 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,959,525 UART: [rt]cmd =0x47544744, len=8
33,962,611 >>> mbox cmd response data (104 bytes)
33,963,470 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,993,330 UART: [rt]cmd =0x50435252, len=8
33,995,268 >>> mbox cmd response data (8 bytes)
33,995,616 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,025,519 UART: [rt]cmd =0x50435251, len=36
34,933,401 >>> mbox cmd response data (1848 bytes)
34,942,492 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,973,052 UART: [rt]cmd =0x50435245, len=56
34,976,215 >>> mbox cmd response data (8 bytes)
34,976,677 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,006,788 UART: [rt]cmd =0x44504543, len=20
35,027,157 >>> mbox cmd response data (44 bytes)
35,027,886 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,057,844 UART: [rt]cmd =0x44504543, len=24
35,083,982 >>> mbox cmd response data (40 bytes)
35,084,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,115,042 UART: [rt]cmd =0x44504543, len=96
35,152,018 >>> mbox cmd response data (56 bytes)
35,152,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,183,036 UART: [rt]cmd =0x44504543, len=92
41,202,385 >>> mbox cmd response data (6284 bytes)
41,232,059 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,263,171 UART: [rt]cmd =0x44504543, len=136
45,435,358 >>> mbox cmd response data (136 bytes)
45,437,080 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,467,327 UART: [rt]cmd =0x44504543, len=40
45,493,551 >>> mbox cmd response data (40 bytes)
45,494,225 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,524,270 UART: [rt]cmd =0x44504543, len=28
45,567,149 >>> mbox cmd response data (2076 bytes)
45,577,064 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,607,207 UART: [rt]cmd =0x44504543, len=36
45,636,293 >>> mbox cmd response data (24 bytes)
45,636,882 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,666,611 UART: [rt]cmd =0x4453424c, len=4
48,094,171 >>> mbox cmd response data (8 bytes)
48,094,668 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,124,333 UART: [rt]cmd =0x46505344, len=4
48,233,954 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,479 UART: [kat] SHA2-256
892,417 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,642 UART: [kat] HMAC-384Kdf
907,244 UART: [kat] LMS
1,475,440 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,599 UART: [fht] Storing FHT @ 0x50003400
1,479,414 UART: [idev] ++
1,479,582 UART: [idev] CDI.KEYID = 6
1,479,942 UART: [idev] SUBJECT.KEYID = 7
1,480,366 UART: [idev] UDS.KEYID = 0
1,480,711 ready_for_fw is high
1,480,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,832 UART: [idev] Erasing UDS.KEYID = 0
1,504,778 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,364 UART: [idev] --
1,514,573 UART: [ldev] ++
1,514,741 UART: [ldev] CDI.KEYID = 6
1,515,104 UART: [ldev] SUBJECT.KEYID = 5
1,515,530 UART: [ldev] AUTHORITY.KEYID = 7
1,515,993 UART: [ldev] FE.KEYID = 1
1,521,115 UART: [ldev] Erasing FE.KEYID = 1
1,546,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,166 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 114084 bytes
2,881,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,073,208 >>> mbox cmd response: success
3,073,208 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,074,400 UART: [afmc] ++
3,074,568 UART: [afmc] CDI.KEYID = 6
3,074,930 UART: [afmc] SUBJECT.KEYID = 7
3,075,355 UART: [afmc] AUTHORITY.KEYID = 5
3,110,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,288 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,068 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,681 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,371 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,388 UART: [afmc] --
3,154,286 UART: [cold-reset] --
3,155,024 UART: [state] Locking Datavault
3,156,169 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,773 UART: [state] Locking ICCM
3,157,223 UART: [exit] Launching FMC @ 0x40000130
3,162,552 UART:
3,162,568 UART: Running Caliptra FMC ...
3,162,976 UART:
3,163,030 UART: [state] CFI Enabled
3,173,441 UART: [fht] FMC Alias Private Key: 7
3,281,466 UART: [art] Extend RT PCRs Done
3,281,894 UART: [art] Lock RT PCRs Done
3,283,252 UART: [art] Populate DV Done
3,291,581 UART: [fht] FMC Alias Private Key: 7
3,292,759 UART: [art] Derive CDI
3,293,039 UART: [art] Store in in slot 0x4
3,378,538 UART: [art] Derive Key Pair
3,378,898 UART: [art] Store priv key in slot 0x5
3,392,318 UART: [art] Derive Key Pair - Done
3,407,166 UART: [art] Signing Cert with AUTHO
3,407,646 UART: RITY.KEYID = 7
3,422,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,485 UART: [art] PUB.X = 48B79B6367A8BC8726AA97FB2206FD77CE6570DCDD90118B651642B12C12127FB688B9544C3BE0A450A457D191B65C76
3,430,252 UART: [art] PUB.Y = 20DF748208D98E78A1A624F17A71DC8049CBDD718E85C58E362F7516FED291C964A20FDFFACC6F56621FA88905346C27
3,437,199 UART: [art] SIG.R = 6FAD1EB79628C290286682A029AC83F869997C06B4B4EE358A54F8FF29C77EDB6296BBABE310EAC5AF437B1B608C0E2E
3,443,977 UART: [art] SIG.S = 6AD211BFE4B3BBE1E4E30388B17FBEAA79C9010DC423D1DF85907378034DFA191804D96B188CC60EB4421C9317D89617
3,467,488 UART: Caliptra RT
3,467,741 UART: [state] CFI Enabled
3,576,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,865 UART: [rt]cmd =0x46505652, len=4
3,607,525 UART: [rt] FIPS Version
3,608,628 >>> mbox cmd response data (36 bytes)
3,608,629 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,922 UART: [rt]cmd =0x46504c54, len=4
3,638,984 >>> mbox cmd response data (8 bytes)
3,638,985 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,668,472 UART: [rt]cmd =0x46504c67, len=4
3,669,408 >>> mbox cmd response: failed
3,669,594 UART: [rt] FIPS self test
3,669,925 UART: [kat] ++
3,670,077 UART: [kat] sha1
3,674,394 UART: [kat] SHA2-256
3,676,324 UART: [kat] SHA2-384
3,679,117 UART: [kat] SHA2-512-ACC
3,681,012 UART: [kat] ECC-384
3,690,563 UART: [kat] HMAC-384Kdf
3,695,280 UART: [kat] LMS
3,944,171 UART: [kat] --
6,159,087 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,158 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,198,640 UART: [rt]cmd =0x46504c67, len=4
6,199,967 >>> mbox cmd response data (8 bytes)
6,199,968 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,229,481 UART: [rt]cmd =0x49444543, len=4
6,235,971 >>> mbox cmd response data (37 bytes)
6,235,972 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,265,209 UART: [rt]cmd =0x49444549, len=4
6,267,480 >>> mbox cmd response data (104 bytes)
6,267,481 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,296,762 UART: [rt]cmd =0x49444550, len=4
6,306,982 >>> mbox cmd response data (8 bytes)
6,306,983 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,336,598 UART: [rt]cmd =0x4c444556, len=4
6,347,069 >>> mbox cmd response data (687 bytes)
6,347,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,376,387 UART: [rt]cmd =0x43455246, len=4
6,388,694 >>> mbox cmd response data (920 bytes)
6,388,695 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,418,126 UART: [rt]cmd =0x43455252, len=4
6,428,840 >>> mbox cmd response data (782 bytes)
6,428,841 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,459,420 UART: [rt]cmd =0x53494756, len=196
6,464,538 >>> mbox cmd response data (8 bytes)
6,464,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,494 UART: [rt]cmd =0x4d454153, len=108
6,515,087 >>> mbox cmd response data (12 bytes)
6,515,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,544,401 UART: [rt]cmd =0x494e464f, len=4
6,548,046 >>> mbox cmd response data (312 bytes)
6,548,047 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,577,514 UART: [rt]cmd =0x54514754, len=24
6,579,896 >>> mbox cmd response data (8 bytes)
6,579,897 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,609,238 UART: [rt]cmd =0x47544744, len=8
6,611,692 >>> mbox cmd response data (104 bytes)
6,611,693 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,640,934 UART: [rt]cmd =0x50435252, len=8
6,642,602 >>> mbox cmd response data (8 bytes)
6,642,603 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,672,114 UART: [rt]cmd =0x50435251, len=36
6,839,589 >>> mbox cmd response data (1848 bytes)
6,839,590 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,868,963 UART: [rt]cmd =0x50435245, len=56
6,872,425 >>> mbox cmd response data (8 bytes)
6,872,426 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,901,955 UART: [rt]cmd =0x44504543, len=20
6,922,856 >>> mbox cmd response data (44 bytes)
6,922,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,952,396 UART: [rt]cmd =0x44504543, len=24
6,978,206 >>> mbox cmd response data (40 bytes)
6,978,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,008,172 UART: [rt]cmd =0x44504543, len=96
7,045,680 >>> mbox cmd response data (56 bytes)
7,045,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,075,872 UART: [rt]cmd =0x44504543, len=92
7,303,657 >>> mbox cmd response data (6284 bytes)
7,303,658 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,333,651 UART: [rt]cmd =0x44504543, len=136
7,400,448 >>> mbox cmd response data (136 bytes)
7,400,449 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,429,966 UART: [rt]cmd =0x44504543, len=40
7,455,895 >>> mbox cmd response data (40 bytes)
7,455,896 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,485,293 UART: [rt]cmd =0x44504543, len=28
7,528,724 >>> mbox cmd response data (2076 bytes)
7,528,725 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,558,518 UART: [rt]cmd =0x44504543, len=36
7,588,919 >>> mbox cmd response data (24 bytes)
7,588,920 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,618,523 UART: [rt]cmd =0x4453424c, len=4
7,631,982 >>> mbox cmd response data (8 bytes)
7,631,983 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,661,346 UART: [rt]cmd =0x46505344, len=4
7,769,390 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,597 ready_for_fw is high
1,362,597 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,923,468 >>> mbox cmd response: success
2,923,468 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,984,780 UART:
2,984,796 UART: Running Caliptra FMC ...
2,985,204 UART:
2,985,258 UART: [state] CFI Enabled
2,995,325 UART: [fht] FMC Alias Private Key: 7
3,102,826 UART: [art] Extend RT PCRs Done
3,103,254 UART: [art] Lock RT PCRs Done
3,104,706 UART: [art] Populate DV Done
3,112,681 UART: [fht] FMC Alias Private Key: 7
3,113,815 UART: [art] Derive CDI
3,114,095 UART: [art] Store in in slot 0x4
3,199,696 UART: [art] Derive Key Pair
3,200,056 UART: [art] Store priv key in slot 0x5
3,213,110 UART: [art] Derive Key Pair - Done
3,228,212 UART: [art] Signing Cert with AUTHO
3,228,692 UART: RITY.KEYID = 7
3,244,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,949 UART: [art] PUB.X = 5A9A656571AD88D747E0D94421C354039DBAD743A5422D29539AFFBA98393405A4391AD0C92D02D6891CFCE9856367F4
3,251,708 UART: [art] PUB.Y = 3CCEF67E534D33D13BAAC88626015DDEC6EC9A8BAA3EB4543FCCF91291ADE03564ECB15C96B7A60B7CEBD99BC537B0BE
3,258,682 UART: [art] SIG.R = 7AB8A7EDBAC5810FAA7D7C9EEBBB0A5ECC50673D7FCD41A385D8E4F7F6E0A105311DE086198E707EAE3BC6E0214F6AB0
3,265,471 UART: [art] SIG.S = 5F7C767E0582CEC29D75BE0B5792535E0A015D6201AF92FFFF8105C89E4CC5576581A5613488FBD0B52902D502871A7C
3,289,308 UART: Caliptra RT
3,289,561 UART: [state] CFI Enabled
3,398,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,749 UART: [rt]cmd =0x46505652, len=4
3,429,409 UART: [rt] FIPS Version
3,430,418 >>> mbox cmd response data (36 bytes)
3,430,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,876 UART: [rt]cmd =0x46504c54, len=4
3,461,130 >>> mbox cmd response data (8 bytes)
3,461,131 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,490,698 UART: [rt]cmd =0x46504c67, len=4
3,491,510 >>> mbox cmd response: failed
3,491,780 UART: [rt] FIPS self test
3,492,111 UART: [kat] ++
3,492,263 UART: [kat] sha1
3,496,518 UART: [kat] SHA2-256
3,498,448 UART: [kat] SHA2-384
3,501,121 UART: [kat] SHA2-512-ACC
3,503,016 UART: [kat] ECC-384
3,512,697 UART: [kat] HMAC-384Kdf
3,517,250 UART: [kat] LMS
3,766,141 UART: [kat] --
5,875,483 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,271 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,910,551 UART: [rt]cmd =0x46504c67, len=4
5,911,628 >>> mbox cmd response data (8 bytes)
5,911,629 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,942 UART: [rt]cmd =0x49444543, len=4
5,947,368 >>> mbox cmd response data (37 bytes)
5,947,369 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,976,864 UART: [rt]cmd =0x49444549, len=4
5,979,155 >>> mbox cmd response data (104 bytes)
5,979,156 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,008,565 UART: [rt]cmd =0x49444550, len=4
6,018,797 >>> mbox cmd response data (8 bytes)
6,018,798 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,047,893 UART: [rt]cmd =0x4c444556, len=4
6,058,422 >>> mbox cmd response data (687 bytes)
6,058,423 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,916 UART: [rt]cmd =0x43455246, len=4
6,100,215 >>> mbox cmd response data (920 bytes)
6,100,216 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,303 UART: [rt]cmd =0x43455252, len=4
6,140,027 >>> mbox cmd response data (782 bytes)
6,140,028 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,170,569 UART: [rt]cmd =0x53494756, len=196
6,175,937 >>> mbox cmd response data (8 bytes)
6,175,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,205,975 UART: [rt]cmd =0x4d454153, len=108
6,226,840 >>> mbox cmd response data (12 bytes)
6,226,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,256,388 UART: [rt]cmd =0x494e464f, len=4
6,260,059 >>> mbox cmd response data (312 bytes)
6,260,060 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,611 UART: [rt]cmd =0x54514754, len=24
6,291,679 >>> mbox cmd response data (8 bytes)
6,291,680 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,987 UART: [rt]cmd =0x47544744, len=8
6,323,339 >>> mbox cmd response data (104 bytes)
6,323,340 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,352,719 UART: [rt]cmd =0x50435252, len=8
6,354,361 >>> mbox cmd response data (8 bytes)
6,354,362 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,384,057 UART: [rt]cmd =0x50435251, len=36
6,551,378 >>> mbox cmd response data (1848 bytes)
6,551,379 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,112 UART: [rt]cmd =0x50435245, len=56
6,584,786 >>> mbox cmd response data (8 bytes)
6,584,787 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,614,180 UART: [rt]cmd =0x44504543, len=20
6,635,247 >>> mbox cmd response data (44 bytes)
6,635,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,664,693 UART: [rt]cmd =0x44504543, len=24
6,690,665 >>> mbox cmd response data (40 bytes)
6,690,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,720,597 UART: [rt]cmd =0x44504543, len=96
6,757,417 >>> mbox cmd response data (56 bytes)
6,757,418 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,787,241 UART: [rt]cmd =0x44504543, len=92
7,015,504 >>> mbox cmd response data (6284 bytes)
7,015,505 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,045,652 UART: [rt]cmd =0x44504543, len=136
7,112,935 >>> mbox cmd response data (136 bytes)
7,112,936 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,142,641 UART: [rt]cmd =0x44504543, len=40
7,169,026 >>> mbox cmd response data (40 bytes)
7,169,027 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,198,514 UART: [rt]cmd =0x44504543, len=28
7,241,871 >>> mbox cmd response data (2076 bytes)
7,241,872 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,271,525 UART: [rt]cmd =0x44504543, len=36
7,301,444 >>> mbox cmd response data (24 bytes)
7,301,445 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,330,828 UART: [rt]cmd =0x4453424c, len=4
7,344,753 >>> mbox cmd response data (8 bytes)
7,344,754 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,374,135 UART: [rt]cmd =0x46505344, len=4
7,482,421 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,248 UART: [kat] SHA2-256
882,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,294 UART: [kat] ++
886,446 UART: [kat] sha1
890,514 UART: [kat] SHA2-256
892,452 UART: [kat] SHA2-384
895,367 UART: [kat] SHA2-512-ACC
897,268 UART: [kat] ECC-384
902,941 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,928 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,505,751 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,592 UART: [ldev] ++
1,515,760 UART: [ldev] CDI.KEYID = 6
1,516,123 UART: [ldev] SUBJECT.KEYID = 5
1,516,549 UART: [ldev] AUTHORITY.KEYID = 7
1,517,012 UART: [ldev] FE.KEYID = 1
1,521,994 UART: [ldev] Erasing FE.KEYID = 1
1,547,271 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,399 UART: [ldev] --
1,586,798 UART: [fwproc] Waiting for Commands...
1,587,589 UART: [fwproc] Received command 0x46574c44
1,588,380 UART: [fwproc] Received Image of size 114084 bytes
2,884,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,580 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,337 >>> mbox cmd response: success
3,076,337 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,565 UART: [afmc] ++
3,077,733 UART: [afmc] CDI.KEYID = 6
3,078,095 UART: [afmc] SUBJECT.KEYID = 7
3,078,520 UART: [afmc] AUTHORITY.KEYID = 5
3,113,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,900 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,590 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,453 UART: [afmc] --
3,156,461 UART: [cold-reset] --
3,157,245 UART: [state] Locking Datavault
3,158,546 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,150 UART: [state] Locking ICCM
3,159,576 UART: [exit] Launching FMC @ 0x40000130
3,164,905 UART:
3,164,921 UART: Running Caliptra FMC ...
3,165,329 UART:
3,165,472 UART: [state] CFI Enabled
3,176,609 UART: [fht] FMC Alias Private Key: 7
3,284,392 UART: [art] Extend RT PCRs Done
3,284,820 UART: [art] Lock RT PCRs Done
3,286,356 UART: [art] Populate DV Done
3,294,433 UART: [fht] FMC Alias Private Key: 7
3,295,467 UART: [art] Derive CDI
3,295,747 UART: [art] Store in in slot 0x4
3,381,646 UART: [art] Derive Key Pair
3,382,006 UART: [art] Store priv key in slot 0x5
3,395,504 UART: [art] Derive Key Pair - Done
3,410,035 UART: [art] Signing Cert with AUTHO
3,410,515 UART: RITY.KEYID = 7
3,425,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,550 UART: [art] PUB.X = 11CC00D468968BCA58BFA493B40B5E67CC9F81FCDC8509619905E3295D26678E552B1646C799EDA838F1D5D3CB9914CB
3,433,295 UART: [art] PUB.Y = B1D6B303CAE0977C247BD58BA898DF8A54EE803B8DC03B3A8326BD57A37A3857D819EF16D320990E27C2EB577345E942
3,440,245 UART: [art] SIG.R = 13F82A424F3DED23FB0D2A9B7CB29B3E75BC22140A624A97C3A08EE8DE888A1B89CFAECB3CEDC78669F7DFDCE907C600
3,447,010 UART: [art] SIG.S = B419CC487ECBDE0DD891BE7D8C304856A4451D83F626A16CF5EB6850538C447F36BD8D7C4B0E43F635244F8559F02137
3,470,809 UART: Caliptra RT
3,471,154 UART: [state] CFI Enabled
3,579,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,611 UART: [rt]cmd =0x46505652, len=4
3,610,271 UART: [rt] FIPS Version
3,611,554 >>> mbox cmd response data (36 bytes)
3,611,555 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,898 UART: [rt]cmd =0x46504c54, len=4
3,642,242 >>> mbox cmd response data (8 bytes)
3,642,243 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,671,994 UART: [rt]cmd =0x46504c67, len=4
3,672,982 >>> mbox cmd response: failed
3,673,176 UART: [rt] FIPS self test
3,673,507 UART: [kat] ++
3,673,659 UART: [kat] sha1
3,677,882 UART: [kat] SHA2-256
3,679,812 UART: [kat] SHA2-384
3,682,575 UART: [kat] SHA2-512-ACC
3,684,470 UART: [kat] ECC-384
3,694,487 UART: [kat] HMAC-384Kdf
3,699,012 UART: [kat] LMS
3,947,903 UART: [kat] --
6,163,939 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,732 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,064 UART: [rt]cmd =0x46504c67, len=4
6,203,315 >>> mbox cmd response data (8 bytes)
6,203,316 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,232,585 UART: [rt]cmd =0x49444543, len=4
6,239,097 >>> mbox cmd response data (37 bytes)
6,239,098 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,305 UART: [rt]cmd =0x49444549, len=4
6,270,738 >>> mbox cmd response data (104 bytes)
6,270,739 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,116 UART: [rt]cmd =0x49444550, len=4
6,310,183 >>> mbox cmd response data (8 bytes)
6,310,184 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,483 UART: [rt]cmd =0x4c444556, len=4
6,350,060 >>> mbox cmd response data (687 bytes)
6,350,061 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,216 UART: [rt]cmd =0x43455246, len=4
6,391,487 >>> mbox cmd response data (920 bytes)
6,391,488 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,420,949 UART: [rt]cmd =0x43455252, len=4
6,431,759 >>> mbox cmd response data (783 bytes)
6,431,760 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,462,371 UART: [rt]cmd =0x53494756, len=196
6,467,739 >>> mbox cmd response data (8 bytes)
6,467,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,739 UART: [rt]cmd =0x4d454153, len=108
6,518,168 >>> mbox cmd response data (12 bytes)
6,518,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,547,566 UART: [rt]cmd =0x494e464f, len=4
6,551,347 >>> mbox cmd response data (312 bytes)
6,551,348 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,580,931 UART: [rt]cmd =0x54514754, len=24
6,582,899 >>> mbox cmd response data (8 bytes)
6,582,900 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,071 UART: [rt]cmd =0x47544744, len=8
6,614,845 >>> mbox cmd response data (104 bytes)
6,614,846 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,235 UART: [rt]cmd =0x50435252, len=8
6,645,919 >>> mbox cmd response data (8 bytes)
6,645,920 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,675,145 UART: [rt]cmd =0x50435251, len=36
6,842,700 >>> mbox cmd response data (1848 bytes)
6,842,701 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,872,594 UART: [rt]cmd =0x50435245, len=56
6,876,382 >>> mbox cmd response data (8 bytes)
6,876,383 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,954 UART: [rt]cmd =0x44504543, len=20
6,926,521 >>> mbox cmd response data (44 bytes)
6,926,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,956,103 UART: [rt]cmd =0x44504543, len=24
6,982,353 >>> mbox cmd response data (40 bytes)
6,982,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,012,145 UART: [rt]cmd =0x44504543, len=96
7,049,891 >>> mbox cmd response data (56 bytes)
7,049,892 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,079,833 UART: [rt]cmd =0x44504543, len=92
7,306,890 >>> mbox cmd response data (6284 bytes)
7,306,891 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,336,886 UART: [rt]cmd =0x44504543, len=136
7,404,227 >>> mbox cmd response data (136 bytes)
7,404,228 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,433,831 UART: [rt]cmd =0x44504543, len=40
7,459,848 >>> mbox cmd response data (40 bytes)
7,459,849 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,489,456 UART: [rt]cmd =0x44504543, len=28
7,533,183 >>> mbox cmd response data (2076 bytes)
7,533,184 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,562,953 UART: [rt]cmd =0x44504543, len=36
7,592,930 >>> mbox cmd response data (24 bytes)
7,592,931 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,622,262 UART: [rt]cmd =0x4453424c, len=4
7,636,255 >>> mbox cmd response data (8 bytes)
7,636,256 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,665,689 UART: [rt]cmd =0x46505344, len=4
7,773,941 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,432 ready_for_fw is high
1,362,432 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,905 >>> mbox cmd response: success
2,924,905 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,791 UART:
2,986,807 UART: Running Caliptra FMC ...
2,987,215 UART:
2,987,358 UART: [state] CFI Enabled
2,997,977 UART: [fht] FMC Alias Private Key: 7
3,105,954 UART: [art] Extend RT PCRs Done
3,106,382 UART: [art] Lock RT PCRs Done
3,108,054 UART: [art] Populate DV Done
3,116,351 UART: [fht] FMC Alias Private Key: 7
3,117,451 UART: [art] Derive CDI
3,117,731 UART: [art] Store in in slot 0x4
3,203,440 UART: [art] Derive Key Pair
3,203,800 UART: [art] Store priv key in slot 0x5
3,216,986 UART: [art] Derive Key Pair - Done
3,231,613 UART: [art] Signing Cert with AUTHO
3,232,093 UART: RITY.KEYID = 7
3,247,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,792 UART: [art] PUB.X = 37DD1F41B280509CE1A27F4C1730DDBC6F714B69C7584F5FD6DCF3D5A232ADBA22A3B16124A15913D60CE21DCCD27182
3,254,573 UART: [art] PUB.Y = 1ADA25C9A9AAAB3F937E13846AB9E4B6B3F5A1AFC93AA5F3869DAE3ABA3EBDE3E07D38FCBF046C8B3E8B4D9133EC671D
3,261,554 UART: [art] SIG.R = 49D6214CB716DA487712663DD1A9E9DE5EBBD34B4B6EEBEDD159F8DD9B0A070567D872D428D20FD11B7FF9A6286BD4C0
3,268,330 UART: [art] SIG.S = AF4A52D93ABFB6C3C4E3776C176B4D8931DCD0F488709766B38CF0DF3644D1CD5D5D29D0A92BE18B8A267E7544F53CAC
3,292,509 UART: Caliptra RT
3,292,854 UART: [state] CFI Enabled
3,401,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,069 UART: [rt]cmd =0x46505652, len=4
3,432,729 UART: [rt] FIPS Version
3,433,590 >>> mbox cmd response data (36 bytes)
3,433,591 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,974 UART: [rt]cmd =0x46504c54, len=4
3,463,984 >>> mbox cmd response data (8 bytes)
3,463,985 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,493,480 UART: [rt]cmd =0x46504c67, len=4
3,494,350 >>> mbox cmd response: failed
3,494,664 UART: [rt] FIPS self test
3,494,995 UART: [kat] ++
3,495,147 UART: [kat] sha1
3,499,262 UART: [kat] SHA2-256
3,501,192 UART: [kat] SHA2-384
3,503,977 UART: [kat] SHA2-512-ACC
3,505,872 UART: [kat] ECC-384
3,516,023 UART: [kat] HMAC-384Kdf
3,520,564 UART: [kat] LMS
3,769,455 UART: [kat] --
5,879,141 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,111 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,671 UART: [rt]cmd =0x46504c67, len=4
5,914,658 >>> mbox cmd response data (8 bytes)
5,914,659 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,944,222 UART: [rt]cmd =0x49444543, len=4
5,950,592 >>> mbox cmd response data (37 bytes)
5,950,593 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,980,110 UART: [rt]cmd =0x49444549, len=4
5,982,371 >>> mbox cmd response data (104 bytes)
5,982,372 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,459 UART: [rt]cmd =0x49444550, len=4
6,021,740 >>> mbox cmd response data (8 bytes)
6,021,741 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,942 UART: [rt]cmd =0x4c444556, len=4
6,061,309 >>> mbox cmd response data (687 bytes)
6,061,310 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,573 UART: [rt]cmd =0x43455246, len=4
6,102,946 >>> mbox cmd response data (920 bytes)
6,102,947 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,132,268 UART: [rt]cmd =0x43455252, len=4
6,143,254 >>> mbox cmd response data (783 bytes)
6,143,255 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,878 UART: [rt]cmd =0x53494756, len=196
6,179,242 >>> mbox cmd response data (8 bytes)
6,179,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,209,154 UART: [rt]cmd =0x4d454153, len=108
6,228,601 >>> mbox cmd response data (12 bytes)
6,228,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,257,881 UART: [rt]cmd =0x494e464f, len=4
6,261,466 >>> mbox cmd response data (312 bytes)
6,261,467 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,902 UART: [rt]cmd =0x54514754, len=24
6,292,990 >>> mbox cmd response data (8 bytes)
6,292,991 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,322,472 UART: [rt]cmd =0x47544744, len=8
6,324,880 >>> mbox cmd response data (104 bytes)
6,324,881 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,354,550 UART: [rt]cmd =0x50435252, len=8
6,356,136 >>> mbox cmd response data (8 bytes)
6,356,137 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,385,686 UART: [rt]cmd =0x50435251, len=36
6,552,923 >>> mbox cmd response data (1848 bytes)
6,552,924 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,582,829 UART: [rt]cmd =0x50435245, len=56
6,586,661 >>> mbox cmd response data (8 bytes)
6,586,662 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,616,083 UART: [rt]cmd =0x44504543, len=20
6,637,072 >>> mbox cmd response data (44 bytes)
6,637,073 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,666,646 UART: [rt]cmd =0x44504543, len=24
6,692,866 >>> mbox cmd response data (40 bytes)
6,692,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,722,910 UART: [rt]cmd =0x44504543, len=96
6,759,570 >>> mbox cmd response data (56 bytes)
6,759,571 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,789,386 UART: [rt]cmd =0x44504543, len=92
7,017,249 >>> mbox cmd response data (6284 bytes)
7,017,250 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,047,261 UART: [rt]cmd =0x44504543, len=136
7,115,052 >>> mbox cmd response data (136 bytes)
7,115,053 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,144,490 UART: [rt]cmd =0x44504543, len=40
7,170,569 >>> mbox cmd response data (40 bytes)
7,170,570 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,200,103 UART: [rt]cmd =0x44504543, len=28
7,243,444 >>> mbox cmd response data (2076 bytes)
7,243,445 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,272,928 UART: [rt]cmd =0x44504543, len=36
7,302,727 >>> mbox cmd response data (24 bytes)
7,302,728 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,332,223 UART: [rt]cmd =0x4453424c, len=4
7,346,224 >>> mbox cmd response data (8 bytes)
7,346,225 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,375,408 UART: [rt]cmd =0x46505344, len=4
7,483,836 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
893,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,285 UART: [kat] ++
897,437 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,676 UART: [kat] LMS
1,171,004 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,238 UART: [idev] ++
1,175,406 UART: [idev] CDI.KEYID = 6
1,175,766 UART: [idev] SUBJECT.KEYID = 7
1,176,190 UART: [idev] UDS.KEYID = 0
1,176,535 ready_for_fw is high
1,176,535 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,986 UART: [idev] Erasing UDS.KEYID = 0
1,201,145 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,948 UART: [fwproc] Wait for Commands...
1,283,708 UART: [fwproc] Recv command 0x46574c44
1,284,436 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,726 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,577 >>> mbox cmd response: success
2,771,577 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,785 UART: [afmc] ++
2,772,953 UART: [afmc] CDI.KEYID = 6
2,773,315 UART: [afmc] SUBJECT.KEYID = 7
2,773,740 UART: [afmc] AUTHORITY.KEYID = 5
2,809,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,676 UART: [afmc] --
2,852,710 UART: [cold-reset] --
2,853,616 UART: [state] Locking Datavault
2,855,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,789 UART: [state] Locking ICCM
2,856,311 UART: [exit] Launching FMC @ 0x40000130
2,861,640 UART:
2,861,656 UART: Running Caliptra FMC ...
2,862,064 UART:
2,862,118 UART: [state] CFI Enabled
2,872,689 UART: [fht] FMC Alias Private Key: 7
2,981,368 UART: [art] Extend RT PCRs Done
2,981,796 UART: [art] Lock RT PCRs Done
2,983,222 UART: [art] Populate DV Done
2,991,371 UART: [fht] FMC Alias Private Key: 7
2,992,541 UART: [art] Derive CDI
2,992,821 UART: [art] Store in in slot 0x4
3,078,490 UART: [art] Derive Key Pair
3,078,850 UART: [art] Store priv key in slot 0x5
3,092,128 UART: [art] Derive Key Pair - Done
3,106,878 UART: [art] Signing Cert with AUTHO
3,107,358 UART: RITY.KEYID = 7
3,122,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,405 UART: [art] PUB.X = 161606CAB613DF46544D72E095F8CFF3FC191D0A81267F3802C8F87CAEE94F3AF32378C1865D650107CDCBA587DF7C96
3,130,168 UART: [art] PUB.Y = B39A758DAB9A67A07ABEBB68AF1E0409377828778EE58E68ABE429F14EB00828C15309C6DC6A5F181C8F50E431161F8A
3,137,114 UART: [art] SIG.R = 711DF3BBFC8954C223C5A407D9AA781A55B476623A2B790C9C40F6E8BFAF2BA14A72B9B162BC068B2A7135EC474C0D3E
3,143,886 UART: [art] SIG.S = F3F642D43C1F1DF7FF085DE6060B8004259C606035FBCA5E4FB64A0DCC784BA414FEFA0191972A56AECDEB97DC52D992
3,167,411 UART: Caliptra RT
3,167,664 UART: [state] CFI Enabled
3,275,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,053 UART: [rt]cmd =0x46505652, len=4
3,306,713 UART: [rt] FIPS Version
3,307,788 >>> mbox cmd response data (36 bytes)
3,307,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,180 UART: [rt]cmd =0x46504c54, len=4
3,338,390 >>> mbox cmd response data (8 bytes)
3,338,391 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,212 UART: [rt]cmd =0x46504c67, len=4
3,369,204 >>> mbox cmd response: failed
3,369,566 UART: [rt] FIPS self test
3,369,897 UART: [kat] ++
3,370,049 UART: [kat] sha1
3,374,356 UART: [kat] SHA2-256
3,376,286 UART: [kat] SHA2-384
3,379,043 UART: [kat] SHA2-512-ACC
3,380,938 UART: [kat] ECC-384
3,390,911 UART: [kat] HMAC-384Kdf
3,395,436 UART: [kat] LMS
3,644,327 UART: [kat] --
5,869,065 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,953 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,313 UART: [rt]cmd =0x46504c67, len=4
5,909,510 >>> mbox cmd response data (8 bytes)
5,909,511 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,758 UART: [rt]cmd =0x49444543, len=4
5,945,188 >>> mbox cmd response data (37 bytes)
5,945,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,974,410 UART: [rt]cmd =0x49444549, len=4
5,976,689 >>> mbox cmd response data (104 bytes)
5,976,690 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,947 UART: [rt]cmd =0x49444550, len=4
6,016,135 >>> mbox cmd response data (8 bytes)
6,016,136 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,045,723 UART: [rt]cmd =0x4c444556, len=4
6,056,102 >>> mbox cmd response data (687 bytes)
6,056,103 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,085,346 UART: [rt]cmd =0x43455246, len=4
6,097,351 >>> mbox cmd response data (887 bytes)
6,097,352 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,541 UART: [rt]cmd =0x43455252, len=4
6,137,533 >>> mbox cmd response data (783 bytes)
6,137,534 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,967 UART: [rt]cmd =0x53494756, len=196
6,173,761 >>> mbox cmd response data (8 bytes)
6,173,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,949 UART: [rt]cmd =0x4d454153, len=108
6,224,244 >>> mbox cmd response data (12 bytes)
6,224,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,648 UART: [rt]cmd =0x494e464f, len=4
6,257,331 >>> mbox cmd response data (312 bytes)
6,257,332 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,897 UART: [rt]cmd =0x54514754, len=24
6,289,009 >>> mbox cmd response data (8 bytes)
6,289,010 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,318,341 UART: [rt]cmd =0x47544744, len=8
6,320,873 >>> mbox cmd response data (104 bytes)
6,320,874 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,350,217 UART: [rt]cmd =0x50435252, len=8
6,351,813 >>> mbox cmd response data (8 bytes)
6,351,814 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,293 UART: [rt]cmd =0x50435251, len=36
6,548,636 >>> mbox cmd response data (1848 bytes)
6,548,637 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,178 UART: [rt]cmd =0x50435245, len=56
6,581,756 >>> mbox cmd response data (8 bytes)
6,581,757 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,264 UART: [rt]cmd =0x44504543, len=20
6,632,041 >>> mbox cmd response data (44 bytes)
6,632,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,661,521 UART: [rt]cmd =0x44504543, len=24
6,687,505 >>> mbox cmd response data (40 bytes)
6,687,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,717,489 UART: [rt]cmd =0x44504543, len=96
6,754,209 >>> mbox cmd response data (56 bytes)
6,754,210 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,784,107 UART: [rt]cmd =0x44504543, len=92
7,012,867 >>> mbox cmd response data (6284 bytes)
7,012,868 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,941 UART: [rt]cmd =0x44504543, len=136
7,109,042 >>> mbox cmd response data (136 bytes)
7,109,043 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,898 UART: [rt]cmd =0x44504543, len=40
7,165,243 >>> mbox cmd response data (40 bytes)
7,165,244 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,805 UART: [rt]cmd =0x44504543, len=28
7,238,446 >>> mbox cmd response data (2076 bytes)
7,238,447 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,267,824 UART: [rt]cmd =0x44504543, len=36
7,298,155 >>> mbox cmd response data (24 bytes)
7,298,156 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,327,637 UART: [rt]cmd =0x4453424c, len=4
7,341,628 >>> mbox cmd response data (8 bytes)
7,341,629 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,096 UART: [rt]cmd =0x46505344, len=4
7,479,376 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,451 ready_for_fw is high
1,060,451 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,621,542 >>> mbox cmd response: success
2,621,542 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,683,716 UART:
2,683,732 UART: Running Caliptra FMC ...
2,684,140 UART:
2,684,194 UART: [state] CFI Enabled
2,694,633 UART: [fht] FMC Alias Private Key: 7
2,802,318 UART: [art] Extend RT PCRs Done
2,802,746 UART: [art] Lock RT PCRs Done
2,804,092 UART: [art] Populate DV Done
2,812,589 UART: [fht] FMC Alias Private Key: 7
2,813,653 UART: [art] Derive CDI
2,813,933 UART: [art] Store in in slot 0x4
2,899,602 UART: [art] Derive Key Pair
2,899,962 UART: [art] Store priv key in slot 0x5
2,913,024 UART: [art] Derive Key Pair - Done
2,927,770 UART: [art] Signing Cert with AUTHO
2,928,250 UART: RITY.KEYID = 7
2,942,970 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,735 UART: [art] PUB.X = 99656FA85DADCF074BE72A01504E7C82A96A48257992D0E6452496807FA36F12ED5BFAA3C4CBB9C142D20F24255E8BC1
2,950,504 UART: [art] PUB.Y = BFFCED4948E134EAA57766A0DE3051985B59AB9E3A394D21C823BF3841F5AB5B942B67D9799F473B6333ACD9E9DB0528
2,957,461 UART: [art] SIG.R = CD10F9EFADFF3B78BDA87F368C3612BB4008A991F354817C9B3B9AE7E9AE5913FB05B5178F2AD2F011E7904778FFFB78
2,964,241 UART: [art] SIG.S = CE4F49933849DB1B2EED4A2E814F4935031F32F06E1E5D1702A47E95EDE65800B6A6CA3515201CACF607321BC3C7B50F
2,988,304 UART: Caliptra RT
2,988,557 UART: [state] CFI Enabled
3,096,283 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,525 UART: [rt]cmd =0x46505652, len=4
3,127,185 UART: [rt] FIPS Version
3,128,306 >>> mbox cmd response data (36 bytes)
3,128,307 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,696 UART: [rt]cmd =0x46504c54, len=4
3,158,740 >>> mbox cmd response data (8 bytes)
3,158,741 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,188,500 UART: [rt]cmd =0x46504c67, len=4
3,189,408 >>> mbox cmd response: failed
3,189,606 UART: [rt] FIPS self test
3,189,937 UART: [kat] ++
3,190,089 UART: [kat] sha1
3,194,402 UART: [kat] SHA2-256
3,196,332 UART: [kat] SHA2-384
3,199,145 UART: [kat] SHA2-512-ACC
3,201,040 UART: [kat] ECC-384
3,210,709 UART: [kat] HMAC-384Kdf
3,215,256 UART: [kat] LMS
3,464,147 UART: [kat] --
5,584,127 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,168 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,618,342 UART: [rt]cmd =0x46504c67, len=4
5,619,469 >>> mbox cmd response data (8 bytes)
5,619,470 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,045 UART: [rt]cmd =0x49444543, len=4
5,655,273 >>> mbox cmd response data (37 bytes)
5,655,274 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,684,817 UART: [rt]cmd =0x49444549, len=4
5,687,166 >>> mbox cmd response data (104 bytes)
5,687,167 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,716,524 UART: [rt]cmd =0x49444550, len=4
5,726,853 >>> mbox cmd response data (8 bytes)
5,726,854 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,197 UART: [rt]cmd =0x4c444556, len=4
5,766,586 >>> mbox cmd response data (687 bytes)
5,766,587 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,006 UART: [rt]cmd =0x43455246, len=4
5,807,985 >>> mbox cmd response data (887 bytes)
5,807,986 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,245 UART: [rt]cmd =0x43455252, len=4
5,847,980 >>> mbox cmd response data (784 bytes)
5,847,981 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,562 UART: [rt]cmd =0x53494756, len=196
5,883,756 >>> mbox cmd response data (8 bytes)
5,883,757 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,913,796 UART: [rt]cmd =0x4d454153, len=108
5,934,591 >>> mbox cmd response data (12 bytes)
5,934,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,964,105 UART: [rt]cmd =0x494e464f, len=4
5,967,754 >>> mbox cmd response data (312 bytes)
5,967,755 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,232 UART: [rt]cmd =0x54514754, len=24
5,999,354 >>> mbox cmd response data (8 bytes)
5,999,355 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,028,510 UART: [rt]cmd =0x47544744, len=8
6,030,954 >>> mbox cmd response data (104 bytes)
6,030,955 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,060,570 UART: [rt]cmd =0x50435252, len=8
6,062,406 >>> mbox cmd response data (8 bytes)
6,062,407 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,964 UART: [rt]cmd =0x50435251, len=36
6,259,475 >>> mbox cmd response data (1848 bytes)
6,259,476 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,289,253 UART: [rt]cmd =0x50435245, len=56
6,292,615 >>> mbox cmd response data (8 bytes)
6,292,616 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,937 UART: [rt]cmd =0x44504543, len=20
6,342,540 >>> mbox cmd response data (44 bytes)
6,342,541 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,372,166 UART: [rt]cmd =0x44504543, len=24
6,398,614 >>> mbox cmd response data (40 bytes)
6,398,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,428,350 UART: [rt]cmd =0x44504543, len=96
6,464,886 >>> mbox cmd response data (56 bytes)
6,464,887 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,806 UART: [rt]cmd =0x44504543, len=92
6,721,879 >>> mbox cmd response data (6284 bytes)
6,721,880 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,015 UART: [rt]cmd =0x44504543, len=136
6,818,414 >>> mbox cmd response data (136 bytes)
6,818,415 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,848,018 UART: [rt]cmd =0x44504543, len=40
6,874,065 >>> mbox cmd response data (40 bytes)
6,874,066 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,589 UART: [rt]cmd =0x44504543, len=28
6,947,060 >>> mbox cmd response data (2076 bytes)
6,947,061 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,976,372 UART: [rt]cmd =0x44504543, len=36
7,006,135 >>> mbox cmd response data (24 bytes)
7,006,136 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,035,583 UART: [rt]cmd =0x4453424c, len=4
7,048,954 >>> mbox cmd response data (8 bytes)
7,048,955 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,078,374 UART: [rt]cmd =0x46505344, len=4
7,186,702 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
893,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,014 UART: [kat] ++
898,166 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,407 UART: [kat] LMS
1,171,735 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,910 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 ready_for_fw is high
1,176,880 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,562 UART: [idev] Sha1 KeyId Algorithm
1,210,102 UART: [idev] --
1,211,338 UART: [ldev] ++
1,211,506 UART: [ldev] CDI.KEYID = 6
1,211,869 UART: [ldev] SUBJECT.KEYID = 5
1,212,295 UART: [ldev] AUTHORITY.KEYID = 7
1,212,758 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,010 UART: [ldev] --
1,283,407 UART: [fwproc] Wait for Commands...
1,284,165 UART: [fwproc] Recv command 0x46574c44
1,284,893 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,210 >>> mbox cmd response: success
2,771,210 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,344 UART: [afmc] ++
2,772,512 UART: [afmc] CDI.KEYID = 6
2,772,874 UART: [afmc] SUBJECT.KEYID = 7
2,773,299 UART: [afmc] AUTHORITY.KEYID = 5
2,808,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,119 UART: [afmc] --
2,852,157 UART: [cold-reset] --
2,853,029 UART: [state] Locking Datavault
2,854,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,738 UART: [state] Locking ICCM
2,855,160 UART: [exit] Launching FMC @ 0x40000130
2,860,489 UART:
2,860,505 UART: Running Caliptra FMC ...
2,860,913 UART:
2,861,056 UART: [state] CFI Enabled
2,871,773 UART: [fht] FMC Alias Private Key: 7
2,979,344 UART: [art] Extend RT PCRs Done
2,979,772 UART: [art] Lock RT PCRs Done
2,981,536 UART: [art] Populate DV Done
2,989,743 UART: [fht] FMC Alias Private Key: 7
2,990,701 UART: [art] Derive CDI
2,990,981 UART: [art] Store in in slot 0x4
3,076,608 UART: [art] Derive Key Pair
3,076,968 UART: [art] Store priv key in slot 0x5
3,090,540 UART: [art] Derive Key Pair - Done
3,105,031 UART: [art] Signing Cert with AUTHO
3,105,511 UART: RITY.KEYID = 7
3,120,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,402 UART: [art] PUB.X = 962BC17E1DD149081F0AC8E3F57883473D462D6F5522A010C35E883F33614FB90912E7A4810F7D83EAEB693BC1F8DFAC
3,128,166 UART: [art] PUB.Y = B484D245EC0D143D31939802AEC0AF7801EFB5581CB29EDC9E9997E39D9E51758FF4BE2093BED957CF9AC278CCFDF551
3,135,123 UART: [art] SIG.R = 0C4D4776C578A2DBD61C851ECFC9B310989D052228FBE35719092785BBAF83D9ED1FF546594FA8069538415661DA3730
3,141,879 UART: [art] SIG.S = A28FA526ED197069558CC64099223B7C0D83ECF5069DED7497E07962B7FDC41E533A2B5B27BEA5F37EA2482C946212E4
3,166,116 UART: Caliptra RT
3,166,461 UART: [state] CFI Enabled
3,274,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,412 UART: [rt]cmd =0x46505652, len=4
3,306,072 UART: [rt] FIPS Version
3,307,123 >>> mbox cmd response data (36 bytes)
3,307,124 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,537 UART: [rt]cmd =0x46504c54, len=4
3,337,625 >>> mbox cmd response data (8 bytes)
3,337,626 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,303 UART: [rt]cmd =0x46504c67, len=4
3,368,409 >>> mbox cmd response: failed
3,368,595 UART: [rt] FIPS self test
3,368,926 UART: [kat] ++
3,369,078 UART: [kat] sha1
3,373,313 UART: [kat] SHA2-256
3,375,243 UART: [kat] SHA2-384
3,378,196 UART: [kat] SHA2-512-ACC
3,380,091 UART: [kat] ECC-384
3,389,420 UART: [kat] HMAC-384Kdf
3,393,981 UART: [kat] LMS
3,642,872 UART: [kat] --
5,867,454 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,158 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,907,466 UART: [rt]cmd =0x46504c67, len=4
5,908,663 >>> mbox cmd response data (8 bytes)
5,908,664 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,153 UART: [rt]cmd =0x49444543, len=4
5,944,471 >>> mbox cmd response data (37 bytes)
5,944,472 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,869 UART: [rt]cmd =0x49444549, len=4
5,976,140 >>> mbox cmd response data (104 bytes)
5,976,141 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,438 UART: [rt]cmd =0x49444550, len=4
6,015,470 >>> mbox cmd response data (8 bytes)
6,015,471 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,796 UART: [rt]cmd =0x4c444556, len=4
6,055,367 >>> mbox cmd response data (687 bytes)
6,055,368 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,084,807 UART: [rt]cmd =0x43455246, len=4
6,097,100 >>> mbox cmd response data (887 bytes)
6,097,101 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,126,574 UART: [rt]cmd =0x43455252, len=4
6,137,440 >>> mbox cmd response data (783 bytes)
6,137,441 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,158 UART: [rt]cmd =0x53494756, len=196
6,173,470 >>> mbox cmd response data (8 bytes)
6,173,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,203,490 UART: [rt]cmd =0x4d454153, len=108
6,223,927 >>> mbox cmd response data (12 bytes)
6,223,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,253,043 UART: [rt]cmd =0x494e464f, len=4
6,256,870 >>> mbox cmd response data (312 bytes)
6,256,871 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,286,426 UART: [rt]cmd =0x54514754, len=24
6,288,432 >>> mbox cmd response data (8 bytes)
6,288,433 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,317,836 UART: [rt]cmd =0x47544744, len=8
6,320,484 >>> mbox cmd response data (104 bytes)
6,320,485 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,862 UART: [rt]cmd =0x50435252, len=8
6,351,328 >>> mbox cmd response data (8 bytes)
6,351,329 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,098 UART: [rt]cmd =0x50435251, len=36
6,548,707 >>> mbox cmd response data (1848 bytes)
6,548,708 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,473 UART: [rt]cmd =0x50435245, len=56
6,581,951 >>> mbox cmd response data (8 bytes)
6,581,952 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,315 UART: [rt]cmd =0x44504543, len=20
6,632,330 >>> mbox cmd response data (44 bytes)
6,632,331 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,661,996 UART: [rt]cmd =0x44504543, len=24
6,688,536 >>> mbox cmd response data (40 bytes)
6,688,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,718,600 UART: [rt]cmd =0x44504543, len=96
6,755,858 >>> mbox cmd response data (56 bytes)
6,755,859 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,720 UART: [rt]cmd =0x44504543, len=92
7,013,883 >>> mbox cmd response data (6284 bytes)
7,013,884 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,044,281 UART: [rt]cmd =0x44504543, len=136
7,110,964 >>> mbox cmd response data (136 bytes)
7,110,965 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,140,444 UART: [rt]cmd =0x44504543, len=40
7,165,949 >>> mbox cmd response data (40 bytes)
7,165,950 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,195,351 UART: [rt]cmd =0x44504543, len=28
7,238,646 >>> mbox cmd response data (2076 bytes)
7,238,647 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,268,152 UART: [rt]cmd =0x44504543, len=36
7,298,057 >>> mbox cmd response data (24 bytes)
7,298,058 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,327,407 UART: [rt]cmd =0x4453424c, len=4
7,341,316 >>> mbox cmd response data (8 bytes)
7,341,317 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,780 UART: [rt]cmd =0x46505344, len=4
7,479,094 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,644 ready_for_fw is high
1,061,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,625,897 >>> mbox cmd response: success
2,625,897 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,531 UART:
2,689,547 UART: Running Caliptra FMC ...
2,689,955 UART:
2,690,098 UART: [state] CFI Enabled
2,701,173 UART: [fht] FMC Alias Private Key: 7
2,809,224 UART: [art] Extend RT PCRs Done
2,809,652 UART: [art] Lock RT PCRs Done
2,811,284 UART: [art] Populate DV Done
2,819,449 UART: [fht] FMC Alias Private Key: 7
2,820,419 UART: [art] Derive CDI
2,820,699 UART: [art] Store in in slot 0x4
2,906,514 UART: [art] Derive Key Pair
2,906,874 UART: [art] Store priv key in slot 0x5
2,920,070 UART: [art] Derive Key Pair - Done
2,934,569 UART: [art] Signing Cert with AUTHO
2,935,049 UART: RITY.KEYID = 7
2,950,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,508 UART: [art] PUB.X = 04BCD851A072DE7FD368560B3388E959ACC07CFE11882B0B91479D6AFCD60EF9D61882D30122A1ED207C1F16A8CF1B8E
2,958,275 UART: [art] PUB.Y = 0A2D7C5A5AC985951481AFA8F8B19699BC34014AC7AE16CA9AC6753B74D1C09FA0BF6F757FB86EB3E5FB456EF20F6B2E
2,965,236 UART: [art] SIG.R = 182ABE563E336DEBEBC8A58FCE5FBE871DFE39AF3ACF173CB2FAA3F192A0E7C4789D5E185950C445AB6AC98B1490C98B
2,972,032 UART: [art] SIG.S = B9B8FCD4B40B004ABD700BFE9FE7F6409FFC75ED7FCAABF39B92483759297845CFF3CB3D118E5D38E710EF60577ECD14
2,995,463 UART: Caliptra RT
2,995,808 UART: [state] CFI Enabled
3,103,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,023 UART: [rt]cmd =0x46505652, len=4
3,134,683 UART: [rt] FIPS Version
3,135,700 >>> mbox cmd response data (36 bytes)
3,135,701 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,098 UART: [rt]cmd =0x46504c54, len=4
3,166,216 >>> mbox cmd response data (8 bytes)
3,166,217 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,195,732 UART: [rt]cmd =0x46504c67, len=4
3,196,774 >>> mbox cmd response: failed
3,196,900 UART: [rt] FIPS self test
3,197,231 UART: [kat] ++
3,197,383 UART: [kat] sha1
3,201,474 UART: [kat] SHA2-256
3,203,404 UART: [kat] SHA2-384
3,206,261 UART: [kat] SHA2-512-ACC
3,208,156 UART: [kat] ECC-384
3,218,171 UART: [kat] HMAC-384Kdf
3,222,692 UART: [kat] LMS
3,471,583 UART: [kat] --
5,591,821 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,596,534 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,625,784 UART: [rt]cmd =0x46504c67, len=4
5,626,791 >>> mbox cmd response data (8 bytes)
5,626,792 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,656,147 UART: [rt]cmd =0x49444543, len=4
5,662,739 >>> mbox cmd response data (37 bytes)
5,662,740 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,692,101 UART: [rt]cmd =0x49444549, len=4
5,694,566 >>> mbox cmd response data (104 bytes)
5,694,567 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,912 UART: [rt]cmd =0x49444550, len=4
5,734,104 >>> mbox cmd response data (8 bytes)
5,734,105 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,763,422 UART: [rt]cmd =0x4c444556, len=4
5,773,827 >>> mbox cmd response data (687 bytes)
5,773,828 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,803,131 UART: [rt]cmd =0x43455246, len=4
5,815,078 >>> mbox cmd response data (887 bytes)
5,815,079 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,844,626 UART: [rt]cmd =0x43455252, len=4
5,855,586 >>> mbox cmd response data (783 bytes)
5,855,587 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,398 UART: [rt]cmd =0x53494756, len=196
5,891,888 >>> mbox cmd response data (8 bytes)
5,891,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,922,156 UART: [rt]cmd =0x4d454153, len=108
5,942,523 >>> mbox cmd response data (12 bytes)
5,942,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,971,899 UART: [rt]cmd =0x494e464f, len=4
5,975,478 >>> mbox cmd response data (312 bytes)
5,975,479 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,116 UART: [rt]cmd =0x54514754, len=24
6,007,156 >>> mbox cmd response data (8 bytes)
6,007,157 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,036,790 UART: [rt]cmd =0x47544744, len=8
6,039,534 >>> mbox cmd response data (104 bytes)
6,039,535 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,068,960 UART: [rt]cmd =0x50435252, len=8
6,070,430 >>> mbox cmd response data (8 bytes)
6,070,431 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,100,096 UART: [rt]cmd =0x50435251, len=36
6,267,389 >>> mbox cmd response data (1848 bytes)
6,267,390 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,297,427 UART: [rt]cmd =0x50435245, len=56
6,301,307 >>> mbox cmd response data (8 bytes)
6,301,308 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,330,683 UART: [rt]cmd =0x44504543, len=20
6,351,888 >>> mbox cmd response data (44 bytes)
6,351,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,268 UART: [rt]cmd =0x44504543, len=24
6,407,272 >>> mbox cmd response data (40 bytes)
6,407,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,437,276 UART: [rt]cmd =0x44504543, len=96
6,474,302 >>> mbox cmd response data (56 bytes)
6,474,303 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,504,392 UART: [rt]cmd =0x44504543, len=92
6,732,948 >>> mbox cmd response data (6284 bytes)
6,732,949 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,763,294 UART: [rt]cmd =0x44504543, len=136
6,829,805 >>> mbox cmd response data (136 bytes)
6,829,806 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,859,337 UART: [rt]cmd =0x44504543, len=40
6,885,450 >>> mbox cmd response data (40 bytes)
6,885,451 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,900 UART: [rt]cmd =0x44504543, len=28
6,958,225 >>> mbox cmd response data (2076 bytes)
6,958,226 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,987,735 UART: [rt]cmd =0x44504543, len=36
7,017,538 >>> mbox cmd response data (24 bytes)
7,017,539 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,046,840 UART: [rt]cmd =0x4453424c, len=4
7,060,309 >>> mbox cmd response data (8 bytes)
7,060,310 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,089,663 UART: [rt]cmd =0x46505344, len=4
7,198,023 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
905,000 UART: [kat] SHA2-512-ACC
906,901 UART: [kat] ECC-384
916,772 UART: [kat] HMAC-384Kdf
921,402 UART: [kat] LMS
1,169,714 UART: [kat] --
1,170,683 UART: [cold-reset] ++
1,171,073 UART: [fht] FHT @ 0x50003400
1,173,697 UART: [idev] ++
1,173,865 UART: [idev] CDI.KEYID = 6
1,174,226 UART: [idev] SUBJECT.KEYID = 7
1,174,651 UART: [idev] UDS.KEYID = 0
1,174,997 ready_for_fw is high
1,174,997 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,733 UART: [idev] Erasing UDS.KEYID = 0
1,199,667 UART: [idev] Sha1 KeyId Algorithm
1,208,689 UART: [idev] --
1,209,738 UART: [ldev] ++
1,209,906 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,697 UART: [ldev] AUTHORITY.KEYID = 7
1,211,160 UART: [ldev] FE.KEYID = 1
1,216,372 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,556 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,627 UART: [fwproc] Recv command 0x46574c44
1,282,360 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,947 >>> mbox cmd response: success
2,769,947 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,770,998 UART: [afmc] ++
2,771,166 UART: [afmc] CDI.KEYID = 6
2,771,529 UART: [afmc] SUBJECT.KEYID = 7
2,771,955 UART: [afmc] AUTHORITY.KEYID = 5
2,807,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,861 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,580 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,551 UART: [afmc] --
2,850,551 UART: [cold-reset] --
2,851,139 UART: [state] Locking Datavault
2,852,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,302 UART: [state] Locking ICCM
2,853,768 UART: [exit] Launching FMC @ 0x40000130
2,859,097 UART:
2,859,113 UART: Running Caliptra FMC ...
2,859,521 UART:
2,859,575 UART: [state] CFI Enabled
2,870,218 UART: [fht] FMC Alias Private Key: 7
2,978,171 UART: [art] Extend RT PCRs Done
2,978,599 UART: [art] Lock RT PCRs Done
2,980,413 UART: [art] Populate DV Done
2,988,598 UART: [fht] FMC Alias Private Key: 7
2,989,616 UART: [art] Derive CDI
2,989,896 UART: [art] Store in in slot 0x4
3,075,753 UART: [art] Derive Key Pair
3,076,113 UART: [art] Store priv key in slot 0x5
3,089,529 UART: [art] Derive Key Pair - Done
3,104,297 UART: [art] Signing Cert with AUTHO
3,104,777 UART: RITY.KEYID = 7
3,120,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,854 UART: [art] PUB.X = A7A0BA443765A98D74AB546E4DADA26CBFD778E221244D19C89FDE5611EE57B4E061E8A66AAE1BA01EB6624C4B21AE37
3,127,642 UART: [art] PUB.Y = 712A0A7AFDDEC4389A3C35956F7D258AE3F1A180FD31AF63E227A6BAB8C7001331572FC2B6499B6F04F085CC355B370E
3,134,571 UART: [art] SIG.R = 0D943C66A4A06D222D1B8AA82092336B862CDB5D8782A07D9ED3CF2F0AD47E471B2E8F56EFB30E09945DDEADBF9F6AF3
3,141,349 UART: [art] SIG.S = 282C1283C2B7249CC3C7EBE489C3D58995CD1E2899A76410051B0161D349F9B2C9AC248EBACCCBDC202D9190AE6970C4
3,165,202 UART: Caliptra RT
3,165,455 UART: [state] CFI Enabled
3,272,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,538 UART: [rt]cmd =0x46505652, len=4
3,304,198 UART: [rt] FIPS Version
3,305,335 >>> mbox cmd response data (36 bytes)
3,305,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,621 UART: [rt]cmd =0x46504c54, len=4
3,335,701 >>> mbox cmd response data (8 bytes)
3,335,702 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,365,581 UART: [rt]cmd =0x46504c67, len=4
3,366,451 >>> mbox cmd response: failed
3,366,793 UART: [rt] FIPS self test
3,367,124 UART: [kat] ++
3,367,276 UART: [kat] sha1
3,371,565 UART: [kat] SHA2-256
3,373,495 UART: [kat] SHA2-384
3,376,168 UART: [kat] SHA2-512-ACC
3,378,063 UART: [kat] ECC-384
3,387,856 UART: [kat] HMAC-384Kdf
3,392,393 UART: [kat] LMS
3,641,284 UART: [kat] --
5,864,404 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,866,201 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,895,661 UART: [rt]cmd =0x46504c67, len=4
5,896,982 >>> mbox cmd response data (8 bytes)
5,896,983 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,316 UART: [rt]cmd =0x49444543, len=4
5,932,770 >>> mbox cmd response data (37 bytes)
5,932,771 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,962,240 UART: [rt]cmd =0x49444549, len=4
5,964,589 >>> mbox cmd response data (104 bytes)
5,964,590 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,909 UART: [rt]cmd =0x49444550, len=4
6,003,815 >>> mbox cmd response data (8 bytes)
6,003,816 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,033,171 UART: [rt]cmd =0x4c444556, len=4
6,043,650 >>> mbox cmd response data (687 bytes)
6,043,651 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,073,038 UART: [rt]cmd =0x43455246, len=4
6,084,961 >>> mbox cmd response data (887 bytes)
6,084,962 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,114,213 UART: [rt]cmd =0x43455252, len=4
6,124,861 >>> mbox cmd response data (782 bytes)
6,124,862 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,155,389 UART: [rt]cmd =0x53494756, len=196
6,160,491 >>> mbox cmd response data (8 bytes)
6,160,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,190,629 UART: [rt]cmd =0x4d454153, len=108
6,210,424 >>> mbox cmd response data (12 bytes)
6,210,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,239,924 UART: [rt]cmd =0x494e464f, len=4
6,243,625 >>> mbox cmd response data (312 bytes)
6,243,626 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,273,005 UART: [rt]cmd =0x54514754, len=24
6,275,221 >>> mbox cmd response data (8 bytes)
6,275,222 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,304,679 UART: [rt]cmd =0x47544744, len=8
6,307,433 >>> mbox cmd response data (104 bytes)
6,307,434 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,336,867 UART: [rt]cmd =0x50435252, len=8
6,338,555 >>> mbox cmd response data (8 bytes)
6,338,556 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,368,245 UART: [rt]cmd =0x50435251, len=36
6,535,174 >>> mbox cmd response data (1848 bytes)
6,535,175 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,564,808 UART: [rt]cmd =0x50435245, len=56
6,568,594 >>> mbox cmd response data (8 bytes)
6,568,595 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,598,066 UART: [rt]cmd =0x44504543, len=20
6,618,905 >>> mbox cmd response data (44 bytes)
6,618,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,347 UART: [rt]cmd =0x44504543, len=24
6,674,461 >>> mbox cmd response data (40 bytes)
6,674,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,704,439 UART: [rt]cmd =0x44504543, len=96
6,741,419 >>> mbox cmd response data (56 bytes)
6,741,420 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,771,509 UART: [rt]cmd =0x44504543, len=92
6,999,701 >>> mbox cmd response data (6284 bytes)
6,999,702 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,030,063 UART: [rt]cmd =0x44504543, len=136
7,097,312 >>> mbox cmd response data (136 bytes)
7,097,313 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,126,844 UART: [rt]cmd =0x44504543, len=40
7,152,841 >>> mbox cmd response data (40 bytes)
7,152,842 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,182,487 UART: [rt]cmd =0x44504543, len=28
7,225,530 >>> mbox cmd response data (2076 bytes)
7,225,531 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,255,076 UART: [rt]cmd =0x44504543, len=36
7,284,993 >>> mbox cmd response data (24 bytes)
7,284,994 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,314,395 UART: [rt]cmd =0x4453424c, len=4
7,327,830 >>> mbox cmd response data (8 bytes)
7,327,831 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,357,128 UART: [rt]cmd =0x46505344, len=4
7,465,226 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,349 >>> mbox cmd response: success
2,619,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,681,577 UART:
2,681,593 UART: Running Caliptra FMC ...
2,682,001 UART:
2,682,055 UART: [state] CFI Enabled
2,692,384 UART: [fht] FMC Alias Private Key: 7
2,800,221 UART: [art] Extend RT PCRs Done
2,800,649 UART: [art] Lock RT PCRs Done
2,802,477 UART: [art] Populate DV Done
2,810,622 UART: [fht] FMC Alias Private Key: 7
2,811,662 UART: [art] Derive CDI
2,811,942 UART: [art] Store in in slot 0x4
2,898,181 UART: [art] Derive Key Pair
2,898,541 UART: [art] Store priv key in slot 0x5
2,911,657 UART: [art] Derive Key Pair - Done
2,926,401 UART: [art] Signing Cert with AUTHO
2,926,881 UART: RITY.KEYID = 7
2,941,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,728 UART: [art] PUB.X = B05B3386AF5187DE45AD79DB987FD90FEFFF2F98A0F9FC44D20F562D7201935D0A0E765137893E33023D3C2531A1CEA5
2,949,488 UART: [art] PUB.Y = B4E44DF2F0A87B75CD78BB8B51859D171B6EBAA7A731D212FC889571A74E216255287BC5161D9F285D0F287E1AFF1743
2,956,441 UART: [art] SIG.R = 9E8EE7F68C6B5C1CC582DAB9310BC41F060371F9D5ECC010D199B453677068320FFF46F9E6F50C4111FA80B7D16D094A
2,963,201 UART: [art] SIG.S = 6591CFABD62E73F02590EE81C4228E77815B608537C2595B45384D040A8BE971E3118DAB47FD9D89CB4BF9D1BCE60AC4
2,987,035 UART: Caliptra RT
2,987,288 UART: [state] CFI Enabled
3,095,525 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,995 UART: [rt]cmd =0x46505652, len=4
3,126,655 UART: [rt] FIPS Version
3,127,652 >>> mbox cmd response data (36 bytes)
3,127,653 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,134 UART: [rt]cmd =0x46504c54, len=4
3,158,154 >>> mbox cmd response data (8 bytes)
3,158,155 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,187,730 UART: [rt]cmd =0x46504c67, len=4
3,188,652 >>> mbox cmd response: failed
3,188,844 UART: [rt] FIPS self test
3,189,175 UART: [kat] ++
3,189,327 UART: [kat] sha1
3,193,398 UART: [kat] SHA2-256
3,195,328 UART: [kat] SHA2-384
3,198,051 UART: [kat] SHA2-512-ACC
3,199,946 UART: [kat] ECC-384
3,209,767 UART: [kat] HMAC-384Kdf
3,214,204 UART: [kat] LMS
3,463,095 UART: [kat] --
5,579,505 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,412 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,617,726 UART: [rt]cmd =0x46504c67, len=4
5,618,857 >>> mbox cmd response data (8 bytes)
5,618,858 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,648,413 UART: [rt]cmd =0x49444543, len=4
5,654,821 >>> mbox cmd response data (37 bytes)
5,654,822 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,684,223 UART: [rt]cmd =0x49444549, len=4
5,686,476 >>> mbox cmd response data (104 bytes)
5,686,477 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,715,828 UART: [rt]cmd =0x49444550, len=4
5,725,864 >>> mbox cmd response data (8 bytes)
5,725,865 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,222 UART: [rt]cmd =0x4c444556, len=4
5,765,495 >>> mbox cmd response data (687 bytes)
5,765,496 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,794,885 UART: [rt]cmd =0x43455246, len=4
5,806,776 >>> mbox cmd response data (887 bytes)
5,806,777 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,835,922 UART: [rt]cmd =0x43455252, len=4
5,846,800 >>> mbox cmd response data (783 bytes)
5,846,801 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,236 UART: [rt]cmd =0x53494756, len=196
5,882,476 >>> mbox cmd response data (8 bytes)
5,882,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,912,678 UART: [rt]cmd =0x4d454153, len=108
5,933,461 >>> mbox cmd response data (12 bytes)
5,933,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,962,871 UART: [rt]cmd =0x494e464f, len=4
5,966,574 >>> mbox cmd response data (312 bytes)
5,966,575 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,182 UART: [rt]cmd =0x54514754, len=24
5,998,216 >>> mbox cmd response data (8 bytes)
5,998,217 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,027,568 UART: [rt]cmd =0x47544744, len=8
6,030,448 >>> mbox cmd response data (104 bytes)
6,030,449 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,059,766 UART: [rt]cmd =0x50435252, len=8
6,061,238 >>> mbox cmd response data (8 bytes)
6,061,239 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,928 UART: [rt]cmd =0x50435251, len=36
6,258,185 >>> mbox cmd response data (1848 bytes)
6,258,186 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,855 UART: [rt]cmd =0x50435245, len=56
6,291,607 >>> mbox cmd response data (8 bytes)
6,291,608 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,320,935 UART: [rt]cmd =0x44504543, len=20
6,341,822 >>> mbox cmd response data (44 bytes)
6,341,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,371,520 UART: [rt]cmd =0x44504543, len=24
6,397,924 >>> mbox cmd response data (40 bytes)
6,397,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,427,648 UART: [rt]cmd =0x44504543, len=96
6,464,584 >>> mbox cmd response data (56 bytes)
6,464,585 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,592 UART: [rt]cmd =0x44504543, len=92
6,721,406 >>> mbox cmd response data (6284 bytes)
6,721,407 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,751,796 UART: [rt]cmd =0x44504543, len=136
6,817,697 >>> mbox cmd response data (136 bytes)
6,817,698 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,847,161 UART: [rt]cmd =0x44504543, len=40
6,872,896 >>> mbox cmd response data (40 bytes)
6,872,897 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,902,238 UART: [rt]cmd =0x44504543, len=28
6,945,459 >>> mbox cmd response data (2076 bytes)
6,945,460 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,975,123 UART: [rt]cmd =0x44504543, len=36
7,004,934 >>> mbox cmd response data (24 bytes)
7,004,935 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,034,426 UART: [rt]cmd =0x4453424c, len=4
7,048,229 >>> mbox cmd response data (8 bytes)
7,048,230 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,077,637 UART: [rt]cmd =0x46505344, len=4
7,185,957 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,502 UART: [kat] ++
895,654 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,374 UART: [cold-reset] ++
1,170,806 UART: [fht] FHT @ 0x50003400
1,173,664 UART: [idev] ++
1,173,832 UART: [idev] CDI.KEYID = 6
1,174,193 UART: [idev] SUBJECT.KEYID = 7
1,174,618 UART: [idev] UDS.KEYID = 0
1,174,964 ready_for_fw is high
1,174,964 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,176 UART: [idev] Sha1 KeyId Algorithm
1,209,034 UART: [idev] --
1,210,167 UART: [ldev] ++
1,210,335 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,126 UART: [ldev] AUTHORITY.KEYID = 7
1,211,589 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,601 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,730 UART: [fwproc] Recv command 0x46574c44
1,283,463 UART: [fwproc] Recv'd Img size: 114084 bytes
2,578,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,637 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,458 >>> mbox cmd response: success
2,769,458 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,770,615 UART: [afmc] ++
2,770,783 UART: [afmc] CDI.KEYID = 6
2,771,146 UART: [afmc] SUBJECT.KEYID = 7
2,771,572 UART: [afmc] AUTHORITY.KEYID = 5
2,807,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,299 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,901 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,784 UART: [afmc] --
2,850,742 UART: [cold-reset] --
2,851,542 UART: [state] Locking Datavault
2,852,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,249 UART: [state] Locking ICCM
2,853,747 UART: [exit] Launching FMC @ 0x40000130
2,859,076 UART:
2,859,092 UART: Running Caliptra FMC ...
2,859,500 UART:
2,859,643 UART: [state] CFI Enabled
2,870,080 UART: [fht] FMC Alias Private Key: 7
2,977,253 UART: [art] Extend RT PCRs Done
2,977,681 UART: [art] Lock RT PCRs Done
2,979,009 UART: [art] Populate DV Done
2,987,262 UART: [fht] FMC Alias Private Key: 7
2,988,230 UART: [art] Derive CDI
2,988,510 UART: [art] Store in in slot 0x4
3,073,921 UART: [art] Derive Key Pair
3,074,281 UART: [art] Store priv key in slot 0x5
3,088,191 UART: [art] Derive Key Pair - Done
3,102,995 UART: [art] Signing Cert with AUTHO
3,103,475 UART: RITY.KEYID = 7
3,118,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,630 UART: [art] PUB.X = B756DAE8AB8B0D7D1FDBFDC9802DF47E7771C7FCB601F25E6C9D35806DC2E1412F2ECA3A52582441FC22C1CAA5E12008
3,126,411 UART: [art] PUB.Y = 54C5318D826C7B243A30068B68508E939B2CE9F9C2F72C88C42DAD36B142CC4AB434F2D463B4D5ED4752E5FD9C6CA548
3,133,366 UART: [art] SIG.R = 4C66FD32B44AC0A6489E4DCAB69B8796936CC5512CE5DA15F5BD30A42927A6C75E7A643E5069EB0DD491CC522635ED07
3,140,140 UART: [art] SIG.S = 2B0E2B0E2EBA460F8274CAF694CEAF0E19A4C1F5D2222C5541EE8D11D01701D2EAEE23642E940010E6EC0B8BFBA4A398
3,163,715 UART: Caliptra RT
3,164,060 UART: [state] CFI Enabled
3,273,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,549 UART: [rt]cmd =0x46505652, len=4
3,304,209 UART: [rt] FIPS Version
3,305,398 >>> mbox cmd response data (36 bytes)
3,305,399 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,532 UART: [rt]cmd =0x46504c54, len=4
3,335,706 >>> mbox cmd response data (8 bytes)
3,335,707 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,365,026 UART: [rt]cmd =0x46504c67, len=4
3,365,976 >>> mbox cmd response: failed
3,366,320 UART: [rt] FIPS self test
3,366,651 UART: [kat] ++
3,366,803 UART: [kat] sha1
3,371,178 UART: [kat] SHA2-256
3,373,108 UART: [kat] SHA2-384
3,375,893 UART: [kat] SHA2-512-ACC
3,377,788 UART: [kat] ECC-384
3,387,297 UART: [kat] HMAC-384Kdf
3,391,980 UART: [kat] LMS
3,640,871 UART: [kat] --
5,864,119 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,865,726 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,894,906 UART: [rt]cmd =0x46504c67, len=4
5,896,011 >>> mbox cmd response data (8 bytes)
5,896,012 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,925,377 UART: [rt]cmd =0x49444543, len=4
5,932,013 >>> mbox cmd response data (37 bytes)
5,932,014 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,961,423 UART: [rt]cmd =0x49444549, len=4
5,963,858 >>> mbox cmd response data (104 bytes)
5,963,859 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,132 UART: [rt]cmd =0x49444550, len=4
6,003,154 >>> mbox cmd response data (8 bytes)
6,003,155 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,032,374 UART: [rt]cmd =0x4c444556, len=4
6,042,927 >>> mbox cmd response data (687 bytes)
6,042,928 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,072,273 UART: [rt]cmd =0x43455246, len=4
6,084,462 >>> mbox cmd response data (887 bytes)
6,084,463 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,114,006 UART: [rt]cmd =0x43455252, len=4
6,124,700 >>> mbox cmd response data (782 bytes)
6,124,701 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,155,284 UART: [rt]cmd =0x53494756, len=196
6,160,578 >>> mbox cmd response data (8 bytes)
6,160,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,190,502 UART: [rt]cmd =0x4d454153, len=108
6,211,349 >>> mbox cmd response data (12 bytes)
6,211,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,240,803 UART: [rt]cmd =0x494e464f, len=4
6,244,492 >>> mbox cmd response data (312 bytes)
6,244,493 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,273,912 UART: [rt]cmd =0x54514754, len=24
6,275,928 >>> mbox cmd response data (8 bytes)
6,275,929 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,305,222 UART: [rt]cmd =0x47544744, len=8
6,307,970 >>> mbox cmd response data (104 bytes)
6,307,971 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,337,232 UART: [rt]cmd =0x50435252, len=8
6,338,742 >>> mbox cmd response data (8 bytes)
6,338,743 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,368,348 UART: [rt]cmd =0x50435251, len=36
6,535,549 >>> mbox cmd response data (1848 bytes)
6,535,550 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,565,229 UART: [rt]cmd =0x50435245, len=56
6,568,553 >>> mbox cmd response data (8 bytes)
6,568,554 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,597,917 UART: [rt]cmd =0x44504543, len=20
6,618,812 >>> mbox cmd response data (44 bytes)
6,618,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,476 UART: [rt]cmd =0x44504543, len=24
6,674,870 >>> mbox cmd response data (40 bytes)
6,674,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,704,710 UART: [rt]cmd =0x44504543, len=96
6,741,628 >>> mbox cmd response data (56 bytes)
6,741,629 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,771,674 UART: [rt]cmd =0x44504543, len=92
6,999,390 >>> mbox cmd response data (6284 bytes)
6,999,391 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,029,670 UART: [rt]cmd =0x44504543, len=136
7,096,425 >>> mbox cmd response data (136 bytes)
7,096,426 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,126,009 UART: [rt]cmd =0x44504543, len=40
7,152,000 >>> mbox cmd response data (40 bytes)
7,152,001 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,181,334 UART: [rt]cmd =0x44504543, len=28
7,224,483 >>> mbox cmd response data (2076 bytes)
7,224,484 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,254,159 UART: [rt]cmd =0x44504543, len=36
7,283,870 >>> mbox cmd response data (24 bytes)
7,283,871 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,313,494 UART: [rt]cmd =0x4453424c, len=4
7,327,887 >>> mbox cmd response data (8 bytes)
7,327,888 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,357,225 UART: [rt]cmd =0x46505344, len=4
7,465,453 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,267 ready_for_fw is high
1,056,267 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,488 >>> mbox cmd response: success
2,620,488 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,962 UART:
2,682,978 UART: Running Caliptra FMC ...
2,683,386 UART:
2,683,529 UART: [state] CFI Enabled
2,693,954 UART: [fht] FMC Alias Private Key: 7
2,802,473 UART: [art] Extend RT PCRs Done
2,802,901 UART: [art] Lock RT PCRs Done
2,804,769 UART: [art] Populate DV Done
2,812,934 UART: [fht] FMC Alias Private Key: 7
2,813,918 UART: [art] Derive CDI
2,814,198 UART: [art] Store in in slot 0x4
2,900,133 UART: [art] Derive Key Pair
2,900,493 UART: [art] Store priv key in slot 0x5
2,913,489 UART: [art] Derive Key Pair - Done
2,928,689 UART: [art] Signing Cert with AUTHO
2,929,169 UART: RITY.KEYID = 7
2,944,259 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,024 UART: [art] PUB.X = 8138AC42B467C3AB074D01D62E0D46B39ADD469E241E3529263A78855D4B2A1A2D8C8FE304F49B7EE07212429544054B
2,951,777 UART: [art] PUB.Y = DF6A6ABB255D8066E47C50CC3CEAB6C90A39ED2FD7B90EBCE73A2C2EED40CBAEF71A87238CB5A6FE25CD22BA57A564D8
2,958,755 UART: [art] SIG.R = 448E888FAF6CF3670C64C12C84A241FBEE23963D41AFB9E6A0C678E82AB81C3AF1612F57A986CC27293D6FA95232F0DE
2,965,534 UART: [art] SIG.S = E92BD63F2E2A297E26598E77D4E4E85D5C8B3DA7D0B00D68CF88A2DAFB1A4C5AE0664F827B8FC4699844D8512DA1E828
2,989,386 UART: Caliptra RT
2,989,731 UART: [state] CFI Enabled
3,096,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,646 UART: [rt]cmd =0x46505652, len=4
3,128,306 UART: [rt] FIPS Version
3,129,237 >>> mbox cmd response data (36 bytes)
3,129,238 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,627 UART: [rt]cmd =0x46504c54, len=4
3,159,895 >>> mbox cmd response data (8 bytes)
3,159,896 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,189,693 UART: [rt]cmd =0x46504c67, len=4
3,190,551 >>> mbox cmd response: failed
3,190,703 UART: [rt] FIPS self test
3,191,034 UART: [kat] ++
3,191,186 UART: [kat] sha1
3,195,331 UART: [kat] SHA2-256
3,197,261 UART: [kat] SHA2-384
3,199,988 UART: [kat] SHA2-512-ACC
3,201,883 UART: [kat] ECC-384
3,211,998 UART: [kat] HMAC-384Kdf
3,216,383 UART: [kat] LMS
3,465,274 UART: [kat] --
5,581,554 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,311 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,619,607 UART: [rt]cmd =0x46504c67, len=4
5,620,824 >>> mbox cmd response data (8 bytes)
5,620,825 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,650,046 UART: [rt]cmd =0x49444543, len=4
5,656,274 >>> mbox cmd response data (37 bytes)
5,656,275 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,685,810 UART: [rt]cmd =0x49444549, len=4
5,688,263 >>> mbox cmd response data (104 bytes)
5,688,264 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,717,367 UART: [rt]cmd =0x49444550, len=4
5,727,655 >>> mbox cmd response data (8 bytes)
5,727,656 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,756,895 UART: [rt]cmd =0x4c444556, len=4
5,767,408 >>> mbox cmd response data (687 bytes)
5,767,409 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,796,712 UART: [rt]cmd =0x43455246, len=4
5,808,803 >>> mbox cmd response data (887 bytes)
5,808,804 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,838,281 UART: [rt]cmd =0x43455252, len=4
5,849,163 >>> mbox cmd response data (783 bytes)
5,849,164 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,947 UART: [rt]cmd =0x53494756, len=196
5,885,389 >>> mbox cmd response data (8 bytes)
5,885,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,547 UART: [rt]cmd =0x4d454153, len=108
5,936,034 >>> mbox cmd response data (12 bytes)
5,936,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,965,402 UART: [rt]cmd =0x494e464f, len=4
5,969,235 >>> mbox cmd response data (312 bytes)
5,969,236 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,847 UART: [rt]cmd =0x54514754, len=24
6,000,937 >>> mbox cmd response data (8 bytes)
6,000,938 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,030,377 UART: [rt]cmd =0x47544744, len=8
6,032,977 >>> mbox cmd response data (104 bytes)
6,032,978 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,247 UART: [rt]cmd =0x50435252, len=8
6,063,641 >>> mbox cmd response data (8 bytes)
6,063,642 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,247 UART: [rt]cmd =0x50435251, len=36
6,260,390 >>> mbox cmd response data (1848 bytes)
6,260,391 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,290,024 UART: [rt]cmd =0x50435245, len=56
6,293,770 >>> mbox cmd response data (8 bytes)
6,293,771 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,322,994 UART: [rt]cmd =0x44504543, len=20
6,343,703 >>> mbox cmd response data (44 bytes)
6,343,704 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,373,069 UART: [rt]cmd =0x44504543, len=24
6,399,515 >>> mbox cmd response data (40 bytes)
6,399,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,429,429 UART: [rt]cmd =0x44504543, len=96
6,466,699 >>> mbox cmd response data (56 bytes)
6,466,700 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,496,481 UART: [rt]cmd =0x44504543, len=92
6,723,496 >>> mbox cmd response data (6284 bytes)
6,723,497 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,753,654 UART: [rt]cmd =0x44504543, len=136
6,819,909 >>> mbox cmd response data (136 bytes)
6,819,910 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,849,589 UART: [rt]cmd =0x44504543, len=40
6,875,766 >>> mbox cmd response data (40 bytes)
6,875,767 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,228 UART: [rt]cmd =0x44504543, len=28
6,948,497 >>> mbox cmd response data (2076 bytes)
6,948,498 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,977,993 UART: [rt]cmd =0x44504543, len=36
7,008,310 >>> mbox cmd response data (24 bytes)
7,008,311 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,037,762 UART: [rt]cmd =0x4453424c, len=4
7,051,369 >>> mbox cmd response data (8 bytes)
7,051,370 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,080,751 UART: [rt]cmd =0x46505344, len=4
7,188,969 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
191,986 UART:
192,375 UART: Running Caliptra ROM ...
193,441 UART:
193,603 UART: [state] CFI Enabled
263,877 UART: [state] LifecycleState = Unprovisioned
265,823 UART: [state] DebugLocked = No
267,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,681 UART: [kat] SHA2-256
441,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,904 UART: [kat] ++
452,496 UART: [kat] sha1
463,976 UART: [kat] SHA2-256
466,670 UART: [kat] SHA2-384
472,755 UART: [kat] SHA2-512-ACC
475,091 UART: [kat] ECC-384
2,765,783 UART: [kat] HMAC-384Kdf
2,777,277 UART: [kat] LMS
3,967,541 UART: [kat] --
3,970,981 UART: [cold-reset] ++
3,973,102 UART: [fht] Storing FHT @ 0x50003400
3,984,478 UART: [idev] ++
3,985,044 UART: [idev] CDI.KEYID = 6
3,986,018 UART: [idev] SUBJECT.KEYID = 7
3,987,239 UART: [idev] UDS.KEYID = 0
3,988,279 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,011,914 UART: [idev] Erasing UDS.KEYID = 0
7,326,958 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,812 UART: [idev] --
7,352,353 UART: [ldev] ++
7,352,924 UART: [ldev] CDI.KEYID = 6
7,353,888 UART: [ldev] SUBJECT.KEYID = 5
7,355,103 UART: [ldev] AUTHORITY.KEYID = 7
7,356,392 UART: [ldev] FE.KEYID = 1
7,400,584 UART: [ldev] Erasing FE.KEYID = 1
10,732,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,103,964 UART: [ldev] --
13,109,286 UART: [fwproc] Waiting for Commands...
13,111,823 UART: [fwproc] Received command 0x46504c54
13,114,286 UART: [kat] SHA2-256
13,283,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,294,299 UART: [kat] ++
13,294,785 UART: [kat] sha1
13,306,686 UART: [kat] SHA2-256
13,309,370 UART: [kat] SHA2-384
13,314,124 UART: [kat] SHA2-512-ACC
13,316,526 UART: [kat] ECC-384
15,603,737 UART: [kat] HMAC-384Kdf
15,635,911 UART: [kat] LMS
16,825,389 UART: [kat] --
16,826,086 >>> mbox cmd response data (8 bytes)
16,826,558 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,827,237 UART: [fwproc] Received command 0x46504c67
16,829,935 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,784,226 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,374,049 >>> mbox cmd response data (8 bytes)
16,375,147 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,376,273 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,419 UART:
192,807 UART: Running Caliptra ROM ...
194,082 UART:
603,509 UART: [state] CFI Enabled
616,087 UART: [state] LifecycleState = Unprovisioned
617,995 UART: [state] DebugLocked = No
620,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,888 UART: [kat] SHA2-256
795,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,145 UART: [kat] ++
806,685 UART: [kat] sha1
818,459 UART: [kat] SHA2-256
821,143 UART: [kat] SHA2-384
826,372 UART: [kat] SHA2-512-ACC
828,767 UART: [kat] ECC-384
3,112,996 UART: [kat] HMAC-384Kdf
3,125,012 UART: [kat] LMS
4,315,137 UART: [kat] --
4,318,050 UART: [cold-reset] ++
4,319,281 UART: [fht] Storing FHT @ 0x50003400
4,331,688 UART: [idev] ++
4,332,250 UART: [idev] CDI.KEYID = 6
4,333,724 UART: [idev] SUBJECT.KEYID = 7
4,334,792 UART: [idev] UDS.KEYID = 0
4,335,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,352,418 UART: [idev] Erasing UDS.KEYID = 0
7,623,479 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,672 UART: [idev] --
7,649,119 UART: [ldev] ++
7,649,749 UART: [ldev] CDI.KEYID = 6
7,650,672 UART: [ldev] SUBJECT.KEYID = 5
7,651,888 UART: [ldev] AUTHORITY.KEYID = 7
7,653,174 UART: [ldev] FE.KEYID = 1
7,663,982 UART: [ldev] Erasing FE.KEYID = 1
10,954,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,746 UART: [ldev] --
13,316,406 UART: [fwproc] Waiting for Commands...
13,319,117 UART: [fwproc] Received command 0x46504c54
13,321,631 UART: [kat] SHA2-256
13,491,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,501,629 UART: [kat] ++
13,502,107 UART: [kat] sha1
13,513,642 UART: [kat] SHA2-256
13,516,332 UART: [kat] SHA2-384
13,521,126 UART: [kat] SHA2-512-ACC
13,523,531 UART: [kat] ECC-384
15,807,669 UART: [kat] HMAC-384Kdf
15,817,684 UART: [kat] LMS
17,007,128 UART: [kat] --
17,007,850 >>> mbox cmd response data (8 bytes)
17,008,318 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,009,745 UART: [fwproc] Received command 0x46504c67
17,012,439 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
4,128,908 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,538,689 >>> mbox cmd response data (8 bytes)
16,539,274 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,540,877 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,237 UART:
192,615 UART: Running Caliptra ROM ...
193,821 UART:
193,977 UART: [state] CFI Enabled
263,896 UART: [state] LifecycleState = Unprovisioned
265,786 UART: [state] DebugLocked = No
268,513 UART: [state] WD Timer not started. Device not locked for debugging
272,217 UART: [kat] SHA2-256
451,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,886 UART: [kat] ++
463,364 UART: [kat] sha1
473,486 UART: [kat] SHA2-256
476,502 UART: [kat] SHA2-384
481,075 UART: [kat] SHA2-512-ACC
484,010 UART: [kat] ECC-384
2,948,508 UART: [kat] HMAC-384Kdf
2,972,114 UART: [kat] LMS
3,501,603 UART: [kat] --
3,507,989 UART: [cold-reset] ++
3,510,140 UART: [fht] FHT @ 0x50003400
3,521,336 UART: [idev] ++
3,521,900 UART: [idev] CDI.KEYID = 6
3,522,842 UART: [idev] SUBJECT.KEYID = 7
3,524,056 UART: [idev] UDS.KEYID = 0
3,525,032 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,542,515 UART: [idev] Erasing UDS.KEYID = 0
6,027,941 UART: [idev] Sha1 KeyId Algorithm
6,050,384 UART: [idev] --
6,054,841 UART: [ldev] ++
6,055,422 UART: [ldev] CDI.KEYID = 6
6,056,493 UART: [ldev] SUBJECT.KEYID = 5
6,057,604 UART: [ldev] AUTHORITY.KEYID = 7
6,058,780 UART: [ldev] FE.KEYID = 1
6,100,385 UART: [ldev] Erasing FE.KEYID = 1
8,604,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,172 UART: [ldev] --
10,414,465 UART: [fwproc] Wait for Commands...
10,417,648 UART: [fwproc] Recv command 0x46504c54
10,420,069 UART: [kat] SHA2-256
10,599,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,610,886 UART: [kat] ++
10,611,435 UART: [kat] sha1
10,621,199 UART: [kat] SHA2-256
10,624,271 UART: [kat] SHA2-384
10,629,764 UART: [kat] SHA2-512-ACC
10,632,705 UART: [kat] ECC-384
13,082,211 UART: [kat] HMAC-384Kdf
13,104,425 UART: [kat] LMS
13,633,949 UART: [kat] --
13,634,618 >>> mbox cmd response data (8 bytes)
13,635,093 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,636,352 UART: [fwproc] Recv command 0x46504c67
13,638,911 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,074 writing to cptra_bootfsm_go
3,358,466 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,261,575 >>> mbox cmd response data (8 bytes)
13,262,329 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,263,943 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,662 UART:
193,029 UART: Running Caliptra ROM ...
194,158 UART:
603,868 UART: [state] CFI Enabled
618,493 UART: [state] LifecycleState = Unprovisioned
620,350 UART: [state] DebugLocked = No
621,994 UART: [state] WD Timer not started. Device not locked for debugging
626,181 UART: [kat] SHA2-256
805,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,842 UART: [kat] ++
817,380 UART: [kat] sha1
828,051 UART: [kat] SHA2-256
831,056 UART: [kat] SHA2-384
838,434 UART: [kat] SHA2-512-ACC
841,388 UART: [kat] ECC-384
3,282,900 UART: [kat] HMAC-384Kdf
3,295,229 UART: [kat] LMS
3,824,680 UART: [kat] --
3,828,906 UART: [cold-reset] ++
3,831,221 UART: [fht] FHT @ 0x50003400
3,842,262 UART: [idev] ++
3,842,826 UART: [idev] CDI.KEYID = 6
3,843,792 UART: [idev] SUBJECT.KEYID = 7
3,844,893 UART: [idev] UDS.KEYID = 0
3,845,989 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,862,258 UART: [idev] Erasing UDS.KEYID = 0
6,321,159 UART: [idev] Sha1 KeyId Algorithm
6,344,389 UART: [idev] --
6,349,170 UART: [ldev] ++
6,349,750 UART: [ldev] CDI.KEYID = 6
6,350,654 UART: [ldev] SUBJECT.KEYID = 5
6,351,872 UART: [ldev] AUTHORITY.KEYID = 7
6,353,105 UART: [ldev] FE.KEYID = 1
6,363,997 UART: [ldev] Erasing FE.KEYID = 1
8,838,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,619 UART: [ldev] --
10,629,743 UART: [fwproc] Wait for Commands...
10,632,761 UART: [fwproc] Recv command 0x46504c54
10,635,182 UART: [kat] SHA2-256
10,814,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,826,008 UART: [kat] ++
10,826,548 UART: [kat] sha1
10,837,782 UART: [kat] SHA2-256
10,840,857 UART: [kat] SHA2-384
10,847,539 UART: [kat] SHA2-512-ACC
10,850,477 UART: [kat] ECC-384
13,294,359 UART: [kat] HMAC-384Kdf
13,308,140 UART: [kat] LMS
13,837,773 UART: [kat] --
13,838,422 >>> mbox cmd response data (8 bytes)
13,838,896 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,839,389 UART: [fwproc] Recv command 0x46504c67
13,841,939 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,985 writing to cptra_bootfsm_go
3,699,936 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,474,764 >>> mbox cmd response data (8 bytes)
13,475,598 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,477,489 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,220 UART:
192,585 UART: Running Caliptra ROM ...
193,776 UART:
193,932 UART: [state] CFI Enabled
260,878 UART: [state] LifecycleState = Unprovisioned
263,279 UART: [state] DebugLocked = No
265,852 UART: [state] WD Timer not started. Device not locked for debugging
271,237 UART: [kat] SHA2-256
461,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,877 UART: [kat] ++
472,356 UART: [kat] sha1
484,210 UART: [kat] SHA2-256
487,219 UART: [kat] SHA2-384
493,954 UART: [kat] SHA2-512-ACC
496,512 UART: [kat] ECC-384
2,945,022 UART: [kat] HMAC-384Kdf
2,969,200 UART: [kat] LMS
3,500,943 UART: [kat] --
3,504,140 UART: [cold-reset] ++
3,505,916 UART: [fht] FHT @ 0x50003400
3,517,716 UART: [idev] ++
3,518,391 UART: [idev] CDI.KEYID = 6
3,519,356 UART: [idev] SUBJECT.KEYID = 7
3,520,573 UART: [idev] UDS.KEYID = 0
3,521,557 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,541,801 UART: [idev] Erasing UDS.KEYID = 0
6,030,769 UART: [idev] Sha1 KeyId Algorithm
6,053,489 UART: [idev] --
6,057,982 UART: [ldev] ++
6,058,705 UART: [ldev] CDI.KEYID = 6
6,059,623 UART: [ldev] SUBJECT.KEYID = 5
6,060,790 UART: [ldev] AUTHORITY.KEYID = 7
6,061,971 UART: [ldev] FE.KEYID = 1
6,102,432 UART: [ldev] Erasing FE.KEYID = 1
8,607,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,311 UART: [ldev] --
10,415,001 UART: [fwproc] Wait for Commands...
10,418,023 UART: [fwproc] Recv command 0x46504c54
10,420,669 UART: [kat] SHA2-256
10,610,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,621,134 UART: [kat] ++
10,621,684 UART: [kat] sha1
10,632,849 UART: [kat] SHA2-256
10,635,919 UART: [kat] SHA2-384
10,640,723 UART: [kat] SHA2-512-ACC
10,643,290 UART: [kat] ECC-384
13,104,072 UART: [kat] HMAC-384Kdf
13,129,083 UART: [kat] LMS
13,660,928 UART: [kat] --
13,661,626 >>> mbox cmd response data (8 bytes)
13,662,085 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,663,087 UART: [fwproc] Recv command 0x46504c67
13,665,534 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,438,608 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,386,476 >>> mbox cmd response data (8 bytes)
13,387,299 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,388,918 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,451 UART:
192,867 UART: Running Caliptra ROM ...
193,962 UART:
603,715 UART: [state] CFI Enabled
616,574 UART: [state] LifecycleState = Unprovisioned
618,980 UART: [state] DebugLocked = No
620,543 UART: [state] WD Timer not started. Device not locked for debugging
625,582 UART: [kat] SHA2-256
815,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,283 UART: [kat] ++
826,787 UART: [kat] sha1
838,091 UART: [kat] SHA2-256
841,129 UART: [kat] SHA2-384
846,512 UART: [kat] SHA2-512-ACC
849,066 UART: [kat] ECC-384
3,288,345 UART: [kat] HMAC-384Kdf
3,301,286 UART: [kat] LMS
3,833,122 UART: [kat] --
3,837,383 UART: [cold-reset] ++
3,839,694 UART: [fht] FHT @ 0x50003400
3,849,861 UART: [idev] ++
3,850,598 UART: [idev] CDI.KEYID = 6
3,851,508 UART: [idev] SUBJECT.KEYID = 7
3,852,725 UART: [idev] UDS.KEYID = 0
3,853,724 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,868,160 UART: [idev] Erasing UDS.KEYID = 0
6,325,365 UART: [idev] Sha1 KeyId Algorithm
6,348,220 UART: [idev] --
6,353,426 UART: [ldev] ++
6,354,116 UART: [ldev] CDI.KEYID = 6
6,355,024 UART: [ldev] SUBJECT.KEYID = 5
6,356,191 UART: [ldev] AUTHORITY.KEYID = 7
6,357,422 UART: [ldev] FE.KEYID = 1
6,370,872 UART: [ldev] Erasing FE.KEYID = 1
8,850,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,368 UART: [ldev] --
10,642,181 UART: [fwproc] Wait for Commands...
10,645,146 UART: [fwproc] Recv command 0x46504c54
10,647,822 UART: [kat] SHA2-256
10,837,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,848,348 UART: [kat] ++
10,848,893 UART: [kat] sha1
10,860,321 UART: [kat] SHA2-256
10,863,343 UART: [kat] SHA2-384
10,869,766 UART: [kat] SHA2-512-ACC
10,872,316 UART: [kat] ECC-384
13,312,916 UART: [kat] HMAC-384Kdf
13,326,429 UART: [kat] LMS
13,858,294 UART: [kat] --
13,859,004 >>> mbox cmd response data (8 bytes)
13,859,423 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,860,782 UART: [fwproc] Recv command 0x46504c67
13,863,280 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
3,752,739 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,587,545 >>> mbox cmd response data (8 bytes)
13,588,367 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,589,547 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
895,018 UART: [kat] SHA2-512-ACC
896,919 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,222 UART: [kat] LMS
1,475,418 UART: [kat] --
1,476,361 UART: [cold-reset] ++
1,476,791 UART: [fht] Storing FHT @ 0x50003400
1,479,456 UART: [idev] ++
1,479,624 UART: [idev] CDI.KEYID = 6
1,479,984 UART: [idev] SUBJECT.KEYID = 7
1,480,408 UART: [idev] UDS.KEYID = 0
1,480,753 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,584 UART: [idev] Erasing UDS.KEYID = 0
1,505,586 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,178 UART: [idev] --
1,515,189 UART: [ldev] ++
1,515,357 UART: [ldev] CDI.KEYID = 6
1,515,720 UART: [ldev] SUBJECT.KEYID = 5
1,516,146 UART: [ldev] AUTHORITY.KEYID = 7
1,516,609 UART: [ldev] FE.KEYID = 1
1,521,901 UART: [ldev] Erasing FE.KEYID = 1
1,547,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,688 UART: [ldev] --
1,587,051 UART: [fwproc] Waiting for Commands...
1,587,672 UART: [fwproc] Received command 0x46504c54
1,588,579 UART: [kat] SHA2-256
2,382,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,625 UART: [kat] ++
2,386,777 UART: [kat] sha1
2,390,867 UART: [kat] SHA2-256
2,392,805 UART: [kat] SHA2-384
2,395,584 UART: [kat] SHA2-512-ACC
2,397,484 UART: [kat] ECC-384
2,402,989 UART: [kat] HMAC-384Kdf
2,407,825 UART: [kat] LMS
2,976,021 UART: [kat] --
2,976,259 >>> mbox cmd response data (8 bytes)
2,976,260 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,376 UART: [fwproc] Received command 0x46504c67
2,977,330 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,717 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,183 >>> mbox cmd response data (8 bytes)
2,715,184 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,715,530 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,684 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,453 UART: [kat] SHA2-512-ACC
897,354 UART: [kat] ECC-384
903,071 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,252 UART: [cold-reset] ++
1,476,688 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,151 UART: [idev] Erasing UDS.KEYID = 0
1,504,561 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,967 UART: [idev] --
1,513,990 UART: [ldev] ++
1,514,158 UART: [ldev] CDI.KEYID = 6
1,514,521 UART: [ldev] SUBJECT.KEYID = 5
1,514,947 UART: [ldev] AUTHORITY.KEYID = 7
1,515,410 UART: [ldev] FE.KEYID = 1
1,520,572 UART: [ldev] Erasing FE.KEYID = 1
1,545,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,379 UART: [ldev] --
1,585,892 UART: [fwproc] Waiting for Commands...
1,586,623 UART: [fwproc] Received command 0x46504c54
1,587,530 UART: [kat] SHA2-256
2,381,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,385,576 UART: [kat] ++
2,385,728 UART: [kat] sha1
2,390,114 UART: [kat] SHA2-256
2,392,052 UART: [kat] SHA2-384
2,394,677 UART: [kat] SHA2-512-ACC
2,396,577 UART: [kat] ECC-384
2,402,060 UART: [kat] HMAC-384Kdf
2,406,716 UART: [kat] LMS
2,974,912 UART: [kat] --
2,975,150 >>> mbox cmd response data (8 bytes)
2,975,151 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,367 UART: [fwproc] Received command 0x46504c67
2,976,321 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,718,126 >>> mbox cmd response data (8 bytes)
2,718,127 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,718,521 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,627 UART: [kat] SHA2-256
903,567 UART: [kat] SHA2-384
906,200 UART: [kat] SHA2-512-ACC
908,101 UART: [kat] ECC-384
917,522 UART: [kat] HMAC-384Kdf
921,858 UART: [kat] LMS
1,170,186 UART: [kat] --
1,170,953 UART: [cold-reset] ++
1,171,495 UART: [fht] FHT @ 0x50003400
1,174,140 UART: [idev] ++
1,174,308 UART: [idev] CDI.KEYID = 6
1,174,668 UART: [idev] SUBJECT.KEYID = 7
1,175,092 UART: [idev] UDS.KEYID = 0
1,175,437 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,949 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,920 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,378 UART: [fwproc] Wait for Commands...
1,282,154 UART: [fwproc] Recv command 0x46504c54
1,283,000 UART: [kat] SHA2-256
2,088,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,092,775 UART: [kat] ++
2,092,927 UART: [kat] sha1
2,097,301 UART: [kat] SHA2-256
2,099,241 UART: [kat] SHA2-384
2,102,142 UART: [kat] SHA2-512-ACC
2,104,042 UART: [kat] ECC-384
2,113,967 UART: [kat] HMAC-384Kdf
2,118,479 UART: [kat] LMS
2,366,807 UART: [kat] --
2,367,045 >>> mbox cmd response data (8 bytes)
2,367,046 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,225 UART: [fwproc] Recv command 0x46504c67
2,368,118 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,980 >>> mbox cmd response data (8 bytes)
2,111,981 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,253 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
893,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,242 UART: [kat] ++
897,394 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,289 UART: [kat] SHA2-512-ACC
908,190 UART: [kat] ECC-384
917,815 UART: [kat] HMAC-384Kdf
922,443 UART: [kat] LMS
1,170,771 UART: [kat] --
1,171,396 UART: [cold-reset] ++
1,171,930 UART: [fht] FHT @ 0x50003400
1,174,727 UART: [idev] ++
1,174,895 UART: [idev] CDI.KEYID = 6
1,175,255 UART: [idev] SUBJECT.KEYID = 7
1,175,679 UART: [idev] UDS.KEYID = 0
1,176,024 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,727 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,286 UART: [idev] --
1,210,276 UART: [ldev] ++
1,210,444 UART: [ldev] CDI.KEYID = 6
1,210,807 UART: [ldev] SUBJECT.KEYID = 5
1,211,233 UART: [ldev] AUTHORITY.KEYID = 7
1,211,696 UART: [ldev] FE.KEYID = 1
1,217,026 UART: [ldev] Erasing FE.KEYID = 1
1,243,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,102 UART: [ldev] --
1,282,541 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46504c54
1,284,011 UART: [kat] SHA2-256
2,089,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,786 UART: [kat] ++
2,093,938 UART: [kat] sha1
2,098,140 UART: [kat] SHA2-256
2,100,080 UART: [kat] SHA2-384
2,102,999 UART: [kat] SHA2-512-ACC
2,104,899 UART: [kat] ECC-384
2,114,786 UART: [kat] HMAC-384Kdf
2,119,418 UART: [kat] LMS
2,367,746 UART: [kat] --
2,367,984 >>> mbox cmd response data (8 bytes)
2,367,985 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,120 UART: [fwproc] Recv command 0x46504c67
2,369,013 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,936 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,505 >>> mbox cmd response data (8 bytes)
2,114,506 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,796 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,417 UART: [fht] FHT @ 0x50003400
1,173,195 UART: [idev] ++
1,173,363 UART: [idev] CDI.KEYID = 6
1,173,724 UART: [idev] SUBJECT.KEYID = 7
1,174,149 UART: [idev] UDS.KEYID = 0
1,174,495 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,199,067 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,241,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,178 UART: [ldev] --
1,280,448 UART: [fwproc] Wait for Commands...
1,281,109 UART: [fwproc] Recv command 0x46504c54
1,281,963 UART: [kat] SHA2-256
2,085,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,089,642 UART: [kat] ++
2,089,794 UART: [kat] sha1
2,093,888 UART: [kat] SHA2-256
2,095,828 UART: [kat] SHA2-384
2,098,619 UART: [kat] SHA2-512-ACC
2,100,519 UART: [kat] ECC-384
2,110,364 UART: [kat] HMAC-384Kdf
2,115,036 UART: [kat] LMS
2,363,348 UART: [kat] --
2,363,589 >>> mbox cmd response data (8 bytes)
2,363,590 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,363,854 UART: [fwproc] Recv command 0x46504c67
2,364,758 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,688 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,103,521 >>> mbox cmd response data (8 bytes)
2,103,522 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,103,850 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,350 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,380 UART: [idev] ++
1,173,548 UART: [idev] CDI.KEYID = 6
1,173,909 UART: [idev] SUBJECT.KEYID = 7
1,174,334 UART: [idev] UDS.KEYID = 0
1,174,680 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,208,959 UART: [ldev] ++
1,209,127 UART: [ldev] CDI.KEYID = 6
1,209,491 UART: [ldev] SUBJECT.KEYID = 5
1,209,918 UART: [ldev] AUTHORITY.KEYID = 7
1,210,381 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,555 UART: [ldev] --
1,280,919 UART: [fwproc] Wait for Commands...
1,281,634 UART: [fwproc] Recv command 0x46504c54
1,282,488 UART: [kat] SHA2-256
2,086,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,090,167 UART: [kat] ++
2,090,319 UART: [kat] sha1
2,094,567 UART: [kat] SHA2-256
2,096,507 UART: [kat] SHA2-384
2,099,260 UART: [kat] SHA2-512-ACC
2,101,160 UART: [kat] ECC-384
2,111,087 UART: [kat] HMAC-384Kdf
2,115,773 UART: [kat] LMS
2,364,085 UART: [kat] --
2,364,326 >>> mbox cmd response data (8 bytes)
2,364,327 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,417 UART: [fwproc] Recv command 0x46504c67
2,365,321 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,751 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,236 >>> mbox cmd response data (8 bytes)
2,105,237 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,585 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,114 UART:
192,514 UART: Running Caliptra ROM ...
193,719 UART:
193,875 UART: [state] CFI Enabled
265,465 UART: [state] LifecycleState = Unprovisioned
267,413 UART: [state] DebugLocked = No
269,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,247 UART: [kat] SHA2-256
445,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,466 UART: [kat] ++
455,972 UART: [kat] sha1
467,139 UART: [kat] SHA2-256
469,799 UART: [kat] SHA2-384
476,079 UART: [kat] SHA2-512-ACC
478,454 UART: [kat] ECC-384
2,769,885 UART: [kat] HMAC-384Kdf
2,781,169 UART: [kat] LMS
3,971,492 UART: [kat] --
3,976,436 UART: [cold-reset] ++
3,978,234 UART: [fht] Storing FHT @ 0x50003400
3,989,724 UART: [idev] ++
3,990,299 UART: [idev] CDI.KEYID = 6
3,991,219 UART: [idev] SUBJECT.KEYID = 7
3,992,471 UART: [idev] UDS.KEYID = 0
3,993,549 ready_for_fw is high
3,993,781 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,136,897 UART: [idev] Erasing UDS.KEYID = 0
7,328,972 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,089 UART: [idev] --
7,355,385 UART: [ldev] ++
7,355,958 UART: [ldev] CDI.KEYID = 6
7,356,973 UART: [ldev] SUBJECT.KEYID = 5
7,358,138 UART: [ldev] AUTHORITY.KEYID = 7
7,359,391 UART: [ldev] FE.KEYID = 1
7,403,383 UART: [ldev] Erasing FE.KEYID = 1
10,734,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,573 UART: [ldev] --
13,115,551 UART: [fwproc] Waiting for Commands...
13,118,032 UART: [fwproc] Received command 0x46574c44
13,120,225 UART: [fwproc] Received Image of size 113760 bytes
17,168,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,895 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,627,410 >>> mbox cmd response: success
17,627,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,631,820 UART: [afmc] ++
17,632,399 UART: [afmc] CDI.KEYID = 6
17,633,282 UART: [afmc] SUBJECT.KEYID = 7
17,634,555 UART: [afmc] AUTHORITY.KEYID = 5
21,007,318 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,031 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,441 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,261 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,693 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,529 UART: [afmc] --
23,379,526 UART: [cold-reset] --
23,384,035 UART: [state] Locking Datavault
23,388,964 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,725 UART: [state] Locking ICCM
23,392,711 UART: [exit] Launching FMC @ 0x40000130
23,401,078 UART:
23,401,363 UART: Running Caliptra FMC ...
23,402,472 UART:
23,402,630 UART: [state] CFI Enabled
23,470,028 UART: [fht] FMC Alias Private Key: 7
25,807,662 UART: [art] Extend RT PCRs Done
25,808,884 UART: [art] Lock RT PCRs Done
25,810,807 UART: [art] Populate DV Done
25,816,380 UART: [fht] FMC Alias Private Key: 7
25,818,076 UART: [art] Derive CDI
25,818,894 UART: [art] Store in in slot 0x4
25,877,904 UART: [art] Derive Key Pair
25,879,105 UART: [art] Store priv key in slot 0x5
29,172,598 UART: [art] Derive Key Pair - Done
29,185,426 UART: [art] Signing Cert with AUTHO
29,186,735 UART: RITY.KEYID = 7
31,473,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,034 UART: [art] PUB.X = 78D2494CE367C0D7A21E8948D314E31FFB581127B3F6C5A1E326737670B702E4A7CFF7B38390EE6A5963D54387962EC4
31,482,309 UART: [art] PUB.Y = 5C33A37A45EA680F34570858661C2CDE30420479C442652F4CEAAE8B151C6B16B3A940F72DF2B0A678F1C309A3104A1A
31,489,512 UART: [art] SIG.R = D6CA2E2E9E881674C7BDA310C9F27C9BF9E1145787B742609D51FBEC0ADB592E7CEB67519C4A3B59AFADE8BE37E79A67
31,496,917 UART: [art] SIG.S = AC050E6257237E409FC6A115247A6F08C39888280967075AC65103935B61B3F5EC469320E0D652EA2E0B7E1A6B3F0424
32,802,363 UART: Caliptra RT
32,803,074 UART: [state] CFI Enabled
32,963,784 UART: [rt] RT listening for mailbox commands...
32,994,875 UART: [rt]cmd =0x46504c54, len=4
32,996,562 >>> mbox cmd response data (8 bytes)
32,996,969 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,027,112 UART: [rt]cmd =0x46504c67, len=4
33,028,438 >>> mbox cmd response: failed
33,029,340 UART: [rt] FIPS self test
33,030,277 UART: [kat] ++
33,030,733 UART: [kat] sha1
33,035,160 UART: [kat] SHA2-256
33,036,967 UART: [kat] SHA2-384
33,039,858 UART: [kat] SHA2-512-ACC
33,042,072 UART: [kat] ECC-384
36,320,903 UART: [kat] HMAC-384Kdf
36,327,928 UART: [kat] LMS
36,737,504 UART: [kat] --
40,710,633 UART: [rt] Verify complete
40,870,636 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,900,589 UART: [rt]cmd =0x46504c67, len=4
40,902,122 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,784,817 ready_for_fw is high
3,785,241 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
17,850,122 >>> mbox cmd response: success
17,850,844 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,544,881 UART:
23,545,267 UART: Running Caliptra FMC ...
23,546,438 UART:
23,546,597 UART: [state] CFI Enabled
23,596,954 UART: [fht] FMC Alias Private Key: 7
25,935,307 UART: [art] Extend RT PCRs Done
25,936,531 UART: [art] Lock RT PCRs Done
25,938,303 UART: [art] Populate DV Done
25,943,777 UART: [fht] FMC Alias Private Key: 7
25,945,426 UART: [art] Derive CDI
25,946,162 UART: [art] Store in in slot 0x4
26,006,026 UART: [art] Derive Key Pair
26,007,072 UART: [art] Store priv key in slot 0x5
29,299,839 UART: [art] Derive Key Pair - Done
29,313,007 UART: [art] Signing Cert with AUTHO
29,314,353 UART: RITY.KEYID = 7
31,602,140 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,648 UART: [art] PUB.X = 00B80E1CF78AF163C1DE07AB1092785626C27A6137BE6E400937AD49FE9111B7377A9A30AD723660517AC7B0825B1050
31,610,872 UART: [art] PUB.Y = 165795A7D832678DD739F3075241E30EEB8783F98D2C40CAD0FEA3919FF527C4C386E7B70A5540729071FE3B1CAC5A30
31,618,116 UART: [art] SIG.R = 8D61BE4ECD3C0044793F9D7DAFFDDE9A7751188B1770DD5578E83D474832F635310DD284099D03671E0ACBAC3188056F
31,625,510 UART: [art] SIG.S = 3C6494F0568BB2D23BF0962851236E3E1729CDAB376F3CED75B666C87C6074C10714735AE2F6DD5F25C29767F8E482BC
32,930,378 UART: Caliptra RT
32,931,077 UART: [state] CFI Enabled
33,093,501 UART: [rt] RT listening for mailbox commands...
33,124,432 UART: [rt]cmd =0x46504c54, len=4
33,125,898 >>> mbox cmd response data (8 bytes)
33,126,316 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,156,512 UART: [rt]cmd =0x46504c67, len=4
33,157,911 >>> mbox cmd response: failed
33,158,774 UART: [rt] FIPS self test
33,159,615 UART: [kat] ++
33,160,147 UART: [kat] sha1
33,164,481 UART: [kat] SHA2-256
33,166,303 UART: [kat] SHA2-384
33,169,126 UART: [kat] SHA2-512-ACC
33,171,375 UART: [kat] ECC-384
36,451,087 UART: [kat] HMAC-384Kdf
36,458,900 UART: [kat] LMS
36,868,475 UART: [kat] --
40,823,467 UART: [rt] Verify complete
41,000,010 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,029,965 UART: [rt]cmd =0x46504c67, len=4
41,031,656 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,454 UART:
192,823 UART: Running Caliptra ROM ...
193,954 UART:
603,621 UART: [state] CFI Enabled
619,557 UART: [state] LifecycleState = Unprovisioned
621,441 UART: [state] DebugLocked = No
623,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,135 UART: [kat] SHA2-256
798,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,423 UART: [kat] ++
809,898 UART: [kat] sha1
820,890 UART: [kat] SHA2-256
823,595 UART: [kat] SHA2-384
828,038 UART: [kat] SHA2-512-ACC
830,426 UART: [kat] ECC-384
3,114,017 UART: [kat] HMAC-384Kdf
3,125,318 UART: [kat] LMS
4,315,413 UART: [kat] --
4,321,421 UART: [cold-reset] ++
4,323,285 UART: [fht] Storing FHT @ 0x50003400
4,334,563 UART: [idev] ++
4,335,141 UART: [idev] CDI.KEYID = 6
4,336,060 UART: [idev] SUBJECT.KEYID = 7
4,337,312 UART: [idev] UDS.KEYID = 0
4,338,408 ready_for_fw is high
4,338,655 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
4,481,645 UART: [idev] Erasing UDS.KEYID = 0
7,622,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,812 UART: [idev] --
7,649,408 UART: [ldev] ++
7,649,981 UART: [ldev] CDI.KEYID = 6
7,650,946 UART: [ldev] SUBJECT.KEYID = 5
7,652,162 UART: [ldev] AUTHORITY.KEYID = 7
7,653,396 UART: [ldev] FE.KEYID = 1
7,663,830 UART: [ldev] Erasing FE.KEYID = 1
10,956,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,042 UART: [ldev] --
13,317,834 UART: [fwproc] Waiting for Commands...
13,320,042 UART: [fwproc] Received command 0x46574c44
13,322,251 UART: [fwproc] Received Image of size 113760 bytes
17,367,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,750 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
17,830,390 >>> mbox cmd response: success
17,830,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,834,684 UART: [afmc] ++
17,835,275 UART: [afmc] CDI.KEYID = 6
17,836,185 UART: [afmc] SUBJECT.KEYID = 7
17,837,406 UART: [afmc] AUTHORITY.KEYID = 5
21,149,473 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,770 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,162 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,010 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,405 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,880 UART: [afmc] --
23,517,230 UART: [cold-reset] --
23,520,394 UART: [state] Locking Datavault
23,525,587 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,341 UART: [state] Locking ICCM
23,528,412 UART: [exit] Launching FMC @ 0x40000130
23,536,809 UART:
23,537,047 UART: Running Caliptra FMC ...
23,538,101 UART:
23,538,254 UART: [state] CFI Enabled
23,546,526 UART: [fht] FMC Alias Private Key: 7
25,877,412 UART: [art] Extend RT PCRs Done
25,878,634 UART: [art] Lock RT PCRs Done
25,880,665 UART: [art] Populate DV Done
25,886,128 UART: [fht] FMC Alias Private Key: 7
25,887,791 UART: [art] Derive CDI
25,888,628 UART: [art] Store in in slot 0x4
25,931,283 UART: [art] Derive Key Pair
25,932,290 UART: [art] Store priv key in slot 0x5
29,174,533 UART: [art] Derive Key Pair - Done
29,187,592 UART: [art] Signing Cert with AUTHO
29,188,905 UART: RITY.KEYID = 7
31,468,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,164 UART: [art] PUB.X = 30E42BEF1F0C557E25A051E73C6D130E038ADEDA700E6470D2820188805D9574674AC5AD6B93A150227C886315481406
31,477,365 UART: [art] PUB.Y = 7CC625E72106B659C7FB6E67631B46963BD29DE9F4773C4548C3AD8812654B45394925456243DF08B75CBDD36DE54EC7
31,484,550 UART: [art] SIG.R = 4C8B753AECB8E721C25522C773FD73FA88A4A83D859C83406F5DFF0E08C6F7C975D5E81A499252C7661CD94AD52274F9
31,491,972 UART: [art] SIG.S = C2EFAE8918CA22BD13AC696A251EC6D55D36DB243A7981F8B12DB128B2D794186915BB513C03CAF75EE83B0CD96DB83A
32,797,409 UART: Caliptra RT
32,798,127 UART: [state] CFI Enabled
32,915,424 UART: [rt] RT listening for mailbox commands...
32,946,841 UART: [rt]cmd =0x46504c54, len=4
32,948,419 >>> mbox cmd response data (8 bytes)
32,948,843 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,979,255 UART: [rt]cmd =0x46504c67, len=4
32,980,743 >>> mbox cmd response: failed
32,981,233 UART: [rt] FIPS self test
32,982,080 UART: [kat] ++
32,982,520 UART: [kat] sha1
32,986,943 UART: [kat] SHA2-256
32,988,746 UART: [kat] SHA2-384
32,991,657 UART: [kat] SHA2-512-ACC
32,993,864 UART: [kat] ECC-384
36,236,012 UART: [kat] HMAC-384Kdf
36,241,683 UART: [kat] LMS
36,651,227 UART: [kat] --
40,626,651 UART: [rt] Verify complete
40,823,458 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,853,195 UART: [rt]cmd =0x46504c67, len=4
40,854,852 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,127,690 ready_for_fw is high
4,128,296 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
18,069,101 >>> mbox cmd response: success
18,069,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,704,465 UART:
23,704,866 UART: Running Caliptra FMC ...
23,705,997 UART:
23,706,160 UART: [state] CFI Enabled
23,714,032 UART: [fht] FMC Alias Private Key: 7
26,045,161 UART: [art] Extend RT PCRs Done
26,046,398 UART: [art] Lock RT PCRs Done
26,048,108 UART: [art] Populate DV Done
26,053,425 UART: [fht] FMC Alias Private Key: 7
26,055,022 UART: [art] Derive CDI
26,055,845 UART: [art] Store in in slot 0x4
26,098,368 UART: [art] Derive Key Pair
26,099,406 UART: [art] Store priv key in slot 0x5
29,341,843 UART: [art] Derive Key Pair - Done
29,355,192 UART: [art] Signing Cert with AUTHO
29,356,534 UART: RITY.KEYID = 7
31,636,146 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,658 UART: [art] PUB.X = 44BB233B2FE43C51FCECB9ABD5BB7963D8207E6CE10CB57BF000AE6669177EECFCF2C58B171A967B76571307D46C47A4
31,644,912 UART: [art] PUB.Y = BD97A50A6719F634D7EBD55638CE0D3FBFAF9C57878C73897A53F15BB9DF21AAC9ACF72C716676280EC025849296ED8F
31,652,184 UART: [art] SIG.R = E7A47325163361568BA9DD0BE9829F34AEB317AC2931B3DB661ACA8434FB0B9AC7EAA9E67EAEEF26AC1A4552FCCAF94C
31,659,590 UART: [art] SIG.S = CF70F4EB8A92C0F0FABDD782A1E1DE07E290638FB5D7AF0AEF2C7BE8C30B112FFB2F9C1123CD918DB88728B82635C8CE
32,964,353 UART: Caliptra RT
32,965,070 UART: [state] CFI Enabled
33,082,093 UART: [rt] RT listening for mailbox commands...
33,113,347 UART: [rt]cmd =0x46504c54, len=4
33,114,689 >>> mbox cmd response data (8 bytes)
33,115,116 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,145,362 UART: [rt]cmd =0x46504c67, len=4
33,146,650 >>> mbox cmd response: failed
33,147,881 UART: [rt] FIPS self test
33,148,806 UART: [kat] ++
33,149,256 UART: [kat] sha1
33,153,739 UART: [kat] SHA2-256
33,155,541 UART: [kat] SHA2-384
33,158,190 UART: [kat] SHA2-512-ACC
33,160,398 UART: [kat] ECC-384
36,402,960 UART: [kat] HMAC-384Kdf
36,408,692 UART: [kat] LMS
36,818,268 UART: [kat] --
40,772,482 UART: [rt] Verify complete
40,989,948 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,019,843 UART: [rt]cmd =0x46504c67, len=4
41,021,486 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,207 UART:
192,591 UART: Running Caliptra ROM ...
193,715 UART:
193,857 UART: [state] CFI Enabled
260,938 UART: [state] LifecycleState = Unprovisioned
262,790 UART: [state] DebugLocked = No
264,552 UART: [state] WD Timer not started. Device not locked for debugging
267,825 UART: [kat] SHA2-256
446,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,513 UART: [kat] ++
459,046 UART: [kat] sha1
469,861 UART: [kat] SHA2-256
472,873 UART: [kat] SHA2-384
478,533 UART: [kat] SHA2-512-ACC
481,544 UART: [kat] ECC-384
2,928,279 UART: [kat] HMAC-384Kdf
2,950,104 UART: [kat] LMS
3,479,618 UART: [kat] --
3,484,138 UART: [cold-reset] ++
3,485,365 UART: [fht] FHT @ 0x50003400
3,496,277 UART: [idev] ++
3,496,838 UART: [idev] CDI.KEYID = 6
3,497,869 UART: [idev] SUBJECT.KEYID = 7
3,498,970 UART: [idev] UDS.KEYID = 0
3,500,131 ready_for_fw is high
3,500,357 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,643,914 UART: [idev] Erasing UDS.KEYID = 0
6,004,172 UART: [idev] Sha1 KeyId Algorithm
6,026,946 UART: [idev] --
6,032,137 UART: [ldev] ++
6,032,725 UART: [ldev] CDI.KEYID = 6
6,033,611 UART: [ldev] SUBJECT.KEYID = 5
6,034,828 UART: [ldev] AUTHORITY.KEYID = 7
6,036,065 UART: [ldev] FE.KEYID = 1
6,080,629 UART: [ldev] Erasing FE.KEYID = 1
8,583,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,627 UART: [ldev] --
10,392,705 UART: [fwproc] Wait for Commands...
10,395,286 UART: [fwproc] Recv command 0x46574c44
10,397,381 UART: [fwproc] Recv'd Img size: 114084 bytes
13,802,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,482 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,291 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,260,662 >>> mbox cmd response: success
14,261,138 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,265,119 UART: [afmc] ++
14,265,704 UART: [afmc] CDI.KEYID = 6
14,266,618 UART: [afmc] SUBJECT.KEYID = 7
14,267,886 UART: [afmc] AUTHORITY.KEYID = 5
16,809,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,615 UART: [afmc] --
18,606,648 UART: [cold-reset] --
18,610,096 UART: [state] Locking Datavault
18,614,864 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,514 UART: [state] Locking ICCM
18,617,802 UART: [exit] Launching FMC @ 0x40000130
18,626,252 UART:
18,626,500 UART: Running Caliptra FMC ...
18,627,602 UART:
18,627,759 UART: [state] CFI Enabled
18,690,477 UART: [fht] FMC Alias Private Key: 7
20,454,904 UART: [art] Extend RT PCRs Done
20,456,123 UART: [art] Lock RT PCRs Done
20,457,721 UART: [art] Populate DV Done
20,463,023 UART: [fht] FMC Alias Private Key: 7
20,464,672 UART: [art] Derive CDI
20,465,410 UART: [art] Store in in slot 0x4
20,522,967 UART: [art] Derive Key Pair
20,524,025 UART: [art] Store priv key in slot 0x5
22,987,575 UART: [art] Derive Key Pair - Done
23,000,901 UART: [art] Signing Cert with AUTHO
23,002,203 UART: RITY.KEYID = 7
24,713,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,813 UART: [art] PUB.X = DDADAF8D430527343354B1986310765CB67CC31D54424D8404DC227F69238C642A9F2EA33F15CF1F0E7EBD581D9D8A16
24,722,076 UART: [art] PUB.Y = E27FBF682164803BB53F6CA1A61172F439717734D2FFFD697EC12F5E98A5D7C076A79667BF538498BC3CB62CF7917B7B
24,729,335 UART: [art] SIG.R = DF663855E62F2EE3B605F9F64AED7899E3A15465D4D0707BC4BB260021102AC9BCE813C751A65E8FCB93E3231871AD4A
24,736,747 UART: [art] SIG.S = BC0AA301BDDA85D65324AEB36B3AA8E0A735B45FFB6B4FBBFC54C003D5218450142E01FBD6181C3A48E197D2AB823E71
25,715,605 UART: Caliptra RT
25,716,310 UART: [state] CFI Enabled
25,881,382 UART: [rt] RT listening for mailbox commands...
25,912,527 UART: [rt]cmd =0x46504c54, len=4
25,914,052 >>> mbox cmd response data (8 bytes)
25,914,490 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,944,695 UART: [rt]cmd =0x46504c67, len=4
25,946,067 >>> mbox cmd response: failed
25,947,078 UART: [rt] FIPS self test
25,948,016 UART: [kat] ++
25,948,471 UART: [kat] sha1
25,952,945 UART: [kat] SHA2-256
25,954,742 UART: [kat] SHA2-384
25,957,525 UART: [kat] SHA2-512-ACC
25,959,739 UART: [kat] ECC-384
28,409,940 UART: [kat] HMAC-384Kdf
28,415,723 UART: [kat] LMS
28,613,002 UART: [kat] --
31,942,078 UART: [rt] Verify complete
32,084,495 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,114,590 UART: [rt]cmd =0x46504c67, len=4
32,116,199 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,383,475 ready_for_fw is high
3,383,930 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,061,536 >>> mbox cmd response: success
14,062,055 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,348,505 UART:
18,348,886 UART: Running Caliptra FMC ...
18,350,135 UART:
18,350,298 UART: [state] CFI Enabled
18,417,744 UART: [fht] FMC Alias Private Key: 7
20,181,984 UART: [art] Extend RT PCRs Done
20,183,202 UART: [art] Lock RT PCRs Done
20,184,668 UART: [art] Populate DV Done
20,190,027 UART: [fht] FMC Alias Private Key: 7
20,191,791 UART: [art] Derive CDI
20,192,591 UART: [art] Store in in slot 0x4
20,242,441 UART: [art] Derive Key Pair
20,243,446 UART: [art] Store priv key in slot 0x5
22,706,719 UART: [art] Derive Key Pair - Done
22,719,403 UART: [art] Signing Cert with AUTHO
22,720,715 UART: RITY.KEYID = 7
24,432,215 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,701 UART: [art] PUB.X = 30DCBCC07957FFE222128615D7E560059A44317DF0603410533DC65E033D7D3D11DC6D15D552306D822E1A66E0B72F73
24,440,979 UART: [art] PUB.Y = EC73B1D0552F5A5A39334CBA5B1D5E8DABA5EC9E8EC16BD08CE0224872C5A1114AFA967DB6702C86C33E76CF3224C760
24,448,256 UART: [art] SIG.R = 29B4F4075DA2A7EDC84AF4646F18ED03BCCA02BA81D08F0655BD9B8712B8E731035FE4D2B5416BCDCD0B9D302DDE8FCF
24,455,648 UART: [art] SIG.S = 6B84CB540271265EDCF792B97F9C7DDE9948A37759A316463CC0B91AA814CB8EC1F954F5EDF892FBF17658322724793E
25,434,926 UART: Caliptra RT
25,435,643 UART: [state] CFI Enabled
25,599,873 UART: [rt] RT listening for mailbox commands...
25,631,237 UART: [rt]cmd =0x46504c54, len=4
25,632,779 >>> mbox cmd response data (8 bytes)
25,633,219 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,663,141 UART: [rt]cmd =0x46504c67, len=4
25,664,543 >>> mbox cmd response: failed
25,665,776 UART: [rt] FIPS self test
25,666,702 UART: [kat] ++
25,667,153 UART: [kat] sha1
25,671,778 UART: [kat] SHA2-256
25,673,576 UART: [kat] SHA2-384
25,676,298 UART: [kat] SHA2-512-ACC
25,678,541 UART: [kat] ECC-384
28,127,516 UART: [kat] HMAC-384Kdf
28,134,019 UART: [kat] LMS
28,331,325 UART: [kat] --
31,639,780 UART: [rt] Verify complete
31,803,254 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,833,150 UART: [rt]cmd =0x46504c67, len=4
31,834,846 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,547 UART:
192,947 UART: Running Caliptra ROM ...
194,089 UART:
603,774 UART: [state] CFI Enabled
616,661 UART: [state] LifecycleState = Unprovisioned
618,539 UART: [state] DebugLocked = No
620,068 UART: [state] WD Timer not started. Device not locked for debugging
624,118 UART: [kat] SHA2-256
803,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,778 UART: [kat] ++
815,315 UART: [kat] sha1
825,670 UART: [kat] SHA2-256
828,681 UART: [kat] SHA2-384
834,604 UART: [kat] SHA2-512-ACC
837,551 UART: [kat] ECC-384
3,278,417 UART: [kat] HMAC-384Kdf
3,291,871 UART: [kat] LMS
3,821,415 UART: [kat] --
3,824,556 UART: [cold-reset] ++
3,825,858 UART: [fht] FHT @ 0x50003400
3,838,546 UART: [idev] ++
3,839,118 UART: [idev] CDI.KEYID = 6
3,840,029 UART: [idev] SUBJECT.KEYID = 7
3,841,209 UART: [idev] UDS.KEYID = 0
3,842,139 ready_for_fw is high
3,842,355 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,985,635 UART: [idev] Erasing UDS.KEYID = 0
6,314,348 UART: [idev] Sha1 KeyId Algorithm
6,337,102 UART: [idev] --
6,341,882 UART: [ldev] ++
6,342,463 UART: [ldev] CDI.KEYID = 6
6,343,372 UART: [ldev] SUBJECT.KEYID = 5
6,344,534 UART: [ldev] AUTHORITY.KEYID = 7
6,345,838 UART: [ldev] FE.KEYID = 1
6,357,668 UART: [ldev] Erasing FE.KEYID = 1
8,831,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,052 UART: [ldev] --
10,625,291 UART: [fwproc] Wait for Commands...
10,626,846 UART: [fwproc] Recv command 0x46574c44
10,628,950 UART: [fwproc] Recv'd Img size: 114084 bytes
14,031,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,489,243 >>> mbox cmd response: success
14,489,701 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,492,561 UART: [afmc] ++
14,493,143 UART: [afmc] CDI.KEYID = 6
14,494,058 UART: [afmc] SUBJECT.KEYID = 7
14,495,278 UART: [afmc] AUTHORITY.KEYID = 5
16,993,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,756 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,856 UART: [afmc] --
18,792,260 UART: [cold-reset] --
18,794,718 UART: [state] Locking Datavault
18,797,967 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,609 UART: [state] Locking ICCM
18,800,815 UART: [exit] Launching FMC @ 0x40000130
18,809,389 UART:
18,809,672 UART: Running Caliptra FMC ...
18,810,704 UART:
18,810,848 UART: [state] CFI Enabled
18,819,007 UART: [fht] FMC Alias Private Key: 7
20,575,255 UART: [art] Extend RT PCRs Done
20,576,463 UART: [art] Lock RT PCRs Done
20,578,199 UART: [art] Populate DV Done
20,583,830 UART: [fht] FMC Alias Private Key: 7
20,585,315 UART: [art] Derive CDI
20,586,075 UART: [art] Store in in slot 0x4
20,629,150 UART: [art] Derive Key Pair
20,630,155 UART: [art] Store priv key in slot 0x5
23,057,140 UART: [art] Derive Key Pair - Done
23,070,193 UART: [art] Signing Cert with AUTHO
23,071,506 UART: RITY.KEYID = 7
24,777,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,643 UART: [art] PUB.X = 345C7EEFD755F279B483DBB76518CEC10D7236E181E45FF7A9C144DC150B7652993FD619F7FE11EDFC1F9E636B6948F0
24,785,893 UART: [art] PUB.Y = 700AC08FC0CB316F010B477687722EA5BE8CC9A09751317922770ED4A046156C53D1BAC01E73FD8150701616F849FDE2
24,793,125 UART: [art] SIG.R = 0794B23ED3B77FACA94EFE0D65EFE44A18FEB45533E2F46C24F09A45D3524FC8B67E1CC99DA378CA6228E65CA6C5BE5C
24,800,568 UART: [art] SIG.S = 1F8D9D6C88883D583DE4AEA6F595E5AA040B81DA8337CFCCB85119E3C135B2D1DE21BE1CD06662FA8A87F34BBD719E11
25,779,395 UART: Caliptra RT
25,780,106 UART: [state] CFI Enabled
25,897,762 UART: [rt] RT listening for mailbox commands...
25,929,431 UART: [rt]cmd =0x46504c54, len=4
25,931,144 >>> mbox cmd response data (8 bytes)
25,931,554 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,961,973 UART: [rt]cmd =0x46504c67, len=4
25,963,372 >>> mbox cmd response: failed
25,964,298 UART: [rt] FIPS self test
25,965,167 UART: [kat] ++
25,965,608 UART: [kat] sha1
25,970,072 UART: [kat] SHA2-256
25,971,879 UART: [kat] SHA2-384
25,974,824 UART: [kat] SHA2-512-ACC
25,977,067 UART: [kat] ECC-384
28,404,547 UART: [kat] HMAC-384Kdf
28,410,364 UART: [kat] LMS
28,607,601 UART: [kat] --
31,935,793 UART: [rt] Verify complete
32,101,644 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,131,269 UART: [rt]cmd =0x46504c67, len=4
32,132,687 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,699,583 ready_for_fw is high
3,699,983 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,263,302 >>> mbox cmd response: success
14,263,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,511,906 UART:
18,512,307 UART: Running Caliptra FMC ...
18,513,477 UART:
18,513,631 UART: [state] CFI Enabled
18,521,511 UART: [fht] FMC Alias Private Key: 7
20,278,510 UART: [art] Extend RT PCRs Done
20,279,735 UART: [art] Lock RT PCRs Done
20,281,384 UART: [art] Populate DV Done
20,286,858 UART: [fht] FMC Alias Private Key: 7
20,288,398 UART: [art] Derive CDI
20,289,132 UART: [art] Store in in slot 0x4
20,331,566 UART: [art] Derive Key Pair
20,332,608 UART: [art] Store priv key in slot 0x5
22,758,928 UART: [art] Derive Key Pair - Done
22,771,885 UART: [art] Signing Cert with AUTHO
22,773,195 UART: RITY.KEYID = 7
24,478,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,035 UART: [art] PUB.X = 6B485FC64D860C61E69E13020A0ACBE9AB09D651B2EB6728813F1646C5530226B51171501546F5BEC84B6B8B54B1AC33
24,487,319 UART: [art] PUB.Y = 8BA8AA5B12DEEE2C1F2AE7E35487A4350A4A7479BCAAC41AE823BF2DAD0F91C0680582CC0589495C39A4F8E938828AE8
24,494,623 UART: [art] SIG.R = C25FA3BADF69D777FF948F6115DA87580D14A922BDFDB3268BA2947DF2AF9458CF427CF5DF5EEAB2CB1A6D058E473B0E
24,501,995 UART: [art] SIG.S = 847CA9EBEA8796D2E6CCAA45FBC7164B9C087240F9B05D70B83E835608F0657C5E336D88549FE8CAE78249A8F3D8F652
25,481,085 UART: Caliptra RT
25,481,809 UART: [state] CFI Enabled
25,599,477 UART: [rt] RT listening for mailbox commands...
25,631,055 UART: [rt]cmd =0x46504c54, len=4
25,632,525 >>> mbox cmd response data (8 bytes)
25,632,945 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,663,401 UART: [rt]cmd =0x46504c67, len=4
25,664,747 >>> mbox cmd response: failed
25,665,846 UART: [rt] FIPS self test
25,666,799 UART: [kat] ++
25,667,247 UART: [kat] sha1
25,671,736 UART: [kat] SHA2-256
25,673,668 UART: [kat] SHA2-384
25,676,534 UART: [kat] SHA2-512-ACC
25,678,757 UART: [kat] ECC-384
28,105,508 UART: [kat] HMAC-384Kdf
28,111,442 UART: [kat] LMS
28,308,747 UART: [kat] --
31,617,083 UART: [rt] Verify complete
31,803,867 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,833,810 UART: [rt]cmd =0x46504c67, len=4
31,835,473 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,284 UART:
192,646 UART: Running Caliptra ROM ...
193,840 UART:
193,994 UART: [state] CFI Enabled
265,143 UART: [state] LifecycleState = Unprovisioned
267,555 UART: [state] DebugLocked = No
268,953 UART: [state] WD Timer not started. Device not locked for debugging
273,704 UART: [kat] SHA2-256
463,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,385 UART: [kat] ++
474,842 UART: [kat] sha1
485,724 UART: [kat] SHA2-256
488,807 UART: [kat] SHA2-384
494,303 UART: [kat] SHA2-512-ACC
496,896 UART: [kat] ECC-384
2,947,025 UART: [kat] HMAC-384Kdf
2,973,023 UART: [kat] LMS
3,504,788 UART: [kat] --
3,508,799 UART: [cold-reset] ++
3,510,741 UART: [fht] FHT @ 0x50003400
3,522,568 UART: [idev] ++
3,523,345 UART: [idev] CDI.KEYID = 6
3,524,272 UART: [idev] SUBJECT.KEYID = 7
3,525,458 UART: [idev] UDS.KEYID = 0
3,526,389 ready_for_fw is high
3,526,633 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
3,670,233 UART: [idev] Erasing UDS.KEYID = 0
6,032,484 UART: [idev] Sha1 KeyId Algorithm
6,054,423 UART: [idev] --
6,059,586 UART: [ldev] ++
6,060,277 UART: [ldev] CDI.KEYID = 6
6,061,164 UART: [ldev] SUBJECT.KEYID = 5
6,062,381 UART: [ldev] AUTHORITY.KEYID = 7
6,063,617 UART: [ldev] FE.KEYID = 1
6,100,484 UART: [ldev] Erasing FE.KEYID = 1
8,605,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,895 UART: [ldev] --
10,413,800 UART: [fwproc] Wait for Commands...
10,416,608 UART: [fwproc] Recv command 0x46574c44
10,418,932 UART: [fwproc] Recv'd Img size: 114084 bytes
13,867,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,600,088 >>> mbox cmd response: success
14,600,513 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,603,724 UART: [afmc] ++
14,604,469 UART: [afmc] CDI.KEYID = 6
14,605,574 UART: [afmc] SUBJECT.KEYID = 7
14,607,124 UART: [afmc] AUTHORITY.KEYID = 5
17,151,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,791 UART: [afmc] --
18,967,223 UART: [cold-reset] --
18,971,411 UART: [state] Locking Datavault
18,975,095 UART: [state] Locking PCR0, PCR1 and PCR31
18,977,234 UART: [state] Locking ICCM
18,978,956 UART: [exit] Launching FMC @ 0x40000130
18,987,632 UART:
18,987,867 UART: Running Caliptra FMC ...
18,988,963 UART:
18,989,120 UART: [state] CFI Enabled
19,048,745 UART: [fht] FMC Alias Private Key: 7
20,813,384 UART: [art] Extend RT PCRs Done
20,814,613 UART: [art] Lock RT PCRs Done
20,816,240 UART: [art] Populate DV Done
20,821,515 UART: [fht] FMC Alias Private Key: 7
20,823,109 UART: [art] Derive CDI
20,823,922 UART: [art] Store in in slot 0x4
20,881,318 UART: [art] Derive Key Pair
20,882,364 UART: [art] Store priv key in slot 0x5
23,345,137 UART: [art] Derive Key Pair - Done
23,357,978 UART: [art] Signing Cert with AUTHO
23,359,283 UART: RITY.KEYID = 7
25,070,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,970 UART: [art] PUB.X = 8F8068C1E89BEE48326756D3E906FB40892799E0DC800F1D28F42B91FD7506F1958C9EEED0DAFEC3772A6ADA258DC9E3
25,079,216 UART: [art] PUB.Y = 149E59C4EA3068F158C5925DF61DAFAAD6826243987BC4F7BF976F974A115E97DF00897D533AC178C783172B52EDD106
25,086,508 UART: [art] SIG.R = 30AC87023BEA701ADCF0C009EA23445059E614F717B342077961D501E88038B2688B9CDFC0E706D0CC16DBAD81A17C53
25,093,909 UART: [art] SIG.S = 8BFD85C93A3409E1B0BD673EAB047FBC1FD3A6AA2D021CE05DA5E1C07404E608E973BB372A1409F59AD4CADB5D50F4B4
26,073,152 UART: Caliptra RT
26,073,847 UART: [state] CFI Enabled
26,236,404 UART: [rt] RT listening for mailbox commands...
26,267,671 UART: [rt]cmd =0x46504c54, len=4
26,269,255 >>> mbox cmd response data (8 bytes)
26,269,674 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,299,838 UART: [rt]cmd =0x46504c67, len=4
26,301,120 >>> mbox cmd response: failed
26,302,226 UART: [rt] FIPS self test
26,303,156 UART: [kat] ++
26,303,610 UART: [kat] sha1
26,308,069 UART: [kat] SHA2-256
26,309,874 UART: [kat] SHA2-384
26,312,795 UART: [kat] SHA2-512-ACC
26,315,044 UART: [kat] ECC-384
28,764,520 UART: [kat] HMAC-384Kdf
28,791,192 UART: [kat] LMS
28,988,454 UART: [kat] --
32,317,981 UART: [rt] Verify complete
32,440,747 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,470,638 UART: [rt]cmd =0x46504c67, len=4
32,472,043 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,438,053 ready_for_fw is high
3,438,596 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,727,735 >>> mbox cmd response: success
14,728,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,007,817 UART:
19,008,201 UART: Running Caliptra FMC ...
19,009,438 UART:
19,009,608 UART: [state] CFI Enabled
19,073,356 UART: [fht] FMC Alias Private Key: 7
20,837,438 UART: [art] Extend RT PCRs Done
20,838,687 UART: [art] Lock RT PCRs Done
20,840,509 UART: [art] Populate DV Done
20,846,094 UART: [fht] FMC Alias Private Key: 7
20,847,586 UART: [art] Derive CDI
20,848,353 UART: [art] Store in in slot 0x4
20,906,567 UART: [art] Derive Key Pair
20,907,610 UART: [art] Store priv key in slot 0x5
23,370,786 UART: [art] Derive Key Pair - Done
23,383,888 UART: [art] Signing Cert with AUTHO
23,385,202 UART: RITY.KEYID = 7
25,096,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,800 UART: [art] PUB.X = 1771E77883F1E68EA2ACCD446814FA4C28886F772000E4081726E511A990FAD14D6231C3A4741062FA1F8C58BFFC06A0
25,105,016 UART: [art] PUB.Y = 9E86DA4139572D07CA520CD7E76B6FD7F98DE2A2FD2DBFF74EA5D52F314BD77DDF24C1656120C3EF4D3432132475F766
25,112,317 UART: [art] SIG.R = 75048B7FF6B367CAE3826A367DE510DF573BC48CA95997E96A49B78AFBFF060B1B0858B0CFC24003F3926ED847664B82
25,119,696 UART: [art] SIG.S = 55F7993DF3844C7A6C4952FF6EE8F7304ABC37A6C9FEED1CA9199C3F48D7CEBAEFAA7405263A18243ECEB542AB570CED
26,098,878 UART: Caliptra RT
26,099,577 UART: [state] CFI Enabled
26,265,165 UART: [rt] RT listening for mailbox commands...
26,296,643 UART: [rt]cmd =0x46504c54, len=4
26,298,012 >>> mbox cmd response data (8 bytes)
26,298,478 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,328,370 UART: [rt]cmd =0x46504c67, len=4
26,329,688 >>> mbox cmd response: failed
26,330,419 UART: [rt] FIPS self test
26,331,353 UART: [kat] ++
26,331,805 UART: [kat] sha1
26,336,316 UART: [kat] SHA2-256
26,338,127 UART: [kat] SHA2-384
26,340,917 UART: [kat] SHA2-512-ACC
26,343,128 UART: [kat] ECC-384
28,793,114 UART: [kat] HMAC-384Kdf
28,820,001 UART: [kat] LMS
29,017,348 UART: [kat] --
32,327,401 UART: [rt] Verify complete
32,468,422 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,498,430 UART: [rt]cmd =0x46504c67, len=4
32,499,860 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,606 UART:
192,983 UART: Running Caliptra ROM ...
194,180 UART:
603,720 UART: [state] CFI Enabled
617,796 UART: [state] LifecycleState = Unprovisioned
620,196 UART: [state] DebugLocked = No
621,374 UART: [state] WD Timer not started. Device not locked for debugging
625,929 UART: [kat] SHA2-256
815,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,612 UART: [kat] ++
827,215 UART: [kat] sha1
839,163 UART: [kat] SHA2-256
842,175 UART: [kat] SHA2-384
849,089 UART: [kat] SHA2-512-ACC
851,676 UART: [kat] ECC-384
3,292,253 UART: [kat] HMAC-384Kdf
3,305,558 UART: [kat] LMS
3,837,406 UART: [kat] --
3,842,154 UART: [cold-reset] ++
3,843,739 UART: [fht] FHT @ 0x50003400
3,855,666 UART: [idev] ++
3,856,347 UART: [idev] CDI.KEYID = 6
3,857,389 UART: [idev] SUBJECT.KEYID = 7
3,858,503 UART: [idev] UDS.KEYID = 0
3,859,440 ready_for_fw is high
3,859,652 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
4,002,899 UART: [idev] Erasing UDS.KEYID = 0
6,338,429 UART: [idev] Sha1 KeyId Algorithm
6,360,368 UART: [idev] --
6,365,119 UART: [ldev] ++
6,365,802 UART: [ldev] CDI.KEYID = 6
6,366,825 UART: [ldev] SUBJECT.KEYID = 5
6,367,929 UART: [ldev] AUTHORITY.KEYID = 7
6,369,160 UART: [ldev] FE.KEYID = 1
6,378,619 UART: [ldev] Erasing FE.KEYID = 1
8,859,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,172 UART: [ldev] --
10,648,559 UART: [fwproc] Wait for Commands...
10,651,353 UART: [fwproc] Recv command 0x46574c44
10,653,677 UART: [fwproc] Recv'd Img size: 114084 bytes
14,092,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
14,832,389 >>> mbox cmd response: success
14,832,788 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,837,132 UART: [afmc] ++
14,837,820 UART: [afmc] CDI.KEYID = 6
14,839,058 UART: [afmc] SUBJECT.KEYID = 7
14,840,490 UART: [afmc] AUTHORITY.KEYID = 5
17,347,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,830 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,797 UART: [afmc] --
19,146,074 UART: [cold-reset] --
19,150,858 UART: [state] Locking Datavault
19,156,211 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,342 UART: [state] Locking ICCM
19,159,681 UART: [exit] Launching FMC @ 0x40000130
19,168,342 UART:
19,168,577 UART: Running Caliptra FMC ...
19,169,683 UART:
19,169,840 UART: [state] CFI Enabled
19,177,853 UART: [fht] FMC Alias Private Key: 7
20,934,434 UART: [art] Extend RT PCRs Done
20,935,658 UART: [art] Lock RT PCRs Done
20,937,097 UART: [art] Populate DV Done
20,942,506 UART: [fht] FMC Alias Private Key: 7
20,944,160 UART: [art] Derive CDI
20,944,974 UART: [art] Store in in slot 0x4
20,987,404 UART: [art] Derive Key Pair
20,988,444 UART: [art] Store priv key in slot 0x5
23,415,444 UART: [art] Derive Key Pair - Done
23,428,222 UART: [art] Signing Cert with AUTHO
23,429,523 UART: RITY.KEYID = 7
25,134,853 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,360 UART: [art] PUB.X = D3ABB671A9AD7F07139640CCF6E503CF3C9A124AB116268309023408DFD68E3E97E6679C260263A49D5E666D2F1FB4F9
25,143,642 UART: [art] PUB.Y = B1E32635A503BEB14C7DA7DAF490A16440A54D30114441C7EC746DF96ADF101F4813561507FB61CB15DE2A2DC6A1EBC9
25,150,910 UART: [art] SIG.R = 2F68CB2E8E6401320E1337292A40C38FE5D9E6940020216C7C264FF4DAF09E747932B28761C4CE3BB33C7DE739E08A43
25,158,314 UART: [art] SIG.S = ADDB359D64BD0B8D5375877E62E66B61DABA369AC35CF79BDD54EF089425752F7C6FDD24A4FB3153E6690F2B62251DC2
26,136,876 UART: Caliptra RT
26,137,563 UART: [state] CFI Enabled
26,255,180 UART: [rt] RT listening for mailbox commands...
26,286,371 UART: [rt]cmd =0x46504c54, len=4
26,287,896 >>> mbox cmd response data (8 bytes)
26,288,306 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,318,277 UART: [rt]cmd =0x46504c67, len=4
26,319,619 >>> mbox cmd response: failed
26,320,449 UART: [rt] FIPS self test
26,321,373 UART: [kat] ++
26,321,825 UART: [kat] sha1
26,326,152 UART: [kat] SHA2-256
26,327,953 UART: [kat] SHA2-384
26,330,647 UART: [kat] SHA2-512-ACC
26,332,871 UART: [kat] ECC-384
28,759,324 UART: [kat] HMAC-384Kdf
28,765,324 UART: [kat] LMS
28,962,591 UART: [kat] --
32,291,554 UART: [rt] Verify complete
32,458,742 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,488,333 UART: [rt]cmd =0x46504c67, len=4
32,489,859 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,754,181 ready_for_fw is high
3,754,804 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
14,947,096 >>> mbox cmd response: success
14,947,640 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,202,602 UART:
19,202,969 UART: Running Caliptra FMC ...
19,204,186 UART:
19,204,352 UART: [state] CFI Enabled
19,211,947 UART: [fht] FMC Alias Private Key: 7
20,969,421 UART: [art] Extend RT PCRs Done
20,970,640 UART: [art] Lock RT PCRs Done
20,972,594 UART: [art] Populate DV Done
20,978,267 UART: [fht] FMC Alias Private Key: 7
20,979,868 UART: [art] Derive CDI
20,980,687 UART: [art] Store in in slot 0x4
21,023,498 UART: [art] Derive Key Pair
21,024,495 UART: [art] Store priv key in slot 0x5
23,451,054 UART: [art] Derive Key Pair - Done
23,464,215 UART: [art] Signing Cert with AUTHO
23,465,516 UART: RITY.KEYID = 7
25,171,126 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,629 UART: [art] PUB.X = CBC0955FC026DEA5DE44D8A8595DDEF0CC08FF61754CC85E181C6AFAC43E77616162EE1611FCBE8AE2257E7C3938D1FF
25,179,927 UART: [art] PUB.Y = 849EFE40440E98562E7EACECE49223E9E4B767C6A97A96D2A43E77022BD77D9A656AE950916A484D58263B25A29E9C78
25,187,146 UART: [art] SIG.R = E91A6D557665AAAC3A1E93DA6B27C0895007B7CE62DBB1A7537272A77E9C1AAC2496590623A489195D415EC3C2F5A5F4
25,194,583 UART: [art] SIG.S = 9394497B87396ECFB58E9F4203322DF7B310A4D9018E05DD918AE66F69263F3238B918DBF0414D12D26AAFCC13028454
26,173,429 UART: Caliptra RT
26,174,117 UART: [state] CFI Enabled
26,291,662 UART: [rt] RT listening for mailbox commands...
26,322,808 UART: [rt]cmd =0x46504c54, len=4
26,324,521 >>> mbox cmd response data (8 bytes)
26,324,938 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,354,745 UART: [rt]cmd =0x46504c67, len=4
26,356,094 >>> mbox cmd response: failed
26,356,855 UART: [rt] FIPS self test
26,357,697 UART: [kat] ++
26,358,177 UART: [kat] sha1
26,362,695 UART: [kat] SHA2-256
26,364,514 UART: [kat] SHA2-384
26,367,443 UART: [kat] SHA2-512-ACC
26,369,692 UART: [kat] ECC-384
28,796,925 UART: [kat] HMAC-384Kdf
28,802,807 UART: [kat] LMS
29,000,099 UART: [kat] --
32,308,531 UART: [rt] Verify complete
32,495,375 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,525,146 UART: [rt]cmd =0x46504c67, len=4
32,526,572 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,203 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,780 UART: [kat] SHA2-512-ACC
896,681 UART: [kat] ECC-384
902,420 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,073 UART: [cold-reset] ++
1,476,445 UART: [fht] Storing FHT @ 0x50003400
1,479,016 UART: [idev] ++
1,479,184 UART: [idev] CDI.KEYID = 6
1,479,544 UART: [idev] SUBJECT.KEYID = 7
1,479,968 UART: [idev] UDS.KEYID = 0
1,480,313 ready_for_fw is high
1,480,313 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,487,704 UART: [idev] Erasing UDS.KEYID = 0
1,504,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,112 UART: [idev] --
1,514,307 UART: [ldev] ++
1,514,475 UART: [ldev] CDI.KEYID = 6
1,514,838 UART: [ldev] SUBJECT.KEYID = 5
1,515,264 UART: [ldev] AUTHORITY.KEYID = 7
1,515,727 UART: [ldev] FE.KEYID = 1
1,521,135 UART: [ldev] Erasing FE.KEYID = 1
1,546,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,070 UART: [ldev] --
1,586,429 UART: [fwproc] Waiting for Commands...
1,587,286 UART: [fwproc] Received command 0x46574c44
1,588,077 UART: [fwproc] Received Image of size 114084 bytes
2,883,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,074,956 >>> mbox cmd response: success
3,074,956 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,076,216 UART: [afmc] ++
3,076,384 UART: [afmc] CDI.KEYID = 6
3,076,746 UART: [afmc] SUBJECT.KEYID = 7
3,077,171 UART: [afmc] AUTHORITY.KEYID = 5
3,112,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,276 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,056 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,669 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,359 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,326 UART: [afmc] --
3,155,372 UART: [cold-reset] --
3,156,106 UART: [state] Locking Datavault
3,157,057 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,661 UART: [state] Locking ICCM
3,158,147 UART: [exit] Launching FMC @ 0x40000130
3,163,476 UART:
3,163,492 UART: Running Caliptra FMC ...
3,163,900 UART:
3,163,954 UART: [state] CFI Enabled
3,174,161 UART: [fht] FMC Alias Private Key: 7
3,281,916 UART: [art] Extend RT PCRs Done
3,282,344 UART: [art] Lock RT PCRs Done
3,283,636 UART: [art] Populate DV Done
3,291,819 UART: [fht] FMC Alias Private Key: 7
3,292,885 UART: [art] Derive CDI
3,293,165 UART: [art] Store in in slot 0x4
3,378,980 UART: [art] Derive Key Pair
3,379,340 UART: [art] Store priv key in slot 0x5
3,392,334 UART: [art] Derive Key Pair - Done
3,407,533 UART: [art] Signing Cert with AUTHO
3,408,013 UART: RITY.KEYID = 7
3,423,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,824 UART: [art] PUB.X = A88CF3874A12C22F8D8E5B8F76D9546595A3590BE6342D284F7B78F2A1243411DCBABCAE38A4622027A6C314E4762373
3,430,591 UART: [art] PUB.Y = D74CED65F6995C38470FBD6710C9B99D47A70280207FA0B0086ABAAA0AF3882E448B57DBF1EA718AD76F6C705CE51595
3,437,539 UART: [art] SIG.R = 214930DD3D899DB05443E586434CDDAE341C8B60360049CD53F92CD44D1FEDDBEEDDDC916E03CF16669645F36D8C1D14
3,444,296 UART: [art] SIG.S = AADCBE9714F78B0CFC51E87C87DE12F7EC54B182EED687BD2E98E0FF20B3EBE4E5C0234580C991F14B0CF46EA00B7B9A
3,468,270 UART: Caliptra RT
3,468,523 UART: [state] CFI Enabled
3,576,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,278 UART: [rt]cmd =0x46504c54, len=4
3,608,546 >>> mbox cmd response data (8 bytes)
3,608,547 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,638,356 UART: [rt]cmd =0x46504c67, len=4
3,639,224 >>> mbox cmd response: failed
3,639,394 UART: [rt] FIPS self test
3,639,725 UART: [kat] ++
3,639,877 UART: [kat] sha1
3,644,154 UART: [kat] SHA2-256
3,646,084 UART: [kat] SHA2-384
3,648,911 UART: [kat] SHA2-512-ACC
3,650,806 UART: [kat] ECC-384
3,660,299 UART: [kat] HMAC-384Kdf
3,664,808 UART: [kat] LMS
3,913,699 UART: [kat] --
6,129,639 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,138,974 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,168,496 UART: [rt]cmd =0x46504c67, len=4
6,169,565 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,973 ready_for_fw is high
1,362,973 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,288 >>> mbox cmd response: success
2,926,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,988,152 UART:
2,988,168 UART: Running Caliptra FMC ...
2,988,576 UART:
2,988,630 UART: [state] CFI Enabled
2,999,247 UART: [fht] FMC Alias Private Key: 7
3,106,888 UART: [art] Extend RT PCRs Done
3,107,316 UART: [art] Lock RT PCRs Done
3,108,792 UART: [art] Populate DV Done
3,116,797 UART: [fht] FMC Alias Private Key: 7
3,117,725 UART: [art] Derive CDI
3,118,005 UART: [art] Store in in slot 0x4
3,203,754 UART: [art] Derive Key Pair
3,204,114 UART: [art] Store priv key in slot 0x5
3,217,170 UART: [art] Derive Key Pair - Done
3,232,341 UART: [art] Signing Cert with AUTHO
3,232,821 UART: RITY.KEYID = 7
3,247,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,666 UART: [art] PUB.X = 3ADEE435A00999AEF89B7F63C120712C5191BDB4B56E68EBFE022401B143FED1E1101EC52EC44058C543C7E5F59AE800
3,255,415 UART: [art] PUB.Y = 08AF6B303E94FF15B21B1B1A7A316D378C103707505C85416AFAF9A931BBC07F410AB469481E5C234D8082182965749E
3,262,352 UART: [art] SIG.R = 39B3C03791EC5A519AE0DD4905B7B790224C30F2B30D8714AAADB7053C4391BEA7B683913F9D593BAE28F43E35D515DB
3,269,121 UART: [art] SIG.S = 8741EE15B230B6DF0B7EA966AF85EA4A87E4D3072B0B1AB45337A8306985FDB844CBD1259AE1CF38F45F249EBD3D1082
3,292,969 UART: Caliptra RT
3,293,222 UART: [state] CFI Enabled
3,401,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,789 UART: [rt]cmd =0x46504c54, len=4
3,432,927 >>> mbox cmd response data (8 bytes)
3,432,928 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,462,651 UART: [rt]cmd =0x46504c67, len=4
3,463,549 >>> mbox cmd response: failed
3,463,727 UART: [rt] FIPS self test
3,464,058 UART: [kat] ++
3,464,210 UART: [kat] sha1
3,468,367 UART: [kat] SHA2-256
3,470,297 UART: [kat] SHA2-384
3,473,042 UART: [kat] SHA2-512-ACC
3,474,937 UART: [kat] ECC-384
3,484,504 UART: [kat] HMAC-384Kdf
3,489,139 UART: [kat] LMS
3,738,030 UART: [kat] --
5,845,678 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,310 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,882,570 UART: [rt]cmd =0x46504c67, len=4
5,883,849 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,076 UART: [kat] SHA2-256
882,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,122 UART: [kat] ++
886,274 UART: [kat] sha1
890,426 UART: [kat] SHA2-256
892,364 UART: [kat] SHA2-384
894,917 UART: [kat] SHA2-512-ACC
896,818 UART: [kat] ECC-384
902,247 UART: [kat] HMAC-384Kdf
906,989 UART: [kat] LMS
1,475,185 UART: [kat] --
1,476,126 UART: [cold-reset] ++
1,476,668 UART: [fht] Storing FHT @ 0x50003400
1,479,537 UART: [idev] ++
1,479,705 UART: [idev] CDI.KEYID = 6
1,480,065 UART: [idev] SUBJECT.KEYID = 7
1,480,489 UART: [idev] UDS.KEYID = 0
1,480,834 ready_for_fw is high
1,480,834 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,488,583 UART: [idev] Erasing UDS.KEYID = 0
1,504,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,547 UART: [idev] --
1,514,794 UART: [ldev] ++
1,514,962 UART: [ldev] CDI.KEYID = 6
1,515,325 UART: [ldev] SUBJECT.KEYID = 5
1,515,751 UART: [ldev] AUTHORITY.KEYID = 7
1,516,214 UART: [ldev] FE.KEYID = 1
1,521,582 UART: [ldev] Erasing FE.KEYID = 1
1,546,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,951 UART: [ldev] --
1,586,418 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 114084 bytes
2,883,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,830 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,771 >>> mbox cmd response: success
3,075,771 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,077,027 UART: [afmc] ++
3,077,195 UART: [afmc] CDI.KEYID = 6
3,077,557 UART: [afmc] SUBJECT.KEYID = 7
3,077,982 UART: [afmc] AUTHORITY.KEYID = 5
3,112,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,305 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,918 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,608 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,623 UART: [afmc] --
3,156,737 UART: [cold-reset] --
3,157,369 UART: [state] Locking Datavault
3,158,728 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,332 UART: [state] Locking ICCM
3,159,788 UART: [exit] Launching FMC @ 0x40000130
3,165,117 UART:
3,165,133 UART: Running Caliptra FMC ...
3,165,541 UART:
3,165,684 UART: [state] CFI Enabled
3,176,487 UART: [fht] FMC Alias Private Key: 7
3,284,744 UART: [art] Extend RT PCRs Done
3,285,172 UART: [art] Lock RT PCRs Done
3,286,980 UART: [art] Populate DV Done
3,295,341 UART: [fht] FMC Alias Private Key: 7
3,296,517 UART: [art] Derive CDI
3,296,797 UART: [art] Store in in slot 0x4
3,382,752 UART: [art] Derive Key Pair
3,383,112 UART: [art] Store priv key in slot 0x5
3,396,192 UART: [art] Derive Key Pair - Done
3,411,318 UART: [art] Signing Cert with AUTHO
3,411,798 UART: RITY.KEYID = 7
3,427,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,983 UART: [art] PUB.X = 800FC742697BF1CE608341E1ECE8BD3101BB6CABA3455ABC2442A431B571235BACCAAE8369E5D82D385C3BDF47C2950E
3,434,760 UART: [art] PUB.Y = 90BCE5EFCA064BFDA0AE0F150A75AE3FEC6E3C089A65FFC8C97291D3668DAB55A2D52D46B66E9EAE22938EDF087E3519
3,441,719 UART: [art] SIG.R = F0359539802D00F8DB6176B815779923BF37B22EBE30F0E2E96140D4F5ED4567742F95C54A3A1AEEE5F9BC74630580BC
3,448,466 UART: [art] SIG.S = 7CBA4303963C615D498D417112884ED01F490434EC773FC5BDDE7C8824C5E827D73F0C5D66C290609AE325791FE6254B
3,471,858 UART: Caliptra RT
3,472,203 UART: [state] CFI Enabled
3,580,630 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,330 UART: [rt]cmd =0x46504c54, len=4
3,612,244 >>> mbox cmd response data (8 bytes)
3,612,245 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,641,972 UART: [rt]cmd =0x46504c67, len=4
3,642,982 >>> mbox cmd response: failed
3,643,112 UART: [rt] FIPS self test
3,643,443 UART: [kat] ++
3,643,595 UART: [kat] sha1
3,647,776 UART: [kat] SHA2-256
3,649,706 UART: [kat] SHA2-384
3,652,555 UART: [kat] SHA2-512-ACC
3,654,450 UART: [kat] ECC-384
3,664,207 UART: [kat] HMAC-384Kdf
3,668,770 UART: [kat] LMS
3,917,661 UART: [kat] --
6,133,769 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,142,732 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,040 UART: [rt]cmd =0x46504c67, len=4
6,172,971 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,106 ready_for_fw is high
1,363,106 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,926,185 >>> mbox cmd response: success
2,926,185 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,987,785 UART:
2,987,801 UART: Running Caliptra FMC ...
2,988,209 UART:
2,988,352 UART: [state] CFI Enabled
2,998,853 UART: [fht] FMC Alias Private Key: 7
3,107,050 UART: [art] Extend RT PCRs Done
3,107,478 UART: [art] Lock RT PCRs Done
3,108,950 UART: [art] Populate DV Done
3,117,127 UART: [fht] FMC Alias Private Key: 7
3,118,259 UART: [art] Derive CDI
3,118,539 UART: [art] Store in in slot 0x4
3,204,134 UART: [art] Derive Key Pair
3,204,494 UART: [art] Store priv key in slot 0x5
3,217,556 UART: [art] Derive Key Pair - Done
3,232,267 UART: [art] Signing Cert with AUTHO
3,232,747 UART: RITY.KEYID = 7
3,247,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,746 UART: [art] PUB.X = 4D8D0D8D18446915145A945E2C4567430B896CACD3B1654AB48398EFA26A7D06E0F175786DF27BA555E235F1E35344AE
3,255,507 UART: [art] PUB.Y = 973267E19C1712535D20CA067E55FF24652AC43C1E74E291890A402AAE8715E4FD3ED4876BAB72B2A4FE17A41A601757
3,262,451 UART: [art] SIG.R = 5DBA0D373BD06BFE6C3562785EB5F4A328F2EA2A7A949DBE1CDA3A29E450196B74FD8A14FB56CD13A5501A6A5361753E
3,269,234 UART: [art] SIG.S = A4BECC08F5426428D3213072D7771D7EEC3E9539F55AB4A7EAAD927B027443C9A1D8D577D16F5F7B068E103B21BC543E
3,293,244 UART: Caliptra RT
3,293,589 UART: [state] CFI Enabled
3,401,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,398 UART: [rt]cmd =0x46504c54, len=4
3,433,662 >>> mbox cmd response data (8 bytes)
3,433,663 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,463,318 UART: [rt]cmd =0x46504c67, len=4
3,464,108 >>> mbox cmd response: failed
3,464,248 UART: [rt] FIPS self test
3,464,579 UART: [kat] ++
3,464,731 UART: [kat] sha1
3,469,032 UART: [kat] SHA2-256
3,470,962 UART: [kat] SHA2-384
3,473,681 UART: [kat] SHA2-512-ACC
3,475,576 UART: [kat] ECC-384
3,485,647 UART: [kat] HMAC-384Kdf
3,490,350 UART: [kat] LMS
3,739,241 UART: [kat] --
5,847,419 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,853,869 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,263 UART: [rt]cmd =0x46504c67, len=4
5,884,398 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
901,967 UART: [kat] SHA2-256
903,907 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,859 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 ready_for_fw is high
1,176,119 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,183,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,617 UART: [idev] Sha1 KeyId Algorithm
1,209,175 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,437 UART: [ldev] --
1,282,754 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,451 >>> mbox cmd response: success
2,771,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,772,671 UART: [afmc] ++
2,772,839 UART: [afmc] CDI.KEYID = 6
2,773,201 UART: [afmc] SUBJECT.KEYID = 7
2,773,626 UART: [afmc] AUTHORITY.KEYID = 5
2,809,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,750 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,404 UART: [afmc] --
2,852,314 UART: [cold-reset] --
2,853,122 UART: [state] Locking Datavault
2,854,091 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,695 UART: [state] Locking ICCM
2,855,221 UART: [exit] Launching FMC @ 0x40000130
2,860,550 UART:
2,860,566 UART: Running Caliptra FMC ...
2,860,974 UART:
2,861,028 UART: [state] CFI Enabled
2,871,569 UART: [fht] FMC Alias Private Key: 7
2,979,296 UART: [art] Extend RT PCRs Done
2,979,724 UART: [art] Lock RT PCRs Done
2,981,056 UART: [art] Populate DV Done
2,989,255 UART: [fht] FMC Alias Private Key: 7
2,990,383 UART: [art] Derive CDI
2,990,663 UART: [art] Store in in slot 0x4
3,076,408 UART: [art] Derive Key Pair
3,076,768 UART: [art] Store priv key in slot 0x5
3,090,050 UART: [art] Derive Key Pair - Done
3,104,958 UART: [art] Signing Cert with AUTHO
3,105,438 UART: RITY.KEYID = 7
3,120,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,931 UART: [art] PUB.X = 929BFD9328EADB82FA32EAD82312B02254745824DA968795BC9C6A85FF452937083843ACF470B0C8C5569E2CD33C7AAB
3,127,704 UART: [art] PUB.Y = D31F547F55D09C98583E2379156C9BF24C160107E09EAE144A3F7CC09501957B4B9E3EC958F1EFC8A31ADAD4D80744BD
3,134,650 UART: [art] SIG.R = 7705FCC2903B8F97E5BAA08F143DCAA9D612EB1E12C684105D45B027F12F768E07FFC91A4A60EFCA9A65820B9FA0010E
3,141,419 UART: [art] SIG.S = C062158EE3A21141A29D457364FD2BBF66DCB732BF9DFFB8CAB8482BB3CDCA277FFFCB3E4F3C7FBA8083CDDEC6E635C2
3,165,184 UART: Caliptra RT
3,165,437 UART: [state] CFI Enabled
3,272,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,358 UART: [rt]cmd =0x46504c54, len=4
3,304,452 >>> mbox cmd response data (8 bytes)
3,304,453 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,333,974 UART: [rt]cmd =0x46504c67, len=4
3,335,026 >>> mbox cmd response: failed
3,335,188 UART: [rt] FIPS self test
3,335,519 UART: [kat] ++
3,335,671 UART: [kat] sha1
3,339,810 UART: [kat] SHA2-256
3,341,740 UART: [kat] SHA2-384
3,344,309 UART: [kat] SHA2-512-ACC
3,346,204 UART: [kat] ECC-384
3,355,797 UART: [kat] HMAC-384Kdf
3,360,382 UART: [kat] LMS
3,609,273 UART: [kat] --
5,834,171 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,844,775 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,933 UART: [rt]cmd =0x46504c67, len=4
5,875,190 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,273 ready_for_fw is high
1,060,273 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,108 >>> mbox cmd response: success
2,624,108 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,685,782 UART:
2,685,798 UART: Running Caliptra FMC ...
2,686,206 UART:
2,686,260 UART: [state] CFI Enabled
2,696,447 UART: [fht] FMC Alias Private Key: 7
2,804,198 UART: [art] Extend RT PCRs Done
2,804,626 UART: [art] Lock RT PCRs Done
2,806,484 UART: [art] Populate DV Done
2,814,943 UART: [fht] FMC Alias Private Key: 7
2,816,083 UART: [art] Derive CDI
2,816,363 UART: [art] Store in in slot 0x4
2,902,116 UART: [art] Derive Key Pair
2,902,476 UART: [art] Store priv key in slot 0x5
2,915,902 UART: [art] Derive Key Pair - Done
2,930,667 UART: [art] Signing Cert with AUTHO
2,931,147 UART: RITY.KEYID = 7
2,946,429 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,194 UART: [art] PUB.X = 68C49A7F7BCDFCE5E87A2BB3438600B519FA8A33D3F57C63FCE4A03AE25568AB6E40AC5451E152B7598D68D543F3E69F
2,953,956 UART: [art] PUB.Y = 595C928DBBA97475FA65A23EDAFDAEE59AFD78BF830AB9A97B33E8C42EE682831FF5DDC5645FD38FF43FCBD813E652AF
2,960,931 UART: [art] SIG.R = D21F343E4DB56D71FDCBD9DCA59D0512AE5D0CF8398B871986465CB37E8044227ECA13508E587A48DAE0F8EA000723A9
2,967,680 UART: [art] SIG.S = 3DDEFACF45397142484F708F8892399DEB39B4F52281DA703F873DF5E1CEF2A18C896E484CF888F46683E854DE123031
2,991,427 UART: Caliptra RT
2,991,680 UART: [state] CFI Enabled
3,099,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,689 UART: [rt]cmd =0x46504c54, len=4
3,130,877 >>> mbox cmd response data (8 bytes)
3,130,878 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,160,497 UART: [rt]cmd =0x46504c67, len=4
3,161,529 >>> mbox cmd response: failed
3,161,737 UART: [rt] FIPS self test
3,162,068 UART: [kat] ++
3,162,220 UART: [kat] sha1
3,166,471 UART: [kat] SHA2-256
3,168,401 UART: [kat] SHA2-384
3,171,286 UART: [kat] SHA2-512-ACC
3,173,181 UART: [kat] ECC-384
3,182,550 UART: [kat] HMAC-384Kdf
3,187,293 UART: [kat] LMS
3,436,184 UART: [kat] --
5,557,010 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,561,289 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,590,717 UART: [rt]cmd =0x46504c67, len=4
5,591,788 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
893,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,308 UART: [kat] ++
897,460 UART: [kat] sha1
901,784 UART: [kat] SHA2-256
903,724 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
923,053 UART: [kat] LMS
1,171,381 UART: [kat] --
1,172,352 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,184,915 UART: [idev] Erasing UDS.KEYID = 0
1,202,014 UART: [idev] Sha1 KeyId Algorithm
1,210,564 UART: [idev] --
1,211,546 UART: [ldev] ++
1,211,714 UART: [ldev] CDI.KEYID = 6
1,212,077 UART: [ldev] SUBJECT.KEYID = 5
1,212,503 UART: [ldev] AUTHORITY.KEYID = 7
1,212,966 UART: [ldev] FE.KEYID = 1
1,218,320 UART: [ldev] Erasing FE.KEYID = 1
1,244,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,092 UART: [ldev] --
1,283,549 UART: [fwproc] Wait for Commands...
1,284,189 UART: [fwproc] Recv command 0x46574c44
1,284,917 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,503 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,771,828 >>> mbox cmd response: success
2,771,828 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,773,068 UART: [afmc] ++
2,773,236 UART: [afmc] CDI.KEYID = 6
2,773,598 UART: [afmc] SUBJECT.KEYID = 7
2,774,023 UART: [afmc] AUTHORITY.KEYID = 5
2,810,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,403 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,811 UART: [afmc] --
2,853,741 UART: [cold-reset] --
2,854,525 UART: [state] Locking Datavault
2,855,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,510 UART: [state] Locking ICCM
2,856,992 UART: [exit] Launching FMC @ 0x40000130
2,862,321 UART:
2,862,337 UART: Running Caliptra FMC ...
2,862,745 UART:
2,862,888 UART: [state] CFI Enabled
2,873,847 UART: [fht] FMC Alias Private Key: 7
2,982,034 UART: [art] Extend RT PCRs Done
2,982,462 UART: [art] Lock RT PCRs Done
2,983,790 UART: [art] Populate DV Done
2,991,715 UART: [fht] FMC Alias Private Key: 7
2,992,839 UART: [art] Derive CDI
2,993,119 UART: [art] Store in in slot 0x4
3,078,466 UART: [art] Derive Key Pair
3,078,826 UART: [art] Store priv key in slot 0x5
3,091,682 UART: [art] Derive Key Pair - Done
3,106,746 UART: [art] Signing Cert with AUTHO
3,107,226 UART: RITY.KEYID = 7
3,122,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,159 UART: [art] PUB.X = 3437A0F389E46877721E8AD1B4C19F52022289183086D34C749594774613750A9FC7141E01C4AA77FAACAA305B52E728
3,129,910 UART: [art] PUB.Y = 52C7C6C4A2E20F85A14FBAEFFF871D7213555CC614A496A1C6D782D957B6EA7AFD594506EAC9C34BC6031B862DEEE665
3,136,867 UART: [art] SIG.R = 2DFBA90B6439CB30355FA62B6A2EE475A75CE8AA98890DB2C8A0849CCAFAD4F5B110B97106D9A77BF4D31F165D2A0346
3,143,641 UART: [art] SIG.S = 38946E372A3F42B9377DF01F0CC90F56AC8584D5D135DC4C1573B8CE7825FB134DC0F7FFBAC0691155E96996839C876F
3,167,338 UART: Caliptra RT
3,167,683 UART: [state] CFI Enabled
3,275,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,468 UART: [rt]cmd =0x46504c54, len=4
3,306,474 >>> mbox cmd response data (8 bytes)
3,306,475 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,336,136 UART: [rt]cmd =0x46504c67, len=4
3,337,068 >>> mbox cmd response: failed
3,337,206 UART: [rt] FIPS self test
3,337,537 UART: [kat] ++
3,337,689 UART: [kat] sha1
3,341,818 UART: [kat] SHA2-256
3,343,748 UART: [kat] SHA2-384
3,346,571 UART: [kat] SHA2-512-ACC
3,348,466 UART: [kat] ECC-384
3,358,349 UART: [kat] HMAC-384Kdf
3,362,916 UART: [kat] LMS
3,611,807 UART: [kat] --
5,836,127 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,818 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
5,865,920 UART: [rt]cmd =0x46504c67, len=4
5,867,201 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,132 ready_for_fw is high
1,060,132 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,622,869 >>> mbox cmd response: success
2,622,869 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,684,365 UART:
2,684,381 UART: Running Caliptra FMC ...
2,684,789 UART:
2,684,932 UART: [state] CFI Enabled
2,695,569 UART: [fht] FMC Alias Private Key: 7
2,802,852 UART: [art] Extend RT PCRs Done
2,803,280 UART: [art] Lock RT PCRs Done
2,804,820 UART: [art] Populate DV Done
2,813,187 UART: [fht] FMC Alias Private Key: 7
2,814,297 UART: [art] Derive CDI
2,814,577 UART: [art] Store in in slot 0x4
2,900,428 UART: [art] Derive Key Pair
2,900,788 UART: [art] Store priv key in slot 0x5
2,914,184 UART: [art] Derive Key Pair - Done
2,929,080 UART: [art] Signing Cert with AUTHO
2,929,560 UART: RITY.KEYID = 7
2,944,914 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,679 UART: [art] PUB.X = 905D7B5F517220DCED0412E25512E0B8B45428C5FE6B2D5D54B603CCA805ECE46ED837FB0CC55718B859C98901F4E909
2,952,437 UART: [art] PUB.Y = 6C595C0C869DB79A70C530FD869A04AC0B4D2439B5CD7AAF667679E37CB8A582AAAAEB19C32CBE90391D1EEA4E5944F6
2,959,396 UART: [art] SIG.R = AA3F712D941BBF95B791D625FDF671357026B5D31FC1EC39706E7E021D459BE2DF0A887334A209E5BA2564F3EC074F27
2,966,160 UART: [art] SIG.S = B352552CED16F6EA1F4BC5FC92B500A4825D1F1127EE10DF7914A7EE3065F27C8BBC14F072E5351D4BA08124C6EB071C
2,990,524 UART: Caliptra RT
2,990,869 UART: [state] CFI Enabled
3,098,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,985 UART: [rt]cmd =0x46504c54, len=4
3,130,235 >>> mbox cmd response data (8 bytes)
3,130,236 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,159,813 UART: [rt]cmd =0x46504c67, len=4
3,160,599 >>> mbox cmd response: failed
3,160,849 UART: [rt] FIPS self test
3,161,180 UART: [kat] ++
3,161,332 UART: [kat] sha1
3,165,311 UART: [kat] SHA2-256
3,167,241 UART: [kat] SHA2-384
3,169,824 UART: [kat] SHA2-512-ACC
3,171,719 UART: [kat] ECC-384
3,181,646 UART: [kat] HMAC-384Kdf
3,186,273 UART: [kat] LMS
3,435,164 UART: [kat] --
5,555,732 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,359 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,589,513 UART: [rt]cmd =0x46504c67, len=4
5,590,640 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,518 UART: [state] LifecycleState = Unprovisioned
85,173 UART: [state] DebugLocked = No
85,685 UART: [state] WD Timer not started. Device not locked for debugging
86,832 UART: [kat] SHA2-256
890,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,511 UART: [kat] ++
894,663 UART: [kat] sha1
899,009 UART: [kat] SHA2-256
900,949 UART: [kat] SHA2-384
903,864 UART: [kat] SHA2-512-ACC
905,765 UART: [kat] ECC-384
915,146 UART: [kat] HMAC-384Kdf
919,696 UART: [kat] LMS
1,168,008 UART: [kat] --
1,168,945 UART: [cold-reset] ++
1,169,475 UART: [fht] FHT @ 0x50003400
1,172,009 UART: [idev] ++
1,172,177 UART: [idev] CDI.KEYID = 6
1,172,538 UART: [idev] SUBJECT.KEYID = 7
1,172,963 UART: [idev] UDS.KEYID = 0
1,173,309 ready_for_fw is high
1,173,309 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,181,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,081 UART: [idev] Sha1 KeyId Algorithm
1,207,045 UART: [idev] --
1,208,184 UART: [ldev] ++
1,208,352 UART: [ldev] CDI.KEYID = 6
1,208,716 UART: [ldev] SUBJECT.KEYID = 5
1,209,143 UART: [ldev] AUTHORITY.KEYID = 7
1,209,606 UART: [ldev] FE.KEYID = 1
1,214,942 UART: [ldev] Erasing FE.KEYID = 1
1,240,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,996 UART: [ldev] --
1,280,494 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,873 >>> mbox cmd response: success
2,769,873 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,771,096 UART: [afmc] ++
2,771,264 UART: [afmc] CDI.KEYID = 6
2,771,627 UART: [afmc] SUBJECT.KEYID = 7
2,772,053 UART: [afmc] AUTHORITY.KEYID = 5
2,807,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,259 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,479 UART: [afmc] --
2,850,575 UART: [cold-reset] --
2,851,309 UART: [state] Locking Datavault
2,852,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,994 UART: [state] Locking ICCM
2,853,456 UART: [exit] Launching FMC @ 0x40000130
2,858,785 UART:
2,858,801 UART: Running Caliptra FMC ...
2,859,209 UART:
2,859,263 UART: [state] CFI Enabled
2,869,582 UART: [fht] FMC Alias Private Key: 7
2,977,501 UART: [art] Extend RT PCRs Done
2,977,929 UART: [art] Lock RT PCRs Done
2,979,231 UART: [art] Populate DV Done
2,987,226 UART: [fht] FMC Alias Private Key: 7
2,988,352 UART: [art] Derive CDI
2,988,632 UART: [art] Store in in slot 0x4
3,074,527 UART: [art] Derive Key Pair
3,074,887 UART: [art] Store priv key in slot 0x5
3,088,049 UART: [art] Derive Key Pair - Done
3,102,595 UART: [art] Signing Cert with AUTHO
3,103,075 UART: RITY.KEYID = 7
3,118,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,836 UART: [art] PUB.X = E1F2AA1EB820969B7B4C8CE2F4DC2D088714D236C21D60174BD0CC251732CAB5BDD4532623B7D737CA890C7B514824DC
3,125,610 UART: [art] PUB.Y = DB1469CD87D702399D68305E7EBD93A0B81AB0A2BBE9A458EA8A9AA9ED99F9717E48477E3D2FB57EFB788F92FEF514C9
3,132,575 UART: [art] SIG.R = 6D411772D5EE3CAC235BBF88C7C894EBFE78AB2F41730CD3483A1CCB5AD3FC757FEC4A00664A6AD5330D6802D487F5DC
3,139,334 UART: [art] SIG.S = 0E47AF995EC66C53F58511D8311B8C245FCAE995CB6C140D88F4A028DF855DBD08DA89B7E2C36F1AF14950425813BADB
3,163,198 UART: Caliptra RT
3,163,451 UART: [state] CFI Enabled
3,271,138 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,530 UART: [rt]cmd =0x46504c54, len=4
3,302,622 >>> mbox cmd response data (8 bytes)
3,302,623 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,332,258 UART: [rt]cmd =0x46504c67, len=4
3,333,320 >>> mbox cmd response: failed
3,333,438 UART: [rt] FIPS self test
3,333,769 UART: [kat] ++
3,333,921 UART: [kat] sha1
3,338,010 UART: [kat] SHA2-256
3,339,940 UART: [kat] SHA2-384
3,342,819 UART: [kat] SHA2-512-ACC
3,344,714 UART: [kat] ECC-384
3,353,687 UART: [kat] HMAC-384Kdf
3,358,076 UART: [kat] LMS
3,606,967 UART: [kat] --
5,830,151 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,833,070 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,464 UART: [rt]cmd =0x46504c67, len=4
5,863,743 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,644 ready_for_fw is high
1,056,644 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,620,359 >>> mbox cmd response: success
2,620,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,682,195 UART:
2,682,211 UART: Running Caliptra FMC ...
2,682,619 UART:
2,682,673 UART: [state] CFI Enabled
2,693,570 UART: [fht] FMC Alias Private Key: 7
2,801,293 UART: [art] Extend RT PCRs Done
2,801,721 UART: [art] Lock RT PCRs Done
2,803,285 UART: [art] Populate DV Done
2,811,210 UART: [fht] FMC Alias Private Key: 7
2,812,292 UART: [art] Derive CDI
2,812,572 UART: [art] Store in in slot 0x4
2,897,807 UART: [art] Derive Key Pair
2,898,167 UART: [art] Store priv key in slot 0x5
2,911,585 UART: [art] Derive Key Pair - Done
2,926,437 UART: [art] Signing Cert with AUTHO
2,926,917 UART: RITY.KEYID = 7
2,942,205 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,970 UART: [art] PUB.X = B7AB6FBB02AD7B0797C9202AB69E9F86065D1869947048C65A87A8F1BAEB074CA6F4CA7F28B49B2E2CEF036F20A543D6
2,949,739 UART: [art] PUB.Y = 64A131B44837A9C9485342E41FCC097CF182C8162E3F468102933D5AA97B3C9AC14753F58DD72FD47CD09C0C413E9FC0
2,956,682 UART: [art] SIG.R = 6AE25FBB5587BAF9AB851F3AC6CD4AB0B43D61E739FADC0E1B78AB64D4BC57FC32B6D26E8970E3487CFA7BFB9AD805D1
2,963,476 UART: [art] SIG.S = 0A21E0ABC8D1818F01C2816E8A5DB861B425ACFC3F6008C39ED8C6E6BBBB14AC909DBEDA4F4E7027480710E6A3677043
2,987,841 UART: Caliptra RT
2,988,094 UART: [state] CFI Enabled
3,096,359 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,887 UART: [rt]cmd =0x46504c54, len=4
3,128,051 >>> mbox cmd response data (8 bytes)
3,128,052 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,157,967 UART: [rt]cmd =0x46504c67, len=4
3,158,809 >>> mbox cmd response: failed
3,159,001 UART: [rt] FIPS self test
3,159,332 UART: [kat] ++
3,159,484 UART: [kat] sha1
3,163,705 UART: [kat] SHA2-256
3,165,635 UART: [kat] SHA2-384
3,168,484 UART: [kat] SHA2-512-ACC
3,170,379 UART: [kat] ECC-384
3,180,116 UART: [kat] HMAC-384Kdf
3,184,447 UART: [kat] LMS
3,433,338 UART: [kat] --
5,549,710 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,558,569 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,889 UART: [rt]cmd =0x46504c67, len=4
5,589,146 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,174,470 ready_for_fw is high
1,174,470 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,463 UART: [ldev] Erasing FE.KEYID = 1
1,241,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,667 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 114084 bytes
2,576,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,768,870 >>> mbox cmd response: success
2,768,870 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,769,983 UART: [afmc] ++
2,770,151 UART: [afmc] CDI.KEYID = 6
2,770,514 UART: [afmc] SUBJECT.KEYID = 7
2,770,940 UART: [afmc] AUTHORITY.KEYID = 5
2,806,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,734 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,463 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,346 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,810 UART: [afmc] --
2,849,926 UART: [cold-reset] --
2,850,756 UART: [state] Locking Datavault
2,852,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,747 UART: [state] Locking ICCM
2,853,187 UART: [exit] Launching FMC @ 0x40000130
2,858,516 UART:
2,858,532 UART: Running Caliptra FMC ...
2,858,940 UART:
2,859,083 UART: [state] CFI Enabled
2,869,830 UART: [fht] FMC Alias Private Key: 7
2,977,273 UART: [art] Extend RT PCRs Done
2,977,701 UART: [art] Lock RT PCRs Done
2,979,231 UART: [art] Populate DV Done
2,987,466 UART: [fht] FMC Alias Private Key: 7
2,988,542 UART: [art] Derive CDI
2,988,822 UART: [art] Store in in slot 0x4
3,074,755 UART: [art] Derive Key Pair
3,075,115 UART: [art] Store priv key in slot 0x5
3,088,385 UART: [art] Derive Key Pair - Done
3,102,999 UART: [art] Signing Cert with AUTHO
3,103,479 UART: RITY.KEYID = 7
3,118,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,238 UART: [art] PUB.X = 2E54E87380415EDDA090EDDDA0925DF2BAF28810829D599E237F3C9ADA038CF8318583A68E89CEDF9B432B59FC662522
3,126,013 UART: [art] PUB.Y = B498A0FF249BAC992711712D059E6CCC71B8C6F9F4F311A2A0824F46917DE504884C0D5AA895E70CBE11143E09DEB694
3,132,954 UART: [art] SIG.R = E9130C64A6C02E532D1666EE08E77AF410E4EC1333A789EF5B78AAF00B9D81C7457F80AEE305533F6B112FC15BBA3EF3
3,139,724 UART: [art] SIG.S = 398A8B17FBF8A6CF5F9D59FA93719257D2B95A772CB7F0F32A1F72EED902A05C89EE23625CFAAC68E5949E58EC05A054
3,163,219 UART: Caliptra RT
3,163,564 UART: [state] CFI Enabled
3,271,925 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,591 UART: [rt]cmd =0x46504c54, len=4
3,303,695 >>> mbox cmd response data (8 bytes)
3,303,696 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,333,199 UART: [rt]cmd =0x46504c67, len=4
3,334,207 >>> mbox cmd response: failed
3,334,459 UART: [rt] FIPS self test
3,334,790 UART: [kat] ++
3,334,942 UART: [kat] sha1
3,338,993 UART: [kat] SHA2-256
3,340,923 UART: [kat] SHA2-384
3,343,530 UART: [kat] SHA2-512-ACC
3,345,425 UART: [kat] ECC-384
3,355,270 UART: [kat] HMAC-384Kdf
3,359,765 UART: [kat] LMS
3,608,656 UART: [kat] --
5,831,496 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,833,957 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,197 UART: [rt]cmd =0x46504c67, len=4
5,864,372 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,193 ready_for_fw is high
1,056,193 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,617,978 >>> mbox cmd response: success
2,617,978 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,680,450 UART:
2,680,466 UART: Running Caliptra FMC ...
2,680,874 UART:
2,681,017 UART: [state] CFI Enabled
2,691,896 UART: [fht] FMC Alias Private Key: 7
2,799,967 UART: [art] Extend RT PCRs Done
2,800,395 UART: [art] Lock RT PCRs Done
2,801,789 UART: [art] Populate DV Done
2,810,118 UART: [fht] FMC Alias Private Key: 7
2,811,084 UART: [art] Derive CDI
2,811,364 UART: [art] Store in in slot 0x4
2,896,905 UART: [art] Derive Key Pair
2,897,265 UART: [art] Store priv key in slot 0x5
2,910,339 UART: [art] Derive Key Pair - Done
2,925,164 UART: [art] Signing Cert with AUTHO
2,925,644 UART: RITY.KEYID = 7
2,940,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,241 UART: [art] PUB.X = 3DEE8C5452FDDFB697B30C6BDD08EE4D1C0F889FB6862B0596928057C537A55A2A6C36D963A8649802C25E93BEA708FC
2,948,003 UART: [art] PUB.Y = 842ED8E1215AA16259DAE18DF63AC99C29B45B1F39539D70B1086585EEC627F2960B3CE2073D278A3F34348ADD8D9420
2,954,946 UART: [art] SIG.R = 8F0B90703E019FFB2A2FF29E26003EF3C831E5F11E4E95CE6846A742AC4ECA9806069BB7F8835C40DFAA3B4B9793657D
2,961,692 UART: [art] SIG.S = 34C00A4FB3C982E3FFC7D150A5EFFD77B21A71BB31D9F66A205E5E7AFF334B1F94389135075638321EE17B03BF1052A0
2,985,242 UART: Caliptra RT
2,985,587 UART: [state] CFI Enabled
3,092,942 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,328 UART: [rt]cmd =0x46504c54, len=4
3,124,528 >>> mbox cmd response data (8 bytes)
3,124,529 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,153,862 UART: [rt]cmd =0x46504c67, len=4
3,154,728 >>> mbox cmd response: failed
3,154,968 UART: [rt] FIPS self test
3,155,299 UART: [kat] ++
3,155,451 UART: [kat] sha1
3,159,688 UART: [kat] SHA2-256
3,161,618 UART: [kat] SHA2-384
3,164,383 UART: [kat] SHA2-512-ACC
3,166,278 UART: [kat] ECC-384
3,176,041 UART: [kat] HMAC-384Kdf
3,180,714 UART: [kat] LMS
3,429,605 UART: [kat] --
5,544,745 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,554,488 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,788 UART: [rt]cmd =0x46504c67, len=4
5,584,899 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,013 UART:
192,384 UART: Running Caliptra ROM ...
193,537 UART:
193,692 UART: [state] CFI Enabled
264,576 UART: [state] LifecycleState = Unprovisioned
266,516 UART: [state] DebugLocked = No
269,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,376 UART: [kat] SHA2-256
444,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,569 UART: [kat] ++
455,162 UART: [kat] sha1
466,964 UART: [kat] SHA2-256
469,668 UART: [kat] SHA2-384
475,431 UART: [kat] SHA2-512-ACC
477,768 UART: [kat] ECC-384
2,766,849 UART: [kat] HMAC-384Kdf
2,797,624 UART: [kat] LMS
3,987,934 UART: [kat] --
3,990,548 UART: [cold-reset] ++
3,992,974 UART: [fht] Storing FHT @ 0x50003400
4,003,593 UART: [idev] ++
4,004,165 UART: [idev] CDI.KEYID = 6
4,005,134 UART: [idev] SUBJECT.KEYID = 7
4,006,354 UART: [idev] UDS.KEYID = 0
4,007,582 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,031,277 UART: [idev] Erasing UDS.KEYID = 0
7,346,059 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,458 UART: [idev] --
7,372,176 UART: [ldev] ++
7,372,748 UART: [ldev] CDI.KEYID = 6
7,373,715 UART: [ldev] SUBJECT.KEYID = 5
7,374,875 UART: [ldev] AUTHORITY.KEYID = 7
7,376,162 UART: [ldev] FE.KEYID = 1
7,420,063 UART: [ldev] Erasing FE.KEYID = 1
10,749,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,415 UART: [ldev] --
13,115,208 UART: [fwproc] Waiting for Commands...
13,118,010 UART: [fwproc] Received command 0x46505652
13,120,419 UART: [rt] FIPS Version
13,122,035 >>> mbox cmd response data (36 bytes)
15,344,310 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,489,120 UART: [fwproc] Received command 0x46574c44
15,491,444 UART: [fwproc] Received Image of size 113760 bytes
19,539,168 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,609,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,677,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
19,993,847 >>> mbox cmd response: success
19,994,209 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,997,202 UART: [afmc] ++
19,997,832 UART: [afmc] CDI.KEYID = 6
19,998,747 UART: [afmc] SUBJECT.KEYID = 7
20,000,019 UART: [afmc] AUTHORITY.KEYID = 5
23,378,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,675,031 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,677,294 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,691,741 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,706,538 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,721,042 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,743,543 UART: [afmc] --
25,747,302 UART: [cold-reset] --
25,749,978 UART: [state] Locking Datavault
25,755,387 UART: [state] Locking PCR0, PCR1 and PCR31
25,757,145 UART: [state] Locking ICCM
25,759,188 UART: [exit] Launching FMC @ 0x40000130
25,767,533 UART:
25,767,769 UART: Running Caliptra FMC ...
25,768,871 UART:
25,769,025 UART: [state] CFI Enabled
25,834,243 UART: [fht] FMC Alias Private Key: 7
28,172,288 UART: [art] Extend RT PCRs Done
28,173,515 UART: [art] Lock RT PCRs Done
28,175,360 UART: [art] Populate DV Done
28,180,667 UART: [fht] FMC Alias Private Key: 7
28,182,368 UART: [art] Derive CDI
28,183,181 UART: [art] Store in in slot 0x4
28,243,257 UART: [art] Derive Key Pair
28,244,295 UART: [art] Store priv key in slot 0x5
31,537,621 UART: [art] Derive Key Pair - Done
31,550,461 UART: [art] Signing Cert with AUTHO
31,551,760 UART: RITY.KEYID = 7
33,838,820 UART: [art] Erasing AUTHORITY.KEYID = 7
33,840,322 UART: [art] PUB.X = C46C92A79B08799EE15C80B2343EE8005167CA119B68086EA8A65E987D677B0EFBAB3FA6A532A0D85F8342A3650431B2
33,847,594 UART: [art] PUB.Y = DC8310EB6F3DAB91E4159E521108166D5CA39F5CE0AE656597F9F0B51FF14ABB621F1B0EF459172BBE88178CFBB7E0FD
33,854,838 UART: [art] SIG.R = 5728CB72D83C72DE6AB629916BFC84B576A0AEBAEAD86A2EDA363058627D88B79FA308E17721737A61FB9C1B5CF9A8F6
33,862,265 UART: [art] SIG.S = 6CB3CEC4DF951B09BE29C1E84CC63F317DEC53C35CAE741570A08D86CA3B70D102CDAFB13A0B54F7FD2C3E346B6D5BD8
35,167,490 UART: Caliptra RT
35,168,203 UART: [state] CFI Enabled
35,327,452 UART: [rt] RT listening for mailbox commands...
35,358,866 UART: [rt]cmd =0x46505652, len=4
35,360,111 UART: [rt] FIPS Version
35,361,430 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,784,400 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,831,558 >>> mbox cmd response data (36 bytes)
15,057,863 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,225,151 >>> mbox cmd response: success
20,225,876 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,917,641 UART:
25,918,062 UART: Running Caliptra FMC ...
25,919,178 UART:
25,919,332 UART: [state] CFI Enabled
25,969,820 UART: [fht] FMC Alias Private Key: 7
28,307,888 UART: [art] Extend RT PCRs Done
28,309,133 UART: [art] Lock RT PCRs Done
28,310,844 UART: [art] Populate DV Done
28,316,100 UART: [fht] FMC Alias Private Key: 7
28,317,601 UART: [art] Derive CDI
28,318,337 UART: [art] Store in in slot 0x4
28,378,271 UART: [art] Derive Key Pair
28,379,308 UART: [art] Store priv key in slot 0x5
31,672,228 UART: [art] Derive Key Pair - Done
31,685,164 UART: [art] Signing Cert with AUTHO
31,686,463 UART: RITY.KEYID = 7
33,974,627 UART: [art] Erasing AUTHORITY.KEYID = 7
33,976,129 UART: [art] PUB.X = EBBD6994FC4214A6AF48DEA522B6DC9637EC0AF31A7FEB55165EAD9F741A59C0DB96237382087B7B1AC45F73044521AC
33,983,439 UART: [art] PUB.Y = 32EA495C7AEFEE0B2058EF96922F28A4A5EFE9027400033BBD81D465A4F3ABEEDFF8F7858CE8AA99401F5FFA503F9BC7
33,990,681 UART: [art] SIG.R = 8097584E4C029AA9691D7194503454D2E1A7E546EAB65328039A7368037C4159F829D69175D30C7577CBF19F95B792F7
33,998,024 UART: [art] SIG.S = 0917885DA2B8658C6767B2A250A002519042B89FA7171136C5170FCC805EBCF89CCC59AF184AC0F5EF731CFBB4528C2C
35,302,949 UART: Caliptra RT
35,303,659 UART: [state] CFI Enabled
35,466,419 UART: [rt] RT listening for mailbox commands...
35,497,724 UART: [rt]cmd =0x46505652, len=4
35,499,142 UART: [rt] FIPS Version
35,500,045 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,613 UART:
192,951 UART: Running Caliptra ROM ...
194,098 UART:
603,903 UART: [state] CFI Enabled
616,403 UART: [state] LifecycleState = Unprovisioned
618,315 UART: [state] DebugLocked = No
621,079 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,435 UART: [kat] SHA2-256
796,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,737 UART: [kat] ++
807,221 UART: [kat] sha1
818,122 UART: [kat] SHA2-256
820,813 UART: [kat] SHA2-384
826,577 UART: [kat] SHA2-512-ACC
828,915 UART: [kat] ECC-384
3,116,093 UART: [kat] HMAC-384Kdf
3,127,490 UART: [kat] LMS
4,317,598 UART: [kat] --
4,322,680 UART: [cold-reset] ++
4,323,976 UART: [fht] Storing FHT @ 0x50003400
4,335,515 UART: [idev] ++
4,336,082 UART: [idev] CDI.KEYID = 6
4,337,104 UART: [idev] SUBJECT.KEYID = 7
4,338,265 UART: [idev] UDS.KEYID = 0
4,339,528 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,353,841 UART: [idev] Erasing UDS.KEYID = 0
7,623,182 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,345 UART: [idev] --
7,649,994 UART: [ldev] ++
7,650,616 UART: [ldev] CDI.KEYID = 6
7,651,500 UART: [ldev] SUBJECT.KEYID = 5
7,652,769 UART: [ldev] AUTHORITY.KEYID = 7
7,654,002 UART: [ldev] FE.KEYID = 1
7,667,307 UART: [ldev] Erasing FE.KEYID = 1
10,953,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,173 UART: [ldev] --
13,313,739 UART: [fwproc] Waiting for Commands...
13,315,777 UART: [fwproc] Received command 0x46505652
13,318,180 UART: [rt] FIPS Version
13,319,788 >>> mbox cmd response data (36 bytes)
15,539,709 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
15,683,491 UART: [fwproc] Received command 0x46574c44
15,685,753 UART: [fwproc] Received Image of size 113760 bytes
19,737,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,814,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,883,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 89056
20,199,661 >>> mbox cmd response: success
20,200,040 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,203,911 UART: [afmc] ++
20,204,490 UART: [afmc] CDI.KEYID = 6
20,205,404 UART: [afmc] SUBJECT.KEYID = 7
20,206,692 UART: [afmc] AUTHORITY.KEYID = 5
23,525,854 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,821,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,823,512 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,837,906 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,852,753 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,867,203 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,888,328 UART: [afmc] --
25,892,348 UART: [cold-reset] --
25,896,151 UART: [state] Locking Datavault
25,901,621 UART: [state] Locking PCR0, PCR1 and PCR31
25,903,415 UART: [state] Locking ICCM
25,905,380 UART: [exit] Launching FMC @ 0x40000130
25,913,777 UART:
25,914,013 UART: Running Caliptra FMC ...
25,915,119 UART:
25,915,302 UART: [state] CFI Enabled
25,923,622 UART: [fht] FMC Alias Private Key: 7
28,254,086 UART: [art] Extend RT PCRs Done
28,255,314 UART: [art] Lock RT PCRs Done
28,257,390 UART: [art] Populate DV Done
28,262,693 UART: [fht] FMC Alias Private Key: 7
28,264,230 UART: [art] Derive CDI
28,264,962 UART: [art] Store in in slot 0x4
28,307,833 UART: [art] Derive Key Pair
28,308,867 UART: [art] Store priv key in slot 0x5
31,551,141 UART: [art] Derive Key Pair - Done
31,564,405 UART: [art] Signing Cert with AUTHO
31,565,708 UART: RITY.KEYID = 7
33,845,017 UART: [art] Erasing AUTHORITY.KEYID = 7
33,846,537 UART: [art] PUB.X = 277EC0DE3D013894069293E60EE925E202EFA5FB502ADF258B21442675433B38929B51C195DC9E7EBEA77CF79B2F2ECF
33,853,773 UART: [art] PUB.Y = EC8FBE11BD14411CA20FDA1685533C06436F0DB9E6C5146FEE04909A48C0A6E32DA0D796BDED5040BB967B5012EAEE1F
33,861,065 UART: [art] SIG.R = 031B4C78C9153E738098DFC9EB250C4C9DF7C5F21AC00CFF44407BAEB2F920AFBDAF0ACF4242DB06BBFA5F7FAB20E495
33,868,452 UART: [art] SIG.S = 3EE8498805F0B33A0DE6E7D1C452602C3F1D1009FBFE300CBC45A91B4FA7FB8620E963A1B8E128F6CD2AFBCD200EEF6A
35,173,686 UART: Caliptra RT
35,174,398 UART: [state] CFI Enabled
35,291,795 UART: [rt] RT listening for mailbox commands...
35,323,328 UART: [rt]cmd =0x46505652, len=4
35,324,573 UART: [rt] FIPS Version
35,325,998 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
4,133,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,046,943 >>> mbox cmd response data (36 bytes)
15,265,906 <<< Executing mbox cmd 0x46574c44 (113760 bytes) from SoC
20,431,424 >>> mbox cmd response: success
20,431,982 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,070,277 UART:
26,070,668 UART: Running Caliptra FMC ...
26,071,801 UART:
26,071,961 UART: [state] CFI Enabled
26,079,673 UART: [fht] FMC Alias Private Key: 7
28,411,001 UART: [art] Extend RT PCRs Done
28,412,236 UART: [art] Lock RT PCRs Done
28,413,869 UART: [art] Populate DV Done
28,419,241 UART: [fht] FMC Alias Private Key: 7
28,420,819 UART: [art] Derive CDI
28,421,562 UART: [art] Store in in slot 0x4
28,464,267 UART: [art] Derive Key Pair
28,465,268 UART: [art] Store priv key in slot 0x5
31,707,867 UART: [art] Derive Key Pair - Done
31,720,880 UART: [art] Signing Cert with AUTHO
31,722,186 UART: RITY.KEYID = 7
34,001,539 UART: [art] Erasing AUTHORITY.KEYID = 7
34,003,054 UART: [art] PUB.X = 921D02BA43E5AF808DD07E0C50BD86E841523D3451C75A6019E125F2DDE9C857BC53442C613B86DA8EBFBF6F5E9EC578
34,010,268 UART: [art] PUB.Y = BEB1B24B92293F72A7DC511BD2D11540FA888350814A11204871E5618C8FFB277C424D434159D57D5CAB49FEE04D5881
34,017,511 UART: [art] SIG.R = D36269025B9DCA874089187F9CC077074BA9A296F94D879A11F91B03950F7D1739B4E8F5AF20B32A68568F9C6CC2CFF0
34,024,919 UART: [art] SIG.S = 79705BBE0D52850828F05AC08BCD599B2C4E247E4CD1BF88DC41CCE69E8ECEFC2B3B8F7A528C8A6A86B571E1911BE415
35,329,834 UART: Caliptra RT
35,330,555 UART: [state] CFI Enabled
35,449,479 UART: [rt] RT listening for mailbox commands...
35,480,725 UART: [rt]cmd =0x46505652, len=4
35,482,005 UART: [rt] FIPS Version
35,483,392 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,256 UART:
192,643 UART: Running Caliptra ROM ...
193,789 UART:
193,939 UART: [state] CFI Enabled
264,608 UART: [state] LifecycleState = Unprovisioned
266,501 UART: [state] DebugLocked = No
269,184 UART: [state] WD Timer not started. Device not locked for debugging
272,886 UART: [kat] SHA2-256
452,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,598 UART: [kat] ++
464,139 UART: [kat] sha1
475,727 UART: [kat] SHA2-256
478,731 UART: [kat] SHA2-384
485,087 UART: [kat] SHA2-512-ACC
488,077 UART: [kat] ECC-384
2,947,472 UART: [kat] HMAC-384Kdf
2,963,865 UART: [kat] LMS
3,493,335 UART: [kat] --
3,497,412 UART: [cold-reset] ++
3,499,241 UART: [fht] FHT @ 0x50003400
3,509,409 UART: [idev] ++
3,509,972 UART: [idev] CDI.KEYID = 6
3,510,881 UART: [idev] SUBJECT.KEYID = 7
3,512,094 UART: [idev] UDS.KEYID = 0
3,513,180 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,534,355 UART: [idev] Erasing UDS.KEYID = 0
6,017,970 UART: [idev] Sha1 KeyId Algorithm
6,040,333 UART: [idev] --
6,044,851 UART: [ldev] ++
6,045,437 UART: [ldev] CDI.KEYID = 6
6,046,323 UART: [ldev] SUBJECT.KEYID = 5
6,047,542 UART: [ldev] AUTHORITY.KEYID = 7
6,048,775 UART: [ldev] FE.KEYID = 1
6,091,539 UART: [ldev] Erasing FE.KEYID = 1
8,593,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,271 UART: [ldev] --
10,404,273 UART: [fwproc] Wait for Commands...
10,406,041 UART: [fwproc] Recv command 0x46505652
10,408,407 UART: [rt] FIPS Version
10,409,864 >>> mbox cmd response data (36 bytes)
12,628,424 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,773,631 UART: [fwproc] Recv command 0x46574c44
12,775,741 UART: [fwproc] Recv'd Img size: 114084 bytes
16,166,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,238,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,307,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,623,799 >>> mbox cmd response: success
16,624,164 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,628,026 UART: [afmc] ++
16,628,606 UART: [afmc] CDI.KEYID = 6
16,629,536 UART: [afmc] SUBJECT.KEYID = 7
16,630,696 UART: [afmc] AUTHORITY.KEYID = 5
19,165,960 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,891,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,893,482 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,909,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,925,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,941,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,962,751 UART: [afmc] --
20,966,507 UART: [cold-reset] --
20,968,857 UART: [state] Locking Datavault
20,974,559 UART: [state] Locking PCR0, PCR1 and PCR31
20,976,206 UART: [state] Locking ICCM
20,977,496 UART: [exit] Launching FMC @ 0x40000130
20,985,956 UART:
20,986,207 UART: Running Caliptra FMC ...
20,987,311 UART:
20,987,471 UART: [state] CFI Enabled
21,048,835 UART: [fht] FMC Alias Private Key: 7
22,813,854 UART: [art] Extend RT PCRs Done
22,815,073 UART: [art] Lock RT PCRs Done
22,816,512 UART: [art] Populate DV Done
22,821,981 UART: [fht] FMC Alias Private Key: 7
22,823,515 UART: [art] Derive CDI
22,824,246 UART: [art] Store in in slot 0x4
22,881,635 UART: [art] Derive Key Pair
22,882,672 UART: [art] Store priv key in slot 0x5
25,345,350 UART: [art] Derive Key Pair - Done
25,358,349 UART: [art] Signing Cert with AUTHO
25,359,651 UART: RITY.KEYID = 7
27,071,969 UART: [art] Erasing AUTHORITY.KEYID = 7
27,073,475 UART: [art] PUB.X = 6A3253252F8ABB66F4D2D199AFB67FCED42F81C15BBF17B2DE64BEC70202FCD0911578EF883F358A3BC6E9D17873A5CE
27,080,779 UART: [art] PUB.Y = 722CCA0237EAC5CC5C4EFE2C4077DAABAB3DDC05ED71EA5D961B9FB6723FFAA654DE3C26B7BE92757DD54D3F298CA775
27,088,064 UART: [art] SIG.R = DC595274A09BC16EC0A302F06D6272378125D31E004954B2283AB4C9BC791F6FB952E6AF1C96D974220A2272426785C9
27,095,398 UART: [art] SIG.S = A6F55898565467D8A06F9F54BDDA3D21E21733DA4DCE948BC1DB4F49E6BC412E37B0541C890464A74093830152FE81D7
28,074,618 UART: Caliptra RT
28,075,323 UART: [state] CFI Enabled
28,239,814 UART: [rt] RT listening for mailbox commands...
28,271,281 UART: [rt]cmd =0x46505652, len=4
28,272,529 UART: [rt] FIPS Version
28,273,797 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,308 writing to cptra_bootfsm_go
3,381,057 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,202,528 >>> mbox cmd response data (36 bytes)
12,417,079 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,420,528 >>> mbox cmd response: success
16,420,997 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,710,447 UART:
20,710,887 UART: Running Caliptra FMC ...
20,711,988 UART:
20,712,150 UART: [state] CFI Enabled
20,777,858 UART: [fht] FMC Alias Private Key: 7
22,542,079 UART: [art] Extend RT PCRs Done
22,543,295 UART: [art] Lock RT PCRs Done
22,545,252 UART: [art] Populate DV Done
22,550,831 UART: [fht] FMC Alias Private Key: 7
22,552,479 UART: [art] Derive CDI
22,553,292 UART: [art] Store in in slot 0x4
22,610,750 UART: [art] Derive Key Pair
22,611,813 UART: [art] Store priv key in slot 0x5
25,074,657 UART: [art] Derive Key Pair - Done
25,087,711 UART: [art] Signing Cert with AUTHO
25,089,017 UART: RITY.KEYID = 7
26,800,400 UART: [art] Erasing AUTHORITY.KEYID = 7
26,801,927 UART: [art] PUB.X = 6527C52DA222544246D1AE8527BF7554F40A44A22131EE8F9EC55EEFCFC88CB14C77D4085063BFFC47098208093B0D9E
26,809,179 UART: [art] PUB.Y = BB05BA15E4F2874643AF2888C0FC32BC2C5389A31F092DF11754E2BED0C1F1D543BA78444E0409CBE19697820D25E39C
26,816,413 UART: [art] SIG.R = 60654B073064B2881131CBD478DA873E2C5CD8DD568D758FE251F5D8DB3D3DC165EDA0F44062337D0C620056A4423BBF
26,823,819 UART: [art] SIG.S = AB8C26E2FB461F27FF1623EED986F2AB7115CEB9C2402E010C72C2861520BBC5557364F51C05C94E15D3051ED1F36EFA
27,803,279 UART: Caliptra RT
27,803,984 UART: [state] CFI Enabled
27,968,753 UART: [rt] RT listening for mailbox commands...
28,000,117 UART: [rt]cmd =0x46505652, len=4
28,001,374 UART: [rt] FIPS Version
28,002,704 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,706 UART:
193,110 UART: Running Caliptra ROM ...
194,231 UART:
603,701 UART: [state] CFI Enabled
615,592 UART: [state] LifecycleState = Unprovisioned
617,451 UART: [state] DebugLocked = No
619,525 UART: [state] WD Timer not started. Device not locked for debugging
622,896 UART: [kat] SHA2-256
802,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,619 UART: [kat] ++
814,151 UART: [kat] sha1
825,745 UART: [kat] SHA2-256
828,753 UART: [kat] SHA2-384
835,016 UART: [kat] SHA2-512-ACC
837,959 UART: [kat] ECC-384
3,280,622 UART: [kat] HMAC-384Kdf
3,294,634 UART: [kat] LMS
3,824,112 UART: [kat] --
3,828,322 UART: [cold-reset] ++
3,829,179 UART: [fht] FHT @ 0x50003400
3,841,565 UART: [idev] ++
3,842,128 UART: [idev] CDI.KEYID = 6
3,843,142 UART: [idev] SUBJECT.KEYID = 7
3,844,245 UART: [idev] UDS.KEYID = 0
3,845,449 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,861,081 UART: [idev] Erasing UDS.KEYID = 0
6,319,972 UART: [idev] Sha1 KeyId Algorithm
6,342,952 UART: [idev] --
6,345,651 UART: [ldev] ++
6,346,234 UART: [ldev] CDI.KEYID = 6
6,347,154 UART: [ldev] SUBJECT.KEYID = 5
6,348,315 UART: [ldev] AUTHORITY.KEYID = 7
6,349,541 UART: [ldev] FE.KEYID = 1
6,359,813 UART: [ldev] Erasing FE.KEYID = 1
8,830,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,796 UART: [ldev] --
10,621,734 UART: [fwproc] Wait for Commands...
10,623,889 UART: [fwproc] Recv command 0x46505652
10,626,254 UART: [rt] FIPS Version
10,627,759 >>> mbox cmd response data (36 bytes)
12,844,824 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,990,570 UART: [fwproc] Recv command 0x46574c44
12,992,773 UART: [fwproc] Recv'd Img size: 114084 bytes
16,395,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,473,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,542,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,859,880 >>> mbox cmd response: success
16,860,235 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,863,813 UART: [afmc] ++
16,864,392 UART: [afmc] CDI.KEYID = 6
16,865,304 UART: [afmc] SUBJECT.KEYID = 7
16,866,463 UART: [afmc] AUTHORITY.KEYID = 5
19,364,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,085,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,087,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,103,276 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,119,303 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,135,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,156,968 UART: [afmc] --
21,160,624 UART: [cold-reset] --
21,164,051 UART: [state] Locking Datavault
21,170,103 UART: [state] Locking PCR0, PCR1 and PCR31
21,171,755 UART: [state] Locking ICCM
21,173,832 UART: [exit] Launching FMC @ 0x40000130
21,182,279 UART:
21,182,511 UART: Running Caliptra FMC ...
21,183,532 UART:
21,183,678 UART: [state] CFI Enabled
21,191,507 UART: [fht] FMC Alias Private Key: 7
22,948,416 UART: [art] Extend RT PCRs Done
22,949,634 UART: [art] Lock RT PCRs Done
22,951,142 UART: [art] Populate DV Done
22,956,502 UART: [fht] FMC Alias Private Key: 7
22,958,115 UART: [art] Derive CDI
22,958,882 UART: [art] Store in in slot 0x4
23,001,453 UART: [art] Derive Key Pair
23,002,496 UART: [art] Store priv key in slot 0x5
25,428,884 UART: [art] Derive Key Pair - Done
25,441,779 UART: [art] Signing Cert with AUTHO
25,443,082 UART: RITY.KEYID = 7
27,148,849 UART: [art] Erasing AUTHORITY.KEYID = 7
27,150,361 UART: [art] PUB.X = AB7C05075E0C7F6430C2B83FAEF5326136737AB335B04DCF2F7A686C46E16644C858BCA809A5D89EDB859B97A32E7E38
27,157,665 UART: [art] PUB.Y = 41C140AED8A66F44533B3BEA92CC8D35E59BB1EA8B6D5A50829B532787D474947274F3B7AEFB20C82EF2F5B52701ABE1
27,164,903 UART: [art] SIG.R = 7EA77FC55431FDF7938C415DF5657557894F380173DA3D29C9E6E968ADFB39943370914E2FC4C3FF284F318BFDE09BA8
27,172,302 UART: [art] SIG.S = 69B7B03514307AB03D0E5E859A87A2FD4B5E6D7CE5A82B2D99E2EDC208572EAB697B627318BCDFF5DD9C93F6C77B0027
28,151,503 UART: Caliptra RT
28,152,213 UART: [state] CFI Enabled
28,269,300 UART: [rt] RT listening for mailbox commands...
28,300,385 UART: [rt]cmd =0x46505652, len=4
28,301,632 UART: [rt] FIPS Version
28,302,953 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,997 writing to cptra_bootfsm_go
3,697,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,407,330 >>> mbox cmd response data (36 bytes)
12,625,757 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
16,638,015 >>> mbox cmd response: success
16,638,540 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,893,716 UART:
20,894,116 UART: Running Caliptra FMC ...
20,895,223 UART:
20,895,378 UART: [state] CFI Enabled
20,903,372 UART: [fht] FMC Alias Private Key: 7
22,660,441 UART: [art] Extend RT PCRs Done
22,661,656 UART: [art] Lock RT PCRs Done
22,663,304 UART: [art] Populate DV Done
22,668,670 UART: [fht] FMC Alias Private Key: 7
22,670,264 UART: [art] Derive CDI
22,670,998 UART: [art] Store in in slot 0x4
22,713,661 UART: [art] Derive Key Pair
22,714,731 UART: [art] Store priv key in slot 0x5
25,141,579 UART: [art] Derive Key Pair - Done
25,154,513 UART: [art] Signing Cert with AUTHO
25,155,820 UART: RITY.KEYID = 7
26,862,022 UART: [art] Erasing AUTHORITY.KEYID = 7
26,863,534 UART: [art] PUB.X = 7EF7F4C26E3F27E3A99F50F1D185EE5A72FCAD55C9225C5D7D1AE09A9A5AE209B50BE1E9A8119128DEF09C7A505A2E68
26,870,780 UART: [art] PUB.Y = 2B73AC66FB29BD9B9F36D4E9F6E4C8DEB618240CC4F83277CB5967C7290A75667DBA63F7D81FC939A79BAA3C4A2C7853
26,878,055 UART: [art] SIG.R = 1A92857BA9C0481B945BF001D5A4B508AF7079979C8782D04CB0F6AB39F6F5FE58D99D453BADCAB30E841DD4AF6710C8
26,885,498 UART: [art] SIG.S = 3718D22C1DE76F61C9CEF9EBF327FDFFA280C8D48FB79B1F30ED3CC9E18A573BF4507A26029DCA14C9D822A5A8990FEC
27,864,211 UART: Caliptra RT
27,864,915 UART: [state] CFI Enabled
27,981,704 UART: [rt] RT listening for mailbox commands...
28,013,137 UART: [rt]cmd =0x46505652, len=4
28,014,397 UART: [rt] FIPS Version
28,015,665 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,947 writing to cptra_bootfsm_go
193,113 UART:
193,493 UART: Running Caliptra ROM ...
194,675 UART:
194,828 UART: [state] CFI Enabled
263,909 UART: [state] LifecycleState = Unprovisioned
266,295 UART: [state] DebugLocked = No
268,323 UART: [state] WD Timer not started. Device not locked for debugging
273,245 UART: [kat] SHA2-256
463,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,882 UART: [kat] ++
474,356 UART: [kat] sha1
485,997 UART: [kat] SHA2-256
489,006 UART: [kat] SHA2-384
495,391 UART: [kat] SHA2-512-ACC
497,955 UART: [kat] ECC-384
2,949,202 UART: [kat] HMAC-384Kdf
2,970,297 UART: [kat] LMS
3,502,076 UART: [kat] --
3,506,802 UART: [cold-reset] ++
3,509,229 UART: [fht] FHT @ 0x50003400
3,519,721 UART: [idev] ++
3,520,398 UART: [idev] CDI.KEYID = 6
3,521,363 UART: [idev] SUBJECT.KEYID = 7
3,522,694 UART: [idev] UDS.KEYID = 0
3,523,781 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,542,340 UART: [idev] Erasing UDS.KEYID = 0
6,027,178 UART: [idev] Sha1 KeyId Algorithm
6,049,958 UART: [idev] --
6,054,500 UART: [ldev] ++
6,055,071 UART: [ldev] CDI.KEYID = 6
6,056,093 UART: [ldev] SUBJECT.KEYID = 5
6,057,201 UART: [ldev] AUTHORITY.KEYID = 7
6,058,377 UART: [ldev] FE.KEYID = 1
6,097,947 UART: [ldev] Erasing FE.KEYID = 1
8,605,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,480 UART: [ldev] --
10,410,782 UART: [fwproc] Wait for Commands...
10,413,432 UART: [fwproc] Recv command 0x46505652
10,415,974 UART: [rt] FIPS Version
10,417,700 >>> mbox cmd response data (36 bytes)
12,640,415 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
12,784,959 UART: [fwproc] Recv command 0x46574c44
12,786,984 UART: [fwproc] Recv'd Img size: 114084 bytes
16,236,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,318,279 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,434,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
16,974,954 >>> mbox cmd response: success
16,975,332 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,978,220 UART: [afmc] ++
16,978,906 UART: [afmc] CDI.KEYID = 6
16,980,065 UART: [afmc] SUBJECT.KEYID = 7
16,981,611 UART: [afmc] AUTHORITY.KEYID = 5
19,513,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,239,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,241,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,257,018 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,272,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,287,197 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,310,994 UART: [afmc] --
21,314,427 UART: [cold-reset] --
21,318,249 UART: [state] Locking Datavault
21,322,911 UART: [state] Locking PCR0, PCR1 and PCR31
21,325,108 UART: [state] Locking ICCM
21,327,790 UART: [exit] Launching FMC @ 0x40000130
21,336,465 UART:
21,336,708 UART: Running Caliptra FMC ...
21,337,732 UART:
21,337,880 UART: [state] CFI Enabled
21,398,113 UART: [fht] FMC Alias Private Key: 7
23,162,033 UART: [art] Extend RT PCRs Done
23,163,273 UART: [art] Lock RT PCRs Done
23,164,870 UART: [art] Populate DV Done
23,170,120 UART: [fht] FMC Alias Private Key: 7
23,171,821 UART: [art] Derive CDI
23,172,558 UART: [art] Store in in slot 0x4
23,230,706 UART: [art] Derive Key Pair
23,231,748 UART: [art] Store priv key in slot 0x5
25,694,462 UART: [art] Derive Key Pair - Done
25,707,347 UART: [art] Signing Cert with AUTHO
25,708,664 UART: RITY.KEYID = 7
27,420,756 UART: [art] Erasing AUTHORITY.KEYID = 7
27,422,261 UART: [art] PUB.X = 90625DD67D98C80AADDD66ADE7883C2A832830AB2DF4DB1D010547F1B14F3EF8BB62800BE44780F4A71D996E8B3CA413
27,429,571 UART: [art] PUB.Y = 9ACAF31F74A2BEC66599796A50819EE3357D88BAB3AEBF68A592AE5426E514A8E76B2924B40C57388875C1913922A867
27,436,805 UART: [art] SIG.R = 02A013326ED089EE0F9FE5805247677224A030781BD8AEBB73C84E841F9A2F100FB15C03673DC2EC0E2694F70D2BFAE7
27,444,194 UART: [art] SIG.S = 0D2F9002AD6D2AD6289D875009DC53B81508105274E4B98D00D455C607465059A905854FF8436B8861D036175F645577
28,423,009 UART: Caliptra RT
28,423,724 UART: [state] CFI Enabled
28,588,902 UART: [rt] RT listening for mailbox commands...
28,620,318 UART: [rt]cmd =0x46505652, len=4
28,621,567 UART: [rt] FIPS Version
28,622,836 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,415,843 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,220,877 >>> mbox cmd response data (36 bytes)
12,439,552 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
17,065,949 >>> mbox cmd response: success
17,066,501 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,379,286 UART:
21,379,730 UART: Running Caliptra FMC ...
21,380,824 UART:
21,380,977 UART: [state] CFI Enabled
21,441,122 UART: [fht] FMC Alias Private Key: 7
23,204,894 UART: [art] Extend RT PCRs Done
23,206,112 UART: [art] Lock RT PCRs Done
23,207,963 UART: [art] Populate DV Done
23,213,050 UART: [fht] FMC Alias Private Key: 7
23,214,703 UART: [art] Derive CDI
23,215,539 UART: [art] Store in in slot 0x4
23,273,035 UART: [art] Derive Key Pair
23,274,045 UART: [art] Store priv key in slot 0x5
25,737,601 UART: [art] Derive Key Pair - Done
25,750,820 UART: [art] Signing Cert with AUTHO
25,752,129 UART: RITY.KEYID = 7
27,462,673 UART: [art] Erasing AUTHORITY.KEYID = 7
27,464,186 UART: [art] PUB.X = 5B10274C48B6C83501515A9AB18E82DEBF2AC80AD6DDC2912A671E0E8092AF24BC74CD6E5501C2DE35B59DEAF2E0FF36
27,471,453 UART: [art] PUB.Y = B19AC12872A0B5C0DFF897385711B5E83FA8845E11F3FBAD412F60A4931FBC672012DD5D3B5A35C40B5CAB8AA24BB8D3
27,478,753 UART: [art] SIG.R = CB964FA5321F07437DC4A6EBB532ABA6D2EE62A11CE0CC40650C86F326AAE1DC9B822FCFAC997FF89E0AF9123E42C06A
27,486,183 UART: [art] SIG.S = FDDFA242BB02081E1512669B415EE506643616FE92C278AD4DFE09E4FEBE2A9455CBED8F29BE74E2A296708D33BF7991
28,464,617 UART: Caliptra RT
28,465,328 UART: [state] CFI Enabled
28,630,845 UART: [rt] RT listening for mailbox commands...
28,662,136 UART: [rt]cmd =0x46505652, len=4
28,663,424 UART: [rt] FIPS Version
28,664,715 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
192,340 UART:
192,736 UART: Running Caliptra ROM ...
193,900 UART:
603,346 UART: [state] CFI Enabled
619,102 UART: [state] LifecycleState = Unprovisioned
621,504 UART: [state] DebugLocked = No
624,119 UART: [state] WD Timer not started. Device not locked for debugging
628,248 UART: [kat] SHA2-256
818,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,885 UART: [kat] ++
829,392 UART: [kat] sha1
840,634 UART: [kat] SHA2-256
843,646 UART: [kat] SHA2-384
849,027 UART: [kat] SHA2-512-ACC
851,650 UART: [kat] ECC-384
3,295,203 UART: [kat] HMAC-384Kdf
3,307,819 UART: [kat] LMS
3,839,655 UART: [kat] --
3,844,778 UART: [cold-reset] ++
3,845,743 UART: [fht] FHT @ 0x50003400
3,856,341 UART: [idev] ++
3,857,056 UART: [idev] CDI.KEYID = 6
3,857,974 UART: [idev] SUBJECT.KEYID = 7
3,859,191 UART: [idev] UDS.KEYID = 0
3,860,305 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,875,120 UART: [idev] Erasing UDS.KEYID = 0
6,335,369 UART: [idev] Sha1 KeyId Algorithm
6,359,191 UART: [idev] --
6,363,568 UART: [ldev] ++
6,364,250 UART: [ldev] CDI.KEYID = 6
6,365,158 UART: [ldev] SUBJECT.KEYID = 5
6,366,318 UART: [ldev] AUTHORITY.KEYID = 7
6,367,566 UART: [ldev] FE.KEYID = 1
6,381,453 UART: [ldev] Erasing FE.KEYID = 1
8,861,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,561 UART: [ldev] --
10,648,289 UART: [fwproc] Wait for Commands...
10,651,412 UART: [fwproc] Recv command 0x46505652
10,653,993 UART: [rt] FIPS Version
10,655,701 >>> mbox cmd response data (36 bytes)
12,873,786 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
13,017,924 UART: [fwproc] Recv command 0x46574c44
13,019,951 UART: [fwproc] Recv'd Img size: 114084 bytes
16,475,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,553,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,669,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
17,210,999 >>> mbox cmd response: success
17,211,380 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,215,519 UART: [afmc] ++
17,216,243 UART: [afmc] CDI.KEYID = 6
17,217,436 UART: [afmc] SUBJECT.KEYID = 7
17,218,872 UART: [afmc] AUTHORITY.KEYID = 5
19,723,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,447,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,449,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,464,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,480,003 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,495,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,518,321 UART: [afmc] --
21,521,212 UART: [cold-reset] --
21,525,667 UART: [state] Locking Datavault
21,530,154 UART: [state] Locking PCR0, PCR1 and PCR31
21,532,338 UART: [state] Locking ICCM
21,534,160 UART: [exit] Launching FMC @ 0x40000130
21,542,823 UART:
21,543,070 UART: Running Caliptra FMC ...
21,544,175 UART:
21,544,333 UART: [state] CFI Enabled
21,552,218 UART: [fht] FMC Alias Private Key: 7
23,308,902 UART: [art] Extend RT PCRs Done
23,310,125 UART: [art] Lock RT PCRs Done
23,311,643 UART: [art] Populate DV Done
23,316,911 UART: [fht] FMC Alias Private Key: 7
23,318,555 UART: [art] Derive CDI
23,319,373 UART: [art] Store in in slot 0x4
23,362,133 UART: [art] Derive Key Pair
23,363,132 UART: [art] Store priv key in slot 0x5
25,789,688 UART: [art] Derive Key Pair - Done
25,802,523 UART: [art] Signing Cert with AUTHO
25,803,835 UART: RITY.KEYID = 7
27,508,948 UART: [art] Erasing AUTHORITY.KEYID = 7
27,510,450 UART: [art] PUB.X = 8AC0E04D6F6C3F15E2A5D386A8EEDC00D006A7987E3F4AB9A38747E59F1FBBB9EBA9D6936A8C6E90A7973F9A645179B3
27,517,738 UART: [art] PUB.Y = 197D9AAE1E557B0DC6274757880214CBBD3456E8E3132A3DF54BFC0B7B201706503C148561B4DA80545B074019A0E565
27,524,973 UART: [art] SIG.R = D7099B27958AD015F754F388F13A33AEFAD02A21F1EDC187DC739B626B8B744E1A192D69F16C7D48B738876B54246F62
27,532,344 UART: [art] SIG.S = A906BF38A6AA14D257CEB5FDCB7CBE7443748B9C1210B6C8BC4027B5655E5BF59327A853E2631DF3AC69B6BFBD6451EE
28,511,631 UART: Caliptra RT
28,512,318 UART: [state] CFI Enabled
28,629,209 UART: [rt] RT listening for mailbox commands...
28,660,674 UART: [rt]cmd =0x46505652, len=4
28,661,945 UART: [rt] FIPS Version
28,663,164 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,759,898 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,476,880 >>> mbox cmd response data (36 bytes)
12,702,412 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
17,334,600 >>> mbox cmd response: success
17,335,046 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,583,022 UART:
21,583,400 UART: Running Caliptra FMC ...
21,584,491 UART:
21,584,641 UART: [state] CFI Enabled
21,592,649 UART: [fht] FMC Alias Private Key: 7
23,349,063 UART: [art] Extend RT PCRs Done
23,350,296 UART: [art] Lock RT PCRs Done
23,352,016 UART: [art] Populate DV Done
23,357,311 UART: [fht] FMC Alias Private Key: 7
23,358,960 UART: [art] Derive CDI
23,359,698 UART: [art] Store in in slot 0x4
23,402,670 UART: [art] Derive Key Pair
23,403,670 UART: [art] Store priv key in slot 0x5
25,830,742 UART: [art] Derive Key Pair - Done
25,843,639 UART: [art] Signing Cert with AUTHO
25,844,945 UART: RITY.KEYID = 7
27,550,454 UART: [art] Erasing AUTHORITY.KEYID = 7
27,551,963 UART: [art] PUB.X = 1BBC14834F0663237394BAFA22FE548A8D14116174DAE20F9ED29F7BAE941FA24D78EA94634705DADBCDC499D6F2D498
27,559,280 UART: [art] PUB.Y = 5FB2EE970803C3FF084F28F54FAB1A5D300A1A643F81773719E1EEDC2185C2ED48ED02363D5DAB5E86E5F817B63CC655
27,566,517 UART: [art] SIG.R = A9D52566FFF2899ECC46664EC4E6E5143E4F5D23136FC1AC9FF8AA22E7683F80A9795FB63D3BF2B53FE0FAFDA460BAEB
27,573,983 UART: [art] SIG.S = 96C96ED4ECEE7A307A3B1D12A5FD7AAA14F69F40B0F91FF2CC2D662EAB8C727BE5A69F0C69F0C0CE29BAD2B521848951
28,552,883 UART: Caliptra RT
28,553,598 UART: [state] CFI Enabled
28,670,502 UART: [rt] RT listening for mailbox commands...
28,702,017 UART: [rt]cmd =0x46505652, len=4
28,703,351 UART: [rt] FIPS Version
28,704,510 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,663 UART: [kat] SHA2-256
881,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,709 UART: [kat] ++
885,861 UART: [kat] sha1
889,983 UART: [kat] SHA2-256
891,921 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,228 UART: [kat] HMAC-384Kdf
906,628 UART: [kat] LMS
1,474,824 UART: [kat] --
1,475,809 UART: [cold-reset] ++
1,476,151 UART: [fht] Storing FHT @ 0x50003400
1,479,016 UART: [idev] ++
1,479,184 UART: [idev] CDI.KEYID = 6
1,479,544 UART: [idev] SUBJECT.KEYID = 7
1,479,968 UART: [idev] UDS.KEYID = 0
1,480,313 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,016 UART: [idev] Erasing UDS.KEYID = 0
1,504,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,628 UART: [idev] --
1,514,789 UART: [ldev] ++
1,514,957 UART: [ldev] CDI.KEYID = 6
1,515,320 UART: [ldev] SUBJECT.KEYID = 5
1,515,746 UART: [ldev] AUTHORITY.KEYID = 7
1,516,209 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,720 UART: [ldev] --
1,586,079 UART: [fwproc] Waiting for Commands...
1,586,742 UART: [fwproc] Received command 0x46505652
1,587,624 UART: [rt] FIPS Version
1,588,177 >>> mbox cmd response data (36 bytes)
1,588,178 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,588,292 UART: [fwproc] Received command 0x46574c44
1,589,083 UART: [fwproc] Received Image of size 114084 bytes
2,884,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,075,532 >>> mbox cmd response: success
3,075,532 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,076,568 UART: [afmc] ++
3,076,736 UART: [afmc] CDI.KEYID = 6
3,077,098 UART: [afmc] SUBJECT.KEYID = 7
3,077,523 UART: [afmc] AUTHORITY.KEYID = 5
3,112,796 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,026 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,419 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,109 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,008 UART: [afmc] --
3,155,942 UART: [cold-reset] --
3,156,608 UART: [state] Locking Datavault
3,157,779 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,383 UART: [state] Locking ICCM
3,159,035 UART: [exit] Launching FMC @ 0x40000130
3,164,364 UART:
3,164,380 UART: Running Caliptra FMC ...
3,164,788 UART:
3,164,842 UART: [state] CFI Enabled
3,175,359 UART: [fht] FMC Alias Private Key: 7
3,283,570 UART: [art] Extend RT PCRs Done
3,283,998 UART: [art] Lock RT PCRs Done
3,285,628 UART: [art] Populate DV Done
3,293,689 UART: [fht] FMC Alias Private Key: 7
3,294,673 UART: [art] Derive CDI
3,294,953 UART: [art] Store in in slot 0x4
3,380,702 UART: [art] Derive Key Pair
3,381,062 UART: [art] Store priv key in slot 0x5
3,394,778 UART: [art] Derive Key Pair - Done
3,409,309 UART: [art] Signing Cert with AUTHO
3,409,789 UART: RITY.KEYID = 7
3,424,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,624 UART: [art] PUB.X = B5D513EA7E78249E99EC5E126E0C4B7068E8631356BA9EF146F6C78FF8BD2A97397C4075C6D9CD68F8F2C059D60FDA3B
3,432,400 UART: [art] PUB.Y = F0164F74AB76A21385E1B5C8943652A8371E1FC74293148710B077F81C4608CF002789CCA06BF361E2533E85E4ACFCAB
3,439,325 UART: [art] SIG.R = 10E7FC399124E597BC1DCECE899D77E39676729E33FFE7770317AA8744D4716467EBBAB093198D9DD8CA00F30D0424DB
3,446,070 UART: [art] SIG.S = 140EC75BBDBE4E5F8D726818B7F04DD553B257CB6AE072B2CB8798427550123B167C858D09911F4C01EB3763AEA8875F
3,469,754 UART: Caliptra RT
3,470,007 UART: [state] CFI Enabled
3,577,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,709 UART: [rt]cmd =0x46505652, len=4
3,608,369 UART: [rt] FIPS Version
3,609,272 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,332 >>> mbox cmd response data (36 bytes)
1,441,333 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,925,025 >>> mbox cmd response: success
2,925,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,883 UART:
2,986,899 UART: Running Caliptra FMC ...
2,987,307 UART:
2,987,361 UART: [state] CFI Enabled
2,997,756 UART: [fht] FMC Alias Private Key: 7
3,106,617 UART: [art] Extend RT PCRs Done
3,107,045 UART: [art] Lock RT PCRs Done
3,108,135 UART: [art] Populate DV Done
3,116,564 UART: [fht] FMC Alias Private Key: 7
3,117,492 UART: [art] Derive CDI
3,117,772 UART: [art] Store in in slot 0x4
3,203,733 UART: [art] Derive Key Pair
3,204,093 UART: [art] Store priv key in slot 0x5
3,216,507 UART: [art] Derive Key Pair - Done
3,231,142 UART: [art] Signing Cert with AUTHO
3,231,622 UART: RITY.KEYID = 7
3,246,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,607 UART: [art] PUB.X = 609D1C9B3A6F5BC69BB6735E622007A0E4341771B1569EE79BCB09A0A59D78BD19C3D388D2526797196D0CB7DE7C4101
3,254,367 UART: [art] PUB.Y = 71A2855EA4AB5661B65AF5C308E34C7CA15C455721616D4D8D61ED919CE7EA0E4CD37D78101992A8976341E6D47ED6B6
3,261,315 UART: [art] SIG.R = 6CB9CD6D41774E8DE9033E0F843CFED9D6A6382A60C1E5B3D644C523B76F16DD2A264304DD7E88643FBFE028260373F9
3,268,081 UART: [art] SIG.S = 4050758B5FC87283191927102BC62677054815080C4CFF37F6F06CFDED2BBDD3A642164C855DA2144CA671FEDB845593
3,291,635 UART: Caliptra RT
3,291,888 UART: [state] CFI Enabled
3,400,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,158 UART: [rt]cmd =0x46505652, len=4
3,431,818 UART: [rt] FIPS Version
3,433,007 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,232 UART: [kat] SHA2-256
882,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,278 UART: [kat] ++
886,430 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,943 UART: [kat] HMAC-384Kdf
907,501 UART: [kat] LMS
1,475,697 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,713 UART: [idev] --
1,514,804 UART: [ldev] ++
1,514,972 UART: [ldev] CDI.KEYID = 6
1,515,335 UART: [ldev] SUBJECT.KEYID = 5
1,515,761 UART: [ldev] AUTHORITY.KEYID = 7
1,516,224 UART: [ldev] FE.KEYID = 1
1,521,478 UART: [ldev] Erasing FE.KEYID = 1
1,546,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,939 UART: [ldev] --
1,586,310 UART: [fwproc] Waiting for Commands...
1,586,955 UART: [fwproc] Received command 0x46505652
1,587,837 UART: [rt] FIPS Version
1,588,390 >>> mbox cmd response data (36 bytes)
1,588,391 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,588,699 UART: [fwproc] Received command 0x46574c44
1,589,490 UART: [fwproc] Received Image of size 114084 bytes
2,884,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,552 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 89400
3,076,501 >>> mbox cmd response: success
3,076,501 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,709 UART: [afmc] ++
3,077,877 UART: [afmc] CDI.KEYID = 6
3,078,239 UART: [afmc] SUBJECT.KEYID = 7
3,078,664 UART: [afmc] AUTHORITY.KEYID = 5
3,114,357 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,427 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,935 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,820 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,510 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,389 UART: [afmc] --
3,157,455 UART: [cold-reset] --
3,158,225 UART: [state] Locking Datavault
3,159,362 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,966 UART: [state] Locking ICCM
3,160,438 UART: [exit] Launching FMC @ 0x40000130
3,165,767 UART:
3,165,783 UART: Running Caliptra FMC ...
3,166,191 UART:
3,166,334 UART: [state] CFI Enabled
3,177,073 UART: [fht] FMC Alias Private Key: 7
3,285,380 UART: [art] Extend RT PCRs Done
3,285,808 UART: [art] Lock RT PCRs Done
3,287,252 UART: [art] Populate DV Done
3,295,623 UART: [fht] FMC Alias Private Key: 7
3,296,623 UART: [art] Derive CDI
3,296,903 UART: [art] Store in in slot 0x4
3,382,724 UART: [art] Derive Key Pair
3,383,084 UART: [art] Store priv key in slot 0x5
3,396,472 UART: [art] Derive Key Pair - Done
3,411,377 UART: [art] Signing Cert with AUTHO
3,411,857 UART: RITY.KEYID = 7
3,426,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,628 UART: [art] PUB.X = CD95B8B4B1B9EA34C9D0DADAC2DD8E25F40B672D6144747A3379E1ED69297216E451D2DA9206C9D526536EAC1DBC12D9
3,434,406 UART: [art] PUB.Y = 0BF84CE7EA44B2216CC27D3340F181B0C26F9AFFBEB5CB1E98650593E28BC324F965593EC252C27AC5E3396C919C9C7E
3,441,362 UART: [art] SIG.R = 49B002BE52C69A8A7C6EEC71FE8B9E4324570AEFEBCCFE105E9AEDF8CD13C75FB0B1E4AC450D2DEA970893B69FED566C
3,448,150 UART: [art] SIG.S = A6AB23D743CF742F2B2A4F5DC7E30CF74F058FD1ADAD3B5A17A3B5384F4D12B94770CF9BF77C8DF090DF84F3A2B3D8F5
3,471,609 UART: Caliptra RT
3,471,954 UART: [state] CFI Enabled
3,581,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,821 UART: [rt]cmd =0x46505652, len=4
3,612,481 UART: [rt] FIPS Version
3,613,638 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,923 >>> mbox cmd response data (36 bytes)
1,440,924 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,924,386 >>> mbox cmd response: success
2,924,386 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,136 UART:
2,986,152 UART: Running Caliptra FMC ...
2,986,560 UART:
2,986,703 UART: [state] CFI Enabled
2,997,358 UART: [fht] FMC Alias Private Key: 7
3,105,515 UART: [art] Extend RT PCRs Done
3,105,943 UART: [art] Lock RT PCRs Done
3,107,473 UART: [art] Populate DV Done
3,115,804 UART: [fht] FMC Alias Private Key: 7
3,116,810 UART: [art] Derive CDI
3,117,090 UART: [art] Store in in slot 0x4
3,203,161 UART: [art] Derive Key Pair
3,203,521 UART: [art] Store priv key in slot 0x5
3,216,857 UART: [art] Derive Key Pair - Done
3,231,696 UART: [art] Signing Cert with AUTHO
3,232,176 UART: RITY.KEYID = 7
3,246,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,727 UART: [art] PUB.X = 1C9A657E084C78F83254CBFECC68E79E168C2C545A3F97BE71B20C27D60D2857C09B3511EA53D887A0E4350BC023390A
3,254,486 UART: [art] PUB.Y = 2129B28029E3630CAE25D2A16C7C0D368C479535129E0C1A7C56AEEECF564157500ECA78A68558B801439633A86C16FF
3,261,419 UART: [art] SIG.R = D64D88366E1A88E0CB662EF9516009346BE0EAF1990C5A58D8B1CC9ADCDE125B408DCEC4A951BD4735D40727AFBC8643
3,268,194 UART: [art] SIG.S = 4BBB02BF9AD3EFA7C9C7D33A8FA39A0E6DFEF1DEB04F5FB95C01E00834CFA53E32661345E07E62F755636A0E5091C6D6
3,291,864 UART: Caliptra RT
3,292,209 UART: [state] CFI Enabled
3,400,174 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,334 UART: [rt]cmd =0x46505652, len=4
3,430,994 UART: [rt] FIPS Version
3,432,099 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
893,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,627 UART: [kat] ++
897,779 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,512 UART: [kat] HMAC-384Kdf
923,134 UART: [kat] LMS
1,171,462 UART: [kat] --
1,172,419 UART: [cold-reset] ++
1,172,989 UART: [fht] FHT @ 0x50003400
1,175,790 UART: [idev] ++
1,175,958 UART: [idev] CDI.KEYID = 6
1,176,318 UART: [idev] SUBJECT.KEYID = 7
1,176,742 UART: [idev] UDS.KEYID = 0
1,177,087 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,806 UART: [idev] Erasing UDS.KEYID = 0
1,202,193 UART: [idev] Sha1 KeyId Algorithm
1,210,693 UART: [idev] --
1,211,749 UART: [ldev] ++
1,211,917 UART: [ldev] CDI.KEYID = 6
1,212,280 UART: [ldev] SUBJECT.KEYID = 5
1,212,706 UART: [ldev] AUTHORITY.KEYID = 7
1,213,169 UART: [ldev] FE.KEYID = 1
1,218,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,833 UART: [ldev] --
1,283,164 UART: [fwproc] Wait for Commands...
1,283,842 UART: [fwproc] Recv command 0x46505652
1,284,663 UART: [rt] FIPS Version
1,285,217 >>> mbox cmd response data (36 bytes)
1,285,218 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,285,434 UART: [fwproc] Recv command 0x46574c44
1,286,162 UART: [fwproc] Recv'd Img size: 114084 bytes
2,580,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,755 >>> mbox cmd response: success
2,772,755 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,937 UART: [afmc] ++
2,774,105 UART: [afmc] CDI.KEYID = 6
2,774,467 UART: [afmc] SUBJECT.KEYID = 7
2,774,892 UART: [afmc] AUTHORITY.KEYID = 5
2,810,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,919 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,462 UART: [afmc] --
2,853,494 UART: [cold-reset] --
2,854,178 UART: [state] Locking Datavault
2,855,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,017 UART: [state] Locking ICCM
2,856,535 UART: [exit] Launching FMC @ 0x40000130
2,861,864 UART:
2,861,880 UART: Running Caliptra FMC ...
2,862,288 UART:
2,862,342 UART: [state] CFI Enabled
2,872,435 UART: [fht] FMC Alias Private Key: 7
2,981,032 UART: [art] Extend RT PCRs Done
2,981,460 UART: [art] Lock RT PCRs Done
2,983,020 UART: [art] Populate DV Done
2,991,243 UART: [fht] FMC Alias Private Key: 7
2,992,183 UART: [art] Derive CDI
2,992,463 UART: [art] Store in in slot 0x4
3,077,888 UART: [art] Derive Key Pair
3,078,248 UART: [art] Store priv key in slot 0x5
3,091,370 UART: [art] Derive Key Pair - Done
3,105,979 UART: [art] Signing Cert with AUTHO
3,106,459 UART: RITY.KEYID = 7
3,121,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,454 UART: [art] PUB.X = C9470E748C85AB12A3B31FBC2016651539F7606C873EA231E1248F5E813D6AD4BFB1AD6D7728D2BFB02DA8481308FA3B
3,129,226 UART: [art] PUB.Y = 4CD291F4109B2BB58AB7AA42F96587CECA3755D5D3333B72D828FF892D6FA135DA8F57849972438C842A7591FDD9F4E1
3,136,182 UART: [art] SIG.R = D3740A70B7A2795DEF94BA0B7C38679894471BDC48AC1DDFC9423573943392F47533459B4614A84013D7A241ABF056A4
3,142,942 UART: [art] SIG.S = D200D7DF386F18C33157BB690A144A3425520201B612952EB02E44A631F586CD55A18407C45F5C99205EA1B7F27FF53C
3,166,589 UART: Caliptra RT
3,166,842 UART: [state] CFI Enabled
3,275,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,746 UART: [rt]cmd =0x46505652, len=4
3,306,406 UART: [rt] FIPS Version
3,307,475 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,395 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,247 >>> mbox cmd response data (36 bytes)
1,140,248 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,728 >>> mbox cmd response: success
2,624,728 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,200 UART:
2,686,216 UART: Running Caliptra FMC ...
2,686,624 UART:
2,686,678 UART: [state] CFI Enabled
2,696,987 UART: [fht] FMC Alias Private Key: 7
2,805,342 UART: [art] Extend RT PCRs Done
2,805,770 UART: [art] Lock RT PCRs Done
2,807,124 UART: [art] Populate DV Done
2,815,287 UART: [fht] FMC Alias Private Key: 7
2,816,321 UART: [art] Derive CDI
2,816,601 UART: [art] Store in in slot 0x4
2,902,294 UART: [art] Derive Key Pair
2,902,654 UART: [art] Store priv key in slot 0x5
2,915,816 UART: [art] Derive Key Pair - Done
2,930,606 UART: [art] Signing Cert with AUTHO
2,931,086 UART: RITY.KEYID = 7
2,946,046 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,811 UART: [art] PUB.X = 6EA29DF3E20D06DEC606E3E88625D4C3F843B0D3D4BD7059C2F71158880DDCCE61D2393BAE7C0BA320F2F29292CC84C4
2,953,580 UART: [art] PUB.Y = B80E0D690A2926627E8C334D102771BA11DA5BCE691DF15D8C85B19A6DB3ABF0E1E579C51D8BB00C65AE38816CD558E6
2,960,530 UART: [art] SIG.R = 19FD34DD4D09A0A85A20CBB0E1B9E20B6EAAFFF8EB53ED247D1E78AE2B18580BF1DEE057F6A2A4745B6332E9D5776D59
2,967,313 UART: [art] SIG.S = 05281E896908B707035559632358A2A1F018DAE37C0A532154D0E0B8B78043529A5064373F4139DBBB595379F2EC6B22
2,991,121 UART: Caliptra RT
2,991,374 UART: [state] CFI Enabled
3,099,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,149 UART: [rt]cmd =0x46505652, len=4
3,130,809 UART: [rt] FIPS Version
3,131,858 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
907,139 UART: [kat] SHA2-512-ACC
909,040 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,769 UART: [kat] LMS
1,172,097 UART: [kat] --
1,173,114 UART: [cold-reset] ++
1,173,676 UART: [fht] FHT @ 0x50003400
1,176,361 UART: [idev] ++
1,176,529 UART: [idev] CDI.KEYID = 6
1,176,889 UART: [idev] SUBJECT.KEYID = 7
1,177,313 UART: [idev] UDS.KEYID = 0
1,177,658 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,395 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,210,754 UART: [idev] --
1,211,660 UART: [ldev] ++
1,211,828 UART: [ldev] CDI.KEYID = 6
1,212,191 UART: [ldev] SUBJECT.KEYID = 5
1,212,617 UART: [ldev] AUTHORITY.KEYID = 7
1,213,080 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,244,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,660 UART: [ldev] --
1,283,961 UART: [fwproc] Wait for Commands...
1,284,665 UART: [fwproc] Recv command 0x46505652
1,285,486 UART: [rt] FIPS Version
1,286,040 >>> mbox cmd response data (36 bytes)
1,286,041 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,286,197 UART: [fwproc] Recv command 0x46574c44
1,286,925 UART: [fwproc] Recv'd Img size: 114084 bytes
2,582,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,772,966 >>> mbox cmd response: success
2,772,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,228 UART: [afmc] ++
2,774,396 UART: [afmc] CDI.KEYID = 6
2,774,758 UART: [afmc] SUBJECT.KEYID = 7
2,775,183 UART: [afmc] AUTHORITY.KEYID = 5
2,811,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,737 UART: [afmc] --
2,854,841 UART: [cold-reset] --
2,855,627 UART: [state] Locking Datavault
2,856,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,422 UART: [state] Locking ICCM
2,857,946 UART: [exit] Launching FMC @ 0x40000130
2,863,275 UART:
2,863,291 UART: Running Caliptra FMC ...
2,863,699 UART:
2,863,842 UART: [state] CFI Enabled
2,874,641 UART: [fht] FMC Alias Private Key: 7
2,982,740 UART: [art] Extend RT PCRs Done
2,983,168 UART: [art] Lock RT PCRs Done
2,984,530 UART: [art] Populate DV Done
2,992,559 UART: [fht] FMC Alias Private Key: 7
2,993,555 UART: [art] Derive CDI
2,993,835 UART: [art] Store in in slot 0x4
3,079,592 UART: [art] Derive Key Pair
3,079,952 UART: [art] Store priv key in slot 0x5
3,093,690 UART: [art] Derive Key Pair - Done
3,108,627 UART: [art] Signing Cert with AUTHO
3,109,107 UART: RITY.KEYID = 7
3,123,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,660 UART: [art] PUB.X = 802CD8C45E4283A3479634DA2B0A97E4F88322C176C6A054717A5F32AFE7FB7538B021B3D05971F36B6E458B0C088E2B
3,131,421 UART: [art] PUB.Y = 22A35E4065A52085290DDB8DA81E6515A0229FC00542CB0CE52CF4B6B0C2780172CA1DEB056209D768C65E15599AF9A5
3,138,355 UART: [art] SIG.R = 58BFD91BD8EB72972D94A1EBF6BECA10C0730C6B44B1E53346C105336990CD6797C2757D9ED98F00A80CD71B504184AF
3,145,102 UART: [art] SIG.S = 149CC09592A8D0C06C81CDC045EDA3D84979EB9555344CDF323FC65F3897AC7B5B2966C740AE890320C9EE796FFC83E4
3,168,970 UART: Caliptra RT
3,169,315 UART: [state] CFI Enabled
3,277,646 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,280 UART: [rt]cmd =0x46505652, len=4
3,308,940 UART: [rt] FIPS Version
3,309,899 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,528 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,886 >>> mbox cmd response data (36 bytes)
1,140,887 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,624,290 >>> mbox cmd response: success
2,624,290 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,436 UART:
2,686,452 UART: Running Caliptra FMC ...
2,686,860 UART:
2,687,003 UART: [state] CFI Enabled
2,697,956 UART: [fht] FMC Alias Private Key: 7
2,805,951 UART: [art] Extend RT PCRs Done
2,806,379 UART: [art] Lock RT PCRs Done
2,807,737 UART: [art] Populate DV Done
2,816,066 UART: [fht] FMC Alias Private Key: 7
2,817,010 UART: [art] Derive CDI
2,817,290 UART: [art] Store in in slot 0x4
2,902,601 UART: [art] Derive Key Pair
2,902,961 UART: [art] Store priv key in slot 0x5
2,916,449 UART: [art] Derive Key Pair - Done
2,930,871 UART: [art] Signing Cert with AUTHO
2,931,351 UART: RITY.KEYID = 7
2,946,315 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,080 UART: [art] PUB.X = 708D55DC887162F08E8F55AC0E2F53A56149DD38C86505A272BC7E1CD4F84E4A880E156BE28F5F0483F6EAC0CAE987C1
2,953,848 UART: [art] PUB.Y = 8B0A3D65197BEEB86C74196DE727A50E78EDC0119B171B271E8606C2D646363D939F004125649BE4EAC374260352AD2F
2,960,762 UART: [art] SIG.R = CF80158E6B9AC7479137575D8FCE35D99214623F111FFE3EA088863B89289EB7D6ADF6E6D5CFBF021C26D2CF0C26FC8F
2,967,540 UART: [art] SIG.S = 1EAF6513475AB1352FA0170D637E06A53BA713F164AF9BAD1C0D0689534FB9BCAC42D830EC0CCFA66DFE0612E764BA36
2,991,331 UART: Caliptra RT
2,991,676 UART: [state] CFI Enabled
3,099,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,095 UART: [rt]cmd =0x46505652, len=4
3,130,755 UART: [rt] FIPS Version
3,131,806 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,403 UART: [idev] ++
1,173,571 UART: [idev] CDI.KEYID = 6
1,173,932 UART: [idev] SUBJECT.KEYID = 7
1,174,357 UART: [idev] UDS.KEYID = 0
1,174,703 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,787 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,844 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46505652
1,282,426 UART: [rt] FIPS Version
1,282,987 >>> mbox cmd response data (36 bytes)
1,282,988 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,283,251 UART: [fwproc] Recv command 0x46574c44
1,283,984 UART: [fwproc] Recv'd Img size: 114084 bytes
2,577,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,769,331 >>> mbox cmd response: success
2,769,331 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,770,494 UART: [afmc] ++
2,770,662 UART: [afmc] CDI.KEYID = 6
2,771,025 UART: [afmc] SUBJECT.KEYID = 7
2,771,451 UART: [afmc] AUTHORITY.KEYID = 5
2,806,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,669 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,281 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,000 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,927 UART: [afmc] --
2,849,883 UART: [cold-reset] --
2,850,611 UART: [state] Locking Datavault
2,851,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,308 UART: [state] Locking ICCM
2,852,886 UART: [exit] Launching FMC @ 0x40000130
2,858,215 UART:
2,858,231 UART: Running Caliptra FMC ...
2,858,639 UART:
2,858,693 UART: [state] CFI Enabled
2,869,126 UART: [fht] FMC Alias Private Key: 7
2,977,145 UART: [art] Extend RT PCRs Done
2,977,573 UART: [art] Lock RT PCRs Done
2,979,361 UART: [art] Populate DV Done
2,987,634 UART: [fht] FMC Alias Private Key: 7
2,988,654 UART: [art] Derive CDI
2,988,934 UART: [art] Store in in slot 0x4
3,074,425 UART: [art] Derive Key Pair
3,074,785 UART: [art] Store priv key in slot 0x5
3,087,571 UART: [art] Derive Key Pair - Done
3,102,573 UART: [art] Signing Cert with AUTHO
3,103,053 UART: RITY.KEYID = 7
3,118,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,030 UART: [art] PUB.X = 97899BCE94BF0FC5832D92E68ABA79CC75E91FC45C6F1F8E2C0DFABCB317B1F987A12565696BB59F113D7B58DCA20116
3,125,807 UART: [art] PUB.Y = 0261CA05CC91B833F1AF50D9BF7E6318E11999C4EC5DE5196F8C1FBBBDDD21D9EAFBB2A11DC38F0B47BEA9695911F1DE
3,132,774 UART: [art] SIG.R = B80D3BFC2A13DE3EC80383CFE18FD7BAEAEDE8445E6F390129BC62FB9C173B85D0E483019755098C3F93CF2C0912C1DA
3,139,544 UART: [art] SIG.S = 6BBBBE7E042FB3A17B9166E05E778A605EBE86D124062F57890441CCC91C96A5A5AA4D58EBAFE5C4D3AEF10708DBF139
3,162,856 UART: Caliptra RT
3,163,109 UART: [state] CFI Enabled
3,270,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,480 UART: [rt]cmd =0x46505652, len=4
3,302,140 UART: [rt] FIPS Version
3,303,081 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,232 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,710 >>> mbox cmd response data (36 bytes)
1,135,711 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,549 >>> mbox cmd response: success
2,619,549 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,301 UART:
2,682,317 UART: Running Caliptra FMC ...
2,682,725 UART:
2,682,779 UART: [state] CFI Enabled
2,692,910 UART: [fht] FMC Alias Private Key: 7
2,800,331 UART: [art] Extend RT PCRs Done
2,800,759 UART: [art] Lock RT PCRs Done
2,802,291 UART: [art] Populate DV Done
2,810,512 UART: [fht] FMC Alias Private Key: 7
2,811,684 UART: [art] Derive CDI
2,811,964 UART: [art] Store in in slot 0x4
2,897,287 UART: [art] Derive Key Pair
2,897,647 UART: [art] Store priv key in slot 0x5
2,910,587 UART: [art] Derive Key Pair - Done
2,925,371 UART: [art] Signing Cert with AUTHO
2,925,851 UART: RITY.KEYID = 7
2,941,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,784 UART: [art] PUB.X = 5BAA9869793FF54427B8E83D6C2FD70F95B84879668EDC39C43F6B89BED8A81FC859E19D8839A7E652D986F466EDB86A
2,948,559 UART: [art] PUB.Y = 115ACC19AC6A7FECB069D7615736CB1EFAFE0A843DE98F36B03E6956EC6A685A5D890F4E450CD0065492444F44ABEBBB
2,955,515 UART: [art] SIG.R = 626CD8FE1EEFC273321567D6A7674A1A77CAF0F7EA2A0E05F94ECB3B3CB74766DB2D0664A94622C7CA1CD80CE2850EFD
2,962,290 UART: [art] SIG.S = 6C11F36B2906BC468132EA7CD3300A3038B3F4D73FF0411E94C71C0C808A42F26D22DC0B5F1E288B6FEAF4CC9835347B
2,986,025 UART: Caliptra RT
2,986,278 UART: [state] CFI Enabled
3,094,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,703 UART: [rt]cmd =0x46505652, len=4
3,125,363 UART: [rt] FIPS Version
3,126,402 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,244 UART: [idev] Erasing UDS.KEYID = 0
1,199,010 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,371 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46505652
1,283,389 UART: [rt] FIPS Version
1,283,950 >>> mbox cmd response data (36 bytes)
1,283,951 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
1,284,172 UART: [fwproc] Recv command 0x46574c44
1,284,905 UART: [fwproc] Recv'd Img size: 114084 bytes
2,579,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89400
2,770,242 >>> mbox cmd response: success
2,770,242 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,771,467 UART: [afmc] ++
2,771,635 UART: [afmc] CDI.KEYID = 6
2,771,998 UART: [afmc] SUBJECT.KEYID = 7
2,772,424 UART: [afmc] AUTHORITY.KEYID = 5
2,808,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,173 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,056 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,716 UART: [afmc] --
2,851,684 UART: [cold-reset] --
2,852,574 UART: [state] Locking Datavault
2,853,675 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,279 UART: [state] Locking ICCM
2,854,781 UART: [exit] Launching FMC @ 0x40000130
2,860,110 UART:
2,860,126 UART: Running Caliptra FMC ...
2,860,534 UART:
2,860,677 UART: [state] CFI Enabled
2,871,492 UART: [fht] FMC Alias Private Key: 7
2,979,171 UART: [art] Extend RT PCRs Done
2,979,599 UART: [art] Lock RT PCRs Done
2,980,783 UART: [art] Populate DV Done
2,988,936 UART: [fht] FMC Alias Private Key: 7
2,989,992 UART: [art] Derive CDI
2,990,272 UART: [art] Store in in slot 0x4
3,075,847 UART: [art] Derive Key Pair
3,076,207 UART: [art] Store priv key in slot 0x5
3,089,665 UART: [art] Derive Key Pair - Done
3,104,473 UART: [art] Signing Cert with AUTHO
3,104,953 UART: RITY.KEYID = 7
3,120,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,962 UART: [art] PUB.X = 0C7DB41420A955268869040D505C3E8CCA3935C21F78C51C590436E7F7F03436DFCA6F8A99A56A76FC1212884DFBE02D
3,127,722 UART: [art] PUB.Y = 4742D34144784C1AAC17C5CC3C0302289649EFBF001B2F12CA80A03B4A1E49550A06D3E5EF32120411B05B07197D3495
3,134,628 UART: [art] SIG.R = BD92D319775DC49903069223DA65860BD2FFB09E69BBD2F72944E2D24DE79B8019E9167597943C0D2661857A02C2700A
3,141,374 UART: [art] SIG.S = 71971B03C288D92BF11615BDAABCA9592A8CF9EB4C6F430B01117DC02181D92C53FF9234D9535F3CF0F6B83D5200EA98
3,165,322 UART: Caliptra RT
3,165,667 UART: [state] CFI Enabled
3,274,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,456 UART: [rt]cmd =0x46505652, len=4
3,305,116 UART: [rt] FIPS Version
3,306,129 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,429 >>> mbox cmd response data (36 bytes)
1,136,430 <<< Executing mbox cmd 0x46574c44 (114084 bytes) from SoC
2,619,776 >>> mbox cmd response: success
2,619,776 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,104 UART:
2,682,120 UART: Running Caliptra FMC ...
2,682,528 UART:
2,682,671 UART: [state] CFI Enabled
2,693,514 UART: [fht] FMC Alias Private Key: 7
2,801,829 UART: [art] Extend RT PCRs Done
2,802,257 UART: [art] Lock RT PCRs Done
2,803,929 UART: [art] Populate DV Done
2,812,030 UART: [fht] FMC Alias Private Key: 7
2,813,046 UART: [art] Derive CDI
2,813,326 UART: [art] Store in in slot 0x4
2,898,707 UART: [art] Derive Key Pair
2,899,067 UART: [art] Store priv key in slot 0x5
2,911,985 UART: [art] Derive Key Pair - Done
2,927,115 UART: [art] Signing Cert with AUTHO
2,927,595 UART: RITY.KEYID = 7
2,942,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,234 UART: [art] PUB.X = 3023AE2EA7AB8B3E4AC2F29F5ED5D45CB1B2FC306A4E443E010C5DC48EC9B65980FCEAE8C0D58385C0CC0EA47BF15E08
2,950,018 UART: [art] PUB.Y = 6D242FADD1DCF0FB0B1498D9378D766EF5EFE6B18CBD15A5CAA7353DF299013191BA3021A0BAA86864A4A2E9A75A3368
2,956,978 UART: [art] SIG.R = DFDB915A7F3B3D52F64138A873B6CFBFA84FE714BEF6B166A7125AEAD60671C8EBF3DDE9C0E0B364FF7319A0E497C338
2,963,767 UART: [art] SIG.S = 86B20537B1B0E4A03CEA34019C0D14F12EB7E66A85C198ECC07ABBB01A44286BC43BD4B52198C7C95176091FF7C72137
2,987,624 UART: Caliptra RT
2,987,969 UART: [state] CFI Enabled
3,095,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,439 UART: [rt]cmd =0x46505652, len=4
3,127,099 UART: [rt] FIPS Version
3,127,950 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,084 UART:
192,533 UART: Running Caliptra ROM ...
193,664 UART:
193,812 UART: [state] CFI Enabled
263,702 UART: [state] LifecycleState = Unprovisioned
265,621 UART: [state] DebugLocked = No
266,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,820 UART: [kat] SHA2-256
441,519 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,038 UART: [kat] ++
452,534 UART: [kat] sha1
464,122 UART: [kat] SHA2-256
466,848 UART: [kat] SHA2-384
473,093 UART: [kat] SHA2-512-ACC
475,505 UART: [kat] ECC-384
2,769,583 UART: [kat] HMAC-384Kdf
2,801,942 UART: [kat] LMS
3,992,264 UART: [kat] --
3,995,784 UART: [cold-reset] ++
3,997,868 UART: [fht] Storing FHT @ 0x50003400
4,007,883 UART: [idev] ++
4,008,460 UART: [idev] CDI.KEYID = 6
4,009,450 UART: [idev] SUBJECT.KEYID = 7
4,010,705 UART: [idev] UDS.KEYID = 0
4,011,748 ready_for_fw is high
4,011,969 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,156,201 UART: [idev] Erasing UDS.KEYID = 0
7,349,522 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,588 UART: [idev] --
7,374,323 UART: [ldev] ++
7,374,899 UART: [ldev] CDI.KEYID = 6
7,375,863 UART: [ldev] SUBJECT.KEYID = 5
7,377,082 UART: [ldev] AUTHORITY.KEYID = 7
7,378,316 UART: [ldev] FE.KEYID = 1
7,425,098 UART: [ldev] Erasing FE.KEYID = 1
10,756,965 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,874 UART: [ldev] --
13,118,283 UART: [fwproc] Waiting for Commands...
13,121,200 UART: [fwproc] Received command 0x46574c44
13,123,389 UART: [fwproc] Received Image of size 114632 bytes
17,183,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,040 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,647,301 >>> mbox cmd response: success
17,647,694 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,652,134 UART: [afmc] ++
17,652,715 UART: [afmc] CDI.KEYID = 6
17,653,661 UART: [afmc] SUBJECT.KEYID = 7
17,654,891 UART: [afmc] AUTHORITY.KEYID = 5
21,030,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,319 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,732 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,582 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,020 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,398,682 UART: [afmc] --
23,402,923 UART: [cold-reset] --
23,406,421 UART: [state] Locking Datavault
23,413,307 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,055 UART: [state] Locking ICCM
23,417,155 UART: [exit] Launching FMC @ 0x40000130
23,425,554 UART:
23,425,792 UART: Running Caliptra FMC ...
23,426,896 UART:
23,427,073 UART: [state] CFI Enabled
23,490,449 UART: [fht] FMC Alias Private Key: 7
25,828,630 UART: [art] Extend RT PCRs Done
25,829,981 UART: [art] Lock RT PCRs Done
25,831,393 UART: [art] Populate DV Done
25,836,750 UART: [fht] FMC Alias Private Key: 7
25,838,310 UART: [art] Derive CDI
25,839,130 UART: [art] Store in in slot 0x4
25,898,865 UART: [art] Derive Key Pair
25,899,868 UART: [art] Store priv key in slot 0x5
29,192,598 UART: [art] Derive Key Pair - Done
29,205,626 UART: [art] Signing Cert with AUTHO
29,206,935 UART: RITY.KEYID = 7
31,494,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,148 UART: [art] PUB.X = EDBBE8F4C58F74AE312C04195E771F7932BF36994E539E184F31A7913FA4BF38A8364A20D9DF3B59745726A984123487
31,503,365 UART: [art] PUB.Y = 9503ED3C361F3275C82F9BDB69D1ECE0D08275713EAA2E14C6A2855710A8E9CE2B299B741EEFFF80F6AD7F2B11E13D73
31,510,651 UART: [art] SIG.R = E7F2897C70B8C7A447C0A155AD90E6ABAA17B6D0CFC7B802A5CD7C56B6CFAAC5CED9263711F8A898E448BA446900CC1B
31,518,030 UART: [art] SIG.S = FD2EE2B089EF630A3AFEE0F3D4D40BA42ADC0E1F44E87C8BCFA5D6010EC86DD662504F1995D77771D96C0079B8E7FDCE
32,822,811 UART: Caliptra RT
32,823,515 UART: [state] CFI Enabled
32,986,303 UART: [rt] RT listening for mailbox commands...
33,017,504 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,804,965 ready_for_fw is high
3,805,451 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
17,866,909 >>> mbox cmd response: success
17,867,606 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,569,671 UART:
23,570,072 UART: Running Caliptra FMC ...
23,571,241 UART:
23,571,404 UART: [state] CFI Enabled
23,637,877 UART: [fht] FMC Alias Private Key: 7
25,976,392 UART: [art] Extend RT PCRs Done
25,977,615 UART: [art] Lock RT PCRs Done
25,979,208 UART: [art] Populate DV Done
25,984,519 UART: [fht] FMC Alias Private Key: 7
25,986,122 UART: [art] Derive CDI
25,986,942 UART: [art] Store in in slot 0x4
26,046,579 UART: [art] Derive Key Pair
26,047,634 UART: [art] Store priv key in slot 0x5
29,340,188 UART: [art] Derive Key Pair - Done
29,352,896 UART: [art] Signing Cert with AUTHO
29,354,203 UART: RITY.KEYID = 7
31,641,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,400 UART: [art] PUB.X = BA7BF7F30180ED50551BAD08B0031397A634E9CD104BA13AA81456810187C4BA3A8AAD3EB36C0CF0981B56C2F8ED1362
31,650,657 UART: [art] PUB.Y = 889C4395436FF4FD2C67D34970EF6DD30344C7101C32354E93D725914FDB76CDC4E33EC5B6449B7D8DB48E6E1FD98FC1
31,657,890 UART: [art] SIG.R = D91F797986160ACAF729A234E772A01BBC42DF5B19ECEF238755096BCA59CC5E55425AE97DD4F4C67B3C6D9BFB3529A2
31,665,288 UART: [art] SIG.S = 8DBDDACC7793F442243347386926ACA62AB60FF08B1B8A8574873C7734CC090CEC907F036D05DD5ED753E1C2BAFBB0C9
32,970,335 UART: Caliptra RT
32,971,026 UART: [state] CFI Enabled
33,131,249 UART: [rt] RT listening for mailbox commands...
33,162,572 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,495 UART:
192,857 UART: Running Caliptra ROM ...
194,053 UART:
603,545 UART: [state] CFI Enabled
617,626 UART: [state] LifecycleState = Unprovisioned
619,496 UART: [state] DebugLocked = No
622,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,737 UART: [kat] SHA2-256
797,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,025 UART: [kat] ++
808,505 UART: [kat] sha1
818,812 UART: [kat] SHA2-256
821,474 UART: [kat] SHA2-384
828,124 UART: [kat] SHA2-512-ACC
830,496 UART: [kat] ECC-384
3,112,831 UART: [kat] HMAC-384Kdf
3,124,119 UART: [kat] LMS
4,314,181 UART: [kat] --
4,317,214 UART: [cold-reset] ++
4,318,869 UART: [fht] Storing FHT @ 0x50003400
4,331,285 UART: [idev] ++
4,331,925 UART: [idev] CDI.KEYID = 6
4,332,812 UART: [idev] SUBJECT.KEYID = 7
4,334,058 UART: [idev] UDS.KEYID = 0
4,335,039 ready_for_fw is high
4,335,313 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
4,479,376 UART: [idev] Erasing UDS.KEYID = 0
7,620,487 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,541 UART: [idev] --
7,644,861 UART: [ldev] ++
7,645,440 UART: [ldev] CDI.KEYID = 6
7,646,459 UART: [ldev] SUBJECT.KEYID = 5
7,647,617 UART: [ldev] AUTHORITY.KEYID = 7
7,648,898 UART: [ldev] FE.KEYID = 1
7,661,401 UART: [ldev] Erasing FE.KEYID = 1
10,944,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,635 UART: [ldev] --
13,303,927 UART: [fwproc] Waiting for Commands...
13,307,164 UART: [fwproc] Received command 0x46574c44
13,309,354 UART: [fwproc] Received Image of size 114632 bytes
17,363,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,462 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89928
17,834,708 >>> mbox cmd response: success
17,835,132 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,838,939 UART: [afmc] ++
17,839,517 UART: [afmc] CDI.KEYID = 6
17,840,520 UART: [afmc] SUBJECT.KEYID = 7
17,841,693 UART: [afmc] AUTHORITY.KEYID = 5
21,153,473 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,512 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,794 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,166 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,005 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,424 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,621 UART: [afmc] --
23,517,883 UART: [cold-reset] --
23,521,539 UART: [state] Locking Datavault
23,526,662 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,408 UART: [state] Locking ICCM
23,530,100 UART: [exit] Launching FMC @ 0x40000130
23,538,462 UART:
23,538,701 UART: Running Caliptra FMC ...
23,539,805 UART:
23,539,965 UART: [state] CFI Enabled
23,547,874 UART: [fht] FMC Alias Private Key: 7
25,878,723 UART: [art] Extend RT PCRs Done
25,879,948 UART: [art] Lock RT PCRs Done
25,881,596 UART: [art] Populate DV Done
25,887,125 UART: [fht] FMC Alias Private Key: 7
25,888,786 UART: [art] Derive CDI
25,889,603 UART: [art] Store in in slot 0x4
25,932,043 UART: [art] Derive Key Pair
25,933,111 UART: [art] Store priv key in slot 0x5
29,174,595 UART: [art] Derive Key Pair - Done
29,187,648 UART: [art] Signing Cert with AUTHO
29,188,990 UART: RITY.KEYID = 7
31,468,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,008 UART: [art] PUB.X = B8C70748911C910283468D1606464BE75D87450BFF5F1E52D008B63BBB4BDBE27E87510E4CF1BC0F0318873EBE0AF801
31,477,256 UART: [art] PUB.Y = 1AE96679F19ACDB793283640E69F9EAA960804BDE5D273C31181C1D7E3178BCC8D8A29D9574363DAC9BB87AA61A4285A
31,484,522 UART: [art] SIG.R = EEEC702A3231F7D6FF287356F09F2DA0CADCA7A1DEBB7DF3A6A1F3593A9C585E7682C443898521314E01FE7C1C3A77C9
31,491,887 UART: [art] SIG.S = 2E59ED02952C03BBC4503FCF01F649CB5354D32F84D85992411BE493621B061DBE7927B5AC182811BBAA85112BDB9110
32,797,406 UART: Caliptra RT
32,798,135 UART: [state] CFI Enabled
32,915,290 UART: [rt] RT listening for mailbox commands...
32,946,674 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
4,124,383 ready_for_fw is high
4,125,025 <<< Executing mbox cmd 0x46574c44 (114632 bytes) from SoC
18,076,904 >>> mbox cmd response: success
18,077,626 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,714,034 UART:
23,714,429 UART: Running Caliptra FMC ...
23,715,587 UART:
23,715,750 UART: [state] CFI Enabled
23,723,888 UART: [fht] FMC Alias Private Key: 7
26,055,343 UART: [art] Extend RT PCRs Done
26,056,569 UART: [art] Lock RT PCRs Done
26,058,225 UART: [art] Populate DV Done
26,063,644 UART: [fht] FMC Alias Private Key: 7
26,065,173 UART: [art] Derive CDI
26,065,940 UART: [art] Store in in slot 0x4
26,108,479 UART: [art] Derive Key Pair
26,109,527 UART: [art] Store priv key in slot 0x5
29,351,749 UART: [art] Derive Key Pair - Done
29,364,633 UART: [art] Signing Cert with AUTHO
29,366,129 UART: RITY.KEYID = 7
31,645,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,165 UART: [art] PUB.X = AD1D6A0F13F84EF2E2D018CF39E498CE4049FAD57560A82FEBED2CED0610A4C01CE9F685D8C1ACE30364C7DFF8F2BCE3
31,654,475 UART: [art] PUB.Y = 73BC7D26AAD7AEC87DBDF378BDD7539D05640745DAB2041BFAABAE8661A1E8102CA41F0B68667EAD1ADE69C5598CBCFC
31,661,736 UART: [art] SIG.R = 1F7258AD20087688D087EE705D89100CC6560B3ECEA5515C36B7430A5865EE1D33C44E26C5A1751EE7ED44F3888CC8EA
31,669,102 UART: [art] SIG.S = 477845F2D4AE428E6841191B99521EB92C8ED293F7625D3AF509CF48C27FC4AE42C14DDE54A5CC75AAAEC780F83C61DB
32,974,531 UART: Caliptra RT
32,975,246 UART: [state] CFI Enabled
33,093,491 UART: [rt] RT listening for mailbox commands...
33,124,875 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,307 UART:
192,691 UART: Running Caliptra ROM ...
193,809 UART:
193,952 UART: [state] CFI Enabled
263,726 UART: [state] LifecycleState = Unprovisioned
265,575 UART: [state] DebugLocked = No
268,025 UART: [state] WD Timer not started. Device not locked for debugging
272,205 UART: [kat] SHA2-256
451,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,885 UART: [kat] ++
463,412 UART: [kat] sha1
473,823 UART: [kat] SHA2-256
476,868 UART: [kat] SHA2-384
484,287 UART: [kat] SHA2-512-ACC
487,236 UART: [kat] ECC-384
2,949,888 UART: [kat] HMAC-384Kdf
2,973,892 UART: [kat] LMS
3,503,387 UART: [kat] --
3,505,540 UART: [cold-reset] ++
3,506,975 UART: [fht] FHT @ 0x50003400
3,518,754 UART: [idev] ++
3,519,355 UART: [idev] CDI.KEYID = 6
3,520,276 UART: [idev] SUBJECT.KEYID = 7
3,521,454 UART: [idev] UDS.KEYID = 0
3,522,381 ready_for_fw is high
3,522,589 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,667,030 UART: [idev] Erasing UDS.KEYID = 0
6,028,534 UART: [idev] Sha1 KeyId Algorithm
6,051,553 UART: [idev] --
6,055,284 UART: [ldev] ++
6,055,859 UART: [ldev] CDI.KEYID = 6
6,056,769 UART: [ldev] SUBJECT.KEYID = 5
6,057,928 UART: [ldev] AUTHORITY.KEYID = 7
6,059,236 UART: [ldev] FE.KEYID = 1
6,101,112 UART: [ldev] Erasing FE.KEYID = 1
8,605,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,308 UART: [ldev] --
10,414,695 UART: [fwproc] Wait for Commands...
10,416,526 UART: [fwproc] Recv command 0x46574c44
10,418,629 UART: [fwproc] Recv'd Img size: 114940 bytes
13,824,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,192 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,283,703 >>> mbox cmd response: success
14,284,137 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,288,310 UART: [afmc] ++
14,288,896 UART: [afmc] CDI.KEYID = 6
14,289,965 UART: [afmc] SUBJECT.KEYID = 7
14,291,065 UART: [afmc] AUTHORITY.KEYID = 5
16,821,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,540,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,542,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,558,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,574,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,590,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,612,879 UART: [afmc] --
18,617,491 UART: [cold-reset] --
18,620,990 UART: [state] Locking Datavault
18,628,450 UART: [state] Locking PCR0, PCR1 and PCR31
18,630,124 UART: [state] Locking ICCM
18,632,022 UART: [exit] Launching FMC @ 0x40000130
18,640,425 UART:
18,640,677 UART: Running Caliptra FMC ...
18,641,778 UART:
18,641,951 UART: [state] CFI Enabled
18,701,476 UART: [fht] FMC Alias Private Key: 7
20,465,224 UART: [art] Extend RT PCRs Done
20,466,442 UART: [art] Lock RT PCRs Done
20,467,903 UART: [art] Populate DV Done
20,473,489 UART: [fht] FMC Alias Private Key: 7
20,474,852 UART: [art] Derive CDI
20,475,595 UART: [art] Store in in slot 0x4
20,534,236 UART: [art] Derive Key Pair
20,535,241 UART: [art] Store priv key in slot 0x5
22,998,137 UART: [art] Derive Key Pair - Done
23,011,095 UART: [art] Signing Cert with AUTHO
23,012,411 UART: RITY.KEYID = 7
24,724,121 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,623 UART: [art] PUB.X = A9C28B623EC1D6A2F16300F5F8059D51BC9ED08753BF1806740600755823A1001F149511AEA59740F2FC142B898D6BF2
24,732,805 UART: [art] PUB.Y = 5976F2B1C113191C75B955F16D271D39D9176F4CEA2C26DC706B32D26AE3EFA79BF3BF89DD54D62B48365A68BBB8CF83
24,740,066 UART: [art] SIG.R = 422D8505D4B9AFC8F5C373EC4BA9F4D161125A05CCC27ECD7E5DDEE82C58FF9B45C0980AC7892B4465B95F3BFA194A92
24,747,501 UART: [art] SIG.S = 5E3C770409E6B31CC337CC55EAA67C78983465B5129B980274A7770C0D6D7FFB0F1821E83B1FD057F8EA18B680CF905F
25,726,613 UART: Caliptra RT
25,727,314 UART: [state] CFI Enabled
25,892,668 UART: [rt] RT listening for mailbox commands...
25,923,909 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,380,861 ready_for_fw is high
3,381,312 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,097,201 >>> mbox cmd response: success
14,097,890 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,385,720 UART:
18,386,097 UART: Running Caliptra FMC ...
18,387,374 UART:
18,387,552 UART: [state] CFI Enabled
18,451,701 UART: [fht] FMC Alias Private Key: 7
20,215,641 UART: [art] Extend RT PCRs Done
20,216,867 UART: [art] Lock RT PCRs Done
20,218,241 UART: [art] Populate DV Done
20,223,483 UART: [fht] FMC Alias Private Key: 7
20,225,014 UART: [art] Derive CDI
20,225,786 UART: [art] Store in in slot 0x4
20,284,121 UART: [art] Derive Key Pair
20,285,166 UART: [art] Store priv key in slot 0x5
22,748,100 UART: [art] Derive Key Pair - Done
22,761,495 UART: [art] Signing Cert with AUTHO
22,762,804 UART: RITY.KEYID = 7
24,474,005 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,516 UART: [art] PUB.X = 5174CECE2C7A309A97D83C56DBEC983FF84D206591FF425A193488E33ED4A89B17F47253E555675E93A5A752EC006A5E
24,482,732 UART: [art] PUB.Y = 4E064ADD534A81CA2EEE0DD127DA7950969DEBB675B7566721601A35AF570368AAF182187528E617D83C52610D4DFF00
24,489,950 UART: [art] SIG.R = 1C03C6DD43B7E768131D34144E9CE2A7C9FB2DD57AECFD30F8660D6FF7C87B4D3F553104299DDD2C1CAE2AEA5803E4D7
24,497,391 UART: [art] SIG.S = 5307D714AE7A1CC9F288D0B7EDACA2571C856C2C098ABA351983E668DE57993C5FFB06880249AD4790C53A64039FE828
25,475,561 UART: Caliptra RT
25,476,275 UART: [state] CFI Enabled
25,641,622 UART: [rt] RT listening for mailbox commands...
25,673,299 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,602 UART:
192,993 UART: Running Caliptra ROM ...
194,145 UART:
603,837 UART: [state] CFI Enabled
617,791 UART: [state] LifecycleState = Unprovisioned
619,670 UART: [state] DebugLocked = No
621,913 UART: [state] WD Timer not started. Device not locked for debugging
625,731 UART: [kat] SHA2-256
804,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,422 UART: [kat] ++
816,892 UART: [kat] sha1
827,980 UART: [kat] SHA2-256
831,003 UART: [kat] SHA2-384
837,508 UART: [kat] SHA2-512-ACC
840,452 UART: [kat] ECC-384
3,281,950 UART: [kat] HMAC-384Kdf
3,295,256 UART: [kat] LMS
3,824,761 UART: [kat] --
3,828,168 UART: [cold-reset] ++
3,829,180 UART: [fht] FHT @ 0x50003400
3,840,590 UART: [idev] ++
3,841,154 UART: [idev] CDI.KEYID = 6
3,842,075 UART: [idev] SUBJECT.KEYID = 7
3,843,256 UART: [idev] UDS.KEYID = 0
3,844,328 ready_for_fw is high
3,844,580 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,989,039 UART: [idev] Erasing UDS.KEYID = 0
6,314,961 UART: [idev] Sha1 KeyId Algorithm
6,337,212 UART: [idev] --
6,341,663 UART: [ldev] ++
6,342,244 UART: [ldev] CDI.KEYID = 6
6,343,131 UART: [ldev] SUBJECT.KEYID = 5
6,344,347 UART: [ldev] AUTHORITY.KEYID = 7
6,345,530 UART: [ldev] FE.KEYID = 1
6,356,961 UART: [ldev] Erasing FE.KEYID = 1
8,829,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,394 UART: [ldev] --
10,620,441 UART: [fwproc] Wait for Commands...
10,622,378 UART: [fwproc] Recv command 0x46574c44
10,624,473 UART: [fwproc] Recv'd Img size: 114940 bytes
14,034,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,467 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,492,664 >>> mbox cmd response: success
14,493,109 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,496,673 UART: [afmc] ++
14,497,291 UART: [afmc] CDI.KEYID = 6
14,498,210 UART: [afmc] SUBJECT.KEYID = 7
14,499,355 UART: [afmc] AUTHORITY.KEYID = 5
16,991,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,690 UART: [afmc] --
18,786,080 UART: [cold-reset] --
18,790,532 UART: [state] Locking Datavault
18,795,136 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,814 UART: [state] Locking ICCM
18,798,402 UART: [exit] Launching FMC @ 0x40000130
18,806,798 UART:
18,807,035 UART: Running Caliptra FMC ...
18,808,139 UART:
18,808,296 UART: [state] CFI Enabled
18,816,149 UART: [fht] FMC Alias Private Key: 7
20,572,774 UART: [art] Extend RT PCRs Done
20,573,996 UART: [art] Lock RT PCRs Done
20,575,623 UART: [art] Populate DV Done
20,581,039 UART: [fht] FMC Alias Private Key: 7
20,582,580 UART: [art] Derive CDI
20,583,316 UART: [art] Store in in slot 0x4
20,626,365 UART: [art] Derive Key Pair
20,627,366 UART: [art] Store priv key in slot 0x5
23,054,293 UART: [art] Derive Key Pair - Done
23,067,288 UART: [art] Signing Cert with AUTHO
23,068,625 UART: RITY.KEYID = 7
24,774,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,522 UART: [art] PUB.X = 2B431B9E976C4FDE0DD50B9340737F539E8D4732132A03D712687E7B31EF32798B90A8C02FB2D7D423A24E4B17C0B71C
24,782,769 UART: [art] PUB.Y = 53B2748F2A71B6AEF737AED3A709A8BC048096996898CFF1395D790ABCC706D8131EDFB3247D3DEFED7EE76FDF7D8F46
24,790,034 UART: [art] SIG.R = A49BBC9E52FCD106114A1ACE0206C79FED3B56DC2A1B8FC58E84199960D13B7413B532D4BC7304560825EE3F5E4A3618
24,797,408 UART: [art] SIG.S = 88D12E7AC27648FCB58E4866792A076BF48403BD4B2E585FD73AAA0D1A6FD5174A9E3802E9DB0CC88543B8A5E8C906FE
25,776,636 UART: Caliptra RT
25,777,337 UART: [state] CFI Enabled
25,894,239 UART: [rt] RT listening for mailbox commands...
25,925,781 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,697,616 ready_for_fw is high
3,698,058 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,292,097 >>> mbox cmd response: success
14,292,787 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,539,930 UART:
18,540,312 UART: Running Caliptra FMC ...
18,541,480 UART:
18,541,633 UART: [state] CFI Enabled
18,549,519 UART: [fht] FMC Alias Private Key: 7
20,305,652 UART: [art] Extend RT PCRs Done
20,306,873 UART: [art] Lock RT PCRs Done
20,308,422 UART: [art] Populate DV Done
20,313,785 UART: [fht] FMC Alias Private Key: 7
20,315,410 UART: [art] Derive CDI
20,316,148 UART: [art] Store in in slot 0x4
20,358,955 UART: [art] Derive Key Pair
20,359,953 UART: [art] Store priv key in slot 0x5
22,786,312 UART: [art] Derive Key Pair - Done
22,799,472 UART: [art] Signing Cert with AUTHO
22,800,780 UART: RITY.KEYID = 7
24,506,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,582 UART: [art] PUB.X = 8DB5E628F457ED82C3AB4CFA2B9C950F0606B11697522722F290B04DBD0013AEAA230BCC7DDE3D107E265AA7D7EAA65E
24,514,876 UART: [art] PUB.Y = 3887C44D46425741732FC3FCF4529651504E98AAACDA8836948579EA84E094BC85E47B6E732FCEE2C943BEEE9B17E0B8
24,522,123 UART: [art] SIG.R = E2D90BB0AEDD45EC9C565948E4E7C2F45D06873AF59A83147F3F398A77EEDC0AC93942EDD8F94A0A96A15DD47196F726
24,529,574 UART: [art] SIG.S = 9F3A0E9B10919777CC9A6D5C1231A4EB5A1EB7B2624DC15E32FAB805480C278EE87FED841C5C21B797BC0428164DE528
25,508,962 UART: Caliptra RT
25,509,676 UART: [state] CFI Enabled
25,626,283 UART: [rt] RT listening for mailbox commands...
25,657,728 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,149 UART:
192,521 UART: Running Caliptra ROM ...
193,668 UART:
193,814 UART: [state] CFI Enabled
262,838 UART: [state] LifecycleState = Unprovisioned
265,282 UART: [state] DebugLocked = No
267,679 UART: [state] WD Timer not started. Device not locked for debugging
272,728 UART: [kat] SHA2-256
462,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,399 UART: [kat] ++
473,941 UART: [kat] sha1
484,043 UART: [kat] SHA2-256
487,063 UART: [kat] SHA2-384
491,925 UART: [kat] SHA2-512-ACC
494,517 UART: [kat] ECC-384
2,949,019 UART: [kat] HMAC-384Kdf
2,971,362 UART: [kat] LMS
3,503,134 UART: [kat] --
3,506,857 UART: [cold-reset] ++
3,508,372 UART: [fht] FHT @ 0x50003400
3,521,497 UART: [idev] ++
3,522,226 UART: [idev] CDI.KEYID = 6
3,523,141 UART: [idev] SUBJECT.KEYID = 7
3,524,318 UART: [idev] UDS.KEYID = 0
3,525,242 ready_for_fw is high
3,525,449 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
3,670,068 UART: [idev] Erasing UDS.KEYID = 0
6,030,750 UART: [idev] Sha1 KeyId Algorithm
6,053,405 UART: [idev] --
6,058,084 UART: [ldev] ++
6,058,664 UART: [ldev] CDI.KEYID = 6
6,059,549 UART: [ldev] SUBJECT.KEYID = 5
6,060,765 UART: [ldev] AUTHORITY.KEYID = 7
6,062,001 UART: [ldev] FE.KEYID = 1
6,099,091 UART: [ldev] Erasing FE.KEYID = 1
8,608,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,973 UART: [ldev] --
10,412,888 UART: [fwproc] Wait for Commands...
10,414,444 UART: [fwproc] Recv command 0x46574c44
10,416,711 UART: [fwproc] Recv'd Img size: 114940 bytes
13,873,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,814 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,614,058 >>> mbox cmd response: success
14,614,491 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,617,991 UART: [afmc] ++
14,618,702 UART: [afmc] CDI.KEYID = 6
14,619,830 UART: [afmc] SUBJECT.KEYID = 7
14,621,371 UART: [afmc] AUTHORITY.KEYID = 5
17,153,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,198 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,351 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,858 UART: [afmc] --
18,965,552 UART: [cold-reset] --
18,968,618 UART: [state] Locking Datavault
18,971,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,081 UART: [state] Locking ICCM
18,975,824 UART: [exit] Launching FMC @ 0x40000130
18,984,492 UART:
18,984,726 UART: Running Caliptra FMC ...
18,985,829 UART:
18,985,987 UART: [state] CFI Enabled
19,051,643 UART: [fht] FMC Alias Private Key: 7
20,815,158 UART: [art] Extend RT PCRs Done
20,816,377 UART: [art] Lock RT PCRs Done
20,818,163 UART: [art] Populate DV Done
20,823,581 UART: [fht] FMC Alias Private Key: 7
20,825,103 UART: [art] Derive CDI
20,825,835 UART: [art] Store in in slot 0x4
20,884,380 UART: [art] Derive Key Pair
20,885,421 UART: [art] Store priv key in slot 0x5
23,348,076 UART: [art] Derive Key Pair - Done
23,360,809 UART: [art] Signing Cert with AUTHO
23,362,114 UART: RITY.KEYID = 7
25,074,806 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,463 UART: [art] PUB.X = 01273D6E61F7F3C762BFB393396D8D9990873B742ECF0242AC2B8E728183286312C1C1D02B80526E7E277D897AE47C4E
25,083,579 UART: [art] PUB.Y = 2BDE32A5D90ADBFC1BF14571BA25F72499C312D60D404DF118175AD12567364C8AD324054F8DF77BB30F131EC500D4D6
25,090,823 UART: [art] SIG.R = F9598633F7AE12FDDB131882F22F9F48273E96BC319C4CAD57B7327E0F01D8C25478232D41BDD1A7CD052D61679E273F
25,098,231 UART: [art] SIG.S = 4F3BAC8519A97F62ADB088B7FBC6CA6C16CCA2B28E133BC90D5651B010A9CFFCFB839359E0061967A1F429E7773A6361
26,077,208 UART: Caliptra RT
26,077,905 UART: [state] CFI Enabled
26,243,138 UART: [rt] RT listening for mailbox commands...
26,274,411 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,438,249 ready_for_fw is high
3,438,642 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,761,630 >>> mbox cmd response: success
14,762,122 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,045,429 UART:
19,045,820 UART: Running Caliptra FMC ...
19,047,008 UART:
19,047,175 UART: [state] CFI Enabled
19,114,995 UART: [fht] FMC Alias Private Key: 7
20,879,373 UART: [art] Extend RT PCRs Done
20,880,597 UART: [art] Lock RT PCRs Done
20,882,309 UART: [art] Populate DV Done
20,887,722 UART: [fht] FMC Alias Private Key: 7
20,889,218 UART: [art] Derive CDI
20,889,999 UART: [art] Store in in slot 0x4
20,947,727 UART: [art] Derive Key Pair
20,948,727 UART: [art] Store priv key in slot 0x5
23,411,898 UART: [art] Derive Key Pair - Done
23,424,586 UART: [art] Signing Cert with AUTHO
23,425,885 UART: RITY.KEYID = 7
25,137,814 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,325 UART: [art] PUB.X = EC44D2EDF780302AD7BC08515459D311813A1A56A3D5CEE17D968F769C9373926CE6EF721962D5CEC9744714289B336A
25,146,578 UART: [art] PUB.Y = 37C22C37814879D728F25E566900FFABEB0C703DE1774C1D51E8E22FB7B818CC8B78FCE9893DE40816FE4C485456D0A4
25,153,830 UART: [art] SIG.R = 0F88BD19EDBE5CC5B741A1C642CC9209BCCAEBFB830DEE26F6488594C23E05108477C8795666B808304C07FD42D2F8FA
25,161,200 UART: [art] SIG.S = F074DF4C4394C0AF95C1D6FE564D2F2DE68208D766819F1FBC620C1B8D0A41F9E6F43D4FAF88F0CA1C2C051F15B2444F
26,139,926 UART: Caliptra RT
26,140,644 UART: [state] CFI Enabled
26,304,738 UART: [rt] RT listening for mailbox commands...
26,336,293 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,499 UART:
192,873 UART: Running Caliptra ROM ...
194,007 UART:
603,700 UART: [state] CFI Enabled
621,769 UART: [state] LifecycleState = Unprovisioned
624,145 UART: [state] DebugLocked = No
626,893 UART: [state] WD Timer not started. Device not locked for debugging
631,356 UART: [kat] SHA2-256
821,254 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,064 UART: [kat] ++
832,678 UART: [kat] sha1
844,232 UART: [kat] SHA2-256
847,228 UART: [kat] SHA2-384
853,516 UART: [kat] SHA2-512-ACC
856,114 UART: [kat] ECC-384
3,299,263 UART: [kat] HMAC-384Kdf
3,313,079 UART: [kat] LMS
3,844,904 UART: [kat] --
3,850,815 UART: [cold-reset] ++
3,852,820 UART: [fht] FHT @ 0x50003400
3,865,441 UART: [idev] ++
3,866,080 UART: [idev] CDI.KEYID = 6
3,867,118 UART: [idev] SUBJECT.KEYID = 7
3,868,293 UART: [idev] UDS.KEYID = 0
3,869,223 ready_for_fw is high
3,869,434 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
4,013,848 UART: [idev] Erasing UDS.KEYID = 0
6,345,877 UART: [idev] Sha1 KeyId Algorithm
6,368,491 UART: [idev] --
6,372,674 UART: [ldev] ++
6,373,362 UART: [ldev] CDI.KEYID = 6
6,374,250 UART: [ldev] SUBJECT.KEYID = 5
6,375,456 UART: [ldev] AUTHORITY.KEYID = 7
6,376,688 UART: [ldev] FE.KEYID = 1
6,387,065 UART: [ldev] Erasing FE.KEYID = 1
8,866,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,540 UART: [ldev] --
10,658,591 UART: [fwproc] Wait for Commands...
10,661,119 UART: [fwproc] Recv command 0x46574c44
10,663,432 UART: [fwproc] Recv'd Img size: 114940 bytes
14,108,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,355 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
14,850,627 >>> mbox cmd response: success
14,851,015 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,855,560 UART: [afmc] ++
14,856,275 UART: [afmc] CDI.KEYID = 6
14,857,475 UART: [afmc] SUBJECT.KEYID = 7
14,858,955 UART: [afmc] AUTHORITY.KEYID = 5
17,362,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,102,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,117,437 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,132,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,288 UART: [afmc] --
19,161,684 UART: [cold-reset] --
19,166,048 UART: [state] Locking Datavault
19,170,681 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,825 UART: [state] Locking ICCM
19,174,867 UART: [exit] Launching FMC @ 0x40000130
19,183,564 UART:
19,183,805 UART: Running Caliptra FMC ...
19,184,906 UART:
19,185,063 UART: [state] CFI Enabled
19,193,195 UART: [fht] FMC Alias Private Key: 7
20,949,979 UART: [art] Extend RT PCRs Done
20,951,198 UART: [art] Lock RT PCRs Done
20,952,634 UART: [art] Populate DV Done
20,957,997 UART: [fht] FMC Alias Private Key: 7
20,959,557 UART: [art] Derive CDI
20,960,374 UART: [art] Store in in slot 0x4
21,002,966 UART: [art] Derive Key Pair
21,004,011 UART: [art] Store priv key in slot 0x5
23,430,846 UART: [art] Derive Key Pair - Done
23,443,968 UART: [art] Signing Cert with AUTHO
23,445,278 UART: RITY.KEYID = 7
25,151,049 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,564 UART: [art] PUB.X = 8A8B13CCB117238DB97532FD913C865927EADD5E85E9D1C785F4F40E4CD9FCCED07315DC1B22568FAEAD75E0C77066D4
25,159,878 UART: [art] PUB.Y = A6EB5BAAB4B07578085A8DADDE84988C146FD9400DAA6398768CE7A828A9EDB2592978D189EFF16644A787CB15AE874F
25,167,126 UART: [art] SIG.R = D580C9E2AB034FEABB07F6EAAB4B417FB1A6A2BA7B8037B65C37EA1372317C48441282A77D1A824068D4B6224368158B
25,174,526 UART: [art] SIG.S = 01C40010DD58A8703C2AA86B43414DB5B3925EC9D0CE303AAF13F04AA1B1F7CB093F01038DEAA3FE1EB996631368FBA5
26,153,518 UART: Caliptra RT
26,154,231 UART: [state] CFI Enabled
26,271,635 UART: [rt] RT listening for mailbox commands...
26,303,152 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,755,401 ready_for_fw is high
3,755,844 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
14,956,736 >>> mbox cmd response: success
14,957,198 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,211,378 UART:
19,211,757 UART: Running Caliptra FMC ...
19,212,882 UART:
19,213,033 UART: [state] CFI Enabled
19,221,259 UART: [fht] FMC Alias Private Key: 7
20,978,697 UART: [art] Extend RT PCRs Done
20,979,927 UART: [art] Lock RT PCRs Done
20,981,748 UART: [art] Populate DV Done
20,987,197 UART: [fht] FMC Alias Private Key: 7
20,988,797 UART: [art] Derive CDI
20,989,616 UART: [art] Store in in slot 0x4
21,031,870 UART: [art] Derive Key Pair
21,032,879 UART: [art] Store priv key in slot 0x5
23,459,426 UART: [art] Derive Key Pair - Done
23,472,483 UART: [art] Signing Cert with AUTHO
23,473,797 UART: RITY.KEYID = 7
25,179,210 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,714 UART: [art] PUB.X = 1DFEBCFB104EF0F38263DD8A2B3E3DBB9C8187CEF7522967B10E8CAD974F33D2051327783F425E853C7245A18363DA4F
25,187,998 UART: [art] PUB.Y = B97B18A14EDEDB5A515DAABE5E5704F5BF7F84327C2812D46E9754889EAF4DB8583BEE48F8817296480D974CEC84411F
25,195,246 UART: [art] SIG.R = E085A01B4E970A81B682718FF3DBFA7F4377E46A20CBDE7806A2E782F94DD160A1A7519B05ECC5F0D5D4742D71B7430B
25,202,660 UART: [art] SIG.S = ECF9CD8DCFF0F8ED3B223CC61E3D15A01FDEEA4CA6034DF9859A5948D59F955DA21D1DDEA5EA0088DB28C0A51E2EB093
26,181,680 UART: Caliptra RT
26,182,371 UART: [state] CFI Enabled
26,299,492 UART: [rt] RT listening for mailbox commands...
26,330,892 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,505 UART: [kat] SHA2-256
882,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,551 UART: [kat] ++
886,703 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,876 UART: [kat] HMAC-384Kdf
907,572 UART: [kat] LMS
1,475,768 UART: [kat] --
1,476,719 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,742 UART: [idev] ++
1,479,910 UART: [idev] CDI.KEYID = 6
1,480,270 UART: [idev] SUBJECT.KEYID = 7
1,480,694 UART: [idev] UDS.KEYID = 0
1,481,039 ready_for_fw is high
1,481,039 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,674 UART: [idev] --
1,514,649 UART: [ldev] ++
1,514,817 UART: [ldev] CDI.KEYID = 6
1,515,180 UART: [ldev] SUBJECT.KEYID = 5
1,515,606 UART: [ldev] AUTHORITY.KEYID = 7
1,516,069 UART: [ldev] FE.KEYID = 1
1,521,067 UART: [ldev] Erasing FE.KEYID = 1
1,545,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,606 UART: [ldev] --
1,584,993 UART: [fwproc] Waiting for Commands...
1,585,672 UART: [fwproc] Received command 0x46574c44
1,586,463 UART: [fwproc] Received Image of size 114940 bytes
2,892,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,086,120 >>> mbox cmd response: success
3,086,120 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,087,200 UART: [afmc] ++
3,087,368 UART: [afmc] CDI.KEYID = 6
3,087,730 UART: [afmc] SUBJECT.KEYID = 7
3,088,155 UART: [afmc] AUTHORITY.KEYID = 5
3,123,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,118 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,731 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,421 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,382 UART: [afmc] --
3,166,348 UART: [cold-reset] --
3,167,250 UART: [state] Locking Datavault
3,168,149 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,753 UART: [state] Locking ICCM
3,169,189 UART: [exit] Launching FMC @ 0x40000130
3,174,518 UART:
3,174,534 UART: Running Caliptra FMC ...
3,174,942 UART:
3,174,996 UART: [state] CFI Enabled
3,185,005 UART: [fht] FMC Alias Private Key: 7
3,293,188 UART: [art] Extend RT PCRs Done
3,293,616 UART: [art] Lock RT PCRs Done
3,295,174 UART: [art] Populate DV Done
3,303,303 UART: [fht] FMC Alias Private Key: 7
3,304,351 UART: [art] Derive CDI
3,304,631 UART: [art] Store in in slot 0x4
3,390,292 UART: [art] Derive Key Pair
3,390,652 UART: [art] Store priv key in slot 0x5
3,403,828 UART: [art] Derive Key Pair - Done
3,418,897 UART: [art] Signing Cert with AUTHO
3,419,377 UART: RITY.KEYID = 7
3,434,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,540 UART: [art] PUB.X = D3EF89EB88AB525C0E6056E570F39DB6D0210F4ABB58B08B8CDD9BBD0F26F3A280152635CF60834DB926FE0CDAD5429E
3,442,316 UART: [art] PUB.Y = 85E3D4E4368A65D10639B2563BC44384C7ADF7DF61F88C989CC02D7AFDE6CFECEE3C814B4E4E190C9C0D3FFB4E458AEA
3,449,281 UART: [art] SIG.R = 1F911110E62C6B918B9EAC0EBF3003100A72D03038C33D5A101AEAB2096D3FE22BA59D3E09FFCB14AC4E5640EF6B51E4
3,456,050 UART: [art] SIG.S = A7E7301D955A825DBE2BA0F9A581D95A721B31EEAE950E2D3852D6090AA6CE4FDD585D870D513CB3CCBB73C5FF2064A6
3,479,995 UART: Caliptra RT
3,480,248 UART: [state] CFI Enabled
3,589,055 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,555 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,119 ready_for_fw is high
1,363,119 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,938,090 >>> mbox cmd response: success
2,938,090 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,999,440 UART:
2,999,456 UART: Running Caliptra FMC ...
2,999,864 UART:
2,999,918 UART: [state] CFI Enabled
3,010,817 UART: [fht] FMC Alias Private Key: 7
3,118,816 UART: [art] Extend RT PCRs Done
3,119,244 UART: [art] Lock RT PCRs Done
3,120,908 UART: [art] Populate DV Done
3,128,851 UART: [fht] FMC Alias Private Key: 7
3,129,899 UART: [art] Derive CDI
3,130,179 UART: [art] Store in in slot 0x4
3,215,764 UART: [art] Derive Key Pair
3,216,124 UART: [art] Store priv key in slot 0x5
3,229,234 UART: [art] Derive Key Pair - Done
3,243,793 UART: [art] Signing Cert with AUTHO
3,244,273 UART: RITY.KEYID = 7
3,259,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,056 UART: [art] PUB.X = F59602877B3F98ADD0700301A9BB6CF05A7463DAE802EE9F672A1E3465E9D5168A2351C4A6A42CFD37901AC51CBEE0B5
3,266,824 UART: [art] PUB.Y = 5F1186EE44FB0B77D37198286DD9ED7098D7A054FD08D90171FC5CD43498B87C080422AD9D985D42F96DFC65D0350BF9
3,273,760 UART: [art] SIG.R = C6D5FE8798BFD7A30F5910CE60B9C1D6C58090E92BAA7D9EFEBD240A5B36CF7C92ACA842CEB34B5DE9221867442C5EAD
3,280,548 UART: [art] SIG.S = 55C062F92F9B413E40D39E00B875249679F6551FBD8B96D5252B51CEC17E32E81C06446D6C1F1E50A681A427B74ACF20
3,303,730 UART: Caliptra RT
3,303,983 UART: [state] CFI Enabled
3,411,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,300 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,228 UART: [kat] SHA2-256
882,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,274 UART: [kat] ++
886,426 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,337 UART: [kat] SHA2-512-ACC
897,238 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,686 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,480,059 UART: [idev] ++
1,480,227 UART: [idev] CDI.KEYID = 6
1,480,587 UART: [idev] SUBJECT.KEYID = 7
1,481,011 UART: [idev] UDS.KEYID = 0
1,481,356 ready_for_fw is high
1,481,356 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,488,701 UART: [idev] Erasing UDS.KEYID = 0
1,505,123 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,667 UART: [idev] --
1,514,640 UART: [ldev] ++
1,514,808 UART: [ldev] CDI.KEYID = 6
1,515,171 UART: [ldev] SUBJECT.KEYID = 5
1,515,597 UART: [ldev] AUTHORITY.KEYID = 7
1,516,060 UART: [ldev] FE.KEYID = 1
1,521,548 UART: [ldev] Erasing FE.KEYID = 1
1,547,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,413 UART: [ldev] --
1,586,680 UART: [fwproc] Waiting for Commands...
1,587,541 UART: [fwproc] Received command 0x46574c44
1,588,332 UART: [fwproc] Received Image of size 114940 bytes
2,894,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 90256
3,087,367 >>> mbox cmd response: success
3,087,367 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,088,625 UART: [afmc] ++
3,088,793 UART: [afmc] CDI.KEYID = 6
3,089,155 UART: [afmc] SUBJECT.KEYID = 7
3,089,580 UART: [afmc] AUTHORITY.KEYID = 5
3,124,593 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,459 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,967 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,852 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,542 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,577 UART: [afmc] --
3,168,509 UART: [cold-reset] --
3,169,331 UART: [state] Locking Datavault
3,170,574 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,178 UART: [state] Locking ICCM
3,171,848 UART: [exit] Launching FMC @ 0x40000130
3,177,177 UART:
3,177,193 UART: Running Caliptra FMC ...
3,177,601 UART:
3,177,744 UART: [state] CFI Enabled
3,187,739 UART: [fht] FMC Alias Private Key: 7
3,295,184 UART: [art] Extend RT PCRs Done
3,295,612 UART: [art] Lock RT PCRs Done
3,297,344 UART: [art] Populate DV Done
3,305,499 UART: [fht] FMC Alias Private Key: 7
3,306,513 UART: [art] Derive CDI
3,306,793 UART: [art] Store in in slot 0x4
3,392,632 UART: [art] Derive Key Pair
3,392,992 UART: [art] Store priv key in slot 0x5
3,406,686 UART: [art] Derive Key Pair - Done
3,421,286 UART: [art] Signing Cert with AUTHO
3,421,766 UART: RITY.KEYID = 7
3,437,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,875 UART: [art] PUB.X = E698F211EFB7AAC7679E5DDA16E1533495192A6A8652CB84169E8080A24CF0C73E2453F6C9792B4D08483A806310894E
3,444,638 UART: [art] PUB.Y = 93B9E8D0CD913F39090CF64D226297427B9BD816BC1CA9D56D22598B91F141B243DD1A3DC663296BF690D59C2609A515
3,451,579 UART: [art] SIG.R = 7EEDB44BFBA7FE2C90456421C41A014D747C6BD5EE39D76A55D517DF78D0D3E19D5B8E0036A04D36AD74EEA0A742BF0A
3,458,341 UART: [art] SIG.S = 5C3F796DB73826E7E8DCE813D73DA8B966930173586389AF66F687C9F578EF2350F79022A43271AA09AB40FC528EDA53
3,481,604 UART: Caliptra RT
3,481,949 UART: [state] CFI Enabled
3,589,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,329 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,790 ready_for_fw is high
1,362,790 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,935,707 >>> mbox cmd response: success
2,935,707 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,997,707 UART:
2,997,723 UART: Running Caliptra FMC ...
2,998,131 UART:
2,998,274 UART: [state] CFI Enabled
3,008,971 UART: [fht] FMC Alias Private Key: 7
3,116,634 UART: [art] Extend RT PCRs Done
3,117,062 UART: [art] Lock RT PCRs Done
3,118,500 UART: [art] Populate DV Done
3,126,917 UART: [fht] FMC Alias Private Key: 7
3,127,927 UART: [art] Derive CDI
3,128,207 UART: [art] Store in in slot 0x4
3,213,882 UART: [art] Derive Key Pair
3,214,242 UART: [art] Store priv key in slot 0x5
3,228,196 UART: [art] Derive Key Pair - Done
3,243,159 UART: [art] Signing Cert with AUTHO
3,243,639 UART: RITY.KEYID = 7
3,259,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,980 UART: [art] PUB.X = 34FEA77D77EAF3047E4AEA98FD393E5FBADC2B8F35F1F4BC426FCEE06DA44A956A67561EF48320EB15F05C6B05865E55
3,266,764 UART: [art] PUB.Y = 176A40E323F771F8E414481D130F569F051747827123F59166D07FB79AFBD2079F8E9A429E73ADC6284D6A8DD9146E6C
3,273,701 UART: [art] SIG.R = 73A26F13679C89E438B01B8D934F6724EB3B145C5556E500A6D3E854ADA7B635FE125FFC1B61BB7A17DD0F16537C1A2E
3,280,454 UART: [art] SIG.S = A678BCD5E4A64A489BABA0F6D4D67578A45958B22632D8D47E113D3FA6DC2ED23FC142CB56C952B77C2236F45ADCA50E
3,304,552 UART: Caliptra RT
3,304,897 UART: [state] CFI Enabled
3,412,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,336 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
893,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,345 UART: [kat] ++
897,497 UART: [kat] sha1
901,657 UART: [kat] SHA2-256
903,597 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,342 UART: [kat] HMAC-384Kdf
923,100 UART: [kat] LMS
1,171,428 UART: [kat] --
1,172,377 UART: [cold-reset] ++
1,172,891 UART: [fht] FHT @ 0x50003400
1,175,556 UART: [idev] ++
1,175,724 UART: [idev] CDI.KEYID = 6
1,176,084 UART: [idev] SUBJECT.KEYID = 7
1,176,508 UART: [idev] UDS.KEYID = 0
1,176,853 ready_for_fw is high
1,176,853 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,184,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,187 UART: [ldev] --
1,283,586 UART: [fwproc] Wait for Commands...
1,284,344 UART: [fwproc] Recv command 0x46574c44
1,285,072 UART: [fwproc] Recv'd Img size: 114940 bytes
2,589,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,416 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,199 >>> mbox cmd response: success
2,783,199 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,784,449 UART: [afmc] ++
2,784,617 UART: [afmc] CDI.KEYID = 6
2,784,979 UART: [afmc] SUBJECT.KEYID = 7
2,785,404 UART: [afmc] AUTHORITY.KEYID = 5
2,821,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,010 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,738 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,342 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,100 UART: [afmc] --
2,864,034 UART: [cold-reset] --
2,864,824 UART: [state] Locking Datavault
2,865,891 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,495 UART: [state] Locking ICCM
2,867,087 UART: [exit] Launching FMC @ 0x40000130
2,872,416 UART:
2,872,432 UART: Running Caliptra FMC ...
2,872,840 UART:
2,872,894 UART: [state] CFI Enabled
2,883,311 UART: [fht] FMC Alias Private Key: 7
2,990,606 UART: [art] Extend RT PCRs Done
2,991,034 UART: [art] Lock RT PCRs Done
2,992,758 UART: [art] Populate DV Done
3,000,979 UART: [fht] FMC Alias Private Key: 7
3,002,153 UART: [art] Derive CDI
3,002,433 UART: [art] Store in in slot 0x4
3,088,788 UART: [art] Derive Key Pair
3,089,148 UART: [art] Store priv key in slot 0x5
3,102,114 UART: [art] Derive Key Pair - Done
3,117,027 UART: [art] Signing Cert with AUTHO
3,117,507 UART: RITY.KEYID = 7
3,132,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,894 UART: [art] PUB.X = F849382872CCD2EB952B4705D6CC0097301F4C4887619F9083DC3A969D8909553843D360D8DFCB6A8114E044F5BBB574
3,139,632 UART: [art] PUB.Y = F6CE5D9771E3E55B2D67609B8403EC25025E0BC66B2DC39D5702DADB2FE60E49157D504C4C857C821171DF92AEE531EE
3,146,577 UART: [art] SIG.R = 46BBE8D6BBFFC76FC46F692B10E7442FDC48F5FFD87F4DDA88F05BFA76E63AD954EF57EADDB0B2926F69C96156B79288
3,153,371 UART: [art] SIG.S = F53467E2EB1CF04A42E6F785606A6CBB64C7A369319E240933955B5718DAEB4298415A51F320CABF2C7B5C357E482499
3,177,137 UART: Caliptra RT
3,177,390 UART: [state] CFI Enabled
3,284,201 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,823 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,485 ready_for_fw is high
1,060,485 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,635,284 >>> mbox cmd response: success
2,635,284 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,696,992 UART:
2,697,008 UART: Running Caliptra FMC ...
2,697,416 UART:
2,697,470 UART: [state] CFI Enabled
2,708,181 UART: [fht] FMC Alias Private Key: 7
2,817,042 UART: [art] Extend RT PCRs Done
2,817,470 UART: [art] Lock RT PCRs Done
2,819,118 UART: [art] Populate DV Done
2,827,087 UART: [fht] FMC Alias Private Key: 7
2,828,033 UART: [art] Derive CDI
2,828,313 UART: [art] Store in in slot 0x4
2,914,090 UART: [art] Derive Key Pair
2,914,450 UART: [art] Store priv key in slot 0x5
2,928,166 UART: [art] Derive Key Pair - Done
2,942,622 UART: [art] Signing Cert with AUTHO
2,943,102 UART: RITY.KEYID = 7
2,958,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,213 UART: [art] PUB.X = 2DDFEB1F3114BC392867C043103239B2CD7B7904BD525CB5919715E9E7B0513FFA07DA38E11F62D9DBAD00BC621A64CF
2,965,967 UART: [art] PUB.Y = 7A7180F66C62FE431F5279A7C1E21ACE6DF48CDBE8CC9D5E68BCD9CBBBF1070DD53C67F97D42FA740AC6AB00644A49E0
2,972,910 UART: [art] SIG.R = 934CA0EB885FFC2659EBF63F417E1C827858011A8506847C06374E837E656A356E3C170F392C205574AAD50F228166D5
2,979,657 UART: [art] SIG.S = CBD24E6F11754FBAE5CEE0B9D8703C5A9364A2F51407B3038D78392DB45A235B6A67E9BDDA81B455D934D67BA01D9DEC
3,003,364 UART: Caliptra RT
3,003,617 UART: [state] CFI Enabled
3,111,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,007 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,552 UART: [kat] SHA2-256
904,492 UART: [kat] SHA2-384
907,211 UART: [kat] SHA2-512-ACC
909,112 UART: [kat] ECC-384
919,053 UART: [kat] HMAC-384Kdf
923,601 UART: [kat] LMS
1,171,929 UART: [kat] --
1,172,802 UART: [cold-reset] ++
1,173,344 UART: [fht] FHT @ 0x50003400
1,175,983 UART: [idev] ++
1,176,151 UART: [idev] CDI.KEYID = 6
1,176,511 UART: [idev] SUBJECT.KEYID = 7
1,176,935 UART: [idev] UDS.KEYID = 0
1,177,280 ready_for_fw is high
1,177,280 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,185,147 UART: [idev] Erasing UDS.KEYID = 0
1,202,474 UART: [idev] Sha1 KeyId Algorithm
1,210,990 UART: [idev] --
1,211,940 UART: [ldev] ++
1,212,108 UART: [ldev] CDI.KEYID = 6
1,212,471 UART: [ldev] SUBJECT.KEYID = 5
1,212,897 UART: [ldev] AUTHORITY.KEYID = 7
1,213,360 UART: [ldev] FE.KEYID = 1
1,219,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,598 UART: [ldev] --
1,283,955 UART: [fwproc] Wait for Commands...
1,284,625 UART: [fwproc] Recv command 0x46574c44
1,285,353 UART: [fwproc] Recv'd Img size: 114940 bytes
2,591,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,533 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,837 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,783,534 >>> mbox cmd response: success
2,783,534 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,784,568 UART: [afmc] ++
2,784,736 UART: [afmc] CDI.KEYID = 6
2,785,098 UART: [afmc] SUBJECT.KEYID = 7
2,785,523 UART: [afmc] AUTHORITY.KEYID = 5
2,820,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,881 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,766 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,485 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,365 UART: [afmc] --
2,864,491 UART: [cold-reset] --
2,865,267 UART: [state] Locking Datavault
2,866,698 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,302 UART: [state] Locking ICCM
2,867,780 UART: [exit] Launching FMC @ 0x40000130
2,873,109 UART:
2,873,125 UART: Running Caliptra FMC ...
2,873,533 UART:
2,873,676 UART: [state] CFI Enabled
2,884,257 UART: [fht] FMC Alias Private Key: 7
2,992,164 UART: [art] Extend RT PCRs Done
2,992,592 UART: [art] Lock RT PCRs Done
2,994,132 UART: [art] Populate DV Done
3,002,183 UART: [fht] FMC Alias Private Key: 7
3,003,347 UART: [art] Derive CDI
3,003,627 UART: [art] Store in in slot 0x4
3,089,302 UART: [art] Derive Key Pair
3,089,662 UART: [art] Store priv key in slot 0x5
3,102,908 UART: [art] Derive Key Pair - Done
3,117,901 UART: [art] Signing Cert with AUTHO
3,118,381 UART: RITY.KEYID = 7
3,133,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,610 UART: [art] PUB.X = CF647614E3CD42FDCCC3D7E6DFB4604328B2919E943D93CED4354D549F2A54478AA47E1330C98662BB337F751BA4C5F6
3,141,388 UART: [art] PUB.Y = A3780AD0EB564C860ABBBD549B7DFEC1141E70B7FA11FA9D4DEF0898937320B9873837FB57894F784295EED7EB658A0B
3,148,338 UART: [art] SIG.R = C973D50F6831E84F3237FE83B2D4E6C05B3BA9DFEB8DA62385B559CFB5B0BC16E367A480EFB2773FB2C5B97698E72B12
3,155,119 UART: [art] SIG.S = 5452A0C334169973F3C6B647AA719EB4DD4D1EDE6910994F7F2805AC6B60799B56012974731D1D9E60F49A986B9993FC
3,178,340 UART: Caliptra RT
3,178,685 UART: [state] CFI Enabled
3,286,226 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,914 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 ready_for_fw is high
1,060,768 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,634,277 >>> mbox cmd response: success
2,634,277 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,696,195 UART:
2,696,211 UART: Running Caliptra FMC ...
2,696,619 UART:
2,696,762 UART: [state] CFI Enabled
2,707,201 UART: [fht] FMC Alias Private Key: 7
2,814,852 UART: [art] Extend RT PCRs Done
2,815,280 UART: [art] Lock RT PCRs Done
2,817,086 UART: [art] Populate DV Done
2,825,271 UART: [fht] FMC Alias Private Key: 7
2,826,269 UART: [art] Derive CDI
2,826,549 UART: [art] Store in in slot 0x4
2,912,320 UART: [art] Derive Key Pair
2,912,680 UART: [art] Store priv key in slot 0x5
2,925,398 UART: [art] Derive Key Pair - Done
2,940,234 UART: [art] Signing Cert with AUTHO
2,940,714 UART: RITY.KEYID = 7
2,956,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,987 UART: [art] PUB.X = F134461191BA5388D92C3A9D2E5CED25868C1868A2752BC02EBCF73E4F3535FD6E5B5DB13D0BE7258AA5482AC1654CFD
2,963,766 UART: [art] PUB.Y = 8D843E99C32C8F92EEB83C154E36613E07B927FB4C79AE1CE80192D593A83F58B281E339783E9F64C7087C70365B9815
2,970,703 UART: [art] SIG.R = 7F99217820C75651F154945EA55E7192FFE31418F43F1B9F9D8B5A183DEB55523BFBAB122356AEFB3A3B958ED1989A5B
2,977,479 UART: [art] SIG.S = 6AB3D6859FD69472BBA35DE36F2B6430551617AAFB203D9BAEE86EB45F50D3ED4E804696BBC1EDDB5616E9DF41EADC17
3,001,416 UART: Caliptra RT
3,001,761 UART: [state] CFI Enabled
3,109,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,460 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,412 UART: [kat] LMS
1,168,724 UART: [kat] --
1,169,627 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,139 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,780 UART: [fwproc] Wait for Commands...
1,281,451 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,671 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,421 >>> mbox cmd response: success
2,779,421 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,780,644 UART: [afmc] ++
2,780,812 UART: [afmc] CDI.KEYID = 6
2,781,175 UART: [afmc] SUBJECT.KEYID = 7
2,781,601 UART: [afmc] AUTHORITY.KEYID = 5
2,816,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,849 UART: [afmc] --
2,859,851 UART: [cold-reset] --
2,860,617 UART: [state] Locking Datavault
2,861,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,550 UART: [state] Locking ICCM
2,863,156 UART: [exit] Launching FMC @ 0x40000130
2,868,485 UART:
2,868,501 UART: Running Caliptra FMC ...
2,868,909 UART:
2,868,963 UART: [state] CFI Enabled
2,879,450 UART: [fht] FMC Alias Private Key: 7
2,987,835 UART: [art] Extend RT PCRs Done
2,988,263 UART: [art] Lock RT PCRs Done
2,989,843 UART: [art] Populate DV Done
2,998,090 UART: [fht] FMC Alias Private Key: 7
2,999,118 UART: [art] Derive CDI
2,999,398 UART: [art] Store in in slot 0x4
3,085,263 UART: [art] Derive Key Pair
3,085,623 UART: [art] Store priv key in slot 0x5
3,098,429 UART: [art] Derive Key Pair - Done
3,113,105 UART: [art] Signing Cert with AUTHO
3,113,585 UART: RITY.KEYID = 7
3,129,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,834 UART: [art] PUB.X = 24AE358026A4B082BC63CF22C46C1FB372F1FA987C76ED6B654EA27A814E055D5F2D7740DE3D31483CFACC03CF22D6BB
3,136,614 UART: [art] PUB.Y = 17DB01F07A4A40AF6EF1C1B3CD1AE4E24CC89E1206B61F99FA813134537BF0460C8B11DFC657C8B5EB06773812DF9AC9
3,143,566 UART: [art] SIG.R = 1DF06747F018DE712AD24F3752371CED3A94E3ADEBE0CBD368A61EBFFE13F8AA4CB24C3AE80F397A1734B41A97EBDED8
3,150,359 UART: [art] SIG.S = 41C54D27CB9F2B064101BDF8D927767336CE80CDF3EB1FB3544E316730E570200D8F8F98142AD3F963BE0E8018C949D5
3,173,622 UART: Caliptra RT
3,173,875 UART: [state] CFI Enabled
3,281,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,992 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,536 ready_for_fw is high
1,055,536 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,627,967 >>> mbox cmd response: success
2,627,967 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,689,865 UART:
2,689,881 UART: Running Caliptra FMC ...
2,690,289 UART:
2,690,343 UART: [state] CFI Enabled
2,700,634 UART: [fht] FMC Alias Private Key: 7
2,808,469 UART: [art] Extend RT PCRs Done
2,808,897 UART: [art] Lock RT PCRs Done
2,810,693 UART: [art] Populate DV Done
2,818,704 UART: [fht] FMC Alias Private Key: 7
2,819,766 UART: [art] Derive CDI
2,820,046 UART: [art] Store in in slot 0x4
2,905,433 UART: [art] Derive Key Pair
2,905,793 UART: [art] Store priv key in slot 0x5
2,919,169 UART: [art] Derive Key Pair - Done
2,934,106 UART: [art] Signing Cert with AUTHO
2,934,586 UART: RITY.KEYID = 7
2,950,002 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,767 UART: [art] PUB.X = 5A6C7267966BBAB4BD1C438C067781391AF77B952A15F3A12D08C71D6B903263B94B154E5BB0B3E2AA4478AA7224E1AA
2,957,537 UART: [art] PUB.Y = 3397DA15D29CA0C0D9F2D30CBBF33B56DD6764B1F0035882B69EFE11EFD96D3FEFAEFA4877F0BF58C2BFE37653E69270
2,964,501 UART: [art] SIG.R = A253A142E5F53ED88C3840AD8403A05FF1607E70387581F5BA18BDD01A57FAD8CB5E6414E881D109EB062753BC081C30
2,971,263 UART: [art] SIG.S = 5CDE75AB8B1AE896B1720CC36B736BCA2AFFC5DA55A489D3CDED3BF71C1805871405FD735E01A627DF1CE640EC1810DF
2,995,272 UART: Caliptra RT
2,995,525 UART: [state] CFI Enabled
3,102,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,544 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,174,386 ready_for_fw is high
1,174,386 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,198,364 UART: [idev] Sha1 KeyId Algorithm
1,207,160 UART: [idev] --
1,208,185 UART: [ldev] ++
1,208,353 UART: [ldev] CDI.KEYID = 6
1,208,717 UART: [ldev] SUBJECT.KEYID = 5
1,209,144 UART: [ldev] AUTHORITY.KEYID = 7
1,209,607 UART: [ldev] FE.KEYID = 1
1,215,051 UART: [ldev] Erasing FE.KEYID = 1
1,241,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,751 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 114940 bytes
2,586,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,158 UART: [fwproc] Load Runtime at address 0x40005000 len 90256
2,779,856 >>> mbox cmd response: success
2,779,856 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,780,925 UART: [afmc] ++
2,781,093 UART: [afmc] CDI.KEYID = 6
2,781,456 UART: [afmc] SUBJECT.KEYID = 7
2,781,882 UART: [afmc] AUTHORITY.KEYID = 5
2,817,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,492 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,552 UART: [afmc] --
2,860,538 UART: [cold-reset] --
2,861,262 UART: [state] Locking Datavault
2,862,429 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,033 UART: [state] Locking ICCM
2,863,457 UART: [exit] Launching FMC @ 0x40000130
2,868,786 UART:
2,868,802 UART: Running Caliptra FMC ...
2,869,210 UART:
2,869,353 UART: [state] CFI Enabled
2,879,942 UART: [fht] FMC Alias Private Key: 7
2,988,049 UART: [art] Extend RT PCRs Done
2,988,477 UART: [art] Lock RT PCRs Done
2,989,931 UART: [art] Populate DV Done
2,998,202 UART: [fht] FMC Alias Private Key: 7
2,999,132 UART: [art] Derive CDI
2,999,412 UART: [art] Store in in slot 0x4
3,084,983 UART: [art] Derive Key Pair
3,085,343 UART: [art] Store priv key in slot 0x5
3,098,729 UART: [art] Derive Key Pair - Done
3,113,576 UART: [art] Signing Cert with AUTHO
3,114,056 UART: RITY.KEYID = 7
3,129,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,023 UART: [art] PUB.X = 6A83992DA28E228CA07300AF1559E41853C7295F13A989D0B30B1C953772039F0A5D2DFCE8ADF8A1AFAAEB52F95E7A19
3,136,772 UART: [art] PUB.Y = 3E4047B2F0935FB26F226EF4578BA09EFB50B775F5BA7C3DF73AEB13C6B227DDFC8DF6DD7160CEF32533244DB02F9E7D
3,143,742 UART: [art] SIG.R = 8BB127F0C490E72C3BF3AFCB4BF8C7FDDB6D6994B1C6483FAA152B98FCF6FF5A5B978F0DE0CFBAFF159BB7723D041E35
3,150,536 UART: [art] SIG.S = 97672360308B53BFD7439D3C6403430BF9E39FA2C2CA8B691C8BF944D1026FB4576BD497F5D53E0C5A3D6FD3A99E92F1
3,174,117 UART: Caliptra RT
3,174,462 UART: [state] CFI Enabled
3,282,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,322 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,089 ready_for_fw is high
1,056,089 <<< Executing mbox cmd 0x46574c44 (114940 bytes) from SoC
2,630,050 >>> mbox cmd response: success
2,630,050 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,692,346 UART:
2,692,362 UART: Running Caliptra FMC ...
2,692,770 UART:
2,692,913 UART: [state] CFI Enabled
2,703,626 UART: [fht] FMC Alias Private Key: 7
2,810,707 UART: [art] Extend RT PCRs Done
2,811,135 UART: [art] Lock RT PCRs Done
2,813,005 UART: [art] Populate DV Done
2,821,264 UART: [fht] FMC Alias Private Key: 7
2,822,240 UART: [art] Derive CDI
2,822,520 UART: [art] Store in in slot 0x4
2,908,115 UART: [art] Derive Key Pair
2,908,475 UART: [art] Store priv key in slot 0x5
2,921,723 UART: [art] Derive Key Pair - Done
2,936,499 UART: [art] Signing Cert with AUTHO
2,936,979 UART: RITY.KEYID = 7
2,952,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,210 UART: [art] PUB.X = B722B7B23C230ABD33F67B8EB09E259C096E136977819E6432A3BFC54F553C523306EA404064BA812577F67B5FE365EB
2,959,971 UART: [art] PUB.Y = 4770A194ECAC9E3813C811AE53A574CC5C344EB63C2670EE5396BFD60EE1E44B32263A14B36C002C84CCBC76FB2833AA
2,966,908 UART: [art] SIG.R = 86AE1594C667F15C7D90C7F55FFC9734F7CE4B3E4D7E174A9E24621912C1769D6B4483F4415AE1204ECB5A31F7D2E70D
2,973,681 UART: [art] SIG.S = 1065E78D444CF73D365AB30EF19B6853CADE4371B67B48A99D724A3E69F17CBC3E2C6EEE87162133D48EEA00969F6D98
2,997,637 UART: Caliptra RT
2,997,982 UART: [state] CFI Enabled
3,106,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,669 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
194,262 UART:
194,656 UART: Running Caliptra ROM ...
195,768 UART:
195,918 UART: [state] CFI Enabled
263,972 UART: [state] LifecycleState = Unprovisioned
265,960 UART: [state] DebugLocked = No
267,921 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,219 UART: [kat] SHA2-256
441,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,422 UART: [kat] ++
452,901 UART: [kat] sha1
464,558 UART: [kat] SHA2-256
467,286 UART: [kat] SHA2-384
473,342 UART: [kat] SHA2-512-ACC
475,717 UART: [kat] ECC-384
2,766,935 UART: [kat] HMAC-384Kdf
2,801,106 UART: [kat] LMS
3,991,411 UART: [kat] --
3,995,756 UART: [cold-reset] ++
3,998,389 UART: [fht] Storing FHT @ 0x50003400
4,009,234 UART: [idev] ++
4,009,836 UART: [idev] CDI.KEYID = 6
4,010,754 UART: [idev] SUBJECT.KEYID = 7
4,012,000 UART: [idev] UDS.KEYID = 0
4,013,076 ready_for_fw is high
4,013,288 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,034,734 UART: [idev] Erasing UDS.KEYID = 0
7,346,862 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,962 UART: [idev] --
7,371,114 UART: [ldev] ++
7,371,687 UART: [ldev] CDI.KEYID = 6
7,372,703 UART: [ldev] SUBJECT.KEYID = 5
7,373,869 UART: [ldev] AUTHORITY.KEYID = 7
7,375,095 UART: [ldev] FE.KEYID = 1
7,401,738 UART: [ldev] Erasing FE.KEYID = 1
10,736,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,334 UART: [ldev] --
13,118,491 UART: [fwproc] Waiting for Commands...
13,120,315 UART: [fwproc] Received command 0x46574c44
13,122,546 UART: [fwproc] Received Image of size 7036 bytes
15,872,821 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,951,510 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,954,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
15,963,433 >>> mbox cmd response: success
15,968,140 UART: [afmc] ++
15,968,709 UART: [afmc] CDI.KEYID = 6
15,969,719 UART: [afmc] SUBJECT.KEYID = 7
15,970,929 UART: [afmc] AUTHORITY.KEYID = 5
19,342,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,642,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,644,846 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,659,318 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,674,167 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,688,604 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,710,611 UART: [afmc] --
21,715,121 UART: [cold-reset] --
21,719,195 UART: [state] Locking Datavault
21,726,224 UART: [state] Locking PCR0, PCR1 and PCR31
21,727,921 UART: [state] Locking ICCM
21,729,960 UART: [exit] Launching FMC @ 0x40000000
21,738,351 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,743,622 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,785,249 ready_for_fw is high
3,785,790 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,675,630 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,394 UART:
192,763 UART: Running Caliptra ROM ...
193,960 UART:
603,789 UART: [state] CFI Enabled
616,384 UART: [state] LifecycleState = Unprovisioned
618,340 UART: [state] DebugLocked = No
620,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,095 UART: [kat] SHA2-256
793,892 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,404 UART: [kat] ++
804,848 UART: [kat] sha1
815,649 UART: [kat] SHA2-256
818,320 UART: [kat] SHA2-384
824,099 UART: [kat] SHA2-512-ACC
826,476 UART: [kat] ECC-384
3,111,251 UART: [kat] HMAC-384Kdf
3,122,337 UART: [kat] LMS
4,312,435 UART: [kat] --
4,317,879 UART: [cold-reset] ++
4,319,810 UART: [fht] Storing FHT @ 0x50003400
4,330,929 UART: [idev] ++
4,331,499 UART: [idev] CDI.KEYID = 6
4,332,455 UART: [idev] SUBJECT.KEYID = 7
4,333,698 UART: [idev] UDS.KEYID = 0
4,334,691 ready_for_fw is high
4,334,884 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,352,455 UART: [idev] Erasing UDS.KEYID = 0
7,623,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,559 UART: [idev] --
7,650,278 UART: [ldev] ++
7,650,848 UART: [ldev] CDI.KEYID = 6
7,651,814 UART: [ldev] SUBJECT.KEYID = 5
7,653,023 UART: [ldev] AUTHORITY.KEYID = 7
7,654,258 UART: [ldev] FE.KEYID = 1
7,666,621 UART: [ldev] Erasing FE.KEYID = 1
10,950,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,813 UART: [ldev] --
13,309,966 UART: [fwproc] Waiting for Commands...
13,312,599 UART: [fwproc] Received command 0x46574c44
13,314,783 UART: [fwproc] Received Image of size 7036 bytes
16,061,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,134,382 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,137,491 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
16,145,682 >>> mbox cmd response: success
16,149,431 UART: [afmc] ++
16,150,011 UART: [afmc] CDI.KEYID = 6
16,150,921 UART: [afmc] SUBJECT.KEYID = 7
16,152,204 UART: [afmc] AUTHORITY.KEYID = 5
19,465,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,760,460 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,762,767 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,777,213 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,792,066 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,806,445 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,828,049 UART: [afmc] --
21,832,602 UART: [cold-reset] --
21,835,841 UART: [state] Locking Datavault
21,842,392 UART: [state] Locking PCR0, PCR1 and PCR31
21,844,088 UART: [state] Locking ICCM
21,846,025 UART: [exit] Launching FMC @ 0x40000000
21,854,474 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,859,795 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,131,007 ready_for_fw is high
4,131,456 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,887,716 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,024 UART:
192,397 UART: Running Caliptra ROM ...
193,533 UART:
193,708 UART: [state] CFI Enabled
266,004 UART: [state] LifecycleState = Unprovisioned
267,923 UART: [state] DebugLocked = No
270,098 UART: [state] WD Timer not started. Device not locked for debugging
274,497 UART: [kat] SHA2-256
453,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,197 UART: [kat] ++
465,733 UART: [kat] sha1
476,686 UART: [kat] SHA2-256
479,704 UART: [kat] SHA2-384
487,326 UART: [kat] SHA2-512-ACC
490,262 UART: [kat] ECC-384
2,950,847 UART: [kat] HMAC-384Kdf
2,964,573 UART: [kat] LMS
3,494,042 UART: [kat] --
3,496,938 UART: [cold-reset] ++
3,498,397 UART: [fht] FHT @ 0x50003400
3,508,389 UART: [idev] ++
3,508,958 UART: [idev] CDI.KEYID = 6
3,509,846 UART: [idev] SUBJECT.KEYID = 7
3,511,089 UART: [idev] UDS.KEYID = 0
3,512,174 ready_for_fw is high
3,512,372 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,536,433 UART: [idev] Erasing UDS.KEYID = 0
6,021,597 UART: [idev] Sha1 KeyId Algorithm
6,044,012 UART: [idev] --
6,047,687 UART: [ldev] ++
6,048,264 UART: [ldev] CDI.KEYID = 6
6,049,200 UART: [ldev] SUBJECT.KEYID = 5
6,050,362 UART: [ldev] AUTHORITY.KEYID = 7
6,051,597 UART: [ldev] FE.KEYID = 1
6,092,869 UART: [ldev] Erasing FE.KEYID = 1
8,597,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,243 UART: [ldev] --
10,407,177 UART: [fwproc] Wait for Commands...
10,409,157 UART: [fwproc] Recv command 0x46574c44
10,411,245 UART: [fwproc] Recv'd Img size: 7036 bytes
12,502,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,574,777 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,577,802 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,586,234 >>> mbox cmd response: success
12,590,637 UART: [afmc] ++
12,591,219 UART: [afmc] CDI.KEYID = 6
12,592,124 UART: [afmc] SUBJECT.KEYID = 7
12,593,357 UART: [afmc] AUTHORITY.KEYID = 5
15,112,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,840,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,842,373 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,858,295 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,874,212 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,890,012 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,913,018 UART: [afmc] --
16,916,574 UART: [cold-reset] --
16,920,602 UART: [state] Locking Datavault
16,925,635 UART: [state] Locking PCR0, PCR1 and PCR31
16,927,280 UART: [state] Locking ICCM
16,929,268 UART: [exit] Launching FMC @ 0x40000000
16,937,671 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,943,094 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,373,732 ready_for_fw is high
3,374,181 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,368,097 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,485 UART:
192,856 UART: Running Caliptra ROM ...
193,950 UART:
603,628 UART: [state] CFI Enabled
618,272 UART: [state] LifecycleState = Unprovisioned
620,153 UART: [state] DebugLocked = No
621,549 UART: [state] WD Timer not started. Device not locked for debugging
624,947 UART: [kat] SHA2-256
804,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,707 UART: [kat] ++
816,155 UART: [kat] sha1
828,805 UART: [kat] SHA2-256
831,894 UART: [kat] SHA2-384
837,393 UART: [kat] SHA2-512-ACC
840,338 UART: [kat] ECC-384
3,281,686 UART: [kat] HMAC-384Kdf
3,295,007 UART: [kat] LMS
3,824,436 UART: [kat] --
3,829,936 UART: [cold-reset] ++
3,831,868 UART: [fht] FHT @ 0x50003400
3,843,558 UART: [idev] ++
3,844,129 UART: [idev] CDI.KEYID = 6
3,845,185 UART: [idev] SUBJECT.KEYID = 7
3,846,293 UART: [idev] UDS.KEYID = 0
3,847,219 ready_for_fw is high
3,847,423 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,860,637 UART: [idev] Erasing UDS.KEYID = 0
6,318,748 UART: [idev] Sha1 KeyId Algorithm
6,340,905 UART: [idev] --
6,344,408 UART: [ldev] ++
6,344,975 UART: [ldev] CDI.KEYID = 6
6,345,887 UART: [ldev] SUBJECT.KEYID = 5
6,347,100 UART: [ldev] AUTHORITY.KEYID = 7
6,348,332 UART: [ldev] FE.KEYID = 1
6,359,237 UART: [ldev] Erasing FE.KEYID = 1
8,830,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,212 UART: [ldev] --
10,622,618 UART: [fwproc] Wait for Commands...
10,625,526 UART: [fwproc] Recv command 0x46574c44
10,627,565 UART: [fwproc] Recv'd Img size: 7036 bytes
12,716,146 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,790,878 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,793,901 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,802,706 >>> mbox cmd response: success
12,806,331 UART: [afmc] ++
12,806,909 UART: [afmc] CDI.KEYID = 6
12,807,820 UART: [afmc] SUBJECT.KEYID = 7
12,809,035 UART: [afmc] AUTHORITY.KEYID = 5
15,308,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,029,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,031,569 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,047,471 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,063,361 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,079,214 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,100,861 UART: [afmc] --
17,103,978 UART: [cold-reset] --
17,109,401 UART: [state] Locking Datavault
17,114,862 UART: [state] Locking PCR0, PCR1 and PCR31
17,116,504 UART: [state] Locking ICCM
17,118,377 UART: [exit] Launching FMC @ 0x40000000
17,126,781 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,132,201 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,697,313 ready_for_fw is high
3,697,769 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,567,214 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,050 UART:
192,416 UART: Running Caliptra ROM ...
193,612 UART:
193,782 UART: [state] CFI Enabled
264,772 UART: [state] LifecycleState = Unprovisioned
267,133 UART: [state] DebugLocked = No
269,243 UART: [state] WD Timer not started. Device not locked for debugging
274,771 UART: [kat] SHA2-256
464,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,382 UART: [kat] ++
475,830 UART: [kat] sha1
487,839 UART: [kat] SHA2-256
490,846 UART: [kat] SHA2-384
497,545 UART: [kat] SHA2-512-ACC
500,135 UART: [kat] ECC-384
2,948,885 UART: [kat] HMAC-384Kdf
2,971,768 UART: [kat] LMS
3,503,520 UART: [kat] --
3,510,131 UART: [cold-reset] ++
3,511,085 UART: [fht] FHT @ 0x50003400
3,522,065 UART: [idev] ++
3,522,775 UART: [idev] CDI.KEYID = 6
3,523,765 UART: [idev] SUBJECT.KEYID = 7
3,524,943 UART: [idev] UDS.KEYID = 0
3,525,865 ready_for_fw is high
3,526,047 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,544,269 UART: [idev] Erasing UDS.KEYID = 0
6,029,255 UART: [idev] Sha1 KeyId Algorithm
6,051,626 UART: [idev] --
6,057,140 UART: [ldev] ++
6,057,820 UART: [ldev] CDI.KEYID = 6
6,058,738 UART: [ldev] SUBJECT.KEYID = 5
6,059,903 UART: [ldev] AUTHORITY.KEYID = 7
6,061,294 UART: [ldev] FE.KEYID = 1
6,101,497 UART: [ldev] Erasing FE.KEYID = 1
8,604,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,615 UART: [ldev] --
10,414,583 UART: [fwproc] Wait for Commands...
10,416,851 UART: [fwproc] Recv command 0x46574c44
10,419,160 UART: [fwproc] Recv'd Img size: 7036 bytes
12,537,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,615,485 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,619,054 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,630,424 >>> mbox cmd response: success
12,633,640 UART: [afmc] ++
12,634,271 UART: [afmc] CDI.KEYID = 6
12,635,512 UART: [afmc] SUBJECT.KEYID = 7
12,636,968 UART: [afmc] AUTHORITY.KEYID = 5
15,174,444 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,912,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,914,128 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,929,210 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,944,367 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,959,431 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,982,902 UART: [afmc] --
16,985,745 UART: [cold-reset] --
16,989,933 UART: [state] Locking Datavault
16,996,428 UART: [state] Locking PCR0, PCR1 and PCR31
16,998,562 UART: [state] Locking ICCM
17,000,821 UART: [exit] Launching FMC @ 0x40000000
17,009,495 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,015,530 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,440,045 ready_for_fw is high
3,440,442 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,437,438 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,448 UART:
192,803 UART: Running Caliptra ROM ...
193,936 UART:
603,616 UART: [state] CFI Enabled
616,713 UART: [state] LifecycleState = Unprovisioned
619,119 UART: [state] DebugLocked = No
621,989 UART: [state] WD Timer not started. Device not locked for debugging
626,800 UART: [kat] SHA2-256
816,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,471 UART: [kat] ++
828,010 UART: [kat] sha1
840,674 UART: [kat] SHA2-256
843,679 UART: [kat] SHA2-384
849,474 UART: [kat] SHA2-512-ACC
852,027 UART: [kat] ECC-384
3,298,498 UART: [kat] HMAC-384Kdf
3,313,207 UART: [kat] LMS
3,845,010 UART: [kat] --
3,848,939 UART: [cold-reset] ++
3,850,653 UART: [fht] FHT @ 0x50003400
3,862,765 UART: [idev] ++
3,863,403 UART: [idev] CDI.KEYID = 6
3,864,431 UART: [idev] SUBJECT.KEYID = 7
3,865,607 UART: [idev] UDS.KEYID = 0
3,866,538 ready_for_fw is high
3,866,772 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,881,946 UART: [idev] Erasing UDS.KEYID = 0
6,340,235 UART: [idev] Sha1 KeyId Algorithm
6,361,679 UART: [idev] --
6,367,221 UART: [ldev] ++
6,367,894 UART: [ldev] CDI.KEYID = 6
6,368,829 UART: [ldev] SUBJECT.KEYID = 5
6,370,083 UART: [ldev] AUTHORITY.KEYID = 7
6,371,277 UART: [ldev] FE.KEYID = 1
6,381,418 UART: [ldev] Erasing FE.KEYID = 1
8,859,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,641 UART: [ldev] --
10,651,360 UART: [fwproc] Wait for Commands...
10,653,740 UART: [fwproc] Recv command 0x46574c44
10,656,051 UART: [fwproc] Recv'd Img size: 7036 bytes
12,779,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,860,682 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,864,254 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,875,281 >>> mbox cmd response: success
12,878,843 UART: [afmc] ++
12,879,476 UART: [afmc] CDI.KEYID = 6
12,880,656 UART: [afmc] SUBJECT.KEYID = 7
12,882,144 UART: [afmc] AUTHORITY.KEYID = 5
15,380,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,102,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,104,280 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,119,304 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,134,481 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,149,553 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,173,708 UART: [afmc] --
17,177,826 UART: [cold-reset] --
17,181,156 UART: [state] Locking Datavault
17,187,273 UART: [state] Locking PCR0, PCR1 and PCR31
17,189,411 UART: [state] Locking ICCM
17,191,346 UART: [exit] Launching FMC @ 0x40000000
17,200,011 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,206,137 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,751,904 ready_for_fw is high
3,752,301 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,652,270 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,855 UART: [kat] SHA2-256
881,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,901 UART: [kat] ++
886,053 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,304 UART: [kat] HMAC-384Kdf
906,880 UART: [kat] LMS
1,475,076 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,629 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 ready_for_fw is high
1,480,657 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,592 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,038 UART: [idev] --
1,515,277 UART: [ldev] ++
1,515,445 UART: [ldev] CDI.KEYID = 6
1,515,808 UART: [ldev] SUBJECT.KEYID = 5
1,516,234 UART: [ldev] AUTHORITY.KEYID = 7
1,516,697 UART: [ldev] FE.KEYID = 1
1,521,913 UART: [ldev] Erasing FE.KEYID = 1
1,547,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,182 UART: [ldev] --
1,586,619 UART: [fwproc] Waiting for Commands...
1,587,318 UART: [fwproc] Received command 0x46574c44
1,588,109 UART: [fwproc] Received Image of size 7036 bytes
1,654,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,682,335 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,683,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,686,596 >>> mbox cmd response: success
1,687,768 UART: [afmc] ++
1,687,936 UART: [afmc] CDI.KEYID = 6
1,688,298 UART: [afmc] SUBJECT.KEYID = 7
1,688,723 UART: [afmc] AUTHORITY.KEYID = 5
1,724,001 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,739,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,740,723 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,746,444 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,752,339 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,758,051 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,124 UART: [afmc] --
1,767,052 UART: [cold-reset] --
1,767,734 UART: [state] Locking Datavault
1,769,077 UART: [state] Locking PCR0, PCR1 and PCR31
1,769,681 UART: [state] Locking ICCM
1,770,289 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,775,584 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,777,467 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,355 ready_for_fw is high
1,362,355 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,815 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Unprovisioned
86,416 UART: [state] DebugLocked = No
87,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,816 UART: [kat] SHA2-256
882,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,862 UART: [kat] ++
887,014 UART: [kat] sha1
891,362 UART: [kat] SHA2-256
893,300 UART: [kat] SHA2-384
895,973 UART: [kat] SHA2-512-ACC
897,874 UART: [kat] ECC-384
903,685 UART: [kat] HMAC-384Kdf
908,243 UART: [kat] LMS
1,476,439 UART: [kat] --
1,477,370 UART: [cold-reset] ++
1,477,870 UART: [fht] Storing FHT @ 0x50003400
1,480,475 UART: [idev] ++
1,480,643 UART: [idev] CDI.KEYID = 6
1,481,003 UART: [idev] SUBJECT.KEYID = 7
1,481,427 UART: [idev] UDS.KEYID = 0
1,481,772 ready_for_fw is high
1,481,772 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,506,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,779 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,386 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,791 UART: [ldev] --
1,587,306 UART: [fwproc] Waiting for Commands...
1,588,007 UART: [fwproc] Received command 0x46574c44
1,588,798 UART: [fwproc] Received Image of size 7036 bytes
1,658,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,685,183 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,686,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,689,280 >>> mbox cmd response: success
1,690,354 UART: [afmc] ++
1,690,522 UART: [afmc] CDI.KEYID = 6
1,690,884 UART: [afmc] SUBJECT.KEYID = 7
1,691,309 UART: [afmc] AUTHORITY.KEYID = 5
1,726,181 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,742,873 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,743,653 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,749,374 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,755,269 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,760,981 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,768,708 UART: [afmc] --
1,769,712 UART: [cold-reset] --
1,770,764 UART: [state] Locking Datavault
1,771,821 UART: [state] Locking PCR0, PCR1 and PCR31
1,772,425 UART: [state] Locking ICCM
1,772,977 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,778,272 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,780,155 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,714 ready_for_fw is high
1,362,714 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,537,266 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
892,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,035 UART: [kat] ++
897,187 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,750 UART: [kat] HMAC-384Kdf
922,402 UART: [kat] LMS
1,170,730 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 ready_for_fw is high
1,176,275 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,201,083 UART: [idev] Sha1 KeyId Algorithm
1,209,557 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,051 UART: [ldev] --
1,282,558 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 7036 bytes
1,350,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,377,897 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,379,013 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,082 >>> mbox cmd response: success
1,383,100 UART: [afmc] ++
1,383,268 UART: [afmc] CDI.KEYID = 6
1,383,630 UART: [afmc] SUBJECT.KEYID = 7
1,384,055 UART: [afmc] AUTHORITY.KEYID = 5
1,419,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,435,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,436,184 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,441,905 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,447,800 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,453,492 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,461,436 UART: [afmc] --
1,462,418 UART: [cold-reset] --
1,463,194 UART: [state] Locking Datavault
1,464,511 UART: [state] Locking PCR0, PCR1 and PCR31
1,465,115 UART: [state] Locking ICCM
1,465,703 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,470,998 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,472,881 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 ready_for_fw is high
1,059,945 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,437 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,746 UART: [kat] SHA2-256
903,686 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,509 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,173,048 UART: [fht] FHT @ 0x50003400
1,175,621 UART: [idev] ++
1,175,789 UART: [idev] CDI.KEYID = 6
1,176,149 UART: [idev] SUBJECT.KEYID = 7
1,176,573 UART: [idev] UDS.KEYID = 0
1,176,918 ready_for_fw is high
1,176,918 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,184,849 UART: [idev] Erasing UDS.KEYID = 0
1,202,150 UART: [idev] Sha1 KeyId Algorithm
1,210,542 UART: [idev] --
1,211,570 UART: [ldev] ++
1,211,738 UART: [ldev] CDI.KEYID = 6
1,212,101 UART: [ldev] SUBJECT.KEYID = 5
1,212,527 UART: [ldev] AUTHORITY.KEYID = 7
1,212,990 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,244,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,312 UART: [ldev] --
1,283,601 UART: [fwproc] Wait for Commands...
1,284,315 UART: [fwproc] Recv command 0x46574c44
1,285,043 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,496 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,612 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,657 >>> mbox cmd response: success
1,384,877 UART: [afmc] ++
1,385,045 UART: [afmc] CDI.KEYID = 6
1,385,407 UART: [afmc] SUBJECT.KEYID = 7
1,385,832 UART: [afmc] AUTHORITY.KEYID = 5
1,421,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,393 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,114 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,009 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,701 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,501 UART: [afmc] --
1,464,485 UART: [cold-reset] --
1,465,503 UART: [state] Locking Datavault
1,466,624 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,228 UART: [state] Locking ICCM
1,467,828 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,473,123 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,475,006 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,012 ready_for_fw is high
1,060,012 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,234,630 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,760 UART: [state] LifecycleState = Unprovisioned
86,415 UART: [state] DebugLocked = No
87,007 UART: [state] WD Timer not started. Device not locked for debugging
88,164 UART: [kat] SHA2-256
891,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,843 UART: [kat] ++
895,995 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,182,643 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,287 UART: [idev] --
1,209,266 UART: [ldev] ++
1,209,434 UART: [ldev] CDI.KEYID = 6
1,209,798 UART: [ldev] SUBJECT.KEYID = 5
1,210,225 UART: [ldev] AUTHORITY.KEYID = 7
1,210,688 UART: [ldev] FE.KEYID = 1
1,216,048 UART: [ldev] Erasing FE.KEYID = 1
1,242,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,322 UART: [fwproc] Wait for Commands...
1,281,971 UART: [fwproc] Recv command 0x46574c44
1,282,704 UART: [fwproc] Recv'd Img size: 7036 bytes
1,349,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,376,921 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,042 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,380,932 >>> mbox cmd response: success
1,382,069 UART: [afmc] ++
1,382,237 UART: [afmc] CDI.KEYID = 6
1,382,600 UART: [afmc] SUBJECT.KEYID = 7
1,383,026 UART: [afmc] AUTHORITY.KEYID = 5
1,417,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,434,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,434,987 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,440,709 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,446,602 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,452,294 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,460,105 UART: [afmc] --
1,461,097 UART: [cold-reset] --
1,461,701 UART: [state] Locking Datavault
1,462,962 UART: [state] Locking PCR0, PCR1 and PCR31
1,463,566 UART: [state] Locking ICCM
1,464,058 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,469,353 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,471,236 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,916 ready_for_fw is high
1,055,916 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,464 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "943d60144eba54ab6d2e1bf3192b18953f498991944e7c9065da9c2fc9384c87d988249f748922bf6bf520b56c478222",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,984 UART: [kat] ++
896,136 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
905,211 UART: [kat] SHA2-512-ACC
907,112 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,263 UART: [kat] LMS
1,169,575 UART: [kat] --
1,170,532 UART: [cold-reset] ++
1,170,934 UART: [fht] FHT @ 0x50003400
1,173,798 UART: [idev] ++
1,173,966 UART: [idev] CDI.KEYID = 6
1,174,327 UART: [idev] SUBJECT.KEYID = 7
1,174,752 UART: [idev] UDS.KEYID = 0
1,175,098 ready_for_fw is high
1,175,098 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,200,340 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,217,091 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,113 UART: [fwproc] Wait for Commands...
1,282,700 UART: [fwproc] Recv command 0x46574c44
1,283,433 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,352 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,473 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,471 >>> mbox cmd response: success
1,384,680 UART: [afmc] ++
1,384,848 UART: [afmc] CDI.KEYID = 6
1,385,211 UART: [afmc] SUBJECT.KEYID = 7
1,385,637 UART: [afmc] AUTHORITY.KEYID = 5
1,421,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,438,650 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,444,372 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,450,265 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,957 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,666 UART: [afmc] --
1,464,566 UART: [cold-reset] --
1,465,534 UART: [state] Locking Datavault
1,466,969 UART: [state] Locking PCR0, PCR1 and PCR31
1,467,573 UART: [state] Locking ICCM
1,468,147 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,473,442 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,475,325 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "218630aef94365629531bdf8d106379f753fab67e0c48dfbd6d20dd00fa16c49d528ff30168c71e94b998df5a3d7e6e3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,151 ready_for_fw is high
1,056,151 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,477 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s